Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2022-32149 (GCVE-0-2022-32149)
Vulnerability from cvelistv5
- CWE 400: Uncontrolled Resource Consumption
| URL | Tags | ||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||||||
| Vendor | Product | Version | ||
|---|---|---|---|---|
| golang.org/x/text | golang.org/x/text/language |
Version: 0 ≤ |
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-03T07:32:56.022Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"url": "https://security.netapp.com/advisory/ntap-20230203-0006/"
},
{
"tags": [
"x_transferred"
],
"url": "https://go.dev/issue/56152"
},
{
"tags": [
"x_transferred"
],
"url": "https://go.dev/cl/442235"
},
{
"tags": [
"x_transferred"
],
"url": "https://groups.google.com/g/golang-announce/c/-hjNw559_tE/m/KlGTfid5CAAJ"
},
{
"tags": [
"x_transferred"
],
"url": "https://pkg.go.dev/vuln/GO-2022-1059"
}
],
"title": "CVE Program Container"
},
{
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
}
},
{
"other": {
"content": {
"id": "CVE-2022-32149",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "yes"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-05-15T20:34:55.435977Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2025-05-15T20:35:11.868Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"collectionURL": "https://pkg.go.dev",
"defaultStatus": "unaffected",
"packageName": "golang.org/x/text/language",
"product": "golang.org/x/text/language",
"programRoutines": [
{
"name": "ParseAcceptLanguage"
},
{
"name": "MatchStrings"
}
],
"vendor": "golang.org/x/text",
"versions": [
{
"lessThan": "0.3.8",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
}
],
"credits": [
{
"lang": "en",
"value": "Adam Korczynski (ADA Logics)"
},
{
"lang": "en",
"value": "OSS-Fuzz"
}
],
"descriptions": [
{
"lang": "en",
"value": "An attacker may cause a denial of service by crafting an Accept-Language header which ParseAcceptLanguage will take significant time to parse."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "CWE 400: Uncontrolled Resource Consumption",
"lang": "en"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2023-06-12T19:12:44.090Z",
"orgId": "1bb62c36-49e3-4200-9d77-64a1400537cc",
"shortName": "Go"
},
"references": [
{
"url": "https://go.dev/issue/56152"
},
{
"url": "https://go.dev/cl/442235"
},
{
"url": "https://groups.google.com/g/golang-announce/c/-hjNw559_tE/m/KlGTfid5CAAJ"
},
{
"url": "https://pkg.go.dev/vuln/GO-2022-1059"
}
],
"title": "Denial of service via crafted Accept-Language header in golang.org/x/text/language"
}
},
"cveMetadata": {
"assignerOrgId": "1bb62c36-49e3-4200-9d77-64a1400537cc",
"assignerShortName": "Go",
"cveId": "CVE-2022-32149",
"datePublished": "2022-10-14T00:00:00.000Z",
"dateReserved": "2022-05-31T00:00:00.000Z",
"dateUpdated": "2025-05-15T20:35:11.868Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"nvd": "{\"cve\":{\"id\":\"CVE-2022-32149\",\"sourceIdentifier\":\"security@golang.org\",\"published\":\"2022-10-14T15:15:34.543\",\"lastModified\":\"2025-05-15T21:15:47.820\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"An attacker may cause a denial of service by crafting an Accept-Language header which ParseAcceptLanguage will take significant time to parse.\"},{\"lang\":\"es\",\"value\":\"Un atacante podr\u00eda causar una denegaci\u00f3n de servicio al dise\u00f1ar un encabezado Accept-Language que ParseAcceptLanguage tardar\u00eda mucho tiempo en analizar\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H\",\"baseScore\":7.5,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":3.9,\"impactScore\":3.6},{\"source\":\"134c704f-9b21-4f2e-91b3-4a467353bcc0\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H\",\"baseScore\":7.5,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":3.9,\"impactScore\":3.6}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-772\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:golang:text:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"0.3.8\",\"matchCriteriaId\":\"B60E2667-B233-430C-8BD7-28CDFFB1469F\"}]}]}],\"references\":[{\"url\":\"https://go.dev/cl/442235\",\"source\":\"security@golang.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://go.dev/issue/56152\",\"source\":\"security@golang.org\",\"tags\":[\"Issue Tracking\",\"Third Party Advisory\"]},{\"url\":\"https://groups.google.com/g/golang-announce/c/-hjNw559_tE/m/KlGTfid5CAAJ\",\"source\":\"security@golang.org\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://pkg.go.dev/vuln/GO-2022-1059\",\"source\":\"security@golang.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://go.dev/cl/442235\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://go.dev/issue/56152\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Issue Tracking\",\"Third Party Advisory\"]},{\"url\":\"https://groups.google.com/g/golang-announce/c/-hjNw559_tE/m/KlGTfid5CAAJ\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://pkg.go.dev/vuln/GO-2022-1059\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://security.netapp.com/advisory/ntap-20230203-0006/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}]}}",
"vulnrichment": {
"containers": "{\"cna\": {\"providerMetadata\": {\"orgId\": \"1bb62c36-49e3-4200-9d77-64a1400537cc\", \"shortName\": \"Go\", \"dateUpdated\": \"2023-06-12T19:12:44.090Z\"}, \"title\": \"Denial of service via crafted Accept-Language header in golang.org/x/text/language\", \"descriptions\": [{\"lang\": \"en\", \"value\": \"An attacker may cause a denial of service by crafting an Accept-Language header which ParseAcceptLanguage will take significant time to parse.\"}], \"affected\": [{\"vendor\": \"golang.org/x/text\", \"product\": \"golang.org/x/text/language\", \"collectionURL\": \"https://pkg.go.dev\", \"packageName\": \"golang.org/x/text/language\", \"versions\": [{\"version\": \"0\", \"lessThan\": \"0.3.8\", \"status\": \"affected\", \"versionType\": \"semver\"}], \"programRoutines\": [{\"name\": \"ParseAcceptLanguage\"}, {\"name\": \"MatchStrings\"}], \"defaultStatus\": \"unaffected\"}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"description\": \"CWE 400: Uncontrolled Resource Consumption\"}]}], \"references\": [{\"url\": \"https://go.dev/issue/56152\"}, {\"url\": \"https://go.dev/cl/442235\"}, {\"url\": \"https://groups.google.com/g/golang-announce/c/-hjNw559_tE/m/KlGTfid5CAAJ\"}, {\"url\": \"https://pkg.go.dev/vuln/GO-2022-1059\"}], \"credits\": [{\"lang\": \"en\", \"value\": \"Adam Korczynski (ADA Logics)\"}, {\"lang\": \"en\", \"value\": \"OSS-Fuzz\"}]}, \"adp\": [{\"title\": \"CVE Program Container\", \"references\": [{\"url\": \"https://security.netapp.com/advisory/ntap-20230203-0006/\"}, {\"url\": \"https://go.dev/issue/56152\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://go.dev/cl/442235\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://groups.google.com/g/golang-announce/c/-hjNw559_tE/m/KlGTfid5CAAJ\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://pkg.go.dev/vuln/GO-2022-1059\", \"tags\": [\"x_transferred\"]}], \"providerMetadata\": {\"orgId\": \"af854a3a-2127-422b-91ae-364da2661108\", \"shortName\": \"CVE\", \"dateUpdated\": \"2024-08-03T07:32:56.022Z\"}}, {\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"cvssV3_1\": {\"scope\": \"UNCHANGED\", \"version\": \"3.1\", \"baseScore\": 7.5, \"attackVector\": \"NETWORK\", \"baseSeverity\": \"HIGH\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H\", \"integrityImpact\": \"NONE\", \"userInteraction\": \"NONE\", \"attackComplexity\": \"LOW\", \"availabilityImpact\": \"HIGH\", \"privilegesRequired\": \"NONE\", \"confidentialityImpact\": \"NONE\"}}, {\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2022-32149\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"yes\"}, {\"Technical Impact\": \"partial\"}], \"version\": \"2.0.3\", \"timestamp\": \"2025-05-15T20:34:55.435977Z\"}}}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2025-05-15T20:35:08.249Z\"}}]}",
"cveMetadata": "{\"state\": \"PUBLISHED\", \"cveId\": \"CVE-2022-32149\", \"assignerOrgId\": \"1bb62c36-49e3-4200-9d77-64a1400537cc\", \"assignerShortName\": \"Go\", \"dateUpdated\": \"2025-05-15T20:35:11.868Z\", \"dateReserved\": \"2022-05-31T00:00:00.000Z\", \"datePublished\": \"2022-10-14T00:00:00.000Z\"}",
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
}
}
rhsa-2023_3205
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Red Hat OpenShift Virtualization release 4.13.0 is now available with updates to packages and images that fix several bugs and add enhancements.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "OpenShift Virtualization is Red Hat\u0027s virtualization solution designed for Red Hat OpenShift Container Platform.\n\nThis advisory contains OpenShift Virtualization 4.13.0 images.\n\nSecurity Fix(es):\n\n* golang: archive/tar: unbounded memory consumption when reading headers (CVE-2022-2879)\n\n* golang: net/http/httputil: ReverseProxy should not forward unparseable query parameters (CVE-2022-2880)\n\n* golang: net/http: handle server errors after sending GOAWAY (CVE-2022-27664)\n\n* golang: golang.org/x/text/language: ParseAcceptLanguage takes a long time to parse complex tags (CVE-2022-32149)\n\n* golang: net/url: JoinPath does not strip relative path components in all circumstances (CVE-2022-32190)\n\n* golang: regexp/syntax: limit memory used by parsing regexps (CVE-2022-41715)\n\n* golang: net/http: excessive memory growth in a Go server accepting HTTP/2 requests (CVE-2022-41717)\n\n* golang: math/big: decoding big.Float and big.Rat types can panic if the encoded message is too short, potentially allowing a denial of service (CVE-2022-32189)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nThis update also fixes several bugs and adds various enhancements. Documentation for these changes is available from the Release Notes document linked to in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2023:3205",
"url": "https://access.redhat.com/errata/RHSA-2023:3205"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#moderate",
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "2023393",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2023393"
},
{
"category": "external",
"summary": "2029391",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2029391"
},
{
"category": "external",
"summary": "2052556",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2052556"
},
{
"category": "external",
"summary": "2060499",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2060499"
},
{
"category": "external",
"summary": "2070132",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2070132"
},
{
"category": "external",
"summary": "2087540",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2087540"
},
{
"category": "external",
"summary": "2101390",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2101390"
},
{
"category": "external",
"summary": "2104424",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2104424"
},
{
"category": "external",
"summary": "2104479",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2104479"
},
{
"category": "external",
"summary": "2104859",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2104859"
},
{
"category": "external",
"summary": "2110562",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2110562"
},
{
"category": "external",
"summary": "2111794",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2111794"
},
{
"category": "external",
"summary": "2113814",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2113814"
},
{
"category": "external",
"summary": "2114922",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2114922"
},
{
"category": "external",
"summary": "2116562",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2116562"
},
{
"category": "external",
"summary": "2117803",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2117803"
},
{
"category": "external",
"summary": "2122119",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2122119"
},
{
"category": "external",
"summary": "2122168",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2122168"
},
{
"category": "external",
"summary": "2123209",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2123209"
},
{
"category": "external",
"summary": "2124668",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2124668"
},
{
"category": "external",
"summary": "2124669",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2124669"
},
{
"category": "external",
"summary": "2132867",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2132867"
},
{
"category": "external",
"summary": "2132868",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2132868"
},
{
"category": "external",
"summary": "2132872",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2132872"
},
{
"category": "external",
"summary": "2132873",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2132873"
},
{
"category": "external",
"summary": "2134010",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2134010"
},
{
"category": "external",
"summary": "2138199",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2138199"
},
{
"category": "external",
"summary": "2138653",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2138653"
},
{
"category": "external",
"summary": "2138664",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2138664"
},
{
"category": "external",
"summary": "2139235",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2139235"
},
{
"category": "external",
"summary": "2139257",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2139257"
},
{
"category": "external",
"summary": "2139260",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2139260"
},
{
"category": "external",
"summary": "2139293",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2139293"
},
{
"category": "external",
"summary": "2139296",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2139296"
},
{
"category": "external",
"summary": "2139299",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2139299"
},
{
"category": "external",
"summary": "2139306",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2139306"
},
{
"category": "external",
"summary": "2139479",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2139479"
},
{
"category": "external",
"summary": "2139574",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2139574"
},
{
"category": "external",
"summary": "2139651",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2139651"
},
{
"category": "external",
"summary": "2139687",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2139687"
},
{
"category": "external",
"summary": "2139820",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2139820"
},
{
"category": "external",
"summary": "2140730",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2140730"
},
{
"category": "external",
"summary": "2140977",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2140977"
},
{
"category": "external",
"summary": "2140982",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2140982"
},
{
"category": "external",
"summary": "2140998",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2140998"
},
{
"category": "external",
"summary": "2142511",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2142511"
},
{
"category": "external",
"summary": "2143039",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2143039"
},
{
"category": "external",
"summary": "2143498",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2143498"
},
{
"category": "external",
"summary": "2143716",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2143716"
},
{
"category": "external",
"summary": "2144580",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2144580"
},
{
"category": "external",
"summary": "2145092",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2145092"
},
{
"category": "external",
"summary": "2145126",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2145126"
},
{
"category": "external",
"summary": "2145137",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2145137"
},
{
"category": "external",
"summary": "2145223",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2145223"
},
{
"category": "external",
"summary": "2147582",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2147582"
},
{
"category": "external",
"summary": "2148322",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2148322"
},
{
"category": "external",
"summary": "2148849",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2148849"
},
{
"category": "external",
"summary": "2148850",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2148850"
},
{
"category": "external",
"summary": "2149118",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2149118"
},
{
"category": "external",
"summary": "2149201",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2149201"
},
{
"category": "external",
"summary": "2149227",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2149227"
},
{
"category": "external",
"summary": "2149897",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2149897"
},
{
"category": "external",
"summary": "2150364",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2150364"
},
{
"category": "external",
"summary": "2150653",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2150653"
},
{
"category": "external",
"summary": "2150832",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2150832"
},
{
"category": "external",
"summary": "2151053",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2151053"
},
{
"category": "external",
"summary": "2151056",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2151056"
},
{
"category": "external",
"summary": "2151427",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2151427"
},
{
"category": "external",
"summary": "2151508",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2151508"
},
{
"category": "external",
"summary": "2151521",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2151521"
},
{
"category": "external",
"summary": "2151759",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2151759"
},
{
"category": "external",
"summary": "2151766",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2151766"
},
{
"category": "external",
"summary": "2151831",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2151831"
},
{
"category": "external",
"summary": "2152122",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2152122"
},
{
"category": "external",
"summary": "2152534",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2152534"
},
{
"category": "external",
"summary": "2152537",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2152537"
},
{
"category": "external",
"summary": "2155403",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2155403"
},
{
"category": "external",
"summary": "2155409",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2155409"
},
{
"category": "external",
"summary": "2155796",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2155796"
},
{
"category": "external",
"summary": "2156392",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2156392"
},
{
"category": "external",
"summary": "2156902",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2156902"
},
{
"category": "external",
"summary": "2158060",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2158060"
},
{
"category": "external",
"summary": "2158079",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2158079"
},
{
"category": "external",
"summary": "2158362",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2158362"
},
{
"category": "external",
"summary": "2158424",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2158424"
},
{
"category": "external",
"summary": "2158515",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2158515"
},
{
"category": "external",
"summary": "2159715",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2159715"
},
{
"category": "external",
"summary": "2159975",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2159975"
},
{
"category": "external",
"summary": "2160298",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2160298"
},
{
"category": "external",
"summary": "2161274",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2161274"
},
{
"category": "external",
"summary": "2161340",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2161340"
},
{
"category": "external",
"summary": "2162016",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2162016"
},
{
"category": "external",
"summary": "2162333",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2162333"
},
{
"category": "external",
"summary": "2163460",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2163460"
},
{
"category": "external",
"summary": "2164590",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2164590"
},
{
"category": "external",
"summary": "2164807",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2164807"
},
{
"category": "external",
"summary": "2164814",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2164814"
},
{
"category": "external",
"summary": "2164838",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2164838"
},
{
"category": "external",
"summary": "2165618",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2165618"
},
{
"category": "external",
"summary": "2165943",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2165943"
},
{
"category": "external",
"summary": "2166165",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2166165"
},
{
"category": "external",
"summary": "2166394",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2166394"
},
{
"category": "external",
"summary": "2166507",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2166507"
},
{
"category": "external",
"summary": "2166508",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2166508"
},
{
"category": "external",
"summary": "2166512",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2166512"
},
{
"category": "external",
"summary": "2167012",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2167012"
},
{
"category": "external",
"summary": "2167226",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2167226"
},
{
"category": "external",
"summary": "2167251",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2167251"
},
{
"category": "external",
"summary": "2167661",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2167661"
},
{
"category": "external",
"summary": "2167979",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2167979"
},
{
"category": "external",
"summary": "2168032",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2168032"
},
{
"category": "external",
"summary": "2168111",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2168111"
},
{
"category": "external",
"summary": "2168165",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2168165"
},
{
"category": "external",
"summary": "2168180",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2168180"
},
{
"category": "external",
"summary": "2168480",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2168480"
},
{
"category": "external",
"summary": "2168484",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2168484"
},
{
"category": "external",
"summary": "2168486",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2168486"
},
{
"category": "external",
"summary": "2168488",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2168488"
},
{
"category": "external",
"summary": "2168561",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2168561"
},
{
"category": "external",
"summary": "2168770",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2168770"
},
{
"category": "external",
"summary": "2168859",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2168859"
},
{
"category": "external",
"summary": "2168861",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2168861"
},
{
"category": "external",
"summary": "2169699",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2169699"
},
{
"category": "external",
"summary": "2169880",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2169880"
},
{
"category": "external",
"summary": "2170703",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2170703"
},
{
"category": "external",
"summary": "2170740",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2170740"
},
{
"category": "external",
"summary": "2171395",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2171395"
},
{
"category": "external",
"summary": "2172371",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2172371"
},
{
"category": "external",
"summary": "2172375",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2172375"
},
{
"category": "external",
"summary": "2172612",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2172612"
},
{
"category": "external",
"summary": "2172842",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2172842"
},
{
"category": "external",
"summary": "2172952",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2172952"
},
{
"category": "external",
"summary": "2173527",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2173527"
},
{
"category": "external",
"summary": "2173562",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2173562"
},
{
"category": "external",
"summary": "2173563",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2173563"
},
{
"category": "external",
"summary": "2173593",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2173593"
},
{
"category": "external",
"summary": "2173595",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2173595"
},
{
"category": "external",
"summary": "2174288",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2174288"
},
{
"category": "external",
"summary": "2174324",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2174324"
},
{
"category": "external",
"summary": "2174334",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2174334"
},
{
"category": "external",
"summary": "2174619",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2174619"
},
{
"category": "external",
"summary": "2174636",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2174636"
},
{
"category": "external",
"summary": "2174742",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2174742"
},
{
"category": "external",
"summary": "2175054",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2175054"
},
{
"category": "external",
"summary": "2175171",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2175171"
},
{
"category": "external",
"summary": "2175256",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2175256"
},
{
"category": "external",
"summary": "2175274",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2175274"
},
{
"category": "external",
"summary": "2175571",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2175571"
},
{
"category": "external",
"summary": "2175601",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2175601"
},
{
"category": "external",
"summary": "2175636",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2175636"
},
{
"category": "external",
"summary": "2175641",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2175641"
},
{
"category": "external",
"summary": "2175643",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2175643"
},
{
"category": "external",
"summary": "2175888",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2175888"
},
{
"category": "external",
"summary": "2175890",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2175890"
},
{
"category": "external",
"summary": "2175974",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2175974"
},
{
"category": "external",
"summary": "2175976",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2175976"
},
{
"category": "external",
"summary": "2175977",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2175977"
},
{
"category": "external",
"summary": "2175979",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2175979"
},
{
"category": "external",
"summary": "2175983",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2175983"
},
{
"category": "external",
"summary": "2175985",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2175985"
},
{
"category": "external",
"summary": "2175986",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2175986"
},
{
"category": "external",
"summary": "2175988",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2175988"
},
{
"category": "external",
"summary": "2176353",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2176353"
},
{
"category": "external",
"summary": "2176355",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2176355"
},
{
"category": "external",
"summary": "2176422",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2176422"
},
{
"category": "external",
"summary": "2176706",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2176706"
},
{
"category": "external",
"summary": "2176708",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2176708"
},
{
"category": "external",
"summary": "2176725",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2176725"
},
{
"category": "external",
"summary": "2176753",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2176753"
},
{
"category": "external",
"summary": "2176804",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2176804"
},
{
"category": "external",
"summary": "2176843",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2176843"
},
{
"category": "external",
"summary": "2177091",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2177091"
},
{
"category": "external",
"summary": "2177578",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2177578"
},
{
"category": "external",
"summary": "2177586",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2177586"
},
{
"category": "external",
"summary": "2177589",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2177589"
},
{
"category": "external",
"summary": "2177668",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2177668"
},
{
"category": "external",
"summary": "2177763",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2177763"
},
{
"category": "external",
"summary": "2177888",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2177888"
},
{
"category": "external",
"summary": "2177961",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2177961"
},
{
"category": "external",
"summary": "2177973",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2177973"
},
{
"category": "external",
"summary": "2178037",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2178037"
},
{
"category": "external",
"summary": "2178628",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2178628"
},
{
"category": "external",
"summary": "2178629",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2178629"
},
{
"category": "external",
"summary": "2179225",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2179225"
},
{
"category": "external",
"summary": "2179226",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2179226"
},
{
"category": "external",
"summary": "2179565",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2179565"
},
{
"category": "external",
"summary": "2179626",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2179626"
},
{
"category": "external",
"summary": "2179811",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2179811"
},
{
"category": "external",
"summary": "2180146",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2180146"
},
{
"category": "external",
"summary": "2180279",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2180279"
},
{
"category": "external",
"summary": "2180553",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2180553"
},
{
"category": "external",
"summary": "2180853",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2180853"
},
{
"category": "external",
"summary": "2182006",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2182006"
},
{
"category": "external",
"summary": "2182097",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2182097"
},
{
"category": "external",
"summary": "2182534",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2182534"
},
{
"category": "external",
"summary": "2182535",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2182535"
},
{
"category": "external",
"summary": "2182536",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2182536"
},
{
"category": "external",
"summary": "2182538",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2182538"
},
{
"category": "external",
"summary": "2182539",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2182539"
},
{
"category": "external",
"summary": "2182661",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2182661"
},
{
"category": "external",
"summary": "2183026",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2183026"
},
{
"category": "external",
"summary": "2183205",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2183205"
},
{
"category": "external",
"summary": "2183397",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2183397"
},
{
"category": "external",
"summary": "2183968",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2183968"
},
{
"category": "external",
"summary": "2186767",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2186767"
},
{
"category": "external",
"summary": "2187437",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2187437"
},
{
"category": "external",
"summary": "2187547",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2187547"
},
{
"category": "external",
"summary": "2187581",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2187581"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2023/rhsa-2023_3205.json"
}
],
"title": "Red Hat Security Advisory: OpenShift Virtualization 4.13.0 Images security, bug fix, and enhancement update",
"tracking": {
"current_release_date": "2025-01-06T19:26:33+00:00",
"generator": {
"date": "2025-01-06T19:26:33+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.5"
}
},
"id": "RHSA-2023:3205",
"initial_release_date": "2023-05-18T02:55:08+00:00",
"revision_history": [
{
"date": "2023-05-18T02:55:08+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2023-05-18T02:55:08+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-01-06T19:26:33+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "CNV 4.13 for RHEL 9",
"product": {
"name": "CNV 4.13 for RHEL 9",
"product_id": "9Base-CNV-4.13",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:container_native_virtualization:4.13::el9"
}
}
}
],
"category": "product_family",
"name": "OpenShift Virtualization"
},
{
"branches": [
{
"category": "product_version",
"name": "container-native-virtualization/bridge-marker-rhel9@sha256:8eac196b30a648989cdca5cb153a3bc3d34e47339acba0e4f760bd366496c99d_amd64",
"product": {
"name": "container-native-virtualization/bridge-marker-rhel9@sha256:8eac196b30a648989cdca5cb153a3bc3d34e47339acba0e4f760bd366496c99d_amd64",
"product_id": "container-native-virtualization/bridge-marker-rhel9@sha256:8eac196b30a648989cdca5cb153a3bc3d34e47339acba0e4f760bd366496c99d_amd64",
"product_identification_helper": {
"purl": "pkg:oci/bridge-marker-rhel9@sha256:8eac196b30a648989cdca5cb153a3bc3d34e47339acba0e4f760bd366496c99d?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/bridge-marker-rhel9\u0026tag=v4.13.0--2022-101182"
}
}
},
{
"category": "product_version",
"name": "container-native-virtualization/cluster-network-addons-operator-rhel9@sha256:3bff33e3f40cd1e2b519c2db56734d4bb8df883e155c2f20b1cb9d3d184daec1_amd64",
"product": {
"name": "container-native-virtualization/cluster-network-addons-operator-rhel9@sha256:3bff33e3f40cd1e2b519c2db56734d4bb8df883e155c2f20b1cb9d3d184daec1_amd64",
"product_id": "container-native-virtualization/cluster-network-addons-operator-rhel9@sha256:3bff33e3f40cd1e2b519c2db56734d4bb8df883e155c2f20b1cb9d3d184daec1_amd64",
"product_identification_helper": {
"purl": "pkg:oci/cluster-network-addons-operator-rhel9@sha256:3bff33e3f40cd1e2b519c2db56734d4bb8df883e155c2f20b1cb9d3d184daec1?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/cluster-network-addons-operator-rhel9\u0026tag=v4.13.0--2022-101182"
}
}
},
{
"category": "product_version",
"name": "container-native-virtualization/cnv-containernetworking-plugins-rhel9@sha256:bf471997e54e4a75b0d71f492ab295787fdbb14d8c85c4ea8c03f0552dbc3755_amd64",
"product": {
"name": "container-native-virtualization/cnv-containernetworking-plugins-rhel9@sha256:bf471997e54e4a75b0d71f492ab295787fdbb14d8c85c4ea8c03f0552dbc3755_amd64",
"product_id": "container-native-virtualization/cnv-containernetworking-plugins-rhel9@sha256:bf471997e54e4a75b0d71f492ab295787fdbb14d8c85c4ea8c03f0552dbc3755_amd64",
"product_identification_helper": {
"purl": "pkg:oci/cnv-containernetworking-plugins-rhel9@sha256:bf471997e54e4a75b0d71f492ab295787fdbb14d8c85c4ea8c03f0552dbc3755?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/cnv-containernetworking-plugins-rhel9\u0026tag=v4.13.0--2022-101182"
}
}
},
{
"category": "product_version",
"name": "container-native-virtualization/cnv-must-gather-rhel9@sha256:b9fc32b5fabedd65a4c3a471879c808af2087277de4278adaa115a732f0468da_amd64",
"product": {
"name": "container-native-virtualization/cnv-must-gather-rhel9@sha256:b9fc32b5fabedd65a4c3a471879c808af2087277de4278adaa115a732f0468da_amd64",
"product_id": "container-native-virtualization/cnv-must-gather-rhel9@sha256:b9fc32b5fabedd65a4c3a471879c808af2087277de4278adaa115a732f0468da_amd64",
"product_identification_helper": {
"purl": "pkg:oci/cnv-must-gather-rhel9@sha256:b9fc32b5fabedd65a4c3a471879c808af2087277de4278adaa115a732f0468da?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/cnv-must-gather-rhel9\u0026tag=v4.13.0--2022-101182"
}
}
},
{
"category": "product_version",
"name": "container-native-virtualization/hco-bundle-registry-rhel9@sha256:60e89d7a99ff9f20e974430b802dd724a3bb6fa1e01e5a62daad98ac487b3063_amd64",
"product": {
"name": "container-native-virtualization/hco-bundle-registry-rhel9@sha256:60e89d7a99ff9f20e974430b802dd724a3bb6fa1e01e5a62daad98ac487b3063_amd64",
"product_id": "container-native-virtualization/hco-bundle-registry-rhel9@sha256:60e89d7a99ff9f20e974430b802dd724a3bb6fa1e01e5a62daad98ac487b3063_amd64",
"product_identification_helper": {
"purl": "pkg:oci/hco-bundle-registry-rhel9@sha256:60e89d7a99ff9f20e974430b802dd724a3bb6fa1e01e5a62daad98ac487b3063?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/hco-bundle-registry-rhel9\u0026tag=v4.13.0.rhel9--2022-101182"
}
}
},
{
"category": "product_version",
"name": "container-native-virtualization/hostpath-csi-driver-rhel9@sha256:61e2824853d51347593ad909a5e546cd92e4216d6a1df5dffb50dd9cba277cce_amd64",
"product": {
"name": "container-native-virtualization/hostpath-csi-driver-rhel9@sha256:61e2824853d51347593ad909a5e546cd92e4216d6a1df5dffb50dd9cba277cce_amd64",
"product_id": "container-native-virtualization/hostpath-csi-driver-rhel9@sha256:61e2824853d51347593ad909a5e546cd92e4216d6a1df5dffb50dd9cba277cce_amd64",
"product_identification_helper": {
"purl": "pkg:oci/hostpath-csi-driver-rhel9@sha256:61e2824853d51347593ad909a5e546cd92e4216d6a1df5dffb50dd9cba277cce?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/hostpath-csi-driver-rhel9\u0026tag=v4.13.0--2022-101182"
}
}
},
{
"category": "product_version",
"name": "container-native-virtualization/hostpath-provisioner-operator-rhel9@sha256:515be94be496c67f5b8fd5f4832fe4385e56476e6589897d6b9fbb9bb2b00f32_amd64",
"product": {
"name": "container-native-virtualization/hostpath-provisioner-operator-rhel9@sha256:515be94be496c67f5b8fd5f4832fe4385e56476e6589897d6b9fbb9bb2b00f32_amd64",
"product_id": "container-native-virtualization/hostpath-provisioner-operator-rhel9@sha256:515be94be496c67f5b8fd5f4832fe4385e56476e6589897d6b9fbb9bb2b00f32_amd64",
"product_identification_helper": {
"purl": "pkg:oci/hostpath-provisioner-operator-rhel9@sha256:515be94be496c67f5b8fd5f4832fe4385e56476e6589897d6b9fbb9bb2b00f32?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/hostpath-provisioner-operator-rhel9\u0026tag=v4.13.0-37"
}
}
},
{
"category": "product_version",
"name": "container-native-virtualization/hostpath-provisioner-rhel9@sha256:ac3fe350bedd6bc43596444ba0f279ccf8a144ab14ac5a9b80ea71c46390b7b4_amd64",
"product": {
"name": "container-native-virtualization/hostpath-provisioner-rhel9@sha256:ac3fe350bedd6bc43596444ba0f279ccf8a144ab14ac5a9b80ea71c46390b7b4_amd64",
"product_id": "container-native-virtualization/hostpath-provisioner-rhel9@sha256:ac3fe350bedd6bc43596444ba0f279ccf8a144ab14ac5a9b80ea71c46390b7b4_amd64",
"product_identification_helper": {
"purl": "pkg:oci/hostpath-provisioner-rhel9@sha256:ac3fe350bedd6bc43596444ba0f279ccf8a144ab14ac5a9b80ea71c46390b7b4?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/hostpath-provisioner-rhel9\u0026tag=v4.13.0--2022-101182"
}
}
},
{
"category": "product_version",
"name": "container-native-virtualization/hyperconverged-cluster-operator-rhel9@sha256:e5ab9f3be59d3568e3d672ab374efb16990ccf92192eac4e1244b10fcd7423e2_amd64",
"product": {
"name": "container-native-virtualization/hyperconverged-cluster-operator-rhel9@sha256:e5ab9f3be59d3568e3d672ab374efb16990ccf92192eac4e1244b10fcd7423e2_amd64",
"product_id": "container-native-virtualization/hyperconverged-cluster-operator-rhel9@sha256:e5ab9f3be59d3568e3d672ab374efb16990ccf92192eac4e1244b10fcd7423e2_amd64",
"product_identification_helper": {
"purl": "pkg:oci/hyperconverged-cluster-operator-rhel9@sha256:e5ab9f3be59d3568e3d672ab374efb16990ccf92192eac4e1244b10fcd7423e2?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/hyperconverged-cluster-operator-rhel9\u0026tag=v4.13.0--2022-101182"
}
}
},
{
"category": "product_version",
"name": "container-native-virtualization/hyperconverged-cluster-webhook-rhel9@sha256:b5a01336180aad017df62cf8e652f2491b8263ba7e4dd07f858db1ef1924cf2f_amd64",
"product": {
"name": "container-native-virtualization/hyperconverged-cluster-webhook-rhel9@sha256:b5a01336180aad017df62cf8e652f2491b8263ba7e4dd07f858db1ef1924cf2f_amd64",
"product_id": "container-native-virtualization/hyperconverged-cluster-webhook-rhel9@sha256:b5a01336180aad017df62cf8e652f2491b8263ba7e4dd07f858db1ef1924cf2f_amd64",
"product_identification_helper": {
"purl": "pkg:oci/hyperconverged-cluster-webhook-rhel9@sha256:b5a01336180aad017df62cf8e652f2491b8263ba7e4dd07f858db1ef1924cf2f?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/hyperconverged-cluster-webhook-rhel9\u0026tag=v4.13.0--2022-101182"
}
}
},
{
"category": "product_version",
"name": "container-native-virtualization/kubemacpool-rhel9@sha256:4d190d81eeb3fbe9ed56cf3548dc83a3f81641bfdafa7b42dcfb0d2512566644_amd64",
"product": {
"name": "container-native-virtualization/kubemacpool-rhel9@sha256:4d190d81eeb3fbe9ed56cf3548dc83a3f81641bfdafa7b42dcfb0d2512566644_amd64",
"product_id": "container-native-virtualization/kubemacpool-rhel9@sha256:4d190d81eeb3fbe9ed56cf3548dc83a3f81641bfdafa7b42dcfb0d2512566644_amd64",
"product_identification_helper": {
"purl": "pkg:oci/kubemacpool-rhel9@sha256:4d190d81eeb3fbe9ed56cf3548dc83a3f81641bfdafa7b42dcfb0d2512566644?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/kubemacpool-rhel9\u0026tag=v4.13.0--2022-101182"
}
}
},
{
"category": "product_version",
"name": "container-native-virtualization/kubesecondarydns-rhel9@sha256:121d30d78cc57731ea2242ef2c32430890ac66c2723e65608d5e2f26c3f515cd_amd64",
"product": {
"name": "container-native-virtualization/kubesecondarydns-rhel9@sha256:121d30d78cc57731ea2242ef2c32430890ac66c2723e65608d5e2f26c3f515cd_amd64",
"product_id": "container-native-virtualization/kubesecondarydns-rhel9@sha256:121d30d78cc57731ea2242ef2c32430890ac66c2723e65608d5e2f26c3f515cd_amd64",
"product_identification_helper": {
"purl": "pkg:oci/kubesecondarydns-rhel9@sha256:121d30d78cc57731ea2242ef2c32430890ac66c2723e65608d5e2f26c3f515cd?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/kubesecondarydns-rhel9\u0026tag=v4.13.0--2022-101182"
}
}
},
{
"category": "product_version",
"name": "container-native-virtualization/kubevirt-console-plugin-rhel9@sha256:86a4b1e3d6ad1d56302c9c058f8bc5826dcfe6c46fb3e0ddaa06818645039020_amd64",
"product": {
"name": "container-native-virtualization/kubevirt-console-plugin-rhel9@sha256:86a4b1e3d6ad1d56302c9c058f8bc5826dcfe6c46fb3e0ddaa06818645039020_amd64",
"product_id": "container-native-virtualization/kubevirt-console-plugin-rhel9@sha256:86a4b1e3d6ad1d56302c9c058f8bc5826dcfe6c46fb3e0ddaa06818645039020_amd64",
"product_identification_helper": {
"purl": "pkg:oci/kubevirt-console-plugin-rhel9@sha256:86a4b1e3d6ad1d56302c9c058f8bc5826dcfe6c46fb3e0ddaa06818645039020?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/kubevirt-console-plugin-rhel9\u0026tag=v4.13.0--2022-101182"
}
}
},
{
"category": "product_version",
"name": "container-native-virtualization/kubevirt-dpdk-checkup-rhel9@sha256:553c4686f56c66cc1e3c5ad9d4051f139d43f821eac3abb98ca5cdb8b5dfe202_amd64",
"product": {
"name": "container-native-virtualization/kubevirt-dpdk-checkup-rhel9@sha256:553c4686f56c66cc1e3c5ad9d4051f139d43f821eac3abb98ca5cdb8b5dfe202_amd64",
"product_id": "container-native-virtualization/kubevirt-dpdk-checkup-rhel9@sha256:553c4686f56c66cc1e3c5ad9d4051f139d43f821eac3abb98ca5cdb8b5dfe202_amd64",
"product_identification_helper": {
"purl": "pkg:oci/kubevirt-dpdk-checkup-rhel9@sha256:553c4686f56c66cc1e3c5ad9d4051f139d43f821eac3abb98ca5cdb8b5dfe202?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/kubevirt-dpdk-checkup-rhel9\u0026tag=v4.13.0--2022-101182"
}
}
},
{
"category": "product_version",
"name": "container-native-virtualization/kubevirt-ssp-operator-rhel9@sha256:901e6cad9534c7bd7c4018c60bccfe49d7280fba5a9901ab4c4d15e9345288c4_amd64",
"product": {
"name": "container-native-virtualization/kubevirt-ssp-operator-rhel9@sha256:901e6cad9534c7bd7c4018c60bccfe49d7280fba5a9901ab4c4d15e9345288c4_amd64",
"product_id": "container-native-virtualization/kubevirt-ssp-operator-rhel9@sha256:901e6cad9534c7bd7c4018c60bccfe49d7280fba5a9901ab4c4d15e9345288c4_amd64",
"product_identification_helper": {
"purl": "pkg:oci/kubevirt-ssp-operator-rhel9@sha256:901e6cad9534c7bd7c4018c60bccfe49d7280fba5a9901ab4c4d15e9345288c4?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/kubevirt-ssp-operator-rhel9\u0026tag=v4.13.0--2022-101182"
}
}
},
{
"category": "product_version",
"name": "container-native-virtualization/kubevirt-tekton-tasks-cleanup-vm-rhel9@sha256:28e4975fa4dac22d9da32ed2a10aed039fd957b30140daa36bab2caa998be77a_amd64",
"product": {
"name": "container-native-virtualization/kubevirt-tekton-tasks-cleanup-vm-rhel9@sha256:28e4975fa4dac22d9da32ed2a10aed039fd957b30140daa36bab2caa998be77a_amd64",
"product_id": "container-native-virtualization/kubevirt-tekton-tasks-cleanup-vm-rhel9@sha256:28e4975fa4dac22d9da32ed2a10aed039fd957b30140daa36bab2caa998be77a_amd64",
"product_identification_helper": {
"purl": "pkg:oci/kubevirt-tekton-tasks-cleanup-vm-rhel9@sha256:28e4975fa4dac22d9da32ed2a10aed039fd957b30140daa36bab2caa998be77a?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/kubevirt-tekton-tasks-cleanup-vm-rhel9\u0026tag=v4.13.0--2022-101182"
}
}
},
{
"category": "product_version",
"name": "container-native-virtualization/kubevirt-tekton-tasks-copy-template-rhel9@sha256:f71c36442f1b61cdde7ec58d2c3c78d2039f6d6108e6c35388ef7c1650971fa1_amd64",
"product": {
"name": "container-native-virtualization/kubevirt-tekton-tasks-copy-template-rhel9@sha256:f71c36442f1b61cdde7ec58d2c3c78d2039f6d6108e6c35388ef7c1650971fa1_amd64",
"product_id": "container-native-virtualization/kubevirt-tekton-tasks-copy-template-rhel9@sha256:f71c36442f1b61cdde7ec58d2c3c78d2039f6d6108e6c35388ef7c1650971fa1_amd64",
"product_identification_helper": {
"purl": "pkg:oci/kubevirt-tekton-tasks-copy-template-rhel9@sha256:f71c36442f1b61cdde7ec58d2c3c78d2039f6d6108e6c35388ef7c1650971fa1?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/kubevirt-tekton-tasks-copy-template-rhel9\u0026tag=v4.13.0--2022-101182"
}
}
},
{
"category": "product_version",
"name": "container-native-virtualization/kubevirt-tekton-tasks-create-datavolume-rhel9@sha256:2ad49cf6e2242a9e5861929d9bcab1305a7fc4e34e708f99cff1d7253aa46167_amd64",
"product": {
"name": "container-native-virtualization/kubevirt-tekton-tasks-create-datavolume-rhel9@sha256:2ad49cf6e2242a9e5861929d9bcab1305a7fc4e34e708f99cff1d7253aa46167_amd64",
"product_id": "container-native-virtualization/kubevirt-tekton-tasks-create-datavolume-rhel9@sha256:2ad49cf6e2242a9e5861929d9bcab1305a7fc4e34e708f99cff1d7253aa46167_amd64",
"product_identification_helper": {
"purl": "pkg:oci/kubevirt-tekton-tasks-create-datavolume-rhel9@sha256:2ad49cf6e2242a9e5861929d9bcab1305a7fc4e34e708f99cff1d7253aa46167?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/kubevirt-tekton-tasks-create-datavolume-rhel9\u0026tag=v4.13.0--2022-101182"
}
}
},
{
"category": "product_version",
"name": "container-native-virtualization/kubevirt-tekton-tasks-create-vm-from-template-rhel9@sha256:1411c65bbad7302710788327f6964a4bf5bc20ef70d5e46f4a5c6e7a0e7a0161_amd64",
"product": {
"name": "container-native-virtualization/kubevirt-tekton-tasks-create-vm-from-template-rhel9@sha256:1411c65bbad7302710788327f6964a4bf5bc20ef70d5e46f4a5c6e7a0e7a0161_amd64",
"product_id": "container-native-virtualization/kubevirt-tekton-tasks-create-vm-from-template-rhel9@sha256:1411c65bbad7302710788327f6964a4bf5bc20ef70d5e46f4a5c6e7a0e7a0161_amd64",
"product_identification_helper": {
"purl": "pkg:oci/kubevirt-tekton-tasks-create-vm-from-template-rhel9@sha256:1411c65bbad7302710788327f6964a4bf5bc20ef70d5e46f4a5c6e7a0e7a0161?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/kubevirt-tekton-tasks-create-vm-from-template-rhel9\u0026tag=v4.13.0--2022-101182"
}
}
},
{
"category": "product_version",
"name": "container-native-virtualization/kubevirt-tekton-tasks-disk-virt-customize-rhel9@sha256:5c23d3f20ea9dcbe7109284d73078ecd516a070e964b844f8d80b1d92ebd55ee_amd64",
"product": {
"name": "container-native-virtualization/kubevirt-tekton-tasks-disk-virt-customize-rhel9@sha256:5c23d3f20ea9dcbe7109284d73078ecd516a070e964b844f8d80b1d92ebd55ee_amd64",
"product_id": "container-native-virtualization/kubevirt-tekton-tasks-disk-virt-customize-rhel9@sha256:5c23d3f20ea9dcbe7109284d73078ecd516a070e964b844f8d80b1d92ebd55ee_amd64",
"product_identification_helper": {
"purl": "pkg:oci/kubevirt-tekton-tasks-disk-virt-customize-rhel9@sha256:5c23d3f20ea9dcbe7109284d73078ecd516a070e964b844f8d80b1d92ebd55ee?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/kubevirt-tekton-tasks-disk-virt-customize-rhel9\u0026tag=v4.13.0--2022-101182"
}
}
},
{
"category": "product_version",
"name": "container-native-virtualization/kubevirt-tekton-tasks-disk-virt-sysprep-rhel9@sha256:aed630a597a090179e1b0e0c117e536df06b67d0f793f91936aa7388c0c5d7eb_amd64",
"product": {
"name": "container-native-virtualization/kubevirt-tekton-tasks-disk-virt-sysprep-rhel9@sha256:aed630a597a090179e1b0e0c117e536df06b67d0f793f91936aa7388c0c5d7eb_amd64",
"product_id": "container-native-virtualization/kubevirt-tekton-tasks-disk-virt-sysprep-rhel9@sha256:aed630a597a090179e1b0e0c117e536df06b67d0f793f91936aa7388c0c5d7eb_amd64",
"product_identification_helper": {
"purl": "pkg:oci/kubevirt-tekton-tasks-disk-virt-sysprep-rhel9@sha256:aed630a597a090179e1b0e0c117e536df06b67d0f793f91936aa7388c0c5d7eb?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/kubevirt-tekton-tasks-disk-virt-sysprep-rhel9\u0026tag=v4.13.0--2022-101182"
}
}
},
{
"category": "product_version",
"name": "container-native-virtualization/kubevirt-tekton-tasks-modify-vm-template-rhel9@sha256:66aea526bc10e4c0136ba86e394bbdfe4fbd7f757d6f391a561b51d2ba2f4d46_amd64",
"product": {
"name": "container-native-virtualization/kubevirt-tekton-tasks-modify-vm-template-rhel9@sha256:66aea526bc10e4c0136ba86e394bbdfe4fbd7f757d6f391a561b51d2ba2f4d46_amd64",
"product_id": "container-native-virtualization/kubevirt-tekton-tasks-modify-vm-template-rhel9@sha256:66aea526bc10e4c0136ba86e394bbdfe4fbd7f757d6f391a561b51d2ba2f4d46_amd64",
"product_identification_helper": {
"purl": "pkg:oci/kubevirt-tekton-tasks-modify-vm-template-rhel9@sha256:66aea526bc10e4c0136ba86e394bbdfe4fbd7f757d6f391a561b51d2ba2f4d46?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/kubevirt-tekton-tasks-modify-vm-template-rhel9\u0026tag=v4.13.0--2022-101182"
}
}
},
{
"category": "product_version",
"name": "container-native-virtualization/kubevirt-tekton-tasks-operator-rhel9@sha256:f1b1f5044db6bb945584f9d4f31d020597725a286ef368ed0aca2116abb31beb_amd64",
"product": {
"name": "container-native-virtualization/kubevirt-tekton-tasks-operator-rhel9@sha256:f1b1f5044db6bb945584f9d4f31d020597725a286ef368ed0aca2116abb31beb_amd64",
"product_id": "container-native-virtualization/kubevirt-tekton-tasks-operator-rhel9@sha256:f1b1f5044db6bb945584f9d4f31d020597725a286ef368ed0aca2116abb31beb_amd64",
"product_identification_helper": {
"purl": "pkg:oci/kubevirt-tekton-tasks-operator-rhel9@sha256:f1b1f5044db6bb945584f9d4f31d020597725a286ef368ed0aca2116abb31beb?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/kubevirt-tekton-tasks-operator-rhel9\u0026tag=v4.13.0--2022-101182"
}
}
},
{
"category": "product_version",
"name": "container-native-virtualization/kubevirt-tekton-tasks-wait-for-vmi-status-rhel9@sha256:39a15d03f113735df03b1a7408227eb9604d942c1f3c1992bcdc7eaf07662711_amd64",
"product": {
"name": "container-native-virtualization/kubevirt-tekton-tasks-wait-for-vmi-status-rhel9@sha256:39a15d03f113735df03b1a7408227eb9604d942c1f3c1992bcdc7eaf07662711_amd64",
"product_id": "container-native-virtualization/kubevirt-tekton-tasks-wait-for-vmi-status-rhel9@sha256:39a15d03f113735df03b1a7408227eb9604d942c1f3c1992bcdc7eaf07662711_amd64",
"product_identification_helper": {
"purl": "pkg:oci/kubevirt-tekton-tasks-wait-for-vmi-status-rhel9@sha256:39a15d03f113735df03b1a7408227eb9604d942c1f3c1992bcdc7eaf07662711?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/kubevirt-tekton-tasks-wait-for-vmi-status-rhel9\u0026tag=v4.13.0--2022-101182"
}
}
},
{
"category": "product_version",
"name": "container-native-virtualization/kubevirt-template-validator-rhel9@sha256:c0264b9271e602f85b2040ef7f207cdfa46038dc4fa6e4738bf196ef88a71cf8_amd64",
"product": {
"name": "container-native-virtualization/kubevirt-template-validator-rhel9@sha256:c0264b9271e602f85b2040ef7f207cdfa46038dc4fa6e4738bf196ef88a71cf8_amd64",
"product_id": "container-native-virtualization/kubevirt-template-validator-rhel9@sha256:c0264b9271e602f85b2040ef7f207cdfa46038dc4fa6e4738bf196ef88a71cf8_amd64",
"product_identification_helper": {
"purl": "pkg:oci/kubevirt-template-validator-rhel9@sha256:c0264b9271e602f85b2040ef7f207cdfa46038dc4fa6e4738bf196ef88a71cf8?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/kubevirt-template-validator-rhel9\u0026tag=v4.13.0--2022-101182"
}
}
},
{
"category": "product_version",
"name": "container-native-virtualization/libguestfs-tools-rhel9@sha256:29ae84575bbca24553cf649256759fd96ff286971d80bc2db129154a7df9b283_amd64",
"product": {
"name": "container-native-virtualization/libguestfs-tools-rhel9@sha256:29ae84575bbca24553cf649256759fd96ff286971d80bc2db129154a7df9b283_amd64",
"product_id": "container-native-virtualization/libguestfs-tools-rhel9@sha256:29ae84575bbca24553cf649256759fd96ff286971d80bc2db129154a7df9b283_amd64",
"product_identification_helper": {
"purl": "pkg:oci/libguestfs-tools-rhel9@sha256:29ae84575bbca24553cf649256759fd96ff286971d80bc2db129154a7df9b283?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/libguestfs-tools-rhel9\u0026tag=v4.13.0--2022-101182"
}
}
},
{
"category": "product_version",
"name": "container-native-virtualization/multus-dynamic-networks-rhel9@sha256:b7f68b6420009e21380d32d6459193aae45e93be9533debe17cb3108571b36b8_amd64",
"product": {
"name": "container-native-virtualization/multus-dynamic-networks-rhel9@sha256:b7f68b6420009e21380d32d6459193aae45e93be9533debe17cb3108571b36b8_amd64",
"product_id": "container-native-virtualization/multus-dynamic-networks-rhel9@sha256:b7f68b6420009e21380d32d6459193aae45e93be9533debe17cb3108571b36b8_amd64",
"product_identification_helper": {
"purl": "pkg:oci/multus-dynamic-networks-rhel9@sha256:b7f68b6420009e21380d32d6459193aae45e93be9533debe17cb3108571b36b8?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/multus-dynamic-networks-rhel9\u0026tag=v4.13.0-37"
}
}
},
{
"category": "product_version",
"name": "container-native-virtualization/ovs-cni-plugin-rhel9@sha256:e8e7a44edbf1713fe74de5c4b8f691cce78f4440c4a32a16ba9ad16694a55396_amd64",
"product": {
"name": "container-native-virtualization/ovs-cni-plugin-rhel9@sha256:e8e7a44edbf1713fe74de5c4b8f691cce78f4440c4a32a16ba9ad16694a55396_amd64",
"product_id": "container-native-virtualization/ovs-cni-plugin-rhel9@sha256:e8e7a44edbf1713fe74de5c4b8f691cce78f4440c4a32a16ba9ad16694a55396_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ovs-cni-plugin-rhel9@sha256:e8e7a44edbf1713fe74de5c4b8f691cce78f4440c4a32a16ba9ad16694a55396?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/ovs-cni-plugin-rhel9\u0026tag=v4.13.0--2022-101182"
}
}
},
{
"category": "product_version",
"name": "container-native-virtualization/virt-api-rhel9@sha256:fdb4ca1bb8b310d713d9c7e88f7d091f4460aa942dbeca5ebcf17281a06daffe_amd64",
"product": {
"name": "container-native-virtualization/virt-api-rhel9@sha256:fdb4ca1bb8b310d713d9c7e88f7d091f4460aa942dbeca5ebcf17281a06daffe_amd64",
"product_id": "container-native-virtualization/virt-api-rhel9@sha256:fdb4ca1bb8b310d713d9c7e88f7d091f4460aa942dbeca5ebcf17281a06daffe_amd64",
"product_identification_helper": {
"purl": "pkg:oci/virt-api-rhel9@sha256:fdb4ca1bb8b310d713d9c7e88f7d091f4460aa942dbeca5ebcf17281a06daffe?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/virt-api-rhel9\u0026tag=v4.13.0--2022-101182"
}
}
},
{
"category": "product_version",
"name": "container-native-virtualization/virt-artifacts-server-rhel9@sha256:81fc61b714baecb5a89fa6c0749c14566e0661b8e184ca602fc2e03b9cf431ee_amd64",
"product": {
"name": "container-native-virtualization/virt-artifacts-server-rhel9@sha256:81fc61b714baecb5a89fa6c0749c14566e0661b8e184ca602fc2e03b9cf431ee_amd64",
"product_id": "container-native-virtualization/virt-artifacts-server-rhel9@sha256:81fc61b714baecb5a89fa6c0749c14566e0661b8e184ca602fc2e03b9cf431ee_amd64",
"product_identification_helper": {
"purl": "pkg:oci/virt-artifacts-server-rhel9@sha256:81fc61b714baecb5a89fa6c0749c14566e0661b8e184ca602fc2e03b9cf431ee?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/virt-artifacts-server-rhel9\u0026tag=v4.13.0--2022-101182"
}
}
},
{
"category": "product_version",
"name": "container-native-virtualization/virt-cdi-apiserver-rhel9@sha256:feca273a691d09445c6cff6d36b5d590735e867656a9898ce0d89744d98e8006_amd64",
"product": {
"name": "container-native-virtualization/virt-cdi-apiserver-rhel9@sha256:feca273a691d09445c6cff6d36b5d590735e867656a9898ce0d89744d98e8006_amd64",
"product_id": "container-native-virtualization/virt-cdi-apiserver-rhel9@sha256:feca273a691d09445c6cff6d36b5d590735e867656a9898ce0d89744d98e8006_amd64",
"product_identification_helper": {
"purl": "pkg:oci/virt-cdi-apiserver-rhel9@sha256:feca273a691d09445c6cff6d36b5d590735e867656a9898ce0d89744d98e8006?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/virt-cdi-apiserver-rhel9\u0026tag=v4.13.0--2022-101182"
}
}
},
{
"category": "product_version",
"name": "container-native-virtualization/virt-cdi-cloner-rhel9@sha256:68e3b9b0291b4fb277ac430269ffce11d13b0a7688cf2ffcdb7f98759c36b4db_amd64",
"product": {
"name": "container-native-virtualization/virt-cdi-cloner-rhel9@sha256:68e3b9b0291b4fb277ac430269ffce11d13b0a7688cf2ffcdb7f98759c36b4db_amd64",
"product_id": "container-native-virtualization/virt-cdi-cloner-rhel9@sha256:68e3b9b0291b4fb277ac430269ffce11d13b0a7688cf2ffcdb7f98759c36b4db_amd64",
"product_identification_helper": {
"purl": "pkg:oci/virt-cdi-cloner-rhel9@sha256:68e3b9b0291b4fb277ac430269ffce11d13b0a7688cf2ffcdb7f98759c36b4db?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/virt-cdi-cloner-rhel9\u0026tag=v4.13.0--2022-101182"
}
}
},
{
"category": "product_version",
"name": "container-native-virtualization/virt-cdi-controller-rhel9@sha256:d9e62b2019328be258489ac852eef25f8b1233f29abac6bcea5b406329f97fed_amd64",
"product": {
"name": "container-native-virtualization/virt-cdi-controller-rhel9@sha256:d9e62b2019328be258489ac852eef25f8b1233f29abac6bcea5b406329f97fed_amd64",
"product_id": "container-native-virtualization/virt-cdi-controller-rhel9@sha256:d9e62b2019328be258489ac852eef25f8b1233f29abac6bcea5b406329f97fed_amd64",
"product_identification_helper": {
"purl": "pkg:oci/virt-cdi-controller-rhel9@sha256:d9e62b2019328be258489ac852eef25f8b1233f29abac6bcea5b406329f97fed?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/virt-cdi-controller-rhel9\u0026tag=v4.13.0--2022-101182"
}
}
},
{
"category": "product_version",
"name": "container-native-virtualization/virt-cdi-importer-rhel9@sha256:2df07fb21a3575e74aa16ded20129828f2300cd33e8ab369b0362062d49e62d0_amd64",
"product": {
"name": "container-native-virtualization/virt-cdi-importer-rhel9@sha256:2df07fb21a3575e74aa16ded20129828f2300cd33e8ab369b0362062d49e62d0_amd64",
"product_id": "container-native-virtualization/virt-cdi-importer-rhel9@sha256:2df07fb21a3575e74aa16ded20129828f2300cd33e8ab369b0362062d49e62d0_amd64",
"product_identification_helper": {
"purl": "pkg:oci/virt-cdi-importer-rhel9@sha256:2df07fb21a3575e74aa16ded20129828f2300cd33e8ab369b0362062d49e62d0?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/virt-cdi-importer-rhel9\u0026tag=v4.13.0--2022-101182"
}
}
},
{
"category": "product_version",
"name": "container-native-virtualization/virt-cdi-operator-rhel9@sha256:802ee8923d9d8e406b23911406f9748756c0ef4d6954e9e2fd5fb4bdf91dde9a_amd64",
"product": {
"name": "container-native-virtualization/virt-cdi-operator-rhel9@sha256:802ee8923d9d8e406b23911406f9748756c0ef4d6954e9e2fd5fb4bdf91dde9a_amd64",
"product_id": "container-native-virtualization/virt-cdi-operator-rhel9@sha256:802ee8923d9d8e406b23911406f9748756c0ef4d6954e9e2fd5fb4bdf91dde9a_amd64",
"product_identification_helper": {
"purl": "pkg:oci/virt-cdi-operator-rhel9@sha256:802ee8923d9d8e406b23911406f9748756c0ef4d6954e9e2fd5fb4bdf91dde9a?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/virt-cdi-operator-rhel9\u0026tag=v4.13.0--2022-101182"
}
}
},
{
"category": "product_version",
"name": "container-native-virtualization/virt-cdi-uploadproxy-rhel9@sha256:6775f34353eec8f35bead9411dde155530d079bb8d51582fb1f2aacc27dbde1d_amd64",
"product": {
"name": "container-native-virtualization/virt-cdi-uploadproxy-rhel9@sha256:6775f34353eec8f35bead9411dde155530d079bb8d51582fb1f2aacc27dbde1d_amd64",
"product_id": "container-native-virtualization/virt-cdi-uploadproxy-rhel9@sha256:6775f34353eec8f35bead9411dde155530d079bb8d51582fb1f2aacc27dbde1d_amd64",
"product_identification_helper": {
"purl": "pkg:oci/virt-cdi-uploadproxy-rhel9@sha256:6775f34353eec8f35bead9411dde155530d079bb8d51582fb1f2aacc27dbde1d?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/virt-cdi-uploadproxy-rhel9\u0026tag=v4.13.0--2022-101182"
}
}
},
{
"category": "product_version",
"name": "container-native-virtualization/virt-cdi-uploadserver-rhel9@sha256:b22048390387380af94e267c8a9a66813c515997456d59d8ebac1486916b6585_amd64",
"product": {
"name": "container-native-virtualization/virt-cdi-uploadserver-rhel9@sha256:b22048390387380af94e267c8a9a66813c515997456d59d8ebac1486916b6585_amd64",
"product_id": "container-native-virtualization/virt-cdi-uploadserver-rhel9@sha256:b22048390387380af94e267c8a9a66813c515997456d59d8ebac1486916b6585_amd64",
"product_identification_helper": {
"purl": "pkg:oci/virt-cdi-uploadserver-rhel9@sha256:b22048390387380af94e267c8a9a66813c515997456d59d8ebac1486916b6585?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/virt-cdi-uploadserver-rhel9\u0026tag=v4.13.0--2022-101182"
}
}
},
{
"category": "product_version",
"name": "container-native-virtualization/virt-controller-rhel9@sha256:3e7880149ee9a68286e390beb3d9779f7403c30fc5136e5370e0e4690a3fd243_amd64",
"product": {
"name": "container-native-virtualization/virt-controller-rhel9@sha256:3e7880149ee9a68286e390beb3d9779f7403c30fc5136e5370e0e4690a3fd243_amd64",
"product_id": "container-native-virtualization/virt-controller-rhel9@sha256:3e7880149ee9a68286e390beb3d9779f7403c30fc5136e5370e0e4690a3fd243_amd64",
"product_identification_helper": {
"purl": "pkg:oci/virt-controller-rhel9@sha256:3e7880149ee9a68286e390beb3d9779f7403c30fc5136e5370e0e4690a3fd243?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/virt-controller-rhel9\u0026tag=v4.13.0--2022-101182"
}
}
},
{
"category": "product_version",
"name": "container-native-virtualization/virt-exportproxy-rhel9@sha256:1bda34d5bff734ad997202f29a5ff6f7362fd79fa90511a422442ef2e3681198_amd64",
"product": {
"name": "container-native-virtualization/virt-exportproxy-rhel9@sha256:1bda34d5bff734ad997202f29a5ff6f7362fd79fa90511a422442ef2e3681198_amd64",
"product_id": "container-native-virtualization/virt-exportproxy-rhel9@sha256:1bda34d5bff734ad997202f29a5ff6f7362fd79fa90511a422442ef2e3681198_amd64",
"product_identification_helper": {
"purl": "pkg:oci/virt-exportproxy-rhel9@sha256:1bda34d5bff734ad997202f29a5ff6f7362fd79fa90511a422442ef2e3681198?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/virt-exportproxy-rhel9\u0026tag=v4.13.0--2022-101182"
}
}
},
{
"category": "product_version",
"name": "container-native-virtualization/virt-exportserver-rhel9@sha256:8f12955cd777eb2409037a6968aa92f50c99d6e07e722951dbcfd0c8c9829b5e_amd64",
"product": {
"name": "container-native-virtualization/virt-exportserver-rhel9@sha256:8f12955cd777eb2409037a6968aa92f50c99d6e07e722951dbcfd0c8c9829b5e_amd64",
"product_id": "container-native-virtualization/virt-exportserver-rhel9@sha256:8f12955cd777eb2409037a6968aa92f50c99d6e07e722951dbcfd0c8c9829b5e_amd64",
"product_identification_helper": {
"purl": "pkg:oci/virt-exportserver-rhel9@sha256:8f12955cd777eb2409037a6968aa92f50c99d6e07e722951dbcfd0c8c9829b5e?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/virt-exportserver-rhel9\u0026tag=v4.13.0--2022-101182"
}
}
},
{
"category": "product_version",
"name": "container-native-virtualization/virt-handler-rhel9@sha256:84ba79ae9658699147d2493df2582ab6df10adbff4d44a533c3fe6a9f45f9691_amd64",
"product": {
"name": "container-native-virtualization/virt-handler-rhel9@sha256:84ba79ae9658699147d2493df2582ab6df10adbff4d44a533c3fe6a9f45f9691_amd64",
"product_id": "container-native-virtualization/virt-handler-rhel9@sha256:84ba79ae9658699147d2493df2582ab6df10adbff4d44a533c3fe6a9f45f9691_amd64",
"product_identification_helper": {
"purl": "pkg:oci/virt-handler-rhel9@sha256:84ba79ae9658699147d2493df2582ab6df10adbff4d44a533c3fe6a9f45f9691?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/virt-handler-rhel9\u0026tag=v4.13.0--2022-101182"
}
}
},
{
"category": "product_version",
"name": "container-native-virtualization/virtio-win-rhel9@sha256:d147d2a6eb6f907d1e88f61aaca83596853bc72164583d6dda2b1154b490de25_amd64",
"product": {
"name": "container-native-virtualization/virtio-win-rhel9@sha256:d147d2a6eb6f907d1e88f61aaca83596853bc72164583d6dda2b1154b490de25_amd64",
"product_id": "container-native-virtualization/virtio-win-rhel9@sha256:d147d2a6eb6f907d1e88f61aaca83596853bc72164583d6dda2b1154b490de25_amd64",
"product_identification_helper": {
"purl": "pkg:oci/virtio-win-rhel9@sha256:d147d2a6eb6f907d1e88f61aaca83596853bc72164583d6dda2b1154b490de25?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/virtio-win-rhel9\u0026tag=v4.13.0--2022-101182"
}
}
},
{
"category": "product_version",
"name": "container-native-virtualization/virt-launcher-rhel9@sha256:4990d40d9987d5126d105dd45be2501eaded248cb61bdde5ea8d359bc1e7ebef_amd64",
"product": {
"name": "container-native-virtualization/virt-launcher-rhel9@sha256:4990d40d9987d5126d105dd45be2501eaded248cb61bdde5ea8d359bc1e7ebef_amd64",
"product_id": "container-native-virtualization/virt-launcher-rhel9@sha256:4990d40d9987d5126d105dd45be2501eaded248cb61bdde5ea8d359bc1e7ebef_amd64",
"product_identification_helper": {
"purl": "pkg:oci/virt-launcher-rhel9@sha256:4990d40d9987d5126d105dd45be2501eaded248cb61bdde5ea8d359bc1e7ebef?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/virt-launcher-rhel9\u0026tag=v4.13.0--2022-101182"
}
}
},
{
"category": "product_version",
"name": "container-native-virtualization/virt-operator-rhel9@sha256:5c1a7e4ed2061938987b900a2394f07121d4037350c9bb6485213a2adfea787d_amd64",
"product": {
"name": "container-native-virtualization/virt-operator-rhel9@sha256:5c1a7e4ed2061938987b900a2394f07121d4037350c9bb6485213a2adfea787d_amd64",
"product_id": "container-native-virtualization/virt-operator-rhel9@sha256:5c1a7e4ed2061938987b900a2394f07121d4037350c9bb6485213a2adfea787d_amd64",
"product_identification_helper": {
"purl": "pkg:oci/virt-operator-rhel9@sha256:5c1a7e4ed2061938987b900a2394f07121d4037350c9bb6485213a2adfea787d?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/virt-operator-rhel9\u0026tag=v4.13.0--2022-101182"
}
}
},
{
"category": "product_version",
"name": "container-native-virtualization/vm-console-proxy-rhel9@sha256:7ca921f98f6d81a126907127a611146fb53397869a628678faa1e289c01d22b2_amd64",
"product": {
"name": "container-native-virtualization/vm-console-proxy-rhel9@sha256:7ca921f98f6d81a126907127a611146fb53397869a628678faa1e289c01d22b2_amd64",
"product_id": "container-native-virtualization/vm-console-proxy-rhel9@sha256:7ca921f98f6d81a126907127a611146fb53397869a628678faa1e289c01d22b2_amd64",
"product_identification_helper": {
"purl": "pkg:oci/vm-console-proxy-rhel9@sha256:7ca921f98f6d81a126907127a611146fb53397869a628678faa1e289c01d22b2?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/vm-console-proxy-rhel9\u0026tag=v4.13.0--2022-101182"
}
}
},
{
"category": "product_version",
"name": "container-native-virtualization/vm-network-latency-checkup-rhel9@sha256:59fd965975bccf641a0fa7aa01374d45057bd03cda7528248a84b60b1205bf57_amd64",
"product": {
"name": "container-native-virtualization/vm-network-latency-checkup-rhel9@sha256:59fd965975bccf641a0fa7aa01374d45057bd03cda7528248a84b60b1205bf57_amd64",
"product_id": "container-native-virtualization/vm-network-latency-checkup-rhel9@sha256:59fd965975bccf641a0fa7aa01374d45057bd03cda7528248a84b60b1205bf57_amd64",
"product_identification_helper": {
"purl": "pkg:oci/vm-network-latency-checkup-rhel9@sha256:59fd965975bccf641a0fa7aa01374d45057bd03cda7528248a84b60b1205bf57?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/vm-network-latency-checkup-rhel9\u0026tag=v4.13.0--2022-101182"
}
}
}
],
"category": "architecture",
"name": "amd64"
},
{
"branches": [
{
"category": "product_version",
"name": "container-native-virtualization/bridge-marker-rhel9@sha256:e8a55aee3d75a316bb0d7a554c737198823df04b3c05e481c17e45eb2153bced_arm64",
"product": {
"name": "container-native-virtualization/bridge-marker-rhel9@sha256:e8a55aee3d75a316bb0d7a554c737198823df04b3c05e481c17e45eb2153bced_arm64",
"product_id": "container-native-virtualization/bridge-marker-rhel9@sha256:e8a55aee3d75a316bb0d7a554c737198823df04b3c05e481c17e45eb2153bced_arm64",
"product_identification_helper": {
"purl": "pkg:oci/bridge-marker-rhel9@sha256:e8a55aee3d75a316bb0d7a554c737198823df04b3c05e481c17e45eb2153bced?arch=arm64\u0026repository_url=registry.redhat.io/container-native-virtualization/bridge-marker-rhel9\u0026tag=v4.13.0--2022-101182"
}
}
},
{
"category": "product_version",
"name": "container-native-virtualization/cluster-network-addons-operator-rhel9@sha256:f439d2f420bb59eb1d5af14ce2002648d0cfc155d1a1466c8aac9b661fe902b8_arm64",
"product": {
"name": "container-native-virtualization/cluster-network-addons-operator-rhel9@sha256:f439d2f420bb59eb1d5af14ce2002648d0cfc155d1a1466c8aac9b661fe902b8_arm64",
"product_id": "container-native-virtualization/cluster-network-addons-operator-rhel9@sha256:f439d2f420bb59eb1d5af14ce2002648d0cfc155d1a1466c8aac9b661fe902b8_arm64",
"product_identification_helper": {
"purl": "pkg:oci/cluster-network-addons-operator-rhel9@sha256:f439d2f420bb59eb1d5af14ce2002648d0cfc155d1a1466c8aac9b661fe902b8?arch=arm64\u0026repository_url=registry.redhat.io/container-native-virtualization/cluster-network-addons-operator-rhel9\u0026tag=v4.13.0--2022-101182"
}
}
},
{
"category": "product_version",
"name": "container-native-virtualization/cnv-containernetworking-plugins-rhel9@sha256:89f22e541f61a660c9aa9f38ef58e80b84a0517f74e84292107fc252c25465c9_arm64",
"product": {
"name": "container-native-virtualization/cnv-containernetworking-plugins-rhel9@sha256:89f22e541f61a660c9aa9f38ef58e80b84a0517f74e84292107fc252c25465c9_arm64",
"product_id": "container-native-virtualization/cnv-containernetworking-plugins-rhel9@sha256:89f22e541f61a660c9aa9f38ef58e80b84a0517f74e84292107fc252c25465c9_arm64",
"product_identification_helper": {
"purl": "pkg:oci/cnv-containernetworking-plugins-rhel9@sha256:89f22e541f61a660c9aa9f38ef58e80b84a0517f74e84292107fc252c25465c9?arch=arm64\u0026repository_url=registry.redhat.io/container-native-virtualization/cnv-containernetworking-plugins-rhel9\u0026tag=v4.13.0--2022-101182"
}
}
},
{
"category": "product_version",
"name": "container-native-virtualization/cnv-must-gather-rhel9@sha256:9e8efd76924958eb605401abdac08eba97fb83a1ada383bc87a7fb7c87b3a455_arm64",
"product": {
"name": "container-native-virtualization/cnv-must-gather-rhel9@sha256:9e8efd76924958eb605401abdac08eba97fb83a1ada383bc87a7fb7c87b3a455_arm64",
"product_id": "container-native-virtualization/cnv-must-gather-rhel9@sha256:9e8efd76924958eb605401abdac08eba97fb83a1ada383bc87a7fb7c87b3a455_arm64",
"product_identification_helper": {
"purl": "pkg:oci/cnv-must-gather-rhel9@sha256:9e8efd76924958eb605401abdac08eba97fb83a1ada383bc87a7fb7c87b3a455?arch=arm64\u0026repository_url=registry.redhat.io/container-native-virtualization/cnv-must-gather-rhel9\u0026tag=v4.13.0--2022-101182"
}
}
},
{
"category": "product_version",
"name": "container-native-virtualization/hco-bundle-registry-rhel9@sha256:dd20b138045ef1424d83a47e7abcfcbb2ac54577dcec5ed3c186390aaa4c9d84_arm64",
"product": {
"name": "container-native-virtualization/hco-bundle-registry-rhel9@sha256:dd20b138045ef1424d83a47e7abcfcbb2ac54577dcec5ed3c186390aaa4c9d84_arm64",
"product_id": "container-native-virtualization/hco-bundle-registry-rhel9@sha256:dd20b138045ef1424d83a47e7abcfcbb2ac54577dcec5ed3c186390aaa4c9d84_arm64",
"product_identification_helper": {
"purl": "pkg:oci/hco-bundle-registry-rhel9@sha256:dd20b138045ef1424d83a47e7abcfcbb2ac54577dcec5ed3c186390aaa4c9d84?arch=arm64\u0026repository_url=registry.redhat.io/container-native-virtualization/hco-bundle-registry-rhel9\u0026tag=v4.13.0.rhel9--2022-101182"
}
}
},
{
"category": "product_version",
"name": "container-native-virtualization/hostpath-csi-driver-rhel9@sha256:676d4c23a5f60dd331728af056b0a6b2d3358ac88da23299b1a98dfaca8f288e_arm64",
"product": {
"name": "container-native-virtualization/hostpath-csi-driver-rhel9@sha256:676d4c23a5f60dd331728af056b0a6b2d3358ac88da23299b1a98dfaca8f288e_arm64",
"product_id": "container-native-virtualization/hostpath-csi-driver-rhel9@sha256:676d4c23a5f60dd331728af056b0a6b2d3358ac88da23299b1a98dfaca8f288e_arm64",
"product_identification_helper": {
"purl": "pkg:oci/hostpath-csi-driver-rhel9@sha256:676d4c23a5f60dd331728af056b0a6b2d3358ac88da23299b1a98dfaca8f288e?arch=arm64\u0026repository_url=registry.redhat.io/container-native-virtualization/hostpath-csi-driver-rhel9\u0026tag=v4.13.0--2022-101182"
}
}
},
{
"category": "product_version",
"name": "container-native-virtualization/hostpath-provisioner-operator-rhel9@sha256:571ae805641dea11646028c946039983c7fd82f138b915dcb8b80c39b465e63c_arm64",
"product": {
"name": "container-native-virtualization/hostpath-provisioner-operator-rhel9@sha256:571ae805641dea11646028c946039983c7fd82f138b915dcb8b80c39b465e63c_arm64",
"product_id": "container-native-virtualization/hostpath-provisioner-operator-rhel9@sha256:571ae805641dea11646028c946039983c7fd82f138b915dcb8b80c39b465e63c_arm64",
"product_identification_helper": {
"purl": "pkg:oci/hostpath-provisioner-operator-rhel9@sha256:571ae805641dea11646028c946039983c7fd82f138b915dcb8b80c39b465e63c?arch=arm64\u0026repository_url=registry.redhat.io/container-native-virtualization/hostpath-provisioner-operator-rhel9\u0026tag=v4.13.0-37"
}
}
},
{
"category": "product_version",
"name": "container-native-virtualization/hostpath-provisioner-rhel9@sha256:d4ed87745b7ee2acca2d83e2c91c2f6dced1903c81495b50f2559b3ba2dde287_arm64",
"product": {
"name": "container-native-virtualization/hostpath-provisioner-rhel9@sha256:d4ed87745b7ee2acca2d83e2c91c2f6dced1903c81495b50f2559b3ba2dde287_arm64",
"product_id": "container-native-virtualization/hostpath-provisioner-rhel9@sha256:d4ed87745b7ee2acca2d83e2c91c2f6dced1903c81495b50f2559b3ba2dde287_arm64",
"product_identification_helper": {
"purl": "pkg:oci/hostpath-provisioner-rhel9@sha256:d4ed87745b7ee2acca2d83e2c91c2f6dced1903c81495b50f2559b3ba2dde287?arch=arm64\u0026repository_url=registry.redhat.io/container-native-virtualization/hostpath-provisioner-rhel9\u0026tag=v4.13.0--2022-101182"
}
}
},
{
"category": "product_version",
"name": "container-native-virtualization/hyperconverged-cluster-operator-rhel9@sha256:e681560b184189df03fc84c8a712f32289f42573dd348cda394b19565eb6eca8_arm64",
"product": {
"name": "container-native-virtualization/hyperconverged-cluster-operator-rhel9@sha256:e681560b184189df03fc84c8a712f32289f42573dd348cda394b19565eb6eca8_arm64",
"product_id": "container-native-virtualization/hyperconverged-cluster-operator-rhel9@sha256:e681560b184189df03fc84c8a712f32289f42573dd348cda394b19565eb6eca8_arm64",
"product_identification_helper": {
"purl": "pkg:oci/hyperconverged-cluster-operator-rhel9@sha256:e681560b184189df03fc84c8a712f32289f42573dd348cda394b19565eb6eca8?arch=arm64\u0026repository_url=registry.redhat.io/container-native-virtualization/hyperconverged-cluster-operator-rhel9\u0026tag=v4.13.0--2022-101182"
}
}
},
{
"category": "product_version",
"name": "container-native-virtualization/hyperconverged-cluster-webhook-rhel9@sha256:06d036d320b3027bb8370bb8e0f6fe8c9f0ec9bca7aac3b5c53698ba4a170042_arm64",
"product": {
"name": "container-native-virtualization/hyperconverged-cluster-webhook-rhel9@sha256:06d036d320b3027bb8370bb8e0f6fe8c9f0ec9bca7aac3b5c53698ba4a170042_arm64",
"product_id": "container-native-virtualization/hyperconverged-cluster-webhook-rhel9@sha256:06d036d320b3027bb8370bb8e0f6fe8c9f0ec9bca7aac3b5c53698ba4a170042_arm64",
"product_identification_helper": {
"purl": "pkg:oci/hyperconverged-cluster-webhook-rhel9@sha256:06d036d320b3027bb8370bb8e0f6fe8c9f0ec9bca7aac3b5c53698ba4a170042?arch=arm64\u0026repository_url=registry.redhat.io/container-native-virtualization/hyperconverged-cluster-webhook-rhel9\u0026tag=v4.13.0--2022-101182"
}
}
},
{
"category": "product_version",
"name": "container-native-virtualization/kubemacpool-rhel9@sha256:59862a59854f0d5b83dc25ba119f9586a8aff42b6e60d1922f8ae7b4567309ff_arm64",
"product": {
"name": "container-native-virtualization/kubemacpool-rhel9@sha256:59862a59854f0d5b83dc25ba119f9586a8aff42b6e60d1922f8ae7b4567309ff_arm64",
"product_id": "container-native-virtualization/kubemacpool-rhel9@sha256:59862a59854f0d5b83dc25ba119f9586a8aff42b6e60d1922f8ae7b4567309ff_arm64",
"product_identification_helper": {
"purl": "pkg:oci/kubemacpool-rhel9@sha256:59862a59854f0d5b83dc25ba119f9586a8aff42b6e60d1922f8ae7b4567309ff?arch=arm64\u0026repository_url=registry.redhat.io/container-native-virtualization/kubemacpool-rhel9\u0026tag=v4.13.0--2022-101182"
}
}
},
{
"category": "product_version",
"name": "container-native-virtualization/kubesecondarydns-rhel9@sha256:b1838f3c8ba3d8113bddea17b78c21e1c1490e2a4a07ea77014edee523d06347_arm64",
"product": {
"name": "container-native-virtualization/kubesecondarydns-rhel9@sha256:b1838f3c8ba3d8113bddea17b78c21e1c1490e2a4a07ea77014edee523d06347_arm64",
"product_id": "container-native-virtualization/kubesecondarydns-rhel9@sha256:b1838f3c8ba3d8113bddea17b78c21e1c1490e2a4a07ea77014edee523d06347_arm64",
"product_identification_helper": {
"purl": "pkg:oci/kubesecondarydns-rhel9@sha256:b1838f3c8ba3d8113bddea17b78c21e1c1490e2a4a07ea77014edee523d06347?arch=arm64\u0026repository_url=registry.redhat.io/container-native-virtualization/kubesecondarydns-rhel9\u0026tag=v4.13.0--2022-101182"
}
}
},
{
"category": "product_version",
"name": "container-native-virtualization/kubevirt-console-plugin-rhel9@sha256:ffb2acd9ae09c1ef9ca756f5eaf6087d0a3957cfc824543949d25f556a97744d_arm64",
"product": {
"name": "container-native-virtualization/kubevirt-console-plugin-rhel9@sha256:ffb2acd9ae09c1ef9ca756f5eaf6087d0a3957cfc824543949d25f556a97744d_arm64",
"product_id": "container-native-virtualization/kubevirt-console-plugin-rhel9@sha256:ffb2acd9ae09c1ef9ca756f5eaf6087d0a3957cfc824543949d25f556a97744d_arm64",
"product_identification_helper": {
"purl": "pkg:oci/kubevirt-console-plugin-rhel9@sha256:ffb2acd9ae09c1ef9ca756f5eaf6087d0a3957cfc824543949d25f556a97744d?arch=arm64\u0026repository_url=registry.redhat.io/container-native-virtualization/kubevirt-console-plugin-rhel9\u0026tag=v4.13.0--2022-101182"
}
}
},
{
"category": "product_version",
"name": "container-native-virtualization/kubevirt-dpdk-checkup-rhel9@sha256:525aceb9396010ebcdba14040f267889b807cd84db8e5b4030429b51f0fbf5fe_arm64",
"product": {
"name": "container-native-virtualization/kubevirt-dpdk-checkup-rhel9@sha256:525aceb9396010ebcdba14040f267889b807cd84db8e5b4030429b51f0fbf5fe_arm64",
"product_id": "container-native-virtualization/kubevirt-dpdk-checkup-rhel9@sha256:525aceb9396010ebcdba14040f267889b807cd84db8e5b4030429b51f0fbf5fe_arm64",
"product_identification_helper": {
"purl": "pkg:oci/kubevirt-dpdk-checkup-rhel9@sha256:525aceb9396010ebcdba14040f267889b807cd84db8e5b4030429b51f0fbf5fe?arch=arm64\u0026repository_url=registry.redhat.io/container-native-virtualization/kubevirt-dpdk-checkup-rhel9\u0026tag=v4.13.0--2022-101182"
}
}
},
{
"category": "product_version",
"name": "container-native-virtualization/kubevirt-ssp-operator-rhel9@sha256:badeb0f65f543b209f6af761729d9778b7b73b97d55044016dfba3f38a1f6f18_arm64",
"product": {
"name": "container-native-virtualization/kubevirt-ssp-operator-rhel9@sha256:badeb0f65f543b209f6af761729d9778b7b73b97d55044016dfba3f38a1f6f18_arm64",
"product_id": "container-native-virtualization/kubevirt-ssp-operator-rhel9@sha256:badeb0f65f543b209f6af761729d9778b7b73b97d55044016dfba3f38a1f6f18_arm64",
"product_identification_helper": {
"purl": "pkg:oci/kubevirt-ssp-operator-rhel9@sha256:badeb0f65f543b209f6af761729d9778b7b73b97d55044016dfba3f38a1f6f18?arch=arm64\u0026repository_url=registry.redhat.io/container-native-virtualization/kubevirt-ssp-operator-rhel9\u0026tag=v4.13.0--2022-101182"
}
}
},
{
"category": "product_version",
"name": "container-native-virtualization/kubevirt-tekton-tasks-cleanup-vm-rhel9@sha256:b0ff7e812a576ea848590655fc13a85832d5a39f68e7769ceab9da6949da88c7_arm64",
"product": {
"name": "container-native-virtualization/kubevirt-tekton-tasks-cleanup-vm-rhel9@sha256:b0ff7e812a576ea848590655fc13a85832d5a39f68e7769ceab9da6949da88c7_arm64",
"product_id": "container-native-virtualization/kubevirt-tekton-tasks-cleanup-vm-rhel9@sha256:b0ff7e812a576ea848590655fc13a85832d5a39f68e7769ceab9da6949da88c7_arm64",
"product_identification_helper": {
"purl": "pkg:oci/kubevirt-tekton-tasks-cleanup-vm-rhel9@sha256:b0ff7e812a576ea848590655fc13a85832d5a39f68e7769ceab9da6949da88c7?arch=arm64\u0026repository_url=registry.redhat.io/container-native-virtualization/kubevirt-tekton-tasks-cleanup-vm-rhel9\u0026tag=v4.13.0--2022-101182"
}
}
},
{
"category": "product_version",
"name": "container-native-virtualization/kubevirt-tekton-tasks-copy-template-rhel9@sha256:4916a6c6b1f9b529187d3b4d5fc99b90157993767b3fe2ad36a9ec77fbb46b10_arm64",
"product": {
"name": "container-native-virtualization/kubevirt-tekton-tasks-copy-template-rhel9@sha256:4916a6c6b1f9b529187d3b4d5fc99b90157993767b3fe2ad36a9ec77fbb46b10_arm64",
"product_id": "container-native-virtualization/kubevirt-tekton-tasks-copy-template-rhel9@sha256:4916a6c6b1f9b529187d3b4d5fc99b90157993767b3fe2ad36a9ec77fbb46b10_arm64",
"product_identification_helper": {
"purl": "pkg:oci/kubevirt-tekton-tasks-copy-template-rhel9@sha256:4916a6c6b1f9b529187d3b4d5fc99b90157993767b3fe2ad36a9ec77fbb46b10?arch=arm64\u0026repository_url=registry.redhat.io/container-native-virtualization/kubevirt-tekton-tasks-copy-template-rhel9\u0026tag=v4.13.0--2022-101182"
}
}
},
{
"category": "product_version",
"name": "container-native-virtualization/kubevirt-tekton-tasks-create-datavolume-rhel9@sha256:7112400a4ecb23ee2110bf96372fcf9f96ad648a51aa944627b40eb59539a660_arm64",
"product": {
"name": "container-native-virtualization/kubevirt-tekton-tasks-create-datavolume-rhel9@sha256:7112400a4ecb23ee2110bf96372fcf9f96ad648a51aa944627b40eb59539a660_arm64",
"product_id": "container-native-virtualization/kubevirt-tekton-tasks-create-datavolume-rhel9@sha256:7112400a4ecb23ee2110bf96372fcf9f96ad648a51aa944627b40eb59539a660_arm64",
"product_identification_helper": {
"purl": "pkg:oci/kubevirt-tekton-tasks-create-datavolume-rhel9@sha256:7112400a4ecb23ee2110bf96372fcf9f96ad648a51aa944627b40eb59539a660?arch=arm64\u0026repository_url=registry.redhat.io/container-native-virtualization/kubevirt-tekton-tasks-create-datavolume-rhel9\u0026tag=v4.13.0--2022-101182"
}
}
},
{
"category": "product_version",
"name": "container-native-virtualization/kubevirt-tekton-tasks-create-vm-from-template-rhel9@sha256:4d962618aa95600c60c9fc8b890186e510de91177d51949e12797a3558e31328_arm64",
"product": {
"name": "container-native-virtualization/kubevirt-tekton-tasks-create-vm-from-template-rhel9@sha256:4d962618aa95600c60c9fc8b890186e510de91177d51949e12797a3558e31328_arm64",
"product_id": "container-native-virtualization/kubevirt-tekton-tasks-create-vm-from-template-rhel9@sha256:4d962618aa95600c60c9fc8b890186e510de91177d51949e12797a3558e31328_arm64",
"product_identification_helper": {
"purl": "pkg:oci/kubevirt-tekton-tasks-create-vm-from-template-rhel9@sha256:4d962618aa95600c60c9fc8b890186e510de91177d51949e12797a3558e31328?arch=arm64\u0026repository_url=registry.redhat.io/container-native-virtualization/kubevirt-tekton-tasks-create-vm-from-template-rhel9\u0026tag=v4.13.0--2022-101182"
}
}
},
{
"category": "product_version",
"name": "container-native-virtualization/kubevirt-tekton-tasks-disk-virt-customize-rhel9@sha256:a780244e48c6d4f87446d3754c3eb9ab79c0d54675c189da4a659f7a4d5668ea_arm64",
"product": {
"name": "container-native-virtualization/kubevirt-tekton-tasks-disk-virt-customize-rhel9@sha256:a780244e48c6d4f87446d3754c3eb9ab79c0d54675c189da4a659f7a4d5668ea_arm64",
"product_id": "container-native-virtualization/kubevirt-tekton-tasks-disk-virt-customize-rhel9@sha256:a780244e48c6d4f87446d3754c3eb9ab79c0d54675c189da4a659f7a4d5668ea_arm64",
"product_identification_helper": {
"purl": "pkg:oci/kubevirt-tekton-tasks-disk-virt-customize-rhel9@sha256:a780244e48c6d4f87446d3754c3eb9ab79c0d54675c189da4a659f7a4d5668ea?arch=arm64\u0026repository_url=registry.redhat.io/container-native-virtualization/kubevirt-tekton-tasks-disk-virt-customize-rhel9\u0026tag=v4.13.0--2022-101182"
}
}
},
{
"category": "product_version",
"name": "container-native-virtualization/kubevirt-tekton-tasks-disk-virt-sysprep-rhel9@sha256:84577d949a1bbcaa291c70729127bca4a8994df03068666baa23840877ea8392_arm64",
"product": {
"name": "container-native-virtualization/kubevirt-tekton-tasks-disk-virt-sysprep-rhel9@sha256:84577d949a1bbcaa291c70729127bca4a8994df03068666baa23840877ea8392_arm64",
"product_id": "container-native-virtualization/kubevirt-tekton-tasks-disk-virt-sysprep-rhel9@sha256:84577d949a1bbcaa291c70729127bca4a8994df03068666baa23840877ea8392_arm64",
"product_identification_helper": {
"purl": "pkg:oci/kubevirt-tekton-tasks-disk-virt-sysprep-rhel9@sha256:84577d949a1bbcaa291c70729127bca4a8994df03068666baa23840877ea8392?arch=arm64\u0026repository_url=registry.redhat.io/container-native-virtualization/kubevirt-tekton-tasks-disk-virt-sysprep-rhel9\u0026tag=v4.13.0--2022-101182"
}
}
},
{
"category": "product_version",
"name": "container-native-virtualization/kubevirt-tekton-tasks-modify-vm-template-rhel9@sha256:31d959b80cf57462e1705684bb7e1b78af26bd2c62f1c9e4e51e1d02199b05a8_arm64",
"product": {
"name": "container-native-virtualization/kubevirt-tekton-tasks-modify-vm-template-rhel9@sha256:31d959b80cf57462e1705684bb7e1b78af26bd2c62f1c9e4e51e1d02199b05a8_arm64",
"product_id": "container-native-virtualization/kubevirt-tekton-tasks-modify-vm-template-rhel9@sha256:31d959b80cf57462e1705684bb7e1b78af26bd2c62f1c9e4e51e1d02199b05a8_arm64",
"product_identification_helper": {
"purl": "pkg:oci/kubevirt-tekton-tasks-modify-vm-template-rhel9@sha256:31d959b80cf57462e1705684bb7e1b78af26bd2c62f1c9e4e51e1d02199b05a8?arch=arm64\u0026repository_url=registry.redhat.io/container-native-virtualization/kubevirt-tekton-tasks-modify-vm-template-rhel9\u0026tag=v4.13.0--2022-101182"
}
}
},
{
"category": "product_version",
"name": "container-native-virtualization/kubevirt-tekton-tasks-operator-rhel9@sha256:d0cf0e81589f0938de45961eaddfc5ec4782738fd11082de0439b200534259eb_arm64",
"product": {
"name": "container-native-virtualization/kubevirt-tekton-tasks-operator-rhel9@sha256:d0cf0e81589f0938de45961eaddfc5ec4782738fd11082de0439b200534259eb_arm64",
"product_id": "container-native-virtualization/kubevirt-tekton-tasks-operator-rhel9@sha256:d0cf0e81589f0938de45961eaddfc5ec4782738fd11082de0439b200534259eb_arm64",
"product_identification_helper": {
"purl": "pkg:oci/kubevirt-tekton-tasks-operator-rhel9@sha256:d0cf0e81589f0938de45961eaddfc5ec4782738fd11082de0439b200534259eb?arch=arm64\u0026repository_url=registry.redhat.io/container-native-virtualization/kubevirt-tekton-tasks-operator-rhel9\u0026tag=v4.13.0--2022-101182"
}
}
},
{
"category": "product_version",
"name": "container-native-virtualization/kubevirt-tekton-tasks-wait-for-vmi-status-rhel9@sha256:afb68af076954fcd18c7a4a1464ea0c2a766e8282eae980051906ed07eaa1707_arm64",
"product": {
"name": "container-native-virtualization/kubevirt-tekton-tasks-wait-for-vmi-status-rhel9@sha256:afb68af076954fcd18c7a4a1464ea0c2a766e8282eae980051906ed07eaa1707_arm64",
"product_id": "container-native-virtualization/kubevirt-tekton-tasks-wait-for-vmi-status-rhel9@sha256:afb68af076954fcd18c7a4a1464ea0c2a766e8282eae980051906ed07eaa1707_arm64",
"product_identification_helper": {
"purl": "pkg:oci/kubevirt-tekton-tasks-wait-for-vmi-status-rhel9@sha256:afb68af076954fcd18c7a4a1464ea0c2a766e8282eae980051906ed07eaa1707?arch=arm64\u0026repository_url=registry.redhat.io/container-native-virtualization/kubevirt-tekton-tasks-wait-for-vmi-status-rhel9\u0026tag=v4.13.0--2022-101182"
}
}
},
{
"category": "product_version",
"name": "container-native-virtualization/kubevirt-template-validator-rhel9@sha256:02b22c7e7014b5e72d47fed8b6a268cf307638c5510adf3916c51f7f40a52a08_arm64",
"product": {
"name": "container-native-virtualization/kubevirt-template-validator-rhel9@sha256:02b22c7e7014b5e72d47fed8b6a268cf307638c5510adf3916c51f7f40a52a08_arm64",
"product_id": "container-native-virtualization/kubevirt-template-validator-rhel9@sha256:02b22c7e7014b5e72d47fed8b6a268cf307638c5510adf3916c51f7f40a52a08_arm64",
"product_identification_helper": {
"purl": "pkg:oci/kubevirt-template-validator-rhel9@sha256:02b22c7e7014b5e72d47fed8b6a268cf307638c5510adf3916c51f7f40a52a08?arch=arm64\u0026repository_url=registry.redhat.io/container-native-virtualization/kubevirt-template-validator-rhel9\u0026tag=v4.13.0--2022-101182"
}
}
},
{
"category": "product_version",
"name": "container-native-virtualization/libguestfs-tools-rhel9@sha256:6558f60343e068b032167e2340b2c549c5f0258acc5d2614b60966ce79408b01_arm64",
"product": {
"name": "container-native-virtualization/libguestfs-tools-rhel9@sha256:6558f60343e068b032167e2340b2c549c5f0258acc5d2614b60966ce79408b01_arm64",
"product_id": "container-native-virtualization/libguestfs-tools-rhel9@sha256:6558f60343e068b032167e2340b2c549c5f0258acc5d2614b60966ce79408b01_arm64",
"product_identification_helper": {
"purl": "pkg:oci/libguestfs-tools-rhel9@sha256:6558f60343e068b032167e2340b2c549c5f0258acc5d2614b60966ce79408b01?arch=arm64\u0026repository_url=registry.redhat.io/container-native-virtualization/libguestfs-tools-rhel9\u0026tag=v4.13.0--2022-101182"
}
}
},
{
"category": "product_version",
"name": "container-native-virtualization/multus-dynamic-networks-rhel9@sha256:3ecb0162a4b01d1590bf209d717b32a4f0835910d9979823f18c24acba41b503_arm64",
"product": {
"name": "container-native-virtualization/multus-dynamic-networks-rhel9@sha256:3ecb0162a4b01d1590bf209d717b32a4f0835910d9979823f18c24acba41b503_arm64",
"product_id": "container-native-virtualization/multus-dynamic-networks-rhel9@sha256:3ecb0162a4b01d1590bf209d717b32a4f0835910d9979823f18c24acba41b503_arm64",
"product_identification_helper": {
"purl": "pkg:oci/multus-dynamic-networks-rhel9@sha256:3ecb0162a4b01d1590bf209d717b32a4f0835910d9979823f18c24acba41b503?arch=arm64\u0026repository_url=registry.redhat.io/container-native-virtualization/multus-dynamic-networks-rhel9\u0026tag=v4.13.0-37"
}
}
},
{
"category": "product_version",
"name": "container-native-virtualization/ovs-cni-plugin-rhel9@sha256:0f1d372f418744e0aff59ecb0a38f53178aac9c2e9eecfd38aa25ed83e0d1360_arm64",
"product": {
"name": "container-native-virtualization/ovs-cni-plugin-rhel9@sha256:0f1d372f418744e0aff59ecb0a38f53178aac9c2e9eecfd38aa25ed83e0d1360_arm64",
"product_id": "container-native-virtualization/ovs-cni-plugin-rhel9@sha256:0f1d372f418744e0aff59ecb0a38f53178aac9c2e9eecfd38aa25ed83e0d1360_arm64",
"product_identification_helper": {
"purl": "pkg:oci/ovs-cni-plugin-rhel9@sha256:0f1d372f418744e0aff59ecb0a38f53178aac9c2e9eecfd38aa25ed83e0d1360?arch=arm64\u0026repository_url=registry.redhat.io/container-native-virtualization/ovs-cni-plugin-rhel9\u0026tag=v4.13.0--2022-101182"
}
}
},
{
"category": "product_version",
"name": "container-native-virtualization/virt-api-rhel9@sha256:e68416321ca8c74a547b3d35897f54813c03481143e402e9bdc4daf315e35b5d_arm64",
"product": {
"name": "container-native-virtualization/virt-api-rhel9@sha256:e68416321ca8c74a547b3d35897f54813c03481143e402e9bdc4daf315e35b5d_arm64",
"product_id": "container-native-virtualization/virt-api-rhel9@sha256:e68416321ca8c74a547b3d35897f54813c03481143e402e9bdc4daf315e35b5d_arm64",
"product_identification_helper": {
"purl": "pkg:oci/virt-api-rhel9@sha256:e68416321ca8c74a547b3d35897f54813c03481143e402e9bdc4daf315e35b5d?arch=arm64\u0026repository_url=registry.redhat.io/container-native-virtualization/virt-api-rhel9\u0026tag=v4.13.0--2022-101182"
}
}
},
{
"category": "product_version",
"name": "container-native-virtualization/virt-artifacts-server-rhel9@sha256:33d11c1832b49df39c1fca62bad40dbc5c30a452248339aaef449ac99509accb_arm64",
"product": {
"name": "container-native-virtualization/virt-artifacts-server-rhel9@sha256:33d11c1832b49df39c1fca62bad40dbc5c30a452248339aaef449ac99509accb_arm64",
"product_id": "container-native-virtualization/virt-artifacts-server-rhel9@sha256:33d11c1832b49df39c1fca62bad40dbc5c30a452248339aaef449ac99509accb_arm64",
"product_identification_helper": {
"purl": "pkg:oci/virt-artifacts-server-rhel9@sha256:33d11c1832b49df39c1fca62bad40dbc5c30a452248339aaef449ac99509accb?arch=arm64\u0026repository_url=registry.redhat.io/container-native-virtualization/virt-artifacts-server-rhel9\u0026tag=v4.13.0--2022-101182"
}
}
},
{
"category": "product_version",
"name": "container-native-virtualization/virt-cdi-apiserver-rhel9@sha256:f6128a63344ed2129f5bce648ddcfaa2869d31cde4b93328d3c22534b97ade10_arm64",
"product": {
"name": "container-native-virtualization/virt-cdi-apiserver-rhel9@sha256:f6128a63344ed2129f5bce648ddcfaa2869d31cde4b93328d3c22534b97ade10_arm64",
"product_id": "container-native-virtualization/virt-cdi-apiserver-rhel9@sha256:f6128a63344ed2129f5bce648ddcfaa2869d31cde4b93328d3c22534b97ade10_arm64",
"product_identification_helper": {
"purl": "pkg:oci/virt-cdi-apiserver-rhel9@sha256:f6128a63344ed2129f5bce648ddcfaa2869d31cde4b93328d3c22534b97ade10?arch=arm64\u0026repository_url=registry.redhat.io/container-native-virtualization/virt-cdi-apiserver-rhel9\u0026tag=v4.13.0--2022-101182"
}
}
},
{
"category": "product_version",
"name": "container-native-virtualization/virt-cdi-cloner-rhel9@sha256:6ac212767481bef64d8a7d0252bb8089c0f9751fad4a355aef71bd49dad2ad07_arm64",
"product": {
"name": "container-native-virtualization/virt-cdi-cloner-rhel9@sha256:6ac212767481bef64d8a7d0252bb8089c0f9751fad4a355aef71bd49dad2ad07_arm64",
"product_id": "container-native-virtualization/virt-cdi-cloner-rhel9@sha256:6ac212767481bef64d8a7d0252bb8089c0f9751fad4a355aef71bd49dad2ad07_arm64",
"product_identification_helper": {
"purl": "pkg:oci/virt-cdi-cloner-rhel9@sha256:6ac212767481bef64d8a7d0252bb8089c0f9751fad4a355aef71bd49dad2ad07?arch=arm64\u0026repository_url=registry.redhat.io/container-native-virtualization/virt-cdi-cloner-rhel9\u0026tag=v4.13.0--2022-101182"
}
}
},
{
"category": "product_version",
"name": "container-native-virtualization/virt-cdi-controller-rhel9@sha256:65f5263275d9f0a12b8fb057d82adf678778039ec873ca9bde182dea3413c9f1_arm64",
"product": {
"name": "container-native-virtualization/virt-cdi-controller-rhel9@sha256:65f5263275d9f0a12b8fb057d82adf678778039ec873ca9bde182dea3413c9f1_arm64",
"product_id": "container-native-virtualization/virt-cdi-controller-rhel9@sha256:65f5263275d9f0a12b8fb057d82adf678778039ec873ca9bde182dea3413c9f1_arm64",
"product_identification_helper": {
"purl": "pkg:oci/virt-cdi-controller-rhel9@sha256:65f5263275d9f0a12b8fb057d82adf678778039ec873ca9bde182dea3413c9f1?arch=arm64\u0026repository_url=registry.redhat.io/container-native-virtualization/virt-cdi-controller-rhel9\u0026tag=v4.13.0--2022-101182"
}
}
},
{
"category": "product_version",
"name": "container-native-virtualization/virt-cdi-importer-rhel9@sha256:00a6d9d24ca1466d450b02269ec3144fc7550f0e5c696e869fbf7ce10cae6093_arm64",
"product": {
"name": "container-native-virtualization/virt-cdi-importer-rhel9@sha256:00a6d9d24ca1466d450b02269ec3144fc7550f0e5c696e869fbf7ce10cae6093_arm64",
"product_id": "container-native-virtualization/virt-cdi-importer-rhel9@sha256:00a6d9d24ca1466d450b02269ec3144fc7550f0e5c696e869fbf7ce10cae6093_arm64",
"product_identification_helper": {
"purl": "pkg:oci/virt-cdi-importer-rhel9@sha256:00a6d9d24ca1466d450b02269ec3144fc7550f0e5c696e869fbf7ce10cae6093?arch=arm64\u0026repository_url=registry.redhat.io/container-native-virtualization/virt-cdi-importer-rhel9\u0026tag=v4.13.0--2022-101182"
}
}
},
{
"category": "product_version",
"name": "container-native-virtualization/virt-cdi-operator-rhel9@sha256:20ec064750faedd97d11b797c8c1d9a1db5d60d7d76e82e65cfd05eb79d65e29_arm64",
"product": {
"name": "container-native-virtualization/virt-cdi-operator-rhel9@sha256:20ec064750faedd97d11b797c8c1d9a1db5d60d7d76e82e65cfd05eb79d65e29_arm64",
"product_id": "container-native-virtualization/virt-cdi-operator-rhel9@sha256:20ec064750faedd97d11b797c8c1d9a1db5d60d7d76e82e65cfd05eb79d65e29_arm64",
"product_identification_helper": {
"purl": "pkg:oci/virt-cdi-operator-rhel9@sha256:20ec064750faedd97d11b797c8c1d9a1db5d60d7d76e82e65cfd05eb79d65e29?arch=arm64\u0026repository_url=registry.redhat.io/container-native-virtualization/virt-cdi-operator-rhel9\u0026tag=v4.13.0--2022-101182"
}
}
},
{
"category": "product_version",
"name": "container-native-virtualization/virt-cdi-uploadproxy-rhel9@sha256:392d0f61f462c707adfdc21e4239c5c09d8520a80486b41d9d9ae479267d6124_arm64",
"product": {
"name": "container-native-virtualization/virt-cdi-uploadproxy-rhel9@sha256:392d0f61f462c707adfdc21e4239c5c09d8520a80486b41d9d9ae479267d6124_arm64",
"product_id": "container-native-virtualization/virt-cdi-uploadproxy-rhel9@sha256:392d0f61f462c707adfdc21e4239c5c09d8520a80486b41d9d9ae479267d6124_arm64",
"product_identification_helper": {
"purl": "pkg:oci/virt-cdi-uploadproxy-rhel9@sha256:392d0f61f462c707adfdc21e4239c5c09d8520a80486b41d9d9ae479267d6124?arch=arm64\u0026repository_url=registry.redhat.io/container-native-virtualization/virt-cdi-uploadproxy-rhel9\u0026tag=v4.13.0--2022-101182"
}
}
},
{
"category": "product_version",
"name": "container-native-virtualization/virt-cdi-uploadserver-rhel9@sha256:4528c24672689cfb6505761b6b108fbcc04488192733f23d2bfe39cd42a1d743_arm64",
"product": {
"name": "container-native-virtualization/virt-cdi-uploadserver-rhel9@sha256:4528c24672689cfb6505761b6b108fbcc04488192733f23d2bfe39cd42a1d743_arm64",
"product_id": "container-native-virtualization/virt-cdi-uploadserver-rhel9@sha256:4528c24672689cfb6505761b6b108fbcc04488192733f23d2bfe39cd42a1d743_arm64",
"product_identification_helper": {
"purl": "pkg:oci/virt-cdi-uploadserver-rhel9@sha256:4528c24672689cfb6505761b6b108fbcc04488192733f23d2bfe39cd42a1d743?arch=arm64\u0026repository_url=registry.redhat.io/container-native-virtualization/virt-cdi-uploadserver-rhel9\u0026tag=v4.13.0--2022-101182"
}
}
},
{
"category": "product_version",
"name": "container-native-virtualization/virt-controller-rhel9@sha256:970edc281d7a731e9f7e8c2d4440fe48a221e5e355d5235c5413b4c3adb28503_arm64",
"product": {
"name": "container-native-virtualization/virt-controller-rhel9@sha256:970edc281d7a731e9f7e8c2d4440fe48a221e5e355d5235c5413b4c3adb28503_arm64",
"product_id": "container-native-virtualization/virt-controller-rhel9@sha256:970edc281d7a731e9f7e8c2d4440fe48a221e5e355d5235c5413b4c3adb28503_arm64",
"product_identification_helper": {
"purl": "pkg:oci/virt-controller-rhel9@sha256:970edc281d7a731e9f7e8c2d4440fe48a221e5e355d5235c5413b4c3adb28503?arch=arm64\u0026repository_url=registry.redhat.io/container-native-virtualization/virt-controller-rhel9\u0026tag=v4.13.0--2022-101182"
}
}
},
{
"category": "product_version",
"name": "container-native-virtualization/virt-exportproxy-rhel9@sha256:de3c4afbf7669b98517cbef2490ec186f0553dd97b05bed80ec36dd883fe507b_arm64",
"product": {
"name": "container-native-virtualization/virt-exportproxy-rhel9@sha256:de3c4afbf7669b98517cbef2490ec186f0553dd97b05bed80ec36dd883fe507b_arm64",
"product_id": "container-native-virtualization/virt-exportproxy-rhel9@sha256:de3c4afbf7669b98517cbef2490ec186f0553dd97b05bed80ec36dd883fe507b_arm64",
"product_identification_helper": {
"purl": "pkg:oci/virt-exportproxy-rhel9@sha256:de3c4afbf7669b98517cbef2490ec186f0553dd97b05bed80ec36dd883fe507b?arch=arm64\u0026repository_url=registry.redhat.io/container-native-virtualization/virt-exportproxy-rhel9\u0026tag=v4.13.0--2022-101182"
}
}
},
{
"category": "product_version",
"name": "container-native-virtualization/virt-exportserver-rhel9@sha256:3f7f98645176d42c63cca5c0fc3182a03121af87446ca421b6c72baf07dfca0d_arm64",
"product": {
"name": "container-native-virtualization/virt-exportserver-rhel9@sha256:3f7f98645176d42c63cca5c0fc3182a03121af87446ca421b6c72baf07dfca0d_arm64",
"product_id": "container-native-virtualization/virt-exportserver-rhel9@sha256:3f7f98645176d42c63cca5c0fc3182a03121af87446ca421b6c72baf07dfca0d_arm64",
"product_identification_helper": {
"purl": "pkg:oci/virt-exportserver-rhel9@sha256:3f7f98645176d42c63cca5c0fc3182a03121af87446ca421b6c72baf07dfca0d?arch=arm64\u0026repository_url=registry.redhat.io/container-native-virtualization/virt-exportserver-rhel9\u0026tag=v4.13.0--2022-101182"
}
}
},
{
"category": "product_version",
"name": "container-native-virtualization/virt-handler-rhel9@sha256:5fc47110d866d8048aec50689090ce10705d19d3bb48d2b06727d6d569003af7_arm64",
"product": {
"name": "container-native-virtualization/virt-handler-rhel9@sha256:5fc47110d866d8048aec50689090ce10705d19d3bb48d2b06727d6d569003af7_arm64",
"product_id": "container-native-virtualization/virt-handler-rhel9@sha256:5fc47110d866d8048aec50689090ce10705d19d3bb48d2b06727d6d569003af7_arm64",
"product_identification_helper": {
"purl": "pkg:oci/virt-handler-rhel9@sha256:5fc47110d866d8048aec50689090ce10705d19d3bb48d2b06727d6d569003af7?arch=arm64\u0026repository_url=registry.redhat.io/container-native-virtualization/virt-handler-rhel9\u0026tag=v4.13.0--2022-101182"
}
}
},
{
"category": "product_version",
"name": "container-native-virtualization/virtio-win-rhel9@sha256:8735f51da918408a8826601c082d1b29accf26d59b9978da89b980cb509c1102_arm64",
"product": {
"name": "container-native-virtualization/virtio-win-rhel9@sha256:8735f51da918408a8826601c082d1b29accf26d59b9978da89b980cb509c1102_arm64",
"product_id": "container-native-virtualization/virtio-win-rhel9@sha256:8735f51da918408a8826601c082d1b29accf26d59b9978da89b980cb509c1102_arm64",
"product_identification_helper": {
"purl": "pkg:oci/virtio-win-rhel9@sha256:8735f51da918408a8826601c082d1b29accf26d59b9978da89b980cb509c1102?arch=arm64\u0026repository_url=registry.redhat.io/container-native-virtualization/virtio-win-rhel9\u0026tag=v4.13.0--2022-101182"
}
}
},
{
"category": "product_version",
"name": "container-native-virtualization/virt-launcher-rhel9@sha256:95aeacb98209e0baef27ce0e02fbac38d693cea74808fc77107efda0f344bcb5_arm64",
"product": {
"name": "container-native-virtualization/virt-launcher-rhel9@sha256:95aeacb98209e0baef27ce0e02fbac38d693cea74808fc77107efda0f344bcb5_arm64",
"product_id": "container-native-virtualization/virt-launcher-rhel9@sha256:95aeacb98209e0baef27ce0e02fbac38d693cea74808fc77107efda0f344bcb5_arm64",
"product_identification_helper": {
"purl": "pkg:oci/virt-launcher-rhel9@sha256:95aeacb98209e0baef27ce0e02fbac38d693cea74808fc77107efda0f344bcb5?arch=arm64\u0026repository_url=registry.redhat.io/container-native-virtualization/virt-launcher-rhel9\u0026tag=v4.13.0--2022-101182"
}
}
},
{
"category": "product_version",
"name": "container-native-virtualization/virt-operator-rhel9@sha256:66b1b3b379121d6411ba22283e7d991617177330c93746d37753ab7812b9a00b_arm64",
"product": {
"name": "container-native-virtualization/virt-operator-rhel9@sha256:66b1b3b379121d6411ba22283e7d991617177330c93746d37753ab7812b9a00b_arm64",
"product_id": "container-native-virtualization/virt-operator-rhel9@sha256:66b1b3b379121d6411ba22283e7d991617177330c93746d37753ab7812b9a00b_arm64",
"product_identification_helper": {
"purl": "pkg:oci/virt-operator-rhel9@sha256:66b1b3b379121d6411ba22283e7d991617177330c93746d37753ab7812b9a00b?arch=arm64\u0026repository_url=registry.redhat.io/container-native-virtualization/virt-operator-rhel9\u0026tag=v4.13.0--2022-101182"
}
}
},
{
"category": "product_version",
"name": "container-native-virtualization/vm-console-proxy-rhel9@sha256:70a8d0cd66182c25e02679540bae1368b2a9cf687532b58dba41ef30c5ca00c1_arm64",
"product": {
"name": "container-native-virtualization/vm-console-proxy-rhel9@sha256:70a8d0cd66182c25e02679540bae1368b2a9cf687532b58dba41ef30c5ca00c1_arm64",
"product_id": "container-native-virtualization/vm-console-proxy-rhel9@sha256:70a8d0cd66182c25e02679540bae1368b2a9cf687532b58dba41ef30c5ca00c1_arm64",
"product_identification_helper": {
"purl": "pkg:oci/vm-console-proxy-rhel9@sha256:70a8d0cd66182c25e02679540bae1368b2a9cf687532b58dba41ef30c5ca00c1?arch=arm64\u0026repository_url=registry.redhat.io/container-native-virtualization/vm-console-proxy-rhel9\u0026tag=v4.13.0--2022-101182"
}
}
},
{
"category": "product_version",
"name": "container-native-virtualization/vm-network-latency-checkup-rhel9@sha256:503ea7ac914a9b54e9d665a0227ee0b5d5200cdb5d692aa94c07dd1518d91b70_arm64",
"product": {
"name": "container-native-virtualization/vm-network-latency-checkup-rhel9@sha256:503ea7ac914a9b54e9d665a0227ee0b5d5200cdb5d692aa94c07dd1518d91b70_arm64",
"product_id": "container-native-virtualization/vm-network-latency-checkup-rhel9@sha256:503ea7ac914a9b54e9d665a0227ee0b5d5200cdb5d692aa94c07dd1518d91b70_arm64",
"product_identification_helper": {
"purl": "pkg:oci/vm-network-latency-checkup-rhel9@sha256:503ea7ac914a9b54e9d665a0227ee0b5d5200cdb5d692aa94c07dd1518d91b70?arch=arm64\u0026repository_url=registry.redhat.io/container-native-virtualization/vm-network-latency-checkup-rhel9\u0026tag=v4.13.0--2022-101182"
}
}
}
],
"category": "architecture",
"name": "arm64"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "container-native-virtualization/bridge-marker-rhel9@sha256:8eac196b30a648989cdca5cb153a3bc3d34e47339acba0e4f760bd366496c99d_amd64 as a component of CNV 4.13 for RHEL 9",
"product_id": "9Base-CNV-4.13:container-native-virtualization/bridge-marker-rhel9@sha256:8eac196b30a648989cdca5cb153a3bc3d34e47339acba0e4f760bd366496c99d_amd64"
},
"product_reference": "container-native-virtualization/bridge-marker-rhel9@sha256:8eac196b30a648989cdca5cb153a3bc3d34e47339acba0e4f760bd366496c99d_amd64",
"relates_to_product_reference": "9Base-CNV-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "container-native-virtualization/bridge-marker-rhel9@sha256:e8a55aee3d75a316bb0d7a554c737198823df04b3c05e481c17e45eb2153bced_arm64 as a component of CNV 4.13 for RHEL 9",
"product_id": "9Base-CNV-4.13:container-native-virtualization/bridge-marker-rhel9@sha256:e8a55aee3d75a316bb0d7a554c737198823df04b3c05e481c17e45eb2153bced_arm64"
},
"product_reference": "container-native-virtualization/bridge-marker-rhel9@sha256:e8a55aee3d75a316bb0d7a554c737198823df04b3c05e481c17e45eb2153bced_arm64",
"relates_to_product_reference": "9Base-CNV-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "container-native-virtualization/cluster-network-addons-operator-rhel9@sha256:3bff33e3f40cd1e2b519c2db56734d4bb8df883e155c2f20b1cb9d3d184daec1_amd64 as a component of CNV 4.13 for RHEL 9",
"product_id": "9Base-CNV-4.13:container-native-virtualization/cluster-network-addons-operator-rhel9@sha256:3bff33e3f40cd1e2b519c2db56734d4bb8df883e155c2f20b1cb9d3d184daec1_amd64"
},
"product_reference": "container-native-virtualization/cluster-network-addons-operator-rhel9@sha256:3bff33e3f40cd1e2b519c2db56734d4bb8df883e155c2f20b1cb9d3d184daec1_amd64",
"relates_to_product_reference": "9Base-CNV-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "container-native-virtualization/cluster-network-addons-operator-rhel9@sha256:f439d2f420bb59eb1d5af14ce2002648d0cfc155d1a1466c8aac9b661fe902b8_arm64 as a component of CNV 4.13 for RHEL 9",
"product_id": "9Base-CNV-4.13:container-native-virtualization/cluster-network-addons-operator-rhel9@sha256:f439d2f420bb59eb1d5af14ce2002648d0cfc155d1a1466c8aac9b661fe902b8_arm64"
},
"product_reference": "container-native-virtualization/cluster-network-addons-operator-rhel9@sha256:f439d2f420bb59eb1d5af14ce2002648d0cfc155d1a1466c8aac9b661fe902b8_arm64",
"relates_to_product_reference": "9Base-CNV-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "container-native-virtualization/cnv-containernetworking-plugins-rhel9@sha256:89f22e541f61a660c9aa9f38ef58e80b84a0517f74e84292107fc252c25465c9_arm64 as a component of CNV 4.13 for RHEL 9",
"product_id": "9Base-CNV-4.13:container-native-virtualization/cnv-containernetworking-plugins-rhel9@sha256:89f22e541f61a660c9aa9f38ef58e80b84a0517f74e84292107fc252c25465c9_arm64"
},
"product_reference": "container-native-virtualization/cnv-containernetworking-plugins-rhel9@sha256:89f22e541f61a660c9aa9f38ef58e80b84a0517f74e84292107fc252c25465c9_arm64",
"relates_to_product_reference": "9Base-CNV-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "container-native-virtualization/cnv-containernetworking-plugins-rhel9@sha256:bf471997e54e4a75b0d71f492ab295787fdbb14d8c85c4ea8c03f0552dbc3755_amd64 as a component of CNV 4.13 for RHEL 9",
"product_id": "9Base-CNV-4.13:container-native-virtualization/cnv-containernetworking-plugins-rhel9@sha256:bf471997e54e4a75b0d71f492ab295787fdbb14d8c85c4ea8c03f0552dbc3755_amd64"
},
"product_reference": "container-native-virtualization/cnv-containernetworking-plugins-rhel9@sha256:bf471997e54e4a75b0d71f492ab295787fdbb14d8c85c4ea8c03f0552dbc3755_amd64",
"relates_to_product_reference": "9Base-CNV-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "container-native-virtualization/cnv-must-gather-rhel9@sha256:9e8efd76924958eb605401abdac08eba97fb83a1ada383bc87a7fb7c87b3a455_arm64 as a component of CNV 4.13 for RHEL 9",
"product_id": "9Base-CNV-4.13:container-native-virtualization/cnv-must-gather-rhel9@sha256:9e8efd76924958eb605401abdac08eba97fb83a1ada383bc87a7fb7c87b3a455_arm64"
},
"product_reference": "container-native-virtualization/cnv-must-gather-rhel9@sha256:9e8efd76924958eb605401abdac08eba97fb83a1ada383bc87a7fb7c87b3a455_arm64",
"relates_to_product_reference": "9Base-CNV-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "container-native-virtualization/cnv-must-gather-rhel9@sha256:b9fc32b5fabedd65a4c3a471879c808af2087277de4278adaa115a732f0468da_amd64 as a component of CNV 4.13 for RHEL 9",
"product_id": "9Base-CNV-4.13:container-native-virtualization/cnv-must-gather-rhel9@sha256:b9fc32b5fabedd65a4c3a471879c808af2087277de4278adaa115a732f0468da_amd64"
},
"product_reference": "container-native-virtualization/cnv-must-gather-rhel9@sha256:b9fc32b5fabedd65a4c3a471879c808af2087277de4278adaa115a732f0468da_amd64",
"relates_to_product_reference": "9Base-CNV-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "container-native-virtualization/hco-bundle-registry-rhel9@sha256:60e89d7a99ff9f20e974430b802dd724a3bb6fa1e01e5a62daad98ac487b3063_amd64 as a component of CNV 4.13 for RHEL 9",
"product_id": "9Base-CNV-4.13:container-native-virtualization/hco-bundle-registry-rhel9@sha256:60e89d7a99ff9f20e974430b802dd724a3bb6fa1e01e5a62daad98ac487b3063_amd64"
},
"product_reference": "container-native-virtualization/hco-bundle-registry-rhel9@sha256:60e89d7a99ff9f20e974430b802dd724a3bb6fa1e01e5a62daad98ac487b3063_amd64",
"relates_to_product_reference": "9Base-CNV-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "container-native-virtualization/hco-bundle-registry-rhel9@sha256:dd20b138045ef1424d83a47e7abcfcbb2ac54577dcec5ed3c186390aaa4c9d84_arm64 as a component of CNV 4.13 for RHEL 9",
"product_id": "9Base-CNV-4.13:container-native-virtualization/hco-bundle-registry-rhel9@sha256:dd20b138045ef1424d83a47e7abcfcbb2ac54577dcec5ed3c186390aaa4c9d84_arm64"
},
"product_reference": "container-native-virtualization/hco-bundle-registry-rhel9@sha256:dd20b138045ef1424d83a47e7abcfcbb2ac54577dcec5ed3c186390aaa4c9d84_arm64",
"relates_to_product_reference": "9Base-CNV-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "container-native-virtualization/hostpath-csi-driver-rhel9@sha256:61e2824853d51347593ad909a5e546cd92e4216d6a1df5dffb50dd9cba277cce_amd64 as a component of CNV 4.13 for RHEL 9",
"product_id": "9Base-CNV-4.13:container-native-virtualization/hostpath-csi-driver-rhel9@sha256:61e2824853d51347593ad909a5e546cd92e4216d6a1df5dffb50dd9cba277cce_amd64"
},
"product_reference": "container-native-virtualization/hostpath-csi-driver-rhel9@sha256:61e2824853d51347593ad909a5e546cd92e4216d6a1df5dffb50dd9cba277cce_amd64",
"relates_to_product_reference": "9Base-CNV-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "container-native-virtualization/hostpath-csi-driver-rhel9@sha256:676d4c23a5f60dd331728af056b0a6b2d3358ac88da23299b1a98dfaca8f288e_arm64 as a component of CNV 4.13 for RHEL 9",
"product_id": "9Base-CNV-4.13:container-native-virtualization/hostpath-csi-driver-rhel9@sha256:676d4c23a5f60dd331728af056b0a6b2d3358ac88da23299b1a98dfaca8f288e_arm64"
},
"product_reference": "container-native-virtualization/hostpath-csi-driver-rhel9@sha256:676d4c23a5f60dd331728af056b0a6b2d3358ac88da23299b1a98dfaca8f288e_arm64",
"relates_to_product_reference": "9Base-CNV-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "container-native-virtualization/hostpath-provisioner-operator-rhel9@sha256:515be94be496c67f5b8fd5f4832fe4385e56476e6589897d6b9fbb9bb2b00f32_amd64 as a component of CNV 4.13 for RHEL 9",
"product_id": "9Base-CNV-4.13:container-native-virtualization/hostpath-provisioner-operator-rhel9@sha256:515be94be496c67f5b8fd5f4832fe4385e56476e6589897d6b9fbb9bb2b00f32_amd64"
},
"product_reference": "container-native-virtualization/hostpath-provisioner-operator-rhel9@sha256:515be94be496c67f5b8fd5f4832fe4385e56476e6589897d6b9fbb9bb2b00f32_amd64",
"relates_to_product_reference": "9Base-CNV-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "container-native-virtualization/hostpath-provisioner-operator-rhel9@sha256:571ae805641dea11646028c946039983c7fd82f138b915dcb8b80c39b465e63c_arm64 as a component of CNV 4.13 for RHEL 9",
"product_id": "9Base-CNV-4.13:container-native-virtualization/hostpath-provisioner-operator-rhel9@sha256:571ae805641dea11646028c946039983c7fd82f138b915dcb8b80c39b465e63c_arm64"
},
"product_reference": "container-native-virtualization/hostpath-provisioner-operator-rhel9@sha256:571ae805641dea11646028c946039983c7fd82f138b915dcb8b80c39b465e63c_arm64",
"relates_to_product_reference": "9Base-CNV-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "container-native-virtualization/hostpath-provisioner-rhel9@sha256:ac3fe350bedd6bc43596444ba0f279ccf8a144ab14ac5a9b80ea71c46390b7b4_amd64 as a component of CNV 4.13 for RHEL 9",
"product_id": "9Base-CNV-4.13:container-native-virtualization/hostpath-provisioner-rhel9@sha256:ac3fe350bedd6bc43596444ba0f279ccf8a144ab14ac5a9b80ea71c46390b7b4_amd64"
},
"product_reference": "container-native-virtualization/hostpath-provisioner-rhel9@sha256:ac3fe350bedd6bc43596444ba0f279ccf8a144ab14ac5a9b80ea71c46390b7b4_amd64",
"relates_to_product_reference": "9Base-CNV-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "container-native-virtualization/hostpath-provisioner-rhel9@sha256:d4ed87745b7ee2acca2d83e2c91c2f6dced1903c81495b50f2559b3ba2dde287_arm64 as a component of CNV 4.13 for RHEL 9",
"product_id": "9Base-CNV-4.13:container-native-virtualization/hostpath-provisioner-rhel9@sha256:d4ed87745b7ee2acca2d83e2c91c2f6dced1903c81495b50f2559b3ba2dde287_arm64"
},
"product_reference": "container-native-virtualization/hostpath-provisioner-rhel9@sha256:d4ed87745b7ee2acca2d83e2c91c2f6dced1903c81495b50f2559b3ba2dde287_arm64",
"relates_to_product_reference": "9Base-CNV-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "container-native-virtualization/hyperconverged-cluster-operator-rhel9@sha256:e5ab9f3be59d3568e3d672ab374efb16990ccf92192eac4e1244b10fcd7423e2_amd64 as a component of CNV 4.13 for RHEL 9",
"product_id": "9Base-CNV-4.13:container-native-virtualization/hyperconverged-cluster-operator-rhel9@sha256:e5ab9f3be59d3568e3d672ab374efb16990ccf92192eac4e1244b10fcd7423e2_amd64"
},
"product_reference": "container-native-virtualization/hyperconverged-cluster-operator-rhel9@sha256:e5ab9f3be59d3568e3d672ab374efb16990ccf92192eac4e1244b10fcd7423e2_amd64",
"relates_to_product_reference": "9Base-CNV-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "container-native-virtualization/hyperconverged-cluster-operator-rhel9@sha256:e681560b184189df03fc84c8a712f32289f42573dd348cda394b19565eb6eca8_arm64 as a component of CNV 4.13 for RHEL 9",
"product_id": "9Base-CNV-4.13:container-native-virtualization/hyperconverged-cluster-operator-rhel9@sha256:e681560b184189df03fc84c8a712f32289f42573dd348cda394b19565eb6eca8_arm64"
},
"product_reference": "container-native-virtualization/hyperconverged-cluster-operator-rhel9@sha256:e681560b184189df03fc84c8a712f32289f42573dd348cda394b19565eb6eca8_arm64",
"relates_to_product_reference": "9Base-CNV-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "container-native-virtualization/hyperconverged-cluster-webhook-rhel9@sha256:06d036d320b3027bb8370bb8e0f6fe8c9f0ec9bca7aac3b5c53698ba4a170042_arm64 as a component of CNV 4.13 for RHEL 9",
"product_id": "9Base-CNV-4.13:container-native-virtualization/hyperconverged-cluster-webhook-rhel9@sha256:06d036d320b3027bb8370bb8e0f6fe8c9f0ec9bca7aac3b5c53698ba4a170042_arm64"
},
"product_reference": "container-native-virtualization/hyperconverged-cluster-webhook-rhel9@sha256:06d036d320b3027bb8370bb8e0f6fe8c9f0ec9bca7aac3b5c53698ba4a170042_arm64",
"relates_to_product_reference": "9Base-CNV-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "container-native-virtualization/hyperconverged-cluster-webhook-rhel9@sha256:b5a01336180aad017df62cf8e652f2491b8263ba7e4dd07f858db1ef1924cf2f_amd64 as a component of CNV 4.13 for RHEL 9",
"product_id": "9Base-CNV-4.13:container-native-virtualization/hyperconverged-cluster-webhook-rhel9@sha256:b5a01336180aad017df62cf8e652f2491b8263ba7e4dd07f858db1ef1924cf2f_amd64"
},
"product_reference": "container-native-virtualization/hyperconverged-cluster-webhook-rhel9@sha256:b5a01336180aad017df62cf8e652f2491b8263ba7e4dd07f858db1ef1924cf2f_amd64",
"relates_to_product_reference": "9Base-CNV-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "container-native-virtualization/kubemacpool-rhel9@sha256:4d190d81eeb3fbe9ed56cf3548dc83a3f81641bfdafa7b42dcfb0d2512566644_amd64 as a component of CNV 4.13 for RHEL 9",
"product_id": "9Base-CNV-4.13:container-native-virtualization/kubemacpool-rhel9@sha256:4d190d81eeb3fbe9ed56cf3548dc83a3f81641bfdafa7b42dcfb0d2512566644_amd64"
},
"product_reference": "container-native-virtualization/kubemacpool-rhel9@sha256:4d190d81eeb3fbe9ed56cf3548dc83a3f81641bfdafa7b42dcfb0d2512566644_amd64",
"relates_to_product_reference": "9Base-CNV-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "container-native-virtualization/kubemacpool-rhel9@sha256:59862a59854f0d5b83dc25ba119f9586a8aff42b6e60d1922f8ae7b4567309ff_arm64 as a component of CNV 4.13 for RHEL 9",
"product_id": "9Base-CNV-4.13:container-native-virtualization/kubemacpool-rhel9@sha256:59862a59854f0d5b83dc25ba119f9586a8aff42b6e60d1922f8ae7b4567309ff_arm64"
},
"product_reference": "container-native-virtualization/kubemacpool-rhel9@sha256:59862a59854f0d5b83dc25ba119f9586a8aff42b6e60d1922f8ae7b4567309ff_arm64",
"relates_to_product_reference": "9Base-CNV-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "container-native-virtualization/kubesecondarydns-rhel9@sha256:121d30d78cc57731ea2242ef2c32430890ac66c2723e65608d5e2f26c3f515cd_amd64 as a component of CNV 4.13 for RHEL 9",
"product_id": "9Base-CNV-4.13:container-native-virtualization/kubesecondarydns-rhel9@sha256:121d30d78cc57731ea2242ef2c32430890ac66c2723e65608d5e2f26c3f515cd_amd64"
},
"product_reference": "container-native-virtualization/kubesecondarydns-rhel9@sha256:121d30d78cc57731ea2242ef2c32430890ac66c2723e65608d5e2f26c3f515cd_amd64",
"relates_to_product_reference": "9Base-CNV-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "container-native-virtualization/kubesecondarydns-rhel9@sha256:b1838f3c8ba3d8113bddea17b78c21e1c1490e2a4a07ea77014edee523d06347_arm64 as a component of CNV 4.13 for RHEL 9",
"product_id": "9Base-CNV-4.13:container-native-virtualization/kubesecondarydns-rhel9@sha256:b1838f3c8ba3d8113bddea17b78c21e1c1490e2a4a07ea77014edee523d06347_arm64"
},
"product_reference": "container-native-virtualization/kubesecondarydns-rhel9@sha256:b1838f3c8ba3d8113bddea17b78c21e1c1490e2a4a07ea77014edee523d06347_arm64",
"relates_to_product_reference": "9Base-CNV-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "container-native-virtualization/kubevirt-console-plugin-rhel9@sha256:86a4b1e3d6ad1d56302c9c058f8bc5826dcfe6c46fb3e0ddaa06818645039020_amd64 as a component of CNV 4.13 for RHEL 9",
"product_id": "9Base-CNV-4.13:container-native-virtualization/kubevirt-console-plugin-rhel9@sha256:86a4b1e3d6ad1d56302c9c058f8bc5826dcfe6c46fb3e0ddaa06818645039020_amd64"
},
"product_reference": "container-native-virtualization/kubevirt-console-plugin-rhel9@sha256:86a4b1e3d6ad1d56302c9c058f8bc5826dcfe6c46fb3e0ddaa06818645039020_amd64",
"relates_to_product_reference": "9Base-CNV-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "container-native-virtualization/kubevirt-console-plugin-rhel9@sha256:ffb2acd9ae09c1ef9ca756f5eaf6087d0a3957cfc824543949d25f556a97744d_arm64 as a component of CNV 4.13 for RHEL 9",
"product_id": "9Base-CNV-4.13:container-native-virtualization/kubevirt-console-plugin-rhel9@sha256:ffb2acd9ae09c1ef9ca756f5eaf6087d0a3957cfc824543949d25f556a97744d_arm64"
},
"product_reference": "container-native-virtualization/kubevirt-console-plugin-rhel9@sha256:ffb2acd9ae09c1ef9ca756f5eaf6087d0a3957cfc824543949d25f556a97744d_arm64",
"relates_to_product_reference": "9Base-CNV-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "container-native-virtualization/kubevirt-dpdk-checkup-rhel9@sha256:525aceb9396010ebcdba14040f267889b807cd84db8e5b4030429b51f0fbf5fe_arm64 as a component of CNV 4.13 for RHEL 9",
"product_id": "9Base-CNV-4.13:container-native-virtualization/kubevirt-dpdk-checkup-rhel9@sha256:525aceb9396010ebcdba14040f267889b807cd84db8e5b4030429b51f0fbf5fe_arm64"
},
"product_reference": "container-native-virtualization/kubevirt-dpdk-checkup-rhel9@sha256:525aceb9396010ebcdba14040f267889b807cd84db8e5b4030429b51f0fbf5fe_arm64",
"relates_to_product_reference": "9Base-CNV-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "container-native-virtualization/kubevirt-dpdk-checkup-rhel9@sha256:553c4686f56c66cc1e3c5ad9d4051f139d43f821eac3abb98ca5cdb8b5dfe202_amd64 as a component of CNV 4.13 for RHEL 9",
"product_id": "9Base-CNV-4.13:container-native-virtualization/kubevirt-dpdk-checkup-rhel9@sha256:553c4686f56c66cc1e3c5ad9d4051f139d43f821eac3abb98ca5cdb8b5dfe202_amd64"
},
"product_reference": "container-native-virtualization/kubevirt-dpdk-checkup-rhel9@sha256:553c4686f56c66cc1e3c5ad9d4051f139d43f821eac3abb98ca5cdb8b5dfe202_amd64",
"relates_to_product_reference": "9Base-CNV-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "container-native-virtualization/kubevirt-ssp-operator-rhel9@sha256:901e6cad9534c7bd7c4018c60bccfe49d7280fba5a9901ab4c4d15e9345288c4_amd64 as a component of CNV 4.13 for RHEL 9",
"product_id": "9Base-CNV-4.13:container-native-virtualization/kubevirt-ssp-operator-rhel9@sha256:901e6cad9534c7bd7c4018c60bccfe49d7280fba5a9901ab4c4d15e9345288c4_amd64"
},
"product_reference": "container-native-virtualization/kubevirt-ssp-operator-rhel9@sha256:901e6cad9534c7bd7c4018c60bccfe49d7280fba5a9901ab4c4d15e9345288c4_amd64",
"relates_to_product_reference": "9Base-CNV-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "container-native-virtualization/kubevirt-ssp-operator-rhel9@sha256:badeb0f65f543b209f6af761729d9778b7b73b97d55044016dfba3f38a1f6f18_arm64 as a component of CNV 4.13 for RHEL 9",
"product_id": "9Base-CNV-4.13:container-native-virtualization/kubevirt-ssp-operator-rhel9@sha256:badeb0f65f543b209f6af761729d9778b7b73b97d55044016dfba3f38a1f6f18_arm64"
},
"product_reference": "container-native-virtualization/kubevirt-ssp-operator-rhel9@sha256:badeb0f65f543b209f6af761729d9778b7b73b97d55044016dfba3f38a1f6f18_arm64",
"relates_to_product_reference": "9Base-CNV-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "container-native-virtualization/kubevirt-tekton-tasks-cleanup-vm-rhel9@sha256:28e4975fa4dac22d9da32ed2a10aed039fd957b30140daa36bab2caa998be77a_amd64 as a component of CNV 4.13 for RHEL 9",
"product_id": "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-cleanup-vm-rhel9@sha256:28e4975fa4dac22d9da32ed2a10aed039fd957b30140daa36bab2caa998be77a_amd64"
},
"product_reference": "container-native-virtualization/kubevirt-tekton-tasks-cleanup-vm-rhel9@sha256:28e4975fa4dac22d9da32ed2a10aed039fd957b30140daa36bab2caa998be77a_amd64",
"relates_to_product_reference": "9Base-CNV-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "container-native-virtualization/kubevirt-tekton-tasks-cleanup-vm-rhel9@sha256:b0ff7e812a576ea848590655fc13a85832d5a39f68e7769ceab9da6949da88c7_arm64 as a component of CNV 4.13 for RHEL 9",
"product_id": "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-cleanup-vm-rhel9@sha256:b0ff7e812a576ea848590655fc13a85832d5a39f68e7769ceab9da6949da88c7_arm64"
},
"product_reference": "container-native-virtualization/kubevirt-tekton-tasks-cleanup-vm-rhel9@sha256:b0ff7e812a576ea848590655fc13a85832d5a39f68e7769ceab9da6949da88c7_arm64",
"relates_to_product_reference": "9Base-CNV-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "container-native-virtualization/kubevirt-tekton-tasks-copy-template-rhel9@sha256:4916a6c6b1f9b529187d3b4d5fc99b90157993767b3fe2ad36a9ec77fbb46b10_arm64 as a component of CNV 4.13 for RHEL 9",
"product_id": "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-copy-template-rhel9@sha256:4916a6c6b1f9b529187d3b4d5fc99b90157993767b3fe2ad36a9ec77fbb46b10_arm64"
},
"product_reference": "container-native-virtualization/kubevirt-tekton-tasks-copy-template-rhel9@sha256:4916a6c6b1f9b529187d3b4d5fc99b90157993767b3fe2ad36a9ec77fbb46b10_arm64",
"relates_to_product_reference": "9Base-CNV-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "container-native-virtualization/kubevirt-tekton-tasks-copy-template-rhel9@sha256:f71c36442f1b61cdde7ec58d2c3c78d2039f6d6108e6c35388ef7c1650971fa1_amd64 as a component of CNV 4.13 for RHEL 9",
"product_id": "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-copy-template-rhel9@sha256:f71c36442f1b61cdde7ec58d2c3c78d2039f6d6108e6c35388ef7c1650971fa1_amd64"
},
"product_reference": "container-native-virtualization/kubevirt-tekton-tasks-copy-template-rhel9@sha256:f71c36442f1b61cdde7ec58d2c3c78d2039f6d6108e6c35388ef7c1650971fa1_amd64",
"relates_to_product_reference": "9Base-CNV-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "container-native-virtualization/kubevirt-tekton-tasks-create-datavolume-rhel9@sha256:2ad49cf6e2242a9e5861929d9bcab1305a7fc4e34e708f99cff1d7253aa46167_amd64 as a component of CNV 4.13 for RHEL 9",
"product_id": "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-create-datavolume-rhel9@sha256:2ad49cf6e2242a9e5861929d9bcab1305a7fc4e34e708f99cff1d7253aa46167_amd64"
},
"product_reference": "container-native-virtualization/kubevirt-tekton-tasks-create-datavolume-rhel9@sha256:2ad49cf6e2242a9e5861929d9bcab1305a7fc4e34e708f99cff1d7253aa46167_amd64",
"relates_to_product_reference": "9Base-CNV-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "container-native-virtualization/kubevirt-tekton-tasks-create-datavolume-rhel9@sha256:7112400a4ecb23ee2110bf96372fcf9f96ad648a51aa944627b40eb59539a660_arm64 as a component of CNV 4.13 for RHEL 9",
"product_id": "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-create-datavolume-rhel9@sha256:7112400a4ecb23ee2110bf96372fcf9f96ad648a51aa944627b40eb59539a660_arm64"
},
"product_reference": "container-native-virtualization/kubevirt-tekton-tasks-create-datavolume-rhel9@sha256:7112400a4ecb23ee2110bf96372fcf9f96ad648a51aa944627b40eb59539a660_arm64",
"relates_to_product_reference": "9Base-CNV-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "container-native-virtualization/kubevirt-tekton-tasks-create-vm-from-template-rhel9@sha256:1411c65bbad7302710788327f6964a4bf5bc20ef70d5e46f4a5c6e7a0e7a0161_amd64 as a component of CNV 4.13 for RHEL 9",
"product_id": "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-create-vm-from-template-rhel9@sha256:1411c65bbad7302710788327f6964a4bf5bc20ef70d5e46f4a5c6e7a0e7a0161_amd64"
},
"product_reference": "container-native-virtualization/kubevirt-tekton-tasks-create-vm-from-template-rhel9@sha256:1411c65bbad7302710788327f6964a4bf5bc20ef70d5e46f4a5c6e7a0e7a0161_amd64",
"relates_to_product_reference": "9Base-CNV-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "container-native-virtualization/kubevirt-tekton-tasks-create-vm-from-template-rhel9@sha256:4d962618aa95600c60c9fc8b890186e510de91177d51949e12797a3558e31328_arm64 as a component of CNV 4.13 for RHEL 9",
"product_id": "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-create-vm-from-template-rhel9@sha256:4d962618aa95600c60c9fc8b890186e510de91177d51949e12797a3558e31328_arm64"
},
"product_reference": "container-native-virtualization/kubevirt-tekton-tasks-create-vm-from-template-rhel9@sha256:4d962618aa95600c60c9fc8b890186e510de91177d51949e12797a3558e31328_arm64",
"relates_to_product_reference": "9Base-CNV-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "container-native-virtualization/kubevirt-tekton-tasks-disk-virt-customize-rhel9@sha256:5c23d3f20ea9dcbe7109284d73078ecd516a070e964b844f8d80b1d92ebd55ee_amd64 as a component of CNV 4.13 for RHEL 9",
"product_id": "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-customize-rhel9@sha256:5c23d3f20ea9dcbe7109284d73078ecd516a070e964b844f8d80b1d92ebd55ee_amd64"
},
"product_reference": "container-native-virtualization/kubevirt-tekton-tasks-disk-virt-customize-rhel9@sha256:5c23d3f20ea9dcbe7109284d73078ecd516a070e964b844f8d80b1d92ebd55ee_amd64",
"relates_to_product_reference": "9Base-CNV-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "container-native-virtualization/kubevirt-tekton-tasks-disk-virt-customize-rhel9@sha256:a780244e48c6d4f87446d3754c3eb9ab79c0d54675c189da4a659f7a4d5668ea_arm64 as a component of CNV 4.13 for RHEL 9",
"product_id": "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-customize-rhel9@sha256:a780244e48c6d4f87446d3754c3eb9ab79c0d54675c189da4a659f7a4d5668ea_arm64"
},
"product_reference": "container-native-virtualization/kubevirt-tekton-tasks-disk-virt-customize-rhel9@sha256:a780244e48c6d4f87446d3754c3eb9ab79c0d54675c189da4a659f7a4d5668ea_arm64",
"relates_to_product_reference": "9Base-CNV-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "container-native-virtualization/kubevirt-tekton-tasks-disk-virt-sysprep-rhel9@sha256:84577d949a1bbcaa291c70729127bca4a8994df03068666baa23840877ea8392_arm64 as a component of CNV 4.13 for RHEL 9",
"product_id": "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-sysprep-rhel9@sha256:84577d949a1bbcaa291c70729127bca4a8994df03068666baa23840877ea8392_arm64"
},
"product_reference": "container-native-virtualization/kubevirt-tekton-tasks-disk-virt-sysprep-rhel9@sha256:84577d949a1bbcaa291c70729127bca4a8994df03068666baa23840877ea8392_arm64",
"relates_to_product_reference": "9Base-CNV-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "container-native-virtualization/kubevirt-tekton-tasks-disk-virt-sysprep-rhel9@sha256:aed630a597a090179e1b0e0c117e536df06b67d0f793f91936aa7388c0c5d7eb_amd64 as a component of CNV 4.13 for RHEL 9",
"product_id": "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-sysprep-rhel9@sha256:aed630a597a090179e1b0e0c117e536df06b67d0f793f91936aa7388c0c5d7eb_amd64"
},
"product_reference": "container-native-virtualization/kubevirt-tekton-tasks-disk-virt-sysprep-rhel9@sha256:aed630a597a090179e1b0e0c117e536df06b67d0f793f91936aa7388c0c5d7eb_amd64",
"relates_to_product_reference": "9Base-CNV-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "container-native-virtualization/kubevirt-tekton-tasks-modify-vm-template-rhel9@sha256:31d959b80cf57462e1705684bb7e1b78af26bd2c62f1c9e4e51e1d02199b05a8_arm64 as a component of CNV 4.13 for RHEL 9",
"product_id": "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-modify-vm-template-rhel9@sha256:31d959b80cf57462e1705684bb7e1b78af26bd2c62f1c9e4e51e1d02199b05a8_arm64"
},
"product_reference": "container-native-virtualization/kubevirt-tekton-tasks-modify-vm-template-rhel9@sha256:31d959b80cf57462e1705684bb7e1b78af26bd2c62f1c9e4e51e1d02199b05a8_arm64",
"relates_to_product_reference": "9Base-CNV-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "container-native-virtualization/kubevirt-tekton-tasks-modify-vm-template-rhel9@sha256:66aea526bc10e4c0136ba86e394bbdfe4fbd7f757d6f391a561b51d2ba2f4d46_amd64 as a component of CNV 4.13 for RHEL 9",
"product_id": "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-modify-vm-template-rhel9@sha256:66aea526bc10e4c0136ba86e394bbdfe4fbd7f757d6f391a561b51d2ba2f4d46_amd64"
},
"product_reference": "container-native-virtualization/kubevirt-tekton-tasks-modify-vm-template-rhel9@sha256:66aea526bc10e4c0136ba86e394bbdfe4fbd7f757d6f391a561b51d2ba2f4d46_amd64",
"relates_to_product_reference": "9Base-CNV-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "container-native-virtualization/kubevirt-tekton-tasks-operator-rhel9@sha256:d0cf0e81589f0938de45961eaddfc5ec4782738fd11082de0439b200534259eb_arm64 as a component of CNV 4.13 for RHEL 9",
"product_id": "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-operator-rhel9@sha256:d0cf0e81589f0938de45961eaddfc5ec4782738fd11082de0439b200534259eb_arm64"
},
"product_reference": "container-native-virtualization/kubevirt-tekton-tasks-operator-rhel9@sha256:d0cf0e81589f0938de45961eaddfc5ec4782738fd11082de0439b200534259eb_arm64",
"relates_to_product_reference": "9Base-CNV-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "container-native-virtualization/kubevirt-tekton-tasks-operator-rhel9@sha256:f1b1f5044db6bb945584f9d4f31d020597725a286ef368ed0aca2116abb31beb_amd64 as a component of CNV 4.13 for RHEL 9",
"product_id": "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-operator-rhel9@sha256:f1b1f5044db6bb945584f9d4f31d020597725a286ef368ed0aca2116abb31beb_amd64"
},
"product_reference": "container-native-virtualization/kubevirt-tekton-tasks-operator-rhel9@sha256:f1b1f5044db6bb945584f9d4f31d020597725a286ef368ed0aca2116abb31beb_amd64",
"relates_to_product_reference": "9Base-CNV-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "container-native-virtualization/kubevirt-tekton-tasks-wait-for-vmi-status-rhel9@sha256:39a15d03f113735df03b1a7408227eb9604d942c1f3c1992bcdc7eaf07662711_amd64 as a component of CNV 4.13 for RHEL 9",
"product_id": "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-wait-for-vmi-status-rhel9@sha256:39a15d03f113735df03b1a7408227eb9604d942c1f3c1992bcdc7eaf07662711_amd64"
},
"product_reference": "container-native-virtualization/kubevirt-tekton-tasks-wait-for-vmi-status-rhel9@sha256:39a15d03f113735df03b1a7408227eb9604d942c1f3c1992bcdc7eaf07662711_amd64",
"relates_to_product_reference": "9Base-CNV-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "container-native-virtualization/kubevirt-tekton-tasks-wait-for-vmi-status-rhel9@sha256:afb68af076954fcd18c7a4a1464ea0c2a766e8282eae980051906ed07eaa1707_arm64 as a component of CNV 4.13 for RHEL 9",
"product_id": "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-wait-for-vmi-status-rhel9@sha256:afb68af076954fcd18c7a4a1464ea0c2a766e8282eae980051906ed07eaa1707_arm64"
},
"product_reference": "container-native-virtualization/kubevirt-tekton-tasks-wait-for-vmi-status-rhel9@sha256:afb68af076954fcd18c7a4a1464ea0c2a766e8282eae980051906ed07eaa1707_arm64",
"relates_to_product_reference": "9Base-CNV-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "container-native-virtualization/kubevirt-template-validator-rhel9@sha256:02b22c7e7014b5e72d47fed8b6a268cf307638c5510adf3916c51f7f40a52a08_arm64 as a component of CNV 4.13 for RHEL 9",
"product_id": "9Base-CNV-4.13:container-native-virtualization/kubevirt-template-validator-rhel9@sha256:02b22c7e7014b5e72d47fed8b6a268cf307638c5510adf3916c51f7f40a52a08_arm64"
},
"product_reference": "container-native-virtualization/kubevirt-template-validator-rhel9@sha256:02b22c7e7014b5e72d47fed8b6a268cf307638c5510adf3916c51f7f40a52a08_arm64",
"relates_to_product_reference": "9Base-CNV-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "container-native-virtualization/kubevirt-template-validator-rhel9@sha256:c0264b9271e602f85b2040ef7f207cdfa46038dc4fa6e4738bf196ef88a71cf8_amd64 as a component of CNV 4.13 for RHEL 9",
"product_id": "9Base-CNV-4.13:container-native-virtualization/kubevirt-template-validator-rhel9@sha256:c0264b9271e602f85b2040ef7f207cdfa46038dc4fa6e4738bf196ef88a71cf8_amd64"
},
"product_reference": "container-native-virtualization/kubevirt-template-validator-rhel9@sha256:c0264b9271e602f85b2040ef7f207cdfa46038dc4fa6e4738bf196ef88a71cf8_amd64",
"relates_to_product_reference": "9Base-CNV-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "container-native-virtualization/libguestfs-tools-rhel9@sha256:29ae84575bbca24553cf649256759fd96ff286971d80bc2db129154a7df9b283_amd64 as a component of CNV 4.13 for RHEL 9",
"product_id": "9Base-CNV-4.13:container-native-virtualization/libguestfs-tools-rhel9@sha256:29ae84575bbca24553cf649256759fd96ff286971d80bc2db129154a7df9b283_amd64"
},
"product_reference": "container-native-virtualization/libguestfs-tools-rhel9@sha256:29ae84575bbca24553cf649256759fd96ff286971d80bc2db129154a7df9b283_amd64",
"relates_to_product_reference": "9Base-CNV-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "container-native-virtualization/libguestfs-tools-rhel9@sha256:6558f60343e068b032167e2340b2c549c5f0258acc5d2614b60966ce79408b01_arm64 as a component of CNV 4.13 for RHEL 9",
"product_id": "9Base-CNV-4.13:container-native-virtualization/libguestfs-tools-rhel9@sha256:6558f60343e068b032167e2340b2c549c5f0258acc5d2614b60966ce79408b01_arm64"
},
"product_reference": "container-native-virtualization/libguestfs-tools-rhel9@sha256:6558f60343e068b032167e2340b2c549c5f0258acc5d2614b60966ce79408b01_arm64",
"relates_to_product_reference": "9Base-CNV-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "container-native-virtualization/multus-dynamic-networks-rhel9@sha256:3ecb0162a4b01d1590bf209d717b32a4f0835910d9979823f18c24acba41b503_arm64 as a component of CNV 4.13 for RHEL 9",
"product_id": "9Base-CNV-4.13:container-native-virtualization/multus-dynamic-networks-rhel9@sha256:3ecb0162a4b01d1590bf209d717b32a4f0835910d9979823f18c24acba41b503_arm64"
},
"product_reference": "container-native-virtualization/multus-dynamic-networks-rhel9@sha256:3ecb0162a4b01d1590bf209d717b32a4f0835910d9979823f18c24acba41b503_arm64",
"relates_to_product_reference": "9Base-CNV-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "container-native-virtualization/multus-dynamic-networks-rhel9@sha256:b7f68b6420009e21380d32d6459193aae45e93be9533debe17cb3108571b36b8_amd64 as a component of CNV 4.13 for RHEL 9",
"product_id": "9Base-CNV-4.13:container-native-virtualization/multus-dynamic-networks-rhel9@sha256:b7f68b6420009e21380d32d6459193aae45e93be9533debe17cb3108571b36b8_amd64"
},
"product_reference": "container-native-virtualization/multus-dynamic-networks-rhel9@sha256:b7f68b6420009e21380d32d6459193aae45e93be9533debe17cb3108571b36b8_amd64",
"relates_to_product_reference": "9Base-CNV-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "container-native-virtualization/ovs-cni-plugin-rhel9@sha256:0f1d372f418744e0aff59ecb0a38f53178aac9c2e9eecfd38aa25ed83e0d1360_arm64 as a component of CNV 4.13 for RHEL 9",
"product_id": "9Base-CNV-4.13:container-native-virtualization/ovs-cni-plugin-rhel9@sha256:0f1d372f418744e0aff59ecb0a38f53178aac9c2e9eecfd38aa25ed83e0d1360_arm64"
},
"product_reference": "container-native-virtualization/ovs-cni-plugin-rhel9@sha256:0f1d372f418744e0aff59ecb0a38f53178aac9c2e9eecfd38aa25ed83e0d1360_arm64",
"relates_to_product_reference": "9Base-CNV-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "container-native-virtualization/ovs-cni-plugin-rhel9@sha256:e8e7a44edbf1713fe74de5c4b8f691cce78f4440c4a32a16ba9ad16694a55396_amd64 as a component of CNV 4.13 for RHEL 9",
"product_id": "9Base-CNV-4.13:container-native-virtualization/ovs-cni-plugin-rhel9@sha256:e8e7a44edbf1713fe74de5c4b8f691cce78f4440c4a32a16ba9ad16694a55396_amd64"
},
"product_reference": "container-native-virtualization/ovs-cni-plugin-rhel9@sha256:e8e7a44edbf1713fe74de5c4b8f691cce78f4440c4a32a16ba9ad16694a55396_amd64",
"relates_to_product_reference": "9Base-CNV-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "container-native-virtualization/virt-api-rhel9@sha256:e68416321ca8c74a547b3d35897f54813c03481143e402e9bdc4daf315e35b5d_arm64 as a component of CNV 4.13 for RHEL 9",
"product_id": "9Base-CNV-4.13:container-native-virtualization/virt-api-rhel9@sha256:e68416321ca8c74a547b3d35897f54813c03481143e402e9bdc4daf315e35b5d_arm64"
},
"product_reference": "container-native-virtualization/virt-api-rhel9@sha256:e68416321ca8c74a547b3d35897f54813c03481143e402e9bdc4daf315e35b5d_arm64",
"relates_to_product_reference": "9Base-CNV-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "container-native-virtualization/virt-api-rhel9@sha256:fdb4ca1bb8b310d713d9c7e88f7d091f4460aa942dbeca5ebcf17281a06daffe_amd64 as a component of CNV 4.13 for RHEL 9",
"product_id": "9Base-CNV-4.13:container-native-virtualization/virt-api-rhel9@sha256:fdb4ca1bb8b310d713d9c7e88f7d091f4460aa942dbeca5ebcf17281a06daffe_amd64"
},
"product_reference": "container-native-virtualization/virt-api-rhel9@sha256:fdb4ca1bb8b310d713d9c7e88f7d091f4460aa942dbeca5ebcf17281a06daffe_amd64",
"relates_to_product_reference": "9Base-CNV-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "container-native-virtualization/virt-artifacts-server-rhel9@sha256:33d11c1832b49df39c1fca62bad40dbc5c30a452248339aaef449ac99509accb_arm64 as a component of CNV 4.13 for RHEL 9",
"product_id": "9Base-CNV-4.13:container-native-virtualization/virt-artifacts-server-rhel9@sha256:33d11c1832b49df39c1fca62bad40dbc5c30a452248339aaef449ac99509accb_arm64"
},
"product_reference": "container-native-virtualization/virt-artifacts-server-rhel9@sha256:33d11c1832b49df39c1fca62bad40dbc5c30a452248339aaef449ac99509accb_arm64",
"relates_to_product_reference": "9Base-CNV-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "container-native-virtualization/virt-artifacts-server-rhel9@sha256:81fc61b714baecb5a89fa6c0749c14566e0661b8e184ca602fc2e03b9cf431ee_amd64 as a component of CNV 4.13 for RHEL 9",
"product_id": "9Base-CNV-4.13:container-native-virtualization/virt-artifacts-server-rhel9@sha256:81fc61b714baecb5a89fa6c0749c14566e0661b8e184ca602fc2e03b9cf431ee_amd64"
},
"product_reference": "container-native-virtualization/virt-artifacts-server-rhel9@sha256:81fc61b714baecb5a89fa6c0749c14566e0661b8e184ca602fc2e03b9cf431ee_amd64",
"relates_to_product_reference": "9Base-CNV-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "container-native-virtualization/virt-cdi-apiserver-rhel9@sha256:f6128a63344ed2129f5bce648ddcfaa2869d31cde4b93328d3c22534b97ade10_arm64 as a component of CNV 4.13 for RHEL 9",
"product_id": "9Base-CNV-4.13:container-native-virtualization/virt-cdi-apiserver-rhel9@sha256:f6128a63344ed2129f5bce648ddcfaa2869d31cde4b93328d3c22534b97ade10_arm64"
},
"product_reference": "container-native-virtualization/virt-cdi-apiserver-rhel9@sha256:f6128a63344ed2129f5bce648ddcfaa2869d31cde4b93328d3c22534b97ade10_arm64",
"relates_to_product_reference": "9Base-CNV-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "container-native-virtualization/virt-cdi-apiserver-rhel9@sha256:feca273a691d09445c6cff6d36b5d590735e867656a9898ce0d89744d98e8006_amd64 as a component of CNV 4.13 for RHEL 9",
"product_id": "9Base-CNV-4.13:container-native-virtualization/virt-cdi-apiserver-rhel9@sha256:feca273a691d09445c6cff6d36b5d590735e867656a9898ce0d89744d98e8006_amd64"
},
"product_reference": "container-native-virtualization/virt-cdi-apiserver-rhel9@sha256:feca273a691d09445c6cff6d36b5d590735e867656a9898ce0d89744d98e8006_amd64",
"relates_to_product_reference": "9Base-CNV-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "container-native-virtualization/virt-cdi-cloner-rhel9@sha256:68e3b9b0291b4fb277ac430269ffce11d13b0a7688cf2ffcdb7f98759c36b4db_amd64 as a component of CNV 4.13 for RHEL 9",
"product_id": "9Base-CNV-4.13:container-native-virtualization/virt-cdi-cloner-rhel9@sha256:68e3b9b0291b4fb277ac430269ffce11d13b0a7688cf2ffcdb7f98759c36b4db_amd64"
},
"product_reference": "container-native-virtualization/virt-cdi-cloner-rhel9@sha256:68e3b9b0291b4fb277ac430269ffce11d13b0a7688cf2ffcdb7f98759c36b4db_amd64",
"relates_to_product_reference": "9Base-CNV-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "container-native-virtualization/virt-cdi-cloner-rhel9@sha256:6ac212767481bef64d8a7d0252bb8089c0f9751fad4a355aef71bd49dad2ad07_arm64 as a component of CNV 4.13 for RHEL 9",
"product_id": "9Base-CNV-4.13:container-native-virtualization/virt-cdi-cloner-rhel9@sha256:6ac212767481bef64d8a7d0252bb8089c0f9751fad4a355aef71bd49dad2ad07_arm64"
},
"product_reference": "container-native-virtualization/virt-cdi-cloner-rhel9@sha256:6ac212767481bef64d8a7d0252bb8089c0f9751fad4a355aef71bd49dad2ad07_arm64",
"relates_to_product_reference": "9Base-CNV-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "container-native-virtualization/virt-cdi-controller-rhel9@sha256:65f5263275d9f0a12b8fb057d82adf678778039ec873ca9bde182dea3413c9f1_arm64 as a component of CNV 4.13 for RHEL 9",
"product_id": "9Base-CNV-4.13:container-native-virtualization/virt-cdi-controller-rhel9@sha256:65f5263275d9f0a12b8fb057d82adf678778039ec873ca9bde182dea3413c9f1_arm64"
},
"product_reference": "container-native-virtualization/virt-cdi-controller-rhel9@sha256:65f5263275d9f0a12b8fb057d82adf678778039ec873ca9bde182dea3413c9f1_arm64",
"relates_to_product_reference": "9Base-CNV-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "container-native-virtualization/virt-cdi-controller-rhel9@sha256:d9e62b2019328be258489ac852eef25f8b1233f29abac6bcea5b406329f97fed_amd64 as a component of CNV 4.13 for RHEL 9",
"product_id": "9Base-CNV-4.13:container-native-virtualization/virt-cdi-controller-rhel9@sha256:d9e62b2019328be258489ac852eef25f8b1233f29abac6bcea5b406329f97fed_amd64"
},
"product_reference": "container-native-virtualization/virt-cdi-controller-rhel9@sha256:d9e62b2019328be258489ac852eef25f8b1233f29abac6bcea5b406329f97fed_amd64",
"relates_to_product_reference": "9Base-CNV-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "container-native-virtualization/virt-cdi-importer-rhel9@sha256:00a6d9d24ca1466d450b02269ec3144fc7550f0e5c696e869fbf7ce10cae6093_arm64 as a component of CNV 4.13 for RHEL 9",
"product_id": "9Base-CNV-4.13:container-native-virtualization/virt-cdi-importer-rhel9@sha256:00a6d9d24ca1466d450b02269ec3144fc7550f0e5c696e869fbf7ce10cae6093_arm64"
},
"product_reference": "container-native-virtualization/virt-cdi-importer-rhel9@sha256:00a6d9d24ca1466d450b02269ec3144fc7550f0e5c696e869fbf7ce10cae6093_arm64",
"relates_to_product_reference": "9Base-CNV-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "container-native-virtualization/virt-cdi-importer-rhel9@sha256:2df07fb21a3575e74aa16ded20129828f2300cd33e8ab369b0362062d49e62d0_amd64 as a component of CNV 4.13 for RHEL 9",
"product_id": "9Base-CNV-4.13:container-native-virtualization/virt-cdi-importer-rhel9@sha256:2df07fb21a3575e74aa16ded20129828f2300cd33e8ab369b0362062d49e62d0_amd64"
},
"product_reference": "container-native-virtualization/virt-cdi-importer-rhel9@sha256:2df07fb21a3575e74aa16ded20129828f2300cd33e8ab369b0362062d49e62d0_amd64",
"relates_to_product_reference": "9Base-CNV-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "container-native-virtualization/virt-cdi-operator-rhel9@sha256:20ec064750faedd97d11b797c8c1d9a1db5d60d7d76e82e65cfd05eb79d65e29_arm64 as a component of CNV 4.13 for RHEL 9",
"product_id": "9Base-CNV-4.13:container-native-virtualization/virt-cdi-operator-rhel9@sha256:20ec064750faedd97d11b797c8c1d9a1db5d60d7d76e82e65cfd05eb79d65e29_arm64"
},
"product_reference": "container-native-virtualization/virt-cdi-operator-rhel9@sha256:20ec064750faedd97d11b797c8c1d9a1db5d60d7d76e82e65cfd05eb79d65e29_arm64",
"relates_to_product_reference": "9Base-CNV-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "container-native-virtualization/virt-cdi-operator-rhel9@sha256:802ee8923d9d8e406b23911406f9748756c0ef4d6954e9e2fd5fb4bdf91dde9a_amd64 as a component of CNV 4.13 for RHEL 9",
"product_id": "9Base-CNV-4.13:container-native-virtualization/virt-cdi-operator-rhel9@sha256:802ee8923d9d8e406b23911406f9748756c0ef4d6954e9e2fd5fb4bdf91dde9a_amd64"
},
"product_reference": "container-native-virtualization/virt-cdi-operator-rhel9@sha256:802ee8923d9d8e406b23911406f9748756c0ef4d6954e9e2fd5fb4bdf91dde9a_amd64",
"relates_to_product_reference": "9Base-CNV-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "container-native-virtualization/virt-cdi-uploadproxy-rhel9@sha256:392d0f61f462c707adfdc21e4239c5c09d8520a80486b41d9d9ae479267d6124_arm64 as a component of CNV 4.13 for RHEL 9",
"product_id": "9Base-CNV-4.13:container-native-virtualization/virt-cdi-uploadproxy-rhel9@sha256:392d0f61f462c707adfdc21e4239c5c09d8520a80486b41d9d9ae479267d6124_arm64"
},
"product_reference": "container-native-virtualization/virt-cdi-uploadproxy-rhel9@sha256:392d0f61f462c707adfdc21e4239c5c09d8520a80486b41d9d9ae479267d6124_arm64",
"relates_to_product_reference": "9Base-CNV-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "container-native-virtualization/virt-cdi-uploadproxy-rhel9@sha256:6775f34353eec8f35bead9411dde155530d079bb8d51582fb1f2aacc27dbde1d_amd64 as a component of CNV 4.13 for RHEL 9",
"product_id": "9Base-CNV-4.13:container-native-virtualization/virt-cdi-uploadproxy-rhel9@sha256:6775f34353eec8f35bead9411dde155530d079bb8d51582fb1f2aacc27dbde1d_amd64"
},
"product_reference": "container-native-virtualization/virt-cdi-uploadproxy-rhel9@sha256:6775f34353eec8f35bead9411dde155530d079bb8d51582fb1f2aacc27dbde1d_amd64",
"relates_to_product_reference": "9Base-CNV-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "container-native-virtualization/virt-cdi-uploadserver-rhel9@sha256:4528c24672689cfb6505761b6b108fbcc04488192733f23d2bfe39cd42a1d743_arm64 as a component of CNV 4.13 for RHEL 9",
"product_id": "9Base-CNV-4.13:container-native-virtualization/virt-cdi-uploadserver-rhel9@sha256:4528c24672689cfb6505761b6b108fbcc04488192733f23d2bfe39cd42a1d743_arm64"
},
"product_reference": "container-native-virtualization/virt-cdi-uploadserver-rhel9@sha256:4528c24672689cfb6505761b6b108fbcc04488192733f23d2bfe39cd42a1d743_arm64",
"relates_to_product_reference": "9Base-CNV-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "container-native-virtualization/virt-cdi-uploadserver-rhel9@sha256:b22048390387380af94e267c8a9a66813c515997456d59d8ebac1486916b6585_amd64 as a component of CNV 4.13 for RHEL 9",
"product_id": "9Base-CNV-4.13:container-native-virtualization/virt-cdi-uploadserver-rhel9@sha256:b22048390387380af94e267c8a9a66813c515997456d59d8ebac1486916b6585_amd64"
},
"product_reference": "container-native-virtualization/virt-cdi-uploadserver-rhel9@sha256:b22048390387380af94e267c8a9a66813c515997456d59d8ebac1486916b6585_amd64",
"relates_to_product_reference": "9Base-CNV-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "container-native-virtualization/virt-controller-rhel9@sha256:3e7880149ee9a68286e390beb3d9779f7403c30fc5136e5370e0e4690a3fd243_amd64 as a component of CNV 4.13 for RHEL 9",
"product_id": "9Base-CNV-4.13:container-native-virtualization/virt-controller-rhel9@sha256:3e7880149ee9a68286e390beb3d9779f7403c30fc5136e5370e0e4690a3fd243_amd64"
},
"product_reference": "container-native-virtualization/virt-controller-rhel9@sha256:3e7880149ee9a68286e390beb3d9779f7403c30fc5136e5370e0e4690a3fd243_amd64",
"relates_to_product_reference": "9Base-CNV-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "container-native-virtualization/virt-controller-rhel9@sha256:970edc281d7a731e9f7e8c2d4440fe48a221e5e355d5235c5413b4c3adb28503_arm64 as a component of CNV 4.13 for RHEL 9",
"product_id": "9Base-CNV-4.13:container-native-virtualization/virt-controller-rhel9@sha256:970edc281d7a731e9f7e8c2d4440fe48a221e5e355d5235c5413b4c3adb28503_arm64"
},
"product_reference": "container-native-virtualization/virt-controller-rhel9@sha256:970edc281d7a731e9f7e8c2d4440fe48a221e5e355d5235c5413b4c3adb28503_arm64",
"relates_to_product_reference": "9Base-CNV-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "container-native-virtualization/virt-exportproxy-rhel9@sha256:1bda34d5bff734ad997202f29a5ff6f7362fd79fa90511a422442ef2e3681198_amd64 as a component of CNV 4.13 for RHEL 9",
"product_id": "9Base-CNV-4.13:container-native-virtualization/virt-exportproxy-rhel9@sha256:1bda34d5bff734ad997202f29a5ff6f7362fd79fa90511a422442ef2e3681198_amd64"
},
"product_reference": "container-native-virtualization/virt-exportproxy-rhel9@sha256:1bda34d5bff734ad997202f29a5ff6f7362fd79fa90511a422442ef2e3681198_amd64",
"relates_to_product_reference": "9Base-CNV-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "container-native-virtualization/virt-exportproxy-rhel9@sha256:de3c4afbf7669b98517cbef2490ec186f0553dd97b05bed80ec36dd883fe507b_arm64 as a component of CNV 4.13 for RHEL 9",
"product_id": "9Base-CNV-4.13:container-native-virtualization/virt-exportproxy-rhel9@sha256:de3c4afbf7669b98517cbef2490ec186f0553dd97b05bed80ec36dd883fe507b_arm64"
},
"product_reference": "container-native-virtualization/virt-exportproxy-rhel9@sha256:de3c4afbf7669b98517cbef2490ec186f0553dd97b05bed80ec36dd883fe507b_arm64",
"relates_to_product_reference": "9Base-CNV-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "container-native-virtualization/virt-exportserver-rhel9@sha256:3f7f98645176d42c63cca5c0fc3182a03121af87446ca421b6c72baf07dfca0d_arm64 as a component of CNV 4.13 for RHEL 9",
"product_id": "9Base-CNV-4.13:container-native-virtualization/virt-exportserver-rhel9@sha256:3f7f98645176d42c63cca5c0fc3182a03121af87446ca421b6c72baf07dfca0d_arm64"
},
"product_reference": "container-native-virtualization/virt-exportserver-rhel9@sha256:3f7f98645176d42c63cca5c0fc3182a03121af87446ca421b6c72baf07dfca0d_arm64",
"relates_to_product_reference": "9Base-CNV-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "container-native-virtualization/virt-exportserver-rhel9@sha256:8f12955cd777eb2409037a6968aa92f50c99d6e07e722951dbcfd0c8c9829b5e_amd64 as a component of CNV 4.13 for RHEL 9",
"product_id": "9Base-CNV-4.13:container-native-virtualization/virt-exportserver-rhel9@sha256:8f12955cd777eb2409037a6968aa92f50c99d6e07e722951dbcfd0c8c9829b5e_amd64"
},
"product_reference": "container-native-virtualization/virt-exportserver-rhel9@sha256:8f12955cd777eb2409037a6968aa92f50c99d6e07e722951dbcfd0c8c9829b5e_amd64",
"relates_to_product_reference": "9Base-CNV-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "container-native-virtualization/virt-handler-rhel9@sha256:5fc47110d866d8048aec50689090ce10705d19d3bb48d2b06727d6d569003af7_arm64 as a component of CNV 4.13 for RHEL 9",
"product_id": "9Base-CNV-4.13:container-native-virtualization/virt-handler-rhel9@sha256:5fc47110d866d8048aec50689090ce10705d19d3bb48d2b06727d6d569003af7_arm64"
},
"product_reference": "container-native-virtualization/virt-handler-rhel9@sha256:5fc47110d866d8048aec50689090ce10705d19d3bb48d2b06727d6d569003af7_arm64",
"relates_to_product_reference": "9Base-CNV-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "container-native-virtualization/virt-handler-rhel9@sha256:84ba79ae9658699147d2493df2582ab6df10adbff4d44a533c3fe6a9f45f9691_amd64 as a component of CNV 4.13 for RHEL 9",
"product_id": "9Base-CNV-4.13:container-native-virtualization/virt-handler-rhel9@sha256:84ba79ae9658699147d2493df2582ab6df10adbff4d44a533c3fe6a9f45f9691_amd64"
},
"product_reference": "container-native-virtualization/virt-handler-rhel9@sha256:84ba79ae9658699147d2493df2582ab6df10adbff4d44a533c3fe6a9f45f9691_amd64",
"relates_to_product_reference": "9Base-CNV-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "container-native-virtualization/virt-launcher-rhel9@sha256:4990d40d9987d5126d105dd45be2501eaded248cb61bdde5ea8d359bc1e7ebef_amd64 as a component of CNV 4.13 for RHEL 9",
"product_id": "9Base-CNV-4.13:container-native-virtualization/virt-launcher-rhel9@sha256:4990d40d9987d5126d105dd45be2501eaded248cb61bdde5ea8d359bc1e7ebef_amd64"
},
"product_reference": "container-native-virtualization/virt-launcher-rhel9@sha256:4990d40d9987d5126d105dd45be2501eaded248cb61bdde5ea8d359bc1e7ebef_amd64",
"relates_to_product_reference": "9Base-CNV-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "container-native-virtualization/virt-launcher-rhel9@sha256:95aeacb98209e0baef27ce0e02fbac38d693cea74808fc77107efda0f344bcb5_arm64 as a component of CNV 4.13 for RHEL 9",
"product_id": "9Base-CNV-4.13:container-native-virtualization/virt-launcher-rhel9@sha256:95aeacb98209e0baef27ce0e02fbac38d693cea74808fc77107efda0f344bcb5_arm64"
},
"product_reference": "container-native-virtualization/virt-launcher-rhel9@sha256:95aeacb98209e0baef27ce0e02fbac38d693cea74808fc77107efda0f344bcb5_arm64",
"relates_to_product_reference": "9Base-CNV-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "container-native-virtualization/virt-operator-rhel9@sha256:5c1a7e4ed2061938987b900a2394f07121d4037350c9bb6485213a2adfea787d_amd64 as a component of CNV 4.13 for RHEL 9",
"product_id": "9Base-CNV-4.13:container-native-virtualization/virt-operator-rhel9@sha256:5c1a7e4ed2061938987b900a2394f07121d4037350c9bb6485213a2adfea787d_amd64"
},
"product_reference": "container-native-virtualization/virt-operator-rhel9@sha256:5c1a7e4ed2061938987b900a2394f07121d4037350c9bb6485213a2adfea787d_amd64",
"relates_to_product_reference": "9Base-CNV-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "container-native-virtualization/virt-operator-rhel9@sha256:66b1b3b379121d6411ba22283e7d991617177330c93746d37753ab7812b9a00b_arm64 as a component of CNV 4.13 for RHEL 9",
"product_id": "9Base-CNV-4.13:container-native-virtualization/virt-operator-rhel9@sha256:66b1b3b379121d6411ba22283e7d991617177330c93746d37753ab7812b9a00b_arm64"
},
"product_reference": "container-native-virtualization/virt-operator-rhel9@sha256:66b1b3b379121d6411ba22283e7d991617177330c93746d37753ab7812b9a00b_arm64",
"relates_to_product_reference": "9Base-CNV-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "container-native-virtualization/virtio-win-rhel9@sha256:8735f51da918408a8826601c082d1b29accf26d59b9978da89b980cb509c1102_arm64 as a component of CNV 4.13 for RHEL 9",
"product_id": "9Base-CNV-4.13:container-native-virtualization/virtio-win-rhel9@sha256:8735f51da918408a8826601c082d1b29accf26d59b9978da89b980cb509c1102_arm64"
},
"product_reference": "container-native-virtualization/virtio-win-rhel9@sha256:8735f51da918408a8826601c082d1b29accf26d59b9978da89b980cb509c1102_arm64",
"relates_to_product_reference": "9Base-CNV-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "container-native-virtualization/virtio-win-rhel9@sha256:d147d2a6eb6f907d1e88f61aaca83596853bc72164583d6dda2b1154b490de25_amd64 as a component of CNV 4.13 for RHEL 9",
"product_id": "9Base-CNV-4.13:container-native-virtualization/virtio-win-rhel9@sha256:d147d2a6eb6f907d1e88f61aaca83596853bc72164583d6dda2b1154b490de25_amd64"
},
"product_reference": "container-native-virtualization/virtio-win-rhel9@sha256:d147d2a6eb6f907d1e88f61aaca83596853bc72164583d6dda2b1154b490de25_amd64",
"relates_to_product_reference": "9Base-CNV-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "container-native-virtualization/vm-console-proxy-rhel9@sha256:70a8d0cd66182c25e02679540bae1368b2a9cf687532b58dba41ef30c5ca00c1_arm64 as a component of CNV 4.13 for RHEL 9",
"product_id": "9Base-CNV-4.13:container-native-virtualization/vm-console-proxy-rhel9@sha256:70a8d0cd66182c25e02679540bae1368b2a9cf687532b58dba41ef30c5ca00c1_arm64"
},
"product_reference": "container-native-virtualization/vm-console-proxy-rhel9@sha256:70a8d0cd66182c25e02679540bae1368b2a9cf687532b58dba41ef30c5ca00c1_arm64",
"relates_to_product_reference": "9Base-CNV-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "container-native-virtualization/vm-console-proxy-rhel9@sha256:7ca921f98f6d81a126907127a611146fb53397869a628678faa1e289c01d22b2_amd64 as a component of CNV 4.13 for RHEL 9",
"product_id": "9Base-CNV-4.13:container-native-virtualization/vm-console-proxy-rhel9@sha256:7ca921f98f6d81a126907127a611146fb53397869a628678faa1e289c01d22b2_amd64"
},
"product_reference": "container-native-virtualization/vm-console-proxy-rhel9@sha256:7ca921f98f6d81a126907127a611146fb53397869a628678faa1e289c01d22b2_amd64",
"relates_to_product_reference": "9Base-CNV-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "container-native-virtualization/vm-network-latency-checkup-rhel9@sha256:503ea7ac914a9b54e9d665a0227ee0b5d5200cdb5d692aa94c07dd1518d91b70_arm64 as a component of CNV 4.13 for RHEL 9",
"product_id": "9Base-CNV-4.13:container-native-virtualization/vm-network-latency-checkup-rhel9@sha256:503ea7ac914a9b54e9d665a0227ee0b5d5200cdb5d692aa94c07dd1518d91b70_arm64"
},
"product_reference": "container-native-virtualization/vm-network-latency-checkup-rhel9@sha256:503ea7ac914a9b54e9d665a0227ee0b5d5200cdb5d692aa94c07dd1518d91b70_arm64",
"relates_to_product_reference": "9Base-CNV-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "container-native-virtualization/vm-network-latency-checkup-rhel9@sha256:59fd965975bccf641a0fa7aa01374d45057bd03cda7528248a84b60b1205bf57_amd64 as a component of CNV 4.13 for RHEL 9",
"product_id": "9Base-CNV-4.13:container-native-virtualization/vm-network-latency-checkup-rhel9@sha256:59fd965975bccf641a0fa7aa01374d45057bd03cda7528248a84b60b1205bf57_amd64"
},
"product_reference": "container-native-virtualization/vm-network-latency-checkup-rhel9@sha256:59fd965975bccf641a0fa7aa01374d45057bd03cda7528248a84b60b1205bf57_amd64",
"relates_to_product_reference": "9Base-CNV-4.13"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Adam Korczynski"
],
"organization": "ADA Logics"
},
{
"names": [
"OSS-Fuzz"
]
}
],
"cve": "CVE-2022-2879",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"discovery_date": "2022-10-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2132867"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the golang package, where Reader.Read does not set a limit on the maximum size of file headers. After fixing, Reader.Read limits the maximum size of header blocks to 1 MiB. This flaw allows a maliciously crafted archive to cause Read to allocate unbounded amounts of memory, potentially causing resource exhaustion or panic.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: archive/tar: unbounded memory consumption when reading headers",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The opportunity for a Denial of Service is limited to the golang runtime. In the case of OpenShift Container Platform, this would be restricted within each individual container. There are multiple layers of guide rails (Golang\u2019s Garbage Collector; OpenShift\u2019s resource constraints imposed at the container and cluster levels) which would require a malicious user to continue submitting attacks for there to be any enduring impact. They would also need access to external server resources to be able to send a massive volume of requests to cause a significant impact on server operations.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"9Base-CNV-4.13:container-native-virtualization/bridge-marker-rhel9@sha256:8eac196b30a648989cdca5cb153a3bc3d34e47339acba0e4f760bd366496c99d_amd64",
"9Base-CNV-4.13:container-native-virtualization/bridge-marker-rhel9@sha256:e8a55aee3d75a316bb0d7a554c737198823df04b3c05e481c17e45eb2153bced_arm64",
"9Base-CNV-4.13:container-native-virtualization/cluster-network-addons-operator-rhel9@sha256:3bff33e3f40cd1e2b519c2db56734d4bb8df883e155c2f20b1cb9d3d184daec1_amd64",
"9Base-CNV-4.13:container-native-virtualization/cluster-network-addons-operator-rhel9@sha256:f439d2f420bb59eb1d5af14ce2002648d0cfc155d1a1466c8aac9b661fe902b8_arm64",
"9Base-CNV-4.13:container-native-virtualization/cnv-containernetworking-plugins-rhel9@sha256:89f22e541f61a660c9aa9f38ef58e80b84a0517f74e84292107fc252c25465c9_arm64",
"9Base-CNV-4.13:container-native-virtualization/cnv-containernetworking-plugins-rhel9@sha256:bf471997e54e4a75b0d71f492ab295787fdbb14d8c85c4ea8c03f0552dbc3755_amd64",
"9Base-CNV-4.13:container-native-virtualization/cnv-must-gather-rhel9@sha256:9e8efd76924958eb605401abdac08eba97fb83a1ada383bc87a7fb7c87b3a455_arm64",
"9Base-CNV-4.13:container-native-virtualization/cnv-must-gather-rhel9@sha256:b9fc32b5fabedd65a4c3a471879c808af2087277de4278adaa115a732f0468da_amd64",
"9Base-CNV-4.13:container-native-virtualization/hco-bundle-registry-rhel9@sha256:60e89d7a99ff9f20e974430b802dd724a3bb6fa1e01e5a62daad98ac487b3063_amd64",
"9Base-CNV-4.13:container-native-virtualization/hco-bundle-registry-rhel9@sha256:dd20b138045ef1424d83a47e7abcfcbb2ac54577dcec5ed3c186390aaa4c9d84_arm64",
"9Base-CNV-4.13:container-native-virtualization/hostpath-csi-driver-rhel9@sha256:61e2824853d51347593ad909a5e546cd92e4216d6a1df5dffb50dd9cba277cce_amd64",
"9Base-CNV-4.13:container-native-virtualization/hostpath-csi-driver-rhel9@sha256:676d4c23a5f60dd331728af056b0a6b2d3358ac88da23299b1a98dfaca8f288e_arm64",
"9Base-CNV-4.13:container-native-virtualization/hostpath-provisioner-operator-rhel9@sha256:515be94be496c67f5b8fd5f4832fe4385e56476e6589897d6b9fbb9bb2b00f32_amd64",
"9Base-CNV-4.13:container-native-virtualization/hostpath-provisioner-operator-rhel9@sha256:571ae805641dea11646028c946039983c7fd82f138b915dcb8b80c39b465e63c_arm64",
"9Base-CNV-4.13:container-native-virtualization/hostpath-provisioner-rhel9@sha256:ac3fe350bedd6bc43596444ba0f279ccf8a144ab14ac5a9b80ea71c46390b7b4_amd64",
"9Base-CNV-4.13:container-native-virtualization/hostpath-provisioner-rhel9@sha256:d4ed87745b7ee2acca2d83e2c91c2f6dced1903c81495b50f2559b3ba2dde287_arm64",
"9Base-CNV-4.13:container-native-virtualization/hyperconverged-cluster-operator-rhel9@sha256:e5ab9f3be59d3568e3d672ab374efb16990ccf92192eac4e1244b10fcd7423e2_amd64",
"9Base-CNV-4.13:container-native-virtualization/hyperconverged-cluster-operator-rhel9@sha256:e681560b184189df03fc84c8a712f32289f42573dd348cda394b19565eb6eca8_arm64",
"9Base-CNV-4.13:container-native-virtualization/hyperconverged-cluster-webhook-rhel9@sha256:06d036d320b3027bb8370bb8e0f6fe8c9f0ec9bca7aac3b5c53698ba4a170042_arm64",
"9Base-CNV-4.13:container-native-virtualization/hyperconverged-cluster-webhook-rhel9@sha256:b5a01336180aad017df62cf8e652f2491b8263ba7e4dd07f858db1ef1924cf2f_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubemacpool-rhel9@sha256:4d190d81eeb3fbe9ed56cf3548dc83a3f81641bfdafa7b42dcfb0d2512566644_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubemacpool-rhel9@sha256:59862a59854f0d5b83dc25ba119f9586a8aff42b6e60d1922f8ae7b4567309ff_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubesecondarydns-rhel9@sha256:121d30d78cc57731ea2242ef2c32430890ac66c2723e65608d5e2f26c3f515cd_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubesecondarydns-rhel9@sha256:b1838f3c8ba3d8113bddea17b78c21e1c1490e2a4a07ea77014edee523d06347_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-console-plugin-rhel9@sha256:86a4b1e3d6ad1d56302c9c058f8bc5826dcfe6c46fb3e0ddaa06818645039020_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-console-plugin-rhel9@sha256:ffb2acd9ae09c1ef9ca756f5eaf6087d0a3957cfc824543949d25f556a97744d_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-dpdk-checkup-rhel9@sha256:525aceb9396010ebcdba14040f267889b807cd84db8e5b4030429b51f0fbf5fe_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-dpdk-checkup-rhel9@sha256:553c4686f56c66cc1e3c5ad9d4051f139d43f821eac3abb98ca5cdb8b5dfe202_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-ssp-operator-rhel9@sha256:901e6cad9534c7bd7c4018c60bccfe49d7280fba5a9901ab4c4d15e9345288c4_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-ssp-operator-rhel9@sha256:badeb0f65f543b209f6af761729d9778b7b73b97d55044016dfba3f38a1f6f18_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-cleanup-vm-rhel9@sha256:28e4975fa4dac22d9da32ed2a10aed039fd957b30140daa36bab2caa998be77a_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-cleanup-vm-rhel9@sha256:b0ff7e812a576ea848590655fc13a85832d5a39f68e7769ceab9da6949da88c7_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-copy-template-rhel9@sha256:4916a6c6b1f9b529187d3b4d5fc99b90157993767b3fe2ad36a9ec77fbb46b10_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-copy-template-rhel9@sha256:f71c36442f1b61cdde7ec58d2c3c78d2039f6d6108e6c35388ef7c1650971fa1_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-create-datavolume-rhel9@sha256:2ad49cf6e2242a9e5861929d9bcab1305a7fc4e34e708f99cff1d7253aa46167_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-create-datavolume-rhel9@sha256:7112400a4ecb23ee2110bf96372fcf9f96ad648a51aa944627b40eb59539a660_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-create-vm-from-template-rhel9@sha256:1411c65bbad7302710788327f6964a4bf5bc20ef70d5e46f4a5c6e7a0e7a0161_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-create-vm-from-template-rhel9@sha256:4d962618aa95600c60c9fc8b890186e510de91177d51949e12797a3558e31328_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-customize-rhel9@sha256:5c23d3f20ea9dcbe7109284d73078ecd516a070e964b844f8d80b1d92ebd55ee_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-customize-rhel9@sha256:a780244e48c6d4f87446d3754c3eb9ab79c0d54675c189da4a659f7a4d5668ea_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-sysprep-rhel9@sha256:84577d949a1bbcaa291c70729127bca4a8994df03068666baa23840877ea8392_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-sysprep-rhel9@sha256:aed630a597a090179e1b0e0c117e536df06b67d0f793f91936aa7388c0c5d7eb_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-modify-vm-template-rhel9@sha256:31d959b80cf57462e1705684bb7e1b78af26bd2c62f1c9e4e51e1d02199b05a8_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-modify-vm-template-rhel9@sha256:66aea526bc10e4c0136ba86e394bbdfe4fbd7f757d6f391a561b51d2ba2f4d46_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-operator-rhel9@sha256:d0cf0e81589f0938de45961eaddfc5ec4782738fd11082de0439b200534259eb_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-operator-rhel9@sha256:f1b1f5044db6bb945584f9d4f31d020597725a286ef368ed0aca2116abb31beb_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-wait-for-vmi-status-rhel9@sha256:39a15d03f113735df03b1a7408227eb9604d942c1f3c1992bcdc7eaf07662711_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-wait-for-vmi-status-rhel9@sha256:afb68af076954fcd18c7a4a1464ea0c2a766e8282eae980051906ed07eaa1707_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-template-validator-rhel9@sha256:02b22c7e7014b5e72d47fed8b6a268cf307638c5510adf3916c51f7f40a52a08_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-template-validator-rhel9@sha256:c0264b9271e602f85b2040ef7f207cdfa46038dc4fa6e4738bf196ef88a71cf8_amd64",
"9Base-CNV-4.13:container-native-virtualization/libguestfs-tools-rhel9@sha256:29ae84575bbca24553cf649256759fd96ff286971d80bc2db129154a7df9b283_amd64",
"9Base-CNV-4.13:container-native-virtualization/libguestfs-tools-rhel9@sha256:6558f60343e068b032167e2340b2c549c5f0258acc5d2614b60966ce79408b01_arm64",
"9Base-CNV-4.13:container-native-virtualization/multus-dynamic-networks-rhel9@sha256:3ecb0162a4b01d1590bf209d717b32a4f0835910d9979823f18c24acba41b503_arm64",
"9Base-CNV-4.13:container-native-virtualization/multus-dynamic-networks-rhel9@sha256:b7f68b6420009e21380d32d6459193aae45e93be9533debe17cb3108571b36b8_amd64",
"9Base-CNV-4.13:container-native-virtualization/ovs-cni-plugin-rhel9@sha256:0f1d372f418744e0aff59ecb0a38f53178aac9c2e9eecfd38aa25ed83e0d1360_arm64",
"9Base-CNV-4.13:container-native-virtualization/ovs-cni-plugin-rhel9@sha256:e8e7a44edbf1713fe74de5c4b8f691cce78f4440c4a32a16ba9ad16694a55396_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-api-rhel9@sha256:e68416321ca8c74a547b3d35897f54813c03481143e402e9bdc4daf315e35b5d_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-api-rhel9@sha256:fdb4ca1bb8b310d713d9c7e88f7d091f4460aa942dbeca5ebcf17281a06daffe_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-artifacts-server-rhel9@sha256:33d11c1832b49df39c1fca62bad40dbc5c30a452248339aaef449ac99509accb_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-artifacts-server-rhel9@sha256:81fc61b714baecb5a89fa6c0749c14566e0661b8e184ca602fc2e03b9cf431ee_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-apiserver-rhel9@sha256:f6128a63344ed2129f5bce648ddcfaa2869d31cde4b93328d3c22534b97ade10_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-apiserver-rhel9@sha256:feca273a691d09445c6cff6d36b5d590735e867656a9898ce0d89744d98e8006_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-cloner-rhel9@sha256:68e3b9b0291b4fb277ac430269ffce11d13b0a7688cf2ffcdb7f98759c36b4db_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-cloner-rhel9@sha256:6ac212767481bef64d8a7d0252bb8089c0f9751fad4a355aef71bd49dad2ad07_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-controller-rhel9@sha256:65f5263275d9f0a12b8fb057d82adf678778039ec873ca9bde182dea3413c9f1_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-controller-rhel9@sha256:d9e62b2019328be258489ac852eef25f8b1233f29abac6bcea5b406329f97fed_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-importer-rhel9@sha256:00a6d9d24ca1466d450b02269ec3144fc7550f0e5c696e869fbf7ce10cae6093_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-importer-rhel9@sha256:2df07fb21a3575e74aa16ded20129828f2300cd33e8ab369b0362062d49e62d0_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-operator-rhel9@sha256:20ec064750faedd97d11b797c8c1d9a1db5d60d7d76e82e65cfd05eb79d65e29_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-operator-rhel9@sha256:802ee8923d9d8e406b23911406f9748756c0ef4d6954e9e2fd5fb4bdf91dde9a_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-uploadproxy-rhel9@sha256:392d0f61f462c707adfdc21e4239c5c09d8520a80486b41d9d9ae479267d6124_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-uploadproxy-rhel9@sha256:6775f34353eec8f35bead9411dde155530d079bb8d51582fb1f2aacc27dbde1d_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-uploadserver-rhel9@sha256:4528c24672689cfb6505761b6b108fbcc04488192733f23d2bfe39cd42a1d743_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-uploadserver-rhel9@sha256:b22048390387380af94e267c8a9a66813c515997456d59d8ebac1486916b6585_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-controller-rhel9@sha256:3e7880149ee9a68286e390beb3d9779f7403c30fc5136e5370e0e4690a3fd243_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-controller-rhel9@sha256:970edc281d7a731e9f7e8c2d4440fe48a221e5e355d5235c5413b4c3adb28503_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-exportproxy-rhel9@sha256:1bda34d5bff734ad997202f29a5ff6f7362fd79fa90511a422442ef2e3681198_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-exportproxy-rhel9@sha256:de3c4afbf7669b98517cbef2490ec186f0553dd97b05bed80ec36dd883fe507b_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-exportserver-rhel9@sha256:3f7f98645176d42c63cca5c0fc3182a03121af87446ca421b6c72baf07dfca0d_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-exportserver-rhel9@sha256:8f12955cd777eb2409037a6968aa92f50c99d6e07e722951dbcfd0c8c9829b5e_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-handler-rhel9@sha256:5fc47110d866d8048aec50689090ce10705d19d3bb48d2b06727d6d569003af7_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-handler-rhel9@sha256:84ba79ae9658699147d2493df2582ab6df10adbff4d44a533c3fe6a9f45f9691_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-launcher-rhel9@sha256:4990d40d9987d5126d105dd45be2501eaded248cb61bdde5ea8d359bc1e7ebef_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-launcher-rhel9@sha256:95aeacb98209e0baef27ce0e02fbac38d693cea74808fc77107efda0f344bcb5_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-operator-rhel9@sha256:5c1a7e4ed2061938987b900a2394f07121d4037350c9bb6485213a2adfea787d_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-operator-rhel9@sha256:66b1b3b379121d6411ba22283e7d991617177330c93746d37753ab7812b9a00b_arm64",
"9Base-CNV-4.13:container-native-virtualization/virtio-win-rhel9@sha256:8735f51da918408a8826601c082d1b29accf26d59b9978da89b980cb509c1102_arm64",
"9Base-CNV-4.13:container-native-virtualization/virtio-win-rhel9@sha256:d147d2a6eb6f907d1e88f61aaca83596853bc72164583d6dda2b1154b490de25_amd64",
"9Base-CNV-4.13:container-native-virtualization/vm-console-proxy-rhel9@sha256:70a8d0cd66182c25e02679540bae1368b2a9cf687532b58dba41ef30c5ca00c1_arm64",
"9Base-CNV-4.13:container-native-virtualization/vm-console-proxy-rhel9@sha256:7ca921f98f6d81a126907127a611146fb53397869a628678faa1e289c01d22b2_amd64",
"9Base-CNV-4.13:container-native-virtualization/vm-network-latency-checkup-rhel9@sha256:503ea7ac914a9b54e9d665a0227ee0b5d5200cdb5d692aa94c07dd1518d91b70_arm64",
"9Base-CNV-4.13:container-native-virtualization/vm-network-latency-checkup-rhel9@sha256:59fd965975bccf641a0fa7aa01374d45057bd03cda7528248a84b60b1205bf57_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-2879"
},
{
"category": "external",
"summary": "RHBZ#2132867",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2132867"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-2879",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2879"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-2879",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-2879"
},
{
"category": "external",
"summary": "https://github.com/golang/go/issues/54853",
"url": "https://github.com/golang/go/issues/54853"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/xtuG5faxtaU?pli=1",
"url": "https://groups.google.com/g/golang-announce/c/xtuG5faxtaU?pli=1"
}
],
"release_date": "2022-10-04T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-05-18T02:55:08+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"9Base-CNV-4.13:container-native-virtualization/bridge-marker-rhel9@sha256:8eac196b30a648989cdca5cb153a3bc3d34e47339acba0e4f760bd366496c99d_amd64",
"9Base-CNV-4.13:container-native-virtualization/bridge-marker-rhel9@sha256:e8a55aee3d75a316bb0d7a554c737198823df04b3c05e481c17e45eb2153bced_arm64",
"9Base-CNV-4.13:container-native-virtualization/cluster-network-addons-operator-rhel9@sha256:3bff33e3f40cd1e2b519c2db56734d4bb8df883e155c2f20b1cb9d3d184daec1_amd64",
"9Base-CNV-4.13:container-native-virtualization/cluster-network-addons-operator-rhel9@sha256:f439d2f420bb59eb1d5af14ce2002648d0cfc155d1a1466c8aac9b661fe902b8_arm64",
"9Base-CNV-4.13:container-native-virtualization/cnv-containernetworking-plugins-rhel9@sha256:89f22e541f61a660c9aa9f38ef58e80b84a0517f74e84292107fc252c25465c9_arm64",
"9Base-CNV-4.13:container-native-virtualization/cnv-containernetworking-plugins-rhel9@sha256:bf471997e54e4a75b0d71f492ab295787fdbb14d8c85c4ea8c03f0552dbc3755_amd64",
"9Base-CNV-4.13:container-native-virtualization/cnv-must-gather-rhel9@sha256:9e8efd76924958eb605401abdac08eba97fb83a1ada383bc87a7fb7c87b3a455_arm64",
"9Base-CNV-4.13:container-native-virtualization/cnv-must-gather-rhel9@sha256:b9fc32b5fabedd65a4c3a471879c808af2087277de4278adaa115a732f0468da_amd64",
"9Base-CNV-4.13:container-native-virtualization/hco-bundle-registry-rhel9@sha256:60e89d7a99ff9f20e974430b802dd724a3bb6fa1e01e5a62daad98ac487b3063_amd64",
"9Base-CNV-4.13:container-native-virtualization/hco-bundle-registry-rhel9@sha256:dd20b138045ef1424d83a47e7abcfcbb2ac54577dcec5ed3c186390aaa4c9d84_arm64",
"9Base-CNV-4.13:container-native-virtualization/hostpath-csi-driver-rhel9@sha256:61e2824853d51347593ad909a5e546cd92e4216d6a1df5dffb50dd9cba277cce_amd64",
"9Base-CNV-4.13:container-native-virtualization/hostpath-csi-driver-rhel9@sha256:676d4c23a5f60dd331728af056b0a6b2d3358ac88da23299b1a98dfaca8f288e_arm64",
"9Base-CNV-4.13:container-native-virtualization/hostpath-provisioner-operator-rhel9@sha256:515be94be496c67f5b8fd5f4832fe4385e56476e6589897d6b9fbb9bb2b00f32_amd64",
"9Base-CNV-4.13:container-native-virtualization/hostpath-provisioner-operator-rhel9@sha256:571ae805641dea11646028c946039983c7fd82f138b915dcb8b80c39b465e63c_arm64",
"9Base-CNV-4.13:container-native-virtualization/hostpath-provisioner-rhel9@sha256:ac3fe350bedd6bc43596444ba0f279ccf8a144ab14ac5a9b80ea71c46390b7b4_amd64",
"9Base-CNV-4.13:container-native-virtualization/hostpath-provisioner-rhel9@sha256:d4ed87745b7ee2acca2d83e2c91c2f6dced1903c81495b50f2559b3ba2dde287_arm64",
"9Base-CNV-4.13:container-native-virtualization/hyperconverged-cluster-operator-rhel9@sha256:e5ab9f3be59d3568e3d672ab374efb16990ccf92192eac4e1244b10fcd7423e2_amd64",
"9Base-CNV-4.13:container-native-virtualization/hyperconverged-cluster-operator-rhel9@sha256:e681560b184189df03fc84c8a712f32289f42573dd348cda394b19565eb6eca8_arm64",
"9Base-CNV-4.13:container-native-virtualization/hyperconverged-cluster-webhook-rhel9@sha256:06d036d320b3027bb8370bb8e0f6fe8c9f0ec9bca7aac3b5c53698ba4a170042_arm64",
"9Base-CNV-4.13:container-native-virtualization/hyperconverged-cluster-webhook-rhel9@sha256:b5a01336180aad017df62cf8e652f2491b8263ba7e4dd07f858db1ef1924cf2f_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubemacpool-rhel9@sha256:4d190d81eeb3fbe9ed56cf3548dc83a3f81641bfdafa7b42dcfb0d2512566644_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubemacpool-rhel9@sha256:59862a59854f0d5b83dc25ba119f9586a8aff42b6e60d1922f8ae7b4567309ff_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubesecondarydns-rhel9@sha256:121d30d78cc57731ea2242ef2c32430890ac66c2723e65608d5e2f26c3f515cd_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubesecondarydns-rhel9@sha256:b1838f3c8ba3d8113bddea17b78c21e1c1490e2a4a07ea77014edee523d06347_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-console-plugin-rhel9@sha256:86a4b1e3d6ad1d56302c9c058f8bc5826dcfe6c46fb3e0ddaa06818645039020_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-console-plugin-rhel9@sha256:ffb2acd9ae09c1ef9ca756f5eaf6087d0a3957cfc824543949d25f556a97744d_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-dpdk-checkup-rhel9@sha256:525aceb9396010ebcdba14040f267889b807cd84db8e5b4030429b51f0fbf5fe_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-dpdk-checkup-rhel9@sha256:553c4686f56c66cc1e3c5ad9d4051f139d43f821eac3abb98ca5cdb8b5dfe202_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-ssp-operator-rhel9@sha256:901e6cad9534c7bd7c4018c60bccfe49d7280fba5a9901ab4c4d15e9345288c4_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-ssp-operator-rhel9@sha256:badeb0f65f543b209f6af761729d9778b7b73b97d55044016dfba3f38a1f6f18_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-cleanup-vm-rhel9@sha256:28e4975fa4dac22d9da32ed2a10aed039fd957b30140daa36bab2caa998be77a_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-cleanup-vm-rhel9@sha256:b0ff7e812a576ea848590655fc13a85832d5a39f68e7769ceab9da6949da88c7_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-copy-template-rhel9@sha256:4916a6c6b1f9b529187d3b4d5fc99b90157993767b3fe2ad36a9ec77fbb46b10_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-copy-template-rhel9@sha256:f71c36442f1b61cdde7ec58d2c3c78d2039f6d6108e6c35388ef7c1650971fa1_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-create-datavolume-rhel9@sha256:2ad49cf6e2242a9e5861929d9bcab1305a7fc4e34e708f99cff1d7253aa46167_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-create-datavolume-rhel9@sha256:7112400a4ecb23ee2110bf96372fcf9f96ad648a51aa944627b40eb59539a660_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-create-vm-from-template-rhel9@sha256:1411c65bbad7302710788327f6964a4bf5bc20ef70d5e46f4a5c6e7a0e7a0161_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-create-vm-from-template-rhel9@sha256:4d962618aa95600c60c9fc8b890186e510de91177d51949e12797a3558e31328_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-customize-rhel9@sha256:5c23d3f20ea9dcbe7109284d73078ecd516a070e964b844f8d80b1d92ebd55ee_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-customize-rhel9@sha256:a780244e48c6d4f87446d3754c3eb9ab79c0d54675c189da4a659f7a4d5668ea_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-sysprep-rhel9@sha256:84577d949a1bbcaa291c70729127bca4a8994df03068666baa23840877ea8392_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-sysprep-rhel9@sha256:aed630a597a090179e1b0e0c117e536df06b67d0f793f91936aa7388c0c5d7eb_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-modify-vm-template-rhel9@sha256:31d959b80cf57462e1705684bb7e1b78af26bd2c62f1c9e4e51e1d02199b05a8_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-modify-vm-template-rhel9@sha256:66aea526bc10e4c0136ba86e394bbdfe4fbd7f757d6f391a561b51d2ba2f4d46_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-operator-rhel9@sha256:d0cf0e81589f0938de45961eaddfc5ec4782738fd11082de0439b200534259eb_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-operator-rhel9@sha256:f1b1f5044db6bb945584f9d4f31d020597725a286ef368ed0aca2116abb31beb_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-wait-for-vmi-status-rhel9@sha256:39a15d03f113735df03b1a7408227eb9604d942c1f3c1992bcdc7eaf07662711_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-wait-for-vmi-status-rhel9@sha256:afb68af076954fcd18c7a4a1464ea0c2a766e8282eae980051906ed07eaa1707_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-template-validator-rhel9@sha256:02b22c7e7014b5e72d47fed8b6a268cf307638c5510adf3916c51f7f40a52a08_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-template-validator-rhel9@sha256:c0264b9271e602f85b2040ef7f207cdfa46038dc4fa6e4738bf196ef88a71cf8_amd64",
"9Base-CNV-4.13:container-native-virtualization/libguestfs-tools-rhel9@sha256:29ae84575bbca24553cf649256759fd96ff286971d80bc2db129154a7df9b283_amd64",
"9Base-CNV-4.13:container-native-virtualization/libguestfs-tools-rhel9@sha256:6558f60343e068b032167e2340b2c549c5f0258acc5d2614b60966ce79408b01_arm64",
"9Base-CNV-4.13:container-native-virtualization/multus-dynamic-networks-rhel9@sha256:3ecb0162a4b01d1590bf209d717b32a4f0835910d9979823f18c24acba41b503_arm64",
"9Base-CNV-4.13:container-native-virtualization/multus-dynamic-networks-rhel9@sha256:b7f68b6420009e21380d32d6459193aae45e93be9533debe17cb3108571b36b8_amd64",
"9Base-CNV-4.13:container-native-virtualization/ovs-cni-plugin-rhel9@sha256:0f1d372f418744e0aff59ecb0a38f53178aac9c2e9eecfd38aa25ed83e0d1360_arm64",
"9Base-CNV-4.13:container-native-virtualization/ovs-cni-plugin-rhel9@sha256:e8e7a44edbf1713fe74de5c4b8f691cce78f4440c4a32a16ba9ad16694a55396_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-api-rhel9@sha256:e68416321ca8c74a547b3d35897f54813c03481143e402e9bdc4daf315e35b5d_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-api-rhel9@sha256:fdb4ca1bb8b310d713d9c7e88f7d091f4460aa942dbeca5ebcf17281a06daffe_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-artifacts-server-rhel9@sha256:33d11c1832b49df39c1fca62bad40dbc5c30a452248339aaef449ac99509accb_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-artifacts-server-rhel9@sha256:81fc61b714baecb5a89fa6c0749c14566e0661b8e184ca602fc2e03b9cf431ee_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-apiserver-rhel9@sha256:f6128a63344ed2129f5bce648ddcfaa2869d31cde4b93328d3c22534b97ade10_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-apiserver-rhel9@sha256:feca273a691d09445c6cff6d36b5d590735e867656a9898ce0d89744d98e8006_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-cloner-rhel9@sha256:68e3b9b0291b4fb277ac430269ffce11d13b0a7688cf2ffcdb7f98759c36b4db_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-cloner-rhel9@sha256:6ac212767481bef64d8a7d0252bb8089c0f9751fad4a355aef71bd49dad2ad07_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-controller-rhel9@sha256:65f5263275d9f0a12b8fb057d82adf678778039ec873ca9bde182dea3413c9f1_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-controller-rhel9@sha256:d9e62b2019328be258489ac852eef25f8b1233f29abac6bcea5b406329f97fed_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-importer-rhel9@sha256:00a6d9d24ca1466d450b02269ec3144fc7550f0e5c696e869fbf7ce10cae6093_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-importer-rhel9@sha256:2df07fb21a3575e74aa16ded20129828f2300cd33e8ab369b0362062d49e62d0_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-operator-rhel9@sha256:20ec064750faedd97d11b797c8c1d9a1db5d60d7d76e82e65cfd05eb79d65e29_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-operator-rhel9@sha256:802ee8923d9d8e406b23911406f9748756c0ef4d6954e9e2fd5fb4bdf91dde9a_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-uploadproxy-rhel9@sha256:392d0f61f462c707adfdc21e4239c5c09d8520a80486b41d9d9ae479267d6124_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-uploadproxy-rhel9@sha256:6775f34353eec8f35bead9411dde155530d079bb8d51582fb1f2aacc27dbde1d_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-uploadserver-rhel9@sha256:4528c24672689cfb6505761b6b108fbcc04488192733f23d2bfe39cd42a1d743_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-uploadserver-rhel9@sha256:b22048390387380af94e267c8a9a66813c515997456d59d8ebac1486916b6585_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-controller-rhel9@sha256:3e7880149ee9a68286e390beb3d9779f7403c30fc5136e5370e0e4690a3fd243_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-controller-rhel9@sha256:970edc281d7a731e9f7e8c2d4440fe48a221e5e355d5235c5413b4c3adb28503_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-exportproxy-rhel9@sha256:1bda34d5bff734ad997202f29a5ff6f7362fd79fa90511a422442ef2e3681198_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-exportproxy-rhel9@sha256:de3c4afbf7669b98517cbef2490ec186f0553dd97b05bed80ec36dd883fe507b_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-exportserver-rhel9@sha256:3f7f98645176d42c63cca5c0fc3182a03121af87446ca421b6c72baf07dfca0d_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-exportserver-rhel9@sha256:8f12955cd777eb2409037a6968aa92f50c99d6e07e722951dbcfd0c8c9829b5e_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-handler-rhel9@sha256:5fc47110d866d8048aec50689090ce10705d19d3bb48d2b06727d6d569003af7_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-handler-rhel9@sha256:84ba79ae9658699147d2493df2582ab6df10adbff4d44a533c3fe6a9f45f9691_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-launcher-rhel9@sha256:4990d40d9987d5126d105dd45be2501eaded248cb61bdde5ea8d359bc1e7ebef_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-launcher-rhel9@sha256:95aeacb98209e0baef27ce0e02fbac38d693cea74808fc77107efda0f344bcb5_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-operator-rhel9@sha256:5c1a7e4ed2061938987b900a2394f07121d4037350c9bb6485213a2adfea787d_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-operator-rhel9@sha256:66b1b3b379121d6411ba22283e7d991617177330c93746d37753ab7812b9a00b_arm64",
"9Base-CNV-4.13:container-native-virtualization/virtio-win-rhel9@sha256:8735f51da918408a8826601c082d1b29accf26d59b9978da89b980cb509c1102_arm64",
"9Base-CNV-4.13:container-native-virtualization/virtio-win-rhel9@sha256:d147d2a6eb6f907d1e88f61aaca83596853bc72164583d6dda2b1154b490de25_amd64",
"9Base-CNV-4.13:container-native-virtualization/vm-console-proxy-rhel9@sha256:70a8d0cd66182c25e02679540bae1368b2a9cf687532b58dba41ef30c5ca00c1_arm64",
"9Base-CNV-4.13:container-native-virtualization/vm-console-proxy-rhel9@sha256:7ca921f98f6d81a126907127a611146fb53397869a628678faa1e289c01d22b2_amd64",
"9Base-CNV-4.13:container-native-virtualization/vm-network-latency-checkup-rhel9@sha256:503ea7ac914a9b54e9d665a0227ee0b5d5200cdb5d692aa94c07dd1518d91b70_arm64",
"9Base-CNV-4.13:container-native-virtualization/vm-network-latency-checkup-rhel9@sha256:59fd965975bccf641a0fa7aa01374d45057bd03cda7528248a84b60b1205bf57_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:3205"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"9Base-CNV-4.13:container-native-virtualization/bridge-marker-rhel9@sha256:8eac196b30a648989cdca5cb153a3bc3d34e47339acba0e4f760bd366496c99d_amd64",
"9Base-CNV-4.13:container-native-virtualization/bridge-marker-rhel9@sha256:e8a55aee3d75a316bb0d7a554c737198823df04b3c05e481c17e45eb2153bced_arm64",
"9Base-CNV-4.13:container-native-virtualization/cluster-network-addons-operator-rhel9@sha256:3bff33e3f40cd1e2b519c2db56734d4bb8df883e155c2f20b1cb9d3d184daec1_amd64",
"9Base-CNV-4.13:container-native-virtualization/cluster-network-addons-operator-rhel9@sha256:f439d2f420bb59eb1d5af14ce2002648d0cfc155d1a1466c8aac9b661fe902b8_arm64",
"9Base-CNV-4.13:container-native-virtualization/cnv-containernetworking-plugins-rhel9@sha256:89f22e541f61a660c9aa9f38ef58e80b84a0517f74e84292107fc252c25465c9_arm64",
"9Base-CNV-4.13:container-native-virtualization/cnv-containernetworking-plugins-rhel9@sha256:bf471997e54e4a75b0d71f492ab295787fdbb14d8c85c4ea8c03f0552dbc3755_amd64",
"9Base-CNV-4.13:container-native-virtualization/cnv-must-gather-rhel9@sha256:9e8efd76924958eb605401abdac08eba97fb83a1ada383bc87a7fb7c87b3a455_arm64",
"9Base-CNV-4.13:container-native-virtualization/cnv-must-gather-rhel9@sha256:b9fc32b5fabedd65a4c3a471879c808af2087277de4278adaa115a732f0468da_amd64",
"9Base-CNV-4.13:container-native-virtualization/hco-bundle-registry-rhel9@sha256:60e89d7a99ff9f20e974430b802dd724a3bb6fa1e01e5a62daad98ac487b3063_amd64",
"9Base-CNV-4.13:container-native-virtualization/hco-bundle-registry-rhel9@sha256:dd20b138045ef1424d83a47e7abcfcbb2ac54577dcec5ed3c186390aaa4c9d84_arm64",
"9Base-CNV-4.13:container-native-virtualization/hostpath-csi-driver-rhel9@sha256:61e2824853d51347593ad909a5e546cd92e4216d6a1df5dffb50dd9cba277cce_amd64",
"9Base-CNV-4.13:container-native-virtualization/hostpath-csi-driver-rhel9@sha256:676d4c23a5f60dd331728af056b0a6b2d3358ac88da23299b1a98dfaca8f288e_arm64",
"9Base-CNV-4.13:container-native-virtualization/hostpath-provisioner-operator-rhel9@sha256:515be94be496c67f5b8fd5f4832fe4385e56476e6589897d6b9fbb9bb2b00f32_amd64",
"9Base-CNV-4.13:container-native-virtualization/hostpath-provisioner-operator-rhel9@sha256:571ae805641dea11646028c946039983c7fd82f138b915dcb8b80c39b465e63c_arm64",
"9Base-CNV-4.13:container-native-virtualization/hostpath-provisioner-rhel9@sha256:ac3fe350bedd6bc43596444ba0f279ccf8a144ab14ac5a9b80ea71c46390b7b4_amd64",
"9Base-CNV-4.13:container-native-virtualization/hostpath-provisioner-rhel9@sha256:d4ed87745b7ee2acca2d83e2c91c2f6dced1903c81495b50f2559b3ba2dde287_arm64",
"9Base-CNV-4.13:container-native-virtualization/hyperconverged-cluster-operator-rhel9@sha256:e5ab9f3be59d3568e3d672ab374efb16990ccf92192eac4e1244b10fcd7423e2_amd64",
"9Base-CNV-4.13:container-native-virtualization/hyperconverged-cluster-operator-rhel9@sha256:e681560b184189df03fc84c8a712f32289f42573dd348cda394b19565eb6eca8_arm64",
"9Base-CNV-4.13:container-native-virtualization/hyperconverged-cluster-webhook-rhel9@sha256:06d036d320b3027bb8370bb8e0f6fe8c9f0ec9bca7aac3b5c53698ba4a170042_arm64",
"9Base-CNV-4.13:container-native-virtualization/hyperconverged-cluster-webhook-rhel9@sha256:b5a01336180aad017df62cf8e652f2491b8263ba7e4dd07f858db1ef1924cf2f_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubemacpool-rhel9@sha256:4d190d81eeb3fbe9ed56cf3548dc83a3f81641bfdafa7b42dcfb0d2512566644_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubemacpool-rhel9@sha256:59862a59854f0d5b83dc25ba119f9586a8aff42b6e60d1922f8ae7b4567309ff_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubesecondarydns-rhel9@sha256:121d30d78cc57731ea2242ef2c32430890ac66c2723e65608d5e2f26c3f515cd_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubesecondarydns-rhel9@sha256:b1838f3c8ba3d8113bddea17b78c21e1c1490e2a4a07ea77014edee523d06347_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-console-plugin-rhel9@sha256:86a4b1e3d6ad1d56302c9c058f8bc5826dcfe6c46fb3e0ddaa06818645039020_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-console-plugin-rhel9@sha256:ffb2acd9ae09c1ef9ca756f5eaf6087d0a3957cfc824543949d25f556a97744d_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-dpdk-checkup-rhel9@sha256:525aceb9396010ebcdba14040f267889b807cd84db8e5b4030429b51f0fbf5fe_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-dpdk-checkup-rhel9@sha256:553c4686f56c66cc1e3c5ad9d4051f139d43f821eac3abb98ca5cdb8b5dfe202_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-ssp-operator-rhel9@sha256:901e6cad9534c7bd7c4018c60bccfe49d7280fba5a9901ab4c4d15e9345288c4_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-ssp-operator-rhel9@sha256:badeb0f65f543b209f6af761729d9778b7b73b97d55044016dfba3f38a1f6f18_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-cleanup-vm-rhel9@sha256:28e4975fa4dac22d9da32ed2a10aed039fd957b30140daa36bab2caa998be77a_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-cleanup-vm-rhel9@sha256:b0ff7e812a576ea848590655fc13a85832d5a39f68e7769ceab9da6949da88c7_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-copy-template-rhel9@sha256:4916a6c6b1f9b529187d3b4d5fc99b90157993767b3fe2ad36a9ec77fbb46b10_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-copy-template-rhel9@sha256:f71c36442f1b61cdde7ec58d2c3c78d2039f6d6108e6c35388ef7c1650971fa1_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-create-datavolume-rhel9@sha256:2ad49cf6e2242a9e5861929d9bcab1305a7fc4e34e708f99cff1d7253aa46167_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-create-datavolume-rhel9@sha256:7112400a4ecb23ee2110bf96372fcf9f96ad648a51aa944627b40eb59539a660_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-create-vm-from-template-rhel9@sha256:1411c65bbad7302710788327f6964a4bf5bc20ef70d5e46f4a5c6e7a0e7a0161_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-create-vm-from-template-rhel9@sha256:4d962618aa95600c60c9fc8b890186e510de91177d51949e12797a3558e31328_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-customize-rhel9@sha256:5c23d3f20ea9dcbe7109284d73078ecd516a070e964b844f8d80b1d92ebd55ee_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-customize-rhel9@sha256:a780244e48c6d4f87446d3754c3eb9ab79c0d54675c189da4a659f7a4d5668ea_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-sysprep-rhel9@sha256:84577d949a1bbcaa291c70729127bca4a8994df03068666baa23840877ea8392_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-sysprep-rhel9@sha256:aed630a597a090179e1b0e0c117e536df06b67d0f793f91936aa7388c0c5d7eb_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-modify-vm-template-rhel9@sha256:31d959b80cf57462e1705684bb7e1b78af26bd2c62f1c9e4e51e1d02199b05a8_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-modify-vm-template-rhel9@sha256:66aea526bc10e4c0136ba86e394bbdfe4fbd7f757d6f391a561b51d2ba2f4d46_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-operator-rhel9@sha256:d0cf0e81589f0938de45961eaddfc5ec4782738fd11082de0439b200534259eb_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-operator-rhel9@sha256:f1b1f5044db6bb945584f9d4f31d020597725a286ef368ed0aca2116abb31beb_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-wait-for-vmi-status-rhel9@sha256:39a15d03f113735df03b1a7408227eb9604d942c1f3c1992bcdc7eaf07662711_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-wait-for-vmi-status-rhel9@sha256:afb68af076954fcd18c7a4a1464ea0c2a766e8282eae980051906ed07eaa1707_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-template-validator-rhel9@sha256:02b22c7e7014b5e72d47fed8b6a268cf307638c5510adf3916c51f7f40a52a08_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-template-validator-rhel9@sha256:c0264b9271e602f85b2040ef7f207cdfa46038dc4fa6e4738bf196ef88a71cf8_amd64",
"9Base-CNV-4.13:container-native-virtualization/libguestfs-tools-rhel9@sha256:29ae84575bbca24553cf649256759fd96ff286971d80bc2db129154a7df9b283_amd64",
"9Base-CNV-4.13:container-native-virtualization/libguestfs-tools-rhel9@sha256:6558f60343e068b032167e2340b2c549c5f0258acc5d2614b60966ce79408b01_arm64",
"9Base-CNV-4.13:container-native-virtualization/multus-dynamic-networks-rhel9@sha256:3ecb0162a4b01d1590bf209d717b32a4f0835910d9979823f18c24acba41b503_arm64",
"9Base-CNV-4.13:container-native-virtualization/multus-dynamic-networks-rhel9@sha256:b7f68b6420009e21380d32d6459193aae45e93be9533debe17cb3108571b36b8_amd64",
"9Base-CNV-4.13:container-native-virtualization/ovs-cni-plugin-rhel9@sha256:0f1d372f418744e0aff59ecb0a38f53178aac9c2e9eecfd38aa25ed83e0d1360_arm64",
"9Base-CNV-4.13:container-native-virtualization/ovs-cni-plugin-rhel9@sha256:e8e7a44edbf1713fe74de5c4b8f691cce78f4440c4a32a16ba9ad16694a55396_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-api-rhel9@sha256:e68416321ca8c74a547b3d35897f54813c03481143e402e9bdc4daf315e35b5d_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-api-rhel9@sha256:fdb4ca1bb8b310d713d9c7e88f7d091f4460aa942dbeca5ebcf17281a06daffe_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-artifacts-server-rhel9@sha256:33d11c1832b49df39c1fca62bad40dbc5c30a452248339aaef449ac99509accb_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-artifacts-server-rhel9@sha256:81fc61b714baecb5a89fa6c0749c14566e0661b8e184ca602fc2e03b9cf431ee_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-apiserver-rhel9@sha256:f6128a63344ed2129f5bce648ddcfaa2869d31cde4b93328d3c22534b97ade10_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-apiserver-rhel9@sha256:feca273a691d09445c6cff6d36b5d590735e867656a9898ce0d89744d98e8006_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-cloner-rhel9@sha256:68e3b9b0291b4fb277ac430269ffce11d13b0a7688cf2ffcdb7f98759c36b4db_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-cloner-rhel9@sha256:6ac212767481bef64d8a7d0252bb8089c0f9751fad4a355aef71bd49dad2ad07_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-controller-rhel9@sha256:65f5263275d9f0a12b8fb057d82adf678778039ec873ca9bde182dea3413c9f1_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-controller-rhel9@sha256:d9e62b2019328be258489ac852eef25f8b1233f29abac6bcea5b406329f97fed_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-importer-rhel9@sha256:00a6d9d24ca1466d450b02269ec3144fc7550f0e5c696e869fbf7ce10cae6093_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-importer-rhel9@sha256:2df07fb21a3575e74aa16ded20129828f2300cd33e8ab369b0362062d49e62d0_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-operator-rhel9@sha256:20ec064750faedd97d11b797c8c1d9a1db5d60d7d76e82e65cfd05eb79d65e29_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-operator-rhel9@sha256:802ee8923d9d8e406b23911406f9748756c0ef4d6954e9e2fd5fb4bdf91dde9a_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-uploadproxy-rhel9@sha256:392d0f61f462c707adfdc21e4239c5c09d8520a80486b41d9d9ae479267d6124_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-uploadproxy-rhel9@sha256:6775f34353eec8f35bead9411dde155530d079bb8d51582fb1f2aacc27dbde1d_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-uploadserver-rhel9@sha256:4528c24672689cfb6505761b6b108fbcc04488192733f23d2bfe39cd42a1d743_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-uploadserver-rhel9@sha256:b22048390387380af94e267c8a9a66813c515997456d59d8ebac1486916b6585_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-controller-rhel9@sha256:3e7880149ee9a68286e390beb3d9779f7403c30fc5136e5370e0e4690a3fd243_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-controller-rhel9@sha256:970edc281d7a731e9f7e8c2d4440fe48a221e5e355d5235c5413b4c3adb28503_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-exportproxy-rhel9@sha256:1bda34d5bff734ad997202f29a5ff6f7362fd79fa90511a422442ef2e3681198_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-exportproxy-rhel9@sha256:de3c4afbf7669b98517cbef2490ec186f0553dd97b05bed80ec36dd883fe507b_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-exportserver-rhel9@sha256:3f7f98645176d42c63cca5c0fc3182a03121af87446ca421b6c72baf07dfca0d_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-exportserver-rhel9@sha256:8f12955cd777eb2409037a6968aa92f50c99d6e07e722951dbcfd0c8c9829b5e_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-handler-rhel9@sha256:5fc47110d866d8048aec50689090ce10705d19d3bb48d2b06727d6d569003af7_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-handler-rhel9@sha256:84ba79ae9658699147d2493df2582ab6df10adbff4d44a533c3fe6a9f45f9691_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-launcher-rhel9@sha256:4990d40d9987d5126d105dd45be2501eaded248cb61bdde5ea8d359bc1e7ebef_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-launcher-rhel9@sha256:95aeacb98209e0baef27ce0e02fbac38d693cea74808fc77107efda0f344bcb5_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-operator-rhel9@sha256:5c1a7e4ed2061938987b900a2394f07121d4037350c9bb6485213a2adfea787d_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-operator-rhel9@sha256:66b1b3b379121d6411ba22283e7d991617177330c93746d37753ab7812b9a00b_arm64",
"9Base-CNV-4.13:container-native-virtualization/virtio-win-rhel9@sha256:8735f51da918408a8826601c082d1b29accf26d59b9978da89b980cb509c1102_arm64",
"9Base-CNV-4.13:container-native-virtualization/virtio-win-rhel9@sha256:d147d2a6eb6f907d1e88f61aaca83596853bc72164583d6dda2b1154b490de25_amd64",
"9Base-CNV-4.13:container-native-virtualization/vm-console-proxy-rhel9@sha256:70a8d0cd66182c25e02679540bae1368b2a9cf687532b58dba41ef30c5ca00c1_arm64",
"9Base-CNV-4.13:container-native-virtualization/vm-console-proxy-rhel9@sha256:7ca921f98f6d81a126907127a611146fb53397869a628678faa1e289c01d22b2_amd64",
"9Base-CNV-4.13:container-native-virtualization/vm-network-latency-checkup-rhel9@sha256:503ea7ac914a9b54e9d665a0227ee0b5d5200cdb5d692aa94c07dd1518d91b70_arm64",
"9Base-CNV-4.13:container-native-virtualization/vm-network-latency-checkup-rhel9@sha256:59fd965975bccf641a0fa7aa01374d45057bd03cda7528248a84b60b1205bf57_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "golang: archive/tar: unbounded memory consumption when reading headers"
},
{
"acknowledgments": [
{
"names": [
"Daniel Abeles"
],
"organization": "Head of Research, Oxeye"
},
{
"names": [
"Gal Goldstein"
],
"organization": "Security Researcher, Oxeye"
}
],
"cve": "CVE-2022-2880",
"cwe": {
"id": "CWE-444",
"name": "Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027)"
},
"discovery_date": "2022-10-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2132868"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the golang package, where requests forwarded by reverse proxy include the raw query parameters from the inbound request, including unparseable parameters rejected by net/http. This issue could permit query parameter smuggling when a Go proxy forwards a parameter with an unparseable value. After the fix, the reverse proxy sanitizes the query parameters in the forwarded query when the outbound request\u0027s form field is set after the reverse proxy. The director function returns, indicating that the proxy has parsed the query parameters. Proxies that do not parse query parameters continue to forward the original query parameters unchanged.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: net/http/httputil: ReverseProxy should not forward unparseable query parameters",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The opportunity to exploit this vulnerability is limited to the Golang runtime. In the case of the OpenShift Container Platform, this would be restricted within each individual container. There are multiple layers of guide rails (Golang\u2019s Garbage Collector; OpenShift\u2019s resource constraints imposed at the container and cluster levels) which would require a malicious user to continue submitting attacks for there to be any enduring impact.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"9Base-CNV-4.13:container-native-virtualization/bridge-marker-rhel9@sha256:8eac196b30a648989cdca5cb153a3bc3d34e47339acba0e4f760bd366496c99d_amd64",
"9Base-CNV-4.13:container-native-virtualization/bridge-marker-rhel9@sha256:e8a55aee3d75a316bb0d7a554c737198823df04b3c05e481c17e45eb2153bced_arm64",
"9Base-CNV-4.13:container-native-virtualization/cluster-network-addons-operator-rhel9@sha256:3bff33e3f40cd1e2b519c2db56734d4bb8df883e155c2f20b1cb9d3d184daec1_amd64",
"9Base-CNV-4.13:container-native-virtualization/cluster-network-addons-operator-rhel9@sha256:f439d2f420bb59eb1d5af14ce2002648d0cfc155d1a1466c8aac9b661fe902b8_arm64",
"9Base-CNV-4.13:container-native-virtualization/cnv-containernetworking-plugins-rhel9@sha256:89f22e541f61a660c9aa9f38ef58e80b84a0517f74e84292107fc252c25465c9_arm64",
"9Base-CNV-4.13:container-native-virtualization/cnv-containernetworking-plugins-rhel9@sha256:bf471997e54e4a75b0d71f492ab295787fdbb14d8c85c4ea8c03f0552dbc3755_amd64",
"9Base-CNV-4.13:container-native-virtualization/cnv-must-gather-rhel9@sha256:9e8efd76924958eb605401abdac08eba97fb83a1ada383bc87a7fb7c87b3a455_arm64",
"9Base-CNV-4.13:container-native-virtualization/cnv-must-gather-rhel9@sha256:b9fc32b5fabedd65a4c3a471879c808af2087277de4278adaa115a732f0468da_amd64",
"9Base-CNV-4.13:container-native-virtualization/hco-bundle-registry-rhel9@sha256:60e89d7a99ff9f20e974430b802dd724a3bb6fa1e01e5a62daad98ac487b3063_amd64",
"9Base-CNV-4.13:container-native-virtualization/hco-bundle-registry-rhel9@sha256:dd20b138045ef1424d83a47e7abcfcbb2ac54577dcec5ed3c186390aaa4c9d84_arm64",
"9Base-CNV-4.13:container-native-virtualization/hostpath-csi-driver-rhel9@sha256:61e2824853d51347593ad909a5e546cd92e4216d6a1df5dffb50dd9cba277cce_amd64",
"9Base-CNV-4.13:container-native-virtualization/hostpath-csi-driver-rhel9@sha256:676d4c23a5f60dd331728af056b0a6b2d3358ac88da23299b1a98dfaca8f288e_arm64",
"9Base-CNV-4.13:container-native-virtualization/hostpath-provisioner-operator-rhel9@sha256:515be94be496c67f5b8fd5f4832fe4385e56476e6589897d6b9fbb9bb2b00f32_amd64",
"9Base-CNV-4.13:container-native-virtualization/hostpath-provisioner-operator-rhel9@sha256:571ae805641dea11646028c946039983c7fd82f138b915dcb8b80c39b465e63c_arm64",
"9Base-CNV-4.13:container-native-virtualization/hostpath-provisioner-rhel9@sha256:ac3fe350bedd6bc43596444ba0f279ccf8a144ab14ac5a9b80ea71c46390b7b4_amd64",
"9Base-CNV-4.13:container-native-virtualization/hostpath-provisioner-rhel9@sha256:d4ed87745b7ee2acca2d83e2c91c2f6dced1903c81495b50f2559b3ba2dde287_arm64",
"9Base-CNV-4.13:container-native-virtualization/hyperconverged-cluster-operator-rhel9@sha256:e5ab9f3be59d3568e3d672ab374efb16990ccf92192eac4e1244b10fcd7423e2_amd64",
"9Base-CNV-4.13:container-native-virtualization/hyperconverged-cluster-operator-rhel9@sha256:e681560b184189df03fc84c8a712f32289f42573dd348cda394b19565eb6eca8_arm64",
"9Base-CNV-4.13:container-native-virtualization/hyperconverged-cluster-webhook-rhel9@sha256:06d036d320b3027bb8370bb8e0f6fe8c9f0ec9bca7aac3b5c53698ba4a170042_arm64",
"9Base-CNV-4.13:container-native-virtualization/hyperconverged-cluster-webhook-rhel9@sha256:b5a01336180aad017df62cf8e652f2491b8263ba7e4dd07f858db1ef1924cf2f_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubemacpool-rhel9@sha256:4d190d81eeb3fbe9ed56cf3548dc83a3f81641bfdafa7b42dcfb0d2512566644_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubemacpool-rhel9@sha256:59862a59854f0d5b83dc25ba119f9586a8aff42b6e60d1922f8ae7b4567309ff_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubesecondarydns-rhel9@sha256:121d30d78cc57731ea2242ef2c32430890ac66c2723e65608d5e2f26c3f515cd_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubesecondarydns-rhel9@sha256:b1838f3c8ba3d8113bddea17b78c21e1c1490e2a4a07ea77014edee523d06347_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-console-plugin-rhel9@sha256:86a4b1e3d6ad1d56302c9c058f8bc5826dcfe6c46fb3e0ddaa06818645039020_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-console-plugin-rhel9@sha256:ffb2acd9ae09c1ef9ca756f5eaf6087d0a3957cfc824543949d25f556a97744d_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-dpdk-checkup-rhel9@sha256:525aceb9396010ebcdba14040f267889b807cd84db8e5b4030429b51f0fbf5fe_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-dpdk-checkup-rhel9@sha256:553c4686f56c66cc1e3c5ad9d4051f139d43f821eac3abb98ca5cdb8b5dfe202_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-ssp-operator-rhel9@sha256:901e6cad9534c7bd7c4018c60bccfe49d7280fba5a9901ab4c4d15e9345288c4_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-ssp-operator-rhel9@sha256:badeb0f65f543b209f6af761729d9778b7b73b97d55044016dfba3f38a1f6f18_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-cleanup-vm-rhel9@sha256:28e4975fa4dac22d9da32ed2a10aed039fd957b30140daa36bab2caa998be77a_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-cleanup-vm-rhel9@sha256:b0ff7e812a576ea848590655fc13a85832d5a39f68e7769ceab9da6949da88c7_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-copy-template-rhel9@sha256:4916a6c6b1f9b529187d3b4d5fc99b90157993767b3fe2ad36a9ec77fbb46b10_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-copy-template-rhel9@sha256:f71c36442f1b61cdde7ec58d2c3c78d2039f6d6108e6c35388ef7c1650971fa1_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-create-datavolume-rhel9@sha256:2ad49cf6e2242a9e5861929d9bcab1305a7fc4e34e708f99cff1d7253aa46167_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-create-datavolume-rhel9@sha256:7112400a4ecb23ee2110bf96372fcf9f96ad648a51aa944627b40eb59539a660_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-create-vm-from-template-rhel9@sha256:1411c65bbad7302710788327f6964a4bf5bc20ef70d5e46f4a5c6e7a0e7a0161_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-create-vm-from-template-rhel9@sha256:4d962618aa95600c60c9fc8b890186e510de91177d51949e12797a3558e31328_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-customize-rhel9@sha256:5c23d3f20ea9dcbe7109284d73078ecd516a070e964b844f8d80b1d92ebd55ee_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-customize-rhel9@sha256:a780244e48c6d4f87446d3754c3eb9ab79c0d54675c189da4a659f7a4d5668ea_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-sysprep-rhel9@sha256:84577d949a1bbcaa291c70729127bca4a8994df03068666baa23840877ea8392_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-sysprep-rhel9@sha256:aed630a597a090179e1b0e0c117e536df06b67d0f793f91936aa7388c0c5d7eb_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-modify-vm-template-rhel9@sha256:31d959b80cf57462e1705684bb7e1b78af26bd2c62f1c9e4e51e1d02199b05a8_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-modify-vm-template-rhel9@sha256:66aea526bc10e4c0136ba86e394bbdfe4fbd7f757d6f391a561b51d2ba2f4d46_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-operator-rhel9@sha256:d0cf0e81589f0938de45961eaddfc5ec4782738fd11082de0439b200534259eb_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-operator-rhel9@sha256:f1b1f5044db6bb945584f9d4f31d020597725a286ef368ed0aca2116abb31beb_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-wait-for-vmi-status-rhel9@sha256:39a15d03f113735df03b1a7408227eb9604d942c1f3c1992bcdc7eaf07662711_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-wait-for-vmi-status-rhel9@sha256:afb68af076954fcd18c7a4a1464ea0c2a766e8282eae980051906ed07eaa1707_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-template-validator-rhel9@sha256:02b22c7e7014b5e72d47fed8b6a268cf307638c5510adf3916c51f7f40a52a08_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-template-validator-rhel9@sha256:c0264b9271e602f85b2040ef7f207cdfa46038dc4fa6e4738bf196ef88a71cf8_amd64",
"9Base-CNV-4.13:container-native-virtualization/libguestfs-tools-rhel9@sha256:29ae84575bbca24553cf649256759fd96ff286971d80bc2db129154a7df9b283_amd64",
"9Base-CNV-4.13:container-native-virtualization/libguestfs-tools-rhel9@sha256:6558f60343e068b032167e2340b2c549c5f0258acc5d2614b60966ce79408b01_arm64",
"9Base-CNV-4.13:container-native-virtualization/multus-dynamic-networks-rhel9@sha256:3ecb0162a4b01d1590bf209d717b32a4f0835910d9979823f18c24acba41b503_arm64",
"9Base-CNV-4.13:container-native-virtualization/multus-dynamic-networks-rhel9@sha256:b7f68b6420009e21380d32d6459193aae45e93be9533debe17cb3108571b36b8_amd64",
"9Base-CNV-4.13:container-native-virtualization/ovs-cni-plugin-rhel9@sha256:0f1d372f418744e0aff59ecb0a38f53178aac9c2e9eecfd38aa25ed83e0d1360_arm64",
"9Base-CNV-4.13:container-native-virtualization/ovs-cni-plugin-rhel9@sha256:e8e7a44edbf1713fe74de5c4b8f691cce78f4440c4a32a16ba9ad16694a55396_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-api-rhel9@sha256:e68416321ca8c74a547b3d35897f54813c03481143e402e9bdc4daf315e35b5d_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-api-rhel9@sha256:fdb4ca1bb8b310d713d9c7e88f7d091f4460aa942dbeca5ebcf17281a06daffe_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-artifacts-server-rhel9@sha256:33d11c1832b49df39c1fca62bad40dbc5c30a452248339aaef449ac99509accb_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-artifacts-server-rhel9@sha256:81fc61b714baecb5a89fa6c0749c14566e0661b8e184ca602fc2e03b9cf431ee_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-apiserver-rhel9@sha256:f6128a63344ed2129f5bce648ddcfaa2869d31cde4b93328d3c22534b97ade10_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-apiserver-rhel9@sha256:feca273a691d09445c6cff6d36b5d590735e867656a9898ce0d89744d98e8006_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-cloner-rhel9@sha256:68e3b9b0291b4fb277ac430269ffce11d13b0a7688cf2ffcdb7f98759c36b4db_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-cloner-rhel9@sha256:6ac212767481bef64d8a7d0252bb8089c0f9751fad4a355aef71bd49dad2ad07_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-controller-rhel9@sha256:65f5263275d9f0a12b8fb057d82adf678778039ec873ca9bde182dea3413c9f1_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-controller-rhel9@sha256:d9e62b2019328be258489ac852eef25f8b1233f29abac6bcea5b406329f97fed_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-importer-rhel9@sha256:00a6d9d24ca1466d450b02269ec3144fc7550f0e5c696e869fbf7ce10cae6093_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-importer-rhel9@sha256:2df07fb21a3575e74aa16ded20129828f2300cd33e8ab369b0362062d49e62d0_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-operator-rhel9@sha256:20ec064750faedd97d11b797c8c1d9a1db5d60d7d76e82e65cfd05eb79d65e29_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-operator-rhel9@sha256:802ee8923d9d8e406b23911406f9748756c0ef4d6954e9e2fd5fb4bdf91dde9a_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-uploadproxy-rhel9@sha256:392d0f61f462c707adfdc21e4239c5c09d8520a80486b41d9d9ae479267d6124_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-uploadproxy-rhel9@sha256:6775f34353eec8f35bead9411dde155530d079bb8d51582fb1f2aacc27dbde1d_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-uploadserver-rhel9@sha256:4528c24672689cfb6505761b6b108fbcc04488192733f23d2bfe39cd42a1d743_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-uploadserver-rhel9@sha256:b22048390387380af94e267c8a9a66813c515997456d59d8ebac1486916b6585_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-controller-rhel9@sha256:3e7880149ee9a68286e390beb3d9779f7403c30fc5136e5370e0e4690a3fd243_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-controller-rhel9@sha256:970edc281d7a731e9f7e8c2d4440fe48a221e5e355d5235c5413b4c3adb28503_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-exportproxy-rhel9@sha256:1bda34d5bff734ad997202f29a5ff6f7362fd79fa90511a422442ef2e3681198_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-exportproxy-rhel9@sha256:de3c4afbf7669b98517cbef2490ec186f0553dd97b05bed80ec36dd883fe507b_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-exportserver-rhel9@sha256:3f7f98645176d42c63cca5c0fc3182a03121af87446ca421b6c72baf07dfca0d_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-exportserver-rhel9@sha256:8f12955cd777eb2409037a6968aa92f50c99d6e07e722951dbcfd0c8c9829b5e_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-handler-rhel9@sha256:5fc47110d866d8048aec50689090ce10705d19d3bb48d2b06727d6d569003af7_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-handler-rhel9@sha256:84ba79ae9658699147d2493df2582ab6df10adbff4d44a533c3fe6a9f45f9691_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-launcher-rhel9@sha256:4990d40d9987d5126d105dd45be2501eaded248cb61bdde5ea8d359bc1e7ebef_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-launcher-rhel9@sha256:95aeacb98209e0baef27ce0e02fbac38d693cea74808fc77107efda0f344bcb5_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-operator-rhel9@sha256:5c1a7e4ed2061938987b900a2394f07121d4037350c9bb6485213a2adfea787d_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-operator-rhel9@sha256:66b1b3b379121d6411ba22283e7d991617177330c93746d37753ab7812b9a00b_arm64",
"9Base-CNV-4.13:container-native-virtualization/virtio-win-rhel9@sha256:8735f51da918408a8826601c082d1b29accf26d59b9978da89b980cb509c1102_arm64",
"9Base-CNV-4.13:container-native-virtualization/virtio-win-rhel9@sha256:d147d2a6eb6f907d1e88f61aaca83596853bc72164583d6dda2b1154b490de25_amd64",
"9Base-CNV-4.13:container-native-virtualization/vm-console-proxy-rhel9@sha256:70a8d0cd66182c25e02679540bae1368b2a9cf687532b58dba41ef30c5ca00c1_arm64",
"9Base-CNV-4.13:container-native-virtualization/vm-console-proxy-rhel9@sha256:7ca921f98f6d81a126907127a611146fb53397869a628678faa1e289c01d22b2_amd64",
"9Base-CNV-4.13:container-native-virtualization/vm-network-latency-checkup-rhel9@sha256:503ea7ac914a9b54e9d665a0227ee0b5d5200cdb5d692aa94c07dd1518d91b70_arm64",
"9Base-CNV-4.13:container-native-virtualization/vm-network-latency-checkup-rhel9@sha256:59fd965975bccf641a0fa7aa01374d45057bd03cda7528248a84b60b1205bf57_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-2880"
},
{
"category": "external",
"summary": "RHBZ#2132868",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2132868"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-2880",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2880"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-2880",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-2880"
},
{
"category": "external",
"summary": "https://github.com/golang/go/issues/54663",
"url": "https://github.com/golang/go/issues/54663"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/xtuG5faxtaU?pli=1",
"url": "https://groups.google.com/g/golang-announce/c/xtuG5faxtaU?pli=1"
}
],
"release_date": "2022-10-04T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-05-18T02:55:08+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"9Base-CNV-4.13:container-native-virtualization/bridge-marker-rhel9@sha256:8eac196b30a648989cdca5cb153a3bc3d34e47339acba0e4f760bd366496c99d_amd64",
"9Base-CNV-4.13:container-native-virtualization/bridge-marker-rhel9@sha256:e8a55aee3d75a316bb0d7a554c737198823df04b3c05e481c17e45eb2153bced_arm64",
"9Base-CNV-4.13:container-native-virtualization/cluster-network-addons-operator-rhel9@sha256:3bff33e3f40cd1e2b519c2db56734d4bb8df883e155c2f20b1cb9d3d184daec1_amd64",
"9Base-CNV-4.13:container-native-virtualization/cluster-network-addons-operator-rhel9@sha256:f439d2f420bb59eb1d5af14ce2002648d0cfc155d1a1466c8aac9b661fe902b8_arm64",
"9Base-CNV-4.13:container-native-virtualization/cnv-containernetworking-plugins-rhel9@sha256:89f22e541f61a660c9aa9f38ef58e80b84a0517f74e84292107fc252c25465c9_arm64",
"9Base-CNV-4.13:container-native-virtualization/cnv-containernetworking-plugins-rhel9@sha256:bf471997e54e4a75b0d71f492ab295787fdbb14d8c85c4ea8c03f0552dbc3755_amd64",
"9Base-CNV-4.13:container-native-virtualization/cnv-must-gather-rhel9@sha256:9e8efd76924958eb605401abdac08eba97fb83a1ada383bc87a7fb7c87b3a455_arm64",
"9Base-CNV-4.13:container-native-virtualization/cnv-must-gather-rhel9@sha256:b9fc32b5fabedd65a4c3a471879c808af2087277de4278adaa115a732f0468da_amd64",
"9Base-CNV-4.13:container-native-virtualization/hco-bundle-registry-rhel9@sha256:60e89d7a99ff9f20e974430b802dd724a3bb6fa1e01e5a62daad98ac487b3063_amd64",
"9Base-CNV-4.13:container-native-virtualization/hco-bundle-registry-rhel9@sha256:dd20b138045ef1424d83a47e7abcfcbb2ac54577dcec5ed3c186390aaa4c9d84_arm64",
"9Base-CNV-4.13:container-native-virtualization/hostpath-csi-driver-rhel9@sha256:61e2824853d51347593ad909a5e546cd92e4216d6a1df5dffb50dd9cba277cce_amd64",
"9Base-CNV-4.13:container-native-virtualization/hostpath-csi-driver-rhel9@sha256:676d4c23a5f60dd331728af056b0a6b2d3358ac88da23299b1a98dfaca8f288e_arm64",
"9Base-CNV-4.13:container-native-virtualization/hostpath-provisioner-operator-rhel9@sha256:515be94be496c67f5b8fd5f4832fe4385e56476e6589897d6b9fbb9bb2b00f32_amd64",
"9Base-CNV-4.13:container-native-virtualization/hostpath-provisioner-operator-rhel9@sha256:571ae805641dea11646028c946039983c7fd82f138b915dcb8b80c39b465e63c_arm64",
"9Base-CNV-4.13:container-native-virtualization/hostpath-provisioner-rhel9@sha256:ac3fe350bedd6bc43596444ba0f279ccf8a144ab14ac5a9b80ea71c46390b7b4_amd64",
"9Base-CNV-4.13:container-native-virtualization/hostpath-provisioner-rhel9@sha256:d4ed87745b7ee2acca2d83e2c91c2f6dced1903c81495b50f2559b3ba2dde287_arm64",
"9Base-CNV-4.13:container-native-virtualization/hyperconverged-cluster-operator-rhel9@sha256:e5ab9f3be59d3568e3d672ab374efb16990ccf92192eac4e1244b10fcd7423e2_amd64",
"9Base-CNV-4.13:container-native-virtualization/hyperconverged-cluster-operator-rhel9@sha256:e681560b184189df03fc84c8a712f32289f42573dd348cda394b19565eb6eca8_arm64",
"9Base-CNV-4.13:container-native-virtualization/hyperconverged-cluster-webhook-rhel9@sha256:06d036d320b3027bb8370bb8e0f6fe8c9f0ec9bca7aac3b5c53698ba4a170042_arm64",
"9Base-CNV-4.13:container-native-virtualization/hyperconverged-cluster-webhook-rhel9@sha256:b5a01336180aad017df62cf8e652f2491b8263ba7e4dd07f858db1ef1924cf2f_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubemacpool-rhel9@sha256:4d190d81eeb3fbe9ed56cf3548dc83a3f81641bfdafa7b42dcfb0d2512566644_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubemacpool-rhel9@sha256:59862a59854f0d5b83dc25ba119f9586a8aff42b6e60d1922f8ae7b4567309ff_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubesecondarydns-rhel9@sha256:121d30d78cc57731ea2242ef2c32430890ac66c2723e65608d5e2f26c3f515cd_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubesecondarydns-rhel9@sha256:b1838f3c8ba3d8113bddea17b78c21e1c1490e2a4a07ea77014edee523d06347_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-console-plugin-rhel9@sha256:86a4b1e3d6ad1d56302c9c058f8bc5826dcfe6c46fb3e0ddaa06818645039020_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-console-plugin-rhel9@sha256:ffb2acd9ae09c1ef9ca756f5eaf6087d0a3957cfc824543949d25f556a97744d_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-dpdk-checkup-rhel9@sha256:525aceb9396010ebcdba14040f267889b807cd84db8e5b4030429b51f0fbf5fe_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-dpdk-checkup-rhel9@sha256:553c4686f56c66cc1e3c5ad9d4051f139d43f821eac3abb98ca5cdb8b5dfe202_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-ssp-operator-rhel9@sha256:901e6cad9534c7bd7c4018c60bccfe49d7280fba5a9901ab4c4d15e9345288c4_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-ssp-operator-rhel9@sha256:badeb0f65f543b209f6af761729d9778b7b73b97d55044016dfba3f38a1f6f18_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-cleanup-vm-rhel9@sha256:28e4975fa4dac22d9da32ed2a10aed039fd957b30140daa36bab2caa998be77a_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-cleanup-vm-rhel9@sha256:b0ff7e812a576ea848590655fc13a85832d5a39f68e7769ceab9da6949da88c7_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-copy-template-rhel9@sha256:4916a6c6b1f9b529187d3b4d5fc99b90157993767b3fe2ad36a9ec77fbb46b10_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-copy-template-rhel9@sha256:f71c36442f1b61cdde7ec58d2c3c78d2039f6d6108e6c35388ef7c1650971fa1_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-create-datavolume-rhel9@sha256:2ad49cf6e2242a9e5861929d9bcab1305a7fc4e34e708f99cff1d7253aa46167_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-create-datavolume-rhel9@sha256:7112400a4ecb23ee2110bf96372fcf9f96ad648a51aa944627b40eb59539a660_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-create-vm-from-template-rhel9@sha256:1411c65bbad7302710788327f6964a4bf5bc20ef70d5e46f4a5c6e7a0e7a0161_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-create-vm-from-template-rhel9@sha256:4d962618aa95600c60c9fc8b890186e510de91177d51949e12797a3558e31328_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-customize-rhel9@sha256:5c23d3f20ea9dcbe7109284d73078ecd516a070e964b844f8d80b1d92ebd55ee_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-customize-rhel9@sha256:a780244e48c6d4f87446d3754c3eb9ab79c0d54675c189da4a659f7a4d5668ea_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-sysprep-rhel9@sha256:84577d949a1bbcaa291c70729127bca4a8994df03068666baa23840877ea8392_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-sysprep-rhel9@sha256:aed630a597a090179e1b0e0c117e536df06b67d0f793f91936aa7388c0c5d7eb_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-modify-vm-template-rhel9@sha256:31d959b80cf57462e1705684bb7e1b78af26bd2c62f1c9e4e51e1d02199b05a8_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-modify-vm-template-rhel9@sha256:66aea526bc10e4c0136ba86e394bbdfe4fbd7f757d6f391a561b51d2ba2f4d46_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-operator-rhel9@sha256:d0cf0e81589f0938de45961eaddfc5ec4782738fd11082de0439b200534259eb_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-operator-rhel9@sha256:f1b1f5044db6bb945584f9d4f31d020597725a286ef368ed0aca2116abb31beb_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-wait-for-vmi-status-rhel9@sha256:39a15d03f113735df03b1a7408227eb9604d942c1f3c1992bcdc7eaf07662711_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-wait-for-vmi-status-rhel9@sha256:afb68af076954fcd18c7a4a1464ea0c2a766e8282eae980051906ed07eaa1707_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-template-validator-rhel9@sha256:02b22c7e7014b5e72d47fed8b6a268cf307638c5510adf3916c51f7f40a52a08_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-template-validator-rhel9@sha256:c0264b9271e602f85b2040ef7f207cdfa46038dc4fa6e4738bf196ef88a71cf8_amd64",
"9Base-CNV-4.13:container-native-virtualization/libguestfs-tools-rhel9@sha256:29ae84575bbca24553cf649256759fd96ff286971d80bc2db129154a7df9b283_amd64",
"9Base-CNV-4.13:container-native-virtualization/libguestfs-tools-rhel9@sha256:6558f60343e068b032167e2340b2c549c5f0258acc5d2614b60966ce79408b01_arm64",
"9Base-CNV-4.13:container-native-virtualization/multus-dynamic-networks-rhel9@sha256:3ecb0162a4b01d1590bf209d717b32a4f0835910d9979823f18c24acba41b503_arm64",
"9Base-CNV-4.13:container-native-virtualization/multus-dynamic-networks-rhel9@sha256:b7f68b6420009e21380d32d6459193aae45e93be9533debe17cb3108571b36b8_amd64",
"9Base-CNV-4.13:container-native-virtualization/ovs-cni-plugin-rhel9@sha256:0f1d372f418744e0aff59ecb0a38f53178aac9c2e9eecfd38aa25ed83e0d1360_arm64",
"9Base-CNV-4.13:container-native-virtualization/ovs-cni-plugin-rhel9@sha256:e8e7a44edbf1713fe74de5c4b8f691cce78f4440c4a32a16ba9ad16694a55396_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-api-rhel9@sha256:e68416321ca8c74a547b3d35897f54813c03481143e402e9bdc4daf315e35b5d_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-api-rhel9@sha256:fdb4ca1bb8b310d713d9c7e88f7d091f4460aa942dbeca5ebcf17281a06daffe_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-artifacts-server-rhel9@sha256:33d11c1832b49df39c1fca62bad40dbc5c30a452248339aaef449ac99509accb_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-artifacts-server-rhel9@sha256:81fc61b714baecb5a89fa6c0749c14566e0661b8e184ca602fc2e03b9cf431ee_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-apiserver-rhel9@sha256:f6128a63344ed2129f5bce648ddcfaa2869d31cde4b93328d3c22534b97ade10_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-apiserver-rhel9@sha256:feca273a691d09445c6cff6d36b5d590735e867656a9898ce0d89744d98e8006_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-cloner-rhel9@sha256:68e3b9b0291b4fb277ac430269ffce11d13b0a7688cf2ffcdb7f98759c36b4db_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-cloner-rhel9@sha256:6ac212767481bef64d8a7d0252bb8089c0f9751fad4a355aef71bd49dad2ad07_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-controller-rhel9@sha256:65f5263275d9f0a12b8fb057d82adf678778039ec873ca9bde182dea3413c9f1_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-controller-rhel9@sha256:d9e62b2019328be258489ac852eef25f8b1233f29abac6bcea5b406329f97fed_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-importer-rhel9@sha256:00a6d9d24ca1466d450b02269ec3144fc7550f0e5c696e869fbf7ce10cae6093_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-importer-rhel9@sha256:2df07fb21a3575e74aa16ded20129828f2300cd33e8ab369b0362062d49e62d0_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-operator-rhel9@sha256:20ec064750faedd97d11b797c8c1d9a1db5d60d7d76e82e65cfd05eb79d65e29_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-operator-rhel9@sha256:802ee8923d9d8e406b23911406f9748756c0ef4d6954e9e2fd5fb4bdf91dde9a_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-uploadproxy-rhel9@sha256:392d0f61f462c707adfdc21e4239c5c09d8520a80486b41d9d9ae479267d6124_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-uploadproxy-rhel9@sha256:6775f34353eec8f35bead9411dde155530d079bb8d51582fb1f2aacc27dbde1d_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-uploadserver-rhel9@sha256:4528c24672689cfb6505761b6b108fbcc04488192733f23d2bfe39cd42a1d743_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-uploadserver-rhel9@sha256:b22048390387380af94e267c8a9a66813c515997456d59d8ebac1486916b6585_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-controller-rhel9@sha256:3e7880149ee9a68286e390beb3d9779f7403c30fc5136e5370e0e4690a3fd243_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-controller-rhel9@sha256:970edc281d7a731e9f7e8c2d4440fe48a221e5e355d5235c5413b4c3adb28503_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-exportproxy-rhel9@sha256:1bda34d5bff734ad997202f29a5ff6f7362fd79fa90511a422442ef2e3681198_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-exportproxy-rhel9@sha256:de3c4afbf7669b98517cbef2490ec186f0553dd97b05bed80ec36dd883fe507b_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-exportserver-rhel9@sha256:3f7f98645176d42c63cca5c0fc3182a03121af87446ca421b6c72baf07dfca0d_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-exportserver-rhel9@sha256:8f12955cd777eb2409037a6968aa92f50c99d6e07e722951dbcfd0c8c9829b5e_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-handler-rhel9@sha256:5fc47110d866d8048aec50689090ce10705d19d3bb48d2b06727d6d569003af7_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-handler-rhel9@sha256:84ba79ae9658699147d2493df2582ab6df10adbff4d44a533c3fe6a9f45f9691_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-launcher-rhel9@sha256:4990d40d9987d5126d105dd45be2501eaded248cb61bdde5ea8d359bc1e7ebef_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-launcher-rhel9@sha256:95aeacb98209e0baef27ce0e02fbac38d693cea74808fc77107efda0f344bcb5_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-operator-rhel9@sha256:5c1a7e4ed2061938987b900a2394f07121d4037350c9bb6485213a2adfea787d_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-operator-rhel9@sha256:66b1b3b379121d6411ba22283e7d991617177330c93746d37753ab7812b9a00b_arm64",
"9Base-CNV-4.13:container-native-virtualization/virtio-win-rhel9@sha256:8735f51da918408a8826601c082d1b29accf26d59b9978da89b980cb509c1102_arm64",
"9Base-CNV-4.13:container-native-virtualization/virtio-win-rhel9@sha256:d147d2a6eb6f907d1e88f61aaca83596853bc72164583d6dda2b1154b490de25_amd64",
"9Base-CNV-4.13:container-native-virtualization/vm-console-proxy-rhel9@sha256:70a8d0cd66182c25e02679540bae1368b2a9cf687532b58dba41ef30c5ca00c1_arm64",
"9Base-CNV-4.13:container-native-virtualization/vm-console-proxy-rhel9@sha256:7ca921f98f6d81a126907127a611146fb53397869a628678faa1e289c01d22b2_amd64",
"9Base-CNV-4.13:container-native-virtualization/vm-network-latency-checkup-rhel9@sha256:503ea7ac914a9b54e9d665a0227ee0b5d5200cdb5d692aa94c07dd1518d91b70_arm64",
"9Base-CNV-4.13:container-native-virtualization/vm-network-latency-checkup-rhel9@sha256:59fd965975bccf641a0fa7aa01374d45057bd03cda7528248a84b60b1205bf57_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:3205"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"9Base-CNV-4.13:container-native-virtualization/bridge-marker-rhel9@sha256:8eac196b30a648989cdca5cb153a3bc3d34e47339acba0e4f760bd366496c99d_amd64",
"9Base-CNV-4.13:container-native-virtualization/bridge-marker-rhel9@sha256:e8a55aee3d75a316bb0d7a554c737198823df04b3c05e481c17e45eb2153bced_arm64",
"9Base-CNV-4.13:container-native-virtualization/cluster-network-addons-operator-rhel9@sha256:3bff33e3f40cd1e2b519c2db56734d4bb8df883e155c2f20b1cb9d3d184daec1_amd64",
"9Base-CNV-4.13:container-native-virtualization/cluster-network-addons-operator-rhel9@sha256:f439d2f420bb59eb1d5af14ce2002648d0cfc155d1a1466c8aac9b661fe902b8_arm64",
"9Base-CNV-4.13:container-native-virtualization/cnv-containernetworking-plugins-rhel9@sha256:89f22e541f61a660c9aa9f38ef58e80b84a0517f74e84292107fc252c25465c9_arm64",
"9Base-CNV-4.13:container-native-virtualization/cnv-containernetworking-plugins-rhel9@sha256:bf471997e54e4a75b0d71f492ab295787fdbb14d8c85c4ea8c03f0552dbc3755_amd64",
"9Base-CNV-4.13:container-native-virtualization/cnv-must-gather-rhel9@sha256:9e8efd76924958eb605401abdac08eba97fb83a1ada383bc87a7fb7c87b3a455_arm64",
"9Base-CNV-4.13:container-native-virtualization/cnv-must-gather-rhel9@sha256:b9fc32b5fabedd65a4c3a471879c808af2087277de4278adaa115a732f0468da_amd64",
"9Base-CNV-4.13:container-native-virtualization/hco-bundle-registry-rhel9@sha256:60e89d7a99ff9f20e974430b802dd724a3bb6fa1e01e5a62daad98ac487b3063_amd64",
"9Base-CNV-4.13:container-native-virtualization/hco-bundle-registry-rhel9@sha256:dd20b138045ef1424d83a47e7abcfcbb2ac54577dcec5ed3c186390aaa4c9d84_arm64",
"9Base-CNV-4.13:container-native-virtualization/hostpath-csi-driver-rhel9@sha256:61e2824853d51347593ad909a5e546cd92e4216d6a1df5dffb50dd9cba277cce_amd64",
"9Base-CNV-4.13:container-native-virtualization/hostpath-csi-driver-rhel9@sha256:676d4c23a5f60dd331728af056b0a6b2d3358ac88da23299b1a98dfaca8f288e_arm64",
"9Base-CNV-4.13:container-native-virtualization/hostpath-provisioner-operator-rhel9@sha256:515be94be496c67f5b8fd5f4832fe4385e56476e6589897d6b9fbb9bb2b00f32_amd64",
"9Base-CNV-4.13:container-native-virtualization/hostpath-provisioner-operator-rhel9@sha256:571ae805641dea11646028c946039983c7fd82f138b915dcb8b80c39b465e63c_arm64",
"9Base-CNV-4.13:container-native-virtualization/hostpath-provisioner-rhel9@sha256:ac3fe350bedd6bc43596444ba0f279ccf8a144ab14ac5a9b80ea71c46390b7b4_amd64",
"9Base-CNV-4.13:container-native-virtualization/hostpath-provisioner-rhel9@sha256:d4ed87745b7ee2acca2d83e2c91c2f6dced1903c81495b50f2559b3ba2dde287_arm64",
"9Base-CNV-4.13:container-native-virtualization/hyperconverged-cluster-operator-rhel9@sha256:e5ab9f3be59d3568e3d672ab374efb16990ccf92192eac4e1244b10fcd7423e2_amd64",
"9Base-CNV-4.13:container-native-virtualization/hyperconverged-cluster-operator-rhel9@sha256:e681560b184189df03fc84c8a712f32289f42573dd348cda394b19565eb6eca8_arm64",
"9Base-CNV-4.13:container-native-virtualization/hyperconverged-cluster-webhook-rhel9@sha256:06d036d320b3027bb8370bb8e0f6fe8c9f0ec9bca7aac3b5c53698ba4a170042_arm64",
"9Base-CNV-4.13:container-native-virtualization/hyperconverged-cluster-webhook-rhel9@sha256:b5a01336180aad017df62cf8e652f2491b8263ba7e4dd07f858db1ef1924cf2f_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubemacpool-rhel9@sha256:4d190d81eeb3fbe9ed56cf3548dc83a3f81641bfdafa7b42dcfb0d2512566644_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubemacpool-rhel9@sha256:59862a59854f0d5b83dc25ba119f9586a8aff42b6e60d1922f8ae7b4567309ff_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubesecondarydns-rhel9@sha256:121d30d78cc57731ea2242ef2c32430890ac66c2723e65608d5e2f26c3f515cd_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubesecondarydns-rhel9@sha256:b1838f3c8ba3d8113bddea17b78c21e1c1490e2a4a07ea77014edee523d06347_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-console-plugin-rhel9@sha256:86a4b1e3d6ad1d56302c9c058f8bc5826dcfe6c46fb3e0ddaa06818645039020_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-console-plugin-rhel9@sha256:ffb2acd9ae09c1ef9ca756f5eaf6087d0a3957cfc824543949d25f556a97744d_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-dpdk-checkup-rhel9@sha256:525aceb9396010ebcdba14040f267889b807cd84db8e5b4030429b51f0fbf5fe_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-dpdk-checkup-rhel9@sha256:553c4686f56c66cc1e3c5ad9d4051f139d43f821eac3abb98ca5cdb8b5dfe202_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-ssp-operator-rhel9@sha256:901e6cad9534c7bd7c4018c60bccfe49d7280fba5a9901ab4c4d15e9345288c4_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-ssp-operator-rhel9@sha256:badeb0f65f543b209f6af761729d9778b7b73b97d55044016dfba3f38a1f6f18_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-cleanup-vm-rhel9@sha256:28e4975fa4dac22d9da32ed2a10aed039fd957b30140daa36bab2caa998be77a_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-cleanup-vm-rhel9@sha256:b0ff7e812a576ea848590655fc13a85832d5a39f68e7769ceab9da6949da88c7_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-copy-template-rhel9@sha256:4916a6c6b1f9b529187d3b4d5fc99b90157993767b3fe2ad36a9ec77fbb46b10_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-copy-template-rhel9@sha256:f71c36442f1b61cdde7ec58d2c3c78d2039f6d6108e6c35388ef7c1650971fa1_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-create-datavolume-rhel9@sha256:2ad49cf6e2242a9e5861929d9bcab1305a7fc4e34e708f99cff1d7253aa46167_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-create-datavolume-rhel9@sha256:7112400a4ecb23ee2110bf96372fcf9f96ad648a51aa944627b40eb59539a660_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-create-vm-from-template-rhel9@sha256:1411c65bbad7302710788327f6964a4bf5bc20ef70d5e46f4a5c6e7a0e7a0161_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-create-vm-from-template-rhel9@sha256:4d962618aa95600c60c9fc8b890186e510de91177d51949e12797a3558e31328_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-customize-rhel9@sha256:5c23d3f20ea9dcbe7109284d73078ecd516a070e964b844f8d80b1d92ebd55ee_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-customize-rhel9@sha256:a780244e48c6d4f87446d3754c3eb9ab79c0d54675c189da4a659f7a4d5668ea_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-sysprep-rhel9@sha256:84577d949a1bbcaa291c70729127bca4a8994df03068666baa23840877ea8392_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-sysprep-rhel9@sha256:aed630a597a090179e1b0e0c117e536df06b67d0f793f91936aa7388c0c5d7eb_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-modify-vm-template-rhel9@sha256:31d959b80cf57462e1705684bb7e1b78af26bd2c62f1c9e4e51e1d02199b05a8_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-modify-vm-template-rhel9@sha256:66aea526bc10e4c0136ba86e394bbdfe4fbd7f757d6f391a561b51d2ba2f4d46_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-operator-rhel9@sha256:d0cf0e81589f0938de45961eaddfc5ec4782738fd11082de0439b200534259eb_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-operator-rhel9@sha256:f1b1f5044db6bb945584f9d4f31d020597725a286ef368ed0aca2116abb31beb_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-wait-for-vmi-status-rhel9@sha256:39a15d03f113735df03b1a7408227eb9604d942c1f3c1992bcdc7eaf07662711_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-wait-for-vmi-status-rhel9@sha256:afb68af076954fcd18c7a4a1464ea0c2a766e8282eae980051906ed07eaa1707_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-template-validator-rhel9@sha256:02b22c7e7014b5e72d47fed8b6a268cf307638c5510adf3916c51f7f40a52a08_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-template-validator-rhel9@sha256:c0264b9271e602f85b2040ef7f207cdfa46038dc4fa6e4738bf196ef88a71cf8_amd64",
"9Base-CNV-4.13:container-native-virtualization/libguestfs-tools-rhel9@sha256:29ae84575bbca24553cf649256759fd96ff286971d80bc2db129154a7df9b283_amd64",
"9Base-CNV-4.13:container-native-virtualization/libguestfs-tools-rhel9@sha256:6558f60343e068b032167e2340b2c549c5f0258acc5d2614b60966ce79408b01_arm64",
"9Base-CNV-4.13:container-native-virtualization/multus-dynamic-networks-rhel9@sha256:3ecb0162a4b01d1590bf209d717b32a4f0835910d9979823f18c24acba41b503_arm64",
"9Base-CNV-4.13:container-native-virtualization/multus-dynamic-networks-rhel9@sha256:b7f68b6420009e21380d32d6459193aae45e93be9533debe17cb3108571b36b8_amd64",
"9Base-CNV-4.13:container-native-virtualization/ovs-cni-plugin-rhel9@sha256:0f1d372f418744e0aff59ecb0a38f53178aac9c2e9eecfd38aa25ed83e0d1360_arm64",
"9Base-CNV-4.13:container-native-virtualization/ovs-cni-plugin-rhel9@sha256:e8e7a44edbf1713fe74de5c4b8f691cce78f4440c4a32a16ba9ad16694a55396_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-api-rhel9@sha256:e68416321ca8c74a547b3d35897f54813c03481143e402e9bdc4daf315e35b5d_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-api-rhel9@sha256:fdb4ca1bb8b310d713d9c7e88f7d091f4460aa942dbeca5ebcf17281a06daffe_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-artifacts-server-rhel9@sha256:33d11c1832b49df39c1fca62bad40dbc5c30a452248339aaef449ac99509accb_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-artifacts-server-rhel9@sha256:81fc61b714baecb5a89fa6c0749c14566e0661b8e184ca602fc2e03b9cf431ee_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-apiserver-rhel9@sha256:f6128a63344ed2129f5bce648ddcfaa2869d31cde4b93328d3c22534b97ade10_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-apiserver-rhel9@sha256:feca273a691d09445c6cff6d36b5d590735e867656a9898ce0d89744d98e8006_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-cloner-rhel9@sha256:68e3b9b0291b4fb277ac430269ffce11d13b0a7688cf2ffcdb7f98759c36b4db_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-cloner-rhel9@sha256:6ac212767481bef64d8a7d0252bb8089c0f9751fad4a355aef71bd49dad2ad07_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-controller-rhel9@sha256:65f5263275d9f0a12b8fb057d82adf678778039ec873ca9bde182dea3413c9f1_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-controller-rhel9@sha256:d9e62b2019328be258489ac852eef25f8b1233f29abac6bcea5b406329f97fed_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-importer-rhel9@sha256:00a6d9d24ca1466d450b02269ec3144fc7550f0e5c696e869fbf7ce10cae6093_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-importer-rhel9@sha256:2df07fb21a3575e74aa16ded20129828f2300cd33e8ab369b0362062d49e62d0_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-operator-rhel9@sha256:20ec064750faedd97d11b797c8c1d9a1db5d60d7d76e82e65cfd05eb79d65e29_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-operator-rhel9@sha256:802ee8923d9d8e406b23911406f9748756c0ef4d6954e9e2fd5fb4bdf91dde9a_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-uploadproxy-rhel9@sha256:392d0f61f462c707adfdc21e4239c5c09d8520a80486b41d9d9ae479267d6124_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-uploadproxy-rhel9@sha256:6775f34353eec8f35bead9411dde155530d079bb8d51582fb1f2aacc27dbde1d_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-uploadserver-rhel9@sha256:4528c24672689cfb6505761b6b108fbcc04488192733f23d2bfe39cd42a1d743_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-uploadserver-rhel9@sha256:b22048390387380af94e267c8a9a66813c515997456d59d8ebac1486916b6585_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-controller-rhel9@sha256:3e7880149ee9a68286e390beb3d9779f7403c30fc5136e5370e0e4690a3fd243_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-controller-rhel9@sha256:970edc281d7a731e9f7e8c2d4440fe48a221e5e355d5235c5413b4c3adb28503_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-exportproxy-rhel9@sha256:1bda34d5bff734ad997202f29a5ff6f7362fd79fa90511a422442ef2e3681198_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-exportproxy-rhel9@sha256:de3c4afbf7669b98517cbef2490ec186f0553dd97b05bed80ec36dd883fe507b_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-exportserver-rhel9@sha256:3f7f98645176d42c63cca5c0fc3182a03121af87446ca421b6c72baf07dfca0d_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-exportserver-rhel9@sha256:8f12955cd777eb2409037a6968aa92f50c99d6e07e722951dbcfd0c8c9829b5e_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-handler-rhel9@sha256:5fc47110d866d8048aec50689090ce10705d19d3bb48d2b06727d6d569003af7_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-handler-rhel9@sha256:84ba79ae9658699147d2493df2582ab6df10adbff4d44a533c3fe6a9f45f9691_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-launcher-rhel9@sha256:4990d40d9987d5126d105dd45be2501eaded248cb61bdde5ea8d359bc1e7ebef_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-launcher-rhel9@sha256:95aeacb98209e0baef27ce0e02fbac38d693cea74808fc77107efda0f344bcb5_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-operator-rhel9@sha256:5c1a7e4ed2061938987b900a2394f07121d4037350c9bb6485213a2adfea787d_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-operator-rhel9@sha256:66b1b3b379121d6411ba22283e7d991617177330c93746d37753ab7812b9a00b_arm64",
"9Base-CNV-4.13:container-native-virtualization/virtio-win-rhel9@sha256:8735f51da918408a8826601c082d1b29accf26d59b9978da89b980cb509c1102_arm64",
"9Base-CNV-4.13:container-native-virtualization/virtio-win-rhel9@sha256:d147d2a6eb6f907d1e88f61aaca83596853bc72164583d6dda2b1154b490de25_amd64",
"9Base-CNV-4.13:container-native-virtualization/vm-console-proxy-rhel9@sha256:70a8d0cd66182c25e02679540bae1368b2a9cf687532b58dba41ef30c5ca00c1_arm64",
"9Base-CNV-4.13:container-native-virtualization/vm-console-proxy-rhel9@sha256:7ca921f98f6d81a126907127a611146fb53397869a628678faa1e289c01d22b2_amd64",
"9Base-CNV-4.13:container-native-virtualization/vm-network-latency-checkup-rhel9@sha256:503ea7ac914a9b54e9d665a0227ee0b5d5200cdb5d692aa94c07dd1518d91b70_arm64",
"9Base-CNV-4.13:container-native-virtualization/vm-network-latency-checkup-rhel9@sha256:59fd965975bccf641a0fa7aa01374d45057bd03cda7528248a84b60b1205bf57_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "golang: net/http/httputil: ReverseProxy should not forward unparseable query parameters"
},
{
"cve": "CVE-2022-27664",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"discovery_date": "2022-09-06T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"9Base-CNV-4.13:container-native-virtualization/bridge-marker-rhel9@sha256:8eac196b30a648989cdca5cb153a3bc3d34e47339acba0e4f760bd366496c99d_amd64",
"9Base-CNV-4.13:container-native-virtualization/bridge-marker-rhel9@sha256:e8a55aee3d75a316bb0d7a554c737198823df04b3c05e481c17e45eb2153bced_arm64",
"9Base-CNV-4.13:container-native-virtualization/cluster-network-addons-operator-rhel9@sha256:3bff33e3f40cd1e2b519c2db56734d4bb8df883e155c2f20b1cb9d3d184daec1_amd64",
"9Base-CNV-4.13:container-native-virtualization/cluster-network-addons-operator-rhel9@sha256:f439d2f420bb59eb1d5af14ce2002648d0cfc155d1a1466c8aac9b661fe902b8_arm64",
"9Base-CNV-4.13:container-native-virtualization/cnv-containernetworking-plugins-rhel9@sha256:89f22e541f61a660c9aa9f38ef58e80b84a0517f74e84292107fc252c25465c9_arm64",
"9Base-CNV-4.13:container-native-virtualization/cnv-containernetworking-plugins-rhel9@sha256:bf471997e54e4a75b0d71f492ab295787fdbb14d8c85c4ea8c03f0552dbc3755_amd64",
"9Base-CNV-4.13:container-native-virtualization/cnv-must-gather-rhel9@sha256:9e8efd76924958eb605401abdac08eba97fb83a1ada383bc87a7fb7c87b3a455_arm64",
"9Base-CNV-4.13:container-native-virtualization/cnv-must-gather-rhel9@sha256:b9fc32b5fabedd65a4c3a471879c808af2087277de4278adaa115a732f0468da_amd64",
"9Base-CNV-4.13:container-native-virtualization/hco-bundle-registry-rhel9@sha256:60e89d7a99ff9f20e974430b802dd724a3bb6fa1e01e5a62daad98ac487b3063_amd64",
"9Base-CNV-4.13:container-native-virtualization/hco-bundle-registry-rhel9@sha256:dd20b138045ef1424d83a47e7abcfcbb2ac54577dcec5ed3c186390aaa4c9d84_arm64",
"9Base-CNV-4.13:container-native-virtualization/hostpath-csi-driver-rhel9@sha256:61e2824853d51347593ad909a5e546cd92e4216d6a1df5dffb50dd9cba277cce_amd64",
"9Base-CNV-4.13:container-native-virtualization/hostpath-csi-driver-rhel9@sha256:676d4c23a5f60dd331728af056b0a6b2d3358ac88da23299b1a98dfaca8f288e_arm64",
"9Base-CNV-4.13:container-native-virtualization/hostpath-provisioner-operator-rhel9@sha256:515be94be496c67f5b8fd5f4832fe4385e56476e6589897d6b9fbb9bb2b00f32_amd64",
"9Base-CNV-4.13:container-native-virtualization/hostpath-provisioner-operator-rhel9@sha256:571ae805641dea11646028c946039983c7fd82f138b915dcb8b80c39b465e63c_arm64",
"9Base-CNV-4.13:container-native-virtualization/hostpath-provisioner-rhel9@sha256:ac3fe350bedd6bc43596444ba0f279ccf8a144ab14ac5a9b80ea71c46390b7b4_amd64",
"9Base-CNV-4.13:container-native-virtualization/hostpath-provisioner-rhel9@sha256:d4ed87745b7ee2acca2d83e2c91c2f6dced1903c81495b50f2559b3ba2dde287_arm64",
"9Base-CNV-4.13:container-native-virtualization/hyperconverged-cluster-operator-rhel9@sha256:e5ab9f3be59d3568e3d672ab374efb16990ccf92192eac4e1244b10fcd7423e2_amd64",
"9Base-CNV-4.13:container-native-virtualization/hyperconverged-cluster-operator-rhel9@sha256:e681560b184189df03fc84c8a712f32289f42573dd348cda394b19565eb6eca8_arm64",
"9Base-CNV-4.13:container-native-virtualization/hyperconverged-cluster-webhook-rhel9@sha256:06d036d320b3027bb8370bb8e0f6fe8c9f0ec9bca7aac3b5c53698ba4a170042_arm64",
"9Base-CNV-4.13:container-native-virtualization/hyperconverged-cluster-webhook-rhel9@sha256:b5a01336180aad017df62cf8e652f2491b8263ba7e4dd07f858db1ef1924cf2f_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubemacpool-rhel9@sha256:4d190d81eeb3fbe9ed56cf3548dc83a3f81641bfdafa7b42dcfb0d2512566644_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubemacpool-rhel9@sha256:59862a59854f0d5b83dc25ba119f9586a8aff42b6e60d1922f8ae7b4567309ff_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubesecondarydns-rhel9@sha256:121d30d78cc57731ea2242ef2c32430890ac66c2723e65608d5e2f26c3f515cd_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubesecondarydns-rhel9@sha256:b1838f3c8ba3d8113bddea17b78c21e1c1490e2a4a07ea77014edee523d06347_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-console-plugin-rhel9@sha256:86a4b1e3d6ad1d56302c9c058f8bc5826dcfe6c46fb3e0ddaa06818645039020_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-console-plugin-rhel9@sha256:ffb2acd9ae09c1ef9ca756f5eaf6087d0a3957cfc824543949d25f556a97744d_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-dpdk-checkup-rhel9@sha256:525aceb9396010ebcdba14040f267889b807cd84db8e5b4030429b51f0fbf5fe_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-dpdk-checkup-rhel9@sha256:553c4686f56c66cc1e3c5ad9d4051f139d43f821eac3abb98ca5cdb8b5dfe202_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-ssp-operator-rhel9@sha256:901e6cad9534c7bd7c4018c60bccfe49d7280fba5a9901ab4c4d15e9345288c4_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-ssp-operator-rhel9@sha256:badeb0f65f543b209f6af761729d9778b7b73b97d55044016dfba3f38a1f6f18_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-cleanup-vm-rhel9@sha256:28e4975fa4dac22d9da32ed2a10aed039fd957b30140daa36bab2caa998be77a_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-cleanup-vm-rhel9@sha256:b0ff7e812a576ea848590655fc13a85832d5a39f68e7769ceab9da6949da88c7_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-copy-template-rhel9@sha256:4916a6c6b1f9b529187d3b4d5fc99b90157993767b3fe2ad36a9ec77fbb46b10_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-copy-template-rhel9@sha256:f71c36442f1b61cdde7ec58d2c3c78d2039f6d6108e6c35388ef7c1650971fa1_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-create-datavolume-rhel9@sha256:2ad49cf6e2242a9e5861929d9bcab1305a7fc4e34e708f99cff1d7253aa46167_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-create-datavolume-rhel9@sha256:7112400a4ecb23ee2110bf96372fcf9f96ad648a51aa944627b40eb59539a660_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-create-vm-from-template-rhel9@sha256:1411c65bbad7302710788327f6964a4bf5bc20ef70d5e46f4a5c6e7a0e7a0161_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-create-vm-from-template-rhel9@sha256:4d962618aa95600c60c9fc8b890186e510de91177d51949e12797a3558e31328_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-customize-rhel9@sha256:5c23d3f20ea9dcbe7109284d73078ecd516a070e964b844f8d80b1d92ebd55ee_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-customize-rhel9@sha256:a780244e48c6d4f87446d3754c3eb9ab79c0d54675c189da4a659f7a4d5668ea_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-sysprep-rhel9@sha256:84577d949a1bbcaa291c70729127bca4a8994df03068666baa23840877ea8392_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-sysprep-rhel9@sha256:aed630a597a090179e1b0e0c117e536df06b67d0f793f91936aa7388c0c5d7eb_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-modify-vm-template-rhel9@sha256:31d959b80cf57462e1705684bb7e1b78af26bd2c62f1c9e4e51e1d02199b05a8_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-modify-vm-template-rhel9@sha256:66aea526bc10e4c0136ba86e394bbdfe4fbd7f757d6f391a561b51d2ba2f4d46_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-operator-rhel9@sha256:d0cf0e81589f0938de45961eaddfc5ec4782738fd11082de0439b200534259eb_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-operator-rhel9@sha256:f1b1f5044db6bb945584f9d4f31d020597725a286ef368ed0aca2116abb31beb_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-wait-for-vmi-status-rhel9@sha256:39a15d03f113735df03b1a7408227eb9604d942c1f3c1992bcdc7eaf07662711_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-wait-for-vmi-status-rhel9@sha256:afb68af076954fcd18c7a4a1464ea0c2a766e8282eae980051906ed07eaa1707_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-template-validator-rhel9@sha256:02b22c7e7014b5e72d47fed8b6a268cf307638c5510adf3916c51f7f40a52a08_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-template-validator-rhel9@sha256:c0264b9271e602f85b2040ef7f207cdfa46038dc4fa6e4738bf196ef88a71cf8_amd64",
"9Base-CNV-4.13:container-native-virtualization/libguestfs-tools-rhel9@sha256:29ae84575bbca24553cf649256759fd96ff286971d80bc2db129154a7df9b283_amd64",
"9Base-CNV-4.13:container-native-virtualization/libguestfs-tools-rhel9@sha256:6558f60343e068b032167e2340b2c549c5f0258acc5d2614b60966ce79408b01_arm64",
"9Base-CNV-4.13:container-native-virtualization/multus-dynamic-networks-rhel9@sha256:3ecb0162a4b01d1590bf209d717b32a4f0835910d9979823f18c24acba41b503_arm64",
"9Base-CNV-4.13:container-native-virtualization/multus-dynamic-networks-rhel9@sha256:b7f68b6420009e21380d32d6459193aae45e93be9533debe17cb3108571b36b8_amd64",
"9Base-CNV-4.13:container-native-virtualization/ovs-cni-plugin-rhel9@sha256:0f1d372f418744e0aff59ecb0a38f53178aac9c2e9eecfd38aa25ed83e0d1360_arm64",
"9Base-CNV-4.13:container-native-virtualization/ovs-cni-plugin-rhel9@sha256:e8e7a44edbf1713fe74de5c4b8f691cce78f4440c4a32a16ba9ad16694a55396_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-artifacts-server-rhel9@sha256:33d11c1832b49df39c1fca62bad40dbc5c30a452248339aaef449ac99509accb_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-artifacts-server-rhel9@sha256:81fc61b714baecb5a89fa6c0749c14566e0661b8e184ca602fc2e03b9cf431ee_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-apiserver-rhel9@sha256:f6128a63344ed2129f5bce648ddcfaa2869d31cde4b93328d3c22534b97ade10_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-apiserver-rhel9@sha256:feca273a691d09445c6cff6d36b5d590735e867656a9898ce0d89744d98e8006_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-cloner-rhel9@sha256:68e3b9b0291b4fb277ac430269ffce11d13b0a7688cf2ffcdb7f98759c36b4db_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-cloner-rhel9@sha256:6ac212767481bef64d8a7d0252bb8089c0f9751fad4a355aef71bd49dad2ad07_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-controller-rhel9@sha256:65f5263275d9f0a12b8fb057d82adf678778039ec873ca9bde182dea3413c9f1_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-controller-rhel9@sha256:d9e62b2019328be258489ac852eef25f8b1233f29abac6bcea5b406329f97fed_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-importer-rhel9@sha256:00a6d9d24ca1466d450b02269ec3144fc7550f0e5c696e869fbf7ce10cae6093_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-importer-rhel9@sha256:2df07fb21a3575e74aa16ded20129828f2300cd33e8ab369b0362062d49e62d0_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-operator-rhel9@sha256:20ec064750faedd97d11b797c8c1d9a1db5d60d7d76e82e65cfd05eb79d65e29_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-operator-rhel9@sha256:802ee8923d9d8e406b23911406f9748756c0ef4d6954e9e2fd5fb4bdf91dde9a_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-uploadproxy-rhel9@sha256:392d0f61f462c707adfdc21e4239c5c09d8520a80486b41d9d9ae479267d6124_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-uploadproxy-rhel9@sha256:6775f34353eec8f35bead9411dde155530d079bb8d51582fb1f2aacc27dbde1d_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-uploadserver-rhel9@sha256:4528c24672689cfb6505761b6b108fbcc04488192733f23d2bfe39cd42a1d743_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-uploadserver-rhel9@sha256:b22048390387380af94e267c8a9a66813c515997456d59d8ebac1486916b6585_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-controller-rhel9@sha256:3e7880149ee9a68286e390beb3d9779f7403c30fc5136e5370e0e4690a3fd243_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-controller-rhel9@sha256:970edc281d7a731e9f7e8c2d4440fe48a221e5e355d5235c5413b4c3adb28503_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-exportproxy-rhel9@sha256:1bda34d5bff734ad997202f29a5ff6f7362fd79fa90511a422442ef2e3681198_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-exportproxy-rhel9@sha256:de3c4afbf7669b98517cbef2490ec186f0553dd97b05bed80ec36dd883fe507b_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-exportserver-rhel9@sha256:3f7f98645176d42c63cca5c0fc3182a03121af87446ca421b6c72baf07dfca0d_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-exportserver-rhel9@sha256:8f12955cd777eb2409037a6968aa92f50c99d6e07e722951dbcfd0c8c9829b5e_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-handler-rhel9@sha256:5fc47110d866d8048aec50689090ce10705d19d3bb48d2b06727d6d569003af7_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-handler-rhel9@sha256:84ba79ae9658699147d2493df2582ab6df10adbff4d44a533c3fe6a9f45f9691_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-launcher-rhel9@sha256:4990d40d9987d5126d105dd45be2501eaded248cb61bdde5ea8d359bc1e7ebef_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-launcher-rhel9@sha256:95aeacb98209e0baef27ce0e02fbac38d693cea74808fc77107efda0f344bcb5_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-operator-rhel9@sha256:5c1a7e4ed2061938987b900a2394f07121d4037350c9bb6485213a2adfea787d_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-operator-rhel9@sha256:66b1b3b379121d6411ba22283e7d991617177330c93746d37753ab7812b9a00b_arm64",
"9Base-CNV-4.13:container-native-virtualization/virtio-win-rhel9@sha256:8735f51da918408a8826601c082d1b29accf26d59b9978da89b980cb509c1102_arm64",
"9Base-CNV-4.13:container-native-virtualization/virtio-win-rhel9@sha256:d147d2a6eb6f907d1e88f61aaca83596853bc72164583d6dda2b1154b490de25_amd64",
"9Base-CNV-4.13:container-native-virtualization/vm-console-proxy-rhel9@sha256:70a8d0cd66182c25e02679540bae1368b2a9cf687532b58dba41ef30c5ca00c1_arm64",
"9Base-CNV-4.13:container-native-virtualization/vm-console-proxy-rhel9@sha256:7ca921f98f6d81a126907127a611146fb53397869a628678faa1e289c01d22b2_amd64",
"9Base-CNV-4.13:container-native-virtualization/vm-network-latency-checkup-rhel9@sha256:503ea7ac914a9b54e9d665a0227ee0b5d5200cdb5d692aa94c07dd1518d91b70_arm64",
"9Base-CNV-4.13:container-native-virtualization/vm-network-latency-checkup-rhel9@sha256:59fd965975bccf641a0fa7aa01374d45057bd03cda7528248a84b60b1205bf57_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2124669"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the golang package. In net/http in Go, attackers can cause a denial of service because an HTTP/2 connection can hang during closing if a fatal error preempts the shutdown.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: net/http: handle server errors after sending GOAWAY",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The opportunity for a Denial of Service is limited to the golang runtime. In the case of OpenShift Container Platform, this would be restricted within each individual container. There are multiple layers of guide rails (Golang\u2019s Garbage Collector; OpenShift\u2019s resource constraints imposed at the container and cluster levels) which would require a malicious user to continue submitting attacks for there to be any enduring impact. They would also need access to external server resources to be able to send a massive volume of requests to cause a significant impact on server operations.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"9Base-CNV-4.13:container-native-virtualization/virt-api-rhel9@sha256:e68416321ca8c74a547b3d35897f54813c03481143e402e9bdc4daf315e35b5d_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-api-rhel9@sha256:fdb4ca1bb8b310d713d9c7e88f7d091f4460aa942dbeca5ebcf17281a06daffe_amd64"
],
"known_not_affected": [
"9Base-CNV-4.13:container-native-virtualization/bridge-marker-rhel9@sha256:8eac196b30a648989cdca5cb153a3bc3d34e47339acba0e4f760bd366496c99d_amd64",
"9Base-CNV-4.13:container-native-virtualization/bridge-marker-rhel9@sha256:e8a55aee3d75a316bb0d7a554c737198823df04b3c05e481c17e45eb2153bced_arm64",
"9Base-CNV-4.13:container-native-virtualization/cluster-network-addons-operator-rhel9@sha256:3bff33e3f40cd1e2b519c2db56734d4bb8df883e155c2f20b1cb9d3d184daec1_amd64",
"9Base-CNV-4.13:container-native-virtualization/cluster-network-addons-operator-rhel9@sha256:f439d2f420bb59eb1d5af14ce2002648d0cfc155d1a1466c8aac9b661fe902b8_arm64",
"9Base-CNV-4.13:container-native-virtualization/cnv-containernetworking-plugins-rhel9@sha256:89f22e541f61a660c9aa9f38ef58e80b84a0517f74e84292107fc252c25465c9_arm64",
"9Base-CNV-4.13:container-native-virtualization/cnv-containernetworking-plugins-rhel9@sha256:bf471997e54e4a75b0d71f492ab295787fdbb14d8c85c4ea8c03f0552dbc3755_amd64",
"9Base-CNV-4.13:container-native-virtualization/cnv-must-gather-rhel9@sha256:9e8efd76924958eb605401abdac08eba97fb83a1ada383bc87a7fb7c87b3a455_arm64",
"9Base-CNV-4.13:container-native-virtualization/cnv-must-gather-rhel9@sha256:b9fc32b5fabedd65a4c3a471879c808af2087277de4278adaa115a732f0468da_amd64",
"9Base-CNV-4.13:container-native-virtualization/hco-bundle-registry-rhel9@sha256:60e89d7a99ff9f20e974430b802dd724a3bb6fa1e01e5a62daad98ac487b3063_amd64",
"9Base-CNV-4.13:container-native-virtualization/hco-bundle-registry-rhel9@sha256:dd20b138045ef1424d83a47e7abcfcbb2ac54577dcec5ed3c186390aaa4c9d84_arm64",
"9Base-CNV-4.13:container-native-virtualization/hostpath-csi-driver-rhel9@sha256:61e2824853d51347593ad909a5e546cd92e4216d6a1df5dffb50dd9cba277cce_amd64",
"9Base-CNV-4.13:container-native-virtualization/hostpath-csi-driver-rhel9@sha256:676d4c23a5f60dd331728af056b0a6b2d3358ac88da23299b1a98dfaca8f288e_arm64",
"9Base-CNV-4.13:container-native-virtualization/hostpath-provisioner-operator-rhel9@sha256:515be94be496c67f5b8fd5f4832fe4385e56476e6589897d6b9fbb9bb2b00f32_amd64",
"9Base-CNV-4.13:container-native-virtualization/hostpath-provisioner-operator-rhel9@sha256:571ae805641dea11646028c946039983c7fd82f138b915dcb8b80c39b465e63c_arm64",
"9Base-CNV-4.13:container-native-virtualization/hostpath-provisioner-rhel9@sha256:ac3fe350bedd6bc43596444ba0f279ccf8a144ab14ac5a9b80ea71c46390b7b4_amd64",
"9Base-CNV-4.13:container-native-virtualization/hostpath-provisioner-rhel9@sha256:d4ed87745b7ee2acca2d83e2c91c2f6dced1903c81495b50f2559b3ba2dde287_arm64",
"9Base-CNV-4.13:container-native-virtualization/hyperconverged-cluster-operator-rhel9@sha256:e5ab9f3be59d3568e3d672ab374efb16990ccf92192eac4e1244b10fcd7423e2_amd64",
"9Base-CNV-4.13:container-native-virtualization/hyperconverged-cluster-operator-rhel9@sha256:e681560b184189df03fc84c8a712f32289f42573dd348cda394b19565eb6eca8_arm64",
"9Base-CNV-4.13:container-native-virtualization/hyperconverged-cluster-webhook-rhel9@sha256:06d036d320b3027bb8370bb8e0f6fe8c9f0ec9bca7aac3b5c53698ba4a170042_arm64",
"9Base-CNV-4.13:container-native-virtualization/hyperconverged-cluster-webhook-rhel9@sha256:b5a01336180aad017df62cf8e652f2491b8263ba7e4dd07f858db1ef1924cf2f_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubemacpool-rhel9@sha256:4d190d81eeb3fbe9ed56cf3548dc83a3f81641bfdafa7b42dcfb0d2512566644_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubemacpool-rhel9@sha256:59862a59854f0d5b83dc25ba119f9586a8aff42b6e60d1922f8ae7b4567309ff_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubesecondarydns-rhel9@sha256:121d30d78cc57731ea2242ef2c32430890ac66c2723e65608d5e2f26c3f515cd_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubesecondarydns-rhel9@sha256:b1838f3c8ba3d8113bddea17b78c21e1c1490e2a4a07ea77014edee523d06347_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-console-plugin-rhel9@sha256:86a4b1e3d6ad1d56302c9c058f8bc5826dcfe6c46fb3e0ddaa06818645039020_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-console-plugin-rhel9@sha256:ffb2acd9ae09c1ef9ca756f5eaf6087d0a3957cfc824543949d25f556a97744d_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-dpdk-checkup-rhel9@sha256:525aceb9396010ebcdba14040f267889b807cd84db8e5b4030429b51f0fbf5fe_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-dpdk-checkup-rhel9@sha256:553c4686f56c66cc1e3c5ad9d4051f139d43f821eac3abb98ca5cdb8b5dfe202_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-ssp-operator-rhel9@sha256:901e6cad9534c7bd7c4018c60bccfe49d7280fba5a9901ab4c4d15e9345288c4_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-ssp-operator-rhel9@sha256:badeb0f65f543b209f6af761729d9778b7b73b97d55044016dfba3f38a1f6f18_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-cleanup-vm-rhel9@sha256:28e4975fa4dac22d9da32ed2a10aed039fd957b30140daa36bab2caa998be77a_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-cleanup-vm-rhel9@sha256:b0ff7e812a576ea848590655fc13a85832d5a39f68e7769ceab9da6949da88c7_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-copy-template-rhel9@sha256:4916a6c6b1f9b529187d3b4d5fc99b90157993767b3fe2ad36a9ec77fbb46b10_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-copy-template-rhel9@sha256:f71c36442f1b61cdde7ec58d2c3c78d2039f6d6108e6c35388ef7c1650971fa1_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-create-datavolume-rhel9@sha256:2ad49cf6e2242a9e5861929d9bcab1305a7fc4e34e708f99cff1d7253aa46167_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-create-datavolume-rhel9@sha256:7112400a4ecb23ee2110bf96372fcf9f96ad648a51aa944627b40eb59539a660_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-create-vm-from-template-rhel9@sha256:1411c65bbad7302710788327f6964a4bf5bc20ef70d5e46f4a5c6e7a0e7a0161_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-create-vm-from-template-rhel9@sha256:4d962618aa95600c60c9fc8b890186e510de91177d51949e12797a3558e31328_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-customize-rhel9@sha256:5c23d3f20ea9dcbe7109284d73078ecd516a070e964b844f8d80b1d92ebd55ee_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-customize-rhel9@sha256:a780244e48c6d4f87446d3754c3eb9ab79c0d54675c189da4a659f7a4d5668ea_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-sysprep-rhel9@sha256:84577d949a1bbcaa291c70729127bca4a8994df03068666baa23840877ea8392_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-sysprep-rhel9@sha256:aed630a597a090179e1b0e0c117e536df06b67d0f793f91936aa7388c0c5d7eb_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-modify-vm-template-rhel9@sha256:31d959b80cf57462e1705684bb7e1b78af26bd2c62f1c9e4e51e1d02199b05a8_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-modify-vm-template-rhel9@sha256:66aea526bc10e4c0136ba86e394bbdfe4fbd7f757d6f391a561b51d2ba2f4d46_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-operator-rhel9@sha256:d0cf0e81589f0938de45961eaddfc5ec4782738fd11082de0439b200534259eb_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-operator-rhel9@sha256:f1b1f5044db6bb945584f9d4f31d020597725a286ef368ed0aca2116abb31beb_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-wait-for-vmi-status-rhel9@sha256:39a15d03f113735df03b1a7408227eb9604d942c1f3c1992bcdc7eaf07662711_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-wait-for-vmi-status-rhel9@sha256:afb68af076954fcd18c7a4a1464ea0c2a766e8282eae980051906ed07eaa1707_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-template-validator-rhel9@sha256:02b22c7e7014b5e72d47fed8b6a268cf307638c5510adf3916c51f7f40a52a08_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-template-validator-rhel9@sha256:c0264b9271e602f85b2040ef7f207cdfa46038dc4fa6e4738bf196ef88a71cf8_amd64",
"9Base-CNV-4.13:container-native-virtualization/libguestfs-tools-rhel9@sha256:29ae84575bbca24553cf649256759fd96ff286971d80bc2db129154a7df9b283_amd64",
"9Base-CNV-4.13:container-native-virtualization/libguestfs-tools-rhel9@sha256:6558f60343e068b032167e2340b2c549c5f0258acc5d2614b60966ce79408b01_arm64",
"9Base-CNV-4.13:container-native-virtualization/multus-dynamic-networks-rhel9@sha256:3ecb0162a4b01d1590bf209d717b32a4f0835910d9979823f18c24acba41b503_arm64",
"9Base-CNV-4.13:container-native-virtualization/multus-dynamic-networks-rhel9@sha256:b7f68b6420009e21380d32d6459193aae45e93be9533debe17cb3108571b36b8_amd64",
"9Base-CNV-4.13:container-native-virtualization/ovs-cni-plugin-rhel9@sha256:0f1d372f418744e0aff59ecb0a38f53178aac9c2e9eecfd38aa25ed83e0d1360_arm64",
"9Base-CNV-4.13:container-native-virtualization/ovs-cni-plugin-rhel9@sha256:e8e7a44edbf1713fe74de5c4b8f691cce78f4440c4a32a16ba9ad16694a55396_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-artifacts-server-rhel9@sha256:33d11c1832b49df39c1fca62bad40dbc5c30a452248339aaef449ac99509accb_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-artifacts-server-rhel9@sha256:81fc61b714baecb5a89fa6c0749c14566e0661b8e184ca602fc2e03b9cf431ee_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-apiserver-rhel9@sha256:f6128a63344ed2129f5bce648ddcfaa2869d31cde4b93328d3c22534b97ade10_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-apiserver-rhel9@sha256:feca273a691d09445c6cff6d36b5d590735e867656a9898ce0d89744d98e8006_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-cloner-rhel9@sha256:68e3b9b0291b4fb277ac430269ffce11d13b0a7688cf2ffcdb7f98759c36b4db_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-cloner-rhel9@sha256:6ac212767481bef64d8a7d0252bb8089c0f9751fad4a355aef71bd49dad2ad07_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-controller-rhel9@sha256:65f5263275d9f0a12b8fb057d82adf678778039ec873ca9bde182dea3413c9f1_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-controller-rhel9@sha256:d9e62b2019328be258489ac852eef25f8b1233f29abac6bcea5b406329f97fed_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-importer-rhel9@sha256:00a6d9d24ca1466d450b02269ec3144fc7550f0e5c696e869fbf7ce10cae6093_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-importer-rhel9@sha256:2df07fb21a3575e74aa16ded20129828f2300cd33e8ab369b0362062d49e62d0_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-operator-rhel9@sha256:20ec064750faedd97d11b797c8c1d9a1db5d60d7d76e82e65cfd05eb79d65e29_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-operator-rhel9@sha256:802ee8923d9d8e406b23911406f9748756c0ef4d6954e9e2fd5fb4bdf91dde9a_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-uploadproxy-rhel9@sha256:392d0f61f462c707adfdc21e4239c5c09d8520a80486b41d9d9ae479267d6124_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-uploadproxy-rhel9@sha256:6775f34353eec8f35bead9411dde155530d079bb8d51582fb1f2aacc27dbde1d_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-uploadserver-rhel9@sha256:4528c24672689cfb6505761b6b108fbcc04488192733f23d2bfe39cd42a1d743_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-uploadserver-rhel9@sha256:b22048390387380af94e267c8a9a66813c515997456d59d8ebac1486916b6585_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-controller-rhel9@sha256:3e7880149ee9a68286e390beb3d9779f7403c30fc5136e5370e0e4690a3fd243_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-controller-rhel9@sha256:970edc281d7a731e9f7e8c2d4440fe48a221e5e355d5235c5413b4c3adb28503_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-exportproxy-rhel9@sha256:1bda34d5bff734ad997202f29a5ff6f7362fd79fa90511a422442ef2e3681198_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-exportproxy-rhel9@sha256:de3c4afbf7669b98517cbef2490ec186f0553dd97b05bed80ec36dd883fe507b_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-exportserver-rhel9@sha256:3f7f98645176d42c63cca5c0fc3182a03121af87446ca421b6c72baf07dfca0d_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-exportserver-rhel9@sha256:8f12955cd777eb2409037a6968aa92f50c99d6e07e722951dbcfd0c8c9829b5e_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-handler-rhel9@sha256:5fc47110d866d8048aec50689090ce10705d19d3bb48d2b06727d6d569003af7_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-handler-rhel9@sha256:84ba79ae9658699147d2493df2582ab6df10adbff4d44a533c3fe6a9f45f9691_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-launcher-rhel9@sha256:4990d40d9987d5126d105dd45be2501eaded248cb61bdde5ea8d359bc1e7ebef_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-launcher-rhel9@sha256:95aeacb98209e0baef27ce0e02fbac38d693cea74808fc77107efda0f344bcb5_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-operator-rhel9@sha256:5c1a7e4ed2061938987b900a2394f07121d4037350c9bb6485213a2adfea787d_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-operator-rhel9@sha256:66b1b3b379121d6411ba22283e7d991617177330c93746d37753ab7812b9a00b_arm64",
"9Base-CNV-4.13:container-native-virtualization/virtio-win-rhel9@sha256:8735f51da918408a8826601c082d1b29accf26d59b9978da89b980cb509c1102_arm64",
"9Base-CNV-4.13:container-native-virtualization/virtio-win-rhel9@sha256:d147d2a6eb6f907d1e88f61aaca83596853bc72164583d6dda2b1154b490de25_amd64",
"9Base-CNV-4.13:container-native-virtualization/vm-console-proxy-rhel9@sha256:70a8d0cd66182c25e02679540bae1368b2a9cf687532b58dba41ef30c5ca00c1_arm64",
"9Base-CNV-4.13:container-native-virtualization/vm-console-proxy-rhel9@sha256:7ca921f98f6d81a126907127a611146fb53397869a628678faa1e289c01d22b2_amd64",
"9Base-CNV-4.13:container-native-virtualization/vm-network-latency-checkup-rhel9@sha256:503ea7ac914a9b54e9d665a0227ee0b5d5200cdb5d692aa94c07dd1518d91b70_arm64",
"9Base-CNV-4.13:container-native-virtualization/vm-network-latency-checkup-rhel9@sha256:59fd965975bccf641a0fa7aa01374d45057bd03cda7528248a84b60b1205bf57_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-27664"
},
{
"category": "external",
"summary": "RHBZ#2124669",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2124669"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-27664",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27664"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-27664",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-27664"
},
{
"category": "external",
"summary": "https://go.dev/issue/54658",
"url": "https://go.dev/issue/54658"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/x49AQzIVX-s/m/0tgO0pjiBQAJ",
"url": "https://groups.google.com/g/golang-announce/c/x49AQzIVX-s/m/0tgO0pjiBQAJ"
}
],
"release_date": "2022-09-06T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-05-18T02:55:08+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"9Base-CNV-4.13:container-native-virtualization/virt-api-rhel9@sha256:e68416321ca8c74a547b3d35897f54813c03481143e402e9bdc4daf315e35b5d_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-api-rhel9@sha256:fdb4ca1bb8b310d713d9c7e88f7d091f4460aa942dbeca5ebcf17281a06daffe_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:3205"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"9Base-CNV-4.13:container-native-virtualization/bridge-marker-rhel9@sha256:8eac196b30a648989cdca5cb153a3bc3d34e47339acba0e4f760bd366496c99d_amd64",
"9Base-CNV-4.13:container-native-virtualization/bridge-marker-rhel9@sha256:e8a55aee3d75a316bb0d7a554c737198823df04b3c05e481c17e45eb2153bced_arm64",
"9Base-CNV-4.13:container-native-virtualization/cluster-network-addons-operator-rhel9@sha256:3bff33e3f40cd1e2b519c2db56734d4bb8df883e155c2f20b1cb9d3d184daec1_amd64",
"9Base-CNV-4.13:container-native-virtualization/cluster-network-addons-operator-rhel9@sha256:f439d2f420bb59eb1d5af14ce2002648d0cfc155d1a1466c8aac9b661fe902b8_arm64",
"9Base-CNV-4.13:container-native-virtualization/cnv-containernetworking-plugins-rhel9@sha256:89f22e541f61a660c9aa9f38ef58e80b84a0517f74e84292107fc252c25465c9_arm64",
"9Base-CNV-4.13:container-native-virtualization/cnv-containernetworking-plugins-rhel9@sha256:bf471997e54e4a75b0d71f492ab295787fdbb14d8c85c4ea8c03f0552dbc3755_amd64",
"9Base-CNV-4.13:container-native-virtualization/cnv-must-gather-rhel9@sha256:9e8efd76924958eb605401abdac08eba97fb83a1ada383bc87a7fb7c87b3a455_arm64",
"9Base-CNV-4.13:container-native-virtualization/cnv-must-gather-rhel9@sha256:b9fc32b5fabedd65a4c3a471879c808af2087277de4278adaa115a732f0468da_amd64",
"9Base-CNV-4.13:container-native-virtualization/hco-bundle-registry-rhel9@sha256:60e89d7a99ff9f20e974430b802dd724a3bb6fa1e01e5a62daad98ac487b3063_amd64",
"9Base-CNV-4.13:container-native-virtualization/hco-bundle-registry-rhel9@sha256:dd20b138045ef1424d83a47e7abcfcbb2ac54577dcec5ed3c186390aaa4c9d84_arm64",
"9Base-CNV-4.13:container-native-virtualization/hostpath-csi-driver-rhel9@sha256:61e2824853d51347593ad909a5e546cd92e4216d6a1df5dffb50dd9cba277cce_amd64",
"9Base-CNV-4.13:container-native-virtualization/hostpath-csi-driver-rhel9@sha256:676d4c23a5f60dd331728af056b0a6b2d3358ac88da23299b1a98dfaca8f288e_arm64",
"9Base-CNV-4.13:container-native-virtualization/hostpath-provisioner-operator-rhel9@sha256:515be94be496c67f5b8fd5f4832fe4385e56476e6589897d6b9fbb9bb2b00f32_amd64",
"9Base-CNV-4.13:container-native-virtualization/hostpath-provisioner-operator-rhel9@sha256:571ae805641dea11646028c946039983c7fd82f138b915dcb8b80c39b465e63c_arm64",
"9Base-CNV-4.13:container-native-virtualization/hostpath-provisioner-rhel9@sha256:ac3fe350bedd6bc43596444ba0f279ccf8a144ab14ac5a9b80ea71c46390b7b4_amd64",
"9Base-CNV-4.13:container-native-virtualization/hostpath-provisioner-rhel9@sha256:d4ed87745b7ee2acca2d83e2c91c2f6dced1903c81495b50f2559b3ba2dde287_arm64",
"9Base-CNV-4.13:container-native-virtualization/hyperconverged-cluster-operator-rhel9@sha256:e5ab9f3be59d3568e3d672ab374efb16990ccf92192eac4e1244b10fcd7423e2_amd64",
"9Base-CNV-4.13:container-native-virtualization/hyperconverged-cluster-operator-rhel9@sha256:e681560b184189df03fc84c8a712f32289f42573dd348cda394b19565eb6eca8_arm64",
"9Base-CNV-4.13:container-native-virtualization/hyperconverged-cluster-webhook-rhel9@sha256:06d036d320b3027bb8370bb8e0f6fe8c9f0ec9bca7aac3b5c53698ba4a170042_arm64",
"9Base-CNV-4.13:container-native-virtualization/hyperconverged-cluster-webhook-rhel9@sha256:b5a01336180aad017df62cf8e652f2491b8263ba7e4dd07f858db1ef1924cf2f_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubemacpool-rhel9@sha256:4d190d81eeb3fbe9ed56cf3548dc83a3f81641bfdafa7b42dcfb0d2512566644_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubemacpool-rhel9@sha256:59862a59854f0d5b83dc25ba119f9586a8aff42b6e60d1922f8ae7b4567309ff_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubesecondarydns-rhel9@sha256:121d30d78cc57731ea2242ef2c32430890ac66c2723e65608d5e2f26c3f515cd_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubesecondarydns-rhel9@sha256:b1838f3c8ba3d8113bddea17b78c21e1c1490e2a4a07ea77014edee523d06347_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-console-plugin-rhel9@sha256:86a4b1e3d6ad1d56302c9c058f8bc5826dcfe6c46fb3e0ddaa06818645039020_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-console-plugin-rhel9@sha256:ffb2acd9ae09c1ef9ca756f5eaf6087d0a3957cfc824543949d25f556a97744d_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-dpdk-checkup-rhel9@sha256:525aceb9396010ebcdba14040f267889b807cd84db8e5b4030429b51f0fbf5fe_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-dpdk-checkup-rhel9@sha256:553c4686f56c66cc1e3c5ad9d4051f139d43f821eac3abb98ca5cdb8b5dfe202_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-ssp-operator-rhel9@sha256:901e6cad9534c7bd7c4018c60bccfe49d7280fba5a9901ab4c4d15e9345288c4_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-ssp-operator-rhel9@sha256:badeb0f65f543b209f6af761729d9778b7b73b97d55044016dfba3f38a1f6f18_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-cleanup-vm-rhel9@sha256:28e4975fa4dac22d9da32ed2a10aed039fd957b30140daa36bab2caa998be77a_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-cleanup-vm-rhel9@sha256:b0ff7e812a576ea848590655fc13a85832d5a39f68e7769ceab9da6949da88c7_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-copy-template-rhel9@sha256:4916a6c6b1f9b529187d3b4d5fc99b90157993767b3fe2ad36a9ec77fbb46b10_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-copy-template-rhel9@sha256:f71c36442f1b61cdde7ec58d2c3c78d2039f6d6108e6c35388ef7c1650971fa1_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-create-datavolume-rhel9@sha256:2ad49cf6e2242a9e5861929d9bcab1305a7fc4e34e708f99cff1d7253aa46167_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-create-datavolume-rhel9@sha256:7112400a4ecb23ee2110bf96372fcf9f96ad648a51aa944627b40eb59539a660_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-create-vm-from-template-rhel9@sha256:1411c65bbad7302710788327f6964a4bf5bc20ef70d5e46f4a5c6e7a0e7a0161_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-create-vm-from-template-rhel9@sha256:4d962618aa95600c60c9fc8b890186e510de91177d51949e12797a3558e31328_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-customize-rhel9@sha256:5c23d3f20ea9dcbe7109284d73078ecd516a070e964b844f8d80b1d92ebd55ee_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-customize-rhel9@sha256:a780244e48c6d4f87446d3754c3eb9ab79c0d54675c189da4a659f7a4d5668ea_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-sysprep-rhel9@sha256:84577d949a1bbcaa291c70729127bca4a8994df03068666baa23840877ea8392_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-sysprep-rhel9@sha256:aed630a597a090179e1b0e0c117e536df06b67d0f793f91936aa7388c0c5d7eb_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-modify-vm-template-rhel9@sha256:31d959b80cf57462e1705684bb7e1b78af26bd2c62f1c9e4e51e1d02199b05a8_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-modify-vm-template-rhel9@sha256:66aea526bc10e4c0136ba86e394bbdfe4fbd7f757d6f391a561b51d2ba2f4d46_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-operator-rhel9@sha256:d0cf0e81589f0938de45961eaddfc5ec4782738fd11082de0439b200534259eb_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-operator-rhel9@sha256:f1b1f5044db6bb945584f9d4f31d020597725a286ef368ed0aca2116abb31beb_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-wait-for-vmi-status-rhel9@sha256:39a15d03f113735df03b1a7408227eb9604d942c1f3c1992bcdc7eaf07662711_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-wait-for-vmi-status-rhel9@sha256:afb68af076954fcd18c7a4a1464ea0c2a766e8282eae980051906ed07eaa1707_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-template-validator-rhel9@sha256:02b22c7e7014b5e72d47fed8b6a268cf307638c5510adf3916c51f7f40a52a08_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-template-validator-rhel9@sha256:c0264b9271e602f85b2040ef7f207cdfa46038dc4fa6e4738bf196ef88a71cf8_amd64",
"9Base-CNV-4.13:container-native-virtualization/libguestfs-tools-rhel9@sha256:29ae84575bbca24553cf649256759fd96ff286971d80bc2db129154a7df9b283_amd64",
"9Base-CNV-4.13:container-native-virtualization/libguestfs-tools-rhel9@sha256:6558f60343e068b032167e2340b2c549c5f0258acc5d2614b60966ce79408b01_arm64",
"9Base-CNV-4.13:container-native-virtualization/multus-dynamic-networks-rhel9@sha256:3ecb0162a4b01d1590bf209d717b32a4f0835910d9979823f18c24acba41b503_arm64",
"9Base-CNV-4.13:container-native-virtualization/multus-dynamic-networks-rhel9@sha256:b7f68b6420009e21380d32d6459193aae45e93be9533debe17cb3108571b36b8_amd64",
"9Base-CNV-4.13:container-native-virtualization/ovs-cni-plugin-rhel9@sha256:0f1d372f418744e0aff59ecb0a38f53178aac9c2e9eecfd38aa25ed83e0d1360_arm64",
"9Base-CNV-4.13:container-native-virtualization/ovs-cni-plugin-rhel9@sha256:e8e7a44edbf1713fe74de5c4b8f691cce78f4440c4a32a16ba9ad16694a55396_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-api-rhel9@sha256:e68416321ca8c74a547b3d35897f54813c03481143e402e9bdc4daf315e35b5d_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-api-rhel9@sha256:fdb4ca1bb8b310d713d9c7e88f7d091f4460aa942dbeca5ebcf17281a06daffe_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-artifacts-server-rhel9@sha256:33d11c1832b49df39c1fca62bad40dbc5c30a452248339aaef449ac99509accb_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-artifacts-server-rhel9@sha256:81fc61b714baecb5a89fa6c0749c14566e0661b8e184ca602fc2e03b9cf431ee_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-apiserver-rhel9@sha256:f6128a63344ed2129f5bce648ddcfaa2869d31cde4b93328d3c22534b97ade10_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-apiserver-rhel9@sha256:feca273a691d09445c6cff6d36b5d590735e867656a9898ce0d89744d98e8006_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-cloner-rhel9@sha256:68e3b9b0291b4fb277ac430269ffce11d13b0a7688cf2ffcdb7f98759c36b4db_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-cloner-rhel9@sha256:6ac212767481bef64d8a7d0252bb8089c0f9751fad4a355aef71bd49dad2ad07_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-controller-rhel9@sha256:65f5263275d9f0a12b8fb057d82adf678778039ec873ca9bde182dea3413c9f1_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-controller-rhel9@sha256:d9e62b2019328be258489ac852eef25f8b1233f29abac6bcea5b406329f97fed_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-importer-rhel9@sha256:00a6d9d24ca1466d450b02269ec3144fc7550f0e5c696e869fbf7ce10cae6093_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-importer-rhel9@sha256:2df07fb21a3575e74aa16ded20129828f2300cd33e8ab369b0362062d49e62d0_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-operator-rhel9@sha256:20ec064750faedd97d11b797c8c1d9a1db5d60d7d76e82e65cfd05eb79d65e29_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-operator-rhel9@sha256:802ee8923d9d8e406b23911406f9748756c0ef4d6954e9e2fd5fb4bdf91dde9a_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-uploadproxy-rhel9@sha256:392d0f61f462c707adfdc21e4239c5c09d8520a80486b41d9d9ae479267d6124_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-uploadproxy-rhel9@sha256:6775f34353eec8f35bead9411dde155530d079bb8d51582fb1f2aacc27dbde1d_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-uploadserver-rhel9@sha256:4528c24672689cfb6505761b6b108fbcc04488192733f23d2bfe39cd42a1d743_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-uploadserver-rhel9@sha256:b22048390387380af94e267c8a9a66813c515997456d59d8ebac1486916b6585_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-controller-rhel9@sha256:3e7880149ee9a68286e390beb3d9779f7403c30fc5136e5370e0e4690a3fd243_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-controller-rhel9@sha256:970edc281d7a731e9f7e8c2d4440fe48a221e5e355d5235c5413b4c3adb28503_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-exportproxy-rhel9@sha256:1bda34d5bff734ad997202f29a5ff6f7362fd79fa90511a422442ef2e3681198_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-exportproxy-rhel9@sha256:de3c4afbf7669b98517cbef2490ec186f0553dd97b05bed80ec36dd883fe507b_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-exportserver-rhel9@sha256:3f7f98645176d42c63cca5c0fc3182a03121af87446ca421b6c72baf07dfca0d_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-exportserver-rhel9@sha256:8f12955cd777eb2409037a6968aa92f50c99d6e07e722951dbcfd0c8c9829b5e_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-handler-rhel9@sha256:5fc47110d866d8048aec50689090ce10705d19d3bb48d2b06727d6d569003af7_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-handler-rhel9@sha256:84ba79ae9658699147d2493df2582ab6df10adbff4d44a533c3fe6a9f45f9691_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-launcher-rhel9@sha256:4990d40d9987d5126d105dd45be2501eaded248cb61bdde5ea8d359bc1e7ebef_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-launcher-rhel9@sha256:95aeacb98209e0baef27ce0e02fbac38d693cea74808fc77107efda0f344bcb5_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-operator-rhel9@sha256:5c1a7e4ed2061938987b900a2394f07121d4037350c9bb6485213a2adfea787d_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-operator-rhel9@sha256:66b1b3b379121d6411ba22283e7d991617177330c93746d37753ab7812b9a00b_arm64",
"9Base-CNV-4.13:container-native-virtualization/virtio-win-rhel9@sha256:8735f51da918408a8826601c082d1b29accf26d59b9978da89b980cb509c1102_arm64",
"9Base-CNV-4.13:container-native-virtualization/virtio-win-rhel9@sha256:d147d2a6eb6f907d1e88f61aaca83596853bc72164583d6dda2b1154b490de25_amd64",
"9Base-CNV-4.13:container-native-virtualization/vm-console-proxy-rhel9@sha256:70a8d0cd66182c25e02679540bae1368b2a9cf687532b58dba41ef30c5ca00c1_arm64",
"9Base-CNV-4.13:container-native-virtualization/vm-console-proxy-rhel9@sha256:7ca921f98f6d81a126907127a611146fb53397869a628678faa1e289c01d22b2_amd64",
"9Base-CNV-4.13:container-native-virtualization/vm-network-latency-checkup-rhel9@sha256:503ea7ac914a9b54e9d665a0227ee0b5d5200cdb5d692aa94c07dd1518d91b70_arm64",
"9Base-CNV-4.13:container-native-virtualization/vm-network-latency-checkup-rhel9@sha256:59fd965975bccf641a0fa7aa01374d45057bd03cda7528248a84b60b1205bf57_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "golang: net/http: handle server errors after sending GOAWAY"
},
{
"cve": "CVE-2022-32149",
"cwe": {
"id": "CWE-407",
"name": "Inefficient Algorithmic Complexity"
},
"discovery_date": "2022-10-12T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"9Base-CNV-4.13:container-native-virtualization/bridge-marker-rhel9@sha256:8eac196b30a648989cdca5cb153a3bc3d34e47339acba0e4f760bd366496c99d_amd64",
"9Base-CNV-4.13:container-native-virtualization/bridge-marker-rhel9@sha256:e8a55aee3d75a316bb0d7a554c737198823df04b3c05e481c17e45eb2153bced_arm64",
"9Base-CNV-4.13:container-native-virtualization/cluster-network-addons-operator-rhel9@sha256:3bff33e3f40cd1e2b519c2db56734d4bb8df883e155c2f20b1cb9d3d184daec1_amd64",
"9Base-CNV-4.13:container-native-virtualization/cluster-network-addons-operator-rhel9@sha256:f439d2f420bb59eb1d5af14ce2002648d0cfc155d1a1466c8aac9b661fe902b8_arm64",
"9Base-CNV-4.13:container-native-virtualization/cnv-containernetworking-plugins-rhel9@sha256:89f22e541f61a660c9aa9f38ef58e80b84a0517f74e84292107fc252c25465c9_arm64",
"9Base-CNV-4.13:container-native-virtualization/cnv-containernetworking-plugins-rhel9@sha256:bf471997e54e4a75b0d71f492ab295787fdbb14d8c85c4ea8c03f0552dbc3755_amd64",
"9Base-CNV-4.13:container-native-virtualization/cnv-must-gather-rhel9@sha256:9e8efd76924958eb605401abdac08eba97fb83a1ada383bc87a7fb7c87b3a455_arm64",
"9Base-CNV-4.13:container-native-virtualization/cnv-must-gather-rhel9@sha256:b9fc32b5fabedd65a4c3a471879c808af2087277de4278adaa115a732f0468da_amd64",
"9Base-CNV-4.13:container-native-virtualization/hco-bundle-registry-rhel9@sha256:60e89d7a99ff9f20e974430b802dd724a3bb6fa1e01e5a62daad98ac487b3063_amd64",
"9Base-CNV-4.13:container-native-virtualization/hco-bundle-registry-rhel9@sha256:dd20b138045ef1424d83a47e7abcfcbb2ac54577dcec5ed3c186390aaa4c9d84_arm64",
"9Base-CNV-4.13:container-native-virtualization/hostpath-csi-driver-rhel9@sha256:61e2824853d51347593ad909a5e546cd92e4216d6a1df5dffb50dd9cba277cce_amd64",
"9Base-CNV-4.13:container-native-virtualization/hostpath-csi-driver-rhel9@sha256:676d4c23a5f60dd331728af056b0a6b2d3358ac88da23299b1a98dfaca8f288e_arm64",
"9Base-CNV-4.13:container-native-virtualization/hostpath-provisioner-operator-rhel9@sha256:515be94be496c67f5b8fd5f4832fe4385e56476e6589897d6b9fbb9bb2b00f32_amd64",
"9Base-CNV-4.13:container-native-virtualization/hostpath-provisioner-operator-rhel9@sha256:571ae805641dea11646028c946039983c7fd82f138b915dcb8b80c39b465e63c_arm64",
"9Base-CNV-4.13:container-native-virtualization/hostpath-provisioner-rhel9@sha256:ac3fe350bedd6bc43596444ba0f279ccf8a144ab14ac5a9b80ea71c46390b7b4_amd64",
"9Base-CNV-4.13:container-native-virtualization/hostpath-provisioner-rhel9@sha256:d4ed87745b7ee2acca2d83e2c91c2f6dced1903c81495b50f2559b3ba2dde287_arm64",
"9Base-CNV-4.13:container-native-virtualization/hyperconverged-cluster-operator-rhel9@sha256:e5ab9f3be59d3568e3d672ab374efb16990ccf92192eac4e1244b10fcd7423e2_amd64",
"9Base-CNV-4.13:container-native-virtualization/hyperconverged-cluster-operator-rhel9@sha256:e681560b184189df03fc84c8a712f32289f42573dd348cda394b19565eb6eca8_arm64",
"9Base-CNV-4.13:container-native-virtualization/hyperconverged-cluster-webhook-rhel9@sha256:06d036d320b3027bb8370bb8e0f6fe8c9f0ec9bca7aac3b5c53698ba4a170042_arm64",
"9Base-CNV-4.13:container-native-virtualization/hyperconverged-cluster-webhook-rhel9@sha256:b5a01336180aad017df62cf8e652f2491b8263ba7e4dd07f858db1ef1924cf2f_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubemacpool-rhel9@sha256:4d190d81eeb3fbe9ed56cf3548dc83a3f81641bfdafa7b42dcfb0d2512566644_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubemacpool-rhel9@sha256:59862a59854f0d5b83dc25ba119f9586a8aff42b6e60d1922f8ae7b4567309ff_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubesecondarydns-rhel9@sha256:121d30d78cc57731ea2242ef2c32430890ac66c2723e65608d5e2f26c3f515cd_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubesecondarydns-rhel9@sha256:b1838f3c8ba3d8113bddea17b78c21e1c1490e2a4a07ea77014edee523d06347_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-console-plugin-rhel9@sha256:86a4b1e3d6ad1d56302c9c058f8bc5826dcfe6c46fb3e0ddaa06818645039020_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-console-plugin-rhel9@sha256:ffb2acd9ae09c1ef9ca756f5eaf6087d0a3957cfc824543949d25f556a97744d_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-dpdk-checkup-rhel9@sha256:525aceb9396010ebcdba14040f267889b807cd84db8e5b4030429b51f0fbf5fe_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-dpdk-checkup-rhel9@sha256:553c4686f56c66cc1e3c5ad9d4051f139d43f821eac3abb98ca5cdb8b5dfe202_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-ssp-operator-rhel9@sha256:901e6cad9534c7bd7c4018c60bccfe49d7280fba5a9901ab4c4d15e9345288c4_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-ssp-operator-rhel9@sha256:badeb0f65f543b209f6af761729d9778b7b73b97d55044016dfba3f38a1f6f18_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-cleanup-vm-rhel9@sha256:28e4975fa4dac22d9da32ed2a10aed039fd957b30140daa36bab2caa998be77a_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-cleanup-vm-rhel9@sha256:b0ff7e812a576ea848590655fc13a85832d5a39f68e7769ceab9da6949da88c7_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-copy-template-rhel9@sha256:4916a6c6b1f9b529187d3b4d5fc99b90157993767b3fe2ad36a9ec77fbb46b10_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-copy-template-rhel9@sha256:f71c36442f1b61cdde7ec58d2c3c78d2039f6d6108e6c35388ef7c1650971fa1_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-create-datavolume-rhel9@sha256:2ad49cf6e2242a9e5861929d9bcab1305a7fc4e34e708f99cff1d7253aa46167_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-create-datavolume-rhel9@sha256:7112400a4ecb23ee2110bf96372fcf9f96ad648a51aa944627b40eb59539a660_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-create-vm-from-template-rhel9@sha256:1411c65bbad7302710788327f6964a4bf5bc20ef70d5e46f4a5c6e7a0e7a0161_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-create-vm-from-template-rhel9@sha256:4d962618aa95600c60c9fc8b890186e510de91177d51949e12797a3558e31328_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-customize-rhel9@sha256:5c23d3f20ea9dcbe7109284d73078ecd516a070e964b844f8d80b1d92ebd55ee_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-customize-rhel9@sha256:a780244e48c6d4f87446d3754c3eb9ab79c0d54675c189da4a659f7a4d5668ea_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-sysprep-rhel9@sha256:84577d949a1bbcaa291c70729127bca4a8994df03068666baa23840877ea8392_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-sysprep-rhel9@sha256:aed630a597a090179e1b0e0c117e536df06b67d0f793f91936aa7388c0c5d7eb_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-modify-vm-template-rhel9@sha256:31d959b80cf57462e1705684bb7e1b78af26bd2c62f1c9e4e51e1d02199b05a8_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-modify-vm-template-rhel9@sha256:66aea526bc10e4c0136ba86e394bbdfe4fbd7f757d6f391a561b51d2ba2f4d46_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-operator-rhel9@sha256:d0cf0e81589f0938de45961eaddfc5ec4782738fd11082de0439b200534259eb_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-operator-rhel9@sha256:f1b1f5044db6bb945584f9d4f31d020597725a286ef368ed0aca2116abb31beb_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-wait-for-vmi-status-rhel9@sha256:39a15d03f113735df03b1a7408227eb9604d942c1f3c1992bcdc7eaf07662711_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-wait-for-vmi-status-rhel9@sha256:afb68af076954fcd18c7a4a1464ea0c2a766e8282eae980051906ed07eaa1707_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-template-validator-rhel9@sha256:02b22c7e7014b5e72d47fed8b6a268cf307638c5510adf3916c51f7f40a52a08_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-template-validator-rhel9@sha256:c0264b9271e602f85b2040ef7f207cdfa46038dc4fa6e4738bf196ef88a71cf8_amd64",
"9Base-CNV-4.13:container-native-virtualization/libguestfs-tools-rhel9@sha256:29ae84575bbca24553cf649256759fd96ff286971d80bc2db129154a7df9b283_amd64",
"9Base-CNV-4.13:container-native-virtualization/libguestfs-tools-rhel9@sha256:6558f60343e068b032167e2340b2c549c5f0258acc5d2614b60966ce79408b01_arm64",
"9Base-CNV-4.13:container-native-virtualization/multus-dynamic-networks-rhel9@sha256:3ecb0162a4b01d1590bf209d717b32a4f0835910d9979823f18c24acba41b503_arm64",
"9Base-CNV-4.13:container-native-virtualization/multus-dynamic-networks-rhel9@sha256:b7f68b6420009e21380d32d6459193aae45e93be9533debe17cb3108571b36b8_amd64",
"9Base-CNV-4.13:container-native-virtualization/ovs-cni-plugin-rhel9@sha256:0f1d372f418744e0aff59ecb0a38f53178aac9c2e9eecfd38aa25ed83e0d1360_arm64",
"9Base-CNV-4.13:container-native-virtualization/ovs-cni-plugin-rhel9@sha256:e8e7a44edbf1713fe74de5c4b8f691cce78f4440c4a32a16ba9ad16694a55396_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-artifacts-server-rhel9@sha256:33d11c1832b49df39c1fca62bad40dbc5c30a452248339aaef449ac99509accb_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-artifacts-server-rhel9@sha256:81fc61b714baecb5a89fa6c0749c14566e0661b8e184ca602fc2e03b9cf431ee_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-apiserver-rhel9@sha256:f6128a63344ed2129f5bce648ddcfaa2869d31cde4b93328d3c22534b97ade10_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-apiserver-rhel9@sha256:feca273a691d09445c6cff6d36b5d590735e867656a9898ce0d89744d98e8006_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-cloner-rhel9@sha256:68e3b9b0291b4fb277ac430269ffce11d13b0a7688cf2ffcdb7f98759c36b4db_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-cloner-rhel9@sha256:6ac212767481bef64d8a7d0252bb8089c0f9751fad4a355aef71bd49dad2ad07_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-controller-rhel9@sha256:65f5263275d9f0a12b8fb057d82adf678778039ec873ca9bde182dea3413c9f1_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-controller-rhel9@sha256:d9e62b2019328be258489ac852eef25f8b1233f29abac6bcea5b406329f97fed_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-importer-rhel9@sha256:00a6d9d24ca1466d450b02269ec3144fc7550f0e5c696e869fbf7ce10cae6093_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-importer-rhel9@sha256:2df07fb21a3575e74aa16ded20129828f2300cd33e8ab369b0362062d49e62d0_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-operator-rhel9@sha256:20ec064750faedd97d11b797c8c1d9a1db5d60d7d76e82e65cfd05eb79d65e29_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-operator-rhel9@sha256:802ee8923d9d8e406b23911406f9748756c0ef4d6954e9e2fd5fb4bdf91dde9a_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-uploadproxy-rhel9@sha256:392d0f61f462c707adfdc21e4239c5c09d8520a80486b41d9d9ae479267d6124_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-uploadproxy-rhel9@sha256:6775f34353eec8f35bead9411dde155530d079bb8d51582fb1f2aacc27dbde1d_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-uploadserver-rhel9@sha256:4528c24672689cfb6505761b6b108fbcc04488192733f23d2bfe39cd42a1d743_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-uploadserver-rhel9@sha256:b22048390387380af94e267c8a9a66813c515997456d59d8ebac1486916b6585_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-controller-rhel9@sha256:3e7880149ee9a68286e390beb3d9779f7403c30fc5136e5370e0e4690a3fd243_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-controller-rhel9@sha256:970edc281d7a731e9f7e8c2d4440fe48a221e5e355d5235c5413b4c3adb28503_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-exportproxy-rhel9@sha256:1bda34d5bff734ad997202f29a5ff6f7362fd79fa90511a422442ef2e3681198_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-exportproxy-rhel9@sha256:de3c4afbf7669b98517cbef2490ec186f0553dd97b05bed80ec36dd883fe507b_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-exportserver-rhel9@sha256:3f7f98645176d42c63cca5c0fc3182a03121af87446ca421b6c72baf07dfca0d_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-exportserver-rhel9@sha256:8f12955cd777eb2409037a6968aa92f50c99d6e07e722951dbcfd0c8c9829b5e_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-handler-rhel9@sha256:5fc47110d866d8048aec50689090ce10705d19d3bb48d2b06727d6d569003af7_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-handler-rhel9@sha256:84ba79ae9658699147d2493df2582ab6df10adbff4d44a533c3fe6a9f45f9691_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-launcher-rhel9@sha256:4990d40d9987d5126d105dd45be2501eaded248cb61bdde5ea8d359bc1e7ebef_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-launcher-rhel9@sha256:95aeacb98209e0baef27ce0e02fbac38d693cea74808fc77107efda0f344bcb5_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-operator-rhel9@sha256:5c1a7e4ed2061938987b900a2394f07121d4037350c9bb6485213a2adfea787d_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-operator-rhel9@sha256:66b1b3b379121d6411ba22283e7d991617177330c93746d37753ab7812b9a00b_arm64",
"9Base-CNV-4.13:container-native-virtualization/virtio-win-rhel9@sha256:8735f51da918408a8826601c082d1b29accf26d59b9978da89b980cb509c1102_arm64",
"9Base-CNV-4.13:container-native-virtualization/virtio-win-rhel9@sha256:d147d2a6eb6f907d1e88f61aaca83596853bc72164583d6dda2b1154b490de25_amd64",
"9Base-CNV-4.13:container-native-virtualization/vm-console-proxy-rhel9@sha256:70a8d0cd66182c25e02679540bae1368b2a9cf687532b58dba41ef30c5ca00c1_arm64",
"9Base-CNV-4.13:container-native-virtualization/vm-console-proxy-rhel9@sha256:7ca921f98f6d81a126907127a611146fb53397869a628678faa1e289c01d22b2_amd64",
"9Base-CNV-4.13:container-native-virtualization/vm-network-latency-checkup-rhel9@sha256:503ea7ac914a9b54e9d665a0227ee0b5d5200cdb5d692aa94c07dd1518d91b70_arm64",
"9Base-CNV-4.13:container-native-virtualization/vm-network-latency-checkup-rhel9@sha256:59fd965975bccf641a0fa7aa01374d45057bd03cda7528248a84b60b1205bf57_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2134010"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in the golang.org/x/text/language package. An attacker can craft an Accept-Language header which ParseAcceptLanguage will take significant time to parse. This issue leads to a denial of service, and can impact availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: golang.org/x/text/language: ParseAcceptLanguage takes a long time to parse complex tags",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"9Base-CNV-4.13:container-native-virtualization/virt-api-rhel9@sha256:e68416321ca8c74a547b3d35897f54813c03481143e402e9bdc4daf315e35b5d_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-api-rhel9@sha256:fdb4ca1bb8b310d713d9c7e88f7d091f4460aa942dbeca5ebcf17281a06daffe_amd64"
],
"known_not_affected": [
"9Base-CNV-4.13:container-native-virtualization/bridge-marker-rhel9@sha256:8eac196b30a648989cdca5cb153a3bc3d34e47339acba0e4f760bd366496c99d_amd64",
"9Base-CNV-4.13:container-native-virtualization/bridge-marker-rhel9@sha256:e8a55aee3d75a316bb0d7a554c737198823df04b3c05e481c17e45eb2153bced_arm64",
"9Base-CNV-4.13:container-native-virtualization/cluster-network-addons-operator-rhel9@sha256:3bff33e3f40cd1e2b519c2db56734d4bb8df883e155c2f20b1cb9d3d184daec1_amd64",
"9Base-CNV-4.13:container-native-virtualization/cluster-network-addons-operator-rhel9@sha256:f439d2f420bb59eb1d5af14ce2002648d0cfc155d1a1466c8aac9b661fe902b8_arm64",
"9Base-CNV-4.13:container-native-virtualization/cnv-containernetworking-plugins-rhel9@sha256:89f22e541f61a660c9aa9f38ef58e80b84a0517f74e84292107fc252c25465c9_arm64",
"9Base-CNV-4.13:container-native-virtualization/cnv-containernetworking-plugins-rhel9@sha256:bf471997e54e4a75b0d71f492ab295787fdbb14d8c85c4ea8c03f0552dbc3755_amd64",
"9Base-CNV-4.13:container-native-virtualization/cnv-must-gather-rhel9@sha256:9e8efd76924958eb605401abdac08eba97fb83a1ada383bc87a7fb7c87b3a455_arm64",
"9Base-CNV-4.13:container-native-virtualization/cnv-must-gather-rhel9@sha256:b9fc32b5fabedd65a4c3a471879c808af2087277de4278adaa115a732f0468da_amd64",
"9Base-CNV-4.13:container-native-virtualization/hco-bundle-registry-rhel9@sha256:60e89d7a99ff9f20e974430b802dd724a3bb6fa1e01e5a62daad98ac487b3063_amd64",
"9Base-CNV-4.13:container-native-virtualization/hco-bundle-registry-rhel9@sha256:dd20b138045ef1424d83a47e7abcfcbb2ac54577dcec5ed3c186390aaa4c9d84_arm64",
"9Base-CNV-4.13:container-native-virtualization/hostpath-csi-driver-rhel9@sha256:61e2824853d51347593ad909a5e546cd92e4216d6a1df5dffb50dd9cba277cce_amd64",
"9Base-CNV-4.13:container-native-virtualization/hostpath-csi-driver-rhel9@sha256:676d4c23a5f60dd331728af056b0a6b2d3358ac88da23299b1a98dfaca8f288e_arm64",
"9Base-CNV-4.13:container-native-virtualization/hostpath-provisioner-operator-rhel9@sha256:515be94be496c67f5b8fd5f4832fe4385e56476e6589897d6b9fbb9bb2b00f32_amd64",
"9Base-CNV-4.13:container-native-virtualization/hostpath-provisioner-operator-rhel9@sha256:571ae805641dea11646028c946039983c7fd82f138b915dcb8b80c39b465e63c_arm64",
"9Base-CNV-4.13:container-native-virtualization/hostpath-provisioner-rhel9@sha256:ac3fe350bedd6bc43596444ba0f279ccf8a144ab14ac5a9b80ea71c46390b7b4_amd64",
"9Base-CNV-4.13:container-native-virtualization/hostpath-provisioner-rhel9@sha256:d4ed87745b7ee2acca2d83e2c91c2f6dced1903c81495b50f2559b3ba2dde287_arm64",
"9Base-CNV-4.13:container-native-virtualization/hyperconverged-cluster-operator-rhel9@sha256:e5ab9f3be59d3568e3d672ab374efb16990ccf92192eac4e1244b10fcd7423e2_amd64",
"9Base-CNV-4.13:container-native-virtualization/hyperconverged-cluster-operator-rhel9@sha256:e681560b184189df03fc84c8a712f32289f42573dd348cda394b19565eb6eca8_arm64",
"9Base-CNV-4.13:container-native-virtualization/hyperconverged-cluster-webhook-rhel9@sha256:06d036d320b3027bb8370bb8e0f6fe8c9f0ec9bca7aac3b5c53698ba4a170042_arm64",
"9Base-CNV-4.13:container-native-virtualization/hyperconverged-cluster-webhook-rhel9@sha256:b5a01336180aad017df62cf8e652f2491b8263ba7e4dd07f858db1ef1924cf2f_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubemacpool-rhel9@sha256:4d190d81eeb3fbe9ed56cf3548dc83a3f81641bfdafa7b42dcfb0d2512566644_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubemacpool-rhel9@sha256:59862a59854f0d5b83dc25ba119f9586a8aff42b6e60d1922f8ae7b4567309ff_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubesecondarydns-rhel9@sha256:121d30d78cc57731ea2242ef2c32430890ac66c2723e65608d5e2f26c3f515cd_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubesecondarydns-rhel9@sha256:b1838f3c8ba3d8113bddea17b78c21e1c1490e2a4a07ea77014edee523d06347_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-console-plugin-rhel9@sha256:86a4b1e3d6ad1d56302c9c058f8bc5826dcfe6c46fb3e0ddaa06818645039020_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-console-plugin-rhel9@sha256:ffb2acd9ae09c1ef9ca756f5eaf6087d0a3957cfc824543949d25f556a97744d_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-dpdk-checkup-rhel9@sha256:525aceb9396010ebcdba14040f267889b807cd84db8e5b4030429b51f0fbf5fe_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-dpdk-checkup-rhel9@sha256:553c4686f56c66cc1e3c5ad9d4051f139d43f821eac3abb98ca5cdb8b5dfe202_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-ssp-operator-rhel9@sha256:901e6cad9534c7bd7c4018c60bccfe49d7280fba5a9901ab4c4d15e9345288c4_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-ssp-operator-rhel9@sha256:badeb0f65f543b209f6af761729d9778b7b73b97d55044016dfba3f38a1f6f18_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-cleanup-vm-rhel9@sha256:28e4975fa4dac22d9da32ed2a10aed039fd957b30140daa36bab2caa998be77a_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-cleanup-vm-rhel9@sha256:b0ff7e812a576ea848590655fc13a85832d5a39f68e7769ceab9da6949da88c7_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-copy-template-rhel9@sha256:4916a6c6b1f9b529187d3b4d5fc99b90157993767b3fe2ad36a9ec77fbb46b10_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-copy-template-rhel9@sha256:f71c36442f1b61cdde7ec58d2c3c78d2039f6d6108e6c35388ef7c1650971fa1_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-create-datavolume-rhel9@sha256:2ad49cf6e2242a9e5861929d9bcab1305a7fc4e34e708f99cff1d7253aa46167_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-create-datavolume-rhel9@sha256:7112400a4ecb23ee2110bf96372fcf9f96ad648a51aa944627b40eb59539a660_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-create-vm-from-template-rhel9@sha256:1411c65bbad7302710788327f6964a4bf5bc20ef70d5e46f4a5c6e7a0e7a0161_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-create-vm-from-template-rhel9@sha256:4d962618aa95600c60c9fc8b890186e510de91177d51949e12797a3558e31328_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-customize-rhel9@sha256:5c23d3f20ea9dcbe7109284d73078ecd516a070e964b844f8d80b1d92ebd55ee_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-customize-rhel9@sha256:a780244e48c6d4f87446d3754c3eb9ab79c0d54675c189da4a659f7a4d5668ea_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-sysprep-rhel9@sha256:84577d949a1bbcaa291c70729127bca4a8994df03068666baa23840877ea8392_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-sysprep-rhel9@sha256:aed630a597a090179e1b0e0c117e536df06b67d0f793f91936aa7388c0c5d7eb_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-modify-vm-template-rhel9@sha256:31d959b80cf57462e1705684bb7e1b78af26bd2c62f1c9e4e51e1d02199b05a8_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-modify-vm-template-rhel9@sha256:66aea526bc10e4c0136ba86e394bbdfe4fbd7f757d6f391a561b51d2ba2f4d46_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-operator-rhel9@sha256:d0cf0e81589f0938de45961eaddfc5ec4782738fd11082de0439b200534259eb_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-operator-rhel9@sha256:f1b1f5044db6bb945584f9d4f31d020597725a286ef368ed0aca2116abb31beb_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-wait-for-vmi-status-rhel9@sha256:39a15d03f113735df03b1a7408227eb9604d942c1f3c1992bcdc7eaf07662711_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-wait-for-vmi-status-rhel9@sha256:afb68af076954fcd18c7a4a1464ea0c2a766e8282eae980051906ed07eaa1707_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-template-validator-rhel9@sha256:02b22c7e7014b5e72d47fed8b6a268cf307638c5510adf3916c51f7f40a52a08_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-template-validator-rhel9@sha256:c0264b9271e602f85b2040ef7f207cdfa46038dc4fa6e4738bf196ef88a71cf8_amd64",
"9Base-CNV-4.13:container-native-virtualization/libguestfs-tools-rhel9@sha256:29ae84575bbca24553cf649256759fd96ff286971d80bc2db129154a7df9b283_amd64",
"9Base-CNV-4.13:container-native-virtualization/libguestfs-tools-rhel9@sha256:6558f60343e068b032167e2340b2c549c5f0258acc5d2614b60966ce79408b01_arm64",
"9Base-CNV-4.13:container-native-virtualization/multus-dynamic-networks-rhel9@sha256:3ecb0162a4b01d1590bf209d717b32a4f0835910d9979823f18c24acba41b503_arm64",
"9Base-CNV-4.13:container-native-virtualization/multus-dynamic-networks-rhel9@sha256:b7f68b6420009e21380d32d6459193aae45e93be9533debe17cb3108571b36b8_amd64",
"9Base-CNV-4.13:container-native-virtualization/ovs-cni-plugin-rhel9@sha256:0f1d372f418744e0aff59ecb0a38f53178aac9c2e9eecfd38aa25ed83e0d1360_arm64",
"9Base-CNV-4.13:container-native-virtualization/ovs-cni-plugin-rhel9@sha256:e8e7a44edbf1713fe74de5c4b8f691cce78f4440c4a32a16ba9ad16694a55396_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-artifacts-server-rhel9@sha256:33d11c1832b49df39c1fca62bad40dbc5c30a452248339aaef449ac99509accb_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-artifacts-server-rhel9@sha256:81fc61b714baecb5a89fa6c0749c14566e0661b8e184ca602fc2e03b9cf431ee_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-apiserver-rhel9@sha256:f6128a63344ed2129f5bce648ddcfaa2869d31cde4b93328d3c22534b97ade10_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-apiserver-rhel9@sha256:feca273a691d09445c6cff6d36b5d590735e867656a9898ce0d89744d98e8006_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-cloner-rhel9@sha256:68e3b9b0291b4fb277ac430269ffce11d13b0a7688cf2ffcdb7f98759c36b4db_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-cloner-rhel9@sha256:6ac212767481bef64d8a7d0252bb8089c0f9751fad4a355aef71bd49dad2ad07_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-controller-rhel9@sha256:65f5263275d9f0a12b8fb057d82adf678778039ec873ca9bde182dea3413c9f1_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-controller-rhel9@sha256:d9e62b2019328be258489ac852eef25f8b1233f29abac6bcea5b406329f97fed_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-importer-rhel9@sha256:00a6d9d24ca1466d450b02269ec3144fc7550f0e5c696e869fbf7ce10cae6093_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-importer-rhel9@sha256:2df07fb21a3575e74aa16ded20129828f2300cd33e8ab369b0362062d49e62d0_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-operator-rhel9@sha256:20ec064750faedd97d11b797c8c1d9a1db5d60d7d76e82e65cfd05eb79d65e29_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-operator-rhel9@sha256:802ee8923d9d8e406b23911406f9748756c0ef4d6954e9e2fd5fb4bdf91dde9a_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-uploadproxy-rhel9@sha256:392d0f61f462c707adfdc21e4239c5c09d8520a80486b41d9d9ae479267d6124_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-uploadproxy-rhel9@sha256:6775f34353eec8f35bead9411dde155530d079bb8d51582fb1f2aacc27dbde1d_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-uploadserver-rhel9@sha256:4528c24672689cfb6505761b6b108fbcc04488192733f23d2bfe39cd42a1d743_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-uploadserver-rhel9@sha256:b22048390387380af94e267c8a9a66813c515997456d59d8ebac1486916b6585_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-controller-rhel9@sha256:3e7880149ee9a68286e390beb3d9779f7403c30fc5136e5370e0e4690a3fd243_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-controller-rhel9@sha256:970edc281d7a731e9f7e8c2d4440fe48a221e5e355d5235c5413b4c3adb28503_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-exportproxy-rhel9@sha256:1bda34d5bff734ad997202f29a5ff6f7362fd79fa90511a422442ef2e3681198_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-exportproxy-rhel9@sha256:de3c4afbf7669b98517cbef2490ec186f0553dd97b05bed80ec36dd883fe507b_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-exportserver-rhel9@sha256:3f7f98645176d42c63cca5c0fc3182a03121af87446ca421b6c72baf07dfca0d_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-exportserver-rhel9@sha256:8f12955cd777eb2409037a6968aa92f50c99d6e07e722951dbcfd0c8c9829b5e_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-handler-rhel9@sha256:5fc47110d866d8048aec50689090ce10705d19d3bb48d2b06727d6d569003af7_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-handler-rhel9@sha256:84ba79ae9658699147d2493df2582ab6df10adbff4d44a533c3fe6a9f45f9691_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-launcher-rhel9@sha256:4990d40d9987d5126d105dd45be2501eaded248cb61bdde5ea8d359bc1e7ebef_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-launcher-rhel9@sha256:95aeacb98209e0baef27ce0e02fbac38d693cea74808fc77107efda0f344bcb5_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-operator-rhel9@sha256:5c1a7e4ed2061938987b900a2394f07121d4037350c9bb6485213a2adfea787d_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-operator-rhel9@sha256:66b1b3b379121d6411ba22283e7d991617177330c93746d37753ab7812b9a00b_arm64",
"9Base-CNV-4.13:container-native-virtualization/virtio-win-rhel9@sha256:8735f51da918408a8826601c082d1b29accf26d59b9978da89b980cb509c1102_arm64",
"9Base-CNV-4.13:container-native-virtualization/virtio-win-rhel9@sha256:d147d2a6eb6f907d1e88f61aaca83596853bc72164583d6dda2b1154b490de25_amd64",
"9Base-CNV-4.13:container-native-virtualization/vm-console-proxy-rhel9@sha256:70a8d0cd66182c25e02679540bae1368b2a9cf687532b58dba41ef30c5ca00c1_arm64",
"9Base-CNV-4.13:container-native-virtualization/vm-console-proxy-rhel9@sha256:7ca921f98f6d81a126907127a611146fb53397869a628678faa1e289c01d22b2_amd64",
"9Base-CNV-4.13:container-native-virtualization/vm-network-latency-checkup-rhel9@sha256:503ea7ac914a9b54e9d665a0227ee0b5d5200cdb5d692aa94c07dd1518d91b70_arm64",
"9Base-CNV-4.13:container-native-virtualization/vm-network-latency-checkup-rhel9@sha256:59fd965975bccf641a0fa7aa01374d45057bd03cda7528248a84b60b1205bf57_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-32149"
},
{
"category": "external",
"summary": "RHBZ#2134010",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2134010"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-32149",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32149"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-32149",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-32149"
},
{
"category": "external",
"summary": "https://go.dev/issue/56152",
"url": "https://go.dev/issue/56152"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-dev/c/qfPIly0X7aU",
"url": "https://groups.google.com/g/golang-dev/c/qfPIly0X7aU"
}
],
"release_date": "2022-10-11T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-05-18T02:55:08+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"9Base-CNV-4.13:container-native-virtualization/virt-api-rhel9@sha256:e68416321ca8c74a547b3d35897f54813c03481143e402e9bdc4daf315e35b5d_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-api-rhel9@sha256:fdb4ca1bb8b310d713d9c7e88f7d091f4460aa942dbeca5ebcf17281a06daffe_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:3205"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"9Base-CNV-4.13:container-native-virtualization/bridge-marker-rhel9@sha256:8eac196b30a648989cdca5cb153a3bc3d34e47339acba0e4f760bd366496c99d_amd64",
"9Base-CNV-4.13:container-native-virtualization/bridge-marker-rhel9@sha256:e8a55aee3d75a316bb0d7a554c737198823df04b3c05e481c17e45eb2153bced_arm64",
"9Base-CNV-4.13:container-native-virtualization/cluster-network-addons-operator-rhel9@sha256:3bff33e3f40cd1e2b519c2db56734d4bb8df883e155c2f20b1cb9d3d184daec1_amd64",
"9Base-CNV-4.13:container-native-virtualization/cluster-network-addons-operator-rhel9@sha256:f439d2f420bb59eb1d5af14ce2002648d0cfc155d1a1466c8aac9b661fe902b8_arm64",
"9Base-CNV-4.13:container-native-virtualization/cnv-containernetworking-plugins-rhel9@sha256:89f22e541f61a660c9aa9f38ef58e80b84a0517f74e84292107fc252c25465c9_arm64",
"9Base-CNV-4.13:container-native-virtualization/cnv-containernetworking-plugins-rhel9@sha256:bf471997e54e4a75b0d71f492ab295787fdbb14d8c85c4ea8c03f0552dbc3755_amd64",
"9Base-CNV-4.13:container-native-virtualization/cnv-must-gather-rhel9@sha256:9e8efd76924958eb605401abdac08eba97fb83a1ada383bc87a7fb7c87b3a455_arm64",
"9Base-CNV-4.13:container-native-virtualization/cnv-must-gather-rhel9@sha256:b9fc32b5fabedd65a4c3a471879c808af2087277de4278adaa115a732f0468da_amd64",
"9Base-CNV-4.13:container-native-virtualization/hco-bundle-registry-rhel9@sha256:60e89d7a99ff9f20e974430b802dd724a3bb6fa1e01e5a62daad98ac487b3063_amd64",
"9Base-CNV-4.13:container-native-virtualization/hco-bundle-registry-rhel9@sha256:dd20b138045ef1424d83a47e7abcfcbb2ac54577dcec5ed3c186390aaa4c9d84_arm64",
"9Base-CNV-4.13:container-native-virtualization/hostpath-csi-driver-rhel9@sha256:61e2824853d51347593ad909a5e546cd92e4216d6a1df5dffb50dd9cba277cce_amd64",
"9Base-CNV-4.13:container-native-virtualization/hostpath-csi-driver-rhel9@sha256:676d4c23a5f60dd331728af056b0a6b2d3358ac88da23299b1a98dfaca8f288e_arm64",
"9Base-CNV-4.13:container-native-virtualization/hostpath-provisioner-operator-rhel9@sha256:515be94be496c67f5b8fd5f4832fe4385e56476e6589897d6b9fbb9bb2b00f32_amd64",
"9Base-CNV-4.13:container-native-virtualization/hostpath-provisioner-operator-rhel9@sha256:571ae805641dea11646028c946039983c7fd82f138b915dcb8b80c39b465e63c_arm64",
"9Base-CNV-4.13:container-native-virtualization/hostpath-provisioner-rhel9@sha256:ac3fe350bedd6bc43596444ba0f279ccf8a144ab14ac5a9b80ea71c46390b7b4_amd64",
"9Base-CNV-4.13:container-native-virtualization/hostpath-provisioner-rhel9@sha256:d4ed87745b7ee2acca2d83e2c91c2f6dced1903c81495b50f2559b3ba2dde287_arm64",
"9Base-CNV-4.13:container-native-virtualization/hyperconverged-cluster-operator-rhel9@sha256:e5ab9f3be59d3568e3d672ab374efb16990ccf92192eac4e1244b10fcd7423e2_amd64",
"9Base-CNV-4.13:container-native-virtualization/hyperconverged-cluster-operator-rhel9@sha256:e681560b184189df03fc84c8a712f32289f42573dd348cda394b19565eb6eca8_arm64",
"9Base-CNV-4.13:container-native-virtualization/hyperconverged-cluster-webhook-rhel9@sha256:06d036d320b3027bb8370bb8e0f6fe8c9f0ec9bca7aac3b5c53698ba4a170042_arm64",
"9Base-CNV-4.13:container-native-virtualization/hyperconverged-cluster-webhook-rhel9@sha256:b5a01336180aad017df62cf8e652f2491b8263ba7e4dd07f858db1ef1924cf2f_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubemacpool-rhel9@sha256:4d190d81eeb3fbe9ed56cf3548dc83a3f81641bfdafa7b42dcfb0d2512566644_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubemacpool-rhel9@sha256:59862a59854f0d5b83dc25ba119f9586a8aff42b6e60d1922f8ae7b4567309ff_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubesecondarydns-rhel9@sha256:121d30d78cc57731ea2242ef2c32430890ac66c2723e65608d5e2f26c3f515cd_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubesecondarydns-rhel9@sha256:b1838f3c8ba3d8113bddea17b78c21e1c1490e2a4a07ea77014edee523d06347_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-console-plugin-rhel9@sha256:86a4b1e3d6ad1d56302c9c058f8bc5826dcfe6c46fb3e0ddaa06818645039020_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-console-plugin-rhel9@sha256:ffb2acd9ae09c1ef9ca756f5eaf6087d0a3957cfc824543949d25f556a97744d_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-dpdk-checkup-rhel9@sha256:525aceb9396010ebcdba14040f267889b807cd84db8e5b4030429b51f0fbf5fe_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-dpdk-checkup-rhel9@sha256:553c4686f56c66cc1e3c5ad9d4051f139d43f821eac3abb98ca5cdb8b5dfe202_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-ssp-operator-rhel9@sha256:901e6cad9534c7bd7c4018c60bccfe49d7280fba5a9901ab4c4d15e9345288c4_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-ssp-operator-rhel9@sha256:badeb0f65f543b209f6af761729d9778b7b73b97d55044016dfba3f38a1f6f18_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-cleanup-vm-rhel9@sha256:28e4975fa4dac22d9da32ed2a10aed039fd957b30140daa36bab2caa998be77a_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-cleanup-vm-rhel9@sha256:b0ff7e812a576ea848590655fc13a85832d5a39f68e7769ceab9da6949da88c7_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-copy-template-rhel9@sha256:4916a6c6b1f9b529187d3b4d5fc99b90157993767b3fe2ad36a9ec77fbb46b10_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-copy-template-rhel9@sha256:f71c36442f1b61cdde7ec58d2c3c78d2039f6d6108e6c35388ef7c1650971fa1_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-create-datavolume-rhel9@sha256:2ad49cf6e2242a9e5861929d9bcab1305a7fc4e34e708f99cff1d7253aa46167_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-create-datavolume-rhel9@sha256:7112400a4ecb23ee2110bf96372fcf9f96ad648a51aa944627b40eb59539a660_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-create-vm-from-template-rhel9@sha256:1411c65bbad7302710788327f6964a4bf5bc20ef70d5e46f4a5c6e7a0e7a0161_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-create-vm-from-template-rhel9@sha256:4d962618aa95600c60c9fc8b890186e510de91177d51949e12797a3558e31328_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-customize-rhel9@sha256:5c23d3f20ea9dcbe7109284d73078ecd516a070e964b844f8d80b1d92ebd55ee_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-customize-rhel9@sha256:a780244e48c6d4f87446d3754c3eb9ab79c0d54675c189da4a659f7a4d5668ea_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-sysprep-rhel9@sha256:84577d949a1bbcaa291c70729127bca4a8994df03068666baa23840877ea8392_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-sysprep-rhel9@sha256:aed630a597a090179e1b0e0c117e536df06b67d0f793f91936aa7388c0c5d7eb_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-modify-vm-template-rhel9@sha256:31d959b80cf57462e1705684bb7e1b78af26bd2c62f1c9e4e51e1d02199b05a8_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-modify-vm-template-rhel9@sha256:66aea526bc10e4c0136ba86e394bbdfe4fbd7f757d6f391a561b51d2ba2f4d46_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-operator-rhel9@sha256:d0cf0e81589f0938de45961eaddfc5ec4782738fd11082de0439b200534259eb_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-operator-rhel9@sha256:f1b1f5044db6bb945584f9d4f31d020597725a286ef368ed0aca2116abb31beb_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-wait-for-vmi-status-rhel9@sha256:39a15d03f113735df03b1a7408227eb9604d942c1f3c1992bcdc7eaf07662711_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-wait-for-vmi-status-rhel9@sha256:afb68af076954fcd18c7a4a1464ea0c2a766e8282eae980051906ed07eaa1707_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-template-validator-rhel9@sha256:02b22c7e7014b5e72d47fed8b6a268cf307638c5510adf3916c51f7f40a52a08_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-template-validator-rhel9@sha256:c0264b9271e602f85b2040ef7f207cdfa46038dc4fa6e4738bf196ef88a71cf8_amd64",
"9Base-CNV-4.13:container-native-virtualization/libguestfs-tools-rhel9@sha256:29ae84575bbca24553cf649256759fd96ff286971d80bc2db129154a7df9b283_amd64",
"9Base-CNV-4.13:container-native-virtualization/libguestfs-tools-rhel9@sha256:6558f60343e068b032167e2340b2c549c5f0258acc5d2614b60966ce79408b01_arm64",
"9Base-CNV-4.13:container-native-virtualization/multus-dynamic-networks-rhel9@sha256:3ecb0162a4b01d1590bf209d717b32a4f0835910d9979823f18c24acba41b503_arm64",
"9Base-CNV-4.13:container-native-virtualization/multus-dynamic-networks-rhel9@sha256:b7f68b6420009e21380d32d6459193aae45e93be9533debe17cb3108571b36b8_amd64",
"9Base-CNV-4.13:container-native-virtualization/ovs-cni-plugin-rhel9@sha256:0f1d372f418744e0aff59ecb0a38f53178aac9c2e9eecfd38aa25ed83e0d1360_arm64",
"9Base-CNV-4.13:container-native-virtualization/ovs-cni-plugin-rhel9@sha256:e8e7a44edbf1713fe74de5c4b8f691cce78f4440c4a32a16ba9ad16694a55396_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-api-rhel9@sha256:e68416321ca8c74a547b3d35897f54813c03481143e402e9bdc4daf315e35b5d_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-api-rhel9@sha256:fdb4ca1bb8b310d713d9c7e88f7d091f4460aa942dbeca5ebcf17281a06daffe_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-artifacts-server-rhel9@sha256:33d11c1832b49df39c1fca62bad40dbc5c30a452248339aaef449ac99509accb_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-artifacts-server-rhel9@sha256:81fc61b714baecb5a89fa6c0749c14566e0661b8e184ca602fc2e03b9cf431ee_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-apiserver-rhel9@sha256:f6128a63344ed2129f5bce648ddcfaa2869d31cde4b93328d3c22534b97ade10_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-apiserver-rhel9@sha256:feca273a691d09445c6cff6d36b5d590735e867656a9898ce0d89744d98e8006_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-cloner-rhel9@sha256:68e3b9b0291b4fb277ac430269ffce11d13b0a7688cf2ffcdb7f98759c36b4db_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-cloner-rhel9@sha256:6ac212767481bef64d8a7d0252bb8089c0f9751fad4a355aef71bd49dad2ad07_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-controller-rhel9@sha256:65f5263275d9f0a12b8fb057d82adf678778039ec873ca9bde182dea3413c9f1_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-controller-rhel9@sha256:d9e62b2019328be258489ac852eef25f8b1233f29abac6bcea5b406329f97fed_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-importer-rhel9@sha256:00a6d9d24ca1466d450b02269ec3144fc7550f0e5c696e869fbf7ce10cae6093_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-importer-rhel9@sha256:2df07fb21a3575e74aa16ded20129828f2300cd33e8ab369b0362062d49e62d0_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-operator-rhel9@sha256:20ec064750faedd97d11b797c8c1d9a1db5d60d7d76e82e65cfd05eb79d65e29_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-operator-rhel9@sha256:802ee8923d9d8e406b23911406f9748756c0ef4d6954e9e2fd5fb4bdf91dde9a_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-uploadproxy-rhel9@sha256:392d0f61f462c707adfdc21e4239c5c09d8520a80486b41d9d9ae479267d6124_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-uploadproxy-rhel9@sha256:6775f34353eec8f35bead9411dde155530d079bb8d51582fb1f2aacc27dbde1d_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-uploadserver-rhel9@sha256:4528c24672689cfb6505761b6b108fbcc04488192733f23d2bfe39cd42a1d743_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-uploadserver-rhel9@sha256:b22048390387380af94e267c8a9a66813c515997456d59d8ebac1486916b6585_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-controller-rhel9@sha256:3e7880149ee9a68286e390beb3d9779f7403c30fc5136e5370e0e4690a3fd243_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-controller-rhel9@sha256:970edc281d7a731e9f7e8c2d4440fe48a221e5e355d5235c5413b4c3adb28503_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-exportproxy-rhel9@sha256:1bda34d5bff734ad997202f29a5ff6f7362fd79fa90511a422442ef2e3681198_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-exportproxy-rhel9@sha256:de3c4afbf7669b98517cbef2490ec186f0553dd97b05bed80ec36dd883fe507b_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-exportserver-rhel9@sha256:3f7f98645176d42c63cca5c0fc3182a03121af87446ca421b6c72baf07dfca0d_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-exportserver-rhel9@sha256:8f12955cd777eb2409037a6968aa92f50c99d6e07e722951dbcfd0c8c9829b5e_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-handler-rhel9@sha256:5fc47110d866d8048aec50689090ce10705d19d3bb48d2b06727d6d569003af7_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-handler-rhel9@sha256:84ba79ae9658699147d2493df2582ab6df10adbff4d44a533c3fe6a9f45f9691_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-launcher-rhel9@sha256:4990d40d9987d5126d105dd45be2501eaded248cb61bdde5ea8d359bc1e7ebef_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-launcher-rhel9@sha256:95aeacb98209e0baef27ce0e02fbac38d693cea74808fc77107efda0f344bcb5_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-operator-rhel9@sha256:5c1a7e4ed2061938987b900a2394f07121d4037350c9bb6485213a2adfea787d_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-operator-rhel9@sha256:66b1b3b379121d6411ba22283e7d991617177330c93746d37753ab7812b9a00b_arm64",
"9Base-CNV-4.13:container-native-virtualization/virtio-win-rhel9@sha256:8735f51da918408a8826601c082d1b29accf26d59b9978da89b980cb509c1102_arm64",
"9Base-CNV-4.13:container-native-virtualization/virtio-win-rhel9@sha256:d147d2a6eb6f907d1e88f61aaca83596853bc72164583d6dda2b1154b490de25_amd64",
"9Base-CNV-4.13:container-native-virtualization/vm-console-proxy-rhel9@sha256:70a8d0cd66182c25e02679540bae1368b2a9cf687532b58dba41ef30c5ca00c1_arm64",
"9Base-CNV-4.13:container-native-virtualization/vm-console-proxy-rhel9@sha256:7ca921f98f6d81a126907127a611146fb53397869a628678faa1e289c01d22b2_amd64",
"9Base-CNV-4.13:container-native-virtualization/vm-network-latency-checkup-rhel9@sha256:503ea7ac914a9b54e9d665a0227ee0b5d5200cdb5d692aa94c07dd1518d91b70_arm64",
"9Base-CNV-4.13:container-native-virtualization/vm-network-latency-checkup-rhel9@sha256:59fd965975bccf641a0fa7aa01374d45057bd03cda7528248a84b60b1205bf57_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "golang: golang.org/x/text/language: ParseAcceptLanguage takes a long time to parse complex tags"
},
{
"cve": "CVE-2022-32189",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"discovery_date": "2022-08-02T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"9Base-CNV-4.13:container-native-virtualization/bridge-marker-rhel9@sha256:8eac196b30a648989cdca5cb153a3bc3d34e47339acba0e4f760bd366496c99d_amd64",
"9Base-CNV-4.13:container-native-virtualization/bridge-marker-rhel9@sha256:e8a55aee3d75a316bb0d7a554c737198823df04b3c05e481c17e45eb2153bced_arm64",
"9Base-CNV-4.13:container-native-virtualization/cluster-network-addons-operator-rhel9@sha256:3bff33e3f40cd1e2b519c2db56734d4bb8df883e155c2f20b1cb9d3d184daec1_amd64",
"9Base-CNV-4.13:container-native-virtualization/cluster-network-addons-operator-rhel9@sha256:f439d2f420bb59eb1d5af14ce2002648d0cfc155d1a1466c8aac9b661fe902b8_arm64",
"9Base-CNV-4.13:container-native-virtualization/cnv-containernetworking-plugins-rhel9@sha256:89f22e541f61a660c9aa9f38ef58e80b84a0517f74e84292107fc252c25465c9_arm64",
"9Base-CNV-4.13:container-native-virtualization/cnv-containernetworking-plugins-rhel9@sha256:bf471997e54e4a75b0d71f492ab295787fdbb14d8c85c4ea8c03f0552dbc3755_amd64",
"9Base-CNV-4.13:container-native-virtualization/cnv-must-gather-rhel9@sha256:9e8efd76924958eb605401abdac08eba97fb83a1ada383bc87a7fb7c87b3a455_arm64",
"9Base-CNV-4.13:container-native-virtualization/cnv-must-gather-rhel9@sha256:b9fc32b5fabedd65a4c3a471879c808af2087277de4278adaa115a732f0468da_amd64",
"9Base-CNV-4.13:container-native-virtualization/hco-bundle-registry-rhel9@sha256:60e89d7a99ff9f20e974430b802dd724a3bb6fa1e01e5a62daad98ac487b3063_amd64",
"9Base-CNV-4.13:container-native-virtualization/hco-bundle-registry-rhel9@sha256:dd20b138045ef1424d83a47e7abcfcbb2ac54577dcec5ed3c186390aaa4c9d84_arm64",
"9Base-CNV-4.13:container-native-virtualization/hostpath-csi-driver-rhel9@sha256:61e2824853d51347593ad909a5e546cd92e4216d6a1df5dffb50dd9cba277cce_amd64",
"9Base-CNV-4.13:container-native-virtualization/hostpath-csi-driver-rhel9@sha256:676d4c23a5f60dd331728af056b0a6b2d3358ac88da23299b1a98dfaca8f288e_arm64",
"9Base-CNV-4.13:container-native-virtualization/hostpath-provisioner-operator-rhel9@sha256:515be94be496c67f5b8fd5f4832fe4385e56476e6589897d6b9fbb9bb2b00f32_amd64",
"9Base-CNV-4.13:container-native-virtualization/hostpath-provisioner-operator-rhel9@sha256:571ae805641dea11646028c946039983c7fd82f138b915dcb8b80c39b465e63c_arm64",
"9Base-CNV-4.13:container-native-virtualization/hostpath-provisioner-rhel9@sha256:ac3fe350bedd6bc43596444ba0f279ccf8a144ab14ac5a9b80ea71c46390b7b4_amd64",
"9Base-CNV-4.13:container-native-virtualization/hostpath-provisioner-rhel9@sha256:d4ed87745b7ee2acca2d83e2c91c2f6dced1903c81495b50f2559b3ba2dde287_arm64",
"9Base-CNV-4.13:container-native-virtualization/hyperconverged-cluster-operator-rhel9@sha256:e5ab9f3be59d3568e3d672ab374efb16990ccf92192eac4e1244b10fcd7423e2_amd64",
"9Base-CNV-4.13:container-native-virtualization/hyperconverged-cluster-operator-rhel9@sha256:e681560b184189df03fc84c8a712f32289f42573dd348cda394b19565eb6eca8_arm64",
"9Base-CNV-4.13:container-native-virtualization/hyperconverged-cluster-webhook-rhel9@sha256:06d036d320b3027bb8370bb8e0f6fe8c9f0ec9bca7aac3b5c53698ba4a170042_arm64",
"9Base-CNV-4.13:container-native-virtualization/hyperconverged-cluster-webhook-rhel9@sha256:b5a01336180aad017df62cf8e652f2491b8263ba7e4dd07f858db1ef1924cf2f_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubemacpool-rhel9@sha256:4d190d81eeb3fbe9ed56cf3548dc83a3f81641bfdafa7b42dcfb0d2512566644_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubemacpool-rhel9@sha256:59862a59854f0d5b83dc25ba119f9586a8aff42b6e60d1922f8ae7b4567309ff_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubesecondarydns-rhel9@sha256:121d30d78cc57731ea2242ef2c32430890ac66c2723e65608d5e2f26c3f515cd_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubesecondarydns-rhel9@sha256:b1838f3c8ba3d8113bddea17b78c21e1c1490e2a4a07ea77014edee523d06347_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-console-plugin-rhel9@sha256:86a4b1e3d6ad1d56302c9c058f8bc5826dcfe6c46fb3e0ddaa06818645039020_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-console-plugin-rhel9@sha256:ffb2acd9ae09c1ef9ca756f5eaf6087d0a3957cfc824543949d25f556a97744d_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-dpdk-checkup-rhel9@sha256:525aceb9396010ebcdba14040f267889b807cd84db8e5b4030429b51f0fbf5fe_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-dpdk-checkup-rhel9@sha256:553c4686f56c66cc1e3c5ad9d4051f139d43f821eac3abb98ca5cdb8b5dfe202_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-ssp-operator-rhel9@sha256:901e6cad9534c7bd7c4018c60bccfe49d7280fba5a9901ab4c4d15e9345288c4_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-ssp-operator-rhel9@sha256:badeb0f65f543b209f6af761729d9778b7b73b97d55044016dfba3f38a1f6f18_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-cleanup-vm-rhel9@sha256:28e4975fa4dac22d9da32ed2a10aed039fd957b30140daa36bab2caa998be77a_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-cleanup-vm-rhel9@sha256:b0ff7e812a576ea848590655fc13a85832d5a39f68e7769ceab9da6949da88c7_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-copy-template-rhel9@sha256:4916a6c6b1f9b529187d3b4d5fc99b90157993767b3fe2ad36a9ec77fbb46b10_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-copy-template-rhel9@sha256:f71c36442f1b61cdde7ec58d2c3c78d2039f6d6108e6c35388ef7c1650971fa1_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-create-datavolume-rhel9@sha256:2ad49cf6e2242a9e5861929d9bcab1305a7fc4e34e708f99cff1d7253aa46167_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-create-datavolume-rhel9@sha256:7112400a4ecb23ee2110bf96372fcf9f96ad648a51aa944627b40eb59539a660_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-create-vm-from-template-rhel9@sha256:1411c65bbad7302710788327f6964a4bf5bc20ef70d5e46f4a5c6e7a0e7a0161_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-create-vm-from-template-rhel9@sha256:4d962618aa95600c60c9fc8b890186e510de91177d51949e12797a3558e31328_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-customize-rhel9@sha256:5c23d3f20ea9dcbe7109284d73078ecd516a070e964b844f8d80b1d92ebd55ee_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-customize-rhel9@sha256:a780244e48c6d4f87446d3754c3eb9ab79c0d54675c189da4a659f7a4d5668ea_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-sysprep-rhel9@sha256:84577d949a1bbcaa291c70729127bca4a8994df03068666baa23840877ea8392_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-sysprep-rhel9@sha256:aed630a597a090179e1b0e0c117e536df06b67d0f793f91936aa7388c0c5d7eb_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-modify-vm-template-rhel9@sha256:31d959b80cf57462e1705684bb7e1b78af26bd2c62f1c9e4e51e1d02199b05a8_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-modify-vm-template-rhel9@sha256:66aea526bc10e4c0136ba86e394bbdfe4fbd7f757d6f391a561b51d2ba2f4d46_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-operator-rhel9@sha256:d0cf0e81589f0938de45961eaddfc5ec4782738fd11082de0439b200534259eb_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-operator-rhel9@sha256:f1b1f5044db6bb945584f9d4f31d020597725a286ef368ed0aca2116abb31beb_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-wait-for-vmi-status-rhel9@sha256:39a15d03f113735df03b1a7408227eb9604d942c1f3c1992bcdc7eaf07662711_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-wait-for-vmi-status-rhel9@sha256:afb68af076954fcd18c7a4a1464ea0c2a766e8282eae980051906ed07eaa1707_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-template-validator-rhel9@sha256:02b22c7e7014b5e72d47fed8b6a268cf307638c5510adf3916c51f7f40a52a08_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-template-validator-rhel9@sha256:c0264b9271e602f85b2040ef7f207cdfa46038dc4fa6e4738bf196ef88a71cf8_amd64",
"9Base-CNV-4.13:container-native-virtualization/libguestfs-tools-rhel9@sha256:29ae84575bbca24553cf649256759fd96ff286971d80bc2db129154a7df9b283_amd64",
"9Base-CNV-4.13:container-native-virtualization/libguestfs-tools-rhel9@sha256:6558f60343e068b032167e2340b2c549c5f0258acc5d2614b60966ce79408b01_arm64",
"9Base-CNV-4.13:container-native-virtualization/multus-dynamic-networks-rhel9@sha256:3ecb0162a4b01d1590bf209d717b32a4f0835910d9979823f18c24acba41b503_arm64",
"9Base-CNV-4.13:container-native-virtualization/multus-dynamic-networks-rhel9@sha256:b7f68b6420009e21380d32d6459193aae45e93be9533debe17cb3108571b36b8_amd64",
"9Base-CNV-4.13:container-native-virtualization/ovs-cni-plugin-rhel9@sha256:0f1d372f418744e0aff59ecb0a38f53178aac9c2e9eecfd38aa25ed83e0d1360_arm64",
"9Base-CNV-4.13:container-native-virtualization/ovs-cni-plugin-rhel9@sha256:e8e7a44edbf1713fe74de5c4b8f691cce78f4440c4a32a16ba9ad16694a55396_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-artifacts-server-rhel9@sha256:33d11c1832b49df39c1fca62bad40dbc5c30a452248339aaef449ac99509accb_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-artifacts-server-rhel9@sha256:81fc61b714baecb5a89fa6c0749c14566e0661b8e184ca602fc2e03b9cf431ee_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-apiserver-rhel9@sha256:f6128a63344ed2129f5bce648ddcfaa2869d31cde4b93328d3c22534b97ade10_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-apiserver-rhel9@sha256:feca273a691d09445c6cff6d36b5d590735e867656a9898ce0d89744d98e8006_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-cloner-rhel9@sha256:68e3b9b0291b4fb277ac430269ffce11d13b0a7688cf2ffcdb7f98759c36b4db_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-cloner-rhel9@sha256:6ac212767481bef64d8a7d0252bb8089c0f9751fad4a355aef71bd49dad2ad07_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-controller-rhel9@sha256:65f5263275d9f0a12b8fb057d82adf678778039ec873ca9bde182dea3413c9f1_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-controller-rhel9@sha256:d9e62b2019328be258489ac852eef25f8b1233f29abac6bcea5b406329f97fed_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-importer-rhel9@sha256:00a6d9d24ca1466d450b02269ec3144fc7550f0e5c696e869fbf7ce10cae6093_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-importer-rhel9@sha256:2df07fb21a3575e74aa16ded20129828f2300cd33e8ab369b0362062d49e62d0_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-operator-rhel9@sha256:20ec064750faedd97d11b797c8c1d9a1db5d60d7d76e82e65cfd05eb79d65e29_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-operator-rhel9@sha256:802ee8923d9d8e406b23911406f9748756c0ef4d6954e9e2fd5fb4bdf91dde9a_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-uploadproxy-rhel9@sha256:392d0f61f462c707adfdc21e4239c5c09d8520a80486b41d9d9ae479267d6124_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-uploadproxy-rhel9@sha256:6775f34353eec8f35bead9411dde155530d079bb8d51582fb1f2aacc27dbde1d_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-uploadserver-rhel9@sha256:4528c24672689cfb6505761b6b108fbcc04488192733f23d2bfe39cd42a1d743_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-uploadserver-rhel9@sha256:b22048390387380af94e267c8a9a66813c515997456d59d8ebac1486916b6585_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-controller-rhel9@sha256:3e7880149ee9a68286e390beb3d9779f7403c30fc5136e5370e0e4690a3fd243_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-controller-rhel9@sha256:970edc281d7a731e9f7e8c2d4440fe48a221e5e355d5235c5413b4c3adb28503_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-exportproxy-rhel9@sha256:1bda34d5bff734ad997202f29a5ff6f7362fd79fa90511a422442ef2e3681198_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-exportproxy-rhel9@sha256:de3c4afbf7669b98517cbef2490ec186f0553dd97b05bed80ec36dd883fe507b_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-exportserver-rhel9@sha256:3f7f98645176d42c63cca5c0fc3182a03121af87446ca421b6c72baf07dfca0d_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-exportserver-rhel9@sha256:8f12955cd777eb2409037a6968aa92f50c99d6e07e722951dbcfd0c8c9829b5e_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-handler-rhel9@sha256:5fc47110d866d8048aec50689090ce10705d19d3bb48d2b06727d6d569003af7_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-handler-rhel9@sha256:84ba79ae9658699147d2493df2582ab6df10adbff4d44a533c3fe6a9f45f9691_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-launcher-rhel9@sha256:4990d40d9987d5126d105dd45be2501eaded248cb61bdde5ea8d359bc1e7ebef_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-launcher-rhel9@sha256:95aeacb98209e0baef27ce0e02fbac38d693cea74808fc77107efda0f344bcb5_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-operator-rhel9@sha256:5c1a7e4ed2061938987b900a2394f07121d4037350c9bb6485213a2adfea787d_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-operator-rhel9@sha256:66b1b3b379121d6411ba22283e7d991617177330c93746d37753ab7812b9a00b_arm64",
"9Base-CNV-4.13:container-native-virtualization/virtio-win-rhel9@sha256:8735f51da918408a8826601c082d1b29accf26d59b9978da89b980cb509c1102_arm64",
"9Base-CNV-4.13:container-native-virtualization/virtio-win-rhel9@sha256:d147d2a6eb6f907d1e88f61aaca83596853bc72164583d6dda2b1154b490de25_amd64",
"9Base-CNV-4.13:container-native-virtualization/vm-console-proxy-rhel9@sha256:70a8d0cd66182c25e02679540bae1368b2a9cf687532b58dba41ef30c5ca00c1_arm64",
"9Base-CNV-4.13:container-native-virtualization/vm-console-proxy-rhel9@sha256:7ca921f98f6d81a126907127a611146fb53397869a628678faa1e289c01d22b2_amd64",
"9Base-CNV-4.13:container-native-virtualization/vm-network-latency-checkup-rhel9@sha256:503ea7ac914a9b54e9d665a0227ee0b5d5200cdb5d692aa94c07dd1518d91b70_arm64",
"9Base-CNV-4.13:container-native-virtualization/vm-network-latency-checkup-rhel9@sha256:59fd965975bccf641a0fa7aa01374d45057bd03cda7528248a84b60b1205bf57_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2113814"
}
],
"notes": [
{
"category": "description",
"text": "An uncontrolled resource consumption flaw was found in Golang math/big. A too-short encoded message can cause a panic in Float.GobDecode and Rat.GobDecode in math/big in Go, potentially allowing an attacker to create a denial of service, impacting availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: math/big: decoding big.Float and big.Rat types can panic if the encoded message is too short, potentially allowing a denial of service",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This flaw stems from a particular and specific method (GoBDecode) which isn\u0027t commonly used. There are few components within Red Hat offerings which call this function. In rare cases where this method is called, the component limits possible damage or it is not possible to be triggered by an attacker. For these combined reasons the impact has been downgraded to Low.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"9Base-CNV-4.13:container-native-virtualization/virt-api-rhel9@sha256:e68416321ca8c74a547b3d35897f54813c03481143e402e9bdc4daf315e35b5d_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-api-rhel9@sha256:fdb4ca1bb8b310d713d9c7e88f7d091f4460aa942dbeca5ebcf17281a06daffe_amd64"
],
"known_not_affected": [
"9Base-CNV-4.13:container-native-virtualization/bridge-marker-rhel9@sha256:8eac196b30a648989cdca5cb153a3bc3d34e47339acba0e4f760bd366496c99d_amd64",
"9Base-CNV-4.13:container-native-virtualization/bridge-marker-rhel9@sha256:e8a55aee3d75a316bb0d7a554c737198823df04b3c05e481c17e45eb2153bced_arm64",
"9Base-CNV-4.13:container-native-virtualization/cluster-network-addons-operator-rhel9@sha256:3bff33e3f40cd1e2b519c2db56734d4bb8df883e155c2f20b1cb9d3d184daec1_amd64",
"9Base-CNV-4.13:container-native-virtualization/cluster-network-addons-operator-rhel9@sha256:f439d2f420bb59eb1d5af14ce2002648d0cfc155d1a1466c8aac9b661fe902b8_arm64",
"9Base-CNV-4.13:container-native-virtualization/cnv-containernetworking-plugins-rhel9@sha256:89f22e541f61a660c9aa9f38ef58e80b84a0517f74e84292107fc252c25465c9_arm64",
"9Base-CNV-4.13:container-native-virtualization/cnv-containernetworking-plugins-rhel9@sha256:bf471997e54e4a75b0d71f492ab295787fdbb14d8c85c4ea8c03f0552dbc3755_amd64",
"9Base-CNV-4.13:container-native-virtualization/cnv-must-gather-rhel9@sha256:9e8efd76924958eb605401abdac08eba97fb83a1ada383bc87a7fb7c87b3a455_arm64",
"9Base-CNV-4.13:container-native-virtualization/cnv-must-gather-rhel9@sha256:b9fc32b5fabedd65a4c3a471879c808af2087277de4278adaa115a732f0468da_amd64",
"9Base-CNV-4.13:container-native-virtualization/hco-bundle-registry-rhel9@sha256:60e89d7a99ff9f20e974430b802dd724a3bb6fa1e01e5a62daad98ac487b3063_amd64",
"9Base-CNV-4.13:container-native-virtualization/hco-bundle-registry-rhel9@sha256:dd20b138045ef1424d83a47e7abcfcbb2ac54577dcec5ed3c186390aaa4c9d84_arm64",
"9Base-CNV-4.13:container-native-virtualization/hostpath-csi-driver-rhel9@sha256:61e2824853d51347593ad909a5e546cd92e4216d6a1df5dffb50dd9cba277cce_amd64",
"9Base-CNV-4.13:container-native-virtualization/hostpath-csi-driver-rhel9@sha256:676d4c23a5f60dd331728af056b0a6b2d3358ac88da23299b1a98dfaca8f288e_arm64",
"9Base-CNV-4.13:container-native-virtualization/hostpath-provisioner-operator-rhel9@sha256:515be94be496c67f5b8fd5f4832fe4385e56476e6589897d6b9fbb9bb2b00f32_amd64",
"9Base-CNV-4.13:container-native-virtualization/hostpath-provisioner-operator-rhel9@sha256:571ae805641dea11646028c946039983c7fd82f138b915dcb8b80c39b465e63c_arm64",
"9Base-CNV-4.13:container-native-virtualization/hostpath-provisioner-rhel9@sha256:ac3fe350bedd6bc43596444ba0f279ccf8a144ab14ac5a9b80ea71c46390b7b4_amd64",
"9Base-CNV-4.13:container-native-virtualization/hostpath-provisioner-rhel9@sha256:d4ed87745b7ee2acca2d83e2c91c2f6dced1903c81495b50f2559b3ba2dde287_arm64",
"9Base-CNV-4.13:container-native-virtualization/hyperconverged-cluster-operator-rhel9@sha256:e5ab9f3be59d3568e3d672ab374efb16990ccf92192eac4e1244b10fcd7423e2_amd64",
"9Base-CNV-4.13:container-native-virtualization/hyperconverged-cluster-operator-rhel9@sha256:e681560b184189df03fc84c8a712f32289f42573dd348cda394b19565eb6eca8_arm64",
"9Base-CNV-4.13:container-native-virtualization/hyperconverged-cluster-webhook-rhel9@sha256:06d036d320b3027bb8370bb8e0f6fe8c9f0ec9bca7aac3b5c53698ba4a170042_arm64",
"9Base-CNV-4.13:container-native-virtualization/hyperconverged-cluster-webhook-rhel9@sha256:b5a01336180aad017df62cf8e652f2491b8263ba7e4dd07f858db1ef1924cf2f_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubemacpool-rhel9@sha256:4d190d81eeb3fbe9ed56cf3548dc83a3f81641bfdafa7b42dcfb0d2512566644_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubemacpool-rhel9@sha256:59862a59854f0d5b83dc25ba119f9586a8aff42b6e60d1922f8ae7b4567309ff_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubesecondarydns-rhel9@sha256:121d30d78cc57731ea2242ef2c32430890ac66c2723e65608d5e2f26c3f515cd_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubesecondarydns-rhel9@sha256:b1838f3c8ba3d8113bddea17b78c21e1c1490e2a4a07ea77014edee523d06347_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-console-plugin-rhel9@sha256:86a4b1e3d6ad1d56302c9c058f8bc5826dcfe6c46fb3e0ddaa06818645039020_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-console-plugin-rhel9@sha256:ffb2acd9ae09c1ef9ca756f5eaf6087d0a3957cfc824543949d25f556a97744d_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-dpdk-checkup-rhel9@sha256:525aceb9396010ebcdba14040f267889b807cd84db8e5b4030429b51f0fbf5fe_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-dpdk-checkup-rhel9@sha256:553c4686f56c66cc1e3c5ad9d4051f139d43f821eac3abb98ca5cdb8b5dfe202_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-ssp-operator-rhel9@sha256:901e6cad9534c7bd7c4018c60bccfe49d7280fba5a9901ab4c4d15e9345288c4_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-ssp-operator-rhel9@sha256:badeb0f65f543b209f6af761729d9778b7b73b97d55044016dfba3f38a1f6f18_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-cleanup-vm-rhel9@sha256:28e4975fa4dac22d9da32ed2a10aed039fd957b30140daa36bab2caa998be77a_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-cleanup-vm-rhel9@sha256:b0ff7e812a576ea848590655fc13a85832d5a39f68e7769ceab9da6949da88c7_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-copy-template-rhel9@sha256:4916a6c6b1f9b529187d3b4d5fc99b90157993767b3fe2ad36a9ec77fbb46b10_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-copy-template-rhel9@sha256:f71c36442f1b61cdde7ec58d2c3c78d2039f6d6108e6c35388ef7c1650971fa1_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-create-datavolume-rhel9@sha256:2ad49cf6e2242a9e5861929d9bcab1305a7fc4e34e708f99cff1d7253aa46167_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-create-datavolume-rhel9@sha256:7112400a4ecb23ee2110bf96372fcf9f96ad648a51aa944627b40eb59539a660_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-create-vm-from-template-rhel9@sha256:1411c65bbad7302710788327f6964a4bf5bc20ef70d5e46f4a5c6e7a0e7a0161_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-create-vm-from-template-rhel9@sha256:4d962618aa95600c60c9fc8b890186e510de91177d51949e12797a3558e31328_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-customize-rhel9@sha256:5c23d3f20ea9dcbe7109284d73078ecd516a070e964b844f8d80b1d92ebd55ee_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-customize-rhel9@sha256:a780244e48c6d4f87446d3754c3eb9ab79c0d54675c189da4a659f7a4d5668ea_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-sysprep-rhel9@sha256:84577d949a1bbcaa291c70729127bca4a8994df03068666baa23840877ea8392_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-sysprep-rhel9@sha256:aed630a597a090179e1b0e0c117e536df06b67d0f793f91936aa7388c0c5d7eb_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-modify-vm-template-rhel9@sha256:31d959b80cf57462e1705684bb7e1b78af26bd2c62f1c9e4e51e1d02199b05a8_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-modify-vm-template-rhel9@sha256:66aea526bc10e4c0136ba86e394bbdfe4fbd7f757d6f391a561b51d2ba2f4d46_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-operator-rhel9@sha256:d0cf0e81589f0938de45961eaddfc5ec4782738fd11082de0439b200534259eb_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-operator-rhel9@sha256:f1b1f5044db6bb945584f9d4f31d020597725a286ef368ed0aca2116abb31beb_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-wait-for-vmi-status-rhel9@sha256:39a15d03f113735df03b1a7408227eb9604d942c1f3c1992bcdc7eaf07662711_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-wait-for-vmi-status-rhel9@sha256:afb68af076954fcd18c7a4a1464ea0c2a766e8282eae980051906ed07eaa1707_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-template-validator-rhel9@sha256:02b22c7e7014b5e72d47fed8b6a268cf307638c5510adf3916c51f7f40a52a08_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-template-validator-rhel9@sha256:c0264b9271e602f85b2040ef7f207cdfa46038dc4fa6e4738bf196ef88a71cf8_amd64",
"9Base-CNV-4.13:container-native-virtualization/libguestfs-tools-rhel9@sha256:29ae84575bbca24553cf649256759fd96ff286971d80bc2db129154a7df9b283_amd64",
"9Base-CNV-4.13:container-native-virtualization/libguestfs-tools-rhel9@sha256:6558f60343e068b032167e2340b2c549c5f0258acc5d2614b60966ce79408b01_arm64",
"9Base-CNV-4.13:container-native-virtualization/multus-dynamic-networks-rhel9@sha256:3ecb0162a4b01d1590bf209d717b32a4f0835910d9979823f18c24acba41b503_arm64",
"9Base-CNV-4.13:container-native-virtualization/multus-dynamic-networks-rhel9@sha256:b7f68b6420009e21380d32d6459193aae45e93be9533debe17cb3108571b36b8_amd64",
"9Base-CNV-4.13:container-native-virtualization/ovs-cni-plugin-rhel9@sha256:0f1d372f418744e0aff59ecb0a38f53178aac9c2e9eecfd38aa25ed83e0d1360_arm64",
"9Base-CNV-4.13:container-native-virtualization/ovs-cni-plugin-rhel9@sha256:e8e7a44edbf1713fe74de5c4b8f691cce78f4440c4a32a16ba9ad16694a55396_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-artifacts-server-rhel9@sha256:33d11c1832b49df39c1fca62bad40dbc5c30a452248339aaef449ac99509accb_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-artifacts-server-rhel9@sha256:81fc61b714baecb5a89fa6c0749c14566e0661b8e184ca602fc2e03b9cf431ee_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-apiserver-rhel9@sha256:f6128a63344ed2129f5bce648ddcfaa2869d31cde4b93328d3c22534b97ade10_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-apiserver-rhel9@sha256:feca273a691d09445c6cff6d36b5d590735e867656a9898ce0d89744d98e8006_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-cloner-rhel9@sha256:68e3b9b0291b4fb277ac430269ffce11d13b0a7688cf2ffcdb7f98759c36b4db_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-cloner-rhel9@sha256:6ac212767481bef64d8a7d0252bb8089c0f9751fad4a355aef71bd49dad2ad07_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-controller-rhel9@sha256:65f5263275d9f0a12b8fb057d82adf678778039ec873ca9bde182dea3413c9f1_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-controller-rhel9@sha256:d9e62b2019328be258489ac852eef25f8b1233f29abac6bcea5b406329f97fed_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-importer-rhel9@sha256:00a6d9d24ca1466d450b02269ec3144fc7550f0e5c696e869fbf7ce10cae6093_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-importer-rhel9@sha256:2df07fb21a3575e74aa16ded20129828f2300cd33e8ab369b0362062d49e62d0_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-operator-rhel9@sha256:20ec064750faedd97d11b797c8c1d9a1db5d60d7d76e82e65cfd05eb79d65e29_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-operator-rhel9@sha256:802ee8923d9d8e406b23911406f9748756c0ef4d6954e9e2fd5fb4bdf91dde9a_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-uploadproxy-rhel9@sha256:392d0f61f462c707adfdc21e4239c5c09d8520a80486b41d9d9ae479267d6124_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-uploadproxy-rhel9@sha256:6775f34353eec8f35bead9411dde155530d079bb8d51582fb1f2aacc27dbde1d_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-uploadserver-rhel9@sha256:4528c24672689cfb6505761b6b108fbcc04488192733f23d2bfe39cd42a1d743_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-uploadserver-rhel9@sha256:b22048390387380af94e267c8a9a66813c515997456d59d8ebac1486916b6585_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-controller-rhel9@sha256:3e7880149ee9a68286e390beb3d9779f7403c30fc5136e5370e0e4690a3fd243_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-controller-rhel9@sha256:970edc281d7a731e9f7e8c2d4440fe48a221e5e355d5235c5413b4c3adb28503_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-exportproxy-rhel9@sha256:1bda34d5bff734ad997202f29a5ff6f7362fd79fa90511a422442ef2e3681198_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-exportproxy-rhel9@sha256:de3c4afbf7669b98517cbef2490ec186f0553dd97b05bed80ec36dd883fe507b_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-exportserver-rhel9@sha256:3f7f98645176d42c63cca5c0fc3182a03121af87446ca421b6c72baf07dfca0d_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-exportserver-rhel9@sha256:8f12955cd777eb2409037a6968aa92f50c99d6e07e722951dbcfd0c8c9829b5e_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-handler-rhel9@sha256:5fc47110d866d8048aec50689090ce10705d19d3bb48d2b06727d6d569003af7_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-handler-rhel9@sha256:84ba79ae9658699147d2493df2582ab6df10adbff4d44a533c3fe6a9f45f9691_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-launcher-rhel9@sha256:4990d40d9987d5126d105dd45be2501eaded248cb61bdde5ea8d359bc1e7ebef_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-launcher-rhel9@sha256:95aeacb98209e0baef27ce0e02fbac38d693cea74808fc77107efda0f344bcb5_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-operator-rhel9@sha256:5c1a7e4ed2061938987b900a2394f07121d4037350c9bb6485213a2adfea787d_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-operator-rhel9@sha256:66b1b3b379121d6411ba22283e7d991617177330c93746d37753ab7812b9a00b_arm64",
"9Base-CNV-4.13:container-native-virtualization/virtio-win-rhel9@sha256:8735f51da918408a8826601c082d1b29accf26d59b9978da89b980cb509c1102_arm64",
"9Base-CNV-4.13:container-native-virtualization/virtio-win-rhel9@sha256:d147d2a6eb6f907d1e88f61aaca83596853bc72164583d6dda2b1154b490de25_amd64",
"9Base-CNV-4.13:container-native-virtualization/vm-console-proxy-rhel9@sha256:70a8d0cd66182c25e02679540bae1368b2a9cf687532b58dba41ef30c5ca00c1_arm64",
"9Base-CNV-4.13:container-native-virtualization/vm-console-proxy-rhel9@sha256:7ca921f98f6d81a126907127a611146fb53397869a628678faa1e289c01d22b2_amd64",
"9Base-CNV-4.13:container-native-virtualization/vm-network-latency-checkup-rhel9@sha256:503ea7ac914a9b54e9d665a0227ee0b5d5200cdb5d692aa94c07dd1518d91b70_arm64",
"9Base-CNV-4.13:container-native-virtualization/vm-network-latency-checkup-rhel9@sha256:59fd965975bccf641a0fa7aa01374d45057bd03cda7528248a84b60b1205bf57_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-32189"
},
{
"category": "external",
"summary": "RHBZ#2113814",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2113814"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-32189",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32189"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-32189",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-32189"
},
{
"category": "external",
"summary": "https://go.dev/issue/53871",
"url": "https://go.dev/issue/53871"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-nuts/c/DCFSyTGM0wU",
"url": "https://groups.google.com/g/golang-nuts/c/DCFSyTGM0wU"
}
],
"release_date": "2022-08-01T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-05-18T02:55:08+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"9Base-CNV-4.13:container-native-virtualization/virt-api-rhel9@sha256:e68416321ca8c74a547b3d35897f54813c03481143e402e9bdc4daf315e35b5d_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-api-rhel9@sha256:fdb4ca1bb8b310d713d9c7e88f7d091f4460aa942dbeca5ebcf17281a06daffe_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:3205"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"9Base-CNV-4.13:container-native-virtualization/bridge-marker-rhel9@sha256:8eac196b30a648989cdca5cb153a3bc3d34e47339acba0e4f760bd366496c99d_amd64",
"9Base-CNV-4.13:container-native-virtualization/bridge-marker-rhel9@sha256:e8a55aee3d75a316bb0d7a554c737198823df04b3c05e481c17e45eb2153bced_arm64",
"9Base-CNV-4.13:container-native-virtualization/cluster-network-addons-operator-rhel9@sha256:3bff33e3f40cd1e2b519c2db56734d4bb8df883e155c2f20b1cb9d3d184daec1_amd64",
"9Base-CNV-4.13:container-native-virtualization/cluster-network-addons-operator-rhel9@sha256:f439d2f420bb59eb1d5af14ce2002648d0cfc155d1a1466c8aac9b661fe902b8_arm64",
"9Base-CNV-4.13:container-native-virtualization/cnv-containernetworking-plugins-rhel9@sha256:89f22e541f61a660c9aa9f38ef58e80b84a0517f74e84292107fc252c25465c9_arm64",
"9Base-CNV-4.13:container-native-virtualization/cnv-containernetworking-plugins-rhel9@sha256:bf471997e54e4a75b0d71f492ab295787fdbb14d8c85c4ea8c03f0552dbc3755_amd64",
"9Base-CNV-4.13:container-native-virtualization/cnv-must-gather-rhel9@sha256:9e8efd76924958eb605401abdac08eba97fb83a1ada383bc87a7fb7c87b3a455_arm64",
"9Base-CNV-4.13:container-native-virtualization/cnv-must-gather-rhel9@sha256:b9fc32b5fabedd65a4c3a471879c808af2087277de4278adaa115a732f0468da_amd64",
"9Base-CNV-4.13:container-native-virtualization/hco-bundle-registry-rhel9@sha256:60e89d7a99ff9f20e974430b802dd724a3bb6fa1e01e5a62daad98ac487b3063_amd64",
"9Base-CNV-4.13:container-native-virtualization/hco-bundle-registry-rhel9@sha256:dd20b138045ef1424d83a47e7abcfcbb2ac54577dcec5ed3c186390aaa4c9d84_arm64",
"9Base-CNV-4.13:container-native-virtualization/hostpath-csi-driver-rhel9@sha256:61e2824853d51347593ad909a5e546cd92e4216d6a1df5dffb50dd9cba277cce_amd64",
"9Base-CNV-4.13:container-native-virtualization/hostpath-csi-driver-rhel9@sha256:676d4c23a5f60dd331728af056b0a6b2d3358ac88da23299b1a98dfaca8f288e_arm64",
"9Base-CNV-4.13:container-native-virtualization/hostpath-provisioner-operator-rhel9@sha256:515be94be496c67f5b8fd5f4832fe4385e56476e6589897d6b9fbb9bb2b00f32_amd64",
"9Base-CNV-4.13:container-native-virtualization/hostpath-provisioner-operator-rhel9@sha256:571ae805641dea11646028c946039983c7fd82f138b915dcb8b80c39b465e63c_arm64",
"9Base-CNV-4.13:container-native-virtualization/hostpath-provisioner-rhel9@sha256:ac3fe350bedd6bc43596444ba0f279ccf8a144ab14ac5a9b80ea71c46390b7b4_amd64",
"9Base-CNV-4.13:container-native-virtualization/hostpath-provisioner-rhel9@sha256:d4ed87745b7ee2acca2d83e2c91c2f6dced1903c81495b50f2559b3ba2dde287_arm64",
"9Base-CNV-4.13:container-native-virtualization/hyperconverged-cluster-operator-rhel9@sha256:e5ab9f3be59d3568e3d672ab374efb16990ccf92192eac4e1244b10fcd7423e2_amd64",
"9Base-CNV-4.13:container-native-virtualization/hyperconverged-cluster-operator-rhel9@sha256:e681560b184189df03fc84c8a712f32289f42573dd348cda394b19565eb6eca8_arm64",
"9Base-CNV-4.13:container-native-virtualization/hyperconverged-cluster-webhook-rhel9@sha256:06d036d320b3027bb8370bb8e0f6fe8c9f0ec9bca7aac3b5c53698ba4a170042_arm64",
"9Base-CNV-4.13:container-native-virtualization/hyperconverged-cluster-webhook-rhel9@sha256:b5a01336180aad017df62cf8e652f2491b8263ba7e4dd07f858db1ef1924cf2f_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubemacpool-rhel9@sha256:4d190d81eeb3fbe9ed56cf3548dc83a3f81641bfdafa7b42dcfb0d2512566644_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubemacpool-rhel9@sha256:59862a59854f0d5b83dc25ba119f9586a8aff42b6e60d1922f8ae7b4567309ff_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubesecondarydns-rhel9@sha256:121d30d78cc57731ea2242ef2c32430890ac66c2723e65608d5e2f26c3f515cd_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubesecondarydns-rhel9@sha256:b1838f3c8ba3d8113bddea17b78c21e1c1490e2a4a07ea77014edee523d06347_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-console-plugin-rhel9@sha256:86a4b1e3d6ad1d56302c9c058f8bc5826dcfe6c46fb3e0ddaa06818645039020_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-console-plugin-rhel9@sha256:ffb2acd9ae09c1ef9ca756f5eaf6087d0a3957cfc824543949d25f556a97744d_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-dpdk-checkup-rhel9@sha256:525aceb9396010ebcdba14040f267889b807cd84db8e5b4030429b51f0fbf5fe_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-dpdk-checkup-rhel9@sha256:553c4686f56c66cc1e3c5ad9d4051f139d43f821eac3abb98ca5cdb8b5dfe202_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-ssp-operator-rhel9@sha256:901e6cad9534c7bd7c4018c60bccfe49d7280fba5a9901ab4c4d15e9345288c4_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-ssp-operator-rhel9@sha256:badeb0f65f543b209f6af761729d9778b7b73b97d55044016dfba3f38a1f6f18_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-cleanup-vm-rhel9@sha256:28e4975fa4dac22d9da32ed2a10aed039fd957b30140daa36bab2caa998be77a_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-cleanup-vm-rhel9@sha256:b0ff7e812a576ea848590655fc13a85832d5a39f68e7769ceab9da6949da88c7_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-copy-template-rhel9@sha256:4916a6c6b1f9b529187d3b4d5fc99b90157993767b3fe2ad36a9ec77fbb46b10_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-copy-template-rhel9@sha256:f71c36442f1b61cdde7ec58d2c3c78d2039f6d6108e6c35388ef7c1650971fa1_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-create-datavolume-rhel9@sha256:2ad49cf6e2242a9e5861929d9bcab1305a7fc4e34e708f99cff1d7253aa46167_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-create-datavolume-rhel9@sha256:7112400a4ecb23ee2110bf96372fcf9f96ad648a51aa944627b40eb59539a660_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-create-vm-from-template-rhel9@sha256:1411c65bbad7302710788327f6964a4bf5bc20ef70d5e46f4a5c6e7a0e7a0161_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-create-vm-from-template-rhel9@sha256:4d962618aa95600c60c9fc8b890186e510de91177d51949e12797a3558e31328_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-customize-rhel9@sha256:5c23d3f20ea9dcbe7109284d73078ecd516a070e964b844f8d80b1d92ebd55ee_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-customize-rhel9@sha256:a780244e48c6d4f87446d3754c3eb9ab79c0d54675c189da4a659f7a4d5668ea_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-sysprep-rhel9@sha256:84577d949a1bbcaa291c70729127bca4a8994df03068666baa23840877ea8392_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-sysprep-rhel9@sha256:aed630a597a090179e1b0e0c117e536df06b67d0f793f91936aa7388c0c5d7eb_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-modify-vm-template-rhel9@sha256:31d959b80cf57462e1705684bb7e1b78af26bd2c62f1c9e4e51e1d02199b05a8_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-modify-vm-template-rhel9@sha256:66aea526bc10e4c0136ba86e394bbdfe4fbd7f757d6f391a561b51d2ba2f4d46_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-operator-rhel9@sha256:d0cf0e81589f0938de45961eaddfc5ec4782738fd11082de0439b200534259eb_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-operator-rhel9@sha256:f1b1f5044db6bb945584f9d4f31d020597725a286ef368ed0aca2116abb31beb_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-wait-for-vmi-status-rhel9@sha256:39a15d03f113735df03b1a7408227eb9604d942c1f3c1992bcdc7eaf07662711_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-wait-for-vmi-status-rhel9@sha256:afb68af076954fcd18c7a4a1464ea0c2a766e8282eae980051906ed07eaa1707_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-template-validator-rhel9@sha256:02b22c7e7014b5e72d47fed8b6a268cf307638c5510adf3916c51f7f40a52a08_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-template-validator-rhel9@sha256:c0264b9271e602f85b2040ef7f207cdfa46038dc4fa6e4738bf196ef88a71cf8_amd64",
"9Base-CNV-4.13:container-native-virtualization/libguestfs-tools-rhel9@sha256:29ae84575bbca24553cf649256759fd96ff286971d80bc2db129154a7df9b283_amd64",
"9Base-CNV-4.13:container-native-virtualization/libguestfs-tools-rhel9@sha256:6558f60343e068b032167e2340b2c549c5f0258acc5d2614b60966ce79408b01_arm64",
"9Base-CNV-4.13:container-native-virtualization/multus-dynamic-networks-rhel9@sha256:3ecb0162a4b01d1590bf209d717b32a4f0835910d9979823f18c24acba41b503_arm64",
"9Base-CNV-4.13:container-native-virtualization/multus-dynamic-networks-rhel9@sha256:b7f68b6420009e21380d32d6459193aae45e93be9533debe17cb3108571b36b8_amd64",
"9Base-CNV-4.13:container-native-virtualization/ovs-cni-plugin-rhel9@sha256:0f1d372f418744e0aff59ecb0a38f53178aac9c2e9eecfd38aa25ed83e0d1360_arm64",
"9Base-CNV-4.13:container-native-virtualization/ovs-cni-plugin-rhel9@sha256:e8e7a44edbf1713fe74de5c4b8f691cce78f4440c4a32a16ba9ad16694a55396_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-api-rhel9@sha256:e68416321ca8c74a547b3d35897f54813c03481143e402e9bdc4daf315e35b5d_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-api-rhel9@sha256:fdb4ca1bb8b310d713d9c7e88f7d091f4460aa942dbeca5ebcf17281a06daffe_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-artifacts-server-rhel9@sha256:33d11c1832b49df39c1fca62bad40dbc5c30a452248339aaef449ac99509accb_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-artifacts-server-rhel9@sha256:81fc61b714baecb5a89fa6c0749c14566e0661b8e184ca602fc2e03b9cf431ee_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-apiserver-rhel9@sha256:f6128a63344ed2129f5bce648ddcfaa2869d31cde4b93328d3c22534b97ade10_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-apiserver-rhel9@sha256:feca273a691d09445c6cff6d36b5d590735e867656a9898ce0d89744d98e8006_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-cloner-rhel9@sha256:68e3b9b0291b4fb277ac430269ffce11d13b0a7688cf2ffcdb7f98759c36b4db_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-cloner-rhel9@sha256:6ac212767481bef64d8a7d0252bb8089c0f9751fad4a355aef71bd49dad2ad07_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-controller-rhel9@sha256:65f5263275d9f0a12b8fb057d82adf678778039ec873ca9bde182dea3413c9f1_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-controller-rhel9@sha256:d9e62b2019328be258489ac852eef25f8b1233f29abac6bcea5b406329f97fed_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-importer-rhel9@sha256:00a6d9d24ca1466d450b02269ec3144fc7550f0e5c696e869fbf7ce10cae6093_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-importer-rhel9@sha256:2df07fb21a3575e74aa16ded20129828f2300cd33e8ab369b0362062d49e62d0_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-operator-rhel9@sha256:20ec064750faedd97d11b797c8c1d9a1db5d60d7d76e82e65cfd05eb79d65e29_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-operator-rhel9@sha256:802ee8923d9d8e406b23911406f9748756c0ef4d6954e9e2fd5fb4bdf91dde9a_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-uploadproxy-rhel9@sha256:392d0f61f462c707adfdc21e4239c5c09d8520a80486b41d9d9ae479267d6124_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-uploadproxy-rhel9@sha256:6775f34353eec8f35bead9411dde155530d079bb8d51582fb1f2aacc27dbde1d_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-uploadserver-rhel9@sha256:4528c24672689cfb6505761b6b108fbcc04488192733f23d2bfe39cd42a1d743_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-uploadserver-rhel9@sha256:b22048390387380af94e267c8a9a66813c515997456d59d8ebac1486916b6585_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-controller-rhel9@sha256:3e7880149ee9a68286e390beb3d9779f7403c30fc5136e5370e0e4690a3fd243_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-controller-rhel9@sha256:970edc281d7a731e9f7e8c2d4440fe48a221e5e355d5235c5413b4c3adb28503_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-exportproxy-rhel9@sha256:1bda34d5bff734ad997202f29a5ff6f7362fd79fa90511a422442ef2e3681198_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-exportproxy-rhel9@sha256:de3c4afbf7669b98517cbef2490ec186f0553dd97b05bed80ec36dd883fe507b_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-exportserver-rhel9@sha256:3f7f98645176d42c63cca5c0fc3182a03121af87446ca421b6c72baf07dfca0d_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-exportserver-rhel9@sha256:8f12955cd777eb2409037a6968aa92f50c99d6e07e722951dbcfd0c8c9829b5e_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-handler-rhel9@sha256:5fc47110d866d8048aec50689090ce10705d19d3bb48d2b06727d6d569003af7_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-handler-rhel9@sha256:84ba79ae9658699147d2493df2582ab6df10adbff4d44a533c3fe6a9f45f9691_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-launcher-rhel9@sha256:4990d40d9987d5126d105dd45be2501eaded248cb61bdde5ea8d359bc1e7ebef_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-launcher-rhel9@sha256:95aeacb98209e0baef27ce0e02fbac38d693cea74808fc77107efda0f344bcb5_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-operator-rhel9@sha256:5c1a7e4ed2061938987b900a2394f07121d4037350c9bb6485213a2adfea787d_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-operator-rhel9@sha256:66b1b3b379121d6411ba22283e7d991617177330c93746d37753ab7812b9a00b_arm64",
"9Base-CNV-4.13:container-native-virtualization/virtio-win-rhel9@sha256:8735f51da918408a8826601c082d1b29accf26d59b9978da89b980cb509c1102_arm64",
"9Base-CNV-4.13:container-native-virtualization/virtio-win-rhel9@sha256:d147d2a6eb6f907d1e88f61aaca83596853bc72164583d6dda2b1154b490de25_amd64",
"9Base-CNV-4.13:container-native-virtualization/vm-console-proxy-rhel9@sha256:70a8d0cd66182c25e02679540bae1368b2a9cf687532b58dba41ef30c5ca00c1_arm64",
"9Base-CNV-4.13:container-native-virtualization/vm-console-proxy-rhel9@sha256:7ca921f98f6d81a126907127a611146fb53397869a628678faa1e289c01d22b2_amd64",
"9Base-CNV-4.13:container-native-virtualization/vm-network-latency-checkup-rhel9@sha256:503ea7ac914a9b54e9d665a0227ee0b5d5200cdb5d692aa94c07dd1518d91b70_arm64",
"9Base-CNV-4.13:container-native-virtualization/vm-network-latency-checkup-rhel9@sha256:59fd965975bccf641a0fa7aa01374d45057bd03cda7528248a84b60b1205bf57_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "golang: math/big: decoding big.Float and big.Rat types can panic if the encoded message is too short, potentially allowing a denial of service"
},
{
"cve": "CVE-2022-32190",
"cwe": {
"id": "CWE-22",
"name": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)"
},
"discovery_date": "2022-09-06T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"9Base-CNV-4.13:container-native-virtualization/bridge-marker-rhel9@sha256:8eac196b30a648989cdca5cb153a3bc3d34e47339acba0e4f760bd366496c99d_amd64",
"9Base-CNV-4.13:container-native-virtualization/bridge-marker-rhel9@sha256:e8a55aee3d75a316bb0d7a554c737198823df04b3c05e481c17e45eb2153bced_arm64",
"9Base-CNV-4.13:container-native-virtualization/cluster-network-addons-operator-rhel9@sha256:3bff33e3f40cd1e2b519c2db56734d4bb8df883e155c2f20b1cb9d3d184daec1_amd64",
"9Base-CNV-4.13:container-native-virtualization/cluster-network-addons-operator-rhel9@sha256:f439d2f420bb59eb1d5af14ce2002648d0cfc155d1a1466c8aac9b661fe902b8_arm64",
"9Base-CNV-4.13:container-native-virtualization/cnv-containernetworking-plugins-rhel9@sha256:89f22e541f61a660c9aa9f38ef58e80b84a0517f74e84292107fc252c25465c9_arm64",
"9Base-CNV-4.13:container-native-virtualization/cnv-containernetworking-plugins-rhel9@sha256:bf471997e54e4a75b0d71f492ab295787fdbb14d8c85c4ea8c03f0552dbc3755_amd64",
"9Base-CNV-4.13:container-native-virtualization/cnv-must-gather-rhel9@sha256:9e8efd76924958eb605401abdac08eba97fb83a1ada383bc87a7fb7c87b3a455_arm64",
"9Base-CNV-4.13:container-native-virtualization/cnv-must-gather-rhel9@sha256:b9fc32b5fabedd65a4c3a471879c808af2087277de4278adaa115a732f0468da_amd64",
"9Base-CNV-4.13:container-native-virtualization/hco-bundle-registry-rhel9@sha256:60e89d7a99ff9f20e974430b802dd724a3bb6fa1e01e5a62daad98ac487b3063_amd64",
"9Base-CNV-4.13:container-native-virtualization/hco-bundle-registry-rhel9@sha256:dd20b138045ef1424d83a47e7abcfcbb2ac54577dcec5ed3c186390aaa4c9d84_arm64",
"9Base-CNV-4.13:container-native-virtualization/hostpath-csi-driver-rhel9@sha256:61e2824853d51347593ad909a5e546cd92e4216d6a1df5dffb50dd9cba277cce_amd64",
"9Base-CNV-4.13:container-native-virtualization/hostpath-csi-driver-rhel9@sha256:676d4c23a5f60dd331728af056b0a6b2d3358ac88da23299b1a98dfaca8f288e_arm64",
"9Base-CNV-4.13:container-native-virtualization/hostpath-provisioner-operator-rhel9@sha256:515be94be496c67f5b8fd5f4832fe4385e56476e6589897d6b9fbb9bb2b00f32_amd64",
"9Base-CNV-4.13:container-native-virtualization/hostpath-provisioner-operator-rhel9@sha256:571ae805641dea11646028c946039983c7fd82f138b915dcb8b80c39b465e63c_arm64",
"9Base-CNV-4.13:container-native-virtualization/hostpath-provisioner-rhel9@sha256:ac3fe350bedd6bc43596444ba0f279ccf8a144ab14ac5a9b80ea71c46390b7b4_amd64",
"9Base-CNV-4.13:container-native-virtualization/hostpath-provisioner-rhel9@sha256:d4ed87745b7ee2acca2d83e2c91c2f6dced1903c81495b50f2559b3ba2dde287_arm64",
"9Base-CNV-4.13:container-native-virtualization/hyperconverged-cluster-operator-rhel9@sha256:e5ab9f3be59d3568e3d672ab374efb16990ccf92192eac4e1244b10fcd7423e2_amd64",
"9Base-CNV-4.13:container-native-virtualization/hyperconverged-cluster-operator-rhel9@sha256:e681560b184189df03fc84c8a712f32289f42573dd348cda394b19565eb6eca8_arm64",
"9Base-CNV-4.13:container-native-virtualization/hyperconverged-cluster-webhook-rhel9@sha256:06d036d320b3027bb8370bb8e0f6fe8c9f0ec9bca7aac3b5c53698ba4a170042_arm64",
"9Base-CNV-4.13:container-native-virtualization/hyperconverged-cluster-webhook-rhel9@sha256:b5a01336180aad017df62cf8e652f2491b8263ba7e4dd07f858db1ef1924cf2f_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubemacpool-rhel9@sha256:4d190d81eeb3fbe9ed56cf3548dc83a3f81641bfdafa7b42dcfb0d2512566644_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubemacpool-rhel9@sha256:59862a59854f0d5b83dc25ba119f9586a8aff42b6e60d1922f8ae7b4567309ff_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubesecondarydns-rhel9@sha256:121d30d78cc57731ea2242ef2c32430890ac66c2723e65608d5e2f26c3f515cd_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubesecondarydns-rhel9@sha256:b1838f3c8ba3d8113bddea17b78c21e1c1490e2a4a07ea77014edee523d06347_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-console-plugin-rhel9@sha256:86a4b1e3d6ad1d56302c9c058f8bc5826dcfe6c46fb3e0ddaa06818645039020_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-console-plugin-rhel9@sha256:ffb2acd9ae09c1ef9ca756f5eaf6087d0a3957cfc824543949d25f556a97744d_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-dpdk-checkup-rhel9@sha256:525aceb9396010ebcdba14040f267889b807cd84db8e5b4030429b51f0fbf5fe_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-dpdk-checkup-rhel9@sha256:553c4686f56c66cc1e3c5ad9d4051f139d43f821eac3abb98ca5cdb8b5dfe202_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-ssp-operator-rhel9@sha256:901e6cad9534c7bd7c4018c60bccfe49d7280fba5a9901ab4c4d15e9345288c4_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-ssp-operator-rhel9@sha256:badeb0f65f543b209f6af761729d9778b7b73b97d55044016dfba3f38a1f6f18_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-cleanup-vm-rhel9@sha256:28e4975fa4dac22d9da32ed2a10aed039fd957b30140daa36bab2caa998be77a_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-cleanup-vm-rhel9@sha256:b0ff7e812a576ea848590655fc13a85832d5a39f68e7769ceab9da6949da88c7_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-copy-template-rhel9@sha256:4916a6c6b1f9b529187d3b4d5fc99b90157993767b3fe2ad36a9ec77fbb46b10_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-copy-template-rhel9@sha256:f71c36442f1b61cdde7ec58d2c3c78d2039f6d6108e6c35388ef7c1650971fa1_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-create-datavolume-rhel9@sha256:2ad49cf6e2242a9e5861929d9bcab1305a7fc4e34e708f99cff1d7253aa46167_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-create-datavolume-rhel9@sha256:7112400a4ecb23ee2110bf96372fcf9f96ad648a51aa944627b40eb59539a660_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-create-vm-from-template-rhel9@sha256:1411c65bbad7302710788327f6964a4bf5bc20ef70d5e46f4a5c6e7a0e7a0161_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-create-vm-from-template-rhel9@sha256:4d962618aa95600c60c9fc8b890186e510de91177d51949e12797a3558e31328_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-customize-rhel9@sha256:5c23d3f20ea9dcbe7109284d73078ecd516a070e964b844f8d80b1d92ebd55ee_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-customize-rhel9@sha256:a780244e48c6d4f87446d3754c3eb9ab79c0d54675c189da4a659f7a4d5668ea_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-sysprep-rhel9@sha256:84577d949a1bbcaa291c70729127bca4a8994df03068666baa23840877ea8392_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-sysprep-rhel9@sha256:aed630a597a090179e1b0e0c117e536df06b67d0f793f91936aa7388c0c5d7eb_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-modify-vm-template-rhel9@sha256:31d959b80cf57462e1705684bb7e1b78af26bd2c62f1c9e4e51e1d02199b05a8_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-modify-vm-template-rhel9@sha256:66aea526bc10e4c0136ba86e394bbdfe4fbd7f757d6f391a561b51d2ba2f4d46_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-operator-rhel9@sha256:d0cf0e81589f0938de45961eaddfc5ec4782738fd11082de0439b200534259eb_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-operator-rhel9@sha256:f1b1f5044db6bb945584f9d4f31d020597725a286ef368ed0aca2116abb31beb_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-wait-for-vmi-status-rhel9@sha256:39a15d03f113735df03b1a7408227eb9604d942c1f3c1992bcdc7eaf07662711_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-wait-for-vmi-status-rhel9@sha256:afb68af076954fcd18c7a4a1464ea0c2a766e8282eae980051906ed07eaa1707_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-template-validator-rhel9@sha256:02b22c7e7014b5e72d47fed8b6a268cf307638c5510adf3916c51f7f40a52a08_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-template-validator-rhel9@sha256:c0264b9271e602f85b2040ef7f207cdfa46038dc4fa6e4738bf196ef88a71cf8_amd64",
"9Base-CNV-4.13:container-native-virtualization/libguestfs-tools-rhel9@sha256:29ae84575bbca24553cf649256759fd96ff286971d80bc2db129154a7df9b283_amd64",
"9Base-CNV-4.13:container-native-virtualization/libguestfs-tools-rhel9@sha256:6558f60343e068b032167e2340b2c549c5f0258acc5d2614b60966ce79408b01_arm64",
"9Base-CNV-4.13:container-native-virtualization/multus-dynamic-networks-rhel9@sha256:3ecb0162a4b01d1590bf209d717b32a4f0835910d9979823f18c24acba41b503_arm64",
"9Base-CNV-4.13:container-native-virtualization/multus-dynamic-networks-rhel9@sha256:b7f68b6420009e21380d32d6459193aae45e93be9533debe17cb3108571b36b8_amd64",
"9Base-CNV-4.13:container-native-virtualization/ovs-cni-plugin-rhel9@sha256:0f1d372f418744e0aff59ecb0a38f53178aac9c2e9eecfd38aa25ed83e0d1360_arm64",
"9Base-CNV-4.13:container-native-virtualization/ovs-cni-plugin-rhel9@sha256:e8e7a44edbf1713fe74de5c4b8f691cce78f4440c4a32a16ba9ad16694a55396_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-artifacts-server-rhel9@sha256:33d11c1832b49df39c1fca62bad40dbc5c30a452248339aaef449ac99509accb_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-artifacts-server-rhel9@sha256:81fc61b714baecb5a89fa6c0749c14566e0661b8e184ca602fc2e03b9cf431ee_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-apiserver-rhel9@sha256:f6128a63344ed2129f5bce648ddcfaa2869d31cde4b93328d3c22534b97ade10_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-apiserver-rhel9@sha256:feca273a691d09445c6cff6d36b5d590735e867656a9898ce0d89744d98e8006_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-cloner-rhel9@sha256:68e3b9b0291b4fb277ac430269ffce11d13b0a7688cf2ffcdb7f98759c36b4db_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-cloner-rhel9@sha256:6ac212767481bef64d8a7d0252bb8089c0f9751fad4a355aef71bd49dad2ad07_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-controller-rhel9@sha256:65f5263275d9f0a12b8fb057d82adf678778039ec873ca9bde182dea3413c9f1_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-controller-rhel9@sha256:d9e62b2019328be258489ac852eef25f8b1233f29abac6bcea5b406329f97fed_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-importer-rhel9@sha256:00a6d9d24ca1466d450b02269ec3144fc7550f0e5c696e869fbf7ce10cae6093_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-importer-rhel9@sha256:2df07fb21a3575e74aa16ded20129828f2300cd33e8ab369b0362062d49e62d0_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-operator-rhel9@sha256:20ec064750faedd97d11b797c8c1d9a1db5d60d7d76e82e65cfd05eb79d65e29_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-operator-rhel9@sha256:802ee8923d9d8e406b23911406f9748756c0ef4d6954e9e2fd5fb4bdf91dde9a_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-uploadproxy-rhel9@sha256:392d0f61f462c707adfdc21e4239c5c09d8520a80486b41d9d9ae479267d6124_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-uploadproxy-rhel9@sha256:6775f34353eec8f35bead9411dde155530d079bb8d51582fb1f2aacc27dbde1d_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-uploadserver-rhel9@sha256:4528c24672689cfb6505761b6b108fbcc04488192733f23d2bfe39cd42a1d743_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-uploadserver-rhel9@sha256:b22048390387380af94e267c8a9a66813c515997456d59d8ebac1486916b6585_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-controller-rhel9@sha256:3e7880149ee9a68286e390beb3d9779f7403c30fc5136e5370e0e4690a3fd243_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-controller-rhel9@sha256:970edc281d7a731e9f7e8c2d4440fe48a221e5e355d5235c5413b4c3adb28503_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-exportproxy-rhel9@sha256:1bda34d5bff734ad997202f29a5ff6f7362fd79fa90511a422442ef2e3681198_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-exportproxy-rhel9@sha256:de3c4afbf7669b98517cbef2490ec186f0553dd97b05bed80ec36dd883fe507b_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-exportserver-rhel9@sha256:3f7f98645176d42c63cca5c0fc3182a03121af87446ca421b6c72baf07dfca0d_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-exportserver-rhel9@sha256:8f12955cd777eb2409037a6968aa92f50c99d6e07e722951dbcfd0c8c9829b5e_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-handler-rhel9@sha256:5fc47110d866d8048aec50689090ce10705d19d3bb48d2b06727d6d569003af7_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-handler-rhel9@sha256:84ba79ae9658699147d2493df2582ab6df10adbff4d44a533c3fe6a9f45f9691_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-launcher-rhel9@sha256:4990d40d9987d5126d105dd45be2501eaded248cb61bdde5ea8d359bc1e7ebef_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-launcher-rhel9@sha256:95aeacb98209e0baef27ce0e02fbac38d693cea74808fc77107efda0f344bcb5_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-operator-rhel9@sha256:5c1a7e4ed2061938987b900a2394f07121d4037350c9bb6485213a2adfea787d_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-operator-rhel9@sha256:66b1b3b379121d6411ba22283e7d991617177330c93746d37753ab7812b9a00b_arm64",
"9Base-CNV-4.13:container-native-virtualization/virtio-win-rhel9@sha256:8735f51da918408a8826601c082d1b29accf26d59b9978da89b980cb509c1102_arm64",
"9Base-CNV-4.13:container-native-virtualization/virtio-win-rhel9@sha256:d147d2a6eb6f907d1e88f61aaca83596853bc72164583d6dda2b1154b490de25_amd64",
"9Base-CNV-4.13:container-native-virtualization/vm-console-proxy-rhel9@sha256:70a8d0cd66182c25e02679540bae1368b2a9cf687532b58dba41ef30c5ca00c1_arm64",
"9Base-CNV-4.13:container-native-virtualization/vm-console-proxy-rhel9@sha256:7ca921f98f6d81a126907127a611146fb53397869a628678faa1e289c01d22b2_amd64",
"9Base-CNV-4.13:container-native-virtualization/vm-network-latency-checkup-rhel9@sha256:503ea7ac914a9b54e9d665a0227ee0b5d5200cdb5d692aa94c07dd1518d91b70_arm64",
"9Base-CNV-4.13:container-native-virtualization/vm-network-latency-checkup-rhel9@sha256:59fd965975bccf641a0fa7aa01374d45057bd03cda7528248a84b60b1205bf57_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2124668"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the golang package. The JoinPath doesn\u0027t remove the ../ path components appended to a domain that is not terminated by a slash, possibly leading to a directory traversal attack.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: net/url: JoinPath does not strip relative path components in all circumstances",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The vulnerable functions, JoinPath and URL.JoinPath was introduced in upstream go1.19, whereas, RHEL ships go1.17 and go1.18 versions, which does not contain the vulnerable code. Hence, packages shipped with RHEL-8, RHEL-9 are not affected.\n\nAll Y stream releases of OpenShift Container Platform 4 run on RHEL-8 or RHEL-9, so OCP 4 is also not affected.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"9Base-CNV-4.13:container-native-virtualization/virt-api-rhel9@sha256:e68416321ca8c74a547b3d35897f54813c03481143e402e9bdc4daf315e35b5d_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-api-rhel9@sha256:fdb4ca1bb8b310d713d9c7e88f7d091f4460aa942dbeca5ebcf17281a06daffe_amd64"
],
"known_not_affected": [
"9Base-CNV-4.13:container-native-virtualization/bridge-marker-rhel9@sha256:8eac196b30a648989cdca5cb153a3bc3d34e47339acba0e4f760bd366496c99d_amd64",
"9Base-CNV-4.13:container-native-virtualization/bridge-marker-rhel9@sha256:e8a55aee3d75a316bb0d7a554c737198823df04b3c05e481c17e45eb2153bced_arm64",
"9Base-CNV-4.13:container-native-virtualization/cluster-network-addons-operator-rhel9@sha256:3bff33e3f40cd1e2b519c2db56734d4bb8df883e155c2f20b1cb9d3d184daec1_amd64",
"9Base-CNV-4.13:container-native-virtualization/cluster-network-addons-operator-rhel9@sha256:f439d2f420bb59eb1d5af14ce2002648d0cfc155d1a1466c8aac9b661fe902b8_arm64",
"9Base-CNV-4.13:container-native-virtualization/cnv-containernetworking-plugins-rhel9@sha256:89f22e541f61a660c9aa9f38ef58e80b84a0517f74e84292107fc252c25465c9_arm64",
"9Base-CNV-4.13:container-native-virtualization/cnv-containernetworking-plugins-rhel9@sha256:bf471997e54e4a75b0d71f492ab295787fdbb14d8c85c4ea8c03f0552dbc3755_amd64",
"9Base-CNV-4.13:container-native-virtualization/cnv-must-gather-rhel9@sha256:9e8efd76924958eb605401abdac08eba97fb83a1ada383bc87a7fb7c87b3a455_arm64",
"9Base-CNV-4.13:container-native-virtualization/cnv-must-gather-rhel9@sha256:b9fc32b5fabedd65a4c3a471879c808af2087277de4278adaa115a732f0468da_amd64",
"9Base-CNV-4.13:container-native-virtualization/hco-bundle-registry-rhel9@sha256:60e89d7a99ff9f20e974430b802dd724a3bb6fa1e01e5a62daad98ac487b3063_amd64",
"9Base-CNV-4.13:container-native-virtualization/hco-bundle-registry-rhel9@sha256:dd20b138045ef1424d83a47e7abcfcbb2ac54577dcec5ed3c186390aaa4c9d84_arm64",
"9Base-CNV-4.13:container-native-virtualization/hostpath-csi-driver-rhel9@sha256:61e2824853d51347593ad909a5e546cd92e4216d6a1df5dffb50dd9cba277cce_amd64",
"9Base-CNV-4.13:container-native-virtualization/hostpath-csi-driver-rhel9@sha256:676d4c23a5f60dd331728af056b0a6b2d3358ac88da23299b1a98dfaca8f288e_arm64",
"9Base-CNV-4.13:container-native-virtualization/hostpath-provisioner-operator-rhel9@sha256:515be94be496c67f5b8fd5f4832fe4385e56476e6589897d6b9fbb9bb2b00f32_amd64",
"9Base-CNV-4.13:container-native-virtualization/hostpath-provisioner-operator-rhel9@sha256:571ae805641dea11646028c946039983c7fd82f138b915dcb8b80c39b465e63c_arm64",
"9Base-CNV-4.13:container-native-virtualization/hostpath-provisioner-rhel9@sha256:ac3fe350bedd6bc43596444ba0f279ccf8a144ab14ac5a9b80ea71c46390b7b4_amd64",
"9Base-CNV-4.13:container-native-virtualization/hostpath-provisioner-rhel9@sha256:d4ed87745b7ee2acca2d83e2c91c2f6dced1903c81495b50f2559b3ba2dde287_arm64",
"9Base-CNV-4.13:container-native-virtualization/hyperconverged-cluster-operator-rhel9@sha256:e5ab9f3be59d3568e3d672ab374efb16990ccf92192eac4e1244b10fcd7423e2_amd64",
"9Base-CNV-4.13:container-native-virtualization/hyperconverged-cluster-operator-rhel9@sha256:e681560b184189df03fc84c8a712f32289f42573dd348cda394b19565eb6eca8_arm64",
"9Base-CNV-4.13:container-native-virtualization/hyperconverged-cluster-webhook-rhel9@sha256:06d036d320b3027bb8370bb8e0f6fe8c9f0ec9bca7aac3b5c53698ba4a170042_arm64",
"9Base-CNV-4.13:container-native-virtualization/hyperconverged-cluster-webhook-rhel9@sha256:b5a01336180aad017df62cf8e652f2491b8263ba7e4dd07f858db1ef1924cf2f_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubemacpool-rhel9@sha256:4d190d81eeb3fbe9ed56cf3548dc83a3f81641bfdafa7b42dcfb0d2512566644_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubemacpool-rhel9@sha256:59862a59854f0d5b83dc25ba119f9586a8aff42b6e60d1922f8ae7b4567309ff_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubesecondarydns-rhel9@sha256:121d30d78cc57731ea2242ef2c32430890ac66c2723e65608d5e2f26c3f515cd_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubesecondarydns-rhel9@sha256:b1838f3c8ba3d8113bddea17b78c21e1c1490e2a4a07ea77014edee523d06347_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-console-plugin-rhel9@sha256:86a4b1e3d6ad1d56302c9c058f8bc5826dcfe6c46fb3e0ddaa06818645039020_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-console-plugin-rhel9@sha256:ffb2acd9ae09c1ef9ca756f5eaf6087d0a3957cfc824543949d25f556a97744d_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-dpdk-checkup-rhel9@sha256:525aceb9396010ebcdba14040f267889b807cd84db8e5b4030429b51f0fbf5fe_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-dpdk-checkup-rhel9@sha256:553c4686f56c66cc1e3c5ad9d4051f139d43f821eac3abb98ca5cdb8b5dfe202_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-ssp-operator-rhel9@sha256:901e6cad9534c7bd7c4018c60bccfe49d7280fba5a9901ab4c4d15e9345288c4_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-ssp-operator-rhel9@sha256:badeb0f65f543b209f6af761729d9778b7b73b97d55044016dfba3f38a1f6f18_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-cleanup-vm-rhel9@sha256:28e4975fa4dac22d9da32ed2a10aed039fd957b30140daa36bab2caa998be77a_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-cleanup-vm-rhel9@sha256:b0ff7e812a576ea848590655fc13a85832d5a39f68e7769ceab9da6949da88c7_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-copy-template-rhel9@sha256:4916a6c6b1f9b529187d3b4d5fc99b90157993767b3fe2ad36a9ec77fbb46b10_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-copy-template-rhel9@sha256:f71c36442f1b61cdde7ec58d2c3c78d2039f6d6108e6c35388ef7c1650971fa1_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-create-datavolume-rhel9@sha256:2ad49cf6e2242a9e5861929d9bcab1305a7fc4e34e708f99cff1d7253aa46167_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-create-datavolume-rhel9@sha256:7112400a4ecb23ee2110bf96372fcf9f96ad648a51aa944627b40eb59539a660_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-create-vm-from-template-rhel9@sha256:1411c65bbad7302710788327f6964a4bf5bc20ef70d5e46f4a5c6e7a0e7a0161_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-create-vm-from-template-rhel9@sha256:4d962618aa95600c60c9fc8b890186e510de91177d51949e12797a3558e31328_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-customize-rhel9@sha256:5c23d3f20ea9dcbe7109284d73078ecd516a070e964b844f8d80b1d92ebd55ee_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-customize-rhel9@sha256:a780244e48c6d4f87446d3754c3eb9ab79c0d54675c189da4a659f7a4d5668ea_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-sysprep-rhel9@sha256:84577d949a1bbcaa291c70729127bca4a8994df03068666baa23840877ea8392_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-sysprep-rhel9@sha256:aed630a597a090179e1b0e0c117e536df06b67d0f793f91936aa7388c0c5d7eb_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-modify-vm-template-rhel9@sha256:31d959b80cf57462e1705684bb7e1b78af26bd2c62f1c9e4e51e1d02199b05a8_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-modify-vm-template-rhel9@sha256:66aea526bc10e4c0136ba86e394bbdfe4fbd7f757d6f391a561b51d2ba2f4d46_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-operator-rhel9@sha256:d0cf0e81589f0938de45961eaddfc5ec4782738fd11082de0439b200534259eb_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-operator-rhel9@sha256:f1b1f5044db6bb945584f9d4f31d020597725a286ef368ed0aca2116abb31beb_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-wait-for-vmi-status-rhel9@sha256:39a15d03f113735df03b1a7408227eb9604d942c1f3c1992bcdc7eaf07662711_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-wait-for-vmi-status-rhel9@sha256:afb68af076954fcd18c7a4a1464ea0c2a766e8282eae980051906ed07eaa1707_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-template-validator-rhel9@sha256:02b22c7e7014b5e72d47fed8b6a268cf307638c5510adf3916c51f7f40a52a08_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-template-validator-rhel9@sha256:c0264b9271e602f85b2040ef7f207cdfa46038dc4fa6e4738bf196ef88a71cf8_amd64",
"9Base-CNV-4.13:container-native-virtualization/libguestfs-tools-rhel9@sha256:29ae84575bbca24553cf649256759fd96ff286971d80bc2db129154a7df9b283_amd64",
"9Base-CNV-4.13:container-native-virtualization/libguestfs-tools-rhel9@sha256:6558f60343e068b032167e2340b2c549c5f0258acc5d2614b60966ce79408b01_arm64",
"9Base-CNV-4.13:container-native-virtualization/multus-dynamic-networks-rhel9@sha256:3ecb0162a4b01d1590bf209d717b32a4f0835910d9979823f18c24acba41b503_arm64",
"9Base-CNV-4.13:container-native-virtualization/multus-dynamic-networks-rhel9@sha256:b7f68b6420009e21380d32d6459193aae45e93be9533debe17cb3108571b36b8_amd64",
"9Base-CNV-4.13:container-native-virtualization/ovs-cni-plugin-rhel9@sha256:0f1d372f418744e0aff59ecb0a38f53178aac9c2e9eecfd38aa25ed83e0d1360_arm64",
"9Base-CNV-4.13:container-native-virtualization/ovs-cni-plugin-rhel9@sha256:e8e7a44edbf1713fe74de5c4b8f691cce78f4440c4a32a16ba9ad16694a55396_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-artifacts-server-rhel9@sha256:33d11c1832b49df39c1fca62bad40dbc5c30a452248339aaef449ac99509accb_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-artifacts-server-rhel9@sha256:81fc61b714baecb5a89fa6c0749c14566e0661b8e184ca602fc2e03b9cf431ee_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-apiserver-rhel9@sha256:f6128a63344ed2129f5bce648ddcfaa2869d31cde4b93328d3c22534b97ade10_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-apiserver-rhel9@sha256:feca273a691d09445c6cff6d36b5d590735e867656a9898ce0d89744d98e8006_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-cloner-rhel9@sha256:68e3b9b0291b4fb277ac430269ffce11d13b0a7688cf2ffcdb7f98759c36b4db_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-cloner-rhel9@sha256:6ac212767481bef64d8a7d0252bb8089c0f9751fad4a355aef71bd49dad2ad07_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-controller-rhel9@sha256:65f5263275d9f0a12b8fb057d82adf678778039ec873ca9bde182dea3413c9f1_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-controller-rhel9@sha256:d9e62b2019328be258489ac852eef25f8b1233f29abac6bcea5b406329f97fed_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-importer-rhel9@sha256:00a6d9d24ca1466d450b02269ec3144fc7550f0e5c696e869fbf7ce10cae6093_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-importer-rhel9@sha256:2df07fb21a3575e74aa16ded20129828f2300cd33e8ab369b0362062d49e62d0_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-operator-rhel9@sha256:20ec064750faedd97d11b797c8c1d9a1db5d60d7d76e82e65cfd05eb79d65e29_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-operator-rhel9@sha256:802ee8923d9d8e406b23911406f9748756c0ef4d6954e9e2fd5fb4bdf91dde9a_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-uploadproxy-rhel9@sha256:392d0f61f462c707adfdc21e4239c5c09d8520a80486b41d9d9ae479267d6124_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-uploadproxy-rhel9@sha256:6775f34353eec8f35bead9411dde155530d079bb8d51582fb1f2aacc27dbde1d_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-uploadserver-rhel9@sha256:4528c24672689cfb6505761b6b108fbcc04488192733f23d2bfe39cd42a1d743_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-uploadserver-rhel9@sha256:b22048390387380af94e267c8a9a66813c515997456d59d8ebac1486916b6585_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-controller-rhel9@sha256:3e7880149ee9a68286e390beb3d9779f7403c30fc5136e5370e0e4690a3fd243_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-controller-rhel9@sha256:970edc281d7a731e9f7e8c2d4440fe48a221e5e355d5235c5413b4c3adb28503_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-exportproxy-rhel9@sha256:1bda34d5bff734ad997202f29a5ff6f7362fd79fa90511a422442ef2e3681198_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-exportproxy-rhel9@sha256:de3c4afbf7669b98517cbef2490ec186f0553dd97b05bed80ec36dd883fe507b_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-exportserver-rhel9@sha256:3f7f98645176d42c63cca5c0fc3182a03121af87446ca421b6c72baf07dfca0d_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-exportserver-rhel9@sha256:8f12955cd777eb2409037a6968aa92f50c99d6e07e722951dbcfd0c8c9829b5e_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-handler-rhel9@sha256:5fc47110d866d8048aec50689090ce10705d19d3bb48d2b06727d6d569003af7_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-handler-rhel9@sha256:84ba79ae9658699147d2493df2582ab6df10adbff4d44a533c3fe6a9f45f9691_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-launcher-rhel9@sha256:4990d40d9987d5126d105dd45be2501eaded248cb61bdde5ea8d359bc1e7ebef_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-launcher-rhel9@sha256:95aeacb98209e0baef27ce0e02fbac38d693cea74808fc77107efda0f344bcb5_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-operator-rhel9@sha256:5c1a7e4ed2061938987b900a2394f07121d4037350c9bb6485213a2adfea787d_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-operator-rhel9@sha256:66b1b3b379121d6411ba22283e7d991617177330c93746d37753ab7812b9a00b_arm64",
"9Base-CNV-4.13:container-native-virtualization/virtio-win-rhel9@sha256:8735f51da918408a8826601c082d1b29accf26d59b9978da89b980cb509c1102_arm64",
"9Base-CNV-4.13:container-native-virtualization/virtio-win-rhel9@sha256:d147d2a6eb6f907d1e88f61aaca83596853bc72164583d6dda2b1154b490de25_amd64",
"9Base-CNV-4.13:container-native-virtualization/vm-console-proxy-rhel9@sha256:70a8d0cd66182c25e02679540bae1368b2a9cf687532b58dba41ef30c5ca00c1_arm64",
"9Base-CNV-4.13:container-native-virtualization/vm-console-proxy-rhel9@sha256:7ca921f98f6d81a126907127a611146fb53397869a628678faa1e289c01d22b2_amd64",
"9Base-CNV-4.13:container-native-virtualization/vm-network-latency-checkup-rhel9@sha256:503ea7ac914a9b54e9d665a0227ee0b5d5200cdb5d692aa94c07dd1518d91b70_arm64",
"9Base-CNV-4.13:container-native-virtualization/vm-network-latency-checkup-rhel9@sha256:59fd965975bccf641a0fa7aa01374d45057bd03cda7528248a84b60b1205bf57_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-32190"
},
{
"category": "external",
"summary": "RHBZ#2124668",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2124668"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-32190",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32190"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-32190",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-32190"
},
{
"category": "external",
"summary": "https://go.dev/issue/54385",
"url": "https://go.dev/issue/54385"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/x49AQzIVX-s/m/0tgO0pjiBQAJ",
"url": "https://groups.google.com/g/golang-announce/c/x49AQzIVX-s/m/0tgO0pjiBQAJ"
}
],
"release_date": "2022-09-06T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-05-18T02:55:08+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"9Base-CNV-4.13:container-native-virtualization/virt-api-rhel9@sha256:e68416321ca8c74a547b3d35897f54813c03481143e402e9bdc4daf315e35b5d_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-api-rhel9@sha256:fdb4ca1bb8b310d713d9c7e88f7d091f4460aa942dbeca5ebcf17281a06daffe_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:3205"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"9Base-CNV-4.13:container-native-virtualization/bridge-marker-rhel9@sha256:8eac196b30a648989cdca5cb153a3bc3d34e47339acba0e4f760bd366496c99d_amd64",
"9Base-CNV-4.13:container-native-virtualization/bridge-marker-rhel9@sha256:e8a55aee3d75a316bb0d7a554c737198823df04b3c05e481c17e45eb2153bced_arm64",
"9Base-CNV-4.13:container-native-virtualization/cluster-network-addons-operator-rhel9@sha256:3bff33e3f40cd1e2b519c2db56734d4bb8df883e155c2f20b1cb9d3d184daec1_amd64",
"9Base-CNV-4.13:container-native-virtualization/cluster-network-addons-operator-rhel9@sha256:f439d2f420bb59eb1d5af14ce2002648d0cfc155d1a1466c8aac9b661fe902b8_arm64",
"9Base-CNV-4.13:container-native-virtualization/cnv-containernetworking-plugins-rhel9@sha256:89f22e541f61a660c9aa9f38ef58e80b84a0517f74e84292107fc252c25465c9_arm64",
"9Base-CNV-4.13:container-native-virtualization/cnv-containernetworking-plugins-rhel9@sha256:bf471997e54e4a75b0d71f492ab295787fdbb14d8c85c4ea8c03f0552dbc3755_amd64",
"9Base-CNV-4.13:container-native-virtualization/cnv-must-gather-rhel9@sha256:9e8efd76924958eb605401abdac08eba97fb83a1ada383bc87a7fb7c87b3a455_arm64",
"9Base-CNV-4.13:container-native-virtualization/cnv-must-gather-rhel9@sha256:b9fc32b5fabedd65a4c3a471879c808af2087277de4278adaa115a732f0468da_amd64",
"9Base-CNV-4.13:container-native-virtualization/hco-bundle-registry-rhel9@sha256:60e89d7a99ff9f20e974430b802dd724a3bb6fa1e01e5a62daad98ac487b3063_amd64",
"9Base-CNV-4.13:container-native-virtualization/hco-bundle-registry-rhel9@sha256:dd20b138045ef1424d83a47e7abcfcbb2ac54577dcec5ed3c186390aaa4c9d84_arm64",
"9Base-CNV-4.13:container-native-virtualization/hostpath-csi-driver-rhel9@sha256:61e2824853d51347593ad909a5e546cd92e4216d6a1df5dffb50dd9cba277cce_amd64",
"9Base-CNV-4.13:container-native-virtualization/hostpath-csi-driver-rhel9@sha256:676d4c23a5f60dd331728af056b0a6b2d3358ac88da23299b1a98dfaca8f288e_arm64",
"9Base-CNV-4.13:container-native-virtualization/hostpath-provisioner-operator-rhel9@sha256:515be94be496c67f5b8fd5f4832fe4385e56476e6589897d6b9fbb9bb2b00f32_amd64",
"9Base-CNV-4.13:container-native-virtualization/hostpath-provisioner-operator-rhel9@sha256:571ae805641dea11646028c946039983c7fd82f138b915dcb8b80c39b465e63c_arm64",
"9Base-CNV-4.13:container-native-virtualization/hostpath-provisioner-rhel9@sha256:ac3fe350bedd6bc43596444ba0f279ccf8a144ab14ac5a9b80ea71c46390b7b4_amd64",
"9Base-CNV-4.13:container-native-virtualization/hostpath-provisioner-rhel9@sha256:d4ed87745b7ee2acca2d83e2c91c2f6dced1903c81495b50f2559b3ba2dde287_arm64",
"9Base-CNV-4.13:container-native-virtualization/hyperconverged-cluster-operator-rhel9@sha256:e5ab9f3be59d3568e3d672ab374efb16990ccf92192eac4e1244b10fcd7423e2_amd64",
"9Base-CNV-4.13:container-native-virtualization/hyperconverged-cluster-operator-rhel9@sha256:e681560b184189df03fc84c8a712f32289f42573dd348cda394b19565eb6eca8_arm64",
"9Base-CNV-4.13:container-native-virtualization/hyperconverged-cluster-webhook-rhel9@sha256:06d036d320b3027bb8370bb8e0f6fe8c9f0ec9bca7aac3b5c53698ba4a170042_arm64",
"9Base-CNV-4.13:container-native-virtualization/hyperconverged-cluster-webhook-rhel9@sha256:b5a01336180aad017df62cf8e652f2491b8263ba7e4dd07f858db1ef1924cf2f_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubemacpool-rhel9@sha256:4d190d81eeb3fbe9ed56cf3548dc83a3f81641bfdafa7b42dcfb0d2512566644_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubemacpool-rhel9@sha256:59862a59854f0d5b83dc25ba119f9586a8aff42b6e60d1922f8ae7b4567309ff_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubesecondarydns-rhel9@sha256:121d30d78cc57731ea2242ef2c32430890ac66c2723e65608d5e2f26c3f515cd_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubesecondarydns-rhel9@sha256:b1838f3c8ba3d8113bddea17b78c21e1c1490e2a4a07ea77014edee523d06347_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-console-plugin-rhel9@sha256:86a4b1e3d6ad1d56302c9c058f8bc5826dcfe6c46fb3e0ddaa06818645039020_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-console-plugin-rhel9@sha256:ffb2acd9ae09c1ef9ca756f5eaf6087d0a3957cfc824543949d25f556a97744d_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-dpdk-checkup-rhel9@sha256:525aceb9396010ebcdba14040f267889b807cd84db8e5b4030429b51f0fbf5fe_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-dpdk-checkup-rhel9@sha256:553c4686f56c66cc1e3c5ad9d4051f139d43f821eac3abb98ca5cdb8b5dfe202_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-ssp-operator-rhel9@sha256:901e6cad9534c7bd7c4018c60bccfe49d7280fba5a9901ab4c4d15e9345288c4_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-ssp-operator-rhel9@sha256:badeb0f65f543b209f6af761729d9778b7b73b97d55044016dfba3f38a1f6f18_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-cleanup-vm-rhel9@sha256:28e4975fa4dac22d9da32ed2a10aed039fd957b30140daa36bab2caa998be77a_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-cleanup-vm-rhel9@sha256:b0ff7e812a576ea848590655fc13a85832d5a39f68e7769ceab9da6949da88c7_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-copy-template-rhel9@sha256:4916a6c6b1f9b529187d3b4d5fc99b90157993767b3fe2ad36a9ec77fbb46b10_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-copy-template-rhel9@sha256:f71c36442f1b61cdde7ec58d2c3c78d2039f6d6108e6c35388ef7c1650971fa1_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-create-datavolume-rhel9@sha256:2ad49cf6e2242a9e5861929d9bcab1305a7fc4e34e708f99cff1d7253aa46167_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-create-datavolume-rhel9@sha256:7112400a4ecb23ee2110bf96372fcf9f96ad648a51aa944627b40eb59539a660_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-create-vm-from-template-rhel9@sha256:1411c65bbad7302710788327f6964a4bf5bc20ef70d5e46f4a5c6e7a0e7a0161_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-create-vm-from-template-rhel9@sha256:4d962618aa95600c60c9fc8b890186e510de91177d51949e12797a3558e31328_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-customize-rhel9@sha256:5c23d3f20ea9dcbe7109284d73078ecd516a070e964b844f8d80b1d92ebd55ee_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-customize-rhel9@sha256:a780244e48c6d4f87446d3754c3eb9ab79c0d54675c189da4a659f7a4d5668ea_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-sysprep-rhel9@sha256:84577d949a1bbcaa291c70729127bca4a8994df03068666baa23840877ea8392_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-sysprep-rhel9@sha256:aed630a597a090179e1b0e0c117e536df06b67d0f793f91936aa7388c0c5d7eb_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-modify-vm-template-rhel9@sha256:31d959b80cf57462e1705684bb7e1b78af26bd2c62f1c9e4e51e1d02199b05a8_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-modify-vm-template-rhel9@sha256:66aea526bc10e4c0136ba86e394bbdfe4fbd7f757d6f391a561b51d2ba2f4d46_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-operator-rhel9@sha256:d0cf0e81589f0938de45961eaddfc5ec4782738fd11082de0439b200534259eb_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-operator-rhel9@sha256:f1b1f5044db6bb945584f9d4f31d020597725a286ef368ed0aca2116abb31beb_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-wait-for-vmi-status-rhel9@sha256:39a15d03f113735df03b1a7408227eb9604d942c1f3c1992bcdc7eaf07662711_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-wait-for-vmi-status-rhel9@sha256:afb68af076954fcd18c7a4a1464ea0c2a766e8282eae980051906ed07eaa1707_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-template-validator-rhel9@sha256:02b22c7e7014b5e72d47fed8b6a268cf307638c5510adf3916c51f7f40a52a08_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-template-validator-rhel9@sha256:c0264b9271e602f85b2040ef7f207cdfa46038dc4fa6e4738bf196ef88a71cf8_amd64",
"9Base-CNV-4.13:container-native-virtualization/libguestfs-tools-rhel9@sha256:29ae84575bbca24553cf649256759fd96ff286971d80bc2db129154a7df9b283_amd64",
"9Base-CNV-4.13:container-native-virtualization/libguestfs-tools-rhel9@sha256:6558f60343e068b032167e2340b2c549c5f0258acc5d2614b60966ce79408b01_arm64",
"9Base-CNV-4.13:container-native-virtualization/multus-dynamic-networks-rhel9@sha256:3ecb0162a4b01d1590bf209d717b32a4f0835910d9979823f18c24acba41b503_arm64",
"9Base-CNV-4.13:container-native-virtualization/multus-dynamic-networks-rhel9@sha256:b7f68b6420009e21380d32d6459193aae45e93be9533debe17cb3108571b36b8_amd64",
"9Base-CNV-4.13:container-native-virtualization/ovs-cni-plugin-rhel9@sha256:0f1d372f418744e0aff59ecb0a38f53178aac9c2e9eecfd38aa25ed83e0d1360_arm64",
"9Base-CNV-4.13:container-native-virtualization/ovs-cni-plugin-rhel9@sha256:e8e7a44edbf1713fe74de5c4b8f691cce78f4440c4a32a16ba9ad16694a55396_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-api-rhel9@sha256:e68416321ca8c74a547b3d35897f54813c03481143e402e9bdc4daf315e35b5d_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-api-rhel9@sha256:fdb4ca1bb8b310d713d9c7e88f7d091f4460aa942dbeca5ebcf17281a06daffe_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-artifacts-server-rhel9@sha256:33d11c1832b49df39c1fca62bad40dbc5c30a452248339aaef449ac99509accb_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-artifacts-server-rhel9@sha256:81fc61b714baecb5a89fa6c0749c14566e0661b8e184ca602fc2e03b9cf431ee_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-apiserver-rhel9@sha256:f6128a63344ed2129f5bce648ddcfaa2869d31cde4b93328d3c22534b97ade10_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-apiserver-rhel9@sha256:feca273a691d09445c6cff6d36b5d590735e867656a9898ce0d89744d98e8006_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-cloner-rhel9@sha256:68e3b9b0291b4fb277ac430269ffce11d13b0a7688cf2ffcdb7f98759c36b4db_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-cloner-rhel9@sha256:6ac212767481bef64d8a7d0252bb8089c0f9751fad4a355aef71bd49dad2ad07_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-controller-rhel9@sha256:65f5263275d9f0a12b8fb057d82adf678778039ec873ca9bde182dea3413c9f1_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-controller-rhel9@sha256:d9e62b2019328be258489ac852eef25f8b1233f29abac6bcea5b406329f97fed_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-importer-rhel9@sha256:00a6d9d24ca1466d450b02269ec3144fc7550f0e5c696e869fbf7ce10cae6093_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-importer-rhel9@sha256:2df07fb21a3575e74aa16ded20129828f2300cd33e8ab369b0362062d49e62d0_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-operator-rhel9@sha256:20ec064750faedd97d11b797c8c1d9a1db5d60d7d76e82e65cfd05eb79d65e29_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-operator-rhel9@sha256:802ee8923d9d8e406b23911406f9748756c0ef4d6954e9e2fd5fb4bdf91dde9a_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-uploadproxy-rhel9@sha256:392d0f61f462c707adfdc21e4239c5c09d8520a80486b41d9d9ae479267d6124_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-uploadproxy-rhel9@sha256:6775f34353eec8f35bead9411dde155530d079bb8d51582fb1f2aacc27dbde1d_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-uploadserver-rhel9@sha256:4528c24672689cfb6505761b6b108fbcc04488192733f23d2bfe39cd42a1d743_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-uploadserver-rhel9@sha256:b22048390387380af94e267c8a9a66813c515997456d59d8ebac1486916b6585_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-controller-rhel9@sha256:3e7880149ee9a68286e390beb3d9779f7403c30fc5136e5370e0e4690a3fd243_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-controller-rhel9@sha256:970edc281d7a731e9f7e8c2d4440fe48a221e5e355d5235c5413b4c3adb28503_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-exportproxy-rhel9@sha256:1bda34d5bff734ad997202f29a5ff6f7362fd79fa90511a422442ef2e3681198_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-exportproxy-rhel9@sha256:de3c4afbf7669b98517cbef2490ec186f0553dd97b05bed80ec36dd883fe507b_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-exportserver-rhel9@sha256:3f7f98645176d42c63cca5c0fc3182a03121af87446ca421b6c72baf07dfca0d_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-exportserver-rhel9@sha256:8f12955cd777eb2409037a6968aa92f50c99d6e07e722951dbcfd0c8c9829b5e_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-handler-rhel9@sha256:5fc47110d866d8048aec50689090ce10705d19d3bb48d2b06727d6d569003af7_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-handler-rhel9@sha256:84ba79ae9658699147d2493df2582ab6df10adbff4d44a533c3fe6a9f45f9691_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-launcher-rhel9@sha256:4990d40d9987d5126d105dd45be2501eaded248cb61bdde5ea8d359bc1e7ebef_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-launcher-rhel9@sha256:95aeacb98209e0baef27ce0e02fbac38d693cea74808fc77107efda0f344bcb5_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-operator-rhel9@sha256:5c1a7e4ed2061938987b900a2394f07121d4037350c9bb6485213a2adfea787d_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-operator-rhel9@sha256:66b1b3b379121d6411ba22283e7d991617177330c93746d37753ab7812b9a00b_arm64",
"9Base-CNV-4.13:container-native-virtualization/virtio-win-rhel9@sha256:8735f51da918408a8826601c082d1b29accf26d59b9978da89b980cb509c1102_arm64",
"9Base-CNV-4.13:container-native-virtualization/virtio-win-rhel9@sha256:d147d2a6eb6f907d1e88f61aaca83596853bc72164583d6dda2b1154b490de25_amd64",
"9Base-CNV-4.13:container-native-virtualization/vm-console-proxy-rhel9@sha256:70a8d0cd66182c25e02679540bae1368b2a9cf687532b58dba41ef30c5ca00c1_arm64",
"9Base-CNV-4.13:container-native-virtualization/vm-console-proxy-rhel9@sha256:7ca921f98f6d81a126907127a611146fb53397869a628678faa1e289c01d22b2_amd64",
"9Base-CNV-4.13:container-native-virtualization/vm-network-latency-checkup-rhel9@sha256:503ea7ac914a9b54e9d665a0227ee0b5d5200cdb5d692aa94c07dd1518d91b70_arm64",
"9Base-CNV-4.13:container-native-virtualization/vm-network-latency-checkup-rhel9@sha256:59fd965975bccf641a0fa7aa01374d45057bd03cda7528248a84b60b1205bf57_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "golang: net/url: JoinPath does not strip relative path components in all circumstances"
},
{
"acknowledgments": [
{
"names": [
"Adam Korczynski"
],
"organization": "ADA Logics"
},
{
"names": [
"OSS-Fuzz"
]
}
],
"cve": "CVE-2022-41715",
"discovery_date": "2022-10-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2132872"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the golang package, where programs that compile regular expressions from untrusted sources are vulnerable to memory exhaustion or a denial of service. The parsed regexp representation is linear in the input size. Still, in some cases, the constant factor can be as high as 40,000, making a relatively small regexp consume larger amounts of memory. After the fix, each regexp being parsed is limited to a 256 MB memory footprint. Regular expressions whose representation would use more space than that are rejected. Routine use of regular expressions is unaffected.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: regexp/syntax: limit memory used by parsing regexps",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The opportunity for a Denial of Service is limited to the golang runtime. In the case of OpenShift Container Platform, this would be restricted within each individual container. There are multiple layers of guide rails (Golang\u2019s Garbage Collector; OpenShift\u2019s resource constraints imposed at the container and cluster levels) which would require a malicious user to continue submitting attacks for there to be any enduring impact. They would also need access to external server resources to be able to send a massive volume of requests to cause a significant impact on server operations.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"9Base-CNV-4.13:container-native-virtualization/bridge-marker-rhel9@sha256:8eac196b30a648989cdca5cb153a3bc3d34e47339acba0e4f760bd366496c99d_amd64",
"9Base-CNV-4.13:container-native-virtualization/bridge-marker-rhel9@sha256:e8a55aee3d75a316bb0d7a554c737198823df04b3c05e481c17e45eb2153bced_arm64",
"9Base-CNV-4.13:container-native-virtualization/cluster-network-addons-operator-rhel9@sha256:3bff33e3f40cd1e2b519c2db56734d4bb8df883e155c2f20b1cb9d3d184daec1_amd64",
"9Base-CNV-4.13:container-native-virtualization/cluster-network-addons-operator-rhel9@sha256:f439d2f420bb59eb1d5af14ce2002648d0cfc155d1a1466c8aac9b661fe902b8_arm64",
"9Base-CNV-4.13:container-native-virtualization/cnv-containernetworking-plugins-rhel9@sha256:89f22e541f61a660c9aa9f38ef58e80b84a0517f74e84292107fc252c25465c9_arm64",
"9Base-CNV-4.13:container-native-virtualization/cnv-containernetworking-plugins-rhel9@sha256:bf471997e54e4a75b0d71f492ab295787fdbb14d8c85c4ea8c03f0552dbc3755_amd64",
"9Base-CNV-4.13:container-native-virtualization/cnv-must-gather-rhel9@sha256:9e8efd76924958eb605401abdac08eba97fb83a1ada383bc87a7fb7c87b3a455_arm64",
"9Base-CNV-4.13:container-native-virtualization/cnv-must-gather-rhel9@sha256:b9fc32b5fabedd65a4c3a471879c808af2087277de4278adaa115a732f0468da_amd64",
"9Base-CNV-4.13:container-native-virtualization/hco-bundle-registry-rhel9@sha256:60e89d7a99ff9f20e974430b802dd724a3bb6fa1e01e5a62daad98ac487b3063_amd64",
"9Base-CNV-4.13:container-native-virtualization/hco-bundle-registry-rhel9@sha256:dd20b138045ef1424d83a47e7abcfcbb2ac54577dcec5ed3c186390aaa4c9d84_arm64",
"9Base-CNV-4.13:container-native-virtualization/hostpath-csi-driver-rhel9@sha256:61e2824853d51347593ad909a5e546cd92e4216d6a1df5dffb50dd9cba277cce_amd64",
"9Base-CNV-4.13:container-native-virtualization/hostpath-csi-driver-rhel9@sha256:676d4c23a5f60dd331728af056b0a6b2d3358ac88da23299b1a98dfaca8f288e_arm64",
"9Base-CNV-4.13:container-native-virtualization/hostpath-provisioner-operator-rhel9@sha256:515be94be496c67f5b8fd5f4832fe4385e56476e6589897d6b9fbb9bb2b00f32_amd64",
"9Base-CNV-4.13:container-native-virtualization/hostpath-provisioner-operator-rhel9@sha256:571ae805641dea11646028c946039983c7fd82f138b915dcb8b80c39b465e63c_arm64",
"9Base-CNV-4.13:container-native-virtualization/hostpath-provisioner-rhel9@sha256:ac3fe350bedd6bc43596444ba0f279ccf8a144ab14ac5a9b80ea71c46390b7b4_amd64",
"9Base-CNV-4.13:container-native-virtualization/hostpath-provisioner-rhel9@sha256:d4ed87745b7ee2acca2d83e2c91c2f6dced1903c81495b50f2559b3ba2dde287_arm64",
"9Base-CNV-4.13:container-native-virtualization/hyperconverged-cluster-operator-rhel9@sha256:e5ab9f3be59d3568e3d672ab374efb16990ccf92192eac4e1244b10fcd7423e2_amd64",
"9Base-CNV-4.13:container-native-virtualization/hyperconverged-cluster-operator-rhel9@sha256:e681560b184189df03fc84c8a712f32289f42573dd348cda394b19565eb6eca8_arm64",
"9Base-CNV-4.13:container-native-virtualization/hyperconverged-cluster-webhook-rhel9@sha256:06d036d320b3027bb8370bb8e0f6fe8c9f0ec9bca7aac3b5c53698ba4a170042_arm64",
"9Base-CNV-4.13:container-native-virtualization/hyperconverged-cluster-webhook-rhel9@sha256:b5a01336180aad017df62cf8e652f2491b8263ba7e4dd07f858db1ef1924cf2f_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubemacpool-rhel9@sha256:4d190d81eeb3fbe9ed56cf3548dc83a3f81641bfdafa7b42dcfb0d2512566644_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubemacpool-rhel9@sha256:59862a59854f0d5b83dc25ba119f9586a8aff42b6e60d1922f8ae7b4567309ff_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubesecondarydns-rhel9@sha256:121d30d78cc57731ea2242ef2c32430890ac66c2723e65608d5e2f26c3f515cd_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubesecondarydns-rhel9@sha256:b1838f3c8ba3d8113bddea17b78c21e1c1490e2a4a07ea77014edee523d06347_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-console-plugin-rhel9@sha256:86a4b1e3d6ad1d56302c9c058f8bc5826dcfe6c46fb3e0ddaa06818645039020_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-console-plugin-rhel9@sha256:ffb2acd9ae09c1ef9ca756f5eaf6087d0a3957cfc824543949d25f556a97744d_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-dpdk-checkup-rhel9@sha256:525aceb9396010ebcdba14040f267889b807cd84db8e5b4030429b51f0fbf5fe_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-dpdk-checkup-rhel9@sha256:553c4686f56c66cc1e3c5ad9d4051f139d43f821eac3abb98ca5cdb8b5dfe202_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-ssp-operator-rhel9@sha256:901e6cad9534c7bd7c4018c60bccfe49d7280fba5a9901ab4c4d15e9345288c4_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-ssp-operator-rhel9@sha256:badeb0f65f543b209f6af761729d9778b7b73b97d55044016dfba3f38a1f6f18_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-cleanup-vm-rhel9@sha256:28e4975fa4dac22d9da32ed2a10aed039fd957b30140daa36bab2caa998be77a_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-cleanup-vm-rhel9@sha256:b0ff7e812a576ea848590655fc13a85832d5a39f68e7769ceab9da6949da88c7_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-copy-template-rhel9@sha256:4916a6c6b1f9b529187d3b4d5fc99b90157993767b3fe2ad36a9ec77fbb46b10_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-copy-template-rhel9@sha256:f71c36442f1b61cdde7ec58d2c3c78d2039f6d6108e6c35388ef7c1650971fa1_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-create-datavolume-rhel9@sha256:2ad49cf6e2242a9e5861929d9bcab1305a7fc4e34e708f99cff1d7253aa46167_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-create-datavolume-rhel9@sha256:7112400a4ecb23ee2110bf96372fcf9f96ad648a51aa944627b40eb59539a660_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-create-vm-from-template-rhel9@sha256:1411c65bbad7302710788327f6964a4bf5bc20ef70d5e46f4a5c6e7a0e7a0161_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-create-vm-from-template-rhel9@sha256:4d962618aa95600c60c9fc8b890186e510de91177d51949e12797a3558e31328_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-customize-rhel9@sha256:5c23d3f20ea9dcbe7109284d73078ecd516a070e964b844f8d80b1d92ebd55ee_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-customize-rhel9@sha256:a780244e48c6d4f87446d3754c3eb9ab79c0d54675c189da4a659f7a4d5668ea_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-sysprep-rhel9@sha256:84577d949a1bbcaa291c70729127bca4a8994df03068666baa23840877ea8392_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-sysprep-rhel9@sha256:aed630a597a090179e1b0e0c117e536df06b67d0f793f91936aa7388c0c5d7eb_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-modify-vm-template-rhel9@sha256:31d959b80cf57462e1705684bb7e1b78af26bd2c62f1c9e4e51e1d02199b05a8_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-modify-vm-template-rhel9@sha256:66aea526bc10e4c0136ba86e394bbdfe4fbd7f757d6f391a561b51d2ba2f4d46_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-operator-rhel9@sha256:d0cf0e81589f0938de45961eaddfc5ec4782738fd11082de0439b200534259eb_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-operator-rhel9@sha256:f1b1f5044db6bb945584f9d4f31d020597725a286ef368ed0aca2116abb31beb_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-wait-for-vmi-status-rhel9@sha256:39a15d03f113735df03b1a7408227eb9604d942c1f3c1992bcdc7eaf07662711_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-wait-for-vmi-status-rhel9@sha256:afb68af076954fcd18c7a4a1464ea0c2a766e8282eae980051906ed07eaa1707_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-template-validator-rhel9@sha256:02b22c7e7014b5e72d47fed8b6a268cf307638c5510adf3916c51f7f40a52a08_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-template-validator-rhel9@sha256:c0264b9271e602f85b2040ef7f207cdfa46038dc4fa6e4738bf196ef88a71cf8_amd64",
"9Base-CNV-4.13:container-native-virtualization/libguestfs-tools-rhel9@sha256:29ae84575bbca24553cf649256759fd96ff286971d80bc2db129154a7df9b283_amd64",
"9Base-CNV-4.13:container-native-virtualization/libguestfs-tools-rhel9@sha256:6558f60343e068b032167e2340b2c549c5f0258acc5d2614b60966ce79408b01_arm64",
"9Base-CNV-4.13:container-native-virtualization/multus-dynamic-networks-rhel9@sha256:3ecb0162a4b01d1590bf209d717b32a4f0835910d9979823f18c24acba41b503_arm64",
"9Base-CNV-4.13:container-native-virtualization/multus-dynamic-networks-rhel9@sha256:b7f68b6420009e21380d32d6459193aae45e93be9533debe17cb3108571b36b8_amd64",
"9Base-CNV-4.13:container-native-virtualization/ovs-cni-plugin-rhel9@sha256:0f1d372f418744e0aff59ecb0a38f53178aac9c2e9eecfd38aa25ed83e0d1360_arm64",
"9Base-CNV-4.13:container-native-virtualization/ovs-cni-plugin-rhel9@sha256:e8e7a44edbf1713fe74de5c4b8f691cce78f4440c4a32a16ba9ad16694a55396_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-api-rhel9@sha256:e68416321ca8c74a547b3d35897f54813c03481143e402e9bdc4daf315e35b5d_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-api-rhel9@sha256:fdb4ca1bb8b310d713d9c7e88f7d091f4460aa942dbeca5ebcf17281a06daffe_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-artifacts-server-rhel9@sha256:33d11c1832b49df39c1fca62bad40dbc5c30a452248339aaef449ac99509accb_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-artifacts-server-rhel9@sha256:81fc61b714baecb5a89fa6c0749c14566e0661b8e184ca602fc2e03b9cf431ee_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-apiserver-rhel9@sha256:f6128a63344ed2129f5bce648ddcfaa2869d31cde4b93328d3c22534b97ade10_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-apiserver-rhel9@sha256:feca273a691d09445c6cff6d36b5d590735e867656a9898ce0d89744d98e8006_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-cloner-rhel9@sha256:68e3b9b0291b4fb277ac430269ffce11d13b0a7688cf2ffcdb7f98759c36b4db_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-cloner-rhel9@sha256:6ac212767481bef64d8a7d0252bb8089c0f9751fad4a355aef71bd49dad2ad07_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-controller-rhel9@sha256:65f5263275d9f0a12b8fb057d82adf678778039ec873ca9bde182dea3413c9f1_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-controller-rhel9@sha256:d9e62b2019328be258489ac852eef25f8b1233f29abac6bcea5b406329f97fed_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-importer-rhel9@sha256:00a6d9d24ca1466d450b02269ec3144fc7550f0e5c696e869fbf7ce10cae6093_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-importer-rhel9@sha256:2df07fb21a3575e74aa16ded20129828f2300cd33e8ab369b0362062d49e62d0_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-operator-rhel9@sha256:20ec064750faedd97d11b797c8c1d9a1db5d60d7d76e82e65cfd05eb79d65e29_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-operator-rhel9@sha256:802ee8923d9d8e406b23911406f9748756c0ef4d6954e9e2fd5fb4bdf91dde9a_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-uploadproxy-rhel9@sha256:392d0f61f462c707adfdc21e4239c5c09d8520a80486b41d9d9ae479267d6124_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-uploadproxy-rhel9@sha256:6775f34353eec8f35bead9411dde155530d079bb8d51582fb1f2aacc27dbde1d_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-uploadserver-rhel9@sha256:4528c24672689cfb6505761b6b108fbcc04488192733f23d2bfe39cd42a1d743_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-uploadserver-rhel9@sha256:b22048390387380af94e267c8a9a66813c515997456d59d8ebac1486916b6585_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-controller-rhel9@sha256:3e7880149ee9a68286e390beb3d9779f7403c30fc5136e5370e0e4690a3fd243_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-controller-rhel9@sha256:970edc281d7a731e9f7e8c2d4440fe48a221e5e355d5235c5413b4c3adb28503_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-exportproxy-rhel9@sha256:1bda34d5bff734ad997202f29a5ff6f7362fd79fa90511a422442ef2e3681198_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-exportproxy-rhel9@sha256:de3c4afbf7669b98517cbef2490ec186f0553dd97b05bed80ec36dd883fe507b_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-exportserver-rhel9@sha256:3f7f98645176d42c63cca5c0fc3182a03121af87446ca421b6c72baf07dfca0d_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-exportserver-rhel9@sha256:8f12955cd777eb2409037a6968aa92f50c99d6e07e722951dbcfd0c8c9829b5e_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-handler-rhel9@sha256:5fc47110d866d8048aec50689090ce10705d19d3bb48d2b06727d6d569003af7_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-handler-rhel9@sha256:84ba79ae9658699147d2493df2582ab6df10adbff4d44a533c3fe6a9f45f9691_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-launcher-rhel9@sha256:4990d40d9987d5126d105dd45be2501eaded248cb61bdde5ea8d359bc1e7ebef_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-launcher-rhel9@sha256:95aeacb98209e0baef27ce0e02fbac38d693cea74808fc77107efda0f344bcb5_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-operator-rhel9@sha256:5c1a7e4ed2061938987b900a2394f07121d4037350c9bb6485213a2adfea787d_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-operator-rhel9@sha256:66b1b3b379121d6411ba22283e7d991617177330c93746d37753ab7812b9a00b_arm64",
"9Base-CNV-4.13:container-native-virtualization/virtio-win-rhel9@sha256:8735f51da918408a8826601c082d1b29accf26d59b9978da89b980cb509c1102_arm64",
"9Base-CNV-4.13:container-native-virtualization/virtio-win-rhel9@sha256:d147d2a6eb6f907d1e88f61aaca83596853bc72164583d6dda2b1154b490de25_amd64",
"9Base-CNV-4.13:container-native-virtualization/vm-console-proxy-rhel9@sha256:70a8d0cd66182c25e02679540bae1368b2a9cf687532b58dba41ef30c5ca00c1_arm64",
"9Base-CNV-4.13:container-native-virtualization/vm-console-proxy-rhel9@sha256:7ca921f98f6d81a126907127a611146fb53397869a628678faa1e289c01d22b2_amd64",
"9Base-CNV-4.13:container-native-virtualization/vm-network-latency-checkup-rhel9@sha256:503ea7ac914a9b54e9d665a0227ee0b5d5200cdb5d692aa94c07dd1518d91b70_arm64",
"9Base-CNV-4.13:container-native-virtualization/vm-network-latency-checkup-rhel9@sha256:59fd965975bccf641a0fa7aa01374d45057bd03cda7528248a84b60b1205bf57_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-41715"
},
{
"category": "external",
"summary": "RHBZ#2132872",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2132872"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-41715",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41715"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-41715",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-41715"
},
{
"category": "external",
"summary": "https://github.com/golang/go/issues/55949",
"url": "https://github.com/golang/go/issues/55949"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/xtuG5faxtaU?pli=1",
"url": "https://groups.google.com/g/golang-announce/c/xtuG5faxtaU?pli=1"
}
],
"release_date": "2022-10-04T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-05-18T02:55:08+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"9Base-CNV-4.13:container-native-virtualization/bridge-marker-rhel9@sha256:8eac196b30a648989cdca5cb153a3bc3d34e47339acba0e4f760bd366496c99d_amd64",
"9Base-CNV-4.13:container-native-virtualization/bridge-marker-rhel9@sha256:e8a55aee3d75a316bb0d7a554c737198823df04b3c05e481c17e45eb2153bced_arm64",
"9Base-CNV-4.13:container-native-virtualization/cluster-network-addons-operator-rhel9@sha256:3bff33e3f40cd1e2b519c2db56734d4bb8df883e155c2f20b1cb9d3d184daec1_amd64",
"9Base-CNV-4.13:container-native-virtualization/cluster-network-addons-operator-rhel9@sha256:f439d2f420bb59eb1d5af14ce2002648d0cfc155d1a1466c8aac9b661fe902b8_arm64",
"9Base-CNV-4.13:container-native-virtualization/cnv-containernetworking-plugins-rhel9@sha256:89f22e541f61a660c9aa9f38ef58e80b84a0517f74e84292107fc252c25465c9_arm64",
"9Base-CNV-4.13:container-native-virtualization/cnv-containernetworking-plugins-rhel9@sha256:bf471997e54e4a75b0d71f492ab295787fdbb14d8c85c4ea8c03f0552dbc3755_amd64",
"9Base-CNV-4.13:container-native-virtualization/cnv-must-gather-rhel9@sha256:9e8efd76924958eb605401abdac08eba97fb83a1ada383bc87a7fb7c87b3a455_arm64",
"9Base-CNV-4.13:container-native-virtualization/cnv-must-gather-rhel9@sha256:b9fc32b5fabedd65a4c3a471879c808af2087277de4278adaa115a732f0468da_amd64",
"9Base-CNV-4.13:container-native-virtualization/hco-bundle-registry-rhel9@sha256:60e89d7a99ff9f20e974430b802dd724a3bb6fa1e01e5a62daad98ac487b3063_amd64",
"9Base-CNV-4.13:container-native-virtualization/hco-bundle-registry-rhel9@sha256:dd20b138045ef1424d83a47e7abcfcbb2ac54577dcec5ed3c186390aaa4c9d84_arm64",
"9Base-CNV-4.13:container-native-virtualization/hostpath-csi-driver-rhel9@sha256:61e2824853d51347593ad909a5e546cd92e4216d6a1df5dffb50dd9cba277cce_amd64",
"9Base-CNV-4.13:container-native-virtualization/hostpath-csi-driver-rhel9@sha256:676d4c23a5f60dd331728af056b0a6b2d3358ac88da23299b1a98dfaca8f288e_arm64",
"9Base-CNV-4.13:container-native-virtualization/hostpath-provisioner-operator-rhel9@sha256:515be94be496c67f5b8fd5f4832fe4385e56476e6589897d6b9fbb9bb2b00f32_amd64",
"9Base-CNV-4.13:container-native-virtualization/hostpath-provisioner-operator-rhel9@sha256:571ae805641dea11646028c946039983c7fd82f138b915dcb8b80c39b465e63c_arm64",
"9Base-CNV-4.13:container-native-virtualization/hostpath-provisioner-rhel9@sha256:ac3fe350bedd6bc43596444ba0f279ccf8a144ab14ac5a9b80ea71c46390b7b4_amd64",
"9Base-CNV-4.13:container-native-virtualization/hostpath-provisioner-rhel9@sha256:d4ed87745b7ee2acca2d83e2c91c2f6dced1903c81495b50f2559b3ba2dde287_arm64",
"9Base-CNV-4.13:container-native-virtualization/hyperconverged-cluster-operator-rhel9@sha256:e5ab9f3be59d3568e3d672ab374efb16990ccf92192eac4e1244b10fcd7423e2_amd64",
"9Base-CNV-4.13:container-native-virtualization/hyperconverged-cluster-operator-rhel9@sha256:e681560b184189df03fc84c8a712f32289f42573dd348cda394b19565eb6eca8_arm64",
"9Base-CNV-4.13:container-native-virtualization/hyperconverged-cluster-webhook-rhel9@sha256:06d036d320b3027bb8370bb8e0f6fe8c9f0ec9bca7aac3b5c53698ba4a170042_arm64",
"9Base-CNV-4.13:container-native-virtualization/hyperconverged-cluster-webhook-rhel9@sha256:b5a01336180aad017df62cf8e652f2491b8263ba7e4dd07f858db1ef1924cf2f_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubemacpool-rhel9@sha256:4d190d81eeb3fbe9ed56cf3548dc83a3f81641bfdafa7b42dcfb0d2512566644_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubemacpool-rhel9@sha256:59862a59854f0d5b83dc25ba119f9586a8aff42b6e60d1922f8ae7b4567309ff_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubesecondarydns-rhel9@sha256:121d30d78cc57731ea2242ef2c32430890ac66c2723e65608d5e2f26c3f515cd_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubesecondarydns-rhel9@sha256:b1838f3c8ba3d8113bddea17b78c21e1c1490e2a4a07ea77014edee523d06347_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-console-plugin-rhel9@sha256:86a4b1e3d6ad1d56302c9c058f8bc5826dcfe6c46fb3e0ddaa06818645039020_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-console-plugin-rhel9@sha256:ffb2acd9ae09c1ef9ca756f5eaf6087d0a3957cfc824543949d25f556a97744d_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-dpdk-checkup-rhel9@sha256:525aceb9396010ebcdba14040f267889b807cd84db8e5b4030429b51f0fbf5fe_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-dpdk-checkup-rhel9@sha256:553c4686f56c66cc1e3c5ad9d4051f139d43f821eac3abb98ca5cdb8b5dfe202_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-ssp-operator-rhel9@sha256:901e6cad9534c7bd7c4018c60bccfe49d7280fba5a9901ab4c4d15e9345288c4_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-ssp-operator-rhel9@sha256:badeb0f65f543b209f6af761729d9778b7b73b97d55044016dfba3f38a1f6f18_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-cleanup-vm-rhel9@sha256:28e4975fa4dac22d9da32ed2a10aed039fd957b30140daa36bab2caa998be77a_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-cleanup-vm-rhel9@sha256:b0ff7e812a576ea848590655fc13a85832d5a39f68e7769ceab9da6949da88c7_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-copy-template-rhel9@sha256:4916a6c6b1f9b529187d3b4d5fc99b90157993767b3fe2ad36a9ec77fbb46b10_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-copy-template-rhel9@sha256:f71c36442f1b61cdde7ec58d2c3c78d2039f6d6108e6c35388ef7c1650971fa1_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-create-datavolume-rhel9@sha256:2ad49cf6e2242a9e5861929d9bcab1305a7fc4e34e708f99cff1d7253aa46167_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-create-datavolume-rhel9@sha256:7112400a4ecb23ee2110bf96372fcf9f96ad648a51aa944627b40eb59539a660_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-create-vm-from-template-rhel9@sha256:1411c65bbad7302710788327f6964a4bf5bc20ef70d5e46f4a5c6e7a0e7a0161_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-create-vm-from-template-rhel9@sha256:4d962618aa95600c60c9fc8b890186e510de91177d51949e12797a3558e31328_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-customize-rhel9@sha256:5c23d3f20ea9dcbe7109284d73078ecd516a070e964b844f8d80b1d92ebd55ee_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-customize-rhel9@sha256:a780244e48c6d4f87446d3754c3eb9ab79c0d54675c189da4a659f7a4d5668ea_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-sysprep-rhel9@sha256:84577d949a1bbcaa291c70729127bca4a8994df03068666baa23840877ea8392_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-sysprep-rhel9@sha256:aed630a597a090179e1b0e0c117e536df06b67d0f793f91936aa7388c0c5d7eb_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-modify-vm-template-rhel9@sha256:31d959b80cf57462e1705684bb7e1b78af26bd2c62f1c9e4e51e1d02199b05a8_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-modify-vm-template-rhel9@sha256:66aea526bc10e4c0136ba86e394bbdfe4fbd7f757d6f391a561b51d2ba2f4d46_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-operator-rhel9@sha256:d0cf0e81589f0938de45961eaddfc5ec4782738fd11082de0439b200534259eb_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-operator-rhel9@sha256:f1b1f5044db6bb945584f9d4f31d020597725a286ef368ed0aca2116abb31beb_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-wait-for-vmi-status-rhel9@sha256:39a15d03f113735df03b1a7408227eb9604d942c1f3c1992bcdc7eaf07662711_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-wait-for-vmi-status-rhel9@sha256:afb68af076954fcd18c7a4a1464ea0c2a766e8282eae980051906ed07eaa1707_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-template-validator-rhel9@sha256:02b22c7e7014b5e72d47fed8b6a268cf307638c5510adf3916c51f7f40a52a08_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-template-validator-rhel9@sha256:c0264b9271e602f85b2040ef7f207cdfa46038dc4fa6e4738bf196ef88a71cf8_amd64",
"9Base-CNV-4.13:container-native-virtualization/libguestfs-tools-rhel9@sha256:29ae84575bbca24553cf649256759fd96ff286971d80bc2db129154a7df9b283_amd64",
"9Base-CNV-4.13:container-native-virtualization/libguestfs-tools-rhel9@sha256:6558f60343e068b032167e2340b2c549c5f0258acc5d2614b60966ce79408b01_arm64",
"9Base-CNV-4.13:container-native-virtualization/multus-dynamic-networks-rhel9@sha256:3ecb0162a4b01d1590bf209d717b32a4f0835910d9979823f18c24acba41b503_arm64",
"9Base-CNV-4.13:container-native-virtualization/multus-dynamic-networks-rhel9@sha256:b7f68b6420009e21380d32d6459193aae45e93be9533debe17cb3108571b36b8_amd64",
"9Base-CNV-4.13:container-native-virtualization/ovs-cni-plugin-rhel9@sha256:0f1d372f418744e0aff59ecb0a38f53178aac9c2e9eecfd38aa25ed83e0d1360_arm64",
"9Base-CNV-4.13:container-native-virtualization/ovs-cni-plugin-rhel9@sha256:e8e7a44edbf1713fe74de5c4b8f691cce78f4440c4a32a16ba9ad16694a55396_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-api-rhel9@sha256:e68416321ca8c74a547b3d35897f54813c03481143e402e9bdc4daf315e35b5d_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-api-rhel9@sha256:fdb4ca1bb8b310d713d9c7e88f7d091f4460aa942dbeca5ebcf17281a06daffe_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-artifacts-server-rhel9@sha256:33d11c1832b49df39c1fca62bad40dbc5c30a452248339aaef449ac99509accb_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-artifacts-server-rhel9@sha256:81fc61b714baecb5a89fa6c0749c14566e0661b8e184ca602fc2e03b9cf431ee_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-apiserver-rhel9@sha256:f6128a63344ed2129f5bce648ddcfaa2869d31cde4b93328d3c22534b97ade10_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-apiserver-rhel9@sha256:feca273a691d09445c6cff6d36b5d590735e867656a9898ce0d89744d98e8006_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-cloner-rhel9@sha256:68e3b9b0291b4fb277ac430269ffce11d13b0a7688cf2ffcdb7f98759c36b4db_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-cloner-rhel9@sha256:6ac212767481bef64d8a7d0252bb8089c0f9751fad4a355aef71bd49dad2ad07_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-controller-rhel9@sha256:65f5263275d9f0a12b8fb057d82adf678778039ec873ca9bde182dea3413c9f1_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-controller-rhel9@sha256:d9e62b2019328be258489ac852eef25f8b1233f29abac6bcea5b406329f97fed_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-importer-rhel9@sha256:00a6d9d24ca1466d450b02269ec3144fc7550f0e5c696e869fbf7ce10cae6093_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-importer-rhel9@sha256:2df07fb21a3575e74aa16ded20129828f2300cd33e8ab369b0362062d49e62d0_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-operator-rhel9@sha256:20ec064750faedd97d11b797c8c1d9a1db5d60d7d76e82e65cfd05eb79d65e29_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-operator-rhel9@sha256:802ee8923d9d8e406b23911406f9748756c0ef4d6954e9e2fd5fb4bdf91dde9a_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-uploadproxy-rhel9@sha256:392d0f61f462c707adfdc21e4239c5c09d8520a80486b41d9d9ae479267d6124_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-uploadproxy-rhel9@sha256:6775f34353eec8f35bead9411dde155530d079bb8d51582fb1f2aacc27dbde1d_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-uploadserver-rhel9@sha256:4528c24672689cfb6505761b6b108fbcc04488192733f23d2bfe39cd42a1d743_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-uploadserver-rhel9@sha256:b22048390387380af94e267c8a9a66813c515997456d59d8ebac1486916b6585_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-controller-rhel9@sha256:3e7880149ee9a68286e390beb3d9779f7403c30fc5136e5370e0e4690a3fd243_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-controller-rhel9@sha256:970edc281d7a731e9f7e8c2d4440fe48a221e5e355d5235c5413b4c3adb28503_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-exportproxy-rhel9@sha256:1bda34d5bff734ad997202f29a5ff6f7362fd79fa90511a422442ef2e3681198_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-exportproxy-rhel9@sha256:de3c4afbf7669b98517cbef2490ec186f0553dd97b05bed80ec36dd883fe507b_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-exportserver-rhel9@sha256:3f7f98645176d42c63cca5c0fc3182a03121af87446ca421b6c72baf07dfca0d_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-exportserver-rhel9@sha256:8f12955cd777eb2409037a6968aa92f50c99d6e07e722951dbcfd0c8c9829b5e_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-handler-rhel9@sha256:5fc47110d866d8048aec50689090ce10705d19d3bb48d2b06727d6d569003af7_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-handler-rhel9@sha256:84ba79ae9658699147d2493df2582ab6df10adbff4d44a533c3fe6a9f45f9691_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-launcher-rhel9@sha256:4990d40d9987d5126d105dd45be2501eaded248cb61bdde5ea8d359bc1e7ebef_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-launcher-rhel9@sha256:95aeacb98209e0baef27ce0e02fbac38d693cea74808fc77107efda0f344bcb5_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-operator-rhel9@sha256:5c1a7e4ed2061938987b900a2394f07121d4037350c9bb6485213a2adfea787d_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-operator-rhel9@sha256:66b1b3b379121d6411ba22283e7d991617177330c93746d37753ab7812b9a00b_arm64",
"9Base-CNV-4.13:container-native-virtualization/virtio-win-rhel9@sha256:8735f51da918408a8826601c082d1b29accf26d59b9978da89b980cb509c1102_arm64",
"9Base-CNV-4.13:container-native-virtualization/virtio-win-rhel9@sha256:d147d2a6eb6f907d1e88f61aaca83596853bc72164583d6dda2b1154b490de25_amd64",
"9Base-CNV-4.13:container-native-virtualization/vm-console-proxy-rhel9@sha256:70a8d0cd66182c25e02679540bae1368b2a9cf687532b58dba41ef30c5ca00c1_arm64",
"9Base-CNV-4.13:container-native-virtualization/vm-console-proxy-rhel9@sha256:7ca921f98f6d81a126907127a611146fb53397869a628678faa1e289c01d22b2_amd64",
"9Base-CNV-4.13:container-native-virtualization/vm-network-latency-checkup-rhel9@sha256:503ea7ac914a9b54e9d665a0227ee0b5d5200cdb5d692aa94c07dd1518d91b70_arm64",
"9Base-CNV-4.13:container-native-virtualization/vm-network-latency-checkup-rhel9@sha256:59fd965975bccf641a0fa7aa01374d45057bd03cda7528248a84b60b1205bf57_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:3205"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"9Base-CNV-4.13:container-native-virtualization/bridge-marker-rhel9@sha256:8eac196b30a648989cdca5cb153a3bc3d34e47339acba0e4f760bd366496c99d_amd64",
"9Base-CNV-4.13:container-native-virtualization/bridge-marker-rhel9@sha256:e8a55aee3d75a316bb0d7a554c737198823df04b3c05e481c17e45eb2153bced_arm64",
"9Base-CNV-4.13:container-native-virtualization/cluster-network-addons-operator-rhel9@sha256:3bff33e3f40cd1e2b519c2db56734d4bb8df883e155c2f20b1cb9d3d184daec1_amd64",
"9Base-CNV-4.13:container-native-virtualization/cluster-network-addons-operator-rhel9@sha256:f439d2f420bb59eb1d5af14ce2002648d0cfc155d1a1466c8aac9b661fe902b8_arm64",
"9Base-CNV-4.13:container-native-virtualization/cnv-containernetworking-plugins-rhel9@sha256:89f22e541f61a660c9aa9f38ef58e80b84a0517f74e84292107fc252c25465c9_arm64",
"9Base-CNV-4.13:container-native-virtualization/cnv-containernetworking-plugins-rhel9@sha256:bf471997e54e4a75b0d71f492ab295787fdbb14d8c85c4ea8c03f0552dbc3755_amd64",
"9Base-CNV-4.13:container-native-virtualization/cnv-must-gather-rhel9@sha256:9e8efd76924958eb605401abdac08eba97fb83a1ada383bc87a7fb7c87b3a455_arm64",
"9Base-CNV-4.13:container-native-virtualization/cnv-must-gather-rhel9@sha256:b9fc32b5fabedd65a4c3a471879c808af2087277de4278adaa115a732f0468da_amd64",
"9Base-CNV-4.13:container-native-virtualization/hco-bundle-registry-rhel9@sha256:60e89d7a99ff9f20e974430b802dd724a3bb6fa1e01e5a62daad98ac487b3063_amd64",
"9Base-CNV-4.13:container-native-virtualization/hco-bundle-registry-rhel9@sha256:dd20b138045ef1424d83a47e7abcfcbb2ac54577dcec5ed3c186390aaa4c9d84_arm64",
"9Base-CNV-4.13:container-native-virtualization/hostpath-csi-driver-rhel9@sha256:61e2824853d51347593ad909a5e546cd92e4216d6a1df5dffb50dd9cba277cce_amd64",
"9Base-CNV-4.13:container-native-virtualization/hostpath-csi-driver-rhel9@sha256:676d4c23a5f60dd331728af056b0a6b2d3358ac88da23299b1a98dfaca8f288e_arm64",
"9Base-CNV-4.13:container-native-virtualization/hostpath-provisioner-operator-rhel9@sha256:515be94be496c67f5b8fd5f4832fe4385e56476e6589897d6b9fbb9bb2b00f32_amd64",
"9Base-CNV-4.13:container-native-virtualization/hostpath-provisioner-operator-rhel9@sha256:571ae805641dea11646028c946039983c7fd82f138b915dcb8b80c39b465e63c_arm64",
"9Base-CNV-4.13:container-native-virtualization/hostpath-provisioner-rhel9@sha256:ac3fe350bedd6bc43596444ba0f279ccf8a144ab14ac5a9b80ea71c46390b7b4_amd64",
"9Base-CNV-4.13:container-native-virtualization/hostpath-provisioner-rhel9@sha256:d4ed87745b7ee2acca2d83e2c91c2f6dced1903c81495b50f2559b3ba2dde287_arm64",
"9Base-CNV-4.13:container-native-virtualization/hyperconverged-cluster-operator-rhel9@sha256:e5ab9f3be59d3568e3d672ab374efb16990ccf92192eac4e1244b10fcd7423e2_amd64",
"9Base-CNV-4.13:container-native-virtualization/hyperconverged-cluster-operator-rhel9@sha256:e681560b184189df03fc84c8a712f32289f42573dd348cda394b19565eb6eca8_arm64",
"9Base-CNV-4.13:container-native-virtualization/hyperconverged-cluster-webhook-rhel9@sha256:06d036d320b3027bb8370bb8e0f6fe8c9f0ec9bca7aac3b5c53698ba4a170042_arm64",
"9Base-CNV-4.13:container-native-virtualization/hyperconverged-cluster-webhook-rhel9@sha256:b5a01336180aad017df62cf8e652f2491b8263ba7e4dd07f858db1ef1924cf2f_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubemacpool-rhel9@sha256:4d190d81eeb3fbe9ed56cf3548dc83a3f81641bfdafa7b42dcfb0d2512566644_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubemacpool-rhel9@sha256:59862a59854f0d5b83dc25ba119f9586a8aff42b6e60d1922f8ae7b4567309ff_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubesecondarydns-rhel9@sha256:121d30d78cc57731ea2242ef2c32430890ac66c2723e65608d5e2f26c3f515cd_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubesecondarydns-rhel9@sha256:b1838f3c8ba3d8113bddea17b78c21e1c1490e2a4a07ea77014edee523d06347_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-console-plugin-rhel9@sha256:86a4b1e3d6ad1d56302c9c058f8bc5826dcfe6c46fb3e0ddaa06818645039020_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-console-plugin-rhel9@sha256:ffb2acd9ae09c1ef9ca756f5eaf6087d0a3957cfc824543949d25f556a97744d_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-dpdk-checkup-rhel9@sha256:525aceb9396010ebcdba14040f267889b807cd84db8e5b4030429b51f0fbf5fe_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-dpdk-checkup-rhel9@sha256:553c4686f56c66cc1e3c5ad9d4051f139d43f821eac3abb98ca5cdb8b5dfe202_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-ssp-operator-rhel9@sha256:901e6cad9534c7bd7c4018c60bccfe49d7280fba5a9901ab4c4d15e9345288c4_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-ssp-operator-rhel9@sha256:badeb0f65f543b209f6af761729d9778b7b73b97d55044016dfba3f38a1f6f18_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-cleanup-vm-rhel9@sha256:28e4975fa4dac22d9da32ed2a10aed039fd957b30140daa36bab2caa998be77a_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-cleanup-vm-rhel9@sha256:b0ff7e812a576ea848590655fc13a85832d5a39f68e7769ceab9da6949da88c7_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-copy-template-rhel9@sha256:4916a6c6b1f9b529187d3b4d5fc99b90157993767b3fe2ad36a9ec77fbb46b10_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-copy-template-rhel9@sha256:f71c36442f1b61cdde7ec58d2c3c78d2039f6d6108e6c35388ef7c1650971fa1_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-create-datavolume-rhel9@sha256:2ad49cf6e2242a9e5861929d9bcab1305a7fc4e34e708f99cff1d7253aa46167_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-create-datavolume-rhel9@sha256:7112400a4ecb23ee2110bf96372fcf9f96ad648a51aa944627b40eb59539a660_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-create-vm-from-template-rhel9@sha256:1411c65bbad7302710788327f6964a4bf5bc20ef70d5e46f4a5c6e7a0e7a0161_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-create-vm-from-template-rhel9@sha256:4d962618aa95600c60c9fc8b890186e510de91177d51949e12797a3558e31328_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-customize-rhel9@sha256:5c23d3f20ea9dcbe7109284d73078ecd516a070e964b844f8d80b1d92ebd55ee_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-customize-rhel9@sha256:a780244e48c6d4f87446d3754c3eb9ab79c0d54675c189da4a659f7a4d5668ea_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-sysprep-rhel9@sha256:84577d949a1bbcaa291c70729127bca4a8994df03068666baa23840877ea8392_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-sysprep-rhel9@sha256:aed630a597a090179e1b0e0c117e536df06b67d0f793f91936aa7388c0c5d7eb_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-modify-vm-template-rhel9@sha256:31d959b80cf57462e1705684bb7e1b78af26bd2c62f1c9e4e51e1d02199b05a8_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-modify-vm-template-rhel9@sha256:66aea526bc10e4c0136ba86e394bbdfe4fbd7f757d6f391a561b51d2ba2f4d46_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-operator-rhel9@sha256:d0cf0e81589f0938de45961eaddfc5ec4782738fd11082de0439b200534259eb_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-operator-rhel9@sha256:f1b1f5044db6bb945584f9d4f31d020597725a286ef368ed0aca2116abb31beb_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-wait-for-vmi-status-rhel9@sha256:39a15d03f113735df03b1a7408227eb9604d942c1f3c1992bcdc7eaf07662711_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-wait-for-vmi-status-rhel9@sha256:afb68af076954fcd18c7a4a1464ea0c2a766e8282eae980051906ed07eaa1707_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-template-validator-rhel9@sha256:02b22c7e7014b5e72d47fed8b6a268cf307638c5510adf3916c51f7f40a52a08_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-template-validator-rhel9@sha256:c0264b9271e602f85b2040ef7f207cdfa46038dc4fa6e4738bf196ef88a71cf8_amd64",
"9Base-CNV-4.13:container-native-virtualization/libguestfs-tools-rhel9@sha256:29ae84575bbca24553cf649256759fd96ff286971d80bc2db129154a7df9b283_amd64",
"9Base-CNV-4.13:container-native-virtualization/libguestfs-tools-rhel9@sha256:6558f60343e068b032167e2340b2c549c5f0258acc5d2614b60966ce79408b01_arm64",
"9Base-CNV-4.13:container-native-virtualization/multus-dynamic-networks-rhel9@sha256:3ecb0162a4b01d1590bf209d717b32a4f0835910d9979823f18c24acba41b503_arm64",
"9Base-CNV-4.13:container-native-virtualization/multus-dynamic-networks-rhel9@sha256:b7f68b6420009e21380d32d6459193aae45e93be9533debe17cb3108571b36b8_amd64",
"9Base-CNV-4.13:container-native-virtualization/ovs-cni-plugin-rhel9@sha256:0f1d372f418744e0aff59ecb0a38f53178aac9c2e9eecfd38aa25ed83e0d1360_arm64",
"9Base-CNV-4.13:container-native-virtualization/ovs-cni-plugin-rhel9@sha256:e8e7a44edbf1713fe74de5c4b8f691cce78f4440c4a32a16ba9ad16694a55396_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-api-rhel9@sha256:e68416321ca8c74a547b3d35897f54813c03481143e402e9bdc4daf315e35b5d_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-api-rhel9@sha256:fdb4ca1bb8b310d713d9c7e88f7d091f4460aa942dbeca5ebcf17281a06daffe_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-artifacts-server-rhel9@sha256:33d11c1832b49df39c1fca62bad40dbc5c30a452248339aaef449ac99509accb_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-artifacts-server-rhel9@sha256:81fc61b714baecb5a89fa6c0749c14566e0661b8e184ca602fc2e03b9cf431ee_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-apiserver-rhel9@sha256:f6128a63344ed2129f5bce648ddcfaa2869d31cde4b93328d3c22534b97ade10_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-apiserver-rhel9@sha256:feca273a691d09445c6cff6d36b5d590735e867656a9898ce0d89744d98e8006_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-cloner-rhel9@sha256:68e3b9b0291b4fb277ac430269ffce11d13b0a7688cf2ffcdb7f98759c36b4db_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-cloner-rhel9@sha256:6ac212767481bef64d8a7d0252bb8089c0f9751fad4a355aef71bd49dad2ad07_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-controller-rhel9@sha256:65f5263275d9f0a12b8fb057d82adf678778039ec873ca9bde182dea3413c9f1_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-controller-rhel9@sha256:d9e62b2019328be258489ac852eef25f8b1233f29abac6bcea5b406329f97fed_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-importer-rhel9@sha256:00a6d9d24ca1466d450b02269ec3144fc7550f0e5c696e869fbf7ce10cae6093_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-importer-rhel9@sha256:2df07fb21a3575e74aa16ded20129828f2300cd33e8ab369b0362062d49e62d0_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-operator-rhel9@sha256:20ec064750faedd97d11b797c8c1d9a1db5d60d7d76e82e65cfd05eb79d65e29_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-operator-rhel9@sha256:802ee8923d9d8e406b23911406f9748756c0ef4d6954e9e2fd5fb4bdf91dde9a_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-uploadproxy-rhel9@sha256:392d0f61f462c707adfdc21e4239c5c09d8520a80486b41d9d9ae479267d6124_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-uploadproxy-rhel9@sha256:6775f34353eec8f35bead9411dde155530d079bb8d51582fb1f2aacc27dbde1d_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-uploadserver-rhel9@sha256:4528c24672689cfb6505761b6b108fbcc04488192733f23d2bfe39cd42a1d743_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-uploadserver-rhel9@sha256:b22048390387380af94e267c8a9a66813c515997456d59d8ebac1486916b6585_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-controller-rhel9@sha256:3e7880149ee9a68286e390beb3d9779f7403c30fc5136e5370e0e4690a3fd243_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-controller-rhel9@sha256:970edc281d7a731e9f7e8c2d4440fe48a221e5e355d5235c5413b4c3adb28503_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-exportproxy-rhel9@sha256:1bda34d5bff734ad997202f29a5ff6f7362fd79fa90511a422442ef2e3681198_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-exportproxy-rhel9@sha256:de3c4afbf7669b98517cbef2490ec186f0553dd97b05bed80ec36dd883fe507b_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-exportserver-rhel9@sha256:3f7f98645176d42c63cca5c0fc3182a03121af87446ca421b6c72baf07dfca0d_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-exportserver-rhel9@sha256:8f12955cd777eb2409037a6968aa92f50c99d6e07e722951dbcfd0c8c9829b5e_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-handler-rhel9@sha256:5fc47110d866d8048aec50689090ce10705d19d3bb48d2b06727d6d569003af7_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-handler-rhel9@sha256:84ba79ae9658699147d2493df2582ab6df10adbff4d44a533c3fe6a9f45f9691_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-launcher-rhel9@sha256:4990d40d9987d5126d105dd45be2501eaded248cb61bdde5ea8d359bc1e7ebef_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-launcher-rhel9@sha256:95aeacb98209e0baef27ce0e02fbac38d693cea74808fc77107efda0f344bcb5_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-operator-rhel9@sha256:5c1a7e4ed2061938987b900a2394f07121d4037350c9bb6485213a2adfea787d_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-operator-rhel9@sha256:66b1b3b379121d6411ba22283e7d991617177330c93746d37753ab7812b9a00b_arm64",
"9Base-CNV-4.13:container-native-virtualization/virtio-win-rhel9@sha256:8735f51da918408a8826601c082d1b29accf26d59b9978da89b980cb509c1102_arm64",
"9Base-CNV-4.13:container-native-virtualization/virtio-win-rhel9@sha256:d147d2a6eb6f907d1e88f61aaca83596853bc72164583d6dda2b1154b490de25_amd64",
"9Base-CNV-4.13:container-native-virtualization/vm-console-proxy-rhel9@sha256:70a8d0cd66182c25e02679540bae1368b2a9cf687532b58dba41ef30c5ca00c1_arm64",
"9Base-CNV-4.13:container-native-virtualization/vm-console-proxy-rhel9@sha256:7ca921f98f6d81a126907127a611146fb53397869a628678faa1e289c01d22b2_amd64",
"9Base-CNV-4.13:container-native-virtualization/vm-network-latency-checkup-rhel9@sha256:503ea7ac914a9b54e9d665a0227ee0b5d5200cdb5d692aa94c07dd1518d91b70_arm64",
"9Base-CNV-4.13:container-native-virtualization/vm-network-latency-checkup-rhel9@sha256:59fd965975bccf641a0fa7aa01374d45057bd03cda7528248a84b60b1205bf57_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "golang: regexp/syntax: limit memory used by parsing regexps"
},
{
"cve": "CVE-2022-41717",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"discovery_date": "2023-01-16T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2161274"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the net/http library of the golang package. This flaw allows an attacker to cause excessive memory growth in a Go server accepting HTTP/2 requests. HTTP/2 server connections contain a cache of HTTP header keys sent by the client. While the total number of entries in this cache is capped, an attacker sending very large keys can cause the server to allocate approximately 64 MiB per open connection.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: net/http: excessive memory growth in a Go server accepting HTTP/2 requests",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Within Red Hat OpenShift Container Platform, the grafana container is listed as will not fix. Since OCP 4.10, Grafana itself is not shipped and the Grafana web server is protected behind an OAuth proxy server.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"9Base-CNV-4.13:container-native-virtualization/bridge-marker-rhel9@sha256:8eac196b30a648989cdca5cb153a3bc3d34e47339acba0e4f760bd366496c99d_amd64",
"9Base-CNV-4.13:container-native-virtualization/bridge-marker-rhel9@sha256:e8a55aee3d75a316bb0d7a554c737198823df04b3c05e481c17e45eb2153bced_arm64",
"9Base-CNV-4.13:container-native-virtualization/cluster-network-addons-operator-rhel9@sha256:3bff33e3f40cd1e2b519c2db56734d4bb8df883e155c2f20b1cb9d3d184daec1_amd64",
"9Base-CNV-4.13:container-native-virtualization/cluster-network-addons-operator-rhel9@sha256:f439d2f420bb59eb1d5af14ce2002648d0cfc155d1a1466c8aac9b661fe902b8_arm64",
"9Base-CNV-4.13:container-native-virtualization/cnv-containernetworking-plugins-rhel9@sha256:89f22e541f61a660c9aa9f38ef58e80b84a0517f74e84292107fc252c25465c9_arm64",
"9Base-CNV-4.13:container-native-virtualization/cnv-containernetworking-plugins-rhel9@sha256:bf471997e54e4a75b0d71f492ab295787fdbb14d8c85c4ea8c03f0552dbc3755_amd64",
"9Base-CNV-4.13:container-native-virtualization/cnv-must-gather-rhel9@sha256:9e8efd76924958eb605401abdac08eba97fb83a1ada383bc87a7fb7c87b3a455_arm64",
"9Base-CNV-4.13:container-native-virtualization/cnv-must-gather-rhel9@sha256:b9fc32b5fabedd65a4c3a471879c808af2087277de4278adaa115a732f0468da_amd64",
"9Base-CNV-4.13:container-native-virtualization/hco-bundle-registry-rhel9@sha256:60e89d7a99ff9f20e974430b802dd724a3bb6fa1e01e5a62daad98ac487b3063_amd64",
"9Base-CNV-4.13:container-native-virtualization/hco-bundle-registry-rhel9@sha256:dd20b138045ef1424d83a47e7abcfcbb2ac54577dcec5ed3c186390aaa4c9d84_arm64",
"9Base-CNV-4.13:container-native-virtualization/hostpath-csi-driver-rhel9@sha256:61e2824853d51347593ad909a5e546cd92e4216d6a1df5dffb50dd9cba277cce_amd64",
"9Base-CNV-4.13:container-native-virtualization/hostpath-csi-driver-rhel9@sha256:676d4c23a5f60dd331728af056b0a6b2d3358ac88da23299b1a98dfaca8f288e_arm64",
"9Base-CNV-4.13:container-native-virtualization/hostpath-provisioner-operator-rhel9@sha256:515be94be496c67f5b8fd5f4832fe4385e56476e6589897d6b9fbb9bb2b00f32_amd64",
"9Base-CNV-4.13:container-native-virtualization/hostpath-provisioner-operator-rhel9@sha256:571ae805641dea11646028c946039983c7fd82f138b915dcb8b80c39b465e63c_arm64",
"9Base-CNV-4.13:container-native-virtualization/hostpath-provisioner-rhel9@sha256:ac3fe350bedd6bc43596444ba0f279ccf8a144ab14ac5a9b80ea71c46390b7b4_amd64",
"9Base-CNV-4.13:container-native-virtualization/hostpath-provisioner-rhel9@sha256:d4ed87745b7ee2acca2d83e2c91c2f6dced1903c81495b50f2559b3ba2dde287_arm64",
"9Base-CNV-4.13:container-native-virtualization/hyperconverged-cluster-operator-rhel9@sha256:e5ab9f3be59d3568e3d672ab374efb16990ccf92192eac4e1244b10fcd7423e2_amd64",
"9Base-CNV-4.13:container-native-virtualization/hyperconverged-cluster-operator-rhel9@sha256:e681560b184189df03fc84c8a712f32289f42573dd348cda394b19565eb6eca8_arm64",
"9Base-CNV-4.13:container-native-virtualization/hyperconverged-cluster-webhook-rhel9@sha256:06d036d320b3027bb8370bb8e0f6fe8c9f0ec9bca7aac3b5c53698ba4a170042_arm64",
"9Base-CNV-4.13:container-native-virtualization/hyperconverged-cluster-webhook-rhel9@sha256:b5a01336180aad017df62cf8e652f2491b8263ba7e4dd07f858db1ef1924cf2f_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubemacpool-rhel9@sha256:4d190d81eeb3fbe9ed56cf3548dc83a3f81641bfdafa7b42dcfb0d2512566644_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubemacpool-rhel9@sha256:59862a59854f0d5b83dc25ba119f9586a8aff42b6e60d1922f8ae7b4567309ff_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubesecondarydns-rhel9@sha256:121d30d78cc57731ea2242ef2c32430890ac66c2723e65608d5e2f26c3f515cd_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubesecondarydns-rhel9@sha256:b1838f3c8ba3d8113bddea17b78c21e1c1490e2a4a07ea77014edee523d06347_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-console-plugin-rhel9@sha256:86a4b1e3d6ad1d56302c9c058f8bc5826dcfe6c46fb3e0ddaa06818645039020_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-console-plugin-rhel9@sha256:ffb2acd9ae09c1ef9ca756f5eaf6087d0a3957cfc824543949d25f556a97744d_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-dpdk-checkup-rhel9@sha256:525aceb9396010ebcdba14040f267889b807cd84db8e5b4030429b51f0fbf5fe_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-dpdk-checkup-rhel9@sha256:553c4686f56c66cc1e3c5ad9d4051f139d43f821eac3abb98ca5cdb8b5dfe202_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-ssp-operator-rhel9@sha256:901e6cad9534c7bd7c4018c60bccfe49d7280fba5a9901ab4c4d15e9345288c4_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-ssp-operator-rhel9@sha256:badeb0f65f543b209f6af761729d9778b7b73b97d55044016dfba3f38a1f6f18_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-cleanup-vm-rhel9@sha256:28e4975fa4dac22d9da32ed2a10aed039fd957b30140daa36bab2caa998be77a_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-cleanup-vm-rhel9@sha256:b0ff7e812a576ea848590655fc13a85832d5a39f68e7769ceab9da6949da88c7_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-copy-template-rhel9@sha256:4916a6c6b1f9b529187d3b4d5fc99b90157993767b3fe2ad36a9ec77fbb46b10_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-copy-template-rhel9@sha256:f71c36442f1b61cdde7ec58d2c3c78d2039f6d6108e6c35388ef7c1650971fa1_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-create-datavolume-rhel9@sha256:2ad49cf6e2242a9e5861929d9bcab1305a7fc4e34e708f99cff1d7253aa46167_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-create-datavolume-rhel9@sha256:7112400a4ecb23ee2110bf96372fcf9f96ad648a51aa944627b40eb59539a660_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-create-vm-from-template-rhel9@sha256:1411c65bbad7302710788327f6964a4bf5bc20ef70d5e46f4a5c6e7a0e7a0161_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-create-vm-from-template-rhel9@sha256:4d962618aa95600c60c9fc8b890186e510de91177d51949e12797a3558e31328_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-customize-rhel9@sha256:5c23d3f20ea9dcbe7109284d73078ecd516a070e964b844f8d80b1d92ebd55ee_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-customize-rhel9@sha256:a780244e48c6d4f87446d3754c3eb9ab79c0d54675c189da4a659f7a4d5668ea_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-sysprep-rhel9@sha256:84577d949a1bbcaa291c70729127bca4a8994df03068666baa23840877ea8392_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-sysprep-rhel9@sha256:aed630a597a090179e1b0e0c117e536df06b67d0f793f91936aa7388c0c5d7eb_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-modify-vm-template-rhel9@sha256:31d959b80cf57462e1705684bb7e1b78af26bd2c62f1c9e4e51e1d02199b05a8_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-modify-vm-template-rhel9@sha256:66aea526bc10e4c0136ba86e394bbdfe4fbd7f757d6f391a561b51d2ba2f4d46_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-operator-rhel9@sha256:d0cf0e81589f0938de45961eaddfc5ec4782738fd11082de0439b200534259eb_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-operator-rhel9@sha256:f1b1f5044db6bb945584f9d4f31d020597725a286ef368ed0aca2116abb31beb_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-wait-for-vmi-status-rhel9@sha256:39a15d03f113735df03b1a7408227eb9604d942c1f3c1992bcdc7eaf07662711_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-wait-for-vmi-status-rhel9@sha256:afb68af076954fcd18c7a4a1464ea0c2a766e8282eae980051906ed07eaa1707_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-template-validator-rhel9@sha256:02b22c7e7014b5e72d47fed8b6a268cf307638c5510adf3916c51f7f40a52a08_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-template-validator-rhel9@sha256:c0264b9271e602f85b2040ef7f207cdfa46038dc4fa6e4738bf196ef88a71cf8_amd64",
"9Base-CNV-4.13:container-native-virtualization/libguestfs-tools-rhel9@sha256:29ae84575bbca24553cf649256759fd96ff286971d80bc2db129154a7df9b283_amd64",
"9Base-CNV-4.13:container-native-virtualization/libguestfs-tools-rhel9@sha256:6558f60343e068b032167e2340b2c549c5f0258acc5d2614b60966ce79408b01_arm64",
"9Base-CNV-4.13:container-native-virtualization/multus-dynamic-networks-rhel9@sha256:3ecb0162a4b01d1590bf209d717b32a4f0835910d9979823f18c24acba41b503_arm64",
"9Base-CNV-4.13:container-native-virtualization/multus-dynamic-networks-rhel9@sha256:b7f68b6420009e21380d32d6459193aae45e93be9533debe17cb3108571b36b8_amd64",
"9Base-CNV-4.13:container-native-virtualization/ovs-cni-plugin-rhel9@sha256:0f1d372f418744e0aff59ecb0a38f53178aac9c2e9eecfd38aa25ed83e0d1360_arm64",
"9Base-CNV-4.13:container-native-virtualization/ovs-cni-plugin-rhel9@sha256:e8e7a44edbf1713fe74de5c4b8f691cce78f4440c4a32a16ba9ad16694a55396_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-api-rhel9@sha256:e68416321ca8c74a547b3d35897f54813c03481143e402e9bdc4daf315e35b5d_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-api-rhel9@sha256:fdb4ca1bb8b310d713d9c7e88f7d091f4460aa942dbeca5ebcf17281a06daffe_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-artifacts-server-rhel9@sha256:33d11c1832b49df39c1fca62bad40dbc5c30a452248339aaef449ac99509accb_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-artifacts-server-rhel9@sha256:81fc61b714baecb5a89fa6c0749c14566e0661b8e184ca602fc2e03b9cf431ee_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-apiserver-rhel9@sha256:f6128a63344ed2129f5bce648ddcfaa2869d31cde4b93328d3c22534b97ade10_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-apiserver-rhel9@sha256:feca273a691d09445c6cff6d36b5d590735e867656a9898ce0d89744d98e8006_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-cloner-rhel9@sha256:68e3b9b0291b4fb277ac430269ffce11d13b0a7688cf2ffcdb7f98759c36b4db_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-cloner-rhel9@sha256:6ac212767481bef64d8a7d0252bb8089c0f9751fad4a355aef71bd49dad2ad07_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-controller-rhel9@sha256:65f5263275d9f0a12b8fb057d82adf678778039ec873ca9bde182dea3413c9f1_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-controller-rhel9@sha256:d9e62b2019328be258489ac852eef25f8b1233f29abac6bcea5b406329f97fed_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-importer-rhel9@sha256:00a6d9d24ca1466d450b02269ec3144fc7550f0e5c696e869fbf7ce10cae6093_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-importer-rhel9@sha256:2df07fb21a3575e74aa16ded20129828f2300cd33e8ab369b0362062d49e62d0_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-operator-rhel9@sha256:20ec064750faedd97d11b797c8c1d9a1db5d60d7d76e82e65cfd05eb79d65e29_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-operator-rhel9@sha256:802ee8923d9d8e406b23911406f9748756c0ef4d6954e9e2fd5fb4bdf91dde9a_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-uploadproxy-rhel9@sha256:392d0f61f462c707adfdc21e4239c5c09d8520a80486b41d9d9ae479267d6124_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-uploadproxy-rhel9@sha256:6775f34353eec8f35bead9411dde155530d079bb8d51582fb1f2aacc27dbde1d_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-uploadserver-rhel9@sha256:4528c24672689cfb6505761b6b108fbcc04488192733f23d2bfe39cd42a1d743_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-uploadserver-rhel9@sha256:b22048390387380af94e267c8a9a66813c515997456d59d8ebac1486916b6585_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-controller-rhel9@sha256:3e7880149ee9a68286e390beb3d9779f7403c30fc5136e5370e0e4690a3fd243_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-controller-rhel9@sha256:970edc281d7a731e9f7e8c2d4440fe48a221e5e355d5235c5413b4c3adb28503_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-exportproxy-rhel9@sha256:1bda34d5bff734ad997202f29a5ff6f7362fd79fa90511a422442ef2e3681198_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-exportproxy-rhel9@sha256:de3c4afbf7669b98517cbef2490ec186f0553dd97b05bed80ec36dd883fe507b_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-exportserver-rhel9@sha256:3f7f98645176d42c63cca5c0fc3182a03121af87446ca421b6c72baf07dfca0d_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-exportserver-rhel9@sha256:8f12955cd777eb2409037a6968aa92f50c99d6e07e722951dbcfd0c8c9829b5e_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-handler-rhel9@sha256:5fc47110d866d8048aec50689090ce10705d19d3bb48d2b06727d6d569003af7_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-handler-rhel9@sha256:84ba79ae9658699147d2493df2582ab6df10adbff4d44a533c3fe6a9f45f9691_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-launcher-rhel9@sha256:4990d40d9987d5126d105dd45be2501eaded248cb61bdde5ea8d359bc1e7ebef_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-launcher-rhel9@sha256:95aeacb98209e0baef27ce0e02fbac38d693cea74808fc77107efda0f344bcb5_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-operator-rhel9@sha256:5c1a7e4ed2061938987b900a2394f07121d4037350c9bb6485213a2adfea787d_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-operator-rhel9@sha256:66b1b3b379121d6411ba22283e7d991617177330c93746d37753ab7812b9a00b_arm64",
"9Base-CNV-4.13:container-native-virtualization/virtio-win-rhel9@sha256:8735f51da918408a8826601c082d1b29accf26d59b9978da89b980cb509c1102_arm64",
"9Base-CNV-4.13:container-native-virtualization/virtio-win-rhel9@sha256:d147d2a6eb6f907d1e88f61aaca83596853bc72164583d6dda2b1154b490de25_amd64",
"9Base-CNV-4.13:container-native-virtualization/vm-console-proxy-rhel9@sha256:70a8d0cd66182c25e02679540bae1368b2a9cf687532b58dba41ef30c5ca00c1_arm64",
"9Base-CNV-4.13:container-native-virtualization/vm-console-proxy-rhel9@sha256:7ca921f98f6d81a126907127a611146fb53397869a628678faa1e289c01d22b2_amd64",
"9Base-CNV-4.13:container-native-virtualization/vm-network-latency-checkup-rhel9@sha256:503ea7ac914a9b54e9d665a0227ee0b5d5200cdb5d692aa94c07dd1518d91b70_arm64",
"9Base-CNV-4.13:container-native-virtualization/vm-network-latency-checkup-rhel9@sha256:59fd965975bccf641a0fa7aa01374d45057bd03cda7528248a84b60b1205bf57_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-41717"
},
{
"category": "external",
"summary": "RHBZ#2161274",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2161274"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-41717",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41717"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-41717",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-41717"
},
{
"category": "external",
"summary": "https://go.dev/cl/455635",
"url": "https://go.dev/cl/455635"
},
{
"category": "external",
"summary": "https://go.dev/cl/455717",
"url": "https://go.dev/cl/455717"
},
{
"category": "external",
"summary": "https://go.dev/issue/56350",
"url": "https://go.dev/issue/56350"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/L_3rmdT0BMU/m/yZDrXjIiBQAJ",
"url": "https://groups.google.com/g/golang-announce/c/L_3rmdT0BMU/m/yZDrXjIiBQAJ"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2022-1144",
"url": "https://pkg.go.dev/vuln/GO-2022-1144"
}
],
"release_date": "2022-11-30T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-05-18T02:55:08+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"9Base-CNV-4.13:container-native-virtualization/bridge-marker-rhel9@sha256:8eac196b30a648989cdca5cb153a3bc3d34e47339acba0e4f760bd366496c99d_amd64",
"9Base-CNV-4.13:container-native-virtualization/bridge-marker-rhel9@sha256:e8a55aee3d75a316bb0d7a554c737198823df04b3c05e481c17e45eb2153bced_arm64",
"9Base-CNV-4.13:container-native-virtualization/cluster-network-addons-operator-rhel9@sha256:3bff33e3f40cd1e2b519c2db56734d4bb8df883e155c2f20b1cb9d3d184daec1_amd64",
"9Base-CNV-4.13:container-native-virtualization/cluster-network-addons-operator-rhel9@sha256:f439d2f420bb59eb1d5af14ce2002648d0cfc155d1a1466c8aac9b661fe902b8_arm64",
"9Base-CNV-4.13:container-native-virtualization/cnv-containernetworking-plugins-rhel9@sha256:89f22e541f61a660c9aa9f38ef58e80b84a0517f74e84292107fc252c25465c9_arm64",
"9Base-CNV-4.13:container-native-virtualization/cnv-containernetworking-plugins-rhel9@sha256:bf471997e54e4a75b0d71f492ab295787fdbb14d8c85c4ea8c03f0552dbc3755_amd64",
"9Base-CNV-4.13:container-native-virtualization/cnv-must-gather-rhel9@sha256:9e8efd76924958eb605401abdac08eba97fb83a1ada383bc87a7fb7c87b3a455_arm64",
"9Base-CNV-4.13:container-native-virtualization/cnv-must-gather-rhel9@sha256:b9fc32b5fabedd65a4c3a471879c808af2087277de4278adaa115a732f0468da_amd64",
"9Base-CNV-4.13:container-native-virtualization/hco-bundle-registry-rhel9@sha256:60e89d7a99ff9f20e974430b802dd724a3bb6fa1e01e5a62daad98ac487b3063_amd64",
"9Base-CNV-4.13:container-native-virtualization/hco-bundle-registry-rhel9@sha256:dd20b138045ef1424d83a47e7abcfcbb2ac54577dcec5ed3c186390aaa4c9d84_arm64",
"9Base-CNV-4.13:container-native-virtualization/hostpath-csi-driver-rhel9@sha256:61e2824853d51347593ad909a5e546cd92e4216d6a1df5dffb50dd9cba277cce_amd64",
"9Base-CNV-4.13:container-native-virtualization/hostpath-csi-driver-rhel9@sha256:676d4c23a5f60dd331728af056b0a6b2d3358ac88da23299b1a98dfaca8f288e_arm64",
"9Base-CNV-4.13:container-native-virtualization/hostpath-provisioner-operator-rhel9@sha256:515be94be496c67f5b8fd5f4832fe4385e56476e6589897d6b9fbb9bb2b00f32_amd64",
"9Base-CNV-4.13:container-native-virtualization/hostpath-provisioner-operator-rhel9@sha256:571ae805641dea11646028c946039983c7fd82f138b915dcb8b80c39b465e63c_arm64",
"9Base-CNV-4.13:container-native-virtualization/hostpath-provisioner-rhel9@sha256:ac3fe350bedd6bc43596444ba0f279ccf8a144ab14ac5a9b80ea71c46390b7b4_amd64",
"9Base-CNV-4.13:container-native-virtualization/hostpath-provisioner-rhel9@sha256:d4ed87745b7ee2acca2d83e2c91c2f6dced1903c81495b50f2559b3ba2dde287_arm64",
"9Base-CNV-4.13:container-native-virtualization/hyperconverged-cluster-operator-rhel9@sha256:e5ab9f3be59d3568e3d672ab374efb16990ccf92192eac4e1244b10fcd7423e2_amd64",
"9Base-CNV-4.13:container-native-virtualization/hyperconverged-cluster-operator-rhel9@sha256:e681560b184189df03fc84c8a712f32289f42573dd348cda394b19565eb6eca8_arm64",
"9Base-CNV-4.13:container-native-virtualization/hyperconverged-cluster-webhook-rhel9@sha256:06d036d320b3027bb8370bb8e0f6fe8c9f0ec9bca7aac3b5c53698ba4a170042_arm64",
"9Base-CNV-4.13:container-native-virtualization/hyperconverged-cluster-webhook-rhel9@sha256:b5a01336180aad017df62cf8e652f2491b8263ba7e4dd07f858db1ef1924cf2f_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubemacpool-rhel9@sha256:4d190d81eeb3fbe9ed56cf3548dc83a3f81641bfdafa7b42dcfb0d2512566644_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubemacpool-rhel9@sha256:59862a59854f0d5b83dc25ba119f9586a8aff42b6e60d1922f8ae7b4567309ff_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubesecondarydns-rhel9@sha256:121d30d78cc57731ea2242ef2c32430890ac66c2723e65608d5e2f26c3f515cd_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubesecondarydns-rhel9@sha256:b1838f3c8ba3d8113bddea17b78c21e1c1490e2a4a07ea77014edee523d06347_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-console-plugin-rhel9@sha256:86a4b1e3d6ad1d56302c9c058f8bc5826dcfe6c46fb3e0ddaa06818645039020_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-console-plugin-rhel9@sha256:ffb2acd9ae09c1ef9ca756f5eaf6087d0a3957cfc824543949d25f556a97744d_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-dpdk-checkup-rhel9@sha256:525aceb9396010ebcdba14040f267889b807cd84db8e5b4030429b51f0fbf5fe_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-dpdk-checkup-rhel9@sha256:553c4686f56c66cc1e3c5ad9d4051f139d43f821eac3abb98ca5cdb8b5dfe202_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-ssp-operator-rhel9@sha256:901e6cad9534c7bd7c4018c60bccfe49d7280fba5a9901ab4c4d15e9345288c4_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-ssp-operator-rhel9@sha256:badeb0f65f543b209f6af761729d9778b7b73b97d55044016dfba3f38a1f6f18_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-cleanup-vm-rhel9@sha256:28e4975fa4dac22d9da32ed2a10aed039fd957b30140daa36bab2caa998be77a_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-cleanup-vm-rhel9@sha256:b0ff7e812a576ea848590655fc13a85832d5a39f68e7769ceab9da6949da88c7_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-copy-template-rhel9@sha256:4916a6c6b1f9b529187d3b4d5fc99b90157993767b3fe2ad36a9ec77fbb46b10_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-copy-template-rhel9@sha256:f71c36442f1b61cdde7ec58d2c3c78d2039f6d6108e6c35388ef7c1650971fa1_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-create-datavolume-rhel9@sha256:2ad49cf6e2242a9e5861929d9bcab1305a7fc4e34e708f99cff1d7253aa46167_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-create-datavolume-rhel9@sha256:7112400a4ecb23ee2110bf96372fcf9f96ad648a51aa944627b40eb59539a660_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-create-vm-from-template-rhel9@sha256:1411c65bbad7302710788327f6964a4bf5bc20ef70d5e46f4a5c6e7a0e7a0161_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-create-vm-from-template-rhel9@sha256:4d962618aa95600c60c9fc8b890186e510de91177d51949e12797a3558e31328_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-customize-rhel9@sha256:5c23d3f20ea9dcbe7109284d73078ecd516a070e964b844f8d80b1d92ebd55ee_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-customize-rhel9@sha256:a780244e48c6d4f87446d3754c3eb9ab79c0d54675c189da4a659f7a4d5668ea_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-sysprep-rhel9@sha256:84577d949a1bbcaa291c70729127bca4a8994df03068666baa23840877ea8392_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-sysprep-rhel9@sha256:aed630a597a090179e1b0e0c117e536df06b67d0f793f91936aa7388c0c5d7eb_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-modify-vm-template-rhel9@sha256:31d959b80cf57462e1705684bb7e1b78af26bd2c62f1c9e4e51e1d02199b05a8_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-modify-vm-template-rhel9@sha256:66aea526bc10e4c0136ba86e394bbdfe4fbd7f757d6f391a561b51d2ba2f4d46_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-operator-rhel9@sha256:d0cf0e81589f0938de45961eaddfc5ec4782738fd11082de0439b200534259eb_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-operator-rhel9@sha256:f1b1f5044db6bb945584f9d4f31d020597725a286ef368ed0aca2116abb31beb_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-wait-for-vmi-status-rhel9@sha256:39a15d03f113735df03b1a7408227eb9604d942c1f3c1992bcdc7eaf07662711_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-wait-for-vmi-status-rhel9@sha256:afb68af076954fcd18c7a4a1464ea0c2a766e8282eae980051906ed07eaa1707_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-template-validator-rhel9@sha256:02b22c7e7014b5e72d47fed8b6a268cf307638c5510adf3916c51f7f40a52a08_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-template-validator-rhel9@sha256:c0264b9271e602f85b2040ef7f207cdfa46038dc4fa6e4738bf196ef88a71cf8_amd64",
"9Base-CNV-4.13:container-native-virtualization/libguestfs-tools-rhel9@sha256:29ae84575bbca24553cf649256759fd96ff286971d80bc2db129154a7df9b283_amd64",
"9Base-CNV-4.13:container-native-virtualization/libguestfs-tools-rhel9@sha256:6558f60343e068b032167e2340b2c549c5f0258acc5d2614b60966ce79408b01_arm64",
"9Base-CNV-4.13:container-native-virtualization/multus-dynamic-networks-rhel9@sha256:3ecb0162a4b01d1590bf209d717b32a4f0835910d9979823f18c24acba41b503_arm64",
"9Base-CNV-4.13:container-native-virtualization/multus-dynamic-networks-rhel9@sha256:b7f68b6420009e21380d32d6459193aae45e93be9533debe17cb3108571b36b8_amd64",
"9Base-CNV-4.13:container-native-virtualization/ovs-cni-plugin-rhel9@sha256:0f1d372f418744e0aff59ecb0a38f53178aac9c2e9eecfd38aa25ed83e0d1360_arm64",
"9Base-CNV-4.13:container-native-virtualization/ovs-cni-plugin-rhel9@sha256:e8e7a44edbf1713fe74de5c4b8f691cce78f4440c4a32a16ba9ad16694a55396_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-api-rhel9@sha256:e68416321ca8c74a547b3d35897f54813c03481143e402e9bdc4daf315e35b5d_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-api-rhel9@sha256:fdb4ca1bb8b310d713d9c7e88f7d091f4460aa942dbeca5ebcf17281a06daffe_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-artifacts-server-rhel9@sha256:33d11c1832b49df39c1fca62bad40dbc5c30a452248339aaef449ac99509accb_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-artifacts-server-rhel9@sha256:81fc61b714baecb5a89fa6c0749c14566e0661b8e184ca602fc2e03b9cf431ee_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-apiserver-rhel9@sha256:f6128a63344ed2129f5bce648ddcfaa2869d31cde4b93328d3c22534b97ade10_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-apiserver-rhel9@sha256:feca273a691d09445c6cff6d36b5d590735e867656a9898ce0d89744d98e8006_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-cloner-rhel9@sha256:68e3b9b0291b4fb277ac430269ffce11d13b0a7688cf2ffcdb7f98759c36b4db_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-cloner-rhel9@sha256:6ac212767481bef64d8a7d0252bb8089c0f9751fad4a355aef71bd49dad2ad07_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-controller-rhel9@sha256:65f5263275d9f0a12b8fb057d82adf678778039ec873ca9bde182dea3413c9f1_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-controller-rhel9@sha256:d9e62b2019328be258489ac852eef25f8b1233f29abac6bcea5b406329f97fed_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-importer-rhel9@sha256:00a6d9d24ca1466d450b02269ec3144fc7550f0e5c696e869fbf7ce10cae6093_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-importer-rhel9@sha256:2df07fb21a3575e74aa16ded20129828f2300cd33e8ab369b0362062d49e62d0_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-operator-rhel9@sha256:20ec064750faedd97d11b797c8c1d9a1db5d60d7d76e82e65cfd05eb79d65e29_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-operator-rhel9@sha256:802ee8923d9d8e406b23911406f9748756c0ef4d6954e9e2fd5fb4bdf91dde9a_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-uploadproxy-rhel9@sha256:392d0f61f462c707adfdc21e4239c5c09d8520a80486b41d9d9ae479267d6124_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-uploadproxy-rhel9@sha256:6775f34353eec8f35bead9411dde155530d079bb8d51582fb1f2aacc27dbde1d_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-uploadserver-rhel9@sha256:4528c24672689cfb6505761b6b108fbcc04488192733f23d2bfe39cd42a1d743_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-uploadserver-rhel9@sha256:b22048390387380af94e267c8a9a66813c515997456d59d8ebac1486916b6585_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-controller-rhel9@sha256:3e7880149ee9a68286e390beb3d9779f7403c30fc5136e5370e0e4690a3fd243_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-controller-rhel9@sha256:970edc281d7a731e9f7e8c2d4440fe48a221e5e355d5235c5413b4c3adb28503_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-exportproxy-rhel9@sha256:1bda34d5bff734ad997202f29a5ff6f7362fd79fa90511a422442ef2e3681198_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-exportproxy-rhel9@sha256:de3c4afbf7669b98517cbef2490ec186f0553dd97b05bed80ec36dd883fe507b_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-exportserver-rhel9@sha256:3f7f98645176d42c63cca5c0fc3182a03121af87446ca421b6c72baf07dfca0d_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-exportserver-rhel9@sha256:8f12955cd777eb2409037a6968aa92f50c99d6e07e722951dbcfd0c8c9829b5e_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-handler-rhel9@sha256:5fc47110d866d8048aec50689090ce10705d19d3bb48d2b06727d6d569003af7_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-handler-rhel9@sha256:84ba79ae9658699147d2493df2582ab6df10adbff4d44a533c3fe6a9f45f9691_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-launcher-rhel9@sha256:4990d40d9987d5126d105dd45be2501eaded248cb61bdde5ea8d359bc1e7ebef_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-launcher-rhel9@sha256:95aeacb98209e0baef27ce0e02fbac38d693cea74808fc77107efda0f344bcb5_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-operator-rhel9@sha256:5c1a7e4ed2061938987b900a2394f07121d4037350c9bb6485213a2adfea787d_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-operator-rhel9@sha256:66b1b3b379121d6411ba22283e7d991617177330c93746d37753ab7812b9a00b_arm64",
"9Base-CNV-4.13:container-native-virtualization/virtio-win-rhel9@sha256:8735f51da918408a8826601c082d1b29accf26d59b9978da89b980cb509c1102_arm64",
"9Base-CNV-4.13:container-native-virtualization/virtio-win-rhel9@sha256:d147d2a6eb6f907d1e88f61aaca83596853bc72164583d6dda2b1154b490de25_amd64",
"9Base-CNV-4.13:container-native-virtualization/vm-console-proxy-rhel9@sha256:70a8d0cd66182c25e02679540bae1368b2a9cf687532b58dba41ef30c5ca00c1_arm64",
"9Base-CNV-4.13:container-native-virtualization/vm-console-proxy-rhel9@sha256:7ca921f98f6d81a126907127a611146fb53397869a628678faa1e289c01d22b2_amd64",
"9Base-CNV-4.13:container-native-virtualization/vm-network-latency-checkup-rhel9@sha256:503ea7ac914a9b54e9d665a0227ee0b5d5200cdb5d692aa94c07dd1518d91b70_arm64",
"9Base-CNV-4.13:container-native-virtualization/vm-network-latency-checkup-rhel9@sha256:59fd965975bccf641a0fa7aa01374d45057bd03cda7528248a84b60b1205bf57_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:3205"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"9Base-CNV-4.13:container-native-virtualization/bridge-marker-rhel9@sha256:8eac196b30a648989cdca5cb153a3bc3d34e47339acba0e4f760bd366496c99d_amd64",
"9Base-CNV-4.13:container-native-virtualization/bridge-marker-rhel9@sha256:e8a55aee3d75a316bb0d7a554c737198823df04b3c05e481c17e45eb2153bced_arm64",
"9Base-CNV-4.13:container-native-virtualization/cluster-network-addons-operator-rhel9@sha256:3bff33e3f40cd1e2b519c2db56734d4bb8df883e155c2f20b1cb9d3d184daec1_amd64",
"9Base-CNV-4.13:container-native-virtualization/cluster-network-addons-operator-rhel9@sha256:f439d2f420bb59eb1d5af14ce2002648d0cfc155d1a1466c8aac9b661fe902b8_arm64",
"9Base-CNV-4.13:container-native-virtualization/cnv-containernetworking-plugins-rhel9@sha256:89f22e541f61a660c9aa9f38ef58e80b84a0517f74e84292107fc252c25465c9_arm64",
"9Base-CNV-4.13:container-native-virtualization/cnv-containernetworking-plugins-rhel9@sha256:bf471997e54e4a75b0d71f492ab295787fdbb14d8c85c4ea8c03f0552dbc3755_amd64",
"9Base-CNV-4.13:container-native-virtualization/cnv-must-gather-rhel9@sha256:9e8efd76924958eb605401abdac08eba97fb83a1ada383bc87a7fb7c87b3a455_arm64",
"9Base-CNV-4.13:container-native-virtualization/cnv-must-gather-rhel9@sha256:b9fc32b5fabedd65a4c3a471879c808af2087277de4278adaa115a732f0468da_amd64",
"9Base-CNV-4.13:container-native-virtualization/hco-bundle-registry-rhel9@sha256:60e89d7a99ff9f20e974430b802dd724a3bb6fa1e01e5a62daad98ac487b3063_amd64",
"9Base-CNV-4.13:container-native-virtualization/hco-bundle-registry-rhel9@sha256:dd20b138045ef1424d83a47e7abcfcbb2ac54577dcec5ed3c186390aaa4c9d84_arm64",
"9Base-CNV-4.13:container-native-virtualization/hostpath-csi-driver-rhel9@sha256:61e2824853d51347593ad909a5e546cd92e4216d6a1df5dffb50dd9cba277cce_amd64",
"9Base-CNV-4.13:container-native-virtualization/hostpath-csi-driver-rhel9@sha256:676d4c23a5f60dd331728af056b0a6b2d3358ac88da23299b1a98dfaca8f288e_arm64",
"9Base-CNV-4.13:container-native-virtualization/hostpath-provisioner-operator-rhel9@sha256:515be94be496c67f5b8fd5f4832fe4385e56476e6589897d6b9fbb9bb2b00f32_amd64",
"9Base-CNV-4.13:container-native-virtualization/hostpath-provisioner-operator-rhel9@sha256:571ae805641dea11646028c946039983c7fd82f138b915dcb8b80c39b465e63c_arm64",
"9Base-CNV-4.13:container-native-virtualization/hostpath-provisioner-rhel9@sha256:ac3fe350bedd6bc43596444ba0f279ccf8a144ab14ac5a9b80ea71c46390b7b4_amd64",
"9Base-CNV-4.13:container-native-virtualization/hostpath-provisioner-rhel9@sha256:d4ed87745b7ee2acca2d83e2c91c2f6dced1903c81495b50f2559b3ba2dde287_arm64",
"9Base-CNV-4.13:container-native-virtualization/hyperconverged-cluster-operator-rhel9@sha256:e5ab9f3be59d3568e3d672ab374efb16990ccf92192eac4e1244b10fcd7423e2_amd64",
"9Base-CNV-4.13:container-native-virtualization/hyperconverged-cluster-operator-rhel9@sha256:e681560b184189df03fc84c8a712f32289f42573dd348cda394b19565eb6eca8_arm64",
"9Base-CNV-4.13:container-native-virtualization/hyperconverged-cluster-webhook-rhel9@sha256:06d036d320b3027bb8370bb8e0f6fe8c9f0ec9bca7aac3b5c53698ba4a170042_arm64",
"9Base-CNV-4.13:container-native-virtualization/hyperconverged-cluster-webhook-rhel9@sha256:b5a01336180aad017df62cf8e652f2491b8263ba7e4dd07f858db1ef1924cf2f_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubemacpool-rhel9@sha256:4d190d81eeb3fbe9ed56cf3548dc83a3f81641bfdafa7b42dcfb0d2512566644_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubemacpool-rhel9@sha256:59862a59854f0d5b83dc25ba119f9586a8aff42b6e60d1922f8ae7b4567309ff_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubesecondarydns-rhel9@sha256:121d30d78cc57731ea2242ef2c32430890ac66c2723e65608d5e2f26c3f515cd_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubesecondarydns-rhel9@sha256:b1838f3c8ba3d8113bddea17b78c21e1c1490e2a4a07ea77014edee523d06347_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-console-plugin-rhel9@sha256:86a4b1e3d6ad1d56302c9c058f8bc5826dcfe6c46fb3e0ddaa06818645039020_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-console-plugin-rhel9@sha256:ffb2acd9ae09c1ef9ca756f5eaf6087d0a3957cfc824543949d25f556a97744d_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-dpdk-checkup-rhel9@sha256:525aceb9396010ebcdba14040f267889b807cd84db8e5b4030429b51f0fbf5fe_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-dpdk-checkup-rhel9@sha256:553c4686f56c66cc1e3c5ad9d4051f139d43f821eac3abb98ca5cdb8b5dfe202_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-ssp-operator-rhel9@sha256:901e6cad9534c7bd7c4018c60bccfe49d7280fba5a9901ab4c4d15e9345288c4_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-ssp-operator-rhel9@sha256:badeb0f65f543b209f6af761729d9778b7b73b97d55044016dfba3f38a1f6f18_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-cleanup-vm-rhel9@sha256:28e4975fa4dac22d9da32ed2a10aed039fd957b30140daa36bab2caa998be77a_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-cleanup-vm-rhel9@sha256:b0ff7e812a576ea848590655fc13a85832d5a39f68e7769ceab9da6949da88c7_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-copy-template-rhel9@sha256:4916a6c6b1f9b529187d3b4d5fc99b90157993767b3fe2ad36a9ec77fbb46b10_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-copy-template-rhel9@sha256:f71c36442f1b61cdde7ec58d2c3c78d2039f6d6108e6c35388ef7c1650971fa1_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-create-datavolume-rhel9@sha256:2ad49cf6e2242a9e5861929d9bcab1305a7fc4e34e708f99cff1d7253aa46167_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-create-datavolume-rhel9@sha256:7112400a4ecb23ee2110bf96372fcf9f96ad648a51aa944627b40eb59539a660_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-create-vm-from-template-rhel9@sha256:1411c65bbad7302710788327f6964a4bf5bc20ef70d5e46f4a5c6e7a0e7a0161_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-create-vm-from-template-rhel9@sha256:4d962618aa95600c60c9fc8b890186e510de91177d51949e12797a3558e31328_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-customize-rhel9@sha256:5c23d3f20ea9dcbe7109284d73078ecd516a070e964b844f8d80b1d92ebd55ee_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-customize-rhel9@sha256:a780244e48c6d4f87446d3754c3eb9ab79c0d54675c189da4a659f7a4d5668ea_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-sysprep-rhel9@sha256:84577d949a1bbcaa291c70729127bca4a8994df03068666baa23840877ea8392_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-sysprep-rhel9@sha256:aed630a597a090179e1b0e0c117e536df06b67d0f793f91936aa7388c0c5d7eb_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-modify-vm-template-rhel9@sha256:31d959b80cf57462e1705684bb7e1b78af26bd2c62f1c9e4e51e1d02199b05a8_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-modify-vm-template-rhel9@sha256:66aea526bc10e4c0136ba86e394bbdfe4fbd7f757d6f391a561b51d2ba2f4d46_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-operator-rhel9@sha256:d0cf0e81589f0938de45961eaddfc5ec4782738fd11082de0439b200534259eb_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-operator-rhel9@sha256:f1b1f5044db6bb945584f9d4f31d020597725a286ef368ed0aca2116abb31beb_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-wait-for-vmi-status-rhel9@sha256:39a15d03f113735df03b1a7408227eb9604d942c1f3c1992bcdc7eaf07662711_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-wait-for-vmi-status-rhel9@sha256:afb68af076954fcd18c7a4a1464ea0c2a766e8282eae980051906ed07eaa1707_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-template-validator-rhel9@sha256:02b22c7e7014b5e72d47fed8b6a268cf307638c5510adf3916c51f7f40a52a08_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-template-validator-rhel9@sha256:c0264b9271e602f85b2040ef7f207cdfa46038dc4fa6e4738bf196ef88a71cf8_amd64",
"9Base-CNV-4.13:container-native-virtualization/libguestfs-tools-rhel9@sha256:29ae84575bbca24553cf649256759fd96ff286971d80bc2db129154a7df9b283_amd64",
"9Base-CNV-4.13:container-native-virtualization/libguestfs-tools-rhel9@sha256:6558f60343e068b032167e2340b2c549c5f0258acc5d2614b60966ce79408b01_arm64",
"9Base-CNV-4.13:container-native-virtualization/multus-dynamic-networks-rhel9@sha256:3ecb0162a4b01d1590bf209d717b32a4f0835910d9979823f18c24acba41b503_arm64",
"9Base-CNV-4.13:container-native-virtualization/multus-dynamic-networks-rhel9@sha256:b7f68b6420009e21380d32d6459193aae45e93be9533debe17cb3108571b36b8_amd64",
"9Base-CNV-4.13:container-native-virtualization/ovs-cni-plugin-rhel9@sha256:0f1d372f418744e0aff59ecb0a38f53178aac9c2e9eecfd38aa25ed83e0d1360_arm64",
"9Base-CNV-4.13:container-native-virtualization/ovs-cni-plugin-rhel9@sha256:e8e7a44edbf1713fe74de5c4b8f691cce78f4440c4a32a16ba9ad16694a55396_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-api-rhel9@sha256:e68416321ca8c74a547b3d35897f54813c03481143e402e9bdc4daf315e35b5d_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-api-rhel9@sha256:fdb4ca1bb8b310d713d9c7e88f7d091f4460aa942dbeca5ebcf17281a06daffe_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-artifacts-server-rhel9@sha256:33d11c1832b49df39c1fca62bad40dbc5c30a452248339aaef449ac99509accb_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-artifacts-server-rhel9@sha256:81fc61b714baecb5a89fa6c0749c14566e0661b8e184ca602fc2e03b9cf431ee_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-apiserver-rhel9@sha256:f6128a63344ed2129f5bce648ddcfaa2869d31cde4b93328d3c22534b97ade10_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-apiserver-rhel9@sha256:feca273a691d09445c6cff6d36b5d590735e867656a9898ce0d89744d98e8006_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-cloner-rhel9@sha256:68e3b9b0291b4fb277ac430269ffce11d13b0a7688cf2ffcdb7f98759c36b4db_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-cloner-rhel9@sha256:6ac212767481bef64d8a7d0252bb8089c0f9751fad4a355aef71bd49dad2ad07_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-controller-rhel9@sha256:65f5263275d9f0a12b8fb057d82adf678778039ec873ca9bde182dea3413c9f1_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-controller-rhel9@sha256:d9e62b2019328be258489ac852eef25f8b1233f29abac6bcea5b406329f97fed_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-importer-rhel9@sha256:00a6d9d24ca1466d450b02269ec3144fc7550f0e5c696e869fbf7ce10cae6093_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-importer-rhel9@sha256:2df07fb21a3575e74aa16ded20129828f2300cd33e8ab369b0362062d49e62d0_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-operator-rhel9@sha256:20ec064750faedd97d11b797c8c1d9a1db5d60d7d76e82e65cfd05eb79d65e29_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-operator-rhel9@sha256:802ee8923d9d8e406b23911406f9748756c0ef4d6954e9e2fd5fb4bdf91dde9a_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-uploadproxy-rhel9@sha256:392d0f61f462c707adfdc21e4239c5c09d8520a80486b41d9d9ae479267d6124_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-uploadproxy-rhel9@sha256:6775f34353eec8f35bead9411dde155530d079bb8d51582fb1f2aacc27dbde1d_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-uploadserver-rhel9@sha256:4528c24672689cfb6505761b6b108fbcc04488192733f23d2bfe39cd42a1d743_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-uploadserver-rhel9@sha256:b22048390387380af94e267c8a9a66813c515997456d59d8ebac1486916b6585_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-controller-rhel9@sha256:3e7880149ee9a68286e390beb3d9779f7403c30fc5136e5370e0e4690a3fd243_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-controller-rhel9@sha256:970edc281d7a731e9f7e8c2d4440fe48a221e5e355d5235c5413b4c3adb28503_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-exportproxy-rhel9@sha256:1bda34d5bff734ad997202f29a5ff6f7362fd79fa90511a422442ef2e3681198_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-exportproxy-rhel9@sha256:de3c4afbf7669b98517cbef2490ec186f0553dd97b05bed80ec36dd883fe507b_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-exportserver-rhel9@sha256:3f7f98645176d42c63cca5c0fc3182a03121af87446ca421b6c72baf07dfca0d_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-exportserver-rhel9@sha256:8f12955cd777eb2409037a6968aa92f50c99d6e07e722951dbcfd0c8c9829b5e_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-handler-rhel9@sha256:5fc47110d866d8048aec50689090ce10705d19d3bb48d2b06727d6d569003af7_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-handler-rhel9@sha256:84ba79ae9658699147d2493df2582ab6df10adbff4d44a533c3fe6a9f45f9691_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-launcher-rhel9@sha256:4990d40d9987d5126d105dd45be2501eaded248cb61bdde5ea8d359bc1e7ebef_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-launcher-rhel9@sha256:95aeacb98209e0baef27ce0e02fbac38d693cea74808fc77107efda0f344bcb5_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-operator-rhel9@sha256:5c1a7e4ed2061938987b900a2394f07121d4037350c9bb6485213a2adfea787d_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-operator-rhel9@sha256:66b1b3b379121d6411ba22283e7d991617177330c93746d37753ab7812b9a00b_arm64",
"9Base-CNV-4.13:container-native-virtualization/virtio-win-rhel9@sha256:8735f51da918408a8826601c082d1b29accf26d59b9978da89b980cb509c1102_arm64",
"9Base-CNV-4.13:container-native-virtualization/virtio-win-rhel9@sha256:d147d2a6eb6f907d1e88f61aaca83596853bc72164583d6dda2b1154b490de25_amd64",
"9Base-CNV-4.13:container-native-virtualization/vm-console-proxy-rhel9@sha256:70a8d0cd66182c25e02679540bae1368b2a9cf687532b58dba41ef30c5ca00c1_arm64",
"9Base-CNV-4.13:container-native-virtualization/vm-console-proxy-rhel9@sha256:7ca921f98f6d81a126907127a611146fb53397869a628678faa1e289c01d22b2_amd64",
"9Base-CNV-4.13:container-native-virtualization/vm-network-latency-checkup-rhel9@sha256:503ea7ac914a9b54e9d665a0227ee0b5d5200cdb5d692aa94c07dd1518d91b70_arm64",
"9Base-CNV-4.13:container-native-virtualization/vm-network-latency-checkup-rhel9@sha256:59fd965975bccf641a0fa7aa01374d45057bd03cda7528248a84b60b1205bf57_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "golang: net/http: excessive memory growth in a Go server accepting HTTP/2 requests"
}
]
}
rhsa-2022:7407
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for service-binding-operator-bundle-container and service-binding-operator-container is now available for OpenShift Developer Tools and Services for OCP 4.9.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Service Binding Operator 1.3.1 is now available for OpenShift Developer Tools and Services for OCP 4.9 +\n\nSecurity Fix(es):\n\n* golang: golang.org/x/text/language: ParseAcceptLanguage takes a long time to parse complex tags (CVE-2022-32149)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2022:7407",
"url": "https://access.redhat.com/errata/RHSA-2022:7407"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#moderate",
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "https://docs.openshift.com/container-platform/latest/applications/connecting_applications_to_services/odc-connecting-an-application-to-a-service-using-the-developer-perspective.html",
"url": "https://docs.openshift.com/container-platform/latest/applications/connecting_applications_to_services/odc-connecting-an-application-to-a-service-using-the-developer-perspective.html"
},
{
"category": "external",
"summary": "2134010",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2134010"
},
{
"category": "external",
"summary": "APPSVC-1220",
"url": "https://issues.redhat.com/browse/APPSVC-1220"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2022/rhsa-2022_7407.json"
}
],
"title": "Red Hat Security Advisory: Service Binding Operator 1.3.1 security update",
"tracking": {
"current_release_date": "2025-10-10T01:53:20+00:00",
"generator": {
"date": "2025-10-10T01:53:20+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.9"
}
},
"id": "RHSA-2022:7407",
"initial_release_date": "2022-11-03T13:32:17+00:00",
"revision_history": [
{
"date": "2022-11-03T13:32:17+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2022-11-03T13:32:17+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-10-10T01:53:20+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "OpenShift Developer Tools and Services for OCP 4.9 for RHEL 8",
"product": {
"name": "OpenShift Developer Tools and Services for OCP 4.9 for RHEL 8",
"product_id": "8Base-OCP-Tools-4.9",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:ocp_tools:4.9::el8"
}
}
}
],
"category": "product_family",
"name": "OpenShift Jenkins"
},
{
"branches": [
{
"category": "product_version",
"name": "ocp-tools-4/service-binding-operator-bundle@sha256:ed577a367afc96253a125e8868dc992f832bbca209d7abe57fc939ed686715b6_amd64",
"product": {
"name": "ocp-tools-4/service-binding-operator-bundle@sha256:ed577a367afc96253a125e8868dc992f832bbca209d7abe57fc939ed686715b6_amd64",
"product_id": "ocp-tools-4/service-binding-operator-bundle@sha256:ed577a367afc96253a125e8868dc992f832bbca209d7abe57fc939ed686715b6_amd64",
"product_identification_helper": {
"purl": "pkg:oci/service-binding-operator-bundle@sha256:ed577a367afc96253a125e8868dc992f832bbca209d7abe57fc939ed686715b6?arch=amd64\u0026repository_url=registry.redhat.io/ocp-tools-4/service-binding-operator-bundle\u0026tag=v1.3.1-7"
}
}
},
{
"category": "product_version",
"name": "ocp-tools-4/service-binding-rhel8-operator@sha256:1640967bb2d7feb690921d81c5938d43e06a9794d8bd32f817fc8b5816d339d0_amd64",
"product": {
"name": "ocp-tools-4/service-binding-rhel8-operator@sha256:1640967bb2d7feb690921d81c5938d43e06a9794d8bd32f817fc8b5816d339d0_amd64",
"product_id": "ocp-tools-4/service-binding-rhel8-operator@sha256:1640967bb2d7feb690921d81c5938d43e06a9794d8bd32f817fc8b5816d339d0_amd64",
"product_identification_helper": {
"purl": "pkg:oci/service-binding-rhel8-operator@sha256:1640967bb2d7feb690921d81c5938d43e06a9794d8bd32f817fc8b5816d339d0?arch=amd64\u0026repository_url=registry.redhat.io/ocp-tools-4/service-binding-rhel8-operator\u0026tag=v1.3.1-5"
}
}
}
],
"category": "architecture",
"name": "amd64"
},
{
"branches": [
{
"category": "product_version",
"name": "ocp-tools-4/service-binding-rhel8-operator@sha256:1f14186b1fb24aebb5a706ab9560003fa57c595d37a65092a1443a0d0bf8e9c2_arm64",
"product": {
"name": "ocp-tools-4/service-binding-rhel8-operator@sha256:1f14186b1fb24aebb5a706ab9560003fa57c595d37a65092a1443a0d0bf8e9c2_arm64",
"product_id": "ocp-tools-4/service-binding-rhel8-operator@sha256:1f14186b1fb24aebb5a706ab9560003fa57c595d37a65092a1443a0d0bf8e9c2_arm64",
"product_identification_helper": {
"purl": "pkg:oci/service-binding-rhel8-operator@sha256:1f14186b1fb24aebb5a706ab9560003fa57c595d37a65092a1443a0d0bf8e9c2?arch=arm64\u0026repository_url=registry.redhat.io/ocp-tools-4/service-binding-rhel8-operator\u0026tag=v1.3.1-5"
}
}
}
],
"category": "architecture",
"name": "arm64"
},
{
"branches": [
{
"category": "product_version",
"name": "ocp-tools-4/service-binding-rhel8-operator@sha256:98f9de0d64607fc9a8dade067d12ba73bdae4006f7ef0571e628f7fcaecf8959_s390x",
"product": {
"name": "ocp-tools-4/service-binding-rhel8-operator@sha256:98f9de0d64607fc9a8dade067d12ba73bdae4006f7ef0571e628f7fcaecf8959_s390x",
"product_id": "ocp-tools-4/service-binding-rhel8-operator@sha256:98f9de0d64607fc9a8dade067d12ba73bdae4006f7ef0571e628f7fcaecf8959_s390x",
"product_identification_helper": {
"purl": "pkg:oci/service-binding-rhel8-operator@sha256:98f9de0d64607fc9a8dade067d12ba73bdae4006f7ef0571e628f7fcaecf8959?arch=s390x\u0026repository_url=registry.redhat.io/ocp-tools-4/service-binding-rhel8-operator\u0026tag=v1.3.1-5"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "ocp-tools-4/service-binding-rhel8-operator@sha256:eb70d8863ec16d3c78d72455c12ea121c52e485e812dd2903ef4c5b52ce78c08_ppc64le",
"product": {
"name": "ocp-tools-4/service-binding-rhel8-operator@sha256:eb70d8863ec16d3c78d72455c12ea121c52e485e812dd2903ef4c5b52ce78c08_ppc64le",
"product_id": "ocp-tools-4/service-binding-rhel8-operator@sha256:eb70d8863ec16d3c78d72455c12ea121c52e485e812dd2903ef4c5b52ce78c08_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/service-binding-rhel8-operator@sha256:eb70d8863ec16d3c78d72455c12ea121c52e485e812dd2903ef4c5b52ce78c08?arch=ppc64le\u0026repository_url=registry.redhat.io/ocp-tools-4/service-binding-rhel8-operator\u0026tag=v1.3.1-5"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "ocp-tools-4/service-binding-operator-bundle@sha256:ed577a367afc96253a125e8868dc992f832bbca209d7abe57fc939ed686715b6_amd64 as a component of OpenShift Developer Tools and Services for OCP 4.9 for RHEL 8",
"product_id": "8Base-OCP-Tools-4.9:ocp-tools-4/service-binding-operator-bundle@sha256:ed577a367afc96253a125e8868dc992f832bbca209d7abe57fc939ed686715b6_amd64"
},
"product_reference": "ocp-tools-4/service-binding-operator-bundle@sha256:ed577a367afc96253a125e8868dc992f832bbca209d7abe57fc939ed686715b6_amd64",
"relates_to_product_reference": "8Base-OCP-Tools-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocp-tools-4/service-binding-rhel8-operator@sha256:1640967bb2d7feb690921d81c5938d43e06a9794d8bd32f817fc8b5816d339d0_amd64 as a component of OpenShift Developer Tools and Services for OCP 4.9 for RHEL 8",
"product_id": "8Base-OCP-Tools-4.9:ocp-tools-4/service-binding-rhel8-operator@sha256:1640967bb2d7feb690921d81c5938d43e06a9794d8bd32f817fc8b5816d339d0_amd64"
},
"product_reference": "ocp-tools-4/service-binding-rhel8-operator@sha256:1640967bb2d7feb690921d81c5938d43e06a9794d8bd32f817fc8b5816d339d0_amd64",
"relates_to_product_reference": "8Base-OCP-Tools-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocp-tools-4/service-binding-rhel8-operator@sha256:1f14186b1fb24aebb5a706ab9560003fa57c595d37a65092a1443a0d0bf8e9c2_arm64 as a component of OpenShift Developer Tools and Services for OCP 4.9 for RHEL 8",
"product_id": "8Base-OCP-Tools-4.9:ocp-tools-4/service-binding-rhel8-operator@sha256:1f14186b1fb24aebb5a706ab9560003fa57c595d37a65092a1443a0d0bf8e9c2_arm64"
},
"product_reference": "ocp-tools-4/service-binding-rhel8-operator@sha256:1f14186b1fb24aebb5a706ab9560003fa57c595d37a65092a1443a0d0bf8e9c2_arm64",
"relates_to_product_reference": "8Base-OCP-Tools-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocp-tools-4/service-binding-rhel8-operator@sha256:98f9de0d64607fc9a8dade067d12ba73bdae4006f7ef0571e628f7fcaecf8959_s390x as a component of OpenShift Developer Tools and Services for OCP 4.9 for RHEL 8",
"product_id": "8Base-OCP-Tools-4.9:ocp-tools-4/service-binding-rhel8-operator@sha256:98f9de0d64607fc9a8dade067d12ba73bdae4006f7ef0571e628f7fcaecf8959_s390x"
},
"product_reference": "ocp-tools-4/service-binding-rhel8-operator@sha256:98f9de0d64607fc9a8dade067d12ba73bdae4006f7ef0571e628f7fcaecf8959_s390x",
"relates_to_product_reference": "8Base-OCP-Tools-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocp-tools-4/service-binding-rhel8-operator@sha256:eb70d8863ec16d3c78d72455c12ea121c52e485e812dd2903ef4c5b52ce78c08_ppc64le as a component of OpenShift Developer Tools and Services for OCP 4.9 for RHEL 8",
"product_id": "8Base-OCP-Tools-4.9:ocp-tools-4/service-binding-rhel8-operator@sha256:eb70d8863ec16d3c78d72455c12ea121c52e485e812dd2903ef4c5b52ce78c08_ppc64le"
},
"product_reference": "ocp-tools-4/service-binding-rhel8-operator@sha256:eb70d8863ec16d3c78d72455c12ea121c52e485e812dd2903ef4c5b52ce78c08_ppc64le",
"relates_to_product_reference": "8Base-OCP-Tools-4.9"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2022-32149",
"cwe": {
"id": "CWE-407",
"name": "Inefficient Algorithmic Complexity"
},
"discovery_date": "2022-10-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2134010"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in the golang.org/x/text/language package. An attacker can craft an Accept-Language header which ParseAcceptLanguage will take significant time to parse. This issue leads to a denial of service, and can impact availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: golang.org/x/text/language: ParseAcceptLanguage takes a long time to parse complex tags",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "After careful analysis of the vulnerability Redhat is choosing to keep the vulnerability severity as moderate,the vulnerability exists in the ParseAcceptLanguage function of the golang text/language package,when an attacker could craft an unusually large accept header and due to the parser taking quadratic time complexity to finish, firstly the attacker would have to find a way smuggle an input to the parser and even then this would simply not result in a crash of any kind but more of resource hang which while can be unpleasant,does not equate to any real world damage.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-OCP-Tools-4.9:ocp-tools-4/service-binding-operator-bundle@sha256:ed577a367afc96253a125e8868dc992f832bbca209d7abe57fc939ed686715b6_amd64",
"8Base-OCP-Tools-4.9:ocp-tools-4/service-binding-rhel8-operator@sha256:1640967bb2d7feb690921d81c5938d43e06a9794d8bd32f817fc8b5816d339d0_amd64",
"8Base-OCP-Tools-4.9:ocp-tools-4/service-binding-rhel8-operator@sha256:1f14186b1fb24aebb5a706ab9560003fa57c595d37a65092a1443a0d0bf8e9c2_arm64",
"8Base-OCP-Tools-4.9:ocp-tools-4/service-binding-rhel8-operator@sha256:98f9de0d64607fc9a8dade067d12ba73bdae4006f7ef0571e628f7fcaecf8959_s390x",
"8Base-OCP-Tools-4.9:ocp-tools-4/service-binding-rhel8-operator@sha256:eb70d8863ec16d3c78d72455c12ea121c52e485e812dd2903ef4c5b52ce78c08_ppc64le"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-32149"
},
{
"category": "external",
"summary": "RHBZ#2134010",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2134010"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-32149",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32149"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-32149",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-32149"
},
{
"category": "external",
"summary": "https://go.dev/issue/56152",
"url": "https://go.dev/issue/56152"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-dev/c/qfPIly0X7aU",
"url": "https://groups.google.com/g/golang-dev/c/qfPIly0X7aU"
}
],
"release_date": "2022-10-11T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-11-03T13:32:17+00:00",
"details": "Before applying this update, ensure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, see: https://access.redhat.com/articles/11258.\n\nFollow the instructions linked in the References section to create service binding connections between applications and services using the Developer perspective in the OpenShift Container Platform web console.",
"product_ids": [
"8Base-OCP-Tools-4.9:ocp-tools-4/service-binding-operator-bundle@sha256:ed577a367afc96253a125e8868dc992f832bbca209d7abe57fc939ed686715b6_amd64",
"8Base-OCP-Tools-4.9:ocp-tools-4/service-binding-rhel8-operator@sha256:1640967bb2d7feb690921d81c5938d43e06a9794d8bd32f817fc8b5816d339d0_amd64",
"8Base-OCP-Tools-4.9:ocp-tools-4/service-binding-rhel8-operator@sha256:1f14186b1fb24aebb5a706ab9560003fa57c595d37a65092a1443a0d0bf8e9c2_arm64",
"8Base-OCP-Tools-4.9:ocp-tools-4/service-binding-rhel8-operator@sha256:98f9de0d64607fc9a8dade067d12ba73bdae4006f7ef0571e628f7fcaecf8959_s390x",
"8Base-OCP-Tools-4.9:ocp-tools-4/service-binding-rhel8-operator@sha256:eb70d8863ec16d3c78d72455c12ea121c52e485e812dd2903ef4c5b52ce78c08_ppc64le"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:7407"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"8Base-OCP-Tools-4.9:ocp-tools-4/service-binding-operator-bundle@sha256:ed577a367afc96253a125e8868dc992f832bbca209d7abe57fc939ed686715b6_amd64",
"8Base-OCP-Tools-4.9:ocp-tools-4/service-binding-rhel8-operator@sha256:1640967bb2d7feb690921d81c5938d43e06a9794d8bd32f817fc8b5816d339d0_amd64",
"8Base-OCP-Tools-4.9:ocp-tools-4/service-binding-rhel8-operator@sha256:1f14186b1fb24aebb5a706ab9560003fa57c595d37a65092a1443a0d0bf8e9c2_arm64",
"8Base-OCP-Tools-4.9:ocp-tools-4/service-binding-rhel8-operator@sha256:98f9de0d64607fc9a8dade067d12ba73bdae4006f7ef0571e628f7fcaecf8959_s390x",
"8Base-OCP-Tools-4.9:ocp-tools-4/service-binding-rhel8-operator@sha256:eb70d8863ec16d3c78d72455c12ea121c52e485e812dd2903ef4c5b52ce78c08_ppc64le"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "golang: golang.org/x/text/language: ParseAcceptLanguage takes a long time to parse complex tags"
}
]
}
rhsa-2023:3204
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Red Hat OpenShift Virtualization release 4.13.0 is now available with updates to packages and images that fix several bugs and add enhancements.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "OpenShift Virtualization is Red Hat\u0027s virtualization solution designed for Red Hat OpenShift Container Platform.\n\nThis advisory contains OpenShift Virtualization 4.13.0 RPMs.\n\nSecurity Fix(es):\n\n* golang: net/http: handle server errors after sending GOAWAY (CVE-2022-27664)\n\n* golang: golang.org/x/text/language: ParseAcceptLanguage takes a long time to parse complex tags (CVE-2022-32149)\n\n* golang: net/url: JoinPath does not strip relative path components in all circumstances (CVE-2022-32190)\n\n* golang: net/http: excessive memory growth in a Go server accepting HTTP/2 requests (CVE-2022-41717)\n\n* golang: math/big: decoding big.Float and big.Rat types can panic if the encoded message is too short, potentially allowing a denial of service (CVE-2022-32189)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nBug Fix(es):\n\n* 4.13.0 rpms (BZ#2124993)",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2023:3204",
"url": "https://access.redhat.com/errata/RHSA-2023:3204"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#moderate",
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "2113814",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2113814"
},
{
"category": "external",
"summary": "2124668",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2124668"
},
{
"category": "external",
"summary": "2124669",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2124669"
},
{
"category": "external",
"summary": "2124993",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2124993"
},
{
"category": "external",
"summary": "2134010",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2134010"
},
{
"category": "external",
"summary": "2161274",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2161274"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2023/rhsa-2023_3204.json"
}
],
"title": "Red Hat Security Advisory: OpenShift Virtualization 4.13.0 RPMs security and bug fix update",
"tracking": {
"current_release_date": "2025-10-24T13:32:21+00:00",
"generator": {
"date": "2025-10-24T13:32:21+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.10"
}
},
"id": "RHSA-2023:3204",
"initial_release_date": "2023-05-18T00:39:12+00:00",
"revision_history": [
{
"date": "2023-05-18T00:39:12+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2023-05-18T00:39:12+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-10-24T13:32:21+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "CNV 4.13 for RHEL 9",
"product": {
"name": "CNV 4.13 for RHEL 9",
"product_id": "9Base-CNV-4.13",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:container_native_virtualization:4.13::el9"
}
}
},
{
"category": "product_name",
"name": "CNV 4.13 for RHEL 7",
"product": {
"name": "CNV 4.13 for RHEL 7",
"product_id": "7Server-CNV-4.13",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:container_native_virtualization:4.13::el7"
}
}
},
{
"category": "product_name",
"name": "CNV 4.13 for RHEL 8",
"product": {
"name": "CNV 4.13 for RHEL 8",
"product_id": "8Base-CNV-4.13",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:container_native_virtualization:4.13::el8"
}
}
}
],
"category": "product_family",
"name": "OpenShift Virtualization"
},
{
"branches": [
{
"category": "product_version",
"name": "kubevirt-0:4.13.0-1469.el9.src",
"product": {
"name": "kubevirt-0:4.13.0-1469.el9.src",
"product_id": "kubevirt-0:4.13.0-1469.el9.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kubevirt@4.13.0-1469.el9?arch=src"
}
}
},
{
"category": "product_version",
"name": "kubevirt-0:4.13.0-1469.el7.src",
"product": {
"name": "kubevirt-0:4.13.0-1469.el7.src",
"product_id": "kubevirt-0:4.13.0-1469.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kubevirt@4.13.0-1469.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "kubevirt-0:4.13.0-1469.el8.src",
"product": {
"name": "kubevirt-0:4.13.0-1469.el8.src",
"product_id": "kubevirt-0:4.13.0-1469.el8.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kubevirt@4.13.0-1469.el8?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "kubevirt-virtctl-0:4.13.0-1469.el9.x86_64",
"product": {
"name": "kubevirt-virtctl-0:4.13.0-1469.el9.x86_64",
"product_id": "kubevirt-virtctl-0:4.13.0-1469.el9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kubevirt-virtctl@4.13.0-1469.el9?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kubevirt-virtctl-redistributable-0:4.13.0-1469.el9.x86_64",
"product": {
"name": "kubevirt-virtctl-redistributable-0:4.13.0-1469.el9.x86_64",
"product_id": "kubevirt-virtctl-redistributable-0:4.13.0-1469.el9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kubevirt-virtctl-redistributable@4.13.0-1469.el9?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kubevirt-virtctl-0:4.13.0-1469.el7.x86_64",
"product": {
"name": "kubevirt-virtctl-0:4.13.0-1469.el7.x86_64",
"product_id": "kubevirt-virtctl-0:4.13.0-1469.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kubevirt-virtctl@4.13.0-1469.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kubevirt-virtctl-redistributable-0:4.13.0-1469.el7.x86_64",
"product": {
"name": "kubevirt-virtctl-redistributable-0:4.13.0-1469.el7.x86_64",
"product_id": "kubevirt-virtctl-redistributable-0:4.13.0-1469.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kubevirt-virtctl-redistributable@4.13.0-1469.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kubevirt-virtctl-0:4.13.0-1469.el8.x86_64",
"product": {
"name": "kubevirt-virtctl-0:4.13.0-1469.el8.x86_64",
"product_id": "kubevirt-virtctl-0:4.13.0-1469.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kubevirt-virtctl@4.13.0-1469.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kubevirt-virtctl-redistributable-0:4.13.0-1469.el8.x86_64",
"product": {
"name": "kubevirt-virtctl-redistributable-0:4.13.0-1469.el8.x86_64",
"product_id": "kubevirt-virtctl-redistributable-0:4.13.0-1469.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kubevirt-virtctl-redistributable@4.13.0-1469.el8?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "kubevirt-virtctl-0:4.13.0-1469.el9.aarch64",
"product": {
"name": "kubevirt-virtctl-0:4.13.0-1469.el9.aarch64",
"product_id": "kubevirt-virtctl-0:4.13.0-1469.el9.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kubevirt-virtctl@4.13.0-1469.el9?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kubevirt-virtctl-redistributable-0:4.13.0-1469.el9.aarch64",
"product": {
"name": "kubevirt-virtctl-redistributable-0:4.13.0-1469.el9.aarch64",
"product_id": "kubevirt-virtctl-redistributable-0:4.13.0-1469.el9.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kubevirt-virtctl-redistributable@4.13.0-1469.el9?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kubevirt-virtctl-0:4.13.0-1469.el8.aarch64",
"product": {
"name": "kubevirt-virtctl-0:4.13.0-1469.el8.aarch64",
"product_id": "kubevirt-virtctl-0:4.13.0-1469.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kubevirt-virtctl@4.13.0-1469.el8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kubevirt-virtctl-redistributable-0:4.13.0-1469.el8.aarch64",
"product": {
"name": "kubevirt-virtctl-redistributable-0:4.13.0-1469.el8.aarch64",
"product_id": "kubevirt-virtctl-redistributable-0:4.13.0-1469.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kubevirt-virtctl-redistributable@4.13.0-1469.el8?arch=aarch64"
}
}
}
],
"category": "architecture",
"name": "aarch64"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kubevirt-0:4.13.0-1469.el7.src as a component of CNV 4.13 for RHEL 7",
"product_id": "7Server-CNV-4.13:kubevirt-0:4.13.0-1469.el7.src"
},
"product_reference": "kubevirt-0:4.13.0-1469.el7.src",
"relates_to_product_reference": "7Server-CNV-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kubevirt-virtctl-0:4.13.0-1469.el7.x86_64 as a component of CNV 4.13 for RHEL 7",
"product_id": "7Server-CNV-4.13:kubevirt-virtctl-0:4.13.0-1469.el7.x86_64"
},
"product_reference": "kubevirt-virtctl-0:4.13.0-1469.el7.x86_64",
"relates_to_product_reference": "7Server-CNV-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kubevirt-virtctl-redistributable-0:4.13.0-1469.el7.x86_64 as a component of CNV 4.13 for RHEL 7",
"product_id": "7Server-CNV-4.13:kubevirt-virtctl-redistributable-0:4.13.0-1469.el7.x86_64"
},
"product_reference": "kubevirt-virtctl-redistributable-0:4.13.0-1469.el7.x86_64",
"relates_to_product_reference": "7Server-CNV-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kubevirt-0:4.13.0-1469.el8.src as a component of CNV 4.13 for RHEL 8",
"product_id": "8Base-CNV-4.13:kubevirt-0:4.13.0-1469.el8.src"
},
"product_reference": "kubevirt-0:4.13.0-1469.el8.src",
"relates_to_product_reference": "8Base-CNV-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kubevirt-virtctl-0:4.13.0-1469.el8.aarch64 as a component of CNV 4.13 for RHEL 8",
"product_id": "8Base-CNV-4.13:kubevirt-virtctl-0:4.13.0-1469.el8.aarch64"
},
"product_reference": "kubevirt-virtctl-0:4.13.0-1469.el8.aarch64",
"relates_to_product_reference": "8Base-CNV-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kubevirt-virtctl-0:4.13.0-1469.el8.x86_64 as a component of CNV 4.13 for RHEL 8",
"product_id": "8Base-CNV-4.13:kubevirt-virtctl-0:4.13.0-1469.el8.x86_64"
},
"product_reference": "kubevirt-virtctl-0:4.13.0-1469.el8.x86_64",
"relates_to_product_reference": "8Base-CNV-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kubevirt-virtctl-redistributable-0:4.13.0-1469.el8.aarch64 as a component of CNV 4.13 for RHEL 8",
"product_id": "8Base-CNV-4.13:kubevirt-virtctl-redistributable-0:4.13.0-1469.el8.aarch64"
},
"product_reference": "kubevirt-virtctl-redistributable-0:4.13.0-1469.el8.aarch64",
"relates_to_product_reference": "8Base-CNV-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kubevirt-virtctl-redistributable-0:4.13.0-1469.el8.x86_64 as a component of CNV 4.13 for RHEL 8",
"product_id": "8Base-CNV-4.13:kubevirt-virtctl-redistributable-0:4.13.0-1469.el8.x86_64"
},
"product_reference": "kubevirt-virtctl-redistributable-0:4.13.0-1469.el8.x86_64",
"relates_to_product_reference": "8Base-CNV-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kubevirt-0:4.13.0-1469.el9.src as a component of CNV 4.13 for RHEL 9",
"product_id": "9Base-CNV-4.13:kubevirt-0:4.13.0-1469.el9.src"
},
"product_reference": "kubevirt-0:4.13.0-1469.el9.src",
"relates_to_product_reference": "9Base-CNV-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kubevirt-virtctl-0:4.13.0-1469.el9.aarch64 as a component of CNV 4.13 for RHEL 9",
"product_id": "9Base-CNV-4.13:kubevirt-virtctl-0:4.13.0-1469.el9.aarch64"
},
"product_reference": "kubevirt-virtctl-0:4.13.0-1469.el9.aarch64",
"relates_to_product_reference": "9Base-CNV-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kubevirt-virtctl-0:4.13.0-1469.el9.x86_64 as a component of CNV 4.13 for RHEL 9",
"product_id": "9Base-CNV-4.13:kubevirt-virtctl-0:4.13.0-1469.el9.x86_64"
},
"product_reference": "kubevirt-virtctl-0:4.13.0-1469.el9.x86_64",
"relates_to_product_reference": "9Base-CNV-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kubevirt-virtctl-redistributable-0:4.13.0-1469.el9.aarch64 as a component of CNV 4.13 for RHEL 9",
"product_id": "9Base-CNV-4.13:kubevirt-virtctl-redistributable-0:4.13.0-1469.el9.aarch64"
},
"product_reference": "kubevirt-virtctl-redistributable-0:4.13.0-1469.el9.aarch64",
"relates_to_product_reference": "9Base-CNV-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kubevirt-virtctl-redistributable-0:4.13.0-1469.el9.x86_64 as a component of CNV 4.13 for RHEL 9",
"product_id": "9Base-CNV-4.13:kubevirt-virtctl-redistributable-0:4.13.0-1469.el9.x86_64"
},
"product_reference": "kubevirt-virtctl-redistributable-0:4.13.0-1469.el9.x86_64",
"relates_to_product_reference": "9Base-CNV-4.13"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2022-27664",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"discovery_date": "2022-09-06T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2124669"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the golang package. In net/http in Go, attackers can cause a denial of service because an HTTP/2 connection can hang during closing if a fatal error preempts the shutdown.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: net/http: handle server errors after sending GOAWAY",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The opportunity for a Denial of Service is limited to the golang runtime. In the case of OpenShift Container Platform, this would be restricted within each individual container. There are multiple layers of guide rails (Golang\u2019s Garbage Collector; OpenShift\u2019s resource constraints imposed at the container and cluster levels) which would require a malicious user to continue submitting attacks for there to be any enduring impact. They would also need access to external server resources to be able to send a massive volume of requests to cause a significant impact on server operations.\n\nWithin regulated environments, a combination of the following controls acts as a significant barrier to successfully exploiting a CWE-400: Uncontrolled Resource Consumption vulnerability and therefore downgrades the severity of this particular CVE from Moderate to Low.\n\nRed Hat restricts access to all platform information by default, granting access only after successful hard token-based multi-factor authentication (MFA) and enforcing least privilege to ensure only authorized roles can execute or modify code. The environment employs malicious code protections, including IDS/IPS and antimalware tools to detect threats and monitor resource usage, helping prevent uncontrolled consumption that could lead to system failure. Additional safeguards, such as web application firewalls and load-balancing strategies, protect against resource exhaustion and performance degradation. Event logs are centrally collected, correlated, and analyzed to support monitoring, alerting, and retention, aiding in the detection of abnormal behavior and potential denial-of-service (DoS) conditions. Static code analysis and peer reviews enforce strong input validation and error handling, reducing the likelihood of input-based DoS attacks.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-CNV-4.13:kubevirt-0:4.13.0-1469.el7.src",
"7Server-CNV-4.13:kubevirt-virtctl-0:4.13.0-1469.el7.x86_64",
"7Server-CNV-4.13:kubevirt-virtctl-redistributable-0:4.13.0-1469.el7.x86_64",
"8Base-CNV-4.13:kubevirt-0:4.13.0-1469.el8.src",
"8Base-CNV-4.13:kubevirt-virtctl-0:4.13.0-1469.el8.aarch64",
"8Base-CNV-4.13:kubevirt-virtctl-0:4.13.0-1469.el8.x86_64",
"8Base-CNV-4.13:kubevirt-virtctl-redistributable-0:4.13.0-1469.el8.aarch64",
"8Base-CNV-4.13:kubevirt-virtctl-redistributable-0:4.13.0-1469.el8.x86_64",
"9Base-CNV-4.13:kubevirt-0:4.13.0-1469.el9.src",
"9Base-CNV-4.13:kubevirt-virtctl-0:4.13.0-1469.el9.aarch64",
"9Base-CNV-4.13:kubevirt-virtctl-0:4.13.0-1469.el9.x86_64",
"9Base-CNV-4.13:kubevirt-virtctl-redistributable-0:4.13.0-1469.el9.aarch64",
"9Base-CNV-4.13:kubevirt-virtctl-redistributable-0:4.13.0-1469.el9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-27664"
},
{
"category": "external",
"summary": "RHBZ#2124669",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2124669"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-27664",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27664"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-27664",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-27664"
},
{
"category": "external",
"summary": "https://go.dev/issue/54658",
"url": "https://go.dev/issue/54658"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/x49AQzIVX-s/m/0tgO0pjiBQAJ",
"url": "https://groups.google.com/g/golang-announce/c/x49AQzIVX-s/m/0tgO0pjiBQAJ"
}
],
"release_date": "2022-09-06T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-05-18T00:39:12+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-CNV-4.13:kubevirt-0:4.13.0-1469.el7.src",
"7Server-CNV-4.13:kubevirt-virtctl-0:4.13.0-1469.el7.x86_64",
"7Server-CNV-4.13:kubevirt-virtctl-redistributable-0:4.13.0-1469.el7.x86_64",
"8Base-CNV-4.13:kubevirt-0:4.13.0-1469.el8.src",
"8Base-CNV-4.13:kubevirt-virtctl-0:4.13.0-1469.el8.aarch64",
"8Base-CNV-4.13:kubevirt-virtctl-0:4.13.0-1469.el8.x86_64",
"8Base-CNV-4.13:kubevirt-virtctl-redistributable-0:4.13.0-1469.el8.aarch64",
"8Base-CNV-4.13:kubevirt-virtctl-redistributable-0:4.13.0-1469.el8.x86_64",
"9Base-CNV-4.13:kubevirt-0:4.13.0-1469.el9.src",
"9Base-CNV-4.13:kubevirt-virtctl-0:4.13.0-1469.el9.aarch64",
"9Base-CNV-4.13:kubevirt-virtctl-0:4.13.0-1469.el9.x86_64",
"9Base-CNV-4.13:kubevirt-virtctl-redistributable-0:4.13.0-1469.el9.aarch64",
"9Base-CNV-4.13:kubevirt-virtctl-redistributable-0:4.13.0-1469.el9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:3204"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"7Server-CNV-4.13:kubevirt-0:4.13.0-1469.el7.src",
"7Server-CNV-4.13:kubevirt-virtctl-0:4.13.0-1469.el7.x86_64",
"7Server-CNV-4.13:kubevirt-virtctl-redistributable-0:4.13.0-1469.el7.x86_64",
"8Base-CNV-4.13:kubevirt-0:4.13.0-1469.el8.src",
"8Base-CNV-4.13:kubevirt-virtctl-0:4.13.0-1469.el8.aarch64",
"8Base-CNV-4.13:kubevirt-virtctl-0:4.13.0-1469.el8.x86_64",
"8Base-CNV-4.13:kubevirt-virtctl-redistributable-0:4.13.0-1469.el8.aarch64",
"8Base-CNV-4.13:kubevirt-virtctl-redistributable-0:4.13.0-1469.el8.x86_64",
"9Base-CNV-4.13:kubevirt-0:4.13.0-1469.el9.src",
"9Base-CNV-4.13:kubevirt-virtctl-0:4.13.0-1469.el9.aarch64",
"9Base-CNV-4.13:kubevirt-virtctl-0:4.13.0-1469.el9.x86_64",
"9Base-CNV-4.13:kubevirt-virtctl-redistributable-0:4.13.0-1469.el9.aarch64",
"9Base-CNV-4.13:kubevirt-virtctl-redistributable-0:4.13.0-1469.el9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "golang: net/http: handle server errors after sending GOAWAY"
},
{
"cve": "CVE-2022-32149",
"cwe": {
"id": "CWE-407",
"name": "Inefficient Algorithmic Complexity"
},
"discovery_date": "2022-10-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2134010"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in the golang.org/x/text/language package. An attacker can craft an Accept-Language header which ParseAcceptLanguage will take significant time to parse. This issue leads to a denial of service, and can impact availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: golang.org/x/text/language: ParseAcceptLanguage takes a long time to parse complex tags",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "After careful analysis of the vulnerability Redhat is choosing to keep the vulnerability severity as moderate,the vulnerability exists in the ParseAcceptLanguage function of the golang text/language package,when an attacker could craft an unusually large accept header and due to the parser taking quadratic time complexity to finish, firstly the attacker would have to find a way smuggle an input to the parser and even then this would simply not result in a crash of any kind but more of resource hang which while can be unpleasant,does not equate to any real world damage.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-CNV-4.13:kubevirt-0:4.13.0-1469.el7.src",
"7Server-CNV-4.13:kubevirt-virtctl-0:4.13.0-1469.el7.x86_64",
"7Server-CNV-4.13:kubevirt-virtctl-redistributable-0:4.13.0-1469.el7.x86_64",
"8Base-CNV-4.13:kubevirt-0:4.13.0-1469.el8.src",
"8Base-CNV-4.13:kubevirt-virtctl-0:4.13.0-1469.el8.aarch64",
"8Base-CNV-4.13:kubevirt-virtctl-0:4.13.0-1469.el8.x86_64",
"8Base-CNV-4.13:kubevirt-virtctl-redistributable-0:4.13.0-1469.el8.aarch64",
"8Base-CNV-4.13:kubevirt-virtctl-redistributable-0:4.13.0-1469.el8.x86_64",
"9Base-CNV-4.13:kubevirt-0:4.13.0-1469.el9.src",
"9Base-CNV-4.13:kubevirt-virtctl-0:4.13.0-1469.el9.aarch64",
"9Base-CNV-4.13:kubevirt-virtctl-0:4.13.0-1469.el9.x86_64",
"9Base-CNV-4.13:kubevirt-virtctl-redistributable-0:4.13.0-1469.el9.aarch64",
"9Base-CNV-4.13:kubevirt-virtctl-redistributable-0:4.13.0-1469.el9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-32149"
},
{
"category": "external",
"summary": "RHBZ#2134010",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2134010"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-32149",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32149"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-32149",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-32149"
},
{
"category": "external",
"summary": "https://go.dev/issue/56152",
"url": "https://go.dev/issue/56152"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-dev/c/qfPIly0X7aU",
"url": "https://groups.google.com/g/golang-dev/c/qfPIly0X7aU"
}
],
"release_date": "2022-10-11T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-05-18T00:39:12+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-CNV-4.13:kubevirt-0:4.13.0-1469.el7.src",
"7Server-CNV-4.13:kubevirt-virtctl-0:4.13.0-1469.el7.x86_64",
"7Server-CNV-4.13:kubevirt-virtctl-redistributable-0:4.13.0-1469.el7.x86_64",
"8Base-CNV-4.13:kubevirt-0:4.13.0-1469.el8.src",
"8Base-CNV-4.13:kubevirt-virtctl-0:4.13.0-1469.el8.aarch64",
"8Base-CNV-4.13:kubevirt-virtctl-0:4.13.0-1469.el8.x86_64",
"8Base-CNV-4.13:kubevirt-virtctl-redistributable-0:4.13.0-1469.el8.aarch64",
"8Base-CNV-4.13:kubevirt-virtctl-redistributable-0:4.13.0-1469.el8.x86_64",
"9Base-CNV-4.13:kubevirt-0:4.13.0-1469.el9.src",
"9Base-CNV-4.13:kubevirt-virtctl-0:4.13.0-1469.el9.aarch64",
"9Base-CNV-4.13:kubevirt-virtctl-0:4.13.0-1469.el9.x86_64",
"9Base-CNV-4.13:kubevirt-virtctl-redistributable-0:4.13.0-1469.el9.aarch64",
"9Base-CNV-4.13:kubevirt-virtctl-redistributable-0:4.13.0-1469.el9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:3204"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"7Server-CNV-4.13:kubevirt-0:4.13.0-1469.el7.src",
"7Server-CNV-4.13:kubevirt-virtctl-0:4.13.0-1469.el7.x86_64",
"7Server-CNV-4.13:kubevirt-virtctl-redistributable-0:4.13.0-1469.el7.x86_64",
"8Base-CNV-4.13:kubevirt-0:4.13.0-1469.el8.src",
"8Base-CNV-4.13:kubevirt-virtctl-0:4.13.0-1469.el8.aarch64",
"8Base-CNV-4.13:kubevirt-virtctl-0:4.13.0-1469.el8.x86_64",
"8Base-CNV-4.13:kubevirt-virtctl-redistributable-0:4.13.0-1469.el8.aarch64",
"8Base-CNV-4.13:kubevirt-virtctl-redistributable-0:4.13.0-1469.el8.x86_64",
"9Base-CNV-4.13:kubevirt-0:4.13.0-1469.el9.src",
"9Base-CNV-4.13:kubevirt-virtctl-0:4.13.0-1469.el9.aarch64",
"9Base-CNV-4.13:kubevirt-virtctl-0:4.13.0-1469.el9.x86_64",
"9Base-CNV-4.13:kubevirt-virtctl-redistributable-0:4.13.0-1469.el9.aarch64",
"9Base-CNV-4.13:kubevirt-virtctl-redistributable-0:4.13.0-1469.el9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "golang: golang.org/x/text/language: ParseAcceptLanguage takes a long time to parse complex tags"
},
{
"cve": "CVE-2022-32189",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"discovery_date": "2022-08-02T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2113814"
}
],
"notes": [
{
"category": "description",
"text": "An uncontrolled resource consumption flaw was found in Golang math/big. A too-short encoded message can cause a panic in Float.GobDecode and Rat.GobDecode in math/big in Go, potentially allowing an attacker to create a denial of service, impacting availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: math/big: decoding big.Float and big.Rat types can panic if the encoded message is too short, potentially allowing a denial of service",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This flaw stems from a particular and specific method (GoBDecode) which isn\u0027t commonly used. There are few components within Red Hat offerings which call this function. In rare cases where this method is called, the component limits possible damage or it is not possible to be triggered by an attacker. For these combined reasons the impact has been downgraded to Low.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-CNV-4.13:kubevirt-0:4.13.0-1469.el7.src",
"7Server-CNV-4.13:kubevirt-virtctl-0:4.13.0-1469.el7.x86_64",
"7Server-CNV-4.13:kubevirt-virtctl-redistributable-0:4.13.0-1469.el7.x86_64",
"8Base-CNV-4.13:kubevirt-0:4.13.0-1469.el8.src",
"8Base-CNV-4.13:kubevirt-virtctl-0:4.13.0-1469.el8.aarch64",
"8Base-CNV-4.13:kubevirt-virtctl-0:4.13.0-1469.el8.x86_64",
"8Base-CNV-4.13:kubevirt-virtctl-redistributable-0:4.13.0-1469.el8.aarch64",
"8Base-CNV-4.13:kubevirt-virtctl-redistributable-0:4.13.0-1469.el8.x86_64",
"9Base-CNV-4.13:kubevirt-0:4.13.0-1469.el9.src",
"9Base-CNV-4.13:kubevirt-virtctl-0:4.13.0-1469.el9.aarch64",
"9Base-CNV-4.13:kubevirt-virtctl-0:4.13.0-1469.el9.x86_64",
"9Base-CNV-4.13:kubevirt-virtctl-redistributable-0:4.13.0-1469.el9.aarch64",
"9Base-CNV-4.13:kubevirt-virtctl-redistributable-0:4.13.0-1469.el9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-32189"
},
{
"category": "external",
"summary": "RHBZ#2113814",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2113814"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-32189",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32189"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-32189",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-32189"
},
{
"category": "external",
"summary": "https://go.dev/issue/53871",
"url": "https://go.dev/issue/53871"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-nuts/c/DCFSyTGM0wU",
"url": "https://groups.google.com/g/golang-nuts/c/DCFSyTGM0wU"
}
],
"release_date": "2022-08-01T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-05-18T00:39:12+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-CNV-4.13:kubevirt-0:4.13.0-1469.el7.src",
"7Server-CNV-4.13:kubevirt-virtctl-0:4.13.0-1469.el7.x86_64",
"7Server-CNV-4.13:kubevirt-virtctl-redistributable-0:4.13.0-1469.el7.x86_64",
"8Base-CNV-4.13:kubevirt-0:4.13.0-1469.el8.src",
"8Base-CNV-4.13:kubevirt-virtctl-0:4.13.0-1469.el8.aarch64",
"8Base-CNV-4.13:kubevirt-virtctl-0:4.13.0-1469.el8.x86_64",
"8Base-CNV-4.13:kubevirt-virtctl-redistributable-0:4.13.0-1469.el8.aarch64",
"8Base-CNV-4.13:kubevirt-virtctl-redistributable-0:4.13.0-1469.el8.x86_64",
"9Base-CNV-4.13:kubevirt-0:4.13.0-1469.el9.src",
"9Base-CNV-4.13:kubevirt-virtctl-0:4.13.0-1469.el9.aarch64",
"9Base-CNV-4.13:kubevirt-virtctl-0:4.13.0-1469.el9.x86_64",
"9Base-CNV-4.13:kubevirt-virtctl-redistributable-0:4.13.0-1469.el9.aarch64",
"9Base-CNV-4.13:kubevirt-virtctl-redistributable-0:4.13.0-1469.el9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:3204"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"7Server-CNV-4.13:kubevirt-0:4.13.0-1469.el7.src",
"7Server-CNV-4.13:kubevirt-virtctl-0:4.13.0-1469.el7.x86_64",
"7Server-CNV-4.13:kubevirt-virtctl-redistributable-0:4.13.0-1469.el7.x86_64",
"8Base-CNV-4.13:kubevirt-0:4.13.0-1469.el8.src",
"8Base-CNV-4.13:kubevirt-virtctl-0:4.13.0-1469.el8.aarch64",
"8Base-CNV-4.13:kubevirt-virtctl-0:4.13.0-1469.el8.x86_64",
"8Base-CNV-4.13:kubevirt-virtctl-redistributable-0:4.13.0-1469.el8.aarch64",
"8Base-CNV-4.13:kubevirt-virtctl-redistributable-0:4.13.0-1469.el8.x86_64",
"9Base-CNV-4.13:kubevirt-0:4.13.0-1469.el9.src",
"9Base-CNV-4.13:kubevirt-virtctl-0:4.13.0-1469.el9.aarch64",
"9Base-CNV-4.13:kubevirt-virtctl-0:4.13.0-1469.el9.x86_64",
"9Base-CNV-4.13:kubevirt-virtctl-redistributable-0:4.13.0-1469.el9.aarch64",
"9Base-CNV-4.13:kubevirt-virtctl-redistributable-0:4.13.0-1469.el9.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"7Server-CNV-4.13:kubevirt-0:4.13.0-1469.el7.src",
"7Server-CNV-4.13:kubevirt-virtctl-0:4.13.0-1469.el7.x86_64",
"7Server-CNV-4.13:kubevirt-virtctl-redistributable-0:4.13.0-1469.el7.x86_64",
"8Base-CNV-4.13:kubevirt-0:4.13.0-1469.el8.src",
"8Base-CNV-4.13:kubevirt-virtctl-0:4.13.0-1469.el8.aarch64",
"8Base-CNV-4.13:kubevirt-virtctl-0:4.13.0-1469.el8.x86_64",
"8Base-CNV-4.13:kubevirt-virtctl-redistributable-0:4.13.0-1469.el8.aarch64",
"8Base-CNV-4.13:kubevirt-virtctl-redistributable-0:4.13.0-1469.el8.x86_64",
"9Base-CNV-4.13:kubevirt-0:4.13.0-1469.el9.src",
"9Base-CNV-4.13:kubevirt-virtctl-0:4.13.0-1469.el9.aarch64",
"9Base-CNV-4.13:kubevirt-virtctl-0:4.13.0-1469.el9.x86_64",
"9Base-CNV-4.13:kubevirt-virtctl-redistributable-0:4.13.0-1469.el9.aarch64",
"9Base-CNV-4.13:kubevirt-virtctl-redistributable-0:4.13.0-1469.el9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "golang: math/big: decoding big.Float and big.Rat types can panic if the encoded message is too short, potentially allowing a denial of service"
},
{
"cve": "CVE-2022-32190",
"cwe": {
"id": "CWE-22",
"name": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)"
},
"discovery_date": "2022-09-06T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2124668"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the golang package. The JoinPath doesn\u0027t remove the ../ path components appended to a domain that is not terminated by a slash, possibly leading to a directory traversal attack.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: net/url: JoinPath does not strip relative path components in all circumstances",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The vulnerable functions, JoinPath and URL.JoinPath was introduced in upstream go1.19, whereas, RHEL ships go1.17 and go1.18 versions, which does not contain the vulnerable code. Hence, packages shipped with RHEL-8, RHEL-9 are not affected.\n\nAll Y stream releases of OpenShift Container Platform 4 run on RHEL-8 or RHEL-9, so OCP 4 is also not affected.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-CNV-4.13:kubevirt-0:4.13.0-1469.el7.src",
"7Server-CNV-4.13:kubevirt-virtctl-0:4.13.0-1469.el7.x86_64",
"7Server-CNV-4.13:kubevirt-virtctl-redistributable-0:4.13.0-1469.el7.x86_64",
"8Base-CNV-4.13:kubevirt-0:4.13.0-1469.el8.src",
"8Base-CNV-4.13:kubevirt-virtctl-0:4.13.0-1469.el8.aarch64",
"8Base-CNV-4.13:kubevirt-virtctl-0:4.13.0-1469.el8.x86_64",
"8Base-CNV-4.13:kubevirt-virtctl-redistributable-0:4.13.0-1469.el8.aarch64",
"8Base-CNV-4.13:kubevirt-virtctl-redistributable-0:4.13.0-1469.el8.x86_64",
"9Base-CNV-4.13:kubevirt-0:4.13.0-1469.el9.src",
"9Base-CNV-4.13:kubevirt-virtctl-0:4.13.0-1469.el9.aarch64",
"9Base-CNV-4.13:kubevirt-virtctl-0:4.13.0-1469.el9.x86_64",
"9Base-CNV-4.13:kubevirt-virtctl-redistributable-0:4.13.0-1469.el9.aarch64",
"9Base-CNV-4.13:kubevirt-virtctl-redistributable-0:4.13.0-1469.el9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-32190"
},
{
"category": "external",
"summary": "RHBZ#2124668",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2124668"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-32190",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32190"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-32190",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-32190"
},
{
"category": "external",
"summary": "https://go.dev/issue/54385",
"url": "https://go.dev/issue/54385"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/x49AQzIVX-s/m/0tgO0pjiBQAJ",
"url": "https://groups.google.com/g/golang-announce/c/x49AQzIVX-s/m/0tgO0pjiBQAJ"
}
],
"release_date": "2022-09-06T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-05-18T00:39:12+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-CNV-4.13:kubevirt-0:4.13.0-1469.el7.src",
"7Server-CNV-4.13:kubevirt-virtctl-0:4.13.0-1469.el7.x86_64",
"7Server-CNV-4.13:kubevirt-virtctl-redistributable-0:4.13.0-1469.el7.x86_64",
"8Base-CNV-4.13:kubevirt-0:4.13.0-1469.el8.src",
"8Base-CNV-4.13:kubevirt-virtctl-0:4.13.0-1469.el8.aarch64",
"8Base-CNV-4.13:kubevirt-virtctl-0:4.13.0-1469.el8.x86_64",
"8Base-CNV-4.13:kubevirt-virtctl-redistributable-0:4.13.0-1469.el8.aarch64",
"8Base-CNV-4.13:kubevirt-virtctl-redistributable-0:4.13.0-1469.el8.x86_64",
"9Base-CNV-4.13:kubevirt-0:4.13.0-1469.el9.src",
"9Base-CNV-4.13:kubevirt-virtctl-0:4.13.0-1469.el9.aarch64",
"9Base-CNV-4.13:kubevirt-virtctl-0:4.13.0-1469.el9.x86_64",
"9Base-CNV-4.13:kubevirt-virtctl-redistributable-0:4.13.0-1469.el9.aarch64",
"9Base-CNV-4.13:kubevirt-virtctl-redistributable-0:4.13.0-1469.el9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:3204"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"7Server-CNV-4.13:kubevirt-0:4.13.0-1469.el7.src",
"7Server-CNV-4.13:kubevirt-virtctl-0:4.13.0-1469.el7.x86_64",
"7Server-CNV-4.13:kubevirt-virtctl-redistributable-0:4.13.0-1469.el7.x86_64",
"8Base-CNV-4.13:kubevirt-0:4.13.0-1469.el8.src",
"8Base-CNV-4.13:kubevirt-virtctl-0:4.13.0-1469.el8.aarch64",
"8Base-CNV-4.13:kubevirt-virtctl-0:4.13.0-1469.el8.x86_64",
"8Base-CNV-4.13:kubevirt-virtctl-redistributable-0:4.13.0-1469.el8.aarch64",
"8Base-CNV-4.13:kubevirt-virtctl-redistributable-0:4.13.0-1469.el8.x86_64",
"9Base-CNV-4.13:kubevirt-0:4.13.0-1469.el9.src",
"9Base-CNV-4.13:kubevirt-virtctl-0:4.13.0-1469.el9.aarch64",
"9Base-CNV-4.13:kubevirt-virtctl-0:4.13.0-1469.el9.x86_64",
"9Base-CNV-4.13:kubevirt-virtctl-redistributable-0:4.13.0-1469.el9.aarch64",
"9Base-CNV-4.13:kubevirt-virtctl-redistributable-0:4.13.0-1469.el9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "golang: net/url: JoinPath does not strip relative path components in all circumstances"
},
{
"cve": "CVE-2022-41717",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"discovery_date": "2023-01-16T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2161274"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the net/http library of the golang package. This flaw allows an attacker to cause excessive memory growth in a Go server accepting HTTP/2 requests. HTTP/2 server connections contain a cache of HTTP header keys sent by the client. While the total number of entries in this cache is capped, an attacker sending very large keys can cause the server to allocate approximately 64 MiB per open connection.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: net/http: excessive memory growth in a Go server accepting HTTP/2 requests",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Within Red Hat OpenShift Container Platform, the grafana container is listed as will not fix. Since OCP 4.10, Grafana itself is not shipped and the Grafana web server is protected behind an OAuth proxy server.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-CNV-4.13:kubevirt-0:4.13.0-1469.el7.src",
"7Server-CNV-4.13:kubevirt-virtctl-0:4.13.0-1469.el7.x86_64",
"7Server-CNV-4.13:kubevirt-virtctl-redistributable-0:4.13.0-1469.el7.x86_64",
"8Base-CNV-4.13:kubevirt-0:4.13.0-1469.el8.src",
"8Base-CNV-4.13:kubevirt-virtctl-0:4.13.0-1469.el8.aarch64",
"8Base-CNV-4.13:kubevirt-virtctl-0:4.13.0-1469.el8.x86_64",
"8Base-CNV-4.13:kubevirt-virtctl-redistributable-0:4.13.0-1469.el8.aarch64",
"8Base-CNV-4.13:kubevirt-virtctl-redistributable-0:4.13.0-1469.el8.x86_64",
"9Base-CNV-4.13:kubevirt-0:4.13.0-1469.el9.src",
"9Base-CNV-4.13:kubevirt-virtctl-0:4.13.0-1469.el9.aarch64",
"9Base-CNV-4.13:kubevirt-virtctl-0:4.13.0-1469.el9.x86_64",
"9Base-CNV-4.13:kubevirt-virtctl-redistributable-0:4.13.0-1469.el9.aarch64",
"9Base-CNV-4.13:kubevirt-virtctl-redistributable-0:4.13.0-1469.el9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-41717"
},
{
"category": "external",
"summary": "RHBZ#2161274",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2161274"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-41717",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41717"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-41717",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-41717"
},
{
"category": "external",
"summary": "https://go.dev/cl/455635",
"url": "https://go.dev/cl/455635"
},
{
"category": "external",
"summary": "https://go.dev/cl/455717",
"url": "https://go.dev/cl/455717"
},
{
"category": "external",
"summary": "https://go.dev/issue/56350",
"url": "https://go.dev/issue/56350"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/L_3rmdT0BMU/m/yZDrXjIiBQAJ",
"url": "https://groups.google.com/g/golang-announce/c/L_3rmdT0BMU/m/yZDrXjIiBQAJ"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2022-1144",
"url": "https://pkg.go.dev/vuln/GO-2022-1144"
}
],
"release_date": "2022-11-30T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-05-18T00:39:12+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-CNV-4.13:kubevirt-0:4.13.0-1469.el7.src",
"7Server-CNV-4.13:kubevirt-virtctl-0:4.13.0-1469.el7.x86_64",
"7Server-CNV-4.13:kubevirt-virtctl-redistributable-0:4.13.0-1469.el7.x86_64",
"8Base-CNV-4.13:kubevirt-0:4.13.0-1469.el8.src",
"8Base-CNV-4.13:kubevirt-virtctl-0:4.13.0-1469.el8.aarch64",
"8Base-CNV-4.13:kubevirt-virtctl-0:4.13.0-1469.el8.x86_64",
"8Base-CNV-4.13:kubevirt-virtctl-redistributable-0:4.13.0-1469.el8.aarch64",
"8Base-CNV-4.13:kubevirt-virtctl-redistributable-0:4.13.0-1469.el8.x86_64",
"9Base-CNV-4.13:kubevirt-0:4.13.0-1469.el9.src",
"9Base-CNV-4.13:kubevirt-virtctl-0:4.13.0-1469.el9.aarch64",
"9Base-CNV-4.13:kubevirt-virtctl-0:4.13.0-1469.el9.x86_64",
"9Base-CNV-4.13:kubevirt-virtctl-redistributable-0:4.13.0-1469.el9.aarch64",
"9Base-CNV-4.13:kubevirt-virtctl-redistributable-0:4.13.0-1469.el9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:3204"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"7Server-CNV-4.13:kubevirt-0:4.13.0-1469.el7.src",
"7Server-CNV-4.13:kubevirt-virtctl-0:4.13.0-1469.el7.x86_64",
"7Server-CNV-4.13:kubevirt-virtctl-redistributable-0:4.13.0-1469.el7.x86_64",
"8Base-CNV-4.13:kubevirt-0:4.13.0-1469.el8.src",
"8Base-CNV-4.13:kubevirt-virtctl-0:4.13.0-1469.el8.aarch64",
"8Base-CNV-4.13:kubevirt-virtctl-0:4.13.0-1469.el8.x86_64",
"8Base-CNV-4.13:kubevirt-virtctl-redistributable-0:4.13.0-1469.el8.aarch64",
"8Base-CNV-4.13:kubevirt-virtctl-redistributable-0:4.13.0-1469.el8.x86_64",
"9Base-CNV-4.13:kubevirt-0:4.13.0-1469.el9.src",
"9Base-CNV-4.13:kubevirt-virtctl-0:4.13.0-1469.el9.aarch64",
"9Base-CNV-4.13:kubevirt-virtctl-0:4.13.0-1469.el9.x86_64",
"9Base-CNV-4.13:kubevirt-virtctl-redistributable-0:4.13.0-1469.el9.aarch64",
"9Base-CNV-4.13:kubevirt-virtctl-redistributable-0:4.13.0-1469.el9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "golang: net/http: excessive memory growth in a Go server accepting HTTP/2 requests"
}
]
}
rhsa-2023_3204
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Red Hat OpenShift Virtualization release 4.13.0 is now available with updates to packages and images that fix several bugs and add enhancements.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "OpenShift Virtualization is Red Hat\u0027s virtualization solution designed for Red Hat OpenShift Container Platform.\n\nThis advisory contains OpenShift Virtualization 4.13.0 RPMs.\n\nSecurity Fix(es):\n\n* golang: net/http: handle server errors after sending GOAWAY (CVE-2022-27664)\n\n* golang: golang.org/x/text/language: ParseAcceptLanguage takes a long time to parse complex tags (CVE-2022-32149)\n\n* golang: net/url: JoinPath does not strip relative path components in all circumstances (CVE-2022-32190)\n\n* golang: net/http: excessive memory growth in a Go server accepting HTTP/2 requests (CVE-2022-41717)\n\n* golang: math/big: decoding big.Float and big.Rat types can panic if the encoded message is too short, potentially allowing a denial of service (CVE-2022-32189)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nBug Fix(es):\n\n* 4.13.0 rpms (BZ#2124993)",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2023:3204",
"url": "https://access.redhat.com/errata/RHSA-2023:3204"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#moderate",
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "2113814",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2113814"
},
{
"category": "external",
"summary": "2124668",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2124668"
},
{
"category": "external",
"summary": "2124669",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2124669"
},
{
"category": "external",
"summary": "2124993",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2124993"
},
{
"category": "external",
"summary": "2134010",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2134010"
},
{
"category": "external",
"summary": "2161274",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2161274"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2023/rhsa-2023_3204.json"
}
],
"title": "Red Hat Security Advisory: OpenShift Virtualization 4.13.0 RPMs security and bug fix update",
"tracking": {
"current_release_date": "2025-01-06T19:26:25+00:00",
"generator": {
"date": "2025-01-06T19:26:25+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.5"
}
},
"id": "RHSA-2023:3204",
"initial_release_date": "2023-05-18T00:39:12+00:00",
"revision_history": [
{
"date": "2023-05-18T00:39:12+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2023-05-18T00:39:12+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-01-06T19:26:25+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "CNV 4.13 for RHEL 9",
"product": {
"name": "CNV 4.13 for RHEL 9",
"product_id": "9Base-CNV-4.13",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:container_native_virtualization:4.13::el9"
}
}
},
{
"category": "product_name",
"name": "CNV 4.13 for RHEL 7",
"product": {
"name": "CNV 4.13 for RHEL 7",
"product_id": "7Server-CNV-4.13",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:container_native_virtualization:4.13::el7"
}
}
},
{
"category": "product_name",
"name": "CNV 4.13 for RHEL 8",
"product": {
"name": "CNV 4.13 for RHEL 8",
"product_id": "8Base-CNV-4.13",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:container_native_virtualization:4.13::el8"
}
}
}
],
"category": "product_family",
"name": "OpenShift Virtualization"
},
{
"branches": [
{
"category": "product_version",
"name": "kubevirt-0:4.13.0-1469.el9.src",
"product": {
"name": "kubevirt-0:4.13.0-1469.el9.src",
"product_id": "kubevirt-0:4.13.0-1469.el9.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kubevirt@4.13.0-1469.el9?arch=src"
}
}
},
{
"category": "product_version",
"name": "kubevirt-0:4.13.0-1469.el7.src",
"product": {
"name": "kubevirt-0:4.13.0-1469.el7.src",
"product_id": "kubevirt-0:4.13.0-1469.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kubevirt@4.13.0-1469.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "kubevirt-0:4.13.0-1469.el8.src",
"product": {
"name": "kubevirt-0:4.13.0-1469.el8.src",
"product_id": "kubevirt-0:4.13.0-1469.el8.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kubevirt@4.13.0-1469.el8?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "kubevirt-virtctl-0:4.13.0-1469.el9.x86_64",
"product": {
"name": "kubevirt-virtctl-0:4.13.0-1469.el9.x86_64",
"product_id": "kubevirt-virtctl-0:4.13.0-1469.el9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kubevirt-virtctl@4.13.0-1469.el9?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kubevirt-virtctl-redistributable-0:4.13.0-1469.el9.x86_64",
"product": {
"name": "kubevirt-virtctl-redistributable-0:4.13.0-1469.el9.x86_64",
"product_id": "kubevirt-virtctl-redistributable-0:4.13.0-1469.el9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kubevirt-virtctl-redistributable@4.13.0-1469.el9?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kubevirt-virtctl-0:4.13.0-1469.el7.x86_64",
"product": {
"name": "kubevirt-virtctl-0:4.13.0-1469.el7.x86_64",
"product_id": "kubevirt-virtctl-0:4.13.0-1469.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kubevirt-virtctl@4.13.0-1469.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kubevirt-virtctl-redistributable-0:4.13.0-1469.el7.x86_64",
"product": {
"name": "kubevirt-virtctl-redistributable-0:4.13.0-1469.el7.x86_64",
"product_id": "kubevirt-virtctl-redistributable-0:4.13.0-1469.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kubevirt-virtctl-redistributable@4.13.0-1469.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kubevirt-virtctl-0:4.13.0-1469.el8.x86_64",
"product": {
"name": "kubevirt-virtctl-0:4.13.0-1469.el8.x86_64",
"product_id": "kubevirt-virtctl-0:4.13.0-1469.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kubevirt-virtctl@4.13.0-1469.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kubevirt-virtctl-redistributable-0:4.13.0-1469.el8.x86_64",
"product": {
"name": "kubevirt-virtctl-redistributable-0:4.13.0-1469.el8.x86_64",
"product_id": "kubevirt-virtctl-redistributable-0:4.13.0-1469.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kubevirt-virtctl-redistributable@4.13.0-1469.el8?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "kubevirt-virtctl-0:4.13.0-1469.el9.aarch64",
"product": {
"name": "kubevirt-virtctl-0:4.13.0-1469.el9.aarch64",
"product_id": "kubevirt-virtctl-0:4.13.0-1469.el9.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kubevirt-virtctl@4.13.0-1469.el9?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kubevirt-virtctl-redistributable-0:4.13.0-1469.el9.aarch64",
"product": {
"name": "kubevirt-virtctl-redistributable-0:4.13.0-1469.el9.aarch64",
"product_id": "kubevirt-virtctl-redistributable-0:4.13.0-1469.el9.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kubevirt-virtctl-redistributable@4.13.0-1469.el9?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kubevirt-virtctl-0:4.13.0-1469.el8.aarch64",
"product": {
"name": "kubevirt-virtctl-0:4.13.0-1469.el8.aarch64",
"product_id": "kubevirt-virtctl-0:4.13.0-1469.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kubevirt-virtctl@4.13.0-1469.el8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kubevirt-virtctl-redistributable-0:4.13.0-1469.el8.aarch64",
"product": {
"name": "kubevirt-virtctl-redistributable-0:4.13.0-1469.el8.aarch64",
"product_id": "kubevirt-virtctl-redistributable-0:4.13.0-1469.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kubevirt-virtctl-redistributable@4.13.0-1469.el8?arch=aarch64"
}
}
}
],
"category": "architecture",
"name": "aarch64"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kubevirt-0:4.13.0-1469.el7.src as a component of CNV 4.13 for RHEL 7",
"product_id": "7Server-CNV-4.13:kubevirt-0:4.13.0-1469.el7.src"
},
"product_reference": "kubevirt-0:4.13.0-1469.el7.src",
"relates_to_product_reference": "7Server-CNV-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kubevirt-virtctl-0:4.13.0-1469.el7.x86_64 as a component of CNV 4.13 for RHEL 7",
"product_id": "7Server-CNV-4.13:kubevirt-virtctl-0:4.13.0-1469.el7.x86_64"
},
"product_reference": "kubevirt-virtctl-0:4.13.0-1469.el7.x86_64",
"relates_to_product_reference": "7Server-CNV-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kubevirt-virtctl-redistributable-0:4.13.0-1469.el7.x86_64 as a component of CNV 4.13 for RHEL 7",
"product_id": "7Server-CNV-4.13:kubevirt-virtctl-redistributable-0:4.13.0-1469.el7.x86_64"
},
"product_reference": "kubevirt-virtctl-redistributable-0:4.13.0-1469.el7.x86_64",
"relates_to_product_reference": "7Server-CNV-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kubevirt-0:4.13.0-1469.el8.src as a component of CNV 4.13 for RHEL 8",
"product_id": "8Base-CNV-4.13:kubevirt-0:4.13.0-1469.el8.src"
},
"product_reference": "kubevirt-0:4.13.0-1469.el8.src",
"relates_to_product_reference": "8Base-CNV-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kubevirt-virtctl-0:4.13.0-1469.el8.aarch64 as a component of CNV 4.13 for RHEL 8",
"product_id": "8Base-CNV-4.13:kubevirt-virtctl-0:4.13.0-1469.el8.aarch64"
},
"product_reference": "kubevirt-virtctl-0:4.13.0-1469.el8.aarch64",
"relates_to_product_reference": "8Base-CNV-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kubevirt-virtctl-0:4.13.0-1469.el8.x86_64 as a component of CNV 4.13 for RHEL 8",
"product_id": "8Base-CNV-4.13:kubevirt-virtctl-0:4.13.0-1469.el8.x86_64"
},
"product_reference": "kubevirt-virtctl-0:4.13.0-1469.el8.x86_64",
"relates_to_product_reference": "8Base-CNV-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kubevirt-virtctl-redistributable-0:4.13.0-1469.el8.aarch64 as a component of CNV 4.13 for RHEL 8",
"product_id": "8Base-CNV-4.13:kubevirt-virtctl-redistributable-0:4.13.0-1469.el8.aarch64"
},
"product_reference": "kubevirt-virtctl-redistributable-0:4.13.0-1469.el8.aarch64",
"relates_to_product_reference": "8Base-CNV-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kubevirt-virtctl-redistributable-0:4.13.0-1469.el8.x86_64 as a component of CNV 4.13 for RHEL 8",
"product_id": "8Base-CNV-4.13:kubevirt-virtctl-redistributable-0:4.13.0-1469.el8.x86_64"
},
"product_reference": "kubevirt-virtctl-redistributable-0:4.13.0-1469.el8.x86_64",
"relates_to_product_reference": "8Base-CNV-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kubevirt-0:4.13.0-1469.el9.src as a component of CNV 4.13 for RHEL 9",
"product_id": "9Base-CNV-4.13:kubevirt-0:4.13.0-1469.el9.src"
},
"product_reference": "kubevirt-0:4.13.0-1469.el9.src",
"relates_to_product_reference": "9Base-CNV-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kubevirt-virtctl-0:4.13.0-1469.el9.aarch64 as a component of CNV 4.13 for RHEL 9",
"product_id": "9Base-CNV-4.13:kubevirt-virtctl-0:4.13.0-1469.el9.aarch64"
},
"product_reference": "kubevirt-virtctl-0:4.13.0-1469.el9.aarch64",
"relates_to_product_reference": "9Base-CNV-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kubevirt-virtctl-0:4.13.0-1469.el9.x86_64 as a component of CNV 4.13 for RHEL 9",
"product_id": "9Base-CNV-4.13:kubevirt-virtctl-0:4.13.0-1469.el9.x86_64"
},
"product_reference": "kubevirt-virtctl-0:4.13.0-1469.el9.x86_64",
"relates_to_product_reference": "9Base-CNV-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kubevirt-virtctl-redistributable-0:4.13.0-1469.el9.aarch64 as a component of CNV 4.13 for RHEL 9",
"product_id": "9Base-CNV-4.13:kubevirt-virtctl-redistributable-0:4.13.0-1469.el9.aarch64"
},
"product_reference": "kubevirt-virtctl-redistributable-0:4.13.0-1469.el9.aarch64",
"relates_to_product_reference": "9Base-CNV-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kubevirt-virtctl-redistributable-0:4.13.0-1469.el9.x86_64 as a component of CNV 4.13 for RHEL 9",
"product_id": "9Base-CNV-4.13:kubevirt-virtctl-redistributable-0:4.13.0-1469.el9.x86_64"
},
"product_reference": "kubevirt-virtctl-redistributable-0:4.13.0-1469.el9.x86_64",
"relates_to_product_reference": "9Base-CNV-4.13"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2022-27664",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"discovery_date": "2022-09-06T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2124669"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the golang package. In net/http in Go, attackers can cause a denial of service because an HTTP/2 connection can hang during closing if a fatal error preempts the shutdown.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: net/http: handle server errors after sending GOAWAY",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The opportunity for a Denial of Service is limited to the golang runtime. In the case of OpenShift Container Platform, this would be restricted within each individual container. There are multiple layers of guide rails (Golang\u2019s Garbage Collector; OpenShift\u2019s resource constraints imposed at the container and cluster levels) which would require a malicious user to continue submitting attacks for there to be any enduring impact. They would also need access to external server resources to be able to send a massive volume of requests to cause a significant impact on server operations.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-CNV-4.13:kubevirt-0:4.13.0-1469.el7.src",
"7Server-CNV-4.13:kubevirt-virtctl-0:4.13.0-1469.el7.x86_64",
"7Server-CNV-4.13:kubevirt-virtctl-redistributable-0:4.13.0-1469.el7.x86_64",
"8Base-CNV-4.13:kubevirt-0:4.13.0-1469.el8.src",
"8Base-CNV-4.13:kubevirt-virtctl-0:4.13.0-1469.el8.aarch64",
"8Base-CNV-4.13:kubevirt-virtctl-0:4.13.0-1469.el8.x86_64",
"8Base-CNV-4.13:kubevirt-virtctl-redistributable-0:4.13.0-1469.el8.aarch64",
"8Base-CNV-4.13:kubevirt-virtctl-redistributable-0:4.13.0-1469.el8.x86_64",
"9Base-CNV-4.13:kubevirt-0:4.13.0-1469.el9.src",
"9Base-CNV-4.13:kubevirt-virtctl-0:4.13.0-1469.el9.aarch64",
"9Base-CNV-4.13:kubevirt-virtctl-0:4.13.0-1469.el9.x86_64",
"9Base-CNV-4.13:kubevirt-virtctl-redistributable-0:4.13.0-1469.el9.aarch64",
"9Base-CNV-4.13:kubevirt-virtctl-redistributable-0:4.13.0-1469.el9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-27664"
},
{
"category": "external",
"summary": "RHBZ#2124669",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2124669"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-27664",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27664"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-27664",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-27664"
},
{
"category": "external",
"summary": "https://go.dev/issue/54658",
"url": "https://go.dev/issue/54658"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/x49AQzIVX-s/m/0tgO0pjiBQAJ",
"url": "https://groups.google.com/g/golang-announce/c/x49AQzIVX-s/m/0tgO0pjiBQAJ"
}
],
"release_date": "2022-09-06T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-05-18T00:39:12+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-CNV-4.13:kubevirt-0:4.13.0-1469.el7.src",
"7Server-CNV-4.13:kubevirt-virtctl-0:4.13.0-1469.el7.x86_64",
"7Server-CNV-4.13:kubevirt-virtctl-redistributable-0:4.13.0-1469.el7.x86_64",
"8Base-CNV-4.13:kubevirt-0:4.13.0-1469.el8.src",
"8Base-CNV-4.13:kubevirt-virtctl-0:4.13.0-1469.el8.aarch64",
"8Base-CNV-4.13:kubevirt-virtctl-0:4.13.0-1469.el8.x86_64",
"8Base-CNV-4.13:kubevirt-virtctl-redistributable-0:4.13.0-1469.el8.aarch64",
"8Base-CNV-4.13:kubevirt-virtctl-redistributable-0:4.13.0-1469.el8.x86_64",
"9Base-CNV-4.13:kubevirt-0:4.13.0-1469.el9.src",
"9Base-CNV-4.13:kubevirt-virtctl-0:4.13.0-1469.el9.aarch64",
"9Base-CNV-4.13:kubevirt-virtctl-0:4.13.0-1469.el9.x86_64",
"9Base-CNV-4.13:kubevirt-virtctl-redistributable-0:4.13.0-1469.el9.aarch64",
"9Base-CNV-4.13:kubevirt-virtctl-redistributable-0:4.13.0-1469.el9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:3204"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"7Server-CNV-4.13:kubevirt-0:4.13.0-1469.el7.src",
"7Server-CNV-4.13:kubevirt-virtctl-0:4.13.0-1469.el7.x86_64",
"7Server-CNV-4.13:kubevirt-virtctl-redistributable-0:4.13.0-1469.el7.x86_64",
"8Base-CNV-4.13:kubevirt-0:4.13.0-1469.el8.src",
"8Base-CNV-4.13:kubevirt-virtctl-0:4.13.0-1469.el8.aarch64",
"8Base-CNV-4.13:kubevirt-virtctl-0:4.13.0-1469.el8.x86_64",
"8Base-CNV-4.13:kubevirt-virtctl-redistributable-0:4.13.0-1469.el8.aarch64",
"8Base-CNV-4.13:kubevirt-virtctl-redistributable-0:4.13.0-1469.el8.x86_64",
"9Base-CNV-4.13:kubevirt-0:4.13.0-1469.el9.src",
"9Base-CNV-4.13:kubevirt-virtctl-0:4.13.0-1469.el9.aarch64",
"9Base-CNV-4.13:kubevirt-virtctl-0:4.13.0-1469.el9.x86_64",
"9Base-CNV-4.13:kubevirt-virtctl-redistributable-0:4.13.0-1469.el9.aarch64",
"9Base-CNV-4.13:kubevirt-virtctl-redistributable-0:4.13.0-1469.el9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "golang: net/http: handle server errors after sending GOAWAY"
},
{
"cve": "CVE-2022-32149",
"cwe": {
"id": "CWE-407",
"name": "Inefficient Algorithmic Complexity"
},
"discovery_date": "2022-10-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2134010"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in the golang.org/x/text/language package. An attacker can craft an Accept-Language header which ParseAcceptLanguage will take significant time to parse. This issue leads to a denial of service, and can impact availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: golang.org/x/text/language: ParseAcceptLanguage takes a long time to parse complex tags",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-CNV-4.13:kubevirt-0:4.13.0-1469.el7.src",
"7Server-CNV-4.13:kubevirt-virtctl-0:4.13.0-1469.el7.x86_64",
"7Server-CNV-4.13:kubevirt-virtctl-redistributable-0:4.13.0-1469.el7.x86_64",
"8Base-CNV-4.13:kubevirt-0:4.13.0-1469.el8.src",
"8Base-CNV-4.13:kubevirt-virtctl-0:4.13.0-1469.el8.aarch64",
"8Base-CNV-4.13:kubevirt-virtctl-0:4.13.0-1469.el8.x86_64",
"8Base-CNV-4.13:kubevirt-virtctl-redistributable-0:4.13.0-1469.el8.aarch64",
"8Base-CNV-4.13:kubevirt-virtctl-redistributable-0:4.13.0-1469.el8.x86_64",
"9Base-CNV-4.13:kubevirt-0:4.13.0-1469.el9.src",
"9Base-CNV-4.13:kubevirt-virtctl-0:4.13.0-1469.el9.aarch64",
"9Base-CNV-4.13:kubevirt-virtctl-0:4.13.0-1469.el9.x86_64",
"9Base-CNV-4.13:kubevirt-virtctl-redistributable-0:4.13.0-1469.el9.aarch64",
"9Base-CNV-4.13:kubevirt-virtctl-redistributable-0:4.13.0-1469.el9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-32149"
},
{
"category": "external",
"summary": "RHBZ#2134010",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2134010"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-32149",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32149"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-32149",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-32149"
},
{
"category": "external",
"summary": "https://go.dev/issue/56152",
"url": "https://go.dev/issue/56152"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-dev/c/qfPIly0X7aU",
"url": "https://groups.google.com/g/golang-dev/c/qfPIly0X7aU"
}
],
"release_date": "2022-10-11T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-05-18T00:39:12+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-CNV-4.13:kubevirt-0:4.13.0-1469.el7.src",
"7Server-CNV-4.13:kubevirt-virtctl-0:4.13.0-1469.el7.x86_64",
"7Server-CNV-4.13:kubevirt-virtctl-redistributable-0:4.13.0-1469.el7.x86_64",
"8Base-CNV-4.13:kubevirt-0:4.13.0-1469.el8.src",
"8Base-CNV-4.13:kubevirt-virtctl-0:4.13.0-1469.el8.aarch64",
"8Base-CNV-4.13:kubevirt-virtctl-0:4.13.0-1469.el8.x86_64",
"8Base-CNV-4.13:kubevirt-virtctl-redistributable-0:4.13.0-1469.el8.aarch64",
"8Base-CNV-4.13:kubevirt-virtctl-redistributable-0:4.13.0-1469.el8.x86_64",
"9Base-CNV-4.13:kubevirt-0:4.13.0-1469.el9.src",
"9Base-CNV-4.13:kubevirt-virtctl-0:4.13.0-1469.el9.aarch64",
"9Base-CNV-4.13:kubevirt-virtctl-0:4.13.0-1469.el9.x86_64",
"9Base-CNV-4.13:kubevirt-virtctl-redistributable-0:4.13.0-1469.el9.aarch64",
"9Base-CNV-4.13:kubevirt-virtctl-redistributable-0:4.13.0-1469.el9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:3204"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"7Server-CNV-4.13:kubevirt-0:4.13.0-1469.el7.src",
"7Server-CNV-4.13:kubevirt-virtctl-0:4.13.0-1469.el7.x86_64",
"7Server-CNV-4.13:kubevirt-virtctl-redistributable-0:4.13.0-1469.el7.x86_64",
"8Base-CNV-4.13:kubevirt-0:4.13.0-1469.el8.src",
"8Base-CNV-4.13:kubevirt-virtctl-0:4.13.0-1469.el8.aarch64",
"8Base-CNV-4.13:kubevirt-virtctl-0:4.13.0-1469.el8.x86_64",
"8Base-CNV-4.13:kubevirt-virtctl-redistributable-0:4.13.0-1469.el8.aarch64",
"8Base-CNV-4.13:kubevirt-virtctl-redistributable-0:4.13.0-1469.el8.x86_64",
"9Base-CNV-4.13:kubevirt-0:4.13.0-1469.el9.src",
"9Base-CNV-4.13:kubevirt-virtctl-0:4.13.0-1469.el9.aarch64",
"9Base-CNV-4.13:kubevirt-virtctl-0:4.13.0-1469.el9.x86_64",
"9Base-CNV-4.13:kubevirt-virtctl-redistributable-0:4.13.0-1469.el9.aarch64",
"9Base-CNV-4.13:kubevirt-virtctl-redistributable-0:4.13.0-1469.el9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "golang: golang.org/x/text/language: ParseAcceptLanguage takes a long time to parse complex tags"
},
{
"cve": "CVE-2022-32189",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"discovery_date": "2022-08-02T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2113814"
}
],
"notes": [
{
"category": "description",
"text": "An uncontrolled resource consumption flaw was found in Golang math/big. A too-short encoded message can cause a panic in Float.GobDecode and Rat.GobDecode in math/big in Go, potentially allowing an attacker to create a denial of service, impacting availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: math/big: decoding big.Float and big.Rat types can panic if the encoded message is too short, potentially allowing a denial of service",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This flaw stems from a particular and specific method (GoBDecode) which isn\u0027t commonly used. There are few components within Red Hat offerings which call this function. In rare cases where this method is called, the component limits possible damage or it is not possible to be triggered by an attacker. For these combined reasons the impact has been downgraded to Low.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-CNV-4.13:kubevirt-0:4.13.0-1469.el7.src",
"7Server-CNV-4.13:kubevirt-virtctl-0:4.13.0-1469.el7.x86_64",
"7Server-CNV-4.13:kubevirt-virtctl-redistributable-0:4.13.0-1469.el7.x86_64",
"8Base-CNV-4.13:kubevirt-0:4.13.0-1469.el8.src",
"8Base-CNV-4.13:kubevirt-virtctl-0:4.13.0-1469.el8.aarch64",
"8Base-CNV-4.13:kubevirt-virtctl-0:4.13.0-1469.el8.x86_64",
"8Base-CNV-4.13:kubevirt-virtctl-redistributable-0:4.13.0-1469.el8.aarch64",
"8Base-CNV-4.13:kubevirt-virtctl-redistributable-0:4.13.0-1469.el8.x86_64",
"9Base-CNV-4.13:kubevirt-0:4.13.0-1469.el9.src",
"9Base-CNV-4.13:kubevirt-virtctl-0:4.13.0-1469.el9.aarch64",
"9Base-CNV-4.13:kubevirt-virtctl-0:4.13.0-1469.el9.x86_64",
"9Base-CNV-4.13:kubevirt-virtctl-redistributable-0:4.13.0-1469.el9.aarch64",
"9Base-CNV-4.13:kubevirt-virtctl-redistributable-0:4.13.0-1469.el9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-32189"
},
{
"category": "external",
"summary": "RHBZ#2113814",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2113814"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-32189",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32189"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-32189",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-32189"
},
{
"category": "external",
"summary": "https://go.dev/issue/53871",
"url": "https://go.dev/issue/53871"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-nuts/c/DCFSyTGM0wU",
"url": "https://groups.google.com/g/golang-nuts/c/DCFSyTGM0wU"
}
],
"release_date": "2022-08-01T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-05-18T00:39:12+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-CNV-4.13:kubevirt-0:4.13.0-1469.el7.src",
"7Server-CNV-4.13:kubevirt-virtctl-0:4.13.0-1469.el7.x86_64",
"7Server-CNV-4.13:kubevirt-virtctl-redistributable-0:4.13.0-1469.el7.x86_64",
"8Base-CNV-4.13:kubevirt-0:4.13.0-1469.el8.src",
"8Base-CNV-4.13:kubevirt-virtctl-0:4.13.0-1469.el8.aarch64",
"8Base-CNV-4.13:kubevirt-virtctl-0:4.13.0-1469.el8.x86_64",
"8Base-CNV-4.13:kubevirt-virtctl-redistributable-0:4.13.0-1469.el8.aarch64",
"8Base-CNV-4.13:kubevirt-virtctl-redistributable-0:4.13.0-1469.el8.x86_64",
"9Base-CNV-4.13:kubevirt-0:4.13.0-1469.el9.src",
"9Base-CNV-4.13:kubevirt-virtctl-0:4.13.0-1469.el9.aarch64",
"9Base-CNV-4.13:kubevirt-virtctl-0:4.13.0-1469.el9.x86_64",
"9Base-CNV-4.13:kubevirt-virtctl-redistributable-0:4.13.0-1469.el9.aarch64",
"9Base-CNV-4.13:kubevirt-virtctl-redistributable-0:4.13.0-1469.el9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:3204"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"7Server-CNV-4.13:kubevirt-0:4.13.0-1469.el7.src",
"7Server-CNV-4.13:kubevirt-virtctl-0:4.13.0-1469.el7.x86_64",
"7Server-CNV-4.13:kubevirt-virtctl-redistributable-0:4.13.0-1469.el7.x86_64",
"8Base-CNV-4.13:kubevirt-0:4.13.0-1469.el8.src",
"8Base-CNV-4.13:kubevirt-virtctl-0:4.13.0-1469.el8.aarch64",
"8Base-CNV-4.13:kubevirt-virtctl-0:4.13.0-1469.el8.x86_64",
"8Base-CNV-4.13:kubevirt-virtctl-redistributable-0:4.13.0-1469.el8.aarch64",
"8Base-CNV-4.13:kubevirt-virtctl-redistributable-0:4.13.0-1469.el8.x86_64",
"9Base-CNV-4.13:kubevirt-0:4.13.0-1469.el9.src",
"9Base-CNV-4.13:kubevirt-virtctl-0:4.13.0-1469.el9.aarch64",
"9Base-CNV-4.13:kubevirt-virtctl-0:4.13.0-1469.el9.x86_64",
"9Base-CNV-4.13:kubevirt-virtctl-redistributable-0:4.13.0-1469.el9.aarch64",
"9Base-CNV-4.13:kubevirt-virtctl-redistributable-0:4.13.0-1469.el9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "golang: math/big: decoding big.Float and big.Rat types can panic if the encoded message is too short, potentially allowing a denial of service"
},
{
"cve": "CVE-2022-32190",
"cwe": {
"id": "CWE-22",
"name": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)"
},
"discovery_date": "2022-09-06T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2124668"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the golang package. The JoinPath doesn\u0027t remove the ../ path components appended to a domain that is not terminated by a slash, possibly leading to a directory traversal attack.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: net/url: JoinPath does not strip relative path components in all circumstances",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The vulnerable functions, JoinPath and URL.JoinPath was introduced in upstream go1.19, whereas, RHEL ships go1.17 and go1.18 versions, which does not contain the vulnerable code. Hence, packages shipped with RHEL-8, RHEL-9 are not affected.\n\nAll Y stream releases of OpenShift Container Platform 4 run on RHEL-8 or RHEL-9, so OCP 4 is also not affected.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-CNV-4.13:kubevirt-0:4.13.0-1469.el7.src",
"7Server-CNV-4.13:kubevirt-virtctl-0:4.13.0-1469.el7.x86_64",
"7Server-CNV-4.13:kubevirt-virtctl-redistributable-0:4.13.0-1469.el7.x86_64",
"8Base-CNV-4.13:kubevirt-0:4.13.0-1469.el8.src",
"8Base-CNV-4.13:kubevirt-virtctl-0:4.13.0-1469.el8.aarch64",
"8Base-CNV-4.13:kubevirt-virtctl-0:4.13.0-1469.el8.x86_64",
"8Base-CNV-4.13:kubevirt-virtctl-redistributable-0:4.13.0-1469.el8.aarch64",
"8Base-CNV-4.13:kubevirt-virtctl-redistributable-0:4.13.0-1469.el8.x86_64",
"9Base-CNV-4.13:kubevirt-0:4.13.0-1469.el9.src",
"9Base-CNV-4.13:kubevirt-virtctl-0:4.13.0-1469.el9.aarch64",
"9Base-CNV-4.13:kubevirt-virtctl-0:4.13.0-1469.el9.x86_64",
"9Base-CNV-4.13:kubevirt-virtctl-redistributable-0:4.13.0-1469.el9.aarch64",
"9Base-CNV-4.13:kubevirt-virtctl-redistributable-0:4.13.0-1469.el9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-32190"
},
{
"category": "external",
"summary": "RHBZ#2124668",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2124668"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-32190",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32190"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-32190",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-32190"
},
{
"category": "external",
"summary": "https://go.dev/issue/54385",
"url": "https://go.dev/issue/54385"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/x49AQzIVX-s/m/0tgO0pjiBQAJ",
"url": "https://groups.google.com/g/golang-announce/c/x49AQzIVX-s/m/0tgO0pjiBQAJ"
}
],
"release_date": "2022-09-06T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-05-18T00:39:12+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-CNV-4.13:kubevirt-0:4.13.0-1469.el7.src",
"7Server-CNV-4.13:kubevirt-virtctl-0:4.13.0-1469.el7.x86_64",
"7Server-CNV-4.13:kubevirt-virtctl-redistributable-0:4.13.0-1469.el7.x86_64",
"8Base-CNV-4.13:kubevirt-0:4.13.0-1469.el8.src",
"8Base-CNV-4.13:kubevirt-virtctl-0:4.13.0-1469.el8.aarch64",
"8Base-CNV-4.13:kubevirt-virtctl-0:4.13.0-1469.el8.x86_64",
"8Base-CNV-4.13:kubevirt-virtctl-redistributable-0:4.13.0-1469.el8.aarch64",
"8Base-CNV-4.13:kubevirt-virtctl-redistributable-0:4.13.0-1469.el8.x86_64",
"9Base-CNV-4.13:kubevirt-0:4.13.0-1469.el9.src",
"9Base-CNV-4.13:kubevirt-virtctl-0:4.13.0-1469.el9.aarch64",
"9Base-CNV-4.13:kubevirt-virtctl-0:4.13.0-1469.el9.x86_64",
"9Base-CNV-4.13:kubevirt-virtctl-redistributable-0:4.13.0-1469.el9.aarch64",
"9Base-CNV-4.13:kubevirt-virtctl-redistributable-0:4.13.0-1469.el9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:3204"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"7Server-CNV-4.13:kubevirt-0:4.13.0-1469.el7.src",
"7Server-CNV-4.13:kubevirt-virtctl-0:4.13.0-1469.el7.x86_64",
"7Server-CNV-4.13:kubevirt-virtctl-redistributable-0:4.13.0-1469.el7.x86_64",
"8Base-CNV-4.13:kubevirt-0:4.13.0-1469.el8.src",
"8Base-CNV-4.13:kubevirt-virtctl-0:4.13.0-1469.el8.aarch64",
"8Base-CNV-4.13:kubevirt-virtctl-0:4.13.0-1469.el8.x86_64",
"8Base-CNV-4.13:kubevirt-virtctl-redistributable-0:4.13.0-1469.el8.aarch64",
"8Base-CNV-4.13:kubevirt-virtctl-redistributable-0:4.13.0-1469.el8.x86_64",
"9Base-CNV-4.13:kubevirt-0:4.13.0-1469.el9.src",
"9Base-CNV-4.13:kubevirt-virtctl-0:4.13.0-1469.el9.aarch64",
"9Base-CNV-4.13:kubevirt-virtctl-0:4.13.0-1469.el9.x86_64",
"9Base-CNV-4.13:kubevirt-virtctl-redistributable-0:4.13.0-1469.el9.aarch64",
"9Base-CNV-4.13:kubevirt-virtctl-redistributable-0:4.13.0-1469.el9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "golang: net/url: JoinPath does not strip relative path components in all circumstances"
},
{
"cve": "CVE-2022-41717",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"discovery_date": "2023-01-16T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2161274"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the net/http library of the golang package. This flaw allows an attacker to cause excessive memory growth in a Go server accepting HTTP/2 requests. HTTP/2 server connections contain a cache of HTTP header keys sent by the client. While the total number of entries in this cache is capped, an attacker sending very large keys can cause the server to allocate approximately 64 MiB per open connection.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: net/http: excessive memory growth in a Go server accepting HTTP/2 requests",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Within Red Hat OpenShift Container Platform, the grafana container is listed as will not fix. Since OCP 4.10, Grafana itself is not shipped and the Grafana web server is protected behind an OAuth proxy server.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-CNV-4.13:kubevirt-0:4.13.0-1469.el7.src",
"7Server-CNV-4.13:kubevirt-virtctl-0:4.13.0-1469.el7.x86_64",
"7Server-CNV-4.13:kubevirt-virtctl-redistributable-0:4.13.0-1469.el7.x86_64",
"8Base-CNV-4.13:kubevirt-0:4.13.0-1469.el8.src",
"8Base-CNV-4.13:kubevirt-virtctl-0:4.13.0-1469.el8.aarch64",
"8Base-CNV-4.13:kubevirt-virtctl-0:4.13.0-1469.el8.x86_64",
"8Base-CNV-4.13:kubevirt-virtctl-redistributable-0:4.13.0-1469.el8.aarch64",
"8Base-CNV-4.13:kubevirt-virtctl-redistributable-0:4.13.0-1469.el8.x86_64",
"9Base-CNV-4.13:kubevirt-0:4.13.0-1469.el9.src",
"9Base-CNV-4.13:kubevirt-virtctl-0:4.13.0-1469.el9.aarch64",
"9Base-CNV-4.13:kubevirt-virtctl-0:4.13.0-1469.el9.x86_64",
"9Base-CNV-4.13:kubevirt-virtctl-redistributable-0:4.13.0-1469.el9.aarch64",
"9Base-CNV-4.13:kubevirt-virtctl-redistributable-0:4.13.0-1469.el9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-41717"
},
{
"category": "external",
"summary": "RHBZ#2161274",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2161274"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-41717",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41717"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-41717",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-41717"
},
{
"category": "external",
"summary": "https://go.dev/cl/455635",
"url": "https://go.dev/cl/455635"
},
{
"category": "external",
"summary": "https://go.dev/cl/455717",
"url": "https://go.dev/cl/455717"
},
{
"category": "external",
"summary": "https://go.dev/issue/56350",
"url": "https://go.dev/issue/56350"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/L_3rmdT0BMU/m/yZDrXjIiBQAJ",
"url": "https://groups.google.com/g/golang-announce/c/L_3rmdT0BMU/m/yZDrXjIiBQAJ"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2022-1144",
"url": "https://pkg.go.dev/vuln/GO-2022-1144"
}
],
"release_date": "2022-11-30T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-05-18T00:39:12+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-CNV-4.13:kubevirt-0:4.13.0-1469.el7.src",
"7Server-CNV-4.13:kubevirt-virtctl-0:4.13.0-1469.el7.x86_64",
"7Server-CNV-4.13:kubevirt-virtctl-redistributable-0:4.13.0-1469.el7.x86_64",
"8Base-CNV-4.13:kubevirt-0:4.13.0-1469.el8.src",
"8Base-CNV-4.13:kubevirt-virtctl-0:4.13.0-1469.el8.aarch64",
"8Base-CNV-4.13:kubevirt-virtctl-0:4.13.0-1469.el8.x86_64",
"8Base-CNV-4.13:kubevirt-virtctl-redistributable-0:4.13.0-1469.el8.aarch64",
"8Base-CNV-4.13:kubevirt-virtctl-redistributable-0:4.13.0-1469.el8.x86_64",
"9Base-CNV-4.13:kubevirt-0:4.13.0-1469.el9.src",
"9Base-CNV-4.13:kubevirt-virtctl-0:4.13.0-1469.el9.aarch64",
"9Base-CNV-4.13:kubevirt-virtctl-0:4.13.0-1469.el9.x86_64",
"9Base-CNV-4.13:kubevirt-virtctl-redistributable-0:4.13.0-1469.el9.aarch64",
"9Base-CNV-4.13:kubevirt-virtctl-redistributable-0:4.13.0-1469.el9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:3204"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"7Server-CNV-4.13:kubevirt-0:4.13.0-1469.el7.src",
"7Server-CNV-4.13:kubevirt-virtctl-0:4.13.0-1469.el7.x86_64",
"7Server-CNV-4.13:kubevirt-virtctl-redistributable-0:4.13.0-1469.el7.x86_64",
"8Base-CNV-4.13:kubevirt-0:4.13.0-1469.el8.src",
"8Base-CNV-4.13:kubevirt-virtctl-0:4.13.0-1469.el8.aarch64",
"8Base-CNV-4.13:kubevirt-virtctl-0:4.13.0-1469.el8.x86_64",
"8Base-CNV-4.13:kubevirt-virtctl-redistributable-0:4.13.0-1469.el8.aarch64",
"8Base-CNV-4.13:kubevirt-virtctl-redistributable-0:4.13.0-1469.el8.x86_64",
"9Base-CNV-4.13:kubevirt-0:4.13.0-1469.el9.src",
"9Base-CNV-4.13:kubevirt-virtctl-0:4.13.0-1469.el9.aarch64",
"9Base-CNV-4.13:kubevirt-virtctl-0:4.13.0-1469.el9.x86_64",
"9Base-CNV-4.13:kubevirt-virtctl-redistributable-0:4.13.0-1469.el9.aarch64",
"9Base-CNV-4.13:kubevirt-virtctl-redistributable-0:4.13.0-1469.el9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "golang: net/http: excessive memory growth in a Go server accepting HTTP/2 requests"
}
]
}
rhsa-2023:0481
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Submariner 0.12.3 packages that fix various bugs and add various enhancements that are now available for Red Hat Advanced Cluster Management for Kubernetes version 2.5.\n\nRed Hat Product Security has rated this update as having a security impact\nof Moderate. A Common Vulnerability Scoring System (CVSS) base score,\nwhich gives a detailed severity rating, is available for each vulnerability\nfrom the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Submariner enables direct networking between pods and services on different Kubernetes clusters that are either on-premises or in the cloud.\n\nFor more information about Submariner, see the Submariner open source community website at: https://submariner.io/.\n\nThis advisory contains bug fixes and enhancements to the Submariner container images.\n\nMajor bug addressed: \n\nACM-2318: Submariner gateway node: Error updating load balancer with new hosts map\n\nSecurity fix:\n\n* CVE-2022-32149 golang: golang.org/x/text/language: ParseAcceptLanguage takes a long time to parse complex tags",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2023:0481",
"url": "https://access.redhat.com/errata/RHSA-2023:0481"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#moderate",
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "2134010",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2134010"
},
{
"category": "external",
"summary": "ACM-2318",
"url": "https://issues.redhat.com/browse/ACM-2318"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2023/rhsa-2023_0481.json"
}
],
"title": "Red Hat Security Advisory: Submariner 0.12.3 - security update and bug fix",
"tracking": {
"current_release_date": "2025-10-10T01:53:30+00:00",
"generator": {
"date": "2025-10-10T01:53:30+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.9"
}
},
"id": "RHSA-2023:0481",
"initial_release_date": "2023-01-26T21:22:22+00:00",
"revision_history": [
{
"date": "2023-01-26T21:22:22+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2023-01-26T21:22:22+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-10-10T01:53:30+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8",
"product": {
"name": "Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8",
"product_id": "8Base-RHACM-2.5",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:acm:2.5::el8"
}
}
}
],
"category": "product_family",
"name": "Red Hat ACM"
},
{
"branches": [
{
"category": "product_version",
"name": "rhacm2/lighthouse-agent-rhel8@sha256:33ac96a6dd01e698c6d037acd701ee0fc5a09bb1cdd8f761c229e6a2be9ea799_amd64",
"product": {
"name": "rhacm2/lighthouse-agent-rhel8@sha256:33ac96a6dd01e698c6d037acd701ee0fc5a09bb1cdd8f761c229e6a2be9ea799_amd64",
"product_id": "rhacm2/lighthouse-agent-rhel8@sha256:33ac96a6dd01e698c6d037acd701ee0fc5a09bb1cdd8f761c229e6a2be9ea799_amd64",
"product_identification_helper": {
"purl": "pkg:oci/lighthouse-agent-rhel8@sha256:33ac96a6dd01e698c6d037acd701ee0fc5a09bb1cdd8f761c229e6a2be9ea799?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/lighthouse-agent-rhel8\u0026tag=v0.12.3-1"
}
}
},
{
"category": "product_version",
"name": "rhacm2/lighthouse-coredns-rhel8@sha256:f27e7895a859ee2ab5f36134522349c1c04f3b18284787e0d14c3380126bf402_amd64",
"product": {
"name": "rhacm2/lighthouse-coredns-rhel8@sha256:f27e7895a859ee2ab5f36134522349c1c04f3b18284787e0d14c3380126bf402_amd64",
"product_id": "rhacm2/lighthouse-coredns-rhel8@sha256:f27e7895a859ee2ab5f36134522349c1c04f3b18284787e0d14c3380126bf402_amd64",
"product_identification_helper": {
"purl": "pkg:oci/lighthouse-coredns-rhel8@sha256:f27e7895a859ee2ab5f36134522349c1c04f3b18284787e0d14c3380126bf402?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/lighthouse-coredns-rhel8\u0026tag=v0.12.3-1"
}
}
},
{
"category": "product_version",
"name": "rhacm2/subctl-rhel8@sha256:e6f5f07b97d4998c122cadeee693dce4d72f3bbe2c1f9703b15621b6531cf3a4_amd64",
"product": {
"name": "rhacm2/subctl-rhel8@sha256:e6f5f07b97d4998c122cadeee693dce4d72f3bbe2c1f9703b15621b6531cf3a4_amd64",
"product_id": "rhacm2/subctl-rhel8@sha256:e6f5f07b97d4998c122cadeee693dce4d72f3bbe2c1f9703b15621b6531cf3a4_amd64",
"product_identification_helper": {
"purl": "pkg:oci/subctl-rhel8@sha256:e6f5f07b97d4998c122cadeee693dce4d72f3bbe2c1f9703b15621b6531cf3a4?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/subctl-rhel8\u0026tag=v0.12.3-1"
}
}
},
{
"category": "product_version",
"name": "rhacm2/submariner-gateway-rhel8@sha256:7b343f4f8ea08b2e2a670ee938a2286a92d701e5e92f4f43ee58e620e2ee070b_amd64",
"product": {
"name": "rhacm2/submariner-gateway-rhel8@sha256:7b343f4f8ea08b2e2a670ee938a2286a92d701e5e92f4f43ee58e620e2ee070b_amd64",
"product_id": "rhacm2/submariner-gateway-rhel8@sha256:7b343f4f8ea08b2e2a670ee938a2286a92d701e5e92f4f43ee58e620e2ee070b_amd64",
"product_identification_helper": {
"purl": "pkg:oci/submariner-gateway-rhel8@sha256:7b343f4f8ea08b2e2a670ee938a2286a92d701e5e92f4f43ee58e620e2ee070b?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/submariner-gateway-rhel8\u0026tag=v0.12.3-1"
}
}
},
{
"category": "product_version",
"name": "rhacm2/submariner-globalnet-rhel8@sha256:3b04b0be64ea639e82496102236899cc62a2521c8e8bebd07c852118e76bce88_amd64",
"product": {
"name": "rhacm2/submariner-globalnet-rhel8@sha256:3b04b0be64ea639e82496102236899cc62a2521c8e8bebd07c852118e76bce88_amd64",
"product_id": "rhacm2/submariner-globalnet-rhel8@sha256:3b04b0be64ea639e82496102236899cc62a2521c8e8bebd07c852118e76bce88_amd64",
"product_identification_helper": {
"purl": "pkg:oci/submariner-globalnet-rhel8@sha256:3b04b0be64ea639e82496102236899cc62a2521c8e8bebd07c852118e76bce88?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/submariner-globalnet-rhel8\u0026tag=v0.12.3-1"
}
}
},
{
"category": "product_version",
"name": "rhacm2/submariner-networkplugin-syncer-rhel8@sha256:91bc8d57c88c771bda7a6703ced10e32e9999116fe8cb7e4adddb6198591eeac_amd64",
"product": {
"name": "rhacm2/submariner-networkplugin-syncer-rhel8@sha256:91bc8d57c88c771bda7a6703ced10e32e9999116fe8cb7e4adddb6198591eeac_amd64",
"product_id": "rhacm2/submariner-networkplugin-syncer-rhel8@sha256:91bc8d57c88c771bda7a6703ced10e32e9999116fe8cb7e4adddb6198591eeac_amd64",
"product_identification_helper": {
"purl": "pkg:oci/submariner-networkplugin-syncer-rhel8@sha256:91bc8d57c88c771bda7a6703ced10e32e9999116fe8cb7e4adddb6198591eeac?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/submariner-networkplugin-syncer-rhel8\u0026tag=v0.12.3-1"
}
}
},
{
"category": "product_version",
"name": "rhacm2/submariner-operator-bundle@sha256:fa2fd74dc3918d962ee6ea162e765f45b75a9588017145cd8322469456bc7164_amd64",
"product": {
"name": "rhacm2/submariner-operator-bundle@sha256:fa2fd74dc3918d962ee6ea162e765f45b75a9588017145cd8322469456bc7164_amd64",
"product_id": "rhacm2/submariner-operator-bundle@sha256:fa2fd74dc3918d962ee6ea162e765f45b75a9588017145cd8322469456bc7164_amd64",
"product_identification_helper": {
"purl": "pkg:oci/submariner-operator-bundle@sha256:fa2fd74dc3918d962ee6ea162e765f45b75a9588017145cd8322469456bc7164?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/submariner-operator-bundle\u0026tag=v0.12.3-1"
}
}
},
{
"category": "product_version",
"name": "rhacm2/submariner-rhel8-operator@sha256:98811cc217f48bc7a6fbe7d4ccf7b1b7b239e19e24b7fcfeacbec8b297880f89_amd64",
"product": {
"name": "rhacm2/submariner-rhel8-operator@sha256:98811cc217f48bc7a6fbe7d4ccf7b1b7b239e19e24b7fcfeacbec8b297880f89_amd64",
"product_id": "rhacm2/submariner-rhel8-operator@sha256:98811cc217f48bc7a6fbe7d4ccf7b1b7b239e19e24b7fcfeacbec8b297880f89_amd64",
"product_identification_helper": {
"purl": "pkg:oci/submariner-rhel8-operator@sha256:98811cc217f48bc7a6fbe7d4ccf7b1b7b239e19e24b7fcfeacbec8b297880f89?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/submariner-rhel8-operator\u0026tag=v0.12.3-1"
}
}
},
{
"category": "product_version",
"name": "rhacm2/submariner-route-agent-rhel8@sha256:6bff7c4285999b218937924fc75e6303525089064f21d23234a01f453529fbf6_amd64",
"product": {
"name": "rhacm2/submariner-route-agent-rhel8@sha256:6bff7c4285999b218937924fc75e6303525089064f21d23234a01f453529fbf6_amd64",
"product_id": "rhacm2/submariner-route-agent-rhel8@sha256:6bff7c4285999b218937924fc75e6303525089064f21d23234a01f453529fbf6_amd64",
"product_identification_helper": {
"purl": "pkg:oci/submariner-route-agent-rhel8@sha256:6bff7c4285999b218937924fc75e6303525089064f21d23234a01f453529fbf6?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/submariner-route-agent-rhel8\u0026tag=v0.12.3-1"
}
}
}
],
"category": "architecture",
"name": "amd64"
},
{
"branches": [
{
"category": "product_version",
"name": "rhacm2/lighthouse-agent-rhel8@sha256:6b579e761576bd97f05c1f5ba42df74db5d22d0203e9d0253efc324cb0bf6378_ppc64le",
"product": {
"name": "rhacm2/lighthouse-agent-rhel8@sha256:6b579e761576bd97f05c1f5ba42df74db5d22d0203e9d0253efc324cb0bf6378_ppc64le",
"product_id": "rhacm2/lighthouse-agent-rhel8@sha256:6b579e761576bd97f05c1f5ba42df74db5d22d0203e9d0253efc324cb0bf6378_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/lighthouse-agent-rhel8@sha256:6b579e761576bd97f05c1f5ba42df74db5d22d0203e9d0253efc324cb0bf6378?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/lighthouse-agent-rhel8\u0026tag=v0.12.3-1"
}
}
},
{
"category": "product_version",
"name": "rhacm2/lighthouse-coredns-rhel8@sha256:77e474f4e0be091c3772ec0c16f2a67168dfea599a1f4220deb2fcb795d2d9c7_ppc64le",
"product": {
"name": "rhacm2/lighthouse-coredns-rhel8@sha256:77e474f4e0be091c3772ec0c16f2a67168dfea599a1f4220deb2fcb795d2d9c7_ppc64le",
"product_id": "rhacm2/lighthouse-coredns-rhel8@sha256:77e474f4e0be091c3772ec0c16f2a67168dfea599a1f4220deb2fcb795d2d9c7_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/lighthouse-coredns-rhel8@sha256:77e474f4e0be091c3772ec0c16f2a67168dfea599a1f4220deb2fcb795d2d9c7?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/lighthouse-coredns-rhel8\u0026tag=v0.12.3-1"
}
}
},
{
"category": "product_version",
"name": "rhacm2/subctl-rhel8@sha256:47cd1ee9aff93dad2e554805836e3393a0d5fc408ffc41a3ffef4676e10ce1f9_ppc64le",
"product": {
"name": "rhacm2/subctl-rhel8@sha256:47cd1ee9aff93dad2e554805836e3393a0d5fc408ffc41a3ffef4676e10ce1f9_ppc64le",
"product_id": "rhacm2/subctl-rhel8@sha256:47cd1ee9aff93dad2e554805836e3393a0d5fc408ffc41a3ffef4676e10ce1f9_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/subctl-rhel8@sha256:47cd1ee9aff93dad2e554805836e3393a0d5fc408ffc41a3ffef4676e10ce1f9?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/subctl-rhel8\u0026tag=v0.12.3-1"
}
}
},
{
"category": "product_version",
"name": "rhacm2/submariner-gateway-rhel8@sha256:522bddc7d016659157c51f7425098eb92f2b0857f921f5ef01e188af3c9056c6_ppc64le",
"product": {
"name": "rhacm2/submariner-gateway-rhel8@sha256:522bddc7d016659157c51f7425098eb92f2b0857f921f5ef01e188af3c9056c6_ppc64le",
"product_id": "rhacm2/submariner-gateway-rhel8@sha256:522bddc7d016659157c51f7425098eb92f2b0857f921f5ef01e188af3c9056c6_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/submariner-gateway-rhel8@sha256:522bddc7d016659157c51f7425098eb92f2b0857f921f5ef01e188af3c9056c6?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/submariner-gateway-rhel8\u0026tag=v0.12.3-1"
}
}
},
{
"category": "product_version",
"name": "rhacm2/submariner-globalnet-rhel8@sha256:c9050e94421701df533d7bc7fb2736de3b923a1b9689f7db9285e902d1d9c173_ppc64le",
"product": {
"name": "rhacm2/submariner-globalnet-rhel8@sha256:c9050e94421701df533d7bc7fb2736de3b923a1b9689f7db9285e902d1d9c173_ppc64le",
"product_id": "rhacm2/submariner-globalnet-rhel8@sha256:c9050e94421701df533d7bc7fb2736de3b923a1b9689f7db9285e902d1d9c173_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/submariner-globalnet-rhel8@sha256:c9050e94421701df533d7bc7fb2736de3b923a1b9689f7db9285e902d1d9c173?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/submariner-globalnet-rhel8\u0026tag=v0.12.3-1"
}
}
},
{
"category": "product_version",
"name": "rhacm2/submariner-networkplugin-syncer-rhel8@sha256:5a86959a38334532e5a33ab76b0553a9eae4cfad8897d5f92457a11cb6a5374b_ppc64le",
"product": {
"name": "rhacm2/submariner-networkplugin-syncer-rhel8@sha256:5a86959a38334532e5a33ab76b0553a9eae4cfad8897d5f92457a11cb6a5374b_ppc64le",
"product_id": "rhacm2/submariner-networkplugin-syncer-rhel8@sha256:5a86959a38334532e5a33ab76b0553a9eae4cfad8897d5f92457a11cb6a5374b_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/submariner-networkplugin-syncer-rhel8@sha256:5a86959a38334532e5a33ab76b0553a9eae4cfad8897d5f92457a11cb6a5374b?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/submariner-networkplugin-syncer-rhel8\u0026tag=v0.12.3-1"
}
}
},
{
"category": "product_version",
"name": "rhacm2/submariner-operator-bundle@sha256:40b62e497e8280cb4db3803ad140e9aa15f038e15b3e1218d0c506646f576aec_ppc64le",
"product": {
"name": "rhacm2/submariner-operator-bundle@sha256:40b62e497e8280cb4db3803ad140e9aa15f038e15b3e1218d0c506646f576aec_ppc64le",
"product_id": "rhacm2/submariner-operator-bundle@sha256:40b62e497e8280cb4db3803ad140e9aa15f038e15b3e1218d0c506646f576aec_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/submariner-operator-bundle@sha256:40b62e497e8280cb4db3803ad140e9aa15f038e15b3e1218d0c506646f576aec?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/submariner-operator-bundle\u0026tag=v0.12.3-1"
}
}
},
{
"category": "product_version",
"name": "rhacm2/submariner-rhel8-operator@sha256:2aad67f470d3a58382029b4db1459916036a8f41aed167d567eb1abef45cda3f_ppc64le",
"product": {
"name": "rhacm2/submariner-rhel8-operator@sha256:2aad67f470d3a58382029b4db1459916036a8f41aed167d567eb1abef45cda3f_ppc64le",
"product_id": "rhacm2/submariner-rhel8-operator@sha256:2aad67f470d3a58382029b4db1459916036a8f41aed167d567eb1abef45cda3f_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/submariner-rhel8-operator@sha256:2aad67f470d3a58382029b4db1459916036a8f41aed167d567eb1abef45cda3f?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/submariner-rhel8-operator\u0026tag=v0.12.3-1"
}
}
},
{
"category": "product_version",
"name": "rhacm2/submariner-route-agent-rhel8@sha256:0f13ca7bb60b17115395a51421916f0136a6d1296da563ba609cf37ec4e31440_ppc64le",
"product": {
"name": "rhacm2/submariner-route-agent-rhel8@sha256:0f13ca7bb60b17115395a51421916f0136a6d1296da563ba609cf37ec4e31440_ppc64le",
"product_id": "rhacm2/submariner-route-agent-rhel8@sha256:0f13ca7bb60b17115395a51421916f0136a6d1296da563ba609cf37ec4e31440_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/submariner-route-agent-rhel8@sha256:0f13ca7bb60b17115395a51421916f0136a6d1296da563ba609cf37ec4e31440?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/submariner-route-agent-rhel8\u0026tag=v0.12.3-1"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "rhacm2/lighthouse-agent-rhel8@sha256:b76b9fc2f08fdedd74511526b3f049a37e8beab3dddd9c3463ea20064aadf194_arm64",
"product": {
"name": "rhacm2/lighthouse-agent-rhel8@sha256:b76b9fc2f08fdedd74511526b3f049a37e8beab3dddd9c3463ea20064aadf194_arm64",
"product_id": "rhacm2/lighthouse-agent-rhel8@sha256:b76b9fc2f08fdedd74511526b3f049a37e8beab3dddd9c3463ea20064aadf194_arm64",
"product_identification_helper": {
"purl": "pkg:oci/lighthouse-agent-rhel8@sha256:b76b9fc2f08fdedd74511526b3f049a37e8beab3dddd9c3463ea20064aadf194?arch=arm64\u0026repository_url=registry.redhat.io/rhacm2/lighthouse-agent-rhel8\u0026tag=v0.12.3-1"
}
}
},
{
"category": "product_version",
"name": "rhacm2/lighthouse-coredns-rhel8@sha256:4af85e8acaa3b787828a3352bbfff427c6668936c428169e5fcbd345e802fcc3_arm64",
"product": {
"name": "rhacm2/lighthouse-coredns-rhel8@sha256:4af85e8acaa3b787828a3352bbfff427c6668936c428169e5fcbd345e802fcc3_arm64",
"product_id": "rhacm2/lighthouse-coredns-rhel8@sha256:4af85e8acaa3b787828a3352bbfff427c6668936c428169e5fcbd345e802fcc3_arm64",
"product_identification_helper": {
"purl": "pkg:oci/lighthouse-coredns-rhel8@sha256:4af85e8acaa3b787828a3352bbfff427c6668936c428169e5fcbd345e802fcc3?arch=arm64\u0026repository_url=registry.redhat.io/rhacm2/lighthouse-coredns-rhel8\u0026tag=v0.12.3-1"
}
}
},
{
"category": "product_version",
"name": "rhacm2/subctl-rhel8@sha256:dae78580dc26a6beaaeef47575e0cc13c487d5cef1d72c415ddc19368ef3b4a5_arm64",
"product": {
"name": "rhacm2/subctl-rhel8@sha256:dae78580dc26a6beaaeef47575e0cc13c487d5cef1d72c415ddc19368ef3b4a5_arm64",
"product_id": "rhacm2/subctl-rhel8@sha256:dae78580dc26a6beaaeef47575e0cc13c487d5cef1d72c415ddc19368ef3b4a5_arm64",
"product_identification_helper": {
"purl": "pkg:oci/subctl-rhel8@sha256:dae78580dc26a6beaaeef47575e0cc13c487d5cef1d72c415ddc19368ef3b4a5?arch=arm64\u0026repository_url=registry.redhat.io/rhacm2/subctl-rhel8\u0026tag=v0.12.3-1"
}
}
},
{
"category": "product_version",
"name": "rhacm2/submariner-gateway-rhel8@sha256:2bdd80c985f13cc90a223979c7b26bd5a273504ce973ea2c24b599e1c5f1b3fc_arm64",
"product": {
"name": "rhacm2/submariner-gateway-rhel8@sha256:2bdd80c985f13cc90a223979c7b26bd5a273504ce973ea2c24b599e1c5f1b3fc_arm64",
"product_id": "rhacm2/submariner-gateway-rhel8@sha256:2bdd80c985f13cc90a223979c7b26bd5a273504ce973ea2c24b599e1c5f1b3fc_arm64",
"product_identification_helper": {
"purl": "pkg:oci/submariner-gateway-rhel8@sha256:2bdd80c985f13cc90a223979c7b26bd5a273504ce973ea2c24b599e1c5f1b3fc?arch=arm64\u0026repository_url=registry.redhat.io/rhacm2/submariner-gateway-rhel8\u0026tag=v0.12.3-1"
}
}
},
{
"category": "product_version",
"name": "rhacm2/submariner-globalnet-rhel8@sha256:d7fdc22644e6dbf19f21130c0f635e0a6c6e11fb9cbf9d9cbd9635d17fe25fbf_arm64",
"product": {
"name": "rhacm2/submariner-globalnet-rhel8@sha256:d7fdc22644e6dbf19f21130c0f635e0a6c6e11fb9cbf9d9cbd9635d17fe25fbf_arm64",
"product_id": "rhacm2/submariner-globalnet-rhel8@sha256:d7fdc22644e6dbf19f21130c0f635e0a6c6e11fb9cbf9d9cbd9635d17fe25fbf_arm64",
"product_identification_helper": {
"purl": "pkg:oci/submariner-globalnet-rhel8@sha256:d7fdc22644e6dbf19f21130c0f635e0a6c6e11fb9cbf9d9cbd9635d17fe25fbf?arch=arm64\u0026repository_url=registry.redhat.io/rhacm2/submariner-globalnet-rhel8\u0026tag=v0.12.3-1"
}
}
},
{
"category": "product_version",
"name": "rhacm2/submariner-networkplugin-syncer-rhel8@sha256:0b72b8b294483dcf92d8acaaa56e8ac1141db3c6811ab64298117fafde99936a_arm64",
"product": {
"name": "rhacm2/submariner-networkplugin-syncer-rhel8@sha256:0b72b8b294483dcf92d8acaaa56e8ac1141db3c6811ab64298117fafde99936a_arm64",
"product_id": "rhacm2/submariner-networkplugin-syncer-rhel8@sha256:0b72b8b294483dcf92d8acaaa56e8ac1141db3c6811ab64298117fafde99936a_arm64",
"product_identification_helper": {
"purl": "pkg:oci/submariner-networkplugin-syncer-rhel8@sha256:0b72b8b294483dcf92d8acaaa56e8ac1141db3c6811ab64298117fafde99936a?arch=arm64\u0026repository_url=registry.redhat.io/rhacm2/submariner-networkplugin-syncer-rhel8\u0026tag=v0.12.3-1"
}
}
},
{
"category": "product_version",
"name": "rhacm2/submariner-operator-bundle@sha256:71c8912419b9a6ac3ddd911c0a2fd097170743efab7dcb1c14141e5e1defc738_arm64",
"product": {
"name": "rhacm2/submariner-operator-bundle@sha256:71c8912419b9a6ac3ddd911c0a2fd097170743efab7dcb1c14141e5e1defc738_arm64",
"product_id": "rhacm2/submariner-operator-bundle@sha256:71c8912419b9a6ac3ddd911c0a2fd097170743efab7dcb1c14141e5e1defc738_arm64",
"product_identification_helper": {
"purl": "pkg:oci/submariner-operator-bundle@sha256:71c8912419b9a6ac3ddd911c0a2fd097170743efab7dcb1c14141e5e1defc738?arch=arm64\u0026repository_url=registry.redhat.io/rhacm2/submariner-operator-bundle\u0026tag=v0.12.3-1"
}
}
},
{
"category": "product_version",
"name": "rhacm2/submariner-rhel8-operator@sha256:dc2a4dace498a5c6238c555411362c2e6166011582a572d3cab431c745143301_arm64",
"product": {
"name": "rhacm2/submariner-rhel8-operator@sha256:dc2a4dace498a5c6238c555411362c2e6166011582a572d3cab431c745143301_arm64",
"product_id": "rhacm2/submariner-rhel8-operator@sha256:dc2a4dace498a5c6238c555411362c2e6166011582a572d3cab431c745143301_arm64",
"product_identification_helper": {
"purl": "pkg:oci/submariner-rhel8-operator@sha256:dc2a4dace498a5c6238c555411362c2e6166011582a572d3cab431c745143301?arch=arm64\u0026repository_url=registry.redhat.io/rhacm2/submariner-rhel8-operator\u0026tag=v0.12.3-1"
}
}
},
{
"category": "product_version",
"name": "rhacm2/submariner-route-agent-rhel8@sha256:d0140f18ad07368201a6e34af970ac9ee402f8ac292e71c42244af85eb37db08_arm64",
"product": {
"name": "rhacm2/submariner-route-agent-rhel8@sha256:d0140f18ad07368201a6e34af970ac9ee402f8ac292e71c42244af85eb37db08_arm64",
"product_id": "rhacm2/submariner-route-agent-rhel8@sha256:d0140f18ad07368201a6e34af970ac9ee402f8ac292e71c42244af85eb37db08_arm64",
"product_identification_helper": {
"purl": "pkg:oci/submariner-route-agent-rhel8@sha256:d0140f18ad07368201a6e34af970ac9ee402f8ac292e71c42244af85eb37db08?arch=arm64\u0026repository_url=registry.redhat.io/rhacm2/submariner-route-agent-rhel8\u0026tag=v0.12.3-1"
}
}
}
],
"category": "architecture",
"name": "arm64"
},
{
"branches": [
{
"category": "product_version",
"name": "rhacm2/lighthouse-agent-rhel8@sha256:998706bb956a4fdd15526b5bb6a0458d59ea5cc537e2784b6dec1bb24b6aebbd_s390x",
"product": {
"name": "rhacm2/lighthouse-agent-rhel8@sha256:998706bb956a4fdd15526b5bb6a0458d59ea5cc537e2784b6dec1bb24b6aebbd_s390x",
"product_id": "rhacm2/lighthouse-agent-rhel8@sha256:998706bb956a4fdd15526b5bb6a0458d59ea5cc537e2784b6dec1bb24b6aebbd_s390x",
"product_identification_helper": {
"purl": "pkg:oci/lighthouse-agent-rhel8@sha256:998706bb956a4fdd15526b5bb6a0458d59ea5cc537e2784b6dec1bb24b6aebbd?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/lighthouse-agent-rhel8\u0026tag=v0.12.3-1"
}
}
},
{
"category": "product_version",
"name": "rhacm2/lighthouse-coredns-rhel8@sha256:dbc246166dd35202221ac3f885a0e46160a6d277a058b6d2f1c7ee571c673b50_s390x",
"product": {
"name": "rhacm2/lighthouse-coredns-rhel8@sha256:dbc246166dd35202221ac3f885a0e46160a6d277a058b6d2f1c7ee571c673b50_s390x",
"product_id": "rhacm2/lighthouse-coredns-rhel8@sha256:dbc246166dd35202221ac3f885a0e46160a6d277a058b6d2f1c7ee571c673b50_s390x",
"product_identification_helper": {
"purl": "pkg:oci/lighthouse-coredns-rhel8@sha256:dbc246166dd35202221ac3f885a0e46160a6d277a058b6d2f1c7ee571c673b50?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/lighthouse-coredns-rhel8\u0026tag=v0.12.3-1"
}
}
},
{
"category": "product_version",
"name": "rhacm2/subctl-rhel8@sha256:9ab13f289008d38a7cfa2182e4a5fb3a29b0b8efa2da40916018f2449ca730c7_s390x",
"product": {
"name": "rhacm2/subctl-rhel8@sha256:9ab13f289008d38a7cfa2182e4a5fb3a29b0b8efa2da40916018f2449ca730c7_s390x",
"product_id": "rhacm2/subctl-rhel8@sha256:9ab13f289008d38a7cfa2182e4a5fb3a29b0b8efa2da40916018f2449ca730c7_s390x",
"product_identification_helper": {
"purl": "pkg:oci/subctl-rhel8@sha256:9ab13f289008d38a7cfa2182e4a5fb3a29b0b8efa2da40916018f2449ca730c7?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/subctl-rhel8\u0026tag=v0.12.3-1"
}
}
},
{
"category": "product_version",
"name": "rhacm2/submariner-gateway-rhel8@sha256:825db9cddd68a762e934bc855e5836e4f16a566f59d1310f45a06dac85ab8035_s390x",
"product": {
"name": "rhacm2/submariner-gateway-rhel8@sha256:825db9cddd68a762e934bc855e5836e4f16a566f59d1310f45a06dac85ab8035_s390x",
"product_id": "rhacm2/submariner-gateway-rhel8@sha256:825db9cddd68a762e934bc855e5836e4f16a566f59d1310f45a06dac85ab8035_s390x",
"product_identification_helper": {
"purl": "pkg:oci/submariner-gateway-rhel8@sha256:825db9cddd68a762e934bc855e5836e4f16a566f59d1310f45a06dac85ab8035?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/submariner-gateway-rhel8\u0026tag=v0.12.3-1"
}
}
},
{
"category": "product_version",
"name": "rhacm2/submariner-globalnet-rhel8@sha256:d855b05d15a54a88e2c026e0d1935b189dc7ceddb3a7b5b0672e8e4c715f3845_s390x",
"product": {
"name": "rhacm2/submariner-globalnet-rhel8@sha256:d855b05d15a54a88e2c026e0d1935b189dc7ceddb3a7b5b0672e8e4c715f3845_s390x",
"product_id": "rhacm2/submariner-globalnet-rhel8@sha256:d855b05d15a54a88e2c026e0d1935b189dc7ceddb3a7b5b0672e8e4c715f3845_s390x",
"product_identification_helper": {
"purl": "pkg:oci/submariner-globalnet-rhel8@sha256:d855b05d15a54a88e2c026e0d1935b189dc7ceddb3a7b5b0672e8e4c715f3845?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/submariner-globalnet-rhel8\u0026tag=v0.12.3-1"
}
}
},
{
"category": "product_version",
"name": "rhacm2/submariner-networkplugin-syncer-rhel8@sha256:39ca01ef63bc7d2663186a516456c90657b918a2ec044af7aadb1315a607f429_s390x",
"product": {
"name": "rhacm2/submariner-networkplugin-syncer-rhel8@sha256:39ca01ef63bc7d2663186a516456c90657b918a2ec044af7aadb1315a607f429_s390x",
"product_id": "rhacm2/submariner-networkplugin-syncer-rhel8@sha256:39ca01ef63bc7d2663186a516456c90657b918a2ec044af7aadb1315a607f429_s390x",
"product_identification_helper": {
"purl": "pkg:oci/submariner-networkplugin-syncer-rhel8@sha256:39ca01ef63bc7d2663186a516456c90657b918a2ec044af7aadb1315a607f429?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/submariner-networkplugin-syncer-rhel8\u0026tag=v0.12.3-1"
}
}
},
{
"category": "product_version",
"name": "rhacm2/submariner-operator-bundle@sha256:f86cb9bb9dc189057de11e2a5c3c1c10597c78e82432a34cf2864c6a32f8e6fa_s390x",
"product": {
"name": "rhacm2/submariner-operator-bundle@sha256:f86cb9bb9dc189057de11e2a5c3c1c10597c78e82432a34cf2864c6a32f8e6fa_s390x",
"product_id": "rhacm2/submariner-operator-bundle@sha256:f86cb9bb9dc189057de11e2a5c3c1c10597c78e82432a34cf2864c6a32f8e6fa_s390x",
"product_identification_helper": {
"purl": "pkg:oci/submariner-operator-bundle@sha256:f86cb9bb9dc189057de11e2a5c3c1c10597c78e82432a34cf2864c6a32f8e6fa?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/submariner-operator-bundle\u0026tag=v0.12.3-1"
}
}
},
{
"category": "product_version",
"name": "rhacm2/submariner-rhel8-operator@sha256:971eeffff35343edb6da2be6d2d3620d13536cbbaddacbbd13f285a70490df3a_s390x",
"product": {
"name": "rhacm2/submariner-rhel8-operator@sha256:971eeffff35343edb6da2be6d2d3620d13536cbbaddacbbd13f285a70490df3a_s390x",
"product_id": "rhacm2/submariner-rhel8-operator@sha256:971eeffff35343edb6da2be6d2d3620d13536cbbaddacbbd13f285a70490df3a_s390x",
"product_identification_helper": {
"purl": "pkg:oci/submariner-rhel8-operator@sha256:971eeffff35343edb6da2be6d2d3620d13536cbbaddacbbd13f285a70490df3a?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/submariner-rhel8-operator\u0026tag=v0.12.3-1"
}
}
},
{
"category": "product_version",
"name": "rhacm2/submariner-route-agent-rhel8@sha256:497545ae0c5ae10463c5ef4a56c0e3733efbff2da65754dce4bbb977cb80d55a_s390x",
"product": {
"name": "rhacm2/submariner-route-agent-rhel8@sha256:497545ae0c5ae10463c5ef4a56c0e3733efbff2da65754dce4bbb977cb80d55a_s390x",
"product_id": "rhacm2/submariner-route-agent-rhel8@sha256:497545ae0c5ae10463c5ef4a56c0e3733efbff2da65754dce4bbb977cb80d55a_s390x",
"product_identification_helper": {
"purl": "pkg:oci/submariner-route-agent-rhel8@sha256:497545ae0c5ae10463c5ef4a56c0e3733efbff2da65754dce4bbb977cb80d55a?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/submariner-route-agent-rhel8\u0026tag=v0.12.3-1"
}
}
}
],
"category": "architecture",
"name": "s390x"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "rhacm2/lighthouse-agent-rhel8@sha256:33ac96a6dd01e698c6d037acd701ee0fc5a09bb1cdd8f761c229e6a2be9ea799_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8",
"product_id": "8Base-RHACM-2.5:rhacm2/lighthouse-agent-rhel8@sha256:33ac96a6dd01e698c6d037acd701ee0fc5a09bb1cdd8f761c229e6a2be9ea799_amd64"
},
"product_reference": "rhacm2/lighthouse-agent-rhel8@sha256:33ac96a6dd01e698c6d037acd701ee0fc5a09bb1cdd8f761c229e6a2be9ea799_amd64",
"relates_to_product_reference": "8Base-RHACM-2.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhacm2/lighthouse-agent-rhel8@sha256:6b579e761576bd97f05c1f5ba42df74db5d22d0203e9d0253efc324cb0bf6378_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8",
"product_id": "8Base-RHACM-2.5:rhacm2/lighthouse-agent-rhel8@sha256:6b579e761576bd97f05c1f5ba42df74db5d22d0203e9d0253efc324cb0bf6378_ppc64le"
},
"product_reference": "rhacm2/lighthouse-agent-rhel8@sha256:6b579e761576bd97f05c1f5ba42df74db5d22d0203e9d0253efc324cb0bf6378_ppc64le",
"relates_to_product_reference": "8Base-RHACM-2.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhacm2/lighthouse-agent-rhel8@sha256:998706bb956a4fdd15526b5bb6a0458d59ea5cc537e2784b6dec1bb24b6aebbd_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8",
"product_id": "8Base-RHACM-2.5:rhacm2/lighthouse-agent-rhel8@sha256:998706bb956a4fdd15526b5bb6a0458d59ea5cc537e2784b6dec1bb24b6aebbd_s390x"
},
"product_reference": "rhacm2/lighthouse-agent-rhel8@sha256:998706bb956a4fdd15526b5bb6a0458d59ea5cc537e2784b6dec1bb24b6aebbd_s390x",
"relates_to_product_reference": "8Base-RHACM-2.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhacm2/lighthouse-agent-rhel8@sha256:b76b9fc2f08fdedd74511526b3f049a37e8beab3dddd9c3463ea20064aadf194_arm64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8",
"product_id": "8Base-RHACM-2.5:rhacm2/lighthouse-agent-rhel8@sha256:b76b9fc2f08fdedd74511526b3f049a37e8beab3dddd9c3463ea20064aadf194_arm64"
},
"product_reference": "rhacm2/lighthouse-agent-rhel8@sha256:b76b9fc2f08fdedd74511526b3f049a37e8beab3dddd9c3463ea20064aadf194_arm64",
"relates_to_product_reference": "8Base-RHACM-2.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhacm2/lighthouse-coredns-rhel8@sha256:4af85e8acaa3b787828a3352bbfff427c6668936c428169e5fcbd345e802fcc3_arm64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8",
"product_id": "8Base-RHACM-2.5:rhacm2/lighthouse-coredns-rhel8@sha256:4af85e8acaa3b787828a3352bbfff427c6668936c428169e5fcbd345e802fcc3_arm64"
},
"product_reference": "rhacm2/lighthouse-coredns-rhel8@sha256:4af85e8acaa3b787828a3352bbfff427c6668936c428169e5fcbd345e802fcc3_arm64",
"relates_to_product_reference": "8Base-RHACM-2.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhacm2/lighthouse-coredns-rhel8@sha256:77e474f4e0be091c3772ec0c16f2a67168dfea599a1f4220deb2fcb795d2d9c7_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8",
"product_id": "8Base-RHACM-2.5:rhacm2/lighthouse-coredns-rhel8@sha256:77e474f4e0be091c3772ec0c16f2a67168dfea599a1f4220deb2fcb795d2d9c7_ppc64le"
},
"product_reference": "rhacm2/lighthouse-coredns-rhel8@sha256:77e474f4e0be091c3772ec0c16f2a67168dfea599a1f4220deb2fcb795d2d9c7_ppc64le",
"relates_to_product_reference": "8Base-RHACM-2.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhacm2/lighthouse-coredns-rhel8@sha256:dbc246166dd35202221ac3f885a0e46160a6d277a058b6d2f1c7ee571c673b50_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8",
"product_id": "8Base-RHACM-2.5:rhacm2/lighthouse-coredns-rhel8@sha256:dbc246166dd35202221ac3f885a0e46160a6d277a058b6d2f1c7ee571c673b50_s390x"
},
"product_reference": "rhacm2/lighthouse-coredns-rhel8@sha256:dbc246166dd35202221ac3f885a0e46160a6d277a058b6d2f1c7ee571c673b50_s390x",
"relates_to_product_reference": "8Base-RHACM-2.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhacm2/lighthouse-coredns-rhel8@sha256:f27e7895a859ee2ab5f36134522349c1c04f3b18284787e0d14c3380126bf402_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8",
"product_id": "8Base-RHACM-2.5:rhacm2/lighthouse-coredns-rhel8@sha256:f27e7895a859ee2ab5f36134522349c1c04f3b18284787e0d14c3380126bf402_amd64"
},
"product_reference": "rhacm2/lighthouse-coredns-rhel8@sha256:f27e7895a859ee2ab5f36134522349c1c04f3b18284787e0d14c3380126bf402_amd64",
"relates_to_product_reference": "8Base-RHACM-2.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhacm2/subctl-rhel8@sha256:47cd1ee9aff93dad2e554805836e3393a0d5fc408ffc41a3ffef4676e10ce1f9_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8",
"product_id": "8Base-RHACM-2.5:rhacm2/subctl-rhel8@sha256:47cd1ee9aff93dad2e554805836e3393a0d5fc408ffc41a3ffef4676e10ce1f9_ppc64le"
},
"product_reference": "rhacm2/subctl-rhel8@sha256:47cd1ee9aff93dad2e554805836e3393a0d5fc408ffc41a3ffef4676e10ce1f9_ppc64le",
"relates_to_product_reference": "8Base-RHACM-2.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhacm2/subctl-rhel8@sha256:9ab13f289008d38a7cfa2182e4a5fb3a29b0b8efa2da40916018f2449ca730c7_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8",
"product_id": "8Base-RHACM-2.5:rhacm2/subctl-rhel8@sha256:9ab13f289008d38a7cfa2182e4a5fb3a29b0b8efa2da40916018f2449ca730c7_s390x"
},
"product_reference": "rhacm2/subctl-rhel8@sha256:9ab13f289008d38a7cfa2182e4a5fb3a29b0b8efa2da40916018f2449ca730c7_s390x",
"relates_to_product_reference": "8Base-RHACM-2.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhacm2/subctl-rhel8@sha256:dae78580dc26a6beaaeef47575e0cc13c487d5cef1d72c415ddc19368ef3b4a5_arm64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8",
"product_id": "8Base-RHACM-2.5:rhacm2/subctl-rhel8@sha256:dae78580dc26a6beaaeef47575e0cc13c487d5cef1d72c415ddc19368ef3b4a5_arm64"
},
"product_reference": "rhacm2/subctl-rhel8@sha256:dae78580dc26a6beaaeef47575e0cc13c487d5cef1d72c415ddc19368ef3b4a5_arm64",
"relates_to_product_reference": "8Base-RHACM-2.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhacm2/subctl-rhel8@sha256:e6f5f07b97d4998c122cadeee693dce4d72f3bbe2c1f9703b15621b6531cf3a4_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8",
"product_id": "8Base-RHACM-2.5:rhacm2/subctl-rhel8@sha256:e6f5f07b97d4998c122cadeee693dce4d72f3bbe2c1f9703b15621b6531cf3a4_amd64"
},
"product_reference": "rhacm2/subctl-rhel8@sha256:e6f5f07b97d4998c122cadeee693dce4d72f3bbe2c1f9703b15621b6531cf3a4_amd64",
"relates_to_product_reference": "8Base-RHACM-2.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhacm2/submariner-gateway-rhel8@sha256:2bdd80c985f13cc90a223979c7b26bd5a273504ce973ea2c24b599e1c5f1b3fc_arm64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8",
"product_id": "8Base-RHACM-2.5:rhacm2/submariner-gateway-rhel8@sha256:2bdd80c985f13cc90a223979c7b26bd5a273504ce973ea2c24b599e1c5f1b3fc_arm64"
},
"product_reference": "rhacm2/submariner-gateway-rhel8@sha256:2bdd80c985f13cc90a223979c7b26bd5a273504ce973ea2c24b599e1c5f1b3fc_arm64",
"relates_to_product_reference": "8Base-RHACM-2.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhacm2/submariner-gateway-rhel8@sha256:522bddc7d016659157c51f7425098eb92f2b0857f921f5ef01e188af3c9056c6_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8",
"product_id": "8Base-RHACM-2.5:rhacm2/submariner-gateway-rhel8@sha256:522bddc7d016659157c51f7425098eb92f2b0857f921f5ef01e188af3c9056c6_ppc64le"
},
"product_reference": "rhacm2/submariner-gateway-rhel8@sha256:522bddc7d016659157c51f7425098eb92f2b0857f921f5ef01e188af3c9056c6_ppc64le",
"relates_to_product_reference": "8Base-RHACM-2.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhacm2/submariner-gateway-rhel8@sha256:7b343f4f8ea08b2e2a670ee938a2286a92d701e5e92f4f43ee58e620e2ee070b_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8",
"product_id": "8Base-RHACM-2.5:rhacm2/submariner-gateway-rhel8@sha256:7b343f4f8ea08b2e2a670ee938a2286a92d701e5e92f4f43ee58e620e2ee070b_amd64"
},
"product_reference": "rhacm2/submariner-gateway-rhel8@sha256:7b343f4f8ea08b2e2a670ee938a2286a92d701e5e92f4f43ee58e620e2ee070b_amd64",
"relates_to_product_reference": "8Base-RHACM-2.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhacm2/submariner-gateway-rhel8@sha256:825db9cddd68a762e934bc855e5836e4f16a566f59d1310f45a06dac85ab8035_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8",
"product_id": "8Base-RHACM-2.5:rhacm2/submariner-gateway-rhel8@sha256:825db9cddd68a762e934bc855e5836e4f16a566f59d1310f45a06dac85ab8035_s390x"
},
"product_reference": "rhacm2/submariner-gateway-rhel8@sha256:825db9cddd68a762e934bc855e5836e4f16a566f59d1310f45a06dac85ab8035_s390x",
"relates_to_product_reference": "8Base-RHACM-2.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhacm2/submariner-globalnet-rhel8@sha256:3b04b0be64ea639e82496102236899cc62a2521c8e8bebd07c852118e76bce88_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8",
"product_id": "8Base-RHACM-2.5:rhacm2/submariner-globalnet-rhel8@sha256:3b04b0be64ea639e82496102236899cc62a2521c8e8bebd07c852118e76bce88_amd64"
},
"product_reference": "rhacm2/submariner-globalnet-rhel8@sha256:3b04b0be64ea639e82496102236899cc62a2521c8e8bebd07c852118e76bce88_amd64",
"relates_to_product_reference": "8Base-RHACM-2.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhacm2/submariner-globalnet-rhel8@sha256:c9050e94421701df533d7bc7fb2736de3b923a1b9689f7db9285e902d1d9c173_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8",
"product_id": "8Base-RHACM-2.5:rhacm2/submariner-globalnet-rhel8@sha256:c9050e94421701df533d7bc7fb2736de3b923a1b9689f7db9285e902d1d9c173_ppc64le"
},
"product_reference": "rhacm2/submariner-globalnet-rhel8@sha256:c9050e94421701df533d7bc7fb2736de3b923a1b9689f7db9285e902d1d9c173_ppc64le",
"relates_to_product_reference": "8Base-RHACM-2.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhacm2/submariner-globalnet-rhel8@sha256:d7fdc22644e6dbf19f21130c0f635e0a6c6e11fb9cbf9d9cbd9635d17fe25fbf_arm64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8",
"product_id": "8Base-RHACM-2.5:rhacm2/submariner-globalnet-rhel8@sha256:d7fdc22644e6dbf19f21130c0f635e0a6c6e11fb9cbf9d9cbd9635d17fe25fbf_arm64"
},
"product_reference": "rhacm2/submariner-globalnet-rhel8@sha256:d7fdc22644e6dbf19f21130c0f635e0a6c6e11fb9cbf9d9cbd9635d17fe25fbf_arm64",
"relates_to_product_reference": "8Base-RHACM-2.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhacm2/submariner-globalnet-rhel8@sha256:d855b05d15a54a88e2c026e0d1935b189dc7ceddb3a7b5b0672e8e4c715f3845_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8",
"product_id": "8Base-RHACM-2.5:rhacm2/submariner-globalnet-rhel8@sha256:d855b05d15a54a88e2c026e0d1935b189dc7ceddb3a7b5b0672e8e4c715f3845_s390x"
},
"product_reference": "rhacm2/submariner-globalnet-rhel8@sha256:d855b05d15a54a88e2c026e0d1935b189dc7ceddb3a7b5b0672e8e4c715f3845_s390x",
"relates_to_product_reference": "8Base-RHACM-2.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhacm2/submariner-networkplugin-syncer-rhel8@sha256:0b72b8b294483dcf92d8acaaa56e8ac1141db3c6811ab64298117fafde99936a_arm64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8",
"product_id": "8Base-RHACM-2.5:rhacm2/submariner-networkplugin-syncer-rhel8@sha256:0b72b8b294483dcf92d8acaaa56e8ac1141db3c6811ab64298117fafde99936a_arm64"
},
"product_reference": "rhacm2/submariner-networkplugin-syncer-rhel8@sha256:0b72b8b294483dcf92d8acaaa56e8ac1141db3c6811ab64298117fafde99936a_arm64",
"relates_to_product_reference": "8Base-RHACM-2.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhacm2/submariner-networkplugin-syncer-rhel8@sha256:39ca01ef63bc7d2663186a516456c90657b918a2ec044af7aadb1315a607f429_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8",
"product_id": "8Base-RHACM-2.5:rhacm2/submariner-networkplugin-syncer-rhel8@sha256:39ca01ef63bc7d2663186a516456c90657b918a2ec044af7aadb1315a607f429_s390x"
},
"product_reference": "rhacm2/submariner-networkplugin-syncer-rhel8@sha256:39ca01ef63bc7d2663186a516456c90657b918a2ec044af7aadb1315a607f429_s390x",
"relates_to_product_reference": "8Base-RHACM-2.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhacm2/submariner-networkplugin-syncer-rhel8@sha256:5a86959a38334532e5a33ab76b0553a9eae4cfad8897d5f92457a11cb6a5374b_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8",
"product_id": "8Base-RHACM-2.5:rhacm2/submariner-networkplugin-syncer-rhel8@sha256:5a86959a38334532e5a33ab76b0553a9eae4cfad8897d5f92457a11cb6a5374b_ppc64le"
},
"product_reference": "rhacm2/submariner-networkplugin-syncer-rhel8@sha256:5a86959a38334532e5a33ab76b0553a9eae4cfad8897d5f92457a11cb6a5374b_ppc64le",
"relates_to_product_reference": "8Base-RHACM-2.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhacm2/submariner-networkplugin-syncer-rhel8@sha256:91bc8d57c88c771bda7a6703ced10e32e9999116fe8cb7e4adddb6198591eeac_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8",
"product_id": "8Base-RHACM-2.5:rhacm2/submariner-networkplugin-syncer-rhel8@sha256:91bc8d57c88c771bda7a6703ced10e32e9999116fe8cb7e4adddb6198591eeac_amd64"
},
"product_reference": "rhacm2/submariner-networkplugin-syncer-rhel8@sha256:91bc8d57c88c771bda7a6703ced10e32e9999116fe8cb7e4adddb6198591eeac_amd64",
"relates_to_product_reference": "8Base-RHACM-2.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhacm2/submariner-operator-bundle@sha256:40b62e497e8280cb4db3803ad140e9aa15f038e15b3e1218d0c506646f576aec_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8",
"product_id": "8Base-RHACM-2.5:rhacm2/submariner-operator-bundle@sha256:40b62e497e8280cb4db3803ad140e9aa15f038e15b3e1218d0c506646f576aec_ppc64le"
},
"product_reference": "rhacm2/submariner-operator-bundle@sha256:40b62e497e8280cb4db3803ad140e9aa15f038e15b3e1218d0c506646f576aec_ppc64le",
"relates_to_product_reference": "8Base-RHACM-2.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhacm2/submariner-operator-bundle@sha256:71c8912419b9a6ac3ddd911c0a2fd097170743efab7dcb1c14141e5e1defc738_arm64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8",
"product_id": "8Base-RHACM-2.5:rhacm2/submariner-operator-bundle@sha256:71c8912419b9a6ac3ddd911c0a2fd097170743efab7dcb1c14141e5e1defc738_arm64"
},
"product_reference": "rhacm2/submariner-operator-bundle@sha256:71c8912419b9a6ac3ddd911c0a2fd097170743efab7dcb1c14141e5e1defc738_arm64",
"relates_to_product_reference": "8Base-RHACM-2.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhacm2/submariner-operator-bundle@sha256:f86cb9bb9dc189057de11e2a5c3c1c10597c78e82432a34cf2864c6a32f8e6fa_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8",
"product_id": "8Base-RHACM-2.5:rhacm2/submariner-operator-bundle@sha256:f86cb9bb9dc189057de11e2a5c3c1c10597c78e82432a34cf2864c6a32f8e6fa_s390x"
},
"product_reference": "rhacm2/submariner-operator-bundle@sha256:f86cb9bb9dc189057de11e2a5c3c1c10597c78e82432a34cf2864c6a32f8e6fa_s390x",
"relates_to_product_reference": "8Base-RHACM-2.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhacm2/submariner-operator-bundle@sha256:fa2fd74dc3918d962ee6ea162e765f45b75a9588017145cd8322469456bc7164_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8",
"product_id": "8Base-RHACM-2.5:rhacm2/submariner-operator-bundle@sha256:fa2fd74dc3918d962ee6ea162e765f45b75a9588017145cd8322469456bc7164_amd64"
},
"product_reference": "rhacm2/submariner-operator-bundle@sha256:fa2fd74dc3918d962ee6ea162e765f45b75a9588017145cd8322469456bc7164_amd64",
"relates_to_product_reference": "8Base-RHACM-2.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhacm2/submariner-rhel8-operator@sha256:2aad67f470d3a58382029b4db1459916036a8f41aed167d567eb1abef45cda3f_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8",
"product_id": "8Base-RHACM-2.5:rhacm2/submariner-rhel8-operator@sha256:2aad67f470d3a58382029b4db1459916036a8f41aed167d567eb1abef45cda3f_ppc64le"
},
"product_reference": "rhacm2/submariner-rhel8-operator@sha256:2aad67f470d3a58382029b4db1459916036a8f41aed167d567eb1abef45cda3f_ppc64le",
"relates_to_product_reference": "8Base-RHACM-2.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhacm2/submariner-rhel8-operator@sha256:971eeffff35343edb6da2be6d2d3620d13536cbbaddacbbd13f285a70490df3a_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8",
"product_id": "8Base-RHACM-2.5:rhacm2/submariner-rhel8-operator@sha256:971eeffff35343edb6da2be6d2d3620d13536cbbaddacbbd13f285a70490df3a_s390x"
},
"product_reference": "rhacm2/submariner-rhel8-operator@sha256:971eeffff35343edb6da2be6d2d3620d13536cbbaddacbbd13f285a70490df3a_s390x",
"relates_to_product_reference": "8Base-RHACM-2.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhacm2/submariner-rhel8-operator@sha256:98811cc217f48bc7a6fbe7d4ccf7b1b7b239e19e24b7fcfeacbec8b297880f89_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8",
"product_id": "8Base-RHACM-2.5:rhacm2/submariner-rhel8-operator@sha256:98811cc217f48bc7a6fbe7d4ccf7b1b7b239e19e24b7fcfeacbec8b297880f89_amd64"
},
"product_reference": "rhacm2/submariner-rhel8-operator@sha256:98811cc217f48bc7a6fbe7d4ccf7b1b7b239e19e24b7fcfeacbec8b297880f89_amd64",
"relates_to_product_reference": "8Base-RHACM-2.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhacm2/submariner-rhel8-operator@sha256:dc2a4dace498a5c6238c555411362c2e6166011582a572d3cab431c745143301_arm64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8",
"product_id": "8Base-RHACM-2.5:rhacm2/submariner-rhel8-operator@sha256:dc2a4dace498a5c6238c555411362c2e6166011582a572d3cab431c745143301_arm64"
},
"product_reference": "rhacm2/submariner-rhel8-operator@sha256:dc2a4dace498a5c6238c555411362c2e6166011582a572d3cab431c745143301_arm64",
"relates_to_product_reference": "8Base-RHACM-2.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhacm2/submariner-route-agent-rhel8@sha256:0f13ca7bb60b17115395a51421916f0136a6d1296da563ba609cf37ec4e31440_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8",
"product_id": "8Base-RHACM-2.5:rhacm2/submariner-route-agent-rhel8@sha256:0f13ca7bb60b17115395a51421916f0136a6d1296da563ba609cf37ec4e31440_ppc64le"
},
"product_reference": "rhacm2/submariner-route-agent-rhel8@sha256:0f13ca7bb60b17115395a51421916f0136a6d1296da563ba609cf37ec4e31440_ppc64le",
"relates_to_product_reference": "8Base-RHACM-2.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhacm2/submariner-route-agent-rhel8@sha256:497545ae0c5ae10463c5ef4a56c0e3733efbff2da65754dce4bbb977cb80d55a_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8",
"product_id": "8Base-RHACM-2.5:rhacm2/submariner-route-agent-rhel8@sha256:497545ae0c5ae10463c5ef4a56c0e3733efbff2da65754dce4bbb977cb80d55a_s390x"
},
"product_reference": "rhacm2/submariner-route-agent-rhel8@sha256:497545ae0c5ae10463c5ef4a56c0e3733efbff2da65754dce4bbb977cb80d55a_s390x",
"relates_to_product_reference": "8Base-RHACM-2.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhacm2/submariner-route-agent-rhel8@sha256:6bff7c4285999b218937924fc75e6303525089064f21d23234a01f453529fbf6_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8",
"product_id": "8Base-RHACM-2.5:rhacm2/submariner-route-agent-rhel8@sha256:6bff7c4285999b218937924fc75e6303525089064f21d23234a01f453529fbf6_amd64"
},
"product_reference": "rhacm2/submariner-route-agent-rhel8@sha256:6bff7c4285999b218937924fc75e6303525089064f21d23234a01f453529fbf6_amd64",
"relates_to_product_reference": "8Base-RHACM-2.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhacm2/submariner-route-agent-rhel8@sha256:d0140f18ad07368201a6e34af970ac9ee402f8ac292e71c42244af85eb37db08_arm64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8",
"product_id": "8Base-RHACM-2.5:rhacm2/submariner-route-agent-rhel8@sha256:d0140f18ad07368201a6e34af970ac9ee402f8ac292e71c42244af85eb37db08_arm64"
},
"product_reference": "rhacm2/submariner-route-agent-rhel8@sha256:d0140f18ad07368201a6e34af970ac9ee402f8ac292e71c42244af85eb37db08_arm64",
"relates_to_product_reference": "8Base-RHACM-2.5"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2022-32149",
"cwe": {
"id": "CWE-407",
"name": "Inefficient Algorithmic Complexity"
},
"discovery_date": "2022-10-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2134010"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in the golang.org/x/text/language package. An attacker can craft an Accept-Language header which ParseAcceptLanguage will take significant time to parse. This issue leads to a denial of service, and can impact availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: golang.org/x/text/language: ParseAcceptLanguage takes a long time to parse complex tags",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "After careful analysis of the vulnerability Redhat is choosing to keep the vulnerability severity as moderate,the vulnerability exists in the ParseAcceptLanguage function of the golang text/language package,when an attacker could craft an unusually large accept header and due to the parser taking quadratic time complexity to finish, firstly the attacker would have to find a way smuggle an input to the parser and even then this would simply not result in a crash of any kind but more of resource hang which while can be unpleasant,does not equate to any real world damage.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-RHACM-2.5:rhacm2/lighthouse-agent-rhel8@sha256:33ac96a6dd01e698c6d037acd701ee0fc5a09bb1cdd8f761c229e6a2be9ea799_amd64",
"8Base-RHACM-2.5:rhacm2/lighthouse-agent-rhel8@sha256:6b579e761576bd97f05c1f5ba42df74db5d22d0203e9d0253efc324cb0bf6378_ppc64le",
"8Base-RHACM-2.5:rhacm2/lighthouse-agent-rhel8@sha256:998706bb956a4fdd15526b5bb6a0458d59ea5cc537e2784b6dec1bb24b6aebbd_s390x",
"8Base-RHACM-2.5:rhacm2/lighthouse-agent-rhel8@sha256:b76b9fc2f08fdedd74511526b3f049a37e8beab3dddd9c3463ea20064aadf194_arm64",
"8Base-RHACM-2.5:rhacm2/lighthouse-coredns-rhel8@sha256:4af85e8acaa3b787828a3352bbfff427c6668936c428169e5fcbd345e802fcc3_arm64",
"8Base-RHACM-2.5:rhacm2/lighthouse-coredns-rhel8@sha256:77e474f4e0be091c3772ec0c16f2a67168dfea599a1f4220deb2fcb795d2d9c7_ppc64le",
"8Base-RHACM-2.5:rhacm2/lighthouse-coredns-rhel8@sha256:dbc246166dd35202221ac3f885a0e46160a6d277a058b6d2f1c7ee571c673b50_s390x",
"8Base-RHACM-2.5:rhacm2/lighthouse-coredns-rhel8@sha256:f27e7895a859ee2ab5f36134522349c1c04f3b18284787e0d14c3380126bf402_amd64",
"8Base-RHACM-2.5:rhacm2/subctl-rhel8@sha256:47cd1ee9aff93dad2e554805836e3393a0d5fc408ffc41a3ffef4676e10ce1f9_ppc64le",
"8Base-RHACM-2.5:rhacm2/subctl-rhel8@sha256:9ab13f289008d38a7cfa2182e4a5fb3a29b0b8efa2da40916018f2449ca730c7_s390x",
"8Base-RHACM-2.5:rhacm2/subctl-rhel8@sha256:dae78580dc26a6beaaeef47575e0cc13c487d5cef1d72c415ddc19368ef3b4a5_arm64",
"8Base-RHACM-2.5:rhacm2/subctl-rhel8@sha256:e6f5f07b97d4998c122cadeee693dce4d72f3bbe2c1f9703b15621b6531cf3a4_amd64",
"8Base-RHACM-2.5:rhacm2/submariner-gateway-rhel8@sha256:2bdd80c985f13cc90a223979c7b26bd5a273504ce973ea2c24b599e1c5f1b3fc_arm64",
"8Base-RHACM-2.5:rhacm2/submariner-gateway-rhel8@sha256:522bddc7d016659157c51f7425098eb92f2b0857f921f5ef01e188af3c9056c6_ppc64le",
"8Base-RHACM-2.5:rhacm2/submariner-gateway-rhel8@sha256:7b343f4f8ea08b2e2a670ee938a2286a92d701e5e92f4f43ee58e620e2ee070b_amd64",
"8Base-RHACM-2.5:rhacm2/submariner-gateway-rhel8@sha256:825db9cddd68a762e934bc855e5836e4f16a566f59d1310f45a06dac85ab8035_s390x",
"8Base-RHACM-2.5:rhacm2/submariner-globalnet-rhel8@sha256:3b04b0be64ea639e82496102236899cc62a2521c8e8bebd07c852118e76bce88_amd64",
"8Base-RHACM-2.5:rhacm2/submariner-globalnet-rhel8@sha256:c9050e94421701df533d7bc7fb2736de3b923a1b9689f7db9285e902d1d9c173_ppc64le",
"8Base-RHACM-2.5:rhacm2/submariner-globalnet-rhel8@sha256:d7fdc22644e6dbf19f21130c0f635e0a6c6e11fb9cbf9d9cbd9635d17fe25fbf_arm64",
"8Base-RHACM-2.5:rhacm2/submariner-globalnet-rhel8@sha256:d855b05d15a54a88e2c026e0d1935b189dc7ceddb3a7b5b0672e8e4c715f3845_s390x",
"8Base-RHACM-2.5:rhacm2/submariner-networkplugin-syncer-rhel8@sha256:0b72b8b294483dcf92d8acaaa56e8ac1141db3c6811ab64298117fafde99936a_arm64",
"8Base-RHACM-2.5:rhacm2/submariner-networkplugin-syncer-rhel8@sha256:39ca01ef63bc7d2663186a516456c90657b918a2ec044af7aadb1315a607f429_s390x",
"8Base-RHACM-2.5:rhacm2/submariner-networkplugin-syncer-rhel8@sha256:5a86959a38334532e5a33ab76b0553a9eae4cfad8897d5f92457a11cb6a5374b_ppc64le",
"8Base-RHACM-2.5:rhacm2/submariner-networkplugin-syncer-rhel8@sha256:91bc8d57c88c771bda7a6703ced10e32e9999116fe8cb7e4adddb6198591eeac_amd64",
"8Base-RHACM-2.5:rhacm2/submariner-operator-bundle@sha256:40b62e497e8280cb4db3803ad140e9aa15f038e15b3e1218d0c506646f576aec_ppc64le",
"8Base-RHACM-2.5:rhacm2/submariner-operator-bundle@sha256:71c8912419b9a6ac3ddd911c0a2fd097170743efab7dcb1c14141e5e1defc738_arm64",
"8Base-RHACM-2.5:rhacm2/submariner-operator-bundle@sha256:f86cb9bb9dc189057de11e2a5c3c1c10597c78e82432a34cf2864c6a32f8e6fa_s390x",
"8Base-RHACM-2.5:rhacm2/submariner-operator-bundle@sha256:fa2fd74dc3918d962ee6ea162e765f45b75a9588017145cd8322469456bc7164_amd64",
"8Base-RHACM-2.5:rhacm2/submariner-rhel8-operator@sha256:2aad67f470d3a58382029b4db1459916036a8f41aed167d567eb1abef45cda3f_ppc64le",
"8Base-RHACM-2.5:rhacm2/submariner-rhel8-operator@sha256:971eeffff35343edb6da2be6d2d3620d13536cbbaddacbbd13f285a70490df3a_s390x",
"8Base-RHACM-2.5:rhacm2/submariner-rhel8-operator@sha256:98811cc217f48bc7a6fbe7d4ccf7b1b7b239e19e24b7fcfeacbec8b297880f89_amd64",
"8Base-RHACM-2.5:rhacm2/submariner-rhel8-operator@sha256:dc2a4dace498a5c6238c555411362c2e6166011582a572d3cab431c745143301_arm64",
"8Base-RHACM-2.5:rhacm2/submariner-route-agent-rhel8@sha256:0f13ca7bb60b17115395a51421916f0136a6d1296da563ba609cf37ec4e31440_ppc64le",
"8Base-RHACM-2.5:rhacm2/submariner-route-agent-rhel8@sha256:497545ae0c5ae10463c5ef4a56c0e3733efbff2da65754dce4bbb977cb80d55a_s390x",
"8Base-RHACM-2.5:rhacm2/submariner-route-agent-rhel8@sha256:6bff7c4285999b218937924fc75e6303525089064f21d23234a01f453529fbf6_amd64",
"8Base-RHACM-2.5:rhacm2/submariner-route-agent-rhel8@sha256:d0140f18ad07368201a6e34af970ac9ee402f8ac292e71c42244af85eb37db08_arm64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-32149"
},
{
"category": "external",
"summary": "RHBZ#2134010",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2134010"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-32149",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32149"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-32149",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-32149"
},
{
"category": "external",
"summary": "https://go.dev/issue/56152",
"url": "https://go.dev/issue/56152"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-dev/c/qfPIly0X7aU",
"url": "https://groups.google.com/g/golang-dev/c/qfPIly0X7aU"
}
],
"release_date": "2022-10-11T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-01-26T21:22:22+00:00",
"details": "For details on how to install Submariner, refer to:\n\nhttps://access.redhat.com/documentation/en-us/red_hat_advanced_cluster_management_for_kubernetes/2.5/html/add-ons/add-ons-overview#submariner-deploy-console \n\nand\n\nhttps://submariner.io/getting-started/",
"product_ids": [
"8Base-RHACM-2.5:rhacm2/lighthouse-agent-rhel8@sha256:33ac96a6dd01e698c6d037acd701ee0fc5a09bb1cdd8f761c229e6a2be9ea799_amd64",
"8Base-RHACM-2.5:rhacm2/lighthouse-agent-rhel8@sha256:6b579e761576bd97f05c1f5ba42df74db5d22d0203e9d0253efc324cb0bf6378_ppc64le",
"8Base-RHACM-2.5:rhacm2/lighthouse-agent-rhel8@sha256:998706bb956a4fdd15526b5bb6a0458d59ea5cc537e2784b6dec1bb24b6aebbd_s390x",
"8Base-RHACM-2.5:rhacm2/lighthouse-agent-rhel8@sha256:b76b9fc2f08fdedd74511526b3f049a37e8beab3dddd9c3463ea20064aadf194_arm64",
"8Base-RHACM-2.5:rhacm2/lighthouse-coredns-rhel8@sha256:4af85e8acaa3b787828a3352bbfff427c6668936c428169e5fcbd345e802fcc3_arm64",
"8Base-RHACM-2.5:rhacm2/lighthouse-coredns-rhel8@sha256:77e474f4e0be091c3772ec0c16f2a67168dfea599a1f4220deb2fcb795d2d9c7_ppc64le",
"8Base-RHACM-2.5:rhacm2/lighthouse-coredns-rhel8@sha256:dbc246166dd35202221ac3f885a0e46160a6d277a058b6d2f1c7ee571c673b50_s390x",
"8Base-RHACM-2.5:rhacm2/lighthouse-coredns-rhel8@sha256:f27e7895a859ee2ab5f36134522349c1c04f3b18284787e0d14c3380126bf402_amd64",
"8Base-RHACM-2.5:rhacm2/subctl-rhel8@sha256:47cd1ee9aff93dad2e554805836e3393a0d5fc408ffc41a3ffef4676e10ce1f9_ppc64le",
"8Base-RHACM-2.5:rhacm2/subctl-rhel8@sha256:9ab13f289008d38a7cfa2182e4a5fb3a29b0b8efa2da40916018f2449ca730c7_s390x",
"8Base-RHACM-2.5:rhacm2/subctl-rhel8@sha256:dae78580dc26a6beaaeef47575e0cc13c487d5cef1d72c415ddc19368ef3b4a5_arm64",
"8Base-RHACM-2.5:rhacm2/subctl-rhel8@sha256:e6f5f07b97d4998c122cadeee693dce4d72f3bbe2c1f9703b15621b6531cf3a4_amd64",
"8Base-RHACM-2.5:rhacm2/submariner-gateway-rhel8@sha256:2bdd80c985f13cc90a223979c7b26bd5a273504ce973ea2c24b599e1c5f1b3fc_arm64",
"8Base-RHACM-2.5:rhacm2/submariner-gateway-rhel8@sha256:522bddc7d016659157c51f7425098eb92f2b0857f921f5ef01e188af3c9056c6_ppc64le",
"8Base-RHACM-2.5:rhacm2/submariner-gateway-rhel8@sha256:7b343f4f8ea08b2e2a670ee938a2286a92d701e5e92f4f43ee58e620e2ee070b_amd64",
"8Base-RHACM-2.5:rhacm2/submariner-gateway-rhel8@sha256:825db9cddd68a762e934bc855e5836e4f16a566f59d1310f45a06dac85ab8035_s390x",
"8Base-RHACM-2.5:rhacm2/submariner-globalnet-rhel8@sha256:3b04b0be64ea639e82496102236899cc62a2521c8e8bebd07c852118e76bce88_amd64",
"8Base-RHACM-2.5:rhacm2/submariner-globalnet-rhel8@sha256:c9050e94421701df533d7bc7fb2736de3b923a1b9689f7db9285e902d1d9c173_ppc64le",
"8Base-RHACM-2.5:rhacm2/submariner-globalnet-rhel8@sha256:d7fdc22644e6dbf19f21130c0f635e0a6c6e11fb9cbf9d9cbd9635d17fe25fbf_arm64",
"8Base-RHACM-2.5:rhacm2/submariner-globalnet-rhel8@sha256:d855b05d15a54a88e2c026e0d1935b189dc7ceddb3a7b5b0672e8e4c715f3845_s390x",
"8Base-RHACM-2.5:rhacm2/submariner-networkplugin-syncer-rhel8@sha256:0b72b8b294483dcf92d8acaaa56e8ac1141db3c6811ab64298117fafde99936a_arm64",
"8Base-RHACM-2.5:rhacm2/submariner-networkplugin-syncer-rhel8@sha256:39ca01ef63bc7d2663186a516456c90657b918a2ec044af7aadb1315a607f429_s390x",
"8Base-RHACM-2.5:rhacm2/submariner-networkplugin-syncer-rhel8@sha256:5a86959a38334532e5a33ab76b0553a9eae4cfad8897d5f92457a11cb6a5374b_ppc64le",
"8Base-RHACM-2.5:rhacm2/submariner-networkplugin-syncer-rhel8@sha256:91bc8d57c88c771bda7a6703ced10e32e9999116fe8cb7e4adddb6198591eeac_amd64",
"8Base-RHACM-2.5:rhacm2/submariner-operator-bundle@sha256:40b62e497e8280cb4db3803ad140e9aa15f038e15b3e1218d0c506646f576aec_ppc64le",
"8Base-RHACM-2.5:rhacm2/submariner-operator-bundle@sha256:71c8912419b9a6ac3ddd911c0a2fd097170743efab7dcb1c14141e5e1defc738_arm64",
"8Base-RHACM-2.5:rhacm2/submariner-operator-bundle@sha256:f86cb9bb9dc189057de11e2a5c3c1c10597c78e82432a34cf2864c6a32f8e6fa_s390x",
"8Base-RHACM-2.5:rhacm2/submariner-operator-bundle@sha256:fa2fd74dc3918d962ee6ea162e765f45b75a9588017145cd8322469456bc7164_amd64",
"8Base-RHACM-2.5:rhacm2/submariner-rhel8-operator@sha256:2aad67f470d3a58382029b4db1459916036a8f41aed167d567eb1abef45cda3f_ppc64le",
"8Base-RHACM-2.5:rhacm2/submariner-rhel8-operator@sha256:971eeffff35343edb6da2be6d2d3620d13536cbbaddacbbd13f285a70490df3a_s390x",
"8Base-RHACM-2.5:rhacm2/submariner-rhel8-operator@sha256:98811cc217f48bc7a6fbe7d4ccf7b1b7b239e19e24b7fcfeacbec8b297880f89_amd64",
"8Base-RHACM-2.5:rhacm2/submariner-rhel8-operator@sha256:dc2a4dace498a5c6238c555411362c2e6166011582a572d3cab431c745143301_arm64",
"8Base-RHACM-2.5:rhacm2/submariner-route-agent-rhel8@sha256:0f13ca7bb60b17115395a51421916f0136a6d1296da563ba609cf37ec4e31440_ppc64le",
"8Base-RHACM-2.5:rhacm2/submariner-route-agent-rhel8@sha256:497545ae0c5ae10463c5ef4a56c0e3733efbff2da65754dce4bbb977cb80d55a_s390x",
"8Base-RHACM-2.5:rhacm2/submariner-route-agent-rhel8@sha256:6bff7c4285999b218937924fc75e6303525089064f21d23234a01f453529fbf6_amd64",
"8Base-RHACM-2.5:rhacm2/submariner-route-agent-rhel8@sha256:d0140f18ad07368201a6e34af970ac9ee402f8ac292e71c42244af85eb37db08_arm64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:0481"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"8Base-RHACM-2.5:rhacm2/lighthouse-agent-rhel8@sha256:33ac96a6dd01e698c6d037acd701ee0fc5a09bb1cdd8f761c229e6a2be9ea799_amd64",
"8Base-RHACM-2.5:rhacm2/lighthouse-agent-rhel8@sha256:6b579e761576bd97f05c1f5ba42df74db5d22d0203e9d0253efc324cb0bf6378_ppc64le",
"8Base-RHACM-2.5:rhacm2/lighthouse-agent-rhel8@sha256:998706bb956a4fdd15526b5bb6a0458d59ea5cc537e2784b6dec1bb24b6aebbd_s390x",
"8Base-RHACM-2.5:rhacm2/lighthouse-agent-rhel8@sha256:b76b9fc2f08fdedd74511526b3f049a37e8beab3dddd9c3463ea20064aadf194_arm64",
"8Base-RHACM-2.5:rhacm2/lighthouse-coredns-rhel8@sha256:4af85e8acaa3b787828a3352bbfff427c6668936c428169e5fcbd345e802fcc3_arm64",
"8Base-RHACM-2.5:rhacm2/lighthouse-coredns-rhel8@sha256:77e474f4e0be091c3772ec0c16f2a67168dfea599a1f4220deb2fcb795d2d9c7_ppc64le",
"8Base-RHACM-2.5:rhacm2/lighthouse-coredns-rhel8@sha256:dbc246166dd35202221ac3f885a0e46160a6d277a058b6d2f1c7ee571c673b50_s390x",
"8Base-RHACM-2.5:rhacm2/lighthouse-coredns-rhel8@sha256:f27e7895a859ee2ab5f36134522349c1c04f3b18284787e0d14c3380126bf402_amd64",
"8Base-RHACM-2.5:rhacm2/subctl-rhel8@sha256:47cd1ee9aff93dad2e554805836e3393a0d5fc408ffc41a3ffef4676e10ce1f9_ppc64le",
"8Base-RHACM-2.5:rhacm2/subctl-rhel8@sha256:9ab13f289008d38a7cfa2182e4a5fb3a29b0b8efa2da40916018f2449ca730c7_s390x",
"8Base-RHACM-2.5:rhacm2/subctl-rhel8@sha256:dae78580dc26a6beaaeef47575e0cc13c487d5cef1d72c415ddc19368ef3b4a5_arm64",
"8Base-RHACM-2.5:rhacm2/subctl-rhel8@sha256:e6f5f07b97d4998c122cadeee693dce4d72f3bbe2c1f9703b15621b6531cf3a4_amd64",
"8Base-RHACM-2.5:rhacm2/submariner-gateway-rhel8@sha256:2bdd80c985f13cc90a223979c7b26bd5a273504ce973ea2c24b599e1c5f1b3fc_arm64",
"8Base-RHACM-2.5:rhacm2/submariner-gateway-rhel8@sha256:522bddc7d016659157c51f7425098eb92f2b0857f921f5ef01e188af3c9056c6_ppc64le",
"8Base-RHACM-2.5:rhacm2/submariner-gateway-rhel8@sha256:7b343f4f8ea08b2e2a670ee938a2286a92d701e5e92f4f43ee58e620e2ee070b_amd64",
"8Base-RHACM-2.5:rhacm2/submariner-gateway-rhel8@sha256:825db9cddd68a762e934bc855e5836e4f16a566f59d1310f45a06dac85ab8035_s390x",
"8Base-RHACM-2.5:rhacm2/submariner-globalnet-rhel8@sha256:3b04b0be64ea639e82496102236899cc62a2521c8e8bebd07c852118e76bce88_amd64",
"8Base-RHACM-2.5:rhacm2/submariner-globalnet-rhel8@sha256:c9050e94421701df533d7bc7fb2736de3b923a1b9689f7db9285e902d1d9c173_ppc64le",
"8Base-RHACM-2.5:rhacm2/submariner-globalnet-rhel8@sha256:d7fdc22644e6dbf19f21130c0f635e0a6c6e11fb9cbf9d9cbd9635d17fe25fbf_arm64",
"8Base-RHACM-2.5:rhacm2/submariner-globalnet-rhel8@sha256:d855b05d15a54a88e2c026e0d1935b189dc7ceddb3a7b5b0672e8e4c715f3845_s390x",
"8Base-RHACM-2.5:rhacm2/submariner-networkplugin-syncer-rhel8@sha256:0b72b8b294483dcf92d8acaaa56e8ac1141db3c6811ab64298117fafde99936a_arm64",
"8Base-RHACM-2.5:rhacm2/submariner-networkplugin-syncer-rhel8@sha256:39ca01ef63bc7d2663186a516456c90657b918a2ec044af7aadb1315a607f429_s390x",
"8Base-RHACM-2.5:rhacm2/submariner-networkplugin-syncer-rhel8@sha256:5a86959a38334532e5a33ab76b0553a9eae4cfad8897d5f92457a11cb6a5374b_ppc64le",
"8Base-RHACM-2.5:rhacm2/submariner-networkplugin-syncer-rhel8@sha256:91bc8d57c88c771bda7a6703ced10e32e9999116fe8cb7e4adddb6198591eeac_amd64",
"8Base-RHACM-2.5:rhacm2/submariner-operator-bundle@sha256:40b62e497e8280cb4db3803ad140e9aa15f038e15b3e1218d0c506646f576aec_ppc64le",
"8Base-RHACM-2.5:rhacm2/submariner-operator-bundle@sha256:71c8912419b9a6ac3ddd911c0a2fd097170743efab7dcb1c14141e5e1defc738_arm64",
"8Base-RHACM-2.5:rhacm2/submariner-operator-bundle@sha256:f86cb9bb9dc189057de11e2a5c3c1c10597c78e82432a34cf2864c6a32f8e6fa_s390x",
"8Base-RHACM-2.5:rhacm2/submariner-operator-bundle@sha256:fa2fd74dc3918d962ee6ea162e765f45b75a9588017145cd8322469456bc7164_amd64",
"8Base-RHACM-2.5:rhacm2/submariner-rhel8-operator@sha256:2aad67f470d3a58382029b4db1459916036a8f41aed167d567eb1abef45cda3f_ppc64le",
"8Base-RHACM-2.5:rhacm2/submariner-rhel8-operator@sha256:971eeffff35343edb6da2be6d2d3620d13536cbbaddacbbd13f285a70490df3a_s390x",
"8Base-RHACM-2.5:rhacm2/submariner-rhel8-operator@sha256:98811cc217f48bc7a6fbe7d4ccf7b1b7b239e19e24b7fcfeacbec8b297880f89_amd64",
"8Base-RHACM-2.5:rhacm2/submariner-rhel8-operator@sha256:dc2a4dace498a5c6238c555411362c2e6166011582a572d3cab431c745143301_arm64",
"8Base-RHACM-2.5:rhacm2/submariner-route-agent-rhel8@sha256:0f13ca7bb60b17115395a51421916f0136a6d1296da563ba609cf37ec4e31440_ppc64le",
"8Base-RHACM-2.5:rhacm2/submariner-route-agent-rhel8@sha256:497545ae0c5ae10463c5ef4a56c0e3733efbff2da65754dce4bbb977cb80d55a_s390x",
"8Base-RHACM-2.5:rhacm2/submariner-route-agent-rhel8@sha256:6bff7c4285999b218937924fc75e6303525089064f21d23234a01f453529fbf6_amd64",
"8Base-RHACM-2.5:rhacm2/submariner-route-agent-rhel8@sha256:d0140f18ad07368201a6e34af970ac9ee402f8ac292e71c42244af85eb37db08_arm64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "golang: golang.org/x/text/language: ParseAcceptLanguage takes a long time to parse complex tags"
}
]
}
rhsa-2022_6882
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update is now available for OpenShift Logging 5.3.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Openshift Logging 5.3.13 security and bug fix release\n\nSecurity Fix(es):\n\n* golang: golang.org/x/text/language: ParseAcceptLanguage takes a long time to parse complex tags (CVE-2022-32149)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2022:6882",
"url": "https://access.redhat.com/errata/RHSA-2022:6882"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#moderate",
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "2134010",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2134010"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2022/rhsa-2022_6882.json"
}
],
"title": "Red Hat Security Advisory: Openshift Logging 5.3.13 security and bug fix release",
"tracking": {
"current_release_date": "2025-01-06T19:22:04+00:00",
"generator": {
"date": "2025-01-06T19:22:04+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.5"
}
},
"id": "RHSA-2022:6882",
"initial_release_date": "2022-11-09T16:43:13+00:00",
"revision_history": [
{
"date": "2022-11-09T16:43:13+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2022-11-09T16:43:13+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-01-06T19:22:04+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "OpenShift Logging 5.3",
"product": {
"name": "OpenShift Logging 5.3",
"product_id": "8Base-OSE-LOGGING-5.3",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:logging:5.3::el8"
}
}
}
],
"category": "product_family",
"name": "Red Hat OpenShift Enterprise"
},
{
"branches": [
{
"category": "product_version",
"name": "openshift-logging/cluster-logging-rhel8-operator@sha256:e785074e66edd55f68d4971cb42bcc9612c9b2713593555162d82b9218368023_s390x",
"product": {
"name": "openshift-logging/cluster-logging-rhel8-operator@sha256:e785074e66edd55f68d4971cb42bcc9612c9b2713593555162d82b9218368023_s390x",
"product_id": "openshift-logging/cluster-logging-rhel8-operator@sha256:e785074e66edd55f68d4971cb42bcc9612c9b2713593555162d82b9218368023_s390x",
"product_identification_helper": {
"purl": "pkg:oci/cluster-logging-rhel8-operator@sha256:e785074e66edd55f68d4971cb42bcc9612c9b2713593555162d82b9218368023?arch=s390x\u0026repository_url=registry.redhat.io/openshift-logging/cluster-logging-rhel8-operator\u0026tag=v5.3.13-9"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/elasticsearch-rhel8-operator@sha256:34de2b2acd8ee51055a51659b5a9e8331ebdd1512be34969e60e412269b4d494_s390x",
"product": {
"name": "openshift-logging/elasticsearch-rhel8-operator@sha256:34de2b2acd8ee51055a51659b5a9e8331ebdd1512be34969e60e412269b4d494_s390x",
"product_id": "openshift-logging/elasticsearch-rhel8-operator@sha256:34de2b2acd8ee51055a51659b5a9e8331ebdd1512be34969e60e412269b4d494_s390x",
"product_identification_helper": {
"purl": "pkg:oci/elasticsearch-rhel8-operator@sha256:34de2b2acd8ee51055a51659b5a9e8331ebdd1512be34969e60e412269b4d494?arch=s390x\u0026repository_url=registry.redhat.io/openshift-logging/elasticsearch-rhel8-operator\u0026tag=v5.3.13-5"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/elasticsearch-proxy-rhel8@sha256:cea0810e580ab422b8f54ae0f095f1ef4346cfef81873b5999a66cdc2687165a_s390x",
"product": {
"name": "openshift-logging/elasticsearch-proxy-rhel8@sha256:cea0810e580ab422b8f54ae0f095f1ef4346cfef81873b5999a66cdc2687165a_s390x",
"product_id": "openshift-logging/elasticsearch-proxy-rhel8@sha256:cea0810e580ab422b8f54ae0f095f1ef4346cfef81873b5999a66cdc2687165a_s390x",
"product_identification_helper": {
"purl": "pkg:oci/elasticsearch-proxy-rhel8@sha256:cea0810e580ab422b8f54ae0f095f1ef4346cfef81873b5999a66cdc2687165a?arch=s390x\u0026repository_url=registry.redhat.io/openshift-logging/elasticsearch-proxy-rhel8\u0026tag=v1.0.0-302"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/log-file-metric-exporter-rhel8@sha256:db3841437512ac4716465336e1a520a6a702433b169e955ba04cdc41d6fa4eea_s390x",
"product": {
"name": "openshift-logging/log-file-metric-exporter-rhel8@sha256:db3841437512ac4716465336e1a520a6a702433b169e955ba04cdc41d6fa4eea_s390x",
"product_id": "openshift-logging/log-file-metric-exporter-rhel8@sha256:db3841437512ac4716465336e1a520a6a702433b169e955ba04cdc41d6fa4eea_s390x",
"product_identification_helper": {
"purl": "pkg:oci/log-file-metric-exporter-rhel8@sha256:db3841437512ac4716465336e1a520a6a702433b169e955ba04cdc41d6fa4eea?arch=s390x\u0026repository_url=registry.redhat.io/openshift-logging/log-file-metric-exporter-rhel8\u0026tag=v1.0.0-164"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/logging-curator5-rhel8@sha256:f7fa0d3ea11001123fa1f59b2ae1edb230fb96157b19ec230d876793b4ed1554_s390x",
"product": {
"name": "openshift-logging/logging-curator5-rhel8@sha256:f7fa0d3ea11001123fa1f59b2ae1edb230fb96157b19ec230d876793b4ed1554_s390x",
"product_id": "openshift-logging/logging-curator5-rhel8@sha256:f7fa0d3ea11001123fa1f59b2ae1edb230fb96157b19ec230d876793b4ed1554_s390x",
"product_identification_helper": {
"purl": "pkg:oci/logging-curator5-rhel8@sha256:f7fa0d3ea11001123fa1f59b2ae1edb230fb96157b19ec230d876793b4ed1554?arch=s390x\u0026repository_url=registry.redhat.io/openshift-logging/logging-curator5-rhel8\u0026tag=v5.8.1-242"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/elasticsearch6-rhel8@sha256:211271d2e88eaf7f0930dbf2badf78dbe051ae14b68e67073b1b1b992fa9ea6e_s390x",
"product": {
"name": "openshift-logging/elasticsearch6-rhel8@sha256:211271d2e88eaf7f0930dbf2badf78dbe051ae14b68e67073b1b1b992fa9ea6e_s390x",
"product_id": "openshift-logging/elasticsearch6-rhel8@sha256:211271d2e88eaf7f0930dbf2badf78dbe051ae14b68e67073b1b1b992fa9ea6e_s390x",
"product_identification_helper": {
"purl": "pkg:oci/elasticsearch6-rhel8@sha256:211271d2e88eaf7f0930dbf2badf78dbe051ae14b68e67073b1b1b992fa9ea6e?arch=s390x\u0026repository_url=registry.redhat.io/openshift-logging/elasticsearch6-rhel8\u0026tag=v6.8.1-261"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/fluentd-rhel8@sha256:b712b4568533eccc3e67894c69a27f024a710c0a0759cb04a799077bc21ad7b0_s390x",
"product": {
"name": "openshift-logging/fluentd-rhel8@sha256:b712b4568533eccc3e67894c69a27f024a710c0a0759cb04a799077bc21ad7b0_s390x",
"product_id": "openshift-logging/fluentd-rhel8@sha256:b712b4568533eccc3e67894c69a27f024a710c0a0759cb04a799077bc21ad7b0_s390x",
"product_identification_helper": {
"purl": "pkg:oci/fluentd-rhel8@sha256:b712b4568533eccc3e67894c69a27f024a710c0a0759cb04a799077bc21ad7b0?arch=s390x\u0026repository_url=registry.redhat.io/openshift-logging/fluentd-rhel8\u0026tag=v1.7.4-217"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/kibana6-rhel8@sha256:a3c5a69dba9fafdbbe21b7eaf0792a8d0d7dbc108977dde72bce3af4ba709a01_s390x",
"product": {
"name": "openshift-logging/kibana6-rhel8@sha256:a3c5a69dba9fafdbbe21b7eaf0792a8d0d7dbc108977dde72bce3af4ba709a01_s390x",
"product_id": "openshift-logging/kibana6-rhel8@sha256:a3c5a69dba9fafdbbe21b7eaf0792a8d0d7dbc108977dde72bce3af4ba709a01_s390x",
"product_identification_helper": {
"purl": "pkg:oci/kibana6-rhel8@sha256:a3c5a69dba9fafdbbe21b7eaf0792a8d0d7dbc108977dde72bce3af4ba709a01?arch=s390x\u0026repository_url=registry.redhat.io/openshift-logging/kibana6-rhel8\u0026tag=v6.8.1-298"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "openshift-logging/cluster-logging-rhel8-operator@sha256:d05f697c6da62036fcbba633a4cb6d253fdd6882c9205ad9a7cb9710878402a0_amd64",
"product": {
"name": "openshift-logging/cluster-logging-rhel8-operator@sha256:d05f697c6da62036fcbba633a4cb6d253fdd6882c9205ad9a7cb9710878402a0_amd64",
"product_id": "openshift-logging/cluster-logging-rhel8-operator@sha256:d05f697c6da62036fcbba633a4cb6d253fdd6882c9205ad9a7cb9710878402a0_amd64",
"product_identification_helper": {
"purl": "pkg:oci/cluster-logging-rhel8-operator@sha256:d05f697c6da62036fcbba633a4cb6d253fdd6882c9205ad9a7cb9710878402a0?arch=amd64\u0026repository_url=registry.redhat.io/openshift-logging/cluster-logging-rhel8-operator\u0026tag=v5.3.13-9"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/cluster-logging-operator-bundle@sha256:b78456120cab1aac6044a6953e4dfd899f3c7d6b58a0e5cd8f166e4bffb5d941_amd64",
"product": {
"name": "openshift-logging/cluster-logging-operator-bundle@sha256:b78456120cab1aac6044a6953e4dfd899f3c7d6b58a0e5cd8f166e4bffb5d941_amd64",
"product_id": "openshift-logging/cluster-logging-operator-bundle@sha256:b78456120cab1aac6044a6953e4dfd899f3c7d6b58a0e5cd8f166e4bffb5d941_amd64",
"product_identification_helper": {
"purl": "pkg:oci/cluster-logging-operator-bundle@sha256:b78456120cab1aac6044a6953e4dfd899f3c7d6b58a0e5cd8f166e4bffb5d941?arch=amd64\u0026repository_url=registry.redhat.io/openshift-logging/cluster-logging-operator-bundle\u0026tag=v5.3.13-10"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/elasticsearch-rhel8-operator@sha256:a57abda6ba1cde99d47f6ea7a63e17a258f1f9ea73ca8bceadad7541477e7b81_amd64",
"product": {
"name": "openshift-logging/elasticsearch-rhel8-operator@sha256:a57abda6ba1cde99d47f6ea7a63e17a258f1f9ea73ca8bceadad7541477e7b81_amd64",
"product_id": "openshift-logging/elasticsearch-rhel8-operator@sha256:a57abda6ba1cde99d47f6ea7a63e17a258f1f9ea73ca8bceadad7541477e7b81_amd64",
"product_identification_helper": {
"purl": "pkg:oci/elasticsearch-rhel8-operator@sha256:a57abda6ba1cde99d47f6ea7a63e17a258f1f9ea73ca8bceadad7541477e7b81?arch=amd64\u0026repository_url=registry.redhat.io/openshift-logging/elasticsearch-rhel8-operator\u0026tag=v5.3.13-5"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/elasticsearch-operator-bundle@sha256:c5218abf99c5401fbcec34c93f99805e109d889b27c28719f0ce75a952015f17_amd64",
"product": {
"name": "openshift-logging/elasticsearch-operator-bundle@sha256:c5218abf99c5401fbcec34c93f99805e109d889b27c28719f0ce75a952015f17_amd64",
"product_id": "openshift-logging/elasticsearch-operator-bundle@sha256:c5218abf99c5401fbcec34c93f99805e109d889b27c28719f0ce75a952015f17_amd64",
"product_identification_helper": {
"purl": "pkg:oci/elasticsearch-operator-bundle@sha256:c5218abf99c5401fbcec34c93f99805e109d889b27c28719f0ce75a952015f17?arch=amd64\u0026repository_url=registry.redhat.io/openshift-logging/elasticsearch-operator-bundle\u0026tag=v5.3.13-24"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/elasticsearch-proxy-rhel8@sha256:2eb93d134ac01322408a31538fa14f3d29b77568ad20f71e2bc2303eca957c05_amd64",
"product": {
"name": "openshift-logging/elasticsearch-proxy-rhel8@sha256:2eb93d134ac01322408a31538fa14f3d29b77568ad20f71e2bc2303eca957c05_amd64",
"product_id": "openshift-logging/elasticsearch-proxy-rhel8@sha256:2eb93d134ac01322408a31538fa14f3d29b77568ad20f71e2bc2303eca957c05_amd64",
"product_identification_helper": {
"purl": "pkg:oci/elasticsearch-proxy-rhel8@sha256:2eb93d134ac01322408a31538fa14f3d29b77568ad20f71e2bc2303eca957c05?arch=amd64\u0026repository_url=registry.redhat.io/openshift-logging/elasticsearch-proxy-rhel8\u0026tag=v1.0.0-302"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/log-file-metric-exporter-rhel8@sha256:45a595d11960d01f153dfe7ff6f8336aa1ccf09c044d7e26763ae348c8dc1181_amd64",
"product": {
"name": "openshift-logging/log-file-metric-exporter-rhel8@sha256:45a595d11960d01f153dfe7ff6f8336aa1ccf09c044d7e26763ae348c8dc1181_amd64",
"product_id": "openshift-logging/log-file-metric-exporter-rhel8@sha256:45a595d11960d01f153dfe7ff6f8336aa1ccf09c044d7e26763ae348c8dc1181_amd64",
"product_identification_helper": {
"purl": "pkg:oci/log-file-metric-exporter-rhel8@sha256:45a595d11960d01f153dfe7ff6f8336aa1ccf09c044d7e26763ae348c8dc1181?arch=amd64\u0026repository_url=registry.redhat.io/openshift-logging/log-file-metric-exporter-rhel8\u0026tag=v1.0.0-164"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/logging-curator5-rhel8@sha256:e8297522f54b2649a08e10dd5a2ff7d01e6012e87cc82de876be7a2ace292011_amd64",
"product": {
"name": "openshift-logging/logging-curator5-rhel8@sha256:e8297522f54b2649a08e10dd5a2ff7d01e6012e87cc82de876be7a2ace292011_amd64",
"product_id": "openshift-logging/logging-curator5-rhel8@sha256:e8297522f54b2649a08e10dd5a2ff7d01e6012e87cc82de876be7a2ace292011_amd64",
"product_identification_helper": {
"purl": "pkg:oci/logging-curator5-rhel8@sha256:e8297522f54b2649a08e10dd5a2ff7d01e6012e87cc82de876be7a2ace292011?arch=amd64\u0026repository_url=registry.redhat.io/openshift-logging/logging-curator5-rhel8\u0026tag=v5.8.1-242"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/elasticsearch6-rhel8@sha256:96fa422c95c3aa328015bfa158f22885653191eb418718fbc416b9de1fed0a0c_amd64",
"product": {
"name": "openshift-logging/elasticsearch6-rhel8@sha256:96fa422c95c3aa328015bfa158f22885653191eb418718fbc416b9de1fed0a0c_amd64",
"product_id": "openshift-logging/elasticsearch6-rhel8@sha256:96fa422c95c3aa328015bfa158f22885653191eb418718fbc416b9de1fed0a0c_amd64",
"product_identification_helper": {
"purl": "pkg:oci/elasticsearch6-rhel8@sha256:96fa422c95c3aa328015bfa158f22885653191eb418718fbc416b9de1fed0a0c?arch=amd64\u0026repository_url=registry.redhat.io/openshift-logging/elasticsearch6-rhel8\u0026tag=v6.8.1-261"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/fluentd-rhel8@sha256:e7fbe0c13c6fd405701b13af609008e8c954c489ab567aeae27f035835c327e8_amd64",
"product": {
"name": "openshift-logging/fluentd-rhel8@sha256:e7fbe0c13c6fd405701b13af609008e8c954c489ab567aeae27f035835c327e8_amd64",
"product_id": "openshift-logging/fluentd-rhel8@sha256:e7fbe0c13c6fd405701b13af609008e8c954c489ab567aeae27f035835c327e8_amd64",
"product_identification_helper": {
"purl": "pkg:oci/fluentd-rhel8@sha256:e7fbe0c13c6fd405701b13af609008e8c954c489ab567aeae27f035835c327e8?arch=amd64\u0026repository_url=registry.redhat.io/openshift-logging/fluentd-rhel8\u0026tag=v1.7.4-217"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/kibana6-rhel8@sha256:8b3b9895d498036e7fb7451f52757ce8f3832d711254ed6649e97fe06d16195a_amd64",
"product": {
"name": "openshift-logging/kibana6-rhel8@sha256:8b3b9895d498036e7fb7451f52757ce8f3832d711254ed6649e97fe06d16195a_amd64",
"product_id": "openshift-logging/kibana6-rhel8@sha256:8b3b9895d498036e7fb7451f52757ce8f3832d711254ed6649e97fe06d16195a_amd64",
"product_identification_helper": {
"purl": "pkg:oci/kibana6-rhel8@sha256:8b3b9895d498036e7fb7451f52757ce8f3832d711254ed6649e97fe06d16195a?arch=amd64\u0026repository_url=registry.redhat.io/openshift-logging/kibana6-rhel8\u0026tag=v6.8.1-298"
}
}
}
],
"category": "architecture",
"name": "amd64"
},
{
"branches": [
{
"category": "product_version",
"name": "openshift-logging/cluster-logging-rhel8-operator@sha256:29aab5ce5c349a6370de9dec73e1c27dba1f8ee7a82e7da7cd3957839743c1d8_ppc64le",
"product": {
"name": "openshift-logging/cluster-logging-rhel8-operator@sha256:29aab5ce5c349a6370de9dec73e1c27dba1f8ee7a82e7da7cd3957839743c1d8_ppc64le",
"product_id": "openshift-logging/cluster-logging-rhel8-operator@sha256:29aab5ce5c349a6370de9dec73e1c27dba1f8ee7a82e7da7cd3957839743c1d8_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/cluster-logging-rhel8-operator@sha256:29aab5ce5c349a6370de9dec73e1c27dba1f8ee7a82e7da7cd3957839743c1d8?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-logging/cluster-logging-rhel8-operator\u0026tag=v5.3.13-9"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/elasticsearch-rhel8-operator@sha256:819e2985a882f2ddb34a137b0886d13ed764dac5b976fc4b450ba23cbc09597a_ppc64le",
"product": {
"name": "openshift-logging/elasticsearch-rhel8-operator@sha256:819e2985a882f2ddb34a137b0886d13ed764dac5b976fc4b450ba23cbc09597a_ppc64le",
"product_id": "openshift-logging/elasticsearch-rhel8-operator@sha256:819e2985a882f2ddb34a137b0886d13ed764dac5b976fc4b450ba23cbc09597a_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/elasticsearch-rhel8-operator@sha256:819e2985a882f2ddb34a137b0886d13ed764dac5b976fc4b450ba23cbc09597a?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-logging/elasticsearch-rhel8-operator\u0026tag=v5.3.13-5"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/elasticsearch-proxy-rhel8@sha256:6a0c8026b1fbc39d1a012f963eed016f3df99745235a256898cc3f92b5c913f3_ppc64le",
"product": {
"name": "openshift-logging/elasticsearch-proxy-rhel8@sha256:6a0c8026b1fbc39d1a012f963eed016f3df99745235a256898cc3f92b5c913f3_ppc64le",
"product_id": "openshift-logging/elasticsearch-proxy-rhel8@sha256:6a0c8026b1fbc39d1a012f963eed016f3df99745235a256898cc3f92b5c913f3_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/elasticsearch-proxy-rhel8@sha256:6a0c8026b1fbc39d1a012f963eed016f3df99745235a256898cc3f92b5c913f3?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-logging/elasticsearch-proxy-rhel8\u0026tag=v1.0.0-302"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/log-file-metric-exporter-rhel8@sha256:3c36dfe54c3597a2c0ba0fcf6fbd991e479847f9b7f8957fb60eb7039e1e662e_ppc64le",
"product": {
"name": "openshift-logging/log-file-metric-exporter-rhel8@sha256:3c36dfe54c3597a2c0ba0fcf6fbd991e479847f9b7f8957fb60eb7039e1e662e_ppc64le",
"product_id": "openshift-logging/log-file-metric-exporter-rhel8@sha256:3c36dfe54c3597a2c0ba0fcf6fbd991e479847f9b7f8957fb60eb7039e1e662e_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/log-file-metric-exporter-rhel8@sha256:3c36dfe54c3597a2c0ba0fcf6fbd991e479847f9b7f8957fb60eb7039e1e662e?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-logging/log-file-metric-exporter-rhel8\u0026tag=v1.0.0-164"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/logging-curator5-rhel8@sha256:8fde863a056af0d59dfa63ffa9f65af94ce5a6d2713ee84d35ea19dc5357f583_ppc64le",
"product": {
"name": "openshift-logging/logging-curator5-rhel8@sha256:8fde863a056af0d59dfa63ffa9f65af94ce5a6d2713ee84d35ea19dc5357f583_ppc64le",
"product_id": "openshift-logging/logging-curator5-rhel8@sha256:8fde863a056af0d59dfa63ffa9f65af94ce5a6d2713ee84d35ea19dc5357f583_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/logging-curator5-rhel8@sha256:8fde863a056af0d59dfa63ffa9f65af94ce5a6d2713ee84d35ea19dc5357f583?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-logging/logging-curator5-rhel8\u0026tag=v5.8.1-242"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/elasticsearch6-rhel8@sha256:1cd6bbc32620099b0e2b6a31ec0d0a82a3d4819f3d3c4ce5312b24277e89e4bf_ppc64le",
"product": {
"name": "openshift-logging/elasticsearch6-rhel8@sha256:1cd6bbc32620099b0e2b6a31ec0d0a82a3d4819f3d3c4ce5312b24277e89e4bf_ppc64le",
"product_id": "openshift-logging/elasticsearch6-rhel8@sha256:1cd6bbc32620099b0e2b6a31ec0d0a82a3d4819f3d3c4ce5312b24277e89e4bf_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/elasticsearch6-rhel8@sha256:1cd6bbc32620099b0e2b6a31ec0d0a82a3d4819f3d3c4ce5312b24277e89e4bf?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-logging/elasticsearch6-rhel8\u0026tag=v6.8.1-261"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/fluentd-rhel8@sha256:85dbeff544f48c08d0351eca88b10b7b07cea181382472a8d6b766d4facbbb5f_ppc64le",
"product": {
"name": "openshift-logging/fluentd-rhel8@sha256:85dbeff544f48c08d0351eca88b10b7b07cea181382472a8d6b766d4facbbb5f_ppc64le",
"product_id": "openshift-logging/fluentd-rhel8@sha256:85dbeff544f48c08d0351eca88b10b7b07cea181382472a8d6b766d4facbbb5f_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/fluentd-rhel8@sha256:85dbeff544f48c08d0351eca88b10b7b07cea181382472a8d6b766d4facbbb5f?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-logging/fluentd-rhel8\u0026tag=v1.7.4-217"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/kibana6-rhel8@sha256:f7ac478a6b3a33ab3be1f64a8ecf389194f9c6a1c07d936b318d7918a5f782d3_ppc64le",
"product": {
"name": "openshift-logging/kibana6-rhel8@sha256:f7ac478a6b3a33ab3be1f64a8ecf389194f9c6a1c07d936b318d7918a5f782d3_ppc64le",
"product_id": "openshift-logging/kibana6-rhel8@sha256:f7ac478a6b3a33ab3be1f64a8ecf389194f9c6a1c07d936b318d7918a5f782d3_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/kibana6-rhel8@sha256:f7ac478a6b3a33ab3be1f64a8ecf389194f9c6a1c07d936b318d7918a5f782d3?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-logging/kibana6-rhel8\u0026tag=v6.8.1-298"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/cluster-logging-operator-bundle@sha256:b78456120cab1aac6044a6953e4dfd899f3c7d6b58a0e5cd8f166e4bffb5d941_amd64 as a component of OpenShift Logging 5.3",
"product_id": "8Base-OSE-LOGGING-5.3:openshift-logging/cluster-logging-operator-bundle@sha256:b78456120cab1aac6044a6953e4dfd899f3c7d6b58a0e5cd8f166e4bffb5d941_amd64"
},
"product_reference": "openshift-logging/cluster-logging-operator-bundle@sha256:b78456120cab1aac6044a6953e4dfd899f3c7d6b58a0e5cd8f166e4bffb5d941_amd64",
"relates_to_product_reference": "8Base-OSE-LOGGING-5.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/cluster-logging-rhel8-operator@sha256:29aab5ce5c349a6370de9dec73e1c27dba1f8ee7a82e7da7cd3957839743c1d8_ppc64le as a component of OpenShift Logging 5.3",
"product_id": "8Base-OSE-LOGGING-5.3:openshift-logging/cluster-logging-rhel8-operator@sha256:29aab5ce5c349a6370de9dec73e1c27dba1f8ee7a82e7da7cd3957839743c1d8_ppc64le"
},
"product_reference": "openshift-logging/cluster-logging-rhel8-operator@sha256:29aab5ce5c349a6370de9dec73e1c27dba1f8ee7a82e7da7cd3957839743c1d8_ppc64le",
"relates_to_product_reference": "8Base-OSE-LOGGING-5.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/cluster-logging-rhel8-operator@sha256:d05f697c6da62036fcbba633a4cb6d253fdd6882c9205ad9a7cb9710878402a0_amd64 as a component of OpenShift Logging 5.3",
"product_id": "8Base-OSE-LOGGING-5.3:openshift-logging/cluster-logging-rhel8-operator@sha256:d05f697c6da62036fcbba633a4cb6d253fdd6882c9205ad9a7cb9710878402a0_amd64"
},
"product_reference": "openshift-logging/cluster-logging-rhel8-operator@sha256:d05f697c6da62036fcbba633a4cb6d253fdd6882c9205ad9a7cb9710878402a0_amd64",
"relates_to_product_reference": "8Base-OSE-LOGGING-5.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/cluster-logging-rhel8-operator@sha256:e785074e66edd55f68d4971cb42bcc9612c9b2713593555162d82b9218368023_s390x as a component of OpenShift Logging 5.3",
"product_id": "8Base-OSE-LOGGING-5.3:openshift-logging/cluster-logging-rhel8-operator@sha256:e785074e66edd55f68d4971cb42bcc9612c9b2713593555162d82b9218368023_s390x"
},
"product_reference": "openshift-logging/cluster-logging-rhel8-operator@sha256:e785074e66edd55f68d4971cb42bcc9612c9b2713593555162d82b9218368023_s390x",
"relates_to_product_reference": "8Base-OSE-LOGGING-5.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/elasticsearch-operator-bundle@sha256:c5218abf99c5401fbcec34c93f99805e109d889b27c28719f0ce75a952015f17_amd64 as a component of OpenShift Logging 5.3",
"product_id": "8Base-OSE-LOGGING-5.3:openshift-logging/elasticsearch-operator-bundle@sha256:c5218abf99c5401fbcec34c93f99805e109d889b27c28719f0ce75a952015f17_amd64"
},
"product_reference": "openshift-logging/elasticsearch-operator-bundle@sha256:c5218abf99c5401fbcec34c93f99805e109d889b27c28719f0ce75a952015f17_amd64",
"relates_to_product_reference": "8Base-OSE-LOGGING-5.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/elasticsearch-proxy-rhel8@sha256:2eb93d134ac01322408a31538fa14f3d29b77568ad20f71e2bc2303eca957c05_amd64 as a component of OpenShift Logging 5.3",
"product_id": "8Base-OSE-LOGGING-5.3:openshift-logging/elasticsearch-proxy-rhel8@sha256:2eb93d134ac01322408a31538fa14f3d29b77568ad20f71e2bc2303eca957c05_amd64"
},
"product_reference": "openshift-logging/elasticsearch-proxy-rhel8@sha256:2eb93d134ac01322408a31538fa14f3d29b77568ad20f71e2bc2303eca957c05_amd64",
"relates_to_product_reference": "8Base-OSE-LOGGING-5.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/elasticsearch-proxy-rhel8@sha256:6a0c8026b1fbc39d1a012f963eed016f3df99745235a256898cc3f92b5c913f3_ppc64le as a component of OpenShift Logging 5.3",
"product_id": "8Base-OSE-LOGGING-5.3:openshift-logging/elasticsearch-proxy-rhel8@sha256:6a0c8026b1fbc39d1a012f963eed016f3df99745235a256898cc3f92b5c913f3_ppc64le"
},
"product_reference": "openshift-logging/elasticsearch-proxy-rhel8@sha256:6a0c8026b1fbc39d1a012f963eed016f3df99745235a256898cc3f92b5c913f3_ppc64le",
"relates_to_product_reference": "8Base-OSE-LOGGING-5.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/elasticsearch-proxy-rhel8@sha256:cea0810e580ab422b8f54ae0f095f1ef4346cfef81873b5999a66cdc2687165a_s390x as a component of OpenShift Logging 5.3",
"product_id": "8Base-OSE-LOGGING-5.3:openshift-logging/elasticsearch-proxy-rhel8@sha256:cea0810e580ab422b8f54ae0f095f1ef4346cfef81873b5999a66cdc2687165a_s390x"
},
"product_reference": "openshift-logging/elasticsearch-proxy-rhel8@sha256:cea0810e580ab422b8f54ae0f095f1ef4346cfef81873b5999a66cdc2687165a_s390x",
"relates_to_product_reference": "8Base-OSE-LOGGING-5.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/elasticsearch-rhel8-operator@sha256:34de2b2acd8ee51055a51659b5a9e8331ebdd1512be34969e60e412269b4d494_s390x as a component of OpenShift Logging 5.3",
"product_id": "8Base-OSE-LOGGING-5.3:openshift-logging/elasticsearch-rhel8-operator@sha256:34de2b2acd8ee51055a51659b5a9e8331ebdd1512be34969e60e412269b4d494_s390x"
},
"product_reference": "openshift-logging/elasticsearch-rhel8-operator@sha256:34de2b2acd8ee51055a51659b5a9e8331ebdd1512be34969e60e412269b4d494_s390x",
"relates_to_product_reference": "8Base-OSE-LOGGING-5.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/elasticsearch-rhel8-operator@sha256:819e2985a882f2ddb34a137b0886d13ed764dac5b976fc4b450ba23cbc09597a_ppc64le as a component of OpenShift Logging 5.3",
"product_id": "8Base-OSE-LOGGING-5.3:openshift-logging/elasticsearch-rhel8-operator@sha256:819e2985a882f2ddb34a137b0886d13ed764dac5b976fc4b450ba23cbc09597a_ppc64le"
},
"product_reference": "openshift-logging/elasticsearch-rhel8-operator@sha256:819e2985a882f2ddb34a137b0886d13ed764dac5b976fc4b450ba23cbc09597a_ppc64le",
"relates_to_product_reference": "8Base-OSE-LOGGING-5.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/elasticsearch-rhel8-operator@sha256:a57abda6ba1cde99d47f6ea7a63e17a258f1f9ea73ca8bceadad7541477e7b81_amd64 as a component of OpenShift Logging 5.3",
"product_id": "8Base-OSE-LOGGING-5.3:openshift-logging/elasticsearch-rhel8-operator@sha256:a57abda6ba1cde99d47f6ea7a63e17a258f1f9ea73ca8bceadad7541477e7b81_amd64"
},
"product_reference": "openshift-logging/elasticsearch-rhel8-operator@sha256:a57abda6ba1cde99d47f6ea7a63e17a258f1f9ea73ca8bceadad7541477e7b81_amd64",
"relates_to_product_reference": "8Base-OSE-LOGGING-5.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/elasticsearch6-rhel8@sha256:1cd6bbc32620099b0e2b6a31ec0d0a82a3d4819f3d3c4ce5312b24277e89e4bf_ppc64le as a component of OpenShift Logging 5.3",
"product_id": "8Base-OSE-LOGGING-5.3:openshift-logging/elasticsearch6-rhel8@sha256:1cd6bbc32620099b0e2b6a31ec0d0a82a3d4819f3d3c4ce5312b24277e89e4bf_ppc64le"
},
"product_reference": "openshift-logging/elasticsearch6-rhel8@sha256:1cd6bbc32620099b0e2b6a31ec0d0a82a3d4819f3d3c4ce5312b24277e89e4bf_ppc64le",
"relates_to_product_reference": "8Base-OSE-LOGGING-5.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/elasticsearch6-rhel8@sha256:211271d2e88eaf7f0930dbf2badf78dbe051ae14b68e67073b1b1b992fa9ea6e_s390x as a component of OpenShift Logging 5.3",
"product_id": "8Base-OSE-LOGGING-5.3:openshift-logging/elasticsearch6-rhel8@sha256:211271d2e88eaf7f0930dbf2badf78dbe051ae14b68e67073b1b1b992fa9ea6e_s390x"
},
"product_reference": "openshift-logging/elasticsearch6-rhel8@sha256:211271d2e88eaf7f0930dbf2badf78dbe051ae14b68e67073b1b1b992fa9ea6e_s390x",
"relates_to_product_reference": "8Base-OSE-LOGGING-5.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/elasticsearch6-rhel8@sha256:96fa422c95c3aa328015bfa158f22885653191eb418718fbc416b9de1fed0a0c_amd64 as a component of OpenShift Logging 5.3",
"product_id": "8Base-OSE-LOGGING-5.3:openshift-logging/elasticsearch6-rhel8@sha256:96fa422c95c3aa328015bfa158f22885653191eb418718fbc416b9de1fed0a0c_amd64"
},
"product_reference": "openshift-logging/elasticsearch6-rhel8@sha256:96fa422c95c3aa328015bfa158f22885653191eb418718fbc416b9de1fed0a0c_amd64",
"relates_to_product_reference": "8Base-OSE-LOGGING-5.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/fluentd-rhel8@sha256:85dbeff544f48c08d0351eca88b10b7b07cea181382472a8d6b766d4facbbb5f_ppc64le as a component of OpenShift Logging 5.3",
"product_id": "8Base-OSE-LOGGING-5.3:openshift-logging/fluentd-rhel8@sha256:85dbeff544f48c08d0351eca88b10b7b07cea181382472a8d6b766d4facbbb5f_ppc64le"
},
"product_reference": "openshift-logging/fluentd-rhel8@sha256:85dbeff544f48c08d0351eca88b10b7b07cea181382472a8d6b766d4facbbb5f_ppc64le",
"relates_to_product_reference": "8Base-OSE-LOGGING-5.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/fluentd-rhel8@sha256:b712b4568533eccc3e67894c69a27f024a710c0a0759cb04a799077bc21ad7b0_s390x as a component of OpenShift Logging 5.3",
"product_id": "8Base-OSE-LOGGING-5.3:openshift-logging/fluentd-rhel8@sha256:b712b4568533eccc3e67894c69a27f024a710c0a0759cb04a799077bc21ad7b0_s390x"
},
"product_reference": "openshift-logging/fluentd-rhel8@sha256:b712b4568533eccc3e67894c69a27f024a710c0a0759cb04a799077bc21ad7b0_s390x",
"relates_to_product_reference": "8Base-OSE-LOGGING-5.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/fluentd-rhel8@sha256:e7fbe0c13c6fd405701b13af609008e8c954c489ab567aeae27f035835c327e8_amd64 as a component of OpenShift Logging 5.3",
"product_id": "8Base-OSE-LOGGING-5.3:openshift-logging/fluentd-rhel8@sha256:e7fbe0c13c6fd405701b13af609008e8c954c489ab567aeae27f035835c327e8_amd64"
},
"product_reference": "openshift-logging/fluentd-rhel8@sha256:e7fbe0c13c6fd405701b13af609008e8c954c489ab567aeae27f035835c327e8_amd64",
"relates_to_product_reference": "8Base-OSE-LOGGING-5.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/kibana6-rhel8@sha256:8b3b9895d498036e7fb7451f52757ce8f3832d711254ed6649e97fe06d16195a_amd64 as a component of OpenShift Logging 5.3",
"product_id": "8Base-OSE-LOGGING-5.3:openshift-logging/kibana6-rhel8@sha256:8b3b9895d498036e7fb7451f52757ce8f3832d711254ed6649e97fe06d16195a_amd64"
},
"product_reference": "openshift-logging/kibana6-rhel8@sha256:8b3b9895d498036e7fb7451f52757ce8f3832d711254ed6649e97fe06d16195a_amd64",
"relates_to_product_reference": "8Base-OSE-LOGGING-5.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/kibana6-rhel8@sha256:a3c5a69dba9fafdbbe21b7eaf0792a8d0d7dbc108977dde72bce3af4ba709a01_s390x as a component of OpenShift Logging 5.3",
"product_id": "8Base-OSE-LOGGING-5.3:openshift-logging/kibana6-rhel8@sha256:a3c5a69dba9fafdbbe21b7eaf0792a8d0d7dbc108977dde72bce3af4ba709a01_s390x"
},
"product_reference": "openshift-logging/kibana6-rhel8@sha256:a3c5a69dba9fafdbbe21b7eaf0792a8d0d7dbc108977dde72bce3af4ba709a01_s390x",
"relates_to_product_reference": "8Base-OSE-LOGGING-5.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/kibana6-rhel8@sha256:f7ac478a6b3a33ab3be1f64a8ecf389194f9c6a1c07d936b318d7918a5f782d3_ppc64le as a component of OpenShift Logging 5.3",
"product_id": "8Base-OSE-LOGGING-5.3:openshift-logging/kibana6-rhel8@sha256:f7ac478a6b3a33ab3be1f64a8ecf389194f9c6a1c07d936b318d7918a5f782d3_ppc64le"
},
"product_reference": "openshift-logging/kibana6-rhel8@sha256:f7ac478a6b3a33ab3be1f64a8ecf389194f9c6a1c07d936b318d7918a5f782d3_ppc64le",
"relates_to_product_reference": "8Base-OSE-LOGGING-5.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/log-file-metric-exporter-rhel8@sha256:3c36dfe54c3597a2c0ba0fcf6fbd991e479847f9b7f8957fb60eb7039e1e662e_ppc64le as a component of OpenShift Logging 5.3",
"product_id": "8Base-OSE-LOGGING-5.3:openshift-logging/log-file-metric-exporter-rhel8@sha256:3c36dfe54c3597a2c0ba0fcf6fbd991e479847f9b7f8957fb60eb7039e1e662e_ppc64le"
},
"product_reference": "openshift-logging/log-file-metric-exporter-rhel8@sha256:3c36dfe54c3597a2c0ba0fcf6fbd991e479847f9b7f8957fb60eb7039e1e662e_ppc64le",
"relates_to_product_reference": "8Base-OSE-LOGGING-5.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/log-file-metric-exporter-rhel8@sha256:45a595d11960d01f153dfe7ff6f8336aa1ccf09c044d7e26763ae348c8dc1181_amd64 as a component of OpenShift Logging 5.3",
"product_id": "8Base-OSE-LOGGING-5.3:openshift-logging/log-file-metric-exporter-rhel8@sha256:45a595d11960d01f153dfe7ff6f8336aa1ccf09c044d7e26763ae348c8dc1181_amd64"
},
"product_reference": "openshift-logging/log-file-metric-exporter-rhel8@sha256:45a595d11960d01f153dfe7ff6f8336aa1ccf09c044d7e26763ae348c8dc1181_amd64",
"relates_to_product_reference": "8Base-OSE-LOGGING-5.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/log-file-metric-exporter-rhel8@sha256:db3841437512ac4716465336e1a520a6a702433b169e955ba04cdc41d6fa4eea_s390x as a component of OpenShift Logging 5.3",
"product_id": "8Base-OSE-LOGGING-5.3:openshift-logging/log-file-metric-exporter-rhel8@sha256:db3841437512ac4716465336e1a520a6a702433b169e955ba04cdc41d6fa4eea_s390x"
},
"product_reference": "openshift-logging/log-file-metric-exporter-rhel8@sha256:db3841437512ac4716465336e1a520a6a702433b169e955ba04cdc41d6fa4eea_s390x",
"relates_to_product_reference": "8Base-OSE-LOGGING-5.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/logging-curator5-rhel8@sha256:8fde863a056af0d59dfa63ffa9f65af94ce5a6d2713ee84d35ea19dc5357f583_ppc64le as a component of OpenShift Logging 5.3",
"product_id": "8Base-OSE-LOGGING-5.3:openshift-logging/logging-curator5-rhel8@sha256:8fde863a056af0d59dfa63ffa9f65af94ce5a6d2713ee84d35ea19dc5357f583_ppc64le"
},
"product_reference": "openshift-logging/logging-curator5-rhel8@sha256:8fde863a056af0d59dfa63ffa9f65af94ce5a6d2713ee84d35ea19dc5357f583_ppc64le",
"relates_to_product_reference": "8Base-OSE-LOGGING-5.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/logging-curator5-rhel8@sha256:e8297522f54b2649a08e10dd5a2ff7d01e6012e87cc82de876be7a2ace292011_amd64 as a component of OpenShift Logging 5.3",
"product_id": "8Base-OSE-LOGGING-5.3:openshift-logging/logging-curator5-rhel8@sha256:e8297522f54b2649a08e10dd5a2ff7d01e6012e87cc82de876be7a2ace292011_amd64"
},
"product_reference": "openshift-logging/logging-curator5-rhel8@sha256:e8297522f54b2649a08e10dd5a2ff7d01e6012e87cc82de876be7a2ace292011_amd64",
"relates_to_product_reference": "8Base-OSE-LOGGING-5.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/logging-curator5-rhel8@sha256:f7fa0d3ea11001123fa1f59b2ae1edb230fb96157b19ec230d876793b4ed1554_s390x as a component of OpenShift Logging 5.3",
"product_id": "8Base-OSE-LOGGING-5.3:openshift-logging/logging-curator5-rhel8@sha256:f7fa0d3ea11001123fa1f59b2ae1edb230fb96157b19ec230d876793b4ed1554_s390x"
},
"product_reference": "openshift-logging/logging-curator5-rhel8@sha256:f7fa0d3ea11001123fa1f59b2ae1edb230fb96157b19ec230d876793b4ed1554_s390x",
"relates_to_product_reference": "8Base-OSE-LOGGING-5.3"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2022-32149",
"cwe": {
"id": "CWE-407",
"name": "Inefficient Algorithmic Complexity"
},
"discovery_date": "2022-10-12T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-OSE-LOGGING-5.3:openshift-logging/cluster-logging-operator-bundle@sha256:b78456120cab1aac6044a6953e4dfd899f3c7d6b58a0e5cd8f166e4bffb5d941_amd64",
"8Base-OSE-LOGGING-5.3:openshift-logging/cluster-logging-rhel8-operator@sha256:29aab5ce5c349a6370de9dec73e1c27dba1f8ee7a82e7da7cd3957839743c1d8_ppc64le",
"8Base-OSE-LOGGING-5.3:openshift-logging/cluster-logging-rhel8-operator@sha256:d05f697c6da62036fcbba633a4cb6d253fdd6882c9205ad9a7cb9710878402a0_amd64",
"8Base-OSE-LOGGING-5.3:openshift-logging/cluster-logging-rhel8-operator@sha256:e785074e66edd55f68d4971cb42bcc9612c9b2713593555162d82b9218368023_s390x",
"8Base-OSE-LOGGING-5.3:openshift-logging/elasticsearch-operator-bundle@sha256:c5218abf99c5401fbcec34c93f99805e109d889b27c28719f0ce75a952015f17_amd64",
"8Base-OSE-LOGGING-5.3:openshift-logging/elasticsearch-rhel8-operator@sha256:34de2b2acd8ee51055a51659b5a9e8331ebdd1512be34969e60e412269b4d494_s390x",
"8Base-OSE-LOGGING-5.3:openshift-logging/elasticsearch-rhel8-operator@sha256:819e2985a882f2ddb34a137b0886d13ed764dac5b976fc4b450ba23cbc09597a_ppc64le",
"8Base-OSE-LOGGING-5.3:openshift-logging/elasticsearch-rhel8-operator@sha256:a57abda6ba1cde99d47f6ea7a63e17a258f1f9ea73ca8bceadad7541477e7b81_amd64",
"8Base-OSE-LOGGING-5.3:openshift-logging/elasticsearch6-rhel8@sha256:1cd6bbc32620099b0e2b6a31ec0d0a82a3d4819f3d3c4ce5312b24277e89e4bf_ppc64le",
"8Base-OSE-LOGGING-5.3:openshift-logging/elasticsearch6-rhel8@sha256:211271d2e88eaf7f0930dbf2badf78dbe051ae14b68e67073b1b1b992fa9ea6e_s390x",
"8Base-OSE-LOGGING-5.3:openshift-logging/elasticsearch6-rhel8@sha256:96fa422c95c3aa328015bfa158f22885653191eb418718fbc416b9de1fed0a0c_amd64",
"8Base-OSE-LOGGING-5.3:openshift-logging/fluentd-rhel8@sha256:85dbeff544f48c08d0351eca88b10b7b07cea181382472a8d6b766d4facbbb5f_ppc64le",
"8Base-OSE-LOGGING-5.3:openshift-logging/fluentd-rhel8@sha256:b712b4568533eccc3e67894c69a27f024a710c0a0759cb04a799077bc21ad7b0_s390x",
"8Base-OSE-LOGGING-5.3:openshift-logging/fluentd-rhel8@sha256:e7fbe0c13c6fd405701b13af609008e8c954c489ab567aeae27f035835c327e8_amd64",
"8Base-OSE-LOGGING-5.3:openshift-logging/kibana6-rhel8@sha256:8b3b9895d498036e7fb7451f52757ce8f3832d711254ed6649e97fe06d16195a_amd64",
"8Base-OSE-LOGGING-5.3:openshift-logging/kibana6-rhel8@sha256:a3c5a69dba9fafdbbe21b7eaf0792a8d0d7dbc108977dde72bce3af4ba709a01_s390x",
"8Base-OSE-LOGGING-5.3:openshift-logging/kibana6-rhel8@sha256:f7ac478a6b3a33ab3be1f64a8ecf389194f9c6a1c07d936b318d7918a5f782d3_ppc64le",
"8Base-OSE-LOGGING-5.3:openshift-logging/log-file-metric-exporter-rhel8@sha256:3c36dfe54c3597a2c0ba0fcf6fbd991e479847f9b7f8957fb60eb7039e1e662e_ppc64le",
"8Base-OSE-LOGGING-5.3:openshift-logging/log-file-metric-exporter-rhel8@sha256:45a595d11960d01f153dfe7ff6f8336aa1ccf09c044d7e26763ae348c8dc1181_amd64",
"8Base-OSE-LOGGING-5.3:openshift-logging/log-file-metric-exporter-rhel8@sha256:db3841437512ac4716465336e1a520a6a702433b169e955ba04cdc41d6fa4eea_s390x",
"8Base-OSE-LOGGING-5.3:openshift-logging/logging-curator5-rhel8@sha256:8fde863a056af0d59dfa63ffa9f65af94ce5a6d2713ee84d35ea19dc5357f583_ppc64le",
"8Base-OSE-LOGGING-5.3:openshift-logging/logging-curator5-rhel8@sha256:e8297522f54b2649a08e10dd5a2ff7d01e6012e87cc82de876be7a2ace292011_amd64",
"8Base-OSE-LOGGING-5.3:openshift-logging/logging-curator5-rhel8@sha256:f7fa0d3ea11001123fa1f59b2ae1edb230fb96157b19ec230d876793b4ed1554_s390x"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2134010"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in the golang.org/x/text/language package. An attacker can craft an Accept-Language header which ParseAcceptLanguage will take significant time to parse. This issue leads to a denial of service, and can impact availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: golang.org/x/text/language: ParseAcceptLanguage takes a long time to parse complex tags",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-OSE-LOGGING-5.3:openshift-logging/elasticsearch-proxy-rhel8@sha256:2eb93d134ac01322408a31538fa14f3d29b77568ad20f71e2bc2303eca957c05_amd64",
"8Base-OSE-LOGGING-5.3:openshift-logging/elasticsearch-proxy-rhel8@sha256:6a0c8026b1fbc39d1a012f963eed016f3df99745235a256898cc3f92b5c913f3_ppc64le",
"8Base-OSE-LOGGING-5.3:openshift-logging/elasticsearch-proxy-rhel8@sha256:cea0810e580ab422b8f54ae0f095f1ef4346cfef81873b5999a66cdc2687165a_s390x"
],
"known_not_affected": [
"8Base-OSE-LOGGING-5.3:openshift-logging/cluster-logging-operator-bundle@sha256:b78456120cab1aac6044a6953e4dfd899f3c7d6b58a0e5cd8f166e4bffb5d941_amd64",
"8Base-OSE-LOGGING-5.3:openshift-logging/cluster-logging-rhel8-operator@sha256:29aab5ce5c349a6370de9dec73e1c27dba1f8ee7a82e7da7cd3957839743c1d8_ppc64le",
"8Base-OSE-LOGGING-5.3:openshift-logging/cluster-logging-rhel8-operator@sha256:d05f697c6da62036fcbba633a4cb6d253fdd6882c9205ad9a7cb9710878402a0_amd64",
"8Base-OSE-LOGGING-5.3:openshift-logging/cluster-logging-rhel8-operator@sha256:e785074e66edd55f68d4971cb42bcc9612c9b2713593555162d82b9218368023_s390x",
"8Base-OSE-LOGGING-5.3:openshift-logging/elasticsearch-operator-bundle@sha256:c5218abf99c5401fbcec34c93f99805e109d889b27c28719f0ce75a952015f17_amd64",
"8Base-OSE-LOGGING-5.3:openshift-logging/elasticsearch-rhel8-operator@sha256:34de2b2acd8ee51055a51659b5a9e8331ebdd1512be34969e60e412269b4d494_s390x",
"8Base-OSE-LOGGING-5.3:openshift-logging/elasticsearch-rhel8-operator@sha256:819e2985a882f2ddb34a137b0886d13ed764dac5b976fc4b450ba23cbc09597a_ppc64le",
"8Base-OSE-LOGGING-5.3:openshift-logging/elasticsearch-rhel8-operator@sha256:a57abda6ba1cde99d47f6ea7a63e17a258f1f9ea73ca8bceadad7541477e7b81_amd64",
"8Base-OSE-LOGGING-5.3:openshift-logging/elasticsearch6-rhel8@sha256:1cd6bbc32620099b0e2b6a31ec0d0a82a3d4819f3d3c4ce5312b24277e89e4bf_ppc64le",
"8Base-OSE-LOGGING-5.3:openshift-logging/elasticsearch6-rhel8@sha256:211271d2e88eaf7f0930dbf2badf78dbe051ae14b68e67073b1b1b992fa9ea6e_s390x",
"8Base-OSE-LOGGING-5.3:openshift-logging/elasticsearch6-rhel8@sha256:96fa422c95c3aa328015bfa158f22885653191eb418718fbc416b9de1fed0a0c_amd64",
"8Base-OSE-LOGGING-5.3:openshift-logging/fluentd-rhel8@sha256:85dbeff544f48c08d0351eca88b10b7b07cea181382472a8d6b766d4facbbb5f_ppc64le",
"8Base-OSE-LOGGING-5.3:openshift-logging/fluentd-rhel8@sha256:b712b4568533eccc3e67894c69a27f024a710c0a0759cb04a799077bc21ad7b0_s390x",
"8Base-OSE-LOGGING-5.3:openshift-logging/fluentd-rhel8@sha256:e7fbe0c13c6fd405701b13af609008e8c954c489ab567aeae27f035835c327e8_amd64",
"8Base-OSE-LOGGING-5.3:openshift-logging/kibana6-rhel8@sha256:8b3b9895d498036e7fb7451f52757ce8f3832d711254ed6649e97fe06d16195a_amd64",
"8Base-OSE-LOGGING-5.3:openshift-logging/kibana6-rhel8@sha256:a3c5a69dba9fafdbbe21b7eaf0792a8d0d7dbc108977dde72bce3af4ba709a01_s390x",
"8Base-OSE-LOGGING-5.3:openshift-logging/kibana6-rhel8@sha256:f7ac478a6b3a33ab3be1f64a8ecf389194f9c6a1c07d936b318d7918a5f782d3_ppc64le",
"8Base-OSE-LOGGING-5.3:openshift-logging/log-file-metric-exporter-rhel8@sha256:3c36dfe54c3597a2c0ba0fcf6fbd991e479847f9b7f8957fb60eb7039e1e662e_ppc64le",
"8Base-OSE-LOGGING-5.3:openshift-logging/log-file-metric-exporter-rhel8@sha256:45a595d11960d01f153dfe7ff6f8336aa1ccf09c044d7e26763ae348c8dc1181_amd64",
"8Base-OSE-LOGGING-5.3:openshift-logging/log-file-metric-exporter-rhel8@sha256:db3841437512ac4716465336e1a520a6a702433b169e955ba04cdc41d6fa4eea_s390x",
"8Base-OSE-LOGGING-5.3:openshift-logging/logging-curator5-rhel8@sha256:8fde863a056af0d59dfa63ffa9f65af94ce5a6d2713ee84d35ea19dc5357f583_ppc64le",
"8Base-OSE-LOGGING-5.3:openshift-logging/logging-curator5-rhel8@sha256:e8297522f54b2649a08e10dd5a2ff7d01e6012e87cc82de876be7a2ace292011_amd64",
"8Base-OSE-LOGGING-5.3:openshift-logging/logging-curator5-rhel8@sha256:f7fa0d3ea11001123fa1f59b2ae1edb230fb96157b19ec230d876793b4ed1554_s390x"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-32149"
},
{
"category": "external",
"summary": "RHBZ#2134010",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2134010"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-32149",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32149"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-32149",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-32149"
},
{
"category": "external",
"summary": "https://go.dev/issue/56152",
"url": "https://go.dev/issue/56152"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-dev/c/qfPIly0X7aU",
"url": "https://groups.google.com/g/golang-dev/c/qfPIly0X7aU"
}
],
"release_date": "2022-10-11T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-11-09T16:43:13+00:00",
"details": "For OpenShift Container Platform 4.9 see the following documentation, which will be updated shortly, for detailed release notes:\n\nhttps://docs.openshift.com/container-platform/4.9/logging/cluster-logging-release-notes.html\n\nFor Red Hat OpenShift Logging 5.3, see the following instructions to apply this update:\n\nhttps://docs.openshift.com/container-platform/4.9/logging/cluster-logging-upgrading.html",
"product_ids": [
"8Base-OSE-LOGGING-5.3:openshift-logging/elasticsearch-proxy-rhel8@sha256:2eb93d134ac01322408a31538fa14f3d29b77568ad20f71e2bc2303eca957c05_amd64",
"8Base-OSE-LOGGING-5.3:openshift-logging/elasticsearch-proxy-rhel8@sha256:6a0c8026b1fbc39d1a012f963eed016f3df99745235a256898cc3f92b5c913f3_ppc64le",
"8Base-OSE-LOGGING-5.3:openshift-logging/elasticsearch-proxy-rhel8@sha256:cea0810e580ab422b8f54ae0f095f1ef4346cfef81873b5999a66cdc2687165a_s390x"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:6882"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"8Base-OSE-LOGGING-5.3:openshift-logging/cluster-logging-operator-bundle@sha256:b78456120cab1aac6044a6953e4dfd899f3c7d6b58a0e5cd8f166e4bffb5d941_amd64",
"8Base-OSE-LOGGING-5.3:openshift-logging/cluster-logging-rhel8-operator@sha256:29aab5ce5c349a6370de9dec73e1c27dba1f8ee7a82e7da7cd3957839743c1d8_ppc64le",
"8Base-OSE-LOGGING-5.3:openshift-logging/cluster-logging-rhel8-operator@sha256:d05f697c6da62036fcbba633a4cb6d253fdd6882c9205ad9a7cb9710878402a0_amd64",
"8Base-OSE-LOGGING-5.3:openshift-logging/cluster-logging-rhel8-operator@sha256:e785074e66edd55f68d4971cb42bcc9612c9b2713593555162d82b9218368023_s390x",
"8Base-OSE-LOGGING-5.3:openshift-logging/elasticsearch-operator-bundle@sha256:c5218abf99c5401fbcec34c93f99805e109d889b27c28719f0ce75a952015f17_amd64",
"8Base-OSE-LOGGING-5.3:openshift-logging/elasticsearch-proxy-rhel8@sha256:2eb93d134ac01322408a31538fa14f3d29b77568ad20f71e2bc2303eca957c05_amd64",
"8Base-OSE-LOGGING-5.3:openshift-logging/elasticsearch-proxy-rhel8@sha256:6a0c8026b1fbc39d1a012f963eed016f3df99745235a256898cc3f92b5c913f3_ppc64le",
"8Base-OSE-LOGGING-5.3:openshift-logging/elasticsearch-proxy-rhel8@sha256:cea0810e580ab422b8f54ae0f095f1ef4346cfef81873b5999a66cdc2687165a_s390x",
"8Base-OSE-LOGGING-5.3:openshift-logging/elasticsearch-rhel8-operator@sha256:34de2b2acd8ee51055a51659b5a9e8331ebdd1512be34969e60e412269b4d494_s390x",
"8Base-OSE-LOGGING-5.3:openshift-logging/elasticsearch-rhel8-operator@sha256:819e2985a882f2ddb34a137b0886d13ed764dac5b976fc4b450ba23cbc09597a_ppc64le",
"8Base-OSE-LOGGING-5.3:openshift-logging/elasticsearch-rhel8-operator@sha256:a57abda6ba1cde99d47f6ea7a63e17a258f1f9ea73ca8bceadad7541477e7b81_amd64",
"8Base-OSE-LOGGING-5.3:openshift-logging/elasticsearch6-rhel8@sha256:1cd6bbc32620099b0e2b6a31ec0d0a82a3d4819f3d3c4ce5312b24277e89e4bf_ppc64le",
"8Base-OSE-LOGGING-5.3:openshift-logging/elasticsearch6-rhel8@sha256:211271d2e88eaf7f0930dbf2badf78dbe051ae14b68e67073b1b1b992fa9ea6e_s390x",
"8Base-OSE-LOGGING-5.3:openshift-logging/elasticsearch6-rhel8@sha256:96fa422c95c3aa328015bfa158f22885653191eb418718fbc416b9de1fed0a0c_amd64",
"8Base-OSE-LOGGING-5.3:openshift-logging/fluentd-rhel8@sha256:85dbeff544f48c08d0351eca88b10b7b07cea181382472a8d6b766d4facbbb5f_ppc64le",
"8Base-OSE-LOGGING-5.3:openshift-logging/fluentd-rhel8@sha256:b712b4568533eccc3e67894c69a27f024a710c0a0759cb04a799077bc21ad7b0_s390x",
"8Base-OSE-LOGGING-5.3:openshift-logging/fluentd-rhel8@sha256:e7fbe0c13c6fd405701b13af609008e8c954c489ab567aeae27f035835c327e8_amd64",
"8Base-OSE-LOGGING-5.3:openshift-logging/kibana6-rhel8@sha256:8b3b9895d498036e7fb7451f52757ce8f3832d711254ed6649e97fe06d16195a_amd64",
"8Base-OSE-LOGGING-5.3:openshift-logging/kibana6-rhel8@sha256:a3c5a69dba9fafdbbe21b7eaf0792a8d0d7dbc108977dde72bce3af4ba709a01_s390x",
"8Base-OSE-LOGGING-5.3:openshift-logging/kibana6-rhel8@sha256:f7ac478a6b3a33ab3be1f64a8ecf389194f9c6a1c07d936b318d7918a5f782d3_ppc64le",
"8Base-OSE-LOGGING-5.3:openshift-logging/log-file-metric-exporter-rhel8@sha256:3c36dfe54c3597a2c0ba0fcf6fbd991e479847f9b7f8957fb60eb7039e1e662e_ppc64le",
"8Base-OSE-LOGGING-5.3:openshift-logging/log-file-metric-exporter-rhel8@sha256:45a595d11960d01f153dfe7ff6f8336aa1ccf09c044d7e26763ae348c8dc1181_amd64",
"8Base-OSE-LOGGING-5.3:openshift-logging/log-file-metric-exporter-rhel8@sha256:db3841437512ac4716465336e1a520a6a702433b169e955ba04cdc41d6fa4eea_s390x",
"8Base-OSE-LOGGING-5.3:openshift-logging/logging-curator5-rhel8@sha256:8fde863a056af0d59dfa63ffa9f65af94ce5a6d2713ee84d35ea19dc5357f583_ppc64le",
"8Base-OSE-LOGGING-5.3:openshift-logging/logging-curator5-rhel8@sha256:e8297522f54b2649a08e10dd5a2ff7d01e6012e87cc82de876be7a2ace292011_amd64",
"8Base-OSE-LOGGING-5.3:openshift-logging/logging-curator5-rhel8@sha256:f7fa0d3ea11001123fa1f59b2ae1edb230fb96157b19ec230d876793b4ed1554_s390x"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "golang: golang.org/x/text/language: ParseAcceptLanguage takes a long time to parse complex tags"
}
]
}
rhsa-2023_0795
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Submariner 0.13.3 packages that fix various bugs and add various enhancements that are now available for Red Hat Advanced Cluster Management for Kubernetes version 2.6\n\nRed Hat Product Security has rated this update as having a security impact\nof Moderate. A Common Vulnerability Scoring System (CVSS) base score,\nwhich gives a detailed severity rating, is available for each vulnerability\nfrom the CVE links in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Submariner enables direct networking between pods and services on different Kubernetes clusters that are either on-premises or in the cloud.\n\nFor more information about Submariner, see the Submariner open source community website at: https://submariner.io/.\n\nThis advisory contains bug fixes and enhancements to the Submariner container images.\n\nSecurity fixes:\n\n* CVE-2022-32149 golang: golang.org/x/text/language: ParseAcceptLanguage takes a long time to parse complex tags\n\nBugs addressed:\n\n* Build Submariner 0.13.3 (ACM-2226)\n* Verify Submariner with OCP 4.12 (ACM-2435)\n* Submariner does not support cluster \"kube-proxy ipvs mode\" (ACM-2821)",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2023:0795",
"url": "https://access.redhat.com/errata/RHSA-2023:0795"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#moderate",
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "2134010",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2134010"
},
{
"category": "external",
"summary": "ACM-2226",
"url": "https://issues.redhat.com/browse/ACM-2226"
},
{
"category": "external",
"summary": "ACM-2435",
"url": "https://issues.redhat.com/browse/ACM-2435"
},
{
"category": "external",
"summary": "ACM-2821",
"url": "https://issues.redhat.com/browse/ACM-2821"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2023/rhsa-2023_0795.json"
}
],
"title": "Red Hat Security Advisory: RHSA: Submariner 0.13.3 - security updates and bug fixes",
"tracking": {
"current_release_date": "2025-01-06T19:23:19+00:00",
"generator": {
"date": "2025-01-06T19:23:19+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.5"
}
},
"id": "RHSA-2023:0795",
"initial_release_date": "2023-02-15T21:46:51+00:00",
"revision_history": [
{
"date": "2023-02-15T21:46:51+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2023-02-15T21:46:51+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-01-06T19:23:19+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8",
"product": {
"name": "Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8",
"product_id": "8Base-RHACM-2.6",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:acm:2.6::el8"
}
}
}
],
"category": "product_family",
"name": "Red Hat ACM"
},
{
"branches": [
{
"category": "product_version",
"name": "rhacm2/lighthouse-agent-rhel8@sha256:44576acbfff4321af54d8a8c15b0122d28ffbec8b88ebbdd32ed2dca3d4397c3_arm64",
"product": {
"name": "rhacm2/lighthouse-agent-rhel8@sha256:44576acbfff4321af54d8a8c15b0122d28ffbec8b88ebbdd32ed2dca3d4397c3_arm64",
"product_id": "rhacm2/lighthouse-agent-rhel8@sha256:44576acbfff4321af54d8a8c15b0122d28ffbec8b88ebbdd32ed2dca3d4397c3_arm64",
"product_identification_helper": {
"purl": "pkg:oci/lighthouse-agent-rhel8@sha256:44576acbfff4321af54d8a8c15b0122d28ffbec8b88ebbdd32ed2dca3d4397c3?arch=arm64\u0026repository_url=registry.redhat.io/rhacm2/lighthouse-agent-rhel8\u0026tag=v0.13.3-7"
}
}
},
{
"category": "product_version",
"name": "rhacm2/lighthouse-coredns-rhel8@sha256:3e4d5bf90e110c3cf3e988f572d227575727bf1769c02d132272b5ff5051cfb8_arm64",
"product": {
"name": "rhacm2/lighthouse-coredns-rhel8@sha256:3e4d5bf90e110c3cf3e988f572d227575727bf1769c02d132272b5ff5051cfb8_arm64",
"product_id": "rhacm2/lighthouse-coredns-rhel8@sha256:3e4d5bf90e110c3cf3e988f572d227575727bf1769c02d132272b5ff5051cfb8_arm64",
"product_identification_helper": {
"purl": "pkg:oci/lighthouse-coredns-rhel8@sha256:3e4d5bf90e110c3cf3e988f572d227575727bf1769c02d132272b5ff5051cfb8?arch=arm64\u0026repository_url=registry.redhat.io/rhacm2/lighthouse-coredns-rhel8\u0026tag=v0.13.3-7"
}
}
},
{
"category": "product_version",
"name": "rhacm2/nettest-rhel8@sha256:a1197fa88e7cbaac9c4c80e13d39eda732d9ff09579d7d2e96a96bb5c005e695_arm64",
"product": {
"name": "rhacm2/nettest-rhel8@sha256:a1197fa88e7cbaac9c4c80e13d39eda732d9ff09579d7d2e96a96bb5c005e695_arm64",
"product_id": "rhacm2/nettest-rhel8@sha256:a1197fa88e7cbaac9c4c80e13d39eda732d9ff09579d7d2e96a96bb5c005e695_arm64",
"product_identification_helper": {
"purl": "pkg:oci/nettest-rhel8@sha256:a1197fa88e7cbaac9c4c80e13d39eda732d9ff09579d7d2e96a96bb5c005e695?arch=arm64\u0026repository_url=registry.redhat.io/rhacm2/nettest-rhel8\u0026tag=v0.13.3-7"
}
}
},
{
"category": "product_version",
"name": "rhacm2/subctl-rhel8@sha256:1f4051093fb1128e7266a4baff92bb7e9864825d51947265bed4ae7c20a3f99c_arm64",
"product": {
"name": "rhacm2/subctl-rhel8@sha256:1f4051093fb1128e7266a4baff92bb7e9864825d51947265bed4ae7c20a3f99c_arm64",
"product_id": "rhacm2/subctl-rhel8@sha256:1f4051093fb1128e7266a4baff92bb7e9864825d51947265bed4ae7c20a3f99c_arm64",
"product_identification_helper": {
"purl": "pkg:oci/subctl-rhel8@sha256:1f4051093fb1128e7266a4baff92bb7e9864825d51947265bed4ae7c20a3f99c?arch=arm64\u0026repository_url=registry.redhat.io/rhacm2/subctl-rhel8\u0026tag=v0.13.3-6"
}
}
},
{
"category": "product_version",
"name": "rhacm2/submariner-gateway-rhel8@sha256:5cd02e62ae81fea9887c484b4b4f52712b3cdfe0bff8a826e2c1c8e813df50bf_arm64",
"product": {
"name": "rhacm2/submariner-gateway-rhel8@sha256:5cd02e62ae81fea9887c484b4b4f52712b3cdfe0bff8a826e2c1c8e813df50bf_arm64",
"product_id": "rhacm2/submariner-gateway-rhel8@sha256:5cd02e62ae81fea9887c484b4b4f52712b3cdfe0bff8a826e2c1c8e813df50bf_arm64",
"product_identification_helper": {
"purl": "pkg:oci/submariner-gateway-rhel8@sha256:5cd02e62ae81fea9887c484b4b4f52712b3cdfe0bff8a826e2c1c8e813df50bf?arch=arm64\u0026repository_url=registry.redhat.io/rhacm2/submariner-gateway-rhel8\u0026tag=v0.13.3-6"
}
}
},
{
"category": "product_version",
"name": "rhacm2/submariner-globalnet-rhel8@sha256:dc50bdc2082127c9df0da5b539ac61d244250eb93d7fcfd3a9d2fdbb10603695_arm64",
"product": {
"name": "rhacm2/submariner-globalnet-rhel8@sha256:dc50bdc2082127c9df0da5b539ac61d244250eb93d7fcfd3a9d2fdbb10603695_arm64",
"product_id": "rhacm2/submariner-globalnet-rhel8@sha256:dc50bdc2082127c9df0da5b539ac61d244250eb93d7fcfd3a9d2fdbb10603695_arm64",
"product_identification_helper": {
"purl": "pkg:oci/submariner-globalnet-rhel8@sha256:dc50bdc2082127c9df0da5b539ac61d244250eb93d7fcfd3a9d2fdbb10603695?arch=arm64\u0026repository_url=registry.redhat.io/rhacm2/submariner-globalnet-rhel8\u0026tag=v0.13.3-7"
}
}
},
{
"category": "product_version",
"name": "rhacm2/submariner-networkplugin-syncer-rhel8@sha256:7076fac5d7944c7d4a0fa0e89629372466baf9fc5b4b8e5c31cc71b80fac9a69_arm64",
"product": {
"name": "rhacm2/submariner-networkplugin-syncer-rhel8@sha256:7076fac5d7944c7d4a0fa0e89629372466baf9fc5b4b8e5c31cc71b80fac9a69_arm64",
"product_id": "rhacm2/submariner-networkplugin-syncer-rhel8@sha256:7076fac5d7944c7d4a0fa0e89629372466baf9fc5b4b8e5c31cc71b80fac9a69_arm64",
"product_identification_helper": {
"purl": "pkg:oci/submariner-networkplugin-syncer-rhel8@sha256:7076fac5d7944c7d4a0fa0e89629372466baf9fc5b4b8e5c31cc71b80fac9a69?arch=arm64\u0026repository_url=registry.redhat.io/rhacm2/submariner-networkplugin-syncer-rhel8\u0026tag=v0.13.3-6"
}
}
},
{
"category": "product_version",
"name": "rhacm2/submariner-operator-bundle@sha256:7dacd7a2b26ee22f62851127de612e9c18696c7db4ed06a244ce635b12cb89e2_arm64",
"product": {
"name": "rhacm2/submariner-operator-bundle@sha256:7dacd7a2b26ee22f62851127de612e9c18696c7db4ed06a244ce635b12cb89e2_arm64",
"product_id": "rhacm2/submariner-operator-bundle@sha256:7dacd7a2b26ee22f62851127de612e9c18696c7db4ed06a244ce635b12cb89e2_arm64",
"product_identification_helper": {
"purl": "pkg:oci/submariner-operator-bundle@sha256:7dacd7a2b26ee22f62851127de612e9c18696c7db4ed06a244ce635b12cb89e2?arch=arm64\u0026repository_url=registry.redhat.io/rhacm2/submariner-operator-bundle\u0026tag=v0.13.3-9"
}
}
},
{
"category": "product_version",
"name": "rhacm2/submariner-rhel8-operator@sha256:db99ef3c89ac45501a7b7fc64c6f853df5f781b2200a758e71debc4dadaf2fef_arm64",
"product": {
"name": "rhacm2/submariner-rhel8-operator@sha256:db99ef3c89ac45501a7b7fc64c6f853df5f781b2200a758e71debc4dadaf2fef_arm64",
"product_id": "rhacm2/submariner-rhel8-operator@sha256:db99ef3c89ac45501a7b7fc64c6f853df5f781b2200a758e71debc4dadaf2fef_arm64",
"product_identification_helper": {
"purl": "pkg:oci/submariner-rhel8-operator@sha256:db99ef3c89ac45501a7b7fc64c6f853df5f781b2200a758e71debc4dadaf2fef?arch=arm64\u0026repository_url=registry.redhat.io/rhacm2/submariner-rhel8-operator\u0026tag=v0.13.3-6"
}
}
},
{
"category": "product_version",
"name": "rhacm2/submariner-route-agent-rhel8@sha256:007edcf9dd166ec8c1b30f60755bcfe02dee03c2d8e539fba06615b8a3eefd58_arm64",
"product": {
"name": "rhacm2/submariner-route-agent-rhel8@sha256:007edcf9dd166ec8c1b30f60755bcfe02dee03c2d8e539fba06615b8a3eefd58_arm64",
"product_id": "rhacm2/submariner-route-agent-rhel8@sha256:007edcf9dd166ec8c1b30f60755bcfe02dee03c2d8e539fba06615b8a3eefd58_arm64",
"product_identification_helper": {
"purl": "pkg:oci/submariner-route-agent-rhel8@sha256:007edcf9dd166ec8c1b30f60755bcfe02dee03c2d8e539fba06615b8a3eefd58?arch=arm64\u0026repository_url=registry.redhat.io/rhacm2/submariner-route-agent-rhel8\u0026tag=v0.13.3-7"
}
}
}
],
"category": "architecture",
"name": "arm64"
},
{
"branches": [
{
"category": "product_version",
"name": "rhacm2/lighthouse-agent-rhel8@sha256:c45d4a19f6492a1d2d72375c12d3dfc8a7a2349ccc8b581ad7df299bd63ae0a9_ppc64le",
"product": {
"name": "rhacm2/lighthouse-agent-rhel8@sha256:c45d4a19f6492a1d2d72375c12d3dfc8a7a2349ccc8b581ad7df299bd63ae0a9_ppc64le",
"product_id": "rhacm2/lighthouse-agent-rhel8@sha256:c45d4a19f6492a1d2d72375c12d3dfc8a7a2349ccc8b581ad7df299bd63ae0a9_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/lighthouse-agent-rhel8@sha256:c45d4a19f6492a1d2d72375c12d3dfc8a7a2349ccc8b581ad7df299bd63ae0a9?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/lighthouse-agent-rhel8\u0026tag=v0.13.3-7"
}
}
},
{
"category": "product_version",
"name": "rhacm2/lighthouse-coredns-rhel8@sha256:a842e4824cd39bc438c38889896dd33372b644968b5e29b614c9529b2e0696cc_ppc64le",
"product": {
"name": "rhacm2/lighthouse-coredns-rhel8@sha256:a842e4824cd39bc438c38889896dd33372b644968b5e29b614c9529b2e0696cc_ppc64le",
"product_id": "rhacm2/lighthouse-coredns-rhel8@sha256:a842e4824cd39bc438c38889896dd33372b644968b5e29b614c9529b2e0696cc_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/lighthouse-coredns-rhel8@sha256:a842e4824cd39bc438c38889896dd33372b644968b5e29b614c9529b2e0696cc?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/lighthouse-coredns-rhel8\u0026tag=v0.13.3-7"
}
}
},
{
"category": "product_version",
"name": "rhacm2/nettest-rhel8@sha256:623848329900b7fe55763dd08bacb5fde147f0b9e8b77487f1b99a8b713d309e_ppc64le",
"product": {
"name": "rhacm2/nettest-rhel8@sha256:623848329900b7fe55763dd08bacb5fde147f0b9e8b77487f1b99a8b713d309e_ppc64le",
"product_id": "rhacm2/nettest-rhel8@sha256:623848329900b7fe55763dd08bacb5fde147f0b9e8b77487f1b99a8b713d309e_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/nettest-rhel8@sha256:623848329900b7fe55763dd08bacb5fde147f0b9e8b77487f1b99a8b713d309e?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/nettest-rhel8\u0026tag=v0.13.3-7"
}
}
},
{
"category": "product_version",
"name": "rhacm2/subctl-rhel8@sha256:2e17954946ea1fd3ec53791a1b6dfdfb59be7c24fd78816b0ba721c069350c38_ppc64le",
"product": {
"name": "rhacm2/subctl-rhel8@sha256:2e17954946ea1fd3ec53791a1b6dfdfb59be7c24fd78816b0ba721c069350c38_ppc64le",
"product_id": "rhacm2/subctl-rhel8@sha256:2e17954946ea1fd3ec53791a1b6dfdfb59be7c24fd78816b0ba721c069350c38_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/subctl-rhel8@sha256:2e17954946ea1fd3ec53791a1b6dfdfb59be7c24fd78816b0ba721c069350c38?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/subctl-rhel8\u0026tag=v0.13.3-6"
}
}
},
{
"category": "product_version",
"name": "rhacm2/submariner-gateway-rhel8@sha256:1abe2013043c37997233ed7d8785c4607be1f21ed25f130f2141f8a771f0e9d5_ppc64le",
"product": {
"name": "rhacm2/submariner-gateway-rhel8@sha256:1abe2013043c37997233ed7d8785c4607be1f21ed25f130f2141f8a771f0e9d5_ppc64le",
"product_id": "rhacm2/submariner-gateway-rhel8@sha256:1abe2013043c37997233ed7d8785c4607be1f21ed25f130f2141f8a771f0e9d5_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/submariner-gateway-rhel8@sha256:1abe2013043c37997233ed7d8785c4607be1f21ed25f130f2141f8a771f0e9d5?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/submariner-gateway-rhel8\u0026tag=v0.13.3-6"
}
}
},
{
"category": "product_version",
"name": "rhacm2/submariner-globalnet-rhel8@sha256:4ee144a663c95a2fcc1fbfc0b308cf7033a5ded97a28a5aec9f35250df812661_ppc64le",
"product": {
"name": "rhacm2/submariner-globalnet-rhel8@sha256:4ee144a663c95a2fcc1fbfc0b308cf7033a5ded97a28a5aec9f35250df812661_ppc64le",
"product_id": "rhacm2/submariner-globalnet-rhel8@sha256:4ee144a663c95a2fcc1fbfc0b308cf7033a5ded97a28a5aec9f35250df812661_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/submariner-globalnet-rhel8@sha256:4ee144a663c95a2fcc1fbfc0b308cf7033a5ded97a28a5aec9f35250df812661?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/submariner-globalnet-rhel8\u0026tag=v0.13.3-7"
}
}
},
{
"category": "product_version",
"name": "rhacm2/submariner-networkplugin-syncer-rhel8@sha256:1ef8557fc7489a74092c22e5cf96ebbec1575f72177534de2ae095ab96927a5a_ppc64le",
"product": {
"name": "rhacm2/submariner-networkplugin-syncer-rhel8@sha256:1ef8557fc7489a74092c22e5cf96ebbec1575f72177534de2ae095ab96927a5a_ppc64le",
"product_id": "rhacm2/submariner-networkplugin-syncer-rhel8@sha256:1ef8557fc7489a74092c22e5cf96ebbec1575f72177534de2ae095ab96927a5a_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/submariner-networkplugin-syncer-rhel8@sha256:1ef8557fc7489a74092c22e5cf96ebbec1575f72177534de2ae095ab96927a5a?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/submariner-networkplugin-syncer-rhel8\u0026tag=v0.13.3-6"
}
}
},
{
"category": "product_version",
"name": "rhacm2/submariner-operator-bundle@sha256:1e3de5b269f4454e822201ea7666bacab9c2962f454368b1967dd583cab5c9bc_ppc64le",
"product": {
"name": "rhacm2/submariner-operator-bundle@sha256:1e3de5b269f4454e822201ea7666bacab9c2962f454368b1967dd583cab5c9bc_ppc64le",
"product_id": "rhacm2/submariner-operator-bundle@sha256:1e3de5b269f4454e822201ea7666bacab9c2962f454368b1967dd583cab5c9bc_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/submariner-operator-bundle@sha256:1e3de5b269f4454e822201ea7666bacab9c2962f454368b1967dd583cab5c9bc?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/submariner-operator-bundle\u0026tag=v0.13.3-9"
}
}
},
{
"category": "product_version",
"name": "rhacm2/submariner-rhel8-operator@sha256:e54bed5d1233969accf57b3b11f4d934040d7d408440d900d071f8919b60affa_ppc64le",
"product": {
"name": "rhacm2/submariner-rhel8-operator@sha256:e54bed5d1233969accf57b3b11f4d934040d7d408440d900d071f8919b60affa_ppc64le",
"product_id": "rhacm2/submariner-rhel8-operator@sha256:e54bed5d1233969accf57b3b11f4d934040d7d408440d900d071f8919b60affa_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/submariner-rhel8-operator@sha256:e54bed5d1233969accf57b3b11f4d934040d7d408440d900d071f8919b60affa?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/submariner-rhel8-operator\u0026tag=v0.13.3-6"
}
}
},
{
"category": "product_version",
"name": "rhacm2/submariner-route-agent-rhel8@sha256:a08eecb9e361d8466db2adeafdf203fdc199a9d269910741909f73c341b28f4a_ppc64le",
"product": {
"name": "rhacm2/submariner-route-agent-rhel8@sha256:a08eecb9e361d8466db2adeafdf203fdc199a9d269910741909f73c341b28f4a_ppc64le",
"product_id": "rhacm2/submariner-route-agent-rhel8@sha256:a08eecb9e361d8466db2adeafdf203fdc199a9d269910741909f73c341b28f4a_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/submariner-route-agent-rhel8@sha256:a08eecb9e361d8466db2adeafdf203fdc199a9d269910741909f73c341b28f4a?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/submariner-route-agent-rhel8\u0026tag=v0.13.3-7"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "rhacm2/lighthouse-agent-rhel8@sha256:fde7510f372c447d265b01dcd0e36c7e53f0be4ab109b3d4a81b3dd857d3a127_s390x",
"product": {
"name": "rhacm2/lighthouse-agent-rhel8@sha256:fde7510f372c447d265b01dcd0e36c7e53f0be4ab109b3d4a81b3dd857d3a127_s390x",
"product_id": "rhacm2/lighthouse-agent-rhel8@sha256:fde7510f372c447d265b01dcd0e36c7e53f0be4ab109b3d4a81b3dd857d3a127_s390x",
"product_identification_helper": {
"purl": "pkg:oci/lighthouse-agent-rhel8@sha256:fde7510f372c447d265b01dcd0e36c7e53f0be4ab109b3d4a81b3dd857d3a127?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/lighthouse-agent-rhel8\u0026tag=v0.13.3-7"
}
}
},
{
"category": "product_version",
"name": "rhacm2/lighthouse-coredns-rhel8@sha256:e90e99636dce63fdc6323203694eac2aea9d7e2a0578ed444fce67144838b7ca_s390x",
"product": {
"name": "rhacm2/lighthouse-coredns-rhel8@sha256:e90e99636dce63fdc6323203694eac2aea9d7e2a0578ed444fce67144838b7ca_s390x",
"product_id": "rhacm2/lighthouse-coredns-rhel8@sha256:e90e99636dce63fdc6323203694eac2aea9d7e2a0578ed444fce67144838b7ca_s390x",
"product_identification_helper": {
"purl": "pkg:oci/lighthouse-coredns-rhel8@sha256:e90e99636dce63fdc6323203694eac2aea9d7e2a0578ed444fce67144838b7ca?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/lighthouse-coredns-rhel8\u0026tag=v0.13.3-7"
}
}
},
{
"category": "product_version",
"name": "rhacm2/nettest-rhel8@sha256:84cb8594ccf7876483cee84195d704d34721f566e6a36070f7eecaca10fb2c88_s390x",
"product": {
"name": "rhacm2/nettest-rhel8@sha256:84cb8594ccf7876483cee84195d704d34721f566e6a36070f7eecaca10fb2c88_s390x",
"product_id": "rhacm2/nettest-rhel8@sha256:84cb8594ccf7876483cee84195d704d34721f566e6a36070f7eecaca10fb2c88_s390x",
"product_identification_helper": {
"purl": "pkg:oci/nettest-rhel8@sha256:84cb8594ccf7876483cee84195d704d34721f566e6a36070f7eecaca10fb2c88?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/nettest-rhel8\u0026tag=v0.13.3-7"
}
}
},
{
"category": "product_version",
"name": "rhacm2/subctl-rhel8@sha256:18b4fa76cfef84236c8453eb0cd6b1c67d1017732fa1d5722931d8616c365cfe_s390x",
"product": {
"name": "rhacm2/subctl-rhel8@sha256:18b4fa76cfef84236c8453eb0cd6b1c67d1017732fa1d5722931d8616c365cfe_s390x",
"product_id": "rhacm2/subctl-rhel8@sha256:18b4fa76cfef84236c8453eb0cd6b1c67d1017732fa1d5722931d8616c365cfe_s390x",
"product_identification_helper": {
"purl": "pkg:oci/subctl-rhel8@sha256:18b4fa76cfef84236c8453eb0cd6b1c67d1017732fa1d5722931d8616c365cfe?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/subctl-rhel8\u0026tag=v0.13.3-6"
}
}
},
{
"category": "product_version",
"name": "rhacm2/submariner-gateway-rhel8@sha256:5100f65e2591023eb9da4512b464c49bbf7f56d1a78587e5da790d6cb52cfd7c_s390x",
"product": {
"name": "rhacm2/submariner-gateway-rhel8@sha256:5100f65e2591023eb9da4512b464c49bbf7f56d1a78587e5da790d6cb52cfd7c_s390x",
"product_id": "rhacm2/submariner-gateway-rhel8@sha256:5100f65e2591023eb9da4512b464c49bbf7f56d1a78587e5da790d6cb52cfd7c_s390x",
"product_identification_helper": {
"purl": "pkg:oci/submariner-gateway-rhel8@sha256:5100f65e2591023eb9da4512b464c49bbf7f56d1a78587e5da790d6cb52cfd7c?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/submariner-gateway-rhel8\u0026tag=v0.13.3-6"
}
}
},
{
"category": "product_version",
"name": "rhacm2/submariner-globalnet-rhel8@sha256:fb728331ee01f6fb72a54b5c5b5886ec08f014a384c1b49beec692439ec59630_s390x",
"product": {
"name": "rhacm2/submariner-globalnet-rhel8@sha256:fb728331ee01f6fb72a54b5c5b5886ec08f014a384c1b49beec692439ec59630_s390x",
"product_id": "rhacm2/submariner-globalnet-rhel8@sha256:fb728331ee01f6fb72a54b5c5b5886ec08f014a384c1b49beec692439ec59630_s390x",
"product_identification_helper": {
"purl": "pkg:oci/submariner-globalnet-rhel8@sha256:fb728331ee01f6fb72a54b5c5b5886ec08f014a384c1b49beec692439ec59630?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/submariner-globalnet-rhel8\u0026tag=v0.13.3-7"
}
}
},
{
"category": "product_version",
"name": "rhacm2/submariner-networkplugin-syncer-rhel8@sha256:50281b32dc626b66b8b38bc3fa97d799ab13b66029768e60c06d3fa5d9a29bf1_s390x",
"product": {
"name": "rhacm2/submariner-networkplugin-syncer-rhel8@sha256:50281b32dc626b66b8b38bc3fa97d799ab13b66029768e60c06d3fa5d9a29bf1_s390x",
"product_id": "rhacm2/submariner-networkplugin-syncer-rhel8@sha256:50281b32dc626b66b8b38bc3fa97d799ab13b66029768e60c06d3fa5d9a29bf1_s390x",
"product_identification_helper": {
"purl": "pkg:oci/submariner-networkplugin-syncer-rhel8@sha256:50281b32dc626b66b8b38bc3fa97d799ab13b66029768e60c06d3fa5d9a29bf1?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/submariner-networkplugin-syncer-rhel8\u0026tag=v0.13.3-6"
}
}
},
{
"category": "product_version",
"name": "rhacm2/submariner-operator-bundle@sha256:2d28ae6efe8ba1999f5ae960cc1799465188b03514697c0192be53c4a7d1e8f2_s390x",
"product": {
"name": "rhacm2/submariner-operator-bundle@sha256:2d28ae6efe8ba1999f5ae960cc1799465188b03514697c0192be53c4a7d1e8f2_s390x",
"product_id": "rhacm2/submariner-operator-bundle@sha256:2d28ae6efe8ba1999f5ae960cc1799465188b03514697c0192be53c4a7d1e8f2_s390x",
"product_identification_helper": {
"purl": "pkg:oci/submariner-operator-bundle@sha256:2d28ae6efe8ba1999f5ae960cc1799465188b03514697c0192be53c4a7d1e8f2?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/submariner-operator-bundle\u0026tag=v0.13.3-9"
}
}
},
{
"category": "product_version",
"name": "rhacm2/submariner-rhel8-operator@sha256:fc6f14a4af741d3de8c0de1859fc0925d66673b5b7ced139b758b51a52307c5a_s390x",
"product": {
"name": "rhacm2/submariner-rhel8-operator@sha256:fc6f14a4af741d3de8c0de1859fc0925d66673b5b7ced139b758b51a52307c5a_s390x",
"product_id": "rhacm2/submariner-rhel8-operator@sha256:fc6f14a4af741d3de8c0de1859fc0925d66673b5b7ced139b758b51a52307c5a_s390x",
"product_identification_helper": {
"purl": "pkg:oci/submariner-rhel8-operator@sha256:fc6f14a4af741d3de8c0de1859fc0925d66673b5b7ced139b758b51a52307c5a?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/submariner-rhel8-operator\u0026tag=v0.13.3-6"
}
}
},
{
"category": "product_version",
"name": "rhacm2/submariner-route-agent-rhel8@sha256:0b40af2abd40a0d9220fd7311770cbbf0dddbc58b5347399c13fa92dae8dc2be_s390x",
"product": {
"name": "rhacm2/submariner-route-agent-rhel8@sha256:0b40af2abd40a0d9220fd7311770cbbf0dddbc58b5347399c13fa92dae8dc2be_s390x",
"product_id": "rhacm2/submariner-route-agent-rhel8@sha256:0b40af2abd40a0d9220fd7311770cbbf0dddbc58b5347399c13fa92dae8dc2be_s390x",
"product_identification_helper": {
"purl": "pkg:oci/submariner-route-agent-rhel8@sha256:0b40af2abd40a0d9220fd7311770cbbf0dddbc58b5347399c13fa92dae8dc2be?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/submariner-route-agent-rhel8\u0026tag=v0.13.3-7"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "rhacm2/lighthouse-agent-rhel8@sha256:6f8f3c288619a58ac723cde85df5232efac7f5ccfd516cb3996b35304d11e7f5_amd64",
"product": {
"name": "rhacm2/lighthouse-agent-rhel8@sha256:6f8f3c288619a58ac723cde85df5232efac7f5ccfd516cb3996b35304d11e7f5_amd64",
"product_id": "rhacm2/lighthouse-agent-rhel8@sha256:6f8f3c288619a58ac723cde85df5232efac7f5ccfd516cb3996b35304d11e7f5_amd64",
"product_identification_helper": {
"purl": "pkg:oci/lighthouse-agent-rhel8@sha256:6f8f3c288619a58ac723cde85df5232efac7f5ccfd516cb3996b35304d11e7f5?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/lighthouse-agent-rhel8\u0026tag=v0.13.3-7"
}
}
},
{
"category": "product_version",
"name": "rhacm2/lighthouse-coredns-rhel8@sha256:3ee425b4f78fe809d50967ae7c66af42c894a1fec5ef194d17eae9fdf5902913_amd64",
"product": {
"name": "rhacm2/lighthouse-coredns-rhel8@sha256:3ee425b4f78fe809d50967ae7c66af42c894a1fec5ef194d17eae9fdf5902913_amd64",
"product_id": "rhacm2/lighthouse-coredns-rhel8@sha256:3ee425b4f78fe809d50967ae7c66af42c894a1fec5ef194d17eae9fdf5902913_amd64",
"product_identification_helper": {
"purl": "pkg:oci/lighthouse-coredns-rhel8@sha256:3ee425b4f78fe809d50967ae7c66af42c894a1fec5ef194d17eae9fdf5902913?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/lighthouse-coredns-rhel8\u0026tag=v0.13.3-7"
}
}
},
{
"category": "product_version",
"name": "rhacm2/nettest-rhel8@sha256:b674ef3a8a7e20b085ceeb9be1f536e0bc0f94dec384e88569105c865fdae224_amd64",
"product": {
"name": "rhacm2/nettest-rhel8@sha256:b674ef3a8a7e20b085ceeb9be1f536e0bc0f94dec384e88569105c865fdae224_amd64",
"product_id": "rhacm2/nettest-rhel8@sha256:b674ef3a8a7e20b085ceeb9be1f536e0bc0f94dec384e88569105c865fdae224_amd64",
"product_identification_helper": {
"purl": "pkg:oci/nettest-rhel8@sha256:b674ef3a8a7e20b085ceeb9be1f536e0bc0f94dec384e88569105c865fdae224?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/nettest-rhel8\u0026tag=v0.13.3-7"
}
}
},
{
"category": "product_version",
"name": "rhacm2/subctl-rhel8@sha256:dc61ab7c1ad6478e9bb30b36a2a356c5ec137bc0d5109e03ba57a76081015715_amd64",
"product": {
"name": "rhacm2/subctl-rhel8@sha256:dc61ab7c1ad6478e9bb30b36a2a356c5ec137bc0d5109e03ba57a76081015715_amd64",
"product_id": "rhacm2/subctl-rhel8@sha256:dc61ab7c1ad6478e9bb30b36a2a356c5ec137bc0d5109e03ba57a76081015715_amd64",
"product_identification_helper": {
"purl": "pkg:oci/subctl-rhel8@sha256:dc61ab7c1ad6478e9bb30b36a2a356c5ec137bc0d5109e03ba57a76081015715?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/subctl-rhel8\u0026tag=v0.13.3-6"
}
}
},
{
"category": "product_version",
"name": "rhacm2/submariner-gateway-rhel8@sha256:93b7d3fbd69a47187a595e09324ef603d8e0c808c99961719a56029776a25dfb_amd64",
"product": {
"name": "rhacm2/submariner-gateway-rhel8@sha256:93b7d3fbd69a47187a595e09324ef603d8e0c808c99961719a56029776a25dfb_amd64",
"product_id": "rhacm2/submariner-gateway-rhel8@sha256:93b7d3fbd69a47187a595e09324ef603d8e0c808c99961719a56029776a25dfb_amd64",
"product_identification_helper": {
"purl": "pkg:oci/submariner-gateway-rhel8@sha256:93b7d3fbd69a47187a595e09324ef603d8e0c808c99961719a56029776a25dfb?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/submariner-gateway-rhel8\u0026tag=v0.13.3-6"
}
}
},
{
"category": "product_version",
"name": "rhacm2/submariner-globalnet-rhel8@sha256:2bc43c6e55f35522be8752d1ae9eb24637a0926f91fa0f6cbf670f23a61b7840_amd64",
"product": {
"name": "rhacm2/submariner-globalnet-rhel8@sha256:2bc43c6e55f35522be8752d1ae9eb24637a0926f91fa0f6cbf670f23a61b7840_amd64",
"product_id": "rhacm2/submariner-globalnet-rhel8@sha256:2bc43c6e55f35522be8752d1ae9eb24637a0926f91fa0f6cbf670f23a61b7840_amd64",
"product_identification_helper": {
"purl": "pkg:oci/submariner-globalnet-rhel8@sha256:2bc43c6e55f35522be8752d1ae9eb24637a0926f91fa0f6cbf670f23a61b7840?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/submariner-globalnet-rhel8\u0026tag=v0.13.3-7"
}
}
},
{
"category": "product_version",
"name": "rhacm2/submariner-networkplugin-syncer-rhel8@sha256:511362c4a5dfa734d0015a355185a86ba6c00a0466f5fb1b469fa00e07858c82_amd64",
"product": {
"name": "rhacm2/submariner-networkplugin-syncer-rhel8@sha256:511362c4a5dfa734d0015a355185a86ba6c00a0466f5fb1b469fa00e07858c82_amd64",
"product_id": "rhacm2/submariner-networkplugin-syncer-rhel8@sha256:511362c4a5dfa734d0015a355185a86ba6c00a0466f5fb1b469fa00e07858c82_amd64",
"product_identification_helper": {
"purl": "pkg:oci/submariner-networkplugin-syncer-rhel8@sha256:511362c4a5dfa734d0015a355185a86ba6c00a0466f5fb1b469fa00e07858c82?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/submariner-networkplugin-syncer-rhel8\u0026tag=v0.13.3-6"
}
}
},
{
"category": "product_version",
"name": "rhacm2/submariner-operator-bundle@sha256:4c9802569b6aad59f01718b5c692f32e3a9a9b35b7b82e69fed5e1f9573dbc17_amd64",
"product": {
"name": "rhacm2/submariner-operator-bundle@sha256:4c9802569b6aad59f01718b5c692f32e3a9a9b35b7b82e69fed5e1f9573dbc17_amd64",
"product_id": "rhacm2/submariner-operator-bundle@sha256:4c9802569b6aad59f01718b5c692f32e3a9a9b35b7b82e69fed5e1f9573dbc17_amd64",
"product_identification_helper": {
"purl": "pkg:oci/submariner-operator-bundle@sha256:4c9802569b6aad59f01718b5c692f32e3a9a9b35b7b82e69fed5e1f9573dbc17?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/submariner-operator-bundle\u0026tag=v0.13.3-9"
}
}
},
{
"category": "product_version",
"name": "rhacm2/submariner-rhel8-operator@sha256:71a36fc0e726890c4a95668d10f024cd31168c26d00d7a22b9f3e26a811af803_amd64",
"product": {
"name": "rhacm2/submariner-rhel8-operator@sha256:71a36fc0e726890c4a95668d10f024cd31168c26d00d7a22b9f3e26a811af803_amd64",
"product_id": "rhacm2/submariner-rhel8-operator@sha256:71a36fc0e726890c4a95668d10f024cd31168c26d00d7a22b9f3e26a811af803_amd64",
"product_identification_helper": {
"purl": "pkg:oci/submariner-rhel8-operator@sha256:71a36fc0e726890c4a95668d10f024cd31168c26d00d7a22b9f3e26a811af803?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/submariner-rhel8-operator\u0026tag=v0.13.3-6"
}
}
},
{
"category": "product_version",
"name": "rhacm2/submariner-route-agent-rhel8@sha256:bb96dde2023a0b8a0d8b33095374ddcc828de182f04033253e716d584c8db623_amd64",
"product": {
"name": "rhacm2/submariner-route-agent-rhel8@sha256:bb96dde2023a0b8a0d8b33095374ddcc828de182f04033253e716d584c8db623_amd64",
"product_id": "rhacm2/submariner-route-agent-rhel8@sha256:bb96dde2023a0b8a0d8b33095374ddcc828de182f04033253e716d584c8db623_amd64",
"product_identification_helper": {
"purl": "pkg:oci/submariner-route-agent-rhel8@sha256:bb96dde2023a0b8a0d8b33095374ddcc828de182f04033253e716d584c8db623?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/submariner-route-agent-rhel8\u0026tag=v0.13.3-7"
}
}
}
],
"category": "architecture",
"name": "amd64"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "rhacm2/lighthouse-agent-rhel8@sha256:44576acbfff4321af54d8a8c15b0122d28ffbec8b88ebbdd32ed2dca3d4397c3_arm64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8",
"product_id": "8Base-RHACM-2.6:rhacm2/lighthouse-agent-rhel8@sha256:44576acbfff4321af54d8a8c15b0122d28ffbec8b88ebbdd32ed2dca3d4397c3_arm64"
},
"product_reference": "rhacm2/lighthouse-agent-rhel8@sha256:44576acbfff4321af54d8a8c15b0122d28ffbec8b88ebbdd32ed2dca3d4397c3_arm64",
"relates_to_product_reference": "8Base-RHACM-2.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhacm2/lighthouse-agent-rhel8@sha256:6f8f3c288619a58ac723cde85df5232efac7f5ccfd516cb3996b35304d11e7f5_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8",
"product_id": "8Base-RHACM-2.6:rhacm2/lighthouse-agent-rhel8@sha256:6f8f3c288619a58ac723cde85df5232efac7f5ccfd516cb3996b35304d11e7f5_amd64"
},
"product_reference": "rhacm2/lighthouse-agent-rhel8@sha256:6f8f3c288619a58ac723cde85df5232efac7f5ccfd516cb3996b35304d11e7f5_amd64",
"relates_to_product_reference": "8Base-RHACM-2.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhacm2/lighthouse-agent-rhel8@sha256:c45d4a19f6492a1d2d72375c12d3dfc8a7a2349ccc8b581ad7df299bd63ae0a9_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8",
"product_id": "8Base-RHACM-2.6:rhacm2/lighthouse-agent-rhel8@sha256:c45d4a19f6492a1d2d72375c12d3dfc8a7a2349ccc8b581ad7df299bd63ae0a9_ppc64le"
},
"product_reference": "rhacm2/lighthouse-agent-rhel8@sha256:c45d4a19f6492a1d2d72375c12d3dfc8a7a2349ccc8b581ad7df299bd63ae0a9_ppc64le",
"relates_to_product_reference": "8Base-RHACM-2.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhacm2/lighthouse-agent-rhel8@sha256:fde7510f372c447d265b01dcd0e36c7e53f0be4ab109b3d4a81b3dd857d3a127_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8",
"product_id": "8Base-RHACM-2.6:rhacm2/lighthouse-agent-rhel8@sha256:fde7510f372c447d265b01dcd0e36c7e53f0be4ab109b3d4a81b3dd857d3a127_s390x"
},
"product_reference": "rhacm2/lighthouse-agent-rhel8@sha256:fde7510f372c447d265b01dcd0e36c7e53f0be4ab109b3d4a81b3dd857d3a127_s390x",
"relates_to_product_reference": "8Base-RHACM-2.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhacm2/lighthouse-coredns-rhel8@sha256:3e4d5bf90e110c3cf3e988f572d227575727bf1769c02d132272b5ff5051cfb8_arm64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8",
"product_id": "8Base-RHACM-2.6:rhacm2/lighthouse-coredns-rhel8@sha256:3e4d5bf90e110c3cf3e988f572d227575727bf1769c02d132272b5ff5051cfb8_arm64"
},
"product_reference": "rhacm2/lighthouse-coredns-rhel8@sha256:3e4d5bf90e110c3cf3e988f572d227575727bf1769c02d132272b5ff5051cfb8_arm64",
"relates_to_product_reference": "8Base-RHACM-2.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhacm2/lighthouse-coredns-rhel8@sha256:3ee425b4f78fe809d50967ae7c66af42c894a1fec5ef194d17eae9fdf5902913_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8",
"product_id": "8Base-RHACM-2.6:rhacm2/lighthouse-coredns-rhel8@sha256:3ee425b4f78fe809d50967ae7c66af42c894a1fec5ef194d17eae9fdf5902913_amd64"
},
"product_reference": "rhacm2/lighthouse-coredns-rhel8@sha256:3ee425b4f78fe809d50967ae7c66af42c894a1fec5ef194d17eae9fdf5902913_amd64",
"relates_to_product_reference": "8Base-RHACM-2.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhacm2/lighthouse-coredns-rhel8@sha256:a842e4824cd39bc438c38889896dd33372b644968b5e29b614c9529b2e0696cc_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8",
"product_id": "8Base-RHACM-2.6:rhacm2/lighthouse-coredns-rhel8@sha256:a842e4824cd39bc438c38889896dd33372b644968b5e29b614c9529b2e0696cc_ppc64le"
},
"product_reference": "rhacm2/lighthouse-coredns-rhel8@sha256:a842e4824cd39bc438c38889896dd33372b644968b5e29b614c9529b2e0696cc_ppc64le",
"relates_to_product_reference": "8Base-RHACM-2.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhacm2/lighthouse-coredns-rhel8@sha256:e90e99636dce63fdc6323203694eac2aea9d7e2a0578ed444fce67144838b7ca_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8",
"product_id": "8Base-RHACM-2.6:rhacm2/lighthouse-coredns-rhel8@sha256:e90e99636dce63fdc6323203694eac2aea9d7e2a0578ed444fce67144838b7ca_s390x"
},
"product_reference": "rhacm2/lighthouse-coredns-rhel8@sha256:e90e99636dce63fdc6323203694eac2aea9d7e2a0578ed444fce67144838b7ca_s390x",
"relates_to_product_reference": "8Base-RHACM-2.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhacm2/nettest-rhel8@sha256:623848329900b7fe55763dd08bacb5fde147f0b9e8b77487f1b99a8b713d309e_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8",
"product_id": "8Base-RHACM-2.6:rhacm2/nettest-rhel8@sha256:623848329900b7fe55763dd08bacb5fde147f0b9e8b77487f1b99a8b713d309e_ppc64le"
},
"product_reference": "rhacm2/nettest-rhel8@sha256:623848329900b7fe55763dd08bacb5fde147f0b9e8b77487f1b99a8b713d309e_ppc64le",
"relates_to_product_reference": "8Base-RHACM-2.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhacm2/nettest-rhel8@sha256:84cb8594ccf7876483cee84195d704d34721f566e6a36070f7eecaca10fb2c88_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8",
"product_id": "8Base-RHACM-2.6:rhacm2/nettest-rhel8@sha256:84cb8594ccf7876483cee84195d704d34721f566e6a36070f7eecaca10fb2c88_s390x"
},
"product_reference": "rhacm2/nettest-rhel8@sha256:84cb8594ccf7876483cee84195d704d34721f566e6a36070f7eecaca10fb2c88_s390x",
"relates_to_product_reference": "8Base-RHACM-2.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhacm2/nettest-rhel8@sha256:a1197fa88e7cbaac9c4c80e13d39eda732d9ff09579d7d2e96a96bb5c005e695_arm64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8",
"product_id": "8Base-RHACM-2.6:rhacm2/nettest-rhel8@sha256:a1197fa88e7cbaac9c4c80e13d39eda732d9ff09579d7d2e96a96bb5c005e695_arm64"
},
"product_reference": "rhacm2/nettest-rhel8@sha256:a1197fa88e7cbaac9c4c80e13d39eda732d9ff09579d7d2e96a96bb5c005e695_arm64",
"relates_to_product_reference": "8Base-RHACM-2.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhacm2/nettest-rhel8@sha256:b674ef3a8a7e20b085ceeb9be1f536e0bc0f94dec384e88569105c865fdae224_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8",
"product_id": "8Base-RHACM-2.6:rhacm2/nettest-rhel8@sha256:b674ef3a8a7e20b085ceeb9be1f536e0bc0f94dec384e88569105c865fdae224_amd64"
},
"product_reference": "rhacm2/nettest-rhel8@sha256:b674ef3a8a7e20b085ceeb9be1f536e0bc0f94dec384e88569105c865fdae224_amd64",
"relates_to_product_reference": "8Base-RHACM-2.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhacm2/subctl-rhel8@sha256:18b4fa76cfef84236c8453eb0cd6b1c67d1017732fa1d5722931d8616c365cfe_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8",
"product_id": "8Base-RHACM-2.6:rhacm2/subctl-rhel8@sha256:18b4fa76cfef84236c8453eb0cd6b1c67d1017732fa1d5722931d8616c365cfe_s390x"
},
"product_reference": "rhacm2/subctl-rhel8@sha256:18b4fa76cfef84236c8453eb0cd6b1c67d1017732fa1d5722931d8616c365cfe_s390x",
"relates_to_product_reference": "8Base-RHACM-2.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhacm2/subctl-rhel8@sha256:1f4051093fb1128e7266a4baff92bb7e9864825d51947265bed4ae7c20a3f99c_arm64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8",
"product_id": "8Base-RHACM-2.6:rhacm2/subctl-rhel8@sha256:1f4051093fb1128e7266a4baff92bb7e9864825d51947265bed4ae7c20a3f99c_arm64"
},
"product_reference": "rhacm2/subctl-rhel8@sha256:1f4051093fb1128e7266a4baff92bb7e9864825d51947265bed4ae7c20a3f99c_arm64",
"relates_to_product_reference": "8Base-RHACM-2.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhacm2/subctl-rhel8@sha256:2e17954946ea1fd3ec53791a1b6dfdfb59be7c24fd78816b0ba721c069350c38_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8",
"product_id": "8Base-RHACM-2.6:rhacm2/subctl-rhel8@sha256:2e17954946ea1fd3ec53791a1b6dfdfb59be7c24fd78816b0ba721c069350c38_ppc64le"
},
"product_reference": "rhacm2/subctl-rhel8@sha256:2e17954946ea1fd3ec53791a1b6dfdfb59be7c24fd78816b0ba721c069350c38_ppc64le",
"relates_to_product_reference": "8Base-RHACM-2.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhacm2/subctl-rhel8@sha256:dc61ab7c1ad6478e9bb30b36a2a356c5ec137bc0d5109e03ba57a76081015715_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8",
"product_id": "8Base-RHACM-2.6:rhacm2/subctl-rhel8@sha256:dc61ab7c1ad6478e9bb30b36a2a356c5ec137bc0d5109e03ba57a76081015715_amd64"
},
"product_reference": "rhacm2/subctl-rhel8@sha256:dc61ab7c1ad6478e9bb30b36a2a356c5ec137bc0d5109e03ba57a76081015715_amd64",
"relates_to_product_reference": "8Base-RHACM-2.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhacm2/submariner-gateway-rhel8@sha256:1abe2013043c37997233ed7d8785c4607be1f21ed25f130f2141f8a771f0e9d5_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8",
"product_id": "8Base-RHACM-2.6:rhacm2/submariner-gateway-rhel8@sha256:1abe2013043c37997233ed7d8785c4607be1f21ed25f130f2141f8a771f0e9d5_ppc64le"
},
"product_reference": "rhacm2/submariner-gateway-rhel8@sha256:1abe2013043c37997233ed7d8785c4607be1f21ed25f130f2141f8a771f0e9d5_ppc64le",
"relates_to_product_reference": "8Base-RHACM-2.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhacm2/submariner-gateway-rhel8@sha256:5100f65e2591023eb9da4512b464c49bbf7f56d1a78587e5da790d6cb52cfd7c_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8",
"product_id": "8Base-RHACM-2.6:rhacm2/submariner-gateway-rhel8@sha256:5100f65e2591023eb9da4512b464c49bbf7f56d1a78587e5da790d6cb52cfd7c_s390x"
},
"product_reference": "rhacm2/submariner-gateway-rhel8@sha256:5100f65e2591023eb9da4512b464c49bbf7f56d1a78587e5da790d6cb52cfd7c_s390x",
"relates_to_product_reference": "8Base-RHACM-2.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhacm2/submariner-gateway-rhel8@sha256:5cd02e62ae81fea9887c484b4b4f52712b3cdfe0bff8a826e2c1c8e813df50bf_arm64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8",
"product_id": "8Base-RHACM-2.6:rhacm2/submariner-gateway-rhel8@sha256:5cd02e62ae81fea9887c484b4b4f52712b3cdfe0bff8a826e2c1c8e813df50bf_arm64"
},
"product_reference": "rhacm2/submariner-gateway-rhel8@sha256:5cd02e62ae81fea9887c484b4b4f52712b3cdfe0bff8a826e2c1c8e813df50bf_arm64",
"relates_to_product_reference": "8Base-RHACM-2.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhacm2/submariner-gateway-rhel8@sha256:93b7d3fbd69a47187a595e09324ef603d8e0c808c99961719a56029776a25dfb_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8",
"product_id": "8Base-RHACM-2.6:rhacm2/submariner-gateway-rhel8@sha256:93b7d3fbd69a47187a595e09324ef603d8e0c808c99961719a56029776a25dfb_amd64"
},
"product_reference": "rhacm2/submariner-gateway-rhel8@sha256:93b7d3fbd69a47187a595e09324ef603d8e0c808c99961719a56029776a25dfb_amd64",
"relates_to_product_reference": "8Base-RHACM-2.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhacm2/submariner-globalnet-rhel8@sha256:2bc43c6e55f35522be8752d1ae9eb24637a0926f91fa0f6cbf670f23a61b7840_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8",
"product_id": "8Base-RHACM-2.6:rhacm2/submariner-globalnet-rhel8@sha256:2bc43c6e55f35522be8752d1ae9eb24637a0926f91fa0f6cbf670f23a61b7840_amd64"
},
"product_reference": "rhacm2/submariner-globalnet-rhel8@sha256:2bc43c6e55f35522be8752d1ae9eb24637a0926f91fa0f6cbf670f23a61b7840_amd64",
"relates_to_product_reference": "8Base-RHACM-2.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhacm2/submariner-globalnet-rhel8@sha256:4ee144a663c95a2fcc1fbfc0b308cf7033a5ded97a28a5aec9f35250df812661_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8",
"product_id": "8Base-RHACM-2.6:rhacm2/submariner-globalnet-rhel8@sha256:4ee144a663c95a2fcc1fbfc0b308cf7033a5ded97a28a5aec9f35250df812661_ppc64le"
},
"product_reference": "rhacm2/submariner-globalnet-rhel8@sha256:4ee144a663c95a2fcc1fbfc0b308cf7033a5ded97a28a5aec9f35250df812661_ppc64le",
"relates_to_product_reference": "8Base-RHACM-2.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhacm2/submariner-globalnet-rhel8@sha256:dc50bdc2082127c9df0da5b539ac61d244250eb93d7fcfd3a9d2fdbb10603695_arm64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8",
"product_id": "8Base-RHACM-2.6:rhacm2/submariner-globalnet-rhel8@sha256:dc50bdc2082127c9df0da5b539ac61d244250eb93d7fcfd3a9d2fdbb10603695_arm64"
},
"product_reference": "rhacm2/submariner-globalnet-rhel8@sha256:dc50bdc2082127c9df0da5b539ac61d244250eb93d7fcfd3a9d2fdbb10603695_arm64",
"relates_to_product_reference": "8Base-RHACM-2.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhacm2/submariner-globalnet-rhel8@sha256:fb728331ee01f6fb72a54b5c5b5886ec08f014a384c1b49beec692439ec59630_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8",
"product_id": "8Base-RHACM-2.6:rhacm2/submariner-globalnet-rhel8@sha256:fb728331ee01f6fb72a54b5c5b5886ec08f014a384c1b49beec692439ec59630_s390x"
},
"product_reference": "rhacm2/submariner-globalnet-rhel8@sha256:fb728331ee01f6fb72a54b5c5b5886ec08f014a384c1b49beec692439ec59630_s390x",
"relates_to_product_reference": "8Base-RHACM-2.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhacm2/submariner-networkplugin-syncer-rhel8@sha256:1ef8557fc7489a74092c22e5cf96ebbec1575f72177534de2ae095ab96927a5a_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8",
"product_id": "8Base-RHACM-2.6:rhacm2/submariner-networkplugin-syncer-rhel8@sha256:1ef8557fc7489a74092c22e5cf96ebbec1575f72177534de2ae095ab96927a5a_ppc64le"
},
"product_reference": "rhacm2/submariner-networkplugin-syncer-rhel8@sha256:1ef8557fc7489a74092c22e5cf96ebbec1575f72177534de2ae095ab96927a5a_ppc64le",
"relates_to_product_reference": "8Base-RHACM-2.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhacm2/submariner-networkplugin-syncer-rhel8@sha256:50281b32dc626b66b8b38bc3fa97d799ab13b66029768e60c06d3fa5d9a29bf1_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8",
"product_id": "8Base-RHACM-2.6:rhacm2/submariner-networkplugin-syncer-rhel8@sha256:50281b32dc626b66b8b38bc3fa97d799ab13b66029768e60c06d3fa5d9a29bf1_s390x"
},
"product_reference": "rhacm2/submariner-networkplugin-syncer-rhel8@sha256:50281b32dc626b66b8b38bc3fa97d799ab13b66029768e60c06d3fa5d9a29bf1_s390x",
"relates_to_product_reference": "8Base-RHACM-2.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhacm2/submariner-networkplugin-syncer-rhel8@sha256:511362c4a5dfa734d0015a355185a86ba6c00a0466f5fb1b469fa00e07858c82_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8",
"product_id": "8Base-RHACM-2.6:rhacm2/submariner-networkplugin-syncer-rhel8@sha256:511362c4a5dfa734d0015a355185a86ba6c00a0466f5fb1b469fa00e07858c82_amd64"
},
"product_reference": "rhacm2/submariner-networkplugin-syncer-rhel8@sha256:511362c4a5dfa734d0015a355185a86ba6c00a0466f5fb1b469fa00e07858c82_amd64",
"relates_to_product_reference": "8Base-RHACM-2.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhacm2/submariner-networkplugin-syncer-rhel8@sha256:7076fac5d7944c7d4a0fa0e89629372466baf9fc5b4b8e5c31cc71b80fac9a69_arm64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8",
"product_id": "8Base-RHACM-2.6:rhacm2/submariner-networkplugin-syncer-rhel8@sha256:7076fac5d7944c7d4a0fa0e89629372466baf9fc5b4b8e5c31cc71b80fac9a69_arm64"
},
"product_reference": "rhacm2/submariner-networkplugin-syncer-rhel8@sha256:7076fac5d7944c7d4a0fa0e89629372466baf9fc5b4b8e5c31cc71b80fac9a69_arm64",
"relates_to_product_reference": "8Base-RHACM-2.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhacm2/submariner-operator-bundle@sha256:1e3de5b269f4454e822201ea7666bacab9c2962f454368b1967dd583cab5c9bc_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8",
"product_id": "8Base-RHACM-2.6:rhacm2/submariner-operator-bundle@sha256:1e3de5b269f4454e822201ea7666bacab9c2962f454368b1967dd583cab5c9bc_ppc64le"
},
"product_reference": "rhacm2/submariner-operator-bundle@sha256:1e3de5b269f4454e822201ea7666bacab9c2962f454368b1967dd583cab5c9bc_ppc64le",
"relates_to_product_reference": "8Base-RHACM-2.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhacm2/submariner-operator-bundle@sha256:2d28ae6efe8ba1999f5ae960cc1799465188b03514697c0192be53c4a7d1e8f2_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8",
"product_id": "8Base-RHACM-2.6:rhacm2/submariner-operator-bundle@sha256:2d28ae6efe8ba1999f5ae960cc1799465188b03514697c0192be53c4a7d1e8f2_s390x"
},
"product_reference": "rhacm2/submariner-operator-bundle@sha256:2d28ae6efe8ba1999f5ae960cc1799465188b03514697c0192be53c4a7d1e8f2_s390x",
"relates_to_product_reference": "8Base-RHACM-2.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhacm2/submariner-operator-bundle@sha256:4c9802569b6aad59f01718b5c692f32e3a9a9b35b7b82e69fed5e1f9573dbc17_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8",
"product_id": "8Base-RHACM-2.6:rhacm2/submariner-operator-bundle@sha256:4c9802569b6aad59f01718b5c692f32e3a9a9b35b7b82e69fed5e1f9573dbc17_amd64"
},
"product_reference": "rhacm2/submariner-operator-bundle@sha256:4c9802569b6aad59f01718b5c692f32e3a9a9b35b7b82e69fed5e1f9573dbc17_amd64",
"relates_to_product_reference": "8Base-RHACM-2.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhacm2/submariner-operator-bundle@sha256:7dacd7a2b26ee22f62851127de612e9c18696c7db4ed06a244ce635b12cb89e2_arm64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8",
"product_id": "8Base-RHACM-2.6:rhacm2/submariner-operator-bundle@sha256:7dacd7a2b26ee22f62851127de612e9c18696c7db4ed06a244ce635b12cb89e2_arm64"
},
"product_reference": "rhacm2/submariner-operator-bundle@sha256:7dacd7a2b26ee22f62851127de612e9c18696c7db4ed06a244ce635b12cb89e2_arm64",
"relates_to_product_reference": "8Base-RHACM-2.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhacm2/submariner-rhel8-operator@sha256:71a36fc0e726890c4a95668d10f024cd31168c26d00d7a22b9f3e26a811af803_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8",
"product_id": "8Base-RHACM-2.6:rhacm2/submariner-rhel8-operator@sha256:71a36fc0e726890c4a95668d10f024cd31168c26d00d7a22b9f3e26a811af803_amd64"
},
"product_reference": "rhacm2/submariner-rhel8-operator@sha256:71a36fc0e726890c4a95668d10f024cd31168c26d00d7a22b9f3e26a811af803_amd64",
"relates_to_product_reference": "8Base-RHACM-2.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhacm2/submariner-rhel8-operator@sha256:db99ef3c89ac45501a7b7fc64c6f853df5f781b2200a758e71debc4dadaf2fef_arm64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8",
"product_id": "8Base-RHACM-2.6:rhacm2/submariner-rhel8-operator@sha256:db99ef3c89ac45501a7b7fc64c6f853df5f781b2200a758e71debc4dadaf2fef_arm64"
},
"product_reference": "rhacm2/submariner-rhel8-operator@sha256:db99ef3c89ac45501a7b7fc64c6f853df5f781b2200a758e71debc4dadaf2fef_arm64",
"relates_to_product_reference": "8Base-RHACM-2.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhacm2/submariner-rhel8-operator@sha256:e54bed5d1233969accf57b3b11f4d934040d7d408440d900d071f8919b60affa_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8",
"product_id": "8Base-RHACM-2.6:rhacm2/submariner-rhel8-operator@sha256:e54bed5d1233969accf57b3b11f4d934040d7d408440d900d071f8919b60affa_ppc64le"
},
"product_reference": "rhacm2/submariner-rhel8-operator@sha256:e54bed5d1233969accf57b3b11f4d934040d7d408440d900d071f8919b60affa_ppc64le",
"relates_to_product_reference": "8Base-RHACM-2.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhacm2/submariner-rhel8-operator@sha256:fc6f14a4af741d3de8c0de1859fc0925d66673b5b7ced139b758b51a52307c5a_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8",
"product_id": "8Base-RHACM-2.6:rhacm2/submariner-rhel8-operator@sha256:fc6f14a4af741d3de8c0de1859fc0925d66673b5b7ced139b758b51a52307c5a_s390x"
},
"product_reference": "rhacm2/submariner-rhel8-operator@sha256:fc6f14a4af741d3de8c0de1859fc0925d66673b5b7ced139b758b51a52307c5a_s390x",
"relates_to_product_reference": "8Base-RHACM-2.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhacm2/submariner-route-agent-rhel8@sha256:007edcf9dd166ec8c1b30f60755bcfe02dee03c2d8e539fba06615b8a3eefd58_arm64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8",
"product_id": "8Base-RHACM-2.6:rhacm2/submariner-route-agent-rhel8@sha256:007edcf9dd166ec8c1b30f60755bcfe02dee03c2d8e539fba06615b8a3eefd58_arm64"
},
"product_reference": "rhacm2/submariner-route-agent-rhel8@sha256:007edcf9dd166ec8c1b30f60755bcfe02dee03c2d8e539fba06615b8a3eefd58_arm64",
"relates_to_product_reference": "8Base-RHACM-2.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhacm2/submariner-route-agent-rhel8@sha256:0b40af2abd40a0d9220fd7311770cbbf0dddbc58b5347399c13fa92dae8dc2be_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8",
"product_id": "8Base-RHACM-2.6:rhacm2/submariner-route-agent-rhel8@sha256:0b40af2abd40a0d9220fd7311770cbbf0dddbc58b5347399c13fa92dae8dc2be_s390x"
},
"product_reference": "rhacm2/submariner-route-agent-rhel8@sha256:0b40af2abd40a0d9220fd7311770cbbf0dddbc58b5347399c13fa92dae8dc2be_s390x",
"relates_to_product_reference": "8Base-RHACM-2.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhacm2/submariner-route-agent-rhel8@sha256:a08eecb9e361d8466db2adeafdf203fdc199a9d269910741909f73c341b28f4a_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8",
"product_id": "8Base-RHACM-2.6:rhacm2/submariner-route-agent-rhel8@sha256:a08eecb9e361d8466db2adeafdf203fdc199a9d269910741909f73c341b28f4a_ppc64le"
},
"product_reference": "rhacm2/submariner-route-agent-rhel8@sha256:a08eecb9e361d8466db2adeafdf203fdc199a9d269910741909f73c341b28f4a_ppc64le",
"relates_to_product_reference": "8Base-RHACM-2.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhacm2/submariner-route-agent-rhel8@sha256:bb96dde2023a0b8a0d8b33095374ddcc828de182f04033253e716d584c8db623_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8",
"product_id": "8Base-RHACM-2.6:rhacm2/submariner-route-agent-rhel8@sha256:bb96dde2023a0b8a0d8b33095374ddcc828de182f04033253e716d584c8db623_amd64"
},
"product_reference": "rhacm2/submariner-route-agent-rhel8@sha256:bb96dde2023a0b8a0d8b33095374ddcc828de182f04033253e716d584c8db623_amd64",
"relates_to_product_reference": "8Base-RHACM-2.6"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2022-32149",
"cwe": {
"id": "CWE-407",
"name": "Inefficient Algorithmic Complexity"
},
"discovery_date": "2022-10-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2134010"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in the golang.org/x/text/language package. An attacker can craft an Accept-Language header which ParseAcceptLanguage will take significant time to parse. This issue leads to a denial of service, and can impact availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: golang.org/x/text/language: ParseAcceptLanguage takes a long time to parse complex tags",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-RHACM-2.6:rhacm2/lighthouse-agent-rhel8@sha256:44576acbfff4321af54d8a8c15b0122d28ffbec8b88ebbdd32ed2dca3d4397c3_arm64",
"8Base-RHACM-2.6:rhacm2/lighthouse-agent-rhel8@sha256:6f8f3c288619a58ac723cde85df5232efac7f5ccfd516cb3996b35304d11e7f5_amd64",
"8Base-RHACM-2.6:rhacm2/lighthouse-agent-rhel8@sha256:c45d4a19f6492a1d2d72375c12d3dfc8a7a2349ccc8b581ad7df299bd63ae0a9_ppc64le",
"8Base-RHACM-2.6:rhacm2/lighthouse-agent-rhel8@sha256:fde7510f372c447d265b01dcd0e36c7e53f0be4ab109b3d4a81b3dd857d3a127_s390x",
"8Base-RHACM-2.6:rhacm2/lighthouse-coredns-rhel8@sha256:3e4d5bf90e110c3cf3e988f572d227575727bf1769c02d132272b5ff5051cfb8_arm64",
"8Base-RHACM-2.6:rhacm2/lighthouse-coredns-rhel8@sha256:3ee425b4f78fe809d50967ae7c66af42c894a1fec5ef194d17eae9fdf5902913_amd64",
"8Base-RHACM-2.6:rhacm2/lighthouse-coredns-rhel8@sha256:a842e4824cd39bc438c38889896dd33372b644968b5e29b614c9529b2e0696cc_ppc64le",
"8Base-RHACM-2.6:rhacm2/lighthouse-coredns-rhel8@sha256:e90e99636dce63fdc6323203694eac2aea9d7e2a0578ed444fce67144838b7ca_s390x",
"8Base-RHACM-2.6:rhacm2/nettest-rhel8@sha256:623848329900b7fe55763dd08bacb5fde147f0b9e8b77487f1b99a8b713d309e_ppc64le",
"8Base-RHACM-2.6:rhacm2/nettest-rhel8@sha256:84cb8594ccf7876483cee84195d704d34721f566e6a36070f7eecaca10fb2c88_s390x",
"8Base-RHACM-2.6:rhacm2/nettest-rhel8@sha256:a1197fa88e7cbaac9c4c80e13d39eda732d9ff09579d7d2e96a96bb5c005e695_arm64",
"8Base-RHACM-2.6:rhacm2/nettest-rhel8@sha256:b674ef3a8a7e20b085ceeb9be1f536e0bc0f94dec384e88569105c865fdae224_amd64",
"8Base-RHACM-2.6:rhacm2/subctl-rhel8@sha256:18b4fa76cfef84236c8453eb0cd6b1c67d1017732fa1d5722931d8616c365cfe_s390x",
"8Base-RHACM-2.6:rhacm2/subctl-rhel8@sha256:1f4051093fb1128e7266a4baff92bb7e9864825d51947265bed4ae7c20a3f99c_arm64",
"8Base-RHACM-2.6:rhacm2/subctl-rhel8@sha256:2e17954946ea1fd3ec53791a1b6dfdfb59be7c24fd78816b0ba721c069350c38_ppc64le",
"8Base-RHACM-2.6:rhacm2/subctl-rhel8@sha256:dc61ab7c1ad6478e9bb30b36a2a356c5ec137bc0d5109e03ba57a76081015715_amd64",
"8Base-RHACM-2.6:rhacm2/submariner-gateway-rhel8@sha256:1abe2013043c37997233ed7d8785c4607be1f21ed25f130f2141f8a771f0e9d5_ppc64le",
"8Base-RHACM-2.6:rhacm2/submariner-gateway-rhel8@sha256:5100f65e2591023eb9da4512b464c49bbf7f56d1a78587e5da790d6cb52cfd7c_s390x",
"8Base-RHACM-2.6:rhacm2/submariner-gateway-rhel8@sha256:5cd02e62ae81fea9887c484b4b4f52712b3cdfe0bff8a826e2c1c8e813df50bf_arm64",
"8Base-RHACM-2.6:rhacm2/submariner-gateway-rhel8@sha256:93b7d3fbd69a47187a595e09324ef603d8e0c808c99961719a56029776a25dfb_amd64",
"8Base-RHACM-2.6:rhacm2/submariner-globalnet-rhel8@sha256:2bc43c6e55f35522be8752d1ae9eb24637a0926f91fa0f6cbf670f23a61b7840_amd64",
"8Base-RHACM-2.6:rhacm2/submariner-globalnet-rhel8@sha256:4ee144a663c95a2fcc1fbfc0b308cf7033a5ded97a28a5aec9f35250df812661_ppc64le",
"8Base-RHACM-2.6:rhacm2/submariner-globalnet-rhel8@sha256:dc50bdc2082127c9df0da5b539ac61d244250eb93d7fcfd3a9d2fdbb10603695_arm64",
"8Base-RHACM-2.6:rhacm2/submariner-globalnet-rhel8@sha256:fb728331ee01f6fb72a54b5c5b5886ec08f014a384c1b49beec692439ec59630_s390x",
"8Base-RHACM-2.6:rhacm2/submariner-networkplugin-syncer-rhel8@sha256:1ef8557fc7489a74092c22e5cf96ebbec1575f72177534de2ae095ab96927a5a_ppc64le",
"8Base-RHACM-2.6:rhacm2/submariner-networkplugin-syncer-rhel8@sha256:50281b32dc626b66b8b38bc3fa97d799ab13b66029768e60c06d3fa5d9a29bf1_s390x",
"8Base-RHACM-2.6:rhacm2/submariner-networkplugin-syncer-rhel8@sha256:511362c4a5dfa734d0015a355185a86ba6c00a0466f5fb1b469fa00e07858c82_amd64",
"8Base-RHACM-2.6:rhacm2/submariner-networkplugin-syncer-rhel8@sha256:7076fac5d7944c7d4a0fa0e89629372466baf9fc5b4b8e5c31cc71b80fac9a69_arm64",
"8Base-RHACM-2.6:rhacm2/submariner-operator-bundle@sha256:1e3de5b269f4454e822201ea7666bacab9c2962f454368b1967dd583cab5c9bc_ppc64le",
"8Base-RHACM-2.6:rhacm2/submariner-operator-bundle@sha256:2d28ae6efe8ba1999f5ae960cc1799465188b03514697c0192be53c4a7d1e8f2_s390x",
"8Base-RHACM-2.6:rhacm2/submariner-operator-bundle@sha256:4c9802569b6aad59f01718b5c692f32e3a9a9b35b7b82e69fed5e1f9573dbc17_amd64",
"8Base-RHACM-2.6:rhacm2/submariner-operator-bundle@sha256:7dacd7a2b26ee22f62851127de612e9c18696c7db4ed06a244ce635b12cb89e2_arm64",
"8Base-RHACM-2.6:rhacm2/submariner-rhel8-operator@sha256:71a36fc0e726890c4a95668d10f024cd31168c26d00d7a22b9f3e26a811af803_amd64",
"8Base-RHACM-2.6:rhacm2/submariner-rhel8-operator@sha256:db99ef3c89ac45501a7b7fc64c6f853df5f781b2200a758e71debc4dadaf2fef_arm64",
"8Base-RHACM-2.6:rhacm2/submariner-rhel8-operator@sha256:e54bed5d1233969accf57b3b11f4d934040d7d408440d900d071f8919b60affa_ppc64le",
"8Base-RHACM-2.6:rhacm2/submariner-rhel8-operator@sha256:fc6f14a4af741d3de8c0de1859fc0925d66673b5b7ced139b758b51a52307c5a_s390x",
"8Base-RHACM-2.6:rhacm2/submariner-route-agent-rhel8@sha256:007edcf9dd166ec8c1b30f60755bcfe02dee03c2d8e539fba06615b8a3eefd58_arm64",
"8Base-RHACM-2.6:rhacm2/submariner-route-agent-rhel8@sha256:0b40af2abd40a0d9220fd7311770cbbf0dddbc58b5347399c13fa92dae8dc2be_s390x",
"8Base-RHACM-2.6:rhacm2/submariner-route-agent-rhel8@sha256:a08eecb9e361d8466db2adeafdf203fdc199a9d269910741909f73c341b28f4a_ppc64le",
"8Base-RHACM-2.6:rhacm2/submariner-route-agent-rhel8@sha256:bb96dde2023a0b8a0d8b33095374ddcc828de182f04033253e716d584c8db623_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-32149"
},
{
"category": "external",
"summary": "RHBZ#2134010",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2134010"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-32149",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32149"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-32149",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-32149"
},
{
"category": "external",
"summary": "https://go.dev/issue/56152",
"url": "https://go.dev/issue/56152"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-dev/c/qfPIly0X7aU",
"url": "https://groups.google.com/g/golang-dev/c/qfPIly0X7aU"
}
],
"release_date": "2022-10-11T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-02-15T21:46:51+00:00",
"details": "For details on how to install Submariner, refer to:\n\nhttps://access.redhat.com/documentation/en-us/red_hat_advanced_cluster_management_for_kubernetes/2.6/html/add-ons/add-ons-overview#submariner-deploy-console\n\nand\n\nhttps://submariner.io/getting-started/",
"product_ids": [
"8Base-RHACM-2.6:rhacm2/lighthouse-agent-rhel8@sha256:44576acbfff4321af54d8a8c15b0122d28ffbec8b88ebbdd32ed2dca3d4397c3_arm64",
"8Base-RHACM-2.6:rhacm2/lighthouse-agent-rhel8@sha256:6f8f3c288619a58ac723cde85df5232efac7f5ccfd516cb3996b35304d11e7f5_amd64",
"8Base-RHACM-2.6:rhacm2/lighthouse-agent-rhel8@sha256:c45d4a19f6492a1d2d72375c12d3dfc8a7a2349ccc8b581ad7df299bd63ae0a9_ppc64le",
"8Base-RHACM-2.6:rhacm2/lighthouse-agent-rhel8@sha256:fde7510f372c447d265b01dcd0e36c7e53f0be4ab109b3d4a81b3dd857d3a127_s390x",
"8Base-RHACM-2.6:rhacm2/lighthouse-coredns-rhel8@sha256:3e4d5bf90e110c3cf3e988f572d227575727bf1769c02d132272b5ff5051cfb8_arm64",
"8Base-RHACM-2.6:rhacm2/lighthouse-coredns-rhel8@sha256:3ee425b4f78fe809d50967ae7c66af42c894a1fec5ef194d17eae9fdf5902913_amd64",
"8Base-RHACM-2.6:rhacm2/lighthouse-coredns-rhel8@sha256:a842e4824cd39bc438c38889896dd33372b644968b5e29b614c9529b2e0696cc_ppc64le",
"8Base-RHACM-2.6:rhacm2/lighthouse-coredns-rhel8@sha256:e90e99636dce63fdc6323203694eac2aea9d7e2a0578ed444fce67144838b7ca_s390x",
"8Base-RHACM-2.6:rhacm2/nettest-rhel8@sha256:623848329900b7fe55763dd08bacb5fde147f0b9e8b77487f1b99a8b713d309e_ppc64le",
"8Base-RHACM-2.6:rhacm2/nettest-rhel8@sha256:84cb8594ccf7876483cee84195d704d34721f566e6a36070f7eecaca10fb2c88_s390x",
"8Base-RHACM-2.6:rhacm2/nettest-rhel8@sha256:a1197fa88e7cbaac9c4c80e13d39eda732d9ff09579d7d2e96a96bb5c005e695_arm64",
"8Base-RHACM-2.6:rhacm2/nettest-rhel8@sha256:b674ef3a8a7e20b085ceeb9be1f536e0bc0f94dec384e88569105c865fdae224_amd64",
"8Base-RHACM-2.6:rhacm2/subctl-rhel8@sha256:18b4fa76cfef84236c8453eb0cd6b1c67d1017732fa1d5722931d8616c365cfe_s390x",
"8Base-RHACM-2.6:rhacm2/subctl-rhel8@sha256:1f4051093fb1128e7266a4baff92bb7e9864825d51947265bed4ae7c20a3f99c_arm64",
"8Base-RHACM-2.6:rhacm2/subctl-rhel8@sha256:2e17954946ea1fd3ec53791a1b6dfdfb59be7c24fd78816b0ba721c069350c38_ppc64le",
"8Base-RHACM-2.6:rhacm2/subctl-rhel8@sha256:dc61ab7c1ad6478e9bb30b36a2a356c5ec137bc0d5109e03ba57a76081015715_amd64",
"8Base-RHACM-2.6:rhacm2/submariner-gateway-rhel8@sha256:1abe2013043c37997233ed7d8785c4607be1f21ed25f130f2141f8a771f0e9d5_ppc64le",
"8Base-RHACM-2.6:rhacm2/submariner-gateway-rhel8@sha256:5100f65e2591023eb9da4512b464c49bbf7f56d1a78587e5da790d6cb52cfd7c_s390x",
"8Base-RHACM-2.6:rhacm2/submariner-gateway-rhel8@sha256:5cd02e62ae81fea9887c484b4b4f52712b3cdfe0bff8a826e2c1c8e813df50bf_arm64",
"8Base-RHACM-2.6:rhacm2/submariner-gateway-rhel8@sha256:93b7d3fbd69a47187a595e09324ef603d8e0c808c99961719a56029776a25dfb_amd64",
"8Base-RHACM-2.6:rhacm2/submariner-globalnet-rhel8@sha256:2bc43c6e55f35522be8752d1ae9eb24637a0926f91fa0f6cbf670f23a61b7840_amd64",
"8Base-RHACM-2.6:rhacm2/submariner-globalnet-rhel8@sha256:4ee144a663c95a2fcc1fbfc0b308cf7033a5ded97a28a5aec9f35250df812661_ppc64le",
"8Base-RHACM-2.6:rhacm2/submariner-globalnet-rhel8@sha256:dc50bdc2082127c9df0da5b539ac61d244250eb93d7fcfd3a9d2fdbb10603695_arm64",
"8Base-RHACM-2.6:rhacm2/submariner-globalnet-rhel8@sha256:fb728331ee01f6fb72a54b5c5b5886ec08f014a384c1b49beec692439ec59630_s390x",
"8Base-RHACM-2.6:rhacm2/submariner-networkplugin-syncer-rhel8@sha256:1ef8557fc7489a74092c22e5cf96ebbec1575f72177534de2ae095ab96927a5a_ppc64le",
"8Base-RHACM-2.6:rhacm2/submariner-networkplugin-syncer-rhel8@sha256:50281b32dc626b66b8b38bc3fa97d799ab13b66029768e60c06d3fa5d9a29bf1_s390x",
"8Base-RHACM-2.6:rhacm2/submariner-networkplugin-syncer-rhel8@sha256:511362c4a5dfa734d0015a355185a86ba6c00a0466f5fb1b469fa00e07858c82_amd64",
"8Base-RHACM-2.6:rhacm2/submariner-networkplugin-syncer-rhel8@sha256:7076fac5d7944c7d4a0fa0e89629372466baf9fc5b4b8e5c31cc71b80fac9a69_arm64",
"8Base-RHACM-2.6:rhacm2/submariner-operator-bundle@sha256:1e3de5b269f4454e822201ea7666bacab9c2962f454368b1967dd583cab5c9bc_ppc64le",
"8Base-RHACM-2.6:rhacm2/submariner-operator-bundle@sha256:2d28ae6efe8ba1999f5ae960cc1799465188b03514697c0192be53c4a7d1e8f2_s390x",
"8Base-RHACM-2.6:rhacm2/submariner-operator-bundle@sha256:4c9802569b6aad59f01718b5c692f32e3a9a9b35b7b82e69fed5e1f9573dbc17_amd64",
"8Base-RHACM-2.6:rhacm2/submariner-operator-bundle@sha256:7dacd7a2b26ee22f62851127de612e9c18696c7db4ed06a244ce635b12cb89e2_arm64",
"8Base-RHACM-2.6:rhacm2/submariner-rhel8-operator@sha256:71a36fc0e726890c4a95668d10f024cd31168c26d00d7a22b9f3e26a811af803_amd64",
"8Base-RHACM-2.6:rhacm2/submariner-rhel8-operator@sha256:db99ef3c89ac45501a7b7fc64c6f853df5f781b2200a758e71debc4dadaf2fef_arm64",
"8Base-RHACM-2.6:rhacm2/submariner-rhel8-operator@sha256:e54bed5d1233969accf57b3b11f4d934040d7d408440d900d071f8919b60affa_ppc64le",
"8Base-RHACM-2.6:rhacm2/submariner-rhel8-operator@sha256:fc6f14a4af741d3de8c0de1859fc0925d66673b5b7ced139b758b51a52307c5a_s390x",
"8Base-RHACM-2.6:rhacm2/submariner-route-agent-rhel8@sha256:007edcf9dd166ec8c1b30f60755bcfe02dee03c2d8e539fba06615b8a3eefd58_arm64",
"8Base-RHACM-2.6:rhacm2/submariner-route-agent-rhel8@sha256:0b40af2abd40a0d9220fd7311770cbbf0dddbc58b5347399c13fa92dae8dc2be_s390x",
"8Base-RHACM-2.6:rhacm2/submariner-route-agent-rhel8@sha256:a08eecb9e361d8466db2adeafdf203fdc199a9d269910741909f73c341b28f4a_ppc64le",
"8Base-RHACM-2.6:rhacm2/submariner-route-agent-rhel8@sha256:bb96dde2023a0b8a0d8b33095374ddcc828de182f04033253e716d584c8db623_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:0795"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"8Base-RHACM-2.6:rhacm2/lighthouse-agent-rhel8@sha256:44576acbfff4321af54d8a8c15b0122d28ffbec8b88ebbdd32ed2dca3d4397c3_arm64",
"8Base-RHACM-2.6:rhacm2/lighthouse-agent-rhel8@sha256:6f8f3c288619a58ac723cde85df5232efac7f5ccfd516cb3996b35304d11e7f5_amd64",
"8Base-RHACM-2.6:rhacm2/lighthouse-agent-rhel8@sha256:c45d4a19f6492a1d2d72375c12d3dfc8a7a2349ccc8b581ad7df299bd63ae0a9_ppc64le",
"8Base-RHACM-2.6:rhacm2/lighthouse-agent-rhel8@sha256:fde7510f372c447d265b01dcd0e36c7e53f0be4ab109b3d4a81b3dd857d3a127_s390x",
"8Base-RHACM-2.6:rhacm2/lighthouse-coredns-rhel8@sha256:3e4d5bf90e110c3cf3e988f572d227575727bf1769c02d132272b5ff5051cfb8_arm64",
"8Base-RHACM-2.6:rhacm2/lighthouse-coredns-rhel8@sha256:3ee425b4f78fe809d50967ae7c66af42c894a1fec5ef194d17eae9fdf5902913_amd64",
"8Base-RHACM-2.6:rhacm2/lighthouse-coredns-rhel8@sha256:a842e4824cd39bc438c38889896dd33372b644968b5e29b614c9529b2e0696cc_ppc64le",
"8Base-RHACM-2.6:rhacm2/lighthouse-coredns-rhel8@sha256:e90e99636dce63fdc6323203694eac2aea9d7e2a0578ed444fce67144838b7ca_s390x",
"8Base-RHACM-2.6:rhacm2/nettest-rhel8@sha256:623848329900b7fe55763dd08bacb5fde147f0b9e8b77487f1b99a8b713d309e_ppc64le",
"8Base-RHACM-2.6:rhacm2/nettest-rhel8@sha256:84cb8594ccf7876483cee84195d704d34721f566e6a36070f7eecaca10fb2c88_s390x",
"8Base-RHACM-2.6:rhacm2/nettest-rhel8@sha256:a1197fa88e7cbaac9c4c80e13d39eda732d9ff09579d7d2e96a96bb5c005e695_arm64",
"8Base-RHACM-2.6:rhacm2/nettest-rhel8@sha256:b674ef3a8a7e20b085ceeb9be1f536e0bc0f94dec384e88569105c865fdae224_amd64",
"8Base-RHACM-2.6:rhacm2/subctl-rhel8@sha256:18b4fa76cfef84236c8453eb0cd6b1c67d1017732fa1d5722931d8616c365cfe_s390x",
"8Base-RHACM-2.6:rhacm2/subctl-rhel8@sha256:1f4051093fb1128e7266a4baff92bb7e9864825d51947265bed4ae7c20a3f99c_arm64",
"8Base-RHACM-2.6:rhacm2/subctl-rhel8@sha256:2e17954946ea1fd3ec53791a1b6dfdfb59be7c24fd78816b0ba721c069350c38_ppc64le",
"8Base-RHACM-2.6:rhacm2/subctl-rhel8@sha256:dc61ab7c1ad6478e9bb30b36a2a356c5ec137bc0d5109e03ba57a76081015715_amd64",
"8Base-RHACM-2.6:rhacm2/submariner-gateway-rhel8@sha256:1abe2013043c37997233ed7d8785c4607be1f21ed25f130f2141f8a771f0e9d5_ppc64le",
"8Base-RHACM-2.6:rhacm2/submariner-gateway-rhel8@sha256:5100f65e2591023eb9da4512b464c49bbf7f56d1a78587e5da790d6cb52cfd7c_s390x",
"8Base-RHACM-2.6:rhacm2/submariner-gateway-rhel8@sha256:5cd02e62ae81fea9887c484b4b4f52712b3cdfe0bff8a826e2c1c8e813df50bf_arm64",
"8Base-RHACM-2.6:rhacm2/submariner-gateway-rhel8@sha256:93b7d3fbd69a47187a595e09324ef603d8e0c808c99961719a56029776a25dfb_amd64",
"8Base-RHACM-2.6:rhacm2/submariner-globalnet-rhel8@sha256:2bc43c6e55f35522be8752d1ae9eb24637a0926f91fa0f6cbf670f23a61b7840_amd64",
"8Base-RHACM-2.6:rhacm2/submariner-globalnet-rhel8@sha256:4ee144a663c95a2fcc1fbfc0b308cf7033a5ded97a28a5aec9f35250df812661_ppc64le",
"8Base-RHACM-2.6:rhacm2/submariner-globalnet-rhel8@sha256:dc50bdc2082127c9df0da5b539ac61d244250eb93d7fcfd3a9d2fdbb10603695_arm64",
"8Base-RHACM-2.6:rhacm2/submariner-globalnet-rhel8@sha256:fb728331ee01f6fb72a54b5c5b5886ec08f014a384c1b49beec692439ec59630_s390x",
"8Base-RHACM-2.6:rhacm2/submariner-networkplugin-syncer-rhel8@sha256:1ef8557fc7489a74092c22e5cf96ebbec1575f72177534de2ae095ab96927a5a_ppc64le",
"8Base-RHACM-2.6:rhacm2/submariner-networkplugin-syncer-rhel8@sha256:50281b32dc626b66b8b38bc3fa97d799ab13b66029768e60c06d3fa5d9a29bf1_s390x",
"8Base-RHACM-2.6:rhacm2/submariner-networkplugin-syncer-rhel8@sha256:511362c4a5dfa734d0015a355185a86ba6c00a0466f5fb1b469fa00e07858c82_amd64",
"8Base-RHACM-2.6:rhacm2/submariner-networkplugin-syncer-rhel8@sha256:7076fac5d7944c7d4a0fa0e89629372466baf9fc5b4b8e5c31cc71b80fac9a69_arm64",
"8Base-RHACM-2.6:rhacm2/submariner-operator-bundle@sha256:1e3de5b269f4454e822201ea7666bacab9c2962f454368b1967dd583cab5c9bc_ppc64le",
"8Base-RHACM-2.6:rhacm2/submariner-operator-bundle@sha256:2d28ae6efe8ba1999f5ae960cc1799465188b03514697c0192be53c4a7d1e8f2_s390x",
"8Base-RHACM-2.6:rhacm2/submariner-operator-bundle@sha256:4c9802569b6aad59f01718b5c692f32e3a9a9b35b7b82e69fed5e1f9573dbc17_amd64",
"8Base-RHACM-2.6:rhacm2/submariner-operator-bundle@sha256:7dacd7a2b26ee22f62851127de612e9c18696c7db4ed06a244ce635b12cb89e2_arm64",
"8Base-RHACM-2.6:rhacm2/submariner-rhel8-operator@sha256:71a36fc0e726890c4a95668d10f024cd31168c26d00d7a22b9f3e26a811af803_amd64",
"8Base-RHACM-2.6:rhacm2/submariner-rhel8-operator@sha256:db99ef3c89ac45501a7b7fc64c6f853df5f781b2200a758e71debc4dadaf2fef_arm64",
"8Base-RHACM-2.6:rhacm2/submariner-rhel8-operator@sha256:e54bed5d1233969accf57b3b11f4d934040d7d408440d900d071f8919b60affa_ppc64le",
"8Base-RHACM-2.6:rhacm2/submariner-rhel8-operator@sha256:fc6f14a4af741d3de8c0de1859fc0925d66673b5b7ced139b758b51a52307c5a_s390x",
"8Base-RHACM-2.6:rhacm2/submariner-route-agent-rhel8@sha256:007edcf9dd166ec8c1b30f60755bcfe02dee03c2d8e539fba06615b8a3eefd58_arm64",
"8Base-RHACM-2.6:rhacm2/submariner-route-agent-rhel8@sha256:0b40af2abd40a0d9220fd7311770cbbf0dddbc58b5347399c13fa92dae8dc2be_s390x",
"8Base-RHACM-2.6:rhacm2/submariner-route-agent-rhel8@sha256:a08eecb9e361d8466db2adeafdf203fdc199a9d269910741909f73c341b28f4a_ppc64le",
"8Base-RHACM-2.6:rhacm2/submariner-route-agent-rhel8@sha256:bb96dde2023a0b8a0d8b33095374ddcc828de182f04033253e716d584c8db623_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "golang: golang.org/x/text/language: ParseAcceptLanguage takes a long time to parse complex tags"
}
]
}
rhsa-2022:7434
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Logging Subsystem 5.5.4 - Red Hat OpenShift\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Logging Subsystem 5.5.4 - Red Hat OpenShift\n\nSecurity Fix(es):\n\n* golang: golang.org/x/text/language: ParseAcceptLanguage takes a long time to parse complex tags (CVE-2022-32149)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2022:7434",
"url": "https://access.redhat.com/errata/RHSA-2022:7434"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#moderate",
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "2134010",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2134010"
},
{
"category": "external",
"summary": "LOG-2674",
"url": "https://issues.redhat.com/browse/LOG-2674"
},
{
"category": "external",
"summary": "LOG-3042",
"url": "https://issues.redhat.com/browse/LOG-3042"
},
{
"category": "external",
"summary": "LOG-3049",
"url": "https://issues.redhat.com/browse/LOG-3049"
},
{
"category": "external",
"summary": "LOG-3127",
"url": "https://issues.redhat.com/browse/LOG-3127"
},
{
"category": "external",
"summary": "LOG-3138",
"url": "https://issues.redhat.com/browse/LOG-3138"
},
{
"category": "external",
"summary": "LOG-3175",
"url": "https://issues.redhat.com/browse/LOG-3175"
},
{
"category": "external",
"summary": "LOG-3213",
"url": "https://issues.redhat.com/browse/LOG-3213"
},
{
"category": "external",
"summary": "LOG-3234",
"url": "https://issues.redhat.com/browse/LOG-3234"
},
{
"category": "external",
"summary": "LOG-3251",
"url": "https://issues.redhat.com/browse/LOG-3251"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2022/rhsa-2022_7434.json"
}
],
"title": "Red Hat Security Advisory: Logging Subsystem 5.5.4 - Red Hat OpenShift security update",
"tracking": {
"current_release_date": "2025-10-10T01:53:21+00:00",
"generator": {
"date": "2025-10-10T01:53:21+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.9"
}
},
"id": "RHSA-2022:7434",
"initial_release_date": "2022-11-10T03:50:23+00:00",
"revision_history": [
{
"date": "2022-11-10T03:50:23+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2022-11-10T03:50:23+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-10-10T01:53:21+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "RHOL 5.5 for RHEL 8",
"product": {
"name": "RHOL 5.5 for RHEL 8",
"product_id": "8Base-RHOL-5.5",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:logging:5.5::el8"
}
}
}
],
"category": "product_family",
"name": "logging for Red Hat OpenShift"
},
{
"branches": [
{
"category": "product_version",
"name": "openshift-logging/cluster-logging-rhel8-operator@sha256:07ab076aa9b573d330ace59bf4de080ea64dbc7b3424357fc39c0c70ede27873_arm64",
"product": {
"name": "openshift-logging/cluster-logging-rhel8-operator@sha256:07ab076aa9b573d330ace59bf4de080ea64dbc7b3424357fc39c0c70ede27873_arm64",
"product_id": "openshift-logging/cluster-logging-rhel8-operator@sha256:07ab076aa9b573d330ace59bf4de080ea64dbc7b3424357fc39c0c70ede27873_arm64",
"product_identification_helper": {
"purl": "pkg:oci/cluster-logging-rhel8-operator@sha256:07ab076aa9b573d330ace59bf4de080ea64dbc7b3424357fc39c0c70ede27873?arch=arm64\u0026repository_url=registry.redhat.io/openshift-logging/cluster-logging-rhel8-operator\u0026tag=v5.5.4-7"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/elasticsearch-rhel8-operator@sha256:dce08ac53092fc51958b78df9b4b870926a079fe4cdc4fb2d46c8ba545a22e6a_arm64",
"product": {
"name": "openshift-logging/elasticsearch-rhel8-operator@sha256:dce08ac53092fc51958b78df9b4b870926a079fe4cdc4fb2d46c8ba545a22e6a_arm64",
"product_id": "openshift-logging/elasticsearch-rhel8-operator@sha256:dce08ac53092fc51958b78df9b4b870926a079fe4cdc4fb2d46c8ba545a22e6a_arm64",
"product_identification_helper": {
"purl": "pkg:oci/elasticsearch-rhel8-operator@sha256:dce08ac53092fc51958b78df9b4b870926a079fe4cdc4fb2d46c8ba545a22e6a?arch=arm64\u0026repository_url=registry.redhat.io/openshift-logging/elasticsearch-rhel8-operator\u0026tag=v5.5.4-3"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/elasticsearch-proxy-rhel8@sha256:a6c03fd0fe66206bff59ba019cc60085de4c65d4efae8a637f1ac48b91688371_arm64",
"product": {
"name": "openshift-logging/elasticsearch-proxy-rhel8@sha256:a6c03fd0fe66206bff59ba019cc60085de4c65d4efae8a637f1ac48b91688371_arm64",
"product_id": "openshift-logging/elasticsearch-proxy-rhel8@sha256:a6c03fd0fe66206bff59ba019cc60085de4c65d4efae8a637f1ac48b91688371_arm64",
"product_identification_helper": {
"purl": "pkg:oci/elasticsearch-proxy-rhel8@sha256:a6c03fd0fe66206bff59ba019cc60085de4c65d4efae8a637f1ac48b91688371?arch=arm64\u0026repository_url=registry.redhat.io/openshift-logging/elasticsearch-proxy-rhel8\u0026tag=v1.0.0-303"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/log-file-metric-exporter-rhel8@sha256:f0ca78341daa3d41ffe460f5aa504219c72ee673dd57a82f344d3239b69717be_arm64",
"product": {
"name": "openshift-logging/log-file-metric-exporter-rhel8@sha256:f0ca78341daa3d41ffe460f5aa504219c72ee673dd57a82f344d3239b69717be_arm64",
"product_id": "openshift-logging/log-file-metric-exporter-rhel8@sha256:f0ca78341daa3d41ffe460f5aa504219c72ee673dd57a82f344d3239b69717be_arm64",
"product_identification_helper": {
"purl": "pkg:oci/log-file-metric-exporter-rhel8@sha256:f0ca78341daa3d41ffe460f5aa504219c72ee673dd57a82f344d3239b69717be?arch=arm64\u0026repository_url=registry.redhat.io/openshift-logging/log-file-metric-exporter-rhel8\u0026tag=v1.1.0-71"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/logging-curator5-rhel8@sha256:c8ea484f5e15b7b53941f251db9b5be08c8cb6f3a14d99285277d9eadf969e98_arm64",
"product": {
"name": "openshift-logging/logging-curator5-rhel8@sha256:c8ea484f5e15b7b53941f251db9b5be08c8cb6f3a14d99285277d9eadf969e98_arm64",
"product_id": "openshift-logging/logging-curator5-rhel8@sha256:c8ea484f5e15b7b53941f251db9b5be08c8cb6f3a14d99285277d9eadf969e98_arm64",
"product_identification_helper": {
"purl": "pkg:oci/logging-curator5-rhel8@sha256:c8ea484f5e15b7b53941f251db9b5be08c8cb6f3a14d99285277d9eadf969e98?arch=arm64\u0026repository_url=registry.redhat.io/openshift-logging/logging-curator5-rhel8\u0026tag=v5.8.1-245"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/elasticsearch6-rhel8@sha256:6dfb5e18aa3dc6ce8e2535e13de1d53eea68b218854971e0eb594f677f6da7c7_arm64",
"product": {
"name": "openshift-logging/elasticsearch6-rhel8@sha256:6dfb5e18aa3dc6ce8e2535e13de1d53eea68b218854971e0eb594f677f6da7c7_arm64",
"product_id": "openshift-logging/elasticsearch6-rhel8@sha256:6dfb5e18aa3dc6ce8e2535e13de1d53eea68b218854971e0eb594f677f6da7c7_arm64",
"product_identification_helper": {
"purl": "pkg:oci/elasticsearch6-rhel8@sha256:6dfb5e18aa3dc6ce8e2535e13de1d53eea68b218854971e0eb594f677f6da7c7?arch=arm64\u0026repository_url=registry.redhat.io/openshift-logging/elasticsearch6-rhel8\u0026tag=v6.8.1-264"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/eventrouter-rhel8@sha256:0590711175be3b10f646256407cb7d72df63333589d527199260f738a91f2e3d_arm64",
"product": {
"name": "openshift-logging/eventrouter-rhel8@sha256:0590711175be3b10f646256407cb7d72df63333589d527199260f738a91f2e3d_arm64",
"product_id": "openshift-logging/eventrouter-rhel8@sha256:0590711175be3b10f646256407cb7d72df63333589d527199260f738a91f2e3d_arm64",
"product_identification_helper": {
"purl": "pkg:oci/eventrouter-rhel8@sha256:0590711175be3b10f646256407cb7d72df63333589d527199260f738a91f2e3d?arch=arm64\u0026repository_url=registry.redhat.io/openshift-logging/eventrouter-rhel8\u0026tag=v0.4.0-52"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/fluentd-rhel8@sha256:3d4b83f86b2d2f1c73ab184a3471d0d4da04bb6e76487c9f546da87998e480dc_arm64",
"product": {
"name": "openshift-logging/fluentd-rhel8@sha256:3d4b83f86b2d2f1c73ab184a3471d0d4da04bb6e76487c9f546da87998e480dc_arm64",
"product_id": "openshift-logging/fluentd-rhel8@sha256:3d4b83f86b2d2f1c73ab184a3471d0d4da04bb6e76487c9f546da87998e480dc_arm64",
"product_identification_helper": {
"purl": "pkg:oci/fluentd-rhel8@sha256:3d4b83f86b2d2f1c73ab184a3471d0d4da04bb6e76487c9f546da87998e480dc?arch=arm64\u0026repository_url=registry.redhat.io/openshift-logging/fluentd-rhel8\u0026tag=v1.14.6-61"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/kibana6-rhel8@sha256:ca4f273fb088980bfcc3607bd7ea2d40cc93298262cb3f5ce4054a6235152d1e_arm64",
"product": {
"name": "openshift-logging/kibana6-rhel8@sha256:ca4f273fb088980bfcc3607bd7ea2d40cc93298262cb3f5ce4054a6235152d1e_arm64",
"product_id": "openshift-logging/kibana6-rhel8@sha256:ca4f273fb088980bfcc3607bd7ea2d40cc93298262cb3f5ce4054a6235152d1e_arm64",
"product_identification_helper": {
"purl": "pkg:oci/kibana6-rhel8@sha256:ca4f273fb088980bfcc3607bd7ea2d40cc93298262cb3f5ce4054a6235152d1e?arch=arm64\u0026repository_url=registry.redhat.io/openshift-logging/kibana6-rhel8\u0026tag=v6.8.1-301"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/logging-loki-rhel8@sha256:dd5e5a043befc54eeb63ff51a01691778053c90de5c9b8946d6a1d808fbcf0df_arm64",
"product": {
"name": "openshift-logging/logging-loki-rhel8@sha256:dd5e5a043befc54eeb63ff51a01691778053c90de5c9b8946d6a1d808fbcf0df_arm64",
"product_id": "openshift-logging/logging-loki-rhel8@sha256:dd5e5a043befc54eeb63ff51a01691778053c90de5c9b8946d6a1d808fbcf0df_arm64",
"product_identification_helper": {
"purl": "pkg:oci/logging-loki-rhel8@sha256:dd5e5a043befc54eeb63ff51a01691778053c90de5c9b8946d6a1d808fbcf0df?arch=arm64\u0026repository_url=registry.redhat.io/openshift-logging/logging-loki-rhel8\u0026tag=v2.6.1-21"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/vector-rhel8@sha256:6c8b9e91e4d527bc0694879c7ce908e3d67877fd53191b71af95191cc0149afa_arm64",
"product": {
"name": "openshift-logging/vector-rhel8@sha256:6c8b9e91e4d527bc0694879c7ce908e3d67877fd53191b71af95191cc0149afa_arm64",
"product_id": "openshift-logging/vector-rhel8@sha256:6c8b9e91e4d527bc0694879c7ce908e3d67877fd53191b71af95191cc0149afa_arm64",
"product_identification_helper": {
"purl": "pkg:oci/vector-rhel8@sha256:6c8b9e91e4d527bc0694879c7ce908e3d67877fd53191b71af95191cc0149afa?arch=arm64\u0026repository_url=registry.redhat.io/openshift-logging/vector-rhel8\u0026tag=v0.21.0-34"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/logging-view-plugin-rhel8@sha256:147676e1a3c66757508be0046c28ccb7985f15af7f8f4a045fa5ca424c0c684d_arm64",
"product": {
"name": "openshift-logging/logging-view-plugin-rhel8@sha256:147676e1a3c66757508be0046c28ccb7985f15af7f8f4a045fa5ca424c0c684d_arm64",
"product_id": "openshift-logging/logging-view-plugin-rhel8@sha256:147676e1a3c66757508be0046c28ccb7985f15af7f8f4a045fa5ca424c0c684d_arm64",
"product_identification_helper": {
"purl": "pkg:oci/logging-view-plugin-rhel8@sha256:147676e1a3c66757508be0046c28ccb7985f15af7f8f4a045fa5ca424c0c684d?arch=arm64\u0026repository_url=registry.redhat.io/openshift-logging/logging-view-plugin-rhel8\u0026tag=v5.5.4-2"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/loki-rhel8-operator@sha256:dfa4ca06abb576fa071fb30c425bc6be631c0453939de562e1dc0b4e76de4f81_arm64",
"product": {
"name": "openshift-logging/loki-rhel8-operator@sha256:dfa4ca06abb576fa071fb30c425bc6be631c0453939de562e1dc0b4e76de4f81_arm64",
"product_id": "openshift-logging/loki-rhel8-operator@sha256:dfa4ca06abb576fa071fb30c425bc6be631c0453939de562e1dc0b4e76de4f81_arm64",
"product_identification_helper": {
"purl": "pkg:oci/loki-rhel8-operator@sha256:dfa4ca06abb576fa071fb30c425bc6be631c0453939de562e1dc0b4e76de4f81?arch=arm64\u0026repository_url=registry.redhat.io/openshift-logging/loki-rhel8-operator\u0026tag=v5.5.4-4"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/lokistack-gateway-rhel8@sha256:0a3eb7a1a50b75528be737eb2768e671a643eea324c967a0381296b61f8e399e_arm64",
"product": {
"name": "openshift-logging/lokistack-gateway-rhel8@sha256:0a3eb7a1a50b75528be737eb2768e671a643eea324c967a0381296b61f8e399e_arm64",
"product_id": "openshift-logging/lokistack-gateway-rhel8@sha256:0a3eb7a1a50b75528be737eb2768e671a643eea324c967a0381296b61f8e399e_arm64",
"product_identification_helper": {
"purl": "pkg:oci/lokistack-gateway-rhel8@sha256:0a3eb7a1a50b75528be737eb2768e671a643eea324c967a0381296b61f8e399e?arch=arm64\u0026repository_url=registry.redhat.io/openshift-logging/lokistack-gateway-rhel8\u0026tag=v0.1.0-57"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/opa-openshift-rhel8@sha256:c8458b60077d018eaa78f38fc0b85786d8108b88faea6e420cc01b720f23af48_arm64",
"product": {
"name": "openshift-logging/opa-openshift-rhel8@sha256:c8458b60077d018eaa78f38fc0b85786d8108b88faea6e420cc01b720f23af48_arm64",
"product_id": "openshift-logging/opa-openshift-rhel8@sha256:c8458b60077d018eaa78f38fc0b85786d8108b88faea6e420cc01b720f23af48_arm64",
"product_identification_helper": {
"purl": "pkg:oci/opa-openshift-rhel8@sha256:c8458b60077d018eaa78f38fc0b85786d8108b88faea6e420cc01b720f23af48?arch=arm64\u0026repository_url=registry.redhat.io/openshift-logging/opa-openshift-rhel8\u0026tag=v0.1.0-27"
}
}
}
],
"category": "architecture",
"name": "arm64"
},
{
"branches": [
{
"category": "product_version",
"name": "openshift-logging/cluster-logging-rhel8-operator@sha256:b4eeab42904e5a81e7adb8801bd901a53a5b81b2464b33816c203daf7587f89f_ppc64le",
"product": {
"name": "openshift-logging/cluster-logging-rhel8-operator@sha256:b4eeab42904e5a81e7adb8801bd901a53a5b81b2464b33816c203daf7587f89f_ppc64le",
"product_id": "openshift-logging/cluster-logging-rhel8-operator@sha256:b4eeab42904e5a81e7adb8801bd901a53a5b81b2464b33816c203daf7587f89f_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/cluster-logging-rhel8-operator@sha256:b4eeab42904e5a81e7adb8801bd901a53a5b81b2464b33816c203daf7587f89f?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-logging/cluster-logging-rhel8-operator\u0026tag=v5.5.4-7"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/elasticsearch-rhel8-operator@sha256:64954ce7d233d6c109e46645cd8d55d8a06068328ce3a22f646ede7c9fde78c8_ppc64le",
"product": {
"name": "openshift-logging/elasticsearch-rhel8-operator@sha256:64954ce7d233d6c109e46645cd8d55d8a06068328ce3a22f646ede7c9fde78c8_ppc64le",
"product_id": "openshift-logging/elasticsearch-rhel8-operator@sha256:64954ce7d233d6c109e46645cd8d55d8a06068328ce3a22f646ede7c9fde78c8_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/elasticsearch-rhel8-operator@sha256:64954ce7d233d6c109e46645cd8d55d8a06068328ce3a22f646ede7c9fde78c8?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-logging/elasticsearch-rhel8-operator\u0026tag=v5.5.4-3"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/elasticsearch-proxy-rhel8@sha256:89f980b63cbcf7956449d8cee41c884ea4ae7d76f02454f7e32058576fd92fa5_ppc64le",
"product": {
"name": "openshift-logging/elasticsearch-proxy-rhel8@sha256:89f980b63cbcf7956449d8cee41c884ea4ae7d76f02454f7e32058576fd92fa5_ppc64le",
"product_id": "openshift-logging/elasticsearch-proxy-rhel8@sha256:89f980b63cbcf7956449d8cee41c884ea4ae7d76f02454f7e32058576fd92fa5_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/elasticsearch-proxy-rhel8@sha256:89f980b63cbcf7956449d8cee41c884ea4ae7d76f02454f7e32058576fd92fa5?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-logging/elasticsearch-proxy-rhel8\u0026tag=v1.0.0-303"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/log-file-metric-exporter-rhel8@sha256:8b76243469011045e72b7a339288986e7561a3005aa94d580d5b1082580e9cec_ppc64le",
"product": {
"name": "openshift-logging/log-file-metric-exporter-rhel8@sha256:8b76243469011045e72b7a339288986e7561a3005aa94d580d5b1082580e9cec_ppc64le",
"product_id": "openshift-logging/log-file-metric-exporter-rhel8@sha256:8b76243469011045e72b7a339288986e7561a3005aa94d580d5b1082580e9cec_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/log-file-metric-exporter-rhel8@sha256:8b76243469011045e72b7a339288986e7561a3005aa94d580d5b1082580e9cec?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-logging/log-file-metric-exporter-rhel8\u0026tag=v1.1.0-71"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/logging-curator5-rhel8@sha256:e26efb87488b53ebd4e5233515906974675b3a759f4a1c00f447df8821d5f030_ppc64le",
"product": {
"name": "openshift-logging/logging-curator5-rhel8@sha256:e26efb87488b53ebd4e5233515906974675b3a759f4a1c00f447df8821d5f030_ppc64le",
"product_id": "openshift-logging/logging-curator5-rhel8@sha256:e26efb87488b53ebd4e5233515906974675b3a759f4a1c00f447df8821d5f030_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/logging-curator5-rhel8@sha256:e26efb87488b53ebd4e5233515906974675b3a759f4a1c00f447df8821d5f030?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-logging/logging-curator5-rhel8\u0026tag=v5.8.1-245"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/elasticsearch6-rhel8@sha256:1019e03ddff4726caae53e800403cbaa82ce057c7553552ad027a37d3be5824f_ppc64le",
"product": {
"name": "openshift-logging/elasticsearch6-rhel8@sha256:1019e03ddff4726caae53e800403cbaa82ce057c7553552ad027a37d3be5824f_ppc64le",
"product_id": "openshift-logging/elasticsearch6-rhel8@sha256:1019e03ddff4726caae53e800403cbaa82ce057c7553552ad027a37d3be5824f_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/elasticsearch6-rhel8@sha256:1019e03ddff4726caae53e800403cbaa82ce057c7553552ad027a37d3be5824f?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-logging/elasticsearch6-rhel8\u0026tag=v6.8.1-264"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/eventrouter-rhel8@sha256:ac91af413a363890bb01772488e371e4dc698ecfb77f047bb83bf638d497aa7c_ppc64le",
"product": {
"name": "openshift-logging/eventrouter-rhel8@sha256:ac91af413a363890bb01772488e371e4dc698ecfb77f047bb83bf638d497aa7c_ppc64le",
"product_id": "openshift-logging/eventrouter-rhel8@sha256:ac91af413a363890bb01772488e371e4dc698ecfb77f047bb83bf638d497aa7c_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/eventrouter-rhel8@sha256:ac91af413a363890bb01772488e371e4dc698ecfb77f047bb83bf638d497aa7c?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-logging/eventrouter-rhel8\u0026tag=v0.4.0-52"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/fluentd-rhel8@sha256:790fe2b90b51f8aff5d10b1525bcf7d35e5517674245993dac6696ebf2a24baf_ppc64le",
"product": {
"name": "openshift-logging/fluentd-rhel8@sha256:790fe2b90b51f8aff5d10b1525bcf7d35e5517674245993dac6696ebf2a24baf_ppc64le",
"product_id": "openshift-logging/fluentd-rhel8@sha256:790fe2b90b51f8aff5d10b1525bcf7d35e5517674245993dac6696ebf2a24baf_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/fluentd-rhel8@sha256:790fe2b90b51f8aff5d10b1525bcf7d35e5517674245993dac6696ebf2a24baf?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-logging/fluentd-rhel8\u0026tag=v1.14.6-61"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/kibana6-rhel8@sha256:93c33d6810eb6e71e7e543c1c26a29e163214df64121c814b4424322308b0a30_ppc64le",
"product": {
"name": "openshift-logging/kibana6-rhel8@sha256:93c33d6810eb6e71e7e543c1c26a29e163214df64121c814b4424322308b0a30_ppc64le",
"product_id": "openshift-logging/kibana6-rhel8@sha256:93c33d6810eb6e71e7e543c1c26a29e163214df64121c814b4424322308b0a30_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/kibana6-rhel8@sha256:93c33d6810eb6e71e7e543c1c26a29e163214df64121c814b4424322308b0a30?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-logging/kibana6-rhel8\u0026tag=v6.8.1-301"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/logging-loki-rhel8@sha256:969ce1d586fb7fbdd65d07c0b790f48fd6f81e659d1323514906bb03ae9fe79b_ppc64le",
"product": {
"name": "openshift-logging/logging-loki-rhel8@sha256:969ce1d586fb7fbdd65d07c0b790f48fd6f81e659d1323514906bb03ae9fe79b_ppc64le",
"product_id": "openshift-logging/logging-loki-rhel8@sha256:969ce1d586fb7fbdd65d07c0b790f48fd6f81e659d1323514906bb03ae9fe79b_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/logging-loki-rhel8@sha256:969ce1d586fb7fbdd65d07c0b790f48fd6f81e659d1323514906bb03ae9fe79b?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-logging/logging-loki-rhel8\u0026tag=v2.6.1-21"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/vector-rhel8@sha256:b22fe4e184b908986301fda4d2b57f4b9b91149168386a8d9c7ac9b0c4631c7c_ppc64le",
"product": {
"name": "openshift-logging/vector-rhel8@sha256:b22fe4e184b908986301fda4d2b57f4b9b91149168386a8d9c7ac9b0c4631c7c_ppc64le",
"product_id": "openshift-logging/vector-rhel8@sha256:b22fe4e184b908986301fda4d2b57f4b9b91149168386a8d9c7ac9b0c4631c7c_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/vector-rhel8@sha256:b22fe4e184b908986301fda4d2b57f4b9b91149168386a8d9c7ac9b0c4631c7c?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-logging/vector-rhel8\u0026tag=v0.21.0-34"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/logging-view-plugin-rhel8@sha256:da8c90c5b3b68e9b98a76828a450a9d7c579256b04aa9daf87ddfab9bad5548c_ppc64le",
"product": {
"name": "openshift-logging/logging-view-plugin-rhel8@sha256:da8c90c5b3b68e9b98a76828a450a9d7c579256b04aa9daf87ddfab9bad5548c_ppc64le",
"product_id": "openshift-logging/logging-view-plugin-rhel8@sha256:da8c90c5b3b68e9b98a76828a450a9d7c579256b04aa9daf87ddfab9bad5548c_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/logging-view-plugin-rhel8@sha256:da8c90c5b3b68e9b98a76828a450a9d7c579256b04aa9daf87ddfab9bad5548c?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-logging/logging-view-plugin-rhel8\u0026tag=v5.5.4-2"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/loki-rhel8-operator@sha256:4eba6362f8aaa0450d07b87824148d2c15232b871d0ba6bc34f1962d2970e753_ppc64le",
"product": {
"name": "openshift-logging/loki-rhel8-operator@sha256:4eba6362f8aaa0450d07b87824148d2c15232b871d0ba6bc34f1962d2970e753_ppc64le",
"product_id": "openshift-logging/loki-rhel8-operator@sha256:4eba6362f8aaa0450d07b87824148d2c15232b871d0ba6bc34f1962d2970e753_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/loki-rhel8-operator@sha256:4eba6362f8aaa0450d07b87824148d2c15232b871d0ba6bc34f1962d2970e753?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-logging/loki-rhel8-operator\u0026tag=v5.5.4-4"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/lokistack-gateway-rhel8@sha256:42ebf89821e0f8e4b7d03cc5a6d5a30d48f73a1ab2b7486c8a0bb1e5c2cfd4b4_ppc64le",
"product": {
"name": "openshift-logging/lokistack-gateway-rhel8@sha256:42ebf89821e0f8e4b7d03cc5a6d5a30d48f73a1ab2b7486c8a0bb1e5c2cfd4b4_ppc64le",
"product_id": "openshift-logging/lokistack-gateway-rhel8@sha256:42ebf89821e0f8e4b7d03cc5a6d5a30d48f73a1ab2b7486c8a0bb1e5c2cfd4b4_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/lokistack-gateway-rhel8@sha256:42ebf89821e0f8e4b7d03cc5a6d5a30d48f73a1ab2b7486c8a0bb1e5c2cfd4b4?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-logging/lokistack-gateway-rhel8\u0026tag=v0.1.0-57"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/opa-openshift-rhel8@sha256:847c70de5af59c9aec366612a74477de931977cf79d5f9ed117772e931589497_ppc64le",
"product": {
"name": "openshift-logging/opa-openshift-rhel8@sha256:847c70de5af59c9aec366612a74477de931977cf79d5f9ed117772e931589497_ppc64le",
"product_id": "openshift-logging/opa-openshift-rhel8@sha256:847c70de5af59c9aec366612a74477de931977cf79d5f9ed117772e931589497_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/opa-openshift-rhel8@sha256:847c70de5af59c9aec366612a74477de931977cf79d5f9ed117772e931589497?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-logging/opa-openshift-rhel8\u0026tag=v0.1.0-27"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "openshift-logging/cluster-logging-rhel8-operator@sha256:414649f77a20e04b3eb16d64acf81a4d261394016d4a890da309cbb8216c1d4a_amd64",
"product": {
"name": "openshift-logging/cluster-logging-rhel8-operator@sha256:414649f77a20e04b3eb16d64acf81a4d261394016d4a890da309cbb8216c1d4a_amd64",
"product_id": "openshift-logging/cluster-logging-rhel8-operator@sha256:414649f77a20e04b3eb16d64acf81a4d261394016d4a890da309cbb8216c1d4a_amd64",
"product_identification_helper": {
"purl": "pkg:oci/cluster-logging-rhel8-operator@sha256:414649f77a20e04b3eb16d64acf81a4d261394016d4a890da309cbb8216c1d4a?arch=amd64\u0026repository_url=registry.redhat.io/openshift-logging/cluster-logging-rhel8-operator\u0026tag=v5.5.4-7"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/cluster-logging-operator-bundle@sha256:a78fd59207ef6cc8ddaaa3f3ae7140b7678e96e0677517623d1537afc05e84dd_amd64",
"product": {
"name": "openshift-logging/cluster-logging-operator-bundle@sha256:a78fd59207ef6cc8ddaaa3f3ae7140b7678e96e0677517623d1537afc05e84dd_amd64",
"product_id": "openshift-logging/cluster-logging-operator-bundle@sha256:a78fd59207ef6cc8ddaaa3f3ae7140b7678e96e0677517623d1537afc05e84dd_amd64",
"product_identification_helper": {
"purl": "pkg:oci/cluster-logging-operator-bundle@sha256:a78fd59207ef6cc8ddaaa3f3ae7140b7678e96e0677517623d1537afc05e84dd?arch=amd64\u0026repository_url=registry.redhat.io/openshift-logging/cluster-logging-operator-bundle\u0026tag=v5.5.4-13"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/elasticsearch-rhel8-operator@sha256:c25b7b7c0f073fdfcf9fd90572790064cdff26d61a4e4db751d4197ff2c5b4c1_amd64",
"product": {
"name": "openshift-logging/elasticsearch-rhel8-operator@sha256:c25b7b7c0f073fdfcf9fd90572790064cdff26d61a4e4db751d4197ff2c5b4c1_amd64",
"product_id": "openshift-logging/elasticsearch-rhel8-operator@sha256:c25b7b7c0f073fdfcf9fd90572790064cdff26d61a4e4db751d4197ff2c5b4c1_amd64",
"product_identification_helper": {
"purl": "pkg:oci/elasticsearch-rhel8-operator@sha256:c25b7b7c0f073fdfcf9fd90572790064cdff26d61a4e4db751d4197ff2c5b4c1?arch=amd64\u0026repository_url=registry.redhat.io/openshift-logging/elasticsearch-rhel8-operator\u0026tag=v5.5.4-3"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/elasticsearch-operator-bundle@sha256:d09cafc7f6bbb446608051cebb1c943575e80f9987bb4cad8af53e0354a0e7cd_amd64",
"product": {
"name": "openshift-logging/elasticsearch-operator-bundle@sha256:d09cafc7f6bbb446608051cebb1c943575e80f9987bb4cad8af53e0354a0e7cd_amd64",
"product_id": "openshift-logging/elasticsearch-operator-bundle@sha256:d09cafc7f6bbb446608051cebb1c943575e80f9987bb4cad8af53e0354a0e7cd_amd64",
"product_identification_helper": {
"purl": "pkg:oci/elasticsearch-operator-bundle@sha256:d09cafc7f6bbb446608051cebb1c943575e80f9987bb4cad8af53e0354a0e7cd?arch=amd64\u0026repository_url=registry.redhat.io/openshift-logging/elasticsearch-operator-bundle\u0026tag=v5.5.4-17"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/elasticsearch-proxy-rhel8@sha256:e1755002225548182e17bd82b1c129b2ac61e623c3c37c4d51a535012088cacc_amd64",
"product": {
"name": "openshift-logging/elasticsearch-proxy-rhel8@sha256:e1755002225548182e17bd82b1c129b2ac61e623c3c37c4d51a535012088cacc_amd64",
"product_id": "openshift-logging/elasticsearch-proxy-rhel8@sha256:e1755002225548182e17bd82b1c129b2ac61e623c3c37c4d51a535012088cacc_amd64",
"product_identification_helper": {
"purl": "pkg:oci/elasticsearch-proxy-rhel8@sha256:e1755002225548182e17bd82b1c129b2ac61e623c3c37c4d51a535012088cacc?arch=amd64\u0026repository_url=registry.redhat.io/openshift-logging/elasticsearch-proxy-rhel8\u0026tag=v1.0.0-303"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/log-file-metric-exporter-rhel8@sha256:e91d4b026d38091cb707e0213f329d0781a3517f3eca4d209d09d6c1edb1a1d3_amd64",
"product": {
"name": "openshift-logging/log-file-metric-exporter-rhel8@sha256:e91d4b026d38091cb707e0213f329d0781a3517f3eca4d209d09d6c1edb1a1d3_amd64",
"product_id": "openshift-logging/log-file-metric-exporter-rhel8@sha256:e91d4b026d38091cb707e0213f329d0781a3517f3eca4d209d09d6c1edb1a1d3_amd64",
"product_identification_helper": {
"purl": "pkg:oci/log-file-metric-exporter-rhel8@sha256:e91d4b026d38091cb707e0213f329d0781a3517f3eca4d209d09d6c1edb1a1d3?arch=amd64\u0026repository_url=registry.redhat.io/openshift-logging/log-file-metric-exporter-rhel8\u0026tag=v1.1.0-71"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/logging-curator5-rhel8@sha256:e6ae5eef57de608fb1d4393fe824d0befffd8f5b696b5ce44e571fdcddb46f1f_amd64",
"product": {
"name": "openshift-logging/logging-curator5-rhel8@sha256:e6ae5eef57de608fb1d4393fe824d0befffd8f5b696b5ce44e571fdcddb46f1f_amd64",
"product_id": "openshift-logging/logging-curator5-rhel8@sha256:e6ae5eef57de608fb1d4393fe824d0befffd8f5b696b5ce44e571fdcddb46f1f_amd64",
"product_identification_helper": {
"purl": "pkg:oci/logging-curator5-rhel8@sha256:e6ae5eef57de608fb1d4393fe824d0befffd8f5b696b5ce44e571fdcddb46f1f?arch=amd64\u0026repository_url=registry.redhat.io/openshift-logging/logging-curator5-rhel8\u0026tag=v5.8.1-245"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/elasticsearch6-rhel8@sha256:bf574cff65baba457e3199aae7d1b0e605403a7968e9af746a6cfc5d9a4b29c5_amd64",
"product": {
"name": "openshift-logging/elasticsearch6-rhel8@sha256:bf574cff65baba457e3199aae7d1b0e605403a7968e9af746a6cfc5d9a4b29c5_amd64",
"product_id": "openshift-logging/elasticsearch6-rhel8@sha256:bf574cff65baba457e3199aae7d1b0e605403a7968e9af746a6cfc5d9a4b29c5_amd64",
"product_identification_helper": {
"purl": "pkg:oci/elasticsearch6-rhel8@sha256:bf574cff65baba457e3199aae7d1b0e605403a7968e9af746a6cfc5d9a4b29c5?arch=amd64\u0026repository_url=registry.redhat.io/openshift-logging/elasticsearch6-rhel8\u0026tag=v6.8.1-264"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/eventrouter-rhel8@sha256:646995416047cf48070c60b9ab064d454ff9ed772a92558f9627e3832f0ccd3c_amd64",
"product": {
"name": "openshift-logging/eventrouter-rhel8@sha256:646995416047cf48070c60b9ab064d454ff9ed772a92558f9627e3832f0ccd3c_amd64",
"product_id": "openshift-logging/eventrouter-rhel8@sha256:646995416047cf48070c60b9ab064d454ff9ed772a92558f9627e3832f0ccd3c_amd64",
"product_identification_helper": {
"purl": "pkg:oci/eventrouter-rhel8@sha256:646995416047cf48070c60b9ab064d454ff9ed772a92558f9627e3832f0ccd3c?arch=amd64\u0026repository_url=registry.redhat.io/openshift-logging/eventrouter-rhel8\u0026tag=v0.4.0-52"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/fluentd-rhel8@sha256:dc8fe0ca5a488c6738e6904871a620f9444f30475863a09846f8205569c25e54_amd64",
"product": {
"name": "openshift-logging/fluentd-rhel8@sha256:dc8fe0ca5a488c6738e6904871a620f9444f30475863a09846f8205569c25e54_amd64",
"product_id": "openshift-logging/fluentd-rhel8@sha256:dc8fe0ca5a488c6738e6904871a620f9444f30475863a09846f8205569c25e54_amd64",
"product_identification_helper": {
"purl": "pkg:oci/fluentd-rhel8@sha256:dc8fe0ca5a488c6738e6904871a620f9444f30475863a09846f8205569c25e54?arch=amd64\u0026repository_url=registry.redhat.io/openshift-logging/fluentd-rhel8\u0026tag=v1.14.6-61"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/kibana6-rhel8@sha256:44f3446b172b3ea7f0fd4de9f8039eba256a6bea56715748af00f361e49b1519_amd64",
"product": {
"name": "openshift-logging/kibana6-rhel8@sha256:44f3446b172b3ea7f0fd4de9f8039eba256a6bea56715748af00f361e49b1519_amd64",
"product_id": "openshift-logging/kibana6-rhel8@sha256:44f3446b172b3ea7f0fd4de9f8039eba256a6bea56715748af00f361e49b1519_amd64",
"product_identification_helper": {
"purl": "pkg:oci/kibana6-rhel8@sha256:44f3446b172b3ea7f0fd4de9f8039eba256a6bea56715748af00f361e49b1519?arch=amd64\u0026repository_url=registry.redhat.io/openshift-logging/kibana6-rhel8\u0026tag=v6.8.1-301"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/logging-loki-rhel8@sha256:947becc46b99656f9faa6067f2cf38dbef0d40e85b56d62aafcb243052920dfc_amd64",
"product": {
"name": "openshift-logging/logging-loki-rhel8@sha256:947becc46b99656f9faa6067f2cf38dbef0d40e85b56d62aafcb243052920dfc_amd64",
"product_id": "openshift-logging/logging-loki-rhel8@sha256:947becc46b99656f9faa6067f2cf38dbef0d40e85b56d62aafcb243052920dfc_amd64",
"product_identification_helper": {
"purl": "pkg:oci/logging-loki-rhel8@sha256:947becc46b99656f9faa6067f2cf38dbef0d40e85b56d62aafcb243052920dfc?arch=amd64\u0026repository_url=registry.redhat.io/openshift-logging/logging-loki-rhel8\u0026tag=v2.6.1-21"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/vector-rhel8@sha256:6c237605a0062e69e10a1fad47375f9c51dbccb110e1d11a02f2b7101d611e8f_amd64",
"product": {
"name": "openshift-logging/vector-rhel8@sha256:6c237605a0062e69e10a1fad47375f9c51dbccb110e1d11a02f2b7101d611e8f_amd64",
"product_id": "openshift-logging/vector-rhel8@sha256:6c237605a0062e69e10a1fad47375f9c51dbccb110e1d11a02f2b7101d611e8f_amd64",
"product_identification_helper": {
"purl": "pkg:oci/vector-rhel8@sha256:6c237605a0062e69e10a1fad47375f9c51dbccb110e1d11a02f2b7101d611e8f?arch=amd64\u0026repository_url=registry.redhat.io/openshift-logging/vector-rhel8\u0026tag=v0.21.0-34"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/logging-view-plugin-rhel8@sha256:bea8f3f31073874a77af55c8664cbf167cd8bad5296e1bf444b9490b06484b56_amd64",
"product": {
"name": "openshift-logging/logging-view-plugin-rhel8@sha256:bea8f3f31073874a77af55c8664cbf167cd8bad5296e1bf444b9490b06484b56_amd64",
"product_id": "openshift-logging/logging-view-plugin-rhel8@sha256:bea8f3f31073874a77af55c8664cbf167cd8bad5296e1bf444b9490b06484b56_amd64",
"product_identification_helper": {
"purl": "pkg:oci/logging-view-plugin-rhel8@sha256:bea8f3f31073874a77af55c8664cbf167cd8bad5296e1bf444b9490b06484b56?arch=amd64\u0026repository_url=registry.redhat.io/openshift-logging/logging-view-plugin-rhel8\u0026tag=v5.5.4-2"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/loki-operator-bundle@sha256:1d75006c9d03648857963a8772644d4228361d97fb07c8652326b61fd5d30f8c_amd64",
"product": {
"name": "openshift-logging/loki-operator-bundle@sha256:1d75006c9d03648857963a8772644d4228361d97fb07c8652326b61fd5d30f8c_amd64",
"product_id": "openshift-logging/loki-operator-bundle@sha256:1d75006c9d03648857963a8772644d4228361d97fb07c8652326b61fd5d30f8c_amd64",
"product_identification_helper": {
"purl": "pkg:oci/loki-operator-bundle@sha256:1d75006c9d03648857963a8772644d4228361d97fb07c8652326b61fd5d30f8c?arch=amd64\u0026repository_url=registry.redhat.io/openshift-logging/loki-operator-bundle\u0026tag=v5.5.4-18"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/loki-rhel8-operator@sha256:e5289e40532a01c605760b2f438acfb66257b730a89249269e46dc9c0058aec1_amd64",
"product": {
"name": "openshift-logging/loki-rhel8-operator@sha256:e5289e40532a01c605760b2f438acfb66257b730a89249269e46dc9c0058aec1_amd64",
"product_id": "openshift-logging/loki-rhel8-operator@sha256:e5289e40532a01c605760b2f438acfb66257b730a89249269e46dc9c0058aec1_amd64",
"product_identification_helper": {
"purl": "pkg:oci/loki-rhel8-operator@sha256:e5289e40532a01c605760b2f438acfb66257b730a89249269e46dc9c0058aec1?arch=amd64\u0026repository_url=registry.redhat.io/openshift-logging/loki-rhel8-operator\u0026tag=v5.5.4-4"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/lokistack-gateway-rhel8@sha256:449f4cf0b3d0c0d6724cc2346c2121df58ef43297c56cc540e05158ad5c8ffbc_amd64",
"product": {
"name": "openshift-logging/lokistack-gateway-rhel8@sha256:449f4cf0b3d0c0d6724cc2346c2121df58ef43297c56cc540e05158ad5c8ffbc_amd64",
"product_id": "openshift-logging/lokistack-gateway-rhel8@sha256:449f4cf0b3d0c0d6724cc2346c2121df58ef43297c56cc540e05158ad5c8ffbc_amd64",
"product_identification_helper": {
"purl": "pkg:oci/lokistack-gateway-rhel8@sha256:449f4cf0b3d0c0d6724cc2346c2121df58ef43297c56cc540e05158ad5c8ffbc?arch=amd64\u0026repository_url=registry.redhat.io/openshift-logging/lokistack-gateway-rhel8\u0026tag=v0.1.0-57"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/opa-openshift-rhel8@sha256:4c1b37da97e80aa76f2612f34745180a026214a415ed9a186ab81ec8fa96e17d_amd64",
"product": {
"name": "openshift-logging/opa-openshift-rhel8@sha256:4c1b37da97e80aa76f2612f34745180a026214a415ed9a186ab81ec8fa96e17d_amd64",
"product_id": "openshift-logging/opa-openshift-rhel8@sha256:4c1b37da97e80aa76f2612f34745180a026214a415ed9a186ab81ec8fa96e17d_amd64",
"product_identification_helper": {
"purl": "pkg:oci/opa-openshift-rhel8@sha256:4c1b37da97e80aa76f2612f34745180a026214a415ed9a186ab81ec8fa96e17d?arch=amd64\u0026repository_url=registry.redhat.io/openshift-logging/opa-openshift-rhel8\u0026tag=v0.1.0-27"
}
}
}
],
"category": "architecture",
"name": "amd64"
},
{
"branches": [
{
"category": "product_version",
"name": "openshift-logging/cluster-logging-rhel8-operator@sha256:11c10388503a708a962e3dfc5cdd9b6ad5c5d4d4a68b11f97f8fae2cc3884083_s390x",
"product": {
"name": "openshift-logging/cluster-logging-rhel8-operator@sha256:11c10388503a708a962e3dfc5cdd9b6ad5c5d4d4a68b11f97f8fae2cc3884083_s390x",
"product_id": "openshift-logging/cluster-logging-rhel8-operator@sha256:11c10388503a708a962e3dfc5cdd9b6ad5c5d4d4a68b11f97f8fae2cc3884083_s390x",
"product_identification_helper": {
"purl": "pkg:oci/cluster-logging-rhel8-operator@sha256:11c10388503a708a962e3dfc5cdd9b6ad5c5d4d4a68b11f97f8fae2cc3884083?arch=s390x\u0026repository_url=registry.redhat.io/openshift-logging/cluster-logging-rhel8-operator\u0026tag=v5.5.4-7"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/elasticsearch-rhel8-operator@sha256:5236634419119024d3f8779dbd78639a54c2323389f56fbf25dacdc499a072d3_s390x",
"product": {
"name": "openshift-logging/elasticsearch-rhel8-operator@sha256:5236634419119024d3f8779dbd78639a54c2323389f56fbf25dacdc499a072d3_s390x",
"product_id": "openshift-logging/elasticsearch-rhel8-operator@sha256:5236634419119024d3f8779dbd78639a54c2323389f56fbf25dacdc499a072d3_s390x",
"product_identification_helper": {
"purl": "pkg:oci/elasticsearch-rhel8-operator@sha256:5236634419119024d3f8779dbd78639a54c2323389f56fbf25dacdc499a072d3?arch=s390x\u0026repository_url=registry.redhat.io/openshift-logging/elasticsearch-rhel8-operator\u0026tag=v5.5.4-3"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/elasticsearch-proxy-rhel8@sha256:dcdd0c515b3b5a1a6e807929fb8e8d65c1ee2aba3bf696d2b9f852e8994e47b8_s390x",
"product": {
"name": "openshift-logging/elasticsearch-proxy-rhel8@sha256:dcdd0c515b3b5a1a6e807929fb8e8d65c1ee2aba3bf696d2b9f852e8994e47b8_s390x",
"product_id": "openshift-logging/elasticsearch-proxy-rhel8@sha256:dcdd0c515b3b5a1a6e807929fb8e8d65c1ee2aba3bf696d2b9f852e8994e47b8_s390x",
"product_identification_helper": {
"purl": "pkg:oci/elasticsearch-proxy-rhel8@sha256:dcdd0c515b3b5a1a6e807929fb8e8d65c1ee2aba3bf696d2b9f852e8994e47b8?arch=s390x\u0026repository_url=registry.redhat.io/openshift-logging/elasticsearch-proxy-rhel8\u0026tag=v1.0.0-303"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/log-file-metric-exporter-rhel8@sha256:44e17bbdb8c7ac0a7868b3be7e29d58401702384dab3a66efaa08d1176035672_s390x",
"product": {
"name": "openshift-logging/log-file-metric-exporter-rhel8@sha256:44e17bbdb8c7ac0a7868b3be7e29d58401702384dab3a66efaa08d1176035672_s390x",
"product_id": "openshift-logging/log-file-metric-exporter-rhel8@sha256:44e17bbdb8c7ac0a7868b3be7e29d58401702384dab3a66efaa08d1176035672_s390x",
"product_identification_helper": {
"purl": "pkg:oci/log-file-metric-exporter-rhel8@sha256:44e17bbdb8c7ac0a7868b3be7e29d58401702384dab3a66efaa08d1176035672?arch=s390x\u0026repository_url=registry.redhat.io/openshift-logging/log-file-metric-exporter-rhel8\u0026tag=v1.1.0-71"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/logging-curator5-rhel8@sha256:6f17fc02901a898b77c674cd4ba1764423e849c5faa888b2907ff7356accc66c_s390x",
"product": {
"name": "openshift-logging/logging-curator5-rhel8@sha256:6f17fc02901a898b77c674cd4ba1764423e849c5faa888b2907ff7356accc66c_s390x",
"product_id": "openshift-logging/logging-curator5-rhel8@sha256:6f17fc02901a898b77c674cd4ba1764423e849c5faa888b2907ff7356accc66c_s390x",
"product_identification_helper": {
"purl": "pkg:oci/logging-curator5-rhel8@sha256:6f17fc02901a898b77c674cd4ba1764423e849c5faa888b2907ff7356accc66c?arch=s390x\u0026repository_url=registry.redhat.io/openshift-logging/logging-curator5-rhel8\u0026tag=v5.8.1-245"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/elasticsearch6-rhel8@sha256:7c143b790fef75a04e8ed1be49576861651f66371355a3f5aa304a325faf6e5c_s390x",
"product": {
"name": "openshift-logging/elasticsearch6-rhel8@sha256:7c143b790fef75a04e8ed1be49576861651f66371355a3f5aa304a325faf6e5c_s390x",
"product_id": "openshift-logging/elasticsearch6-rhel8@sha256:7c143b790fef75a04e8ed1be49576861651f66371355a3f5aa304a325faf6e5c_s390x",
"product_identification_helper": {
"purl": "pkg:oci/elasticsearch6-rhel8@sha256:7c143b790fef75a04e8ed1be49576861651f66371355a3f5aa304a325faf6e5c?arch=s390x\u0026repository_url=registry.redhat.io/openshift-logging/elasticsearch6-rhel8\u0026tag=v6.8.1-264"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/eventrouter-rhel8@sha256:eaf322aeccc73ec9d8d5f5a9d6ee368ee3f68409031e18a60cc699e3ca5c144b_s390x",
"product": {
"name": "openshift-logging/eventrouter-rhel8@sha256:eaf322aeccc73ec9d8d5f5a9d6ee368ee3f68409031e18a60cc699e3ca5c144b_s390x",
"product_id": "openshift-logging/eventrouter-rhel8@sha256:eaf322aeccc73ec9d8d5f5a9d6ee368ee3f68409031e18a60cc699e3ca5c144b_s390x",
"product_identification_helper": {
"purl": "pkg:oci/eventrouter-rhel8@sha256:eaf322aeccc73ec9d8d5f5a9d6ee368ee3f68409031e18a60cc699e3ca5c144b?arch=s390x\u0026repository_url=registry.redhat.io/openshift-logging/eventrouter-rhel8\u0026tag=v0.4.0-52"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/fluentd-rhel8@sha256:490740ea41377e7d18ffba700a5022915edc13f6b38f86a6d9d475dfc61df935_s390x",
"product": {
"name": "openshift-logging/fluentd-rhel8@sha256:490740ea41377e7d18ffba700a5022915edc13f6b38f86a6d9d475dfc61df935_s390x",
"product_id": "openshift-logging/fluentd-rhel8@sha256:490740ea41377e7d18ffba700a5022915edc13f6b38f86a6d9d475dfc61df935_s390x",
"product_identification_helper": {
"purl": "pkg:oci/fluentd-rhel8@sha256:490740ea41377e7d18ffba700a5022915edc13f6b38f86a6d9d475dfc61df935?arch=s390x\u0026repository_url=registry.redhat.io/openshift-logging/fluentd-rhel8\u0026tag=v1.14.6-61"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/kibana6-rhel8@sha256:43e4da1a741543ac8cdf646901aff3185e5f30d6fad7e68a2233e2bd8d4ebe4b_s390x",
"product": {
"name": "openshift-logging/kibana6-rhel8@sha256:43e4da1a741543ac8cdf646901aff3185e5f30d6fad7e68a2233e2bd8d4ebe4b_s390x",
"product_id": "openshift-logging/kibana6-rhel8@sha256:43e4da1a741543ac8cdf646901aff3185e5f30d6fad7e68a2233e2bd8d4ebe4b_s390x",
"product_identification_helper": {
"purl": "pkg:oci/kibana6-rhel8@sha256:43e4da1a741543ac8cdf646901aff3185e5f30d6fad7e68a2233e2bd8d4ebe4b?arch=s390x\u0026repository_url=registry.redhat.io/openshift-logging/kibana6-rhel8\u0026tag=v6.8.1-301"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/logging-loki-rhel8@sha256:6242c3792c8c0469012be8b0140c2476e41f80b5271ba78ff42c63aa041be30f_s390x",
"product": {
"name": "openshift-logging/logging-loki-rhel8@sha256:6242c3792c8c0469012be8b0140c2476e41f80b5271ba78ff42c63aa041be30f_s390x",
"product_id": "openshift-logging/logging-loki-rhel8@sha256:6242c3792c8c0469012be8b0140c2476e41f80b5271ba78ff42c63aa041be30f_s390x",
"product_identification_helper": {
"purl": "pkg:oci/logging-loki-rhel8@sha256:6242c3792c8c0469012be8b0140c2476e41f80b5271ba78ff42c63aa041be30f?arch=s390x\u0026repository_url=registry.redhat.io/openshift-logging/logging-loki-rhel8\u0026tag=v2.6.1-21"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/vector-rhel8@sha256:c117a0024d06340a9a28686c144642d6591192738f263f4684a7d09af0b16c71_s390x",
"product": {
"name": "openshift-logging/vector-rhel8@sha256:c117a0024d06340a9a28686c144642d6591192738f263f4684a7d09af0b16c71_s390x",
"product_id": "openshift-logging/vector-rhel8@sha256:c117a0024d06340a9a28686c144642d6591192738f263f4684a7d09af0b16c71_s390x",
"product_identification_helper": {
"purl": "pkg:oci/vector-rhel8@sha256:c117a0024d06340a9a28686c144642d6591192738f263f4684a7d09af0b16c71?arch=s390x\u0026repository_url=registry.redhat.io/openshift-logging/vector-rhel8\u0026tag=v0.21.0-34"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/logging-view-plugin-rhel8@sha256:e3e5b570f9c819cb10ad38e928a301e8f0554e45052037b03f1ba81a3faa6a15_s390x",
"product": {
"name": "openshift-logging/logging-view-plugin-rhel8@sha256:e3e5b570f9c819cb10ad38e928a301e8f0554e45052037b03f1ba81a3faa6a15_s390x",
"product_id": "openshift-logging/logging-view-plugin-rhel8@sha256:e3e5b570f9c819cb10ad38e928a301e8f0554e45052037b03f1ba81a3faa6a15_s390x",
"product_identification_helper": {
"purl": "pkg:oci/logging-view-plugin-rhel8@sha256:e3e5b570f9c819cb10ad38e928a301e8f0554e45052037b03f1ba81a3faa6a15?arch=s390x\u0026repository_url=registry.redhat.io/openshift-logging/logging-view-plugin-rhel8\u0026tag=v5.5.4-2"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/loki-rhel8-operator@sha256:43fae2b6532712da7d0f83b5dda5797c9764fcac4b0e18580a19e54ee7dfcff6_s390x",
"product": {
"name": "openshift-logging/loki-rhel8-operator@sha256:43fae2b6532712da7d0f83b5dda5797c9764fcac4b0e18580a19e54ee7dfcff6_s390x",
"product_id": "openshift-logging/loki-rhel8-operator@sha256:43fae2b6532712da7d0f83b5dda5797c9764fcac4b0e18580a19e54ee7dfcff6_s390x",
"product_identification_helper": {
"purl": "pkg:oci/loki-rhel8-operator@sha256:43fae2b6532712da7d0f83b5dda5797c9764fcac4b0e18580a19e54ee7dfcff6?arch=s390x\u0026repository_url=registry.redhat.io/openshift-logging/loki-rhel8-operator\u0026tag=v5.5.4-4"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/lokistack-gateway-rhel8@sha256:5954a498e527ee59a3f655250a4f5535a26b49c6fd61889271affb08104839f8_s390x",
"product": {
"name": "openshift-logging/lokistack-gateway-rhel8@sha256:5954a498e527ee59a3f655250a4f5535a26b49c6fd61889271affb08104839f8_s390x",
"product_id": "openshift-logging/lokistack-gateway-rhel8@sha256:5954a498e527ee59a3f655250a4f5535a26b49c6fd61889271affb08104839f8_s390x",
"product_identification_helper": {
"purl": "pkg:oci/lokistack-gateway-rhel8@sha256:5954a498e527ee59a3f655250a4f5535a26b49c6fd61889271affb08104839f8?arch=s390x\u0026repository_url=registry.redhat.io/openshift-logging/lokistack-gateway-rhel8\u0026tag=v0.1.0-57"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/opa-openshift-rhel8@sha256:fc99739f4354e8b28613f50b441d3f7a93bea3e3b106d7c052b607c24b994b9e_s390x",
"product": {
"name": "openshift-logging/opa-openshift-rhel8@sha256:fc99739f4354e8b28613f50b441d3f7a93bea3e3b106d7c052b607c24b994b9e_s390x",
"product_id": "openshift-logging/opa-openshift-rhel8@sha256:fc99739f4354e8b28613f50b441d3f7a93bea3e3b106d7c052b607c24b994b9e_s390x",
"product_identification_helper": {
"purl": "pkg:oci/opa-openshift-rhel8@sha256:fc99739f4354e8b28613f50b441d3f7a93bea3e3b106d7c052b607c24b994b9e?arch=s390x\u0026repository_url=registry.redhat.io/openshift-logging/opa-openshift-rhel8\u0026tag=v0.1.0-27"
}
}
}
],
"category": "architecture",
"name": "s390x"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/cluster-logging-operator-bundle@sha256:a78fd59207ef6cc8ddaaa3f3ae7140b7678e96e0677517623d1537afc05e84dd_amd64 as a component of RHOL 5.5 for RHEL 8",
"product_id": "8Base-RHOL-5.5:openshift-logging/cluster-logging-operator-bundle@sha256:a78fd59207ef6cc8ddaaa3f3ae7140b7678e96e0677517623d1537afc05e84dd_amd64"
},
"product_reference": "openshift-logging/cluster-logging-operator-bundle@sha256:a78fd59207ef6cc8ddaaa3f3ae7140b7678e96e0677517623d1537afc05e84dd_amd64",
"relates_to_product_reference": "8Base-RHOL-5.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/cluster-logging-rhel8-operator@sha256:07ab076aa9b573d330ace59bf4de080ea64dbc7b3424357fc39c0c70ede27873_arm64 as a component of RHOL 5.5 for RHEL 8",
"product_id": "8Base-RHOL-5.5:openshift-logging/cluster-logging-rhel8-operator@sha256:07ab076aa9b573d330ace59bf4de080ea64dbc7b3424357fc39c0c70ede27873_arm64"
},
"product_reference": "openshift-logging/cluster-logging-rhel8-operator@sha256:07ab076aa9b573d330ace59bf4de080ea64dbc7b3424357fc39c0c70ede27873_arm64",
"relates_to_product_reference": "8Base-RHOL-5.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/cluster-logging-rhel8-operator@sha256:11c10388503a708a962e3dfc5cdd9b6ad5c5d4d4a68b11f97f8fae2cc3884083_s390x as a component of RHOL 5.5 for RHEL 8",
"product_id": "8Base-RHOL-5.5:openshift-logging/cluster-logging-rhel8-operator@sha256:11c10388503a708a962e3dfc5cdd9b6ad5c5d4d4a68b11f97f8fae2cc3884083_s390x"
},
"product_reference": "openshift-logging/cluster-logging-rhel8-operator@sha256:11c10388503a708a962e3dfc5cdd9b6ad5c5d4d4a68b11f97f8fae2cc3884083_s390x",
"relates_to_product_reference": "8Base-RHOL-5.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/cluster-logging-rhel8-operator@sha256:414649f77a20e04b3eb16d64acf81a4d261394016d4a890da309cbb8216c1d4a_amd64 as a component of RHOL 5.5 for RHEL 8",
"product_id": "8Base-RHOL-5.5:openshift-logging/cluster-logging-rhel8-operator@sha256:414649f77a20e04b3eb16d64acf81a4d261394016d4a890da309cbb8216c1d4a_amd64"
},
"product_reference": "openshift-logging/cluster-logging-rhel8-operator@sha256:414649f77a20e04b3eb16d64acf81a4d261394016d4a890da309cbb8216c1d4a_amd64",
"relates_to_product_reference": "8Base-RHOL-5.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/cluster-logging-rhel8-operator@sha256:b4eeab42904e5a81e7adb8801bd901a53a5b81b2464b33816c203daf7587f89f_ppc64le as a component of RHOL 5.5 for RHEL 8",
"product_id": "8Base-RHOL-5.5:openshift-logging/cluster-logging-rhel8-operator@sha256:b4eeab42904e5a81e7adb8801bd901a53a5b81b2464b33816c203daf7587f89f_ppc64le"
},
"product_reference": "openshift-logging/cluster-logging-rhel8-operator@sha256:b4eeab42904e5a81e7adb8801bd901a53a5b81b2464b33816c203daf7587f89f_ppc64le",
"relates_to_product_reference": "8Base-RHOL-5.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/elasticsearch-operator-bundle@sha256:d09cafc7f6bbb446608051cebb1c943575e80f9987bb4cad8af53e0354a0e7cd_amd64 as a component of RHOL 5.5 for RHEL 8",
"product_id": "8Base-RHOL-5.5:openshift-logging/elasticsearch-operator-bundle@sha256:d09cafc7f6bbb446608051cebb1c943575e80f9987bb4cad8af53e0354a0e7cd_amd64"
},
"product_reference": "openshift-logging/elasticsearch-operator-bundle@sha256:d09cafc7f6bbb446608051cebb1c943575e80f9987bb4cad8af53e0354a0e7cd_amd64",
"relates_to_product_reference": "8Base-RHOL-5.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/elasticsearch-proxy-rhel8@sha256:89f980b63cbcf7956449d8cee41c884ea4ae7d76f02454f7e32058576fd92fa5_ppc64le as a component of RHOL 5.5 for RHEL 8",
"product_id": "8Base-RHOL-5.5:openshift-logging/elasticsearch-proxy-rhel8@sha256:89f980b63cbcf7956449d8cee41c884ea4ae7d76f02454f7e32058576fd92fa5_ppc64le"
},
"product_reference": "openshift-logging/elasticsearch-proxy-rhel8@sha256:89f980b63cbcf7956449d8cee41c884ea4ae7d76f02454f7e32058576fd92fa5_ppc64le",
"relates_to_product_reference": "8Base-RHOL-5.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/elasticsearch-proxy-rhel8@sha256:a6c03fd0fe66206bff59ba019cc60085de4c65d4efae8a637f1ac48b91688371_arm64 as a component of RHOL 5.5 for RHEL 8",
"product_id": "8Base-RHOL-5.5:openshift-logging/elasticsearch-proxy-rhel8@sha256:a6c03fd0fe66206bff59ba019cc60085de4c65d4efae8a637f1ac48b91688371_arm64"
},
"product_reference": "openshift-logging/elasticsearch-proxy-rhel8@sha256:a6c03fd0fe66206bff59ba019cc60085de4c65d4efae8a637f1ac48b91688371_arm64",
"relates_to_product_reference": "8Base-RHOL-5.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/elasticsearch-proxy-rhel8@sha256:dcdd0c515b3b5a1a6e807929fb8e8d65c1ee2aba3bf696d2b9f852e8994e47b8_s390x as a component of RHOL 5.5 for RHEL 8",
"product_id": "8Base-RHOL-5.5:openshift-logging/elasticsearch-proxy-rhel8@sha256:dcdd0c515b3b5a1a6e807929fb8e8d65c1ee2aba3bf696d2b9f852e8994e47b8_s390x"
},
"product_reference": "openshift-logging/elasticsearch-proxy-rhel8@sha256:dcdd0c515b3b5a1a6e807929fb8e8d65c1ee2aba3bf696d2b9f852e8994e47b8_s390x",
"relates_to_product_reference": "8Base-RHOL-5.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/elasticsearch-proxy-rhel8@sha256:e1755002225548182e17bd82b1c129b2ac61e623c3c37c4d51a535012088cacc_amd64 as a component of RHOL 5.5 for RHEL 8",
"product_id": "8Base-RHOL-5.5:openshift-logging/elasticsearch-proxy-rhel8@sha256:e1755002225548182e17bd82b1c129b2ac61e623c3c37c4d51a535012088cacc_amd64"
},
"product_reference": "openshift-logging/elasticsearch-proxy-rhel8@sha256:e1755002225548182e17bd82b1c129b2ac61e623c3c37c4d51a535012088cacc_amd64",
"relates_to_product_reference": "8Base-RHOL-5.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/elasticsearch-rhel8-operator@sha256:5236634419119024d3f8779dbd78639a54c2323389f56fbf25dacdc499a072d3_s390x as a component of RHOL 5.5 for RHEL 8",
"product_id": "8Base-RHOL-5.5:openshift-logging/elasticsearch-rhel8-operator@sha256:5236634419119024d3f8779dbd78639a54c2323389f56fbf25dacdc499a072d3_s390x"
},
"product_reference": "openshift-logging/elasticsearch-rhel8-operator@sha256:5236634419119024d3f8779dbd78639a54c2323389f56fbf25dacdc499a072d3_s390x",
"relates_to_product_reference": "8Base-RHOL-5.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/elasticsearch-rhel8-operator@sha256:64954ce7d233d6c109e46645cd8d55d8a06068328ce3a22f646ede7c9fde78c8_ppc64le as a component of RHOL 5.5 for RHEL 8",
"product_id": "8Base-RHOL-5.5:openshift-logging/elasticsearch-rhel8-operator@sha256:64954ce7d233d6c109e46645cd8d55d8a06068328ce3a22f646ede7c9fde78c8_ppc64le"
},
"product_reference": "openshift-logging/elasticsearch-rhel8-operator@sha256:64954ce7d233d6c109e46645cd8d55d8a06068328ce3a22f646ede7c9fde78c8_ppc64le",
"relates_to_product_reference": "8Base-RHOL-5.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/elasticsearch-rhel8-operator@sha256:c25b7b7c0f073fdfcf9fd90572790064cdff26d61a4e4db751d4197ff2c5b4c1_amd64 as a component of RHOL 5.5 for RHEL 8",
"product_id": "8Base-RHOL-5.5:openshift-logging/elasticsearch-rhel8-operator@sha256:c25b7b7c0f073fdfcf9fd90572790064cdff26d61a4e4db751d4197ff2c5b4c1_amd64"
},
"product_reference": "openshift-logging/elasticsearch-rhel8-operator@sha256:c25b7b7c0f073fdfcf9fd90572790064cdff26d61a4e4db751d4197ff2c5b4c1_amd64",
"relates_to_product_reference": "8Base-RHOL-5.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/elasticsearch-rhel8-operator@sha256:dce08ac53092fc51958b78df9b4b870926a079fe4cdc4fb2d46c8ba545a22e6a_arm64 as a component of RHOL 5.5 for RHEL 8",
"product_id": "8Base-RHOL-5.5:openshift-logging/elasticsearch-rhel8-operator@sha256:dce08ac53092fc51958b78df9b4b870926a079fe4cdc4fb2d46c8ba545a22e6a_arm64"
},
"product_reference": "openshift-logging/elasticsearch-rhel8-operator@sha256:dce08ac53092fc51958b78df9b4b870926a079fe4cdc4fb2d46c8ba545a22e6a_arm64",
"relates_to_product_reference": "8Base-RHOL-5.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/elasticsearch6-rhel8@sha256:1019e03ddff4726caae53e800403cbaa82ce057c7553552ad027a37d3be5824f_ppc64le as a component of RHOL 5.5 for RHEL 8",
"product_id": "8Base-RHOL-5.5:openshift-logging/elasticsearch6-rhel8@sha256:1019e03ddff4726caae53e800403cbaa82ce057c7553552ad027a37d3be5824f_ppc64le"
},
"product_reference": "openshift-logging/elasticsearch6-rhel8@sha256:1019e03ddff4726caae53e800403cbaa82ce057c7553552ad027a37d3be5824f_ppc64le",
"relates_to_product_reference": "8Base-RHOL-5.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/elasticsearch6-rhel8@sha256:6dfb5e18aa3dc6ce8e2535e13de1d53eea68b218854971e0eb594f677f6da7c7_arm64 as a component of RHOL 5.5 for RHEL 8",
"product_id": "8Base-RHOL-5.5:openshift-logging/elasticsearch6-rhel8@sha256:6dfb5e18aa3dc6ce8e2535e13de1d53eea68b218854971e0eb594f677f6da7c7_arm64"
},
"product_reference": "openshift-logging/elasticsearch6-rhel8@sha256:6dfb5e18aa3dc6ce8e2535e13de1d53eea68b218854971e0eb594f677f6da7c7_arm64",
"relates_to_product_reference": "8Base-RHOL-5.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/elasticsearch6-rhel8@sha256:7c143b790fef75a04e8ed1be49576861651f66371355a3f5aa304a325faf6e5c_s390x as a component of RHOL 5.5 for RHEL 8",
"product_id": "8Base-RHOL-5.5:openshift-logging/elasticsearch6-rhel8@sha256:7c143b790fef75a04e8ed1be49576861651f66371355a3f5aa304a325faf6e5c_s390x"
},
"product_reference": "openshift-logging/elasticsearch6-rhel8@sha256:7c143b790fef75a04e8ed1be49576861651f66371355a3f5aa304a325faf6e5c_s390x",
"relates_to_product_reference": "8Base-RHOL-5.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/elasticsearch6-rhel8@sha256:bf574cff65baba457e3199aae7d1b0e605403a7968e9af746a6cfc5d9a4b29c5_amd64 as a component of RHOL 5.5 for RHEL 8",
"product_id": "8Base-RHOL-5.5:openshift-logging/elasticsearch6-rhel8@sha256:bf574cff65baba457e3199aae7d1b0e605403a7968e9af746a6cfc5d9a4b29c5_amd64"
},
"product_reference": "openshift-logging/elasticsearch6-rhel8@sha256:bf574cff65baba457e3199aae7d1b0e605403a7968e9af746a6cfc5d9a4b29c5_amd64",
"relates_to_product_reference": "8Base-RHOL-5.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/eventrouter-rhel8@sha256:0590711175be3b10f646256407cb7d72df63333589d527199260f738a91f2e3d_arm64 as a component of RHOL 5.5 for RHEL 8",
"product_id": "8Base-RHOL-5.5:openshift-logging/eventrouter-rhel8@sha256:0590711175be3b10f646256407cb7d72df63333589d527199260f738a91f2e3d_arm64"
},
"product_reference": "openshift-logging/eventrouter-rhel8@sha256:0590711175be3b10f646256407cb7d72df63333589d527199260f738a91f2e3d_arm64",
"relates_to_product_reference": "8Base-RHOL-5.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/eventrouter-rhel8@sha256:646995416047cf48070c60b9ab064d454ff9ed772a92558f9627e3832f0ccd3c_amd64 as a component of RHOL 5.5 for RHEL 8",
"product_id": "8Base-RHOL-5.5:openshift-logging/eventrouter-rhel8@sha256:646995416047cf48070c60b9ab064d454ff9ed772a92558f9627e3832f0ccd3c_amd64"
},
"product_reference": "openshift-logging/eventrouter-rhel8@sha256:646995416047cf48070c60b9ab064d454ff9ed772a92558f9627e3832f0ccd3c_amd64",
"relates_to_product_reference": "8Base-RHOL-5.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/eventrouter-rhel8@sha256:ac91af413a363890bb01772488e371e4dc698ecfb77f047bb83bf638d497aa7c_ppc64le as a component of RHOL 5.5 for RHEL 8",
"product_id": "8Base-RHOL-5.5:openshift-logging/eventrouter-rhel8@sha256:ac91af413a363890bb01772488e371e4dc698ecfb77f047bb83bf638d497aa7c_ppc64le"
},
"product_reference": "openshift-logging/eventrouter-rhel8@sha256:ac91af413a363890bb01772488e371e4dc698ecfb77f047bb83bf638d497aa7c_ppc64le",
"relates_to_product_reference": "8Base-RHOL-5.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/eventrouter-rhel8@sha256:eaf322aeccc73ec9d8d5f5a9d6ee368ee3f68409031e18a60cc699e3ca5c144b_s390x as a component of RHOL 5.5 for RHEL 8",
"product_id": "8Base-RHOL-5.5:openshift-logging/eventrouter-rhel8@sha256:eaf322aeccc73ec9d8d5f5a9d6ee368ee3f68409031e18a60cc699e3ca5c144b_s390x"
},
"product_reference": "openshift-logging/eventrouter-rhel8@sha256:eaf322aeccc73ec9d8d5f5a9d6ee368ee3f68409031e18a60cc699e3ca5c144b_s390x",
"relates_to_product_reference": "8Base-RHOL-5.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/fluentd-rhel8@sha256:3d4b83f86b2d2f1c73ab184a3471d0d4da04bb6e76487c9f546da87998e480dc_arm64 as a component of RHOL 5.5 for RHEL 8",
"product_id": "8Base-RHOL-5.5:openshift-logging/fluentd-rhel8@sha256:3d4b83f86b2d2f1c73ab184a3471d0d4da04bb6e76487c9f546da87998e480dc_arm64"
},
"product_reference": "openshift-logging/fluentd-rhel8@sha256:3d4b83f86b2d2f1c73ab184a3471d0d4da04bb6e76487c9f546da87998e480dc_arm64",
"relates_to_product_reference": "8Base-RHOL-5.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/fluentd-rhel8@sha256:490740ea41377e7d18ffba700a5022915edc13f6b38f86a6d9d475dfc61df935_s390x as a component of RHOL 5.5 for RHEL 8",
"product_id": "8Base-RHOL-5.5:openshift-logging/fluentd-rhel8@sha256:490740ea41377e7d18ffba700a5022915edc13f6b38f86a6d9d475dfc61df935_s390x"
},
"product_reference": "openshift-logging/fluentd-rhel8@sha256:490740ea41377e7d18ffba700a5022915edc13f6b38f86a6d9d475dfc61df935_s390x",
"relates_to_product_reference": "8Base-RHOL-5.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/fluentd-rhel8@sha256:790fe2b90b51f8aff5d10b1525bcf7d35e5517674245993dac6696ebf2a24baf_ppc64le as a component of RHOL 5.5 for RHEL 8",
"product_id": "8Base-RHOL-5.5:openshift-logging/fluentd-rhel8@sha256:790fe2b90b51f8aff5d10b1525bcf7d35e5517674245993dac6696ebf2a24baf_ppc64le"
},
"product_reference": "openshift-logging/fluentd-rhel8@sha256:790fe2b90b51f8aff5d10b1525bcf7d35e5517674245993dac6696ebf2a24baf_ppc64le",
"relates_to_product_reference": "8Base-RHOL-5.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/fluentd-rhel8@sha256:dc8fe0ca5a488c6738e6904871a620f9444f30475863a09846f8205569c25e54_amd64 as a component of RHOL 5.5 for RHEL 8",
"product_id": "8Base-RHOL-5.5:openshift-logging/fluentd-rhel8@sha256:dc8fe0ca5a488c6738e6904871a620f9444f30475863a09846f8205569c25e54_amd64"
},
"product_reference": "openshift-logging/fluentd-rhel8@sha256:dc8fe0ca5a488c6738e6904871a620f9444f30475863a09846f8205569c25e54_amd64",
"relates_to_product_reference": "8Base-RHOL-5.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/kibana6-rhel8@sha256:43e4da1a741543ac8cdf646901aff3185e5f30d6fad7e68a2233e2bd8d4ebe4b_s390x as a component of RHOL 5.5 for RHEL 8",
"product_id": "8Base-RHOL-5.5:openshift-logging/kibana6-rhel8@sha256:43e4da1a741543ac8cdf646901aff3185e5f30d6fad7e68a2233e2bd8d4ebe4b_s390x"
},
"product_reference": "openshift-logging/kibana6-rhel8@sha256:43e4da1a741543ac8cdf646901aff3185e5f30d6fad7e68a2233e2bd8d4ebe4b_s390x",
"relates_to_product_reference": "8Base-RHOL-5.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/kibana6-rhel8@sha256:44f3446b172b3ea7f0fd4de9f8039eba256a6bea56715748af00f361e49b1519_amd64 as a component of RHOL 5.5 for RHEL 8",
"product_id": "8Base-RHOL-5.5:openshift-logging/kibana6-rhel8@sha256:44f3446b172b3ea7f0fd4de9f8039eba256a6bea56715748af00f361e49b1519_amd64"
},
"product_reference": "openshift-logging/kibana6-rhel8@sha256:44f3446b172b3ea7f0fd4de9f8039eba256a6bea56715748af00f361e49b1519_amd64",
"relates_to_product_reference": "8Base-RHOL-5.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/kibana6-rhel8@sha256:93c33d6810eb6e71e7e543c1c26a29e163214df64121c814b4424322308b0a30_ppc64le as a component of RHOL 5.5 for RHEL 8",
"product_id": "8Base-RHOL-5.5:openshift-logging/kibana6-rhel8@sha256:93c33d6810eb6e71e7e543c1c26a29e163214df64121c814b4424322308b0a30_ppc64le"
},
"product_reference": "openshift-logging/kibana6-rhel8@sha256:93c33d6810eb6e71e7e543c1c26a29e163214df64121c814b4424322308b0a30_ppc64le",
"relates_to_product_reference": "8Base-RHOL-5.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/kibana6-rhel8@sha256:ca4f273fb088980bfcc3607bd7ea2d40cc93298262cb3f5ce4054a6235152d1e_arm64 as a component of RHOL 5.5 for RHEL 8",
"product_id": "8Base-RHOL-5.5:openshift-logging/kibana6-rhel8@sha256:ca4f273fb088980bfcc3607bd7ea2d40cc93298262cb3f5ce4054a6235152d1e_arm64"
},
"product_reference": "openshift-logging/kibana6-rhel8@sha256:ca4f273fb088980bfcc3607bd7ea2d40cc93298262cb3f5ce4054a6235152d1e_arm64",
"relates_to_product_reference": "8Base-RHOL-5.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/log-file-metric-exporter-rhel8@sha256:44e17bbdb8c7ac0a7868b3be7e29d58401702384dab3a66efaa08d1176035672_s390x as a component of RHOL 5.5 for RHEL 8",
"product_id": "8Base-RHOL-5.5:openshift-logging/log-file-metric-exporter-rhel8@sha256:44e17bbdb8c7ac0a7868b3be7e29d58401702384dab3a66efaa08d1176035672_s390x"
},
"product_reference": "openshift-logging/log-file-metric-exporter-rhel8@sha256:44e17bbdb8c7ac0a7868b3be7e29d58401702384dab3a66efaa08d1176035672_s390x",
"relates_to_product_reference": "8Base-RHOL-5.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/log-file-metric-exporter-rhel8@sha256:8b76243469011045e72b7a339288986e7561a3005aa94d580d5b1082580e9cec_ppc64le as a component of RHOL 5.5 for RHEL 8",
"product_id": "8Base-RHOL-5.5:openshift-logging/log-file-metric-exporter-rhel8@sha256:8b76243469011045e72b7a339288986e7561a3005aa94d580d5b1082580e9cec_ppc64le"
},
"product_reference": "openshift-logging/log-file-metric-exporter-rhel8@sha256:8b76243469011045e72b7a339288986e7561a3005aa94d580d5b1082580e9cec_ppc64le",
"relates_to_product_reference": "8Base-RHOL-5.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/log-file-metric-exporter-rhel8@sha256:e91d4b026d38091cb707e0213f329d0781a3517f3eca4d209d09d6c1edb1a1d3_amd64 as a component of RHOL 5.5 for RHEL 8",
"product_id": "8Base-RHOL-5.5:openshift-logging/log-file-metric-exporter-rhel8@sha256:e91d4b026d38091cb707e0213f329d0781a3517f3eca4d209d09d6c1edb1a1d3_amd64"
},
"product_reference": "openshift-logging/log-file-metric-exporter-rhel8@sha256:e91d4b026d38091cb707e0213f329d0781a3517f3eca4d209d09d6c1edb1a1d3_amd64",
"relates_to_product_reference": "8Base-RHOL-5.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/log-file-metric-exporter-rhel8@sha256:f0ca78341daa3d41ffe460f5aa504219c72ee673dd57a82f344d3239b69717be_arm64 as a component of RHOL 5.5 for RHEL 8",
"product_id": "8Base-RHOL-5.5:openshift-logging/log-file-metric-exporter-rhel8@sha256:f0ca78341daa3d41ffe460f5aa504219c72ee673dd57a82f344d3239b69717be_arm64"
},
"product_reference": "openshift-logging/log-file-metric-exporter-rhel8@sha256:f0ca78341daa3d41ffe460f5aa504219c72ee673dd57a82f344d3239b69717be_arm64",
"relates_to_product_reference": "8Base-RHOL-5.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/logging-curator5-rhel8@sha256:6f17fc02901a898b77c674cd4ba1764423e849c5faa888b2907ff7356accc66c_s390x as a component of RHOL 5.5 for RHEL 8",
"product_id": "8Base-RHOL-5.5:openshift-logging/logging-curator5-rhel8@sha256:6f17fc02901a898b77c674cd4ba1764423e849c5faa888b2907ff7356accc66c_s390x"
},
"product_reference": "openshift-logging/logging-curator5-rhel8@sha256:6f17fc02901a898b77c674cd4ba1764423e849c5faa888b2907ff7356accc66c_s390x",
"relates_to_product_reference": "8Base-RHOL-5.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/logging-curator5-rhel8@sha256:c8ea484f5e15b7b53941f251db9b5be08c8cb6f3a14d99285277d9eadf969e98_arm64 as a component of RHOL 5.5 for RHEL 8",
"product_id": "8Base-RHOL-5.5:openshift-logging/logging-curator5-rhel8@sha256:c8ea484f5e15b7b53941f251db9b5be08c8cb6f3a14d99285277d9eadf969e98_arm64"
},
"product_reference": "openshift-logging/logging-curator5-rhel8@sha256:c8ea484f5e15b7b53941f251db9b5be08c8cb6f3a14d99285277d9eadf969e98_arm64",
"relates_to_product_reference": "8Base-RHOL-5.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/logging-curator5-rhel8@sha256:e26efb87488b53ebd4e5233515906974675b3a759f4a1c00f447df8821d5f030_ppc64le as a component of RHOL 5.5 for RHEL 8",
"product_id": "8Base-RHOL-5.5:openshift-logging/logging-curator5-rhel8@sha256:e26efb87488b53ebd4e5233515906974675b3a759f4a1c00f447df8821d5f030_ppc64le"
},
"product_reference": "openshift-logging/logging-curator5-rhel8@sha256:e26efb87488b53ebd4e5233515906974675b3a759f4a1c00f447df8821d5f030_ppc64le",
"relates_to_product_reference": "8Base-RHOL-5.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/logging-curator5-rhel8@sha256:e6ae5eef57de608fb1d4393fe824d0befffd8f5b696b5ce44e571fdcddb46f1f_amd64 as a component of RHOL 5.5 for RHEL 8",
"product_id": "8Base-RHOL-5.5:openshift-logging/logging-curator5-rhel8@sha256:e6ae5eef57de608fb1d4393fe824d0befffd8f5b696b5ce44e571fdcddb46f1f_amd64"
},
"product_reference": "openshift-logging/logging-curator5-rhel8@sha256:e6ae5eef57de608fb1d4393fe824d0befffd8f5b696b5ce44e571fdcddb46f1f_amd64",
"relates_to_product_reference": "8Base-RHOL-5.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/logging-loki-rhel8@sha256:6242c3792c8c0469012be8b0140c2476e41f80b5271ba78ff42c63aa041be30f_s390x as a component of RHOL 5.5 for RHEL 8",
"product_id": "8Base-RHOL-5.5:openshift-logging/logging-loki-rhel8@sha256:6242c3792c8c0469012be8b0140c2476e41f80b5271ba78ff42c63aa041be30f_s390x"
},
"product_reference": "openshift-logging/logging-loki-rhel8@sha256:6242c3792c8c0469012be8b0140c2476e41f80b5271ba78ff42c63aa041be30f_s390x",
"relates_to_product_reference": "8Base-RHOL-5.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/logging-loki-rhel8@sha256:947becc46b99656f9faa6067f2cf38dbef0d40e85b56d62aafcb243052920dfc_amd64 as a component of RHOL 5.5 for RHEL 8",
"product_id": "8Base-RHOL-5.5:openshift-logging/logging-loki-rhel8@sha256:947becc46b99656f9faa6067f2cf38dbef0d40e85b56d62aafcb243052920dfc_amd64"
},
"product_reference": "openshift-logging/logging-loki-rhel8@sha256:947becc46b99656f9faa6067f2cf38dbef0d40e85b56d62aafcb243052920dfc_amd64",
"relates_to_product_reference": "8Base-RHOL-5.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/logging-loki-rhel8@sha256:969ce1d586fb7fbdd65d07c0b790f48fd6f81e659d1323514906bb03ae9fe79b_ppc64le as a component of RHOL 5.5 for RHEL 8",
"product_id": "8Base-RHOL-5.5:openshift-logging/logging-loki-rhel8@sha256:969ce1d586fb7fbdd65d07c0b790f48fd6f81e659d1323514906bb03ae9fe79b_ppc64le"
},
"product_reference": "openshift-logging/logging-loki-rhel8@sha256:969ce1d586fb7fbdd65d07c0b790f48fd6f81e659d1323514906bb03ae9fe79b_ppc64le",
"relates_to_product_reference": "8Base-RHOL-5.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/logging-loki-rhel8@sha256:dd5e5a043befc54eeb63ff51a01691778053c90de5c9b8946d6a1d808fbcf0df_arm64 as a component of RHOL 5.5 for RHEL 8",
"product_id": "8Base-RHOL-5.5:openshift-logging/logging-loki-rhel8@sha256:dd5e5a043befc54eeb63ff51a01691778053c90de5c9b8946d6a1d808fbcf0df_arm64"
},
"product_reference": "openshift-logging/logging-loki-rhel8@sha256:dd5e5a043befc54eeb63ff51a01691778053c90de5c9b8946d6a1d808fbcf0df_arm64",
"relates_to_product_reference": "8Base-RHOL-5.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/logging-view-plugin-rhel8@sha256:147676e1a3c66757508be0046c28ccb7985f15af7f8f4a045fa5ca424c0c684d_arm64 as a component of RHOL 5.5 for RHEL 8",
"product_id": "8Base-RHOL-5.5:openshift-logging/logging-view-plugin-rhel8@sha256:147676e1a3c66757508be0046c28ccb7985f15af7f8f4a045fa5ca424c0c684d_arm64"
},
"product_reference": "openshift-logging/logging-view-plugin-rhel8@sha256:147676e1a3c66757508be0046c28ccb7985f15af7f8f4a045fa5ca424c0c684d_arm64",
"relates_to_product_reference": "8Base-RHOL-5.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/logging-view-plugin-rhel8@sha256:bea8f3f31073874a77af55c8664cbf167cd8bad5296e1bf444b9490b06484b56_amd64 as a component of RHOL 5.5 for RHEL 8",
"product_id": "8Base-RHOL-5.5:openshift-logging/logging-view-plugin-rhel8@sha256:bea8f3f31073874a77af55c8664cbf167cd8bad5296e1bf444b9490b06484b56_amd64"
},
"product_reference": "openshift-logging/logging-view-plugin-rhel8@sha256:bea8f3f31073874a77af55c8664cbf167cd8bad5296e1bf444b9490b06484b56_amd64",
"relates_to_product_reference": "8Base-RHOL-5.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/logging-view-plugin-rhel8@sha256:da8c90c5b3b68e9b98a76828a450a9d7c579256b04aa9daf87ddfab9bad5548c_ppc64le as a component of RHOL 5.5 for RHEL 8",
"product_id": "8Base-RHOL-5.5:openshift-logging/logging-view-plugin-rhel8@sha256:da8c90c5b3b68e9b98a76828a450a9d7c579256b04aa9daf87ddfab9bad5548c_ppc64le"
},
"product_reference": "openshift-logging/logging-view-plugin-rhel8@sha256:da8c90c5b3b68e9b98a76828a450a9d7c579256b04aa9daf87ddfab9bad5548c_ppc64le",
"relates_to_product_reference": "8Base-RHOL-5.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/logging-view-plugin-rhel8@sha256:e3e5b570f9c819cb10ad38e928a301e8f0554e45052037b03f1ba81a3faa6a15_s390x as a component of RHOL 5.5 for RHEL 8",
"product_id": "8Base-RHOL-5.5:openshift-logging/logging-view-plugin-rhel8@sha256:e3e5b570f9c819cb10ad38e928a301e8f0554e45052037b03f1ba81a3faa6a15_s390x"
},
"product_reference": "openshift-logging/logging-view-plugin-rhel8@sha256:e3e5b570f9c819cb10ad38e928a301e8f0554e45052037b03f1ba81a3faa6a15_s390x",
"relates_to_product_reference": "8Base-RHOL-5.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/loki-operator-bundle@sha256:1d75006c9d03648857963a8772644d4228361d97fb07c8652326b61fd5d30f8c_amd64 as a component of RHOL 5.5 for RHEL 8",
"product_id": "8Base-RHOL-5.5:openshift-logging/loki-operator-bundle@sha256:1d75006c9d03648857963a8772644d4228361d97fb07c8652326b61fd5d30f8c_amd64"
},
"product_reference": "openshift-logging/loki-operator-bundle@sha256:1d75006c9d03648857963a8772644d4228361d97fb07c8652326b61fd5d30f8c_amd64",
"relates_to_product_reference": "8Base-RHOL-5.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/loki-rhel8-operator@sha256:43fae2b6532712da7d0f83b5dda5797c9764fcac4b0e18580a19e54ee7dfcff6_s390x as a component of RHOL 5.5 for RHEL 8",
"product_id": "8Base-RHOL-5.5:openshift-logging/loki-rhel8-operator@sha256:43fae2b6532712da7d0f83b5dda5797c9764fcac4b0e18580a19e54ee7dfcff6_s390x"
},
"product_reference": "openshift-logging/loki-rhel8-operator@sha256:43fae2b6532712da7d0f83b5dda5797c9764fcac4b0e18580a19e54ee7dfcff6_s390x",
"relates_to_product_reference": "8Base-RHOL-5.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/loki-rhel8-operator@sha256:4eba6362f8aaa0450d07b87824148d2c15232b871d0ba6bc34f1962d2970e753_ppc64le as a component of RHOL 5.5 for RHEL 8",
"product_id": "8Base-RHOL-5.5:openshift-logging/loki-rhel8-operator@sha256:4eba6362f8aaa0450d07b87824148d2c15232b871d0ba6bc34f1962d2970e753_ppc64le"
},
"product_reference": "openshift-logging/loki-rhel8-operator@sha256:4eba6362f8aaa0450d07b87824148d2c15232b871d0ba6bc34f1962d2970e753_ppc64le",
"relates_to_product_reference": "8Base-RHOL-5.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/loki-rhel8-operator@sha256:dfa4ca06abb576fa071fb30c425bc6be631c0453939de562e1dc0b4e76de4f81_arm64 as a component of RHOL 5.5 for RHEL 8",
"product_id": "8Base-RHOL-5.5:openshift-logging/loki-rhel8-operator@sha256:dfa4ca06abb576fa071fb30c425bc6be631c0453939de562e1dc0b4e76de4f81_arm64"
},
"product_reference": "openshift-logging/loki-rhel8-operator@sha256:dfa4ca06abb576fa071fb30c425bc6be631c0453939de562e1dc0b4e76de4f81_arm64",
"relates_to_product_reference": "8Base-RHOL-5.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/loki-rhel8-operator@sha256:e5289e40532a01c605760b2f438acfb66257b730a89249269e46dc9c0058aec1_amd64 as a component of RHOL 5.5 for RHEL 8",
"product_id": "8Base-RHOL-5.5:openshift-logging/loki-rhel8-operator@sha256:e5289e40532a01c605760b2f438acfb66257b730a89249269e46dc9c0058aec1_amd64"
},
"product_reference": "openshift-logging/loki-rhel8-operator@sha256:e5289e40532a01c605760b2f438acfb66257b730a89249269e46dc9c0058aec1_amd64",
"relates_to_product_reference": "8Base-RHOL-5.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/lokistack-gateway-rhel8@sha256:0a3eb7a1a50b75528be737eb2768e671a643eea324c967a0381296b61f8e399e_arm64 as a component of RHOL 5.5 for RHEL 8",
"product_id": "8Base-RHOL-5.5:openshift-logging/lokistack-gateway-rhel8@sha256:0a3eb7a1a50b75528be737eb2768e671a643eea324c967a0381296b61f8e399e_arm64"
},
"product_reference": "openshift-logging/lokistack-gateway-rhel8@sha256:0a3eb7a1a50b75528be737eb2768e671a643eea324c967a0381296b61f8e399e_arm64",
"relates_to_product_reference": "8Base-RHOL-5.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/lokistack-gateway-rhel8@sha256:42ebf89821e0f8e4b7d03cc5a6d5a30d48f73a1ab2b7486c8a0bb1e5c2cfd4b4_ppc64le as a component of RHOL 5.5 for RHEL 8",
"product_id": "8Base-RHOL-5.5:openshift-logging/lokistack-gateway-rhel8@sha256:42ebf89821e0f8e4b7d03cc5a6d5a30d48f73a1ab2b7486c8a0bb1e5c2cfd4b4_ppc64le"
},
"product_reference": "openshift-logging/lokistack-gateway-rhel8@sha256:42ebf89821e0f8e4b7d03cc5a6d5a30d48f73a1ab2b7486c8a0bb1e5c2cfd4b4_ppc64le",
"relates_to_product_reference": "8Base-RHOL-5.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/lokistack-gateway-rhel8@sha256:449f4cf0b3d0c0d6724cc2346c2121df58ef43297c56cc540e05158ad5c8ffbc_amd64 as a component of RHOL 5.5 for RHEL 8",
"product_id": "8Base-RHOL-5.5:openshift-logging/lokistack-gateway-rhel8@sha256:449f4cf0b3d0c0d6724cc2346c2121df58ef43297c56cc540e05158ad5c8ffbc_amd64"
},
"product_reference": "openshift-logging/lokistack-gateway-rhel8@sha256:449f4cf0b3d0c0d6724cc2346c2121df58ef43297c56cc540e05158ad5c8ffbc_amd64",
"relates_to_product_reference": "8Base-RHOL-5.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/lokistack-gateway-rhel8@sha256:5954a498e527ee59a3f655250a4f5535a26b49c6fd61889271affb08104839f8_s390x as a component of RHOL 5.5 for RHEL 8",
"product_id": "8Base-RHOL-5.5:openshift-logging/lokistack-gateway-rhel8@sha256:5954a498e527ee59a3f655250a4f5535a26b49c6fd61889271affb08104839f8_s390x"
},
"product_reference": "openshift-logging/lokistack-gateway-rhel8@sha256:5954a498e527ee59a3f655250a4f5535a26b49c6fd61889271affb08104839f8_s390x",
"relates_to_product_reference": "8Base-RHOL-5.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/opa-openshift-rhel8@sha256:4c1b37da97e80aa76f2612f34745180a026214a415ed9a186ab81ec8fa96e17d_amd64 as a component of RHOL 5.5 for RHEL 8",
"product_id": "8Base-RHOL-5.5:openshift-logging/opa-openshift-rhel8@sha256:4c1b37da97e80aa76f2612f34745180a026214a415ed9a186ab81ec8fa96e17d_amd64"
},
"product_reference": "openshift-logging/opa-openshift-rhel8@sha256:4c1b37da97e80aa76f2612f34745180a026214a415ed9a186ab81ec8fa96e17d_amd64",
"relates_to_product_reference": "8Base-RHOL-5.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/opa-openshift-rhel8@sha256:847c70de5af59c9aec366612a74477de931977cf79d5f9ed117772e931589497_ppc64le as a component of RHOL 5.5 for RHEL 8",
"product_id": "8Base-RHOL-5.5:openshift-logging/opa-openshift-rhel8@sha256:847c70de5af59c9aec366612a74477de931977cf79d5f9ed117772e931589497_ppc64le"
},
"product_reference": "openshift-logging/opa-openshift-rhel8@sha256:847c70de5af59c9aec366612a74477de931977cf79d5f9ed117772e931589497_ppc64le",
"relates_to_product_reference": "8Base-RHOL-5.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/opa-openshift-rhel8@sha256:c8458b60077d018eaa78f38fc0b85786d8108b88faea6e420cc01b720f23af48_arm64 as a component of RHOL 5.5 for RHEL 8",
"product_id": "8Base-RHOL-5.5:openshift-logging/opa-openshift-rhel8@sha256:c8458b60077d018eaa78f38fc0b85786d8108b88faea6e420cc01b720f23af48_arm64"
},
"product_reference": "openshift-logging/opa-openshift-rhel8@sha256:c8458b60077d018eaa78f38fc0b85786d8108b88faea6e420cc01b720f23af48_arm64",
"relates_to_product_reference": "8Base-RHOL-5.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/opa-openshift-rhel8@sha256:fc99739f4354e8b28613f50b441d3f7a93bea3e3b106d7c052b607c24b994b9e_s390x as a component of RHOL 5.5 for RHEL 8",
"product_id": "8Base-RHOL-5.5:openshift-logging/opa-openshift-rhel8@sha256:fc99739f4354e8b28613f50b441d3f7a93bea3e3b106d7c052b607c24b994b9e_s390x"
},
"product_reference": "openshift-logging/opa-openshift-rhel8@sha256:fc99739f4354e8b28613f50b441d3f7a93bea3e3b106d7c052b607c24b994b9e_s390x",
"relates_to_product_reference": "8Base-RHOL-5.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/vector-rhel8@sha256:6c237605a0062e69e10a1fad47375f9c51dbccb110e1d11a02f2b7101d611e8f_amd64 as a component of RHOL 5.5 for RHEL 8",
"product_id": "8Base-RHOL-5.5:openshift-logging/vector-rhel8@sha256:6c237605a0062e69e10a1fad47375f9c51dbccb110e1d11a02f2b7101d611e8f_amd64"
},
"product_reference": "openshift-logging/vector-rhel8@sha256:6c237605a0062e69e10a1fad47375f9c51dbccb110e1d11a02f2b7101d611e8f_amd64",
"relates_to_product_reference": "8Base-RHOL-5.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/vector-rhel8@sha256:6c8b9e91e4d527bc0694879c7ce908e3d67877fd53191b71af95191cc0149afa_arm64 as a component of RHOL 5.5 for RHEL 8",
"product_id": "8Base-RHOL-5.5:openshift-logging/vector-rhel8@sha256:6c8b9e91e4d527bc0694879c7ce908e3d67877fd53191b71af95191cc0149afa_arm64"
},
"product_reference": "openshift-logging/vector-rhel8@sha256:6c8b9e91e4d527bc0694879c7ce908e3d67877fd53191b71af95191cc0149afa_arm64",
"relates_to_product_reference": "8Base-RHOL-5.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/vector-rhel8@sha256:b22fe4e184b908986301fda4d2b57f4b9b91149168386a8d9c7ac9b0c4631c7c_ppc64le as a component of RHOL 5.5 for RHEL 8",
"product_id": "8Base-RHOL-5.5:openshift-logging/vector-rhel8@sha256:b22fe4e184b908986301fda4d2b57f4b9b91149168386a8d9c7ac9b0c4631c7c_ppc64le"
},
"product_reference": "openshift-logging/vector-rhel8@sha256:b22fe4e184b908986301fda4d2b57f4b9b91149168386a8d9c7ac9b0c4631c7c_ppc64le",
"relates_to_product_reference": "8Base-RHOL-5.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/vector-rhel8@sha256:c117a0024d06340a9a28686c144642d6591192738f263f4684a7d09af0b16c71_s390x as a component of RHOL 5.5 for RHEL 8",
"product_id": "8Base-RHOL-5.5:openshift-logging/vector-rhel8@sha256:c117a0024d06340a9a28686c144642d6591192738f263f4684a7d09af0b16c71_s390x"
},
"product_reference": "openshift-logging/vector-rhel8@sha256:c117a0024d06340a9a28686c144642d6591192738f263f4684a7d09af0b16c71_s390x",
"relates_to_product_reference": "8Base-RHOL-5.5"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2022-32149",
"cwe": {
"id": "CWE-407",
"name": "Inefficient Algorithmic Complexity"
},
"discovery_date": "2022-10-12T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-RHOL-5.5:openshift-logging/cluster-logging-operator-bundle@sha256:a78fd59207ef6cc8ddaaa3f3ae7140b7678e96e0677517623d1537afc05e84dd_amd64",
"8Base-RHOL-5.5:openshift-logging/cluster-logging-rhel8-operator@sha256:07ab076aa9b573d330ace59bf4de080ea64dbc7b3424357fc39c0c70ede27873_arm64",
"8Base-RHOL-5.5:openshift-logging/cluster-logging-rhel8-operator@sha256:11c10388503a708a962e3dfc5cdd9b6ad5c5d4d4a68b11f97f8fae2cc3884083_s390x",
"8Base-RHOL-5.5:openshift-logging/cluster-logging-rhel8-operator@sha256:414649f77a20e04b3eb16d64acf81a4d261394016d4a890da309cbb8216c1d4a_amd64",
"8Base-RHOL-5.5:openshift-logging/cluster-logging-rhel8-operator@sha256:b4eeab42904e5a81e7adb8801bd901a53a5b81b2464b33816c203daf7587f89f_ppc64le",
"8Base-RHOL-5.5:openshift-logging/elasticsearch-operator-bundle@sha256:d09cafc7f6bbb446608051cebb1c943575e80f9987bb4cad8af53e0354a0e7cd_amd64",
"8Base-RHOL-5.5:openshift-logging/elasticsearch-rhel8-operator@sha256:5236634419119024d3f8779dbd78639a54c2323389f56fbf25dacdc499a072d3_s390x",
"8Base-RHOL-5.5:openshift-logging/elasticsearch-rhel8-operator@sha256:64954ce7d233d6c109e46645cd8d55d8a06068328ce3a22f646ede7c9fde78c8_ppc64le",
"8Base-RHOL-5.5:openshift-logging/elasticsearch-rhel8-operator@sha256:c25b7b7c0f073fdfcf9fd90572790064cdff26d61a4e4db751d4197ff2c5b4c1_amd64",
"8Base-RHOL-5.5:openshift-logging/elasticsearch-rhel8-operator@sha256:dce08ac53092fc51958b78df9b4b870926a079fe4cdc4fb2d46c8ba545a22e6a_arm64",
"8Base-RHOL-5.5:openshift-logging/elasticsearch6-rhel8@sha256:1019e03ddff4726caae53e800403cbaa82ce057c7553552ad027a37d3be5824f_ppc64le",
"8Base-RHOL-5.5:openshift-logging/elasticsearch6-rhel8@sha256:6dfb5e18aa3dc6ce8e2535e13de1d53eea68b218854971e0eb594f677f6da7c7_arm64",
"8Base-RHOL-5.5:openshift-logging/elasticsearch6-rhel8@sha256:7c143b790fef75a04e8ed1be49576861651f66371355a3f5aa304a325faf6e5c_s390x",
"8Base-RHOL-5.5:openshift-logging/elasticsearch6-rhel8@sha256:bf574cff65baba457e3199aae7d1b0e605403a7968e9af746a6cfc5d9a4b29c5_amd64",
"8Base-RHOL-5.5:openshift-logging/eventrouter-rhel8@sha256:0590711175be3b10f646256407cb7d72df63333589d527199260f738a91f2e3d_arm64",
"8Base-RHOL-5.5:openshift-logging/eventrouter-rhel8@sha256:646995416047cf48070c60b9ab064d454ff9ed772a92558f9627e3832f0ccd3c_amd64",
"8Base-RHOL-5.5:openshift-logging/eventrouter-rhel8@sha256:ac91af413a363890bb01772488e371e4dc698ecfb77f047bb83bf638d497aa7c_ppc64le",
"8Base-RHOL-5.5:openshift-logging/eventrouter-rhel8@sha256:eaf322aeccc73ec9d8d5f5a9d6ee368ee3f68409031e18a60cc699e3ca5c144b_s390x",
"8Base-RHOL-5.5:openshift-logging/fluentd-rhel8@sha256:3d4b83f86b2d2f1c73ab184a3471d0d4da04bb6e76487c9f546da87998e480dc_arm64",
"8Base-RHOL-5.5:openshift-logging/fluentd-rhel8@sha256:490740ea41377e7d18ffba700a5022915edc13f6b38f86a6d9d475dfc61df935_s390x",
"8Base-RHOL-5.5:openshift-logging/fluentd-rhel8@sha256:790fe2b90b51f8aff5d10b1525bcf7d35e5517674245993dac6696ebf2a24baf_ppc64le",
"8Base-RHOL-5.5:openshift-logging/fluentd-rhel8@sha256:dc8fe0ca5a488c6738e6904871a620f9444f30475863a09846f8205569c25e54_amd64",
"8Base-RHOL-5.5:openshift-logging/kibana6-rhel8@sha256:43e4da1a741543ac8cdf646901aff3185e5f30d6fad7e68a2233e2bd8d4ebe4b_s390x",
"8Base-RHOL-5.5:openshift-logging/kibana6-rhel8@sha256:44f3446b172b3ea7f0fd4de9f8039eba256a6bea56715748af00f361e49b1519_amd64",
"8Base-RHOL-5.5:openshift-logging/kibana6-rhel8@sha256:93c33d6810eb6e71e7e543c1c26a29e163214df64121c814b4424322308b0a30_ppc64le",
"8Base-RHOL-5.5:openshift-logging/kibana6-rhel8@sha256:ca4f273fb088980bfcc3607bd7ea2d40cc93298262cb3f5ce4054a6235152d1e_arm64",
"8Base-RHOL-5.5:openshift-logging/log-file-metric-exporter-rhel8@sha256:44e17bbdb8c7ac0a7868b3be7e29d58401702384dab3a66efaa08d1176035672_s390x",
"8Base-RHOL-5.5:openshift-logging/log-file-metric-exporter-rhel8@sha256:8b76243469011045e72b7a339288986e7561a3005aa94d580d5b1082580e9cec_ppc64le",
"8Base-RHOL-5.5:openshift-logging/log-file-metric-exporter-rhel8@sha256:e91d4b026d38091cb707e0213f329d0781a3517f3eca4d209d09d6c1edb1a1d3_amd64",
"8Base-RHOL-5.5:openshift-logging/log-file-metric-exporter-rhel8@sha256:f0ca78341daa3d41ffe460f5aa504219c72ee673dd57a82f344d3239b69717be_arm64",
"8Base-RHOL-5.5:openshift-logging/logging-curator5-rhel8@sha256:6f17fc02901a898b77c674cd4ba1764423e849c5faa888b2907ff7356accc66c_s390x",
"8Base-RHOL-5.5:openshift-logging/logging-curator5-rhel8@sha256:c8ea484f5e15b7b53941f251db9b5be08c8cb6f3a14d99285277d9eadf969e98_arm64",
"8Base-RHOL-5.5:openshift-logging/logging-curator5-rhel8@sha256:e26efb87488b53ebd4e5233515906974675b3a759f4a1c00f447df8821d5f030_ppc64le",
"8Base-RHOL-5.5:openshift-logging/logging-curator5-rhel8@sha256:e6ae5eef57de608fb1d4393fe824d0befffd8f5b696b5ce44e571fdcddb46f1f_amd64",
"8Base-RHOL-5.5:openshift-logging/logging-loki-rhel8@sha256:6242c3792c8c0469012be8b0140c2476e41f80b5271ba78ff42c63aa041be30f_s390x",
"8Base-RHOL-5.5:openshift-logging/logging-loki-rhel8@sha256:947becc46b99656f9faa6067f2cf38dbef0d40e85b56d62aafcb243052920dfc_amd64",
"8Base-RHOL-5.5:openshift-logging/logging-loki-rhel8@sha256:969ce1d586fb7fbdd65d07c0b790f48fd6f81e659d1323514906bb03ae9fe79b_ppc64le",
"8Base-RHOL-5.5:openshift-logging/logging-loki-rhel8@sha256:dd5e5a043befc54eeb63ff51a01691778053c90de5c9b8946d6a1d808fbcf0df_arm64",
"8Base-RHOL-5.5:openshift-logging/logging-view-plugin-rhel8@sha256:147676e1a3c66757508be0046c28ccb7985f15af7f8f4a045fa5ca424c0c684d_arm64",
"8Base-RHOL-5.5:openshift-logging/logging-view-plugin-rhel8@sha256:bea8f3f31073874a77af55c8664cbf167cd8bad5296e1bf444b9490b06484b56_amd64",
"8Base-RHOL-5.5:openshift-logging/logging-view-plugin-rhel8@sha256:da8c90c5b3b68e9b98a76828a450a9d7c579256b04aa9daf87ddfab9bad5548c_ppc64le",
"8Base-RHOL-5.5:openshift-logging/logging-view-plugin-rhel8@sha256:e3e5b570f9c819cb10ad38e928a301e8f0554e45052037b03f1ba81a3faa6a15_s390x",
"8Base-RHOL-5.5:openshift-logging/loki-operator-bundle@sha256:1d75006c9d03648857963a8772644d4228361d97fb07c8652326b61fd5d30f8c_amd64",
"8Base-RHOL-5.5:openshift-logging/loki-rhel8-operator@sha256:43fae2b6532712da7d0f83b5dda5797c9764fcac4b0e18580a19e54ee7dfcff6_s390x",
"8Base-RHOL-5.5:openshift-logging/loki-rhel8-operator@sha256:4eba6362f8aaa0450d07b87824148d2c15232b871d0ba6bc34f1962d2970e753_ppc64le",
"8Base-RHOL-5.5:openshift-logging/loki-rhel8-operator@sha256:dfa4ca06abb576fa071fb30c425bc6be631c0453939de562e1dc0b4e76de4f81_arm64",
"8Base-RHOL-5.5:openshift-logging/loki-rhel8-operator@sha256:e5289e40532a01c605760b2f438acfb66257b730a89249269e46dc9c0058aec1_amd64",
"8Base-RHOL-5.5:openshift-logging/lokistack-gateway-rhel8@sha256:0a3eb7a1a50b75528be737eb2768e671a643eea324c967a0381296b61f8e399e_arm64",
"8Base-RHOL-5.5:openshift-logging/lokistack-gateway-rhel8@sha256:42ebf89821e0f8e4b7d03cc5a6d5a30d48f73a1ab2b7486c8a0bb1e5c2cfd4b4_ppc64le",
"8Base-RHOL-5.5:openshift-logging/lokistack-gateway-rhel8@sha256:449f4cf0b3d0c0d6724cc2346c2121df58ef43297c56cc540e05158ad5c8ffbc_amd64",
"8Base-RHOL-5.5:openshift-logging/lokistack-gateway-rhel8@sha256:5954a498e527ee59a3f655250a4f5535a26b49c6fd61889271affb08104839f8_s390x",
"8Base-RHOL-5.5:openshift-logging/opa-openshift-rhel8@sha256:4c1b37da97e80aa76f2612f34745180a026214a415ed9a186ab81ec8fa96e17d_amd64",
"8Base-RHOL-5.5:openshift-logging/opa-openshift-rhel8@sha256:847c70de5af59c9aec366612a74477de931977cf79d5f9ed117772e931589497_ppc64le",
"8Base-RHOL-5.5:openshift-logging/opa-openshift-rhel8@sha256:c8458b60077d018eaa78f38fc0b85786d8108b88faea6e420cc01b720f23af48_arm64",
"8Base-RHOL-5.5:openshift-logging/opa-openshift-rhel8@sha256:fc99739f4354e8b28613f50b441d3f7a93bea3e3b106d7c052b607c24b994b9e_s390x",
"8Base-RHOL-5.5:openshift-logging/vector-rhel8@sha256:6c237605a0062e69e10a1fad47375f9c51dbccb110e1d11a02f2b7101d611e8f_amd64",
"8Base-RHOL-5.5:openshift-logging/vector-rhel8@sha256:6c8b9e91e4d527bc0694879c7ce908e3d67877fd53191b71af95191cc0149afa_arm64",
"8Base-RHOL-5.5:openshift-logging/vector-rhel8@sha256:b22fe4e184b908986301fda4d2b57f4b9b91149168386a8d9c7ac9b0c4631c7c_ppc64le",
"8Base-RHOL-5.5:openshift-logging/vector-rhel8@sha256:c117a0024d06340a9a28686c144642d6591192738f263f4684a7d09af0b16c71_s390x"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2134010"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in the golang.org/x/text/language package. An attacker can craft an Accept-Language header which ParseAcceptLanguage will take significant time to parse. This issue leads to a denial of service, and can impact availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: golang.org/x/text/language: ParseAcceptLanguage takes a long time to parse complex tags",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "After careful analysis of the vulnerability Redhat is choosing to keep the vulnerability severity as moderate,the vulnerability exists in the ParseAcceptLanguage function of the golang text/language package,when an attacker could craft an unusually large accept header and due to the parser taking quadratic time complexity to finish, firstly the attacker would have to find a way smuggle an input to the parser and even then this would simply not result in a crash of any kind but more of resource hang which while can be unpleasant,does not equate to any real world damage.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-RHOL-5.5:openshift-logging/elasticsearch-proxy-rhel8@sha256:89f980b63cbcf7956449d8cee41c884ea4ae7d76f02454f7e32058576fd92fa5_ppc64le",
"8Base-RHOL-5.5:openshift-logging/elasticsearch-proxy-rhel8@sha256:a6c03fd0fe66206bff59ba019cc60085de4c65d4efae8a637f1ac48b91688371_arm64",
"8Base-RHOL-5.5:openshift-logging/elasticsearch-proxy-rhel8@sha256:dcdd0c515b3b5a1a6e807929fb8e8d65c1ee2aba3bf696d2b9f852e8994e47b8_s390x",
"8Base-RHOL-5.5:openshift-logging/elasticsearch-proxy-rhel8@sha256:e1755002225548182e17bd82b1c129b2ac61e623c3c37c4d51a535012088cacc_amd64"
],
"known_not_affected": [
"8Base-RHOL-5.5:openshift-logging/cluster-logging-operator-bundle@sha256:a78fd59207ef6cc8ddaaa3f3ae7140b7678e96e0677517623d1537afc05e84dd_amd64",
"8Base-RHOL-5.5:openshift-logging/cluster-logging-rhel8-operator@sha256:07ab076aa9b573d330ace59bf4de080ea64dbc7b3424357fc39c0c70ede27873_arm64",
"8Base-RHOL-5.5:openshift-logging/cluster-logging-rhel8-operator@sha256:11c10388503a708a962e3dfc5cdd9b6ad5c5d4d4a68b11f97f8fae2cc3884083_s390x",
"8Base-RHOL-5.5:openshift-logging/cluster-logging-rhel8-operator@sha256:414649f77a20e04b3eb16d64acf81a4d261394016d4a890da309cbb8216c1d4a_amd64",
"8Base-RHOL-5.5:openshift-logging/cluster-logging-rhel8-operator@sha256:b4eeab42904e5a81e7adb8801bd901a53a5b81b2464b33816c203daf7587f89f_ppc64le",
"8Base-RHOL-5.5:openshift-logging/elasticsearch-operator-bundle@sha256:d09cafc7f6bbb446608051cebb1c943575e80f9987bb4cad8af53e0354a0e7cd_amd64",
"8Base-RHOL-5.5:openshift-logging/elasticsearch-rhel8-operator@sha256:5236634419119024d3f8779dbd78639a54c2323389f56fbf25dacdc499a072d3_s390x",
"8Base-RHOL-5.5:openshift-logging/elasticsearch-rhel8-operator@sha256:64954ce7d233d6c109e46645cd8d55d8a06068328ce3a22f646ede7c9fde78c8_ppc64le",
"8Base-RHOL-5.5:openshift-logging/elasticsearch-rhel8-operator@sha256:c25b7b7c0f073fdfcf9fd90572790064cdff26d61a4e4db751d4197ff2c5b4c1_amd64",
"8Base-RHOL-5.5:openshift-logging/elasticsearch-rhel8-operator@sha256:dce08ac53092fc51958b78df9b4b870926a079fe4cdc4fb2d46c8ba545a22e6a_arm64",
"8Base-RHOL-5.5:openshift-logging/elasticsearch6-rhel8@sha256:1019e03ddff4726caae53e800403cbaa82ce057c7553552ad027a37d3be5824f_ppc64le",
"8Base-RHOL-5.5:openshift-logging/elasticsearch6-rhel8@sha256:6dfb5e18aa3dc6ce8e2535e13de1d53eea68b218854971e0eb594f677f6da7c7_arm64",
"8Base-RHOL-5.5:openshift-logging/elasticsearch6-rhel8@sha256:7c143b790fef75a04e8ed1be49576861651f66371355a3f5aa304a325faf6e5c_s390x",
"8Base-RHOL-5.5:openshift-logging/elasticsearch6-rhel8@sha256:bf574cff65baba457e3199aae7d1b0e605403a7968e9af746a6cfc5d9a4b29c5_amd64",
"8Base-RHOL-5.5:openshift-logging/eventrouter-rhel8@sha256:0590711175be3b10f646256407cb7d72df63333589d527199260f738a91f2e3d_arm64",
"8Base-RHOL-5.5:openshift-logging/eventrouter-rhel8@sha256:646995416047cf48070c60b9ab064d454ff9ed772a92558f9627e3832f0ccd3c_amd64",
"8Base-RHOL-5.5:openshift-logging/eventrouter-rhel8@sha256:ac91af413a363890bb01772488e371e4dc698ecfb77f047bb83bf638d497aa7c_ppc64le",
"8Base-RHOL-5.5:openshift-logging/eventrouter-rhel8@sha256:eaf322aeccc73ec9d8d5f5a9d6ee368ee3f68409031e18a60cc699e3ca5c144b_s390x",
"8Base-RHOL-5.5:openshift-logging/fluentd-rhel8@sha256:3d4b83f86b2d2f1c73ab184a3471d0d4da04bb6e76487c9f546da87998e480dc_arm64",
"8Base-RHOL-5.5:openshift-logging/fluentd-rhel8@sha256:490740ea41377e7d18ffba700a5022915edc13f6b38f86a6d9d475dfc61df935_s390x",
"8Base-RHOL-5.5:openshift-logging/fluentd-rhel8@sha256:790fe2b90b51f8aff5d10b1525bcf7d35e5517674245993dac6696ebf2a24baf_ppc64le",
"8Base-RHOL-5.5:openshift-logging/fluentd-rhel8@sha256:dc8fe0ca5a488c6738e6904871a620f9444f30475863a09846f8205569c25e54_amd64",
"8Base-RHOL-5.5:openshift-logging/kibana6-rhel8@sha256:43e4da1a741543ac8cdf646901aff3185e5f30d6fad7e68a2233e2bd8d4ebe4b_s390x",
"8Base-RHOL-5.5:openshift-logging/kibana6-rhel8@sha256:44f3446b172b3ea7f0fd4de9f8039eba256a6bea56715748af00f361e49b1519_amd64",
"8Base-RHOL-5.5:openshift-logging/kibana6-rhel8@sha256:93c33d6810eb6e71e7e543c1c26a29e163214df64121c814b4424322308b0a30_ppc64le",
"8Base-RHOL-5.5:openshift-logging/kibana6-rhel8@sha256:ca4f273fb088980bfcc3607bd7ea2d40cc93298262cb3f5ce4054a6235152d1e_arm64",
"8Base-RHOL-5.5:openshift-logging/log-file-metric-exporter-rhel8@sha256:44e17bbdb8c7ac0a7868b3be7e29d58401702384dab3a66efaa08d1176035672_s390x",
"8Base-RHOL-5.5:openshift-logging/log-file-metric-exporter-rhel8@sha256:8b76243469011045e72b7a339288986e7561a3005aa94d580d5b1082580e9cec_ppc64le",
"8Base-RHOL-5.5:openshift-logging/log-file-metric-exporter-rhel8@sha256:e91d4b026d38091cb707e0213f329d0781a3517f3eca4d209d09d6c1edb1a1d3_amd64",
"8Base-RHOL-5.5:openshift-logging/log-file-metric-exporter-rhel8@sha256:f0ca78341daa3d41ffe460f5aa504219c72ee673dd57a82f344d3239b69717be_arm64",
"8Base-RHOL-5.5:openshift-logging/logging-curator5-rhel8@sha256:6f17fc02901a898b77c674cd4ba1764423e849c5faa888b2907ff7356accc66c_s390x",
"8Base-RHOL-5.5:openshift-logging/logging-curator5-rhel8@sha256:c8ea484f5e15b7b53941f251db9b5be08c8cb6f3a14d99285277d9eadf969e98_arm64",
"8Base-RHOL-5.5:openshift-logging/logging-curator5-rhel8@sha256:e26efb87488b53ebd4e5233515906974675b3a759f4a1c00f447df8821d5f030_ppc64le",
"8Base-RHOL-5.5:openshift-logging/logging-curator5-rhel8@sha256:e6ae5eef57de608fb1d4393fe824d0befffd8f5b696b5ce44e571fdcddb46f1f_amd64",
"8Base-RHOL-5.5:openshift-logging/logging-loki-rhel8@sha256:6242c3792c8c0469012be8b0140c2476e41f80b5271ba78ff42c63aa041be30f_s390x",
"8Base-RHOL-5.5:openshift-logging/logging-loki-rhel8@sha256:947becc46b99656f9faa6067f2cf38dbef0d40e85b56d62aafcb243052920dfc_amd64",
"8Base-RHOL-5.5:openshift-logging/logging-loki-rhel8@sha256:969ce1d586fb7fbdd65d07c0b790f48fd6f81e659d1323514906bb03ae9fe79b_ppc64le",
"8Base-RHOL-5.5:openshift-logging/logging-loki-rhel8@sha256:dd5e5a043befc54eeb63ff51a01691778053c90de5c9b8946d6a1d808fbcf0df_arm64",
"8Base-RHOL-5.5:openshift-logging/logging-view-plugin-rhel8@sha256:147676e1a3c66757508be0046c28ccb7985f15af7f8f4a045fa5ca424c0c684d_arm64",
"8Base-RHOL-5.5:openshift-logging/logging-view-plugin-rhel8@sha256:bea8f3f31073874a77af55c8664cbf167cd8bad5296e1bf444b9490b06484b56_amd64",
"8Base-RHOL-5.5:openshift-logging/logging-view-plugin-rhel8@sha256:da8c90c5b3b68e9b98a76828a450a9d7c579256b04aa9daf87ddfab9bad5548c_ppc64le",
"8Base-RHOL-5.5:openshift-logging/logging-view-plugin-rhel8@sha256:e3e5b570f9c819cb10ad38e928a301e8f0554e45052037b03f1ba81a3faa6a15_s390x",
"8Base-RHOL-5.5:openshift-logging/loki-operator-bundle@sha256:1d75006c9d03648857963a8772644d4228361d97fb07c8652326b61fd5d30f8c_amd64",
"8Base-RHOL-5.5:openshift-logging/loki-rhel8-operator@sha256:43fae2b6532712da7d0f83b5dda5797c9764fcac4b0e18580a19e54ee7dfcff6_s390x",
"8Base-RHOL-5.5:openshift-logging/loki-rhel8-operator@sha256:4eba6362f8aaa0450d07b87824148d2c15232b871d0ba6bc34f1962d2970e753_ppc64le",
"8Base-RHOL-5.5:openshift-logging/loki-rhel8-operator@sha256:dfa4ca06abb576fa071fb30c425bc6be631c0453939de562e1dc0b4e76de4f81_arm64",
"8Base-RHOL-5.5:openshift-logging/loki-rhel8-operator@sha256:e5289e40532a01c605760b2f438acfb66257b730a89249269e46dc9c0058aec1_amd64",
"8Base-RHOL-5.5:openshift-logging/lokistack-gateway-rhel8@sha256:0a3eb7a1a50b75528be737eb2768e671a643eea324c967a0381296b61f8e399e_arm64",
"8Base-RHOL-5.5:openshift-logging/lokistack-gateway-rhel8@sha256:42ebf89821e0f8e4b7d03cc5a6d5a30d48f73a1ab2b7486c8a0bb1e5c2cfd4b4_ppc64le",
"8Base-RHOL-5.5:openshift-logging/lokistack-gateway-rhel8@sha256:449f4cf0b3d0c0d6724cc2346c2121df58ef43297c56cc540e05158ad5c8ffbc_amd64",
"8Base-RHOL-5.5:openshift-logging/lokistack-gateway-rhel8@sha256:5954a498e527ee59a3f655250a4f5535a26b49c6fd61889271affb08104839f8_s390x",
"8Base-RHOL-5.5:openshift-logging/opa-openshift-rhel8@sha256:4c1b37da97e80aa76f2612f34745180a026214a415ed9a186ab81ec8fa96e17d_amd64",
"8Base-RHOL-5.5:openshift-logging/opa-openshift-rhel8@sha256:847c70de5af59c9aec366612a74477de931977cf79d5f9ed117772e931589497_ppc64le",
"8Base-RHOL-5.5:openshift-logging/opa-openshift-rhel8@sha256:c8458b60077d018eaa78f38fc0b85786d8108b88faea6e420cc01b720f23af48_arm64",
"8Base-RHOL-5.5:openshift-logging/opa-openshift-rhel8@sha256:fc99739f4354e8b28613f50b441d3f7a93bea3e3b106d7c052b607c24b994b9e_s390x",
"8Base-RHOL-5.5:openshift-logging/vector-rhel8@sha256:6c237605a0062e69e10a1fad47375f9c51dbccb110e1d11a02f2b7101d611e8f_amd64",
"8Base-RHOL-5.5:openshift-logging/vector-rhel8@sha256:6c8b9e91e4d527bc0694879c7ce908e3d67877fd53191b71af95191cc0149afa_arm64",
"8Base-RHOL-5.5:openshift-logging/vector-rhel8@sha256:b22fe4e184b908986301fda4d2b57f4b9b91149168386a8d9c7ac9b0c4631c7c_ppc64le",
"8Base-RHOL-5.5:openshift-logging/vector-rhel8@sha256:c117a0024d06340a9a28686c144642d6591192738f263f4684a7d09af0b16c71_s390x"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-32149"
},
{
"category": "external",
"summary": "RHBZ#2134010",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2134010"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-32149",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32149"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-32149",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-32149"
},
{
"category": "external",
"summary": "https://go.dev/issue/56152",
"url": "https://go.dev/issue/56152"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-dev/c/qfPIly0X7aU",
"url": "https://groups.google.com/g/golang-dev/c/qfPIly0X7aU"
}
],
"release_date": "2022-10-11T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-11-10T03:50:23+00:00",
"details": "For OpenShift Container Platform 4.11 see the following documentation, which will be updated shortly for this release, for important instructions on how to upgrade your cluster and fully apply this errata update:\n\nhttps://docs.openshift.com/container-platform/4.11/release_notes/ocp-4-11-release-notes.html\n\nFor Red Hat OpenShift Logging 5.5, see the following instructions to apply this update:\n\nhttps://docs.openshift.com/container-platform/4.11/logging/cluster-logging-upgrading.html",
"product_ids": [
"8Base-RHOL-5.5:openshift-logging/elasticsearch-proxy-rhel8@sha256:89f980b63cbcf7956449d8cee41c884ea4ae7d76f02454f7e32058576fd92fa5_ppc64le",
"8Base-RHOL-5.5:openshift-logging/elasticsearch-proxy-rhel8@sha256:a6c03fd0fe66206bff59ba019cc60085de4c65d4efae8a637f1ac48b91688371_arm64",
"8Base-RHOL-5.5:openshift-logging/elasticsearch-proxy-rhel8@sha256:dcdd0c515b3b5a1a6e807929fb8e8d65c1ee2aba3bf696d2b9f852e8994e47b8_s390x",
"8Base-RHOL-5.5:openshift-logging/elasticsearch-proxy-rhel8@sha256:e1755002225548182e17bd82b1c129b2ac61e623c3c37c4d51a535012088cacc_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:7434"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"8Base-RHOL-5.5:openshift-logging/cluster-logging-operator-bundle@sha256:a78fd59207ef6cc8ddaaa3f3ae7140b7678e96e0677517623d1537afc05e84dd_amd64",
"8Base-RHOL-5.5:openshift-logging/cluster-logging-rhel8-operator@sha256:07ab076aa9b573d330ace59bf4de080ea64dbc7b3424357fc39c0c70ede27873_arm64",
"8Base-RHOL-5.5:openshift-logging/cluster-logging-rhel8-operator@sha256:11c10388503a708a962e3dfc5cdd9b6ad5c5d4d4a68b11f97f8fae2cc3884083_s390x",
"8Base-RHOL-5.5:openshift-logging/cluster-logging-rhel8-operator@sha256:414649f77a20e04b3eb16d64acf81a4d261394016d4a890da309cbb8216c1d4a_amd64",
"8Base-RHOL-5.5:openshift-logging/cluster-logging-rhel8-operator@sha256:b4eeab42904e5a81e7adb8801bd901a53a5b81b2464b33816c203daf7587f89f_ppc64le",
"8Base-RHOL-5.5:openshift-logging/elasticsearch-operator-bundle@sha256:d09cafc7f6bbb446608051cebb1c943575e80f9987bb4cad8af53e0354a0e7cd_amd64",
"8Base-RHOL-5.5:openshift-logging/elasticsearch-proxy-rhel8@sha256:89f980b63cbcf7956449d8cee41c884ea4ae7d76f02454f7e32058576fd92fa5_ppc64le",
"8Base-RHOL-5.5:openshift-logging/elasticsearch-proxy-rhel8@sha256:a6c03fd0fe66206bff59ba019cc60085de4c65d4efae8a637f1ac48b91688371_arm64",
"8Base-RHOL-5.5:openshift-logging/elasticsearch-proxy-rhel8@sha256:dcdd0c515b3b5a1a6e807929fb8e8d65c1ee2aba3bf696d2b9f852e8994e47b8_s390x",
"8Base-RHOL-5.5:openshift-logging/elasticsearch-proxy-rhel8@sha256:e1755002225548182e17bd82b1c129b2ac61e623c3c37c4d51a535012088cacc_amd64",
"8Base-RHOL-5.5:openshift-logging/elasticsearch-rhel8-operator@sha256:5236634419119024d3f8779dbd78639a54c2323389f56fbf25dacdc499a072d3_s390x",
"8Base-RHOL-5.5:openshift-logging/elasticsearch-rhel8-operator@sha256:64954ce7d233d6c109e46645cd8d55d8a06068328ce3a22f646ede7c9fde78c8_ppc64le",
"8Base-RHOL-5.5:openshift-logging/elasticsearch-rhel8-operator@sha256:c25b7b7c0f073fdfcf9fd90572790064cdff26d61a4e4db751d4197ff2c5b4c1_amd64",
"8Base-RHOL-5.5:openshift-logging/elasticsearch-rhel8-operator@sha256:dce08ac53092fc51958b78df9b4b870926a079fe4cdc4fb2d46c8ba545a22e6a_arm64",
"8Base-RHOL-5.5:openshift-logging/elasticsearch6-rhel8@sha256:1019e03ddff4726caae53e800403cbaa82ce057c7553552ad027a37d3be5824f_ppc64le",
"8Base-RHOL-5.5:openshift-logging/elasticsearch6-rhel8@sha256:6dfb5e18aa3dc6ce8e2535e13de1d53eea68b218854971e0eb594f677f6da7c7_arm64",
"8Base-RHOL-5.5:openshift-logging/elasticsearch6-rhel8@sha256:7c143b790fef75a04e8ed1be49576861651f66371355a3f5aa304a325faf6e5c_s390x",
"8Base-RHOL-5.5:openshift-logging/elasticsearch6-rhel8@sha256:bf574cff65baba457e3199aae7d1b0e605403a7968e9af746a6cfc5d9a4b29c5_amd64",
"8Base-RHOL-5.5:openshift-logging/eventrouter-rhel8@sha256:0590711175be3b10f646256407cb7d72df63333589d527199260f738a91f2e3d_arm64",
"8Base-RHOL-5.5:openshift-logging/eventrouter-rhel8@sha256:646995416047cf48070c60b9ab064d454ff9ed772a92558f9627e3832f0ccd3c_amd64",
"8Base-RHOL-5.5:openshift-logging/eventrouter-rhel8@sha256:ac91af413a363890bb01772488e371e4dc698ecfb77f047bb83bf638d497aa7c_ppc64le",
"8Base-RHOL-5.5:openshift-logging/eventrouter-rhel8@sha256:eaf322aeccc73ec9d8d5f5a9d6ee368ee3f68409031e18a60cc699e3ca5c144b_s390x",
"8Base-RHOL-5.5:openshift-logging/fluentd-rhel8@sha256:3d4b83f86b2d2f1c73ab184a3471d0d4da04bb6e76487c9f546da87998e480dc_arm64",
"8Base-RHOL-5.5:openshift-logging/fluentd-rhel8@sha256:490740ea41377e7d18ffba700a5022915edc13f6b38f86a6d9d475dfc61df935_s390x",
"8Base-RHOL-5.5:openshift-logging/fluentd-rhel8@sha256:790fe2b90b51f8aff5d10b1525bcf7d35e5517674245993dac6696ebf2a24baf_ppc64le",
"8Base-RHOL-5.5:openshift-logging/fluentd-rhel8@sha256:dc8fe0ca5a488c6738e6904871a620f9444f30475863a09846f8205569c25e54_amd64",
"8Base-RHOL-5.5:openshift-logging/kibana6-rhel8@sha256:43e4da1a741543ac8cdf646901aff3185e5f30d6fad7e68a2233e2bd8d4ebe4b_s390x",
"8Base-RHOL-5.5:openshift-logging/kibana6-rhel8@sha256:44f3446b172b3ea7f0fd4de9f8039eba256a6bea56715748af00f361e49b1519_amd64",
"8Base-RHOL-5.5:openshift-logging/kibana6-rhel8@sha256:93c33d6810eb6e71e7e543c1c26a29e163214df64121c814b4424322308b0a30_ppc64le",
"8Base-RHOL-5.5:openshift-logging/kibana6-rhel8@sha256:ca4f273fb088980bfcc3607bd7ea2d40cc93298262cb3f5ce4054a6235152d1e_arm64",
"8Base-RHOL-5.5:openshift-logging/log-file-metric-exporter-rhel8@sha256:44e17bbdb8c7ac0a7868b3be7e29d58401702384dab3a66efaa08d1176035672_s390x",
"8Base-RHOL-5.5:openshift-logging/log-file-metric-exporter-rhel8@sha256:8b76243469011045e72b7a339288986e7561a3005aa94d580d5b1082580e9cec_ppc64le",
"8Base-RHOL-5.5:openshift-logging/log-file-metric-exporter-rhel8@sha256:e91d4b026d38091cb707e0213f329d0781a3517f3eca4d209d09d6c1edb1a1d3_amd64",
"8Base-RHOL-5.5:openshift-logging/log-file-metric-exporter-rhel8@sha256:f0ca78341daa3d41ffe460f5aa504219c72ee673dd57a82f344d3239b69717be_arm64",
"8Base-RHOL-5.5:openshift-logging/logging-curator5-rhel8@sha256:6f17fc02901a898b77c674cd4ba1764423e849c5faa888b2907ff7356accc66c_s390x",
"8Base-RHOL-5.5:openshift-logging/logging-curator5-rhel8@sha256:c8ea484f5e15b7b53941f251db9b5be08c8cb6f3a14d99285277d9eadf969e98_arm64",
"8Base-RHOL-5.5:openshift-logging/logging-curator5-rhel8@sha256:e26efb87488b53ebd4e5233515906974675b3a759f4a1c00f447df8821d5f030_ppc64le",
"8Base-RHOL-5.5:openshift-logging/logging-curator5-rhel8@sha256:e6ae5eef57de608fb1d4393fe824d0befffd8f5b696b5ce44e571fdcddb46f1f_amd64",
"8Base-RHOL-5.5:openshift-logging/logging-loki-rhel8@sha256:6242c3792c8c0469012be8b0140c2476e41f80b5271ba78ff42c63aa041be30f_s390x",
"8Base-RHOL-5.5:openshift-logging/logging-loki-rhel8@sha256:947becc46b99656f9faa6067f2cf38dbef0d40e85b56d62aafcb243052920dfc_amd64",
"8Base-RHOL-5.5:openshift-logging/logging-loki-rhel8@sha256:969ce1d586fb7fbdd65d07c0b790f48fd6f81e659d1323514906bb03ae9fe79b_ppc64le",
"8Base-RHOL-5.5:openshift-logging/logging-loki-rhel8@sha256:dd5e5a043befc54eeb63ff51a01691778053c90de5c9b8946d6a1d808fbcf0df_arm64",
"8Base-RHOL-5.5:openshift-logging/logging-view-plugin-rhel8@sha256:147676e1a3c66757508be0046c28ccb7985f15af7f8f4a045fa5ca424c0c684d_arm64",
"8Base-RHOL-5.5:openshift-logging/logging-view-plugin-rhel8@sha256:bea8f3f31073874a77af55c8664cbf167cd8bad5296e1bf444b9490b06484b56_amd64",
"8Base-RHOL-5.5:openshift-logging/logging-view-plugin-rhel8@sha256:da8c90c5b3b68e9b98a76828a450a9d7c579256b04aa9daf87ddfab9bad5548c_ppc64le",
"8Base-RHOL-5.5:openshift-logging/logging-view-plugin-rhel8@sha256:e3e5b570f9c819cb10ad38e928a301e8f0554e45052037b03f1ba81a3faa6a15_s390x",
"8Base-RHOL-5.5:openshift-logging/loki-operator-bundle@sha256:1d75006c9d03648857963a8772644d4228361d97fb07c8652326b61fd5d30f8c_amd64",
"8Base-RHOL-5.5:openshift-logging/loki-rhel8-operator@sha256:43fae2b6532712da7d0f83b5dda5797c9764fcac4b0e18580a19e54ee7dfcff6_s390x",
"8Base-RHOL-5.5:openshift-logging/loki-rhel8-operator@sha256:4eba6362f8aaa0450d07b87824148d2c15232b871d0ba6bc34f1962d2970e753_ppc64le",
"8Base-RHOL-5.5:openshift-logging/loki-rhel8-operator@sha256:dfa4ca06abb576fa071fb30c425bc6be631c0453939de562e1dc0b4e76de4f81_arm64",
"8Base-RHOL-5.5:openshift-logging/loki-rhel8-operator@sha256:e5289e40532a01c605760b2f438acfb66257b730a89249269e46dc9c0058aec1_amd64",
"8Base-RHOL-5.5:openshift-logging/lokistack-gateway-rhel8@sha256:0a3eb7a1a50b75528be737eb2768e671a643eea324c967a0381296b61f8e399e_arm64",
"8Base-RHOL-5.5:openshift-logging/lokistack-gateway-rhel8@sha256:42ebf89821e0f8e4b7d03cc5a6d5a30d48f73a1ab2b7486c8a0bb1e5c2cfd4b4_ppc64le",
"8Base-RHOL-5.5:openshift-logging/lokistack-gateway-rhel8@sha256:449f4cf0b3d0c0d6724cc2346c2121df58ef43297c56cc540e05158ad5c8ffbc_amd64",
"8Base-RHOL-5.5:openshift-logging/lokistack-gateway-rhel8@sha256:5954a498e527ee59a3f655250a4f5535a26b49c6fd61889271affb08104839f8_s390x",
"8Base-RHOL-5.5:openshift-logging/opa-openshift-rhel8@sha256:4c1b37da97e80aa76f2612f34745180a026214a415ed9a186ab81ec8fa96e17d_amd64",
"8Base-RHOL-5.5:openshift-logging/opa-openshift-rhel8@sha256:847c70de5af59c9aec366612a74477de931977cf79d5f9ed117772e931589497_ppc64le",
"8Base-RHOL-5.5:openshift-logging/opa-openshift-rhel8@sha256:c8458b60077d018eaa78f38fc0b85786d8108b88faea6e420cc01b720f23af48_arm64",
"8Base-RHOL-5.5:openshift-logging/opa-openshift-rhel8@sha256:fc99739f4354e8b28613f50b441d3f7a93bea3e3b106d7c052b607c24b994b9e_s390x",
"8Base-RHOL-5.5:openshift-logging/vector-rhel8@sha256:6c237605a0062e69e10a1fad47375f9c51dbccb110e1d11a02f2b7101d611e8f_amd64",
"8Base-RHOL-5.5:openshift-logging/vector-rhel8@sha256:6c8b9e91e4d527bc0694879c7ce908e3d67877fd53191b71af95191cc0149afa_arm64",
"8Base-RHOL-5.5:openshift-logging/vector-rhel8@sha256:b22fe4e184b908986301fda4d2b57f4b9b91149168386a8d9c7ac9b0c4631c7c_ppc64le",
"8Base-RHOL-5.5:openshift-logging/vector-rhel8@sha256:c117a0024d06340a9a28686c144642d6591192738f263f4684a7d09af0b16c71_s390x"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "golang: golang.org/x/text/language: ParseAcceptLanguage takes a long time to parse complex tags"
}
]
}
RHSA-2023:0481
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Submariner 0.12.3 packages that fix various bugs and add various enhancements that are now available for Red Hat Advanced Cluster Management for Kubernetes version 2.5.\n\nRed Hat Product Security has rated this update as having a security impact\nof Moderate. A Common Vulnerability Scoring System (CVSS) base score,\nwhich gives a detailed severity rating, is available for each vulnerability\nfrom the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Submariner enables direct networking between pods and services on different Kubernetes clusters that are either on-premises or in the cloud.\n\nFor more information about Submariner, see the Submariner open source community website at: https://submariner.io/.\n\nThis advisory contains bug fixes and enhancements to the Submariner container images.\n\nMajor bug addressed: \n\nACM-2318: Submariner gateway node: Error updating load balancer with new hosts map\n\nSecurity fix:\n\n* CVE-2022-32149 golang: golang.org/x/text/language: ParseAcceptLanguage takes a long time to parse complex tags",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2023:0481",
"url": "https://access.redhat.com/errata/RHSA-2023:0481"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#moderate",
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "2134010",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2134010"
},
{
"category": "external",
"summary": "ACM-2318",
"url": "https://issues.redhat.com/browse/ACM-2318"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2023/rhsa-2023_0481.json"
}
],
"title": "Red Hat Security Advisory: Submariner 0.12.3 - security update and bug fix",
"tracking": {
"current_release_date": "2025-10-10T01:53:30+00:00",
"generator": {
"date": "2025-10-10T01:53:30+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.9"
}
},
"id": "RHSA-2023:0481",
"initial_release_date": "2023-01-26T21:22:22+00:00",
"revision_history": [
{
"date": "2023-01-26T21:22:22+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2023-01-26T21:22:22+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-10-10T01:53:30+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8",
"product": {
"name": "Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8",
"product_id": "8Base-RHACM-2.5",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:acm:2.5::el8"
}
}
}
],
"category": "product_family",
"name": "Red Hat ACM"
},
{
"branches": [
{
"category": "product_version",
"name": "rhacm2/lighthouse-agent-rhel8@sha256:33ac96a6dd01e698c6d037acd701ee0fc5a09bb1cdd8f761c229e6a2be9ea799_amd64",
"product": {
"name": "rhacm2/lighthouse-agent-rhel8@sha256:33ac96a6dd01e698c6d037acd701ee0fc5a09bb1cdd8f761c229e6a2be9ea799_amd64",
"product_id": "rhacm2/lighthouse-agent-rhel8@sha256:33ac96a6dd01e698c6d037acd701ee0fc5a09bb1cdd8f761c229e6a2be9ea799_amd64",
"product_identification_helper": {
"purl": "pkg:oci/lighthouse-agent-rhel8@sha256:33ac96a6dd01e698c6d037acd701ee0fc5a09bb1cdd8f761c229e6a2be9ea799?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/lighthouse-agent-rhel8\u0026tag=v0.12.3-1"
}
}
},
{
"category": "product_version",
"name": "rhacm2/lighthouse-coredns-rhel8@sha256:f27e7895a859ee2ab5f36134522349c1c04f3b18284787e0d14c3380126bf402_amd64",
"product": {
"name": "rhacm2/lighthouse-coredns-rhel8@sha256:f27e7895a859ee2ab5f36134522349c1c04f3b18284787e0d14c3380126bf402_amd64",
"product_id": "rhacm2/lighthouse-coredns-rhel8@sha256:f27e7895a859ee2ab5f36134522349c1c04f3b18284787e0d14c3380126bf402_amd64",
"product_identification_helper": {
"purl": "pkg:oci/lighthouse-coredns-rhel8@sha256:f27e7895a859ee2ab5f36134522349c1c04f3b18284787e0d14c3380126bf402?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/lighthouse-coredns-rhel8\u0026tag=v0.12.3-1"
}
}
},
{
"category": "product_version",
"name": "rhacm2/subctl-rhel8@sha256:e6f5f07b97d4998c122cadeee693dce4d72f3bbe2c1f9703b15621b6531cf3a4_amd64",
"product": {
"name": "rhacm2/subctl-rhel8@sha256:e6f5f07b97d4998c122cadeee693dce4d72f3bbe2c1f9703b15621b6531cf3a4_amd64",
"product_id": "rhacm2/subctl-rhel8@sha256:e6f5f07b97d4998c122cadeee693dce4d72f3bbe2c1f9703b15621b6531cf3a4_amd64",
"product_identification_helper": {
"purl": "pkg:oci/subctl-rhel8@sha256:e6f5f07b97d4998c122cadeee693dce4d72f3bbe2c1f9703b15621b6531cf3a4?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/subctl-rhel8\u0026tag=v0.12.3-1"
}
}
},
{
"category": "product_version",
"name": "rhacm2/submariner-gateway-rhel8@sha256:7b343f4f8ea08b2e2a670ee938a2286a92d701e5e92f4f43ee58e620e2ee070b_amd64",
"product": {
"name": "rhacm2/submariner-gateway-rhel8@sha256:7b343f4f8ea08b2e2a670ee938a2286a92d701e5e92f4f43ee58e620e2ee070b_amd64",
"product_id": "rhacm2/submariner-gateway-rhel8@sha256:7b343f4f8ea08b2e2a670ee938a2286a92d701e5e92f4f43ee58e620e2ee070b_amd64",
"product_identification_helper": {
"purl": "pkg:oci/submariner-gateway-rhel8@sha256:7b343f4f8ea08b2e2a670ee938a2286a92d701e5e92f4f43ee58e620e2ee070b?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/submariner-gateway-rhel8\u0026tag=v0.12.3-1"
}
}
},
{
"category": "product_version",
"name": "rhacm2/submariner-globalnet-rhel8@sha256:3b04b0be64ea639e82496102236899cc62a2521c8e8bebd07c852118e76bce88_amd64",
"product": {
"name": "rhacm2/submariner-globalnet-rhel8@sha256:3b04b0be64ea639e82496102236899cc62a2521c8e8bebd07c852118e76bce88_amd64",
"product_id": "rhacm2/submariner-globalnet-rhel8@sha256:3b04b0be64ea639e82496102236899cc62a2521c8e8bebd07c852118e76bce88_amd64",
"product_identification_helper": {
"purl": "pkg:oci/submariner-globalnet-rhel8@sha256:3b04b0be64ea639e82496102236899cc62a2521c8e8bebd07c852118e76bce88?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/submariner-globalnet-rhel8\u0026tag=v0.12.3-1"
}
}
},
{
"category": "product_version",
"name": "rhacm2/submariner-networkplugin-syncer-rhel8@sha256:91bc8d57c88c771bda7a6703ced10e32e9999116fe8cb7e4adddb6198591eeac_amd64",
"product": {
"name": "rhacm2/submariner-networkplugin-syncer-rhel8@sha256:91bc8d57c88c771bda7a6703ced10e32e9999116fe8cb7e4adddb6198591eeac_amd64",
"product_id": "rhacm2/submariner-networkplugin-syncer-rhel8@sha256:91bc8d57c88c771bda7a6703ced10e32e9999116fe8cb7e4adddb6198591eeac_amd64",
"product_identification_helper": {
"purl": "pkg:oci/submariner-networkplugin-syncer-rhel8@sha256:91bc8d57c88c771bda7a6703ced10e32e9999116fe8cb7e4adddb6198591eeac?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/submariner-networkplugin-syncer-rhel8\u0026tag=v0.12.3-1"
}
}
},
{
"category": "product_version",
"name": "rhacm2/submariner-operator-bundle@sha256:fa2fd74dc3918d962ee6ea162e765f45b75a9588017145cd8322469456bc7164_amd64",
"product": {
"name": "rhacm2/submariner-operator-bundle@sha256:fa2fd74dc3918d962ee6ea162e765f45b75a9588017145cd8322469456bc7164_amd64",
"product_id": "rhacm2/submariner-operator-bundle@sha256:fa2fd74dc3918d962ee6ea162e765f45b75a9588017145cd8322469456bc7164_amd64",
"product_identification_helper": {
"purl": "pkg:oci/submariner-operator-bundle@sha256:fa2fd74dc3918d962ee6ea162e765f45b75a9588017145cd8322469456bc7164?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/submariner-operator-bundle\u0026tag=v0.12.3-1"
}
}
},
{
"category": "product_version",
"name": "rhacm2/submariner-rhel8-operator@sha256:98811cc217f48bc7a6fbe7d4ccf7b1b7b239e19e24b7fcfeacbec8b297880f89_amd64",
"product": {
"name": "rhacm2/submariner-rhel8-operator@sha256:98811cc217f48bc7a6fbe7d4ccf7b1b7b239e19e24b7fcfeacbec8b297880f89_amd64",
"product_id": "rhacm2/submariner-rhel8-operator@sha256:98811cc217f48bc7a6fbe7d4ccf7b1b7b239e19e24b7fcfeacbec8b297880f89_amd64",
"product_identification_helper": {
"purl": "pkg:oci/submariner-rhel8-operator@sha256:98811cc217f48bc7a6fbe7d4ccf7b1b7b239e19e24b7fcfeacbec8b297880f89?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/submariner-rhel8-operator\u0026tag=v0.12.3-1"
}
}
},
{
"category": "product_version",
"name": "rhacm2/submariner-route-agent-rhel8@sha256:6bff7c4285999b218937924fc75e6303525089064f21d23234a01f453529fbf6_amd64",
"product": {
"name": "rhacm2/submariner-route-agent-rhel8@sha256:6bff7c4285999b218937924fc75e6303525089064f21d23234a01f453529fbf6_amd64",
"product_id": "rhacm2/submariner-route-agent-rhel8@sha256:6bff7c4285999b218937924fc75e6303525089064f21d23234a01f453529fbf6_amd64",
"product_identification_helper": {
"purl": "pkg:oci/submariner-route-agent-rhel8@sha256:6bff7c4285999b218937924fc75e6303525089064f21d23234a01f453529fbf6?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/submariner-route-agent-rhel8\u0026tag=v0.12.3-1"
}
}
}
],
"category": "architecture",
"name": "amd64"
},
{
"branches": [
{
"category": "product_version",
"name": "rhacm2/lighthouse-agent-rhel8@sha256:6b579e761576bd97f05c1f5ba42df74db5d22d0203e9d0253efc324cb0bf6378_ppc64le",
"product": {
"name": "rhacm2/lighthouse-agent-rhel8@sha256:6b579e761576bd97f05c1f5ba42df74db5d22d0203e9d0253efc324cb0bf6378_ppc64le",
"product_id": "rhacm2/lighthouse-agent-rhel8@sha256:6b579e761576bd97f05c1f5ba42df74db5d22d0203e9d0253efc324cb0bf6378_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/lighthouse-agent-rhel8@sha256:6b579e761576bd97f05c1f5ba42df74db5d22d0203e9d0253efc324cb0bf6378?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/lighthouse-agent-rhel8\u0026tag=v0.12.3-1"
}
}
},
{
"category": "product_version",
"name": "rhacm2/lighthouse-coredns-rhel8@sha256:77e474f4e0be091c3772ec0c16f2a67168dfea599a1f4220deb2fcb795d2d9c7_ppc64le",
"product": {
"name": "rhacm2/lighthouse-coredns-rhel8@sha256:77e474f4e0be091c3772ec0c16f2a67168dfea599a1f4220deb2fcb795d2d9c7_ppc64le",
"product_id": "rhacm2/lighthouse-coredns-rhel8@sha256:77e474f4e0be091c3772ec0c16f2a67168dfea599a1f4220deb2fcb795d2d9c7_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/lighthouse-coredns-rhel8@sha256:77e474f4e0be091c3772ec0c16f2a67168dfea599a1f4220deb2fcb795d2d9c7?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/lighthouse-coredns-rhel8\u0026tag=v0.12.3-1"
}
}
},
{
"category": "product_version",
"name": "rhacm2/subctl-rhel8@sha256:47cd1ee9aff93dad2e554805836e3393a0d5fc408ffc41a3ffef4676e10ce1f9_ppc64le",
"product": {
"name": "rhacm2/subctl-rhel8@sha256:47cd1ee9aff93dad2e554805836e3393a0d5fc408ffc41a3ffef4676e10ce1f9_ppc64le",
"product_id": "rhacm2/subctl-rhel8@sha256:47cd1ee9aff93dad2e554805836e3393a0d5fc408ffc41a3ffef4676e10ce1f9_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/subctl-rhel8@sha256:47cd1ee9aff93dad2e554805836e3393a0d5fc408ffc41a3ffef4676e10ce1f9?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/subctl-rhel8\u0026tag=v0.12.3-1"
}
}
},
{
"category": "product_version",
"name": "rhacm2/submariner-gateway-rhel8@sha256:522bddc7d016659157c51f7425098eb92f2b0857f921f5ef01e188af3c9056c6_ppc64le",
"product": {
"name": "rhacm2/submariner-gateway-rhel8@sha256:522bddc7d016659157c51f7425098eb92f2b0857f921f5ef01e188af3c9056c6_ppc64le",
"product_id": "rhacm2/submariner-gateway-rhel8@sha256:522bddc7d016659157c51f7425098eb92f2b0857f921f5ef01e188af3c9056c6_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/submariner-gateway-rhel8@sha256:522bddc7d016659157c51f7425098eb92f2b0857f921f5ef01e188af3c9056c6?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/submariner-gateway-rhel8\u0026tag=v0.12.3-1"
}
}
},
{
"category": "product_version",
"name": "rhacm2/submariner-globalnet-rhel8@sha256:c9050e94421701df533d7bc7fb2736de3b923a1b9689f7db9285e902d1d9c173_ppc64le",
"product": {
"name": "rhacm2/submariner-globalnet-rhel8@sha256:c9050e94421701df533d7bc7fb2736de3b923a1b9689f7db9285e902d1d9c173_ppc64le",
"product_id": "rhacm2/submariner-globalnet-rhel8@sha256:c9050e94421701df533d7bc7fb2736de3b923a1b9689f7db9285e902d1d9c173_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/submariner-globalnet-rhel8@sha256:c9050e94421701df533d7bc7fb2736de3b923a1b9689f7db9285e902d1d9c173?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/submariner-globalnet-rhel8\u0026tag=v0.12.3-1"
}
}
},
{
"category": "product_version",
"name": "rhacm2/submariner-networkplugin-syncer-rhel8@sha256:5a86959a38334532e5a33ab76b0553a9eae4cfad8897d5f92457a11cb6a5374b_ppc64le",
"product": {
"name": "rhacm2/submariner-networkplugin-syncer-rhel8@sha256:5a86959a38334532e5a33ab76b0553a9eae4cfad8897d5f92457a11cb6a5374b_ppc64le",
"product_id": "rhacm2/submariner-networkplugin-syncer-rhel8@sha256:5a86959a38334532e5a33ab76b0553a9eae4cfad8897d5f92457a11cb6a5374b_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/submariner-networkplugin-syncer-rhel8@sha256:5a86959a38334532e5a33ab76b0553a9eae4cfad8897d5f92457a11cb6a5374b?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/submariner-networkplugin-syncer-rhel8\u0026tag=v0.12.3-1"
}
}
},
{
"category": "product_version",
"name": "rhacm2/submariner-operator-bundle@sha256:40b62e497e8280cb4db3803ad140e9aa15f038e15b3e1218d0c506646f576aec_ppc64le",
"product": {
"name": "rhacm2/submariner-operator-bundle@sha256:40b62e497e8280cb4db3803ad140e9aa15f038e15b3e1218d0c506646f576aec_ppc64le",
"product_id": "rhacm2/submariner-operator-bundle@sha256:40b62e497e8280cb4db3803ad140e9aa15f038e15b3e1218d0c506646f576aec_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/submariner-operator-bundle@sha256:40b62e497e8280cb4db3803ad140e9aa15f038e15b3e1218d0c506646f576aec?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/submariner-operator-bundle\u0026tag=v0.12.3-1"
}
}
},
{
"category": "product_version",
"name": "rhacm2/submariner-rhel8-operator@sha256:2aad67f470d3a58382029b4db1459916036a8f41aed167d567eb1abef45cda3f_ppc64le",
"product": {
"name": "rhacm2/submariner-rhel8-operator@sha256:2aad67f470d3a58382029b4db1459916036a8f41aed167d567eb1abef45cda3f_ppc64le",
"product_id": "rhacm2/submariner-rhel8-operator@sha256:2aad67f470d3a58382029b4db1459916036a8f41aed167d567eb1abef45cda3f_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/submariner-rhel8-operator@sha256:2aad67f470d3a58382029b4db1459916036a8f41aed167d567eb1abef45cda3f?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/submariner-rhel8-operator\u0026tag=v0.12.3-1"
}
}
},
{
"category": "product_version",
"name": "rhacm2/submariner-route-agent-rhel8@sha256:0f13ca7bb60b17115395a51421916f0136a6d1296da563ba609cf37ec4e31440_ppc64le",
"product": {
"name": "rhacm2/submariner-route-agent-rhel8@sha256:0f13ca7bb60b17115395a51421916f0136a6d1296da563ba609cf37ec4e31440_ppc64le",
"product_id": "rhacm2/submariner-route-agent-rhel8@sha256:0f13ca7bb60b17115395a51421916f0136a6d1296da563ba609cf37ec4e31440_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/submariner-route-agent-rhel8@sha256:0f13ca7bb60b17115395a51421916f0136a6d1296da563ba609cf37ec4e31440?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/submariner-route-agent-rhel8\u0026tag=v0.12.3-1"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "rhacm2/lighthouse-agent-rhel8@sha256:b76b9fc2f08fdedd74511526b3f049a37e8beab3dddd9c3463ea20064aadf194_arm64",
"product": {
"name": "rhacm2/lighthouse-agent-rhel8@sha256:b76b9fc2f08fdedd74511526b3f049a37e8beab3dddd9c3463ea20064aadf194_arm64",
"product_id": "rhacm2/lighthouse-agent-rhel8@sha256:b76b9fc2f08fdedd74511526b3f049a37e8beab3dddd9c3463ea20064aadf194_arm64",
"product_identification_helper": {
"purl": "pkg:oci/lighthouse-agent-rhel8@sha256:b76b9fc2f08fdedd74511526b3f049a37e8beab3dddd9c3463ea20064aadf194?arch=arm64\u0026repository_url=registry.redhat.io/rhacm2/lighthouse-agent-rhel8\u0026tag=v0.12.3-1"
}
}
},
{
"category": "product_version",
"name": "rhacm2/lighthouse-coredns-rhel8@sha256:4af85e8acaa3b787828a3352bbfff427c6668936c428169e5fcbd345e802fcc3_arm64",
"product": {
"name": "rhacm2/lighthouse-coredns-rhel8@sha256:4af85e8acaa3b787828a3352bbfff427c6668936c428169e5fcbd345e802fcc3_arm64",
"product_id": "rhacm2/lighthouse-coredns-rhel8@sha256:4af85e8acaa3b787828a3352bbfff427c6668936c428169e5fcbd345e802fcc3_arm64",
"product_identification_helper": {
"purl": "pkg:oci/lighthouse-coredns-rhel8@sha256:4af85e8acaa3b787828a3352bbfff427c6668936c428169e5fcbd345e802fcc3?arch=arm64\u0026repository_url=registry.redhat.io/rhacm2/lighthouse-coredns-rhel8\u0026tag=v0.12.3-1"
}
}
},
{
"category": "product_version",
"name": "rhacm2/subctl-rhel8@sha256:dae78580dc26a6beaaeef47575e0cc13c487d5cef1d72c415ddc19368ef3b4a5_arm64",
"product": {
"name": "rhacm2/subctl-rhel8@sha256:dae78580dc26a6beaaeef47575e0cc13c487d5cef1d72c415ddc19368ef3b4a5_arm64",
"product_id": "rhacm2/subctl-rhel8@sha256:dae78580dc26a6beaaeef47575e0cc13c487d5cef1d72c415ddc19368ef3b4a5_arm64",
"product_identification_helper": {
"purl": "pkg:oci/subctl-rhel8@sha256:dae78580dc26a6beaaeef47575e0cc13c487d5cef1d72c415ddc19368ef3b4a5?arch=arm64\u0026repository_url=registry.redhat.io/rhacm2/subctl-rhel8\u0026tag=v0.12.3-1"
}
}
},
{
"category": "product_version",
"name": "rhacm2/submariner-gateway-rhel8@sha256:2bdd80c985f13cc90a223979c7b26bd5a273504ce973ea2c24b599e1c5f1b3fc_arm64",
"product": {
"name": "rhacm2/submariner-gateway-rhel8@sha256:2bdd80c985f13cc90a223979c7b26bd5a273504ce973ea2c24b599e1c5f1b3fc_arm64",
"product_id": "rhacm2/submariner-gateway-rhel8@sha256:2bdd80c985f13cc90a223979c7b26bd5a273504ce973ea2c24b599e1c5f1b3fc_arm64",
"product_identification_helper": {
"purl": "pkg:oci/submariner-gateway-rhel8@sha256:2bdd80c985f13cc90a223979c7b26bd5a273504ce973ea2c24b599e1c5f1b3fc?arch=arm64\u0026repository_url=registry.redhat.io/rhacm2/submariner-gateway-rhel8\u0026tag=v0.12.3-1"
}
}
},
{
"category": "product_version",
"name": "rhacm2/submariner-globalnet-rhel8@sha256:d7fdc22644e6dbf19f21130c0f635e0a6c6e11fb9cbf9d9cbd9635d17fe25fbf_arm64",
"product": {
"name": "rhacm2/submariner-globalnet-rhel8@sha256:d7fdc22644e6dbf19f21130c0f635e0a6c6e11fb9cbf9d9cbd9635d17fe25fbf_arm64",
"product_id": "rhacm2/submariner-globalnet-rhel8@sha256:d7fdc22644e6dbf19f21130c0f635e0a6c6e11fb9cbf9d9cbd9635d17fe25fbf_arm64",
"product_identification_helper": {
"purl": "pkg:oci/submariner-globalnet-rhel8@sha256:d7fdc22644e6dbf19f21130c0f635e0a6c6e11fb9cbf9d9cbd9635d17fe25fbf?arch=arm64\u0026repository_url=registry.redhat.io/rhacm2/submariner-globalnet-rhel8\u0026tag=v0.12.3-1"
}
}
},
{
"category": "product_version",
"name": "rhacm2/submariner-networkplugin-syncer-rhel8@sha256:0b72b8b294483dcf92d8acaaa56e8ac1141db3c6811ab64298117fafde99936a_arm64",
"product": {
"name": "rhacm2/submariner-networkplugin-syncer-rhel8@sha256:0b72b8b294483dcf92d8acaaa56e8ac1141db3c6811ab64298117fafde99936a_arm64",
"product_id": "rhacm2/submariner-networkplugin-syncer-rhel8@sha256:0b72b8b294483dcf92d8acaaa56e8ac1141db3c6811ab64298117fafde99936a_arm64",
"product_identification_helper": {
"purl": "pkg:oci/submariner-networkplugin-syncer-rhel8@sha256:0b72b8b294483dcf92d8acaaa56e8ac1141db3c6811ab64298117fafde99936a?arch=arm64\u0026repository_url=registry.redhat.io/rhacm2/submariner-networkplugin-syncer-rhel8\u0026tag=v0.12.3-1"
}
}
},
{
"category": "product_version",
"name": "rhacm2/submariner-operator-bundle@sha256:71c8912419b9a6ac3ddd911c0a2fd097170743efab7dcb1c14141e5e1defc738_arm64",
"product": {
"name": "rhacm2/submariner-operator-bundle@sha256:71c8912419b9a6ac3ddd911c0a2fd097170743efab7dcb1c14141e5e1defc738_arm64",
"product_id": "rhacm2/submariner-operator-bundle@sha256:71c8912419b9a6ac3ddd911c0a2fd097170743efab7dcb1c14141e5e1defc738_arm64",
"product_identification_helper": {
"purl": "pkg:oci/submariner-operator-bundle@sha256:71c8912419b9a6ac3ddd911c0a2fd097170743efab7dcb1c14141e5e1defc738?arch=arm64\u0026repository_url=registry.redhat.io/rhacm2/submariner-operator-bundle\u0026tag=v0.12.3-1"
}
}
},
{
"category": "product_version",
"name": "rhacm2/submariner-rhel8-operator@sha256:dc2a4dace498a5c6238c555411362c2e6166011582a572d3cab431c745143301_arm64",
"product": {
"name": "rhacm2/submariner-rhel8-operator@sha256:dc2a4dace498a5c6238c555411362c2e6166011582a572d3cab431c745143301_arm64",
"product_id": "rhacm2/submariner-rhel8-operator@sha256:dc2a4dace498a5c6238c555411362c2e6166011582a572d3cab431c745143301_arm64",
"product_identification_helper": {
"purl": "pkg:oci/submariner-rhel8-operator@sha256:dc2a4dace498a5c6238c555411362c2e6166011582a572d3cab431c745143301?arch=arm64\u0026repository_url=registry.redhat.io/rhacm2/submariner-rhel8-operator\u0026tag=v0.12.3-1"
}
}
},
{
"category": "product_version",
"name": "rhacm2/submariner-route-agent-rhel8@sha256:d0140f18ad07368201a6e34af970ac9ee402f8ac292e71c42244af85eb37db08_arm64",
"product": {
"name": "rhacm2/submariner-route-agent-rhel8@sha256:d0140f18ad07368201a6e34af970ac9ee402f8ac292e71c42244af85eb37db08_arm64",
"product_id": "rhacm2/submariner-route-agent-rhel8@sha256:d0140f18ad07368201a6e34af970ac9ee402f8ac292e71c42244af85eb37db08_arm64",
"product_identification_helper": {
"purl": "pkg:oci/submariner-route-agent-rhel8@sha256:d0140f18ad07368201a6e34af970ac9ee402f8ac292e71c42244af85eb37db08?arch=arm64\u0026repository_url=registry.redhat.io/rhacm2/submariner-route-agent-rhel8\u0026tag=v0.12.3-1"
}
}
}
],
"category": "architecture",
"name": "arm64"
},
{
"branches": [
{
"category": "product_version",
"name": "rhacm2/lighthouse-agent-rhel8@sha256:998706bb956a4fdd15526b5bb6a0458d59ea5cc537e2784b6dec1bb24b6aebbd_s390x",
"product": {
"name": "rhacm2/lighthouse-agent-rhel8@sha256:998706bb956a4fdd15526b5bb6a0458d59ea5cc537e2784b6dec1bb24b6aebbd_s390x",
"product_id": "rhacm2/lighthouse-agent-rhel8@sha256:998706bb956a4fdd15526b5bb6a0458d59ea5cc537e2784b6dec1bb24b6aebbd_s390x",
"product_identification_helper": {
"purl": "pkg:oci/lighthouse-agent-rhel8@sha256:998706bb956a4fdd15526b5bb6a0458d59ea5cc537e2784b6dec1bb24b6aebbd?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/lighthouse-agent-rhel8\u0026tag=v0.12.3-1"
}
}
},
{
"category": "product_version",
"name": "rhacm2/lighthouse-coredns-rhel8@sha256:dbc246166dd35202221ac3f885a0e46160a6d277a058b6d2f1c7ee571c673b50_s390x",
"product": {
"name": "rhacm2/lighthouse-coredns-rhel8@sha256:dbc246166dd35202221ac3f885a0e46160a6d277a058b6d2f1c7ee571c673b50_s390x",
"product_id": "rhacm2/lighthouse-coredns-rhel8@sha256:dbc246166dd35202221ac3f885a0e46160a6d277a058b6d2f1c7ee571c673b50_s390x",
"product_identification_helper": {
"purl": "pkg:oci/lighthouse-coredns-rhel8@sha256:dbc246166dd35202221ac3f885a0e46160a6d277a058b6d2f1c7ee571c673b50?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/lighthouse-coredns-rhel8\u0026tag=v0.12.3-1"
}
}
},
{
"category": "product_version",
"name": "rhacm2/subctl-rhel8@sha256:9ab13f289008d38a7cfa2182e4a5fb3a29b0b8efa2da40916018f2449ca730c7_s390x",
"product": {
"name": "rhacm2/subctl-rhel8@sha256:9ab13f289008d38a7cfa2182e4a5fb3a29b0b8efa2da40916018f2449ca730c7_s390x",
"product_id": "rhacm2/subctl-rhel8@sha256:9ab13f289008d38a7cfa2182e4a5fb3a29b0b8efa2da40916018f2449ca730c7_s390x",
"product_identification_helper": {
"purl": "pkg:oci/subctl-rhel8@sha256:9ab13f289008d38a7cfa2182e4a5fb3a29b0b8efa2da40916018f2449ca730c7?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/subctl-rhel8\u0026tag=v0.12.3-1"
}
}
},
{
"category": "product_version",
"name": "rhacm2/submariner-gateway-rhel8@sha256:825db9cddd68a762e934bc855e5836e4f16a566f59d1310f45a06dac85ab8035_s390x",
"product": {
"name": "rhacm2/submariner-gateway-rhel8@sha256:825db9cddd68a762e934bc855e5836e4f16a566f59d1310f45a06dac85ab8035_s390x",
"product_id": "rhacm2/submariner-gateway-rhel8@sha256:825db9cddd68a762e934bc855e5836e4f16a566f59d1310f45a06dac85ab8035_s390x",
"product_identification_helper": {
"purl": "pkg:oci/submariner-gateway-rhel8@sha256:825db9cddd68a762e934bc855e5836e4f16a566f59d1310f45a06dac85ab8035?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/submariner-gateway-rhel8\u0026tag=v0.12.3-1"
}
}
},
{
"category": "product_version",
"name": "rhacm2/submariner-globalnet-rhel8@sha256:d855b05d15a54a88e2c026e0d1935b189dc7ceddb3a7b5b0672e8e4c715f3845_s390x",
"product": {
"name": "rhacm2/submariner-globalnet-rhel8@sha256:d855b05d15a54a88e2c026e0d1935b189dc7ceddb3a7b5b0672e8e4c715f3845_s390x",
"product_id": "rhacm2/submariner-globalnet-rhel8@sha256:d855b05d15a54a88e2c026e0d1935b189dc7ceddb3a7b5b0672e8e4c715f3845_s390x",
"product_identification_helper": {
"purl": "pkg:oci/submariner-globalnet-rhel8@sha256:d855b05d15a54a88e2c026e0d1935b189dc7ceddb3a7b5b0672e8e4c715f3845?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/submariner-globalnet-rhel8\u0026tag=v0.12.3-1"
}
}
},
{
"category": "product_version",
"name": "rhacm2/submariner-networkplugin-syncer-rhel8@sha256:39ca01ef63bc7d2663186a516456c90657b918a2ec044af7aadb1315a607f429_s390x",
"product": {
"name": "rhacm2/submariner-networkplugin-syncer-rhel8@sha256:39ca01ef63bc7d2663186a516456c90657b918a2ec044af7aadb1315a607f429_s390x",
"product_id": "rhacm2/submariner-networkplugin-syncer-rhel8@sha256:39ca01ef63bc7d2663186a516456c90657b918a2ec044af7aadb1315a607f429_s390x",
"product_identification_helper": {
"purl": "pkg:oci/submariner-networkplugin-syncer-rhel8@sha256:39ca01ef63bc7d2663186a516456c90657b918a2ec044af7aadb1315a607f429?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/submariner-networkplugin-syncer-rhel8\u0026tag=v0.12.3-1"
}
}
},
{
"category": "product_version",
"name": "rhacm2/submariner-operator-bundle@sha256:f86cb9bb9dc189057de11e2a5c3c1c10597c78e82432a34cf2864c6a32f8e6fa_s390x",
"product": {
"name": "rhacm2/submariner-operator-bundle@sha256:f86cb9bb9dc189057de11e2a5c3c1c10597c78e82432a34cf2864c6a32f8e6fa_s390x",
"product_id": "rhacm2/submariner-operator-bundle@sha256:f86cb9bb9dc189057de11e2a5c3c1c10597c78e82432a34cf2864c6a32f8e6fa_s390x",
"product_identification_helper": {
"purl": "pkg:oci/submariner-operator-bundle@sha256:f86cb9bb9dc189057de11e2a5c3c1c10597c78e82432a34cf2864c6a32f8e6fa?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/submariner-operator-bundle\u0026tag=v0.12.3-1"
}
}
},
{
"category": "product_version",
"name": "rhacm2/submariner-rhel8-operator@sha256:971eeffff35343edb6da2be6d2d3620d13536cbbaddacbbd13f285a70490df3a_s390x",
"product": {
"name": "rhacm2/submariner-rhel8-operator@sha256:971eeffff35343edb6da2be6d2d3620d13536cbbaddacbbd13f285a70490df3a_s390x",
"product_id": "rhacm2/submariner-rhel8-operator@sha256:971eeffff35343edb6da2be6d2d3620d13536cbbaddacbbd13f285a70490df3a_s390x",
"product_identification_helper": {
"purl": "pkg:oci/submariner-rhel8-operator@sha256:971eeffff35343edb6da2be6d2d3620d13536cbbaddacbbd13f285a70490df3a?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/submariner-rhel8-operator\u0026tag=v0.12.3-1"
}
}
},
{
"category": "product_version",
"name": "rhacm2/submariner-route-agent-rhel8@sha256:497545ae0c5ae10463c5ef4a56c0e3733efbff2da65754dce4bbb977cb80d55a_s390x",
"product": {
"name": "rhacm2/submariner-route-agent-rhel8@sha256:497545ae0c5ae10463c5ef4a56c0e3733efbff2da65754dce4bbb977cb80d55a_s390x",
"product_id": "rhacm2/submariner-route-agent-rhel8@sha256:497545ae0c5ae10463c5ef4a56c0e3733efbff2da65754dce4bbb977cb80d55a_s390x",
"product_identification_helper": {
"purl": "pkg:oci/submariner-route-agent-rhel8@sha256:497545ae0c5ae10463c5ef4a56c0e3733efbff2da65754dce4bbb977cb80d55a?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/submariner-route-agent-rhel8\u0026tag=v0.12.3-1"
}
}
}
],
"category": "architecture",
"name": "s390x"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "rhacm2/lighthouse-agent-rhel8@sha256:33ac96a6dd01e698c6d037acd701ee0fc5a09bb1cdd8f761c229e6a2be9ea799_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8",
"product_id": "8Base-RHACM-2.5:rhacm2/lighthouse-agent-rhel8@sha256:33ac96a6dd01e698c6d037acd701ee0fc5a09bb1cdd8f761c229e6a2be9ea799_amd64"
},
"product_reference": "rhacm2/lighthouse-agent-rhel8@sha256:33ac96a6dd01e698c6d037acd701ee0fc5a09bb1cdd8f761c229e6a2be9ea799_amd64",
"relates_to_product_reference": "8Base-RHACM-2.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhacm2/lighthouse-agent-rhel8@sha256:6b579e761576bd97f05c1f5ba42df74db5d22d0203e9d0253efc324cb0bf6378_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8",
"product_id": "8Base-RHACM-2.5:rhacm2/lighthouse-agent-rhel8@sha256:6b579e761576bd97f05c1f5ba42df74db5d22d0203e9d0253efc324cb0bf6378_ppc64le"
},
"product_reference": "rhacm2/lighthouse-agent-rhel8@sha256:6b579e761576bd97f05c1f5ba42df74db5d22d0203e9d0253efc324cb0bf6378_ppc64le",
"relates_to_product_reference": "8Base-RHACM-2.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhacm2/lighthouse-agent-rhel8@sha256:998706bb956a4fdd15526b5bb6a0458d59ea5cc537e2784b6dec1bb24b6aebbd_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8",
"product_id": "8Base-RHACM-2.5:rhacm2/lighthouse-agent-rhel8@sha256:998706bb956a4fdd15526b5bb6a0458d59ea5cc537e2784b6dec1bb24b6aebbd_s390x"
},
"product_reference": "rhacm2/lighthouse-agent-rhel8@sha256:998706bb956a4fdd15526b5bb6a0458d59ea5cc537e2784b6dec1bb24b6aebbd_s390x",
"relates_to_product_reference": "8Base-RHACM-2.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhacm2/lighthouse-agent-rhel8@sha256:b76b9fc2f08fdedd74511526b3f049a37e8beab3dddd9c3463ea20064aadf194_arm64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8",
"product_id": "8Base-RHACM-2.5:rhacm2/lighthouse-agent-rhel8@sha256:b76b9fc2f08fdedd74511526b3f049a37e8beab3dddd9c3463ea20064aadf194_arm64"
},
"product_reference": "rhacm2/lighthouse-agent-rhel8@sha256:b76b9fc2f08fdedd74511526b3f049a37e8beab3dddd9c3463ea20064aadf194_arm64",
"relates_to_product_reference": "8Base-RHACM-2.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhacm2/lighthouse-coredns-rhel8@sha256:4af85e8acaa3b787828a3352bbfff427c6668936c428169e5fcbd345e802fcc3_arm64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8",
"product_id": "8Base-RHACM-2.5:rhacm2/lighthouse-coredns-rhel8@sha256:4af85e8acaa3b787828a3352bbfff427c6668936c428169e5fcbd345e802fcc3_arm64"
},
"product_reference": "rhacm2/lighthouse-coredns-rhel8@sha256:4af85e8acaa3b787828a3352bbfff427c6668936c428169e5fcbd345e802fcc3_arm64",
"relates_to_product_reference": "8Base-RHACM-2.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhacm2/lighthouse-coredns-rhel8@sha256:77e474f4e0be091c3772ec0c16f2a67168dfea599a1f4220deb2fcb795d2d9c7_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8",
"product_id": "8Base-RHACM-2.5:rhacm2/lighthouse-coredns-rhel8@sha256:77e474f4e0be091c3772ec0c16f2a67168dfea599a1f4220deb2fcb795d2d9c7_ppc64le"
},
"product_reference": "rhacm2/lighthouse-coredns-rhel8@sha256:77e474f4e0be091c3772ec0c16f2a67168dfea599a1f4220deb2fcb795d2d9c7_ppc64le",
"relates_to_product_reference": "8Base-RHACM-2.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhacm2/lighthouse-coredns-rhel8@sha256:dbc246166dd35202221ac3f885a0e46160a6d277a058b6d2f1c7ee571c673b50_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8",
"product_id": "8Base-RHACM-2.5:rhacm2/lighthouse-coredns-rhel8@sha256:dbc246166dd35202221ac3f885a0e46160a6d277a058b6d2f1c7ee571c673b50_s390x"
},
"product_reference": "rhacm2/lighthouse-coredns-rhel8@sha256:dbc246166dd35202221ac3f885a0e46160a6d277a058b6d2f1c7ee571c673b50_s390x",
"relates_to_product_reference": "8Base-RHACM-2.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhacm2/lighthouse-coredns-rhel8@sha256:f27e7895a859ee2ab5f36134522349c1c04f3b18284787e0d14c3380126bf402_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8",
"product_id": "8Base-RHACM-2.5:rhacm2/lighthouse-coredns-rhel8@sha256:f27e7895a859ee2ab5f36134522349c1c04f3b18284787e0d14c3380126bf402_amd64"
},
"product_reference": "rhacm2/lighthouse-coredns-rhel8@sha256:f27e7895a859ee2ab5f36134522349c1c04f3b18284787e0d14c3380126bf402_amd64",
"relates_to_product_reference": "8Base-RHACM-2.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhacm2/subctl-rhel8@sha256:47cd1ee9aff93dad2e554805836e3393a0d5fc408ffc41a3ffef4676e10ce1f9_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8",
"product_id": "8Base-RHACM-2.5:rhacm2/subctl-rhel8@sha256:47cd1ee9aff93dad2e554805836e3393a0d5fc408ffc41a3ffef4676e10ce1f9_ppc64le"
},
"product_reference": "rhacm2/subctl-rhel8@sha256:47cd1ee9aff93dad2e554805836e3393a0d5fc408ffc41a3ffef4676e10ce1f9_ppc64le",
"relates_to_product_reference": "8Base-RHACM-2.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhacm2/subctl-rhel8@sha256:9ab13f289008d38a7cfa2182e4a5fb3a29b0b8efa2da40916018f2449ca730c7_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8",
"product_id": "8Base-RHACM-2.5:rhacm2/subctl-rhel8@sha256:9ab13f289008d38a7cfa2182e4a5fb3a29b0b8efa2da40916018f2449ca730c7_s390x"
},
"product_reference": "rhacm2/subctl-rhel8@sha256:9ab13f289008d38a7cfa2182e4a5fb3a29b0b8efa2da40916018f2449ca730c7_s390x",
"relates_to_product_reference": "8Base-RHACM-2.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhacm2/subctl-rhel8@sha256:dae78580dc26a6beaaeef47575e0cc13c487d5cef1d72c415ddc19368ef3b4a5_arm64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8",
"product_id": "8Base-RHACM-2.5:rhacm2/subctl-rhel8@sha256:dae78580dc26a6beaaeef47575e0cc13c487d5cef1d72c415ddc19368ef3b4a5_arm64"
},
"product_reference": "rhacm2/subctl-rhel8@sha256:dae78580dc26a6beaaeef47575e0cc13c487d5cef1d72c415ddc19368ef3b4a5_arm64",
"relates_to_product_reference": "8Base-RHACM-2.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhacm2/subctl-rhel8@sha256:e6f5f07b97d4998c122cadeee693dce4d72f3bbe2c1f9703b15621b6531cf3a4_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8",
"product_id": "8Base-RHACM-2.5:rhacm2/subctl-rhel8@sha256:e6f5f07b97d4998c122cadeee693dce4d72f3bbe2c1f9703b15621b6531cf3a4_amd64"
},
"product_reference": "rhacm2/subctl-rhel8@sha256:e6f5f07b97d4998c122cadeee693dce4d72f3bbe2c1f9703b15621b6531cf3a4_amd64",
"relates_to_product_reference": "8Base-RHACM-2.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhacm2/submariner-gateway-rhel8@sha256:2bdd80c985f13cc90a223979c7b26bd5a273504ce973ea2c24b599e1c5f1b3fc_arm64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8",
"product_id": "8Base-RHACM-2.5:rhacm2/submariner-gateway-rhel8@sha256:2bdd80c985f13cc90a223979c7b26bd5a273504ce973ea2c24b599e1c5f1b3fc_arm64"
},
"product_reference": "rhacm2/submariner-gateway-rhel8@sha256:2bdd80c985f13cc90a223979c7b26bd5a273504ce973ea2c24b599e1c5f1b3fc_arm64",
"relates_to_product_reference": "8Base-RHACM-2.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhacm2/submariner-gateway-rhel8@sha256:522bddc7d016659157c51f7425098eb92f2b0857f921f5ef01e188af3c9056c6_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8",
"product_id": "8Base-RHACM-2.5:rhacm2/submariner-gateway-rhel8@sha256:522bddc7d016659157c51f7425098eb92f2b0857f921f5ef01e188af3c9056c6_ppc64le"
},
"product_reference": "rhacm2/submariner-gateway-rhel8@sha256:522bddc7d016659157c51f7425098eb92f2b0857f921f5ef01e188af3c9056c6_ppc64le",
"relates_to_product_reference": "8Base-RHACM-2.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhacm2/submariner-gateway-rhel8@sha256:7b343f4f8ea08b2e2a670ee938a2286a92d701e5e92f4f43ee58e620e2ee070b_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8",
"product_id": "8Base-RHACM-2.5:rhacm2/submariner-gateway-rhel8@sha256:7b343f4f8ea08b2e2a670ee938a2286a92d701e5e92f4f43ee58e620e2ee070b_amd64"
},
"product_reference": "rhacm2/submariner-gateway-rhel8@sha256:7b343f4f8ea08b2e2a670ee938a2286a92d701e5e92f4f43ee58e620e2ee070b_amd64",
"relates_to_product_reference": "8Base-RHACM-2.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhacm2/submariner-gateway-rhel8@sha256:825db9cddd68a762e934bc855e5836e4f16a566f59d1310f45a06dac85ab8035_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8",
"product_id": "8Base-RHACM-2.5:rhacm2/submariner-gateway-rhel8@sha256:825db9cddd68a762e934bc855e5836e4f16a566f59d1310f45a06dac85ab8035_s390x"
},
"product_reference": "rhacm2/submariner-gateway-rhel8@sha256:825db9cddd68a762e934bc855e5836e4f16a566f59d1310f45a06dac85ab8035_s390x",
"relates_to_product_reference": "8Base-RHACM-2.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhacm2/submariner-globalnet-rhel8@sha256:3b04b0be64ea639e82496102236899cc62a2521c8e8bebd07c852118e76bce88_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8",
"product_id": "8Base-RHACM-2.5:rhacm2/submariner-globalnet-rhel8@sha256:3b04b0be64ea639e82496102236899cc62a2521c8e8bebd07c852118e76bce88_amd64"
},
"product_reference": "rhacm2/submariner-globalnet-rhel8@sha256:3b04b0be64ea639e82496102236899cc62a2521c8e8bebd07c852118e76bce88_amd64",
"relates_to_product_reference": "8Base-RHACM-2.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhacm2/submariner-globalnet-rhel8@sha256:c9050e94421701df533d7bc7fb2736de3b923a1b9689f7db9285e902d1d9c173_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8",
"product_id": "8Base-RHACM-2.5:rhacm2/submariner-globalnet-rhel8@sha256:c9050e94421701df533d7bc7fb2736de3b923a1b9689f7db9285e902d1d9c173_ppc64le"
},
"product_reference": "rhacm2/submariner-globalnet-rhel8@sha256:c9050e94421701df533d7bc7fb2736de3b923a1b9689f7db9285e902d1d9c173_ppc64le",
"relates_to_product_reference": "8Base-RHACM-2.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhacm2/submariner-globalnet-rhel8@sha256:d7fdc22644e6dbf19f21130c0f635e0a6c6e11fb9cbf9d9cbd9635d17fe25fbf_arm64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8",
"product_id": "8Base-RHACM-2.5:rhacm2/submariner-globalnet-rhel8@sha256:d7fdc22644e6dbf19f21130c0f635e0a6c6e11fb9cbf9d9cbd9635d17fe25fbf_arm64"
},
"product_reference": "rhacm2/submariner-globalnet-rhel8@sha256:d7fdc22644e6dbf19f21130c0f635e0a6c6e11fb9cbf9d9cbd9635d17fe25fbf_arm64",
"relates_to_product_reference": "8Base-RHACM-2.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhacm2/submariner-globalnet-rhel8@sha256:d855b05d15a54a88e2c026e0d1935b189dc7ceddb3a7b5b0672e8e4c715f3845_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8",
"product_id": "8Base-RHACM-2.5:rhacm2/submariner-globalnet-rhel8@sha256:d855b05d15a54a88e2c026e0d1935b189dc7ceddb3a7b5b0672e8e4c715f3845_s390x"
},
"product_reference": "rhacm2/submariner-globalnet-rhel8@sha256:d855b05d15a54a88e2c026e0d1935b189dc7ceddb3a7b5b0672e8e4c715f3845_s390x",
"relates_to_product_reference": "8Base-RHACM-2.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhacm2/submariner-networkplugin-syncer-rhel8@sha256:0b72b8b294483dcf92d8acaaa56e8ac1141db3c6811ab64298117fafde99936a_arm64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8",
"product_id": "8Base-RHACM-2.5:rhacm2/submariner-networkplugin-syncer-rhel8@sha256:0b72b8b294483dcf92d8acaaa56e8ac1141db3c6811ab64298117fafde99936a_arm64"
},
"product_reference": "rhacm2/submariner-networkplugin-syncer-rhel8@sha256:0b72b8b294483dcf92d8acaaa56e8ac1141db3c6811ab64298117fafde99936a_arm64",
"relates_to_product_reference": "8Base-RHACM-2.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhacm2/submariner-networkplugin-syncer-rhel8@sha256:39ca01ef63bc7d2663186a516456c90657b918a2ec044af7aadb1315a607f429_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8",
"product_id": "8Base-RHACM-2.5:rhacm2/submariner-networkplugin-syncer-rhel8@sha256:39ca01ef63bc7d2663186a516456c90657b918a2ec044af7aadb1315a607f429_s390x"
},
"product_reference": "rhacm2/submariner-networkplugin-syncer-rhel8@sha256:39ca01ef63bc7d2663186a516456c90657b918a2ec044af7aadb1315a607f429_s390x",
"relates_to_product_reference": "8Base-RHACM-2.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhacm2/submariner-networkplugin-syncer-rhel8@sha256:5a86959a38334532e5a33ab76b0553a9eae4cfad8897d5f92457a11cb6a5374b_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8",
"product_id": "8Base-RHACM-2.5:rhacm2/submariner-networkplugin-syncer-rhel8@sha256:5a86959a38334532e5a33ab76b0553a9eae4cfad8897d5f92457a11cb6a5374b_ppc64le"
},
"product_reference": "rhacm2/submariner-networkplugin-syncer-rhel8@sha256:5a86959a38334532e5a33ab76b0553a9eae4cfad8897d5f92457a11cb6a5374b_ppc64le",
"relates_to_product_reference": "8Base-RHACM-2.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhacm2/submariner-networkplugin-syncer-rhel8@sha256:91bc8d57c88c771bda7a6703ced10e32e9999116fe8cb7e4adddb6198591eeac_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8",
"product_id": "8Base-RHACM-2.5:rhacm2/submariner-networkplugin-syncer-rhel8@sha256:91bc8d57c88c771bda7a6703ced10e32e9999116fe8cb7e4adddb6198591eeac_amd64"
},
"product_reference": "rhacm2/submariner-networkplugin-syncer-rhel8@sha256:91bc8d57c88c771bda7a6703ced10e32e9999116fe8cb7e4adddb6198591eeac_amd64",
"relates_to_product_reference": "8Base-RHACM-2.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhacm2/submariner-operator-bundle@sha256:40b62e497e8280cb4db3803ad140e9aa15f038e15b3e1218d0c506646f576aec_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8",
"product_id": "8Base-RHACM-2.5:rhacm2/submariner-operator-bundle@sha256:40b62e497e8280cb4db3803ad140e9aa15f038e15b3e1218d0c506646f576aec_ppc64le"
},
"product_reference": "rhacm2/submariner-operator-bundle@sha256:40b62e497e8280cb4db3803ad140e9aa15f038e15b3e1218d0c506646f576aec_ppc64le",
"relates_to_product_reference": "8Base-RHACM-2.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhacm2/submariner-operator-bundle@sha256:71c8912419b9a6ac3ddd911c0a2fd097170743efab7dcb1c14141e5e1defc738_arm64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8",
"product_id": "8Base-RHACM-2.5:rhacm2/submariner-operator-bundle@sha256:71c8912419b9a6ac3ddd911c0a2fd097170743efab7dcb1c14141e5e1defc738_arm64"
},
"product_reference": "rhacm2/submariner-operator-bundle@sha256:71c8912419b9a6ac3ddd911c0a2fd097170743efab7dcb1c14141e5e1defc738_arm64",
"relates_to_product_reference": "8Base-RHACM-2.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhacm2/submariner-operator-bundle@sha256:f86cb9bb9dc189057de11e2a5c3c1c10597c78e82432a34cf2864c6a32f8e6fa_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8",
"product_id": "8Base-RHACM-2.5:rhacm2/submariner-operator-bundle@sha256:f86cb9bb9dc189057de11e2a5c3c1c10597c78e82432a34cf2864c6a32f8e6fa_s390x"
},
"product_reference": "rhacm2/submariner-operator-bundle@sha256:f86cb9bb9dc189057de11e2a5c3c1c10597c78e82432a34cf2864c6a32f8e6fa_s390x",
"relates_to_product_reference": "8Base-RHACM-2.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhacm2/submariner-operator-bundle@sha256:fa2fd74dc3918d962ee6ea162e765f45b75a9588017145cd8322469456bc7164_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8",
"product_id": "8Base-RHACM-2.5:rhacm2/submariner-operator-bundle@sha256:fa2fd74dc3918d962ee6ea162e765f45b75a9588017145cd8322469456bc7164_amd64"
},
"product_reference": "rhacm2/submariner-operator-bundle@sha256:fa2fd74dc3918d962ee6ea162e765f45b75a9588017145cd8322469456bc7164_amd64",
"relates_to_product_reference": "8Base-RHACM-2.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhacm2/submariner-rhel8-operator@sha256:2aad67f470d3a58382029b4db1459916036a8f41aed167d567eb1abef45cda3f_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8",
"product_id": "8Base-RHACM-2.5:rhacm2/submariner-rhel8-operator@sha256:2aad67f470d3a58382029b4db1459916036a8f41aed167d567eb1abef45cda3f_ppc64le"
},
"product_reference": "rhacm2/submariner-rhel8-operator@sha256:2aad67f470d3a58382029b4db1459916036a8f41aed167d567eb1abef45cda3f_ppc64le",
"relates_to_product_reference": "8Base-RHACM-2.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhacm2/submariner-rhel8-operator@sha256:971eeffff35343edb6da2be6d2d3620d13536cbbaddacbbd13f285a70490df3a_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8",
"product_id": "8Base-RHACM-2.5:rhacm2/submariner-rhel8-operator@sha256:971eeffff35343edb6da2be6d2d3620d13536cbbaddacbbd13f285a70490df3a_s390x"
},
"product_reference": "rhacm2/submariner-rhel8-operator@sha256:971eeffff35343edb6da2be6d2d3620d13536cbbaddacbbd13f285a70490df3a_s390x",
"relates_to_product_reference": "8Base-RHACM-2.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhacm2/submariner-rhel8-operator@sha256:98811cc217f48bc7a6fbe7d4ccf7b1b7b239e19e24b7fcfeacbec8b297880f89_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8",
"product_id": "8Base-RHACM-2.5:rhacm2/submariner-rhel8-operator@sha256:98811cc217f48bc7a6fbe7d4ccf7b1b7b239e19e24b7fcfeacbec8b297880f89_amd64"
},
"product_reference": "rhacm2/submariner-rhel8-operator@sha256:98811cc217f48bc7a6fbe7d4ccf7b1b7b239e19e24b7fcfeacbec8b297880f89_amd64",
"relates_to_product_reference": "8Base-RHACM-2.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhacm2/submariner-rhel8-operator@sha256:dc2a4dace498a5c6238c555411362c2e6166011582a572d3cab431c745143301_arm64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8",
"product_id": "8Base-RHACM-2.5:rhacm2/submariner-rhel8-operator@sha256:dc2a4dace498a5c6238c555411362c2e6166011582a572d3cab431c745143301_arm64"
},
"product_reference": "rhacm2/submariner-rhel8-operator@sha256:dc2a4dace498a5c6238c555411362c2e6166011582a572d3cab431c745143301_arm64",
"relates_to_product_reference": "8Base-RHACM-2.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhacm2/submariner-route-agent-rhel8@sha256:0f13ca7bb60b17115395a51421916f0136a6d1296da563ba609cf37ec4e31440_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8",
"product_id": "8Base-RHACM-2.5:rhacm2/submariner-route-agent-rhel8@sha256:0f13ca7bb60b17115395a51421916f0136a6d1296da563ba609cf37ec4e31440_ppc64le"
},
"product_reference": "rhacm2/submariner-route-agent-rhel8@sha256:0f13ca7bb60b17115395a51421916f0136a6d1296da563ba609cf37ec4e31440_ppc64le",
"relates_to_product_reference": "8Base-RHACM-2.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhacm2/submariner-route-agent-rhel8@sha256:497545ae0c5ae10463c5ef4a56c0e3733efbff2da65754dce4bbb977cb80d55a_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8",
"product_id": "8Base-RHACM-2.5:rhacm2/submariner-route-agent-rhel8@sha256:497545ae0c5ae10463c5ef4a56c0e3733efbff2da65754dce4bbb977cb80d55a_s390x"
},
"product_reference": "rhacm2/submariner-route-agent-rhel8@sha256:497545ae0c5ae10463c5ef4a56c0e3733efbff2da65754dce4bbb977cb80d55a_s390x",
"relates_to_product_reference": "8Base-RHACM-2.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhacm2/submariner-route-agent-rhel8@sha256:6bff7c4285999b218937924fc75e6303525089064f21d23234a01f453529fbf6_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8",
"product_id": "8Base-RHACM-2.5:rhacm2/submariner-route-agent-rhel8@sha256:6bff7c4285999b218937924fc75e6303525089064f21d23234a01f453529fbf6_amd64"
},
"product_reference": "rhacm2/submariner-route-agent-rhel8@sha256:6bff7c4285999b218937924fc75e6303525089064f21d23234a01f453529fbf6_amd64",
"relates_to_product_reference": "8Base-RHACM-2.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhacm2/submariner-route-agent-rhel8@sha256:d0140f18ad07368201a6e34af970ac9ee402f8ac292e71c42244af85eb37db08_arm64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8",
"product_id": "8Base-RHACM-2.5:rhacm2/submariner-route-agent-rhel8@sha256:d0140f18ad07368201a6e34af970ac9ee402f8ac292e71c42244af85eb37db08_arm64"
},
"product_reference": "rhacm2/submariner-route-agent-rhel8@sha256:d0140f18ad07368201a6e34af970ac9ee402f8ac292e71c42244af85eb37db08_arm64",
"relates_to_product_reference": "8Base-RHACM-2.5"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2022-32149",
"cwe": {
"id": "CWE-407",
"name": "Inefficient Algorithmic Complexity"
},
"discovery_date": "2022-10-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2134010"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in the golang.org/x/text/language package. An attacker can craft an Accept-Language header which ParseAcceptLanguage will take significant time to parse. This issue leads to a denial of service, and can impact availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: golang.org/x/text/language: ParseAcceptLanguage takes a long time to parse complex tags",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "After careful analysis of the vulnerability Redhat is choosing to keep the vulnerability severity as moderate,the vulnerability exists in the ParseAcceptLanguage function of the golang text/language package,when an attacker could craft an unusually large accept header and due to the parser taking quadratic time complexity to finish, firstly the attacker would have to find a way smuggle an input to the parser and even then this would simply not result in a crash of any kind but more of resource hang which while can be unpleasant,does not equate to any real world damage.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-RHACM-2.5:rhacm2/lighthouse-agent-rhel8@sha256:33ac96a6dd01e698c6d037acd701ee0fc5a09bb1cdd8f761c229e6a2be9ea799_amd64",
"8Base-RHACM-2.5:rhacm2/lighthouse-agent-rhel8@sha256:6b579e761576bd97f05c1f5ba42df74db5d22d0203e9d0253efc324cb0bf6378_ppc64le",
"8Base-RHACM-2.5:rhacm2/lighthouse-agent-rhel8@sha256:998706bb956a4fdd15526b5bb6a0458d59ea5cc537e2784b6dec1bb24b6aebbd_s390x",
"8Base-RHACM-2.5:rhacm2/lighthouse-agent-rhel8@sha256:b76b9fc2f08fdedd74511526b3f049a37e8beab3dddd9c3463ea20064aadf194_arm64",
"8Base-RHACM-2.5:rhacm2/lighthouse-coredns-rhel8@sha256:4af85e8acaa3b787828a3352bbfff427c6668936c428169e5fcbd345e802fcc3_arm64",
"8Base-RHACM-2.5:rhacm2/lighthouse-coredns-rhel8@sha256:77e474f4e0be091c3772ec0c16f2a67168dfea599a1f4220deb2fcb795d2d9c7_ppc64le",
"8Base-RHACM-2.5:rhacm2/lighthouse-coredns-rhel8@sha256:dbc246166dd35202221ac3f885a0e46160a6d277a058b6d2f1c7ee571c673b50_s390x",
"8Base-RHACM-2.5:rhacm2/lighthouse-coredns-rhel8@sha256:f27e7895a859ee2ab5f36134522349c1c04f3b18284787e0d14c3380126bf402_amd64",
"8Base-RHACM-2.5:rhacm2/subctl-rhel8@sha256:47cd1ee9aff93dad2e554805836e3393a0d5fc408ffc41a3ffef4676e10ce1f9_ppc64le",
"8Base-RHACM-2.5:rhacm2/subctl-rhel8@sha256:9ab13f289008d38a7cfa2182e4a5fb3a29b0b8efa2da40916018f2449ca730c7_s390x",
"8Base-RHACM-2.5:rhacm2/subctl-rhel8@sha256:dae78580dc26a6beaaeef47575e0cc13c487d5cef1d72c415ddc19368ef3b4a5_arm64",
"8Base-RHACM-2.5:rhacm2/subctl-rhel8@sha256:e6f5f07b97d4998c122cadeee693dce4d72f3bbe2c1f9703b15621b6531cf3a4_amd64",
"8Base-RHACM-2.5:rhacm2/submariner-gateway-rhel8@sha256:2bdd80c985f13cc90a223979c7b26bd5a273504ce973ea2c24b599e1c5f1b3fc_arm64",
"8Base-RHACM-2.5:rhacm2/submariner-gateway-rhel8@sha256:522bddc7d016659157c51f7425098eb92f2b0857f921f5ef01e188af3c9056c6_ppc64le",
"8Base-RHACM-2.5:rhacm2/submariner-gateway-rhel8@sha256:7b343f4f8ea08b2e2a670ee938a2286a92d701e5e92f4f43ee58e620e2ee070b_amd64",
"8Base-RHACM-2.5:rhacm2/submariner-gateway-rhel8@sha256:825db9cddd68a762e934bc855e5836e4f16a566f59d1310f45a06dac85ab8035_s390x",
"8Base-RHACM-2.5:rhacm2/submariner-globalnet-rhel8@sha256:3b04b0be64ea639e82496102236899cc62a2521c8e8bebd07c852118e76bce88_amd64",
"8Base-RHACM-2.5:rhacm2/submariner-globalnet-rhel8@sha256:c9050e94421701df533d7bc7fb2736de3b923a1b9689f7db9285e902d1d9c173_ppc64le",
"8Base-RHACM-2.5:rhacm2/submariner-globalnet-rhel8@sha256:d7fdc22644e6dbf19f21130c0f635e0a6c6e11fb9cbf9d9cbd9635d17fe25fbf_arm64",
"8Base-RHACM-2.5:rhacm2/submariner-globalnet-rhel8@sha256:d855b05d15a54a88e2c026e0d1935b189dc7ceddb3a7b5b0672e8e4c715f3845_s390x",
"8Base-RHACM-2.5:rhacm2/submariner-networkplugin-syncer-rhel8@sha256:0b72b8b294483dcf92d8acaaa56e8ac1141db3c6811ab64298117fafde99936a_arm64",
"8Base-RHACM-2.5:rhacm2/submariner-networkplugin-syncer-rhel8@sha256:39ca01ef63bc7d2663186a516456c90657b918a2ec044af7aadb1315a607f429_s390x",
"8Base-RHACM-2.5:rhacm2/submariner-networkplugin-syncer-rhel8@sha256:5a86959a38334532e5a33ab76b0553a9eae4cfad8897d5f92457a11cb6a5374b_ppc64le",
"8Base-RHACM-2.5:rhacm2/submariner-networkplugin-syncer-rhel8@sha256:91bc8d57c88c771bda7a6703ced10e32e9999116fe8cb7e4adddb6198591eeac_amd64",
"8Base-RHACM-2.5:rhacm2/submariner-operator-bundle@sha256:40b62e497e8280cb4db3803ad140e9aa15f038e15b3e1218d0c506646f576aec_ppc64le",
"8Base-RHACM-2.5:rhacm2/submariner-operator-bundle@sha256:71c8912419b9a6ac3ddd911c0a2fd097170743efab7dcb1c14141e5e1defc738_arm64",
"8Base-RHACM-2.5:rhacm2/submariner-operator-bundle@sha256:f86cb9bb9dc189057de11e2a5c3c1c10597c78e82432a34cf2864c6a32f8e6fa_s390x",
"8Base-RHACM-2.5:rhacm2/submariner-operator-bundle@sha256:fa2fd74dc3918d962ee6ea162e765f45b75a9588017145cd8322469456bc7164_amd64",
"8Base-RHACM-2.5:rhacm2/submariner-rhel8-operator@sha256:2aad67f470d3a58382029b4db1459916036a8f41aed167d567eb1abef45cda3f_ppc64le",
"8Base-RHACM-2.5:rhacm2/submariner-rhel8-operator@sha256:971eeffff35343edb6da2be6d2d3620d13536cbbaddacbbd13f285a70490df3a_s390x",
"8Base-RHACM-2.5:rhacm2/submariner-rhel8-operator@sha256:98811cc217f48bc7a6fbe7d4ccf7b1b7b239e19e24b7fcfeacbec8b297880f89_amd64",
"8Base-RHACM-2.5:rhacm2/submariner-rhel8-operator@sha256:dc2a4dace498a5c6238c555411362c2e6166011582a572d3cab431c745143301_arm64",
"8Base-RHACM-2.5:rhacm2/submariner-route-agent-rhel8@sha256:0f13ca7bb60b17115395a51421916f0136a6d1296da563ba609cf37ec4e31440_ppc64le",
"8Base-RHACM-2.5:rhacm2/submariner-route-agent-rhel8@sha256:497545ae0c5ae10463c5ef4a56c0e3733efbff2da65754dce4bbb977cb80d55a_s390x",
"8Base-RHACM-2.5:rhacm2/submariner-route-agent-rhel8@sha256:6bff7c4285999b218937924fc75e6303525089064f21d23234a01f453529fbf6_amd64",
"8Base-RHACM-2.5:rhacm2/submariner-route-agent-rhel8@sha256:d0140f18ad07368201a6e34af970ac9ee402f8ac292e71c42244af85eb37db08_arm64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-32149"
},
{
"category": "external",
"summary": "RHBZ#2134010",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2134010"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-32149",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32149"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-32149",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-32149"
},
{
"category": "external",
"summary": "https://go.dev/issue/56152",
"url": "https://go.dev/issue/56152"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-dev/c/qfPIly0X7aU",
"url": "https://groups.google.com/g/golang-dev/c/qfPIly0X7aU"
}
],
"release_date": "2022-10-11T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-01-26T21:22:22+00:00",
"details": "For details on how to install Submariner, refer to:\n\nhttps://access.redhat.com/documentation/en-us/red_hat_advanced_cluster_management_for_kubernetes/2.5/html/add-ons/add-ons-overview#submariner-deploy-console \n\nand\n\nhttps://submariner.io/getting-started/",
"product_ids": [
"8Base-RHACM-2.5:rhacm2/lighthouse-agent-rhel8@sha256:33ac96a6dd01e698c6d037acd701ee0fc5a09bb1cdd8f761c229e6a2be9ea799_amd64",
"8Base-RHACM-2.5:rhacm2/lighthouse-agent-rhel8@sha256:6b579e761576bd97f05c1f5ba42df74db5d22d0203e9d0253efc324cb0bf6378_ppc64le",
"8Base-RHACM-2.5:rhacm2/lighthouse-agent-rhel8@sha256:998706bb956a4fdd15526b5bb6a0458d59ea5cc537e2784b6dec1bb24b6aebbd_s390x",
"8Base-RHACM-2.5:rhacm2/lighthouse-agent-rhel8@sha256:b76b9fc2f08fdedd74511526b3f049a37e8beab3dddd9c3463ea20064aadf194_arm64",
"8Base-RHACM-2.5:rhacm2/lighthouse-coredns-rhel8@sha256:4af85e8acaa3b787828a3352bbfff427c6668936c428169e5fcbd345e802fcc3_arm64",
"8Base-RHACM-2.5:rhacm2/lighthouse-coredns-rhel8@sha256:77e474f4e0be091c3772ec0c16f2a67168dfea599a1f4220deb2fcb795d2d9c7_ppc64le",
"8Base-RHACM-2.5:rhacm2/lighthouse-coredns-rhel8@sha256:dbc246166dd35202221ac3f885a0e46160a6d277a058b6d2f1c7ee571c673b50_s390x",
"8Base-RHACM-2.5:rhacm2/lighthouse-coredns-rhel8@sha256:f27e7895a859ee2ab5f36134522349c1c04f3b18284787e0d14c3380126bf402_amd64",
"8Base-RHACM-2.5:rhacm2/subctl-rhel8@sha256:47cd1ee9aff93dad2e554805836e3393a0d5fc408ffc41a3ffef4676e10ce1f9_ppc64le",
"8Base-RHACM-2.5:rhacm2/subctl-rhel8@sha256:9ab13f289008d38a7cfa2182e4a5fb3a29b0b8efa2da40916018f2449ca730c7_s390x",
"8Base-RHACM-2.5:rhacm2/subctl-rhel8@sha256:dae78580dc26a6beaaeef47575e0cc13c487d5cef1d72c415ddc19368ef3b4a5_arm64",
"8Base-RHACM-2.5:rhacm2/subctl-rhel8@sha256:e6f5f07b97d4998c122cadeee693dce4d72f3bbe2c1f9703b15621b6531cf3a4_amd64",
"8Base-RHACM-2.5:rhacm2/submariner-gateway-rhel8@sha256:2bdd80c985f13cc90a223979c7b26bd5a273504ce973ea2c24b599e1c5f1b3fc_arm64",
"8Base-RHACM-2.5:rhacm2/submariner-gateway-rhel8@sha256:522bddc7d016659157c51f7425098eb92f2b0857f921f5ef01e188af3c9056c6_ppc64le",
"8Base-RHACM-2.5:rhacm2/submariner-gateway-rhel8@sha256:7b343f4f8ea08b2e2a670ee938a2286a92d701e5e92f4f43ee58e620e2ee070b_amd64",
"8Base-RHACM-2.5:rhacm2/submariner-gateway-rhel8@sha256:825db9cddd68a762e934bc855e5836e4f16a566f59d1310f45a06dac85ab8035_s390x",
"8Base-RHACM-2.5:rhacm2/submariner-globalnet-rhel8@sha256:3b04b0be64ea639e82496102236899cc62a2521c8e8bebd07c852118e76bce88_amd64",
"8Base-RHACM-2.5:rhacm2/submariner-globalnet-rhel8@sha256:c9050e94421701df533d7bc7fb2736de3b923a1b9689f7db9285e902d1d9c173_ppc64le",
"8Base-RHACM-2.5:rhacm2/submariner-globalnet-rhel8@sha256:d7fdc22644e6dbf19f21130c0f635e0a6c6e11fb9cbf9d9cbd9635d17fe25fbf_arm64",
"8Base-RHACM-2.5:rhacm2/submariner-globalnet-rhel8@sha256:d855b05d15a54a88e2c026e0d1935b189dc7ceddb3a7b5b0672e8e4c715f3845_s390x",
"8Base-RHACM-2.5:rhacm2/submariner-networkplugin-syncer-rhel8@sha256:0b72b8b294483dcf92d8acaaa56e8ac1141db3c6811ab64298117fafde99936a_arm64",
"8Base-RHACM-2.5:rhacm2/submariner-networkplugin-syncer-rhel8@sha256:39ca01ef63bc7d2663186a516456c90657b918a2ec044af7aadb1315a607f429_s390x",
"8Base-RHACM-2.5:rhacm2/submariner-networkplugin-syncer-rhel8@sha256:5a86959a38334532e5a33ab76b0553a9eae4cfad8897d5f92457a11cb6a5374b_ppc64le",
"8Base-RHACM-2.5:rhacm2/submariner-networkplugin-syncer-rhel8@sha256:91bc8d57c88c771bda7a6703ced10e32e9999116fe8cb7e4adddb6198591eeac_amd64",
"8Base-RHACM-2.5:rhacm2/submariner-operator-bundle@sha256:40b62e497e8280cb4db3803ad140e9aa15f038e15b3e1218d0c506646f576aec_ppc64le",
"8Base-RHACM-2.5:rhacm2/submariner-operator-bundle@sha256:71c8912419b9a6ac3ddd911c0a2fd097170743efab7dcb1c14141e5e1defc738_arm64",
"8Base-RHACM-2.5:rhacm2/submariner-operator-bundle@sha256:f86cb9bb9dc189057de11e2a5c3c1c10597c78e82432a34cf2864c6a32f8e6fa_s390x",
"8Base-RHACM-2.5:rhacm2/submariner-operator-bundle@sha256:fa2fd74dc3918d962ee6ea162e765f45b75a9588017145cd8322469456bc7164_amd64",
"8Base-RHACM-2.5:rhacm2/submariner-rhel8-operator@sha256:2aad67f470d3a58382029b4db1459916036a8f41aed167d567eb1abef45cda3f_ppc64le",
"8Base-RHACM-2.5:rhacm2/submariner-rhel8-operator@sha256:971eeffff35343edb6da2be6d2d3620d13536cbbaddacbbd13f285a70490df3a_s390x",
"8Base-RHACM-2.5:rhacm2/submariner-rhel8-operator@sha256:98811cc217f48bc7a6fbe7d4ccf7b1b7b239e19e24b7fcfeacbec8b297880f89_amd64",
"8Base-RHACM-2.5:rhacm2/submariner-rhel8-operator@sha256:dc2a4dace498a5c6238c555411362c2e6166011582a572d3cab431c745143301_arm64",
"8Base-RHACM-2.5:rhacm2/submariner-route-agent-rhel8@sha256:0f13ca7bb60b17115395a51421916f0136a6d1296da563ba609cf37ec4e31440_ppc64le",
"8Base-RHACM-2.5:rhacm2/submariner-route-agent-rhel8@sha256:497545ae0c5ae10463c5ef4a56c0e3733efbff2da65754dce4bbb977cb80d55a_s390x",
"8Base-RHACM-2.5:rhacm2/submariner-route-agent-rhel8@sha256:6bff7c4285999b218937924fc75e6303525089064f21d23234a01f453529fbf6_amd64",
"8Base-RHACM-2.5:rhacm2/submariner-route-agent-rhel8@sha256:d0140f18ad07368201a6e34af970ac9ee402f8ac292e71c42244af85eb37db08_arm64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:0481"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"8Base-RHACM-2.5:rhacm2/lighthouse-agent-rhel8@sha256:33ac96a6dd01e698c6d037acd701ee0fc5a09bb1cdd8f761c229e6a2be9ea799_amd64",
"8Base-RHACM-2.5:rhacm2/lighthouse-agent-rhel8@sha256:6b579e761576bd97f05c1f5ba42df74db5d22d0203e9d0253efc324cb0bf6378_ppc64le",
"8Base-RHACM-2.5:rhacm2/lighthouse-agent-rhel8@sha256:998706bb956a4fdd15526b5bb6a0458d59ea5cc537e2784b6dec1bb24b6aebbd_s390x",
"8Base-RHACM-2.5:rhacm2/lighthouse-agent-rhel8@sha256:b76b9fc2f08fdedd74511526b3f049a37e8beab3dddd9c3463ea20064aadf194_arm64",
"8Base-RHACM-2.5:rhacm2/lighthouse-coredns-rhel8@sha256:4af85e8acaa3b787828a3352bbfff427c6668936c428169e5fcbd345e802fcc3_arm64",
"8Base-RHACM-2.5:rhacm2/lighthouse-coredns-rhel8@sha256:77e474f4e0be091c3772ec0c16f2a67168dfea599a1f4220deb2fcb795d2d9c7_ppc64le",
"8Base-RHACM-2.5:rhacm2/lighthouse-coredns-rhel8@sha256:dbc246166dd35202221ac3f885a0e46160a6d277a058b6d2f1c7ee571c673b50_s390x",
"8Base-RHACM-2.5:rhacm2/lighthouse-coredns-rhel8@sha256:f27e7895a859ee2ab5f36134522349c1c04f3b18284787e0d14c3380126bf402_amd64",
"8Base-RHACM-2.5:rhacm2/subctl-rhel8@sha256:47cd1ee9aff93dad2e554805836e3393a0d5fc408ffc41a3ffef4676e10ce1f9_ppc64le",
"8Base-RHACM-2.5:rhacm2/subctl-rhel8@sha256:9ab13f289008d38a7cfa2182e4a5fb3a29b0b8efa2da40916018f2449ca730c7_s390x",
"8Base-RHACM-2.5:rhacm2/subctl-rhel8@sha256:dae78580dc26a6beaaeef47575e0cc13c487d5cef1d72c415ddc19368ef3b4a5_arm64",
"8Base-RHACM-2.5:rhacm2/subctl-rhel8@sha256:e6f5f07b97d4998c122cadeee693dce4d72f3bbe2c1f9703b15621b6531cf3a4_amd64",
"8Base-RHACM-2.5:rhacm2/submariner-gateway-rhel8@sha256:2bdd80c985f13cc90a223979c7b26bd5a273504ce973ea2c24b599e1c5f1b3fc_arm64",
"8Base-RHACM-2.5:rhacm2/submariner-gateway-rhel8@sha256:522bddc7d016659157c51f7425098eb92f2b0857f921f5ef01e188af3c9056c6_ppc64le",
"8Base-RHACM-2.5:rhacm2/submariner-gateway-rhel8@sha256:7b343f4f8ea08b2e2a670ee938a2286a92d701e5e92f4f43ee58e620e2ee070b_amd64",
"8Base-RHACM-2.5:rhacm2/submariner-gateway-rhel8@sha256:825db9cddd68a762e934bc855e5836e4f16a566f59d1310f45a06dac85ab8035_s390x",
"8Base-RHACM-2.5:rhacm2/submariner-globalnet-rhel8@sha256:3b04b0be64ea639e82496102236899cc62a2521c8e8bebd07c852118e76bce88_amd64",
"8Base-RHACM-2.5:rhacm2/submariner-globalnet-rhel8@sha256:c9050e94421701df533d7bc7fb2736de3b923a1b9689f7db9285e902d1d9c173_ppc64le",
"8Base-RHACM-2.5:rhacm2/submariner-globalnet-rhel8@sha256:d7fdc22644e6dbf19f21130c0f635e0a6c6e11fb9cbf9d9cbd9635d17fe25fbf_arm64",
"8Base-RHACM-2.5:rhacm2/submariner-globalnet-rhel8@sha256:d855b05d15a54a88e2c026e0d1935b189dc7ceddb3a7b5b0672e8e4c715f3845_s390x",
"8Base-RHACM-2.5:rhacm2/submariner-networkplugin-syncer-rhel8@sha256:0b72b8b294483dcf92d8acaaa56e8ac1141db3c6811ab64298117fafde99936a_arm64",
"8Base-RHACM-2.5:rhacm2/submariner-networkplugin-syncer-rhel8@sha256:39ca01ef63bc7d2663186a516456c90657b918a2ec044af7aadb1315a607f429_s390x",
"8Base-RHACM-2.5:rhacm2/submariner-networkplugin-syncer-rhel8@sha256:5a86959a38334532e5a33ab76b0553a9eae4cfad8897d5f92457a11cb6a5374b_ppc64le",
"8Base-RHACM-2.5:rhacm2/submariner-networkplugin-syncer-rhel8@sha256:91bc8d57c88c771bda7a6703ced10e32e9999116fe8cb7e4adddb6198591eeac_amd64",
"8Base-RHACM-2.5:rhacm2/submariner-operator-bundle@sha256:40b62e497e8280cb4db3803ad140e9aa15f038e15b3e1218d0c506646f576aec_ppc64le",
"8Base-RHACM-2.5:rhacm2/submariner-operator-bundle@sha256:71c8912419b9a6ac3ddd911c0a2fd097170743efab7dcb1c14141e5e1defc738_arm64",
"8Base-RHACM-2.5:rhacm2/submariner-operator-bundle@sha256:f86cb9bb9dc189057de11e2a5c3c1c10597c78e82432a34cf2864c6a32f8e6fa_s390x",
"8Base-RHACM-2.5:rhacm2/submariner-operator-bundle@sha256:fa2fd74dc3918d962ee6ea162e765f45b75a9588017145cd8322469456bc7164_amd64",
"8Base-RHACM-2.5:rhacm2/submariner-rhel8-operator@sha256:2aad67f470d3a58382029b4db1459916036a8f41aed167d567eb1abef45cda3f_ppc64le",
"8Base-RHACM-2.5:rhacm2/submariner-rhel8-operator@sha256:971eeffff35343edb6da2be6d2d3620d13536cbbaddacbbd13f285a70490df3a_s390x",
"8Base-RHACM-2.5:rhacm2/submariner-rhel8-operator@sha256:98811cc217f48bc7a6fbe7d4ccf7b1b7b239e19e24b7fcfeacbec8b297880f89_amd64",
"8Base-RHACM-2.5:rhacm2/submariner-rhel8-operator@sha256:dc2a4dace498a5c6238c555411362c2e6166011582a572d3cab431c745143301_arm64",
"8Base-RHACM-2.5:rhacm2/submariner-route-agent-rhel8@sha256:0f13ca7bb60b17115395a51421916f0136a6d1296da563ba609cf37ec4e31440_ppc64le",
"8Base-RHACM-2.5:rhacm2/submariner-route-agent-rhel8@sha256:497545ae0c5ae10463c5ef4a56c0e3733efbff2da65754dce4bbb977cb80d55a_s390x",
"8Base-RHACM-2.5:rhacm2/submariner-route-agent-rhel8@sha256:6bff7c4285999b218937924fc75e6303525089064f21d23234a01f453529fbf6_amd64",
"8Base-RHACM-2.5:rhacm2/submariner-route-agent-rhel8@sha256:d0140f18ad07368201a6e34af970ac9ee402f8ac292e71c42244af85eb37db08_arm64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "golang: golang.org/x/text/language: ParseAcceptLanguage takes a long time to parse complex tags"
}
]
}
rhsa-2023:0692
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "OpenShift API for Data Protection (OADP) 1.0.7 is now available.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "OpenShift API for Data Protection (OADP) enables you to back up and restore application resources, persistent volume data, and internal container images to external backup storage. OADP enables both file system-based and snapshot-based backups for persistent volumes.\n\nSecurity Fix(es) from Bugzilla:\n\n* golang: golang.org/x/text/language: ParseAcceptLanguage takes a long time to parse complex tags (CVE-2022-32149)\n\n* golang: net/http: An attacker can cause excessive memory growth in a Go server accepting HTTP/2 requests (CVE-2022-41717)\n\nFor more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2023:0692",
"url": "https://access.redhat.com/errata/RHSA-2023:0692"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#moderate",
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "2134010",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2134010"
},
{
"category": "external",
"summary": "2161274",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2161274"
},
{
"category": "external",
"summary": "MIG-1050",
"url": "https://issues.redhat.com/browse/MIG-1050"
},
{
"category": "external",
"summary": "OADP-1180",
"url": "https://issues.redhat.com/browse/OADP-1180"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2023/rhsa-2023_0692.json"
}
],
"title": "Red Hat Security Advisory: OpenShift API for Data Protection (OADP) 1.0.7 security and bug fix update",
"tracking": {
"current_release_date": "2025-10-24T13:31:42+00:00",
"generator": {
"date": "2025-10-24T13:31:42+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.10"
}
},
"id": "RHSA-2023:0692",
"initial_release_date": "2023-02-09T01:07:26+00:00",
"revision_history": [
{
"date": "2023-02-09T01:07:26+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2023-02-09T01:07:26+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-10-24T13:31:42+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "8Base-OADP-1.0",
"product": {
"name": "8Base-OADP-1.0",
"product_id": "8Base-OADP-1.0",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:openshift_api_data_protection:1.0::el8"
}
}
}
],
"category": "product_family",
"name": "OpenShift API for Data Protection"
},
{
"branches": [
{
"category": "product_version",
"name": "oadp/oadp-kubevirt-velero-plugin-rhel8@sha256:3749d7386635cf598147d5021584672ab26761b9dca52ca05b179d47557ac549_amd64",
"product": {
"name": "oadp/oadp-kubevirt-velero-plugin-rhel8@sha256:3749d7386635cf598147d5021584672ab26761b9dca52ca05b179d47557ac549_amd64",
"product_id": "oadp/oadp-kubevirt-velero-plugin-rhel8@sha256:3749d7386635cf598147d5021584672ab26761b9dca52ca05b179d47557ac549_amd64",
"product_identification_helper": {
"purl": "pkg:oci/oadp-kubevirt-velero-plugin-rhel8@sha256:3749d7386635cf598147d5021584672ab26761b9dca52ca05b179d47557ac549?arch=amd64\u0026repository_url=registry.redhat.io/oadp/oadp-kubevirt-velero-plugin-rhel8\u0026tag=1.0.7-4"
}
}
},
{
"category": "product_version",
"name": "oadp/oadp-mustgather-rhel8@sha256:f269ee31bf0eb544ccabb2d72d807dc5d6587186d76bb020a00fac20221c7b0f_amd64",
"product": {
"name": "oadp/oadp-mustgather-rhel8@sha256:f269ee31bf0eb544ccabb2d72d807dc5d6587186d76bb020a00fac20221c7b0f_amd64",
"product_id": "oadp/oadp-mustgather-rhel8@sha256:f269ee31bf0eb544ccabb2d72d807dc5d6587186d76bb020a00fac20221c7b0f_amd64",
"product_identification_helper": {
"purl": "pkg:oci/oadp-mustgather-rhel8@sha256:f269ee31bf0eb544ccabb2d72d807dc5d6587186d76bb020a00fac20221c7b0f?arch=amd64\u0026repository_url=registry.redhat.io/oadp/oadp-mustgather-rhel8\u0026tag=1.0.7-4"
}
}
},
{
"category": "product_version",
"name": "oadp/oadp-operator-bundle@sha256:d0927b9f279ad60a073773ec624dc66db000b3d0b727254fbadb6af3a3c7b646_amd64",
"product": {
"name": "oadp/oadp-operator-bundle@sha256:d0927b9f279ad60a073773ec624dc66db000b3d0b727254fbadb6af3a3c7b646_amd64",
"product_id": "oadp/oadp-operator-bundle@sha256:d0927b9f279ad60a073773ec624dc66db000b3d0b727254fbadb6af3a3c7b646_amd64",
"product_identification_helper": {
"purl": "pkg:oci/oadp-operator-bundle@sha256:d0927b9f279ad60a073773ec624dc66db000b3d0b727254fbadb6af3a3c7b646?arch=amd64\u0026repository_url=registry.redhat.io/oadp/oadp-operator-bundle\u0026tag=1.0.7-8"
}
}
},
{
"category": "product_version",
"name": "oadp/oadp-rhel8-operator@sha256:4d983585501df88bd5f602010cb72ea460982b25fa91c05a83f0b711a457661a_amd64",
"product": {
"name": "oadp/oadp-rhel8-operator@sha256:4d983585501df88bd5f602010cb72ea460982b25fa91c05a83f0b711a457661a_amd64",
"product_id": "oadp/oadp-rhel8-operator@sha256:4d983585501df88bd5f602010cb72ea460982b25fa91c05a83f0b711a457661a_amd64",
"product_identification_helper": {
"purl": "pkg:oci/oadp-rhel8-operator@sha256:4d983585501df88bd5f602010cb72ea460982b25fa91c05a83f0b711a457661a?arch=amd64\u0026repository_url=registry.redhat.io/oadp/oadp-rhel8-operator\u0026tag=1.0.7-2"
}
}
},
{
"category": "product_version",
"name": "oadp/oadp-registry-rhel8@sha256:ea215cbf22a37c2f2b77c9901dc5c7493f1f3a694276f42d11fcefbf045a8b38_amd64",
"product": {
"name": "oadp/oadp-registry-rhel8@sha256:ea215cbf22a37c2f2b77c9901dc5c7493f1f3a694276f42d11fcefbf045a8b38_amd64",
"product_id": "oadp/oadp-registry-rhel8@sha256:ea215cbf22a37c2f2b77c9901dc5c7493f1f3a694276f42d11fcefbf045a8b38_amd64",
"product_identification_helper": {
"purl": "pkg:oci/oadp-registry-rhel8@sha256:ea215cbf22a37c2f2b77c9901dc5c7493f1f3a694276f42d11fcefbf045a8b38?arch=amd64\u0026repository_url=registry.redhat.io/oadp/oadp-registry-rhel8\u0026tag=1.0.7-3"
}
}
},
{
"category": "product_version",
"name": "oadp/oadp-velero-rhel8@sha256:a5973be01956a09f75bcd65481d484c12fd7bcefad5b852fd0567f6d8b51f0be_amd64",
"product": {
"name": "oadp/oadp-velero-rhel8@sha256:a5973be01956a09f75bcd65481d484c12fd7bcefad5b852fd0567f6d8b51f0be_amd64",
"product_id": "oadp/oadp-velero-rhel8@sha256:a5973be01956a09f75bcd65481d484c12fd7bcefad5b852fd0567f6d8b51f0be_amd64",
"product_identification_helper": {
"purl": "pkg:oci/oadp-velero-rhel8@sha256:a5973be01956a09f75bcd65481d484c12fd7bcefad5b852fd0567f6d8b51f0be?arch=amd64\u0026repository_url=registry.redhat.io/oadp/oadp-velero-rhel8\u0026tag=1.0.7-5"
}
}
},
{
"category": "product_version",
"name": "oadp/oadp-velero-plugin-rhel8@sha256:d9a46e3da52db4880cde8faa6f5e406039e6f38585dd14dc97db4b5846b4f7e5_amd64",
"product": {
"name": "oadp/oadp-velero-plugin-rhel8@sha256:d9a46e3da52db4880cde8faa6f5e406039e6f38585dd14dc97db4b5846b4f7e5_amd64",
"product_id": "oadp/oadp-velero-plugin-rhel8@sha256:d9a46e3da52db4880cde8faa6f5e406039e6f38585dd14dc97db4b5846b4f7e5_amd64",
"product_identification_helper": {
"purl": "pkg:oci/oadp-velero-plugin-rhel8@sha256:d9a46e3da52db4880cde8faa6f5e406039e6f38585dd14dc97db4b5846b4f7e5?arch=amd64\u0026repository_url=registry.redhat.io/oadp/oadp-velero-plugin-rhel8\u0026tag=1.0.7-2"
}
}
},
{
"category": "product_version",
"name": "oadp/oadp-velero-plugin-for-aws-rhel8@sha256:1792552893fe7f146f04033f342e9095f0068dd60e1f3a1e2dad9c5111dd28e6_amd64",
"product": {
"name": "oadp/oadp-velero-plugin-for-aws-rhel8@sha256:1792552893fe7f146f04033f342e9095f0068dd60e1f3a1e2dad9c5111dd28e6_amd64",
"product_id": "oadp/oadp-velero-plugin-for-aws-rhel8@sha256:1792552893fe7f146f04033f342e9095f0068dd60e1f3a1e2dad9c5111dd28e6_amd64",
"product_identification_helper": {
"purl": "pkg:oci/oadp-velero-plugin-for-aws-rhel8@sha256:1792552893fe7f146f04033f342e9095f0068dd60e1f3a1e2dad9c5111dd28e6?arch=amd64\u0026repository_url=registry.redhat.io/oadp/oadp-velero-plugin-for-aws-rhel8\u0026tag=1.0.7-2"
}
}
},
{
"category": "product_version",
"name": "oadp/oadp-velero-plugin-for-csi-rhel8@sha256:aed05c3b1e7eee9054ee45b499e2eb31a534979468ba22be46f83459d0dab4ae_amd64",
"product": {
"name": "oadp/oadp-velero-plugin-for-csi-rhel8@sha256:aed05c3b1e7eee9054ee45b499e2eb31a534979468ba22be46f83459d0dab4ae_amd64",
"product_id": "oadp/oadp-velero-plugin-for-csi-rhel8@sha256:aed05c3b1e7eee9054ee45b499e2eb31a534979468ba22be46f83459d0dab4ae_amd64",
"product_identification_helper": {
"purl": "pkg:oci/oadp-velero-plugin-for-csi-rhel8@sha256:aed05c3b1e7eee9054ee45b499e2eb31a534979468ba22be46f83459d0dab4ae?arch=amd64\u0026repository_url=registry.redhat.io/oadp/oadp-velero-plugin-for-csi-rhel8\u0026tag=1.0.7-2"
}
}
},
{
"category": "product_version",
"name": "oadp/oadp-velero-plugin-for-gcp-rhel8@sha256:82ebe14f59b19d628ecbe63a212ecaf4623a98a432b8b4525b118c6b24c87d90_amd64",
"product": {
"name": "oadp/oadp-velero-plugin-for-gcp-rhel8@sha256:82ebe14f59b19d628ecbe63a212ecaf4623a98a432b8b4525b118c6b24c87d90_amd64",
"product_id": "oadp/oadp-velero-plugin-for-gcp-rhel8@sha256:82ebe14f59b19d628ecbe63a212ecaf4623a98a432b8b4525b118c6b24c87d90_amd64",
"product_identification_helper": {
"purl": "pkg:oci/oadp-velero-plugin-for-gcp-rhel8@sha256:82ebe14f59b19d628ecbe63a212ecaf4623a98a432b8b4525b118c6b24c87d90?arch=amd64\u0026repository_url=registry.redhat.io/oadp/oadp-velero-plugin-for-gcp-rhel8\u0026tag=1.0.7-2"
}
}
},
{
"category": "product_version",
"name": "oadp/oadp-velero-plugin-for-microsoft-azure-rhel8@sha256:1200ba024b3301c4ea18817c81e06133a52bcc7565302ebf9aa4677080b64e56_amd64",
"product": {
"name": "oadp/oadp-velero-plugin-for-microsoft-azure-rhel8@sha256:1200ba024b3301c4ea18817c81e06133a52bcc7565302ebf9aa4677080b64e56_amd64",
"product_id": "oadp/oadp-velero-plugin-for-microsoft-azure-rhel8@sha256:1200ba024b3301c4ea18817c81e06133a52bcc7565302ebf9aa4677080b64e56_amd64",
"product_identification_helper": {
"purl": "pkg:oci/oadp-velero-plugin-for-microsoft-azure-rhel8@sha256:1200ba024b3301c4ea18817c81e06133a52bcc7565302ebf9aa4677080b64e56?arch=amd64\u0026repository_url=registry.redhat.io/oadp/oadp-velero-plugin-for-microsoft-azure-rhel8\u0026tag=1.0.7-2"
}
}
},
{
"category": "product_version",
"name": "oadp/oadp-velero-restic-restore-helper-rhel8@sha256:9fda0732f74519e71a4f10f10b32a451f01c3bf9eae37f7bd1ff90ad8baf3a9f_amd64",
"product": {
"name": "oadp/oadp-velero-restic-restore-helper-rhel8@sha256:9fda0732f74519e71a4f10f10b32a451f01c3bf9eae37f7bd1ff90ad8baf3a9f_amd64",
"product_id": "oadp/oadp-velero-restic-restore-helper-rhel8@sha256:9fda0732f74519e71a4f10f10b32a451f01c3bf9eae37f7bd1ff90ad8baf3a9f_amd64",
"product_identification_helper": {
"purl": "pkg:oci/oadp-velero-restic-restore-helper-rhel8@sha256:9fda0732f74519e71a4f10f10b32a451f01c3bf9eae37f7bd1ff90ad8baf3a9f?arch=amd64\u0026repository_url=registry.redhat.io/oadp/oadp-velero-restic-restore-helper-rhel8\u0026tag=1.0.7-5"
}
}
}
],
"category": "architecture",
"name": "amd64"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "oadp/oadp-kubevirt-velero-plugin-rhel8@sha256:3749d7386635cf598147d5021584672ab26761b9dca52ca05b179d47557ac549_amd64 as a component of 8Base-OADP-1.0",
"product_id": "8Base-OADP-1.0:oadp/oadp-kubevirt-velero-plugin-rhel8@sha256:3749d7386635cf598147d5021584672ab26761b9dca52ca05b179d47557ac549_amd64"
},
"product_reference": "oadp/oadp-kubevirt-velero-plugin-rhel8@sha256:3749d7386635cf598147d5021584672ab26761b9dca52ca05b179d47557ac549_amd64",
"relates_to_product_reference": "8Base-OADP-1.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "oadp/oadp-mustgather-rhel8@sha256:f269ee31bf0eb544ccabb2d72d807dc5d6587186d76bb020a00fac20221c7b0f_amd64 as a component of 8Base-OADP-1.0",
"product_id": "8Base-OADP-1.0:oadp/oadp-mustgather-rhel8@sha256:f269ee31bf0eb544ccabb2d72d807dc5d6587186d76bb020a00fac20221c7b0f_amd64"
},
"product_reference": "oadp/oadp-mustgather-rhel8@sha256:f269ee31bf0eb544ccabb2d72d807dc5d6587186d76bb020a00fac20221c7b0f_amd64",
"relates_to_product_reference": "8Base-OADP-1.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "oadp/oadp-operator-bundle@sha256:d0927b9f279ad60a073773ec624dc66db000b3d0b727254fbadb6af3a3c7b646_amd64 as a component of 8Base-OADP-1.0",
"product_id": "8Base-OADP-1.0:oadp/oadp-operator-bundle@sha256:d0927b9f279ad60a073773ec624dc66db000b3d0b727254fbadb6af3a3c7b646_amd64"
},
"product_reference": "oadp/oadp-operator-bundle@sha256:d0927b9f279ad60a073773ec624dc66db000b3d0b727254fbadb6af3a3c7b646_amd64",
"relates_to_product_reference": "8Base-OADP-1.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "oadp/oadp-registry-rhel8@sha256:ea215cbf22a37c2f2b77c9901dc5c7493f1f3a694276f42d11fcefbf045a8b38_amd64 as a component of 8Base-OADP-1.0",
"product_id": "8Base-OADP-1.0:oadp/oadp-registry-rhel8@sha256:ea215cbf22a37c2f2b77c9901dc5c7493f1f3a694276f42d11fcefbf045a8b38_amd64"
},
"product_reference": "oadp/oadp-registry-rhel8@sha256:ea215cbf22a37c2f2b77c9901dc5c7493f1f3a694276f42d11fcefbf045a8b38_amd64",
"relates_to_product_reference": "8Base-OADP-1.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "oadp/oadp-rhel8-operator@sha256:4d983585501df88bd5f602010cb72ea460982b25fa91c05a83f0b711a457661a_amd64 as a component of 8Base-OADP-1.0",
"product_id": "8Base-OADP-1.0:oadp/oadp-rhel8-operator@sha256:4d983585501df88bd5f602010cb72ea460982b25fa91c05a83f0b711a457661a_amd64"
},
"product_reference": "oadp/oadp-rhel8-operator@sha256:4d983585501df88bd5f602010cb72ea460982b25fa91c05a83f0b711a457661a_amd64",
"relates_to_product_reference": "8Base-OADP-1.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "oadp/oadp-velero-plugin-for-aws-rhel8@sha256:1792552893fe7f146f04033f342e9095f0068dd60e1f3a1e2dad9c5111dd28e6_amd64 as a component of 8Base-OADP-1.0",
"product_id": "8Base-OADP-1.0:oadp/oadp-velero-plugin-for-aws-rhel8@sha256:1792552893fe7f146f04033f342e9095f0068dd60e1f3a1e2dad9c5111dd28e6_amd64"
},
"product_reference": "oadp/oadp-velero-plugin-for-aws-rhel8@sha256:1792552893fe7f146f04033f342e9095f0068dd60e1f3a1e2dad9c5111dd28e6_amd64",
"relates_to_product_reference": "8Base-OADP-1.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "oadp/oadp-velero-plugin-for-csi-rhel8@sha256:aed05c3b1e7eee9054ee45b499e2eb31a534979468ba22be46f83459d0dab4ae_amd64 as a component of 8Base-OADP-1.0",
"product_id": "8Base-OADP-1.0:oadp/oadp-velero-plugin-for-csi-rhel8@sha256:aed05c3b1e7eee9054ee45b499e2eb31a534979468ba22be46f83459d0dab4ae_amd64"
},
"product_reference": "oadp/oadp-velero-plugin-for-csi-rhel8@sha256:aed05c3b1e7eee9054ee45b499e2eb31a534979468ba22be46f83459d0dab4ae_amd64",
"relates_to_product_reference": "8Base-OADP-1.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "oadp/oadp-velero-plugin-for-gcp-rhel8@sha256:82ebe14f59b19d628ecbe63a212ecaf4623a98a432b8b4525b118c6b24c87d90_amd64 as a component of 8Base-OADP-1.0",
"product_id": "8Base-OADP-1.0:oadp/oadp-velero-plugin-for-gcp-rhel8@sha256:82ebe14f59b19d628ecbe63a212ecaf4623a98a432b8b4525b118c6b24c87d90_amd64"
},
"product_reference": "oadp/oadp-velero-plugin-for-gcp-rhel8@sha256:82ebe14f59b19d628ecbe63a212ecaf4623a98a432b8b4525b118c6b24c87d90_amd64",
"relates_to_product_reference": "8Base-OADP-1.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "oadp/oadp-velero-plugin-for-microsoft-azure-rhel8@sha256:1200ba024b3301c4ea18817c81e06133a52bcc7565302ebf9aa4677080b64e56_amd64 as a component of 8Base-OADP-1.0",
"product_id": "8Base-OADP-1.0:oadp/oadp-velero-plugin-for-microsoft-azure-rhel8@sha256:1200ba024b3301c4ea18817c81e06133a52bcc7565302ebf9aa4677080b64e56_amd64"
},
"product_reference": "oadp/oadp-velero-plugin-for-microsoft-azure-rhel8@sha256:1200ba024b3301c4ea18817c81e06133a52bcc7565302ebf9aa4677080b64e56_amd64",
"relates_to_product_reference": "8Base-OADP-1.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "oadp/oadp-velero-plugin-rhel8@sha256:d9a46e3da52db4880cde8faa6f5e406039e6f38585dd14dc97db4b5846b4f7e5_amd64 as a component of 8Base-OADP-1.0",
"product_id": "8Base-OADP-1.0:oadp/oadp-velero-plugin-rhel8@sha256:d9a46e3da52db4880cde8faa6f5e406039e6f38585dd14dc97db4b5846b4f7e5_amd64"
},
"product_reference": "oadp/oadp-velero-plugin-rhel8@sha256:d9a46e3da52db4880cde8faa6f5e406039e6f38585dd14dc97db4b5846b4f7e5_amd64",
"relates_to_product_reference": "8Base-OADP-1.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "oadp/oadp-velero-restic-restore-helper-rhel8@sha256:9fda0732f74519e71a4f10f10b32a451f01c3bf9eae37f7bd1ff90ad8baf3a9f_amd64 as a component of 8Base-OADP-1.0",
"product_id": "8Base-OADP-1.0:oadp/oadp-velero-restic-restore-helper-rhel8@sha256:9fda0732f74519e71a4f10f10b32a451f01c3bf9eae37f7bd1ff90ad8baf3a9f_amd64"
},
"product_reference": "oadp/oadp-velero-restic-restore-helper-rhel8@sha256:9fda0732f74519e71a4f10f10b32a451f01c3bf9eae37f7bd1ff90ad8baf3a9f_amd64",
"relates_to_product_reference": "8Base-OADP-1.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "oadp/oadp-velero-rhel8@sha256:a5973be01956a09f75bcd65481d484c12fd7bcefad5b852fd0567f6d8b51f0be_amd64 as a component of 8Base-OADP-1.0",
"product_id": "8Base-OADP-1.0:oadp/oadp-velero-rhel8@sha256:a5973be01956a09f75bcd65481d484c12fd7bcefad5b852fd0567f6d8b51f0be_amd64"
},
"product_reference": "oadp/oadp-velero-rhel8@sha256:a5973be01956a09f75bcd65481d484c12fd7bcefad5b852fd0567f6d8b51f0be_amd64",
"relates_to_product_reference": "8Base-OADP-1.0"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2022-32149",
"cwe": {
"id": "CWE-407",
"name": "Inefficient Algorithmic Complexity"
},
"discovery_date": "2022-10-12T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-OADP-1.0:oadp/oadp-kubevirt-velero-plugin-rhel8@sha256:3749d7386635cf598147d5021584672ab26761b9dca52ca05b179d47557ac549_amd64",
"8Base-OADP-1.0:oadp/oadp-mustgather-rhel8@sha256:f269ee31bf0eb544ccabb2d72d807dc5d6587186d76bb020a00fac20221c7b0f_amd64",
"8Base-OADP-1.0:oadp/oadp-operator-bundle@sha256:d0927b9f279ad60a073773ec624dc66db000b3d0b727254fbadb6af3a3c7b646_amd64",
"8Base-OADP-1.0:oadp/oadp-registry-rhel8@sha256:ea215cbf22a37c2f2b77c9901dc5c7493f1f3a694276f42d11fcefbf045a8b38_amd64",
"8Base-OADP-1.0:oadp/oadp-rhel8-operator@sha256:4d983585501df88bd5f602010cb72ea460982b25fa91c05a83f0b711a457661a_amd64",
"8Base-OADP-1.0:oadp/oadp-velero-plugin-for-aws-rhel8@sha256:1792552893fe7f146f04033f342e9095f0068dd60e1f3a1e2dad9c5111dd28e6_amd64",
"8Base-OADP-1.0:oadp/oadp-velero-plugin-for-csi-rhel8@sha256:aed05c3b1e7eee9054ee45b499e2eb31a534979468ba22be46f83459d0dab4ae_amd64",
"8Base-OADP-1.0:oadp/oadp-velero-plugin-for-gcp-rhel8@sha256:82ebe14f59b19d628ecbe63a212ecaf4623a98a432b8b4525b118c6b24c87d90_amd64",
"8Base-OADP-1.0:oadp/oadp-velero-plugin-for-microsoft-azure-rhel8@sha256:1200ba024b3301c4ea18817c81e06133a52bcc7565302ebf9aa4677080b64e56_amd64",
"8Base-OADP-1.0:oadp/oadp-velero-plugin-rhel8@sha256:d9a46e3da52db4880cde8faa6f5e406039e6f38585dd14dc97db4b5846b4f7e5_amd64",
"8Base-OADP-1.0:oadp/oadp-velero-restic-restore-helper-rhel8@sha256:9fda0732f74519e71a4f10f10b32a451f01c3bf9eae37f7bd1ff90ad8baf3a9f_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2134010"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in the golang.org/x/text/language package. An attacker can craft an Accept-Language header which ParseAcceptLanguage will take significant time to parse. This issue leads to a denial of service, and can impact availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: golang.org/x/text/language: ParseAcceptLanguage takes a long time to parse complex tags",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "After careful analysis of the vulnerability Redhat is choosing to keep the vulnerability severity as moderate,the vulnerability exists in the ParseAcceptLanguage function of the golang text/language package,when an attacker could craft an unusually large accept header and due to the parser taking quadratic time complexity to finish, firstly the attacker would have to find a way smuggle an input to the parser and even then this would simply not result in a crash of any kind but more of resource hang which while can be unpleasant,does not equate to any real world damage.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-OADP-1.0:oadp/oadp-velero-rhel8@sha256:a5973be01956a09f75bcd65481d484c12fd7bcefad5b852fd0567f6d8b51f0be_amd64"
],
"known_not_affected": [
"8Base-OADP-1.0:oadp/oadp-kubevirt-velero-plugin-rhel8@sha256:3749d7386635cf598147d5021584672ab26761b9dca52ca05b179d47557ac549_amd64",
"8Base-OADP-1.0:oadp/oadp-mustgather-rhel8@sha256:f269ee31bf0eb544ccabb2d72d807dc5d6587186d76bb020a00fac20221c7b0f_amd64",
"8Base-OADP-1.0:oadp/oadp-operator-bundle@sha256:d0927b9f279ad60a073773ec624dc66db000b3d0b727254fbadb6af3a3c7b646_amd64",
"8Base-OADP-1.0:oadp/oadp-registry-rhel8@sha256:ea215cbf22a37c2f2b77c9901dc5c7493f1f3a694276f42d11fcefbf045a8b38_amd64",
"8Base-OADP-1.0:oadp/oadp-rhel8-operator@sha256:4d983585501df88bd5f602010cb72ea460982b25fa91c05a83f0b711a457661a_amd64",
"8Base-OADP-1.0:oadp/oadp-velero-plugin-for-aws-rhel8@sha256:1792552893fe7f146f04033f342e9095f0068dd60e1f3a1e2dad9c5111dd28e6_amd64",
"8Base-OADP-1.0:oadp/oadp-velero-plugin-for-csi-rhel8@sha256:aed05c3b1e7eee9054ee45b499e2eb31a534979468ba22be46f83459d0dab4ae_amd64",
"8Base-OADP-1.0:oadp/oadp-velero-plugin-for-gcp-rhel8@sha256:82ebe14f59b19d628ecbe63a212ecaf4623a98a432b8b4525b118c6b24c87d90_amd64",
"8Base-OADP-1.0:oadp/oadp-velero-plugin-for-microsoft-azure-rhel8@sha256:1200ba024b3301c4ea18817c81e06133a52bcc7565302ebf9aa4677080b64e56_amd64",
"8Base-OADP-1.0:oadp/oadp-velero-plugin-rhel8@sha256:d9a46e3da52db4880cde8faa6f5e406039e6f38585dd14dc97db4b5846b4f7e5_amd64",
"8Base-OADP-1.0:oadp/oadp-velero-restic-restore-helper-rhel8@sha256:9fda0732f74519e71a4f10f10b32a451f01c3bf9eae37f7bd1ff90ad8baf3a9f_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-32149"
},
{
"category": "external",
"summary": "RHBZ#2134010",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2134010"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-32149",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32149"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-32149",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-32149"
},
{
"category": "external",
"summary": "https://go.dev/issue/56152",
"url": "https://go.dev/issue/56152"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-dev/c/qfPIly0X7aU",
"url": "https://groups.google.com/g/golang-dev/c/qfPIly0X7aU"
}
],
"release_date": "2022-10-11T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-02-09T01:07:26+00:00",
"details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"8Base-OADP-1.0:oadp/oadp-velero-rhel8@sha256:a5973be01956a09f75bcd65481d484c12fd7bcefad5b852fd0567f6d8b51f0be_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:0692"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"8Base-OADP-1.0:oadp/oadp-kubevirt-velero-plugin-rhel8@sha256:3749d7386635cf598147d5021584672ab26761b9dca52ca05b179d47557ac549_amd64",
"8Base-OADP-1.0:oadp/oadp-mustgather-rhel8@sha256:f269ee31bf0eb544ccabb2d72d807dc5d6587186d76bb020a00fac20221c7b0f_amd64",
"8Base-OADP-1.0:oadp/oadp-operator-bundle@sha256:d0927b9f279ad60a073773ec624dc66db000b3d0b727254fbadb6af3a3c7b646_amd64",
"8Base-OADP-1.0:oadp/oadp-registry-rhel8@sha256:ea215cbf22a37c2f2b77c9901dc5c7493f1f3a694276f42d11fcefbf045a8b38_amd64",
"8Base-OADP-1.0:oadp/oadp-rhel8-operator@sha256:4d983585501df88bd5f602010cb72ea460982b25fa91c05a83f0b711a457661a_amd64",
"8Base-OADP-1.0:oadp/oadp-velero-plugin-for-aws-rhel8@sha256:1792552893fe7f146f04033f342e9095f0068dd60e1f3a1e2dad9c5111dd28e6_amd64",
"8Base-OADP-1.0:oadp/oadp-velero-plugin-for-csi-rhel8@sha256:aed05c3b1e7eee9054ee45b499e2eb31a534979468ba22be46f83459d0dab4ae_amd64",
"8Base-OADP-1.0:oadp/oadp-velero-plugin-for-gcp-rhel8@sha256:82ebe14f59b19d628ecbe63a212ecaf4623a98a432b8b4525b118c6b24c87d90_amd64",
"8Base-OADP-1.0:oadp/oadp-velero-plugin-for-microsoft-azure-rhel8@sha256:1200ba024b3301c4ea18817c81e06133a52bcc7565302ebf9aa4677080b64e56_amd64",
"8Base-OADP-1.0:oadp/oadp-velero-plugin-rhel8@sha256:d9a46e3da52db4880cde8faa6f5e406039e6f38585dd14dc97db4b5846b4f7e5_amd64",
"8Base-OADP-1.0:oadp/oadp-velero-restic-restore-helper-rhel8@sha256:9fda0732f74519e71a4f10f10b32a451f01c3bf9eae37f7bd1ff90ad8baf3a9f_amd64",
"8Base-OADP-1.0:oadp/oadp-velero-rhel8@sha256:a5973be01956a09f75bcd65481d484c12fd7bcefad5b852fd0567f6d8b51f0be_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "golang: golang.org/x/text/language: ParseAcceptLanguage takes a long time to parse complex tags"
},
{
"cve": "CVE-2022-41717",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"discovery_date": "2023-01-16T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-OADP-1.0:oadp/oadp-kubevirt-velero-plugin-rhel8@sha256:3749d7386635cf598147d5021584672ab26761b9dca52ca05b179d47557ac549_amd64",
"8Base-OADP-1.0:oadp/oadp-mustgather-rhel8@sha256:f269ee31bf0eb544ccabb2d72d807dc5d6587186d76bb020a00fac20221c7b0f_amd64",
"8Base-OADP-1.0:oadp/oadp-operator-bundle@sha256:d0927b9f279ad60a073773ec624dc66db000b3d0b727254fbadb6af3a3c7b646_amd64",
"8Base-OADP-1.0:oadp/oadp-rhel8-operator@sha256:4d983585501df88bd5f602010cb72ea460982b25fa91c05a83f0b711a457661a_amd64",
"8Base-OADP-1.0:oadp/oadp-velero-plugin-for-aws-rhel8@sha256:1792552893fe7f146f04033f342e9095f0068dd60e1f3a1e2dad9c5111dd28e6_amd64",
"8Base-OADP-1.0:oadp/oadp-velero-plugin-for-csi-rhel8@sha256:aed05c3b1e7eee9054ee45b499e2eb31a534979468ba22be46f83459d0dab4ae_amd64",
"8Base-OADP-1.0:oadp/oadp-velero-plugin-for-gcp-rhel8@sha256:82ebe14f59b19d628ecbe63a212ecaf4623a98a432b8b4525b118c6b24c87d90_amd64",
"8Base-OADP-1.0:oadp/oadp-velero-plugin-for-microsoft-azure-rhel8@sha256:1200ba024b3301c4ea18817c81e06133a52bcc7565302ebf9aa4677080b64e56_amd64",
"8Base-OADP-1.0:oadp/oadp-velero-plugin-rhel8@sha256:d9a46e3da52db4880cde8faa6f5e406039e6f38585dd14dc97db4b5846b4f7e5_amd64",
"8Base-OADP-1.0:oadp/oadp-velero-restic-restore-helper-rhel8@sha256:9fda0732f74519e71a4f10f10b32a451f01c3bf9eae37f7bd1ff90ad8baf3a9f_amd64",
"8Base-OADP-1.0:oadp/oadp-velero-rhel8@sha256:a5973be01956a09f75bcd65481d484c12fd7bcefad5b852fd0567f6d8b51f0be_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2161274"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the net/http library of the golang package. This flaw allows an attacker to cause excessive memory growth in a Go server accepting HTTP/2 requests. HTTP/2 server connections contain a cache of HTTP header keys sent by the client. While the total number of entries in this cache is capped, an attacker sending very large keys can cause the server to allocate approximately 64 MiB per open connection.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: net/http: excessive memory growth in a Go server accepting HTTP/2 requests",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Within Red Hat OpenShift Container Platform, the grafana container is listed as will not fix. Since OCP 4.10, Grafana itself is not shipped and the Grafana web server is protected behind an OAuth proxy server.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-OADP-1.0:oadp/oadp-registry-rhel8@sha256:ea215cbf22a37c2f2b77c9901dc5c7493f1f3a694276f42d11fcefbf045a8b38_amd64"
],
"known_not_affected": [
"8Base-OADP-1.0:oadp/oadp-kubevirt-velero-plugin-rhel8@sha256:3749d7386635cf598147d5021584672ab26761b9dca52ca05b179d47557ac549_amd64",
"8Base-OADP-1.0:oadp/oadp-mustgather-rhel8@sha256:f269ee31bf0eb544ccabb2d72d807dc5d6587186d76bb020a00fac20221c7b0f_amd64",
"8Base-OADP-1.0:oadp/oadp-operator-bundle@sha256:d0927b9f279ad60a073773ec624dc66db000b3d0b727254fbadb6af3a3c7b646_amd64",
"8Base-OADP-1.0:oadp/oadp-rhel8-operator@sha256:4d983585501df88bd5f602010cb72ea460982b25fa91c05a83f0b711a457661a_amd64",
"8Base-OADP-1.0:oadp/oadp-velero-plugin-for-aws-rhel8@sha256:1792552893fe7f146f04033f342e9095f0068dd60e1f3a1e2dad9c5111dd28e6_amd64",
"8Base-OADP-1.0:oadp/oadp-velero-plugin-for-csi-rhel8@sha256:aed05c3b1e7eee9054ee45b499e2eb31a534979468ba22be46f83459d0dab4ae_amd64",
"8Base-OADP-1.0:oadp/oadp-velero-plugin-for-gcp-rhel8@sha256:82ebe14f59b19d628ecbe63a212ecaf4623a98a432b8b4525b118c6b24c87d90_amd64",
"8Base-OADP-1.0:oadp/oadp-velero-plugin-for-microsoft-azure-rhel8@sha256:1200ba024b3301c4ea18817c81e06133a52bcc7565302ebf9aa4677080b64e56_amd64",
"8Base-OADP-1.0:oadp/oadp-velero-plugin-rhel8@sha256:d9a46e3da52db4880cde8faa6f5e406039e6f38585dd14dc97db4b5846b4f7e5_amd64",
"8Base-OADP-1.0:oadp/oadp-velero-restic-restore-helper-rhel8@sha256:9fda0732f74519e71a4f10f10b32a451f01c3bf9eae37f7bd1ff90ad8baf3a9f_amd64",
"8Base-OADP-1.0:oadp/oadp-velero-rhel8@sha256:a5973be01956a09f75bcd65481d484c12fd7bcefad5b852fd0567f6d8b51f0be_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-41717"
},
{
"category": "external",
"summary": "RHBZ#2161274",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2161274"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-41717",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41717"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-41717",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-41717"
},
{
"category": "external",
"summary": "https://go.dev/cl/455635",
"url": "https://go.dev/cl/455635"
},
{
"category": "external",
"summary": "https://go.dev/cl/455717",
"url": "https://go.dev/cl/455717"
},
{
"category": "external",
"summary": "https://go.dev/issue/56350",
"url": "https://go.dev/issue/56350"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/L_3rmdT0BMU/m/yZDrXjIiBQAJ",
"url": "https://groups.google.com/g/golang-announce/c/L_3rmdT0BMU/m/yZDrXjIiBQAJ"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2022-1144",
"url": "https://pkg.go.dev/vuln/GO-2022-1144"
}
],
"release_date": "2022-11-30T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-02-09T01:07:26+00:00",
"details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"8Base-OADP-1.0:oadp/oadp-registry-rhel8@sha256:ea215cbf22a37c2f2b77c9901dc5c7493f1f3a694276f42d11fcefbf045a8b38_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:0692"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"8Base-OADP-1.0:oadp/oadp-kubevirt-velero-plugin-rhel8@sha256:3749d7386635cf598147d5021584672ab26761b9dca52ca05b179d47557ac549_amd64",
"8Base-OADP-1.0:oadp/oadp-mustgather-rhel8@sha256:f269ee31bf0eb544ccabb2d72d807dc5d6587186d76bb020a00fac20221c7b0f_amd64",
"8Base-OADP-1.0:oadp/oadp-operator-bundle@sha256:d0927b9f279ad60a073773ec624dc66db000b3d0b727254fbadb6af3a3c7b646_amd64",
"8Base-OADP-1.0:oadp/oadp-registry-rhel8@sha256:ea215cbf22a37c2f2b77c9901dc5c7493f1f3a694276f42d11fcefbf045a8b38_amd64",
"8Base-OADP-1.0:oadp/oadp-rhel8-operator@sha256:4d983585501df88bd5f602010cb72ea460982b25fa91c05a83f0b711a457661a_amd64",
"8Base-OADP-1.0:oadp/oadp-velero-plugin-for-aws-rhel8@sha256:1792552893fe7f146f04033f342e9095f0068dd60e1f3a1e2dad9c5111dd28e6_amd64",
"8Base-OADP-1.0:oadp/oadp-velero-plugin-for-csi-rhel8@sha256:aed05c3b1e7eee9054ee45b499e2eb31a534979468ba22be46f83459d0dab4ae_amd64",
"8Base-OADP-1.0:oadp/oadp-velero-plugin-for-gcp-rhel8@sha256:82ebe14f59b19d628ecbe63a212ecaf4623a98a432b8b4525b118c6b24c87d90_amd64",
"8Base-OADP-1.0:oadp/oadp-velero-plugin-for-microsoft-azure-rhel8@sha256:1200ba024b3301c4ea18817c81e06133a52bcc7565302ebf9aa4677080b64e56_amd64",
"8Base-OADP-1.0:oadp/oadp-velero-plugin-rhel8@sha256:d9a46e3da52db4880cde8faa6f5e406039e6f38585dd14dc97db4b5846b4f7e5_amd64",
"8Base-OADP-1.0:oadp/oadp-velero-restic-restore-helper-rhel8@sha256:9fda0732f74519e71a4f10f10b32a451f01c3bf9eae37f7bd1ff90ad8baf3a9f_amd64",
"8Base-OADP-1.0:oadp/oadp-velero-rhel8@sha256:a5973be01956a09f75bcd65481d484c12fd7bcefad5b852fd0567f6d8b51f0be_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "golang: net/http: excessive memory growth in a Go server accepting HTTP/2 requests"
}
]
}
rhsa-2023_1042
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Custom Metrics Autoscaler Operator for Red Hat OpenShift including security updates.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The Custom Metrics Autoscaler Operator for Red Hat OpenShift is an optional\noperator, based on the Kubernetes Event Driven Autoscaler (KEDA), that allows workloads to be scaled using additional metrics sources other than pod metrics.\nThis release builds upon updated compiler, runtime library, and base images for the purpose of resolving any potential security issues present in previous toolset versions.\n\nThis version makes use of newer tools and libraries to address the following issues:\ngolang: net/http: improper sanitization of Transfer-Encoding header (CVE-2022-1705)\ngolang: go/parser: stack exhaustion in all Parse* functions (CVE-2022-1962)\ngolang: archive/tar: unbounded memory consumption when reading headers (CVE-2022-2879)\ngolang: net/http/httputil: ReverseProxy should not forward unparseable query parameters (CVE-2022-2880)\ngolang: net/http: handle server errors after sending GOAWAY (CVE-2022-27664)\ngolang: encoding/xml: stack exhaustion in Decoder.Skip (CVE-2022-28131)\ngolang: crypto/elliptic: panic caused by oversized scalar (CVE-2022-28327)\ngolang: io/fs: stack exhaustion in Glob (CVE-2022-30630)\ngolang: compress/gzip: stack exhaustion in Reader.Read (CVE-2022-30631)\ngolang: path/filepath: stack exhaustion in Glob (CVE-2022-30632)\ngolang: encoding/xml: stack exhaustion in Unmarshal (CVE-2022-30633)\ngolang: encoding/gob: stack exhaustion in Decoder.Decode (CVE-2022-30635)\ngolang: net/http/httputil: NewSingleHostReverseProxy - omit X-Forwarded-For not working (CVE-2022-32148)\ngolang: golang.org/x/text/language: ParseAcceptLanguage takes a long time to parse complex tags (CVE-2022-32149)\ngolang: regexp/syntax: limit memory used by parsing regexps (CVE-2022-41715)",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2023:1042",
"url": "https://access.redhat.com/errata/RHSA-2023:1042"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#moderate",
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "2077689",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2077689"
},
{
"category": "external",
"summary": "2100763",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2100763"
},
{
"category": "external",
"summary": "2107342",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2107342"
},
{
"category": "external",
"summary": "2107371",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2107371"
},
{
"category": "external",
"summary": "2107374",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2107374"
},
{
"category": "external",
"summary": "2107376",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2107376"
},
{
"category": "external",
"summary": "2107383",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2107383"
},
{
"category": "external",
"summary": "2107386",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2107386"
},
{
"category": "external",
"summary": "2107388",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2107388"
},
{
"category": "external",
"summary": "2107390",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2107390"
},
{
"category": "external",
"summary": "2107392",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2107392"
},
{
"category": "external",
"summary": "2113945",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2113945"
},
{
"category": "external",
"summary": "2118404",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2118404"
},
{
"category": "external",
"summary": "2124669",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2124669"
},
{
"category": "external",
"summary": "2132867",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2132867"
},
{
"category": "external",
"summary": "2132868",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2132868"
},
{
"category": "external",
"summary": "2132872",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2132872"
},
{
"category": "external",
"summary": "2134010",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2134010"
},
{
"category": "external",
"summary": "OCPNODE-1260",
"url": "https://issues.redhat.com/browse/OCPNODE-1260"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2023/rhsa-2023_1042.json"
}
],
"title": "Red Hat Security Advisory: Custom Metrics Autoscaler Operator for Red Hat OpenShift (with security updates)",
"tracking": {
"current_release_date": "2025-01-06T19:24:23+00:00",
"generator": {
"date": "2025-01-06T19:24:23+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.5"
}
},
"id": "RHSA-2023:1042",
"initial_release_date": "2023-03-06T18:38:53+00:00",
"revision_history": [
{
"date": "2023-03-06T18:38:53+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2023-03-06T18:38:53+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-01-06T19:24:23+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "OpenShift Custom Metrics Autoscaler 2",
"product": {
"name": "OpenShift Custom Metrics Autoscaler 2",
"product_id": "8Base-OCMA-2",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:openshift_custom_metrics_autoscaler:2.0::el8"
}
}
}
],
"category": "product_family",
"name": "OpenShift Custom Metrics Autoscaler"
},
{
"branches": [
{
"category": "product_version",
"name": "custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-adapter-rhel8@sha256:c79cb3c68317a224277a8ee0dc78832fcd4b6da18b9b5b074cffaad14e2f1aa5_amd64",
"product": {
"name": "custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-adapter-rhel8@sha256:c79cb3c68317a224277a8ee0dc78832fcd4b6da18b9b5b074cffaad14e2f1aa5_amd64",
"product_id": "custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-adapter-rhel8@sha256:c79cb3c68317a224277a8ee0dc78832fcd4b6da18b9b5b074cffaad14e2f1aa5_amd64",
"product_identification_helper": {
"purl": "pkg:oci/custom-metrics-autoscaler-adapter-rhel8@sha256:c79cb3c68317a224277a8ee0dc78832fcd4b6da18b9b5b074cffaad14e2f1aa5?arch=amd64\u0026repository_url=registry.redhat.io/custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-adapter-rhel8\u0026tag=2.8.2-143"
}
}
},
{
"category": "product_version",
"name": "custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-rhel8@sha256:a403d057cd2ca820306207282007d4d117623e1a2ebb8bee67c19f5796f07f95_amd64",
"product": {
"name": "custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-rhel8@sha256:a403d057cd2ca820306207282007d4d117623e1a2ebb8bee67c19f5796f07f95_amd64",
"product_id": "custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-rhel8@sha256:a403d057cd2ca820306207282007d4d117623e1a2ebb8bee67c19f5796f07f95_amd64",
"product_identification_helper": {
"purl": "pkg:oci/custom-metrics-autoscaler-rhel8@sha256:a403d057cd2ca820306207282007d4d117623e1a2ebb8bee67c19f5796f07f95?arch=amd64\u0026repository_url=registry.redhat.io/custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-rhel8\u0026tag=2.8.2-143"
}
}
},
{
"category": "product_version",
"name": "custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-operator-bundle@sha256:44de4b736089166718956bebd456ad1a17e0e6f72c49f52804c6b6e60ef5a494_amd64",
"product": {
"name": "custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-operator-bundle@sha256:44de4b736089166718956bebd456ad1a17e0e6f72c49f52804c6b6e60ef5a494_amd64",
"product_id": "custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-operator-bundle@sha256:44de4b736089166718956bebd456ad1a17e0e6f72c49f52804c6b6e60ef5a494_amd64",
"product_identification_helper": {
"purl": "pkg:oci/custom-metrics-autoscaler-operator-bundle@sha256:44de4b736089166718956bebd456ad1a17e0e6f72c49f52804c6b6e60ef5a494?arch=amd64\u0026repository_url=registry.redhat.io/custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-operator-bundle\u0026tag=2.8.2-143"
}
}
},
{
"category": "product_version",
"name": "custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-rhel8-operator@sha256:5a149d0a0cdb6812acbef0c9b3031fb3cd84181e971198a6e17d8fd0bf5e6293_amd64",
"product": {
"name": "custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-rhel8-operator@sha256:5a149d0a0cdb6812acbef0c9b3031fb3cd84181e971198a6e17d8fd0bf5e6293_amd64",
"product_id": "custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-rhel8-operator@sha256:5a149d0a0cdb6812acbef0c9b3031fb3cd84181e971198a6e17d8fd0bf5e6293_amd64",
"product_identification_helper": {
"purl": "pkg:oci/custom-metrics-autoscaler-rhel8-operator@sha256:5a149d0a0cdb6812acbef0c9b3031fb3cd84181e971198a6e17d8fd0bf5e6293?arch=amd64\u0026repository_url=registry.redhat.io/custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-rhel8-operator\u0026tag=2.8.2-143"
}
}
}
],
"category": "architecture",
"name": "amd64"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-adapter-rhel8@sha256:c79cb3c68317a224277a8ee0dc78832fcd4b6da18b9b5b074cffaad14e2f1aa5_amd64 as a component of OpenShift Custom Metrics Autoscaler 2",
"product_id": "8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-adapter-rhel8@sha256:c79cb3c68317a224277a8ee0dc78832fcd4b6da18b9b5b074cffaad14e2f1aa5_amd64"
},
"product_reference": "custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-adapter-rhel8@sha256:c79cb3c68317a224277a8ee0dc78832fcd4b6da18b9b5b074cffaad14e2f1aa5_amd64",
"relates_to_product_reference": "8Base-OCMA-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-operator-bundle@sha256:44de4b736089166718956bebd456ad1a17e0e6f72c49f52804c6b6e60ef5a494_amd64 as a component of OpenShift Custom Metrics Autoscaler 2",
"product_id": "8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-operator-bundle@sha256:44de4b736089166718956bebd456ad1a17e0e6f72c49f52804c6b6e60ef5a494_amd64"
},
"product_reference": "custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-operator-bundle@sha256:44de4b736089166718956bebd456ad1a17e0e6f72c49f52804c6b6e60ef5a494_amd64",
"relates_to_product_reference": "8Base-OCMA-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-rhel8-operator@sha256:5a149d0a0cdb6812acbef0c9b3031fb3cd84181e971198a6e17d8fd0bf5e6293_amd64 as a component of OpenShift Custom Metrics Autoscaler 2",
"product_id": "8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-rhel8-operator@sha256:5a149d0a0cdb6812acbef0c9b3031fb3cd84181e971198a6e17d8fd0bf5e6293_amd64"
},
"product_reference": "custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-rhel8-operator@sha256:5a149d0a0cdb6812acbef0c9b3031fb3cd84181e971198a6e17d8fd0bf5e6293_amd64",
"relates_to_product_reference": "8Base-OCMA-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-rhel8@sha256:a403d057cd2ca820306207282007d4d117623e1a2ebb8bee67c19f5796f07f95_amd64 as a component of OpenShift Custom Metrics Autoscaler 2",
"product_id": "8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-rhel8@sha256:a403d057cd2ca820306207282007d4d117623e1a2ebb8bee67c19f5796f07f95_amd64"
},
"product_reference": "custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-rhel8@sha256:a403d057cd2ca820306207282007d4d117623e1a2ebb8bee67c19f5796f07f95_amd64",
"relates_to_product_reference": "8Base-OCMA-2"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2022-1705",
"cwe": {
"id": "CWE-444",
"name": "Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027)"
},
"discovery_date": "2022-07-14T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-operator-bundle@sha256:44de4b736089166718956bebd456ad1a17e0e6f72c49f52804c6b6e60ef5a494_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2107374"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in golang. The HTTP/1 client accepted invalid Transfer-Encoding headers indicating \"chunked\" encoding. This issue could allow request smuggling, but only if combined with an intermediate server that also improperly accepts the header as invalid.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: net/http: improper sanitization of Transfer-Encoding header",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-adapter-rhel8@sha256:c79cb3c68317a224277a8ee0dc78832fcd4b6da18b9b5b074cffaad14e2f1aa5_amd64",
"8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-rhel8-operator@sha256:5a149d0a0cdb6812acbef0c9b3031fb3cd84181e971198a6e17d8fd0bf5e6293_amd64",
"8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-rhel8@sha256:a403d057cd2ca820306207282007d4d117623e1a2ebb8bee67c19f5796f07f95_amd64"
],
"known_not_affected": [
"8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-operator-bundle@sha256:44de4b736089166718956bebd456ad1a17e0e6f72c49f52804c6b6e60ef5a494_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-1705"
},
{
"category": "external",
"summary": "RHBZ#2107374",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2107374"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-1705",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1705"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-1705",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-1705"
},
{
"category": "external",
"summary": "https://go.dev/issue/53188",
"url": "https://go.dev/issue/53188"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/nqrv9fbR0zE",
"url": "https://groups.google.com/g/golang-announce/c/nqrv9fbR0zE"
}
],
"release_date": "2022-07-12T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-03-06T18:38:53+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-adapter-rhel8@sha256:c79cb3c68317a224277a8ee0dc78832fcd4b6da18b9b5b074cffaad14e2f1aa5_amd64",
"8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-rhel8-operator@sha256:5a149d0a0cdb6812acbef0c9b3031fb3cd84181e971198a6e17d8fd0bf5e6293_amd64",
"8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-rhel8@sha256:a403d057cd2ca820306207282007d4d117623e1a2ebb8bee67c19f5796f07f95_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:1042"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-adapter-rhel8@sha256:c79cb3c68317a224277a8ee0dc78832fcd4b6da18b9b5b074cffaad14e2f1aa5_amd64",
"8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-operator-bundle@sha256:44de4b736089166718956bebd456ad1a17e0e6f72c49f52804c6b6e60ef5a494_amd64",
"8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-rhel8-operator@sha256:5a149d0a0cdb6812acbef0c9b3031fb3cd84181e971198a6e17d8fd0bf5e6293_amd64",
"8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-rhel8@sha256:a403d057cd2ca820306207282007d4d117623e1a2ebb8bee67c19f5796f07f95_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "golang: net/http: improper sanitization of Transfer-Encoding header"
},
{
"cve": "CVE-2022-1962",
"cwe": {
"id": "CWE-1325",
"name": "Improperly Controlled Sequential Memory Allocation"
},
"discovery_date": "2022-07-14T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-adapter-rhel8@sha256:c79cb3c68317a224277a8ee0dc78832fcd4b6da18b9b5b074cffaad14e2f1aa5_amd64",
"8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-operator-bundle@sha256:44de4b736089166718956bebd456ad1a17e0e6f72c49f52804c6b6e60ef5a494_amd64",
"8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-rhel8-operator@sha256:5a149d0a0cdb6812acbef0c9b3031fb3cd84181e971198a6e17d8fd0bf5e6293_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2107376"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the golang standard library, go/parser. When calling any Parse functions on the Go source code, which contains deeply nested types or declarations, a panic can occur due to stack exhaustion. This issue allows an attacker to impact system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: go/parser: stack exhaustion in all Parse* functions",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-rhel8@sha256:a403d057cd2ca820306207282007d4d117623e1a2ebb8bee67c19f5796f07f95_amd64"
],
"known_not_affected": [
"8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-adapter-rhel8@sha256:c79cb3c68317a224277a8ee0dc78832fcd4b6da18b9b5b074cffaad14e2f1aa5_amd64",
"8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-operator-bundle@sha256:44de4b736089166718956bebd456ad1a17e0e6f72c49f52804c6b6e60ef5a494_amd64",
"8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-rhel8-operator@sha256:5a149d0a0cdb6812acbef0c9b3031fb3cd84181e971198a6e17d8fd0bf5e6293_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-1962"
},
{
"category": "external",
"summary": "RHBZ#2107376",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2107376"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-1962",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1962"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-1962",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-1962"
},
{
"category": "external",
"summary": "https://go.dev/issue/53616",
"url": "https://go.dev/issue/53616"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/nqrv9fbR0zE",
"url": "https://groups.google.com/g/golang-announce/c/nqrv9fbR0zE"
}
],
"release_date": "2022-07-12T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-03-06T18:38:53+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-rhel8@sha256:a403d057cd2ca820306207282007d4d117623e1a2ebb8bee67c19f5796f07f95_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:1042"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-adapter-rhel8@sha256:c79cb3c68317a224277a8ee0dc78832fcd4b6da18b9b5b074cffaad14e2f1aa5_amd64",
"8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-operator-bundle@sha256:44de4b736089166718956bebd456ad1a17e0e6f72c49f52804c6b6e60ef5a494_amd64",
"8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-rhel8-operator@sha256:5a149d0a0cdb6812acbef0c9b3031fb3cd84181e971198a6e17d8fd0bf5e6293_amd64",
"8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-rhel8@sha256:a403d057cd2ca820306207282007d4d117623e1a2ebb8bee67c19f5796f07f95_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "golang: go/parser: stack exhaustion in all Parse* functions"
},
{
"acknowledgments": [
{
"names": [
"Adam Korczynski"
],
"organization": "ADA Logics"
},
{
"names": [
"OSS-Fuzz"
]
}
],
"cve": "CVE-2022-2879",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"discovery_date": "2022-10-07T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-adapter-rhel8@sha256:c79cb3c68317a224277a8ee0dc78832fcd4b6da18b9b5b074cffaad14e2f1aa5_amd64",
"8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-operator-bundle@sha256:44de4b736089166718956bebd456ad1a17e0e6f72c49f52804c6b6e60ef5a494_amd64",
"8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-rhel8-operator@sha256:5a149d0a0cdb6812acbef0c9b3031fb3cd84181e971198a6e17d8fd0bf5e6293_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2132867"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the golang package, where Reader.Read does not set a limit on the maximum size of file headers. After fixing, Reader.Read limits the maximum size of header blocks to 1 MiB. This flaw allows a maliciously crafted archive to cause Read to allocate unbounded amounts of memory, potentially causing resource exhaustion or panic.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: archive/tar: unbounded memory consumption when reading headers",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The opportunity for a Denial of Service is limited to the golang runtime. In the case of OpenShift Container Platform, this would be restricted within each individual container. There are multiple layers of guide rails (Golang\u2019s Garbage Collector; OpenShift\u2019s resource constraints imposed at the container and cluster levels) which would require a malicious user to continue submitting attacks for there to be any enduring impact. They would also need access to external server resources to be able to send a massive volume of requests to cause a significant impact on server operations.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-rhel8@sha256:a403d057cd2ca820306207282007d4d117623e1a2ebb8bee67c19f5796f07f95_amd64"
],
"known_not_affected": [
"8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-adapter-rhel8@sha256:c79cb3c68317a224277a8ee0dc78832fcd4b6da18b9b5b074cffaad14e2f1aa5_amd64",
"8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-operator-bundle@sha256:44de4b736089166718956bebd456ad1a17e0e6f72c49f52804c6b6e60ef5a494_amd64",
"8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-rhel8-operator@sha256:5a149d0a0cdb6812acbef0c9b3031fb3cd84181e971198a6e17d8fd0bf5e6293_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-2879"
},
{
"category": "external",
"summary": "RHBZ#2132867",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2132867"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-2879",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2879"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-2879",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-2879"
},
{
"category": "external",
"summary": "https://github.com/golang/go/issues/54853",
"url": "https://github.com/golang/go/issues/54853"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/xtuG5faxtaU?pli=1",
"url": "https://groups.google.com/g/golang-announce/c/xtuG5faxtaU?pli=1"
}
],
"release_date": "2022-10-04T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-03-06T18:38:53+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-rhel8@sha256:a403d057cd2ca820306207282007d4d117623e1a2ebb8bee67c19f5796f07f95_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:1042"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-adapter-rhel8@sha256:c79cb3c68317a224277a8ee0dc78832fcd4b6da18b9b5b074cffaad14e2f1aa5_amd64",
"8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-operator-bundle@sha256:44de4b736089166718956bebd456ad1a17e0e6f72c49f52804c6b6e60ef5a494_amd64",
"8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-rhel8-operator@sha256:5a149d0a0cdb6812acbef0c9b3031fb3cd84181e971198a6e17d8fd0bf5e6293_amd64",
"8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-rhel8@sha256:a403d057cd2ca820306207282007d4d117623e1a2ebb8bee67c19f5796f07f95_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "golang: archive/tar: unbounded memory consumption when reading headers"
},
{
"acknowledgments": [
{
"names": [
"Daniel Abeles"
],
"organization": "Head of Research, Oxeye"
},
{
"names": [
"Gal Goldstein"
],
"organization": "Security Researcher, Oxeye"
}
],
"cve": "CVE-2022-2880",
"cwe": {
"id": "CWE-444",
"name": "Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027)"
},
"discovery_date": "2022-10-07T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-adapter-rhel8@sha256:c79cb3c68317a224277a8ee0dc78832fcd4b6da18b9b5b074cffaad14e2f1aa5_amd64",
"8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-operator-bundle@sha256:44de4b736089166718956bebd456ad1a17e0e6f72c49f52804c6b6e60ef5a494_amd64",
"8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-rhel8-operator@sha256:5a149d0a0cdb6812acbef0c9b3031fb3cd84181e971198a6e17d8fd0bf5e6293_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2132868"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the golang package, where requests forwarded by reverse proxy include the raw query parameters from the inbound request, including unparseable parameters rejected by net/http. This issue could permit query parameter smuggling when a Go proxy forwards a parameter with an unparseable value. After the fix, the reverse proxy sanitizes the query parameters in the forwarded query when the outbound request\u0027s form field is set after the reverse proxy. The director function returns, indicating that the proxy has parsed the query parameters. Proxies that do not parse query parameters continue to forward the original query parameters unchanged.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: net/http/httputil: ReverseProxy should not forward unparseable query parameters",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The opportunity to exploit this vulnerability is limited to the Golang runtime. In the case of the OpenShift Container Platform, this would be restricted within each individual container. There are multiple layers of guide rails (Golang\u2019s Garbage Collector; OpenShift\u2019s resource constraints imposed at the container and cluster levels) which would require a malicious user to continue submitting attacks for there to be any enduring impact.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-rhel8@sha256:a403d057cd2ca820306207282007d4d117623e1a2ebb8bee67c19f5796f07f95_amd64"
],
"known_not_affected": [
"8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-adapter-rhel8@sha256:c79cb3c68317a224277a8ee0dc78832fcd4b6da18b9b5b074cffaad14e2f1aa5_amd64",
"8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-operator-bundle@sha256:44de4b736089166718956bebd456ad1a17e0e6f72c49f52804c6b6e60ef5a494_amd64",
"8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-rhel8-operator@sha256:5a149d0a0cdb6812acbef0c9b3031fb3cd84181e971198a6e17d8fd0bf5e6293_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-2880"
},
{
"category": "external",
"summary": "RHBZ#2132868",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2132868"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-2880",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2880"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-2880",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-2880"
},
{
"category": "external",
"summary": "https://github.com/golang/go/issues/54663",
"url": "https://github.com/golang/go/issues/54663"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/xtuG5faxtaU?pli=1",
"url": "https://groups.google.com/g/golang-announce/c/xtuG5faxtaU?pli=1"
}
],
"release_date": "2022-10-04T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-03-06T18:38:53+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-rhel8@sha256:a403d057cd2ca820306207282007d4d117623e1a2ebb8bee67c19f5796f07f95_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:1042"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-adapter-rhel8@sha256:c79cb3c68317a224277a8ee0dc78832fcd4b6da18b9b5b074cffaad14e2f1aa5_amd64",
"8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-operator-bundle@sha256:44de4b736089166718956bebd456ad1a17e0e6f72c49f52804c6b6e60ef5a494_amd64",
"8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-rhel8-operator@sha256:5a149d0a0cdb6812acbef0c9b3031fb3cd84181e971198a6e17d8fd0bf5e6293_amd64",
"8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-rhel8@sha256:a403d057cd2ca820306207282007d4d117623e1a2ebb8bee67c19f5796f07f95_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "golang: net/http/httputil: ReverseProxy should not forward unparseable query parameters"
},
{
"cve": "CVE-2022-27664",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"discovery_date": "2022-09-06T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-adapter-rhel8@sha256:c79cb3c68317a224277a8ee0dc78832fcd4b6da18b9b5b074cffaad14e2f1aa5_amd64",
"8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-operator-bundle@sha256:44de4b736089166718956bebd456ad1a17e0e6f72c49f52804c6b6e60ef5a494_amd64",
"8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-rhel8-operator@sha256:5a149d0a0cdb6812acbef0c9b3031fb3cd84181e971198a6e17d8fd0bf5e6293_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2124669"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the golang package. In net/http in Go, attackers can cause a denial of service because an HTTP/2 connection can hang during closing if a fatal error preempts the shutdown.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: net/http: handle server errors after sending GOAWAY",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The opportunity for a Denial of Service is limited to the golang runtime. In the case of OpenShift Container Platform, this would be restricted within each individual container. There are multiple layers of guide rails (Golang\u2019s Garbage Collector; OpenShift\u2019s resource constraints imposed at the container and cluster levels) which would require a malicious user to continue submitting attacks for there to be any enduring impact. They would also need access to external server resources to be able to send a massive volume of requests to cause a significant impact on server operations.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-rhel8@sha256:a403d057cd2ca820306207282007d4d117623e1a2ebb8bee67c19f5796f07f95_amd64"
],
"known_not_affected": [
"8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-adapter-rhel8@sha256:c79cb3c68317a224277a8ee0dc78832fcd4b6da18b9b5b074cffaad14e2f1aa5_amd64",
"8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-operator-bundle@sha256:44de4b736089166718956bebd456ad1a17e0e6f72c49f52804c6b6e60ef5a494_amd64",
"8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-rhel8-operator@sha256:5a149d0a0cdb6812acbef0c9b3031fb3cd84181e971198a6e17d8fd0bf5e6293_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-27664"
},
{
"category": "external",
"summary": "RHBZ#2124669",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2124669"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-27664",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27664"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-27664",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-27664"
},
{
"category": "external",
"summary": "https://go.dev/issue/54658",
"url": "https://go.dev/issue/54658"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/x49AQzIVX-s/m/0tgO0pjiBQAJ",
"url": "https://groups.google.com/g/golang-announce/c/x49AQzIVX-s/m/0tgO0pjiBQAJ"
}
],
"release_date": "2022-09-06T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-03-06T18:38:53+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-rhel8@sha256:a403d057cd2ca820306207282007d4d117623e1a2ebb8bee67c19f5796f07f95_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:1042"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-adapter-rhel8@sha256:c79cb3c68317a224277a8ee0dc78832fcd4b6da18b9b5b074cffaad14e2f1aa5_amd64",
"8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-operator-bundle@sha256:44de4b736089166718956bebd456ad1a17e0e6f72c49f52804c6b6e60ef5a494_amd64",
"8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-rhel8-operator@sha256:5a149d0a0cdb6812acbef0c9b3031fb3cd84181e971198a6e17d8fd0bf5e6293_amd64",
"8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-rhel8@sha256:a403d057cd2ca820306207282007d4d117623e1a2ebb8bee67c19f5796f07f95_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "golang: net/http: handle server errors after sending GOAWAY"
},
{
"cve": "CVE-2022-28131",
"cwe": {
"id": "CWE-1325",
"name": "Improperly Controlled Sequential Memory Allocation"
},
"discovery_date": "2022-07-14T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-adapter-rhel8@sha256:c79cb3c68317a224277a8ee0dc78832fcd4b6da18b9b5b074cffaad14e2f1aa5_amd64",
"8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-operator-bundle@sha256:44de4b736089166718956bebd456ad1a17e0e6f72c49f52804c6b6e60ef5a494_amd64",
"8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-rhel8-operator@sha256:5a149d0a0cdb6812acbef0c9b3031fb3cd84181e971198a6e17d8fd0bf5e6293_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2107390"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in golang encoding/xml. When calling Decoder, Skip while parsing a deeply nested XML document, a panic can occur due to stack exhaustion and allows an attacker to impact system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: encoding/xml: stack exhaustion in Decoder.Skip",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-rhel8@sha256:a403d057cd2ca820306207282007d4d117623e1a2ebb8bee67c19f5796f07f95_amd64"
],
"known_not_affected": [
"8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-adapter-rhel8@sha256:c79cb3c68317a224277a8ee0dc78832fcd4b6da18b9b5b074cffaad14e2f1aa5_amd64",
"8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-operator-bundle@sha256:44de4b736089166718956bebd456ad1a17e0e6f72c49f52804c6b6e60ef5a494_amd64",
"8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-rhel8-operator@sha256:5a149d0a0cdb6812acbef0c9b3031fb3cd84181e971198a6e17d8fd0bf5e6293_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-28131"
},
{
"category": "external",
"summary": "RHBZ#2107390",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2107390"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-28131",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28131"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-28131",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-28131"
},
{
"category": "external",
"summary": "https://go.dev/issue/53614",
"url": "https://go.dev/issue/53614"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/nqrv9fbR0zE",
"url": "https://groups.google.com/g/golang-announce/c/nqrv9fbR0zE"
}
],
"release_date": "2022-07-12T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-03-06T18:38:53+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-rhel8@sha256:a403d057cd2ca820306207282007d4d117623e1a2ebb8bee67c19f5796f07f95_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:1042"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.3,
"baseSeverity": "HIGH",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H",
"version": "3.1"
},
"products": [
"8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-adapter-rhel8@sha256:c79cb3c68317a224277a8ee0dc78832fcd4b6da18b9b5b074cffaad14e2f1aa5_amd64",
"8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-operator-bundle@sha256:44de4b736089166718956bebd456ad1a17e0e6f72c49f52804c6b6e60ef5a494_amd64",
"8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-rhel8-operator@sha256:5a149d0a0cdb6812acbef0c9b3031fb3cd84181e971198a6e17d8fd0bf5e6293_amd64",
"8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-rhel8@sha256:a403d057cd2ca820306207282007d4d117623e1a2ebb8bee67c19f5796f07f95_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "golang: encoding/xml: stack exhaustion in Decoder.Skip"
},
{
"cve": "CVE-2022-28327",
"cwe": {
"id": "CWE-190",
"name": "Integer Overflow or Wraparound"
},
"discovery_date": "2022-04-21T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-operator-bundle@sha256:44de4b736089166718956bebd456ad1a17e0e6f72c49f52804c6b6e60ef5a494_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2077689"
}
],
"notes": [
{
"category": "description",
"text": "An integer overflow flaw was found in Golang\u0027s crypto/elliptic library. This flaw allows an attacker to use a crafted scaler input longer than 32 bytes, causing P256().ScalarMult or P256().ScalarBaseMult to panic, leading to a loss of availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: crypto/elliptic: panic caused by oversized scalar",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Enterprise Linux 7, 8 and 9 are affected, because the code-base is affected by this vulnerability.\n\nRed Hat Product Security has rated this issue as having Moderate security impact, and the issue is not currently planned to be addressed in future updates for Red Hat Enterprise Linux 7, hence, marked as Out-of-Support-Scope. \n\nRed Hat Developer Tools - Compilers (go-toolset-1.16-golang \u0026 go-toolset-1.17-golang), ships the vulnerable code and affected by this vulnerability.\n\nFor additional information, refer to the Issue Severity Classification: https://access.redhat.com/security/updates/classification/ and Red Hat Enterprise Linux Life Cycle \u0026 Updates Policy: https://access.redhat.com/support/policy/updates/errata/.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-adapter-rhel8@sha256:c79cb3c68317a224277a8ee0dc78832fcd4b6da18b9b5b074cffaad14e2f1aa5_amd64",
"8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-rhel8-operator@sha256:5a149d0a0cdb6812acbef0c9b3031fb3cd84181e971198a6e17d8fd0bf5e6293_amd64",
"8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-rhel8@sha256:a403d057cd2ca820306207282007d4d117623e1a2ebb8bee67c19f5796f07f95_amd64"
],
"known_not_affected": [
"8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-operator-bundle@sha256:44de4b736089166718956bebd456ad1a17e0e6f72c49f52804c6b6e60ef5a494_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-28327"
},
{
"category": "external",
"summary": "RHBZ#2077689",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2077689"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-28327",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28327"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-28327",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-28327"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/oecdBNLOml8",
"url": "https://groups.google.com/g/golang-announce/c/oecdBNLOml8"
}
],
"release_date": "2022-04-12T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-03-06T18:38:53+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-adapter-rhel8@sha256:c79cb3c68317a224277a8ee0dc78832fcd4b6da18b9b5b074cffaad14e2f1aa5_amd64",
"8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-rhel8-operator@sha256:5a149d0a0cdb6812acbef0c9b3031fb3cd84181e971198a6e17d8fd0bf5e6293_amd64",
"8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-rhel8@sha256:a403d057cd2ca820306207282007d4d117623e1a2ebb8bee67c19f5796f07f95_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:1042"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-adapter-rhel8@sha256:c79cb3c68317a224277a8ee0dc78832fcd4b6da18b9b5b074cffaad14e2f1aa5_amd64",
"8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-operator-bundle@sha256:44de4b736089166718956bebd456ad1a17e0e6f72c49f52804c6b6e60ef5a494_amd64",
"8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-rhel8-operator@sha256:5a149d0a0cdb6812acbef0c9b3031fb3cd84181e971198a6e17d8fd0bf5e6293_amd64",
"8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-rhel8@sha256:a403d057cd2ca820306207282007d4d117623e1a2ebb8bee67c19f5796f07f95_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "golang: crypto/elliptic: panic caused by oversized scalar"
},
{
"cve": "CVE-2022-30630",
"cwe": {
"id": "CWE-1325",
"name": "Improperly Controlled Sequential Memory Allocation"
},
"discovery_date": "2022-07-14T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-adapter-rhel8@sha256:c79cb3c68317a224277a8ee0dc78832fcd4b6da18b9b5b074cffaad14e2f1aa5_amd64",
"8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-operator-bundle@sha256:44de4b736089166718956bebd456ad1a17e0e6f72c49f52804c6b6e60ef5a494_amd64",
"8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-rhel8-operator@sha256:5a149d0a0cdb6812acbef0c9b3031fb3cd84181e971198a6e17d8fd0bf5e6293_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2107371"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the golang standard library, io/fs. Calling Glob on a path that contains a large number of path separators can cause a panic issue due to stack exhaustion. This could allow an attacker to impact availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: io/fs: stack exhaustion in Glob",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-rhel8@sha256:a403d057cd2ca820306207282007d4d117623e1a2ebb8bee67c19f5796f07f95_amd64"
],
"known_not_affected": [
"8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-adapter-rhel8@sha256:c79cb3c68317a224277a8ee0dc78832fcd4b6da18b9b5b074cffaad14e2f1aa5_amd64",
"8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-operator-bundle@sha256:44de4b736089166718956bebd456ad1a17e0e6f72c49f52804c6b6e60ef5a494_amd64",
"8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-rhel8-operator@sha256:5a149d0a0cdb6812acbef0c9b3031fb3cd84181e971198a6e17d8fd0bf5e6293_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-30630"
},
{
"category": "external",
"summary": "RHBZ#2107371",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2107371"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-30630",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30630"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-30630",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-30630"
},
{
"category": "external",
"summary": "https://go.dev/issue/53415",
"url": "https://go.dev/issue/53415"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/nqrv9fbR0zE",
"url": "https://groups.google.com/g/golang-announce/c/nqrv9fbR0zE"
}
],
"release_date": "2022-07-12T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-03-06T18:38:53+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-rhel8@sha256:a403d057cd2ca820306207282007d4d117623e1a2ebb8bee67c19f5796f07f95_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:1042"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-adapter-rhel8@sha256:c79cb3c68317a224277a8ee0dc78832fcd4b6da18b9b5b074cffaad14e2f1aa5_amd64",
"8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-operator-bundle@sha256:44de4b736089166718956bebd456ad1a17e0e6f72c49f52804c6b6e60ef5a494_amd64",
"8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-rhel8-operator@sha256:5a149d0a0cdb6812acbef0c9b3031fb3cd84181e971198a6e17d8fd0bf5e6293_amd64",
"8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-rhel8@sha256:a403d057cd2ca820306207282007d4d117623e1a2ebb8bee67c19f5796f07f95_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "golang: io/fs: stack exhaustion in Glob"
},
{
"cve": "CVE-2022-30631",
"cwe": {
"id": "CWE-1325",
"name": "Improperly Controlled Sequential Memory Allocation"
},
"discovery_date": "2022-07-14T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-adapter-rhel8@sha256:c79cb3c68317a224277a8ee0dc78832fcd4b6da18b9b5b074cffaad14e2f1aa5_amd64",
"8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-operator-bundle@sha256:44de4b736089166718956bebd456ad1a17e0e6f72c49f52804c6b6e60ef5a494_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2107342"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in golang. Calling the Reader, Read method on an archive that contains a large number of concatenated 0-length compressed files can cause a panic issue due to stack exhaustion.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: compress/gzip: stack exhaustion in Reader.Read",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-rhel8-operator@sha256:5a149d0a0cdb6812acbef0c9b3031fb3cd84181e971198a6e17d8fd0bf5e6293_amd64",
"8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-rhel8@sha256:a403d057cd2ca820306207282007d4d117623e1a2ebb8bee67c19f5796f07f95_amd64"
],
"known_not_affected": [
"8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-adapter-rhel8@sha256:c79cb3c68317a224277a8ee0dc78832fcd4b6da18b9b5b074cffaad14e2f1aa5_amd64",
"8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-operator-bundle@sha256:44de4b736089166718956bebd456ad1a17e0e6f72c49f52804c6b6e60ef5a494_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-30631"
},
{
"category": "external",
"summary": "RHBZ#2107342",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2107342"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-30631",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30631"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-30631",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-30631"
},
{
"category": "external",
"summary": "https://go.dev/issue/53168",
"url": "https://go.dev/issue/53168"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/nqrv9fbR0zE",
"url": "https://groups.google.com/g/golang-announce/c/nqrv9fbR0zE"
}
],
"release_date": "2022-07-12T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-03-06T18:38:53+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-rhel8-operator@sha256:5a149d0a0cdb6812acbef0c9b3031fb3cd84181e971198a6e17d8fd0bf5e6293_amd64",
"8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-rhel8@sha256:a403d057cd2ca820306207282007d4d117623e1a2ebb8bee67c19f5796f07f95_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:1042"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-adapter-rhel8@sha256:c79cb3c68317a224277a8ee0dc78832fcd4b6da18b9b5b074cffaad14e2f1aa5_amd64",
"8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-operator-bundle@sha256:44de4b736089166718956bebd456ad1a17e0e6f72c49f52804c6b6e60ef5a494_amd64",
"8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-rhel8-operator@sha256:5a149d0a0cdb6812acbef0c9b3031fb3cd84181e971198a6e17d8fd0bf5e6293_amd64",
"8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-rhel8@sha256:a403d057cd2ca820306207282007d4d117623e1a2ebb8bee67c19f5796f07f95_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "golang: compress/gzip: stack exhaustion in Reader.Read"
},
{
"cve": "CVE-2022-30632",
"cwe": {
"id": "CWE-1325",
"name": "Improperly Controlled Sequential Memory Allocation"
},
"discovery_date": "2022-07-14T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-adapter-rhel8@sha256:c79cb3c68317a224277a8ee0dc78832fcd4b6da18b9b5b074cffaad14e2f1aa5_amd64",
"8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-operator-bundle@sha256:44de4b736089166718956bebd456ad1a17e0e6f72c49f52804c6b6e60ef5a494_amd64",
"8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-rhel8-operator@sha256:5a149d0a0cdb6812acbef0c9b3031fb3cd84181e971198a6e17d8fd0bf5e6293_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2107386"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in golang. Calling Glob on a path that contains a large number of path separators can cause a panic issue due to stack exhaustion. This can cause an attacker to impact availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: path/filepath: stack exhaustion in Glob",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-rhel8@sha256:a403d057cd2ca820306207282007d4d117623e1a2ebb8bee67c19f5796f07f95_amd64"
],
"known_not_affected": [
"8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-adapter-rhel8@sha256:c79cb3c68317a224277a8ee0dc78832fcd4b6da18b9b5b074cffaad14e2f1aa5_amd64",
"8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-operator-bundle@sha256:44de4b736089166718956bebd456ad1a17e0e6f72c49f52804c6b6e60ef5a494_amd64",
"8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-rhel8-operator@sha256:5a149d0a0cdb6812acbef0c9b3031fb3cd84181e971198a6e17d8fd0bf5e6293_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-30632"
},
{
"category": "external",
"summary": "RHBZ#2107386",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2107386"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-30632",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30632"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-30632",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-30632"
},
{
"category": "external",
"summary": "https://go.dev/issue/53416",
"url": "https://go.dev/issue/53416"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/nqrv9fbR0zE",
"url": "https://groups.google.com/g/golang-announce/c/nqrv9fbR0zE"
}
],
"release_date": "2022-07-12T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-03-06T18:38:53+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-rhel8@sha256:a403d057cd2ca820306207282007d4d117623e1a2ebb8bee67c19f5796f07f95_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:1042"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-adapter-rhel8@sha256:c79cb3c68317a224277a8ee0dc78832fcd4b6da18b9b5b074cffaad14e2f1aa5_amd64",
"8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-operator-bundle@sha256:44de4b736089166718956bebd456ad1a17e0e6f72c49f52804c6b6e60ef5a494_amd64",
"8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-rhel8-operator@sha256:5a149d0a0cdb6812acbef0c9b3031fb3cd84181e971198a6e17d8fd0bf5e6293_amd64",
"8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-rhel8@sha256:a403d057cd2ca820306207282007d4d117623e1a2ebb8bee67c19f5796f07f95_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "golang: path/filepath: stack exhaustion in Glob"
},
{
"cve": "CVE-2022-30633",
"cwe": {
"id": "CWE-1325",
"name": "Improperly Controlled Sequential Memory Allocation"
},
"discovery_date": "2022-07-14T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-adapter-rhel8@sha256:c79cb3c68317a224277a8ee0dc78832fcd4b6da18b9b5b074cffaad14e2f1aa5_amd64",
"8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-operator-bundle@sha256:44de4b736089166718956bebd456ad1a17e0e6f72c49f52804c6b6e60ef5a494_amd64",
"8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-rhel8-operator@sha256:5a149d0a0cdb6812acbef0c9b3031fb3cd84181e971198a6e17d8fd0bf5e6293_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2107392"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in golang. Calling Unmarshal on an XML document into a Go struct, which has a nested field that uses the \"any\" field tag, can cause a panic due to stack exhaustion.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: encoding/xml: stack exhaustion in Unmarshal",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-rhel8@sha256:a403d057cd2ca820306207282007d4d117623e1a2ebb8bee67c19f5796f07f95_amd64"
],
"known_not_affected": [
"8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-adapter-rhel8@sha256:c79cb3c68317a224277a8ee0dc78832fcd4b6da18b9b5b074cffaad14e2f1aa5_amd64",
"8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-operator-bundle@sha256:44de4b736089166718956bebd456ad1a17e0e6f72c49f52804c6b6e60ef5a494_amd64",
"8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-rhel8-operator@sha256:5a149d0a0cdb6812acbef0c9b3031fb3cd84181e971198a6e17d8fd0bf5e6293_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-30633"
},
{
"category": "external",
"summary": "RHBZ#2107392",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2107392"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-30633",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30633"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-30633",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-30633"
},
{
"category": "external",
"summary": "https://go.dev/issue/53611",
"url": "https://go.dev/issue/53611"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/nqrv9fbR0zE",
"url": "https://groups.google.com/g/golang-announce/c/nqrv9fbR0zE"
}
],
"release_date": "2022-07-12T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-03-06T18:38:53+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-rhel8@sha256:a403d057cd2ca820306207282007d4d117623e1a2ebb8bee67c19f5796f07f95_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:1042"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-adapter-rhel8@sha256:c79cb3c68317a224277a8ee0dc78832fcd4b6da18b9b5b074cffaad14e2f1aa5_amd64",
"8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-operator-bundle@sha256:44de4b736089166718956bebd456ad1a17e0e6f72c49f52804c6b6e60ef5a494_amd64",
"8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-rhel8-operator@sha256:5a149d0a0cdb6812acbef0c9b3031fb3cd84181e971198a6e17d8fd0bf5e6293_amd64",
"8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-rhel8@sha256:a403d057cd2ca820306207282007d4d117623e1a2ebb8bee67c19f5796f07f95_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "golang: encoding/xml: stack exhaustion in Unmarshal"
},
{
"cve": "CVE-2022-30635",
"cwe": {
"id": "CWE-1325",
"name": "Improperly Controlled Sequential Memory Allocation"
},
"discovery_date": "2022-07-14T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-adapter-rhel8@sha256:c79cb3c68317a224277a8ee0dc78832fcd4b6da18b9b5b074cffaad14e2f1aa5_amd64",
"8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-operator-bundle@sha256:44de4b736089166718956bebd456ad1a17e0e6f72c49f52804c6b6e60ef5a494_amd64",
"8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-rhel8-operator@sha256:5a149d0a0cdb6812acbef0c9b3031fb3cd84181e971198a6e17d8fd0bf5e6293_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2107388"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in golang. When calling Decoder, Decode on a message that contains deeply nested structures, a panic can occur due to stack exhaustion and allows an attacker to impact system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: encoding/gob: stack exhaustion in Decoder.Decode",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "OpenShift Container Platform (OCP) starting from 4.10 stream is already compiled in the patched version of Go, hence is not affected by this vulnerability.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-rhel8@sha256:a403d057cd2ca820306207282007d4d117623e1a2ebb8bee67c19f5796f07f95_amd64"
],
"known_not_affected": [
"8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-adapter-rhel8@sha256:c79cb3c68317a224277a8ee0dc78832fcd4b6da18b9b5b074cffaad14e2f1aa5_amd64",
"8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-operator-bundle@sha256:44de4b736089166718956bebd456ad1a17e0e6f72c49f52804c6b6e60ef5a494_amd64",
"8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-rhel8-operator@sha256:5a149d0a0cdb6812acbef0c9b3031fb3cd84181e971198a6e17d8fd0bf5e6293_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-30635"
},
{
"category": "external",
"summary": "RHBZ#2107388",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2107388"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-30635",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30635"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-30635",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-30635"
},
{
"category": "external",
"summary": "https://go.dev/issue/53615",
"url": "https://go.dev/issue/53615"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/nqrv9fbR0zE",
"url": "https://groups.google.com/g/golang-announce/c/nqrv9fbR0zE"
}
],
"release_date": "2022-07-12T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-03-06T18:38:53+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-rhel8@sha256:a403d057cd2ca820306207282007d4d117623e1a2ebb8bee67c19f5796f07f95_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:1042"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-adapter-rhel8@sha256:c79cb3c68317a224277a8ee0dc78832fcd4b6da18b9b5b074cffaad14e2f1aa5_amd64",
"8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-operator-bundle@sha256:44de4b736089166718956bebd456ad1a17e0e6f72c49f52804c6b6e60ef5a494_amd64",
"8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-rhel8-operator@sha256:5a149d0a0cdb6812acbef0c9b3031fb3cd84181e971198a6e17d8fd0bf5e6293_amd64",
"8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-rhel8@sha256:a403d057cd2ca820306207282007d4d117623e1a2ebb8bee67c19f5796f07f95_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "golang: encoding/gob: stack exhaustion in Decoder.Decode"
},
{
"cve": "CVE-2022-32148",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2022-07-14T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-adapter-rhel8@sha256:c79cb3c68317a224277a8ee0dc78832fcd4b6da18b9b5b074cffaad14e2f1aa5_amd64",
"8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-operator-bundle@sha256:44de4b736089166718956bebd456ad1a17e0e6f72c49f52804c6b6e60ef5a494_amd64",
"8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-rhel8-operator@sha256:5a149d0a0cdb6812acbef0c9b3031fb3cd84181e971198a6e17d8fd0bf5e6293_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2107383"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in net/http/httputil golang package. When httputil.ReverseProxy.ServeHTTP is called with a Request.Header map containing a nil value for the X-Forwarded-For header, ReverseProxy could set the client IP incorrectly. This issue may affect confidentiality.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: net/http/httputil: NewSingleHostReverseProxy - omit X-Forwarded-For not working",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-rhel8@sha256:a403d057cd2ca820306207282007d4d117623e1a2ebb8bee67c19f5796f07f95_amd64"
],
"known_not_affected": [
"8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-adapter-rhel8@sha256:c79cb3c68317a224277a8ee0dc78832fcd4b6da18b9b5b074cffaad14e2f1aa5_amd64",
"8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-operator-bundle@sha256:44de4b736089166718956bebd456ad1a17e0e6f72c49f52804c6b6e60ef5a494_amd64",
"8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-rhel8-operator@sha256:5a149d0a0cdb6812acbef0c9b3031fb3cd84181e971198a6e17d8fd0bf5e6293_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-32148"
},
{
"category": "external",
"summary": "RHBZ#2107383",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2107383"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-32148",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32148"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-32148",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-32148"
},
{
"category": "external",
"summary": "https://go.dev/issue/53423",
"url": "https://go.dev/issue/53423"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/nqrv9fbR0zE",
"url": "https://groups.google.com/g/golang-announce/c/nqrv9fbR0zE"
}
],
"release_date": "2022-07-12T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-03-06T18:38:53+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-rhel8@sha256:a403d057cd2ca820306207282007d4d117623e1a2ebb8bee67c19f5796f07f95_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:1042"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-adapter-rhel8@sha256:c79cb3c68317a224277a8ee0dc78832fcd4b6da18b9b5b074cffaad14e2f1aa5_amd64",
"8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-operator-bundle@sha256:44de4b736089166718956bebd456ad1a17e0e6f72c49f52804c6b6e60ef5a494_amd64",
"8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-rhel8-operator@sha256:5a149d0a0cdb6812acbef0c9b3031fb3cd84181e971198a6e17d8fd0bf5e6293_amd64",
"8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-rhel8@sha256:a403d057cd2ca820306207282007d4d117623e1a2ebb8bee67c19f5796f07f95_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "golang: net/http/httputil: NewSingleHostReverseProxy - omit X-Forwarded-For not working"
},
{
"cve": "CVE-2022-32149",
"cwe": {
"id": "CWE-407",
"name": "Inefficient Algorithmic Complexity"
},
"discovery_date": "2022-10-12T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-adapter-rhel8@sha256:c79cb3c68317a224277a8ee0dc78832fcd4b6da18b9b5b074cffaad14e2f1aa5_amd64",
"8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-operator-bundle@sha256:44de4b736089166718956bebd456ad1a17e0e6f72c49f52804c6b6e60ef5a494_amd64",
"8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-rhel8-operator@sha256:5a149d0a0cdb6812acbef0c9b3031fb3cd84181e971198a6e17d8fd0bf5e6293_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2134010"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in the golang.org/x/text/language package. An attacker can craft an Accept-Language header which ParseAcceptLanguage will take significant time to parse. This issue leads to a denial of service, and can impact availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: golang.org/x/text/language: ParseAcceptLanguage takes a long time to parse complex tags",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-rhel8@sha256:a403d057cd2ca820306207282007d4d117623e1a2ebb8bee67c19f5796f07f95_amd64"
],
"known_not_affected": [
"8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-adapter-rhel8@sha256:c79cb3c68317a224277a8ee0dc78832fcd4b6da18b9b5b074cffaad14e2f1aa5_amd64",
"8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-operator-bundle@sha256:44de4b736089166718956bebd456ad1a17e0e6f72c49f52804c6b6e60ef5a494_amd64",
"8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-rhel8-operator@sha256:5a149d0a0cdb6812acbef0c9b3031fb3cd84181e971198a6e17d8fd0bf5e6293_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-32149"
},
{
"category": "external",
"summary": "RHBZ#2134010",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2134010"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-32149",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32149"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-32149",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-32149"
},
{
"category": "external",
"summary": "https://go.dev/issue/56152",
"url": "https://go.dev/issue/56152"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-dev/c/qfPIly0X7aU",
"url": "https://groups.google.com/g/golang-dev/c/qfPIly0X7aU"
}
],
"release_date": "2022-10-11T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-03-06T18:38:53+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-rhel8@sha256:a403d057cd2ca820306207282007d4d117623e1a2ebb8bee67c19f5796f07f95_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:1042"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-adapter-rhel8@sha256:c79cb3c68317a224277a8ee0dc78832fcd4b6da18b9b5b074cffaad14e2f1aa5_amd64",
"8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-operator-bundle@sha256:44de4b736089166718956bebd456ad1a17e0e6f72c49f52804c6b6e60ef5a494_amd64",
"8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-rhel8-operator@sha256:5a149d0a0cdb6812acbef0c9b3031fb3cd84181e971198a6e17d8fd0bf5e6293_amd64",
"8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-rhel8@sha256:a403d057cd2ca820306207282007d4d117623e1a2ebb8bee67c19f5796f07f95_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "golang: golang.org/x/text/language: ParseAcceptLanguage takes a long time to parse complex tags"
},
{
"acknowledgments": [
{
"names": [
"Adam Korczynski"
],
"organization": "ADA Logics"
},
{
"names": [
"OSS-Fuzz"
]
}
],
"cve": "CVE-2022-41715",
"discovery_date": "2022-10-07T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-adapter-rhel8@sha256:c79cb3c68317a224277a8ee0dc78832fcd4b6da18b9b5b074cffaad14e2f1aa5_amd64",
"8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-operator-bundle@sha256:44de4b736089166718956bebd456ad1a17e0e6f72c49f52804c6b6e60ef5a494_amd64",
"8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-rhel8-operator@sha256:5a149d0a0cdb6812acbef0c9b3031fb3cd84181e971198a6e17d8fd0bf5e6293_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2132872"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the golang package, where programs that compile regular expressions from untrusted sources are vulnerable to memory exhaustion or a denial of service. The parsed regexp representation is linear in the input size. Still, in some cases, the constant factor can be as high as 40,000, making a relatively small regexp consume larger amounts of memory. After the fix, each regexp being parsed is limited to a 256 MB memory footprint. Regular expressions whose representation would use more space than that are rejected. Routine use of regular expressions is unaffected.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: regexp/syntax: limit memory used by parsing regexps",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The opportunity for a Denial of Service is limited to the golang runtime. In the case of OpenShift Container Platform, this would be restricted within each individual container. There are multiple layers of guide rails (Golang\u2019s Garbage Collector; OpenShift\u2019s resource constraints imposed at the container and cluster levels) which would require a malicious user to continue submitting attacks for there to be any enduring impact. They would also need access to external server resources to be able to send a massive volume of requests to cause a significant impact on server operations.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-rhel8@sha256:a403d057cd2ca820306207282007d4d117623e1a2ebb8bee67c19f5796f07f95_amd64"
],
"known_not_affected": [
"8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-adapter-rhel8@sha256:c79cb3c68317a224277a8ee0dc78832fcd4b6da18b9b5b074cffaad14e2f1aa5_amd64",
"8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-operator-bundle@sha256:44de4b736089166718956bebd456ad1a17e0e6f72c49f52804c6b6e60ef5a494_amd64",
"8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-rhel8-operator@sha256:5a149d0a0cdb6812acbef0c9b3031fb3cd84181e971198a6e17d8fd0bf5e6293_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-41715"
},
{
"category": "external",
"summary": "RHBZ#2132872",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2132872"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-41715",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41715"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-41715",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-41715"
},
{
"category": "external",
"summary": "https://github.com/golang/go/issues/55949",
"url": "https://github.com/golang/go/issues/55949"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/xtuG5faxtaU?pli=1",
"url": "https://groups.google.com/g/golang-announce/c/xtuG5faxtaU?pli=1"
}
],
"release_date": "2022-10-04T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-03-06T18:38:53+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-rhel8@sha256:a403d057cd2ca820306207282007d4d117623e1a2ebb8bee67c19f5796f07f95_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:1042"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-adapter-rhel8@sha256:c79cb3c68317a224277a8ee0dc78832fcd4b6da18b9b5b074cffaad14e2f1aa5_amd64",
"8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-operator-bundle@sha256:44de4b736089166718956bebd456ad1a17e0e6f72c49f52804c6b6e60ef5a494_amd64",
"8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-rhel8-operator@sha256:5a149d0a0cdb6812acbef0c9b3031fb3cd84181e971198a6e17d8fd0bf5e6293_amd64",
"8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-rhel8@sha256:a403d057cd2ca820306207282007d4d117623e1a2ebb8bee67c19f5796f07f95_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "golang: regexp/syntax: limit memory used by parsing regexps"
}
]
}
rhsa-2023_3613
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Red Hat OpenShift Container Platform release 4.12.22 is now available with updates to packages and images that fix several bugs and add enhancements.\n\nThis release includes a security update for Red Hat OpenShift Container Platform 4.12.\n\nRed Hat Product Security has rated this update as having a security impact of [impact]. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Red Hat OpenShift Container Platform is Red Hat\u0027s cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments.\n\nThis advisory contains the RPM packages for Red Hat OpenShift Container Platform 4.12.22. See the following advisory for the container images for this release:\n\nhttps://access.redhat.com/errata/RHSA-2023:3615\n\nSecurity Fix(es):\n\n* golang: archive/tar: unbounded memory consumption when reading headers (CVE-2022-2879)\n\n* golang: net/http/httputil: ReverseProxy should not forward unparseable query parameters (CVE-2022-2880)\n\n* golang: net/http: handle server errors after sending GOAWAY (CVE-2022-27664)\n\n* golang: golang.org/x/text/language: ParseAcceptLanguage takes a long time to parse complex tags (CVE-2022-32149)\n\n* golang: net/url: JoinPath does not strip relative path components in all circumstances (CVE-2022-32190)\n\n* golang: regexp/syntax: limit memory used by parsing regexps (CVE-2022-41715)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAll OpenShift Container Platform 4.12 users are advised to upgrade to these updated packages and images when they are available in the appropriate release channel. To check for available updates, use the OpenShift CLI (oc) or web console. Instructions for upgrading a cluster are available at https://docs.openshift.com/container-platform/4.12/updating/updating-cluster-cli.html.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2023:3613",
"url": "https://access.redhat.com/errata/RHSA-2023:3613"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#moderate",
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "https://docs.openshift.com/container-platform/4.12/release_notes/ocp-4-12-release-notes.html",
"url": "https://docs.openshift.com/container-platform/4.12/release_notes/ocp-4-12-release-notes.html"
},
{
"category": "external",
"summary": "2124668",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2124668"
},
{
"category": "external",
"summary": "2124669",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2124669"
},
{
"category": "external",
"summary": "2132867",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2132867"
},
{
"category": "external",
"summary": "2132868",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2132868"
},
{
"category": "external",
"summary": "2132872",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2132872"
},
{
"category": "external",
"summary": "2134010",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2134010"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2023/rhsa-2023_3613.json"
}
],
"title": "Red Hat Security Advisory: OpenShift Container Platform 4.12.22 packages and security update",
"tracking": {
"current_release_date": "2025-01-06T19:28:05+00:00",
"generator": {
"date": "2025-01-06T19:28:05+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.5"
}
},
"id": "RHSA-2023:3613",
"initial_release_date": "2023-06-26T01:19:15+00:00",
"revision_history": [
{
"date": "2023-06-26T01:19:15+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2023-06-26T01:19:15+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-01-06T19:28:05+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat OpenShift Container Platform 4.12",
"product": {
"name": "Red Hat OpenShift Container Platform 4.12",
"product_id": "9Base-RHOSE-4.12",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:openshift:4.12::el9"
}
}
},
{
"category": "product_name",
"name": "Red Hat OpenShift Container Platform 4.12",
"product": {
"name": "Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:openshift:4.12::el8"
}
}
}
],
"category": "product_family",
"name": "Red Hat OpenShift Enterprise"
},
{
"branches": [
{
"category": "product_version",
"name": "buildah-1:1.23.4-5.rhaos4.12.el9.src",
"product": {
"name": "buildah-1:1.23.4-5.rhaos4.12.el9.src",
"product_id": "buildah-1:1.23.4-5.rhaos4.12.el9.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/buildah@1.23.4-5.rhaos4.12.el9?arch=src\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "conmon-2:2.1.2-5.rhaos4.12.el9.src",
"product": {
"name": "conmon-2:2.1.2-5.rhaos4.12.el9.src",
"product_id": "conmon-2:2.1.2-5.rhaos4.12.el9.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/conmon@2.1.2-5.rhaos4.12.el9?arch=src\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "openshift-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el9.src",
"product": {
"name": "openshift-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el9.src",
"product_id": "openshift-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el9.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift@4.12.0-202306121916.p0.g8c21020.assembly.stream.el9?arch=src"
}
}
},
{
"category": "product_version",
"name": "openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.src",
"product": {
"name": "openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.src",
"product_id": "openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-clients@4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9?arch=src"
}
}
},
{
"category": "product_version",
"name": "podman-3:4.2.0-7.rhaos4.12.el9.src",
"product": {
"name": "podman-3:4.2.0-7.rhaos4.12.el9.src",
"product_id": "podman-3:4.2.0-7.rhaos4.12.el9.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman@4.2.0-7.rhaos4.12.el9?arch=src\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "skopeo-2:1.9.4-3.rhaos4.12.el9.src",
"product": {
"name": "skopeo-2:1.9.4-3.rhaos4.12.el9.src",
"product_id": "skopeo-2:1.9.4-3.rhaos4.12.el9.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/skopeo@1.9.4-3.rhaos4.12.el9?arch=src\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "buildah-1:1.23.4-5.1.rhaos4.12.el8.src",
"product": {
"name": "buildah-1:1.23.4-5.1.rhaos4.12.el8.src",
"product_id": "buildah-1:1.23.4-5.1.rhaos4.12.el8.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/buildah@1.23.4-5.1.rhaos4.12.el8?arch=src\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "conmon-2:2.1.2-4.rhaos4.12.el8.src",
"product": {
"name": "conmon-2:2.1.2-4.rhaos4.12.el8.src",
"product_id": "conmon-2:2.1.2-4.rhaos4.12.el8.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/conmon@2.1.2-4.rhaos4.12.el8?arch=src\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "containernetworking-plugins-0:1.0.1-7.rhaos4.12.el8.src",
"product": {
"name": "containernetworking-plugins-0:1.0.1-7.rhaos4.12.el8.src",
"product_id": "containernetworking-plugins-0:1.0.1-7.rhaos4.12.el8.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/containernetworking-plugins@1.0.1-7.rhaos4.12.el8?arch=src"
}
}
},
{
"category": "product_version",
"name": "kernel-0:4.18.0-372.59.1.el8_6.src",
"product": {
"name": "kernel-0:4.18.0-372.59.1.el8_6.src",
"product_id": "kernel-0:4.18.0-372.59.1.el8_6.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@4.18.0-372.59.1.el8_6?arch=src"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-0:4.18.0-372.59.1.rt7.217.el8_6.src",
"product": {
"name": "kernel-rt-0:4.18.0-372.59.1.rt7.217.el8_6.src",
"product_id": "kernel-rt-0:4.18.0-372.59.1.rt7.217.el8_6.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt@4.18.0-372.59.1.rt7.217.el8_6?arch=src"
}
}
},
{
"category": "product_version",
"name": "openshift-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el8.src",
"product": {
"name": "openshift-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el8.src",
"product_id": "openshift-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el8.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift@4.12.0-202306121916.p0.g8c21020.assembly.stream.el8?arch=src"
}
}
},
{
"category": "product_version",
"name": "openshift-ansible-0:4.12.0-202306090942.p0.g74dc7b3.assembly.stream.el8.src",
"product": {
"name": "openshift-ansible-0:4.12.0-202306090942.p0.g74dc7b3.assembly.stream.el8.src",
"product_id": "openshift-ansible-0:4.12.0-202306090942.p0.g74dc7b3.assembly.stream.el8.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-ansible@4.12.0-202306090942.p0.g74dc7b3.assembly.stream.el8?arch=src"
}
}
},
{
"category": "product_version",
"name": "openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.src",
"product": {
"name": "openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.src",
"product_id": "openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-clients@4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8?arch=src"
}
}
},
{
"category": "product_version",
"name": "openshift-kuryr-0:4.12.0-202306140156.p0.g31dd228.assembly.stream.el8.src",
"product": {
"name": "openshift-kuryr-0:4.12.0-202306140156.p0.g31dd228.assembly.stream.el8.src",
"product_id": "openshift-kuryr-0:4.12.0-202306140156.p0.g31dd228.assembly.stream.el8.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-kuryr@4.12.0-202306140156.p0.g31dd228.assembly.stream.el8?arch=src"
}
}
},
{
"category": "product_version",
"name": "openshift4-aws-iso-0:4.12.0-202306090942.p0.gd2acdd5.assembly.stream.el8.src",
"product": {
"name": "openshift4-aws-iso-0:4.12.0-202306090942.p0.gd2acdd5.assembly.stream.el8.src",
"product_id": "openshift4-aws-iso-0:4.12.0-202306090942.p0.gd2acdd5.assembly.stream.el8.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift4-aws-iso@4.12.0-202306090942.p0.gd2acdd5.assembly.stream.el8?arch=src"
}
}
},
{
"category": "product_version",
"name": "podman-3:4.2.0-6.1.rhaos4.12.el8.src",
"product": {
"name": "podman-3:4.2.0-6.1.rhaos4.12.el8.src",
"product_id": "podman-3:4.2.0-6.1.rhaos4.12.el8.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman@4.2.0-6.1.rhaos4.12.el8?arch=src\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "runc-3:1.1.6-4.rhaos4.12.el8.src",
"product": {
"name": "runc-3:1.1.6-4.rhaos4.12.el8.src",
"product_id": "runc-3:1.1.6-4.rhaos4.12.el8.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/runc@1.1.6-4.rhaos4.12.el8?arch=src\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "skopeo-2:1.9.4-3.1.rhaos4.12.el8.src",
"product": {
"name": "skopeo-2:1.9.4-3.1.rhaos4.12.el8.src",
"product_id": "skopeo-2:1.9.4-3.1.rhaos4.12.el8.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/skopeo@1.9.4-3.1.rhaos4.12.el8?arch=src\u0026epoch=2"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "buildah-1:1.23.4-5.rhaos4.12.el9.x86_64",
"product": {
"name": "buildah-1:1.23.4-5.rhaos4.12.el9.x86_64",
"product_id": "buildah-1:1.23.4-5.rhaos4.12.el9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/buildah@1.23.4-5.rhaos4.12.el9?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "buildah-tests-1:1.23.4-5.rhaos4.12.el9.x86_64",
"product": {
"name": "buildah-tests-1:1.23.4-5.rhaos4.12.el9.x86_64",
"product_id": "buildah-tests-1:1.23.4-5.rhaos4.12.el9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/buildah-tests@1.23.4-5.rhaos4.12.el9?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "buildah-debugsource-1:1.23.4-5.rhaos4.12.el9.x86_64",
"product": {
"name": "buildah-debugsource-1:1.23.4-5.rhaos4.12.el9.x86_64",
"product_id": "buildah-debugsource-1:1.23.4-5.rhaos4.12.el9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/buildah-debugsource@1.23.4-5.rhaos4.12.el9?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "buildah-debuginfo-1:1.23.4-5.rhaos4.12.el9.x86_64",
"product": {
"name": "buildah-debuginfo-1:1.23.4-5.rhaos4.12.el9.x86_64",
"product_id": "buildah-debuginfo-1:1.23.4-5.rhaos4.12.el9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/buildah-debuginfo@1.23.4-5.rhaos4.12.el9?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "buildah-tests-debuginfo-1:1.23.4-5.rhaos4.12.el9.x86_64",
"product": {
"name": "buildah-tests-debuginfo-1:1.23.4-5.rhaos4.12.el9.x86_64",
"product_id": "buildah-tests-debuginfo-1:1.23.4-5.rhaos4.12.el9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/buildah-tests-debuginfo@1.23.4-5.rhaos4.12.el9?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "conmon-2:2.1.2-5.rhaos4.12.el9.x86_64",
"product": {
"name": "conmon-2:2.1.2-5.rhaos4.12.el9.x86_64",
"product_id": "conmon-2:2.1.2-5.rhaos4.12.el9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/conmon@2.1.2-5.rhaos4.12.el9?arch=x86_64\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "conmon-debugsource-2:2.1.2-5.rhaos4.12.el9.x86_64",
"product": {
"name": "conmon-debugsource-2:2.1.2-5.rhaos4.12.el9.x86_64",
"product_id": "conmon-debugsource-2:2.1.2-5.rhaos4.12.el9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/conmon-debugsource@2.1.2-5.rhaos4.12.el9?arch=x86_64\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "conmon-debuginfo-2:2.1.2-5.rhaos4.12.el9.x86_64",
"product": {
"name": "conmon-debuginfo-2:2.1.2-5.rhaos4.12.el9.x86_64",
"product_id": "conmon-debuginfo-2:2.1.2-5.rhaos4.12.el9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/conmon-debuginfo@2.1.2-5.rhaos4.12.el9?arch=x86_64\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el9.x86_64",
"product": {
"name": "openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el9.x86_64",
"product_id": "openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-hyperkube@4.12.0-202306121916.p0.g8c21020.assembly.stream.el9?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.x86_64",
"product": {
"name": "openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.x86_64",
"product_id": "openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-clients@4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "openshift-clients-redistributable-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.x86_64",
"product": {
"name": "openshift-clients-redistributable-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.x86_64",
"product_id": "openshift-clients-redistributable-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-clients-redistributable@4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "podman-3:4.2.0-7.rhaos4.12.el9.x86_64",
"product": {
"name": "podman-3:4.2.0-7.rhaos4.12.el9.x86_64",
"product_id": "podman-3:4.2.0-7.rhaos4.12.el9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman@4.2.0-7.rhaos4.12.el9?arch=x86_64\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "podman-catatonit-3:4.2.0-7.rhaos4.12.el9.x86_64",
"product": {
"name": "podman-catatonit-3:4.2.0-7.rhaos4.12.el9.x86_64",
"product_id": "podman-catatonit-3:4.2.0-7.rhaos4.12.el9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-catatonit@4.2.0-7.rhaos4.12.el9?arch=x86_64\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "podman-gvproxy-3:4.2.0-7.rhaos4.12.el9.x86_64",
"product": {
"name": "podman-gvproxy-3:4.2.0-7.rhaos4.12.el9.x86_64",
"product_id": "podman-gvproxy-3:4.2.0-7.rhaos4.12.el9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-gvproxy@4.2.0-7.rhaos4.12.el9?arch=x86_64\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "podman-plugins-3:4.2.0-7.rhaos4.12.el9.x86_64",
"product": {
"name": "podman-plugins-3:4.2.0-7.rhaos4.12.el9.x86_64",
"product_id": "podman-plugins-3:4.2.0-7.rhaos4.12.el9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-plugins@4.2.0-7.rhaos4.12.el9?arch=x86_64\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "podman-remote-3:4.2.0-7.rhaos4.12.el9.x86_64",
"product": {
"name": "podman-remote-3:4.2.0-7.rhaos4.12.el9.x86_64",
"product_id": "podman-remote-3:4.2.0-7.rhaos4.12.el9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-remote@4.2.0-7.rhaos4.12.el9?arch=x86_64\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "podman-tests-3:4.2.0-7.rhaos4.12.el9.x86_64",
"product": {
"name": "podman-tests-3:4.2.0-7.rhaos4.12.el9.x86_64",
"product_id": "podman-tests-3:4.2.0-7.rhaos4.12.el9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-tests@4.2.0-7.rhaos4.12.el9?arch=x86_64\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "podman-debugsource-3:4.2.0-7.rhaos4.12.el9.x86_64",
"product": {
"name": "podman-debugsource-3:4.2.0-7.rhaos4.12.el9.x86_64",
"product_id": "podman-debugsource-3:4.2.0-7.rhaos4.12.el9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-debugsource@4.2.0-7.rhaos4.12.el9?arch=x86_64\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "podman-catatonit-debuginfo-3:4.2.0-7.rhaos4.12.el9.x86_64",
"product": {
"name": "podman-catatonit-debuginfo-3:4.2.0-7.rhaos4.12.el9.x86_64",
"product_id": "podman-catatonit-debuginfo-3:4.2.0-7.rhaos4.12.el9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-catatonit-debuginfo@4.2.0-7.rhaos4.12.el9?arch=x86_64\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "podman-debuginfo-3:4.2.0-7.rhaos4.12.el9.x86_64",
"product": {
"name": "podman-debuginfo-3:4.2.0-7.rhaos4.12.el9.x86_64",
"product_id": "podman-debuginfo-3:4.2.0-7.rhaos4.12.el9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-debuginfo@4.2.0-7.rhaos4.12.el9?arch=x86_64\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "podman-gvproxy-debuginfo-3:4.2.0-7.rhaos4.12.el9.x86_64",
"product": {
"name": "podman-gvproxy-debuginfo-3:4.2.0-7.rhaos4.12.el9.x86_64",
"product_id": "podman-gvproxy-debuginfo-3:4.2.0-7.rhaos4.12.el9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-gvproxy-debuginfo@4.2.0-7.rhaos4.12.el9?arch=x86_64\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "podman-plugins-debuginfo-3:4.2.0-7.rhaos4.12.el9.x86_64",
"product": {
"name": "podman-plugins-debuginfo-3:4.2.0-7.rhaos4.12.el9.x86_64",
"product_id": "podman-plugins-debuginfo-3:4.2.0-7.rhaos4.12.el9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-plugins-debuginfo@4.2.0-7.rhaos4.12.el9?arch=x86_64\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "podman-remote-debuginfo-3:4.2.0-7.rhaos4.12.el9.x86_64",
"product": {
"name": "podman-remote-debuginfo-3:4.2.0-7.rhaos4.12.el9.x86_64",
"product_id": "podman-remote-debuginfo-3:4.2.0-7.rhaos4.12.el9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-remote-debuginfo@4.2.0-7.rhaos4.12.el9?arch=x86_64\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "skopeo-2:1.9.4-3.rhaos4.12.el9.x86_64",
"product": {
"name": "skopeo-2:1.9.4-3.rhaos4.12.el9.x86_64",
"product_id": "skopeo-2:1.9.4-3.rhaos4.12.el9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/skopeo@1.9.4-3.rhaos4.12.el9?arch=x86_64\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "skopeo-tests-2:1.9.4-3.rhaos4.12.el9.x86_64",
"product": {
"name": "skopeo-tests-2:1.9.4-3.rhaos4.12.el9.x86_64",
"product_id": "skopeo-tests-2:1.9.4-3.rhaos4.12.el9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/skopeo-tests@1.9.4-3.rhaos4.12.el9?arch=x86_64\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "skopeo-debugsource-2:1.9.4-3.rhaos4.12.el9.x86_64",
"product": {
"name": "skopeo-debugsource-2:1.9.4-3.rhaos4.12.el9.x86_64",
"product_id": "skopeo-debugsource-2:1.9.4-3.rhaos4.12.el9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/skopeo-debugsource@1.9.4-3.rhaos4.12.el9?arch=x86_64\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "skopeo-debuginfo-2:1.9.4-3.rhaos4.12.el9.x86_64",
"product": {
"name": "skopeo-debuginfo-2:1.9.4-3.rhaos4.12.el9.x86_64",
"product_id": "skopeo-debuginfo-2:1.9.4-3.rhaos4.12.el9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/skopeo-debuginfo@1.9.4-3.rhaos4.12.el9?arch=x86_64\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "buildah-1:1.23.4-5.1.rhaos4.12.el8.x86_64",
"product": {
"name": "buildah-1:1.23.4-5.1.rhaos4.12.el8.x86_64",
"product_id": "buildah-1:1.23.4-5.1.rhaos4.12.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/buildah@1.23.4-5.1.rhaos4.12.el8?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "buildah-tests-1:1.23.4-5.1.rhaos4.12.el8.x86_64",
"product": {
"name": "buildah-tests-1:1.23.4-5.1.rhaos4.12.el8.x86_64",
"product_id": "buildah-tests-1:1.23.4-5.1.rhaos4.12.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/buildah-tests@1.23.4-5.1.rhaos4.12.el8?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "buildah-debugsource-1:1.23.4-5.1.rhaos4.12.el8.x86_64",
"product": {
"name": "buildah-debugsource-1:1.23.4-5.1.rhaos4.12.el8.x86_64",
"product_id": "buildah-debugsource-1:1.23.4-5.1.rhaos4.12.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/buildah-debugsource@1.23.4-5.1.rhaos4.12.el8?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "buildah-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.x86_64",
"product": {
"name": "buildah-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.x86_64",
"product_id": "buildah-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/buildah-debuginfo@1.23.4-5.1.rhaos4.12.el8?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "buildah-tests-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.x86_64",
"product": {
"name": "buildah-tests-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.x86_64",
"product_id": "buildah-tests-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/buildah-tests-debuginfo@1.23.4-5.1.rhaos4.12.el8?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "conmon-2:2.1.2-4.rhaos4.12.el8.x86_64",
"product": {
"name": "conmon-2:2.1.2-4.rhaos4.12.el8.x86_64",
"product_id": "conmon-2:2.1.2-4.rhaos4.12.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/conmon@2.1.2-4.rhaos4.12.el8?arch=x86_64\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "conmon-debugsource-2:2.1.2-4.rhaos4.12.el8.x86_64",
"product": {
"name": "conmon-debugsource-2:2.1.2-4.rhaos4.12.el8.x86_64",
"product_id": "conmon-debugsource-2:2.1.2-4.rhaos4.12.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/conmon-debugsource@2.1.2-4.rhaos4.12.el8?arch=x86_64\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "conmon-debuginfo-2:2.1.2-4.rhaos4.12.el8.x86_64",
"product": {
"name": "conmon-debuginfo-2:2.1.2-4.rhaos4.12.el8.x86_64",
"product_id": "conmon-debuginfo-2:2.1.2-4.rhaos4.12.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/conmon-debuginfo@2.1.2-4.rhaos4.12.el8?arch=x86_64\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "containernetworking-plugins-0:1.0.1-7.rhaos4.12.el8.x86_64",
"product": {
"name": "containernetworking-plugins-0:1.0.1-7.rhaos4.12.el8.x86_64",
"product_id": "containernetworking-plugins-0:1.0.1-7.rhaos4.12.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/containernetworking-plugins@1.0.1-7.rhaos4.12.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "containernetworking-plugins-debugsource-0:1.0.1-7.rhaos4.12.el8.x86_64",
"product": {
"name": "containernetworking-plugins-debugsource-0:1.0.1-7.rhaos4.12.el8.x86_64",
"product_id": "containernetworking-plugins-debugsource-0:1.0.1-7.rhaos4.12.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/containernetworking-plugins-debugsource@1.0.1-7.rhaos4.12.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "containernetworking-plugins-debuginfo-0:1.0.1-7.rhaos4.12.el8.x86_64",
"product": {
"name": "containernetworking-plugins-debuginfo-0:1.0.1-7.rhaos4.12.el8.x86_64",
"product_id": "containernetworking-plugins-debuginfo-0:1.0.1-7.rhaos4.12.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/containernetworking-plugins-debuginfo@1.0.1-7.rhaos4.12.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "bpftool-0:4.18.0-372.59.1.el8_6.x86_64",
"product": {
"name": "bpftool-0:4.18.0-372.59.1.el8_6.x86_64",
"product_id": "bpftool-0:4.18.0-372.59.1.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool@4.18.0-372.59.1.el8_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-0:4.18.0-372.59.1.el8_6.x86_64",
"product": {
"name": "kernel-0:4.18.0-372.59.1.el8_6.x86_64",
"product_id": "kernel-0:4.18.0-372.59.1.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@4.18.0-372.59.1.el8_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-core-0:4.18.0-372.59.1.el8_6.x86_64",
"product": {
"name": "kernel-core-0:4.18.0-372.59.1.el8_6.x86_64",
"product_id": "kernel-core-0:4.18.0-372.59.1.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-core@4.18.0-372.59.1.el8_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-cross-headers-0:4.18.0-372.59.1.el8_6.x86_64",
"product": {
"name": "kernel-cross-headers-0:4.18.0-372.59.1.el8_6.x86_64",
"product_id": "kernel-cross-headers-0:4.18.0-372.59.1.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-cross-headers@4.18.0-372.59.1.el8_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:4.18.0-372.59.1.el8_6.x86_64",
"product": {
"name": "kernel-debug-0:4.18.0-372.59.1.el8_6.x86_64",
"product_id": "kernel-debug-0:4.18.0-372.59.1.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@4.18.0-372.59.1.el8_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-core-0:4.18.0-372.59.1.el8_6.x86_64",
"product": {
"name": "kernel-debug-core-0:4.18.0-372.59.1.el8_6.x86_64",
"product_id": "kernel-debug-core-0:4.18.0-372.59.1.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-core@4.18.0-372.59.1.el8_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:4.18.0-372.59.1.el8_6.x86_64",
"product": {
"name": "kernel-debug-devel-0:4.18.0-372.59.1.el8_6.x86_64",
"product_id": "kernel-debug-devel-0:4.18.0-372.59.1.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@4.18.0-372.59.1.el8_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-0:4.18.0-372.59.1.el8_6.x86_64",
"product": {
"name": "kernel-debug-modules-0:4.18.0-372.59.1.el8_6.x86_64",
"product_id": "kernel-debug-modules-0:4.18.0-372.59.1.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules@4.18.0-372.59.1.el8_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-extra-0:4.18.0-372.59.1.el8_6.x86_64",
"product": {
"name": "kernel-debug-modules-extra-0:4.18.0-372.59.1.el8_6.x86_64",
"product_id": "kernel-debug-modules-extra-0:4.18.0-372.59.1.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules-extra@4.18.0-372.59.1.el8_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-internal-0:4.18.0-372.59.1.el8_6.x86_64",
"product": {
"name": "kernel-debug-modules-internal-0:4.18.0-372.59.1.el8_6.x86_64",
"product_id": "kernel-debug-modules-internal-0:4.18.0-372.59.1.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules-internal@4.18.0-372.59.1.el8_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:4.18.0-372.59.1.el8_6.x86_64",
"product": {
"name": "kernel-devel-0:4.18.0-372.59.1.el8_6.x86_64",
"product_id": "kernel-devel-0:4.18.0-372.59.1.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@4.18.0-372.59.1.el8_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:4.18.0-372.59.1.el8_6.x86_64",
"product": {
"name": "kernel-headers-0:4.18.0-372.59.1.el8_6.x86_64",
"product_id": "kernel-headers-0:4.18.0-372.59.1.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@4.18.0-372.59.1.el8_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-ipaclones-internal-0:4.18.0-372.59.1.el8_6.x86_64",
"product": {
"name": "kernel-ipaclones-internal-0:4.18.0-372.59.1.el8_6.x86_64",
"product_id": "kernel-ipaclones-internal-0:4.18.0-372.59.1.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-ipaclones-internal@4.18.0-372.59.1.el8_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-0:4.18.0-372.59.1.el8_6.x86_64",
"product": {
"name": "kernel-modules-0:4.18.0-372.59.1.el8_6.x86_64",
"product_id": "kernel-modules-0:4.18.0-372.59.1.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules@4.18.0-372.59.1.el8_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-extra-0:4.18.0-372.59.1.el8_6.x86_64",
"product": {
"name": "kernel-modules-extra-0:4.18.0-372.59.1.el8_6.x86_64",
"product_id": "kernel-modules-extra-0:4.18.0-372.59.1.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules-extra@4.18.0-372.59.1.el8_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-internal-0:4.18.0-372.59.1.el8_6.x86_64",
"product": {
"name": "kernel-modules-internal-0:4.18.0-372.59.1.el8_6.x86_64",
"product_id": "kernel-modules-internal-0:4.18.0-372.59.1.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules-internal@4.18.0-372.59.1.el8_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-selftests-internal-0:4.18.0-372.59.1.el8_6.x86_64",
"product": {
"name": "kernel-selftests-internal-0:4.18.0-372.59.1.el8_6.x86_64",
"product_id": "kernel-selftests-internal-0:4.18.0-372.59.1.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-selftests-internal@4.18.0-372.59.1.el8_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:4.18.0-372.59.1.el8_6.x86_64",
"product": {
"name": "kernel-tools-0:4.18.0-372.59.1.el8_6.x86_64",
"product_id": "kernel-tools-0:4.18.0-372.59.1.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@4.18.0-372.59.1.el8_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:4.18.0-372.59.1.el8_6.x86_64",
"product": {
"name": "kernel-tools-libs-0:4.18.0-372.59.1.el8_6.x86_64",
"product_id": "kernel-tools-libs-0:4.18.0-372.59.1.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@4.18.0-372.59.1.el8_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:4.18.0-372.59.1.el8_6.x86_64",
"product": {
"name": "kernel-tools-libs-devel-0:4.18.0-372.59.1.el8_6.x86_64",
"product_id": "kernel-tools-libs-devel-0:4.18.0-372.59.1.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@4.18.0-372.59.1.el8_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-0:4.18.0-372.59.1.el8_6.x86_64",
"product": {
"name": "perf-0:4.18.0-372.59.1.el8_6.x86_64",
"product_id": "perf-0:4.18.0-372.59.1.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@4.18.0-372.59.1.el8_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3-perf-0:4.18.0-372.59.1.el8_6.x86_64",
"product": {
"name": "python3-perf-0:4.18.0-372.59.1.el8_6.x86_64",
"product_id": "python3-perf-0:4.18.0-372.59.1.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf@4.18.0-372.59.1.el8_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "bpftool-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64",
"product": {
"name": "bpftool-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64",
"product_id": "bpftool-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool-debuginfo@4.18.0-372.59.1.el8_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64",
"product": {
"name": "kernel-debug-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64",
"product_id": "kernel-debug-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.18.0-372.59.1.el8_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64",
"product": {
"name": "kernel-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64",
"product_id": "kernel-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@4.18.0-372.59.1.el8_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-x86_64-0:4.18.0-372.59.1.el8_6.x86_64",
"product": {
"name": "kernel-debuginfo-common-x86_64-0:4.18.0-372.59.1.el8_6.x86_64",
"product_id": "kernel-debuginfo-common-x86_64-0:4.18.0-372.59.1.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-x86_64@4.18.0-372.59.1.el8_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64",
"product": {
"name": "kernel-tools-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64",
"product_id": "kernel-tools-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.18.0-372.59.1.el8_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64",
"product": {
"name": "perf-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64",
"product_id": "perf-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@4.18.0-372.59.1.el8_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3-perf-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64",
"product": {
"name": "python3-perf-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64",
"product_id": "python3-perf-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf-debuginfo@4.18.0-372.59.1.el8_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"product": {
"name": "kernel-rt-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"product_id": "kernel-rt-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt@4.18.0-372.59.1.rt7.217.el8_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-core-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"product": {
"name": "kernel-rt-core-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"product_id": "kernel-rt-core-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-core@4.18.0-372.59.1.rt7.217.el8_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"product": {
"name": "kernel-rt-debug-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"product_id": "kernel-rt-debug-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug@4.18.0-372.59.1.rt7.217.el8_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-core-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"product": {
"name": "kernel-rt-debug-core-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"product_id": "kernel-rt-debug-core-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-core@4.18.0-372.59.1.rt7.217.el8_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-devel-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"product": {
"name": "kernel-rt-debug-devel-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"product_id": "kernel-rt-debug-devel-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-devel@4.18.0-372.59.1.rt7.217.el8_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-kvm-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"product": {
"name": "kernel-rt-debug-kvm-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"product_id": "kernel-rt-debug-kvm-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-kvm@4.18.0-372.59.1.rt7.217.el8_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-modules-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"product": {
"name": "kernel-rt-debug-modules-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"product_id": "kernel-rt-debug-modules-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-modules@4.18.0-372.59.1.rt7.217.el8_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-modules-extra-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"product": {
"name": "kernel-rt-debug-modules-extra-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"product_id": "kernel-rt-debug-modules-extra-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-modules-extra@4.18.0-372.59.1.rt7.217.el8_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-modules-internal-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"product": {
"name": "kernel-rt-debug-modules-internal-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"product_id": "kernel-rt-debug-modules-internal-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-modules-internal@4.18.0-372.59.1.rt7.217.el8_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-devel-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"product": {
"name": "kernel-rt-devel-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"product_id": "kernel-rt-devel-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-devel@4.18.0-372.59.1.rt7.217.el8_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-kvm-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"product": {
"name": "kernel-rt-kvm-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"product_id": "kernel-rt-kvm-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-kvm@4.18.0-372.59.1.rt7.217.el8_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-modules-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"product": {
"name": "kernel-rt-modules-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"product_id": "kernel-rt-modules-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-modules@4.18.0-372.59.1.rt7.217.el8_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-modules-extra-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"product": {
"name": "kernel-rt-modules-extra-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"product_id": "kernel-rt-modules-extra-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-modules-extra@4.18.0-372.59.1.rt7.217.el8_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-modules-internal-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"product": {
"name": "kernel-rt-modules-internal-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"product_id": "kernel-rt-modules-internal-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-modules-internal@4.18.0-372.59.1.rt7.217.el8_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-selftests-internal-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"product": {
"name": "kernel-rt-selftests-internal-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"product_id": "kernel-rt-selftests-internal-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-selftests-internal@4.18.0-372.59.1.rt7.217.el8_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-debuginfo-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"product": {
"name": "kernel-rt-debug-debuginfo-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"product_id": "kernel-rt-debug-debuginfo-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-debuginfo@4.18.0-372.59.1.rt7.217.el8_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debuginfo-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"product": {
"name": "kernel-rt-debuginfo-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"product_id": "kernel-rt-debuginfo-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debuginfo@4.18.0-372.59.1.rt7.217.el8_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"product": {
"name": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"product_id": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debuginfo-common-x86_64@4.18.0-372.59.1.rt7.217.el8_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el8.x86_64",
"product": {
"name": "openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el8.x86_64",
"product_id": "openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-hyperkube@4.12.0-202306121916.p0.g8c21020.assembly.stream.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.x86_64",
"product": {
"name": "openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.x86_64",
"product_id": "openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-clients@4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "openshift-clients-redistributable-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.x86_64",
"product": {
"name": "openshift-clients-redistributable-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.x86_64",
"product_id": "openshift-clients-redistributable-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-clients-redistributable@4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "podman-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"product": {
"name": "podman-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"product_id": "podman-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman@4.2.0-6.1.rhaos4.12.el8?arch=x86_64\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "podman-catatonit-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"product": {
"name": "podman-catatonit-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"product_id": "podman-catatonit-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-catatonit@4.2.0-6.1.rhaos4.12.el8?arch=x86_64\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "podman-gvproxy-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"product": {
"name": "podman-gvproxy-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"product_id": "podman-gvproxy-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-gvproxy@4.2.0-6.1.rhaos4.12.el8?arch=x86_64\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "podman-plugins-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"product": {
"name": "podman-plugins-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"product_id": "podman-plugins-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-plugins@4.2.0-6.1.rhaos4.12.el8?arch=x86_64\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "podman-remote-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"product": {
"name": "podman-remote-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"product_id": "podman-remote-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-remote@4.2.0-6.1.rhaos4.12.el8?arch=x86_64\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "podman-tests-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"product": {
"name": "podman-tests-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"product_id": "podman-tests-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-tests@4.2.0-6.1.rhaos4.12.el8?arch=x86_64\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "podman-debugsource-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"product": {
"name": "podman-debugsource-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"product_id": "podman-debugsource-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-debugsource@4.2.0-6.1.rhaos4.12.el8?arch=x86_64\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "podman-catatonit-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"product": {
"name": "podman-catatonit-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"product_id": "podman-catatonit-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-catatonit-debuginfo@4.2.0-6.1.rhaos4.12.el8?arch=x86_64\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "podman-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"product": {
"name": "podman-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"product_id": "podman-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-debuginfo@4.2.0-6.1.rhaos4.12.el8?arch=x86_64\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "podman-gvproxy-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"product": {
"name": "podman-gvproxy-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"product_id": "podman-gvproxy-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-gvproxy-debuginfo@4.2.0-6.1.rhaos4.12.el8?arch=x86_64\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "podman-plugins-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"product": {
"name": "podman-plugins-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"product_id": "podman-plugins-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-plugins-debuginfo@4.2.0-6.1.rhaos4.12.el8?arch=x86_64\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "podman-remote-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"product": {
"name": "podman-remote-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"product_id": "podman-remote-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-remote-debuginfo@4.2.0-6.1.rhaos4.12.el8?arch=x86_64\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "runc-3:1.1.6-4.rhaos4.12.el8.x86_64",
"product": {
"name": "runc-3:1.1.6-4.rhaos4.12.el8.x86_64",
"product_id": "runc-3:1.1.6-4.rhaos4.12.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/runc@1.1.6-4.rhaos4.12.el8?arch=x86_64\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "runc-debugsource-3:1.1.6-4.rhaos4.12.el8.x86_64",
"product": {
"name": "runc-debugsource-3:1.1.6-4.rhaos4.12.el8.x86_64",
"product_id": "runc-debugsource-3:1.1.6-4.rhaos4.12.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/runc-debugsource@1.1.6-4.rhaos4.12.el8?arch=x86_64\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "runc-debuginfo-3:1.1.6-4.rhaos4.12.el8.x86_64",
"product": {
"name": "runc-debuginfo-3:1.1.6-4.rhaos4.12.el8.x86_64",
"product_id": "runc-debuginfo-3:1.1.6-4.rhaos4.12.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/runc-debuginfo@1.1.6-4.rhaos4.12.el8?arch=x86_64\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "skopeo-2:1.9.4-3.1.rhaos4.12.el8.x86_64",
"product": {
"name": "skopeo-2:1.9.4-3.1.rhaos4.12.el8.x86_64",
"product_id": "skopeo-2:1.9.4-3.1.rhaos4.12.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/skopeo@1.9.4-3.1.rhaos4.12.el8?arch=x86_64\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "skopeo-tests-2:1.9.4-3.1.rhaos4.12.el8.x86_64",
"product": {
"name": "skopeo-tests-2:1.9.4-3.1.rhaos4.12.el8.x86_64",
"product_id": "skopeo-tests-2:1.9.4-3.1.rhaos4.12.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/skopeo-tests@1.9.4-3.1.rhaos4.12.el8?arch=x86_64\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "skopeo-debugsource-2:1.9.4-3.1.rhaos4.12.el8.x86_64",
"product": {
"name": "skopeo-debugsource-2:1.9.4-3.1.rhaos4.12.el8.x86_64",
"product_id": "skopeo-debugsource-2:1.9.4-3.1.rhaos4.12.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/skopeo-debugsource@1.9.4-3.1.rhaos4.12.el8?arch=x86_64\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "skopeo-debuginfo-2:1.9.4-3.1.rhaos4.12.el8.x86_64",
"product": {
"name": "skopeo-debuginfo-2:1.9.4-3.1.rhaos4.12.el8.x86_64",
"product_id": "skopeo-debuginfo-2:1.9.4-3.1.rhaos4.12.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/skopeo-debuginfo@1.9.4-3.1.rhaos4.12.el8?arch=x86_64\u0026epoch=2"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "buildah-1:1.23.4-5.rhaos4.12.el9.aarch64",
"product": {
"name": "buildah-1:1.23.4-5.rhaos4.12.el9.aarch64",
"product_id": "buildah-1:1.23.4-5.rhaos4.12.el9.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/buildah@1.23.4-5.rhaos4.12.el9?arch=aarch64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "buildah-tests-1:1.23.4-5.rhaos4.12.el9.aarch64",
"product": {
"name": "buildah-tests-1:1.23.4-5.rhaos4.12.el9.aarch64",
"product_id": "buildah-tests-1:1.23.4-5.rhaos4.12.el9.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/buildah-tests@1.23.4-5.rhaos4.12.el9?arch=aarch64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "buildah-debugsource-1:1.23.4-5.rhaos4.12.el9.aarch64",
"product": {
"name": "buildah-debugsource-1:1.23.4-5.rhaos4.12.el9.aarch64",
"product_id": "buildah-debugsource-1:1.23.4-5.rhaos4.12.el9.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/buildah-debugsource@1.23.4-5.rhaos4.12.el9?arch=aarch64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "buildah-debuginfo-1:1.23.4-5.rhaos4.12.el9.aarch64",
"product": {
"name": "buildah-debuginfo-1:1.23.4-5.rhaos4.12.el9.aarch64",
"product_id": "buildah-debuginfo-1:1.23.4-5.rhaos4.12.el9.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/buildah-debuginfo@1.23.4-5.rhaos4.12.el9?arch=aarch64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "buildah-tests-debuginfo-1:1.23.4-5.rhaos4.12.el9.aarch64",
"product": {
"name": "buildah-tests-debuginfo-1:1.23.4-5.rhaos4.12.el9.aarch64",
"product_id": "buildah-tests-debuginfo-1:1.23.4-5.rhaos4.12.el9.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/buildah-tests-debuginfo@1.23.4-5.rhaos4.12.el9?arch=aarch64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "conmon-2:2.1.2-5.rhaos4.12.el9.aarch64",
"product": {
"name": "conmon-2:2.1.2-5.rhaos4.12.el9.aarch64",
"product_id": "conmon-2:2.1.2-5.rhaos4.12.el9.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/conmon@2.1.2-5.rhaos4.12.el9?arch=aarch64\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "conmon-debugsource-2:2.1.2-5.rhaos4.12.el9.aarch64",
"product": {
"name": "conmon-debugsource-2:2.1.2-5.rhaos4.12.el9.aarch64",
"product_id": "conmon-debugsource-2:2.1.2-5.rhaos4.12.el9.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/conmon-debugsource@2.1.2-5.rhaos4.12.el9?arch=aarch64\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "conmon-debuginfo-2:2.1.2-5.rhaos4.12.el9.aarch64",
"product": {
"name": "conmon-debuginfo-2:2.1.2-5.rhaos4.12.el9.aarch64",
"product_id": "conmon-debuginfo-2:2.1.2-5.rhaos4.12.el9.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/conmon-debuginfo@2.1.2-5.rhaos4.12.el9?arch=aarch64\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el9.aarch64",
"product": {
"name": "openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el9.aarch64",
"product_id": "openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el9.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-hyperkube@4.12.0-202306121916.p0.g8c21020.assembly.stream.el9?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.aarch64",
"product": {
"name": "openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.aarch64",
"product_id": "openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-clients@4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "podman-3:4.2.0-7.rhaos4.12.el9.aarch64",
"product": {
"name": "podman-3:4.2.0-7.rhaos4.12.el9.aarch64",
"product_id": "podman-3:4.2.0-7.rhaos4.12.el9.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman@4.2.0-7.rhaos4.12.el9?arch=aarch64\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "podman-catatonit-3:4.2.0-7.rhaos4.12.el9.aarch64",
"product": {
"name": "podman-catatonit-3:4.2.0-7.rhaos4.12.el9.aarch64",
"product_id": "podman-catatonit-3:4.2.0-7.rhaos4.12.el9.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-catatonit@4.2.0-7.rhaos4.12.el9?arch=aarch64\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "podman-gvproxy-3:4.2.0-7.rhaos4.12.el9.aarch64",
"product": {
"name": "podman-gvproxy-3:4.2.0-7.rhaos4.12.el9.aarch64",
"product_id": "podman-gvproxy-3:4.2.0-7.rhaos4.12.el9.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-gvproxy@4.2.0-7.rhaos4.12.el9?arch=aarch64\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "podman-plugins-3:4.2.0-7.rhaos4.12.el9.aarch64",
"product": {
"name": "podman-plugins-3:4.2.0-7.rhaos4.12.el9.aarch64",
"product_id": "podman-plugins-3:4.2.0-7.rhaos4.12.el9.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-plugins@4.2.0-7.rhaos4.12.el9?arch=aarch64\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "podman-remote-3:4.2.0-7.rhaos4.12.el9.aarch64",
"product": {
"name": "podman-remote-3:4.2.0-7.rhaos4.12.el9.aarch64",
"product_id": "podman-remote-3:4.2.0-7.rhaos4.12.el9.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-remote@4.2.0-7.rhaos4.12.el9?arch=aarch64\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "podman-tests-3:4.2.0-7.rhaos4.12.el9.aarch64",
"product": {
"name": "podman-tests-3:4.2.0-7.rhaos4.12.el9.aarch64",
"product_id": "podman-tests-3:4.2.0-7.rhaos4.12.el9.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-tests@4.2.0-7.rhaos4.12.el9?arch=aarch64\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "podman-debugsource-3:4.2.0-7.rhaos4.12.el9.aarch64",
"product": {
"name": "podman-debugsource-3:4.2.0-7.rhaos4.12.el9.aarch64",
"product_id": "podman-debugsource-3:4.2.0-7.rhaos4.12.el9.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-debugsource@4.2.0-7.rhaos4.12.el9?arch=aarch64\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "podman-catatonit-debuginfo-3:4.2.0-7.rhaos4.12.el9.aarch64",
"product": {
"name": "podman-catatonit-debuginfo-3:4.2.0-7.rhaos4.12.el9.aarch64",
"product_id": "podman-catatonit-debuginfo-3:4.2.0-7.rhaos4.12.el9.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-catatonit-debuginfo@4.2.0-7.rhaos4.12.el9?arch=aarch64\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "podman-debuginfo-3:4.2.0-7.rhaos4.12.el9.aarch64",
"product": {
"name": "podman-debuginfo-3:4.2.0-7.rhaos4.12.el9.aarch64",
"product_id": "podman-debuginfo-3:4.2.0-7.rhaos4.12.el9.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-debuginfo@4.2.0-7.rhaos4.12.el9?arch=aarch64\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "podman-gvproxy-debuginfo-3:4.2.0-7.rhaos4.12.el9.aarch64",
"product": {
"name": "podman-gvproxy-debuginfo-3:4.2.0-7.rhaos4.12.el9.aarch64",
"product_id": "podman-gvproxy-debuginfo-3:4.2.0-7.rhaos4.12.el9.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-gvproxy-debuginfo@4.2.0-7.rhaos4.12.el9?arch=aarch64\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "podman-plugins-debuginfo-3:4.2.0-7.rhaos4.12.el9.aarch64",
"product": {
"name": "podman-plugins-debuginfo-3:4.2.0-7.rhaos4.12.el9.aarch64",
"product_id": "podman-plugins-debuginfo-3:4.2.0-7.rhaos4.12.el9.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-plugins-debuginfo@4.2.0-7.rhaos4.12.el9?arch=aarch64\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "podman-remote-debuginfo-3:4.2.0-7.rhaos4.12.el9.aarch64",
"product": {
"name": "podman-remote-debuginfo-3:4.2.0-7.rhaos4.12.el9.aarch64",
"product_id": "podman-remote-debuginfo-3:4.2.0-7.rhaos4.12.el9.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-remote-debuginfo@4.2.0-7.rhaos4.12.el9?arch=aarch64\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "skopeo-2:1.9.4-3.rhaos4.12.el9.aarch64",
"product": {
"name": "skopeo-2:1.9.4-3.rhaos4.12.el9.aarch64",
"product_id": "skopeo-2:1.9.4-3.rhaos4.12.el9.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/skopeo@1.9.4-3.rhaos4.12.el9?arch=aarch64\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "skopeo-tests-2:1.9.4-3.rhaos4.12.el9.aarch64",
"product": {
"name": "skopeo-tests-2:1.9.4-3.rhaos4.12.el9.aarch64",
"product_id": "skopeo-tests-2:1.9.4-3.rhaos4.12.el9.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/skopeo-tests@1.9.4-3.rhaos4.12.el9?arch=aarch64\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "skopeo-debugsource-2:1.9.4-3.rhaos4.12.el9.aarch64",
"product": {
"name": "skopeo-debugsource-2:1.9.4-3.rhaos4.12.el9.aarch64",
"product_id": "skopeo-debugsource-2:1.9.4-3.rhaos4.12.el9.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/skopeo-debugsource@1.9.4-3.rhaos4.12.el9?arch=aarch64\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "skopeo-debuginfo-2:1.9.4-3.rhaos4.12.el9.aarch64",
"product": {
"name": "skopeo-debuginfo-2:1.9.4-3.rhaos4.12.el9.aarch64",
"product_id": "skopeo-debuginfo-2:1.9.4-3.rhaos4.12.el9.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/skopeo-debuginfo@1.9.4-3.rhaos4.12.el9?arch=aarch64\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "buildah-1:1.23.4-5.1.rhaos4.12.el8.aarch64",
"product": {
"name": "buildah-1:1.23.4-5.1.rhaos4.12.el8.aarch64",
"product_id": "buildah-1:1.23.4-5.1.rhaos4.12.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/buildah@1.23.4-5.1.rhaos4.12.el8?arch=aarch64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "buildah-tests-1:1.23.4-5.1.rhaos4.12.el8.aarch64",
"product": {
"name": "buildah-tests-1:1.23.4-5.1.rhaos4.12.el8.aarch64",
"product_id": "buildah-tests-1:1.23.4-5.1.rhaos4.12.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/buildah-tests@1.23.4-5.1.rhaos4.12.el8?arch=aarch64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "buildah-debugsource-1:1.23.4-5.1.rhaos4.12.el8.aarch64",
"product": {
"name": "buildah-debugsource-1:1.23.4-5.1.rhaos4.12.el8.aarch64",
"product_id": "buildah-debugsource-1:1.23.4-5.1.rhaos4.12.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/buildah-debugsource@1.23.4-5.1.rhaos4.12.el8?arch=aarch64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "buildah-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.aarch64",
"product": {
"name": "buildah-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.aarch64",
"product_id": "buildah-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/buildah-debuginfo@1.23.4-5.1.rhaos4.12.el8?arch=aarch64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "buildah-tests-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.aarch64",
"product": {
"name": "buildah-tests-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.aarch64",
"product_id": "buildah-tests-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/buildah-tests-debuginfo@1.23.4-5.1.rhaos4.12.el8?arch=aarch64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "conmon-2:2.1.2-4.rhaos4.12.el8.aarch64",
"product": {
"name": "conmon-2:2.1.2-4.rhaos4.12.el8.aarch64",
"product_id": "conmon-2:2.1.2-4.rhaos4.12.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/conmon@2.1.2-4.rhaos4.12.el8?arch=aarch64\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "conmon-debugsource-2:2.1.2-4.rhaos4.12.el8.aarch64",
"product": {
"name": "conmon-debugsource-2:2.1.2-4.rhaos4.12.el8.aarch64",
"product_id": "conmon-debugsource-2:2.1.2-4.rhaos4.12.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/conmon-debugsource@2.1.2-4.rhaos4.12.el8?arch=aarch64\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "conmon-debuginfo-2:2.1.2-4.rhaos4.12.el8.aarch64",
"product": {
"name": "conmon-debuginfo-2:2.1.2-4.rhaos4.12.el8.aarch64",
"product_id": "conmon-debuginfo-2:2.1.2-4.rhaos4.12.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/conmon-debuginfo@2.1.2-4.rhaos4.12.el8?arch=aarch64\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "containernetworking-plugins-0:1.0.1-7.rhaos4.12.el8.aarch64",
"product": {
"name": "containernetworking-plugins-0:1.0.1-7.rhaos4.12.el8.aarch64",
"product_id": "containernetworking-plugins-0:1.0.1-7.rhaos4.12.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/containernetworking-plugins@1.0.1-7.rhaos4.12.el8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "containernetworking-plugins-debugsource-0:1.0.1-7.rhaos4.12.el8.aarch64",
"product": {
"name": "containernetworking-plugins-debugsource-0:1.0.1-7.rhaos4.12.el8.aarch64",
"product_id": "containernetworking-plugins-debugsource-0:1.0.1-7.rhaos4.12.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/containernetworking-plugins-debugsource@1.0.1-7.rhaos4.12.el8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "containernetworking-plugins-debuginfo-0:1.0.1-7.rhaos4.12.el8.aarch64",
"product": {
"name": "containernetworking-plugins-debuginfo-0:1.0.1-7.rhaos4.12.el8.aarch64",
"product_id": "containernetworking-plugins-debuginfo-0:1.0.1-7.rhaos4.12.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/containernetworking-plugins-debuginfo@1.0.1-7.rhaos4.12.el8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "bpftool-0:4.18.0-372.59.1.el8_6.aarch64",
"product": {
"name": "bpftool-0:4.18.0-372.59.1.el8_6.aarch64",
"product_id": "bpftool-0:4.18.0-372.59.1.el8_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool@4.18.0-372.59.1.el8_6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-0:4.18.0-372.59.1.el8_6.aarch64",
"product": {
"name": "kernel-0:4.18.0-372.59.1.el8_6.aarch64",
"product_id": "kernel-0:4.18.0-372.59.1.el8_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@4.18.0-372.59.1.el8_6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-core-0:4.18.0-372.59.1.el8_6.aarch64",
"product": {
"name": "kernel-core-0:4.18.0-372.59.1.el8_6.aarch64",
"product_id": "kernel-core-0:4.18.0-372.59.1.el8_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-core@4.18.0-372.59.1.el8_6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-cross-headers-0:4.18.0-372.59.1.el8_6.aarch64",
"product": {
"name": "kernel-cross-headers-0:4.18.0-372.59.1.el8_6.aarch64",
"product_id": "kernel-cross-headers-0:4.18.0-372.59.1.el8_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-cross-headers@4.18.0-372.59.1.el8_6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:4.18.0-372.59.1.el8_6.aarch64",
"product": {
"name": "kernel-debug-0:4.18.0-372.59.1.el8_6.aarch64",
"product_id": "kernel-debug-0:4.18.0-372.59.1.el8_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@4.18.0-372.59.1.el8_6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-core-0:4.18.0-372.59.1.el8_6.aarch64",
"product": {
"name": "kernel-debug-core-0:4.18.0-372.59.1.el8_6.aarch64",
"product_id": "kernel-debug-core-0:4.18.0-372.59.1.el8_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-core@4.18.0-372.59.1.el8_6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:4.18.0-372.59.1.el8_6.aarch64",
"product": {
"name": "kernel-debug-devel-0:4.18.0-372.59.1.el8_6.aarch64",
"product_id": "kernel-debug-devel-0:4.18.0-372.59.1.el8_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@4.18.0-372.59.1.el8_6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-0:4.18.0-372.59.1.el8_6.aarch64",
"product": {
"name": "kernel-debug-modules-0:4.18.0-372.59.1.el8_6.aarch64",
"product_id": "kernel-debug-modules-0:4.18.0-372.59.1.el8_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules@4.18.0-372.59.1.el8_6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-extra-0:4.18.0-372.59.1.el8_6.aarch64",
"product": {
"name": "kernel-debug-modules-extra-0:4.18.0-372.59.1.el8_6.aarch64",
"product_id": "kernel-debug-modules-extra-0:4.18.0-372.59.1.el8_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules-extra@4.18.0-372.59.1.el8_6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-internal-0:4.18.0-372.59.1.el8_6.aarch64",
"product": {
"name": "kernel-debug-modules-internal-0:4.18.0-372.59.1.el8_6.aarch64",
"product_id": "kernel-debug-modules-internal-0:4.18.0-372.59.1.el8_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules-internal@4.18.0-372.59.1.el8_6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:4.18.0-372.59.1.el8_6.aarch64",
"product": {
"name": "kernel-devel-0:4.18.0-372.59.1.el8_6.aarch64",
"product_id": "kernel-devel-0:4.18.0-372.59.1.el8_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@4.18.0-372.59.1.el8_6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:4.18.0-372.59.1.el8_6.aarch64",
"product": {
"name": "kernel-headers-0:4.18.0-372.59.1.el8_6.aarch64",
"product_id": "kernel-headers-0:4.18.0-372.59.1.el8_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@4.18.0-372.59.1.el8_6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-0:4.18.0-372.59.1.el8_6.aarch64",
"product": {
"name": "kernel-modules-0:4.18.0-372.59.1.el8_6.aarch64",
"product_id": "kernel-modules-0:4.18.0-372.59.1.el8_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules@4.18.0-372.59.1.el8_6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-extra-0:4.18.0-372.59.1.el8_6.aarch64",
"product": {
"name": "kernel-modules-extra-0:4.18.0-372.59.1.el8_6.aarch64",
"product_id": "kernel-modules-extra-0:4.18.0-372.59.1.el8_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules-extra@4.18.0-372.59.1.el8_6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-internal-0:4.18.0-372.59.1.el8_6.aarch64",
"product": {
"name": "kernel-modules-internal-0:4.18.0-372.59.1.el8_6.aarch64",
"product_id": "kernel-modules-internal-0:4.18.0-372.59.1.el8_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules-internal@4.18.0-372.59.1.el8_6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-selftests-internal-0:4.18.0-372.59.1.el8_6.aarch64",
"product": {
"name": "kernel-selftests-internal-0:4.18.0-372.59.1.el8_6.aarch64",
"product_id": "kernel-selftests-internal-0:4.18.0-372.59.1.el8_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-selftests-internal@4.18.0-372.59.1.el8_6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:4.18.0-372.59.1.el8_6.aarch64",
"product": {
"name": "kernel-tools-0:4.18.0-372.59.1.el8_6.aarch64",
"product_id": "kernel-tools-0:4.18.0-372.59.1.el8_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@4.18.0-372.59.1.el8_6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:4.18.0-372.59.1.el8_6.aarch64",
"product": {
"name": "kernel-tools-libs-0:4.18.0-372.59.1.el8_6.aarch64",
"product_id": "kernel-tools-libs-0:4.18.0-372.59.1.el8_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@4.18.0-372.59.1.el8_6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:4.18.0-372.59.1.el8_6.aarch64",
"product": {
"name": "kernel-tools-libs-devel-0:4.18.0-372.59.1.el8_6.aarch64",
"product_id": "kernel-tools-libs-devel-0:4.18.0-372.59.1.el8_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@4.18.0-372.59.1.el8_6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "perf-0:4.18.0-372.59.1.el8_6.aarch64",
"product": {
"name": "perf-0:4.18.0-372.59.1.el8_6.aarch64",
"product_id": "perf-0:4.18.0-372.59.1.el8_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@4.18.0-372.59.1.el8_6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python3-perf-0:4.18.0-372.59.1.el8_6.aarch64",
"product": {
"name": "python3-perf-0:4.18.0-372.59.1.el8_6.aarch64",
"product_id": "python3-perf-0:4.18.0-372.59.1.el8_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf@4.18.0-372.59.1.el8_6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "bpftool-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64",
"product": {
"name": "bpftool-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64",
"product_id": "bpftool-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool-debuginfo@4.18.0-372.59.1.el8_6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64",
"product": {
"name": "kernel-debug-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64",
"product_id": "kernel-debug-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.18.0-372.59.1.el8_6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64",
"product": {
"name": "kernel-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64",
"product_id": "kernel-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@4.18.0-372.59.1.el8_6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-aarch64-0:4.18.0-372.59.1.el8_6.aarch64",
"product": {
"name": "kernel-debuginfo-common-aarch64-0:4.18.0-372.59.1.el8_6.aarch64",
"product_id": "kernel-debuginfo-common-aarch64-0:4.18.0-372.59.1.el8_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-aarch64@4.18.0-372.59.1.el8_6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64",
"product": {
"name": "kernel-tools-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64",
"product_id": "kernel-tools-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.18.0-372.59.1.el8_6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64",
"product": {
"name": "perf-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64",
"product_id": "perf-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@4.18.0-372.59.1.el8_6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python3-perf-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64",
"product": {
"name": "python3-perf-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64",
"product_id": "python3-perf-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf-debuginfo@4.18.0-372.59.1.el8_6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el8.aarch64",
"product": {
"name": "openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el8.aarch64",
"product_id": "openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-hyperkube@4.12.0-202306121916.p0.g8c21020.assembly.stream.el8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.aarch64",
"product": {
"name": "openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.aarch64",
"product_id": "openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-clients@4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "podman-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"product": {
"name": "podman-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"product_id": "podman-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman@4.2.0-6.1.rhaos4.12.el8?arch=aarch64\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "podman-catatonit-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"product": {
"name": "podman-catatonit-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"product_id": "podman-catatonit-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-catatonit@4.2.0-6.1.rhaos4.12.el8?arch=aarch64\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "podman-gvproxy-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"product": {
"name": "podman-gvproxy-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"product_id": "podman-gvproxy-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-gvproxy@4.2.0-6.1.rhaos4.12.el8?arch=aarch64\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "podman-plugins-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"product": {
"name": "podman-plugins-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"product_id": "podman-plugins-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-plugins@4.2.0-6.1.rhaos4.12.el8?arch=aarch64\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "podman-remote-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"product": {
"name": "podman-remote-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"product_id": "podman-remote-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-remote@4.2.0-6.1.rhaos4.12.el8?arch=aarch64\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "podman-tests-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"product": {
"name": "podman-tests-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"product_id": "podman-tests-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-tests@4.2.0-6.1.rhaos4.12.el8?arch=aarch64\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "podman-debugsource-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"product": {
"name": "podman-debugsource-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"product_id": "podman-debugsource-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-debugsource@4.2.0-6.1.rhaos4.12.el8?arch=aarch64\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "podman-catatonit-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"product": {
"name": "podman-catatonit-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"product_id": "podman-catatonit-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-catatonit-debuginfo@4.2.0-6.1.rhaos4.12.el8?arch=aarch64\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "podman-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"product": {
"name": "podman-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"product_id": "podman-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-debuginfo@4.2.0-6.1.rhaos4.12.el8?arch=aarch64\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "podman-gvproxy-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"product": {
"name": "podman-gvproxy-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"product_id": "podman-gvproxy-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-gvproxy-debuginfo@4.2.0-6.1.rhaos4.12.el8?arch=aarch64\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "podman-plugins-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"product": {
"name": "podman-plugins-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"product_id": "podman-plugins-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-plugins-debuginfo@4.2.0-6.1.rhaos4.12.el8?arch=aarch64\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "podman-remote-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"product": {
"name": "podman-remote-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"product_id": "podman-remote-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-remote-debuginfo@4.2.0-6.1.rhaos4.12.el8?arch=aarch64\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "runc-3:1.1.6-4.rhaos4.12.el8.aarch64",
"product": {
"name": "runc-3:1.1.6-4.rhaos4.12.el8.aarch64",
"product_id": "runc-3:1.1.6-4.rhaos4.12.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/runc@1.1.6-4.rhaos4.12.el8?arch=aarch64\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "runc-debugsource-3:1.1.6-4.rhaos4.12.el8.aarch64",
"product": {
"name": "runc-debugsource-3:1.1.6-4.rhaos4.12.el8.aarch64",
"product_id": "runc-debugsource-3:1.1.6-4.rhaos4.12.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/runc-debugsource@1.1.6-4.rhaos4.12.el8?arch=aarch64\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "runc-debuginfo-3:1.1.6-4.rhaos4.12.el8.aarch64",
"product": {
"name": "runc-debuginfo-3:1.1.6-4.rhaos4.12.el8.aarch64",
"product_id": "runc-debuginfo-3:1.1.6-4.rhaos4.12.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/runc-debuginfo@1.1.6-4.rhaos4.12.el8?arch=aarch64\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "skopeo-2:1.9.4-3.1.rhaos4.12.el8.aarch64",
"product": {
"name": "skopeo-2:1.9.4-3.1.rhaos4.12.el8.aarch64",
"product_id": "skopeo-2:1.9.4-3.1.rhaos4.12.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/skopeo@1.9.4-3.1.rhaos4.12.el8?arch=aarch64\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "skopeo-tests-2:1.9.4-3.1.rhaos4.12.el8.aarch64",
"product": {
"name": "skopeo-tests-2:1.9.4-3.1.rhaos4.12.el8.aarch64",
"product_id": "skopeo-tests-2:1.9.4-3.1.rhaos4.12.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/skopeo-tests@1.9.4-3.1.rhaos4.12.el8?arch=aarch64\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "skopeo-debugsource-2:1.9.4-3.1.rhaos4.12.el8.aarch64",
"product": {
"name": "skopeo-debugsource-2:1.9.4-3.1.rhaos4.12.el8.aarch64",
"product_id": "skopeo-debugsource-2:1.9.4-3.1.rhaos4.12.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/skopeo-debugsource@1.9.4-3.1.rhaos4.12.el8?arch=aarch64\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "skopeo-debuginfo-2:1.9.4-3.1.rhaos4.12.el8.aarch64",
"product": {
"name": "skopeo-debuginfo-2:1.9.4-3.1.rhaos4.12.el8.aarch64",
"product_id": "skopeo-debuginfo-2:1.9.4-3.1.rhaos4.12.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/skopeo-debuginfo@1.9.4-3.1.rhaos4.12.el8?arch=aarch64\u0026epoch=2"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "buildah-1:1.23.4-5.rhaos4.12.el9.ppc64le",
"product": {
"name": "buildah-1:1.23.4-5.rhaos4.12.el9.ppc64le",
"product_id": "buildah-1:1.23.4-5.rhaos4.12.el9.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/buildah@1.23.4-5.rhaos4.12.el9?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "buildah-tests-1:1.23.4-5.rhaos4.12.el9.ppc64le",
"product": {
"name": "buildah-tests-1:1.23.4-5.rhaos4.12.el9.ppc64le",
"product_id": "buildah-tests-1:1.23.4-5.rhaos4.12.el9.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/buildah-tests@1.23.4-5.rhaos4.12.el9?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "buildah-debugsource-1:1.23.4-5.rhaos4.12.el9.ppc64le",
"product": {
"name": "buildah-debugsource-1:1.23.4-5.rhaos4.12.el9.ppc64le",
"product_id": "buildah-debugsource-1:1.23.4-5.rhaos4.12.el9.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/buildah-debugsource@1.23.4-5.rhaos4.12.el9?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "buildah-debuginfo-1:1.23.4-5.rhaos4.12.el9.ppc64le",
"product": {
"name": "buildah-debuginfo-1:1.23.4-5.rhaos4.12.el9.ppc64le",
"product_id": "buildah-debuginfo-1:1.23.4-5.rhaos4.12.el9.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/buildah-debuginfo@1.23.4-5.rhaos4.12.el9?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "buildah-tests-debuginfo-1:1.23.4-5.rhaos4.12.el9.ppc64le",
"product": {
"name": "buildah-tests-debuginfo-1:1.23.4-5.rhaos4.12.el9.ppc64le",
"product_id": "buildah-tests-debuginfo-1:1.23.4-5.rhaos4.12.el9.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/buildah-tests-debuginfo@1.23.4-5.rhaos4.12.el9?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "conmon-2:2.1.2-5.rhaos4.12.el9.ppc64le",
"product": {
"name": "conmon-2:2.1.2-5.rhaos4.12.el9.ppc64le",
"product_id": "conmon-2:2.1.2-5.rhaos4.12.el9.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/conmon@2.1.2-5.rhaos4.12.el9?arch=ppc64le\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "conmon-debugsource-2:2.1.2-5.rhaos4.12.el9.ppc64le",
"product": {
"name": "conmon-debugsource-2:2.1.2-5.rhaos4.12.el9.ppc64le",
"product_id": "conmon-debugsource-2:2.1.2-5.rhaos4.12.el9.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/conmon-debugsource@2.1.2-5.rhaos4.12.el9?arch=ppc64le\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "conmon-debuginfo-2:2.1.2-5.rhaos4.12.el9.ppc64le",
"product": {
"name": "conmon-debuginfo-2:2.1.2-5.rhaos4.12.el9.ppc64le",
"product_id": "conmon-debuginfo-2:2.1.2-5.rhaos4.12.el9.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/conmon-debuginfo@2.1.2-5.rhaos4.12.el9?arch=ppc64le\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el9.ppc64le",
"product": {
"name": "openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el9.ppc64le",
"product_id": "openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el9.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-hyperkube@4.12.0-202306121916.p0.g8c21020.assembly.stream.el9?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.ppc64le",
"product": {
"name": "openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.ppc64le",
"product_id": "openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-clients@4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "podman-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"product": {
"name": "podman-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"product_id": "podman-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman@4.2.0-7.rhaos4.12.el9?arch=ppc64le\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "podman-catatonit-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"product": {
"name": "podman-catatonit-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"product_id": "podman-catatonit-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-catatonit@4.2.0-7.rhaos4.12.el9?arch=ppc64le\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "podman-gvproxy-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"product": {
"name": "podman-gvproxy-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"product_id": "podman-gvproxy-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-gvproxy@4.2.0-7.rhaos4.12.el9?arch=ppc64le\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "podman-plugins-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"product": {
"name": "podman-plugins-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"product_id": "podman-plugins-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-plugins@4.2.0-7.rhaos4.12.el9?arch=ppc64le\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "podman-remote-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"product": {
"name": "podman-remote-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"product_id": "podman-remote-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-remote@4.2.0-7.rhaos4.12.el9?arch=ppc64le\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "podman-tests-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"product": {
"name": "podman-tests-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"product_id": "podman-tests-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-tests@4.2.0-7.rhaos4.12.el9?arch=ppc64le\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "podman-debugsource-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"product": {
"name": "podman-debugsource-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"product_id": "podman-debugsource-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-debugsource@4.2.0-7.rhaos4.12.el9?arch=ppc64le\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "podman-catatonit-debuginfo-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"product": {
"name": "podman-catatonit-debuginfo-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"product_id": "podman-catatonit-debuginfo-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-catatonit-debuginfo@4.2.0-7.rhaos4.12.el9?arch=ppc64le\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "podman-debuginfo-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"product": {
"name": "podman-debuginfo-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"product_id": "podman-debuginfo-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-debuginfo@4.2.0-7.rhaos4.12.el9?arch=ppc64le\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "podman-gvproxy-debuginfo-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"product": {
"name": "podman-gvproxy-debuginfo-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"product_id": "podman-gvproxy-debuginfo-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-gvproxy-debuginfo@4.2.0-7.rhaos4.12.el9?arch=ppc64le\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "podman-plugins-debuginfo-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"product": {
"name": "podman-plugins-debuginfo-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"product_id": "podman-plugins-debuginfo-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-plugins-debuginfo@4.2.0-7.rhaos4.12.el9?arch=ppc64le\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "podman-remote-debuginfo-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"product": {
"name": "podman-remote-debuginfo-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"product_id": "podman-remote-debuginfo-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-remote-debuginfo@4.2.0-7.rhaos4.12.el9?arch=ppc64le\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "skopeo-2:1.9.4-3.rhaos4.12.el9.ppc64le",
"product": {
"name": "skopeo-2:1.9.4-3.rhaos4.12.el9.ppc64le",
"product_id": "skopeo-2:1.9.4-3.rhaos4.12.el9.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/skopeo@1.9.4-3.rhaos4.12.el9?arch=ppc64le\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "skopeo-tests-2:1.9.4-3.rhaos4.12.el9.ppc64le",
"product": {
"name": "skopeo-tests-2:1.9.4-3.rhaos4.12.el9.ppc64le",
"product_id": "skopeo-tests-2:1.9.4-3.rhaos4.12.el9.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/skopeo-tests@1.9.4-3.rhaos4.12.el9?arch=ppc64le\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "skopeo-debugsource-2:1.9.4-3.rhaos4.12.el9.ppc64le",
"product": {
"name": "skopeo-debugsource-2:1.9.4-3.rhaos4.12.el9.ppc64le",
"product_id": "skopeo-debugsource-2:1.9.4-3.rhaos4.12.el9.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/skopeo-debugsource@1.9.4-3.rhaos4.12.el9?arch=ppc64le\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "skopeo-debuginfo-2:1.9.4-3.rhaos4.12.el9.ppc64le",
"product": {
"name": "skopeo-debuginfo-2:1.9.4-3.rhaos4.12.el9.ppc64le",
"product_id": "skopeo-debuginfo-2:1.9.4-3.rhaos4.12.el9.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/skopeo-debuginfo@1.9.4-3.rhaos4.12.el9?arch=ppc64le\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "buildah-1:1.23.4-5.1.rhaos4.12.el8.ppc64le",
"product": {
"name": "buildah-1:1.23.4-5.1.rhaos4.12.el8.ppc64le",
"product_id": "buildah-1:1.23.4-5.1.rhaos4.12.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/buildah@1.23.4-5.1.rhaos4.12.el8?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "buildah-tests-1:1.23.4-5.1.rhaos4.12.el8.ppc64le",
"product": {
"name": "buildah-tests-1:1.23.4-5.1.rhaos4.12.el8.ppc64le",
"product_id": "buildah-tests-1:1.23.4-5.1.rhaos4.12.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/buildah-tests@1.23.4-5.1.rhaos4.12.el8?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "buildah-debugsource-1:1.23.4-5.1.rhaos4.12.el8.ppc64le",
"product": {
"name": "buildah-debugsource-1:1.23.4-5.1.rhaos4.12.el8.ppc64le",
"product_id": "buildah-debugsource-1:1.23.4-5.1.rhaos4.12.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/buildah-debugsource@1.23.4-5.1.rhaos4.12.el8?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "buildah-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.ppc64le",
"product": {
"name": "buildah-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.ppc64le",
"product_id": "buildah-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/buildah-debuginfo@1.23.4-5.1.rhaos4.12.el8?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "buildah-tests-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.ppc64le",
"product": {
"name": "buildah-tests-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.ppc64le",
"product_id": "buildah-tests-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/buildah-tests-debuginfo@1.23.4-5.1.rhaos4.12.el8?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "conmon-2:2.1.2-4.rhaos4.12.el8.ppc64le",
"product": {
"name": "conmon-2:2.1.2-4.rhaos4.12.el8.ppc64le",
"product_id": "conmon-2:2.1.2-4.rhaos4.12.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/conmon@2.1.2-4.rhaos4.12.el8?arch=ppc64le\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "conmon-debugsource-2:2.1.2-4.rhaos4.12.el8.ppc64le",
"product": {
"name": "conmon-debugsource-2:2.1.2-4.rhaos4.12.el8.ppc64le",
"product_id": "conmon-debugsource-2:2.1.2-4.rhaos4.12.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/conmon-debugsource@2.1.2-4.rhaos4.12.el8?arch=ppc64le\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "conmon-debuginfo-2:2.1.2-4.rhaos4.12.el8.ppc64le",
"product": {
"name": "conmon-debuginfo-2:2.1.2-4.rhaos4.12.el8.ppc64le",
"product_id": "conmon-debuginfo-2:2.1.2-4.rhaos4.12.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/conmon-debuginfo@2.1.2-4.rhaos4.12.el8?arch=ppc64le\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "containernetworking-plugins-0:1.0.1-7.rhaos4.12.el8.ppc64le",
"product": {
"name": "containernetworking-plugins-0:1.0.1-7.rhaos4.12.el8.ppc64le",
"product_id": "containernetworking-plugins-0:1.0.1-7.rhaos4.12.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/containernetworking-plugins@1.0.1-7.rhaos4.12.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "containernetworking-plugins-debugsource-0:1.0.1-7.rhaos4.12.el8.ppc64le",
"product": {
"name": "containernetworking-plugins-debugsource-0:1.0.1-7.rhaos4.12.el8.ppc64le",
"product_id": "containernetworking-plugins-debugsource-0:1.0.1-7.rhaos4.12.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/containernetworking-plugins-debugsource@1.0.1-7.rhaos4.12.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "containernetworking-plugins-debuginfo-0:1.0.1-7.rhaos4.12.el8.ppc64le",
"product": {
"name": "containernetworking-plugins-debuginfo-0:1.0.1-7.rhaos4.12.el8.ppc64le",
"product_id": "containernetworking-plugins-debuginfo-0:1.0.1-7.rhaos4.12.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/containernetworking-plugins-debuginfo@1.0.1-7.rhaos4.12.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "bpftool-0:4.18.0-372.59.1.el8_6.ppc64le",
"product": {
"name": "bpftool-0:4.18.0-372.59.1.el8_6.ppc64le",
"product_id": "bpftool-0:4.18.0-372.59.1.el8_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool@4.18.0-372.59.1.el8_6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-0:4.18.0-372.59.1.el8_6.ppc64le",
"product": {
"name": "kernel-0:4.18.0-372.59.1.el8_6.ppc64le",
"product_id": "kernel-0:4.18.0-372.59.1.el8_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@4.18.0-372.59.1.el8_6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-core-0:4.18.0-372.59.1.el8_6.ppc64le",
"product": {
"name": "kernel-core-0:4.18.0-372.59.1.el8_6.ppc64le",
"product_id": "kernel-core-0:4.18.0-372.59.1.el8_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-core@4.18.0-372.59.1.el8_6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-cross-headers-0:4.18.0-372.59.1.el8_6.ppc64le",
"product": {
"name": "kernel-cross-headers-0:4.18.0-372.59.1.el8_6.ppc64le",
"product_id": "kernel-cross-headers-0:4.18.0-372.59.1.el8_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-cross-headers@4.18.0-372.59.1.el8_6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:4.18.0-372.59.1.el8_6.ppc64le",
"product": {
"name": "kernel-debug-0:4.18.0-372.59.1.el8_6.ppc64le",
"product_id": "kernel-debug-0:4.18.0-372.59.1.el8_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@4.18.0-372.59.1.el8_6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-core-0:4.18.0-372.59.1.el8_6.ppc64le",
"product": {
"name": "kernel-debug-core-0:4.18.0-372.59.1.el8_6.ppc64le",
"product_id": "kernel-debug-core-0:4.18.0-372.59.1.el8_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-core@4.18.0-372.59.1.el8_6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:4.18.0-372.59.1.el8_6.ppc64le",
"product": {
"name": "kernel-debug-devel-0:4.18.0-372.59.1.el8_6.ppc64le",
"product_id": "kernel-debug-devel-0:4.18.0-372.59.1.el8_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@4.18.0-372.59.1.el8_6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-0:4.18.0-372.59.1.el8_6.ppc64le",
"product": {
"name": "kernel-debug-modules-0:4.18.0-372.59.1.el8_6.ppc64le",
"product_id": "kernel-debug-modules-0:4.18.0-372.59.1.el8_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules@4.18.0-372.59.1.el8_6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-extra-0:4.18.0-372.59.1.el8_6.ppc64le",
"product": {
"name": "kernel-debug-modules-extra-0:4.18.0-372.59.1.el8_6.ppc64le",
"product_id": "kernel-debug-modules-extra-0:4.18.0-372.59.1.el8_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules-extra@4.18.0-372.59.1.el8_6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-internal-0:4.18.0-372.59.1.el8_6.ppc64le",
"product": {
"name": "kernel-debug-modules-internal-0:4.18.0-372.59.1.el8_6.ppc64le",
"product_id": "kernel-debug-modules-internal-0:4.18.0-372.59.1.el8_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules-internal@4.18.0-372.59.1.el8_6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:4.18.0-372.59.1.el8_6.ppc64le",
"product": {
"name": "kernel-devel-0:4.18.0-372.59.1.el8_6.ppc64le",
"product_id": "kernel-devel-0:4.18.0-372.59.1.el8_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@4.18.0-372.59.1.el8_6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:4.18.0-372.59.1.el8_6.ppc64le",
"product": {
"name": "kernel-headers-0:4.18.0-372.59.1.el8_6.ppc64le",
"product_id": "kernel-headers-0:4.18.0-372.59.1.el8_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@4.18.0-372.59.1.el8_6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-ipaclones-internal-0:4.18.0-372.59.1.el8_6.ppc64le",
"product": {
"name": "kernel-ipaclones-internal-0:4.18.0-372.59.1.el8_6.ppc64le",
"product_id": "kernel-ipaclones-internal-0:4.18.0-372.59.1.el8_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-ipaclones-internal@4.18.0-372.59.1.el8_6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-0:4.18.0-372.59.1.el8_6.ppc64le",
"product": {
"name": "kernel-modules-0:4.18.0-372.59.1.el8_6.ppc64le",
"product_id": "kernel-modules-0:4.18.0-372.59.1.el8_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules@4.18.0-372.59.1.el8_6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-extra-0:4.18.0-372.59.1.el8_6.ppc64le",
"product": {
"name": "kernel-modules-extra-0:4.18.0-372.59.1.el8_6.ppc64le",
"product_id": "kernel-modules-extra-0:4.18.0-372.59.1.el8_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules-extra@4.18.0-372.59.1.el8_6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-internal-0:4.18.0-372.59.1.el8_6.ppc64le",
"product": {
"name": "kernel-modules-internal-0:4.18.0-372.59.1.el8_6.ppc64le",
"product_id": "kernel-modules-internal-0:4.18.0-372.59.1.el8_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules-internal@4.18.0-372.59.1.el8_6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-selftests-internal-0:4.18.0-372.59.1.el8_6.ppc64le",
"product": {
"name": "kernel-selftests-internal-0:4.18.0-372.59.1.el8_6.ppc64le",
"product_id": "kernel-selftests-internal-0:4.18.0-372.59.1.el8_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-selftests-internal@4.18.0-372.59.1.el8_6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:4.18.0-372.59.1.el8_6.ppc64le",
"product": {
"name": "kernel-tools-0:4.18.0-372.59.1.el8_6.ppc64le",
"product_id": "kernel-tools-0:4.18.0-372.59.1.el8_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@4.18.0-372.59.1.el8_6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:4.18.0-372.59.1.el8_6.ppc64le",
"product": {
"name": "kernel-tools-libs-0:4.18.0-372.59.1.el8_6.ppc64le",
"product_id": "kernel-tools-libs-0:4.18.0-372.59.1.el8_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@4.18.0-372.59.1.el8_6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:4.18.0-372.59.1.el8_6.ppc64le",
"product": {
"name": "kernel-tools-libs-devel-0:4.18.0-372.59.1.el8_6.ppc64le",
"product_id": "kernel-tools-libs-devel-0:4.18.0-372.59.1.el8_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@4.18.0-372.59.1.el8_6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "perf-0:4.18.0-372.59.1.el8_6.ppc64le",
"product": {
"name": "perf-0:4.18.0-372.59.1.el8_6.ppc64le",
"product_id": "perf-0:4.18.0-372.59.1.el8_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@4.18.0-372.59.1.el8_6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python3-perf-0:4.18.0-372.59.1.el8_6.ppc64le",
"product": {
"name": "python3-perf-0:4.18.0-372.59.1.el8_6.ppc64le",
"product_id": "python3-perf-0:4.18.0-372.59.1.el8_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf@4.18.0-372.59.1.el8_6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "bpftool-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le",
"product": {
"name": "bpftool-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le",
"product_id": "bpftool-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool-debuginfo@4.18.0-372.59.1.el8_6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le",
"product": {
"name": "kernel-debug-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le",
"product_id": "kernel-debug-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.18.0-372.59.1.el8_6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le",
"product": {
"name": "kernel-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le",
"product_id": "kernel-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@4.18.0-372.59.1.el8_6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-ppc64le-0:4.18.0-372.59.1.el8_6.ppc64le",
"product": {
"name": "kernel-debuginfo-common-ppc64le-0:4.18.0-372.59.1.el8_6.ppc64le",
"product_id": "kernel-debuginfo-common-ppc64le-0:4.18.0-372.59.1.el8_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-ppc64le@4.18.0-372.59.1.el8_6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le",
"product": {
"name": "kernel-tools-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le",
"product_id": "kernel-tools-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.18.0-372.59.1.el8_6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le",
"product": {
"name": "perf-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le",
"product_id": "perf-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@4.18.0-372.59.1.el8_6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python3-perf-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le",
"product": {
"name": "python3-perf-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le",
"product_id": "python3-perf-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf-debuginfo@4.18.0-372.59.1.el8_6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el8.ppc64le",
"product": {
"name": "openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el8.ppc64le",
"product_id": "openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-hyperkube@4.12.0-202306121916.p0.g8c21020.assembly.stream.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.ppc64le",
"product": {
"name": "openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.ppc64le",
"product_id": "openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-clients@4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "podman-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"product": {
"name": "podman-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"product_id": "podman-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman@4.2.0-6.1.rhaos4.12.el8?arch=ppc64le\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "podman-catatonit-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"product": {
"name": "podman-catatonit-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"product_id": "podman-catatonit-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-catatonit@4.2.0-6.1.rhaos4.12.el8?arch=ppc64le\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "podman-gvproxy-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"product": {
"name": "podman-gvproxy-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"product_id": "podman-gvproxy-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-gvproxy@4.2.0-6.1.rhaos4.12.el8?arch=ppc64le\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "podman-plugins-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"product": {
"name": "podman-plugins-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"product_id": "podman-plugins-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-plugins@4.2.0-6.1.rhaos4.12.el8?arch=ppc64le\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "podman-remote-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"product": {
"name": "podman-remote-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"product_id": "podman-remote-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-remote@4.2.0-6.1.rhaos4.12.el8?arch=ppc64le\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "podman-tests-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"product": {
"name": "podman-tests-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"product_id": "podman-tests-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-tests@4.2.0-6.1.rhaos4.12.el8?arch=ppc64le\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "podman-debugsource-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"product": {
"name": "podman-debugsource-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"product_id": "podman-debugsource-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-debugsource@4.2.0-6.1.rhaos4.12.el8?arch=ppc64le\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "podman-catatonit-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"product": {
"name": "podman-catatonit-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"product_id": "podman-catatonit-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-catatonit-debuginfo@4.2.0-6.1.rhaos4.12.el8?arch=ppc64le\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "podman-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"product": {
"name": "podman-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"product_id": "podman-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-debuginfo@4.2.0-6.1.rhaos4.12.el8?arch=ppc64le\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "podman-gvproxy-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"product": {
"name": "podman-gvproxy-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"product_id": "podman-gvproxy-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-gvproxy-debuginfo@4.2.0-6.1.rhaos4.12.el8?arch=ppc64le\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "podman-plugins-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"product": {
"name": "podman-plugins-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"product_id": "podman-plugins-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-plugins-debuginfo@4.2.0-6.1.rhaos4.12.el8?arch=ppc64le\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "podman-remote-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"product": {
"name": "podman-remote-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"product_id": "podman-remote-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-remote-debuginfo@4.2.0-6.1.rhaos4.12.el8?arch=ppc64le\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "runc-3:1.1.6-4.rhaos4.12.el8.ppc64le",
"product": {
"name": "runc-3:1.1.6-4.rhaos4.12.el8.ppc64le",
"product_id": "runc-3:1.1.6-4.rhaos4.12.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/runc@1.1.6-4.rhaos4.12.el8?arch=ppc64le\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "runc-debugsource-3:1.1.6-4.rhaos4.12.el8.ppc64le",
"product": {
"name": "runc-debugsource-3:1.1.6-4.rhaos4.12.el8.ppc64le",
"product_id": "runc-debugsource-3:1.1.6-4.rhaos4.12.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/runc-debugsource@1.1.6-4.rhaos4.12.el8?arch=ppc64le\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "runc-debuginfo-3:1.1.6-4.rhaos4.12.el8.ppc64le",
"product": {
"name": "runc-debuginfo-3:1.1.6-4.rhaos4.12.el8.ppc64le",
"product_id": "runc-debuginfo-3:1.1.6-4.rhaos4.12.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/runc-debuginfo@1.1.6-4.rhaos4.12.el8?arch=ppc64le\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "skopeo-2:1.9.4-3.1.rhaos4.12.el8.ppc64le",
"product": {
"name": "skopeo-2:1.9.4-3.1.rhaos4.12.el8.ppc64le",
"product_id": "skopeo-2:1.9.4-3.1.rhaos4.12.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/skopeo@1.9.4-3.1.rhaos4.12.el8?arch=ppc64le\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "skopeo-tests-2:1.9.4-3.1.rhaos4.12.el8.ppc64le",
"product": {
"name": "skopeo-tests-2:1.9.4-3.1.rhaos4.12.el8.ppc64le",
"product_id": "skopeo-tests-2:1.9.4-3.1.rhaos4.12.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/skopeo-tests@1.9.4-3.1.rhaos4.12.el8?arch=ppc64le\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "skopeo-debugsource-2:1.9.4-3.1.rhaos4.12.el8.ppc64le",
"product": {
"name": "skopeo-debugsource-2:1.9.4-3.1.rhaos4.12.el8.ppc64le",
"product_id": "skopeo-debugsource-2:1.9.4-3.1.rhaos4.12.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/skopeo-debugsource@1.9.4-3.1.rhaos4.12.el8?arch=ppc64le\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "skopeo-debuginfo-2:1.9.4-3.1.rhaos4.12.el8.ppc64le",
"product": {
"name": "skopeo-debuginfo-2:1.9.4-3.1.rhaos4.12.el8.ppc64le",
"product_id": "skopeo-debuginfo-2:1.9.4-3.1.rhaos4.12.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/skopeo-debuginfo@1.9.4-3.1.rhaos4.12.el8?arch=ppc64le\u0026epoch=2"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "buildah-1:1.23.4-5.rhaos4.12.el9.s390x",
"product": {
"name": "buildah-1:1.23.4-5.rhaos4.12.el9.s390x",
"product_id": "buildah-1:1.23.4-5.rhaos4.12.el9.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/buildah@1.23.4-5.rhaos4.12.el9?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "buildah-tests-1:1.23.4-5.rhaos4.12.el9.s390x",
"product": {
"name": "buildah-tests-1:1.23.4-5.rhaos4.12.el9.s390x",
"product_id": "buildah-tests-1:1.23.4-5.rhaos4.12.el9.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/buildah-tests@1.23.4-5.rhaos4.12.el9?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "buildah-debugsource-1:1.23.4-5.rhaos4.12.el9.s390x",
"product": {
"name": "buildah-debugsource-1:1.23.4-5.rhaos4.12.el9.s390x",
"product_id": "buildah-debugsource-1:1.23.4-5.rhaos4.12.el9.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/buildah-debugsource@1.23.4-5.rhaos4.12.el9?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "buildah-debuginfo-1:1.23.4-5.rhaos4.12.el9.s390x",
"product": {
"name": "buildah-debuginfo-1:1.23.4-5.rhaos4.12.el9.s390x",
"product_id": "buildah-debuginfo-1:1.23.4-5.rhaos4.12.el9.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/buildah-debuginfo@1.23.4-5.rhaos4.12.el9?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "buildah-tests-debuginfo-1:1.23.4-5.rhaos4.12.el9.s390x",
"product": {
"name": "buildah-tests-debuginfo-1:1.23.4-5.rhaos4.12.el9.s390x",
"product_id": "buildah-tests-debuginfo-1:1.23.4-5.rhaos4.12.el9.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/buildah-tests-debuginfo@1.23.4-5.rhaos4.12.el9?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "conmon-2:2.1.2-5.rhaos4.12.el9.s390x",
"product": {
"name": "conmon-2:2.1.2-5.rhaos4.12.el9.s390x",
"product_id": "conmon-2:2.1.2-5.rhaos4.12.el9.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/conmon@2.1.2-5.rhaos4.12.el9?arch=s390x\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "conmon-debugsource-2:2.1.2-5.rhaos4.12.el9.s390x",
"product": {
"name": "conmon-debugsource-2:2.1.2-5.rhaos4.12.el9.s390x",
"product_id": "conmon-debugsource-2:2.1.2-5.rhaos4.12.el9.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/conmon-debugsource@2.1.2-5.rhaos4.12.el9?arch=s390x\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "conmon-debuginfo-2:2.1.2-5.rhaos4.12.el9.s390x",
"product": {
"name": "conmon-debuginfo-2:2.1.2-5.rhaos4.12.el9.s390x",
"product_id": "conmon-debuginfo-2:2.1.2-5.rhaos4.12.el9.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/conmon-debuginfo@2.1.2-5.rhaos4.12.el9?arch=s390x\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el9.s390x",
"product": {
"name": "openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el9.s390x",
"product_id": "openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el9.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-hyperkube@4.12.0-202306121916.p0.g8c21020.assembly.stream.el9?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.s390x",
"product": {
"name": "openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.s390x",
"product_id": "openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-clients@4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "podman-3:4.2.0-7.rhaos4.12.el9.s390x",
"product": {
"name": "podman-3:4.2.0-7.rhaos4.12.el9.s390x",
"product_id": "podman-3:4.2.0-7.rhaos4.12.el9.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman@4.2.0-7.rhaos4.12.el9?arch=s390x\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "podman-catatonit-3:4.2.0-7.rhaos4.12.el9.s390x",
"product": {
"name": "podman-catatonit-3:4.2.0-7.rhaos4.12.el9.s390x",
"product_id": "podman-catatonit-3:4.2.0-7.rhaos4.12.el9.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-catatonit@4.2.0-7.rhaos4.12.el9?arch=s390x\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "podman-gvproxy-3:4.2.0-7.rhaos4.12.el9.s390x",
"product": {
"name": "podman-gvproxy-3:4.2.0-7.rhaos4.12.el9.s390x",
"product_id": "podman-gvproxy-3:4.2.0-7.rhaos4.12.el9.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-gvproxy@4.2.0-7.rhaos4.12.el9?arch=s390x\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "podman-plugins-3:4.2.0-7.rhaos4.12.el9.s390x",
"product": {
"name": "podman-plugins-3:4.2.0-7.rhaos4.12.el9.s390x",
"product_id": "podman-plugins-3:4.2.0-7.rhaos4.12.el9.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-plugins@4.2.0-7.rhaos4.12.el9?arch=s390x\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "podman-remote-3:4.2.0-7.rhaos4.12.el9.s390x",
"product": {
"name": "podman-remote-3:4.2.0-7.rhaos4.12.el9.s390x",
"product_id": "podman-remote-3:4.2.0-7.rhaos4.12.el9.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-remote@4.2.0-7.rhaos4.12.el9?arch=s390x\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "podman-tests-3:4.2.0-7.rhaos4.12.el9.s390x",
"product": {
"name": "podman-tests-3:4.2.0-7.rhaos4.12.el9.s390x",
"product_id": "podman-tests-3:4.2.0-7.rhaos4.12.el9.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-tests@4.2.0-7.rhaos4.12.el9?arch=s390x\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "podman-debugsource-3:4.2.0-7.rhaos4.12.el9.s390x",
"product": {
"name": "podman-debugsource-3:4.2.0-7.rhaos4.12.el9.s390x",
"product_id": "podman-debugsource-3:4.2.0-7.rhaos4.12.el9.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-debugsource@4.2.0-7.rhaos4.12.el9?arch=s390x\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "podman-catatonit-debuginfo-3:4.2.0-7.rhaos4.12.el9.s390x",
"product": {
"name": "podman-catatonit-debuginfo-3:4.2.0-7.rhaos4.12.el9.s390x",
"product_id": "podman-catatonit-debuginfo-3:4.2.0-7.rhaos4.12.el9.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-catatonit-debuginfo@4.2.0-7.rhaos4.12.el9?arch=s390x\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "podman-debuginfo-3:4.2.0-7.rhaos4.12.el9.s390x",
"product": {
"name": "podman-debuginfo-3:4.2.0-7.rhaos4.12.el9.s390x",
"product_id": "podman-debuginfo-3:4.2.0-7.rhaos4.12.el9.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-debuginfo@4.2.0-7.rhaos4.12.el9?arch=s390x\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "podman-gvproxy-debuginfo-3:4.2.0-7.rhaos4.12.el9.s390x",
"product": {
"name": "podman-gvproxy-debuginfo-3:4.2.0-7.rhaos4.12.el9.s390x",
"product_id": "podman-gvproxy-debuginfo-3:4.2.0-7.rhaos4.12.el9.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-gvproxy-debuginfo@4.2.0-7.rhaos4.12.el9?arch=s390x\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "podman-plugins-debuginfo-3:4.2.0-7.rhaos4.12.el9.s390x",
"product": {
"name": "podman-plugins-debuginfo-3:4.2.0-7.rhaos4.12.el9.s390x",
"product_id": "podman-plugins-debuginfo-3:4.2.0-7.rhaos4.12.el9.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-plugins-debuginfo@4.2.0-7.rhaos4.12.el9?arch=s390x\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "podman-remote-debuginfo-3:4.2.0-7.rhaos4.12.el9.s390x",
"product": {
"name": "podman-remote-debuginfo-3:4.2.0-7.rhaos4.12.el9.s390x",
"product_id": "podman-remote-debuginfo-3:4.2.0-7.rhaos4.12.el9.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-remote-debuginfo@4.2.0-7.rhaos4.12.el9?arch=s390x\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "skopeo-2:1.9.4-3.rhaos4.12.el9.s390x",
"product": {
"name": "skopeo-2:1.9.4-3.rhaos4.12.el9.s390x",
"product_id": "skopeo-2:1.9.4-3.rhaos4.12.el9.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/skopeo@1.9.4-3.rhaos4.12.el9?arch=s390x\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "skopeo-tests-2:1.9.4-3.rhaos4.12.el9.s390x",
"product": {
"name": "skopeo-tests-2:1.9.4-3.rhaos4.12.el9.s390x",
"product_id": "skopeo-tests-2:1.9.4-3.rhaos4.12.el9.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/skopeo-tests@1.9.4-3.rhaos4.12.el9?arch=s390x\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "skopeo-debugsource-2:1.9.4-3.rhaos4.12.el9.s390x",
"product": {
"name": "skopeo-debugsource-2:1.9.4-3.rhaos4.12.el9.s390x",
"product_id": "skopeo-debugsource-2:1.9.4-3.rhaos4.12.el9.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/skopeo-debugsource@1.9.4-3.rhaos4.12.el9?arch=s390x\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "skopeo-debuginfo-2:1.9.4-3.rhaos4.12.el9.s390x",
"product": {
"name": "skopeo-debuginfo-2:1.9.4-3.rhaos4.12.el9.s390x",
"product_id": "skopeo-debuginfo-2:1.9.4-3.rhaos4.12.el9.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/skopeo-debuginfo@1.9.4-3.rhaos4.12.el9?arch=s390x\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "buildah-1:1.23.4-5.1.rhaos4.12.el8.s390x",
"product": {
"name": "buildah-1:1.23.4-5.1.rhaos4.12.el8.s390x",
"product_id": "buildah-1:1.23.4-5.1.rhaos4.12.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/buildah@1.23.4-5.1.rhaos4.12.el8?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "buildah-tests-1:1.23.4-5.1.rhaos4.12.el8.s390x",
"product": {
"name": "buildah-tests-1:1.23.4-5.1.rhaos4.12.el8.s390x",
"product_id": "buildah-tests-1:1.23.4-5.1.rhaos4.12.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/buildah-tests@1.23.4-5.1.rhaos4.12.el8?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "buildah-debugsource-1:1.23.4-5.1.rhaos4.12.el8.s390x",
"product": {
"name": "buildah-debugsource-1:1.23.4-5.1.rhaos4.12.el8.s390x",
"product_id": "buildah-debugsource-1:1.23.4-5.1.rhaos4.12.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/buildah-debugsource@1.23.4-5.1.rhaos4.12.el8?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "buildah-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.s390x",
"product": {
"name": "buildah-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.s390x",
"product_id": "buildah-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/buildah-debuginfo@1.23.4-5.1.rhaos4.12.el8?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "buildah-tests-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.s390x",
"product": {
"name": "buildah-tests-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.s390x",
"product_id": "buildah-tests-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/buildah-tests-debuginfo@1.23.4-5.1.rhaos4.12.el8?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "conmon-2:2.1.2-4.rhaos4.12.el8.s390x",
"product": {
"name": "conmon-2:2.1.2-4.rhaos4.12.el8.s390x",
"product_id": "conmon-2:2.1.2-4.rhaos4.12.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/conmon@2.1.2-4.rhaos4.12.el8?arch=s390x\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "conmon-debugsource-2:2.1.2-4.rhaos4.12.el8.s390x",
"product": {
"name": "conmon-debugsource-2:2.1.2-4.rhaos4.12.el8.s390x",
"product_id": "conmon-debugsource-2:2.1.2-4.rhaos4.12.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/conmon-debugsource@2.1.2-4.rhaos4.12.el8?arch=s390x\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "conmon-debuginfo-2:2.1.2-4.rhaos4.12.el8.s390x",
"product": {
"name": "conmon-debuginfo-2:2.1.2-4.rhaos4.12.el8.s390x",
"product_id": "conmon-debuginfo-2:2.1.2-4.rhaos4.12.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/conmon-debuginfo@2.1.2-4.rhaos4.12.el8?arch=s390x\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "containernetworking-plugins-0:1.0.1-7.rhaos4.12.el8.s390x",
"product": {
"name": "containernetworking-plugins-0:1.0.1-7.rhaos4.12.el8.s390x",
"product_id": "containernetworking-plugins-0:1.0.1-7.rhaos4.12.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/containernetworking-plugins@1.0.1-7.rhaos4.12.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "containernetworking-plugins-debugsource-0:1.0.1-7.rhaos4.12.el8.s390x",
"product": {
"name": "containernetworking-plugins-debugsource-0:1.0.1-7.rhaos4.12.el8.s390x",
"product_id": "containernetworking-plugins-debugsource-0:1.0.1-7.rhaos4.12.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/containernetworking-plugins-debugsource@1.0.1-7.rhaos4.12.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "containernetworking-plugins-debuginfo-0:1.0.1-7.rhaos4.12.el8.s390x",
"product": {
"name": "containernetworking-plugins-debuginfo-0:1.0.1-7.rhaos4.12.el8.s390x",
"product_id": "containernetworking-plugins-debuginfo-0:1.0.1-7.rhaos4.12.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/containernetworking-plugins-debuginfo@1.0.1-7.rhaos4.12.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "bpftool-0:4.18.0-372.59.1.el8_6.s390x",
"product": {
"name": "bpftool-0:4.18.0-372.59.1.el8_6.s390x",
"product_id": "bpftool-0:4.18.0-372.59.1.el8_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool@4.18.0-372.59.1.el8_6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-0:4.18.0-372.59.1.el8_6.s390x",
"product": {
"name": "kernel-0:4.18.0-372.59.1.el8_6.s390x",
"product_id": "kernel-0:4.18.0-372.59.1.el8_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@4.18.0-372.59.1.el8_6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-core-0:4.18.0-372.59.1.el8_6.s390x",
"product": {
"name": "kernel-core-0:4.18.0-372.59.1.el8_6.s390x",
"product_id": "kernel-core-0:4.18.0-372.59.1.el8_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-core@4.18.0-372.59.1.el8_6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-cross-headers-0:4.18.0-372.59.1.el8_6.s390x",
"product": {
"name": "kernel-cross-headers-0:4.18.0-372.59.1.el8_6.s390x",
"product_id": "kernel-cross-headers-0:4.18.0-372.59.1.el8_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-cross-headers@4.18.0-372.59.1.el8_6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:4.18.0-372.59.1.el8_6.s390x",
"product": {
"name": "kernel-debug-0:4.18.0-372.59.1.el8_6.s390x",
"product_id": "kernel-debug-0:4.18.0-372.59.1.el8_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@4.18.0-372.59.1.el8_6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-core-0:4.18.0-372.59.1.el8_6.s390x",
"product": {
"name": "kernel-debug-core-0:4.18.0-372.59.1.el8_6.s390x",
"product_id": "kernel-debug-core-0:4.18.0-372.59.1.el8_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-core@4.18.0-372.59.1.el8_6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:4.18.0-372.59.1.el8_6.s390x",
"product": {
"name": "kernel-debug-devel-0:4.18.0-372.59.1.el8_6.s390x",
"product_id": "kernel-debug-devel-0:4.18.0-372.59.1.el8_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@4.18.0-372.59.1.el8_6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-0:4.18.0-372.59.1.el8_6.s390x",
"product": {
"name": "kernel-debug-modules-0:4.18.0-372.59.1.el8_6.s390x",
"product_id": "kernel-debug-modules-0:4.18.0-372.59.1.el8_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules@4.18.0-372.59.1.el8_6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-extra-0:4.18.0-372.59.1.el8_6.s390x",
"product": {
"name": "kernel-debug-modules-extra-0:4.18.0-372.59.1.el8_6.s390x",
"product_id": "kernel-debug-modules-extra-0:4.18.0-372.59.1.el8_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules-extra@4.18.0-372.59.1.el8_6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-internal-0:4.18.0-372.59.1.el8_6.s390x",
"product": {
"name": "kernel-debug-modules-internal-0:4.18.0-372.59.1.el8_6.s390x",
"product_id": "kernel-debug-modules-internal-0:4.18.0-372.59.1.el8_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules-internal@4.18.0-372.59.1.el8_6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:4.18.0-372.59.1.el8_6.s390x",
"product": {
"name": "kernel-devel-0:4.18.0-372.59.1.el8_6.s390x",
"product_id": "kernel-devel-0:4.18.0-372.59.1.el8_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@4.18.0-372.59.1.el8_6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:4.18.0-372.59.1.el8_6.s390x",
"product": {
"name": "kernel-headers-0:4.18.0-372.59.1.el8_6.s390x",
"product_id": "kernel-headers-0:4.18.0-372.59.1.el8_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@4.18.0-372.59.1.el8_6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-0:4.18.0-372.59.1.el8_6.s390x",
"product": {
"name": "kernel-modules-0:4.18.0-372.59.1.el8_6.s390x",
"product_id": "kernel-modules-0:4.18.0-372.59.1.el8_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules@4.18.0-372.59.1.el8_6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-extra-0:4.18.0-372.59.1.el8_6.s390x",
"product": {
"name": "kernel-modules-extra-0:4.18.0-372.59.1.el8_6.s390x",
"product_id": "kernel-modules-extra-0:4.18.0-372.59.1.el8_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules-extra@4.18.0-372.59.1.el8_6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-internal-0:4.18.0-372.59.1.el8_6.s390x",
"product": {
"name": "kernel-modules-internal-0:4.18.0-372.59.1.el8_6.s390x",
"product_id": "kernel-modules-internal-0:4.18.0-372.59.1.el8_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules-internal@4.18.0-372.59.1.el8_6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-selftests-internal-0:4.18.0-372.59.1.el8_6.s390x",
"product": {
"name": "kernel-selftests-internal-0:4.18.0-372.59.1.el8_6.s390x",
"product_id": "kernel-selftests-internal-0:4.18.0-372.59.1.el8_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-selftests-internal@4.18.0-372.59.1.el8_6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:4.18.0-372.59.1.el8_6.s390x",
"product": {
"name": "kernel-tools-0:4.18.0-372.59.1.el8_6.s390x",
"product_id": "kernel-tools-0:4.18.0-372.59.1.el8_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@4.18.0-372.59.1.el8_6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-0:4.18.0-372.59.1.el8_6.s390x",
"product": {
"name": "kernel-zfcpdump-0:4.18.0-372.59.1.el8_6.s390x",
"product_id": "kernel-zfcpdump-0:4.18.0-372.59.1.el8_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump@4.18.0-372.59.1.el8_6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-core-0:4.18.0-372.59.1.el8_6.s390x",
"product": {
"name": "kernel-zfcpdump-core-0:4.18.0-372.59.1.el8_6.s390x",
"product_id": "kernel-zfcpdump-core-0:4.18.0-372.59.1.el8_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump-core@4.18.0-372.59.1.el8_6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-devel-0:4.18.0-372.59.1.el8_6.s390x",
"product": {
"name": "kernel-zfcpdump-devel-0:4.18.0-372.59.1.el8_6.s390x",
"product_id": "kernel-zfcpdump-devel-0:4.18.0-372.59.1.el8_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump-devel@4.18.0-372.59.1.el8_6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-modules-0:4.18.0-372.59.1.el8_6.s390x",
"product": {
"name": "kernel-zfcpdump-modules-0:4.18.0-372.59.1.el8_6.s390x",
"product_id": "kernel-zfcpdump-modules-0:4.18.0-372.59.1.el8_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump-modules@4.18.0-372.59.1.el8_6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-modules-extra-0:4.18.0-372.59.1.el8_6.s390x",
"product": {
"name": "kernel-zfcpdump-modules-extra-0:4.18.0-372.59.1.el8_6.s390x",
"product_id": "kernel-zfcpdump-modules-extra-0:4.18.0-372.59.1.el8_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump-modules-extra@4.18.0-372.59.1.el8_6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-modules-internal-0:4.18.0-372.59.1.el8_6.s390x",
"product": {
"name": "kernel-zfcpdump-modules-internal-0:4.18.0-372.59.1.el8_6.s390x",
"product_id": "kernel-zfcpdump-modules-internal-0:4.18.0-372.59.1.el8_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump-modules-internal@4.18.0-372.59.1.el8_6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "perf-0:4.18.0-372.59.1.el8_6.s390x",
"product": {
"name": "perf-0:4.18.0-372.59.1.el8_6.s390x",
"product_id": "perf-0:4.18.0-372.59.1.el8_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@4.18.0-372.59.1.el8_6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python3-perf-0:4.18.0-372.59.1.el8_6.s390x",
"product": {
"name": "python3-perf-0:4.18.0-372.59.1.el8_6.s390x",
"product_id": "python3-perf-0:4.18.0-372.59.1.el8_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf@4.18.0-372.59.1.el8_6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "bpftool-debuginfo-0:4.18.0-372.59.1.el8_6.s390x",
"product": {
"name": "bpftool-debuginfo-0:4.18.0-372.59.1.el8_6.s390x",
"product_id": "bpftool-debuginfo-0:4.18.0-372.59.1.el8_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool-debuginfo@4.18.0-372.59.1.el8_6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:4.18.0-372.59.1.el8_6.s390x",
"product": {
"name": "kernel-debug-debuginfo-0:4.18.0-372.59.1.el8_6.s390x",
"product_id": "kernel-debug-debuginfo-0:4.18.0-372.59.1.el8_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.18.0-372.59.1.el8_6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:4.18.0-372.59.1.el8_6.s390x",
"product": {
"name": "kernel-debuginfo-0:4.18.0-372.59.1.el8_6.s390x",
"product_id": "kernel-debuginfo-0:4.18.0-372.59.1.el8_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@4.18.0-372.59.1.el8_6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-s390x-0:4.18.0-372.59.1.el8_6.s390x",
"product": {
"name": "kernel-debuginfo-common-s390x-0:4.18.0-372.59.1.el8_6.s390x",
"product_id": "kernel-debuginfo-common-s390x-0:4.18.0-372.59.1.el8_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-s390x@4.18.0-372.59.1.el8_6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:4.18.0-372.59.1.el8_6.s390x",
"product": {
"name": "kernel-tools-debuginfo-0:4.18.0-372.59.1.el8_6.s390x",
"product_id": "kernel-tools-debuginfo-0:4.18.0-372.59.1.el8_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.18.0-372.59.1.el8_6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-debuginfo-0:4.18.0-372.59.1.el8_6.s390x",
"product": {
"name": "kernel-zfcpdump-debuginfo-0:4.18.0-372.59.1.el8_6.s390x",
"product_id": "kernel-zfcpdump-debuginfo-0:4.18.0-372.59.1.el8_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump-debuginfo@4.18.0-372.59.1.el8_6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:4.18.0-372.59.1.el8_6.s390x",
"product": {
"name": "perf-debuginfo-0:4.18.0-372.59.1.el8_6.s390x",
"product_id": "perf-debuginfo-0:4.18.0-372.59.1.el8_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@4.18.0-372.59.1.el8_6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python3-perf-debuginfo-0:4.18.0-372.59.1.el8_6.s390x",
"product": {
"name": "python3-perf-debuginfo-0:4.18.0-372.59.1.el8_6.s390x",
"product_id": "python3-perf-debuginfo-0:4.18.0-372.59.1.el8_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf-debuginfo@4.18.0-372.59.1.el8_6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el8.s390x",
"product": {
"name": "openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el8.s390x",
"product_id": "openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-hyperkube@4.12.0-202306121916.p0.g8c21020.assembly.stream.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.s390x",
"product": {
"name": "openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.s390x",
"product_id": "openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-clients@4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "podman-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"product": {
"name": "podman-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"product_id": "podman-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman@4.2.0-6.1.rhaos4.12.el8?arch=s390x\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "podman-catatonit-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"product": {
"name": "podman-catatonit-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"product_id": "podman-catatonit-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-catatonit@4.2.0-6.1.rhaos4.12.el8?arch=s390x\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "podman-gvproxy-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"product": {
"name": "podman-gvproxy-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"product_id": "podman-gvproxy-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-gvproxy@4.2.0-6.1.rhaos4.12.el8?arch=s390x\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "podman-plugins-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"product": {
"name": "podman-plugins-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"product_id": "podman-plugins-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-plugins@4.2.0-6.1.rhaos4.12.el8?arch=s390x\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "podman-remote-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"product": {
"name": "podman-remote-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"product_id": "podman-remote-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-remote@4.2.0-6.1.rhaos4.12.el8?arch=s390x\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "podman-tests-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"product": {
"name": "podman-tests-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"product_id": "podman-tests-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-tests@4.2.0-6.1.rhaos4.12.el8?arch=s390x\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "podman-debugsource-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"product": {
"name": "podman-debugsource-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"product_id": "podman-debugsource-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-debugsource@4.2.0-6.1.rhaos4.12.el8?arch=s390x\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "podman-catatonit-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"product": {
"name": "podman-catatonit-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"product_id": "podman-catatonit-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-catatonit-debuginfo@4.2.0-6.1.rhaos4.12.el8?arch=s390x\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "podman-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"product": {
"name": "podman-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"product_id": "podman-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-debuginfo@4.2.0-6.1.rhaos4.12.el8?arch=s390x\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "podman-gvproxy-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"product": {
"name": "podman-gvproxy-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"product_id": "podman-gvproxy-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-gvproxy-debuginfo@4.2.0-6.1.rhaos4.12.el8?arch=s390x\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "podman-plugins-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"product": {
"name": "podman-plugins-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"product_id": "podman-plugins-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-plugins-debuginfo@4.2.0-6.1.rhaos4.12.el8?arch=s390x\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "podman-remote-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"product": {
"name": "podman-remote-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"product_id": "podman-remote-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-remote-debuginfo@4.2.0-6.1.rhaos4.12.el8?arch=s390x\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "runc-3:1.1.6-4.rhaos4.12.el8.s390x",
"product": {
"name": "runc-3:1.1.6-4.rhaos4.12.el8.s390x",
"product_id": "runc-3:1.1.6-4.rhaos4.12.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/runc@1.1.6-4.rhaos4.12.el8?arch=s390x\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "runc-debugsource-3:1.1.6-4.rhaos4.12.el8.s390x",
"product": {
"name": "runc-debugsource-3:1.1.6-4.rhaos4.12.el8.s390x",
"product_id": "runc-debugsource-3:1.1.6-4.rhaos4.12.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/runc-debugsource@1.1.6-4.rhaos4.12.el8?arch=s390x\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "runc-debuginfo-3:1.1.6-4.rhaos4.12.el8.s390x",
"product": {
"name": "runc-debuginfo-3:1.1.6-4.rhaos4.12.el8.s390x",
"product_id": "runc-debuginfo-3:1.1.6-4.rhaos4.12.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/runc-debuginfo@1.1.6-4.rhaos4.12.el8?arch=s390x\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "skopeo-2:1.9.4-3.1.rhaos4.12.el8.s390x",
"product": {
"name": "skopeo-2:1.9.4-3.1.rhaos4.12.el8.s390x",
"product_id": "skopeo-2:1.9.4-3.1.rhaos4.12.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/skopeo@1.9.4-3.1.rhaos4.12.el8?arch=s390x\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "skopeo-tests-2:1.9.4-3.1.rhaos4.12.el8.s390x",
"product": {
"name": "skopeo-tests-2:1.9.4-3.1.rhaos4.12.el8.s390x",
"product_id": "skopeo-tests-2:1.9.4-3.1.rhaos4.12.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/skopeo-tests@1.9.4-3.1.rhaos4.12.el8?arch=s390x\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "skopeo-debugsource-2:1.9.4-3.1.rhaos4.12.el8.s390x",
"product": {
"name": "skopeo-debugsource-2:1.9.4-3.1.rhaos4.12.el8.s390x",
"product_id": "skopeo-debugsource-2:1.9.4-3.1.rhaos4.12.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/skopeo-debugsource@1.9.4-3.1.rhaos4.12.el8?arch=s390x\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "skopeo-debuginfo-2:1.9.4-3.1.rhaos4.12.el8.s390x",
"product": {
"name": "skopeo-debuginfo-2:1.9.4-3.1.rhaos4.12.el8.s390x",
"product_id": "skopeo-debuginfo-2:1.9.4-3.1.rhaos4.12.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/skopeo-debuginfo@1.9.4-3.1.rhaos4.12.el8?arch=s390x\u0026epoch=2"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "podman-docker-3:4.2.0-7.rhaos4.12.el9.noarch",
"product": {
"name": "podman-docker-3:4.2.0-7.rhaos4.12.el9.noarch",
"product_id": "podman-docker-3:4.2.0-7.rhaos4.12.el9.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-docker@4.2.0-7.rhaos4.12.el9?arch=noarch\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "kernel-doc-0:4.18.0-372.59.1.el8_6.noarch",
"product": {
"name": "kernel-doc-0:4.18.0-372.59.1.el8_6.noarch",
"product_id": "kernel-doc-0:4.18.0-372.59.1.el8_6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-doc@4.18.0-372.59.1.el8_6?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "openshift-ansible-0:4.12.0-202306090942.p0.g74dc7b3.assembly.stream.el8.noarch",
"product": {
"name": "openshift-ansible-0:4.12.0-202306090942.p0.g74dc7b3.assembly.stream.el8.noarch",
"product_id": "openshift-ansible-0:4.12.0-202306090942.p0.g74dc7b3.assembly.stream.el8.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-ansible@4.12.0-202306090942.p0.g74dc7b3.assembly.stream.el8?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "openshift-ansible-test-0:4.12.0-202306090942.p0.g74dc7b3.assembly.stream.el8.noarch",
"product": {
"name": "openshift-ansible-test-0:4.12.0-202306090942.p0.g74dc7b3.assembly.stream.el8.noarch",
"product_id": "openshift-ansible-test-0:4.12.0-202306090942.p0.g74dc7b3.assembly.stream.el8.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-ansible-test@4.12.0-202306090942.p0.g74dc7b3.assembly.stream.el8?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "openshift-kuryr-cni-0:4.12.0-202306140156.p0.g31dd228.assembly.stream.el8.noarch",
"product": {
"name": "openshift-kuryr-cni-0:4.12.0-202306140156.p0.g31dd228.assembly.stream.el8.noarch",
"product_id": "openshift-kuryr-cni-0:4.12.0-202306140156.p0.g31dd228.assembly.stream.el8.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-kuryr-cni@4.12.0-202306140156.p0.g31dd228.assembly.stream.el8?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "openshift-kuryr-common-0:4.12.0-202306140156.p0.g31dd228.assembly.stream.el8.noarch",
"product": {
"name": "openshift-kuryr-common-0:4.12.0-202306140156.p0.g31dd228.assembly.stream.el8.noarch",
"product_id": "openshift-kuryr-common-0:4.12.0-202306140156.p0.g31dd228.assembly.stream.el8.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-kuryr-common@4.12.0-202306140156.p0.g31dd228.assembly.stream.el8?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "openshift-kuryr-controller-0:4.12.0-202306140156.p0.g31dd228.assembly.stream.el8.noarch",
"product": {
"name": "openshift-kuryr-controller-0:4.12.0-202306140156.p0.g31dd228.assembly.stream.el8.noarch",
"product_id": "openshift-kuryr-controller-0:4.12.0-202306140156.p0.g31dd228.assembly.stream.el8.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-kuryr-controller@4.12.0-202306140156.p0.g31dd228.assembly.stream.el8?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "python3-kuryr-kubernetes-0:4.12.0-202306140156.p0.g31dd228.assembly.stream.el8.noarch",
"product": {
"name": "python3-kuryr-kubernetes-0:4.12.0-202306140156.p0.g31dd228.assembly.stream.el8.noarch",
"product_id": "python3-kuryr-kubernetes-0:4.12.0-202306140156.p0.g31dd228.assembly.stream.el8.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-kuryr-kubernetes@4.12.0-202306140156.p0.g31dd228.assembly.stream.el8?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "openshift4-aws-iso-0:4.12.0-202306090942.p0.gd2acdd5.assembly.stream.el8.noarch",
"product": {
"name": "openshift4-aws-iso-0:4.12.0-202306090942.p0.gd2acdd5.assembly.stream.el8.noarch",
"product_id": "openshift4-aws-iso-0:4.12.0-202306090942.p0.gd2acdd5.assembly.stream.el8.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift4-aws-iso@4.12.0-202306090942.p0.gd2acdd5.assembly.stream.el8?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "podman-docker-3:4.2.0-6.1.rhaos4.12.el8.noarch",
"product": {
"name": "podman-docker-3:4.2.0-6.1.rhaos4.12.el8.noarch",
"product_id": "podman-docker-3:4.2.0-6.1.rhaos4.12.el8.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-docker@4.2.0-6.1.rhaos4.12.el8?arch=noarch\u0026epoch=3"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-372.59.1.el8_6.aarch64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:bpftool-0:4.18.0-372.59.1.el8_6.aarch64"
},
"product_reference": "bpftool-0:4.18.0-372.59.1.el8_6.aarch64",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-372.59.1.el8_6.ppc64le as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:bpftool-0:4.18.0-372.59.1.el8_6.ppc64le"
},
"product_reference": "bpftool-0:4.18.0-372.59.1.el8_6.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-372.59.1.el8_6.s390x as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:bpftool-0:4.18.0-372.59.1.el8_6.s390x"
},
"product_reference": "bpftool-0:4.18.0-372.59.1.el8_6.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-372.59.1.el8_6.x86_64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:bpftool-0:4.18.0-372.59.1.el8_6.x86_64"
},
"product_reference": "bpftool-0:4.18.0-372.59.1.el8_6.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:bpftool-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:bpftool-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-372.59.1.el8_6.s390x as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:bpftool-debuginfo-0:4.18.0-372.59.1.el8_6.s390x"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-372.59.1.el8_6.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:bpftool-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "buildah-1:1.23.4-5.1.rhaos4.12.el8.aarch64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:buildah-1:1.23.4-5.1.rhaos4.12.el8.aarch64"
},
"product_reference": "buildah-1:1.23.4-5.1.rhaos4.12.el8.aarch64",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "buildah-1:1.23.4-5.1.rhaos4.12.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:buildah-1:1.23.4-5.1.rhaos4.12.el8.ppc64le"
},
"product_reference": "buildah-1:1.23.4-5.1.rhaos4.12.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "buildah-1:1.23.4-5.1.rhaos4.12.el8.s390x as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:buildah-1:1.23.4-5.1.rhaos4.12.el8.s390x"
},
"product_reference": "buildah-1:1.23.4-5.1.rhaos4.12.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "buildah-1:1.23.4-5.1.rhaos4.12.el8.src as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:buildah-1:1.23.4-5.1.rhaos4.12.el8.src"
},
"product_reference": "buildah-1:1.23.4-5.1.rhaos4.12.el8.src",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "buildah-1:1.23.4-5.1.rhaos4.12.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:buildah-1:1.23.4-5.1.rhaos4.12.el8.x86_64"
},
"product_reference": "buildah-1:1.23.4-5.1.rhaos4.12.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "buildah-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.aarch64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.aarch64"
},
"product_reference": "buildah-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.aarch64",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "buildah-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.ppc64le"
},
"product_reference": "buildah-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "buildah-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.s390x as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.s390x"
},
"product_reference": "buildah-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "buildah-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.x86_64"
},
"product_reference": "buildah-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "buildah-debugsource-1:1.23.4-5.1.rhaos4.12.el8.aarch64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.1.rhaos4.12.el8.aarch64"
},
"product_reference": "buildah-debugsource-1:1.23.4-5.1.rhaos4.12.el8.aarch64",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "buildah-debugsource-1:1.23.4-5.1.rhaos4.12.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.1.rhaos4.12.el8.ppc64le"
},
"product_reference": "buildah-debugsource-1:1.23.4-5.1.rhaos4.12.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "buildah-debugsource-1:1.23.4-5.1.rhaos4.12.el8.s390x as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.1.rhaos4.12.el8.s390x"
},
"product_reference": "buildah-debugsource-1:1.23.4-5.1.rhaos4.12.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "buildah-debugsource-1:1.23.4-5.1.rhaos4.12.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.1.rhaos4.12.el8.x86_64"
},
"product_reference": "buildah-debugsource-1:1.23.4-5.1.rhaos4.12.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "buildah-tests-1:1.23.4-5.1.rhaos4.12.el8.aarch64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.1.rhaos4.12.el8.aarch64"
},
"product_reference": "buildah-tests-1:1.23.4-5.1.rhaos4.12.el8.aarch64",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "buildah-tests-1:1.23.4-5.1.rhaos4.12.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.1.rhaos4.12.el8.ppc64le"
},
"product_reference": "buildah-tests-1:1.23.4-5.1.rhaos4.12.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "buildah-tests-1:1.23.4-5.1.rhaos4.12.el8.s390x as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.1.rhaos4.12.el8.s390x"
},
"product_reference": "buildah-tests-1:1.23.4-5.1.rhaos4.12.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "buildah-tests-1:1.23.4-5.1.rhaos4.12.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.1.rhaos4.12.el8.x86_64"
},
"product_reference": "buildah-tests-1:1.23.4-5.1.rhaos4.12.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "buildah-tests-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.aarch64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.aarch64"
},
"product_reference": "buildah-tests-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.aarch64",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "buildah-tests-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.ppc64le"
},
"product_reference": "buildah-tests-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "buildah-tests-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.s390x as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.s390x"
},
"product_reference": "buildah-tests-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "buildah-tests-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.x86_64"
},
"product_reference": "buildah-tests-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "conmon-2:2.1.2-4.rhaos4.12.el8.aarch64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:conmon-2:2.1.2-4.rhaos4.12.el8.aarch64"
},
"product_reference": "conmon-2:2.1.2-4.rhaos4.12.el8.aarch64",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "conmon-2:2.1.2-4.rhaos4.12.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:conmon-2:2.1.2-4.rhaos4.12.el8.ppc64le"
},
"product_reference": "conmon-2:2.1.2-4.rhaos4.12.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "conmon-2:2.1.2-4.rhaos4.12.el8.s390x as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:conmon-2:2.1.2-4.rhaos4.12.el8.s390x"
},
"product_reference": "conmon-2:2.1.2-4.rhaos4.12.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "conmon-2:2.1.2-4.rhaos4.12.el8.src as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:conmon-2:2.1.2-4.rhaos4.12.el8.src"
},
"product_reference": "conmon-2:2.1.2-4.rhaos4.12.el8.src",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "conmon-2:2.1.2-4.rhaos4.12.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:conmon-2:2.1.2-4.rhaos4.12.el8.x86_64"
},
"product_reference": "conmon-2:2.1.2-4.rhaos4.12.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "conmon-debuginfo-2:2.1.2-4.rhaos4.12.el8.aarch64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-4.rhaos4.12.el8.aarch64"
},
"product_reference": "conmon-debuginfo-2:2.1.2-4.rhaos4.12.el8.aarch64",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "conmon-debuginfo-2:2.1.2-4.rhaos4.12.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-4.rhaos4.12.el8.ppc64le"
},
"product_reference": "conmon-debuginfo-2:2.1.2-4.rhaos4.12.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "conmon-debuginfo-2:2.1.2-4.rhaos4.12.el8.s390x as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-4.rhaos4.12.el8.s390x"
},
"product_reference": "conmon-debuginfo-2:2.1.2-4.rhaos4.12.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "conmon-debuginfo-2:2.1.2-4.rhaos4.12.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-4.rhaos4.12.el8.x86_64"
},
"product_reference": "conmon-debuginfo-2:2.1.2-4.rhaos4.12.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "conmon-debugsource-2:2.1.2-4.rhaos4.12.el8.aarch64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-4.rhaos4.12.el8.aarch64"
},
"product_reference": "conmon-debugsource-2:2.1.2-4.rhaos4.12.el8.aarch64",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "conmon-debugsource-2:2.1.2-4.rhaos4.12.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-4.rhaos4.12.el8.ppc64le"
},
"product_reference": "conmon-debugsource-2:2.1.2-4.rhaos4.12.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "conmon-debugsource-2:2.1.2-4.rhaos4.12.el8.s390x as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-4.rhaos4.12.el8.s390x"
},
"product_reference": "conmon-debugsource-2:2.1.2-4.rhaos4.12.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "conmon-debugsource-2:2.1.2-4.rhaos4.12.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-4.rhaos4.12.el8.x86_64"
},
"product_reference": "conmon-debugsource-2:2.1.2-4.rhaos4.12.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "containernetworking-plugins-0:1.0.1-7.rhaos4.12.el8.aarch64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:containernetworking-plugins-0:1.0.1-7.rhaos4.12.el8.aarch64"
},
"product_reference": "containernetworking-plugins-0:1.0.1-7.rhaos4.12.el8.aarch64",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "containernetworking-plugins-0:1.0.1-7.rhaos4.12.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:containernetworking-plugins-0:1.0.1-7.rhaos4.12.el8.ppc64le"
},
"product_reference": "containernetworking-plugins-0:1.0.1-7.rhaos4.12.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "containernetworking-plugins-0:1.0.1-7.rhaos4.12.el8.s390x as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:containernetworking-plugins-0:1.0.1-7.rhaos4.12.el8.s390x"
},
"product_reference": "containernetworking-plugins-0:1.0.1-7.rhaos4.12.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "containernetworking-plugins-0:1.0.1-7.rhaos4.12.el8.src as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:containernetworking-plugins-0:1.0.1-7.rhaos4.12.el8.src"
},
"product_reference": "containernetworking-plugins-0:1.0.1-7.rhaos4.12.el8.src",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "containernetworking-plugins-0:1.0.1-7.rhaos4.12.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:containernetworking-plugins-0:1.0.1-7.rhaos4.12.el8.x86_64"
},
"product_reference": "containernetworking-plugins-0:1.0.1-7.rhaos4.12.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "containernetworking-plugins-debuginfo-0:1.0.1-7.rhaos4.12.el8.aarch64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:containernetworking-plugins-debuginfo-0:1.0.1-7.rhaos4.12.el8.aarch64"
},
"product_reference": "containernetworking-plugins-debuginfo-0:1.0.1-7.rhaos4.12.el8.aarch64",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "containernetworking-plugins-debuginfo-0:1.0.1-7.rhaos4.12.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:containernetworking-plugins-debuginfo-0:1.0.1-7.rhaos4.12.el8.ppc64le"
},
"product_reference": "containernetworking-plugins-debuginfo-0:1.0.1-7.rhaos4.12.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "containernetworking-plugins-debuginfo-0:1.0.1-7.rhaos4.12.el8.s390x as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:containernetworking-plugins-debuginfo-0:1.0.1-7.rhaos4.12.el8.s390x"
},
"product_reference": "containernetworking-plugins-debuginfo-0:1.0.1-7.rhaos4.12.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "containernetworking-plugins-debuginfo-0:1.0.1-7.rhaos4.12.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:containernetworking-plugins-debuginfo-0:1.0.1-7.rhaos4.12.el8.x86_64"
},
"product_reference": "containernetworking-plugins-debuginfo-0:1.0.1-7.rhaos4.12.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "containernetworking-plugins-debugsource-0:1.0.1-7.rhaos4.12.el8.aarch64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:containernetworking-plugins-debugsource-0:1.0.1-7.rhaos4.12.el8.aarch64"
},
"product_reference": "containernetworking-plugins-debugsource-0:1.0.1-7.rhaos4.12.el8.aarch64",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "containernetworking-plugins-debugsource-0:1.0.1-7.rhaos4.12.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:containernetworking-plugins-debugsource-0:1.0.1-7.rhaos4.12.el8.ppc64le"
},
"product_reference": "containernetworking-plugins-debugsource-0:1.0.1-7.rhaos4.12.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "containernetworking-plugins-debugsource-0:1.0.1-7.rhaos4.12.el8.s390x as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:containernetworking-plugins-debugsource-0:1.0.1-7.rhaos4.12.el8.s390x"
},
"product_reference": "containernetworking-plugins-debugsource-0:1.0.1-7.rhaos4.12.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "containernetworking-plugins-debugsource-0:1.0.1-7.rhaos4.12.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:containernetworking-plugins-debugsource-0:1.0.1-7.rhaos4.12.el8.x86_64"
},
"product_reference": "containernetworking-plugins-debugsource-0:1.0.1-7.rhaos4.12.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-372.59.1.el8_6.aarch64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:kernel-0:4.18.0-372.59.1.el8_6.aarch64"
},
"product_reference": "kernel-0:4.18.0-372.59.1.el8_6.aarch64",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-372.59.1.el8_6.ppc64le as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:kernel-0:4.18.0-372.59.1.el8_6.ppc64le"
},
"product_reference": "kernel-0:4.18.0-372.59.1.el8_6.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-372.59.1.el8_6.s390x as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:kernel-0:4.18.0-372.59.1.el8_6.s390x"
},
"product_reference": "kernel-0:4.18.0-372.59.1.el8_6.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-372.59.1.el8_6.src as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:kernel-0:4.18.0-372.59.1.el8_6.src"
},
"product_reference": "kernel-0:4.18.0-372.59.1.el8_6.src",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-372.59.1.el8_6.x86_64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:kernel-0:4.18.0-372.59.1.el8_6.x86_64"
},
"product_reference": "kernel-0:4.18.0-372.59.1.el8_6.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-372.59.1.el8_6.aarch64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:kernel-core-0:4.18.0-372.59.1.el8_6.aarch64"
},
"product_reference": "kernel-core-0:4.18.0-372.59.1.el8_6.aarch64",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-372.59.1.el8_6.ppc64le as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:kernel-core-0:4.18.0-372.59.1.el8_6.ppc64le"
},
"product_reference": "kernel-core-0:4.18.0-372.59.1.el8_6.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-372.59.1.el8_6.s390x as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:kernel-core-0:4.18.0-372.59.1.el8_6.s390x"
},
"product_reference": "kernel-core-0:4.18.0-372.59.1.el8_6.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-372.59.1.el8_6.x86_64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:kernel-core-0:4.18.0-372.59.1.el8_6.x86_64"
},
"product_reference": "kernel-core-0:4.18.0-372.59.1.el8_6.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-372.59.1.el8_6.aarch64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:kernel-cross-headers-0:4.18.0-372.59.1.el8_6.aarch64"
},
"product_reference": "kernel-cross-headers-0:4.18.0-372.59.1.el8_6.aarch64",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-372.59.1.el8_6.ppc64le as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:kernel-cross-headers-0:4.18.0-372.59.1.el8_6.ppc64le"
},
"product_reference": "kernel-cross-headers-0:4.18.0-372.59.1.el8_6.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-372.59.1.el8_6.s390x as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:kernel-cross-headers-0:4.18.0-372.59.1.el8_6.s390x"
},
"product_reference": "kernel-cross-headers-0:4.18.0-372.59.1.el8_6.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-372.59.1.el8_6.x86_64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:kernel-cross-headers-0:4.18.0-372.59.1.el8_6.x86_64"
},
"product_reference": "kernel-cross-headers-0:4.18.0-372.59.1.el8_6.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-372.59.1.el8_6.aarch64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:kernel-debug-0:4.18.0-372.59.1.el8_6.aarch64"
},
"product_reference": "kernel-debug-0:4.18.0-372.59.1.el8_6.aarch64",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-372.59.1.el8_6.ppc64le as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:kernel-debug-0:4.18.0-372.59.1.el8_6.ppc64le"
},
"product_reference": "kernel-debug-0:4.18.0-372.59.1.el8_6.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-372.59.1.el8_6.s390x as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:kernel-debug-0:4.18.0-372.59.1.el8_6.s390x"
},
"product_reference": "kernel-debug-0:4.18.0-372.59.1.el8_6.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-372.59.1.el8_6.x86_64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:kernel-debug-0:4.18.0-372.59.1.el8_6.x86_64"
},
"product_reference": "kernel-debug-0:4.18.0-372.59.1.el8_6.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-372.59.1.el8_6.aarch64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:kernel-debug-core-0:4.18.0-372.59.1.el8_6.aarch64"
},
"product_reference": "kernel-debug-core-0:4.18.0-372.59.1.el8_6.aarch64",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-372.59.1.el8_6.ppc64le as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:kernel-debug-core-0:4.18.0-372.59.1.el8_6.ppc64le"
},
"product_reference": "kernel-debug-core-0:4.18.0-372.59.1.el8_6.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-372.59.1.el8_6.s390x as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:kernel-debug-core-0:4.18.0-372.59.1.el8_6.s390x"
},
"product_reference": "kernel-debug-core-0:4.18.0-372.59.1.el8_6.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-372.59.1.el8_6.x86_64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:kernel-debug-core-0:4.18.0-372.59.1.el8_6.x86_64"
},
"product_reference": "kernel-debug-core-0:4.18.0-372.59.1.el8_6.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:kernel-debug-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:kernel-debug-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-372.59.1.el8_6.s390x as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:kernel-debug-debuginfo-0:4.18.0-372.59.1.el8_6.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-372.59.1.el8_6.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:kernel-debug-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-372.59.1.el8_6.aarch64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:kernel-debug-devel-0:4.18.0-372.59.1.el8_6.aarch64"
},
"product_reference": "kernel-debug-devel-0:4.18.0-372.59.1.el8_6.aarch64",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-372.59.1.el8_6.ppc64le as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:kernel-debug-devel-0:4.18.0-372.59.1.el8_6.ppc64le"
},
"product_reference": "kernel-debug-devel-0:4.18.0-372.59.1.el8_6.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-372.59.1.el8_6.s390x as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:kernel-debug-devel-0:4.18.0-372.59.1.el8_6.s390x"
},
"product_reference": "kernel-debug-devel-0:4.18.0-372.59.1.el8_6.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-372.59.1.el8_6.x86_64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:kernel-debug-devel-0:4.18.0-372.59.1.el8_6.x86_64"
},
"product_reference": "kernel-debug-devel-0:4.18.0-372.59.1.el8_6.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-372.59.1.el8_6.aarch64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:kernel-debug-modules-0:4.18.0-372.59.1.el8_6.aarch64"
},
"product_reference": "kernel-debug-modules-0:4.18.0-372.59.1.el8_6.aarch64",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-372.59.1.el8_6.ppc64le as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:kernel-debug-modules-0:4.18.0-372.59.1.el8_6.ppc64le"
},
"product_reference": "kernel-debug-modules-0:4.18.0-372.59.1.el8_6.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-372.59.1.el8_6.s390x as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:kernel-debug-modules-0:4.18.0-372.59.1.el8_6.s390x"
},
"product_reference": "kernel-debug-modules-0:4.18.0-372.59.1.el8_6.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-372.59.1.el8_6.x86_64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:kernel-debug-modules-0:4.18.0-372.59.1.el8_6.x86_64"
},
"product_reference": "kernel-debug-modules-0:4.18.0-372.59.1.el8_6.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-372.59.1.el8_6.aarch64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:kernel-debug-modules-extra-0:4.18.0-372.59.1.el8_6.aarch64"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-372.59.1.el8_6.aarch64",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-372.59.1.el8_6.ppc64le as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:kernel-debug-modules-extra-0:4.18.0-372.59.1.el8_6.ppc64le"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-372.59.1.el8_6.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-372.59.1.el8_6.s390x as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:kernel-debug-modules-extra-0:4.18.0-372.59.1.el8_6.s390x"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-372.59.1.el8_6.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-372.59.1.el8_6.x86_64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:kernel-debug-modules-extra-0:4.18.0-372.59.1.el8_6.x86_64"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-372.59.1.el8_6.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-internal-0:4.18.0-372.59.1.el8_6.aarch64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:kernel-debug-modules-internal-0:4.18.0-372.59.1.el8_6.aarch64"
},
"product_reference": "kernel-debug-modules-internal-0:4.18.0-372.59.1.el8_6.aarch64",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-internal-0:4.18.0-372.59.1.el8_6.ppc64le as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:kernel-debug-modules-internal-0:4.18.0-372.59.1.el8_6.ppc64le"
},
"product_reference": "kernel-debug-modules-internal-0:4.18.0-372.59.1.el8_6.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-internal-0:4.18.0-372.59.1.el8_6.s390x as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:kernel-debug-modules-internal-0:4.18.0-372.59.1.el8_6.s390x"
},
"product_reference": "kernel-debug-modules-internal-0:4.18.0-372.59.1.el8_6.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-internal-0:4.18.0-372.59.1.el8_6.x86_64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:kernel-debug-modules-internal-0:4.18.0-372.59.1.el8_6.x86_64"
},
"product_reference": "kernel-debug-modules-internal-0:4.18.0-372.59.1.el8_6.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:kernel-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64"
},
"product_reference": "kernel-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:kernel-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le"
},
"product_reference": "kernel-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-372.59.1.el8_6.s390x as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:kernel-debuginfo-0:4.18.0-372.59.1.el8_6.s390x"
},
"product_reference": "kernel-debuginfo-0:4.18.0-372.59.1.el8_6.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:kernel-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64"
},
"product_reference": "kernel-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-aarch64-0:4.18.0-372.59.1.el8_6.aarch64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:kernel-debuginfo-common-aarch64-0:4.18.0-372.59.1.el8_6.aarch64"
},
"product_reference": "kernel-debuginfo-common-aarch64-0:4.18.0-372.59.1.el8_6.aarch64",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:4.18.0-372.59.1.el8_6.ppc64le as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:kernel-debuginfo-common-ppc64le-0:4.18.0-372.59.1.el8_6.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:4.18.0-372.59.1.el8_6.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:4.18.0-372.59.1.el8_6.s390x as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:kernel-debuginfo-common-s390x-0:4.18.0-372.59.1.el8_6.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:4.18.0-372.59.1.el8_6.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:4.18.0-372.59.1.el8_6.x86_64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:kernel-debuginfo-common-x86_64-0:4.18.0-372.59.1.el8_6.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:4.18.0-372.59.1.el8_6.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-372.59.1.el8_6.aarch64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:kernel-devel-0:4.18.0-372.59.1.el8_6.aarch64"
},
"product_reference": "kernel-devel-0:4.18.0-372.59.1.el8_6.aarch64",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-372.59.1.el8_6.ppc64le as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:kernel-devel-0:4.18.0-372.59.1.el8_6.ppc64le"
},
"product_reference": "kernel-devel-0:4.18.0-372.59.1.el8_6.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-372.59.1.el8_6.s390x as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:kernel-devel-0:4.18.0-372.59.1.el8_6.s390x"
},
"product_reference": "kernel-devel-0:4.18.0-372.59.1.el8_6.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-372.59.1.el8_6.x86_64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:kernel-devel-0:4.18.0-372.59.1.el8_6.x86_64"
},
"product_reference": "kernel-devel-0:4.18.0-372.59.1.el8_6.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:4.18.0-372.59.1.el8_6.noarch as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:kernel-doc-0:4.18.0-372.59.1.el8_6.noarch"
},
"product_reference": "kernel-doc-0:4.18.0-372.59.1.el8_6.noarch",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-372.59.1.el8_6.aarch64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:kernel-headers-0:4.18.0-372.59.1.el8_6.aarch64"
},
"product_reference": "kernel-headers-0:4.18.0-372.59.1.el8_6.aarch64",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-372.59.1.el8_6.ppc64le as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:kernel-headers-0:4.18.0-372.59.1.el8_6.ppc64le"
},
"product_reference": "kernel-headers-0:4.18.0-372.59.1.el8_6.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-372.59.1.el8_6.s390x as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:kernel-headers-0:4.18.0-372.59.1.el8_6.s390x"
},
"product_reference": "kernel-headers-0:4.18.0-372.59.1.el8_6.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-372.59.1.el8_6.x86_64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:kernel-headers-0:4.18.0-372.59.1.el8_6.x86_64"
},
"product_reference": "kernel-headers-0:4.18.0-372.59.1.el8_6.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-ipaclones-internal-0:4.18.0-372.59.1.el8_6.ppc64le as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:kernel-ipaclones-internal-0:4.18.0-372.59.1.el8_6.ppc64le"
},
"product_reference": "kernel-ipaclones-internal-0:4.18.0-372.59.1.el8_6.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-ipaclones-internal-0:4.18.0-372.59.1.el8_6.x86_64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:kernel-ipaclones-internal-0:4.18.0-372.59.1.el8_6.x86_64"
},
"product_reference": "kernel-ipaclones-internal-0:4.18.0-372.59.1.el8_6.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-372.59.1.el8_6.aarch64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:kernel-modules-0:4.18.0-372.59.1.el8_6.aarch64"
},
"product_reference": "kernel-modules-0:4.18.0-372.59.1.el8_6.aarch64",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-372.59.1.el8_6.ppc64le as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:kernel-modules-0:4.18.0-372.59.1.el8_6.ppc64le"
},
"product_reference": "kernel-modules-0:4.18.0-372.59.1.el8_6.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-372.59.1.el8_6.s390x as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:kernel-modules-0:4.18.0-372.59.1.el8_6.s390x"
},
"product_reference": "kernel-modules-0:4.18.0-372.59.1.el8_6.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-372.59.1.el8_6.x86_64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:kernel-modules-0:4.18.0-372.59.1.el8_6.x86_64"
},
"product_reference": "kernel-modules-0:4.18.0-372.59.1.el8_6.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-372.59.1.el8_6.aarch64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:kernel-modules-extra-0:4.18.0-372.59.1.el8_6.aarch64"
},
"product_reference": "kernel-modules-extra-0:4.18.0-372.59.1.el8_6.aarch64",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-372.59.1.el8_6.ppc64le as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:kernel-modules-extra-0:4.18.0-372.59.1.el8_6.ppc64le"
},
"product_reference": "kernel-modules-extra-0:4.18.0-372.59.1.el8_6.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-372.59.1.el8_6.s390x as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:kernel-modules-extra-0:4.18.0-372.59.1.el8_6.s390x"
},
"product_reference": "kernel-modules-extra-0:4.18.0-372.59.1.el8_6.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-372.59.1.el8_6.x86_64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:kernel-modules-extra-0:4.18.0-372.59.1.el8_6.x86_64"
},
"product_reference": "kernel-modules-extra-0:4.18.0-372.59.1.el8_6.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-internal-0:4.18.0-372.59.1.el8_6.aarch64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:kernel-modules-internal-0:4.18.0-372.59.1.el8_6.aarch64"
},
"product_reference": "kernel-modules-internal-0:4.18.0-372.59.1.el8_6.aarch64",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-internal-0:4.18.0-372.59.1.el8_6.ppc64le as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:kernel-modules-internal-0:4.18.0-372.59.1.el8_6.ppc64le"
},
"product_reference": "kernel-modules-internal-0:4.18.0-372.59.1.el8_6.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-internal-0:4.18.0-372.59.1.el8_6.s390x as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:kernel-modules-internal-0:4.18.0-372.59.1.el8_6.s390x"
},
"product_reference": "kernel-modules-internal-0:4.18.0-372.59.1.el8_6.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-internal-0:4.18.0-372.59.1.el8_6.x86_64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:kernel-modules-internal-0:4.18.0-372.59.1.el8_6.x86_64"
},
"product_reference": "kernel-modules-internal-0:4.18.0-372.59.1.el8_6.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-0:4.18.0-372.59.1.rt7.217.el8_6.src as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:kernel-rt-0:4.18.0-372.59.1.rt7.217.el8_6.src"
},
"product_reference": "kernel-rt-0:4.18.0-372.59.1.rt7.217.el8_6.src",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:kernel-rt-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64"
},
"product_reference": "kernel-rt-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-core-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:kernel-rt-core-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64"
},
"product_reference": "kernel-rt-core-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:kernel-rt-debug-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64"
},
"product_reference": "kernel-rt-debug-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-core-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:kernel-rt-debug-core-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64"
},
"product_reference": "kernel-rt-debug-core-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-debuginfo-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:kernel-rt-debug-debuginfo-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64"
},
"product_reference": "kernel-rt-debug-debuginfo-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-devel-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:kernel-rt-debug-devel-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64"
},
"product_reference": "kernel-rt-debug-devel-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-kvm-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:kernel-rt-debug-kvm-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64"
},
"product_reference": "kernel-rt-debug-kvm-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-modules-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:kernel-rt-debug-modules-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64"
},
"product_reference": "kernel-rt-debug-modules-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-modules-extra-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:kernel-rt-debug-modules-extra-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64"
},
"product_reference": "kernel-rt-debug-modules-extra-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-modules-internal-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:kernel-rt-debug-modules-internal-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64"
},
"product_reference": "kernel-rt-debug-modules-internal-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debuginfo-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:kernel-rt-debuginfo-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64"
},
"product_reference": "kernel-rt-debuginfo-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64"
},
"product_reference": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-devel-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:kernel-rt-devel-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64"
},
"product_reference": "kernel-rt-devel-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-kvm-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:kernel-rt-kvm-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64"
},
"product_reference": "kernel-rt-kvm-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-modules-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:kernel-rt-modules-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64"
},
"product_reference": "kernel-rt-modules-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-modules-extra-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:kernel-rt-modules-extra-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64"
},
"product_reference": "kernel-rt-modules-extra-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-modules-internal-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:kernel-rt-modules-internal-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64"
},
"product_reference": "kernel-rt-modules-internal-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-selftests-internal-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:kernel-rt-selftests-internal-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64"
},
"product_reference": "kernel-rt-selftests-internal-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-selftests-internal-0:4.18.0-372.59.1.el8_6.aarch64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:kernel-selftests-internal-0:4.18.0-372.59.1.el8_6.aarch64"
},
"product_reference": "kernel-selftests-internal-0:4.18.0-372.59.1.el8_6.aarch64",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-selftests-internal-0:4.18.0-372.59.1.el8_6.ppc64le as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:kernel-selftests-internal-0:4.18.0-372.59.1.el8_6.ppc64le"
},
"product_reference": "kernel-selftests-internal-0:4.18.0-372.59.1.el8_6.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-selftests-internal-0:4.18.0-372.59.1.el8_6.s390x as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:kernel-selftests-internal-0:4.18.0-372.59.1.el8_6.s390x"
},
"product_reference": "kernel-selftests-internal-0:4.18.0-372.59.1.el8_6.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-selftests-internal-0:4.18.0-372.59.1.el8_6.x86_64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:kernel-selftests-internal-0:4.18.0-372.59.1.el8_6.x86_64"
},
"product_reference": "kernel-selftests-internal-0:4.18.0-372.59.1.el8_6.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-372.59.1.el8_6.aarch64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:kernel-tools-0:4.18.0-372.59.1.el8_6.aarch64"
},
"product_reference": "kernel-tools-0:4.18.0-372.59.1.el8_6.aarch64",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-372.59.1.el8_6.ppc64le as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:kernel-tools-0:4.18.0-372.59.1.el8_6.ppc64le"
},
"product_reference": "kernel-tools-0:4.18.0-372.59.1.el8_6.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-372.59.1.el8_6.s390x as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:kernel-tools-0:4.18.0-372.59.1.el8_6.s390x"
},
"product_reference": "kernel-tools-0:4.18.0-372.59.1.el8_6.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-372.59.1.el8_6.x86_64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:kernel-tools-0:4.18.0-372.59.1.el8_6.x86_64"
},
"product_reference": "kernel-tools-0:4.18.0-372.59.1.el8_6.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:kernel-tools-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:kernel-tools-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-372.59.1.el8_6.s390x as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:kernel-tools-debuginfo-0:4.18.0-372.59.1.el8_6.s390x"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-372.59.1.el8_6.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:kernel-tools-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:4.18.0-372.59.1.el8_6.aarch64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:kernel-tools-libs-0:4.18.0-372.59.1.el8_6.aarch64"
},
"product_reference": "kernel-tools-libs-0:4.18.0-372.59.1.el8_6.aarch64",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:4.18.0-372.59.1.el8_6.ppc64le as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:kernel-tools-libs-0:4.18.0-372.59.1.el8_6.ppc64le"
},
"product_reference": "kernel-tools-libs-0:4.18.0-372.59.1.el8_6.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:4.18.0-372.59.1.el8_6.x86_64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:kernel-tools-libs-0:4.18.0-372.59.1.el8_6.x86_64"
},
"product_reference": "kernel-tools-libs-0:4.18.0-372.59.1.el8_6.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:4.18.0-372.59.1.el8_6.aarch64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:kernel-tools-libs-devel-0:4.18.0-372.59.1.el8_6.aarch64"
},
"product_reference": "kernel-tools-libs-devel-0:4.18.0-372.59.1.el8_6.aarch64",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:4.18.0-372.59.1.el8_6.ppc64le as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:kernel-tools-libs-devel-0:4.18.0-372.59.1.el8_6.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:4.18.0-372.59.1.el8_6.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:4.18.0-372.59.1.el8_6.x86_64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:kernel-tools-libs-devel-0:4.18.0-372.59.1.el8_6.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:4.18.0-372.59.1.el8_6.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-0:4.18.0-372.59.1.el8_6.s390x as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:kernel-zfcpdump-0:4.18.0-372.59.1.el8_6.s390x"
},
"product_reference": "kernel-zfcpdump-0:4.18.0-372.59.1.el8_6.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-core-0:4.18.0-372.59.1.el8_6.s390x as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:kernel-zfcpdump-core-0:4.18.0-372.59.1.el8_6.s390x"
},
"product_reference": "kernel-zfcpdump-core-0:4.18.0-372.59.1.el8_6.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-debuginfo-0:4.18.0-372.59.1.el8_6.s390x as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:kernel-zfcpdump-debuginfo-0:4.18.0-372.59.1.el8_6.s390x"
},
"product_reference": "kernel-zfcpdump-debuginfo-0:4.18.0-372.59.1.el8_6.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-devel-0:4.18.0-372.59.1.el8_6.s390x as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:kernel-zfcpdump-devel-0:4.18.0-372.59.1.el8_6.s390x"
},
"product_reference": "kernel-zfcpdump-devel-0:4.18.0-372.59.1.el8_6.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-modules-0:4.18.0-372.59.1.el8_6.s390x as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:kernel-zfcpdump-modules-0:4.18.0-372.59.1.el8_6.s390x"
},
"product_reference": "kernel-zfcpdump-modules-0:4.18.0-372.59.1.el8_6.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-modules-extra-0:4.18.0-372.59.1.el8_6.s390x as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:kernel-zfcpdump-modules-extra-0:4.18.0-372.59.1.el8_6.s390x"
},
"product_reference": "kernel-zfcpdump-modules-extra-0:4.18.0-372.59.1.el8_6.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-modules-internal-0:4.18.0-372.59.1.el8_6.s390x as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:kernel-zfcpdump-modules-internal-0:4.18.0-372.59.1.el8_6.s390x"
},
"product_reference": "kernel-zfcpdump-modules-internal-0:4.18.0-372.59.1.el8_6.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el8.src as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:openshift-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el8.src"
},
"product_reference": "openshift-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el8.src",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-ansible-0:4.12.0-202306090942.p0.g74dc7b3.assembly.stream.el8.noarch as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:openshift-ansible-0:4.12.0-202306090942.p0.g74dc7b3.assembly.stream.el8.noarch"
},
"product_reference": "openshift-ansible-0:4.12.0-202306090942.p0.g74dc7b3.assembly.stream.el8.noarch",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-ansible-0:4.12.0-202306090942.p0.g74dc7b3.assembly.stream.el8.src as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:openshift-ansible-0:4.12.0-202306090942.p0.g74dc7b3.assembly.stream.el8.src"
},
"product_reference": "openshift-ansible-0:4.12.0-202306090942.p0.g74dc7b3.assembly.stream.el8.src",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-ansible-test-0:4.12.0-202306090942.p0.g74dc7b3.assembly.stream.el8.noarch as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:openshift-ansible-test-0:4.12.0-202306090942.p0.g74dc7b3.assembly.stream.el8.noarch"
},
"product_reference": "openshift-ansible-test-0:4.12.0-202306090942.p0.g74dc7b3.assembly.stream.el8.noarch",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.aarch64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.aarch64"
},
"product_reference": "openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.aarch64",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.ppc64le"
},
"product_reference": "openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.s390x as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.s390x"
},
"product_reference": "openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.src as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.src"
},
"product_reference": "openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.src",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.x86_64"
},
"product_reference": "openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-clients-redistributable-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:openshift-clients-redistributable-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.x86_64"
},
"product_reference": "openshift-clients-redistributable-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el8.aarch64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el8.aarch64"
},
"product_reference": "openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el8.aarch64",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el8.ppc64le"
},
"product_reference": "openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el8.s390x as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el8.s390x"
},
"product_reference": "openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el8.x86_64"
},
"product_reference": "openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-kuryr-0:4.12.0-202306140156.p0.g31dd228.assembly.stream.el8.src as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:openshift-kuryr-0:4.12.0-202306140156.p0.g31dd228.assembly.stream.el8.src"
},
"product_reference": "openshift-kuryr-0:4.12.0-202306140156.p0.g31dd228.assembly.stream.el8.src",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-kuryr-cni-0:4.12.0-202306140156.p0.g31dd228.assembly.stream.el8.noarch as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:openshift-kuryr-cni-0:4.12.0-202306140156.p0.g31dd228.assembly.stream.el8.noarch"
},
"product_reference": "openshift-kuryr-cni-0:4.12.0-202306140156.p0.g31dd228.assembly.stream.el8.noarch",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-kuryr-common-0:4.12.0-202306140156.p0.g31dd228.assembly.stream.el8.noarch as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:openshift-kuryr-common-0:4.12.0-202306140156.p0.g31dd228.assembly.stream.el8.noarch"
},
"product_reference": "openshift-kuryr-common-0:4.12.0-202306140156.p0.g31dd228.assembly.stream.el8.noarch",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-kuryr-controller-0:4.12.0-202306140156.p0.g31dd228.assembly.stream.el8.noarch as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:openshift-kuryr-controller-0:4.12.0-202306140156.p0.g31dd228.assembly.stream.el8.noarch"
},
"product_reference": "openshift-kuryr-controller-0:4.12.0-202306140156.p0.g31dd228.assembly.stream.el8.noarch",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4-aws-iso-0:4.12.0-202306090942.p0.gd2acdd5.assembly.stream.el8.noarch as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:openshift4-aws-iso-0:4.12.0-202306090942.p0.gd2acdd5.assembly.stream.el8.noarch"
},
"product_reference": "openshift4-aws-iso-0:4.12.0-202306090942.p0.gd2acdd5.assembly.stream.el8.noarch",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4-aws-iso-0:4.12.0-202306090942.p0.gd2acdd5.assembly.stream.el8.src as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:openshift4-aws-iso-0:4.12.0-202306090942.p0.gd2acdd5.assembly.stream.el8.src"
},
"product_reference": "openshift4-aws-iso-0:4.12.0-202306090942.p0.gd2acdd5.assembly.stream.el8.src",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-372.59.1.el8_6.aarch64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:perf-0:4.18.0-372.59.1.el8_6.aarch64"
},
"product_reference": "perf-0:4.18.0-372.59.1.el8_6.aarch64",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-372.59.1.el8_6.ppc64le as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:perf-0:4.18.0-372.59.1.el8_6.ppc64le"
},
"product_reference": "perf-0:4.18.0-372.59.1.el8_6.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-372.59.1.el8_6.s390x as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:perf-0:4.18.0-372.59.1.el8_6.s390x"
},
"product_reference": "perf-0:4.18.0-372.59.1.el8_6.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-372.59.1.el8_6.x86_64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:perf-0:4.18.0-372.59.1.el8_6.x86_64"
},
"product_reference": "perf-0:4.18.0-372.59.1.el8_6.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:perf-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64"
},
"product_reference": "perf-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:perf-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le"
},
"product_reference": "perf-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-372.59.1.el8_6.s390x as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:perf-debuginfo-0:4.18.0-372.59.1.el8_6.s390x"
},
"product_reference": "perf-debuginfo-0:4.18.0-372.59.1.el8_6.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:perf-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64"
},
"product_reference": "perf-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-3:4.2.0-6.1.rhaos4.12.el8.aarch64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:podman-3:4.2.0-6.1.rhaos4.12.el8.aarch64"
},
"product_reference": "podman-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-3:4.2.0-6.1.rhaos4.12.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:podman-3:4.2.0-6.1.rhaos4.12.el8.ppc64le"
},
"product_reference": "podman-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-3:4.2.0-6.1.rhaos4.12.el8.s390x as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:podman-3:4.2.0-6.1.rhaos4.12.el8.s390x"
},
"product_reference": "podman-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-3:4.2.0-6.1.rhaos4.12.el8.src as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:podman-3:4.2.0-6.1.rhaos4.12.el8.src"
},
"product_reference": "podman-3:4.2.0-6.1.rhaos4.12.el8.src",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-3:4.2.0-6.1.rhaos4.12.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:podman-3:4.2.0-6.1.rhaos4.12.el8.x86_64"
},
"product_reference": "podman-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-catatonit-3:4.2.0-6.1.rhaos4.12.el8.aarch64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:podman-catatonit-3:4.2.0-6.1.rhaos4.12.el8.aarch64"
},
"product_reference": "podman-catatonit-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-catatonit-3:4.2.0-6.1.rhaos4.12.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:podman-catatonit-3:4.2.0-6.1.rhaos4.12.el8.ppc64le"
},
"product_reference": "podman-catatonit-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-catatonit-3:4.2.0-6.1.rhaos4.12.el8.s390x as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:podman-catatonit-3:4.2.0-6.1.rhaos4.12.el8.s390x"
},
"product_reference": "podman-catatonit-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-catatonit-3:4.2.0-6.1.rhaos4.12.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:podman-catatonit-3:4.2.0-6.1.rhaos4.12.el8.x86_64"
},
"product_reference": "podman-catatonit-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-catatonit-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.aarch64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.aarch64"
},
"product_reference": "podman-catatonit-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-catatonit-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.ppc64le"
},
"product_reference": "podman-catatonit-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-catatonit-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.s390x as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.s390x"
},
"product_reference": "podman-catatonit-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-catatonit-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.x86_64"
},
"product_reference": "podman-catatonit-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.aarch64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.aarch64"
},
"product_reference": "podman-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.ppc64le"
},
"product_reference": "podman-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.s390x as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.s390x"
},
"product_reference": "podman-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.x86_64"
},
"product_reference": "podman-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-debugsource-3:4.2.0-6.1.rhaos4.12.el8.aarch64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:podman-debugsource-3:4.2.0-6.1.rhaos4.12.el8.aarch64"
},
"product_reference": "podman-debugsource-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-debugsource-3:4.2.0-6.1.rhaos4.12.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:podman-debugsource-3:4.2.0-6.1.rhaos4.12.el8.ppc64le"
},
"product_reference": "podman-debugsource-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-debugsource-3:4.2.0-6.1.rhaos4.12.el8.s390x as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:podman-debugsource-3:4.2.0-6.1.rhaos4.12.el8.s390x"
},
"product_reference": "podman-debugsource-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-debugsource-3:4.2.0-6.1.rhaos4.12.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:podman-debugsource-3:4.2.0-6.1.rhaos4.12.el8.x86_64"
},
"product_reference": "podman-debugsource-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-docker-3:4.2.0-6.1.rhaos4.12.el8.noarch as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:podman-docker-3:4.2.0-6.1.rhaos4.12.el8.noarch"
},
"product_reference": "podman-docker-3:4.2.0-6.1.rhaos4.12.el8.noarch",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-gvproxy-3:4.2.0-6.1.rhaos4.12.el8.aarch64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-6.1.rhaos4.12.el8.aarch64"
},
"product_reference": "podman-gvproxy-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-gvproxy-3:4.2.0-6.1.rhaos4.12.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-6.1.rhaos4.12.el8.ppc64le"
},
"product_reference": "podman-gvproxy-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-gvproxy-3:4.2.0-6.1.rhaos4.12.el8.s390x as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-6.1.rhaos4.12.el8.s390x"
},
"product_reference": "podman-gvproxy-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-gvproxy-3:4.2.0-6.1.rhaos4.12.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-6.1.rhaos4.12.el8.x86_64"
},
"product_reference": "podman-gvproxy-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-gvproxy-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.aarch64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.aarch64"
},
"product_reference": "podman-gvproxy-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-gvproxy-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.ppc64le"
},
"product_reference": "podman-gvproxy-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-gvproxy-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.s390x as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.s390x"
},
"product_reference": "podman-gvproxy-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-gvproxy-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.x86_64"
},
"product_reference": "podman-gvproxy-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-plugins-3:4.2.0-6.1.rhaos4.12.el8.aarch64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:podman-plugins-3:4.2.0-6.1.rhaos4.12.el8.aarch64"
},
"product_reference": "podman-plugins-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-plugins-3:4.2.0-6.1.rhaos4.12.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:podman-plugins-3:4.2.0-6.1.rhaos4.12.el8.ppc64le"
},
"product_reference": "podman-plugins-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-plugins-3:4.2.0-6.1.rhaos4.12.el8.s390x as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:podman-plugins-3:4.2.0-6.1.rhaos4.12.el8.s390x"
},
"product_reference": "podman-plugins-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-plugins-3:4.2.0-6.1.rhaos4.12.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:podman-plugins-3:4.2.0-6.1.rhaos4.12.el8.x86_64"
},
"product_reference": "podman-plugins-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-plugins-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.aarch64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.aarch64"
},
"product_reference": "podman-plugins-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-plugins-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.ppc64le"
},
"product_reference": "podman-plugins-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-plugins-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.s390x as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.s390x"
},
"product_reference": "podman-plugins-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-plugins-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.x86_64"
},
"product_reference": "podman-plugins-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-remote-3:4.2.0-6.1.rhaos4.12.el8.aarch64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:podman-remote-3:4.2.0-6.1.rhaos4.12.el8.aarch64"
},
"product_reference": "podman-remote-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-remote-3:4.2.0-6.1.rhaos4.12.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:podman-remote-3:4.2.0-6.1.rhaos4.12.el8.ppc64le"
},
"product_reference": "podman-remote-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-remote-3:4.2.0-6.1.rhaos4.12.el8.s390x as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:podman-remote-3:4.2.0-6.1.rhaos4.12.el8.s390x"
},
"product_reference": "podman-remote-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-remote-3:4.2.0-6.1.rhaos4.12.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:podman-remote-3:4.2.0-6.1.rhaos4.12.el8.x86_64"
},
"product_reference": "podman-remote-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-remote-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.aarch64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.aarch64"
},
"product_reference": "podman-remote-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-remote-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.ppc64le"
},
"product_reference": "podman-remote-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-remote-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.s390x as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.s390x"
},
"product_reference": "podman-remote-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-remote-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.x86_64"
},
"product_reference": "podman-remote-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-tests-3:4.2.0-6.1.rhaos4.12.el8.aarch64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:podman-tests-3:4.2.0-6.1.rhaos4.12.el8.aarch64"
},
"product_reference": "podman-tests-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-tests-3:4.2.0-6.1.rhaos4.12.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:podman-tests-3:4.2.0-6.1.rhaos4.12.el8.ppc64le"
},
"product_reference": "podman-tests-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-tests-3:4.2.0-6.1.rhaos4.12.el8.s390x as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:podman-tests-3:4.2.0-6.1.rhaos4.12.el8.s390x"
},
"product_reference": "podman-tests-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-tests-3:4.2.0-6.1.rhaos4.12.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:podman-tests-3:4.2.0-6.1.rhaos4.12.el8.x86_64"
},
"product_reference": "podman-tests-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-kuryr-kubernetes-0:4.12.0-202306140156.p0.g31dd228.assembly.stream.el8.noarch as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:python3-kuryr-kubernetes-0:4.12.0-202306140156.p0.g31dd228.assembly.stream.el8.noarch"
},
"product_reference": "python3-kuryr-kubernetes-0:4.12.0-202306140156.p0.g31dd228.assembly.stream.el8.noarch",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-372.59.1.el8_6.aarch64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:python3-perf-0:4.18.0-372.59.1.el8_6.aarch64"
},
"product_reference": "python3-perf-0:4.18.0-372.59.1.el8_6.aarch64",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-372.59.1.el8_6.ppc64le as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:python3-perf-0:4.18.0-372.59.1.el8_6.ppc64le"
},
"product_reference": "python3-perf-0:4.18.0-372.59.1.el8_6.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-372.59.1.el8_6.s390x as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:python3-perf-0:4.18.0-372.59.1.el8_6.s390x"
},
"product_reference": "python3-perf-0:4.18.0-372.59.1.el8_6.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-372.59.1.el8_6.x86_64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:python3-perf-0:4.18.0-372.59.1.el8_6.x86_64"
},
"product_reference": "python3-perf-0:4.18.0-372.59.1.el8_6.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:python3-perf-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:python3-perf-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-372.59.1.el8_6.s390x as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:python3-perf-debuginfo-0:4.18.0-372.59.1.el8_6.s390x"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-372.59.1.el8_6.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:python3-perf-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "runc-3:1.1.6-4.rhaos4.12.el8.aarch64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:runc-3:1.1.6-4.rhaos4.12.el8.aarch64"
},
"product_reference": "runc-3:1.1.6-4.rhaos4.12.el8.aarch64",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "runc-3:1.1.6-4.rhaos4.12.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:runc-3:1.1.6-4.rhaos4.12.el8.ppc64le"
},
"product_reference": "runc-3:1.1.6-4.rhaos4.12.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "runc-3:1.1.6-4.rhaos4.12.el8.s390x as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:runc-3:1.1.6-4.rhaos4.12.el8.s390x"
},
"product_reference": "runc-3:1.1.6-4.rhaos4.12.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "runc-3:1.1.6-4.rhaos4.12.el8.src as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:runc-3:1.1.6-4.rhaos4.12.el8.src"
},
"product_reference": "runc-3:1.1.6-4.rhaos4.12.el8.src",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "runc-3:1.1.6-4.rhaos4.12.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:runc-3:1.1.6-4.rhaos4.12.el8.x86_64"
},
"product_reference": "runc-3:1.1.6-4.rhaos4.12.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "runc-debuginfo-3:1.1.6-4.rhaos4.12.el8.aarch64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:runc-debuginfo-3:1.1.6-4.rhaos4.12.el8.aarch64"
},
"product_reference": "runc-debuginfo-3:1.1.6-4.rhaos4.12.el8.aarch64",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "runc-debuginfo-3:1.1.6-4.rhaos4.12.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:runc-debuginfo-3:1.1.6-4.rhaos4.12.el8.ppc64le"
},
"product_reference": "runc-debuginfo-3:1.1.6-4.rhaos4.12.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "runc-debuginfo-3:1.1.6-4.rhaos4.12.el8.s390x as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:runc-debuginfo-3:1.1.6-4.rhaos4.12.el8.s390x"
},
"product_reference": "runc-debuginfo-3:1.1.6-4.rhaos4.12.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "runc-debuginfo-3:1.1.6-4.rhaos4.12.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:runc-debuginfo-3:1.1.6-4.rhaos4.12.el8.x86_64"
},
"product_reference": "runc-debuginfo-3:1.1.6-4.rhaos4.12.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "runc-debugsource-3:1.1.6-4.rhaos4.12.el8.aarch64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:runc-debugsource-3:1.1.6-4.rhaos4.12.el8.aarch64"
},
"product_reference": "runc-debugsource-3:1.1.6-4.rhaos4.12.el8.aarch64",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "runc-debugsource-3:1.1.6-4.rhaos4.12.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:runc-debugsource-3:1.1.6-4.rhaos4.12.el8.ppc64le"
},
"product_reference": "runc-debugsource-3:1.1.6-4.rhaos4.12.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "runc-debugsource-3:1.1.6-4.rhaos4.12.el8.s390x as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:runc-debugsource-3:1.1.6-4.rhaos4.12.el8.s390x"
},
"product_reference": "runc-debugsource-3:1.1.6-4.rhaos4.12.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "runc-debugsource-3:1.1.6-4.rhaos4.12.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:runc-debugsource-3:1.1.6-4.rhaos4.12.el8.x86_64"
},
"product_reference": "runc-debugsource-3:1.1.6-4.rhaos4.12.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "skopeo-2:1.9.4-3.1.rhaos4.12.el8.aarch64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:skopeo-2:1.9.4-3.1.rhaos4.12.el8.aarch64"
},
"product_reference": "skopeo-2:1.9.4-3.1.rhaos4.12.el8.aarch64",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "skopeo-2:1.9.4-3.1.rhaos4.12.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:skopeo-2:1.9.4-3.1.rhaos4.12.el8.ppc64le"
},
"product_reference": "skopeo-2:1.9.4-3.1.rhaos4.12.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "skopeo-2:1.9.4-3.1.rhaos4.12.el8.s390x as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:skopeo-2:1.9.4-3.1.rhaos4.12.el8.s390x"
},
"product_reference": "skopeo-2:1.9.4-3.1.rhaos4.12.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "skopeo-2:1.9.4-3.1.rhaos4.12.el8.src as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:skopeo-2:1.9.4-3.1.rhaos4.12.el8.src"
},
"product_reference": "skopeo-2:1.9.4-3.1.rhaos4.12.el8.src",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "skopeo-2:1.9.4-3.1.rhaos4.12.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:skopeo-2:1.9.4-3.1.rhaos4.12.el8.x86_64"
},
"product_reference": "skopeo-2:1.9.4-3.1.rhaos4.12.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "skopeo-debuginfo-2:1.9.4-3.1.rhaos4.12.el8.aarch64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.1.rhaos4.12.el8.aarch64"
},
"product_reference": "skopeo-debuginfo-2:1.9.4-3.1.rhaos4.12.el8.aarch64",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "skopeo-debuginfo-2:1.9.4-3.1.rhaos4.12.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.1.rhaos4.12.el8.ppc64le"
},
"product_reference": "skopeo-debuginfo-2:1.9.4-3.1.rhaos4.12.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "skopeo-debuginfo-2:1.9.4-3.1.rhaos4.12.el8.s390x as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.1.rhaos4.12.el8.s390x"
},
"product_reference": "skopeo-debuginfo-2:1.9.4-3.1.rhaos4.12.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "skopeo-debuginfo-2:1.9.4-3.1.rhaos4.12.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.1.rhaos4.12.el8.x86_64"
},
"product_reference": "skopeo-debuginfo-2:1.9.4-3.1.rhaos4.12.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "skopeo-debugsource-2:1.9.4-3.1.rhaos4.12.el8.aarch64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.1.rhaos4.12.el8.aarch64"
},
"product_reference": "skopeo-debugsource-2:1.9.4-3.1.rhaos4.12.el8.aarch64",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "skopeo-debugsource-2:1.9.4-3.1.rhaos4.12.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.1.rhaos4.12.el8.ppc64le"
},
"product_reference": "skopeo-debugsource-2:1.9.4-3.1.rhaos4.12.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "skopeo-debugsource-2:1.9.4-3.1.rhaos4.12.el8.s390x as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.1.rhaos4.12.el8.s390x"
},
"product_reference": "skopeo-debugsource-2:1.9.4-3.1.rhaos4.12.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "skopeo-debugsource-2:1.9.4-3.1.rhaos4.12.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.1.rhaos4.12.el8.x86_64"
},
"product_reference": "skopeo-debugsource-2:1.9.4-3.1.rhaos4.12.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "skopeo-tests-2:1.9.4-3.1.rhaos4.12.el8.aarch64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.1.rhaos4.12.el8.aarch64"
},
"product_reference": "skopeo-tests-2:1.9.4-3.1.rhaos4.12.el8.aarch64",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "skopeo-tests-2:1.9.4-3.1.rhaos4.12.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.1.rhaos4.12.el8.ppc64le"
},
"product_reference": "skopeo-tests-2:1.9.4-3.1.rhaos4.12.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "skopeo-tests-2:1.9.4-3.1.rhaos4.12.el8.s390x as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.1.rhaos4.12.el8.s390x"
},
"product_reference": "skopeo-tests-2:1.9.4-3.1.rhaos4.12.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "skopeo-tests-2:1.9.4-3.1.rhaos4.12.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.1.rhaos4.12.el8.x86_64"
},
"product_reference": "skopeo-tests-2:1.9.4-3.1.rhaos4.12.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "buildah-1:1.23.4-5.rhaos4.12.el9.aarch64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "9Base-RHOSE-4.12:buildah-1:1.23.4-5.rhaos4.12.el9.aarch64"
},
"product_reference": "buildah-1:1.23.4-5.rhaos4.12.el9.aarch64",
"relates_to_product_reference": "9Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "buildah-1:1.23.4-5.rhaos4.12.el9.ppc64le as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "9Base-RHOSE-4.12:buildah-1:1.23.4-5.rhaos4.12.el9.ppc64le"
},
"product_reference": "buildah-1:1.23.4-5.rhaos4.12.el9.ppc64le",
"relates_to_product_reference": "9Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "buildah-1:1.23.4-5.rhaos4.12.el9.s390x as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "9Base-RHOSE-4.12:buildah-1:1.23.4-5.rhaos4.12.el9.s390x"
},
"product_reference": "buildah-1:1.23.4-5.rhaos4.12.el9.s390x",
"relates_to_product_reference": "9Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "buildah-1:1.23.4-5.rhaos4.12.el9.src as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "9Base-RHOSE-4.12:buildah-1:1.23.4-5.rhaos4.12.el9.src"
},
"product_reference": "buildah-1:1.23.4-5.rhaos4.12.el9.src",
"relates_to_product_reference": "9Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "buildah-1:1.23.4-5.rhaos4.12.el9.x86_64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "9Base-RHOSE-4.12:buildah-1:1.23.4-5.rhaos4.12.el9.x86_64"
},
"product_reference": "buildah-1:1.23.4-5.rhaos4.12.el9.x86_64",
"relates_to_product_reference": "9Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "buildah-debuginfo-1:1.23.4-5.rhaos4.12.el9.aarch64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "9Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.rhaos4.12.el9.aarch64"
},
"product_reference": "buildah-debuginfo-1:1.23.4-5.rhaos4.12.el9.aarch64",
"relates_to_product_reference": "9Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "buildah-debuginfo-1:1.23.4-5.rhaos4.12.el9.ppc64le as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "9Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.rhaos4.12.el9.ppc64le"
},
"product_reference": "buildah-debuginfo-1:1.23.4-5.rhaos4.12.el9.ppc64le",
"relates_to_product_reference": "9Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "buildah-debuginfo-1:1.23.4-5.rhaos4.12.el9.s390x as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "9Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.rhaos4.12.el9.s390x"
},
"product_reference": "buildah-debuginfo-1:1.23.4-5.rhaos4.12.el9.s390x",
"relates_to_product_reference": "9Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "buildah-debuginfo-1:1.23.4-5.rhaos4.12.el9.x86_64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "9Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.rhaos4.12.el9.x86_64"
},
"product_reference": "buildah-debuginfo-1:1.23.4-5.rhaos4.12.el9.x86_64",
"relates_to_product_reference": "9Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "buildah-debugsource-1:1.23.4-5.rhaos4.12.el9.aarch64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "9Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.rhaos4.12.el9.aarch64"
},
"product_reference": "buildah-debugsource-1:1.23.4-5.rhaos4.12.el9.aarch64",
"relates_to_product_reference": "9Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "buildah-debugsource-1:1.23.4-5.rhaos4.12.el9.ppc64le as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "9Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.rhaos4.12.el9.ppc64le"
},
"product_reference": "buildah-debugsource-1:1.23.4-5.rhaos4.12.el9.ppc64le",
"relates_to_product_reference": "9Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "buildah-debugsource-1:1.23.4-5.rhaos4.12.el9.s390x as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "9Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.rhaos4.12.el9.s390x"
},
"product_reference": "buildah-debugsource-1:1.23.4-5.rhaos4.12.el9.s390x",
"relates_to_product_reference": "9Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "buildah-debugsource-1:1.23.4-5.rhaos4.12.el9.x86_64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "9Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.rhaos4.12.el9.x86_64"
},
"product_reference": "buildah-debugsource-1:1.23.4-5.rhaos4.12.el9.x86_64",
"relates_to_product_reference": "9Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "buildah-tests-1:1.23.4-5.rhaos4.12.el9.aarch64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "9Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.rhaos4.12.el9.aarch64"
},
"product_reference": "buildah-tests-1:1.23.4-5.rhaos4.12.el9.aarch64",
"relates_to_product_reference": "9Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "buildah-tests-1:1.23.4-5.rhaos4.12.el9.ppc64le as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "9Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.rhaos4.12.el9.ppc64le"
},
"product_reference": "buildah-tests-1:1.23.4-5.rhaos4.12.el9.ppc64le",
"relates_to_product_reference": "9Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "buildah-tests-1:1.23.4-5.rhaos4.12.el9.s390x as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "9Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.rhaos4.12.el9.s390x"
},
"product_reference": "buildah-tests-1:1.23.4-5.rhaos4.12.el9.s390x",
"relates_to_product_reference": "9Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "buildah-tests-1:1.23.4-5.rhaos4.12.el9.x86_64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "9Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.rhaos4.12.el9.x86_64"
},
"product_reference": "buildah-tests-1:1.23.4-5.rhaos4.12.el9.x86_64",
"relates_to_product_reference": "9Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "buildah-tests-debuginfo-1:1.23.4-5.rhaos4.12.el9.aarch64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "9Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.rhaos4.12.el9.aarch64"
},
"product_reference": "buildah-tests-debuginfo-1:1.23.4-5.rhaos4.12.el9.aarch64",
"relates_to_product_reference": "9Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "buildah-tests-debuginfo-1:1.23.4-5.rhaos4.12.el9.ppc64le as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "9Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.rhaos4.12.el9.ppc64le"
},
"product_reference": "buildah-tests-debuginfo-1:1.23.4-5.rhaos4.12.el9.ppc64le",
"relates_to_product_reference": "9Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "buildah-tests-debuginfo-1:1.23.4-5.rhaos4.12.el9.s390x as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "9Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.rhaos4.12.el9.s390x"
},
"product_reference": "buildah-tests-debuginfo-1:1.23.4-5.rhaos4.12.el9.s390x",
"relates_to_product_reference": "9Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "buildah-tests-debuginfo-1:1.23.4-5.rhaos4.12.el9.x86_64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "9Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.rhaos4.12.el9.x86_64"
},
"product_reference": "buildah-tests-debuginfo-1:1.23.4-5.rhaos4.12.el9.x86_64",
"relates_to_product_reference": "9Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "conmon-2:2.1.2-5.rhaos4.12.el9.aarch64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "9Base-RHOSE-4.12:conmon-2:2.1.2-5.rhaos4.12.el9.aarch64"
},
"product_reference": "conmon-2:2.1.2-5.rhaos4.12.el9.aarch64",
"relates_to_product_reference": "9Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "conmon-2:2.1.2-5.rhaos4.12.el9.ppc64le as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "9Base-RHOSE-4.12:conmon-2:2.1.2-5.rhaos4.12.el9.ppc64le"
},
"product_reference": "conmon-2:2.1.2-5.rhaos4.12.el9.ppc64le",
"relates_to_product_reference": "9Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "conmon-2:2.1.2-5.rhaos4.12.el9.s390x as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "9Base-RHOSE-4.12:conmon-2:2.1.2-5.rhaos4.12.el9.s390x"
},
"product_reference": "conmon-2:2.1.2-5.rhaos4.12.el9.s390x",
"relates_to_product_reference": "9Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "conmon-2:2.1.2-5.rhaos4.12.el9.src as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "9Base-RHOSE-4.12:conmon-2:2.1.2-5.rhaos4.12.el9.src"
},
"product_reference": "conmon-2:2.1.2-5.rhaos4.12.el9.src",
"relates_to_product_reference": "9Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "conmon-2:2.1.2-5.rhaos4.12.el9.x86_64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "9Base-RHOSE-4.12:conmon-2:2.1.2-5.rhaos4.12.el9.x86_64"
},
"product_reference": "conmon-2:2.1.2-5.rhaos4.12.el9.x86_64",
"relates_to_product_reference": "9Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "conmon-debuginfo-2:2.1.2-5.rhaos4.12.el9.aarch64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "9Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-5.rhaos4.12.el9.aarch64"
},
"product_reference": "conmon-debuginfo-2:2.1.2-5.rhaos4.12.el9.aarch64",
"relates_to_product_reference": "9Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "conmon-debuginfo-2:2.1.2-5.rhaos4.12.el9.ppc64le as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "9Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-5.rhaos4.12.el9.ppc64le"
},
"product_reference": "conmon-debuginfo-2:2.1.2-5.rhaos4.12.el9.ppc64le",
"relates_to_product_reference": "9Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "conmon-debuginfo-2:2.1.2-5.rhaos4.12.el9.s390x as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "9Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-5.rhaos4.12.el9.s390x"
},
"product_reference": "conmon-debuginfo-2:2.1.2-5.rhaos4.12.el9.s390x",
"relates_to_product_reference": "9Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "conmon-debuginfo-2:2.1.2-5.rhaos4.12.el9.x86_64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "9Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-5.rhaos4.12.el9.x86_64"
},
"product_reference": "conmon-debuginfo-2:2.1.2-5.rhaos4.12.el9.x86_64",
"relates_to_product_reference": "9Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "conmon-debugsource-2:2.1.2-5.rhaos4.12.el9.aarch64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "9Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-5.rhaos4.12.el9.aarch64"
},
"product_reference": "conmon-debugsource-2:2.1.2-5.rhaos4.12.el9.aarch64",
"relates_to_product_reference": "9Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "conmon-debugsource-2:2.1.2-5.rhaos4.12.el9.ppc64le as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "9Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-5.rhaos4.12.el9.ppc64le"
},
"product_reference": "conmon-debugsource-2:2.1.2-5.rhaos4.12.el9.ppc64le",
"relates_to_product_reference": "9Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "conmon-debugsource-2:2.1.2-5.rhaos4.12.el9.s390x as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "9Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-5.rhaos4.12.el9.s390x"
},
"product_reference": "conmon-debugsource-2:2.1.2-5.rhaos4.12.el9.s390x",
"relates_to_product_reference": "9Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "conmon-debugsource-2:2.1.2-5.rhaos4.12.el9.x86_64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "9Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-5.rhaos4.12.el9.x86_64"
},
"product_reference": "conmon-debugsource-2:2.1.2-5.rhaos4.12.el9.x86_64",
"relates_to_product_reference": "9Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el9.src as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "9Base-RHOSE-4.12:openshift-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el9.src"
},
"product_reference": "openshift-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el9.src",
"relates_to_product_reference": "9Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.aarch64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "9Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.aarch64"
},
"product_reference": "openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.aarch64",
"relates_to_product_reference": "9Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.ppc64le as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "9Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.ppc64le"
},
"product_reference": "openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.ppc64le",
"relates_to_product_reference": "9Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.s390x as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "9Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.s390x"
},
"product_reference": "openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.s390x",
"relates_to_product_reference": "9Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.src as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "9Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.src"
},
"product_reference": "openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.src",
"relates_to_product_reference": "9Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.x86_64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "9Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.x86_64"
},
"product_reference": "openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.x86_64",
"relates_to_product_reference": "9Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-clients-redistributable-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.x86_64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "9Base-RHOSE-4.12:openshift-clients-redistributable-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.x86_64"
},
"product_reference": "openshift-clients-redistributable-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.x86_64",
"relates_to_product_reference": "9Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el9.aarch64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "9Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el9.aarch64"
},
"product_reference": "openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el9.aarch64",
"relates_to_product_reference": "9Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el9.ppc64le as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "9Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el9.ppc64le"
},
"product_reference": "openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el9.ppc64le",
"relates_to_product_reference": "9Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el9.s390x as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "9Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el9.s390x"
},
"product_reference": "openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el9.s390x",
"relates_to_product_reference": "9Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el9.x86_64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "9Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el9.x86_64"
},
"product_reference": "openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el9.x86_64",
"relates_to_product_reference": "9Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-3:4.2.0-7.rhaos4.12.el9.aarch64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "9Base-RHOSE-4.12:podman-3:4.2.0-7.rhaos4.12.el9.aarch64"
},
"product_reference": "podman-3:4.2.0-7.rhaos4.12.el9.aarch64",
"relates_to_product_reference": "9Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-3:4.2.0-7.rhaos4.12.el9.ppc64le as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "9Base-RHOSE-4.12:podman-3:4.2.0-7.rhaos4.12.el9.ppc64le"
},
"product_reference": "podman-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"relates_to_product_reference": "9Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-3:4.2.0-7.rhaos4.12.el9.s390x as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "9Base-RHOSE-4.12:podman-3:4.2.0-7.rhaos4.12.el9.s390x"
},
"product_reference": "podman-3:4.2.0-7.rhaos4.12.el9.s390x",
"relates_to_product_reference": "9Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-3:4.2.0-7.rhaos4.12.el9.src as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "9Base-RHOSE-4.12:podman-3:4.2.0-7.rhaos4.12.el9.src"
},
"product_reference": "podman-3:4.2.0-7.rhaos4.12.el9.src",
"relates_to_product_reference": "9Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-3:4.2.0-7.rhaos4.12.el9.x86_64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "9Base-RHOSE-4.12:podman-3:4.2.0-7.rhaos4.12.el9.x86_64"
},
"product_reference": "podman-3:4.2.0-7.rhaos4.12.el9.x86_64",
"relates_to_product_reference": "9Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-catatonit-3:4.2.0-7.rhaos4.12.el9.aarch64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "9Base-RHOSE-4.12:podman-catatonit-3:4.2.0-7.rhaos4.12.el9.aarch64"
},
"product_reference": "podman-catatonit-3:4.2.0-7.rhaos4.12.el9.aarch64",
"relates_to_product_reference": "9Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-catatonit-3:4.2.0-7.rhaos4.12.el9.ppc64le as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "9Base-RHOSE-4.12:podman-catatonit-3:4.2.0-7.rhaos4.12.el9.ppc64le"
},
"product_reference": "podman-catatonit-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"relates_to_product_reference": "9Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-catatonit-3:4.2.0-7.rhaos4.12.el9.s390x as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "9Base-RHOSE-4.12:podman-catatonit-3:4.2.0-7.rhaos4.12.el9.s390x"
},
"product_reference": "podman-catatonit-3:4.2.0-7.rhaos4.12.el9.s390x",
"relates_to_product_reference": "9Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-catatonit-3:4.2.0-7.rhaos4.12.el9.x86_64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "9Base-RHOSE-4.12:podman-catatonit-3:4.2.0-7.rhaos4.12.el9.x86_64"
},
"product_reference": "podman-catatonit-3:4.2.0-7.rhaos4.12.el9.x86_64",
"relates_to_product_reference": "9Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-catatonit-debuginfo-3:4.2.0-7.rhaos4.12.el9.aarch64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "9Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-7.rhaos4.12.el9.aarch64"
},
"product_reference": "podman-catatonit-debuginfo-3:4.2.0-7.rhaos4.12.el9.aarch64",
"relates_to_product_reference": "9Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-catatonit-debuginfo-3:4.2.0-7.rhaos4.12.el9.ppc64le as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "9Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-7.rhaos4.12.el9.ppc64le"
},
"product_reference": "podman-catatonit-debuginfo-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"relates_to_product_reference": "9Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-catatonit-debuginfo-3:4.2.0-7.rhaos4.12.el9.s390x as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "9Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-7.rhaos4.12.el9.s390x"
},
"product_reference": "podman-catatonit-debuginfo-3:4.2.0-7.rhaos4.12.el9.s390x",
"relates_to_product_reference": "9Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-catatonit-debuginfo-3:4.2.0-7.rhaos4.12.el9.x86_64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "9Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-7.rhaos4.12.el9.x86_64"
},
"product_reference": "podman-catatonit-debuginfo-3:4.2.0-7.rhaos4.12.el9.x86_64",
"relates_to_product_reference": "9Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-debuginfo-3:4.2.0-7.rhaos4.12.el9.aarch64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "9Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-7.rhaos4.12.el9.aarch64"
},
"product_reference": "podman-debuginfo-3:4.2.0-7.rhaos4.12.el9.aarch64",
"relates_to_product_reference": "9Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-debuginfo-3:4.2.0-7.rhaos4.12.el9.ppc64le as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "9Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-7.rhaos4.12.el9.ppc64le"
},
"product_reference": "podman-debuginfo-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"relates_to_product_reference": "9Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-debuginfo-3:4.2.0-7.rhaos4.12.el9.s390x as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "9Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-7.rhaos4.12.el9.s390x"
},
"product_reference": "podman-debuginfo-3:4.2.0-7.rhaos4.12.el9.s390x",
"relates_to_product_reference": "9Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-debuginfo-3:4.2.0-7.rhaos4.12.el9.x86_64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "9Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-7.rhaos4.12.el9.x86_64"
},
"product_reference": "podman-debuginfo-3:4.2.0-7.rhaos4.12.el9.x86_64",
"relates_to_product_reference": "9Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-debugsource-3:4.2.0-7.rhaos4.12.el9.aarch64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "9Base-RHOSE-4.12:podman-debugsource-3:4.2.0-7.rhaos4.12.el9.aarch64"
},
"product_reference": "podman-debugsource-3:4.2.0-7.rhaos4.12.el9.aarch64",
"relates_to_product_reference": "9Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-debugsource-3:4.2.0-7.rhaos4.12.el9.ppc64le as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "9Base-RHOSE-4.12:podman-debugsource-3:4.2.0-7.rhaos4.12.el9.ppc64le"
},
"product_reference": "podman-debugsource-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"relates_to_product_reference": "9Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-debugsource-3:4.2.0-7.rhaos4.12.el9.s390x as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "9Base-RHOSE-4.12:podman-debugsource-3:4.2.0-7.rhaos4.12.el9.s390x"
},
"product_reference": "podman-debugsource-3:4.2.0-7.rhaos4.12.el9.s390x",
"relates_to_product_reference": "9Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-debugsource-3:4.2.0-7.rhaos4.12.el9.x86_64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "9Base-RHOSE-4.12:podman-debugsource-3:4.2.0-7.rhaos4.12.el9.x86_64"
},
"product_reference": "podman-debugsource-3:4.2.0-7.rhaos4.12.el9.x86_64",
"relates_to_product_reference": "9Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-docker-3:4.2.0-7.rhaos4.12.el9.noarch as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "9Base-RHOSE-4.12:podman-docker-3:4.2.0-7.rhaos4.12.el9.noarch"
},
"product_reference": "podman-docker-3:4.2.0-7.rhaos4.12.el9.noarch",
"relates_to_product_reference": "9Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-gvproxy-3:4.2.0-7.rhaos4.12.el9.aarch64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "9Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-7.rhaos4.12.el9.aarch64"
},
"product_reference": "podman-gvproxy-3:4.2.0-7.rhaos4.12.el9.aarch64",
"relates_to_product_reference": "9Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-gvproxy-3:4.2.0-7.rhaos4.12.el9.ppc64le as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "9Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-7.rhaos4.12.el9.ppc64le"
},
"product_reference": "podman-gvproxy-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"relates_to_product_reference": "9Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-gvproxy-3:4.2.0-7.rhaos4.12.el9.s390x as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "9Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-7.rhaos4.12.el9.s390x"
},
"product_reference": "podman-gvproxy-3:4.2.0-7.rhaos4.12.el9.s390x",
"relates_to_product_reference": "9Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-gvproxy-3:4.2.0-7.rhaos4.12.el9.x86_64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "9Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-7.rhaos4.12.el9.x86_64"
},
"product_reference": "podman-gvproxy-3:4.2.0-7.rhaos4.12.el9.x86_64",
"relates_to_product_reference": "9Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-gvproxy-debuginfo-3:4.2.0-7.rhaos4.12.el9.aarch64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "9Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-7.rhaos4.12.el9.aarch64"
},
"product_reference": "podman-gvproxy-debuginfo-3:4.2.0-7.rhaos4.12.el9.aarch64",
"relates_to_product_reference": "9Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-gvproxy-debuginfo-3:4.2.0-7.rhaos4.12.el9.ppc64le as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "9Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-7.rhaos4.12.el9.ppc64le"
},
"product_reference": "podman-gvproxy-debuginfo-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"relates_to_product_reference": "9Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-gvproxy-debuginfo-3:4.2.0-7.rhaos4.12.el9.s390x as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "9Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-7.rhaos4.12.el9.s390x"
},
"product_reference": "podman-gvproxy-debuginfo-3:4.2.0-7.rhaos4.12.el9.s390x",
"relates_to_product_reference": "9Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-gvproxy-debuginfo-3:4.2.0-7.rhaos4.12.el9.x86_64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "9Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-7.rhaos4.12.el9.x86_64"
},
"product_reference": "podman-gvproxy-debuginfo-3:4.2.0-7.rhaos4.12.el9.x86_64",
"relates_to_product_reference": "9Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-plugins-3:4.2.0-7.rhaos4.12.el9.aarch64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "9Base-RHOSE-4.12:podman-plugins-3:4.2.0-7.rhaos4.12.el9.aarch64"
},
"product_reference": "podman-plugins-3:4.2.0-7.rhaos4.12.el9.aarch64",
"relates_to_product_reference": "9Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-plugins-3:4.2.0-7.rhaos4.12.el9.ppc64le as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "9Base-RHOSE-4.12:podman-plugins-3:4.2.0-7.rhaos4.12.el9.ppc64le"
},
"product_reference": "podman-plugins-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"relates_to_product_reference": "9Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-plugins-3:4.2.0-7.rhaos4.12.el9.s390x as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "9Base-RHOSE-4.12:podman-plugins-3:4.2.0-7.rhaos4.12.el9.s390x"
},
"product_reference": "podman-plugins-3:4.2.0-7.rhaos4.12.el9.s390x",
"relates_to_product_reference": "9Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-plugins-3:4.2.0-7.rhaos4.12.el9.x86_64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "9Base-RHOSE-4.12:podman-plugins-3:4.2.0-7.rhaos4.12.el9.x86_64"
},
"product_reference": "podman-plugins-3:4.2.0-7.rhaos4.12.el9.x86_64",
"relates_to_product_reference": "9Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-plugins-debuginfo-3:4.2.0-7.rhaos4.12.el9.aarch64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "9Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-7.rhaos4.12.el9.aarch64"
},
"product_reference": "podman-plugins-debuginfo-3:4.2.0-7.rhaos4.12.el9.aarch64",
"relates_to_product_reference": "9Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-plugins-debuginfo-3:4.2.0-7.rhaos4.12.el9.ppc64le as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "9Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-7.rhaos4.12.el9.ppc64le"
},
"product_reference": "podman-plugins-debuginfo-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"relates_to_product_reference": "9Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-plugins-debuginfo-3:4.2.0-7.rhaos4.12.el9.s390x as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "9Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-7.rhaos4.12.el9.s390x"
},
"product_reference": "podman-plugins-debuginfo-3:4.2.0-7.rhaos4.12.el9.s390x",
"relates_to_product_reference": "9Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-plugins-debuginfo-3:4.2.0-7.rhaos4.12.el9.x86_64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "9Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-7.rhaos4.12.el9.x86_64"
},
"product_reference": "podman-plugins-debuginfo-3:4.2.0-7.rhaos4.12.el9.x86_64",
"relates_to_product_reference": "9Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-remote-3:4.2.0-7.rhaos4.12.el9.aarch64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "9Base-RHOSE-4.12:podman-remote-3:4.2.0-7.rhaos4.12.el9.aarch64"
},
"product_reference": "podman-remote-3:4.2.0-7.rhaos4.12.el9.aarch64",
"relates_to_product_reference": "9Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-remote-3:4.2.0-7.rhaos4.12.el9.ppc64le as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "9Base-RHOSE-4.12:podman-remote-3:4.2.0-7.rhaos4.12.el9.ppc64le"
},
"product_reference": "podman-remote-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"relates_to_product_reference": "9Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-remote-3:4.2.0-7.rhaos4.12.el9.s390x as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "9Base-RHOSE-4.12:podman-remote-3:4.2.0-7.rhaos4.12.el9.s390x"
},
"product_reference": "podman-remote-3:4.2.0-7.rhaos4.12.el9.s390x",
"relates_to_product_reference": "9Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-remote-3:4.2.0-7.rhaos4.12.el9.x86_64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "9Base-RHOSE-4.12:podman-remote-3:4.2.0-7.rhaos4.12.el9.x86_64"
},
"product_reference": "podman-remote-3:4.2.0-7.rhaos4.12.el9.x86_64",
"relates_to_product_reference": "9Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-remote-debuginfo-3:4.2.0-7.rhaos4.12.el9.aarch64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "9Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-7.rhaos4.12.el9.aarch64"
},
"product_reference": "podman-remote-debuginfo-3:4.2.0-7.rhaos4.12.el9.aarch64",
"relates_to_product_reference": "9Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-remote-debuginfo-3:4.2.0-7.rhaos4.12.el9.ppc64le as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "9Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-7.rhaos4.12.el9.ppc64le"
},
"product_reference": "podman-remote-debuginfo-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"relates_to_product_reference": "9Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-remote-debuginfo-3:4.2.0-7.rhaos4.12.el9.s390x as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "9Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-7.rhaos4.12.el9.s390x"
},
"product_reference": "podman-remote-debuginfo-3:4.2.0-7.rhaos4.12.el9.s390x",
"relates_to_product_reference": "9Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-remote-debuginfo-3:4.2.0-7.rhaos4.12.el9.x86_64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "9Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-7.rhaos4.12.el9.x86_64"
},
"product_reference": "podman-remote-debuginfo-3:4.2.0-7.rhaos4.12.el9.x86_64",
"relates_to_product_reference": "9Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-tests-3:4.2.0-7.rhaos4.12.el9.aarch64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "9Base-RHOSE-4.12:podman-tests-3:4.2.0-7.rhaos4.12.el9.aarch64"
},
"product_reference": "podman-tests-3:4.2.0-7.rhaos4.12.el9.aarch64",
"relates_to_product_reference": "9Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-tests-3:4.2.0-7.rhaos4.12.el9.ppc64le as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "9Base-RHOSE-4.12:podman-tests-3:4.2.0-7.rhaos4.12.el9.ppc64le"
},
"product_reference": "podman-tests-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"relates_to_product_reference": "9Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-tests-3:4.2.0-7.rhaos4.12.el9.s390x as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "9Base-RHOSE-4.12:podman-tests-3:4.2.0-7.rhaos4.12.el9.s390x"
},
"product_reference": "podman-tests-3:4.2.0-7.rhaos4.12.el9.s390x",
"relates_to_product_reference": "9Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-tests-3:4.2.0-7.rhaos4.12.el9.x86_64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "9Base-RHOSE-4.12:podman-tests-3:4.2.0-7.rhaos4.12.el9.x86_64"
},
"product_reference": "podman-tests-3:4.2.0-7.rhaos4.12.el9.x86_64",
"relates_to_product_reference": "9Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "skopeo-2:1.9.4-3.rhaos4.12.el9.aarch64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "9Base-RHOSE-4.12:skopeo-2:1.9.4-3.rhaos4.12.el9.aarch64"
},
"product_reference": "skopeo-2:1.9.4-3.rhaos4.12.el9.aarch64",
"relates_to_product_reference": "9Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "skopeo-2:1.9.4-3.rhaos4.12.el9.ppc64le as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "9Base-RHOSE-4.12:skopeo-2:1.9.4-3.rhaos4.12.el9.ppc64le"
},
"product_reference": "skopeo-2:1.9.4-3.rhaos4.12.el9.ppc64le",
"relates_to_product_reference": "9Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "skopeo-2:1.9.4-3.rhaos4.12.el9.s390x as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "9Base-RHOSE-4.12:skopeo-2:1.9.4-3.rhaos4.12.el9.s390x"
},
"product_reference": "skopeo-2:1.9.4-3.rhaos4.12.el9.s390x",
"relates_to_product_reference": "9Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "skopeo-2:1.9.4-3.rhaos4.12.el9.src as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "9Base-RHOSE-4.12:skopeo-2:1.9.4-3.rhaos4.12.el9.src"
},
"product_reference": "skopeo-2:1.9.4-3.rhaos4.12.el9.src",
"relates_to_product_reference": "9Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "skopeo-2:1.9.4-3.rhaos4.12.el9.x86_64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "9Base-RHOSE-4.12:skopeo-2:1.9.4-3.rhaos4.12.el9.x86_64"
},
"product_reference": "skopeo-2:1.9.4-3.rhaos4.12.el9.x86_64",
"relates_to_product_reference": "9Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "skopeo-debuginfo-2:1.9.4-3.rhaos4.12.el9.aarch64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "9Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.rhaos4.12.el9.aarch64"
},
"product_reference": "skopeo-debuginfo-2:1.9.4-3.rhaos4.12.el9.aarch64",
"relates_to_product_reference": "9Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "skopeo-debuginfo-2:1.9.4-3.rhaos4.12.el9.ppc64le as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "9Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.rhaos4.12.el9.ppc64le"
},
"product_reference": "skopeo-debuginfo-2:1.9.4-3.rhaos4.12.el9.ppc64le",
"relates_to_product_reference": "9Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "skopeo-debuginfo-2:1.9.4-3.rhaos4.12.el9.s390x as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "9Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.rhaos4.12.el9.s390x"
},
"product_reference": "skopeo-debuginfo-2:1.9.4-3.rhaos4.12.el9.s390x",
"relates_to_product_reference": "9Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "skopeo-debuginfo-2:1.9.4-3.rhaos4.12.el9.x86_64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "9Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.rhaos4.12.el9.x86_64"
},
"product_reference": "skopeo-debuginfo-2:1.9.4-3.rhaos4.12.el9.x86_64",
"relates_to_product_reference": "9Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "skopeo-debugsource-2:1.9.4-3.rhaos4.12.el9.aarch64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "9Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.rhaos4.12.el9.aarch64"
},
"product_reference": "skopeo-debugsource-2:1.9.4-3.rhaos4.12.el9.aarch64",
"relates_to_product_reference": "9Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "skopeo-debugsource-2:1.9.4-3.rhaos4.12.el9.ppc64le as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "9Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.rhaos4.12.el9.ppc64le"
},
"product_reference": "skopeo-debugsource-2:1.9.4-3.rhaos4.12.el9.ppc64le",
"relates_to_product_reference": "9Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "skopeo-debugsource-2:1.9.4-3.rhaos4.12.el9.s390x as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "9Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.rhaos4.12.el9.s390x"
},
"product_reference": "skopeo-debugsource-2:1.9.4-3.rhaos4.12.el9.s390x",
"relates_to_product_reference": "9Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "skopeo-debugsource-2:1.9.4-3.rhaos4.12.el9.x86_64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "9Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.rhaos4.12.el9.x86_64"
},
"product_reference": "skopeo-debugsource-2:1.9.4-3.rhaos4.12.el9.x86_64",
"relates_to_product_reference": "9Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "skopeo-tests-2:1.9.4-3.rhaos4.12.el9.aarch64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "9Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.rhaos4.12.el9.aarch64"
},
"product_reference": "skopeo-tests-2:1.9.4-3.rhaos4.12.el9.aarch64",
"relates_to_product_reference": "9Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "skopeo-tests-2:1.9.4-3.rhaos4.12.el9.ppc64le as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "9Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.rhaos4.12.el9.ppc64le"
},
"product_reference": "skopeo-tests-2:1.9.4-3.rhaos4.12.el9.ppc64le",
"relates_to_product_reference": "9Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "skopeo-tests-2:1.9.4-3.rhaos4.12.el9.s390x as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "9Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.rhaos4.12.el9.s390x"
},
"product_reference": "skopeo-tests-2:1.9.4-3.rhaos4.12.el9.s390x",
"relates_to_product_reference": "9Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "skopeo-tests-2:1.9.4-3.rhaos4.12.el9.x86_64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "9Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.rhaos4.12.el9.x86_64"
},
"product_reference": "skopeo-tests-2:1.9.4-3.rhaos4.12.el9.x86_64",
"relates_to_product_reference": "9Base-RHOSE-4.12"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Adam Korczynski"
],
"organization": "ADA Logics"
},
{
"names": [
"OSS-Fuzz"
]
}
],
"cve": "CVE-2022-2879",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"discovery_date": "2022-10-07T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-RHOSE-4.12:bpftool-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:bpftool-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:bpftool-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:bpftool-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:bpftool-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:bpftool-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:bpftool-debuginfo-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:bpftool-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:buildah-1:1.23.4-5.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:buildah-1:1.23.4-5.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:buildah-1:1.23.4-5.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:buildah-1:1.23.4-5.1.rhaos4.12.el8.src",
"8Base-RHOSE-4.12:buildah-1:1.23.4-5.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:containernetworking-plugins-0:1.0.1-7.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:containernetworking-plugins-0:1.0.1-7.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:containernetworking-plugins-0:1.0.1-7.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:containernetworking-plugins-0:1.0.1-7.rhaos4.12.el8.src",
"8Base-RHOSE-4.12:containernetworking-plugins-0:1.0.1-7.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:containernetworking-plugins-debuginfo-0:1.0.1-7.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:containernetworking-plugins-debuginfo-0:1.0.1-7.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:containernetworking-plugins-debuginfo-0:1.0.1-7.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:containernetworking-plugins-debuginfo-0:1.0.1-7.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:containernetworking-plugins-debugsource-0:1.0.1-7.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:containernetworking-plugins-debugsource-0:1.0.1-7.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:containernetworking-plugins-debugsource-0:1.0.1-7.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:containernetworking-plugins-debugsource-0:1.0.1-7.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:kernel-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-0:4.18.0-372.59.1.el8_6.src",
"8Base-RHOSE-4.12:kernel-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-core-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-core-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-core-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-core-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-cross-headers-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-cross-headers-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-cross-headers-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-cross-headers-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-debug-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-debug-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-debug-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-debug-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-debug-core-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-debug-core-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-debug-core-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-debug-core-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-debug-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-debug-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-debug-debuginfo-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-debug-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-debug-devel-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-debug-devel-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-debug-devel-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-debug-devel-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-debug-modules-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-debug-modules-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-debug-modules-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-debug-modules-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-debug-modules-extra-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-debug-modules-extra-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-debug-modules-extra-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-debug-modules-extra-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-debug-modules-internal-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-debug-modules-internal-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-debug-modules-internal-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-debug-modules-internal-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-debuginfo-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-debuginfo-common-aarch64-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-debuginfo-common-ppc64le-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-debuginfo-common-s390x-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-debuginfo-common-x86_64-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-devel-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-devel-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-devel-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-devel-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-doc-0:4.18.0-372.59.1.el8_6.noarch",
"8Base-RHOSE-4.12:kernel-headers-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-headers-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-headers-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-headers-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-ipaclones-internal-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-ipaclones-internal-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-modules-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-modules-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-modules-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-modules-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-modules-extra-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-modules-extra-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-modules-extra-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-modules-extra-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-modules-internal-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-modules-internal-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-modules-internal-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-modules-internal-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-0:4.18.0-372.59.1.rt7.217.el8_6.src",
"8Base-RHOSE-4.12:kernel-rt-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-core-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debug-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debug-core-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debug-debuginfo-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debug-devel-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debug-kvm-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debug-modules-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debug-modules-extra-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debug-modules-internal-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debuginfo-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-devel-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-kvm-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-modules-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-modules-extra-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-modules-internal-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-selftests-internal-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-selftests-internal-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-selftests-internal-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-selftests-internal-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-selftests-internal-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-tools-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-tools-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-tools-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-tools-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-tools-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-tools-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-tools-debuginfo-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-tools-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-tools-libs-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-tools-libs-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-tools-libs-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-tools-libs-devel-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-tools-libs-devel-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-tools-libs-devel-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-zfcpdump-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-zfcpdump-core-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-zfcpdump-debuginfo-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-zfcpdump-devel-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-zfcpdump-modules-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-zfcpdump-modules-extra-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-zfcpdump-modules-internal-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:openshift-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el8.src",
"8Base-RHOSE-4.12:openshift-ansible-0:4.12.0-202306090942.p0.g74dc7b3.assembly.stream.el8.noarch",
"8Base-RHOSE-4.12:openshift-ansible-0:4.12.0-202306090942.p0.g74dc7b3.assembly.stream.el8.src",
"8Base-RHOSE-4.12:openshift-ansible-test-0:4.12.0-202306090942.p0.g74dc7b3.assembly.stream.el8.noarch",
"8Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.aarch64",
"8Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.ppc64le",
"8Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.s390x",
"8Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.src",
"8Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.x86_64",
"8Base-RHOSE-4.12:openshift-clients-redistributable-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.x86_64",
"8Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el8.aarch64",
"8Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el8.ppc64le",
"8Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el8.s390x",
"8Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el8.x86_64",
"8Base-RHOSE-4.12:openshift-kuryr-0:4.12.0-202306140156.p0.g31dd228.assembly.stream.el8.src",
"8Base-RHOSE-4.12:openshift-kuryr-cni-0:4.12.0-202306140156.p0.g31dd228.assembly.stream.el8.noarch",
"8Base-RHOSE-4.12:openshift-kuryr-common-0:4.12.0-202306140156.p0.g31dd228.assembly.stream.el8.noarch",
"8Base-RHOSE-4.12:openshift-kuryr-controller-0:4.12.0-202306140156.p0.g31dd228.assembly.stream.el8.noarch",
"8Base-RHOSE-4.12:openshift4-aws-iso-0:4.12.0-202306090942.p0.gd2acdd5.assembly.stream.el8.noarch",
"8Base-RHOSE-4.12:openshift4-aws-iso-0:4.12.0-202306090942.p0.gd2acdd5.assembly.stream.el8.src",
"8Base-RHOSE-4.12:perf-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:perf-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:perf-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:perf-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:perf-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:perf-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:perf-debuginfo-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:perf-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:python3-kuryr-kubernetes-0:4.12.0-202306140156.p0.g31dd228.assembly.stream.el8.noarch",
"8Base-RHOSE-4.12:python3-perf-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:python3-perf-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:python3-perf-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:python3-perf-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:python3-perf-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:python3-perf-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:python3-perf-debuginfo-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:python3-perf-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:runc-3:1.1.6-4.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:runc-3:1.1.6-4.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:runc-3:1.1.6-4.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:runc-3:1.1.6-4.rhaos4.12.el8.src",
"8Base-RHOSE-4.12:runc-3:1.1.6-4.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:runc-debuginfo-3:1.1.6-4.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:runc-debuginfo-3:1.1.6-4.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:runc-debuginfo-3:1.1.6-4.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:runc-debuginfo-3:1.1.6-4.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:runc-debugsource-3:1.1.6-4.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:runc-debugsource-3:1.1.6-4.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:runc-debugsource-3:1.1.6-4.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:runc-debugsource-3:1.1.6-4.rhaos4.12.el8.x86_64",
"9Base-RHOSE-4.12:buildah-1:1.23.4-5.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:buildah-1:1.23.4-5.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:buildah-1:1.23.4-5.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:buildah-1:1.23.4-5.rhaos4.12.el9.src",
"9Base-RHOSE-4.12:buildah-1:1.23.4-5.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:openshift-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el9.src",
"9Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.aarch64",
"9Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.ppc64le",
"9Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.s390x",
"9Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.src",
"9Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.x86_64",
"9Base-RHOSE-4.12:openshift-clients-redistributable-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.x86_64",
"9Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el9.aarch64",
"9Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el9.ppc64le",
"9Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el9.s390x",
"9Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el9.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2132867"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the golang package, where Reader.Read does not set a limit on the maximum size of file headers. After fixing, Reader.Read limits the maximum size of header blocks to 1 MiB. This flaw allows a maliciously crafted archive to cause Read to allocate unbounded amounts of memory, potentially causing resource exhaustion or panic.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: archive/tar: unbounded memory consumption when reading headers",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The opportunity for a Denial of Service is limited to the golang runtime. In the case of OpenShift Container Platform, this would be restricted within each individual container. There are multiple layers of guide rails (Golang\u2019s Garbage Collector; OpenShift\u2019s resource constraints imposed at the container and cluster levels) which would require a malicious user to continue submitting attacks for there to be any enduring impact. They would also need access to external server resources to be able to send a massive volume of requests to cause a significant impact on server operations.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-RHOSE-4.12:conmon-2:2.1.2-4.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:conmon-2:2.1.2-4.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:conmon-2:2.1.2-4.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:conmon-2:2.1.2-4.rhaos4.12.el8.src",
"8Base-RHOSE-4.12:conmon-2:2.1.2-4.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-4.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-4.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-4.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-4.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-4.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-4.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-4.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-4.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-3:4.2.0-6.1.rhaos4.12.el8.src",
"8Base-RHOSE-4.12:podman-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-catatonit-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-catatonit-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-catatonit-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-catatonit-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-debugsource-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-debugsource-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-debugsource-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-debugsource-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-docker-3:4.2.0-6.1.rhaos4.12.el8.noarch",
"8Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-plugins-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-plugins-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-plugins-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-plugins-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-remote-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-remote-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-remote-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-remote-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-tests-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-tests-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-tests-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-tests-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:skopeo-2:1.9.4-3.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:skopeo-2:1.9.4-3.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:skopeo-2:1.9.4-3.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:skopeo-2:1.9.4-3.1.rhaos4.12.el8.src",
"8Base-RHOSE-4.12:skopeo-2:1.9.4-3.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.1.rhaos4.12.el8.x86_64",
"9Base-RHOSE-4.12:conmon-2:2.1.2-5.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:conmon-2:2.1.2-5.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:conmon-2:2.1.2-5.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:conmon-2:2.1.2-5.rhaos4.12.el9.src",
"9Base-RHOSE-4.12:conmon-2:2.1.2-5.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-5.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-5.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-5.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-5.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-5.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-5.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-5.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-5.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-3:4.2.0-7.rhaos4.12.el9.src",
"9Base-RHOSE-4.12:podman-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-catatonit-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-catatonit-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-catatonit-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-catatonit-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-debugsource-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-debugsource-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-debugsource-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-debugsource-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-docker-3:4.2.0-7.rhaos4.12.el9.noarch",
"9Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-plugins-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-plugins-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-plugins-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-plugins-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-remote-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-remote-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-remote-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-remote-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-tests-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-tests-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-tests-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-tests-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:skopeo-2:1.9.4-3.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:skopeo-2:1.9.4-3.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:skopeo-2:1.9.4-3.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:skopeo-2:1.9.4-3.rhaos4.12.el9.src",
"9Base-RHOSE-4.12:skopeo-2:1.9.4-3.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.rhaos4.12.el9.x86_64"
],
"known_not_affected": [
"8Base-RHOSE-4.12:bpftool-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:bpftool-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:bpftool-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:bpftool-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:bpftool-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:bpftool-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:bpftool-debuginfo-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:bpftool-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:buildah-1:1.23.4-5.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:buildah-1:1.23.4-5.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:buildah-1:1.23.4-5.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:buildah-1:1.23.4-5.1.rhaos4.12.el8.src",
"8Base-RHOSE-4.12:buildah-1:1.23.4-5.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:containernetworking-plugins-0:1.0.1-7.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:containernetworking-plugins-0:1.0.1-7.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:containernetworking-plugins-0:1.0.1-7.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:containernetworking-plugins-0:1.0.1-7.rhaos4.12.el8.src",
"8Base-RHOSE-4.12:containernetworking-plugins-0:1.0.1-7.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:containernetworking-plugins-debuginfo-0:1.0.1-7.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:containernetworking-plugins-debuginfo-0:1.0.1-7.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:containernetworking-plugins-debuginfo-0:1.0.1-7.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:containernetworking-plugins-debuginfo-0:1.0.1-7.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:containernetworking-plugins-debugsource-0:1.0.1-7.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:containernetworking-plugins-debugsource-0:1.0.1-7.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:containernetworking-plugins-debugsource-0:1.0.1-7.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:containernetworking-plugins-debugsource-0:1.0.1-7.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:kernel-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-0:4.18.0-372.59.1.el8_6.src",
"8Base-RHOSE-4.12:kernel-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-core-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-core-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-core-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-core-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-cross-headers-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-cross-headers-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-cross-headers-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-cross-headers-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-debug-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-debug-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-debug-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-debug-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-debug-core-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-debug-core-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-debug-core-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-debug-core-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-debug-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-debug-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-debug-debuginfo-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-debug-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-debug-devel-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-debug-devel-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-debug-devel-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-debug-devel-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-debug-modules-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-debug-modules-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-debug-modules-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-debug-modules-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-debug-modules-extra-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-debug-modules-extra-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-debug-modules-extra-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-debug-modules-extra-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-debug-modules-internal-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-debug-modules-internal-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-debug-modules-internal-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-debug-modules-internal-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-debuginfo-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-debuginfo-common-aarch64-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-debuginfo-common-ppc64le-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-debuginfo-common-s390x-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-debuginfo-common-x86_64-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-devel-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-devel-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-devel-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-devel-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-doc-0:4.18.0-372.59.1.el8_6.noarch",
"8Base-RHOSE-4.12:kernel-headers-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-headers-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-headers-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-headers-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-ipaclones-internal-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-ipaclones-internal-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-modules-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-modules-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-modules-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-modules-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-modules-extra-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-modules-extra-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-modules-extra-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-modules-extra-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-modules-internal-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-modules-internal-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-modules-internal-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-modules-internal-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-0:4.18.0-372.59.1.rt7.217.el8_6.src",
"8Base-RHOSE-4.12:kernel-rt-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-core-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debug-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debug-core-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debug-debuginfo-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debug-devel-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debug-kvm-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debug-modules-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debug-modules-extra-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debug-modules-internal-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debuginfo-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-devel-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-kvm-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-modules-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-modules-extra-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-modules-internal-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-selftests-internal-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-selftests-internal-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-selftests-internal-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-selftests-internal-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-selftests-internal-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-tools-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-tools-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-tools-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-tools-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-tools-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-tools-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-tools-debuginfo-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-tools-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-tools-libs-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-tools-libs-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-tools-libs-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-tools-libs-devel-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-tools-libs-devel-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-tools-libs-devel-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-zfcpdump-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-zfcpdump-core-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-zfcpdump-debuginfo-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-zfcpdump-devel-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-zfcpdump-modules-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-zfcpdump-modules-extra-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-zfcpdump-modules-internal-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:openshift-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el8.src",
"8Base-RHOSE-4.12:openshift-ansible-0:4.12.0-202306090942.p0.g74dc7b3.assembly.stream.el8.noarch",
"8Base-RHOSE-4.12:openshift-ansible-0:4.12.0-202306090942.p0.g74dc7b3.assembly.stream.el8.src",
"8Base-RHOSE-4.12:openshift-ansible-test-0:4.12.0-202306090942.p0.g74dc7b3.assembly.stream.el8.noarch",
"8Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.aarch64",
"8Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.ppc64le",
"8Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.s390x",
"8Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.src",
"8Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.x86_64",
"8Base-RHOSE-4.12:openshift-clients-redistributable-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.x86_64",
"8Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el8.aarch64",
"8Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el8.ppc64le",
"8Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el8.s390x",
"8Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el8.x86_64",
"8Base-RHOSE-4.12:openshift-kuryr-0:4.12.0-202306140156.p0.g31dd228.assembly.stream.el8.src",
"8Base-RHOSE-4.12:openshift-kuryr-cni-0:4.12.0-202306140156.p0.g31dd228.assembly.stream.el8.noarch",
"8Base-RHOSE-4.12:openshift-kuryr-common-0:4.12.0-202306140156.p0.g31dd228.assembly.stream.el8.noarch",
"8Base-RHOSE-4.12:openshift-kuryr-controller-0:4.12.0-202306140156.p0.g31dd228.assembly.stream.el8.noarch",
"8Base-RHOSE-4.12:openshift4-aws-iso-0:4.12.0-202306090942.p0.gd2acdd5.assembly.stream.el8.noarch",
"8Base-RHOSE-4.12:openshift4-aws-iso-0:4.12.0-202306090942.p0.gd2acdd5.assembly.stream.el8.src",
"8Base-RHOSE-4.12:perf-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:perf-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:perf-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:perf-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:perf-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:perf-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:perf-debuginfo-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:perf-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:python3-kuryr-kubernetes-0:4.12.0-202306140156.p0.g31dd228.assembly.stream.el8.noarch",
"8Base-RHOSE-4.12:python3-perf-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:python3-perf-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:python3-perf-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:python3-perf-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:python3-perf-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:python3-perf-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:python3-perf-debuginfo-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:python3-perf-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:runc-3:1.1.6-4.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:runc-3:1.1.6-4.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:runc-3:1.1.6-4.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:runc-3:1.1.6-4.rhaos4.12.el8.src",
"8Base-RHOSE-4.12:runc-3:1.1.6-4.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:runc-debuginfo-3:1.1.6-4.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:runc-debuginfo-3:1.1.6-4.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:runc-debuginfo-3:1.1.6-4.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:runc-debuginfo-3:1.1.6-4.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:runc-debugsource-3:1.1.6-4.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:runc-debugsource-3:1.1.6-4.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:runc-debugsource-3:1.1.6-4.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:runc-debugsource-3:1.1.6-4.rhaos4.12.el8.x86_64",
"9Base-RHOSE-4.12:buildah-1:1.23.4-5.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:buildah-1:1.23.4-5.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:buildah-1:1.23.4-5.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:buildah-1:1.23.4-5.rhaos4.12.el9.src",
"9Base-RHOSE-4.12:buildah-1:1.23.4-5.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:openshift-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el9.src",
"9Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.aarch64",
"9Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.ppc64le",
"9Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.s390x",
"9Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.src",
"9Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.x86_64",
"9Base-RHOSE-4.12:openshift-clients-redistributable-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.x86_64",
"9Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el9.aarch64",
"9Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el9.ppc64le",
"9Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el9.s390x",
"9Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-2879"
},
{
"category": "external",
"summary": "RHBZ#2132867",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2132867"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-2879",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2879"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-2879",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-2879"
},
{
"category": "external",
"summary": "https://github.com/golang/go/issues/54853",
"url": "https://github.com/golang/go/issues/54853"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/xtuG5faxtaU?pli=1",
"url": "https://groups.google.com/g/golang-announce/c/xtuG5faxtaU?pli=1"
}
],
"release_date": "2022-10-04T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-06-26T01:19:15+00:00",
"details": "For OpenShift Container Platform 4.12 see the following documentation, which will be updated shortly for this release, for important instructions on how to upgrade your cluster and fully apply this asynchronous errata update:\n\nhttps://docs.openshift.com/container-platform/4.12/release_notes/ocp-4-12-release-notes.html",
"product_ids": [
"8Base-RHOSE-4.12:conmon-2:2.1.2-4.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:conmon-2:2.1.2-4.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:conmon-2:2.1.2-4.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:conmon-2:2.1.2-4.rhaos4.12.el8.src",
"8Base-RHOSE-4.12:conmon-2:2.1.2-4.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-4.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-4.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-4.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-4.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-4.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-4.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-4.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-4.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-3:4.2.0-6.1.rhaos4.12.el8.src",
"8Base-RHOSE-4.12:podman-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-catatonit-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-catatonit-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-catatonit-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-catatonit-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-debugsource-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-debugsource-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-debugsource-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-debugsource-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-docker-3:4.2.0-6.1.rhaos4.12.el8.noarch",
"8Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-plugins-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-plugins-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-plugins-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-plugins-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-remote-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-remote-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-remote-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-remote-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-tests-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-tests-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-tests-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-tests-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:skopeo-2:1.9.4-3.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:skopeo-2:1.9.4-3.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:skopeo-2:1.9.4-3.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:skopeo-2:1.9.4-3.1.rhaos4.12.el8.src",
"8Base-RHOSE-4.12:skopeo-2:1.9.4-3.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.1.rhaos4.12.el8.x86_64",
"9Base-RHOSE-4.12:conmon-2:2.1.2-5.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:conmon-2:2.1.2-5.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:conmon-2:2.1.2-5.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:conmon-2:2.1.2-5.rhaos4.12.el9.src",
"9Base-RHOSE-4.12:conmon-2:2.1.2-5.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-5.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-5.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-5.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-5.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-5.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-5.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-5.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-5.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-3:4.2.0-7.rhaos4.12.el9.src",
"9Base-RHOSE-4.12:podman-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-catatonit-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-catatonit-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-catatonit-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-catatonit-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-debugsource-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-debugsource-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-debugsource-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-debugsource-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-docker-3:4.2.0-7.rhaos4.12.el9.noarch",
"9Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-plugins-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-plugins-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-plugins-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-plugins-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-remote-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-remote-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-remote-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-remote-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-tests-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-tests-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-tests-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-tests-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:skopeo-2:1.9.4-3.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:skopeo-2:1.9.4-3.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:skopeo-2:1.9.4-3.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:skopeo-2:1.9.4-3.rhaos4.12.el9.src",
"9Base-RHOSE-4.12:skopeo-2:1.9.4-3.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.rhaos4.12.el9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:3613"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"8Base-RHOSE-4.12:bpftool-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:bpftool-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:bpftool-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:bpftool-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:bpftool-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:bpftool-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:bpftool-debuginfo-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:bpftool-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:buildah-1:1.23.4-5.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:buildah-1:1.23.4-5.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:buildah-1:1.23.4-5.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:buildah-1:1.23.4-5.1.rhaos4.12.el8.src",
"8Base-RHOSE-4.12:buildah-1:1.23.4-5.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:conmon-2:2.1.2-4.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:conmon-2:2.1.2-4.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:conmon-2:2.1.2-4.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:conmon-2:2.1.2-4.rhaos4.12.el8.src",
"8Base-RHOSE-4.12:conmon-2:2.1.2-4.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-4.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-4.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-4.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-4.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-4.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-4.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-4.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-4.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:containernetworking-plugins-0:1.0.1-7.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:containernetworking-plugins-0:1.0.1-7.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:containernetworking-plugins-0:1.0.1-7.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:containernetworking-plugins-0:1.0.1-7.rhaos4.12.el8.src",
"8Base-RHOSE-4.12:containernetworking-plugins-0:1.0.1-7.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:containernetworking-plugins-debuginfo-0:1.0.1-7.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:containernetworking-plugins-debuginfo-0:1.0.1-7.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:containernetworking-plugins-debuginfo-0:1.0.1-7.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:containernetworking-plugins-debuginfo-0:1.0.1-7.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:containernetworking-plugins-debugsource-0:1.0.1-7.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:containernetworking-plugins-debugsource-0:1.0.1-7.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:containernetworking-plugins-debugsource-0:1.0.1-7.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:containernetworking-plugins-debugsource-0:1.0.1-7.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:kernel-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-0:4.18.0-372.59.1.el8_6.src",
"8Base-RHOSE-4.12:kernel-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-core-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-core-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-core-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-core-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-cross-headers-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-cross-headers-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-cross-headers-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-cross-headers-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-debug-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-debug-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-debug-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-debug-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-debug-core-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-debug-core-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-debug-core-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-debug-core-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-debug-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-debug-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-debug-debuginfo-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-debug-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-debug-devel-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-debug-devel-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-debug-devel-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-debug-devel-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-debug-modules-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-debug-modules-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-debug-modules-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-debug-modules-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-debug-modules-extra-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-debug-modules-extra-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-debug-modules-extra-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-debug-modules-extra-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-debug-modules-internal-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-debug-modules-internal-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-debug-modules-internal-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-debug-modules-internal-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-debuginfo-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-debuginfo-common-aarch64-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-debuginfo-common-ppc64le-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-debuginfo-common-s390x-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-debuginfo-common-x86_64-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-devel-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-devel-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-devel-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-devel-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-doc-0:4.18.0-372.59.1.el8_6.noarch",
"8Base-RHOSE-4.12:kernel-headers-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-headers-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-headers-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-headers-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-ipaclones-internal-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-ipaclones-internal-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-modules-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-modules-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-modules-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-modules-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-modules-extra-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-modules-extra-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-modules-extra-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-modules-extra-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-modules-internal-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-modules-internal-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-modules-internal-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-modules-internal-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-0:4.18.0-372.59.1.rt7.217.el8_6.src",
"8Base-RHOSE-4.12:kernel-rt-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-core-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debug-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debug-core-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debug-debuginfo-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debug-devel-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debug-kvm-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debug-modules-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debug-modules-extra-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debug-modules-internal-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debuginfo-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-devel-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-kvm-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-modules-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-modules-extra-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-modules-internal-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-selftests-internal-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-selftests-internal-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-selftests-internal-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-selftests-internal-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-selftests-internal-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-tools-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-tools-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-tools-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-tools-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-tools-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-tools-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-tools-debuginfo-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-tools-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-tools-libs-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-tools-libs-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-tools-libs-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-tools-libs-devel-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-tools-libs-devel-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-tools-libs-devel-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-zfcpdump-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-zfcpdump-core-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-zfcpdump-debuginfo-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-zfcpdump-devel-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-zfcpdump-modules-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-zfcpdump-modules-extra-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-zfcpdump-modules-internal-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:openshift-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el8.src",
"8Base-RHOSE-4.12:openshift-ansible-0:4.12.0-202306090942.p0.g74dc7b3.assembly.stream.el8.noarch",
"8Base-RHOSE-4.12:openshift-ansible-0:4.12.0-202306090942.p0.g74dc7b3.assembly.stream.el8.src",
"8Base-RHOSE-4.12:openshift-ansible-test-0:4.12.0-202306090942.p0.g74dc7b3.assembly.stream.el8.noarch",
"8Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.aarch64",
"8Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.ppc64le",
"8Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.s390x",
"8Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.src",
"8Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.x86_64",
"8Base-RHOSE-4.12:openshift-clients-redistributable-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.x86_64",
"8Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el8.aarch64",
"8Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el8.ppc64le",
"8Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el8.s390x",
"8Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el8.x86_64",
"8Base-RHOSE-4.12:openshift-kuryr-0:4.12.0-202306140156.p0.g31dd228.assembly.stream.el8.src",
"8Base-RHOSE-4.12:openshift-kuryr-cni-0:4.12.0-202306140156.p0.g31dd228.assembly.stream.el8.noarch",
"8Base-RHOSE-4.12:openshift-kuryr-common-0:4.12.0-202306140156.p0.g31dd228.assembly.stream.el8.noarch",
"8Base-RHOSE-4.12:openshift-kuryr-controller-0:4.12.0-202306140156.p0.g31dd228.assembly.stream.el8.noarch",
"8Base-RHOSE-4.12:openshift4-aws-iso-0:4.12.0-202306090942.p0.gd2acdd5.assembly.stream.el8.noarch",
"8Base-RHOSE-4.12:openshift4-aws-iso-0:4.12.0-202306090942.p0.gd2acdd5.assembly.stream.el8.src",
"8Base-RHOSE-4.12:perf-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:perf-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:perf-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:perf-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:perf-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:perf-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:perf-debuginfo-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:perf-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:podman-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-3:4.2.0-6.1.rhaos4.12.el8.src",
"8Base-RHOSE-4.12:podman-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-catatonit-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-catatonit-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-catatonit-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-catatonit-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-debugsource-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-debugsource-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-debugsource-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-debugsource-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-docker-3:4.2.0-6.1.rhaos4.12.el8.noarch",
"8Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-plugins-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-plugins-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-plugins-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-plugins-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-remote-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-remote-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-remote-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-remote-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-tests-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-tests-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-tests-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-tests-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:python3-kuryr-kubernetes-0:4.12.0-202306140156.p0.g31dd228.assembly.stream.el8.noarch",
"8Base-RHOSE-4.12:python3-perf-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:python3-perf-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:python3-perf-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:python3-perf-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:python3-perf-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:python3-perf-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:python3-perf-debuginfo-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:python3-perf-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:runc-3:1.1.6-4.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:runc-3:1.1.6-4.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:runc-3:1.1.6-4.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:runc-3:1.1.6-4.rhaos4.12.el8.src",
"8Base-RHOSE-4.12:runc-3:1.1.6-4.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:runc-debuginfo-3:1.1.6-4.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:runc-debuginfo-3:1.1.6-4.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:runc-debuginfo-3:1.1.6-4.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:runc-debuginfo-3:1.1.6-4.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:runc-debugsource-3:1.1.6-4.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:runc-debugsource-3:1.1.6-4.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:runc-debugsource-3:1.1.6-4.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:runc-debugsource-3:1.1.6-4.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:skopeo-2:1.9.4-3.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:skopeo-2:1.9.4-3.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:skopeo-2:1.9.4-3.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:skopeo-2:1.9.4-3.1.rhaos4.12.el8.src",
"8Base-RHOSE-4.12:skopeo-2:1.9.4-3.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.1.rhaos4.12.el8.x86_64",
"9Base-RHOSE-4.12:buildah-1:1.23.4-5.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:buildah-1:1.23.4-5.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:buildah-1:1.23.4-5.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:buildah-1:1.23.4-5.rhaos4.12.el9.src",
"9Base-RHOSE-4.12:buildah-1:1.23.4-5.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:conmon-2:2.1.2-5.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:conmon-2:2.1.2-5.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:conmon-2:2.1.2-5.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:conmon-2:2.1.2-5.rhaos4.12.el9.src",
"9Base-RHOSE-4.12:conmon-2:2.1.2-5.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-5.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-5.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-5.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-5.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-5.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-5.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-5.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-5.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:openshift-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el9.src",
"9Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.aarch64",
"9Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.ppc64le",
"9Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.s390x",
"9Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.src",
"9Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.x86_64",
"9Base-RHOSE-4.12:openshift-clients-redistributable-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.x86_64",
"9Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el9.aarch64",
"9Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el9.ppc64le",
"9Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el9.s390x",
"9Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el9.x86_64",
"9Base-RHOSE-4.12:podman-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-3:4.2.0-7.rhaos4.12.el9.src",
"9Base-RHOSE-4.12:podman-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-catatonit-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-catatonit-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-catatonit-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-catatonit-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-debugsource-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-debugsource-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-debugsource-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-debugsource-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-docker-3:4.2.0-7.rhaos4.12.el9.noarch",
"9Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-plugins-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-plugins-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-plugins-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-plugins-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-remote-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-remote-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-remote-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-remote-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-tests-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-tests-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-tests-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-tests-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:skopeo-2:1.9.4-3.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:skopeo-2:1.9.4-3.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:skopeo-2:1.9.4-3.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:skopeo-2:1.9.4-3.rhaos4.12.el9.src",
"9Base-RHOSE-4.12:skopeo-2:1.9.4-3.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.rhaos4.12.el9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "golang: archive/tar: unbounded memory consumption when reading headers"
},
{
"acknowledgments": [
{
"names": [
"Daniel Abeles"
],
"organization": "Head of Research, Oxeye"
},
{
"names": [
"Gal Goldstein"
],
"organization": "Security Researcher, Oxeye"
}
],
"cve": "CVE-2022-2880",
"cwe": {
"id": "CWE-444",
"name": "Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027)"
},
"discovery_date": "2022-10-07T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-RHOSE-4.12:bpftool-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:bpftool-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:bpftool-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:bpftool-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:bpftool-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:bpftool-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:bpftool-debuginfo-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:bpftool-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:buildah-1:1.23.4-5.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:buildah-1:1.23.4-5.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:buildah-1:1.23.4-5.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:buildah-1:1.23.4-5.1.rhaos4.12.el8.src",
"8Base-RHOSE-4.12:buildah-1:1.23.4-5.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:containernetworking-plugins-0:1.0.1-7.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:containernetworking-plugins-0:1.0.1-7.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:containernetworking-plugins-0:1.0.1-7.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:containernetworking-plugins-0:1.0.1-7.rhaos4.12.el8.src",
"8Base-RHOSE-4.12:containernetworking-plugins-0:1.0.1-7.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:containernetworking-plugins-debuginfo-0:1.0.1-7.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:containernetworking-plugins-debuginfo-0:1.0.1-7.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:containernetworking-plugins-debuginfo-0:1.0.1-7.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:containernetworking-plugins-debuginfo-0:1.0.1-7.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:containernetworking-plugins-debugsource-0:1.0.1-7.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:containernetworking-plugins-debugsource-0:1.0.1-7.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:containernetworking-plugins-debugsource-0:1.0.1-7.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:containernetworking-plugins-debugsource-0:1.0.1-7.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:kernel-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-0:4.18.0-372.59.1.el8_6.src",
"8Base-RHOSE-4.12:kernel-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-core-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-core-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-core-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-core-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-cross-headers-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-cross-headers-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-cross-headers-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-cross-headers-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-debug-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-debug-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-debug-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-debug-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-debug-core-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-debug-core-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-debug-core-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-debug-core-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-debug-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-debug-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-debug-debuginfo-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-debug-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-debug-devel-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-debug-devel-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-debug-devel-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-debug-devel-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-debug-modules-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-debug-modules-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-debug-modules-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-debug-modules-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-debug-modules-extra-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-debug-modules-extra-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-debug-modules-extra-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-debug-modules-extra-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-debug-modules-internal-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-debug-modules-internal-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-debug-modules-internal-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-debug-modules-internal-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-debuginfo-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-debuginfo-common-aarch64-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-debuginfo-common-ppc64le-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-debuginfo-common-s390x-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-debuginfo-common-x86_64-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-devel-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-devel-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-devel-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-devel-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-doc-0:4.18.0-372.59.1.el8_6.noarch",
"8Base-RHOSE-4.12:kernel-headers-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-headers-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-headers-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-headers-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-ipaclones-internal-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-ipaclones-internal-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-modules-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-modules-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-modules-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-modules-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-modules-extra-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-modules-extra-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-modules-extra-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-modules-extra-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-modules-internal-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-modules-internal-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-modules-internal-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-modules-internal-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-0:4.18.0-372.59.1.rt7.217.el8_6.src",
"8Base-RHOSE-4.12:kernel-rt-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-core-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debug-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debug-core-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debug-debuginfo-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debug-devel-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debug-kvm-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debug-modules-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debug-modules-extra-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debug-modules-internal-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debuginfo-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-devel-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-kvm-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-modules-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-modules-extra-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-modules-internal-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-selftests-internal-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-selftests-internal-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-selftests-internal-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-selftests-internal-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-selftests-internal-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-tools-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-tools-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-tools-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-tools-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-tools-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-tools-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-tools-debuginfo-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-tools-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-tools-libs-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-tools-libs-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-tools-libs-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-tools-libs-devel-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-tools-libs-devel-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-tools-libs-devel-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-zfcpdump-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-zfcpdump-core-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-zfcpdump-debuginfo-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-zfcpdump-devel-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-zfcpdump-modules-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-zfcpdump-modules-extra-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-zfcpdump-modules-internal-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:openshift-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el8.src",
"8Base-RHOSE-4.12:openshift-ansible-0:4.12.0-202306090942.p0.g74dc7b3.assembly.stream.el8.noarch",
"8Base-RHOSE-4.12:openshift-ansible-0:4.12.0-202306090942.p0.g74dc7b3.assembly.stream.el8.src",
"8Base-RHOSE-4.12:openshift-ansible-test-0:4.12.0-202306090942.p0.g74dc7b3.assembly.stream.el8.noarch",
"8Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.aarch64",
"8Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.ppc64le",
"8Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.s390x",
"8Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.src",
"8Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.x86_64",
"8Base-RHOSE-4.12:openshift-clients-redistributable-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.x86_64",
"8Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el8.aarch64",
"8Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el8.ppc64le",
"8Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el8.s390x",
"8Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el8.x86_64",
"8Base-RHOSE-4.12:openshift-kuryr-0:4.12.0-202306140156.p0.g31dd228.assembly.stream.el8.src",
"8Base-RHOSE-4.12:openshift-kuryr-cni-0:4.12.0-202306140156.p0.g31dd228.assembly.stream.el8.noarch",
"8Base-RHOSE-4.12:openshift-kuryr-common-0:4.12.0-202306140156.p0.g31dd228.assembly.stream.el8.noarch",
"8Base-RHOSE-4.12:openshift-kuryr-controller-0:4.12.0-202306140156.p0.g31dd228.assembly.stream.el8.noarch",
"8Base-RHOSE-4.12:openshift4-aws-iso-0:4.12.0-202306090942.p0.gd2acdd5.assembly.stream.el8.noarch",
"8Base-RHOSE-4.12:openshift4-aws-iso-0:4.12.0-202306090942.p0.gd2acdd5.assembly.stream.el8.src",
"8Base-RHOSE-4.12:perf-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:perf-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:perf-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:perf-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:perf-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:perf-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:perf-debuginfo-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:perf-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:python3-kuryr-kubernetes-0:4.12.0-202306140156.p0.g31dd228.assembly.stream.el8.noarch",
"8Base-RHOSE-4.12:python3-perf-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:python3-perf-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:python3-perf-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:python3-perf-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:python3-perf-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:python3-perf-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:python3-perf-debuginfo-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:python3-perf-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:runc-3:1.1.6-4.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:runc-3:1.1.6-4.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:runc-3:1.1.6-4.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:runc-3:1.1.6-4.rhaos4.12.el8.src",
"8Base-RHOSE-4.12:runc-3:1.1.6-4.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:runc-debuginfo-3:1.1.6-4.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:runc-debuginfo-3:1.1.6-4.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:runc-debuginfo-3:1.1.6-4.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:runc-debuginfo-3:1.1.6-4.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:runc-debugsource-3:1.1.6-4.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:runc-debugsource-3:1.1.6-4.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:runc-debugsource-3:1.1.6-4.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:runc-debugsource-3:1.1.6-4.rhaos4.12.el8.x86_64",
"9Base-RHOSE-4.12:buildah-1:1.23.4-5.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:buildah-1:1.23.4-5.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:buildah-1:1.23.4-5.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:buildah-1:1.23.4-5.rhaos4.12.el9.src",
"9Base-RHOSE-4.12:buildah-1:1.23.4-5.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:openshift-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el9.src",
"9Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.aarch64",
"9Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.ppc64le",
"9Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.s390x",
"9Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.src",
"9Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.x86_64",
"9Base-RHOSE-4.12:openshift-clients-redistributable-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.x86_64",
"9Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el9.aarch64",
"9Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el9.ppc64le",
"9Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el9.s390x",
"9Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el9.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2132868"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the golang package, where requests forwarded by reverse proxy include the raw query parameters from the inbound request, including unparseable parameters rejected by net/http. This issue could permit query parameter smuggling when a Go proxy forwards a parameter with an unparseable value. After the fix, the reverse proxy sanitizes the query parameters in the forwarded query when the outbound request\u0027s form field is set after the reverse proxy. The director function returns, indicating that the proxy has parsed the query parameters. Proxies that do not parse query parameters continue to forward the original query parameters unchanged.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: net/http/httputil: ReverseProxy should not forward unparseable query parameters",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The opportunity to exploit this vulnerability is limited to the Golang runtime. In the case of the OpenShift Container Platform, this would be restricted within each individual container. There are multiple layers of guide rails (Golang\u2019s Garbage Collector; OpenShift\u2019s resource constraints imposed at the container and cluster levels) which would require a malicious user to continue submitting attacks for there to be any enduring impact.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-RHOSE-4.12:conmon-2:2.1.2-4.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:conmon-2:2.1.2-4.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:conmon-2:2.1.2-4.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:conmon-2:2.1.2-4.rhaos4.12.el8.src",
"8Base-RHOSE-4.12:conmon-2:2.1.2-4.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-4.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-4.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-4.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-4.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-4.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-4.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-4.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-4.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-3:4.2.0-6.1.rhaos4.12.el8.src",
"8Base-RHOSE-4.12:podman-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-catatonit-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-catatonit-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-catatonit-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-catatonit-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-debugsource-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-debugsource-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-debugsource-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-debugsource-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-docker-3:4.2.0-6.1.rhaos4.12.el8.noarch",
"8Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-plugins-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-plugins-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-plugins-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-plugins-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-remote-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-remote-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-remote-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-remote-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-tests-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-tests-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-tests-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-tests-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:skopeo-2:1.9.4-3.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:skopeo-2:1.9.4-3.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:skopeo-2:1.9.4-3.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:skopeo-2:1.9.4-3.1.rhaos4.12.el8.src",
"8Base-RHOSE-4.12:skopeo-2:1.9.4-3.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.1.rhaos4.12.el8.x86_64",
"9Base-RHOSE-4.12:conmon-2:2.1.2-5.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:conmon-2:2.1.2-5.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:conmon-2:2.1.2-5.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:conmon-2:2.1.2-5.rhaos4.12.el9.src",
"9Base-RHOSE-4.12:conmon-2:2.1.2-5.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-5.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-5.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-5.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-5.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-5.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-5.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-5.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-5.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-3:4.2.0-7.rhaos4.12.el9.src",
"9Base-RHOSE-4.12:podman-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-catatonit-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-catatonit-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-catatonit-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-catatonit-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-debugsource-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-debugsource-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-debugsource-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-debugsource-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-docker-3:4.2.0-7.rhaos4.12.el9.noarch",
"9Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-plugins-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-plugins-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-plugins-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-plugins-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-remote-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-remote-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-remote-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-remote-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-tests-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-tests-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-tests-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-tests-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:skopeo-2:1.9.4-3.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:skopeo-2:1.9.4-3.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:skopeo-2:1.9.4-3.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:skopeo-2:1.9.4-3.rhaos4.12.el9.src",
"9Base-RHOSE-4.12:skopeo-2:1.9.4-3.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.rhaos4.12.el9.x86_64"
],
"known_not_affected": [
"8Base-RHOSE-4.12:bpftool-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:bpftool-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:bpftool-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:bpftool-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:bpftool-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:bpftool-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:bpftool-debuginfo-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:bpftool-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:buildah-1:1.23.4-5.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:buildah-1:1.23.4-5.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:buildah-1:1.23.4-5.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:buildah-1:1.23.4-5.1.rhaos4.12.el8.src",
"8Base-RHOSE-4.12:buildah-1:1.23.4-5.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:containernetworking-plugins-0:1.0.1-7.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:containernetworking-plugins-0:1.0.1-7.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:containernetworking-plugins-0:1.0.1-7.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:containernetworking-plugins-0:1.0.1-7.rhaos4.12.el8.src",
"8Base-RHOSE-4.12:containernetworking-plugins-0:1.0.1-7.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:containernetworking-plugins-debuginfo-0:1.0.1-7.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:containernetworking-plugins-debuginfo-0:1.0.1-7.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:containernetworking-plugins-debuginfo-0:1.0.1-7.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:containernetworking-plugins-debuginfo-0:1.0.1-7.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:containernetworking-plugins-debugsource-0:1.0.1-7.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:containernetworking-plugins-debugsource-0:1.0.1-7.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:containernetworking-plugins-debugsource-0:1.0.1-7.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:containernetworking-plugins-debugsource-0:1.0.1-7.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:kernel-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-0:4.18.0-372.59.1.el8_6.src",
"8Base-RHOSE-4.12:kernel-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-core-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-core-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-core-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-core-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-cross-headers-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-cross-headers-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-cross-headers-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-cross-headers-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-debug-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-debug-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-debug-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-debug-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-debug-core-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-debug-core-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-debug-core-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-debug-core-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-debug-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-debug-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-debug-debuginfo-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-debug-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-debug-devel-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-debug-devel-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-debug-devel-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-debug-devel-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-debug-modules-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-debug-modules-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-debug-modules-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-debug-modules-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-debug-modules-extra-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-debug-modules-extra-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-debug-modules-extra-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-debug-modules-extra-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-debug-modules-internal-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-debug-modules-internal-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-debug-modules-internal-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-debug-modules-internal-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-debuginfo-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-debuginfo-common-aarch64-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-debuginfo-common-ppc64le-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-debuginfo-common-s390x-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-debuginfo-common-x86_64-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-devel-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-devel-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-devel-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-devel-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-doc-0:4.18.0-372.59.1.el8_6.noarch",
"8Base-RHOSE-4.12:kernel-headers-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-headers-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-headers-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-headers-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-ipaclones-internal-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-ipaclones-internal-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-modules-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-modules-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-modules-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-modules-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-modules-extra-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-modules-extra-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-modules-extra-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-modules-extra-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-modules-internal-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-modules-internal-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-modules-internal-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-modules-internal-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-0:4.18.0-372.59.1.rt7.217.el8_6.src",
"8Base-RHOSE-4.12:kernel-rt-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-core-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debug-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debug-core-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debug-debuginfo-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debug-devel-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debug-kvm-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debug-modules-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debug-modules-extra-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debug-modules-internal-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debuginfo-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-devel-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-kvm-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-modules-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-modules-extra-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-modules-internal-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-selftests-internal-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-selftests-internal-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-selftests-internal-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-selftests-internal-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-selftests-internal-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-tools-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-tools-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-tools-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-tools-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-tools-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-tools-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-tools-debuginfo-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-tools-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-tools-libs-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-tools-libs-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-tools-libs-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-tools-libs-devel-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-tools-libs-devel-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-tools-libs-devel-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-zfcpdump-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-zfcpdump-core-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-zfcpdump-debuginfo-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-zfcpdump-devel-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-zfcpdump-modules-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-zfcpdump-modules-extra-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-zfcpdump-modules-internal-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:openshift-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el8.src",
"8Base-RHOSE-4.12:openshift-ansible-0:4.12.0-202306090942.p0.g74dc7b3.assembly.stream.el8.noarch",
"8Base-RHOSE-4.12:openshift-ansible-0:4.12.0-202306090942.p0.g74dc7b3.assembly.stream.el8.src",
"8Base-RHOSE-4.12:openshift-ansible-test-0:4.12.0-202306090942.p0.g74dc7b3.assembly.stream.el8.noarch",
"8Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.aarch64",
"8Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.ppc64le",
"8Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.s390x",
"8Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.src",
"8Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.x86_64",
"8Base-RHOSE-4.12:openshift-clients-redistributable-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.x86_64",
"8Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el8.aarch64",
"8Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el8.ppc64le",
"8Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el8.s390x",
"8Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el8.x86_64",
"8Base-RHOSE-4.12:openshift-kuryr-0:4.12.0-202306140156.p0.g31dd228.assembly.stream.el8.src",
"8Base-RHOSE-4.12:openshift-kuryr-cni-0:4.12.0-202306140156.p0.g31dd228.assembly.stream.el8.noarch",
"8Base-RHOSE-4.12:openshift-kuryr-common-0:4.12.0-202306140156.p0.g31dd228.assembly.stream.el8.noarch",
"8Base-RHOSE-4.12:openshift-kuryr-controller-0:4.12.0-202306140156.p0.g31dd228.assembly.stream.el8.noarch",
"8Base-RHOSE-4.12:openshift4-aws-iso-0:4.12.0-202306090942.p0.gd2acdd5.assembly.stream.el8.noarch",
"8Base-RHOSE-4.12:openshift4-aws-iso-0:4.12.0-202306090942.p0.gd2acdd5.assembly.stream.el8.src",
"8Base-RHOSE-4.12:perf-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:perf-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:perf-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:perf-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:perf-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:perf-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:perf-debuginfo-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:perf-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:python3-kuryr-kubernetes-0:4.12.0-202306140156.p0.g31dd228.assembly.stream.el8.noarch",
"8Base-RHOSE-4.12:python3-perf-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:python3-perf-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:python3-perf-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:python3-perf-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:python3-perf-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:python3-perf-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:python3-perf-debuginfo-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:python3-perf-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:runc-3:1.1.6-4.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:runc-3:1.1.6-4.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:runc-3:1.1.6-4.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:runc-3:1.1.6-4.rhaos4.12.el8.src",
"8Base-RHOSE-4.12:runc-3:1.1.6-4.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:runc-debuginfo-3:1.1.6-4.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:runc-debuginfo-3:1.1.6-4.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:runc-debuginfo-3:1.1.6-4.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:runc-debuginfo-3:1.1.6-4.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:runc-debugsource-3:1.1.6-4.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:runc-debugsource-3:1.1.6-4.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:runc-debugsource-3:1.1.6-4.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:runc-debugsource-3:1.1.6-4.rhaos4.12.el8.x86_64",
"9Base-RHOSE-4.12:buildah-1:1.23.4-5.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:buildah-1:1.23.4-5.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:buildah-1:1.23.4-5.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:buildah-1:1.23.4-5.rhaos4.12.el9.src",
"9Base-RHOSE-4.12:buildah-1:1.23.4-5.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:openshift-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el9.src",
"9Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.aarch64",
"9Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.ppc64le",
"9Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.s390x",
"9Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.src",
"9Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.x86_64",
"9Base-RHOSE-4.12:openshift-clients-redistributable-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.x86_64",
"9Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el9.aarch64",
"9Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el9.ppc64le",
"9Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el9.s390x",
"9Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-2880"
},
{
"category": "external",
"summary": "RHBZ#2132868",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2132868"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-2880",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2880"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-2880",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-2880"
},
{
"category": "external",
"summary": "https://github.com/golang/go/issues/54663",
"url": "https://github.com/golang/go/issues/54663"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/xtuG5faxtaU?pli=1",
"url": "https://groups.google.com/g/golang-announce/c/xtuG5faxtaU?pli=1"
}
],
"release_date": "2022-10-04T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-06-26T01:19:15+00:00",
"details": "For OpenShift Container Platform 4.12 see the following documentation, which will be updated shortly for this release, for important instructions on how to upgrade your cluster and fully apply this asynchronous errata update:\n\nhttps://docs.openshift.com/container-platform/4.12/release_notes/ocp-4-12-release-notes.html",
"product_ids": [
"8Base-RHOSE-4.12:conmon-2:2.1.2-4.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:conmon-2:2.1.2-4.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:conmon-2:2.1.2-4.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:conmon-2:2.1.2-4.rhaos4.12.el8.src",
"8Base-RHOSE-4.12:conmon-2:2.1.2-4.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-4.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-4.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-4.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-4.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-4.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-4.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-4.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-4.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-3:4.2.0-6.1.rhaos4.12.el8.src",
"8Base-RHOSE-4.12:podman-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-catatonit-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-catatonit-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-catatonit-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-catatonit-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-debugsource-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-debugsource-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-debugsource-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-debugsource-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-docker-3:4.2.0-6.1.rhaos4.12.el8.noarch",
"8Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-plugins-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-plugins-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-plugins-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-plugins-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-remote-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-remote-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-remote-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-remote-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-tests-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-tests-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-tests-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-tests-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:skopeo-2:1.9.4-3.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:skopeo-2:1.9.4-3.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:skopeo-2:1.9.4-3.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:skopeo-2:1.9.4-3.1.rhaos4.12.el8.src",
"8Base-RHOSE-4.12:skopeo-2:1.9.4-3.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.1.rhaos4.12.el8.x86_64",
"9Base-RHOSE-4.12:conmon-2:2.1.2-5.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:conmon-2:2.1.2-5.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:conmon-2:2.1.2-5.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:conmon-2:2.1.2-5.rhaos4.12.el9.src",
"9Base-RHOSE-4.12:conmon-2:2.1.2-5.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-5.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-5.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-5.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-5.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-5.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-5.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-5.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-5.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-3:4.2.0-7.rhaos4.12.el9.src",
"9Base-RHOSE-4.12:podman-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-catatonit-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-catatonit-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-catatonit-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-catatonit-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-debugsource-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-debugsource-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-debugsource-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-debugsource-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-docker-3:4.2.0-7.rhaos4.12.el9.noarch",
"9Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-plugins-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-plugins-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-plugins-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-plugins-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-remote-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-remote-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-remote-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-remote-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-tests-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-tests-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-tests-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-tests-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:skopeo-2:1.9.4-3.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:skopeo-2:1.9.4-3.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:skopeo-2:1.9.4-3.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:skopeo-2:1.9.4-3.rhaos4.12.el9.src",
"9Base-RHOSE-4.12:skopeo-2:1.9.4-3.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.rhaos4.12.el9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:3613"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"8Base-RHOSE-4.12:bpftool-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:bpftool-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:bpftool-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:bpftool-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:bpftool-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:bpftool-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:bpftool-debuginfo-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:bpftool-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:buildah-1:1.23.4-5.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:buildah-1:1.23.4-5.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:buildah-1:1.23.4-5.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:buildah-1:1.23.4-5.1.rhaos4.12.el8.src",
"8Base-RHOSE-4.12:buildah-1:1.23.4-5.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:conmon-2:2.1.2-4.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:conmon-2:2.1.2-4.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:conmon-2:2.1.2-4.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:conmon-2:2.1.2-4.rhaos4.12.el8.src",
"8Base-RHOSE-4.12:conmon-2:2.1.2-4.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-4.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-4.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-4.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-4.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-4.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-4.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-4.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-4.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:containernetworking-plugins-0:1.0.1-7.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:containernetworking-plugins-0:1.0.1-7.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:containernetworking-plugins-0:1.0.1-7.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:containernetworking-plugins-0:1.0.1-7.rhaos4.12.el8.src",
"8Base-RHOSE-4.12:containernetworking-plugins-0:1.0.1-7.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:containernetworking-plugins-debuginfo-0:1.0.1-7.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:containernetworking-plugins-debuginfo-0:1.0.1-7.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:containernetworking-plugins-debuginfo-0:1.0.1-7.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:containernetworking-plugins-debuginfo-0:1.0.1-7.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:containernetworking-plugins-debugsource-0:1.0.1-7.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:containernetworking-plugins-debugsource-0:1.0.1-7.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:containernetworking-plugins-debugsource-0:1.0.1-7.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:containernetworking-plugins-debugsource-0:1.0.1-7.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:kernel-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-0:4.18.0-372.59.1.el8_6.src",
"8Base-RHOSE-4.12:kernel-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-core-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-core-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-core-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-core-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-cross-headers-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-cross-headers-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-cross-headers-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-cross-headers-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-debug-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-debug-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-debug-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-debug-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-debug-core-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-debug-core-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-debug-core-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-debug-core-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-debug-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-debug-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-debug-debuginfo-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-debug-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-debug-devel-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-debug-devel-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-debug-devel-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-debug-devel-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-debug-modules-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-debug-modules-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-debug-modules-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-debug-modules-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-debug-modules-extra-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-debug-modules-extra-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-debug-modules-extra-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-debug-modules-extra-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-debug-modules-internal-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-debug-modules-internal-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-debug-modules-internal-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-debug-modules-internal-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-debuginfo-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-debuginfo-common-aarch64-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-debuginfo-common-ppc64le-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-debuginfo-common-s390x-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-debuginfo-common-x86_64-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-devel-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-devel-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-devel-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-devel-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-doc-0:4.18.0-372.59.1.el8_6.noarch",
"8Base-RHOSE-4.12:kernel-headers-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-headers-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-headers-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-headers-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-ipaclones-internal-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-ipaclones-internal-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-modules-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-modules-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-modules-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-modules-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-modules-extra-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-modules-extra-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-modules-extra-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-modules-extra-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-modules-internal-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-modules-internal-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-modules-internal-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-modules-internal-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-0:4.18.0-372.59.1.rt7.217.el8_6.src",
"8Base-RHOSE-4.12:kernel-rt-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-core-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debug-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debug-core-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debug-debuginfo-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debug-devel-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debug-kvm-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debug-modules-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debug-modules-extra-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debug-modules-internal-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debuginfo-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-devel-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-kvm-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-modules-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-modules-extra-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-modules-internal-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-selftests-internal-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-selftests-internal-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-selftests-internal-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-selftests-internal-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-selftests-internal-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-tools-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-tools-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-tools-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-tools-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-tools-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-tools-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-tools-debuginfo-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-tools-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-tools-libs-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-tools-libs-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-tools-libs-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-tools-libs-devel-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-tools-libs-devel-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-tools-libs-devel-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-zfcpdump-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-zfcpdump-core-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-zfcpdump-debuginfo-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-zfcpdump-devel-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-zfcpdump-modules-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-zfcpdump-modules-extra-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-zfcpdump-modules-internal-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:openshift-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el8.src",
"8Base-RHOSE-4.12:openshift-ansible-0:4.12.0-202306090942.p0.g74dc7b3.assembly.stream.el8.noarch",
"8Base-RHOSE-4.12:openshift-ansible-0:4.12.0-202306090942.p0.g74dc7b3.assembly.stream.el8.src",
"8Base-RHOSE-4.12:openshift-ansible-test-0:4.12.0-202306090942.p0.g74dc7b3.assembly.stream.el8.noarch",
"8Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.aarch64",
"8Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.ppc64le",
"8Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.s390x",
"8Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.src",
"8Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.x86_64",
"8Base-RHOSE-4.12:openshift-clients-redistributable-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.x86_64",
"8Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el8.aarch64",
"8Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el8.ppc64le",
"8Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el8.s390x",
"8Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el8.x86_64",
"8Base-RHOSE-4.12:openshift-kuryr-0:4.12.0-202306140156.p0.g31dd228.assembly.stream.el8.src",
"8Base-RHOSE-4.12:openshift-kuryr-cni-0:4.12.0-202306140156.p0.g31dd228.assembly.stream.el8.noarch",
"8Base-RHOSE-4.12:openshift-kuryr-common-0:4.12.0-202306140156.p0.g31dd228.assembly.stream.el8.noarch",
"8Base-RHOSE-4.12:openshift-kuryr-controller-0:4.12.0-202306140156.p0.g31dd228.assembly.stream.el8.noarch",
"8Base-RHOSE-4.12:openshift4-aws-iso-0:4.12.0-202306090942.p0.gd2acdd5.assembly.stream.el8.noarch",
"8Base-RHOSE-4.12:openshift4-aws-iso-0:4.12.0-202306090942.p0.gd2acdd5.assembly.stream.el8.src",
"8Base-RHOSE-4.12:perf-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:perf-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:perf-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:perf-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:perf-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:perf-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:perf-debuginfo-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:perf-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:podman-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-3:4.2.0-6.1.rhaos4.12.el8.src",
"8Base-RHOSE-4.12:podman-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-catatonit-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-catatonit-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-catatonit-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-catatonit-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-debugsource-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-debugsource-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-debugsource-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-debugsource-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-docker-3:4.2.0-6.1.rhaos4.12.el8.noarch",
"8Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-plugins-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-plugins-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-plugins-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-plugins-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-remote-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-remote-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-remote-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-remote-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-tests-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-tests-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-tests-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-tests-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:python3-kuryr-kubernetes-0:4.12.0-202306140156.p0.g31dd228.assembly.stream.el8.noarch",
"8Base-RHOSE-4.12:python3-perf-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:python3-perf-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:python3-perf-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:python3-perf-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:python3-perf-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:python3-perf-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:python3-perf-debuginfo-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:python3-perf-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:runc-3:1.1.6-4.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:runc-3:1.1.6-4.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:runc-3:1.1.6-4.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:runc-3:1.1.6-4.rhaos4.12.el8.src",
"8Base-RHOSE-4.12:runc-3:1.1.6-4.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:runc-debuginfo-3:1.1.6-4.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:runc-debuginfo-3:1.1.6-4.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:runc-debuginfo-3:1.1.6-4.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:runc-debuginfo-3:1.1.6-4.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:runc-debugsource-3:1.1.6-4.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:runc-debugsource-3:1.1.6-4.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:runc-debugsource-3:1.1.6-4.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:runc-debugsource-3:1.1.6-4.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:skopeo-2:1.9.4-3.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:skopeo-2:1.9.4-3.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:skopeo-2:1.9.4-3.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:skopeo-2:1.9.4-3.1.rhaos4.12.el8.src",
"8Base-RHOSE-4.12:skopeo-2:1.9.4-3.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.1.rhaos4.12.el8.x86_64",
"9Base-RHOSE-4.12:buildah-1:1.23.4-5.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:buildah-1:1.23.4-5.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:buildah-1:1.23.4-5.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:buildah-1:1.23.4-5.rhaos4.12.el9.src",
"9Base-RHOSE-4.12:buildah-1:1.23.4-5.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:conmon-2:2.1.2-5.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:conmon-2:2.1.2-5.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:conmon-2:2.1.2-5.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:conmon-2:2.1.2-5.rhaos4.12.el9.src",
"9Base-RHOSE-4.12:conmon-2:2.1.2-5.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-5.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-5.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-5.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-5.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-5.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-5.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-5.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-5.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:openshift-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el9.src",
"9Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.aarch64",
"9Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.ppc64le",
"9Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.s390x",
"9Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.src",
"9Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.x86_64",
"9Base-RHOSE-4.12:openshift-clients-redistributable-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.x86_64",
"9Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el9.aarch64",
"9Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el9.ppc64le",
"9Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el9.s390x",
"9Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el9.x86_64",
"9Base-RHOSE-4.12:podman-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-3:4.2.0-7.rhaos4.12.el9.src",
"9Base-RHOSE-4.12:podman-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-catatonit-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-catatonit-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-catatonit-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-catatonit-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-debugsource-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-debugsource-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-debugsource-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-debugsource-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-docker-3:4.2.0-7.rhaos4.12.el9.noarch",
"9Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-plugins-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-plugins-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-plugins-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-plugins-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-remote-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-remote-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-remote-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-remote-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-tests-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-tests-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-tests-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-tests-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:skopeo-2:1.9.4-3.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:skopeo-2:1.9.4-3.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:skopeo-2:1.9.4-3.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:skopeo-2:1.9.4-3.rhaos4.12.el9.src",
"9Base-RHOSE-4.12:skopeo-2:1.9.4-3.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.rhaos4.12.el9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "golang: net/http/httputil: ReverseProxy should not forward unparseable query parameters"
},
{
"cve": "CVE-2022-27664",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"discovery_date": "2022-09-06T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-RHOSE-4.12:bpftool-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:bpftool-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:bpftool-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:bpftool-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:bpftool-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:bpftool-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:bpftool-debuginfo-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:bpftool-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:buildah-1:1.23.4-5.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:buildah-1:1.23.4-5.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:buildah-1:1.23.4-5.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:buildah-1:1.23.4-5.1.rhaos4.12.el8.src",
"8Base-RHOSE-4.12:buildah-1:1.23.4-5.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:conmon-2:2.1.2-4.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:conmon-2:2.1.2-4.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:conmon-2:2.1.2-4.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:conmon-2:2.1.2-4.rhaos4.12.el8.src",
"8Base-RHOSE-4.12:conmon-2:2.1.2-4.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-4.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-4.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-4.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-4.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-4.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-4.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-4.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-4.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:containernetworking-plugins-0:1.0.1-7.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:containernetworking-plugins-0:1.0.1-7.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:containernetworking-plugins-0:1.0.1-7.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:containernetworking-plugins-0:1.0.1-7.rhaos4.12.el8.src",
"8Base-RHOSE-4.12:containernetworking-plugins-0:1.0.1-7.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:containernetworking-plugins-debuginfo-0:1.0.1-7.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:containernetworking-plugins-debuginfo-0:1.0.1-7.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:containernetworking-plugins-debuginfo-0:1.0.1-7.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:containernetworking-plugins-debuginfo-0:1.0.1-7.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:containernetworking-plugins-debugsource-0:1.0.1-7.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:containernetworking-plugins-debugsource-0:1.0.1-7.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:containernetworking-plugins-debugsource-0:1.0.1-7.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:containernetworking-plugins-debugsource-0:1.0.1-7.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:kernel-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-0:4.18.0-372.59.1.el8_6.src",
"8Base-RHOSE-4.12:kernel-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-core-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-core-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-core-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-core-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-cross-headers-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-cross-headers-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-cross-headers-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-cross-headers-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-debug-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-debug-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-debug-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-debug-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-debug-core-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-debug-core-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-debug-core-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-debug-core-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-debug-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-debug-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-debug-debuginfo-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-debug-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-debug-devel-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-debug-devel-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-debug-devel-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-debug-devel-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-debug-modules-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-debug-modules-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-debug-modules-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-debug-modules-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-debug-modules-extra-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-debug-modules-extra-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-debug-modules-extra-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-debug-modules-extra-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-debug-modules-internal-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-debug-modules-internal-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-debug-modules-internal-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-debug-modules-internal-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-debuginfo-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-debuginfo-common-aarch64-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-debuginfo-common-ppc64le-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-debuginfo-common-s390x-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-debuginfo-common-x86_64-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-devel-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-devel-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-devel-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-devel-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-doc-0:4.18.0-372.59.1.el8_6.noarch",
"8Base-RHOSE-4.12:kernel-headers-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-headers-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-headers-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-headers-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-ipaclones-internal-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-ipaclones-internal-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-modules-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-modules-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-modules-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-modules-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-modules-extra-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-modules-extra-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-modules-extra-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-modules-extra-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-modules-internal-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-modules-internal-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-modules-internal-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-modules-internal-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-0:4.18.0-372.59.1.rt7.217.el8_6.src",
"8Base-RHOSE-4.12:kernel-rt-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-core-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debug-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debug-core-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debug-debuginfo-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debug-devel-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debug-kvm-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debug-modules-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debug-modules-extra-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debug-modules-internal-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debuginfo-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-devel-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-kvm-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-modules-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-modules-extra-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-modules-internal-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-selftests-internal-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-selftests-internal-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-selftests-internal-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-selftests-internal-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-selftests-internal-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-tools-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-tools-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-tools-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-tools-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-tools-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-tools-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-tools-debuginfo-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-tools-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-tools-libs-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-tools-libs-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-tools-libs-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-tools-libs-devel-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-tools-libs-devel-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-tools-libs-devel-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-zfcpdump-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-zfcpdump-core-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-zfcpdump-debuginfo-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-zfcpdump-devel-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-zfcpdump-modules-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-zfcpdump-modules-extra-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-zfcpdump-modules-internal-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:openshift-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el8.src",
"8Base-RHOSE-4.12:openshift-ansible-0:4.12.0-202306090942.p0.g74dc7b3.assembly.stream.el8.noarch",
"8Base-RHOSE-4.12:openshift-ansible-0:4.12.0-202306090942.p0.g74dc7b3.assembly.stream.el8.src",
"8Base-RHOSE-4.12:openshift-ansible-test-0:4.12.0-202306090942.p0.g74dc7b3.assembly.stream.el8.noarch",
"8Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.aarch64",
"8Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.ppc64le",
"8Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.s390x",
"8Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.src",
"8Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.x86_64",
"8Base-RHOSE-4.12:openshift-clients-redistributable-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.x86_64",
"8Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el8.aarch64",
"8Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el8.ppc64le",
"8Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el8.s390x",
"8Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el8.x86_64",
"8Base-RHOSE-4.12:openshift-kuryr-0:4.12.0-202306140156.p0.g31dd228.assembly.stream.el8.src",
"8Base-RHOSE-4.12:openshift-kuryr-cni-0:4.12.0-202306140156.p0.g31dd228.assembly.stream.el8.noarch",
"8Base-RHOSE-4.12:openshift-kuryr-common-0:4.12.0-202306140156.p0.g31dd228.assembly.stream.el8.noarch",
"8Base-RHOSE-4.12:openshift-kuryr-controller-0:4.12.0-202306140156.p0.g31dd228.assembly.stream.el8.noarch",
"8Base-RHOSE-4.12:openshift4-aws-iso-0:4.12.0-202306090942.p0.gd2acdd5.assembly.stream.el8.noarch",
"8Base-RHOSE-4.12:openshift4-aws-iso-0:4.12.0-202306090942.p0.gd2acdd5.assembly.stream.el8.src",
"8Base-RHOSE-4.12:perf-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:perf-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:perf-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:perf-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:perf-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:perf-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:perf-debuginfo-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:perf-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:python3-kuryr-kubernetes-0:4.12.0-202306140156.p0.g31dd228.assembly.stream.el8.noarch",
"8Base-RHOSE-4.12:python3-perf-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:python3-perf-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:python3-perf-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:python3-perf-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:python3-perf-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:python3-perf-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:python3-perf-debuginfo-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:python3-perf-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:runc-3:1.1.6-4.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:runc-3:1.1.6-4.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:runc-3:1.1.6-4.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:runc-3:1.1.6-4.rhaos4.12.el8.src",
"8Base-RHOSE-4.12:runc-3:1.1.6-4.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:runc-debuginfo-3:1.1.6-4.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:runc-debuginfo-3:1.1.6-4.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:runc-debuginfo-3:1.1.6-4.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:runc-debuginfo-3:1.1.6-4.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:runc-debugsource-3:1.1.6-4.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:runc-debugsource-3:1.1.6-4.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:runc-debugsource-3:1.1.6-4.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:runc-debugsource-3:1.1.6-4.rhaos4.12.el8.x86_64",
"9Base-RHOSE-4.12:buildah-1:1.23.4-5.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:buildah-1:1.23.4-5.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:buildah-1:1.23.4-5.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:buildah-1:1.23.4-5.rhaos4.12.el9.src",
"9Base-RHOSE-4.12:buildah-1:1.23.4-5.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:conmon-2:2.1.2-5.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:conmon-2:2.1.2-5.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:conmon-2:2.1.2-5.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:conmon-2:2.1.2-5.rhaos4.12.el9.src",
"9Base-RHOSE-4.12:conmon-2:2.1.2-5.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-5.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-5.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-5.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-5.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-5.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-5.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-5.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-5.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:openshift-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el9.src",
"9Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.aarch64",
"9Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.ppc64le",
"9Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.s390x",
"9Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.src",
"9Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.x86_64",
"9Base-RHOSE-4.12:openshift-clients-redistributable-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.x86_64",
"9Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el9.aarch64",
"9Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el9.ppc64le",
"9Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el9.s390x",
"9Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el9.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2124669"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the golang package. In net/http in Go, attackers can cause a denial of service because an HTTP/2 connection can hang during closing if a fatal error preempts the shutdown.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: net/http: handle server errors after sending GOAWAY",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The opportunity for a Denial of Service is limited to the golang runtime. In the case of OpenShift Container Platform, this would be restricted within each individual container. There are multiple layers of guide rails (Golang\u2019s Garbage Collector; OpenShift\u2019s resource constraints imposed at the container and cluster levels) which would require a malicious user to continue submitting attacks for there to be any enduring impact. They would also need access to external server resources to be able to send a massive volume of requests to cause a significant impact on server operations.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-RHOSE-4.12:podman-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-3:4.2.0-6.1.rhaos4.12.el8.src",
"8Base-RHOSE-4.12:podman-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-catatonit-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-catatonit-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-catatonit-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-catatonit-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-debugsource-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-debugsource-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-debugsource-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-debugsource-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-docker-3:4.2.0-6.1.rhaos4.12.el8.noarch",
"8Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-plugins-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-plugins-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-plugins-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-plugins-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-remote-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-remote-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-remote-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-remote-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-tests-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-tests-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-tests-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-tests-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:skopeo-2:1.9.4-3.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:skopeo-2:1.9.4-3.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:skopeo-2:1.9.4-3.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:skopeo-2:1.9.4-3.1.rhaos4.12.el8.src",
"8Base-RHOSE-4.12:skopeo-2:1.9.4-3.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.1.rhaos4.12.el8.x86_64",
"9Base-RHOSE-4.12:podman-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-3:4.2.0-7.rhaos4.12.el9.src",
"9Base-RHOSE-4.12:podman-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-catatonit-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-catatonit-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-catatonit-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-catatonit-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-debugsource-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-debugsource-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-debugsource-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-debugsource-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-docker-3:4.2.0-7.rhaos4.12.el9.noarch",
"9Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-plugins-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-plugins-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-plugins-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-plugins-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-remote-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-remote-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-remote-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-remote-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-tests-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-tests-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-tests-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-tests-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:skopeo-2:1.9.4-3.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:skopeo-2:1.9.4-3.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:skopeo-2:1.9.4-3.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:skopeo-2:1.9.4-3.rhaos4.12.el9.src",
"9Base-RHOSE-4.12:skopeo-2:1.9.4-3.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.rhaos4.12.el9.x86_64"
],
"known_not_affected": [
"8Base-RHOSE-4.12:bpftool-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:bpftool-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:bpftool-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:bpftool-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:bpftool-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:bpftool-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:bpftool-debuginfo-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:bpftool-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:buildah-1:1.23.4-5.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:buildah-1:1.23.4-5.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:buildah-1:1.23.4-5.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:buildah-1:1.23.4-5.1.rhaos4.12.el8.src",
"8Base-RHOSE-4.12:buildah-1:1.23.4-5.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:conmon-2:2.1.2-4.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:conmon-2:2.1.2-4.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:conmon-2:2.1.2-4.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:conmon-2:2.1.2-4.rhaos4.12.el8.src",
"8Base-RHOSE-4.12:conmon-2:2.1.2-4.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-4.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-4.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-4.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-4.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-4.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-4.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-4.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-4.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:containernetworking-plugins-0:1.0.1-7.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:containernetworking-plugins-0:1.0.1-7.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:containernetworking-plugins-0:1.0.1-7.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:containernetworking-plugins-0:1.0.1-7.rhaos4.12.el8.src",
"8Base-RHOSE-4.12:containernetworking-plugins-0:1.0.1-7.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:containernetworking-plugins-debuginfo-0:1.0.1-7.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:containernetworking-plugins-debuginfo-0:1.0.1-7.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:containernetworking-plugins-debuginfo-0:1.0.1-7.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:containernetworking-plugins-debuginfo-0:1.0.1-7.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:containernetworking-plugins-debugsource-0:1.0.1-7.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:containernetworking-plugins-debugsource-0:1.0.1-7.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:containernetworking-plugins-debugsource-0:1.0.1-7.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:containernetworking-plugins-debugsource-0:1.0.1-7.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:kernel-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-0:4.18.0-372.59.1.el8_6.src",
"8Base-RHOSE-4.12:kernel-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-core-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-core-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-core-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-core-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-cross-headers-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-cross-headers-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-cross-headers-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-cross-headers-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-debug-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-debug-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-debug-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-debug-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-debug-core-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-debug-core-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-debug-core-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-debug-core-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-debug-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-debug-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-debug-debuginfo-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-debug-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-debug-devel-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-debug-devel-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-debug-devel-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-debug-devel-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-debug-modules-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-debug-modules-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-debug-modules-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-debug-modules-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-debug-modules-extra-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-debug-modules-extra-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-debug-modules-extra-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-debug-modules-extra-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-debug-modules-internal-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-debug-modules-internal-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-debug-modules-internal-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-debug-modules-internal-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-debuginfo-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-debuginfo-common-aarch64-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-debuginfo-common-ppc64le-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-debuginfo-common-s390x-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-debuginfo-common-x86_64-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-devel-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-devel-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-devel-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-devel-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-doc-0:4.18.0-372.59.1.el8_6.noarch",
"8Base-RHOSE-4.12:kernel-headers-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-headers-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-headers-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-headers-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-ipaclones-internal-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-ipaclones-internal-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-modules-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-modules-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-modules-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-modules-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-modules-extra-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-modules-extra-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-modules-extra-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-modules-extra-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-modules-internal-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-modules-internal-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-modules-internal-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-modules-internal-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-0:4.18.0-372.59.1.rt7.217.el8_6.src",
"8Base-RHOSE-4.12:kernel-rt-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-core-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debug-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debug-core-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debug-debuginfo-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debug-devel-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debug-kvm-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debug-modules-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debug-modules-extra-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debug-modules-internal-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debuginfo-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-devel-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-kvm-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-modules-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-modules-extra-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-modules-internal-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-selftests-internal-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-selftests-internal-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-selftests-internal-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-selftests-internal-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-selftests-internal-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-tools-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-tools-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-tools-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-tools-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-tools-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-tools-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-tools-debuginfo-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-tools-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-tools-libs-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-tools-libs-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-tools-libs-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-tools-libs-devel-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-tools-libs-devel-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-tools-libs-devel-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-zfcpdump-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-zfcpdump-core-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-zfcpdump-debuginfo-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-zfcpdump-devel-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-zfcpdump-modules-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-zfcpdump-modules-extra-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-zfcpdump-modules-internal-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:openshift-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el8.src",
"8Base-RHOSE-4.12:openshift-ansible-0:4.12.0-202306090942.p0.g74dc7b3.assembly.stream.el8.noarch",
"8Base-RHOSE-4.12:openshift-ansible-0:4.12.0-202306090942.p0.g74dc7b3.assembly.stream.el8.src",
"8Base-RHOSE-4.12:openshift-ansible-test-0:4.12.0-202306090942.p0.g74dc7b3.assembly.stream.el8.noarch",
"8Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.aarch64",
"8Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.ppc64le",
"8Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.s390x",
"8Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.src",
"8Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.x86_64",
"8Base-RHOSE-4.12:openshift-clients-redistributable-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.x86_64",
"8Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el8.aarch64",
"8Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el8.ppc64le",
"8Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el8.s390x",
"8Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el8.x86_64",
"8Base-RHOSE-4.12:openshift-kuryr-0:4.12.0-202306140156.p0.g31dd228.assembly.stream.el8.src",
"8Base-RHOSE-4.12:openshift-kuryr-cni-0:4.12.0-202306140156.p0.g31dd228.assembly.stream.el8.noarch",
"8Base-RHOSE-4.12:openshift-kuryr-common-0:4.12.0-202306140156.p0.g31dd228.assembly.stream.el8.noarch",
"8Base-RHOSE-4.12:openshift-kuryr-controller-0:4.12.0-202306140156.p0.g31dd228.assembly.stream.el8.noarch",
"8Base-RHOSE-4.12:openshift4-aws-iso-0:4.12.0-202306090942.p0.gd2acdd5.assembly.stream.el8.noarch",
"8Base-RHOSE-4.12:openshift4-aws-iso-0:4.12.0-202306090942.p0.gd2acdd5.assembly.stream.el8.src",
"8Base-RHOSE-4.12:perf-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:perf-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:perf-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:perf-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:perf-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:perf-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:perf-debuginfo-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:perf-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:python3-kuryr-kubernetes-0:4.12.0-202306140156.p0.g31dd228.assembly.stream.el8.noarch",
"8Base-RHOSE-4.12:python3-perf-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:python3-perf-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:python3-perf-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:python3-perf-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:python3-perf-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:python3-perf-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:python3-perf-debuginfo-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:python3-perf-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:runc-3:1.1.6-4.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:runc-3:1.1.6-4.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:runc-3:1.1.6-4.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:runc-3:1.1.6-4.rhaos4.12.el8.src",
"8Base-RHOSE-4.12:runc-3:1.1.6-4.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:runc-debuginfo-3:1.1.6-4.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:runc-debuginfo-3:1.1.6-4.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:runc-debuginfo-3:1.1.6-4.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:runc-debuginfo-3:1.1.6-4.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:runc-debugsource-3:1.1.6-4.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:runc-debugsource-3:1.1.6-4.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:runc-debugsource-3:1.1.6-4.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:runc-debugsource-3:1.1.6-4.rhaos4.12.el8.x86_64",
"9Base-RHOSE-4.12:buildah-1:1.23.4-5.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:buildah-1:1.23.4-5.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:buildah-1:1.23.4-5.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:buildah-1:1.23.4-5.rhaos4.12.el9.src",
"9Base-RHOSE-4.12:buildah-1:1.23.4-5.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:conmon-2:2.1.2-5.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:conmon-2:2.1.2-5.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:conmon-2:2.1.2-5.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:conmon-2:2.1.2-5.rhaos4.12.el9.src",
"9Base-RHOSE-4.12:conmon-2:2.1.2-5.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-5.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-5.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-5.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-5.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-5.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-5.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-5.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-5.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:openshift-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el9.src",
"9Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.aarch64",
"9Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.ppc64le",
"9Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.s390x",
"9Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.src",
"9Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.x86_64",
"9Base-RHOSE-4.12:openshift-clients-redistributable-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.x86_64",
"9Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el9.aarch64",
"9Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el9.ppc64le",
"9Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el9.s390x",
"9Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-27664"
},
{
"category": "external",
"summary": "RHBZ#2124669",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2124669"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-27664",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27664"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-27664",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-27664"
},
{
"category": "external",
"summary": "https://go.dev/issue/54658",
"url": "https://go.dev/issue/54658"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/x49AQzIVX-s/m/0tgO0pjiBQAJ",
"url": "https://groups.google.com/g/golang-announce/c/x49AQzIVX-s/m/0tgO0pjiBQAJ"
}
],
"release_date": "2022-09-06T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-06-26T01:19:15+00:00",
"details": "For OpenShift Container Platform 4.12 see the following documentation, which will be updated shortly for this release, for important instructions on how to upgrade your cluster and fully apply this asynchronous errata update:\n\nhttps://docs.openshift.com/container-platform/4.12/release_notes/ocp-4-12-release-notes.html",
"product_ids": [
"8Base-RHOSE-4.12:podman-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-3:4.2.0-6.1.rhaos4.12.el8.src",
"8Base-RHOSE-4.12:podman-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-catatonit-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-catatonit-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-catatonit-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-catatonit-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-debugsource-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-debugsource-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-debugsource-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-debugsource-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-docker-3:4.2.0-6.1.rhaos4.12.el8.noarch",
"8Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-plugins-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-plugins-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-plugins-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-plugins-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-remote-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-remote-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-remote-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-remote-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-tests-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-tests-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-tests-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-tests-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:skopeo-2:1.9.4-3.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:skopeo-2:1.9.4-3.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:skopeo-2:1.9.4-3.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:skopeo-2:1.9.4-3.1.rhaos4.12.el8.src",
"8Base-RHOSE-4.12:skopeo-2:1.9.4-3.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.1.rhaos4.12.el8.x86_64",
"9Base-RHOSE-4.12:podman-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-3:4.2.0-7.rhaos4.12.el9.src",
"9Base-RHOSE-4.12:podman-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-catatonit-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-catatonit-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-catatonit-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-catatonit-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-debugsource-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-debugsource-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-debugsource-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-debugsource-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-docker-3:4.2.0-7.rhaos4.12.el9.noarch",
"9Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-plugins-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-plugins-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-plugins-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-plugins-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-remote-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-remote-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-remote-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-remote-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-tests-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-tests-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-tests-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-tests-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:skopeo-2:1.9.4-3.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:skopeo-2:1.9.4-3.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:skopeo-2:1.9.4-3.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:skopeo-2:1.9.4-3.rhaos4.12.el9.src",
"9Base-RHOSE-4.12:skopeo-2:1.9.4-3.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.rhaos4.12.el9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:3613"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"8Base-RHOSE-4.12:bpftool-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:bpftool-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:bpftool-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:bpftool-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:bpftool-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:bpftool-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:bpftool-debuginfo-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:bpftool-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:buildah-1:1.23.4-5.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:buildah-1:1.23.4-5.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:buildah-1:1.23.4-5.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:buildah-1:1.23.4-5.1.rhaos4.12.el8.src",
"8Base-RHOSE-4.12:buildah-1:1.23.4-5.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:conmon-2:2.1.2-4.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:conmon-2:2.1.2-4.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:conmon-2:2.1.2-4.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:conmon-2:2.1.2-4.rhaos4.12.el8.src",
"8Base-RHOSE-4.12:conmon-2:2.1.2-4.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-4.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-4.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-4.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-4.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-4.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-4.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-4.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-4.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:containernetworking-plugins-0:1.0.1-7.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:containernetworking-plugins-0:1.0.1-7.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:containernetworking-plugins-0:1.0.1-7.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:containernetworking-plugins-0:1.0.1-7.rhaos4.12.el8.src",
"8Base-RHOSE-4.12:containernetworking-plugins-0:1.0.1-7.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:containernetworking-plugins-debuginfo-0:1.0.1-7.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:containernetworking-plugins-debuginfo-0:1.0.1-7.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:containernetworking-plugins-debuginfo-0:1.0.1-7.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:containernetworking-plugins-debuginfo-0:1.0.1-7.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:containernetworking-plugins-debugsource-0:1.0.1-7.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:containernetworking-plugins-debugsource-0:1.0.1-7.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:containernetworking-plugins-debugsource-0:1.0.1-7.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:containernetworking-plugins-debugsource-0:1.0.1-7.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:kernel-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-0:4.18.0-372.59.1.el8_6.src",
"8Base-RHOSE-4.12:kernel-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-core-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-core-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-core-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-core-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-cross-headers-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-cross-headers-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-cross-headers-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-cross-headers-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-debug-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-debug-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-debug-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-debug-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-debug-core-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-debug-core-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-debug-core-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-debug-core-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-debug-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-debug-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-debug-debuginfo-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-debug-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-debug-devel-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-debug-devel-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-debug-devel-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-debug-devel-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-debug-modules-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-debug-modules-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-debug-modules-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-debug-modules-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-debug-modules-extra-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-debug-modules-extra-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-debug-modules-extra-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-debug-modules-extra-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-debug-modules-internal-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-debug-modules-internal-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-debug-modules-internal-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-debug-modules-internal-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-debuginfo-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-debuginfo-common-aarch64-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-debuginfo-common-ppc64le-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-debuginfo-common-s390x-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-debuginfo-common-x86_64-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-devel-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-devel-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-devel-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-devel-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-doc-0:4.18.0-372.59.1.el8_6.noarch",
"8Base-RHOSE-4.12:kernel-headers-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-headers-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-headers-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-headers-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-ipaclones-internal-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-ipaclones-internal-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-modules-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-modules-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-modules-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-modules-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-modules-extra-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-modules-extra-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-modules-extra-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-modules-extra-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-modules-internal-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-modules-internal-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-modules-internal-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-modules-internal-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-0:4.18.0-372.59.1.rt7.217.el8_6.src",
"8Base-RHOSE-4.12:kernel-rt-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-core-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debug-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debug-core-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debug-debuginfo-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debug-devel-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debug-kvm-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debug-modules-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debug-modules-extra-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debug-modules-internal-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debuginfo-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-devel-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-kvm-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-modules-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-modules-extra-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-modules-internal-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-selftests-internal-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-selftests-internal-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-selftests-internal-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-selftests-internal-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-selftests-internal-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-tools-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-tools-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-tools-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-tools-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-tools-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-tools-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-tools-debuginfo-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-tools-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-tools-libs-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-tools-libs-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-tools-libs-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-tools-libs-devel-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-tools-libs-devel-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-tools-libs-devel-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-zfcpdump-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-zfcpdump-core-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-zfcpdump-debuginfo-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-zfcpdump-devel-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-zfcpdump-modules-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-zfcpdump-modules-extra-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-zfcpdump-modules-internal-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:openshift-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el8.src",
"8Base-RHOSE-4.12:openshift-ansible-0:4.12.0-202306090942.p0.g74dc7b3.assembly.stream.el8.noarch",
"8Base-RHOSE-4.12:openshift-ansible-0:4.12.0-202306090942.p0.g74dc7b3.assembly.stream.el8.src",
"8Base-RHOSE-4.12:openshift-ansible-test-0:4.12.0-202306090942.p0.g74dc7b3.assembly.stream.el8.noarch",
"8Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.aarch64",
"8Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.ppc64le",
"8Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.s390x",
"8Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.src",
"8Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.x86_64",
"8Base-RHOSE-4.12:openshift-clients-redistributable-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.x86_64",
"8Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el8.aarch64",
"8Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el8.ppc64le",
"8Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el8.s390x",
"8Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el8.x86_64",
"8Base-RHOSE-4.12:openshift-kuryr-0:4.12.0-202306140156.p0.g31dd228.assembly.stream.el8.src",
"8Base-RHOSE-4.12:openshift-kuryr-cni-0:4.12.0-202306140156.p0.g31dd228.assembly.stream.el8.noarch",
"8Base-RHOSE-4.12:openshift-kuryr-common-0:4.12.0-202306140156.p0.g31dd228.assembly.stream.el8.noarch",
"8Base-RHOSE-4.12:openshift-kuryr-controller-0:4.12.0-202306140156.p0.g31dd228.assembly.stream.el8.noarch",
"8Base-RHOSE-4.12:openshift4-aws-iso-0:4.12.0-202306090942.p0.gd2acdd5.assembly.stream.el8.noarch",
"8Base-RHOSE-4.12:openshift4-aws-iso-0:4.12.0-202306090942.p0.gd2acdd5.assembly.stream.el8.src",
"8Base-RHOSE-4.12:perf-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:perf-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:perf-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:perf-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:perf-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:perf-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:perf-debuginfo-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:perf-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:podman-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-3:4.2.0-6.1.rhaos4.12.el8.src",
"8Base-RHOSE-4.12:podman-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-catatonit-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-catatonit-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-catatonit-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-catatonit-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-debugsource-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-debugsource-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-debugsource-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-debugsource-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-docker-3:4.2.0-6.1.rhaos4.12.el8.noarch",
"8Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-plugins-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-plugins-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-plugins-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-plugins-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-remote-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-remote-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-remote-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-remote-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-tests-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-tests-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-tests-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-tests-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:python3-kuryr-kubernetes-0:4.12.0-202306140156.p0.g31dd228.assembly.stream.el8.noarch",
"8Base-RHOSE-4.12:python3-perf-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:python3-perf-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:python3-perf-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:python3-perf-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:python3-perf-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:python3-perf-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:python3-perf-debuginfo-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:python3-perf-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:runc-3:1.1.6-4.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:runc-3:1.1.6-4.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:runc-3:1.1.6-4.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:runc-3:1.1.6-4.rhaos4.12.el8.src",
"8Base-RHOSE-4.12:runc-3:1.1.6-4.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:runc-debuginfo-3:1.1.6-4.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:runc-debuginfo-3:1.1.6-4.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:runc-debuginfo-3:1.1.6-4.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:runc-debuginfo-3:1.1.6-4.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:runc-debugsource-3:1.1.6-4.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:runc-debugsource-3:1.1.6-4.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:runc-debugsource-3:1.1.6-4.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:runc-debugsource-3:1.1.6-4.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:skopeo-2:1.9.4-3.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:skopeo-2:1.9.4-3.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:skopeo-2:1.9.4-3.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:skopeo-2:1.9.4-3.1.rhaos4.12.el8.src",
"8Base-RHOSE-4.12:skopeo-2:1.9.4-3.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.1.rhaos4.12.el8.x86_64",
"9Base-RHOSE-4.12:buildah-1:1.23.4-5.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:buildah-1:1.23.4-5.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:buildah-1:1.23.4-5.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:buildah-1:1.23.4-5.rhaos4.12.el9.src",
"9Base-RHOSE-4.12:buildah-1:1.23.4-5.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:conmon-2:2.1.2-5.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:conmon-2:2.1.2-5.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:conmon-2:2.1.2-5.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:conmon-2:2.1.2-5.rhaos4.12.el9.src",
"9Base-RHOSE-4.12:conmon-2:2.1.2-5.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-5.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-5.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-5.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-5.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-5.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-5.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-5.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-5.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:openshift-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el9.src",
"9Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.aarch64",
"9Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.ppc64le",
"9Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.s390x",
"9Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.src",
"9Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.x86_64",
"9Base-RHOSE-4.12:openshift-clients-redistributable-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.x86_64",
"9Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el9.aarch64",
"9Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el9.ppc64le",
"9Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el9.s390x",
"9Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el9.x86_64",
"9Base-RHOSE-4.12:podman-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-3:4.2.0-7.rhaos4.12.el9.src",
"9Base-RHOSE-4.12:podman-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-catatonit-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-catatonit-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-catatonit-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-catatonit-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-debugsource-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-debugsource-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-debugsource-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-debugsource-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-docker-3:4.2.0-7.rhaos4.12.el9.noarch",
"9Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-plugins-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-plugins-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-plugins-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-plugins-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-remote-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-remote-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-remote-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-remote-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-tests-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-tests-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-tests-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-tests-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:skopeo-2:1.9.4-3.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:skopeo-2:1.9.4-3.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:skopeo-2:1.9.4-3.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:skopeo-2:1.9.4-3.rhaos4.12.el9.src",
"9Base-RHOSE-4.12:skopeo-2:1.9.4-3.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.rhaos4.12.el9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "golang: net/http: handle server errors after sending GOAWAY"
},
{
"cve": "CVE-2022-32149",
"cwe": {
"id": "CWE-407",
"name": "Inefficient Algorithmic Complexity"
},
"discovery_date": "2022-10-12T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-RHOSE-4.12:bpftool-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:bpftool-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:bpftool-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:bpftool-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:bpftool-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:bpftool-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:bpftool-debuginfo-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:bpftool-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:buildah-1:1.23.4-5.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:buildah-1:1.23.4-5.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:buildah-1:1.23.4-5.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:buildah-1:1.23.4-5.1.rhaos4.12.el8.src",
"8Base-RHOSE-4.12:buildah-1:1.23.4-5.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:conmon-2:2.1.2-4.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:conmon-2:2.1.2-4.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:conmon-2:2.1.2-4.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:conmon-2:2.1.2-4.rhaos4.12.el8.src",
"8Base-RHOSE-4.12:conmon-2:2.1.2-4.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-4.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-4.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-4.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-4.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-4.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-4.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-4.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-4.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:containernetworking-plugins-0:1.0.1-7.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:containernetworking-plugins-0:1.0.1-7.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:containernetworking-plugins-0:1.0.1-7.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:containernetworking-plugins-0:1.0.1-7.rhaos4.12.el8.src",
"8Base-RHOSE-4.12:containernetworking-plugins-0:1.0.1-7.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:containernetworking-plugins-debuginfo-0:1.0.1-7.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:containernetworking-plugins-debuginfo-0:1.0.1-7.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:containernetworking-plugins-debuginfo-0:1.0.1-7.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:containernetworking-plugins-debuginfo-0:1.0.1-7.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:containernetworking-plugins-debugsource-0:1.0.1-7.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:containernetworking-plugins-debugsource-0:1.0.1-7.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:containernetworking-plugins-debugsource-0:1.0.1-7.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:containernetworking-plugins-debugsource-0:1.0.1-7.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:kernel-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-0:4.18.0-372.59.1.el8_6.src",
"8Base-RHOSE-4.12:kernel-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-core-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-core-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-core-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-core-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-cross-headers-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-cross-headers-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-cross-headers-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-cross-headers-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-debug-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-debug-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-debug-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-debug-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-debug-core-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-debug-core-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-debug-core-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-debug-core-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-debug-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-debug-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-debug-debuginfo-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-debug-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-debug-devel-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-debug-devel-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-debug-devel-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-debug-devel-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-debug-modules-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-debug-modules-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-debug-modules-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-debug-modules-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-debug-modules-extra-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-debug-modules-extra-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-debug-modules-extra-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-debug-modules-extra-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-debug-modules-internal-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-debug-modules-internal-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-debug-modules-internal-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-debug-modules-internal-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-debuginfo-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-debuginfo-common-aarch64-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-debuginfo-common-ppc64le-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-debuginfo-common-s390x-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-debuginfo-common-x86_64-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-devel-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-devel-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-devel-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-devel-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-doc-0:4.18.0-372.59.1.el8_6.noarch",
"8Base-RHOSE-4.12:kernel-headers-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-headers-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-headers-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-headers-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-ipaclones-internal-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-ipaclones-internal-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-modules-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-modules-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-modules-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-modules-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-modules-extra-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-modules-extra-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-modules-extra-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-modules-extra-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-modules-internal-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-modules-internal-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-modules-internal-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-modules-internal-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-0:4.18.0-372.59.1.rt7.217.el8_6.src",
"8Base-RHOSE-4.12:kernel-rt-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-core-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debug-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debug-core-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debug-debuginfo-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debug-devel-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debug-kvm-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debug-modules-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debug-modules-extra-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debug-modules-internal-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debuginfo-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-devel-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-kvm-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-modules-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-modules-extra-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-modules-internal-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-selftests-internal-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-selftests-internal-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-selftests-internal-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-selftests-internal-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-selftests-internal-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-tools-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-tools-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-tools-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-tools-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-tools-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-tools-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-tools-debuginfo-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-tools-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-tools-libs-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-tools-libs-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-tools-libs-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-tools-libs-devel-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-tools-libs-devel-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-tools-libs-devel-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-zfcpdump-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-zfcpdump-core-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-zfcpdump-debuginfo-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-zfcpdump-devel-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-zfcpdump-modules-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-zfcpdump-modules-extra-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-zfcpdump-modules-internal-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:openshift-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el8.src",
"8Base-RHOSE-4.12:openshift-ansible-0:4.12.0-202306090942.p0.g74dc7b3.assembly.stream.el8.noarch",
"8Base-RHOSE-4.12:openshift-ansible-0:4.12.0-202306090942.p0.g74dc7b3.assembly.stream.el8.src",
"8Base-RHOSE-4.12:openshift-ansible-test-0:4.12.0-202306090942.p0.g74dc7b3.assembly.stream.el8.noarch",
"8Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.aarch64",
"8Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.ppc64le",
"8Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.s390x",
"8Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.src",
"8Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.x86_64",
"8Base-RHOSE-4.12:openshift-clients-redistributable-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.x86_64",
"8Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el8.aarch64",
"8Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el8.ppc64le",
"8Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el8.s390x",
"8Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el8.x86_64",
"8Base-RHOSE-4.12:openshift-kuryr-0:4.12.0-202306140156.p0.g31dd228.assembly.stream.el8.src",
"8Base-RHOSE-4.12:openshift-kuryr-cni-0:4.12.0-202306140156.p0.g31dd228.assembly.stream.el8.noarch",
"8Base-RHOSE-4.12:openshift-kuryr-common-0:4.12.0-202306140156.p0.g31dd228.assembly.stream.el8.noarch",
"8Base-RHOSE-4.12:openshift-kuryr-controller-0:4.12.0-202306140156.p0.g31dd228.assembly.stream.el8.noarch",
"8Base-RHOSE-4.12:openshift4-aws-iso-0:4.12.0-202306090942.p0.gd2acdd5.assembly.stream.el8.noarch",
"8Base-RHOSE-4.12:openshift4-aws-iso-0:4.12.0-202306090942.p0.gd2acdd5.assembly.stream.el8.src",
"8Base-RHOSE-4.12:perf-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:perf-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:perf-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:perf-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:perf-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:perf-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:perf-debuginfo-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:perf-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:python3-kuryr-kubernetes-0:4.12.0-202306140156.p0.g31dd228.assembly.stream.el8.noarch",
"8Base-RHOSE-4.12:python3-perf-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:python3-perf-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:python3-perf-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:python3-perf-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:python3-perf-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:python3-perf-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:python3-perf-debuginfo-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:python3-perf-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:runc-3:1.1.6-4.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:runc-3:1.1.6-4.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:runc-3:1.1.6-4.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:runc-3:1.1.6-4.rhaos4.12.el8.src",
"8Base-RHOSE-4.12:runc-3:1.1.6-4.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:runc-debuginfo-3:1.1.6-4.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:runc-debuginfo-3:1.1.6-4.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:runc-debuginfo-3:1.1.6-4.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:runc-debuginfo-3:1.1.6-4.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:runc-debugsource-3:1.1.6-4.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:runc-debugsource-3:1.1.6-4.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:runc-debugsource-3:1.1.6-4.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:runc-debugsource-3:1.1.6-4.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:skopeo-2:1.9.4-3.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:skopeo-2:1.9.4-3.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:skopeo-2:1.9.4-3.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:skopeo-2:1.9.4-3.1.rhaos4.12.el8.src",
"8Base-RHOSE-4.12:skopeo-2:1.9.4-3.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.1.rhaos4.12.el8.x86_64",
"9Base-RHOSE-4.12:buildah-1:1.23.4-5.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:buildah-1:1.23.4-5.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:buildah-1:1.23.4-5.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:buildah-1:1.23.4-5.rhaos4.12.el9.src",
"9Base-RHOSE-4.12:buildah-1:1.23.4-5.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:conmon-2:2.1.2-5.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:conmon-2:2.1.2-5.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:conmon-2:2.1.2-5.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:conmon-2:2.1.2-5.rhaos4.12.el9.src",
"9Base-RHOSE-4.12:conmon-2:2.1.2-5.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-5.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-5.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-5.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-5.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-5.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-5.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-5.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-5.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:openshift-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el9.src",
"9Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.aarch64",
"9Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.ppc64le",
"9Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.s390x",
"9Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.src",
"9Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.x86_64",
"9Base-RHOSE-4.12:openshift-clients-redistributable-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.x86_64",
"9Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el9.aarch64",
"9Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el9.ppc64le",
"9Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el9.s390x",
"9Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el9.x86_64",
"9Base-RHOSE-4.12:skopeo-2:1.9.4-3.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:skopeo-2:1.9.4-3.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:skopeo-2:1.9.4-3.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:skopeo-2:1.9.4-3.rhaos4.12.el9.src",
"9Base-RHOSE-4.12:skopeo-2:1.9.4-3.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.rhaos4.12.el9.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2134010"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in the golang.org/x/text/language package. An attacker can craft an Accept-Language header which ParseAcceptLanguage will take significant time to parse. This issue leads to a denial of service, and can impact availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: golang.org/x/text/language: ParseAcceptLanguage takes a long time to parse complex tags",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-RHOSE-4.12:podman-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-3:4.2.0-6.1.rhaos4.12.el8.src",
"8Base-RHOSE-4.12:podman-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-catatonit-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-catatonit-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-catatonit-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-catatonit-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-debugsource-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-debugsource-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-debugsource-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-debugsource-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-docker-3:4.2.0-6.1.rhaos4.12.el8.noarch",
"8Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-plugins-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-plugins-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-plugins-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-plugins-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-remote-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-remote-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-remote-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-remote-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-tests-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-tests-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-tests-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-tests-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"9Base-RHOSE-4.12:podman-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-3:4.2.0-7.rhaos4.12.el9.src",
"9Base-RHOSE-4.12:podman-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-catatonit-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-catatonit-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-catatonit-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-catatonit-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-debugsource-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-debugsource-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-debugsource-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-debugsource-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-docker-3:4.2.0-7.rhaos4.12.el9.noarch",
"9Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-plugins-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-plugins-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-plugins-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-plugins-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-remote-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-remote-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-remote-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-remote-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-tests-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-tests-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-tests-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-tests-3:4.2.0-7.rhaos4.12.el9.x86_64"
],
"known_not_affected": [
"8Base-RHOSE-4.12:bpftool-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:bpftool-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:bpftool-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:bpftool-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:bpftool-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:bpftool-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:bpftool-debuginfo-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:bpftool-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:buildah-1:1.23.4-5.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:buildah-1:1.23.4-5.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:buildah-1:1.23.4-5.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:buildah-1:1.23.4-5.1.rhaos4.12.el8.src",
"8Base-RHOSE-4.12:buildah-1:1.23.4-5.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:conmon-2:2.1.2-4.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:conmon-2:2.1.2-4.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:conmon-2:2.1.2-4.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:conmon-2:2.1.2-4.rhaos4.12.el8.src",
"8Base-RHOSE-4.12:conmon-2:2.1.2-4.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-4.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-4.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-4.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-4.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-4.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-4.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-4.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-4.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:containernetworking-plugins-0:1.0.1-7.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:containernetworking-plugins-0:1.0.1-7.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:containernetworking-plugins-0:1.0.1-7.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:containernetworking-plugins-0:1.0.1-7.rhaos4.12.el8.src",
"8Base-RHOSE-4.12:containernetworking-plugins-0:1.0.1-7.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:containernetworking-plugins-debuginfo-0:1.0.1-7.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:containernetworking-plugins-debuginfo-0:1.0.1-7.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:containernetworking-plugins-debuginfo-0:1.0.1-7.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:containernetworking-plugins-debuginfo-0:1.0.1-7.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:containernetworking-plugins-debugsource-0:1.0.1-7.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:containernetworking-plugins-debugsource-0:1.0.1-7.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:containernetworking-plugins-debugsource-0:1.0.1-7.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:containernetworking-plugins-debugsource-0:1.0.1-7.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:kernel-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-0:4.18.0-372.59.1.el8_6.src",
"8Base-RHOSE-4.12:kernel-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-core-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-core-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-core-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-core-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-cross-headers-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-cross-headers-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-cross-headers-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-cross-headers-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-debug-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-debug-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-debug-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-debug-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-debug-core-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-debug-core-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-debug-core-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-debug-core-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-debug-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-debug-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-debug-debuginfo-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-debug-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-debug-devel-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-debug-devel-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-debug-devel-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-debug-devel-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-debug-modules-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-debug-modules-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-debug-modules-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-debug-modules-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-debug-modules-extra-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-debug-modules-extra-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-debug-modules-extra-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-debug-modules-extra-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-debug-modules-internal-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-debug-modules-internal-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-debug-modules-internal-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-debug-modules-internal-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-debuginfo-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-debuginfo-common-aarch64-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-debuginfo-common-ppc64le-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-debuginfo-common-s390x-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-debuginfo-common-x86_64-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-devel-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-devel-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-devel-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-devel-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-doc-0:4.18.0-372.59.1.el8_6.noarch",
"8Base-RHOSE-4.12:kernel-headers-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-headers-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-headers-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-headers-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-ipaclones-internal-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-ipaclones-internal-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-modules-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-modules-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-modules-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-modules-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-modules-extra-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-modules-extra-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-modules-extra-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-modules-extra-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-modules-internal-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-modules-internal-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-modules-internal-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-modules-internal-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-0:4.18.0-372.59.1.rt7.217.el8_6.src",
"8Base-RHOSE-4.12:kernel-rt-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-core-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debug-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debug-core-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debug-debuginfo-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debug-devel-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debug-kvm-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debug-modules-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debug-modules-extra-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debug-modules-internal-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debuginfo-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-devel-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-kvm-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-modules-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-modules-extra-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-modules-internal-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-selftests-internal-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-selftests-internal-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-selftests-internal-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-selftests-internal-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-selftests-internal-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-tools-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-tools-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-tools-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-tools-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-tools-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-tools-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-tools-debuginfo-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-tools-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-tools-libs-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-tools-libs-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-tools-libs-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-tools-libs-devel-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-tools-libs-devel-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-tools-libs-devel-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-zfcpdump-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-zfcpdump-core-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-zfcpdump-debuginfo-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-zfcpdump-devel-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-zfcpdump-modules-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-zfcpdump-modules-extra-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-zfcpdump-modules-internal-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:openshift-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el8.src",
"8Base-RHOSE-4.12:openshift-ansible-0:4.12.0-202306090942.p0.g74dc7b3.assembly.stream.el8.noarch",
"8Base-RHOSE-4.12:openshift-ansible-0:4.12.0-202306090942.p0.g74dc7b3.assembly.stream.el8.src",
"8Base-RHOSE-4.12:openshift-ansible-test-0:4.12.0-202306090942.p0.g74dc7b3.assembly.stream.el8.noarch",
"8Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.aarch64",
"8Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.ppc64le",
"8Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.s390x",
"8Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.src",
"8Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.x86_64",
"8Base-RHOSE-4.12:openshift-clients-redistributable-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.x86_64",
"8Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el8.aarch64",
"8Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el8.ppc64le",
"8Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el8.s390x",
"8Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el8.x86_64",
"8Base-RHOSE-4.12:openshift-kuryr-0:4.12.0-202306140156.p0.g31dd228.assembly.stream.el8.src",
"8Base-RHOSE-4.12:openshift-kuryr-cni-0:4.12.0-202306140156.p0.g31dd228.assembly.stream.el8.noarch",
"8Base-RHOSE-4.12:openshift-kuryr-common-0:4.12.0-202306140156.p0.g31dd228.assembly.stream.el8.noarch",
"8Base-RHOSE-4.12:openshift-kuryr-controller-0:4.12.0-202306140156.p0.g31dd228.assembly.stream.el8.noarch",
"8Base-RHOSE-4.12:openshift4-aws-iso-0:4.12.0-202306090942.p0.gd2acdd5.assembly.stream.el8.noarch",
"8Base-RHOSE-4.12:openshift4-aws-iso-0:4.12.0-202306090942.p0.gd2acdd5.assembly.stream.el8.src",
"8Base-RHOSE-4.12:perf-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:perf-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:perf-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:perf-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:perf-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:perf-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:perf-debuginfo-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:perf-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:python3-kuryr-kubernetes-0:4.12.0-202306140156.p0.g31dd228.assembly.stream.el8.noarch",
"8Base-RHOSE-4.12:python3-perf-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:python3-perf-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:python3-perf-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:python3-perf-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:python3-perf-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:python3-perf-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:python3-perf-debuginfo-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:python3-perf-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:runc-3:1.1.6-4.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:runc-3:1.1.6-4.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:runc-3:1.1.6-4.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:runc-3:1.1.6-4.rhaos4.12.el8.src",
"8Base-RHOSE-4.12:runc-3:1.1.6-4.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:runc-debuginfo-3:1.1.6-4.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:runc-debuginfo-3:1.1.6-4.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:runc-debuginfo-3:1.1.6-4.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:runc-debuginfo-3:1.1.6-4.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:runc-debugsource-3:1.1.6-4.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:runc-debugsource-3:1.1.6-4.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:runc-debugsource-3:1.1.6-4.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:runc-debugsource-3:1.1.6-4.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:skopeo-2:1.9.4-3.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:skopeo-2:1.9.4-3.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:skopeo-2:1.9.4-3.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:skopeo-2:1.9.4-3.1.rhaos4.12.el8.src",
"8Base-RHOSE-4.12:skopeo-2:1.9.4-3.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.1.rhaos4.12.el8.x86_64",
"9Base-RHOSE-4.12:buildah-1:1.23.4-5.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:buildah-1:1.23.4-5.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:buildah-1:1.23.4-5.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:buildah-1:1.23.4-5.rhaos4.12.el9.src",
"9Base-RHOSE-4.12:buildah-1:1.23.4-5.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:conmon-2:2.1.2-5.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:conmon-2:2.1.2-5.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:conmon-2:2.1.2-5.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:conmon-2:2.1.2-5.rhaos4.12.el9.src",
"9Base-RHOSE-4.12:conmon-2:2.1.2-5.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-5.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-5.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-5.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-5.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-5.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-5.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-5.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-5.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:openshift-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el9.src",
"9Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.aarch64",
"9Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.ppc64le",
"9Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.s390x",
"9Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.src",
"9Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.x86_64",
"9Base-RHOSE-4.12:openshift-clients-redistributable-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.x86_64",
"9Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el9.aarch64",
"9Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el9.ppc64le",
"9Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el9.s390x",
"9Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el9.x86_64",
"9Base-RHOSE-4.12:skopeo-2:1.9.4-3.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:skopeo-2:1.9.4-3.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:skopeo-2:1.9.4-3.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:skopeo-2:1.9.4-3.rhaos4.12.el9.src",
"9Base-RHOSE-4.12:skopeo-2:1.9.4-3.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.rhaos4.12.el9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-32149"
},
{
"category": "external",
"summary": "RHBZ#2134010",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2134010"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-32149",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32149"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-32149",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-32149"
},
{
"category": "external",
"summary": "https://go.dev/issue/56152",
"url": "https://go.dev/issue/56152"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-dev/c/qfPIly0X7aU",
"url": "https://groups.google.com/g/golang-dev/c/qfPIly0X7aU"
}
],
"release_date": "2022-10-11T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-06-26T01:19:15+00:00",
"details": "For OpenShift Container Platform 4.12 see the following documentation, which will be updated shortly for this release, for important instructions on how to upgrade your cluster and fully apply this asynchronous errata update:\n\nhttps://docs.openshift.com/container-platform/4.12/release_notes/ocp-4-12-release-notes.html",
"product_ids": [
"8Base-RHOSE-4.12:podman-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-3:4.2.0-6.1.rhaos4.12.el8.src",
"8Base-RHOSE-4.12:podman-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-catatonit-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-catatonit-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-catatonit-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-catatonit-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-debugsource-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-debugsource-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-debugsource-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-debugsource-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-docker-3:4.2.0-6.1.rhaos4.12.el8.noarch",
"8Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-plugins-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-plugins-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-plugins-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-plugins-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-remote-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-remote-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-remote-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-remote-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-tests-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-tests-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-tests-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-tests-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"9Base-RHOSE-4.12:podman-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-3:4.2.0-7.rhaos4.12.el9.src",
"9Base-RHOSE-4.12:podman-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-catatonit-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-catatonit-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-catatonit-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-catatonit-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-debugsource-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-debugsource-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-debugsource-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-debugsource-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-docker-3:4.2.0-7.rhaos4.12.el9.noarch",
"9Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-plugins-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-plugins-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-plugins-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-plugins-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-remote-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-remote-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-remote-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-remote-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-tests-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-tests-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-tests-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-tests-3:4.2.0-7.rhaos4.12.el9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:3613"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"8Base-RHOSE-4.12:bpftool-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:bpftool-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:bpftool-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:bpftool-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:bpftool-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:bpftool-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:bpftool-debuginfo-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:bpftool-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:buildah-1:1.23.4-5.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:buildah-1:1.23.4-5.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:buildah-1:1.23.4-5.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:buildah-1:1.23.4-5.1.rhaos4.12.el8.src",
"8Base-RHOSE-4.12:buildah-1:1.23.4-5.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:conmon-2:2.1.2-4.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:conmon-2:2.1.2-4.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:conmon-2:2.1.2-4.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:conmon-2:2.1.2-4.rhaos4.12.el8.src",
"8Base-RHOSE-4.12:conmon-2:2.1.2-4.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-4.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-4.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-4.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-4.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-4.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-4.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-4.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-4.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:containernetworking-plugins-0:1.0.1-7.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:containernetworking-plugins-0:1.0.1-7.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:containernetworking-plugins-0:1.0.1-7.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:containernetworking-plugins-0:1.0.1-7.rhaos4.12.el8.src",
"8Base-RHOSE-4.12:containernetworking-plugins-0:1.0.1-7.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:containernetworking-plugins-debuginfo-0:1.0.1-7.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:containernetworking-plugins-debuginfo-0:1.0.1-7.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:containernetworking-plugins-debuginfo-0:1.0.1-7.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:containernetworking-plugins-debuginfo-0:1.0.1-7.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:containernetworking-plugins-debugsource-0:1.0.1-7.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:containernetworking-plugins-debugsource-0:1.0.1-7.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:containernetworking-plugins-debugsource-0:1.0.1-7.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:containernetworking-plugins-debugsource-0:1.0.1-7.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:kernel-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-0:4.18.0-372.59.1.el8_6.src",
"8Base-RHOSE-4.12:kernel-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-core-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-core-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-core-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-core-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-cross-headers-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-cross-headers-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-cross-headers-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-cross-headers-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-debug-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-debug-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-debug-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-debug-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-debug-core-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-debug-core-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-debug-core-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-debug-core-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-debug-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-debug-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-debug-debuginfo-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-debug-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-debug-devel-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-debug-devel-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-debug-devel-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-debug-devel-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-debug-modules-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-debug-modules-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-debug-modules-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-debug-modules-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-debug-modules-extra-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-debug-modules-extra-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-debug-modules-extra-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-debug-modules-extra-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-debug-modules-internal-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-debug-modules-internal-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-debug-modules-internal-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-debug-modules-internal-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-debuginfo-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-debuginfo-common-aarch64-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-debuginfo-common-ppc64le-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-debuginfo-common-s390x-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-debuginfo-common-x86_64-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-devel-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-devel-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-devel-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-devel-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-doc-0:4.18.0-372.59.1.el8_6.noarch",
"8Base-RHOSE-4.12:kernel-headers-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-headers-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-headers-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-headers-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-ipaclones-internal-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-ipaclones-internal-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-modules-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-modules-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-modules-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-modules-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-modules-extra-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-modules-extra-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-modules-extra-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-modules-extra-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-modules-internal-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-modules-internal-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-modules-internal-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-modules-internal-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-0:4.18.0-372.59.1.rt7.217.el8_6.src",
"8Base-RHOSE-4.12:kernel-rt-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-core-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debug-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debug-core-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debug-debuginfo-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debug-devel-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debug-kvm-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debug-modules-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debug-modules-extra-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debug-modules-internal-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debuginfo-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-devel-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-kvm-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-modules-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-modules-extra-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-modules-internal-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-selftests-internal-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-selftests-internal-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-selftests-internal-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-selftests-internal-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-selftests-internal-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-tools-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-tools-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-tools-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-tools-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-tools-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-tools-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-tools-debuginfo-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-tools-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-tools-libs-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-tools-libs-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-tools-libs-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-tools-libs-devel-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-tools-libs-devel-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-tools-libs-devel-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-zfcpdump-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-zfcpdump-core-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-zfcpdump-debuginfo-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-zfcpdump-devel-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-zfcpdump-modules-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-zfcpdump-modules-extra-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-zfcpdump-modules-internal-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:openshift-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el8.src",
"8Base-RHOSE-4.12:openshift-ansible-0:4.12.0-202306090942.p0.g74dc7b3.assembly.stream.el8.noarch",
"8Base-RHOSE-4.12:openshift-ansible-0:4.12.0-202306090942.p0.g74dc7b3.assembly.stream.el8.src",
"8Base-RHOSE-4.12:openshift-ansible-test-0:4.12.0-202306090942.p0.g74dc7b3.assembly.stream.el8.noarch",
"8Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.aarch64",
"8Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.ppc64le",
"8Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.s390x",
"8Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.src",
"8Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.x86_64",
"8Base-RHOSE-4.12:openshift-clients-redistributable-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.x86_64",
"8Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el8.aarch64",
"8Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el8.ppc64le",
"8Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el8.s390x",
"8Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el8.x86_64",
"8Base-RHOSE-4.12:openshift-kuryr-0:4.12.0-202306140156.p0.g31dd228.assembly.stream.el8.src",
"8Base-RHOSE-4.12:openshift-kuryr-cni-0:4.12.0-202306140156.p0.g31dd228.assembly.stream.el8.noarch",
"8Base-RHOSE-4.12:openshift-kuryr-common-0:4.12.0-202306140156.p0.g31dd228.assembly.stream.el8.noarch",
"8Base-RHOSE-4.12:openshift-kuryr-controller-0:4.12.0-202306140156.p0.g31dd228.assembly.stream.el8.noarch",
"8Base-RHOSE-4.12:openshift4-aws-iso-0:4.12.0-202306090942.p0.gd2acdd5.assembly.stream.el8.noarch",
"8Base-RHOSE-4.12:openshift4-aws-iso-0:4.12.0-202306090942.p0.gd2acdd5.assembly.stream.el8.src",
"8Base-RHOSE-4.12:perf-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:perf-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:perf-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:perf-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:perf-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:perf-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:perf-debuginfo-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:perf-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:podman-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-3:4.2.0-6.1.rhaos4.12.el8.src",
"8Base-RHOSE-4.12:podman-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-catatonit-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-catatonit-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-catatonit-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-catatonit-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-debugsource-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-debugsource-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-debugsource-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-debugsource-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-docker-3:4.2.0-6.1.rhaos4.12.el8.noarch",
"8Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-plugins-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-plugins-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-plugins-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-plugins-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-remote-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-remote-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-remote-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-remote-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-tests-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-tests-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-tests-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-tests-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:python3-kuryr-kubernetes-0:4.12.0-202306140156.p0.g31dd228.assembly.stream.el8.noarch",
"8Base-RHOSE-4.12:python3-perf-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:python3-perf-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:python3-perf-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:python3-perf-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:python3-perf-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:python3-perf-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:python3-perf-debuginfo-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:python3-perf-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:runc-3:1.1.6-4.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:runc-3:1.1.6-4.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:runc-3:1.1.6-4.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:runc-3:1.1.6-4.rhaos4.12.el8.src",
"8Base-RHOSE-4.12:runc-3:1.1.6-4.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:runc-debuginfo-3:1.1.6-4.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:runc-debuginfo-3:1.1.6-4.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:runc-debuginfo-3:1.1.6-4.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:runc-debuginfo-3:1.1.6-4.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:runc-debugsource-3:1.1.6-4.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:runc-debugsource-3:1.1.6-4.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:runc-debugsource-3:1.1.6-4.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:runc-debugsource-3:1.1.6-4.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:skopeo-2:1.9.4-3.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:skopeo-2:1.9.4-3.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:skopeo-2:1.9.4-3.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:skopeo-2:1.9.4-3.1.rhaos4.12.el8.src",
"8Base-RHOSE-4.12:skopeo-2:1.9.4-3.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.1.rhaos4.12.el8.x86_64",
"9Base-RHOSE-4.12:buildah-1:1.23.4-5.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:buildah-1:1.23.4-5.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:buildah-1:1.23.4-5.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:buildah-1:1.23.4-5.rhaos4.12.el9.src",
"9Base-RHOSE-4.12:buildah-1:1.23.4-5.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:conmon-2:2.1.2-5.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:conmon-2:2.1.2-5.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:conmon-2:2.1.2-5.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:conmon-2:2.1.2-5.rhaos4.12.el9.src",
"9Base-RHOSE-4.12:conmon-2:2.1.2-5.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-5.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-5.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-5.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-5.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-5.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-5.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-5.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-5.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:openshift-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el9.src",
"9Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.aarch64",
"9Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.ppc64le",
"9Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.s390x",
"9Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.src",
"9Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.x86_64",
"9Base-RHOSE-4.12:openshift-clients-redistributable-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.x86_64",
"9Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el9.aarch64",
"9Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el9.ppc64le",
"9Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el9.s390x",
"9Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el9.x86_64",
"9Base-RHOSE-4.12:podman-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-3:4.2.0-7.rhaos4.12.el9.src",
"9Base-RHOSE-4.12:podman-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-catatonit-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-catatonit-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-catatonit-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-catatonit-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-debugsource-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-debugsource-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-debugsource-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-debugsource-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-docker-3:4.2.0-7.rhaos4.12.el9.noarch",
"9Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-plugins-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-plugins-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-plugins-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-plugins-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-remote-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-remote-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-remote-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-remote-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-tests-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-tests-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-tests-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-tests-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:skopeo-2:1.9.4-3.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:skopeo-2:1.9.4-3.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:skopeo-2:1.9.4-3.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:skopeo-2:1.9.4-3.rhaos4.12.el9.src",
"9Base-RHOSE-4.12:skopeo-2:1.9.4-3.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.rhaos4.12.el9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "golang: golang.org/x/text/language: ParseAcceptLanguage takes a long time to parse complex tags"
},
{
"cve": "CVE-2022-32190",
"cwe": {
"id": "CWE-22",
"name": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)"
},
"discovery_date": "2022-09-06T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-RHOSE-4.12:bpftool-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:bpftool-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:bpftool-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:bpftool-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:bpftool-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:bpftool-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:bpftool-debuginfo-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:bpftool-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:buildah-1:1.23.4-5.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:buildah-1:1.23.4-5.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:buildah-1:1.23.4-5.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:buildah-1:1.23.4-5.1.rhaos4.12.el8.src",
"8Base-RHOSE-4.12:buildah-1:1.23.4-5.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:conmon-2:2.1.2-4.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:conmon-2:2.1.2-4.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:conmon-2:2.1.2-4.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:conmon-2:2.1.2-4.rhaos4.12.el8.src",
"8Base-RHOSE-4.12:conmon-2:2.1.2-4.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-4.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-4.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-4.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-4.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-4.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-4.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-4.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-4.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:containernetworking-plugins-0:1.0.1-7.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:containernetworking-plugins-0:1.0.1-7.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:containernetworking-plugins-0:1.0.1-7.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:containernetworking-plugins-0:1.0.1-7.rhaos4.12.el8.src",
"8Base-RHOSE-4.12:containernetworking-plugins-0:1.0.1-7.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:containernetworking-plugins-debuginfo-0:1.0.1-7.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:containernetworking-plugins-debuginfo-0:1.0.1-7.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:containernetworking-plugins-debuginfo-0:1.0.1-7.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:containernetworking-plugins-debuginfo-0:1.0.1-7.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:containernetworking-plugins-debugsource-0:1.0.1-7.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:containernetworking-plugins-debugsource-0:1.0.1-7.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:containernetworking-plugins-debugsource-0:1.0.1-7.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:containernetworking-plugins-debugsource-0:1.0.1-7.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:kernel-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-0:4.18.0-372.59.1.el8_6.src",
"8Base-RHOSE-4.12:kernel-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-core-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-core-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-core-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-core-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-cross-headers-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-cross-headers-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-cross-headers-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-cross-headers-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-debug-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-debug-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-debug-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-debug-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-debug-core-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-debug-core-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-debug-core-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-debug-core-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-debug-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-debug-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-debug-debuginfo-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-debug-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-debug-devel-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-debug-devel-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-debug-devel-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-debug-devel-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-debug-modules-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-debug-modules-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-debug-modules-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-debug-modules-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-debug-modules-extra-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-debug-modules-extra-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-debug-modules-extra-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-debug-modules-extra-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-debug-modules-internal-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-debug-modules-internal-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-debug-modules-internal-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-debug-modules-internal-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-debuginfo-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-debuginfo-common-aarch64-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-debuginfo-common-ppc64le-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-debuginfo-common-s390x-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-debuginfo-common-x86_64-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-devel-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-devel-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-devel-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-devel-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-doc-0:4.18.0-372.59.1.el8_6.noarch",
"8Base-RHOSE-4.12:kernel-headers-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-headers-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-headers-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-headers-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-ipaclones-internal-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-ipaclones-internal-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-modules-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-modules-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-modules-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-modules-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-modules-extra-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-modules-extra-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-modules-extra-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-modules-extra-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-modules-internal-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-modules-internal-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-modules-internal-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-modules-internal-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-0:4.18.0-372.59.1.rt7.217.el8_6.src",
"8Base-RHOSE-4.12:kernel-rt-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-core-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debug-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debug-core-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debug-debuginfo-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debug-devel-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debug-kvm-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debug-modules-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debug-modules-extra-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debug-modules-internal-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debuginfo-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-devel-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-kvm-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-modules-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-modules-extra-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-modules-internal-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-selftests-internal-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-selftests-internal-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-selftests-internal-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-selftests-internal-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-selftests-internal-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-tools-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-tools-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-tools-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-tools-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-tools-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-tools-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-tools-debuginfo-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-tools-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-tools-libs-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-tools-libs-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-tools-libs-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-tools-libs-devel-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-tools-libs-devel-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-tools-libs-devel-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-zfcpdump-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-zfcpdump-core-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-zfcpdump-debuginfo-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-zfcpdump-devel-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-zfcpdump-modules-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-zfcpdump-modules-extra-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-zfcpdump-modules-internal-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:openshift-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el8.src",
"8Base-RHOSE-4.12:openshift-ansible-0:4.12.0-202306090942.p0.g74dc7b3.assembly.stream.el8.noarch",
"8Base-RHOSE-4.12:openshift-ansible-0:4.12.0-202306090942.p0.g74dc7b3.assembly.stream.el8.src",
"8Base-RHOSE-4.12:openshift-ansible-test-0:4.12.0-202306090942.p0.g74dc7b3.assembly.stream.el8.noarch",
"8Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.aarch64",
"8Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.ppc64le",
"8Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.s390x",
"8Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.src",
"8Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.x86_64",
"8Base-RHOSE-4.12:openshift-clients-redistributable-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.x86_64",
"8Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el8.aarch64",
"8Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el8.ppc64le",
"8Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el8.s390x",
"8Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el8.x86_64",
"8Base-RHOSE-4.12:openshift-kuryr-0:4.12.0-202306140156.p0.g31dd228.assembly.stream.el8.src",
"8Base-RHOSE-4.12:openshift-kuryr-cni-0:4.12.0-202306140156.p0.g31dd228.assembly.stream.el8.noarch",
"8Base-RHOSE-4.12:openshift-kuryr-common-0:4.12.0-202306140156.p0.g31dd228.assembly.stream.el8.noarch",
"8Base-RHOSE-4.12:openshift-kuryr-controller-0:4.12.0-202306140156.p0.g31dd228.assembly.stream.el8.noarch",
"8Base-RHOSE-4.12:openshift4-aws-iso-0:4.12.0-202306090942.p0.gd2acdd5.assembly.stream.el8.noarch",
"8Base-RHOSE-4.12:openshift4-aws-iso-0:4.12.0-202306090942.p0.gd2acdd5.assembly.stream.el8.src",
"8Base-RHOSE-4.12:perf-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:perf-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:perf-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:perf-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:perf-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:perf-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:perf-debuginfo-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:perf-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:python3-kuryr-kubernetes-0:4.12.0-202306140156.p0.g31dd228.assembly.stream.el8.noarch",
"8Base-RHOSE-4.12:python3-perf-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:python3-perf-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:python3-perf-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:python3-perf-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:python3-perf-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:python3-perf-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:python3-perf-debuginfo-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:python3-perf-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:skopeo-2:1.9.4-3.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:skopeo-2:1.9.4-3.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:skopeo-2:1.9.4-3.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:skopeo-2:1.9.4-3.1.rhaos4.12.el8.src",
"8Base-RHOSE-4.12:skopeo-2:1.9.4-3.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.1.rhaos4.12.el8.x86_64",
"9Base-RHOSE-4.12:buildah-1:1.23.4-5.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:buildah-1:1.23.4-5.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:buildah-1:1.23.4-5.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:buildah-1:1.23.4-5.rhaos4.12.el9.src",
"9Base-RHOSE-4.12:buildah-1:1.23.4-5.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:conmon-2:2.1.2-5.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:conmon-2:2.1.2-5.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:conmon-2:2.1.2-5.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:conmon-2:2.1.2-5.rhaos4.12.el9.src",
"9Base-RHOSE-4.12:conmon-2:2.1.2-5.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-5.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-5.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-5.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-5.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-5.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-5.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-5.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-5.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:openshift-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el9.src",
"9Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.aarch64",
"9Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.ppc64le",
"9Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.s390x",
"9Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.src",
"9Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.x86_64",
"9Base-RHOSE-4.12:openshift-clients-redistributable-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.x86_64",
"9Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el9.aarch64",
"9Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el9.ppc64le",
"9Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el9.s390x",
"9Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el9.x86_64",
"9Base-RHOSE-4.12:skopeo-2:1.9.4-3.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:skopeo-2:1.9.4-3.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:skopeo-2:1.9.4-3.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:skopeo-2:1.9.4-3.rhaos4.12.el9.src",
"9Base-RHOSE-4.12:skopeo-2:1.9.4-3.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.rhaos4.12.el9.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2124668"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the golang package. The JoinPath doesn\u0027t remove the ../ path components appended to a domain that is not terminated by a slash, possibly leading to a directory traversal attack.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: net/url: JoinPath does not strip relative path components in all circumstances",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The vulnerable functions, JoinPath and URL.JoinPath was introduced in upstream go1.19, whereas, RHEL ships go1.17 and go1.18 versions, which does not contain the vulnerable code. Hence, packages shipped with RHEL-8, RHEL-9 are not affected.\n\nAll Y stream releases of OpenShift Container Platform 4 run on RHEL-8 or RHEL-9, so OCP 4 is also not affected.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-RHOSE-4.12:podman-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-3:4.2.0-6.1.rhaos4.12.el8.src",
"8Base-RHOSE-4.12:podman-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-catatonit-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-catatonit-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-catatonit-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-catatonit-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-debugsource-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-debugsource-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-debugsource-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-debugsource-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-docker-3:4.2.0-6.1.rhaos4.12.el8.noarch",
"8Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-plugins-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-plugins-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-plugins-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-plugins-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-remote-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-remote-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-remote-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-remote-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-tests-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-tests-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-tests-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-tests-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:runc-3:1.1.6-4.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:runc-3:1.1.6-4.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:runc-3:1.1.6-4.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:runc-3:1.1.6-4.rhaos4.12.el8.src",
"8Base-RHOSE-4.12:runc-3:1.1.6-4.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:runc-debuginfo-3:1.1.6-4.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:runc-debuginfo-3:1.1.6-4.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:runc-debuginfo-3:1.1.6-4.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:runc-debuginfo-3:1.1.6-4.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:runc-debugsource-3:1.1.6-4.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:runc-debugsource-3:1.1.6-4.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:runc-debugsource-3:1.1.6-4.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:runc-debugsource-3:1.1.6-4.rhaos4.12.el8.x86_64",
"9Base-RHOSE-4.12:podman-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-3:4.2.0-7.rhaos4.12.el9.src",
"9Base-RHOSE-4.12:podman-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-catatonit-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-catatonit-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-catatonit-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-catatonit-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-debugsource-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-debugsource-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-debugsource-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-debugsource-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-docker-3:4.2.0-7.rhaos4.12.el9.noarch",
"9Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-plugins-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-plugins-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-plugins-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-plugins-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-remote-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-remote-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-remote-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-remote-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-tests-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-tests-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-tests-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-tests-3:4.2.0-7.rhaos4.12.el9.x86_64"
],
"known_not_affected": [
"8Base-RHOSE-4.12:bpftool-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:bpftool-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:bpftool-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:bpftool-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:bpftool-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:bpftool-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:bpftool-debuginfo-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:bpftool-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:buildah-1:1.23.4-5.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:buildah-1:1.23.4-5.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:buildah-1:1.23.4-5.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:buildah-1:1.23.4-5.1.rhaos4.12.el8.src",
"8Base-RHOSE-4.12:buildah-1:1.23.4-5.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:conmon-2:2.1.2-4.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:conmon-2:2.1.2-4.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:conmon-2:2.1.2-4.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:conmon-2:2.1.2-4.rhaos4.12.el8.src",
"8Base-RHOSE-4.12:conmon-2:2.1.2-4.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-4.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-4.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-4.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-4.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-4.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-4.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-4.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-4.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:containernetworking-plugins-0:1.0.1-7.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:containernetworking-plugins-0:1.0.1-7.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:containernetworking-plugins-0:1.0.1-7.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:containernetworking-plugins-0:1.0.1-7.rhaos4.12.el8.src",
"8Base-RHOSE-4.12:containernetworking-plugins-0:1.0.1-7.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:containernetworking-plugins-debuginfo-0:1.0.1-7.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:containernetworking-plugins-debuginfo-0:1.0.1-7.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:containernetworking-plugins-debuginfo-0:1.0.1-7.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:containernetworking-plugins-debuginfo-0:1.0.1-7.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:containernetworking-plugins-debugsource-0:1.0.1-7.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:containernetworking-plugins-debugsource-0:1.0.1-7.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:containernetworking-plugins-debugsource-0:1.0.1-7.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:containernetworking-plugins-debugsource-0:1.0.1-7.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:kernel-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-0:4.18.0-372.59.1.el8_6.src",
"8Base-RHOSE-4.12:kernel-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-core-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-core-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-core-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-core-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-cross-headers-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-cross-headers-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-cross-headers-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-cross-headers-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-debug-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-debug-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-debug-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-debug-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-debug-core-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-debug-core-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-debug-core-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-debug-core-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-debug-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-debug-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-debug-debuginfo-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-debug-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-debug-devel-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-debug-devel-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-debug-devel-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-debug-devel-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-debug-modules-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-debug-modules-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-debug-modules-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-debug-modules-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-debug-modules-extra-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-debug-modules-extra-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-debug-modules-extra-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-debug-modules-extra-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-debug-modules-internal-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-debug-modules-internal-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-debug-modules-internal-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-debug-modules-internal-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-debuginfo-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-debuginfo-common-aarch64-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-debuginfo-common-ppc64le-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-debuginfo-common-s390x-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-debuginfo-common-x86_64-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-devel-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-devel-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-devel-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-devel-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-doc-0:4.18.0-372.59.1.el8_6.noarch",
"8Base-RHOSE-4.12:kernel-headers-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-headers-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-headers-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-headers-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-ipaclones-internal-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-ipaclones-internal-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-modules-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-modules-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-modules-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-modules-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-modules-extra-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-modules-extra-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-modules-extra-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-modules-extra-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-modules-internal-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-modules-internal-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-modules-internal-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-modules-internal-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-0:4.18.0-372.59.1.rt7.217.el8_6.src",
"8Base-RHOSE-4.12:kernel-rt-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-core-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debug-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debug-core-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debug-debuginfo-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debug-devel-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debug-kvm-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debug-modules-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debug-modules-extra-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debug-modules-internal-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debuginfo-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-devel-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-kvm-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-modules-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-modules-extra-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-modules-internal-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-selftests-internal-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-selftests-internal-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-selftests-internal-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-selftests-internal-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-selftests-internal-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-tools-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-tools-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-tools-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-tools-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-tools-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-tools-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-tools-debuginfo-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-tools-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-tools-libs-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-tools-libs-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-tools-libs-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-tools-libs-devel-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-tools-libs-devel-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-tools-libs-devel-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-zfcpdump-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-zfcpdump-core-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-zfcpdump-debuginfo-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-zfcpdump-devel-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-zfcpdump-modules-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-zfcpdump-modules-extra-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-zfcpdump-modules-internal-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:openshift-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el8.src",
"8Base-RHOSE-4.12:openshift-ansible-0:4.12.0-202306090942.p0.g74dc7b3.assembly.stream.el8.noarch",
"8Base-RHOSE-4.12:openshift-ansible-0:4.12.0-202306090942.p0.g74dc7b3.assembly.stream.el8.src",
"8Base-RHOSE-4.12:openshift-ansible-test-0:4.12.0-202306090942.p0.g74dc7b3.assembly.stream.el8.noarch",
"8Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.aarch64",
"8Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.ppc64le",
"8Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.s390x",
"8Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.src",
"8Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.x86_64",
"8Base-RHOSE-4.12:openshift-clients-redistributable-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.x86_64",
"8Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el8.aarch64",
"8Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el8.ppc64le",
"8Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el8.s390x",
"8Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el8.x86_64",
"8Base-RHOSE-4.12:openshift-kuryr-0:4.12.0-202306140156.p0.g31dd228.assembly.stream.el8.src",
"8Base-RHOSE-4.12:openshift-kuryr-cni-0:4.12.0-202306140156.p0.g31dd228.assembly.stream.el8.noarch",
"8Base-RHOSE-4.12:openshift-kuryr-common-0:4.12.0-202306140156.p0.g31dd228.assembly.stream.el8.noarch",
"8Base-RHOSE-4.12:openshift-kuryr-controller-0:4.12.0-202306140156.p0.g31dd228.assembly.stream.el8.noarch",
"8Base-RHOSE-4.12:openshift4-aws-iso-0:4.12.0-202306090942.p0.gd2acdd5.assembly.stream.el8.noarch",
"8Base-RHOSE-4.12:openshift4-aws-iso-0:4.12.0-202306090942.p0.gd2acdd5.assembly.stream.el8.src",
"8Base-RHOSE-4.12:perf-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:perf-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:perf-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:perf-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:perf-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:perf-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:perf-debuginfo-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:perf-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:python3-kuryr-kubernetes-0:4.12.0-202306140156.p0.g31dd228.assembly.stream.el8.noarch",
"8Base-RHOSE-4.12:python3-perf-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:python3-perf-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:python3-perf-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:python3-perf-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:python3-perf-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:python3-perf-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:python3-perf-debuginfo-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:python3-perf-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:skopeo-2:1.9.4-3.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:skopeo-2:1.9.4-3.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:skopeo-2:1.9.4-3.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:skopeo-2:1.9.4-3.1.rhaos4.12.el8.src",
"8Base-RHOSE-4.12:skopeo-2:1.9.4-3.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.1.rhaos4.12.el8.x86_64",
"9Base-RHOSE-4.12:buildah-1:1.23.4-5.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:buildah-1:1.23.4-5.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:buildah-1:1.23.4-5.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:buildah-1:1.23.4-5.rhaos4.12.el9.src",
"9Base-RHOSE-4.12:buildah-1:1.23.4-5.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:conmon-2:2.1.2-5.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:conmon-2:2.1.2-5.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:conmon-2:2.1.2-5.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:conmon-2:2.1.2-5.rhaos4.12.el9.src",
"9Base-RHOSE-4.12:conmon-2:2.1.2-5.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-5.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-5.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-5.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-5.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-5.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-5.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-5.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-5.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:openshift-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el9.src",
"9Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.aarch64",
"9Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.ppc64le",
"9Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.s390x",
"9Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.src",
"9Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.x86_64",
"9Base-RHOSE-4.12:openshift-clients-redistributable-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.x86_64",
"9Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el9.aarch64",
"9Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el9.ppc64le",
"9Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el9.s390x",
"9Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el9.x86_64",
"9Base-RHOSE-4.12:skopeo-2:1.9.4-3.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:skopeo-2:1.9.4-3.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:skopeo-2:1.9.4-3.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:skopeo-2:1.9.4-3.rhaos4.12.el9.src",
"9Base-RHOSE-4.12:skopeo-2:1.9.4-3.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.rhaos4.12.el9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-32190"
},
{
"category": "external",
"summary": "RHBZ#2124668",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2124668"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-32190",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32190"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-32190",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-32190"
},
{
"category": "external",
"summary": "https://go.dev/issue/54385",
"url": "https://go.dev/issue/54385"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/x49AQzIVX-s/m/0tgO0pjiBQAJ",
"url": "https://groups.google.com/g/golang-announce/c/x49AQzIVX-s/m/0tgO0pjiBQAJ"
}
],
"release_date": "2022-09-06T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-06-26T01:19:15+00:00",
"details": "For OpenShift Container Platform 4.12 see the following documentation, which will be updated shortly for this release, for important instructions on how to upgrade your cluster and fully apply this asynchronous errata update:\n\nhttps://docs.openshift.com/container-platform/4.12/release_notes/ocp-4-12-release-notes.html",
"product_ids": [
"8Base-RHOSE-4.12:podman-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-3:4.2.0-6.1.rhaos4.12.el8.src",
"8Base-RHOSE-4.12:podman-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-catatonit-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-catatonit-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-catatonit-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-catatonit-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-debugsource-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-debugsource-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-debugsource-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-debugsource-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-docker-3:4.2.0-6.1.rhaos4.12.el8.noarch",
"8Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-plugins-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-plugins-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-plugins-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-plugins-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-remote-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-remote-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-remote-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-remote-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-tests-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-tests-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-tests-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-tests-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:runc-3:1.1.6-4.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:runc-3:1.1.6-4.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:runc-3:1.1.6-4.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:runc-3:1.1.6-4.rhaos4.12.el8.src",
"8Base-RHOSE-4.12:runc-3:1.1.6-4.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:runc-debuginfo-3:1.1.6-4.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:runc-debuginfo-3:1.1.6-4.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:runc-debuginfo-3:1.1.6-4.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:runc-debuginfo-3:1.1.6-4.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:runc-debugsource-3:1.1.6-4.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:runc-debugsource-3:1.1.6-4.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:runc-debugsource-3:1.1.6-4.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:runc-debugsource-3:1.1.6-4.rhaos4.12.el8.x86_64",
"9Base-RHOSE-4.12:podman-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-3:4.2.0-7.rhaos4.12.el9.src",
"9Base-RHOSE-4.12:podman-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-catatonit-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-catatonit-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-catatonit-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-catatonit-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-debugsource-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-debugsource-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-debugsource-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-debugsource-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-docker-3:4.2.0-7.rhaos4.12.el9.noarch",
"9Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-plugins-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-plugins-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-plugins-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-plugins-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-remote-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-remote-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-remote-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-remote-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-tests-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-tests-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-tests-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-tests-3:4.2.0-7.rhaos4.12.el9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:3613"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"8Base-RHOSE-4.12:bpftool-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:bpftool-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:bpftool-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:bpftool-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:bpftool-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:bpftool-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:bpftool-debuginfo-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:bpftool-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:buildah-1:1.23.4-5.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:buildah-1:1.23.4-5.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:buildah-1:1.23.4-5.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:buildah-1:1.23.4-5.1.rhaos4.12.el8.src",
"8Base-RHOSE-4.12:buildah-1:1.23.4-5.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:conmon-2:2.1.2-4.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:conmon-2:2.1.2-4.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:conmon-2:2.1.2-4.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:conmon-2:2.1.2-4.rhaos4.12.el8.src",
"8Base-RHOSE-4.12:conmon-2:2.1.2-4.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-4.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-4.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-4.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-4.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-4.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-4.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-4.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-4.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:containernetworking-plugins-0:1.0.1-7.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:containernetworking-plugins-0:1.0.1-7.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:containernetworking-plugins-0:1.0.1-7.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:containernetworking-plugins-0:1.0.1-7.rhaos4.12.el8.src",
"8Base-RHOSE-4.12:containernetworking-plugins-0:1.0.1-7.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:containernetworking-plugins-debuginfo-0:1.0.1-7.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:containernetworking-plugins-debuginfo-0:1.0.1-7.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:containernetworking-plugins-debuginfo-0:1.0.1-7.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:containernetworking-plugins-debuginfo-0:1.0.1-7.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:containernetworking-plugins-debugsource-0:1.0.1-7.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:containernetworking-plugins-debugsource-0:1.0.1-7.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:containernetworking-plugins-debugsource-0:1.0.1-7.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:containernetworking-plugins-debugsource-0:1.0.1-7.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:kernel-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-0:4.18.0-372.59.1.el8_6.src",
"8Base-RHOSE-4.12:kernel-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-core-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-core-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-core-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-core-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-cross-headers-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-cross-headers-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-cross-headers-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-cross-headers-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-debug-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-debug-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-debug-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-debug-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-debug-core-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-debug-core-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-debug-core-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-debug-core-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-debug-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-debug-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-debug-debuginfo-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-debug-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-debug-devel-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-debug-devel-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-debug-devel-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-debug-devel-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-debug-modules-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-debug-modules-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-debug-modules-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-debug-modules-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-debug-modules-extra-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-debug-modules-extra-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-debug-modules-extra-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-debug-modules-extra-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-debug-modules-internal-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-debug-modules-internal-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-debug-modules-internal-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-debug-modules-internal-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-debuginfo-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-debuginfo-common-aarch64-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-debuginfo-common-ppc64le-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-debuginfo-common-s390x-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-debuginfo-common-x86_64-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-devel-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-devel-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-devel-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-devel-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-doc-0:4.18.0-372.59.1.el8_6.noarch",
"8Base-RHOSE-4.12:kernel-headers-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-headers-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-headers-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-headers-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-ipaclones-internal-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-ipaclones-internal-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-modules-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-modules-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-modules-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-modules-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-modules-extra-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-modules-extra-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-modules-extra-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-modules-extra-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-modules-internal-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-modules-internal-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-modules-internal-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-modules-internal-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-0:4.18.0-372.59.1.rt7.217.el8_6.src",
"8Base-RHOSE-4.12:kernel-rt-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-core-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debug-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debug-core-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debug-debuginfo-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debug-devel-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debug-kvm-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debug-modules-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debug-modules-extra-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debug-modules-internal-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debuginfo-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-devel-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-kvm-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-modules-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-modules-extra-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-modules-internal-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-selftests-internal-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-selftests-internal-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-selftests-internal-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-selftests-internal-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-selftests-internal-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-tools-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-tools-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-tools-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-tools-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-tools-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-tools-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-tools-debuginfo-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-tools-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-tools-libs-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-tools-libs-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-tools-libs-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-tools-libs-devel-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-tools-libs-devel-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-tools-libs-devel-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-zfcpdump-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-zfcpdump-core-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-zfcpdump-debuginfo-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-zfcpdump-devel-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-zfcpdump-modules-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-zfcpdump-modules-extra-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-zfcpdump-modules-internal-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:openshift-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el8.src",
"8Base-RHOSE-4.12:openshift-ansible-0:4.12.0-202306090942.p0.g74dc7b3.assembly.stream.el8.noarch",
"8Base-RHOSE-4.12:openshift-ansible-0:4.12.0-202306090942.p0.g74dc7b3.assembly.stream.el8.src",
"8Base-RHOSE-4.12:openshift-ansible-test-0:4.12.0-202306090942.p0.g74dc7b3.assembly.stream.el8.noarch",
"8Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.aarch64",
"8Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.ppc64le",
"8Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.s390x",
"8Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.src",
"8Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.x86_64",
"8Base-RHOSE-4.12:openshift-clients-redistributable-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.x86_64",
"8Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el8.aarch64",
"8Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el8.ppc64le",
"8Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el8.s390x",
"8Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el8.x86_64",
"8Base-RHOSE-4.12:openshift-kuryr-0:4.12.0-202306140156.p0.g31dd228.assembly.stream.el8.src",
"8Base-RHOSE-4.12:openshift-kuryr-cni-0:4.12.0-202306140156.p0.g31dd228.assembly.stream.el8.noarch",
"8Base-RHOSE-4.12:openshift-kuryr-common-0:4.12.0-202306140156.p0.g31dd228.assembly.stream.el8.noarch",
"8Base-RHOSE-4.12:openshift-kuryr-controller-0:4.12.0-202306140156.p0.g31dd228.assembly.stream.el8.noarch",
"8Base-RHOSE-4.12:openshift4-aws-iso-0:4.12.0-202306090942.p0.gd2acdd5.assembly.stream.el8.noarch",
"8Base-RHOSE-4.12:openshift4-aws-iso-0:4.12.0-202306090942.p0.gd2acdd5.assembly.stream.el8.src",
"8Base-RHOSE-4.12:perf-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:perf-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:perf-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:perf-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:perf-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:perf-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:perf-debuginfo-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:perf-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:podman-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-3:4.2.0-6.1.rhaos4.12.el8.src",
"8Base-RHOSE-4.12:podman-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-catatonit-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-catatonit-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-catatonit-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-catatonit-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-debugsource-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-debugsource-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-debugsource-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-debugsource-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-docker-3:4.2.0-6.1.rhaos4.12.el8.noarch",
"8Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-plugins-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-plugins-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-plugins-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-plugins-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-remote-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-remote-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-remote-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-remote-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-tests-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-tests-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-tests-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-tests-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:python3-kuryr-kubernetes-0:4.12.0-202306140156.p0.g31dd228.assembly.stream.el8.noarch",
"8Base-RHOSE-4.12:python3-perf-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:python3-perf-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:python3-perf-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:python3-perf-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:python3-perf-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:python3-perf-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:python3-perf-debuginfo-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:python3-perf-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:runc-3:1.1.6-4.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:runc-3:1.1.6-4.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:runc-3:1.1.6-4.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:runc-3:1.1.6-4.rhaos4.12.el8.src",
"8Base-RHOSE-4.12:runc-3:1.1.6-4.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:runc-debuginfo-3:1.1.6-4.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:runc-debuginfo-3:1.1.6-4.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:runc-debuginfo-3:1.1.6-4.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:runc-debuginfo-3:1.1.6-4.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:runc-debugsource-3:1.1.6-4.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:runc-debugsource-3:1.1.6-4.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:runc-debugsource-3:1.1.6-4.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:runc-debugsource-3:1.1.6-4.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:skopeo-2:1.9.4-3.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:skopeo-2:1.9.4-3.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:skopeo-2:1.9.4-3.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:skopeo-2:1.9.4-3.1.rhaos4.12.el8.src",
"8Base-RHOSE-4.12:skopeo-2:1.9.4-3.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.1.rhaos4.12.el8.x86_64",
"9Base-RHOSE-4.12:buildah-1:1.23.4-5.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:buildah-1:1.23.4-5.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:buildah-1:1.23.4-5.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:buildah-1:1.23.4-5.rhaos4.12.el9.src",
"9Base-RHOSE-4.12:buildah-1:1.23.4-5.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:conmon-2:2.1.2-5.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:conmon-2:2.1.2-5.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:conmon-2:2.1.2-5.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:conmon-2:2.1.2-5.rhaos4.12.el9.src",
"9Base-RHOSE-4.12:conmon-2:2.1.2-5.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-5.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-5.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-5.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-5.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-5.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-5.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-5.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-5.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:openshift-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el9.src",
"9Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.aarch64",
"9Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.ppc64le",
"9Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.s390x",
"9Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.src",
"9Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.x86_64",
"9Base-RHOSE-4.12:openshift-clients-redistributable-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.x86_64",
"9Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el9.aarch64",
"9Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el9.ppc64le",
"9Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el9.s390x",
"9Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el9.x86_64",
"9Base-RHOSE-4.12:podman-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-3:4.2.0-7.rhaos4.12.el9.src",
"9Base-RHOSE-4.12:podman-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-catatonit-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-catatonit-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-catatonit-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-catatonit-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-debugsource-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-debugsource-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-debugsource-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-debugsource-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-docker-3:4.2.0-7.rhaos4.12.el9.noarch",
"9Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-plugins-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-plugins-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-plugins-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-plugins-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-remote-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-remote-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-remote-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-remote-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-tests-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-tests-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-tests-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-tests-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:skopeo-2:1.9.4-3.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:skopeo-2:1.9.4-3.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:skopeo-2:1.9.4-3.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:skopeo-2:1.9.4-3.rhaos4.12.el9.src",
"9Base-RHOSE-4.12:skopeo-2:1.9.4-3.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.rhaos4.12.el9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "golang: net/url: JoinPath does not strip relative path components in all circumstances"
},
{
"acknowledgments": [
{
"names": [
"Adam Korczynski"
],
"organization": "ADA Logics"
},
{
"names": [
"OSS-Fuzz"
]
}
],
"cve": "CVE-2022-41715",
"discovery_date": "2022-10-07T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-RHOSE-4.12:bpftool-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:bpftool-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:bpftool-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:bpftool-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:bpftool-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:bpftool-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:bpftool-debuginfo-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:bpftool-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:buildah-1:1.23.4-5.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:buildah-1:1.23.4-5.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:buildah-1:1.23.4-5.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:buildah-1:1.23.4-5.1.rhaos4.12.el8.src",
"8Base-RHOSE-4.12:buildah-1:1.23.4-5.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:containernetworking-plugins-0:1.0.1-7.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:containernetworking-plugins-0:1.0.1-7.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:containernetworking-plugins-0:1.0.1-7.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:containernetworking-plugins-0:1.0.1-7.rhaos4.12.el8.src",
"8Base-RHOSE-4.12:containernetworking-plugins-0:1.0.1-7.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:containernetworking-plugins-debuginfo-0:1.0.1-7.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:containernetworking-plugins-debuginfo-0:1.0.1-7.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:containernetworking-plugins-debuginfo-0:1.0.1-7.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:containernetworking-plugins-debuginfo-0:1.0.1-7.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:containernetworking-plugins-debugsource-0:1.0.1-7.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:containernetworking-plugins-debugsource-0:1.0.1-7.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:containernetworking-plugins-debugsource-0:1.0.1-7.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:containernetworking-plugins-debugsource-0:1.0.1-7.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:kernel-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-0:4.18.0-372.59.1.el8_6.src",
"8Base-RHOSE-4.12:kernel-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-core-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-core-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-core-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-core-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-cross-headers-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-cross-headers-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-cross-headers-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-cross-headers-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-debug-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-debug-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-debug-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-debug-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-debug-core-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-debug-core-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-debug-core-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-debug-core-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-debug-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-debug-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-debug-debuginfo-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-debug-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-debug-devel-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-debug-devel-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-debug-devel-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-debug-devel-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-debug-modules-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-debug-modules-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-debug-modules-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-debug-modules-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-debug-modules-extra-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-debug-modules-extra-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-debug-modules-extra-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-debug-modules-extra-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-debug-modules-internal-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-debug-modules-internal-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-debug-modules-internal-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-debug-modules-internal-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-debuginfo-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-debuginfo-common-aarch64-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-debuginfo-common-ppc64le-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-debuginfo-common-s390x-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-debuginfo-common-x86_64-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-devel-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-devel-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-devel-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-devel-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-doc-0:4.18.0-372.59.1.el8_6.noarch",
"8Base-RHOSE-4.12:kernel-headers-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-headers-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-headers-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-headers-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-ipaclones-internal-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-ipaclones-internal-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-modules-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-modules-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-modules-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-modules-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-modules-extra-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-modules-extra-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-modules-extra-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-modules-extra-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-modules-internal-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-modules-internal-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-modules-internal-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-modules-internal-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-0:4.18.0-372.59.1.rt7.217.el8_6.src",
"8Base-RHOSE-4.12:kernel-rt-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-core-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debug-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debug-core-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debug-debuginfo-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debug-devel-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debug-kvm-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debug-modules-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debug-modules-extra-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debug-modules-internal-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debuginfo-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-devel-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-kvm-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-modules-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-modules-extra-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-modules-internal-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-selftests-internal-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-selftests-internal-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-selftests-internal-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-selftests-internal-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-selftests-internal-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-tools-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-tools-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-tools-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-tools-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-tools-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-tools-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-tools-debuginfo-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-tools-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-tools-libs-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-tools-libs-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-tools-libs-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-tools-libs-devel-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-tools-libs-devel-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-tools-libs-devel-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-zfcpdump-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-zfcpdump-core-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-zfcpdump-debuginfo-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-zfcpdump-devel-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-zfcpdump-modules-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-zfcpdump-modules-extra-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-zfcpdump-modules-internal-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:openshift-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el8.src",
"8Base-RHOSE-4.12:openshift-ansible-0:4.12.0-202306090942.p0.g74dc7b3.assembly.stream.el8.noarch",
"8Base-RHOSE-4.12:openshift-ansible-0:4.12.0-202306090942.p0.g74dc7b3.assembly.stream.el8.src",
"8Base-RHOSE-4.12:openshift-ansible-test-0:4.12.0-202306090942.p0.g74dc7b3.assembly.stream.el8.noarch",
"8Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.aarch64",
"8Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.ppc64le",
"8Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.s390x",
"8Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.src",
"8Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.x86_64",
"8Base-RHOSE-4.12:openshift-clients-redistributable-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.x86_64",
"8Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el8.aarch64",
"8Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el8.ppc64le",
"8Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el8.s390x",
"8Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el8.x86_64",
"8Base-RHOSE-4.12:openshift-kuryr-0:4.12.0-202306140156.p0.g31dd228.assembly.stream.el8.src",
"8Base-RHOSE-4.12:openshift-kuryr-cni-0:4.12.0-202306140156.p0.g31dd228.assembly.stream.el8.noarch",
"8Base-RHOSE-4.12:openshift-kuryr-common-0:4.12.0-202306140156.p0.g31dd228.assembly.stream.el8.noarch",
"8Base-RHOSE-4.12:openshift-kuryr-controller-0:4.12.0-202306140156.p0.g31dd228.assembly.stream.el8.noarch",
"8Base-RHOSE-4.12:openshift4-aws-iso-0:4.12.0-202306090942.p0.gd2acdd5.assembly.stream.el8.noarch",
"8Base-RHOSE-4.12:openshift4-aws-iso-0:4.12.0-202306090942.p0.gd2acdd5.assembly.stream.el8.src",
"8Base-RHOSE-4.12:perf-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:perf-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:perf-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:perf-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:perf-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:perf-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:perf-debuginfo-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:perf-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:python3-kuryr-kubernetes-0:4.12.0-202306140156.p0.g31dd228.assembly.stream.el8.noarch",
"8Base-RHOSE-4.12:python3-perf-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:python3-perf-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:python3-perf-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:python3-perf-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:python3-perf-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:python3-perf-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:python3-perf-debuginfo-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:python3-perf-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64",
"9Base-RHOSE-4.12:buildah-1:1.23.4-5.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:buildah-1:1.23.4-5.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:buildah-1:1.23.4-5.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:buildah-1:1.23.4-5.rhaos4.12.el9.src",
"9Base-RHOSE-4.12:buildah-1:1.23.4-5.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:openshift-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el9.src",
"9Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.aarch64",
"9Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.ppc64le",
"9Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.s390x",
"9Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.src",
"9Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.x86_64",
"9Base-RHOSE-4.12:openshift-clients-redistributable-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.x86_64",
"9Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el9.aarch64",
"9Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el9.ppc64le",
"9Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el9.s390x",
"9Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el9.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2132872"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the golang package, where programs that compile regular expressions from untrusted sources are vulnerable to memory exhaustion or a denial of service. The parsed regexp representation is linear in the input size. Still, in some cases, the constant factor can be as high as 40,000, making a relatively small regexp consume larger amounts of memory. After the fix, each regexp being parsed is limited to a 256 MB memory footprint. Regular expressions whose representation would use more space than that are rejected. Routine use of regular expressions is unaffected.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: regexp/syntax: limit memory used by parsing regexps",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The opportunity for a Denial of Service is limited to the golang runtime. In the case of OpenShift Container Platform, this would be restricted within each individual container. There are multiple layers of guide rails (Golang\u2019s Garbage Collector; OpenShift\u2019s resource constraints imposed at the container and cluster levels) which would require a malicious user to continue submitting attacks for there to be any enduring impact. They would also need access to external server resources to be able to send a massive volume of requests to cause a significant impact on server operations.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-RHOSE-4.12:conmon-2:2.1.2-4.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:conmon-2:2.1.2-4.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:conmon-2:2.1.2-4.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:conmon-2:2.1.2-4.rhaos4.12.el8.src",
"8Base-RHOSE-4.12:conmon-2:2.1.2-4.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-4.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-4.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-4.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-4.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-4.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-4.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-4.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-4.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-3:4.2.0-6.1.rhaos4.12.el8.src",
"8Base-RHOSE-4.12:podman-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-catatonit-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-catatonit-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-catatonit-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-catatonit-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-debugsource-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-debugsource-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-debugsource-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-debugsource-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-docker-3:4.2.0-6.1.rhaos4.12.el8.noarch",
"8Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-plugins-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-plugins-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-plugins-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-plugins-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-remote-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-remote-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-remote-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-remote-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-tests-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-tests-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-tests-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-tests-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:runc-3:1.1.6-4.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:runc-3:1.1.6-4.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:runc-3:1.1.6-4.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:runc-3:1.1.6-4.rhaos4.12.el8.src",
"8Base-RHOSE-4.12:runc-3:1.1.6-4.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:runc-debuginfo-3:1.1.6-4.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:runc-debuginfo-3:1.1.6-4.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:runc-debuginfo-3:1.1.6-4.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:runc-debuginfo-3:1.1.6-4.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:runc-debugsource-3:1.1.6-4.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:runc-debugsource-3:1.1.6-4.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:runc-debugsource-3:1.1.6-4.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:runc-debugsource-3:1.1.6-4.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:skopeo-2:1.9.4-3.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:skopeo-2:1.9.4-3.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:skopeo-2:1.9.4-3.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:skopeo-2:1.9.4-3.1.rhaos4.12.el8.src",
"8Base-RHOSE-4.12:skopeo-2:1.9.4-3.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.1.rhaos4.12.el8.x86_64",
"9Base-RHOSE-4.12:conmon-2:2.1.2-5.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:conmon-2:2.1.2-5.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:conmon-2:2.1.2-5.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:conmon-2:2.1.2-5.rhaos4.12.el9.src",
"9Base-RHOSE-4.12:conmon-2:2.1.2-5.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-5.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-5.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-5.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-5.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-5.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-5.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-5.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-5.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-3:4.2.0-7.rhaos4.12.el9.src",
"9Base-RHOSE-4.12:podman-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-catatonit-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-catatonit-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-catatonit-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-catatonit-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-debugsource-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-debugsource-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-debugsource-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-debugsource-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-docker-3:4.2.0-7.rhaos4.12.el9.noarch",
"9Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-plugins-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-plugins-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-plugins-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-plugins-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-remote-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-remote-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-remote-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-remote-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-tests-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-tests-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-tests-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-tests-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:skopeo-2:1.9.4-3.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:skopeo-2:1.9.4-3.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:skopeo-2:1.9.4-3.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:skopeo-2:1.9.4-3.rhaos4.12.el9.src",
"9Base-RHOSE-4.12:skopeo-2:1.9.4-3.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.rhaos4.12.el9.x86_64"
],
"known_not_affected": [
"8Base-RHOSE-4.12:bpftool-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:bpftool-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:bpftool-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:bpftool-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:bpftool-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:bpftool-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:bpftool-debuginfo-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:bpftool-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:buildah-1:1.23.4-5.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:buildah-1:1.23.4-5.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:buildah-1:1.23.4-5.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:buildah-1:1.23.4-5.1.rhaos4.12.el8.src",
"8Base-RHOSE-4.12:buildah-1:1.23.4-5.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:containernetworking-plugins-0:1.0.1-7.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:containernetworking-plugins-0:1.0.1-7.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:containernetworking-plugins-0:1.0.1-7.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:containernetworking-plugins-0:1.0.1-7.rhaos4.12.el8.src",
"8Base-RHOSE-4.12:containernetworking-plugins-0:1.0.1-7.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:containernetworking-plugins-debuginfo-0:1.0.1-7.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:containernetworking-plugins-debuginfo-0:1.0.1-7.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:containernetworking-plugins-debuginfo-0:1.0.1-7.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:containernetworking-plugins-debuginfo-0:1.0.1-7.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:containernetworking-plugins-debugsource-0:1.0.1-7.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:containernetworking-plugins-debugsource-0:1.0.1-7.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:containernetworking-plugins-debugsource-0:1.0.1-7.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:containernetworking-plugins-debugsource-0:1.0.1-7.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:kernel-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-0:4.18.0-372.59.1.el8_6.src",
"8Base-RHOSE-4.12:kernel-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-core-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-core-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-core-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-core-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-cross-headers-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-cross-headers-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-cross-headers-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-cross-headers-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-debug-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-debug-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-debug-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-debug-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-debug-core-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-debug-core-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-debug-core-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-debug-core-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-debug-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-debug-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-debug-debuginfo-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-debug-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-debug-devel-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-debug-devel-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-debug-devel-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-debug-devel-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-debug-modules-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-debug-modules-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-debug-modules-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-debug-modules-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-debug-modules-extra-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-debug-modules-extra-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-debug-modules-extra-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-debug-modules-extra-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-debug-modules-internal-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-debug-modules-internal-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-debug-modules-internal-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-debug-modules-internal-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-debuginfo-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-debuginfo-common-aarch64-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-debuginfo-common-ppc64le-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-debuginfo-common-s390x-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-debuginfo-common-x86_64-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-devel-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-devel-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-devel-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-devel-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-doc-0:4.18.0-372.59.1.el8_6.noarch",
"8Base-RHOSE-4.12:kernel-headers-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-headers-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-headers-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-headers-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-ipaclones-internal-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-ipaclones-internal-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-modules-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-modules-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-modules-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-modules-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-modules-extra-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-modules-extra-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-modules-extra-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-modules-extra-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-modules-internal-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-modules-internal-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-modules-internal-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-modules-internal-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-0:4.18.0-372.59.1.rt7.217.el8_6.src",
"8Base-RHOSE-4.12:kernel-rt-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-core-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debug-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debug-core-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debug-debuginfo-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debug-devel-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debug-kvm-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debug-modules-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debug-modules-extra-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debug-modules-internal-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debuginfo-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-devel-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-kvm-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-modules-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-modules-extra-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-modules-internal-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-selftests-internal-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-selftests-internal-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-selftests-internal-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-selftests-internal-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-selftests-internal-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-tools-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-tools-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-tools-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-tools-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-tools-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-tools-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-tools-debuginfo-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-tools-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-tools-libs-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-tools-libs-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-tools-libs-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-tools-libs-devel-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-tools-libs-devel-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-tools-libs-devel-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-zfcpdump-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-zfcpdump-core-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-zfcpdump-debuginfo-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-zfcpdump-devel-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-zfcpdump-modules-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-zfcpdump-modules-extra-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-zfcpdump-modules-internal-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:openshift-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el8.src",
"8Base-RHOSE-4.12:openshift-ansible-0:4.12.0-202306090942.p0.g74dc7b3.assembly.stream.el8.noarch",
"8Base-RHOSE-4.12:openshift-ansible-0:4.12.0-202306090942.p0.g74dc7b3.assembly.stream.el8.src",
"8Base-RHOSE-4.12:openshift-ansible-test-0:4.12.0-202306090942.p0.g74dc7b3.assembly.stream.el8.noarch",
"8Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.aarch64",
"8Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.ppc64le",
"8Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.s390x",
"8Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.src",
"8Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.x86_64",
"8Base-RHOSE-4.12:openshift-clients-redistributable-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.x86_64",
"8Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el8.aarch64",
"8Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el8.ppc64le",
"8Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el8.s390x",
"8Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el8.x86_64",
"8Base-RHOSE-4.12:openshift-kuryr-0:4.12.0-202306140156.p0.g31dd228.assembly.stream.el8.src",
"8Base-RHOSE-4.12:openshift-kuryr-cni-0:4.12.0-202306140156.p0.g31dd228.assembly.stream.el8.noarch",
"8Base-RHOSE-4.12:openshift-kuryr-common-0:4.12.0-202306140156.p0.g31dd228.assembly.stream.el8.noarch",
"8Base-RHOSE-4.12:openshift-kuryr-controller-0:4.12.0-202306140156.p0.g31dd228.assembly.stream.el8.noarch",
"8Base-RHOSE-4.12:openshift4-aws-iso-0:4.12.0-202306090942.p0.gd2acdd5.assembly.stream.el8.noarch",
"8Base-RHOSE-4.12:openshift4-aws-iso-0:4.12.0-202306090942.p0.gd2acdd5.assembly.stream.el8.src",
"8Base-RHOSE-4.12:perf-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:perf-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:perf-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:perf-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:perf-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:perf-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:perf-debuginfo-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:perf-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:python3-kuryr-kubernetes-0:4.12.0-202306140156.p0.g31dd228.assembly.stream.el8.noarch",
"8Base-RHOSE-4.12:python3-perf-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:python3-perf-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:python3-perf-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:python3-perf-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:python3-perf-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:python3-perf-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:python3-perf-debuginfo-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:python3-perf-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64",
"9Base-RHOSE-4.12:buildah-1:1.23.4-5.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:buildah-1:1.23.4-5.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:buildah-1:1.23.4-5.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:buildah-1:1.23.4-5.rhaos4.12.el9.src",
"9Base-RHOSE-4.12:buildah-1:1.23.4-5.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:openshift-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el9.src",
"9Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.aarch64",
"9Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.ppc64le",
"9Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.s390x",
"9Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.src",
"9Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.x86_64",
"9Base-RHOSE-4.12:openshift-clients-redistributable-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.x86_64",
"9Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el9.aarch64",
"9Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el9.ppc64le",
"9Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el9.s390x",
"9Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-41715"
},
{
"category": "external",
"summary": "RHBZ#2132872",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2132872"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-41715",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41715"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-41715",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-41715"
},
{
"category": "external",
"summary": "https://github.com/golang/go/issues/55949",
"url": "https://github.com/golang/go/issues/55949"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/xtuG5faxtaU?pli=1",
"url": "https://groups.google.com/g/golang-announce/c/xtuG5faxtaU?pli=1"
}
],
"release_date": "2022-10-04T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-06-26T01:19:15+00:00",
"details": "For OpenShift Container Platform 4.12 see the following documentation, which will be updated shortly for this release, for important instructions on how to upgrade your cluster and fully apply this asynchronous errata update:\n\nhttps://docs.openshift.com/container-platform/4.12/release_notes/ocp-4-12-release-notes.html",
"product_ids": [
"8Base-RHOSE-4.12:conmon-2:2.1.2-4.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:conmon-2:2.1.2-4.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:conmon-2:2.1.2-4.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:conmon-2:2.1.2-4.rhaos4.12.el8.src",
"8Base-RHOSE-4.12:conmon-2:2.1.2-4.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-4.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-4.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-4.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-4.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-4.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-4.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-4.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-4.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-3:4.2.0-6.1.rhaos4.12.el8.src",
"8Base-RHOSE-4.12:podman-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-catatonit-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-catatonit-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-catatonit-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-catatonit-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-debugsource-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-debugsource-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-debugsource-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-debugsource-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-docker-3:4.2.0-6.1.rhaos4.12.el8.noarch",
"8Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-plugins-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-plugins-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-plugins-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-plugins-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-remote-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-remote-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-remote-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-remote-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-tests-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-tests-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-tests-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-tests-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:runc-3:1.1.6-4.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:runc-3:1.1.6-4.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:runc-3:1.1.6-4.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:runc-3:1.1.6-4.rhaos4.12.el8.src",
"8Base-RHOSE-4.12:runc-3:1.1.6-4.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:runc-debuginfo-3:1.1.6-4.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:runc-debuginfo-3:1.1.6-4.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:runc-debuginfo-3:1.1.6-4.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:runc-debuginfo-3:1.1.6-4.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:runc-debugsource-3:1.1.6-4.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:runc-debugsource-3:1.1.6-4.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:runc-debugsource-3:1.1.6-4.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:runc-debugsource-3:1.1.6-4.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:skopeo-2:1.9.4-3.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:skopeo-2:1.9.4-3.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:skopeo-2:1.9.4-3.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:skopeo-2:1.9.4-3.1.rhaos4.12.el8.src",
"8Base-RHOSE-4.12:skopeo-2:1.9.4-3.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.1.rhaos4.12.el8.x86_64",
"9Base-RHOSE-4.12:conmon-2:2.1.2-5.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:conmon-2:2.1.2-5.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:conmon-2:2.1.2-5.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:conmon-2:2.1.2-5.rhaos4.12.el9.src",
"9Base-RHOSE-4.12:conmon-2:2.1.2-5.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-5.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-5.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-5.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-5.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-5.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-5.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-5.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-5.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-3:4.2.0-7.rhaos4.12.el9.src",
"9Base-RHOSE-4.12:podman-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-catatonit-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-catatonit-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-catatonit-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-catatonit-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-debugsource-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-debugsource-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-debugsource-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-debugsource-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-docker-3:4.2.0-7.rhaos4.12.el9.noarch",
"9Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-plugins-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-plugins-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-plugins-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-plugins-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-remote-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-remote-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-remote-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-remote-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-tests-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-tests-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-tests-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-tests-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:skopeo-2:1.9.4-3.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:skopeo-2:1.9.4-3.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:skopeo-2:1.9.4-3.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:skopeo-2:1.9.4-3.rhaos4.12.el9.src",
"9Base-RHOSE-4.12:skopeo-2:1.9.4-3.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.rhaos4.12.el9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:3613"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"8Base-RHOSE-4.12:bpftool-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:bpftool-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:bpftool-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:bpftool-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:bpftool-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:bpftool-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:bpftool-debuginfo-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:bpftool-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:buildah-1:1.23.4-5.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:buildah-1:1.23.4-5.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:buildah-1:1.23.4-5.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:buildah-1:1.23.4-5.1.rhaos4.12.el8.src",
"8Base-RHOSE-4.12:buildah-1:1.23.4-5.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:conmon-2:2.1.2-4.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:conmon-2:2.1.2-4.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:conmon-2:2.1.2-4.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:conmon-2:2.1.2-4.rhaos4.12.el8.src",
"8Base-RHOSE-4.12:conmon-2:2.1.2-4.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-4.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-4.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-4.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-4.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-4.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-4.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-4.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-4.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:containernetworking-plugins-0:1.0.1-7.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:containernetworking-plugins-0:1.0.1-7.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:containernetworking-plugins-0:1.0.1-7.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:containernetworking-plugins-0:1.0.1-7.rhaos4.12.el8.src",
"8Base-RHOSE-4.12:containernetworking-plugins-0:1.0.1-7.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:containernetworking-plugins-debuginfo-0:1.0.1-7.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:containernetworking-plugins-debuginfo-0:1.0.1-7.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:containernetworking-plugins-debuginfo-0:1.0.1-7.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:containernetworking-plugins-debuginfo-0:1.0.1-7.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:containernetworking-plugins-debugsource-0:1.0.1-7.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:containernetworking-plugins-debugsource-0:1.0.1-7.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:containernetworking-plugins-debugsource-0:1.0.1-7.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:containernetworking-plugins-debugsource-0:1.0.1-7.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:kernel-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-0:4.18.0-372.59.1.el8_6.src",
"8Base-RHOSE-4.12:kernel-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-core-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-core-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-core-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-core-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-cross-headers-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-cross-headers-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-cross-headers-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-cross-headers-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-debug-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-debug-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-debug-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-debug-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-debug-core-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-debug-core-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-debug-core-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-debug-core-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-debug-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-debug-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-debug-debuginfo-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-debug-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-debug-devel-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-debug-devel-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-debug-devel-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-debug-devel-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-debug-modules-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-debug-modules-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-debug-modules-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-debug-modules-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-debug-modules-extra-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-debug-modules-extra-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-debug-modules-extra-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-debug-modules-extra-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-debug-modules-internal-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-debug-modules-internal-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-debug-modules-internal-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-debug-modules-internal-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-debuginfo-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-debuginfo-common-aarch64-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-debuginfo-common-ppc64le-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-debuginfo-common-s390x-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-debuginfo-common-x86_64-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-devel-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-devel-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-devel-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-devel-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-doc-0:4.18.0-372.59.1.el8_6.noarch",
"8Base-RHOSE-4.12:kernel-headers-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-headers-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-headers-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-headers-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-ipaclones-internal-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-ipaclones-internal-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-modules-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-modules-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-modules-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-modules-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-modules-extra-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-modules-extra-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-modules-extra-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-modules-extra-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-modules-internal-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-modules-internal-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-modules-internal-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-modules-internal-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-0:4.18.0-372.59.1.rt7.217.el8_6.src",
"8Base-RHOSE-4.12:kernel-rt-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-core-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debug-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debug-core-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debug-debuginfo-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debug-devel-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debug-kvm-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debug-modules-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debug-modules-extra-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debug-modules-internal-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debuginfo-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-devel-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-kvm-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-modules-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-modules-extra-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-modules-internal-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-selftests-internal-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-selftests-internal-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-selftests-internal-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-selftests-internal-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-selftests-internal-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-tools-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-tools-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-tools-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-tools-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-tools-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-tools-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-tools-debuginfo-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-tools-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-tools-libs-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-tools-libs-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-tools-libs-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-tools-libs-devel-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-tools-libs-devel-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-tools-libs-devel-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-zfcpdump-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-zfcpdump-core-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-zfcpdump-debuginfo-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-zfcpdump-devel-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-zfcpdump-modules-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-zfcpdump-modules-extra-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-zfcpdump-modules-internal-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:openshift-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el8.src",
"8Base-RHOSE-4.12:openshift-ansible-0:4.12.0-202306090942.p0.g74dc7b3.assembly.stream.el8.noarch",
"8Base-RHOSE-4.12:openshift-ansible-0:4.12.0-202306090942.p0.g74dc7b3.assembly.stream.el8.src",
"8Base-RHOSE-4.12:openshift-ansible-test-0:4.12.0-202306090942.p0.g74dc7b3.assembly.stream.el8.noarch",
"8Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.aarch64",
"8Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.ppc64le",
"8Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.s390x",
"8Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.src",
"8Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.x86_64",
"8Base-RHOSE-4.12:openshift-clients-redistributable-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.x86_64",
"8Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el8.aarch64",
"8Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el8.ppc64le",
"8Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el8.s390x",
"8Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el8.x86_64",
"8Base-RHOSE-4.12:openshift-kuryr-0:4.12.0-202306140156.p0.g31dd228.assembly.stream.el8.src",
"8Base-RHOSE-4.12:openshift-kuryr-cni-0:4.12.0-202306140156.p0.g31dd228.assembly.stream.el8.noarch",
"8Base-RHOSE-4.12:openshift-kuryr-common-0:4.12.0-202306140156.p0.g31dd228.assembly.stream.el8.noarch",
"8Base-RHOSE-4.12:openshift-kuryr-controller-0:4.12.0-202306140156.p0.g31dd228.assembly.stream.el8.noarch",
"8Base-RHOSE-4.12:openshift4-aws-iso-0:4.12.0-202306090942.p0.gd2acdd5.assembly.stream.el8.noarch",
"8Base-RHOSE-4.12:openshift4-aws-iso-0:4.12.0-202306090942.p0.gd2acdd5.assembly.stream.el8.src",
"8Base-RHOSE-4.12:perf-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:perf-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:perf-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:perf-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:perf-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:perf-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:perf-debuginfo-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:perf-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:podman-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-3:4.2.0-6.1.rhaos4.12.el8.src",
"8Base-RHOSE-4.12:podman-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-catatonit-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-catatonit-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-catatonit-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-catatonit-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-debugsource-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-debugsource-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-debugsource-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-debugsource-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-docker-3:4.2.0-6.1.rhaos4.12.el8.noarch",
"8Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-plugins-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-plugins-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-plugins-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-plugins-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-remote-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-remote-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-remote-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-remote-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-tests-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-tests-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-tests-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-tests-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:python3-kuryr-kubernetes-0:4.12.0-202306140156.p0.g31dd228.assembly.stream.el8.noarch",
"8Base-RHOSE-4.12:python3-perf-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:python3-perf-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:python3-perf-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:python3-perf-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:python3-perf-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:python3-perf-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:python3-perf-debuginfo-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:python3-perf-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:runc-3:1.1.6-4.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:runc-3:1.1.6-4.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:runc-3:1.1.6-4.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:runc-3:1.1.6-4.rhaos4.12.el8.src",
"8Base-RHOSE-4.12:runc-3:1.1.6-4.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:runc-debuginfo-3:1.1.6-4.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:runc-debuginfo-3:1.1.6-4.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:runc-debuginfo-3:1.1.6-4.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:runc-debuginfo-3:1.1.6-4.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:runc-debugsource-3:1.1.6-4.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:runc-debugsource-3:1.1.6-4.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:runc-debugsource-3:1.1.6-4.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:runc-debugsource-3:1.1.6-4.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:skopeo-2:1.9.4-3.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:skopeo-2:1.9.4-3.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:skopeo-2:1.9.4-3.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:skopeo-2:1.9.4-3.1.rhaos4.12.el8.src",
"8Base-RHOSE-4.12:skopeo-2:1.9.4-3.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.1.rhaos4.12.el8.x86_64",
"9Base-RHOSE-4.12:buildah-1:1.23.4-5.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:buildah-1:1.23.4-5.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:buildah-1:1.23.4-5.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:buildah-1:1.23.4-5.rhaos4.12.el9.src",
"9Base-RHOSE-4.12:buildah-1:1.23.4-5.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:conmon-2:2.1.2-5.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:conmon-2:2.1.2-5.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:conmon-2:2.1.2-5.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:conmon-2:2.1.2-5.rhaos4.12.el9.src",
"9Base-RHOSE-4.12:conmon-2:2.1.2-5.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-5.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-5.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-5.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-5.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-5.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-5.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-5.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-5.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:openshift-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el9.src",
"9Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.aarch64",
"9Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.ppc64le",
"9Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.s390x",
"9Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.src",
"9Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.x86_64",
"9Base-RHOSE-4.12:openshift-clients-redistributable-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.x86_64",
"9Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el9.aarch64",
"9Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el9.ppc64le",
"9Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el9.s390x",
"9Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el9.x86_64",
"9Base-RHOSE-4.12:podman-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-3:4.2.0-7.rhaos4.12.el9.src",
"9Base-RHOSE-4.12:podman-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-catatonit-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-catatonit-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-catatonit-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-catatonit-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-debugsource-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-debugsource-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-debugsource-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-debugsource-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-docker-3:4.2.0-7.rhaos4.12.el9.noarch",
"9Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-plugins-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-plugins-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-plugins-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-plugins-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-remote-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-remote-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-remote-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-remote-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-tests-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-tests-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-tests-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-tests-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:skopeo-2:1.9.4-3.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:skopeo-2:1.9.4-3.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:skopeo-2:1.9.4-3.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:skopeo-2:1.9.4-3.rhaos4.12.el9.src",
"9Base-RHOSE-4.12:skopeo-2:1.9.4-3.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.rhaos4.12.el9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "golang: regexp/syntax: limit memory used by parsing regexps"
}
]
}
rhsa-2024:2077
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for the container-tools:rhel8 module is now available for Red Hat Enterprise Linux 8.8 Extended Update Support.\n\nSecurity team has rated the vulnerability impact of the fixed issues as Important.",
"title": "Topic"
},
{
"category": "general",
"text": "The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc.\n\nSecurity Fix(es):\n\n* golang: golang.org/x/text/language: ParseAcceptLanguage takes a long time to parse complex tags (CVE-2022-32149)\n\n* podman: Symlink error leads to information disclosure (CVE-2022-4122)\n\n* buildah: full container escape at build time (CVE-2024-1753)\n\nFor more details about the security issue(s), including the impact, a CVSS\nscore, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2024:2077",
"url": "https://access.redhat.com/errata/RHSA-2024:2077"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "2134010",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2134010"
},
{
"category": "external",
"summary": "2144983",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2144983"
},
{
"category": "external",
"summary": "2265513",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2265513"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_2077.json"
}
],
"title": "Red Hat Security Advisory: container-tools:rhel8 security and bug fix update",
"tracking": {
"current_release_date": "2025-10-10T01:55:36+00:00",
"generator": {
"date": "2025-10-10T01:55:36+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.9"
}
},
"id": "RHSA-2024:2077",
"initial_release_date": "2024-04-29T12:00:29+00:00",
"revision_history": [
{
"date": "2024-04-29T12:00:29+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2024-04-29T12:00:29+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-10-10T01:55:36+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product": {
"name": "Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_eus:8.8::appstream"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "aardvark-dns-1.5.0-2.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8",
"product": {
"name": "aardvark-dns-1.5.0-2.module+el8.8.0+21741+dd5be1e7.src.rpm (container-tools:rhel8)",
"product_id": "aardvark-dns-1.5.0-2.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/aardvark-dns@1.5.0-2.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=src\u0026epoch=2\u0026rpmmod=container-tools:rhel8:8080020240422101606:0f77c1b7"
}
}
},
{
"category": "product_version",
"name": "buildah-1.29.3-1.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8",
"product": {
"name": "buildah-1.29.3-1.module+el8.8.0+21741+dd5be1e7.src.rpm (container-tools:rhel8)",
"product_id": "buildah-1.29.3-1.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/buildah@1.29.3-1.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=src\u0026epoch=1\u0026rpmmod=container-tools:rhel8:8080020240422101606:0f77c1b7"
}
}
},
{
"category": "product_version",
"name": "cockpit-podman-63.1-1.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8",
"product": {
"name": "cockpit-podman-63.1-1.module+el8.8.0+21741+dd5be1e7.src.rpm (container-tools:rhel8)",
"product_id": "cockpit-podman-63.1-1.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cockpit-podman@63.1-1.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=src\u0026rpmmod=container-tools:rhel8:8080020240422101606:0f77c1b7"
}
}
},
{
"category": "product_version",
"name": "conmon-2.1.6-1.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8",
"product": {
"name": "conmon-2.1.6-1.module+el8.8.0+21741+dd5be1e7.src.rpm (container-tools:rhel8)",
"product_id": "conmon-2.1.6-1.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/conmon@2.1.6-1.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=src\u0026epoch=3\u0026rpmmod=container-tools:rhel8:8080020240422101606:0f77c1b7"
}
}
},
{
"category": "product_version",
"name": "container-selinux-2.229.0-1.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8",
"product": {
"name": "container-selinux-2.229.0-1.module+el8.8.0+21741+dd5be1e7.src.rpm (container-tools:rhel8)",
"product_id": "container-selinux-2.229.0-1.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/container-selinux@2.229.0-1.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=src\u0026epoch=2\u0026rpmmod=container-tools:rhel8:8080020240422101606:0f77c1b7"
}
}
},
{
"category": "product_version",
"name": "containernetworking-plugins-1.2.0-1.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8",
"product": {
"name": "containernetworking-plugins-1.2.0-1.module+el8.8.0+21741+dd5be1e7.src.rpm (container-tools:rhel8)",
"product_id": "containernetworking-plugins-1.2.0-1.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/containernetworking-plugins@1.2.0-1.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=src\u0026epoch=1\u0026rpmmod=container-tools:rhel8:8080020240422101606:0f77c1b7"
}
}
},
{
"category": "product_version",
"name": "containers-common-1-65.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8",
"product": {
"name": "containers-common-1-65.module+el8.8.0+21741+dd5be1e7.src.rpm (container-tools:rhel8)",
"product_id": "containers-common-1-65.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/containers-common@1-65.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=src\u0026epoch=2\u0026rpmmod=container-tools:rhel8:8080020240422101606:0f77c1b7"
}
}
},
{
"category": "product_version",
"name": "criu-3.15-4.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8",
"product": {
"name": "criu-3.15-4.module+el8.8.0+21741+dd5be1e7.src.rpm (container-tools:rhel8)",
"product_id": "criu-3.15-4.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/criu@3.15-4.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=src\u0026rpmmod=container-tools:rhel8:8080020240422101606:0f77c1b7"
}
}
},
{
"category": "product_version",
"name": "crun-1.8.4-2.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8",
"product": {
"name": "crun-1.8.4-2.module+el8.8.0+21741+dd5be1e7.src.rpm (container-tools:rhel8)",
"product_id": "crun-1.8.4-2.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/crun@1.8.4-2.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=src\u0026rpmmod=container-tools:rhel8:8080020240422101606:0f77c1b7"
}
}
},
{
"category": "product_version",
"name": "fuse-overlayfs-1.11-1.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8",
"product": {
"name": "fuse-overlayfs-1.11-1.module+el8.8.0+21741+dd5be1e7.src.rpm (container-tools:rhel8)",
"product_id": "fuse-overlayfs-1.11-1.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fuse-overlayfs@1.11-1.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=src\u0026rpmmod=container-tools:rhel8:8080020240422101606:0f77c1b7"
}
}
},
{
"category": "product_version",
"name": "libslirp-4.4.0-1.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8",
"product": {
"name": "libslirp-4.4.0-1.module+el8.8.0+21741+dd5be1e7.src.rpm (container-tools:rhel8)",
"product_id": "libslirp-4.4.0-1.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libslirp@4.4.0-1.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=src\u0026rpmmod=container-tools:rhel8:8080020240422101606:0f77c1b7"
}
}
},
{
"category": "product_version",
"name": "netavark-1.5.1-3.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8",
"product": {
"name": "netavark-1.5.1-3.module+el8.8.0+21741+dd5be1e7.src.rpm (container-tools:rhel8)",
"product_id": "netavark-1.5.1-3.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/netavark@1.5.1-3.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=src\u0026epoch=2\u0026rpmmod=container-tools:rhel8:8080020240422101606:0f77c1b7"
}
}
},
{
"category": "product_version",
"name": "oci-seccomp-bpf-hook-1.2.8-1.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8",
"product": {
"name": "oci-seccomp-bpf-hook-1.2.8-1.module+el8.8.0+21741+dd5be1e7.src.rpm (container-tools:rhel8)",
"product_id": "oci-seccomp-bpf-hook-1.2.8-1.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/oci-seccomp-bpf-hook@1.2.8-1.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=src\u0026rpmmod=container-tools:rhel8:8080020240422101606:0f77c1b7"
}
}
},
{
"category": "product_version",
"name": "podman-4.4.1-19.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8",
"product": {
"name": "podman-4.4.1-19.module+el8.8.0+21741+dd5be1e7.src.rpm (container-tools:rhel8)",
"product_id": "podman-4.4.1-19.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman@4.4.1-19.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=src\u0026epoch=3\u0026rpmmod=container-tools:rhel8:8080020240422101606:0f77c1b7"
}
}
},
{
"category": "product_version",
"name": "python-podman-4.4.1-1.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8",
"product": {
"name": "python-podman-4.4.1-1.module+el8.8.0+21741+dd5be1e7.src.rpm (container-tools:rhel8)",
"product_id": "python-podman-4.4.1-1.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-podman@4.4.1-1.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=src\u0026rpmmod=container-tools:rhel8:8080020240422101606:0f77c1b7"
}
}
},
{
"category": "product_version",
"name": "runc-1.1.12-1.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8",
"product": {
"name": "runc-1.1.12-1.module+el8.8.0+21741+dd5be1e7.src.rpm (container-tools:rhel8)",
"product_id": "runc-1.1.12-1.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/runc@1.1.12-1.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=src\u0026epoch=1\u0026rpmmod=container-tools:rhel8:8080020240422101606:0f77c1b7"
}
}
},
{
"category": "product_version",
"name": "skopeo-1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8",
"product": {
"name": "skopeo-1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.src.rpm (container-tools:rhel8)",
"product_id": "skopeo-1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/skopeo@1.11.2-0.2.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=src\u0026epoch=2\u0026rpmmod=container-tools:rhel8:8080020240422101606:0f77c1b7"
}
}
},
{
"category": "product_version",
"name": "slirp4netns-1.2.0-3.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8",
"product": {
"name": "slirp4netns-1.2.0-3.module+el8.8.0+21741+dd5be1e7.src.rpm (container-tools:rhel8)",
"product_id": "slirp4netns-1.2.0-3.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/slirp4netns@1.2.0-3.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=src\u0026rpmmod=container-tools:rhel8:8080020240422101606:0f77c1b7"
}
}
},
{
"category": "product_version",
"name": "toolbox-0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8",
"product": {
"name": "toolbox-0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.src.rpm (container-tools:rhel8)",
"product_id": "toolbox-0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/toolbox@0.0.99.3-7.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=src\u0026rpmmod=container-tools:rhel8:8080020240422101606:0f77c1b7"
}
}
},
{
"category": "product_version",
"name": "udica-0.2.6-20.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8",
"product": {
"name": "udica-0.2.6-20.module+el8.8.0+21741+dd5be1e7.src.rpm (container-tools:rhel8)",
"product_id": "udica-0.2.6-20.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/udica@0.2.6-20.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=src\u0026rpmmod=container-tools:rhel8:8080020240422101606:0f77c1b7"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "aardvark-dns-1.5.0-2.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"product": {
"name": "aardvark-dns-1.5.0-2.module+el8.8.0+21741+dd5be1e7.x86_64.rpm (container-tools:rhel8)",
"product_id": "aardvark-dns-1.5.0-2.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/aardvark-dns@1.5.0-2.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=x86_64\u0026epoch=2\u0026rpmmod=container-tools:rhel8:8080020240422101606:0f77c1b7"
}
}
},
{
"category": "product_version",
"name": "buildah-1.29.3-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"product": {
"name": "buildah-1.29.3-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm (container-tools:rhel8)",
"product_id": "buildah-1.29.3-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/buildah@1.29.3-1.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=x86_64\u0026epoch=1\u0026rpmmod=container-tools:rhel8:8080020240422101606:0f77c1b7"
}
}
},
{
"category": "product_version",
"name": "buildah-debuginfo-1.29.3-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"product": {
"name": "buildah-debuginfo-1.29.3-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm (container-tools:rhel8)",
"product_id": "buildah-debuginfo-1.29.3-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/buildah-debuginfo@1.29.3-1.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=x86_64\u0026epoch=1\u0026rpmmod=container-tools:rhel8:8080020240422101606:0f77c1b7"
}
}
},
{
"category": "product_version",
"name": "buildah-debugsource-1.29.3-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"product": {
"name": "buildah-debugsource-1.29.3-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm (container-tools:rhel8)",
"product_id": "buildah-debugsource-1.29.3-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/buildah-debugsource@1.29.3-1.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=x86_64\u0026epoch=1\u0026rpmmod=container-tools:rhel8:8080020240422101606:0f77c1b7"
}
}
},
{
"category": "product_version",
"name": "buildah-tests-1.29.3-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"product": {
"name": "buildah-tests-1.29.3-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm (container-tools:rhel8)",
"product_id": "buildah-tests-1.29.3-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/buildah-tests@1.29.3-1.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=x86_64\u0026epoch=1\u0026rpmmod=container-tools:rhel8:8080020240422101606:0f77c1b7"
}
}
},
{
"category": "product_version",
"name": "buildah-tests-debuginfo-1.29.3-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"product": {
"name": "buildah-tests-debuginfo-1.29.3-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm (container-tools:rhel8)",
"product_id": "buildah-tests-debuginfo-1.29.3-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/buildah-tests-debuginfo@1.29.3-1.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=x86_64\u0026epoch=1\u0026rpmmod=container-tools:rhel8:8080020240422101606:0f77c1b7"
}
}
},
{
"category": "product_version",
"name": "conmon-2.1.6-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"product": {
"name": "conmon-2.1.6-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm (container-tools:rhel8)",
"product_id": "conmon-2.1.6-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/conmon@2.1.6-1.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=x86_64\u0026epoch=3\u0026rpmmod=container-tools:rhel8:8080020240422101606:0f77c1b7"
}
}
},
{
"category": "product_version",
"name": "conmon-debuginfo-2.1.6-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"product": {
"name": "conmon-debuginfo-2.1.6-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm (container-tools:rhel8)",
"product_id": "conmon-debuginfo-2.1.6-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/conmon-debuginfo@2.1.6-1.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=x86_64\u0026epoch=3\u0026rpmmod=container-tools:rhel8:8080020240422101606:0f77c1b7"
}
}
},
{
"category": "product_version",
"name": "conmon-debugsource-2.1.6-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"product": {
"name": "conmon-debugsource-2.1.6-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm (container-tools:rhel8)",
"product_id": "conmon-debugsource-2.1.6-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/conmon-debugsource@2.1.6-1.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=x86_64\u0026epoch=3\u0026rpmmod=container-tools:rhel8:8080020240422101606:0f77c1b7"
}
}
},
{
"category": "product_version",
"name": "containernetworking-plugins-1.2.0-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"product": {
"name": "containernetworking-plugins-1.2.0-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm (container-tools:rhel8)",
"product_id": "containernetworking-plugins-1.2.0-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/containernetworking-plugins@1.2.0-1.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=x86_64\u0026epoch=1\u0026rpmmod=container-tools:rhel8:8080020240422101606:0f77c1b7"
}
}
},
{
"category": "product_version",
"name": "containernetworking-plugins-debuginfo-1.2.0-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"product": {
"name": "containernetworking-plugins-debuginfo-1.2.0-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm (container-tools:rhel8)",
"product_id": "containernetworking-plugins-debuginfo-1.2.0-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/containernetworking-plugins-debuginfo@1.2.0-1.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=x86_64\u0026epoch=1\u0026rpmmod=container-tools:rhel8:8080020240422101606:0f77c1b7"
}
}
},
{
"category": "product_version",
"name": "containernetworking-plugins-debugsource-1.2.0-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"product": {
"name": "containernetworking-plugins-debugsource-1.2.0-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm (container-tools:rhel8)",
"product_id": "containernetworking-plugins-debugsource-1.2.0-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/containernetworking-plugins-debugsource@1.2.0-1.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=x86_64\u0026epoch=1\u0026rpmmod=container-tools:rhel8:8080020240422101606:0f77c1b7"
}
}
},
{
"category": "product_version",
"name": "containers-common-1-65.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"product": {
"name": "containers-common-1-65.module+el8.8.0+21741+dd5be1e7.x86_64.rpm (container-tools:rhel8)",
"product_id": "containers-common-1-65.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/containers-common@1-65.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=x86_64\u0026epoch=2\u0026rpmmod=container-tools:rhel8:8080020240422101606:0f77c1b7"
}
}
},
{
"category": "product_version",
"name": "crit-3.15-4.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"product": {
"name": "crit-3.15-4.module+el8.8.0+21741+dd5be1e7.x86_64.rpm (container-tools:rhel8)",
"product_id": "crit-3.15-4.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/crit@3.15-4.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=x86_64\u0026rpmmod=container-tools:rhel8:8080020240422101606:0f77c1b7"
}
}
},
{
"category": "product_version",
"name": "criu-3.15-4.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"product": {
"name": "criu-3.15-4.module+el8.8.0+21741+dd5be1e7.x86_64.rpm (container-tools:rhel8)",
"product_id": "criu-3.15-4.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/criu@3.15-4.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=x86_64\u0026rpmmod=container-tools:rhel8:8080020240422101606:0f77c1b7"
}
}
},
{
"category": "product_version",
"name": "criu-debuginfo-3.15-4.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"product": {
"name": "criu-debuginfo-3.15-4.module+el8.8.0+21741+dd5be1e7.x86_64.rpm (container-tools:rhel8)",
"product_id": "criu-debuginfo-3.15-4.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/criu-debuginfo@3.15-4.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=x86_64\u0026rpmmod=container-tools:rhel8:8080020240422101606:0f77c1b7"
}
}
},
{
"category": "product_version",
"name": "criu-debugsource-3.15-4.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"product": {
"name": "criu-debugsource-3.15-4.module+el8.8.0+21741+dd5be1e7.x86_64.rpm (container-tools:rhel8)",
"product_id": "criu-debugsource-3.15-4.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/criu-debugsource@3.15-4.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=x86_64\u0026rpmmod=container-tools:rhel8:8080020240422101606:0f77c1b7"
}
}
},
{
"category": "product_version",
"name": "criu-devel-3.15-4.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"product": {
"name": "criu-devel-3.15-4.module+el8.8.0+21741+dd5be1e7.x86_64.rpm (container-tools:rhel8)",
"product_id": "criu-devel-3.15-4.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/criu-devel@3.15-4.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=x86_64\u0026rpmmod=container-tools:rhel8:8080020240422101606:0f77c1b7"
}
}
},
{
"category": "product_version",
"name": "criu-libs-3.15-4.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"product": {
"name": "criu-libs-3.15-4.module+el8.8.0+21741+dd5be1e7.x86_64.rpm (container-tools:rhel8)",
"product_id": "criu-libs-3.15-4.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/criu-libs@3.15-4.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=x86_64\u0026rpmmod=container-tools:rhel8:8080020240422101606:0f77c1b7"
}
}
},
{
"category": "product_version",
"name": "criu-libs-debuginfo-3.15-4.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"product": {
"name": "criu-libs-debuginfo-3.15-4.module+el8.8.0+21741+dd5be1e7.x86_64.rpm (container-tools:rhel8)",
"product_id": "criu-libs-debuginfo-3.15-4.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/criu-libs-debuginfo@3.15-4.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=x86_64\u0026rpmmod=container-tools:rhel8:8080020240422101606:0f77c1b7"
}
}
},
{
"category": "product_version",
"name": "crun-1.8.4-2.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"product": {
"name": "crun-1.8.4-2.module+el8.8.0+21741+dd5be1e7.x86_64.rpm (container-tools:rhel8)",
"product_id": "crun-1.8.4-2.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/crun@1.8.4-2.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=x86_64\u0026rpmmod=container-tools:rhel8:8080020240422101606:0f77c1b7"
}
}
},
{
"category": "product_version",
"name": "crun-debuginfo-1.8.4-2.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"product": {
"name": "crun-debuginfo-1.8.4-2.module+el8.8.0+21741+dd5be1e7.x86_64.rpm (container-tools:rhel8)",
"product_id": "crun-debuginfo-1.8.4-2.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/crun-debuginfo@1.8.4-2.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=x86_64\u0026rpmmod=container-tools:rhel8:8080020240422101606:0f77c1b7"
}
}
},
{
"category": "product_version",
"name": "crun-debugsource-1.8.4-2.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"product": {
"name": "crun-debugsource-1.8.4-2.module+el8.8.0+21741+dd5be1e7.x86_64.rpm (container-tools:rhel8)",
"product_id": "crun-debugsource-1.8.4-2.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/crun-debugsource@1.8.4-2.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=x86_64\u0026rpmmod=container-tools:rhel8:8080020240422101606:0f77c1b7"
}
}
},
{
"category": "product_version",
"name": "fuse-overlayfs-1.11-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"product": {
"name": "fuse-overlayfs-1.11-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm (container-tools:rhel8)",
"product_id": "fuse-overlayfs-1.11-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fuse-overlayfs@1.11-1.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=x86_64\u0026rpmmod=container-tools:rhel8:8080020240422101606:0f77c1b7"
}
}
},
{
"category": "product_version",
"name": "fuse-overlayfs-debuginfo-1.11-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"product": {
"name": "fuse-overlayfs-debuginfo-1.11-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm (container-tools:rhel8)",
"product_id": "fuse-overlayfs-debuginfo-1.11-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fuse-overlayfs-debuginfo@1.11-1.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=x86_64\u0026rpmmod=container-tools:rhel8:8080020240422101606:0f77c1b7"
}
}
},
{
"category": "product_version",
"name": "fuse-overlayfs-debugsource-1.11-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"product": {
"name": "fuse-overlayfs-debugsource-1.11-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm (container-tools:rhel8)",
"product_id": "fuse-overlayfs-debugsource-1.11-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fuse-overlayfs-debugsource@1.11-1.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=x86_64\u0026rpmmod=container-tools:rhel8:8080020240422101606:0f77c1b7"
}
}
},
{
"category": "product_version",
"name": "libslirp-4.4.0-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"product": {
"name": "libslirp-4.4.0-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm (container-tools:rhel8)",
"product_id": "libslirp-4.4.0-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libslirp@4.4.0-1.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=x86_64\u0026rpmmod=container-tools:rhel8:8080020240422101606:0f77c1b7"
}
}
},
{
"category": "product_version",
"name": "libslirp-debuginfo-4.4.0-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"product": {
"name": "libslirp-debuginfo-4.4.0-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm (container-tools:rhel8)",
"product_id": "libslirp-debuginfo-4.4.0-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libslirp-debuginfo@4.4.0-1.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=x86_64\u0026rpmmod=container-tools:rhel8:8080020240422101606:0f77c1b7"
}
}
},
{
"category": "product_version",
"name": "libslirp-debugsource-4.4.0-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"product": {
"name": "libslirp-debugsource-4.4.0-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm (container-tools:rhel8)",
"product_id": "libslirp-debugsource-4.4.0-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libslirp-debugsource@4.4.0-1.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=x86_64\u0026rpmmod=container-tools:rhel8:8080020240422101606:0f77c1b7"
}
}
},
{
"category": "product_version",
"name": "libslirp-devel-4.4.0-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"product": {
"name": "libslirp-devel-4.4.0-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm (container-tools:rhel8)",
"product_id": "libslirp-devel-4.4.0-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libslirp-devel@4.4.0-1.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=x86_64\u0026rpmmod=container-tools:rhel8:8080020240422101606:0f77c1b7"
}
}
},
{
"category": "product_version",
"name": "netavark-1.5.1-3.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"product": {
"name": "netavark-1.5.1-3.module+el8.8.0+21741+dd5be1e7.x86_64.rpm (container-tools:rhel8)",
"product_id": "netavark-1.5.1-3.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/netavark@1.5.1-3.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=x86_64\u0026epoch=2\u0026rpmmod=container-tools:rhel8:8080020240422101606:0f77c1b7"
}
}
},
{
"category": "product_version",
"name": "oci-seccomp-bpf-hook-1.2.8-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"product": {
"name": "oci-seccomp-bpf-hook-1.2.8-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm (container-tools:rhel8)",
"product_id": "oci-seccomp-bpf-hook-1.2.8-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/oci-seccomp-bpf-hook@1.2.8-1.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=x86_64\u0026rpmmod=container-tools:rhel8:8080020240422101606:0f77c1b7"
}
}
},
{
"category": "product_version",
"name": "oci-seccomp-bpf-hook-debuginfo-1.2.8-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"product": {
"name": "oci-seccomp-bpf-hook-debuginfo-1.2.8-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm (container-tools:rhel8)",
"product_id": "oci-seccomp-bpf-hook-debuginfo-1.2.8-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/oci-seccomp-bpf-hook-debuginfo@1.2.8-1.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=x86_64\u0026rpmmod=container-tools:rhel8:8080020240422101606:0f77c1b7"
}
}
},
{
"category": "product_version",
"name": "oci-seccomp-bpf-hook-debugsource-1.2.8-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"product": {
"name": "oci-seccomp-bpf-hook-debugsource-1.2.8-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm (container-tools:rhel8)",
"product_id": "oci-seccomp-bpf-hook-debugsource-1.2.8-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/oci-seccomp-bpf-hook-debugsource@1.2.8-1.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=x86_64\u0026rpmmod=container-tools:rhel8:8080020240422101606:0f77c1b7"
}
}
},
{
"category": "product_version",
"name": "podman-4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"product": {
"name": "podman-4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64.rpm (container-tools:rhel8)",
"product_id": "podman-4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman@4.4.1-19.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=x86_64\u0026epoch=3\u0026rpmmod=container-tools:rhel8:8080020240422101606:0f77c1b7"
}
}
},
{
"category": "product_version",
"name": "podman-catatonit-4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"product": {
"name": "podman-catatonit-4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64.rpm (container-tools:rhel8)",
"product_id": "podman-catatonit-4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-catatonit@4.4.1-19.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=x86_64\u0026epoch=3\u0026rpmmod=container-tools:rhel8:8080020240422101606:0f77c1b7"
}
}
},
{
"category": "product_version",
"name": "podman-catatonit-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"product": {
"name": "podman-catatonit-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64.rpm (container-tools:rhel8)",
"product_id": "podman-catatonit-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-catatonit-debuginfo@4.4.1-19.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=x86_64\u0026epoch=3\u0026rpmmod=container-tools:rhel8:8080020240422101606:0f77c1b7"
}
}
},
{
"category": "product_version",
"name": "podman-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"product": {
"name": "podman-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64.rpm (container-tools:rhel8)",
"product_id": "podman-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-debuginfo@4.4.1-19.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=x86_64\u0026epoch=3\u0026rpmmod=container-tools:rhel8:8080020240422101606:0f77c1b7"
}
}
},
{
"category": "product_version",
"name": "podman-debugsource-4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"product": {
"name": "podman-debugsource-4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64.rpm (container-tools:rhel8)",
"product_id": "podman-debugsource-4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-debugsource@4.4.1-19.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=x86_64\u0026epoch=3\u0026rpmmod=container-tools:rhel8:8080020240422101606:0f77c1b7"
}
}
},
{
"category": "product_version",
"name": "podman-gvproxy-4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"product": {
"name": "podman-gvproxy-4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64.rpm (container-tools:rhel8)",
"product_id": "podman-gvproxy-4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-gvproxy@4.4.1-19.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=x86_64\u0026epoch=3\u0026rpmmod=container-tools:rhel8:8080020240422101606:0f77c1b7"
}
}
},
{
"category": "product_version",
"name": "podman-gvproxy-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"product": {
"name": "podman-gvproxy-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64.rpm (container-tools:rhel8)",
"product_id": "podman-gvproxy-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-gvproxy-debuginfo@4.4.1-19.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=x86_64\u0026epoch=3\u0026rpmmod=container-tools:rhel8:8080020240422101606:0f77c1b7"
}
}
},
{
"category": "product_version",
"name": "podman-plugins-4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"product": {
"name": "podman-plugins-4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64.rpm (container-tools:rhel8)",
"product_id": "podman-plugins-4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-plugins@4.4.1-19.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=x86_64\u0026epoch=3\u0026rpmmod=container-tools:rhel8:8080020240422101606:0f77c1b7"
}
}
},
{
"category": "product_version",
"name": "podman-plugins-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"product": {
"name": "podman-plugins-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64.rpm (container-tools:rhel8)",
"product_id": "podman-plugins-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-plugins-debuginfo@4.4.1-19.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=x86_64\u0026epoch=3\u0026rpmmod=container-tools:rhel8:8080020240422101606:0f77c1b7"
}
}
},
{
"category": "product_version",
"name": "podman-remote-4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"product": {
"name": "podman-remote-4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64.rpm (container-tools:rhel8)",
"product_id": "podman-remote-4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-remote@4.4.1-19.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=x86_64\u0026epoch=3\u0026rpmmod=container-tools:rhel8:8080020240422101606:0f77c1b7"
}
}
},
{
"category": "product_version",
"name": "podman-remote-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"product": {
"name": "podman-remote-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64.rpm (container-tools:rhel8)",
"product_id": "podman-remote-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-remote-debuginfo@4.4.1-19.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=x86_64\u0026epoch=3\u0026rpmmod=container-tools:rhel8:8080020240422101606:0f77c1b7"
}
}
},
{
"category": "product_version",
"name": "podman-tests-4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"product": {
"name": "podman-tests-4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64.rpm (container-tools:rhel8)",
"product_id": "podman-tests-4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-tests@4.4.1-19.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=x86_64\u0026epoch=3\u0026rpmmod=container-tools:rhel8:8080020240422101606:0f77c1b7"
}
}
},
{
"category": "product_version",
"name": "python3-criu-3.15-4.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"product": {
"name": "python3-criu-3.15-4.module+el8.8.0+21741+dd5be1e7.x86_64.rpm (container-tools:rhel8)",
"product_id": "python3-criu-3.15-4.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-criu@3.15-4.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=x86_64\u0026rpmmod=container-tools:rhel8:8080020240422101606:0f77c1b7"
}
}
},
{
"category": "product_version",
"name": "runc-1.1.12-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"product": {
"name": "runc-1.1.12-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm (container-tools:rhel8)",
"product_id": "runc-1.1.12-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/runc@1.1.12-1.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=x86_64\u0026epoch=1\u0026rpmmod=container-tools:rhel8:8080020240422101606:0f77c1b7"
}
}
},
{
"category": "product_version",
"name": "runc-debuginfo-1.1.12-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"product": {
"name": "runc-debuginfo-1.1.12-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm (container-tools:rhel8)",
"product_id": "runc-debuginfo-1.1.12-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/runc-debuginfo@1.1.12-1.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=x86_64\u0026epoch=1\u0026rpmmod=container-tools:rhel8:8080020240422101606:0f77c1b7"
}
}
},
{
"category": "product_version",
"name": "runc-debugsource-1.1.12-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"product": {
"name": "runc-debugsource-1.1.12-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm (container-tools:rhel8)",
"product_id": "runc-debugsource-1.1.12-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/runc-debugsource@1.1.12-1.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=x86_64\u0026epoch=1\u0026rpmmod=container-tools:rhel8:8080020240422101606:0f77c1b7"
}
}
},
{
"category": "product_version",
"name": "skopeo-1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"product": {
"name": "skopeo-1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.x86_64.rpm (container-tools:rhel8)",
"product_id": "skopeo-1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/skopeo@1.11.2-0.2.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=x86_64\u0026epoch=2\u0026rpmmod=container-tools:rhel8:8080020240422101606:0f77c1b7"
}
}
},
{
"category": "product_version",
"name": "skopeo-tests-1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"product": {
"name": "skopeo-tests-1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.x86_64.rpm (container-tools:rhel8)",
"product_id": "skopeo-tests-1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/skopeo-tests@1.11.2-0.2.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=x86_64\u0026epoch=2\u0026rpmmod=container-tools:rhel8:8080020240422101606:0f77c1b7"
}
}
},
{
"category": "product_version",
"name": "slirp4netns-1.2.0-3.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"product": {
"name": "slirp4netns-1.2.0-3.module+el8.8.0+21741+dd5be1e7.x86_64.rpm (container-tools:rhel8)",
"product_id": "slirp4netns-1.2.0-3.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/slirp4netns@1.2.0-3.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=x86_64\u0026rpmmod=container-tools:rhel8:8080020240422101606:0f77c1b7"
}
}
},
{
"category": "product_version",
"name": "slirp4netns-debuginfo-1.2.0-3.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"product": {
"name": "slirp4netns-debuginfo-1.2.0-3.module+el8.8.0+21741+dd5be1e7.x86_64.rpm (container-tools:rhel8)",
"product_id": "slirp4netns-debuginfo-1.2.0-3.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/slirp4netns-debuginfo@1.2.0-3.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=x86_64\u0026rpmmod=container-tools:rhel8:8080020240422101606:0f77c1b7"
}
}
},
{
"category": "product_version",
"name": "slirp4netns-debugsource-1.2.0-3.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"product": {
"name": "slirp4netns-debugsource-1.2.0-3.module+el8.8.0+21741+dd5be1e7.x86_64.rpm (container-tools:rhel8)",
"product_id": "slirp4netns-debugsource-1.2.0-3.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/slirp4netns-debugsource@1.2.0-3.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=x86_64\u0026rpmmod=container-tools:rhel8:8080020240422101606:0f77c1b7"
}
}
},
{
"category": "product_version",
"name": "toolbox-0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"product": {
"name": "toolbox-0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.x86_64.rpm (container-tools:rhel8)",
"product_id": "toolbox-0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/toolbox@0.0.99.3-7.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=x86_64\u0026rpmmod=container-tools:rhel8:8080020240422101606:0f77c1b7"
}
}
},
{
"category": "product_version",
"name": "toolbox-debuginfo-0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"product": {
"name": "toolbox-debuginfo-0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.x86_64.rpm (container-tools:rhel8)",
"product_id": "toolbox-debuginfo-0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/toolbox-debuginfo@0.0.99.3-7.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=x86_64\u0026rpmmod=container-tools:rhel8:8080020240422101606:0f77c1b7"
}
}
},
{
"category": "product_version",
"name": "toolbox-debugsource-0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"product": {
"name": "toolbox-debugsource-0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.x86_64.rpm (container-tools:rhel8)",
"product_id": "toolbox-debugsource-0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/toolbox-debugsource@0.0.99.3-7.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=x86_64\u0026rpmmod=container-tools:rhel8:8080020240422101606:0f77c1b7"
}
}
},
{
"category": "product_version",
"name": "toolbox-tests-0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"product": {
"name": "toolbox-tests-0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.x86_64.rpm (container-tools:rhel8)",
"product_id": "toolbox-tests-0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/toolbox-tests@0.0.99.3-7.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=x86_64\u0026rpmmod=container-tools:rhel8:8080020240422101606:0f77c1b7"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "cockpit-podman-63.1-1.module+el8.8.0+21741+dd5be1e7.noarch.rpm-container-tools:rhel8",
"product": {
"name": "cockpit-podman-63.1-1.module+el8.8.0+21741+dd5be1e7.noarch.rpm (container-tools:rhel8)",
"product_id": "cockpit-podman-63.1-1.module+el8.8.0+21741+dd5be1e7.noarch.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cockpit-podman@63.1-1.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=noarch\u0026rpmmod=container-tools:rhel8:8080020240422101606:0f77c1b7"
}
}
},
{
"category": "product_version",
"name": "container-selinux-2.229.0-1.module+el8.8.0+21741+dd5be1e7.noarch.rpm-container-tools:rhel8",
"product": {
"name": "container-selinux-2.229.0-1.module+el8.8.0+21741+dd5be1e7.noarch.rpm (container-tools:rhel8)",
"product_id": "container-selinux-2.229.0-1.module+el8.8.0+21741+dd5be1e7.noarch.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/container-selinux@2.229.0-1.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=noarch\u0026epoch=2\u0026rpmmod=container-tools:rhel8:8080020240422101606:0f77c1b7"
}
}
},
{
"category": "product_version",
"name": "podman-docker-4.4.1-19.module+el8.8.0+21741+dd5be1e7.noarch.rpm-container-tools:rhel8",
"product": {
"name": "podman-docker-4.4.1-19.module+el8.8.0+21741+dd5be1e7.noarch.rpm (container-tools:rhel8)",
"product_id": "podman-docker-4.4.1-19.module+el8.8.0+21741+dd5be1e7.noarch.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-docker@4.4.1-19.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=noarch\u0026epoch=3\u0026rpmmod=container-tools:rhel8:8080020240422101606:0f77c1b7"
}
}
},
{
"category": "product_version",
"name": "python3-podman-4.4.1-1.module+el8.8.0+21741+dd5be1e7.noarch.rpm-container-tools:rhel8",
"product": {
"name": "python3-podman-4.4.1-1.module+el8.8.0+21741+dd5be1e7.noarch.rpm (container-tools:rhel8)",
"product_id": "python3-podman-4.4.1-1.module+el8.8.0+21741+dd5be1e7.noarch.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-podman@4.4.1-1.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=noarch\u0026rpmmod=container-tools:rhel8:8080020240422101606:0f77c1b7"
}
}
},
{
"category": "product_version",
"name": "udica-0.2.6-20.module+el8.8.0+21741+dd5be1e7.noarch.rpm-container-tools:rhel8",
"product": {
"name": "udica-0.2.6-20.module+el8.8.0+21741+dd5be1e7.noarch.rpm (container-tools:rhel8)",
"product_id": "udica-0.2.6-20.module+el8.8.0+21741+dd5be1e7.noarch.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/udica@0.2.6-20.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=noarch\u0026rpmmod=container-tools:rhel8:8080020240422101606:0f77c1b7"
}
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "aardvark-dns-1.5.0-2.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"product": {
"name": "aardvark-dns-1.5.0-2.module+el8.8.0+21741+dd5be1e7.s390x.rpm (container-tools:rhel8)",
"product_id": "aardvark-dns-1.5.0-2.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/aardvark-dns@1.5.0-2.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=s390x\u0026epoch=2\u0026rpmmod=container-tools:rhel8:8080020240422101606:0f77c1b7"
}
}
},
{
"category": "product_version",
"name": "buildah-1.29.3-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"product": {
"name": "buildah-1.29.3-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm (container-tools:rhel8)",
"product_id": "buildah-1.29.3-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/buildah@1.29.3-1.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=s390x\u0026epoch=1\u0026rpmmod=container-tools:rhel8:8080020240422101606:0f77c1b7"
}
}
},
{
"category": "product_version",
"name": "buildah-debuginfo-1.29.3-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"product": {
"name": "buildah-debuginfo-1.29.3-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm (container-tools:rhel8)",
"product_id": "buildah-debuginfo-1.29.3-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/buildah-debuginfo@1.29.3-1.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=s390x\u0026epoch=1\u0026rpmmod=container-tools:rhel8:8080020240422101606:0f77c1b7"
}
}
},
{
"category": "product_version",
"name": "buildah-debugsource-1.29.3-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"product": {
"name": "buildah-debugsource-1.29.3-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm (container-tools:rhel8)",
"product_id": "buildah-debugsource-1.29.3-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/buildah-debugsource@1.29.3-1.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=s390x\u0026epoch=1\u0026rpmmod=container-tools:rhel8:8080020240422101606:0f77c1b7"
}
}
},
{
"category": "product_version",
"name": "buildah-tests-1.29.3-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"product": {
"name": "buildah-tests-1.29.3-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm (container-tools:rhel8)",
"product_id": "buildah-tests-1.29.3-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/buildah-tests@1.29.3-1.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=s390x\u0026epoch=1\u0026rpmmod=container-tools:rhel8:8080020240422101606:0f77c1b7"
}
}
},
{
"category": "product_version",
"name": "buildah-tests-debuginfo-1.29.3-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"product": {
"name": "buildah-tests-debuginfo-1.29.3-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm (container-tools:rhel8)",
"product_id": "buildah-tests-debuginfo-1.29.3-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/buildah-tests-debuginfo@1.29.3-1.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=s390x\u0026epoch=1\u0026rpmmod=container-tools:rhel8:8080020240422101606:0f77c1b7"
}
}
},
{
"category": "product_version",
"name": "conmon-2.1.6-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"product": {
"name": "conmon-2.1.6-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm (container-tools:rhel8)",
"product_id": "conmon-2.1.6-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/conmon@2.1.6-1.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=s390x\u0026epoch=3\u0026rpmmod=container-tools:rhel8:8080020240422101606:0f77c1b7"
}
}
},
{
"category": "product_version",
"name": "conmon-debuginfo-2.1.6-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"product": {
"name": "conmon-debuginfo-2.1.6-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm (container-tools:rhel8)",
"product_id": "conmon-debuginfo-2.1.6-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/conmon-debuginfo@2.1.6-1.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=s390x\u0026epoch=3\u0026rpmmod=container-tools:rhel8:8080020240422101606:0f77c1b7"
}
}
},
{
"category": "product_version",
"name": "conmon-debugsource-2.1.6-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"product": {
"name": "conmon-debugsource-2.1.6-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm (container-tools:rhel8)",
"product_id": "conmon-debugsource-2.1.6-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/conmon-debugsource@2.1.6-1.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=s390x\u0026epoch=3\u0026rpmmod=container-tools:rhel8:8080020240422101606:0f77c1b7"
}
}
},
{
"category": "product_version",
"name": "containernetworking-plugins-1.2.0-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"product": {
"name": "containernetworking-plugins-1.2.0-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm (container-tools:rhel8)",
"product_id": "containernetworking-plugins-1.2.0-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/containernetworking-plugins@1.2.0-1.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=s390x\u0026epoch=1\u0026rpmmod=container-tools:rhel8:8080020240422101606:0f77c1b7"
}
}
},
{
"category": "product_version",
"name": "containernetworking-plugins-debuginfo-1.2.0-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"product": {
"name": "containernetworking-plugins-debuginfo-1.2.0-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm (container-tools:rhel8)",
"product_id": "containernetworking-plugins-debuginfo-1.2.0-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/containernetworking-plugins-debuginfo@1.2.0-1.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=s390x\u0026epoch=1\u0026rpmmod=container-tools:rhel8:8080020240422101606:0f77c1b7"
}
}
},
{
"category": "product_version",
"name": "containernetworking-plugins-debugsource-1.2.0-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"product": {
"name": "containernetworking-plugins-debugsource-1.2.0-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm (container-tools:rhel8)",
"product_id": "containernetworking-plugins-debugsource-1.2.0-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/containernetworking-plugins-debugsource@1.2.0-1.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=s390x\u0026epoch=1\u0026rpmmod=container-tools:rhel8:8080020240422101606:0f77c1b7"
}
}
},
{
"category": "product_version",
"name": "containers-common-1-65.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"product": {
"name": "containers-common-1-65.module+el8.8.0+21741+dd5be1e7.s390x.rpm (container-tools:rhel8)",
"product_id": "containers-common-1-65.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/containers-common@1-65.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=s390x\u0026epoch=2\u0026rpmmod=container-tools:rhel8:8080020240422101606:0f77c1b7"
}
}
},
{
"category": "product_version",
"name": "crit-3.15-4.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"product": {
"name": "crit-3.15-4.module+el8.8.0+21741+dd5be1e7.s390x.rpm (container-tools:rhel8)",
"product_id": "crit-3.15-4.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/crit@3.15-4.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=s390x\u0026rpmmod=container-tools:rhel8:8080020240422101606:0f77c1b7"
}
}
},
{
"category": "product_version",
"name": "criu-3.15-4.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"product": {
"name": "criu-3.15-4.module+el8.8.0+21741+dd5be1e7.s390x.rpm (container-tools:rhel8)",
"product_id": "criu-3.15-4.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/criu@3.15-4.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=s390x\u0026rpmmod=container-tools:rhel8:8080020240422101606:0f77c1b7"
}
}
},
{
"category": "product_version",
"name": "criu-debuginfo-3.15-4.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"product": {
"name": "criu-debuginfo-3.15-4.module+el8.8.0+21741+dd5be1e7.s390x.rpm (container-tools:rhel8)",
"product_id": "criu-debuginfo-3.15-4.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/criu-debuginfo@3.15-4.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=s390x\u0026rpmmod=container-tools:rhel8:8080020240422101606:0f77c1b7"
}
}
},
{
"category": "product_version",
"name": "criu-debugsource-3.15-4.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"product": {
"name": "criu-debugsource-3.15-4.module+el8.8.0+21741+dd5be1e7.s390x.rpm (container-tools:rhel8)",
"product_id": "criu-debugsource-3.15-4.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/criu-debugsource@3.15-4.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=s390x\u0026rpmmod=container-tools:rhel8:8080020240422101606:0f77c1b7"
}
}
},
{
"category": "product_version",
"name": "criu-devel-3.15-4.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"product": {
"name": "criu-devel-3.15-4.module+el8.8.0+21741+dd5be1e7.s390x.rpm (container-tools:rhel8)",
"product_id": "criu-devel-3.15-4.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/criu-devel@3.15-4.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=s390x\u0026rpmmod=container-tools:rhel8:8080020240422101606:0f77c1b7"
}
}
},
{
"category": "product_version",
"name": "criu-libs-3.15-4.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"product": {
"name": "criu-libs-3.15-4.module+el8.8.0+21741+dd5be1e7.s390x.rpm (container-tools:rhel8)",
"product_id": "criu-libs-3.15-4.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/criu-libs@3.15-4.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=s390x\u0026rpmmod=container-tools:rhel8:8080020240422101606:0f77c1b7"
}
}
},
{
"category": "product_version",
"name": "criu-libs-debuginfo-3.15-4.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"product": {
"name": "criu-libs-debuginfo-3.15-4.module+el8.8.0+21741+dd5be1e7.s390x.rpm (container-tools:rhel8)",
"product_id": "criu-libs-debuginfo-3.15-4.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/criu-libs-debuginfo@3.15-4.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=s390x\u0026rpmmod=container-tools:rhel8:8080020240422101606:0f77c1b7"
}
}
},
{
"category": "product_version",
"name": "crun-1.8.4-2.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"product": {
"name": "crun-1.8.4-2.module+el8.8.0+21741+dd5be1e7.s390x.rpm (container-tools:rhel8)",
"product_id": "crun-1.8.4-2.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/crun@1.8.4-2.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=s390x\u0026rpmmod=container-tools:rhel8:8080020240422101606:0f77c1b7"
}
}
},
{
"category": "product_version",
"name": "crun-debuginfo-1.8.4-2.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"product": {
"name": "crun-debuginfo-1.8.4-2.module+el8.8.0+21741+dd5be1e7.s390x.rpm (container-tools:rhel8)",
"product_id": "crun-debuginfo-1.8.4-2.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/crun-debuginfo@1.8.4-2.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=s390x\u0026rpmmod=container-tools:rhel8:8080020240422101606:0f77c1b7"
}
}
},
{
"category": "product_version",
"name": "crun-debugsource-1.8.4-2.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"product": {
"name": "crun-debugsource-1.8.4-2.module+el8.8.0+21741+dd5be1e7.s390x.rpm (container-tools:rhel8)",
"product_id": "crun-debugsource-1.8.4-2.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/crun-debugsource@1.8.4-2.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=s390x\u0026rpmmod=container-tools:rhel8:8080020240422101606:0f77c1b7"
}
}
},
{
"category": "product_version",
"name": "fuse-overlayfs-1.11-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"product": {
"name": "fuse-overlayfs-1.11-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm (container-tools:rhel8)",
"product_id": "fuse-overlayfs-1.11-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fuse-overlayfs@1.11-1.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=s390x\u0026rpmmod=container-tools:rhel8:8080020240422101606:0f77c1b7"
}
}
},
{
"category": "product_version",
"name": "fuse-overlayfs-debuginfo-1.11-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"product": {
"name": "fuse-overlayfs-debuginfo-1.11-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm (container-tools:rhel8)",
"product_id": "fuse-overlayfs-debuginfo-1.11-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fuse-overlayfs-debuginfo@1.11-1.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=s390x\u0026rpmmod=container-tools:rhel8:8080020240422101606:0f77c1b7"
}
}
},
{
"category": "product_version",
"name": "fuse-overlayfs-debugsource-1.11-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"product": {
"name": "fuse-overlayfs-debugsource-1.11-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm (container-tools:rhel8)",
"product_id": "fuse-overlayfs-debugsource-1.11-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fuse-overlayfs-debugsource@1.11-1.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=s390x\u0026rpmmod=container-tools:rhel8:8080020240422101606:0f77c1b7"
}
}
},
{
"category": "product_version",
"name": "libslirp-4.4.0-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"product": {
"name": "libslirp-4.4.0-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm (container-tools:rhel8)",
"product_id": "libslirp-4.4.0-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libslirp@4.4.0-1.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=s390x\u0026rpmmod=container-tools:rhel8:8080020240422101606:0f77c1b7"
}
}
},
{
"category": "product_version",
"name": "libslirp-debuginfo-4.4.0-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"product": {
"name": "libslirp-debuginfo-4.4.0-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm (container-tools:rhel8)",
"product_id": "libslirp-debuginfo-4.4.0-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libslirp-debuginfo@4.4.0-1.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=s390x\u0026rpmmod=container-tools:rhel8:8080020240422101606:0f77c1b7"
}
}
},
{
"category": "product_version",
"name": "libslirp-debugsource-4.4.0-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"product": {
"name": "libslirp-debugsource-4.4.0-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm (container-tools:rhel8)",
"product_id": "libslirp-debugsource-4.4.0-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libslirp-debugsource@4.4.0-1.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=s390x\u0026rpmmod=container-tools:rhel8:8080020240422101606:0f77c1b7"
}
}
},
{
"category": "product_version",
"name": "libslirp-devel-4.4.0-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"product": {
"name": "libslirp-devel-4.4.0-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm (container-tools:rhel8)",
"product_id": "libslirp-devel-4.4.0-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libslirp-devel@4.4.0-1.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=s390x\u0026rpmmod=container-tools:rhel8:8080020240422101606:0f77c1b7"
}
}
},
{
"category": "product_version",
"name": "netavark-1.5.1-3.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"product": {
"name": "netavark-1.5.1-3.module+el8.8.0+21741+dd5be1e7.s390x.rpm (container-tools:rhel8)",
"product_id": "netavark-1.5.1-3.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/netavark@1.5.1-3.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=s390x\u0026epoch=2\u0026rpmmod=container-tools:rhel8:8080020240422101606:0f77c1b7"
}
}
},
{
"category": "product_version",
"name": "oci-seccomp-bpf-hook-1.2.8-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"product": {
"name": "oci-seccomp-bpf-hook-1.2.8-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm (container-tools:rhel8)",
"product_id": "oci-seccomp-bpf-hook-1.2.8-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/oci-seccomp-bpf-hook@1.2.8-1.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=s390x\u0026rpmmod=container-tools:rhel8:8080020240422101606:0f77c1b7"
}
}
},
{
"category": "product_version",
"name": "oci-seccomp-bpf-hook-debuginfo-1.2.8-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"product": {
"name": "oci-seccomp-bpf-hook-debuginfo-1.2.8-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm (container-tools:rhel8)",
"product_id": "oci-seccomp-bpf-hook-debuginfo-1.2.8-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/oci-seccomp-bpf-hook-debuginfo@1.2.8-1.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=s390x\u0026rpmmod=container-tools:rhel8:8080020240422101606:0f77c1b7"
}
}
},
{
"category": "product_version",
"name": "oci-seccomp-bpf-hook-debugsource-1.2.8-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"product": {
"name": "oci-seccomp-bpf-hook-debugsource-1.2.8-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm (container-tools:rhel8)",
"product_id": "oci-seccomp-bpf-hook-debugsource-1.2.8-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/oci-seccomp-bpf-hook-debugsource@1.2.8-1.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=s390x\u0026rpmmod=container-tools:rhel8:8080020240422101606:0f77c1b7"
}
}
},
{
"category": "product_version",
"name": "podman-4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"product": {
"name": "podman-4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x.rpm (container-tools:rhel8)",
"product_id": "podman-4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman@4.4.1-19.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=s390x\u0026epoch=3\u0026rpmmod=container-tools:rhel8:8080020240422101606:0f77c1b7"
}
}
},
{
"category": "product_version",
"name": "podman-catatonit-4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"product": {
"name": "podman-catatonit-4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x.rpm (container-tools:rhel8)",
"product_id": "podman-catatonit-4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-catatonit@4.4.1-19.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=s390x\u0026epoch=3\u0026rpmmod=container-tools:rhel8:8080020240422101606:0f77c1b7"
}
}
},
{
"category": "product_version",
"name": "podman-catatonit-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"product": {
"name": "podman-catatonit-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x.rpm (container-tools:rhel8)",
"product_id": "podman-catatonit-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-catatonit-debuginfo@4.4.1-19.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=s390x\u0026epoch=3\u0026rpmmod=container-tools:rhel8:8080020240422101606:0f77c1b7"
}
}
},
{
"category": "product_version",
"name": "podman-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"product": {
"name": "podman-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x.rpm (container-tools:rhel8)",
"product_id": "podman-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-debuginfo@4.4.1-19.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=s390x\u0026epoch=3\u0026rpmmod=container-tools:rhel8:8080020240422101606:0f77c1b7"
}
}
},
{
"category": "product_version",
"name": "podman-debugsource-4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"product": {
"name": "podman-debugsource-4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x.rpm (container-tools:rhel8)",
"product_id": "podman-debugsource-4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-debugsource@4.4.1-19.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=s390x\u0026epoch=3\u0026rpmmod=container-tools:rhel8:8080020240422101606:0f77c1b7"
}
}
},
{
"category": "product_version",
"name": "podman-gvproxy-4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"product": {
"name": "podman-gvproxy-4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x.rpm (container-tools:rhel8)",
"product_id": "podman-gvproxy-4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-gvproxy@4.4.1-19.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=s390x\u0026epoch=3\u0026rpmmod=container-tools:rhel8:8080020240422101606:0f77c1b7"
}
}
},
{
"category": "product_version",
"name": "podman-gvproxy-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"product": {
"name": "podman-gvproxy-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x.rpm (container-tools:rhel8)",
"product_id": "podman-gvproxy-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-gvproxy-debuginfo@4.4.1-19.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=s390x\u0026epoch=3\u0026rpmmod=container-tools:rhel8:8080020240422101606:0f77c1b7"
}
}
},
{
"category": "product_version",
"name": "podman-plugins-4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"product": {
"name": "podman-plugins-4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x.rpm (container-tools:rhel8)",
"product_id": "podman-plugins-4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-plugins@4.4.1-19.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=s390x\u0026epoch=3\u0026rpmmod=container-tools:rhel8:8080020240422101606:0f77c1b7"
}
}
},
{
"category": "product_version",
"name": "podman-plugins-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"product": {
"name": "podman-plugins-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x.rpm (container-tools:rhel8)",
"product_id": "podman-plugins-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-plugins-debuginfo@4.4.1-19.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=s390x\u0026epoch=3\u0026rpmmod=container-tools:rhel8:8080020240422101606:0f77c1b7"
}
}
},
{
"category": "product_version",
"name": "podman-remote-4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"product": {
"name": "podman-remote-4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x.rpm (container-tools:rhel8)",
"product_id": "podman-remote-4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-remote@4.4.1-19.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=s390x\u0026epoch=3\u0026rpmmod=container-tools:rhel8:8080020240422101606:0f77c1b7"
}
}
},
{
"category": "product_version",
"name": "podman-remote-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"product": {
"name": "podman-remote-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x.rpm (container-tools:rhel8)",
"product_id": "podman-remote-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-remote-debuginfo@4.4.1-19.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=s390x\u0026epoch=3\u0026rpmmod=container-tools:rhel8:8080020240422101606:0f77c1b7"
}
}
},
{
"category": "product_version",
"name": "podman-tests-4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"product": {
"name": "podman-tests-4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x.rpm (container-tools:rhel8)",
"product_id": "podman-tests-4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-tests@4.4.1-19.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=s390x\u0026epoch=3\u0026rpmmod=container-tools:rhel8:8080020240422101606:0f77c1b7"
}
}
},
{
"category": "product_version",
"name": "python3-criu-3.15-4.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"product": {
"name": "python3-criu-3.15-4.module+el8.8.0+21741+dd5be1e7.s390x.rpm (container-tools:rhel8)",
"product_id": "python3-criu-3.15-4.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-criu@3.15-4.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=s390x\u0026rpmmod=container-tools:rhel8:8080020240422101606:0f77c1b7"
}
}
},
{
"category": "product_version",
"name": "runc-1.1.12-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"product": {
"name": "runc-1.1.12-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm (container-tools:rhel8)",
"product_id": "runc-1.1.12-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/runc@1.1.12-1.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=s390x\u0026epoch=1\u0026rpmmod=container-tools:rhel8:8080020240422101606:0f77c1b7"
}
}
},
{
"category": "product_version",
"name": "runc-debuginfo-1.1.12-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"product": {
"name": "runc-debuginfo-1.1.12-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm (container-tools:rhel8)",
"product_id": "runc-debuginfo-1.1.12-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/runc-debuginfo@1.1.12-1.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=s390x\u0026epoch=1\u0026rpmmod=container-tools:rhel8:8080020240422101606:0f77c1b7"
}
}
},
{
"category": "product_version",
"name": "runc-debugsource-1.1.12-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"product": {
"name": "runc-debugsource-1.1.12-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm (container-tools:rhel8)",
"product_id": "runc-debugsource-1.1.12-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/runc-debugsource@1.1.12-1.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=s390x\u0026epoch=1\u0026rpmmod=container-tools:rhel8:8080020240422101606:0f77c1b7"
}
}
},
{
"category": "product_version",
"name": "skopeo-1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"product": {
"name": "skopeo-1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.s390x.rpm (container-tools:rhel8)",
"product_id": "skopeo-1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/skopeo@1.11.2-0.2.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=s390x\u0026epoch=2\u0026rpmmod=container-tools:rhel8:8080020240422101606:0f77c1b7"
}
}
},
{
"category": "product_version",
"name": "skopeo-tests-1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"product": {
"name": "skopeo-tests-1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.s390x.rpm (container-tools:rhel8)",
"product_id": "skopeo-tests-1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/skopeo-tests@1.11.2-0.2.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=s390x\u0026epoch=2\u0026rpmmod=container-tools:rhel8:8080020240422101606:0f77c1b7"
}
}
},
{
"category": "product_version",
"name": "slirp4netns-1.2.0-3.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"product": {
"name": "slirp4netns-1.2.0-3.module+el8.8.0+21741+dd5be1e7.s390x.rpm (container-tools:rhel8)",
"product_id": "slirp4netns-1.2.0-3.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/slirp4netns@1.2.0-3.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=s390x\u0026rpmmod=container-tools:rhel8:8080020240422101606:0f77c1b7"
}
}
},
{
"category": "product_version",
"name": "slirp4netns-debuginfo-1.2.0-3.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"product": {
"name": "slirp4netns-debuginfo-1.2.0-3.module+el8.8.0+21741+dd5be1e7.s390x.rpm (container-tools:rhel8)",
"product_id": "slirp4netns-debuginfo-1.2.0-3.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/slirp4netns-debuginfo@1.2.0-3.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=s390x\u0026rpmmod=container-tools:rhel8:8080020240422101606:0f77c1b7"
}
}
},
{
"category": "product_version",
"name": "slirp4netns-debugsource-1.2.0-3.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"product": {
"name": "slirp4netns-debugsource-1.2.0-3.module+el8.8.0+21741+dd5be1e7.s390x.rpm (container-tools:rhel8)",
"product_id": "slirp4netns-debugsource-1.2.0-3.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/slirp4netns-debugsource@1.2.0-3.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=s390x\u0026rpmmod=container-tools:rhel8:8080020240422101606:0f77c1b7"
}
}
},
{
"category": "product_version",
"name": "toolbox-0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"product": {
"name": "toolbox-0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.s390x.rpm (container-tools:rhel8)",
"product_id": "toolbox-0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/toolbox@0.0.99.3-7.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=s390x\u0026rpmmod=container-tools:rhel8:8080020240422101606:0f77c1b7"
}
}
},
{
"category": "product_version",
"name": "toolbox-debuginfo-0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"product": {
"name": "toolbox-debuginfo-0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.s390x.rpm (container-tools:rhel8)",
"product_id": "toolbox-debuginfo-0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/toolbox-debuginfo@0.0.99.3-7.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=s390x\u0026rpmmod=container-tools:rhel8:8080020240422101606:0f77c1b7"
}
}
},
{
"category": "product_version",
"name": "toolbox-debugsource-0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"product": {
"name": "toolbox-debugsource-0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.s390x.rpm (container-tools:rhel8)",
"product_id": "toolbox-debugsource-0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/toolbox-debugsource@0.0.99.3-7.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=s390x\u0026rpmmod=container-tools:rhel8:8080020240422101606:0f77c1b7"
}
}
},
{
"category": "product_version",
"name": "toolbox-tests-0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"product": {
"name": "toolbox-tests-0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.s390x.rpm (container-tools:rhel8)",
"product_id": "toolbox-tests-0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/toolbox-tests@0.0.99.3-7.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=s390x\u0026rpmmod=container-tools:rhel8:8080020240422101606:0f77c1b7"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "aardvark-dns-1.5.0-2.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"product": {
"name": "aardvark-dns-1.5.0-2.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm (container-tools:rhel8)",
"product_id": "aardvark-dns-1.5.0-2.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/aardvark-dns@1.5.0-2.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=ppc64le\u0026epoch=2\u0026rpmmod=container-tools:rhel8:8080020240422101606:0f77c1b7"
}
}
},
{
"category": "product_version",
"name": "buildah-1.29.3-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"product": {
"name": "buildah-1.29.3-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm (container-tools:rhel8)",
"product_id": "buildah-1.29.3-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/buildah@1.29.3-1.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=ppc64le\u0026epoch=1\u0026rpmmod=container-tools:rhel8:8080020240422101606:0f77c1b7"
}
}
},
{
"category": "product_version",
"name": "buildah-debuginfo-1.29.3-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"product": {
"name": "buildah-debuginfo-1.29.3-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm (container-tools:rhel8)",
"product_id": "buildah-debuginfo-1.29.3-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/buildah-debuginfo@1.29.3-1.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=ppc64le\u0026epoch=1\u0026rpmmod=container-tools:rhel8:8080020240422101606:0f77c1b7"
}
}
},
{
"category": "product_version",
"name": "buildah-debugsource-1.29.3-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"product": {
"name": "buildah-debugsource-1.29.3-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm (container-tools:rhel8)",
"product_id": "buildah-debugsource-1.29.3-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/buildah-debugsource@1.29.3-1.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=ppc64le\u0026epoch=1\u0026rpmmod=container-tools:rhel8:8080020240422101606:0f77c1b7"
}
}
},
{
"category": "product_version",
"name": "buildah-tests-1.29.3-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"product": {
"name": "buildah-tests-1.29.3-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm (container-tools:rhel8)",
"product_id": "buildah-tests-1.29.3-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/buildah-tests@1.29.3-1.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=ppc64le\u0026epoch=1\u0026rpmmod=container-tools:rhel8:8080020240422101606:0f77c1b7"
}
}
},
{
"category": "product_version",
"name": "buildah-tests-debuginfo-1.29.3-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"product": {
"name": "buildah-tests-debuginfo-1.29.3-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm (container-tools:rhel8)",
"product_id": "buildah-tests-debuginfo-1.29.3-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/buildah-tests-debuginfo@1.29.3-1.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=ppc64le\u0026epoch=1\u0026rpmmod=container-tools:rhel8:8080020240422101606:0f77c1b7"
}
}
},
{
"category": "product_version",
"name": "conmon-2.1.6-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"product": {
"name": "conmon-2.1.6-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm (container-tools:rhel8)",
"product_id": "conmon-2.1.6-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/conmon@2.1.6-1.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=ppc64le\u0026epoch=3\u0026rpmmod=container-tools:rhel8:8080020240422101606:0f77c1b7"
}
}
},
{
"category": "product_version",
"name": "conmon-debuginfo-2.1.6-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"product": {
"name": "conmon-debuginfo-2.1.6-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm (container-tools:rhel8)",
"product_id": "conmon-debuginfo-2.1.6-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/conmon-debuginfo@2.1.6-1.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=ppc64le\u0026epoch=3\u0026rpmmod=container-tools:rhel8:8080020240422101606:0f77c1b7"
}
}
},
{
"category": "product_version",
"name": "conmon-debugsource-2.1.6-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"product": {
"name": "conmon-debugsource-2.1.6-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm (container-tools:rhel8)",
"product_id": "conmon-debugsource-2.1.6-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/conmon-debugsource@2.1.6-1.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=ppc64le\u0026epoch=3\u0026rpmmod=container-tools:rhel8:8080020240422101606:0f77c1b7"
}
}
},
{
"category": "product_version",
"name": "containernetworking-plugins-1.2.0-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"product": {
"name": "containernetworking-plugins-1.2.0-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm (container-tools:rhel8)",
"product_id": "containernetworking-plugins-1.2.0-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/containernetworking-plugins@1.2.0-1.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=ppc64le\u0026epoch=1\u0026rpmmod=container-tools:rhel8:8080020240422101606:0f77c1b7"
}
}
},
{
"category": "product_version",
"name": "containernetworking-plugins-debuginfo-1.2.0-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"product": {
"name": "containernetworking-plugins-debuginfo-1.2.0-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm (container-tools:rhel8)",
"product_id": "containernetworking-plugins-debuginfo-1.2.0-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/containernetworking-plugins-debuginfo@1.2.0-1.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=ppc64le\u0026epoch=1\u0026rpmmod=container-tools:rhel8:8080020240422101606:0f77c1b7"
}
}
},
{
"category": "product_version",
"name": "containernetworking-plugins-debugsource-1.2.0-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"product": {
"name": "containernetworking-plugins-debugsource-1.2.0-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm (container-tools:rhel8)",
"product_id": "containernetworking-plugins-debugsource-1.2.0-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/containernetworking-plugins-debugsource@1.2.0-1.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=ppc64le\u0026epoch=1\u0026rpmmod=container-tools:rhel8:8080020240422101606:0f77c1b7"
}
}
},
{
"category": "product_version",
"name": "containers-common-1-65.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"product": {
"name": "containers-common-1-65.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm (container-tools:rhel8)",
"product_id": "containers-common-1-65.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/containers-common@1-65.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=ppc64le\u0026epoch=2\u0026rpmmod=container-tools:rhel8:8080020240422101606:0f77c1b7"
}
}
},
{
"category": "product_version",
"name": "crit-3.15-4.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"product": {
"name": "crit-3.15-4.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm (container-tools:rhel8)",
"product_id": "crit-3.15-4.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/crit@3.15-4.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=ppc64le\u0026rpmmod=container-tools:rhel8:8080020240422101606:0f77c1b7"
}
}
},
{
"category": "product_version",
"name": "criu-3.15-4.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"product": {
"name": "criu-3.15-4.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm (container-tools:rhel8)",
"product_id": "criu-3.15-4.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/criu@3.15-4.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=ppc64le\u0026rpmmod=container-tools:rhel8:8080020240422101606:0f77c1b7"
}
}
},
{
"category": "product_version",
"name": "criu-debuginfo-3.15-4.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"product": {
"name": "criu-debuginfo-3.15-4.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm (container-tools:rhel8)",
"product_id": "criu-debuginfo-3.15-4.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/criu-debuginfo@3.15-4.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=ppc64le\u0026rpmmod=container-tools:rhel8:8080020240422101606:0f77c1b7"
}
}
},
{
"category": "product_version",
"name": "criu-debugsource-3.15-4.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"product": {
"name": "criu-debugsource-3.15-4.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm (container-tools:rhel8)",
"product_id": "criu-debugsource-3.15-4.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/criu-debugsource@3.15-4.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=ppc64le\u0026rpmmod=container-tools:rhel8:8080020240422101606:0f77c1b7"
}
}
},
{
"category": "product_version",
"name": "criu-devel-3.15-4.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"product": {
"name": "criu-devel-3.15-4.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm (container-tools:rhel8)",
"product_id": "criu-devel-3.15-4.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/criu-devel@3.15-4.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=ppc64le\u0026rpmmod=container-tools:rhel8:8080020240422101606:0f77c1b7"
}
}
},
{
"category": "product_version",
"name": "criu-libs-3.15-4.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"product": {
"name": "criu-libs-3.15-4.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm (container-tools:rhel8)",
"product_id": "criu-libs-3.15-4.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/criu-libs@3.15-4.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=ppc64le\u0026rpmmod=container-tools:rhel8:8080020240422101606:0f77c1b7"
}
}
},
{
"category": "product_version",
"name": "criu-libs-debuginfo-3.15-4.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"product": {
"name": "criu-libs-debuginfo-3.15-4.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm (container-tools:rhel8)",
"product_id": "criu-libs-debuginfo-3.15-4.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/criu-libs-debuginfo@3.15-4.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=ppc64le\u0026rpmmod=container-tools:rhel8:8080020240422101606:0f77c1b7"
}
}
},
{
"category": "product_version",
"name": "crun-1.8.4-2.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"product": {
"name": "crun-1.8.4-2.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm (container-tools:rhel8)",
"product_id": "crun-1.8.4-2.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/crun@1.8.4-2.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=ppc64le\u0026rpmmod=container-tools:rhel8:8080020240422101606:0f77c1b7"
}
}
},
{
"category": "product_version",
"name": "crun-debuginfo-1.8.4-2.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"product": {
"name": "crun-debuginfo-1.8.4-2.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm (container-tools:rhel8)",
"product_id": "crun-debuginfo-1.8.4-2.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/crun-debuginfo@1.8.4-2.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=ppc64le\u0026rpmmod=container-tools:rhel8:8080020240422101606:0f77c1b7"
}
}
},
{
"category": "product_version",
"name": "crun-debugsource-1.8.4-2.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"product": {
"name": "crun-debugsource-1.8.4-2.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm (container-tools:rhel8)",
"product_id": "crun-debugsource-1.8.4-2.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/crun-debugsource@1.8.4-2.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=ppc64le\u0026rpmmod=container-tools:rhel8:8080020240422101606:0f77c1b7"
}
}
},
{
"category": "product_version",
"name": "fuse-overlayfs-1.11-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"product": {
"name": "fuse-overlayfs-1.11-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm (container-tools:rhel8)",
"product_id": "fuse-overlayfs-1.11-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fuse-overlayfs@1.11-1.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=ppc64le\u0026rpmmod=container-tools:rhel8:8080020240422101606:0f77c1b7"
}
}
},
{
"category": "product_version",
"name": "fuse-overlayfs-debuginfo-1.11-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"product": {
"name": "fuse-overlayfs-debuginfo-1.11-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm (container-tools:rhel8)",
"product_id": "fuse-overlayfs-debuginfo-1.11-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fuse-overlayfs-debuginfo@1.11-1.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=ppc64le\u0026rpmmod=container-tools:rhel8:8080020240422101606:0f77c1b7"
}
}
},
{
"category": "product_version",
"name": "fuse-overlayfs-debugsource-1.11-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"product": {
"name": "fuse-overlayfs-debugsource-1.11-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm (container-tools:rhel8)",
"product_id": "fuse-overlayfs-debugsource-1.11-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fuse-overlayfs-debugsource@1.11-1.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=ppc64le\u0026rpmmod=container-tools:rhel8:8080020240422101606:0f77c1b7"
}
}
},
{
"category": "product_version",
"name": "libslirp-4.4.0-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"product": {
"name": "libslirp-4.4.0-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm (container-tools:rhel8)",
"product_id": "libslirp-4.4.0-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libslirp@4.4.0-1.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=ppc64le\u0026rpmmod=container-tools:rhel8:8080020240422101606:0f77c1b7"
}
}
},
{
"category": "product_version",
"name": "libslirp-debuginfo-4.4.0-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"product": {
"name": "libslirp-debuginfo-4.4.0-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm (container-tools:rhel8)",
"product_id": "libslirp-debuginfo-4.4.0-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libslirp-debuginfo@4.4.0-1.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=ppc64le\u0026rpmmod=container-tools:rhel8:8080020240422101606:0f77c1b7"
}
}
},
{
"category": "product_version",
"name": "libslirp-debugsource-4.4.0-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"product": {
"name": "libslirp-debugsource-4.4.0-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm (container-tools:rhel8)",
"product_id": "libslirp-debugsource-4.4.0-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libslirp-debugsource@4.4.0-1.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=ppc64le\u0026rpmmod=container-tools:rhel8:8080020240422101606:0f77c1b7"
}
}
},
{
"category": "product_version",
"name": "libslirp-devel-4.4.0-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"product": {
"name": "libslirp-devel-4.4.0-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm (container-tools:rhel8)",
"product_id": "libslirp-devel-4.4.0-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libslirp-devel@4.4.0-1.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=ppc64le\u0026rpmmod=container-tools:rhel8:8080020240422101606:0f77c1b7"
}
}
},
{
"category": "product_version",
"name": "netavark-1.5.1-3.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"product": {
"name": "netavark-1.5.1-3.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm (container-tools:rhel8)",
"product_id": "netavark-1.5.1-3.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/netavark@1.5.1-3.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=ppc64le\u0026epoch=2\u0026rpmmod=container-tools:rhel8:8080020240422101606:0f77c1b7"
}
}
},
{
"category": "product_version",
"name": "oci-seccomp-bpf-hook-1.2.8-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"product": {
"name": "oci-seccomp-bpf-hook-1.2.8-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm (container-tools:rhel8)",
"product_id": "oci-seccomp-bpf-hook-1.2.8-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/oci-seccomp-bpf-hook@1.2.8-1.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=ppc64le\u0026rpmmod=container-tools:rhel8:8080020240422101606:0f77c1b7"
}
}
},
{
"category": "product_version",
"name": "oci-seccomp-bpf-hook-debuginfo-1.2.8-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"product": {
"name": "oci-seccomp-bpf-hook-debuginfo-1.2.8-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm (container-tools:rhel8)",
"product_id": "oci-seccomp-bpf-hook-debuginfo-1.2.8-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/oci-seccomp-bpf-hook-debuginfo@1.2.8-1.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=ppc64le\u0026rpmmod=container-tools:rhel8:8080020240422101606:0f77c1b7"
}
}
},
{
"category": "product_version",
"name": "oci-seccomp-bpf-hook-debugsource-1.2.8-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"product": {
"name": "oci-seccomp-bpf-hook-debugsource-1.2.8-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm (container-tools:rhel8)",
"product_id": "oci-seccomp-bpf-hook-debugsource-1.2.8-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/oci-seccomp-bpf-hook-debugsource@1.2.8-1.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=ppc64le\u0026rpmmod=container-tools:rhel8:8080020240422101606:0f77c1b7"
}
}
},
{
"category": "product_version",
"name": "podman-4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"product": {
"name": "podman-4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm (container-tools:rhel8)",
"product_id": "podman-4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman@4.4.1-19.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=ppc64le\u0026epoch=3\u0026rpmmod=container-tools:rhel8:8080020240422101606:0f77c1b7"
}
}
},
{
"category": "product_version",
"name": "podman-catatonit-4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"product": {
"name": "podman-catatonit-4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm (container-tools:rhel8)",
"product_id": "podman-catatonit-4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-catatonit@4.4.1-19.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=ppc64le\u0026epoch=3\u0026rpmmod=container-tools:rhel8:8080020240422101606:0f77c1b7"
}
}
},
{
"category": "product_version",
"name": "podman-catatonit-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"product": {
"name": "podman-catatonit-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm (container-tools:rhel8)",
"product_id": "podman-catatonit-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-catatonit-debuginfo@4.4.1-19.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=ppc64le\u0026epoch=3\u0026rpmmod=container-tools:rhel8:8080020240422101606:0f77c1b7"
}
}
},
{
"category": "product_version",
"name": "podman-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"product": {
"name": "podman-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm (container-tools:rhel8)",
"product_id": "podman-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-debuginfo@4.4.1-19.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=ppc64le\u0026epoch=3\u0026rpmmod=container-tools:rhel8:8080020240422101606:0f77c1b7"
}
}
},
{
"category": "product_version",
"name": "podman-debugsource-4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"product": {
"name": "podman-debugsource-4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm (container-tools:rhel8)",
"product_id": "podman-debugsource-4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-debugsource@4.4.1-19.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=ppc64le\u0026epoch=3\u0026rpmmod=container-tools:rhel8:8080020240422101606:0f77c1b7"
}
}
},
{
"category": "product_version",
"name": "podman-gvproxy-4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"product": {
"name": "podman-gvproxy-4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm (container-tools:rhel8)",
"product_id": "podman-gvproxy-4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-gvproxy@4.4.1-19.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=ppc64le\u0026epoch=3\u0026rpmmod=container-tools:rhel8:8080020240422101606:0f77c1b7"
}
}
},
{
"category": "product_version",
"name": "podman-gvproxy-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"product": {
"name": "podman-gvproxy-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm (container-tools:rhel8)",
"product_id": "podman-gvproxy-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-gvproxy-debuginfo@4.4.1-19.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=ppc64le\u0026epoch=3\u0026rpmmod=container-tools:rhel8:8080020240422101606:0f77c1b7"
}
}
},
{
"category": "product_version",
"name": "podman-plugins-4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"product": {
"name": "podman-plugins-4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm (container-tools:rhel8)",
"product_id": "podman-plugins-4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-plugins@4.4.1-19.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=ppc64le\u0026epoch=3\u0026rpmmod=container-tools:rhel8:8080020240422101606:0f77c1b7"
}
}
},
{
"category": "product_version",
"name": "podman-plugins-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"product": {
"name": "podman-plugins-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm (container-tools:rhel8)",
"product_id": "podman-plugins-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-plugins-debuginfo@4.4.1-19.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=ppc64le\u0026epoch=3\u0026rpmmod=container-tools:rhel8:8080020240422101606:0f77c1b7"
}
}
},
{
"category": "product_version",
"name": "podman-remote-4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"product": {
"name": "podman-remote-4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm (container-tools:rhel8)",
"product_id": "podman-remote-4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-remote@4.4.1-19.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=ppc64le\u0026epoch=3\u0026rpmmod=container-tools:rhel8:8080020240422101606:0f77c1b7"
}
}
},
{
"category": "product_version",
"name": "podman-remote-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"product": {
"name": "podman-remote-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm (container-tools:rhel8)",
"product_id": "podman-remote-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-remote-debuginfo@4.4.1-19.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=ppc64le\u0026epoch=3\u0026rpmmod=container-tools:rhel8:8080020240422101606:0f77c1b7"
}
}
},
{
"category": "product_version",
"name": "podman-tests-4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"product": {
"name": "podman-tests-4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm (container-tools:rhel8)",
"product_id": "podman-tests-4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-tests@4.4.1-19.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=ppc64le\u0026epoch=3\u0026rpmmod=container-tools:rhel8:8080020240422101606:0f77c1b7"
}
}
},
{
"category": "product_version",
"name": "python3-criu-3.15-4.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"product": {
"name": "python3-criu-3.15-4.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm (container-tools:rhel8)",
"product_id": "python3-criu-3.15-4.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-criu@3.15-4.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=ppc64le\u0026rpmmod=container-tools:rhel8:8080020240422101606:0f77c1b7"
}
}
},
{
"category": "product_version",
"name": "runc-1.1.12-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"product": {
"name": "runc-1.1.12-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm (container-tools:rhel8)",
"product_id": "runc-1.1.12-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/runc@1.1.12-1.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=ppc64le\u0026epoch=1\u0026rpmmod=container-tools:rhel8:8080020240422101606:0f77c1b7"
}
}
},
{
"category": "product_version",
"name": "runc-debuginfo-1.1.12-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"product": {
"name": "runc-debuginfo-1.1.12-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm (container-tools:rhel8)",
"product_id": "runc-debuginfo-1.1.12-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/runc-debuginfo@1.1.12-1.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=ppc64le\u0026epoch=1\u0026rpmmod=container-tools:rhel8:8080020240422101606:0f77c1b7"
}
}
},
{
"category": "product_version",
"name": "runc-debugsource-1.1.12-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"product": {
"name": "runc-debugsource-1.1.12-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm (container-tools:rhel8)",
"product_id": "runc-debugsource-1.1.12-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/runc-debugsource@1.1.12-1.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=ppc64le\u0026epoch=1\u0026rpmmod=container-tools:rhel8:8080020240422101606:0f77c1b7"
}
}
},
{
"category": "product_version",
"name": "skopeo-1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"product": {
"name": "skopeo-1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm (container-tools:rhel8)",
"product_id": "skopeo-1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/skopeo@1.11.2-0.2.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=ppc64le\u0026epoch=2\u0026rpmmod=container-tools:rhel8:8080020240422101606:0f77c1b7"
}
}
},
{
"category": "product_version",
"name": "skopeo-tests-1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"product": {
"name": "skopeo-tests-1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm (container-tools:rhel8)",
"product_id": "skopeo-tests-1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/skopeo-tests@1.11.2-0.2.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=ppc64le\u0026epoch=2\u0026rpmmod=container-tools:rhel8:8080020240422101606:0f77c1b7"
}
}
},
{
"category": "product_version",
"name": "slirp4netns-1.2.0-3.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"product": {
"name": "slirp4netns-1.2.0-3.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm (container-tools:rhel8)",
"product_id": "slirp4netns-1.2.0-3.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/slirp4netns@1.2.0-3.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=ppc64le\u0026rpmmod=container-tools:rhel8:8080020240422101606:0f77c1b7"
}
}
},
{
"category": "product_version",
"name": "slirp4netns-debuginfo-1.2.0-3.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"product": {
"name": "slirp4netns-debuginfo-1.2.0-3.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm (container-tools:rhel8)",
"product_id": "slirp4netns-debuginfo-1.2.0-3.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/slirp4netns-debuginfo@1.2.0-3.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=ppc64le\u0026rpmmod=container-tools:rhel8:8080020240422101606:0f77c1b7"
}
}
},
{
"category": "product_version",
"name": "slirp4netns-debugsource-1.2.0-3.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"product": {
"name": "slirp4netns-debugsource-1.2.0-3.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm (container-tools:rhel8)",
"product_id": "slirp4netns-debugsource-1.2.0-3.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/slirp4netns-debugsource@1.2.0-3.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=ppc64le\u0026rpmmod=container-tools:rhel8:8080020240422101606:0f77c1b7"
}
}
},
{
"category": "product_version",
"name": "toolbox-0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"product": {
"name": "toolbox-0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm (container-tools:rhel8)",
"product_id": "toolbox-0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/toolbox@0.0.99.3-7.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=ppc64le\u0026rpmmod=container-tools:rhel8:8080020240422101606:0f77c1b7"
}
}
},
{
"category": "product_version",
"name": "toolbox-debuginfo-0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"product": {
"name": "toolbox-debuginfo-0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm (container-tools:rhel8)",
"product_id": "toolbox-debuginfo-0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/toolbox-debuginfo@0.0.99.3-7.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=ppc64le\u0026rpmmod=container-tools:rhel8:8080020240422101606:0f77c1b7"
}
}
},
{
"category": "product_version",
"name": "toolbox-debugsource-0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"product": {
"name": "toolbox-debugsource-0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm (container-tools:rhel8)",
"product_id": "toolbox-debugsource-0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/toolbox-debugsource@0.0.99.3-7.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=ppc64le\u0026rpmmod=container-tools:rhel8:8080020240422101606:0f77c1b7"
}
}
},
{
"category": "product_version",
"name": "toolbox-tests-0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"product": {
"name": "toolbox-tests-0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm (container-tools:rhel8)",
"product_id": "toolbox-tests-0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/toolbox-tests@0.0.99.3-7.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=ppc64le\u0026rpmmod=container-tools:rhel8:8080020240422101606:0f77c1b7"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "aardvark-dns-1.5.0-2.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"product": {
"name": "aardvark-dns-1.5.0-2.module+el8.8.0+21741+dd5be1e7.aarch64.rpm (container-tools:rhel8)",
"product_id": "aardvark-dns-1.5.0-2.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/aardvark-dns@1.5.0-2.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=aarch64\u0026epoch=2\u0026rpmmod=container-tools:rhel8:8080020240422101606:0f77c1b7"
}
}
},
{
"category": "product_version",
"name": "buildah-1.29.3-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"product": {
"name": "buildah-1.29.3-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm (container-tools:rhel8)",
"product_id": "buildah-1.29.3-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/buildah@1.29.3-1.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=aarch64\u0026epoch=1\u0026rpmmod=container-tools:rhel8:8080020240422101606:0f77c1b7"
}
}
},
{
"category": "product_version",
"name": "buildah-debuginfo-1.29.3-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"product": {
"name": "buildah-debuginfo-1.29.3-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm (container-tools:rhel8)",
"product_id": "buildah-debuginfo-1.29.3-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/buildah-debuginfo@1.29.3-1.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=aarch64\u0026epoch=1\u0026rpmmod=container-tools:rhel8:8080020240422101606:0f77c1b7"
}
}
},
{
"category": "product_version",
"name": "buildah-debugsource-1.29.3-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"product": {
"name": "buildah-debugsource-1.29.3-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm (container-tools:rhel8)",
"product_id": "buildah-debugsource-1.29.3-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/buildah-debugsource@1.29.3-1.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=aarch64\u0026epoch=1\u0026rpmmod=container-tools:rhel8:8080020240422101606:0f77c1b7"
}
}
},
{
"category": "product_version",
"name": "buildah-tests-1.29.3-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"product": {
"name": "buildah-tests-1.29.3-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm (container-tools:rhel8)",
"product_id": "buildah-tests-1.29.3-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/buildah-tests@1.29.3-1.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=aarch64\u0026epoch=1\u0026rpmmod=container-tools:rhel8:8080020240422101606:0f77c1b7"
}
}
},
{
"category": "product_version",
"name": "buildah-tests-debuginfo-1.29.3-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"product": {
"name": "buildah-tests-debuginfo-1.29.3-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm (container-tools:rhel8)",
"product_id": "buildah-tests-debuginfo-1.29.3-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/buildah-tests-debuginfo@1.29.3-1.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=aarch64\u0026epoch=1\u0026rpmmod=container-tools:rhel8:8080020240422101606:0f77c1b7"
}
}
},
{
"category": "product_version",
"name": "conmon-2.1.6-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"product": {
"name": "conmon-2.1.6-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm (container-tools:rhel8)",
"product_id": "conmon-2.1.6-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/conmon@2.1.6-1.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=aarch64\u0026epoch=3\u0026rpmmod=container-tools:rhel8:8080020240422101606:0f77c1b7"
}
}
},
{
"category": "product_version",
"name": "conmon-debuginfo-2.1.6-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"product": {
"name": "conmon-debuginfo-2.1.6-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm (container-tools:rhel8)",
"product_id": "conmon-debuginfo-2.1.6-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/conmon-debuginfo@2.1.6-1.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=aarch64\u0026epoch=3\u0026rpmmod=container-tools:rhel8:8080020240422101606:0f77c1b7"
}
}
},
{
"category": "product_version",
"name": "conmon-debugsource-2.1.6-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"product": {
"name": "conmon-debugsource-2.1.6-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm (container-tools:rhel8)",
"product_id": "conmon-debugsource-2.1.6-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/conmon-debugsource@2.1.6-1.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=aarch64\u0026epoch=3\u0026rpmmod=container-tools:rhel8:8080020240422101606:0f77c1b7"
}
}
},
{
"category": "product_version",
"name": "containernetworking-plugins-1.2.0-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"product": {
"name": "containernetworking-plugins-1.2.0-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm (container-tools:rhel8)",
"product_id": "containernetworking-plugins-1.2.0-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/containernetworking-plugins@1.2.0-1.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=aarch64\u0026epoch=1\u0026rpmmod=container-tools:rhel8:8080020240422101606:0f77c1b7"
}
}
},
{
"category": "product_version",
"name": "containernetworking-plugins-debuginfo-1.2.0-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"product": {
"name": "containernetworking-plugins-debuginfo-1.2.0-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm (container-tools:rhel8)",
"product_id": "containernetworking-plugins-debuginfo-1.2.0-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/containernetworking-plugins-debuginfo@1.2.0-1.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=aarch64\u0026epoch=1\u0026rpmmod=container-tools:rhel8:8080020240422101606:0f77c1b7"
}
}
},
{
"category": "product_version",
"name": "containernetworking-plugins-debugsource-1.2.0-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"product": {
"name": "containernetworking-plugins-debugsource-1.2.0-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm (container-tools:rhel8)",
"product_id": "containernetworking-plugins-debugsource-1.2.0-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/containernetworking-plugins-debugsource@1.2.0-1.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=aarch64\u0026epoch=1\u0026rpmmod=container-tools:rhel8:8080020240422101606:0f77c1b7"
}
}
},
{
"category": "product_version",
"name": "containers-common-1-65.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"product": {
"name": "containers-common-1-65.module+el8.8.0+21741+dd5be1e7.aarch64.rpm (container-tools:rhel8)",
"product_id": "containers-common-1-65.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/containers-common@1-65.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=aarch64\u0026epoch=2\u0026rpmmod=container-tools:rhel8:8080020240422101606:0f77c1b7"
}
}
},
{
"category": "product_version",
"name": "crit-3.15-4.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"product": {
"name": "crit-3.15-4.module+el8.8.0+21741+dd5be1e7.aarch64.rpm (container-tools:rhel8)",
"product_id": "crit-3.15-4.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/crit@3.15-4.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=aarch64\u0026rpmmod=container-tools:rhel8:8080020240422101606:0f77c1b7"
}
}
},
{
"category": "product_version",
"name": "criu-3.15-4.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"product": {
"name": "criu-3.15-4.module+el8.8.0+21741+dd5be1e7.aarch64.rpm (container-tools:rhel8)",
"product_id": "criu-3.15-4.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/criu@3.15-4.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=aarch64\u0026rpmmod=container-tools:rhel8:8080020240422101606:0f77c1b7"
}
}
},
{
"category": "product_version",
"name": "criu-debuginfo-3.15-4.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"product": {
"name": "criu-debuginfo-3.15-4.module+el8.8.0+21741+dd5be1e7.aarch64.rpm (container-tools:rhel8)",
"product_id": "criu-debuginfo-3.15-4.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/criu-debuginfo@3.15-4.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=aarch64\u0026rpmmod=container-tools:rhel8:8080020240422101606:0f77c1b7"
}
}
},
{
"category": "product_version",
"name": "criu-debugsource-3.15-4.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"product": {
"name": "criu-debugsource-3.15-4.module+el8.8.0+21741+dd5be1e7.aarch64.rpm (container-tools:rhel8)",
"product_id": "criu-debugsource-3.15-4.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/criu-debugsource@3.15-4.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=aarch64\u0026rpmmod=container-tools:rhel8:8080020240422101606:0f77c1b7"
}
}
},
{
"category": "product_version",
"name": "criu-devel-3.15-4.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"product": {
"name": "criu-devel-3.15-4.module+el8.8.0+21741+dd5be1e7.aarch64.rpm (container-tools:rhel8)",
"product_id": "criu-devel-3.15-4.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/criu-devel@3.15-4.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=aarch64\u0026rpmmod=container-tools:rhel8:8080020240422101606:0f77c1b7"
}
}
},
{
"category": "product_version",
"name": "criu-libs-3.15-4.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"product": {
"name": "criu-libs-3.15-4.module+el8.8.0+21741+dd5be1e7.aarch64.rpm (container-tools:rhel8)",
"product_id": "criu-libs-3.15-4.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/criu-libs@3.15-4.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=aarch64\u0026rpmmod=container-tools:rhel8:8080020240422101606:0f77c1b7"
}
}
},
{
"category": "product_version",
"name": "criu-libs-debuginfo-3.15-4.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"product": {
"name": "criu-libs-debuginfo-3.15-4.module+el8.8.0+21741+dd5be1e7.aarch64.rpm (container-tools:rhel8)",
"product_id": "criu-libs-debuginfo-3.15-4.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/criu-libs-debuginfo@3.15-4.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=aarch64\u0026rpmmod=container-tools:rhel8:8080020240422101606:0f77c1b7"
}
}
},
{
"category": "product_version",
"name": "crun-1.8.4-2.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"product": {
"name": "crun-1.8.4-2.module+el8.8.0+21741+dd5be1e7.aarch64.rpm (container-tools:rhel8)",
"product_id": "crun-1.8.4-2.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/crun@1.8.4-2.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=aarch64\u0026rpmmod=container-tools:rhel8:8080020240422101606:0f77c1b7"
}
}
},
{
"category": "product_version",
"name": "crun-debuginfo-1.8.4-2.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"product": {
"name": "crun-debuginfo-1.8.4-2.module+el8.8.0+21741+dd5be1e7.aarch64.rpm (container-tools:rhel8)",
"product_id": "crun-debuginfo-1.8.4-2.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/crun-debuginfo@1.8.4-2.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=aarch64\u0026rpmmod=container-tools:rhel8:8080020240422101606:0f77c1b7"
}
}
},
{
"category": "product_version",
"name": "crun-debugsource-1.8.4-2.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"product": {
"name": "crun-debugsource-1.8.4-2.module+el8.8.0+21741+dd5be1e7.aarch64.rpm (container-tools:rhel8)",
"product_id": "crun-debugsource-1.8.4-2.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/crun-debugsource@1.8.4-2.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=aarch64\u0026rpmmod=container-tools:rhel8:8080020240422101606:0f77c1b7"
}
}
},
{
"category": "product_version",
"name": "fuse-overlayfs-1.11-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"product": {
"name": "fuse-overlayfs-1.11-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm (container-tools:rhel8)",
"product_id": "fuse-overlayfs-1.11-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fuse-overlayfs@1.11-1.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=aarch64\u0026rpmmod=container-tools:rhel8:8080020240422101606:0f77c1b7"
}
}
},
{
"category": "product_version",
"name": "fuse-overlayfs-debuginfo-1.11-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"product": {
"name": "fuse-overlayfs-debuginfo-1.11-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm (container-tools:rhel8)",
"product_id": "fuse-overlayfs-debuginfo-1.11-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fuse-overlayfs-debuginfo@1.11-1.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=aarch64\u0026rpmmod=container-tools:rhel8:8080020240422101606:0f77c1b7"
}
}
},
{
"category": "product_version",
"name": "fuse-overlayfs-debugsource-1.11-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"product": {
"name": "fuse-overlayfs-debugsource-1.11-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm (container-tools:rhel8)",
"product_id": "fuse-overlayfs-debugsource-1.11-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fuse-overlayfs-debugsource@1.11-1.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=aarch64\u0026rpmmod=container-tools:rhel8:8080020240422101606:0f77c1b7"
}
}
},
{
"category": "product_version",
"name": "libslirp-4.4.0-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"product": {
"name": "libslirp-4.4.0-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm (container-tools:rhel8)",
"product_id": "libslirp-4.4.0-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libslirp@4.4.0-1.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=aarch64\u0026rpmmod=container-tools:rhel8:8080020240422101606:0f77c1b7"
}
}
},
{
"category": "product_version",
"name": "libslirp-debuginfo-4.4.0-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"product": {
"name": "libslirp-debuginfo-4.4.0-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm (container-tools:rhel8)",
"product_id": "libslirp-debuginfo-4.4.0-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libslirp-debuginfo@4.4.0-1.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=aarch64\u0026rpmmod=container-tools:rhel8:8080020240422101606:0f77c1b7"
}
}
},
{
"category": "product_version",
"name": "libslirp-debugsource-4.4.0-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"product": {
"name": "libslirp-debugsource-4.4.0-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm (container-tools:rhel8)",
"product_id": "libslirp-debugsource-4.4.0-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libslirp-debugsource@4.4.0-1.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=aarch64\u0026rpmmod=container-tools:rhel8:8080020240422101606:0f77c1b7"
}
}
},
{
"category": "product_version",
"name": "libslirp-devel-4.4.0-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"product": {
"name": "libslirp-devel-4.4.0-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm (container-tools:rhel8)",
"product_id": "libslirp-devel-4.4.0-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libslirp-devel@4.4.0-1.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=aarch64\u0026rpmmod=container-tools:rhel8:8080020240422101606:0f77c1b7"
}
}
},
{
"category": "product_version",
"name": "netavark-1.5.1-3.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"product": {
"name": "netavark-1.5.1-3.module+el8.8.0+21741+dd5be1e7.aarch64.rpm (container-tools:rhel8)",
"product_id": "netavark-1.5.1-3.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/netavark@1.5.1-3.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=aarch64\u0026epoch=2\u0026rpmmod=container-tools:rhel8:8080020240422101606:0f77c1b7"
}
}
},
{
"category": "product_version",
"name": "oci-seccomp-bpf-hook-1.2.8-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"product": {
"name": "oci-seccomp-bpf-hook-1.2.8-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm (container-tools:rhel8)",
"product_id": "oci-seccomp-bpf-hook-1.2.8-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/oci-seccomp-bpf-hook@1.2.8-1.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=aarch64\u0026rpmmod=container-tools:rhel8:8080020240422101606:0f77c1b7"
}
}
},
{
"category": "product_version",
"name": "oci-seccomp-bpf-hook-debuginfo-1.2.8-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"product": {
"name": "oci-seccomp-bpf-hook-debuginfo-1.2.8-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm (container-tools:rhel8)",
"product_id": "oci-seccomp-bpf-hook-debuginfo-1.2.8-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/oci-seccomp-bpf-hook-debuginfo@1.2.8-1.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=aarch64\u0026rpmmod=container-tools:rhel8:8080020240422101606:0f77c1b7"
}
}
},
{
"category": "product_version",
"name": "oci-seccomp-bpf-hook-debugsource-1.2.8-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"product": {
"name": "oci-seccomp-bpf-hook-debugsource-1.2.8-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm (container-tools:rhel8)",
"product_id": "oci-seccomp-bpf-hook-debugsource-1.2.8-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/oci-seccomp-bpf-hook-debugsource@1.2.8-1.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=aarch64\u0026rpmmod=container-tools:rhel8:8080020240422101606:0f77c1b7"
}
}
},
{
"category": "product_version",
"name": "podman-4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"product": {
"name": "podman-4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64.rpm (container-tools:rhel8)",
"product_id": "podman-4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman@4.4.1-19.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=aarch64\u0026epoch=3\u0026rpmmod=container-tools:rhel8:8080020240422101606:0f77c1b7"
}
}
},
{
"category": "product_version",
"name": "podman-catatonit-4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"product": {
"name": "podman-catatonit-4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64.rpm (container-tools:rhel8)",
"product_id": "podman-catatonit-4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-catatonit@4.4.1-19.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=aarch64\u0026epoch=3\u0026rpmmod=container-tools:rhel8:8080020240422101606:0f77c1b7"
}
}
},
{
"category": "product_version",
"name": "podman-catatonit-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"product": {
"name": "podman-catatonit-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64.rpm (container-tools:rhel8)",
"product_id": "podman-catatonit-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-catatonit-debuginfo@4.4.1-19.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=aarch64\u0026epoch=3\u0026rpmmod=container-tools:rhel8:8080020240422101606:0f77c1b7"
}
}
},
{
"category": "product_version",
"name": "podman-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"product": {
"name": "podman-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64.rpm (container-tools:rhel8)",
"product_id": "podman-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-debuginfo@4.4.1-19.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=aarch64\u0026epoch=3\u0026rpmmod=container-tools:rhel8:8080020240422101606:0f77c1b7"
}
}
},
{
"category": "product_version",
"name": "podman-debugsource-4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"product": {
"name": "podman-debugsource-4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64.rpm (container-tools:rhel8)",
"product_id": "podman-debugsource-4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-debugsource@4.4.1-19.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=aarch64\u0026epoch=3\u0026rpmmod=container-tools:rhel8:8080020240422101606:0f77c1b7"
}
}
},
{
"category": "product_version",
"name": "podman-gvproxy-4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"product": {
"name": "podman-gvproxy-4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64.rpm (container-tools:rhel8)",
"product_id": "podman-gvproxy-4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-gvproxy@4.4.1-19.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=aarch64\u0026epoch=3\u0026rpmmod=container-tools:rhel8:8080020240422101606:0f77c1b7"
}
}
},
{
"category": "product_version",
"name": "podman-gvproxy-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"product": {
"name": "podman-gvproxy-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64.rpm (container-tools:rhel8)",
"product_id": "podman-gvproxy-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-gvproxy-debuginfo@4.4.1-19.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=aarch64\u0026epoch=3\u0026rpmmod=container-tools:rhel8:8080020240422101606:0f77c1b7"
}
}
},
{
"category": "product_version",
"name": "podman-plugins-4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"product": {
"name": "podman-plugins-4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64.rpm (container-tools:rhel8)",
"product_id": "podman-plugins-4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-plugins@4.4.1-19.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=aarch64\u0026epoch=3\u0026rpmmod=container-tools:rhel8:8080020240422101606:0f77c1b7"
}
}
},
{
"category": "product_version",
"name": "podman-plugins-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"product": {
"name": "podman-plugins-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64.rpm (container-tools:rhel8)",
"product_id": "podman-plugins-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-plugins-debuginfo@4.4.1-19.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=aarch64\u0026epoch=3\u0026rpmmod=container-tools:rhel8:8080020240422101606:0f77c1b7"
}
}
},
{
"category": "product_version",
"name": "podman-remote-4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"product": {
"name": "podman-remote-4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64.rpm (container-tools:rhel8)",
"product_id": "podman-remote-4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-remote@4.4.1-19.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=aarch64\u0026epoch=3\u0026rpmmod=container-tools:rhel8:8080020240422101606:0f77c1b7"
}
}
},
{
"category": "product_version",
"name": "podman-remote-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"product": {
"name": "podman-remote-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64.rpm (container-tools:rhel8)",
"product_id": "podman-remote-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-remote-debuginfo@4.4.1-19.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=aarch64\u0026epoch=3\u0026rpmmod=container-tools:rhel8:8080020240422101606:0f77c1b7"
}
}
},
{
"category": "product_version",
"name": "podman-tests-4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"product": {
"name": "podman-tests-4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64.rpm (container-tools:rhel8)",
"product_id": "podman-tests-4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-tests@4.4.1-19.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=aarch64\u0026epoch=3\u0026rpmmod=container-tools:rhel8:8080020240422101606:0f77c1b7"
}
}
},
{
"category": "product_version",
"name": "python3-criu-3.15-4.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"product": {
"name": "python3-criu-3.15-4.module+el8.8.0+21741+dd5be1e7.aarch64.rpm (container-tools:rhel8)",
"product_id": "python3-criu-3.15-4.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-criu@3.15-4.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=aarch64\u0026rpmmod=container-tools:rhel8:8080020240422101606:0f77c1b7"
}
}
},
{
"category": "product_version",
"name": "runc-1.1.12-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"product": {
"name": "runc-1.1.12-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm (container-tools:rhel8)",
"product_id": "runc-1.1.12-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/runc@1.1.12-1.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=aarch64\u0026epoch=1\u0026rpmmod=container-tools:rhel8:8080020240422101606:0f77c1b7"
}
}
},
{
"category": "product_version",
"name": "runc-debuginfo-1.1.12-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"product": {
"name": "runc-debuginfo-1.1.12-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm (container-tools:rhel8)",
"product_id": "runc-debuginfo-1.1.12-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/runc-debuginfo@1.1.12-1.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=aarch64\u0026epoch=1\u0026rpmmod=container-tools:rhel8:8080020240422101606:0f77c1b7"
}
}
},
{
"category": "product_version",
"name": "runc-debugsource-1.1.12-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"product": {
"name": "runc-debugsource-1.1.12-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm (container-tools:rhel8)",
"product_id": "runc-debugsource-1.1.12-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/runc-debugsource@1.1.12-1.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=aarch64\u0026epoch=1\u0026rpmmod=container-tools:rhel8:8080020240422101606:0f77c1b7"
}
}
},
{
"category": "product_version",
"name": "skopeo-1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"product": {
"name": "skopeo-1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.aarch64.rpm (container-tools:rhel8)",
"product_id": "skopeo-1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/skopeo@1.11.2-0.2.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=aarch64\u0026epoch=2\u0026rpmmod=container-tools:rhel8:8080020240422101606:0f77c1b7"
}
}
},
{
"category": "product_version",
"name": "skopeo-tests-1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"product": {
"name": "skopeo-tests-1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.aarch64.rpm (container-tools:rhel8)",
"product_id": "skopeo-tests-1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/skopeo-tests@1.11.2-0.2.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=aarch64\u0026epoch=2\u0026rpmmod=container-tools:rhel8:8080020240422101606:0f77c1b7"
}
}
},
{
"category": "product_version",
"name": "slirp4netns-1.2.0-3.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"product": {
"name": "slirp4netns-1.2.0-3.module+el8.8.0+21741+dd5be1e7.aarch64.rpm (container-tools:rhel8)",
"product_id": "slirp4netns-1.2.0-3.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/slirp4netns@1.2.0-3.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=aarch64\u0026rpmmod=container-tools:rhel8:8080020240422101606:0f77c1b7"
}
}
},
{
"category": "product_version",
"name": "slirp4netns-debuginfo-1.2.0-3.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"product": {
"name": "slirp4netns-debuginfo-1.2.0-3.module+el8.8.0+21741+dd5be1e7.aarch64.rpm (container-tools:rhel8)",
"product_id": "slirp4netns-debuginfo-1.2.0-3.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/slirp4netns-debuginfo@1.2.0-3.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=aarch64\u0026rpmmod=container-tools:rhel8:8080020240422101606:0f77c1b7"
}
}
},
{
"category": "product_version",
"name": "slirp4netns-debugsource-1.2.0-3.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"product": {
"name": "slirp4netns-debugsource-1.2.0-3.module+el8.8.0+21741+dd5be1e7.aarch64.rpm (container-tools:rhel8)",
"product_id": "slirp4netns-debugsource-1.2.0-3.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/slirp4netns-debugsource@1.2.0-3.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=aarch64\u0026rpmmod=container-tools:rhel8:8080020240422101606:0f77c1b7"
}
}
},
{
"category": "product_version",
"name": "toolbox-0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"product": {
"name": "toolbox-0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.aarch64.rpm (container-tools:rhel8)",
"product_id": "toolbox-0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/toolbox@0.0.99.3-7.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=aarch64\u0026rpmmod=container-tools:rhel8:8080020240422101606:0f77c1b7"
}
}
},
{
"category": "product_version",
"name": "toolbox-debuginfo-0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"product": {
"name": "toolbox-debuginfo-0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.aarch64.rpm (container-tools:rhel8)",
"product_id": "toolbox-debuginfo-0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/toolbox-debuginfo@0.0.99.3-7.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=aarch64\u0026rpmmod=container-tools:rhel8:8080020240422101606:0f77c1b7"
}
}
},
{
"category": "product_version",
"name": "toolbox-debugsource-0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"product": {
"name": "toolbox-debugsource-0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.aarch64.rpm (container-tools:rhel8)",
"product_id": "toolbox-debugsource-0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/toolbox-debugsource@0.0.99.3-7.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=aarch64\u0026rpmmod=container-tools:rhel8:8080020240422101606:0f77c1b7"
}
}
},
{
"category": "product_version",
"name": "toolbox-tests-0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"product": {
"name": "toolbox-tests-0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.aarch64.rpm (container-tools:rhel8)",
"product_id": "toolbox-tests-0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/toolbox-tests@0.0.99.3-7.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=aarch64\u0026rpmmod=container-tools:rhel8:8080020240422101606:0f77c1b7"
}
}
}
],
"category": "architecture",
"name": "aarch64"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "aardvark-dns-1.5.0-2.module+el8.8.0+21741+dd5be1e7.aarch64.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:aardvark-dns-1.5.0-2.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8"
},
"product_reference": "aardvark-dns-1.5.0-2.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "aardvark-dns-1.5.0-2.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:aardvark-dns-1.5.0-2.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8"
},
"product_reference": "aardvark-dns-1.5.0-2.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "aardvark-dns-1.5.0-2.module+el8.8.0+21741+dd5be1e7.s390x.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:aardvark-dns-1.5.0-2.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8"
},
"product_reference": "aardvark-dns-1.5.0-2.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "aardvark-dns-1.5.0-2.module+el8.8.0+21741+dd5be1e7.src.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:aardvark-dns-1.5.0-2.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8"
},
"product_reference": "aardvark-dns-1.5.0-2.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "aardvark-dns-1.5.0-2.module+el8.8.0+21741+dd5be1e7.x86_64.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:aardvark-dns-1.5.0-2.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8"
},
"product_reference": "aardvark-dns-1.5.0-2.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "buildah-1.29.3-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:buildah-1.29.3-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8"
},
"product_reference": "buildah-1.29.3-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "buildah-1.29.3-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:buildah-1.29.3-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8"
},
"product_reference": "buildah-1.29.3-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "buildah-1.29.3-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:buildah-1.29.3-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8"
},
"product_reference": "buildah-1.29.3-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "buildah-1.29.3-1.module+el8.8.0+21741+dd5be1e7.src.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:buildah-1.29.3-1.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8"
},
"product_reference": "buildah-1.29.3-1.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "buildah-1.29.3-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:buildah-1.29.3-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8"
},
"product_reference": "buildah-1.29.3-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "buildah-debuginfo-1.29.3-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:buildah-debuginfo-1.29.3-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8"
},
"product_reference": "buildah-debuginfo-1.29.3-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "buildah-debuginfo-1.29.3-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:buildah-debuginfo-1.29.3-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8"
},
"product_reference": "buildah-debuginfo-1.29.3-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "buildah-debuginfo-1.29.3-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:buildah-debuginfo-1.29.3-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8"
},
"product_reference": "buildah-debuginfo-1.29.3-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "buildah-debuginfo-1.29.3-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:buildah-debuginfo-1.29.3-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8"
},
"product_reference": "buildah-debuginfo-1.29.3-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "buildah-debugsource-1.29.3-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:buildah-debugsource-1.29.3-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8"
},
"product_reference": "buildah-debugsource-1.29.3-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "buildah-debugsource-1.29.3-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:buildah-debugsource-1.29.3-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8"
},
"product_reference": "buildah-debugsource-1.29.3-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "buildah-debugsource-1.29.3-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:buildah-debugsource-1.29.3-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8"
},
"product_reference": "buildah-debugsource-1.29.3-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "buildah-debugsource-1.29.3-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:buildah-debugsource-1.29.3-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8"
},
"product_reference": "buildah-debugsource-1.29.3-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "buildah-tests-1.29.3-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:buildah-tests-1.29.3-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8"
},
"product_reference": "buildah-tests-1.29.3-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "buildah-tests-1.29.3-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:buildah-tests-1.29.3-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8"
},
"product_reference": "buildah-tests-1.29.3-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "buildah-tests-1.29.3-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:buildah-tests-1.29.3-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8"
},
"product_reference": "buildah-tests-1.29.3-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "buildah-tests-1.29.3-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:buildah-tests-1.29.3-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8"
},
"product_reference": "buildah-tests-1.29.3-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "buildah-tests-debuginfo-1.29.3-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:buildah-tests-debuginfo-1.29.3-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8"
},
"product_reference": "buildah-tests-debuginfo-1.29.3-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "buildah-tests-debuginfo-1.29.3-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:buildah-tests-debuginfo-1.29.3-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8"
},
"product_reference": "buildah-tests-debuginfo-1.29.3-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "buildah-tests-debuginfo-1.29.3-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:buildah-tests-debuginfo-1.29.3-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8"
},
"product_reference": "buildah-tests-debuginfo-1.29.3-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "buildah-tests-debuginfo-1.29.3-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:buildah-tests-debuginfo-1.29.3-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8"
},
"product_reference": "buildah-tests-debuginfo-1.29.3-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cockpit-podman-63.1-1.module+el8.8.0+21741+dd5be1e7.noarch.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:cockpit-podman-63.1-1.module+el8.8.0+21741+dd5be1e7.noarch.rpm-container-tools:rhel8"
},
"product_reference": "cockpit-podman-63.1-1.module+el8.8.0+21741+dd5be1e7.noarch.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cockpit-podman-63.1-1.module+el8.8.0+21741+dd5be1e7.src.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:cockpit-podman-63.1-1.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8"
},
"product_reference": "cockpit-podman-63.1-1.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "conmon-2.1.6-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:conmon-2.1.6-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8"
},
"product_reference": "conmon-2.1.6-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "conmon-2.1.6-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:conmon-2.1.6-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8"
},
"product_reference": "conmon-2.1.6-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "conmon-2.1.6-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:conmon-2.1.6-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8"
},
"product_reference": "conmon-2.1.6-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "conmon-2.1.6-1.module+el8.8.0+21741+dd5be1e7.src.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:conmon-2.1.6-1.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8"
},
"product_reference": "conmon-2.1.6-1.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "conmon-2.1.6-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:conmon-2.1.6-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8"
},
"product_reference": "conmon-2.1.6-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "conmon-debuginfo-2.1.6-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:conmon-debuginfo-2.1.6-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8"
},
"product_reference": "conmon-debuginfo-2.1.6-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "conmon-debuginfo-2.1.6-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:conmon-debuginfo-2.1.6-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8"
},
"product_reference": "conmon-debuginfo-2.1.6-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "conmon-debuginfo-2.1.6-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:conmon-debuginfo-2.1.6-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8"
},
"product_reference": "conmon-debuginfo-2.1.6-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "conmon-debuginfo-2.1.6-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:conmon-debuginfo-2.1.6-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8"
},
"product_reference": "conmon-debuginfo-2.1.6-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "conmon-debugsource-2.1.6-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:conmon-debugsource-2.1.6-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8"
},
"product_reference": "conmon-debugsource-2.1.6-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "conmon-debugsource-2.1.6-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:conmon-debugsource-2.1.6-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8"
},
"product_reference": "conmon-debugsource-2.1.6-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "conmon-debugsource-2.1.6-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:conmon-debugsource-2.1.6-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8"
},
"product_reference": "conmon-debugsource-2.1.6-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "conmon-debugsource-2.1.6-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:conmon-debugsource-2.1.6-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8"
},
"product_reference": "conmon-debugsource-2.1.6-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "container-selinux-2.229.0-1.module+el8.8.0+21741+dd5be1e7.noarch.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:container-selinux-2.229.0-1.module+el8.8.0+21741+dd5be1e7.noarch.rpm-container-tools:rhel8"
},
"product_reference": "container-selinux-2.229.0-1.module+el8.8.0+21741+dd5be1e7.noarch.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "container-selinux-2.229.0-1.module+el8.8.0+21741+dd5be1e7.src.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:container-selinux-2.229.0-1.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8"
},
"product_reference": "container-selinux-2.229.0-1.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "containernetworking-plugins-1.2.0-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:containernetworking-plugins-1.2.0-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8"
},
"product_reference": "containernetworking-plugins-1.2.0-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "containernetworking-plugins-1.2.0-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:containernetworking-plugins-1.2.0-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8"
},
"product_reference": "containernetworking-plugins-1.2.0-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "containernetworking-plugins-1.2.0-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:containernetworking-plugins-1.2.0-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8"
},
"product_reference": "containernetworking-plugins-1.2.0-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "containernetworking-plugins-1.2.0-1.module+el8.8.0+21741+dd5be1e7.src.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:containernetworking-plugins-1.2.0-1.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8"
},
"product_reference": "containernetworking-plugins-1.2.0-1.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "containernetworking-plugins-1.2.0-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:containernetworking-plugins-1.2.0-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8"
},
"product_reference": "containernetworking-plugins-1.2.0-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "containernetworking-plugins-debuginfo-1.2.0-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:containernetworking-plugins-debuginfo-1.2.0-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8"
},
"product_reference": "containernetworking-plugins-debuginfo-1.2.0-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "containernetworking-plugins-debuginfo-1.2.0-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:containernetworking-plugins-debuginfo-1.2.0-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8"
},
"product_reference": "containernetworking-plugins-debuginfo-1.2.0-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "containernetworking-plugins-debuginfo-1.2.0-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:containernetworking-plugins-debuginfo-1.2.0-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8"
},
"product_reference": "containernetworking-plugins-debuginfo-1.2.0-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "containernetworking-plugins-debuginfo-1.2.0-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:containernetworking-plugins-debuginfo-1.2.0-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8"
},
"product_reference": "containernetworking-plugins-debuginfo-1.2.0-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "containernetworking-plugins-debugsource-1.2.0-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:containernetworking-plugins-debugsource-1.2.0-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8"
},
"product_reference": "containernetworking-plugins-debugsource-1.2.0-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "containernetworking-plugins-debugsource-1.2.0-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:containernetworking-plugins-debugsource-1.2.0-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8"
},
"product_reference": "containernetworking-plugins-debugsource-1.2.0-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "containernetworking-plugins-debugsource-1.2.0-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:containernetworking-plugins-debugsource-1.2.0-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8"
},
"product_reference": "containernetworking-plugins-debugsource-1.2.0-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "containernetworking-plugins-debugsource-1.2.0-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:containernetworking-plugins-debugsource-1.2.0-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8"
},
"product_reference": "containernetworking-plugins-debugsource-1.2.0-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "containers-common-1-65.module+el8.8.0+21741+dd5be1e7.aarch64.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:containers-common-1-65.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8"
},
"product_reference": "containers-common-1-65.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "containers-common-1-65.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:containers-common-1-65.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8"
},
"product_reference": "containers-common-1-65.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "containers-common-1-65.module+el8.8.0+21741+dd5be1e7.s390x.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:containers-common-1-65.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8"
},
"product_reference": "containers-common-1-65.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "containers-common-1-65.module+el8.8.0+21741+dd5be1e7.src.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:containers-common-1-65.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8"
},
"product_reference": "containers-common-1-65.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "containers-common-1-65.module+el8.8.0+21741+dd5be1e7.x86_64.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:containers-common-1-65.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8"
},
"product_reference": "containers-common-1-65.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "crit-3.15-4.module+el8.8.0+21741+dd5be1e7.aarch64.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:crit-3.15-4.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8"
},
"product_reference": "crit-3.15-4.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "crit-3.15-4.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:crit-3.15-4.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8"
},
"product_reference": "crit-3.15-4.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "crit-3.15-4.module+el8.8.0+21741+dd5be1e7.s390x.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:crit-3.15-4.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8"
},
"product_reference": "crit-3.15-4.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "crit-3.15-4.module+el8.8.0+21741+dd5be1e7.x86_64.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:crit-3.15-4.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8"
},
"product_reference": "crit-3.15-4.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "criu-3.15-4.module+el8.8.0+21741+dd5be1e7.aarch64.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:criu-3.15-4.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8"
},
"product_reference": "criu-3.15-4.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "criu-3.15-4.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:criu-3.15-4.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8"
},
"product_reference": "criu-3.15-4.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "criu-3.15-4.module+el8.8.0+21741+dd5be1e7.s390x.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:criu-3.15-4.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8"
},
"product_reference": "criu-3.15-4.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "criu-3.15-4.module+el8.8.0+21741+dd5be1e7.src.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:criu-3.15-4.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8"
},
"product_reference": "criu-3.15-4.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "criu-3.15-4.module+el8.8.0+21741+dd5be1e7.x86_64.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:criu-3.15-4.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8"
},
"product_reference": "criu-3.15-4.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "criu-debuginfo-3.15-4.module+el8.8.0+21741+dd5be1e7.aarch64.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:criu-debuginfo-3.15-4.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8"
},
"product_reference": "criu-debuginfo-3.15-4.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "criu-debuginfo-3.15-4.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:criu-debuginfo-3.15-4.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8"
},
"product_reference": "criu-debuginfo-3.15-4.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "criu-debuginfo-3.15-4.module+el8.8.0+21741+dd5be1e7.s390x.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:criu-debuginfo-3.15-4.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8"
},
"product_reference": "criu-debuginfo-3.15-4.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "criu-debuginfo-3.15-4.module+el8.8.0+21741+dd5be1e7.x86_64.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:criu-debuginfo-3.15-4.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8"
},
"product_reference": "criu-debuginfo-3.15-4.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "criu-debugsource-3.15-4.module+el8.8.0+21741+dd5be1e7.aarch64.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:criu-debugsource-3.15-4.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8"
},
"product_reference": "criu-debugsource-3.15-4.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "criu-debugsource-3.15-4.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:criu-debugsource-3.15-4.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8"
},
"product_reference": "criu-debugsource-3.15-4.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "criu-debugsource-3.15-4.module+el8.8.0+21741+dd5be1e7.s390x.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:criu-debugsource-3.15-4.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8"
},
"product_reference": "criu-debugsource-3.15-4.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "criu-debugsource-3.15-4.module+el8.8.0+21741+dd5be1e7.x86_64.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:criu-debugsource-3.15-4.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8"
},
"product_reference": "criu-debugsource-3.15-4.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "criu-devel-3.15-4.module+el8.8.0+21741+dd5be1e7.aarch64.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:criu-devel-3.15-4.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8"
},
"product_reference": "criu-devel-3.15-4.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "criu-devel-3.15-4.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:criu-devel-3.15-4.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8"
},
"product_reference": "criu-devel-3.15-4.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "criu-devel-3.15-4.module+el8.8.0+21741+dd5be1e7.s390x.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:criu-devel-3.15-4.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8"
},
"product_reference": "criu-devel-3.15-4.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "criu-devel-3.15-4.module+el8.8.0+21741+dd5be1e7.x86_64.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:criu-devel-3.15-4.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8"
},
"product_reference": "criu-devel-3.15-4.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "criu-libs-3.15-4.module+el8.8.0+21741+dd5be1e7.aarch64.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:criu-libs-3.15-4.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8"
},
"product_reference": "criu-libs-3.15-4.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "criu-libs-3.15-4.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:criu-libs-3.15-4.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8"
},
"product_reference": "criu-libs-3.15-4.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "criu-libs-3.15-4.module+el8.8.0+21741+dd5be1e7.s390x.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:criu-libs-3.15-4.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8"
},
"product_reference": "criu-libs-3.15-4.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "criu-libs-3.15-4.module+el8.8.0+21741+dd5be1e7.x86_64.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:criu-libs-3.15-4.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8"
},
"product_reference": "criu-libs-3.15-4.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "criu-libs-debuginfo-3.15-4.module+el8.8.0+21741+dd5be1e7.aarch64.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:criu-libs-debuginfo-3.15-4.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8"
},
"product_reference": "criu-libs-debuginfo-3.15-4.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "criu-libs-debuginfo-3.15-4.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:criu-libs-debuginfo-3.15-4.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8"
},
"product_reference": "criu-libs-debuginfo-3.15-4.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "criu-libs-debuginfo-3.15-4.module+el8.8.0+21741+dd5be1e7.s390x.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:criu-libs-debuginfo-3.15-4.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8"
},
"product_reference": "criu-libs-debuginfo-3.15-4.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "criu-libs-debuginfo-3.15-4.module+el8.8.0+21741+dd5be1e7.x86_64.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:criu-libs-debuginfo-3.15-4.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8"
},
"product_reference": "criu-libs-debuginfo-3.15-4.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "crun-1.8.4-2.module+el8.8.0+21741+dd5be1e7.aarch64.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:crun-1.8.4-2.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8"
},
"product_reference": "crun-1.8.4-2.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "crun-1.8.4-2.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:crun-1.8.4-2.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8"
},
"product_reference": "crun-1.8.4-2.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "crun-1.8.4-2.module+el8.8.0+21741+dd5be1e7.s390x.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:crun-1.8.4-2.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8"
},
"product_reference": "crun-1.8.4-2.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "crun-1.8.4-2.module+el8.8.0+21741+dd5be1e7.src.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:crun-1.8.4-2.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8"
},
"product_reference": "crun-1.8.4-2.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "crun-1.8.4-2.module+el8.8.0+21741+dd5be1e7.x86_64.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:crun-1.8.4-2.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8"
},
"product_reference": "crun-1.8.4-2.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "crun-debuginfo-1.8.4-2.module+el8.8.0+21741+dd5be1e7.aarch64.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:crun-debuginfo-1.8.4-2.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8"
},
"product_reference": "crun-debuginfo-1.8.4-2.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "crun-debuginfo-1.8.4-2.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:crun-debuginfo-1.8.4-2.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8"
},
"product_reference": "crun-debuginfo-1.8.4-2.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "crun-debuginfo-1.8.4-2.module+el8.8.0+21741+dd5be1e7.s390x.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:crun-debuginfo-1.8.4-2.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8"
},
"product_reference": "crun-debuginfo-1.8.4-2.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "crun-debuginfo-1.8.4-2.module+el8.8.0+21741+dd5be1e7.x86_64.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:crun-debuginfo-1.8.4-2.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8"
},
"product_reference": "crun-debuginfo-1.8.4-2.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "crun-debugsource-1.8.4-2.module+el8.8.0+21741+dd5be1e7.aarch64.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:crun-debugsource-1.8.4-2.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8"
},
"product_reference": "crun-debugsource-1.8.4-2.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "crun-debugsource-1.8.4-2.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:crun-debugsource-1.8.4-2.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8"
},
"product_reference": "crun-debugsource-1.8.4-2.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "crun-debugsource-1.8.4-2.module+el8.8.0+21741+dd5be1e7.s390x.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:crun-debugsource-1.8.4-2.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8"
},
"product_reference": "crun-debugsource-1.8.4-2.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "crun-debugsource-1.8.4-2.module+el8.8.0+21741+dd5be1e7.x86_64.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:crun-debugsource-1.8.4-2.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8"
},
"product_reference": "crun-debugsource-1.8.4-2.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fuse-overlayfs-1.11-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:fuse-overlayfs-1.11-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8"
},
"product_reference": "fuse-overlayfs-1.11-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fuse-overlayfs-1.11-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:fuse-overlayfs-1.11-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8"
},
"product_reference": "fuse-overlayfs-1.11-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fuse-overlayfs-1.11-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:fuse-overlayfs-1.11-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8"
},
"product_reference": "fuse-overlayfs-1.11-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fuse-overlayfs-1.11-1.module+el8.8.0+21741+dd5be1e7.src.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:fuse-overlayfs-1.11-1.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8"
},
"product_reference": "fuse-overlayfs-1.11-1.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fuse-overlayfs-1.11-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:fuse-overlayfs-1.11-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8"
},
"product_reference": "fuse-overlayfs-1.11-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fuse-overlayfs-debuginfo-1.11-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:fuse-overlayfs-debuginfo-1.11-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8"
},
"product_reference": "fuse-overlayfs-debuginfo-1.11-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fuse-overlayfs-debuginfo-1.11-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:fuse-overlayfs-debuginfo-1.11-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8"
},
"product_reference": "fuse-overlayfs-debuginfo-1.11-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fuse-overlayfs-debuginfo-1.11-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:fuse-overlayfs-debuginfo-1.11-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8"
},
"product_reference": "fuse-overlayfs-debuginfo-1.11-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fuse-overlayfs-debuginfo-1.11-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:fuse-overlayfs-debuginfo-1.11-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8"
},
"product_reference": "fuse-overlayfs-debuginfo-1.11-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fuse-overlayfs-debugsource-1.11-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:fuse-overlayfs-debugsource-1.11-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8"
},
"product_reference": "fuse-overlayfs-debugsource-1.11-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fuse-overlayfs-debugsource-1.11-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:fuse-overlayfs-debugsource-1.11-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8"
},
"product_reference": "fuse-overlayfs-debugsource-1.11-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fuse-overlayfs-debugsource-1.11-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:fuse-overlayfs-debugsource-1.11-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8"
},
"product_reference": "fuse-overlayfs-debugsource-1.11-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fuse-overlayfs-debugsource-1.11-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:fuse-overlayfs-debugsource-1.11-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8"
},
"product_reference": "fuse-overlayfs-debugsource-1.11-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libslirp-4.4.0-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:libslirp-4.4.0-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8"
},
"product_reference": "libslirp-4.4.0-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libslirp-4.4.0-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:libslirp-4.4.0-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8"
},
"product_reference": "libslirp-4.4.0-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libslirp-4.4.0-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:libslirp-4.4.0-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8"
},
"product_reference": "libslirp-4.4.0-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libslirp-4.4.0-1.module+el8.8.0+21741+dd5be1e7.src.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:libslirp-4.4.0-1.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8"
},
"product_reference": "libslirp-4.4.0-1.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libslirp-4.4.0-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:libslirp-4.4.0-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8"
},
"product_reference": "libslirp-4.4.0-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libslirp-debuginfo-4.4.0-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:libslirp-debuginfo-4.4.0-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8"
},
"product_reference": "libslirp-debuginfo-4.4.0-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libslirp-debuginfo-4.4.0-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:libslirp-debuginfo-4.4.0-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8"
},
"product_reference": "libslirp-debuginfo-4.4.0-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libslirp-debuginfo-4.4.0-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:libslirp-debuginfo-4.4.0-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8"
},
"product_reference": "libslirp-debuginfo-4.4.0-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libslirp-debuginfo-4.4.0-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:libslirp-debuginfo-4.4.0-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8"
},
"product_reference": "libslirp-debuginfo-4.4.0-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libslirp-debugsource-4.4.0-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:libslirp-debugsource-4.4.0-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8"
},
"product_reference": "libslirp-debugsource-4.4.0-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libslirp-debugsource-4.4.0-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:libslirp-debugsource-4.4.0-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8"
},
"product_reference": "libslirp-debugsource-4.4.0-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libslirp-debugsource-4.4.0-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:libslirp-debugsource-4.4.0-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8"
},
"product_reference": "libslirp-debugsource-4.4.0-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libslirp-debugsource-4.4.0-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:libslirp-debugsource-4.4.0-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8"
},
"product_reference": "libslirp-debugsource-4.4.0-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libslirp-devel-4.4.0-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:libslirp-devel-4.4.0-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8"
},
"product_reference": "libslirp-devel-4.4.0-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libslirp-devel-4.4.0-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:libslirp-devel-4.4.0-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8"
},
"product_reference": "libslirp-devel-4.4.0-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libslirp-devel-4.4.0-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:libslirp-devel-4.4.0-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8"
},
"product_reference": "libslirp-devel-4.4.0-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libslirp-devel-4.4.0-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:libslirp-devel-4.4.0-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8"
},
"product_reference": "libslirp-devel-4.4.0-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netavark-1.5.1-3.module+el8.8.0+21741+dd5be1e7.aarch64.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:netavark-1.5.1-3.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8"
},
"product_reference": "netavark-1.5.1-3.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netavark-1.5.1-3.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:netavark-1.5.1-3.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8"
},
"product_reference": "netavark-1.5.1-3.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netavark-1.5.1-3.module+el8.8.0+21741+dd5be1e7.s390x.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:netavark-1.5.1-3.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8"
},
"product_reference": "netavark-1.5.1-3.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netavark-1.5.1-3.module+el8.8.0+21741+dd5be1e7.src.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:netavark-1.5.1-3.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8"
},
"product_reference": "netavark-1.5.1-3.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netavark-1.5.1-3.module+el8.8.0+21741+dd5be1e7.x86_64.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:netavark-1.5.1-3.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8"
},
"product_reference": "netavark-1.5.1-3.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "oci-seccomp-bpf-hook-1.2.8-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:oci-seccomp-bpf-hook-1.2.8-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8"
},
"product_reference": "oci-seccomp-bpf-hook-1.2.8-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "oci-seccomp-bpf-hook-1.2.8-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:oci-seccomp-bpf-hook-1.2.8-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8"
},
"product_reference": "oci-seccomp-bpf-hook-1.2.8-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "oci-seccomp-bpf-hook-1.2.8-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:oci-seccomp-bpf-hook-1.2.8-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8"
},
"product_reference": "oci-seccomp-bpf-hook-1.2.8-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "oci-seccomp-bpf-hook-1.2.8-1.module+el8.8.0+21741+dd5be1e7.src.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:oci-seccomp-bpf-hook-1.2.8-1.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8"
},
"product_reference": "oci-seccomp-bpf-hook-1.2.8-1.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "oci-seccomp-bpf-hook-1.2.8-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:oci-seccomp-bpf-hook-1.2.8-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8"
},
"product_reference": "oci-seccomp-bpf-hook-1.2.8-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "oci-seccomp-bpf-hook-debuginfo-1.2.8-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:oci-seccomp-bpf-hook-debuginfo-1.2.8-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8"
},
"product_reference": "oci-seccomp-bpf-hook-debuginfo-1.2.8-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "oci-seccomp-bpf-hook-debuginfo-1.2.8-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:oci-seccomp-bpf-hook-debuginfo-1.2.8-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8"
},
"product_reference": "oci-seccomp-bpf-hook-debuginfo-1.2.8-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "oci-seccomp-bpf-hook-debuginfo-1.2.8-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:oci-seccomp-bpf-hook-debuginfo-1.2.8-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8"
},
"product_reference": "oci-seccomp-bpf-hook-debuginfo-1.2.8-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "oci-seccomp-bpf-hook-debuginfo-1.2.8-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:oci-seccomp-bpf-hook-debuginfo-1.2.8-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8"
},
"product_reference": "oci-seccomp-bpf-hook-debuginfo-1.2.8-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "oci-seccomp-bpf-hook-debugsource-1.2.8-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:oci-seccomp-bpf-hook-debugsource-1.2.8-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8"
},
"product_reference": "oci-seccomp-bpf-hook-debugsource-1.2.8-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "oci-seccomp-bpf-hook-debugsource-1.2.8-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:oci-seccomp-bpf-hook-debugsource-1.2.8-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8"
},
"product_reference": "oci-seccomp-bpf-hook-debugsource-1.2.8-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "oci-seccomp-bpf-hook-debugsource-1.2.8-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:oci-seccomp-bpf-hook-debugsource-1.2.8-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8"
},
"product_reference": "oci-seccomp-bpf-hook-debugsource-1.2.8-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "oci-seccomp-bpf-hook-debugsource-1.2.8-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:oci-seccomp-bpf-hook-debugsource-1.2.8-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8"
},
"product_reference": "oci-seccomp-bpf-hook-debugsource-1.2.8-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:podman-4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8"
},
"product_reference": "podman-4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:podman-4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8"
},
"product_reference": "podman-4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:podman-4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8"
},
"product_reference": "podman-4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-4.4.1-19.module+el8.8.0+21741+dd5be1e7.src.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:podman-4.4.1-19.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8"
},
"product_reference": "podman-4.4.1-19.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:podman-4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8"
},
"product_reference": "podman-4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-catatonit-4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:podman-catatonit-4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8"
},
"product_reference": "podman-catatonit-4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-catatonit-4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:podman-catatonit-4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8"
},
"product_reference": "podman-catatonit-4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-catatonit-4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:podman-catatonit-4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8"
},
"product_reference": "podman-catatonit-4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-catatonit-4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:podman-catatonit-4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8"
},
"product_reference": "podman-catatonit-4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-catatonit-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:podman-catatonit-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8"
},
"product_reference": "podman-catatonit-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-catatonit-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:podman-catatonit-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8"
},
"product_reference": "podman-catatonit-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-catatonit-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:podman-catatonit-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8"
},
"product_reference": "podman-catatonit-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-catatonit-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:podman-catatonit-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8"
},
"product_reference": "podman-catatonit-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:podman-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8"
},
"product_reference": "podman-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:podman-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8"
},
"product_reference": "podman-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:podman-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8"
},
"product_reference": "podman-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:podman-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8"
},
"product_reference": "podman-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-debugsource-4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:podman-debugsource-4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8"
},
"product_reference": "podman-debugsource-4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-debugsource-4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:podman-debugsource-4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8"
},
"product_reference": "podman-debugsource-4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-debugsource-4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:podman-debugsource-4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8"
},
"product_reference": "podman-debugsource-4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-debugsource-4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:podman-debugsource-4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8"
},
"product_reference": "podman-debugsource-4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-docker-4.4.1-19.module+el8.8.0+21741+dd5be1e7.noarch.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:podman-docker-4.4.1-19.module+el8.8.0+21741+dd5be1e7.noarch.rpm-container-tools:rhel8"
},
"product_reference": "podman-docker-4.4.1-19.module+el8.8.0+21741+dd5be1e7.noarch.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-gvproxy-4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:podman-gvproxy-4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8"
},
"product_reference": "podman-gvproxy-4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-gvproxy-4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:podman-gvproxy-4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8"
},
"product_reference": "podman-gvproxy-4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-gvproxy-4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:podman-gvproxy-4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8"
},
"product_reference": "podman-gvproxy-4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-gvproxy-4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:podman-gvproxy-4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8"
},
"product_reference": "podman-gvproxy-4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-gvproxy-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:podman-gvproxy-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8"
},
"product_reference": "podman-gvproxy-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-gvproxy-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:podman-gvproxy-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8"
},
"product_reference": "podman-gvproxy-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-gvproxy-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:podman-gvproxy-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8"
},
"product_reference": "podman-gvproxy-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-gvproxy-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:podman-gvproxy-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8"
},
"product_reference": "podman-gvproxy-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-plugins-4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:podman-plugins-4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8"
},
"product_reference": "podman-plugins-4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-plugins-4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:podman-plugins-4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8"
},
"product_reference": "podman-plugins-4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-plugins-4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:podman-plugins-4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8"
},
"product_reference": "podman-plugins-4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-plugins-4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:podman-plugins-4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8"
},
"product_reference": "podman-plugins-4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-plugins-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:podman-plugins-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8"
},
"product_reference": "podman-plugins-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-plugins-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:podman-plugins-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8"
},
"product_reference": "podman-plugins-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-plugins-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:podman-plugins-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8"
},
"product_reference": "podman-plugins-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-plugins-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:podman-plugins-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8"
},
"product_reference": "podman-plugins-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-remote-4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:podman-remote-4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8"
},
"product_reference": "podman-remote-4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-remote-4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:podman-remote-4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8"
},
"product_reference": "podman-remote-4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-remote-4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:podman-remote-4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8"
},
"product_reference": "podman-remote-4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-remote-4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:podman-remote-4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8"
},
"product_reference": "podman-remote-4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-remote-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:podman-remote-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8"
},
"product_reference": "podman-remote-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-remote-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:podman-remote-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8"
},
"product_reference": "podman-remote-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-remote-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:podman-remote-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8"
},
"product_reference": "podman-remote-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-remote-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:podman-remote-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8"
},
"product_reference": "podman-remote-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-tests-4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:podman-tests-4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8"
},
"product_reference": "podman-tests-4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-tests-4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:podman-tests-4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8"
},
"product_reference": "podman-tests-4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-tests-4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:podman-tests-4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8"
},
"product_reference": "podman-tests-4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-tests-4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:podman-tests-4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8"
},
"product_reference": "podman-tests-4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-podman-4.4.1-1.module+el8.8.0+21741+dd5be1e7.src.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:python-podman-4.4.1-1.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8"
},
"product_reference": "python-podman-4.4.1-1.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-criu-3.15-4.module+el8.8.0+21741+dd5be1e7.aarch64.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:python3-criu-3.15-4.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8"
},
"product_reference": "python3-criu-3.15-4.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-criu-3.15-4.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:python3-criu-3.15-4.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8"
},
"product_reference": "python3-criu-3.15-4.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-criu-3.15-4.module+el8.8.0+21741+dd5be1e7.s390x.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:python3-criu-3.15-4.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8"
},
"product_reference": "python3-criu-3.15-4.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-criu-3.15-4.module+el8.8.0+21741+dd5be1e7.x86_64.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:python3-criu-3.15-4.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8"
},
"product_reference": "python3-criu-3.15-4.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-podman-4.4.1-1.module+el8.8.0+21741+dd5be1e7.noarch.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:python3-podman-4.4.1-1.module+el8.8.0+21741+dd5be1e7.noarch.rpm-container-tools:rhel8"
},
"product_reference": "python3-podman-4.4.1-1.module+el8.8.0+21741+dd5be1e7.noarch.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "runc-1.1.12-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:runc-1.1.12-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8"
},
"product_reference": "runc-1.1.12-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "runc-1.1.12-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:runc-1.1.12-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8"
},
"product_reference": "runc-1.1.12-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "runc-1.1.12-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:runc-1.1.12-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8"
},
"product_reference": "runc-1.1.12-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "runc-1.1.12-1.module+el8.8.0+21741+dd5be1e7.src.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:runc-1.1.12-1.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8"
},
"product_reference": "runc-1.1.12-1.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "runc-1.1.12-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:runc-1.1.12-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8"
},
"product_reference": "runc-1.1.12-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "runc-debuginfo-1.1.12-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:runc-debuginfo-1.1.12-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8"
},
"product_reference": "runc-debuginfo-1.1.12-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "runc-debuginfo-1.1.12-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:runc-debuginfo-1.1.12-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8"
},
"product_reference": "runc-debuginfo-1.1.12-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "runc-debuginfo-1.1.12-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:runc-debuginfo-1.1.12-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8"
},
"product_reference": "runc-debuginfo-1.1.12-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "runc-debuginfo-1.1.12-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:runc-debuginfo-1.1.12-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8"
},
"product_reference": "runc-debuginfo-1.1.12-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "runc-debugsource-1.1.12-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:runc-debugsource-1.1.12-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8"
},
"product_reference": "runc-debugsource-1.1.12-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "runc-debugsource-1.1.12-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:runc-debugsource-1.1.12-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8"
},
"product_reference": "runc-debugsource-1.1.12-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "runc-debugsource-1.1.12-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:runc-debugsource-1.1.12-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8"
},
"product_reference": "runc-debugsource-1.1.12-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "runc-debugsource-1.1.12-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:runc-debugsource-1.1.12-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8"
},
"product_reference": "runc-debugsource-1.1.12-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "skopeo-1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.aarch64.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:skopeo-1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8"
},
"product_reference": "skopeo-1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "skopeo-1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:skopeo-1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8"
},
"product_reference": "skopeo-1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "skopeo-1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.s390x.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:skopeo-1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8"
},
"product_reference": "skopeo-1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "skopeo-1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.src.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:skopeo-1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8"
},
"product_reference": "skopeo-1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "skopeo-1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.x86_64.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:skopeo-1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8"
},
"product_reference": "skopeo-1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "skopeo-tests-1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.aarch64.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:skopeo-tests-1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8"
},
"product_reference": "skopeo-tests-1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "skopeo-tests-1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:skopeo-tests-1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8"
},
"product_reference": "skopeo-tests-1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "skopeo-tests-1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.s390x.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:skopeo-tests-1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8"
},
"product_reference": "skopeo-tests-1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "skopeo-tests-1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.x86_64.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:skopeo-tests-1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8"
},
"product_reference": "skopeo-tests-1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "slirp4netns-1.2.0-3.module+el8.8.0+21741+dd5be1e7.aarch64.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:slirp4netns-1.2.0-3.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8"
},
"product_reference": "slirp4netns-1.2.0-3.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "slirp4netns-1.2.0-3.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:slirp4netns-1.2.0-3.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8"
},
"product_reference": "slirp4netns-1.2.0-3.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "slirp4netns-1.2.0-3.module+el8.8.0+21741+dd5be1e7.s390x.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:slirp4netns-1.2.0-3.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8"
},
"product_reference": "slirp4netns-1.2.0-3.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "slirp4netns-1.2.0-3.module+el8.8.0+21741+dd5be1e7.src.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:slirp4netns-1.2.0-3.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8"
},
"product_reference": "slirp4netns-1.2.0-3.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "slirp4netns-1.2.0-3.module+el8.8.0+21741+dd5be1e7.x86_64.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:slirp4netns-1.2.0-3.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8"
},
"product_reference": "slirp4netns-1.2.0-3.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "slirp4netns-debuginfo-1.2.0-3.module+el8.8.0+21741+dd5be1e7.aarch64.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:slirp4netns-debuginfo-1.2.0-3.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8"
},
"product_reference": "slirp4netns-debuginfo-1.2.0-3.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "slirp4netns-debuginfo-1.2.0-3.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:slirp4netns-debuginfo-1.2.0-3.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8"
},
"product_reference": "slirp4netns-debuginfo-1.2.0-3.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "slirp4netns-debuginfo-1.2.0-3.module+el8.8.0+21741+dd5be1e7.s390x.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:slirp4netns-debuginfo-1.2.0-3.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8"
},
"product_reference": "slirp4netns-debuginfo-1.2.0-3.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "slirp4netns-debuginfo-1.2.0-3.module+el8.8.0+21741+dd5be1e7.x86_64.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:slirp4netns-debuginfo-1.2.0-3.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8"
},
"product_reference": "slirp4netns-debuginfo-1.2.0-3.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "slirp4netns-debugsource-1.2.0-3.module+el8.8.0+21741+dd5be1e7.aarch64.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:slirp4netns-debugsource-1.2.0-3.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8"
},
"product_reference": "slirp4netns-debugsource-1.2.0-3.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "slirp4netns-debugsource-1.2.0-3.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:slirp4netns-debugsource-1.2.0-3.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8"
},
"product_reference": "slirp4netns-debugsource-1.2.0-3.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "slirp4netns-debugsource-1.2.0-3.module+el8.8.0+21741+dd5be1e7.s390x.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:slirp4netns-debugsource-1.2.0-3.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8"
},
"product_reference": "slirp4netns-debugsource-1.2.0-3.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "slirp4netns-debugsource-1.2.0-3.module+el8.8.0+21741+dd5be1e7.x86_64.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:slirp4netns-debugsource-1.2.0-3.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8"
},
"product_reference": "slirp4netns-debugsource-1.2.0-3.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "toolbox-0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.aarch64.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:toolbox-0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8"
},
"product_reference": "toolbox-0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "toolbox-0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:toolbox-0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8"
},
"product_reference": "toolbox-0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "toolbox-0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.s390x.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:toolbox-0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8"
},
"product_reference": "toolbox-0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "toolbox-0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.src.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:toolbox-0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8"
},
"product_reference": "toolbox-0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "toolbox-0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.x86_64.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:toolbox-0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8"
},
"product_reference": "toolbox-0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "toolbox-debuginfo-0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.aarch64.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:toolbox-debuginfo-0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8"
},
"product_reference": "toolbox-debuginfo-0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "toolbox-debuginfo-0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:toolbox-debuginfo-0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8"
},
"product_reference": "toolbox-debuginfo-0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "toolbox-debuginfo-0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.s390x.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:toolbox-debuginfo-0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8"
},
"product_reference": "toolbox-debuginfo-0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "toolbox-debuginfo-0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.x86_64.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:toolbox-debuginfo-0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8"
},
"product_reference": "toolbox-debuginfo-0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "toolbox-debugsource-0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.aarch64.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:toolbox-debugsource-0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8"
},
"product_reference": "toolbox-debugsource-0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "toolbox-debugsource-0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:toolbox-debugsource-0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8"
},
"product_reference": "toolbox-debugsource-0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "toolbox-debugsource-0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.s390x.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:toolbox-debugsource-0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8"
},
"product_reference": "toolbox-debugsource-0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "toolbox-debugsource-0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.x86_64.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:toolbox-debugsource-0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8"
},
"product_reference": "toolbox-debugsource-0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "toolbox-tests-0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.aarch64.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:toolbox-tests-0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8"
},
"product_reference": "toolbox-tests-0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "toolbox-tests-0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:toolbox-tests-0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8"
},
"product_reference": "toolbox-tests-0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "toolbox-tests-0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.s390x.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:toolbox-tests-0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8"
},
"product_reference": "toolbox-tests-0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "toolbox-tests-0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.x86_64.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:toolbox-tests-0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8"
},
"product_reference": "toolbox-tests-0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "udica-0.2.6-20.module+el8.8.0+21741+dd5be1e7.noarch.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:udica-0.2.6-20.module+el8.8.0+21741+dd5be1e7.noarch.rpm-container-tools:rhel8"
},
"product_reference": "udica-0.2.6-20.module+el8.8.0+21741+dd5be1e7.noarch.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "udica-0.2.6-20.module+el8.8.0+21741+dd5be1e7.src.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:udica-0.2.6-20.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8"
},
"product_reference": "udica-0.2.6-20.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Erik Sj\u00f6lund"
],
"organization": "Upstream"
}
],
"cve": "CVE-2022-4122",
"cwe": {
"id": "CWE-59",
"name": "Improper Link Resolution Before File Access (\u0027Link Following\u0027)"
},
"discovery_date": "2022-11-22T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2144983"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in buildah and podman. Incorrect following of symlinks while reading .containerignore and .dockerignore results in information disclosure.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "podman: Symlink error leads to information disclosure",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "These bugs come about when \"podman --remote build ...\" is run, thus affecting buildah, but the bug itself needs to be fixed in podman, and ported to Buildah.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.8.0.Z.EUS:aardvark-dns-1.5.0-2.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:aardvark-dns-1.5.0-2.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:aardvark-dns-1.5.0-2.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:aardvark-dns-1.5.0-2.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:aardvark-dns-1.5.0-2.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:buildah-1.29.3-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:buildah-1.29.3-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:buildah-1.29.3-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:buildah-1.29.3-1.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:buildah-1.29.3-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:buildah-debuginfo-1.29.3-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:buildah-debuginfo-1.29.3-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:buildah-debuginfo-1.29.3-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:buildah-debuginfo-1.29.3-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:buildah-debugsource-1.29.3-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:buildah-debugsource-1.29.3-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:buildah-debugsource-1.29.3-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:buildah-debugsource-1.29.3-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:buildah-tests-1.29.3-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:buildah-tests-1.29.3-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:buildah-tests-1.29.3-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:buildah-tests-1.29.3-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:buildah-tests-debuginfo-1.29.3-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:buildah-tests-debuginfo-1.29.3-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:buildah-tests-debuginfo-1.29.3-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:buildah-tests-debuginfo-1.29.3-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:cockpit-podman-63.1-1.module+el8.8.0+21741+dd5be1e7.noarch.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:cockpit-podman-63.1-1.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:conmon-2.1.6-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:conmon-2.1.6-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:conmon-2.1.6-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:conmon-2.1.6-1.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:conmon-2.1.6-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:conmon-debuginfo-2.1.6-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:conmon-debuginfo-2.1.6-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:conmon-debuginfo-2.1.6-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:conmon-debuginfo-2.1.6-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:conmon-debugsource-2.1.6-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:conmon-debugsource-2.1.6-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:conmon-debugsource-2.1.6-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:conmon-debugsource-2.1.6-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:container-selinux-2.229.0-1.module+el8.8.0+21741+dd5be1e7.noarch.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:container-selinux-2.229.0-1.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:containernetworking-plugins-1.2.0-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:containernetworking-plugins-1.2.0-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:containernetworking-plugins-1.2.0-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:containernetworking-plugins-1.2.0-1.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:containernetworking-plugins-1.2.0-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:containernetworking-plugins-debuginfo-1.2.0-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:containernetworking-plugins-debuginfo-1.2.0-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:containernetworking-plugins-debuginfo-1.2.0-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:containernetworking-plugins-debuginfo-1.2.0-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:containernetworking-plugins-debugsource-1.2.0-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:containernetworking-plugins-debugsource-1.2.0-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:containernetworking-plugins-debugsource-1.2.0-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:containernetworking-plugins-debugsource-1.2.0-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:containers-common-1-65.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:containers-common-1-65.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:containers-common-1-65.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:containers-common-1-65.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:containers-common-1-65.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:crit-3.15-4.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:crit-3.15-4.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:crit-3.15-4.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:crit-3.15-4.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:criu-3.15-4.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:criu-3.15-4.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:criu-3.15-4.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:criu-3.15-4.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:criu-3.15-4.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:criu-debuginfo-3.15-4.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:criu-debuginfo-3.15-4.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:criu-debuginfo-3.15-4.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:criu-debuginfo-3.15-4.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:criu-debugsource-3.15-4.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:criu-debugsource-3.15-4.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:criu-debugsource-3.15-4.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:criu-debugsource-3.15-4.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:criu-devel-3.15-4.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:criu-devel-3.15-4.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:criu-devel-3.15-4.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:criu-devel-3.15-4.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:criu-libs-3.15-4.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:criu-libs-3.15-4.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:criu-libs-3.15-4.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:criu-libs-3.15-4.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:criu-libs-debuginfo-3.15-4.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:criu-libs-debuginfo-3.15-4.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:criu-libs-debuginfo-3.15-4.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:criu-libs-debuginfo-3.15-4.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:crun-1.8.4-2.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:crun-1.8.4-2.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:crun-1.8.4-2.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:crun-1.8.4-2.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:crun-1.8.4-2.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:crun-debuginfo-1.8.4-2.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:crun-debuginfo-1.8.4-2.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:crun-debuginfo-1.8.4-2.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:crun-debuginfo-1.8.4-2.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:crun-debugsource-1.8.4-2.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:crun-debugsource-1.8.4-2.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:crun-debugsource-1.8.4-2.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:crun-debugsource-1.8.4-2.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:fuse-overlayfs-1.11-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:fuse-overlayfs-1.11-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:fuse-overlayfs-1.11-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:fuse-overlayfs-1.11-1.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:fuse-overlayfs-1.11-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:fuse-overlayfs-debuginfo-1.11-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:fuse-overlayfs-debuginfo-1.11-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:fuse-overlayfs-debuginfo-1.11-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:fuse-overlayfs-debuginfo-1.11-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:fuse-overlayfs-debugsource-1.11-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:fuse-overlayfs-debugsource-1.11-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:fuse-overlayfs-debugsource-1.11-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:fuse-overlayfs-debugsource-1.11-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:libslirp-4.4.0-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:libslirp-4.4.0-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:libslirp-4.4.0-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:libslirp-4.4.0-1.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:libslirp-4.4.0-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:libslirp-debuginfo-4.4.0-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:libslirp-debuginfo-4.4.0-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:libslirp-debuginfo-4.4.0-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:libslirp-debuginfo-4.4.0-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:libslirp-debugsource-4.4.0-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:libslirp-debugsource-4.4.0-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:libslirp-debugsource-4.4.0-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:libslirp-debugsource-4.4.0-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:libslirp-devel-4.4.0-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:libslirp-devel-4.4.0-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:libslirp-devel-4.4.0-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:libslirp-devel-4.4.0-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:netavark-1.5.1-3.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:netavark-1.5.1-3.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:netavark-1.5.1-3.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:netavark-1.5.1-3.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:netavark-1.5.1-3.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:oci-seccomp-bpf-hook-1.2.8-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:oci-seccomp-bpf-hook-1.2.8-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:oci-seccomp-bpf-hook-1.2.8-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:oci-seccomp-bpf-hook-1.2.8-1.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:oci-seccomp-bpf-hook-1.2.8-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:oci-seccomp-bpf-hook-debuginfo-1.2.8-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:oci-seccomp-bpf-hook-debuginfo-1.2.8-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:oci-seccomp-bpf-hook-debuginfo-1.2.8-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:oci-seccomp-bpf-hook-debuginfo-1.2.8-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:oci-seccomp-bpf-hook-debugsource-1.2.8-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:oci-seccomp-bpf-hook-debugsource-1.2.8-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:oci-seccomp-bpf-hook-debugsource-1.2.8-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:oci-seccomp-bpf-hook-debugsource-1.2.8-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-4.4.1-19.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-catatonit-4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-catatonit-4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-catatonit-4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-catatonit-4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-catatonit-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-catatonit-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-catatonit-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-catatonit-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-debugsource-4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-debugsource-4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-debugsource-4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-debugsource-4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-docker-4.4.1-19.module+el8.8.0+21741+dd5be1e7.noarch.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-gvproxy-4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-gvproxy-4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-gvproxy-4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-gvproxy-4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-gvproxy-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-gvproxy-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-gvproxy-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-gvproxy-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-plugins-4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-plugins-4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-plugins-4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-plugins-4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-plugins-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-plugins-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-plugins-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-plugins-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-remote-4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-remote-4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-remote-4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-remote-4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-remote-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-remote-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-remote-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-remote-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-tests-4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-tests-4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-tests-4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-tests-4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:python-podman-4.4.1-1.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:python3-criu-3.15-4.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:python3-criu-3.15-4.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:python3-criu-3.15-4.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:python3-criu-3.15-4.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:python3-podman-4.4.1-1.module+el8.8.0+21741+dd5be1e7.noarch.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:runc-1.1.12-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:runc-1.1.12-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:runc-1.1.12-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:runc-1.1.12-1.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:runc-1.1.12-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:runc-debuginfo-1.1.12-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:runc-debuginfo-1.1.12-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:runc-debuginfo-1.1.12-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:runc-debuginfo-1.1.12-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:runc-debugsource-1.1.12-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:runc-debugsource-1.1.12-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:runc-debugsource-1.1.12-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:runc-debugsource-1.1.12-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:skopeo-1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:skopeo-1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:skopeo-1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:skopeo-1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:skopeo-1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:skopeo-tests-1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:skopeo-tests-1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:skopeo-tests-1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:skopeo-tests-1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:slirp4netns-1.2.0-3.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:slirp4netns-1.2.0-3.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:slirp4netns-1.2.0-3.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:slirp4netns-1.2.0-3.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:slirp4netns-1.2.0-3.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:slirp4netns-debuginfo-1.2.0-3.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:slirp4netns-debuginfo-1.2.0-3.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:slirp4netns-debuginfo-1.2.0-3.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:slirp4netns-debuginfo-1.2.0-3.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:slirp4netns-debugsource-1.2.0-3.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:slirp4netns-debugsource-1.2.0-3.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:slirp4netns-debugsource-1.2.0-3.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:slirp4netns-debugsource-1.2.0-3.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:toolbox-0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:toolbox-0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:toolbox-0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:toolbox-0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:toolbox-0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:toolbox-debuginfo-0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:toolbox-debuginfo-0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:toolbox-debuginfo-0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:toolbox-debuginfo-0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:toolbox-debugsource-0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:toolbox-debugsource-0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:toolbox-debugsource-0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:toolbox-debugsource-0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:toolbox-tests-0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:toolbox-tests-0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:toolbox-tests-0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:toolbox-tests-0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:udica-0.2.6-20.module+el8.8.0+21741+dd5be1e7.noarch.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:udica-0.2.6-20.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-4122"
},
{
"category": "external",
"summary": "RHBZ#2144983",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2144983"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-4122",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4122"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-4122",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-4122"
},
{
"category": "external",
"summary": "https://github.com/containers/podman/pull/16315",
"url": "https://github.com/containers/podman/pull/16315"
}
],
"release_date": "2022-11-22T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-04-29T12:00:29+00:00",
"details": "For details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.8.0.Z.EUS:aardvark-dns-1.5.0-2.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:aardvark-dns-1.5.0-2.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:aardvark-dns-1.5.0-2.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:aardvark-dns-1.5.0-2.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:aardvark-dns-1.5.0-2.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:buildah-1.29.3-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:buildah-1.29.3-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:buildah-1.29.3-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:buildah-1.29.3-1.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:buildah-1.29.3-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:buildah-debuginfo-1.29.3-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:buildah-debuginfo-1.29.3-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:buildah-debuginfo-1.29.3-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:buildah-debuginfo-1.29.3-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:buildah-debugsource-1.29.3-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:buildah-debugsource-1.29.3-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:buildah-debugsource-1.29.3-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:buildah-debugsource-1.29.3-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:buildah-tests-1.29.3-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:buildah-tests-1.29.3-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:buildah-tests-1.29.3-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:buildah-tests-1.29.3-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:buildah-tests-debuginfo-1.29.3-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:buildah-tests-debuginfo-1.29.3-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:buildah-tests-debuginfo-1.29.3-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:buildah-tests-debuginfo-1.29.3-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:cockpit-podman-63.1-1.module+el8.8.0+21741+dd5be1e7.noarch.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:cockpit-podman-63.1-1.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:conmon-2.1.6-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:conmon-2.1.6-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:conmon-2.1.6-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:conmon-2.1.6-1.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:conmon-2.1.6-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:conmon-debuginfo-2.1.6-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:conmon-debuginfo-2.1.6-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:conmon-debuginfo-2.1.6-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:conmon-debuginfo-2.1.6-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:conmon-debugsource-2.1.6-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:conmon-debugsource-2.1.6-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:conmon-debugsource-2.1.6-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:conmon-debugsource-2.1.6-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:container-selinux-2.229.0-1.module+el8.8.0+21741+dd5be1e7.noarch.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:container-selinux-2.229.0-1.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:containernetworking-plugins-1.2.0-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:containernetworking-plugins-1.2.0-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:containernetworking-plugins-1.2.0-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:containernetworking-plugins-1.2.0-1.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:containernetworking-plugins-1.2.0-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:containernetworking-plugins-debuginfo-1.2.0-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:containernetworking-plugins-debuginfo-1.2.0-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:containernetworking-plugins-debuginfo-1.2.0-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:containernetworking-plugins-debuginfo-1.2.0-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:containernetworking-plugins-debugsource-1.2.0-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:containernetworking-plugins-debugsource-1.2.0-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:containernetworking-plugins-debugsource-1.2.0-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:containernetworking-plugins-debugsource-1.2.0-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:containers-common-1-65.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:containers-common-1-65.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:containers-common-1-65.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:containers-common-1-65.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:containers-common-1-65.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:crit-3.15-4.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:crit-3.15-4.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:crit-3.15-4.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:crit-3.15-4.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:criu-3.15-4.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:criu-3.15-4.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:criu-3.15-4.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:criu-3.15-4.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:criu-3.15-4.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:criu-debuginfo-3.15-4.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:criu-debuginfo-3.15-4.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:criu-debuginfo-3.15-4.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:criu-debuginfo-3.15-4.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:criu-debugsource-3.15-4.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:criu-debugsource-3.15-4.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:criu-debugsource-3.15-4.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:criu-debugsource-3.15-4.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:criu-devel-3.15-4.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:criu-devel-3.15-4.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:criu-devel-3.15-4.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:criu-devel-3.15-4.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:criu-libs-3.15-4.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:criu-libs-3.15-4.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:criu-libs-3.15-4.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:criu-libs-3.15-4.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:criu-libs-debuginfo-3.15-4.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:criu-libs-debuginfo-3.15-4.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:criu-libs-debuginfo-3.15-4.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:criu-libs-debuginfo-3.15-4.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:crun-1.8.4-2.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:crun-1.8.4-2.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:crun-1.8.4-2.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:crun-1.8.4-2.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:crun-1.8.4-2.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:crun-debuginfo-1.8.4-2.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:crun-debuginfo-1.8.4-2.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:crun-debuginfo-1.8.4-2.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:crun-debuginfo-1.8.4-2.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:crun-debugsource-1.8.4-2.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:crun-debugsource-1.8.4-2.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:crun-debugsource-1.8.4-2.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:crun-debugsource-1.8.4-2.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:fuse-overlayfs-1.11-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:fuse-overlayfs-1.11-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:fuse-overlayfs-1.11-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:fuse-overlayfs-1.11-1.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:fuse-overlayfs-1.11-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:fuse-overlayfs-debuginfo-1.11-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:fuse-overlayfs-debuginfo-1.11-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:fuse-overlayfs-debuginfo-1.11-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:fuse-overlayfs-debuginfo-1.11-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:fuse-overlayfs-debugsource-1.11-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:fuse-overlayfs-debugsource-1.11-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:fuse-overlayfs-debugsource-1.11-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:fuse-overlayfs-debugsource-1.11-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:libslirp-4.4.0-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:libslirp-4.4.0-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:libslirp-4.4.0-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:libslirp-4.4.0-1.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:libslirp-4.4.0-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:libslirp-debuginfo-4.4.0-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:libslirp-debuginfo-4.4.0-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:libslirp-debuginfo-4.4.0-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:libslirp-debuginfo-4.4.0-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:libslirp-debugsource-4.4.0-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:libslirp-debugsource-4.4.0-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:libslirp-debugsource-4.4.0-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:libslirp-debugsource-4.4.0-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:libslirp-devel-4.4.0-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:libslirp-devel-4.4.0-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:libslirp-devel-4.4.0-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:libslirp-devel-4.4.0-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:netavark-1.5.1-3.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:netavark-1.5.1-3.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:netavark-1.5.1-3.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:netavark-1.5.1-3.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:netavark-1.5.1-3.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:oci-seccomp-bpf-hook-1.2.8-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:oci-seccomp-bpf-hook-1.2.8-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:oci-seccomp-bpf-hook-1.2.8-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:oci-seccomp-bpf-hook-1.2.8-1.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:oci-seccomp-bpf-hook-1.2.8-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:oci-seccomp-bpf-hook-debuginfo-1.2.8-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:oci-seccomp-bpf-hook-debuginfo-1.2.8-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:oci-seccomp-bpf-hook-debuginfo-1.2.8-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:oci-seccomp-bpf-hook-debuginfo-1.2.8-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:oci-seccomp-bpf-hook-debugsource-1.2.8-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:oci-seccomp-bpf-hook-debugsource-1.2.8-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:oci-seccomp-bpf-hook-debugsource-1.2.8-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:oci-seccomp-bpf-hook-debugsource-1.2.8-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-4.4.1-19.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-catatonit-4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-catatonit-4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-catatonit-4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-catatonit-4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-catatonit-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-catatonit-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-catatonit-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-catatonit-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-debugsource-4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-debugsource-4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-debugsource-4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-debugsource-4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-docker-4.4.1-19.module+el8.8.0+21741+dd5be1e7.noarch.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-gvproxy-4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-gvproxy-4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-gvproxy-4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-gvproxy-4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-gvproxy-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-gvproxy-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-gvproxy-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-gvproxy-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-plugins-4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-plugins-4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-plugins-4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-plugins-4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-plugins-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-plugins-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-plugins-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-plugins-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-remote-4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-remote-4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-remote-4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-remote-4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-remote-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-remote-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-remote-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-remote-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-tests-4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-tests-4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-tests-4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-tests-4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:python-podman-4.4.1-1.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:python3-criu-3.15-4.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:python3-criu-3.15-4.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:python3-criu-3.15-4.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:python3-criu-3.15-4.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:python3-podman-4.4.1-1.module+el8.8.0+21741+dd5be1e7.noarch.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:runc-1.1.12-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:runc-1.1.12-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:runc-1.1.12-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:runc-1.1.12-1.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:runc-1.1.12-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:runc-debuginfo-1.1.12-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:runc-debuginfo-1.1.12-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:runc-debuginfo-1.1.12-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:runc-debuginfo-1.1.12-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:runc-debugsource-1.1.12-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:runc-debugsource-1.1.12-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:runc-debugsource-1.1.12-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:runc-debugsource-1.1.12-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:skopeo-1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:skopeo-1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:skopeo-1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:skopeo-1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:skopeo-1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:skopeo-tests-1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:skopeo-tests-1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:skopeo-tests-1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:skopeo-tests-1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:slirp4netns-1.2.0-3.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:slirp4netns-1.2.0-3.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:slirp4netns-1.2.0-3.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:slirp4netns-1.2.0-3.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:slirp4netns-1.2.0-3.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:slirp4netns-debuginfo-1.2.0-3.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:slirp4netns-debuginfo-1.2.0-3.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:slirp4netns-debuginfo-1.2.0-3.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:slirp4netns-debuginfo-1.2.0-3.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:slirp4netns-debugsource-1.2.0-3.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:slirp4netns-debugsource-1.2.0-3.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:slirp4netns-debugsource-1.2.0-3.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:slirp4netns-debugsource-1.2.0-3.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:toolbox-0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:toolbox-0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:toolbox-0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:toolbox-0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:toolbox-0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:toolbox-debuginfo-0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:toolbox-debuginfo-0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:toolbox-debuginfo-0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:toolbox-debuginfo-0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:toolbox-debugsource-0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:toolbox-debugsource-0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:toolbox-debugsource-0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:toolbox-debugsource-0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:toolbox-tests-0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:toolbox-tests-0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:toolbox-tests-0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:toolbox-tests-0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:udica-0.2.6-20.module+el8.8.0+21741+dd5be1e7.noarch.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:udica-0.2.6-20.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:2077"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"AppStream-8.8.0.Z.EUS:aardvark-dns-1.5.0-2.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:aardvark-dns-1.5.0-2.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:aardvark-dns-1.5.0-2.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:aardvark-dns-1.5.0-2.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:aardvark-dns-1.5.0-2.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:buildah-1.29.3-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:buildah-1.29.3-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:buildah-1.29.3-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:buildah-1.29.3-1.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:buildah-1.29.3-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:buildah-debuginfo-1.29.3-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:buildah-debuginfo-1.29.3-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:buildah-debuginfo-1.29.3-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:buildah-debuginfo-1.29.3-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:buildah-debugsource-1.29.3-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:buildah-debugsource-1.29.3-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:buildah-debugsource-1.29.3-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:buildah-debugsource-1.29.3-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:buildah-tests-1.29.3-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:buildah-tests-1.29.3-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:buildah-tests-1.29.3-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:buildah-tests-1.29.3-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:buildah-tests-debuginfo-1.29.3-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:buildah-tests-debuginfo-1.29.3-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:buildah-tests-debuginfo-1.29.3-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:buildah-tests-debuginfo-1.29.3-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:cockpit-podman-63.1-1.module+el8.8.0+21741+dd5be1e7.noarch.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:cockpit-podman-63.1-1.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:conmon-2.1.6-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:conmon-2.1.6-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:conmon-2.1.6-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:conmon-2.1.6-1.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:conmon-2.1.6-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:conmon-debuginfo-2.1.6-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:conmon-debuginfo-2.1.6-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:conmon-debuginfo-2.1.6-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:conmon-debuginfo-2.1.6-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:conmon-debugsource-2.1.6-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:conmon-debugsource-2.1.6-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:conmon-debugsource-2.1.6-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:conmon-debugsource-2.1.6-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:container-selinux-2.229.0-1.module+el8.8.0+21741+dd5be1e7.noarch.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:container-selinux-2.229.0-1.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:containernetworking-plugins-1.2.0-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:containernetworking-plugins-1.2.0-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:containernetworking-plugins-1.2.0-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:containernetworking-plugins-1.2.0-1.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:containernetworking-plugins-1.2.0-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:containernetworking-plugins-debuginfo-1.2.0-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:containernetworking-plugins-debuginfo-1.2.0-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:containernetworking-plugins-debuginfo-1.2.0-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:containernetworking-plugins-debuginfo-1.2.0-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:containernetworking-plugins-debugsource-1.2.0-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:containernetworking-plugins-debugsource-1.2.0-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:containernetworking-plugins-debugsource-1.2.0-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:containernetworking-plugins-debugsource-1.2.0-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:containers-common-1-65.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:containers-common-1-65.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:containers-common-1-65.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:containers-common-1-65.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:containers-common-1-65.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:crit-3.15-4.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:crit-3.15-4.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:crit-3.15-4.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:crit-3.15-4.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:criu-3.15-4.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:criu-3.15-4.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:criu-3.15-4.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:criu-3.15-4.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:criu-3.15-4.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:criu-debuginfo-3.15-4.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:criu-debuginfo-3.15-4.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:criu-debuginfo-3.15-4.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:criu-debuginfo-3.15-4.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:criu-debugsource-3.15-4.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:criu-debugsource-3.15-4.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:criu-debugsource-3.15-4.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:criu-debugsource-3.15-4.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:criu-devel-3.15-4.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:criu-devel-3.15-4.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:criu-devel-3.15-4.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:criu-devel-3.15-4.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:criu-libs-3.15-4.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:criu-libs-3.15-4.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:criu-libs-3.15-4.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:criu-libs-3.15-4.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:criu-libs-debuginfo-3.15-4.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:criu-libs-debuginfo-3.15-4.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:criu-libs-debuginfo-3.15-4.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:criu-libs-debuginfo-3.15-4.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:crun-1.8.4-2.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:crun-1.8.4-2.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:crun-1.8.4-2.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:crun-1.8.4-2.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:crun-1.8.4-2.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:crun-debuginfo-1.8.4-2.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:crun-debuginfo-1.8.4-2.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:crun-debuginfo-1.8.4-2.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:crun-debuginfo-1.8.4-2.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:crun-debugsource-1.8.4-2.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:crun-debugsource-1.8.4-2.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:crun-debugsource-1.8.4-2.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:crun-debugsource-1.8.4-2.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:fuse-overlayfs-1.11-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:fuse-overlayfs-1.11-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:fuse-overlayfs-1.11-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:fuse-overlayfs-1.11-1.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:fuse-overlayfs-1.11-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:fuse-overlayfs-debuginfo-1.11-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:fuse-overlayfs-debuginfo-1.11-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:fuse-overlayfs-debuginfo-1.11-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:fuse-overlayfs-debuginfo-1.11-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:fuse-overlayfs-debugsource-1.11-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:fuse-overlayfs-debugsource-1.11-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:fuse-overlayfs-debugsource-1.11-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:fuse-overlayfs-debugsource-1.11-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:libslirp-4.4.0-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:libslirp-4.4.0-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:libslirp-4.4.0-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:libslirp-4.4.0-1.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:libslirp-4.4.0-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:libslirp-debuginfo-4.4.0-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:libslirp-debuginfo-4.4.0-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:libslirp-debuginfo-4.4.0-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:libslirp-debuginfo-4.4.0-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:libslirp-debugsource-4.4.0-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:libslirp-debugsource-4.4.0-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:libslirp-debugsource-4.4.0-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:libslirp-debugsource-4.4.0-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:libslirp-devel-4.4.0-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:libslirp-devel-4.4.0-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:libslirp-devel-4.4.0-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:libslirp-devel-4.4.0-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:netavark-1.5.1-3.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:netavark-1.5.1-3.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:netavark-1.5.1-3.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:netavark-1.5.1-3.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:netavark-1.5.1-3.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:oci-seccomp-bpf-hook-1.2.8-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:oci-seccomp-bpf-hook-1.2.8-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:oci-seccomp-bpf-hook-1.2.8-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:oci-seccomp-bpf-hook-1.2.8-1.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:oci-seccomp-bpf-hook-1.2.8-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:oci-seccomp-bpf-hook-debuginfo-1.2.8-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:oci-seccomp-bpf-hook-debuginfo-1.2.8-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:oci-seccomp-bpf-hook-debuginfo-1.2.8-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:oci-seccomp-bpf-hook-debuginfo-1.2.8-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:oci-seccomp-bpf-hook-debugsource-1.2.8-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:oci-seccomp-bpf-hook-debugsource-1.2.8-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:oci-seccomp-bpf-hook-debugsource-1.2.8-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:oci-seccomp-bpf-hook-debugsource-1.2.8-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-4.4.1-19.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-catatonit-4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-catatonit-4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-catatonit-4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-catatonit-4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-catatonit-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-catatonit-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-catatonit-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-catatonit-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-debugsource-4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-debugsource-4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-debugsource-4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-debugsource-4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-docker-4.4.1-19.module+el8.8.0+21741+dd5be1e7.noarch.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-gvproxy-4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-gvproxy-4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-gvproxy-4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-gvproxy-4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-gvproxy-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-gvproxy-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-gvproxy-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-gvproxy-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-plugins-4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-plugins-4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-plugins-4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-plugins-4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-plugins-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-plugins-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-plugins-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-plugins-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-remote-4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-remote-4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-remote-4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-remote-4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-remote-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-remote-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-remote-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-remote-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-tests-4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-tests-4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-tests-4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-tests-4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:python-podman-4.4.1-1.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:python3-criu-3.15-4.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:python3-criu-3.15-4.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:python3-criu-3.15-4.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:python3-criu-3.15-4.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:python3-podman-4.4.1-1.module+el8.8.0+21741+dd5be1e7.noarch.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:runc-1.1.12-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:runc-1.1.12-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:runc-1.1.12-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:runc-1.1.12-1.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:runc-1.1.12-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:runc-debuginfo-1.1.12-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:runc-debuginfo-1.1.12-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:runc-debuginfo-1.1.12-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:runc-debuginfo-1.1.12-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:runc-debugsource-1.1.12-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:runc-debugsource-1.1.12-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:runc-debugsource-1.1.12-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:runc-debugsource-1.1.12-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:skopeo-1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:skopeo-1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:skopeo-1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:skopeo-1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:skopeo-1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:skopeo-tests-1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:skopeo-tests-1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:skopeo-tests-1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:skopeo-tests-1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:slirp4netns-1.2.0-3.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:slirp4netns-1.2.0-3.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:slirp4netns-1.2.0-3.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:slirp4netns-1.2.0-3.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:slirp4netns-1.2.0-3.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:slirp4netns-debuginfo-1.2.0-3.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:slirp4netns-debuginfo-1.2.0-3.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:slirp4netns-debuginfo-1.2.0-3.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:slirp4netns-debuginfo-1.2.0-3.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:slirp4netns-debugsource-1.2.0-3.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:slirp4netns-debugsource-1.2.0-3.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:slirp4netns-debugsource-1.2.0-3.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:slirp4netns-debugsource-1.2.0-3.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:toolbox-0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:toolbox-0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:toolbox-0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:toolbox-0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:toolbox-0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:toolbox-debuginfo-0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:toolbox-debuginfo-0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:toolbox-debuginfo-0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:toolbox-debuginfo-0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:toolbox-debugsource-0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:toolbox-debugsource-0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:toolbox-debugsource-0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:toolbox-debugsource-0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:toolbox-tests-0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:toolbox-tests-0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:toolbox-tests-0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:toolbox-tests-0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:udica-0.2.6-20.module+el8.8.0+21741+dd5be1e7.noarch.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:udica-0.2.6-20.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "podman: Symlink error leads to information disclosure"
},
{
"cve": "CVE-2022-32149",
"cwe": {
"id": "CWE-407",
"name": "Inefficient Algorithmic Complexity"
},
"discovery_date": "2022-10-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2134010"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in the golang.org/x/text/language package. An attacker can craft an Accept-Language header which ParseAcceptLanguage will take significant time to parse. This issue leads to a denial of service, and can impact availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: golang.org/x/text/language: ParseAcceptLanguage takes a long time to parse complex tags",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "After careful analysis of the vulnerability Redhat is choosing to keep the vulnerability severity as moderate,the vulnerability exists in the ParseAcceptLanguage function of the golang text/language package,when an attacker could craft an unusually large accept header and due to the parser taking quadratic time complexity to finish, firstly the attacker would have to find a way smuggle an input to the parser and even then this would simply not result in a crash of any kind but more of resource hang which while can be unpleasant,does not equate to any real world damage.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.8.0.Z.EUS:aardvark-dns-1.5.0-2.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:aardvark-dns-1.5.0-2.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:aardvark-dns-1.5.0-2.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:aardvark-dns-1.5.0-2.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:aardvark-dns-1.5.0-2.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:buildah-1.29.3-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:buildah-1.29.3-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:buildah-1.29.3-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:buildah-1.29.3-1.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:buildah-1.29.3-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:buildah-debuginfo-1.29.3-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:buildah-debuginfo-1.29.3-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:buildah-debuginfo-1.29.3-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:buildah-debuginfo-1.29.3-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:buildah-debugsource-1.29.3-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:buildah-debugsource-1.29.3-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:buildah-debugsource-1.29.3-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:buildah-debugsource-1.29.3-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:buildah-tests-1.29.3-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:buildah-tests-1.29.3-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:buildah-tests-1.29.3-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:buildah-tests-1.29.3-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:buildah-tests-debuginfo-1.29.3-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:buildah-tests-debuginfo-1.29.3-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:buildah-tests-debuginfo-1.29.3-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:buildah-tests-debuginfo-1.29.3-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:cockpit-podman-63.1-1.module+el8.8.0+21741+dd5be1e7.noarch.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:cockpit-podman-63.1-1.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:conmon-2.1.6-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:conmon-2.1.6-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:conmon-2.1.6-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:conmon-2.1.6-1.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:conmon-2.1.6-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:conmon-debuginfo-2.1.6-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:conmon-debuginfo-2.1.6-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:conmon-debuginfo-2.1.6-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:conmon-debuginfo-2.1.6-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:conmon-debugsource-2.1.6-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:conmon-debugsource-2.1.6-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:conmon-debugsource-2.1.6-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:conmon-debugsource-2.1.6-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:container-selinux-2.229.0-1.module+el8.8.0+21741+dd5be1e7.noarch.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:container-selinux-2.229.0-1.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:containernetworking-plugins-1.2.0-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:containernetworking-plugins-1.2.0-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:containernetworking-plugins-1.2.0-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:containernetworking-plugins-1.2.0-1.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:containernetworking-plugins-1.2.0-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:containernetworking-plugins-debuginfo-1.2.0-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:containernetworking-plugins-debuginfo-1.2.0-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:containernetworking-plugins-debuginfo-1.2.0-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:containernetworking-plugins-debuginfo-1.2.0-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:containernetworking-plugins-debugsource-1.2.0-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:containernetworking-plugins-debugsource-1.2.0-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:containernetworking-plugins-debugsource-1.2.0-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:containernetworking-plugins-debugsource-1.2.0-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:containers-common-1-65.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:containers-common-1-65.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:containers-common-1-65.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:containers-common-1-65.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:containers-common-1-65.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:crit-3.15-4.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:crit-3.15-4.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:crit-3.15-4.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:crit-3.15-4.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:criu-3.15-4.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:criu-3.15-4.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:criu-3.15-4.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:criu-3.15-4.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:criu-3.15-4.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:criu-debuginfo-3.15-4.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:criu-debuginfo-3.15-4.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:criu-debuginfo-3.15-4.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:criu-debuginfo-3.15-4.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:criu-debugsource-3.15-4.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:criu-debugsource-3.15-4.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:criu-debugsource-3.15-4.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:criu-debugsource-3.15-4.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:criu-devel-3.15-4.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:criu-devel-3.15-4.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:criu-devel-3.15-4.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:criu-devel-3.15-4.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:criu-libs-3.15-4.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:criu-libs-3.15-4.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:criu-libs-3.15-4.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:criu-libs-3.15-4.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:criu-libs-debuginfo-3.15-4.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:criu-libs-debuginfo-3.15-4.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:criu-libs-debuginfo-3.15-4.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:criu-libs-debuginfo-3.15-4.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:crun-1.8.4-2.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:crun-1.8.4-2.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:crun-1.8.4-2.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:crun-1.8.4-2.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:crun-1.8.4-2.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:crun-debuginfo-1.8.4-2.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:crun-debuginfo-1.8.4-2.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:crun-debuginfo-1.8.4-2.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:crun-debuginfo-1.8.4-2.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:crun-debugsource-1.8.4-2.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:crun-debugsource-1.8.4-2.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:crun-debugsource-1.8.4-2.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:crun-debugsource-1.8.4-2.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:fuse-overlayfs-1.11-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:fuse-overlayfs-1.11-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:fuse-overlayfs-1.11-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:fuse-overlayfs-1.11-1.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:fuse-overlayfs-1.11-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:fuse-overlayfs-debuginfo-1.11-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:fuse-overlayfs-debuginfo-1.11-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:fuse-overlayfs-debuginfo-1.11-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:fuse-overlayfs-debuginfo-1.11-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:fuse-overlayfs-debugsource-1.11-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:fuse-overlayfs-debugsource-1.11-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:fuse-overlayfs-debugsource-1.11-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:fuse-overlayfs-debugsource-1.11-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:libslirp-4.4.0-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:libslirp-4.4.0-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:libslirp-4.4.0-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:libslirp-4.4.0-1.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:libslirp-4.4.0-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:libslirp-debuginfo-4.4.0-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:libslirp-debuginfo-4.4.0-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:libslirp-debuginfo-4.4.0-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:libslirp-debuginfo-4.4.0-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:libslirp-debugsource-4.4.0-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:libslirp-debugsource-4.4.0-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:libslirp-debugsource-4.4.0-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:libslirp-debugsource-4.4.0-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:libslirp-devel-4.4.0-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:libslirp-devel-4.4.0-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:libslirp-devel-4.4.0-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:libslirp-devel-4.4.0-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:netavark-1.5.1-3.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:netavark-1.5.1-3.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:netavark-1.5.1-3.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:netavark-1.5.1-3.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:netavark-1.5.1-3.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:oci-seccomp-bpf-hook-1.2.8-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:oci-seccomp-bpf-hook-1.2.8-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:oci-seccomp-bpf-hook-1.2.8-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:oci-seccomp-bpf-hook-1.2.8-1.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:oci-seccomp-bpf-hook-1.2.8-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:oci-seccomp-bpf-hook-debuginfo-1.2.8-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:oci-seccomp-bpf-hook-debuginfo-1.2.8-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:oci-seccomp-bpf-hook-debuginfo-1.2.8-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:oci-seccomp-bpf-hook-debuginfo-1.2.8-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:oci-seccomp-bpf-hook-debugsource-1.2.8-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:oci-seccomp-bpf-hook-debugsource-1.2.8-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:oci-seccomp-bpf-hook-debugsource-1.2.8-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:oci-seccomp-bpf-hook-debugsource-1.2.8-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-4.4.1-19.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-catatonit-4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-catatonit-4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-catatonit-4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-catatonit-4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-catatonit-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-catatonit-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-catatonit-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-catatonit-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-debugsource-4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-debugsource-4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-debugsource-4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-debugsource-4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-docker-4.4.1-19.module+el8.8.0+21741+dd5be1e7.noarch.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-gvproxy-4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-gvproxy-4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-gvproxy-4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-gvproxy-4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-gvproxy-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-gvproxy-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-gvproxy-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-gvproxy-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-plugins-4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-plugins-4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-plugins-4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-plugins-4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-plugins-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-plugins-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-plugins-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-plugins-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-remote-4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-remote-4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-remote-4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-remote-4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-remote-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-remote-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-remote-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-remote-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-tests-4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-tests-4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-tests-4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-tests-4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:python-podman-4.4.1-1.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:python3-criu-3.15-4.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:python3-criu-3.15-4.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:python3-criu-3.15-4.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:python3-criu-3.15-4.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:python3-podman-4.4.1-1.module+el8.8.0+21741+dd5be1e7.noarch.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:runc-1.1.12-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:runc-1.1.12-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:runc-1.1.12-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:runc-1.1.12-1.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:runc-1.1.12-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:runc-debuginfo-1.1.12-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:runc-debuginfo-1.1.12-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:runc-debuginfo-1.1.12-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:runc-debuginfo-1.1.12-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:runc-debugsource-1.1.12-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:runc-debugsource-1.1.12-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:runc-debugsource-1.1.12-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:runc-debugsource-1.1.12-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:skopeo-1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:skopeo-1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:skopeo-1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:skopeo-1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:skopeo-1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:skopeo-tests-1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:skopeo-tests-1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:skopeo-tests-1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:skopeo-tests-1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:slirp4netns-1.2.0-3.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:slirp4netns-1.2.0-3.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:slirp4netns-1.2.0-3.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:slirp4netns-1.2.0-3.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:slirp4netns-1.2.0-3.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:slirp4netns-debuginfo-1.2.0-3.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:slirp4netns-debuginfo-1.2.0-3.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:slirp4netns-debuginfo-1.2.0-3.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:slirp4netns-debuginfo-1.2.0-3.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:slirp4netns-debugsource-1.2.0-3.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:slirp4netns-debugsource-1.2.0-3.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:slirp4netns-debugsource-1.2.0-3.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:slirp4netns-debugsource-1.2.0-3.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:toolbox-0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:toolbox-0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:toolbox-0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:toolbox-0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:toolbox-0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:toolbox-debuginfo-0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:toolbox-debuginfo-0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:toolbox-debuginfo-0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:toolbox-debuginfo-0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:toolbox-debugsource-0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:toolbox-debugsource-0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:toolbox-debugsource-0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:toolbox-debugsource-0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:toolbox-tests-0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:toolbox-tests-0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:toolbox-tests-0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:toolbox-tests-0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:udica-0.2.6-20.module+el8.8.0+21741+dd5be1e7.noarch.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:udica-0.2.6-20.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-32149"
},
{
"category": "external",
"summary": "RHBZ#2134010",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2134010"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-32149",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32149"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-32149",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-32149"
},
{
"category": "external",
"summary": "https://go.dev/issue/56152",
"url": "https://go.dev/issue/56152"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-dev/c/qfPIly0X7aU",
"url": "https://groups.google.com/g/golang-dev/c/qfPIly0X7aU"
}
],
"release_date": "2022-10-11T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-04-29T12:00:29+00:00",
"details": "For details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.8.0.Z.EUS:aardvark-dns-1.5.0-2.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:aardvark-dns-1.5.0-2.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:aardvark-dns-1.5.0-2.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:aardvark-dns-1.5.0-2.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:aardvark-dns-1.5.0-2.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:buildah-1.29.3-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:buildah-1.29.3-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:buildah-1.29.3-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:buildah-1.29.3-1.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:buildah-1.29.3-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:buildah-debuginfo-1.29.3-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:buildah-debuginfo-1.29.3-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:buildah-debuginfo-1.29.3-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:buildah-debuginfo-1.29.3-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:buildah-debugsource-1.29.3-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:buildah-debugsource-1.29.3-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:buildah-debugsource-1.29.3-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:buildah-debugsource-1.29.3-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:buildah-tests-1.29.3-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:buildah-tests-1.29.3-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:buildah-tests-1.29.3-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:buildah-tests-1.29.3-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:buildah-tests-debuginfo-1.29.3-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:buildah-tests-debuginfo-1.29.3-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:buildah-tests-debuginfo-1.29.3-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:buildah-tests-debuginfo-1.29.3-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:cockpit-podman-63.1-1.module+el8.8.0+21741+dd5be1e7.noarch.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:cockpit-podman-63.1-1.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:conmon-2.1.6-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:conmon-2.1.6-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:conmon-2.1.6-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:conmon-2.1.6-1.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:conmon-2.1.6-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:conmon-debuginfo-2.1.6-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:conmon-debuginfo-2.1.6-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:conmon-debuginfo-2.1.6-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:conmon-debuginfo-2.1.6-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:conmon-debugsource-2.1.6-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:conmon-debugsource-2.1.6-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:conmon-debugsource-2.1.6-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:conmon-debugsource-2.1.6-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:container-selinux-2.229.0-1.module+el8.8.0+21741+dd5be1e7.noarch.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:container-selinux-2.229.0-1.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:containernetworking-plugins-1.2.0-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:containernetworking-plugins-1.2.0-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:containernetworking-plugins-1.2.0-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:containernetworking-plugins-1.2.0-1.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:containernetworking-plugins-1.2.0-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:containernetworking-plugins-debuginfo-1.2.0-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:containernetworking-plugins-debuginfo-1.2.0-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:containernetworking-plugins-debuginfo-1.2.0-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:containernetworking-plugins-debuginfo-1.2.0-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:containernetworking-plugins-debugsource-1.2.0-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:containernetworking-plugins-debugsource-1.2.0-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:containernetworking-plugins-debugsource-1.2.0-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:containernetworking-plugins-debugsource-1.2.0-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:containers-common-1-65.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:containers-common-1-65.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:containers-common-1-65.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:containers-common-1-65.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:containers-common-1-65.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:crit-3.15-4.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:crit-3.15-4.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:crit-3.15-4.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:crit-3.15-4.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:criu-3.15-4.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:criu-3.15-4.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:criu-3.15-4.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:criu-3.15-4.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:criu-3.15-4.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:criu-debuginfo-3.15-4.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:criu-debuginfo-3.15-4.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:criu-debuginfo-3.15-4.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:criu-debuginfo-3.15-4.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:criu-debugsource-3.15-4.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:criu-debugsource-3.15-4.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:criu-debugsource-3.15-4.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:criu-debugsource-3.15-4.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:criu-devel-3.15-4.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:criu-devel-3.15-4.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:criu-devel-3.15-4.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:criu-devel-3.15-4.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:criu-libs-3.15-4.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:criu-libs-3.15-4.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:criu-libs-3.15-4.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:criu-libs-3.15-4.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:criu-libs-debuginfo-3.15-4.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:criu-libs-debuginfo-3.15-4.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:criu-libs-debuginfo-3.15-4.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:criu-libs-debuginfo-3.15-4.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:crun-1.8.4-2.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:crun-1.8.4-2.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:crun-1.8.4-2.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:crun-1.8.4-2.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:crun-1.8.4-2.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:crun-debuginfo-1.8.4-2.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:crun-debuginfo-1.8.4-2.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:crun-debuginfo-1.8.4-2.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:crun-debuginfo-1.8.4-2.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:crun-debugsource-1.8.4-2.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:crun-debugsource-1.8.4-2.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:crun-debugsource-1.8.4-2.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:crun-debugsource-1.8.4-2.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:fuse-overlayfs-1.11-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:fuse-overlayfs-1.11-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:fuse-overlayfs-1.11-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:fuse-overlayfs-1.11-1.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:fuse-overlayfs-1.11-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:fuse-overlayfs-debuginfo-1.11-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:fuse-overlayfs-debuginfo-1.11-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:fuse-overlayfs-debuginfo-1.11-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:fuse-overlayfs-debuginfo-1.11-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:fuse-overlayfs-debugsource-1.11-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:fuse-overlayfs-debugsource-1.11-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:fuse-overlayfs-debugsource-1.11-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:fuse-overlayfs-debugsource-1.11-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:libslirp-4.4.0-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:libslirp-4.4.0-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:libslirp-4.4.0-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:libslirp-4.4.0-1.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:libslirp-4.4.0-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:libslirp-debuginfo-4.4.0-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:libslirp-debuginfo-4.4.0-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:libslirp-debuginfo-4.4.0-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:libslirp-debuginfo-4.4.0-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:libslirp-debugsource-4.4.0-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:libslirp-debugsource-4.4.0-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:libslirp-debugsource-4.4.0-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:libslirp-debugsource-4.4.0-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:libslirp-devel-4.4.0-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:libslirp-devel-4.4.0-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:libslirp-devel-4.4.0-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:libslirp-devel-4.4.0-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:netavark-1.5.1-3.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:netavark-1.5.1-3.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:netavark-1.5.1-3.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:netavark-1.5.1-3.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:netavark-1.5.1-3.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:oci-seccomp-bpf-hook-1.2.8-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:oci-seccomp-bpf-hook-1.2.8-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:oci-seccomp-bpf-hook-1.2.8-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:oci-seccomp-bpf-hook-1.2.8-1.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:oci-seccomp-bpf-hook-1.2.8-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:oci-seccomp-bpf-hook-debuginfo-1.2.8-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:oci-seccomp-bpf-hook-debuginfo-1.2.8-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:oci-seccomp-bpf-hook-debuginfo-1.2.8-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:oci-seccomp-bpf-hook-debuginfo-1.2.8-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:oci-seccomp-bpf-hook-debugsource-1.2.8-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:oci-seccomp-bpf-hook-debugsource-1.2.8-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:oci-seccomp-bpf-hook-debugsource-1.2.8-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:oci-seccomp-bpf-hook-debugsource-1.2.8-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-4.4.1-19.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-catatonit-4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-catatonit-4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-catatonit-4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-catatonit-4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-catatonit-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-catatonit-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-catatonit-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-catatonit-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-debugsource-4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-debugsource-4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-debugsource-4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-debugsource-4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-docker-4.4.1-19.module+el8.8.0+21741+dd5be1e7.noarch.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-gvproxy-4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-gvproxy-4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-gvproxy-4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-gvproxy-4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-gvproxy-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-gvproxy-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-gvproxy-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-gvproxy-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-plugins-4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-plugins-4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-plugins-4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-plugins-4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-plugins-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-plugins-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-plugins-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-plugins-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-remote-4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-remote-4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-remote-4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-remote-4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-remote-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-remote-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-remote-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-remote-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-tests-4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-tests-4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-tests-4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-tests-4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:python-podman-4.4.1-1.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:python3-criu-3.15-4.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:python3-criu-3.15-4.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:python3-criu-3.15-4.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:python3-criu-3.15-4.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:python3-podman-4.4.1-1.module+el8.8.0+21741+dd5be1e7.noarch.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:runc-1.1.12-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:runc-1.1.12-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:runc-1.1.12-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:runc-1.1.12-1.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:runc-1.1.12-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:runc-debuginfo-1.1.12-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:runc-debuginfo-1.1.12-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:runc-debuginfo-1.1.12-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:runc-debuginfo-1.1.12-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:runc-debugsource-1.1.12-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:runc-debugsource-1.1.12-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:runc-debugsource-1.1.12-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:runc-debugsource-1.1.12-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:skopeo-1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:skopeo-1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:skopeo-1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:skopeo-1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:skopeo-1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:skopeo-tests-1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:skopeo-tests-1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:skopeo-tests-1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:skopeo-tests-1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:slirp4netns-1.2.0-3.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:slirp4netns-1.2.0-3.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:slirp4netns-1.2.0-3.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:slirp4netns-1.2.0-3.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:slirp4netns-1.2.0-3.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:slirp4netns-debuginfo-1.2.0-3.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:slirp4netns-debuginfo-1.2.0-3.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:slirp4netns-debuginfo-1.2.0-3.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:slirp4netns-debuginfo-1.2.0-3.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:slirp4netns-debugsource-1.2.0-3.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:slirp4netns-debugsource-1.2.0-3.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:slirp4netns-debugsource-1.2.0-3.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:slirp4netns-debugsource-1.2.0-3.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:toolbox-0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:toolbox-0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:toolbox-0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:toolbox-0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:toolbox-0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:toolbox-debuginfo-0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:toolbox-debuginfo-0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:toolbox-debuginfo-0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:toolbox-debuginfo-0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:toolbox-debugsource-0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:toolbox-debugsource-0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:toolbox-debugsource-0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:toolbox-debugsource-0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:toolbox-tests-0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:toolbox-tests-0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:toolbox-tests-0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:toolbox-tests-0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:udica-0.2.6-20.module+el8.8.0+21741+dd5be1e7.noarch.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:udica-0.2.6-20.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:2077"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.8.0.Z.EUS:aardvark-dns-1.5.0-2.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:aardvark-dns-1.5.0-2.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:aardvark-dns-1.5.0-2.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:aardvark-dns-1.5.0-2.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:aardvark-dns-1.5.0-2.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:buildah-1.29.3-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:buildah-1.29.3-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:buildah-1.29.3-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:buildah-1.29.3-1.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:buildah-1.29.3-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:buildah-debuginfo-1.29.3-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:buildah-debuginfo-1.29.3-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:buildah-debuginfo-1.29.3-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:buildah-debuginfo-1.29.3-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:buildah-debugsource-1.29.3-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:buildah-debugsource-1.29.3-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:buildah-debugsource-1.29.3-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:buildah-debugsource-1.29.3-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:buildah-tests-1.29.3-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:buildah-tests-1.29.3-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:buildah-tests-1.29.3-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:buildah-tests-1.29.3-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:buildah-tests-debuginfo-1.29.3-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:buildah-tests-debuginfo-1.29.3-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:buildah-tests-debuginfo-1.29.3-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:buildah-tests-debuginfo-1.29.3-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:cockpit-podman-63.1-1.module+el8.8.0+21741+dd5be1e7.noarch.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:cockpit-podman-63.1-1.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:conmon-2.1.6-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:conmon-2.1.6-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:conmon-2.1.6-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:conmon-2.1.6-1.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:conmon-2.1.6-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:conmon-debuginfo-2.1.6-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:conmon-debuginfo-2.1.6-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:conmon-debuginfo-2.1.6-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:conmon-debuginfo-2.1.6-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:conmon-debugsource-2.1.6-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:conmon-debugsource-2.1.6-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:conmon-debugsource-2.1.6-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:conmon-debugsource-2.1.6-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:container-selinux-2.229.0-1.module+el8.8.0+21741+dd5be1e7.noarch.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:container-selinux-2.229.0-1.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:containernetworking-plugins-1.2.0-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:containernetworking-plugins-1.2.0-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:containernetworking-plugins-1.2.0-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:containernetworking-plugins-1.2.0-1.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:containernetworking-plugins-1.2.0-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:containernetworking-plugins-debuginfo-1.2.0-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:containernetworking-plugins-debuginfo-1.2.0-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:containernetworking-plugins-debuginfo-1.2.0-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:containernetworking-plugins-debuginfo-1.2.0-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:containernetworking-plugins-debugsource-1.2.0-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:containernetworking-plugins-debugsource-1.2.0-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:containernetworking-plugins-debugsource-1.2.0-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:containernetworking-plugins-debugsource-1.2.0-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:containers-common-1-65.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:containers-common-1-65.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:containers-common-1-65.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:containers-common-1-65.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:containers-common-1-65.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:crit-3.15-4.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:crit-3.15-4.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:crit-3.15-4.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:crit-3.15-4.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:criu-3.15-4.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:criu-3.15-4.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:criu-3.15-4.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:criu-3.15-4.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:criu-3.15-4.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:criu-debuginfo-3.15-4.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:criu-debuginfo-3.15-4.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:criu-debuginfo-3.15-4.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:criu-debuginfo-3.15-4.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:criu-debugsource-3.15-4.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:criu-debugsource-3.15-4.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:criu-debugsource-3.15-4.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:criu-debugsource-3.15-4.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:criu-devel-3.15-4.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:criu-devel-3.15-4.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:criu-devel-3.15-4.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:criu-devel-3.15-4.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:criu-libs-3.15-4.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:criu-libs-3.15-4.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:criu-libs-3.15-4.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:criu-libs-3.15-4.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:criu-libs-debuginfo-3.15-4.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:criu-libs-debuginfo-3.15-4.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:criu-libs-debuginfo-3.15-4.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:criu-libs-debuginfo-3.15-4.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:crun-1.8.4-2.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:crun-1.8.4-2.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:crun-1.8.4-2.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:crun-1.8.4-2.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:crun-1.8.4-2.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:crun-debuginfo-1.8.4-2.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:crun-debuginfo-1.8.4-2.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:crun-debuginfo-1.8.4-2.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:crun-debuginfo-1.8.4-2.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:crun-debugsource-1.8.4-2.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:crun-debugsource-1.8.4-2.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:crun-debugsource-1.8.4-2.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:crun-debugsource-1.8.4-2.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:fuse-overlayfs-1.11-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:fuse-overlayfs-1.11-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:fuse-overlayfs-1.11-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:fuse-overlayfs-1.11-1.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:fuse-overlayfs-1.11-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:fuse-overlayfs-debuginfo-1.11-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:fuse-overlayfs-debuginfo-1.11-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:fuse-overlayfs-debuginfo-1.11-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:fuse-overlayfs-debuginfo-1.11-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:fuse-overlayfs-debugsource-1.11-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:fuse-overlayfs-debugsource-1.11-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:fuse-overlayfs-debugsource-1.11-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:fuse-overlayfs-debugsource-1.11-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:libslirp-4.4.0-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:libslirp-4.4.0-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:libslirp-4.4.0-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:libslirp-4.4.0-1.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:libslirp-4.4.0-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:libslirp-debuginfo-4.4.0-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:libslirp-debuginfo-4.4.0-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:libslirp-debuginfo-4.4.0-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:libslirp-debuginfo-4.4.0-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:libslirp-debugsource-4.4.0-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:libslirp-debugsource-4.4.0-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:libslirp-debugsource-4.4.0-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:libslirp-debugsource-4.4.0-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:libslirp-devel-4.4.0-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:libslirp-devel-4.4.0-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:libslirp-devel-4.4.0-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:libslirp-devel-4.4.0-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:netavark-1.5.1-3.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:netavark-1.5.1-3.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:netavark-1.5.1-3.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:netavark-1.5.1-3.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:netavark-1.5.1-3.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:oci-seccomp-bpf-hook-1.2.8-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:oci-seccomp-bpf-hook-1.2.8-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:oci-seccomp-bpf-hook-1.2.8-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:oci-seccomp-bpf-hook-1.2.8-1.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:oci-seccomp-bpf-hook-1.2.8-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:oci-seccomp-bpf-hook-debuginfo-1.2.8-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:oci-seccomp-bpf-hook-debuginfo-1.2.8-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:oci-seccomp-bpf-hook-debuginfo-1.2.8-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:oci-seccomp-bpf-hook-debuginfo-1.2.8-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:oci-seccomp-bpf-hook-debugsource-1.2.8-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:oci-seccomp-bpf-hook-debugsource-1.2.8-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:oci-seccomp-bpf-hook-debugsource-1.2.8-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:oci-seccomp-bpf-hook-debugsource-1.2.8-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-4.4.1-19.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-catatonit-4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-catatonit-4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-catatonit-4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-catatonit-4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-catatonit-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-catatonit-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-catatonit-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-catatonit-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-debugsource-4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-debugsource-4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-debugsource-4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-debugsource-4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-docker-4.4.1-19.module+el8.8.0+21741+dd5be1e7.noarch.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-gvproxy-4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-gvproxy-4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-gvproxy-4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-gvproxy-4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-gvproxy-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-gvproxy-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-gvproxy-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-gvproxy-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-plugins-4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-plugins-4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-plugins-4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-plugins-4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-plugins-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-plugins-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-plugins-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-plugins-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-remote-4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-remote-4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-remote-4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-remote-4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-remote-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-remote-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-remote-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-remote-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-tests-4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-tests-4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-tests-4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-tests-4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:python-podman-4.4.1-1.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:python3-criu-3.15-4.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:python3-criu-3.15-4.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:python3-criu-3.15-4.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:python3-criu-3.15-4.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:python3-podman-4.4.1-1.module+el8.8.0+21741+dd5be1e7.noarch.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:runc-1.1.12-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:runc-1.1.12-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:runc-1.1.12-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:runc-1.1.12-1.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:runc-1.1.12-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:runc-debuginfo-1.1.12-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:runc-debuginfo-1.1.12-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:runc-debuginfo-1.1.12-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:runc-debuginfo-1.1.12-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:runc-debugsource-1.1.12-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:runc-debugsource-1.1.12-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:runc-debugsource-1.1.12-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:runc-debugsource-1.1.12-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:skopeo-1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:skopeo-1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:skopeo-1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:skopeo-1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:skopeo-1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:skopeo-tests-1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:skopeo-tests-1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:skopeo-tests-1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:skopeo-tests-1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:slirp4netns-1.2.0-3.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:slirp4netns-1.2.0-3.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:slirp4netns-1.2.0-3.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:slirp4netns-1.2.0-3.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:slirp4netns-1.2.0-3.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:slirp4netns-debuginfo-1.2.0-3.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:slirp4netns-debuginfo-1.2.0-3.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:slirp4netns-debuginfo-1.2.0-3.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:slirp4netns-debuginfo-1.2.0-3.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:slirp4netns-debugsource-1.2.0-3.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:slirp4netns-debugsource-1.2.0-3.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:slirp4netns-debugsource-1.2.0-3.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:slirp4netns-debugsource-1.2.0-3.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:toolbox-0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:toolbox-0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:toolbox-0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:toolbox-0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:toolbox-0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:toolbox-debuginfo-0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:toolbox-debuginfo-0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:toolbox-debuginfo-0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:toolbox-debuginfo-0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:toolbox-debugsource-0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:toolbox-debugsource-0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:toolbox-debugsource-0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:toolbox-debugsource-0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:toolbox-tests-0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:toolbox-tests-0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:toolbox-tests-0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:toolbox-tests-0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:udica-0.2.6-20.module+el8.8.0+21741+dd5be1e7.noarch.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:udica-0.2.6-20.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "golang: golang.org/x/text/language: ParseAcceptLanguage takes a long time to parse complex tags"
},
{
"cve": "CVE-2024-1753",
"cwe": {
"id": "CWE-59",
"name": "Improper Link Resolution Before File Access (\u0027Link Following\u0027)"
},
"discovery_date": "2024-02-22T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2265513"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in Buildah (and subsequently Podman Build) which allows containers to mount arbitrary locations on the host filesystem into build containers. A malicious Containerfile can use a dummy image with a symbolic link to the root filesystem as a mount source and cause the mount operation to mount the host root filesystem inside the RUN step. The commands inside the RUN step will then have read-write access to the host filesystem, allowing for full container escape at build time.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "buildah: full container escape at build time",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.8.0.Z.EUS:aardvark-dns-1.5.0-2.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:aardvark-dns-1.5.0-2.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:aardvark-dns-1.5.0-2.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:aardvark-dns-1.5.0-2.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:aardvark-dns-1.5.0-2.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:buildah-1.29.3-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:buildah-1.29.3-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:buildah-1.29.3-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:buildah-1.29.3-1.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:buildah-1.29.3-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:buildah-debuginfo-1.29.3-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:buildah-debuginfo-1.29.3-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:buildah-debuginfo-1.29.3-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:buildah-debuginfo-1.29.3-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:buildah-debugsource-1.29.3-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:buildah-debugsource-1.29.3-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:buildah-debugsource-1.29.3-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:buildah-debugsource-1.29.3-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:buildah-tests-1.29.3-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:buildah-tests-1.29.3-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:buildah-tests-1.29.3-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:buildah-tests-1.29.3-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:buildah-tests-debuginfo-1.29.3-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:buildah-tests-debuginfo-1.29.3-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:buildah-tests-debuginfo-1.29.3-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:buildah-tests-debuginfo-1.29.3-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:cockpit-podman-63.1-1.module+el8.8.0+21741+dd5be1e7.noarch.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:cockpit-podman-63.1-1.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:conmon-2.1.6-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:conmon-2.1.6-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:conmon-2.1.6-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:conmon-2.1.6-1.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:conmon-2.1.6-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:conmon-debuginfo-2.1.6-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:conmon-debuginfo-2.1.6-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:conmon-debuginfo-2.1.6-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:conmon-debuginfo-2.1.6-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:conmon-debugsource-2.1.6-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:conmon-debugsource-2.1.6-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:conmon-debugsource-2.1.6-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:conmon-debugsource-2.1.6-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:container-selinux-2.229.0-1.module+el8.8.0+21741+dd5be1e7.noarch.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:container-selinux-2.229.0-1.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:containernetworking-plugins-1.2.0-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:containernetworking-plugins-1.2.0-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:containernetworking-plugins-1.2.0-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:containernetworking-plugins-1.2.0-1.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:containernetworking-plugins-1.2.0-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:containernetworking-plugins-debuginfo-1.2.0-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:containernetworking-plugins-debuginfo-1.2.0-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:containernetworking-plugins-debuginfo-1.2.0-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:containernetworking-plugins-debuginfo-1.2.0-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:containernetworking-plugins-debugsource-1.2.0-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:containernetworking-plugins-debugsource-1.2.0-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:containernetworking-plugins-debugsource-1.2.0-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:containernetworking-plugins-debugsource-1.2.0-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:containers-common-1-65.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:containers-common-1-65.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:containers-common-1-65.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:containers-common-1-65.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:containers-common-1-65.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:crit-3.15-4.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:crit-3.15-4.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:crit-3.15-4.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:crit-3.15-4.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:criu-3.15-4.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:criu-3.15-4.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:criu-3.15-4.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:criu-3.15-4.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:criu-3.15-4.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:criu-debuginfo-3.15-4.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:criu-debuginfo-3.15-4.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:criu-debuginfo-3.15-4.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:criu-debuginfo-3.15-4.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:criu-debugsource-3.15-4.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:criu-debugsource-3.15-4.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:criu-debugsource-3.15-4.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:criu-debugsource-3.15-4.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:criu-devel-3.15-4.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:criu-devel-3.15-4.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:criu-devel-3.15-4.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:criu-devel-3.15-4.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:criu-libs-3.15-4.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:criu-libs-3.15-4.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:criu-libs-3.15-4.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:criu-libs-3.15-4.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:criu-libs-debuginfo-3.15-4.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:criu-libs-debuginfo-3.15-4.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:criu-libs-debuginfo-3.15-4.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:criu-libs-debuginfo-3.15-4.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:crun-1.8.4-2.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:crun-1.8.4-2.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:crun-1.8.4-2.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:crun-1.8.4-2.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:crun-1.8.4-2.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:crun-debuginfo-1.8.4-2.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:crun-debuginfo-1.8.4-2.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:crun-debuginfo-1.8.4-2.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:crun-debuginfo-1.8.4-2.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:crun-debugsource-1.8.4-2.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:crun-debugsource-1.8.4-2.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:crun-debugsource-1.8.4-2.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:crun-debugsource-1.8.4-2.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:fuse-overlayfs-1.11-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:fuse-overlayfs-1.11-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:fuse-overlayfs-1.11-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:fuse-overlayfs-1.11-1.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:fuse-overlayfs-1.11-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:fuse-overlayfs-debuginfo-1.11-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:fuse-overlayfs-debuginfo-1.11-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:fuse-overlayfs-debuginfo-1.11-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:fuse-overlayfs-debuginfo-1.11-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:fuse-overlayfs-debugsource-1.11-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:fuse-overlayfs-debugsource-1.11-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:fuse-overlayfs-debugsource-1.11-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:fuse-overlayfs-debugsource-1.11-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:libslirp-4.4.0-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:libslirp-4.4.0-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:libslirp-4.4.0-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:libslirp-4.4.0-1.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:libslirp-4.4.0-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:libslirp-debuginfo-4.4.0-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:libslirp-debuginfo-4.4.0-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:libslirp-debuginfo-4.4.0-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:libslirp-debuginfo-4.4.0-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:libslirp-debugsource-4.4.0-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:libslirp-debugsource-4.4.0-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:libslirp-debugsource-4.4.0-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:libslirp-debugsource-4.4.0-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:libslirp-devel-4.4.0-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:libslirp-devel-4.4.0-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:libslirp-devel-4.4.0-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:libslirp-devel-4.4.0-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:netavark-1.5.1-3.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:netavark-1.5.1-3.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:netavark-1.5.1-3.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:netavark-1.5.1-3.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:netavark-1.5.1-3.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:oci-seccomp-bpf-hook-1.2.8-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:oci-seccomp-bpf-hook-1.2.8-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:oci-seccomp-bpf-hook-1.2.8-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:oci-seccomp-bpf-hook-1.2.8-1.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:oci-seccomp-bpf-hook-1.2.8-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:oci-seccomp-bpf-hook-debuginfo-1.2.8-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:oci-seccomp-bpf-hook-debuginfo-1.2.8-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:oci-seccomp-bpf-hook-debuginfo-1.2.8-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:oci-seccomp-bpf-hook-debuginfo-1.2.8-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:oci-seccomp-bpf-hook-debugsource-1.2.8-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:oci-seccomp-bpf-hook-debugsource-1.2.8-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:oci-seccomp-bpf-hook-debugsource-1.2.8-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:oci-seccomp-bpf-hook-debugsource-1.2.8-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-4.4.1-19.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-catatonit-4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-catatonit-4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-catatonit-4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-catatonit-4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-catatonit-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-catatonit-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-catatonit-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-catatonit-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-debugsource-4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-debugsource-4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-debugsource-4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-debugsource-4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-docker-4.4.1-19.module+el8.8.0+21741+dd5be1e7.noarch.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-gvproxy-4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-gvproxy-4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-gvproxy-4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-gvproxy-4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-gvproxy-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-gvproxy-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-gvproxy-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-gvproxy-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-plugins-4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-plugins-4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-plugins-4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-plugins-4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-plugins-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-plugins-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-plugins-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-plugins-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-remote-4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-remote-4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-remote-4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-remote-4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-remote-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-remote-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-remote-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-remote-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-tests-4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-tests-4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-tests-4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-tests-4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:python-podman-4.4.1-1.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:python3-criu-3.15-4.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:python3-criu-3.15-4.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:python3-criu-3.15-4.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:python3-criu-3.15-4.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:python3-podman-4.4.1-1.module+el8.8.0+21741+dd5be1e7.noarch.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:runc-1.1.12-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:runc-1.1.12-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:runc-1.1.12-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:runc-1.1.12-1.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:runc-1.1.12-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:runc-debuginfo-1.1.12-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:runc-debuginfo-1.1.12-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:runc-debuginfo-1.1.12-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:runc-debuginfo-1.1.12-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:runc-debugsource-1.1.12-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:runc-debugsource-1.1.12-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:runc-debugsource-1.1.12-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:runc-debugsource-1.1.12-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:skopeo-1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:skopeo-1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:skopeo-1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:skopeo-1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:skopeo-1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:skopeo-tests-1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:skopeo-tests-1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:skopeo-tests-1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:skopeo-tests-1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:slirp4netns-1.2.0-3.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:slirp4netns-1.2.0-3.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:slirp4netns-1.2.0-3.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:slirp4netns-1.2.0-3.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:slirp4netns-1.2.0-3.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:slirp4netns-debuginfo-1.2.0-3.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:slirp4netns-debuginfo-1.2.0-3.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:slirp4netns-debuginfo-1.2.0-3.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:slirp4netns-debuginfo-1.2.0-3.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:slirp4netns-debugsource-1.2.0-3.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:slirp4netns-debugsource-1.2.0-3.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:slirp4netns-debugsource-1.2.0-3.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:slirp4netns-debugsource-1.2.0-3.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:toolbox-0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:toolbox-0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:toolbox-0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:toolbox-0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:toolbox-0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:toolbox-debuginfo-0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:toolbox-debuginfo-0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:toolbox-debuginfo-0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:toolbox-debuginfo-0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:toolbox-debugsource-0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:toolbox-debugsource-0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:toolbox-debugsource-0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:toolbox-debugsource-0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:toolbox-tests-0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:toolbox-tests-0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:toolbox-tests-0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:toolbox-tests-0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:udica-0.2.6-20.module+el8.8.0+21741+dd5be1e7.noarch.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:udica-0.2.6-20.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-1753"
},
{
"category": "external",
"summary": "RHBZ#2265513",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2265513"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-1753",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-1753"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-1753",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-1753"
},
{
"category": "external",
"summary": "https://github.com/containers/buildah/security/advisories/GHSA-pmf3-c36m-g5cf",
"url": "https://github.com/containers/buildah/security/advisories/GHSA-pmf3-c36m-g5cf"
},
{
"category": "external",
"summary": "https://github.com/containers/podman/security/advisories/GHSA-874v-pj72-92f3",
"url": "https://github.com/containers/podman/security/advisories/GHSA-874v-pj72-92f3"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2024-2658",
"url": "https://pkg.go.dev/vuln/GO-2024-2658"
}
],
"release_date": "2024-03-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-04-29T12:00:29+00:00",
"details": "For details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.8.0.Z.EUS:aardvark-dns-1.5.0-2.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:aardvark-dns-1.5.0-2.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:aardvark-dns-1.5.0-2.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:aardvark-dns-1.5.0-2.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:aardvark-dns-1.5.0-2.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:buildah-1.29.3-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:buildah-1.29.3-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:buildah-1.29.3-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:buildah-1.29.3-1.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:buildah-1.29.3-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:buildah-debuginfo-1.29.3-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:buildah-debuginfo-1.29.3-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:buildah-debuginfo-1.29.3-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:buildah-debuginfo-1.29.3-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:buildah-debugsource-1.29.3-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:buildah-debugsource-1.29.3-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:buildah-debugsource-1.29.3-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:buildah-debugsource-1.29.3-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:buildah-tests-1.29.3-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:buildah-tests-1.29.3-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:buildah-tests-1.29.3-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:buildah-tests-1.29.3-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:buildah-tests-debuginfo-1.29.3-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:buildah-tests-debuginfo-1.29.3-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:buildah-tests-debuginfo-1.29.3-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:buildah-tests-debuginfo-1.29.3-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:cockpit-podman-63.1-1.module+el8.8.0+21741+dd5be1e7.noarch.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:cockpit-podman-63.1-1.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:conmon-2.1.6-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:conmon-2.1.6-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:conmon-2.1.6-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:conmon-2.1.6-1.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:conmon-2.1.6-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:conmon-debuginfo-2.1.6-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:conmon-debuginfo-2.1.6-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:conmon-debuginfo-2.1.6-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:conmon-debuginfo-2.1.6-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:conmon-debugsource-2.1.6-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:conmon-debugsource-2.1.6-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:conmon-debugsource-2.1.6-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:conmon-debugsource-2.1.6-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:container-selinux-2.229.0-1.module+el8.8.0+21741+dd5be1e7.noarch.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:container-selinux-2.229.0-1.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:containernetworking-plugins-1.2.0-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:containernetworking-plugins-1.2.0-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:containernetworking-plugins-1.2.0-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:containernetworking-plugins-1.2.0-1.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:containernetworking-plugins-1.2.0-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:containernetworking-plugins-debuginfo-1.2.0-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:containernetworking-plugins-debuginfo-1.2.0-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:containernetworking-plugins-debuginfo-1.2.0-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:containernetworking-plugins-debuginfo-1.2.0-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:containernetworking-plugins-debugsource-1.2.0-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:containernetworking-plugins-debugsource-1.2.0-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:containernetworking-plugins-debugsource-1.2.0-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:containernetworking-plugins-debugsource-1.2.0-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:containers-common-1-65.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:containers-common-1-65.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:containers-common-1-65.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:containers-common-1-65.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:containers-common-1-65.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:crit-3.15-4.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:crit-3.15-4.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:crit-3.15-4.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:crit-3.15-4.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:criu-3.15-4.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:criu-3.15-4.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:criu-3.15-4.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:criu-3.15-4.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:criu-3.15-4.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:criu-debuginfo-3.15-4.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:criu-debuginfo-3.15-4.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:criu-debuginfo-3.15-4.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:criu-debuginfo-3.15-4.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:criu-debugsource-3.15-4.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:criu-debugsource-3.15-4.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:criu-debugsource-3.15-4.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:criu-debugsource-3.15-4.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:criu-devel-3.15-4.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:criu-devel-3.15-4.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:criu-devel-3.15-4.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:criu-devel-3.15-4.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:criu-libs-3.15-4.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:criu-libs-3.15-4.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:criu-libs-3.15-4.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:criu-libs-3.15-4.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:criu-libs-debuginfo-3.15-4.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:criu-libs-debuginfo-3.15-4.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:criu-libs-debuginfo-3.15-4.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:criu-libs-debuginfo-3.15-4.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:crun-1.8.4-2.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:crun-1.8.4-2.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:crun-1.8.4-2.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:crun-1.8.4-2.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:crun-1.8.4-2.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:crun-debuginfo-1.8.4-2.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:crun-debuginfo-1.8.4-2.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:crun-debuginfo-1.8.4-2.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:crun-debuginfo-1.8.4-2.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:crun-debugsource-1.8.4-2.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:crun-debugsource-1.8.4-2.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:crun-debugsource-1.8.4-2.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:crun-debugsource-1.8.4-2.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:fuse-overlayfs-1.11-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:fuse-overlayfs-1.11-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:fuse-overlayfs-1.11-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:fuse-overlayfs-1.11-1.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:fuse-overlayfs-1.11-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:fuse-overlayfs-debuginfo-1.11-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:fuse-overlayfs-debuginfo-1.11-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:fuse-overlayfs-debuginfo-1.11-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:fuse-overlayfs-debuginfo-1.11-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:fuse-overlayfs-debugsource-1.11-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:fuse-overlayfs-debugsource-1.11-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:fuse-overlayfs-debugsource-1.11-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:fuse-overlayfs-debugsource-1.11-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:libslirp-4.4.0-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:libslirp-4.4.0-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:libslirp-4.4.0-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:libslirp-4.4.0-1.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:libslirp-4.4.0-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:libslirp-debuginfo-4.4.0-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:libslirp-debuginfo-4.4.0-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:libslirp-debuginfo-4.4.0-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:libslirp-debuginfo-4.4.0-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:libslirp-debugsource-4.4.0-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:libslirp-debugsource-4.4.0-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:libslirp-debugsource-4.4.0-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:libslirp-debugsource-4.4.0-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:libslirp-devel-4.4.0-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:libslirp-devel-4.4.0-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:libslirp-devel-4.4.0-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:libslirp-devel-4.4.0-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:netavark-1.5.1-3.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:netavark-1.5.1-3.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:netavark-1.5.1-3.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:netavark-1.5.1-3.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:netavark-1.5.1-3.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:oci-seccomp-bpf-hook-1.2.8-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:oci-seccomp-bpf-hook-1.2.8-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:oci-seccomp-bpf-hook-1.2.8-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:oci-seccomp-bpf-hook-1.2.8-1.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:oci-seccomp-bpf-hook-1.2.8-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:oci-seccomp-bpf-hook-debuginfo-1.2.8-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:oci-seccomp-bpf-hook-debuginfo-1.2.8-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:oci-seccomp-bpf-hook-debuginfo-1.2.8-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:oci-seccomp-bpf-hook-debuginfo-1.2.8-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:oci-seccomp-bpf-hook-debugsource-1.2.8-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:oci-seccomp-bpf-hook-debugsource-1.2.8-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:oci-seccomp-bpf-hook-debugsource-1.2.8-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:oci-seccomp-bpf-hook-debugsource-1.2.8-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-4.4.1-19.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-catatonit-4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-catatonit-4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-catatonit-4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-catatonit-4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-catatonit-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-catatonit-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-catatonit-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-catatonit-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-debugsource-4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-debugsource-4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-debugsource-4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-debugsource-4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-docker-4.4.1-19.module+el8.8.0+21741+dd5be1e7.noarch.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-gvproxy-4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-gvproxy-4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-gvproxy-4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-gvproxy-4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-gvproxy-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-gvproxy-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-gvproxy-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-gvproxy-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-plugins-4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-plugins-4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-plugins-4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-plugins-4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-plugins-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-plugins-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-plugins-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-plugins-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-remote-4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-remote-4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-remote-4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-remote-4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-remote-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-remote-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-remote-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-remote-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-tests-4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-tests-4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-tests-4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-tests-4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:python-podman-4.4.1-1.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:python3-criu-3.15-4.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:python3-criu-3.15-4.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:python3-criu-3.15-4.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:python3-criu-3.15-4.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:python3-podman-4.4.1-1.module+el8.8.0+21741+dd5be1e7.noarch.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:runc-1.1.12-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:runc-1.1.12-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:runc-1.1.12-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:runc-1.1.12-1.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:runc-1.1.12-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:runc-debuginfo-1.1.12-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:runc-debuginfo-1.1.12-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:runc-debuginfo-1.1.12-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:runc-debuginfo-1.1.12-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:runc-debugsource-1.1.12-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:runc-debugsource-1.1.12-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:runc-debugsource-1.1.12-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:runc-debugsource-1.1.12-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:skopeo-1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:skopeo-1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:skopeo-1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:skopeo-1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:skopeo-1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:skopeo-tests-1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:skopeo-tests-1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:skopeo-tests-1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:skopeo-tests-1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:slirp4netns-1.2.0-3.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:slirp4netns-1.2.0-3.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:slirp4netns-1.2.0-3.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:slirp4netns-1.2.0-3.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:slirp4netns-1.2.0-3.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:slirp4netns-debuginfo-1.2.0-3.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:slirp4netns-debuginfo-1.2.0-3.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:slirp4netns-debuginfo-1.2.0-3.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:slirp4netns-debuginfo-1.2.0-3.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:slirp4netns-debugsource-1.2.0-3.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:slirp4netns-debugsource-1.2.0-3.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:slirp4netns-debugsource-1.2.0-3.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:slirp4netns-debugsource-1.2.0-3.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:toolbox-0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:toolbox-0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:toolbox-0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:toolbox-0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:toolbox-0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:toolbox-debuginfo-0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:toolbox-debuginfo-0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:toolbox-debuginfo-0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:toolbox-debuginfo-0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:toolbox-debugsource-0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:toolbox-debugsource-0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:toolbox-debugsource-0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:toolbox-debugsource-0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:toolbox-tests-0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:toolbox-tests-0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:toolbox-tests-0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:toolbox-tests-0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:udica-0.2.6-20.module+el8.8.0+21741+dd5be1e7.noarch.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:udica-0.2.6-20.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:2077"
},
{
"category": "workaround",
"details": "When SELinux is enabled, the container is restricted to limited read-only access.",
"product_ids": [
"AppStream-8.8.0.Z.EUS:aardvark-dns-1.5.0-2.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:aardvark-dns-1.5.0-2.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:aardvark-dns-1.5.0-2.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:aardvark-dns-1.5.0-2.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:aardvark-dns-1.5.0-2.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:buildah-1.29.3-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:buildah-1.29.3-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:buildah-1.29.3-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:buildah-1.29.3-1.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:buildah-1.29.3-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:buildah-debuginfo-1.29.3-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:buildah-debuginfo-1.29.3-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:buildah-debuginfo-1.29.3-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:buildah-debuginfo-1.29.3-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:buildah-debugsource-1.29.3-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:buildah-debugsource-1.29.3-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:buildah-debugsource-1.29.3-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:buildah-debugsource-1.29.3-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:buildah-tests-1.29.3-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:buildah-tests-1.29.3-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:buildah-tests-1.29.3-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:buildah-tests-1.29.3-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:buildah-tests-debuginfo-1.29.3-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:buildah-tests-debuginfo-1.29.3-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:buildah-tests-debuginfo-1.29.3-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:buildah-tests-debuginfo-1.29.3-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:cockpit-podman-63.1-1.module+el8.8.0+21741+dd5be1e7.noarch.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:cockpit-podman-63.1-1.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:conmon-2.1.6-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:conmon-2.1.6-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:conmon-2.1.6-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:conmon-2.1.6-1.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:conmon-2.1.6-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:conmon-debuginfo-2.1.6-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:conmon-debuginfo-2.1.6-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:conmon-debuginfo-2.1.6-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:conmon-debuginfo-2.1.6-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:conmon-debugsource-2.1.6-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:conmon-debugsource-2.1.6-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:conmon-debugsource-2.1.6-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:conmon-debugsource-2.1.6-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:container-selinux-2.229.0-1.module+el8.8.0+21741+dd5be1e7.noarch.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:container-selinux-2.229.0-1.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:containernetworking-plugins-1.2.0-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:containernetworking-plugins-1.2.0-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:containernetworking-plugins-1.2.0-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:containernetworking-plugins-1.2.0-1.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:containernetworking-plugins-1.2.0-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:containernetworking-plugins-debuginfo-1.2.0-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:containernetworking-plugins-debuginfo-1.2.0-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:containernetworking-plugins-debuginfo-1.2.0-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:containernetworking-plugins-debuginfo-1.2.0-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:containernetworking-plugins-debugsource-1.2.0-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:containernetworking-plugins-debugsource-1.2.0-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:containernetworking-plugins-debugsource-1.2.0-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:containernetworking-plugins-debugsource-1.2.0-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:containers-common-1-65.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:containers-common-1-65.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:containers-common-1-65.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:containers-common-1-65.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:containers-common-1-65.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:crit-3.15-4.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:crit-3.15-4.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:crit-3.15-4.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:crit-3.15-4.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:criu-3.15-4.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:criu-3.15-4.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:criu-3.15-4.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:criu-3.15-4.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:criu-3.15-4.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:criu-debuginfo-3.15-4.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:criu-debuginfo-3.15-4.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:criu-debuginfo-3.15-4.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:criu-debuginfo-3.15-4.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:criu-debugsource-3.15-4.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:criu-debugsource-3.15-4.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:criu-debugsource-3.15-4.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:criu-debugsource-3.15-4.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:criu-devel-3.15-4.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:criu-devel-3.15-4.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:criu-devel-3.15-4.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:criu-devel-3.15-4.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:criu-libs-3.15-4.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:criu-libs-3.15-4.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:criu-libs-3.15-4.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:criu-libs-3.15-4.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:criu-libs-debuginfo-3.15-4.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:criu-libs-debuginfo-3.15-4.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:criu-libs-debuginfo-3.15-4.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:criu-libs-debuginfo-3.15-4.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:crun-1.8.4-2.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:crun-1.8.4-2.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:crun-1.8.4-2.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:crun-1.8.4-2.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:crun-1.8.4-2.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:crun-debuginfo-1.8.4-2.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:crun-debuginfo-1.8.4-2.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:crun-debuginfo-1.8.4-2.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:crun-debuginfo-1.8.4-2.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:crun-debugsource-1.8.4-2.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:crun-debugsource-1.8.4-2.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:crun-debugsource-1.8.4-2.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:crun-debugsource-1.8.4-2.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:fuse-overlayfs-1.11-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:fuse-overlayfs-1.11-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:fuse-overlayfs-1.11-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:fuse-overlayfs-1.11-1.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:fuse-overlayfs-1.11-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:fuse-overlayfs-debuginfo-1.11-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:fuse-overlayfs-debuginfo-1.11-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:fuse-overlayfs-debuginfo-1.11-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:fuse-overlayfs-debuginfo-1.11-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:fuse-overlayfs-debugsource-1.11-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:fuse-overlayfs-debugsource-1.11-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:fuse-overlayfs-debugsource-1.11-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:fuse-overlayfs-debugsource-1.11-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:libslirp-4.4.0-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:libslirp-4.4.0-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:libslirp-4.4.0-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:libslirp-4.4.0-1.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:libslirp-4.4.0-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:libslirp-debuginfo-4.4.0-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:libslirp-debuginfo-4.4.0-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:libslirp-debuginfo-4.4.0-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:libslirp-debuginfo-4.4.0-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:libslirp-debugsource-4.4.0-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:libslirp-debugsource-4.4.0-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:libslirp-debugsource-4.4.0-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:libslirp-debugsource-4.4.0-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:libslirp-devel-4.4.0-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:libslirp-devel-4.4.0-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:libslirp-devel-4.4.0-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:libslirp-devel-4.4.0-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:netavark-1.5.1-3.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:netavark-1.5.1-3.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:netavark-1.5.1-3.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:netavark-1.5.1-3.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:netavark-1.5.1-3.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:oci-seccomp-bpf-hook-1.2.8-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:oci-seccomp-bpf-hook-1.2.8-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:oci-seccomp-bpf-hook-1.2.8-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:oci-seccomp-bpf-hook-1.2.8-1.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:oci-seccomp-bpf-hook-1.2.8-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:oci-seccomp-bpf-hook-debuginfo-1.2.8-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:oci-seccomp-bpf-hook-debuginfo-1.2.8-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:oci-seccomp-bpf-hook-debuginfo-1.2.8-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:oci-seccomp-bpf-hook-debuginfo-1.2.8-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:oci-seccomp-bpf-hook-debugsource-1.2.8-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:oci-seccomp-bpf-hook-debugsource-1.2.8-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:oci-seccomp-bpf-hook-debugsource-1.2.8-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:oci-seccomp-bpf-hook-debugsource-1.2.8-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-4.4.1-19.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-catatonit-4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-catatonit-4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-catatonit-4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-catatonit-4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-catatonit-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-catatonit-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-catatonit-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-catatonit-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-debugsource-4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-debugsource-4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-debugsource-4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-debugsource-4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-docker-4.4.1-19.module+el8.8.0+21741+dd5be1e7.noarch.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-gvproxy-4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-gvproxy-4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-gvproxy-4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-gvproxy-4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-gvproxy-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-gvproxy-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-gvproxy-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-gvproxy-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-plugins-4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-plugins-4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-plugins-4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-plugins-4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-plugins-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-plugins-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-plugins-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-plugins-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-remote-4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-remote-4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-remote-4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-remote-4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-remote-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-remote-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-remote-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-remote-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-tests-4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-tests-4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-tests-4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-tests-4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:python-podman-4.4.1-1.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:python3-criu-3.15-4.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:python3-criu-3.15-4.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:python3-criu-3.15-4.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:python3-criu-3.15-4.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:python3-podman-4.4.1-1.module+el8.8.0+21741+dd5be1e7.noarch.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:runc-1.1.12-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:runc-1.1.12-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:runc-1.1.12-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:runc-1.1.12-1.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:runc-1.1.12-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:runc-debuginfo-1.1.12-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:runc-debuginfo-1.1.12-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:runc-debuginfo-1.1.12-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:runc-debuginfo-1.1.12-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:runc-debugsource-1.1.12-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:runc-debugsource-1.1.12-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:runc-debugsource-1.1.12-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:runc-debugsource-1.1.12-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:skopeo-1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:skopeo-1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:skopeo-1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:skopeo-1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:skopeo-1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:skopeo-tests-1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:skopeo-tests-1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:skopeo-tests-1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:skopeo-tests-1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:slirp4netns-1.2.0-3.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:slirp4netns-1.2.0-3.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:slirp4netns-1.2.0-3.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:slirp4netns-1.2.0-3.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:slirp4netns-1.2.0-3.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:slirp4netns-debuginfo-1.2.0-3.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:slirp4netns-debuginfo-1.2.0-3.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:slirp4netns-debuginfo-1.2.0-3.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:slirp4netns-debuginfo-1.2.0-3.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:slirp4netns-debugsource-1.2.0-3.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:slirp4netns-debugsource-1.2.0-3.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:slirp4netns-debugsource-1.2.0-3.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:slirp4netns-debugsource-1.2.0-3.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:toolbox-0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:toolbox-0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:toolbox-0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:toolbox-0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:toolbox-0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:toolbox-debuginfo-0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:toolbox-debuginfo-0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:toolbox-debuginfo-0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:toolbox-debuginfo-0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:toolbox-debugsource-0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:toolbox-debugsource-0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:toolbox-debugsource-0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:toolbox-debugsource-0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:toolbox-tests-0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:toolbox-tests-0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:toolbox-tests-0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:toolbox-tests-0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:udica-0.2.6-20.module+el8.8.0+21741+dd5be1e7.noarch.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:udica-0.2.6-20.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 8.6,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.8.0.Z.EUS:aardvark-dns-1.5.0-2.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:aardvark-dns-1.5.0-2.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:aardvark-dns-1.5.0-2.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:aardvark-dns-1.5.0-2.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:aardvark-dns-1.5.0-2.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:buildah-1.29.3-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:buildah-1.29.3-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:buildah-1.29.3-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:buildah-1.29.3-1.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:buildah-1.29.3-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:buildah-debuginfo-1.29.3-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:buildah-debuginfo-1.29.3-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:buildah-debuginfo-1.29.3-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:buildah-debuginfo-1.29.3-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:buildah-debugsource-1.29.3-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:buildah-debugsource-1.29.3-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:buildah-debugsource-1.29.3-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:buildah-debugsource-1.29.3-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:buildah-tests-1.29.3-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:buildah-tests-1.29.3-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:buildah-tests-1.29.3-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:buildah-tests-1.29.3-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:buildah-tests-debuginfo-1.29.3-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:buildah-tests-debuginfo-1.29.3-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:buildah-tests-debuginfo-1.29.3-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:buildah-tests-debuginfo-1.29.3-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:cockpit-podman-63.1-1.module+el8.8.0+21741+dd5be1e7.noarch.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:cockpit-podman-63.1-1.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:conmon-2.1.6-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:conmon-2.1.6-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:conmon-2.1.6-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:conmon-2.1.6-1.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:conmon-2.1.6-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:conmon-debuginfo-2.1.6-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:conmon-debuginfo-2.1.6-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:conmon-debuginfo-2.1.6-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:conmon-debuginfo-2.1.6-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:conmon-debugsource-2.1.6-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:conmon-debugsource-2.1.6-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:conmon-debugsource-2.1.6-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:conmon-debugsource-2.1.6-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:container-selinux-2.229.0-1.module+el8.8.0+21741+dd5be1e7.noarch.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:container-selinux-2.229.0-1.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:containernetworking-plugins-1.2.0-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:containernetworking-plugins-1.2.0-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:containernetworking-plugins-1.2.0-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:containernetworking-plugins-1.2.0-1.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:containernetworking-plugins-1.2.0-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:containernetworking-plugins-debuginfo-1.2.0-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:containernetworking-plugins-debuginfo-1.2.0-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:containernetworking-plugins-debuginfo-1.2.0-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:containernetworking-plugins-debuginfo-1.2.0-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:containernetworking-plugins-debugsource-1.2.0-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:containernetworking-plugins-debugsource-1.2.0-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:containernetworking-plugins-debugsource-1.2.0-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:containernetworking-plugins-debugsource-1.2.0-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:containers-common-1-65.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:containers-common-1-65.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:containers-common-1-65.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:containers-common-1-65.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:containers-common-1-65.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:crit-3.15-4.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:crit-3.15-4.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:crit-3.15-4.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:crit-3.15-4.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:criu-3.15-4.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:criu-3.15-4.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:criu-3.15-4.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:criu-3.15-4.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:criu-3.15-4.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:criu-debuginfo-3.15-4.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:criu-debuginfo-3.15-4.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:criu-debuginfo-3.15-4.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:criu-debuginfo-3.15-4.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:criu-debugsource-3.15-4.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:criu-debugsource-3.15-4.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:criu-debugsource-3.15-4.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:criu-debugsource-3.15-4.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:criu-devel-3.15-4.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:criu-devel-3.15-4.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:criu-devel-3.15-4.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:criu-devel-3.15-4.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:criu-libs-3.15-4.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:criu-libs-3.15-4.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:criu-libs-3.15-4.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:criu-libs-3.15-4.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:criu-libs-debuginfo-3.15-4.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:criu-libs-debuginfo-3.15-4.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:criu-libs-debuginfo-3.15-4.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:criu-libs-debuginfo-3.15-4.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:crun-1.8.4-2.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:crun-1.8.4-2.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:crun-1.8.4-2.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:crun-1.8.4-2.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:crun-1.8.4-2.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:crun-debuginfo-1.8.4-2.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:crun-debuginfo-1.8.4-2.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:crun-debuginfo-1.8.4-2.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:crun-debuginfo-1.8.4-2.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:crun-debugsource-1.8.4-2.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:crun-debugsource-1.8.4-2.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:crun-debugsource-1.8.4-2.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:crun-debugsource-1.8.4-2.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:fuse-overlayfs-1.11-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:fuse-overlayfs-1.11-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:fuse-overlayfs-1.11-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:fuse-overlayfs-1.11-1.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:fuse-overlayfs-1.11-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:fuse-overlayfs-debuginfo-1.11-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:fuse-overlayfs-debuginfo-1.11-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:fuse-overlayfs-debuginfo-1.11-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:fuse-overlayfs-debuginfo-1.11-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:fuse-overlayfs-debugsource-1.11-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:fuse-overlayfs-debugsource-1.11-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:fuse-overlayfs-debugsource-1.11-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:fuse-overlayfs-debugsource-1.11-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:libslirp-4.4.0-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:libslirp-4.4.0-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:libslirp-4.4.0-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:libslirp-4.4.0-1.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:libslirp-4.4.0-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:libslirp-debuginfo-4.4.0-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:libslirp-debuginfo-4.4.0-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:libslirp-debuginfo-4.4.0-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:libslirp-debuginfo-4.4.0-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:libslirp-debugsource-4.4.0-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:libslirp-debugsource-4.4.0-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:libslirp-debugsource-4.4.0-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:libslirp-debugsource-4.4.0-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:libslirp-devel-4.4.0-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:libslirp-devel-4.4.0-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:libslirp-devel-4.4.0-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:libslirp-devel-4.4.0-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:netavark-1.5.1-3.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:netavark-1.5.1-3.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:netavark-1.5.1-3.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:netavark-1.5.1-3.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:netavark-1.5.1-3.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:oci-seccomp-bpf-hook-1.2.8-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:oci-seccomp-bpf-hook-1.2.8-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:oci-seccomp-bpf-hook-1.2.8-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:oci-seccomp-bpf-hook-1.2.8-1.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:oci-seccomp-bpf-hook-1.2.8-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:oci-seccomp-bpf-hook-debuginfo-1.2.8-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:oci-seccomp-bpf-hook-debuginfo-1.2.8-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:oci-seccomp-bpf-hook-debuginfo-1.2.8-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:oci-seccomp-bpf-hook-debuginfo-1.2.8-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:oci-seccomp-bpf-hook-debugsource-1.2.8-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:oci-seccomp-bpf-hook-debugsource-1.2.8-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:oci-seccomp-bpf-hook-debugsource-1.2.8-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:oci-seccomp-bpf-hook-debugsource-1.2.8-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-4.4.1-19.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-catatonit-4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-catatonit-4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-catatonit-4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-catatonit-4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-catatonit-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-catatonit-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-catatonit-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-catatonit-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-debugsource-4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-debugsource-4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-debugsource-4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-debugsource-4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-docker-4.4.1-19.module+el8.8.0+21741+dd5be1e7.noarch.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-gvproxy-4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-gvproxy-4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-gvproxy-4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-gvproxy-4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-gvproxy-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-gvproxy-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-gvproxy-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-gvproxy-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-plugins-4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-plugins-4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-plugins-4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-plugins-4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-plugins-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-plugins-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-plugins-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-plugins-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-remote-4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-remote-4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-remote-4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-remote-4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-remote-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-remote-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-remote-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-remote-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-tests-4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-tests-4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-tests-4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-tests-4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:python-podman-4.4.1-1.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:python3-criu-3.15-4.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:python3-criu-3.15-4.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:python3-criu-3.15-4.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:python3-criu-3.15-4.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:python3-podman-4.4.1-1.module+el8.8.0+21741+dd5be1e7.noarch.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:runc-1.1.12-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:runc-1.1.12-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:runc-1.1.12-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:runc-1.1.12-1.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:runc-1.1.12-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:runc-debuginfo-1.1.12-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:runc-debuginfo-1.1.12-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:runc-debuginfo-1.1.12-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:runc-debuginfo-1.1.12-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:runc-debugsource-1.1.12-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:runc-debugsource-1.1.12-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:runc-debugsource-1.1.12-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:runc-debugsource-1.1.12-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:skopeo-1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:skopeo-1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:skopeo-1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:skopeo-1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:skopeo-1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:skopeo-tests-1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:skopeo-tests-1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:skopeo-tests-1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:skopeo-tests-1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:slirp4netns-1.2.0-3.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:slirp4netns-1.2.0-3.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:slirp4netns-1.2.0-3.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:slirp4netns-1.2.0-3.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:slirp4netns-1.2.0-3.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:slirp4netns-debuginfo-1.2.0-3.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:slirp4netns-debuginfo-1.2.0-3.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:slirp4netns-debuginfo-1.2.0-3.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:slirp4netns-debuginfo-1.2.0-3.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:slirp4netns-debugsource-1.2.0-3.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:slirp4netns-debugsource-1.2.0-3.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:slirp4netns-debugsource-1.2.0-3.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:slirp4netns-debugsource-1.2.0-3.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:toolbox-0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:toolbox-0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:toolbox-0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:toolbox-0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:toolbox-0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:toolbox-debuginfo-0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:toolbox-debuginfo-0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:toolbox-debuginfo-0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:toolbox-debuginfo-0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:toolbox-debugsource-0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:toolbox-debugsource-0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:toolbox-debugsource-0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:toolbox-debugsource-0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:toolbox-tests-0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:toolbox-tests-0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:toolbox-tests-0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:toolbox-tests-0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:udica-0.2.6-20.module+el8.8.0+21741+dd5be1e7.noarch.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:udica-0.2.6-20.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "buildah: full container escape at build time"
}
]
}
RHSA-2023:0693
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "The Migration Toolkit for Containers (MTC) 1.7.7 is now available.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The Migration Toolkit for Containers (MTC) enables you to migrate Kubernetes resources, persistent volume data, and internal container images between OpenShift Container Platform clusters, using the MTC web console or the Kubernetes API.\n\nSecurity Fix(es) from Bugzilla:\n\n* async: Prototype Pollution in async (CVE-2021-43138)\n\n* golang: archive/tar: unbounded memory consumption when reading headers (CVE-2022-2879)\n\n* golang: net/http/httputil: ReverseProxy should not forward unparseable query parameters (CVE-2022-2880)\n\n* golang: net/http: handle server errors after sending GOAWAY (CVE-2022-27664)\n\n* golang: golang.org/x/text/language: ParseAcceptLanguage takes a long time to parse complex tags (CVE-2022-32149)\n\n* golang: net/url: JoinPath does not strip relative path components in all circumstances (CVE-2022-32190)\n\n* golang: regexp/syntax: limit memory used by parsing regexps (CVE-2022-41715)\n\n* golang: net/http: An attacker can cause excessive memory growth in a Go server accepting HTTP/2 requests (CVE-2022-41717)\n\n* golang: math/big: decoding big.Float and big.Rat types can panic if the encoded message is too short, potentially allowing a denial of service (CVE-2022-32189)\n\nFor more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2023:0693",
"url": "https://access.redhat.com/errata/RHSA-2023:0693"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#moderate",
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "2113814",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2113814"
},
{
"category": "external",
"summary": "2124668",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2124668"
},
{
"category": "external",
"summary": "2124669",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2124669"
},
{
"category": "external",
"summary": "2126276",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2126276"
},
{
"category": "external",
"summary": "2132867",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2132867"
},
{
"category": "external",
"summary": "2132868",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2132868"
},
{
"category": "external",
"summary": "2132872",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2132872"
},
{
"category": "external",
"summary": "2134010",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2134010"
},
{
"category": "external",
"summary": "2160662",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2160662"
},
{
"category": "external",
"summary": "2161274",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2161274"
},
{
"category": "external",
"summary": "MIG-1275",
"url": "https://issues.redhat.com/browse/MIG-1275"
},
{
"category": "external",
"summary": "MIG-1281",
"url": "https://issues.redhat.com/browse/MIG-1281"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2023/rhsa-2023_0693.json"
}
],
"title": "Red Hat Security Advisory: Migration Toolkit for Containers (MTC) 1.7.7 security and bug fix update",
"tracking": {
"current_release_date": "2025-10-24T13:31:43+00:00",
"generator": {
"date": "2025-10-24T13:31:43+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.10"
}
},
"id": "RHSA-2023:0693",
"initial_release_date": "2023-02-09T02:17:22+00:00",
"revision_history": [
{
"date": "2023-02-09T02:17:22+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2023-02-09T02:17:22+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-10-24T13:31:43+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "8Base-RHMTC-1.7",
"product": {
"name": "8Base-RHMTC-1.7",
"product_id": "8Base-RHMTC-1.7",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhmt:1.7::el8"
}
}
}
],
"category": "product_family",
"name": "Red Hat Migration Toolkit"
},
{
"branches": [
{
"category": "product_version",
"name": "rhmtc/openshift-migration-controller-rhel8@sha256:362eb32d0d2607f72b4f425dabaea7cde5d292ac41aea0c18c78bc6e408fff9e_amd64",
"product": {
"name": "rhmtc/openshift-migration-controller-rhel8@sha256:362eb32d0d2607f72b4f425dabaea7cde5d292ac41aea0c18c78bc6e408fff9e_amd64",
"product_id": "rhmtc/openshift-migration-controller-rhel8@sha256:362eb32d0d2607f72b4f425dabaea7cde5d292ac41aea0c18c78bc6e408fff9e_amd64",
"product_identification_helper": {
"purl": "pkg:oci/openshift-migration-controller-rhel8@sha256:362eb32d0d2607f72b4f425dabaea7cde5d292ac41aea0c18c78bc6e408fff9e?arch=amd64\u0026repository_url=registry.redhat.io/rhmtc/openshift-migration-controller-rhel8\u0026tag=v1.7.7-4"
}
}
},
{
"category": "product_version",
"name": "rhmtc/openshift-migration-hook-runner-rhel8@sha256:aa63717ac3a4961e774ed0baa3a73f01eda185516e7380579d97b9d25764d10d_amd64",
"product": {
"name": "rhmtc/openshift-migration-hook-runner-rhel8@sha256:aa63717ac3a4961e774ed0baa3a73f01eda185516e7380579d97b9d25764d10d_amd64",
"product_id": "rhmtc/openshift-migration-hook-runner-rhel8@sha256:aa63717ac3a4961e774ed0baa3a73f01eda185516e7380579d97b9d25764d10d_amd64",
"product_identification_helper": {
"purl": "pkg:oci/openshift-migration-hook-runner-rhel8@sha256:aa63717ac3a4961e774ed0baa3a73f01eda185516e7380579d97b9d25764d10d?arch=amd64\u0026repository_url=registry.redhat.io/rhmtc/openshift-migration-hook-runner-rhel8\u0026tag=v1.7.7-3"
}
}
},
{
"category": "product_version",
"name": "rhmtc/openshift-migration-legacy-rhel8-operator@sha256:1ac9cdfbdce8f7b6e4ebf5e40013f766b71b6dd604c92f602aca96612a228eda_amd64",
"product": {
"name": "rhmtc/openshift-migration-legacy-rhel8-operator@sha256:1ac9cdfbdce8f7b6e4ebf5e40013f766b71b6dd604c92f602aca96612a228eda_amd64",
"product_id": "rhmtc/openshift-migration-legacy-rhel8-operator@sha256:1ac9cdfbdce8f7b6e4ebf5e40013f766b71b6dd604c92f602aca96612a228eda_amd64",
"product_identification_helper": {
"purl": "pkg:oci/openshift-migration-legacy-rhel8-operator@sha256:1ac9cdfbdce8f7b6e4ebf5e40013f766b71b6dd604c92f602aca96612a228eda?arch=amd64\u0026repository_url=registry.redhat.io/rhmtc/openshift-migration-legacy-rhel8-operator\u0026tag=v1.7.7-9"
}
}
},
{
"category": "product_version",
"name": "rhmtc/openshift-migration-log-reader-rhel8@sha256:d89e9ef65993466d25b26702d0210c14ce191155501774f4d2f1f08dbdad9804_amd64",
"product": {
"name": "rhmtc/openshift-migration-log-reader-rhel8@sha256:d89e9ef65993466d25b26702d0210c14ce191155501774f4d2f1f08dbdad9804_amd64",
"product_id": "rhmtc/openshift-migration-log-reader-rhel8@sha256:d89e9ef65993466d25b26702d0210c14ce191155501774f4d2f1f08dbdad9804_amd64",
"product_identification_helper": {
"purl": "pkg:oci/openshift-migration-log-reader-rhel8@sha256:d89e9ef65993466d25b26702d0210c14ce191155501774f4d2f1f08dbdad9804?arch=amd64\u0026repository_url=registry.redhat.io/rhmtc/openshift-migration-log-reader-rhel8\u0026tag=v1.7.7-3"
}
}
},
{
"category": "product_version",
"name": "rhmtc/openshift-migration-must-gather-rhel8@sha256:5acf34dc4041b694b452d46c2f656db566241773285ca305a79ab7b9dc087b43_amd64",
"product": {
"name": "rhmtc/openshift-migration-must-gather-rhel8@sha256:5acf34dc4041b694b452d46c2f656db566241773285ca305a79ab7b9dc087b43_amd64",
"product_id": "rhmtc/openshift-migration-must-gather-rhel8@sha256:5acf34dc4041b694b452d46c2f656db566241773285ca305a79ab7b9dc087b43_amd64",
"product_identification_helper": {
"purl": "pkg:oci/openshift-migration-must-gather-rhel8@sha256:5acf34dc4041b694b452d46c2f656db566241773285ca305a79ab7b9dc087b43?arch=amd64\u0026repository_url=registry.redhat.io/rhmtc/openshift-migration-must-gather-rhel8\u0026tag=v1.7.7-4"
}
}
},
{
"category": "product_version",
"name": "rhmtc/openshift-migration-openvpn-rhel8@sha256:15df7304827ce49d422554551f08d99cfffa1afc4ffacac145d4399ccb1cbd68_amd64",
"product": {
"name": "rhmtc/openshift-migration-openvpn-rhel8@sha256:15df7304827ce49d422554551f08d99cfffa1afc4ffacac145d4399ccb1cbd68_amd64",
"product_id": "rhmtc/openshift-migration-openvpn-rhel8@sha256:15df7304827ce49d422554551f08d99cfffa1afc4ffacac145d4399ccb1cbd68_amd64",
"product_identification_helper": {
"purl": "pkg:oci/openshift-migration-openvpn-rhel8@sha256:15df7304827ce49d422554551f08d99cfffa1afc4ffacac145d4399ccb1cbd68?arch=amd64\u0026repository_url=registry.redhat.io/rhmtc/openshift-migration-openvpn-rhel8\u0026tag=v1.7.7-2"
}
}
},
{
"category": "product_version",
"name": "rhmtc/openshift-migration-rhel8-operator@sha256:aaaf4f6095294b497889749390f0a3aac04b83131a423799c44b5e367e0b370a_amd64",
"product": {
"name": "rhmtc/openshift-migration-rhel8-operator@sha256:aaaf4f6095294b497889749390f0a3aac04b83131a423799c44b5e367e0b370a_amd64",
"product_id": "rhmtc/openshift-migration-rhel8-operator@sha256:aaaf4f6095294b497889749390f0a3aac04b83131a423799c44b5e367e0b370a_amd64",
"product_identification_helper": {
"purl": "pkg:oci/openshift-migration-rhel8-operator@sha256:aaaf4f6095294b497889749390f0a3aac04b83131a423799c44b5e367e0b370a?arch=amd64\u0026repository_url=registry.redhat.io/rhmtc/openshift-migration-rhel8-operator\u0026tag=v1.7.7-9"
}
}
},
{
"category": "product_version",
"name": "rhmtc/openshift-migration-operator-bundle@sha256:90ed03a5e0cb0b0ffd85f7434cc4eda9bd8fe81cd90b597772d9b7caccd4b80f_amd64",
"product": {
"name": "rhmtc/openshift-migration-operator-bundle@sha256:90ed03a5e0cb0b0ffd85f7434cc4eda9bd8fe81cd90b597772d9b7caccd4b80f_amd64",
"product_id": "rhmtc/openshift-migration-operator-bundle@sha256:90ed03a5e0cb0b0ffd85f7434cc4eda9bd8fe81cd90b597772d9b7caccd4b80f_amd64",
"product_identification_helper": {
"purl": "pkg:oci/openshift-migration-operator-bundle@sha256:90ed03a5e0cb0b0ffd85f7434cc4eda9bd8fe81cd90b597772d9b7caccd4b80f?arch=amd64\u0026repository_url=registry.redhat.io/rhmtc/openshift-migration-operator-bundle\u0026tag=v1.7.7-9"
}
}
},
{
"category": "product_version",
"name": "rhmtc/openshift-migration-registry-rhel8@sha256:aaa03ef0769d38185675db2a7a78454659de14bdebe5ff842614bf2124e5adfe_amd64",
"product": {
"name": "rhmtc/openshift-migration-registry-rhel8@sha256:aaa03ef0769d38185675db2a7a78454659de14bdebe5ff842614bf2124e5adfe_amd64",
"product_id": "rhmtc/openshift-migration-registry-rhel8@sha256:aaa03ef0769d38185675db2a7a78454659de14bdebe5ff842614bf2124e5adfe_amd64",
"product_identification_helper": {
"purl": "pkg:oci/openshift-migration-registry-rhel8@sha256:aaa03ef0769d38185675db2a7a78454659de14bdebe5ff842614bf2124e5adfe?arch=amd64\u0026repository_url=registry.redhat.io/rhmtc/openshift-migration-registry-rhel8\u0026tag=v1.7.7-3"
}
}
},
{
"category": "product_version",
"name": "rhmtc/openshift-migration-rsync-transfer-rhel8@sha256:58bd4ffc3e9599401251ac929cf15c1773ecc03a57177118adbe23ac8d7762af_amd64",
"product": {
"name": "rhmtc/openshift-migration-rsync-transfer-rhel8@sha256:58bd4ffc3e9599401251ac929cf15c1773ecc03a57177118adbe23ac8d7762af_amd64",
"product_id": "rhmtc/openshift-migration-rsync-transfer-rhel8@sha256:58bd4ffc3e9599401251ac929cf15c1773ecc03a57177118adbe23ac8d7762af_amd64",
"product_identification_helper": {
"purl": "pkg:oci/openshift-migration-rsync-transfer-rhel8@sha256:58bd4ffc3e9599401251ac929cf15c1773ecc03a57177118adbe23ac8d7762af?arch=amd64\u0026repository_url=registry.redhat.io/rhmtc/openshift-migration-rsync-transfer-rhel8\u0026tag=v1.7.7-2"
}
}
},
{
"category": "product_version",
"name": "rhmtc/openshift-migration-ui-rhel8@sha256:4141db5099ae659270297eb4aaff695ac43fce67d91fea49dbc76583f419d3a1_amd64",
"product": {
"name": "rhmtc/openshift-migration-ui-rhel8@sha256:4141db5099ae659270297eb4aaff695ac43fce67d91fea49dbc76583f419d3a1_amd64",
"product_id": "rhmtc/openshift-migration-ui-rhel8@sha256:4141db5099ae659270297eb4aaff695ac43fce67d91fea49dbc76583f419d3a1_amd64",
"product_identification_helper": {
"purl": "pkg:oci/openshift-migration-ui-rhel8@sha256:4141db5099ae659270297eb4aaff695ac43fce67d91fea49dbc76583f419d3a1?arch=amd64\u0026repository_url=registry.redhat.io/rhmtc/openshift-migration-ui-rhel8\u0026tag=v1.7.7-3"
}
}
},
{
"category": "product_version",
"name": "rhmtc/openshift-migration-velero-rhel8@sha256:1ca6945c3918f1743a4cee86a507f9f6581c8f8e572b6b8739d79a675a64d1db_amd64",
"product": {
"name": "rhmtc/openshift-migration-velero-rhel8@sha256:1ca6945c3918f1743a4cee86a507f9f6581c8f8e572b6b8739d79a675a64d1db_amd64",
"product_id": "rhmtc/openshift-migration-velero-rhel8@sha256:1ca6945c3918f1743a4cee86a507f9f6581c8f8e572b6b8739d79a675a64d1db_amd64",
"product_identification_helper": {
"purl": "pkg:oci/openshift-migration-velero-rhel8@sha256:1ca6945c3918f1743a4cee86a507f9f6581c8f8e572b6b8739d79a675a64d1db?arch=amd64\u0026repository_url=registry.redhat.io/rhmtc/openshift-migration-velero-rhel8\u0026tag=v1.7.7-5"
}
}
},
{
"category": "product_version",
"name": "rhmtc/openshift-migration-velero-plugin-for-aws-rhel8@sha256:633eeb0b6b50e21bbc0fb12fd2262294733fc9ac8b1e9eedcdb9d1433534d88d_amd64",
"product": {
"name": "rhmtc/openshift-migration-velero-plugin-for-aws-rhel8@sha256:633eeb0b6b50e21bbc0fb12fd2262294733fc9ac8b1e9eedcdb9d1433534d88d_amd64",
"product_id": "rhmtc/openshift-migration-velero-plugin-for-aws-rhel8@sha256:633eeb0b6b50e21bbc0fb12fd2262294733fc9ac8b1e9eedcdb9d1433534d88d_amd64",
"product_identification_helper": {
"purl": "pkg:oci/openshift-migration-velero-plugin-for-aws-rhel8@sha256:633eeb0b6b50e21bbc0fb12fd2262294733fc9ac8b1e9eedcdb9d1433534d88d?arch=amd64\u0026repository_url=registry.redhat.io/rhmtc/openshift-migration-velero-plugin-for-aws-rhel8\u0026tag=v1.7.7-3"
}
}
},
{
"category": "product_version",
"name": "rhmtc/openshift-migration-velero-plugin-for-gcp-rhel8@sha256:19dbf2bb83f8a0f35079d6ae25f8fcddad970e48ecb21694fd2d4c553313e4aa_amd64",
"product": {
"name": "rhmtc/openshift-migration-velero-plugin-for-gcp-rhel8@sha256:19dbf2bb83f8a0f35079d6ae25f8fcddad970e48ecb21694fd2d4c553313e4aa_amd64",
"product_id": "rhmtc/openshift-migration-velero-plugin-for-gcp-rhel8@sha256:19dbf2bb83f8a0f35079d6ae25f8fcddad970e48ecb21694fd2d4c553313e4aa_amd64",
"product_identification_helper": {
"purl": "pkg:oci/openshift-migration-velero-plugin-for-gcp-rhel8@sha256:19dbf2bb83f8a0f35079d6ae25f8fcddad970e48ecb21694fd2d4c553313e4aa?arch=amd64\u0026repository_url=registry.redhat.io/rhmtc/openshift-migration-velero-plugin-for-gcp-rhel8\u0026tag=v1.7.7-3"
}
}
},
{
"category": "product_version",
"name": "rhmtc/openshift-migration-velero-plugin-for-microsoft-azure-rhel8@sha256:93e95f065eadaa41154b9012dd5ddc824607758e2bce85c4256c2689125b80a4_amd64",
"product": {
"name": "rhmtc/openshift-migration-velero-plugin-for-microsoft-azure-rhel8@sha256:93e95f065eadaa41154b9012dd5ddc824607758e2bce85c4256c2689125b80a4_amd64",
"product_id": "rhmtc/openshift-migration-velero-plugin-for-microsoft-azure-rhel8@sha256:93e95f065eadaa41154b9012dd5ddc824607758e2bce85c4256c2689125b80a4_amd64",
"product_identification_helper": {
"purl": "pkg:oci/openshift-migration-velero-plugin-for-microsoft-azure-rhel8@sha256:93e95f065eadaa41154b9012dd5ddc824607758e2bce85c4256c2689125b80a4?arch=amd64\u0026repository_url=registry.redhat.io/rhmtc/openshift-migration-velero-plugin-for-microsoft-azure-rhel8\u0026tag=v1.7.7-3"
}
}
},
{
"category": "product_version",
"name": "rhmtc/openshift-migration-velero-restic-restore-helper-rhel8@sha256:70d3d46f54b91538e047df62e7e5b161fabac195a2f2e45cdba78215b4c82a7d_amd64",
"product": {
"name": "rhmtc/openshift-migration-velero-restic-restore-helper-rhel8@sha256:70d3d46f54b91538e047df62e7e5b161fabac195a2f2e45cdba78215b4c82a7d_amd64",
"product_id": "rhmtc/openshift-migration-velero-restic-restore-helper-rhel8@sha256:70d3d46f54b91538e047df62e7e5b161fabac195a2f2e45cdba78215b4c82a7d_amd64",
"product_identification_helper": {
"purl": "pkg:oci/openshift-migration-velero-restic-restore-helper-rhel8@sha256:70d3d46f54b91538e047df62e7e5b161fabac195a2f2e45cdba78215b4c82a7d?arch=amd64\u0026repository_url=registry.redhat.io/rhmtc/openshift-migration-velero-restic-restore-helper-rhel8\u0026tag=v1.7.7-5"
}
}
},
{
"category": "product_version",
"name": "rhmtc/openshift-velero-plugin-rhel8@sha256:26f8fb5c41ece82626325ba502505ba1ca7986602cc147b492f9857caa0be868_amd64",
"product": {
"name": "rhmtc/openshift-velero-plugin-rhel8@sha256:26f8fb5c41ece82626325ba502505ba1ca7986602cc147b492f9857caa0be868_amd64",
"product_id": "rhmtc/openshift-velero-plugin-rhel8@sha256:26f8fb5c41ece82626325ba502505ba1ca7986602cc147b492f9857caa0be868_amd64",
"product_identification_helper": {
"purl": "pkg:oci/openshift-velero-plugin-rhel8@sha256:26f8fb5c41ece82626325ba502505ba1ca7986602cc147b492f9857caa0be868?arch=amd64\u0026repository_url=registry.redhat.io/rhmtc/openshift-velero-plugin-rhel8\u0026tag=v1.7.7-3"
}
}
}
],
"category": "architecture",
"name": "amd64"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "rhmtc/openshift-migration-controller-rhel8@sha256:362eb32d0d2607f72b4f425dabaea7cde5d292ac41aea0c18c78bc6e408fff9e_amd64 as a component of 8Base-RHMTC-1.7",
"product_id": "8Base-RHMTC-1.7:rhmtc/openshift-migration-controller-rhel8@sha256:362eb32d0d2607f72b4f425dabaea7cde5d292ac41aea0c18c78bc6e408fff9e_amd64"
},
"product_reference": "rhmtc/openshift-migration-controller-rhel8@sha256:362eb32d0d2607f72b4f425dabaea7cde5d292ac41aea0c18c78bc6e408fff9e_amd64",
"relates_to_product_reference": "8Base-RHMTC-1.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhmtc/openshift-migration-hook-runner-rhel8@sha256:aa63717ac3a4961e774ed0baa3a73f01eda185516e7380579d97b9d25764d10d_amd64 as a component of 8Base-RHMTC-1.7",
"product_id": "8Base-RHMTC-1.7:rhmtc/openshift-migration-hook-runner-rhel8@sha256:aa63717ac3a4961e774ed0baa3a73f01eda185516e7380579d97b9d25764d10d_amd64"
},
"product_reference": "rhmtc/openshift-migration-hook-runner-rhel8@sha256:aa63717ac3a4961e774ed0baa3a73f01eda185516e7380579d97b9d25764d10d_amd64",
"relates_to_product_reference": "8Base-RHMTC-1.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhmtc/openshift-migration-legacy-rhel8-operator@sha256:1ac9cdfbdce8f7b6e4ebf5e40013f766b71b6dd604c92f602aca96612a228eda_amd64 as a component of 8Base-RHMTC-1.7",
"product_id": "8Base-RHMTC-1.7:rhmtc/openshift-migration-legacy-rhel8-operator@sha256:1ac9cdfbdce8f7b6e4ebf5e40013f766b71b6dd604c92f602aca96612a228eda_amd64"
},
"product_reference": "rhmtc/openshift-migration-legacy-rhel8-operator@sha256:1ac9cdfbdce8f7b6e4ebf5e40013f766b71b6dd604c92f602aca96612a228eda_amd64",
"relates_to_product_reference": "8Base-RHMTC-1.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhmtc/openshift-migration-log-reader-rhel8@sha256:d89e9ef65993466d25b26702d0210c14ce191155501774f4d2f1f08dbdad9804_amd64 as a component of 8Base-RHMTC-1.7",
"product_id": "8Base-RHMTC-1.7:rhmtc/openshift-migration-log-reader-rhel8@sha256:d89e9ef65993466d25b26702d0210c14ce191155501774f4d2f1f08dbdad9804_amd64"
},
"product_reference": "rhmtc/openshift-migration-log-reader-rhel8@sha256:d89e9ef65993466d25b26702d0210c14ce191155501774f4d2f1f08dbdad9804_amd64",
"relates_to_product_reference": "8Base-RHMTC-1.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhmtc/openshift-migration-must-gather-rhel8@sha256:5acf34dc4041b694b452d46c2f656db566241773285ca305a79ab7b9dc087b43_amd64 as a component of 8Base-RHMTC-1.7",
"product_id": "8Base-RHMTC-1.7:rhmtc/openshift-migration-must-gather-rhel8@sha256:5acf34dc4041b694b452d46c2f656db566241773285ca305a79ab7b9dc087b43_amd64"
},
"product_reference": "rhmtc/openshift-migration-must-gather-rhel8@sha256:5acf34dc4041b694b452d46c2f656db566241773285ca305a79ab7b9dc087b43_amd64",
"relates_to_product_reference": "8Base-RHMTC-1.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhmtc/openshift-migration-openvpn-rhel8@sha256:15df7304827ce49d422554551f08d99cfffa1afc4ffacac145d4399ccb1cbd68_amd64 as a component of 8Base-RHMTC-1.7",
"product_id": "8Base-RHMTC-1.7:rhmtc/openshift-migration-openvpn-rhel8@sha256:15df7304827ce49d422554551f08d99cfffa1afc4ffacac145d4399ccb1cbd68_amd64"
},
"product_reference": "rhmtc/openshift-migration-openvpn-rhel8@sha256:15df7304827ce49d422554551f08d99cfffa1afc4ffacac145d4399ccb1cbd68_amd64",
"relates_to_product_reference": "8Base-RHMTC-1.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhmtc/openshift-migration-operator-bundle@sha256:90ed03a5e0cb0b0ffd85f7434cc4eda9bd8fe81cd90b597772d9b7caccd4b80f_amd64 as a component of 8Base-RHMTC-1.7",
"product_id": "8Base-RHMTC-1.7:rhmtc/openshift-migration-operator-bundle@sha256:90ed03a5e0cb0b0ffd85f7434cc4eda9bd8fe81cd90b597772d9b7caccd4b80f_amd64"
},
"product_reference": "rhmtc/openshift-migration-operator-bundle@sha256:90ed03a5e0cb0b0ffd85f7434cc4eda9bd8fe81cd90b597772d9b7caccd4b80f_amd64",
"relates_to_product_reference": "8Base-RHMTC-1.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhmtc/openshift-migration-registry-rhel8@sha256:aaa03ef0769d38185675db2a7a78454659de14bdebe5ff842614bf2124e5adfe_amd64 as a component of 8Base-RHMTC-1.7",
"product_id": "8Base-RHMTC-1.7:rhmtc/openshift-migration-registry-rhel8@sha256:aaa03ef0769d38185675db2a7a78454659de14bdebe5ff842614bf2124e5adfe_amd64"
},
"product_reference": "rhmtc/openshift-migration-registry-rhel8@sha256:aaa03ef0769d38185675db2a7a78454659de14bdebe5ff842614bf2124e5adfe_amd64",
"relates_to_product_reference": "8Base-RHMTC-1.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhmtc/openshift-migration-rhel8-operator@sha256:aaaf4f6095294b497889749390f0a3aac04b83131a423799c44b5e367e0b370a_amd64 as a component of 8Base-RHMTC-1.7",
"product_id": "8Base-RHMTC-1.7:rhmtc/openshift-migration-rhel8-operator@sha256:aaaf4f6095294b497889749390f0a3aac04b83131a423799c44b5e367e0b370a_amd64"
},
"product_reference": "rhmtc/openshift-migration-rhel8-operator@sha256:aaaf4f6095294b497889749390f0a3aac04b83131a423799c44b5e367e0b370a_amd64",
"relates_to_product_reference": "8Base-RHMTC-1.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhmtc/openshift-migration-rsync-transfer-rhel8@sha256:58bd4ffc3e9599401251ac929cf15c1773ecc03a57177118adbe23ac8d7762af_amd64 as a component of 8Base-RHMTC-1.7",
"product_id": "8Base-RHMTC-1.7:rhmtc/openshift-migration-rsync-transfer-rhel8@sha256:58bd4ffc3e9599401251ac929cf15c1773ecc03a57177118adbe23ac8d7762af_amd64"
},
"product_reference": "rhmtc/openshift-migration-rsync-transfer-rhel8@sha256:58bd4ffc3e9599401251ac929cf15c1773ecc03a57177118adbe23ac8d7762af_amd64",
"relates_to_product_reference": "8Base-RHMTC-1.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhmtc/openshift-migration-ui-rhel8@sha256:4141db5099ae659270297eb4aaff695ac43fce67d91fea49dbc76583f419d3a1_amd64 as a component of 8Base-RHMTC-1.7",
"product_id": "8Base-RHMTC-1.7:rhmtc/openshift-migration-ui-rhel8@sha256:4141db5099ae659270297eb4aaff695ac43fce67d91fea49dbc76583f419d3a1_amd64"
},
"product_reference": "rhmtc/openshift-migration-ui-rhel8@sha256:4141db5099ae659270297eb4aaff695ac43fce67d91fea49dbc76583f419d3a1_amd64",
"relates_to_product_reference": "8Base-RHMTC-1.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhmtc/openshift-migration-velero-plugin-for-aws-rhel8@sha256:633eeb0b6b50e21bbc0fb12fd2262294733fc9ac8b1e9eedcdb9d1433534d88d_amd64 as a component of 8Base-RHMTC-1.7",
"product_id": "8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-plugin-for-aws-rhel8@sha256:633eeb0b6b50e21bbc0fb12fd2262294733fc9ac8b1e9eedcdb9d1433534d88d_amd64"
},
"product_reference": "rhmtc/openshift-migration-velero-plugin-for-aws-rhel8@sha256:633eeb0b6b50e21bbc0fb12fd2262294733fc9ac8b1e9eedcdb9d1433534d88d_amd64",
"relates_to_product_reference": "8Base-RHMTC-1.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhmtc/openshift-migration-velero-plugin-for-gcp-rhel8@sha256:19dbf2bb83f8a0f35079d6ae25f8fcddad970e48ecb21694fd2d4c553313e4aa_amd64 as a component of 8Base-RHMTC-1.7",
"product_id": "8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-plugin-for-gcp-rhel8@sha256:19dbf2bb83f8a0f35079d6ae25f8fcddad970e48ecb21694fd2d4c553313e4aa_amd64"
},
"product_reference": "rhmtc/openshift-migration-velero-plugin-for-gcp-rhel8@sha256:19dbf2bb83f8a0f35079d6ae25f8fcddad970e48ecb21694fd2d4c553313e4aa_amd64",
"relates_to_product_reference": "8Base-RHMTC-1.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhmtc/openshift-migration-velero-plugin-for-microsoft-azure-rhel8@sha256:93e95f065eadaa41154b9012dd5ddc824607758e2bce85c4256c2689125b80a4_amd64 as a component of 8Base-RHMTC-1.7",
"product_id": "8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-plugin-for-microsoft-azure-rhel8@sha256:93e95f065eadaa41154b9012dd5ddc824607758e2bce85c4256c2689125b80a4_amd64"
},
"product_reference": "rhmtc/openshift-migration-velero-plugin-for-microsoft-azure-rhel8@sha256:93e95f065eadaa41154b9012dd5ddc824607758e2bce85c4256c2689125b80a4_amd64",
"relates_to_product_reference": "8Base-RHMTC-1.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhmtc/openshift-migration-velero-restic-restore-helper-rhel8@sha256:70d3d46f54b91538e047df62e7e5b161fabac195a2f2e45cdba78215b4c82a7d_amd64 as a component of 8Base-RHMTC-1.7",
"product_id": "8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-restic-restore-helper-rhel8@sha256:70d3d46f54b91538e047df62e7e5b161fabac195a2f2e45cdba78215b4c82a7d_amd64"
},
"product_reference": "rhmtc/openshift-migration-velero-restic-restore-helper-rhel8@sha256:70d3d46f54b91538e047df62e7e5b161fabac195a2f2e45cdba78215b4c82a7d_amd64",
"relates_to_product_reference": "8Base-RHMTC-1.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhmtc/openshift-migration-velero-rhel8@sha256:1ca6945c3918f1743a4cee86a507f9f6581c8f8e572b6b8739d79a675a64d1db_amd64 as a component of 8Base-RHMTC-1.7",
"product_id": "8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-rhel8@sha256:1ca6945c3918f1743a4cee86a507f9f6581c8f8e572b6b8739d79a675a64d1db_amd64"
},
"product_reference": "rhmtc/openshift-migration-velero-rhel8@sha256:1ca6945c3918f1743a4cee86a507f9f6581c8f8e572b6b8739d79a675a64d1db_amd64",
"relates_to_product_reference": "8Base-RHMTC-1.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhmtc/openshift-velero-plugin-rhel8@sha256:26f8fb5c41ece82626325ba502505ba1ca7986602cc147b492f9857caa0be868_amd64 as a component of 8Base-RHMTC-1.7",
"product_id": "8Base-RHMTC-1.7:rhmtc/openshift-velero-plugin-rhel8@sha256:26f8fb5c41ece82626325ba502505ba1ca7986602cc147b492f9857caa0be868_amd64"
},
"product_reference": "rhmtc/openshift-velero-plugin-rhel8@sha256:26f8fb5c41ece82626325ba502505ba1ca7986602cc147b492f9857caa0be868_amd64",
"relates_to_product_reference": "8Base-RHMTC-1.7"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2021-43138",
"cwe": {
"id": "CWE-1321",
"name": "Improperly Controlled Modification of Object Prototype Attributes (\u0027Prototype Pollution\u0027)"
},
"discovery_date": "2022-09-13T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-RHMTC-1.7:rhmtc/openshift-migration-controller-rhel8@sha256:362eb32d0d2607f72b4f425dabaea7cde5d292ac41aea0c18c78bc6e408fff9e_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-hook-runner-rhel8@sha256:aa63717ac3a4961e774ed0baa3a73f01eda185516e7380579d97b9d25764d10d_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-legacy-rhel8-operator@sha256:1ac9cdfbdce8f7b6e4ebf5e40013f766b71b6dd604c92f602aca96612a228eda_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-log-reader-rhel8@sha256:d89e9ef65993466d25b26702d0210c14ce191155501774f4d2f1f08dbdad9804_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-must-gather-rhel8@sha256:5acf34dc4041b694b452d46c2f656db566241773285ca305a79ab7b9dc087b43_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-openvpn-rhel8@sha256:15df7304827ce49d422554551f08d99cfffa1afc4ffacac145d4399ccb1cbd68_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-operator-bundle@sha256:90ed03a5e0cb0b0ffd85f7434cc4eda9bd8fe81cd90b597772d9b7caccd4b80f_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-registry-rhel8@sha256:aaa03ef0769d38185675db2a7a78454659de14bdebe5ff842614bf2124e5adfe_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-rhel8-operator@sha256:aaaf4f6095294b497889749390f0a3aac04b83131a423799c44b5e367e0b370a_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-rsync-transfer-rhel8@sha256:58bd4ffc3e9599401251ac929cf15c1773ecc03a57177118adbe23ac8d7762af_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-plugin-for-aws-rhel8@sha256:633eeb0b6b50e21bbc0fb12fd2262294733fc9ac8b1e9eedcdb9d1433534d88d_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-plugin-for-gcp-rhel8@sha256:19dbf2bb83f8a0f35079d6ae25f8fcddad970e48ecb21694fd2d4c553313e4aa_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-plugin-for-microsoft-azure-rhel8@sha256:93e95f065eadaa41154b9012dd5ddc824607758e2bce85c4256c2689125b80a4_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-restic-restore-helper-rhel8@sha256:70d3d46f54b91538e047df62e7e5b161fabac195a2f2e45cdba78215b4c82a7d_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-rhel8@sha256:1ca6945c3918f1743a4cee86a507f9f6581c8f8e572b6b8739d79a675a64d1db_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-velero-plugin-rhel8@sha256:26f8fb5c41ece82626325ba502505ba1ca7986602cc147b492f9857caa0be868_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2126276"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in the async package. This flaw allows a malicious user to obtain privileges via the mapValues() method.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "async: Prototype Pollution in async",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-RHMTC-1.7:rhmtc/openshift-migration-ui-rhel8@sha256:4141db5099ae659270297eb4aaff695ac43fce67d91fea49dbc76583f419d3a1_amd64"
],
"known_not_affected": [
"8Base-RHMTC-1.7:rhmtc/openshift-migration-controller-rhel8@sha256:362eb32d0d2607f72b4f425dabaea7cde5d292ac41aea0c18c78bc6e408fff9e_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-hook-runner-rhel8@sha256:aa63717ac3a4961e774ed0baa3a73f01eda185516e7380579d97b9d25764d10d_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-legacy-rhel8-operator@sha256:1ac9cdfbdce8f7b6e4ebf5e40013f766b71b6dd604c92f602aca96612a228eda_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-log-reader-rhel8@sha256:d89e9ef65993466d25b26702d0210c14ce191155501774f4d2f1f08dbdad9804_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-must-gather-rhel8@sha256:5acf34dc4041b694b452d46c2f656db566241773285ca305a79ab7b9dc087b43_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-openvpn-rhel8@sha256:15df7304827ce49d422554551f08d99cfffa1afc4ffacac145d4399ccb1cbd68_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-operator-bundle@sha256:90ed03a5e0cb0b0ffd85f7434cc4eda9bd8fe81cd90b597772d9b7caccd4b80f_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-registry-rhel8@sha256:aaa03ef0769d38185675db2a7a78454659de14bdebe5ff842614bf2124e5adfe_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-rhel8-operator@sha256:aaaf4f6095294b497889749390f0a3aac04b83131a423799c44b5e367e0b370a_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-rsync-transfer-rhel8@sha256:58bd4ffc3e9599401251ac929cf15c1773ecc03a57177118adbe23ac8d7762af_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-plugin-for-aws-rhel8@sha256:633eeb0b6b50e21bbc0fb12fd2262294733fc9ac8b1e9eedcdb9d1433534d88d_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-plugin-for-gcp-rhel8@sha256:19dbf2bb83f8a0f35079d6ae25f8fcddad970e48ecb21694fd2d4c553313e4aa_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-plugin-for-microsoft-azure-rhel8@sha256:93e95f065eadaa41154b9012dd5ddc824607758e2bce85c4256c2689125b80a4_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-restic-restore-helper-rhel8@sha256:70d3d46f54b91538e047df62e7e5b161fabac195a2f2e45cdba78215b4c82a7d_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-rhel8@sha256:1ca6945c3918f1743a4cee86a507f9f6581c8f8e572b6b8739d79a675a64d1db_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-velero-plugin-rhel8@sha256:26f8fb5c41ece82626325ba502505ba1ca7986602cc147b492f9857caa0be868_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-43138"
},
{
"category": "external",
"summary": "RHBZ#2126276",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2126276"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-43138",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-43138"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-43138",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-43138"
},
{
"category": "external",
"summary": "https://github.com/advisories/GHSA-fwr7-v2mv-hh25",
"url": "https://github.com/advisories/GHSA-fwr7-v2mv-hh25"
}
],
"release_date": "2022-04-07T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-02-09T02:17:22+00:00",
"details": "For details on how to install and use MTC, refer to:\n\nhttps://docs.openshift.com/container-platform/latest/migration_toolkit_for_containers/installing-mtc.html",
"product_ids": [
"8Base-RHMTC-1.7:rhmtc/openshift-migration-ui-rhel8@sha256:4141db5099ae659270297eb4aaff695ac43fce67d91fea49dbc76583f419d3a1_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:0693"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"8Base-RHMTC-1.7:rhmtc/openshift-migration-controller-rhel8@sha256:362eb32d0d2607f72b4f425dabaea7cde5d292ac41aea0c18c78bc6e408fff9e_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-hook-runner-rhel8@sha256:aa63717ac3a4961e774ed0baa3a73f01eda185516e7380579d97b9d25764d10d_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-legacy-rhel8-operator@sha256:1ac9cdfbdce8f7b6e4ebf5e40013f766b71b6dd604c92f602aca96612a228eda_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-log-reader-rhel8@sha256:d89e9ef65993466d25b26702d0210c14ce191155501774f4d2f1f08dbdad9804_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-must-gather-rhel8@sha256:5acf34dc4041b694b452d46c2f656db566241773285ca305a79ab7b9dc087b43_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-openvpn-rhel8@sha256:15df7304827ce49d422554551f08d99cfffa1afc4ffacac145d4399ccb1cbd68_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-operator-bundle@sha256:90ed03a5e0cb0b0ffd85f7434cc4eda9bd8fe81cd90b597772d9b7caccd4b80f_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-registry-rhel8@sha256:aaa03ef0769d38185675db2a7a78454659de14bdebe5ff842614bf2124e5adfe_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-rhel8-operator@sha256:aaaf4f6095294b497889749390f0a3aac04b83131a423799c44b5e367e0b370a_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-rsync-transfer-rhel8@sha256:58bd4ffc3e9599401251ac929cf15c1773ecc03a57177118adbe23ac8d7762af_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-ui-rhel8@sha256:4141db5099ae659270297eb4aaff695ac43fce67d91fea49dbc76583f419d3a1_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-plugin-for-aws-rhel8@sha256:633eeb0b6b50e21bbc0fb12fd2262294733fc9ac8b1e9eedcdb9d1433534d88d_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-plugin-for-gcp-rhel8@sha256:19dbf2bb83f8a0f35079d6ae25f8fcddad970e48ecb21694fd2d4c553313e4aa_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-plugin-for-microsoft-azure-rhel8@sha256:93e95f065eadaa41154b9012dd5ddc824607758e2bce85c4256c2689125b80a4_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-restic-restore-helper-rhel8@sha256:70d3d46f54b91538e047df62e7e5b161fabac195a2f2e45cdba78215b4c82a7d_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-rhel8@sha256:1ca6945c3918f1743a4cee86a507f9f6581c8f8e572b6b8739d79a675a64d1db_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-velero-plugin-rhel8@sha256:26f8fb5c41ece82626325ba502505ba1ca7986602cc147b492f9857caa0be868_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "async: Prototype Pollution in async"
},
{
"acknowledgments": [
{
"names": [
"Adam Korczynski"
],
"organization": "ADA Logics"
},
{
"names": [
"OSS-Fuzz"
]
}
],
"cve": "CVE-2022-2879",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"discovery_date": "2022-10-07T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-RHMTC-1.7:rhmtc/openshift-migration-controller-rhel8@sha256:362eb32d0d2607f72b4f425dabaea7cde5d292ac41aea0c18c78bc6e408fff9e_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-hook-runner-rhel8@sha256:aa63717ac3a4961e774ed0baa3a73f01eda185516e7380579d97b9d25764d10d_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-legacy-rhel8-operator@sha256:1ac9cdfbdce8f7b6e4ebf5e40013f766b71b6dd604c92f602aca96612a228eda_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-log-reader-rhel8@sha256:d89e9ef65993466d25b26702d0210c14ce191155501774f4d2f1f08dbdad9804_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-must-gather-rhel8@sha256:5acf34dc4041b694b452d46c2f656db566241773285ca305a79ab7b9dc087b43_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-openvpn-rhel8@sha256:15df7304827ce49d422554551f08d99cfffa1afc4ffacac145d4399ccb1cbd68_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-operator-bundle@sha256:90ed03a5e0cb0b0ffd85f7434cc4eda9bd8fe81cd90b597772d9b7caccd4b80f_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-registry-rhel8@sha256:aaa03ef0769d38185675db2a7a78454659de14bdebe5ff842614bf2124e5adfe_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-rhel8-operator@sha256:aaaf4f6095294b497889749390f0a3aac04b83131a423799c44b5e367e0b370a_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-rsync-transfer-rhel8@sha256:58bd4ffc3e9599401251ac929cf15c1773ecc03a57177118adbe23ac8d7762af_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-ui-rhel8@sha256:4141db5099ae659270297eb4aaff695ac43fce67d91fea49dbc76583f419d3a1_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-plugin-for-aws-rhel8@sha256:633eeb0b6b50e21bbc0fb12fd2262294733fc9ac8b1e9eedcdb9d1433534d88d_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-plugin-for-gcp-rhel8@sha256:19dbf2bb83f8a0f35079d6ae25f8fcddad970e48ecb21694fd2d4c553313e4aa_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-plugin-for-microsoft-azure-rhel8@sha256:93e95f065eadaa41154b9012dd5ddc824607758e2bce85c4256c2689125b80a4_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-restic-restore-helper-rhel8@sha256:70d3d46f54b91538e047df62e7e5b161fabac195a2f2e45cdba78215b4c82a7d_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-rhel8@sha256:1ca6945c3918f1743a4cee86a507f9f6581c8f8e572b6b8739d79a675a64d1db_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2132867"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the golang package, where Reader.Read does not set a limit on the maximum size of file headers. After fixing, Reader.Read limits the maximum size of header blocks to 1 MiB. This flaw allows a maliciously crafted archive to cause Read to allocate unbounded amounts of memory, potentially causing resource exhaustion or panic.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: archive/tar: github.com/vbatts/tar-split: unbounded memory consumption when reading headers",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The opportunity for a Denial of Service is limited to the golang runtime. In the case of OpenShift Container Platform, this would be restricted within each individual container. There are multiple layers of guide rails (Golang\u2019s Garbage Collector; OpenShift\u2019s resource constraints imposed at the container and cluster levels) which would require a malicious user to continue submitting attacks for there to be any enduring impact. They would also need access to external server resources to be able to send a massive volume of requests to cause a significant impact on server operations.\n\n\nThis flaw additionally affects the github.com/vbatts/tar-split library and was fixed in v0.12.1.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-RHMTC-1.7:rhmtc/openshift-velero-plugin-rhel8@sha256:26f8fb5c41ece82626325ba502505ba1ca7986602cc147b492f9857caa0be868_amd64"
],
"known_not_affected": [
"8Base-RHMTC-1.7:rhmtc/openshift-migration-controller-rhel8@sha256:362eb32d0d2607f72b4f425dabaea7cde5d292ac41aea0c18c78bc6e408fff9e_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-hook-runner-rhel8@sha256:aa63717ac3a4961e774ed0baa3a73f01eda185516e7380579d97b9d25764d10d_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-legacy-rhel8-operator@sha256:1ac9cdfbdce8f7b6e4ebf5e40013f766b71b6dd604c92f602aca96612a228eda_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-log-reader-rhel8@sha256:d89e9ef65993466d25b26702d0210c14ce191155501774f4d2f1f08dbdad9804_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-must-gather-rhel8@sha256:5acf34dc4041b694b452d46c2f656db566241773285ca305a79ab7b9dc087b43_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-openvpn-rhel8@sha256:15df7304827ce49d422554551f08d99cfffa1afc4ffacac145d4399ccb1cbd68_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-operator-bundle@sha256:90ed03a5e0cb0b0ffd85f7434cc4eda9bd8fe81cd90b597772d9b7caccd4b80f_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-registry-rhel8@sha256:aaa03ef0769d38185675db2a7a78454659de14bdebe5ff842614bf2124e5adfe_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-rhel8-operator@sha256:aaaf4f6095294b497889749390f0a3aac04b83131a423799c44b5e367e0b370a_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-rsync-transfer-rhel8@sha256:58bd4ffc3e9599401251ac929cf15c1773ecc03a57177118adbe23ac8d7762af_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-ui-rhel8@sha256:4141db5099ae659270297eb4aaff695ac43fce67d91fea49dbc76583f419d3a1_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-plugin-for-aws-rhel8@sha256:633eeb0b6b50e21bbc0fb12fd2262294733fc9ac8b1e9eedcdb9d1433534d88d_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-plugin-for-gcp-rhel8@sha256:19dbf2bb83f8a0f35079d6ae25f8fcddad970e48ecb21694fd2d4c553313e4aa_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-plugin-for-microsoft-azure-rhel8@sha256:93e95f065eadaa41154b9012dd5ddc824607758e2bce85c4256c2689125b80a4_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-restic-restore-helper-rhel8@sha256:70d3d46f54b91538e047df62e7e5b161fabac195a2f2e45cdba78215b4c82a7d_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-rhel8@sha256:1ca6945c3918f1743a4cee86a507f9f6581c8f8e572b6b8739d79a675a64d1db_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-2879"
},
{
"category": "external",
"summary": "RHBZ#2132867",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2132867"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-2879",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2879"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-2879",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-2879"
},
{
"category": "external",
"summary": "https://github.com/golang/go/issues/54853",
"url": "https://github.com/golang/go/issues/54853"
},
{
"category": "external",
"summary": "https://github.com/vbatts/tar-split/releases/tag/v0.12.1",
"url": "https://github.com/vbatts/tar-split/releases/tag/v0.12.1"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/xtuG5faxtaU?pli=1",
"url": "https://groups.google.com/g/golang-announce/c/xtuG5faxtaU?pli=1"
}
],
"release_date": "2022-10-04T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-02-09T02:17:22+00:00",
"details": "For details on how to install and use MTC, refer to:\n\nhttps://docs.openshift.com/container-platform/latest/migration_toolkit_for_containers/installing-mtc.html",
"product_ids": [
"8Base-RHMTC-1.7:rhmtc/openshift-velero-plugin-rhel8@sha256:26f8fb5c41ece82626325ba502505ba1ca7986602cc147b492f9857caa0be868_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:0693"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"8Base-RHMTC-1.7:rhmtc/openshift-migration-controller-rhel8@sha256:362eb32d0d2607f72b4f425dabaea7cde5d292ac41aea0c18c78bc6e408fff9e_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-hook-runner-rhel8@sha256:aa63717ac3a4961e774ed0baa3a73f01eda185516e7380579d97b9d25764d10d_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-legacy-rhel8-operator@sha256:1ac9cdfbdce8f7b6e4ebf5e40013f766b71b6dd604c92f602aca96612a228eda_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-log-reader-rhel8@sha256:d89e9ef65993466d25b26702d0210c14ce191155501774f4d2f1f08dbdad9804_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-must-gather-rhel8@sha256:5acf34dc4041b694b452d46c2f656db566241773285ca305a79ab7b9dc087b43_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-openvpn-rhel8@sha256:15df7304827ce49d422554551f08d99cfffa1afc4ffacac145d4399ccb1cbd68_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-operator-bundle@sha256:90ed03a5e0cb0b0ffd85f7434cc4eda9bd8fe81cd90b597772d9b7caccd4b80f_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-registry-rhel8@sha256:aaa03ef0769d38185675db2a7a78454659de14bdebe5ff842614bf2124e5adfe_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-rhel8-operator@sha256:aaaf4f6095294b497889749390f0a3aac04b83131a423799c44b5e367e0b370a_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-rsync-transfer-rhel8@sha256:58bd4ffc3e9599401251ac929cf15c1773ecc03a57177118adbe23ac8d7762af_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-ui-rhel8@sha256:4141db5099ae659270297eb4aaff695ac43fce67d91fea49dbc76583f419d3a1_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-plugin-for-aws-rhel8@sha256:633eeb0b6b50e21bbc0fb12fd2262294733fc9ac8b1e9eedcdb9d1433534d88d_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-plugin-for-gcp-rhel8@sha256:19dbf2bb83f8a0f35079d6ae25f8fcddad970e48ecb21694fd2d4c553313e4aa_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-plugin-for-microsoft-azure-rhel8@sha256:93e95f065eadaa41154b9012dd5ddc824607758e2bce85c4256c2689125b80a4_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-restic-restore-helper-rhel8@sha256:70d3d46f54b91538e047df62e7e5b161fabac195a2f2e45cdba78215b4c82a7d_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-rhel8@sha256:1ca6945c3918f1743a4cee86a507f9f6581c8f8e572b6b8739d79a675a64d1db_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-velero-plugin-rhel8@sha256:26f8fb5c41ece82626325ba502505ba1ca7986602cc147b492f9857caa0be868_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "golang: archive/tar: github.com/vbatts/tar-split: unbounded memory consumption when reading headers"
},
{
"acknowledgments": [
{
"names": [
"Daniel Abeles"
],
"organization": "Head of Research, Oxeye"
},
{
"names": [
"Gal Goldstein"
],
"organization": "Security Researcher, Oxeye"
}
],
"cve": "CVE-2022-2880",
"cwe": {
"id": "CWE-444",
"name": "Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027)"
},
"discovery_date": "2022-10-07T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-RHMTC-1.7:rhmtc/openshift-migration-controller-rhel8@sha256:362eb32d0d2607f72b4f425dabaea7cde5d292ac41aea0c18c78bc6e408fff9e_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-hook-runner-rhel8@sha256:aa63717ac3a4961e774ed0baa3a73f01eda185516e7380579d97b9d25764d10d_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-legacy-rhel8-operator@sha256:1ac9cdfbdce8f7b6e4ebf5e40013f766b71b6dd604c92f602aca96612a228eda_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-log-reader-rhel8@sha256:d89e9ef65993466d25b26702d0210c14ce191155501774f4d2f1f08dbdad9804_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-must-gather-rhel8@sha256:5acf34dc4041b694b452d46c2f656db566241773285ca305a79ab7b9dc087b43_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-openvpn-rhel8@sha256:15df7304827ce49d422554551f08d99cfffa1afc4ffacac145d4399ccb1cbd68_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-operator-bundle@sha256:90ed03a5e0cb0b0ffd85f7434cc4eda9bd8fe81cd90b597772d9b7caccd4b80f_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-registry-rhel8@sha256:aaa03ef0769d38185675db2a7a78454659de14bdebe5ff842614bf2124e5adfe_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-rhel8-operator@sha256:aaaf4f6095294b497889749390f0a3aac04b83131a423799c44b5e367e0b370a_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-rsync-transfer-rhel8@sha256:58bd4ffc3e9599401251ac929cf15c1773ecc03a57177118adbe23ac8d7762af_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-ui-rhel8@sha256:4141db5099ae659270297eb4aaff695ac43fce67d91fea49dbc76583f419d3a1_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-plugin-for-aws-rhel8@sha256:633eeb0b6b50e21bbc0fb12fd2262294733fc9ac8b1e9eedcdb9d1433534d88d_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-plugin-for-gcp-rhel8@sha256:19dbf2bb83f8a0f35079d6ae25f8fcddad970e48ecb21694fd2d4c553313e4aa_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-plugin-for-microsoft-azure-rhel8@sha256:93e95f065eadaa41154b9012dd5ddc824607758e2bce85c4256c2689125b80a4_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-restic-restore-helper-rhel8@sha256:70d3d46f54b91538e047df62e7e5b161fabac195a2f2e45cdba78215b4c82a7d_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-rhel8@sha256:1ca6945c3918f1743a4cee86a507f9f6581c8f8e572b6b8739d79a675a64d1db_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2132868"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the golang package, where requests forwarded by reverse proxy include the raw query parameters from the inbound request, including unparseable parameters rejected by net/http. This issue could permit query parameter smuggling when a Go proxy forwards a parameter with an unparseable value. After the fix, the reverse proxy sanitizes the query parameters in the forwarded query when the outbound request\u0027s form field is set after the reverse proxy. The director function returns, indicating that the proxy has parsed the query parameters. Proxies that do not parse query parameters continue to forward the original query parameters unchanged.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: net/http/httputil: ReverseProxy should not forward unparseable query parameters",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The opportunity to exploit this vulnerability is limited to the Golang runtime. In the case of the OpenShift Container Platform, this would be restricted within each individual container. There are multiple layers of guide rails (Golang\u2019s Garbage Collector; OpenShift\u2019s resource constraints imposed at the container and cluster levels) which would require a malicious user to continue submitting attacks for there to be any enduring impact.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-RHMTC-1.7:rhmtc/openshift-velero-plugin-rhel8@sha256:26f8fb5c41ece82626325ba502505ba1ca7986602cc147b492f9857caa0be868_amd64"
],
"known_not_affected": [
"8Base-RHMTC-1.7:rhmtc/openshift-migration-controller-rhel8@sha256:362eb32d0d2607f72b4f425dabaea7cde5d292ac41aea0c18c78bc6e408fff9e_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-hook-runner-rhel8@sha256:aa63717ac3a4961e774ed0baa3a73f01eda185516e7380579d97b9d25764d10d_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-legacy-rhel8-operator@sha256:1ac9cdfbdce8f7b6e4ebf5e40013f766b71b6dd604c92f602aca96612a228eda_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-log-reader-rhel8@sha256:d89e9ef65993466d25b26702d0210c14ce191155501774f4d2f1f08dbdad9804_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-must-gather-rhel8@sha256:5acf34dc4041b694b452d46c2f656db566241773285ca305a79ab7b9dc087b43_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-openvpn-rhel8@sha256:15df7304827ce49d422554551f08d99cfffa1afc4ffacac145d4399ccb1cbd68_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-operator-bundle@sha256:90ed03a5e0cb0b0ffd85f7434cc4eda9bd8fe81cd90b597772d9b7caccd4b80f_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-registry-rhel8@sha256:aaa03ef0769d38185675db2a7a78454659de14bdebe5ff842614bf2124e5adfe_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-rhel8-operator@sha256:aaaf4f6095294b497889749390f0a3aac04b83131a423799c44b5e367e0b370a_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-rsync-transfer-rhel8@sha256:58bd4ffc3e9599401251ac929cf15c1773ecc03a57177118adbe23ac8d7762af_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-ui-rhel8@sha256:4141db5099ae659270297eb4aaff695ac43fce67d91fea49dbc76583f419d3a1_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-plugin-for-aws-rhel8@sha256:633eeb0b6b50e21bbc0fb12fd2262294733fc9ac8b1e9eedcdb9d1433534d88d_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-plugin-for-gcp-rhel8@sha256:19dbf2bb83f8a0f35079d6ae25f8fcddad970e48ecb21694fd2d4c553313e4aa_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-plugin-for-microsoft-azure-rhel8@sha256:93e95f065eadaa41154b9012dd5ddc824607758e2bce85c4256c2689125b80a4_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-restic-restore-helper-rhel8@sha256:70d3d46f54b91538e047df62e7e5b161fabac195a2f2e45cdba78215b4c82a7d_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-rhel8@sha256:1ca6945c3918f1743a4cee86a507f9f6581c8f8e572b6b8739d79a675a64d1db_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-2880"
},
{
"category": "external",
"summary": "RHBZ#2132868",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2132868"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-2880",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2880"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-2880",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-2880"
},
{
"category": "external",
"summary": "https://github.com/golang/go/issues/54663",
"url": "https://github.com/golang/go/issues/54663"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/xtuG5faxtaU?pli=1",
"url": "https://groups.google.com/g/golang-announce/c/xtuG5faxtaU?pli=1"
}
],
"release_date": "2022-10-04T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-02-09T02:17:22+00:00",
"details": "For details on how to install and use MTC, refer to:\n\nhttps://docs.openshift.com/container-platform/latest/migration_toolkit_for_containers/installing-mtc.html",
"product_ids": [
"8Base-RHMTC-1.7:rhmtc/openshift-velero-plugin-rhel8@sha256:26f8fb5c41ece82626325ba502505ba1ca7986602cc147b492f9857caa0be868_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:0693"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"8Base-RHMTC-1.7:rhmtc/openshift-migration-controller-rhel8@sha256:362eb32d0d2607f72b4f425dabaea7cde5d292ac41aea0c18c78bc6e408fff9e_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-hook-runner-rhel8@sha256:aa63717ac3a4961e774ed0baa3a73f01eda185516e7380579d97b9d25764d10d_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-legacy-rhel8-operator@sha256:1ac9cdfbdce8f7b6e4ebf5e40013f766b71b6dd604c92f602aca96612a228eda_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-log-reader-rhel8@sha256:d89e9ef65993466d25b26702d0210c14ce191155501774f4d2f1f08dbdad9804_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-must-gather-rhel8@sha256:5acf34dc4041b694b452d46c2f656db566241773285ca305a79ab7b9dc087b43_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-openvpn-rhel8@sha256:15df7304827ce49d422554551f08d99cfffa1afc4ffacac145d4399ccb1cbd68_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-operator-bundle@sha256:90ed03a5e0cb0b0ffd85f7434cc4eda9bd8fe81cd90b597772d9b7caccd4b80f_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-registry-rhel8@sha256:aaa03ef0769d38185675db2a7a78454659de14bdebe5ff842614bf2124e5adfe_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-rhel8-operator@sha256:aaaf4f6095294b497889749390f0a3aac04b83131a423799c44b5e367e0b370a_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-rsync-transfer-rhel8@sha256:58bd4ffc3e9599401251ac929cf15c1773ecc03a57177118adbe23ac8d7762af_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-ui-rhel8@sha256:4141db5099ae659270297eb4aaff695ac43fce67d91fea49dbc76583f419d3a1_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-plugin-for-aws-rhel8@sha256:633eeb0b6b50e21bbc0fb12fd2262294733fc9ac8b1e9eedcdb9d1433534d88d_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-plugin-for-gcp-rhel8@sha256:19dbf2bb83f8a0f35079d6ae25f8fcddad970e48ecb21694fd2d4c553313e4aa_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-plugin-for-microsoft-azure-rhel8@sha256:93e95f065eadaa41154b9012dd5ddc824607758e2bce85c4256c2689125b80a4_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-restic-restore-helper-rhel8@sha256:70d3d46f54b91538e047df62e7e5b161fabac195a2f2e45cdba78215b4c82a7d_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-rhel8@sha256:1ca6945c3918f1743a4cee86a507f9f6581c8f8e572b6b8739d79a675a64d1db_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-velero-plugin-rhel8@sha256:26f8fb5c41ece82626325ba502505ba1ca7986602cc147b492f9857caa0be868_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "golang: net/http/httputil: ReverseProxy should not forward unparseable query parameters"
},
{
"cve": "CVE-2022-27664",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"discovery_date": "2022-09-06T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-RHMTC-1.7:rhmtc/openshift-migration-controller-rhel8@sha256:362eb32d0d2607f72b4f425dabaea7cde5d292ac41aea0c18c78bc6e408fff9e_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-hook-runner-rhel8@sha256:aa63717ac3a4961e774ed0baa3a73f01eda185516e7380579d97b9d25764d10d_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-legacy-rhel8-operator@sha256:1ac9cdfbdce8f7b6e4ebf5e40013f766b71b6dd604c92f602aca96612a228eda_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-log-reader-rhel8@sha256:d89e9ef65993466d25b26702d0210c14ce191155501774f4d2f1f08dbdad9804_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-must-gather-rhel8@sha256:5acf34dc4041b694b452d46c2f656db566241773285ca305a79ab7b9dc087b43_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-operator-bundle@sha256:90ed03a5e0cb0b0ffd85f7434cc4eda9bd8fe81cd90b597772d9b7caccd4b80f_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-registry-rhel8@sha256:aaa03ef0769d38185675db2a7a78454659de14bdebe5ff842614bf2124e5adfe_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-rhel8-operator@sha256:aaaf4f6095294b497889749390f0a3aac04b83131a423799c44b5e367e0b370a_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-rsync-transfer-rhel8@sha256:58bd4ffc3e9599401251ac929cf15c1773ecc03a57177118adbe23ac8d7762af_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-ui-rhel8@sha256:4141db5099ae659270297eb4aaff695ac43fce67d91fea49dbc76583f419d3a1_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-plugin-for-aws-rhel8@sha256:633eeb0b6b50e21bbc0fb12fd2262294733fc9ac8b1e9eedcdb9d1433534d88d_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-plugin-for-gcp-rhel8@sha256:19dbf2bb83f8a0f35079d6ae25f8fcddad970e48ecb21694fd2d4c553313e4aa_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-plugin-for-microsoft-azure-rhel8@sha256:93e95f065eadaa41154b9012dd5ddc824607758e2bce85c4256c2689125b80a4_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-restic-restore-helper-rhel8@sha256:70d3d46f54b91538e047df62e7e5b161fabac195a2f2e45cdba78215b4c82a7d_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-rhel8@sha256:1ca6945c3918f1743a4cee86a507f9f6581c8f8e572b6b8739d79a675a64d1db_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2124669"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the golang package. In net/http in Go, attackers can cause a denial of service because an HTTP/2 connection can hang during closing if a fatal error preempts the shutdown.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: net/http: handle server errors after sending GOAWAY",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The opportunity for a Denial of Service is limited to the golang runtime. In the case of OpenShift Container Platform, this would be restricted within each individual container. There are multiple layers of guide rails (Golang\u2019s Garbage Collector; OpenShift\u2019s resource constraints imposed at the container and cluster levels) which would require a malicious user to continue submitting attacks for there to be any enduring impact. They would also need access to external server resources to be able to send a massive volume of requests to cause a significant impact on server operations.\n\nWithin regulated environments, a combination of the following controls acts as a significant barrier to successfully exploiting a CWE-400: Uncontrolled Resource Consumption vulnerability and therefore downgrades the severity of this particular CVE from Moderate to Low.\n\nRed Hat restricts access to all platform information by default, granting access only after successful hard token-based multi-factor authentication (MFA) and enforcing least privilege to ensure only authorized roles can execute or modify code. The environment employs malicious code protections, including IDS/IPS and antimalware tools to detect threats and monitor resource usage, helping prevent uncontrolled consumption that could lead to system failure. Additional safeguards, such as web application firewalls and load-balancing strategies, protect against resource exhaustion and performance degradation. Event logs are centrally collected, correlated, and analyzed to support monitoring, alerting, and retention, aiding in the detection of abnormal behavior and potential denial-of-service (DoS) conditions. Static code analysis and peer reviews enforce strong input validation and error handling, reducing the likelihood of input-based DoS attacks.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-RHMTC-1.7:rhmtc/openshift-migration-openvpn-rhel8@sha256:15df7304827ce49d422554551f08d99cfffa1afc4ffacac145d4399ccb1cbd68_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-velero-plugin-rhel8@sha256:26f8fb5c41ece82626325ba502505ba1ca7986602cc147b492f9857caa0be868_amd64"
],
"known_not_affected": [
"8Base-RHMTC-1.7:rhmtc/openshift-migration-controller-rhel8@sha256:362eb32d0d2607f72b4f425dabaea7cde5d292ac41aea0c18c78bc6e408fff9e_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-hook-runner-rhel8@sha256:aa63717ac3a4961e774ed0baa3a73f01eda185516e7380579d97b9d25764d10d_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-legacy-rhel8-operator@sha256:1ac9cdfbdce8f7b6e4ebf5e40013f766b71b6dd604c92f602aca96612a228eda_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-log-reader-rhel8@sha256:d89e9ef65993466d25b26702d0210c14ce191155501774f4d2f1f08dbdad9804_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-must-gather-rhel8@sha256:5acf34dc4041b694b452d46c2f656db566241773285ca305a79ab7b9dc087b43_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-operator-bundle@sha256:90ed03a5e0cb0b0ffd85f7434cc4eda9bd8fe81cd90b597772d9b7caccd4b80f_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-registry-rhel8@sha256:aaa03ef0769d38185675db2a7a78454659de14bdebe5ff842614bf2124e5adfe_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-rhel8-operator@sha256:aaaf4f6095294b497889749390f0a3aac04b83131a423799c44b5e367e0b370a_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-rsync-transfer-rhel8@sha256:58bd4ffc3e9599401251ac929cf15c1773ecc03a57177118adbe23ac8d7762af_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-ui-rhel8@sha256:4141db5099ae659270297eb4aaff695ac43fce67d91fea49dbc76583f419d3a1_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-plugin-for-aws-rhel8@sha256:633eeb0b6b50e21bbc0fb12fd2262294733fc9ac8b1e9eedcdb9d1433534d88d_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-plugin-for-gcp-rhel8@sha256:19dbf2bb83f8a0f35079d6ae25f8fcddad970e48ecb21694fd2d4c553313e4aa_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-plugin-for-microsoft-azure-rhel8@sha256:93e95f065eadaa41154b9012dd5ddc824607758e2bce85c4256c2689125b80a4_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-restic-restore-helper-rhel8@sha256:70d3d46f54b91538e047df62e7e5b161fabac195a2f2e45cdba78215b4c82a7d_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-rhel8@sha256:1ca6945c3918f1743a4cee86a507f9f6581c8f8e572b6b8739d79a675a64d1db_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-27664"
},
{
"category": "external",
"summary": "RHBZ#2124669",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2124669"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-27664",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27664"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-27664",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-27664"
},
{
"category": "external",
"summary": "https://go.dev/issue/54658",
"url": "https://go.dev/issue/54658"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/x49AQzIVX-s/m/0tgO0pjiBQAJ",
"url": "https://groups.google.com/g/golang-announce/c/x49AQzIVX-s/m/0tgO0pjiBQAJ"
}
],
"release_date": "2022-09-06T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-02-09T02:17:22+00:00",
"details": "For details on how to install and use MTC, refer to:\n\nhttps://docs.openshift.com/container-platform/latest/migration_toolkit_for_containers/installing-mtc.html",
"product_ids": [
"8Base-RHMTC-1.7:rhmtc/openshift-migration-openvpn-rhel8@sha256:15df7304827ce49d422554551f08d99cfffa1afc4ffacac145d4399ccb1cbd68_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-velero-plugin-rhel8@sha256:26f8fb5c41ece82626325ba502505ba1ca7986602cc147b492f9857caa0be868_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:0693"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"8Base-RHMTC-1.7:rhmtc/openshift-migration-controller-rhel8@sha256:362eb32d0d2607f72b4f425dabaea7cde5d292ac41aea0c18c78bc6e408fff9e_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-hook-runner-rhel8@sha256:aa63717ac3a4961e774ed0baa3a73f01eda185516e7380579d97b9d25764d10d_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-legacy-rhel8-operator@sha256:1ac9cdfbdce8f7b6e4ebf5e40013f766b71b6dd604c92f602aca96612a228eda_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-log-reader-rhel8@sha256:d89e9ef65993466d25b26702d0210c14ce191155501774f4d2f1f08dbdad9804_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-must-gather-rhel8@sha256:5acf34dc4041b694b452d46c2f656db566241773285ca305a79ab7b9dc087b43_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-openvpn-rhel8@sha256:15df7304827ce49d422554551f08d99cfffa1afc4ffacac145d4399ccb1cbd68_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-operator-bundle@sha256:90ed03a5e0cb0b0ffd85f7434cc4eda9bd8fe81cd90b597772d9b7caccd4b80f_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-registry-rhel8@sha256:aaa03ef0769d38185675db2a7a78454659de14bdebe5ff842614bf2124e5adfe_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-rhel8-operator@sha256:aaaf4f6095294b497889749390f0a3aac04b83131a423799c44b5e367e0b370a_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-rsync-transfer-rhel8@sha256:58bd4ffc3e9599401251ac929cf15c1773ecc03a57177118adbe23ac8d7762af_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-ui-rhel8@sha256:4141db5099ae659270297eb4aaff695ac43fce67d91fea49dbc76583f419d3a1_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-plugin-for-aws-rhel8@sha256:633eeb0b6b50e21bbc0fb12fd2262294733fc9ac8b1e9eedcdb9d1433534d88d_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-plugin-for-gcp-rhel8@sha256:19dbf2bb83f8a0f35079d6ae25f8fcddad970e48ecb21694fd2d4c553313e4aa_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-plugin-for-microsoft-azure-rhel8@sha256:93e95f065eadaa41154b9012dd5ddc824607758e2bce85c4256c2689125b80a4_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-restic-restore-helper-rhel8@sha256:70d3d46f54b91538e047df62e7e5b161fabac195a2f2e45cdba78215b4c82a7d_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-rhel8@sha256:1ca6945c3918f1743a4cee86a507f9f6581c8f8e572b6b8739d79a675a64d1db_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-velero-plugin-rhel8@sha256:26f8fb5c41ece82626325ba502505ba1ca7986602cc147b492f9857caa0be868_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "golang: net/http: handle server errors after sending GOAWAY"
},
{
"cve": "CVE-2022-32149",
"cwe": {
"id": "CWE-407",
"name": "Inefficient Algorithmic Complexity"
},
"discovery_date": "2022-10-12T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-RHMTC-1.7:rhmtc/openshift-migration-controller-rhel8@sha256:362eb32d0d2607f72b4f425dabaea7cde5d292ac41aea0c18c78bc6e408fff9e_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-hook-runner-rhel8@sha256:aa63717ac3a4961e774ed0baa3a73f01eda185516e7380579d97b9d25764d10d_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-legacy-rhel8-operator@sha256:1ac9cdfbdce8f7b6e4ebf5e40013f766b71b6dd604c92f602aca96612a228eda_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-log-reader-rhel8@sha256:d89e9ef65993466d25b26702d0210c14ce191155501774f4d2f1f08dbdad9804_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-must-gather-rhel8@sha256:5acf34dc4041b694b452d46c2f656db566241773285ca305a79ab7b9dc087b43_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-openvpn-rhel8@sha256:15df7304827ce49d422554551f08d99cfffa1afc4ffacac145d4399ccb1cbd68_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-operator-bundle@sha256:90ed03a5e0cb0b0ffd85f7434cc4eda9bd8fe81cd90b597772d9b7caccd4b80f_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-registry-rhel8@sha256:aaa03ef0769d38185675db2a7a78454659de14bdebe5ff842614bf2124e5adfe_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-rhel8-operator@sha256:aaaf4f6095294b497889749390f0a3aac04b83131a423799c44b5e367e0b370a_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-rsync-transfer-rhel8@sha256:58bd4ffc3e9599401251ac929cf15c1773ecc03a57177118adbe23ac8d7762af_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-ui-rhel8@sha256:4141db5099ae659270297eb4aaff695ac43fce67d91fea49dbc76583f419d3a1_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-plugin-for-aws-rhel8@sha256:633eeb0b6b50e21bbc0fb12fd2262294733fc9ac8b1e9eedcdb9d1433534d88d_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-plugin-for-gcp-rhel8@sha256:19dbf2bb83f8a0f35079d6ae25f8fcddad970e48ecb21694fd2d4c553313e4aa_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-plugin-for-microsoft-azure-rhel8@sha256:93e95f065eadaa41154b9012dd5ddc824607758e2bce85c4256c2689125b80a4_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-restic-restore-helper-rhel8@sha256:70d3d46f54b91538e047df62e7e5b161fabac195a2f2e45cdba78215b4c82a7d_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-velero-plugin-rhel8@sha256:26f8fb5c41ece82626325ba502505ba1ca7986602cc147b492f9857caa0be868_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2134010"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in the golang.org/x/text/language package. An attacker can craft an Accept-Language header which ParseAcceptLanguage will take significant time to parse. This issue leads to a denial of service, and can impact availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: golang.org/x/text/language: ParseAcceptLanguage takes a long time to parse complex tags",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "After careful analysis of the vulnerability Redhat is choosing to keep the vulnerability severity as moderate,the vulnerability exists in the ParseAcceptLanguage function of the golang text/language package,when an attacker could craft an unusually large accept header and due to the parser taking quadratic time complexity to finish, firstly the attacker would have to find a way smuggle an input to the parser and even then this would simply not result in a crash of any kind but more of resource hang which while can be unpleasant,does not equate to any real world damage.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-rhel8@sha256:1ca6945c3918f1743a4cee86a507f9f6581c8f8e572b6b8739d79a675a64d1db_amd64"
],
"known_not_affected": [
"8Base-RHMTC-1.7:rhmtc/openshift-migration-controller-rhel8@sha256:362eb32d0d2607f72b4f425dabaea7cde5d292ac41aea0c18c78bc6e408fff9e_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-hook-runner-rhel8@sha256:aa63717ac3a4961e774ed0baa3a73f01eda185516e7380579d97b9d25764d10d_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-legacy-rhel8-operator@sha256:1ac9cdfbdce8f7b6e4ebf5e40013f766b71b6dd604c92f602aca96612a228eda_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-log-reader-rhel8@sha256:d89e9ef65993466d25b26702d0210c14ce191155501774f4d2f1f08dbdad9804_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-must-gather-rhel8@sha256:5acf34dc4041b694b452d46c2f656db566241773285ca305a79ab7b9dc087b43_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-openvpn-rhel8@sha256:15df7304827ce49d422554551f08d99cfffa1afc4ffacac145d4399ccb1cbd68_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-operator-bundle@sha256:90ed03a5e0cb0b0ffd85f7434cc4eda9bd8fe81cd90b597772d9b7caccd4b80f_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-registry-rhel8@sha256:aaa03ef0769d38185675db2a7a78454659de14bdebe5ff842614bf2124e5adfe_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-rhel8-operator@sha256:aaaf4f6095294b497889749390f0a3aac04b83131a423799c44b5e367e0b370a_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-rsync-transfer-rhel8@sha256:58bd4ffc3e9599401251ac929cf15c1773ecc03a57177118adbe23ac8d7762af_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-ui-rhel8@sha256:4141db5099ae659270297eb4aaff695ac43fce67d91fea49dbc76583f419d3a1_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-plugin-for-aws-rhel8@sha256:633eeb0b6b50e21bbc0fb12fd2262294733fc9ac8b1e9eedcdb9d1433534d88d_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-plugin-for-gcp-rhel8@sha256:19dbf2bb83f8a0f35079d6ae25f8fcddad970e48ecb21694fd2d4c553313e4aa_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-plugin-for-microsoft-azure-rhel8@sha256:93e95f065eadaa41154b9012dd5ddc824607758e2bce85c4256c2689125b80a4_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-restic-restore-helper-rhel8@sha256:70d3d46f54b91538e047df62e7e5b161fabac195a2f2e45cdba78215b4c82a7d_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-velero-plugin-rhel8@sha256:26f8fb5c41ece82626325ba502505ba1ca7986602cc147b492f9857caa0be868_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-32149"
},
{
"category": "external",
"summary": "RHBZ#2134010",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2134010"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-32149",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32149"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-32149",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-32149"
},
{
"category": "external",
"summary": "https://go.dev/issue/56152",
"url": "https://go.dev/issue/56152"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-dev/c/qfPIly0X7aU",
"url": "https://groups.google.com/g/golang-dev/c/qfPIly0X7aU"
}
],
"release_date": "2022-10-11T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-02-09T02:17:22+00:00",
"details": "For details on how to install and use MTC, refer to:\n\nhttps://docs.openshift.com/container-platform/latest/migration_toolkit_for_containers/installing-mtc.html",
"product_ids": [
"8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-rhel8@sha256:1ca6945c3918f1743a4cee86a507f9f6581c8f8e572b6b8739d79a675a64d1db_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:0693"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"8Base-RHMTC-1.7:rhmtc/openshift-migration-controller-rhel8@sha256:362eb32d0d2607f72b4f425dabaea7cde5d292ac41aea0c18c78bc6e408fff9e_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-hook-runner-rhel8@sha256:aa63717ac3a4961e774ed0baa3a73f01eda185516e7380579d97b9d25764d10d_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-legacy-rhel8-operator@sha256:1ac9cdfbdce8f7b6e4ebf5e40013f766b71b6dd604c92f602aca96612a228eda_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-log-reader-rhel8@sha256:d89e9ef65993466d25b26702d0210c14ce191155501774f4d2f1f08dbdad9804_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-must-gather-rhel8@sha256:5acf34dc4041b694b452d46c2f656db566241773285ca305a79ab7b9dc087b43_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-openvpn-rhel8@sha256:15df7304827ce49d422554551f08d99cfffa1afc4ffacac145d4399ccb1cbd68_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-operator-bundle@sha256:90ed03a5e0cb0b0ffd85f7434cc4eda9bd8fe81cd90b597772d9b7caccd4b80f_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-registry-rhel8@sha256:aaa03ef0769d38185675db2a7a78454659de14bdebe5ff842614bf2124e5adfe_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-rhel8-operator@sha256:aaaf4f6095294b497889749390f0a3aac04b83131a423799c44b5e367e0b370a_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-rsync-transfer-rhel8@sha256:58bd4ffc3e9599401251ac929cf15c1773ecc03a57177118adbe23ac8d7762af_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-ui-rhel8@sha256:4141db5099ae659270297eb4aaff695ac43fce67d91fea49dbc76583f419d3a1_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-plugin-for-aws-rhel8@sha256:633eeb0b6b50e21bbc0fb12fd2262294733fc9ac8b1e9eedcdb9d1433534d88d_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-plugin-for-gcp-rhel8@sha256:19dbf2bb83f8a0f35079d6ae25f8fcddad970e48ecb21694fd2d4c553313e4aa_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-plugin-for-microsoft-azure-rhel8@sha256:93e95f065eadaa41154b9012dd5ddc824607758e2bce85c4256c2689125b80a4_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-restic-restore-helper-rhel8@sha256:70d3d46f54b91538e047df62e7e5b161fabac195a2f2e45cdba78215b4c82a7d_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-rhel8@sha256:1ca6945c3918f1743a4cee86a507f9f6581c8f8e572b6b8739d79a675a64d1db_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-velero-plugin-rhel8@sha256:26f8fb5c41ece82626325ba502505ba1ca7986602cc147b492f9857caa0be868_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "golang: golang.org/x/text/language: ParseAcceptLanguage takes a long time to parse complex tags"
},
{
"cve": "CVE-2022-32189",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"discovery_date": "2022-08-02T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-RHMTC-1.7:rhmtc/openshift-migration-controller-rhel8@sha256:362eb32d0d2607f72b4f425dabaea7cde5d292ac41aea0c18c78bc6e408fff9e_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-hook-runner-rhel8@sha256:aa63717ac3a4961e774ed0baa3a73f01eda185516e7380579d97b9d25764d10d_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-legacy-rhel8-operator@sha256:1ac9cdfbdce8f7b6e4ebf5e40013f766b71b6dd604c92f602aca96612a228eda_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-log-reader-rhel8@sha256:d89e9ef65993466d25b26702d0210c14ce191155501774f4d2f1f08dbdad9804_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-must-gather-rhel8@sha256:5acf34dc4041b694b452d46c2f656db566241773285ca305a79ab7b9dc087b43_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-openvpn-rhel8@sha256:15df7304827ce49d422554551f08d99cfffa1afc4ffacac145d4399ccb1cbd68_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-operator-bundle@sha256:90ed03a5e0cb0b0ffd85f7434cc4eda9bd8fe81cd90b597772d9b7caccd4b80f_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-registry-rhel8@sha256:aaa03ef0769d38185675db2a7a78454659de14bdebe5ff842614bf2124e5adfe_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-rhel8-operator@sha256:aaaf4f6095294b497889749390f0a3aac04b83131a423799c44b5e367e0b370a_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-rsync-transfer-rhel8@sha256:58bd4ffc3e9599401251ac929cf15c1773ecc03a57177118adbe23ac8d7762af_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-ui-rhel8@sha256:4141db5099ae659270297eb4aaff695ac43fce67d91fea49dbc76583f419d3a1_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-plugin-for-aws-rhel8@sha256:633eeb0b6b50e21bbc0fb12fd2262294733fc9ac8b1e9eedcdb9d1433534d88d_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-plugin-for-gcp-rhel8@sha256:19dbf2bb83f8a0f35079d6ae25f8fcddad970e48ecb21694fd2d4c553313e4aa_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-plugin-for-microsoft-azure-rhel8@sha256:93e95f065eadaa41154b9012dd5ddc824607758e2bce85c4256c2689125b80a4_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-restic-restore-helper-rhel8@sha256:70d3d46f54b91538e047df62e7e5b161fabac195a2f2e45cdba78215b4c82a7d_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-rhel8@sha256:1ca6945c3918f1743a4cee86a507f9f6581c8f8e572b6b8739d79a675a64d1db_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2113814"
}
],
"notes": [
{
"category": "description",
"text": "An uncontrolled resource consumption flaw was found in Golang math/big. A too-short encoded message can cause a panic in Float.GobDecode and Rat.GobDecode in math/big in Go, potentially allowing an attacker to create a denial of service, impacting availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: math/big: decoding big.Float and big.Rat types can panic if the encoded message is too short, potentially allowing a denial of service",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This flaw stems from a particular and specific method (GoBDecode) which isn\u0027t commonly used. There are few components within Red Hat offerings which call this function. In rare cases where this method is called, the component limits possible damage or it is not possible to be triggered by an attacker. For these combined reasons the impact has been downgraded to Low.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-RHMTC-1.7:rhmtc/openshift-velero-plugin-rhel8@sha256:26f8fb5c41ece82626325ba502505ba1ca7986602cc147b492f9857caa0be868_amd64"
],
"known_not_affected": [
"8Base-RHMTC-1.7:rhmtc/openshift-migration-controller-rhel8@sha256:362eb32d0d2607f72b4f425dabaea7cde5d292ac41aea0c18c78bc6e408fff9e_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-hook-runner-rhel8@sha256:aa63717ac3a4961e774ed0baa3a73f01eda185516e7380579d97b9d25764d10d_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-legacy-rhel8-operator@sha256:1ac9cdfbdce8f7b6e4ebf5e40013f766b71b6dd604c92f602aca96612a228eda_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-log-reader-rhel8@sha256:d89e9ef65993466d25b26702d0210c14ce191155501774f4d2f1f08dbdad9804_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-must-gather-rhel8@sha256:5acf34dc4041b694b452d46c2f656db566241773285ca305a79ab7b9dc087b43_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-openvpn-rhel8@sha256:15df7304827ce49d422554551f08d99cfffa1afc4ffacac145d4399ccb1cbd68_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-operator-bundle@sha256:90ed03a5e0cb0b0ffd85f7434cc4eda9bd8fe81cd90b597772d9b7caccd4b80f_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-registry-rhel8@sha256:aaa03ef0769d38185675db2a7a78454659de14bdebe5ff842614bf2124e5adfe_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-rhel8-operator@sha256:aaaf4f6095294b497889749390f0a3aac04b83131a423799c44b5e367e0b370a_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-rsync-transfer-rhel8@sha256:58bd4ffc3e9599401251ac929cf15c1773ecc03a57177118adbe23ac8d7762af_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-ui-rhel8@sha256:4141db5099ae659270297eb4aaff695ac43fce67d91fea49dbc76583f419d3a1_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-plugin-for-aws-rhel8@sha256:633eeb0b6b50e21bbc0fb12fd2262294733fc9ac8b1e9eedcdb9d1433534d88d_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-plugin-for-gcp-rhel8@sha256:19dbf2bb83f8a0f35079d6ae25f8fcddad970e48ecb21694fd2d4c553313e4aa_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-plugin-for-microsoft-azure-rhel8@sha256:93e95f065eadaa41154b9012dd5ddc824607758e2bce85c4256c2689125b80a4_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-restic-restore-helper-rhel8@sha256:70d3d46f54b91538e047df62e7e5b161fabac195a2f2e45cdba78215b4c82a7d_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-rhel8@sha256:1ca6945c3918f1743a4cee86a507f9f6581c8f8e572b6b8739d79a675a64d1db_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-32189"
},
{
"category": "external",
"summary": "RHBZ#2113814",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2113814"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-32189",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32189"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-32189",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-32189"
},
{
"category": "external",
"summary": "https://go.dev/issue/53871",
"url": "https://go.dev/issue/53871"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-nuts/c/DCFSyTGM0wU",
"url": "https://groups.google.com/g/golang-nuts/c/DCFSyTGM0wU"
}
],
"release_date": "2022-08-01T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-02-09T02:17:22+00:00",
"details": "For details on how to install and use MTC, refer to:\n\nhttps://docs.openshift.com/container-platform/latest/migration_toolkit_for_containers/installing-mtc.html",
"product_ids": [
"8Base-RHMTC-1.7:rhmtc/openshift-velero-plugin-rhel8@sha256:26f8fb5c41ece82626325ba502505ba1ca7986602cc147b492f9857caa0be868_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:0693"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"8Base-RHMTC-1.7:rhmtc/openshift-migration-controller-rhel8@sha256:362eb32d0d2607f72b4f425dabaea7cde5d292ac41aea0c18c78bc6e408fff9e_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-hook-runner-rhel8@sha256:aa63717ac3a4961e774ed0baa3a73f01eda185516e7380579d97b9d25764d10d_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-legacy-rhel8-operator@sha256:1ac9cdfbdce8f7b6e4ebf5e40013f766b71b6dd604c92f602aca96612a228eda_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-log-reader-rhel8@sha256:d89e9ef65993466d25b26702d0210c14ce191155501774f4d2f1f08dbdad9804_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-must-gather-rhel8@sha256:5acf34dc4041b694b452d46c2f656db566241773285ca305a79ab7b9dc087b43_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-openvpn-rhel8@sha256:15df7304827ce49d422554551f08d99cfffa1afc4ffacac145d4399ccb1cbd68_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-operator-bundle@sha256:90ed03a5e0cb0b0ffd85f7434cc4eda9bd8fe81cd90b597772d9b7caccd4b80f_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-registry-rhel8@sha256:aaa03ef0769d38185675db2a7a78454659de14bdebe5ff842614bf2124e5adfe_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-rhel8-operator@sha256:aaaf4f6095294b497889749390f0a3aac04b83131a423799c44b5e367e0b370a_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-rsync-transfer-rhel8@sha256:58bd4ffc3e9599401251ac929cf15c1773ecc03a57177118adbe23ac8d7762af_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-ui-rhel8@sha256:4141db5099ae659270297eb4aaff695ac43fce67d91fea49dbc76583f419d3a1_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-plugin-for-aws-rhel8@sha256:633eeb0b6b50e21bbc0fb12fd2262294733fc9ac8b1e9eedcdb9d1433534d88d_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-plugin-for-gcp-rhel8@sha256:19dbf2bb83f8a0f35079d6ae25f8fcddad970e48ecb21694fd2d4c553313e4aa_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-plugin-for-microsoft-azure-rhel8@sha256:93e95f065eadaa41154b9012dd5ddc824607758e2bce85c4256c2689125b80a4_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-restic-restore-helper-rhel8@sha256:70d3d46f54b91538e047df62e7e5b161fabac195a2f2e45cdba78215b4c82a7d_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-rhel8@sha256:1ca6945c3918f1743a4cee86a507f9f6581c8f8e572b6b8739d79a675a64d1db_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-velero-plugin-rhel8@sha256:26f8fb5c41ece82626325ba502505ba1ca7986602cc147b492f9857caa0be868_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"8Base-RHMTC-1.7:rhmtc/openshift-migration-controller-rhel8@sha256:362eb32d0d2607f72b4f425dabaea7cde5d292ac41aea0c18c78bc6e408fff9e_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-hook-runner-rhel8@sha256:aa63717ac3a4961e774ed0baa3a73f01eda185516e7380579d97b9d25764d10d_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-legacy-rhel8-operator@sha256:1ac9cdfbdce8f7b6e4ebf5e40013f766b71b6dd604c92f602aca96612a228eda_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-log-reader-rhel8@sha256:d89e9ef65993466d25b26702d0210c14ce191155501774f4d2f1f08dbdad9804_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-must-gather-rhel8@sha256:5acf34dc4041b694b452d46c2f656db566241773285ca305a79ab7b9dc087b43_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-openvpn-rhel8@sha256:15df7304827ce49d422554551f08d99cfffa1afc4ffacac145d4399ccb1cbd68_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-operator-bundle@sha256:90ed03a5e0cb0b0ffd85f7434cc4eda9bd8fe81cd90b597772d9b7caccd4b80f_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-registry-rhel8@sha256:aaa03ef0769d38185675db2a7a78454659de14bdebe5ff842614bf2124e5adfe_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-rhel8-operator@sha256:aaaf4f6095294b497889749390f0a3aac04b83131a423799c44b5e367e0b370a_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-rsync-transfer-rhel8@sha256:58bd4ffc3e9599401251ac929cf15c1773ecc03a57177118adbe23ac8d7762af_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-ui-rhel8@sha256:4141db5099ae659270297eb4aaff695ac43fce67d91fea49dbc76583f419d3a1_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-plugin-for-aws-rhel8@sha256:633eeb0b6b50e21bbc0fb12fd2262294733fc9ac8b1e9eedcdb9d1433534d88d_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-plugin-for-gcp-rhel8@sha256:19dbf2bb83f8a0f35079d6ae25f8fcddad970e48ecb21694fd2d4c553313e4aa_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-plugin-for-microsoft-azure-rhel8@sha256:93e95f065eadaa41154b9012dd5ddc824607758e2bce85c4256c2689125b80a4_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-restic-restore-helper-rhel8@sha256:70d3d46f54b91538e047df62e7e5b161fabac195a2f2e45cdba78215b4c82a7d_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-rhel8@sha256:1ca6945c3918f1743a4cee86a507f9f6581c8f8e572b6b8739d79a675a64d1db_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-velero-plugin-rhel8@sha256:26f8fb5c41ece82626325ba502505ba1ca7986602cc147b492f9857caa0be868_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "golang: math/big: decoding big.Float and big.Rat types can panic if the encoded message is too short, potentially allowing a denial of service"
},
{
"cve": "CVE-2022-32190",
"cwe": {
"id": "CWE-22",
"name": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)"
},
"discovery_date": "2022-09-06T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-RHMTC-1.7:rhmtc/openshift-migration-controller-rhel8@sha256:362eb32d0d2607f72b4f425dabaea7cde5d292ac41aea0c18c78bc6e408fff9e_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-hook-runner-rhel8@sha256:aa63717ac3a4961e774ed0baa3a73f01eda185516e7380579d97b9d25764d10d_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-legacy-rhel8-operator@sha256:1ac9cdfbdce8f7b6e4ebf5e40013f766b71b6dd604c92f602aca96612a228eda_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-log-reader-rhel8@sha256:d89e9ef65993466d25b26702d0210c14ce191155501774f4d2f1f08dbdad9804_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-must-gather-rhel8@sha256:5acf34dc4041b694b452d46c2f656db566241773285ca305a79ab7b9dc087b43_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-openvpn-rhel8@sha256:15df7304827ce49d422554551f08d99cfffa1afc4ffacac145d4399ccb1cbd68_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-operator-bundle@sha256:90ed03a5e0cb0b0ffd85f7434cc4eda9bd8fe81cd90b597772d9b7caccd4b80f_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-registry-rhel8@sha256:aaa03ef0769d38185675db2a7a78454659de14bdebe5ff842614bf2124e5adfe_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-rhel8-operator@sha256:aaaf4f6095294b497889749390f0a3aac04b83131a423799c44b5e367e0b370a_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-rsync-transfer-rhel8@sha256:58bd4ffc3e9599401251ac929cf15c1773ecc03a57177118adbe23ac8d7762af_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-ui-rhel8@sha256:4141db5099ae659270297eb4aaff695ac43fce67d91fea49dbc76583f419d3a1_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-plugin-for-aws-rhel8@sha256:633eeb0b6b50e21bbc0fb12fd2262294733fc9ac8b1e9eedcdb9d1433534d88d_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-plugin-for-gcp-rhel8@sha256:19dbf2bb83f8a0f35079d6ae25f8fcddad970e48ecb21694fd2d4c553313e4aa_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-plugin-for-microsoft-azure-rhel8@sha256:93e95f065eadaa41154b9012dd5ddc824607758e2bce85c4256c2689125b80a4_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-restic-restore-helper-rhel8@sha256:70d3d46f54b91538e047df62e7e5b161fabac195a2f2e45cdba78215b4c82a7d_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-rhel8@sha256:1ca6945c3918f1743a4cee86a507f9f6581c8f8e572b6b8739d79a675a64d1db_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2124668"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the golang package. The JoinPath doesn\u0027t remove the ../ path components appended to a domain that is not terminated by a slash, possibly leading to a directory traversal attack.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: net/url: JoinPath does not strip relative path components in all circumstances",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The vulnerable functions, JoinPath and URL.JoinPath was introduced in upstream go1.19, whereas, RHEL ships go1.17 and go1.18 versions, which does not contain the vulnerable code. Hence, packages shipped with RHEL-8, RHEL-9 are not affected.\n\nAll Y stream releases of OpenShift Container Platform 4 run on RHEL-8 or RHEL-9, so OCP 4 is also not affected.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-RHMTC-1.7:rhmtc/openshift-velero-plugin-rhel8@sha256:26f8fb5c41ece82626325ba502505ba1ca7986602cc147b492f9857caa0be868_amd64"
],
"known_not_affected": [
"8Base-RHMTC-1.7:rhmtc/openshift-migration-controller-rhel8@sha256:362eb32d0d2607f72b4f425dabaea7cde5d292ac41aea0c18c78bc6e408fff9e_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-hook-runner-rhel8@sha256:aa63717ac3a4961e774ed0baa3a73f01eda185516e7380579d97b9d25764d10d_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-legacy-rhel8-operator@sha256:1ac9cdfbdce8f7b6e4ebf5e40013f766b71b6dd604c92f602aca96612a228eda_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-log-reader-rhel8@sha256:d89e9ef65993466d25b26702d0210c14ce191155501774f4d2f1f08dbdad9804_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-must-gather-rhel8@sha256:5acf34dc4041b694b452d46c2f656db566241773285ca305a79ab7b9dc087b43_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-openvpn-rhel8@sha256:15df7304827ce49d422554551f08d99cfffa1afc4ffacac145d4399ccb1cbd68_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-operator-bundle@sha256:90ed03a5e0cb0b0ffd85f7434cc4eda9bd8fe81cd90b597772d9b7caccd4b80f_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-registry-rhel8@sha256:aaa03ef0769d38185675db2a7a78454659de14bdebe5ff842614bf2124e5adfe_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-rhel8-operator@sha256:aaaf4f6095294b497889749390f0a3aac04b83131a423799c44b5e367e0b370a_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-rsync-transfer-rhel8@sha256:58bd4ffc3e9599401251ac929cf15c1773ecc03a57177118adbe23ac8d7762af_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-ui-rhel8@sha256:4141db5099ae659270297eb4aaff695ac43fce67d91fea49dbc76583f419d3a1_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-plugin-for-aws-rhel8@sha256:633eeb0b6b50e21bbc0fb12fd2262294733fc9ac8b1e9eedcdb9d1433534d88d_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-plugin-for-gcp-rhel8@sha256:19dbf2bb83f8a0f35079d6ae25f8fcddad970e48ecb21694fd2d4c553313e4aa_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-plugin-for-microsoft-azure-rhel8@sha256:93e95f065eadaa41154b9012dd5ddc824607758e2bce85c4256c2689125b80a4_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-restic-restore-helper-rhel8@sha256:70d3d46f54b91538e047df62e7e5b161fabac195a2f2e45cdba78215b4c82a7d_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-rhel8@sha256:1ca6945c3918f1743a4cee86a507f9f6581c8f8e572b6b8739d79a675a64d1db_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-32190"
},
{
"category": "external",
"summary": "RHBZ#2124668",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2124668"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-32190",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32190"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-32190",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-32190"
},
{
"category": "external",
"summary": "https://go.dev/issue/54385",
"url": "https://go.dev/issue/54385"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/x49AQzIVX-s/m/0tgO0pjiBQAJ",
"url": "https://groups.google.com/g/golang-announce/c/x49AQzIVX-s/m/0tgO0pjiBQAJ"
}
],
"release_date": "2022-09-06T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-02-09T02:17:22+00:00",
"details": "For details on how to install and use MTC, refer to:\n\nhttps://docs.openshift.com/container-platform/latest/migration_toolkit_for_containers/installing-mtc.html",
"product_ids": [
"8Base-RHMTC-1.7:rhmtc/openshift-velero-plugin-rhel8@sha256:26f8fb5c41ece82626325ba502505ba1ca7986602cc147b492f9857caa0be868_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:0693"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"8Base-RHMTC-1.7:rhmtc/openshift-migration-controller-rhel8@sha256:362eb32d0d2607f72b4f425dabaea7cde5d292ac41aea0c18c78bc6e408fff9e_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-hook-runner-rhel8@sha256:aa63717ac3a4961e774ed0baa3a73f01eda185516e7380579d97b9d25764d10d_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-legacy-rhel8-operator@sha256:1ac9cdfbdce8f7b6e4ebf5e40013f766b71b6dd604c92f602aca96612a228eda_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-log-reader-rhel8@sha256:d89e9ef65993466d25b26702d0210c14ce191155501774f4d2f1f08dbdad9804_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-must-gather-rhel8@sha256:5acf34dc4041b694b452d46c2f656db566241773285ca305a79ab7b9dc087b43_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-openvpn-rhel8@sha256:15df7304827ce49d422554551f08d99cfffa1afc4ffacac145d4399ccb1cbd68_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-operator-bundle@sha256:90ed03a5e0cb0b0ffd85f7434cc4eda9bd8fe81cd90b597772d9b7caccd4b80f_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-registry-rhel8@sha256:aaa03ef0769d38185675db2a7a78454659de14bdebe5ff842614bf2124e5adfe_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-rhel8-operator@sha256:aaaf4f6095294b497889749390f0a3aac04b83131a423799c44b5e367e0b370a_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-rsync-transfer-rhel8@sha256:58bd4ffc3e9599401251ac929cf15c1773ecc03a57177118adbe23ac8d7762af_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-ui-rhel8@sha256:4141db5099ae659270297eb4aaff695ac43fce67d91fea49dbc76583f419d3a1_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-plugin-for-aws-rhel8@sha256:633eeb0b6b50e21bbc0fb12fd2262294733fc9ac8b1e9eedcdb9d1433534d88d_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-plugin-for-gcp-rhel8@sha256:19dbf2bb83f8a0f35079d6ae25f8fcddad970e48ecb21694fd2d4c553313e4aa_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-plugin-for-microsoft-azure-rhel8@sha256:93e95f065eadaa41154b9012dd5ddc824607758e2bce85c4256c2689125b80a4_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-restic-restore-helper-rhel8@sha256:70d3d46f54b91538e047df62e7e5b161fabac195a2f2e45cdba78215b4c82a7d_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-rhel8@sha256:1ca6945c3918f1743a4cee86a507f9f6581c8f8e572b6b8739d79a675a64d1db_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-velero-plugin-rhel8@sha256:26f8fb5c41ece82626325ba502505ba1ca7986602cc147b492f9857caa0be868_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "golang: net/url: JoinPath does not strip relative path components in all circumstances"
},
{
"acknowledgments": [
{
"names": [
"Adam Korczynski"
],
"organization": "ADA Logics"
},
{
"names": [
"OSS-Fuzz"
]
}
],
"cve": "CVE-2022-41715",
"discovery_date": "2022-10-07T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-RHMTC-1.7:rhmtc/openshift-migration-controller-rhel8@sha256:362eb32d0d2607f72b4f425dabaea7cde5d292ac41aea0c18c78bc6e408fff9e_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-hook-runner-rhel8@sha256:aa63717ac3a4961e774ed0baa3a73f01eda185516e7380579d97b9d25764d10d_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-legacy-rhel8-operator@sha256:1ac9cdfbdce8f7b6e4ebf5e40013f766b71b6dd604c92f602aca96612a228eda_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-log-reader-rhel8@sha256:d89e9ef65993466d25b26702d0210c14ce191155501774f4d2f1f08dbdad9804_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-must-gather-rhel8@sha256:5acf34dc4041b694b452d46c2f656db566241773285ca305a79ab7b9dc087b43_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-openvpn-rhel8@sha256:15df7304827ce49d422554551f08d99cfffa1afc4ffacac145d4399ccb1cbd68_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-operator-bundle@sha256:90ed03a5e0cb0b0ffd85f7434cc4eda9bd8fe81cd90b597772d9b7caccd4b80f_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-registry-rhel8@sha256:aaa03ef0769d38185675db2a7a78454659de14bdebe5ff842614bf2124e5adfe_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-rhel8-operator@sha256:aaaf4f6095294b497889749390f0a3aac04b83131a423799c44b5e367e0b370a_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-rsync-transfer-rhel8@sha256:58bd4ffc3e9599401251ac929cf15c1773ecc03a57177118adbe23ac8d7762af_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-ui-rhel8@sha256:4141db5099ae659270297eb4aaff695ac43fce67d91fea49dbc76583f419d3a1_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-plugin-for-aws-rhel8@sha256:633eeb0b6b50e21bbc0fb12fd2262294733fc9ac8b1e9eedcdb9d1433534d88d_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-plugin-for-gcp-rhel8@sha256:19dbf2bb83f8a0f35079d6ae25f8fcddad970e48ecb21694fd2d4c553313e4aa_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-plugin-for-microsoft-azure-rhel8@sha256:93e95f065eadaa41154b9012dd5ddc824607758e2bce85c4256c2689125b80a4_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-restic-restore-helper-rhel8@sha256:70d3d46f54b91538e047df62e7e5b161fabac195a2f2e45cdba78215b4c82a7d_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-rhel8@sha256:1ca6945c3918f1743a4cee86a507f9f6581c8f8e572b6b8739d79a675a64d1db_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2132872"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the golang package, where programs that compile regular expressions from untrusted sources are vulnerable to memory exhaustion or a denial of service. The parsed regexp representation is linear in the input size. Still, in some cases, the constant factor can be as high as 40,000, making a relatively small regexp consume larger amounts of memory. After the fix, each regexp being parsed is limited to a 256 MB memory footprint. Regular expressions whose representation would use more space than that are rejected. Routine use of regular expressions is unaffected.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: regexp/syntax: limit memory used by parsing regexps",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The opportunity for a Denial of Service is limited to the golang runtime. In the case of OpenShift Container Platform, this would be restricted within each individual container. There are multiple layers of guide rails (Golang\u2019s Garbage Collector; OpenShift\u2019s resource constraints imposed at the container and cluster levels) which would require a malicious user to continue submitting attacks for there to be any enduring impact. They would also need access to external server resources to be able to send a massive volume of requests to cause a significant impact on server operations.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-RHMTC-1.7:rhmtc/openshift-velero-plugin-rhel8@sha256:26f8fb5c41ece82626325ba502505ba1ca7986602cc147b492f9857caa0be868_amd64"
],
"known_not_affected": [
"8Base-RHMTC-1.7:rhmtc/openshift-migration-controller-rhel8@sha256:362eb32d0d2607f72b4f425dabaea7cde5d292ac41aea0c18c78bc6e408fff9e_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-hook-runner-rhel8@sha256:aa63717ac3a4961e774ed0baa3a73f01eda185516e7380579d97b9d25764d10d_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-legacy-rhel8-operator@sha256:1ac9cdfbdce8f7b6e4ebf5e40013f766b71b6dd604c92f602aca96612a228eda_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-log-reader-rhel8@sha256:d89e9ef65993466d25b26702d0210c14ce191155501774f4d2f1f08dbdad9804_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-must-gather-rhel8@sha256:5acf34dc4041b694b452d46c2f656db566241773285ca305a79ab7b9dc087b43_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-openvpn-rhel8@sha256:15df7304827ce49d422554551f08d99cfffa1afc4ffacac145d4399ccb1cbd68_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-operator-bundle@sha256:90ed03a5e0cb0b0ffd85f7434cc4eda9bd8fe81cd90b597772d9b7caccd4b80f_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-registry-rhel8@sha256:aaa03ef0769d38185675db2a7a78454659de14bdebe5ff842614bf2124e5adfe_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-rhel8-operator@sha256:aaaf4f6095294b497889749390f0a3aac04b83131a423799c44b5e367e0b370a_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-rsync-transfer-rhel8@sha256:58bd4ffc3e9599401251ac929cf15c1773ecc03a57177118adbe23ac8d7762af_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-ui-rhel8@sha256:4141db5099ae659270297eb4aaff695ac43fce67d91fea49dbc76583f419d3a1_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-plugin-for-aws-rhel8@sha256:633eeb0b6b50e21bbc0fb12fd2262294733fc9ac8b1e9eedcdb9d1433534d88d_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-plugin-for-gcp-rhel8@sha256:19dbf2bb83f8a0f35079d6ae25f8fcddad970e48ecb21694fd2d4c553313e4aa_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-plugin-for-microsoft-azure-rhel8@sha256:93e95f065eadaa41154b9012dd5ddc824607758e2bce85c4256c2689125b80a4_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-restic-restore-helper-rhel8@sha256:70d3d46f54b91538e047df62e7e5b161fabac195a2f2e45cdba78215b4c82a7d_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-rhel8@sha256:1ca6945c3918f1743a4cee86a507f9f6581c8f8e572b6b8739d79a675a64d1db_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-41715"
},
{
"category": "external",
"summary": "RHBZ#2132872",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2132872"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-41715",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41715"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-41715",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-41715"
},
{
"category": "external",
"summary": "https://github.com/golang/go/issues/55949",
"url": "https://github.com/golang/go/issues/55949"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/xtuG5faxtaU?pli=1",
"url": "https://groups.google.com/g/golang-announce/c/xtuG5faxtaU?pli=1"
}
],
"release_date": "2022-10-04T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-02-09T02:17:22+00:00",
"details": "For details on how to install and use MTC, refer to:\n\nhttps://docs.openshift.com/container-platform/latest/migration_toolkit_for_containers/installing-mtc.html",
"product_ids": [
"8Base-RHMTC-1.7:rhmtc/openshift-velero-plugin-rhel8@sha256:26f8fb5c41ece82626325ba502505ba1ca7986602cc147b492f9857caa0be868_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:0693"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"8Base-RHMTC-1.7:rhmtc/openshift-migration-controller-rhel8@sha256:362eb32d0d2607f72b4f425dabaea7cde5d292ac41aea0c18c78bc6e408fff9e_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-hook-runner-rhel8@sha256:aa63717ac3a4961e774ed0baa3a73f01eda185516e7380579d97b9d25764d10d_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-legacy-rhel8-operator@sha256:1ac9cdfbdce8f7b6e4ebf5e40013f766b71b6dd604c92f602aca96612a228eda_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-log-reader-rhel8@sha256:d89e9ef65993466d25b26702d0210c14ce191155501774f4d2f1f08dbdad9804_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-must-gather-rhel8@sha256:5acf34dc4041b694b452d46c2f656db566241773285ca305a79ab7b9dc087b43_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-openvpn-rhel8@sha256:15df7304827ce49d422554551f08d99cfffa1afc4ffacac145d4399ccb1cbd68_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-operator-bundle@sha256:90ed03a5e0cb0b0ffd85f7434cc4eda9bd8fe81cd90b597772d9b7caccd4b80f_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-registry-rhel8@sha256:aaa03ef0769d38185675db2a7a78454659de14bdebe5ff842614bf2124e5adfe_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-rhel8-operator@sha256:aaaf4f6095294b497889749390f0a3aac04b83131a423799c44b5e367e0b370a_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-rsync-transfer-rhel8@sha256:58bd4ffc3e9599401251ac929cf15c1773ecc03a57177118adbe23ac8d7762af_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-ui-rhel8@sha256:4141db5099ae659270297eb4aaff695ac43fce67d91fea49dbc76583f419d3a1_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-plugin-for-aws-rhel8@sha256:633eeb0b6b50e21bbc0fb12fd2262294733fc9ac8b1e9eedcdb9d1433534d88d_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-plugin-for-gcp-rhel8@sha256:19dbf2bb83f8a0f35079d6ae25f8fcddad970e48ecb21694fd2d4c553313e4aa_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-plugin-for-microsoft-azure-rhel8@sha256:93e95f065eadaa41154b9012dd5ddc824607758e2bce85c4256c2689125b80a4_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-restic-restore-helper-rhel8@sha256:70d3d46f54b91538e047df62e7e5b161fabac195a2f2e45cdba78215b4c82a7d_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-rhel8@sha256:1ca6945c3918f1743a4cee86a507f9f6581c8f8e572b6b8739d79a675a64d1db_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-velero-plugin-rhel8@sha256:26f8fb5c41ece82626325ba502505ba1ca7986602cc147b492f9857caa0be868_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "golang: regexp/syntax: limit memory used by parsing regexps"
},
{
"cve": "CVE-2022-41717",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"discovery_date": "2023-01-16T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-RHMTC-1.7:rhmtc/openshift-migration-hook-runner-rhel8@sha256:aa63717ac3a4961e774ed0baa3a73f01eda185516e7380579d97b9d25764d10d_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-legacy-rhel8-operator@sha256:1ac9cdfbdce8f7b6e4ebf5e40013f766b71b6dd604c92f602aca96612a228eda_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-log-reader-rhel8@sha256:d89e9ef65993466d25b26702d0210c14ce191155501774f4d2f1f08dbdad9804_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-openvpn-rhel8@sha256:15df7304827ce49d422554551f08d99cfffa1afc4ffacac145d4399ccb1cbd68_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-operator-bundle@sha256:90ed03a5e0cb0b0ffd85f7434cc4eda9bd8fe81cd90b597772d9b7caccd4b80f_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-rhel8-operator@sha256:aaaf4f6095294b497889749390f0a3aac04b83131a423799c44b5e367e0b370a_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-rsync-transfer-rhel8@sha256:58bd4ffc3e9599401251ac929cf15c1773ecc03a57177118adbe23ac8d7762af_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-ui-rhel8@sha256:4141db5099ae659270297eb4aaff695ac43fce67d91fea49dbc76583f419d3a1_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2161274"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the net/http library of the golang package. This flaw allows an attacker to cause excessive memory growth in a Go server accepting HTTP/2 requests. HTTP/2 server connections contain a cache of HTTP header keys sent by the client. While the total number of entries in this cache is capped, an attacker sending very large keys can cause the server to allocate approximately 64 MiB per open connection.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: net/http: excessive memory growth in a Go server accepting HTTP/2 requests",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Within Red Hat OpenShift Container Platform, the grafana container is listed as will not fix. Since OCP 4.10, Grafana itself is not shipped and the Grafana web server is protected behind an OAuth proxy server.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-RHMTC-1.7:rhmtc/openshift-migration-controller-rhel8@sha256:362eb32d0d2607f72b4f425dabaea7cde5d292ac41aea0c18c78bc6e408fff9e_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-must-gather-rhel8@sha256:5acf34dc4041b694b452d46c2f656db566241773285ca305a79ab7b9dc087b43_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-registry-rhel8@sha256:aaa03ef0769d38185675db2a7a78454659de14bdebe5ff842614bf2124e5adfe_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-plugin-for-aws-rhel8@sha256:633eeb0b6b50e21bbc0fb12fd2262294733fc9ac8b1e9eedcdb9d1433534d88d_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-plugin-for-gcp-rhel8@sha256:19dbf2bb83f8a0f35079d6ae25f8fcddad970e48ecb21694fd2d4c553313e4aa_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-plugin-for-microsoft-azure-rhel8@sha256:93e95f065eadaa41154b9012dd5ddc824607758e2bce85c4256c2689125b80a4_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-restic-restore-helper-rhel8@sha256:70d3d46f54b91538e047df62e7e5b161fabac195a2f2e45cdba78215b4c82a7d_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-rhel8@sha256:1ca6945c3918f1743a4cee86a507f9f6581c8f8e572b6b8739d79a675a64d1db_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-velero-plugin-rhel8@sha256:26f8fb5c41ece82626325ba502505ba1ca7986602cc147b492f9857caa0be868_amd64"
],
"known_not_affected": [
"8Base-RHMTC-1.7:rhmtc/openshift-migration-hook-runner-rhel8@sha256:aa63717ac3a4961e774ed0baa3a73f01eda185516e7380579d97b9d25764d10d_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-legacy-rhel8-operator@sha256:1ac9cdfbdce8f7b6e4ebf5e40013f766b71b6dd604c92f602aca96612a228eda_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-log-reader-rhel8@sha256:d89e9ef65993466d25b26702d0210c14ce191155501774f4d2f1f08dbdad9804_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-openvpn-rhel8@sha256:15df7304827ce49d422554551f08d99cfffa1afc4ffacac145d4399ccb1cbd68_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-operator-bundle@sha256:90ed03a5e0cb0b0ffd85f7434cc4eda9bd8fe81cd90b597772d9b7caccd4b80f_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-rhel8-operator@sha256:aaaf4f6095294b497889749390f0a3aac04b83131a423799c44b5e367e0b370a_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-rsync-transfer-rhel8@sha256:58bd4ffc3e9599401251ac929cf15c1773ecc03a57177118adbe23ac8d7762af_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-ui-rhel8@sha256:4141db5099ae659270297eb4aaff695ac43fce67d91fea49dbc76583f419d3a1_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-41717"
},
{
"category": "external",
"summary": "RHBZ#2161274",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2161274"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-41717",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41717"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-41717",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-41717"
},
{
"category": "external",
"summary": "https://go.dev/cl/455635",
"url": "https://go.dev/cl/455635"
},
{
"category": "external",
"summary": "https://go.dev/cl/455717",
"url": "https://go.dev/cl/455717"
},
{
"category": "external",
"summary": "https://go.dev/issue/56350",
"url": "https://go.dev/issue/56350"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/L_3rmdT0BMU/m/yZDrXjIiBQAJ",
"url": "https://groups.google.com/g/golang-announce/c/L_3rmdT0BMU/m/yZDrXjIiBQAJ"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2022-1144",
"url": "https://pkg.go.dev/vuln/GO-2022-1144"
}
],
"release_date": "2022-11-30T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-02-09T02:17:22+00:00",
"details": "For details on how to install and use MTC, refer to:\n\nhttps://docs.openshift.com/container-platform/latest/migration_toolkit_for_containers/installing-mtc.html",
"product_ids": [
"8Base-RHMTC-1.7:rhmtc/openshift-migration-controller-rhel8@sha256:362eb32d0d2607f72b4f425dabaea7cde5d292ac41aea0c18c78bc6e408fff9e_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-must-gather-rhel8@sha256:5acf34dc4041b694b452d46c2f656db566241773285ca305a79ab7b9dc087b43_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-registry-rhel8@sha256:aaa03ef0769d38185675db2a7a78454659de14bdebe5ff842614bf2124e5adfe_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-plugin-for-aws-rhel8@sha256:633eeb0b6b50e21bbc0fb12fd2262294733fc9ac8b1e9eedcdb9d1433534d88d_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-plugin-for-gcp-rhel8@sha256:19dbf2bb83f8a0f35079d6ae25f8fcddad970e48ecb21694fd2d4c553313e4aa_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-plugin-for-microsoft-azure-rhel8@sha256:93e95f065eadaa41154b9012dd5ddc824607758e2bce85c4256c2689125b80a4_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-restic-restore-helper-rhel8@sha256:70d3d46f54b91538e047df62e7e5b161fabac195a2f2e45cdba78215b4c82a7d_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-rhel8@sha256:1ca6945c3918f1743a4cee86a507f9f6581c8f8e572b6b8739d79a675a64d1db_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-velero-plugin-rhel8@sha256:26f8fb5c41ece82626325ba502505ba1ca7986602cc147b492f9857caa0be868_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:0693"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"8Base-RHMTC-1.7:rhmtc/openshift-migration-controller-rhel8@sha256:362eb32d0d2607f72b4f425dabaea7cde5d292ac41aea0c18c78bc6e408fff9e_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-hook-runner-rhel8@sha256:aa63717ac3a4961e774ed0baa3a73f01eda185516e7380579d97b9d25764d10d_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-legacy-rhel8-operator@sha256:1ac9cdfbdce8f7b6e4ebf5e40013f766b71b6dd604c92f602aca96612a228eda_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-log-reader-rhel8@sha256:d89e9ef65993466d25b26702d0210c14ce191155501774f4d2f1f08dbdad9804_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-must-gather-rhel8@sha256:5acf34dc4041b694b452d46c2f656db566241773285ca305a79ab7b9dc087b43_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-openvpn-rhel8@sha256:15df7304827ce49d422554551f08d99cfffa1afc4ffacac145d4399ccb1cbd68_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-operator-bundle@sha256:90ed03a5e0cb0b0ffd85f7434cc4eda9bd8fe81cd90b597772d9b7caccd4b80f_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-registry-rhel8@sha256:aaa03ef0769d38185675db2a7a78454659de14bdebe5ff842614bf2124e5adfe_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-rhel8-operator@sha256:aaaf4f6095294b497889749390f0a3aac04b83131a423799c44b5e367e0b370a_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-rsync-transfer-rhel8@sha256:58bd4ffc3e9599401251ac929cf15c1773ecc03a57177118adbe23ac8d7762af_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-ui-rhel8@sha256:4141db5099ae659270297eb4aaff695ac43fce67d91fea49dbc76583f419d3a1_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-plugin-for-aws-rhel8@sha256:633eeb0b6b50e21bbc0fb12fd2262294733fc9ac8b1e9eedcdb9d1433534d88d_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-plugin-for-gcp-rhel8@sha256:19dbf2bb83f8a0f35079d6ae25f8fcddad970e48ecb21694fd2d4c553313e4aa_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-plugin-for-microsoft-azure-rhel8@sha256:93e95f065eadaa41154b9012dd5ddc824607758e2bce85c4256c2689125b80a4_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-restic-restore-helper-rhel8@sha256:70d3d46f54b91538e047df62e7e5b161fabac195a2f2e45cdba78215b4c82a7d_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-rhel8@sha256:1ca6945c3918f1743a4cee86a507f9f6581c8f8e572b6b8739d79a675a64d1db_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-velero-plugin-rhel8@sha256:26f8fb5c41ece82626325ba502505ba1ca7986602cc147b492f9857caa0be868_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "golang: net/http: excessive memory growth in a Go server accepting HTTP/2 requests"
}
]
}
rhsa-2023:0795
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Submariner 0.13.3 packages that fix various bugs and add various enhancements that are now available for Red Hat Advanced Cluster Management for Kubernetes version 2.6\n\nRed Hat Product Security has rated this update as having a security impact\nof Moderate. A Common Vulnerability Scoring System (CVSS) base score,\nwhich gives a detailed severity rating, is available for each vulnerability\nfrom the CVE links in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Submariner enables direct networking between pods and services on different Kubernetes clusters that are either on-premises or in the cloud.\n\nFor more information about Submariner, see the Submariner open source community website at: https://submariner.io/.\n\nThis advisory contains bug fixes and enhancements to the Submariner container images.\n\nSecurity fixes:\n\n* CVE-2022-32149 golang: golang.org/x/text/language: ParseAcceptLanguage takes a long time to parse complex tags\n\nBugs addressed:\n\n* Build Submariner 0.13.3 (ACM-2226)\n* Verify Submariner with OCP 4.12 (ACM-2435)\n* Submariner does not support cluster \"kube-proxy ipvs mode\" (ACM-2821)",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2023:0795",
"url": "https://access.redhat.com/errata/RHSA-2023:0795"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#moderate",
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "2134010",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2134010"
},
{
"category": "external",
"summary": "ACM-2226",
"url": "https://issues.redhat.com/browse/ACM-2226"
},
{
"category": "external",
"summary": "ACM-2435",
"url": "https://issues.redhat.com/browse/ACM-2435"
},
{
"category": "external",
"summary": "ACM-2821",
"url": "https://issues.redhat.com/browse/ACM-2821"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2023/rhsa-2023_0795.json"
}
],
"title": "Red Hat Security Advisory: RHSA: Submariner 0.13.3 - security updates and bug fixes",
"tracking": {
"current_release_date": "2025-10-10T01:53:37+00:00",
"generator": {
"date": "2025-10-10T01:53:37+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.9"
}
},
"id": "RHSA-2023:0795",
"initial_release_date": "2023-02-15T21:46:51+00:00",
"revision_history": [
{
"date": "2023-02-15T21:46:51+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2023-02-15T21:46:51+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-10-10T01:53:37+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8",
"product": {
"name": "Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8",
"product_id": "8Base-RHACM-2.6",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:acm:2.6::el8"
}
}
}
],
"category": "product_family",
"name": "Red Hat ACM"
},
{
"branches": [
{
"category": "product_version",
"name": "rhacm2/lighthouse-agent-rhel8@sha256:44576acbfff4321af54d8a8c15b0122d28ffbec8b88ebbdd32ed2dca3d4397c3_arm64",
"product": {
"name": "rhacm2/lighthouse-agent-rhel8@sha256:44576acbfff4321af54d8a8c15b0122d28ffbec8b88ebbdd32ed2dca3d4397c3_arm64",
"product_id": "rhacm2/lighthouse-agent-rhel8@sha256:44576acbfff4321af54d8a8c15b0122d28ffbec8b88ebbdd32ed2dca3d4397c3_arm64",
"product_identification_helper": {
"purl": "pkg:oci/lighthouse-agent-rhel8@sha256:44576acbfff4321af54d8a8c15b0122d28ffbec8b88ebbdd32ed2dca3d4397c3?arch=arm64\u0026repository_url=registry.redhat.io/rhacm2/lighthouse-agent-rhel8\u0026tag=v0.13.3-7"
}
}
},
{
"category": "product_version",
"name": "rhacm2/lighthouse-coredns-rhel8@sha256:3e4d5bf90e110c3cf3e988f572d227575727bf1769c02d132272b5ff5051cfb8_arm64",
"product": {
"name": "rhacm2/lighthouse-coredns-rhel8@sha256:3e4d5bf90e110c3cf3e988f572d227575727bf1769c02d132272b5ff5051cfb8_arm64",
"product_id": "rhacm2/lighthouse-coredns-rhel8@sha256:3e4d5bf90e110c3cf3e988f572d227575727bf1769c02d132272b5ff5051cfb8_arm64",
"product_identification_helper": {
"purl": "pkg:oci/lighthouse-coredns-rhel8@sha256:3e4d5bf90e110c3cf3e988f572d227575727bf1769c02d132272b5ff5051cfb8?arch=arm64\u0026repository_url=registry.redhat.io/rhacm2/lighthouse-coredns-rhel8\u0026tag=v0.13.3-7"
}
}
},
{
"category": "product_version",
"name": "rhacm2/nettest-rhel8@sha256:a1197fa88e7cbaac9c4c80e13d39eda732d9ff09579d7d2e96a96bb5c005e695_arm64",
"product": {
"name": "rhacm2/nettest-rhel8@sha256:a1197fa88e7cbaac9c4c80e13d39eda732d9ff09579d7d2e96a96bb5c005e695_arm64",
"product_id": "rhacm2/nettest-rhel8@sha256:a1197fa88e7cbaac9c4c80e13d39eda732d9ff09579d7d2e96a96bb5c005e695_arm64",
"product_identification_helper": {
"purl": "pkg:oci/nettest-rhel8@sha256:a1197fa88e7cbaac9c4c80e13d39eda732d9ff09579d7d2e96a96bb5c005e695?arch=arm64\u0026repository_url=registry.redhat.io/rhacm2/nettest-rhel8\u0026tag=v0.13.3-7"
}
}
},
{
"category": "product_version",
"name": "rhacm2/subctl-rhel8@sha256:1f4051093fb1128e7266a4baff92bb7e9864825d51947265bed4ae7c20a3f99c_arm64",
"product": {
"name": "rhacm2/subctl-rhel8@sha256:1f4051093fb1128e7266a4baff92bb7e9864825d51947265bed4ae7c20a3f99c_arm64",
"product_id": "rhacm2/subctl-rhel8@sha256:1f4051093fb1128e7266a4baff92bb7e9864825d51947265bed4ae7c20a3f99c_arm64",
"product_identification_helper": {
"purl": "pkg:oci/subctl-rhel8@sha256:1f4051093fb1128e7266a4baff92bb7e9864825d51947265bed4ae7c20a3f99c?arch=arm64\u0026repository_url=registry.redhat.io/rhacm2/subctl-rhel8\u0026tag=v0.13.3-6"
}
}
},
{
"category": "product_version",
"name": "rhacm2/submariner-gateway-rhel8@sha256:5cd02e62ae81fea9887c484b4b4f52712b3cdfe0bff8a826e2c1c8e813df50bf_arm64",
"product": {
"name": "rhacm2/submariner-gateway-rhel8@sha256:5cd02e62ae81fea9887c484b4b4f52712b3cdfe0bff8a826e2c1c8e813df50bf_arm64",
"product_id": "rhacm2/submariner-gateway-rhel8@sha256:5cd02e62ae81fea9887c484b4b4f52712b3cdfe0bff8a826e2c1c8e813df50bf_arm64",
"product_identification_helper": {
"purl": "pkg:oci/submariner-gateway-rhel8@sha256:5cd02e62ae81fea9887c484b4b4f52712b3cdfe0bff8a826e2c1c8e813df50bf?arch=arm64\u0026repository_url=registry.redhat.io/rhacm2/submariner-gateway-rhel8\u0026tag=v0.13.3-6"
}
}
},
{
"category": "product_version",
"name": "rhacm2/submariner-globalnet-rhel8@sha256:dc50bdc2082127c9df0da5b539ac61d244250eb93d7fcfd3a9d2fdbb10603695_arm64",
"product": {
"name": "rhacm2/submariner-globalnet-rhel8@sha256:dc50bdc2082127c9df0da5b539ac61d244250eb93d7fcfd3a9d2fdbb10603695_arm64",
"product_id": "rhacm2/submariner-globalnet-rhel8@sha256:dc50bdc2082127c9df0da5b539ac61d244250eb93d7fcfd3a9d2fdbb10603695_arm64",
"product_identification_helper": {
"purl": "pkg:oci/submariner-globalnet-rhel8@sha256:dc50bdc2082127c9df0da5b539ac61d244250eb93d7fcfd3a9d2fdbb10603695?arch=arm64\u0026repository_url=registry.redhat.io/rhacm2/submariner-globalnet-rhel8\u0026tag=v0.13.3-7"
}
}
},
{
"category": "product_version",
"name": "rhacm2/submariner-networkplugin-syncer-rhel8@sha256:7076fac5d7944c7d4a0fa0e89629372466baf9fc5b4b8e5c31cc71b80fac9a69_arm64",
"product": {
"name": "rhacm2/submariner-networkplugin-syncer-rhel8@sha256:7076fac5d7944c7d4a0fa0e89629372466baf9fc5b4b8e5c31cc71b80fac9a69_arm64",
"product_id": "rhacm2/submariner-networkplugin-syncer-rhel8@sha256:7076fac5d7944c7d4a0fa0e89629372466baf9fc5b4b8e5c31cc71b80fac9a69_arm64",
"product_identification_helper": {
"purl": "pkg:oci/submariner-networkplugin-syncer-rhel8@sha256:7076fac5d7944c7d4a0fa0e89629372466baf9fc5b4b8e5c31cc71b80fac9a69?arch=arm64\u0026repository_url=registry.redhat.io/rhacm2/submariner-networkplugin-syncer-rhel8\u0026tag=v0.13.3-6"
}
}
},
{
"category": "product_version",
"name": "rhacm2/submariner-operator-bundle@sha256:7dacd7a2b26ee22f62851127de612e9c18696c7db4ed06a244ce635b12cb89e2_arm64",
"product": {
"name": "rhacm2/submariner-operator-bundle@sha256:7dacd7a2b26ee22f62851127de612e9c18696c7db4ed06a244ce635b12cb89e2_arm64",
"product_id": "rhacm2/submariner-operator-bundle@sha256:7dacd7a2b26ee22f62851127de612e9c18696c7db4ed06a244ce635b12cb89e2_arm64",
"product_identification_helper": {
"purl": "pkg:oci/submariner-operator-bundle@sha256:7dacd7a2b26ee22f62851127de612e9c18696c7db4ed06a244ce635b12cb89e2?arch=arm64\u0026repository_url=registry.redhat.io/rhacm2/submariner-operator-bundle\u0026tag=v0.13.3-9"
}
}
},
{
"category": "product_version",
"name": "rhacm2/submariner-rhel8-operator@sha256:db99ef3c89ac45501a7b7fc64c6f853df5f781b2200a758e71debc4dadaf2fef_arm64",
"product": {
"name": "rhacm2/submariner-rhel8-operator@sha256:db99ef3c89ac45501a7b7fc64c6f853df5f781b2200a758e71debc4dadaf2fef_arm64",
"product_id": "rhacm2/submariner-rhel8-operator@sha256:db99ef3c89ac45501a7b7fc64c6f853df5f781b2200a758e71debc4dadaf2fef_arm64",
"product_identification_helper": {
"purl": "pkg:oci/submariner-rhel8-operator@sha256:db99ef3c89ac45501a7b7fc64c6f853df5f781b2200a758e71debc4dadaf2fef?arch=arm64\u0026repository_url=registry.redhat.io/rhacm2/submariner-rhel8-operator\u0026tag=v0.13.3-6"
}
}
},
{
"category": "product_version",
"name": "rhacm2/submariner-route-agent-rhel8@sha256:007edcf9dd166ec8c1b30f60755bcfe02dee03c2d8e539fba06615b8a3eefd58_arm64",
"product": {
"name": "rhacm2/submariner-route-agent-rhel8@sha256:007edcf9dd166ec8c1b30f60755bcfe02dee03c2d8e539fba06615b8a3eefd58_arm64",
"product_id": "rhacm2/submariner-route-agent-rhel8@sha256:007edcf9dd166ec8c1b30f60755bcfe02dee03c2d8e539fba06615b8a3eefd58_arm64",
"product_identification_helper": {
"purl": "pkg:oci/submariner-route-agent-rhel8@sha256:007edcf9dd166ec8c1b30f60755bcfe02dee03c2d8e539fba06615b8a3eefd58?arch=arm64\u0026repository_url=registry.redhat.io/rhacm2/submariner-route-agent-rhel8\u0026tag=v0.13.3-7"
}
}
}
],
"category": "architecture",
"name": "arm64"
},
{
"branches": [
{
"category": "product_version",
"name": "rhacm2/lighthouse-agent-rhel8@sha256:c45d4a19f6492a1d2d72375c12d3dfc8a7a2349ccc8b581ad7df299bd63ae0a9_ppc64le",
"product": {
"name": "rhacm2/lighthouse-agent-rhel8@sha256:c45d4a19f6492a1d2d72375c12d3dfc8a7a2349ccc8b581ad7df299bd63ae0a9_ppc64le",
"product_id": "rhacm2/lighthouse-agent-rhel8@sha256:c45d4a19f6492a1d2d72375c12d3dfc8a7a2349ccc8b581ad7df299bd63ae0a9_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/lighthouse-agent-rhel8@sha256:c45d4a19f6492a1d2d72375c12d3dfc8a7a2349ccc8b581ad7df299bd63ae0a9?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/lighthouse-agent-rhel8\u0026tag=v0.13.3-7"
}
}
},
{
"category": "product_version",
"name": "rhacm2/lighthouse-coredns-rhel8@sha256:a842e4824cd39bc438c38889896dd33372b644968b5e29b614c9529b2e0696cc_ppc64le",
"product": {
"name": "rhacm2/lighthouse-coredns-rhel8@sha256:a842e4824cd39bc438c38889896dd33372b644968b5e29b614c9529b2e0696cc_ppc64le",
"product_id": "rhacm2/lighthouse-coredns-rhel8@sha256:a842e4824cd39bc438c38889896dd33372b644968b5e29b614c9529b2e0696cc_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/lighthouse-coredns-rhel8@sha256:a842e4824cd39bc438c38889896dd33372b644968b5e29b614c9529b2e0696cc?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/lighthouse-coredns-rhel8\u0026tag=v0.13.3-7"
}
}
},
{
"category": "product_version",
"name": "rhacm2/nettest-rhel8@sha256:623848329900b7fe55763dd08bacb5fde147f0b9e8b77487f1b99a8b713d309e_ppc64le",
"product": {
"name": "rhacm2/nettest-rhel8@sha256:623848329900b7fe55763dd08bacb5fde147f0b9e8b77487f1b99a8b713d309e_ppc64le",
"product_id": "rhacm2/nettest-rhel8@sha256:623848329900b7fe55763dd08bacb5fde147f0b9e8b77487f1b99a8b713d309e_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/nettest-rhel8@sha256:623848329900b7fe55763dd08bacb5fde147f0b9e8b77487f1b99a8b713d309e?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/nettest-rhel8\u0026tag=v0.13.3-7"
}
}
},
{
"category": "product_version",
"name": "rhacm2/subctl-rhel8@sha256:2e17954946ea1fd3ec53791a1b6dfdfb59be7c24fd78816b0ba721c069350c38_ppc64le",
"product": {
"name": "rhacm2/subctl-rhel8@sha256:2e17954946ea1fd3ec53791a1b6dfdfb59be7c24fd78816b0ba721c069350c38_ppc64le",
"product_id": "rhacm2/subctl-rhel8@sha256:2e17954946ea1fd3ec53791a1b6dfdfb59be7c24fd78816b0ba721c069350c38_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/subctl-rhel8@sha256:2e17954946ea1fd3ec53791a1b6dfdfb59be7c24fd78816b0ba721c069350c38?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/subctl-rhel8\u0026tag=v0.13.3-6"
}
}
},
{
"category": "product_version",
"name": "rhacm2/submariner-gateway-rhel8@sha256:1abe2013043c37997233ed7d8785c4607be1f21ed25f130f2141f8a771f0e9d5_ppc64le",
"product": {
"name": "rhacm2/submariner-gateway-rhel8@sha256:1abe2013043c37997233ed7d8785c4607be1f21ed25f130f2141f8a771f0e9d5_ppc64le",
"product_id": "rhacm2/submariner-gateway-rhel8@sha256:1abe2013043c37997233ed7d8785c4607be1f21ed25f130f2141f8a771f0e9d5_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/submariner-gateway-rhel8@sha256:1abe2013043c37997233ed7d8785c4607be1f21ed25f130f2141f8a771f0e9d5?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/submariner-gateway-rhel8\u0026tag=v0.13.3-6"
}
}
},
{
"category": "product_version",
"name": "rhacm2/submariner-globalnet-rhel8@sha256:4ee144a663c95a2fcc1fbfc0b308cf7033a5ded97a28a5aec9f35250df812661_ppc64le",
"product": {
"name": "rhacm2/submariner-globalnet-rhel8@sha256:4ee144a663c95a2fcc1fbfc0b308cf7033a5ded97a28a5aec9f35250df812661_ppc64le",
"product_id": "rhacm2/submariner-globalnet-rhel8@sha256:4ee144a663c95a2fcc1fbfc0b308cf7033a5ded97a28a5aec9f35250df812661_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/submariner-globalnet-rhel8@sha256:4ee144a663c95a2fcc1fbfc0b308cf7033a5ded97a28a5aec9f35250df812661?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/submariner-globalnet-rhel8\u0026tag=v0.13.3-7"
}
}
},
{
"category": "product_version",
"name": "rhacm2/submariner-networkplugin-syncer-rhel8@sha256:1ef8557fc7489a74092c22e5cf96ebbec1575f72177534de2ae095ab96927a5a_ppc64le",
"product": {
"name": "rhacm2/submariner-networkplugin-syncer-rhel8@sha256:1ef8557fc7489a74092c22e5cf96ebbec1575f72177534de2ae095ab96927a5a_ppc64le",
"product_id": "rhacm2/submariner-networkplugin-syncer-rhel8@sha256:1ef8557fc7489a74092c22e5cf96ebbec1575f72177534de2ae095ab96927a5a_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/submariner-networkplugin-syncer-rhel8@sha256:1ef8557fc7489a74092c22e5cf96ebbec1575f72177534de2ae095ab96927a5a?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/submariner-networkplugin-syncer-rhel8\u0026tag=v0.13.3-6"
}
}
},
{
"category": "product_version",
"name": "rhacm2/submariner-operator-bundle@sha256:1e3de5b269f4454e822201ea7666bacab9c2962f454368b1967dd583cab5c9bc_ppc64le",
"product": {
"name": "rhacm2/submariner-operator-bundle@sha256:1e3de5b269f4454e822201ea7666bacab9c2962f454368b1967dd583cab5c9bc_ppc64le",
"product_id": "rhacm2/submariner-operator-bundle@sha256:1e3de5b269f4454e822201ea7666bacab9c2962f454368b1967dd583cab5c9bc_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/submariner-operator-bundle@sha256:1e3de5b269f4454e822201ea7666bacab9c2962f454368b1967dd583cab5c9bc?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/submariner-operator-bundle\u0026tag=v0.13.3-9"
}
}
},
{
"category": "product_version",
"name": "rhacm2/submariner-rhel8-operator@sha256:e54bed5d1233969accf57b3b11f4d934040d7d408440d900d071f8919b60affa_ppc64le",
"product": {
"name": "rhacm2/submariner-rhel8-operator@sha256:e54bed5d1233969accf57b3b11f4d934040d7d408440d900d071f8919b60affa_ppc64le",
"product_id": "rhacm2/submariner-rhel8-operator@sha256:e54bed5d1233969accf57b3b11f4d934040d7d408440d900d071f8919b60affa_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/submariner-rhel8-operator@sha256:e54bed5d1233969accf57b3b11f4d934040d7d408440d900d071f8919b60affa?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/submariner-rhel8-operator\u0026tag=v0.13.3-6"
}
}
},
{
"category": "product_version",
"name": "rhacm2/submariner-route-agent-rhel8@sha256:a08eecb9e361d8466db2adeafdf203fdc199a9d269910741909f73c341b28f4a_ppc64le",
"product": {
"name": "rhacm2/submariner-route-agent-rhel8@sha256:a08eecb9e361d8466db2adeafdf203fdc199a9d269910741909f73c341b28f4a_ppc64le",
"product_id": "rhacm2/submariner-route-agent-rhel8@sha256:a08eecb9e361d8466db2adeafdf203fdc199a9d269910741909f73c341b28f4a_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/submariner-route-agent-rhel8@sha256:a08eecb9e361d8466db2adeafdf203fdc199a9d269910741909f73c341b28f4a?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/submariner-route-agent-rhel8\u0026tag=v0.13.3-7"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "rhacm2/lighthouse-agent-rhel8@sha256:fde7510f372c447d265b01dcd0e36c7e53f0be4ab109b3d4a81b3dd857d3a127_s390x",
"product": {
"name": "rhacm2/lighthouse-agent-rhel8@sha256:fde7510f372c447d265b01dcd0e36c7e53f0be4ab109b3d4a81b3dd857d3a127_s390x",
"product_id": "rhacm2/lighthouse-agent-rhel8@sha256:fde7510f372c447d265b01dcd0e36c7e53f0be4ab109b3d4a81b3dd857d3a127_s390x",
"product_identification_helper": {
"purl": "pkg:oci/lighthouse-agent-rhel8@sha256:fde7510f372c447d265b01dcd0e36c7e53f0be4ab109b3d4a81b3dd857d3a127?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/lighthouse-agent-rhel8\u0026tag=v0.13.3-7"
}
}
},
{
"category": "product_version",
"name": "rhacm2/lighthouse-coredns-rhel8@sha256:e90e99636dce63fdc6323203694eac2aea9d7e2a0578ed444fce67144838b7ca_s390x",
"product": {
"name": "rhacm2/lighthouse-coredns-rhel8@sha256:e90e99636dce63fdc6323203694eac2aea9d7e2a0578ed444fce67144838b7ca_s390x",
"product_id": "rhacm2/lighthouse-coredns-rhel8@sha256:e90e99636dce63fdc6323203694eac2aea9d7e2a0578ed444fce67144838b7ca_s390x",
"product_identification_helper": {
"purl": "pkg:oci/lighthouse-coredns-rhel8@sha256:e90e99636dce63fdc6323203694eac2aea9d7e2a0578ed444fce67144838b7ca?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/lighthouse-coredns-rhel8\u0026tag=v0.13.3-7"
}
}
},
{
"category": "product_version",
"name": "rhacm2/nettest-rhel8@sha256:84cb8594ccf7876483cee84195d704d34721f566e6a36070f7eecaca10fb2c88_s390x",
"product": {
"name": "rhacm2/nettest-rhel8@sha256:84cb8594ccf7876483cee84195d704d34721f566e6a36070f7eecaca10fb2c88_s390x",
"product_id": "rhacm2/nettest-rhel8@sha256:84cb8594ccf7876483cee84195d704d34721f566e6a36070f7eecaca10fb2c88_s390x",
"product_identification_helper": {
"purl": "pkg:oci/nettest-rhel8@sha256:84cb8594ccf7876483cee84195d704d34721f566e6a36070f7eecaca10fb2c88?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/nettest-rhel8\u0026tag=v0.13.3-7"
}
}
},
{
"category": "product_version",
"name": "rhacm2/subctl-rhel8@sha256:18b4fa76cfef84236c8453eb0cd6b1c67d1017732fa1d5722931d8616c365cfe_s390x",
"product": {
"name": "rhacm2/subctl-rhel8@sha256:18b4fa76cfef84236c8453eb0cd6b1c67d1017732fa1d5722931d8616c365cfe_s390x",
"product_id": "rhacm2/subctl-rhel8@sha256:18b4fa76cfef84236c8453eb0cd6b1c67d1017732fa1d5722931d8616c365cfe_s390x",
"product_identification_helper": {
"purl": "pkg:oci/subctl-rhel8@sha256:18b4fa76cfef84236c8453eb0cd6b1c67d1017732fa1d5722931d8616c365cfe?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/subctl-rhel8\u0026tag=v0.13.3-6"
}
}
},
{
"category": "product_version",
"name": "rhacm2/submariner-gateway-rhel8@sha256:5100f65e2591023eb9da4512b464c49bbf7f56d1a78587e5da790d6cb52cfd7c_s390x",
"product": {
"name": "rhacm2/submariner-gateway-rhel8@sha256:5100f65e2591023eb9da4512b464c49bbf7f56d1a78587e5da790d6cb52cfd7c_s390x",
"product_id": "rhacm2/submariner-gateway-rhel8@sha256:5100f65e2591023eb9da4512b464c49bbf7f56d1a78587e5da790d6cb52cfd7c_s390x",
"product_identification_helper": {
"purl": "pkg:oci/submariner-gateway-rhel8@sha256:5100f65e2591023eb9da4512b464c49bbf7f56d1a78587e5da790d6cb52cfd7c?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/submariner-gateway-rhel8\u0026tag=v0.13.3-6"
}
}
},
{
"category": "product_version",
"name": "rhacm2/submariner-globalnet-rhel8@sha256:fb728331ee01f6fb72a54b5c5b5886ec08f014a384c1b49beec692439ec59630_s390x",
"product": {
"name": "rhacm2/submariner-globalnet-rhel8@sha256:fb728331ee01f6fb72a54b5c5b5886ec08f014a384c1b49beec692439ec59630_s390x",
"product_id": "rhacm2/submariner-globalnet-rhel8@sha256:fb728331ee01f6fb72a54b5c5b5886ec08f014a384c1b49beec692439ec59630_s390x",
"product_identification_helper": {
"purl": "pkg:oci/submariner-globalnet-rhel8@sha256:fb728331ee01f6fb72a54b5c5b5886ec08f014a384c1b49beec692439ec59630?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/submariner-globalnet-rhel8\u0026tag=v0.13.3-7"
}
}
},
{
"category": "product_version",
"name": "rhacm2/submariner-networkplugin-syncer-rhel8@sha256:50281b32dc626b66b8b38bc3fa97d799ab13b66029768e60c06d3fa5d9a29bf1_s390x",
"product": {
"name": "rhacm2/submariner-networkplugin-syncer-rhel8@sha256:50281b32dc626b66b8b38bc3fa97d799ab13b66029768e60c06d3fa5d9a29bf1_s390x",
"product_id": "rhacm2/submariner-networkplugin-syncer-rhel8@sha256:50281b32dc626b66b8b38bc3fa97d799ab13b66029768e60c06d3fa5d9a29bf1_s390x",
"product_identification_helper": {
"purl": "pkg:oci/submariner-networkplugin-syncer-rhel8@sha256:50281b32dc626b66b8b38bc3fa97d799ab13b66029768e60c06d3fa5d9a29bf1?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/submariner-networkplugin-syncer-rhel8\u0026tag=v0.13.3-6"
}
}
},
{
"category": "product_version",
"name": "rhacm2/submariner-operator-bundle@sha256:2d28ae6efe8ba1999f5ae960cc1799465188b03514697c0192be53c4a7d1e8f2_s390x",
"product": {
"name": "rhacm2/submariner-operator-bundle@sha256:2d28ae6efe8ba1999f5ae960cc1799465188b03514697c0192be53c4a7d1e8f2_s390x",
"product_id": "rhacm2/submariner-operator-bundle@sha256:2d28ae6efe8ba1999f5ae960cc1799465188b03514697c0192be53c4a7d1e8f2_s390x",
"product_identification_helper": {
"purl": "pkg:oci/submariner-operator-bundle@sha256:2d28ae6efe8ba1999f5ae960cc1799465188b03514697c0192be53c4a7d1e8f2?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/submariner-operator-bundle\u0026tag=v0.13.3-9"
}
}
},
{
"category": "product_version",
"name": "rhacm2/submariner-rhel8-operator@sha256:fc6f14a4af741d3de8c0de1859fc0925d66673b5b7ced139b758b51a52307c5a_s390x",
"product": {
"name": "rhacm2/submariner-rhel8-operator@sha256:fc6f14a4af741d3de8c0de1859fc0925d66673b5b7ced139b758b51a52307c5a_s390x",
"product_id": "rhacm2/submariner-rhel8-operator@sha256:fc6f14a4af741d3de8c0de1859fc0925d66673b5b7ced139b758b51a52307c5a_s390x",
"product_identification_helper": {
"purl": "pkg:oci/submariner-rhel8-operator@sha256:fc6f14a4af741d3de8c0de1859fc0925d66673b5b7ced139b758b51a52307c5a?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/submariner-rhel8-operator\u0026tag=v0.13.3-6"
}
}
},
{
"category": "product_version",
"name": "rhacm2/submariner-route-agent-rhel8@sha256:0b40af2abd40a0d9220fd7311770cbbf0dddbc58b5347399c13fa92dae8dc2be_s390x",
"product": {
"name": "rhacm2/submariner-route-agent-rhel8@sha256:0b40af2abd40a0d9220fd7311770cbbf0dddbc58b5347399c13fa92dae8dc2be_s390x",
"product_id": "rhacm2/submariner-route-agent-rhel8@sha256:0b40af2abd40a0d9220fd7311770cbbf0dddbc58b5347399c13fa92dae8dc2be_s390x",
"product_identification_helper": {
"purl": "pkg:oci/submariner-route-agent-rhel8@sha256:0b40af2abd40a0d9220fd7311770cbbf0dddbc58b5347399c13fa92dae8dc2be?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/submariner-route-agent-rhel8\u0026tag=v0.13.3-7"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "rhacm2/lighthouse-agent-rhel8@sha256:6f8f3c288619a58ac723cde85df5232efac7f5ccfd516cb3996b35304d11e7f5_amd64",
"product": {
"name": "rhacm2/lighthouse-agent-rhel8@sha256:6f8f3c288619a58ac723cde85df5232efac7f5ccfd516cb3996b35304d11e7f5_amd64",
"product_id": "rhacm2/lighthouse-agent-rhel8@sha256:6f8f3c288619a58ac723cde85df5232efac7f5ccfd516cb3996b35304d11e7f5_amd64",
"product_identification_helper": {
"purl": "pkg:oci/lighthouse-agent-rhel8@sha256:6f8f3c288619a58ac723cde85df5232efac7f5ccfd516cb3996b35304d11e7f5?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/lighthouse-agent-rhel8\u0026tag=v0.13.3-7"
}
}
},
{
"category": "product_version",
"name": "rhacm2/lighthouse-coredns-rhel8@sha256:3ee425b4f78fe809d50967ae7c66af42c894a1fec5ef194d17eae9fdf5902913_amd64",
"product": {
"name": "rhacm2/lighthouse-coredns-rhel8@sha256:3ee425b4f78fe809d50967ae7c66af42c894a1fec5ef194d17eae9fdf5902913_amd64",
"product_id": "rhacm2/lighthouse-coredns-rhel8@sha256:3ee425b4f78fe809d50967ae7c66af42c894a1fec5ef194d17eae9fdf5902913_amd64",
"product_identification_helper": {
"purl": "pkg:oci/lighthouse-coredns-rhel8@sha256:3ee425b4f78fe809d50967ae7c66af42c894a1fec5ef194d17eae9fdf5902913?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/lighthouse-coredns-rhel8\u0026tag=v0.13.3-7"
}
}
},
{
"category": "product_version",
"name": "rhacm2/nettest-rhel8@sha256:b674ef3a8a7e20b085ceeb9be1f536e0bc0f94dec384e88569105c865fdae224_amd64",
"product": {
"name": "rhacm2/nettest-rhel8@sha256:b674ef3a8a7e20b085ceeb9be1f536e0bc0f94dec384e88569105c865fdae224_amd64",
"product_id": "rhacm2/nettest-rhel8@sha256:b674ef3a8a7e20b085ceeb9be1f536e0bc0f94dec384e88569105c865fdae224_amd64",
"product_identification_helper": {
"purl": "pkg:oci/nettest-rhel8@sha256:b674ef3a8a7e20b085ceeb9be1f536e0bc0f94dec384e88569105c865fdae224?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/nettest-rhel8\u0026tag=v0.13.3-7"
}
}
},
{
"category": "product_version",
"name": "rhacm2/subctl-rhel8@sha256:dc61ab7c1ad6478e9bb30b36a2a356c5ec137bc0d5109e03ba57a76081015715_amd64",
"product": {
"name": "rhacm2/subctl-rhel8@sha256:dc61ab7c1ad6478e9bb30b36a2a356c5ec137bc0d5109e03ba57a76081015715_amd64",
"product_id": "rhacm2/subctl-rhel8@sha256:dc61ab7c1ad6478e9bb30b36a2a356c5ec137bc0d5109e03ba57a76081015715_amd64",
"product_identification_helper": {
"purl": "pkg:oci/subctl-rhel8@sha256:dc61ab7c1ad6478e9bb30b36a2a356c5ec137bc0d5109e03ba57a76081015715?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/subctl-rhel8\u0026tag=v0.13.3-6"
}
}
},
{
"category": "product_version",
"name": "rhacm2/submariner-gateway-rhel8@sha256:93b7d3fbd69a47187a595e09324ef603d8e0c808c99961719a56029776a25dfb_amd64",
"product": {
"name": "rhacm2/submariner-gateway-rhel8@sha256:93b7d3fbd69a47187a595e09324ef603d8e0c808c99961719a56029776a25dfb_amd64",
"product_id": "rhacm2/submariner-gateway-rhel8@sha256:93b7d3fbd69a47187a595e09324ef603d8e0c808c99961719a56029776a25dfb_amd64",
"product_identification_helper": {
"purl": "pkg:oci/submariner-gateway-rhel8@sha256:93b7d3fbd69a47187a595e09324ef603d8e0c808c99961719a56029776a25dfb?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/submariner-gateway-rhel8\u0026tag=v0.13.3-6"
}
}
},
{
"category": "product_version",
"name": "rhacm2/submariner-globalnet-rhel8@sha256:2bc43c6e55f35522be8752d1ae9eb24637a0926f91fa0f6cbf670f23a61b7840_amd64",
"product": {
"name": "rhacm2/submariner-globalnet-rhel8@sha256:2bc43c6e55f35522be8752d1ae9eb24637a0926f91fa0f6cbf670f23a61b7840_amd64",
"product_id": "rhacm2/submariner-globalnet-rhel8@sha256:2bc43c6e55f35522be8752d1ae9eb24637a0926f91fa0f6cbf670f23a61b7840_amd64",
"product_identification_helper": {
"purl": "pkg:oci/submariner-globalnet-rhel8@sha256:2bc43c6e55f35522be8752d1ae9eb24637a0926f91fa0f6cbf670f23a61b7840?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/submariner-globalnet-rhel8\u0026tag=v0.13.3-7"
}
}
},
{
"category": "product_version",
"name": "rhacm2/submariner-networkplugin-syncer-rhel8@sha256:511362c4a5dfa734d0015a355185a86ba6c00a0466f5fb1b469fa00e07858c82_amd64",
"product": {
"name": "rhacm2/submariner-networkplugin-syncer-rhel8@sha256:511362c4a5dfa734d0015a355185a86ba6c00a0466f5fb1b469fa00e07858c82_amd64",
"product_id": "rhacm2/submariner-networkplugin-syncer-rhel8@sha256:511362c4a5dfa734d0015a355185a86ba6c00a0466f5fb1b469fa00e07858c82_amd64",
"product_identification_helper": {
"purl": "pkg:oci/submariner-networkplugin-syncer-rhel8@sha256:511362c4a5dfa734d0015a355185a86ba6c00a0466f5fb1b469fa00e07858c82?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/submariner-networkplugin-syncer-rhel8\u0026tag=v0.13.3-6"
}
}
},
{
"category": "product_version",
"name": "rhacm2/submariner-operator-bundle@sha256:4c9802569b6aad59f01718b5c692f32e3a9a9b35b7b82e69fed5e1f9573dbc17_amd64",
"product": {
"name": "rhacm2/submariner-operator-bundle@sha256:4c9802569b6aad59f01718b5c692f32e3a9a9b35b7b82e69fed5e1f9573dbc17_amd64",
"product_id": "rhacm2/submariner-operator-bundle@sha256:4c9802569b6aad59f01718b5c692f32e3a9a9b35b7b82e69fed5e1f9573dbc17_amd64",
"product_identification_helper": {
"purl": "pkg:oci/submariner-operator-bundle@sha256:4c9802569b6aad59f01718b5c692f32e3a9a9b35b7b82e69fed5e1f9573dbc17?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/submariner-operator-bundle\u0026tag=v0.13.3-9"
}
}
},
{
"category": "product_version",
"name": "rhacm2/submariner-rhel8-operator@sha256:71a36fc0e726890c4a95668d10f024cd31168c26d00d7a22b9f3e26a811af803_amd64",
"product": {
"name": "rhacm2/submariner-rhel8-operator@sha256:71a36fc0e726890c4a95668d10f024cd31168c26d00d7a22b9f3e26a811af803_amd64",
"product_id": "rhacm2/submariner-rhel8-operator@sha256:71a36fc0e726890c4a95668d10f024cd31168c26d00d7a22b9f3e26a811af803_amd64",
"product_identification_helper": {
"purl": "pkg:oci/submariner-rhel8-operator@sha256:71a36fc0e726890c4a95668d10f024cd31168c26d00d7a22b9f3e26a811af803?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/submariner-rhel8-operator\u0026tag=v0.13.3-6"
}
}
},
{
"category": "product_version",
"name": "rhacm2/submariner-route-agent-rhel8@sha256:bb96dde2023a0b8a0d8b33095374ddcc828de182f04033253e716d584c8db623_amd64",
"product": {
"name": "rhacm2/submariner-route-agent-rhel8@sha256:bb96dde2023a0b8a0d8b33095374ddcc828de182f04033253e716d584c8db623_amd64",
"product_id": "rhacm2/submariner-route-agent-rhel8@sha256:bb96dde2023a0b8a0d8b33095374ddcc828de182f04033253e716d584c8db623_amd64",
"product_identification_helper": {
"purl": "pkg:oci/submariner-route-agent-rhel8@sha256:bb96dde2023a0b8a0d8b33095374ddcc828de182f04033253e716d584c8db623?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/submariner-route-agent-rhel8\u0026tag=v0.13.3-7"
}
}
}
],
"category": "architecture",
"name": "amd64"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "rhacm2/lighthouse-agent-rhel8@sha256:44576acbfff4321af54d8a8c15b0122d28ffbec8b88ebbdd32ed2dca3d4397c3_arm64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8",
"product_id": "8Base-RHACM-2.6:rhacm2/lighthouse-agent-rhel8@sha256:44576acbfff4321af54d8a8c15b0122d28ffbec8b88ebbdd32ed2dca3d4397c3_arm64"
},
"product_reference": "rhacm2/lighthouse-agent-rhel8@sha256:44576acbfff4321af54d8a8c15b0122d28ffbec8b88ebbdd32ed2dca3d4397c3_arm64",
"relates_to_product_reference": "8Base-RHACM-2.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhacm2/lighthouse-agent-rhel8@sha256:6f8f3c288619a58ac723cde85df5232efac7f5ccfd516cb3996b35304d11e7f5_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8",
"product_id": "8Base-RHACM-2.6:rhacm2/lighthouse-agent-rhel8@sha256:6f8f3c288619a58ac723cde85df5232efac7f5ccfd516cb3996b35304d11e7f5_amd64"
},
"product_reference": "rhacm2/lighthouse-agent-rhel8@sha256:6f8f3c288619a58ac723cde85df5232efac7f5ccfd516cb3996b35304d11e7f5_amd64",
"relates_to_product_reference": "8Base-RHACM-2.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhacm2/lighthouse-agent-rhel8@sha256:c45d4a19f6492a1d2d72375c12d3dfc8a7a2349ccc8b581ad7df299bd63ae0a9_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8",
"product_id": "8Base-RHACM-2.6:rhacm2/lighthouse-agent-rhel8@sha256:c45d4a19f6492a1d2d72375c12d3dfc8a7a2349ccc8b581ad7df299bd63ae0a9_ppc64le"
},
"product_reference": "rhacm2/lighthouse-agent-rhel8@sha256:c45d4a19f6492a1d2d72375c12d3dfc8a7a2349ccc8b581ad7df299bd63ae0a9_ppc64le",
"relates_to_product_reference": "8Base-RHACM-2.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhacm2/lighthouse-agent-rhel8@sha256:fde7510f372c447d265b01dcd0e36c7e53f0be4ab109b3d4a81b3dd857d3a127_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8",
"product_id": "8Base-RHACM-2.6:rhacm2/lighthouse-agent-rhel8@sha256:fde7510f372c447d265b01dcd0e36c7e53f0be4ab109b3d4a81b3dd857d3a127_s390x"
},
"product_reference": "rhacm2/lighthouse-agent-rhel8@sha256:fde7510f372c447d265b01dcd0e36c7e53f0be4ab109b3d4a81b3dd857d3a127_s390x",
"relates_to_product_reference": "8Base-RHACM-2.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhacm2/lighthouse-coredns-rhel8@sha256:3e4d5bf90e110c3cf3e988f572d227575727bf1769c02d132272b5ff5051cfb8_arm64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8",
"product_id": "8Base-RHACM-2.6:rhacm2/lighthouse-coredns-rhel8@sha256:3e4d5bf90e110c3cf3e988f572d227575727bf1769c02d132272b5ff5051cfb8_arm64"
},
"product_reference": "rhacm2/lighthouse-coredns-rhel8@sha256:3e4d5bf90e110c3cf3e988f572d227575727bf1769c02d132272b5ff5051cfb8_arm64",
"relates_to_product_reference": "8Base-RHACM-2.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhacm2/lighthouse-coredns-rhel8@sha256:3ee425b4f78fe809d50967ae7c66af42c894a1fec5ef194d17eae9fdf5902913_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8",
"product_id": "8Base-RHACM-2.6:rhacm2/lighthouse-coredns-rhel8@sha256:3ee425b4f78fe809d50967ae7c66af42c894a1fec5ef194d17eae9fdf5902913_amd64"
},
"product_reference": "rhacm2/lighthouse-coredns-rhel8@sha256:3ee425b4f78fe809d50967ae7c66af42c894a1fec5ef194d17eae9fdf5902913_amd64",
"relates_to_product_reference": "8Base-RHACM-2.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhacm2/lighthouse-coredns-rhel8@sha256:a842e4824cd39bc438c38889896dd33372b644968b5e29b614c9529b2e0696cc_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8",
"product_id": "8Base-RHACM-2.6:rhacm2/lighthouse-coredns-rhel8@sha256:a842e4824cd39bc438c38889896dd33372b644968b5e29b614c9529b2e0696cc_ppc64le"
},
"product_reference": "rhacm2/lighthouse-coredns-rhel8@sha256:a842e4824cd39bc438c38889896dd33372b644968b5e29b614c9529b2e0696cc_ppc64le",
"relates_to_product_reference": "8Base-RHACM-2.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhacm2/lighthouse-coredns-rhel8@sha256:e90e99636dce63fdc6323203694eac2aea9d7e2a0578ed444fce67144838b7ca_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8",
"product_id": "8Base-RHACM-2.6:rhacm2/lighthouse-coredns-rhel8@sha256:e90e99636dce63fdc6323203694eac2aea9d7e2a0578ed444fce67144838b7ca_s390x"
},
"product_reference": "rhacm2/lighthouse-coredns-rhel8@sha256:e90e99636dce63fdc6323203694eac2aea9d7e2a0578ed444fce67144838b7ca_s390x",
"relates_to_product_reference": "8Base-RHACM-2.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhacm2/nettest-rhel8@sha256:623848329900b7fe55763dd08bacb5fde147f0b9e8b77487f1b99a8b713d309e_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8",
"product_id": "8Base-RHACM-2.6:rhacm2/nettest-rhel8@sha256:623848329900b7fe55763dd08bacb5fde147f0b9e8b77487f1b99a8b713d309e_ppc64le"
},
"product_reference": "rhacm2/nettest-rhel8@sha256:623848329900b7fe55763dd08bacb5fde147f0b9e8b77487f1b99a8b713d309e_ppc64le",
"relates_to_product_reference": "8Base-RHACM-2.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhacm2/nettest-rhel8@sha256:84cb8594ccf7876483cee84195d704d34721f566e6a36070f7eecaca10fb2c88_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8",
"product_id": "8Base-RHACM-2.6:rhacm2/nettest-rhel8@sha256:84cb8594ccf7876483cee84195d704d34721f566e6a36070f7eecaca10fb2c88_s390x"
},
"product_reference": "rhacm2/nettest-rhel8@sha256:84cb8594ccf7876483cee84195d704d34721f566e6a36070f7eecaca10fb2c88_s390x",
"relates_to_product_reference": "8Base-RHACM-2.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhacm2/nettest-rhel8@sha256:a1197fa88e7cbaac9c4c80e13d39eda732d9ff09579d7d2e96a96bb5c005e695_arm64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8",
"product_id": "8Base-RHACM-2.6:rhacm2/nettest-rhel8@sha256:a1197fa88e7cbaac9c4c80e13d39eda732d9ff09579d7d2e96a96bb5c005e695_arm64"
},
"product_reference": "rhacm2/nettest-rhel8@sha256:a1197fa88e7cbaac9c4c80e13d39eda732d9ff09579d7d2e96a96bb5c005e695_arm64",
"relates_to_product_reference": "8Base-RHACM-2.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhacm2/nettest-rhel8@sha256:b674ef3a8a7e20b085ceeb9be1f536e0bc0f94dec384e88569105c865fdae224_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8",
"product_id": "8Base-RHACM-2.6:rhacm2/nettest-rhel8@sha256:b674ef3a8a7e20b085ceeb9be1f536e0bc0f94dec384e88569105c865fdae224_amd64"
},
"product_reference": "rhacm2/nettest-rhel8@sha256:b674ef3a8a7e20b085ceeb9be1f536e0bc0f94dec384e88569105c865fdae224_amd64",
"relates_to_product_reference": "8Base-RHACM-2.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhacm2/subctl-rhel8@sha256:18b4fa76cfef84236c8453eb0cd6b1c67d1017732fa1d5722931d8616c365cfe_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8",
"product_id": "8Base-RHACM-2.6:rhacm2/subctl-rhel8@sha256:18b4fa76cfef84236c8453eb0cd6b1c67d1017732fa1d5722931d8616c365cfe_s390x"
},
"product_reference": "rhacm2/subctl-rhel8@sha256:18b4fa76cfef84236c8453eb0cd6b1c67d1017732fa1d5722931d8616c365cfe_s390x",
"relates_to_product_reference": "8Base-RHACM-2.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhacm2/subctl-rhel8@sha256:1f4051093fb1128e7266a4baff92bb7e9864825d51947265bed4ae7c20a3f99c_arm64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8",
"product_id": "8Base-RHACM-2.6:rhacm2/subctl-rhel8@sha256:1f4051093fb1128e7266a4baff92bb7e9864825d51947265bed4ae7c20a3f99c_arm64"
},
"product_reference": "rhacm2/subctl-rhel8@sha256:1f4051093fb1128e7266a4baff92bb7e9864825d51947265bed4ae7c20a3f99c_arm64",
"relates_to_product_reference": "8Base-RHACM-2.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhacm2/subctl-rhel8@sha256:2e17954946ea1fd3ec53791a1b6dfdfb59be7c24fd78816b0ba721c069350c38_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8",
"product_id": "8Base-RHACM-2.6:rhacm2/subctl-rhel8@sha256:2e17954946ea1fd3ec53791a1b6dfdfb59be7c24fd78816b0ba721c069350c38_ppc64le"
},
"product_reference": "rhacm2/subctl-rhel8@sha256:2e17954946ea1fd3ec53791a1b6dfdfb59be7c24fd78816b0ba721c069350c38_ppc64le",
"relates_to_product_reference": "8Base-RHACM-2.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhacm2/subctl-rhel8@sha256:dc61ab7c1ad6478e9bb30b36a2a356c5ec137bc0d5109e03ba57a76081015715_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8",
"product_id": "8Base-RHACM-2.6:rhacm2/subctl-rhel8@sha256:dc61ab7c1ad6478e9bb30b36a2a356c5ec137bc0d5109e03ba57a76081015715_amd64"
},
"product_reference": "rhacm2/subctl-rhel8@sha256:dc61ab7c1ad6478e9bb30b36a2a356c5ec137bc0d5109e03ba57a76081015715_amd64",
"relates_to_product_reference": "8Base-RHACM-2.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhacm2/submariner-gateway-rhel8@sha256:1abe2013043c37997233ed7d8785c4607be1f21ed25f130f2141f8a771f0e9d5_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8",
"product_id": "8Base-RHACM-2.6:rhacm2/submariner-gateway-rhel8@sha256:1abe2013043c37997233ed7d8785c4607be1f21ed25f130f2141f8a771f0e9d5_ppc64le"
},
"product_reference": "rhacm2/submariner-gateway-rhel8@sha256:1abe2013043c37997233ed7d8785c4607be1f21ed25f130f2141f8a771f0e9d5_ppc64le",
"relates_to_product_reference": "8Base-RHACM-2.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhacm2/submariner-gateway-rhel8@sha256:5100f65e2591023eb9da4512b464c49bbf7f56d1a78587e5da790d6cb52cfd7c_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8",
"product_id": "8Base-RHACM-2.6:rhacm2/submariner-gateway-rhel8@sha256:5100f65e2591023eb9da4512b464c49bbf7f56d1a78587e5da790d6cb52cfd7c_s390x"
},
"product_reference": "rhacm2/submariner-gateway-rhel8@sha256:5100f65e2591023eb9da4512b464c49bbf7f56d1a78587e5da790d6cb52cfd7c_s390x",
"relates_to_product_reference": "8Base-RHACM-2.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhacm2/submariner-gateway-rhel8@sha256:5cd02e62ae81fea9887c484b4b4f52712b3cdfe0bff8a826e2c1c8e813df50bf_arm64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8",
"product_id": "8Base-RHACM-2.6:rhacm2/submariner-gateway-rhel8@sha256:5cd02e62ae81fea9887c484b4b4f52712b3cdfe0bff8a826e2c1c8e813df50bf_arm64"
},
"product_reference": "rhacm2/submariner-gateway-rhel8@sha256:5cd02e62ae81fea9887c484b4b4f52712b3cdfe0bff8a826e2c1c8e813df50bf_arm64",
"relates_to_product_reference": "8Base-RHACM-2.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhacm2/submariner-gateway-rhel8@sha256:93b7d3fbd69a47187a595e09324ef603d8e0c808c99961719a56029776a25dfb_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8",
"product_id": "8Base-RHACM-2.6:rhacm2/submariner-gateway-rhel8@sha256:93b7d3fbd69a47187a595e09324ef603d8e0c808c99961719a56029776a25dfb_amd64"
},
"product_reference": "rhacm2/submariner-gateway-rhel8@sha256:93b7d3fbd69a47187a595e09324ef603d8e0c808c99961719a56029776a25dfb_amd64",
"relates_to_product_reference": "8Base-RHACM-2.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhacm2/submariner-globalnet-rhel8@sha256:2bc43c6e55f35522be8752d1ae9eb24637a0926f91fa0f6cbf670f23a61b7840_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8",
"product_id": "8Base-RHACM-2.6:rhacm2/submariner-globalnet-rhel8@sha256:2bc43c6e55f35522be8752d1ae9eb24637a0926f91fa0f6cbf670f23a61b7840_amd64"
},
"product_reference": "rhacm2/submariner-globalnet-rhel8@sha256:2bc43c6e55f35522be8752d1ae9eb24637a0926f91fa0f6cbf670f23a61b7840_amd64",
"relates_to_product_reference": "8Base-RHACM-2.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhacm2/submariner-globalnet-rhel8@sha256:4ee144a663c95a2fcc1fbfc0b308cf7033a5ded97a28a5aec9f35250df812661_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8",
"product_id": "8Base-RHACM-2.6:rhacm2/submariner-globalnet-rhel8@sha256:4ee144a663c95a2fcc1fbfc0b308cf7033a5ded97a28a5aec9f35250df812661_ppc64le"
},
"product_reference": "rhacm2/submariner-globalnet-rhel8@sha256:4ee144a663c95a2fcc1fbfc0b308cf7033a5ded97a28a5aec9f35250df812661_ppc64le",
"relates_to_product_reference": "8Base-RHACM-2.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhacm2/submariner-globalnet-rhel8@sha256:dc50bdc2082127c9df0da5b539ac61d244250eb93d7fcfd3a9d2fdbb10603695_arm64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8",
"product_id": "8Base-RHACM-2.6:rhacm2/submariner-globalnet-rhel8@sha256:dc50bdc2082127c9df0da5b539ac61d244250eb93d7fcfd3a9d2fdbb10603695_arm64"
},
"product_reference": "rhacm2/submariner-globalnet-rhel8@sha256:dc50bdc2082127c9df0da5b539ac61d244250eb93d7fcfd3a9d2fdbb10603695_arm64",
"relates_to_product_reference": "8Base-RHACM-2.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhacm2/submariner-globalnet-rhel8@sha256:fb728331ee01f6fb72a54b5c5b5886ec08f014a384c1b49beec692439ec59630_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8",
"product_id": "8Base-RHACM-2.6:rhacm2/submariner-globalnet-rhel8@sha256:fb728331ee01f6fb72a54b5c5b5886ec08f014a384c1b49beec692439ec59630_s390x"
},
"product_reference": "rhacm2/submariner-globalnet-rhel8@sha256:fb728331ee01f6fb72a54b5c5b5886ec08f014a384c1b49beec692439ec59630_s390x",
"relates_to_product_reference": "8Base-RHACM-2.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhacm2/submariner-networkplugin-syncer-rhel8@sha256:1ef8557fc7489a74092c22e5cf96ebbec1575f72177534de2ae095ab96927a5a_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8",
"product_id": "8Base-RHACM-2.6:rhacm2/submariner-networkplugin-syncer-rhel8@sha256:1ef8557fc7489a74092c22e5cf96ebbec1575f72177534de2ae095ab96927a5a_ppc64le"
},
"product_reference": "rhacm2/submariner-networkplugin-syncer-rhel8@sha256:1ef8557fc7489a74092c22e5cf96ebbec1575f72177534de2ae095ab96927a5a_ppc64le",
"relates_to_product_reference": "8Base-RHACM-2.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhacm2/submariner-networkplugin-syncer-rhel8@sha256:50281b32dc626b66b8b38bc3fa97d799ab13b66029768e60c06d3fa5d9a29bf1_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8",
"product_id": "8Base-RHACM-2.6:rhacm2/submariner-networkplugin-syncer-rhel8@sha256:50281b32dc626b66b8b38bc3fa97d799ab13b66029768e60c06d3fa5d9a29bf1_s390x"
},
"product_reference": "rhacm2/submariner-networkplugin-syncer-rhel8@sha256:50281b32dc626b66b8b38bc3fa97d799ab13b66029768e60c06d3fa5d9a29bf1_s390x",
"relates_to_product_reference": "8Base-RHACM-2.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhacm2/submariner-networkplugin-syncer-rhel8@sha256:511362c4a5dfa734d0015a355185a86ba6c00a0466f5fb1b469fa00e07858c82_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8",
"product_id": "8Base-RHACM-2.6:rhacm2/submariner-networkplugin-syncer-rhel8@sha256:511362c4a5dfa734d0015a355185a86ba6c00a0466f5fb1b469fa00e07858c82_amd64"
},
"product_reference": "rhacm2/submariner-networkplugin-syncer-rhel8@sha256:511362c4a5dfa734d0015a355185a86ba6c00a0466f5fb1b469fa00e07858c82_amd64",
"relates_to_product_reference": "8Base-RHACM-2.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhacm2/submariner-networkplugin-syncer-rhel8@sha256:7076fac5d7944c7d4a0fa0e89629372466baf9fc5b4b8e5c31cc71b80fac9a69_arm64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8",
"product_id": "8Base-RHACM-2.6:rhacm2/submariner-networkplugin-syncer-rhel8@sha256:7076fac5d7944c7d4a0fa0e89629372466baf9fc5b4b8e5c31cc71b80fac9a69_arm64"
},
"product_reference": "rhacm2/submariner-networkplugin-syncer-rhel8@sha256:7076fac5d7944c7d4a0fa0e89629372466baf9fc5b4b8e5c31cc71b80fac9a69_arm64",
"relates_to_product_reference": "8Base-RHACM-2.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhacm2/submariner-operator-bundle@sha256:1e3de5b269f4454e822201ea7666bacab9c2962f454368b1967dd583cab5c9bc_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8",
"product_id": "8Base-RHACM-2.6:rhacm2/submariner-operator-bundle@sha256:1e3de5b269f4454e822201ea7666bacab9c2962f454368b1967dd583cab5c9bc_ppc64le"
},
"product_reference": "rhacm2/submariner-operator-bundle@sha256:1e3de5b269f4454e822201ea7666bacab9c2962f454368b1967dd583cab5c9bc_ppc64le",
"relates_to_product_reference": "8Base-RHACM-2.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhacm2/submariner-operator-bundle@sha256:2d28ae6efe8ba1999f5ae960cc1799465188b03514697c0192be53c4a7d1e8f2_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8",
"product_id": "8Base-RHACM-2.6:rhacm2/submariner-operator-bundle@sha256:2d28ae6efe8ba1999f5ae960cc1799465188b03514697c0192be53c4a7d1e8f2_s390x"
},
"product_reference": "rhacm2/submariner-operator-bundle@sha256:2d28ae6efe8ba1999f5ae960cc1799465188b03514697c0192be53c4a7d1e8f2_s390x",
"relates_to_product_reference": "8Base-RHACM-2.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhacm2/submariner-operator-bundle@sha256:4c9802569b6aad59f01718b5c692f32e3a9a9b35b7b82e69fed5e1f9573dbc17_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8",
"product_id": "8Base-RHACM-2.6:rhacm2/submariner-operator-bundle@sha256:4c9802569b6aad59f01718b5c692f32e3a9a9b35b7b82e69fed5e1f9573dbc17_amd64"
},
"product_reference": "rhacm2/submariner-operator-bundle@sha256:4c9802569b6aad59f01718b5c692f32e3a9a9b35b7b82e69fed5e1f9573dbc17_amd64",
"relates_to_product_reference": "8Base-RHACM-2.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhacm2/submariner-operator-bundle@sha256:7dacd7a2b26ee22f62851127de612e9c18696c7db4ed06a244ce635b12cb89e2_arm64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8",
"product_id": "8Base-RHACM-2.6:rhacm2/submariner-operator-bundle@sha256:7dacd7a2b26ee22f62851127de612e9c18696c7db4ed06a244ce635b12cb89e2_arm64"
},
"product_reference": "rhacm2/submariner-operator-bundle@sha256:7dacd7a2b26ee22f62851127de612e9c18696c7db4ed06a244ce635b12cb89e2_arm64",
"relates_to_product_reference": "8Base-RHACM-2.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhacm2/submariner-rhel8-operator@sha256:71a36fc0e726890c4a95668d10f024cd31168c26d00d7a22b9f3e26a811af803_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8",
"product_id": "8Base-RHACM-2.6:rhacm2/submariner-rhel8-operator@sha256:71a36fc0e726890c4a95668d10f024cd31168c26d00d7a22b9f3e26a811af803_amd64"
},
"product_reference": "rhacm2/submariner-rhel8-operator@sha256:71a36fc0e726890c4a95668d10f024cd31168c26d00d7a22b9f3e26a811af803_amd64",
"relates_to_product_reference": "8Base-RHACM-2.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhacm2/submariner-rhel8-operator@sha256:db99ef3c89ac45501a7b7fc64c6f853df5f781b2200a758e71debc4dadaf2fef_arm64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8",
"product_id": "8Base-RHACM-2.6:rhacm2/submariner-rhel8-operator@sha256:db99ef3c89ac45501a7b7fc64c6f853df5f781b2200a758e71debc4dadaf2fef_arm64"
},
"product_reference": "rhacm2/submariner-rhel8-operator@sha256:db99ef3c89ac45501a7b7fc64c6f853df5f781b2200a758e71debc4dadaf2fef_arm64",
"relates_to_product_reference": "8Base-RHACM-2.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhacm2/submariner-rhel8-operator@sha256:e54bed5d1233969accf57b3b11f4d934040d7d408440d900d071f8919b60affa_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8",
"product_id": "8Base-RHACM-2.6:rhacm2/submariner-rhel8-operator@sha256:e54bed5d1233969accf57b3b11f4d934040d7d408440d900d071f8919b60affa_ppc64le"
},
"product_reference": "rhacm2/submariner-rhel8-operator@sha256:e54bed5d1233969accf57b3b11f4d934040d7d408440d900d071f8919b60affa_ppc64le",
"relates_to_product_reference": "8Base-RHACM-2.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhacm2/submariner-rhel8-operator@sha256:fc6f14a4af741d3de8c0de1859fc0925d66673b5b7ced139b758b51a52307c5a_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8",
"product_id": "8Base-RHACM-2.6:rhacm2/submariner-rhel8-operator@sha256:fc6f14a4af741d3de8c0de1859fc0925d66673b5b7ced139b758b51a52307c5a_s390x"
},
"product_reference": "rhacm2/submariner-rhel8-operator@sha256:fc6f14a4af741d3de8c0de1859fc0925d66673b5b7ced139b758b51a52307c5a_s390x",
"relates_to_product_reference": "8Base-RHACM-2.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhacm2/submariner-route-agent-rhel8@sha256:007edcf9dd166ec8c1b30f60755bcfe02dee03c2d8e539fba06615b8a3eefd58_arm64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8",
"product_id": "8Base-RHACM-2.6:rhacm2/submariner-route-agent-rhel8@sha256:007edcf9dd166ec8c1b30f60755bcfe02dee03c2d8e539fba06615b8a3eefd58_arm64"
},
"product_reference": "rhacm2/submariner-route-agent-rhel8@sha256:007edcf9dd166ec8c1b30f60755bcfe02dee03c2d8e539fba06615b8a3eefd58_arm64",
"relates_to_product_reference": "8Base-RHACM-2.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhacm2/submariner-route-agent-rhel8@sha256:0b40af2abd40a0d9220fd7311770cbbf0dddbc58b5347399c13fa92dae8dc2be_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8",
"product_id": "8Base-RHACM-2.6:rhacm2/submariner-route-agent-rhel8@sha256:0b40af2abd40a0d9220fd7311770cbbf0dddbc58b5347399c13fa92dae8dc2be_s390x"
},
"product_reference": "rhacm2/submariner-route-agent-rhel8@sha256:0b40af2abd40a0d9220fd7311770cbbf0dddbc58b5347399c13fa92dae8dc2be_s390x",
"relates_to_product_reference": "8Base-RHACM-2.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhacm2/submariner-route-agent-rhel8@sha256:a08eecb9e361d8466db2adeafdf203fdc199a9d269910741909f73c341b28f4a_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8",
"product_id": "8Base-RHACM-2.6:rhacm2/submariner-route-agent-rhel8@sha256:a08eecb9e361d8466db2adeafdf203fdc199a9d269910741909f73c341b28f4a_ppc64le"
},
"product_reference": "rhacm2/submariner-route-agent-rhel8@sha256:a08eecb9e361d8466db2adeafdf203fdc199a9d269910741909f73c341b28f4a_ppc64le",
"relates_to_product_reference": "8Base-RHACM-2.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhacm2/submariner-route-agent-rhel8@sha256:bb96dde2023a0b8a0d8b33095374ddcc828de182f04033253e716d584c8db623_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8",
"product_id": "8Base-RHACM-2.6:rhacm2/submariner-route-agent-rhel8@sha256:bb96dde2023a0b8a0d8b33095374ddcc828de182f04033253e716d584c8db623_amd64"
},
"product_reference": "rhacm2/submariner-route-agent-rhel8@sha256:bb96dde2023a0b8a0d8b33095374ddcc828de182f04033253e716d584c8db623_amd64",
"relates_to_product_reference": "8Base-RHACM-2.6"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2022-32149",
"cwe": {
"id": "CWE-407",
"name": "Inefficient Algorithmic Complexity"
},
"discovery_date": "2022-10-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2134010"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in the golang.org/x/text/language package. An attacker can craft an Accept-Language header which ParseAcceptLanguage will take significant time to parse. This issue leads to a denial of service, and can impact availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: golang.org/x/text/language: ParseAcceptLanguage takes a long time to parse complex tags",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "After careful analysis of the vulnerability Redhat is choosing to keep the vulnerability severity as moderate,the vulnerability exists in the ParseAcceptLanguage function of the golang text/language package,when an attacker could craft an unusually large accept header and due to the parser taking quadratic time complexity to finish, firstly the attacker would have to find a way smuggle an input to the parser and even then this would simply not result in a crash of any kind but more of resource hang which while can be unpleasant,does not equate to any real world damage.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-RHACM-2.6:rhacm2/lighthouse-agent-rhel8@sha256:44576acbfff4321af54d8a8c15b0122d28ffbec8b88ebbdd32ed2dca3d4397c3_arm64",
"8Base-RHACM-2.6:rhacm2/lighthouse-agent-rhel8@sha256:6f8f3c288619a58ac723cde85df5232efac7f5ccfd516cb3996b35304d11e7f5_amd64",
"8Base-RHACM-2.6:rhacm2/lighthouse-agent-rhel8@sha256:c45d4a19f6492a1d2d72375c12d3dfc8a7a2349ccc8b581ad7df299bd63ae0a9_ppc64le",
"8Base-RHACM-2.6:rhacm2/lighthouse-agent-rhel8@sha256:fde7510f372c447d265b01dcd0e36c7e53f0be4ab109b3d4a81b3dd857d3a127_s390x",
"8Base-RHACM-2.6:rhacm2/lighthouse-coredns-rhel8@sha256:3e4d5bf90e110c3cf3e988f572d227575727bf1769c02d132272b5ff5051cfb8_arm64",
"8Base-RHACM-2.6:rhacm2/lighthouse-coredns-rhel8@sha256:3ee425b4f78fe809d50967ae7c66af42c894a1fec5ef194d17eae9fdf5902913_amd64",
"8Base-RHACM-2.6:rhacm2/lighthouse-coredns-rhel8@sha256:a842e4824cd39bc438c38889896dd33372b644968b5e29b614c9529b2e0696cc_ppc64le",
"8Base-RHACM-2.6:rhacm2/lighthouse-coredns-rhel8@sha256:e90e99636dce63fdc6323203694eac2aea9d7e2a0578ed444fce67144838b7ca_s390x",
"8Base-RHACM-2.6:rhacm2/nettest-rhel8@sha256:623848329900b7fe55763dd08bacb5fde147f0b9e8b77487f1b99a8b713d309e_ppc64le",
"8Base-RHACM-2.6:rhacm2/nettest-rhel8@sha256:84cb8594ccf7876483cee84195d704d34721f566e6a36070f7eecaca10fb2c88_s390x",
"8Base-RHACM-2.6:rhacm2/nettest-rhel8@sha256:a1197fa88e7cbaac9c4c80e13d39eda732d9ff09579d7d2e96a96bb5c005e695_arm64",
"8Base-RHACM-2.6:rhacm2/nettest-rhel8@sha256:b674ef3a8a7e20b085ceeb9be1f536e0bc0f94dec384e88569105c865fdae224_amd64",
"8Base-RHACM-2.6:rhacm2/subctl-rhel8@sha256:18b4fa76cfef84236c8453eb0cd6b1c67d1017732fa1d5722931d8616c365cfe_s390x",
"8Base-RHACM-2.6:rhacm2/subctl-rhel8@sha256:1f4051093fb1128e7266a4baff92bb7e9864825d51947265bed4ae7c20a3f99c_arm64",
"8Base-RHACM-2.6:rhacm2/subctl-rhel8@sha256:2e17954946ea1fd3ec53791a1b6dfdfb59be7c24fd78816b0ba721c069350c38_ppc64le",
"8Base-RHACM-2.6:rhacm2/subctl-rhel8@sha256:dc61ab7c1ad6478e9bb30b36a2a356c5ec137bc0d5109e03ba57a76081015715_amd64",
"8Base-RHACM-2.6:rhacm2/submariner-gateway-rhel8@sha256:1abe2013043c37997233ed7d8785c4607be1f21ed25f130f2141f8a771f0e9d5_ppc64le",
"8Base-RHACM-2.6:rhacm2/submariner-gateway-rhel8@sha256:5100f65e2591023eb9da4512b464c49bbf7f56d1a78587e5da790d6cb52cfd7c_s390x",
"8Base-RHACM-2.6:rhacm2/submariner-gateway-rhel8@sha256:5cd02e62ae81fea9887c484b4b4f52712b3cdfe0bff8a826e2c1c8e813df50bf_arm64",
"8Base-RHACM-2.6:rhacm2/submariner-gateway-rhel8@sha256:93b7d3fbd69a47187a595e09324ef603d8e0c808c99961719a56029776a25dfb_amd64",
"8Base-RHACM-2.6:rhacm2/submariner-globalnet-rhel8@sha256:2bc43c6e55f35522be8752d1ae9eb24637a0926f91fa0f6cbf670f23a61b7840_amd64",
"8Base-RHACM-2.6:rhacm2/submariner-globalnet-rhel8@sha256:4ee144a663c95a2fcc1fbfc0b308cf7033a5ded97a28a5aec9f35250df812661_ppc64le",
"8Base-RHACM-2.6:rhacm2/submariner-globalnet-rhel8@sha256:dc50bdc2082127c9df0da5b539ac61d244250eb93d7fcfd3a9d2fdbb10603695_arm64",
"8Base-RHACM-2.6:rhacm2/submariner-globalnet-rhel8@sha256:fb728331ee01f6fb72a54b5c5b5886ec08f014a384c1b49beec692439ec59630_s390x",
"8Base-RHACM-2.6:rhacm2/submariner-networkplugin-syncer-rhel8@sha256:1ef8557fc7489a74092c22e5cf96ebbec1575f72177534de2ae095ab96927a5a_ppc64le",
"8Base-RHACM-2.6:rhacm2/submariner-networkplugin-syncer-rhel8@sha256:50281b32dc626b66b8b38bc3fa97d799ab13b66029768e60c06d3fa5d9a29bf1_s390x",
"8Base-RHACM-2.6:rhacm2/submariner-networkplugin-syncer-rhel8@sha256:511362c4a5dfa734d0015a355185a86ba6c00a0466f5fb1b469fa00e07858c82_amd64",
"8Base-RHACM-2.6:rhacm2/submariner-networkplugin-syncer-rhel8@sha256:7076fac5d7944c7d4a0fa0e89629372466baf9fc5b4b8e5c31cc71b80fac9a69_arm64",
"8Base-RHACM-2.6:rhacm2/submariner-operator-bundle@sha256:1e3de5b269f4454e822201ea7666bacab9c2962f454368b1967dd583cab5c9bc_ppc64le",
"8Base-RHACM-2.6:rhacm2/submariner-operator-bundle@sha256:2d28ae6efe8ba1999f5ae960cc1799465188b03514697c0192be53c4a7d1e8f2_s390x",
"8Base-RHACM-2.6:rhacm2/submariner-operator-bundle@sha256:4c9802569b6aad59f01718b5c692f32e3a9a9b35b7b82e69fed5e1f9573dbc17_amd64",
"8Base-RHACM-2.6:rhacm2/submariner-operator-bundle@sha256:7dacd7a2b26ee22f62851127de612e9c18696c7db4ed06a244ce635b12cb89e2_arm64",
"8Base-RHACM-2.6:rhacm2/submariner-rhel8-operator@sha256:71a36fc0e726890c4a95668d10f024cd31168c26d00d7a22b9f3e26a811af803_amd64",
"8Base-RHACM-2.6:rhacm2/submariner-rhel8-operator@sha256:db99ef3c89ac45501a7b7fc64c6f853df5f781b2200a758e71debc4dadaf2fef_arm64",
"8Base-RHACM-2.6:rhacm2/submariner-rhel8-operator@sha256:e54bed5d1233969accf57b3b11f4d934040d7d408440d900d071f8919b60affa_ppc64le",
"8Base-RHACM-2.6:rhacm2/submariner-rhel8-operator@sha256:fc6f14a4af741d3de8c0de1859fc0925d66673b5b7ced139b758b51a52307c5a_s390x",
"8Base-RHACM-2.6:rhacm2/submariner-route-agent-rhel8@sha256:007edcf9dd166ec8c1b30f60755bcfe02dee03c2d8e539fba06615b8a3eefd58_arm64",
"8Base-RHACM-2.6:rhacm2/submariner-route-agent-rhel8@sha256:0b40af2abd40a0d9220fd7311770cbbf0dddbc58b5347399c13fa92dae8dc2be_s390x",
"8Base-RHACM-2.6:rhacm2/submariner-route-agent-rhel8@sha256:a08eecb9e361d8466db2adeafdf203fdc199a9d269910741909f73c341b28f4a_ppc64le",
"8Base-RHACM-2.6:rhacm2/submariner-route-agent-rhel8@sha256:bb96dde2023a0b8a0d8b33095374ddcc828de182f04033253e716d584c8db623_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-32149"
},
{
"category": "external",
"summary": "RHBZ#2134010",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2134010"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-32149",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32149"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-32149",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-32149"
},
{
"category": "external",
"summary": "https://go.dev/issue/56152",
"url": "https://go.dev/issue/56152"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-dev/c/qfPIly0X7aU",
"url": "https://groups.google.com/g/golang-dev/c/qfPIly0X7aU"
}
],
"release_date": "2022-10-11T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-02-15T21:46:51+00:00",
"details": "For details on how to install Submariner, refer to:\n\nhttps://access.redhat.com/documentation/en-us/red_hat_advanced_cluster_management_for_kubernetes/2.6/html/add-ons/add-ons-overview#submariner-deploy-console\n\nand\n\nhttps://submariner.io/getting-started/",
"product_ids": [
"8Base-RHACM-2.6:rhacm2/lighthouse-agent-rhel8@sha256:44576acbfff4321af54d8a8c15b0122d28ffbec8b88ebbdd32ed2dca3d4397c3_arm64",
"8Base-RHACM-2.6:rhacm2/lighthouse-agent-rhel8@sha256:6f8f3c288619a58ac723cde85df5232efac7f5ccfd516cb3996b35304d11e7f5_amd64",
"8Base-RHACM-2.6:rhacm2/lighthouse-agent-rhel8@sha256:c45d4a19f6492a1d2d72375c12d3dfc8a7a2349ccc8b581ad7df299bd63ae0a9_ppc64le",
"8Base-RHACM-2.6:rhacm2/lighthouse-agent-rhel8@sha256:fde7510f372c447d265b01dcd0e36c7e53f0be4ab109b3d4a81b3dd857d3a127_s390x",
"8Base-RHACM-2.6:rhacm2/lighthouse-coredns-rhel8@sha256:3e4d5bf90e110c3cf3e988f572d227575727bf1769c02d132272b5ff5051cfb8_arm64",
"8Base-RHACM-2.6:rhacm2/lighthouse-coredns-rhel8@sha256:3ee425b4f78fe809d50967ae7c66af42c894a1fec5ef194d17eae9fdf5902913_amd64",
"8Base-RHACM-2.6:rhacm2/lighthouse-coredns-rhel8@sha256:a842e4824cd39bc438c38889896dd33372b644968b5e29b614c9529b2e0696cc_ppc64le",
"8Base-RHACM-2.6:rhacm2/lighthouse-coredns-rhel8@sha256:e90e99636dce63fdc6323203694eac2aea9d7e2a0578ed444fce67144838b7ca_s390x",
"8Base-RHACM-2.6:rhacm2/nettest-rhel8@sha256:623848329900b7fe55763dd08bacb5fde147f0b9e8b77487f1b99a8b713d309e_ppc64le",
"8Base-RHACM-2.6:rhacm2/nettest-rhel8@sha256:84cb8594ccf7876483cee84195d704d34721f566e6a36070f7eecaca10fb2c88_s390x",
"8Base-RHACM-2.6:rhacm2/nettest-rhel8@sha256:a1197fa88e7cbaac9c4c80e13d39eda732d9ff09579d7d2e96a96bb5c005e695_arm64",
"8Base-RHACM-2.6:rhacm2/nettest-rhel8@sha256:b674ef3a8a7e20b085ceeb9be1f536e0bc0f94dec384e88569105c865fdae224_amd64",
"8Base-RHACM-2.6:rhacm2/subctl-rhel8@sha256:18b4fa76cfef84236c8453eb0cd6b1c67d1017732fa1d5722931d8616c365cfe_s390x",
"8Base-RHACM-2.6:rhacm2/subctl-rhel8@sha256:1f4051093fb1128e7266a4baff92bb7e9864825d51947265bed4ae7c20a3f99c_arm64",
"8Base-RHACM-2.6:rhacm2/subctl-rhel8@sha256:2e17954946ea1fd3ec53791a1b6dfdfb59be7c24fd78816b0ba721c069350c38_ppc64le",
"8Base-RHACM-2.6:rhacm2/subctl-rhel8@sha256:dc61ab7c1ad6478e9bb30b36a2a356c5ec137bc0d5109e03ba57a76081015715_amd64",
"8Base-RHACM-2.6:rhacm2/submariner-gateway-rhel8@sha256:1abe2013043c37997233ed7d8785c4607be1f21ed25f130f2141f8a771f0e9d5_ppc64le",
"8Base-RHACM-2.6:rhacm2/submariner-gateway-rhel8@sha256:5100f65e2591023eb9da4512b464c49bbf7f56d1a78587e5da790d6cb52cfd7c_s390x",
"8Base-RHACM-2.6:rhacm2/submariner-gateway-rhel8@sha256:5cd02e62ae81fea9887c484b4b4f52712b3cdfe0bff8a826e2c1c8e813df50bf_arm64",
"8Base-RHACM-2.6:rhacm2/submariner-gateway-rhel8@sha256:93b7d3fbd69a47187a595e09324ef603d8e0c808c99961719a56029776a25dfb_amd64",
"8Base-RHACM-2.6:rhacm2/submariner-globalnet-rhel8@sha256:2bc43c6e55f35522be8752d1ae9eb24637a0926f91fa0f6cbf670f23a61b7840_amd64",
"8Base-RHACM-2.6:rhacm2/submariner-globalnet-rhel8@sha256:4ee144a663c95a2fcc1fbfc0b308cf7033a5ded97a28a5aec9f35250df812661_ppc64le",
"8Base-RHACM-2.6:rhacm2/submariner-globalnet-rhel8@sha256:dc50bdc2082127c9df0da5b539ac61d244250eb93d7fcfd3a9d2fdbb10603695_arm64",
"8Base-RHACM-2.6:rhacm2/submariner-globalnet-rhel8@sha256:fb728331ee01f6fb72a54b5c5b5886ec08f014a384c1b49beec692439ec59630_s390x",
"8Base-RHACM-2.6:rhacm2/submariner-networkplugin-syncer-rhel8@sha256:1ef8557fc7489a74092c22e5cf96ebbec1575f72177534de2ae095ab96927a5a_ppc64le",
"8Base-RHACM-2.6:rhacm2/submariner-networkplugin-syncer-rhel8@sha256:50281b32dc626b66b8b38bc3fa97d799ab13b66029768e60c06d3fa5d9a29bf1_s390x",
"8Base-RHACM-2.6:rhacm2/submariner-networkplugin-syncer-rhel8@sha256:511362c4a5dfa734d0015a355185a86ba6c00a0466f5fb1b469fa00e07858c82_amd64",
"8Base-RHACM-2.6:rhacm2/submariner-networkplugin-syncer-rhel8@sha256:7076fac5d7944c7d4a0fa0e89629372466baf9fc5b4b8e5c31cc71b80fac9a69_arm64",
"8Base-RHACM-2.6:rhacm2/submariner-operator-bundle@sha256:1e3de5b269f4454e822201ea7666bacab9c2962f454368b1967dd583cab5c9bc_ppc64le",
"8Base-RHACM-2.6:rhacm2/submariner-operator-bundle@sha256:2d28ae6efe8ba1999f5ae960cc1799465188b03514697c0192be53c4a7d1e8f2_s390x",
"8Base-RHACM-2.6:rhacm2/submariner-operator-bundle@sha256:4c9802569b6aad59f01718b5c692f32e3a9a9b35b7b82e69fed5e1f9573dbc17_amd64",
"8Base-RHACM-2.6:rhacm2/submariner-operator-bundle@sha256:7dacd7a2b26ee22f62851127de612e9c18696c7db4ed06a244ce635b12cb89e2_arm64",
"8Base-RHACM-2.6:rhacm2/submariner-rhel8-operator@sha256:71a36fc0e726890c4a95668d10f024cd31168c26d00d7a22b9f3e26a811af803_amd64",
"8Base-RHACM-2.6:rhacm2/submariner-rhel8-operator@sha256:db99ef3c89ac45501a7b7fc64c6f853df5f781b2200a758e71debc4dadaf2fef_arm64",
"8Base-RHACM-2.6:rhacm2/submariner-rhel8-operator@sha256:e54bed5d1233969accf57b3b11f4d934040d7d408440d900d071f8919b60affa_ppc64le",
"8Base-RHACM-2.6:rhacm2/submariner-rhel8-operator@sha256:fc6f14a4af741d3de8c0de1859fc0925d66673b5b7ced139b758b51a52307c5a_s390x",
"8Base-RHACM-2.6:rhacm2/submariner-route-agent-rhel8@sha256:007edcf9dd166ec8c1b30f60755bcfe02dee03c2d8e539fba06615b8a3eefd58_arm64",
"8Base-RHACM-2.6:rhacm2/submariner-route-agent-rhel8@sha256:0b40af2abd40a0d9220fd7311770cbbf0dddbc58b5347399c13fa92dae8dc2be_s390x",
"8Base-RHACM-2.6:rhacm2/submariner-route-agent-rhel8@sha256:a08eecb9e361d8466db2adeafdf203fdc199a9d269910741909f73c341b28f4a_ppc64le",
"8Base-RHACM-2.6:rhacm2/submariner-route-agent-rhel8@sha256:bb96dde2023a0b8a0d8b33095374ddcc828de182f04033253e716d584c8db623_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:0795"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"8Base-RHACM-2.6:rhacm2/lighthouse-agent-rhel8@sha256:44576acbfff4321af54d8a8c15b0122d28ffbec8b88ebbdd32ed2dca3d4397c3_arm64",
"8Base-RHACM-2.6:rhacm2/lighthouse-agent-rhel8@sha256:6f8f3c288619a58ac723cde85df5232efac7f5ccfd516cb3996b35304d11e7f5_amd64",
"8Base-RHACM-2.6:rhacm2/lighthouse-agent-rhel8@sha256:c45d4a19f6492a1d2d72375c12d3dfc8a7a2349ccc8b581ad7df299bd63ae0a9_ppc64le",
"8Base-RHACM-2.6:rhacm2/lighthouse-agent-rhel8@sha256:fde7510f372c447d265b01dcd0e36c7e53f0be4ab109b3d4a81b3dd857d3a127_s390x",
"8Base-RHACM-2.6:rhacm2/lighthouse-coredns-rhel8@sha256:3e4d5bf90e110c3cf3e988f572d227575727bf1769c02d132272b5ff5051cfb8_arm64",
"8Base-RHACM-2.6:rhacm2/lighthouse-coredns-rhel8@sha256:3ee425b4f78fe809d50967ae7c66af42c894a1fec5ef194d17eae9fdf5902913_amd64",
"8Base-RHACM-2.6:rhacm2/lighthouse-coredns-rhel8@sha256:a842e4824cd39bc438c38889896dd33372b644968b5e29b614c9529b2e0696cc_ppc64le",
"8Base-RHACM-2.6:rhacm2/lighthouse-coredns-rhel8@sha256:e90e99636dce63fdc6323203694eac2aea9d7e2a0578ed444fce67144838b7ca_s390x",
"8Base-RHACM-2.6:rhacm2/nettest-rhel8@sha256:623848329900b7fe55763dd08bacb5fde147f0b9e8b77487f1b99a8b713d309e_ppc64le",
"8Base-RHACM-2.6:rhacm2/nettest-rhel8@sha256:84cb8594ccf7876483cee84195d704d34721f566e6a36070f7eecaca10fb2c88_s390x",
"8Base-RHACM-2.6:rhacm2/nettest-rhel8@sha256:a1197fa88e7cbaac9c4c80e13d39eda732d9ff09579d7d2e96a96bb5c005e695_arm64",
"8Base-RHACM-2.6:rhacm2/nettest-rhel8@sha256:b674ef3a8a7e20b085ceeb9be1f536e0bc0f94dec384e88569105c865fdae224_amd64",
"8Base-RHACM-2.6:rhacm2/subctl-rhel8@sha256:18b4fa76cfef84236c8453eb0cd6b1c67d1017732fa1d5722931d8616c365cfe_s390x",
"8Base-RHACM-2.6:rhacm2/subctl-rhel8@sha256:1f4051093fb1128e7266a4baff92bb7e9864825d51947265bed4ae7c20a3f99c_arm64",
"8Base-RHACM-2.6:rhacm2/subctl-rhel8@sha256:2e17954946ea1fd3ec53791a1b6dfdfb59be7c24fd78816b0ba721c069350c38_ppc64le",
"8Base-RHACM-2.6:rhacm2/subctl-rhel8@sha256:dc61ab7c1ad6478e9bb30b36a2a356c5ec137bc0d5109e03ba57a76081015715_amd64",
"8Base-RHACM-2.6:rhacm2/submariner-gateway-rhel8@sha256:1abe2013043c37997233ed7d8785c4607be1f21ed25f130f2141f8a771f0e9d5_ppc64le",
"8Base-RHACM-2.6:rhacm2/submariner-gateway-rhel8@sha256:5100f65e2591023eb9da4512b464c49bbf7f56d1a78587e5da790d6cb52cfd7c_s390x",
"8Base-RHACM-2.6:rhacm2/submariner-gateway-rhel8@sha256:5cd02e62ae81fea9887c484b4b4f52712b3cdfe0bff8a826e2c1c8e813df50bf_arm64",
"8Base-RHACM-2.6:rhacm2/submariner-gateway-rhel8@sha256:93b7d3fbd69a47187a595e09324ef603d8e0c808c99961719a56029776a25dfb_amd64",
"8Base-RHACM-2.6:rhacm2/submariner-globalnet-rhel8@sha256:2bc43c6e55f35522be8752d1ae9eb24637a0926f91fa0f6cbf670f23a61b7840_amd64",
"8Base-RHACM-2.6:rhacm2/submariner-globalnet-rhel8@sha256:4ee144a663c95a2fcc1fbfc0b308cf7033a5ded97a28a5aec9f35250df812661_ppc64le",
"8Base-RHACM-2.6:rhacm2/submariner-globalnet-rhel8@sha256:dc50bdc2082127c9df0da5b539ac61d244250eb93d7fcfd3a9d2fdbb10603695_arm64",
"8Base-RHACM-2.6:rhacm2/submariner-globalnet-rhel8@sha256:fb728331ee01f6fb72a54b5c5b5886ec08f014a384c1b49beec692439ec59630_s390x",
"8Base-RHACM-2.6:rhacm2/submariner-networkplugin-syncer-rhel8@sha256:1ef8557fc7489a74092c22e5cf96ebbec1575f72177534de2ae095ab96927a5a_ppc64le",
"8Base-RHACM-2.6:rhacm2/submariner-networkplugin-syncer-rhel8@sha256:50281b32dc626b66b8b38bc3fa97d799ab13b66029768e60c06d3fa5d9a29bf1_s390x",
"8Base-RHACM-2.6:rhacm2/submariner-networkplugin-syncer-rhel8@sha256:511362c4a5dfa734d0015a355185a86ba6c00a0466f5fb1b469fa00e07858c82_amd64",
"8Base-RHACM-2.6:rhacm2/submariner-networkplugin-syncer-rhel8@sha256:7076fac5d7944c7d4a0fa0e89629372466baf9fc5b4b8e5c31cc71b80fac9a69_arm64",
"8Base-RHACM-2.6:rhacm2/submariner-operator-bundle@sha256:1e3de5b269f4454e822201ea7666bacab9c2962f454368b1967dd583cab5c9bc_ppc64le",
"8Base-RHACM-2.6:rhacm2/submariner-operator-bundle@sha256:2d28ae6efe8ba1999f5ae960cc1799465188b03514697c0192be53c4a7d1e8f2_s390x",
"8Base-RHACM-2.6:rhacm2/submariner-operator-bundle@sha256:4c9802569b6aad59f01718b5c692f32e3a9a9b35b7b82e69fed5e1f9573dbc17_amd64",
"8Base-RHACM-2.6:rhacm2/submariner-operator-bundle@sha256:7dacd7a2b26ee22f62851127de612e9c18696c7db4ed06a244ce635b12cb89e2_arm64",
"8Base-RHACM-2.6:rhacm2/submariner-rhel8-operator@sha256:71a36fc0e726890c4a95668d10f024cd31168c26d00d7a22b9f3e26a811af803_amd64",
"8Base-RHACM-2.6:rhacm2/submariner-rhel8-operator@sha256:db99ef3c89ac45501a7b7fc64c6f853df5f781b2200a758e71debc4dadaf2fef_arm64",
"8Base-RHACM-2.6:rhacm2/submariner-rhel8-operator@sha256:e54bed5d1233969accf57b3b11f4d934040d7d408440d900d071f8919b60affa_ppc64le",
"8Base-RHACM-2.6:rhacm2/submariner-rhel8-operator@sha256:fc6f14a4af741d3de8c0de1859fc0925d66673b5b7ced139b758b51a52307c5a_s390x",
"8Base-RHACM-2.6:rhacm2/submariner-route-agent-rhel8@sha256:007edcf9dd166ec8c1b30f60755bcfe02dee03c2d8e539fba06615b8a3eefd58_arm64",
"8Base-RHACM-2.6:rhacm2/submariner-route-agent-rhel8@sha256:0b40af2abd40a0d9220fd7311770cbbf0dddbc58b5347399c13fa92dae8dc2be_s390x",
"8Base-RHACM-2.6:rhacm2/submariner-route-agent-rhel8@sha256:a08eecb9e361d8466db2adeafdf203fdc199a9d269910741909f73c341b28f4a_ppc64le",
"8Base-RHACM-2.6:rhacm2/submariner-route-agent-rhel8@sha256:bb96dde2023a0b8a0d8b33095374ddcc828de182f04033253e716d584c8db623_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "golang: golang.org/x/text/language: ParseAcceptLanguage takes a long time to parse complex tags"
}
]
}
rhsa-2023_0693
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "The Migration Toolkit for Containers (MTC) 1.7.7 is now available.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The Migration Toolkit for Containers (MTC) enables you to migrate Kubernetes resources, persistent volume data, and internal container images between OpenShift Container Platform clusters, using the MTC web console or the Kubernetes API.\n\nSecurity Fix(es) from Bugzilla:\n\n* async: Prototype Pollution in async (CVE-2021-43138)\n\n* golang: archive/tar: unbounded memory consumption when reading headers (CVE-2022-2879)\n\n* golang: net/http/httputil: ReverseProxy should not forward unparseable query parameters (CVE-2022-2880)\n\n* golang: net/http: handle server errors after sending GOAWAY (CVE-2022-27664)\n\n* golang: golang.org/x/text/language: ParseAcceptLanguage takes a long time to parse complex tags (CVE-2022-32149)\n\n* golang: net/url: JoinPath does not strip relative path components in all circumstances (CVE-2022-32190)\n\n* golang: regexp/syntax: limit memory used by parsing regexps (CVE-2022-41715)\n\n* golang: net/http: An attacker can cause excessive memory growth in a Go server accepting HTTP/2 requests (CVE-2022-41717)\n\n* golang: math/big: decoding big.Float and big.Rat types can panic if the encoded message is too short, potentially allowing a denial of service (CVE-2022-32189)\n\nFor more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2023:0693",
"url": "https://access.redhat.com/errata/RHSA-2023:0693"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#moderate",
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "2113814",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2113814"
},
{
"category": "external",
"summary": "2124668",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2124668"
},
{
"category": "external",
"summary": "2124669",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2124669"
},
{
"category": "external",
"summary": "2126276",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2126276"
},
{
"category": "external",
"summary": "2132867",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2132867"
},
{
"category": "external",
"summary": "2132868",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2132868"
},
{
"category": "external",
"summary": "2132872",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2132872"
},
{
"category": "external",
"summary": "2134010",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2134010"
},
{
"category": "external",
"summary": "2160662",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2160662"
},
{
"category": "external",
"summary": "2161274",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2161274"
},
{
"category": "external",
"summary": "MIG-1275",
"url": "https://issues.redhat.com/browse/MIG-1275"
},
{
"category": "external",
"summary": "MIG-1281",
"url": "https://issues.redhat.com/browse/MIG-1281"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2023/rhsa-2023_0693.json"
}
],
"title": "Red Hat Security Advisory: Migration Toolkit for Containers (MTC) 1.7.7 security and bug fix update",
"tracking": {
"current_release_date": "2025-01-06T19:22:57+00:00",
"generator": {
"date": "2025-01-06T19:22:57+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.5"
}
},
"id": "RHSA-2023:0693",
"initial_release_date": "2023-02-09T02:17:22+00:00",
"revision_history": [
{
"date": "2023-02-09T02:17:22+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2023-02-09T02:17:22+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-01-06T19:22:57+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "8Base-RHMTC-1.7",
"product": {
"name": "8Base-RHMTC-1.7",
"product_id": "8Base-RHMTC-1.7",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhmt:1.7::el8"
}
}
}
],
"category": "product_family",
"name": "Red Hat Migration Toolkit"
},
{
"branches": [
{
"category": "product_version",
"name": "rhmtc/openshift-migration-controller-rhel8@sha256:362eb32d0d2607f72b4f425dabaea7cde5d292ac41aea0c18c78bc6e408fff9e_amd64",
"product": {
"name": "rhmtc/openshift-migration-controller-rhel8@sha256:362eb32d0d2607f72b4f425dabaea7cde5d292ac41aea0c18c78bc6e408fff9e_amd64",
"product_id": "rhmtc/openshift-migration-controller-rhel8@sha256:362eb32d0d2607f72b4f425dabaea7cde5d292ac41aea0c18c78bc6e408fff9e_amd64",
"product_identification_helper": {
"purl": "pkg:oci/openshift-migration-controller-rhel8@sha256:362eb32d0d2607f72b4f425dabaea7cde5d292ac41aea0c18c78bc6e408fff9e?arch=amd64\u0026repository_url=registry.redhat.io/rhmtc/openshift-migration-controller-rhel8\u0026tag=v1.7.7-4"
}
}
},
{
"category": "product_version",
"name": "rhmtc/openshift-migration-hook-runner-rhel8@sha256:aa63717ac3a4961e774ed0baa3a73f01eda185516e7380579d97b9d25764d10d_amd64",
"product": {
"name": "rhmtc/openshift-migration-hook-runner-rhel8@sha256:aa63717ac3a4961e774ed0baa3a73f01eda185516e7380579d97b9d25764d10d_amd64",
"product_id": "rhmtc/openshift-migration-hook-runner-rhel8@sha256:aa63717ac3a4961e774ed0baa3a73f01eda185516e7380579d97b9d25764d10d_amd64",
"product_identification_helper": {
"purl": "pkg:oci/openshift-migration-hook-runner-rhel8@sha256:aa63717ac3a4961e774ed0baa3a73f01eda185516e7380579d97b9d25764d10d?arch=amd64\u0026repository_url=registry.redhat.io/rhmtc/openshift-migration-hook-runner-rhel8\u0026tag=v1.7.7-3"
}
}
},
{
"category": "product_version",
"name": "rhmtc/openshift-migration-legacy-rhel8-operator@sha256:1ac9cdfbdce8f7b6e4ebf5e40013f766b71b6dd604c92f602aca96612a228eda_amd64",
"product": {
"name": "rhmtc/openshift-migration-legacy-rhel8-operator@sha256:1ac9cdfbdce8f7b6e4ebf5e40013f766b71b6dd604c92f602aca96612a228eda_amd64",
"product_id": "rhmtc/openshift-migration-legacy-rhel8-operator@sha256:1ac9cdfbdce8f7b6e4ebf5e40013f766b71b6dd604c92f602aca96612a228eda_amd64",
"product_identification_helper": {
"purl": "pkg:oci/openshift-migration-legacy-rhel8-operator@sha256:1ac9cdfbdce8f7b6e4ebf5e40013f766b71b6dd604c92f602aca96612a228eda?arch=amd64\u0026repository_url=registry.redhat.io/rhmtc/openshift-migration-legacy-rhel8-operator\u0026tag=v1.7.7-9"
}
}
},
{
"category": "product_version",
"name": "rhmtc/openshift-migration-log-reader-rhel8@sha256:d89e9ef65993466d25b26702d0210c14ce191155501774f4d2f1f08dbdad9804_amd64",
"product": {
"name": "rhmtc/openshift-migration-log-reader-rhel8@sha256:d89e9ef65993466d25b26702d0210c14ce191155501774f4d2f1f08dbdad9804_amd64",
"product_id": "rhmtc/openshift-migration-log-reader-rhel8@sha256:d89e9ef65993466d25b26702d0210c14ce191155501774f4d2f1f08dbdad9804_amd64",
"product_identification_helper": {
"purl": "pkg:oci/openshift-migration-log-reader-rhel8@sha256:d89e9ef65993466d25b26702d0210c14ce191155501774f4d2f1f08dbdad9804?arch=amd64\u0026repository_url=registry.redhat.io/rhmtc/openshift-migration-log-reader-rhel8\u0026tag=v1.7.7-3"
}
}
},
{
"category": "product_version",
"name": "rhmtc/openshift-migration-must-gather-rhel8@sha256:5acf34dc4041b694b452d46c2f656db566241773285ca305a79ab7b9dc087b43_amd64",
"product": {
"name": "rhmtc/openshift-migration-must-gather-rhel8@sha256:5acf34dc4041b694b452d46c2f656db566241773285ca305a79ab7b9dc087b43_amd64",
"product_id": "rhmtc/openshift-migration-must-gather-rhel8@sha256:5acf34dc4041b694b452d46c2f656db566241773285ca305a79ab7b9dc087b43_amd64",
"product_identification_helper": {
"purl": "pkg:oci/openshift-migration-must-gather-rhel8@sha256:5acf34dc4041b694b452d46c2f656db566241773285ca305a79ab7b9dc087b43?arch=amd64\u0026repository_url=registry.redhat.io/rhmtc/openshift-migration-must-gather-rhel8\u0026tag=v1.7.7-4"
}
}
},
{
"category": "product_version",
"name": "rhmtc/openshift-migration-openvpn-rhel8@sha256:15df7304827ce49d422554551f08d99cfffa1afc4ffacac145d4399ccb1cbd68_amd64",
"product": {
"name": "rhmtc/openshift-migration-openvpn-rhel8@sha256:15df7304827ce49d422554551f08d99cfffa1afc4ffacac145d4399ccb1cbd68_amd64",
"product_id": "rhmtc/openshift-migration-openvpn-rhel8@sha256:15df7304827ce49d422554551f08d99cfffa1afc4ffacac145d4399ccb1cbd68_amd64",
"product_identification_helper": {
"purl": "pkg:oci/openshift-migration-openvpn-rhel8@sha256:15df7304827ce49d422554551f08d99cfffa1afc4ffacac145d4399ccb1cbd68?arch=amd64\u0026repository_url=registry.redhat.io/rhmtc/openshift-migration-openvpn-rhel8\u0026tag=v1.7.7-2"
}
}
},
{
"category": "product_version",
"name": "rhmtc/openshift-migration-rhel8-operator@sha256:aaaf4f6095294b497889749390f0a3aac04b83131a423799c44b5e367e0b370a_amd64",
"product": {
"name": "rhmtc/openshift-migration-rhel8-operator@sha256:aaaf4f6095294b497889749390f0a3aac04b83131a423799c44b5e367e0b370a_amd64",
"product_id": "rhmtc/openshift-migration-rhel8-operator@sha256:aaaf4f6095294b497889749390f0a3aac04b83131a423799c44b5e367e0b370a_amd64",
"product_identification_helper": {
"purl": "pkg:oci/openshift-migration-rhel8-operator@sha256:aaaf4f6095294b497889749390f0a3aac04b83131a423799c44b5e367e0b370a?arch=amd64\u0026repository_url=registry.redhat.io/rhmtc/openshift-migration-rhel8-operator\u0026tag=v1.7.7-9"
}
}
},
{
"category": "product_version",
"name": "rhmtc/openshift-migration-operator-bundle@sha256:90ed03a5e0cb0b0ffd85f7434cc4eda9bd8fe81cd90b597772d9b7caccd4b80f_amd64",
"product": {
"name": "rhmtc/openshift-migration-operator-bundle@sha256:90ed03a5e0cb0b0ffd85f7434cc4eda9bd8fe81cd90b597772d9b7caccd4b80f_amd64",
"product_id": "rhmtc/openshift-migration-operator-bundle@sha256:90ed03a5e0cb0b0ffd85f7434cc4eda9bd8fe81cd90b597772d9b7caccd4b80f_amd64",
"product_identification_helper": {
"purl": "pkg:oci/openshift-migration-operator-bundle@sha256:90ed03a5e0cb0b0ffd85f7434cc4eda9bd8fe81cd90b597772d9b7caccd4b80f?arch=amd64\u0026repository_url=registry.redhat.io/rhmtc/openshift-migration-operator-bundle\u0026tag=v1.7.7-9"
}
}
},
{
"category": "product_version",
"name": "rhmtc/openshift-migration-registry-rhel8@sha256:aaa03ef0769d38185675db2a7a78454659de14bdebe5ff842614bf2124e5adfe_amd64",
"product": {
"name": "rhmtc/openshift-migration-registry-rhel8@sha256:aaa03ef0769d38185675db2a7a78454659de14bdebe5ff842614bf2124e5adfe_amd64",
"product_id": "rhmtc/openshift-migration-registry-rhel8@sha256:aaa03ef0769d38185675db2a7a78454659de14bdebe5ff842614bf2124e5adfe_amd64",
"product_identification_helper": {
"purl": "pkg:oci/openshift-migration-registry-rhel8@sha256:aaa03ef0769d38185675db2a7a78454659de14bdebe5ff842614bf2124e5adfe?arch=amd64\u0026repository_url=registry.redhat.io/rhmtc/openshift-migration-registry-rhel8\u0026tag=v1.7.7-3"
}
}
},
{
"category": "product_version",
"name": "rhmtc/openshift-migration-rsync-transfer-rhel8@sha256:58bd4ffc3e9599401251ac929cf15c1773ecc03a57177118adbe23ac8d7762af_amd64",
"product": {
"name": "rhmtc/openshift-migration-rsync-transfer-rhel8@sha256:58bd4ffc3e9599401251ac929cf15c1773ecc03a57177118adbe23ac8d7762af_amd64",
"product_id": "rhmtc/openshift-migration-rsync-transfer-rhel8@sha256:58bd4ffc3e9599401251ac929cf15c1773ecc03a57177118adbe23ac8d7762af_amd64",
"product_identification_helper": {
"purl": "pkg:oci/openshift-migration-rsync-transfer-rhel8@sha256:58bd4ffc3e9599401251ac929cf15c1773ecc03a57177118adbe23ac8d7762af?arch=amd64\u0026repository_url=registry.redhat.io/rhmtc/openshift-migration-rsync-transfer-rhel8\u0026tag=v1.7.7-2"
}
}
},
{
"category": "product_version",
"name": "rhmtc/openshift-migration-ui-rhel8@sha256:4141db5099ae659270297eb4aaff695ac43fce67d91fea49dbc76583f419d3a1_amd64",
"product": {
"name": "rhmtc/openshift-migration-ui-rhel8@sha256:4141db5099ae659270297eb4aaff695ac43fce67d91fea49dbc76583f419d3a1_amd64",
"product_id": "rhmtc/openshift-migration-ui-rhel8@sha256:4141db5099ae659270297eb4aaff695ac43fce67d91fea49dbc76583f419d3a1_amd64",
"product_identification_helper": {
"purl": "pkg:oci/openshift-migration-ui-rhel8@sha256:4141db5099ae659270297eb4aaff695ac43fce67d91fea49dbc76583f419d3a1?arch=amd64\u0026repository_url=registry.redhat.io/rhmtc/openshift-migration-ui-rhel8\u0026tag=v1.7.7-3"
}
}
},
{
"category": "product_version",
"name": "rhmtc/openshift-migration-velero-rhel8@sha256:1ca6945c3918f1743a4cee86a507f9f6581c8f8e572b6b8739d79a675a64d1db_amd64",
"product": {
"name": "rhmtc/openshift-migration-velero-rhel8@sha256:1ca6945c3918f1743a4cee86a507f9f6581c8f8e572b6b8739d79a675a64d1db_amd64",
"product_id": "rhmtc/openshift-migration-velero-rhel8@sha256:1ca6945c3918f1743a4cee86a507f9f6581c8f8e572b6b8739d79a675a64d1db_amd64",
"product_identification_helper": {
"purl": "pkg:oci/openshift-migration-velero-rhel8@sha256:1ca6945c3918f1743a4cee86a507f9f6581c8f8e572b6b8739d79a675a64d1db?arch=amd64\u0026repository_url=registry.redhat.io/rhmtc/openshift-migration-velero-rhel8\u0026tag=v1.7.7-5"
}
}
},
{
"category": "product_version",
"name": "rhmtc/openshift-migration-velero-plugin-for-aws-rhel8@sha256:633eeb0b6b50e21bbc0fb12fd2262294733fc9ac8b1e9eedcdb9d1433534d88d_amd64",
"product": {
"name": "rhmtc/openshift-migration-velero-plugin-for-aws-rhel8@sha256:633eeb0b6b50e21bbc0fb12fd2262294733fc9ac8b1e9eedcdb9d1433534d88d_amd64",
"product_id": "rhmtc/openshift-migration-velero-plugin-for-aws-rhel8@sha256:633eeb0b6b50e21bbc0fb12fd2262294733fc9ac8b1e9eedcdb9d1433534d88d_amd64",
"product_identification_helper": {
"purl": "pkg:oci/openshift-migration-velero-plugin-for-aws-rhel8@sha256:633eeb0b6b50e21bbc0fb12fd2262294733fc9ac8b1e9eedcdb9d1433534d88d?arch=amd64\u0026repository_url=registry.redhat.io/rhmtc/openshift-migration-velero-plugin-for-aws-rhel8\u0026tag=v1.7.7-3"
}
}
},
{
"category": "product_version",
"name": "rhmtc/openshift-migration-velero-plugin-for-gcp-rhel8@sha256:19dbf2bb83f8a0f35079d6ae25f8fcddad970e48ecb21694fd2d4c553313e4aa_amd64",
"product": {
"name": "rhmtc/openshift-migration-velero-plugin-for-gcp-rhel8@sha256:19dbf2bb83f8a0f35079d6ae25f8fcddad970e48ecb21694fd2d4c553313e4aa_amd64",
"product_id": "rhmtc/openshift-migration-velero-plugin-for-gcp-rhel8@sha256:19dbf2bb83f8a0f35079d6ae25f8fcddad970e48ecb21694fd2d4c553313e4aa_amd64",
"product_identification_helper": {
"purl": "pkg:oci/openshift-migration-velero-plugin-for-gcp-rhel8@sha256:19dbf2bb83f8a0f35079d6ae25f8fcddad970e48ecb21694fd2d4c553313e4aa?arch=amd64\u0026repository_url=registry.redhat.io/rhmtc/openshift-migration-velero-plugin-for-gcp-rhel8\u0026tag=v1.7.7-3"
}
}
},
{
"category": "product_version",
"name": "rhmtc/openshift-migration-velero-plugin-for-microsoft-azure-rhel8@sha256:93e95f065eadaa41154b9012dd5ddc824607758e2bce85c4256c2689125b80a4_amd64",
"product": {
"name": "rhmtc/openshift-migration-velero-plugin-for-microsoft-azure-rhel8@sha256:93e95f065eadaa41154b9012dd5ddc824607758e2bce85c4256c2689125b80a4_amd64",
"product_id": "rhmtc/openshift-migration-velero-plugin-for-microsoft-azure-rhel8@sha256:93e95f065eadaa41154b9012dd5ddc824607758e2bce85c4256c2689125b80a4_amd64",
"product_identification_helper": {
"purl": "pkg:oci/openshift-migration-velero-plugin-for-microsoft-azure-rhel8@sha256:93e95f065eadaa41154b9012dd5ddc824607758e2bce85c4256c2689125b80a4?arch=amd64\u0026repository_url=registry.redhat.io/rhmtc/openshift-migration-velero-plugin-for-microsoft-azure-rhel8\u0026tag=v1.7.7-3"
}
}
},
{
"category": "product_version",
"name": "rhmtc/openshift-migration-velero-restic-restore-helper-rhel8@sha256:70d3d46f54b91538e047df62e7e5b161fabac195a2f2e45cdba78215b4c82a7d_amd64",
"product": {
"name": "rhmtc/openshift-migration-velero-restic-restore-helper-rhel8@sha256:70d3d46f54b91538e047df62e7e5b161fabac195a2f2e45cdba78215b4c82a7d_amd64",
"product_id": "rhmtc/openshift-migration-velero-restic-restore-helper-rhel8@sha256:70d3d46f54b91538e047df62e7e5b161fabac195a2f2e45cdba78215b4c82a7d_amd64",
"product_identification_helper": {
"purl": "pkg:oci/openshift-migration-velero-restic-restore-helper-rhel8@sha256:70d3d46f54b91538e047df62e7e5b161fabac195a2f2e45cdba78215b4c82a7d?arch=amd64\u0026repository_url=registry.redhat.io/rhmtc/openshift-migration-velero-restic-restore-helper-rhel8\u0026tag=v1.7.7-5"
}
}
},
{
"category": "product_version",
"name": "rhmtc/openshift-velero-plugin-rhel8@sha256:26f8fb5c41ece82626325ba502505ba1ca7986602cc147b492f9857caa0be868_amd64",
"product": {
"name": "rhmtc/openshift-velero-plugin-rhel8@sha256:26f8fb5c41ece82626325ba502505ba1ca7986602cc147b492f9857caa0be868_amd64",
"product_id": "rhmtc/openshift-velero-plugin-rhel8@sha256:26f8fb5c41ece82626325ba502505ba1ca7986602cc147b492f9857caa0be868_amd64",
"product_identification_helper": {
"purl": "pkg:oci/openshift-velero-plugin-rhel8@sha256:26f8fb5c41ece82626325ba502505ba1ca7986602cc147b492f9857caa0be868?arch=amd64\u0026repository_url=registry.redhat.io/rhmtc/openshift-velero-plugin-rhel8\u0026tag=v1.7.7-3"
}
}
}
],
"category": "architecture",
"name": "amd64"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "rhmtc/openshift-migration-controller-rhel8@sha256:362eb32d0d2607f72b4f425dabaea7cde5d292ac41aea0c18c78bc6e408fff9e_amd64 as a component of 8Base-RHMTC-1.7",
"product_id": "8Base-RHMTC-1.7:rhmtc/openshift-migration-controller-rhel8@sha256:362eb32d0d2607f72b4f425dabaea7cde5d292ac41aea0c18c78bc6e408fff9e_amd64"
},
"product_reference": "rhmtc/openshift-migration-controller-rhel8@sha256:362eb32d0d2607f72b4f425dabaea7cde5d292ac41aea0c18c78bc6e408fff9e_amd64",
"relates_to_product_reference": "8Base-RHMTC-1.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhmtc/openshift-migration-hook-runner-rhel8@sha256:aa63717ac3a4961e774ed0baa3a73f01eda185516e7380579d97b9d25764d10d_amd64 as a component of 8Base-RHMTC-1.7",
"product_id": "8Base-RHMTC-1.7:rhmtc/openshift-migration-hook-runner-rhel8@sha256:aa63717ac3a4961e774ed0baa3a73f01eda185516e7380579d97b9d25764d10d_amd64"
},
"product_reference": "rhmtc/openshift-migration-hook-runner-rhel8@sha256:aa63717ac3a4961e774ed0baa3a73f01eda185516e7380579d97b9d25764d10d_amd64",
"relates_to_product_reference": "8Base-RHMTC-1.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhmtc/openshift-migration-legacy-rhel8-operator@sha256:1ac9cdfbdce8f7b6e4ebf5e40013f766b71b6dd604c92f602aca96612a228eda_amd64 as a component of 8Base-RHMTC-1.7",
"product_id": "8Base-RHMTC-1.7:rhmtc/openshift-migration-legacy-rhel8-operator@sha256:1ac9cdfbdce8f7b6e4ebf5e40013f766b71b6dd604c92f602aca96612a228eda_amd64"
},
"product_reference": "rhmtc/openshift-migration-legacy-rhel8-operator@sha256:1ac9cdfbdce8f7b6e4ebf5e40013f766b71b6dd604c92f602aca96612a228eda_amd64",
"relates_to_product_reference": "8Base-RHMTC-1.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhmtc/openshift-migration-log-reader-rhel8@sha256:d89e9ef65993466d25b26702d0210c14ce191155501774f4d2f1f08dbdad9804_amd64 as a component of 8Base-RHMTC-1.7",
"product_id": "8Base-RHMTC-1.7:rhmtc/openshift-migration-log-reader-rhel8@sha256:d89e9ef65993466d25b26702d0210c14ce191155501774f4d2f1f08dbdad9804_amd64"
},
"product_reference": "rhmtc/openshift-migration-log-reader-rhel8@sha256:d89e9ef65993466d25b26702d0210c14ce191155501774f4d2f1f08dbdad9804_amd64",
"relates_to_product_reference": "8Base-RHMTC-1.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhmtc/openshift-migration-must-gather-rhel8@sha256:5acf34dc4041b694b452d46c2f656db566241773285ca305a79ab7b9dc087b43_amd64 as a component of 8Base-RHMTC-1.7",
"product_id": "8Base-RHMTC-1.7:rhmtc/openshift-migration-must-gather-rhel8@sha256:5acf34dc4041b694b452d46c2f656db566241773285ca305a79ab7b9dc087b43_amd64"
},
"product_reference": "rhmtc/openshift-migration-must-gather-rhel8@sha256:5acf34dc4041b694b452d46c2f656db566241773285ca305a79ab7b9dc087b43_amd64",
"relates_to_product_reference": "8Base-RHMTC-1.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhmtc/openshift-migration-openvpn-rhel8@sha256:15df7304827ce49d422554551f08d99cfffa1afc4ffacac145d4399ccb1cbd68_amd64 as a component of 8Base-RHMTC-1.7",
"product_id": "8Base-RHMTC-1.7:rhmtc/openshift-migration-openvpn-rhel8@sha256:15df7304827ce49d422554551f08d99cfffa1afc4ffacac145d4399ccb1cbd68_amd64"
},
"product_reference": "rhmtc/openshift-migration-openvpn-rhel8@sha256:15df7304827ce49d422554551f08d99cfffa1afc4ffacac145d4399ccb1cbd68_amd64",
"relates_to_product_reference": "8Base-RHMTC-1.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhmtc/openshift-migration-operator-bundle@sha256:90ed03a5e0cb0b0ffd85f7434cc4eda9bd8fe81cd90b597772d9b7caccd4b80f_amd64 as a component of 8Base-RHMTC-1.7",
"product_id": "8Base-RHMTC-1.7:rhmtc/openshift-migration-operator-bundle@sha256:90ed03a5e0cb0b0ffd85f7434cc4eda9bd8fe81cd90b597772d9b7caccd4b80f_amd64"
},
"product_reference": "rhmtc/openshift-migration-operator-bundle@sha256:90ed03a5e0cb0b0ffd85f7434cc4eda9bd8fe81cd90b597772d9b7caccd4b80f_amd64",
"relates_to_product_reference": "8Base-RHMTC-1.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhmtc/openshift-migration-registry-rhel8@sha256:aaa03ef0769d38185675db2a7a78454659de14bdebe5ff842614bf2124e5adfe_amd64 as a component of 8Base-RHMTC-1.7",
"product_id": "8Base-RHMTC-1.7:rhmtc/openshift-migration-registry-rhel8@sha256:aaa03ef0769d38185675db2a7a78454659de14bdebe5ff842614bf2124e5adfe_amd64"
},
"product_reference": "rhmtc/openshift-migration-registry-rhel8@sha256:aaa03ef0769d38185675db2a7a78454659de14bdebe5ff842614bf2124e5adfe_amd64",
"relates_to_product_reference": "8Base-RHMTC-1.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhmtc/openshift-migration-rhel8-operator@sha256:aaaf4f6095294b497889749390f0a3aac04b83131a423799c44b5e367e0b370a_amd64 as a component of 8Base-RHMTC-1.7",
"product_id": "8Base-RHMTC-1.7:rhmtc/openshift-migration-rhel8-operator@sha256:aaaf4f6095294b497889749390f0a3aac04b83131a423799c44b5e367e0b370a_amd64"
},
"product_reference": "rhmtc/openshift-migration-rhel8-operator@sha256:aaaf4f6095294b497889749390f0a3aac04b83131a423799c44b5e367e0b370a_amd64",
"relates_to_product_reference": "8Base-RHMTC-1.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhmtc/openshift-migration-rsync-transfer-rhel8@sha256:58bd4ffc3e9599401251ac929cf15c1773ecc03a57177118adbe23ac8d7762af_amd64 as a component of 8Base-RHMTC-1.7",
"product_id": "8Base-RHMTC-1.7:rhmtc/openshift-migration-rsync-transfer-rhel8@sha256:58bd4ffc3e9599401251ac929cf15c1773ecc03a57177118adbe23ac8d7762af_amd64"
},
"product_reference": "rhmtc/openshift-migration-rsync-transfer-rhel8@sha256:58bd4ffc3e9599401251ac929cf15c1773ecc03a57177118adbe23ac8d7762af_amd64",
"relates_to_product_reference": "8Base-RHMTC-1.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhmtc/openshift-migration-ui-rhel8@sha256:4141db5099ae659270297eb4aaff695ac43fce67d91fea49dbc76583f419d3a1_amd64 as a component of 8Base-RHMTC-1.7",
"product_id": "8Base-RHMTC-1.7:rhmtc/openshift-migration-ui-rhel8@sha256:4141db5099ae659270297eb4aaff695ac43fce67d91fea49dbc76583f419d3a1_amd64"
},
"product_reference": "rhmtc/openshift-migration-ui-rhel8@sha256:4141db5099ae659270297eb4aaff695ac43fce67d91fea49dbc76583f419d3a1_amd64",
"relates_to_product_reference": "8Base-RHMTC-1.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhmtc/openshift-migration-velero-plugin-for-aws-rhel8@sha256:633eeb0b6b50e21bbc0fb12fd2262294733fc9ac8b1e9eedcdb9d1433534d88d_amd64 as a component of 8Base-RHMTC-1.7",
"product_id": "8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-plugin-for-aws-rhel8@sha256:633eeb0b6b50e21bbc0fb12fd2262294733fc9ac8b1e9eedcdb9d1433534d88d_amd64"
},
"product_reference": "rhmtc/openshift-migration-velero-plugin-for-aws-rhel8@sha256:633eeb0b6b50e21bbc0fb12fd2262294733fc9ac8b1e9eedcdb9d1433534d88d_amd64",
"relates_to_product_reference": "8Base-RHMTC-1.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhmtc/openshift-migration-velero-plugin-for-gcp-rhel8@sha256:19dbf2bb83f8a0f35079d6ae25f8fcddad970e48ecb21694fd2d4c553313e4aa_amd64 as a component of 8Base-RHMTC-1.7",
"product_id": "8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-plugin-for-gcp-rhel8@sha256:19dbf2bb83f8a0f35079d6ae25f8fcddad970e48ecb21694fd2d4c553313e4aa_amd64"
},
"product_reference": "rhmtc/openshift-migration-velero-plugin-for-gcp-rhel8@sha256:19dbf2bb83f8a0f35079d6ae25f8fcddad970e48ecb21694fd2d4c553313e4aa_amd64",
"relates_to_product_reference": "8Base-RHMTC-1.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhmtc/openshift-migration-velero-plugin-for-microsoft-azure-rhel8@sha256:93e95f065eadaa41154b9012dd5ddc824607758e2bce85c4256c2689125b80a4_amd64 as a component of 8Base-RHMTC-1.7",
"product_id": "8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-plugin-for-microsoft-azure-rhel8@sha256:93e95f065eadaa41154b9012dd5ddc824607758e2bce85c4256c2689125b80a4_amd64"
},
"product_reference": "rhmtc/openshift-migration-velero-plugin-for-microsoft-azure-rhel8@sha256:93e95f065eadaa41154b9012dd5ddc824607758e2bce85c4256c2689125b80a4_amd64",
"relates_to_product_reference": "8Base-RHMTC-1.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhmtc/openshift-migration-velero-restic-restore-helper-rhel8@sha256:70d3d46f54b91538e047df62e7e5b161fabac195a2f2e45cdba78215b4c82a7d_amd64 as a component of 8Base-RHMTC-1.7",
"product_id": "8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-restic-restore-helper-rhel8@sha256:70d3d46f54b91538e047df62e7e5b161fabac195a2f2e45cdba78215b4c82a7d_amd64"
},
"product_reference": "rhmtc/openshift-migration-velero-restic-restore-helper-rhel8@sha256:70d3d46f54b91538e047df62e7e5b161fabac195a2f2e45cdba78215b4c82a7d_amd64",
"relates_to_product_reference": "8Base-RHMTC-1.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhmtc/openshift-migration-velero-rhel8@sha256:1ca6945c3918f1743a4cee86a507f9f6581c8f8e572b6b8739d79a675a64d1db_amd64 as a component of 8Base-RHMTC-1.7",
"product_id": "8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-rhel8@sha256:1ca6945c3918f1743a4cee86a507f9f6581c8f8e572b6b8739d79a675a64d1db_amd64"
},
"product_reference": "rhmtc/openshift-migration-velero-rhel8@sha256:1ca6945c3918f1743a4cee86a507f9f6581c8f8e572b6b8739d79a675a64d1db_amd64",
"relates_to_product_reference": "8Base-RHMTC-1.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhmtc/openshift-velero-plugin-rhel8@sha256:26f8fb5c41ece82626325ba502505ba1ca7986602cc147b492f9857caa0be868_amd64 as a component of 8Base-RHMTC-1.7",
"product_id": "8Base-RHMTC-1.7:rhmtc/openshift-velero-plugin-rhel8@sha256:26f8fb5c41ece82626325ba502505ba1ca7986602cc147b492f9857caa0be868_amd64"
},
"product_reference": "rhmtc/openshift-velero-plugin-rhel8@sha256:26f8fb5c41ece82626325ba502505ba1ca7986602cc147b492f9857caa0be868_amd64",
"relates_to_product_reference": "8Base-RHMTC-1.7"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2021-43138",
"cwe": {
"id": "CWE-1321",
"name": "Improperly Controlled Modification of Object Prototype Attributes (\u0027Prototype Pollution\u0027)"
},
"discovery_date": "2022-09-13T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-RHMTC-1.7:rhmtc/openshift-migration-controller-rhel8@sha256:362eb32d0d2607f72b4f425dabaea7cde5d292ac41aea0c18c78bc6e408fff9e_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-hook-runner-rhel8@sha256:aa63717ac3a4961e774ed0baa3a73f01eda185516e7380579d97b9d25764d10d_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-legacy-rhel8-operator@sha256:1ac9cdfbdce8f7b6e4ebf5e40013f766b71b6dd604c92f602aca96612a228eda_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-log-reader-rhel8@sha256:d89e9ef65993466d25b26702d0210c14ce191155501774f4d2f1f08dbdad9804_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-must-gather-rhel8@sha256:5acf34dc4041b694b452d46c2f656db566241773285ca305a79ab7b9dc087b43_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-openvpn-rhel8@sha256:15df7304827ce49d422554551f08d99cfffa1afc4ffacac145d4399ccb1cbd68_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-operator-bundle@sha256:90ed03a5e0cb0b0ffd85f7434cc4eda9bd8fe81cd90b597772d9b7caccd4b80f_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-registry-rhel8@sha256:aaa03ef0769d38185675db2a7a78454659de14bdebe5ff842614bf2124e5adfe_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-rhel8-operator@sha256:aaaf4f6095294b497889749390f0a3aac04b83131a423799c44b5e367e0b370a_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-rsync-transfer-rhel8@sha256:58bd4ffc3e9599401251ac929cf15c1773ecc03a57177118adbe23ac8d7762af_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-plugin-for-aws-rhel8@sha256:633eeb0b6b50e21bbc0fb12fd2262294733fc9ac8b1e9eedcdb9d1433534d88d_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-plugin-for-gcp-rhel8@sha256:19dbf2bb83f8a0f35079d6ae25f8fcddad970e48ecb21694fd2d4c553313e4aa_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-plugin-for-microsoft-azure-rhel8@sha256:93e95f065eadaa41154b9012dd5ddc824607758e2bce85c4256c2689125b80a4_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-restic-restore-helper-rhel8@sha256:70d3d46f54b91538e047df62e7e5b161fabac195a2f2e45cdba78215b4c82a7d_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-rhel8@sha256:1ca6945c3918f1743a4cee86a507f9f6581c8f8e572b6b8739d79a675a64d1db_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-velero-plugin-rhel8@sha256:26f8fb5c41ece82626325ba502505ba1ca7986602cc147b492f9857caa0be868_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2126276"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in the async package. This flaw allows a malicious user to obtain privileges via the mapValues() method.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "async: Prototype Pollution in async",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-RHMTC-1.7:rhmtc/openshift-migration-ui-rhel8@sha256:4141db5099ae659270297eb4aaff695ac43fce67d91fea49dbc76583f419d3a1_amd64"
],
"known_not_affected": [
"8Base-RHMTC-1.7:rhmtc/openshift-migration-controller-rhel8@sha256:362eb32d0d2607f72b4f425dabaea7cde5d292ac41aea0c18c78bc6e408fff9e_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-hook-runner-rhel8@sha256:aa63717ac3a4961e774ed0baa3a73f01eda185516e7380579d97b9d25764d10d_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-legacy-rhel8-operator@sha256:1ac9cdfbdce8f7b6e4ebf5e40013f766b71b6dd604c92f602aca96612a228eda_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-log-reader-rhel8@sha256:d89e9ef65993466d25b26702d0210c14ce191155501774f4d2f1f08dbdad9804_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-must-gather-rhel8@sha256:5acf34dc4041b694b452d46c2f656db566241773285ca305a79ab7b9dc087b43_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-openvpn-rhel8@sha256:15df7304827ce49d422554551f08d99cfffa1afc4ffacac145d4399ccb1cbd68_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-operator-bundle@sha256:90ed03a5e0cb0b0ffd85f7434cc4eda9bd8fe81cd90b597772d9b7caccd4b80f_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-registry-rhel8@sha256:aaa03ef0769d38185675db2a7a78454659de14bdebe5ff842614bf2124e5adfe_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-rhel8-operator@sha256:aaaf4f6095294b497889749390f0a3aac04b83131a423799c44b5e367e0b370a_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-rsync-transfer-rhel8@sha256:58bd4ffc3e9599401251ac929cf15c1773ecc03a57177118adbe23ac8d7762af_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-plugin-for-aws-rhel8@sha256:633eeb0b6b50e21bbc0fb12fd2262294733fc9ac8b1e9eedcdb9d1433534d88d_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-plugin-for-gcp-rhel8@sha256:19dbf2bb83f8a0f35079d6ae25f8fcddad970e48ecb21694fd2d4c553313e4aa_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-plugin-for-microsoft-azure-rhel8@sha256:93e95f065eadaa41154b9012dd5ddc824607758e2bce85c4256c2689125b80a4_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-restic-restore-helper-rhel8@sha256:70d3d46f54b91538e047df62e7e5b161fabac195a2f2e45cdba78215b4c82a7d_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-rhel8@sha256:1ca6945c3918f1743a4cee86a507f9f6581c8f8e572b6b8739d79a675a64d1db_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-velero-plugin-rhel8@sha256:26f8fb5c41ece82626325ba502505ba1ca7986602cc147b492f9857caa0be868_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-43138"
},
{
"category": "external",
"summary": "RHBZ#2126276",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2126276"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-43138",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-43138"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-43138",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-43138"
},
{
"category": "external",
"summary": "https://github.com/advisories/GHSA-fwr7-v2mv-hh25",
"url": "https://github.com/advisories/GHSA-fwr7-v2mv-hh25"
}
],
"release_date": "2022-04-07T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-02-09T02:17:22+00:00",
"details": "For details on how to install and use MTC, refer to:\n\nhttps://docs.openshift.com/container-platform/latest/migration_toolkit_for_containers/installing-mtc.html",
"product_ids": [
"8Base-RHMTC-1.7:rhmtc/openshift-migration-ui-rhel8@sha256:4141db5099ae659270297eb4aaff695ac43fce67d91fea49dbc76583f419d3a1_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:0693"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"8Base-RHMTC-1.7:rhmtc/openshift-migration-controller-rhel8@sha256:362eb32d0d2607f72b4f425dabaea7cde5d292ac41aea0c18c78bc6e408fff9e_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-hook-runner-rhel8@sha256:aa63717ac3a4961e774ed0baa3a73f01eda185516e7380579d97b9d25764d10d_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-legacy-rhel8-operator@sha256:1ac9cdfbdce8f7b6e4ebf5e40013f766b71b6dd604c92f602aca96612a228eda_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-log-reader-rhel8@sha256:d89e9ef65993466d25b26702d0210c14ce191155501774f4d2f1f08dbdad9804_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-must-gather-rhel8@sha256:5acf34dc4041b694b452d46c2f656db566241773285ca305a79ab7b9dc087b43_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-openvpn-rhel8@sha256:15df7304827ce49d422554551f08d99cfffa1afc4ffacac145d4399ccb1cbd68_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-operator-bundle@sha256:90ed03a5e0cb0b0ffd85f7434cc4eda9bd8fe81cd90b597772d9b7caccd4b80f_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-registry-rhel8@sha256:aaa03ef0769d38185675db2a7a78454659de14bdebe5ff842614bf2124e5adfe_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-rhel8-operator@sha256:aaaf4f6095294b497889749390f0a3aac04b83131a423799c44b5e367e0b370a_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-rsync-transfer-rhel8@sha256:58bd4ffc3e9599401251ac929cf15c1773ecc03a57177118adbe23ac8d7762af_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-ui-rhel8@sha256:4141db5099ae659270297eb4aaff695ac43fce67d91fea49dbc76583f419d3a1_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-plugin-for-aws-rhel8@sha256:633eeb0b6b50e21bbc0fb12fd2262294733fc9ac8b1e9eedcdb9d1433534d88d_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-plugin-for-gcp-rhel8@sha256:19dbf2bb83f8a0f35079d6ae25f8fcddad970e48ecb21694fd2d4c553313e4aa_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-plugin-for-microsoft-azure-rhel8@sha256:93e95f065eadaa41154b9012dd5ddc824607758e2bce85c4256c2689125b80a4_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-restic-restore-helper-rhel8@sha256:70d3d46f54b91538e047df62e7e5b161fabac195a2f2e45cdba78215b4c82a7d_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-rhel8@sha256:1ca6945c3918f1743a4cee86a507f9f6581c8f8e572b6b8739d79a675a64d1db_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-velero-plugin-rhel8@sha256:26f8fb5c41ece82626325ba502505ba1ca7986602cc147b492f9857caa0be868_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "async: Prototype Pollution in async"
},
{
"acknowledgments": [
{
"names": [
"Adam Korczynski"
],
"organization": "ADA Logics"
},
{
"names": [
"OSS-Fuzz"
]
}
],
"cve": "CVE-2022-2879",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"discovery_date": "2022-10-07T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-RHMTC-1.7:rhmtc/openshift-migration-controller-rhel8@sha256:362eb32d0d2607f72b4f425dabaea7cde5d292ac41aea0c18c78bc6e408fff9e_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-hook-runner-rhel8@sha256:aa63717ac3a4961e774ed0baa3a73f01eda185516e7380579d97b9d25764d10d_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-legacy-rhel8-operator@sha256:1ac9cdfbdce8f7b6e4ebf5e40013f766b71b6dd604c92f602aca96612a228eda_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-log-reader-rhel8@sha256:d89e9ef65993466d25b26702d0210c14ce191155501774f4d2f1f08dbdad9804_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-must-gather-rhel8@sha256:5acf34dc4041b694b452d46c2f656db566241773285ca305a79ab7b9dc087b43_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-openvpn-rhel8@sha256:15df7304827ce49d422554551f08d99cfffa1afc4ffacac145d4399ccb1cbd68_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-operator-bundle@sha256:90ed03a5e0cb0b0ffd85f7434cc4eda9bd8fe81cd90b597772d9b7caccd4b80f_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-registry-rhel8@sha256:aaa03ef0769d38185675db2a7a78454659de14bdebe5ff842614bf2124e5adfe_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-rhel8-operator@sha256:aaaf4f6095294b497889749390f0a3aac04b83131a423799c44b5e367e0b370a_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-rsync-transfer-rhel8@sha256:58bd4ffc3e9599401251ac929cf15c1773ecc03a57177118adbe23ac8d7762af_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-ui-rhel8@sha256:4141db5099ae659270297eb4aaff695ac43fce67d91fea49dbc76583f419d3a1_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-plugin-for-aws-rhel8@sha256:633eeb0b6b50e21bbc0fb12fd2262294733fc9ac8b1e9eedcdb9d1433534d88d_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-plugin-for-gcp-rhel8@sha256:19dbf2bb83f8a0f35079d6ae25f8fcddad970e48ecb21694fd2d4c553313e4aa_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-plugin-for-microsoft-azure-rhel8@sha256:93e95f065eadaa41154b9012dd5ddc824607758e2bce85c4256c2689125b80a4_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-restic-restore-helper-rhel8@sha256:70d3d46f54b91538e047df62e7e5b161fabac195a2f2e45cdba78215b4c82a7d_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-rhel8@sha256:1ca6945c3918f1743a4cee86a507f9f6581c8f8e572b6b8739d79a675a64d1db_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2132867"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the golang package, where Reader.Read does not set a limit on the maximum size of file headers. After fixing, Reader.Read limits the maximum size of header blocks to 1 MiB. This flaw allows a maliciously crafted archive to cause Read to allocate unbounded amounts of memory, potentially causing resource exhaustion or panic.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: archive/tar: unbounded memory consumption when reading headers",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The opportunity for a Denial of Service is limited to the golang runtime. In the case of OpenShift Container Platform, this would be restricted within each individual container. There are multiple layers of guide rails (Golang\u2019s Garbage Collector; OpenShift\u2019s resource constraints imposed at the container and cluster levels) which would require a malicious user to continue submitting attacks for there to be any enduring impact. They would also need access to external server resources to be able to send a massive volume of requests to cause a significant impact on server operations.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-RHMTC-1.7:rhmtc/openshift-velero-plugin-rhel8@sha256:26f8fb5c41ece82626325ba502505ba1ca7986602cc147b492f9857caa0be868_amd64"
],
"known_not_affected": [
"8Base-RHMTC-1.7:rhmtc/openshift-migration-controller-rhel8@sha256:362eb32d0d2607f72b4f425dabaea7cde5d292ac41aea0c18c78bc6e408fff9e_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-hook-runner-rhel8@sha256:aa63717ac3a4961e774ed0baa3a73f01eda185516e7380579d97b9d25764d10d_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-legacy-rhel8-operator@sha256:1ac9cdfbdce8f7b6e4ebf5e40013f766b71b6dd604c92f602aca96612a228eda_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-log-reader-rhel8@sha256:d89e9ef65993466d25b26702d0210c14ce191155501774f4d2f1f08dbdad9804_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-must-gather-rhel8@sha256:5acf34dc4041b694b452d46c2f656db566241773285ca305a79ab7b9dc087b43_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-openvpn-rhel8@sha256:15df7304827ce49d422554551f08d99cfffa1afc4ffacac145d4399ccb1cbd68_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-operator-bundle@sha256:90ed03a5e0cb0b0ffd85f7434cc4eda9bd8fe81cd90b597772d9b7caccd4b80f_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-registry-rhel8@sha256:aaa03ef0769d38185675db2a7a78454659de14bdebe5ff842614bf2124e5adfe_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-rhel8-operator@sha256:aaaf4f6095294b497889749390f0a3aac04b83131a423799c44b5e367e0b370a_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-rsync-transfer-rhel8@sha256:58bd4ffc3e9599401251ac929cf15c1773ecc03a57177118adbe23ac8d7762af_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-ui-rhel8@sha256:4141db5099ae659270297eb4aaff695ac43fce67d91fea49dbc76583f419d3a1_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-plugin-for-aws-rhel8@sha256:633eeb0b6b50e21bbc0fb12fd2262294733fc9ac8b1e9eedcdb9d1433534d88d_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-plugin-for-gcp-rhel8@sha256:19dbf2bb83f8a0f35079d6ae25f8fcddad970e48ecb21694fd2d4c553313e4aa_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-plugin-for-microsoft-azure-rhel8@sha256:93e95f065eadaa41154b9012dd5ddc824607758e2bce85c4256c2689125b80a4_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-restic-restore-helper-rhel8@sha256:70d3d46f54b91538e047df62e7e5b161fabac195a2f2e45cdba78215b4c82a7d_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-rhel8@sha256:1ca6945c3918f1743a4cee86a507f9f6581c8f8e572b6b8739d79a675a64d1db_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-2879"
},
{
"category": "external",
"summary": "RHBZ#2132867",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2132867"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-2879",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2879"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-2879",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-2879"
},
{
"category": "external",
"summary": "https://github.com/golang/go/issues/54853",
"url": "https://github.com/golang/go/issues/54853"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/xtuG5faxtaU?pli=1",
"url": "https://groups.google.com/g/golang-announce/c/xtuG5faxtaU?pli=1"
}
],
"release_date": "2022-10-04T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-02-09T02:17:22+00:00",
"details": "For details on how to install and use MTC, refer to:\n\nhttps://docs.openshift.com/container-platform/latest/migration_toolkit_for_containers/installing-mtc.html",
"product_ids": [
"8Base-RHMTC-1.7:rhmtc/openshift-velero-plugin-rhel8@sha256:26f8fb5c41ece82626325ba502505ba1ca7986602cc147b492f9857caa0be868_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:0693"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"8Base-RHMTC-1.7:rhmtc/openshift-migration-controller-rhel8@sha256:362eb32d0d2607f72b4f425dabaea7cde5d292ac41aea0c18c78bc6e408fff9e_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-hook-runner-rhel8@sha256:aa63717ac3a4961e774ed0baa3a73f01eda185516e7380579d97b9d25764d10d_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-legacy-rhel8-operator@sha256:1ac9cdfbdce8f7b6e4ebf5e40013f766b71b6dd604c92f602aca96612a228eda_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-log-reader-rhel8@sha256:d89e9ef65993466d25b26702d0210c14ce191155501774f4d2f1f08dbdad9804_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-must-gather-rhel8@sha256:5acf34dc4041b694b452d46c2f656db566241773285ca305a79ab7b9dc087b43_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-openvpn-rhel8@sha256:15df7304827ce49d422554551f08d99cfffa1afc4ffacac145d4399ccb1cbd68_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-operator-bundle@sha256:90ed03a5e0cb0b0ffd85f7434cc4eda9bd8fe81cd90b597772d9b7caccd4b80f_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-registry-rhel8@sha256:aaa03ef0769d38185675db2a7a78454659de14bdebe5ff842614bf2124e5adfe_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-rhel8-operator@sha256:aaaf4f6095294b497889749390f0a3aac04b83131a423799c44b5e367e0b370a_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-rsync-transfer-rhel8@sha256:58bd4ffc3e9599401251ac929cf15c1773ecc03a57177118adbe23ac8d7762af_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-ui-rhel8@sha256:4141db5099ae659270297eb4aaff695ac43fce67d91fea49dbc76583f419d3a1_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-plugin-for-aws-rhel8@sha256:633eeb0b6b50e21bbc0fb12fd2262294733fc9ac8b1e9eedcdb9d1433534d88d_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-plugin-for-gcp-rhel8@sha256:19dbf2bb83f8a0f35079d6ae25f8fcddad970e48ecb21694fd2d4c553313e4aa_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-plugin-for-microsoft-azure-rhel8@sha256:93e95f065eadaa41154b9012dd5ddc824607758e2bce85c4256c2689125b80a4_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-restic-restore-helper-rhel8@sha256:70d3d46f54b91538e047df62e7e5b161fabac195a2f2e45cdba78215b4c82a7d_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-rhel8@sha256:1ca6945c3918f1743a4cee86a507f9f6581c8f8e572b6b8739d79a675a64d1db_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-velero-plugin-rhel8@sha256:26f8fb5c41ece82626325ba502505ba1ca7986602cc147b492f9857caa0be868_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "golang: archive/tar: unbounded memory consumption when reading headers"
},
{
"acknowledgments": [
{
"names": [
"Daniel Abeles"
],
"organization": "Head of Research, Oxeye"
},
{
"names": [
"Gal Goldstein"
],
"organization": "Security Researcher, Oxeye"
}
],
"cve": "CVE-2022-2880",
"cwe": {
"id": "CWE-444",
"name": "Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027)"
},
"discovery_date": "2022-10-07T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-RHMTC-1.7:rhmtc/openshift-migration-controller-rhel8@sha256:362eb32d0d2607f72b4f425dabaea7cde5d292ac41aea0c18c78bc6e408fff9e_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-hook-runner-rhel8@sha256:aa63717ac3a4961e774ed0baa3a73f01eda185516e7380579d97b9d25764d10d_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-legacy-rhel8-operator@sha256:1ac9cdfbdce8f7b6e4ebf5e40013f766b71b6dd604c92f602aca96612a228eda_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-log-reader-rhel8@sha256:d89e9ef65993466d25b26702d0210c14ce191155501774f4d2f1f08dbdad9804_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-must-gather-rhel8@sha256:5acf34dc4041b694b452d46c2f656db566241773285ca305a79ab7b9dc087b43_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-openvpn-rhel8@sha256:15df7304827ce49d422554551f08d99cfffa1afc4ffacac145d4399ccb1cbd68_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-operator-bundle@sha256:90ed03a5e0cb0b0ffd85f7434cc4eda9bd8fe81cd90b597772d9b7caccd4b80f_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-registry-rhel8@sha256:aaa03ef0769d38185675db2a7a78454659de14bdebe5ff842614bf2124e5adfe_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-rhel8-operator@sha256:aaaf4f6095294b497889749390f0a3aac04b83131a423799c44b5e367e0b370a_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-rsync-transfer-rhel8@sha256:58bd4ffc3e9599401251ac929cf15c1773ecc03a57177118adbe23ac8d7762af_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-ui-rhel8@sha256:4141db5099ae659270297eb4aaff695ac43fce67d91fea49dbc76583f419d3a1_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-plugin-for-aws-rhel8@sha256:633eeb0b6b50e21bbc0fb12fd2262294733fc9ac8b1e9eedcdb9d1433534d88d_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-plugin-for-gcp-rhel8@sha256:19dbf2bb83f8a0f35079d6ae25f8fcddad970e48ecb21694fd2d4c553313e4aa_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-plugin-for-microsoft-azure-rhel8@sha256:93e95f065eadaa41154b9012dd5ddc824607758e2bce85c4256c2689125b80a4_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-restic-restore-helper-rhel8@sha256:70d3d46f54b91538e047df62e7e5b161fabac195a2f2e45cdba78215b4c82a7d_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-rhel8@sha256:1ca6945c3918f1743a4cee86a507f9f6581c8f8e572b6b8739d79a675a64d1db_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2132868"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the golang package, where requests forwarded by reverse proxy include the raw query parameters from the inbound request, including unparseable parameters rejected by net/http. This issue could permit query parameter smuggling when a Go proxy forwards a parameter with an unparseable value. After the fix, the reverse proxy sanitizes the query parameters in the forwarded query when the outbound request\u0027s form field is set after the reverse proxy. The director function returns, indicating that the proxy has parsed the query parameters. Proxies that do not parse query parameters continue to forward the original query parameters unchanged.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: net/http/httputil: ReverseProxy should not forward unparseable query parameters",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The opportunity to exploit this vulnerability is limited to the Golang runtime. In the case of the OpenShift Container Platform, this would be restricted within each individual container. There are multiple layers of guide rails (Golang\u2019s Garbage Collector; OpenShift\u2019s resource constraints imposed at the container and cluster levels) which would require a malicious user to continue submitting attacks for there to be any enduring impact.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-RHMTC-1.7:rhmtc/openshift-velero-plugin-rhel8@sha256:26f8fb5c41ece82626325ba502505ba1ca7986602cc147b492f9857caa0be868_amd64"
],
"known_not_affected": [
"8Base-RHMTC-1.7:rhmtc/openshift-migration-controller-rhel8@sha256:362eb32d0d2607f72b4f425dabaea7cde5d292ac41aea0c18c78bc6e408fff9e_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-hook-runner-rhel8@sha256:aa63717ac3a4961e774ed0baa3a73f01eda185516e7380579d97b9d25764d10d_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-legacy-rhel8-operator@sha256:1ac9cdfbdce8f7b6e4ebf5e40013f766b71b6dd604c92f602aca96612a228eda_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-log-reader-rhel8@sha256:d89e9ef65993466d25b26702d0210c14ce191155501774f4d2f1f08dbdad9804_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-must-gather-rhel8@sha256:5acf34dc4041b694b452d46c2f656db566241773285ca305a79ab7b9dc087b43_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-openvpn-rhel8@sha256:15df7304827ce49d422554551f08d99cfffa1afc4ffacac145d4399ccb1cbd68_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-operator-bundle@sha256:90ed03a5e0cb0b0ffd85f7434cc4eda9bd8fe81cd90b597772d9b7caccd4b80f_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-registry-rhel8@sha256:aaa03ef0769d38185675db2a7a78454659de14bdebe5ff842614bf2124e5adfe_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-rhel8-operator@sha256:aaaf4f6095294b497889749390f0a3aac04b83131a423799c44b5e367e0b370a_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-rsync-transfer-rhel8@sha256:58bd4ffc3e9599401251ac929cf15c1773ecc03a57177118adbe23ac8d7762af_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-ui-rhel8@sha256:4141db5099ae659270297eb4aaff695ac43fce67d91fea49dbc76583f419d3a1_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-plugin-for-aws-rhel8@sha256:633eeb0b6b50e21bbc0fb12fd2262294733fc9ac8b1e9eedcdb9d1433534d88d_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-plugin-for-gcp-rhel8@sha256:19dbf2bb83f8a0f35079d6ae25f8fcddad970e48ecb21694fd2d4c553313e4aa_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-plugin-for-microsoft-azure-rhel8@sha256:93e95f065eadaa41154b9012dd5ddc824607758e2bce85c4256c2689125b80a4_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-restic-restore-helper-rhel8@sha256:70d3d46f54b91538e047df62e7e5b161fabac195a2f2e45cdba78215b4c82a7d_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-rhel8@sha256:1ca6945c3918f1743a4cee86a507f9f6581c8f8e572b6b8739d79a675a64d1db_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-2880"
},
{
"category": "external",
"summary": "RHBZ#2132868",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2132868"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-2880",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2880"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-2880",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-2880"
},
{
"category": "external",
"summary": "https://github.com/golang/go/issues/54663",
"url": "https://github.com/golang/go/issues/54663"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/xtuG5faxtaU?pli=1",
"url": "https://groups.google.com/g/golang-announce/c/xtuG5faxtaU?pli=1"
}
],
"release_date": "2022-10-04T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-02-09T02:17:22+00:00",
"details": "For details on how to install and use MTC, refer to:\n\nhttps://docs.openshift.com/container-platform/latest/migration_toolkit_for_containers/installing-mtc.html",
"product_ids": [
"8Base-RHMTC-1.7:rhmtc/openshift-velero-plugin-rhel8@sha256:26f8fb5c41ece82626325ba502505ba1ca7986602cc147b492f9857caa0be868_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:0693"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"8Base-RHMTC-1.7:rhmtc/openshift-migration-controller-rhel8@sha256:362eb32d0d2607f72b4f425dabaea7cde5d292ac41aea0c18c78bc6e408fff9e_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-hook-runner-rhel8@sha256:aa63717ac3a4961e774ed0baa3a73f01eda185516e7380579d97b9d25764d10d_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-legacy-rhel8-operator@sha256:1ac9cdfbdce8f7b6e4ebf5e40013f766b71b6dd604c92f602aca96612a228eda_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-log-reader-rhel8@sha256:d89e9ef65993466d25b26702d0210c14ce191155501774f4d2f1f08dbdad9804_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-must-gather-rhel8@sha256:5acf34dc4041b694b452d46c2f656db566241773285ca305a79ab7b9dc087b43_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-openvpn-rhel8@sha256:15df7304827ce49d422554551f08d99cfffa1afc4ffacac145d4399ccb1cbd68_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-operator-bundle@sha256:90ed03a5e0cb0b0ffd85f7434cc4eda9bd8fe81cd90b597772d9b7caccd4b80f_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-registry-rhel8@sha256:aaa03ef0769d38185675db2a7a78454659de14bdebe5ff842614bf2124e5adfe_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-rhel8-operator@sha256:aaaf4f6095294b497889749390f0a3aac04b83131a423799c44b5e367e0b370a_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-rsync-transfer-rhel8@sha256:58bd4ffc3e9599401251ac929cf15c1773ecc03a57177118adbe23ac8d7762af_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-ui-rhel8@sha256:4141db5099ae659270297eb4aaff695ac43fce67d91fea49dbc76583f419d3a1_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-plugin-for-aws-rhel8@sha256:633eeb0b6b50e21bbc0fb12fd2262294733fc9ac8b1e9eedcdb9d1433534d88d_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-plugin-for-gcp-rhel8@sha256:19dbf2bb83f8a0f35079d6ae25f8fcddad970e48ecb21694fd2d4c553313e4aa_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-plugin-for-microsoft-azure-rhel8@sha256:93e95f065eadaa41154b9012dd5ddc824607758e2bce85c4256c2689125b80a4_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-restic-restore-helper-rhel8@sha256:70d3d46f54b91538e047df62e7e5b161fabac195a2f2e45cdba78215b4c82a7d_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-rhel8@sha256:1ca6945c3918f1743a4cee86a507f9f6581c8f8e572b6b8739d79a675a64d1db_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-velero-plugin-rhel8@sha256:26f8fb5c41ece82626325ba502505ba1ca7986602cc147b492f9857caa0be868_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "golang: net/http/httputil: ReverseProxy should not forward unparseable query parameters"
},
{
"cve": "CVE-2022-27664",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"discovery_date": "2022-09-06T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-RHMTC-1.7:rhmtc/openshift-migration-controller-rhel8@sha256:362eb32d0d2607f72b4f425dabaea7cde5d292ac41aea0c18c78bc6e408fff9e_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-hook-runner-rhel8@sha256:aa63717ac3a4961e774ed0baa3a73f01eda185516e7380579d97b9d25764d10d_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-legacy-rhel8-operator@sha256:1ac9cdfbdce8f7b6e4ebf5e40013f766b71b6dd604c92f602aca96612a228eda_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-log-reader-rhel8@sha256:d89e9ef65993466d25b26702d0210c14ce191155501774f4d2f1f08dbdad9804_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-must-gather-rhel8@sha256:5acf34dc4041b694b452d46c2f656db566241773285ca305a79ab7b9dc087b43_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-operator-bundle@sha256:90ed03a5e0cb0b0ffd85f7434cc4eda9bd8fe81cd90b597772d9b7caccd4b80f_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-registry-rhel8@sha256:aaa03ef0769d38185675db2a7a78454659de14bdebe5ff842614bf2124e5adfe_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-rhel8-operator@sha256:aaaf4f6095294b497889749390f0a3aac04b83131a423799c44b5e367e0b370a_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-rsync-transfer-rhel8@sha256:58bd4ffc3e9599401251ac929cf15c1773ecc03a57177118adbe23ac8d7762af_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-ui-rhel8@sha256:4141db5099ae659270297eb4aaff695ac43fce67d91fea49dbc76583f419d3a1_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-plugin-for-aws-rhel8@sha256:633eeb0b6b50e21bbc0fb12fd2262294733fc9ac8b1e9eedcdb9d1433534d88d_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-plugin-for-gcp-rhel8@sha256:19dbf2bb83f8a0f35079d6ae25f8fcddad970e48ecb21694fd2d4c553313e4aa_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-plugin-for-microsoft-azure-rhel8@sha256:93e95f065eadaa41154b9012dd5ddc824607758e2bce85c4256c2689125b80a4_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-restic-restore-helper-rhel8@sha256:70d3d46f54b91538e047df62e7e5b161fabac195a2f2e45cdba78215b4c82a7d_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-rhel8@sha256:1ca6945c3918f1743a4cee86a507f9f6581c8f8e572b6b8739d79a675a64d1db_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2124669"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the golang package. In net/http in Go, attackers can cause a denial of service because an HTTP/2 connection can hang during closing if a fatal error preempts the shutdown.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: net/http: handle server errors after sending GOAWAY",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The opportunity for a Denial of Service is limited to the golang runtime. In the case of OpenShift Container Platform, this would be restricted within each individual container. There are multiple layers of guide rails (Golang\u2019s Garbage Collector; OpenShift\u2019s resource constraints imposed at the container and cluster levels) which would require a malicious user to continue submitting attacks for there to be any enduring impact. They would also need access to external server resources to be able to send a massive volume of requests to cause a significant impact on server operations.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-RHMTC-1.7:rhmtc/openshift-migration-openvpn-rhel8@sha256:15df7304827ce49d422554551f08d99cfffa1afc4ffacac145d4399ccb1cbd68_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-velero-plugin-rhel8@sha256:26f8fb5c41ece82626325ba502505ba1ca7986602cc147b492f9857caa0be868_amd64"
],
"known_not_affected": [
"8Base-RHMTC-1.7:rhmtc/openshift-migration-controller-rhel8@sha256:362eb32d0d2607f72b4f425dabaea7cde5d292ac41aea0c18c78bc6e408fff9e_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-hook-runner-rhel8@sha256:aa63717ac3a4961e774ed0baa3a73f01eda185516e7380579d97b9d25764d10d_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-legacy-rhel8-operator@sha256:1ac9cdfbdce8f7b6e4ebf5e40013f766b71b6dd604c92f602aca96612a228eda_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-log-reader-rhel8@sha256:d89e9ef65993466d25b26702d0210c14ce191155501774f4d2f1f08dbdad9804_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-must-gather-rhel8@sha256:5acf34dc4041b694b452d46c2f656db566241773285ca305a79ab7b9dc087b43_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-operator-bundle@sha256:90ed03a5e0cb0b0ffd85f7434cc4eda9bd8fe81cd90b597772d9b7caccd4b80f_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-registry-rhel8@sha256:aaa03ef0769d38185675db2a7a78454659de14bdebe5ff842614bf2124e5adfe_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-rhel8-operator@sha256:aaaf4f6095294b497889749390f0a3aac04b83131a423799c44b5e367e0b370a_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-rsync-transfer-rhel8@sha256:58bd4ffc3e9599401251ac929cf15c1773ecc03a57177118adbe23ac8d7762af_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-ui-rhel8@sha256:4141db5099ae659270297eb4aaff695ac43fce67d91fea49dbc76583f419d3a1_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-plugin-for-aws-rhel8@sha256:633eeb0b6b50e21bbc0fb12fd2262294733fc9ac8b1e9eedcdb9d1433534d88d_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-plugin-for-gcp-rhel8@sha256:19dbf2bb83f8a0f35079d6ae25f8fcddad970e48ecb21694fd2d4c553313e4aa_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-plugin-for-microsoft-azure-rhel8@sha256:93e95f065eadaa41154b9012dd5ddc824607758e2bce85c4256c2689125b80a4_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-restic-restore-helper-rhel8@sha256:70d3d46f54b91538e047df62e7e5b161fabac195a2f2e45cdba78215b4c82a7d_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-rhel8@sha256:1ca6945c3918f1743a4cee86a507f9f6581c8f8e572b6b8739d79a675a64d1db_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-27664"
},
{
"category": "external",
"summary": "RHBZ#2124669",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2124669"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-27664",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27664"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-27664",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-27664"
},
{
"category": "external",
"summary": "https://go.dev/issue/54658",
"url": "https://go.dev/issue/54658"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/x49AQzIVX-s/m/0tgO0pjiBQAJ",
"url": "https://groups.google.com/g/golang-announce/c/x49AQzIVX-s/m/0tgO0pjiBQAJ"
}
],
"release_date": "2022-09-06T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-02-09T02:17:22+00:00",
"details": "For details on how to install and use MTC, refer to:\n\nhttps://docs.openshift.com/container-platform/latest/migration_toolkit_for_containers/installing-mtc.html",
"product_ids": [
"8Base-RHMTC-1.7:rhmtc/openshift-migration-openvpn-rhel8@sha256:15df7304827ce49d422554551f08d99cfffa1afc4ffacac145d4399ccb1cbd68_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-velero-plugin-rhel8@sha256:26f8fb5c41ece82626325ba502505ba1ca7986602cc147b492f9857caa0be868_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:0693"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"8Base-RHMTC-1.7:rhmtc/openshift-migration-controller-rhel8@sha256:362eb32d0d2607f72b4f425dabaea7cde5d292ac41aea0c18c78bc6e408fff9e_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-hook-runner-rhel8@sha256:aa63717ac3a4961e774ed0baa3a73f01eda185516e7380579d97b9d25764d10d_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-legacy-rhel8-operator@sha256:1ac9cdfbdce8f7b6e4ebf5e40013f766b71b6dd604c92f602aca96612a228eda_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-log-reader-rhel8@sha256:d89e9ef65993466d25b26702d0210c14ce191155501774f4d2f1f08dbdad9804_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-must-gather-rhel8@sha256:5acf34dc4041b694b452d46c2f656db566241773285ca305a79ab7b9dc087b43_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-openvpn-rhel8@sha256:15df7304827ce49d422554551f08d99cfffa1afc4ffacac145d4399ccb1cbd68_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-operator-bundle@sha256:90ed03a5e0cb0b0ffd85f7434cc4eda9bd8fe81cd90b597772d9b7caccd4b80f_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-registry-rhel8@sha256:aaa03ef0769d38185675db2a7a78454659de14bdebe5ff842614bf2124e5adfe_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-rhel8-operator@sha256:aaaf4f6095294b497889749390f0a3aac04b83131a423799c44b5e367e0b370a_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-rsync-transfer-rhel8@sha256:58bd4ffc3e9599401251ac929cf15c1773ecc03a57177118adbe23ac8d7762af_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-ui-rhel8@sha256:4141db5099ae659270297eb4aaff695ac43fce67d91fea49dbc76583f419d3a1_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-plugin-for-aws-rhel8@sha256:633eeb0b6b50e21bbc0fb12fd2262294733fc9ac8b1e9eedcdb9d1433534d88d_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-plugin-for-gcp-rhel8@sha256:19dbf2bb83f8a0f35079d6ae25f8fcddad970e48ecb21694fd2d4c553313e4aa_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-plugin-for-microsoft-azure-rhel8@sha256:93e95f065eadaa41154b9012dd5ddc824607758e2bce85c4256c2689125b80a4_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-restic-restore-helper-rhel8@sha256:70d3d46f54b91538e047df62e7e5b161fabac195a2f2e45cdba78215b4c82a7d_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-rhel8@sha256:1ca6945c3918f1743a4cee86a507f9f6581c8f8e572b6b8739d79a675a64d1db_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-velero-plugin-rhel8@sha256:26f8fb5c41ece82626325ba502505ba1ca7986602cc147b492f9857caa0be868_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "golang: net/http: handle server errors after sending GOAWAY"
},
{
"cve": "CVE-2022-32149",
"cwe": {
"id": "CWE-407",
"name": "Inefficient Algorithmic Complexity"
},
"discovery_date": "2022-10-12T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-RHMTC-1.7:rhmtc/openshift-migration-controller-rhel8@sha256:362eb32d0d2607f72b4f425dabaea7cde5d292ac41aea0c18c78bc6e408fff9e_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-hook-runner-rhel8@sha256:aa63717ac3a4961e774ed0baa3a73f01eda185516e7380579d97b9d25764d10d_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-legacy-rhel8-operator@sha256:1ac9cdfbdce8f7b6e4ebf5e40013f766b71b6dd604c92f602aca96612a228eda_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-log-reader-rhel8@sha256:d89e9ef65993466d25b26702d0210c14ce191155501774f4d2f1f08dbdad9804_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-must-gather-rhel8@sha256:5acf34dc4041b694b452d46c2f656db566241773285ca305a79ab7b9dc087b43_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-openvpn-rhel8@sha256:15df7304827ce49d422554551f08d99cfffa1afc4ffacac145d4399ccb1cbd68_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-operator-bundle@sha256:90ed03a5e0cb0b0ffd85f7434cc4eda9bd8fe81cd90b597772d9b7caccd4b80f_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-registry-rhel8@sha256:aaa03ef0769d38185675db2a7a78454659de14bdebe5ff842614bf2124e5adfe_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-rhel8-operator@sha256:aaaf4f6095294b497889749390f0a3aac04b83131a423799c44b5e367e0b370a_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-rsync-transfer-rhel8@sha256:58bd4ffc3e9599401251ac929cf15c1773ecc03a57177118adbe23ac8d7762af_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-ui-rhel8@sha256:4141db5099ae659270297eb4aaff695ac43fce67d91fea49dbc76583f419d3a1_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-plugin-for-aws-rhel8@sha256:633eeb0b6b50e21bbc0fb12fd2262294733fc9ac8b1e9eedcdb9d1433534d88d_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-plugin-for-gcp-rhel8@sha256:19dbf2bb83f8a0f35079d6ae25f8fcddad970e48ecb21694fd2d4c553313e4aa_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-plugin-for-microsoft-azure-rhel8@sha256:93e95f065eadaa41154b9012dd5ddc824607758e2bce85c4256c2689125b80a4_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-restic-restore-helper-rhel8@sha256:70d3d46f54b91538e047df62e7e5b161fabac195a2f2e45cdba78215b4c82a7d_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-velero-plugin-rhel8@sha256:26f8fb5c41ece82626325ba502505ba1ca7986602cc147b492f9857caa0be868_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2134010"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in the golang.org/x/text/language package. An attacker can craft an Accept-Language header which ParseAcceptLanguage will take significant time to parse. This issue leads to a denial of service, and can impact availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: golang.org/x/text/language: ParseAcceptLanguage takes a long time to parse complex tags",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-rhel8@sha256:1ca6945c3918f1743a4cee86a507f9f6581c8f8e572b6b8739d79a675a64d1db_amd64"
],
"known_not_affected": [
"8Base-RHMTC-1.7:rhmtc/openshift-migration-controller-rhel8@sha256:362eb32d0d2607f72b4f425dabaea7cde5d292ac41aea0c18c78bc6e408fff9e_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-hook-runner-rhel8@sha256:aa63717ac3a4961e774ed0baa3a73f01eda185516e7380579d97b9d25764d10d_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-legacy-rhel8-operator@sha256:1ac9cdfbdce8f7b6e4ebf5e40013f766b71b6dd604c92f602aca96612a228eda_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-log-reader-rhel8@sha256:d89e9ef65993466d25b26702d0210c14ce191155501774f4d2f1f08dbdad9804_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-must-gather-rhel8@sha256:5acf34dc4041b694b452d46c2f656db566241773285ca305a79ab7b9dc087b43_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-openvpn-rhel8@sha256:15df7304827ce49d422554551f08d99cfffa1afc4ffacac145d4399ccb1cbd68_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-operator-bundle@sha256:90ed03a5e0cb0b0ffd85f7434cc4eda9bd8fe81cd90b597772d9b7caccd4b80f_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-registry-rhel8@sha256:aaa03ef0769d38185675db2a7a78454659de14bdebe5ff842614bf2124e5adfe_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-rhel8-operator@sha256:aaaf4f6095294b497889749390f0a3aac04b83131a423799c44b5e367e0b370a_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-rsync-transfer-rhel8@sha256:58bd4ffc3e9599401251ac929cf15c1773ecc03a57177118adbe23ac8d7762af_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-ui-rhel8@sha256:4141db5099ae659270297eb4aaff695ac43fce67d91fea49dbc76583f419d3a1_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-plugin-for-aws-rhel8@sha256:633eeb0b6b50e21bbc0fb12fd2262294733fc9ac8b1e9eedcdb9d1433534d88d_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-plugin-for-gcp-rhel8@sha256:19dbf2bb83f8a0f35079d6ae25f8fcddad970e48ecb21694fd2d4c553313e4aa_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-plugin-for-microsoft-azure-rhel8@sha256:93e95f065eadaa41154b9012dd5ddc824607758e2bce85c4256c2689125b80a4_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-restic-restore-helper-rhel8@sha256:70d3d46f54b91538e047df62e7e5b161fabac195a2f2e45cdba78215b4c82a7d_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-velero-plugin-rhel8@sha256:26f8fb5c41ece82626325ba502505ba1ca7986602cc147b492f9857caa0be868_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-32149"
},
{
"category": "external",
"summary": "RHBZ#2134010",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2134010"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-32149",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32149"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-32149",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-32149"
},
{
"category": "external",
"summary": "https://go.dev/issue/56152",
"url": "https://go.dev/issue/56152"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-dev/c/qfPIly0X7aU",
"url": "https://groups.google.com/g/golang-dev/c/qfPIly0X7aU"
}
],
"release_date": "2022-10-11T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-02-09T02:17:22+00:00",
"details": "For details on how to install and use MTC, refer to:\n\nhttps://docs.openshift.com/container-platform/latest/migration_toolkit_for_containers/installing-mtc.html",
"product_ids": [
"8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-rhel8@sha256:1ca6945c3918f1743a4cee86a507f9f6581c8f8e572b6b8739d79a675a64d1db_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:0693"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"8Base-RHMTC-1.7:rhmtc/openshift-migration-controller-rhel8@sha256:362eb32d0d2607f72b4f425dabaea7cde5d292ac41aea0c18c78bc6e408fff9e_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-hook-runner-rhel8@sha256:aa63717ac3a4961e774ed0baa3a73f01eda185516e7380579d97b9d25764d10d_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-legacy-rhel8-operator@sha256:1ac9cdfbdce8f7b6e4ebf5e40013f766b71b6dd604c92f602aca96612a228eda_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-log-reader-rhel8@sha256:d89e9ef65993466d25b26702d0210c14ce191155501774f4d2f1f08dbdad9804_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-must-gather-rhel8@sha256:5acf34dc4041b694b452d46c2f656db566241773285ca305a79ab7b9dc087b43_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-openvpn-rhel8@sha256:15df7304827ce49d422554551f08d99cfffa1afc4ffacac145d4399ccb1cbd68_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-operator-bundle@sha256:90ed03a5e0cb0b0ffd85f7434cc4eda9bd8fe81cd90b597772d9b7caccd4b80f_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-registry-rhel8@sha256:aaa03ef0769d38185675db2a7a78454659de14bdebe5ff842614bf2124e5adfe_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-rhel8-operator@sha256:aaaf4f6095294b497889749390f0a3aac04b83131a423799c44b5e367e0b370a_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-rsync-transfer-rhel8@sha256:58bd4ffc3e9599401251ac929cf15c1773ecc03a57177118adbe23ac8d7762af_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-ui-rhel8@sha256:4141db5099ae659270297eb4aaff695ac43fce67d91fea49dbc76583f419d3a1_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-plugin-for-aws-rhel8@sha256:633eeb0b6b50e21bbc0fb12fd2262294733fc9ac8b1e9eedcdb9d1433534d88d_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-plugin-for-gcp-rhel8@sha256:19dbf2bb83f8a0f35079d6ae25f8fcddad970e48ecb21694fd2d4c553313e4aa_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-plugin-for-microsoft-azure-rhel8@sha256:93e95f065eadaa41154b9012dd5ddc824607758e2bce85c4256c2689125b80a4_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-restic-restore-helper-rhel8@sha256:70d3d46f54b91538e047df62e7e5b161fabac195a2f2e45cdba78215b4c82a7d_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-rhel8@sha256:1ca6945c3918f1743a4cee86a507f9f6581c8f8e572b6b8739d79a675a64d1db_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-velero-plugin-rhel8@sha256:26f8fb5c41ece82626325ba502505ba1ca7986602cc147b492f9857caa0be868_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "golang: golang.org/x/text/language: ParseAcceptLanguage takes a long time to parse complex tags"
},
{
"cve": "CVE-2022-32189",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"discovery_date": "2022-08-02T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-RHMTC-1.7:rhmtc/openshift-migration-controller-rhel8@sha256:362eb32d0d2607f72b4f425dabaea7cde5d292ac41aea0c18c78bc6e408fff9e_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-hook-runner-rhel8@sha256:aa63717ac3a4961e774ed0baa3a73f01eda185516e7380579d97b9d25764d10d_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-legacy-rhel8-operator@sha256:1ac9cdfbdce8f7b6e4ebf5e40013f766b71b6dd604c92f602aca96612a228eda_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-log-reader-rhel8@sha256:d89e9ef65993466d25b26702d0210c14ce191155501774f4d2f1f08dbdad9804_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-must-gather-rhel8@sha256:5acf34dc4041b694b452d46c2f656db566241773285ca305a79ab7b9dc087b43_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-openvpn-rhel8@sha256:15df7304827ce49d422554551f08d99cfffa1afc4ffacac145d4399ccb1cbd68_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-operator-bundle@sha256:90ed03a5e0cb0b0ffd85f7434cc4eda9bd8fe81cd90b597772d9b7caccd4b80f_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-registry-rhel8@sha256:aaa03ef0769d38185675db2a7a78454659de14bdebe5ff842614bf2124e5adfe_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-rhel8-operator@sha256:aaaf4f6095294b497889749390f0a3aac04b83131a423799c44b5e367e0b370a_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-rsync-transfer-rhel8@sha256:58bd4ffc3e9599401251ac929cf15c1773ecc03a57177118adbe23ac8d7762af_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-ui-rhel8@sha256:4141db5099ae659270297eb4aaff695ac43fce67d91fea49dbc76583f419d3a1_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-plugin-for-aws-rhel8@sha256:633eeb0b6b50e21bbc0fb12fd2262294733fc9ac8b1e9eedcdb9d1433534d88d_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-plugin-for-gcp-rhel8@sha256:19dbf2bb83f8a0f35079d6ae25f8fcddad970e48ecb21694fd2d4c553313e4aa_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-plugin-for-microsoft-azure-rhel8@sha256:93e95f065eadaa41154b9012dd5ddc824607758e2bce85c4256c2689125b80a4_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-restic-restore-helper-rhel8@sha256:70d3d46f54b91538e047df62e7e5b161fabac195a2f2e45cdba78215b4c82a7d_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-rhel8@sha256:1ca6945c3918f1743a4cee86a507f9f6581c8f8e572b6b8739d79a675a64d1db_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2113814"
}
],
"notes": [
{
"category": "description",
"text": "An uncontrolled resource consumption flaw was found in Golang math/big. A too-short encoded message can cause a panic in Float.GobDecode and Rat.GobDecode in math/big in Go, potentially allowing an attacker to create a denial of service, impacting availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: math/big: decoding big.Float and big.Rat types can panic if the encoded message is too short, potentially allowing a denial of service",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This flaw stems from a particular and specific method (GoBDecode) which isn\u0027t commonly used. There are few components within Red Hat offerings which call this function. In rare cases where this method is called, the component limits possible damage or it is not possible to be triggered by an attacker. For these combined reasons the impact has been downgraded to Low.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-RHMTC-1.7:rhmtc/openshift-velero-plugin-rhel8@sha256:26f8fb5c41ece82626325ba502505ba1ca7986602cc147b492f9857caa0be868_amd64"
],
"known_not_affected": [
"8Base-RHMTC-1.7:rhmtc/openshift-migration-controller-rhel8@sha256:362eb32d0d2607f72b4f425dabaea7cde5d292ac41aea0c18c78bc6e408fff9e_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-hook-runner-rhel8@sha256:aa63717ac3a4961e774ed0baa3a73f01eda185516e7380579d97b9d25764d10d_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-legacy-rhel8-operator@sha256:1ac9cdfbdce8f7b6e4ebf5e40013f766b71b6dd604c92f602aca96612a228eda_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-log-reader-rhel8@sha256:d89e9ef65993466d25b26702d0210c14ce191155501774f4d2f1f08dbdad9804_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-must-gather-rhel8@sha256:5acf34dc4041b694b452d46c2f656db566241773285ca305a79ab7b9dc087b43_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-openvpn-rhel8@sha256:15df7304827ce49d422554551f08d99cfffa1afc4ffacac145d4399ccb1cbd68_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-operator-bundle@sha256:90ed03a5e0cb0b0ffd85f7434cc4eda9bd8fe81cd90b597772d9b7caccd4b80f_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-registry-rhel8@sha256:aaa03ef0769d38185675db2a7a78454659de14bdebe5ff842614bf2124e5adfe_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-rhel8-operator@sha256:aaaf4f6095294b497889749390f0a3aac04b83131a423799c44b5e367e0b370a_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-rsync-transfer-rhel8@sha256:58bd4ffc3e9599401251ac929cf15c1773ecc03a57177118adbe23ac8d7762af_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-ui-rhel8@sha256:4141db5099ae659270297eb4aaff695ac43fce67d91fea49dbc76583f419d3a1_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-plugin-for-aws-rhel8@sha256:633eeb0b6b50e21bbc0fb12fd2262294733fc9ac8b1e9eedcdb9d1433534d88d_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-plugin-for-gcp-rhel8@sha256:19dbf2bb83f8a0f35079d6ae25f8fcddad970e48ecb21694fd2d4c553313e4aa_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-plugin-for-microsoft-azure-rhel8@sha256:93e95f065eadaa41154b9012dd5ddc824607758e2bce85c4256c2689125b80a4_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-restic-restore-helper-rhel8@sha256:70d3d46f54b91538e047df62e7e5b161fabac195a2f2e45cdba78215b4c82a7d_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-rhel8@sha256:1ca6945c3918f1743a4cee86a507f9f6581c8f8e572b6b8739d79a675a64d1db_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-32189"
},
{
"category": "external",
"summary": "RHBZ#2113814",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2113814"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-32189",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32189"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-32189",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-32189"
},
{
"category": "external",
"summary": "https://go.dev/issue/53871",
"url": "https://go.dev/issue/53871"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-nuts/c/DCFSyTGM0wU",
"url": "https://groups.google.com/g/golang-nuts/c/DCFSyTGM0wU"
}
],
"release_date": "2022-08-01T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-02-09T02:17:22+00:00",
"details": "For details on how to install and use MTC, refer to:\n\nhttps://docs.openshift.com/container-platform/latest/migration_toolkit_for_containers/installing-mtc.html",
"product_ids": [
"8Base-RHMTC-1.7:rhmtc/openshift-velero-plugin-rhel8@sha256:26f8fb5c41ece82626325ba502505ba1ca7986602cc147b492f9857caa0be868_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:0693"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"8Base-RHMTC-1.7:rhmtc/openshift-migration-controller-rhel8@sha256:362eb32d0d2607f72b4f425dabaea7cde5d292ac41aea0c18c78bc6e408fff9e_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-hook-runner-rhel8@sha256:aa63717ac3a4961e774ed0baa3a73f01eda185516e7380579d97b9d25764d10d_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-legacy-rhel8-operator@sha256:1ac9cdfbdce8f7b6e4ebf5e40013f766b71b6dd604c92f602aca96612a228eda_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-log-reader-rhel8@sha256:d89e9ef65993466d25b26702d0210c14ce191155501774f4d2f1f08dbdad9804_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-must-gather-rhel8@sha256:5acf34dc4041b694b452d46c2f656db566241773285ca305a79ab7b9dc087b43_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-openvpn-rhel8@sha256:15df7304827ce49d422554551f08d99cfffa1afc4ffacac145d4399ccb1cbd68_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-operator-bundle@sha256:90ed03a5e0cb0b0ffd85f7434cc4eda9bd8fe81cd90b597772d9b7caccd4b80f_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-registry-rhel8@sha256:aaa03ef0769d38185675db2a7a78454659de14bdebe5ff842614bf2124e5adfe_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-rhel8-operator@sha256:aaaf4f6095294b497889749390f0a3aac04b83131a423799c44b5e367e0b370a_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-rsync-transfer-rhel8@sha256:58bd4ffc3e9599401251ac929cf15c1773ecc03a57177118adbe23ac8d7762af_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-ui-rhel8@sha256:4141db5099ae659270297eb4aaff695ac43fce67d91fea49dbc76583f419d3a1_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-plugin-for-aws-rhel8@sha256:633eeb0b6b50e21bbc0fb12fd2262294733fc9ac8b1e9eedcdb9d1433534d88d_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-plugin-for-gcp-rhel8@sha256:19dbf2bb83f8a0f35079d6ae25f8fcddad970e48ecb21694fd2d4c553313e4aa_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-plugin-for-microsoft-azure-rhel8@sha256:93e95f065eadaa41154b9012dd5ddc824607758e2bce85c4256c2689125b80a4_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-restic-restore-helper-rhel8@sha256:70d3d46f54b91538e047df62e7e5b161fabac195a2f2e45cdba78215b4c82a7d_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-rhel8@sha256:1ca6945c3918f1743a4cee86a507f9f6581c8f8e572b6b8739d79a675a64d1db_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-velero-plugin-rhel8@sha256:26f8fb5c41ece82626325ba502505ba1ca7986602cc147b492f9857caa0be868_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "golang: math/big: decoding big.Float and big.Rat types can panic if the encoded message is too short, potentially allowing a denial of service"
},
{
"cve": "CVE-2022-32190",
"cwe": {
"id": "CWE-22",
"name": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)"
},
"discovery_date": "2022-09-06T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-RHMTC-1.7:rhmtc/openshift-migration-controller-rhel8@sha256:362eb32d0d2607f72b4f425dabaea7cde5d292ac41aea0c18c78bc6e408fff9e_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-hook-runner-rhel8@sha256:aa63717ac3a4961e774ed0baa3a73f01eda185516e7380579d97b9d25764d10d_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-legacy-rhel8-operator@sha256:1ac9cdfbdce8f7b6e4ebf5e40013f766b71b6dd604c92f602aca96612a228eda_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-log-reader-rhel8@sha256:d89e9ef65993466d25b26702d0210c14ce191155501774f4d2f1f08dbdad9804_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-must-gather-rhel8@sha256:5acf34dc4041b694b452d46c2f656db566241773285ca305a79ab7b9dc087b43_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-openvpn-rhel8@sha256:15df7304827ce49d422554551f08d99cfffa1afc4ffacac145d4399ccb1cbd68_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-operator-bundle@sha256:90ed03a5e0cb0b0ffd85f7434cc4eda9bd8fe81cd90b597772d9b7caccd4b80f_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-registry-rhel8@sha256:aaa03ef0769d38185675db2a7a78454659de14bdebe5ff842614bf2124e5adfe_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-rhel8-operator@sha256:aaaf4f6095294b497889749390f0a3aac04b83131a423799c44b5e367e0b370a_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-rsync-transfer-rhel8@sha256:58bd4ffc3e9599401251ac929cf15c1773ecc03a57177118adbe23ac8d7762af_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-ui-rhel8@sha256:4141db5099ae659270297eb4aaff695ac43fce67d91fea49dbc76583f419d3a1_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-plugin-for-aws-rhel8@sha256:633eeb0b6b50e21bbc0fb12fd2262294733fc9ac8b1e9eedcdb9d1433534d88d_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-plugin-for-gcp-rhel8@sha256:19dbf2bb83f8a0f35079d6ae25f8fcddad970e48ecb21694fd2d4c553313e4aa_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-plugin-for-microsoft-azure-rhel8@sha256:93e95f065eadaa41154b9012dd5ddc824607758e2bce85c4256c2689125b80a4_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-restic-restore-helper-rhel8@sha256:70d3d46f54b91538e047df62e7e5b161fabac195a2f2e45cdba78215b4c82a7d_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-rhel8@sha256:1ca6945c3918f1743a4cee86a507f9f6581c8f8e572b6b8739d79a675a64d1db_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2124668"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the golang package. The JoinPath doesn\u0027t remove the ../ path components appended to a domain that is not terminated by a slash, possibly leading to a directory traversal attack.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: net/url: JoinPath does not strip relative path components in all circumstances",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The vulnerable functions, JoinPath and URL.JoinPath was introduced in upstream go1.19, whereas, RHEL ships go1.17 and go1.18 versions, which does not contain the vulnerable code. Hence, packages shipped with RHEL-8, RHEL-9 are not affected.\n\nAll Y stream releases of OpenShift Container Platform 4 run on RHEL-8 or RHEL-9, so OCP 4 is also not affected.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-RHMTC-1.7:rhmtc/openshift-velero-plugin-rhel8@sha256:26f8fb5c41ece82626325ba502505ba1ca7986602cc147b492f9857caa0be868_amd64"
],
"known_not_affected": [
"8Base-RHMTC-1.7:rhmtc/openshift-migration-controller-rhel8@sha256:362eb32d0d2607f72b4f425dabaea7cde5d292ac41aea0c18c78bc6e408fff9e_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-hook-runner-rhel8@sha256:aa63717ac3a4961e774ed0baa3a73f01eda185516e7380579d97b9d25764d10d_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-legacy-rhel8-operator@sha256:1ac9cdfbdce8f7b6e4ebf5e40013f766b71b6dd604c92f602aca96612a228eda_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-log-reader-rhel8@sha256:d89e9ef65993466d25b26702d0210c14ce191155501774f4d2f1f08dbdad9804_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-must-gather-rhel8@sha256:5acf34dc4041b694b452d46c2f656db566241773285ca305a79ab7b9dc087b43_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-openvpn-rhel8@sha256:15df7304827ce49d422554551f08d99cfffa1afc4ffacac145d4399ccb1cbd68_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-operator-bundle@sha256:90ed03a5e0cb0b0ffd85f7434cc4eda9bd8fe81cd90b597772d9b7caccd4b80f_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-registry-rhel8@sha256:aaa03ef0769d38185675db2a7a78454659de14bdebe5ff842614bf2124e5adfe_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-rhel8-operator@sha256:aaaf4f6095294b497889749390f0a3aac04b83131a423799c44b5e367e0b370a_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-rsync-transfer-rhel8@sha256:58bd4ffc3e9599401251ac929cf15c1773ecc03a57177118adbe23ac8d7762af_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-ui-rhel8@sha256:4141db5099ae659270297eb4aaff695ac43fce67d91fea49dbc76583f419d3a1_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-plugin-for-aws-rhel8@sha256:633eeb0b6b50e21bbc0fb12fd2262294733fc9ac8b1e9eedcdb9d1433534d88d_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-plugin-for-gcp-rhel8@sha256:19dbf2bb83f8a0f35079d6ae25f8fcddad970e48ecb21694fd2d4c553313e4aa_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-plugin-for-microsoft-azure-rhel8@sha256:93e95f065eadaa41154b9012dd5ddc824607758e2bce85c4256c2689125b80a4_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-restic-restore-helper-rhel8@sha256:70d3d46f54b91538e047df62e7e5b161fabac195a2f2e45cdba78215b4c82a7d_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-rhel8@sha256:1ca6945c3918f1743a4cee86a507f9f6581c8f8e572b6b8739d79a675a64d1db_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-32190"
},
{
"category": "external",
"summary": "RHBZ#2124668",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2124668"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-32190",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32190"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-32190",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-32190"
},
{
"category": "external",
"summary": "https://go.dev/issue/54385",
"url": "https://go.dev/issue/54385"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/x49AQzIVX-s/m/0tgO0pjiBQAJ",
"url": "https://groups.google.com/g/golang-announce/c/x49AQzIVX-s/m/0tgO0pjiBQAJ"
}
],
"release_date": "2022-09-06T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-02-09T02:17:22+00:00",
"details": "For details on how to install and use MTC, refer to:\n\nhttps://docs.openshift.com/container-platform/latest/migration_toolkit_for_containers/installing-mtc.html",
"product_ids": [
"8Base-RHMTC-1.7:rhmtc/openshift-velero-plugin-rhel8@sha256:26f8fb5c41ece82626325ba502505ba1ca7986602cc147b492f9857caa0be868_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:0693"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"8Base-RHMTC-1.7:rhmtc/openshift-migration-controller-rhel8@sha256:362eb32d0d2607f72b4f425dabaea7cde5d292ac41aea0c18c78bc6e408fff9e_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-hook-runner-rhel8@sha256:aa63717ac3a4961e774ed0baa3a73f01eda185516e7380579d97b9d25764d10d_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-legacy-rhel8-operator@sha256:1ac9cdfbdce8f7b6e4ebf5e40013f766b71b6dd604c92f602aca96612a228eda_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-log-reader-rhel8@sha256:d89e9ef65993466d25b26702d0210c14ce191155501774f4d2f1f08dbdad9804_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-must-gather-rhel8@sha256:5acf34dc4041b694b452d46c2f656db566241773285ca305a79ab7b9dc087b43_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-openvpn-rhel8@sha256:15df7304827ce49d422554551f08d99cfffa1afc4ffacac145d4399ccb1cbd68_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-operator-bundle@sha256:90ed03a5e0cb0b0ffd85f7434cc4eda9bd8fe81cd90b597772d9b7caccd4b80f_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-registry-rhel8@sha256:aaa03ef0769d38185675db2a7a78454659de14bdebe5ff842614bf2124e5adfe_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-rhel8-operator@sha256:aaaf4f6095294b497889749390f0a3aac04b83131a423799c44b5e367e0b370a_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-rsync-transfer-rhel8@sha256:58bd4ffc3e9599401251ac929cf15c1773ecc03a57177118adbe23ac8d7762af_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-ui-rhel8@sha256:4141db5099ae659270297eb4aaff695ac43fce67d91fea49dbc76583f419d3a1_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-plugin-for-aws-rhel8@sha256:633eeb0b6b50e21bbc0fb12fd2262294733fc9ac8b1e9eedcdb9d1433534d88d_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-plugin-for-gcp-rhel8@sha256:19dbf2bb83f8a0f35079d6ae25f8fcddad970e48ecb21694fd2d4c553313e4aa_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-plugin-for-microsoft-azure-rhel8@sha256:93e95f065eadaa41154b9012dd5ddc824607758e2bce85c4256c2689125b80a4_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-restic-restore-helper-rhel8@sha256:70d3d46f54b91538e047df62e7e5b161fabac195a2f2e45cdba78215b4c82a7d_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-rhel8@sha256:1ca6945c3918f1743a4cee86a507f9f6581c8f8e572b6b8739d79a675a64d1db_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-velero-plugin-rhel8@sha256:26f8fb5c41ece82626325ba502505ba1ca7986602cc147b492f9857caa0be868_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "golang: net/url: JoinPath does not strip relative path components in all circumstances"
},
{
"acknowledgments": [
{
"names": [
"Adam Korczynski"
],
"organization": "ADA Logics"
},
{
"names": [
"OSS-Fuzz"
]
}
],
"cve": "CVE-2022-41715",
"discovery_date": "2022-10-07T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-RHMTC-1.7:rhmtc/openshift-migration-controller-rhel8@sha256:362eb32d0d2607f72b4f425dabaea7cde5d292ac41aea0c18c78bc6e408fff9e_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-hook-runner-rhel8@sha256:aa63717ac3a4961e774ed0baa3a73f01eda185516e7380579d97b9d25764d10d_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-legacy-rhel8-operator@sha256:1ac9cdfbdce8f7b6e4ebf5e40013f766b71b6dd604c92f602aca96612a228eda_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-log-reader-rhel8@sha256:d89e9ef65993466d25b26702d0210c14ce191155501774f4d2f1f08dbdad9804_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-must-gather-rhel8@sha256:5acf34dc4041b694b452d46c2f656db566241773285ca305a79ab7b9dc087b43_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-openvpn-rhel8@sha256:15df7304827ce49d422554551f08d99cfffa1afc4ffacac145d4399ccb1cbd68_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-operator-bundle@sha256:90ed03a5e0cb0b0ffd85f7434cc4eda9bd8fe81cd90b597772d9b7caccd4b80f_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-registry-rhel8@sha256:aaa03ef0769d38185675db2a7a78454659de14bdebe5ff842614bf2124e5adfe_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-rhel8-operator@sha256:aaaf4f6095294b497889749390f0a3aac04b83131a423799c44b5e367e0b370a_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-rsync-transfer-rhel8@sha256:58bd4ffc3e9599401251ac929cf15c1773ecc03a57177118adbe23ac8d7762af_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-ui-rhel8@sha256:4141db5099ae659270297eb4aaff695ac43fce67d91fea49dbc76583f419d3a1_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-plugin-for-aws-rhel8@sha256:633eeb0b6b50e21bbc0fb12fd2262294733fc9ac8b1e9eedcdb9d1433534d88d_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-plugin-for-gcp-rhel8@sha256:19dbf2bb83f8a0f35079d6ae25f8fcddad970e48ecb21694fd2d4c553313e4aa_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-plugin-for-microsoft-azure-rhel8@sha256:93e95f065eadaa41154b9012dd5ddc824607758e2bce85c4256c2689125b80a4_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-restic-restore-helper-rhel8@sha256:70d3d46f54b91538e047df62e7e5b161fabac195a2f2e45cdba78215b4c82a7d_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-rhel8@sha256:1ca6945c3918f1743a4cee86a507f9f6581c8f8e572b6b8739d79a675a64d1db_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2132872"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the golang package, where programs that compile regular expressions from untrusted sources are vulnerable to memory exhaustion or a denial of service. The parsed regexp representation is linear in the input size. Still, in some cases, the constant factor can be as high as 40,000, making a relatively small regexp consume larger amounts of memory. After the fix, each regexp being parsed is limited to a 256 MB memory footprint. Regular expressions whose representation would use more space than that are rejected. Routine use of regular expressions is unaffected.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: regexp/syntax: limit memory used by parsing regexps",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The opportunity for a Denial of Service is limited to the golang runtime. In the case of OpenShift Container Platform, this would be restricted within each individual container. There are multiple layers of guide rails (Golang\u2019s Garbage Collector; OpenShift\u2019s resource constraints imposed at the container and cluster levels) which would require a malicious user to continue submitting attacks for there to be any enduring impact. They would also need access to external server resources to be able to send a massive volume of requests to cause a significant impact on server operations.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-RHMTC-1.7:rhmtc/openshift-velero-plugin-rhel8@sha256:26f8fb5c41ece82626325ba502505ba1ca7986602cc147b492f9857caa0be868_amd64"
],
"known_not_affected": [
"8Base-RHMTC-1.7:rhmtc/openshift-migration-controller-rhel8@sha256:362eb32d0d2607f72b4f425dabaea7cde5d292ac41aea0c18c78bc6e408fff9e_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-hook-runner-rhel8@sha256:aa63717ac3a4961e774ed0baa3a73f01eda185516e7380579d97b9d25764d10d_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-legacy-rhel8-operator@sha256:1ac9cdfbdce8f7b6e4ebf5e40013f766b71b6dd604c92f602aca96612a228eda_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-log-reader-rhel8@sha256:d89e9ef65993466d25b26702d0210c14ce191155501774f4d2f1f08dbdad9804_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-must-gather-rhel8@sha256:5acf34dc4041b694b452d46c2f656db566241773285ca305a79ab7b9dc087b43_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-openvpn-rhel8@sha256:15df7304827ce49d422554551f08d99cfffa1afc4ffacac145d4399ccb1cbd68_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-operator-bundle@sha256:90ed03a5e0cb0b0ffd85f7434cc4eda9bd8fe81cd90b597772d9b7caccd4b80f_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-registry-rhel8@sha256:aaa03ef0769d38185675db2a7a78454659de14bdebe5ff842614bf2124e5adfe_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-rhel8-operator@sha256:aaaf4f6095294b497889749390f0a3aac04b83131a423799c44b5e367e0b370a_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-rsync-transfer-rhel8@sha256:58bd4ffc3e9599401251ac929cf15c1773ecc03a57177118adbe23ac8d7762af_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-ui-rhel8@sha256:4141db5099ae659270297eb4aaff695ac43fce67d91fea49dbc76583f419d3a1_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-plugin-for-aws-rhel8@sha256:633eeb0b6b50e21bbc0fb12fd2262294733fc9ac8b1e9eedcdb9d1433534d88d_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-plugin-for-gcp-rhel8@sha256:19dbf2bb83f8a0f35079d6ae25f8fcddad970e48ecb21694fd2d4c553313e4aa_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-plugin-for-microsoft-azure-rhel8@sha256:93e95f065eadaa41154b9012dd5ddc824607758e2bce85c4256c2689125b80a4_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-restic-restore-helper-rhel8@sha256:70d3d46f54b91538e047df62e7e5b161fabac195a2f2e45cdba78215b4c82a7d_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-rhel8@sha256:1ca6945c3918f1743a4cee86a507f9f6581c8f8e572b6b8739d79a675a64d1db_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-41715"
},
{
"category": "external",
"summary": "RHBZ#2132872",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2132872"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-41715",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41715"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-41715",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-41715"
},
{
"category": "external",
"summary": "https://github.com/golang/go/issues/55949",
"url": "https://github.com/golang/go/issues/55949"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/xtuG5faxtaU?pli=1",
"url": "https://groups.google.com/g/golang-announce/c/xtuG5faxtaU?pli=1"
}
],
"release_date": "2022-10-04T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-02-09T02:17:22+00:00",
"details": "For details on how to install and use MTC, refer to:\n\nhttps://docs.openshift.com/container-platform/latest/migration_toolkit_for_containers/installing-mtc.html",
"product_ids": [
"8Base-RHMTC-1.7:rhmtc/openshift-velero-plugin-rhel8@sha256:26f8fb5c41ece82626325ba502505ba1ca7986602cc147b492f9857caa0be868_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:0693"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"8Base-RHMTC-1.7:rhmtc/openshift-migration-controller-rhel8@sha256:362eb32d0d2607f72b4f425dabaea7cde5d292ac41aea0c18c78bc6e408fff9e_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-hook-runner-rhel8@sha256:aa63717ac3a4961e774ed0baa3a73f01eda185516e7380579d97b9d25764d10d_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-legacy-rhel8-operator@sha256:1ac9cdfbdce8f7b6e4ebf5e40013f766b71b6dd604c92f602aca96612a228eda_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-log-reader-rhel8@sha256:d89e9ef65993466d25b26702d0210c14ce191155501774f4d2f1f08dbdad9804_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-must-gather-rhel8@sha256:5acf34dc4041b694b452d46c2f656db566241773285ca305a79ab7b9dc087b43_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-openvpn-rhel8@sha256:15df7304827ce49d422554551f08d99cfffa1afc4ffacac145d4399ccb1cbd68_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-operator-bundle@sha256:90ed03a5e0cb0b0ffd85f7434cc4eda9bd8fe81cd90b597772d9b7caccd4b80f_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-registry-rhel8@sha256:aaa03ef0769d38185675db2a7a78454659de14bdebe5ff842614bf2124e5adfe_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-rhel8-operator@sha256:aaaf4f6095294b497889749390f0a3aac04b83131a423799c44b5e367e0b370a_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-rsync-transfer-rhel8@sha256:58bd4ffc3e9599401251ac929cf15c1773ecc03a57177118adbe23ac8d7762af_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-ui-rhel8@sha256:4141db5099ae659270297eb4aaff695ac43fce67d91fea49dbc76583f419d3a1_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-plugin-for-aws-rhel8@sha256:633eeb0b6b50e21bbc0fb12fd2262294733fc9ac8b1e9eedcdb9d1433534d88d_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-plugin-for-gcp-rhel8@sha256:19dbf2bb83f8a0f35079d6ae25f8fcddad970e48ecb21694fd2d4c553313e4aa_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-plugin-for-microsoft-azure-rhel8@sha256:93e95f065eadaa41154b9012dd5ddc824607758e2bce85c4256c2689125b80a4_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-restic-restore-helper-rhel8@sha256:70d3d46f54b91538e047df62e7e5b161fabac195a2f2e45cdba78215b4c82a7d_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-rhel8@sha256:1ca6945c3918f1743a4cee86a507f9f6581c8f8e572b6b8739d79a675a64d1db_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-velero-plugin-rhel8@sha256:26f8fb5c41ece82626325ba502505ba1ca7986602cc147b492f9857caa0be868_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "golang: regexp/syntax: limit memory used by parsing regexps"
},
{
"cve": "CVE-2022-41717",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"discovery_date": "2023-01-16T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-RHMTC-1.7:rhmtc/openshift-migration-hook-runner-rhel8@sha256:aa63717ac3a4961e774ed0baa3a73f01eda185516e7380579d97b9d25764d10d_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-legacy-rhel8-operator@sha256:1ac9cdfbdce8f7b6e4ebf5e40013f766b71b6dd604c92f602aca96612a228eda_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-log-reader-rhel8@sha256:d89e9ef65993466d25b26702d0210c14ce191155501774f4d2f1f08dbdad9804_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-openvpn-rhel8@sha256:15df7304827ce49d422554551f08d99cfffa1afc4ffacac145d4399ccb1cbd68_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-operator-bundle@sha256:90ed03a5e0cb0b0ffd85f7434cc4eda9bd8fe81cd90b597772d9b7caccd4b80f_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-rhel8-operator@sha256:aaaf4f6095294b497889749390f0a3aac04b83131a423799c44b5e367e0b370a_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-rsync-transfer-rhel8@sha256:58bd4ffc3e9599401251ac929cf15c1773ecc03a57177118adbe23ac8d7762af_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-ui-rhel8@sha256:4141db5099ae659270297eb4aaff695ac43fce67d91fea49dbc76583f419d3a1_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2161274"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the net/http library of the golang package. This flaw allows an attacker to cause excessive memory growth in a Go server accepting HTTP/2 requests. HTTP/2 server connections contain a cache of HTTP header keys sent by the client. While the total number of entries in this cache is capped, an attacker sending very large keys can cause the server to allocate approximately 64 MiB per open connection.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: net/http: excessive memory growth in a Go server accepting HTTP/2 requests",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Within Red Hat OpenShift Container Platform, the grafana container is listed as will not fix. Since OCP 4.10, Grafana itself is not shipped and the Grafana web server is protected behind an OAuth proxy server.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-RHMTC-1.7:rhmtc/openshift-migration-controller-rhel8@sha256:362eb32d0d2607f72b4f425dabaea7cde5d292ac41aea0c18c78bc6e408fff9e_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-must-gather-rhel8@sha256:5acf34dc4041b694b452d46c2f656db566241773285ca305a79ab7b9dc087b43_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-registry-rhel8@sha256:aaa03ef0769d38185675db2a7a78454659de14bdebe5ff842614bf2124e5adfe_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-plugin-for-aws-rhel8@sha256:633eeb0b6b50e21bbc0fb12fd2262294733fc9ac8b1e9eedcdb9d1433534d88d_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-plugin-for-gcp-rhel8@sha256:19dbf2bb83f8a0f35079d6ae25f8fcddad970e48ecb21694fd2d4c553313e4aa_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-plugin-for-microsoft-azure-rhel8@sha256:93e95f065eadaa41154b9012dd5ddc824607758e2bce85c4256c2689125b80a4_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-restic-restore-helper-rhel8@sha256:70d3d46f54b91538e047df62e7e5b161fabac195a2f2e45cdba78215b4c82a7d_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-rhel8@sha256:1ca6945c3918f1743a4cee86a507f9f6581c8f8e572b6b8739d79a675a64d1db_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-velero-plugin-rhel8@sha256:26f8fb5c41ece82626325ba502505ba1ca7986602cc147b492f9857caa0be868_amd64"
],
"known_not_affected": [
"8Base-RHMTC-1.7:rhmtc/openshift-migration-hook-runner-rhel8@sha256:aa63717ac3a4961e774ed0baa3a73f01eda185516e7380579d97b9d25764d10d_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-legacy-rhel8-operator@sha256:1ac9cdfbdce8f7b6e4ebf5e40013f766b71b6dd604c92f602aca96612a228eda_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-log-reader-rhel8@sha256:d89e9ef65993466d25b26702d0210c14ce191155501774f4d2f1f08dbdad9804_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-openvpn-rhel8@sha256:15df7304827ce49d422554551f08d99cfffa1afc4ffacac145d4399ccb1cbd68_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-operator-bundle@sha256:90ed03a5e0cb0b0ffd85f7434cc4eda9bd8fe81cd90b597772d9b7caccd4b80f_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-rhel8-operator@sha256:aaaf4f6095294b497889749390f0a3aac04b83131a423799c44b5e367e0b370a_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-rsync-transfer-rhel8@sha256:58bd4ffc3e9599401251ac929cf15c1773ecc03a57177118adbe23ac8d7762af_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-ui-rhel8@sha256:4141db5099ae659270297eb4aaff695ac43fce67d91fea49dbc76583f419d3a1_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-41717"
},
{
"category": "external",
"summary": "RHBZ#2161274",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2161274"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-41717",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41717"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-41717",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-41717"
},
{
"category": "external",
"summary": "https://go.dev/cl/455635",
"url": "https://go.dev/cl/455635"
},
{
"category": "external",
"summary": "https://go.dev/cl/455717",
"url": "https://go.dev/cl/455717"
},
{
"category": "external",
"summary": "https://go.dev/issue/56350",
"url": "https://go.dev/issue/56350"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/L_3rmdT0BMU/m/yZDrXjIiBQAJ",
"url": "https://groups.google.com/g/golang-announce/c/L_3rmdT0BMU/m/yZDrXjIiBQAJ"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2022-1144",
"url": "https://pkg.go.dev/vuln/GO-2022-1144"
}
],
"release_date": "2022-11-30T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-02-09T02:17:22+00:00",
"details": "For details on how to install and use MTC, refer to:\n\nhttps://docs.openshift.com/container-platform/latest/migration_toolkit_for_containers/installing-mtc.html",
"product_ids": [
"8Base-RHMTC-1.7:rhmtc/openshift-migration-controller-rhel8@sha256:362eb32d0d2607f72b4f425dabaea7cde5d292ac41aea0c18c78bc6e408fff9e_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-must-gather-rhel8@sha256:5acf34dc4041b694b452d46c2f656db566241773285ca305a79ab7b9dc087b43_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-registry-rhel8@sha256:aaa03ef0769d38185675db2a7a78454659de14bdebe5ff842614bf2124e5adfe_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-plugin-for-aws-rhel8@sha256:633eeb0b6b50e21bbc0fb12fd2262294733fc9ac8b1e9eedcdb9d1433534d88d_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-plugin-for-gcp-rhel8@sha256:19dbf2bb83f8a0f35079d6ae25f8fcddad970e48ecb21694fd2d4c553313e4aa_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-plugin-for-microsoft-azure-rhel8@sha256:93e95f065eadaa41154b9012dd5ddc824607758e2bce85c4256c2689125b80a4_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-restic-restore-helper-rhel8@sha256:70d3d46f54b91538e047df62e7e5b161fabac195a2f2e45cdba78215b4c82a7d_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-rhel8@sha256:1ca6945c3918f1743a4cee86a507f9f6581c8f8e572b6b8739d79a675a64d1db_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-velero-plugin-rhel8@sha256:26f8fb5c41ece82626325ba502505ba1ca7986602cc147b492f9857caa0be868_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:0693"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"8Base-RHMTC-1.7:rhmtc/openshift-migration-controller-rhel8@sha256:362eb32d0d2607f72b4f425dabaea7cde5d292ac41aea0c18c78bc6e408fff9e_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-hook-runner-rhel8@sha256:aa63717ac3a4961e774ed0baa3a73f01eda185516e7380579d97b9d25764d10d_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-legacy-rhel8-operator@sha256:1ac9cdfbdce8f7b6e4ebf5e40013f766b71b6dd604c92f602aca96612a228eda_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-log-reader-rhel8@sha256:d89e9ef65993466d25b26702d0210c14ce191155501774f4d2f1f08dbdad9804_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-must-gather-rhel8@sha256:5acf34dc4041b694b452d46c2f656db566241773285ca305a79ab7b9dc087b43_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-openvpn-rhel8@sha256:15df7304827ce49d422554551f08d99cfffa1afc4ffacac145d4399ccb1cbd68_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-operator-bundle@sha256:90ed03a5e0cb0b0ffd85f7434cc4eda9bd8fe81cd90b597772d9b7caccd4b80f_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-registry-rhel8@sha256:aaa03ef0769d38185675db2a7a78454659de14bdebe5ff842614bf2124e5adfe_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-rhel8-operator@sha256:aaaf4f6095294b497889749390f0a3aac04b83131a423799c44b5e367e0b370a_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-rsync-transfer-rhel8@sha256:58bd4ffc3e9599401251ac929cf15c1773ecc03a57177118adbe23ac8d7762af_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-ui-rhel8@sha256:4141db5099ae659270297eb4aaff695ac43fce67d91fea49dbc76583f419d3a1_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-plugin-for-aws-rhel8@sha256:633eeb0b6b50e21bbc0fb12fd2262294733fc9ac8b1e9eedcdb9d1433534d88d_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-plugin-for-gcp-rhel8@sha256:19dbf2bb83f8a0f35079d6ae25f8fcddad970e48ecb21694fd2d4c553313e4aa_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-plugin-for-microsoft-azure-rhel8@sha256:93e95f065eadaa41154b9012dd5ddc824607758e2bce85c4256c2689125b80a4_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-restic-restore-helper-rhel8@sha256:70d3d46f54b91538e047df62e7e5b161fabac195a2f2e45cdba78215b4c82a7d_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-rhel8@sha256:1ca6945c3918f1743a4cee86a507f9f6581c8f8e572b6b8739d79a675a64d1db_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-velero-plugin-rhel8@sha256:26f8fb5c41ece82626325ba502505ba1ca7986602cc147b492f9857caa0be868_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "golang: net/http: excessive memory growth in a Go server accepting HTTP/2 requests"
}
]
}
rhsa-2022_7435
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update is now available for Logging subsystem for Red Hat OpenShift 5.4.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Logging Subsystem 5.4.8 - Red Hat OpenShift\n\nSecurity Fix(es):\n\n* jackson-databind: denial of service via a large depth of nested objects (CVE-2020-36518)\n\n* golang: golang.org/x/text/language: ParseAcceptLanguage takes a long time to parse complex tags (CVE-2022-32149)\n\n* jackson-databind: deep wrapper array nesting wrt UNWRAP_SINGLE_VALUE_ARRAYS (CVE-2022-42003)\n\n* jackson-databind: use of deeply nested arrays (CVE-2022-42004)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2022:7435",
"url": "https://access.redhat.com/errata/RHSA-2022:7435"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#moderate",
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "2064698",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2064698"
},
{
"category": "external",
"summary": "2134010",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2134010"
},
{
"category": "external",
"summary": "2135244",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2135244"
},
{
"category": "external",
"summary": "2135247",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2135247"
},
{
"category": "external",
"summary": "LOG-3250",
"url": "https://issues.redhat.com/browse/LOG-3250"
},
{
"category": "external",
"summary": "LOG-3252",
"url": "https://issues.redhat.com/browse/LOG-3252"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2022/rhsa-2022_7435.json"
}
],
"title": "Red Hat Security Advisory: Logging Subsystem 5.4.8 - Red Hat OpenShift security update",
"tracking": {
"current_release_date": "2025-01-06T13:41:35+00:00",
"generator": {
"date": "2025-01-06T13:41:35+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.5"
}
},
"id": "RHSA-2022:7435",
"initial_release_date": "2022-11-16T12:13:01+00:00",
"revision_history": [
{
"date": "2022-11-16T12:13:01+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2022-11-16T12:13:01+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-01-06T13:41:35+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "RHOL 5.4 for RHEL 8",
"product": {
"name": "RHOL 5.4 for RHEL 8",
"product_id": "8Base-RHOL-5.4",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:logging:5.4::el8"
}
}
}
],
"category": "product_family",
"name": "logging for Red Hat OpenShift"
},
{
"branches": [
{
"category": "product_version",
"name": "openshift-logging/cluster-logging-rhel8-operator@sha256:617cc8b0011110981674b75fe1e3041bfa434c952e4a0193818b971edbc7a480_s390x",
"product": {
"name": "openshift-logging/cluster-logging-rhel8-operator@sha256:617cc8b0011110981674b75fe1e3041bfa434c952e4a0193818b971edbc7a480_s390x",
"product_id": "openshift-logging/cluster-logging-rhel8-operator@sha256:617cc8b0011110981674b75fe1e3041bfa434c952e4a0193818b971edbc7a480_s390x",
"product_identification_helper": {
"purl": "pkg:oci/cluster-logging-rhel8-operator@sha256:617cc8b0011110981674b75fe1e3041bfa434c952e4a0193818b971edbc7a480?arch=s390x\u0026repository_url=registry.redhat.io/openshift-logging/cluster-logging-rhel8-operator\u0026tag=v5.4.8-6"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/elasticsearch-rhel8-operator@sha256:dd211d42eaad043d9bdb519e3ad6a86255b7280a2cdf47dd3fe0458a77cb110f_s390x",
"product": {
"name": "openshift-logging/elasticsearch-rhel8-operator@sha256:dd211d42eaad043d9bdb519e3ad6a86255b7280a2cdf47dd3fe0458a77cb110f_s390x",
"product_id": "openshift-logging/elasticsearch-rhel8-operator@sha256:dd211d42eaad043d9bdb519e3ad6a86255b7280a2cdf47dd3fe0458a77cb110f_s390x",
"product_identification_helper": {
"purl": "pkg:oci/elasticsearch-rhel8-operator@sha256:dd211d42eaad043d9bdb519e3ad6a86255b7280a2cdf47dd3fe0458a77cb110f?arch=s390x\u0026repository_url=registry.redhat.io/openshift-logging/elasticsearch-rhel8-operator\u0026tag=v5.4.8-3"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/elasticsearch-proxy-rhel8@sha256:b9c2e58b39dc3de97013f8806178f6327bf2e4590fe55db144527d64d468f64f_s390x",
"product": {
"name": "openshift-logging/elasticsearch-proxy-rhel8@sha256:b9c2e58b39dc3de97013f8806178f6327bf2e4590fe55db144527d64d468f64f_s390x",
"product_id": "openshift-logging/elasticsearch-proxy-rhel8@sha256:b9c2e58b39dc3de97013f8806178f6327bf2e4590fe55db144527d64d468f64f_s390x",
"product_identification_helper": {
"purl": "pkg:oci/elasticsearch-proxy-rhel8@sha256:b9c2e58b39dc3de97013f8806178f6327bf2e4590fe55db144527d64d468f64f?arch=s390x\u0026repository_url=registry.redhat.io/openshift-logging/elasticsearch-proxy-rhel8\u0026tag=v1.0.0-300"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/log-file-metric-exporter-rhel8@sha256:85827db708c0927027435b05732cc7e34b0675eaa86665c91efacc76aecd6227_s390x",
"product": {
"name": "openshift-logging/log-file-metric-exporter-rhel8@sha256:85827db708c0927027435b05732cc7e34b0675eaa86665c91efacc76aecd6227_s390x",
"product_id": "openshift-logging/log-file-metric-exporter-rhel8@sha256:85827db708c0927027435b05732cc7e34b0675eaa86665c91efacc76aecd6227_s390x",
"product_identification_helper": {
"purl": "pkg:oci/log-file-metric-exporter-rhel8@sha256:85827db708c0927027435b05732cc7e34b0675eaa86665c91efacc76aecd6227?arch=s390x\u0026repository_url=registry.redhat.io/openshift-logging/log-file-metric-exporter-rhel8\u0026tag=v1.1.0-74"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/logging-curator5-rhel8@sha256:7016e867ddfe970d6d2d54d5615e8f613786bcfbfe52ebf3139c07da3d5a53db_s390x",
"product": {
"name": "openshift-logging/logging-curator5-rhel8@sha256:7016e867ddfe970d6d2d54d5615e8f613786bcfbfe52ebf3139c07da3d5a53db_s390x",
"product_id": "openshift-logging/logging-curator5-rhel8@sha256:7016e867ddfe970d6d2d54d5615e8f613786bcfbfe52ebf3139c07da3d5a53db_s390x",
"product_identification_helper": {
"purl": "pkg:oci/logging-curator5-rhel8@sha256:7016e867ddfe970d6d2d54d5615e8f613786bcfbfe52ebf3139c07da3d5a53db?arch=s390x\u0026repository_url=registry.redhat.io/openshift-logging/logging-curator5-rhel8\u0026tag=v5.8.1-246"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/elasticsearch6-rhel8@sha256:5b1cfc2f9a96601439cf17d1fe49a6bc6cad3b7273af87b23528090aefbfd915_s390x",
"product": {
"name": "openshift-logging/elasticsearch6-rhel8@sha256:5b1cfc2f9a96601439cf17d1fe49a6bc6cad3b7273af87b23528090aefbfd915_s390x",
"product_id": "openshift-logging/elasticsearch6-rhel8@sha256:5b1cfc2f9a96601439cf17d1fe49a6bc6cad3b7273af87b23528090aefbfd915_s390x",
"product_identification_helper": {
"purl": "pkg:oci/elasticsearch6-rhel8@sha256:5b1cfc2f9a96601439cf17d1fe49a6bc6cad3b7273af87b23528090aefbfd915?arch=s390x\u0026repository_url=registry.redhat.io/openshift-logging/elasticsearch6-rhel8\u0026tag=v6.8.1-265"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/eventrouter-rhel8@sha256:f05aee8433dec1c9f6cf835038f9e5a47847d4095383bf3c22ca57c3fb69fa98_s390x",
"product": {
"name": "openshift-logging/eventrouter-rhel8@sha256:f05aee8433dec1c9f6cf835038f9e5a47847d4095383bf3c22ca57c3fb69fa98_s390x",
"product_id": "openshift-logging/eventrouter-rhel8@sha256:f05aee8433dec1c9f6cf835038f9e5a47847d4095383bf3c22ca57c3fb69fa98_s390x",
"product_identification_helper": {
"purl": "pkg:oci/eventrouter-rhel8@sha256:f05aee8433dec1c9f6cf835038f9e5a47847d4095383bf3c22ca57c3fb69fa98?arch=s390x\u0026repository_url=registry.redhat.io/openshift-logging/eventrouter-rhel8\u0026tag=v0.4.0-55"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/fluentd-rhel8@sha256:36aecf05ca3cdaf29982b3efa4a1c97087be29b0a58c9777e6b0c11a34861aa8_s390x",
"product": {
"name": "openshift-logging/fluentd-rhel8@sha256:36aecf05ca3cdaf29982b3efa4a1c97087be29b0a58c9777e6b0c11a34861aa8_s390x",
"product_id": "openshift-logging/fluentd-rhel8@sha256:36aecf05ca3cdaf29982b3efa4a1c97087be29b0a58c9777e6b0c11a34861aa8_s390x",
"product_identification_helper": {
"purl": "pkg:oci/fluentd-rhel8@sha256:36aecf05ca3cdaf29982b3efa4a1c97087be29b0a58c9777e6b0c11a34861aa8?arch=s390x\u0026repository_url=registry.redhat.io/openshift-logging/fluentd-rhel8\u0026tag=v1.14.5-36"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/kibana6-rhel8@sha256:4a029733337b10bb9fb8d98c91abc5451ca0b98713c8f2271a675251e025b6c0_s390x",
"product": {
"name": "openshift-logging/kibana6-rhel8@sha256:4a029733337b10bb9fb8d98c91abc5451ca0b98713c8f2271a675251e025b6c0_s390x",
"product_id": "openshift-logging/kibana6-rhel8@sha256:4a029733337b10bb9fb8d98c91abc5451ca0b98713c8f2271a675251e025b6c0_s390x",
"product_identification_helper": {
"purl": "pkg:oci/kibana6-rhel8@sha256:4a029733337b10bb9fb8d98c91abc5451ca0b98713c8f2271a675251e025b6c0?arch=s390x\u0026repository_url=registry.redhat.io/openshift-logging/kibana6-rhel8\u0026tag=v6.8.1-302"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/logging-loki-rhel8@sha256:cfe410d498940a95da631ea213866a96a119034d78d5d53f7f9c7e8da56e0f45_s390x",
"product": {
"name": "openshift-logging/logging-loki-rhel8@sha256:cfe410d498940a95da631ea213866a96a119034d78d5d53f7f9c7e8da56e0f45_s390x",
"product_id": "openshift-logging/logging-loki-rhel8@sha256:cfe410d498940a95da631ea213866a96a119034d78d5d53f7f9c7e8da56e0f45_s390x",
"product_identification_helper": {
"purl": "pkg:oci/logging-loki-rhel8@sha256:cfe410d498940a95da631ea213866a96a119034d78d5d53f7f9c7e8da56e0f45?arch=s390x\u0026repository_url=registry.redhat.io/openshift-logging/logging-loki-rhel8\u0026tag=v2.5.0-51"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/vector-rhel8@sha256:48bb136d11b44428c87489978873370848ac2b219b107ef7e81ab679db095234_s390x",
"product": {
"name": "openshift-logging/vector-rhel8@sha256:48bb136d11b44428c87489978873370848ac2b219b107ef7e81ab679db095234_s390x",
"product_id": "openshift-logging/vector-rhel8@sha256:48bb136d11b44428c87489978873370848ac2b219b107ef7e81ab679db095234_s390x",
"product_identification_helper": {
"purl": "pkg:oci/vector-rhel8@sha256:48bb136d11b44428c87489978873370848ac2b219b107ef7e81ab679db095234?arch=s390x\u0026repository_url=registry.redhat.io/openshift-logging/vector-rhel8\u0026tag=v0.14-67"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/loki-rhel8-operator@sha256:0f1be625b4012820f7ac439fed000808d7acb4e885ace16014461bf802be935a_s390x",
"product": {
"name": "openshift-logging/loki-rhel8-operator@sha256:0f1be625b4012820f7ac439fed000808d7acb4e885ace16014461bf802be935a_s390x",
"product_id": "openshift-logging/loki-rhel8-operator@sha256:0f1be625b4012820f7ac439fed000808d7acb4e885ace16014461bf802be935a_s390x",
"product_identification_helper": {
"purl": "pkg:oci/loki-rhel8-operator@sha256:0f1be625b4012820f7ac439fed000808d7acb4e885ace16014461bf802be935a?arch=s390x\u0026repository_url=registry.redhat.io/openshift-logging/loki-rhel8-operator\u0026tag=v5.4.8-4"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/lokistack-gateway-rhel8@sha256:9c4959525339b607a98889d56f4c26f2e4af25032466c439903a7f1cb593f721_s390x",
"product": {
"name": "openshift-logging/lokistack-gateway-rhel8@sha256:9c4959525339b607a98889d56f4c26f2e4af25032466c439903a7f1cb593f721_s390x",
"product_id": "openshift-logging/lokistack-gateway-rhel8@sha256:9c4959525339b607a98889d56f4c26f2e4af25032466c439903a7f1cb593f721_s390x",
"product_identification_helper": {
"purl": "pkg:oci/lokistack-gateway-rhel8@sha256:9c4959525339b607a98889d56f4c26f2e4af25032466c439903a7f1cb593f721?arch=s390x\u0026repository_url=registry.redhat.io/openshift-logging/lokistack-gateway-rhel8\u0026tag=v5.4.8-5"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/opa-openshift-rhel8@sha256:be8ba0e4c5f24c7b4549700a25c89b10d4b2fc0b0e3888163bb53827914e95c1_s390x",
"product": {
"name": "openshift-logging/opa-openshift-rhel8@sha256:be8ba0e4c5f24c7b4549700a25c89b10d4b2fc0b0e3888163bb53827914e95c1_s390x",
"product_id": "openshift-logging/opa-openshift-rhel8@sha256:be8ba0e4c5f24c7b4549700a25c89b10d4b2fc0b0e3888163bb53827914e95c1_s390x",
"product_identification_helper": {
"purl": "pkg:oci/opa-openshift-rhel8@sha256:be8ba0e4c5f24c7b4549700a25c89b10d4b2fc0b0e3888163bb53827914e95c1?arch=s390x\u0026repository_url=registry.redhat.io/openshift-logging/opa-openshift-rhel8\u0026tag=v5.4.8-4"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "openshift-logging/cluster-logging-rhel8-operator@sha256:aa1602fe2abe23bd8a4c791bc45d425686a6e6d1aab4face0fac28bfc7cebbe1_ppc64le",
"product": {
"name": "openshift-logging/cluster-logging-rhel8-operator@sha256:aa1602fe2abe23bd8a4c791bc45d425686a6e6d1aab4face0fac28bfc7cebbe1_ppc64le",
"product_id": "openshift-logging/cluster-logging-rhel8-operator@sha256:aa1602fe2abe23bd8a4c791bc45d425686a6e6d1aab4face0fac28bfc7cebbe1_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/cluster-logging-rhel8-operator@sha256:aa1602fe2abe23bd8a4c791bc45d425686a6e6d1aab4face0fac28bfc7cebbe1?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-logging/cluster-logging-rhel8-operator\u0026tag=v5.4.8-6"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/elasticsearch-rhel8-operator@sha256:6a55934cf7af0c03e06d4ec7a15a80acf53491fb7a183c16fdf8018fbf9b4174_ppc64le",
"product": {
"name": "openshift-logging/elasticsearch-rhel8-operator@sha256:6a55934cf7af0c03e06d4ec7a15a80acf53491fb7a183c16fdf8018fbf9b4174_ppc64le",
"product_id": "openshift-logging/elasticsearch-rhel8-operator@sha256:6a55934cf7af0c03e06d4ec7a15a80acf53491fb7a183c16fdf8018fbf9b4174_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/elasticsearch-rhel8-operator@sha256:6a55934cf7af0c03e06d4ec7a15a80acf53491fb7a183c16fdf8018fbf9b4174?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-logging/elasticsearch-rhel8-operator\u0026tag=v5.4.8-3"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/elasticsearch-proxy-rhel8@sha256:4f4e5bb267ad391bc0fc6a010ec9ecdf3bf48d5b6e9db0d2510960c13c97bd71_ppc64le",
"product": {
"name": "openshift-logging/elasticsearch-proxy-rhel8@sha256:4f4e5bb267ad391bc0fc6a010ec9ecdf3bf48d5b6e9db0d2510960c13c97bd71_ppc64le",
"product_id": "openshift-logging/elasticsearch-proxy-rhel8@sha256:4f4e5bb267ad391bc0fc6a010ec9ecdf3bf48d5b6e9db0d2510960c13c97bd71_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/elasticsearch-proxy-rhel8@sha256:4f4e5bb267ad391bc0fc6a010ec9ecdf3bf48d5b6e9db0d2510960c13c97bd71?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-logging/elasticsearch-proxy-rhel8\u0026tag=v1.0.0-300"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/log-file-metric-exporter-rhel8@sha256:4fe26adac10cf20b83812e4fa513231d7e1fd4b6cd4e09d4fd425c391885cfcc_ppc64le",
"product": {
"name": "openshift-logging/log-file-metric-exporter-rhel8@sha256:4fe26adac10cf20b83812e4fa513231d7e1fd4b6cd4e09d4fd425c391885cfcc_ppc64le",
"product_id": "openshift-logging/log-file-metric-exporter-rhel8@sha256:4fe26adac10cf20b83812e4fa513231d7e1fd4b6cd4e09d4fd425c391885cfcc_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/log-file-metric-exporter-rhel8@sha256:4fe26adac10cf20b83812e4fa513231d7e1fd4b6cd4e09d4fd425c391885cfcc?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-logging/log-file-metric-exporter-rhel8\u0026tag=v1.1.0-74"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/logging-curator5-rhel8@sha256:d24afbc9228ef7f3d0a6fd716a3a57abde88a1f65d149c7df4f959a775b670bd_ppc64le",
"product": {
"name": "openshift-logging/logging-curator5-rhel8@sha256:d24afbc9228ef7f3d0a6fd716a3a57abde88a1f65d149c7df4f959a775b670bd_ppc64le",
"product_id": "openshift-logging/logging-curator5-rhel8@sha256:d24afbc9228ef7f3d0a6fd716a3a57abde88a1f65d149c7df4f959a775b670bd_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/logging-curator5-rhel8@sha256:d24afbc9228ef7f3d0a6fd716a3a57abde88a1f65d149c7df4f959a775b670bd?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-logging/logging-curator5-rhel8\u0026tag=v5.8.1-246"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/elasticsearch6-rhel8@sha256:17a9f3ae042b92693a374e3d60a07f2ab2e52419f8df25d446dd0654f6a858f6_ppc64le",
"product": {
"name": "openshift-logging/elasticsearch6-rhel8@sha256:17a9f3ae042b92693a374e3d60a07f2ab2e52419f8df25d446dd0654f6a858f6_ppc64le",
"product_id": "openshift-logging/elasticsearch6-rhel8@sha256:17a9f3ae042b92693a374e3d60a07f2ab2e52419f8df25d446dd0654f6a858f6_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/elasticsearch6-rhel8@sha256:17a9f3ae042b92693a374e3d60a07f2ab2e52419f8df25d446dd0654f6a858f6?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-logging/elasticsearch6-rhel8\u0026tag=v6.8.1-265"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/eventrouter-rhel8@sha256:bc408fc4b0482c5eb1b0deb3a9090f3e3dd9b370001d54cd076254562c72fec9_ppc64le",
"product": {
"name": "openshift-logging/eventrouter-rhel8@sha256:bc408fc4b0482c5eb1b0deb3a9090f3e3dd9b370001d54cd076254562c72fec9_ppc64le",
"product_id": "openshift-logging/eventrouter-rhel8@sha256:bc408fc4b0482c5eb1b0deb3a9090f3e3dd9b370001d54cd076254562c72fec9_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/eventrouter-rhel8@sha256:bc408fc4b0482c5eb1b0deb3a9090f3e3dd9b370001d54cd076254562c72fec9?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-logging/eventrouter-rhel8\u0026tag=v0.4.0-55"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/fluentd-rhel8@sha256:ea07da04f06df6bf0d9dd981a3795dfdb51eca83f59a6291114650e3e98a9e71_ppc64le",
"product": {
"name": "openshift-logging/fluentd-rhel8@sha256:ea07da04f06df6bf0d9dd981a3795dfdb51eca83f59a6291114650e3e98a9e71_ppc64le",
"product_id": "openshift-logging/fluentd-rhel8@sha256:ea07da04f06df6bf0d9dd981a3795dfdb51eca83f59a6291114650e3e98a9e71_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/fluentd-rhel8@sha256:ea07da04f06df6bf0d9dd981a3795dfdb51eca83f59a6291114650e3e98a9e71?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-logging/fluentd-rhel8\u0026tag=v1.14.5-36"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/kibana6-rhel8@sha256:812f4380024dc3df42310ad14d173d390f2bdf4b3dbdb02550c00552534f79ce_ppc64le",
"product": {
"name": "openshift-logging/kibana6-rhel8@sha256:812f4380024dc3df42310ad14d173d390f2bdf4b3dbdb02550c00552534f79ce_ppc64le",
"product_id": "openshift-logging/kibana6-rhel8@sha256:812f4380024dc3df42310ad14d173d390f2bdf4b3dbdb02550c00552534f79ce_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/kibana6-rhel8@sha256:812f4380024dc3df42310ad14d173d390f2bdf4b3dbdb02550c00552534f79ce?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-logging/kibana6-rhel8\u0026tag=v6.8.1-302"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/logging-loki-rhel8@sha256:f7979c82140a0ab1a97c9f3151465bfbd9f79c4db9b0cc20f974cd7b890f074f_ppc64le",
"product": {
"name": "openshift-logging/logging-loki-rhel8@sha256:f7979c82140a0ab1a97c9f3151465bfbd9f79c4db9b0cc20f974cd7b890f074f_ppc64le",
"product_id": "openshift-logging/logging-loki-rhel8@sha256:f7979c82140a0ab1a97c9f3151465bfbd9f79c4db9b0cc20f974cd7b890f074f_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/logging-loki-rhel8@sha256:f7979c82140a0ab1a97c9f3151465bfbd9f79c4db9b0cc20f974cd7b890f074f?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-logging/logging-loki-rhel8\u0026tag=v2.5.0-51"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/vector-rhel8@sha256:48f0317d167710ff5b0787c73f6b7dd0249e7c8d2d001159132a97299c30b62d_ppc64le",
"product": {
"name": "openshift-logging/vector-rhel8@sha256:48f0317d167710ff5b0787c73f6b7dd0249e7c8d2d001159132a97299c30b62d_ppc64le",
"product_id": "openshift-logging/vector-rhel8@sha256:48f0317d167710ff5b0787c73f6b7dd0249e7c8d2d001159132a97299c30b62d_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/vector-rhel8@sha256:48f0317d167710ff5b0787c73f6b7dd0249e7c8d2d001159132a97299c30b62d?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-logging/vector-rhel8\u0026tag=v0.14-67"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/loki-rhel8-operator@sha256:28f45a80846c5e11638fb479be42cafcb2bdb3af94dff3629a820de295cbe31d_ppc64le",
"product": {
"name": "openshift-logging/loki-rhel8-operator@sha256:28f45a80846c5e11638fb479be42cafcb2bdb3af94dff3629a820de295cbe31d_ppc64le",
"product_id": "openshift-logging/loki-rhel8-operator@sha256:28f45a80846c5e11638fb479be42cafcb2bdb3af94dff3629a820de295cbe31d_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/loki-rhel8-operator@sha256:28f45a80846c5e11638fb479be42cafcb2bdb3af94dff3629a820de295cbe31d?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-logging/loki-rhel8-operator\u0026tag=v5.4.8-4"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/lokistack-gateway-rhel8@sha256:7b0c2c99cf0f710166b749dbfd7f544caf5fe35516c743fca251c7cec896e1d6_ppc64le",
"product": {
"name": "openshift-logging/lokistack-gateway-rhel8@sha256:7b0c2c99cf0f710166b749dbfd7f544caf5fe35516c743fca251c7cec896e1d6_ppc64le",
"product_id": "openshift-logging/lokistack-gateway-rhel8@sha256:7b0c2c99cf0f710166b749dbfd7f544caf5fe35516c743fca251c7cec896e1d6_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/lokistack-gateway-rhel8@sha256:7b0c2c99cf0f710166b749dbfd7f544caf5fe35516c743fca251c7cec896e1d6?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-logging/lokistack-gateway-rhel8\u0026tag=v5.4.8-5"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/opa-openshift-rhel8@sha256:92ddf24824c8f8ae93dec07184c446615b635389472d3a525df72da07c8d9b97_ppc64le",
"product": {
"name": "openshift-logging/opa-openshift-rhel8@sha256:92ddf24824c8f8ae93dec07184c446615b635389472d3a525df72da07c8d9b97_ppc64le",
"product_id": "openshift-logging/opa-openshift-rhel8@sha256:92ddf24824c8f8ae93dec07184c446615b635389472d3a525df72da07c8d9b97_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/opa-openshift-rhel8@sha256:92ddf24824c8f8ae93dec07184c446615b635389472d3a525df72da07c8d9b97?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-logging/opa-openshift-rhel8\u0026tag=v5.4.8-4"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "openshift-logging/cluster-logging-rhel8-operator@sha256:637df49756fe85e7b38b279ffa7672d72c658d3d47df7f9dada2dd70563af83b_arm64",
"product": {
"name": "openshift-logging/cluster-logging-rhel8-operator@sha256:637df49756fe85e7b38b279ffa7672d72c658d3d47df7f9dada2dd70563af83b_arm64",
"product_id": "openshift-logging/cluster-logging-rhel8-operator@sha256:637df49756fe85e7b38b279ffa7672d72c658d3d47df7f9dada2dd70563af83b_arm64",
"product_identification_helper": {
"purl": "pkg:oci/cluster-logging-rhel8-operator@sha256:637df49756fe85e7b38b279ffa7672d72c658d3d47df7f9dada2dd70563af83b?arch=arm64\u0026repository_url=registry.redhat.io/openshift-logging/cluster-logging-rhel8-operator\u0026tag=v5.4.8-6"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/elasticsearch-rhel8-operator@sha256:2005f41e59a130bb86c2ec47d1b060e3e2ed32f9a4cef3897e2c05fc94043dbb_arm64",
"product": {
"name": "openshift-logging/elasticsearch-rhel8-operator@sha256:2005f41e59a130bb86c2ec47d1b060e3e2ed32f9a4cef3897e2c05fc94043dbb_arm64",
"product_id": "openshift-logging/elasticsearch-rhel8-operator@sha256:2005f41e59a130bb86c2ec47d1b060e3e2ed32f9a4cef3897e2c05fc94043dbb_arm64",
"product_identification_helper": {
"purl": "pkg:oci/elasticsearch-rhel8-operator@sha256:2005f41e59a130bb86c2ec47d1b060e3e2ed32f9a4cef3897e2c05fc94043dbb?arch=arm64\u0026repository_url=registry.redhat.io/openshift-logging/elasticsearch-rhel8-operator\u0026tag=v5.4.8-3"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/elasticsearch-proxy-rhel8@sha256:c9a2b9e7cca14d9596ccbe0f64e2abe4452f91f029f42eefead43c9f526f6a58_arm64",
"product": {
"name": "openshift-logging/elasticsearch-proxy-rhel8@sha256:c9a2b9e7cca14d9596ccbe0f64e2abe4452f91f029f42eefead43c9f526f6a58_arm64",
"product_id": "openshift-logging/elasticsearch-proxy-rhel8@sha256:c9a2b9e7cca14d9596ccbe0f64e2abe4452f91f029f42eefead43c9f526f6a58_arm64",
"product_identification_helper": {
"purl": "pkg:oci/elasticsearch-proxy-rhel8@sha256:c9a2b9e7cca14d9596ccbe0f64e2abe4452f91f029f42eefead43c9f526f6a58?arch=arm64\u0026repository_url=registry.redhat.io/openshift-logging/elasticsearch-proxy-rhel8\u0026tag=v1.0.0-300"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/log-file-metric-exporter-rhel8@sha256:a5285db276a5545fdbaa9f0743a49ba72ce1c5da61b5cccc9422320a03e08bea_arm64",
"product": {
"name": "openshift-logging/log-file-metric-exporter-rhel8@sha256:a5285db276a5545fdbaa9f0743a49ba72ce1c5da61b5cccc9422320a03e08bea_arm64",
"product_id": "openshift-logging/log-file-metric-exporter-rhel8@sha256:a5285db276a5545fdbaa9f0743a49ba72ce1c5da61b5cccc9422320a03e08bea_arm64",
"product_identification_helper": {
"purl": "pkg:oci/log-file-metric-exporter-rhel8@sha256:a5285db276a5545fdbaa9f0743a49ba72ce1c5da61b5cccc9422320a03e08bea?arch=arm64\u0026repository_url=registry.redhat.io/openshift-logging/log-file-metric-exporter-rhel8\u0026tag=v1.1.0-74"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/logging-curator5-rhel8@sha256:0b28415b8115ff3216002faa5c9ecf3c46995085e3364c8028cb544cb4787ed2_arm64",
"product": {
"name": "openshift-logging/logging-curator5-rhel8@sha256:0b28415b8115ff3216002faa5c9ecf3c46995085e3364c8028cb544cb4787ed2_arm64",
"product_id": "openshift-logging/logging-curator5-rhel8@sha256:0b28415b8115ff3216002faa5c9ecf3c46995085e3364c8028cb544cb4787ed2_arm64",
"product_identification_helper": {
"purl": "pkg:oci/logging-curator5-rhel8@sha256:0b28415b8115ff3216002faa5c9ecf3c46995085e3364c8028cb544cb4787ed2?arch=arm64\u0026repository_url=registry.redhat.io/openshift-logging/logging-curator5-rhel8\u0026tag=v5.8.1-246"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/elasticsearch6-rhel8@sha256:8e0ba10f91db4cb8786d0501ec33a3d54f7c7c5337e0495cc2286a6ea20cca20_arm64",
"product": {
"name": "openshift-logging/elasticsearch6-rhel8@sha256:8e0ba10f91db4cb8786d0501ec33a3d54f7c7c5337e0495cc2286a6ea20cca20_arm64",
"product_id": "openshift-logging/elasticsearch6-rhel8@sha256:8e0ba10f91db4cb8786d0501ec33a3d54f7c7c5337e0495cc2286a6ea20cca20_arm64",
"product_identification_helper": {
"purl": "pkg:oci/elasticsearch6-rhel8@sha256:8e0ba10f91db4cb8786d0501ec33a3d54f7c7c5337e0495cc2286a6ea20cca20?arch=arm64\u0026repository_url=registry.redhat.io/openshift-logging/elasticsearch6-rhel8\u0026tag=v6.8.1-265"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/eventrouter-rhel8@sha256:4438a3bba34418a9dc566bf15f6b4764de4295ab8b05a7b1a86f9e8cd332b3f7_arm64",
"product": {
"name": "openshift-logging/eventrouter-rhel8@sha256:4438a3bba34418a9dc566bf15f6b4764de4295ab8b05a7b1a86f9e8cd332b3f7_arm64",
"product_id": "openshift-logging/eventrouter-rhel8@sha256:4438a3bba34418a9dc566bf15f6b4764de4295ab8b05a7b1a86f9e8cd332b3f7_arm64",
"product_identification_helper": {
"purl": "pkg:oci/eventrouter-rhel8@sha256:4438a3bba34418a9dc566bf15f6b4764de4295ab8b05a7b1a86f9e8cd332b3f7?arch=arm64\u0026repository_url=registry.redhat.io/openshift-logging/eventrouter-rhel8\u0026tag=v0.4.0-55"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/fluentd-rhel8@sha256:e3a51d2bdc632b8376e28c33e9d4fac3464e3a84a313a17246b1f1cf21cb5710_arm64",
"product": {
"name": "openshift-logging/fluentd-rhel8@sha256:e3a51d2bdc632b8376e28c33e9d4fac3464e3a84a313a17246b1f1cf21cb5710_arm64",
"product_id": "openshift-logging/fluentd-rhel8@sha256:e3a51d2bdc632b8376e28c33e9d4fac3464e3a84a313a17246b1f1cf21cb5710_arm64",
"product_identification_helper": {
"purl": "pkg:oci/fluentd-rhel8@sha256:e3a51d2bdc632b8376e28c33e9d4fac3464e3a84a313a17246b1f1cf21cb5710?arch=arm64\u0026repository_url=registry.redhat.io/openshift-logging/fluentd-rhel8\u0026tag=v1.14.5-36"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/kibana6-rhel8@sha256:958ba6856cc76fc77d34a9c78888eb37b9c39b83a2f044ef2337610560ba9323_arm64",
"product": {
"name": "openshift-logging/kibana6-rhel8@sha256:958ba6856cc76fc77d34a9c78888eb37b9c39b83a2f044ef2337610560ba9323_arm64",
"product_id": "openshift-logging/kibana6-rhel8@sha256:958ba6856cc76fc77d34a9c78888eb37b9c39b83a2f044ef2337610560ba9323_arm64",
"product_identification_helper": {
"purl": "pkg:oci/kibana6-rhel8@sha256:958ba6856cc76fc77d34a9c78888eb37b9c39b83a2f044ef2337610560ba9323?arch=arm64\u0026repository_url=registry.redhat.io/openshift-logging/kibana6-rhel8\u0026tag=v6.8.1-302"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/logging-loki-rhel8@sha256:40d4989b4733f54a01a73831fa00b12e49fff69c75138902eac0d894d432e4d9_arm64",
"product": {
"name": "openshift-logging/logging-loki-rhel8@sha256:40d4989b4733f54a01a73831fa00b12e49fff69c75138902eac0d894d432e4d9_arm64",
"product_id": "openshift-logging/logging-loki-rhel8@sha256:40d4989b4733f54a01a73831fa00b12e49fff69c75138902eac0d894d432e4d9_arm64",
"product_identification_helper": {
"purl": "pkg:oci/logging-loki-rhel8@sha256:40d4989b4733f54a01a73831fa00b12e49fff69c75138902eac0d894d432e4d9?arch=arm64\u0026repository_url=registry.redhat.io/openshift-logging/logging-loki-rhel8\u0026tag=v2.5.0-51"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/vector-rhel8@sha256:bde21c03fb831d01e85b28245881f7e3f2bb2ef6d2671eb92b2e0cc4bd3898e2_arm64",
"product": {
"name": "openshift-logging/vector-rhel8@sha256:bde21c03fb831d01e85b28245881f7e3f2bb2ef6d2671eb92b2e0cc4bd3898e2_arm64",
"product_id": "openshift-logging/vector-rhel8@sha256:bde21c03fb831d01e85b28245881f7e3f2bb2ef6d2671eb92b2e0cc4bd3898e2_arm64",
"product_identification_helper": {
"purl": "pkg:oci/vector-rhel8@sha256:bde21c03fb831d01e85b28245881f7e3f2bb2ef6d2671eb92b2e0cc4bd3898e2?arch=arm64\u0026repository_url=registry.redhat.io/openshift-logging/vector-rhel8\u0026tag=v0.14-67"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/loki-rhel8-operator@sha256:df7de1e9f5a4396df6f14b1c4b6bb2a9ae4bc50d82cbc954ec535c26e8df2cb1_arm64",
"product": {
"name": "openshift-logging/loki-rhel8-operator@sha256:df7de1e9f5a4396df6f14b1c4b6bb2a9ae4bc50d82cbc954ec535c26e8df2cb1_arm64",
"product_id": "openshift-logging/loki-rhel8-operator@sha256:df7de1e9f5a4396df6f14b1c4b6bb2a9ae4bc50d82cbc954ec535c26e8df2cb1_arm64",
"product_identification_helper": {
"purl": "pkg:oci/loki-rhel8-operator@sha256:df7de1e9f5a4396df6f14b1c4b6bb2a9ae4bc50d82cbc954ec535c26e8df2cb1?arch=arm64\u0026repository_url=registry.redhat.io/openshift-logging/loki-rhel8-operator\u0026tag=v5.4.8-4"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/lokistack-gateway-rhel8@sha256:178fcf44e6a1fa90d27a40565f69ae2880622b017bc8d9e33a441353eb45609d_arm64",
"product": {
"name": "openshift-logging/lokistack-gateway-rhel8@sha256:178fcf44e6a1fa90d27a40565f69ae2880622b017bc8d9e33a441353eb45609d_arm64",
"product_id": "openshift-logging/lokistack-gateway-rhel8@sha256:178fcf44e6a1fa90d27a40565f69ae2880622b017bc8d9e33a441353eb45609d_arm64",
"product_identification_helper": {
"purl": "pkg:oci/lokistack-gateway-rhel8@sha256:178fcf44e6a1fa90d27a40565f69ae2880622b017bc8d9e33a441353eb45609d?arch=arm64\u0026repository_url=registry.redhat.io/openshift-logging/lokistack-gateway-rhel8\u0026tag=v5.4.8-5"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/opa-openshift-rhel8@sha256:1b106af51bb50f1ce4db13ebbf6f6c67eae45611c0d5dc46476f1dfaa8aca166_arm64",
"product": {
"name": "openshift-logging/opa-openshift-rhel8@sha256:1b106af51bb50f1ce4db13ebbf6f6c67eae45611c0d5dc46476f1dfaa8aca166_arm64",
"product_id": "openshift-logging/opa-openshift-rhel8@sha256:1b106af51bb50f1ce4db13ebbf6f6c67eae45611c0d5dc46476f1dfaa8aca166_arm64",
"product_identification_helper": {
"purl": "pkg:oci/opa-openshift-rhel8@sha256:1b106af51bb50f1ce4db13ebbf6f6c67eae45611c0d5dc46476f1dfaa8aca166?arch=arm64\u0026repository_url=registry.redhat.io/openshift-logging/opa-openshift-rhel8\u0026tag=v5.4.8-4"
}
}
}
],
"category": "architecture",
"name": "arm64"
},
{
"branches": [
{
"category": "product_version",
"name": "openshift-logging/cluster-logging-rhel8-operator@sha256:c698b52c46d41007e5ac4f90b9540d430820bd20a93468fddd3a949c7ef5b332_amd64",
"product": {
"name": "openshift-logging/cluster-logging-rhel8-operator@sha256:c698b52c46d41007e5ac4f90b9540d430820bd20a93468fddd3a949c7ef5b332_amd64",
"product_id": "openshift-logging/cluster-logging-rhel8-operator@sha256:c698b52c46d41007e5ac4f90b9540d430820bd20a93468fddd3a949c7ef5b332_amd64",
"product_identification_helper": {
"purl": "pkg:oci/cluster-logging-rhel8-operator@sha256:c698b52c46d41007e5ac4f90b9540d430820bd20a93468fddd3a949c7ef5b332?arch=amd64\u0026repository_url=registry.redhat.io/openshift-logging/cluster-logging-rhel8-operator\u0026tag=v5.4.8-6"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/cluster-logging-operator-bundle@sha256:cb26d9e55f781dd535901a90f1ec2f8e02e8e1de72c0fde638c90fcc228ec4b2_amd64",
"product": {
"name": "openshift-logging/cluster-logging-operator-bundle@sha256:cb26d9e55f781dd535901a90f1ec2f8e02e8e1de72c0fde638c90fcc228ec4b2_amd64",
"product_id": "openshift-logging/cluster-logging-operator-bundle@sha256:cb26d9e55f781dd535901a90f1ec2f8e02e8e1de72c0fde638c90fcc228ec4b2_amd64",
"product_identification_helper": {
"purl": "pkg:oci/cluster-logging-operator-bundle@sha256:cb26d9e55f781dd535901a90f1ec2f8e02e8e1de72c0fde638c90fcc228ec4b2?arch=amd64\u0026repository_url=registry.redhat.io/openshift-logging/cluster-logging-operator-bundle\u0026tag=v5.4.8-7"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/elasticsearch-rhel8-operator@sha256:8ce04536772f31ad022b9c66cddc090d2962b44d66c06a1db56d1447be198326_amd64",
"product": {
"name": "openshift-logging/elasticsearch-rhel8-operator@sha256:8ce04536772f31ad022b9c66cddc090d2962b44d66c06a1db56d1447be198326_amd64",
"product_id": "openshift-logging/elasticsearch-rhel8-operator@sha256:8ce04536772f31ad022b9c66cddc090d2962b44d66c06a1db56d1447be198326_amd64",
"product_identification_helper": {
"purl": "pkg:oci/elasticsearch-rhel8-operator@sha256:8ce04536772f31ad022b9c66cddc090d2962b44d66c06a1db56d1447be198326?arch=amd64\u0026repository_url=registry.redhat.io/openshift-logging/elasticsearch-rhel8-operator\u0026tag=v5.4.8-3"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/elasticsearch-operator-bundle@sha256:7659606e0418a1920161b7ca67524ea6a7b1ed366b817f1a5cde0b346152243c_amd64",
"product": {
"name": "openshift-logging/elasticsearch-operator-bundle@sha256:7659606e0418a1920161b7ca67524ea6a7b1ed366b817f1a5cde0b346152243c_amd64",
"product_id": "openshift-logging/elasticsearch-operator-bundle@sha256:7659606e0418a1920161b7ca67524ea6a7b1ed366b817f1a5cde0b346152243c_amd64",
"product_identification_helper": {
"purl": "pkg:oci/elasticsearch-operator-bundle@sha256:7659606e0418a1920161b7ca67524ea6a7b1ed366b817f1a5cde0b346152243c?arch=amd64\u0026repository_url=registry.redhat.io/openshift-logging/elasticsearch-operator-bundle\u0026tag=v5.4.8-11"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/elasticsearch-proxy-rhel8@sha256:e38c55762c1eef39b401c46d44c899067b1566173e1ce239f17a95c52b30d8c7_amd64",
"product": {
"name": "openshift-logging/elasticsearch-proxy-rhel8@sha256:e38c55762c1eef39b401c46d44c899067b1566173e1ce239f17a95c52b30d8c7_amd64",
"product_id": "openshift-logging/elasticsearch-proxy-rhel8@sha256:e38c55762c1eef39b401c46d44c899067b1566173e1ce239f17a95c52b30d8c7_amd64",
"product_identification_helper": {
"purl": "pkg:oci/elasticsearch-proxy-rhel8@sha256:e38c55762c1eef39b401c46d44c899067b1566173e1ce239f17a95c52b30d8c7?arch=amd64\u0026repository_url=registry.redhat.io/openshift-logging/elasticsearch-proxy-rhel8\u0026tag=v1.0.0-300"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/log-file-metric-exporter-rhel8@sha256:043e4d3481fbfedf3115e18fade3a2f33b891b0d9a641bf973c2c7f492cb0489_amd64",
"product": {
"name": "openshift-logging/log-file-metric-exporter-rhel8@sha256:043e4d3481fbfedf3115e18fade3a2f33b891b0d9a641bf973c2c7f492cb0489_amd64",
"product_id": "openshift-logging/log-file-metric-exporter-rhel8@sha256:043e4d3481fbfedf3115e18fade3a2f33b891b0d9a641bf973c2c7f492cb0489_amd64",
"product_identification_helper": {
"purl": "pkg:oci/log-file-metric-exporter-rhel8@sha256:043e4d3481fbfedf3115e18fade3a2f33b891b0d9a641bf973c2c7f492cb0489?arch=amd64\u0026repository_url=registry.redhat.io/openshift-logging/log-file-metric-exporter-rhel8\u0026tag=v1.1.0-74"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/logging-curator5-rhel8@sha256:94c435f45e9dbd9fa633e137356cfb1d6ac2d4dd7574b359367665da42d6203d_amd64",
"product": {
"name": "openshift-logging/logging-curator5-rhel8@sha256:94c435f45e9dbd9fa633e137356cfb1d6ac2d4dd7574b359367665da42d6203d_amd64",
"product_id": "openshift-logging/logging-curator5-rhel8@sha256:94c435f45e9dbd9fa633e137356cfb1d6ac2d4dd7574b359367665da42d6203d_amd64",
"product_identification_helper": {
"purl": "pkg:oci/logging-curator5-rhel8@sha256:94c435f45e9dbd9fa633e137356cfb1d6ac2d4dd7574b359367665da42d6203d?arch=amd64\u0026repository_url=registry.redhat.io/openshift-logging/logging-curator5-rhel8\u0026tag=v5.8.1-246"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/elasticsearch6-rhel8@sha256:fa8182b69328077500f89becc7621b48efa8d99f34247c2e6855dcfec13980e3_amd64",
"product": {
"name": "openshift-logging/elasticsearch6-rhel8@sha256:fa8182b69328077500f89becc7621b48efa8d99f34247c2e6855dcfec13980e3_amd64",
"product_id": "openshift-logging/elasticsearch6-rhel8@sha256:fa8182b69328077500f89becc7621b48efa8d99f34247c2e6855dcfec13980e3_amd64",
"product_identification_helper": {
"purl": "pkg:oci/elasticsearch6-rhel8@sha256:fa8182b69328077500f89becc7621b48efa8d99f34247c2e6855dcfec13980e3?arch=amd64\u0026repository_url=registry.redhat.io/openshift-logging/elasticsearch6-rhel8\u0026tag=v6.8.1-265"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/eventrouter-rhel8@sha256:d50a2b89442d04b1163c01b3a3951857a95df76c57b14e7f51d835c3ac6d75b3_amd64",
"product": {
"name": "openshift-logging/eventrouter-rhel8@sha256:d50a2b89442d04b1163c01b3a3951857a95df76c57b14e7f51d835c3ac6d75b3_amd64",
"product_id": "openshift-logging/eventrouter-rhel8@sha256:d50a2b89442d04b1163c01b3a3951857a95df76c57b14e7f51d835c3ac6d75b3_amd64",
"product_identification_helper": {
"purl": "pkg:oci/eventrouter-rhel8@sha256:d50a2b89442d04b1163c01b3a3951857a95df76c57b14e7f51d835c3ac6d75b3?arch=amd64\u0026repository_url=registry.redhat.io/openshift-logging/eventrouter-rhel8\u0026tag=v0.4.0-55"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/fluentd-rhel8@sha256:150e17cb645cf2f4cb7ab592572dd3abd145d9a33e790778280e256666248022_amd64",
"product": {
"name": "openshift-logging/fluentd-rhel8@sha256:150e17cb645cf2f4cb7ab592572dd3abd145d9a33e790778280e256666248022_amd64",
"product_id": "openshift-logging/fluentd-rhel8@sha256:150e17cb645cf2f4cb7ab592572dd3abd145d9a33e790778280e256666248022_amd64",
"product_identification_helper": {
"purl": "pkg:oci/fluentd-rhel8@sha256:150e17cb645cf2f4cb7ab592572dd3abd145d9a33e790778280e256666248022?arch=amd64\u0026repository_url=registry.redhat.io/openshift-logging/fluentd-rhel8\u0026tag=v1.14.5-36"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/kibana6-rhel8@sha256:167ee6a645c7397bde3d12e9b9685279505c25ffb3bda11ae68bdf0b34229f2e_amd64",
"product": {
"name": "openshift-logging/kibana6-rhel8@sha256:167ee6a645c7397bde3d12e9b9685279505c25ffb3bda11ae68bdf0b34229f2e_amd64",
"product_id": "openshift-logging/kibana6-rhel8@sha256:167ee6a645c7397bde3d12e9b9685279505c25ffb3bda11ae68bdf0b34229f2e_amd64",
"product_identification_helper": {
"purl": "pkg:oci/kibana6-rhel8@sha256:167ee6a645c7397bde3d12e9b9685279505c25ffb3bda11ae68bdf0b34229f2e?arch=amd64\u0026repository_url=registry.redhat.io/openshift-logging/kibana6-rhel8\u0026tag=v6.8.1-302"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/logging-loki-rhel8@sha256:b444af35118c24bde0dfa2a8825ba427b3345451f6081133477254213a3460f0_amd64",
"product": {
"name": "openshift-logging/logging-loki-rhel8@sha256:b444af35118c24bde0dfa2a8825ba427b3345451f6081133477254213a3460f0_amd64",
"product_id": "openshift-logging/logging-loki-rhel8@sha256:b444af35118c24bde0dfa2a8825ba427b3345451f6081133477254213a3460f0_amd64",
"product_identification_helper": {
"purl": "pkg:oci/logging-loki-rhel8@sha256:b444af35118c24bde0dfa2a8825ba427b3345451f6081133477254213a3460f0?arch=amd64\u0026repository_url=registry.redhat.io/openshift-logging/logging-loki-rhel8\u0026tag=v2.5.0-51"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/vector-rhel8@sha256:cc6b9c6a344aac56c99c96b5120ffe2dad479000b34964ff89d030ae762bda43_amd64",
"product": {
"name": "openshift-logging/vector-rhel8@sha256:cc6b9c6a344aac56c99c96b5120ffe2dad479000b34964ff89d030ae762bda43_amd64",
"product_id": "openshift-logging/vector-rhel8@sha256:cc6b9c6a344aac56c99c96b5120ffe2dad479000b34964ff89d030ae762bda43_amd64",
"product_identification_helper": {
"purl": "pkg:oci/vector-rhel8@sha256:cc6b9c6a344aac56c99c96b5120ffe2dad479000b34964ff89d030ae762bda43?arch=amd64\u0026repository_url=registry.redhat.io/openshift-logging/vector-rhel8\u0026tag=v0.14-67"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/loki-operator-bundle@sha256:02cceda51028eb55a3b82aa5275f03dbaf8f8f9ab3fd27c650d1a07a93044e37_amd64",
"product": {
"name": "openshift-logging/loki-operator-bundle@sha256:02cceda51028eb55a3b82aa5275f03dbaf8f8f9ab3fd27c650d1a07a93044e37_amd64",
"product_id": "openshift-logging/loki-operator-bundle@sha256:02cceda51028eb55a3b82aa5275f03dbaf8f8f9ab3fd27c650d1a07a93044e37_amd64",
"product_identification_helper": {
"purl": "pkg:oci/loki-operator-bundle@sha256:02cceda51028eb55a3b82aa5275f03dbaf8f8f9ab3fd27c650d1a07a93044e37?arch=amd64\u0026repository_url=registry.redhat.io/openshift-logging/loki-operator-bundle\u0026tag=v5.4.8-20"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/loki-rhel8-operator@sha256:f8a35557c9eb27f703ffa9320a9d39a2361d93fdb0b8c874d97da458048e7eec_amd64",
"product": {
"name": "openshift-logging/loki-rhel8-operator@sha256:f8a35557c9eb27f703ffa9320a9d39a2361d93fdb0b8c874d97da458048e7eec_amd64",
"product_id": "openshift-logging/loki-rhel8-operator@sha256:f8a35557c9eb27f703ffa9320a9d39a2361d93fdb0b8c874d97da458048e7eec_amd64",
"product_identification_helper": {
"purl": "pkg:oci/loki-rhel8-operator@sha256:f8a35557c9eb27f703ffa9320a9d39a2361d93fdb0b8c874d97da458048e7eec?arch=amd64\u0026repository_url=registry.redhat.io/openshift-logging/loki-rhel8-operator\u0026tag=v5.4.8-4"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/lokistack-gateway-rhel8@sha256:a967d5be7d3a6fdd75965a5f9a7396a52cdcb37d6a8521c440b0b5c650c230f2_amd64",
"product": {
"name": "openshift-logging/lokistack-gateway-rhel8@sha256:a967d5be7d3a6fdd75965a5f9a7396a52cdcb37d6a8521c440b0b5c650c230f2_amd64",
"product_id": "openshift-logging/lokistack-gateway-rhel8@sha256:a967d5be7d3a6fdd75965a5f9a7396a52cdcb37d6a8521c440b0b5c650c230f2_amd64",
"product_identification_helper": {
"purl": "pkg:oci/lokistack-gateway-rhel8@sha256:a967d5be7d3a6fdd75965a5f9a7396a52cdcb37d6a8521c440b0b5c650c230f2?arch=amd64\u0026repository_url=registry.redhat.io/openshift-logging/lokistack-gateway-rhel8\u0026tag=v5.4.8-5"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/opa-openshift-rhel8@sha256:9fd0c5df785564b35392705a479d6fb9245e3329719438c76c0282f9ef2f2d55_amd64",
"product": {
"name": "openshift-logging/opa-openshift-rhel8@sha256:9fd0c5df785564b35392705a479d6fb9245e3329719438c76c0282f9ef2f2d55_amd64",
"product_id": "openshift-logging/opa-openshift-rhel8@sha256:9fd0c5df785564b35392705a479d6fb9245e3329719438c76c0282f9ef2f2d55_amd64",
"product_identification_helper": {
"purl": "pkg:oci/opa-openshift-rhel8@sha256:9fd0c5df785564b35392705a479d6fb9245e3329719438c76c0282f9ef2f2d55?arch=amd64\u0026repository_url=registry.redhat.io/openshift-logging/opa-openshift-rhel8\u0026tag=v5.4.8-4"
}
}
}
],
"category": "architecture",
"name": "amd64"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/cluster-logging-operator-bundle@sha256:cb26d9e55f781dd535901a90f1ec2f8e02e8e1de72c0fde638c90fcc228ec4b2_amd64 as a component of RHOL 5.4 for RHEL 8",
"product_id": "8Base-RHOL-5.4:openshift-logging/cluster-logging-operator-bundle@sha256:cb26d9e55f781dd535901a90f1ec2f8e02e8e1de72c0fde638c90fcc228ec4b2_amd64"
},
"product_reference": "openshift-logging/cluster-logging-operator-bundle@sha256:cb26d9e55f781dd535901a90f1ec2f8e02e8e1de72c0fde638c90fcc228ec4b2_amd64",
"relates_to_product_reference": "8Base-RHOL-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/cluster-logging-rhel8-operator@sha256:617cc8b0011110981674b75fe1e3041bfa434c952e4a0193818b971edbc7a480_s390x as a component of RHOL 5.4 for RHEL 8",
"product_id": "8Base-RHOL-5.4:openshift-logging/cluster-logging-rhel8-operator@sha256:617cc8b0011110981674b75fe1e3041bfa434c952e4a0193818b971edbc7a480_s390x"
},
"product_reference": "openshift-logging/cluster-logging-rhel8-operator@sha256:617cc8b0011110981674b75fe1e3041bfa434c952e4a0193818b971edbc7a480_s390x",
"relates_to_product_reference": "8Base-RHOL-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/cluster-logging-rhel8-operator@sha256:637df49756fe85e7b38b279ffa7672d72c658d3d47df7f9dada2dd70563af83b_arm64 as a component of RHOL 5.4 for RHEL 8",
"product_id": "8Base-RHOL-5.4:openshift-logging/cluster-logging-rhel8-operator@sha256:637df49756fe85e7b38b279ffa7672d72c658d3d47df7f9dada2dd70563af83b_arm64"
},
"product_reference": "openshift-logging/cluster-logging-rhel8-operator@sha256:637df49756fe85e7b38b279ffa7672d72c658d3d47df7f9dada2dd70563af83b_arm64",
"relates_to_product_reference": "8Base-RHOL-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/cluster-logging-rhel8-operator@sha256:aa1602fe2abe23bd8a4c791bc45d425686a6e6d1aab4face0fac28bfc7cebbe1_ppc64le as a component of RHOL 5.4 for RHEL 8",
"product_id": "8Base-RHOL-5.4:openshift-logging/cluster-logging-rhel8-operator@sha256:aa1602fe2abe23bd8a4c791bc45d425686a6e6d1aab4face0fac28bfc7cebbe1_ppc64le"
},
"product_reference": "openshift-logging/cluster-logging-rhel8-operator@sha256:aa1602fe2abe23bd8a4c791bc45d425686a6e6d1aab4face0fac28bfc7cebbe1_ppc64le",
"relates_to_product_reference": "8Base-RHOL-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/cluster-logging-rhel8-operator@sha256:c698b52c46d41007e5ac4f90b9540d430820bd20a93468fddd3a949c7ef5b332_amd64 as a component of RHOL 5.4 for RHEL 8",
"product_id": "8Base-RHOL-5.4:openshift-logging/cluster-logging-rhel8-operator@sha256:c698b52c46d41007e5ac4f90b9540d430820bd20a93468fddd3a949c7ef5b332_amd64"
},
"product_reference": "openshift-logging/cluster-logging-rhel8-operator@sha256:c698b52c46d41007e5ac4f90b9540d430820bd20a93468fddd3a949c7ef5b332_amd64",
"relates_to_product_reference": "8Base-RHOL-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/elasticsearch-operator-bundle@sha256:7659606e0418a1920161b7ca67524ea6a7b1ed366b817f1a5cde0b346152243c_amd64 as a component of RHOL 5.4 for RHEL 8",
"product_id": "8Base-RHOL-5.4:openshift-logging/elasticsearch-operator-bundle@sha256:7659606e0418a1920161b7ca67524ea6a7b1ed366b817f1a5cde0b346152243c_amd64"
},
"product_reference": "openshift-logging/elasticsearch-operator-bundle@sha256:7659606e0418a1920161b7ca67524ea6a7b1ed366b817f1a5cde0b346152243c_amd64",
"relates_to_product_reference": "8Base-RHOL-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/elasticsearch-proxy-rhel8@sha256:4f4e5bb267ad391bc0fc6a010ec9ecdf3bf48d5b6e9db0d2510960c13c97bd71_ppc64le as a component of RHOL 5.4 for RHEL 8",
"product_id": "8Base-RHOL-5.4:openshift-logging/elasticsearch-proxy-rhel8@sha256:4f4e5bb267ad391bc0fc6a010ec9ecdf3bf48d5b6e9db0d2510960c13c97bd71_ppc64le"
},
"product_reference": "openshift-logging/elasticsearch-proxy-rhel8@sha256:4f4e5bb267ad391bc0fc6a010ec9ecdf3bf48d5b6e9db0d2510960c13c97bd71_ppc64le",
"relates_to_product_reference": "8Base-RHOL-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/elasticsearch-proxy-rhel8@sha256:b9c2e58b39dc3de97013f8806178f6327bf2e4590fe55db144527d64d468f64f_s390x as a component of RHOL 5.4 for RHEL 8",
"product_id": "8Base-RHOL-5.4:openshift-logging/elasticsearch-proxy-rhel8@sha256:b9c2e58b39dc3de97013f8806178f6327bf2e4590fe55db144527d64d468f64f_s390x"
},
"product_reference": "openshift-logging/elasticsearch-proxy-rhel8@sha256:b9c2e58b39dc3de97013f8806178f6327bf2e4590fe55db144527d64d468f64f_s390x",
"relates_to_product_reference": "8Base-RHOL-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/elasticsearch-proxy-rhel8@sha256:c9a2b9e7cca14d9596ccbe0f64e2abe4452f91f029f42eefead43c9f526f6a58_arm64 as a component of RHOL 5.4 for RHEL 8",
"product_id": "8Base-RHOL-5.4:openshift-logging/elasticsearch-proxy-rhel8@sha256:c9a2b9e7cca14d9596ccbe0f64e2abe4452f91f029f42eefead43c9f526f6a58_arm64"
},
"product_reference": "openshift-logging/elasticsearch-proxy-rhel8@sha256:c9a2b9e7cca14d9596ccbe0f64e2abe4452f91f029f42eefead43c9f526f6a58_arm64",
"relates_to_product_reference": "8Base-RHOL-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/elasticsearch-proxy-rhel8@sha256:e38c55762c1eef39b401c46d44c899067b1566173e1ce239f17a95c52b30d8c7_amd64 as a component of RHOL 5.4 for RHEL 8",
"product_id": "8Base-RHOL-5.4:openshift-logging/elasticsearch-proxy-rhel8@sha256:e38c55762c1eef39b401c46d44c899067b1566173e1ce239f17a95c52b30d8c7_amd64"
},
"product_reference": "openshift-logging/elasticsearch-proxy-rhel8@sha256:e38c55762c1eef39b401c46d44c899067b1566173e1ce239f17a95c52b30d8c7_amd64",
"relates_to_product_reference": "8Base-RHOL-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/elasticsearch-rhel8-operator@sha256:2005f41e59a130bb86c2ec47d1b060e3e2ed32f9a4cef3897e2c05fc94043dbb_arm64 as a component of RHOL 5.4 for RHEL 8",
"product_id": "8Base-RHOL-5.4:openshift-logging/elasticsearch-rhel8-operator@sha256:2005f41e59a130bb86c2ec47d1b060e3e2ed32f9a4cef3897e2c05fc94043dbb_arm64"
},
"product_reference": "openshift-logging/elasticsearch-rhel8-operator@sha256:2005f41e59a130bb86c2ec47d1b060e3e2ed32f9a4cef3897e2c05fc94043dbb_arm64",
"relates_to_product_reference": "8Base-RHOL-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/elasticsearch-rhel8-operator@sha256:6a55934cf7af0c03e06d4ec7a15a80acf53491fb7a183c16fdf8018fbf9b4174_ppc64le as a component of RHOL 5.4 for RHEL 8",
"product_id": "8Base-RHOL-5.4:openshift-logging/elasticsearch-rhel8-operator@sha256:6a55934cf7af0c03e06d4ec7a15a80acf53491fb7a183c16fdf8018fbf9b4174_ppc64le"
},
"product_reference": "openshift-logging/elasticsearch-rhel8-operator@sha256:6a55934cf7af0c03e06d4ec7a15a80acf53491fb7a183c16fdf8018fbf9b4174_ppc64le",
"relates_to_product_reference": "8Base-RHOL-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/elasticsearch-rhel8-operator@sha256:8ce04536772f31ad022b9c66cddc090d2962b44d66c06a1db56d1447be198326_amd64 as a component of RHOL 5.4 for RHEL 8",
"product_id": "8Base-RHOL-5.4:openshift-logging/elasticsearch-rhel8-operator@sha256:8ce04536772f31ad022b9c66cddc090d2962b44d66c06a1db56d1447be198326_amd64"
},
"product_reference": "openshift-logging/elasticsearch-rhel8-operator@sha256:8ce04536772f31ad022b9c66cddc090d2962b44d66c06a1db56d1447be198326_amd64",
"relates_to_product_reference": "8Base-RHOL-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/elasticsearch-rhel8-operator@sha256:dd211d42eaad043d9bdb519e3ad6a86255b7280a2cdf47dd3fe0458a77cb110f_s390x as a component of RHOL 5.4 for RHEL 8",
"product_id": "8Base-RHOL-5.4:openshift-logging/elasticsearch-rhel8-operator@sha256:dd211d42eaad043d9bdb519e3ad6a86255b7280a2cdf47dd3fe0458a77cb110f_s390x"
},
"product_reference": "openshift-logging/elasticsearch-rhel8-operator@sha256:dd211d42eaad043d9bdb519e3ad6a86255b7280a2cdf47dd3fe0458a77cb110f_s390x",
"relates_to_product_reference": "8Base-RHOL-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/elasticsearch6-rhel8@sha256:17a9f3ae042b92693a374e3d60a07f2ab2e52419f8df25d446dd0654f6a858f6_ppc64le as a component of RHOL 5.4 for RHEL 8",
"product_id": "8Base-RHOL-5.4:openshift-logging/elasticsearch6-rhel8@sha256:17a9f3ae042b92693a374e3d60a07f2ab2e52419f8df25d446dd0654f6a858f6_ppc64le"
},
"product_reference": "openshift-logging/elasticsearch6-rhel8@sha256:17a9f3ae042b92693a374e3d60a07f2ab2e52419f8df25d446dd0654f6a858f6_ppc64le",
"relates_to_product_reference": "8Base-RHOL-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/elasticsearch6-rhel8@sha256:5b1cfc2f9a96601439cf17d1fe49a6bc6cad3b7273af87b23528090aefbfd915_s390x as a component of RHOL 5.4 for RHEL 8",
"product_id": "8Base-RHOL-5.4:openshift-logging/elasticsearch6-rhel8@sha256:5b1cfc2f9a96601439cf17d1fe49a6bc6cad3b7273af87b23528090aefbfd915_s390x"
},
"product_reference": "openshift-logging/elasticsearch6-rhel8@sha256:5b1cfc2f9a96601439cf17d1fe49a6bc6cad3b7273af87b23528090aefbfd915_s390x",
"relates_to_product_reference": "8Base-RHOL-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/elasticsearch6-rhel8@sha256:8e0ba10f91db4cb8786d0501ec33a3d54f7c7c5337e0495cc2286a6ea20cca20_arm64 as a component of RHOL 5.4 for RHEL 8",
"product_id": "8Base-RHOL-5.4:openshift-logging/elasticsearch6-rhel8@sha256:8e0ba10f91db4cb8786d0501ec33a3d54f7c7c5337e0495cc2286a6ea20cca20_arm64"
},
"product_reference": "openshift-logging/elasticsearch6-rhel8@sha256:8e0ba10f91db4cb8786d0501ec33a3d54f7c7c5337e0495cc2286a6ea20cca20_arm64",
"relates_to_product_reference": "8Base-RHOL-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/elasticsearch6-rhel8@sha256:fa8182b69328077500f89becc7621b48efa8d99f34247c2e6855dcfec13980e3_amd64 as a component of RHOL 5.4 for RHEL 8",
"product_id": "8Base-RHOL-5.4:openshift-logging/elasticsearch6-rhel8@sha256:fa8182b69328077500f89becc7621b48efa8d99f34247c2e6855dcfec13980e3_amd64"
},
"product_reference": "openshift-logging/elasticsearch6-rhel8@sha256:fa8182b69328077500f89becc7621b48efa8d99f34247c2e6855dcfec13980e3_amd64",
"relates_to_product_reference": "8Base-RHOL-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/eventrouter-rhel8@sha256:4438a3bba34418a9dc566bf15f6b4764de4295ab8b05a7b1a86f9e8cd332b3f7_arm64 as a component of RHOL 5.4 for RHEL 8",
"product_id": "8Base-RHOL-5.4:openshift-logging/eventrouter-rhel8@sha256:4438a3bba34418a9dc566bf15f6b4764de4295ab8b05a7b1a86f9e8cd332b3f7_arm64"
},
"product_reference": "openshift-logging/eventrouter-rhel8@sha256:4438a3bba34418a9dc566bf15f6b4764de4295ab8b05a7b1a86f9e8cd332b3f7_arm64",
"relates_to_product_reference": "8Base-RHOL-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/eventrouter-rhel8@sha256:bc408fc4b0482c5eb1b0deb3a9090f3e3dd9b370001d54cd076254562c72fec9_ppc64le as a component of RHOL 5.4 for RHEL 8",
"product_id": "8Base-RHOL-5.4:openshift-logging/eventrouter-rhel8@sha256:bc408fc4b0482c5eb1b0deb3a9090f3e3dd9b370001d54cd076254562c72fec9_ppc64le"
},
"product_reference": "openshift-logging/eventrouter-rhel8@sha256:bc408fc4b0482c5eb1b0deb3a9090f3e3dd9b370001d54cd076254562c72fec9_ppc64le",
"relates_to_product_reference": "8Base-RHOL-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/eventrouter-rhel8@sha256:d50a2b89442d04b1163c01b3a3951857a95df76c57b14e7f51d835c3ac6d75b3_amd64 as a component of RHOL 5.4 for RHEL 8",
"product_id": "8Base-RHOL-5.4:openshift-logging/eventrouter-rhel8@sha256:d50a2b89442d04b1163c01b3a3951857a95df76c57b14e7f51d835c3ac6d75b3_amd64"
},
"product_reference": "openshift-logging/eventrouter-rhel8@sha256:d50a2b89442d04b1163c01b3a3951857a95df76c57b14e7f51d835c3ac6d75b3_amd64",
"relates_to_product_reference": "8Base-RHOL-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/eventrouter-rhel8@sha256:f05aee8433dec1c9f6cf835038f9e5a47847d4095383bf3c22ca57c3fb69fa98_s390x as a component of RHOL 5.4 for RHEL 8",
"product_id": "8Base-RHOL-5.4:openshift-logging/eventrouter-rhel8@sha256:f05aee8433dec1c9f6cf835038f9e5a47847d4095383bf3c22ca57c3fb69fa98_s390x"
},
"product_reference": "openshift-logging/eventrouter-rhel8@sha256:f05aee8433dec1c9f6cf835038f9e5a47847d4095383bf3c22ca57c3fb69fa98_s390x",
"relates_to_product_reference": "8Base-RHOL-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/fluentd-rhel8@sha256:150e17cb645cf2f4cb7ab592572dd3abd145d9a33e790778280e256666248022_amd64 as a component of RHOL 5.4 for RHEL 8",
"product_id": "8Base-RHOL-5.4:openshift-logging/fluentd-rhel8@sha256:150e17cb645cf2f4cb7ab592572dd3abd145d9a33e790778280e256666248022_amd64"
},
"product_reference": "openshift-logging/fluentd-rhel8@sha256:150e17cb645cf2f4cb7ab592572dd3abd145d9a33e790778280e256666248022_amd64",
"relates_to_product_reference": "8Base-RHOL-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/fluentd-rhel8@sha256:36aecf05ca3cdaf29982b3efa4a1c97087be29b0a58c9777e6b0c11a34861aa8_s390x as a component of RHOL 5.4 for RHEL 8",
"product_id": "8Base-RHOL-5.4:openshift-logging/fluentd-rhel8@sha256:36aecf05ca3cdaf29982b3efa4a1c97087be29b0a58c9777e6b0c11a34861aa8_s390x"
},
"product_reference": "openshift-logging/fluentd-rhel8@sha256:36aecf05ca3cdaf29982b3efa4a1c97087be29b0a58c9777e6b0c11a34861aa8_s390x",
"relates_to_product_reference": "8Base-RHOL-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/fluentd-rhel8@sha256:e3a51d2bdc632b8376e28c33e9d4fac3464e3a84a313a17246b1f1cf21cb5710_arm64 as a component of RHOL 5.4 for RHEL 8",
"product_id": "8Base-RHOL-5.4:openshift-logging/fluentd-rhel8@sha256:e3a51d2bdc632b8376e28c33e9d4fac3464e3a84a313a17246b1f1cf21cb5710_arm64"
},
"product_reference": "openshift-logging/fluentd-rhel8@sha256:e3a51d2bdc632b8376e28c33e9d4fac3464e3a84a313a17246b1f1cf21cb5710_arm64",
"relates_to_product_reference": "8Base-RHOL-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/fluentd-rhel8@sha256:ea07da04f06df6bf0d9dd981a3795dfdb51eca83f59a6291114650e3e98a9e71_ppc64le as a component of RHOL 5.4 for RHEL 8",
"product_id": "8Base-RHOL-5.4:openshift-logging/fluentd-rhel8@sha256:ea07da04f06df6bf0d9dd981a3795dfdb51eca83f59a6291114650e3e98a9e71_ppc64le"
},
"product_reference": "openshift-logging/fluentd-rhel8@sha256:ea07da04f06df6bf0d9dd981a3795dfdb51eca83f59a6291114650e3e98a9e71_ppc64le",
"relates_to_product_reference": "8Base-RHOL-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/kibana6-rhel8@sha256:167ee6a645c7397bde3d12e9b9685279505c25ffb3bda11ae68bdf0b34229f2e_amd64 as a component of RHOL 5.4 for RHEL 8",
"product_id": "8Base-RHOL-5.4:openshift-logging/kibana6-rhel8@sha256:167ee6a645c7397bde3d12e9b9685279505c25ffb3bda11ae68bdf0b34229f2e_amd64"
},
"product_reference": "openshift-logging/kibana6-rhel8@sha256:167ee6a645c7397bde3d12e9b9685279505c25ffb3bda11ae68bdf0b34229f2e_amd64",
"relates_to_product_reference": "8Base-RHOL-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/kibana6-rhel8@sha256:4a029733337b10bb9fb8d98c91abc5451ca0b98713c8f2271a675251e025b6c0_s390x as a component of RHOL 5.4 for RHEL 8",
"product_id": "8Base-RHOL-5.4:openshift-logging/kibana6-rhel8@sha256:4a029733337b10bb9fb8d98c91abc5451ca0b98713c8f2271a675251e025b6c0_s390x"
},
"product_reference": "openshift-logging/kibana6-rhel8@sha256:4a029733337b10bb9fb8d98c91abc5451ca0b98713c8f2271a675251e025b6c0_s390x",
"relates_to_product_reference": "8Base-RHOL-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/kibana6-rhel8@sha256:812f4380024dc3df42310ad14d173d390f2bdf4b3dbdb02550c00552534f79ce_ppc64le as a component of RHOL 5.4 for RHEL 8",
"product_id": "8Base-RHOL-5.4:openshift-logging/kibana6-rhel8@sha256:812f4380024dc3df42310ad14d173d390f2bdf4b3dbdb02550c00552534f79ce_ppc64le"
},
"product_reference": "openshift-logging/kibana6-rhel8@sha256:812f4380024dc3df42310ad14d173d390f2bdf4b3dbdb02550c00552534f79ce_ppc64le",
"relates_to_product_reference": "8Base-RHOL-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/kibana6-rhel8@sha256:958ba6856cc76fc77d34a9c78888eb37b9c39b83a2f044ef2337610560ba9323_arm64 as a component of RHOL 5.4 for RHEL 8",
"product_id": "8Base-RHOL-5.4:openshift-logging/kibana6-rhel8@sha256:958ba6856cc76fc77d34a9c78888eb37b9c39b83a2f044ef2337610560ba9323_arm64"
},
"product_reference": "openshift-logging/kibana6-rhel8@sha256:958ba6856cc76fc77d34a9c78888eb37b9c39b83a2f044ef2337610560ba9323_arm64",
"relates_to_product_reference": "8Base-RHOL-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/log-file-metric-exporter-rhel8@sha256:043e4d3481fbfedf3115e18fade3a2f33b891b0d9a641bf973c2c7f492cb0489_amd64 as a component of RHOL 5.4 for RHEL 8",
"product_id": "8Base-RHOL-5.4:openshift-logging/log-file-metric-exporter-rhel8@sha256:043e4d3481fbfedf3115e18fade3a2f33b891b0d9a641bf973c2c7f492cb0489_amd64"
},
"product_reference": "openshift-logging/log-file-metric-exporter-rhel8@sha256:043e4d3481fbfedf3115e18fade3a2f33b891b0d9a641bf973c2c7f492cb0489_amd64",
"relates_to_product_reference": "8Base-RHOL-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/log-file-metric-exporter-rhel8@sha256:4fe26adac10cf20b83812e4fa513231d7e1fd4b6cd4e09d4fd425c391885cfcc_ppc64le as a component of RHOL 5.4 for RHEL 8",
"product_id": "8Base-RHOL-5.4:openshift-logging/log-file-metric-exporter-rhel8@sha256:4fe26adac10cf20b83812e4fa513231d7e1fd4b6cd4e09d4fd425c391885cfcc_ppc64le"
},
"product_reference": "openshift-logging/log-file-metric-exporter-rhel8@sha256:4fe26adac10cf20b83812e4fa513231d7e1fd4b6cd4e09d4fd425c391885cfcc_ppc64le",
"relates_to_product_reference": "8Base-RHOL-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/log-file-metric-exporter-rhel8@sha256:85827db708c0927027435b05732cc7e34b0675eaa86665c91efacc76aecd6227_s390x as a component of RHOL 5.4 for RHEL 8",
"product_id": "8Base-RHOL-5.4:openshift-logging/log-file-metric-exporter-rhel8@sha256:85827db708c0927027435b05732cc7e34b0675eaa86665c91efacc76aecd6227_s390x"
},
"product_reference": "openshift-logging/log-file-metric-exporter-rhel8@sha256:85827db708c0927027435b05732cc7e34b0675eaa86665c91efacc76aecd6227_s390x",
"relates_to_product_reference": "8Base-RHOL-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/log-file-metric-exporter-rhel8@sha256:a5285db276a5545fdbaa9f0743a49ba72ce1c5da61b5cccc9422320a03e08bea_arm64 as a component of RHOL 5.4 for RHEL 8",
"product_id": "8Base-RHOL-5.4:openshift-logging/log-file-metric-exporter-rhel8@sha256:a5285db276a5545fdbaa9f0743a49ba72ce1c5da61b5cccc9422320a03e08bea_arm64"
},
"product_reference": "openshift-logging/log-file-metric-exporter-rhel8@sha256:a5285db276a5545fdbaa9f0743a49ba72ce1c5da61b5cccc9422320a03e08bea_arm64",
"relates_to_product_reference": "8Base-RHOL-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/logging-curator5-rhel8@sha256:0b28415b8115ff3216002faa5c9ecf3c46995085e3364c8028cb544cb4787ed2_arm64 as a component of RHOL 5.4 for RHEL 8",
"product_id": "8Base-RHOL-5.4:openshift-logging/logging-curator5-rhel8@sha256:0b28415b8115ff3216002faa5c9ecf3c46995085e3364c8028cb544cb4787ed2_arm64"
},
"product_reference": "openshift-logging/logging-curator5-rhel8@sha256:0b28415b8115ff3216002faa5c9ecf3c46995085e3364c8028cb544cb4787ed2_arm64",
"relates_to_product_reference": "8Base-RHOL-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/logging-curator5-rhel8@sha256:7016e867ddfe970d6d2d54d5615e8f613786bcfbfe52ebf3139c07da3d5a53db_s390x as a component of RHOL 5.4 for RHEL 8",
"product_id": "8Base-RHOL-5.4:openshift-logging/logging-curator5-rhel8@sha256:7016e867ddfe970d6d2d54d5615e8f613786bcfbfe52ebf3139c07da3d5a53db_s390x"
},
"product_reference": "openshift-logging/logging-curator5-rhel8@sha256:7016e867ddfe970d6d2d54d5615e8f613786bcfbfe52ebf3139c07da3d5a53db_s390x",
"relates_to_product_reference": "8Base-RHOL-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/logging-curator5-rhel8@sha256:94c435f45e9dbd9fa633e137356cfb1d6ac2d4dd7574b359367665da42d6203d_amd64 as a component of RHOL 5.4 for RHEL 8",
"product_id": "8Base-RHOL-5.4:openshift-logging/logging-curator5-rhel8@sha256:94c435f45e9dbd9fa633e137356cfb1d6ac2d4dd7574b359367665da42d6203d_amd64"
},
"product_reference": "openshift-logging/logging-curator5-rhel8@sha256:94c435f45e9dbd9fa633e137356cfb1d6ac2d4dd7574b359367665da42d6203d_amd64",
"relates_to_product_reference": "8Base-RHOL-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/logging-curator5-rhel8@sha256:d24afbc9228ef7f3d0a6fd716a3a57abde88a1f65d149c7df4f959a775b670bd_ppc64le as a component of RHOL 5.4 for RHEL 8",
"product_id": "8Base-RHOL-5.4:openshift-logging/logging-curator5-rhel8@sha256:d24afbc9228ef7f3d0a6fd716a3a57abde88a1f65d149c7df4f959a775b670bd_ppc64le"
},
"product_reference": "openshift-logging/logging-curator5-rhel8@sha256:d24afbc9228ef7f3d0a6fd716a3a57abde88a1f65d149c7df4f959a775b670bd_ppc64le",
"relates_to_product_reference": "8Base-RHOL-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/logging-loki-rhel8@sha256:40d4989b4733f54a01a73831fa00b12e49fff69c75138902eac0d894d432e4d9_arm64 as a component of RHOL 5.4 for RHEL 8",
"product_id": "8Base-RHOL-5.4:openshift-logging/logging-loki-rhel8@sha256:40d4989b4733f54a01a73831fa00b12e49fff69c75138902eac0d894d432e4d9_arm64"
},
"product_reference": "openshift-logging/logging-loki-rhel8@sha256:40d4989b4733f54a01a73831fa00b12e49fff69c75138902eac0d894d432e4d9_arm64",
"relates_to_product_reference": "8Base-RHOL-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/logging-loki-rhel8@sha256:b444af35118c24bde0dfa2a8825ba427b3345451f6081133477254213a3460f0_amd64 as a component of RHOL 5.4 for RHEL 8",
"product_id": "8Base-RHOL-5.4:openshift-logging/logging-loki-rhel8@sha256:b444af35118c24bde0dfa2a8825ba427b3345451f6081133477254213a3460f0_amd64"
},
"product_reference": "openshift-logging/logging-loki-rhel8@sha256:b444af35118c24bde0dfa2a8825ba427b3345451f6081133477254213a3460f0_amd64",
"relates_to_product_reference": "8Base-RHOL-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/logging-loki-rhel8@sha256:cfe410d498940a95da631ea213866a96a119034d78d5d53f7f9c7e8da56e0f45_s390x as a component of RHOL 5.4 for RHEL 8",
"product_id": "8Base-RHOL-5.4:openshift-logging/logging-loki-rhel8@sha256:cfe410d498940a95da631ea213866a96a119034d78d5d53f7f9c7e8da56e0f45_s390x"
},
"product_reference": "openshift-logging/logging-loki-rhel8@sha256:cfe410d498940a95da631ea213866a96a119034d78d5d53f7f9c7e8da56e0f45_s390x",
"relates_to_product_reference": "8Base-RHOL-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/logging-loki-rhel8@sha256:f7979c82140a0ab1a97c9f3151465bfbd9f79c4db9b0cc20f974cd7b890f074f_ppc64le as a component of RHOL 5.4 for RHEL 8",
"product_id": "8Base-RHOL-5.4:openshift-logging/logging-loki-rhel8@sha256:f7979c82140a0ab1a97c9f3151465bfbd9f79c4db9b0cc20f974cd7b890f074f_ppc64le"
},
"product_reference": "openshift-logging/logging-loki-rhel8@sha256:f7979c82140a0ab1a97c9f3151465bfbd9f79c4db9b0cc20f974cd7b890f074f_ppc64le",
"relates_to_product_reference": "8Base-RHOL-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/loki-operator-bundle@sha256:02cceda51028eb55a3b82aa5275f03dbaf8f8f9ab3fd27c650d1a07a93044e37_amd64 as a component of RHOL 5.4 for RHEL 8",
"product_id": "8Base-RHOL-5.4:openshift-logging/loki-operator-bundle@sha256:02cceda51028eb55a3b82aa5275f03dbaf8f8f9ab3fd27c650d1a07a93044e37_amd64"
},
"product_reference": "openshift-logging/loki-operator-bundle@sha256:02cceda51028eb55a3b82aa5275f03dbaf8f8f9ab3fd27c650d1a07a93044e37_amd64",
"relates_to_product_reference": "8Base-RHOL-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/loki-rhel8-operator@sha256:0f1be625b4012820f7ac439fed000808d7acb4e885ace16014461bf802be935a_s390x as a component of RHOL 5.4 for RHEL 8",
"product_id": "8Base-RHOL-5.4:openshift-logging/loki-rhel8-operator@sha256:0f1be625b4012820f7ac439fed000808d7acb4e885ace16014461bf802be935a_s390x"
},
"product_reference": "openshift-logging/loki-rhel8-operator@sha256:0f1be625b4012820f7ac439fed000808d7acb4e885ace16014461bf802be935a_s390x",
"relates_to_product_reference": "8Base-RHOL-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/loki-rhel8-operator@sha256:28f45a80846c5e11638fb479be42cafcb2bdb3af94dff3629a820de295cbe31d_ppc64le as a component of RHOL 5.4 for RHEL 8",
"product_id": "8Base-RHOL-5.4:openshift-logging/loki-rhel8-operator@sha256:28f45a80846c5e11638fb479be42cafcb2bdb3af94dff3629a820de295cbe31d_ppc64le"
},
"product_reference": "openshift-logging/loki-rhel8-operator@sha256:28f45a80846c5e11638fb479be42cafcb2bdb3af94dff3629a820de295cbe31d_ppc64le",
"relates_to_product_reference": "8Base-RHOL-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/loki-rhel8-operator@sha256:df7de1e9f5a4396df6f14b1c4b6bb2a9ae4bc50d82cbc954ec535c26e8df2cb1_arm64 as a component of RHOL 5.4 for RHEL 8",
"product_id": "8Base-RHOL-5.4:openshift-logging/loki-rhel8-operator@sha256:df7de1e9f5a4396df6f14b1c4b6bb2a9ae4bc50d82cbc954ec535c26e8df2cb1_arm64"
},
"product_reference": "openshift-logging/loki-rhel8-operator@sha256:df7de1e9f5a4396df6f14b1c4b6bb2a9ae4bc50d82cbc954ec535c26e8df2cb1_arm64",
"relates_to_product_reference": "8Base-RHOL-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/loki-rhel8-operator@sha256:f8a35557c9eb27f703ffa9320a9d39a2361d93fdb0b8c874d97da458048e7eec_amd64 as a component of RHOL 5.4 for RHEL 8",
"product_id": "8Base-RHOL-5.4:openshift-logging/loki-rhel8-operator@sha256:f8a35557c9eb27f703ffa9320a9d39a2361d93fdb0b8c874d97da458048e7eec_amd64"
},
"product_reference": "openshift-logging/loki-rhel8-operator@sha256:f8a35557c9eb27f703ffa9320a9d39a2361d93fdb0b8c874d97da458048e7eec_amd64",
"relates_to_product_reference": "8Base-RHOL-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/lokistack-gateway-rhel8@sha256:178fcf44e6a1fa90d27a40565f69ae2880622b017bc8d9e33a441353eb45609d_arm64 as a component of RHOL 5.4 for RHEL 8",
"product_id": "8Base-RHOL-5.4:openshift-logging/lokistack-gateway-rhel8@sha256:178fcf44e6a1fa90d27a40565f69ae2880622b017bc8d9e33a441353eb45609d_arm64"
},
"product_reference": "openshift-logging/lokistack-gateway-rhel8@sha256:178fcf44e6a1fa90d27a40565f69ae2880622b017bc8d9e33a441353eb45609d_arm64",
"relates_to_product_reference": "8Base-RHOL-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/lokistack-gateway-rhel8@sha256:7b0c2c99cf0f710166b749dbfd7f544caf5fe35516c743fca251c7cec896e1d6_ppc64le as a component of RHOL 5.4 for RHEL 8",
"product_id": "8Base-RHOL-5.4:openshift-logging/lokistack-gateway-rhel8@sha256:7b0c2c99cf0f710166b749dbfd7f544caf5fe35516c743fca251c7cec896e1d6_ppc64le"
},
"product_reference": "openshift-logging/lokistack-gateway-rhel8@sha256:7b0c2c99cf0f710166b749dbfd7f544caf5fe35516c743fca251c7cec896e1d6_ppc64le",
"relates_to_product_reference": "8Base-RHOL-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/lokistack-gateway-rhel8@sha256:9c4959525339b607a98889d56f4c26f2e4af25032466c439903a7f1cb593f721_s390x as a component of RHOL 5.4 for RHEL 8",
"product_id": "8Base-RHOL-5.4:openshift-logging/lokistack-gateway-rhel8@sha256:9c4959525339b607a98889d56f4c26f2e4af25032466c439903a7f1cb593f721_s390x"
},
"product_reference": "openshift-logging/lokistack-gateway-rhel8@sha256:9c4959525339b607a98889d56f4c26f2e4af25032466c439903a7f1cb593f721_s390x",
"relates_to_product_reference": "8Base-RHOL-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/lokistack-gateway-rhel8@sha256:a967d5be7d3a6fdd75965a5f9a7396a52cdcb37d6a8521c440b0b5c650c230f2_amd64 as a component of RHOL 5.4 for RHEL 8",
"product_id": "8Base-RHOL-5.4:openshift-logging/lokistack-gateway-rhel8@sha256:a967d5be7d3a6fdd75965a5f9a7396a52cdcb37d6a8521c440b0b5c650c230f2_amd64"
},
"product_reference": "openshift-logging/lokistack-gateway-rhel8@sha256:a967d5be7d3a6fdd75965a5f9a7396a52cdcb37d6a8521c440b0b5c650c230f2_amd64",
"relates_to_product_reference": "8Base-RHOL-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/opa-openshift-rhel8@sha256:1b106af51bb50f1ce4db13ebbf6f6c67eae45611c0d5dc46476f1dfaa8aca166_arm64 as a component of RHOL 5.4 for RHEL 8",
"product_id": "8Base-RHOL-5.4:openshift-logging/opa-openshift-rhel8@sha256:1b106af51bb50f1ce4db13ebbf6f6c67eae45611c0d5dc46476f1dfaa8aca166_arm64"
},
"product_reference": "openshift-logging/opa-openshift-rhel8@sha256:1b106af51bb50f1ce4db13ebbf6f6c67eae45611c0d5dc46476f1dfaa8aca166_arm64",
"relates_to_product_reference": "8Base-RHOL-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/opa-openshift-rhel8@sha256:92ddf24824c8f8ae93dec07184c446615b635389472d3a525df72da07c8d9b97_ppc64le as a component of RHOL 5.4 for RHEL 8",
"product_id": "8Base-RHOL-5.4:openshift-logging/opa-openshift-rhel8@sha256:92ddf24824c8f8ae93dec07184c446615b635389472d3a525df72da07c8d9b97_ppc64le"
},
"product_reference": "openshift-logging/opa-openshift-rhel8@sha256:92ddf24824c8f8ae93dec07184c446615b635389472d3a525df72da07c8d9b97_ppc64le",
"relates_to_product_reference": "8Base-RHOL-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/opa-openshift-rhel8@sha256:9fd0c5df785564b35392705a479d6fb9245e3329719438c76c0282f9ef2f2d55_amd64 as a component of RHOL 5.4 for RHEL 8",
"product_id": "8Base-RHOL-5.4:openshift-logging/opa-openshift-rhel8@sha256:9fd0c5df785564b35392705a479d6fb9245e3329719438c76c0282f9ef2f2d55_amd64"
},
"product_reference": "openshift-logging/opa-openshift-rhel8@sha256:9fd0c5df785564b35392705a479d6fb9245e3329719438c76c0282f9ef2f2d55_amd64",
"relates_to_product_reference": "8Base-RHOL-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/opa-openshift-rhel8@sha256:be8ba0e4c5f24c7b4549700a25c89b10d4b2fc0b0e3888163bb53827914e95c1_s390x as a component of RHOL 5.4 for RHEL 8",
"product_id": "8Base-RHOL-5.4:openshift-logging/opa-openshift-rhel8@sha256:be8ba0e4c5f24c7b4549700a25c89b10d4b2fc0b0e3888163bb53827914e95c1_s390x"
},
"product_reference": "openshift-logging/opa-openshift-rhel8@sha256:be8ba0e4c5f24c7b4549700a25c89b10d4b2fc0b0e3888163bb53827914e95c1_s390x",
"relates_to_product_reference": "8Base-RHOL-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/vector-rhel8@sha256:48bb136d11b44428c87489978873370848ac2b219b107ef7e81ab679db095234_s390x as a component of RHOL 5.4 for RHEL 8",
"product_id": "8Base-RHOL-5.4:openshift-logging/vector-rhel8@sha256:48bb136d11b44428c87489978873370848ac2b219b107ef7e81ab679db095234_s390x"
},
"product_reference": "openshift-logging/vector-rhel8@sha256:48bb136d11b44428c87489978873370848ac2b219b107ef7e81ab679db095234_s390x",
"relates_to_product_reference": "8Base-RHOL-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/vector-rhel8@sha256:48f0317d167710ff5b0787c73f6b7dd0249e7c8d2d001159132a97299c30b62d_ppc64le as a component of RHOL 5.4 for RHEL 8",
"product_id": "8Base-RHOL-5.4:openshift-logging/vector-rhel8@sha256:48f0317d167710ff5b0787c73f6b7dd0249e7c8d2d001159132a97299c30b62d_ppc64le"
},
"product_reference": "openshift-logging/vector-rhel8@sha256:48f0317d167710ff5b0787c73f6b7dd0249e7c8d2d001159132a97299c30b62d_ppc64le",
"relates_to_product_reference": "8Base-RHOL-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/vector-rhel8@sha256:bde21c03fb831d01e85b28245881f7e3f2bb2ef6d2671eb92b2e0cc4bd3898e2_arm64 as a component of RHOL 5.4 for RHEL 8",
"product_id": "8Base-RHOL-5.4:openshift-logging/vector-rhel8@sha256:bde21c03fb831d01e85b28245881f7e3f2bb2ef6d2671eb92b2e0cc4bd3898e2_arm64"
},
"product_reference": "openshift-logging/vector-rhel8@sha256:bde21c03fb831d01e85b28245881f7e3f2bb2ef6d2671eb92b2e0cc4bd3898e2_arm64",
"relates_to_product_reference": "8Base-RHOL-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/vector-rhel8@sha256:cc6b9c6a344aac56c99c96b5120ffe2dad479000b34964ff89d030ae762bda43_amd64 as a component of RHOL 5.4 for RHEL 8",
"product_id": "8Base-RHOL-5.4:openshift-logging/vector-rhel8@sha256:cc6b9c6a344aac56c99c96b5120ffe2dad479000b34964ff89d030ae762bda43_amd64"
},
"product_reference": "openshift-logging/vector-rhel8@sha256:cc6b9c6a344aac56c99c96b5120ffe2dad479000b34964ff89d030ae762bda43_amd64",
"relates_to_product_reference": "8Base-RHOL-5.4"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2020-36518",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"discovery_date": "2022-03-16T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-RHOL-5.4:openshift-logging/cluster-logging-operator-bundle@sha256:cb26d9e55f781dd535901a90f1ec2f8e02e8e1de72c0fde638c90fcc228ec4b2_amd64",
"8Base-RHOL-5.4:openshift-logging/cluster-logging-rhel8-operator@sha256:617cc8b0011110981674b75fe1e3041bfa434c952e4a0193818b971edbc7a480_s390x",
"8Base-RHOL-5.4:openshift-logging/cluster-logging-rhel8-operator@sha256:637df49756fe85e7b38b279ffa7672d72c658d3d47df7f9dada2dd70563af83b_arm64",
"8Base-RHOL-5.4:openshift-logging/cluster-logging-rhel8-operator@sha256:aa1602fe2abe23bd8a4c791bc45d425686a6e6d1aab4face0fac28bfc7cebbe1_ppc64le",
"8Base-RHOL-5.4:openshift-logging/cluster-logging-rhel8-operator@sha256:c698b52c46d41007e5ac4f90b9540d430820bd20a93468fddd3a949c7ef5b332_amd64",
"8Base-RHOL-5.4:openshift-logging/elasticsearch-operator-bundle@sha256:7659606e0418a1920161b7ca67524ea6a7b1ed366b817f1a5cde0b346152243c_amd64",
"8Base-RHOL-5.4:openshift-logging/elasticsearch-proxy-rhel8@sha256:4f4e5bb267ad391bc0fc6a010ec9ecdf3bf48d5b6e9db0d2510960c13c97bd71_ppc64le",
"8Base-RHOL-5.4:openshift-logging/elasticsearch-proxy-rhel8@sha256:b9c2e58b39dc3de97013f8806178f6327bf2e4590fe55db144527d64d468f64f_s390x",
"8Base-RHOL-5.4:openshift-logging/elasticsearch-proxy-rhel8@sha256:c9a2b9e7cca14d9596ccbe0f64e2abe4452f91f029f42eefead43c9f526f6a58_arm64",
"8Base-RHOL-5.4:openshift-logging/elasticsearch-proxy-rhel8@sha256:e38c55762c1eef39b401c46d44c899067b1566173e1ce239f17a95c52b30d8c7_amd64",
"8Base-RHOL-5.4:openshift-logging/elasticsearch-rhel8-operator@sha256:2005f41e59a130bb86c2ec47d1b060e3e2ed32f9a4cef3897e2c05fc94043dbb_arm64",
"8Base-RHOL-5.4:openshift-logging/elasticsearch-rhel8-operator@sha256:6a55934cf7af0c03e06d4ec7a15a80acf53491fb7a183c16fdf8018fbf9b4174_ppc64le",
"8Base-RHOL-5.4:openshift-logging/elasticsearch-rhel8-operator@sha256:8ce04536772f31ad022b9c66cddc090d2962b44d66c06a1db56d1447be198326_amd64",
"8Base-RHOL-5.4:openshift-logging/elasticsearch-rhel8-operator@sha256:dd211d42eaad043d9bdb519e3ad6a86255b7280a2cdf47dd3fe0458a77cb110f_s390x",
"8Base-RHOL-5.4:openshift-logging/eventrouter-rhel8@sha256:4438a3bba34418a9dc566bf15f6b4764de4295ab8b05a7b1a86f9e8cd332b3f7_arm64",
"8Base-RHOL-5.4:openshift-logging/eventrouter-rhel8@sha256:bc408fc4b0482c5eb1b0deb3a9090f3e3dd9b370001d54cd076254562c72fec9_ppc64le",
"8Base-RHOL-5.4:openshift-logging/eventrouter-rhel8@sha256:d50a2b89442d04b1163c01b3a3951857a95df76c57b14e7f51d835c3ac6d75b3_amd64",
"8Base-RHOL-5.4:openshift-logging/eventrouter-rhel8@sha256:f05aee8433dec1c9f6cf835038f9e5a47847d4095383bf3c22ca57c3fb69fa98_s390x",
"8Base-RHOL-5.4:openshift-logging/fluentd-rhel8@sha256:150e17cb645cf2f4cb7ab592572dd3abd145d9a33e790778280e256666248022_amd64",
"8Base-RHOL-5.4:openshift-logging/fluentd-rhel8@sha256:36aecf05ca3cdaf29982b3efa4a1c97087be29b0a58c9777e6b0c11a34861aa8_s390x",
"8Base-RHOL-5.4:openshift-logging/fluentd-rhel8@sha256:e3a51d2bdc632b8376e28c33e9d4fac3464e3a84a313a17246b1f1cf21cb5710_arm64",
"8Base-RHOL-5.4:openshift-logging/fluentd-rhel8@sha256:ea07da04f06df6bf0d9dd981a3795dfdb51eca83f59a6291114650e3e98a9e71_ppc64le",
"8Base-RHOL-5.4:openshift-logging/kibana6-rhel8@sha256:167ee6a645c7397bde3d12e9b9685279505c25ffb3bda11ae68bdf0b34229f2e_amd64",
"8Base-RHOL-5.4:openshift-logging/kibana6-rhel8@sha256:4a029733337b10bb9fb8d98c91abc5451ca0b98713c8f2271a675251e025b6c0_s390x",
"8Base-RHOL-5.4:openshift-logging/kibana6-rhel8@sha256:812f4380024dc3df42310ad14d173d390f2bdf4b3dbdb02550c00552534f79ce_ppc64le",
"8Base-RHOL-5.4:openshift-logging/kibana6-rhel8@sha256:958ba6856cc76fc77d34a9c78888eb37b9c39b83a2f044ef2337610560ba9323_arm64",
"8Base-RHOL-5.4:openshift-logging/log-file-metric-exporter-rhel8@sha256:043e4d3481fbfedf3115e18fade3a2f33b891b0d9a641bf973c2c7f492cb0489_amd64",
"8Base-RHOL-5.4:openshift-logging/log-file-metric-exporter-rhel8@sha256:4fe26adac10cf20b83812e4fa513231d7e1fd4b6cd4e09d4fd425c391885cfcc_ppc64le",
"8Base-RHOL-5.4:openshift-logging/log-file-metric-exporter-rhel8@sha256:85827db708c0927027435b05732cc7e34b0675eaa86665c91efacc76aecd6227_s390x",
"8Base-RHOL-5.4:openshift-logging/log-file-metric-exporter-rhel8@sha256:a5285db276a5545fdbaa9f0743a49ba72ce1c5da61b5cccc9422320a03e08bea_arm64",
"8Base-RHOL-5.4:openshift-logging/logging-curator5-rhel8@sha256:0b28415b8115ff3216002faa5c9ecf3c46995085e3364c8028cb544cb4787ed2_arm64",
"8Base-RHOL-5.4:openshift-logging/logging-curator5-rhel8@sha256:7016e867ddfe970d6d2d54d5615e8f613786bcfbfe52ebf3139c07da3d5a53db_s390x",
"8Base-RHOL-5.4:openshift-logging/logging-curator5-rhel8@sha256:94c435f45e9dbd9fa633e137356cfb1d6ac2d4dd7574b359367665da42d6203d_amd64",
"8Base-RHOL-5.4:openshift-logging/logging-curator5-rhel8@sha256:d24afbc9228ef7f3d0a6fd716a3a57abde88a1f65d149c7df4f959a775b670bd_ppc64le",
"8Base-RHOL-5.4:openshift-logging/logging-loki-rhel8@sha256:40d4989b4733f54a01a73831fa00b12e49fff69c75138902eac0d894d432e4d9_arm64",
"8Base-RHOL-5.4:openshift-logging/logging-loki-rhel8@sha256:b444af35118c24bde0dfa2a8825ba427b3345451f6081133477254213a3460f0_amd64",
"8Base-RHOL-5.4:openshift-logging/logging-loki-rhel8@sha256:cfe410d498940a95da631ea213866a96a119034d78d5d53f7f9c7e8da56e0f45_s390x",
"8Base-RHOL-5.4:openshift-logging/logging-loki-rhel8@sha256:f7979c82140a0ab1a97c9f3151465bfbd9f79c4db9b0cc20f974cd7b890f074f_ppc64le",
"8Base-RHOL-5.4:openshift-logging/loki-operator-bundle@sha256:02cceda51028eb55a3b82aa5275f03dbaf8f8f9ab3fd27c650d1a07a93044e37_amd64",
"8Base-RHOL-5.4:openshift-logging/loki-rhel8-operator@sha256:0f1be625b4012820f7ac439fed000808d7acb4e885ace16014461bf802be935a_s390x",
"8Base-RHOL-5.4:openshift-logging/loki-rhel8-operator@sha256:28f45a80846c5e11638fb479be42cafcb2bdb3af94dff3629a820de295cbe31d_ppc64le",
"8Base-RHOL-5.4:openshift-logging/loki-rhel8-operator@sha256:df7de1e9f5a4396df6f14b1c4b6bb2a9ae4bc50d82cbc954ec535c26e8df2cb1_arm64",
"8Base-RHOL-5.4:openshift-logging/loki-rhel8-operator@sha256:f8a35557c9eb27f703ffa9320a9d39a2361d93fdb0b8c874d97da458048e7eec_amd64",
"8Base-RHOL-5.4:openshift-logging/lokistack-gateway-rhel8@sha256:178fcf44e6a1fa90d27a40565f69ae2880622b017bc8d9e33a441353eb45609d_arm64",
"8Base-RHOL-5.4:openshift-logging/lokistack-gateway-rhel8@sha256:7b0c2c99cf0f710166b749dbfd7f544caf5fe35516c743fca251c7cec896e1d6_ppc64le",
"8Base-RHOL-5.4:openshift-logging/lokistack-gateway-rhel8@sha256:9c4959525339b607a98889d56f4c26f2e4af25032466c439903a7f1cb593f721_s390x",
"8Base-RHOL-5.4:openshift-logging/lokistack-gateway-rhel8@sha256:a967d5be7d3a6fdd75965a5f9a7396a52cdcb37d6a8521c440b0b5c650c230f2_amd64",
"8Base-RHOL-5.4:openshift-logging/opa-openshift-rhel8@sha256:1b106af51bb50f1ce4db13ebbf6f6c67eae45611c0d5dc46476f1dfaa8aca166_arm64",
"8Base-RHOL-5.4:openshift-logging/opa-openshift-rhel8@sha256:92ddf24824c8f8ae93dec07184c446615b635389472d3a525df72da07c8d9b97_ppc64le",
"8Base-RHOL-5.4:openshift-logging/opa-openshift-rhel8@sha256:9fd0c5df785564b35392705a479d6fb9245e3329719438c76c0282f9ef2f2d55_amd64",
"8Base-RHOL-5.4:openshift-logging/opa-openshift-rhel8@sha256:be8ba0e4c5f24c7b4549700a25c89b10d4b2fc0b0e3888163bb53827914e95c1_s390x",
"8Base-RHOL-5.4:openshift-logging/vector-rhel8@sha256:48bb136d11b44428c87489978873370848ac2b219b107ef7e81ab679db095234_s390x",
"8Base-RHOL-5.4:openshift-logging/vector-rhel8@sha256:48f0317d167710ff5b0787c73f6b7dd0249e7c8d2d001159132a97299c30b62d_ppc64le",
"8Base-RHOL-5.4:openshift-logging/vector-rhel8@sha256:bde21c03fb831d01e85b28245881f7e3f2bb2ef6d2671eb92b2e0cc4bd3898e2_arm64",
"8Base-RHOL-5.4:openshift-logging/vector-rhel8@sha256:cc6b9c6a344aac56c99c96b5120ffe2dad479000b34964ff89d030ae762bda43_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2064698"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Jackson Databind package. This cause of the issue is due to a Java StackOverflow exception and a denial of service via a significant depth of nested objects.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "jackson-databind: denial of service via a large depth of nested objects",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "CodeReady Studio is no longer supported and therefore this flaw will not be addressed in CodeReady Studio.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-RHOL-5.4:openshift-logging/elasticsearch6-rhel8@sha256:17a9f3ae042b92693a374e3d60a07f2ab2e52419f8df25d446dd0654f6a858f6_ppc64le",
"8Base-RHOL-5.4:openshift-logging/elasticsearch6-rhel8@sha256:5b1cfc2f9a96601439cf17d1fe49a6bc6cad3b7273af87b23528090aefbfd915_s390x",
"8Base-RHOL-5.4:openshift-logging/elasticsearch6-rhel8@sha256:8e0ba10f91db4cb8786d0501ec33a3d54f7c7c5337e0495cc2286a6ea20cca20_arm64",
"8Base-RHOL-5.4:openshift-logging/elasticsearch6-rhel8@sha256:fa8182b69328077500f89becc7621b48efa8d99f34247c2e6855dcfec13980e3_amd64"
],
"known_not_affected": [
"8Base-RHOL-5.4:openshift-logging/cluster-logging-operator-bundle@sha256:cb26d9e55f781dd535901a90f1ec2f8e02e8e1de72c0fde638c90fcc228ec4b2_amd64",
"8Base-RHOL-5.4:openshift-logging/cluster-logging-rhel8-operator@sha256:617cc8b0011110981674b75fe1e3041bfa434c952e4a0193818b971edbc7a480_s390x",
"8Base-RHOL-5.4:openshift-logging/cluster-logging-rhel8-operator@sha256:637df49756fe85e7b38b279ffa7672d72c658d3d47df7f9dada2dd70563af83b_arm64",
"8Base-RHOL-5.4:openshift-logging/cluster-logging-rhel8-operator@sha256:aa1602fe2abe23bd8a4c791bc45d425686a6e6d1aab4face0fac28bfc7cebbe1_ppc64le",
"8Base-RHOL-5.4:openshift-logging/cluster-logging-rhel8-operator@sha256:c698b52c46d41007e5ac4f90b9540d430820bd20a93468fddd3a949c7ef5b332_amd64",
"8Base-RHOL-5.4:openshift-logging/elasticsearch-operator-bundle@sha256:7659606e0418a1920161b7ca67524ea6a7b1ed366b817f1a5cde0b346152243c_amd64",
"8Base-RHOL-5.4:openshift-logging/elasticsearch-proxy-rhel8@sha256:4f4e5bb267ad391bc0fc6a010ec9ecdf3bf48d5b6e9db0d2510960c13c97bd71_ppc64le",
"8Base-RHOL-5.4:openshift-logging/elasticsearch-proxy-rhel8@sha256:b9c2e58b39dc3de97013f8806178f6327bf2e4590fe55db144527d64d468f64f_s390x",
"8Base-RHOL-5.4:openshift-logging/elasticsearch-proxy-rhel8@sha256:c9a2b9e7cca14d9596ccbe0f64e2abe4452f91f029f42eefead43c9f526f6a58_arm64",
"8Base-RHOL-5.4:openshift-logging/elasticsearch-proxy-rhel8@sha256:e38c55762c1eef39b401c46d44c899067b1566173e1ce239f17a95c52b30d8c7_amd64",
"8Base-RHOL-5.4:openshift-logging/elasticsearch-rhel8-operator@sha256:2005f41e59a130bb86c2ec47d1b060e3e2ed32f9a4cef3897e2c05fc94043dbb_arm64",
"8Base-RHOL-5.4:openshift-logging/elasticsearch-rhel8-operator@sha256:6a55934cf7af0c03e06d4ec7a15a80acf53491fb7a183c16fdf8018fbf9b4174_ppc64le",
"8Base-RHOL-5.4:openshift-logging/elasticsearch-rhel8-operator@sha256:8ce04536772f31ad022b9c66cddc090d2962b44d66c06a1db56d1447be198326_amd64",
"8Base-RHOL-5.4:openshift-logging/elasticsearch-rhel8-operator@sha256:dd211d42eaad043d9bdb519e3ad6a86255b7280a2cdf47dd3fe0458a77cb110f_s390x",
"8Base-RHOL-5.4:openshift-logging/eventrouter-rhel8@sha256:4438a3bba34418a9dc566bf15f6b4764de4295ab8b05a7b1a86f9e8cd332b3f7_arm64",
"8Base-RHOL-5.4:openshift-logging/eventrouter-rhel8@sha256:bc408fc4b0482c5eb1b0deb3a9090f3e3dd9b370001d54cd076254562c72fec9_ppc64le",
"8Base-RHOL-5.4:openshift-logging/eventrouter-rhel8@sha256:d50a2b89442d04b1163c01b3a3951857a95df76c57b14e7f51d835c3ac6d75b3_amd64",
"8Base-RHOL-5.4:openshift-logging/eventrouter-rhel8@sha256:f05aee8433dec1c9f6cf835038f9e5a47847d4095383bf3c22ca57c3fb69fa98_s390x",
"8Base-RHOL-5.4:openshift-logging/fluentd-rhel8@sha256:150e17cb645cf2f4cb7ab592572dd3abd145d9a33e790778280e256666248022_amd64",
"8Base-RHOL-5.4:openshift-logging/fluentd-rhel8@sha256:36aecf05ca3cdaf29982b3efa4a1c97087be29b0a58c9777e6b0c11a34861aa8_s390x",
"8Base-RHOL-5.4:openshift-logging/fluentd-rhel8@sha256:e3a51d2bdc632b8376e28c33e9d4fac3464e3a84a313a17246b1f1cf21cb5710_arm64",
"8Base-RHOL-5.4:openshift-logging/fluentd-rhel8@sha256:ea07da04f06df6bf0d9dd981a3795dfdb51eca83f59a6291114650e3e98a9e71_ppc64le",
"8Base-RHOL-5.4:openshift-logging/kibana6-rhel8@sha256:167ee6a645c7397bde3d12e9b9685279505c25ffb3bda11ae68bdf0b34229f2e_amd64",
"8Base-RHOL-5.4:openshift-logging/kibana6-rhel8@sha256:4a029733337b10bb9fb8d98c91abc5451ca0b98713c8f2271a675251e025b6c0_s390x",
"8Base-RHOL-5.4:openshift-logging/kibana6-rhel8@sha256:812f4380024dc3df42310ad14d173d390f2bdf4b3dbdb02550c00552534f79ce_ppc64le",
"8Base-RHOL-5.4:openshift-logging/kibana6-rhel8@sha256:958ba6856cc76fc77d34a9c78888eb37b9c39b83a2f044ef2337610560ba9323_arm64",
"8Base-RHOL-5.4:openshift-logging/log-file-metric-exporter-rhel8@sha256:043e4d3481fbfedf3115e18fade3a2f33b891b0d9a641bf973c2c7f492cb0489_amd64",
"8Base-RHOL-5.4:openshift-logging/log-file-metric-exporter-rhel8@sha256:4fe26adac10cf20b83812e4fa513231d7e1fd4b6cd4e09d4fd425c391885cfcc_ppc64le",
"8Base-RHOL-5.4:openshift-logging/log-file-metric-exporter-rhel8@sha256:85827db708c0927027435b05732cc7e34b0675eaa86665c91efacc76aecd6227_s390x",
"8Base-RHOL-5.4:openshift-logging/log-file-metric-exporter-rhel8@sha256:a5285db276a5545fdbaa9f0743a49ba72ce1c5da61b5cccc9422320a03e08bea_arm64",
"8Base-RHOL-5.4:openshift-logging/logging-curator5-rhel8@sha256:0b28415b8115ff3216002faa5c9ecf3c46995085e3364c8028cb544cb4787ed2_arm64",
"8Base-RHOL-5.4:openshift-logging/logging-curator5-rhel8@sha256:7016e867ddfe970d6d2d54d5615e8f613786bcfbfe52ebf3139c07da3d5a53db_s390x",
"8Base-RHOL-5.4:openshift-logging/logging-curator5-rhel8@sha256:94c435f45e9dbd9fa633e137356cfb1d6ac2d4dd7574b359367665da42d6203d_amd64",
"8Base-RHOL-5.4:openshift-logging/logging-curator5-rhel8@sha256:d24afbc9228ef7f3d0a6fd716a3a57abde88a1f65d149c7df4f959a775b670bd_ppc64le",
"8Base-RHOL-5.4:openshift-logging/logging-loki-rhel8@sha256:40d4989b4733f54a01a73831fa00b12e49fff69c75138902eac0d894d432e4d9_arm64",
"8Base-RHOL-5.4:openshift-logging/logging-loki-rhel8@sha256:b444af35118c24bde0dfa2a8825ba427b3345451f6081133477254213a3460f0_amd64",
"8Base-RHOL-5.4:openshift-logging/logging-loki-rhel8@sha256:cfe410d498940a95da631ea213866a96a119034d78d5d53f7f9c7e8da56e0f45_s390x",
"8Base-RHOL-5.4:openshift-logging/logging-loki-rhel8@sha256:f7979c82140a0ab1a97c9f3151465bfbd9f79c4db9b0cc20f974cd7b890f074f_ppc64le",
"8Base-RHOL-5.4:openshift-logging/loki-operator-bundle@sha256:02cceda51028eb55a3b82aa5275f03dbaf8f8f9ab3fd27c650d1a07a93044e37_amd64",
"8Base-RHOL-5.4:openshift-logging/loki-rhel8-operator@sha256:0f1be625b4012820f7ac439fed000808d7acb4e885ace16014461bf802be935a_s390x",
"8Base-RHOL-5.4:openshift-logging/loki-rhel8-operator@sha256:28f45a80846c5e11638fb479be42cafcb2bdb3af94dff3629a820de295cbe31d_ppc64le",
"8Base-RHOL-5.4:openshift-logging/loki-rhel8-operator@sha256:df7de1e9f5a4396df6f14b1c4b6bb2a9ae4bc50d82cbc954ec535c26e8df2cb1_arm64",
"8Base-RHOL-5.4:openshift-logging/loki-rhel8-operator@sha256:f8a35557c9eb27f703ffa9320a9d39a2361d93fdb0b8c874d97da458048e7eec_amd64",
"8Base-RHOL-5.4:openshift-logging/lokistack-gateway-rhel8@sha256:178fcf44e6a1fa90d27a40565f69ae2880622b017bc8d9e33a441353eb45609d_arm64",
"8Base-RHOL-5.4:openshift-logging/lokistack-gateway-rhel8@sha256:7b0c2c99cf0f710166b749dbfd7f544caf5fe35516c743fca251c7cec896e1d6_ppc64le",
"8Base-RHOL-5.4:openshift-logging/lokistack-gateway-rhel8@sha256:9c4959525339b607a98889d56f4c26f2e4af25032466c439903a7f1cb593f721_s390x",
"8Base-RHOL-5.4:openshift-logging/lokistack-gateway-rhel8@sha256:a967d5be7d3a6fdd75965a5f9a7396a52cdcb37d6a8521c440b0b5c650c230f2_amd64",
"8Base-RHOL-5.4:openshift-logging/opa-openshift-rhel8@sha256:1b106af51bb50f1ce4db13ebbf6f6c67eae45611c0d5dc46476f1dfaa8aca166_arm64",
"8Base-RHOL-5.4:openshift-logging/opa-openshift-rhel8@sha256:92ddf24824c8f8ae93dec07184c446615b635389472d3a525df72da07c8d9b97_ppc64le",
"8Base-RHOL-5.4:openshift-logging/opa-openshift-rhel8@sha256:9fd0c5df785564b35392705a479d6fb9245e3329719438c76c0282f9ef2f2d55_amd64",
"8Base-RHOL-5.4:openshift-logging/opa-openshift-rhel8@sha256:be8ba0e4c5f24c7b4549700a25c89b10d4b2fc0b0e3888163bb53827914e95c1_s390x",
"8Base-RHOL-5.4:openshift-logging/vector-rhel8@sha256:48bb136d11b44428c87489978873370848ac2b219b107ef7e81ab679db095234_s390x",
"8Base-RHOL-5.4:openshift-logging/vector-rhel8@sha256:48f0317d167710ff5b0787c73f6b7dd0249e7c8d2d001159132a97299c30b62d_ppc64le",
"8Base-RHOL-5.4:openshift-logging/vector-rhel8@sha256:bde21c03fb831d01e85b28245881f7e3f2bb2ef6d2671eb92b2e0cc4bd3898e2_arm64",
"8Base-RHOL-5.4:openshift-logging/vector-rhel8@sha256:cc6b9c6a344aac56c99c96b5120ffe2dad479000b34964ff89d030ae762bda43_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-36518"
},
{
"category": "external",
"summary": "RHBZ#2064698",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2064698"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-36518",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-36518"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-36518",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-36518"
},
{
"category": "external",
"summary": "https://github.com/advisories/GHSA-57j2-w4cx-62h2",
"url": "https://github.com/advisories/GHSA-57j2-w4cx-62h2"
}
],
"release_date": "2020-08-13T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-11-16T12:13:01+00:00",
"details": "For OpenShift Container Platform 4.10 see the following documentation, which will be updated shortly, for detailed release notes:\n\nhttps://docs.openshift.com/container-platform/4.10/logging/cluster-logging-release-notes.html\n\nFor Red Hat OpenShift Logging 5.4, see the following instructions to apply this update:\n\nhttps://docs.openshift.com/container-platform/4.10/logging/cluster-logging-upgrading.html",
"product_ids": [
"8Base-RHOL-5.4:openshift-logging/elasticsearch6-rhel8@sha256:17a9f3ae042b92693a374e3d60a07f2ab2e52419f8df25d446dd0654f6a858f6_ppc64le",
"8Base-RHOL-5.4:openshift-logging/elasticsearch6-rhel8@sha256:5b1cfc2f9a96601439cf17d1fe49a6bc6cad3b7273af87b23528090aefbfd915_s390x",
"8Base-RHOL-5.4:openshift-logging/elasticsearch6-rhel8@sha256:8e0ba10f91db4cb8786d0501ec33a3d54f7c7c5337e0495cc2286a6ea20cca20_arm64",
"8Base-RHOL-5.4:openshift-logging/elasticsearch6-rhel8@sha256:fa8182b69328077500f89becc7621b48efa8d99f34247c2e6855dcfec13980e3_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:7435"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"8Base-RHOL-5.4:openshift-logging/cluster-logging-operator-bundle@sha256:cb26d9e55f781dd535901a90f1ec2f8e02e8e1de72c0fde638c90fcc228ec4b2_amd64",
"8Base-RHOL-5.4:openshift-logging/cluster-logging-rhel8-operator@sha256:617cc8b0011110981674b75fe1e3041bfa434c952e4a0193818b971edbc7a480_s390x",
"8Base-RHOL-5.4:openshift-logging/cluster-logging-rhel8-operator@sha256:637df49756fe85e7b38b279ffa7672d72c658d3d47df7f9dada2dd70563af83b_arm64",
"8Base-RHOL-5.4:openshift-logging/cluster-logging-rhel8-operator@sha256:aa1602fe2abe23bd8a4c791bc45d425686a6e6d1aab4face0fac28bfc7cebbe1_ppc64le",
"8Base-RHOL-5.4:openshift-logging/cluster-logging-rhel8-operator@sha256:c698b52c46d41007e5ac4f90b9540d430820bd20a93468fddd3a949c7ef5b332_amd64",
"8Base-RHOL-5.4:openshift-logging/elasticsearch-operator-bundle@sha256:7659606e0418a1920161b7ca67524ea6a7b1ed366b817f1a5cde0b346152243c_amd64",
"8Base-RHOL-5.4:openshift-logging/elasticsearch-proxy-rhel8@sha256:4f4e5bb267ad391bc0fc6a010ec9ecdf3bf48d5b6e9db0d2510960c13c97bd71_ppc64le",
"8Base-RHOL-5.4:openshift-logging/elasticsearch-proxy-rhel8@sha256:b9c2e58b39dc3de97013f8806178f6327bf2e4590fe55db144527d64d468f64f_s390x",
"8Base-RHOL-5.4:openshift-logging/elasticsearch-proxy-rhel8@sha256:c9a2b9e7cca14d9596ccbe0f64e2abe4452f91f029f42eefead43c9f526f6a58_arm64",
"8Base-RHOL-5.4:openshift-logging/elasticsearch-proxy-rhel8@sha256:e38c55762c1eef39b401c46d44c899067b1566173e1ce239f17a95c52b30d8c7_amd64",
"8Base-RHOL-5.4:openshift-logging/elasticsearch-rhel8-operator@sha256:2005f41e59a130bb86c2ec47d1b060e3e2ed32f9a4cef3897e2c05fc94043dbb_arm64",
"8Base-RHOL-5.4:openshift-logging/elasticsearch-rhel8-operator@sha256:6a55934cf7af0c03e06d4ec7a15a80acf53491fb7a183c16fdf8018fbf9b4174_ppc64le",
"8Base-RHOL-5.4:openshift-logging/elasticsearch-rhel8-operator@sha256:8ce04536772f31ad022b9c66cddc090d2962b44d66c06a1db56d1447be198326_amd64",
"8Base-RHOL-5.4:openshift-logging/elasticsearch-rhel8-operator@sha256:dd211d42eaad043d9bdb519e3ad6a86255b7280a2cdf47dd3fe0458a77cb110f_s390x",
"8Base-RHOL-5.4:openshift-logging/elasticsearch6-rhel8@sha256:17a9f3ae042b92693a374e3d60a07f2ab2e52419f8df25d446dd0654f6a858f6_ppc64le",
"8Base-RHOL-5.4:openshift-logging/elasticsearch6-rhel8@sha256:5b1cfc2f9a96601439cf17d1fe49a6bc6cad3b7273af87b23528090aefbfd915_s390x",
"8Base-RHOL-5.4:openshift-logging/elasticsearch6-rhel8@sha256:8e0ba10f91db4cb8786d0501ec33a3d54f7c7c5337e0495cc2286a6ea20cca20_arm64",
"8Base-RHOL-5.4:openshift-logging/elasticsearch6-rhel8@sha256:fa8182b69328077500f89becc7621b48efa8d99f34247c2e6855dcfec13980e3_amd64",
"8Base-RHOL-5.4:openshift-logging/eventrouter-rhel8@sha256:4438a3bba34418a9dc566bf15f6b4764de4295ab8b05a7b1a86f9e8cd332b3f7_arm64",
"8Base-RHOL-5.4:openshift-logging/eventrouter-rhel8@sha256:bc408fc4b0482c5eb1b0deb3a9090f3e3dd9b370001d54cd076254562c72fec9_ppc64le",
"8Base-RHOL-5.4:openshift-logging/eventrouter-rhel8@sha256:d50a2b89442d04b1163c01b3a3951857a95df76c57b14e7f51d835c3ac6d75b3_amd64",
"8Base-RHOL-5.4:openshift-logging/eventrouter-rhel8@sha256:f05aee8433dec1c9f6cf835038f9e5a47847d4095383bf3c22ca57c3fb69fa98_s390x",
"8Base-RHOL-5.4:openshift-logging/fluentd-rhel8@sha256:150e17cb645cf2f4cb7ab592572dd3abd145d9a33e790778280e256666248022_amd64",
"8Base-RHOL-5.4:openshift-logging/fluentd-rhel8@sha256:36aecf05ca3cdaf29982b3efa4a1c97087be29b0a58c9777e6b0c11a34861aa8_s390x",
"8Base-RHOL-5.4:openshift-logging/fluentd-rhel8@sha256:e3a51d2bdc632b8376e28c33e9d4fac3464e3a84a313a17246b1f1cf21cb5710_arm64",
"8Base-RHOL-5.4:openshift-logging/fluentd-rhel8@sha256:ea07da04f06df6bf0d9dd981a3795dfdb51eca83f59a6291114650e3e98a9e71_ppc64le",
"8Base-RHOL-5.4:openshift-logging/kibana6-rhel8@sha256:167ee6a645c7397bde3d12e9b9685279505c25ffb3bda11ae68bdf0b34229f2e_amd64",
"8Base-RHOL-5.4:openshift-logging/kibana6-rhel8@sha256:4a029733337b10bb9fb8d98c91abc5451ca0b98713c8f2271a675251e025b6c0_s390x",
"8Base-RHOL-5.4:openshift-logging/kibana6-rhel8@sha256:812f4380024dc3df42310ad14d173d390f2bdf4b3dbdb02550c00552534f79ce_ppc64le",
"8Base-RHOL-5.4:openshift-logging/kibana6-rhel8@sha256:958ba6856cc76fc77d34a9c78888eb37b9c39b83a2f044ef2337610560ba9323_arm64",
"8Base-RHOL-5.4:openshift-logging/log-file-metric-exporter-rhel8@sha256:043e4d3481fbfedf3115e18fade3a2f33b891b0d9a641bf973c2c7f492cb0489_amd64",
"8Base-RHOL-5.4:openshift-logging/log-file-metric-exporter-rhel8@sha256:4fe26adac10cf20b83812e4fa513231d7e1fd4b6cd4e09d4fd425c391885cfcc_ppc64le",
"8Base-RHOL-5.4:openshift-logging/log-file-metric-exporter-rhel8@sha256:85827db708c0927027435b05732cc7e34b0675eaa86665c91efacc76aecd6227_s390x",
"8Base-RHOL-5.4:openshift-logging/log-file-metric-exporter-rhel8@sha256:a5285db276a5545fdbaa9f0743a49ba72ce1c5da61b5cccc9422320a03e08bea_arm64",
"8Base-RHOL-5.4:openshift-logging/logging-curator5-rhel8@sha256:0b28415b8115ff3216002faa5c9ecf3c46995085e3364c8028cb544cb4787ed2_arm64",
"8Base-RHOL-5.4:openshift-logging/logging-curator5-rhel8@sha256:7016e867ddfe970d6d2d54d5615e8f613786bcfbfe52ebf3139c07da3d5a53db_s390x",
"8Base-RHOL-5.4:openshift-logging/logging-curator5-rhel8@sha256:94c435f45e9dbd9fa633e137356cfb1d6ac2d4dd7574b359367665da42d6203d_amd64",
"8Base-RHOL-5.4:openshift-logging/logging-curator5-rhel8@sha256:d24afbc9228ef7f3d0a6fd716a3a57abde88a1f65d149c7df4f959a775b670bd_ppc64le",
"8Base-RHOL-5.4:openshift-logging/logging-loki-rhel8@sha256:40d4989b4733f54a01a73831fa00b12e49fff69c75138902eac0d894d432e4d9_arm64",
"8Base-RHOL-5.4:openshift-logging/logging-loki-rhel8@sha256:b444af35118c24bde0dfa2a8825ba427b3345451f6081133477254213a3460f0_amd64",
"8Base-RHOL-5.4:openshift-logging/logging-loki-rhel8@sha256:cfe410d498940a95da631ea213866a96a119034d78d5d53f7f9c7e8da56e0f45_s390x",
"8Base-RHOL-5.4:openshift-logging/logging-loki-rhel8@sha256:f7979c82140a0ab1a97c9f3151465bfbd9f79c4db9b0cc20f974cd7b890f074f_ppc64le",
"8Base-RHOL-5.4:openshift-logging/loki-operator-bundle@sha256:02cceda51028eb55a3b82aa5275f03dbaf8f8f9ab3fd27c650d1a07a93044e37_amd64",
"8Base-RHOL-5.4:openshift-logging/loki-rhel8-operator@sha256:0f1be625b4012820f7ac439fed000808d7acb4e885ace16014461bf802be935a_s390x",
"8Base-RHOL-5.4:openshift-logging/loki-rhel8-operator@sha256:28f45a80846c5e11638fb479be42cafcb2bdb3af94dff3629a820de295cbe31d_ppc64le",
"8Base-RHOL-5.4:openshift-logging/loki-rhel8-operator@sha256:df7de1e9f5a4396df6f14b1c4b6bb2a9ae4bc50d82cbc954ec535c26e8df2cb1_arm64",
"8Base-RHOL-5.4:openshift-logging/loki-rhel8-operator@sha256:f8a35557c9eb27f703ffa9320a9d39a2361d93fdb0b8c874d97da458048e7eec_amd64",
"8Base-RHOL-5.4:openshift-logging/lokistack-gateway-rhel8@sha256:178fcf44e6a1fa90d27a40565f69ae2880622b017bc8d9e33a441353eb45609d_arm64",
"8Base-RHOL-5.4:openshift-logging/lokistack-gateway-rhel8@sha256:7b0c2c99cf0f710166b749dbfd7f544caf5fe35516c743fca251c7cec896e1d6_ppc64le",
"8Base-RHOL-5.4:openshift-logging/lokistack-gateway-rhel8@sha256:9c4959525339b607a98889d56f4c26f2e4af25032466c439903a7f1cb593f721_s390x",
"8Base-RHOL-5.4:openshift-logging/lokistack-gateway-rhel8@sha256:a967d5be7d3a6fdd75965a5f9a7396a52cdcb37d6a8521c440b0b5c650c230f2_amd64",
"8Base-RHOL-5.4:openshift-logging/opa-openshift-rhel8@sha256:1b106af51bb50f1ce4db13ebbf6f6c67eae45611c0d5dc46476f1dfaa8aca166_arm64",
"8Base-RHOL-5.4:openshift-logging/opa-openshift-rhel8@sha256:92ddf24824c8f8ae93dec07184c446615b635389472d3a525df72da07c8d9b97_ppc64le",
"8Base-RHOL-5.4:openshift-logging/opa-openshift-rhel8@sha256:9fd0c5df785564b35392705a479d6fb9245e3329719438c76c0282f9ef2f2d55_amd64",
"8Base-RHOL-5.4:openshift-logging/opa-openshift-rhel8@sha256:be8ba0e4c5f24c7b4549700a25c89b10d4b2fc0b0e3888163bb53827914e95c1_s390x",
"8Base-RHOL-5.4:openshift-logging/vector-rhel8@sha256:48bb136d11b44428c87489978873370848ac2b219b107ef7e81ab679db095234_s390x",
"8Base-RHOL-5.4:openshift-logging/vector-rhel8@sha256:48f0317d167710ff5b0787c73f6b7dd0249e7c8d2d001159132a97299c30b62d_ppc64le",
"8Base-RHOL-5.4:openshift-logging/vector-rhel8@sha256:bde21c03fb831d01e85b28245881f7e3f2bb2ef6d2671eb92b2e0cc4bd3898e2_arm64",
"8Base-RHOL-5.4:openshift-logging/vector-rhel8@sha256:cc6b9c6a344aac56c99c96b5120ffe2dad479000b34964ff89d030ae762bda43_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "jackson-databind: denial of service via a large depth of nested objects"
},
{
"cve": "CVE-2022-32149",
"cwe": {
"id": "CWE-407",
"name": "Inefficient Algorithmic Complexity"
},
"discovery_date": "2022-10-12T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-RHOL-5.4:openshift-logging/cluster-logging-operator-bundle@sha256:cb26d9e55f781dd535901a90f1ec2f8e02e8e1de72c0fde638c90fcc228ec4b2_amd64",
"8Base-RHOL-5.4:openshift-logging/cluster-logging-rhel8-operator@sha256:617cc8b0011110981674b75fe1e3041bfa434c952e4a0193818b971edbc7a480_s390x",
"8Base-RHOL-5.4:openshift-logging/cluster-logging-rhel8-operator@sha256:637df49756fe85e7b38b279ffa7672d72c658d3d47df7f9dada2dd70563af83b_arm64",
"8Base-RHOL-5.4:openshift-logging/cluster-logging-rhel8-operator@sha256:aa1602fe2abe23bd8a4c791bc45d425686a6e6d1aab4face0fac28bfc7cebbe1_ppc64le",
"8Base-RHOL-5.4:openshift-logging/cluster-logging-rhel8-operator@sha256:c698b52c46d41007e5ac4f90b9540d430820bd20a93468fddd3a949c7ef5b332_amd64",
"8Base-RHOL-5.4:openshift-logging/elasticsearch-operator-bundle@sha256:7659606e0418a1920161b7ca67524ea6a7b1ed366b817f1a5cde0b346152243c_amd64",
"8Base-RHOL-5.4:openshift-logging/elasticsearch-rhel8-operator@sha256:2005f41e59a130bb86c2ec47d1b060e3e2ed32f9a4cef3897e2c05fc94043dbb_arm64",
"8Base-RHOL-5.4:openshift-logging/elasticsearch-rhel8-operator@sha256:6a55934cf7af0c03e06d4ec7a15a80acf53491fb7a183c16fdf8018fbf9b4174_ppc64le",
"8Base-RHOL-5.4:openshift-logging/elasticsearch-rhel8-operator@sha256:8ce04536772f31ad022b9c66cddc090d2962b44d66c06a1db56d1447be198326_amd64",
"8Base-RHOL-5.4:openshift-logging/elasticsearch-rhel8-operator@sha256:dd211d42eaad043d9bdb519e3ad6a86255b7280a2cdf47dd3fe0458a77cb110f_s390x",
"8Base-RHOL-5.4:openshift-logging/elasticsearch6-rhel8@sha256:17a9f3ae042b92693a374e3d60a07f2ab2e52419f8df25d446dd0654f6a858f6_ppc64le",
"8Base-RHOL-5.4:openshift-logging/elasticsearch6-rhel8@sha256:5b1cfc2f9a96601439cf17d1fe49a6bc6cad3b7273af87b23528090aefbfd915_s390x",
"8Base-RHOL-5.4:openshift-logging/elasticsearch6-rhel8@sha256:8e0ba10f91db4cb8786d0501ec33a3d54f7c7c5337e0495cc2286a6ea20cca20_arm64",
"8Base-RHOL-5.4:openshift-logging/elasticsearch6-rhel8@sha256:fa8182b69328077500f89becc7621b48efa8d99f34247c2e6855dcfec13980e3_amd64",
"8Base-RHOL-5.4:openshift-logging/eventrouter-rhel8@sha256:4438a3bba34418a9dc566bf15f6b4764de4295ab8b05a7b1a86f9e8cd332b3f7_arm64",
"8Base-RHOL-5.4:openshift-logging/eventrouter-rhel8@sha256:bc408fc4b0482c5eb1b0deb3a9090f3e3dd9b370001d54cd076254562c72fec9_ppc64le",
"8Base-RHOL-5.4:openshift-logging/eventrouter-rhel8@sha256:d50a2b89442d04b1163c01b3a3951857a95df76c57b14e7f51d835c3ac6d75b3_amd64",
"8Base-RHOL-5.4:openshift-logging/eventrouter-rhel8@sha256:f05aee8433dec1c9f6cf835038f9e5a47847d4095383bf3c22ca57c3fb69fa98_s390x",
"8Base-RHOL-5.4:openshift-logging/fluentd-rhel8@sha256:150e17cb645cf2f4cb7ab592572dd3abd145d9a33e790778280e256666248022_amd64",
"8Base-RHOL-5.4:openshift-logging/fluentd-rhel8@sha256:36aecf05ca3cdaf29982b3efa4a1c97087be29b0a58c9777e6b0c11a34861aa8_s390x",
"8Base-RHOL-5.4:openshift-logging/fluentd-rhel8@sha256:e3a51d2bdc632b8376e28c33e9d4fac3464e3a84a313a17246b1f1cf21cb5710_arm64",
"8Base-RHOL-5.4:openshift-logging/fluentd-rhel8@sha256:ea07da04f06df6bf0d9dd981a3795dfdb51eca83f59a6291114650e3e98a9e71_ppc64le",
"8Base-RHOL-5.4:openshift-logging/kibana6-rhel8@sha256:167ee6a645c7397bde3d12e9b9685279505c25ffb3bda11ae68bdf0b34229f2e_amd64",
"8Base-RHOL-5.4:openshift-logging/kibana6-rhel8@sha256:4a029733337b10bb9fb8d98c91abc5451ca0b98713c8f2271a675251e025b6c0_s390x",
"8Base-RHOL-5.4:openshift-logging/kibana6-rhel8@sha256:812f4380024dc3df42310ad14d173d390f2bdf4b3dbdb02550c00552534f79ce_ppc64le",
"8Base-RHOL-5.4:openshift-logging/kibana6-rhel8@sha256:958ba6856cc76fc77d34a9c78888eb37b9c39b83a2f044ef2337610560ba9323_arm64",
"8Base-RHOL-5.4:openshift-logging/log-file-metric-exporter-rhel8@sha256:043e4d3481fbfedf3115e18fade3a2f33b891b0d9a641bf973c2c7f492cb0489_amd64",
"8Base-RHOL-5.4:openshift-logging/log-file-metric-exporter-rhel8@sha256:4fe26adac10cf20b83812e4fa513231d7e1fd4b6cd4e09d4fd425c391885cfcc_ppc64le",
"8Base-RHOL-5.4:openshift-logging/log-file-metric-exporter-rhel8@sha256:85827db708c0927027435b05732cc7e34b0675eaa86665c91efacc76aecd6227_s390x",
"8Base-RHOL-5.4:openshift-logging/log-file-metric-exporter-rhel8@sha256:a5285db276a5545fdbaa9f0743a49ba72ce1c5da61b5cccc9422320a03e08bea_arm64",
"8Base-RHOL-5.4:openshift-logging/logging-curator5-rhel8@sha256:0b28415b8115ff3216002faa5c9ecf3c46995085e3364c8028cb544cb4787ed2_arm64",
"8Base-RHOL-5.4:openshift-logging/logging-curator5-rhel8@sha256:7016e867ddfe970d6d2d54d5615e8f613786bcfbfe52ebf3139c07da3d5a53db_s390x",
"8Base-RHOL-5.4:openshift-logging/logging-curator5-rhel8@sha256:94c435f45e9dbd9fa633e137356cfb1d6ac2d4dd7574b359367665da42d6203d_amd64",
"8Base-RHOL-5.4:openshift-logging/logging-curator5-rhel8@sha256:d24afbc9228ef7f3d0a6fd716a3a57abde88a1f65d149c7df4f959a775b670bd_ppc64le",
"8Base-RHOL-5.4:openshift-logging/logging-loki-rhel8@sha256:40d4989b4733f54a01a73831fa00b12e49fff69c75138902eac0d894d432e4d9_arm64",
"8Base-RHOL-5.4:openshift-logging/logging-loki-rhel8@sha256:b444af35118c24bde0dfa2a8825ba427b3345451f6081133477254213a3460f0_amd64",
"8Base-RHOL-5.4:openshift-logging/logging-loki-rhel8@sha256:cfe410d498940a95da631ea213866a96a119034d78d5d53f7f9c7e8da56e0f45_s390x",
"8Base-RHOL-5.4:openshift-logging/logging-loki-rhel8@sha256:f7979c82140a0ab1a97c9f3151465bfbd9f79c4db9b0cc20f974cd7b890f074f_ppc64le",
"8Base-RHOL-5.4:openshift-logging/loki-operator-bundle@sha256:02cceda51028eb55a3b82aa5275f03dbaf8f8f9ab3fd27c650d1a07a93044e37_amd64",
"8Base-RHOL-5.4:openshift-logging/loki-rhel8-operator@sha256:0f1be625b4012820f7ac439fed000808d7acb4e885ace16014461bf802be935a_s390x",
"8Base-RHOL-5.4:openshift-logging/loki-rhel8-operator@sha256:28f45a80846c5e11638fb479be42cafcb2bdb3af94dff3629a820de295cbe31d_ppc64le",
"8Base-RHOL-5.4:openshift-logging/loki-rhel8-operator@sha256:df7de1e9f5a4396df6f14b1c4b6bb2a9ae4bc50d82cbc954ec535c26e8df2cb1_arm64",
"8Base-RHOL-5.4:openshift-logging/loki-rhel8-operator@sha256:f8a35557c9eb27f703ffa9320a9d39a2361d93fdb0b8c874d97da458048e7eec_amd64",
"8Base-RHOL-5.4:openshift-logging/lokistack-gateway-rhel8@sha256:178fcf44e6a1fa90d27a40565f69ae2880622b017bc8d9e33a441353eb45609d_arm64",
"8Base-RHOL-5.4:openshift-logging/lokistack-gateway-rhel8@sha256:7b0c2c99cf0f710166b749dbfd7f544caf5fe35516c743fca251c7cec896e1d6_ppc64le",
"8Base-RHOL-5.4:openshift-logging/lokistack-gateway-rhel8@sha256:9c4959525339b607a98889d56f4c26f2e4af25032466c439903a7f1cb593f721_s390x",
"8Base-RHOL-5.4:openshift-logging/lokistack-gateway-rhel8@sha256:a967d5be7d3a6fdd75965a5f9a7396a52cdcb37d6a8521c440b0b5c650c230f2_amd64",
"8Base-RHOL-5.4:openshift-logging/opa-openshift-rhel8@sha256:1b106af51bb50f1ce4db13ebbf6f6c67eae45611c0d5dc46476f1dfaa8aca166_arm64",
"8Base-RHOL-5.4:openshift-logging/opa-openshift-rhel8@sha256:92ddf24824c8f8ae93dec07184c446615b635389472d3a525df72da07c8d9b97_ppc64le",
"8Base-RHOL-5.4:openshift-logging/opa-openshift-rhel8@sha256:9fd0c5df785564b35392705a479d6fb9245e3329719438c76c0282f9ef2f2d55_amd64",
"8Base-RHOL-5.4:openshift-logging/opa-openshift-rhel8@sha256:be8ba0e4c5f24c7b4549700a25c89b10d4b2fc0b0e3888163bb53827914e95c1_s390x",
"8Base-RHOL-5.4:openshift-logging/vector-rhel8@sha256:48bb136d11b44428c87489978873370848ac2b219b107ef7e81ab679db095234_s390x",
"8Base-RHOL-5.4:openshift-logging/vector-rhel8@sha256:48f0317d167710ff5b0787c73f6b7dd0249e7c8d2d001159132a97299c30b62d_ppc64le",
"8Base-RHOL-5.4:openshift-logging/vector-rhel8@sha256:bde21c03fb831d01e85b28245881f7e3f2bb2ef6d2671eb92b2e0cc4bd3898e2_arm64",
"8Base-RHOL-5.4:openshift-logging/vector-rhel8@sha256:cc6b9c6a344aac56c99c96b5120ffe2dad479000b34964ff89d030ae762bda43_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2134010"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in the golang.org/x/text/language package. An attacker can craft an Accept-Language header which ParseAcceptLanguage will take significant time to parse. This issue leads to a denial of service, and can impact availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: golang.org/x/text/language: ParseAcceptLanguage takes a long time to parse complex tags",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-RHOL-5.4:openshift-logging/elasticsearch-proxy-rhel8@sha256:4f4e5bb267ad391bc0fc6a010ec9ecdf3bf48d5b6e9db0d2510960c13c97bd71_ppc64le",
"8Base-RHOL-5.4:openshift-logging/elasticsearch-proxy-rhel8@sha256:b9c2e58b39dc3de97013f8806178f6327bf2e4590fe55db144527d64d468f64f_s390x",
"8Base-RHOL-5.4:openshift-logging/elasticsearch-proxy-rhel8@sha256:c9a2b9e7cca14d9596ccbe0f64e2abe4452f91f029f42eefead43c9f526f6a58_arm64",
"8Base-RHOL-5.4:openshift-logging/elasticsearch-proxy-rhel8@sha256:e38c55762c1eef39b401c46d44c899067b1566173e1ce239f17a95c52b30d8c7_amd64"
],
"known_not_affected": [
"8Base-RHOL-5.4:openshift-logging/cluster-logging-operator-bundle@sha256:cb26d9e55f781dd535901a90f1ec2f8e02e8e1de72c0fde638c90fcc228ec4b2_amd64",
"8Base-RHOL-5.4:openshift-logging/cluster-logging-rhel8-operator@sha256:617cc8b0011110981674b75fe1e3041bfa434c952e4a0193818b971edbc7a480_s390x",
"8Base-RHOL-5.4:openshift-logging/cluster-logging-rhel8-operator@sha256:637df49756fe85e7b38b279ffa7672d72c658d3d47df7f9dada2dd70563af83b_arm64",
"8Base-RHOL-5.4:openshift-logging/cluster-logging-rhel8-operator@sha256:aa1602fe2abe23bd8a4c791bc45d425686a6e6d1aab4face0fac28bfc7cebbe1_ppc64le",
"8Base-RHOL-5.4:openshift-logging/cluster-logging-rhel8-operator@sha256:c698b52c46d41007e5ac4f90b9540d430820bd20a93468fddd3a949c7ef5b332_amd64",
"8Base-RHOL-5.4:openshift-logging/elasticsearch-operator-bundle@sha256:7659606e0418a1920161b7ca67524ea6a7b1ed366b817f1a5cde0b346152243c_amd64",
"8Base-RHOL-5.4:openshift-logging/elasticsearch-rhel8-operator@sha256:2005f41e59a130bb86c2ec47d1b060e3e2ed32f9a4cef3897e2c05fc94043dbb_arm64",
"8Base-RHOL-5.4:openshift-logging/elasticsearch-rhel8-operator@sha256:6a55934cf7af0c03e06d4ec7a15a80acf53491fb7a183c16fdf8018fbf9b4174_ppc64le",
"8Base-RHOL-5.4:openshift-logging/elasticsearch-rhel8-operator@sha256:8ce04536772f31ad022b9c66cddc090d2962b44d66c06a1db56d1447be198326_amd64",
"8Base-RHOL-5.4:openshift-logging/elasticsearch-rhel8-operator@sha256:dd211d42eaad043d9bdb519e3ad6a86255b7280a2cdf47dd3fe0458a77cb110f_s390x",
"8Base-RHOL-5.4:openshift-logging/elasticsearch6-rhel8@sha256:17a9f3ae042b92693a374e3d60a07f2ab2e52419f8df25d446dd0654f6a858f6_ppc64le",
"8Base-RHOL-5.4:openshift-logging/elasticsearch6-rhel8@sha256:5b1cfc2f9a96601439cf17d1fe49a6bc6cad3b7273af87b23528090aefbfd915_s390x",
"8Base-RHOL-5.4:openshift-logging/elasticsearch6-rhel8@sha256:8e0ba10f91db4cb8786d0501ec33a3d54f7c7c5337e0495cc2286a6ea20cca20_arm64",
"8Base-RHOL-5.4:openshift-logging/elasticsearch6-rhel8@sha256:fa8182b69328077500f89becc7621b48efa8d99f34247c2e6855dcfec13980e3_amd64",
"8Base-RHOL-5.4:openshift-logging/eventrouter-rhel8@sha256:4438a3bba34418a9dc566bf15f6b4764de4295ab8b05a7b1a86f9e8cd332b3f7_arm64",
"8Base-RHOL-5.4:openshift-logging/eventrouter-rhel8@sha256:bc408fc4b0482c5eb1b0deb3a9090f3e3dd9b370001d54cd076254562c72fec9_ppc64le",
"8Base-RHOL-5.4:openshift-logging/eventrouter-rhel8@sha256:d50a2b89442d04b1163c01b3a3951857a95df76c57b14e7f51d835c3ac6d75b3_amd64",
"8Base-RHOL-5.4:openshift-logging/eventrouter-rhel8@sha256:f05aee8433dec1c9f6cf835038f9e5a47847d4095383bf3c22ca57c3fb69fa98_s390x",
"8Base-RHOL-5.4:openshift-logging/fluentd-rhel8@sha256:150e17cb645cf2f4cb7ab592572dd3abd145d9a33e790778280e256666248022_amd64",
"8Base-RHOL-5.4:openshift-logging/fluentd-rhel8@sha256:36aecf05ca3cdaf29982b3efa4a1c97087be29b0a58c9777e6b0c11a34861aa8_s390x",
"8Base-RHOL-5.4:openshift-logging/fluentd-rhel8@sha256:e3a51d2bdc632b8376e28c33e9d4fac3464e3a84a313a17246b1f1cf21cb5710_arm64",
"8Base-RHOL-5.4:openshift-logging/fluentd-rhel8@sha256:ea07da04f06df6bf0d9dd981a3795dfdb51eca83f59a6291114650e3e98a9e71_ppc64le",
"8Base-RHOL-5.4:openshift-logging/kibana6-rhel8@sha256:167ee6a645c7397bde3d12e9b9685279505c25ffb3bda11ae68bdf0b34229f2e_amd64",
"8Base-RHOL-5.4:openshift-logging/kibana6-rhel8@sha256:4a029733337b10bb9fb8d98c91abc5451ca0b98713c8f2271a675251e025b6c0_s390x",
"8Base-RHOL-5.4:openshift-logging/kibana6-rhel8@sha256:812f4380024dc3df42310ad14d173d390f2bdf4b3dbdb02550c00552534f79ce_ppc64le",
"8Base-RHOL-5.4:openshift-logging/kibana6-rhel8@sha256:958ba6856cc76fc77d34a9c78888eb37b9c39b83a2f044ef2337610560ba9323_arm64",
"8Base-RHOL-5.4:openshift-logging/log-file-metric-exporter-rhel8@sha256:043e4d3481fbfedf3115e18fade3a2f33b891b0d9a641bf973c2c7f492cb0489_amd64",
"8Base-RHOL-5.4:openshift-logging/log-file-metric-exporter-rhel8@sha256:4fe26adac10cf20b83812e4fa513231d7e1fd4b6cd4e09d4fd425c391885cfcc_ppc64le",
"8Base-RHOL-5.4:openshift-logging/log-file-metric-exporter-rhel8@sha256:85827db708c0927027435b05732cc7e34b0675eaa86665c91efacc76aecd6227_s390x",
"8Base-RHOL-5.4:openshift-logging/log-file-metric-exporter-rhel8@sha256:a5285db276a5545fdbaa9f0743a49ba72ce1c5da61b5cccc9422320a03e08bea_arm64",
"8Base-RHOL-5.4:openshift-logging/logging-curator5-rhel8@sha256:0b28415b8115ff3216002faa5c9ecf3c46995085e3364c8028cb544cb4787ed2_arm64",
"8Base-RHOL-5.4:openshift-logging/logging-curator5-rhel8@sha256:7016e867ddfe970d6d2d54d5615e8f613786bcfbfe52ebf3139c07da3d5a53db_s390x",
"8Base-RHOL-5.4:openshift-logging/logging-curator5-rhel8@sha256:94c435f45e9dbd9fa633e137356cfb1d6ac2d4dd7574b359367665da42d6203d_amd64",
"8Base-RHOL-5.4:openshift-logging/logging-curator5-rhel8@sha256:d24afbc9228ef7f3d0a6fd716a3a57abde88a1f65d149c7df4f959a775b670bd_ppc64le",
"8Base-RHOL-5.4:openshift-logging/logging-loki-rhel8@sha256:40d4989b4733f54a01a73831fa00b12e49fff69c75138902eac0d894d432e4d9_arm64",
"8Base-RHOL-5.4:openshift-logging/logging-loki-rhel8@sha256:b444af35118c24bde0dfa2a8825ba427b3345451f6081133477254213a3460f0_amd64",
"8Base-RHOL-5.4:openshift-logging/logging-loki-rhel8@sha256:cfe410d498940a95da631ea213866a96a119034d78d5d53f7f9c7e8da56e0f45_s390x",
"8Base-RHOL-5.4:openshift-logging/logging-loki-rhel8@sha256:f7979c82140a0ab1a97c9f3151465bfbd9f79c4db9b0cc20f974cd7b890f074f_ppc64le",
"8Base-RHOL-5.4:openshift-logging/loki-operator-bundle@sha256:02cceda51028eb55a3b82aa5275f03dbaf8f8f9ab3fd27c650d1a07a93044e37_amd64",
"8Base-RHOL-5.4:openshift-logging/loki-rhel8-operator@sha256:0f1be625b4012820f7ac439fed000808d7acb4e885ace16014461bf802be935a_s390x",
"8Base-RHOL-5.4:openshift-logging/loki-rhel8-operator@sha256:28f45a80846c5e11638fb479be42cafcb2bdb3af94dff3629a820de295cbe31d_ppc64le",
"8Base-RHOL-5.4:openshift-logging/loki-rhel8-operator@sha256:df7de1e9f5a4396df6f14b1c4b6bb2a9ae4bc50d82cbc954ec535c26e8df2cb1_arm64",
"8Base-RHOL-5.4:openshift-logging/loki-rhel8-operator@sha256:f8a35557c9eb27f703ffa9320a9d39a2361d93fdb0b8c874d97da458048e7eec_amd64",
"8Base-RHOL-5.4:openshift-logging/lokistack-gateway-rhel8@sha256:178fcf44e6a1fa90d27a40565f69ae2880622b017bc8d9e33a441353eb45609d_arm64",
"8Base-RHOL-5.4:openshift-logging/lokistack-gateway-rhel8@sha256:7b0c2c99cf0f710166b749dbfd7f544caf5fe35516c743fca251c7cec896e1d6_ppc64le",
"8Base-RHOL-5.4:openshift-logging/lokistack-gateway-rhel8@sha256:9c4959525339b607a98889d56f4c26f2e4af25032466c439903a7f1cb593f721_s390x",
"8Base-RHOL-5.4:openshift-logging/lokistack-gateway-rhel8@sha256:a967d5be7d3a6fdd75965a5f9a7396a52cdcb37d6a8521c440b0b5c650c230f2_amd64",
"8Base-RHOL-5.4:openshift-logging/opa-openshift-rhel8@sha256:1b106af51bb50f1ce4db13ebbf6f6c67eae45611c0d5dc46476f1dfaa8aca166_arm64",
"8Base-RHOL-5.4:openshift-logging/opa-openshift-rhel8@sha256:92ddf24824c8f8ae93dec07184c446615b635389472d3a525df72da07c8d9b97_ppc64le",
"8Base-RHOL-5.4:openshift-logging/opa-openshift-rhel8@sha256:9fd0c5df785564b35392705a479d6fb9245e3329719438c76c0282f9ef2f2d55_amd64",
"8Base-RHOL-5.4:openshift-logging/opa-openshift-rhel8@sha256:be8ba0e4c5f24c7b4549700a25c89b10d4b2fc0b0e3888163bb53827914e95c1_s390x",
"8Base-RHOL-5.4:openshift-logging/vector-rhel8@sha256:48bb136d11b44428c87489978873370848ac2b219b107ef7e81ab679db095234_s390x",
"8Base-RHOL-5.4:openshift-logging/vector-rhel8@sha256:48f0317d167710ff5b0787c73f6b7dd0249e7c8d2d001159132a97299c30b62d_ppc64le",
"8Base-RHOL-5.4:openshift-logging/vector-rhel8@sha256:bde21c03fb831d01e85b28245881f7e3f2bb2ef6d2671eb92b2e0cc4bd3898e2_arm64",
"8Base-RHOL-5.4:openshift-logging/vector-rhel8@sha256:cc6b9c6a344aac56c99c96b5120ffe2dad479000b34964ff89d030ae762bda43_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-32149"
},
{
"category": "external",
"summary": "RHBZ#2134010",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2134010"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-32149",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32149"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-32149",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-32149"
},
{
"category": "external",
"summary": "https://go.dev/issue/56152",
"url": "https://go.dev/issue/56152"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-dev/c/qfPIly0X7aU",
"url": "https://groups.google.com/g/golang-dev/c/qfPIly0X7aU"
}
],
"release_date": "2022-10-11T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-11-16T12:13:01+00:00",
"details": "For OpenShift Container Platform 4.10 see the following documentation, which will be updated shortly, for detailed release notes:\n\nhttps://docs.openshift.com/container-platform/4.10/logging/cluster-logging-release-notes.html\n\nFor Red Hat OpenShift Logging 5.4, see the following instructions to apply this update:\n\nhttps://docs.openshift.com/container-platform/4.10/logging/cluster-logging-upgrading.html",
"product_ids": [
"8Base-RHOL-5.4:openshift-logging/elasticsearch-proxy-rhel8@sha256:4f4e5bb267ad391bc0fc6a010ec9ecdf3bf48d5b6e9db0d2510960c13c97bd71_ppc64le",
"8Base-RHOL-5.4:openshift-logging/elasticsearch-proxy-rhel8@sha256:b9c2e58b39dc3de97013f8806178f6327bf2e4590fe55db144527d64d468f64f_s390x",
"8Base-RHOL-5.4:openshift-logging/elasticsearch-proxy-rhel8@sha256:c9a2b9e7cca14d9596ccbe0f64e2abe4452f91f029f42eefead43c9f526f6a58_arm64",
"8Base-RHOL-5.4:openshift-logging/elasticsearch-proxy-rhel8@sha256:e38c55762c1eef39b401c46d44c899067b1566173e1ce239f17a95c52b30d8c7_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:7435"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"8Base-RHOL-5.4:openshift-logging/cluster-logging-operator-bundle@sha256:cb26d9e55f781dd535901a90f1ec2f8e02e8e1de72c0fde638c90fcc228ec4b2_amd64",
"8Base-RHOL-5.4:openshift-logging/cluster-logging-rhel8-operator@sha256:617cc8b0011110981674b75fe1e3041bfa434c952e4a0193818b971edbc7a480_s390x",
"8Base-RHOL-5.4:openshift-logging/cluster-logging-rhel8-operator@sha256:637df49756fe85e7b38b279ffa7672d72c658d3d47df7f9dada2dd70563af83b_arm64",
"8Base-RHOL-5.4:openshift-logging/cluster-logging-rhel8-operator@sha256:aa1602fe2abe23bd8a4c791bc45d425686a6e6d1aab4face0fac28bfc7cebbe1_ppc64le",
"8Base-RHOL-5.4:openshift-logging/cluster-logging-rhel8-operator@sha256:c698b52c46d41007e5ac4f90b9540d430820bd20a93468fddd3a949c7ef5b332_amd64",
"8Base-RHOL-5.4:openshift-logging/elasticsearch-operator-bundle@sha256:7659606e0418a1920161b7ca67524ea6a7b1ed366b817f1a5cde0b346152243c_amd64",
"8Base-RHOL-5.4:openshift-logging/elasticsearch-proxy-rhel8@sha256:4f4e5bb267ad391bc0fc6a010ec9ecdf3bf48d5b6e9db0d2510960c13c97bd71_ppc64le",
"8Base-RHOL-5.4:openshift-logging/elasticsearch-proxy-rhel8@sha256:b9c2e58b39dc3de97013f8806178f6327bf2e4590fe55db144527d64d468f64f_s390x",
"8Base-RHOL-5.4:openshift-logging/elasticsearch-proxy-rhel8@sha256:c9a2b9e7cca14d9596ccbe0f64e2abe4452f91f029f42eefead43c9f526f6a58_arm64",
"8Base-RHOL-5.4:openshift-logging/elasticsearch-proxy-rhel8@sha256:e38c55762c1eef39b401c46d44c899067b1566173e1ce239f17a95c52b30d8c7_amd64",
"8Base-RHOL-5.4:openshift-logging/elasticsearch-rhel8-operator@sha256:2005f41e59a130bb86c2ec47d1b060e3e2ed32f9a4cef3897e2c05fc94043dbb_arm64",
"8Base-RHOL-5.4:openshift-logging/elasticsearch-rhel8-operator@sha256:6a55934cf7af0c03e06d4ec7a15a80acf53491fb7a183c16fdf8018fbf9b4174_ppc64le",
"8Base-RHOL-5.4:openshift-logging/elasticsearch-rhel8-operator@sha256:8ce04536772f31ad022b9c66cddc090d2962b44d66c06a1db56d1447be198326_amd64",
"8Base-RHOL-5.4:openshift-logging/elasticsearch-rhel8-operator@sha256:dd211d42eaad043d9bdb519e3ad6a86255b7280a2cdf47dd3fe0458a77cb110f_s390x",
"8Base-RHOL-5.4:openshift-logging/elasticsearch6-rhel8@sha256:17a9f3ae042b92693a374e3d60a07f2ab2e52419f8df25d446dd0654f6a858f6_ppc64le",
"8Base-RHOL-5.4:openshift-logging/elasticsearch6-rhel8@sha256:5b1cfc2f9a96601439cf17d1fe49a6bc6cad3b7273af87b23528090aefbfd915_s390x",
"8Base-RHOL-5.4:openshift-logging/elasticsearch6-rhel8@sha256:8e0ba10f91db4cb8786d0501ec33a3d54f7c7c5337e0495cc2286a6ea20cca20_arm64",
"8Base-RHOL-5.4:openshift-logging/elasticsearch6-rhel8@sha256:fa8182b69328077500f89becc7621b48efa8d99f34247c2e6855dcfec13980e3_amd64",
"8Base-RHOL-5.4:openshift-logging/eventrouter-rhel8@sha256:4438a3bba34418a9dc566bf15f6b4764de4295ab8b05a7b1a86f9e8cd332b3f7_arm64",
"8Base-RHOL-5.4:openshift-logging/eventrouter-rhel8@sha256:bc408fc4b0482c5eb1b0deb3a9090f3e3dd9b370001d54cd076254562c72fec9_ppc64le",
"8Base-RHOL-5.4:openshift-logging/eventrouter-rhel8@sha256:d50a2b89442d04b1163c01b3a3951857a95df76c57b14e7f51d835c3ac6d75b3_amd64",
"8Base-RHOL-5.4:openshift-logging/eventrouter-rhel8@sha256:f05aee8433dec1c9f6cf835038f9e5a47847d4095383bf3c22ca57c3fb69fa98_s390x",
"8Base-RHOL-5.4:openshift-logging/fluentd-rhel8@sha256:150e17cb645cf2f4cb7ab592572dd3abd145d9a33e790778280e256666248022_amd64",
"8Base-RHOL-5.4:openshift-logging/fluentd-rhel8@sha256:36aecf05ca3cdaf29982b3efa4a1c97087be29b0a58c9777e6b0c11a34861aa8_s390x",
"8Base-RHOL-5.4:openshift-logging/fluentd-rhel8@sha256:e3a51d2bdc632b8376e28c33e9d4fac3464e3a84a313a17246b1f1cf21cb5710_arm64",
"8Base-RHOL-5.4:openshift-logging/fluentd-rhel8@sha256:ea07da04f06df6bf0d9dd981a3795dfdb51eca83f59a6291114650e3e98a9e71_ppc64le",
"8Base-RHOL-5.4:openshift-logging/kibana6-rhel8@sha256:167ee6a645c7397bde3d12e9b9685279505c25ffb3bda11ae68bdf0b34229f2e_amd64",
"8Base-RHOL-5.4:openshift-logging/kibana6-rhel8@sha256:4a029733337b10bb9fb8d98c91abc5451ca0b98713c8f2271a675251e025b6c0_s390x",
"8Base-RHOL-5.4:openshift-logging/kibana6-rhel8@sha256:812f4380024dc3df42310ad14d173d390f2bdf4b3dbdb02550c00552534f79ce_ppc64le",
"8Base-RHOL-5.4:openshift-logging/kibana6-rhel8@sha256:958ba6856cc76fc77d34a9c78888eb37b9c39b83a2f044ef2337610560ba9323_arm64",
"8Base-RHOL-5.4:openshift-logging/log-file-metric-exporter-rhel8@sha256:043e4d3481fbfedf3115e18fade3a2f33b891b0d9a641bf973c2c7f492cb0489_amd64",
"8Base-RHOL-5.4:openshift-logging/log-file-metric-exporter-rhel8@sha256:4fe26adac10cf20b83812e4fa513231d7e1fd4b6cd4e09d4fd425c391885cfcc_ppc64le",
"8Base-RHOL-5.4:openshift-logging/log-file-metric-exporter-rhel8@sha256:85827db708c0927027435b05732cc7e34b0675eaa86665c91efacc76aecd6227_s390x",
"8Base-RHOL-5.4:openshift-logging/log-file-metric-exporter-rhel8@sha256:a5285db276a5545fdbaa9f0743a49ba72ce1c5da61b5cccc9422320a03e08bea_arm64",
"8Base-RHOL-5.4:openshift-logging/logging-curator5-rhel8@sha256:0b28415b8115ff3216002faa5c9ecf3c46995085e3364c8028cb544cb4787ed2_arm64",
"8Base-RHOL-5.4:openshift-logging/logging-curator5-rhel8@sha256:7016e867ddfe970d6d2d54d5615e8f613786bcfbfe52ebf3139c07da3d5a53db_s390x",
"8Base-RHOL-5.4:openshift-logging/logging-curator5-rhel8@sha256:94c435f45e9dbd9fa633e137356cfb1d6ac2d4dd7574b359367665da42d6203d_amd64",
"8Base-RHOL-5.4:openshift-logging/logging-curator5-rhel8@sha256:d24afbc9228ef7f3d0a6fd716a3a57abde88a1f65d149c7df4f959a775b670bd_ppc64le",
"8Base-RHOL-5.4:openshift-logging/logging-loki-rhel8@sha256:40d4989b4733f54a01a73831fa00b12e49fff69c75138902eac0d894d432e4d9_arm64",
"8Base-RHOL-5.4:openshift-logging/logging-loki-rhel8@sha256:b444af35118c24bde0dfa2a8825ba427b3345451f6081133477254213a3460f0_amd64",
"8Base-RHOL-5.4:openshift-logging/logging-loki-rhel8@sha256:cfe410d498940a95da631ea213866a96a119034d78d5d53f7f9c7e8da56e0f45_s390x",
"8Base-RHOL-5.4:openshift-logging/logging-loki-rhel8@sha256:f7979c82140a0ab1a97c9f3151465bfbd9f79c4db9b0cc20f974cd7b890f074f_ppc64le",
"8Base-RHOL-5.4:openshift-logging/loki-operator-bundle@sha256:02cceda51028eb55a3b82aa5275f03dbaf8f8f9ab3fd27c650d1a07a93044e37_amd64",
"8Base-RHOL-5.4:openshift-logging/loki-rhel8-operator@sha256:0f1be625b4012820f7ac439fed000808d7acb4e885ace16014461bf802be935a_s390x",
"8Base-RHOL-5.4:openshift-logging/loki-rhel8-operator@sha256:28f45a80846c5e11638fb479be42cafcb2bdb3af94dff3629a820de295cbe31d_ppc64le",
"8Base-RHOL-5.4:openshift-logging/loki-rhel8-operator@sha256:df7de1e9f5a4396df6f14b1c4b6bb2a9ae4bc50d82cbc954ec535c26e8df2cb1_arm64",
"8Base-RHOL-5.4:openshift-logging/loki-rhel8-operator@sha256:f8a35557c9eb27f703ffa9320a9d39a2361d93fdb0b8c874d97da458048e7eec_amd64",
"8Base-RHOL-5.4:openshift-logging/lokistack-gateway-rhel8@sha256:178fcf44e6a1fa90d27a40565f69ae2880622b017bc8d9e33a441353eb45609d_arm64",
"8Base-RHOL-5.4:openshift-logging/lokistack-gateway-rhel8@sha256:7b0c2c99cf0f710166b749dbfd7f544caf5fe35516c743fca251c7cec896e1d6_ppc64le",
"8Base-RHOL-5.4:openshift-logging/lokistack-gateway-rhel8@sha256:9c4959525339b607a98889d56f4c26f2e4af25032466c439903a7f1cb593f721_s390x",
"8Base-RHOL-5.4:openshift-logging/lokistack-gateway-rhel8@sha256:a967d5be7d3a6fdd75965a5f9a7396a52cdcb37d6a8521c440b0b5c650c230f2_amd64",
"8Base-RHOL-5.4:openshift-logging/opa-openshift-rhel8@sha256:1b106af51bb50f1ce4db13ebbf6f6c67eae45611c0d5dc46476f1dfaa8aca166_arm64",
"8Base-RHOL-5.4:openshift-logging/opa-openshift-rhel8@sha256:92ddf24824c8f8ae93dec07184c446615b635389472d3a525df72da07c8d9b97_ppc64le",
"8Base-RHOL-5.4:openshift-logging/opa-openshift-rhel8@sha256:9fd0c5df785564b35392705a479d6fb9245e3329719438c76c0282f9ef2f2d55_amd64",
"8Base-RHOL-5.4:openshift-logging/opa-openshift-rhel8@sha256:be8ba0e4c5f24c7b4549700a25c89b10d4b2fc0b0e3888163bb53827914e95c1_s390x",
"8Base-RHOL-5.4:openshift-logging/vector-rhel8@sha256:48bb136d11b44428c87489978873370848ac2b219b107ef7e81ab679db095234_s390x",
"8Base-RHOL-5.4:openshift-logging/vector-rhel8@sha256:48f0317d167710ff5b0787c73f6b7dd0249e7c8d2d001159132a97299c30b62d_ppc64le",
"8Base-RHOL-5.4:openshift-logging/vector-rhel8@sha256:bde21c03fb831d01e85b28245881f7e3f2bb2ef6d2671eb92b2e0cc4bd3898e2_arm64",
"8Base-RHOL-5.4:openshift-logging/vector-rhel8@sha256:cc6b9c6a344aac56c99c96b5120ffe2dad479000b34964ff89d030ae762bda43_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "golang: golang.org/x/text/language: ParseAcceptLanguage takes a long time to parse complex tags"
},
{
"cve": "CVE-2022-42003",
"cwe": {
"id": "CWE-502",
"name": "Deserialization of Untrusted Data"
},
"discovery_date": "2022-10-17T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-RHOL-5.4:openshift-logging/cluster-logging-operator-bundle@sha256:cb26d9e55f781dd535901a90f1ec2f8e02e8e1de72c0fde638c90fcc228ec4b2_amd64",
"8Base-RHOL-5.4:openshift-logging/cluster-logging-rhel8-operator@sha256:617cc8b0011110981674b75fe1e3041bfa434c952e4a0193818b971edbc7a480_s390x",
"8Base-RHOL-5.4:openshift-logging/cluster-logging-rhel8-operator@sha256:637df49756fe85e7b38b279ffa7672d72c658d3d47df7f9dada2dd70563af83b_arm64",
"8Base-RHOL-5.4:openshift-logging/cluster-logging-rhel8-operator@sha256:aa1602fe2abe23bd8a4c791bc45d425686a6e6d1aab4face0fac28bfc7cebbe1_ppc64le",
"8Base-RHOL-5.4:openshift-logging/cluster-logging-rhel8-operator@sha256:c698b52c46d41007e5ac4f90b9540d430820bd20a93468fddd3a949c7ef5b332_amd64",
"8Base-RHOL-5.4:openshift-logging/eventrouter-rhel8@sha256:4438a3bba34418a9dc566bf15f6b4764de4295ab8b05a7b1a86f9e8cd332b3f7_arm64",
"8Base-RHOL-5.4:openshift-logging/eventrouter-rhel8@sha256:bc408fc4b0482c5eb1b0deb3a9090f3e3dd9b370001d54cd076254562c72fec9_ppc64le",
"8Base-RHOL-5.4:openshift-logging/eventrouter-rhel8@sha256:d50a2b89442d04b1163c01b3a3951857a95df76c57b14e7f51d835c3ac6d75b3_amd64",
"8Base-RHOL-5.4:openshift-logging/eventrouter-rhel8@sha256:f05aee8433dec1c9f6cf835038f9e5a47847d4095383bf3c22ca57c3fb69fa98_s390x",
"8Base-RHOL-5.4:openshift-logging/fluentd-rhel8@sha256:150e17cb645cf2f4cb7ab592572dd3abd145d9a33e790778280e256666248022_amd64",
"8Base-RHOL-5.4:openshift-logging/fluentd-rhel8@sha256:36aecf05ca3cdaf29982b3efa4a1c97087be29b0a58c9777e6b0c11a34861aa8_s390x",
"8Base-RHOL-5.4:openshift-logging/fluentd-rhel8@sha256:e3a51d2bdc632b8376e28c33e9d4fac3464e3a84a313a17246b1f1cf21cb5710_arm64",
"8Base-RHOL-5.4:openshift-logging/fluentd-rhel8@sha256:ea07da04f06df6bf0d9dd981a3795dfdb51eca83f59a6291114650e3e98a9e71_ppc64le",
"8Base-RHOL-5.4:openshift-logging/kibana6-rhel8@sha256:167ee6a645c7397bde3d12e9b9685279505c25ffb3bda11ae68bdf0b34229f2e_amd64",
"8Base-RHOL-5.4:openshift-logging/kibana6-rhel8@sha256:4a029733337b10bb9fb8d98c91abc5451ca0b98713c8f2271a675251e025b6c0_s390x",
"8Base-RHOL-5.4:openshift-logging/kibana6-rhel8@sha256:812f4380024dc3df42310ad14d173d390f2bdf4b3dbdb02550c00552534f79ce_ppc64le",
"8Base-RHOL-5.4:openshift-logging/kibana6-rhel8@sha256:958ba6856cc76fc77d34a9c78888eb37b9c39b83a2f044ef2337610560ba9323_arm64",
"8Base-RHOL-5.4:openshift-logging/log-file-metric-exporter-rhel8@sha256:043e4d3481fbfedf3115e18fade3a2f33b891b0d9a641bf973c2c7f492cb0489_amd64",
"8Base-RHOL-5.4:openshift-logging/log-file-metric-exporter-rhel8@sha256:4fe26adac10cf20b83812e4fa513231d7e1fd4b6cd4e09d4fd425c391885cfcc_ppc64le",
"8Base-RHOL-5.4:openshift-logging/log-file-metric-exporter-rhel8@sha256:85827db708c0927027435b05732cc7e34b0675eaa86665c91efacc76aecd6227_s390x",
"8Base-RHOL-5.4:openshift-logging/log-file-metric-exporter-rhel8@sha256:a5285db276a5545fdbaa9f0743a49ba72ce1c5da61b5cccc9422320a03e08bea_arm64",
"8Base-RHOL-5.4:openshift-logging/logging-curator5-rhel8@sha256:0b28415b8115ff3216002faa5c9ecf3c46995085e3364c8028cb544cb4787ed2_arm64",
"8Base-RHOL-5.4:openshift-logging/logging-curator5-rhel8@sha256:7016e867ddfe970d6d2d54d5615e8f613786bcfbfe52ebf3139c07da3d5a53db_s390x",
"8Base-RHOL-5.4:openshift-logging/logging-curator5-rhel8@sha256:94c435f45e9dbd9fa633e137356cfb1d6ac2d4dd7574b359367665da42d6203d_amd64",
"8Base-RHOL-5.4:openshift-logging/logging-curator5-rhel8@sha256:d24afbc9228ef7f3d0a6fd716a3a57abde88a1f65d149c7df4f959a775b670bd_ppc64le",
"8Base-RHOL-5.4:openshift-logging/logging-loki-rhel8@sha256:40d4989b4733f54a01a73831fa00b12e49fff69c75138902eac0d894d432e4d9_arm64",
"8Base-RHOL-5.4:openshift-logging/logging-loki-rhel8@sha256:b444af35118c24bde0dfa2a8825ba427b3345451f6081133477254213a3460f0_amd64",
"8Base-RHOL-5.4:openshift-logging/logging-loki-rhel8@sha256:cfe410d498940a95da631ea213866a96a119034d78d5d53f7f9c7e8da56e0f45_s390x",
"8Base-RHOL-5.4:openshift-logging/logging-loki-rhel8@sha256:f7979c82140a0ab1a97c9f3151465bfbd9f79c4db9b0cc20f974cd7b890f074f_ppc64le",
"8Base-RHOL-5.4:openshift-logging/loki-operator-bundle@sha256:02cceda51028eb55a3b82aa5275f03dbaf8f8f9ab3fd27c650d1a07a93044e37_amd64",
"8Base-RHOL-5.4:openshift-logging/loki-rhel8-operator@sha256:0f1be625b4012820f7ac439fed000808d7acb4e885ace16014461bf802be935a_s390x",
"8Base-RHOL-5.4:openshift-logging/loki-rhel8-operator@sha256:28f45a80846c5e11638fb479be42cafcb2bdb3af94dff3629a820de295cbe31d_ppc64le",
"8Base-RHOL-5.4:openshift-logging/loki-rhel8-operator@sha256:df7de1e9f5a4396df6f14b1c4b6bb2a9ae4bc50d82cbc954ec535c26e8df2cb1_arm64",
"8Base-RHOL-5.4:openshift-logging/loki-rhel8-operator@sha256:f8a35557c9eb27f703ffa9320a9d39a2361d93fdb0b8c874d97da458048e7eec_amd64",
"8Base-RHOL-5.4:openshift-logging/lokistack-gateway-rhel8@sha256:178fcf44e6a1fa90d27a40565f69ae2880622b017bc8d9e33a441353eb45609d_arm64",
"8Base-RHOL-5.4:openshift-logging/lokistack-gateway-rhel8@sha256:7b0c2c99cf0f710166b749dbfd7f544caf5fe35516c743fca251c7cec896e1d6_ppc64le",
"8Base-RHOL-5.4:openshift-logging/lokistack-gateway-rhel8@sha256:9c4959525339b607a98889d56f4c26f2e4af25032466c439903a7f1cb593f721_s390x",
"8Base-RHOL-5.4:openshift-logging/lokistack-gateway-rhel8@sha256:a967d5be7d3a6fdd75965a5f9a7396a52cdcb37d6a8521c440b0b5c650c230f2_amd64",
"8Base-RHOL-5.4:openshift-logging/opa-openshift-rhel8@sha256:1b106af51bb50f1ce4db13ebbf6f6c67eae45611c0d5dc46476f1dfaa8aca166_arm64",
"8Base-RHOL-5.4:openshift-logging/opa-openshift-rhel8@sha256:92ddf24824c8f8ae93dec07184c446615b635389472d3a525df72da07c8d9b97_ppc64le",
"8Base-RHOL-5.4:openshift-logging/opa-openshift-rhel8@sha256:9fd0c5df785564b35392705a479d6fb9245e3329719438c76c0282f9ef2f2d55_amd64",
"8Base-RHOL-5.4:openshift-logging/opa-openshift-rhel8@sha256:be8ba0e4c5f24c7b4549700a25c89b10d4b2fc0b0e3888163bb53827914e95c1_s390x",
"8Base-RHOL-5.4:openshift-logging/vector-rhel8@sha256:48bb136d11b44428c87489978873370848ac2b219b107ef7e81ab679db095234_s390x",
"8Base-RHOL-5.4:openshift-logging/vector-rhel8@sha256:48f0317d167710ff5b0787c73f6b7dd0249e7c8d2d001159132a97299c30b62d_ppc64le",
"8Base-RHOL-5.4:openshift-logging/vector-rhel8@sha256:bde21c03fb831d01e85b28245881f7e3f2bb2ef6d2671eb92b2e0cc4bd3898e2_arm64",
"8Base-RHOL-5.4:openshift-logging/vector-rhel8@sha256:cc6b9c6a344aac56c99c96b5120ffe2dad479000b34964ff89d030ae762bda43_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2135244"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in FasterXML jackson-databind. This issue could allow an attacker to benefit from resource exhaustion when the UNWRAP_SINGLE_VALUE_ARRAYS feature is enabled due to unchecked primitive value deserializers to avoid deep wrapper array nesting.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "jackson-databind: deep wrapper array nesting wrt UNWRAP_SINGLE_VALUE_ARRAYS",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-RHOL-5.4:openshift-logging/elasticsearch-operator-bundle@sha256:7659606e0418a1920161b7ca67524ea6a7b1ed366b817f1a5cde0b346152243c_amd64",
"8Base-RHOL-5.4:openshift-logging/elasticsearch-proxy-rhel8@sha256:4f4e5bb267ad391bc0fc6a010ec9ecdf3bf48d5b6e9db0d2510960c13c97bd71_ppc64le",
"8Base-RHOL-5.4:openshift-logging/elasticsearch-proxy-rhel8@sha256:b9c2e58b39dc3de97013f8806178f6327bf2e4590fe55db144527d64d468f64f_s390x",
"8Base-RHOL-5.4:openshift-logging/elasticsearch-proxy-rhel8@sha256:c9a2b9e7cca14d9596ccbe0f64e2abe4452f91f029f42eefead43c9f526f6a58_arm64",
"8Base-RHOL-5.4:openshift-logging/elasticsearch-proxy-rhel8@sha256:e38c55762c1eef39b401c46d44c899067b1566173e1ce239f17a95c52b30d8c7_amd64",
"8Base-RHOL-5.4:openshift-logging/elasticsearch-rhel8-operator@sha256:2005f41e59a130bb86c2ec47d1b060e3e2ed32f9a4cef3897e2c05fc94043dbb_arm64",
"8Base-RHOL-5.4:openshift-logging/elasticsearch-rhel8-operator@sha256:6a55934cf7af0c03e06d4ec7a15a80acf53491fb7a183c16fdf8018fbf9b4174_ppc64le",
"8Base-RHOL-5.4:openshift-logging/elasticsearch-rhel8-operator@sha256:8ce04536772f31ad022b9c66cddc090d2962b44d66c06a1db56d1447be198326_amd64",
"8Base-RHOL-5.4:openshift-logging/elasticsearch-rhel8-operator@sha256:dd211d42eaad043d9bdb519e3ad6a86255b7280a2cdf47dd3fe0458a77cb110f_s390x",
"8Base-RHOL-5.4:openshift-logging/elasticsearch6-rhel8@sha256:17a9f3ae042b92693a374e3d60a07f2ab2e52419f8df25d446dd0654f6a858f6_ppc64le",
"8Base-RHOL-5.4:openshift-logging/elasticsearch6-rhel8@sha256:5b1cfc2f9a96601439cf17d1fe49a6bc6cad3b7273af87b23528090aefbfd915_s390x",
"8Base-RHOL-5.4:openshift-logging/elasticsearch6-rhel8@sha256:8e0ba10f91db4cb8786d0501ec33a3d54f7c7c5337e0495cc2286a6ea20cca20_arm64",
"8Base-RHOL-5.4:openshift-logging/elasticsearch6-rhel8@sha256:fa8182b69328077500f89becc7621b48efa8d99f34247c2e6855dcfec13980e3_amd64"
],
"known_not_affected": [
"8Base-RHOL-5.4:openshift-logging/cluster-logging-operator-bundle@sha256:cb26d9e55f781dd535901a90f1ec2f8e02e8e1de72c0fde638c90fcc228ec4b2_amd64",
"8Base-RHOL-5.4:openshift-logging/cluster-logging-rhel8-operator@sha256:617cc8b0011110981674b75fe1e3041bfa434c952e4a0193818b971edbc7a480_s390x",
"8Base-RHOL-5.4:openshift-logging/cluster-logging-rhel8-operator@sha256:637df49756fe85e7b38b279ffa7672d72c658d3d47df7f9dada2dd70563af83b_arm64",
"8Base-RHOL-5.4:openshift-logging/cluster-logging-rhel8-operator@sha256:aa1602fe2abe23bd8a4c791bc45d425686a6e6d1aab4face0fac28bfc7cebbe1_ppc64le",
"8Base-RHOL-5.4:openshift-logging/cluster-logging-rhel8-operator@sha256:c698b52c46d41007e5ac4f90b9540d430820bd20a93468fddd3a949c7ef5b332_amd64",
"8Base-RHOL-5.4:openshift-logging/eventrouter-rhel8@sha256:4438a3bba34418a9dc566bf15f6b4764de4295ab8b05a7b1a86f9e8cd332b3f7_arm64",
"8Base-RHOL-5.4:openshift-logging/eventrouter-rhel8@sha256:bc408fc4b0482c5eb1b0deb3a9090f3e3dd9b370001d54cd076254562c72fec9_ppc64le",
"8Base-RHOL-5.4:openshift-logging/eventrouter-rhel8@sha256:d50a2b89442d04b1163c01b3a3951857a95df76c57b14e7f51d835c3ac6d75b3_amd64",
"8Base-RHOL-5.4:openshift-logging/eventrouter-rhel8@sha256:f05aee8433dec1c9f6cf835038f9e5a47847d4095383bf3c22ca57c3fb69fa98_s390x",
"8Base-RHOL-5.4:openshift-logging/fluentd-rhel8@sha256:150e17cb645cf2f4cb7ab592572dd3abd145d9a33e790778280e256666248022_amd64",
"8Base-RHOL-5.4:openshift-logging/fluentd-rhel8@sha256:36aecf05ca3cdaf29982b3efa4a1c97087be29b0a58c9777e6b0c11a34861aa8_s390x",
"8Base-RHOL-5.4:openshift-logging/fluentd-rhel8@sha256:e3a51d2bdc632b8376e28c33e9d4fac3464e3a84a313a17246b1f1cf21cb5710_arm64",
"8Base-RHOL-5.4:openshift-logging/fluentd-rhel8@sha256:ea07da04f06df6bf0d9dd981a3795dfdb51eca83f59a6291114650e3e98a9e71_ppc64le",
"8Base-RHOL-5.4:openshift-logging/kibana6-rhel8@sha256:167ee6a645c7397bde3d12e9b9685279505c25ffb3bda11ae68bdf0b34229f2e_amd64",
"8Base-RHOL-5.4:openshift-logging/kibana6-rhel8@sha256:4a029733337b10bb9fb8d98c91abc5451ca0b98713c8f2271a675251e025b6c0_s390x",
"8Base-RHOL-5.4:openshift-logging/kibana6-rhel8@sha256:812f4380024dc3df42310ad14d173d390f2bdf4b3dbdb02550c00552534f79ce_ppc64le",
"8Base-RHOL-5.4:openshift-logging/kibana6-rhel8@sha256:958ba6856cc76fc77d34a9c78888eb37b9c39b83a2f044ef2337610560ba9323_arm64",
"8Base-RHOL-5.4:openshift-logging/log-file-metric-exporter-rhel8@sha256:043e4d3481fbfedf3115e18fade3a2f33b891b0d9a641bf973c2c7f492cb0489_amd64",
"8Base-RHOL-5.4:openshift-logging/log-file-metric-exporter-rhel8@sha256:4fe26adac10cf20b83812e4fa513231d7e1fd4b6cd4e09d4fd425c391885cfcc_ppc64le",
"8Base-RHOL-5.4:openshift-logging/log-file-metric-exporter-rhel8@sha256:85827db708c0927027435b05732cc7e34b0675eaa86665c91efacc76aecd6227_s390x",
"8Base-RHOL-5.4:openshift-logging/log-file-metric-exporter-rhel8@sha256:a5285db276a5545fdbaa9f0743a49ba72ce1c5da61b5cccc9422320a03e08bea_arm64",
"8Base-RHOL-5.4:openshift-logging/logging-curator5-rhel8@sha256:0b28415b8115ff3216002faa5c9ecf3c46995085e3364c8028cb544cb4787ed2_arm64",
"8Base-RHOL-5.4:openshift-logging/logging-curator5-rhel8@sha256:7016e867ddfe970d6d2d54d5615e8f613786bcfbfe52ebf3139c07da3d5a53db_s390x",
"8Base-RHOL-5.4:openshift-logging/logging-curator5-rhel8@sha256:94c435f45e9dbd9fa633e137356cfb1d6ac2d4dd7574b359367665da42d6203d_amd64",
"8Base-RHOL-5.4:openshift-logging/logging-curator5-rhel8@sha256:d24afbc9228ef7f3d0a6fd716a3a57abde88a1f65d149c7df4f959a775b670bd_ppc64le",
"8Base-RHOL-5.4:openshift-logging/logging-loki-rhel8@sha256:40d4989b4733f54a01a73831fa00b12e49fff69c75138902eac0d894d432e4d9_arm64",
"8Base-RHOL-5.4:openshift-logging/logging-loki-rhel8@sha256:b444af35118c24bde0dfa2a8825ba427b3345451f6081133477254213a3460f0_amd64",
"8Base-RHOL-5.4:openshift-logging/logging-loki-rhel8@sha256:cfe410d498940a95da631ea213866a96a119034d78d5d53f7f9c7e8da56e0f45_s390x",
"8Base-RHOL-5.4:openshift-logging/logging-loki-rhel8@sha256:f7979c82140a0ab1a97c9f3151465bfbd9f79c4db9b0cc20f974cd7b890f074f_ppc64le",
"8Base-RHOL-5.4:openshift-logging/loki-operator-bundle@sha256:02cceda51028eb55a3b82aa5275f03dbaf8f8f9ab3fd27c650d1a07a93044e37_amd64",
"8Base-RHOL-5.4:openshift-logging/loki-rhel8-operator@sha256:0f1be625b4012820f7ac439fed000808d7acb4e885ace16014461bf802be935a_s390x",
"8Base-RHOL-5.4:openshift-logging/loki-rhel8-operator@sha256:28f45a80846c5e11638fb479be42cafcb2bdb3af94dff3629a820de295cbe31d_ppc64le",
"8Base-RHOL-5.4:openshift-logging/loki-rhel8-operator@sha256:df7de1e9f5a4396df6f14b1c4b6bb2a9ae4bc50d82cbc954ec535c26e8df2cb1_arm64",
"8Base-RHOL-5.4:openshift-logging/loki-rhel8-operator@sha256:f8a35557c9eb27f703ffa9320a9d39a2361d93fdb0b8c874d97da458048e7eec_amd64",
"8Base-RHOL-5.4:openshift-logging/lokistack-gateway-rhel8@sha256:178fcf44e6a1fa90d27a40565f69ae2880622b017bc8d9e33a441353eb45609d_arm64",
"8Base-RHOL-5.4:openshift-logging/lokistack-gateway-rhel8@sha256:7b0c2c99cf0f710166b749dbfd7f544caf5fe35516c743fca251c7cec896e1d6_ppc64le",
"8Base-RHOL-5.4:openshift-logging/lokistack-gateway-rhel8@sha256:9c4959525339b607a98889d56f4c26f2e4af25032466c439903a7f1cb593f721_s390x",
"8Base-RHOL-5.4:openshift-logging/lokistack-gateway-rhel8@sha256:a967d5be7d3a6fdd75965a5f9a7396a52cdcb37d6a8521c440b0b5c650c230f2_amd64",
"8Base-RHOL-5.4:openshift-logging/opa-openshift-rhel8@sha256:1b106af51bb50f1ce4db13ebbf6f6c67eae45611c0d5dc46476f1dfaa8aca166_arm64",
"8Base-RHOL-5.4:openshift-logging/opa-openshift-rhel8@sha256:92ddf24824c8f8ae93dec07184c446615b635389472d3a525df72da07c8d9b97_ppc64le",
"8Base-RHOL-5.4:openshift-logging/opa-openshift-rhel8@sha256:9fd0c5df785564b35392705a479d6fb9245e3329719438c76c0282f9ef2f2d55_amd64",
"8Base-RHOL-5.4:openshift-logging/opa-openshift-rhel8@sha256:be8ba0e4c5f24c7b4549700a25c89b10d4b2fc0b0e3888163bb53827914e95c1_s390x",
"8Base-RHOL-5.4:openshift-logging/vector-rhel8@sha256:48bb136d11b44428c87489978873370848ac2b219b107ef7e81ab679db095234_s390x",
"8Base-RHOL-5.4:openshift-logging/vector-rhel8@sha256:48f0317d167710ff5b0787c73f6b7dd0249e7c8d2d001159132a97299c30b62d_ppc64le",
"8Base-RHOL-5.4:openshift-logging/vector-rhel8@sha256:bde21c03fb831d01e85b28245881f7e3f2bb2ef6d2671eb92b2e0cc4bd3898e2_arm64",
"8Base-RHOL-5.4:openshift-logging/vector-rhel8@sha256:cc6b9c6a344aac56c99c96b5120ffe2dad479000b34964ff89d030ae762bda43_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-42003"
},
{
"category": "external",
"summary": "RHBZ#2135244",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2135244"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-42003",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42003"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-42003",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-42003"
}
],
"release_date": "2022-10-02T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-11-16T12:13:01+00:00",
"details": "For OpenShift Container Platform 4.10 see the following documentation, which will be updated shortly, for detailed release notes:\n\nhttps://docs.openshift.com/container-platform/4.10/logging/cluster-logging-release-notes.html\n\nFor Red Hat OpenShift Logging 5.4, see the following instructions to apply this update:\n\nhttps://docs.openshift.com/container-platform/4.10/logging/cluster-logging-upgrading.html",
"product_ids": [
"8Base-RHOL-5.4:openshift-logging/elasticsearch-operator-bundle@sha256:7659606e0418a1920161b7ca67524ea6a7b1ed366b817f1a5cde0b346152243c_amd64",
"8Base-RHOL-5.4:openshift-logging/elasticsearch-proxy-rhel8@sha256:4f4e5bb267ad391bc0fc6a010ec9ecdf3bf48d5b6e9db0d2510960c13c97bd71_ppc64le",
"8Base-RHOL-5.4:openshift-logging/elasticsearch-proxy-rhel8@sha256:b9c2e58b39dc3de97013f8806178f6327bf2e4590fe55db144527d64d468f64f_s390x",
"8Base-RHOL-5.4:openshift-logging/elasticsearch-proxy-rhel8@sha256:c9a2b9e7cca14d9596ccbe0f64e2abe4452f91f029f42eefead43c9f526f6a58_arm64",
"8Base-RHOL-5.4:openshift-logging/elasticsearch-proxy-rhel8@sha256:e38c55762c1eef39b401c46d44c899067b1566173e1ce239f17a95c52b30d8c7_amd64",
"8Base-RHOL-5.4:openshift-logging/elasticsearch-rhel8-operator@sha256:2005f41e59a130bb86c2ec47d1b060e3e2ed32f9a4cef3897e2c05fc94043dbb_arm64",
"8Base-RHOL-5.4:openshift-logging/elasticsearch-rhel8-operator@sha256:6a55934cf7af0c03e06d4ec7a15a80acf53491fb7a183c16fdf8018fbf9b4174_ppc64le",
"8Base-RHOL-5.4:openshift-logging/elasticsearch-rhel8-operator@sha256:8ce04536772f31ad022b9c66cddc090d2962b44d66c06a1db56d1447be198326_amd64",
"8Base-RHOL-5.4:openshift-logging/elasticsearch-rhel8-operator@sha256:dd211d42eaad043d9bdb519e3ad6a86255b7280a2cdf47dd3fe0458a77cb110f_s390x",
"8Base-RHOL-5.4:openshift-logging/elasticsearch6-rhel8@sha256:17a9f3ae042b92693a374e3d60a07f2ab2e52419f8df25d446dd0654f6a858f6_ppc64le",
"8Base-RHOL-5.4:openshift-logging/elasticsearch6-rhel8@sha256:5b1cfc2f9a96601439cf17d1fe49a6bc6cad3b7273af87b23528090aefbfd915_s390x",
"8Base-RHOL-5.4:openshift-logging/elasticsearch6-rhel8@sha256:8e0ba10f91db4cb8786d0501ec33a3d54f7c7c5337e0495cc2286a6ea20cca20_arm64",
"8Base-RHOL-5.4:openshift-logging/elasticsearch6-rhel8@sha256:fa8182b69328077500f89becc7621b48efa8d99f34247c2e6855dcfec13980e3_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:7435"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"8Base-RHOL-5.4:openshift-logging/cluster-logging-operator-bundle@sha256:cb26d9e55f781dd535901a90f1ec2f8e02e8e1de72c0fde638c90fcc228ec4b2_amd64",
"8Base-RHOL-5.4:openshift-logging/cluster-logging-rhel8-operator@sha256:617cc8b0011110981674b75fe1e3041bfa434c952e4a0193818b971edbc7a480_s390x",
"8Base-RHOL-5.4:openshift-logging/cluster-logging-rhel8-operator@sha256:637df49756fe85e7b38b279ffa7672d72c658d3d47df7f9dada2dd70563af83b_arm64",
"8Base-RHOL-5.4:openshift-logging/cluster-logging-rhel8-operator@sha256:aa1602fe2abe23bd8a4c791bc45d425686a6e6d1aab4face0fac28bfc7cebbe1_ppc64le",
"8Base-RHOL-5.4:openshift-logging/cluster-logging-rhel8-operator@sha256:c698b52c46d41007e5ac4f90b9540d430820bd20a93468fddd3a949c7ef5b332_amd64",
"8Base-RHOL-5.4:openshift-logging/elasticsearch-operator-bundle@sha256:7659606e0418a1920161b7ca67524ea6a7b1ed366b817f1a5cde0b346152243c_amd64",
"8Base-RHOL-5.4:openshift-logging/elasticsearch-proxy-rhel8@sha256:4f4e5bb267ad391bc0fc6a010ec9ecdf3bf48d5b6e9db0d2510960c13c97bd71_ppc64le",
"8Base-RHOL-5.4:openshift-logging/elasticsearch-proxy-rhel8@sha256:b9c2e58b39dc3de97013f8806178f6327bf2e4590fe55db144527d64d468f64f_s390x",
"8Base-RHOL-5.4:openshift-logging/elasticsearch-proxy-rhel8@sha256:c9a2b9e7cca14d9596ccbe0f64e2abe4452f91f029f42eefead43c9f526f6a58_arm64",
"8Base-RHOL-5.4:openshift-logging/elasticsearch-proxy-rhel8@sha256:e38c55762c1eef39b401c46d44c899067b1566173e1ce239f17a95c52b30d8c7_amd64",
"8Base-RHOL-5.4:openshift-logging/elasticsearch-rhel8-operator@sha256:2005f41e59a130bb86c2ec47d1b060e3e2ed32f9a4cef3897e2c05fc94043dbb_arm64",
"8Base-RHOL-5.4:openshift-logging/elasticsearch-rhel8-operator@sha256:6a55934cf7af0c03e06d4ec7a15a80acf53491fb7a183c16fdf8018fbf9b4174_ppc64le",
"8Base-RHOL-5.4:openshift-logging/elasticsearch-rhel8-operator@sha256:8ce04536772f31ad022b9c66cddc090d2962b44d66c06a1db56d1447be198326_amd64",
"8Base-RHOL-5.4:openshift-logging/elasticsearch-rhel8-operator@sha256:dd211d42eaad043d9bdb519e3ad6a86255b7280a2cdf47dd3fe0458a77cb110f_s390x",
"8Base-RHOL-5.4:openshift-logging/elasticsearch6-rhel8@sha256:17a9f3ae042b92693a374e3d60a07f2ab2e52419f8df25d446dd0654f6a858f6_ppc64le",
"8Base-RHOL-5.4:openshift-logging/elasticsearch6-rhel8@sha256:5b1cfc2f9a96601439cf17d1fe49a6bc6cad3b7273af87b23528090aefbfd915_s390x",
"8Base-RHOL-5.4:openshift-logging/elasticsearch6-rhel8@sha256:8e0ba10f91db4cb8786d0501ec33a3d54f7c7c5337e0495cc2286a6ea20cca20_arm64",
"8Base-RHOL-5.4:openshift-logging/elasticsearch6-rhel8@sha256:fa8182b69328077500f89becc7621b48efa8d99f34247c2e6855dcfec13980e3_amd64",
"8Base-RHOL-5.4:openshift-logging/eventrouter-rhel8@sha256:4438a3bba34418a9dc566bf15f6b4764de4295ab8b05a7b1a86f9e8cd332b3f7_arm64",
"8Base-RHOL-5.4:openshift-logging/eventrouter-rhel8@sha256:bc408fc4b0482c5eb1b0deb3a9090f3e3dd9b370001d54cd076254562c72fec9_ppc64le",
"8Base-RHOL-5.4:openshift-logging/eventrouter-rhel8@sha256:d50a2b89442d04b1163c01b3a3951857a95df76c57b14e7f51d835c3ac6d75b3_amd64",
"8Base-RHOL-5.4:openshift-logging/eventrouter-rhel8@sha256:f05aee8433dec1c9f6cf835038f9e5a47847d4095383bf3c22ca57c3fb69fa98_s390x",
"8Base-RHOL-5.4:openshift-logging/fluentd-rhel8@sha256:150e17cb645cf2f4cb7ab592572dd3abd145d9a33e790778280e256666248022_amd64",
"8Base-RHOL-5.4:openshift-logging/fluentd-rhel8@sha256:36aecf05ca3cdaf29982b3efa4a1c97087be29b0a58c9777e6b0c11a34861aa8_s390x",
"8Base-RHOL-5.4:openshift-logging/fluentd-rhel8@sha256:e3a51d2bdc632b8376e28c33e9d4fac3464e3a84a313a17246b1f1cf21cb5710_arm64",
"8Base-RHOL-5.4:openshift-logging/fluentd-rhel8@sha256:ea07da04f06df6bf0d9dd981a3795dfdb51eca83f59a6291114650e3e98a9e71_ppc64le",
"8Base-RHOL-5.4:openshift-logging/kibana6-rhel8@sha256:167ee6a645c7397bde3d12e9b9685279505c25ffb3bda11ae68bdf0b34229f2e_amd64",
"8Base-RHOL-5.4:openshift-logging/kibana6-rhel8@sha256:4a029733337b10bb9fb8d98c91abc5451ca0b98713c8f2271a675251e025b6c0_s390x",
"8Base-RHOL-5.4:openshift-logging/kibana6-rhel8@sha256:812f4380024dc3df42310ad14d173d390f2bdf4b3dbdb02550c00552534f79ce_ppc64le",
"8Base-RHOL-5.4:openshift-logging/kibana6-rhel8@sha256:958ba6856cc76fc77d34a9c78888eb37b9c39b83a2f044ef2337610560ba9323_arm64",
"8Base-RHOL-5.4:openshift-logging/log-file-metric-exporter-rhel8@sha256:043e4d3481fbfedf3115e18fade3a2f33b891b0d9a641bf973c2c7f492cb0489_amd64",
"8Base-RHOL-5.4:openshift-logging/log-file-metric-exporter-rhel8@sha256:4fe26adac10cf20b83812e4fa513231d7e1fd4b6cd4e09d4fd425c391885cfcc_ppc64le",
"8Base-RHOL-5.4:openshift-logging/log-file-metric-exporter-rhel8@sha256:85827db708c0927027435b05732cc7e34b0675eaa86665c91efacc76aecd6227_s390x",
"8Base-RHOL-5.4:openshift-logging/log-file-metric-exporter-rhel8@sha256:a5285db276a5545fdbaa9f0743a49ba72ce1c5da61b5cccc9422320a03e08bea_arm64",
"8Base-RHOL-5.4:openshift-logging/logging-curator5-rhel8@sha256:0b28415b8115ff3216002faa5c9ecf3c46995085e3364c8028cb544cb4787ed2_arm64",
"8Base-RHOL-5.4:openshift-logging/logging-curator5-rhel8@sha256:7016e867ddfe970d6d2d54d5615e8f613786bcfbfe52ebf3139c07da3d5a53db_s390x",
"8Base-RHOL-5.4:openshift-logging/logging-curator5-rhel8@sha256:94c435f45e9dbd9fa633e137356cfb1d6ac2d4dd7574b359367665da42d6203d_amd64",
"8Base-RHOL-5.4:openshift-logging/logging-curator5-rhel8@sha256:d24afbc9228ef7f3d0a6fd716a3a57abde88a1f65d149c7df4f959a775b670bd_ppc64le",
"8Base-RHOL-5.4:openshift-logging/logging-loki-rhel8@sha256:40d4989b4733f54a01a73831fa00b12e49fff69c75138902eac0d894d432e4d9_arm64",
"8Base-RHOL-5.4:openshift-logging/logging-loki-rhel8@sha256:b444af35118c24bde0dfa2a8825ba427b3345451f6081133477254213a3460f0_amd64",
"8Base-RHOL-5.4:openshift-logging/logging-loki-rhel8@sha256:cfe410d498940a95da631ea213866a96a119034d78d5d53f7f9c7e8da56e0f45_s390x",
"8Base-RHOL-5.4:openshift-logging/logging-loki-rhel8@sha256:f7979c82140a0ab1a97c9f3151465bfbd9f79c4db9b0cc20f974cd7b890f074f_ppc64le",
"8Base-RHOL-5.4:openshift-logging/loki-operator-bundle@sha256:02cceda51028eb55a3b82aa5275f03dbaf8f8f9ab3fd27c650d1a07a93044e37_amd64",
"8Base-RHOL-5.4:openshift-logging/loki-rhel8-operator@sha256:0f1be625b4012820f7ac439fed000808d7acb4e885ace16014461bf802be935a_s390x",
"8Base-RHOL-5.4:openshift-logging/loki-rhel8-operator@sha256:28f45a80846c5e11638fb479be42cafcb2bdb3af94dff3629a820de295cbe31d_ppc64le",
"8Base-RHOL-5.4:openshift-logging/loki-rhel8-operator@sha256:df7de1e9f5a4396df6f14b1c4b6bb2a9ae4bc50d82cbc954ec535c26e8df2cb1_arm64",
"8Base-RHOL-5.4:openshift-logging/loki-rhel8-operator@sha256:f8a35557c9eb27f703ffa9320a9d39a2361d93fdb0b8c874d97da458048e7eec_amd64",
"8Base-RHOL-5.4:openshift-logging/lokistack-gateway-rhel8@sha256:178fcf44e6a1fa90d27a40565f69ae2880622b017bc8d9e33a441353eb45609d_arm64",
"8Base-RHOL-5.4:openshift-logging/lokistack-gateway-rhel8@sha256:7b0c2c99cf0f710166b749dbfd7f544caf5fe35516c743fca251c7cec896e1d6_ppc64le",
"8Base-RHOL-5.4:openshift-logging/lokistack-gateway-rhel8@sha256:9c4959525339b607a98889d56f4c26f2e4af25032466c439903a7f1cb593f721_s390x",
"8Base-RHOL-5.4:openshift-logging/lokistack-gateway-rhel8@sha256:a967d5be7d3a6fdd75965a5f9a7396a52cdcb37d6a8521c440b0b5c650c230f2_amd64",
"8Base-RHOL-5.4:openshift-logging/opa-openshift-rhel8@sha256:1b106af51bb50f1ce4db13ebbf6f6c67eae45611c0d5dc46476f1dfaa8aca166_arm64",
"8Base-RHOL-5.4:openshift-logging/opa-openshift-rhel8@sha256:92ddf24824c8f8ae93dec07184c446615b635389472d3a525df72da07c8d9b97_ppc64le",
"8Base-RHOL-5.4:openshift-logging/opa-openshift-rhel8@sha256:9fd0c5df785564b35392705a479d6fb9245e3329719438c76c0282f9ef2f2d55_amd64",
"8Base-RHOL-5.4:openshift-logging/opa-openshift-rhel8@sha256:be8ba0e4c5f24c7b4549700a25c89b10d4b2fc0b0e3888163bb53827914e95c1_s390x",
"8Base-RHOL-5.4:openshift-logging/vector-rhel8@sha256:48bb136d11b44428c87489978873370848ac2b219b107ef7e81ab679db095234_s390x",
"8Base-RHOL-5.4:openshift-logging/vector-rhel8@sha256:48f0317d167710ff5b0787c73f6b7dd0249e7c8d2d001159132a97299c30b62d_ppc64le",
"8Base-RHOL-5.4:openshift-logging/vector-rhel8@sha256:bde21c03fb831d01e85b28245881f7e3f2bb2ef6d2671eb92b2e0cc4bd3898e2_arm64",
"8Base-RHOL-5.4:openshift-logging/vector-rhel8@sha256:cc6b9c6a344aac56c99c96b5120ffe2dad479000b34964ff89d030ae762bda43_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "jackson-databind: deep wrapper array nesting wrt UNWRAP_SINGLE_VALUE_ARRAYS"
},
{
"cve": "CVE-2022-42004",
"cwe": {
"id": "CWE-502",
"name": "Deserialization of Untrusted Data"
},
"discovery_date": "2022-10-17T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-RHOL-5.4:openshift-logging/cluster-logging-operator-bundle@sha256:cb26d9e55f781dd535901a90f1ec2f8e02e8e1de72c0fde638c90fcc228ec4b2_amd64",
"8Base-RHOL-5.4:openshift-logging/cluster-logging-rhel8-operator@sha256:617cc8b0011110981674b75fe1e3041bfa434c952e4a0193818b971edbc7a480_s390x",
"8Base-RHOL-5.4:openshift-logging/cluster-logging-rhel8-operator@sha256:637df49756fe85e7b38b279ffa7672d72c658d3d47df7f9dada2dd70563af83b_arm64",
"8Base-RHOL-5.4:openshift-logging/cluster-logging-rhel8-operator@sha256:aa1602fe2abe23bd8a4c791bc45d425686a6e6d1aab4face0fac28bfc7cebbe1_ppc64le",
"8Base-RHOL-5.4:openshift-logging/cluster-logging-rhel8-operator@sha256:c698b52c46d41007e5ac4f90b9540d430820bd20a93468fddd3a949c7ef5b332_amd64",
"8Base-RHOL-5.4:openshift-logging/eventrouter-rhel8@sha256:4438a3bba34418a9dc566bf15f6b4764de4295ab8b05a7b1a86f9e8cd332b3f7_arm64",
"8Base-RHOL-5.4:openshift-logging/eventrouter-rhel8@sha256:bc408fc4b0482c5eb1b0deb3a9090f3e3dd9b370001d54cd076254562c72fec9_ppc64le",
"8Base-RHOL-5.4:openshift-logging/eventrouter-rhel8@sha256:d50a2b89442d04b1163c01b3a3951857a95df76c57b14e7f51d835c3ac6d75b3_amd64",
"8Base-RHOL-5.4:openshift-logging/eventrouter-rhel8@sha256:f05aee8433dec1c9f6cf835038f9e5a47847d4095383bf3c22ca57c3fb69fa98_s390x",
"8Base-RHOL-5.4:openshift-logging/fluentd-rhel8@sha256:150e17cb645cf2f4cb7ab592572dd3abd145d9a33e790778280e256666248022_amd64",
"8Base-RHOL-5.4:openshift-logging/fluentd-rhel8@sha256:36aecf05ca3cdaf29982b3efa4a1c97087be29b0a58c9777e6b0c11a34861aa8_s390x",
"8Base-RHOL-5.4:openshift-logging/fluentd-rhel8@sha256:e3a51d2bdc632b8376e28c33e9d4fac3464e3a84a313a17246b1f1cf21cb5710_arm64",
"8Base-RHOL-5.4:openshift-logging/fluentd-rhel8@sha256:ea07da04f06df6bf0d9dd981a3795dfdb51eca83f59a6291114650e3e98a9e71_ppc64le",
"8Base-RHOL-5.4:openshift-logging/kibana6-rhel8@sha256:167ee6a645c7397bde3d12e9b9685279505c25ffb3bda11ae68bdf0b34229f2e_amd64",
"8Base-RHOL-5.4:openshift-logging/kibana6-rhel8@sha256:4a029733337b10bb9fb8d98c91abc5451ca0b98713c8f2271a675251e025b6c0_s390x",
"8Base-RHOL-5.4:openshift-logging/kibana6-rhel8@sha256:812f4380024dc3df42310ad14d173d390f2bdf4b3dbdb02550c00552534f79ce_ppc64le",
"8Base-RHOL-5.4:openshift-logging/kibana6-rhel8@sha256:958ba6856cc76fc77d34a9c78888eb37b9c39b83a2f044ef2337610560ba9323_arm64",
"8Base-RHOL-5.4:openshift-logging/log-file-metric-exporter-rhel8@sha256:043e4d3481fbfedf3115e18fade3a2f33b891b0d9a641bf973c2c7f492cb0489_amd64",
"8Base-RHOL-5.4:openshift-logging/log-file-metric-exporter-rhel8@sha256:4fe26adac10cf20b83812e4fa513231d7e1fd4b6cd4e09d4fd425c391885cfcc_ppc64le",
"8Base-RHOL-5.4:openshift-logging/log-file-metric-exporter-rhel8@sha256:85827db708c0927027435b05732cc7e34b0675eaa86665c91efacc76aecd6227_s390x",
"8Base-RHOL-5.4:openshift-logging/log-file-metric-exporter-rhel8@sha256:a5285db276a5545fdbaa9f0743a49ba72ce1c5da61b5cccc9422320a03e08bea_arm64",
"8Base-RHOL-5.4:openshift-logging/logging-curator5-rhel8@sha256:0b28415b8115ff3216002faa5c9ecf3c46995085e3364c8028cb544cb4787ed2_arm64",
"8Base-RHOL-5.4:openshift-logging/logging-curator5-rhel8@sha256:7016e867ddfe970d6d2d54d5615e8f613786bcfbfe52ebf3139c07da3d5a53db_s390x",
"8Base-RHOL-5.4:openshift-logging/logging-curator5-rhel8@sha256:94c435f45e9dbd9fa633e137356cfb1d6ac2d4dd7574b359367665da42d6203d_amd64",
"8Base-RHOL-5.4:openshift-logging/logging-curator5-rhel8@sha256:d24afbc9228ef7f3d0a6fd716a3a57abde88a1f65d149c7df4f959a775b670bd_ppc64le",
"8Base-RHOL-5.4:openshift-logging/logging-loki-rhel8@sha256:40d4989b4733f54a01a73831fa00b12e49fff69c75138902eac0d894d432e4d9_arm64",
"8Base-RHOL-5.4:openshift-logging/logging-loki-rhel8@sha256:b444af35118c24bde0dfa2a8825ba427b3345451f6081133477254213a3460f0_amd64",
"8Base-RHOL-5.4:openshift-logging/logging-loki-rhel8@sha256:cfe410d498940a95da631ea213866a96a119034d78d5d53f7f9c7e8da56e0f45_s390x",
"8Base-RHOL-5.4:openshift-logging/logging-loki-rhel8@sha256:f7979c82140a0ab1a97c9f3151465bfbd9f79c4db9b0cc20f974cd7b890f074f_ppc64le",
"8Base-RHOL-5.4:openshift-logging/loki-operator-bundle@sha256:02cceda51028eb55a3b82aa5275f03dbaf8f8f9ab3fd27c650d1a07a93044e37_amd64",
"8Base-RHOL-5.4:openshift-logging/loki-rhel8-operator@sha256:0f1be625b4012820f7ac439fed000808d7acb4e885ace16014461bf802be935a_s390x",
"8Base-RHOL-5.4:openshift-logging/loki-rhel8-operator@sha256:28f45a80846c5e11638fb479be42cafcb2bdb3af94dff3629a820de295cbe31d_ppc64le",
"8Base-RHOL-5.4:openshift-logging/loki-rhel8-operator@sha256:df7de1e9f5a4396df6f14b1c4b6bb2a9ae4bc50d82cbc954ec535c26e8df2cb1_arm64",
"8Base-RHOL-5.4:openshift-logging/loki-rhel8-operator@sha256:f8a35557c9eb27f703ffa9320a9d39a2361d93fdb0b8c874d97da458048e7eec_amd64",
"8Base-RHOL-5.4:openshift-logging/lokistack-gateway-rhel8@sha256:178fcf44e6a1fa90d27a40565f69ae2880622b017bc8d9e33a441353eb45609d_arm64",
"8Base-RHOL-5.4:openshift-logging/lokistack-gateway-rhel8@sha256:7b0c2c99cf0f710166b749dbfd7f544caf5fe35516c743fca251c7cec896e1d6_ppc64le",
"8Base-RHOL-5.4:openshift-logging/lokistack-gateway-rhel8@sha256:9c4959525339b607a98889d56f4c26f2e4af25032466c439903a7f1cb593f721_s390x",
"8Base-RHOL-5.4:openshift-logging/lokistack-gateway-rhel8@sha256:a967d5be7d3a6fdd75965a5f9a7396a52cdcb37d6a8521c440b0b5c650c230f2_amd64",
"8Base-RHOL-5.4:openshift-logging/opa-openshift-rhel8@sha256:1b106af51bb50f1ce4db13ebbf6f6c67eae45611c0d5dc46476f1dfaa8aca166_arm64",
"8Base-RHOL-5.4:openshift-logging/opa-openshift-rhel8@sha256:92ddf24824c8f8ae93dec07184c446615b635389472d3a525df72da07c8d9b97_ppc64le",
"8Base-RHOL-5.4:openshift-logging/opa-openshift-rhel8@sha256:9fd0c5df785564b35392705a479d6fb9245e3329719438c76c0282f9ef2f2d55_amd64",
"8Base-RHOL-5.4:openshift-logging/opa-openshift-rhel8@sha256:be8ba0e4c5f24c7b4549700a25c89b10d4b2fc0b0e3888163bb53827914e95c1_s390x",
"8Base-RHOL-5.4:openshift-logging/vector-rhel8@sha256:48bb136d11b44428c87489978873370848ac2b219b107ef7e81ab679db095234_s390x",
"8Base-RHOL-5.4:openshift-logging/vector-rhel8@sha256:48f0317d167710ff5b0787c73f6b7dd0249e7c8d2d001159132a97299c30b62d_ppc64le",
"8Base-RHOL-5.4:openshift-logging/vector-rhel8@sha256:bde21c03fb831d01e85b28245881f7e3f2bb2ef6d2671eb92b2e0cc4bd3898e2_arm64",
"8Base-RHOL-5.4:openshift-logging/vector-rhel8@sha256:cc6b9c6a344aac56c99c96b5120ffe2dad479000b34964ff89d030ae762bda43_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2135247"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found In FasterXML jackson-databind. This issue could allow an attacker to benefit from resource exhaustion due to the lack of a check in BeanDeserializer._deserializeFromArray to prevent the use of deeply nested arrays. An application is only vulnerable with certain customized choices for deserialization.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "jackson-databind: use of deeply nested arrays",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-RHOL-5.4:openshift-logging/elasticsearch-operator-bundle@sha256:7659606e0418a1920161b7ca67524ea6a7b1ed366b817f1a5cde0b346152243c_amd64",
"8Base-RHOL-5.4:openshift-logging/elasticsearch-proxy-rhel8@sha256:4f4e5bb267ad391bc0fc6a010ec9ecdf3bf48d5b6e9db0d2510960c13c97bd71_ppc64le",
"8Base-RHOL-5.4:openshift-logging/elasticsearch-proxy-rhel8@sha256:b9c2e58b39dc3de97013f8806178f6327bf2e4590fe55db144527d64d468f64f_s390x",
"8Base-RHOL-5.4:openshift-logging/elasticsearch-proxy-rhel8@sha256:c9a2b9e7cca14d9596ccbe0f64e2abe4452f91f029f42eefead43c9f526f6a58_arm64",
"8Base-RHOL-5.4:openshift-logging/elasticsearch-proxy-rhel8@sha256:e38c55762c1eef39b401c46d44c899067b1566173e1ce239f17a95c52b30d8c7_amd64",
"8Base-RHOL-5.4:openshift-logging/elasticsearch-rhel8-operator@sha256:2005f41e59a130bb86c2ec47d1b060e3e2ed32f9a4cef3897e2c05fc94043dbb_arm64",
"8Base-RHOL-5.4:openshift-logging/elasticsearch-rhel8-operator@sha256:6a55934cf7af0c03e06d4ec7a15a80acf53491fb7a183c16fdf8018fbf9b4174_ppc64le",
"8Base-RHOL-5.4:openshift-logging/elasticsearch-rhel8-operator@sha256:8ce04536772f31ad022b9c66cddc090d2962b44d66c06a1db56d1447be198326_amd64",
"8Base-RHOL-5.4:openshift-logging/elasticsearch-rhel8-operator@sha256:dd211d42eaad043d9bdb519e3ad6a86255b7280a2cdf47dd3fe0458a77cb110f_s390x",
"8Base-RHOL-5.4:openshift-logging/elasticsearch6-rhel8@sha256:17a9f3ae042b92693a374e3d60a07f2ab2e52419f8df25d446dd0654f6a858f6_ppc64le",
"8Base-RHOL-5.4:openshift-logging/elasticsearch6-rhel8@sha256:5b1cfc2f9a96601439cf17d1fe49a6bc6cad3b7273af87b23528090aefbfd915_s390x",
"8Base-RHOL-5.4:openshift-logging/elasticsearch6-rhel8@sha256:8e0ba10f91db4cb8786d0501ec33a3d54f7c7c5337e0495cc2286a6ea20cca20_arm64",
"8Base-RHOL-5.4:openshift-logging/elasticsearch6-rhel8@sha256:fa8182b69328077500f89becc7621b48efa8d99f34247c2e6855dcfec13980e3_amd64"
],
"known_not_affected": [
"8Base-RHOL-5.4:openshift-logging/cluster-logging-operator-bundle@sha256:cb26d9e55f781dd535901a90f1ec2f8e02e8e1de72c0fde638c90fcc228ec4b2_amd64",
"8Base-RHOL-5.4:openshift-logging/cluster-logging-rhel8-operator@sha256:617cc8b0011110981674b75fe1e3041bfa434c952e4a0193818b971edbc7a480_s390x",
"8Base-RHOL-5.4:openshift-logging/cluster-logging-rhel8-operator@sha256:637df49756fe85e7b38b279ffa7672d72c658d3d47df7f9dada2dd70563af83b_arm64",
"8Base-RHOL-5.4:openshift-logging/cluster-logging-rhel8-operator@sha256:aa1602fe2abe23bd8a4c791bc45d425686a6e6d1aab4face0fac28bfc7cebbe1_ppc64le",
"8Base-RHOL-5.4:openshift-logging/cluster-logging-rhel8-operator@sha256:c698b52c46d41007e5ac4f90b9540d430820bd20a93468fddd3a949c7ef5b332_amd64",
"8Base-RHOL-5.4:openshift-logging/eventrouter-rhel8@sha256:4438a3bba34418a9dc566bf15f6b4764de4295ab8b05a7b1a86f9e8cd332b3f7_arm64",
"8Base-RHOL-5.4:openshift-logging/eventrouter-rhel8@sha256:bc408fc4b0482c5eb1b0deb3a9090f3e3dd9b370001d54cd076254562c72fec9_ppc64le",
"8Base-RHOL-5.4:openshift-logging/eventrouter-rhel8@sha256:d50a2b89442d04b1163c01b3a3951857a95df76c57b14e7f51d835c3ac6d75b3_amd64",
"8Base-RHOL-5.4:openshift-logging/eventrouter-rhel8@sha256:f05aee8433dec1c9f6cf835038f9e5a47847d4095383bf3c22ca57c3fb69fa98_s390x",
"8Base-RHOL-5.4:openshift-logging/fluentd-rhel8@sha256:150e17cb645cf2f4cb7ab592572dd3abd145d9a33e790778280e256666248022_amd64",
"8Base-RHOL-5.4:openshift-logging/fluentd-rhel8@sha256:36aecf05ca3cdaf29982b3efa4a1c97087be29b0a58c9777e6b0c11a34861aa8_s390x",
"8Base-RHOL-5.4:openshift-logging/fluentd-rhel8@sha256:e3a51d2bdc632b8376e28c33e9d4fac3464e3a84a313a17246b1f1cf21cb5710_arm64",
"8Base-RHOL-5.4:openshift-logging/fluentd-rhel8@sha256:ea07da04f06df6bf0d9dd981a3795dfdb51eca83f59a6291114650e3e98a9e71_ppc64le",
"8Base-RHOL-5.4:openshift-logging/kibana6-rhel8@sha256:167ee6a645c7397bde3d12e9b9685279505c25ffb3bda11ae68bdf0b34229f2e_amd64",
"8Base-RHOL-5.4:openshift-logging/kibana6-rhel8@sha256:4a029733337b10bb9fb8d98c91abc5451ca0b98713c8f2271a675251e025b6c0_s390x",
"8Base-RHOL-5.4:openshift-logging/kibana6-rhel8@sha256:812f4380024dc3df42310ad14d173d390f2bdf4b3dbdb02550c00552534f79ce_ppc64le",
"8Base-RHOL-5.4:openshift-logging/kibana6-rhel8@sha256:958ba6856cc76fc77d34a9c78888eb37b9c39b83a2f044ef2337610560ba9323_arm64",
"8Base-RHOL-5.4:openshift-logging/log-file-metric-exporter-rhel8@sha256:043e4d3481fbfedf3115e18fade3a2f33b891b0d9a641bf973c2c7f492cb0489_amd64",
"8Base-RHOL-5.4:openshift-logging/log-file-metric-exporter-rhel8@sha256:4fe26adac10cf20b83812e4fa513231d7e1fd4b6cd4e09d4fd425c391885cfcc_ppc64le",
"8Base-RHOL-5.4:openshift-logging/log-file-metric-exporter-rhel8@sha256:85827db708c0927027435b05732cc7e34b0675eaa86665c91efacc76aecd6227_s390x",
"8Base-RHOL-5.4:openshift-logging/log-file-metric-exporter-rhel8@sha256:a5285db276a5545fdbaa9f0743a49ba72ce1c5da61b5cccc9422320a03e08bea_arm64",
"8Base-RHOL-5.4:openshift-logging/logging-curator5-rhel8@sha256:0b28415b8115ff3216002faa5c9ecf3c46995085e3364c8028cb544cb4787ed2_arm64",
"8Base-RHOL-5.4:openshift-logging/logging-curator5-rhel8@sha256:7016e867ddfe970d6d2d54d5615e8f613786bcfbfe52ebf3139c07da3d5a53db_s390x",
"8Base-RHOL-5.4:openshift-logging/logging-curator5-rhel8@sha256:94c435f45e9dbd9fa633e137356cfb1d6ac2d4dd7574b359367665da42d6203d_amd64",
"8Base-RHOL-5.4:openshift-logging/logging-curator5-rhel8@sha256:d24afbc9228ef7f3d0a6fd716a3a57abde88a1f65d149c7df4f959a775b670bd_ppc64le",
"8Base-RHOL-5.4:openshift-logging/logging-loki-rhel8@sha256:40d4989b4733f54a01a73831fa00b12e49fff69c75138902eac0d894d432e4d9_arm64",
"8Base-RHOL-5.4:openshift-logging/logging-loki-rhel8@sha256:b444af35118c24bde0dfa2a8825ba427b3345451f6081133477254213a3460f0_amd64",
"8Base-RHOL-5.4:openshift-logging/logging-loki-rhel8@sha256:cfe410d498940a95da631ea213866a96a119034d78d5d53f7f9c7e8da56e0f45_s390x",
"8Base-RHOL-5.4:openshift-logging/logging-loki-rhel8@sha256:f7979c82140a0ab1a97c9f3151465bfbd9f79c4db9b0cc20f974cd7b890f074f_ppc64le",
"8Base-RHOL-5.4:openshift-logging/loki-operator-bundle@sha256:02cceda51028eb55a3b82aa5275f03dbaf8f8f9ab3fd27c650d1a07a93044e37_amd64",
"8Base-RHOL-5.4:openshift-logging/loki-rhel8-operator@sha256:0f1be625b4012820f7ac439fed000808d7acb4e885ace16014461bf802be935a_s390x",
"8Base-RHOL-5.4:openshift-logging/loki-rhel8-operator@sha256:28f45a80846c5e11638fb479be42cafcb2bdb3af94dff3629a820de295cbe31d_ppc64le",
"8Base-RHOL-5.4:openshift-logging/loki-rhel8-operator@sha256:df7de1e9f5a4396df6f14b1c4b6bb2a9ae4bc50d82cbc954ec535c26e8df2cb1_arm64",
"8Base-RHOL-5.4:openshift-logging/loki-rhel8-operator@sha256:f8a35557c9eb27f703ffa9320a9d39a2361d93fdb0b8c874d97da458048e7eec_amd64",
"8Base-RHOL-5.4:openshift-logging/lokistack-gateway-rhel8@sha256:178fcf44e6a1fa90d27a40565f69ae2880622b017bc8d9e33a441353eb45609d_arm64",
"8Base-RHOL-5.4:openshift-logging/lokistack-gateway-rhel8@sha256:7b0c2c99cf0f710166b749dbfd7f544caf5fe35516c743fca251c7cec896e1d6_ppc64le",
"8Base-RHOL-5.4:openshift-logging/lokistack-gateway-rhel8@sha256:9c4959525339b607a98889d56f4c26f2e4af25032466c439903a7f1cb593f721_s390x",
"8Base-RHOL-5.4:openshift-logging/lokistack-gateway-rhel8@sha256:a967d5be7d3a6fdd75965a5f9a7396a52cdcb37d6a8521c440b0b5c650c230f2_amd64",
"8Base-RHOL-5.4:openshift-logging/opa-openshift-rhel8@sha256:1b106af51bb50f1ce4db13ebbf6f6c67eae45611c0d5dc46476f1dfaa8aca166_arm64",
"8Base-RHOL-5.4:openshift-logging/opa-openshift-rhel8@sha256:92ddf24824c8f8ae93dec07184c446615b635389472d3a525df72da07c8d9b97_ppc64le",
"8Base-RHOL-5.4:openshift-logging/opa-openshift-rhel8@sha256:9fd0c5df785564b35392705a479d6fb9245e3329719438c76c0282f9ef2f2d55_amd64",
"8Base-RHOL-5.4:openshift-logging/opa-openshift-rhel8@sha256:be8ba0e4c5f24c7b4549700a25c89b10d4b2fc0b0e3888163bb53827914e95c1_s390x",
"8Base-RHOL-5.4:openshift-logging/vector-rhel8@sha256:48bb136d11b44428c87489978873370848ac2b219b107ef7e81ab679db095234_s390x",
"8Base-RHOL-5.4:openshift-logging/vector-rhel8@sha256:48f0317d167710ff5b0787c73f6b7dd0249e7c8d2d001159132a97299c30b62d_ppc64le",
"8Base-RHOL-5.4:openshift-logging/vector-rhel8@sha256:bde21c03fb831d01e85b28245881f7e3f2bb2ef6d2671eb92b2e0cc4bd3898e2_arm64",
"8Base-RHOL-5.4:openshift-logging/vector-rhel8@sha256:cc6b9c6a344aac56c99c96b5120ffe2dad479000b34964ff89d030ae762bda43_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-42004"
},
{
"category": "external",
"summary": "RHBZ#2135247",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2135247"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-42004",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42004"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-42004",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-42004"
}
],
"release_date": "2022-10-02T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-11-16T12:13:01+00:00",
"details": "For OpenShift Container Platform 4.10 see the following documentation, which will be updated shortly, for detailed release notes:\n\nhttps://docs.openshift.com/container-platform/4.10/logging/cluster-logging-release-notes.html\n\nFor Red Hat OpenShift Logging 5.4, see the following instructions to apply this update:\n\nhttps://docs.openshift.com/container-platform/4.10/logging/cluster-logging-upgrading.html",
"product_ids": [
"8Base-RHOL-5.4:openshift-logging/elasticsearch-operator-bundle@sha256:7659606e0418a1920161b7ca67524ea6a7b1ed366b817f1a5cde0b346152243c_amd64",
"8Base-RHOL-5.4:openshift-logging/elasticsearch-proxy-rhel8@sha256:4f4e5bb267ad391bc0fc6a010ec9ecdf3bf48d5b6e9db0d2510960c13c97bd71_ppc64le",
"8Base-RHOL-5.4:openshift-logging/elasticsearch-proxy-rhel8@sha256:b9c2e58b39dc3de97013f8806178f6327bf2e4590fe55db144527d64d468f64f_s390x",
"8Base-RHOL-5.4:openshift-logging/elasticsearch-proxy-rhel8@sha256:c9a2b9e7cca14d9596ccbe0f64e2abe4452f91f029f42eefead43c9f526f6a58_arm64",
"8Base-RHOL-5.4:openshift-logging/elasticsearch-proxy-rhel8@sha256:e38c55762c1eef39b401c46d44c899067b1566173e1ce239f17a95c52b30d8c7_amd64",
"8Base-RHOL-5.4:openshift-logging/elasticsearch-rhel8-operator@sha256:2005f41e59a130bb86c2ec47d1b060e3e2ed32f9a4cef3897e2c05fc94043dbb_arm64",
"8Base-RHOL-5.4:openshift-logging/elasticsearch-rhel8-operator@sha256:6a55934cf7af0c03e06d4ec7a15a80acf53491fb7a183c16fdf8018fbf9b4174_ppc64le",
"8Base-RHOL-5.4:openshift-logging/elasticsearch-rhel8-operator@sha256:8ce04536772f31ad022b9c66cddc090d2962b44d66c06a1db56d1447be198326_amd64",
"8Base-RHOL-5.4:openshift-logging/elasticsearch-rhel8-operator@sha256:dd211d42eaad043d9bdb519e3ad6a86255b7280a2cdf47dd3fe0458a77cb110f_s390x",
"8Base-RHOL-5.4:openshift-logging/elasticsearch6-rhel8@sha256:17a9f3ae042b92693a374e3d60a07f2ab2e52419f8df25d446dd0654f6a858f6_ppc64le",
"8Base-RHOL-5.4:openshift-logging/elasticsearch6-rhel8@sha256:5b1cfc2f9a96601439cf17d1fe49a6bc6cad3b7273af87b23528090aefbfd915_s390x",
"8Base-RHOL-5.4:openshift-logging/elasticsearch6-rhel8@sha256:8e0ba10f91db4cb8786d0501ec33a3d54f7c7c5337e0495cc2286a6ea20cca20_arm64",
"8Base-RHOL-5.4:openshift-logging/elasticsearch6-rhel8@sha256:fa8182b69328077500f89becc7621b48efa8d99f34247c2e6855dcfec13980e3_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:7435"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"8Base-RHOL-5.4:openshift-logging/cluster-logging-operator-bundle@sha256:cb26d9e55f781dd535901a90f1ec2f8e02e8e1de72c0fde638c90fcc228ec4b2_amd64",
"8Base-RHOL-5.4:openshift-logging/cluster-logging-rhel8-operator@sha256:617cc8b0011110981674b75fe1e3041bfa434c952e4a0193818b971edbc7a480_s390x",
"8Base-RHOL-5.4:openshift-logging/cluster-logging-rhel8-operator@sha256:637df49756fe85e7b38b279ffa7672d72c658d3d47df7f9dada2dd70563af83b_arm64",
"8Base-RHOL-5.4:openshift-logging/cluster-logging-rhel8-operator@sha256:aa1602fe2abe23bd8a4c791bc45d425686a6e6d1aab4face0fac28bfc7cebbe1_ppc64le",
"8Base-RHOL-5.4:openshift-logging/cluster-logging-rhel8-operator@sha256:c698b52c46d41007e5ac4f90b9540d430820bd20a93468fddd3a949c7ef5b332_amd64",
"8Base-RHOL-5.4:openshift-logging/elasticsearch-operator-bundle@sha256:7659606e0418a1920161b7ca67524ea6a7b1ed366b817f1a5cde0b346152243c_amd64",
"8Base-RHOL-5.4:openshift-logging/elasticsearch-proxy-rhel8@sha256:4f4e5bb267ad391bc0fc6a010ec9ecdf3bf48d5b6e9db0d2510960c13c97bd71_ppc64le",
"8Base-RHOL-5.4:openshift-logging/elasticsearch-proxy-rhel8@sha256:b9c2e58b39dc3de97013f8806178f6327bf2e4590fe55db144527d64d468f64f_s390x",
"8Base-RHOL-5.4:openshift-logging/elasticsearch-proxy-rhel8@sha256:c9a2b9e7cca14d9596ccbe0f64e2abe4452f91f029f42eefead43c9f526f6a58_arm64",
"8Base-RHOL-5.4:openshift-logging/elasticsearch-proxy-rhel8@sha256:e38c55762c1eef39b401c46d44c899067b1566173e1ce239f17a95c52b30d8c7_amd64",
"8Base-RHOL-5.4:openshift-logging/elasticsearch-rhel8-operator@sha256:2005f41e59a130bb86c2ec47d1b060e3e2ed32f9a4cef3897e2c05fc94043dbb_arm64",
"8Base-RHOL-5.4:openshift-logging/elasticsearch-rhel8-operator@sha256:6a55934cf7af0c03e06d4ec7a15a80acf53491fb7a183c16fdf8018fbf9b4174_ppc64le",
"8Base-RHOL-5.4:openshift-logging/elasticsearch-rhel8-operator@sha256:8ce04536772f31ad022b9c66cddc090d2962b44d66c06a1db56d1447be198326_amd64",
"8Base-RHOL-5.4:openshift-logging/elasticsearch-rhel8-operator@sha256:dd211d42eaad043d9bdb519e3ad6a86255b7280a2cdf47dd3fe0458a77cb110f_s390x",
"8Base-RHOL-5.4:openshift-logging/elasticsearch6-rhel8@sha256:17a9f3ae042b92693a374e3d60a07f2ab2e52419f8df25d446dd0654f6a858f6_ppc64le",
"8Base-RHOL-5.4:openshift-logging/elasticsearch6-rhel8@sha256:5b1cfc2f9a96601439cf17d1fe49a6bc6cad3b7273af87b23528090aefbfd915_s390x",
"8Base-RHOL-5.4:openshift-logging/elasticsearch6-rhel8@sha256:8e0ba10f91db4cb8786d0501ec33a3d54f7c7c5337e0495cc2286a6ea20cca20_arm64",
"8Base-RHOL-5.4:openshift-logging/elasticsearch6-rhel8@sha256:fa8182b69328077500f89becc7621b48efa8d99f34247c2e6855dcfec13980e3_amd64",
"8Base-RHOL-5.4:openshift-logging/eventrouter-rhel8@sha256:4438a3bba34418a9dc566bf15f6b4764de4295ab8b05a7b1a86f9e8cd332b3f7_arm64",
"8Base-RHOL-5.4:openshift-logging/eventrouter-rhel8@sha256:bc408fc4b0482c5eb1b0deb3a9090f3e3dd9b370001d54cd076254562c72fec9_ppc64le",
"8Base-RHOL-5.4:openshift-logging/eventrouter-rhel8@sha256:d50a2b89442d04b1163c01b3a3951857a95df76c57b14e7f51d835c3ac6d75b3_amd64",
"8Base-RHOL-5.4:openshift-logging/eventrouter-rhel8@sha256:f05aee8433dec1c9f6cf835038f9e5a47847d4095383bf3c22ca57c3fb69fa98_s390x",
"8Base-RHOL-5.4:openshift-logging/fluentd-rhel8@sha256:150e17cb645cf2f4cb7ab592572dd3abd145d9a33e790778280e256666248022_amd64",
"8Base-RHOL-5.4:openshift-logging/fluentd-rhel8@sha256:36aecf05ca3cdaf29982b3efa4a1c97087be29b0a58c9777e6b0c11a34861aa8_s390x",
"8Base-RHOL-5.4:openshift-logging/fluentd-rhel8@sha256:e3a51d2bdc632b8376e28c33e9d4fac3464e3a84a313a17246b1f1cf21cb5710_arm64",
"8Base-RHOL-5.4:openshift-logging/fluentd-rhel8@sha256:ea07da04f06df6bf0d9dd981a3795dfdb51eca83f59a6291114650e3e98a9e71_ppc64le",
"8Base-RHOL-5.4:openshift-logging/kibana6-rhel8@sha256:167ee6a645c7397bde3d12e9b9685279505c25ffb3bda11ae68bdf0b34229f2e_amd64",
"8Base-RHOL-5.4:openshift-logging/kibana6-rhel8@sha256:4a029733337b10bb9fb8d98c91abc5451ca0b98713c8f2271a675251e025b6c0_s390x",
"8Base-RHOL-5.4:openshift-logging/kibana6-rhel8@sha256:812f4380024dc3df42310ad14d173d390f2bdf4b3dbdb02550c00552534f79ce_ppc64le",
"8Base-RHOL-5.4:openshift-logging/kibana6-rhel8@sha256:958ba6856cc76fc77d34a9c78888eb37b9c39b83a2f044ef2337610560ba9323_arm64",
"8Base-RHOL-5.4:openshift-logging/log-file-metric-exporter-rhel8@sha256:043e4d3481fbfedf3115e18fade3a2f33b891b0d9a641bf973c2c7f492cb0489_amd64",
"8Base-RHOL-5.4:openshift-logging/log-file-metric-exporter-rhel8@sha256:4fe26adac10cf20b83812e4fa513231d7e1fd4b6cd4e09d4fd425c391885cfcc_ppc64le",
"8Base-RHOL-5.4:openshift-logging/log-file-metric-exporter-rhel8@sha256:85827db708c0927027435b05732cc7e34b0675eaa86665c91efacc76aecd6227_s390x",
"8Base-RHOL-5.4:openshift-logging/log-file-metric-exporter-rhel8@sha256:a5285db276a5545fdbaa9f0743a49ba72ce1c5da61b5cccc9422320a03e08bea_arm64",
"8Base-RHOL-5.4:openshift-logging/logging-curator5-rhel8@sha256:0b28415b8115ff3216002faa5c9ecf3c46995085e3364c8028cb544cb4787ed2_arm64",
"8Base-RHOL-5.4:openshift-logging/logging-curator5-rhel8@sha256:7016e867ddfe970d6d2d54d5615e8f613786bcfbfe52ebf3139c07da3d5a53db_s390x",
"8Base-RHOL-5.4:openshift-logging/logging-curator5-rhel8@sha256:94c435f45e9dbd9fa633e137356cfb1d6ac2d4dd7574b359367665da42d6203d_amd64",
"8Base-RHOL-5.4:openshift-logging/logging-curator5-rhel8@sha256:d24afbc9228ef7f3d0a6fd716a3a57abde88a1f65d149c7df4f959a775b670bd_ppc64le",
"8Base-RHOL-5.4:openshift-logging/logging-loki-rhel8@sha256:40d4989b4733f54a01a73831fa00b12e49fff69c75138902eac0d894d432e4d9_arm64",
"8Base-RHOL-5.4:openshift-logging/logging-loki-rhel8@sha256:b444af35118c24bde0dfa2a8825ba427b3345451f6081133477254213a3460f0_amd64",
"8Base-RHOL-5.4:openshift-logging/logging-loki-rhel8@sha256:cfe410d498940a95da631ea213866a96a119034d78d5d53f7f9c7e8da56e0f45_s390x",
"8Base-RHOL-5.4:openshift-logging/logging-loki-rhel8@sha256:f7979c82140a0ab1a97c9f3151465bfbd9f79c4db9b0cc20f974cd7b890f074f_ppc64le",
"8Base-RHOL-5.4:openshift-logging/loki-operator-bundle@sha256:02cceda51028eb55a3b82aa5275f03dbaf8f8f9ab3fd27c650d1a07a93044e37_amd64",
"8Base-RHOL-5.4:openshift-logging/loki-rhel8-operator@sha256:0f1be625b4012820f7ac439fed000808d7acb4e885ace16014461bf802be935a_s390x",
"8Base-RHOL-5.4:openshift-logging/loki-rhel8-operator@sha256:28f45a80846c5e11638fb479be42cafcb2bdb3af94dff3629a820de295cbe31d_ppc64le",
"8Base-RHOL-5.4:openshift-logging/loki-rhel8-operator@sha256:df7de1e9f5a4396df6f14b1c4b6bb2a9ae4bc50d82cbc954ec535c26e8df2cb1_arm64",
"8Base-RHOL-5.4:openshift-logging/loki-rhel8-operator@sha256:f8a35557c9eb27f703ffa9320a9d39a2361d93fdb0b8c874d97da458048e7eec_amd64",
"8Base-RHOL-5.4:openshift-logging/lokistack-gateway-rhel8@sha256:178fcf44e6a1fa90d27a40565f69ae2880622b017bc8d9e33a441353eb45609d_arm64",
"8Base-RHOL-5.4:openshift-logging/lokistack-gateway-rhel8@sha256:7b0c2c99cf0f710166b749dbfd7f544caf5fe35516c743fca251c7cec896e1d6_ppc64le",
"8Base-RHOL-5.4:openshift-logging/lokistack-gateway-rhel8@sha256:9c4959525339b607a98889d56f4c26f2e4af25032466c439903a7f1cb593f721_s390x",
"8Base-RHOL-5.4:openshift-logging/lokistack-gateway-rhel8@sha256:a967d5be7d3a6fdd75965a5f9a7396a52cdcb37d6a8521c440b0b5c650c230f2_amd64",
"8Base-RHOL-5.4:openshift-logging/opa-openshift-rhel8@sha256:1b106af51bb50f1ce4db13ebbf6f6c67eae45611c0d5dc46476f1dfaa8aca166_arm64",
"8Base-RHOL-5.4:openshift-logging/opa-openshift-rhel8@sha256:92ddf24824c8f8ae93dec07184c446615b635389472d3a525df72da07c8d9b97_ppc64le",
"8Base-RHOL-5.4:openshift-logging/opa-openshift-rhel8@sha256:9fd0c5df785564b35392705a479d6fb9245e3329719438c76c0282f9ef2f2d55_amd64",
"8Base-RHOL-5.4:openshift-logging/opa-openshift-rhel8@sha256:be8ba0e4c5f24c7b4549700a25c89b10d4b2fc0b0e3888163bb53827914e95c1_s390x",
"8Base-RHOL-5.4:openshift-logging/vector-rhel8@sha256:48bb136d11b44428c87489978873370848ac2b219b107ef7e81ab679db095234_s390x",
"8Base-RHOL-5.4:openshift-logging/vector-rhel8@sha256:48f0317d167710ff5b0787c73f6b7dd0249e7c8d2d001159132a97299c30b62d_ppc64le",
"8Base-RHOL-5.4:openshift-logging/vector-rhel8@sha256:bde21c03fb831d01e85b28245881f7e3f2bb2ef6d2671eb92b2e0cc4bd3898e2_arm64",
"8Base-RHOL-5.4:openshift-logging/vector-rhel8@sha256:cc6b9c6a344aac56c99c96b5120ffe2dad479000b34964ff89d030ae762bda43_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "jackson-databind: use of deeply nested arrays"
}
]
}
RHSA-2023:0795
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Submariner 0.13.3 packages that fix various bugs and add various enhancements that are now available for Red Hat Advanced Cluster Management for Kubernetes version 2.6\n\nRed Hat Product Security has rated this update as having a security impact\nof Moderate. A Common Vulnerability Scoring System (CVSS) base score,\nwhich gives a detailed severity rating, is available for each vulnerability\nfrom the CVE links in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Submariner enables direct networking between pods and services on different Kubernetes clusters that are either on-premises or in the cloud.\n\nFor more information about Submariner, see the Submariner open source community website at: https://submariner.io/.\n\nThis advisory contains bug fixes and enhancements to the Submariner container images.\n\nSecurity fixes:\n\n* CVE-2022-32149 golang: golang.org/x/text/language: ParseAcceptLanguage takes a long time to parse complex tags\n\nBugs addressed:\n\n* Build Submariner 0.13.3 (ACM-2226)\n* Verify Submariner with OCP 4.12 (ACM-2435)\n* Submariner does not support cluster \"kube-proxy ipvs mode\" (ACM-2821)",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2023:0795",
"url": "https://access.redhat.com/errata/RHSA-2023:0795"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#moderate",
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "2134010",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2134010"
},
{
"category": "external",
"summary": "ACM-2226",
"url": "https://issues.redhat.com/browse/ACM-2226"
},
{
"category": "external",
"summary": "ACM-2435",
"url": "https://issues.redhat.com/browse/ACM-2435"
},
{
"category": "external",
"summary": "ACM-2821",
"url": "https://issues.redhat.com/browse/ACM-2821"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2023/rhsa-2023_0795.json"
}
],
"title": "Red Hat Security Advisory: RHSA: Submariner 0.13.3 - security updates and bug fixes",
"tracking": {
"current_release_date": "2025-10-10T01:53:37+00:00",
"generator": {
"date": "2025-10-10T01:53:37+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.9"
}
},
"id": "RHSA-2023:0795",
"initial_release_date": "2023-02-15T21:46:51+00:00",
"revision_history": [
{
"date": "2023-02-15T21:46:51+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2023-02-15T21:46:51+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-10-10T01:53:37+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8",
"product": {
"name": "Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8",
"product_id": "8Base-RHACM-2.6",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:acm:2.6::el8"
}
}
}
],
"category": "product_family",
"name": "Red Hat ACM"
},
{
"branches": [
{
"category": "product_version",
"name": "rhacm2/lighthouse-agent-rhel8@sha256:44576acbfff4321af54d8a8c15b0122d28ffbec8b88ebbdd32ed2dca3d4397c3_arm64",
"product": {
"name": "rhacm2/lighthouse-agent-rhel8@sha256:44576acbfff4321af54d8a8c15b0122d28ffbec8b88ebbdd32ed2dca3d4397c3_arm64",
"product_id": "rhacm2/lighthouse-agent-rhel8@sha256:44576acbfff4321af54d8a8c15b0122d28ffbec8b88ebbdd32ed2dca3d4397c3_arm64",
"product_identification_helper": {
"purl": "pkg:oci/lighthouse-agent-rhel8@sha256:44576acbfff4321af54d8a8c15b0122d28ffbec8b88ebbdd32ed2dca3d4397c3?arch=arm64\u0026repository_url=registry.redhat.io/rhacm2/lighthouse-agent-rhel8\u0026tag=v0.13.3-7"
}
}
},
{
"category": "product_version",
"name": "rhacm2/lighthouse-coredns-rhel8@sha256:3e4d5bf90e110c3cf3e988f572d227575727bf1769c02d132272b5ff5051cfb8_arm64",
"product": {
"name": "rhacm2/lighthouse-coredns-rhel8@sha256:3e4d5bf90e110c3cf3e988f572d227575727bf1769c02d132272b5ff5051cfb8_arm64",
"product_id": "rhacm2/lighthouse-coredns-rhel8@sha256:3e4d5bf90e110c3cf3e988f572d227575727bf1769c02d132272b5ff5051cfb8_arm64",
"product_identification_helper": {
"purl": "pkg:oci/lighthouse-coredns-rhel8@sha256:3e4d5bf90e110c3cf3e988f572d227575727bf1769c02d132272b5ff5051cfb8?arch=arm64\u0026repository_url=registry.redhat.io/rhacm2/lighthouse-coredns-rhel8\u0026tag=v0.13.3-7"
}
}
},
{
"category": "product_version",
"name": "rhacm2/nettest-rhel8@sha256:a1197fa88e7cbaac9c4c80e13d39eda732d9ff09579d7d2e96a96bb5c005e695_arm64",
"product": {
"name": "rhacm2/nettest-rhel8@sha256:a1197fa88e7cbaac9c4c80e13d39eda732d9ff09579d7d2e96a96bb5c005e695_arm64",
"product_id": "rhacm2/nettest-rhel8@sha256:a1197fa88e7cbaac9c4c80e13d39eda732d9ff09579d7d2e96a96bb5c005e695_arm64",
"product_identification_helper": {
"purl": "pkg:oci/nettest-rhel8@sha256:a1197fa88e7cbaac9c4c80e13d39eda732d9ff09579d7d2e96a96bb5c005e695?arch=arm64\u0026repository_url=registry.redhat.io/rhacm2/nettest-rhel8\u0026tag=v0.13.3-7"
}
}
},
{
"category": "product_version",
"name": "rhacm2/subctl-rhel8@sha256:1f4051093fb1128e7266a4baff92bb7e9864825d51947265bed4ae7c20a3f99c_arm64",
"product": {
"name": "rhacm2/subctl-rhel8@sha256:1f4051093fb1128e7266a4baff92bb7e9864825d51947265bed4ae7c20a3f99c_arm64",
"product_id": "rhacm2/subctl-rhel8@sha256:1f4051093fb1128e7266a4baff92bb7e9864825d51947265bed4ae7c20a3f99c_arm64",
"product_identification_helper": {
"purl": "pkg:oci/subctl-rhel8@sha256:1f4051093fb1128e7266a4baff92bb7e9864825d51947265bed4ae7c20a3f99c?arch=arm64\u0026repository_url=registry.redhat.io/rhacm2/subctl-rhel8\u0026tag=v0.13.3-6"
}
}
},
{
"category": "product_version",
"name": "rhacm2/submariner-gateway-rhel8@sha256:5cd02e62ae81fea9887c484b4b4f52712b3cdfe0bff8a826e2c1c8e813df50bf_arm64",
"product": {
"name": "rhacm2/submariner-gateway-rhel8@sha256:5cd02e62ae81fea9887c484b4b4f52712b3cdfe0bff8a826e2c1c8e813df50bf_arm64",
"product_id": "rhacm2/submariner-gateway-rhel8@sha256:5cd02e62ae81fea9887c484b4b4f52712b3cdfe0bff8a826e2c1c8e813df50bf_arm64",
"product_identification_helper": {
"purl": "pkg:oci/submariner-gateway-rhel8@sha256:5cd02e62ae81fea9887c484b4b4f52712b3cdfe0bff8a826e2c1c8e813df50bf?arch=arm64\u0026repository_url=registry.redhat.io/rhacm2/submariner-gateway-rhel8\u0026tag=v0.13.3-6"
}
}
},
{
"category": "product_version",
"name": "rhacm2/submariner-globalnet-rhel8@sha256:dc50bdc2082127c9df0da5b539ac61d244250eb93d7fcfd3a9d2fdbb10603695_arm64",
"product": {
"name": "rhacm2/submariner-globalnet-rhel8@sha256:dc50bdc2082127c9df0da5b539ac61d244250eb93d7fcfd3a9d2fdbb10603695_arm64",
"product_id": "rhacm2/submariner-globalnet-rhel8@sha256:dc50bdc2082127c9df0da5b539ac61d244250eb93d7fcfd3a9d2fdbb10603695_arm64",
"product_identification_helper": {
"purl": "pkg:oci/submariner-globalnet-rhel8@sha256:dc50bdc2082127c9df0da5b539ac61d244250eb93d7fcfd3a9d2fdbb10603695?arch=arm64\u0026repository_url=registry.redhat.io/rhacm2/submariner-globalnet-rhel8\u0026tag=v0.13.3-7"
}
}
},
{
"category": "product_version",
"name": "rhacm2/submariner-networkplugin-syncer-rhel8@sha256:7076fac5d7944c7d4a0fa0e89629372466baf9fc5b4b8e5c31cc71b80fac9a69_arm64",
"product": {
"name": "rhacm2/submariner-networkplugin-syncer-rhel8@sha256:7076fac5d7944c7d4a0fa0e89629372466baf9fc5b4b8e5c31cc71b80fac9a69_arm64",
"product_id": "rhacm2/submariner-networkplugin-syncer-rhel8@sha256:7076fac5d7944c7d4a0fa0e89629372466baf9fc5b4b8e5c31cc71b80fac9a69_arm64",
"product_identification_helper": {
"purl": "pkg:oci/submariner-networkplugin-syncer-rhel8@sha256:7076fac5d7944c7d4a0fa0e89629372466baf9fc5b4b8e5c31cc71b80fac9a69?arch=arm64\u0026repository_url=registry.redhat.io/rhacm2/submariner-networkplugin-syncer-rhel8\u0026tag=v0.13.3-6"
}
}
},
{
"category": "product_version",
"name": "rhacm2/submariner-operator-bundle@sha256:7dacd7a2b26ee22f62851127de612e9c18696c7db4ed06a244ce635b12cb89e2_arm64",
"product": {
"name": "rhacm2/submariner-operator-bundle@sha256:7dacd7a2b26ee22f62851127de612e9c18696c7db4ed06a244ce635b12cb89e2_arm64",
"product_id": "rhacm2/submariner-operator-bundle@sha256:7dacd7a2b26ee22f62851127de612e9c18696c7db4ed06a244ce635b12cb89e2_arm64",
"product_identification_helper": {
"purl": "pkg:oci/submariner-operator-bundle@sha256:7dacd7a2b26ee22f62851127de612e9c18696c7db4ed06a244ce635b12cb89e2?arch=arm64\u0026repository_url=registry.redhat.io/rhacm2/submariner-operator-bundle\u0026tag=v0.13.3-9"
}
}
},
{
"category": "product_version",
"name": "rhacm2/submariner-rhel8-operator@sha256:db99ef3c89ac45501a7b7fc64c6f853df5f781b2200a758e71debc4dadaf2fef_arm64",
"product": {
"name": "rhacm2/submariner-rhel8-operator@sha256:db99ef3c89ac45501a7b7fc64c6f853df5f781b2200a758e71debc4dadaf2fef_arm64",
"product_id": "rhacm2/submariner-rhel8-operator@sha256:db99ef3c89ac45501a7b7fc64c6f853df5f781b2200a758e71debc4dadaf2fef_arm64",
"product_identification_helper": {
"purl": "pkg:oci/submariner-rhel8-operator@sha256:db99ef3c89ac45501a7b7fc64c6f853df5f781b2200a758e71debc4dadaf2fef?arch=arm64\u0026repository_url=registry.redhat.io/rhacm2/submariner-rhel8-operator\u0026tag=v0.13.3-6"
}
}
},
{
"category": "product_version",
"name": "rhacm2/submariner-route-agent-rhel8@sha256:007edcf9dd166ec8c1b30f60755bcfe02dee03c2d8e539fba06615b8a3eefd58_arm64",
"product": {
"name": "rhacm2/submariner-route-agent-rhel8@sha256:007edcf9dd166ec8c1b30f60755bcfe02dee03c2d8e539fba06615b8a3eefd58_arm64",
"product_id": "rhacm2/submariner-route-agent-rhel8@sha256:007edcf9dd166ec8c1b30f60755bcfe02dee03c2d8e539fba06615b8a3eefd58_arm64",
"product_identification_helper": {
"purl": "pkg:oci/submariner-route-agent-rhel8@sha256:007edcf9dd166ec8c1b30f60755bcfe02dee03c2d8e539fba06615b8a3eefd58?arch=arm64\u0026repository_url=registry.redhat.io/rhacm2/submariner-route-agent-rhel8\u0026tag=v0.13.3-7"
}
}
}
],
"category": "architecture",
"name": "arm64"
},
{
"branches": [
{
"category": "product_version",
"name": "rhacm2/lighthouse-agent-rhel8@sha256:c45d4a19f6492a1d2d72375c12d3dfc8a7a2349ccc8b581ad7df299bd63ae0a9_ppc64le",
"product": {
"name": "rhacm2/lighthouse-agent-rhel8@sha256:c45d4a19f6492a1d2d72375c12d3dfc8a7a2349ccc8b581ad7df299bd63ae0a9_ppc64le",
"product_id": "rhacm2/lighthouse-agent-rhel8@sha256:c45d4a19f6492a1d2d72375c12d3dfc8a7a2349ccc8b581ad7df299bd63ae0a9_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/lighthouse-agent-rhel8@sha256:c45d4a19f6492a1d2d72375c12d3dfc8a7a2349ccc8b581ad7df299bd63ae0a9?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/lighthouse-agent-rhel8\u0026tag=v0.13.3-7"
}
}
},
{
"category": "product_version",
"name": "rhacm2/lighthouse-coredns-rhel8@sha256:a842e4824cd39bc438c38889896dd33372b644968b5e29b614c9529b2e0696cc_ppc64le",
"product": {
"name": "rhacm2/lighthouse-coredns-rhel8@sha256:a842e4824cd39bc438c38889896dd33372b644968b5e29b614c9529b2e0696cc_ppc64le",
"product_id": "rhacm2/lighthouse-coredns-rhel8@sha256:a842e4824cd39bc438c38889896dd33372b644968b5e29b614c9529b2e0696cc_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/lighthouse-coredns-rhel8@sha256:a842e4824cd39bc438c38889896dd33372b644968b5e29b614c9529b2e0696cc?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/lighthouse-coredns-rhel8\u0026tag=v0.13.3-7"
}
}
},
{
"category": "product_version",
"name": "rhacm2/nettest-rhel8@sha256:623848329900b7fe55763dd08bacb5fde147f0b9e8b77487f1b99a8b713d309e_ppc64le",
"product": {
"name": "rhacm2/nettest-rhel8@sha256:623848329900b7fe55763dd08bacb5fde147f0b9e8b77487f1b99a8b713d309e_ppc64le",
"product_id": "rhacm2/nettest-rhel8@sha256:623848329900b7fe55763dd08bacb5fde147f0b9e8b77487f1b99a8b713d309e_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/nettest-rhel8@sha256:623848329900b7fe55763dd08bacb5fde147f0b9e8b77487f1b99a8b713d309e?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/nettest-rhel8\u0026tag=v0.13.3-7"
}
}
},
{
"category": "product_version",
"name": "rhacm2/subctl-rhel8@sha256:2e17954946ea1fd3ec53791a1b6dfdfb59be7c24fd78816b0ba721c069350c38_ppc64le",
"product": {
"name": "rhacm2/subctl-rhel8@sha256:2e17954946ea1fd3ec53791a1b6dfdfb59be7c24fd78816b0ba721c069350c38_ppc64le",
"product_id": "rhacm2/subctl-rhel8@sha256:2e17954946ea1fd3ec53791a1b6dfdfb59be7c24fd78816b0ba721c069350c38_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/subctl-rhel8@sha256:2e17954946ea1fd3ec53791a1b6dfdfb59be7c24fd78816b0ba721c069350c38?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/subctl-rhel8\u0026tag=v0.13.3-6"
}
}
},
{
"category": "product_version",
"name": "rhacm2/submariner-gateway-rhel8@sha256:1abe2013043c37997233ed7d8785c4607be1f21ed25f130f2141f8a771f0e9d5_ppc64le",
"product": {
"name": "rhacm2/submariner-gateway-rhel8@sha256:1abe2013043c37997233ed7d8785c4607be1f21ed25f130f2141f8a771f0e9d5_ppc64le",
"product_id": "rhacm2/submariner-gateway-rhel8@sha256:1abe2013043c37997233ed7d8785c4607be1f21ed25f130f2141f8a771f0e9d5_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/submariner-gateway-rhel8@sha256:1abe2013043c37997233ed7d8785c4607be1f21ed25f130f2141f8a771f0e9d5?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/submariner-gateway-rhel8\u0026tag=v0.13.3-6"
}
}
},
{
"category": "product_version",
"name": "rhacm2/submariner-globalnet-rhel8@sha256:4ee144a663c95a2fcc1fbfc0b308cf7033a5ded97a28a5aec9f35250df812661_ppc64le",
"product": {
"name": "rhacm2/submariner-globalnet-rhel8@sha256:4ee144a663c95a2fcc1fbfc0b308cf7033a5ded97a28a5aec9f35250df812661_ppc64le",
"product_id": "rhacm2/submariner-globalnet-rhel8@sha256:4ee144a663c95a2fcc1fbfc0b308cf7033a5ded97a28a5aec9f35250df812661_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/submariner-globalnet-rhel8@sha256:4ee144a663c95a2fcc1fbfc0b308cf7033a5ded97a28a5aec9f35250df812661?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/submariner-globalnet-rhel8\u0026tag=v0.13.3-7"
}
}
},
{
"category": "product_version",
"name": "rhacm2/submariner-networkplugin-syncer-rhel8@sha256:1ef8557fc7489a74092c22e5cf96ebbec1575f72177534de2ae095ab96927a5a_ppc64le",
"product": {
"name": "rhacm2/submariner-networkplugin-syncer-rhel8@sha256:1ef8557fc7489a74092c22e5cf96ebbec1575f72177534de2ae095ab96927a5a_ppc64le",
"product_id": "rhacm2/submariner-networkplugin-syncer-rhel8@sha256:1ef8557fc7489a74092c22e5cf96ebbec1575f72177534de2ae095ab96927a5a_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/submariner-networkplugin-syncer-rhel8@sha256:1ef8557fc7489a74092c22e5cf96ebbec1575f72177534de2ae095ab96927a5a?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/submariner-networkplugin-syncer-rhel8\u0026tag=v0.13.3-6"
}
}
},
{
"category": "product_version",
"name": "rhacm2/submariner-operator-bundle@sha256:1e3de5b269f4454e822201ea7666bacab9c2962f454368b1967dd583cab5c9bc_ppc64le",
"product": {
"name": "rhacm2/submariner-operator-bundle@sha256:1e3de5b269f4454e822201ea7666bacab9c2962f454368b1967dd583cab5c9bc_ppc64le",
"product_id": "rhacm2/submariner-operator-bundle@sha256:1e3de5b269f4454e822201ea7666bacab9c2962f454368b1967dd583cab5c9bc_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/submariner-operator-bundle@sha256:1e3de5b269f4454e822201ea7666bacab9c2962f454368b1967dd583cab5c9bc?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/submariner-operator-bundle\u0026tag=v0.13.3-9"
}
}
},
{
"category": "product_version",
"name": "rhacm2/submariner-rhel8-operator@sha256:e54bed5d1233969accf57b3b11f4d934040d7d408440d900d071f8919b60affa_ppc64le",
"product": {
"name": "rhacm2/submariner-rhel8-operator@sha256:e54bed5d1233969accf57b3b11f4d934040d7d408440d900d071f8919b60affa_ppc64le",
"product_id": "rhacm2/submariner-rhel8-operator@sha256:e54bed5d1233969accf57b3b11f4d934040d7d408440d900d071f8919b60affa_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/submariner-rhel8-operator@sha256:e54bed5d1233969accf57b3b11f4d934040d7d408440d900d071f8919b60affa?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/submariner-rhel8-operator\u0026tag=v0.13.3-6"
}
}
},
{
"category": "product_version",
"name": "rhacm2/submariner-route-agent-rhel8@sha256:a08eecb9e361d8466db2adeafdf203fdc199a9d269910741909f73c341b28f4a_ppc64le",
"product": {
"name": "rhacm2/submariner-route-agent-rhel8@sha256:a08eecb9e361d8466db2adeafdf203fdc199a9d269910741909f73c341b28f4a_ppc64le",
"product_id": "rhacm2/submariner-route-agent-rhel8@sha256:a08eecb9e361d8466db2adeafdf203fdc199a9d269910741909f73c341b28f4a_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/submariner-route-agent-rhel8@sha256:a08eecb9e361d8466db2adeafdf203fdc199a9d269910741909f73c341b28f4a?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/submariner-route-agent-rhel8\u0026tag=v0.13.3-7"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "rhacm2/lighthouse-agent-rhel8@sha256:fde7510f372c447d265b01dcd0e36c7e53f0be4ab109b3d4a81b3dd857d3a127_s390x",
"product": {
"name": "rhacm2/lighthouse-agent-rhel8@sha256:fde7510f372c447d265b01dcd0e36c7e53f0be4ab109b3d4a81b3dd857d3a127_s390x",
"product_id": "rhacm2/lighthouse-agent-rhel8@sha256:fde7510f372c447d265b01dcd0e36c7e53f0be4ab109b3d4a81b3dd857d3a127_s390x",
"product_identification_helper": {
"purl": "pkg:oci/lighthouse-agent-rhel8@sha256:fde7510f372c447d265b01dcd0e36c7e53f0be4ab109b3d4a81b3dd857d3a127?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/lighthouse-agent-rhel8\u0026tag=v0.13.3-7"
}
}
},
{
"category": "product_version",
"name": "rhacm2/lighthouse-coredns-rhel8@sha256:e90e99636dce63fdc6323203694eac2aea9d7e2a0578ed444fce67144838b7ca_s390x",
"product": {
"name": "rhacm2/lighthouse-coredns-rhel8@sha256:e90e99636dce63fdc6323203694eac2aea9d7e2a0578ed444fce67144838b7ca_s390x",
"product_id": "rhacm2/lighthouse-coredns-rhel8@sha256:e90e99636dce63fdc6323203694eac2aea9d7e2a0578ed444fce67144838b7ca_s390x",
"product_identification_helper": {
"purl": "pkg:oci/lighthouse-coredns-rhel8@sha256:e90e99636dce63fdc6323203694eac2aea9d7e2a0578ed444fce67144838b7ca?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/lighthouse-coredns-rhel8\u0026tag=v0.13.3-7"
}
}
},
{
"category": "product_version",
"name": "rhacm2/nettest-rhel8@sha256:84cb8594ccf7876483cee84195d704d34721f566e6a36070f7eecaca10fb2c88_s390x",
"product": {
"name": "rhacm2/nettest-rhel8@sha256:84cb8594ccf7876483cee84195d704d34721f566e6a36070f7eecaca10fb2c88_s390x",
"product_id": "rhacm2/nettest-rhel8@sha256:84cb8594ccf7876483cee84195d704d34721f566e6a36070f7eecaca10fb2c88_s390x",
"product_identification_helper": {
"purl": "pkg:oci/nettest-rhel8@sha256:84cb8594ccf7876483cee84195d704d34721f566e6a36070f7eecaca10fb2c88?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/nettest-rhel8\u0026tag=v0.13.3-7"
}
}
},
{
"category": "product_version",
"name": "rhacm2/subctl-rhel8@sha256:18b4fa76cfef84236c8453eb0cd6b1c67d1017732fa1d5722931d8616c365cfe_s390x",
"product": {
"name": "rhacm2/subctl-rhel8@sha256:18b4fa76cfef84236c8453eb0cd6b1c67d1017732fa1d5722931d8616c365cfe_s390x",
"product_id": "rhacm2/subctl-rhel8@sha256:18b4fa76cfef84236c8453eb0cd6b1c67d1017732fa1d5722931d8616c365cfe_s390x",
"product_identification_helper": {
"purl": "pkg:oci/subctl-rhel8@sha256:18b4fa76cfef84236c8453eb0cd6b1c67d1017732fa1d5722931d8616c365cfe?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/subctl-rhel8\u0026tag=v0.13.3-6"
}
}
},
{
"category": "product_version",
"name": "rhacm2/submariner-gateway-rhel8@sha256:5100f65e2591023eb9da4512b464c49bbf7f56d1a78587e5da790d6cb52cfd7c_s390x",
"product": {
"name": "rhacm2/submariner-gateway-rhel8@sha256:5100f65e2591023eb9da4512b464c49bbf7f56d1a78587e5da790d6cb52cfd7c_s390x",
"product_id": "rhacm2/submariner-gateway-rhel8@sha256:5100f65e2591023eb9da4512b464c49bbf7f56d1a78587e5da790d6cb52cfd7c_s390x",
"product_identification_helper": {
"purl": "pkg:oci/submariner-gateway-rhel8@sha256:5100f65e2591023eb9da4512b464c49bbf7f56d1a78587e5da790d6cb52cfd7c?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/submariner-gateway-rhel8\u0026tag=v0.13.3-6"
}
}
},
{
"category": "product_version",
"name": "rhacm2/submariner-globalnet-rhel8@sha256:fb728331ee01f6fb72a54b5c5b5886ec08f014a384c1b49beec692439ec59630_s390x",
"product": {
"name": "rhacm2/submariner-globalnet-rhel8@sha256:fb728331ee01f6fb72a54b5c5b5886ec08f014a384c1b49beec692439ec59630_s390x",
"product_id": "rhacm2/submariner-globalnet-rhel8@sha256:fb728331ee01f6fb72a54b5c5b5886ec08f014a384c1b49beec692439ec59630_s390x",
"product_identification_helper": {
"purl": "pkg:oci/submariner-globalnet-rhel8@sha256:fb728331ee01f6fb72a54b5c5b5886ec08f014a384c1b49beec692439ec59630?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/submariner-globalnet-rhel8\u0026tag=v0.13.3-7"
}
}
},
{
"category": "product_version",
"name": "rhacm2/submariner-networkplugin-syncer-rhel8@sha256:50281b32dc626b66b8b38bc3fa97d799ab13b66029768e60c06d3fa5d9a29bf1_s390x",
"product": {
"name": "rhacm2/submariner-networkplugin-syncer-rhel8@sha256:50281b32dc626b66b8b38bc3fa97d799ab13b66029768e60c06d3fa5d9a29bf1_s390x",
"product_id": "rhacm2/submariner-networkplugin-syncer-rhel8@sha256:50281b32dc626b66b8b38bc3fa97d799ab13b66029768e60c06d3fa5d9a29bf1_s390x",
"product_identification_helper": {
"purl": "pkg:oci/submariner-networkplugin-syncer-rhel8@sha256:50281b32dc626b66b8b38bc3fa97d799ab13b66029768e60c06d3fa5d9a29bf1?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/submariner-networkplugin-syncer-rhel8\u0026tag=v0.13.3-6"
}
}
},
{
"category": "product_version",
"name": "rhacm2/submariner-operator-bundle@sha256:2d28ae6efe8ba1999f5ae960cc1799465188b03514697c0192be53c4a7d1e8f2_s390x",
"product": {
"name": "rhacm2/submariner-operator-bundle@sha256:2d28ae6efe8ba1999f5ae960cc1799465188b03514697c0192be53c4a7d1e8f2_s390x",
"product_id": "rhacm2/submariner-operator-bundle@sha256:2d28ae6efe8ba1999f5ae960cc1799465188b03514697c0192be53c4a7d1e8f2_s390x",
"product_identification_helper": {
"purl": "pkg:oci/submariner-operator-bundle@sha256:2d28ae6efe8ba1999f5ae960cc1799465188b03514697c0192be53c4a7d1e8f2?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/submariner-operator-bundle\u0026tag=v0.13.3-9"
}
}
},
{
"category": "product_version",
"name": "rhacm2/submariner-rhel8-operator@sha256:fc6f14a4af741d3de8c0de1859fc0925d66673b5b7ced139b758b51a52307c5a_s390x",
"product": {
"name": "rhacm2/submariner-rhel8-operator@sha256:fc6f14a4af741d3de8c0de1859fc0925d66673b5b7ced139b758b51a52307c5a_s390x",
"product_id": "rhacm2/submariner-rhel8-operator@sha256:fc6f14a4af741d3de8c0de1859fc0925d66673b5b7ced139b758b51a52307c5a_s390x",
"product_identification_helper": {
"purl": "pkg:oci/submariner-rhel8-operator@sha256:fc6f14a4af741d3de8c0de1859fc0925d66673b5b7ced139b758b51a52307c5a?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/submariner-rhel8-operator\u0026tag=v0.13.3-6"
}
}
},
{
"category": "product_version",
"name": "rhacm2/submariner-route-agent-rhel8@sha256:0b40af2abd40a0d9220fd7311770cbbf0dddbc58b5347399c13fa92dae8dc2be_s390x",
"product": {
"name": "rhacm2/submariner-route-agent-rhel8@sha256:0b40af2abd40a0d9220fd7311770cbbf0dddbc58b5347399c13fa92dae8dc2be_s390x",
"product_id": "rhacm2/submariner-route-agent-rhel8@sha256:0b40af2abd40a0d9220fd7311770cbbf0dddbc58b5347399c13fa92dae8dc2be_s390x",
"product_identification_helper": {
"purl": "pkg:oci/submariner-route-agent-rhel8@sha256:0b40af2abd40a0d9220fd7311770cbbf0dddbc58b5347399c13fa92dae8dc2be?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/submariner-route-agent-rhel8\u0026tag=v0.13.3-7"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "rhacm2/lighthouse-agent-rhel8@sha256:6f8f3c288619a58ac723cde85df5232efac7f5ccfd516cb3996b35304d11e7f5_amd64",
"product": {
"name": "rhacm2/lighthouse-agent-rhel8@sha256:6f8f3c288619a58ac723cde85df5232efac7f5ccfd516cb3996b35304d11e7f5_amd64",
"product_id": "rhacm2/lighthouse-agent-rhel8@sha256:6f8f3c288619a58ac723cde85df5232efac7f5ccfd516cb3996b35304d11e7f5_amd64",
"product_identification_helper": {
"purl": "pkg:oci/lighthouse-agent-rhel8@sha256:6f8f3c288619a58ac723cde85df5232efac7f5ccfd516cb3996b35304d11e7f5?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/lighthouse-agent-rhel8\u0026tag=v0.13.3-7"
}
}
},
{
"category": "product_version",
"name": "rhacm2/lighthouse-coredns-rhel8@sha256:3ee425b4f78fe809d50967ae7c66af42c894a1fec5ef194d17eae9fdf5902913_amd64",
"product": {
"name": "rhacm2/lighthouse-coredns-rhel8@sha256:3ee425b4f78fe809d50967ae7c66af42c894a1fec5ef194d17eae9fdf5902913_amd64",
"product_id": "rhacm2/lighthouse-coredns-rhel8@sha256:3ee425b4f78fe809d50967ae7c66af42c894a1fec5ef194d17eae9fdf5902913_amd64",
"product_identification_helper": {
"purl": "pkg:oci/lighthouse-coredns-rhel8@sha256:3ee425b4f78fe809d50967ae7c66af42c894a1fec5ef194d17eae9fdf5902913?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/lighthouse-coredns-rhel8\u0026tag=v0.13.3-7"
}
}
},
{
"category": "product_version",
"name": "rhacm2/nettest-rhel8@sha256:b674ef3a8a7e20b085ceeb9be1f536e0bc0f94dec384e88569105c865fdae224_amd64",
"product": {
"name": "rhacm2/nettest-rhel8@sha256:b674ef3a8a7e20b085ceeb9be1f536e0bc0f94dec384e88569105c865fdae224_amd64",
"product_id": "rhacm2/nettest-rhel8@sha256:b674ef3a8a7e20b085ceeb9be1f536e0bc0f94dec384e88569105c865fdae224_amd64",
"product_identification_helper": {
"purl": "pkg:oci/nettest-rhel8@sha256:b674ef3a8a7e20b085ceeb9be1f536e0bc0f94dec384e88569105c865fdae224?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/nettest-rhel8\u0026tag=v0.13.3-7"
}
}
},
{
"category": "product_version",
"name": "rhacm2/subctl-rhel8@sha256:dc61ab7c1ad6478e9bb30b36a2a356c5ec137bc0d5109e03ba57a76081015715_amd64",
"product": {
"name": "rhacm2/subctl-rhel8@sha256:dc61ab7c1ad6478e9bb30b36a2a356c5ec137bc0d5109e03ba57a76081015715_amd64",
"product_id": "rhacm2/subctl-rhel8@sha256:dc61ab7c1ad6478e9bb30b36a2a356c5ec137bc0d5109e03ba57a76081015715_amd64",
"product_identification_helper": {
"purl": "pkg:oci/subctl-rhel8@sha256:dc61ab7c1ad6478e9bb30b36a2a356c5ec137bc0d5109e03ba57a76081015715?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/subctl-rhel8\u0026tag=v0.13.3-6"
}
}
},
{
"category": "product_version",
"name": "rhacm2/submariner-gateway-rhel8@sha256:93b7d3fbd69a47187a595e09324ef603d8e0c808c99961719a56029776a25dfb_amd64",
"product": {
"name": "rhacm2/submariner-gateway-rhel8@sha256:93b7d3fbd69a47187a595e09324ef603d8e0c808c99961719a56029776a25dfb_amd64",
"product_id": "rhacm2/submariner-gateway-rhel8@sha256:93b7d3fbd69a47187a595e09324ef603d8e0c808c99961719a56029776a25dfb_amd64",
"product_identification_helper": {
"purl": "pkg:oci/submariner-gateway-rhel8@sha256:93b7d3fbd69a47187a595e09324ef603d8e0c808c99961719a56029776a25dfb?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/submariner-gateway-rhel8\u0026tag=v0.13.3-6"
}
}
},
{
"category": "product_version",
"name": "rhacm2/submariner-globalnet-rhel8@sha256:2bc43c6e55f35522be8752d1ae9eb24637a0926f91fa0f6cbf670f23a61b7840_amd64",
"product": {
"name": "rhacm2/submariner-globalnet-rhel8@sha256:2bc43c6e55f35522be8752d1ae9eb24637a0926f91fa0f6cbf670f23a61b7840_amd64",
"product_id": "rhacm2/submariner-globalnet-rhel8@sha256:2bc43c6e55f35522be8752d1ae9eb24637a0926f91fa0f6cbf670f23a61b7840_amd64",
"product_identification_helper": {
"purl": "pkg:oci/submariner-globalnet-rhel8@sha256:2bc43c6e55f35522be8752d1ae9eb24637a0926f91fa0f6cbf670f23a61b7840?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/submariner-globalnet-rhel8\u0026tag=v0.13.3-7"
}
}
},
{
"category": "product_version",
"name": "rhacm2/submariner-networkplugin-syncer-rhel8@sha256:511362c4a5dfa734d0015a355185a86ba6c00a0466f5fb1b469fa00e07858c82_amd64",
"product": {
"name": "rhacm2/submariner-networkplugin-syncer-rhel8@sha256:511362c4a5dfa734d0015a355185a86ba6c00a0466f5fb1b469fa00e07858c82_amd64",
"product_id": "rhacm2/submariner-networkplugin-syncer-rhel8@sha256:511362c4a5dfa734d0015a355185a86ba6c00a0466f5fb1b469fa00e07858c82_amd64",
"product_identification_helper": {
"purl": "pkg:oci/submariner-networkplugin-syncer-rhel8@sha256:511362c4a5dfa734d0015a355185a86ba6c00a0466f5fb1b469fa00e07858c82?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/submariner-networkplugin-syncer-rhel8\u0026tag=v0.13.3-6"
}
}
},
{
"category": "product_version",
"name": "rhacm2/submariner-operator-bundle@sha256:4c9802569b6aad59f01718b5c692f32e3a9a9b35b7b82e69fed5e1f9573dbc17_amd64",
"product": {
"name": "rhacm2/submariner-operator-bundle@sha256:4c9802569b6aad59f01718b5c692f32e3a9a9b35b7b82e69fed5e1f9573dbc17_amd64",
"product_id": "rhacm2/submariner-operator-bundle@sha256:4c9802569b6aad59f01718b5c692f32e3a9a9b35b7b82e69fed5e1f9573dbc17_amd64",
"product_identification_helper": {
"purl": "pkg:oci/submariner-operator-bundle@sha256:4c9802569b6aad59f01718b5c692f32e3a9a9b35b7b82e69fed5e1f9573dbc17?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/submariner-operator-bundle\u0026tag=v0.13.3-9"
}
}
},
{
"category": "product_version",
"name": "rhacm2/submariner-rhel8-operator@sha256:71a36fc0e726890c4a95668d10f024cd31168c26d00d7a22b9f3e26a811af803_amd64",
"product": {
"name": "rhacm2/submariner-rhel8-operator@sha256:71a36fc0e726890c4a95668d10f024cd31168c26d00d7a22b9f3e26a811af803_amd64",
"product_id": "rhacm2/submariner-rhel8-operator@sha256:71a36fc0e726890c4a95668d10f024cd31168c26d00d7a22b9f3e26a811af803_amd64",
"product_identification_helper": {
"purl": "pkg:oci/submariner-rhel8-operator@sha256:71a36fc0e726890c4a95668d10f024cd31168c26d00d7a22b9f3e26a811af803?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/submariner-rhel8-operator\u0026tag=v0.13.3-6"
}
}
},
{
"category": "product_version",
"name": "rhacm2/submariner-route-agent-rhel8@sha256:bb96dde2023a0b8a0d8b33095374ddcc828de182f04033253e716d584c8db623_amd64",
"product": {
"name": "rhacm2/submariner-route-agent-rhel8@sha256:bb96dde2023a0b8a0d8b33095374ddcc828de182f04033253e716d584c8db623_amd64",
"product_id": "rhacm2/submariner-route-agent-rhel8@sha256:bb96dde2023a0b8a0d8b33095374ddcc828de182f04033253e716d584c8db623_amd64",
"product_identification_helper": {
"purl": "pkg:oci/submariner-route-agent-rhel8@sha256:bb96dde2023a0b8a0d8b33095374ddcc828de182f04033253e716d584c8db623?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/submariner-route-agent-rhel8\u0026tag=v0.13.3-7"
}
}
}
],
"category": "architecture",
"name": "amd64"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "rhacm2/lighthouse-agent-rhel8@sha256:44576acbfff4321af54d8a8c15b0122d28ffbec8b88ebbdd32ed2dca3d4397c3_arm64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8",
"product_id": "8Base-RHACM-2.6:rhacm2/lighthouse-agent-rhel8@sha256:44576acbfff4321af54d8a8c15b0122d28ffbec8b88ebbdd32ed2dca3d4397c3_arm64"
},
"product_reference": "rhacm2/lighthouse-agent-rhel8@sha256:44576acbfff4321af54d8a8c15b0122d28ffbec8b88ebbdd32ed2dca3d4397c3_arm64",
"relates_to_product_reference": "8Base-RHACM-2.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhacm2/lighthouse-agent-rhel8@sha256:6f8f3c288619a58ac723cde85df5232efac7f5ccfd516cb3996b35304d11e7f5_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8",
"product_id": "8Base-RHACM-2.6:rhacm2/lighthouse-agent-rhel8@sha256:6f8f3c288619a58ac723cde85df5232efac7f5ccfd516cb3996b35304d11e7f5_amd64"
},
"product_reference": "rhacm2/lighthouse-agent-rhel8@sha256:6f8f3c288619a58ac723cde85df5232efac7f5ccfd516cb3996b35304d11e7f5_amd64",
"relates_to_product_reference": "8Base-RHACM-2.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhacm2/lighthouse-agent-rhel8@sha256:c45d4a19f6492a1d2d72375c12d3dfc8a7a2349ccc8b581ad7df299bd63ae0a9_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8",
"product_id": "8Base-RHACM-2.6:rhacm2/lighthouse-agent-rhel8@sha256:c45d4a19f6492a1d2d72375c12d3dfc8a7a2349ccc8b581ad7df299bd63ae0a9_ppc64le"
},
"product_reference": "rhacm2/lighthouse-agent-rhel8@sha256:c45d4a19f6492a1d2d72375c12d3dfc8a7a2349ccc8b581ad7df299bd63ae0a9_ppc64le",
"relates_to_product_reference": "8Base-RHACM-2.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhacm2/lighthouse-agent-rhel8@sha256:fde7510f372c447d265b01dcd0e36c7e53f0be4ab109b3d4a81b3dd857d3a127_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8",
"product_id": "8Base-RHACM-2.6:rhacm2/lighthouse-agent-rhel8@sha256:fde7510f372c447d265b01dcd0e36c7e53f0be4ab109b3d4a81b3dd857d3a127_s390x"
},
"product_reference": "rhacm2/lighthouse-agent-rhel8@sha256:fde7510f372c447d265b01dcd0e36c7e53f0be4ab109b3d4a81b3dd857d3a127_s390x",
"relates_to_product_reference": "8Base-RHACM-2.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhacm2/lighthouse-coredns-rhel8@sha256:3e4d5bf90e110c3cf3e988f572d227575727bf1769c02d132272b5ff5051cfb8_arm64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8",
"product_id": "8Base-RHACM-2.6:rhacm2/lighthouse-coredns-rhel8@sha256:3e4d5bf90e110c3cf3e988f572d227575727bf1769c02d132272b5ff5051cfb8_arm64"
},
"product_reference": "rhacm2/lighthouse-coredns-rhel8@sha256:3e4d5bf90e110c3cf3e988f572d227575727bf1769c02d132272b5ff5051cfb8_arm64",
"relates_to_product_reference": "8Base-RHACM-2.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhacm2/lighthouse-coredns-rhel8@sha256:3ee425b4f78fe809d50967ae7c66af42c894a1fec5ef194d17eae9fdf5902913_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8",
"product_id": "8Base-RHACM-2.6:rhacm2/lighthouse-coredns-rhel8@sha256:3ee425b4f78fe809d50967ae7c66af42c894a1fec5ef194d17eae9fdf5902913_amd64"
},
"product_reference": "rhacm2/lighthouse-coredns-rhel8@sha256:3ee425b4f78fe809d50967ae7c66af42c894a1fec5ef194d17eae9fdf5902913_amd64",
"relates_to_product_reference": "8Base-RHACM-2.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhacm2/lighthouse-coredns-rhel8@sha256:a842e4824cd39bc438c38889896dd33372b644968b5e29b614c9529b2e0696cc_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8",
"product_id": "8Base-RHACM-2.6:rhacm2/lighthouse-coredns-rhel8@sha256:a842e4824cd39bc438c38889896dd33372b644968b5e29b614c9529b2e0696cc_ppc64le"
},
"product_reference": "rhacm2/lighthouse-coredns-rhel8@sha256:a842e4824cd39bc438c38889896dd33372b644968b5e29b614c9529b2e0696cc_ppc64le",
"relates_to_product_reference": "8Base-RHACM-2.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhacm2/lighthouse-coredns-rhel8@sha256:e90e99636dce63fdc6323203694eac2aea9d7e2a0578ed444fce67144838b7ca_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8",
"product_id": "8Base-RHACM-2.6:rhacm2/lighthouse-coredns-rhel8@sha256:e90e99636dce63fdc6323203694eac2aea9d7e2a0578ed444fce67144838b7ca_s390x"
},
"product_reference": "rhacm2/lighthouse-coredns-rhel8@sha256:e90e99636dce63fdc6323203694eac2aea9d7e2a0578ed444fce67144838b7ca_s390x",
"relates_to_product_reference": "8Base-RHACM-2.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhacm2/nettest-rhel8@sha256:623848329900b7fe55763dd08bacb5fde147f0b9e8b77487f1b99a8b713d309e_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8",
"product_id": "8Base-RHACM-2.6:rhacm2/nettest-rhel8@sha256:623848329900b7fe55763dd08bacb5fde147f0b9e8b77487f1b99a8b713d309e_ppc64le"
},
"product_reference": "rhacm2/nettest-rhel8@sha256:623848329900b7fe55763dd08bacb5fde147f0b9e8b77487f1b99a8b713d309e_ppc64le",
"relates_to_product_reference": "8Base-RHACM-2.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhacm2/nettest-rhel8@sha256:84cb8594ccf7876483cee84195d704d34721f566e6a36070f7eecaca10fb2c88_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8",
"product_id": "8Base-RHACM-2.6:rhacm2/nettest-rhel8@sha256:84cb8594ccf7876483cee84195d704d34721f566e6a36070f7eecaca10fb2c88_s390x"
},
"product_reference": "rhacm2/nettest-rhel8@sha256:84cb8594ccf7876483cee84195d704d34721f566e6a36070f7eecaca10fb2c88_s390x",
"relates_to_product_reference": "8Base-RHACM-2.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhacm2/nettest-rhel8@sha256:a1197fa88e7cbaac9c4c80e13d39eda732d9ff09579d7d2e96a96bb5c005e695_arm64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8",
"product_id": "8Base-RHACM-2.6:rhacm2/nettest-rhel8@sha256:a1197fa88e7cbaac9c4c80e13d39eda732d9ff09579d7d2e96a96bb5c005e695_arm64"
},
"product_reference": "rhacm2/nettest-rhel8@sha256:a1197fa88e7cbaac9c4c80e13d39eda732d9ff09579d7d2e96a96bb5c005e695_arm64",
"relates_to_product_reference": "8Base-RHACM-2.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhacm2/nettest-rhel8@sha256:b674ef3a8a7e20b085ceeb9be1f536e0bc0f94dec384e88569105c865fdae224_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8",
"product_id": "8Base-RHACM-2.6:rhacm2/nettest-rhel8@sha256:b674ef3a8a7e20b085ceeb9be1f536e0bc0f94dec384e88569105c865fdae224_amd64"
},
"product_reference": "rhacm2/nettest-rhel8@sha256:b674ef3a8a7e20b085ceeb9be1f536e0bc0f94dec384e88569105c865fdae224_amd64",
"relates_to_product_reference": "8Base-RHACM-2.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhacm2/subctl-rhel8@sha256:18b4fa76cfef84236c8453eb0cd6b1c67d1017732fa1d5722931d8616c365cfe_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8",
"product_id": "8Base-RHACM-2.6:rhacm2/subctl-rhel8@sha256:18b4fa76cfef84236c8453eb0cd6b1c67d1017732fa1d5722931d8616c365cfe_s390x"
},
"product_reference": "rhacm2/subctl-rhel8@sha256:18b4fa76cfef84236c8453eb0cd6b1c67d1017732fa1d5722931d8616c365cfe_s390x",
"relates_to_product_reference": "8Base-RHACM-2.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhacm2/subctl-rhel8@sha256:1f4051093fb1128e7266a4baff92bb7e9864825d51947265bed4ae7c20a3f99c_arm64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8",
"product_id": "8Base-RHACM-2.6:rhacm2/subctl-rhel8@sha256:1f4051093fb1128e7266a4baff92bb7e9864825d51947265bed4ae7c20a3f99c_arm64"
},
"product_reference": "rhacm2/subctl-rhel8@sha256:1f4051093fb1128e7266a4baff92bb7e9864825d51947265bed4ae7c20a3f99c_arm64",
"relates_to_product_reference": "8Base-RHACM-2.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhacm2/subctl-rhel8@sha256:2e17954946ea1fd3ec53791a1b6dfdfb59be7c24fd78816b0ba721c069350c38_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8",
"product_id": "8Base-RHACM-2.6:rhacm2/subctl-rhel8@sha256:2e17954946ea1fd3ec53791a1b6dfdfb59be7c24fd78816b0ba721c069350c38_ppc64le"
},
"product_reference": "rhacm2/subctl-rhel8@sha256:2e17954946ea1fd3ec53791a1b6dfdfb59be7c24fd78816b0ba721c069350c38_ppc64le",
"relates_to_product_reference": "8Base-RHACM-2.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhacm2/subctl-rhel8@sha256:dc61ab7c1ad6478e9bb30b36a2a356c5ec137bc0d5109e03ba57a76081015715_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8",
"product_id": "8Base-RHACM-2.6:rhacm2/subctl-rhel8@sha256:dc61ab7c1ad6478e9bb30b36a2a356c5ec137bc0d5109e03ba57a76081015715_amd64"
},
"product_reference": "rhacm2/subctl-rhel8@sha256:dc61ab7c1ad6478e9bb30b36a2a356c5ec137bc0d5109e03ba57a76081015715_amd64",
"relates_to_product_reference": "8Base-RHACM-2.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhacm2/submariner-gateway-rhel8@sha256:1abe2013043c37997233ed7d8785c4607be1f21ed25f130f2141f8a771f0e9d5_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8",
"product_id": "8Base-RHACM-2.6:rhacm2/submariner-gateway-rhel8@sha256:1abe2013043c37997233ed7d8785c4607be1f21ed25f130f2141f8a771f0e9d5_ppc64le"
},
"product_reference": "rhacm2/submariner-gateway-rhel8@sha256:1abe2013043c37997233ed7d8785c4607be1f21ed25f130f2141f8a771f0e9d5_ppc64le",
"relates_to_product_reference": "8Base-RHACM-2.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhacm2/submariner-gateway-rhel8@sha256:5100f65e2591023eb9da4512b464c49bbf7f56d1a78587e5da790d6cb52cfd7c_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8",
"product_id": "8Base-RHACM-2.6:rhacm2/submariner-gateway-rhel8@sha256:5100f65e2591023eb9da4512b464c49bbf7f56d1a78587e5da790d6cb52cfd7c_s390x"
},
"product_reference": "rhacm2/submariner-gateway-rhel8@sha256:5100f65e2591023eb9da4512b464c49bbf7f56d1a78587e5da790d6cb52cfd7c_s390x",
"relates_to_product_reference": "8Base-RHACM-2.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhacm2/submariner-gateway-rhel8@sha256:5cd02e62ae81fea9887c484b4b4f52712b3cdfe0bff8a826e2c1c8e813df50bf_arm64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8",
"product_id": "8Base-RHACM-2.6:rhacm2/submariner-gateway-rhel8@sha256:5cd02e62ae81fea9887c484b4b4f52712b3cdfe0bff8a826e2c1c8e813df50bf_arm64"
},
"product_reference": "rhacm2/submariner-gateway-rhel8@sha256:5cd02e62ae81fea9887c484b4b4f52712b3cdfe0bff8a826e2c1c8e813df50bf_arm64",
"relates_to_product_reference": "8Base-RHACM-2.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhacm2/submariner-gateway-rhel8@sha256:93b7d3fbd69a47187a595e09324ef603d8e0c808c99961719a56029776a25dfb_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8",
"product_id": "8Base-RHACM-2.6:rhacm2/submariner-gateway-rhel8@sha256:93b7d3fbd69a47187a595e09324ef603d8e0c808c99961719a56029776a25dfb_amd64"
},
"product_reference": "rhacm2/submariner-gateway-rhel8@sha256:93b7d3fbd69a47187a595e09324ef603d8e0c808c99961719a56029776a25dfb_amd64",
"relates_to_product_reference": "8Base-RHACM-2.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhacm2/submariner-globalnet-rhel8@sha256:2bc43c6e55f35522be8752d1ae9eb24637a0926f91fa0f6cbf670f23a61b7840_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8",
"product_id": "8Base-RHACM-2.6:rhacm2/submariner-globalnet-rhel8@sha256:2bc43c6e55f35522be8752d1ae9eb24637a0926f91fa0f6cbf670f23a61b7840_amd64"
},
"product_reference": "rhacm2/submariner-globalnet-rhel8@sha256:2bc43c6e55f35522be8752d1ae9eb24637a0926f91fa0f6cbf670f23a61b7840_amd64",
"relates_to_product_reference": "8Base-RHACM-2.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhacm2/submariner-globalnet-rhel8@sha256:4ee144a663c95a2fcc1fbfc0b308cf7033a5ded97a28a5aec9f35250df812661_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8",
"product_id": "8Base-RHACM-2.6:rhacm2/submariner-globalnet-rhel8@sha256:4ee144a663c95a2fcc1fbfc0b308cf7033a5ded97a28a5aec9f35250df812661_ppc64le"
},
"product_reference": "rhacm2/submariner-globalnet-rhel8@sha256:4ee144a663c95a2fcc1fbfc0b308cf7033a5ded97a28a5aec9f35250df812661_ppc64le",
"relates_to_product_reference": "8Base-RHACM-2.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhacm2/submariner-globalnet-rhel8@sha256:dc50bdc2082127c9df0da5b539ac61d244250eb93d7fcfd3a9d2fdbb10603695_arm64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8",
"product_id": "8Base-RHACM-2.6:rhacm2/submariner-globalnet-rhel8@sha256:dc50bdc2082127c9df0da5b539ac61d244250eb93d7fcfd3a9d2fdbb10603695_arm64"
},
"product_reference": "rhacm2/submariner-globalnet-rhel8@sha256:dc50bdc2082127c9df0da5b539ac61d244250eb93d7fcfd3a9d2fdbb10603695_arm64",
"relates_to_product_reference": "8Base-RHACM-2.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhacm2/submariner-globalnet-rhel8@sha256:fb728331ee01f6fb72a54b5c5b5886ec08f014a384c1b49beec692439ec59630_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8",
"product_id": "8Base-RHACM-2.6:rhacm2/submariner-globalnet-rhel8@sha256:fb728331ee01f6fb72a54b5c5b5886ec08f014a384c1b49beec692439ec59630_s390x"
},
"product_reference": "rhacm2/submariner-globalnet-rhel8@sha256:fb728331ee01f6fb72a54b5c5b5886ec08f014a384c1b49beec692439ec59630_s390x",
"relates_to_product_reference": "8Base-RHACM-2.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhacm2/submariner-networkplugin-syncer-rhel8@sha256:1ef8557fc7489a74092c22e5cf96ebbec1575f72177534de2ae095ab96927a5a_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8",
"product_id": "8Base-RHACM-2.6:rhacm2/submariner-networkplugin-syncer-rhel8@sha256:1ef8557fc7489a74092c22e5cf96ebbec1575f72177534de2ae095ab96927a5a_ppc64le"
},
"product_reference": "rhacm2/submariner-networkplugin-syncer-rhel8@sha256:1ef8557fc7489a74092c22e5cf96ebbec1575f72177534de2ae095ab96927a5a_ppc64le",
"relates_to_product_reference": "8Base-RHACM-2.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhacm2/submariner-networkplugin-syncer-rhel8@sha256:50281b32dc626b66b8b38bc3fa97d799ab13b66029768e60c06d3fa5d9a29bf1_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8",
"product_id": "8Base-RHACM-2.6:rhacm2/submariner-networkplugin-syncer-rhel8@sha256:50281b32dc626b66b8b38bc3fa97d799ab13b66029768e60c06d3fa5d9a29bf1_s390x"
},
"product_reference": "rhacm2/submariner-networkplugin-syncer-rhel8@sha256:50281b32dc626b66b8b38bc3fa97d799ab13b66029768e60c06d3fa5d9a29bf1_s390x",
"relates_to_product_reference": "8Base-RHACM-2.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhacm2/submariner-networkplugin-syncer-rhel8@sha256:511362c4a5dfa734d0015a355185a86ba6c00a0466f5fb1b469fa00e07858c82_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8",
"product_id": "8Base-RHACM-2.6:rhacm2/submariner-networkplugin-syncer-rhel8@sha256:511362c4a5dfa734d0015a355185a86ba6c00a0466f5fb1b469fa00e07858c82_amd64"
},
"product_reference": "rhacm2/submariner-networkplugin-syncer-rhel8@sha256:511362c4a5dfa734d0015a355185a86ba6c00a0466f5fb1b469fa00e07858c82_amd64",
"relates_to_product_reference": "8Base-RHACM-2.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhacm2/submariner-networkplugin-syncer-rhel8@sha256:7076fac5d7944c7d4a0fa0e89629372466baf9fc5b4b8e5c31cc71b80fac9a69_arm64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8",
"product_id": "8Base-RHACM-2.6:rhacm2/submariner-networkplugin-syncer-rhel8@sha256:7076fac5d7944c7d4a0fa0e89629372466baf9fc5b4b8e5c31cc71b80fac9a69_arm64"
},
"product_reference": "rhacm2/submariner-networkplugin-syncer-rhel8@sha256:7076fac5d7944c7d4a0fa0e89629372466baf9fc5b4b8e5c31cc71b80fac9a69_arm64",
"relates_to_product_reference": "8Base-RHACM-2.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhacm2/submariner-operator-bundle@sha256:1e3de5b269f4454e822201ea7666bacab9c2962f454368b1967dd583cab5c9bc_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8",
"product_id": "8Base-RHACM-2.6:rhacm2/submariner-operator-bundle@sha256:1e3de5b269f4454e822201ea7666bacab9c2962f454368b1967dd583cab5c9bc_ppc64le"
},
"product_reference": "rhacm2/submariner-operator-bundle@sha256:1e3de5b269f4454e822201ea7666bacab9c2962f454368b1967dd583cab5c9bc_ppc64le",
"relates_to_product_reference": "8Base-RHACM-2.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhacm2/submariner-operator-bundle@sha256:2d28ae6efe8ba1999f5ae960cc1799465188b03514697c0192be53c4a7d1e8f2_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8",
"product_id": "8Base-RHACM-2.6:rhacm2/submariner-operator-bundle@sha256:2d28ae6efe8ba1999f5ae960cc1799465188b03514697c0192be53c4a7d1e8f2_s390x"
},
"product_reference": "rhacm2/submariner-operator-bundle@sha256:2d28ae6efe8ba1999f5ae960cc1799465188b03514697c0192be53c4a7d1e8f2_s390x",
"relates_to_product_reference": "8Base-RHACM-2.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhacm2/submariner-operator-bundle@sha256:4c9802569b6aad59f01718b5c692f32e3a9a9b35b7b82e69fed5e1f9573dbc17_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8",
"product_id": "8Base-RHACM-2.6:rhacm2/submariner-operator-bundle@sha256:4c9802569b6aad59f01718b5c692f32e3a9a9b35b7b82e69fed5e1f9573dbc17_amd64"
},
"product_reference": "rhacm2/submariner-operator-bundle@sha256:4c9802569b6aad59f01718b5c692f32e3a9a9b35b7b82e69fed5e1f9573dbc17_amd64",
"relates_to_product_reference": "8Base-RHACM-2.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhacm2/submariner-operator-bundle@sha256:7dacd7a2b26ee22f62851127de612e9c18696c7db4ed06a244ce635b12cb89e2_arm64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8",
"product_id": "8Base-RHACM-2.6:rhacm2/submariner-operator-bundle@sha256:7dacd7a2b26ee22f62851127de612e9c18696c7db4ed06a244ce635b12cb89e2_arm64"
},
"product_reference": "rhacm2/submariner-operator-bundle@sha256:7dacd7a2b26ee22f62851127de612e9c18696c7db4ed06a244ce635b12cb89e2_arm64",
"relates_to_product_reference": "8Base-RHACM-2.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhacm2/submariner-rhel8-operator@sha256:71a36fc0e726890c4a95668d10f024cd31168c26d00d7a22b9f3e26a811af803_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8",
"product_id": "8Base-RHACM-2.6:rhacm2/submariner-rhel8-operator@sha256:71a36fc0e726890c4a95668d10f024cd31168c26d00d7a22b9f3e26a811af803_amd64"
},
"product_reference": "rhacm2/submariner-rhel8-operator@sha256:71a36fc0e726890c4a95668d10f024cd31168c26d00d7a22b9f3e26a811af803_amd64",
"relates_to_product_reference": "8Base-RHACM-2.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhacm2/submariner-rhel8-operator@sha256:db99ef3c89ac45501a7b7fc64c6f853df5f781b2200a758e71debc4dadaf2fef_arm64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8",
"product_id": "8Base-RHACM-2.6:rhacm2/submariner-rhel8-operator@sha256:db99ef3c89ac45501a7b7fc64c6f853df5f781b2200a758e71debc4dadaf2fef_arm64"
},
"product_reference": "rhacm2/submariner-rhel8-operator@sha256:db99ef3c89ac45501a7b7fc64c6f853df5f781b2200a758e71debc4dadaf2fef_arm64",
"relates_to_product_reference": "8Base-RHACM-2.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhacm2/submariner-rhel8-operator@sha256:e54bed5d1233969accf57b3b11f4d934040d7d408440d900d071f8919b60affa_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8",
"product_id": "8Base-RHACM-2.6:rhacm2/submariner-rhel8-operator@sha256:e54bed5d1233969accf57b3b11f4d934040d7d408440d900d071f8919b60affa_ppc64le"
},
"product_reference": "rhacm2/submariner-rhel8-operator@sha256:e54bed5d1233969accf57b3b11f4d934040d7d408440d900d071f8919b60affa_ppc64le",
"relates_to_product_reference": "8Base-RHACM-2.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhacm2/submariner-rhel8-operator@sha256:fc6f14a4af741d3de8c0de1859fc0925d66673b5b7ced139b758b51a52307c5a_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8",
"product_id": "8Base-RHACM-2.6:rhacm2/submariner-rhel8-operator@sha256:fc6f14a4af741d3de8c0de1859fc0925d66673b5b7ced139b758b51a52307c5a_s390x"
},
"product_reference": "rhacm2/submariner-rhel8-operator@sha256:fc6f14a4af741d3de8c0de1859fc0925d66673b5b7ced139b758b51a52307c5a_s390x",
"relates_to_product_reference": "8Base-RHACM-2.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhacm2/submariner-route-agent-rhel8@sha256:007edcf9dd166ec8c1b30f60755bcfe02dee03c2d8e539fba06615b8a3eefd58_arm64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8",
"product_id": "8Base-RHACM-2.6:rhacm2/submariner-route-agent-rhel8@sha256:007edcf9dd166ec8c1b30f60755bcfe02dee03c2d8e539fba06615b8a3eefd58_arm64"
},
"product_reference": "rhacm2/submariner-route-agent-rhel8@sha256:007edcf9dd166ec8c1b30f60755bcfe02dee03c2d8e539fba06615b8a3eefd58_arm64",
"relates_to_product_reference": "8Base-RHACM-2.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhacm2/submariner-route-agent-rhel8@sha256:0b40af2abd40a0d9220fd7311770cbbf0dddbc58b5347399c13fa92dae8dc2be_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8",
"product_id": "8Base-RHACM-2.6:rhacm2/submariner-route-agent-rhel8@sha256:0b40af2abd40a0d9220fd7311770cbbf0dddbc58b5347399c13fa92dae8dc2be_s390x"
},
"product_reference": "rhacm2/submariner-route-agent-rhel8@sha256:0b40af2abd40a0d9220fd7311770cbbf0dddbc58b5347399c13fa92dae8dc2be_s390x",
"relates_to_product_reference": "8Base-RHACM-2.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhacm2/submariner-route-agent-rhel8@sha256:a08eecb9e361d8466db2adeafdf203fdc199a9d269910741909f73c341b28f4a_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8",
"product_id": "8Base-RHACM-2.6:rhacm2/submariner-route-agent-rhel8@sha256:a08eecb9e361d8466db2adeafdf203fdc199a9d269910741909f73c341b28f4a_ppc64le"
},
"product_reference": "rhacm2/submariner-route-agent-rhel8@sha256:a08eecb9e361d8466db2adeafdf203fdc199a9d269910741909f73c341b28f4a_ppc64le",
"relates_to_product_reference": "8Base-RHACM-2.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhacm2/submariner-route-agent-rhel8@sha256:bb96dde2023a0b8a0d8b33095374ddcc828de182f04033253e716d584c8db623_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8",
"product_id": "8Base-RHACM-2.6:rhacm2/submariner-route-agent-rhel8@sha256:bb96dde2023a0b8a0d8b33095374ddcc828de182f04033253e716d584c8db623_amd64"
},
"product_reference": "rhacm2/submariner-route-agent-rhel8@sha256:bb96dde2023a0b8a0d8b33095374ddcc828de182f04033253e716d584c8db623_amd64",
"relates_to_product_reference": "8Base-RHACM-2.6"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2022-32149",
"cwe": {
"id": "CWE-407",
"name": "Inefficient Algorithmic Complexity"
},
"discovery_date": "2022-10-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2134010"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in the golang.org/x/text/language package. An attacker can craft an Accept-Language header which ParseAcceptLanguage will take significant time to parse. This issue leads to a denial of service, and can impact availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: golang.org/x/text/language: ParseAcceptLanguage takes a long time to parse complex tags",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "After careful analysis of the vulnerability Redhat is choosing to keep the vulnerability severity as moderate,the vulnerability exists in the ParseAcceptLanguage function of the golang text/language package,when an attacker could craft an unusually large accept header and due to the parser taking quadratic time complexity to finish, firstly the attacker would have to find a way smuggle an input to the parser and even then this would simply not result in a crash of any kind but more of resource hang which while can be unpleasant,does not equate to any real world damage.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-RHACM-2.6:rhacm2/lighthouse-agent-rhel8@sha256:44576acbfff4321af54d8a8c15b0122d28ffbec8b88ebbdd32ed2dca3d4397c3_arm64",
"8Base-RHACM-2.6:rhacm2/lighthouse-agent-rhel8@sha256:6f8f3c288619a58ac723cde85df5232efac7f5ccfd516cb3996b35304d11e7f5_amd64",
"8Base-RHACM-2.6:rhacm2/lighthouse-agent-rhel8@sha256:c45d4a19f6492a1d2d72375c12d3dfc8a7a2349ccc8b581ad7df299bd63ae0a9_ppc64le",
"8Base-RHACM-2.6:rhacm2/lighthouse-agent-rhel8@sha256:fde7510f372c447d265b01dcd0e36c7e53f0be4ab109b3d4a81b3dd857d3a127_s390x",
"8Base-RHACM-2.6:rhacm2/lighthouse-coredns-rhel8@sha256:3e4d5bf90e110c3cf3e988f572d227575727bf1769c02d132272b5ff5051cfb8_arm64",
"8Base-RHACM-2.6:rhacm2/lighthouse-coredns-rhel8@sha256:3ee425b4f78fe809d50967ae7c66af42c894a1fec5ef194d17eae9fdf5902913_amd64",
"8Base-RHACM-2.6:rhacm2/lighthouse-coredns-rhel8@sha256:a842e4824cd39bc438c38889896dd33372b644968b5e29b614c9529b2e0696cc_ppc64le",
"8Base-RHACM-2.6:rhacm2/lighthouse-coredns-rhel8@sha256:e90e99636dce63fdc6323203694eac2aea9d7e2a0578ed444fce67144838b7ca_s390x",
"8Base-RHACM-2.6:rhacm2/nettest-rhel8@sha256:623848329900b7fe55763dd08bacb5fde147f0b9e8b77487f1b99a8b713d309e_ppc64le",
"8Base-RHACM-2.6:rhacm2/nettest-rhel8@sha256:84cb8594ccf7876483cee84195d704d34721f566e6a36070f7eecaca10fb2c88_s390x",
"8Base-RHACM-2.6:rhacm2/nettest-rhel8@sha256:a1197fa88e7cbaac9c4c80e13d39eda732d9ff09579d7d2e96a96bb5c005e695_arm64",
"8Base-RHACM-2.6:rhacm2/nettest-rhel8@sha256:b674ef3a8a7e20b085ceeb9be1f536e0bc0f94dec384e88569105c865fdae224_amd64",
"8Base-RHACM-2.6:rhacm2/subctl-rhel8@sha256:18b4fa76cfef84236c8453eb0cd6b1c67d1017732fa1d5722931d8616c365cfe_s390x",
"8Base-RHACM-2.6:rhacm2/subctl-rhel8@sha256:1f4051093fb1128e7266a4baff92bb7e9864825d51947265bed4ae7c20a3f99c_arm64",
"8Base-RHACM-2.6:rhacm2/subctl-rhel8@sha256:2e17954946ea1fd3ec53791a1b6dfdfb59be7c24fd78816b0ba721c069350c38_ppc64le",
"8Base-RHACM-2.6:rhacm2/subctl-rhel8@sha256:dc61ab7c1ad6478e9bb30b36a2a356c5ec137bc0d5109e03ba57a76081015715_amd64",
"8Base-RHACM-2.6:rhacm2/submariner-gateway-rhel8@sha256:1abe2013043c37997233ed7d8785c4607be1f21ed25f130f2141f8a771f0e9d5_ppc64le",
"8Base-RHACM-2.6:rhacm2/submariner-gateway-rhel8@sha256:5100f65e2591023eb9da4512b464c49bbf7f56d1a78587e5da790d6cb52cfd7c_s390x",
"8Base-RHACM-2.6:rhacm2/submariner-gateway-rhel8@sha256:5cd02e62ae81fea9887c484b4b4f52712b3cdfe0bff8a826e2c1c8e813df50bf_arm64",
"8Base-RHACM-2.6:rhacm2/submariner-gateway-rhel8@sha256:93b7d3fbd69a47187a595e09324ef603d8e0c808c99961719a56029776a25dfb_amd64",
"8Base-RHACM-2.6:rhacm2/submariner-globalnet-rhel8@sha256:2bc43c6e55f35522be8752d1ae9eb24637a0926f91fa0f6cbf670f23a61b7840_amd64",
"8Base-RHACM-2.6:rhacm2/submariner-globalnet-rhel8@sha256:4ee144a663c95a2fcc1fbfc0b308cf7033a5ded97a28a5aec9f35250df812661_ppc64le",
"8Base-RHACM-2.6:rhacm2/submariner-globalnet-rhel8@sha256:dc50bdc2082127c9df0da5b539ac61d244250eb93d7fcfd3a9d2fdbb10603695_arm64",
"8Base-RHACM-2.6:rhacm2/submariner-globalnet-rhel8@sha256:fb728331ee01f6fb72a54b5c5b5886ec08f014a384c1b49beec692439ec59630_s390x",
"8Base-RHACM-2.6:rhacm2/submariner-networkplugin-syncer-rhel8@sha256:1ef8557fc7489a74092c22e5cf96ebbec1575f72177534de2ae095ab96927a5a_ppc64le",
"8Base-RHACM-2.6:rhacm2/submariner-networkplugin-syncer-rhel8@sha256:50281b32dc626b66b8b38bc3fa97d799ab13b66029768e60c06d3fa5d9a29bf1_s390x",
"8Base-RHACM-2.6:rhacm2/submariner-networkplugin-syncer-rhel8@sha256:511362c4a5dfa734d0015a355185a86ba6c00a0466f5fb1b469fa00e07858c82_amd64",
"8Base-RHACM-2.6:rhacm2/submariner-networkplugin-syncer-rhel8@sha256:7076fac5d7944c7d4a0fa0e89629372466baf9fc5b4b8e5c31cc71b80fac9a69_arm64",
"8Base-RHACM-2.6:rhacm2/submariner-operator-bundle@sha256:1e3de5b269f4454e822201ea7666bacab9c2962f454368b1967dd583cab5c9bc_ppc64le",
"8Base-RHACM-2.6:rhacm2/submariner-operator-bundle@sha256:2d28ae6efe8ba1999f5ae960cc1799465188b03514697c0192be53c4a7d1e8f2_s390x",
"8Base-RHACM-2.6:rhacm2/submariner-operator-bundle@sha256:4c9802569b6aad59f01718b5c692f32e3a9a9b35b7b82e69fed5e1f9573dbc17_amd64",
"8Base-RHACM-2.6:rhacm2/submariner-operator-bundle@sha256:7dacd7a2b26ee22f62851127de612e9c18696c7db4ed06a244ce635b12cb89e2_arm64",
"8Base-RHACM-2.6:rhacm2/submariner-rhel8-operator@sha256:71a36fc0e726890c4a95668d10f024cd31168c26d00d7a22b9f3e26a811af803_amd64",
"8Base-RHACM-2.6:rhacm2/submariner-rhel8-operator@sha256:db99ef3c89ac45501a7b7fc64c6f853df5f781b2200a758e71debc4dadaf2fef_arm64",
"8Base-RHACM-2.6:rhacm2/submariner-rhel8-operator@sha256:e54bed5d1233969accf57b3b11f4d934040d7d408440d900d071f8919b60affa_ppc64le",
"8Base-RHACM-2.6:rhacm2/submariner-rhel8-operator@sha256:fc6f14a4af741d3de8c0de1859fc0925d66673b5b7ced139b758b51a52307c5a_s390x",
"8Base-RHACM-2.6:rhacm2/submariner-route-agent-rhel8@sha256:007edcf9dd166ec8c1b30f60755bcfe02dee03c2d8e539fba06615b8a3eefd58_arm64",
"8Base-RHACM-2.6:rhacm2/submariner-route-agent-rhel8@sha256:0b40af2abd40a0d9220fd7311770cbbf0dddbc58b5347399c13fa92dae8dc2be_s390x",
"8Base-RHACM-2.6:rhacm2/submariner-route-agent-rhel8@sha256:a08eecb9e361d8466db2adeafdf203fdc199a9d269910741909f73c341b28f4a_ppc64le",
"8Base-RHACM-2.6:rhacm2/submariner-route-agent-rhel8@sha256:bb96dde2023a0b8a0d8b33095374ddcc828de182f04033253e716d584c8db623_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-32149"
},
{
"category": "external",
"summary": "RHBZ#2134010",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2134010"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-32149",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32149"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-32149",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-32149"
},
{
"category": "external",
"summary": "https://go.dev/issue/56152",
"url": "https://go.dev/issue/56152"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-dev/c/qfPIly0X7aU",
"url": "https://groups.google.com/g/golang-dev/c/qfPIly0X7aU"
}
],
"release_date": "2022-10-11T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-02-15T21:46:51+00:00",
"details": "For details on how to install Submariner, refer to:\n\nhttps://access.redhat.com/documentation/en-us/red_hat_advanced_cluster_management_for_kubernetes/2.6/html/add-ons/add-ons-overview#submariner-deploy-console\n\nand\n\nhttps://submariner.io/getting-started/",
"product_ids": [
"8Base-RHACM-2.6:rhacm2/lighthouse-agent-rhel8@sha256:44576acbfff4321af54d8a8c15b0122d28ffbec8b88ebbdd32ed2dca3d4397c3_arm64",
"8Base-RHACM-2.6:rhacm2/lighthouse-agent-rhel8@sha256:6f8f3c288619a58ac723cde85df5232efac7f5ccfd516cb3996b35304d11e7f5_amd64",
"8Base-RHACM-2.6:rhacm2/lighthouse-agent-rhel8@sha256:c45d4a19f6492a1d2d72375c12d3dfc8a7a2349ccc8b581ad7df299bd63ae0a9_ppc64le",
"8Base-RHACM-2.6:rhacm2/lighthouse-agent-rhel8@sha256:fde7510f372c447d265b01dcd0e36c7e53f0be4ab109b3d4a81b3dd857d3a127_s390x",
"8Base-RHACM-2.6:rhacm2/lighthouse-coredns-rhel8@sha256:3e4d5bf90e110c3cf3e988f572d227575727bf1769c02d132272b5ff5051cfb8_arm64",
"8Base-RHACM-2.6:rhacm2/lighthouse-coredns-rhel8@sha256:3ee425b4f78fe809d50967ae7c66af42c894a1fec5ef194d17eae9fdf5902913_amd64",
"8Base-RHACM-2.6:rhacm2/lighthouse-coredns-rhel8@sha256:a842e4824cd39bc438c38889896dd33372b644968b5e29b614c9529b2e0696cc_ppc64le",
"8Base-RHACM-2.6:rhacm2/lighthouse-coredns-rhel8@sha256:e90e99636dce63fdc6323203694eac2aea9d7e2a0578ed444fce67144838b7ca_s390x",
"8Base-RHACM-2.6:rhacm2/nettest-rhel8@sha256:623848329900b7fe55763dd08bacb5fde147f0b9e8b77487f1b99a8b713d309e_ppc64le",
"8Base-RHACM-2.6:rhacm2/nettest-rhel8@sha256:84cb8594ccf7876483cee84195d704d34721f566e6a36070f7eecaca10fb2c88_s390x",
"8Base-RHACM-2.6:rhacm2/nettest-rhel8@sha256:a1197fa88e7cbaac9c4c80e13d39eda732d9ff09579d7d2e96a96bb5c005e695_arm64",
"8Base-RHACM-2.6:rhacm2/nettest-rhel8@sha256:b674ef3a8a7e20b085ceeb9be1f536e0bc0f94dec384e88569105c865fdae224_amd64",
"8Base-RHACM-2.6:rhacm2/subctl-rhel8@sha256:18b4fa76cfef84236c8453eb0cd6b1c67d1017732fa1d5722931d8616c365cfe_s390x",
"8Base-RHACM-2.6:rhacm2/subctl-rhel8@sha256:1f4051093fb1128e7266a4baff92bb7e9864825d51947265bed4ae7c20a3f99c_arm64",
"8Base-RHACM-2.6:rhacm2/subctl-rhel8@sha256:2e17954946ea1fd3ec53791a1b6dfdfb59be7c24fd78816b0ba721c069350c38_ppc64le",
"8Base-RHACM-2.6:rhacm2/subctl-rhel8@sha256:dc61ab7c1ad6478e9bb30b36a2a356c5ec137bc0d5109e03ba57a76081015715_amd64",
"8Base-RHACM-2.6:rhacm2/submariner-gateway-rhel8@sha256:1abe2013043c37997233ed7d8785c4607be1f21ed25f130f2141f8a771f0e9d5_ppc64le",
"8Base-RHACM-2.6:rhacm2/submariner-gateway-rhel8@sha256:5100f65e2591023eb9da4512b464c49bbf7f56d1a78587e5da790d6cb52cfd7c_s390x",
"8Base-RHACM-2.6:rhacm2/submariner-gateway-rhel8@sha256:5cd02e62ae81fea9887c484b4b4f52712b3cdfe0bff8a826e2c1c8e813df50bf_arm64",
"8Base-RHACM-2.6:rhacm2/submariner-gateway-rhel8@sha256:93b7d3fbd69a47187a595e09324ef603d8e0c808c99961719a56029776a25dfb_amd64",
"8Base-RHACM-2.6:rhacm2/submariner-globalnet-rhel8@sha256:2bc43c6e55f35522be8752d1ae9eb24637a0926f91fa0f6cbf670f23a61b7840_amd64",
"8Base-RHACM-2.6:rhacm2/submariner-globalnet-rhel8@sha256:4ee144a663c95a2fcc1fbfc0b308cf7033a5ded97a28a5aec9f35250df812661_ppc64le",
"8Base-RHACM-2.6:rhacm2/submariner-globalnet-rhel8@sha256:dc50bdc2082127c9df0da5b539ac61d244250eb93d7fcfd3a9d2fdbb10603695_arm64",
"8Base-RHACM-2.6:rhacm2/submariner-globalnet-rhel8@sha256:fb728331ee01f6fb72a54b5c5b5886ec08f014a384c1b49beec692439ec59630_s390x",
"8Base-RHACM-2.6:rhacm2/submariner-networkplugin-syncer-rhel8@sha256:1ef8557fc7489a74092c22e5cf96ebbec1575f72177534de2ae095ab96927a5a_ppc64le",
"8Base-RHACM-2.6:rhacm2/submariner-networkplugin-syncer-rhel8@sha256:50281b32dc626b66b8b38bc3fa97d799ab13b66029768e60c06d3fa5d9a29bf1_s390x",
"8Base-RHACM-2.6:rhacm2/submariner-networkplugin-syncer-rhel8@sha256:511362c4a5dfa734d0015a355185a86ba6c00a0466f5fb1b469fa00e07858c82_amd64",
"8Base-RHACM-2.6:rhacm2/submariner-networkplugin-syncer-rhel8@sha256:7076fac5d7944c7d4a0fa0e89629372466baf9fc5b4b8e5c31cc71b80fac9a69_arm64",
"8Base-RHACM-2.6:rhacm2/submariner-operator-bundle@sha256:1e3de5b269f4454e822201ea7666bacab9c2962f454368b1967dd583cab5c9bc_ppc64le",
"8Base-RHACM-2.6:rhacm2/submariner-operator-bundle@sha256:2d28ae6efe8ba1999f5ae960cc1799465188b03514697c0192be53c4a7d1e8f2_s390x",
"8Base-RHACM-2.6:rhacm2/submariner-operator-bundle@sha256:4c9802569b6aad59f01718b5c692f32e3a9a9b35b7b82e69fed5e1f9573dbc17_amd64",
"8Base-RHACM-2.6:rhacm2/submariner-operator-bundle@sha256:7dacd7a2b26ee22f62851127de612e9c18696c7db4ed06a244ce635b12cb89e2_arm64",
"8Base-RHACM-2.6:rhacm2/submariner-rhel8-operator@sha256:71a36fc0e726890c4a95668d10f024cd31168c26d00d7a22b9f3e26a811af803_amd64",
"8Base-RHACM-2.6:rhacm2/submariner-rhel8-operator@sha256:db99ef3c89ac45501a7b7fc64c6f853df5f781b2200a758e71debc4dadaf2fef_arm64",
"8Base-RHACM-2.6:rhacm2/submariner-rhel8-operator@sha256:e54bed5d1233969accf57b3b11f4d934040d7d408440d900d071f8919b60affa_ppc64le",
"8Base-RHACM-2.6:rhacm2/submariner-rhel8-operator@sha256:fc6f14a4af741d3de8c0de1859fc0925d66673b5b7ced139b758b51a52307c5a_s390x",
"8Base-RHACM-2.6:rhacm2/submariner-route-agent-rhel8@sha256:007edcf9dd166ec8c1b30f60755bcfe02dee03c2d8e539fba06615b8a3eefd58_arm64",
"8Base-RHACM-2.6:rhacm2/submariner-route-agent-rhel8@sha256:0b40af2abd40a0d9220fd7311770cbbf0dddbc58b5347399c13fa92dae8dc2be_s390x",
"8Base-RHACM-2.6:rhacm2/submariner-route-agent-rhel8@sha256:a08eecb9e361d8466db2adeafdf203fdc199a9d269910741909f73c341b28f4a_ppc64le",
"8Base-RHACM-2.6:rhacm2/submariner-route-agent-rhel8@sha256:bb96dde2023a0b8a0d8b33095374ddcc828de182f04033253e716d584c8db623_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:0795"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"8Base-RHACM-2.6:rhacm2/lighthouse-agent-rhel8@sha256:44576acbfff4321af54d8a8c15b0122d28ffbec8b88ebbdd32ed2dca3d4397c3_arm64",
"8Base-RHACM-2.6:rhacm2/lighthouse-agent-rhel8@sha256:6f8f3c288619a58ac723cde85df5232efac7f5ccfd516cb3996b35304d11e7f5_amd64",
"8Base-RHACM-2.6:rhacm2/lighthouse-agent-rhel8@sha256:c45d4a19f6492a1d2d72375c12d3dfc8a7a2349ccc8b581ad7df299bd63ae0a9_ppc64le",
"8Base-RHACM-2.6:rhacm2/lighthouse-agent-rhel8@sha256:fde7510f372c447d265b01dcd0e36c7e53f0be4ab109b3d4a81b3dd857d3a127_s390x",
"8Base-RHACM-2.6:rhacm2/lighthouse-coredns-rhel8@sha256:3e4d5bf90e110c3cf3e988f572d227575727bf1769c02d132272b5ff5051cfb8_arm64",
"8Base-RHACM-2.6:rhacm2/lighthouse-coredns-rhel8@sha256:3ee425b4f78fe809d50967ae7c66af42c894a1fec5ef194d17eae9fdf5902913_amd64",
"8Base-RHACM-2.6:rhacm2/lighthouse-coredns-rhel8@sha256:a842e4824cd39bc438c38889896dd33372b644968b5e29b614c9529b2e0696cc_ppc64le",
"8Base-RHACM-2.6:rhacm2/lighthouse-coredns-rhel8@sha256:e90e99636dce63fdc6323203694eac2aea9d7e2a0578ed444fce67144838b7ca_s390x",
"8Base-RHACM-2.6:rhacm2/nettest-rhel8@sha256:623848329900b7fe55763dd08bacb5fde147f0b9e8b77487f1b99a8b713d309e_ppc64le",
"8Base-RHACM-2.6:rhacm2/nettest-rhel8@sha256:84cb8594ccf7876483cee84195d704d34721f566e6a36070f7eecaca10fb2c88_s390x",
"8Base-RHACM-2.6:rhacm2/nettest-rhel8@sha256:a1197fa88e7cbaac9c4c80e13d39eda732d9ff09579d7d2e96a96bb5c005e695_arm64",
"8Base-RHACM-2.6:rhacm2/nettest-rhel8@sha256:b674ef3a8a7e20b085ceeb9be1f536e0bc0f94dec384e88569105c865fdae224_amd64",
"8Base-RHACM-2.6:rhacm2/subctl-rhel8@sha256:18b4fa76cfef84236c8453eb0cd6b1c67d1017732fa1d5722931d8616c365cfe_s390x",
"8Base-RHACM-2.6:rhacm2/subctl-rhel8@sha256:1f4051093fb1128e7266a4baff92bb7e9864825d51947265bed4ae7c20a3f99c_arm64",
"8Base-RHACM-2.6:rhacm2/subctl-rhel8@sha256:2e17954946ea1fd3ec53791a1b6dfdfb59be7c24fd78816b0ba721c069350c38_ppc64le",
"8Base-RHACM-2.6:rhacm2/subctl-rhel8@sha256:dc61ab7c1ad6478e9bb30b36a2a356c5ec137bc0d5109e03ba57a76081015715_amd64",
"8Base-RHACM-2.6:rhacm2/submariner-gateway-rhel8@sha256:1abe2013043c37997233ed7d8785c4607be1f21ed25f130f2141f8a771f0e9d5_ppc64le",
"8Base-RHACM-2.6:rhacm2/submariner-gateway-rhel8@sha256:5100f65e2591023eb9da4512b464c49bbf7f56d1a78587e5da790d6cb52cfd7c_s390x",
"8Base-RHACM-2.6:rhacm2/submariner-gateway-rhel8@sha256:5cd02e62ae81fea9887c484b4b4f52712b3cdfe0bff8a826e2c1c8e813df50bf_arm64",
"8Base-RHACM-2.6:rhacm2/submariner-gateway-rhel8@sha256:93b7d3fbd69a47187a595e09324ef603d8e0c808c99961719a56029776a25dfb_amd64",
"8Base-RHACM-2.6:rhacm2/submariner-globalnet-rhel8@sha256:2bc43c6e55f35522be8752d1ae9eb24637a0926f91fa0f6cbf670f23a61b7840_amd64",
"8Base-RHACM-2.6:rhacm2/submariner-globalnet-rhel8@sha256:4ee144a663c95a2fcc1fbfc0b308cf7033a5ded97a28a5aec9f35250df812661_ppc64le",
"8Base-RHACM-2.6:rhacm2/submariner-globalnet-rhel8@sha256:dc50bdc2082127c9df0da5b539ac61d244250eb93d7fcfd3a9d2fdbb10603695_arm64",
"8Base-RHACM-2.6:rhacm2/submariner-globalnet-rhel8@sha256:fb728331ee01f6fb72a54b5c5b5886ec08f014a384c1b49beec692439ec59630_s390x",
"8Base-RHACM-2.6:rhacm2/submariner-networkplugin-syncer-rhel8@sha256:1ef8557fc7489a74092c22e5cf96ebbec1575f72177534de2ae095ab96927a5a_ppc64le",
"8Base-RHACM-2.6:rhacm2/submariner-networkplugin-syncer-rhel8@sha256:50281b32dc626b66b8b38bc3fa97d799ab13b66029768e60c06d3fa5d9a29bf1_s390x",
"8Base-RHACM-2.6:rhacm2/submariner-networkplugin-syncer-rhel8@sha256:511362c4a5dfa734d0015a355185a86ba6c00a0466f5fb1b469fa00e07858c82_amd64",
"8Base-RHACM-2.6:rhacm2/submariner-networkplugin-syncer-rhel8@sha256:7076fac5d7944c7d4a0fa0e89629372466baf9fc5b4b8e5c31cc71b80fac9a69_arm64",
"8Base-RHACM-2.6:rhacm2/submariner-operator-bundle@sha256:1e3de5b269f4454e822201ea7666bacab9c2962f454368b1967dd583cab5c9bc_ppc64le",
"8Base-RHACM-2.6:rhacm2/submariner-operator-bundle@sha256:2d28ae6efe8ba1999f5ae960cc1799465188b03514697c0192be53c4a7d1e8f2_s390x",
"8Base-RHACM-2.6:rhacm2/submariner-operator-bundle@sha256:4c9802569b6aad59f01718b5c692f32e3a9a9b35b7b82e69fed5e1f9573dbc17_amd64",
"8Base-RHACM-2.6:rhacm2/submariner-operator-bundle@sha256:7dacd7a2b26ee22f62851127de612e9c18696c7db4ed06a244ce635b12cb89e2_arm64",
"8Base-RHACM-2.6:rhacm2/submariner-rhel8-operator@sha256:71a36fc0e726890c4a95668d10f024cd31168c26d00d7a22b9f3e26a811af803_amd64",
"8Base-RHACM-2.6:rhacm2/submariner-rhel8-operator@sha256:db99ef3c89ac45501a7b7fc64c6f853df5f781b2200a758e71debc4dadaf2fef_arm64",
"8Base-RHACM-2.6:rhacm2/submariner-rhel8-operator@sha256:e54bed5d1233969accf57b3b11f4d934040d7d408440d900d071f8919b60affa_ppc64le",
"8Base-RHACM-2.6:rhacm2/submariner-rhel8-operator@sha256:fc6f14a4af741d3de8c0de1859fc0925d66673b5b7ced139b758b51a52307c5a_s390x",
"8Base-RHACM-2.6:rhacm2/submariner-route-agent-rhel8@sha256:007edcf9dd166ec8c1b30f60755bcfe02dee03c2d8e539fba06615b8a3eefd58_arm64",
"8Base-RHACM-2.6:rhacm2/submariner-route-agent-rhel8@sha256:0b40af2abd40a0d9220fd7311770cbbf0dddbc58b5347399c13fa92dae8dc2be_s390x",
"8Base-RHACM-2.6:rhacm2/submariner-route-agent-rhel8@sha256:a08eecb9e361d8466db2adeafdf203fdc199a9d269910741909f73c341b28f4a_ppc64le",
"8Base-RHACM-2.6:rhacm2/submariner-route-agent-rhel8@sha256:bb96dde2023a0b8a0d8b33095374ddcc828de182f04033253e716d584c8db623_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "golang: golang.org/x/text/language: ParseAcceptLanguage takes a long time to parse complex tags"
}
]
}
rhsa-2024:1994
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for the container-tools:rhel8 module is now available for Red Hat Enterprise Linux 8.6 Extended Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc.\n\nSecurity Fix(es):\n\n* podman: golang.org/x/text/language: ParseAcceptLanguage takes a long time to parse complex tags (CVE-2022-32149)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2024:1994",
"url": "https://access.redhat.com/errata/RHSA-2024:1994"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#moderate",
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "2134010",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2134010"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_1994.json"
}
],
"title": "Red Hat Security Advisory: container-tools:rhel8 security update",
"tracking": {
"current_release_date": "2025-10-10T01:55:35+00:00",
"generator": {
"date": "2025-10-10T01:55:35+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.9"
}
},
"id": "RHSA-2024:1994",
"initial_release_date": "2024-04-23T14:16:09+00:00",
"revision_history": [
{
"date": "2024-04-23T14:16:09+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2024-04-23T14:16:09+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-10-10T01:55:35+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product": {
"name": "Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_eus:8.6::appstream"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "aardvark-dns-1.0.1-40.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"product": {
"name": "aardvark-dns-1.0.1-40.module+el8.6.0+21266+3e24c7b3.x86_64.rpm (container-tools:rhel8)",
"product_id": "aardvark-dns-1.0.1-40.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/aardvark-dns@1.0.1-40.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=x86_64\u0026epoch=2\u0026rpmmod=container-tools:rhel8:8060020240413110723:3b538bd8"
}
}
},
{
"category": "product_version",
"name": "buildah-1.26.2-1.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"product": {
"name": "buildah-1.26.2-1.module+el8.6.0+21266+3e24c7b3.x86_64.rpm (container-tools:rhel8)",
"product_id": "buildah-1.26.2-1.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/buildah@1.26.2-1.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=x86_64\u0026epoch=1\u0026rpmmod=container-tools:rhel8:8060020240413110723:3b538bd8"
}
}
},
{
"category": "product_version",
"name": "buildah-debuginfo-1.26.2-1.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"product": {
"name": "buildah-debuginfo-1.26.2-1.module+el8.6.0+21266+3e24c7b3.x86_64.rpm (container-tools:rhel8)",
"product_id": "buildah-debuginfo-1.26.2-1.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/buildah-debuginfo@1.26.2-1.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=x86_64\u0026epoch=1\u0026rpmmod=container-tools:rhel8:8060020240413110723:3b538bd8"
}
}
},
{
"category": "product_version",
"name": "buildah-debugsource-1.26.2-1.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"product": {
"name": "buildah-debugsource-1.26.2-1.module+el8.6.0+21266+3e24c7b3.x86_64.rpm (container-tools:rhel8)",
"product_id": "buildah-debugsource-1.26.2-1.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/buildah-debugsource@1.26.2-1.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=x86_64\u0026epoch=1\u0026rpmmod=container-tools:rhel8:8060020240413110723:3b538bd8"
}
}
},
{
"category": "product_version",
"name": "buildah-tests-1.26.2-1.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"product": {
"name": "buildah-tests-1.26.2-1.module+el8.6.0+21266+3e24c7b3.x86_64.rpm (container-tools:rhel8)",
"product_id": "buildah-tests-1.26.2-1.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/buildah-tests@1.26.2-1.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=x86_64\u0026epoch=1\u0026rpmmod=container-tools:rhel8:8060020240413110723:3b538bd8"
}
}
},
{
"category": "product_version",
"name": "buildah-tests-debuginfo-1.26.2-1.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"product": {
"name": "buildah-tests-debuginfo-1.26.2-1.module+el8.6.0+21266+3e24c7b3.x86_64.rpm (container-tools:rhel8)",
"product_id": "buildah-tests-debuginfo-1.26.2-1.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/buildah-tests-debuginfo@1.26.2-1.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=x86_64\u0026epoch=1\u0026rpmmod=container-tools:rhel8:8060020240413110723:3b538bd8"
}
}
},
{
"category": "product_version",
"name": "conmon-2.1.4-1.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"product": {
"name": "conmon-2.1.4-1.module+el8.6.0+21266+3e24c7b3.x86_64.rpm (container-tools:rhel8)",
"product_id": "conmon-2.1.4-1.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/conmon@2.1.4-1.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=x86_64\u0026epoch=2\u0026rpmmod=container-tools:rhel8:8060020240413110723:3b538bd8"
}
}
},
{
"category": "product_version",
"name": "conmon-debuginfo-2.1.4-1.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"product": {
"name": "conmon-debuginfo-2.1.4-1.module+el8.6.0+21266+3e24c7b3.x86_64.rpm (container-tools:rhel8)",
"product_id": "conmon-debuginfo-2.1.4-1.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/conmon-debuginfo@2.1.4-1.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=x86_64\u0026epoch=2\u0026rpmmod=container-tools:rhel8:8060020240413110723:3b538bd8"
}
}
},
{
"category": "product_version",
"name": "conmon-debugsource-2.1.4-1.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"product": {
"name": "conmon-debugsource-2.1.4-1.module+el8.6.0+21266+3e24c7b3.x86_64.rpm (container-tools:rhel8)",
"product_id": "conmon-debugsource-2.1.4-1.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/conmon-debugsource@2.1.4-1.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=x86_64\u0026epoch=2\u0026rpmmod=container-tools:rhel8:8060020240413110723:3b538bd8"
}
}
},
{
"category": "product_version",
"name": "containernetworking-plugins-1.1.1-4.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"product": {
"name": "containernetworking-plugins-1.1.1-4.module+el8.6.0+21266+3e24c7b3.x86_64.rpm (container-tools:rhel8)",
"product_id": "containernetworking-plugins-1.1.1-4.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/containernetworking-plugins@1.1.1-4.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=x86_64\u0026epoch=1\u0026rpmmod=container-tools:rhel8:8060020240413110723:3b538bd8"
}
}
},
{
"category": "product_version",
"name": "containernetworking-plugins-debuginfo-1.1.1-4.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"product": {
"name": "containernetworking-plugins-debuginfo-1.1.1-4.module+el8.6.0+21266+3e24c7b3.x86_64.rpm (container-tools:rhel8)",
"product_id": "containernetworking-plugins-debuginfo-1.1.1-4.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/containernetworking-plugins-debuginfo@1.1.1-4.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=x86_64\u0026epoch=1\u0026rpmmod=container-tools:rhel8:8060020240413110723:3b538bd8"
}
}
},
{
"category": "product_version",
"name": "containernetworking-plugins-debugsource-1.1.1-4.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"product": {
"name": "containernetworking-plugins-debugsource-1.1.1-4.module+el8.6.0+21266+3e24c7b3.x86_64.rpm (container-tools:rhel8)",
"product_id": "containernetworking-plugins-debugsource-1.1.1-4.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/containernetworking-plugins-debugsource@1.1.1-4.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=x86_64\u0026epoch=1\u0026rpmmod=container-tools:rhel8:8060020240413110723:3b538bd8"
}
}
},
{
"category": "product_version",
"name": "containers-common-1-40.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"product": {
"name": "containers-common-1-40.module+el8.6.0+21266+3e24c7b3.x86_64.rpm (container-tools:rhel8)",
"product_id": "containers-common-1-40.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/containers-common@1-40.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=x86_64\u0026epoch=2\u0026rpmmod=container-tools:rhel8:8060020240413110723:3b538bd8"
}
}
},
{
"category": "product_version",
"name": "crit-3.15-3.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"product": {
"name": "crit-3.15-3.module+el8.6.0+21266+3e24c7b3.x86_64.rpm (container-tools:rhel8)",
"product_id": "crit-3.15-3.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/crit@3.15-3.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=x86_64\u0026rpmmod=container-tools:rhel8:8060020240413110723:3b538bd8"
}
}
},
{
"category": "product_version",
"name": "criu-3.15-3.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"product": {
"name": "criu-3.15-3.module+el8.6.0+21266+3e24c7b3.x86_64.rpm (container-tools:rhel8)",
"product_id": "criu-3.15-3.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/criu@3.15-3.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=x86_64\u0026rpmmod=container-tools:rhel8:8060020240413110723:3b538bd8"
}
}
},
{
"category": "product_version",
"name": "criu-debuginfo-3.15-3.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"product": {
"name": "criu-debuginfo-3.15-3.module+el8.6.0+21266+3e24c7b3.x86_64.rpm (container-tools:rhel8)",
"product_id": "criu-debuginfo-3.15-3.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/criu-debuginfo@3.15-3.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=x86_64\u0026rpmmod=container-tools:rhel8:8060020240413110723:3b538bd8"
}
}
},
{
"category": "product_version",
"name": "criu-debugsource-3.15-3.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"product": {
"name": "criu-debugsource-3.15-3.module+el8.6.0+21266+3e24c7b3.x86_64.rpm (container-tools:rhel8)",
"product_id": "criu-debugsource-3.15-3.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/criu-debugsource@3.15-3.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=x86_64\u0026rpmmod=container-tools:rhel8:8060020240413110723:3b538bd8"
}
}
},
{
"category": "product_version",
"name": "criu-devel-3.15-3.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"product": {
"name": "criu-devel-3.15-3.module+el8.6.0+21266+3e24c7b3.x86_64.rpm (container-tools:rhel8)",
"product_id": "criu-devel-3.15-3.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/criu-devel@3.15-3.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=x86_64\u0026rpmmod=container-tools:rhel8:8060020240413110723:3b538bd8"
}
}
},
{
"category": "product_version",
"name": "criu-libs-3.15-3.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"product": {
"name": "criu-libs-3.15-3.module+el8.6.0+21266+3e24c7b3.x86_64.rpm (container-tools:rhel8)",
"product_id": "criu-libs-3.15-3.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/criu-libs@3.15-3.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=x86_64\u0026rpmmod=container-tools:rhel8:8060020240413110723:3b538bd8"
}
}
},
{
"category": "product_version",
"name": "criu-libs-debuginfo-3.15-3.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"product": {
"name": "criu-libs-debuginfo-3.15-3.module+el8.6.0+21266+3e24c7b3.x86_64.rpm (container-tools:rhel8)",
"product_id": "criu-libs-debuginfo-3.15-3.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/criu-libs-debuginfo@3.15-3.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=x86_64\u0026rpmmod=container-tools:rhel8:8060020240413110723:3b538bd8"
}
}
},
{
"category": "product_version",
"name": "crun-1.5-1.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"product": {
"name": "crun-1.5-1.module+el8.6.0+21266+3e24c7b3.x86_64.rpm (container-tools:rhel8)",
"product_id": "crun-1.5-1.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/crun@1.5-1.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=x86_64\u0026rpmmod=container-tools:rhel8:8060020240413110723:3b538bd8"
}
}
},
{
"category": "product_version",
"name": "crun-debuginfo-1.5-1.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"product": {
"name": "crun-debuginfo-1.5-1.module+el8.6.0+21266+3e24c7b3.x86_64.rpm (container-tools:rhel8)",
"product_id": "crun-debuginfo-1.5-1.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/crun-debuginfo@1.5-1.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=x86_64\u0026rpmmod=container-tools:rhel8:8060020240413110723:3b538bd8"
}
}
},
{
"category": "product_version",
"name": "crun-debugsource-1.5-1.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"product": {
"name": "crun-debugsource-1.5-1.module+el8.6.0+21266+3e24c7b3.x86_64.rpm (container-tools:rhel8)",
"product_id": "crun-debugsource-1.5-1.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/crun-debugsource@1.5-1.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=x86_64\u0026rpmmod=container-tools:rhel8:8060020240413110723:3b538bd8"
}
}
},
{
"category": "product_version",
"name": "fuse-overlayfs-1.9-1.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"product": {
"name": "fuse-overlayfs-1.9-1.module+el8.6.0+21266+3e24c7b3.x86_64.rpm (container-tools:rhel8)",
"product_id": "fuse-overlayfs-1.9-1.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fuse-overlayfs@1.9-1.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=x86_64\u0026rpmmod=container-tools:rhel8:8060020240413110723:3b538bd8"
}
}
},
{
"category": "product_version",
"name": "fuse-overlayfs-debuginfo-1.9-1.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"product": {
"name": "fuse-overlayfs-debuginfo-1.9-1.module+el8.6.0+21266+3e24c7b3.x86_64.rpm (container-tools:rhel8)",
"product_id": "fuse-overlayfs-debuginfo-1.9-1.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fuse-overlayfs-debuginfo@1.9-1.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=x86_64\u0026rpmmod=container-tools:rhel8:8060020240413110723:3b538bd8"
}
}
},
{
"category": "product_version",
"name": "fuse-overlayfs-debugsource-1.9-1.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"product": {
"name": "fuse-overlayfs-debugsource-1.9-1.module+el8.6.0+21266+3e24c7b3.x86_64.rpm (container-tools:rhel8)",
"product_id": "fuse-overlayfs-debugsource-1.9-1.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fuse-overlayfs-debugsource@1.9-1.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=x86_64\u0026rpmmod=container-tools:rhel8:8060020240413110723:3b538bd8"
}
}
},
{
"category": "product_version",
"name": "libslirp-4.4.0-1.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"product": {
"name": "libslirp-4.4.0-1.module+el8.6.0+21266+3e24c7b3.x86_64.rpm (container-tools:rhel8)",
"product_id": "libslirp-4.4.0-1.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libslirp@4.4.0-1.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=x86_64\u0026rpmmod=container-tools:rhel8:8060020240413110723:3b538bd8"
}
}
},
{
"category": "product_version",
"name": "libslirp-debuginfo-4.4.0-1.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"product": {
"name": "libslirp-debuginfo-4.4.0-1.module+el8.6.0+21266+3e24c7b3.x86_64.rpm (container-tools:rhel8)",
"product_id": "libslirp-debuginfo-4.4.0-1.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libslirp-debuginfo@4.4.0-1.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=x86_64\u0026rpmmod=container-tools:rhel8:8060020240413110723:3b538bd8"
}
}
},
{
"category": "product_version",
"name": "libslirp-debugsource-4.4.0-1.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"product": {
"name": "libslirp-debugsource-4.4.0-1.module+el8.6.0+21266+3e24c7b3.x86_64.rpm (container-tools:rhel8)",
"product_id": "libslirp-debugsource-4.4.0-1.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libslirp-debugsource@4.4.0-1.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=x86_64\u0026rpmmod=container-tools:rhel8:8060020240413110723:3b538bd8"
}
}
},
{
"category": "product_version",
"name": "libslirp-devel-4.4.0-1.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"product": {
"name": "libslirp-devel-4.4.0-1.module+el8.6.0+21266+3e24c7b3.x86_64.rpm (container-tools:rhel8)",
"product_id": "libslirp-devel-4.4.0-1.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libslirp-devel@4.4.0-1.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=x86_64\u0026rpmmod=container-tools:rhel8:8060020240413110723:3b538bd8"
}
}
},
{
"category": "product_version",
"name": "netavark-1.0.1-40.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"product": {
"name": "netavark-1.0.1-40.module+el8.6.0+21266+3e24c7b3.x86_64.rpm (container-tools:rhel8)",
"product_id": "netavark-1.0.1-40.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/netavark@1.0.1-40.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=x86_64\u0026epoch=2\u0026rpmmod=container-tools:rhel8:8060020240413110723:3b538bd8"
}
}
},
{
"category": "product_version",
"name": "oci-seccomp-bpf-hook-1.2.6-1.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"product": {
"name": "oci-seccomp-bpf-hook-1.2.6-1.module+el8.6.0+21266+3e24c7b3.x86_64.rpm (container-tools:rhel8)",
"product_id": "oci-seccomp-bpf-hook-1.2.6-1.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/oci-seccomp-bpf-hook@1.2.6-1.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=x86_64\u0026rpmmod=container-tools:rhel8:8060020240413110723:3b538bd8"
}
}
},
{
"category": "product_version",
"name": "oci-seccomp-bpf-hook-debuginfo-1.2.6-1.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"product": {
"name": "oci-seccomp-bpf-hook-debuginfo-1.2.6-1.module+el8.6.0+21266+3e24c7b3.x86_64.rpm (container-tools:rhel8)",
"product_id": "oci-seccomp-bpf-hook-debuginfo-1.2.6-1.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/oci-seccomp-bpf-hook-debuginfo@1.2.6-1.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=x86_64\u0026rpmmod=container-tools:rhel8:8060020240413110723:3b538bd8"
}
}
},
{
"category": "product_version",
"name": "oci-seccomp-bpf-hook-debugsource-1.2.6-1.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"product": {
"name": "oci-seccomp-bpf-hook-debugsource-1.2.6-1.module+el8.6.0+21266+3e24c7b3.x86_64.rpm (container-tools:rhel8)",
"product_id": "oci-seccomp-bpf-hook-debugsource-1.2.6-1.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/oci-seccomp-bpf-hook-debugsource@1.2.6-1.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=x86_64\u0026rpmmod=container-tools:rhel8:8060020240413110723:3b538bd8"
}
}
},
{
"category": "product_version",
"name": "podman-4.2.0-2.module+el8.6.0+21674+8010760f.x86_64.rpm-container-tools:rhel8",
"product": {
"name": "podman-4.2.0-2.module+el8.6.0+21674+8010760f.x86_64.rpm (container-tools:rhel8)",
"product_id": "podman-4.2.0-2.module+el8.6.0+21674+8010760f.x86_64.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman@4.2.0-2.module%2Bel8.6.0%2B21674%2B8010760f?arch=x86_64\u0026epoch=2\u0026rpmmod=container-tools:rhel8:8060020240413110723:3b538bd8"
}
}
},
{
"category": "product_version",
"name": "podman-catatonit-4.2.0-2.module+el8.6.0+21674+8010760f.x86_64.rpm-container-tools:rhel8",
"product": {
"name": "podman-catatonit-4.2.0-2.module+el8.6.0+21674+8010760f.x86_64.rpm (container-tools:rhel8)",
"product_id": "podman-catatonit-4.2.0-2.module+el8.6.0+21674+8010760f.x86_64.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-catatonit@4.2.0-2.module%2Bel8.6.0%2B21674%2B8010760f?arch=x86_64\u0026epoch=2\u0026rpmmod=container-tools:rhel8:8060020240413110723:3b538bd8"
}
}
},
{
"category": "product_version",
"name": "podman-catatonit-debuginfo-4.2.0-2.module+el8.6.0+21674+8010760f.x86_64.rpm-container-tools:rhel8",
"product": {
"name": "podman-catatonit-debuginfo-4.2.0-2.module+el8.6.0+21674+8010760f.x86_64.rpm (container-tools:rhel8)",
"product_id": "podman-catatonit-debuginfo-4.2.0-2.module+el8.6.0+21674+8010760f.x86_64.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-catatonit-debuginfo@4.2.0-2.module%2Bel8.6.0%2B21674%2B8010760f?arch=x86_64\u0026epoch=2\u0026rpmmod=container-tools:rhel8:8060020240413110723:3b538bd8"
}
}
},
{
"category": "product_version",
"name": "podman-debuginfo-4.2.0-2.module+el8.6.0+21674+8010760f.x86_64.rpm-container-tools:rhel8",
"product": {
"name": "podman-debuginfo-4.2.0-2.module+el8.6.0+21674+8010760f.x86_64.rpm (container-tools:rhel8)",
"product_id": "podman-debuginfo-4.2.0-2.module+el8.6.0+21674+8010760f.x86_64.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-debuginfo@4.2.0-2.module%2Bel8.6.0%2B21674%2B8010760f?arch=x86_64\u0026epoch=2\u0026rpmmod=container-tools:rhel8:8060020240413110723:3b538bd8"
}
}
},
{
"category": "product_version",
"name": "podman-debugsource-4.2.0-2.module+el8.6.0+21674+8010760f.x86_64.rpm-container-tools:rhel8",
"product": {
"name": "podman-debugsource-4.2.0-2.module+el8.6.0+21674+8010760f.x86_64.rpm (container-tools:rhel8)",
"product_id": "podman-debugsource-4.2.0-2.module+el8.6.0+21674+8010760f.x86_64.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-debugsource@4.2.0-2.module%2Bel8.6.0%2B21674%2B8010760f?arch=x86_64\u0026epoch=2\u0026rpmmod=container-tools:rhel8:8060020240413110723:3b538bd8"
}
}
},
{
"category": "product_version",
"name": "podman-gvproxy-4.2.0-2.module+el8.6.0+21674+8010760f.x86_64.rpm-container-tools:rhel8",
"product": {
"name": "podman-gvproxy-4.2.0-2.module+el8.6.0+21674+8010760f.x86_64.rpm (container-tools:rhel8)",
"product_id": "podman-gvproxy-4.2.0-2.module+el8.6.0+21674+8010760f.x86_64.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-gvproxy@4.2.0-2.module%2Bel8.6.0%2B21674%2B8010760f?arch=x86_64\u0026epoch=2\u0026rpmmod=container-tools:rhel8:8060020240413110723:3b538bd8"
}
}
},
{
"category": "product_version",
"name": "podman-gvproxy-debuginfo-4.2.0-2.module+el8.6.0+21674+8010760f.x86_64.rpm-container-tools:rhel8",
"product": {
"name": "podman-gvproxy-debuginfo-4.2.0-2.module+el8.6.0+21674+8010760f.x86_64.rpm (container-tools:rhel8)",
"product_id": "podman-gvproxy-debuginfo-4.2.0-2.module+el8.6.0+21674+8010760f.x86_64.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-gvproxy-debuginfo@4.2.0-2.module%2Bel8.6.0%2B21674%2B8010760f?arch=x86_64\u0026epoch=2\u0026rpmmod=container-tools:rhel8:8060020240413110723:3b538bd8"
}
}
},
{
"category": "product_version",
"name": "podman-plugins-4.2.0-2.module+el8.6.0+21674+8010760f.x86_64.rpm-container-tools:rhel8",
"product": {
"name": "podman-plugins-4.2.0-2.module+el8.6.0+21674+8010760f.x86_64.rpm (container-tools:rhel8)",
"product_id": "podman-plugins-4.2.0-2.module+el8.6.0+21674+8010760f.x86_64.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-plugins@4.2.0-2.module%2Bel8.6.0%2B21674%2B8010760f?arch=x86_64\u0026epoch=2\u0026rpmmod=container-tools:rhel8:8060020240413110723:3b538bd8"
}
}
},
{
"category": "product_version",
"name": "podman-plugins-debuginfo-4.2.0-2.module+el8.6.0+21674+8010760f.x86_64.rpm-container-tools:rhel8",
"product": {
"name": "podman-plugins-debuginfo-4.2.0-2.module+el8.6.0+21674+8010760f.x86_64.rpm (container-tools:rhel8)",
"product_id": "podman-plugins-debuginfo-4.2.0-2.module+el8.6.0+21674+8010760f.x86_64.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-plugins-debuginfo@4.2.0-2.module%2Bel8.6.0%2B21674%2B8010760f?arch=x86_64\u0026epoch=2\u0026rpmmod=container-tools:rhel8:8060020240413110723:3b538bd8"
}
}
},
{
"category": "product_version",
"name": "podman-remote-4.2.0-2.module+el8.6.0+21674+8010760f.x86_64.rpm-container-tools:rhel8",
"product": {
"name": "podman-remote-4.2.0-2.module+el8.6.0+21674+8010760f.x86_64.rpm (container-tools:rhel8)",
"product_id": "podman-remote-4.2.0-2.module+el8.6.0+21674+8010760f.x86_64.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-remote@4.2.0-2.module%2Bel8.6.0%2B21674%2B8010760f?arch=x86_64\u0026epoch=2\u0026rpmmod=container-tools:rhel8:8060020240413110723:3b538bd8"
}
}
},
{
"category": "product_version",
"name": "podman-remote-debuginfo-4.2.0-2.module+el8.6.0+21674+8010760f.x86_64.rpm-container-tools:rhel8",
"product": {
"name": "podman-remote-debuginfo-4.2.0-2.module+el8.6.0+21674+8010760f.x86_64.rpm (container-tools:rhel8)",
"product_id": "podman-remote-debuginfo-4.2.0-2.module+el8.6.0+21674+8010760f.x86_64.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-remote-debuginfo@4.2.0-2.module%2Bel8.6.0%2B21674%2B8010760f?arch=x86_64\u0026epoch=2\u0026rpmmod=container-tools:rhel8:8060020240413110723:3b538bd8"
}
}
},
{
"category": "product_version",
"name": "podman-tests-4.2.0-2.module+el8.6.0+21674+8010760f.x86_64.rpm-container-tools:rhel8",
"product": {
"name": "podman-tests-4.2.0-2.module+el8.6.0+21674+8010760f.x86_64.rpm (container-tools:rhel8)",
"product_id": "podman-tests-4.2.0-2.module+el8.6.0+21674+8010760f.x86_64.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-tests@4.2.0-2.module%2Bel8.6.0%2B21674%2B8010760f?arch=x86_64\u0026epoch=2\u0026rpmmod=container-tools:rhel8:8060020240413110723:3b538bd8"
}
}
},
{
"category": "product_version",
"name": "python3-criu-3.15-3.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"product": {
"name": "python3-criu-3.15-3.module+el8.6.0+21266+3e24c7b3.x86_64.rpm (container-tools:rhel8)",
"product_id": "python3-criu-3.15-3.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-criu@3.15-3.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=x86_64\u0026rpmmod=container-tools:rhel8:8060020240413110723:3b538bd8"
}
}
},
{
"category": "product_version",
"name": "runc-1.1.12-1.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"product": {
"name": "runc-1.1.12-1.module+el8.6.0+21266+3e24c7b3.x86_64.rpm (container-tools:rhel8)",
"product_id": "runc-1.1.12-1.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/runc@1.1.12-1.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=x86_64\u0026epoch=1\u0026rpmmod=container-tools:rhel8:8060020240413110723:3b538bd8"
}
}
},
{
"category": "product_version",
"name": "runc-debuginfo-1.1.12-1.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"product": {
"name": "runc-debuginfo-1.1.12-1.module+el8.6.0+21266+3e24c7b3.x86_64.rpm (container-tools:rhel8)",
"product_id": "runc-debuginfo-1.1.12-1.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/runc-debuginfo@1.1.12-1.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=x86_64\u0026epoch=1\u0026rpmmod=container-tools:rhel8:8060020240413110723:3b538bd8"
}
}
},
{
"category": "product_version",
"name": "runc-debugsource-1.1.12-1.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"product": {
"name": "runc-debugsource-1.1.12-1.module+el8.6.0+21266+3e24c7b3.x86_64.rpm (container-tools:rhel8)",
"product_id": "runc-debugsource-1.1.12-1.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/runc-debugsource@1.1.12-1.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=x86_64\u0026epoch=1\u0026rpmmod=container-tools:rhel8:8060020240413110723:3b538bd8"
}
}
},
{
"category": "product_version",
"name": "skopeo-1.9.1-1.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"product": {
"name": "skopeo-1.9.1-1.module+el8.6.0+21266+3e24c7b3.x86_64.rpm (container-tools:rhel8)",
"product_id": "skopeo-1.9.1-1.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/skopeo@1.9.1-1.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=x86_64\u0026epoch=2\u0026rpmmod=container-tools:rhel8:8060020240413110723:3b538bd8"
}
}
},
{
"category": "product_version",
"name": "skopeo-debuginfo-1.9.1-1.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"product": {
"name": "skopeo-debuginfo-1.9.1-1.module+el8.6.0+21266+3e24c7b3.x86_64.rpm (container-tools:rhel8)",
"product_id": "skopeo-debuginfo-1.9.1-1.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/skopeo-debuginfo@1.9.1-1.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=x86_64\u0026epoch=2\u0026rpmmod=container-tools:rhel8:8060020240413110723:3b538bd8"
}
}
},
{
"category": "product_version",
"name": "skopeo-debugsource-1.9.1-1.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"product": {
"name": "skopeo-debugsource-1.9.1-1.module+el8.6.0+21266+3e24c7b3.x86_64.rpm (container-tools:rhel8)",
"product_id": "skopeo-debugsource-1.9.1-1.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/skopeo-debugsource@1.9.1-1.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=x86_64\u0026epoch=2\u0026rpmmod=container-tools:rhel8:8060020240413110723:3b538bd8"
}
}
},
{
"category": "product_version",
"name": "skopeo-tests-1.9.1-1.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"product": {
"name": "skopeo-tests-1.9.1-1.module+el8.6.0+21266+3e24c7b3.x86_64.rpm (container-tools:rhel8)",
"product_id": "skopeo-tests-1.9.1-1.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/skopeo-tests@1.9.1-1.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=x86_64\u0026epoch=2\u0026rpmmod=container-tools:rhel8:8060020240413110723:3b538bd8"
}
}
},
{
"category": "product_version",
"name": "slirp4netns-1.2.0-3.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"product": {
"name": "slirp4netns-1.2.0-3.module+el8.6.0+21266+3e24c7b3.x86_64.rpm (container-tools:rhel8)",
"product_id": "slirp4netns-1.2.0-3.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/slirp4netns@1.2.0-3.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=x86_64\u0026rpmmod=container-tools:rhel8:8060020240413110723:3b538bd8"
}
}
},
{
"category": "product_version",
"name": "slirp4netns-debuginfo-1.2.0-3.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"product": {
"name": "slirp4netns-debuginfo-1.2.0-3.module+el8.6.0+21266+3e24c7b3.x86_64.rpm (container-tools:rhel8)",
"product_id": "slirp4netns-debuginfo-1.2.0-3.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/slirp4netns-debuginfo@1.2.0-3.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=x86_64\u0026rpmmod=container-tools:rhel8:8060020240413110723:3b538bd8"
}
}
},
{
"category": "product_version",
"name": "slirp4netns-debugsource-1.2.0-3.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"product": {
"name": "slirp4netns-debugsource-1.2.0-3.module+el8.6.0+21266+3e24c7b3.x86_64.rpm (container-tools:rhel8)",
"product_id": "slirp4netns-debugsource-1.2.0-3.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/slirp4netns-debugsource@1.2.0-3.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=x86_64\u0026rpmmod=container-tools:rhel8:8060020240413110723:3b538bd8"
}
}
},
{
"category": "product_version",
"name": "toolbox-0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"product": {
"name": "toolbox-0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.x86_64.rpm (container-tools:rhel8)",
"product_id": "toolbox-0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/toolbox@0.0.99.3-0.7.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=x86_64\u0026rpmmod=container-tools:rhel8:8060020240413110723:3b538bd8"
}
}
},
{
"category": "product_version",
"name": "toolbox-debuginfo-0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"product": {
"name": "toolbox-debuginfo-0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.x86_64.rpm (container-tools:rhel8)",
"product_id": "toolbox-debuginfo-0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/toolbox-debuginfo@0.0.99.3-0.7.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=x86_64\u0026rpmmod=container-tools:rhel8:8060020240413110723:3b538bd8"
}
}
},
{
"category": "product_version",
"name": "toolbox-debugsource-0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"product": {
"name": "toolbox-debugsource-0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.x86_64.rpm (container-tools:rhel8)",
"product_id": "toolbox-debugsource-0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/toolbox-debugsource@0.0.99.3-0.7.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=x86_64\u0026rpmmod=container-tools:rhel8:8060020240413110723:3b538bd8"
}
}
},
{
"category": "product_version",
"name": "toolbox-tests-0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"product": {
"name": "toolbox-tests-0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.x86_64.rpm (container-tools:rhel8)",
"product_id": "toolbox-tests-0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/toolbox-tests@0.0.99.3-0.7.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=x86_64\u0026rpmmod=container-tools:rhel8:8060020240413110723:3b538bd8"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "buildah-1.26.2-1.module+el8.6.0+21266+3e24c7b3.src.rpm-container-tools:rhel8",
"product": {
"name": "buildah-1.26.2-1.module+el8.6.0+21266+3e24c7b3.src.rpm (container-tools:rhel8)",
"product_id": "buildah-1.26.2-1.module+el8.6.0+21266+3e24c7b3.src.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/buildah@1.26.2-1.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=src\u0026epoch=1\u0026rpmmod=container-tools:rhel8:8060020240413110723:3b538bd8"
}
}
},
{
"category": "product_version",
"name": "cockpit-podman-49.1-1.module+el8.6.0+21266+3e24c7b3.src.rpm-container-tools:rhel8",
"product": {
"name": "cockpit-podman-49.1-1.module+el8.6.0+21266+3e24c7b3.src.rpm (container-tools:rhel8)",
"product_id": "cockpit-podman-49.1-1.module+el8.6.0+21266+3e24c7b3.src.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cockpit-podman@49.1-1.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=src\u0026rpmmod=container-tools:rhel8:8060020240413110723:3b538bd8"
}
}
},
{
"category": "product_version",
"name": "conmon-2.1.4-1.module+el8.6.0+21266+3e24c7b3.src.rpm-container-tools:rhel8",
"product": {
"name": "conmon-2.1.4-1.module+el8.6.0+21266+3e24c7b3.src.rpm (container-tools:rhel8)",
"product_id": "conmon-2.1.4-1.module+el8.6.0+21266+3e24c7b3.src.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/conmon@2.1.4-1.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=src\u0026epoch=2\u0026rpmmod=container-tools:rhel8:8060020240413110723:3b538bd8"
}
}
},
{
"category": "product_version",
"name": "container-selinux-2.189.0-1.module+el8.6.0+21266+3e24c7b3.src.rpm-container-tools:rhel8",
"product": {
"name": "container-selinux-2.189.0-1.module+el8.6.0+21266+3e24c7b3.src.rpm (container-tools:rhel8)",
"product_id": "container-selinux-2.189.0-1.module+el8.6.0+21266+3e24c7b3.src.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/container-selinux@2.189.0-1.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=src\u0026epoch=2\u0026rpmmod=container-tools:rhel8:8060020240413110723:3b538bd8"
}
}
},
{
"category": "product_version",
"name": "containernetworking-plugins-1.1.1-4.module+el8.6.0+21266+3e24c7b3.src.rpm-container-tools:rhel8",
"product": {
"name": "containernetworking-plugins-1.1.1-4.module+el8.6.0+21266+3e24c7b3.src.rpm (container-tools:rhel8)",
"product_id": "containernetworking-plugins-1.1.1-4.module+el8.6.0+21266+3e24c7b3.src.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/containernetworking-plugins@1.1.1-4.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=src\u0026epoch=1\u0026rpmmod=container-tools:rhel8:8060020240413110723:3b538bd8"
}
}
},
{
"category": "product_version",
"name": "containers-common-1-40.module+el8.6.0+21266+3e24c7b3.src.rpm-container-tools:rhel8",
"product": {
"name": "containers-common-1-40.module+el8.6.0+21266+3e24c7b3.src.rpm (container-tools:rhel8)",
"product_id": "containers-common-1-40.module+el8.6.0+21266+3e24c7b3.src.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/containers-common@1-40.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=src\u0026epoch=2\u0026rpmmod=container-tools:rhel8:8060020240413110723:3b538bd8"
}
}
},
{
"category": "product_version",
"name": "criu-3.15-3.module+el8.6.0+21266+3e24c7b3.src.rpm-container-tools:rhel8",
"product": {
"name": "criu-3.15-3.module+el8.6.0+21266+3e24c7b3.src.rpm (container-tools:rhel8)",
"product_id": "criu-3.15-3.module+el8.6.0+21266+3e24c7b3.src.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/criu@3.15-3.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=src\u0026rpmmod=container-tools:rhel8:8060020240413110723:3b538bd8"
}
}
},
{
"category": "product_version",
"name": "crun-1.5-1.module+el8.6.0+21266+3e24c7b3.src.rpm-container-tools:rhel8",
"product": {
"name": "crun-1.5-1.module+el8.6.0+21266+3e24c7b3.src.rpm (container-tools:rhel8)",
"product_id": "crun-1.5-1.module+el8.6.0+21266+3e24c7b3.src.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/crun@1.5-1.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=src\u0026rpmmod=container-tools:rhel8:8060020240413110723:3b538bd8"
}
}
},
{
"category": "product_version",
"name": "fuse-overlayfs-1.9-1.module+el8.6.0+21266+3e24c7b3.src.rpm-container-tools:rhel8",
"product": {
"name": "fuse-overlayfs-1.9-1.module+el8.6.0+21266+3e24c7b3.src.rpm (container-tools:rhel8)",
"product_id": "fuse-overlayfs-1.9-1.module+el8.6.0+21266+3e24c7b3.src.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fuse-overlayfs@1.9-1.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=src\u0026rpmmod=container-tools:rhel8:8060020240413110723:3b538bd8"
}
}
},
{
"category": "product_version",
"name": "libslirp-4.4.0-1.module+el8.6.0+21266+3e24c7b3.src.rpm-container-tools:rhel8",
"product": {
"name": "libslirp-4.4.0-1.module+el8.6.0+21266+3e24c7b3.src.rpm (container-tools:rhel8)",
"product_id": "libslirp-4.4.0-1.module+el8.6.0+21266+3e24c7b3.src.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libslirp@4.4.0-1.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=src\u0026rpmmod=container-tools:rhel8:8060020240413110723:3b538bd8"
}
}
},
{
"category": "product_version",
"name": "oci-seccomp-bpf-hook-1.2.6-1.module+el8.6.0+21266+3e24c7b3.src.rpm-container-tools:rhel8",
"product": {
"name": "oci-seccomp-bpf-hook-1.2.6-1.module+el8.6.0+21266+3e24c7b3.src.rpm (container-tools:rhel8)",
"product_id": "oci-seccomp-bpf-hook-1.2.6-1.module+el8.6.0+21266+3e24c7b3.src.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/oci-seccomp-bpf-hook@1.2.6-1.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=src\u0026rpmmod=container-tools:rhel8:8060020240413110723:3b538bd8"
}
}
},
{
"category": "product_version",
"name": "podman-4.2.0-2.module+el8.6.0+21674+8010760f.src.rpm-container-tools:rhel8",
"product": {
"name": "podman-4.2.0-2.module+el8.6.0+21674+8010760f.src.rpm (container-tools:rhel8)",
"product_id": "podman-4.2.0-2.module+el8.6.0+21674+8010760f.src.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman@4.2.0-2.module%2Bel8.6.0%2B21674%2B8010760f?arch=src\u0026epoch=2\u0026rpmmod=container-tools:rhel8:8060020240413110723:3b538bd8"
}
}
},
{
"category": "product_version",
"name": "python-podman-4.0.1-1.module+el8.6.0+21266+3e24c7b3.src.rpm-container-tools:rhel8",
"product": {
"name": "python-podman-4.0.1-1.module+el8.6.0+21266+3e24c7b3.src.rpm (container-tools:rhel8)",
"product_id": "python-podman-4.0.1-1.module+el8.6.0+21266+3e24c7b3.src.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-podman@4.0.1-1.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=src\u0026rpmmod=container-tools:rhel8:8060020240413110723:3b538bd8"
}
}
},
{
"category": "product_version",
"name": "runc-1.1.12-1.module+el8.6.0+21266+3e24c7b3.src.rpm-container-tools:rhel8",
"product": {
"name": "runc-1.1.12-1.module+el8.6.0+21266+3e24c7b3.src.rpm (container-tools:rhel8)",
"product_id": "runc-1.1.12-1.module+el8.6.0+21266+3e24c7b3.src.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/runc@1.1.12-1.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=src\u0026epoch=1\u0026rpmmod=container-tools:rhel8:8060020240413110723:3b538bd8"
}
}
},
{
"category": "product_version",
"name": "skopeo-1.9.1-1.module+el8.6.0+21266+3e24c7b3.src.rpm-container-tools:rhel8",
"product": {
"name": "skopeo-1.9.1-1.module+el8.6.0+21266+3e24c7b3.src.rpm (container-tools:rhel8)",
"product_id": "skopeo-1.9.1-1.module+el8.6.0+21266+3e24c7b3.src.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/skopeo@1.9.1-1.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=src\u0026epoch=2\u0026rpmmod=container-tools:rhel8:8060020240413110723:3b538bd8"
}
}
},
{
"category": "product_version",
"name": "slirp4netns-1.2.0-3.module+el8.6.0+21266+3e24c7b3.src.rpm-container-tools:rhel8",
"product": {
"name": "slirp4netns-1.2.0-3.module+el8.6.0+21266+3e24c7b3.src.rpm (container-tools:rhel8)",
"product_id": "slirp4netns-1.2.0-3.module+el8.6.0+21266+3e24c7b3.src.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/slirp4netns@1.2.0-3.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=src\u0026rpmmod=container-tools:rhel8:8060020240413110723:3b538bd8"
}
}
},
{
"category": "product_version",
"name": "toolbox-0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.src.rpm-container-tools:rhel8",
"product": {
"name": "toolbox-0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.src.rpm (container-tools:rhel8)",
"product_id": "toolbox-0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.src.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/toolbox@0.0.99.3-0.7.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=src\u0026rpmmod=container-tools:rhel8:8060020240413110723:3b538bd8"
}
}
},
{
"category": "product_version",
"name": "udica-0.2.6-5.module+el8.6.0+21266+3e24c7b3.src.rpm-container-tools:rhel8",
"product": {
"name": "udica-0.2.6-5.module+el8.6.0+21266+3e24c7b3.src.rpm (container-tools:rhel8)",
"product_id": "udica-0.2.6-5.module+el8.6.0+21266+3e24c7b3.src.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/udica@0.2.6-5.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=src\u0026rpmmod=container-tools:rhel8:8060020240413110723:3b538bd8"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "cockpit-podman-49.1-1.module+el8.6.0+21266+3e24c7b3.noarch.rpm-container-tools:rhel8",
"product": {
"name": "cockpit-podman-49.1-1.module+el8.6.0+21266+3e24c7b3.noarch.rpm (container-tools:rhel8)",
"product_id": "cockpit-podman-49.1-1.module+el8.6.0+21266+3e24c7b3.noarch.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cockpit-podman@49.1-1.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=noarch\u0026rpmmod=container-tools:rhel8:8060020240413110723:3b538bd8"
}
}
},
{
"category": "product_version",
"name": "container-selinux-2.189.0-1.module+el8.6.0+21266+3e24c7b3.noarch.rpm-container-tools:rhel8",
"product": {
"name": "container-selinux-2.189.0-1.module+el8.6.0+21266+3e24c7b3.noarch.rpm (container-tools:rhel8)",
"product_id": "container-selinux-2.189.0-1.module+el8.6.0+21266+3e24c7b3.noarch.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/container-selinux@2.189.0-1.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=noarch\u0026epoch=2\u0026rpmmod=container-tools:rhel8:8060020240413110723:3b538bd8"
}
}
},
{
"category": "product_version",
"name": "podman-docker-4.2.0-2.module+el8.6.0+21674+8010760f.noarch.rpm-container-tools:rhel8",
"product": {
"name": "podman-docker-4.2.0-2.module+el8.6.0+21674+8010760f.noarch.rpm (container-tools:rhel8)",
"product_id": "podman-docker-4.2.0-2.module+el8.6.0+21674+8010760f.noarch.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-docker@4.2.0-2.module%2Bel8.6.0%2B21674%2B8010760f?arch=noarch\u0026epoch=2\u0026rpmmod=container-tools:rhel8:8060020240413110723:3b538bd8"
}
}
},
{
"category": "product_version",
"name": "python3-podman-4.0.1-1.module+el8.6.0+21266+3e24c7b3.noarch.rpm-container-tools:rhel8",
"product": {
"name": "python3-podman-4.0.1-1.module+el8.6.0+21266+3e24c7b3.noarch.rpm (container-tools:rhel8)",
"product_id": "python3-podman-4.0.1-1.module+el8.6.0+21266+3e24c7b3.noarch.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-podman@4.0.1-1.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=noarch\u0026rpmmod=container-tools:rhel8:8060020240413110723:3b538bd8"
}
}
},
{
"category": "product_version",
"name": "udica-0.2.6-5.module+el8.6.0+21266+3e24c7b3.noarch.rpm-container-tools:rhel8",
"product": {
"name": "udica-0.2.6-5.module+el8.6.0+21266+3e24c7b3.noarch.rpm (container-tools:rhel8)",
"product_id": "udica-0.2.6-5.module+el8.6.0+21266+3e24c7b3.noarch.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/udica@0.2.6-5.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=noarch\u0026rpmmod=container-tools:rhel8:8060020240413110723:3b538bd8"
}
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "aardvark-dns-1.0.1-40.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"product": {
"name": "aardvark-dns-1.0.1-40.module+el8.6.0+21266+3e24c7b3.s390x.rpm (container-tools:rhel8)",
"product_id": "aardvark-dns-1.0.1-40.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/aardvark-dns@1.0.1-40.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=s390x\u0026epoch=2\u0026rpmmod=container-tools:rhel8:8060020240413110723:3b538bd8"
}
}
},
{
"category": "product_version",
"name": "buildah-1.26.2-1.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"product": {
"name": "buildah-1.26.2-1.module+el8.6.0+21266+3e24c7b3.s390x.rpm (container-tools:rhel8)",
"product_id": "buildah-1.26.2-1.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/buildah@1.26.2-1.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=s390x\u0026epoch=1\u0026rpmmod=container-tools:rhel8:8060020240413110723:3b538bd8"
}
}
},
{
"category": "product_version",
"name": "buildah-debuginfo-1.26.2-1.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"product": {
"name": "buildah-debuginfo-1.26.2-1.module+el8.6.0+21266+3e24c7b3.s390x.rpm (container-tools:rhel8)",
"product_id": "buildah-debuginfo-1.26.2-1.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/buildah-debuginfo@1.26.2-1.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=s390x\u0026epoch=1\u0026rpmmod=container-tools:rhel8:8060020240413110723:3b538bd8"
}
}
},
{
"category": "product_version",
"name": "buildah-debugsource-1.26.2-1.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"product": {
"name": "buildah-debugsource-1.26.2-1.module+el8.6.0+21266+3e24c7b3.s390x.rpm (container-tools:rhel8)",
"product_id": "buildah-debugsource-1.26.2-1.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/buildah-debugsource@1.26.2-1.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=s390x\u0026epoch=1\u0026rpmmod=container-tools:rhel8:8060020240413110723:3b538bd8"
}
}
},
{
"category": "product_version",
"name": "buildah-tests-1.26.2-1.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"product": {
"name": "buildah-tests-1.26.2-1.module+el8.6.0+21266+3e24c7b3.s390x.rpm (container-tools:rhel8)",
"product_id": "buildah-tests-1.26.2-1.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/buildah-tests@1.26.2-1.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=s390x\u0026epoch=1\u0026rpmmod=container-tools:rhel8:8060020240413110723:3b538bd8"
}
}
},
{
"category": "product_version",
"name": "buildah-tests-debuginfo-1.26.2-1.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"product": {
"name": "buildah-tests-debuginfo-1.26.2-1.module+el8.6.0+21266+3e24c7b3.s390x.rpm (container-tools:rhel8)",
"product_id": "buildah-tests-debuginfo-1.26.2-1.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/buildah-tests-debuginfo@1.26.2-1.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=s390x\u0026epoch=1\u0026rpmmod=container-tools:rhel8:8060020240413110723:3b538bd8"
}
}
},
{
"category": "product_version",
"name": "conmon-2.1.4-1.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"product": {
"name": "conmon-2.1.4-1.module+el8.6.0+21266+3e24c7b3.s390x.rpm (container-tools:rhel8)",
"product_id": "conmon-2.1.4-1.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/conmon@2.1.4-1.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=s390x\u0026epoch=2\u0026rpmmod=container-tools:rhel8:8060020240413110723:3b538bd8"
}
}
},
{
"category": "product_version",
"name": "conmon-debuginfo-2.1.4-1.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"product": {
"name": "conmon-debuginfo-2.1.4-1.module+el8.6.0+21266+3e24c7b3.s390x.rpm (container-tools:rhel8)",
"product_id": "conmon-debuginfo-2.1.4-1.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/conmon-debuginfo@2.1.4-1.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=s390x\u0026epoch=2\u0026rpmmod=container-tools:rhel8:8060020240413110723:3b538bd8"
}
}
},
{
"category": "product_version",
"name": "conmon-debugsource-2.1.4-1.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"product": {
"name": "conmon-debugsource-2.1.4-1.module+el8.6.0+21266+3e24c7b3.s390x.rpm (container-tools:rhel8)",
"product_id": "conmon-debugsource-2.1.4-1.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/conmon-debugsource@2.1.4-1.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=s390x\u0026epoch=2\u0026rpmmod=container-tools:rhel8:8060020240413110723:3b538bd8"
}
}
},
{
"category": "product_version",
"name": "containernetworking-plugins-1.1.1-4.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"product": {
"name": "containernetworking-plugins-1.1.1-4.module+el8.6.0+21266+3e24c7b3.s390x.rpm (container-tools:rhel8)",
"product_id": "containernetworking-plugins-1.1.1-4.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/containernetworking-plugins@1.1.1-4.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=s390x\u0026epoch=1\u0026rpmmod=container-tools:rhel8:8060020240413110723:3b538bd8"
}
}
},
{
"category": "product_version",
"name": "containernetworking-plugins-debuginfo-1.1.1-4.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"product": {
"name": "containernetworking-plugins-debuginfo-1.1.1-4.module+el8.6.0+21266+3e24c7b3.s390x.rpm (container-tools:rhel8)",
"product_id": "containernetworking-plugins-debuginfo-1.1.1-4.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/containernetworking-plugins-debuginfo@1.1.1-4.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=s390x\u0026epoch=1\u0026rpmmod=container-tools:rhel8:8060020240413110723:3b538bd8"
}
}
},
{
"category": "product_version",
"name": "containernetworking-plugins-debugsource-1.1.1-4.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"product": {
"name": "containernetworking-plugins-debugsource-1.1.1-4.module+el8.6.0+21266+3e24c7b3.s390x.rpm (container-tools:rhel8)",
"product_id": "containernetworking-plugins-debugsource-1.1.1-4.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/containernetworking-plugins-debugsource@1.1.1-4.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=s390x\u0026epoch=1\u0026rpmmod=container-tools:rhel8:8060020240413110723:3b538bd8"
}
}
},
{
"category": "product_version",
"name": "containers-common-1-40.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"product": {
"name": "containers-common-1-40.module+el8.6.0+21266+3e24c7b3.s390x.rpm (container-tools:rhel8)",
"product_id": "containers-common-1-40.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/containers-common@1-40.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=s390x\u0026epoch=2\u0026rpmmod=container-tools:rhel8:8060020240413110723:3b538bd8"
}
}
},
{
"category": "product_version",
"name": "crit-3.15-3.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"product": {
"name": "crit-3.15-3.module+el8.6.0+21266+3e24c7b3.s390x.rpm (container-tools:rhel8)",
"product_id": "crit-3.15-3.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/crit@3.15-3.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=s390x\u0026rpmmod=container-tools:rhel8:8060020240413110723:3b538bd8"
}
}
},
{
"category": "product_version",
"name": "criu-3.15-3.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"product": {
"name": "criu-3.15-3.module+el8.6.0+21266+3e24c7b3.s390x.rpm (container-tools:rhel8)",
"product_id": "criu-3.15-3.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/criu@3.15-3.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=s390x\u0026rpmmod=container-tools:rhel8:8060020240413110723:3b538bd8"
}
}
},
{
"category": "product_version",
"name": "criu-debuginfo-3.15-3.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"product": {
"name": "criu-debuginfo-3.15-3.module+el8.6.0+21266+3e24c7b3.s390x.rpm (container-tools:rhel8)",
"product_id": "criu-debuginfo-3.15-3.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/criu-debuginfo@3.15-3.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=s390x\u0026rpmmod=container-tools:rhel8:8060020240413110723:3b538bd8"
}
}
},
{
"category": "product_version",
"name": "criu-debugsource-3.15-3.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"product": {
"name": "criu-debugsource-3.15-3.module+el8.6.0+21266+3e24c7b3.s390x.rpm (container-tools:rhel8)",
"product_id": "criu-debugsource-3.15-3.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/criu-debugsource@3.15-3.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=s390x\u0026rpmmod=container-tools:rhel8:8060020240413110723:3b538bd8"
}
}
},
{
"category": "product_version",
"name": "criu-devel-3.15-3.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"product": {
"name": "criu-devel-3.15-3.module+el8.6.0+21266+3e24c7b3.s390x.rpm (container-tools:rhel8)",
"product_id": "criu-devel-3.15-3.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/criu-devel@3.15-3.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=s390x\u0026rpmmod=container-tools:rhel8:8060020240413110723:3b538bd8"
}
}
},
{
"category": "product_version",
"name": "criu-libs-3.15-3.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"product": {
"name": "criu-libs-3.15-3.module+el8.6.0+21266+3e24c7b3.s390x.rpm (container-tools:rhel8)",
"product_id": "criu-libs-3.15-3.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/criu-libs@3.15-3.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=s390x\u0026rpmmod=container-tools:rhel8:8060020240413110723:3b538bd8"
}
}
},
{
"category": "product_version",
"name": "criu-libs-debuginfo-3.15-3.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"product": {
"name": "criu-libs-debuginfo-3.15-3.module+el8.6.0+21266+3e24c7b3.s390x.rpm (container-tools:rhel8)",
"product_id": "criu-libs-debuginfo-3.15-3.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/criu-libs-debuginfo@3.15-3.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=s390x\u0026rpmmod=container-tools:rhel8:8060020240413110723:3b538bd8"
}
}
},
{
"category": "product_version",
"name": "crun-1.5-1.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"product": {
"name": "crun-1.5-1.module+el8.6.0+21266+3e24c7b3.s390x.rpm (container-tools:rhel8)",
"product_id": "crun-1.5-1.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/crun@1.5-1.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=s390x\u0026rpmmod=container-tools:rhel8:8060020240413110723:3b538bd8"
}
}
},
{
"category": "product_version",
"name": "crun-debuginfo-1.5-1.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"product": {
"name": "crun-debuginfo-1.5-1.module+el8.6.0+21266+3e24c7b3.s390x.rpm (container-tools:rhel8)",
"product_id": "crun-debuginfo-1.5-1.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/crun-debuginfo@1.5-1.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=s390x\u0026rpmmod=container-tools:rhel8:8060020240413110723:3b538bd8"
}
}
},
{
"category": "product_version",
"name": "crun-debugsource-1.5-1.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"product": {
"name": "crun-debugsource-1.5-1.module+el8.6.0+21266+3e24c7b3.s390x.rpm (container-tools:rhel8)",
"product_id": "crun-debugsource-1.5-1.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/crun-debugsource@1.5-1.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=s390x\u0026rpmmod=container-tools:rhel8:8060020240413110723:3b538bd8"
}
}
},
{
"category": "product_version",
"name": "fuse-overlayfs-1.9-1.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"product": {
"name": "fuse-overlayfs-1.9-1.module+el8.6.0+21266+3e24c7b3.s390x.rpm (container-tools:rhel8)",
"product_id": "fuse-overlayfs-1.9-1.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fuse-overlayfs@1.9-1.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=s390x\u0026rpmmod=container-tools:rhel8:8060020240413110723:3b538bd8"
}
}
},
{
"category": "product_version",
"name": "fuse-overlayfs-debuginfo-1.9-1.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"product": {
"name": "fuse-overlayfs-debuginfo-1.9-1.module+el8.6.0+21266+3e24c7b3.s390x.rpm (container-tools:rhel8)",
"product_id": "fuse-overlayfs-debuginfo-1.9-1.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fuse-overlayfs-debuginfo@1.9-1.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=s390x\u0026rpmmod=container-tools:rhel8:8060020240413110723:3b538bd8"
}
}
},
{
"category": "product_version",
"name": "fuse-overlayfs-debugsource-1.9-1.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"product": {
"name": "fuse-overlayfs-debugsource-1.9-1.module+el8.6.0+21266+3e24c7b3.s390x.rpm (container-tools:rhel8)",
"product_id": "fuse-overlayfs-debugsource-1.9-1.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fuse-overlayfs-debugsource@1.9-1.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=s390x\u0026rpmmod=container-tools:rhel8:8060020240413110723:3b538bd8"
}
}
},
{
"category": "product_version",
"name": "libslirp-4.4.0-1.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"product": {
"name": "libslirp-4.4.0-1.module+el8.6.0+21266+3e24c7b3.s390x.rpm (container-tools:rhel8)",
"product_id": "libslirp-4.4.0-1.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libslirp@4.4.0-1.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=s390x\u0026rpmmod=container-tools:rhel8:8060020240413110723:3b538bd8"
}
}
},
{
"category": "product_version",
"name": "libslirp-debuginfo-4.4.0-1.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"product": {
"name": "libslirp-debuginfo-4.4.0-1.module+el8.6.0+21266+3e24c7b3.s390x.rpm (container-tools:rhel8)",
"product_id": "libslirp-debuginfo-4.4.0-1.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libslirp-debuginfo@4.4.0-1.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=s390x\u0026rpmmod=container-tools:rhel8:8060020240413110723:3b538bd8"
}
}
},
{
"category": "product_version",
"name": "libslirp-debugsource-4.4.0-1.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"product": {
"name": "libslirp-debugsource-4.4.0-1.module+el8.6.0+21266+3e24c7b3.s390x.rpm (container-tools:rhel8)",
"product_id": "libslirp-debugsource-4.4.0-1.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libslirp-debugsource@4.4.0-1.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=s390x\u0026rpmmod=container-tools:rhel8:8060020240413110723:3b538bd8"
}
}
},
{
"category": "product_version",
"name": "libslirp-devel-4.4.0-1.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"product": {
"name": "libslirp-devel-4.4.0-1.module+el8.6.0+21266+3e24c7b3.s390x.rpm (container-tools:rhel8)",
"product_id": "libslirp-devel-4.4.0-1.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libslirp-devel@4.4.0-1.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=s390x\u0026rpmmod=container-tools:rhel8:8060020240413110723:3b538bd8"
}
}
},
{
"category": "product_version",
"name": "netavark-1.0.1-40.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"product": {
"name": "netavark-1.0.1-40.module+el8.6.0+21266+3e24c7b3.s390x.rpm (container-tools:rhel8)",
"product_id": "netavark-1.0.1-40.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/netavark@1.0.1-40.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=s390x\u0026epoch=2\u0026rpmmod=container-tools:rhel8:8060020240413110723:3b538bd8"
}
}
},
{
"category": "product_version",
"name": "oci-seccomp-bpf-hook-1.2.6-1.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"product": {
"name": "oci-seccomp-bpf-hook-1.2.6-1.module+el8.6.0+21266+3e24c7b3.s390x.rpm (container-tools:rhel8)",
"product_id": "oci-seccomp-bpf-hook-1.2.6-1.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/oci-seccomp-bpf-hook@1.2.6-1.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=s390x\u0026rpmmod=container-tools:rhel8:8060020240413110723:3b538bd8"
}
}
},
{
"category": "product_version",
"name": "oci-seccomp-bpf-hook-debuginfo-1.2.6-1.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"product": {
"name": "oci-seccomp-bpf-hook-debuginfo-1.2.6-1.module+el8.6.0+21266+3e24c7b3.s390x.rpm (container-tools:rhel8)",
"product_id": "oci-seccomp-bpf-hook-debuginfo-1.2.6-1.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/oci-seccomp-bpf-hook-debuginfo@1.2.6-1.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=s390x\u0026rpmmod=container-tools:rhel8:8060020240413110723:3b538bd8"
}
}
},
{
"category": "product_version",
"name": "oci-seccomp-bpf-hook-debugsource-1.2.6-1.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"product": {
"name": "oci-seccomp-bpf-hook-debugsource-1.2.6-1.module+el8.6.0+21266+3e24c7b3.s390x.rpm (container-tools:rhel8)",
"product_id": "oci-seccomp-bpf-hook-debugsource-1.2.6-1.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/oci-seccomp-bpf-hook-debugsource@1.2.6-1.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=s390x\u0026rpmmod=container-tools:rhel8:8060020240413110723:3b538bd8"
}
}
},
{
"category": "product_version",
"name": "podman-4.2.0-2.module+el8.6.0+21674+8010760f.s390x.rpm-container-tools:rhel8",
"product": {
"name": "podman-4.2.0-2.module+el8.6.0+21674+8010760f.s390x.rpm (container-tools:rhel8)",
"product_id": "podman-4.2.0-2.module+el8.6.0+21674+8010760f.s390x.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman@4.2.0-2.module%2Bel8.6.0%2B21674%2B8010760f?arch=s390x\u0026epoch=2\u0026rpmmod=container-tools:rhel8:8060020240413110723:3b538bd8"
}
}
},
{
"category": "product_version",
"name": "podman-catatonit-4.2.0-2.module+el8.6.0+21674+8010760f.s390x.rpm-container-tools:rhel8",
"product": {
"name": "podman-catatonit-4.2.0-2.module+el8.6.0+21674+8010760f.s390x.rpm (container-tools:rhel8)",
"product_id": "podman-catatonit-4.2.0-2.module+el8.6.0+21674+8010760f.s390x.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-catatonit@4.2.0-2.module%2Bel8.6.0%2B21674%2B8010760f?arch=s390x\u0026epoch=2\u0026rpmmod=container-tools:rhel8:8060020240413110723:3b538bd8"
}
}
},
{
"category": "product_version",
"name": "podman-catatonit-debuginfo-4.2.0-2.module+el8.6.0+21674+8010760f.s390x.rpm-container-tools:rhel8",
"product": {
"name": "podman-catatonit-debuginfo-4.2.0-2.module+el8.6.0+21674+8010760f.s390x.rpm (container-tools:rhel8)",
"product_id": "podman-catatonit-debuginfo-4.2.0-2.module+el8.6.0+21674+8010760f.s390x.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-catatonit-debuginfo@4.2.0-2.module%2Bel8.6.0%2B21674%2B8010760f?arch=s390x\u0026epoch=2\u0026rpmmod=container-tools:rhel8:8060020240413110723:3b538bd8"
}
}
},
{
"category": "product_version",
"name": "podman-debuginfo-4.2.0-2.module+el8.6.0+21674+8010760f.s390x.rpm-container-tools:rhel8",
"product": {
"name": "podman-debuginfo-4.2.0-2.module+el8.6.0+21674+8010760f.s390x.rpm (container-tools:rhel8)",
"product_id": "podman-debuginfo-4.2.0-2.module+el8.6.0+21674+8010760f.s390x.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-debuginfo@4.2.0-2.module%2Bel8.6.0%2B21674%2B8010760f?arch=s390x\u0026epoch=2\u0026rpmmod=container-tools:rhel8:8060020240413110723:3b538bd8"
}
}
},
{
"category": "product_version",
"name": "podman-debugsource-4.2.0-2.module+el8.6.0+21674+8010760f.s390x.rpm-container-tools:rhel8",
"product": {
"name": "podman-debugsource-4.2.0-2.module+el8.6.0+21674+8010760f.s390x.rpm (container-tools:rhel8)",
"product_id": "podman-debugsource-4.2.0-2.module+el8.6.0+21674+8010760f.s390x.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-debugsource@4.2.0-2.module%2Bel8.6.0%2B21674%2B8010760f?arch=s390x\u0026epoch=2\u0026rpmmod=container-tools:rhel8:8060020240413110723:3b538bd8"
}
}
},
{
"category": "product_version",
"name": "podman-gvproxy-4.2.0-2.module+el8.6.0+21674+8010760f.s390x.rpm-container-tools:rhel8",
"product": {
"name": "podman-gvproxy-4.2.0-2.module+el8.6.0+21674+8010760f.s390x.rpm (container-tools:rhel8)",
"product_id": "podman-gvproxy-4.2.0-2.module+el8.6.0+21674+8010760f.s390x.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-gvproxy@4.2.0-2.module%2Bel8.6.0%2B21674%2B8010760f?arch=s390x\u0026epoch=2\u0026rpmmod=container-tools:rhel8:8060020240413110723:3b538bd8"
}
}
},
{
"category": "product_version",
"name": "podman-gvproxy-debuginfo-4.2.0-2.module+el8.6.0+21674+8010760f.s390x.rpm-container-tools:rhel8",
"product": {
"name": "podman-gvproxy-debuginfo-4.2.0-2.module+el8.6.0+21674+8010760f.s390x.rpm (container-tools:rhel8)",
"product_id": "podman-gvproxy-debuginfo-4.2.0-2.module+el8.6.0+21674+8010760f.s390x.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-gvproxy-debuginfo@4.2.0-2.module%2Bel8.6.0%2B21674%2B8010760f?arch=s390x\u0026epoch=2\u0026rpmmod=container-tools:rhel8:8060020240413110723:3b538bd8"
}
}
},
{
"category": "product_version",
"name": "podman-plugins-4.2.0-2.module+el8.6.0+21674+8010760f.s390x.rpm-container-tools:rhel8",
"product": {
"name": "podman-plugins-4.2.0-2.module+el8.6.0+21674+8010760f.s390x.rpm (container-tools:rhel8)",
"product_id": "podman-plugins-4.2.0-2.module+el8.6.0+21674+8010760f.s390x.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-plugins@4.2.0-2.module%2Bel8.6.0%2B21674%2B8010760f?arch=s390x\u0026epoch=2\u0026rpmmod=container-tools:rhel8:8060020240413110723:3b538bd8"
}
}
},
{
"category": "product_version",
"name": "podman-plugins-debuginfo-4.2.0-2.module+el8.6.0+21674+8010760f.s390x.rpm-container-tools:rhel8",
"product": {
"name": "podman-plugins-debuginfo-4.2.0-2.module+el8.6.0+21674+8010760f.s390x.rpm (container-tools:rhel8)",
"product_id": "podman-plugins-debuginfo-4.2.0-2.module+el8.6.0+21674+8010760f.s390x.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-plugins-debuginfo@4.2.0-2.module%2Bel8.6.0%2B21674%2B8010760f?arch=s390x\u0026epoch=2\u0026rpmmod=container-tools:rhel8:8060020240413110723:3b538bd8"
}
}
},
{
"category": "product_version",
"name": "podman-remote-4.2.0-2.module+el8.6.0+21674+8010760f.s390x.rpm-container-tools:rhel8",
"product": {
"name": "podman-remote-4.2.0-2.module+el8.6.0+21674+8010760f.s390x.rpm (container-tools:rhel8)",
"product_id": "podman-remote-4.2.0-2.module+el8.6.0+21674+8010760f.s390x.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-remote@4.2.0-2.module%2Bel8.6.0%2B21674%2B8010760f?arch=s390x\u0026epoch=2\u0026rpmmod=container-tools:rhel8:8060020240413110723:3b538bd8"
}
}
},
{
"category": "product_version",
"name": "podman-remote-debuginfo-4.2.0-2.module+el8.6.0+21674+8010760f.s390x.rpm-container-tools:rhel8",
"product": {
"name": "podman-remote-debuginfo-4.2.0-2.module+el8.6.0+21674+8010760f.s390x.rpm (container-tools:rhel8)",
"product_id": "podman-remote-debuginfo-4.2.0-2.module+el8.6.0+21674+8010760f.s390x.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-remote-debuginfo@4.2.0-2.module%2Bel8.6.0%2B21674%2B8010760f?arch=s390x\u0026epoch=2\u0026rpmmod=container-tools:rhel8:8060020240413110723:3b538bd8"
}
}
},
{
"category": "product_version",
"name": "podman-tests-4.2.0-2.module+el8.6.0+21674+8010760f.s390x.rpm-container-tools:rhel8",
"product": {
"name": "podman-tests-4.2.0-2.module+el8.6.0+21674+8010760f.s390x.rpm (container-tools:rhel8)",
"product_id": "podman-tests-4.2.0-2.module+el8.6.0+21674+8010760f.s390x.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-tests@4.2.0-2.module%2Bel8.6.0%2B21674%2B8010760f?arch=s390x\u0026epoch=2\u0026rpmmod=container-tools:rhel8:8060020240413110723:3b538bd8"
}
}
},
{
"category": "product_version",
"name": "python3-criu-3.15-3.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"product": {
"name": "python3-criu-3.15-3.module+el8.6.0+21266+3e24c7b3.s390x.rpm (container-tools:rhel8)",
"product_id": "python3-criu-3.15-3.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-criu@3.15-3.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=s390x\u0026rpmmod=container-tools:rhel8:8060020240413110723:3b538bd8"
}
}
},
{
"category": "product_version",
"name": "runc-1.1.12-1.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"product": {
"name": "runc-1.1.12-1.module+el8.6.0+21266+3e24c7b3.s390x.rpm (container-tools:rhel8)",
"product_id": "runc-1.1.12-1.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/runc@1.1.12-1.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=s390x\u0026epoch=1\u0026rpmmod=container-tools:rhel8:8060020240413110723:3b538bd8"
}
}
},
{
"category": "product_version",
"name": "runc-debuginfo-1.1.12-1.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"product": {
"name": "runc-debuginfo-1.1.12-1.module+el8.6.0+21266+3e24c7b3.s390x.rpm (container-tools:rhel8)",
"product_id": "runc-debuginfo-1.1.12-1.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/runc-debuginfo@1.1.12-1.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=s390x\u0026epoch=1\u0026rpmmod=container-tools:rhel8:8060020240413110723:3b538bd8"
}
}
},
{
"category": "product_version",
"name": "runc-debugsource-1.1.12-1.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"product": {
"name": "runc-debugsource-1.1.12-1.module+el8.6.0+21266+3e24c7b3.s390x.rpm (container-tools:rhel8)",
"product_id": "runc-debugsource-1.1.12-1.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/runc-debugsource@1.1.12-1.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=s390x\u0026epoch=1\u0026rpmmod=container-tools:rhel8:8060020240413110723:3b538bd8"
}
}
},
{
"category": "product_version",
"name": "skopeo-1.9.1-1.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"product": {
"name": "skopeo-1.9.1-1.module+el8.6.0+21266+3e24c7b3.s390x.rpm (container-tools:rhel8)",
"product_id": "skopeo-1.9.1-1.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/skopeo@1.9.1-1.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=s390x\u0026epoch=2\u0026rpmmod=container-tools:rhel8:8060020240413110723:3b538bd8"
}
}
},
{
"category": "product_version",
"name": "skopeo-debuginfo-1.9.1-1.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"product": {
"name": "skopeo-debuginfo-1.9.1-1.module+el8.6.0+21266+3e24c7b3.s390x.rpm (container-tools:rhel8)",
"product_id": "skopeo-debuginfo-1.9.1-1.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/skopeo-debuginfo@1.9.1-1.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=s390x\u0026epoch=2\u0026rpmmod=container-tools:rhel8:8060020240413110723:3b538bd8"
}
}
},
{
"category": "product_version",
"name": "skopeo-debugsource-1.9.1-1.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"product": {
"name": "skopeo-debugsource-1.9.1-1.module+el8.6.0+21266+3e24c7b3.s390x.rpm (container-tools:rhel8)",
"product_id": "skopeo-debugsource-1.9.1-1.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/skopeo-debugsource@1.9.1-1.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=s390x\u0026epoch=2\u0026rpmmod=container-tools:rhel8:8060020240413110723:3b538bd8"
}
}
},
{
"category": "product_version",
"name": "skopeo-tests-1.9.1-1.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"product": {
"name": "skopeo-tests-1.9.1-1.module+el8.6.0+21266+3e24c7b3.s390x.rpm (container-tools:rhel8)",
"product_id": "skopeo-tests-1.9.1-1.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/skopeo-tests@1.9.1-1.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=s390x\u0026epoch=2\u0026rpmmod=container-tools:rhel8:8060020240413110723:3b538bd8"
}
}
},
{
"category": "product_version",
"name": "slirp4netns-1.2.0-3.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"product": {
"name": "slirp4netns-1.2.0-3.module+el8.6.0+21266+3e24c7b3.s390x.rpm (container-tools:rhel8)",
"product_id": "slirp4netns-1.2.0-3.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/slirp4netns@1.2.0-3.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=s390x\u0026rpmmod=container-tools:rhel8:8060020240413110723:3b538bd8"
}
}
},
{
"category": "product_version",
"name": "slirp4netns-debuginfo-1.2.0-3.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"product": {
"name": "slirp4netns-debuginfo-1.2.0-3.module+el8.6.0+21266+3e24c7b3.s390x.rpm (container-tools:rhel8)",
"product_id": "slirp4netns-debuginfo-1.2.0-3.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/slirp4netns-debuginfo@1.2.0-3.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=s390x\u0026rpmmod=container-tools:rhel8:8060020240413110723:3b538bd8"
}
}
},
{
"category": "product_version",
"name": "slirp4netns-debugsource-1.2.0-3.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"product": {
"name": "slirp4netns-debugsource-1.2.0-3.module+el8.6.0+21266+3e24c7b3.s390x.rpm (container-tools:rhel8)",
"product_id": "slirp4netns-debugsource-1.2.0-3.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/slirp4netns-debugsource@1.2.0-3.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=s390x\u0026rpmmod=container-tools:rhel8:8060020240413110723:3b538bd8"
}
}
},
{
"category": "product_version",
"name": "toolbox-0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"product": {
"name": "toolbox-0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.s390x.rpm (container-tools:rhel8)",
"product_id": "toolbox-0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/toolbox@0.0.99.3-0.7.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=s390x\u0026rpmmod=container-tools:rhel8:8060020240413110723:3b538bd8"
}
}
},
{
"category": "product_version",
"name": "toolbox-debuginfo-0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"product": {
"name": "toolbox-debuginfo-0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.s390x.rpm (container-tools:rhel8)",
"product_id": "toolbox-debuginfo-0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/toolbox-debuginfo@0.0.99.3-0.7.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=s390x\u0026rpmmod=container-tools:rhel8:8060020240413110723:3b538bd8"
}
}
},
{
"category": "product_version",
"name": "toolbox-debugsource-0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"product": {
"name": "toolbox-debugsource-0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.s390x.rpm (container-tools:rhel8)",
"product_id": "toolbox-debugsource-0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/toolbox-debugsource@0.0.99.3-0.7.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=s390x\u0026rpmmod=container-tools:rhel8:8060020240413110723:3b538bd8"
}
}
},
{
"category": "product_version",
"name": "toolbox-tests-0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"product": {
"name": "toolbox-tests-0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.s390x.rpm (container-tools:rhel8)",
"product_id": "toolbox-tests-0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/toolbox-tests@0.0.99.3-0.7.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=s390x\u0026rpmmod=container-tools:rhel8:8060020240413110723:3b538bd8"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "aardvark-dns-1.0.1-40.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"product": {
"name": "aardvark-dns-1.0.1-40.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm (container-tools:rhel8)",
"product_id": "aardvark-dns-1.0.1-40.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/aardvark-dns@1.0.1-40.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=ppc64le\u0026epoch=2\u0026rpmmod=container-tools:rhel8:8060020240413110723:3b538bd8"
}
}
},
{
"category": "product_version",
"name": "buildah-1.26.2-1.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"product": {
"name": "buildah-1.26.2-1.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm (container-tools:rhel8)",
"product_id": "buildah-1.26.2-1.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/buildah@1.26.2-1.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=ppc64le\u0026epoch=1\u0026rpmmod=container-tools:rhel8:8060020240413110723:3b538bd8"
}
}
},
{
"category": "product_version",
"name": "buildah-debuginfo-1.26.2-1.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"product": {
"name": "buildah-debuginfo-1.26.2-1.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm (container-tools:rhel8)",
"product_id": "buildah-debuginfo-1.26.2-1.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/buildah-debuginfo@1.26.2-1.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=ppc64le\u0026epoch=1\u0026rpmmod=container-tools:rhel8:8060020240413110723:3b538bd8"
}
}
},
{
"category": "product_version",
"name": "buildah-debugsource-1.26.2-1.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"product": {
"name": "buildah-debugsource-1.26.2-1.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm (container-tools:rhel8)",
"product_id": "buildah-debugsource-1.26.2-1.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/buildah-debugsource@1.26.2-1.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=ppc64le\u0026epoch=1\u0026rpmmod=container-tools:rhel8:8060020240413110723:3b538bd8"
}
}
},
{
"category": "product_version",
"name": "buildah-tests-1.26.2-1.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"product": {
"name": "buildah-tests-1.26.2-1.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm (container-tools:rhel8)",
"product_id": "buildah-tests-1.26.2-1.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/buildah-tests@1.26.2-1.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=ppc64le\u0026epoch=1\u0026rpmmod=container-tools:rhel8:8060020240413110723:3b538bd8"
}
}
},
{
"category": "product_version",
"name": "buildah-tests-debuginfo-1.26.2-1.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"product": {
"name": "buildah-tests-debuginfo-1.26.2-1.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm (container-tools:rhel8)",
"product_id": "buildah-tests-debuginfo-1.26.2-1.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/buildah-tests-debuginfo@1.26.2-1.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=ppc64le\u0026epoch=1\u0026rpmmod=container-tools:rhel8:8060020240413110723:3b538bd8"
}
}
},
{
"category": "product_version",
"name": "conmon-2.1.4-1.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"product": {
"name": "conmon-2.1.4-1.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm (container-tools:rhel8)",
"product_id": "conmon-2.1.4-1.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/conmon@2.1.4-1.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=ppc64le\u0026epoch=2\u0026rpmmod=container-tools:rhel8:8060020240413110723:3b538bd8"
}
}
},
{
"category": "product_version",
"name": "conmon-debuginfo-2.1.4-1.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"product": {
"name": "conmon-debuginfo-2.1.4-1.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm (container-tools:rhel8)",
"product_id": "conmon-debuginfo-2.1.4-1.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/conmon-debuginfo@2.1.4-1.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=ppc64le\u0026epoch=2\u0026rpmmod=container-tools:rhel8:8060020240413110723:3b538bd8"
}
}
},
{
"category": "product_version",
"name": "conmon-debugsource-2.1.4-1.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"product": {
"name": "conmon-debugsource-2.1.4-1.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm (container-tools:rhel8)",
"product_id": "conmon-debugsource-2.1.4-1.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/conmon-debugsource@2.1.4-1.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=ppc64le\u0026epoch=2\u0026rpmmod=container-tools:rhel8:8060020240413110723:3b538bd8"
}
}
},
{
"category": "product_version",
"name": "containernetworking-plugins-1.1.1-4.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"product": {
"name": "containernetworking-plugins-1.1.1-4.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm (container-tools:rhel8)",
"product_id": "containernetworking-plugins-1.1.1-4.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/containernetworking-plugins@1.1.1-4.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=ppc64le\u0026epoch=1\u0026rpmmod=container-tools:rhel8:8060020240413110723:3b538bd8"
}
}
},
{
"category": "product_version",
"name": "containernetworking-plugins-debuginfo-1.1.1-4.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"product": {
"name": "containernetworking-plugins-debuginfo-1.1.1-4.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm (container-tools:rhel8)",
"product_id": "containernetworking-plugins-debuginfo-1.1.1-4.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/containernetworking-plugins-debuginfo@1.1.1-4.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=ppc64le\u0026epoch=1\u0026rpmmod=container-tools:rhel8:8060020240413110723:3b538bd8"
}
}
},
{
"category": "product_version",
"name": "containernetworking-plugins-debugsource-1.1.1-4.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"product": {
"name": "containernetworking-plugins-debugsource-1.1.1-4.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm (container-tools:rhel8)",
"product_id": "containernetworking-plugins-debugsource-1.1.1-4.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/containernetworking-plugins-debugsource@1.1.1-4.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=ppc64le\u0026epoch=1\u0026rpmmod=container-tools:rhel8:8060020240413110723:3b538bd8"
}
}
},
{
"category": "product_version",
"name": "containers-common-1-40.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"product": {
"name": "containers-common-1-40.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm (container-tools:rhel8)",
"product_id": "containers-common-1-40.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/containers-common@1-40.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=ppc64le\u0026epoch=2\u0026rpmmod=container-tools:rhel8:8060020240413110723:3b538bd8"
}
}
},
{
"category": "product_version",
"name": "crit-3.15-3.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"product": {
"name": "crit-3.15-3.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm (container-tools:rhel8)",
"product_id": "crit-3.15-3.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/crit@3.15-3.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=ppc64le\u0026rpmmod=container-tools:rhel8:8060020240413110723:3b538bd8"
}
}
},
{
"category": "product_version",
"name": "criu-3.15-3.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"product": {
"name": "criu-3.15-3.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm (container-tools:rhel8)",
"product_id": "criu-3.15-3.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/criu@3.15-3.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=ppc64le\u0026rpmmod=container-tools:rhel8:8060020240413110723:3b538bd8"
}
}
},
{
"category": "product_version",
"name": "criu-debuginfo-3.15-3.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"product": {
"name": "criu-debuginfo-3.15-3.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm (container-tools:rhel8)",
"product_id": "criu-debuginfo-3.15-3.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/criu-debuginfo@3.15-3.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=ppc64le\u0026rpmmod=container-tools:rhel8:8060020240413110723:3b538bd8"
}
}
},
{
"category": "product_version",
"name": "criu-debugsource-3.15-3.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"product": {
"name": "criu-debugsource-3.15-3.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm (container-tools:rhel8)",
"product_id": "criu-debugsource-3.15-3.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/criu-debugsource@3.15-3.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=ppc64le\u0026rpmmod=container-tools:rhel8:8060020240413110723:3b538bd8"
}
}
},
{
"category": "product_version",
"name": "criu-devel-3.15-3.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"product": {
"name": "criu-devel-3.15-3.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm (container-tools:rhel8)",
"product_id": "criu-devel-3.15-3.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/criu-devel@3.15-3.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=ppc64le\u0026rpmmod=container-tools:rhel8:8060020240413110723:3b538bd8"
}
}
},
{
"category": "product_version",
"name": "criu-libs-3.15-3.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"product": {
"name": "criu-libs-3.15-3.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm (container-tools:rhel8)",
"product_id": "criu-libs-3.15-3.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/criu-libs@3.15-3.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=ppc64le\u0026rpmmod=container-tools:rhel8:8060020240413110723:3b538bd8"
}
}
},
{
"category": "product_version",
"name": "criu-libs-debuginfo-3.15-3.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"product": {
"name": "criu-libs-debuginfo-3.15-3.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm (container-tools:rhel8)",
"product_id": "criu-libs-debuginfo-3.15-3.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/criu-libs-debuginfo@3.15-3.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=ppc64le\u0026rpmmod=container-tools:rhel8:8060020240413110723:3b538bd8"
}
}
},
{
"category": "product_version",
"name": "crun-1.5-1.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"product": {
"name": "crun-1.5-1.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm (container-tools:rhel8)",
"product_id": "crun-1.5-1.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/crun@1.5-1.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=ppc64le\u0026rpmmod=container-tools:rhel8:8060020240413110723:3b538bd8"
}
}
},
{
"category": "product_version",
"name": "crun-debuginfo-1.5-1.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"product": {
"name": "crun-debuginfo-1.5-1.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm (container-tools:rhel8)",
"product_id": "crun-debuginfo-1.5-1.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/crun-debuginfo@1.5-1.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=ppc64le\u0026rpmmod=container-tools:rhel8:8060020240413110723:3b538bd8"
}
}
},
{
"category": "product_version",
"name": "crun-debugsource-1.5-1.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"product": {
"name": "crun-debugsource-1.5-1.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm (container-tools:rhel8)",
"product_id": "crun-debugsource-1.5-1.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/crun-debugsource@1.5-1.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=ppc64le\u0026rpmmod=container-tools:rhel8:8060020240413110723:3b538bd8"
}
}
},
{
"category": "product_version",
"name": "fuse-overlayfs-1.9-1.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"product": {
"name": "fuse-overlayfs-1.9-1.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm (container-tools:rhel8)",
"product_id": "fuse-overlayfs-1.9-1.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fuse-overlayfs@1.9-1.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=ppc64le\u0026rpmmod=container-tools:rhel8:8060020240413110723:3b538bd8"
}
}
},
{
"category": "product_version",
"name": "fuse-overlayfs-debuginfo-1.9-1.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"product": {
"name": "fuse-overlayfs-debuginfo-1.9-1.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm (container-tools:rhel8)",
"product_id": "fuse-overlayfs-debuginfo-1.9-1.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fuse-overlayfs-debuginfo@1.9-1.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=ppc64le\u0026rpmmod=container-tools:rhel8:8060020240413110723:3b538bd8"
}
}
},
{
"category": "product_version",
"name": "fuse-overlayfs-debugsource-1.9-1.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"product": {
"name": "fuse-overlayfs-debugsource-1.9-1.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm (container-tools:rhel8)",
"product_id": "fuse-overlayfs-debugsource-1.9-1.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fuse-overlayfs-debugsource@1.9-1.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=ppc64le\u0026rpmmod=container-tools:rhel8:8060020240413110723:3b538bd8"
}
}
},
{
"category": "product_version",
"name": "libslirp-4.4.0-1.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"product": {
"name": "libslirp-4.4.0-1.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm (container-tools:rhel8)",
"product_id": "libslirp-4.4.0-1.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libslirp@4.4.0-1.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=ppc64le\u0026rpmmod=container-tools:rhel8:8060020240413110723:3b538bd8"
}
}
},
{
"category": "product_version",
"name": "libslirp-debuginfo-4.4.0-1.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"product": {
"name": "libslirp-debuginfo-4.4.0-1.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm (container-tools:rhel8)",
"product_id": "libslirp-debuginfo-4.4.0-1.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libslirp-debuginfo@4.4.0-1.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=ppc64le\u0026rpmmod=container-tools:rhel8:8060020240413110723:3b538bd8"
}
}
},
{
"category": "product_version",
"name": "libslirp-debugsource-4.4.0-1.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"product": {
"name": "libslirp-debugsource-4.4.0-1.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm (container-tools:rhel8)",
"product_id": "libslirp-debugsource-4.4.0-1.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libslirp-debugsource@4.4.0-1.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=ppc64le\u0026rpmmod=container-tools:rhel8:8060020240413110723:3b538bd8"
}
}
},
{
"category": "product_version",
"name": "libslirp-devel-4.4.0-1.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"product": {
"name": "libslirp-devel-4.4.0-1.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm (container-tools:rhel8)",
"product_id": "libslirp-devel-4.4.0-1.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libslirp-devel@4.4.0-1.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=ppc64le\u0026rpmmod=container-tools:rhel8:8060020240413110723:3b538bd8"
}
}
},
{
"category": "product_version",
"name": "netavark-1.0.1-40.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"product": {
"name": "netavark-1.0.1-40.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm (container-tools:rhel8)",
"product_id": "netavark-1.0.1-40.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/netavark@1.0.1-40.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=ppc64le\u0026epoch=2\u0026rpmmod=container-tools:rhel8:8060020240413110723:3b538bd8"
}
}
},
{
"category": "product_version",
"name": "oci-seccomp-bpf-hook-1.2.6-1.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"product": {
"name": "oci-seccomp-bpf-hook-1.2.6-1.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm (container-tools:rhel8)",
"product_id": "oci-seccomp-bpf-hook-1.2.6-1.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/oci-seccomp-bpf-hook@1.2.6-1.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=ppc64le\u0026rpmmod=container-tools:rhel8:8060020240413110723:3b538bd8"
}
}
},
{
"category": "product_version",
"name": "oci-seccomp-bpf-hook-debuginfo-1.2.6-1.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"product": {
"name": "oci-seccomp-bpf-hook-debuginfo-1.2.6-1.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm (container-tools:rhel8)",
"product_id": "oci-seccomp-bpf-hook-debuginfo-1.2.6-1.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/oci-seccomp-bpf-hook-debuginfo@1.2.6-1.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=ppc64le\u0026rpmmod=container-tools:rhel8:8060020240413110723:3b538bd8"
}
}
},
{
"category": "product_version",
"name": "oci-seccomp-bpf-hook-debugsource-1.2.6-1.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"product": {
"name": "oci-seccomp-bpf-hook-debugsource-1.2.6-1.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm (container-tools:rhel8)",
"product_id": "oci-seccomp-bpf-hook-debugsource-1.2.6-1.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/oci-seccomp-bpf-hook-debugsource@1.2.6-1.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=ppc64le\u0026rpmmod=container-tools:rhel8:8060020240413110723:3b538bd8"
}
}
},
{
"category": "product_version",
"name": "podman-4.2.0-2.module+el8.6.0+21674+8010760f.ppc64le.rpm-container-tools:rhel8",
"product": {
"name": "podman-4.2.0-2.module+el8.6.0+21674+8010760f.ppc64le.rpm (container-tools:rhel8)",
"product_id": "podman-4.2.0-2.module+el8.6.0+21674+8010760f.ppc64le.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman@4.2.0-2.module%2Bel8.6.0%2B21674%2B8010760f?arch=ppc64le\u0026epoch=2\u0026rpmmod=container-tools:rhel8:8060020240413110723:3b538bd8"
}
}
},
{
"category": "product_version",
"name": "podman-catatonit-4.2.0-2.module+el8.6.0+21674+8010760f.ppc64le.rpm-container-tools:rhel8",
"product": {
"name": "podman-catatonit-4.2.0-2.module+el8.6.0+21674+8010760f.ppc64le.rpm (container-tools:rhel8)",
"product_id": "podman-catatonit-4.2.0-2.module+el8.6.0+21674+8010760f.ppc64le.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-catatonit@4.2.0-2.module%2Bel8.6.0%2B21674%2B8010760f?arch=ppc64le\u0026epoch=2\u0026rpmmod=container-tools:rhel8:8060020240413110723:3b538bd8"
}
}
},
{
"category": "product_version",
"name": "podman-catatonit-debuginfo-4.2.0-2.module+el8.6.0+21674+8010760f.ppc64le.rpm-container-tools:rhel8",
"product": {
"name": "podman-catatonit-debuginfo-4.2.0-2.module+el8.6.0+21674+8010760f.ppc64le.rpm (container-tools:rhel8)",
"product_id": "podman-catatonit-debuginfo-4.2.0-2.module+el8.6.0+21674+8010760f.ppc64le.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-catatonit-debuginfo@4.2.0-2.module%2Bel8.6.0%2B21674%2B8010760f?arch=ppc64le\u0026epoch=2\u0026rpmmod=container-tools:rhel8:8060020240413110723:3b538bd8"
}
}
},
{
"category": "product_version",
"name": "podman-debuginfo-4.2.0-2.module+el8.6.0+21674+8010760f.ppc64le.rpm-container-tools:rhel8",
"product": {
"name": "podman-debuginfo-4.2.0-2.module+el8.6.0+21674+8010760f.ppc64le.rpm (container-tools:rhel8)",
"product_id": "podman-debuginfo-4.2.0-2.module+el8.6.0+21674+8010760f.ppc64le.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-debuginfo@4.2.0-2.module%2Bel8.6.0%2B21674%2B8010760f?arch=ppc64le\u0026epoch=2\u0026rpmmod=container-tools:rhel8:8060020240413110723:3b538bd8"
}
}
},
{
"category": "product_version",
"name": "podman-debugsource-4.2.0-2.module+el8.6.0+21674+8010760f.ppc64le.rpm-container-tools:rhel8",
"product": {
"name": "podman-debugsource-4.2.0-2.module+el8.6.0+21674+8010760f.ppc64le.rpm (container-tools:rhel8)",
"product_id": "podman-debugsource-4.2.0-2.module+el8.6.0+21674+8010760f.ppc64le.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-debugsource@4.2.0-2.module%2Bel8.6.0%2B21674%2B8010760f?arch=ppc64le\u0026epoch=2\u0026rpmmod=container-tools:rhel8:8060020240413110723:3b538bd8"
}
}
},
{
"category": "product_version",
"name": "podman-gvproxy-4.2.0-2.module+el8.6.0+21674+8010760f.ppc64le.rpm-container-tools:rhel8",
"product": {
"name": "podman-gvproxy-4.2.0-2.module+el8.6.0+21674+8010760f.ppc64le.rpm (container-tools:rhel8)",
"product_id": "podman-gvproxy-4.2.0-2.module+el8.6.0+21674+8010760f.ppc64le.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-gvproxy@4.2.0-2.module%2Bel8.6.0%2B21674%2B8010760f?arch=ppc64le\u0026epoch=2\u0026rpmmod=container-tools:rhel8:8060020240413110723:3b538bd8"
}
}
},
{
"category": "product_version",
"name": "podman-gvproxy-debuginfo-4.2.0-2.module+el8.6.0+21674+8010760f.ppc64le.rpm-container-tools:rhel8",
"product": {
"name": "podman-gvproxy-debuginfo-4.2.0-2.module+el8.6.0+21674+8010760f.ppc64le.rpm (container-tools:rhel8)",
"product_id": "podman-gvproxy-debuginfo-4.2.0-2.module+el8.6.0+21674+8010760f.ppc64le.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-gvproxy-debuginfo@4.2.0-2.module%2Bel8.6.0%2B21674%2B8010760f?arch=ppc64le\u0026epoch=2\u0026rpmmod=container-tools:rhel8:8060020240413110723:3b538bd8"
}
}
},
{
"category": "product_version",
"name": "podman-plugins-4.2.0-2.module+el8.6.0+21674+8010760f.ppc64le.rpm-container-tools:rhel8",
"product": {
"name": "podman-plugins-4.2.0-2.module+el8.6.0+21674+8010760f.ppc64le.rpm (container-tools:rhel8)",
"product_id": "podman-plugins-4.2.0-2.module+el8.6.0+21674+8010760f.ppc64le.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-plugins@4.2.0-2.module%2Bel8.6.0%2B21674%2B8010760f?arch=ppc64le\u0026epoch=2\u0026rpmmod=container-tools:rhel8:8060020240413110723:3b538bd8"
}
}
},
{
"category": "product_version",
"name": "podman-plugins-debuginfo-4.2.0-2.module+el8.6.0+21674+8010760f.ppc64le.rpm-container-tools:rhel8",
"product": {
"name": "podman-plugins-debuginfo-4.2.0-2.module+el8.6.0+21674+8010760f.ppc64le.rpm (container-tools:rhel8)",
"product_id": "podman-plugins-debuginfo-4.2.0-2.module+el8.6.0+21674+8010760f.ppc64le.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-plugins-debuginfo@4.2.0-2.module%2Bel8.6.0%2B21674%2B8010760f?arch=ppc64le\u0026epoch=2\u0026rpmmod=container-tools:rhel8:8060020240413110723:3b538bd8"
}
}
},
{
"category": "product_version",
"name": "podman-remote-4.2.0-2.module+el8.6.0+21674+8010760f.ppc64le.rpm-container-tools:rhel8",
"product": {
"name": "podman-remote-4.2.0-2.module+el8.6.0+21674+8010760f.ppc64le.rpm (container-tools:rhel8)",
"product_id": "podman-remote-4.2.0-2.module+el8.6.0+21674+8010760f.ppc64le.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-remote@4.2.0-2.module%2Bel8.6.0%2B21674%2B8010760f?arch=ppc64le\u0026epoch=2\u0026rpmmod=container-tools:rhel8:8060020240413110723:3b538bd8"
}
}
},
{
"category": "product_version",
"name": "podman-remote-debuginfo-4.2.0-2.module+el8.6.0+21674+8010760f.ppc64le.rpm-container-tools:rhel8",
"product": {
"name": "podman-remote-debuginfo-4.2.0-2.module+el8.6.0+21674+8010760f.ppc64le.rpm (container-tools:rhel8)",
"product_id": "podman-remote-debuginfo-4.2.0-2.module+el8.6.0+21674+8010760f.ppc64le.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-remote-debuginfo@4.2.0-2.module%2Bel8.6.0%2B21674%2B8010760f?arch=ppc64le\u0026epoch=2\u0026rpmmod=container-tools:rhel8:8060020240413110723:3b538bd8"
}
}
},
{
"category": "product_version",
"name": "podman-tests-4.2.0-2.module+el8.6.0+21674+8010760f.ppc64le.rpm-container-tools:rhel8",
"product": {
"name": "podman-tests-4.2.0-2.module+el8.6.0+21674+8010760f.ppc64le.rpm (container-tools:rhel8)",
"product_id": "podman-tests-4.2.0-2.module+el8.6.0+21674+8010760f.ppc64le.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-tests@4.2.0-2.module%2Bel8.6.0%2B21674%2B8010760f?arch=ppc64le\u0026epoch=2\u0026rpmmod=container-tools:rhel8:8060020240413110723:3b538bd8"
}
}
},
{
"category": "product_version",
"name": "python3-criu-3.15-3.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"product": {
"name": "python3-criu-3.15-3.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm (container-tools:rhel8)",
"product_id": "python3-criu-3.15-3.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-criu@3.15-3.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=ppc64le\u0026rpmmod=container-tools:rhel8:8060020240413110723:3b538bd8"
}
}
},
{
"category": "product_version",
"name": "runc-1.1.12-1.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"product": {
"name": "runc-1.1.12-1.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm (container-tools:rhel8)",
"product_id": "runc-1.1.12-1.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/runc@1.1.12-1.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=ppc64le\u0026epoch=1\u0026rpmmod=container-tools:rhel8:8060020240413110723:3b538bd8"
}
}
},
{
"category": "product_version",
"name": "runc-debuginfo-1.1.12-1.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"product": {
"name": "runc-debuginfo-1.1.12-1.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm (container-tools:rhel8)",
"product_id": "runc-debuginfo-1.1.12-1.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/runc-debuginfo@1.1.12-1.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=ppc64le\u0026epoch=1\u0026rpmmod=container-tools:rhel8:8060020240413110723:3b538bd8"
}
}
},
{
"category": "product_version",
"name": "runc-debugsource-1.1.12-1.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"product": {
"name": "runc-debugsource-1.1.12-1.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm (container-tools:rhel8)",
"product_id": "runc-debugsource-1.1.12-1.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/runc-debugsource@1.1.12-1.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=ppc64le\u0026epoch=1\u0026rpmmod=container-tools:rhel8:8060020240413110723:3b538bd8"
}
}
},
{
"category": "product_version",
"name": "skopeo-1.9.1-1.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"product": {
"name": "skopeo-1.9.1-1.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm (container-tools:rhel8)",
"product_id": "skopeo-1.9.1-1.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/skopeo@1.9.1-1.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=ppc64le\u0026epoch=2\u0026rpmmod=container-tools:rhel8:8060020240413110723:3b538bd8"
}
}
},
{
"category": "product_version",
"name": "skopeo-debuginfo-1.9.1-1.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"product": {
"name": "skopeo-debuginfo-1.9.1-1.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm (container-tools:rhel8)",
"product_id": "skopeo-debuginfo-1.9.1-1.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/skopeo-debuginfo@1.9.1-1.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=ppc64le\u0026epoch=2\u0026rpmmod=container-tools:rhel8:8060020240413110723:3b538bd8"
}
}
},
{
"category": "product_version",
"name": "skopeo-debugsource-1.9.1-1.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"product": {
"name": "skopeo-debugsource-1.9.1-1.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm (container-tools:rhel8)",
"product_id": "skopeo-debugsource-1.9.1-1.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/skopeo-debugsource@1.9.1-1.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=ppc64le\u0026epoch=2\u0026rpmmod=container-tools:rhel8:8060020240413110723:3b538bd8"
}
}
},
{
"category": "product_version",
"name": "skopeo-tests-1.9.1-1.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"product": {
"name": "skopeo-tests-1.9.1-1.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm (container-tools:rhel8)",
"product_id": "skopeo-tests-1.9.1-1.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/skopeo-tests@1.9.1-1.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=ppc64le\u0026epoch=2\u0026rpmmod=container-tools:rhel8:8060020240413110723:3b538bd8"
}
}
},
{
"category": "product_version",
"name": "slirp4netns-1.2.0-3.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"product": {
"name": "slirp4netns-1.2.0-3.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm (container-tools:rhel8)",
"product_id": "slirp4netns-1.2.0-3.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/slirp4netns@1.2.0-3.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=ppc64le\u0026rpmmod=container-tools:rhel8:8060020240413110723:3b538bd8"
}
}
},
{
"category": "product_version",
"name": "slirp4netns-debuginfo-1.2.0-3.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"product": {
"name": "slirp4netns-debuginfo-1.2.0-3.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm (container-tools:rhel8)",
"product_id": "slirp4netns-debuginfo-1.2.0-3.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/slirp4netns-debuginfo@1.2.0-3.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=ppc64le\u0026rpmmod=container-tools:rhel8:8060020240413110723:3b538bd8"
}
}
},
{
"category": "product_version",
"name": "slirp4netns-debugsource-1.2.0-3.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"product": {
"name": "slirp4netns-debugsource-1.2.0-3.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm (container-tools:rhel8)",
"product_id": "slirp4netns-debugsource-1.2.0-3.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/slirp4netns-debugsource@1.2.0-3.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=ppc64le\u0026rpmmod=container-tools:rhel8:8060020240413110723:3b538bd8"
}
}
},
{
"category": "product_version",
"name": "toolbox-0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"product": {
"name": "toolbox-0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm (container-tools:rhel8)",
"product_id": "toolbox-0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/toolbox@0.0.99.3-0.7.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=ppc64le\u0026rpmmod=container-tools:rhel8:8060020240413110723:3b538bd8"
}
}
},
{
"category": "product_version",
"name": "toolbox-debuginfo-0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"product": {
"name": "toolbox-debuginfo-0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm (container-tools:rhel8)",
"product_id": "toolbox-debuginfo-0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/toolbox-debuginfo@0.0.99.3-0.7.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=ppc64le\u0026rpmmod=container-tools:rhel8:8060020240413110723:3b538bd8"
}
}
},
{
"category": "product_version",
"name": "toolbox-debugsource-0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"product": {
"name": "toolbox-debugsource-0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm (container-tools:rhel8)",
"product_id": "toolbox-debugsource-0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/toolbox-debugsource@0.0.99.3-0.7.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=ppc64le\u0026rpmmod=container-tools:rhel8:8060020240413110723:3b538bd8"
}
}
},
{
"category": "product_version",
"name": "toolbox-tests-0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"product": {
"name": "toolbox-tests-0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm (container-tools:rhel8)",
"product_id": "toolbox-tests-0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/toolbox-tests@0.0.99.3-0.7.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=ppc64le\u0026rpmmod=container-tools:rhel8:8060020240413110723:3b538bd8"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "aardvark-dns-1.0.1-40.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"product": {
"name": "aardvark-dns-1.0.1-40.module+el8.6.0+21266+3e24c7b3.aarch64.rpm (container-tools:rhel8)",
"product_id": "aardvark-dns-1.0.1-40.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/aardvark-dns@1.0.1-40.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=aarch64\u0026epoch=2\u0026rpmmod=container-tools:rhel8:8060020240413110723:3b538bd8"
}
}
},
{
"category": "product_version",
"name": "buildah-1.26.2-1.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"product": {
"name": "buildah-1.26.2-1.module+el8.6.0+21266+3e24c7b3.aarch64.rpm (container-tools:rhel8)",
"product_id": "buildah-1.26.2-1.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/buildah@1.26.2-1.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=aarch64\u0026epoch=1\u0026rpmmod=container-tools:rhel8:8060020240413110723:3b538bd8"
}
}
},
{
"category": "product_version",
"name": "buildah-debuginfo-1.26.2-1.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"product": {
"name": "buildah-debuginfo-1.26.2-1.module+el8.6.0+21266+3e24c7b3.aarch64.rpm (container-tools:rhel8)",
"product_id": "buildah-debuginfo-1.26.2-1.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/buildah-debuginfo@1.26.2-1.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=aarch64\u0026epoch=1\u0026rpmmod=container-tools:rhel8:8060020240413110723:3b538bd8"
}
}
},
{
"category": "product_version",
"name": "buildah-debugsource-1.26.2-1.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"product": {
"name": "buildah-debugsource-1.26.2-1.module+el8.6.0+21266+3e24c7b3.aarch64.rpm (container-tools:rhel8)",
"product_id": "buildah-debugsource-1.26.2-1.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/buildah-debugsource@1.26.2-1.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=aarch64\u0026epoch=1\u0026rpmmod=container-tools:rhel8:8060020240413110723:3b538bd8"
}
}
},
{
"category": "product_version",
"name": "buildah-tests-1.26.2-1.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"product": {
"name": "buildah-tests-1.26.2-1.module+el8.6.0+21266+3e24c7b3.aarch64.rpm (container-tools:rhel8)",
"product_id": "buildah-tests-1.26.2-1.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/buildah-tests@1.26.2-1.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=aarch64\u0026epoch=1\u0026rpmmod=container-tools:rhel8:8060020240413110723:3b538bd8"
}
}
},
{
"category": "product_version",
"name": "buildah-tests-debuginfo-1.26.2-1.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"product": {
"name": "buildah-tests-debuginfo-1.26.2-1.module+el8.6.0+21266+3e24c7b3.aarch64.rpm (container-tools:rhel8)",
"product_id": "buildah-tests-debuginfo-1.26.2-1.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/buildah-tests-debuginfo@1.26.2-1.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=aarch64\u0026epoch=1\u0026rpmmod=container-tools:rhel8:8060020240413110723:3b538bd8"
}
}
},
{
"category": "product_version",
"name": "conmon-2.1.4-1.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"product": {
"name": "conmon-2.1.4-1.module+el8.6.0+21266+3e24c7b3.aarch64.rpm (container-tools:rhel8)",
"product_id": "conmon-2.1.4-1.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/conmon@2.1.4-1.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=aarch64\u0026epoch=2\u0026rpmmod=container-tools:rhel8:8060020240413110723:3b538bd8"
}
}
},
{
"category": "product_version",
"name": "conmon-debuginfo-2.1.4-1.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"product": {
"name": "conmon-debuginfo-2.1.4-1.module+el8.6.0+21266+3e24c7b3.aarch64.rpm (container-tools:rhel8)",
"product_id": "conmon-debuginfo-2.1.4-1.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/conmon-debuginfo@2.1.4-1.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=aarch64\u0026epoch=2\u0026rpmmod=container-tools:rhel8:8060020240413110723:3b538bd8"
}
}
},
{
"category": "product_version",
"name": "conmon-debugsource-2.1.4-1.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"product": {
"name": "conmon-debugsource-2.1.4-1.module+el8.6.0+21266+3e24c7b3.aarch64.rpm (container-tools:rhel8)",
"product_id": "conmon-debugsource-2.1.4-1.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/conmon-debugsource@2.1.4-1.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=aarch64\u0026epoch=2\u0026rpmmod=container-tools:rhel8:8060020240413110723:3b538bd8"
}
}
},
{
"category": "product_version",
"name": "containernetworking-plugins-1.1.1-4.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"product": {
"name": "containernetworking-plugins-1.1.1-4.module+el8.6.0+21266+3e24c7b3.aarch64.rpm (container-tools:rhel8)",
"product_id": "containernetworking-plugins-1.1.1-4.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/containernetworking-plugins@1.1.1-4.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=aarch64\u0026epoch=1\u0026rpmmod=container-tools:rhel8:8060020240413110723:3b538bd8"
}
}
},
{
"category": "product_version",
"name": "containernetworking-plugins-debuginfo-1.1.1-4.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"product": {
"name": "containernetworking-plugins-debuginfo-1.1.1-4.module+el8.6.0+21266+3e24c7b3.aarch64.rpm (container-tools:rhel8)",
"product_id": "containernetworking-plugins-debuginfo-1.1.1-4.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/containernetworking-plugins-debuginfo@1.1.1-4.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=aarch64\u0026epoch=1\u0026rpmmod=container-tools:rhel8:8060020240413110723:3b538bd8"
}
}
},
{
"category": "product_version",
"name": "containernetworking-plugins-debugsource-1.1.1-4.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"product": {
"name": "containernetworking-plugins-debugsource-1.1.1-4.module+el8.6.0+21266+3e24c7b3.aarch64.rpm (container-tools:rhel8)",
"product_id": "containernetworking-plugins-debugsource-1.1.1-4.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/containernetworking-plugins-debugsource@1.1.1-4.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=aarch64\u0026epoch=1\u0026rpmmod=container-tools:rhel8:8060020240413110723:3b538bd8"
}
}
},
{
"category": "product_version",
"name": "containers-common-1-40.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"product": {
"name": "containers-common-1-40.module+el8.6.0+21266+3e24c7b3.aarch64.rpm (container-tools:rhel8)",
"product_id": "containers-common-1-40.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/containers-common@1-40.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=aarch64\u0026epoch=2\u0026rpmmod=container-tools:rhel8:8060020240413110723:3b538bd8"
}
}
},
{
"category": "product_version",
"name": "crit-3.15-3.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"product": {
"name": "crit-3.15-3.module+el8.6.0+21266+3e24c7b3.aarch64.rpm (container-tools:rhel8)",
"product_id": "crit-3.15-3.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/crit@3.15-3.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=aarch64\u0026rpmmod=container-tools:rhel8:8060020240413110723:3b538bd8"
}
}
},
{
"category": "product_version",
"name": "criu-3.15-3.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"product": {
"name": "criu-3.15-3.module+el8.6.0+21266+3e24c7b3.aarch64.rpm (container-tools:rhel8)",
"product_id": "criu-3.15-3.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/criu@3.15-3.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=aarch64\u0026rpmmod=container-tools:rhel8:8060020240413110723:3b538bd8"
}
}
},
{
"category": "product_version",
"name": "criu-debuginfo-3.15-3.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"product": {
"name": "criu-debuginfo-3.15-3.module+el8.6.0+21266+3e24c7b3.aarch64.rpm (container-tools:rhel8)",
"product_id": "criu-debuginfo-3.15-3.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/criu-debuginfo@3.15-3.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=aarch64\u0026rpmmod=container-tools:rhel8:8060020240413110723:3b538bd8"
}
}
},
{
"category": "product_version",
"name": "criu-debugsource-3.15-3.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"product": {
"name": "criu-debugsource-3.15-3.module+el8.6.0+21266+3e24c7b3.aarch64.rpm (container-tools:rhel8)",
"product_id": "criu-debugsource-3.15-3.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/criu-debugsource@3.15-3.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=aarch64\u0026rpmmod=container-tools:rhel8:8060020240413110723:3b538bd8"
}
}
},
{
"category": "product_version",
"name": "criu-devel-3.15-3.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"product": {
"name": "criu-devel-3.15-3.module+el8.6.0+21266+3e24c7b3.aarch64.rpm (container-tools:rhel8)",
"product_id": "criu-devel-3.15-3.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/criu-devel@3.15-3.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=aarch64\u0026rpmmod=container-tools:rhel8:8060020240413110723:3b538bd8"
}
}
},
{
"category": "product_version",
"name": "criu-libs-3.15-3.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"product": {
"name": "criu-libs-3.15-3.module+el8.6.0+21266+3e24c7b3.aarch64.rpm (container-tools:rhel8)",
"product_id": "criu-libs-3.15-3.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/criu-libs@3.15-3.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=aarch64\u0026rpmmod=container-tools:rhel8:8060020240413110723:3b538bd8"
}
}
},
{
"category": "product_version",
"name": "criu-libs-debuginfo-3.15-3.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"product": {
"name": "criu-libs-debuginfo-3.15-3.module+el8.6.0+21266+3e24c7b3.aarch64.rpm (container-tools:rhel8)",
"product_id": "criu-libs-debuginfo-3.15-3.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/criu-libs-debuginfo@3.15-3.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=aarch64\u0026rpmmod=container-tools:rhel8:8060020240413110723:3b538bd8"
}
}
},
{
"category": "product_version",
"name": "crun-1.5-1.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"product": {
"name": "crun-1.5-1.module+el8.6.0+21266+3e24c7b3.aarch64.rpm (container-tools:rhel8)",
"product_id": "crun-1.5-1.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/crun@1.5-1.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=aarch64\u0026rpmmod=container-tools:rhel8:8060020240413110723:3b538bd8"
}
}
},
{
"category": "product_version",
"name": "crun-debuginfo-1.5-1.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"product": {
"name": "crun-debuginfo-1.5-1.module+el8.6.0+21266+3e24c7b3.aarch64.rpm (container-tools:rhel8)",
"product_id": "crun-debuginfo-1.5-1.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/crun-debuginfo@1.5-1.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=aarch64\u0026rpmmod=container-tools:rhel8:8060020240413110723:3b538bd8"
}
}
},
{
"category": "product_version",
"name": "crun-debugsource-1.5-1.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"product": {
"name": "crun-debugsource-1.5-1.module+el8.6.0+21266+3e24c7b3.aarch64.rpm (container-tools:rhel8)",
"product_id": "crun-debugsource-1.5-1.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/crun-debugsource@1.5-1.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=aarch64\u0026rpmmod=container-tools:rhel8:8060020240413110723:3b538bd8"
}
}
},
{
"category": "product_version",
"name": "fuse-overlayfs-1.9-1.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"product": {
"name": "fuse-overlayfs-1.9-1.module+el8.6.0+21266+3e24c7b3.aarch64.rpm (container-tools:rhel8)",
"product_id": "fuse-overlayfs-1.9-1.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fuse-overlayfs@1.9-1.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=aarch64\u0026rpmmod=container-tools:rhel8:8060020240413110723:3b538bd8"
}
}
},
{
"category": "product_version",
"name": "fuse-overlayfs-debuginfo-1.9-1.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"product": {
"name": "fuse-overlayfs-debuginfo-1.9-1.module+el8.6.0+21266+3e24c7b3.aarch64.rpm (container-tools:rhel8)",
"product_id": "fuse-overlayfs-debuginfo-1.9-1.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fuse-overlayfs-debuginfo@1.9-1.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=aarch64\u0026rpmmod=container-tools:rhel8:8060020240413110723:3b538bd8"
}
}
},
{
"category": "product_version",
"name": "fuse-overlayfs-debugsource-1.9-1.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"product": {
"name": "fuse-overlayfs-debugsource-1.9-1.module+el8.6.0+21266+3e24c7b3.aarch64.rpm (container-tools:rhel8)",
"product_id": "fuse-overlayfs-debugsource-1.9-1.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fuse-overlayfs-debugsource@1.9-1.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=aarch64\u0026rpmmod=container-tools:rhel8:8060020240413110723:3b538bd8"
}
}
},
{
"category": "product_version",
"name": "libslirp-4.4.0-1.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"product": {
"name": "libslirp-4.4.0-1.module+el8.6.0+21266+3e24c7b3.aarch64.rpm (container-tools:rhel8)",
"product_id": "libslirp-4.4.0-1.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libslirp@4.4.0-1.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=aarch64\u0026rpmmod=container-tools:rhel8:8060020240413110723:3b538bd8"
}
}
},
{
"category": "product_version",
"name": "libslirp-debuginfo-4.4.0-1.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"product": {
"name": "libslirp-debuginfo-4.4.0-1.module+el8.6.0+21266+3e24c7b3.aarch64.rpm (container-tools:rhel8)",
"product_id": "libslirp-debuginfo-4.4.0-1.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libslirp-debuginfo@4.4.0-1.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=aarch64\u0026rpmmod=container-tools:rhel8:8060020240413110723:3b538bd8"
}
}
},
{
"category": "product_version",
"name": "libslirp-debugsource-4.4.0-1.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"product": {
"name": "libslirp-debugsource-4.4.0-1.module+el8.6.0+21266+3e24c7b3.aarch64.rpm (container-tools:rhel8)",
"product_id": "libslirp-debugsource-4.4.0-1.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libslirp-debugsource@4.4.0-1.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=aarch64\u0026rpmmod=container-tools:rhel8:8060020240413110723:3b538bd8"
}
}
},
{
"category": "product_version",
"name": "libslirp-devel-4.4.0-1.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"product": {
"name": "libslirp-devel-4.4.0-1.module+el8.6.0+21266+3e24c7b3.aarch64.rpm (container-tools:rhel8)",
"product_id": "libslirp-devel-4.4.0-1.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libslirp-devel@4.4.0-1.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=aarch64\u0026rpmmod=container-tools:rhel8:8060020240413110723:3b538bd8"
}
}
},
{
"category": "product_version",
"name": "netavark-1.0.1-40.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"product": {
"name": "netavark-1.0.1-40.module+el8.6.0+21266+3e24c7b3.aarch64.rpm (container-tools:rhel8)",
"product_id": "netavark-1.0.1-40.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/netavark@1.0.1-40.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=aarch64\u0026epoch=2\u0026rpmmod=container-tools:rhel8:8060020240413110723:3b538bd8"
}
}
},
{
"category": "product_version",
"name": "oci-seccomp-bpf-hook-1.2.6-1.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"product": {
"name": "oci-seccomp-bpf-hook-1.2.6-1.module+el8.6.0+21266+3e24c7b3.aarch64.rpm (container-tools:rhel8)",
"product_id": "oci-seccomp-bpf-hook-1.2.6-1.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/oci-seccomp-bpf-hook@1.2.6-1.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=aarch64\u0026rpmmod=container-tools:rhel8:8060020240413110723:3b538bd8"
}
}
},
{
"category": "product_version",
"name": "oci-seccomp-bpf-hook-debuginfo-1.2.6-1.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"product": {
"name": "oci-seccomp-bpf-hook-debuginfo-1.2.6-1.module+el8.6.0+21266+3e24c7b3.aarch64.rpm (container-tools:rhel8)",
"product_id": "oci-seccomp-bpf-hook-debuginfo-1.2.6-1.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/oci-seccomp-bpf-hook-debuginfo@1.2.6-1.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=aarch64\u0026rpmmod=container-tools:rhel8:8060020240413110723:3b538bd8"
}
}
},
{
"category": "product_version",
"name": "oci-seccomp-bpf-hook-debugsource-1.2.6-1.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"product": {
"name": "oci-seccomp-bpf-hook-debugsource-1.2.6-1.module+el8.6.0+21266+3e24c7b3.aarch64.rpm (container-tools:rhel8)",
"product_id": "oci-seccomp-bpf-hook-debugsource-1.2.6-1.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/oci-seccomp-bpf-hook-debugsource@1.2.6-1.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=aarch64\u0026rpmmod=container-tools:rhel8:8060020240413110723:3b538bd8"
}
}
},
{
"category": "product_version",
"name": "podman-4.2.0-2.module+el8.6.0+21674+8010760f.aarch64.rpm-container-tools:rhel8",
"product": {
"name": "podman-4.2.0-2.module+el8.6.0+21674+8010760f.aarch64.rpm (container-tools:rhel8)",
"product_id": "podman-4.2.0-2.module+el8.6.0+21674+8010760f.aarch64.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman@4.2.0-2.module%2Bel8.6.0%2B21674%2B8010760f?arch=aarch64\u0026epoch=2\u0026rpmmod=container-tools:rhel8:8060020240413110723:3b538bd8"
}
}
},
{
"category": "product_version",
"name": "podman-catatonit-4.2.0-2.module+el8.6.0+21674+8010760f.aarch64.rpm-container-tools:rhel8",
"product": {
"name": "podman-catatonit-4.2.0-2.module+el8.6.0+21674+8010760f.aarch64.rpm (container-tools:rhel8)",
"product_id": "podman-catatonit-4.2.0-2.module+el8.6.0+21674+8010760f.aarch64.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-catatonit@4.2.0-2.module%2Bel8.6.0%2B21674%2B8010760f?arch=aarch64\u0026epoch=2\u0026rpmmod=container-tools:rhel8:8060020240413110723:3b538bd8"
}
}
},
{
"category": "product_version",
"name": "podman-catatonit-debuginfo-4.2.0-2.module+el8.6.0+21674+8010760f.aarch64.rpm-container-tools:rhel8",
"product": {
"name": "podman-catatonit-debuginfo-4.2.0-2.module+el8.6.0+21674+8010760f.aarch64.rpm (container-tools:rhel8)",
"product_id": "podman-catatonit-debuginfo-4.2.0-2.module+el8.6.0+21674+8010760f.aarch64.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-catatonit-debuginfo@4.2.0-2.module%2Bel8.6.0%2B21674%2B8010760f?arch=aarch64\u0026epoch=2\u0026rpmmod=container-tools:rhel8:8060020240413110723:3b538bd8"
}
}
},
{
"category": "product_version",
"name": "podman-debuginfo-4.2.0-2.module+el8.6.0+21674+8010760f.aarch64.rpm-container-tools:rhel8",
"product": {
"name": "podman-debuginfo-4.2.0-2.module+el8.6.0+21674+8010760f.aarch64.rpm (container-tools:rhel8)",
"product_id": "podman-debuginfo-4.2.0-2.module+el8.6.0+21674+8010760f.aarch64.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-debuginfo@4.2.0-2.module%2Bel8.6.0%2B21674%2B8010760f?arch=aarch64\u0026epoch=2\u0026rpmmod=container-tools:rhel8:8060020240413110723:3b538bd8"
}
}
},
{
"category": "product_version",
"name": "podman-debugsource-4.2.0-2.module+el8.6.0+21674+8010760f.aarch64.rpm-container-tools:rhel8",
"product": {
"name": "podman-debugsource-4.2.0-2.module+el8.6.0+21674+8010760f.aarch64.rpm (container-tools:rhel8)",
"product_id": "podman-debugsource-4.2.0-2.module+el8.6.0+21674+8010760f.aarch64.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-debugsource@4.2.0-2.module%2Bel8.6.0%2B21674%2B8010760f?arch=aarch64\u0026epoch=2\u0026rpmmod=container-tools:rhel8:8060020240413110723:3b538bd8"
}
}
},
{
"category": "product_version",
"name": "podman-gvproxy-4.2.0-2.module+el8.6.0+21674+8010760f.aarch64.rpm-container-tools:rhel8",
"product": {
"name": "podman-gvproxy-4.2.0-2.module+el8.6.0+21674+8010760f.aarch64.rpm (container-tools:rhel8)",
"product_id": "podman-gvproxy-4.2.0-2.module+el8.6.0+21674+8010760f.aarch64.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-gvproxy@4.2.0-2.module%2Bel8.6.0%2B21674%2B8010760f?arch=aarch64\u0026epoch=2\u0026rpmmod=container-tools:rhel8:8060020240413110723:3b538bd8"
}
}
},
{
"category": "product_version",
"name": "podman-gvproxy-debuginfo-4.2.0-2.module+el8.6.0+21674+8010760f.aarch64.rpm-container-tools:rhel8",
"product": {
"name": "podman-gvproxy-debuginfo-4.2.0-2.module+el8.6.0+21674+8010760f.aarch64.rpm (container-tools:rhel8)",
"product_id": "podman-gvproxy-debuginfo-4.2.0-2.module+el8.6.0+21674+8010760f.aarch64.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-gvproxy-debuginfo@4.2.0-2.module%2Bel8.6.0%2B21674%2B8010760f?arch=aarch64\u0026epoch=2\u0026rpmmod=container-tools:rhel8:8060020240413110723:3b538bd8"
}
}
},
{
"category": "product_version",
"name": "podman-plugins-4.2.0-2.module+el8.6.0+21674+8010760f.aarch64.rpm-container-tools:rhel8",
"product": {
"name": "podman-plugins-4.2.0-2.module+el8.6.0+21674+8010760f.aarch64.rpm (container-tools:rhel8)",
"product_id": "podman-plugins-4.2.0-2.module+el8.6.0+21674+8010760f.aarch64.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-plugins@4.2.0-2.module%2Bel8.6.0%2B21674%2B8010760f?arch=aarch64\u0026epoch=2\u0026rpmmod=container-tools:rhel8:8060020240413110723:3b538bd8"
}
}
},
{
"category": "product_version",
"name": "podman-plugins-debuginfo-4.2.0-2.module+el8.6.0+21674+8010760f.aarch64.rpm-container-tools:rhel8",
"product": {
"name": "podman-plugins-debuginfo-4.2.0-2.module+el8.6.0+21674+8010760f.aarch64.rpm (container-tools:rhel8)",
"product_id": "podman-plugins-debuginfo-4.2.0-2.module+el8.6.0+21674+8010760f.aarch64.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-plugins-debuginfo@4.2.0-2.module%2Bel8.6.0%2B21674%2B8010760f?arch=aarch64\u0026epoch=2\u0026rpmmod=container-tools:rhel8:8060020240413110723:3b538bd8"
}
}
},
{
"category": "product_version",
"name": "podman-remote-4.2.0-2.module+el8.6.0+21674+8010760f.aarch64.rpm-container-tools:rhel8",
"product": {
"name": "podman-remote-4.2.0-2.module+el8.6.0+21674+8010760f.aarch64.rpm (container-tools:rhel8)",
"product_id": "podman-remote-4.2.0-2.module+el8.6.0+21674+8010760f.aarch64.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-remote@4.2.0-2.module%2Bel8.6.0%2B21674%2B8010760f?arch=aarch64\u0026epoch=2\u0026rpmmod=container-tools:rhel8:8060020240413110723:3b538bd8"
}
}
},
{
"category": "product_version",
"name": "podman-remote-debuginfo-4.2.0-2.module+el8.6.0+21674+8010760f.aarch64.rpm-container-tools:rhel8",
"product": {
"name": "podman-remote-debuginfo-4.2.0-2.module+el8.6.0+21674+8010760f.aarch64.rpm (container-tools:rhel8)",
"product_id": "podman-remote-debuginfo-4.2.0-2.module+el8.6.0+21674+8010760f.aarch64.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-remote-debuginfo@4.2.0-2.module%2Bel8.6.0%2B21674%2B8010760f?arch=aarch64\u0026epoch=2\u0026rpmmod=container-tools:rhel8:8060020240413110723:3b538bd8"
}
}
},
{
"category": "product_version",
"name": "podman-tests-4.2.0-2.module+el8.6.0+21674+8010760f.aarch64.rpm-container-tools:rhel8",
"product": {
"name": "podman-tests-4.2.0-2.module+el8.6.0+21674+8010760f.aarch64.rpm (container-tools:rhel8)",
"product_id": "podman-tests-4.2.0-2.module+el8.6.0+21674+8010760f.aarch64.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-tests@4.2.0-2.module%2Bel8.6.0%2B21674%2B8010760f?arch=aarch64\u0026epoch=2\u0026rpmmod=container-tools:rhel8:8060020240413110723:3b538bd8"
}
}
},
{
"category": "product_version",
"name": "python3-criu-3.15-3.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"product": {
"name": "python3-criu-3.15-3.module+el8.6.0+21266+3e24c7b3.aarch64.rpm (container-tools:rhel8)",
"product_id": "python3-criu-3.15-3.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-criu@3.15-3.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=aarch64\u0026rpmmod=container-tools:rhel8:8060020240413110723:3b538bd8"
}
}
},
{
"category": "product_version",
"name": "runc-1.1.12-1.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"product": {
"name": "runc-1.1.12-1.module+el8.6.0+21266+3e24c7b3.aarch64.rpm (container-tools:rhel8)",
"product_id": "runc-1.1.12-1.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/runc@1.1.12-1.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=aarch64\u0026epoch=1\u0026rpmmod=container-tools:rhel8:8060020240413110723:3b538bd8"
}
}
},
{
"category": "product_version",
"name": "runc-debuginfo-1.1.12-1.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"product": {
"name": "runc-debuginfo-1.1.12-1.module+el8.6.0+21266+3e24c7b3.aarch64.rpm (container-tools:rhel8)",
"product_id": "runc-debuginfo-1.1.12-1.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/runc-debuginfo@1.1.12-1.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=aarch64\u0026epoch=1\u0026rpmmod=container-tools:rhel8:8060020240413110723:3b538bd8"
}
}
},
{
"category": "product_version",
"name": "runc-debugsource-1.1.12-1.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"product": {
"name": "runc-debugsource-1.1.12-1.module+el8.6.0+21266+3e24c7b3.aarch64.rpm (container-tools:rhel8)",
"product_id": "runc-debugsource-1.1.12-1.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/runc-debugsource@1.1.12-1.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=aarch64\u0026epoch=1\u0026rpmmod=container-tools:rhel8:8060020240413110723:3b538bd8"
}
}
},
{
"category": "product_version",
"name": "skopeo-1.9.1-1.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"product": {
"name": "skopeo-1.9.1-1.module+el8.6.0+21266+3e24c7b3.aarch64.rpm (container-tools:rhel8)",
"product_id": "skopeo-1.9.1-1.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/skopeo@1.9.1-1.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=aarch64\u0026epoch=2\u0026rpmmod=container-tools:rhel8:8060020240413110723:3b538bd8"
}
}
},
{
"category": "product_version",
"name": "skopeo-debuginfo-1.9.1-1.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"product": {
"name": "skopeo-debuginfo-1.9.1-1.module+el8.6.0+21266+3e24c7b3.aarch64.rpm (container-tools:rhel8)",
"product_id": "skopeo-debuginfo-1.9.1-1.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/skopeo-debuginfo@1.9.1-1.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=aarch64\u0026epoch=2\u0026rpmmod=container-tools:rhel8:8060020240413110723:3b538bd8"
}
}
},
{
"category": "product_version",
"name": "skopeo-debugsource-1.9.1-1.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"product": {
"name": "skopeo-debugsource-1.9.1-1.module+el8.6.0+21266+3e24c7b3.aarch64.rpm (container-tools:rhel8)",
"product_id": "skopeo-debugsource-1.9.1-1.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/skopeo-debugsource@1.9.1-1.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=aarch64\u0026epoch=2\u0026rpmmod=container-tools:rhel8:8060020240413110723:3b538bd8"
}
}
},
{
"category": "product_version",
"name": "skopeo-tests-1.9.1-1.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"product": {
"name": "skopeo-tests-1.9.1-1.module+el8.6.0+21266+3e24c7b3.aarch64.rpm (container-tools:rhel8)",
"product_id": "skopeo-tests-1.9.1-1.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/skopeo-tests@1.9.1-1.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=aarch64\u0026epoch=2\u0026rpmmod=container-tools:rhel8:8060020240413110723:3b538bd8"
}
}
},
{
"category": "product_version",
"name": "slirp4netns-1.2.0-3.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"product": {
"name": "slirp4netns-1.2.0-3.module+el8.6.0+21266+3e24c7b3.aarch64.rpm (container-tools:rhel8)",
"product_id": "slirp4netns-1.2.0-3.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/slirp4netns@1.2.0-3.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=aarch64\u0026rpmmod=container-tools:rhel8:8060020240413110723:3b538bd8"
}
}
},
{
"category": "product_version",
"name": "slirp4netns-debuginfo-1.2.0-3.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"product": {
"name": "slirp4netns-debuginfo-1.2.0-3.module+el8.6.0+21266+3e24c7b3.aarch64.rpm (container-tools:rhel8)",
"product_id": "slirp4netns-debuginfo-1.2.0-3.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/slirp4netns-debuginfo@1.2.0-3.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=aarch64\u0026rpmmod=container-tools:rhel8:8060020240413110723:3b538bd8"
}
}
},
{
"category": "product_version",
"name": "slirp4netns-debugsource-1.2.0-3.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"product": {
"name": "slirp4netns-debugsource-1.2.0-3.module+el8.6.0+21266+3e24c7b3.aarch64.rpm (container-tools:rhel8)",
"product_id": "slirp4netns-debugsource-1.2.0-3.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/slirp4netns-debugsource@1.2.0-3.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=aarch64\u0026rpmmod=container-tools:rhel8:8060020240413110723:3b538bd8"
}
}
},
{
"category": "product_version",
"name": "toolbox-0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"product": {
"name": "toolbox-0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.aarch64.rpm (container-tools:rhel8)",
"product_id": "toolbox-0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/toolbox@0.0.99.3-0.7.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=aarch64\u0026rpmmod=container-tools:rhel8:8060020240413110723:3b538bd8"
}
}
},
{
"category": "product_version",
"name": "toolbox-debuginfo-0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"product": {
"name": "toolbox-debuginfo-0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.aarch64.rpm (container-tools:rhel8)",
"product_id": "toolbox-debuginfo-0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/toolbox-debuginfo@0.0.99.3-0.7.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=aarch64\u0026rpmmod=container-tools:rhel8:8060020240413110723:3b538bd8"
}
}
},
{
"category": "product_version",
"name": "toolbox-debugsource-0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"product": {
"name": "toolbox-debugsource-0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.aarch64.rpm (container-tools:rhel8)",
"product_id": "toolbox-debugsource-0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/toolbox-debugsource@0.0.99.3-0.7.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=aarch64\u0026rpmmod=container-tools:rhel8:8060020240413110723:3b538bd8"
}
}
},
{
"category": "product_version",
"name": "toolbox-tests-0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"product": {
"name": "toolbox-tests-0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.aarch64.rpm (container-tools:rhel8)",
"product_id": "toolbox-tests-0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/toolbox-tests@0.0.99.3-0.7.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=aarch64\u0026rpmmod=container-tools:rhel8:8060020240413110723:3b538bd8"
}
}
}
],
"category": "architecture",
"name": "aarch64"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "aardvark-dns-1.0.1-40.module+el8.6.0+21266+3e24c7b3.aarch64.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:aardvark-dns-1.0.1-40.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8"
},
"product_reference": "aardvark-dns-1.0.1-40.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "aardvark-dns-1.0.1-40.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:aardvark-dns-1.0.1-40.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8"
},
"product_reference": "aardvark-dns-1.0.1-40.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "aardvark-dns-1.0.1-40.module+el8.6.0+21266+3e24c7b3.s390x.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:aardvark-dns-1.0.1-40.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8"
},
"product_reference": "aardvark-dns-1.0.1-40.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "aardvark-dns-1.0.1-40.module+el8.6.0+21266+3e24c7b3.x86_64.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:aardvark-dns-1.0.1-40.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8"
},
"product_reference": "aardvark-dns-1.0.1-40.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "buildah-1.26.2-1.module+el8.6.0+21266+3e24c7b3.aarch64.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:buildah-1.26.2-1.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8"
},
"product_reference": "buildah-1.26.2-1.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "buildah-1.26.2-1.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:buildah-1.26.2-1.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8"
},
"product_reference": "buildah-1.26.2-1.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "buildah-1.26.2-1.module+el8.6.0+21266+3e24c7b3.s390x.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:buildah-1.26.2-1.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8"
},
"product_reference": "buildah-1.26.2-1.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "buildah-1.26.2-1.module+el8.6.0+21266+3e24c7b3.src.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:buildah-1.26.2-1.module+el8.6.0+21266+3e24c7b3.src.rpm-container-tools:rhel8"
},
"product_reference": "buildah-1.26.2-1.module+el8.6.0+21266+3e24c7b3.src.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "buildah-1.26.2-1.module+el8.6.0+21266+3e24c7b3.x86_64.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:buildah-1.26.2-1.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8"
},
"product_reference": "buildah-1.26.2-1.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "buildah-debuginfo-1.26.2-1.module+el8.6.0+21266+3e24c7b3.aarch64.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:buildah-debuginfo-1.26.2-1.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8"
},
"product_reference": "buildah-debuginfo-1.26.2-1.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "buildah-debuginfo-1.26.2-1.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:buildah-debuginfo-1.26.2-1.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8"
},
"product_reference": "buildah-debuginfo-1.26.2-1.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "buildah-debuginfo-1.26.2-1.module+el8.6.0+21266+3e24c7b3.s390x.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:buildah-debuginfo-1.26.2-1.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8"
},
"product_reference": "buildah-debuginfo-1.26.2-1.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "buildah-debuginfo-1.26.2-1.module+el8.6.0+21266+3e24c7b3.x86_64.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:buildah-debuginfo-1.26.2-1.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8"
},
"product_reference": "buildah-debuginfo-1.26.2-1.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "buildah-debugsource-1.26.2-1.module+el8.6.0+21266+3e24c7b3.aarch64.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:buildah-debugsource-1.26.2-1.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8"
},
"product_reference": "buildah-debugsource-1.26.2-1.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "buildah-debugsource-1.26.2-1.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:buildah-debugsource-1.26.2-1.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8"
},
"product_reference": "buildah-debugsource-1.26.2-1.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "buildah-debugsource-1.26.2-1.module+el8.6.0+21266+3e24c7b3.s390x.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:buildah-debugsource-1.26.2-1.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8"
},
"product_reference": "buildah-debugsource-1.26.2-1.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "buildah-debugsource-1.26.2-1.module+el8.6.0+21266+3e24c7b3.x86_64.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:buildah-debugsource-1.26.2-1.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8"
},
"product_reference": "buildah-debugsource-1.26.2-1.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "buildah-tests-1.26.2-1.module+el8.6.0+21266+3e24c7b3.aarch64.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:buildah-tests-1.26.2-1.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8"
},
"product_reference": "buildah-tests-1.26.2-1.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "buildah-tests-1.26.2-1.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:buildah-tests-1.26.2-1.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8"
},
"product_reference": "buildah-tests-1.26.2-1.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "buildah-tests-1.26.2-1.module+el8.6.0+21266+3e24c7b3.s390x.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:buildah-tests-1.26.2-1.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8"
},
"product_reference": "buildah-tests-1.26.2-1.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "buildah-tests-1.26.2-1.module+el8.6.0+21266+3e24c7b3.x86_64.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:buildah-tests-1.26.2-1.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8"
},
"product_reference": "buildah-tests-1.26.2-1.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "buildah-tests-debuginfo-1.26.2-1.module+el8.6.0+21266+3e24c7b3.aarch64.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:buildah-tests-debuginfo-1.26.2-1.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8"
},
"product_reference": "buildah-tests-debuginfo-1.26.2-1.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "buildah-tests-debuginfo-1.26.2-1.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:buildah-tests-debuginfo-1.26.2-1.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8"
},
"product_reference": "buildah-tests-debuginfo-1.26.2-1.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "buildah-tests-debuginfo-1.26.2-1.module+el8.6.0+21266+3e24c7b3.s390x.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:buildah-tests-debuginfo-1.26.2-1.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8"
},
"product_reference": "buildah-tests-debuginfo-1.26.2-1.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "buildah-tests-debuginfo-1.26.2-1.module+el8.6.0+21266+3e24c7b3.x86_64.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:buildah-tests-debuginfo-1.26.2-1.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8"
},
"product_reference": "buildah-tests-debuginfo-1.26.2-1.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cockpit-podman-49.1-1.module+el8.6.0+21266+3e24c7b3.noarch.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:cockpit-podman-49.1-1.module+el8.6.0+21266+3e24c7b3.noarch.rpm-container-tools:rhel8"
},
"product_reference": "cockpit-podman-49.1-1.module+el8.6.0+21266+3e24c7b3.noarch.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cockpit-podman-49.1-1.module+el8.6.0+21266+3e24c7b3.src.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:cockpit-podman-49.1-1.module+el8.6.0+21266+3e24c7b3.src.rpm-container-tools:rhel8"
},
"product_reference": "cockpit-podman-49.1-1.module+el8.6.0+21266+3e24c7b3.src.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "conmon-2.1.4-1.module+el8.6.0+21266+3e24c7b3.aarch64.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:conmon-2.1.4-1.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8"
},
"product_reference": "conmon-2.1.4-1.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "conmon-2.1.4-1.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:conmon-2.1.4-1.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8"
},
"product_reference": "conmon-2.1.4-1.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "conmon-2.1.4-1.module+el8.6.0+21266+3e24c7b3.s390x.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:conmon-2.1.4-1.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8"
},
"product_reference": "conmon-2.1.4-1.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "conmon-2.1.4-1.module+el8.6.0+21266+3e24c7b3.src.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:conmon-2.1.4-1.module+el8.6.0+21266+3e24c7b3.src.rpm-container-tools:rhel8"
},
"product_reference": "conmon-2.1.4-1.module+el8.6.0+21266+3e24c7b3.src.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "conmon-2.1.4-1.module+el8.6.0+21266+3e24c7b3.x86_64.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:conmon-2.1.4-1.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8"
},
"product_reference": "conmon-2.1.4-1.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "conmon-debuginfo-2.1.4-1.module+el8.6.0+21266+3e24c7b3.aarch64.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:conmon-debuginfo-2.1.4-1.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8"
},
"product_reference": "conmon-debuginfo-2.1.4-1.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "conmon-debuginfo-2.1.4-1.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:conmon-debuginfo-2.1.4-1.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8"
},
"product_reference": "conmon-debuginfo-2.1.4-1.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "conmon-debuginfo-2.1.4-1.module+el8.6.0+21266+3e24c7b3.s390x.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:conmon-debuginfo-2.1.4-1.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8"
},
"product_reference": "conmon-debuginfo-2.1.4-1.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "conmon-debuginfo-2.1.4-1.module+el8.6.0+21266+3e24c7b3.x86_64.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:conmon-debuginfo-2.1.4-1.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8"
},
"product_reference": "conmon-debuginfo-2.1.4-1.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "conmon-debugsource-2.1.4-1.module+el8.6.0+21266+3e24c7b3.aarch64.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:conmon-debugsource-2.1.4-1.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8"
},
"product_reference": "conmon-debugsource-2.1.4-1.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "conmon-debugsource-2.1.4-1.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:conmon-debugsource-2.1.4-1.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8"
},
"product_reference": "conmon-debugsource-2.1.4-1.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "conmon-debugsource-2.1.4-1.module+el8.6.0+21266+3e24c7b3.s390x.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:conmon-debugsource-2.1.4-1.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8"
},
"product_reference": "conmon-debugsource-2.1.4-1.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "conmon-debugsource-2.1.4-1.module+el8.6.0+21266+3e24c7b3.x86_64.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:conmon-debugsource-2.1.4-1.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8"
},
"product_reference": "conmon-debugsource-2.1.4-1.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "container-selinux-2.189.0-1.module+el8.6.0+21266+3e24c7b3.noarch.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:container-selinux-2.189.0-1.module+el8.6.0+21266+3e24c7b3.noarch.rpm-container-tools:rhel8"
},
"product_reference": "container-selinux-2.189.0-1.module+el8.6.0+21266+3e24c7b3.noarch.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "container-selinux-2.189.0-1.module+el8.6.0+21266+3e24c7b3.src.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:container-selinux-2.189.0-1.module+el8.6.0+21266+3e24c7b3.src.rpm-container-tools:rhel8"
},
"product_reference": "container-selinux-2.189.0-1.module+el8.6.0+21266+3e24c7b3.src.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "containernetworking-plugins-1.1.1-4.module+el8.6.0+21266+3e24c7b3.aarch64.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:containernetworking-plugins-1.1.1-4.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8"
},
"product_reference": "containernetworking-plugins-1.1.1-4.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "containernetworking-plugins-1.1.1-4.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:containernetworking-plugins-1.1.1-4.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8"
},
"product_reference": "containernetworking-plugins-1.1.1-4.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "containernetworking-plugins-1.1.1-4.module+el8.6.0+21266+3e24c7b3.s390x.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:containernetworking-plugins-1.1.1-4.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8"
},
"product_reference": "containernetworking-plugins-1.1.1-4.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "containernetworking-plugins-1.1.1-4.module+el8.6.0+21266+3e24c7b3.src.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:containernetworking-plugins-1.1.1-4.module+el8.6.0+21266+3e24c7b3.src.rpm-container-tools:rhel8"
},
"product_reference": "containernetworking-plugins-1.1.1-4.module+el8.6.0+21266+3e24c7b3.src.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "containernetworking-plugins-1.1.1-4.module+el8.6.0+21266+3e24c7b3.x86_64.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:containernetworking-plugins-1.1.1-4.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8"
},
"product_reference": "containernetworking-plugins-1.1.1-4.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "containernetworking-plugins-debuginfo-1.1.1-4.module+el8.6.0+21266+3e24c7b3.aarch64.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:containernetworking-plugins-debuginfo-1.1.1-4.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8"
},
"product_reference": "containernetworking-plugins-debuginfo-1.1.1-4.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "containernetworking-plugins-debuginfo-1.1.1-4.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:containernetworking-plugins-debuginfo-1.1.1-4.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8"
},
"product_reference": "containernetworking-plugins-debuginfo-1.1.1-4.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "containernetworking-plugins-debuginfo-1.1.1-4.module+el8.6.0+21266+3e24c7b3.s390x.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:containernetworking-plugins-debuginfo-1.1.1-4.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8"
},
"product_reference": "containernetworking-plugins-debuginfo-1.1.1-4.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "containernetworking-plugins-debuginfo-1.1.1-4.module+el8.6.0+21266+3e24c7b3.x86_64.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:containernetworking-plugins-debuginfo-1.1.1-4.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8"
},
"product_reference": "containernetworking-plugins-debuginfo-1.1.1-4.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "containernetworking-plugins-debugsource-1.1.1-4.module+el8.6.0+21266+3e24c7b3.aarch64.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:containernetworking-plugins-debugsource-1.1.1-4.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8"
},
"product_reference": "containernetworking-plugins-debugsource-1.1.1-4.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "containernetworking-plugins-debugsource-1.1.1-4.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:containernetworking-plugins-debugsource-1.1.1-4.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8"
},
"product_reference": "containernetworking-plugins-debugsource-1.1.1-4.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "containernetworking-plugins-debugsource-1.1.1-4.module+el8.6.0+21266+3e24c7b3.s390x.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:containernetworking-plugins-debugsource-1.1.1-4.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8"
},
"product_reference": "containernetworking-plugins-debugsource-1.1.1-4.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "containernetworking-plugins-debugsource-1.1.1-4.module+el8.6.0+21266+3e24c7b3.x86_64.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:containernetworking-plugins-debugsource-1.1.1-4.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8"
},
"product_reference": "containernetworking-plugins-debugsource-1.1.1-4.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "containers-common-1-40.module+el8.6.0+21266+3e24c7b3.aarch64.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:containers-common-1-40.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8"
},
"product_reference": "containers-common-1-40.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "containers-common-1-40.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:containers-common-1-40.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8"
},
"product_reference": "containers-common-1-40.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "containers-common-1-40.module+el8.6.0+21266+3e24c7b3.s390x.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:containers-common-1-40.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8"
},
"product_reference": "containers-common-1-40.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "containers-common-1-40.module+el8.6.0+21266+3e24c7b3.src.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:containers-common-1-40.module+el8.6.0+21266+3e24c7b3.src.rpm-container-tools:rhel8"
},
"product_reference": "containers-common-1-40.module+el8.6.0+21266+3e24c7b3.src.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "containers-common-1-40.module+el8.6.0+21266+3e24c7b3.x86_64.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:containers-common-1-40.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8"
},
"product_reference": "containers-common-1-40.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "crit-3.15-3.module+el8.6.0+21266+3e24c7b3.aarch64.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:crit-3.15-3.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8"
},
"product_reference": "crit-3.15-3.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "crit-3.15-3.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:crit-3.15-3.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8"
},
"product_reference": "crit-3.15-3.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "crit-3.15-3.module+el8.6.0+21266+3e24c7b3.s390x.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:crit-3.15-3.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8"
},
"product_reference": "crit-3.15-3.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "crit-3.15-3.module+el8.6.0+21266+3e24c7b3.x86_64.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:crit-3.15-3.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8"
},
"product_reference": "crit-3.15-3.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "criu-3.15-3.module+el8.6.0+21266+3e24c7b3.aarch64.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:criu-3.15-3.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8"
},
"product_reference": "criu-3.15-3.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "criu-3.15-3.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:criu-3.15-3.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8"
},
"product_reference": "criu-3.15-3.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "criu-3.15-3.module+el8.6.0+21266+3e24c7b3.s390x.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:criu-3.15-3.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8"
},
"product_reference": "criu-3.15-3.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "criu-3.15-3.module+el8.6.0+21266+3e24c7b3.src.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:criu-3.15-3.module+el8.6.0+21266+3e24c7b3.src.rpm-container-tools:rhel8"
},
"product_reference": "criu-3.15-3.module+el8.6.0+21266+3e24c7b3.src.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "criu-3.15-3.module+el8.6.0+21266+3e24c7b3.x86_64.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:criu-3.15-3.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8"
},
"product_reference": "criu-3.15-3.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "criu-debuginfo-3.15-3.module+el8.6.0+21266+3e24c7b3.aarch64.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:criu-debuginfo-3.15-3.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8"
},
"product_reference": "criu-debuginfo-3.15-3.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "criu-debuginfo-3.15-3.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:criu-debuginfo-3.15-3.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8"
},
"product_reference": "criu-debuginfo-3.15-3.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "criu-debuginfo-3.15-3.module+el8.6.0+21266+3e24c7b3.s390x.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:criu-debuginfo-3.15-3.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8"
},
"product_reference": "criu-debuginfo-3.15-3.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "criu-debuginfo-3.15-3.module+el8.6.0+21266+3e24c7b3.x86_64.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:criu-debuginfo-3.15-3.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8"
},
"product_reference": "criu-debuginfo-3.15-3.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "criu-debugsource-3.15-3.module+el8.6.0+21266+3e24c7b3.aarch64.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:criu-debugsource-3.15-3.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8"
},
"product_reference": "criu-debugsource-3.15-3.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "criu-debugsource-3.15-3.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:criu-debugsource-3.15-3.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8"
},
"product_reference": "criu-debugsource-3.15-3.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "criu-debugsource-3.15-3.module+el8.6.0+21266+3e24c7b3.s390x.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:criu-debugsource-3.15-3.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8"
},
"product_reference": "criu-debugsource-3.15-3.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "criu-debugsource-3.15-3.module+el8.6.0+21266+3e24c7b3.x86_64.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:criu-debugsource-3.15-3.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8"
},
"product_reference": "criu-debugsource-3.15-3.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "criu-devel-3.15-3.module+el8.6.0+21266+3e24c7b3.aarch64.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:criu-devel-3.15-3.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8"
},
"product_reference": "criu-devel-3.15-3.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "criu-devel-3.15-3.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:criu-devel-3.15-3.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8"
},
"product_reference": "criu-devel-3.15-3.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "criu-devel-3.15-3.module+el8.6.0+21266+3e24c7b3.s390x.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:criu-devel-3.15-3.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8"
},
"product_reference": "criu-devel-3.15-3.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "criu-devel-3.15-3.module+el8.6.0+21266+3e24c7b3.x86_64.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:criu-devel-3.15-3.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8"
},
"product_reference": "criu-devel-3.15-3.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "criu-libs-3.15-3.module+el8.6.0+21266+3e24c7b3.aarch64.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:criu-libs-3.15-3.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8"
},
"product_reference": "criu-libs-3.15-3.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "criu-libs-3.15-3.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:criu-libs-3.15-3.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8"
},
"product_reference": "criu-libs-3.15-3.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "criu-libs-3.15-3.module+el8.6.0+21266+3e24c7b3.s390x.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:criu-libs-3.15-3.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8"
},
"product_reference": "criu-libs-3.15-3.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "criu-libs-3.15-3.module+el8.6.0+21266+3e24c7b3.x86_64.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:criu-libs-3.15-3.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8"
},
"product_reference": "criu-libs-3.15-3.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "criu-libs-debuginfo-3.15-3.module+el8.6.0+21266+3e24c7b3.aarch64.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:criu-libs-debuginfo-3.15-3.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8"
},
"product_reference": "criu-libs-debuginfo-3.15-3.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "criu-libs-debuginfo-3.15-3.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:criu-libs-debuginfo-3.15-3.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8"
},
"product_reference": "criu-libs-debuginfo-3.15-3.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "criu-libs-debuginfo-3.15-3.module+el8.6.0+21266+3e24c7b3.s390x.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:criu-libs-debuginfo-3.15-3.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8"
},
"product_reference": "criu-libs-debuginfo-3.15-3.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "criu-libs-debuginfo-3.15-3.module+el8.6.0+21266+3e24c7b3.x86_64.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:criu-libs-debuginfo-3.15-3.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8"
},
"product_reference": "criu-libs-debuginfo-3.15-3.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "crun-1.5-1.module+el8.6.0+21266+3e24c7b3.aarch64.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:crun-1.5-1.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8"
},
"product_reference": "crun-1.5-1.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "crun-1.5-1.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:crun-1.5-1.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8"
},
"product_reference": "crun-1.5-1.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "crun-1.5-1.module+el8.6.0+21266+3e24c7b3.s390x.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:crun-1.5-1.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8"
},
"product_reference": "crun-1.5-1.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "crun-1.5-1.module+el8.6.0+21266+3e24c7b3.src.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:crun-1.5-1.module+el8.6.0+21266+3e24c7b3.src.rpm-container-tools:rhel8"
},
"product_reference": "crun-1.5-1.module+el8.6.0+21266+3e24c7b3.src.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "crun-1.5-1.module+el8.6.0+21266+3e24c7b3.x86_64.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:crun-1.5-1.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8"
},
"product_reference": "crun-1.5-1.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "crun-debuginfo-1.5-1.module+el8.6.0+21266+3e24c7b3.aarch64.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:crun-debuginfo-1.5-1.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8"
},
"product_reference": "crun-debuginfo-1.5-1.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "crun-debuginfo-1.5-1.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:crun-debuginfo-1.5-1.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8"
},
"product_reference": "crun-debuginfo-1.5-1.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "crun-debuginfo-1.5-1.module+el8.6.0+21266+3e24c7b3.s390x.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:crun-debuginfo-1.5-1.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8"
},
"product_reference": "crun-debuginfo-1.5-1.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "crun-debuginfo-1.5-1.module+el8.6.0+21266+3e24c7b3.x86_64.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:crun-debuginfo-1.5-1.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8"
},
"product_reference": "crun-debuginfo-1.5-1.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "crun-debugsource-1.5-1.module+el8.6.0+21266+3e24c7b3.aarch64.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:crun-debugsource-1.5-1.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8"
},
"product_reference": "crun-debugsource-1.5-1.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "crun-debugsource-1.5-1.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:crun-debugsource-1.5-1.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8"
},
"product_reference": "crun-debugsource-1.5-1.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "crun-debugsource-1.5-1.module+el8.6.0+21266+3e24c7b3.s390x.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:crun-debugsource-1.5-1.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8"
},
"product_reference": "crun-debugsource-1.5-1.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "crun-debugsource-1.5-1.module+el8.6.0+21266+3e24c7b3.x86_64.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:crun-debugsource-1.5-1.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8"
},
"product_reference": "crun-debugsource-1.5-1.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fuse-overlayfs-1.9-1.module+el8.6.0+21266+3e24c7b3.aarch64.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:fuse-overlayfs-1.9-1.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8"
},
"product_reference": "fuse-overlayfs-1.9-1.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fuse-overlayfs-1.9-1.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:fuse-overlayfs-1.9-1.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8"
},
"product_reference": "fuse-overlayfs-1.9-1.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fuse-overlayfs-1.9-1.module+el8.6.0+21266+3e24c7b3.s390x.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:fuse-overlayfs-1.9-1.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8"
},
"product_reference": "fuse-overlayfs-1.9-1.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fuse-overlayfs-1.9-1.module+el8.6.0+21266+3e24c7b3.src.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:fuse-overlayfs-1.9-1.module+el8.6.0+21266+3e24c7b3.src.rpm-container-tools:rhel8"
},
"product_reference": "fuse-overlayfs-1.9-1.module+el8.6.0+21266+3e24c7b3.src.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fuse-overlayfs-1.9-1.module+el8.6.0+21266+3e24c7b3.x86_64.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:fuse-overlayfs-1.9-1.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8"
},
"product_reference": "fuse-overlayfs-1.9-1.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fuse-overlayfs-debuginfo-1.9-1.module+el8.6.0+21266+3e24c7b3.aarch64.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:fuse-overlayfs-debuginfo-1.9-1.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8"
},
"product_reference": "fuse-overlayfs-debuginfo-1.9-1.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fuse-overlayfs-debuginfo-1.9-1.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:fuse-overlayfs-debuginfo-1.9-1.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8"
},
"product_reference": "fuse-overlayfs-debuginfo-1.9-1.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fuse-overlayfs-debuginfo-1.9-1.module+el8.6.0+21266+3e24c7b3.s390x.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:fuse-overlayfs-debuginfo-1.9-1.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8"
},
"product_reference": "fuse-overlayfs-debuginfo-1.9-1.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fuse-overlayfs-debuginfo-1.9-1.module+el8.6.0+21266+3e24c7b3.x86_64.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:fuse-overlayfs-debuginfo-1.9-1.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8"
},
"product_reference": "fuse-overlayfs-debuginfo-1.9-1.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fuse-overlayfs-debugsource-1.9-1.module+el8.6.0+21266+3e24c7b3.aarch64.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:fuse-overlayfs-debugsource-1.9-1.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8"
},
"product_reference": "fuse-overlayfs-debugsource-1.9-1.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fuse-overlayfs-debugsource-1.9-1.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:fuse-overlayfs-debugsource-1.9-1.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8"
},
"product_reference": "fuse-overlayfs-debugsource-1.9-1.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fuse-overlayfs-debugsource-1.9-1.module+el8.6.0+21266+3e24c7b3.s390x.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:fuse-overlayfs-debugsource-1.9-1.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8"
},
"product_reference": "fuse-overlayfs-debugsource-1.9-1.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fuse-overlayfs-debugsource-1.9-1.module+el8.6.0+21266+3e24c7b3.x86_64.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:fuse-overlayfs-debugsource-1.9-1.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8"
},
"product_reference": "fuse-overlayfs-debugsource-1.9-1.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libslirp-4.4.0-1.module+el8.6.0+21266+3e24c7b3.aarch64.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:libslirp-4.4.0-1.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8"
},
"product_reference": "libslirp-4.4.0-1.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libslirp-4.4.0-1.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:libslirp-4.4.0-1.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8"
},
"product_reference": "libslirp-4.4.0-1.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libslirp-4.4.0-1.module+el8.6.0+21266+3e24c7b3.s390x.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:libslirp-4.4.0-1.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8"
},
"product_reference": "libslirp-4.4.0-1.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libslirp-4.4.0-1.module+el8.6.0+21266+3e24c7b3.src.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:libslirp-4.4.0-1.module+el8.6.0+21266+3e24c7b3.src.rpm-container-tools:rhel8"
},
"product_reference": "libslirp-4.4.0-1.module+el8.6.0+21266+3e24c7b3.src.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libslirp-4.4.0-1.module+el8.6.0+21266+3e24c7b3.x86_64.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:libslirp-4.4.0-1.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8"
},
"product_reference": "libslirp-4.4.0-1.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libslirp-debuginfo-4.4.0-1.module+el8.6.0+21266+3e24c7b3.aarch64.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:libslirp-debuginfo-4.4.0-1.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8"
},
"product_reference": "libslirp-debuginfo-4.4.0-1.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libslirp-debuginfo-4.4.0-1.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:libslirp-debuginfo-4.4.0-1.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8"
},
"product_reference": "libslirp-debuginfo-4.4.0-1.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libslirp-debuginfo-4.4.0-1.module+el8.6.0+21266+3e24c7b3.s390x.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:libslirp-debuginfo-4.4.0-1.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8"
},
"product_reference": "libslirp-debuginfo-4.4.0-1.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libslirp-debuginfo-4.4.0-1.module+el8.6.0+21266+3e24c7b3.x86_64.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:libslirp-debuginfo-4.4.0-1.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8"
},
"product_reference": "libslirp-debuginfo-4.4.0-1.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libslirp-debugsource-4.4.0-1.module+el8.6.0+21266+3e24c7b3.aarch64.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:libslirp-debugsource-4.4.0-1.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8"
},
"product_reference": "libslirp-debugsource-4.4.0-1.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libslirp-debugsource-4.4.0-1.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:libslirp-debugsource-4.4.0-1.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8"
},
"product_reference": "libslirp-debugsource-4.4.0-1.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libslirp-debugsource-4.4.0-1.module+el8.6.0+21266+3e24c7b3.s390x.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:libslirp-debugsource-4.4.0-1.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8"
},
"product_reference": "libslirp-debugsource-4.4.0-1.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libslirp-debugsource-4.4.0-1.module+el8.6.0+21266+3e24c7b3.x86_64.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:libslirp-debugsource-4.4.0-1.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8"
},
"product_reference": "libslirp-debugsource-4.4.0-1.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libslirp-devel-4.4.0-1.module+el8.6.0+21266+3e24c7b3.aarch64.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:libslirp-devel-4.4.0-1.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8"
},
"product_reference": "libslirp-devel-4.4.0-1.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libslirp-devel-4.4.0-1.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:libslirp-devel-4.4.0-1.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8"
},
"product_reference": "libslirp-devel-4.4.0-1.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libslirp-devel-4.4.0-1.module+el8.6.0+21266+3e24c7b3.s390x.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:libslirp-devel-4.4.0-1.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8"
},
"product_reference": "libslirp-devel-4.4.0-1.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libslirp-devel-4.4.0-1.module+el8.6.0+21266+3e24c7b3.x86_64.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:libslirp-devel-4.4.0-1.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8"
},
"product_reference": "libslirp-devel-4.4.0-1.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netavark-1.0.1-40.module+el8.6.0+21266+3e24c7b3.aarch64.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:netavark-1.0.1-40.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8"
},
"product_reference": "netavark-1.0.1-40.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netavark-1.0.1-40.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:netavark-1.0.1-40.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8"
},
"product_reference": "netavark-1.0.1-40.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netavark-1.0.1-40.module+el8.6.0+21266+3e24c7b3.s390x.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:netavark-1.0.1-40.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8"
},
"product_reference": "netavark-1.0.1-40.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netavark-1.0.1-40.module+el8.6.0+21266+3e24c7b3.x86_64.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:netavark-1.0.1-40.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8"
},
"product_reference": "netavark-1.0.1-40.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "oci-seccomp-bpf-hook-1.2.6-1.module+el8.6.0+21266+3e24c7b3.aarch64.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:oci-seccomp-bpf-hook-1.2.6-1.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8"
},
"product_reference": "oci-seccomp-bpf-hook-1.2.6-1.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "oci-seccomp-bpf-hook-1.2.6-1.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:oci-seccomp-bpf-hook-1.2.6-1.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8"
},
"product_reference": "oci-seccomp-bpf-hook-1.2.6-1.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "oci-seccomp-bpf-hook-1.2.6-1.module+el8.6.0+21266+3e24c7b3.s390x.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:oci-seccomp-bpf-hook-1.2.6-1.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8"
},
"product_reference": "oci-seccomp-bpf-hook-1.2.6-1.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "oci-seccomp-bpf-hook-1.2.6-1.module+el8.6.0+21266+3e24c7b3.src.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:oci-seccomp-bpf-hook-1.2.6-1.module+el8.6.0+21266+3e24c7b3.src.rpm-container-tools:rhel8"
},
"product_reference": "oci-seccomp-bpf-hook-1.2.6-1.module+el8.6.0+21266+3e24c7b3.src.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "oci-seccomp-bpf-hook-1.2.6-1.module+el8.6.0+21266+3e24c7b3.x86_64.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:oci-seccomp-bpf-hook-1.2.6-1.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8"
},
"product_reference": "oci-seccomp-bpf-hook-1.2.6-1.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "oci-seccomp-bpf-hook-debuginfo-1.2.6-1.module+el8.6.0+21266+3e24c7b3.aarch64.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:oci-seccomp-bpf-hook-debuginfo-1.2.6-1.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8"
},
"product_reference": "oci-seccomp-bpf-hook-debuginfo-1.2.6-1.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "oci-seccomp-bpf-hook-debuginfo-1.2.6-1.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:oci-seccomp-bpf-hook-debuginfo-1.2.6-1.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8"
},
"product_reference": "oci-seccomp-bpf-hook-debuginfo-1.2.6-1.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "oci-seccomp-bpf-hook-debuginfo-1.2.6-1.module+el8.6.0+21266+3e24c7b3.s390x.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:oci-seccomp-bpf-hook-debuginfo-1.2.6-1.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8"
},
"product_reference": "oci-seccomp-bpf-hook-debuginfo-1.2.6-1.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "oci-seccomp-bpf-hook-debuginfo-1.2.6-1.module+el8.6.0+21266+3e24c7b3.x86_64.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:oci-seccomp-bpf-hook-debuginfo-1.2.6-1.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8"
},
"product_reference": "oci-seccomp-bpf-hook-debuginfo-1.2.6-1.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "oci-seccomp-bpf-hook-debugsource-1.2.6-1.module+el8.6.0+21266+3e24c7b3.aarch64.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:oci-seccomp-bpf-hook-debugsource-1.2.6-1.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8"
},
"product_reference": "oci-seccomp-bpf-hook-debugsource-1.2.6-1.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "oci-seccomp-bpf-hook-debugsource-1.2.6-1.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:oci-seccomp-bpf-hook-debugsource-1.2.6-1.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8"
},
"product_reference": "oci-seccomp-bpf-hook-debugsource-1.2.6-1.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "oci-seccomp-bpf-hook-debugsource-1.2.6-1.module+el8.6.0+21266+3e24c7b3.s390x.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:oci-seccomp-bpf-hook-debugsource-1.2.6-1.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8"
},
"product_reference": "oci-seccomp-bpf-hook-debugsource-1.2.6-1.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "oci-seccomp-bpf-hook-debugsource-1.2.6-1.module+el8.6.0+21266+3e24c7b3.x86_64.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:oci-seccomp-bpf-hook-debugsource-1.2.6-1.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8"
},
"product_reference": "oci-seccomp-bpf-hook-debugsource-1.2.6-1.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-4.2.0-2.module+el8.6.0+21674+8010760f.aarch64.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:podman-4.2.0-2.module+el8.6.0+21674+8010760f.aarch64.rpm-container-tools:rhel8"
},
"product_reference": "podman-4.2.0-2.module+el8.6.0+21674+8010760f.aarch64.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-4.2.0-2.module+el8.6.0+21674+8010760f.ppc64le.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:podman-4.2.0-2.module+el8.6.0+21674+8010760f.ppc64le.rpm-container-tools:rhel8"
},
"product_reference": "podman-4.2.0-2.module+el8.6.0+21674+8010760f.ppc64le.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-4.2.0-2.module+el8.6.0+21674+8010760f.s390x.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:podman-4.2.0-2.module+el8.6.0+21674+8010760f.s390x.rpm-container-tools:rhel8"
},
"product_reference": "podman-4.2.0-2.module+el8.6.0+21674+8010760f.s390x.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-4.2.0-2.module+el8.6.0+21674+8010760f.src.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:podman-4.2.0-2.module+el8.6.0+21674+8010760f.src.rpm-container-tools:rhel8"
},
"product_reference": "podman-4.2.0-2.module+el8.6.0+21674+8010760f.src.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-4.2.0-2.module+el8.6.0+21674+8010760f.x86_64.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:podman-4.2.0-2.module+el8.6.0+21674+8010760f.x86_64.rpm-container-tools:rhel8"
},
"product_reference": "podman-4.2.0-2.module+el8.6.0+21674+8010760f.x86_64.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-catatonit-4.2.0-2.module+el8.6.0+21674+8010760f.aarch64.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:podman-catatonit-4.2.0-2.module+el8.6.0+21674+8010760f.aarch64.rpm-container-tools:rhel8"
},
"product_reference": "podman-catatonit-4.2.0-2.module+el8.6.0+21674+8010760f.aarch64.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-catatonit-4.2.0-2.module+el8.6.0+21674+8010760f.ppc64le.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:podman-catatonit-4.2.0-2.module+el8.6.0+21674+8010760f.ppc64le.rpm-container-tools:rhel8"
},
"product_reference": "podman-catatonit-4.2.0-2.module+el8.6.0+21674+8010760f.ppc64le.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-catatonit-4.2.0-2.module+el8.6.0+21674+8010760f.s390x.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:podman-catatonit-4.2.0-2.module+el8.6.0+21674+8010760f.s390x.rpm-container-tools:rhel8"
},
"product_reference": "podman-catatonit-4.2.0-2.module+el8.6.0+21674+8010760f.s390x.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-catatonit-4.2.0-2.module+el8.6.0+21674+8010760f.x86_64.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:podman-catatonit-4.2.0-2.module+el8.6.0+21674+8010760f.x86_64.rpm-container-tools:rhel8"
},
"product_reference": "podman-catatonit-4.2.0-2.module+el8.6.0+21674+8010760f.x86_64.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-catatonit-debuginfo-4.2.0-2.module+el8.6.0+21674+8010760f.aarch64.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:podman-catatonit-debuginfo-4.2.0-2.module+el8.6.0+21674+8010760f.aarch64.rpm-container-tools:rhel8"
},
"product_reference": "podman-catatonit-debuginfo-4.2.0-2.module+el8.6.0+21674+8010760f.aarch64.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-catatonit-debuginfo-4.2.0-2.module+el8.6.0+21674+8010760f.ppc64le.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:podman-catatonit-debuginfo-4.2.0-2.module+el8.6.0+21674+8010760f.ppc64le.rpm-container-tools:rhel8"
},
"product_reference": "podman-catatonit-debuginfo-4.2.0-2.module+el8.6.0+21674+8010760f.ppc64le.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-catatonit-debuginfo-4.2.0-2.module+el8.6.0+21674+8010760f.s390x.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:podman-catatonit-debuginfo-4.2.0-2.module+el8.6.0+21674+8010760f.s390x.rpm-container-tools:rhel8"
},
"product_reference": "podman-catatonit-debuginfo-4.2.0-2.module+el8.6.0+21674+8010760f.s390x.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-catatonit-debuginfo-4.2.0-2.module+el8.6.0+21674+8010760f.x86_64.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:podman-catatonit-debuginfo-4.2.0-2.module+el8.6.0+21674+8010760f.x86_64.rpm-container-tools:rhel8"
},
"product_reference": "podman-catatonit-debuginfo-4.2.0-2.module+el8.6.0+21674+8010760f.x86_64.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-debuginfo-4.2.0-2.module+el8.6.0+21674+8010760f.aarch64.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:podman-debuginfo-4.2.0-2.module+el8.6.0+21674+8010760f.aarch64.rpm-container-tools:rhel8"
},
"product_reference": "podman-debuginfo-4.2.0-2.module+el8.6.0+21674+8010760f.aarch64.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-debuginfo-4.2.0-2.module+el8.6.0+21674+8010760f.ppc64le.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:podman-debuginfo-4.2.0-2.module+el8.6.0+21674+8010760f.ppc64le.rpm-container-tools:rhel8"
},
"product_reference": "podman-debuginfo-4.2.0-2.module+el8.6.0+21674+8010760f.ppc64le.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-debuginfo-4.2.0-2.module+el8.6.0+21674+8010760f.s390x.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:podman-debuginfo-4.2.0-2.module+el8.6.0+21674+8010760f.s390x.rpm-container-tools:rhel8"
},
"product_reference": "podman-debuginfo-4.2.0-2.module+el8.6.0+21674+8010760f.s390x.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-debuginfo-4.2.0-2.module+el8.6.0+21674+8010760f.x86_64.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:podman-debuginfo-4.2.0-2.module+el8.6.0+21674+8010760f.x86_64.rpm-container-tools:rhel8"
},
"product_reference": "podman-debuginfo-4.2.0-2.module+el8.6.0+21674+8010760f.x86_64.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-debugsource-4.2.0-2.module+el8.6.0+21674+8010760f.aarch64.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:podman-debugsource-4.2.0-2.module+el8.6.0+21674+8010760f.aarch64.rpm-container-tools:rhel8"
},
"product_reference": "podman-debugsource-4.2.0-2.module+el8.6.0+21674+8010760f.aarch64.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-debugsource-4.2.0-2.module+el8.6.0+21674+8010760f.ppc64le.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:podman-debugsource-4.2.0-2.module+el8.6.0+21674+8010760f.ppc64le.rpm-container-tools:rhel8"
},
"product_reference": "podman-debugsource-4.2.0-2.module+el8.6.0+21674+8010760f.ppc64le.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-debugsource-4.2.0-2.module+el8.6.0+21674+8010760f.s390x.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:podman-debugsource-4.2.0-2.module+el8.6.0+21674+8010760f.s390x.rpm-container-tools:rhel8"
},
"product_reference": "podman-debugsource-4.2.0-2.module+el8.6.0+21674+8010760f.s390x.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-debugsource-4.2.0-2.module+el8.6.0+21674+8010760f.x86_64.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:podman-debugsource-4.2.0-2.module+el8.6.0+21674+8010760f.x86_64.rpm-container-tools:rhel8"
},
"product_reference": "podman-debugsource-4.2.0-2.module+el8.6.0+21674+8010760f.x86_64.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-docker-4.2.0-2.module+el8.6.0+21674+8010760f.noarch.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:podman-docker-4.2.0-2.module+el8.6.0+21674+8010760f.noarch.rpm-container-tools:rhel8"
},
"product_reference": "podman-docker-4.2.0-2.module+el8.6.0+21674+8010760f.noarch.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-gvproxy-4.2.0-2.module+el8.6.0+21674+8010760f.aarch64.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:podman-gvproxy-4.2.0-2.module+el8.6.0+21674+8010760f.aarch64.rpm-container-tools:rhel8"
},
"product_reference": "podman-gvproxy-4.2.0-2.module+el8.6.0+21674+8010760f.aarch64.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-gvproxy-4.2.0-2.module+el8.6.0+21674+8010760f.ppc64le.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:podman-gvproxy-4.2.0-2.module+el8.6.0+21674+8010760f.ppc64le.rpm-container-tools:rhel8"
},
"product_reference": "podman-gvproxy-4.2.0-2.module+el8.6.0+21674+8010760f.ppc64le.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-gvproxy-4.2.0-2.module+el8.6.0+21674+8010760f.s390x.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:podman-gvproxy-4.2.0-2.module+el8.6.0+21674+8010760f.s390x.rpm-container-tools:rhel8"
},
"product_reference": "podman-gvproxy-4.2.0-2.module+el8.6.0+21674+8010760f.s390x.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-gvproxy-4.2.0-2.module+el8.6.0+21674+8010760f.x86_64.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:podman-gvproxy-4.2.0-2.module+el8.6.0+21674+8010760f.x86_64.rpm-container-tools:rhel8"
},
"product_reference": "podman-gvproxy-4.2.0-2.module+el8.6.0+21674+8010760f.x86_64.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-gvproxy-debuginfo-4.2.0-2.module+el8.6.0+21674+8010760f.aarch64.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:podman-gvproxy-debuginfo-4.2.0-2.module+el8.6.0+21674+8010760f.aarch64.rpm-container-tools:rhel8"
},
"product_reference": "podman-gvproxy-debuginfo-4.2.0-2.module+el8.6.0+21674+8010760f.aarch64.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-gvproxy-debuginfo-4.2.0-2.module+el8.6.0+21674+8010760f.ppc64le.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:podman-gvproxy-debuginfo-4.2.0-2.module+el8.6.0+21674+8010760f.ppc64le.rpm-container-tools:rhel8"
},
"product_reference": "podman-gvproxy-debuginfo-4.2.0-2.module+el8.6.0+21674+8010760f.ppc64le.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-gvproxy-debuginfo-4.2.0-2.module+el8.6.0+21674+8010760f.s390x.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:podman-gvproxy-debuginfo-4.2.0-2.module+el8.6.0+21674+8010760f.s390x.rpm-container-tools:rhel8"
},
"product_reference": "podman-gvproxy-debuginfo-4.2.0-2.module+el8.6.0+21674+8010760f.s390x.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-gvproxy-debuginfo-4.2.0-2.module+el8.6.0+21674+8010760f.x86_64.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:podman-gvproxy-debuginfo-4.2.0-2.module+el8.6.0+21674+8010760f.x86_64.rpm-container-tools:rhel8"
},
"product_reference": "podman-gvproxy-debuginfo-4.2.0-2.module+el8.6.0+21674+8010760f.x86_64.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-plugins-4.2.0-2.module+el8.6.0+21674+8010760f.aarch64.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:podman-plugins-4.2.0-2.module+el8.6.0+21674+8010760f.aarch64.rpm-container-tools:rhel8"
},
"product_reference": "podman-plugins-4.2.0-2.module+el8.6.0+21674+8010760f.aarch64.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-plugins-4.2.0-2.module+el8.6.0+21674+8010760f.ppc64le.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:podman-plugins-4.2.0-2.module+el8.6.0+21674+8010760f.ppc64le.rpm-container-tools:rhel8"
},
"product_reference": "podman-plugins-4.2.0-2.module+el8.6.0+21674+8010760f.ppc64le.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-plugins-4.2.0-2.module+el8.6.0+21674+8010760f.s390x.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:podman-plugins-4.2.0-2.module+el8.6.0+21674+8010760f.s390x.rpm-container-tools:rhel8"
},
"product_reference": "podman-plugins-4.2.0-2.module+el8.6.0+21674+8010760f.s390x.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-plugins-4.2.0-2.module+el8.6.0+21674+8010760f.x86_64.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:podman-plugins-4.2.0-2.module+el8.6.0+21674+8010760f.x86_64.rpm-container-tools:rhel8"
},
"product_reference": "podman-plugins-4.2.0-2.module+el8.6.0+21674+8010760f.x86_64.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-plugins-debuginfo-4.2.0-2.module+el8.6.0+21674+8010760f.aarch64.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:podman-plugins-debuginfo-4.2.0-2.module+el8.6.0+21674+8010760f.aarch64.rpm-container-tools:rhel8"
},
"product_reference": "podman-plugins-debuginfo-4.2.0-2.module+el8.6.0+21674+8010760f.aarch64.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-plugins-debuginfo-4.2.0-2.module+el8.6.0+21674+8010760f.ppc64le.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:podman-plugins-debuginfo-4.2.0-2.module+el8.6.0+21674+8010760f.ppc64le.rpm-container-tools:rhel8"
},
"product_reference": "podman-plugins-debuginfo-4.2.0-2.module+el8.6.0+21674+8010760f.ppc64le.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-plugins-debuginfo-4.2.0-2.module+el8.6.0+21674+8010760f.s390x.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:podman-plugins-debuginfo-4.2.0-2.module+el8.6.0+21674+8010760f.s390x.rpm-container-tools:rhel8"
},
"product_reference": "podman-plugins-debuginfo-4.2.0-2.module+el8.6.0+21674+8010760f.s390x.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-plugins-debuginfo-4.2.0-2.module+el8.6.0+21674+8010760f.x86_64.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:podman-plugins-debuginfo-4.2.0-2.module+el8.6.0+21674+8010760f.x86_64.rpm-container-tools:rhel8"
},
"product_reference": "podman-plugins-debuginfo-4.2.0-2.module+el8.6.0+21674+8010760f.x86_64.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-remote-4.2.0-2.module+el8.6.0+21674+8010760f.aarch64.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:podman-remote-4.2.0-2.module+el8.6.0+21674+8010760f.aarch64.rpm-container-tools:rhel8"
},
"product_reference": "podman-remote-4.2.0-2.module+el8.6.0+21674+8010760f.aarch64.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-remote-4.2.0-2.module+el8.6.0+21674+8010760f.ppc64le.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:podman-remote-4.2.0-2.module+el8.6.0+21674+8010760f.ppc64le.rpm-container-tools:rhel8"
},
"product_reference": "podman-remote-4.2.0-2.module+el8.6.0+21674+8010760f.ppc64le.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-remote-4.2.0-2.module+el8.6.0+21674+8010760f.s390x.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:podman-remote-4.2.0-2.module+el8.6.0+21674+8010760f.s390x.rpm-container-tools:rhel8"
},
"product_reference": "podman-remote-4.2.0-2.module+el8.6.0+21674+8010760f.s390x.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-remote-4.2.0-2.module+el8.6.0+21674+8010760f.x86_64.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:podman-remote-4.2.0-2.module+el8.6.0+21674+8010760f.x86_64.rpm-container-tools:rhel8"
},
"product_reference": "podman-remote-4.2.0-2.module+el8.6.0+21674+8010760f.x86_64.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-remote-debuginfo-4.2.0-2.module+el8.6.0+21674+8010760f.aarch64.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:podman-remote-debuginfo-4.2.0-2.module+el8.6.0+21674+8010760f.aarch64.rpm-container-tools:rhel8"
},
"product_reference": "podman-remote-debuginfo-4.2.0-2.module+el8.6.0+21674+8010760f.aarch64.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-remote-debuginfo-4.2.0-2.module+el8.6.0+21674+8010760f.ppc64le.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:podman-remote-debuginfo-4.2.0-2.module+el8.6.0+21674+8010760f.ppc64le.rpm-container-tools:rhel8"
},
"product_reference": "podman-remote-debuginfo-4.2.0-2.module+el8.6.0+21674+8010760f.ppc64le.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-remote-debuginfo-4.2.0-2.module+el8.6.0+21674+8010760f.s390x.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:podman-remote-debuginfo-4.2.0-2.module+el8.6.0+21674+8010760f.s390x.rpm-container-tools:rhel8"
},
"product_reference": "podman-remote-debuginfo-4.2.0-2.module+el8.6.0+21674+8010760f.s390x.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-remote-debuginfo-4.2.0-2.module+el8.6.0+21674+8010760f.x86_64.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:podman-remote-debuginfo-4.2.0-2.module+el8.6.0+21674+8010760f.x86_64.rpm-container-tools:rhel8"
},
"product_reference": "podman-remote-debuginfo-4.2.0-2.module+el8.6.0+21674+8010760f.x86_64.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-tests-4.2.0-2.module+el8.6.0+21674+8010760f.aarch64.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:podman-tests-4.2.0-2.module+el8.6.0+21674+8010760f.aarch64.rpm-container-tools:rhel8"
},
"product_reference": "podman-tests-4.2.0-2.module+el8.6.0+21674+8010760f.aarch64.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-tests-4.2.0-2.module+el8.6.0+21674+8010760f.ppc64le.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:podman-tests-4.2.0-2.module+el8.6.0+21674+8010760f.ppc64le.rpm-container-tools:rhel8"
},
"product_reference": "podman-tests-4.2.0-2.module+el8.6.0+21674+8010760f.ppc64le.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-tests-4.2.0-2.module+el8.6.0+21674+8010760f.s390x.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:podman-tests-4.2.0-2.module+el8.6.0+21674+8010760f.s390x.rpm-container-tools:rhel8"
},
"product_reference": "podman-tests-4.2.0-2.module+el8.6.0+21674+8010760f.s390x.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-tests-4.2.0-2.module+el8.6.0+21674+8010760f.x86_64.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:podman-tests-4.2.0-2.module+el8.6.0+21674+8010760f.x86_64.rpm-container-tools:rhel8"
},
"product_reference": "podman-tests-4.2.0-2.module+el8.6.0+21674+8010760f.x86_64.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-podman-4.0.1-1.module+el8.6.0+21266+3e24c7b3.src.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:python-podman-4.0.1-1.module+el8.6.0+21266+3e24c7b3.src.rpm-container-tools:rhel8"
},
"product_reference": "python-podman-4.0.1-1.module+el8.6.0+21266+3e24c7b3.src.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-criu-3.15-3.module+el8.6.0+21266+3e24c7b3.aarch64.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:python3-criu-3.15-3.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8"
},
"product_reference": "python3-criu-3.15-3.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-criu-3.15-3.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:python3-criu-3.15-3.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8"
},
"product_reference": "python3-criu-3.15-3.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-criu-3.15-3.module+el8.6.0+21266+3e24c7b3.s390x.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:python3-criu-3.15-3.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8"
},
"product_reference": "python3-criu-3.15-3.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-criu-3.15-3.module+el8.6.0+21266+3e24c7b3.x86_64.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:python3-criu-3.15-3.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8"
},
"product_reference": "python3-criu-3.15-3.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-podman-4.0.1-1.module+el8.6.0+21266+3e24c7b3.noarch.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:python3-podman-4.0.1-1.module+el8.6.0+21266+3e24c7b3.noarch.rpm-container-tools:rhel8"
},
"product_reference": "python3-podman-4.0.1-1.module+el8.6.0+21266+3e24c7b3.noarch.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "runc-1.1.12-1.module+el8.6.0+21266+3e24c7b3.aarch64.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:runc-1.1.12-1.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8"
},
"product_reference": "runc-1.1.12-1.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "runc-1.1.12-1.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:runc-1.1.12-1.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8"
},
"product_reference": "runc-1.1.12-1.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "runc-1.1.12-1.module+el8.6.0+21266+3e24c7b3.s390x.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:runc-1.1.12-1.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8"
},
"product_reference": "runc-1.1.12-1.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "runc-1.1.12-1.module+el8.6.0+21266+3e24c7b3.src.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:runc-1.1.12-1.module+el8.6.0+21266+3e24c7b3.src.rpm-container-tools:rhel8"
},
"product_reference": "runc-1.1.12-1.module+el8.6.0+21266+3e24c7b3.src.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "runc-1.1.12-1.module+el8.6.0+21266+3e24c7b3.x86_64.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:runc-1.1.12-1.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8"
},
"product_reference": "runc-1.1.12-1.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "runc-debuginfo-1.1.12-1.module+el8.6.0+21266+3e24c7b3.aarch64.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:runc-debuginfo-1.1.12-1.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8"
},
"product_reference": "runc-debuginfo-1.1.12-1.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "runc-debuginfo-1.1.12-1.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:runc-debuginfo-1.1.12-1.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8"
},
"product_reference": "runc-debuginfo-1.1.12-1.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "runc-debuginfo-1.1.12-1.module+el8.6.0+21266+3e24c7b3.s390x.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:runc-debuginfo-1.1.12-1.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8"
},
"product_reference": "runc-debuginfo-1.1.12-1.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "runc-debuginfo-1.1.12-1.module+el8.6.0+21266+3e24c7b3.x86_64.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:runc-debuginfo-1.1.12-1.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8"
},
"product_reference": "runc-debuginfo-1.1.12-1.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "runc-debugsource-1.1.12-1.module+el8.6.0+21266+3e24c7b3.aarch64.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:runc-debugsource-1.1.12-1.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8"
},
"product_reference": "runc-debugsource-1.1.12-1.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "runc-debugsource-1.1.12-1.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:runc-debugsource-1.1.12-1.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8"
},
"product_reference": "runc-debugsource-1.1.12-1.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "runc-debugsource-1.1.12-1.module+el8.6.0+21266+3e24c7b3.s390x.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:runc-debugsource-1.1.12-1.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8"
},
"product_reference": "runc-debugsource-1.1.12-1.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "runc-debugsource-1.1.12-1.module+el8.6.0+21266+3e24c7b3.x86_64.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:runc-debugsource-1.1.12-1.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8"
},
"product_reference": "runc-debugsource-1.1.12-1.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "skopeo-1.9.1-1.module+el8.6.0+21266+3e24c7b3.aarch64.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:skopeo-1.9.1-1.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8"
},
"product_reference": "skopeo-1.9.1-1.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "skopeo-1.9.1-1.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:skopeo-1.9.1-1.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8"
},
"product_reference": "skopeo-1.9.1-1.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "skopeo-1.9.1-1.module+el8.6.0+21266+3e24c7b3.s390x.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:skopeo-1.9.1-1.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8"
},
"product_reference": "skopeo-1.9.1-1.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "skopeo-1.9.1-1.module+el8.6.0+21266+3e24c7b3.src.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:skopeo-1.9.1-1.module+el8.6.0+21266+3e24c7b3.src.rpm-container-tools:rhel8"
},
"product_reference": "skopeo-1.9.1-1.module+el8.6.0+21266+3e24c7b3.src.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "skopeo-1.9.1-1.module+el8.6.0+21266+3e24c7b3.x86_64.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:skopeo-1.9.1-1.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8"
},
"product_reference": "skopeo-1.9.1-1.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "skopeo-debuginfo-1.9.1-1.module+el8.6.0+21266+3e24c7b3.aarch64.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:skopeo-debuginfo-1.9.1-1.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8"
},
"product_reference": "skopeo-debuginfo-1.9.1-1.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "skopeo-debuginfo-1.9.1-1.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:skopeo-debuginfo-1.9.1-1.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8"
},
"product_reference": "skopeo-debuginfo-1.9.1-1.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "skopeo-debuginfo-1.9.1-1.module+el8.6.0+21266+3e24c7b3.s390x.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:skopeo-debuginfo-1.9.1-1.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8"
},
"product_reference": "skopeo-debuginfo-1.9.1-1.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "skopeo-debuginfo-1.9.1-1.module+el8.6.0+21266+3e24c7b3.x86_64.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:skopeo-debuginfo-1.9.1-1.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8"
},
"product_reference": "skopeo-debuginfo-1.9.1-1.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "skopeo-debugsource-1.9.1-1.module+el8.6.0+21266+3e24c7b3.aarch64.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:skopeo-debugsource-1.9.1-1.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8"
},
"product_reference": "skopeo-debugsource-1.9.1-1.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "skopeo-debugsource-1.9.1-1.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:skopeo-debugsource-1.9.1-1.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8"
},
"product_reference": "skopeo-debugsource-1.9.1-1.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "skopeo-debugsource-1.9.1-1.module+el8.6.0+21266+3e24c7b3.s390x.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:skopeo-debugsource-1.9.1-1.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8"
},
"product_reference": "skopeo-debugsource-1.9.1-1.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "skopeo-debugsource-1.9.1-1.module+el8.6.0+21266+3e24c7b3.x86_64.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:skopeo-debugsource-1.9.1-1.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8"
},
"product_reference": "skopeo-debugsource-1.9.1-1.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "skopeo-tests-1.9.1-1.module+el8.6.0+21266+3e24c7b3.aarch64.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:skopeo-tests-1.9.1-1.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8"
},
"product_reference": "skopeo-tests-1.9.1-1.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "skopeo-tests-1.9.1-1.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:skopeo-tests-1.9.1-1.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8"
},
"product_reference": "skopeo-tests-1.9.1-1.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "skopeo-tests-1.9.1-1.module+el8.6.0+21266+3e24c7b3.s390x.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:skopeo-tests-1.9.1-1.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8"
},
"product_reference": "skopeo-tests-1.9.1-1.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "skopeo-tests-1.9.1-1.module+el8.6.0+21266+3e24c7b3.x86_64.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:skopeo-tests-1.9.1-1.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8"
},
"product_reference": "skopeo-tests-1.9.1-1.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "slirp4netns-1.2.0-3.module+el8.6.0+21266+3e24c7b3.aarch64.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:slirp4netns-1.2.0-3.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8"
},
"product_reference": "slirp4netns-1.2.0-3.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "slirp4netns-1.2.0-3.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:slirp4netns-1.2.0-3.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8"
},
"product_reference": "slirp4netns-1.2.0-3.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "slirp4netns-1.2.0-3.module+el8.6.0+21266+3e24c7b3.s390x.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:slirp4netns-1.2.0-3.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8"
},
"product_reference": "slirp4netns-1.2.0-3.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "slirp4netns-1.2.0-3.module+el8.6.0+21266+3e24c7b3.src.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:slirp4netns-1.2.0-3.module+el8.6.0+21266+3e24c7b3.src.rpm-container-tools:rhel8"
},
"product_reference": "slirp4netns-1.2.0-3.module+el8.6.0+21266+3e24c7b3.src.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "slirp4netns-1.2.0-3.module+el8.6.0+21266+3e24c7b3.x86_64.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:slirp4netns-1.2.0-3.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8"
},
"product_reference": "slirp4netns-1.2.0-3.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "slirp4netns-debuginfo-1.2.0-3.module+el8.6.0+21266+3e24c7b3.aarch64.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:slirp4netns-debuginfo-1.2.0-3.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8"
},
"product_reference": "slirp4netns-debuginfo-1.2.0-3.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "slirp4netns-debuginfo-1.2.0-3.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:slirp4netns-debuginfo-1.2.0-3.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8"
},
"product_reference": "slirp4netns-debuginfo-1.2.0-3.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "slirp4netns-debuginfo-1.2.0-3.module+el8.6.0+21266+3e24c7b3.s390x.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:slirp4netns-debuginfo-1.2.0-3.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8"
},
"product_reference": "slirp4netns-debuginfo-1.2.0-3.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "slirp4netns-debuginfo-1.2.0-3.module+el8.6.0+21266+3e24c7b3.x86_64.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:slirp4netns-debuginfo-1.2.0-3.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8"
},
"product_reference": "slirp4netns-debuginfo-1.2.0-3.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "slirp4netns-debugsource-1.2.0-3.module+el8.6.0+21266+3e24c7b3.aarch64.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:slirp4netns-debugsource-1.2.0-3.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8"
},
"product_reference": "slirp4netns-debugsource-1.2.0-3.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "slirp4netns-debugsource-1.2.0-3.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:slirp4netns-debugsource-1.2.0-3.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8"
},
"product_reference": "slirp4netns-debugsource-1.2.0-3.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "slirp4netns-debugsource-1.2.0-3.module+el8.6.0+21266+3e24c7b3.s390x.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:slirp4netns-debugsource-1.2.0-3.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8"
},
"product_reference": "slirp4netns-debugsource-1.2.0-3.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "slirp4netns-debugsource-1.2.0-3.module+el8.6.0+21266+3e24c7b3.x86_64.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:slirp4netns-debugsource-1.2.0-3.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8"
},
"product_reference": "slirp4netns-debugsource-1.2.0-3.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "toolbox-0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.aarch64.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:toolbox-0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8"
},
"product_reference": "toolbox-0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "toolbox-0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:toolbox-0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8"
},
"product_reference": "toolbox-0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "toolbox-0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.s390x.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:toolbox-0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8"
},
"product_reference": "toolbox-0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "toolbox-0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.src.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:toolbox-0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.src.rpm-container-tools:rhel8"
},
"product_reference": "toolbox-0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.src.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "toolbox-0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.x86_64.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:toolbox-0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8"
},
"product_reference": "toolbox-0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "toolbox-debuginfo-0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.aarch64.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:toolbox-debuginfo-0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8"
},
"product_reference": "toolbox-debuginfo-0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "toolbox-debuginfo-0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:toolbox-debuginfo-0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8"
},
"product_reference": "toolbox-debuginfo-0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "toolbox-debuginfo-0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.s390x.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:toolbox-debuginfo-0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8"
},
"product_reference": "toolbox-debuginfo-0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "toolbox-debuginfo-0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.x86_64.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:toolbox-debuginfo-0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8"
},
"product_reference": "toolbox-debuginfo-0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "toolbox-debugsource-0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.aarch64.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:toolbox-debugsource-0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8"
},
"product_reference": "toolbox-debugsource-0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "toolbox-debugsource-0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:toolbox-debugsource-0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8"
},
"product_reference": "toolbox-debugsource-0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "toolbox-debugsource-0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.s390x.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:toolbox-debugsource-0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8"
},
"product_reference": "toolbox-debugsource-0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "toolbox-debugsource-0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.x86_64.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:toolbox-debugsource-0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8"
},
"product_reference": "toolbox-debugsource-0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "toolbox-tests-0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.aarch64.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:toolbox-tests-0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8"
},
"product_reference": "toolbox-tests-0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "toolbox-tests-0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:toolbox-tests-0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8"
},
"product_reference": "toolbox-tests-0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "toolbox-tests-0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.s390x.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:toolbox-tests-0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8"
},
"product_reference": "toolbox-tests-0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "toolbox-tests-0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.x86_64.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:toolbox-tests-0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8"
},
"product_reference": "toolbox-tests-0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "udica-0.2.6-5.module+el8.6.0+21266+3e24c7b3.noarch.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:udica-0.2.6-5.module+el8.6.0+21266+3e24c7b3.noarch.rpm-container-tools:rhel8"
},
"product_reference": "udica-0.2.6-5.module+el8.6.0+21266+3e24c7b3.noarch.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "udica-0.2.6-5.module+el8.6.0+21266+3e24c7b3.src.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:udica-0.2.6-5.module+el8.6.0+21266+3e24c7b3.src.rpm-container-tools:rhel8"
},
"product_reference": "udica-0.2.6-5.module+el8.6.0+21266+3e24c7b3.src.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2022-32149",
"cwe": {
"id": "CWE-407",
"name": "Inefficient Algorithmic Complexity"
},
"discovery_date": "2022-10-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2134010"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in the golang.org/x/text/language package. An attacker can craft an Accept-Language header which ParseAcceptLanguage will take significant time to parse. This issue leads to a denial of service, and can impact availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: golang.org/x/text/language: ParseAcceptLanguage takes a long time to parse complex tags",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "After careful analysis of the vulnerability Redhat is choosing to keep the vulnerability severity as moderate,the vulnerability exists in the ParseAcceptLanguage function of the golang text/language package,when an attacker could craft an unusually large accept header and due to the parser taking quadratic time complexity to finish, firstly the attacker would have to find a way smuggle an input to the parser and even then this would simply not result in a crash of any kind but more of resource hang which while can be unpleasant,does not equate to any real world damage.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.6.0.Z.EUS:aardvark-dns-1.0.1-40.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:aardvark-dns-1.0.1-40.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:aardvark-dns-1.0.1-40.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:aardvark-dns-1.0.1-40.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:buildah-1.26.2-1.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:buildah-1.26.2-1.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:buildah-1.26.2-1.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:buildah-1.26.2-1.module+el8.6.0+21266+3e24c7b3.src.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:buildah-1.26.2-1.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:buildah-debuginfo-1.26.2-1.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:buildah-debuginfo-1.26.2-1.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:buildah-debuginfo-1.26.2-1.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:buildah-debuginfo-1.26.2-1.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:buildah-debugsource-1.26.2-1.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:buildah-debugsource-1.26.2-1.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:buildah-debugsource-1.26.2-1.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:buildah-debugsource-1.26.2-1.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:buildah-tests-1.26.2-1.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:buildah-tests-1.26.2-1.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:buildah-tests-1.26.2-1.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:buildah-tests-1.26.2-1.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:buildah-tests-debuginfo-1.26.2-1.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:buildah-tests-debuginfo-1.26.2-1.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:buildah-tests-debuginfo-1.26.2-1.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:buildah-tests-debuginfo-1.26.2-1.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:cockpit-podman-49.1-1.module+el8.6.0+21266+3e24c7b3.noarch.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:cockpit-podman-49.1-1.module+el8.6.0+21266+3e24c7b3.src.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:conmon-2.1.4-1.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:conmon-2.1.4-1.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:conmon-2.1.4-1.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:conmon-2.1.4-1.module+el8.6.0+21266+3e24c7b3.src.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:conmon-2.1.4-1.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:conmon-debuginfo-2.1.4-1.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:conmon-debuginfo-2.1.4-1.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:conmon-debuginfo-2.1.4-1.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:conmon-debuginfo-2.1.4-1.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:conmon-debugsource-2.1.4-1.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:conmon-debugsource-2.1.4-1.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:conmon-debugsource-2.1.4-1.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:conmon-debugsource-2.1.4-1.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:container-selinux-2.189.0-1.module+el8.6.0+21266+3e24c7b3.noarch.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:container-selinux-2.189.0-1.module+el8.6.0+21266+3e24c7b3.src.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:containernetworking-plugins-1.1.1-4.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:containernetworking-plugins-1.1.1-4.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:containernetworking-plugins-1.1.1-4.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:containernetworking-plugins-1.1.1-4.module+el8.6.0+21266+3e24c7b3.src.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:containernetworking-plugins-1.1.1-4.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:containernetworking-plugins-debuginfo-1.1.1-4.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:containernetworking-plugins-debuginfo-1.1.1-4.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:containernetworking-plugins-debuginfo-1.1.1-4.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:containernetworking-plugins-debuginfo-1.1.1-4.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:containernetworking-plugins-debugsource-1.1.1-4.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:containernetworking-plugins-debugsource-1.1.1-4.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:containernetworking-plugins-debugsource-1.1.1-4.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:containernetworking-plugins-debugsource-1.1.1-4.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:containers-common-1-40.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:containers-common-1-40.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:containers-common-1-40.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:containers-common-1-40.module+el8.6.0+21266+3e24c7b3.src.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:containers-common-1-40.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:crit-3.15-3.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:crit-3.15-3.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:crit-3.15-3.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:crit-3.15-3.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:criu-3.15-3.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:criu-3.15-3.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:criu-3.15-3.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:criu-3.15-3.module+el8.6.0+21266+3e24c7b3.src.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:criu-3.15-3.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:criu-debuginfo-3.15-3.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:criu-debuginfo-3.15-3.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:criu-debuginfo-3.15-3.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:criu-debuginfo-3.15-3.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:criu-debugsource-3.15-3.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:criu-debugsource-3.15-3.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:criu-debugsource-3.15-3.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:criu-debugsource-3.15-3.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:criu-devel-3.15-3.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:criu-devel-3.15-3.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:criu-devel-3.15-3.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:criu-devel-3.15-3.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:criu-libs-3.15-3.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:criu-libs-3.15-3.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:criu-libs-3.15-3.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:criu-libs-3.15-3.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:criu-libs-debuginfo-3.15-3.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:criu-libs-debuginfo-3.15-3.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:criu-libs-debuginfo-3.15-3.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:criu-libs-debuginfo-3.15-3.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:crun-1.5-1.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:crun-1.5-1.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:crun-1.5-1.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:crun-1.5-1.module+el8.6.0+21266+3e24c7b3.src.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:crun-1.5-1.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:crun-debuginfo-1.5-1.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:crun-debuginfo-1.5-1.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:crun-debuginfo-1.5-1.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:crun-debuginfo-1.5-1.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:crun-debugsource-1.5-1.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:crun-debugsource-1.5-1.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:crun-debugsource-1.5-1.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:crun-debugsource-1.5-1.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:fuse-overlayfs-1.9-1.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:fuse-overlayfs-1.9-1.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:fuse-overlayfs-1.9-1.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:fuse-overlayfs-1.9-1.module+el8.6.0+21266+3e24c7b3.src.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:fuse-overlayfs-1.9-1.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:fuse-overlayfs-debuginfo-1.9-1.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:fuse-overlayfs-debuginfo-1.9-1.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:fuse-overlayfs-debuginfo-1.9-1.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:fuse-overlayfs-debuginfo-1.9-1.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:fuse-overlayfs-debugsource-1.9-1.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:fuse-overlayfs-debugsource-1.9-1.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:fuse-overlayfs-debugsource-1.9-1.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:fuse-overlayfs-debugsource-1.9-1.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:libslirp-4.4.0-1.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:libslirp-4.4.0-1.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:libslirp-4.4.0-1.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:libslirp-4.4.0-1.module+el8.6.0+21266+3e24c7b3.src.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:libslirp-4.4.0-1.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:libslirp-debuginfo-4.4.0-1.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:libslirp-debuginfo-4.4.0-1.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:libslirp-debuginfo-4.4.0-1.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:libslirp-debuginfo-4.4.0-1.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:libslirp-debugsource-4.4.0-1.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:libslirp-debugsource-4.4.0-1.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:libslirp-debugsource-4.4.0-1.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:libslirp-debugsource-4.4.0-1.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:libslirp-devel-4.4.0-1.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:libslirp-devel-4.4.0-1.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:libslirp-devel-4.4.0-1.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:libslirp-devel-4.4.0-1.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:netavark-1.0.1-40.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:netavark-1.0.1-40.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:netavark-1.0.1-40.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:netavark-1.0.1-40.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:oci-seccomp-bpf-hook-1.2.6-1.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:oci-seccomp-bpf-hook-1.2.6-1.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:oci-seccomp-bpf-hook-1.2.6-1.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:oci-seccomp-bpf-hook-1.2.6-1.module+el8.6.0+21266+3e24c7b3.src.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:oci-seccomp-bpf-hook-1.2.6-1.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:oci-seccomp-bpf-hook-debuginfo-1.2.6-1.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:oci-seccomp-bpf-hook-debuginfo-1.2.6-1.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:oci-seccomp-bpf-hook-debuginfo-1.2.6-1.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:oci-seccomp-bpf-hook-debuginfo-1.2.6-1.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:oci-seccomp-bpf-hook-debugsource-1.2.6-1.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:oci-seccomp-bpf-hook-debugsource-1.2.6-1.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:oci-seccomp-bpf-hook-debugsource-1.2.6-1.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:oci-seccomp-bpf-hook-debugsource-1.2.6-1.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:podman-4.2.0-2.module+el8.6.0+21674+8010760f.aarch64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:podman-4.2.0-2.module+el8.6.0+21674+8010760f.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:podman-4.2.0-2.module+el8.6.0+21674+8010760f.s390x.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:podman-4.2.0-2.module+el8.6.0+21674+8010760f.src.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:podman-4.2.0-2.module+el8.6.0+21674+8010760f.x86_64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:podman-catatonit-4.2.0-2.module+el8.6.0+21674+8010760f.aarch64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:podman-catatonit-4.2.0-2.module+el8.6.0+21674+8010760f.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:podman-catatonit-4.2.0-2.module+el8.6.0+21674+8010760f.s390x.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:podman-catatonit-4.2.0-2.module+el8.6.0+21674+8010760f.x86_64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:podman-catatonit-debuginfo-4.2.0-2.module+el8.6.0+21674+8010760f.aarch64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:podman-catatonit-debuginfo-4.2.0-2.module+el8.6.0+21674+8010760f.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:podman-catatonit-debuginfo-4.2.0-2.module+el8.6.0+21674+8010760f.s390x.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:podman-catatonit-debuginfo-4.2.0-2.module+el8.6.0+21674+8010760f.x86_64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:podman-debuginfo-4.2.0-2.module+el8.6.0+21674+8010760f.aarch64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:podman-debuginfo-4.2.0-2.module+el8.6.0+21674+8010760f.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:podman-debuginfo-4.2.0-2.module+el8.6.0+21674+8010760f.s390x.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:podman-debuginfo-4.2.0-2.module+el8.6.0+21674+8010760f.x86_64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:podman-debugsource-4.2.0-2.module+el8.6.0+21674+8010760f.aarch64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:podman-debugsource-4.2.0-2.module+el8.6.0+21674+8010760f.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:podman-debugsource-4.2.0-2.module+el8.6.0+21674+8010760f.s390x.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:podman-debugsource-4.2.0-2.module+el8.6.0+21674+8010760f.x86_64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:podman-docker-4.2.0-2.module+el8.6.0+21674+8010760f.noarch.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:podman-gvproxy-4.2.0-2.module+el8.6.0+21674+8010760f.aarch64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:podman-gvproxy-4.2.0-2.module+el8.6.0+21674+8010760f.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:podman-gvproxy-4.2.0-2.module+el8.6.0+21674+8010760f.s390x.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:podman-gvproxy-4.2.0-2.module+el8.6.0+21674+8010760f.x86_64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:podman-gvproxy-debuginfo-4.2.0-2.module+el8.6.0+21674+8010760f.aarch64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:podman-gvproxy-debuginfo-4.2.0-2.module+el8.6.0+21674+8010760f.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:podman-gvproxy-debuginfo-4.2.0-2.module+el8.6.0+21674+8010760f.s390x.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:podman-gvproxy-debuginfo-4.2.0-2.module+el8.6.0+21674+8010760f.x86_64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:podman-plugins-4.2.0-2.module+el8.6.0+21674+8010760f.aarch64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:podman-plugins-4.2.0-2.module+el8.6.0+21674+8010760f.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:podman-plugins-4.2.0-2.module+el8.6.0+21674+8010760f.s390x.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:podman-plugins-4.2.0-2.module+el8.6.0+21674+8010760f.x86_64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:podman-plugins-debuginfo-4.2.0-2.module+el8.6.0+21674+8010760f.aarch64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:podman-plugins-debuginfo-4.2.0-2.module+el8.6.0+21674+8010760f.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:podman-plugins-debuginfo-4.2.0-2.module+el8.6.0+21674+8010760f.s390x.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:podman-plugins-debuginfo-4.2.0-2.module+el8.6.0+21674+8010760f.x86_64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:podman-remote-4.2.0-2.module+el8.6.0+21674+8010760f.aarch64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:podman-remote-4.2.0-2.module+el8.6.0+21674+8010760f.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:podman-remote-4.2.0-2.module+el8.6.0+21674+8010760f.s390x.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:podman-remote-4.2.0-2.module+el8.6.0+21674+8010760f.x86_64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:podman-remote-debuginfo-4.2.0-2.module+el8.6.0+21674+8010760f.aarch64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:podman-remote-debuginfo-4.2.0-2.module+el8.6.0+21674+8010760f.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:podman-remote-debuginfo-4.2.0-2.module+el8.6.0+21674+8010760f.s390x.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:podman-remote-debuginfo-4.2.0-2.module+el8.6.0+21674+8010760f.x86_64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:podman-tests-4.2.0-2.module+el8.6.0+21674+8010760f.aarch64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:podman-tests-4.2.0-2.module+el8.6.0+21674+8010760f.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:podman-tests-4.2.0-2.module+el8.6.0+21674+8010760f.s390x.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:podman-tests-4.2.0-2.module+el8.6.0+21674+8010760f.x86_64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:python-podman-4.0.1-1.module+el8.6.0+21266+3e24c7b3.src.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:python3-criu-3.15-3.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:python3-criu-3.15-3.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:python3-criu-3.15-3.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:python3-criu-3.15-3.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:python3-podman-4.0.1-1.module+el8.6.0+21266+3e24c7b3.noarch.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:runc-1.1.12-1.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:runc-1.1.12-1.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:runc-1.1.12-1.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:runc-1.1.12-1.module+el8.6.0+21266+3e24c7b3.src.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:runc-1.1.12-1.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:runc-debuginfo-1.1.12-1.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:runc-debuginfo-1.1.12-1.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:runc-debuginfo-1.1.12-1.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:runc-debuginfo-1.1.12-1.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:runc-debugsource-1.1.12-1.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:runc-debugsource-1.1.12-1.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:runc-debugsource-1.1.12-1.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:runc-debugsource-1.1.12-1.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:skopeo-1.9.1-1.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:skopeo-1.9.1-1.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:skopeo-1.9.1-1.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:skopeo-1.9.1-1.module+el8.6.0+21266+3e24c7b3.src.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:skopeo-1.9.1-1.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:skopeo-debuginfo-1.9.1-1.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:skopeo-debuginfo-1.9.1-1.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:skopeo-debuginfo-1.9.1-1.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:skopeo-debuginfo-1.9.1-1.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:skopeo-debugsource-1.9.1-1.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:skopeo-debugsource-1.9.1-1.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:skopeo-debugsource-1.9.1-1.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:skopeo-debugsource-1.9.1-1.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:skopeo-tests-1.9.1-1.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:skopeo-tests-1.9.1-1.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:skopeo-tests-1.9.1-1.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:skopeo-tests-1.9.1-1.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:slirp4netns-1.2.0-3.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:slirp4netns-1.2.0-3.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:slirp4netns-1.2.0-3.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:slirp4netns-1.2.0-3.module+el8.6.0+21266+3e24c7b3.src.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:slirp4netns-1.2.0-3.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:slirp4netns-debuginfo-1.2.0-3.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:slirp4netns-debuginfo-1.2.0-3.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:slirp4netns-debuginfo-1.2.0-3.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:slirp4netns-debuginfo-1.2.0-3.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:slirp4netns-debugsource-1.2.0-3.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:slirp4netns-debugsource-1.2.0-3.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:slirp4netns-debugsource-1.2.0-3.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:slirp4netns-debugsource-1.2.0-3.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:toolbox-0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:toolbox-0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:toolbox-0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:toolbox-0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.src.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:toolbox-0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:toolbox-debuginfo-0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:toolbox-debuginfo-0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:toolbox-debuginfo-0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:toolbox-debuginfo-0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:toolbox-debugsource-0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:toolbox-debugsource-0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:toolbox-debugsource-0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:toolbox-debugsource-0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:toolbox-tests-0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:toolbox-tests-0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:toolbox-tests-0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:toolbox-tests-0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:udica-0.2.6-5.module+el8.6.0+21266+3e24c7b3.noarch.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:udica-0.2.6-5.module+el8.6.0+21266+3e24c7b3.src.rpm-container-tools:rhel8"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-32149"
},
{
"category": "external",
"summary": "RHBZ#2134010",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2134010"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-32149",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32149"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-32149",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-32149"
},
{
"category": "external",
"summary": "https://go.dev/issue/56152",
"url": "https://go.dev/issue/56152"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-dev/c/qfPIly0X7aU",
"url": "https://groups.google.com/g/golang-dev/c/qfPIly0X7aU"
}
],
"release_date": "2022-10-11T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-04-23T14:16:09+00:00",
"details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.6.0.Z.EUS:aardvark-dns-1.0.1-40.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:aardvark-dns-1.0.1-40.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:aardvark-dns-1.0.1-40.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:aardvark-dns-1.0.1-40.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:buildah-1.26.2-1.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:buildah-1.26.2-1.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:buildah-1.26.2-1.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:buildah-1.26.2-1.module+el8.6.0+21266+3e24c7b3.src.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:buildah-1.26.2-1.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:buildah-debuginfo-1.26.2-1.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:buildah-debuginfo-1.26.2-1.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:buildah-debuginfo-1.26.2-1.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:buildah-debuginfo-1.26.2-1.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:buildah-debugsource-1.26.2-1.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:buildah-debugsource-1.26.2-1.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:buildah-debugsource-1.26.2-1.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:buildah-debugsource-1.26.2-1.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:buildah-tests-1.26.2-1.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:buildah-tests-1.26.2-1.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:buildah-tests-1.26.2-1.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:buildah-tests-1.26.2-1.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:buildah-tests-debuginfo-1.26.2-1.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:buildah-tests-debuginfo-1.26.2-1.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:buildah-tests-debuginfo-1.26.2-1.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:buildah-tests-debuginfo-1.26.2-1.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:cockpit-podman-49.1-1.module+el8.6.0+21266+3e24c7b3.noarch.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:cockpit-podman-49.1-1.module+el8.6.0+21266+3e24c7b3.src.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:conmon-2.1.4-1.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:conmon-2.1.4-1.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:conmon-2.1.4-1.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:conmon-2.1.4-1.module+el8.6.0+21266+3e24c7b3.src.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:conmon-2.1.4-1.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:conmon-debuginfo-2.1.4-1.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:conmon-debuginfo-2.1.4-1.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:conmon-debuginfo-2.1.4-1.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:conmon-debuginfo-2.1.4-1.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:conmon-debugsource-2.1.4-1.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:conmon-debugsource-2.1.4-1.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:conmon-debugsource-2.1.4-1.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:conmon-debugsource-2.1.4-1.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:container-selinux-2.189.0-1.module+el8.6.0+21266+3e24c7b3.noarch.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:container-selinux-2.189.0-1.module+el8.6.0+21266+3e24c7b3.src.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:containernetworking-plugins-1.1.1-4.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:containernetworking-plugins-1.1.1-4.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:containernetworking-plugins-1.1.1-4.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:containernetworking-plugins-1.1.1-4.module+el8.6.0+21266+3e24c7b3.src.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:containernetworking-plugins-1.1.1-4.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:containernetworking-plugins-debuginfo-1.1.1-4.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:containernetworking-plugins-debuginfo-1.1.1-4.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:containernetworking-plugins-debuginfo-1.1.1-4.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:containernetworking-plugins-debuginfo-1.1.1-4.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:containernetworking-plugins-debugsource-1.1.1-4.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:containernetworking-plugins-debugsource-1.1.1-4.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:containernetworking-plugins-debugsource-1.1.1-4.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:containernetworking-plugins-debugsource-1.1.1-4.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:containers-common-1-40.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:containers-common-1-40.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:containers-common-1-40.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:containers-common-1-40.module+el8.6.0+21266+3e24c7b3.src.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:containers-common-1-40.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:crit-3.15-3.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:crit-3.15-3.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:crit-3.15-3.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:crit-3.15-3.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:criu-3.15-3.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:criu-3.15-3.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:criu-3.15-3.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:criu-3.15-3.module+el8.6.0+21266+3e24c7b3.src.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:criu-3.15-3.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:criu-debuginfo-3.15-3.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:criu-debuginfo-3.15-3.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:criu-debuginfo-3.15-3.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:criu-debuginfo-3.15-3.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:criu-debugsource-3.15-3.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:criu-debugsource-3.15-3.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:criu-debugsource-3.15-3.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:criu-debugsource-3.15-3.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:criu-devel-3.15-3.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:criu-devel-3.15-3.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:criu-devel-3.15-3.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:criu-devel-3.15-3.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:criu-libs-3.15-3.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:criu-libs-3.15-3.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:criu-libs-3.15-3.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:criu-libs-3.15-3.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:criu-libs-debuginfo-3.15-3.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:criu-libs-debuginfo-3.15-3.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:criu-libs-debuginfo-3.15-3.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:criu-libs-debuginfo-3.15-3.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:crun-1.5-1.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:crun-1.5-1.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:crun-1.5-1.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:crun-1.5-1.module+el8.6.0+21266+3e24c7b3.src.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:crun-1.5-1.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:crun-debuginfo-1.5-1.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:crun-debuginfo-1.5-1.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:crun-debuginfo-1.5-1.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:crun-debuginfo-1.5-1.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:crun-debugsource-1.5-1.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:crun-debugsource-1.5-1.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:crun-debugsource-1.5-1.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:crun-debugsource-1.5-1.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:fuse-overlayfs-1.9-1.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:fuse-overlayfs-1.9-1.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:fuse-overlayfs-1.9-1.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:fuse-overlayfs-1.9-1.module+el8.6.0+21266+3e24c7b3.src.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:fuse-overlayfs-1.9-1.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:fuse-overlayfs-debuginfo-1.9-1.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:fuse-overlayfs-debuginfo-1.9-1.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:fuse-overlayfs-debuginfo-1.9-1.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:fuse-overlayfs-debuginfo-1.9-1.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:fuse-overlayfs-debugsource-1.9-1.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:fuse-overlayfs-debugsource-1.9-1.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:fuse-overlayfs-debugsource-1.9-1.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:fuse-overlayfs-debugsource-1.9-1.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:libslirp-4.4.0-1.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:libslirp-4.4.0-1.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:libslirp-4.4.0-1.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:libslirp-4.4.0-1.module+el8.6.0+21266+3e24c7b3.src.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:libslirp-4.4.0-1.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:libslirp-debuginfo-4.4.0-1.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:libslirp-debuginfo-4.4.0-1.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:libslirp-debuginfo-4.4.0-1.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:libslirp-debuginfo-4.4.0-1.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:libslirp-debugsource-4.4.0-1.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:libslirp-debugsource-4.4.0-1.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:libslirp-debugsource-4.4.0-1.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:libslirp-debugsource-4.4.0-1.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:libslirp-devel-4.4.0-1.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:libslirp-devel-4.4.0-1.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:libslirp-devel-4.4.0-1.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:libslirp-devel-4.4.0-1.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:netavark-1.0.1-40.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:netavark-1.0.1-40.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:netavark-1.0.1-40.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:netavark-1.0.1-40.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:oci-seccomp-bpf-hook-1.2.6-1.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:oci-seccomp-bpf-hook-1.2.6-1.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:oci-seccomp-bpf-hook-1.2.6-1.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:oci-seccomp-bpf-hook-1.2.6-1.module+el8.6.0+21266+3e24c7b3.src.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:oci-seccomp-bpf-hook-1.2.6-1.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:oci-seccomp-bpf-hook-debuginfo-1.2.6-1.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:oci-seccomp-bpf-hook-debuginfo-1.2.6-1.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:oci-seccomp-bpf-hook-debuginfo-1.2.6-1.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:oci-seccomp-bpf-hook-debuginfo-1.2.6-1.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:oci-seccomp-bpf-hook-debugsource-1.2.6-1.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:oci-seccomp-bpf-hook-debugsource-1.2.6-1.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:oci-seccomp-bpf-hook-debugsource-1.2.6-1.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:oci-seccomp-bpf-hook-debugsource-1.2.6-1.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:podman-4.2.0-2.module+el8.6.0+21674+8010760f.aarch64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:podman-4.2.0-2.module+el8.6.0+21674+8010760f.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:podman-4.2.0-2.module+el8.6.0+21674+8010760f.s390x.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:podman-4.2.0-2.module+el8.6.0+21674+8010760f.src.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:podman-4.2.0-2.module+el8.6.0+21674+8010760f.x86_64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:podman-catatonit-4.2.0-2.module+el8.6.0+21674+8010760f.aarch64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:podman-catatonit-4.2.0-2.module+el8.6.0+21674+8010760f.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:podman-catatonit-4.2.0-2.module+el8.6.0+21674+8010760f.s390x.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:podman-catatonit-4.2.0-2.module+el8.6.0+21674+8010760f.x86_64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:podman-catatonit-debuginfo-4.2.0-2.module+el8.6.0+21674+8010760f.aarch64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:podman-catatonit-debuginfo-4.2.0-2.module+el8.6.0+21674+8010760f.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:podman-catatonit-debuginfo-4.2.0-2.module+el8.6.0+21674+8010760f.s390x.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:podman-catatonit-debuginfo-4.2.0-2.module+el8.6.0+21674+8010760f.x86_64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:podman-debuginfo-4.2.0-2.module+el8.6.0+21674+8010760f.aarch64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:podman-debuginfo-4.2.0-2.module+el8.6.0+21674+8010760f.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:podman-debuginfo-4.2.0-2.module+el8.6.0+21674+8010760f.s390x.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:podman-debuginfo-4.2.0-2.module+el8.6.0+21674+8010760f.x86_64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:podman-debugsource-4.2.0-2.module+el8.6.0+21674+8010760f.aarch64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:podman-debugsource-4.2.0-2.module+el8.6.0+21674+8010760f.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:podman-debugsource-4.2.0-2.module+el8.6.0+21674+8010760f.s390x.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:podman-debugsource-4.2.0-2.module+el8.6.0+21674+8010760f.x86_64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:podman-docker-4.2.0-2.module+el8.6.0+21674+8010760f.noarch.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:podman-gvproxy-4.2.0-2.module+el8.6.0+21674+8010760f.aarch64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:podman-gvproxy-4.2.0-2.module+el8.6.0+21674+8010760f.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:podman-gvproxy-4.2.0-2.module+el8.6.0+21674+8010760f.s390x.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:podman-gvproxy-4.2.0-2.module+el8.6.0+21674+8010760f.x86_64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:podman-gvproxy-debuginfo-4.2.0-2.module+el8.6.0+21674+8010760f.aarch64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:podman-gvproxy-debuginfo-4.2.0-2.module+el8.6.0+21674+8010760f.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:podman-gvproxy-debuginfo-4.2.0-2.module+el8.6.0+21674+8010760f.s390x.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:podman-gvproxy-debuginfo-4.2.0-2.module+el8.6.0+21674+8010760f.x86_64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:podman-plugins-4.2.0-2.module+el8.6.0+21674+8010760f.aarch64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:podman-plugins-4.2.0-2.module+el8.6.0+21674+8010760f.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:podman-plugins-4.2.0-2.module+el8.6.0+21674+8010760f.s390x.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:podman-plugins-4.2.0-2.module+el8.6.0+21674+8010760f.x86_64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:podman-plugins-debuginfo-4.2.0-2.module+el8.6.0+21674+8010760f.aarch64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:podman-plugins-debuginfo-4.2.0-2.module+el8.6.0+21674+8010760f.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:podman-plugins-debuginfo-4.2.0-2.module+el8.6.0+21674+8010760f.s390x.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:podman-plugins-debuginfo-4.2.0-2.module+el8.6.0+21674+8010760f.x86_64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:podman-remote-4.2.0-2.module+el8.6.0+21674+8010760f.aarch64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:podman-remote-4.2.0-2.module+el8.6.0+21674+8010760f.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:podman-remote-4.2.0-2.module+el8.6.0+21674+8010760f.s390x.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:podman-remote-4.2.0-2.module+el8.6.0+21674+8010760f.x86_64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:podman-remote-debuginfo-4.2.0-2.module+el8.6.0+21674+8010760f.aarch64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:podman-remote-debuginfo-4.2.0-2.module+el8.6.0+21674+8010760f.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:podman-remote-debuginfo-4.2.0-2.module+el8.6.0+21674+8010760f.s390x.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:podman-remote-debuginfo-4.2.0-2.module+el8.6.0+21674+8010760f.x86_64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:podman-tests-4.2.0-2.module+el8.6.0+21674+8010760f.aarch64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:podman-tests-4.2.0-2.module+el8.6.0+21674+8010760f.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:podman-tests-4.2.0-2.module+el8.6.0+21674+8010760f.s390x.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:podman-tests-4.2.0-2.module+el8.6.0+21674+8010760f.x86_64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:python-podman-4.0.1-1.module+el8.6.0+21266+3e24c7b3.src.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:python3-criu-3.15-3.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:python3-criu-3.15-3.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:python3-criu-3.15-3.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:python3-criu-3.15-3.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:python3-podman-4.0.1-1.module+el8.6.0+21266+3e24c7b3.noarch.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:runc-1.1.12-1.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:runc-1.1.12-1.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:runc-1.1.12-1.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:runc-1.1.12-1.module+el8.6.0+21266+3e24c7b3.src.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:runc-1.1.12-1.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:runc-debuginfo-1.1.12-1.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:runc-debuginfo-1.1.12-1.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:runc-debuginfo-1.1.12-1.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:runc-debuginfo-1.1.12-1.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:runc-debugsource-1.1.12-1.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:runc-debugsource-1.1.12-1.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:runc-debugsource-1.1.12-1.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:runc-debugsource-1.1.12-1.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:skopeo-1.9.1-1.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:skopeo-1.9.1-1.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:skopeo-1.9.1-1.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:skopeo-1.9.1-1.module+el8.6.0+21266+3e24c7b3.src.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:skopeo-1.9.1-1.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:skopeo-debuginfo-1.9.1-1.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:skopeo-debuginfo-1.9.1-1.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:skopeo-debuginfo-1.9.1-1.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:skopeo-debuginfo-1.9.1-1.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:skopeo-debugsource-1.9.1-1.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:skopeo-debugsource-1.9.1-1.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:skopeo-debugsource-1.9.1-1.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:skopeo-debugsource-1.9.1-1.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:skopeo-tests-1.9.1-1.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:skopeo-tests-1.9.1-1.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:skopeo-tests-1.9.1-1.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:skopeo-tests-1.9.1-1.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:slirp4netns-1.2.0-3.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:slirp4netns-1.2.0-3.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:slirp4netns-1.2.0-3.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:slirp4netns-1.2.0-3.module+el8.6.0+21266+3e24c7b3.src.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:slirp4netns-1.2.0-3.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:slirp4netns-debuginfo-1.2.0-3.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:slirp4netns-debuginfo-1.2.0-3.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:slirp4netns-debuginfo-1.2.0-3.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:slirp4netns-debuginfo-1.2.0-3.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:slirp4netns-debugsource-1.2.0-3.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:slirp4netns-debugsource-1.2.0-3.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:slirp4netns-debugsource-1.2.0-3.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:slirp4netns-debugsource-1.2.0-3.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:toolbox-0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:toolbox-0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:toolbox-0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:toolbox-0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.src.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:toolbox-0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:toolbox-debuginfo-0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:toolbox-debuginfo-0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:toolbox-debuginfo-0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:toolbox-debuginfo-0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:toolbox-debugsource-0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:toolbox-debugsource-0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:toolbox-debugsource-0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:toolbox-debugsource-0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:toolbox-tests-0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:toolbox-tests-0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:toolbox-tests-0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:toolbox-tests-0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:udica-0.2.6-5.module+el8.6.0+21266+3e24c7b3.noarch.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:udica-0.2.6-5.module+el8.6.0+21266+3e24c7b3.src.rpm-container-tools:rhel8"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:1994"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.6.0.Z.EUS:aardvark-dns-1.0.1-40.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:aardvark-dns-1.0.1-40.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:aardvark-dns-1.0.1-40.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:aardvark-dns-1.0.1-40.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:buildah-1.26.2-1.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:buildah-1.26.2-1.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:buildah-1.26.2-1.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:buildah-1.26.2-1.module+el8.6.0+21266+3e24c7b3.src.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:buildah-1.26.2-1.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:buildah-debuginfo-1.26.2-1.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:buildah-debuginfo-1.26.2-1.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:buildah-debuginfo-1.26.2-1.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:buildah-debuginfo-1.26.2-1.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:buildah-debugsource-1.26.2-1.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:buildah-debugsource-1.26.2-1.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:buildah-debugsource-1.26.2-1.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:buildah-debugsource-1.26.2-1.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:buildah-tests-1.26.2-1.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:buildah-tests-1.26.2-1.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:buildah-tests-1.26.2-1.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:buildah-tests-1.26.2-1.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:buildah-tests-debuginfo-1.26.2-1.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:buildah-tests-debuginfo-1.26.2-1.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:buildah-tests-debuginfo-1.26.2-1.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:buildah-tests-debuginfo-1.26.2-1.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:cockpit-podman-49.1-1.module+el8.6.0+21266+3e24c7b3.noarch.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:cockpit-podman-49.1-1.module+el8.6.0+21266+3e24c7b3.src.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:conmon-2.1.4-1.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:conmon-2.1.4-1.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:conmon-2.1.4-1.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:conmon-2.1.4-1.module+el8.6.0+21266+3e24c7b3.src.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:conmon-2.1.4-1.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:conmon-debuginfo-2.1.4-1.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:conmon-debuginfo-2.1.4-1.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:conmon-debuginfo-2.1.4-1.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:conmon-debuginfo-2.1.4-1.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:conmon-debugsource-2.1.4-1.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:conmon-debugsource-2.1.4-1.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:conmon-debugsource-2.1.4-1.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:conmon-debugsource-2.1.4-1.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:container-selinux-2.189.0-1.module+el8.6.0+21266+3e24c7b3.noarch.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:container-selinux-2.189.0-1.module+el8.6.0+21266+3e24c7b3.src.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:containernetworking-plugins-1.1.1-4.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:containernetworking-plugins-1.1.1-4.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:containernetworking-plugins-1.1.1-4.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:containernetworking-plugins-1.1.1-4.module+el8.6.0+21266+3e24c7b3.src.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:containernetworking-plugins-1.1.1-4.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:containernetworking-plugins-debuginfo-1.1.1-4.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:containernetworking-plugins-debuginfo-1.1.1-4.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:containernetworking-plugins-debuginfo-1.1.1-4.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:containernetworking-plugins-debuginfo-1.1.1-4.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:containernetworking-plugins-debugsource-1.1.1-4.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:containernetworking-plugins-debugsource-1.1.1-4.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:containernetworking-plugins-debugsource-1.1.1-4.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:containernetworking-plugins-debugsource-1.1.1-4.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:containers-common-1-40.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:containers-common-1-40.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:containers-common-1-40.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:containers-common-1-40.module+el8.6.0+21266+3e24c7b3.src.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:containers-common-1-40.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:crit-3.15-3.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:crit-3.15-3.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:crit-3.15-3.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:crit-3.15-3.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:criu-3.15-3.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:criu-3.15-3.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:criu-3.15-3.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:criu-3.15-3.module+el8.6.0+21266+3e24c7b3.src.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:criu-3.15-3.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:criu-debuginfo-3.15-3.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:criu-debuginfo-3.15-3.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:criu-debuginfo-3.15-3.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:criu-debuginfo-3.15-3.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:criu-debugsource-3.15-3.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:criu-debugsource-3.15-3.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:criu-debugsource-3.15-3.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:criu-debugsource-3.15-3.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:criu-devel-3.15-3.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:criu-devel-3.15-3.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:criu-devel-3.15-3.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:criu-devel-3.15-3.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:criu-libs-3.15-3.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:criu-libs-3.15-3.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:criu-libs-3.15-3.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:criu-libs-3.15-3.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:criu-libs-debuginfo-3.15-3.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:criu-libs-debuginfo-3.15-3.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:criu-libs-debuginfo-3.15-3.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:criu-libs-debuginfo-3.15-3.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:crun-1.5-1.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:crun-1.5-1.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:crun-1.5-1.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:crun-1.5-1.module+el8.6.0+21266+3e24c7b3.src.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:crun-1.5-1.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:crun-debuginfo-1.5-1.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:crun-debuginfo-1.5-1.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:crun-debuginfo-1.5-1.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:crun-debuginfo-1.5-1.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:crun-debugsource-1.5-1.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:crun-debugsource-1.5-1.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:crun-debugsource-1.5-1.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:crun-debugsource-1.5-1.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:fuse-overlayfs-1.9-1.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:fuse-overlayfs-1.9-1.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:fuse-overlayfs-1.9-1.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:fuse-overlayfs-1.9-1.module+el8.6.0+21266+3e24c7b3.src.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:fuse-overlayfs-1.9-1.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:fuse-overlayfs-debuginfo-1.9-1.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:fuse-overlayfs-debuginfo-1.9-1.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:fuse-overlayfs-debuginfo-1.9-1.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:fuse-overlayfs-debuginfo-1.9-1.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:fuse-overlayfs-debugsource-1.9-1.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:fuse-overlayfs-debugsource-1.9-1.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:fuse-overlayfs-debugsource-1.9-1.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:fuse-overlayfs-debugsource-1.9-1.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:libslirp-4.4.0-1.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:libslirp-4.4.0-1.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:libslirp-4.4.0-1.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:libslirp-4.4.0-1.module+el8.6.0+21266+3e24c7b3.src.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:libslirp-4.4.0-1.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:libslirp-debuginfo-4.4.0-1.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:libslirp-debuginfo-4.4.0-1.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:libslirp-debuginfo-4.4.0-1.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:libslirp-debuginfo-4.4.0-1.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:libslirp-debugsource-4.4.0-1.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:libslirp-debugsource-4.4.0-1.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:libslirp-debugsource-4.4.0-1.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:libslirp-debugsource-4.4.0-1.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:libslirp-devel-4.4.0-1.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:libslirp-devel-4.4.0-1.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:libslirp-devel-4.4.0-1.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:libslirp-devel-4.4.0-1.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:netavark-1.0.1-40.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:netavark-1.0.1-40.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:netavark-1.0.1-40.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:netavark-1.0.1-40.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:oci-seccomp-bpf-hook-1.2.6-1.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:oci-seccomp-bpf-hook-1.2.6-1.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:oci-seccomp-bpf-hook-1.2.6-1.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:oci-seccomp-bpf-hook-1.2.6-1.module+el8.6.0+21266+3e24c7b3.src.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:oci-seccomp-bpf-hook-1.2.6-1.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:oci-seccomp-bpf-hook-debuginfo-1.2.6-1.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:oci-seccomp-bpf-hook-debuginfo-1.2.6-1.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:oci-seccomp-bpf-hook-debuginfo-1.2.6-1.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:oci-seccomp-bpf-hook-debuginfo-1.2.6-1.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:oci-seccomp-bpf-hook-debugsource-1.2.6-1.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:oci-seccomp-bpf-hook-debugsource-1.2.6-1.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:oci-seccomp-bpf-hook-debugsource-1.2.6-1.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:oci-seccomp-bpf-hook-debugsource-1.2.6-1.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:podman-4.2.0-2.module+el8.6.0+21674+8010760f.aarch64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:podman-4.2.0-2.module+el8.6.0+21674+8010760f.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:podman-4.2.0-2.module+el8.6.0+21674+8010760f.s390x.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:podman-4.2.0-2.module+el8.6.0+21674+8010760f.src.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:podman-4.2.0-2.module+el8.6.0+21674+8010760f.x86_64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:podman-catatonit-4.2.0-2.module+el8.6.0+21674+8010760f.aarch64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:podman-catatonit-4.2.0-2.module+el8.6.0+21674+8010760f.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:podman-catatonit-4.2.0-2.module+el8.6.0+21674+8010760f.s390x.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:podman-catatonit-4.2.0-2.module+el8.6.0+21674+8010760f.x86_64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:podman-catatonit-debuginfo-4.2.0-2.module+el8.6.0+21674+8010760f.aarch64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:podman-catatonit-debuginfo-4.2.0-2.module+el8.6.0+21674+8010760f.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:podman-catatonit-debuginfo-4.2.0-2.module+el8.6.0+21674+8010760f.s390x.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:podman-catatonit-debuginfo-4.2.0-2.module+el8.6.0+21674+8010760f.x86_64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:podman-debuginfo-4.2.0-2.module+el8.6.0+21674+8010760f.aarch64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:podman-debuginfo-4.2.0-2.module+el8.6.0+21674+8010760f.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:podman-debuginfo-4.2.0-2.module+el8.6.0+21674+8010760f.s390x.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:podman-debuginfo-4.2.0-2.module+el8.6.0+21674+8010760f.x86_64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:podman-debugsource-4.2.0-2.module+el8.6.0+21674+8010760f.aarch64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:podman-debugsource-4.2.0-2.module+el8.6.0+21674+8010760f.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:podman-debugsource-4.2.0-2.module+el8.6.0+21674+8010760f.s390x.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:podman-debugsource-4.2.0-2.module+el8.6.0+21674+8010760f.x86_64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:podman-docker-4.2.0-2.module+el8.6.0+21674+8010760f.noarch.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:podman-gvproxy-4.2.0-2.module+el8.6.0+21674+8010760f.aarch64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:podman-gvproxy-4.2.0-2.module+el8.6.0+21674+8010760f.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:podman-gvproxy-4.2.0-2.module+el8.6.0+21674+8010760f.s390x.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:podman-gvproxy-4.2.0-2.module+el8.6.0+21674+8010760f.x86_64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:podman-gvproxy-debuginfo-4.2.0-2.module+el8.6.0+21674+8010760f.aarch64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:podman-gvproxy-debuginfo-4.2.0-2.module+el8.6.0+21674+8010760f.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:podman-gvproxy-debuginfo-4.2.0-2.module+el8.6.0+21674+8010760f.s390x.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:podman-gvproxy-debuginfo-4.2.0-2.module+el8.6.0+21674+8010760f.x86_64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:podman-plugins-4.2.0-2.module+el8.6.0+21674+8010760f.aarch64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:podman-plugins-4.2.0-2.module+el8.6.0+21674+8010760f.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:podman-plugins-4.2.0-2.module+el8.6.0+21674+8010760f.s390x.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:podman-plugins-4.2.0-2.module+el8.6.0+21674+8010760f.x86_64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:podman-plugins-debuginfo-4.2.0-2.module+el8.6.0+21674+8010760f.aarch64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:podman-plugins-debuginfo-4.2.0-2.module+el8.6.0+21674+8010760f.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:podman-plugins-debuginfo-4.2.0-2.module+el8.6.0+21674+8010760f.s390x.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:podman-plugins-debuginfo-4.2.0-2.module+el8.6.0+21674+8010760f.x86_64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:podman-remote-4.2.0-2.module+el8.6.0+21674+8010760f.aarch64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:podman-remote-4.2.0-2.module+el8.6.0+21674+8010760f.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:podman-remote-4.2.0-2.module+el8.6.0+21674+8010760f.s390x.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:podman-remote-4.2.0-2.module+el8.6.0+21674+8010760f.x86_64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:podman-remote-debuginfo-4.2.0-2.module+el8.6.0+21674+8010760f.aarch64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:podman-remote-debuginfo-4.2.0-2.module+el8.6.0+21674+8010760f.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:podman-remote-debuginfo-4.2.0-2.module+el8.6.0+21674+8010760f.s390x.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:podman-remote-debuginfo-4.2.0-2.module+el8.6.0+21674+8010760f.x86_64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:podman-tests-4.2.0-2.module+el8.6.0+21674+8010760f.aarch64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:podman-tests-4.2.0-2.module+el8.6.0+21674+8010760f.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:podman-tests-4.2.0-2.module+el8.6.0+21674+8010760f.s390x.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:podman-tests-4.2.0-2.module+el8.6.0+21674+8010760f.x86_64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:python-podman-4.0.1-1.module+el8.6.0+21266+3e24c7b3.src.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:python3-criu-3.15-3.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:python3-criu-3.15-3.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:python3-criu-3.15-3.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:python3-criu-3.15-3.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:python3-podman-4.0.1-1.module+el8.6.0+21266+3e24c7b3.noarch.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:runc-1.1.12-1.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:runc-1.1.12-1.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:runc-1.1.12-1.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:runc-1.1.12-1.module+el8.6.0+21266+3e24c7b3.src.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:runc-1.1.12-1.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:runc-debuginfo-1.1.12-1.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:runc-debuginfo-1.1.12-1.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:runc-debuginfo-1.1.12-1.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:runc-debuginfo-1.1.12-1.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:runc-debugsource-1.1.12-1.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:runc-debugsource-1.1.12-1.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:runc-debugsource-1.1.12-1.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:runc-debugsource-1.1.12-1.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:skopeo-1.9.1-1.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:skopeo-1.9.1-1.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:skopeo-1.9.1-1.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:skopeo-1.9.1-1.module+el8.6.0+21266+3e24c7b3.src.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:skopeo-1.9.1-1.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:skopeo-debuginfo-1.9.1-1.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:skopeo-debuginfo-1.9.1-1.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:skopeo-debuginfo-1.9.1-1.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:skopeo-debuginfo-1.9.1-1.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:skopeo-debugsource-1.9.1-1.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:skopeo-debugsource-1.9.1-1.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:skopeo-debugsource-1.9.1-1.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:skopeo-debugsource-1.9.1-1.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:skopeo-tests-1.9.1-1.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:skopeo-tests-1.9.1-1.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:skopeo-tests-1.9.1-1.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:skopeo-tests-1.9.1-1.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:slirp4netns-1.2.0-3.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:slirp4netns-1.2.0-3.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:slirp4netns-1.2.0-3.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:slirp4netns-1.2.0-3.module+el8.6.0+21266+3e24c7b3.src.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:slirp4netns-1.2.0-3.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:slirp4netns-debuginfo-1.2.0-3.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:slirp4netns-debuginfo-1.2.0-3.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:slirp4netns-debuginfo-1.2.0-3.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:slirp4netns-debuginfo-1.2.0-3.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:slirp4netns-debugsource-1.2.0-3.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:slirp4netns-debugsource-1.2.0-3.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:slirp4netns-debugsource-1.2.0-3.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:slirp4netns-debugsource-1.2.0-3.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:toolbox-0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:toolbox-0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:toolbox-0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:toolbox-0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.src.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:toolbox-0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:toolbox-debuginfo-0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:toolbox-debuginfo-0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:toolbox-debuginfo-0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:toolbox-debuginfo-0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:toolbox-debugsource-0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:toolbox-debugsource-0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:toolbox-debugsource-0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:toolbox-debugsource-0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:toolbox-tests-0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:toolbox-tests-0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:toolbox-tests-0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:toolbox-tests-0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:udica-0.2.6-5.module+el8.6.0+21266+3e24c7b3.noarch.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:udica-0.2.6-5.module+el8.6.0+21266+3e24c7b3.src.rpm-container-tools:rhel8"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "golang: golang.org/x/text/language: ParseAcceptLanguage takes a long time to parse complex tags"
}
]
}
RHSA-2023:3205
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Red Hat OpenShift Virtualization release 4.13.0 is now available with updates to packages and images that fix several bugs and add enhancements.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "OpenShift Virtualization is Red Hat\u0027s virtualization solution designed for Red Hat OpenShift Container Platform.\n\nThis advisory contains OpenShift Virtualization 4.13.0 images.\n\nSecurity Fix(es):\n\n* golang: archive/tar: unbounded memory consumption when reading headers (CVE-2022-2879)\n\n* golang: net/http/httputil: ReverseProxy should not forward unparseable query parameters (CVE-2022-2880)\n\n* golang: net/http: handle server errors after sending GOAWAY (CVE-2022-27664)\n\n* golang: golang.org/x/text/language: ParseAcceptLanguage takes a long time to parse complex tags (CVE-2022-32149)\n\n* golang: net/url: JoinPath does not strip relative path components in all circumstances (CVE-2022-32190)\n\n* golang: regexp/syntax: limit memory used by parsing regexps (CVE-2022-41715)\n\n* golang: net/http: excessive memory growth in a Go server accepting HTTP/2 requests (CVE-2022-41717)\n\n* golang: math/big: decoding big.Float and big.Rat types can panic if the encoded message is too short, potentially allowing a denial of service (CVE-2022-32189)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nThis update also fixes several bugs and adds various enhancements. Documentation for these changes is available from the Release Notes document linked to in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2023:3205",
"url": "https://access.redhat.com/errata/RHSA-2023:3205"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#moderate",
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "2023393",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2023393"
},
{
"category": "external",
"summary": "2029391",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2029391"
},
{
"category": "external",
"summary": "2052556",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2052556"
},
{
"category": "external",
"summary": "2060499",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2060499"
},
{
"category": "external",
"summary": "2070132",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2070132"
},
{
"category": "external",
"summary": "2087540",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2087540"
},
{
"category": "external",
"summary": "2101390",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2101390"
},
{
"category": "external",
"summary": "2104424",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2104424"
},
{
"category": "external",
"summary": "2104479",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2104479"
},
{
"category": "external",
"summary": "2104859",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2104859"
},
{
"category": "external",
"summary": "2110562",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2110562"
},
{
"category": "external",
"summary": "2111794",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2111794"
},
{
"category": "external",
"summary": "2113814",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2113814"
},
{
"category": "external",
"summary": "2114922",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2114922"
},
{
"category": "external",
"summary": "2116562",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2116562"
},
{
"category": "external",
"summary": "2117803",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2117803"
},
{
"category": "external",
"summary": "2122119",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2122119"
},
{
"category": "external",
"summary": "2122168",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2122168"
},
{
"category": "external",
"summary": "2123209",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2123209"
},
{
"category": "external",
"summary": "2124668",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2124668"
},
{
"category": "external",
"summary": "2124669",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2124669"
},
{
"category": "external",
"summary": "2132867",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2132867"
},
{
"category": "external",
"summary": "2132868",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2132868"
},
{
"category": "external",
"summary": "2132872",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2132872"
},
{
"category": "external",
"summary": "2132873",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2132873"
},
{
"category": "external",
"summary": "2134010",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2134010"
},
{
"category": "external",
"summary": "2138199",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2138199"
},
{
"category": "external",
"summary": "2138653",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2138653"
},
{
"category": "external",
"summary": "2138664",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2138664"
},
{
"category": "external",
"summary": "2139235",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2139235"
},
{
"category": "external",
"summary": "2139257",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2139257"
},
{
"category": "external",
"summary": "2139260",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2139260"
},
{
"category": "external",
"summary": "2139293",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2139293"
},
{
"category": "external",
"summary": "2139296",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2139296"
},
{
"category": "external",
"summary": "2139299",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2139299"
},
{
"category": "external",
"summary": "2139306",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2139306"
},
{
"category": "external",
"summary": "2139479",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2139479"
},
{
"category": "external",
"summary": "2139574",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2139574"
},
{
"category": "external",
"summary": "2139651",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2139651"
},
{
"category": "external",
"summary": "2139687",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2139687"
},
{
"category": "external",
"summary": "2139820",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2139820"
},
{
"category": "external",
"summary": "2140730",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2140730"
},
{
"category": "external",
"summary": "2140977",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2140977"
},
{
"category": "external",
"summary": "2140982",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2140982"
},
{
"category": "external",
"summary": "2140998",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2140998"
},
{
"category": "external",
"summary": "2142511",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2142511"
},
{
"category": "external",
"summary": "2143039",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2143039"
},
{
"category": "external",
"summary": "2143498",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2143498"
},
{
"category": "external",
"summary": "2143716",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2143716"
},
{
"category": "external",
"summary": "2144580",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2144580"
},
{
"category": "external",
"summary": "2145092",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2145092"
},
{
"category": "external",
"summary": "2145126",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2145126"
},
{
"category": "external",
"summary": "2145137",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2145137"
},
{
"category": "external",
"summary": "2145223",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2145223"
},
{
"category": "external",
"summary": "2147582",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2147582"
},
{
"category": "external",
"summary": "2148322",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2148322"
},
{
"category": "external",
"summary": "2148849",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2148849"
},
{
"category": "external",
"summary": "2148850",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2148850"
},
{
"category": "external",
"summary": "2149118",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2149118"
},
{
"category": "external",
"summary": "2149201",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2149201"
},
{
"category": "external",
"summary": "2149227",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2149227"
},
{
"category": "external",
"summary": "2149897",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2149897"
},
{
"category": "external",
"summary": "2150364",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2150364"
},
{
"category": "external",
"summary": "2150653",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2150653"
},
{
"category": "external",
"summary": "2150832",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2150832"
},
{
"category": "external",
"summary": "2151053",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2151053"
},
{
"category": "external",
"summary": "2151056",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2151056"
},
{
"category": "external",
"summary": "2151427",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2151427"
},
{
"category": "external",
"summary": "2151508",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2151508"
},
{
"category": "external",
"summary": "2151521",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2151521"
},
{
"category": "external",
"summary": "2151759",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2151759"
},
{
"category": "external",
"summary": "2151766",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2151766"
},
{
"category": "external",
"summary": "2151831",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2151831"
},
{
"category": "external",
"summary": "2152122",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2152122"
},
{
"category": "external",
"summary": "2152534",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2152534"
},
{
"category": "external",
"summary": "2152537",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2152537"
},
{
"category": "external",
"summary": "2155403",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2155403"
},
{
"category": "external",
"summary": "2155409",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2155409"
},
{
"category": "external",
"summary": "2155796",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2155796"
},
{
"category": "external",
"summary": "2156392",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2156392"
},
{
"category": "external",
"summary": "2156902",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2156902"
},
{
"category": "external",
"summary": "2158060",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2158060"
},
{
"category": "external",
"summary": "2158079",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2158079"
},
{
"category": "external",
"summary": "2158362",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2158362"
},
{
"category": "external",
"summary": "2158424",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2158424"
},
{
"category": "external",
"summary": "2158515",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2158515"
},
{
"category": "external",
"summary": "2159715",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2159715"
},
{
"category": "external",
"summary": "2159975",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2159975"
},
{
"category": "external",
"summary": "2160298",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2160298"
},
{
"category": "external",
"summary": "2161274",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2161274"
},
{
"category": "external",
"summary": "2161340",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2161340"
},
{
"category": "external",
"summary": "2162016",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2162016"
},
{
"category": "external",
"summary": "2162333",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2162333"
},
{
"category": "external",
"summary": "2163460",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2163460"
},
{
"category": "external",
"summary": "2164590",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2164590"
},
{
"category": "external",
"summary": "2164807",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2164807"
},
{
"category": "external",
"summary": "2164814",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2164814"
},
{
"category": "external",
"summary": "2164838",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2164838"
},
{
"category": "external",
"summary": "2165618",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2165618"
},
{
"category": "external",
"summary": "2165943",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2165943"
},
{
"category": "external",
"summary": "2166165",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2166165"
},
{
"category": "external",
"summary": "2166394",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2166394"
},
{
"category": "external",
"summary": "2166507",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2166507"
},
{
"category": "external",
"summary": "2166508",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2166508"
},
{
"category": "external",
"summary": "2166512",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2166512"
},
{
"category": "external",
"summary": "2167012",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2167012"
},
{
"category": "external",
"summary": "2167226",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2167226"
},
{
"category": "external",
"summary": "2167251",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2167251"
},
{
"category": "external",
"summary": "2167661",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2167661"
},
{
"category": "external",
"summary": "2167979",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2167979"
},
{
"category": "external",
"summary": "2168032",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2168032"
},
{
"category": "external",
"summary": "2168111",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2168111"
},
{
"category": "external",
"summary": "2168165",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2168165"
},
{
"category": "external",
"summary": "2168180",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2168180"
},
{
"category": "external",
"summary": "2168480",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2168480"
},
{
"category": "external",
"summary": "2168484",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2168484"
},
{
"category": "external",
"summary": "2168486",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2168486"
},
{
"category": "external",
"summary": "2168488",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2168488"
},
{
"category": "external",
"summary": "2168561",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2168561"
},
{
"category": "external",
"summary": "2168770",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2168770"
},
{
"category": "external",
"summary": "2168859",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2168859"
},
{
"category": "external",
"summary": "2168861",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2168861"
},
{
"category": "external",
"summary": "2169699",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2169699"
},
{
"category": "external",
"summary": "2169880",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2169880"
},
{
"category": "external",
"summary": "2170703",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2170703"
},
{
"category": "external",
"summary": "2170740",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2170740"
},
{
"category": "external",
"summary": "2171395",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2171395"
},
{
"category": "external",
"summary": "2172371",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2172371"
},
{
"category": "external",
"summary": "2172375",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2172375"
},
{
"category": "external",
"summary": "2172612",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2172612"
},
{
"category": "external",
"summary": "2172842",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2172842"
},
{
"category": "external",
"summary": "2172952",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2172952"
},
{
"category": "external",
"summary": "2173527",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2173527"
},
{
"category": "external",
"summary": "2173562",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2173562"
},
{
"category": "external",
"summary": "2173563",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2173563"
},
{
"category": "external",
"summary": "2173593",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2173593"
},
{
"category": "external",
"summary": "2173595",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2173595"
},
{
"category": "external",
"summary": "2174288",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2174288"
},
{
"category": "external",
"summary": "2174324",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2174324"
},
{
"category": "external",
"summary": "2174334",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2174334"
},
{
"category": "external",
"summary": "2174619",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2174619"
},
{
"category": "external",
"summary": "2174636",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2174636"
},
{
"category": "external",
"summary": "2174742",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2174742"
},
{
"category": "external",
"summary": "2175054",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2175054"
},
{
"category": "external",
"summary": "2175171",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2175171"
},
{
"category": "external",
"summary": "2175256",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2175256"
},
{
"category": "external",
"summary": "2175274",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2175274"
},
{
"category": "external",
"summary": "2175571",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2175571"
},
{
"category": "external",
"summary": "2175601",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2175601"
},
{
"category": "external",
"summary": "2175636",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2175636"
},
{
"category": "external",
"summary": "2175641",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2175641"
},
{
"category": "external",
"summary": "2175643",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2175643"
},
{
"category": "external",
"summary": "2175888",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2175888"
},
{
"category": "external",
"summary": "2175890",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2175890"
},
{
"category": "external",
"summary": "2175974",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2175974"
},
{
"category": "external",
"summary": "2175976",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2175976"
},
{
"category": "external",
"summary": "2175977",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2175977"
},
{
"category": "external",
"summary": "2175979",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2175979"
},
{
"category": "external",
"summary": "2175983",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2175983"
},
{
"category": "external",
"summary": "2175985",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2175985"
},
{
"category": "external",
"summary": "2175986",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2175986"
},
{
"category": "external",
"summary": "2175988",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2175988"
},
{
"category": "external",
"summary": "2176353",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2176353"
},
{
"category": "external",
"summary": "2176355",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2176355"
},
{
"category": "external",
"summary": "2176422",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2176422"
},
{
"category": "external",
"summary": "2176706",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2176706"
},
{
"category": "external",
"summary": "2176708",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2176708"
},
{
"category": "external",
"summary": "2176725",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2176725"
},
{
"category": "external",
"summary": "2176753",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2176753"
},
{
"category": "external",
"summary": "2176804",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2176804"
},
{
"category": "external",
"summary": "2176843",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2176843"
},
{
"category": "external",
"summary": "2177091",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2177091"
},
{
"category": "external",
"summary": "2177578",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2177578"
},
{
"category": "external",
"summary": "2177586",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2177586"
},
{
"category": "external",
"summary": "2177589",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2177589"
},
{
"category": "external",
"summary": "2177668",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2177668"
},
{
"category": "external",
"summary": "2177763",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2177763"
},
{
"category": "external",
"summary": "2177888",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2177888"
},
{
"category": "external",
"summary": "2177961",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2177961"
},
{
"category": "external",
"summary": "2177973",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2177973"
},
{
"category": "external",
"summary": "2178037",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2178037"
},
{
"category": "external",
"summary": "2178628",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2178628"
},
{
"category": "external",
"summary": "2178629",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2178629"
},
{
"category": "external",
"summary": "2179225",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2179225"
},
{
"category": "external",
"summary": "2179226",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2179226"
},
{
"category": "external",
"summary": "2179565",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2179565"
},
{
"category": "external",
"summary": "2179626",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2179626"
},
{
"category": "external",
"summary": "2179811",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2179811"
},
{
"category": "external",
"summary": "2180146",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2180146"
},
{
"category": "external",
"summary": "2180279",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2180279"
},
{
"category": "external",
"summary": "2180553",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2180553"
},
{
"category": "external",
"summary": "2180853",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2180853"
},
{
"category": "external",
"summary": "2182006",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2182006"
},
{
"category": "external",
"summary": "2182097",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2182097"
},
{
"category": "external",
"summary": "2182534",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2182534"
},
{
"category": "external",
"summary": "2182535",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2182535"
},
{
"category": "external",
"summary": "2182536",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2182536"
},
{
"category": "external",
"summary": "2182538",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2182538"
},
{
"category": "external",
"summary": "2182539",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2182539"
},
{
"category": "external",
"summary": "2182661",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2182661"
},
{
"category": "external",
"summary": "2183026",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2183026"
},
{
"category": "external",
"summary": "2183205",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2183205"
},
{
"category": "external",
"summary": "2183397",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2183397"
},
{
"category": "external",
"summary": "2183968",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2183968"
},
{
"category": "external",
"summary": "2186767",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2186767"
},
{
"category": "external",
"summary": "2187437",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2187437"
},
{
"category": "external",
"summary": "2187547",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2187547"
},
{
"category": "external",
"summary": "2187581",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2187581"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2023/rhsa-2023_3205.json"
}
],
"title": "Red Hat Security Advisory: OpenShift Virtualization 4.13.0 Images security, bug fix, and enhancement update",
"tracking": {
"current_release_date": "2025-10-24T13:32:17+00:00",
"generator": {
"date": "2025-10-24T13:32:17+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.10"
}
},
"id": "RHSA-2023:3205",
"initial_release_date": "2023-05-18T02:55:08+00:00",
"revision_history": [
{
"date": "2023-05-18T02:55:08+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2023-05-18T02:55:08+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-10-24T13:32:17+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "CNV 4.13 for RHEL 9",
"product": {
"name": "CNV 4.13 for RHEL 9",
"product_id": "9Base-CNV-4.13",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:container_native_virtualization:4.13::el9"
}
}
}
],
"category": "product_family",
"name": "OpenShift Virtualization"
},
{
"branches": [
{
"category": "product_version",
"name": "container-native-virtualization/bridge-marker-rhel9@sha256:8eac196b30a648989cdca5cb153a3bc3d34e47339acba0e4f760bd366496c99d_amd64",
"product": {
"name": "container-native-virtualization/bridge-marker-rhel9@sha256:8eac196b30a648989cdca5cb153a3bc3d34e47339acba0e4f760bd366496c99d_amd64",
"product_id": "container-native-virtualization/bridge-marker-rhel9@sha256:8eac196b30a648989cdca5cb153a3bc3d34e47339acba0e4f760bd366496c99d_amd64",
"product_identification_helper": {
"purl": "pkg:oci/bridge-marker-rhel9@sha256:8eac196b30a648989cdca5cb153a3bc3d34e47339acba0e4f760bd366496c99d?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/bridge-marker-rhel9\u0026tag=v4.13.0--2022-101182"
}
}
},
{
"category": "product_version",
"name": "container-native-virtualization/cluster-network-addons-operator-rhel9@sha256:3bff33e3f40cd1e2b519c2db56734d4bb8df883e155c2f20b1cb9d3d184daec1_amd64",
"product": {
"name": "container-native-virtualization/cluster-network-addons-operator-rhel9@sha256:3bff33e3f40cd1e2b519c2db56734d4bb8df883e155c2f20b1cb9d3d184daec1_amd64",
"product_id": "container-native-virtualization/cluster-network-addons-operator-rhel9@sha256:3bff33e3f40cd1e2b519c2db56734d4bb8df883e155c2f20b1cb9d3d184daec1_amd64",
"product_identification_helper": {
"purl": "pkg:oci/cluster-network-addons-operator-rhel9@sha256:3bff33e3f40cd1e2b519c2db56734d4bb8df883e155c2f20b1cb9d3d184daec1?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/cluster-network-addons-operator-rhel9\u0026tag=v4.13.0--2022-101182"
}
}
},
{
"category": "product_version",
"name": "container-native-virtualization/cnv-containernetworking-plugins-rhel9@sha256:bf471997e54e4a75b0d71f492ab295787fdbb14d8c85c4ea8c03f0552dbc3755_amd64",
"product": {
"name": "container-native-virtualization/cnv-containernetworking-plugins-rhel9@sha256:bf471997e54e4a75b0d71f492ab295787fdbb14d8c85c4ea8c03f0552dbc3755_amd64",
"product_id": "container-native-virtualization/cnv-containernetworking-plugins-rhel9@sha256:bf471997e54e4a75b0d71f492ab295787fdbb14d8c85c4ea8c03f0552dbc3755_amd64",
"product_identification_helper": {
"purl": "pkg:oci/cnv-containernetworking-plugins-rhel9@sha256:bf471997e54e4a75b0d71f492ab295787fdbb14d8c85c4ea8c03f0552dbc3755?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/cnv-containernetworking-plugins-rhel9\u0026tag=v4.13.0--2022-101182"
}
}
},
{
"category": "product_version",
"name": "container-native-virtualization/cnv-must-gather-rhel9@sha256:b9fc32b5fabedd65a4c3a471879c808af2087277de4278adaa115a732f0468da_amd64",
"product": {
"name": "container-native-virtualization/cnv-must-gather-rhel9@sha256:b9fc32b5fabedd65a4c3a471879c808af2087277de4278adaa115a732f0468da_amd64",
"product_id": "container-native-virtualization/cnv-must-gather-rhel9@sha256:b9fc32b5fabedd65a4c3a471879c808af2087277de4278adaa115a732f0468da_amd64",
"product_identification_helper": {
"purl": "pkg:oci/cnv-must-gather-rhel9@sha256:b9fc32b5fabedd65a4c3a471879c808af2087277de4278adaa115a732f0468da?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/cnv-must-gather-rhel9\u0026tag=v4.13.0--2022-101182"
}
}
},
{
"category": "product_version",
"name": "container-native-virtualization/hco-bundle-registry-rhel9@sha256:60e89d7a99ff9f20e974430b802dd724a3bb6fa1e01e5a62daad98ac487b3063_amd64",
"product": {
"name": "container-native-virtualization/hco-bundle-registry-rhel9@sha256:60e89d7a99ff9f20e974430b802dd724a3bb6fa1e01e5a62daad98ac487b3063_amd64",
"product_id": "container-native-virtualization/hco-bundle-registry-rhel9@sha256:60e89d7a99ff9f20e974430b802dd724a3bb6fa1e01e5a62daad98ac487b3063_amd64",
"product_identification_helper": {
"purl": "pkg:oci/hco-bundle-registry-rhel9@sha256:60e89d7a99ff9f20e974430b802dd724a3bb6fa1e01e5a62daad98ac487b3063?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/hco-bundle-registry-rhel9\u0026tag=v4.13.0.rhel9--2022-101182"
}
}
},
{
"category": "product_version",
"name": "container-native-virtualization/hostpath-csi-driver-rhel9@sha256:61e2824853d51347593ad909a5e546cd92e4216d6a1df5dffb50dd9cba277cce_amd64",
"product": {
"name": "container-native-virtualization/hostpath-csi-driver-rhel9@sha256:61e2824853d51347593ad909a5e546cd92e4216d6a1df5dffb50dd9cba277cce_amd64",
"product_id": "container-native-virtualization/hostpath-csi-driver-rhel9@sha256:61e2824853d51347593ad909a5e546cd92e4216d6a1df5dffb50dd9cba277cce_amd64",
"product_identification_helper": {
"purl": "pkg:oci/hostpath-csi-driver-rhel9@sha256:61e2824853d51347593ad909a5e546cd92e4216d6a1df5dffb50dd9cba277cce?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/hostpath-csi-driver-rhel9\u0026tag=v4.13.0--2022-101182"
}
}
},
{
"category": "product_version",
"name": "container-native-virtualization/hostpath-provisioner-operator-rhel9@sha256:515be94be496c67f5b8fd5f4832fe4385e56476e6589897d6b9fbb9bb2b00f32_amd64",
"product": {
"name": "container-native-virtualization/hostpath-provisioner-operator-rhel9@sha256:515be94be496c67f5b8fd5f4832fe4385e56476e6589897d6b9fbb9bb2b00f32_amd64",
"product_id": "container-native-virtualization/hostpath-provisioner-operator-rhel9@sha256:515be94be496c67f5b8fd5f4832fe4385e56476e6589897d6b9fbb9bb2b00f32_amd64",
"product_identification_helper": {
"purl": "pkg:oci/hostpath-provisioner-operator-rhel9@sha256:515be94be496c67f5b8fd5f4832fe4385e56476e6589897d6b9fbb9bb2b00f32?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/hostpath-provisioner-operator-rhel9\u0026tag=v4.13.0-37"
}
}
},
{
"category": "product_version",
"name": "container-native-virtualization/hostpath-provisioner-rhel9@sha256:ac3fe350bedd6bc43596444ba0f279ccf8a144ab14ac5a9b80ea71c46390b7b4_amd64",
"product": {
"name": "container-native-virtualization/hostpath-provisioner-rhel9@sha256:ac3fe350bedd6bc43596444ba0f279ccf8a144ab14ac5a9b80ea71c46390b7b4_amd64",
"product_id": "container-native-virtualization/hostpath-provisioner-rhel9@sha256:ac3fe350bedd6bc43596444ba0f279ccf8a144ab14ac5a9b80ea71c46390b7b4_amd64",
"product_identification_helper": {
"purl": "pkg:oci/hostpath-provisioner-rhel9@sha256:ac3fe350bedd6bc43596444ba0f279ccf8a144ab14ac5a9b80ea71c46390b7b4?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/hostpath-provisioner-rhel9\u0026tag=v4.13.0--2022-101182"
}
}
},
{
"category": "product_version",
"name": "container-native-virtualization/hyperconverged-cluster-operator-rhel9@sha256:e5ab9f3be59d3568e3d672ab374efb16990ccf92192eac4e1244b10fcd7423e2_amd64",
"product": {
"name": "container-native-virtualization/hyperconverged-cluster-operator-rhel9@sha256:e5ab9f3be59d3568e3d672ab374efb16990ccf92192eac4e1244b10fcd7423e2_amd64",
"product_id": "container-native-virtualization/hyperconverged-cluster-operator-rhel9@sha256:e5ab9f3be59d3568e3d672ab374efb16990ccf92192eac4e1244b10fcd7423e2_amd64",
"product_identification_helper": {
"purl": "pkg:oci/hyperconverged-cluster-operator-rhel9@sha256:e5ab9f3be59d3568e3d672ab374efb16990ccf92192eac4e1244b10fcd7423e2?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/hyperconverged-cluster-operator-rhel9\u0026tag=v4.13.0--2022-101182"
}
}
},
{
"category": "product_version",
"name": "container-native-virtualization/hyperconverged-cluster-webhook-rhel9@sha256:b5a01336180aad017df62cf8e652f2491b8263ba7e4dd07f858db1ef1924cf2f_amd64",
"product": {
"name": "container-native-virtualization/hyperconverged-cluster-webhook-rhel9@sha256:b5a01336180aad017df62cf8e652f2491b8263ba7e4dd07f858db1ef1924cf2f_amd64",
"product_id": "container-native-virtualization/hyperconverged-cluster-webhook-rhel9@sha256:b5a01336180aad017df62cf8e652f2491b8263ba7e4dd07f858db1ef1924cf2f_amd64",
"product_identification_helper": {
"purl": "pkg:oci/hyperconverged-cluster-webhook-rhel9@sha256:b5a01336180aad017df62cf8e652f2491b8263ba7e4dd07f858db1ef1924cf2f?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/hyperconverged-cluster-webhook-rhel9\u0026tag=v4.13.0--2022-101182"
}
}
},
{
"category": "product_version",
"name": "container-native-virtualization/kubemacpool-rhel9@sha256:4d190d81eeb3fbe9ed56cf3548dc83a3f81641bfdafa7b42dcfb0d2512566644_amd64",
"product": {
"name": "container-native-virtualization/kubemacpool-rhel9@sha256:4d190d81eeb3fbe9ed56cf3548dc83a3f81641bfdafa7b42dcfb0d2512566644_amd64",
"product_id": "container-native-virtualization/kubemacpool-rhel9@sha256:4d190d81eeb3fbe9ed56cf3548dc83a3f81641bfdafa7b42dcfb0d2512566644_amd64",
"product_identification_helper": {
"purl": "pkg:oci/kubemacpool-rhel9@sha256:4d190d81eeb3fbe9ed56cf3548dc83a3f81641bfdafa7b42dcfb0d2512566644?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/kubemacpool-rhel9\u0026tag=v4.13.0--2022-101182"
}
}
},
{
"category": "product_version",
"name": "container-native-virtualization/kubesecondarydns-rhel9@sha256:121d30d78cc57731ea2242ef2c32430890ac66c2723e65608d5e2f26c3f515cd_amd64",
"product": {
"name": "container-native-virtualization/kubesecondarydns-rhel9@sha256:121d30d78cc57731ea2242ef2c32430890ac66c2723e65608d5e2f26c3f515cd_amd64",
"product_id": "container-native-virtualization/kubesecondarydns-rhel9@sha256:121d30d78cc57731ea2242ef2c32430890ac66c2723e65608d5e2f26c3f515cd_amd64",
"product_identification_helper": {
"purl": "pkg:oci/kubesecondarydns-rhel9@sha256:121d30d78cc57731ea2242ef2c32430890ac66c2723e65608d5e2f26c3f515cd?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/kubesecondarydns-rhel9\u0026tag=v4.13.0--2022-101182"
}
}
},
{
"category": "product_version",
"name": "container-native-virtualization/kubevirt-console-plugin-rhel9@sha256:86a4b1e3d6ad1d56302c9c058f8bc5826dcfe6c46fb3e0ddaa06818645039020_amd64",
"product": {
"name": "container-native-virtualization/kubevirt-console-plugin-rhel9@sha256:86a4b1e3d6ad1d56302c9c058f8bc5826dcfe6c46fb3e0ddaa06818645039020_amd64",
"product_id": "container-native-virtualization/kubevirt-console-plugin-rhel9@sha256:86a4b1e3d6ad1d56302c9c058f8bc5826dcfe6c46fb3e0ddaa06818645039020_amd64",
"product_identification_helper": {
"purl": "pkg:oci/kubevirt-console-plugin-rhel9@sha256:86a4b1e3d6ad1d56302c9c058f8bc5826dcfe6c46fb3e0ddaa06818645039020?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/kubevirt-console-plugin-rhel9\u0026tag=v4.13.0--2022-101182"
}
}
},
{
"category": "product_version",
"name": "container-native-virtualization/kubevirt-dpdk-checkup-rhel9@sha256:553c4686f56c66cc1e3c5ad9d4051f139d43f821eac3abb98ca5cdb8b5dfe202_amd64",
"product": {
"name": "container-native-virtualization/kubevirt-dpdk-checkup-rhel9@sha256:553c4686f56c66cc1e3c5ad9d4051f139d43f821eac3abb98ca5cdb8b5dfe202_amd64",
"product_id": "container-native-virtualization/kubevirt-dpdk-checkup-rhel9@sha256:553c4686f56c66cc1e3c5ad9d4051f139d43f821eac3abb98ca5cdb8b5dfe202_amd64",
"product_identification_helper": {
"purl": "pkg:oci/kubevirt-dpdk-checkup-rhel9@sha256:553c4686f56c66cc1e3c5ad9d4051f139d43f821eac3abb98ca5cdb8b5dfe202?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/kubevirt-dpdk-checkup-rhel9\u0026tag=v4.13.0--2022-101182"
}
}
},
{
"category": "product_version",
"name": "container-native-virtualization/kubevirt-ssp-operator-rhel9@sha256:901e6cad9534c7bd7c4018c60bccfe49d7280fba5a9901ab4c4d15e9345288c4_amd64",
"product": {
"name": "container-native-virtualization/kubevirt-ssp-operator-rhel9@sha256:901e6cad9534c7bd7c4018c60bccfe49d7280fba5a9901ab4c4d15e9345288c4_amd64",
"product_id": "container-native-virtualization/kubevirt-ssp-operator-rhel9@sha256:901e6cad9534c7bd7c4018c60bccfe49d7280fba5a9901ab4c4d15e9345288c4_amd64",
"product_identification_helper": {
"purl": "pkg:oci/kubevirt-ssp-operator-rhel9@sha256:901e6cad9534c7bd7c4018c60bccfe49d7280fba5a9901ab4c4d15e9345288c4?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/kubevirt-ssp-operator-rhel9\u0026tag=v4.13.0--2022-101182"
}
}
},
{
"category": "product_version",
"name": "container-native-virtualization/kubevirt-tekton-tasks-cleanup-vm-rhel9@sha256:28e4975fa4dac22d9da32ed2a10aed039fd957b30140daa36bab2caa998be77a_amd64",
"product": {
"name": "container-native-virtualization/kubevirt-tekton-tasks-cleanup-vm-rhel9@sha256:28e4975fa4dac22d9da32ed2a10aed039fd957b30140daa36bab2caa998be77a_amd64",
"product_id": "container-native-virtualization/kubevirt-tekton-tasks-cleanup-vm-rhel9@sha256:28e4975fa4dac22d9da32ed2a10aed039fd957b30140daa36bab2caa998be77a_amd64",
"product_identification_helper": {
"purl": "pkg:oci/kubevirt-tekton-tasks-cleanup-vm-rhel9@sha256:28e4975fa4dac22d9da32ed2a10aed039fd957b30140daa36bab2caa998be77a?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/kubevirt-tekton-tasks-cleanup-vm-rhel9\u0026tag=v4.13.0--2022-101182"
}
}
},
{
"category": "product_version",
"name": "container-native-virtualization/kubevirt-tekton-tasks-copy-template-rhel9@sha256:f71c36442f1b61cdde7ec58d2c3c78d2039f6d6108e6c35388ef7c1650971fa1_amd64",
"product": {
"name": "container-native-virtualization/kubevirt-tekton-tasks-copy-template-rhel9@sha256:f71c36442f1b61cdde7ec58d2c3c78d2039f6d6108e6c35388ef7c1650971fa1_amd64",
"product_id": "container-native-virtualization/kubevirt-tekton-tasks-copy-template-rhel9@sha256:f71c36442f1b61cdde7ec58d2c3c78d2039f6d6108e6c35388ef7c1650971fa1_amd64",
"product_identification_helper": {
"purl": "pkg:oci/kubevirt-tekton-tasks-copy-template-rhel9@sha256:f71c36442f1b61cdde7ec58d2c3c78d2039f6d6108e6c35388ef7c1650971fa1?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/kubevirt-tekton-tasks-copy-template-rhel9\u0026tag=v4.13.0--2022-101182"
}
}
},
{
"category": "product_version",
"name": "container-native-virtualization/kubevirt-tekton-tasks-create-datavolume-rhel9@sha256:2ad49cf6e2242a9e5861929d9bcab1305a7fc4e34e708f99cff1d7253aa46167_amd64",
"product": {
"name": "container-native-virtualization/kubevirt-tekton-tasks-create-datavolume-rhel9@sha256:2ad49cf6e2242a9e5861929d9bcab1305a7fc4e34e708f99cff1d7253aa46167_amd64",
"product_id": "container-native-virtualization/kubevirt-tekton-tasks-create-datavolume-rhel9@sha256:2ad49cf6e2242a9e5861929d9bcab1305a7fc4e34e708f99cff1d7253aa46167_amd64",
"product_identification_helper": {
"purl": "pkg:oci/kubevirt-tekton-tasks-create-datavolume-rhel9@sha256:2ad49cf6e2242a9e5861929d9bcab1305a7fc4e34e708f99cff1d7253aa46167?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/kubevirt-tekton-tasks-create-datavolume-rhel9\u0026tag=v4.13.0--2022-101182"
}
}
},
{
"category": "product_version",
"name": "container-native-virtualization/kubevirt-tekton-tasks-create-vm-from-template-rhel9@sha256:1411c65bbad7302710788327f6964a4bf5bc20ef70d5e46f4a5c6e7a0e7a0161_amd64",
"product": {
"name": "container-native-virtualization/kubevirt-tekton-tasks-create-vm-from-template-rhel9@sha256:1411c65bbad7302710788327f6964a4bf5bc20ef70d5e46f4a5c6e7a0e7a0161_amd64",
"product_id": "container-native-virtualization/kubevirt-tekton-tasks-create-vm-from-template-rhel9@sha256:1411c65bbad7302710788327f6964a4bf5bc20ef70d5e46f4a5c6e7a0e7a0161_amd64",
"product_identification_helper": {
"purl": "pkg:oci/kubevirt-tekton-tasks-create-vm-from-template-rhel9@sha256:1411c65bbad7302710788327f6964a4bf5bc20ef70d5e46f4a5c6e7a0e7a0161?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/kubevirt-tekton-tasks-create-vm-from-template-rhel9\u0026tag=v4.13.0--2022-101182"
}
}
},
{
"category": "product_version",
"name": "container-native-virtualization/kubevirt-tekton-tasks-disk-virt-customize-rhel9@sha256:5c23d3f20ea9dcbe7109284d73078ecd516a070e964b844f8d80b1d92ebd55ee_amd64",
"product": {
"name": "container-native-virtualization/kubevirt-tekton-tasks-disk-virt-customize-rhel9@sha256:5c23d3f20ea9dcbe7109284d73078ecd516a070e964b844f8d80b1d92ebd55ee_amd64",
"product_id": "container-native-virtualization/kubevirt-tekton-tasks-disk-virt-customize-rhel9@sha256:5c23d3f20ea9dcbe7109284d73078ecd516a070e964b844f8d80b1d92ebd55ee_amd64",
"product_identification_helper": {
"purl": "pkg:oci/kubevirt-tekton-tasks-disk-virt-customize-rhel9@sha256:5c23d3f20ea9dcbe7109284d73078ecd516a070e964b844f8d80b1d92ebd55ee?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/kubevirt-tekton-tasks-disk-virt-customize-rhel9\u0026tag=v4.13.0--2022-101182"
}
}
},
{
"category": "product_version",
"name": "container-native-virtualization/kubevirt-tekton-tasks-disk-virt-sysprep-rhel9@sha256:aed630a597a090179e1b0e0c117e536df06b67d0f793f91936aa7388c0c5d7eb_amd64",
"product": {
"name": "container-native-virtualization/kubevirt-tekton-tasks-disk-virt-sysprep-rhel9@sha256:aed630a597a090179e1b0e0c117e536df06b67d0f793f91936aa7388c0c5d7eb_amd64",
"product_id": "container-native-virtualization/kubevirt-tekton-tasks-disk-virt-sysprep-rhel9@sha256:aed630a597a090179e1b0e0c117e536df06b67d0f793f91936aa7388c0c5d7eb_amd64",
"product_identification_helper": {
"purl": "pkg:oci/kubevirt-tekton-tasks-disk-virt-sysprep-rhel9@sha256:aed630a597a090179e1b0e0c117e536df06b67d0f793f91936aa7388c0c5d7eb?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/kubevirt-tekton-tasks-disk-virt-sysprep-rhel9\u0026tag=v4.13.0--2022-101182"
}
}
},
{
"category": "product_version",
"name": "container-native-virtualization/kubevirt-tekton-tasks-modify-vm-template-rhel9@sha256:66aea526bc10e4c0136ba86e394bbdfe4fbd7f757d6f391a561b51d2ba2f4d46_amd64",
"product": {
"name": "container-native-virtualization/kubevirt-tekton-tasks-modify-vm-template-rhel9@sha256:66aea526bc10e4c0136ba86e394bbdfe4fbd7f757d6f391a561b51d2ba2f4d46_amd64",
"product_id": "container-native-virtualization/kubevirt-tekton-tasks-modify-vm-template-rhel9@sha256:66aea526bc10e4c0136ba86e394bbdfe4fbd7f757d6f391a561b51d2ba2f4d46_amd64",
"product_identification_helper": {
"purl": "pkg:oci/kubevirt-tekton-tasks-modify-vm-template-rhel9@sha256:66aea526bc10e4c0136ba86e394bbdfe4fbd7f757d6f391a561b51d2ba2f4d46?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/kubevirt-tekton-tasks-modify-vm-template-rhel9\u0026tag=v4.13.0--2022-101182"
}
}
},
{
"category": "product_version",
"name": "container-native-virtualization/kubevirt-tekton-tasks-operator-rhel9@sha256:f1b1f5044db6bb945584f9d4f31d020597725a286ef368ed0aca2116abb31beb_amd64",
"product": {
"name": "container-native-virtualization/kubevirt-tekton-tasks-operator-rhel9@sha256:f1b1f5044db6bb945584f9d4f31d020597725a286ef368ed0aca2116abb31beb_amd64",
"product_id": "container-native-virtualization/kubevirt-tekton-tasks-operator-rhel9@sha256:f1b1f5044db6bb945584f9d4f31d020597725a286ef368ed0aca2116abb31beb_amd64",
"product_identification_helper": {
"purl": "pkg:oci/kubevirt-tekton-tasks-operator-rhel9@sha256:f1b1f5044db6bb945584f9d4f31d020597725a286ef368ed0aca2116abb31beb?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/kubevirt-tekton-tasks-operator-rhel9\u0026tag=v4.13.0--2022-101182"
}
}
},
{
"category": "product_version",
"name": "container-native-virtualization/kubevirt-tekton-tasks-wait-for-vmi-status-rhel9@sha256:39a15d03f113735df03b1a7408227eb9604d942c1f3c1992bcdc7eaf07662711_amd64",
"product": {
"name": "container-native-virtualization/kubevirt-tekton-tasks-wait-for-vmi-status-rhel9@sha256:39a15d03f113735df03b1a7408227eb9604d942c1f3c1992bcdc7eaf07662711_amd64",
"product_id": "container-native-virtualization/kubevirt-tekton-tasks-wait-for-vmi-status-rhel9@sha256:39a15d03f113735df03b1a7408227eb9604d942c1f3c1992bcdc7eaf07662711_amd64",
"product_identification_helper": {
"purl": "pkg:oci/kubevirt-tekton-tasks-wait-for-vmi-status-rhel9@sha256:39a15d03f113735df03b1a7408227eb9604d942c1f3c1992bcdc7eaf07662711?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/kubevirt-tekton-tasks-wait-for-vmi-status-rhel9\u0026tag=v4.13.0--2022-101182"
}
}
},
{
"category": "product_version",
"name": "container-native-virtualization/kubevirt-template-validator-rhel9@sha256:c0264b9271e602f85b2040ef7f207cdfa46038dc4fa6e4738bf196ef88a71cf8_amd64",
"product": {
"name": "container-native-virtualization/kubevirt-template-validator-rhel9@sha256:c0264b9271e602f85b2040ef7f207cdfa46038dc4fa6e4738bf196ef88a71cf8_amd64",
"product_id": "container-native-virtualization/kubevirt-template-validator-rhel9@sha256:c0264b9271e602f85b2040ef7f207cdfa46038dc4fa6e4738bf196ef88a71cf8_amd64",
"product_identification_helper": {
"purl": "pkg:oci/kubevirt-template-validator-rhel9@sha256:c0264b9271e602f85b2040ef7f207cdfa46038dc4fa6e4738bf196ef88a71cf8?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/kubevirt-template-validator-rhel9\u0026tag=v4.13.0--2022-101182"
}
}
},
{
"category": "product_version",
"name": "container-native-virtualization/libguestfs-tools-rhel9@sha256:29ae84575bbca24553cf649256759fd96ff286971d80bc2db129154a7df9b283_amd64",
"product": {
"name": "container-native-virtualization/libguestfs-tools-rhel9@sha256:29ae84575bbca24553cf649256759fd96ff286971d80bc2db129154a7df9b283_amd64",
"product_id": "container-native-virtualization/libguestfs-tools-rhel9@sha256:29ae84575bbca24553cf649256759fd96ff286971d80bc2db129154a7df9b283_amd64",
"product_identification_helper": {
"purl": "pkg:oci/libguestfs-tools-rhel9@sha256:29ae84575bbca24553cf649256759fd96ff286971d80bc2db129154a7df9b283?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/libguestfs-tools-rhel9\u0026tag=v4.13.0--2022-101182"
}
}
},
{
"category": "product_version",
"name": "container-native-virtualization/multus-dynamic-networks-rhel9@sha256:b7f68b6420009e21380d32d6459193aae45e93be9533debe17cb3108571b36b8_amd64",
"product": {
"name": "container-native-virtualization/multus-dynamic-networks-rhel9@sha256:b7f68b6420009e21380d32d6459193aae45e93be9533debe17cb3108571b36b8_amd64",
"product_id": "container-native-virtualization/multus-dynamic-networks-rhel9@sha256:b7f68b6420009e21380d32d6459193aae45e93be9533debe17cb3108571b36b8_amd64",
"product_identification_helper": {
"purl": "pkg:oci/multus-dynamic-networks-rhel9@sha256:b7f68b6420009e21380d32d6459193aae45e93be9533debe17cb3108571b36b8?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/multus-dynamic-networks-rhel9\u0026tag=v4.13.0-37"
}
}
},
{
"category": "product_version",
"name": "container-native-virtualization/ovs-cni-plugin-rhel9@sha256:e8e7a44edbf1713fe74de5c4b8f691cce78f4440c4a32a16ba9ad16694a55396_amd64",
"product": {
"name": "container-native-virtualization/ovs-cni-plugin-rhel9@sha256:e8e7a44edbf1713fe74de5c4b8f691cce78f4440c4a32a16ba9ad16694a55396_amd64",
"product_id": "container-native-virtualization/ovs-cni-plugin-rhel9@sha256:e8e7a44edbf1713fe74de5c4b8f691cce78f4440c4a32a16ba9ad16694a55396_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ovs-cni-plugin-rhel9@sha256:e8e7a44edbf1713fe74de5c4b8f691cce78f4440c4a32a16ba9ad16694a55396?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/ovs-cni-plugin-rhel9\u0026tag=v4.13.0--2022-101182"
}
}
},
{
"category": "product_version",
"name": "container-native-virtualization/virt-api-rhel9@sha256:fdb4ca1bb8b310d713d9c7e88f7d091f4460aa942dbeca5ebcf17281a06daffe_amd64",
"product": {
"name": "container-native-virtualization/virt-api-rhel9@sha256:fdb4ca1bb8b310d713d9c7e88f7d091f4460aa942dbeca5ebcf17281a06daffe_amd64",
"product_id": "container-native-virtualization/virt-api-rhel9@sha256:fdb4ca1bb8b310d713d9c7e88f7d091f4460aa942dbeca5ebcf17281a06daffe_amd64",
"product_identification_helper": {
"purl": "pkg:oci/virt-api-rhel9@sha256:fdb4ca1bb8b310d713d9c7e88f7d091f4460aa942dbeca5ebcf17281a06daffe?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/virt-api-rhel9\u0026tag=v4.13.0--2022-101182"
}
}
},
{
"category": "product_version",
"name": "container-native-virtualization/virt-artifacts-server-rhel9@sha256:81fc61b714baecb5a89fa6c0749c14566e0661b8e184ca602fc2e03b9cf431ee_amd64",
"product": {
"name": "container-native-virtualization/virt-artifacts-server-rhel9@sha256:81fc61b714baecb5a89fa6c0749c14566e0661b8e184ca602fc2e03b9cf431ee_amd64",
"product_id": "container-native-virtualization/virt-artifacts-server-rhel9@sha256:81fc61b714baecb5a89fa6c0749c14566e0661b8e184ca602fc2e03b9cf431ee_amd64",
"product_identification_helper": {
"purl": "pkg:oci/virt-artifacts-server-rhel9@sha256:81fc61b714baecb5a89fa6c0749c14566e0661b8e184ca602fc2e03b9cf431ee?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/virt-artifacts-server-rhel9\u0026tag=v4.13.0--2022-101182"
}
}
},
{
"category": "product_version",
"name": "container-native-virtualization/virt-cdi-apiserver-rhel9@sha256:feca273a691d09445c6cff6d36b5d590735e867656a9898ce0d89744d98e8006_amd64",
"product": {
"name": "container-native-virtualization/virt-cdi-apiserver-rhel9@sha256:feca273a691d09445c6cff6d36b5d590735e867656a9898ce0d89744d98e8006_amd64",
"product_id": "container-native-virtualization/virt-cdi-apiserver-rhel9@sha256:feca273a691d09445c6cff6d36b5d590735e867656a9898ce0d89744d98e8006_amd64",
"product_identification_helper": {
"purl": "pkg:oci/virt-cdi-apiserver-rhel9@sha256:feca273a691d09445c6cff6d36b5d590735e867656a9898ce0d89744d98e8006?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/virt-cdi-apiserver-rhel9\u0026tag=v4.13.0--2022-101182"
}
}
},
{
"category": "product_version",
"name": "container-native-virtualization/virt-cdi-cloner-rhel9@sha256:68e3b9b0291b4fb277ac430269ffce11d13b0a7688cf2ffcdb7f98759c36b4db_amd64",
"product": {
"name": "container-native-virtualization/virt-cdi-cloner-rhel9@sha256:68e3b9b0291b4fb277ac430269ffce11d13b0a7688cf2ffcdb7f98759c36b4db_amd64",
"product_id": "container-native-virtualization/virt-cdi-cloner-rhel9@sha256:68e3b9b0291b4fb277ac430269ffce11d13b0a7688cf2ffcdb7f98759c36b4db_amd64",
"product_identification_helper": {
"purl": "pkg:oci/virt-cdi-cloner-rhel9@sha256:68e3b9b0291b4fb277ac430269ffce11d13b0a7688cf2ffcdb7f98759c36b4db?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/virt-cdi-cloner-rhel9\u0026tag=v4.13.0--2022-101182"
}
}
},
{
"category": "product_version",
"name": "container-native-virtualization/virt-cdi-controller-rhel9@sha256:d9e62b2019328be258489ac852eef25f8b1233f29abac6bcea5b406329f97fed_amd64",
"product": {
"name": "container-native-virtualization/virt-cdi-controller-rhel9@sha256:d9e62b2019328be258489ac852eef25f8b1233f29abac6bcea5b406329f97fed_amd64",
"product_id": "container-native-virtualization/virt-cdi-controller-rhel9@sha256:d9e62b2019328be258489ac852eef25f8b1233f29abac6bcea5b406329f97fed_amd64",
"product_identification_helper": {
"purl": "pkg:oci/virt-cdi-controller-rhel9@sha256:d9e62b2019328be258489ac852eef25f8b1233f29abac6bcea5b406329f97fed?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/virt-cdi-controller-rhel9\u0026tag=v4.13.0--2022-101182"
}
}
},
{
"category": "product_version",
"name": "container-native-virtualization/virt-cdi-importer-rhel9@sha256:2df07fb21a3575e74aa16ded20129828f2300cd33e8ab369b0362062d49e62d0_amd64",
"product": {
"name": "container-native-virtualization/virt-cdi-importer-rhel9@sha256:2df07fb21a3575e74aa16ded20129828f2300cd33e8ab369b0362062d49e62d0_amd64",
"product_id": "container-native-virtualization/virt-cdi-importer-rhel9@sha256:2df07fb21a3575e74aa16ded20129828f2300cd33e8ab369b0362062d49e62d0_amd64",
"product_identification_helper": {
"purl": "pkg:oci/virt-cdi-importer-rhel9@sha256:2df07fb21a3575e74aa16ded20129828f2300cd33e8ab369b0362062d49e62d0?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/virt-cdi-importer-rhel9\u0026tag=v4.13.0--2022-101182"
}
}
},
{
"category": "product_version",
"name": "container-native-virtualization/virt-cdi-operator-rhel9@sha256:802ee8923d9d8e406b23911406f9748756c0ef4d6954e9e2fd5fb4bdf91dde9a_amd64",
"product": {
"name": "container-native-virtualization/virt-cdi-operator-rhel9@sha256:802ee8923d9d8e406b23911406f9748756c0ef4d6954e9e2fd5fb4bdf91dde9a_amd64",
"product_id": "container-native-virtualization/virt-cdi-operator-rhel9@sha256:802ee8923d9d8e406b23911406f9748756c0ef4d6954e9e2fd5fb4bdf91dde9a_amd64",
"product_identification_helper": {
"purl": "pkg:oci/virt-cdi-operator-rhel9@sha256:802ee8923d9d8e406b23911406f9748756c0ef4d6954e9e2fd5fb4bdf91dde9a?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/virt-cdi-operator-rhel9\u0026tag=v4.13.0--2022-101182"
}
}
},
{
"category": "product_version",
"name": "container-native-virtualization/virt-cdi-uploadproxy-rhel9@sha256:6775f34353eec8f35bead9411dde155530d079bb8d51582fb1f2aacc27dbde1d_amd64",
"product": {
"name": "container-native-virtualization/virt-cdi-uploadproxy-rhel9@sha256:6775f34353eec8f35bead9411dde155530d079bb8d51582fb1f2aacc27dbde1d_amd64",
"product_id": "container-native-virtualization/virt-cdi-uploadproxy-rhel9@sha256:6775f34353eec8f35bead9411dde155530d079bb8d51582fb1f2aacc27dbde1d_amd64",
"product_identification_helper": {
"purl": "pkg:oci/virt-cdi-uploadproxy-rhel9@sha256:6775f34353eec8f35bead9411dde155530d079bb8d51582fb1f2aacc27dbde1d?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/virt-cdi-uploadproxy-rhel9\u0026tag=v4.13.0--2022-101182"
}
}
},
{
"category": "product_version",
"name": "container-native-virtualization/virt-cdi-uploadserver-rhel9@sha256:b22048390387380af94e267c8a9a66813c515997456d59d8ebac1486916b6585_amd64",
"product": {
"name": "container-native-virtualization/virt-cdi-uploadserver-rhel9@sha256:b22048390387380af94e267c8a9a66813c515997456d59d8ebac1486916b6585_amd64",
"product_id": "container-native-virtualization/virt-cdi-uploadserver-rhel9@sha256:b22048390387380af94e267c8a9a66813c515997456d59d8ebac1486916b6585_amd64",
"product_identification_helper": {
"purl": "pkg:oci/virt-cdi-uploadserver-rhel9@sha256:b22048390387380af94e267c8a9a66813c515997456d59d8ebac1486916b6585?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/virt-cdi-uploadserver-rhel9\u0026tag=v4.13.0--2022-101182"
}
}
},
{
"category": "product_version",
"name": "container-native-virtualization/virt-controller-rhel9@sha256:3e7880149ee9a68286e390beb3d9779f7403c30fc5136e5370e0e4690a3fd243_amd64",
"product": {
"name": "container-native-virtualization/virt-controller-rhel9@sha256:3e7880149ee9a68286e390beb3d9779f7403c30fc5136e5370e0e4690a3fd243_amd64",
"product_id": "container-native-virtualization/virt-controller-rhel9@sha256:3e7880149ee9a68286e390beb3d9779f7403c30fc5136e5370e0e4690a3fd243_amd64",
"product_identification_helper": {
"purl": "pkg:oci/virt-controller-rhel9@sha256:3e7880149ee9a68286e390beb3d9779f7403c30fc5136e5370e0e4690a3fd243?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/virt-controller-rhel9\u0026tag=v4.13.0--2022-101182"
}
}
},
{
"category": "product_version",
"name": "container-native-virtualization/virt-exportproxy-rhel9@sha256:1bda34d5bff734ad997202f29a5ff6f7362fd79fa90511a422442ef2e3681198_amd64",
"product": {
"name": "container-native-virtualization/virt-exportproxy-rhel9@sha256:1bda34d5bff734ad997202f29a5ff6f7362fd79fa90511a422442ef2e3681198_amd64",
"product_id": "container-native-virtualization/virt-exportproxy-rhel9@sha256:1bda34d5bff734ad997202f29a5ff6f7362fd79fa90511a422442ef2e3681198_amd64",
"product_identification_helper": {
"purl": "pkg:oci/virt-exportproxy-rhel9@sha256:1bda34d5bff734ad997202f29a5ff6f7362fd79fa90511a422442ef2e3681198?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/virt-exportproxy-rhel9\u0026tag=v4.13.0--2022-101182"
}
}
},
{
"category": "product_version",
"name": "container-native-virtualization/virt-exportserver-rhel9@sha256:8f12955cd777eb2409037a6968aa92f50c99d6e07e722951dbcfd0c8c9829b5e_amd64",
"product": {
"name": "container-native-virtualization/virt-exportserver-rhel9@sha256:8f12955cd777eb2409037a6968aa92f50c99d6e07e722951dbcfd0c8c9829b5e_amd64",
"product_id": "container-native-virtualization/virt-exportserver-rhel9@sha256:8f12955cd777eb2409037a6968aa92f50c99d6e07e722951dbcfd0c8c9829b5e_amd64",
"product_identification_helper": {
"purl": "pkg:oci/virt-exportserver-rhel9@sha256:8f12955cd777eb2409037a6968aa92f50c99d6e07e722951dbcfd0c8c9829b5e?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/virt-exportserver-rhel9\u0026tag=v4.13.0--2022-101182"
}
}
},
{
"category": "product_version",
"name": "container-native-virtualization/virt-handler-rhel9@sha256:84ba79ae9658699147d2493df2582ab6df10adbff4d44a533c3fe6a9f45f9691_amd64",
"product": {
"name": "container-native-virtualization/virt-handler-rhel9@sha256:84ba79ae9658699147d2493df2582ab6df10adbff4d44a533c3fe6a9f45f9691_amd64",
"product_id": "container-native-virtualization/virt-handler-rhel9@sha256:84ba79ae9658699147d2493df2582ab6df10adbff4d44a533c3fe6a9f45f9691_amd64",
"product_identification_helper": {
"purl": "pkg:oci/virt-handler-rhel9@sha256:84ba79ae9658699147d2493df2582ab6df10adbff4d44a533c3fe6a9f45f9691?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/virt-handler-rhel9\u0026tag=v4.13.0--2022-101182"
}
}
},
{
"category": "product_version",
"name": "container-native-virtualization/virtio-win-rhel9@sha256:d147d2a6eb6f907d1e88f61aaca83596853bc72164583d6dda2b1154b490de25_amd64",
"product": {
"name": "container-native-virtualization/virtio-win-rhel9@sha256:d147d2a6eb6f907d1e88f61aaca83596853bc72164583d6dda2b1154b490de25_amd64",
"product_id": "container-native-virtualization/virtio-win-rhel9@sha256:d147d2a6eb6f907d1e88f61aaca83596853bc72164583d6dda2b1154b490de25_amd64",
"product_identification_helper": {
"purl": "pkg:oci/virtio-win-rhel9@sha256:d147d2a6eb6f907d1e88f61aaca83596853bc72164583d6dda2b1154b490de25?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/virtio-win-rhel9\u0026tag=v4.13.0--2022-101182"
}
}
},
{
"category": "product_version",
"name": "container-native-virtualization/virt-launcher-rhel9@sha256:4990d40d9987d5126d105dd45be2501eaded248cb61bdde5ea8d359bc1e7ebef_amd64",
"product": {
"name": "container-native-virtualization/virt-launcher-rhel9@sha256:4990d40d9987d5126d105dd45be2501eaded248cb61bdde5ea8d359bc1e7ebef_amd64",
"product_id": "container-native-virtualization/virt-launcher-rhel9@sha256:4990d40d9987d5126d105dd45be2501eaded248cb61bdde5ea8d359bc1e7ebef_amd64",
"product_identification_helper": {
"purl": "pkg:oci/virt-launcher-rhel9@sha256:4990d40d9987d5126d105dd45be2501eaded248cb61bdde5ea8d359bc1e7ebef?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/virt-launcher-rhel9\u0026tag=v4.13.0--2022-101182"
}
}
},
{
"category": "product_version",
"name": "container-native-virtualization/virt-operator-rhel9@sha256:5c1a7e4ed2061938987b900a2394f07121d4037350c9bb6485213a2adfea787d_amd64",
"product": {
"name": "container-native-virtualization/virt-operator-rhel9@sha256:5c1a7e4ed2061938987b900a2394f07121d4037350c9bb6485213a2adfea787d_amd64",
"product_id": "container-native-virtualization/virt-operator-rhel9@sha256:5c1a7e4ed2061938987b900a2394f07121d4037350c9bb6485213a2adfea787d_amd64",
"product_identification_helper": {
"purl": "pkg:oci/virt-operator-rhel9@sha256:5c1a7e4ed2061938987b900a2394f07121d4037350c9bb6485213a2adfea787d?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/virt-operator-rhel9\u0026tag=v4.13.0--2022-101182"
}
}
},
{
"category": "product_version",
"name": "container-native-virtualization/vm-console-proxy-rhel9@sha256:7ca921f98f6d81a126907127a611146fb53397869a628678faa1e289c01d22b2_amd64",
"product": {
"name": "container-native-virtualization/vm-console-proxy-rhel9@sha256:7ca921f98f6d81a126907127a611146fb53397869a628678faa1e289c01d22b2_amd64",
"product_id": "container-native-virtualization/vm-console-proxy-rhel9@sha256:7ca921f98f6d81a126907127a611146fb53397869a628678faa1e289c01d22b2_amd64",
"product_identification_helper": {
"purl": "pkg:oci/vm-console-proxy-rhel9@sha256:7ca921f98f6d81a126907127a611146fb53397869a628678faa1e289c01d22b2?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/vm-console-proxy-rhel9\u0026tag=v4.13.0--2022-101182"
}
}
},
{
"category": "product_version",
"name": "container-native-virtualization/vm-network-latency-checkup-rhel9@sha256:59fd965975bccf641a0fa7aa01374d45057bd03cda7528248a84b60b1205bf57_amd64",
"product": {
"name": "container-native-virtualization/vm-network-latency-checkup-rhel9@sha256:59fd965975bccf641a0fa7aa01374d45057bd03cda7528248a84b60b1205bf57_amd64",
"product_id": "container-native-virtualization/vm-network-latency-checkup-rhel9@sha256:59fd965975bccf641a0fa7aa01374d45057bd03cda7528248a84b60b1205bf57_amd64",
"product_identification_helper": {
"purl": "pkg:oci/vm-network-latency-checkup-rhel9@sha256:59fd965975bccf641a0fa7aa01374d45057bd03cda7528248a84b60b1205bf57?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/vm-network-latency-checkup-rhel9\u0026tag=v4.13.0--2022-101182"
}
}
}
],
"category": "architecture",
"name": "amd64"
},
{
"branches": [
{
"category": "product_version",
"name": "container-native-virtualization/bridge-marker-rhel9@sha256:e8a55aee3d75a316bb0d7a554c737198823df04b3c05e481c17e45eb2153bced_arm64",
"product": {
"name": "container-native-virtualization/bridge-marker-rhel9@sha256:e8a55aee3d75a316bb0d7a554c737198823df04b3c05e481c17e45eb2153bced_arm64",
"product_id": "container-native-virtualization/bridge-marker-rhel9@sha256:e8a55aee3d75a316bb0d7a554c737198823df04b3c05e481c17e45eb2153bced_arm64",
"product_identification_helper": {
"purl": "pkg:oci/bridge-marker-rhel9@sha256:e8a55aee3d75a316bb0d7a554c737198823df04b3c05e481c17e45eb2153bced?arch=arm64\u0026repository_url=registry.redhat.io/container-native-virtualization/bridge-marker-rhel9\u0026tag=v4.13.0--2022-101182"
}
}
},
{
"category": "product_version",
"name": "container-native-virtualization/cluster-network-addons-operator-rhel9@sha256:f439d2f420bb59eb1d5af14ce2002648d0cfc155d1a1466c8aac9b661fe902b8_arm64",
"product": {
"name": "container-native-virtualization/cluster-network-addons-operator-rhel9@sha256:f439d2f420bb59eb1d5af14ce2002648d0cfc155d1a1466c8aac9b661fe902b8_arm64",
"product_id": "container-native-virtualization/cluster-network-addons-operator-rhel9@sha256:f439d2f420bb59eb1d5af14ce2002648d0cfc155d1a1466c8aac9b661fe902b8_arm64",
"product_identification_helper": {
"purl": "pkg:oci/cluster-network-addons-operator-rhel9@sha256:f439d2f420bb59eb1d5af14ce2002648d0cfc155d1a1466c8aac9b661fe902b8?arch=arm64\u0026repository_url=registry.redhat.io/container-native-virtualization/cluster-network-addons-operator-rhel9\u0026tag=v4.13.0--2022-101182"
}
}
},
{
"category": "product_version",
"name": "container-native-virtualization/cnv-containernetworking-plugins-rhel9@sha256:89f22e541f61a660c9aa9f38ef58e80b84a0517f74e84292107fc252c25465c9_arm64",
"product": {
"name": "container-native-virtualization/cnv-containernetworking-plugins-rhel9@sha256:89f22e541f61a660c9aa9f38ef58e80b84a0517f74e84292107fc252c25465c9_arm64",
"product_id": "container-native-virtualization/cnv-containernetworking-plugins-rhel9@sha256:89f22e541f61a660c9aa9f38ef58e80b84a0517f74e84292107fc252c25465c9_arm64",
"product_identification_helper": {
"purl": "pkg:oci/cnv-containernetworking-plugins-rhel9@sha256:89f22e541f61a660c9aa9f38ef58e80b84a0517f74e84292107fc252c25465c9?arch=arm64\u0026repository_url=registry.redhat.io/container-native-virtualization/cnv-containernetworking-plugins-rhel9\u0026tag=v4.13.0--2022-101182"
}
}
},
{
"category": "product_version",
"name": "container-native-virtualization/cnv-must-gather-rhel9@sha256:9e8efd76924958eb605401abdac08eba97fb83a1ada383bc87a7fb7c87b3a455_arm64",
"product": {
"name": "container-native-virtualization/cnv-must-gather-rhel9@sha256:9e8efd76924958eb605401abdac08eba97fb83a1ada383bc87a7fb7c87b3a455_arm64",
"product_id": "container-native-virtualization/cnv-must-gather-rhel9@sha256:9e8efd76924958eb605401abdac08eba97fb83a1ada383bc87a7fb7c87b3a455_arm64",
"product_identification_helper": {
"purl": "pkg:oci/cnv-must-gather-rhel9@sha256:9e8efd76924958eb605401abdac08eba97fb83a1ada383bc87a7fb7c87b3a455?arch=arm64\u0026repository_url=registry.redhat.io/container-native-virtualization/cnv-must-gather-rhel9\u0026tag=v4.13.0--2022-101182"
}
}
},
{
"category": "product_version",
"name": "container-native-virtualization/hco-bundle-registry-rhel9@sha256:dd20b138045ef1424d83a47e7abcfcbb2ac54577dcec5ed3c186390aaa4c9d84_arm64",
"product": {
"name": "container-native-virtualization/hco-bundle-registry-rhel9@sha256:dd20b138045ef1424d83a47e7abcfcbb2ac54577dcec5ed3c186390aaa4c9d84_arm64",
"product_id": "container-native-virtualization/hco-bundle-registry-rhel9@sha256:dd20b138045ef1424d83a47e7abcfcbb2ac54577dcec5ed3c186390aaa4c9d84_arm64",
"product_identification_helper": {
"purl": "pkg:oci/hco-bundle-registry-rhel9@sha256:dd20b138045ef1424d83a47e7abcfcbb2ac54577dcec5ed3c186390aaa4c9d84?arch=arm64\u0026repository_url=registry.redhat.io/container-native-virtualization/hco-bundle-registry-rhel9\u0026tag=v4.13.0.rhel9--2022-101182"
}
}
},
{
"category": "product_version",
"name": "container-native-virtualization/hostpath-csi-driver-rhel9@sha256:676d4c23a5f60dd331728af056b0a6b2d3358ac88da23299b1a98dfaca8f288e_arm64",
"product": {
"name": "container-native-virtualization/hostpath-csi-driver-rhel9@sha256:676d4c23a5f60dd331728af056b0a6b2d3358ac88da23299b1a98dfaca8f288e_arm64",
"product_id": "container-native-virtualization/hostpath-csi-driver-rhel9@sha256:676d4c23a5f60dd331728af056b0a6b2d3358ac88da23299b1a98dfaca8f288e_arm64",
"product_identification_helper": {
"purl": "pkg:oci/hostpath-csi-driver-rhel9@sha256:676d4c23a5f60dd331728af056b0a6b2d3358ac88da23299b1a98dfaca8f288e?arch=arm64\u0026repository_url=registry.redhat.io/container-native-virtualization/hostpath-csi-driver-rhel9\u0026tag=v4.13.0--2022-101182"
}
}
},
{
"category": "product_version",
"name": "container-native-virtualization/hostpath-provisioner-operator-rhel9@sha256:571ae805641dea11646028c946039983c7fd82f138b915dcb8b80c39b465e63c_arm64",
"product": {
"name": "container-native-virtualization/hostpath-provisioner-operator-rhel9@sha256:571ae805641dea11646028c946039983c7fd82f138b915dcb8b80c39b465e63c_arm64",
"product_id": "container-native-virtualization/hostpath-provisioner-operator-rhel9@sha256:571ae805641dea11646028c946039983c7fd82f138b915dcb8b80c39b465e63c_arm64",
"product_identification_helper": {
"purl": "pkg:oci/hostpath-provisioner-operator-rhel9@sha256:571ae805641dea11646028c946039983c7fd82f138b915dcb8b80c39b465e63c?arch=arm64\u0026repository_url=registry.redhat.io/container-native-virtualization/hostpath-provisioner-operator-rhel9\u0026tag=v4.13.0-37"
}
}
},
{
"category": "product_version",
"name": "container-native-virtualization/hostpath-provisioner-rhel9@sha256:d4ed87745b7ee2acca2d83e2c91c2f6dced1903c81495b50f2559b3ba2dde287_arm64",
"product": {
"name": "container-native-virtualization/hostpath-provisioner-rhel9@sha256:d4ed87745b7ee2acca2d83e2c91c2f6dced1903c81495b50f2559b3ba2dde287_arm64",
"product_id": "container-native-virtualization/hostpath-provisioner-rhel9@sha256:d4ed87745b7ee2acca2d83e2c91c2f6dced1903c81495b50f2559b3ba2dde287_arm64",
"product_identification_helper": {
"purl": "pkg:oci/hostpath-provisioner-rhel9@sha256:d4ed87745b7ee2acca2d83e2c91c2f6dced1903c81495b50f2559b3ba2dde287?arch=arm64\u0026repository_url=registry.redhat.io/container-native-virtualization/hostpath-provisioner-rhel9\u0026tag=v4.13.0--2022-101182"
}
}
},
{
"category": "product_version",
"name": "container-native-virtualization/hyperconverged-cluster-operator-rhel9@sha256:e681560b184189df03fc84c8a712f32289f42573dd348cda394b19565eb6eca8_arm64",
"product": {
"name": "container-native-virtualization/hyperconverged-cluster-operator-rhel9@sha256:e681560b184189df03fc84c8a712f32289f42573dd348cda394b19565eb6eca8_arm64",
"product_id": "container-native-virtualization/hyperconverged-cluster-operator-rhel9@sha256:e681560b184189df03fc84c8a712f32289f42573dd348cda394b19565eb6eca8_arm64",
"product_identification_helper": {
"purl": "pkg:oci/hyperconverged-cluster-operator-rhel9@sha256:e681560b184189df03fc84c8a712f32289f42573dd348cda394b19565eb6eca8?arch=arm64\u0026repository_url=registry.redhat.io/container-native-virtualization/hyperconverged-cluster-operator-rhel9\u0026tag=v4.13.0--2022-101182"
}
}
},
{
"category": "product_version",
"name": "container-native-virtualization/hyperconverged-cluster-webhook-rhel9@sha256:06d036d320b3027bb8370bb8e0f6fe8c9f0ec9bca7aac3b5c53698ba4a170042_arm64",
"product": {
"name": "container-native-virtualization/hyperconverged-cluster-webhook-rhel9@sha256:06d036d320b3027bb8370bb8e0f6fe8c9f0ec9bca7aac3b5c53698ba4a170042_arm64",
"product_id": "container-native-virtualization/hyperconverged-cluster-webhook-rhel9@sha256:06d036d320b3027bb8370bb8e0f6fe8c9f0ec9bca7aac3b5c53698ba4a170042_arm64",
"product_identification_helper": {
"purl": "pkg:oci/hyperconverged-cluster-webhook-rhel9@sha256:06d036d320b3027bb8370bb8e0f6fe8c9f0ec9bca7aac3b5c53698ba4a170042?arch=arm64\u0026repository_url=registry.redhat.io/container-native-virtualization/hyperconverged-cluster-webhook-rhel9\u0026tag=v4.13.0--2022-101182"
}
}
},
{
"category": "product_version",
"name": "container-native-virtualization/kubemacpool-rhel9@sha256:59862a59854f0d5b83dc25ba119f9586a8aff42b6e60d1922f8ae7b4567309ff_arm64",
"product": {
"name": "container-native-virtualization/kubemacpool-rhel9@sha256:59862a59854f0d5b83dc25ba119f9586a8aff42b6e60d1922f8ae7b4567309ff_arm64",
"product_id": "container-native-virtualization/kubemacpool-rhel9@sha256:59862a59854f0d5b83dc25ba119f9586a8aff42b6e60d1922f8ae7b4567309ff_arm64",
"product_identification_helper": {
"purl": "pkg:oci/kubemacpool-rhel9@sha256:59862a59854f0d5b83dc25ba119f9586a8aff42b6e60d1922f8ae7b4567309ff?arch=arm64\u0026repository_url=registry.redhat.io/container-native-virtualization/kubemacpool-rhel9\u0026tag=v4.13.0--2022-101182"
}
}
},
{
"category": "product_version",
"name": "container-native-virtualization/kubesecondarydns-rhel9@sha256:b1838f3c8ba3d8113bddea17b78c21e1c1490e2a4a07ea77014edee523d06347_arm64",
"product": {
"name": "container-native-virtualization/kubesecondarydns-rhel9@sha256:b1838f3c8ba3d8113bddea17b78c21e1c1490e2a4a07ea77014edee523d06347_arm64",
"product_id": "container-native-virtualization/kubesecondarydns-rhel9@sha256:b1838f3c8ba3d8113bddea17b78c21e1c1490e2a4a07ea77014edee523d06347_arm64",
"product_identification_helper": {
"purl": "pkg:oci/kubesecondarydns-rhel9@sha256:b1838f3c8ba3d8113bddea17b78c21e1c1490e2a4a07ea77014edee523d06347?arch=arm64\u0026repository_url=registry.redhat.io/container-native-virtualization/kubesecondarydns-rhel9\u0026tag=v4.13.0--2022-101182"
}
}
},
{
"category": "product_version",
"name": "container-native-virtualization/kubevirt-console-plugin-rhel9@sha256:ffb2acd9ae09c1ef9ca756f5eaf6087d0a3957cfc824543949d25f556a97744d_arm64",
"product": {
"name": "container-native-virtualization/kubevirt-console-plugin-rhel9@sha256:ffb2acd9ae09c1ef9ca756f5eaf6087d0a3957cfc824543949d25f556a97744d_arm64",
"product_id": "container-native-virtualization/kubevirt-console-plugin-rhel9@sha256:ffb2acd9ae09c1ef9ca756f5eaf6087d0a3957cfc824543949d25f556a97744d_arm64",
"product_identification_helper": {
"purl": "pkg:oci/kubevirt-console-plugin-rhel9@sha256:ffb2acd9ae09c1ef9ca756f5eaf6087d0a3957cfc824543949d25f556a97744d?arch=arm64\u0026repository_url=registry.redhat.io/container-native-virtualization/kubevirt-console-plugin-rhel9\u0026tag=v4.13.0--2022-101182"
}
}
},
{
"category": "product_version",
"name": "container-native-virtualization/kubevirt-dpdk-checkup-rhel9@sha256:525aceb9396010ebcdba14040f267889b807cd84db8e5b4030429b51f0fbf5fe_arm64",
"product": {
"name": "container-native-virtualization/kubevirt-dpdk-checkup-rhel9@sha256:525aceb9396010ebcdba14040f267889b807cd84db8e5b4030429b51f0fbf5fe_arm64",
"product_id": "container-native-virtualization/kubevirt-dpdk-checkup-rhel9@sha256:525aceb9396010ebcdba14040f267889b807cd84db8e5b4030429b51f0fbf5fe_arm64",
"product_identification_helper": {
"purl": "pkg:oci/kubevirt-dpdk-checkup-rhel9@sha256:525aceb9396010ebcdba14040f267889b807cd84db8e5b4030429b51f0fbf5fe?arch=arm64\u0026repository_url=registry.redhat.io/container-native-virtualization/kubevirt-dpdk-checkup-rhel9\u0026tag=v4.13.0--2022-101182"
}
}
},
{
"category": "product_version",
"name": "container-native-virtualization/kubevirt-ssp-operator-rhel9@sha256:badeb0f65f543b209f6af761729d9778b7b73b97d55044016dfba3f38a1f6f18_arm64",
"product": {
"name": "container-native-virtualization/kubevirt-ssp-operator-rhel9@sha256:badeb0f65f543b209f6af761729d9778b7b73b97d55044016dfba3f38a1f6f18_arm64",
"product_id": "container-native-virtualization/kubevirt-ssp-operator-rhel9@sha256:badeb0f65f543b209f6af761729d9778b7b73b97d55044016dfba3f38a1f6f18_arm64",
"product_identification_helper": {
"purl": "pkg:oci/kubevirt-ssp-operator-rhel9@sha256:badeb0f65f543b209f6af761729d9778b7b73b97d55044016dfba3f38a1f6f18?arch=arm64\u0026repository_url=registry.redhat.io/container-native-virtualization/kubevirt-ssp-operator-rhel9\u0026tag=v4.13.0--2022-101182"
}
}
},
{
"category": "product_version",
"name": "container-native-virtualization/kubevirt-tekton-tasks-cleanup-vm-rhel9@sha256:b0ff7e812a576ea848590655fc13a85832d5a39f68e7769ceab9da6949da88c7_arm64",
"product": {
"name": "container-native-virtualization/kubevirt-tekton-tasks-cleanup-vm-rhel9@sha256:b0ff7e812a576ea848590655fc13a85832d5a39f68e7769ceab9da6949da88c7_arm64",
"product_id": "container-native-virtualization/kubevirt-tekton-tasks-cleanup-vm-rhel9@sha256:b0ff7e812a576ea848590655fc13a85832d5a39f68e7769ceab9da6949da88c7_arm64",
"product_identification_helper": {
"purl": "pkg:oci/kubevirt-tekton-tasks-cleanup-vm-rhel9@sha256:b0ff7e812a576ea848590655fc13a85832d5a39f68e7769ceab9da6949da88c7?arch=arm64\u0026repository_url=registry.redhat.io/container-native-virtualization/kubevirt-tekton-tasks-cleanup-vm-rhel9\u0026tag=v4.13.0--2022-101182"
}
}
},
{
"category": "product_version",
"name": "container-native-virtualization/kubevirt-tekton-tasks-copy-template-rhel9@sha256:4916a6c6b1f9b529187d3b4d5fc99b90157993767b3fe2ad36a9ec77fbb46b10_arm64",
"product": {
"name": "container-native-virtualization/kubevirt-tekton-tasks-copy-template-rhel9@sha256:4916a6c6b1f9b529187d3b4d5fc99b90157993767b3fe2ad36a9ec77fbb46b10_arm64",
"product_id": "container-native-virtualization/kubevirt-tekton-tasks-copy-template-rhel9@sha256:4916a6c6b1f9b529187d3b4d5fc99b90157993767b3fe2ad36a9ec77fbb46b10_arm64",
"product_identification_helper": {
"purl": "pkg:oci/kubevirt-tekton-tasks-copy-template-rhel9@sha256:4916a6c6b1f9b529187d3b4d5fc99b90157993767b3fe2ad36a9ec77fbb46b10?arch=arm64\u0026repository_url=registry.redhat.io/container-native-virtualization/kubevirt-tekton-tasks-copy-template-rhel9\u0026tag=v4.13.0--2022-101182"
}
}
},
{
"category": "product_version",
"name": "container-native-virtualization/kubevirt-tekton-tasks-create-datavolume-rhel9@sha256:7112400a4ecb23ee2110bf96372fcf9f96ad648a51aa944627b40eb59539a660_arm64",
"product": {
"name": "container-native-virtualization/kubevirt-tekton-tasks-create-datavolume-rhel9@sha256:7112400a4ecb23ee2110bf96372fcf9f96ad648a51aa944627b40eb59539a660_arm64",
"product_id": "container-native-virtualization/kubevirt-tekton-tasks-create-datavolume-rhel9@sha256:7112400a4ecb23ee2110bf96372fcf9f96ad648a51aa944627b40eb59539a660_arm64",
"product_identification_helper": {
"purl": "pkg:oci/kubevirt-tekton-tasks-create-datavolume-rhel9@sha256:7112400a4ecb23ee2110bf96372fcf9f96ad648a51aa944627b40eb59539a660?arch=arm64\u0026repository_url=registry.redhat.io/container-native-virtualization/kubevirt-tekton-tasks-create-datavolume-rhel9\u0026tag=v4.13.0--2022-101182"
}
}
},
{
"category": "product_version",
"name": "container-native-virtualization/kubevirt-tekton-tasks-create-vm-from-template-rhel9@sha256:4d962618aa95600c60c9fc8b890186e510de91177d51949e12797a3558e31328_arm64",
"product": {
"name": "container-native-virtualization/kubevirt-tekton-tasks-create-vm-from-template-rhel9@sha256:4d962618aa95600c60c9fc8b890186e510de91177d51949e12797a3558e31328_arm64",
"product_id": "container-native-virtualization/kubevirt-tekton-tasks-create-vm-from-template-rhel9@sha256:4d962618aa95600c60c9fc8b890186e510de91177d51949e12797a3558e31328_arm64",
"product_identification_helper": {
"purl": "pkg:oci/kubevirt-tekton-tasks-create-vm-from-template-rhel9@sha256:4d962618aa95600c60c9fc8b890186e510de91177d51949e12797a3558e31328?arch=arm64\u0026repository_url=registry.redhat.io/container-native-virtualization/kubevirt-tekton-tasks-create-vm-from-template-rhel9\u0026tag=v4.13.0--2022-101182"
}
}
},
{
"category": "product_version",
"name": "container-native-virtualization/kubevirt-tekton-tasks-disk-virt-customize-rhel9@sha256:a780244e48c6d4f87446d3754c3eb9ab79c0d54675c189da4a659f7a4d5668ea_arm64",
"product": {
"name": "container-native-virtualization/kubevirt-tekton-tasks-disk-virt-customize-rhel9@sha256:a780244e48c6d4f87446d3754c3eb9ab79c0d54675c189da4a659f7a4d5668ea_arm64",
"product_id": "container-native-virtualization/kubevirt-tekton-tasks-disk-virt-customize-rhel9@sha256:a780244e48c6d4f87446d3754c3eb9ab79c0d54675c189da4a659f7a4d5668ea_arm64",
"product_identification_helper": {
"purl": "pkg:oci/kubevirt-tekton-tasks-disk-virt-customize-rhel9@sha256:a780244e48c6d4f87446d3754c3eb9ab79c0d54675c189da4a659f7a4d5668ea?arch=arm64\u0026repository_url=registry.redhat.io/container-native-virtualization/kubevirt-tekton-tasks-disk-virt-customize-rhel9\u0026tag=v4.13.0--2022-101182"
}
}
},
{
"category": "product_version",
"name": "container-native-virtualization/kubevirt-tekton-tasks-disk-virt-sysprep-rhel9@sha256:84577d949a1bbcaa291c70729127bca4a8994df03068666baa23840877ea8392_arm64",
"product": {
"name": "container-native-virtualization/kubevirt-tekton-tasks-disk-virt-sysprep-rhel9@sha256:84577d949a1bbcaa291c70729127bca4a8994df03068666baa23840877ea8392_arm64",
"product_id": "container-native-virtualization/kubevirt-tekton-tasks-disk-virt-sysprep-rhel9@sha256:84577d949a1bbcaa291c70729127bca4a8994df03068666baa23840877ea8392_arm64",
"product_identification_helper": {
"purl": "pkg:oci/kubevirt-tekton-tasks-disk-virt-sysprep-rhel9@sha256:84577d949a1bbcaa291c70729127bca4a8994df03068666baa23840877ea8392?arch=arm64\u0026repository_url=registry.redhat.io/container-native-virtualization/kubevirt-tekton-tasks-disk-virt-sysprep-rhel9\u0026tag=v4.13.0--2022-101182"
}
}
},
{
"category": "product_version",
"name": "container-native-virtualization/kubevirt-tekton-tasks-modify-vm-template-rhel9@sha256:31d959b80cf57462e1705684bb7e1b78af26bd2c62f1c9e4e51e1d02199b05a8_arm64",
"product": {
"name": "container-native-virtualization/kubevirt-tekton-tasks-modify-vm-template-rhel9@sha256:31d959b80cf57462e1705684bb7e1b78af26bd2c62f1c9e4e51e1d02199b05a8_arm64",
"product_id": "container-native-virtualization/kubevirt-tekton-tasks-modify-vm-template-rhel9@sha256:31d959b80cf57462e1705684bb7e1b78af26bd2c62f1c9e4e51e1d02199b05a8_arm64",
"product_identification_helper": {
"purl": "pkg:oci/kubevirt-tekton-tasks-modify-vm-template-rhel9@sha256:31d959b80cf57462e1705684bb7e1b78af26bd2c62f1c9e4e51e1d02199b05a8?arch=arm64\u0026repository_url=registry.redhat.io/container-native-virtualization/kubevirt-tekton-tasks-modify-vm-template-rhel9\u0026tag=v4.13.0--2022-101182"
}
}
},
{
"category": "product_version",
"name": "container-native-virtualization/kubevirt-tekton-tasks-operator-rhel9@sha256:d0cf0e81589f0938de45961eaddfc5ec4782738fd11082de0439b200534259eb_arm64",
"product": {
"name": "container-native-virtualization/kubevirt-tekton-tasks-operator-rhel9@sha256:d0cf0e81589f0938de45961eaddfc5ec4782738fd11082de0439b200534259eb_arm64",
"product_id": "container-native-virtualization/kubevirt-tekton-tasks-operator-rhel9@sha256:d0cf0e81589f0938de45961eaddfc5ec4782738fd11082de0439b200534259eb_arm64",
"product_identification_helper": {
"purl": "pkg:oci/kubevirt-tekton-tasks-operator-rhel9@sha256:d0cf0e81589f0938de45961eaddfc5ec4782738fd11082de0439b200534259eb?arch=arm64\u0026repository_url=registry.redhat.io/container-native-virtualization/kubevirt-tekton-tasks-operator-rhel9\u0026tag=v4.13.0--2022-101182"
}
}
},
{
"category": "product_version",
"name": "container-native-virtualization/kubevirt-tekton-tasks-wait-for-vmi-status-rhel9@sha256:afb68af076954fcd18c7a4a1464ea0c2a766e8282eae980051906ed07eaa1707_arm64",
"product": {
"name": "container-native-virtualization/kubevirt-tekton-tasks-wait-for-vmi-status-rhel9@sha256:afb68af076954fcd18c7a4a1464ea0c2a766e8282eae980051906ed07eaa1707_arm64",
"product_id": "container-native-virtualization/kubevirt-tekton-tasks-wait-for-vmi-status-rhel9@sha256:afb68af076954fcd18c7a4a1464ea0c2a766e8282eae980051906ed07eaa1707_arm64",
"product_identification_helper": {
"purl": "pkg:oci/kubevirt-tekton-tasks-wait-for-vmi-status-rhel9@sha256:afb68af076954fcd18c7a4a1464ea0c2a766e8282eae980051906ed07eaa1707?arch=arm64\u0026repository_url=registry.redhat.io/container-native-virtualization/kubevirt-tekton-tasks-wait-for-vmi-status-rhel9\u0026tag=v4.13.0--2022-101182"
}
}
},
{
"category": "product_version",
"name": "container-native-virtualization/kubevirt-template-validator-rhel9@sha256:02b22c7e7014b5e72d47fed8b6a268cf307638c5510adf3916c51f7f40a52a08_arm64",
"product": {
"name": "container-native-virtualization/kubevirt-template-validator-rhel9@sha256:02b22c7e7014b5e72d47fed8b6a268cf307638c5510adf3916c51f7f40a52a08_arm64",
"product_id": "container-native-virtualization/kubevirt-template-validator-rhel9@sha256:02b22c7e7014b5e72d47fed8b6a268cf307638c5510adf3916c51f7f40a52a08_arm64",
"product_identification_helper": {
"purl": "pkg:oci/kubevirt-template-validator-rhel9@sha256:02b22c7e7014b5e72d47fed8b6a268cf307638c5510adf3916c51f7f40a52a08?arch=arm64\u0026repository_url=registry.redhat.io/container-native-virtualization/kubevirt-template-validator-rhel9\u0026tag=v4.13.0--2022-101182"
}
}
},
{
"category": "product_version",
"name": "container-native-virtualization/libguestfs-tools-rhel9@sha256:6558f60343e068b032167e2340b2c549c5f0258acc5d2614b60966ce79408b01_arm64",
"product": {
"name": "container-native-virtualization/libguestfs-tools-rhel9@sha256:6558f60343e068b032167e2340b2c549c5f0258acc5d2614b60966ce79408b01_arm64",
"product_id": "container-native-virtualization/libguestfs-tools-rhel9@sha256:6558f60343e068b032167e2340b2c549c5f0258acc5d2614b60966ce79408b01_arm64",
"product_identification_helper": {
"purl": "pkg:oci/libguestfs-tools-rhel9@sha256:6558f60343e068b032167e2340b2c549c5f0258acc5d2614b60966ce79408b01?arch=arm64\u0026repository_url=registry.redhat.io/container-native-virtualization/libguestfs-tools-rhel9\u0026tag=v4.13.0--2022-101182"
}
}
},
{
"category": "product_version",
"name": "container-native-virtualization/multus-dynamic-networks-rhel9@sha256:3ecb0162a4b01d1590bf209d717b32a4f0835910d9979823f18c24acba41b503_arm64",
"product": {
"name": "container-native-virtualization/multus-dynamic-networks-rhel9@sha256:3ecb0162a4b01d1590bf209d717b32a4f0835910d9979823f18c24acba41b503_arm64",
"product_id": "container-native-virtualization/multus-dynamic-networks-rhel9@sha256:3ecb0162a4b01d1590bf209d717b32a4f0835910d9979823f18c24acba41b503_arm64",
"product_identification_helper": {
"purl": "pkg:oci/multus-dynamic-networks-rhel9@sha256:3ecb0162a4b01d1590bf209d717b32a4f0835910d9979823f18c24acba41b503?arch=arm64\u0026repository_url=registry.redhat.io/container-native-virtualization/multus-dynamic-networks-rhel9\u0026tag=v4.13.0-37"
}
}
},
{
"category": "product_version",
"name": "container-native-virtualization/ovs-cni-plugin-rhel9@sha256:0f1d372f418744e0aff59ecb0a38f53178aac9c2e9eecfd38aa25ed83e0d1360_arm64",
"product": {
"name": "container-native-virtualization/ovs-cni-plugin-rhel9@sha256:0f1d372f418744e0aff59ecb0a38f53178aac9c2e9eecfd38aa25ed83e0d1360_arm64",
"product_id": "container-native-virtualization/ovs-cni-plugin-rhel9@sha256:0f1d372f418744e0aff59ecb0a38f53178aac9c2e9eecfd38aa25ed83e0d1360_arm64",
"product_identification_helper": {
"purl": "pkg:oci/ovs-cni-plugin-rhel9@sha256:0f1d372f418744e0aff59ecb0a38f53178aac9c2e9eecfd38aa25ed83e0d1360?arch=arm64\u0026repository_url=registry.redhat.io/container-native-virtualization/ovs-cni-plugin-rhel9\u0026tag=v4.13.0--2022-101182"
}
}
},
{
"category": "product_version",
"name": "container-native-virtualization/virt-api-rhel9@sha256:e68416321ca8c74a547b3d35897f54813c03481143e402e9bdc4daf315e35b5d_arm64",
"product": {
"name": "container-native-virtualization/virt-api-rhel9@sha256:e68416321ca8c74a547b3d35897f54813c03481143e402e9bdc4daf315e35b5d_arm64",
"product_id": "container-native-virtualization/virt-api-rhel9@sha256:e68416321ca8c74a547b3d35897f54813c03481143e402e9bdc4daf315e35b5d_arm64",
"product_identification_helper": {
"purl": "pkg:oci/virt-api-rhel9@sha256:e68416321ca8c74a547b3d35897f54813c03481143e402e9bdc4daf315e35b5d?arch=arm64\u0026repository_url=registry.redhat.io/container-native-virtualization/virt-api-rhel9\u0026tag=v4.13.0--2022-101182"
}
}
},
{
"category": "product_version",
"name": "container-native-virtualization/virt-artifacts-server-rhel9@sha256:33d11c1832b49df39c1fca62bad40dbc5c30a452248339aaef449ac99509accb_arm64",
"product": {
"name": "container-native-virtualization/virt-artifacts-server-rhel9@sha256:33d11c1832b49df39c1fca62bad40dbc5c30a452248339aaef449ac99509accb_arm64",
"product_id": "container-native-virtualization/virt-artifacts-server-rhel9@sha256:33d11c1832b49df39c1fca62bad40dbc5c30a452248339aaef449ac99509accb_arm64",
"product_identification_helper": {
"purl": "pkg:oci/virt-artifacts-server-rhel9@sha256:33d11c1832b49df39c1fca62bad40dbc5c30a452248339aaef449ac99509accb?arch=arm64\u0026repository_url=registry.redhat.io/container-native-virtualization/virt-artifacts-server-rhel9\u0026tag=v4.13.0--2022-101182"
}
}
},
{
"category": "product_version",
"name": "container-native-virtualization/virt-cdi-apiserver-rhel9@sha256:f6128a63344ed2129f5bce648ddcfaa2869d31cde4b93328d3c22534b97ade10_arm64",
"product": {
"name": "container-native-virtualization/virt-cdi-apiserver-rhel9@sha256:f6128a63344ed2129f5bce648ddcfaa2869d31cde4b93328d3c22534b97ade10_arm64",
"product_id": "container-native-virtualization/virt-cdi-apiserver-rhel9@sha256:f6128a63344ed2129f5bce648ddcfaa2869d31cde4b93328d3c22534b97ade10_arm64",
"product_identification_helper": {
"purl": "pkg:oci/virt-cdi-apiserver-rhel9@sha256:f6128a63344ed2129f5bce648ddcfaa2869d31cde4b93328d3c22534b97ade10?arch=arm64\u0026repository_url=registry.redhat.io/container-native-virtualization/virt-cdi-apiserver-rhel9\u0026tag=v4.13.0--2022-101182"
}
}
},
{
"category": "product_version",
"name": "container-native-virtualization/virt-cdi-cloner-rhel9@sha256:6ac212767481bef64d8a7d0252bb8089c0f9751fad4a355aef71bd49dad2ad07_arm64",
"product": {
"name": "container-native-virtualization/virt-cdi-cloner-rhel9@sha256:6ac212767481bef64d8a7d0252bb8089c0f9751fad4a355aef71bd49dad2ad07_arm64",
"product_id": "container-native-virtualization/virt-cdi-cloner-rhel9@sha256:6ac212767481bef64d8a7d0252bb8089c0f9751fad4a355aef71bd49dad2ad07_arm64",
"product_identification_helper": {
"purl": "pkg:oci/virt-cdi-cloner-rhel9@sha256:6ac212767481bef64d8a7d0252bb8089c0f9751fad4a355aef71bd49dad2ad07?arch=arm64\u0026repository_url=registry.redhat.io/container-native-virtualization/virt-cdi-cloner-rhel9\u0026tag=v4.13.0--2022-101182"
}
}
},
{
"category": "product_version",
"name": "container-native-virtualization/virt-cdi-controller-rhel9@sha256:65f5263275d9f0a12b8fb057d82adf678778039ec873ca9bde182dea3413c9f1_arm64",
"product": {
"name": "container-native-virtualization/virt-cdi-controller-rhel9@sha256:65f5263275d9f0a12b8fb057d82adf678778039ec873ca9bde182dea3413c9f1_arm64",
"product_id": "container-native-virtualization/virt-cdi-controller-rhel9@sha256:65f5263275d9f0a12b8fb057d82adf678778039ec873ca9bde182dea3413c9f1_arm64",
"product_identification_helper": {
"purl": "pkg:oci/virt-cdi-controller-rhel9@sha256:65f5263275d9f0a12b8fb057d82adf678778039ec873ca9bde182dea3413c9f1?arch=arm64\u0026repository_url=registry.redhat.io/container-native-virtualization/virt-cdi-controller-rhel9\u0026tag=v4.13.0--2022-101182"
}
}
},
{
"category": "product_version",
"name": "container-native-virtualization/virt-cdi-importer-rhel9@sha256:00a6d9d24ca1466d450b02269ec3144fc7550f0e5c696e869fbf7ce10cae6093_arm64",
"product": {
"name": "container-native-virtualization/virt-cdi-importer-rhel9@sha256:00a6d9d24ca1466d450b02269ec3144fc7550f0e5c696e869fbf7ce10cae6093_arm64",
"product_id": "container-native-virtualization/virt-cdi-importer-rhel9@sha256:00a6d9d24ca1466d450b02269ec3144fc7550f0e5c696e869fbf7ce10cae6093_arm64",
"product_identification_helper": {
"purl": "pkg:oci/virt-cdi-importer-rhel9@sha256:00a6d9d24ca1466d450b02269ec3144fc7550f0e5c696e869fbf7ce10cae6093?arch=arm64\u0026repository_url=registry.redhat.io/container-native-virtualization/virt-cdi-importer-rhel9\u0026tag=v4.13.0--2022-101182"
}
}
},
{
"category": "product_version",
"name": "container-native-virtualization/virt-cdi-operator-rhel9@sha256:20ec064750faedd97d11b797c8c1d9a1db5d60d7d76e82e65cfd05eb79d65e29_arm64",
"product": {
"name": "container-native-virtualization/virt-cdi-operator-rhel9@sha256:20ec064750faedd97d11b797c8c1d9a1db5d60d7d76e82e65cfd05eb79d65e29_arm64",
"product_id": "container-native-virtualization/virt-cdi-operator-rhel9@sha256:20ec064750faedd97d11b797c8c1d9a1db5d60d7d76e82e65cfd05eb79d65e29_arm64",
"product_identification_helper": {
"purl": "pkg:oci/virt-cdi-operator-rhel9@sha256:20ec064750faedd97d11b797c8c1d9a1db5d60d7d76e82e65cfd05eb79d65e29?arch=arm64\u0026repository_url=registry.redhat.io/container-native-virtualization/virt-cdi-operator-rhel9\u0026tag=v4.13.0--2022-101182"
}
}
},
{
"category": "product_version",
"name": "container-native-virtualization/virt-cdi-uploadproxy-rhel9@sha256:392d0f61f462c707adfdc21e4239c5c09d8520a80486b41d9d9ae479267d6124_arm64",
"product": {
"name": "container-native-virtualization/virt-cdi-uploadproxy-rhel9@sha256:392d0f61f462c707adfdc21e4239c5c09d8520a80486b41d9d9ae479267d6124_arm64",
"product_id": "container-native-virtualization/virt-cdi-uploadproxy-rhel9@sha256:392d0f61f462c707adfdc21e4239c5c09d8520a80486b41d9d9ae479267d6124_arm64",
"product_identification_helper": {
"purl": "pkg:oci/virt-cdi-uploadproxy-rhel9@sha256:392d0f61f462c707adfdc21e4239c5c09d8520a80486b41d9d9ae479267d6124?arch=arm64\u0026repository_url=registry.redhat.io/container-native-virtualization/virt-cdi-uploadproxy-rhel9\u0026tag=v4.13.0--2022-101182"
}
}
},
{
"category": "product_version",
"name": "container-native-virtualization/virt-cdi-uploadserver-rhel9@sha256:4528c24672689cfb6505761b6b108fbcc04488192733f23d2bfe39cd42a1d743_arm64",
"product": {
"name": "container-native-virtualization/virt-cdi-uploadserver-rhel9@sha256:4528c24672689cfb6505761b6b108fbcc04488192733f23d2bfe39cd42a1d743_arm64",
"product_id": "container-native-virtualization/virt-cdi-uploadserver-rhel9@sha256:4528c24672689cfb6505761b6b108fbcc04488192733f23d2bfe39cd42a1d743_arm64",
"product_identification_helper": {
"purl": "pkg:oci/virt-cdi-uploadserver-rhel9@sha256:4528c24672689cfb6505761b6b108fbcc04488192733f23d2bfe39cd42a1d743?arch=arm64\u0026repository_url=registry.redhat.io/container-native-virtualization/virt-cdi-uploadserver-rhel9\u0026tag=v4.13.0--2022-101182"
}
}
},
{
"category": "product_version",
"name": "container-native-virtualization/virt-controller-rhel9@sha256:970edc281d7a731e9f7e8c2d4440fe48a221e5e355d5235c5413b4c3adb28503_arm64",
"product": {
"name": "container-native-virtualization/virt-controller-rhel9@sha256:970edc281d7a731e9f7e8c2d4440fe48a221e5e355d5235c5413b4c3adb28503_arm64",
"product_id": "container-native-virtualization/virt-controller-rhel9@sha256:970edc281d7a731e9f7e8c2d4440fe48a221e5e355d5235c5413b4c3adb28503_arm64",
"product_identification_helper": {
"purl": "pkg:oci/virt-controller-rhel9@sha256:970edc281d7a731e9f7e8c2d4440fe48a221e5e355d5235c5413b4c3adb28503?arch=arm64\u0026repository_url=registry.redhat.io/container-native-virtualization/virt-controller-rhel9\u0026tag=v4.13.0--2022-101182"
}
}
},
{
"category": "product_version",
"name": "container-native-virtualization/virt-exportproxy-rhel9@sha256:de3c4afbf7669b98517cbef2490ec186f0553dd97b05bed80ec36dd883fe507b_arm64",
"product": {
"name": "container-native-virtualization/virt-exportproxy-rhel9@sha256:de3c4afbf7669b98517cbef2490ec186f0553dd97b05bed80ec36dd883fe507b_arm64",
"product_id": "container-native-virtualization/virt-exportproxy-rhel9@sha256:de3c4afbf7669b98517cbef2490ec186f0553dd97b05bed80ec36dd883fe507b_arm64",
"product_identification_helper": {
"purl": "pkg:oci/virt-exportproxy-rhel9@sha256:de3c4afbf7669b98517cbef2490ec186f0553dd97b05bed80ec36dd883fe507b?arch=arm64\u0026repository_url=registry.redhat.io/container-native-virtualization/virt-exportproxy-rhel9\u0026tag=v4.13.0--2022-101182"
}
}
},
{
"category": "product_version",
"name": "container-native-virtualization/virt-exportserver-rhel9@sha256:3f7f98645176d42c63cca5c0fc3182a03121af87446ca421b6c72baf07dfca0d_arm64",
"product": {
"name": "container-native-virtualization/virt-exportserver-rhel9@sha256:3f7f98645176d42c63cca5c0fc3182a03121af87446ca421b6c72baf07dfca0d_arm64",
"product_id": "container-native-virtualization/virt-exportserver-rhel9@sha256:3f7f98645176d42c63cca5c0fc3182a03121af87446ca421b6c72baf07dfca0d_arm64",
"product_identification_helper": {
"purl": "pkg:oci/virt-exportserver-rhel9@sha256:3f7f98645176d42c63cca5c0fc3182a03121af87446ca421b6c72baf07dfca0d?arch=arm64\u0026repository_url=registry.redhat.io/container-native-virtualization/virt-exportserver-rhel9\u0026tag=v4.13.0--2022-101182"
}
}
},
{
"category": "product_version",
"name": "container-native-virtualization/virt-handler-rhel9@sha256:5fc47110d866d8048aec50689090ce10705d19d3bb48d2b06727d6d569003af7_arm64",
"product": {
"name": "container-native-virtualization/virt-handler-rhel9@sha256:5fc47110d866d8048aec50689090ce10705d19d3bb48d2b06727d6d569003af7_arm64",
"product_id": "container-native-virtualization/virt-handler-rhel9@sha256:5fc47110d866d8048aec50689090ce10705d19d3bb48d2b06727d6d569003af7_arm64",
"product_identification_helper": {
"purl": "pkg:oci/virt-handler-rhel9@sha256:5fc47110d866d8048aec50689090ce10705d19d3bb48d2b06727d6d569003af7?arch=arm64\u0026repository_url=registry.redhat.io/container-native-virtualization/virt-handler-rhel9\u0026tag=v4.13.0--2022-101182"
}
}
},
{
"category": "product_version",
"name": "container-native-virtualization/virtio-win-rhel9@sha256:8735f51da918408a8826601c082d1b29accf26d59b9978da89b980cb509c1102_arm64",
"product": {
"name": "container-native-virtualization/virtio-win-rhel9@sha256:8735f51da918408a8826601c082d1b29accf26d59b9978da89b980cb509c1102_arm64",
"product_id": "container-native-virtualization/virtio-win-rhel9@sha256:8735f51da918408a8826601c082d1b29accf26d59b9978da89b980cb509c1102_arm64",
"product_identification_helper": {
"purl": "pkg:oci/virtio-win-rhel9@sha256:8735f51da918408a8826601c082d1b29accf26d59b9978da89b980cb509c1102?arch=arm64\u0026repository_url=registry.redhat.io/container-native-virtualization/virtio-win-rhel9\u0026tag=v4.13.0--2022-101182"
}
}
},
{
"category": "product_version",
"name": "container-native-virtualization/virt-launcher-rhel9@sha256:95aeacb98209e0baef27ce0e02fbac38d693cea74808fc77107efda0f344bcb5_arm64",
"product": {
"name": "container-native-virtualization/virt-launcher-rhel9@sha256:95aeacb98209e0baef27ce0e02fbac38d693cea74808fc77107efda0f344bcb5_arm64",
"product_id": "container-native-virtualization/virt-launcher-rhel9@sha256:95aeacb98209e0baef27ce0e02fbac38d693cea74808fc77107efda0f344bcb5_arm64",
"product_identification_helper": {
"purl": "pkg:oci/virt-launcher-rhel9@sha256:95aeacb98209e0baef27ce0e02fbac38d693cea74808fc77107efda0f344bcb5?arch=arm64\u0026repository_url=registry.redhat.io/container-native-virtualization/virt-launcher-rhel9\u0026tag=v4.13.0--2022-101182"
}
}
},
{
"category": "product_version",
"name": "container-native-virtualization/virt-operator-rhel9@sha256:66b1b3b379121d6411ba22283e7d991617177330c93746d37753ab7812b9a00b_arm64",
"product": {
"name": "container-native-virtualization/virt-operator-rhel9@sha256:66b1b3b379121d6411ba22283e7d991617177330c93746d37753ab7812b9a00b_arm64",
"product_id": "container-native-virtualization/virt-operator-rhel9@sha256:66b1b3b379121d6411ba22283e7d991617177330c93746d37753ab7812b9a00b_arm64",
"product_identification_helper": {
"purl": "pkg:oci/virt-operator-rhel9@sha256:66b1b3b379121d6411ba22283e7d991617177330c93746d37753ab7812b9a00b?arch=arm64\u0026repository_url=registry.redhat.io/container-native-virtualization/virt-operator-rhel9\u0026tag=v4.13.0--2022-101182"
}
}
},
{
"category": "product_version",
"name": "container-native-virtualization/vm-console-proxy-rhel9@sha256:70a8d0cd66182c25e02679540bae1368b2a9cf687532b58dba41ef30c5ca00c1_arm64",
"product": {
"name": "container-native-virtualization/vm-console-proxy-rhel9@sha256:70a8d0cd66182c25e02679540bae1368b2a9cf687532b58dba41ef30c5ca00c1_arm64",
"product_id": "container-native-virtualization/vm-console-proxy-rhel9@sha256:70a8d0cd66182c25e02679540bae1368b2a9cf687532b58dba41ef30c5ca00c1_arm64",
"product_identification_helper": {
"purl": "pkg:oci/vm-console-proxy-rhel9@sha256:70a8d0cd66182c25e02679540bae1368b2a9cf687532b58dba41ef30c5ca00c1?arch=arm64\u0026repository_url=registry.redhat.io/container-native-virtualization/vm-console-proxy-rhel9\u0026tag=v4.13.0--2022-101182"
}
}
},
{
"category": "product_version",
"name": "container-native-virtualization/vm-network-latency-checkup-rhel9@sha256:503ea7ac914a9b54e9d665a0227ee0b5d5200cdb5d692aa94c07dd1518d91b70_arm64",
"product": {
"name": "container-native-virtualization/vm-network-latency-checkup-rhel9@sha256:503ea7ac914a9b54e9d665a0227ee0b5d5200cdb5d692aa94c07dd1518d91b70_arm64",
"product_id": "container-native-virtualization/vm-network-latency-checkup-rhel9@sha256:503ea7ac914a9b54e9d665a0227ee0b5d5200cdb5d692aa94c07dd1518d91b70_arm64",
"product_identification_helper": {
"purl": "pkg:oci/vm-network-latency-checkup-rhel9@sha256:503ea7ac914a9b54e9d665a0227ee0b5d5200cdb5d692aa94c07dd1518d91b70?arch=arm64\u0026repository_url=registry.redhat.io/container-native-virtualization/vm-network-latency-checkup-rhel9\u0026tag=v4.13.0--2022-101182"
}
}
}
],
"category": "architecture",
"name": "arm64"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "container-native-virtualization/bridge-marker-rhel9@sha256:8eac196b30a648989cdca5cb153a3bc3d34e47339acba0e4f760bd366496c99d_amd64 as a component of CNV 4.13 for RHEL 9",
"product_id": "9Base-CNV-4.13:container-native-virtualization/bridge-marker-rhel9@sha256:8eac196b30a648989cdca5cb153a3bc3d34e47339acba0e4f760bd366496c99d_amd64"
},
"product_reference": "container-native-virtualization/bridge-marker-rhel9@sha256:8eac196b30a648989cdca5cb153a3bc3d34e47339acba0e4f760bd366496c99d_amd64",
"relates_to_product_reference": "9Base-CNV-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "container-native-virtualization/bridge-marker-rhel9@sha256:e8a55aee3d75a316bb0d7a554c737198823df04b3c05e481c17e45eb2153bced_arm64 as a component of CNV 4.13 for RHEL 9",
"product_id": "9Base-CNV-4.13:container-native-virtualization/bridge-marker-rhel9@sha256:e8a55aee3d75a316bb0d7a554c737198823df04b3c05e481c17e45eb2153bced_arm64"
},
"product_reference": "container-native-virtualization/bridge-marker-rhel9@sha256:e8a55aee3d75a316bb0d7a554c737198823df04b3c05e481c17e45eb2153bced_arm64",
"relates_to_product_reference": "9Base-CNV-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "container-native-virtualization/cluster-network-addons-operator-rhel9@sha256:3bff33e3f40cd1e2b519c2db56734d4bb8df883e155c2f20b1cb9d3d184daec1_amd64 as a component of CNV 4.13 for RHEL 9",
"product_id": "9Base-CNV-4.13:container-native-virtualization/cluster-network-addons-operator-rhel9@sha256:3bff33e3f40cd1e2b519c2db56734d4bb8df883e155c2f20b1cb9d3d184daec1_amd64"
},
"product_reference": "container-native-virtualization/cluster-network-addons-operator-rhel9@sha256:3bff33e3f40cd1e2b519c2db56734d4bb8df883e155c2f20b1cb9d3d184daec1_amd64",
"relates_to_product_reference": "9Base-CNV-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "container-native-virtualization/cluster-network-addons-operator-rhel9@sha256:f439d2f420bb59eb1d5af14ce2002648d0cfc155d1a1466c8aac9b661fe902b8_arm64 as a component of CNV 4.13 for RHEL 9",
"product_id": "9Base-CNV-4.13:container-native-virtualization/cluster-network-addons-operator-rhel9@sha256:f439d2f420bb59eb1d5af14ce2002648d0cfc155d1a1466c8aac9b661fe902b8_arm64"
},
"product_reference": "container-native-virtualization/cluster-network-addons-operator-rhel9@sha256:f439d2f420bb59eb1d5af14ce2002648d0cfc155d1a1466c8aac9b661fe902b8_arm64",
"relates_to_product_reference": "9Base-CNV-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "container-native-virtualization/cnv-containernetworking-plugins-rhel9@sha256:89f22e541f61a660c9aa9f38ef58e80b84a0517f74e84292107fc252c25465c9_arm64 as a component of CNV 4.13 for RHEL 9",
"product_id": "9Base-CNV-4.13:container-native-virtualization/cnv-containernetworking-plugins-rhel9@sha256:89f22e541f61a660c9aa9f38ef58e80b84a0517f74e84292107fc252c25465c9_arm64"
},
"product_reference": "container-native-virtualization/cnv-containernetworking-plugins-rhel9@sha256:89f22e541f61a660c9aa9f38ef58e80b84a0517f74e84292107fc252c25465c9_arm64",
"relates_to_product_reference": "9Base-CNV-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "container-native-virtualization/cnv-containernetworking-plugins-rhel9@sha256:bf471997e54e4a75b0d71f492ab295787fdbb14d8c85c4ea8c03f0552dbc3755_amd64 as a component of CNV 4.13 for RHEL 9",
"product_id": "9Base-CNV-4.13:container-native-virtualization/cnv-containernetworking-plugins-rhel9@sha256:bf471997e54e4a75b0d71f492ab295787fdbb14d8c85c4ea8c03f0552dbc3755_amd64"
},
"product_reference": "container-native-virtualization/cnv-containernetworking-plugins-rhel9@sha256:bf471997e54e4a75b0d71f492ab295787fdbb14d8c85c4ea8c03f0552dbc3755_amd64",
"relates_to_product_reference": "9Base-CNV-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "container-native-virtualization/cnv-must-gather-rhel9@sha256:9e8efd76924958eb605401abdac08eba97fb83a1ada383bc87a7fb7c87b3a455_arm64 as a component of CNV 4.13 for RHEL 9",
"product_id": "9Base-CNV-4.13:container-native-virtualization/cnv-must-gather-rhel9@sha256:9e8efd76924958eb605401abdac08eba97fb83a1ada383bc87a7fb7c87b3a455_arm64"
},
"product_reference": "container-native-virtualization/cnv-must-gather-rhel9@sha256:9e8efd76924958eb605401abdac08eba97fb83a1ada383bc87a7fb7c87b3a455_arm64",
"relates_to_product_reference": "9Base-CNV-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "container-native-virtualization/cnv-must-gather-rhel9@sha256:b9fc32b5fabedd65a4c3a471879c808af2087277de4278adaa115a732f0468da_amd64 as a component of CNV 4.13 for RHEL 9",
"product_id": "9Base-CNV-4.13:container-native-virtualization/cnv-must-gather-rhel9@sha256:b9fc32b5fabedd65a4c3a471879c808af2087277de4278adaa115a732f0468da_amd64"
},
"product_reference": "container-native-virtualization/cnv-must-gather-rhel9@sha256:b9fc32b5fabedd65a4c3a471879c808af2087277de4278adaa115a732f0468da_amd64",
"relates_to_product_reference": "9Base-CNV-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "container-native-virtualization/hco-bundle-registry-rhel9@sha256:60e89d7a99ff9f20e974430b802dd724a3bb6fa1e01e5a62daad98ac487b3063_amd64 as a component of CNV 4.13 for RHEL 9",
"product_id": "9Base-CNV-4.13:container-native-virtualization/hco-bundle-registry-rhel9@sha256:60e89d7a99ff9f20e974430b802dd724a3bb6fa1e01e5a62daad98ac487b3063_amd64"
},
"product_reference": "container-native-virtualization/hco-bundle-registry-rhel9@sha256:60e89d7a99ff9f20e974430b802dd724a3bb6fa1e01e5a62daad98ac487b3063_amd64",
"relates_to_product_reference": "9Base-CNV-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "container-native-virtualization/hco-bundle-registry-rhel9@sha256:dd20b138045ef1424d83a47e7abcfcbb2ac54577dcec5ed3c186390aaa4c9d84_arm64 as a component of CNV 4.13 for RHEL 9",
"product_id": "9Base-CNV-4.13:container-native-virtualization/hco-bundle-registry-rhel9@sha256:dd20b138045ef1424d83a47e7abcfcbb2ac54577dcec5ed3c186390aaa4c9d84_arm64"
},
"product_reference": "container-native-virtualization/hco-bundle-registry-rhel9@sha256:dd20b138045ef1424d83a47e7abcfcbb2ac54577dcec5ed3c186390aaa4c9d84_arm64",
"relates_to_product_reference": "9Base-CNV-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "container-native-virtualization/hostpath-csi-driver-rhel9@sha256:61e2824853d51347593ad909a5e546cd92e4216d6a1df5dffb50dd9cba277cce_amd64 as a component of CNV 4.13 for RHEL 9",
"product_id": "9Base-CNV-4.13:container-native-virtualization/hostpath-csi-driver-rhel9@sha256:61e2824853d51347593ad909a5e546cd92e4216d6a1df5dffb50dd9cba277cce_amd64"
},
"product_reference": "container-native-virtualization/hostpath-csi-driver-rhel9@sha256:61e2824853d51347593ad909a5e546cd92e4216d6a1df5dffb50dd9cba277cce_amd64",
"relates_to_product_reference": "9Base-CNV-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "container-native-virtualization/hostpath-csi-driver-rhel9@sha256:676d4c23a5f60dd331728af056b0a6b2d3358ac88da23299b1a98dfaca8f288e_arm64 as a component of CNV 4.13 for RHEL 9",
"product_id": "9Base-CNV-4.13:container-native-virtualization/hostpath-csi-driver-rhel9@sha256:676d4c23a5f60dd331728af056b0a6b2d3358ac88da23299b1a98dfaca8f288e_arm64"
},
"product_reference": "container-native-virtualization/hostpath-csi-driver-rhel9@sha256:676d4c23a5f60dd331728af056b0a6b2d3358ac88da23299b1a98dfaca8f288e_arm64",
"relates_to_product_reference": "9Base-CNV-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "container-native-virtualization/hostpath-provisioner-operator-rhel9@sha256:515be94be496c67f5b8fd5f4832fe4385e56476e6589897d6b9fbb9bb2b00f32_amd64 as a component of CNV 4.13 for RHEL 9",
"product_id": "9Base-CNV-4.13:container-native-virtualization/hostpath-provisioner-operator-rhel9@sha256:515be94be496c67f5b8fd5f4832fe4385e56476e6589897d6b9fbb9bb2b00f32_amd64"
},
"product_reference": "container-native-virtualization/hostpath-provisioner-operator-rhel9@sha256:515be94be496c67f5b8fd5f4832fe4385e56476e6589897d6b9fbb9bb2b00f32_amd64",
"relates_to_product_reference": "9Base-CNV-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "container-native-virtualization/hostpath-provisioner-operator-rhel9@sha256:571ae805641dea11646028c946039983c7fd82f138b915dcb8b80c39b465e63c_arm64 as a component of CNV 4.13 for RHEL 9",
"product_id": "9Base-CNV-4.13:container-native-virtualization/hostpath-provisioner-operator-rhel9@sha256:571ae805641dea11646028c946039983c7fd82f138b915dcb8b80c39b465e63c_arm64"
},
"product_reference": "container-native-virtualization/hostpath-provisioner-operator-rhel9@sha256:571ae805641dea11646028c946039983c7fd82f138b915dcb8b80c39b465e63c_arm64",
"relates_to_product_reference": "9Base-CNV-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "container-native-virtualization/hostpath-provisioner-rhel9@sha256:ac3fe350bedd6bc43596444ba0f279ccf8a144ab14ac5a9b80ea71c46390b7b4_amd64 as a component of CNV 4.13 for RHEL 9",
"product_id": "9Base-CNV-4.13:container-native-virtualization/hostpath-provisioner-rhel9@sha256:ac3fe350bedd6bc43596444ba0f279ccf8a144ab14ac5a9b80ea71c46390b7b4_amd64"
},
"product_reference": "container-native-virtualization/hostpath-provisioner-rhel9@sha256:ac3fe350bedd6bc43596444ba0f279ccf8a144ab14ac5a9b80ea71c46390b7b4_amd64",
"relates_to_product_reference": "9Base-CNV-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "container-native-virtualization/hostpath-provisioner-rhel9@sha256:d4ed87745b7ee2acca2d83e2c91c2f6dced1903c81495b50f2559b3ba2dde287_arm64 as a component of CNV 4.13 for RHEL 9",
"product_id": "9Base-CNV-4.13:container-native-virtualization/hostpath-provisioner-rhel9@sha256:d4ed87745b7ee2acca2d83e2c91c2f6dced1903c81495b50f2559b3ba2dde287_arm64"
},
"product_reference": "container-native-virtualization/hostpath-provisioner-rhel9@sha256:d4ed87745b7ee2acca2d83e2c91c2f6dced1903c81495b50f2559b3ba2dde287_arm64",
"relates_to_product_reference": "9Base-CNV-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "container-native-virtualization/hyperconverged-cluster-operator-rhel9@sha256:e5ab9f3be59d3568e3d672ab374efb16990ccf92192eac4e1244b10fcd7423e2_amd64 as a component of CNV 4.13 for RHEL 9",
"product_id": "9Base-CNV-4.13:container-native-virtualization/hyperconverged-cluster-operator-rhel9@sha256:e5ab9f3be59d3568e3d672ab374efb16990ccf92192eac4e1244b10fcd7423e2_amd64"
},
"product_reference": "container-native-virtualization/hyperconverged-cluster-operator-rhel9@sha256:e5ab9f3be59d3568e3d672ab374efb16990ccf92192eac4e1244b10fcd7423e2_amd64",
"relates_to_product_reference": "9Base-CNV-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "container-native-virtualization/hyperconverged-cluster-operator-rhel9@sha256:e681560b184189df03fc84c8a712f32289f42573dd348cda394b19565eb6eca8_arm64 as a component of CNV 4.13 for RHEL 9",
"product_id": "9Base-CNV-4.13:container-native-virtualization/hyperconverged-cluster-operator-rhel9@sha256:e681560b184189df03fc84c8a712f32289f42573dd348cda394b19565eb6eca8_arm64"
},
"product_reference": "container-native-virtualization/hyperconverged-cluster-operator-rhel9@sha256:e681560b184189df03fc84c8a712f32289f42573dd348cda394b19565eb6eca8_arm64",
"relates_to_product_reference": "9Base-CNV-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "container-native-virtualization/hyperconverged-cluster-webhook-rhel9@sha256:06d036d320b3027bb8370bb8e0f6fe8c9f0ec9bca7aac3b5c53698ba4a170042_arm64 as a component of CNV 4.13 for RHEL 9",
"product_id": "9Base-CNV-4.13:container-native-virtualization/hyperconverged-cluster-webhook-rhel9@sha256:06d036d320b3027bb8370bb8e0f6fe8c9f0ec9bca7aac3b5c53698ba4a170042_arm64"
},
"product_reference": "container-native-virtualization/hyperconverged-cluster-webhook-rhel9@sha256:06d036d320b3027bb8370bb8e0f6fe8c9f0ec9bca7aac3b5c53698ba4a170042_arm64",
"relates_to_product_reference": "9Base-CNV-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "container-native-virtualization/hyperconverged-cluster-webhook-rhel9@sha256:b5a01336180aad017df62cf8e652f2491b8263ba7e4dd07f858db1ef1924cf2f_amd64 as a component of CNV 4.13 for RHEL 9",
"product_id": "9Base-CNV-4.13:container-native-virtualization/hyperconverged-cluster-webhook-rhel9@sha256:b5a01336180aad017df62cf8e652f2491b8263ba7e4dd07f858db1ef1924cf2f_amd64"
},
"product_reference": "container-native-virtualization/hyperconverged-cluster-webhook-rhel9@sha256:b5a01336180aad017df62cf8e652f2491b8263ba7e4dd07f858db1ef1924cf2f_amd64",
"relates_to_product_reference": "9Base-CNV-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "container-native-virtualization/kubemacpool-rhel9@sha256:4d190d81eeb3fbe9ed56cf3548dc83a3f81641bfdafa7b42dcfb0d2512566644_amd64 as a component of CNV 4.13 for RHEL 9",
"product_id": "9Base-CNV-4.13:container-native-virtualization/kubemacpool-rhel9@sha256:4d190d81eeb3fbe9ed56cf3548dc83a3f81641bfdafa7b42dcfb0d2512566644_amd64"
},
"product_reference": "container-native-virtualization/kubemacpool-rhel9@sha256:4d190d81eeb3fbe9ed56cf3548dc83a3f81641bfdafa7b42dcfb0d2512566644_amd64",
"relates_to_product_reference": "9Base-CNV-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "container-native-virtualization/kubemacpool-rhel9@sha256:59862a59854f0d5b83dc25ba119f9586a8aff42b6e60d1922f8ae7b4567309ff_arm64 as a component of CNV 4.13 for RHEL 9",
"product_id": "9Base-CNV-4.13:container-native-virtualization/kubemacpool-rhel9@sha256:59862a59854f0d5b83dc25ba119f9586a8aff42b6e60d1922f8ae7b4567309ff_arm64"
},
"product_reference": "container-native-virtualization/kubemacpool-rhel9@sha256:59862a59854f0d5b83dc25ba119f9586a8aff42b6e60d1922f8ae7b4567309ff_arm64",
"relates_to_product_reference": "9Base-CNV-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "container-native-virtualization/kubesecondarydns-rhel9@sha256:121d30d78cc57731ea2242ef2c32430890ac66c2723e65608d5e2f26c3f515cd_amd64 as a component of CNV 4.13 for RHEL 9",
"product_id": "9Base-CNV-4.13:container-native-virtualization/kubesecondarydns-rhel9@sha256:121d30d78cc57731ea2242ef2c32430890ac66c2723e65608d5e2f26c3f515cd_amd64"
},
"product_reference": "container-native-virtualization/kubesecondarydns-rhel9@sha256:121d30d78cc57731ea2242ef2c32430890ac66c2723e65608d5e2f26c3f515cd_amd64",
"relates_to_product_reference": "9Base-CNV-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "container-native-virtualization/kubesecondarydns-rhel9@sha256:b1838f3c8ba3d8113bddea17b78c21e1c1490e2a4a07ea77014edee523d06347_arm64 as a component of CNV 4.13 for RHEL 9",
"product_id": "9Base-CNV-4.13:container-native-virtualization/kubesecondarydns-rhel9@sha256:b1838f3c8ba3d8113bddea17b78c21e1c1490e2a4a07ea77014edee523d06347_arm64"
},
"product_reference": "container-native-virtualization/kubesecondarydns-rhel9@sha256:b1838f3c8ba3d8113bddea17b78c21e1c1490e2a4a07ea77014edee523d06347_arm64",
"relates_to_product_reference": "9Base-CNV-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "container-native-virtualization/kubevirt-console-plugin-rhel9@sha256:86a4b1e3d6ad1d56302c9c058f8bc5826dcfe6c46fb3e0ddaa06818645039020_amd64 as a component of CNV 4.13 for RHEL 9",
"product_id": "9Base-CNV-4.13:container-native-virtualization/kubevirt-console-plugin-rhel9@sha256:86a4b1e3d6ad1d56302c9c058f8bc5826dcfe6c46fb3e0ddaa06818645039020_amd64"
},
"product_reference": "container-native-virtualization/kubevirt-console-plugin-rhel9@sha256:86a4b1e3d6ad1d56302c9c058f8bc5826dcfe6c46fb3e0ddaa06818645039020_amd64",
"relates_to_product_reference": "9Base-CNV-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "container-native-virtualization/kubevirt-console-plugin-rhel9@sha256:ffb2acd9ae09c1ef9ca756f5eaf6087d0a3957cfc824543949d25f556a97744d_arm64 as a component of CNV 4.13 for RHEL 9",
"product_id": "9Base-CNV-4.13:container-native-virtualization/kubevirt-console-plugin-rhel9@sha256:ffb2acd9ae09c1ef9ca756f5eaf6087d0a3957cfc824543949d25f556a97744d_arm64"
},
"product_reference": "container-native-virtualization/kubevirt-console-plugin-rhel9@sha256:ffb2acd9ae09c1ef9ca756f5eaf6087d0a3957cfc824543949d25f556a97744d_arm64",
"relates_to_product_reference": "9Base-CNV-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "container-native-virtualization/kubevirt-dpdk-checkup-rhel9@sha256:525aceb9396010ebcdba14040f267889b807cd84db8e5b4030429b51f0fbf5fe_arm64 as a component of CNV 4.13 for RHEL 9",
"product_id": "9Base-CNV-4.13:container-native-virtualization/kubevirt-dpdk-checkup-rhel9@sha256:525aceb9396010ebcdba14040f267889b807cd84db8e5b4030429b51f0fbf5fe_arm64"
},
"product_reference": "container-native-virtualization/kubevirt-dpdk-checkup-rhel9@sha256:525aceb9396010ebcdba14040f267889b807cd84db8e5b4030429b51f0fbf5fe_arm64",
"relates_to_product_reference": "9Base-CNV-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "container-native-virtualization/kubevirt-dpdk-checkup-rhel9@sha256:553c4686f56c66cc1e3c5ad9d4051f139d43f821eac3abb98ca5cdb8b5dfe202_amd64 as a component of CNV 4.13 for RHEL 9",
"product_id": "9Base-CNV-4.13:container-native-virtualization/kubevirt-dpdk-checkup-rhel9@sha256:553c4686f56c66cc1e3c5ad9d4051f139d43f821eac3abb98ca5cdb8b5dfe202_amd64"
},
"product_reference": "container-native-virtualization/kubevirt-dpdk-checkup-rhel9@sha256:553c4686f56c66cc1e3c5ad9d4051f139d43f821eac3abb98ca5cdb8b5dfe202_amd64",
"relates_to_product_reference": "9Base-CNV-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "container-native-virtualization/kubevirt-ssp-operator-rhel9@sha256:901e6cad9534c7bd7c4018c60bccfe49d7280fba5a9901ab4c4d15e9345288c4_amd64 as a component of CNV 4.13 for RHEL 9",
"product_id": "9Base-CNV-4.13:container-native-virtualization/kubevirt-ssp-operator-rhel9@sha256:901e6cad9534c7bd7c4018c60bccfe49d7280fba5a9901ab4c4d15e9345288c4_amd64"
},
"product_reference": "container-native-virtualization/kubevirt-ssp-operator-rhel9@sha256:901e6cad9534c7bd7c4018c60bccfe49d7280fba5a9901ab4c4d15e9345288c4_amd64",
"relates_to_product_reference": "9Base-CNV-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "container-native-virtualization/kubevirt-ssp-operator-rhel9@sha256:badeb0f65f543b209f6af761729d9778b7b73b97d55044016dfba3f38a1f6f18_arm64 as a component of CNV 4.13 for RHEL 9",
"product_id": "9Base-CNV-4.13:container-native-virtualization/kubevirt-ssp-operator-rhel9@sha256:badeb0f65f543b209f6af761729d9778b7b73b97d55044016dfba3f38a1f6f18_arm64"
},
"product_reference": "container-native-virtualization/kubevirt-ssp-operator-rhel9@sha256:badeb0f65f543b209f6af761729d9778b7b73b97d55044016dfba3f38a1f6f18_arm64",
"relates_to_product_reference": "9Base-CNV-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "container-native-virtualization/kubevirt-tekton-tasks-cleanup-vm-rhel9@sha256:28e4975fa4dac22d9da32ed2a10aed039fd957b30140daa36bab2caa998be77a_amd64 as a component of CNV 4.13 for RHEL 9",
"product_id": "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-cleanup-vm-rhel9@sha256:28e4975fa4dac22d9da32ed2a10aed039fd957b30140daa36bab2caa998be77a_amd64"
},
"product_reference": "container-native-virtualization/kubevirt-tekton-tasks-cleanup-vm-rhel9@sha256:28e4975fa4dac22d9da32ed2a10aed039fd957b30140daa36bab2caa998be77a_amd64",
"relates_to_product_reference": "9Base-CNV-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "container-native-virtualization/kubevirt-tekton-tasks-cleanup-vm-rhel9@sha256:b0ff7e812a576ea848590655fc13a85832d5a39f68e7769ceab9da6949da88c7_arm64 as a component of CNV 4.13 for RHEL 9",
"product_id": "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-cleanup-vm-rhel9@sha256:b0ff7e812a576ea848590655fc13a85832d5a39f68e7769ceab9da6949da88c7_arm64"
},
"product_reference": "container-native-virtualization/kubevirt-tekton-tasks-cleanup-vm-rhel9@sha256:b0ff7e812a576ea848590655fc13a85832d5a39f68e7769ceab9da6949da88c7_arm64",
"relates_to_product_reference": "9Base-CNV-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "container-native-virtualization/kubevirt-tekton-tasks-copy-template-rhel9@sha256:4916a6c6b1f9b529187d3b4d5fc99b90157993767b3fe2ad36a9ec77fbb46b10_arm64 as a component of CNV 4.13 for RHEL 9",
"product_id": "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-copy-template-rhel9@sha256:4916a6c6b1f9b529187d3b4d5fc99b90157993767b3fe2ad36a9ec77fbb46b10_arm64"
},
"product_reference": "container-native-virtualization/kubevirt-tekton-tasks-copy-template-rhel9@sha256:4916a6c6b1f9b529187d3b4d5fc99b90157993767b3fe2ad36a9ec77fbb46b10_arm64",
"relates_to_product_reference": "9Base-CNV-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "container-native-virtualization/kubevirt-tekton-tasks-copy-template-rhel9@sha256:f71c36442f1b61cdde7ec58d2c3c78d2039f6d6108e6c35388ef7c1650971fa1_amd64 as a component of CNV 4.13 for RHEL 9",
"product_id": "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-copy-template-rhel9@sha256:f71c36442f1b61cdde7ec58d2c3c78d2039f6d6108e6c35388ef7c1650971fa1_amd64"
},
"product_reference": "container-native-virtualization/kubevirt-tekton-tasks-copy-template-rhel9@sha256:f71c36442f1b61cdde7ec58d2c3c78d2039f6d6108e6c35388ef7c1650971fa1_amd64",
"relates_to_product_reference": "9Base-CNV-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "container-native-virtualization/kubevirt-tekton-tasks-create-datavolume-rhel9@sha256:2ad49cf6e2242a9e5861929d9bcab1305a7fc4e34e708f99cff1d7253aa46167_amd64 as a component of CNV 4.13 for RHEL 9",
"product_id": "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-create-datavolume-rhel9@sha256:2ad49cf6e2242a9e5861929d9bcab1305a7fc4e34e708f99cff1d7253aa46167_amd64"
},
"product_reference": "container-native-virtualization/kubevirt-tekton-tasks-create-datavolume-rhel9@sha256:2ad49cf6e2242a9e5861929d9bcab1305a7fc4e34e708f99cff1d7253aa46167_amd64",
"relates_to_product_reference": "9Base-CNV-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "container-native-virtualization/kubevirt-tekton-tasks-create-datavolume-rhel9@sha256:7112400a4ecb23ee2110bf96372fcf9f96ad648a51aa944627b40eb59539a660_arm64 as a component of CNV 4.13 for RHEL 9",
"product_id": "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-create-datavolume-rhel9@sha256:7112400a4ecb23ee2110bf96372fcf9f96ad648a51aa944627b40eb59539a660_arm64"
},
"product_reference": "container-native-virtualization/kubevirt-tekton-tasks-create-datavolume-rhel9@sha256:7112400a4ecb23ee2110bf96372fcf9f96ad648a51aa944627b40eb59539a660_arm64",
"relates_to_product_reference": "9Base-CNV-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "container-native-virtualization/kubevirt-tekton-tasks-create-vm-from-template-rhel9@sha256:1411c65bbad7302710788327f6964a4bf5bc20ef70d5e46f4a5c6e7a0e7a0161_amd64 as a component of CNV 4.13 for RHEL 9",
"product_id": "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-create-vm-from-template-rhel9@sha256:1411c65bbad7302710788327f6964a4bf5bc20ef70d5e46f4a5c6e7a0e7a0161_amd64"
},
"product_reference": "container-native-virtualization/kubevirt-tekton-tasks-create-vm-from-template-rhel9@sha256:1411c65bbad7302710788327f6964a4bf5bc20ef70d5e46f4a5c6e7a0e7a0161_amd64",
"relates_to_product_reference": "9Base-CNV-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "container-native-virtualization/kubevirt-tekton-tasks-create-vm-from-template-rhel9@sha256:4d962618aa95600c60c9fc8b890186e510de91177d51949e12797a3558e31328_arm64 as a component of CNV 4.13 for RHEL 9",
"product_id": "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-create-vm-from-template-rhel9@sha256:4d962618aa95600c60c9fc8b890186e510de91177d51949e12797a3558e31328_arm64"
},
"product_reference": "container-native-virtualization/kubevirt-tekton-tasks-create-vm-from-template-rhel9@sha256:4d962618aa95600c60c9fc8b890186e510de91177d51949e12797a3558e31328_arm64",
"relates_to_product_reference": "9Base-CNV-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "container-native-virtualization/kubevirt-tekton-tasks-disk-virt-customize-rhel9@sha256:5c23d3f20ea9dcbe7109284d73078ecd516a070e964b844f8d80b1d92ebd55ee_amd64 as a component of CNV 4.13 for RHEL 9",
"product_id": "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-customize-rhel9@sha256:5c23d3f20ea9dcbe7109284d73078ecd516a070e964b844f8d80b1d92ebd55ee_amd64"
},
"product_reference": "container-native-virtualization/kubevirt-tekton-tasks-disk-virt-customize-rhel9@sha256:5c23d3f20ea9dcbe7109284d73078ecd516a070e964b844f8d80b1d92ebd55ee_amd64",
"relates_to_product_reference": "9Base-CNV-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "container-native-virtualization/kubevirt-tekton-tasks-disk-virt-customize-rhel9@sha256:a780244e48c6d4f87446d3754c3eb9ab79c0d54675c189da4a659f7a4d5668ea_arm64 as a component of CNV 4.13 for RHEL 9",
"product_id": "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-customize-rhel9@sha256:a780244e48c6d4f87446d3754c3eb9ab79c0d54675c189da4a659f7a4d5668ea_arm64"
},
"product_reference": "container-native-virtualization/kubevirt-tekton-tasks-disk-virt-customize-rhel9@sha256:a780244e48c6d4f87446d3754c3eb9ab79c0d54675c189da4a659f7a4d5668ea_arm64",
"relates_to_product_reference": "9Base-CNV-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "container-native-virtualization/kubevirt-tekton-tasks-disk-virt-sysprep-rhel9@sha256:84577d949a1bbcaa291c70729127bca4a8994df03068666baa23840877ea8392_arm64 as a component of CNV 4.13 for RHEL 9",
"product_id": "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-sysprep-rhel9@sha256:84577d949a1bbcaa291c70729127bca4a8994df03068666baa23840877ea8392_arm64"
},
"product_reference": "container-native-virtualization/kubevirt-tekton-tasks-disk-virt-sysprep-rhel9@sha256:84577d949a1bbcaa291c70729127bca4a8994df03068666baa23840877ea8392_arm64",
"relates_to_product_reference": "9Base-CNV-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "container-native-virtualization/kubevirt-tekton-tasks-disk-virt-sysprep-rhel9@sha256:aed630a597a090179e1b0e0c117e536df06b67d0f793f91936aa7388c0c5d7eb_amd64 as a component of CNV 4.13 for RHEL 9",
"product_id": "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-sysprep-rhel9@sha256:aed630a597a090179e1b0e0c117e536df06b67d0f793f91936aa7388c0c5d7eb_amd64"
},
"product_reference": "container-native-virtualization/kubevirt-tekton-tasks-disk-virt-sysprep-rhel9@sha256:aed630a597a090179e1b0e0c117e536df06b67d0f793f91936aa7388c0c5d7eb_amd64",
"relates_to_product_reference": "9Base-CNV-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "container-native-virtualization/kubevirt-tekton-tasks-modify-vm-template-rhel9@sha256:31d959b80cf57462e1705684bb7e1b78af26bd2c62f1c9e4e51e1d02199b05a8_arm64 as a component of CNV 4.13 for RHEL 9",
"product_id": "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-modify-vm-template-rhel9@sha256:31d959b80cf57462e1705684bb7e1b78af26bd2c62f1c9e4e51e1d02199b05a8_arm64"
},
"product_reference": "container-native-virtualization/kubevirt-tekton-tasks-modify-vm-template-rhel9@sha256:31d959b80cf57462e1705684bb7e1b78af26bd2c62f1c9e4e51e1d02199b05a8_arm64",
"relates_to_product_reference": "9Base-CNV-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "container-native-virtualization/kubevirt-tekton-tasks-modify-vm-template-rhel9@sha256:66aea526bc10e4c0136ba86e394bbdfe4fbd7f757d6f391a561b51d2ba2f4d46_amd64 as a component of CNV 4.13 for RHEL 9",
"product_id": "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-modify-vm-template-rhel9@sha256:66aea526bc10e4c0136ba86e394bbdfe4fbd7f757d6f391a561b51d2ba2f4d46_amd64"
},
"product_reference": "container-native-virtualization/kubevirt-tekton-tasks-modify-vm-template-rhel9@sha256:66aea526bc10e4c0136ba86e394bbdfe4fbd7f757d6f391a561b51d2ba2f4d46_amd64",
"relates_to_product_reference": "9Base-CNV-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "container-native-virtualization/kubevirt-tekton-tasks-operator-rhel9@sha256:d0cf0e81589f0938de45961eaddfc5ec4782738fd11082de0439b200534259eb_arm64 as a component of CNV 4.13 for RHEL 9",
"product_id": "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-operator-rhel9@sha256:d0cf0e81589f0938de45961eaddfc5ec4782738fd11082de0439b200534259eb_arm64"
},
"product_reference": "container-native-virtualization/kubevirt-tekton-tasks-operator-rhel9@sha256:d0cf0e81589f0938de45961eaddfc5ec4782738fd11082de0439b200534259eb_arm64",
"relates_to_product_reference": "9Base-CNV-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "container-native-virtualization/kubevirt-tekton-tasks-operator-rhel9@sha256:f1b1f5044db6bb945584f9d4f31d020597725a286ef368ed0aca2116abb31beb_amd64 as a component of CNV 4.13 for RHEL 9",
"product_id": "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-operator-rhel9@sha256:f1b1f5044db6bb945584f9d4f31d020597725a286ef368ed0aca2116abb31beb_amd64"
},
"product_reference": "container-native-virtualization/kubevirt-tekton-tasks-operator-rhel9@sha256:f1b1f5044db6bb945584f9d4f31d020597725a286ef368ed0aca2116abb31beb_amd64",
"relates_to_product_reference": "9Base-CNV-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "container-native-virtualization/kubevirt-tekton-tasks-wait-for-vmi-status-rhel9@sha256:39a15d03f113735df03b1a7408227eb9604d942c1f3c1992bcdc7eaf07662711_amd64 as a component of CNV 4.13 for RHEL 9",
"product_id": "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-wait-for-vmi-status-rhel9@sha256:39a15d03f113735df03b1a7408227eb9604d942c1f3c1992bcdc7eaf07662711_amd64"
},
"product_reference": "container-native-virtualization/kubevirt-tekton-tasks-wait-for-vmi-status-rhel9@sha256:39a15d03f113735df03b1a7408227eb9604d942c1f3c1992bcdc7eaf07662711_amd64",
"relates_to_product_reference": "9Base-CNV-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "container-native-virtualization/kubevirt-tekton-tasks-wait-for-vmi-status-rhel9@sha256:afb68af076954fcd18c7a4a1464ea0c2a766e8282eae980051906ed07eaa1707_arm64 as a component of CNV 4.13 for RHEL 9",
"product_id": "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-wait-for-vmi-status-rhel9@sha256:afb68af076954fcd18c7a4a1464ea0c2a766e8282eae980051906ed07eaa1707_arm64"
},
"product_reference": "container-native-virtualization/kubevirt-tekton-tasks-wait-for-vmi-status-rhel9@sha256:afb68af076954fcd18c7a4a1464ea0c2a766e8282eae980051906ed07eaa1707_arm64",
"relates_to_product_reference": "9Base-CNV-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "container-native-virtualization/kubevirt-template-validator-rhel9@sha256:02b22c7e7014b5e72d47fed8b6a268cf307638c5510adf3916c51f7f40a52a08_arm64 as a component of CNV 4.13 for RHEL 9",
"product_id": "9Base-CNV-4.13:container-native-virtualization/kubevirt-template-validator-rhel9@sha256:02b22c7e7014b5e72d47fed8b6a268cf307638c5510adf3916c51f7f40a52a08_arm64"
},
"product_reference": "container-native-virtualization/kubevirt-template-validator-rhel9@sha256:02b22c7e7014b5e72d47fed8b6a268cf307638c5510adf3916c51f7f40a52a08_arm64",
"relates_to_product_reference": "9Base-CNV-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "container-native-virtualization/kubevirt-template-validator-rhel9@sha256:c0264b9271e602f85b2040ef7f207cdfa46038dc4fa6e4738bf196ef88a71cf8_amd64 as a component of CNV 4.13 for RHEL 9",
"product_id": "9Base-CNV-4.13:container-native-virtualization/kubevirt-template-validator-rhel9@sha256:c0264b9271e602f85b2040ef7f207cdfa46038dc4fa6e4738bf196ef88a71cf8_amd64"
},
"product_reference": "container-native-virtualization/kubevirt-template-validator-rhel9@sha256:c0264b9271e602f85b2040ef7f207cdfa46038dc4fa6e4738bf196ef88a71cf8_amd64",
"relates_to_product_reference": "9Base-CNV-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "container-native-virtualization/libguestfs-tools-rhel9@sha256:29ae84575bbca24553cf649256759fd96ff286971d80bc2db129154a7df9b283_amd64 as a component of CNV 4.13 for RHEL 9",
"product_id": "9Base-CNV-4.13:container-native-virtualization/libguestfs-tools-rhel9@sha256:29ae84575bbca24553cf649256759fd96ff286971d80bc2db129154a7df9b283_amd64"
},
"product_reference": "container-native-virtualization/libguestfs-tools-rhel9@sha256:29ae84575bbca24553cf649256759fd96ff286971d80bc2db129154a7df9b283_amd64",
"relates_to_product_reference": "9Base-CNV-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "container-native-virtualization/libguestfs-tools-rhel9@sha256:6558f60343e068b032167e2340b2c549c5f0258acc5d2614b60966ce79408b01_arm64 as a component of CNV 4.13 for RHEL 9",
"product_id": "9Base-CNV-4.13:container-native-virtualization/libguestfs-tools-rhel9@sha256:6558f60343e068b032167e2340b2c549c5f0258acc5d2614b60966ce79408b01_arm64"
},
"product_reference": "container-native-virtualization/libguestfs-tools-rhel9@sha256:6558f60343e068b032167e2340b2c549c5f0258acc5d2614b60966ce79408b01_arm64",
"relates_to_product_reference": "9Base-CNV-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "container-native-virtualization/multus-dynamic-networks-rhel9@sha256:3ecb0162a4b01d1590bf209d717b32a4f0835910d9979823f18c24acba41b503_arm64 as a component of CNV 4.13 for RHEL 9",
"product_id": "9Base-CNV-4.13:container-native-virtualization/multus-dynamic-networks-rhel9@sha256:3ecb0162a4b01d1590bf209d717b32a4f0835910d9979823f18c24acba41b503_arm64"
},
"product_reference": "container-native-virtualization/multus-dynamic-networks-rhel9@sha256:3ecb0162a4b01d1590bf209d717b32a4f0835910d9979823f18c24acba41b503_arm64",
"relates_to_product_reference": "9Base-CNV-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "container-native-virtualization/multus-dynamic-networks-rhel9@sha256:b7f68b6420009e21380d32d6459193aae45e93be9533debe17cb3108571b36b8_amd64 as a component of CNV 4.13 for RHEL 9",
"product_id": "9Base-CNV-4.13:container-native-virtualization/multus-dynamic-networks-rhel9@sha256:b7f68b6420009e21380d32d6459193aae45e93be9533debe17cb3108571b36b8_amd64"
},
"product_reference": "container-native-virtualization/multus-dynamic-networks-rhel9@sha256:b7f68b6420009e21380d32d6459193aae45e93be9533debe17cb3108571b36b8_amd64",
"relates_to_product_reference": "9Base-CNV-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "container-native-virtualization/ovs-cni-plugin-rhel9@sha256:0f1d372f418744e0aff59ecb0a38f53178aac9c2e9eecfd38aa25ed83e0d1360_arm64 as a component of CNV 4.13 for RHEL 9",
"product_id": "9Base-CNV-4.13:container-native-virtualization/ovs-cni-plugin-rhel9@sha256:0f1d372f418744e0aff59ecb0a38f53178aac9c2e9eecfd38aa25ed83e0d1360_arm64"
},
"product_reference": "container-native-virtualization/ovs-cni-plugin-rhel9@sha256:0f1d372f418744e0aff59ecb0a38f53178aac9c2e9eecfd38aa25ed83e0d1360_arm64",
"relates_to_product_reference": "9Base-CNV-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "container-native-virtualization/ovs-cni-plugin-rhel9@sha256:e8e7a44edbf1713fe74de5c4b8f691cce78f4440c4a32a16ba9ad16694a55396_amd64 as a component of CNV 4.13 for RHEL 9",
"product_id": "9Base-CNV-4.13:container-native-virtualization/ovs-cni-plugin-rhel9@sha256:e8e7a44edbf1713fe74de5c4b8f691cce78f4440c4a32a16ba9ad16694a55396_amd64"
},
"product_reference": "container-native-virtualization/ovs-cni-plugin-rhel9@sha256:e8e7a44edbf1713fe74de5c4b8f691cce78f4440c4a32a16ba9ad16694a55396_amd64",
"relates_to_product_reference": "9Base-CNV-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "container-native-virtualization/virt-api-rhel9@sha256:e68416321ca8c74a547b3d35897f54813c03481143e402e9bdc4daf315e35b5d_arm64 as a component of CNV 4.13 for RHEL 9",
"product_id": "9Base-CNV-4.13:container-native-virtualization/virt-api-rhel9@sha256:e68416321ca8c74a547b3d35897f54813c03481143e402e9bdc4daf315e35b5d_arm64"
},
"product_reference": "container-native-virtualization/virt-api-rhel9@sha256:e68416321ca8c74a547b3d35897f54813c03481143e402e9bdc4daf315e35b5d_arm64",
"relates_to_product_reference": "9Base-CNV-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "container-native-virtualization/virt-api-rhel9@sha256:fdb4ca1bb8b310d713d9c7e88f7d091f4460aa942dbeca5ebcf17281a06daffe_amd64 as a component of CNV 4.13 for RHEL 9",
"product_id": "9Base-CNV-4.13:container-native-virtualization/virt-api-rhel9@sha256:fdb4ca1bb8b310d713d9c7e88f7d091f4460aa942dbeca5ebcf17281a06daffe_amd64"
},
"product_reference": "container-native-virtualization/virt-api-rhel9@sha256:fdb4ca1bb8b310d713d9c7e88f7d091f4460aa942dbeca5ebcf17281a06daffe_amd64",
"relates_to_product_reference": "9Base-CNV-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "container-native-virtualization/virt-artifacts-server-rhel9@sha256:33d11c1832b49df39c1fca62bad40dbc5c30a452248339aaef449ac99509accb_arm64 as a component of CNV 4.13 for RHEL 9",
"product_id": "9Base-CNV-4.13:container-native-virtualization/virt-artifacts-server-rhel9@sha256:33d11c1832b49df39c1fca62bad40dbc5c30a452248339aaef449ac99509accb_arm64"
},
"product_reference": "container-native-virtualization/virt-artifacts-server-rhel9@sha256:33d11c1832b49df39c1fca62bad40dbc5c30a452248339aaef449ac99509accb_arm64",
"relates_to_product_reference": "9Base-CNV-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "container-native-virtualization/virt-artifacts-server-rhel9@sha256:81fc61b714baecb5a89fa6c0749c14566e0661b8e184ca602fc2e03b9cf431ee_amd64 as a component of CNV 4.13 for RHEL 9",
"product_id": "9Base-CNV-4.13:container-native-virtualization/virt-artifacts-server-rhel9@sha256:81fc61b714baecb5a89fa6c0749c14566e0661b8e184ca602fc2e03b9cf431ee_amd64"
},
"product_reference": "container-native-virtualization/virt-artifacts-server-rhel9@sha256:81fc61b714baecb5a89fa6c0749c14566e0661b8e184ca602fc2e03b9cf431ee_amd64",
"relates_to_product_reference": "9Base-CNV-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "container-native-virtualization/virt-cdi-apiserver-rhel9@sha256:f6128a63344ed2129f5bce648ddcfaa2869d31cde4b93328d3c22534b97ade10_arm64 as a component of CNV 4.13 for RHEL 9",
"product_id": "9Base-CNV-4.13:container-native-virtualization/virt-cdi-apiserver-rhel9@sha256:f6128a63344ed2129f5bce648ddcfaa2869d31cde4b93328d3c22534b97ade10_arm64"
},
"product_reference": "container-native-virtualization/virt-cdi-apiserver-rhel9@sha256:f6128a63344ed2129f5bce648ddcfaa2869d31cde4b93328d3c22534b97ade10_arm64",
"relates_to_product_reference": "9Base-CNV-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "container-native-virtualization/virt-cdi-apiserver-rhel9@sha256:feca273a691d09445c6cff6d36b5d590735e867656a9898ce0d89744d98e8006_amd64 as a component of CNV 4.13 for RHEL 9",
"product_id": "9Base-CNV-4.13:container-native-virtualization/virt-cdi-apiserver-rhel9@sha256:feca273a691d09445c6cff6d36b5d590735e867656a9898ce0d89744d98e8006_amd64"
},
"product_reference": "container-native-virtualization/virt-cdi-apiserver-rhel9@sha256:feca273a691d09445c6cff6d36b5d590735e867656a9898ce0d89744d98e8006_amd64",
"relates_to_product_reference": "9Base-CNV-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "container-native-virtualization/virt-cdi-cloner-rhel9@sha256:68e3b9b0291b4fb277ac430269ffce11d13b0a7688cf2ffcdb7f98759c36b4db_amd64 as a component of CNV 4.13 for RHEL 9",
"product_id": "9Base-CNV-4.13:container-native-virtualization/virt-cdi-cloner-rhel9@sha256:68e3b9b0291b4fb277ac430269ffce11d13b0a7688cf2ffcdb7f98759c36b4db_amd64"
},
"product_reference": "container-native-virtualization/virt-cdi-cloner-rhel9@sha256:68e3b9b0291b4fb277ac430269ffce11d13b0a7688cf2ffcdb7f98759c36b4db_amd64",
"relates_to_product_reference": "9Base-CNV-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "container-native-virtualization/virt-cdi-cloner-rhel9@sha256:6ac212767481bef64d8a7d0252bb8089c0f9751fad4a355aef71bd49dad2ad07_arm64 as a component of CNV 4.13 for RHEL 9",
"product_id": "9Base-CNV-4.13:container-native-virtualization/virt-cdi-cloner-rhel9@sha256:6ac212767481bef64d8a7d0252bb8089c0f9751fad4a355aef71bd49dad2ad07_arm64"
},
"product_reference": "container-native-virtualization/virt-cdi-cloner-rhel9@sha256:6ac212767481bef64d8a7d0252bb8089c0f9751fad4a355aef71bd49dad2ad07_arm64",
"relates_to_product_reference": "9Base-CNV-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "container-native-virtualization/virt-cdi-controller-rhel9@sha256:65f5263275d9f0a12b8fb057d82adf678778039ec873ca9bde182dea3413c9f1_arm64 as a component of CNV 4.13 for RHEL 9",
"product_id": "9Base-CNV-4.13:container-native-virtualization/virt-cdi-controller-rhel9@sha256:65f5263275d9f0a12b8fb057d82adf678778039ec873ca9bde182dea3413c9f1_arm64"
},
"product_reference": "container-native-virtualization/virt-cdi-controller-rhel9@sha256:65f5263275d9f0a12b8fb057d82adf678778039ec873ca9bde182dea3413c9f1_arm64",
"relates_to_product_reference": "9Base-CNV-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "container-native-virtualization/virt-cdi-controller-rhel9@sha256:d9e62b2019328be258489ac852eef25f8b1233f29abac6bcea5b406329f97fed_amd64 as a component of CNV 4.13 for RHEL 9",
"product_id": "9Base-CNV-4.13:container-native-virtualization/virt-cdi-controller-rhel9@sha256:d9e62b2019328be258489ac852eef25f8b1233f29abac6bcea5b406329f97fed_amd64"
},
"product_reference": "container-native-virtualization/virt-cdi-controller-rhel9@sha256:d9e62b2019328be258489ac852eef25f8b1233f29abac6bcea5b406329f97fed_amd64",
"relates_to_product_reference": "9Base-CNV-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "container-native-virtualization/virt-cdi-importer-rhel9@sha256:00a6d9d24ca1466d450b02269ec3144fc7550f0e5c696e869fbf7ce10cae6093_arm64 as a component of CNV 4.13 for RHEL 9",
"product_id": "9Base-CNV-4.13:container-native-virtualization/virt-cdi-importer-rhel9@sha256:00a6d9d24ca1466d450b02269ec3144fc7550f0e5c696e869fbf7ce10cae6093_arm64"
},
"product_reference": "container-native-virtualization/virt-cdi-importer-rhel9@sha256:00a6d9d24ca1466d450b02269ec3144fc7550f0e5c696e869fbf7ce10cae6093_arm64",
"relates_to_product_reference": "9Base-CNV-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "container-native-virtualization/virt-cdi-importer-rhel9@sha256:2df07fb21a3575e74aa16ded20129828f2300cd33e8ab369b0362062d49e62d0_amd64 as a component of CNV 4.13 for RHEL 9",
"product_id": "9Base-CNV-4.13:container-native-virtualization/virt-cdi-importer-rhel9@sha256:2df07fb21a3575e74aa16ded20129828f2300cd33e8ab369b0362062d49e62d0_amd64"
},
"product_reference": "container-native-virtualization/virt-cdi-importer-rhel9@sha256:2df07fb21a3575e74aa16ded20129828f2300cd33e8ab369b0362062d49e62d0_amd64",
"relates_to_product_reference": "9Base-CNV-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "container-native-virtualization/virt-cdi-operator-rhel9@sha256:20ec064750faedd97d11b797c8c1d9a1db5d60d7d76e82e65cfd05eb79d65e29_arm64 as a component of CNV 4.13 for RHEL 9",
"product_id": "9Base-CNV-4.13:container-native-virtualization/virt-cdi-operator-rhel9@sha256:20ec064750faedd97d11b797c8c1d9a1db5d60d7d76e82e65cfd05eb79d65e29_arm64"
},
"product_reference": "container-native-virtualization/virt-cdi-operator-rhel9@sha256:20ec064750faedd97d11b797c8c1d9a1db5d60d7d76e82e65cfd05eb79d65e29_arm64",
"relates_to_product_reference": "9Base-CNV-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "container-native-virtualization/virt-cdi-operator-rhel9@sha256:802ee8923d9d8e406b23911406f9748756c0ef4d6954e9e2fd5fb4bdf91dde9a_amd64 as a component of CNV 4.13 for RHEL 9",
"product_id": "9Base-CNV-4.13:container-native-virtualization/virt-cdi-operator-rhel9@sha256:802ee8923d9d8e406b23911406f9748756c0ef4d6954e9e2fd5fb4bdf91dde9a_amd64"
},
"product_reference": "container-native-virtualization/virt-cdi-operator-rhel9@sha256:802ee8923d9d8e406b23911406f9748756c0ef4d6954e9e2fd5fb4bdf91dde9a_amd64",
"relates_to_product_reference": "9Base-CNV-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "container-native-virtualization/virt-cdi-uploadproxy-rhel9@sha256:392d0f61f462c707adfdc21e4239c5c09d8520a80486b41d9d9ae479267d6124_arm64 as a component of CNV 4.13 for RHEL 9",
"product_id": "9Base-CNV-4.13:container-native-virtualization/virt-cdi-uploadproxy-rhel9@sha256:392d0f61f462c707adfdc21e4239c5c09d8520a80486b41d9d9ae479267d6124_arm64"
},
"product_reference": "container-native-virtualization/virt-cdi-uploadproxy-rhel9@sha256:392d0f61f462c707adfdc21e4239c5c09d8520a80486b41d9d9ae479267d6124_arm64",
"relates_to_product_reference": "9Base-CNV-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "container-native-virtualization/virt-cdi-uploadproxy-rhel9@sha256:6775f34353eec8f35bead9411dde155530d079bb8d51582fb1f2aacc27dbde1d_amd64 as a component of CNV 4.13 for RHEL 9",
"product_id": "9Base-CNV-4.13:container-native-virtualization/virt-cdi-uploadproxy-rhel9@sha256:6775f34353eec8f35bead9411dde155530d079bb8d51582fb1f2aacc27dbde1d_amd64"
},
"product_reference": "container-native-virtualization/virt-cdi-uploadproxy-rhel9@sha256:6775f34353eec8f35bead9411dde155530d079bb8d51582fb1f2aacc27dbde1d_amd64",
"relates_to_product_reference": "9Base-CNV-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "container-native-virtualization/virt-cdi-uploadserver-rhel9@sha256:4528c24672689cfb6505761b6b108fbcc04488192733f23d2bfe39cd42a1d743_arm64 as a component of CNV 4.13 for RHEL 9",
"product_id": "9Base-CNV-4.13:container-native-virtualization/virt-cdi-uploadserver-rhel9@sha256:4528c24672689cfb6505761b6b108fbcc04488192733f23d2bfe39cd42a1d743_arm64"
},
"product_reference": "container-native-virtualization/virt-cdi-uploadserver-rhel9@sha256:4528c24672689cfb6505761b6b108fbcc04488192733f23d2bfe39cd42a1d743_arm64",
"relates_to_product_reference": "9Base-CNV-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "container-native-virtualization/virt-cdi-uploadserver-rhel9@sha256:b22048390387380af94e267c8a9a66813c515997456d59d8ebac1486916b6585_amd64 as a component of CNV 4.13 for RHEL 9",
"product_id": "9Base-CNV-4.13:container-native-virtualization/virt-cdi-uploadserver-rhel9@sha256:b22048390387380af94e267c8a9a66813c515997456d59d8ebac1486916b6585_amd64"
},
"product_reference": "container-native-virtualization/virt-cdi-uploadserver-rhel9@sha256:b22048390387380af94e267c8a9a66813c515997456d59d8ebac1486916b6585_amd64",
"relates_to_product_reference": "9Base-CNV-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "container-native-virtualization/virt-controller-rhel9@sha256:3e7880149ee9a68286e390beb3d9779f7403c30fc5136e5370e0e4690a3fd243_amd64 as a component of CNV 4.13 for RHEL 9",
"product_id": "9Base-CNV-4.13:container-native-virtualization/virt-controller-rhel9@sha256:3e7880149ee9a68286e390beb3d9779f7403c30fc5136e5370e0e4690a3fd243_amd64"
},
"product_reference": "container-native-virtualization/virt-controller-rhel9@sha256:3e7880149ee9a68286e390beb3d9779f7403c30fc5136e5370e0e4690a3fd243_amd64",
"relates_to_product_reference": "9Base-CNV-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "container-native-virtualization/virt-controller-rhel9@sha256:970edc281d7a731e9f7e8c2d4440fe48a221e5e355d5235c5413b4c3adb28503_arm64 as a component of CNV 4.13 for RHEL 9",
"product_id": "9Base-CNV-4.13:container-native-virtualization/virt-controller-rhel9@sha256:970edc281d7a731e9f7e8c2d4440fe48a221e5e355d5235c5413b4c3adb28503_arm64"
},
"product_reference": "container-native-virtualization/virt-controller-rhel9@sha256:970edc281d7a731e9f7e8c2d4440fe48a221e5e355d5235c5413b4c3adb28503_arm64",
"relates_to_product_reference": "9Base-CNV-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "container-native-virtualization/virt-exportproxy-rhel9@sha256:1bda34d5bff734ad997202f29a5ff6f7362fd79fa90511a422442ef2e3681198_amd64 as a component of CNV 4.13 for RHEL 9",
"product_id": "9Base-CNV-4.13:container-native-virtualization/virt-exportproxy-rhel9@sha256:1bda34d5bff734ad997202f29a5ff6f7362fd79fa90511a422442ef2e3681198_amd64"
},
"product_reference": "container-native-virtualization/virt-exportproxy-rhel9@sha256:1bda34d5bff734ad997202f29a5ff6f7362fd79fa90511a422442ef2e3681198_amd64",
"relates_to_product_reference": "9Base-CNV-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "container-native-virtualization/virt-exportproxy-rhel9@sha256:de3c4afbf7669b98517cbef2490ec186f0553dd97b05bed80ec36dd883fe507b_arm64 as a component of CNV 4.13 for RHEL 9",
"product_id": "9Base-CNV-4.13:container-native-virtualization/virt-exportproxy-rhel9@sha256:de3c4afbf7669b98517cbef2490ec186f0553dd97b05bed80ec36dd883fe507b_arm64"
},
"product_reference": "container-native-virtualization/virt-exportproxy-rhel9@sha256:de3c4afbf7669b98517cbef2490ec186f0553dd97b05bed80ec36dd883fe507b_arm64",
"relates_to_product_reference": "9Base-CNV-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "container-native-virtualization/virt-exportserver-rhel9@sha256:3f7f98645176d42c63cca5c0fc3182a03121af87446ca421b6c72baf07dfca0d_arm64 as a component of CNV 4.13 for RHEL 9",
"product_id": "9Base-CNV-4.13:container-native-virtualization/virt-exportserver-rhel9@sha256:3f7f98645176d42c63cca5c0fc3182a03121af87446ca421b6c72baf07dfca0d_arm64"
},
"product_reference": "container-native-virtualization/virt-exportserver-rhel9@sha256:3f7f98645176d42c63cca5c0fc3182a03121af87446ca421b6c72baf07dfca0d_arm64",
"relates_to_product_reference": "9Base-CNV-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "container-native-virtualization/virt-exportserver-rhel9@sha256:8f12955cd777eb2409037a6968aa92f50c99d6e07e722951dbcfd0c8c9829b5e_amd64 as a component of CNV 4.13 for RHEL 9",
"product_id": "9Base-CNV-4.13:container-native-virtualization/virt-exportserver-rhel9@sha256:8f12955cd777eb2409037a6968aa92f50c99d6e07e722951dbcfd0c8c9829b5e_amd64"
},
"product_reference": "container-native-virtualization/virt-exportserver-rhel9@sha256:8f12955cd777eb2409037a6968aa92f50c99d6e07e722951dbcfd0c8c9829b5e_amd64",
"relates_to_product_reference": "9Base-CNV-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "container-native-virtualization/virt-handler-rhel9@sha256:5fc47110d866d8048aec50689090ce10705d19d3bb48d2b06727d6d569003af7_arm64 as a component of CNV 4.13 for RHEL 9",
"product_id": "9Base-CNV-4.13:container-native-virtualization/virt-handler-rhel9@sha256:5fc47110d866d8048aec50689090ce10705d19d3bb48d2b06727d6d569003af7_arm64"
},
"product_reference": "container-native-virtualization/virt-handler-rhel9@sha256:5fc47110d866d8048aec50689090ce10705d19d3bb48d2b06727d6d569003af7_arm64",
"relates_to_product_reference": "9Base-CNV-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "container-native-virtualization/virt-handler-rhel9@sha256:84ba79ae9658699147d2493df2582ab6df10adbff4d44a533c3fe6a9f45f9691_amd64 as a component of CNV 4.13 for RHEL 9",
"product_id": "9Base-CNV-4.13:container-native-virtualization/virt-handler-rhel9@sha256:84ba79ae9658699147d2493df2582ab6df10adbff4d44a533c3fe6a9f45f9691_amd64"
},
"product_reference": "container-native-virtualization/virt-handler-rhel9@sha256:84ba79ae9658699147d2493df2582ab6df10adbff4d44a533c3fe6a9f45f9691_amd64",
"relates_to_product_reference": "9Base-CNV-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "container-native-virtualization/virt-launcher-rhel9@sha256:4990d40d9987d5126d105dd45be2501eaded248cb61bdde5ea8d359bc1e7ebef_amd64 as a component of CNV 4.13 for RHEL 9",
"product_id": "9Base-CNV-4.13:container-native-virtualization/virt-launcher-rhel9@sha256:4990d40d9987d5126d105dd45be2501eaded248cb61bdde5ea8d359bc1e7ebef_amd64"
},
"product_reference": "container-native-virtualization/virt-launcher-rhel9@sha256:4990d40d9987d5126d105dd45be2501eaded248cb61bdde5ea8d359bc1e7ebef_amd64",
"relates_to_product_reference": "9Base-CNV-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "container-native-virtualization/virt-launcher-rhel9@sha256:95aeacb98209e0baef27ce0e02fbac38d693cea74808fc77107efda0f344bcb5_arm64 as a component of CNV 4.13 for RHEL 9",
"product_id": "9Base-CNV-4.13:container-native-virtualization/virt-launcher-rhel9@sha256:95aeacb98209e0baef27ce0e02fbac38d693cea74808fc77107efda0f344bcb5_arm64"
},
"product_reference": "container-native-virtualization/virt-launcher-rhel9@sha256:95aeacb98209e0baef27ce0e02fbac38d693cea74808fc77107efda0f344bcb5_arm64",
"relates_to_product_reference": "9Base-CNV-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "container-native-virtualization/virt-operator-rhel9@sha256:5c1a7e4ed2061938987b900a2394f07121d4037350c9bb6485213a2adfea787d_amd64 as a component of CNV 4.13 for RHEL 9",
"product_id": "9Base-CNV-4.13:container-native-virtualization/virt-operator-rhel9@sha256:5c1a7e4ed2061938987b900a2394f07121d4037350c9bb6485213a2adfea787d_amd64"
},
"product_reference": "container-native-virtualization/virt-operator-rhel9@sha256:5c1a7e4ed2061938987b900a2394f07121d4037350c9bb6485213a2adfea787d_amd64",
"relates_to_product_reference": "9Base-CNV-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "container-native-virtualization/virt-operator-rhel9@sha256:66b1b3b379121d6411ba22283e7d991617177330c93746d37753ab7812b9a00b_arm64 as a component of CNV 4.13 for RHEL 9",
"product_id": "9Base-CNV-4.13:container-native-virtualization/virt-operator-rhel9@sha256:66b1b3b379121d6411ba22283e7d991617177330c93746d37753ab7812b9a00b_arm64"
},
"product_reference": "container-native-virtualization/virt-operator-rhel9@sha256:66b1b3b379121d6411ba22283e7d991617177330c93746d37753ab7812b9a00b_arm64",
"relates_to_product_reference": "9Base-CNV-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "container-native-virtualization/virtio-win-rhel9@sha256:8735f51da918408a8826601c082d1b29accf26d59b9978da89b980cb509c1102_arm64 as a component of CNV 4.13 for RHEL 9",
"product_id": "9Base-CNV-4.13:container-native-virtualization/virtio-win-rhel9@sha256:8735f51da918408a8826601c082d1b29accf26d59b9978da89b980cb509c1102_arm64"
},
"product_reference": "container-native-virtualization/virtio-win-rhel9@sha256:8735f51da918408a8826601c082d1b29accf26d59b9978da89b980cb509c1102_arm64",
"relates_to_product_reference": "9Base-CNV-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "container-native-virtualization/virtio-win-rhel9@sha256:d147d2a6eb6f907d1e88f61aaca83596853bc72164583d6dda2b1154b490de25_amd64 as a component of CNV 4.13 for RHEL 9",
"product_id": "9Base-CNV-4.13:container-native-virtualization/virtio-win-rhel9@sha256:d147d2a6eb6f907d1e88f61aaca83596853bc72164583d6dda2b1154b490de25_amd64"
},
"product_reference": "container-native-virtualization/virtio-win-rhel9@sha256:d147d2a6eb6f907d1e88f61aaca83596853bc72164583d6dda2b1154b490de25_amd64",
"relates_to_product_reference": "9Base-CNV-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "container-native-virtualization/vm-console-proxy-rhel9@sha256:70a8d0cd66182c25e02679540bae1368b2a9cf687532b58dba41ef30c5ca00c1_arm64 as a component of CNV 4.13 for RHEL 9",
"product_id": "9Base-CNV-4.13:container-native-virtualization/vm-console-proxy-rhel9@sha256:70a8d0cd66182c25e02679540bae1368b2a9cf687532b58dba41ef30c5ca00c1_arm64"
},
"product_reference": "container-native-virtualization/vm-console-proxy-rhel9@sha256:70a8d0cd66182c25e02679540bae1368b2a9cf687532b58dba41ef30c5ca00c1_arm64",
"relates_to_product_reference": "9Base-CNV-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "container-native-virtualization/vm-console-proxy-rhel9@sha256:7ca921f98f6d81a126907127a611146fb53397869a628678faa1e289c01d22b2_amd64 as a component of CNV 4.13 for RHEL 9",
"product_id": "9Base-CNV-4.13:container-native-virtualization/vm-console-proxy-rhel9@sha256:7ca921f98f6d81a126907127a611146fb53397869a628678faa1e289c01d22b2_amd64"
},
"product_reference": "container-native-virtualization/vm-console-proxy-rhel9@sha256:7ca921f98f6d81a126907127a611146fb53397869a628678faa1e289c01d22b2_amd64",
"relates_to_product_reference": "9Base-CNV-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "container-native-virtualization/vm-network-latency-checkup-rhel9@sha256:503ea7ac914a9b54e9d665a0227ee0b5d5200cdb5d692aa94c07dd1518d91b70_arm64 as a component of CNV 4.13 for RHEL 9",
"product_id": "9Base-CNV-4.13:container-native-virtualization/vm-network-latency-checkup-rhel9@sha256:503ea7ac914a9b54e9d665a0227ee0b5d5200cdb5d692aa94c07dd1518d91b70_arm64"
},
"product_reference": "container-native-virtualization/vm-network-latency-checkup-rhel9@sha256:503ea7ac914a9b54e9d665a0227ee0b5d5200cdb5d692aa94c07dd1518d91b70_arm64",
"relates_to_product_reference": "9Base-CNV-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "container-native-virtualization/vm-network-latency-checkup-rhel9@sha256:59fd965975bccf641a0fa7aa01374d45057bd03cda7528248a84b60b1205bf57_amd64 as a component of CNV 4.13 for RHEL 9",
"product_id": "9Base-CNV-4.13:container-native-virtualization/vm-network-latency-checkup-rhel9@sha256:59fd965975bccf641a0fa7aa01374d45057bd03cda7528248a84b60b1205bf57_amd64"
},
"product_reference": "container-native-virtualization/vm-network-latency-checkup-rhel9@sha256:59fd965975bccf641a0fa7aa01374d45057bd03cda7528248a84b60b1205bf57_amd64",
"relates_to_product_reference": "9Base-CNV-4.13"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Adam Korczynski"
],
"organization": "ADA Logics"
},
{
"names": [
"OSS-Fuzz"
]
}
],
"cve": "CVE-2022-2879",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"discovery_date": "2022-10-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2132867"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the golang package, where Reader.Read does not set a limit on the maximum size of file headers. After fixing, Reader.Read limits the maximum size of header blocks to 1 MiB. This flaw allows a maliciously crafted archive to cause Read to allocate unbounded amounts of memory, potentially causing resource exhaustion or panic.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: archive/tar: github.com/vbatts/tar-split: unbounded memory consumption when reading headers",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The opportunity for a Denial of Service is limited to the golang runtime. In the case of OpenShift Container Platform, this would be restricted within each individual container. There are multiple layers of guide rails (Golang\u2019s Garbage Collector; OpenShift\u2019s resource constraints imposed at the container and cluster levels) which would require a malicious user to continue submitting attacks for there to be any enduring impact. They would also need access to external server resources to be able to send a massive volume of requests to cause a significant impact on server operations.\n\n\nThis flaw additionally affects the github.com/vbatts/tar-split library and was fixed in v0.12.1.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"9Base-CNV-4.13:container-native-virtualization/bridge-marker-rhel9@sha256:8eac196b30a648989cdca5cb153a3bc3d34e47339acba0e4f760bd366496c99d_amd64",
"9Base-CNV-4.13:container-native-virtualization/bridge-marker-rhel9@sha256:e8a55aee3d75a316bb0d7a554c737198823df04b3c05e481c17e45eb2153bced_arm64",
"9Base-CNV-4.13:container-native-virtualization/cluster-network-addons-operator-rhel9@sha256:3bff33e3f40cd1e2b519c2db56734d4bb8df883e155c2f20b1cb9d3d184daec1_amd64",
"9Base-CNV-4.13:container-native-virtualization/cluster-network-addons-operator-rhel9@sha256:f439d2f420bb59eb1d5af14ce2002648d0cfc155d1a1466c8aac9b661fe902b8_arm64",
"9Base-CNV-4.13:container-native-virtualization/cnv-containernetworking-plugins-rhel9@sha256:89f22e541f61a660c9aa9f38ef58e80b84a0517f74e84292107fc252c25465c9_arm64",
"9Base-CNV-4.13:container-native-virtualization/cnv-containernetworking-plugins-rhel9@sha256:bf471997e54e4a75b0d71f492ab295787fdbb14d8c85c4ea8c03f0552dbc3755_amd64",
"9Base-CNV-4.13:container-native-virtualization/cnv-must-gather-rhel9@sha256:9e8efd76924958eb605401abdac08eba97fb83a1ada383bc87a7fb7c87b3a455_arm64",
"9Base-CNV-4.13:container-native-virtualization/cnv-must-gather-rhel9@sha256:b9fc32b5fabedd65a4c3a471879c808af2087277de4278adaa115a732f0468da_amd64",
"9Base-CNV-4.13:container-native-virtualization/hco-bundle-registry-rhel9@sha256:60e89d7a99ff9f20e974430b802dd724a3bb6fa1e01e5a62daad98ac487b3063_amd64",
"9Base-CNV-4.13:container-native-virtualization/hco-bundle-registry-rhel9@sha256:dd20b138045ef1424d83a47e7abcfcbb2ac54577dcec5ed3c186390aaa4c9d84_arm64",
"9Base-CNV-4.13:container-native-virtualization/hostpath-csi-driver-rhel9@sha256:61e2824853d51347593ad909a5e546cd92e4216d6a1df5dffb50dd9cba277cce_amd64",
"9Base-CNV-4.13:container-native-virtualization/hostpath-csi-driver-rhel9@sha256:676d4c23a5f60dd331728af056b0a6b2d3358ac88da23299b1a98dfaca8f288e_arm64",
"9Base-CNV-4.13:container-native-virtualization/hostpath-provisioner-operator-rhel9@sha256:515be94be496c67f5b8fd5f4832fe4385e56476e6589897d6b9fbb9bb2b00f32_amd64",
"9Base-CNV-4.13:container-native-virtualization/hostpath-provisioner-operator-rhel9@sha256:571ae805641dea11646028c946039983c7fd82f138b915dcb8b80c39b465e63c_arm64",
"9Base-CNV-4.13:container-native-virtualization/hostpath-provisioner-rhel9@sha256:ac3fe350bedd6bc43596444ba0f279ccf8a144ab14ac5a9b80ea71c46390b7b4_amd64",
"9Base-CNV-4.13:container-native-virtualization/hostpath-provisioner-rhel9@sha256:d4ed87745b7ee2acca2d83e2c91c2f6dced1903c81495b50f2559b3ba2dde287_arm64",
"9Base-CNV-4.13:container-native-virtualization/hyperconverged-cluster-operator-rhel9@sha256:e5ab9f3be59d3568e3d672ab374efb16990ccf92192eac4e1244b10fcd7423e2_amd64",
"9Base-CNV-4.13:container-native-virtualization/hyperconverged-cluster-operator-rhel9@sha256:e681560b184189df03fc84c8a712f32289f42573dd348cda394b19565eb6eca8_arm64",
"9Base-CNV-4.13:container-native-virtualization/hyperconverged-cluster-webhook-rhel9@sha256:06d036d320b3027bb8370bb8e0f6fe8c9f0ec9bca7aac3b5c53698ba4a170042_arm64",
"9Base-CNV-4.13:container-native-virtualization/hyperconverged-cluster-webhook-rhel9@sha256:b5a01336180aad017df62cf8e652f2491b8263ba7e4dd07f858db1ef1924cf2f_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubemacpool-rhel9@sha256:4d190d81eeb3fbe9ed56cf3548dc83a3f81641bfdafa7b42dcfb0d2512566644_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubemacpool-rhel9@sha256:59862a59854f0d5b83dc25ba119f9586a8aff42b6e60d1922f8ae7b4567309ff_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubesecondarydns-rhel9@sha256:121d30d78cc57731ea2242ef2c32430890ac66c2723e65608d5e2f26c3f515cd_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubesecondarydns-rhel9@sha256:b1838f3c8ba3d8113bddea17b78c21e1c1490e2a4a07ea77014edee523d06347_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-console-plugin-rhel9@sha256:86a4b1e3d6ad1d56302c9c058f8bc5826dcfe6c46fb3e0ddaa06818645039020_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-console-plugin-rhel9@sha256:ffb2acd9ae09c1ef9ca756f5eaf6087d0a3957cfc824543949d25f556a97744d_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-dpdk-checkup-rhel9@sha256:525aceb9396010ebcdba14040f267889b807cd84db8e5b4030429b51f0fbf5fe_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-dpdk-checkup-rhel9@sha256:553c4686f56c66cc1e3c5ad9d4051f139d43f821eac3abb98ca5cdb8b5dfe202_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-ssp-operator-rhel9@sha256:901e6cad9534c7bd7c4018c60bccfe49d7280fba5a9901ab4c4d15e9345288c4_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-ssp-operator-rhel9@sha256:badeb0f65f543b209f6af761729d9778b7b73b97d55044016dfba3f38a1f6f18_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-cleanup-vm-rhel9@sha256:28e4975fa4dac22d9da32ed2a10aed039fd957b30140daa36bab2caa998be77a_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-cleanup-vm-rhel9@sha256:b0ff7e812a576ea848590655fc13a85832d5a39f68e7769ceab9da6949da88c7_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-copy-template-rhel9@sha256:4916a6c6b1f9b529187d3b4d5fc99b90157993767b3fe2ad36a9ec77fbb46b10_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-copy-template-rhel9@sha256:f71c36442f1b61cdde7ec58d2c3c78d2039f6d6108e6c35388ef7c1650971fa1_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-create-datavolume-rhel9@sha256:2ad49cf6e2242a9e5861929d9bcab1305a7fc4e34e708f99cff1d7253aa46167_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-create-datavolume-rhel9@sha256:7112400a4ecb23ee2110bf96372fcf9f96ad648a51aa944627b40eb59539a660_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-create-vm-from-template-rhel9@sha256:1411c65bbad7302710788327f6964a4bf5bc20ef70d5e46f4a5c6e7a0e7a0161_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-create-vm-from-template-rhel9@sha256:4d962618aa95600c60c9fc8b890186e510de91177d51949e12797a3558e31328_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-customize-rhel9@sha256:5c23d3f20ea9dcbe7109284d73078ecd516a070e964b844f8d80b1d92ebd55ee_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-customize-rhel9@sha256:a780244e48c6d4f87446d3754c3eb9ab79c0d54675c189da4a659f7a4d5668ea_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-sysprep-rhel9@sha256:84577d949a1bbcaa291c70729127bca4a8994df03068666baa23840877ea8392_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-sysprep-rhel9@sha256:aed630a597a090179e1b0e0c117e536df06b67d0f793f91936aa7388c0c5d7eb_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-modify-vm-template-rhel9@sha256:31d959b80cf57462e1705684bb7e1b78af26bd2c62f1c9e4e51e1d02199b05a8_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-modify-vm-template-rhel9@sha256:66aea526bc10e4c0136ba86e394bbdfe4fbd7f757d6f391a561b51d2ba2f4d46_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-operator-rhel9@sha256:d0cf0e81589f0938de45961eaddfc5ec4782738fd11082de0439b200534259eb_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-operator-rhel9@sha256:f1b1f5044db6bb945584f9d4f31d020597725a286ef368ed0aca2116abb31beb_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-wait-for-vmi-status-rhel9@sha256:39a15d03f113735df03b1a7408227eb9604d942c1f3c1992bcdc7eaf07662711_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-wait-for-vmi-status-rhel9@sha256:afb68af076954fcd18c7a4a1464ea0c2a766e8282eae980051906ed07eaa1707_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-template-validator-rhel9@sha256:02b22c7e7014b5e72d47fed8b6a268cf307638c5510adf3916c51f7f40a52a08_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-template-validator-rhel9@sha256:c0264b9271e602f85b2040ef7f207cdfa46038dc4fa6e4738bf196ef88a71cf8_amd64",
"9Base-CNV-4.13:container-native-virtualization/libguestfs-tools-rhel9@sha256:29ae84575bbca24553cf649256759fd96ff286971d80bc2db129154a7df9b283_amd64",
"9Base-CNV-4.13:container-native-virtualization/libguestfs-tools-rhel9@sha256:6558f60343e068b032167e2340b2c549c5f0258acc5d2614b60966ce79408b01_arm64",
"9Base-CNV-4.13:container-native-virtualization/multus-dynamic-networks-rhel9@sha256:3ecb0162a4b01d1590bf209d717b32a4f0835910d9979823f18c24acba41b503_arm64",
"9Base-CNV-4.13:container-native-virtualization/multus-dynamic-networks-rhel9@sha256:b7f68b6420009e21380d32d6459193aae45e93be9533debe17cb3108571b36b8_amd64",
"9Base-CNV-4.13:container-native-virtualization/ovs-cni-plugin-rhel9@sha256:0f1d372f418744e0aff59ecb0a38f53178aac9c2e9eecfd38aa25ed83e0d1360_arm64",
"9Base-CNV-4.13:container-native-virtualization/ovs-cni-plugin-rhel9@sha256:e8e7a44edbf1713fe74de5c4b8f691cce78f4440c4a32a16ba9ad16694a55396_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-api-rhel9@sha256:e68416321ca8c74a547b3d35897f54813c03481143e402e9bdc4daf315e35b5d_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-api-rhel9@sha256:fdb4ca1bb8b310d713d9c7e88f7d091f4460aa942dbeca5ebcf17281a06daffe_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-artifacts-server-rhel9@sha256:33d11c1832b49df39c1fca62bad40dbc5c30a452248339aaef449ac99509accb_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-artifacts-server-rhel9@sha256:81fc61b714baecb5a89fa6c0749c14566e0661b8e184ca602fc2e03b9cf431ee_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-apiserver-rhel9@sha256:f6128a63344ed2129f5bce648ddcfaa2869d31cde4b93328d3c22534b97ade10_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-apiserver-rhel9@sha256:feca273a691d09445c6cff6d36b5d590735e867656a9898ce0d89744d98e8006_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-cloner-rhel9@sha256:68e3b9b0291b4fb277ac430269ffce11d13b0a7688cf2ffcdb7f98759c36b4db_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-cloner-rhel9@sha256:6ac212767481bef64d8a7d0252bb8089c0f9751fad4a355aef71bd49dad2ad07_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-controller-rhel9@sha256:65f5263275d9f0a12b8fb057d82adf678778039ec873ca9bde182dea3413c9f1_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-controller-rhel9@sha256:d9e62b2019328be258489ac852eef25f8b1233f29abac6bcea5b406329f97fed_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-importer-rhel9@sha256:00a6d9d24ca1466d450b02269ec3144fc7550f0e5c696e869fbf7ce10cae6093_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-importer-rhel9@sha256:2df07fb21a3575e74aa16ded20129828f2300cd33e8ab369b0362062d49e62d0_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-operator-rhel9@sha256:20ec064750faedd97d11b797c8c1d9a1db5d60d7d76e82e65cfd05eb79d65e29_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-operator-rhel9@sha256:802ee8923d9d8e406b23911406f9748756c0ef4d6954e9e2fd5fb4bdf91dde9a_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-uploadproxy-rhel9@sha256:392d0f61f462c707adfdc21e4239c5c09d8520a80486b41d9d9ae479267d6124_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-uploadproxy-rhel9@sha256:6775f34353eec8f35bead9411dde155530d079bb8d51582fb1f2aacc27dbde1d_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-uploadserver-rhel9@sha256:4528c24672689cfb6505761b6b108fbcc04488192733f23d2bfe39cd42a1d743_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-uploadserver-rhel9@sha256:b22048390387380af94e267c8a9a66813c515997456d59d8ebac1486916b6585_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-controller-rhel9@sha256:3e7880149ee9a68286e390beb3d9779f7403c30fc5136e5370e0e4690a3fd243_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-controller-rhel9@sha256:970edc281d7a731e9f7e8c2d4440fe48a221e5e355d5235c5413b4c3adb28503_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-exportproxy-rhel9@sha256:1bda34d5bff734ad997202f29a5ff6f7362fd79fa90511a422442ef2e3681198_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-exportproxy-rhel9@sha256:de3c4afbf7669b98517cbef2490ec186f0553dd97b05bed80ec36dd883fe507b_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-exportserver-rhel9@sha256:3f7f98645176d42c63cca5c0fc3182a03121af87446ca421b6c72baf07dfca0d_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-exportserver-rhel9@sha256:8f12955cd777eb2409037a6968aa92f50c99d6e07e722951dbcfd0c8c9829b5e_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-handler-rhel9@sha256:5fc47110d866d8048aec50689090ce10705d19d3bb48d2b06727d6d569003af7_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-handler-rhel9@sha256:84ba79ae9658699147d2493df2582ab6df10adbff4d44a533c3fe6a9f45f9691_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-launcher-rhel9@sha256:4990d40d9987d5126d105dd45be2501eaded248cb61bdde5ea8d359bc1e7ebef_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-launcher-rhel9@sha256:95aeacb98209e0baef27ce0e02fbac38d693cea74808fc77107efda0f344bcb5_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-operator-rhel9@sha256:5c1a7e4ed2061938987b900a2394f07121d4037350c9bb6485213a2adfea787d_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-operator-rhel9@sha256:66b1b3b379121d6411ba22283e7d991617177330c93746d37753ab7812b9a00b_arm64",
"9Base-CNV-4.13:container-native-virtualization/virtio-win-rhel9@sha256:8735f51da918408a8826601c082d1b29accf26d59b9978da89b980cb509c1102_arm64",
"9Base-CNV-4.13:container-native-virtualization/virtio-win-rhel9@sha256:d147d2a6eb6f907d1e88f61aaca83596853bc72164583d6dda2b1154b490de25_amd64",
"9Base-CNV-4.13:container-native-virtualization/vm-console-proxy-rhel9@sha256:70a8d0cd66182c25e02679540bae1368b2a9cf687532b58dba41ef30c5ca00c1_arm64",
"9Base-CNV-4.13:container-native-virtualization/vm-console-proxy-rhel9@sha256:7ca921f98f6d81a126907127a611146fb53397869a628678faa1e289c01d22b2_amd64",
"9Base-CNV-4.13:container-native-virtualization/vm-network-latency-checkup-rhel9@sha256:503ea7ac914a9b54e9d665a0227ee0b5d5200cdb5d692aa94c07dd1518d91b70_arm64",
"9Base-CNV-4.13:container-native-virtualization/vm-network-latency-checkup-rhel9@sha256:59fd965975bccf641a0fa7aa01374d45057bd03cda7528248a84b60b1205bf57_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-2879"
},
{
"category": "external",
"summary": "RHBZ#2132867",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2132867"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-2879",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2879"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-2879",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-2879"
},
{
"category": "external",
"summary": "https://github.com/golang/go/issues/54853",
"url": "https://github.com/golang/go/issues/54853"
},
{
"category": "external",
"summary": "https://github.com/vbatts/tar-split/releases/tag/v0.12.1",
"url": "https://github.com/vbatts/tar-split/releases/tag/v0.12.1"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/xtuG5faxtaU?pli=1",
"url": "https://groups.google.com/g/golang-announce/c/xtuG5faxtaU?pli=1"
}
],
"release_date": "2022-10-04T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-05-18T02:55:08+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"9Base-CNV-4.13:container-native-virtualization/bridge-marker-rhel9@sha256:8eac196b30a648989cdca5cb153a3bc3d34e47339acba0e4f760bd366496c99d_amd64",
"9Base-CNV-4.13:container-native-virtualization/bridge-marker-rhel9@sha256:e8a55aee3d75a316bb0d7a554c737198823df04b3c05e481c17e45eb2153bced_arm64",
"9Base-CNV-4.13:container-native-virtualization/cluster-network-addons-operator-rhel9@sha256:3bff33e3f40cd1e2b519c2db56734d4bb8df883e155c2f20b1cb9d3d184daec1_amd64",
"9Base-CNV-4.13:container-native-virtualization/cluster-network-addons-operator-rhel9@sha256:f439d2f420bb59eb1d5af14ce2002648d0cfc155d1a1466c8aac9b661fe902b8_arm64",
"9Base-CNV-4.13:container-native-virtualization/cnv-containernetworking-plugins-rhel9@sha256:89f22e541f61a660c9aa9f38ef58e80b84a0517f74e84292107fc252c25465c9_arm64",
"9Base-CNV-4.13:container-native-virtualization/cnv-containernetworking-plugins-rhel9@sha256:bf471997e54e4a75b0d71f492ab295787fdbb14d8c85c4ea8c03f0552dbc3755_amd64",
"9Base-CNV-4.13:container-native-virtualization/cnv-must-gather-rhel9@sha256:9e8efd76924958eb605401abdac08eba97fb83a1ada383bc87a7fb7c87b3a455_arm64",
"9Base-CNV-4.13:container-native-virtualization/cnv-must-gather-rhel9@sha256:b9fc32b5fabedd65a4c3a471879c808af2087277de4278adaa115a732f0468da_amd64",
"9Base-CNV-4.13:container-native-virtualization/hco-bundle-registry-rhel9@sha256:60e89d7a99ff9f20e974430b802dd724a3bb6fa1e01e5a62daad98ac487b3063_amd64",
"9Base-CNV-4.13:container-native-virtualization/hco-bundle-registry-rhel9@sha256:dd20b138045ef1424d83a47e7abcfcbb2ac54577dcec5ed3c186390aaa4c9d84_arm64",
"9Base-CNV-4.13:container-native-virtualization/hostpath-csi-driver-rhel9@sha256:61e2824853d51347593ad909a5e546cd92e4216d6a1df5dffb50dd9cba277cce_amd64",
"9Base-CNV-4.13:container-native-virtualization/hostpath-csi-driver-rhel9@sha256:676d4c23a5f60dd331728af056b0a6b2d3358ac88da23299b1a98dfaca8f288e_arm64",
"9Base-CNV-4.13:container-native-virtualization/hostpath-provisioner-operator-rhel9@sha256:515be94be496c67f5b8fd5f4832fe4385e56476e6589897d6b9fbb9bb2b00f32_amd64",
"9Base-CNV-4.13:container-native-virtualization/hostpath-provisioner-operator-rhel9@sha256:571ae805641dea11646028c946039983c7fd82f138b915dcb8b80c39b465e63c_arm64",
"9Base-CNV-4.13:container-native-virtualization/hostpath-provisioner-rhel9@sha256:ac3fe350bedd6bc43596444ba0f279ccf8a144ab14ac5a9b80ea71c46390b7b4_amd64",
"9Base-CNV-4.13:container-native-virtualization/hostpath-provisioner-rhel9@sha256:d4ed87745b7ee2acca2d83e2c91c2f6dced1903c81495b50f2559b3ba2dde287_arm64",
"9Base-CNV-4.13:container-native-virtualization/hyperconverged-cluster-operator-rhel9@sha256:e5ab9f3be59d3568e3d672ab374efb16990ccf92192eac4e1244b10fcd7423e2_amd64",
"9Base-CNV-4.13:container-native-virtualization/hyperconverged-cluster-operator-rhel9@sha256:e681560b184189df03fc84c8a712f32289f42573dd348cda394b19565eb6eca8_arm64",
"9Base-CNV-4.13:container-native-virtualization/hyperconverged-cluster-webhook-rhel9@sha256:06d036d320b3027bb8370bb8e0f6fe8c9f0ec9bca7aac3b5c53698ba4a170042_arm64",
"9Base-CNV-4.13:container-native-virtualization/hyperconverged-cluster-webhook-rhel9@sha256:b5a01336180aad017df62cf8e652f2491b8263ba7e4dd07f858db1ef1924cf2f_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubemacpool-rhel9@sha256:4d190d81eeb3fbe9ed56cf3548dc83a3f81641bfdafa7b42dcfb0d2512566644_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubemacpool-rhel9@sha256:59862a59854f0d5b83dc25ba119f9586a8aff42b6e60d1922f8ae7b4567309ff_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubesecondarydns-rhel9@sha256:121d30d78cc57731ea2242ef2c32430890ac66c2723e65608d5e2f26c3f515cd_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubesecondarydns-rhel9@sha256:b1838f3c8ba3d8113bddea17b78c21e1c1490e2a4a07ea77014edee523d06347_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-console-plugin-rhel9@sha256:86a4b1e3d6ad1d56302c9c058f8bc5826dcfe6c46fb3e0ddaa06818645039020_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-console-plugin-rhel9@sha256:ffb2acd9ae09c1ef9ca756f5eaf6087d0a3957cfc824543949d25f556a97744d_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-dpdk-checkup-rhel9@sha256:525aceb9396010ebcdba14040f267889b807cd84db8e5b4030429b51f0fbf5fe_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-dpdk-checkup-rhel9@sha256:553c4686f56c66cc1e3c5ad9d4051f139d43f821eac3abb98ca5cdb8b5dfe202_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-ssp-operator-rhel9@sha256:901e6cad9534c7bd7c4018c60bccfe49d7280fba5a9901ab4c4d15e9345288c4_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-ssp-operator-rhel9@sha256:badeb0f65f543b209f6af761729d9778b7b73b97d55044016dfba3f38a1f6f18_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-cleanup-vm-rhel9@sha256:28e4975fa4dac22d9da32ed2a10aed039fd957b30140daa36bab2caa998be77a_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-cleanup-vm-rhel9@sha256:b0ff7e812a576ea848590655fc13a85832d5a39f68e7769ceab9da6949da88c7_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-copy-template-rhel9@sha256:4916a6c6b1f9b529187d3b4d5fc99b90157993767b3fe2ad36a9ec77fbb46b10_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-copy-template-rhel9@sha256:f71c36442f1b61cdde7ec58d2c3c78d2039f6d6108e6c35388ef7c1650971fa1_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-create-datavolume-rhel9@sha256:2ad49cf6e2242a9e5861929d9bcab1305a7fc4e34e708f99cff1d7253aa46167_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-create-datavolume-rhel9@sha256:7112400a4ecb23ee2110bf96372fcf9f96ad648a51aa944627b40eb59539a660_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-create-vm-from-template-rhel9@sha256:1411c65bbad7302710788327f6964a4bf5bc20ef70d5e46f4a5c6e7a0e7a0161_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-create-vm-from-template-rhel9@sha256:4d962618aa95600c60c9fc8b890186e510de91177d51949e12797a3558e31328_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-customize-rhel9@sha256:5c23d3f20ea9dcbe7109284d73078ecd516a070e964b844f8d80b1d92ebd55ee_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-customize-rhel9@sha256:a780244e48c6d4f87446d3754c3eb9ab79c0d54675c189da4a659f7a4d5668ea_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-sysprep-rhel9@sha256:84577d949a1bbcaa291c70729127bca4a8994df03068666baa23840877ea8392_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-sysprep-rhel9@sha256:aed630a597a090179e1b0e0c117e536df06b67d0f793f91936aa7388c0c5d7eb_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-modify-vm-template-rhel9@sha256:31d959b80cf57462e1705684bb7e1b78af26bd2c62f1c9e4e51e1d02199b05a8_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-modify-vm-template-rhel9@sha256:66aea526bc10e4c0136ba86e394bbdfe4fbd7f757d6f391a561b51d2ba2f4d46_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-operator-rhel9@sha256:d0cf0e81589f0938de45961eaddfc5ec4782738fd11082de0439b200534259eb_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-operator-rhel9@sha256:f1b1f5044db6bb945584f9d4f31d020597725a286ef368ed0aca2116abb31beb_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-wait-for-vmi-status-rhel9@sha256:39a15d03f113735df03b1a7408227eb9604d942c1f3c1992bcdc7eaf07662711_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-wait-for-vmi-status-rhel9@sha256:afb68af076954fcd18c7a4a1464ea0c2a766e8282eae980051906ed07eaa1707_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-template-validator-rhel9@sha256:02b22c7e7014b5e72d47fed8b6a268cf307638c5510adf3916c51f7f40a52a08_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-template-validator-rhel9@sha256:c0264b9271e602f85b2040ef7f207cdfa46038dc4fa6e4738bf196ef88a71cf8_amd64",
"9Base-CNV-4.13:container-native-virtualization/libguestfs-tools-rhel9@sha256:29ae84575bbca24553cf649256759fd96ff286971d80bc2db129154a7df9b283_amd64",
"9Base-CNV-4.13:container-native-virtualization/libguestfs-tools-rhel9@sha256:6558f60343e068b032167e2340b2c549c5f0258acc5d2614b60966ce79408b01_arm64",
"9Base-CNV-4.13:container-native-virtualization/multus-dynamic-networks-rhel9@sha256:3ecb0162a4b01d1590bf209d717b32a4f0835910d9979823f18c24acba41b503_arm64",
"9Base-CNV-4.13:container-native-virtualization/multus-dynamic-networks-rhel9@sha256:b7f68b6420009e21380d32d6459193aae45e93be9533debe17cb3108571b36b8_amd64",
"9Base-CNV-4.13:container-native-virtualization/ovs-cni-plugin-rhel9@sha256:0f1d372f418744e0aff59ecb0a38f53178aac9c2e9eecfd38aa25ed83e0d1360_arm64",
"9Base-CNV-4.13:container-native-virtualization/ovs-cni-plugin-rhel9@sha256:e8e7a44edbf1713fe74de5c4b8f691cce78f4440c4a32a16ba9ad16694a55396_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-api-rhel9@sha256:e68416321ca8c74a547b3d35897f54813c03481143e402e9bdc4daf315e35b5d_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-api-rhel9@sha256:fdb4ca1bb8b310d713d9c7e88f7d091f4460aa942dbeca5ebcf17281a06daffe_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-artifacts-server-rhel9@sha256:33d11c1832b49df39c1fca62bad40dbc5c30a452248339aaef449ac99509accb_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-artifacts-server-rhel9@sha256:81fc61b714baecb5a89fa6c0749c14566e0661b8e184ca602fc2e03b9cf431ee_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-apiserver-rhel9@sha256:f6128a63344ed2129f5bce648ddcfaa2869d31cde4b93328d3c22534b97ade10_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-apiserver-rhel9@sha256:feca273a691d09445c6cff6d36b5d590735e867656a9898ce0d89744d98e8006_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-cloner-rhel9@sha256:68e3b9b0291b4fb277ac430269ffce11d13b0a7688cf2ffcdb7f98759c36b4db_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-cloner-rhel9@sha256:6ac212767481bef64d8a7d0252bb8089c0f9751fad4a355aef71bd49dad2ad07_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-controller-rhel9@sha256:65f5263275d9f0a12b8fb057d82adf678778039ec873ca9bde182dea3413c9f1_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-controller-rhel9@sha256:d9e62b2019328be258489ac852eef25f8b1233f29abac6bcea5b406329f97fed_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-importer-rhel9@sha256:00a6d9d24ca1466d450b02269ec3144fc7550f0e5c696e869fbf7ce10cae6093_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-importer-rhel9@sha256:2df07fb21a3575e74aa16ded20129828f2300cd33e8ab369b0362062d49e62d0_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-operator-rhel9@sha256:20ec064750faedd97d11b797c8c1d9a1db5d60d7d76e82e65cfd05eb79d65e29_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-operator-rhel9@sha256:802ee8923d9d8e406b23911406f9748756c0ef4d6954e9e2fd5fb4bdf91dde9a_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-uploadproxy-rhel9@sha256:392d0f61f462c707adfdc21e4239c5c09d8520a80486b41d9d9ae479267d6124_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-uploadproxy-rhel9@sha256:6775f34353eec8f35bead9411dde155530d079bb8d51582fb1f2aacc27dbde1d_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-uploadserver-rhel9@sha256:4528c24672689cfb6505761b6b108fbcc04488192733f23d2bfe39cd42a1d743_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-uploadserver-rhel9@sha256:b22048390387380af94e267c8a9a66813c515997456d59d8ebac1486916b6585_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-controller-rhel9@sha256:3e7880149ee9a68286e390beb3d9779f7403c30fc5136e5370e0e4690a3fd243_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-controller-rhel9@sha256:970edc281d7a731e9f7e8c2d4440fe48a221e5e355d5235c5413b4c3adb28503_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-exportproxy-rhel9@sha256:1bda34d5bff734ad997202f29a5ff6f7362fd79fa90511a422442ef2e3681198_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-exportproxy-rhel9@sha256:de3c4afbf7669b98517cbef2490ec186f0553dd97b05bed80ec36dd883fe507b_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-exportserver-rhel9@sha256:3f7f98645176d42c63cca5c0fc3182a03121af87446ca421b6c72baf07dfca0d_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-exportserver-rhel9@sha256:8f12955cd777eb2409037a6968aa92f50c99d6e07e722951dbcfd0c8c9829b5e_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-handler-rhel9@sha256:5fc47110d866d8048aec50689090ce10705d19d3bb48d2b06727d6d569003af7_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-handler-rhel9@sha256:84ba79ae9658699147d2493df2582ab6df10adbff4d44a533c3fe6a9f45f9691_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-launcher-rhel9@sha256:4990d40d9987d5126d105dd45be2501eaded248cb61bdde5ea8d359bc1e7ebef_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-launcher-rhel9@sha256:95aeacb98209e0baef27ce0e02fbac38d693cea74808fc77107efda0f344bcb5_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-operator-rhel9@sha256:5c1a7e4ed2061938987b900a2394f07121d4037350c9bb6485213a2adfea787d_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-operator-rhel9@sha256:66b1b3b379121d6411ba22283e7d991617177330c93746d37753ab7812b9a00b_arm64",
"9Base-CNV-4.13:container-native-virtualization/virtio-win-rhel9@sha256:8735f51da918408a8826601c082d1b29accf26d59b9978da89b980cb509c1102_arm64",
"9Base-CNV-4.13:container-native-virtualization/virtio-win-rhel9@sha256:d147d2a6eb6f907d1e88f61aaca83596853bc72164583d6dda2b1154b490de25_amd64",
"9Base-CNV-4.13:container-native-virtualization/vm-console-proxy-rhel9@sha256:70a8d0cd66182c25e02679540bae1368b2a9cf687532b58dba41ef30c5ca00c1_arm64",
"9Base-CNV-4.13:container-native-virtualization/vm-console-proxy-rhel9@sha256:7ca921f98f6d81a126907127a611146fb53397869a628678faa1e289c01d22b2_amd64",
"9Base-CNV-4.13:container-native-virtualization/vm-network-latency-checkup-rhel9@sha256:503ea7ac914a9b54e9d665a0227ee0b5d5200cdb5d692aa94c07dd1518d91b70_arm64",
"9Base-CNV-4.13:container-native-virtualization/vm-network-latency-checkup-rhel9@sha256:59fd965975bccf641a0fa7aa01374d45057bd03cda7528248a84b60b1205bf57_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:3205"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"9Base-CNV-4.13:container-native-virtualization/bridge-marker-rhel9@sha256:8eac196b30a648989cdca5cb153a3bc3d34e47339acba0e4f760bd366496c99d_amd64",
"9Base-CNV-4.13:container-native-virtualization/bridge-marker-rhel9@sha256:e8a55aee3d75a316bb0d7a554c737198823df04b3c05e481c17e45eb2153bced_arm64",
"9Base-CNV-4.13:container-native-virtualization/cluster-network-addons-operator-rhel9@sha256:3bff33e3f40cd1e2b519c2db56734d4bb8df883e155c2f20b1cb9d3d184daec1_amd64",
"9Base-CNV-4.13:container-native-virtualization/cluster-network-addons-operator-rhel9@sha256:f439d2f420bb59eb1d5af14ce2002648d0cfc155d1a1466c8aac9b661fe902b8_arm64",
"9Base-CNV-4.13:container-native-virtualization/cnv-containernetworking-plugins-rhel9@sha256:89f22e541f61a660c9aa9f38ef58e80b84a0517f74e84292107fc252c25465c9_arm64",
"9Base-CNV-4.13:container-native-virtualization/cnv-containernetworking-plugins-rhel9@sha256:bf471997e54e4a75b0d71f492ab295787fdbb14d8c85c4ea8c03f0552dbc3755_amd64",
"9Base-CNV-4.13:container-native-virtualization/cnv-must-gather-rhel9@sha256:9e8efd76924958eb605401abdac08eba97fb83a1ada383bc87a7fb7c87b3a455_arm64",
"9Base-CNV-4.13:container-native-virtualization/cnv-must-gather-rhel9@sha256:b9fc32b5fabedd65a4c3a471879c808af2087277de4278adaa115a732f0468da_amd64",
"9Base-CNV-4.13:container-native-virtualization/hco-bundle-registry-rhel9@sha256:60e89d7a99ff9f20e974430b802dd724a3bb6fa1e01e5a62daad98ac487b3063_amd64",
"9Base-CNV-4.13:container-native-virtualization/hco-bundle-registry-rhel9@sha256:dd20b138045ef1424d83a47e7abcfcbb2ac54577dcec5ed3c186390aaa4c9d84_arm64",
"9Base-CNV-4.13:container-native-virtualization/hostpath-csi-driver-rhel9@sha256:61e2824853d51347593ad909a5e546cd92e4216d6a1df5dffb50dd9cba277cce_amd64",
"9Base-CNV-4.13:container-native-virtualization/hostpath-csi-driver-rhel9@sha256:676d4c23a5f60dd331728af056b0a6b2d3358ac88da23299b1a98dfaca8f288e_arm64",
"9Base-CNV-4.13:container-native-virtualization/hostpath-provisioner-operator-rhel9@sha256:515be94be496c67f5b8fd5f4832fe4385e56476e6589897d6b9fbb9bb2b00f32_amd64",
"9Base-CNV-4.13:container-native-virtualization/hostpath-provisioner-operator-rhel9@sha256:571ae805641dea11646028c946039983c7fd82f138b915dcb8b80c39b465e63c_arm64",
"9Base-CNV-4.13:container-native-virtualization/hostpath-provisioner-rhel9@sha256:ac3fe350bedd6bc43596444ba0f279ccf8a144ab14ac5a9b80ea71c46390b7b4_amd64",
"9Base-CNV-4.13:container-native-virtualization/hostpath-provisioner-rhel9@sha256:d4ed87745b7ee2acca2d83e2c91c2f6dced1903c81495b50f2559b3ba2dde287_arm64",
"9Base-CNV-4.13:container-native-virtualization/hyperconverged-cluster-operator-rhel9@sha256:e5ab9f3be59d3568e3d672ab374efb16990ccf92192eac4e1244b10fcd7423e2_amd64",
"9Base-CNV-4.13:container-native-virtualization/hyperconverged-cluster-operator-rhel9@sha256:e681560b184189df03fc84c8a712f32289f42573dd348cda394b19565eb6eca8_arm64",
"9Base-CNV-4.13:container-native-virtualization/hyperconverged-cluster-webhook-rhel9@sha256:06d036d320b3027bb8370bb8e0f6fe8c9f0ec9bca7aac3b5c53698ba4a170042_arm64",
"9Base-CNV-4.13:container-native-virtualization/hyperconverged-cluster-webhook-rhel9@sha256:b5a01336180aad017df62cf8e652f2491b8263ba7e4dd07f858db1ef1924cf2f_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubemacpool-rhel9@sha256:4d190d81eeb3fbe9ed56cf3548dc83a3f81641bfdafa7b42dcfb0d2512566644_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubemacpool-rhel9@sha256:59862a59854f0d5b83dc25ba119f9586a8aff42b6e60d1922f8ae7b4567309ff_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubesecondarydns-rhel9@sha256:121d30d78cc57731ea2242ef2c32430890ac66c2723e65608d5e2f26c3f515cd_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubesecondarydns-rhel9@sha256:b1838f3c8ba3d8113bddea17b78c21e1c1490e2a4a07ea77014edee523d06347_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-console-plugin-rhel9@sha256:86a4b1e3d6ad1d56302c9c058f8bc5826dcfe6c46fb3e0ddaa06818645039020_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-console-plugin-rhel9@sha256:ffb2acd9ae09c1ef9ca756f5eaf6087d0a3957cfc824543949d25f556a97744d_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-dpdk-checkup-rhel9@sha256:525aceb9396010ebcdba14040f267889b807cd84db8e5b4030429b51f0fbf5fe_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-dpdk-checkup-rhel9@sha256:553c4686f56c66cc1e3c5ad9d4051f139d43f821eac3abb98ca5cdb8b5dfe202_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-ssp-operator-rhel9@sha256:901e6cad9534c7bd7c4018c60bccfe49d7280fba5a9901ab4c4d15e9345288c4_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-ssp-operator-rhel9@sha256:badeb0f65f543b209f6af761729d9778b7b73b97d55044016dfba3f38a1f6f18_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-cleanup-vm-rhel9@sha256:28e4975fa4dac22d9da32ed2a10aed039fd957b30140daa36bab2caa998be77a_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-cleanup-vm-rhel9@sha256:b0ff7e812a576ea848590655fc13a85832d5a39f68e7769ceab9da6949da88c7_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-copy-template-rhel9@sha256:4916a6c6b1f9b529187d3b4d5fc99b90157993767b3fe2ad36a9ec77fbb46b10_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-copy-template-rhel9@sha256:f71c36442f1b61cdde7ec58d2c3c78d2039f6d6108e6c35388ef7c1650971fa1_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-create-datavolume-rhel9@sha256:2ad49cf6e2242a9e5861929d9bcab1305a7fc4e34e708f99cff1d7253aa46167_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-create-datavolume-rhel9@sha256:7112400a4ecb23ee2110bf96372fcf9f96ad648a51aa944627b40eb59539a660_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-create-vm-from-template-rhel9@sha256:1411c65bbad7302710788327f6964a4bf5bc20ef70d5e46f4a5c6e7a0e7a0161_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-create-vm-from-template-rhel9@sha256:4d962618aa95600c60c9fc8b890186e510de91177d51949e12797a3558e31328_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-customize-rhel9@sha256:5c23d3f20ea9dcbe7109284d73078ecd516a070e964b844f8d80b1d92ebd55ee_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-customize-rhel9@sha256:a780244e48c6d4f87446d3754c3eb9ab79c0d54675c189da4a659f7a4d5668ea_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-sysprep-rhel9@sha256:84577d949a1bbcaa291c70729127bca4a8994df03068666baa23840877ea8392_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-sysprep-rhel9@sha256:aed630a597a090179e1b0e0c117e536df06b67d0f793f91936aa7388c0c5d7eb_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-modify-vm-template-rhel9@sha256:31d959b80cf57462e1705684bb7e1b78af26bd2c62f1c9e4e51e1d02199b05a8_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-modify-vm-template-rhel9@sha256:66aea526bc10e4c0136ba86e394bbdfe4fbd7f757d6f391a561b51d2ba2f4d46_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-operator-rhel9@sha256:d0cf0e81589f0938de45961eaddfc5ec4782738fd11082de0439b200534259eb_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-operator-rhel9@sha256:f1b1f5044db6bb945584f9d4f31d020597725a286ef368ed0aca2116abb31beb_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-wait-for-vmi-status-rhel9@sha256:39a15d03f113735df03b1a7408227eb9604d942c1f3c1992bcdc7eaf07662711_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-wait-for-vmi-status-rhel9@sha256:afb68af076954fcd18c7a4a1464ea0c2a766e8282eae980051906ed07eaa1707_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-template-validator-rhel9@sha256:02b22c7e7014b5e72d47fed8b6a268cf307638c5510adf3916c51f7f40a52a08_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-template-validator-rhel9@sha256:c0264b9271e602f85b2040ef7f207cdfa46038dc4fa6e4738bf196ef88a71cf8_amd64",
"9Base-CNV-4.13:container-native-virtualization/libguestfs-tools-rhel9@sha256:29ae84575bbca24553cf649256759fd96ff286971d80bc2db129154a7df9b283_amd64",
"9Base-CNV-4.13:container-native-virtualization/libguestfs-tools-rhel9@sha256:6558f60343e068b032167e2340b2c549c5f0258acc5d2614b60966ce79408b01_arm64",
"9Base-CNV-4.13:container-native-virtualization/multus-dynamic-networks-rhel9@sha256:3ecb0162a4b01d1590bf209d717b32a4f0835910d9979823f18c24acba41b503_arm64",
"9Base-CNV-4.13:container-native-virtualization/multus-dynamic-networks-rhel9@sha256:b7f68b6420009e21380d32d6459193aae45e93be9533debe17cb3108571b36b8_amd64",
"9Base-CNV-4.13:container-native-virtualization/ovs-cni-plugin-rhel9@sha256:0f1d372f418744e0aff59ecb0a38f53178aac9c2e9eecfd38aa25ed83e0d1360_arm64",
"9Base-CNV-4.13:container-native-virtualization/ovs-cni-plugin-rhel9@sha256:e8e7a44edbf1713fe74de5c4b8f691cce78f4440c4a32a16ba9ad16694a55396_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-api-rhel9@sha256:e68416321ca8c74a547b3d35897f54813c03481143e402e9bdc4daf315e35b5d_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-api-rhel9@sha256:fdb4ca1bb8b310d713d9c7e88f7d091f4460aa942dbeca5ebcf17281a06daffe_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-artifacts-server-rhel9@sha256:33d11c1832b49df39c1fca62bad40dbc5c30a452248339aaef449ac99509accb_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-artifacts-server-rhel9@sha256:81fc61b714baecb5a89fa6c0749c14566e0661b8e184ca602fc2e03b9cf431ee_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-apiserver-rhel9@sha256:f6128a63344ed2129f5bce648ddcfaa2869d31cde4b93328d3c22534b97ade10_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-apiserver-rhel9@sha256:feca273a691d09445c6cff6d36b5d590735e867656a9898ce0d89744d98e8006_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-cloner-rhel9@sha256:68e3b9b0291b4fb277ac430269ffce11d13b0a7688cf2ffcdb7f98759c36b4db_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-cloner-rhel9@sha256:6ac212767481bef64d8a7d0252bb8089c0f9751fad4a355aef71bd49dad2ad07_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-controller-rhel9@sha256:65f5263275d9f0a12b8fb057d82adf678778039ec873ca9bde182dea3413c9f1_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-controller-rhel9@sha256:d9e62b2019328be258489ac852eef25f8b1233f29abac6bcea5b406329f97fed_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-importer-rhel9@sha256:00a6d9d24ca1466d450b02269ec3144fc7550f0e5c696e869fbf7ce10cae6093_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-importer-rhel9@sha256:2df07fb21a3575e74aa16ded20129828f2300cd33e8ab369b0362062d49e62d0_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-operator-rhel9@sha256:20ec064750faedd97d11b797c8c1d9a1db5d60d7d76e82e65cfd05eb79d65e29_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-operator-rhel9@sha256:802ee8923d9d8e406b23911406f9748756c0ef4d6954e9e2fd5fb4bdf91dde9a_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-uploadproxy-rhel9@sha256:392d0f61f462c707adfdc21e4239c5c09d8520a80486b41d9d9ae479267d6124_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-uploadproxy-rhel9@sha256:6775f34353eec8f35bead9411dde155530d079bb8d51582fb1f2aacc27dbde1d_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-uploadserver-rhel9@sha256:4528c24672689cfb6505761b6b108fbcc04488192733f23d2bfe39cd42a1d743_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-uploadserver-rhel9@sha256:b22048390387380af94e267c8a9a66813c515997456d59d8ebac1486916b6585_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-controller-rhel9@sha256:3e7880149ee9a68286e390beb3d9779f7403c30fc5136e5370e0e4690a3fd243_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-controller-rhel9@sha256:970edc281d7a731e9f7e8c2d4440fe48a221e5e355d5235c5413b4c3adb28503_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-exportproxy-rhel9@sha256:1bda34d5bff734ad997202f29a5ff6f7362fd79fa90511a422442ef2e3681198_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-exportproxy-rhel9@sha256:de3c4afbf7669b98517cbef2490ec186f0553dd97b05bed80ec36dd883fe507b_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-exportserver-rhel9@sha256:3f7f98645176d42c63cca5c0fc3182a03121af87446ca421b6c72baf07dfca0d_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-exportserver-rhel9@sha256:8f12955cd777eb2409037a6968aa92f50c99d6e07e722951dbcfd0c8c9829b5e_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-handler-rhel9@sha256:5fc47110d866d8048aec50689090ce10705d19d3bb48d2b06727d6d569003af7_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-handler-rhel9@sha256:84ba79ae9658699147d2493df2582ab6df10adbff4d44a533c3fe6a9f45f9691_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-launcher-rhel9@sha256:4990d40d9987d5126d105dd45be2501eaded248cb61bdde5ea8d359bc1e7ebef_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-launcher-rhel9@sha256:95aeacb98209e0baef27ce0e02fbac38d693cea74808fc77107efda0f344bcb5_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-operator-rhel9@sha256:5c1a7e4ed2061938987b900a2394f07121d4037350c9bb6485213a2adfea787d_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-operator-rhel9@sha256:66b1b3b379121d6411ba22283e7d991617177330c93746d37753ab7812b9a00b_arm64",
"9Base-CNV-4.13:container-native-virtualization/virtio-win-rhel9@sha256:8735f51da918408a8826601c082d1b29accf26d59b9978da89b980cb509c1102_arm64",
"9Base-CNV-4.13:container-native-virtualization/virtio-win-rhel9@sha256:d147d2a6eb6f907d1e88f61aaca83596853bc72164583d6dda2b1154b490de25_amd64",
"9Base-CNV-4.13:container-native-virtualization/vm-console-proxy-rhel9@sha256:70a8d0cd66182c25e02679540bae1368b2a9cf687532b58dba41ef30c5ca00c1_arm64",
"9Base-CNV-4.13:container-native-virtualization/vm-console-proxy-rhel9@sha256:7ca921f98f6d81a126907127a611146fb53397869a628678faa1e289c01d22b2_amd64",
"9Base-CNV-4.13:container-native-virtualization/vm-network-latency-checkup-rhel9@sha256:503ea7ac914a9b54e9d665a0227ee0b5d5200cdb5d692aa94c07dd1518d91b70_arm64",
"9Base-CNV-4.13:container-native-virtualization/vm-network-latency-checkup-rhel9@sha256:59fd965975bccf641a0fa7aa01374d45057bd03cda7528248a84b60b1205bf57_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "golang: archive/tar: github.com/vbatts/tar-split: unbounded memory consumption when reading headers"
},
{
"acknowledgments": [
{
"names": [
"Daniel Abeles"
],
"organization": "Head of Research, Oxeye"
},
{
"names": [
"Gal Goldstein"
],
"organization": "Security Researcher, Oxeye"
}
],
"cve": "CVE-2022-2880",
"cwe": {
"id": "CWE-444",
"name": "Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027)"
},
"discovery_date": "2022-10-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2132868"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the golang package, where requests forwarded by reverse proxy include the raw query parameters from the inbound request, including unparseable parameters rejected by net/http. This issue could permit query parameter smuggling when a Go proxy forwards a parameter with an unparseable value. After the fix, the reverse proxy sanitizes the query parameters in the forwarded query when the outbound request\u0027s form field is set after the reverse proxy. The director function returns, indicating that the proxy has parsed the query parameters. Proxies that do not parse query parameters continue to forward the original query parameters unchanged.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: net/http/httputil: ReverseProxy should not forward unparseable query parameters",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The opportunity to exploit this vulnerability is limited to the Golang runtime. In the case of the OpenShift Container Platform, this would be restricted within each individual container. There are multiple layers of guide rails (Golang\u2019s Garbage Collector; OpenShift\u2019s resource constraints imposed at the container and cluster levels) which would require a malicious user to continue submitting attacks for there to be any enduring impact.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"9Base-CNV-4.13:container-native-virtualization/bridge-marker-rhel9@sha256:8eac196b30a648989cdca5cb153a3bc3d34e47339acba0e4f760bd366496c99d_amd64",
"9Base-CNV-4.13:container-native-virtualization/bridge-marker-rhel9@sha256:e8a55aee3d75a316bb0d7a554c737198823df04b3c05e481c17e45eb2153bced_arm64",
"9Base-CNV-4.13:container-native-virtualization/cluster-network-addons-operator-rhel9@sha256:3bff33e3f40cd1e2b519c2db56734d4bb8df883e155c2f20b1cb9d3d184daec1_amd64",
"9Base-CNV-4.13:container-native-virtualization/cluster-network-addons-operator-rhel9@sha256:f439d2f420bb59eb1d5af14ce2002648d0cfc155d1a1466c8aac9b661fe902b8_arm64",
"9Base-CNV-4.13:container-native-virtualization/cnv-containernetworking-plugins-rhel9@sha256:89f22e541f61a660c9aa9f38ef58e80b84a0517f74e84292107fc252c25465c9_arm64",
"9Base-CNV-4.13:container-native-virtualization/cnv-containernetworking-plugins-rhel9@sha256:bf471997e54e4a75b0d71f492ab295787fdbb14d8c85c4ea8c03f0552dbc3755_amd64",
"9Base-CNV-4.13:container-native-virtualization/cnv-must-gather-rhel9@sha256:9e8efd76924958eb605401abdac08eba97fb83a1ada383bc87a7fb7c87b3a455_arm64",
"9Base-CNV-4.13:container-native-virtualization/cnv-must-gather-rhel9@sha256:b9fc32b5fabedd65a4c3a471879c808af2087277de4278adaa115a732f0468da_amd64",
"9Base-CNV-4.13:container-native-virtualization/hco-bundle-registry-rhel9@sha256:60e89d7a99ff9f20e974430b802dd724a3bb6fa1e01e5a62daad98ac487b3063_amd64",
"9Base-CNV-4.13:container-native-virtualization/hco-bundle-registry-rhel9@sha256:dd20b138045ef1424d83a47e7abcfcbb2ac54577dcec5ed3c186390aaa4c9d84_arm64",
"9Base-CNV-4.13:container-native-virtualization/hostpath-csi-driver-rhel9@sha256:61e2824853d51347593ad909a5e546cd92e4216d6a1df5dffb50dd9cba277cce_amd64",
"9Base-CNV-4.13:container-native-virtualization/hostpath-csi-driver-rhel9@sha256:676d4c23a5f60dd331728af056b0a6b2d3358ac88da23299b1a98dfaca8f288e_arm64",
"9Base-CNV-4.13:container-native-virtualization/hostpath-provisioner-operator-rhel9@sha256:515be94be496c67f5b8fd5f4832fe4385e56476e6589897d6b9fbb9bb2b00f32_amd64",
"9Base-CNV-4.13:container-native-virtualization/hostpath-provisioner-operator-rhel9@sha256:571ae805641dea11646028c946039983c7fd82f138b915dcb8b80c39b465e63c_arm64",
"9Base-CNV-4.13:container-native-virtualization/hostpath-provisioner-rhel9@sha256:ac3fe350bedd6bc43596444ba0f279ccf8a144ab14ac5a9b80ea71c46390b7b4_amd64",
"9Base-CNV-4.13:container-native-virtualization/hostpath-provisioner-rhel9@sha256:d4ed87745b7ee2acca2d83e2c91c2f6dced1903c81495b50f2559b3ba2dde287_arm64",
"9Base-CNV-4.13:container-native-virtualization/hyperconverged-cluster-operator-rhel9@sha256:e5ab9f3be59d3568e3d672ab374efb16990ccf92192eac4e1244b10fcd7423e2_amd64",
"9Base-CNV-4.13:container-native-virtualization/hyperconverged-cluster-operator-rhel9@sha256:e681560b184189df03fc84c8a712f32289f42573dd348cda394b19565eb6eca8_arm64",
"9Base-CNV-4.13:container-native-virtualization/hyperconverged-cluster-webhook-rhel9@sha256:06d036d320b3027bb8370bb8e0f6fe8c9f0ec9bca7aac3b5c53698ba4a170042_arm64",
"9Base-CNV-4.13:container-native-virtualization/hyperconverged-cluster-webhook-rhel9@sha256:b5a01336180aad017df62cf8e652f2491b8263ba7e4dd07f858db1ef1924cf2f_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubemacpool-rhel9@sha256:4d190d81eeb3fbe9ed56cf3548dc83a3f81641bfdafa7b42dcfb0d2512566644_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubemacpool-rhel9@sha256:59862a59854f0d5b83dc25ba119f9586a8aff42b6e60d1922f8ae7b4567309ff_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubesecondarydns-rhel9@sha256:121d30d78cc57731ea2242ef2c32430890ac66c2723e65608d5e2f26c3f515cd_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubesecondarydns-rhel9@sha256:b1838f3c8ba3d8113bddea17b78c21e1c1490e2a4a07ea77014edee523d06347_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-console-plugin-rhel9@sha256:86a4b1e3d6ad1d56302c9c058f8bc5826dcfe6c46fb3e0ddaa06818645039020_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-console-plugin-rhel9@sha256:ffb2acd9ae09c1ef9ca756f5eaf6087d0a3957cfc824543949d25f556a97744d_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-dpdk-checkup-rhel9@sha256:525aceb9396010ebcdba14040f267889b807cd84db8e5b4030429b51f0fbf5fe_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-dpdk-checkup-rhel9@sha256:553c4686f56c66cc1e3c5ad9d4051f139d43f821eac3abb98ca5cdb8b5dfe202_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-ssp-operator-rhel9@sha256:901e6cad9534c7bd7c4018c60bccfe49d7280fba5a9901ab4c4d15e9345288c4_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-ssp-operator-rhel9@sha256:badeb0f65f543b209f6af761729d9778b7b73b97d55044016dfba3f38a1f6f18_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-cleanup-vm-rhel9@sha256:28e4975fa4dac22d9da32ed2a10aed039fd957b30140daa36bab2caa998be77a_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-cleanup-vm-rhel9@sha256:b0ff7e812a576ea848590655fc13a85832d5a39f68e7769ceab9da6949da88c7_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-copy-template-rhel9@sha256:4916a6c6b1f9b529187d3b4d5fc99b90157993767b3fe2ad36a9ec77fbb46b10_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-copy-template-rhel9@sha256:f71c36442f1b61cdde7ec58d2c3c78d2039f6d6108e6c35388ef7c1650971fa1_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-create-datavolume-rhel9@sha256:2ad49cf6e2242a9e5861929d9bcab1305a7fc4e34e708f99cff1d7253aa46167_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-create-datavolume-rhel9@sha256:7112400a4ecb23ee2110bf96372fcf9f96ad648a51aa944627b40eb59539a660_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-create-vm-from-template-rhel9@sha256:1411c65bbad7302710788327f6964a4bf5bc20ef70d5e46f4a5c6e7a0e7a0161_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-create-vm-from-template-rhel9@sha256:4d962618aa95600c60c9fc8b890186e510de91177d51949e12797a3558e31328_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-customize-rhel9@sha256:5c23d3f20ea9dcbe7109284d73078ecd516a070e964b844f8d80b1d92ebd55ee_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-customize-rhel9@sha256:a780244e48c6d4f87446d3754c3eb9ab79c0d54675c189da4a659f7a4d5668ea_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-sysprep-rhel9@sha256:84577d949a1bbcaa291c70729127bca4a8994df03068666baa23840877ea8392_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-sysprep-rhel9@sha256:aed630a597a090179e1b0e0c117e536df06b67d0f793f91936aa7388c0c5d7eb_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-modify-vm-template-rhel9@sha256:31d959b80cf57462e1705684bb7e1b78af26bd2c62f1c9e4e51e1d02199b05a8_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-modify-vm-template-rhel9@sha256:66aea526bc10e4c0136ba86e394bbdfe4fbd7f757d6f391a561b51d2ba2f4d46_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-operator-rhel9@sha256:d0cf0e81589f0938de45961eaddfc5ec4782738fd11082de0439b200534259eb_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-operator-rhel9@sha256:f1b1f5044db6bb945584f9d4f31d020597725a286ef368ed0aca2116abb31beb_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-wait-for-vmi-status-rhel9@sha256:39a15d03f113735df03b1a7408227eb9604d942c1f3c1992bcdc7eaf07662711_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-wait-for-vmi-status-rhel9@sha256:afb68af076954fcd18c7a4a1464ea0c2a766e8282eae980051906ed07eaa1707_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-template-validator-rhel9@sha256:02b22c7e7014b5e72d47fed8b6a268cf307638c5510adf3916c51f7f40a52a08_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-template-validator-rhel9@sha256:c0264b9271e602f85b2040ef7f207cdfa46038dc4fa6e4738bf196ef88a71cf8_amd64",
"9Base-CNV-4.13:container-native-virtualization/libguestfs-tools-rhel9@sha256:29ae84575bbca24553cf649256759fd96ff286971d80bc2db129154a7df9b283_amd64",
"9Base-CNV-4.13:container-native-virtualization/libguestfs-tools-rhel9@sha256:6558f60343e068b032167e2340b2c549c5f0258acc5d2614b60966ce79408b01_arm64",
"9Base-CNV-4.13:container-native-virtualization/multus-dynamic-networks-rhel9@sha256:3ecb0162a4b01d1590bf209d717b32a4f0835910d9979823f18c24acba41b503_arm64",
"9Base-CNV-4.13:container-native-virtualization/multus-dynamic-networks-rhel9@sha256:b7f68b6420009e21380d32d6459193aae45e93be9533debe17cb3108571b36b8_amd64",
"9Base-CNV-4.13:container-native-virtualization/ovs-cni-plugin-rhel9@sha256:0f1d372f418744e0aff59ecb0a38f53178aac9c2e9eecfd38aa25ed83e0d1360_arm64",
"9Base-CNV-4.13:container-native-virtualization/ovs-cni-plugin-rhel9@sha256:e8e7a44edbf1713fe74de5c4b8f691cce78f4440c4a32a16ba9ad16694a55396_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-api-rhel9@sha256:e68416321ca8c74a547b3d35897f54813c03481143e402e9bdc4daf315e35b5d_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-api-rhel9@sha256:fdb4ca1bb8b310d713d9c7e88f7d091f4460aa942dbeca5ebcf17281a06daffe_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-artifacts-server-rhel9@sha256:33d11c1832b49df39c1fca62bad40dbc5c30a452248339aaef449ac99509accb_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-artifacts-server-rhel9@sha256:81fc61b714baecb5a89fa6c0749c14566e0661b8e184ca602fc2e03b9cf431ee_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-apiserver-rhel9@sha256:f6128a63344ed2129f5bce648ddcfaa2869d31cde4b93328d3c22534b97ade10_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-apiserver-rhel9@sha256:feca273a691d09445c6cff6d36b5d590735e867656a9898ce0d89744d98e8006_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-cloner-rhel9@sha256:68e3b9b0291b4fb277ac430269ffce11d13b0a7688cf2ffcdb7f98759c36b4db_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-cloner-rhel9@sha256:6ac212767481bef64d8a7d0252bb8089c0f9751fad4a355aef71bd49dad2ad07_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-controller-rhel9@sha256:65f5263275d9f0a12b8fb057d82adf678778039ec873ca9bde182dea3413c9f1_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-controller-rhel9@sha256:d9e62b2019328be258489ac852eef25f8b1233f29abac6bcea5b406329f97fed_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-importer-rhel9@sha256:00a6d9d24ca1466d450b02269ec3144fc7550f0e5c696e869fbf7ce10cae6093_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-importer-rhel9@sha256:2df07fb21a3575e74aa16ded20129828f2300cd33e8ab369b0362062d49e62d0_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-operator-rhel9@sha256:20ec064750faedd97d11b797c8c1d9a1db5d60d7d76e82e65cfd05eb79d65e29_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-operator-rhel9@sha256:802ee8923d9d8e406b23911406f9748756c0ef4d6954e9e2fd5fb4bdf91dde9a_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-uploadproxy-rhel9@sha256:392d0f61f462c707adfdc21e4239c5c09d8520a80486b41d9d9ae479267d6124_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-uploadproxy-rhel9@sha256:6775f34353eec8f35bead9411dde155530d079bb8d51582fb1f2aacc27dbde1d_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-uploadserver-rhel9@sha256:4528c24672689cfb6505761b6b108fbcc04488192733f23d2bfe39cd42a1d743_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-uploadserver-rhel9@sha256:b22048390387380af94e267c8a9a66813c515997456d59d8ebac1486916b6585_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-controller-rhel9@sha256:3e7880149ee9a68286e390beb3d9779f7403c30fc5136e5370e0e4690a3fd243_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-controller-rhel9@sha256:970edc281d7a731e9f7e8c2d4440fe48a221e5e355d5235c5413b4c3adb28503_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-exportproxy-rhel9@sha256:1bda34d5bff734ad997202f29a5ff6f7362fd79fa90511a422442ef2e3681198_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-exportproxy-rhel9@sha256:de3c4afbf7669b98517cbef2490ec186f0553dd97b05bed80ec36dd883fe507b_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-exportserver-rhel9@sha256:3f7f98645176d42c63cca5c0fc3182a03121af87446ca421b6c72baf07dfca0d_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-exportserver-rhel9@sha256:8f12955cd777eb2409037a6968aa92f50c99d6e07e722951dbcfd0c8c9829b5e_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-handler-rhel9@sha256:5fc47110d866d8048aec50689090ce10705d19d3bb48d2b06727d6d569003af7_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-handler-rhel9@sha256:84ba79ae9658699147d2493df2582ab6df10adbff4d44a533c3fe6a9f45f9691_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-launcher-rhel9@sha256:4990d40d9987d5126d105dd45be2501eaded248cb61bdde5ea8d359bc1e7ebef_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-launcher-rhel9@sha256:95aeacb98209e0baef27ce0e02fbac38d693cea74808fc77107efda0f344bcb5_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-operator-rhel9@sha256:5c1a7e4ed2061938987b900a2394f07121d4037350c9bb6485213a2adfea787d_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-operator-rhel9@sha256:66b1b3b379121d6411ba22283e7d991617177330c93746d37753ab7812b9a00b_arm64",
"9Base-CNV-4.13:container-native-virtualization/virtio-win-rhel9@sha256:8735f51da918408a8826601c082d1b29accf26d59b9978da89b980cb509c1102_arm64",
"9Base-CNV-4.13:container-native-virtualization/virtio-win-rhel9@sha256:d147d2a6eb6f907d1e88f61aaca83596853bc72164583d6dda2b1154b490de25_amd64",
"9Base-CNV-4.13:container-native-virtualization/vm-console-proxy-rhel9@sha256:70a8d0cd66182c25e02679540bae1368b2a9cf687532b58dba41ef30c5ca00c1_arm64",
"9Base-CNV-4.13:container-native-virtualization/vm-console-proxy-rhel9@sha256:7ca921f98f6d81a126907127a611146fb53397869a628678faa1e289c01d22b2_amd64",
"9Base-CNV-4.13:container-native-virtualization/vm-network-latency-checkup-rhel9@sha256:503ea7ac914a9b54e9d665a0227ee0b5d5200cdb5d692aa94c07dd1518d91b70_arm64",
"9Base-CNV-4.13:container-native-virtualization/vm-network-latency-checkup-rhel9@sha256:59fd965975bccf641a0fa7aa01374d45057bd03cda7528248a84b60b1205bf57_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-2880"
},
{
"category": "external",
"summary": "RHBZ#2132868",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2132868"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-2880",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2880"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-2880",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-2880"
},
{
"category": "external",
"summary": "https://github.com/golang/go/issues/54663",
"url": "https://github.com/golang/go/issues/54663"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/xtuG5faxtaU?pli=1",
"url": "https://groups.google.com/g/golang-announce/c/xtuG5faxtaU?pli=1"
}
],
"release_date": "2022-10-04T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-05-18T02:55:08+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"9Base-CNV-4.13:container-native-virtualization/bridge-marker-rhel9@sha256:8eac196b30a648989cdca5cb153a3bc3d34e47339acba0e4f760bd366496c99d_amd64",
"9Base-CNV-4.13:container-native-virtualization/bridge-marker-rhel9@sha256:e8a55aee3d75a316bb0d7a554c737198823df04b3c05e481c17e45eb2153bced_arm64",
"9Base-CNV-4.13:container-native-virtualization/cluster-network-addons-operator-rhel9@sha256:3bff33e3f40cd1e2b519c2db56734d4bb8df883e155c2f20b1cb9d3d184daec1_amd64",
"9Base-CNV-4.13:container-native-virtualization/cluster-network-addons-operator-rhel9@sha256:f439d2f420bb59eb1d5af14ce2002648d0cfc155d1a1466c8aac9b661fe902b8_arm64",
"9Base-CNV-4.13:container-native-virtualization/cnv-containernetworking-plugins-rhel9@sha256:89f22e541f61a660c9aa9f38ef58e80b84a0517f74e84292107fc252c25465c9_arm64",
"9Base-CNV-4.13:container-native-virtualization/cnv-containernetworking-plugins-rhel9@sha256:bf471997e54e4a75b0d71f492ab295787fdbb14d8c85c4ea8c03f0552dbc3755_amd64",
"9Base-CNV-4.13:container-native-virtualization/cnv-must-gather-rhel9@sha256:9e8efd76924958eb605401abdac08eba97fb83a1ada383bc87a7fb7c87b3a455_arm64",
"9Base-CNV-4.13:container-native-virtualization/cnv-must-gather-rhel9@sha256:b9fc32b5fabedd65a4c3a471879c808af2087277de4278adaa115a732f0468da_amd64",
"9Base-CNV-4.13:container-native-virtualization/hco-bundle-registry-rhel9@sha256:60e89d7a99ff9f20e974430b802dd724a3bb6fa1e01e5a62daad98ac487b3063_amd64",
"9Base-CNV-4.13:container-native-virtualization/hco-bundle-registry-rhel9@sha256:dd20b138045ef1424d83a47e7abcfcbb2ac54577dcec5ed3c186390aaa4c9d84_arm64",
"9Base-CNV-4.13:container-native-virtualization/hostpath-csi-driver-rhel9@sha256:61e2824853d51347593ad909a5e546cd92e4216d6a1df5dffb50dd9cba277cce_amd64",
"9Base-CNV-4.13:container-native-virtualization/hostpath-csi-driver-rhel9@sha256:676d4c23a5f60dd331728af056b0a6b2d3358ac88da23299b1a98dfaca8f288e_arm64",
"9Base-CNV-4.13:container-native-virtualization/hostpath-provisioner-operator-rhel9@sha256:515be94be496c67f5b8fd5f4832fe4385e56476e6589897d6b9fbb9bb2b00f32_amd64",
"9Base-CNV-4.13:container-native-virtualization/hostpath-provisioner-operator-rhel9@sha256:571ae805641dea11646028c946039983c7fd82f138b915dcb8b80c39b465e63c_arm64",
"9Base-CNV-4.13:container-native-virtualization/hostpath-provisioner-rhel9@sha256:ac3fe350bedd6bc43596444ba0f279ccf8a144ab14ac5a9b80ea71c46390b7b4_amd64",
"9Base-CNV-4.13:container-native-virtualization/hostpath-provisioner-rhel9@sha256:d4ed87745b7ee2acca2d83e2c91c2f6dced1903c81495b50f2559b3ba2dde287_arm64",
"9Base-CNV-4.13:container-native-virtualization/hyperconverged-cluster-operator-rhel9@sha256:e5ab9f3be59d3568e3d672ab374efb16990ccf92192eac4e1244b10fcd7423e2_amd64",
"9Base-CNV-4.13:container-native-virtualization/hyperconverged-cluster-operator-rhel9@sha256:e681560b184189df03fc84c8a712f32289f42573dd348cda394b19565eb6eca8_arm64",
"9Base-CNV-4.13:container-native-virtualization/hyperconverged-cluster-webhook-rhel9@sha256:06d036d320b3027bb8370bb8e0f6fe8c9f0ec9bca7aac3b5c53698ba4a170042_arm64",
"9Base-CNV-4.13:container-native-virtualization/hyperconverged-cluster-webhook-rhel9@sha256:b5a01336180aad017df62cf8e652f2491b8263ba7e4dd07f858db1ef1924cf2f_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubemacpool-rhel9@sha256:4d190d81eeb3fbe9ed56cf3548dc83a3f81641bfdafa7b42dcfb0d2512566644_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubemacpool-rhel9@sha256:59862a59854f0d5b83dc25ba119f9586a8aff42b6e60d1922f8ae7b4567309ff_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubesecondarydns-rhel9@sha256:121d30d78cc57731ea2242ef2c32430890ac66c2723e65608d5e2f26c3f515cd_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubesecondarydns-rhel9@sha256:b1838f3c8ba3d8113bddea17b78c21e1c1490e2a4a07ea77014edee523d06347_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-console-plugin-rhel9@sha256:86a4b1e3d6ad1d56302c9c058f8bc5826dcfe6c46fb3e0ddaa06818645039020_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-console-plugin-rhel9@sha256:ffb2acd9ae09c1ef9ca756f5eaf6087d0a3957cfc824543949d25f556a97744d_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-dpdk-checkup-rhel9@sha256:525aceb9396010ebcdba14040f267889b807cd84db8e5b4030429b51f0fbf5fe_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-dpdk-checkup-rhel9@sha256:553c4686f56c66cc1e3c5ad9d4051f139d43f821eac3abb98ca5cdb8b5dfe202_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-ssp-operator-rhel9@sha256:901e6cad9534c7bd7c4018c60bccfe49d7280fba5a9901ab4c4d15e9345288c4_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-ssp-operator-rhel9@sha256:badeb0f65f543b209f6af761729d9778b7b73b97d55044016dfba3f38a1f6f18_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-cleanup-vm-rhel9@sha256:28e4975fa4dac22d9da32ed2a10aed039fd957b30140daa36bab2caa998be77a_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-cleanup-vm-rhel9@sha256:b0ff7e812a576ea848590655fc13a85832d5a39f68e7769ceab9da6949da88c7_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-copy-template-rhel9@sha256:4916a6c6b1f9b529187d3b4d5fc99b90157993767b3fe2ad36a9ec77fbb46b10_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-copy-template-rhel9@sha256:f71c36442f1b61cdde7ec58d2c3c78d2039f6d6108e6c35388ef7c1650971fa1_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-create-datavolume-rhel9@sha256:2ad49cf6e2242a9e5861929d9bcab1305a7fc4e34e708f99cff1d7253aa46167_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-create-datavolume-rhel9@sha256:7112400a4ecb23ee2110bf96372fcf9f96ad648a51aa944627b40eb59539a660_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-create-vm-from-template-rhel9@sha256:1411c65bbad7302710788327f6964a4bf5bc20ef70d5e46f4a5c6e7a0e7a0161_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-create-vm-from-template-rhel9@sha256:4d962618aa95600c60c9fc8b890186e510de91177d51949e12797a3558e31328_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-customize-rhel9@sha256:5c23d3f20ea9dcbe7109284d73078ecd516a070e964b844f8d80b1d92ebd55ee_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-customize-rhel9@sha256:a780244e48c6d4f87446d3754c3eb9ab79c0d54675c189da4a659f7a4d5668ea_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-sysprep-rhel9@sha256:84577d949a1bbcaa291c70729127bca4a8994df03068666baa23840877ea8392_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-sysprep-rhel9@sha256:aed630a597a090179e1b0e0c117e536df06b67d0f793f91936aa7388c0c5d7eb_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-modify-vm-template-rhel9@sha256:31d959b80cf57462e1705684bb7e1b78af26bd2c62f1c9e4e51e1d02199b05a8_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-modify-vm-template-rhel9@sha256:66aea526bc10e4c0136ba86e394bbdfe4fbd7f757d6f391a561b51d2ba2f4d46_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-operator-rhel9@sha256:d0cf0e81589f0938de45961eaddfc5ec4782738fd11082de0439b200534259eb_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-operator-rhel9@sha256:f1b1f5044db6bb945584f9d4f31d020597725a286ef368ed0aca2116abb31beb_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-wait-for-vmi-status-rhel9@sha256:39a15d03f113735df03b1a7408227eb9604d942c1f3c1992bcdc7eaf07662711_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-wait-for-vmi-status-rhel9@sha256:afb68af076954fcd18c7a4a1464ea0c2a766e8282eae980051906ed07eaa1707_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-template-validator-rhel9@sha256:02b22c7e7014b5e72d47fed8b6a268cf307638c5510adf3916c51f7f40a52a08_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-template-validator-rhel9@sha256:c0264b9271e602f85b2040ef7f207cdfa46038dc4fa6e4738bf196ef88a71cf8_amd64",
"9Base-CNV-4.13:container-native-virtualization/libguestfs-tools-rhel9@sha256:29ae84575bbca24553cf649256759fd96ff286971d80bc2db129154a7df9b283_amd64",
"9Base-CNV-4.13:container-native-virtualization/libguestfs-tools-rhel9@sha256:6558f60343e068b032167e2340b2c549c5f0258acc5d2614b60966ce79408b01_arm64",
"9Base-CNV-4.13:container-native-virtualization/multus-dynamic-networks-rhel9@sha256:3ecb0162a4b01d1590bf209d717b32a4f0835910d9979823f18c24acba41b503_arm64",
"9Base-CNV-4.13:container-native-virtualization/multus-dynamic-networks-rhel9@sha256:b7f68b6420009e21380d32d6459193aae45e93be9533debe17cb3108571b36b8_amd64",
"9Base-CNV-4.13:container-native-virtualization/ovs-cni-plugin-rhel9@sha256:0f1d372f418744e0aff59ecb0a38f53178aac9c2e9eecfd38aa25ed83e0d1360_arm64",
"9Base-CNV-4.13:container-native-virtualization/ovs-cni-plugin-rhel9@sha256:e8e7a44edbf1713fe74de5c4b8f691cce78f4440c4a32a16ba9ad16694a55396_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-api-rhel9@sha256:e68416321ca8c74a547b3d35897f54813c03481143e402e9bdc4daf315e35b5d_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-api-rhel9@sha256:fdb4ca1bb8b310d713d9c7e88f7d091f4460aa942dbeca5ebcf17281a06daffe_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-artifacts-server-rhel9@sha256:33d11c1832b49df39c1fca62bad40dbc5c30a452248339aaef449ac99509accb_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-artifacts-server-rhel9@sha256:81fc61b714baecb5a89fa6c0749c14566e0661b8e184ca602fc2e03b9cf431ee_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-apiserver-rhel9@sha256:f6128a63344ed2129f5bce648ddcfaa2869d31cde4b93328d3c22534b97ade10_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-apiserver-rhel9@sha256:feca273a691d09445c6cff6d36b5d590735e867656a9898ce0d89744d98e8006_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-cloner-rhel9@sha256:68e3b9b0291b4fb277ac430269ffce11d13b0a7688cf2ffcdb7f98759c36b4db_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-cloner-rhel9@sha256:6ac212767481bef64d8a7d0252bb8089c0f9751fad4a355aef71bd49dad2ad07_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-controller-rhel9@sha256:65f5263275d9f0a12b8fb057d82adf678778039ec873ca9bde182dea3413c9f1_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-controller-rhel9@sha256:d9e62b2019328be258489ac852eef25f8b1233f29abac6bcea5b406329f97fed_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-importer-rhel9@sha256:00a6d9d24ca1466d450b02269ec3144fc7550f0e5c696e869fbf7ce10cae6093_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-importer-rhel9@sha256:2df07fb21a3575e74aa16ded20129828f2300cd33e8ab369b0362062d49e62d0_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-operator-rhel9@sha256:20ec064750faedd97d11b797c8c1d9a1db5d60d7d76e82e65cfd05eb79d65e29_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-operator-rhel9@sha256:802ee8923d9d8e406b23911406f9748756c0ef4d6954e9e2fd5fb4bdf91dde9a_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-uploadproxy-rhel9@sha256:392d0f61f462c707adfdc21e4239c5c09d8520a80486b41d9d9ae479267d6124_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-uploadproxy-rhel9@sha256:6775f34353eec8f35bead9411dde155530d079bb8d51582fb1f2aacc27dbde1d_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-uploadserver-rhel9@sha256:4528c24672689cfb6505761b6b108fbcc04488192733f23d2bfe39cd42a1d743_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-uploadserver-rhel9@sha256:b22048390387380af94e267c8a9a66813c515997456d59d8ebac1486916b6585_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-controller-rhel9@sha256:3e7880149ee9a68286e390beb3d9779f7403c30fc5136e5370e0e4690a3fd243_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-controller-rhel9@sha256:970edc281d7a731e9f7e8c2d4440fe48a221e5e355d5235c5413b4c3adb28503_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-exportproxy-rhel9@sha256:1bda34d5bff734ad997202f29a5ff6f7362fd79fa90511a422442ef2e3681198_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-exportproxy-rhel9@sha256:de3c4afbf7669b98517cbef2490ec186f0553dd97b05bed80ec36dd883fe507b_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-exportserver-rhel9@sha256:3f7f98645176d42c63cca5c0fc3182a03121af87446ca421b6c72baf07dfca0d_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-exportserver-rhel9@sha256:8f12955cd777eb2409037a6968aa92f50c99d6e07e722951dbcfd0c8c9829b5e_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-handler-rhel9@sha256:5fc47110d866d8048aec50689090ce10705d19d3bb48d2b06727d6d569003af7_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-handler-rhel9@sha256:84ba79ae9658699147d2493df2582ab6df10adbff4d44a533c3fe6a9f45f9691_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-launcher-rhel9@sha256:4990d40d9987d5126d105dd45be2501eaded248cb61bdde5ea8d359bc1e7ebef_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-launcher-rhel9@sha256:95aeacb98209e0baef27ce0e02fbac38d693cea74808fc77107efda0f344bcb5_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-operator-rhel9@sha256:5c1a7e4ed2061938987b900a2394f07121d4037350c9bb6485213a2adfea787d_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-operator-rhel9@sha256:66b1b3b379121d6411ba22283e7d991617177330c93746d37753ab7812b9a00b_arm64",
"9Base-CNV-4.13:container-native-virtualization/virtio-win-rhel9@sha256:8735f51da918408a8826601c082d1b29accf26d59b9978da89b980cb509c1102_arm64",
"9Base-CNV-4.13:container-native-virtualization/virtio-win-rhel9@sha256:d147d2a6eb6f907d1e88f61aaca83596853bc72164583d6dda2b1154b490de25_amd64",
"9Base-CNV-4.13:container-native-virtualization/vm-console-proxy-rhel9@sha256:70a8d0cd66182c25e02679540bae1368b2a9cf687532b58dba41ef30c5ca00c1_arm64",
"9Base-CNV-4.13:container-native-virtualization/vm-console-proxy-rhel9@sha256:7ca921f98f6d81a126907127a611146fb53397869a628678faa1e289c01d22b2_amd64",
"9Base-CNV-4.13:container-native-virtualization/vm-network-latency-checkup-rhel9@sha256:503ea7ac914a9b54e9d665a0227ee0b5d5200cdb5d692aa94c07dd1518d91b70_arm64",
"9Base-CNV-4.13:container-native-virtualization/vm-network-latency-checkup-rhel9@sha256:59fd965975bccf641a0fa7aa01374d45057bd03cda7528248a84b60b1205bf57_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:3205"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"9Base-CNV-4.13:container-native-virtualization/bridge-marker-rhel9@sha256:8eac196b30a648989cdca5cb153a3bc3d34e47339acba0e4f760bd366496c99d_amd64",
"9Base-CNV-4.13:container-native-virtualization/bridge-marker-rhel9@sha256:e8a55aee3d75a316bb0d7a554c737198823df04b3c05e481c17e45eb2153bced_arm64",
"9Base-CNV-4.13:container-native-virtualization/cluster-network-addons-operator-rhel9@sha256:3bff33e3f40cd1e2b519c2db56734d4bb8df883e155c2f20b1cb9d3d184daec1_amd64",
"9Base-CNV-4.13:container-native-virtualization/cluster-network-addons-operator-rhel9@sha256:f439d2f420bb59eb1d5af14ce2002648d0cfc155d1a1466c8aac9b661fe902b8_arm64",
"9Base-CNV-4.13:container-native-virtualization/cnv-containernetworking-plugins-rhel9@sha256:89f22e541f61a660c9aa9f38ef58e80b84a0517f74e84292107fc252c25465c9_arm64",
"9Base-CNV-4.13:container-native-virtualization/cnv-containernetworking-plugins-rhel9@sha256:bf471997e54e4a75b0d71f492ab295787fdbb14d8c85c4ea8c03f0552dbc3755_amd64",
"9Base-CNV-4.13:container-native-virtualization/cnv-must-gather-rhel9@sha256:9e8efd76924958eb605401abdac08eba97fb83a1ada383bc87a7fb7c87b3a455_arm64",
"9Base-CNV-4.13:container-native-virtualization/cnv-must-gather-rhel9@sha256:b9fc32b5fabedd65a4c3a471879c808af2087277de4278adaa115a732f0468da_amd64",
"9Base-CNV-4.13:container-native-virtualization/hco-bundle-registry-rhel9@sha256:60e89d7a99ff9f20e974430b802dd724a3bb6fa1e01e5a62daad98ac487b3063_amd64",
"9Base-CNV-4.13:container-native-virtualization/hco-bundle-registry-rhel9@sha256:dd20b138045ef1424d83a47e7abcfcbb2ac54577dcec5ed3c186390aaa4c9d84_arm64",
"9Base-CNV-4.13:container-native-virtualization/hostpath-csi-driver-rhel9@sha256:61e2824853d51347593ad909a5e546cd92e4216d6a1df5dffb50dd9cba277cce_amd64",
"9Base-CNV-4.13:container-native-virtualization/hostpath-csi-driver-rhel9@sha256:676d4c23a5f60dd331728af056b0a6b2d3358ac88da23299b1a98dfaca8f288e_arm64",
"9Base-CNV-4.13:container-native-virtualization/hostpath-provisioner-operator-rhel9@sha256:515be94be496c67f5b8fd5f4832fe4385e56476e6589897d6b9fbb9bb2b00f32_amd64",
"9Base-CNV-4.13:container-native-virtualization/hostpath-provisioner-operator-rhel9@sha256:571ae805641dea11646028c946039983c7fd82f138b915dcb8b80c39b465e63c_arm64",
"9Base-CNV-4.13:container-native-virtualization/hostpath-provisioner-rhel9@sha256:ac3fe350bedd6bc43596444ba0f279ccf8a144ab14ac5a9b80ea71c46390b7b4_amd64",
"9Base-CNV-4.13:container-native-virtualization/hostpath-provisioner-rhel9@sha256:d4ed87745b7ee2acca2d83e2c91c2f6dced1903c81495b50f2559b3ba2dde287_arm64",
"9Base-CNV-4.13:container-native-virtualization/hyperconverged-cluster-operator-rhel9@sha256:e5ab9f3be59d3568e3d672ab374efb16990ccf92192eac4e1244b10fcd7423e2_amd64",
"9Base-CNV-4.13:container-native-virtualization/hyperconverged-cluster-operator-rhel9@sha256:e681560b184189df03fc84c8a712f32289f42573dd348cda394b19565eb6eca8_arm64",
"9Base-CNV-4.13:container-native-virtualization/hyperconverged-cluster-webhook-rhel9@sha256:06d036d320b3027bb8370bb8e0f6fe8c9f0ec9bca7aac3b5c53698ba4a170042_arm64",
"9Base-CNV-4.13:container-native-virtualization/hyperconverged-cluster-webhook-rhel9@sha256:b5a01336180aad017df62cf8e652f2491b8263ba7e4dd07f858db1ef1924cf2f_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubemacpool-rhel9@sha256:4d190d81eeb3fbe9ed56cf3548dc83a3f81641bfdafa7b42dcfb0d2512566644_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubemacpool-rhel9@sha256:59862a59854f0d5b83dc25ba119f9586a8aff42b6e60d1922f8ae7b4567309ff_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubesecondarydns-rhel9@sha256:121d30d78cc57731ea2242ef2c32430890ac66c2723e65608d5e2f26c3f515cd_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubesecondarydns-rhel9@sha256:b1838f3c8ba3d8113bddea17b78c21e1c1490e2a4a07ea77014edee523d06347_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-console-plugin-rhel9@sha256:86a4b1e3d6ad1d56302c9c058f8bc5826dcfe6c46fb3e0ddaa06818645039020_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-console-plugin-rhel9@sha256:ffb2acd9ae09c1ef9ca756f5eaf6087d0a3957cfc824543949d25f556a97744d_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-dpdk-checkup-rhel9@sha256:525aceb9396010ebcdba14040f267889b807cd84db8e5b4030429b51f0fbf5fe_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-dpdk-checkup-rhel9@sha256:553c4686f56c66cc1e3c5ad9d4051f139d43f821eac3abb98ca5cdb8b5dfe202_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-ssp-operator-rhel9@sha256:901e6cad9534c7bd7c4018c60bccfe49d7280fba5a9901ab4c4d15e9345288c4_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-ssp-operator-rhel9@sha256:badeb0f65f543b209f6af761729d9778b7b73b97d55044016dfba3f38a1f6f18_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-cleanup-vm-rhel9@sha256:28e4975fa4dac22d9da32ed2a10aed039fd957b30140daa36bab2caa998be77a_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-cleanup-vm-rhel9@sha256:b0ff7e812a576ea848590655fc13a85832d5a39f68e7769ceab9da6949da88c7_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-copy-template-rhel9@sha256:4916a6c6b1f9b529187d3b4d5fc99b90157993767b3fe2ad36a9ec77fbb46b10_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-copy-template-rhel9@sha256:f71c36442f1b61cdde7ec58d2c3c78d2039f6d6108e6c35388ef7c1650971fa1_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-create-datavolume-rhel9@sha256:2ad49cf6e2242a9e5861929d9bcab1305a7fc4e34e708f99cff1d7253aa46167_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-create-datavolume-rhel9@sha256:7112400a4ecb23ee2110bf96372fcf9f96ad648a51aa944627b40eb59539a660_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-create-vm-from-template-rhel9@sha256:1411c65bbad7302710788327f6964a4bf5bc20ef70d5e46f4a5c6e7a0e7a0161_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-create-vm-from-template-rhel9@sha256:4d962618aa95600c60c9fc8b890186e510de91177d51949e12797a3558e31328_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-customize-rhel9@sha256:5c23d3f20ea9dcbe7109284d73078ecd516a070e964b844f8d80b1d92ebd55ee_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-customize-rhel9@sha256:a780244e48c6d4f87446d3754c3eb9ab79c0d54675c189da4a659f7a4d5668ea_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-sysprep-rhel9@sha256:84577d949a1bbcaa291c70729127bca4a8994df03068666baa23840877ea8392_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-sysprep-rhel9@sha256:aed630a597a090179e1b0e0c117e536df06b67d0f793f91936aa7388c0c5d7eb_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-modify-vm-template-rhel9@sha256:31d959b80cf57462e1705684bb7e1b78af26bd2c62f1c9e4e51e1d02199b05a8_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-modify-vm-template-rhel9@sha256:66aea526bc10e4c0136ba86e394bbdfe4fbd7f757d6f391a561b51d2ba2f4d46_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-operator-rhel9@sha256:d0cf0e81589f0938de45961eaddfc5ec4782738fd11082de0439b200534259eb_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-operator-rhel9@sha256:f1b1f5044db6bb945584f9d4f31d020597725a286ef368ed0aca2116abb31beb_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-wait-for-vmi-status-rhel9@sha256:39a15d03f113735df03b1a7408227eb9604d942c1f3c1992bcdc7eaf07662711_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-wait-for-vmi-status-rhel9@sha256:afb68af076954fcd18c7a4a1464ea0c2a766e8282eae980051906ed07eaa1707_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-template-validator-rhel9@sha256:02b22c7e7014b5e72d47fed8b6a268cf307638c5510adf3916c51f7f40a52a08_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-template-validator-rhel9@sha256:c0264b9271e602f85b2040ef7f207cdfa46038dc4fa6e4738bf196ef88a71cf8_amd64",
"9Base-CNV-4.13:container-native-virtualization/libguestfs-tools-rhel9@sha256:29ae84575bbca24553cf649256759fd96ff286971d80bc2db129154a7df9b283_amd64",
"9Base-CNV-4.13:container-native-virtualization/libguestfs-tools-rhel9@sha256:6558f60343e068b032167e2340b2c549c5f0258acc5d2614b60966ce79408b01_arm64",
"9Base-CNV-4.13:container-native-virtualization/multus-dynamic-networks-rhel9@sha256:3ecb0162a4b01d1590bf209d717b32a4f0835910d9979823f18c24acba41b503_arm64",
"9Base-CNV-4.13:container-native-virtualization/multus-dynamic-networks-rhel9@sha256:b7f68b6420009e21380d32d6459193aae45e93be9533debe17cb3108571b36b8_amd64",
"9Base-CNV-4.13:container-native-virtualization/ovs-cni-plugin-rhel9@sha256:0f1d372f418744e0aff59ecb0a38f53178aac9c2e9eecfd38aa25ed83e0d1360_arm64",
"9Base-CNV-4.13:container-native-virtualization/ovs-cni-plugin-rhel9@sha256:e8e7a44edbf1713fe74de5c4b8f691cce78f4440c4a32a16ba9ad16694a55396_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-api-rhel9@sha256:e68416321ca8c74a547b3d35897f54813c03481143e402e9bdc4daf315e35b5d_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-api-rhel9@sha256:fdb4ca1bb8b310d713d9c7e88f7d091f4460aa942dbeca5ebcf17281a06daffe_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-artifacts-server-rhel9@sha256:33d11c1832b49df39c1fca62bad40dbc5c30a452248339aaef449ac99509accb_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-artifacts-server-rhel9@sha256:81fc61b714baecb5a89fa6c0749c14566e0661b8e184ca602fc2e03b9cf431ee_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-apiserver-rhel9@sha256:f6128a63344ed2129f5bce648ddcfaa2869d31cde4b93328d3c22534b97ade10_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-apiserver-rhel9@sha256:feca273a691d09445c6cff6d36b5d590735e867656a9898ce0d89744d98e8006_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-cloner-rhel9@sha256:68e3b9b0291b4fb277ac430269ffce11d13b0a7688cf2ffcdb7f98759c36b4db_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-cloner-rhel9@sha256:6ac212767481bef64d8a7d0252bb8089c0f9751fad4a355aef71bd49dad2ad07_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-controller-rhel9@sha256:65f5263275d9f0a12b8fb057d82adf678778039ec873ca9bde182dea3413c9f1_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-controller-rhel9@sha256:d9e62b2019328be258489ac852eef25f8b1233f29abac6bcea5b406329f97fed_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-importer-rhel9@sha256:00a6d9d24ca1466d450b02269ec3144fc7550f0e5c696e869fbf7ce10cae6093_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-importer-rhel9@sha256:2df07fb21a3575e74aa16ded20129828f2300cd33e8ab369b0362062d49e62d0_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-operator-rhel9@sha256:20ec064750faedd97d11b797c8c1d9a1db5d60d7d76e82e65cfd05eb79d65e29_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-operator-rhel9@sha256:802ee8923d9d8e406b23911406f9748756c0ef4d6954e9e2fd5fb4bdf91dde9a_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-uploadproxy-rhel9@sha256:392d0f61f462c707adfdc21e4239c5c09d8520a80486b41d9d9ae479267d6124_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-uploadproxy-rhel9@sha256:6775f34353eec8f35bead9411dde155530d079bb8d51582fb1f2aacc27dbde1d_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-uploadserver-rhel9@sha256:4528c24672689cfb6505761b6b108fbcc04488192733f23d2bfe39cd42a1d743_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-uploadserver-rhel9@sha256:b22048390387380af94e267c8a9a66813c515997456d59d8ebac1486916b6585_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-controller-rhel9@sha256:3e7880149ee9a68286e390beb3d9779f7403c30fc5136e5370e0e4690a3fd243_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-controller-rhel9@sha256:970edc281d7a731e9f7e8c2d4440fe48a221e5e355d5235c5413b4c3adb28503_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-exportproxy-rhel9@sha256:1bda34d5bff734ad997202f29a5ff6f7362fd79fa90511a422442ef2e3681198_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-exportproxy-rhel9@sha256:de3c4afbf7669b98517cbef2490ec186f0553dd97b05bed80ec36dd883fe507b_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-exportserver-rhel9@sha256:3f7f98645176d42c63cca5c0fc3182a03121af87446ca421b6c72baf07dfca0d_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-exportserver-rhel9@sha256:8f12955cd777eb2409037a6968aa92f50c99d6e07e722951dbcfd0c8c9829b5e_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-handler-rhel9@sha256:5fc47110d866d8048aec50689090ce10705d19d3bb48d2b06727d6d569003af7_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-handler-rhel9@sha256:84ba79ae9658699147d2493df2582ab6df10adbff4d44a533c3fe6a9f45f9691_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-launcher-rhel9@sha256:4990d40d9987d5126d105dd45be2501eaded248cb61bdde5ea8d359bc1e7ebef_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-launcher-rhel9@sha256:95aeacb98209e0baef27ce0e02fbac38d693cea74808fc77107efda0f344bcb5_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-operator-rhel9@sha256:5c1a7e4ed2061938987b900a2394f07121d4037350c9bb6485213a2adfea787d_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-operator-rhel9@sha256:66b1b3b379121d6411ba22283e7d991617177330c93746d37753ab7812b9a00b_arm64",
"9Base-CNV-4.13:container-native-virtualization/virtio-win-rhel9@sha256:8735f51da918408a8826601c082d1b29accf26d59b9978da89b980cb509c1102_arm64",
"9Base-CNV-4.13:container-native-virtualization/virtio-win-rhel9@sha256:d147d2a6eb6f907d1e88f61aaca83596853bc72164583d6dda2b1154b490de25_amd64",
"9Base-CNV-4.13:container-native-virtualization/vm-console-proxy-rhel9@sha256:70a8d0cd66182c25e02679540bae1368b2a9cf687532b58dba41ef30c5ca00c1_arm64",
"9Base-CNV-4.13:container-native-virtualization/vm-console-proxy-rhel9@sha256:7ca921f98f6d81a126907127a611146fb53397869a628678faa1e289c01d22b2_amd64",
"9Base-CNV-4.13:container-native-virtualization/vm-network-latency-checkup-rhel9@sha256:503ea7ac914a9b54e9d665a0227ee0b5d5200cdb5d692aa94c07dd1518d91b70_arm64",
"9Base-CNV-4.13:container-native-virtualization/vm-network-latency-checkup-rhel9@sha256:59fd965975bccf641a0fa7aa01374d45057bd03cda7528248a84b60b1205bf57_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "golang: net/http/httputil: ReverseProxy should not forward unparseable query parameters"
},
{
"cve": "CVE-2022-27664",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"discovery_date": "2022-09-06T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"9Base-CNV-4.13:container-native-virtualization/bridge-marker-rhel9@sha256:8eac196b30a648989cdca5cb153a3bc3d34e47339acba0e4f760bd366496c99d_amd64",
"9Base-CNV-4.13:container-native-virtualization/bridge-marker-rhel9@sha256:e8a55aee3d75a316bb0d7a554c737198823df04b3c05e481c17e45eb2153bced_arm64",
"9Base-CNV-4.13:container-native-virtualization/cluster-network-addons-operator-rhel9@sha256:3bff33e3f40cd1e2b519c2db56734d4bb8df883e155c2f20b1cb9d3d184daec1_amd64",
"9Base-CNV-4.13:container-native-virtualization/cluster-network-addons-operator-rhel9@sha256:f439d2f420bb59eb1d5af14ce2002648d0cfc155d1a1466c8aac9b661fe902b8_arm64",
"9Base-CNV-4.13:container-native-virtualization/cnv-containernetworking-plugins-rhel9@sha256:89f22e541f61a660c9aa9f38ef58e80b84a0517f74e84292107fc252c25465c9_arm64",
"9Base-CNV-4.13:container-native-virtualization/cnv-containernetworking-plugins-rhel9@sha256:bf471997e54e4a75b0d71f492ab295787fdbb14d8c85c4ea8c03f0552dbc3755_amd64",
"9Base-CNV-4.13:container-native-virtualization/cnv-must-gather-rhel9@sha256:9e8efd76924958eb605401abdac08eba97fb83a1ada383bc87a7fb7c87b3a455_arm64",
"9Base-CNV-4.13:container-native-virtualization/cnv-must-gather-rhel9@sha256:b9fc32b5fabedd65a4c3a471879c808af2087277de4278adaa115a732f0468da_amd64",
"9Base-CNV-4.13:container-native-virtualization/hco-bundle-registry-rhel9@sha256:60e89d7a99ff9f20e974430b802dd724a3bb6fa1e01e5a62daad98ac487b3063_amd64",
"9Base-CNV-4.13:container-native-virtualization/hco-bundle-registry-rhel9@sha256:dd20b138045ef1424d83a47e7abcfcbb2ac54577dcec5ed3c186390aaa4c9d84_arm64",
"9Base-CNV-4.13:container-native-virtualization/hostpath-csi-driver-rhel9@sha256:61e2824853d51347593ad909a5e546cd92e4216d6a1df5dffb50dd9cba277cce_amd64",
"9Base-CNV-4.13:container-native-virtualization/hostpath-csi-driver-rhel9@sha256:676d4c23a5f60dd331728af056b0a6b2d3358ac88da23299b1a98dfaca8f288e_arm64",
"9Base-CNV-4.13:container-native-virtualization/hostpath-provisioner-operator-rhel9@sha256:515be94be496c67f5b8fd5f4832fe4385e56476e6589897d6b9fbb9bb2b00f32_amd64",
"9Base-CNV-4.13:container-native-virtualization/hostpath-provisioner-operator-rhel9@sha256:571ae805641dea11646028c946039983c7fd82f138b915dcb8b80c39b465e63c_arm64",
"9Base-CNV-4.13:container-native-virtualization/hostpath-provisioner-rhel9@sha256:ac3fe350bedd6bc43596444ba0f279ccf8a144ab14ac5a9b80ea71c46390b7b4_amd64",
"9Base-CNV-4.13:container-native-virtualization/hostpath-provisioner-rhel9@sha256:d4ed87745b7ee2acca2d83e2c91c2f6dced1903c81495b50f2559b3ba2dde287_arm64",
"9Base-CNV-4.13:container-native-virtualization/hyperconverged-cluster-operator-rhel9@sha256:e5ab9f3be59d3568e3d672ab374efb16990ccf92192eac4e1244b10fcd7423e2_amd64",
"9Base-CNV-4.13:container-native-virtualization/hyperconverged-cluster-operator-rhel9@sha256:e681560b184189df03fc84c8a712f32289f42573dd348cda394b19565eb6eca8_arm64",
"9Base-CNV-4.13:container-native-virtualization/hyperconverged-cluster-webhook-rhel9@sha256:06d036d320b3027bb8370bb8e0f6fe8c9f0ec9bca7aac3b5c53698ba4a170042_arm64",
"9Base-CNV-4.13:container-native-virtualization/hyperconverged-cluster-webhook-rhel9@sha256:b5a01336180aad017df62cf8e652f2491b8263ba7e4dd07f858db1ef1924cf2f_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubemacpool-rhel9@sha256:4d190d81eeb3fbe9ed56cf3548dc83a3f81641bfdafa7b42dcfb0d2512566644_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubemacpool-rhel9@sha256:59862a59854f0d5b83dc25ba119f9586a8aff42b6e60d1922f8ae7b4567309ff_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubesecondarydns-rhel9@sha256:121d30d78cc57731ea2242ef2c32430890ac66c2723e65608d5e2f26c3f515cd_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubesecondarydns-rhel9@sha256:b1838f3c8ba3d8113bddea17b78c21e1c1490e2a4a07ea77014edee523d06347_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-console-plugin-rhel9@sha256:86a4b1e3d6ad1d56302c9c058f8bc5826dcfe6c46fb3e0ddaa06818645039020_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-console-plugin-rhel9@sha256:ffb2acd9ae09c1ef9ca756f5eaf6087d0a3957cfc824543949d25f556a97744d_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-dpdk-checkup-rhel9@sha256:525aceb9396010ebcdba14040f267889b807cd84db8e5b4030429b51f0fbf5fe_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-dpdk-checkup-rhel9@sha256:553c4686f56c66cc1e3c5ad9d4051f139d43f821eac3abb98ca5cdb8b5dfe202_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-ssp-operator-rhel9@sha256:901e6cad9534c7bd7c4018c60bccfe49d7280fba5a9901ab4c4d15e9345288c4_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-ssp-operator-rhel9@sha256:badeb0f65f543b209f6af761729d9778b7b73b97d55044016dfba3f38a1f6f18_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-cleanup-vm-rhel9@sha256:28e4975fa4dac22d9da32ed2a10aed039fd957b30140daa36bab2caa998be77a_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-cleanup-vm-rhel9@sha256:b0ff7e812a576ea848590655fc13a85832d5a39f68e7769ceab9da6949da88c7_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-copy-template-rhel9@sha256:4916a6c6b1f9b529187d3b4d5fc99b90157993767b3fe2ad36a9ec77fbb46b10_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-copy-template-rhel9@sha256:f71c36442f1b61cdde7ec58d2c3c78d2039f6d6108e6c35388ef7c1650971fa1_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-create-datavolume-rhel9@sha256:2ad49cf6e2242a9e5861929d9bcab1305a7fc4e34e708f99cff1d7253aa46167_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-create-datavolume-rhel9@sha256:7112400a4ecb23ee2110bf96372fcf9f96ad648a51aa944627b40eb59539a660_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-create-vm-from-template-rhel9@sha256:1411c65bbad7302710788327f6964a4bf5bc20ef70d5e46f4a5c6e7a0e7a0161_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-create-vm-from-template-rhel9@sha256:4d962618aa95600c60c9fc8b890186e510de91177d51949e12797a3558e31328_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-customize-rhel9@sha256:5c23d3f20ea9dcbe7109284d73078ecd516a070e964b844f8d80b1d92ebd55ee_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-customize-rhel9@sha256:a780244e48c6d4f87446d3754c3eb9ab79c0d54675c189da4a659f7a4d5668ea_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-sysprep-rhel9@sha256:84577d949a1bbcaa291c70729127bca4a8994df03068666baa23840877ea8392_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-sysprep-rhel9@sha256:aed630a597a090179e1b0e0c117e536df06b67d0f793f91936aa7388c0c5d7eb_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-modify-vm-template-rhel9@sha256:31d959b80cf57462e1705684bb7e1b78af26bd2c62f1c9e4e51e1d02199b05a8_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-modify-vm-template-rhel9@sha256:66aea526bc10e4c0136ba86e394bbdfe4fbd7f757d6f391a561b51d2ba2f4d46_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-operator-rhel9@sha256:d0cf0e81589f0938de45961eaddfc5ec4782738fd11082de0439b200534259eb_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-operator-rhel9@sha256:f1b1f5044db6bb945584f9d4f31d020597725a286ef368ed0aca2116abb31beb_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-wait-for-vmi-status-rhel9@sha256:39a15d03f113735df03b1a7408227eb9604d942c1f3c1992bcdc7eaf07662711_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-wait-for-vmi-status-rhel9@sha256:afb68af076954fcd18c7a4a1464ea0c2a766e8282eae980051906ed07eaa1707_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-template-validator-rhel9@sha256:02b22c7e7014b5e72d47fed8b6a268cf307638c5510adf3916c51f7f40a52a08_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-template-validator-rhel9@sha256:c0264b9271e602f85b2040ef7f207cdfa46038dc4fa6e4738bf196ef88a71cf8_amd64",
"9Base-CNV-4.13:container-native-virtualization/libguestfs-tools-rhel9@sha256:29ae84575bbca24553cf649256759fd96ff286971d80bc2db129154a7df9b283_amd64",
"9Base-CNV-4.13:container-native-virtualization/libguestfs-tools-rhel9@sha256:6558f60343e068b032167e2340b2c549c5f0258acc5d2614b60966ce79408b01_arm64",
"9Base-CNV-4.13:container-native-virtualization/multus-dynamic-networks-rhel9@sha256:3ecb0162a4b01d1590bf209d717b32a4f0835910d9979823f18c24acba41b503_arm64",
"9Base-CNV-4.13:container-native-virtualization/multus-dynamic-networks-rhel9@sha256:b7f68b6420009e21380d32d6459193aae45e93be9533debe17cb3108571b36b8_amd64",
"9Base-CNV-4.13:container-native-virtualization/ovs-cni-plugin-rhel9@sha256:0f1d372f418744e0aff59ecb0a38f53178aac9c2e9eecfd38aa25ed83e0d1360_arm64",
"9Base-CNV-4.13:container-native-virtualization/ovs-cni-plugin-rhel9@sha256:e8e7a44edbf1713fe74de5c4b8f691cce78f4440c4a32a16ba9ad16694a55396_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-artifacts-server-rhel9@sha256:33d11c1832b49df39c1fca62bad40dbc5c30a452248339aaef449ac99509accb_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-artifacts-server-rhel9@sha256:81fc61b714baecb5a89fa6c0749c14566e0661b8e184ca602fc2e03b9cf431ee_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-apiserver-rhel9@sha256:f6128a63344ed2129f5bce648ddcfaa2869d31cde4b93328d3c22534b97ade10_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-apiserver-rhel9@sha256:feca273a691d09445c6cff6d36b5d590735e867656a9898ce0d89744d98e8006_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-cloner-rhel9@sha256:68e3b9b0291b4fb277ac430269ffce11d13b0a7688cf2ffcdb7f98759c36b4db_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-cloner-rhel9@sha256:6ac212767481bef64d8a7d0252bb8089c0f9751fad4a355aef71bd49dad2ad07_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-controller-rhel9@sha256:65f5263275d9f0a12b8fb057d82adf678778039ec873ca9bde182dea3413c9f1_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-controller-rhel9@sha256:d9e62b2019328be258489ac852eef25f8b1233f29abac6bcea5b406329f97fed_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-importer-rhel9@sha256:00a6d9d24ca1466d450b02269ec3144fc7550f0e5c696e869fbf7ce10cae6093_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-importer-rhel9@sha256:2df07fb21a3575e74aa16ded20129828f2300cd33e8ab369b0362062d49e62d0_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-operator-rhel9@sha256:20ec064750faedd97d11b797c8c1d9a1db5d60d7d76e82e65cfd05eb79d65e29_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-operator-rhel9@sha256:802ee8923d9d8e406b23911406f9748756c0ef4d6954e9e2fd5fb4bdf91dde9a_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-uploadproxy-rhel9@sha256:392d0f61f462c707adfdc21e4239c5c09d8520a80486b41d9d9ae479267d6124_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-uploadproxy-rhel9@sha256:6775f34353eec8f35bead9411dde155530d079bb8d51582fb1f2aacc27dbde1d_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-uploadserver-rhel9@sha256:4528c24672689cfb6505761b6b108fbcc04488192733f23d2bfe39cd42a1d743_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-uploadserver-rhel9@sha256:b22048390387380af94e267c8a9a66813c515997456d59d8ebac1486916b6585_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-controller-rhel9@sha256:3e7880149ee9a68286e390beb3d9779f7403c30fc5136e5370e0e4690a3fd243_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-controller-rhel9@sha256:970edc281d7a731e9f7e8c2d4440fe48a221e5e355d5235c5413b4c3adb28503_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-exportproxy-rhel9@sha256:1bda34d5bff734ad997202f29a5ff6f7362fd79fa90511a422442ef2e3681198_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-exportproxy-rhel9@sha256:de3c4afbf7669b98517cbef2490ec186f0553dd97b05bed80ec36dd883fe507b_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-exportserver-rhel9@sha256:3f7f98645176d42c63cca5c0fc3182a03121af87446ca421b6c72baf07dfca0d_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-exportserver-rhel9@sha256:8f12955cd777eb2409037a6968aa92f50c99d6e07e722951dbcfd0c8c9829b5e_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-handler-rhel9@sha256:5fc47110d866d8048aec50689090ce10705d19d3bb48d2b06727d6d569003af7_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-handler-rhel9@sha256:84ba79ae9658699147d2493df2582ab6df10adbff4d44a533c3fe6a9f45f9691_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-launcher-rhel9@sha256:4990d40d9987d5126d105dd45be2501eaded248cb61bdde5ea8d359bc1e7ebef_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-launcher-rhel9@sha256:95aeacb98209e0baef27ce0e02fbac38d693cea74808fc77107efda0f344bcb5_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-operator-rhel9@sha256:5c1a7e4ed2061938987b900a2394f07121d4037350c9bb6485213a2adfea787d_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-operator-rhel9@sha256:66b1b3b379121d6411ba22283e7d991617177330c93746d37753ab7812b9a00b_arm64",
"9Base-CNV-4.13:container-native-virtualization/virtio-win-rhel9@sha256:8735f51da918408a8826601c082d1b29accf26d59b9978da89b980cb509c1102_arm64",
"9Base-CNV-4.13:container-native-virtualization/virtio-win-rhel9@sha256:d147d2a6eb6f907d1e88f61aaca83596853bc72164583d6dda2b1154b490de25_amd64",
"9Base-CNV-4.13:container-native-virtualization/vm-console-proxy-rhel9@sha256:70a8d0cd66182c25e02679540bae1368b2a9cf687532b58dba41ef30c5ca00c1_arm64",
"9Base-CNV-4.13:container-native-virtualization/vm-console-proxy-rhel9@sha256:7ca921f98f6d81a126907127a611146fb53397869a628678faa1e289c01d22b2_amd64",
"9Base-CNV-4.13:container-native-virtualization/vm-network-latency-checkup-rhel9@sha256:503ea7ac914a9b54e9d665a0227ee0b5d5200cdb5d692aa94c07dd1518d91b70_arm64",
"9Base-CNV-4.13:container-native-virtualization/vm-network-latency-checkup-rhel9@sha256:59fd965975bccf641a0fa7aa01374d45057bd03cda7528248a84b60b1205bf57_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2124669"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the golang package. In net/http in Go, attackers can cause a denial of service because an HTTP/2 connection can hang during closing if a fatal error preempts the shutdown.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: net/http: handle server errors after sending GOAWAY",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The opportunity for a Denial of Service is limited to the golang runtime. In the case of OpenShift Container Platform, this would be restricted within each individual container. There are multiple layers of guide rails (Golang\u2019s Garbage Collector; OpenShift\u2019s resource constraints imposed at the container and cluster levels) which would require a malicious user to continue submitting attacks for there to be any enduring impact. They would also need access to external server resources to be able to send a massive volume of requests to cause a significant impact on server operations.\n\nWithin regulated environments, a combination of the following controls acts as a significant barrier to successfully exploiting a CWE-400: Uncontrolled Resource Consumption vulnerability and therefore downgrades the severity of this particular CVE from Moderate to Low.\n\nRed Hat restricts access to all platform information by default, granting access only after successful hard token-based multi-factor authentication (MFA) and enforcing least privilege to ensure only authorized roles can execute or modify code. The environment employs malicious code protections, including IDS/IPS and antimalware tools to detect threats and monitor resource usage, helping prevent uncontrolled consumption that could lead to system failure. Additional safeguards, such as web application firewalls and load-balancing strategies, protect against resource exhaustion and performance degradation. Event logs are centrally collected, correlated, and analyzed to support monitoring, alerting, and retention, aiding in the detection of abnormal behavior and potential denial-of-service (DoS) conditions. Static code analysis and peer reviews enforce strong input validation and error handling, reducing the likelihood of input-based DoS attacks.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"9Base-CNV-4.13:container-native-virtualization/virt-api-rhel9@sha256:e68416321ca8c74a547b3d35897f54813c03481143e402e9bdc4daf315e35b5d_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-api-rhel9@sha256:fdb4ca1bb8b310d713d9c7e88f7d091f4460aa942dbeca5ebcf17281a06daffe_amd64"
],
"known_not_affected": [
"9Base-CNV-4.13:container-native-virtualization/bridge-marker-rhel9@sha256:8eac196b30a648989cdca5cb153a3bc3d34e47339acba0e4f760bd366496c99d_amd64",
"9Base-CNV-4.13:container-native-virtualization/bridge-marker-rhel9@sha256:e8a55aee3d75a316bb0d7a554c737198823df04b3c05e481c17e45eb2153bced_arm64",
"9Base-CNV-4.13:container-native-virtualization/cluster-network-addons-operator-rhel9@sha256:3bff33e3f40cd1e2b519c2db56734d4bb8df883e155c2f20b1cb9d3d184daec1_amd64",
"9Base-CNV-4.13:container-native-virtualization/cluster-network-addons-operator-rhel9@sha256:f439d2f420bb59eb1d5af14ce2002648d0cfc155d1a1466c8aac9b661fe902b8_arm64",
"9Base-CNV-4.13:container-native-virtualization/cnv-containernetworking-plugins-rhel9@sha256:89f22e541f61a660c9aa9f38ef58e80b84a0517f74e84292107fc252c25465c9_arm64",
"9Base-CNV-4.13:container-native-virtualization/cnv-containernetworking-plugins-rhel9@sha256:bf471997e54e4a75b0d71f492ab295787fdbb14d8c85c4ea8c03f0552dbc3755_amd64",
"9Base-CNV-4.13:container-native-virtualization/cnv-must-gather-rhel9@sha256:9e8efd76924958eb605401abdac08eba97fb83a1ada383bc87a7fb7c87b3a455_arm64",
"9Base-CNV-4.13:container-native-virtualization/cnv-must-gather-rhel9@sha256:b9fc32b5fabedd65a4c3a471879c808af2087277de4278adaa115a732f0468da_amd64",
"9Base-CNV-4.13:container-native-virtualization/hco-bundle-registry-rhel9@sha256:60e89d7a99ff9f20e974430b802dd724a3bb6fa1e01e5a62daad98ac487b3063_amd64",
"9Base-CNV-4.13:container-native-virtualization/hco-bundle-registry-rhel9@sha256:dd20b138045ef1424d83a47e7abcfcbb2ac54577dcec5ed3c186390aaa4c9d84_arm64",
"9Base-CNV-4.13:container-native-virtualization/hostpath-csi-driver-rhel9@sha256:61e2824853d51347593ad909a5e546cd92e4216d6a1df5dffb50dd9cba277cce_amd64",
"9Base-CNV-4.13:container-native-virtualization/hostpath-csi-driver-rhel9@sha256:676d4c23a5f60dd331728af056b0a6b2d3358ac88da23299b1a98dfaca8f288e_arm64",
"9Base-CNV-4.13:container-native-virtualization/hostpath-provisioner-operator-rhel9@sha256:515be94be496c67f5b8fd5f4832fe4385e56476e6589897d6b9fbb9bb2b00f32_amd64",
"9Base-CNV-4.13:container-native-virtualization/hostpath-provisioner-operator-rhel9@sha256:571ae805641dea11646028c946039983c7fd82f138b915dcb8b80c39b465e63c_arm64",
"9Base-CNV-4.13:container-native-virtualization/hostpath-provisioner-rhel9@sha256:ac3fe350bedd6bc43596444ba0f279ccf8a144ab14ac5a9b80ea71c46390b7b4_amd64",
"9Base-CNV-4.13:container-native-virtualization/hostpath-provisioner-rhel9@sha256:d4ed87745b7ee2acca2d83e2c91c2f6dced1903c81495b50f2559b3ba2dde287_arm64",
"9Base-CNV-4.13:container-native-virtualization/hyperconverged-cluster-operator-rhel9@sha256:e5ab9f3be59d3568e3d672ab374efb16990ccf92192eac4e1244b10fcd7423e2_amd64",
"9Base-CNV-4.13:container-native-virtualization/hyperconverged-cluster-operator-rhel9@sha256:e681560b184189df03fc84c8a712f32289f42573dd348cda394b19565eb6eca8_arm64",
"9Base-CNV-4.13:container-native-virtualization/hyperconverged-cluster-webhook-rhel9@sha256:06d036d320b3027bb8370bb8e0f6fe8c9f0ec9bca7aac3b5c53698ba4a170042_arm64",
"9Base-CNV-4.13:container-native-virtualization/hyperconverged-cluster-webhook-rhel9@sha256:b5a01336180aad017df62cf8e652f2491b8263ba7e4dd07f858db1ef1924cf2f_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubemacpool-rhel9@sha256:4d190d81eeb3fbe9ed56cf3548dc83a3f81641bfdafa7b42dcfb0d2512566644_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubemacpool-rhel9@sha256:59862a59854f0d5b83dc25ba119f9586a8aff42b6e60d1922f8ae7b4567309ff_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubesecondarydns-rhel9@sha256:121d30d78cc57731ea2242ef2c32430890ac66c2723e65608d5e2f26c3f515cd_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubesecondarydns-rhel9@sha256:b1838f3c8ba3d8113bddea17b78c21e1c1490e2a4a07ea77014edee523d06347_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-console-plugin-rhel9@sha256:86a4b1e3d6ad1d56302c9c058f8bc5826dcfe6c46fb3e0ddaa06818645039020_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-console-plugin-rhel9@sha256:ffb2acd9ae09c1ef9ca756f5eaf6087d0a3957cfc824543949d25f556a97744d_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-dpdk-checkup-rhel9@sha256:525aceb9396010ebcdba14040f267889b807cd84db8e5b4030429b51f0fbf5fe_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-dpdk-checkup-rhel9@sha256:553c4686f56c66cc1e3c5ad9d4051f139d43f821eac3abb98ca5cdb8b5dfe202_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-ssp-operator-rhel9@sha256:901e6cad9534c7bd7c4018c60bccfe49d7280fba5a9901ab4c4d15e9345288c4_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-ssp-operator-rhel9@sha256:badeb0f65f543b209f6af761729d9778b7b73b97d55044016dfba3f38a1f6f18_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-cleanup-vm-rhel9@sha256:28e4975fa4dac22d9da32ed2a10aed039fd957b30140daa36bab2caa998be77a_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-cleanup-vm-rhel9@sha256:b0ff7e812a576ea848590655fc13a85832d5a39f68e7769ceab9da6949da88c7_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-copy-template-rhel9@sha256:4916a6c6b1f9b529187d3b4d5fc99b90157993767b3fe2ad36a9ec77fbb46b10_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-copy-template-rhel9@sha256:f71c36442f1b61cdde7ec58d2c3c78d2039f6d6108e6c35388ef7c1650971fa1_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-create-datavolume-rhel9@sha256:2ad49cf6e2242a9e5861929d9bcab1305a7fc4e34e708f99cff1d7253aa46167_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-create-datavolume-rhel9@sha256:7112400a4ecb23ee2110bf96372fcf9f96ad648a51aa944627b40eb59539a660_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-create-vm-from-template-rhel9@sha256:1411c65bbad7302710788327f6964a4bf5bc20ef70d5e46f4a5c6e7a0e7a0161_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-create-vm-from-template-rhel9@sha256:4d962618aa95600c60c9fc8b890186e510de91177d51949e12797a3558e31328_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-customize-rhel9@sha256:5c23d3f20ea9dcbe7109284d73078ecd516a070e964b844f8d80b1d92ebd55ee_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-customize-rhel9@sha256:a780244e48c6d4f87446d3754c3eb9ab79c0d54675c189da4a659f7a4d5668ea_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-sysprep-rhel9@sha256:84577d949a1bbcaa291c70729127bca4a8994df03068666baa23840877ea8392_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-sysprep-rhel9@sha256:aed630a597a090179e1b0e0c117e536df06b67d0f793f91936aa7388c0c5d7eb_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-modify-vm-template-rhel9@sha256:31d959b80cf57462e1705684bb7e1b78af26bd2c62f1c9e4e51e1d02199b05a8_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-modify-vm-template-rhel9@sha256:66aea526bc10e4c0136ba86e394bbdfe4fbd7f757d6f391a561b51d2ba2f4d46_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-operator-rhel9@sha256:d0cf0e81589f0938de45961eaddfc5ec4782738fd11082de0439b200534259eb_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-operator-rhel9@sha256:f1b1f5044db6bb945584f9d4f31d020597725a286ef368ed0aca2116abb31beb_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-wait-for-vmi-status-rhel9@sha256:39a15d03f113735df03b1a7408227eb9604d942c1f3c1992bcdc7eaf07662711_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-wait-for-vmi-status-rhel9@sha256:afb68af076954fcd18c7a4a1464ea0c2a766e8282eae980051906ed07eaa1707_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-template-validator-rhel9@sha256:02b22c7e7014b5e72d47fed8b6a268cf307638c5510adf3916c51f7f40a52a08_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-template-validator-rhel9@sha256:c0264b9271e602f85b2040ef7f207cdfa46038dc4fa6e4738bf196ef88a71cf8_amd64",
"9Base-CNV-4.13:container-native-virtualization/libguestfs-tools-rhel9@sha256:29ae84575bbca24553cf649256759fd96ff286971d80bc2db129154a7df9b283_amd64",
"9Base-CNV-4.13:container-native-virtualization/libguestfs-tools-rhel9@sha256:6558f60343e068b032167e2340b2c549c5f0258acc5d2614b60966ce79408b01_arm64",
"9Base-CNV-4.13:container-native-virtualization/multus-dynamic-networks-rhel9@sha256:3ecb0162a4b01d1590bf209d717b32a4f0835910d9979823f18c24acba41b503_arm64",
"9Base-CNV-4.13:container-native-virtualization/multus-dynamic-networks-rhel9@sha256:b7f68b6420009e21380d32d6459193aae45e93be9533debe17cb3108571b36b8_amd64",
"9Base-CNV-4.13:container-native-virtualization/ovs-cni-plugin-rhel9@sha256:0f1d372f418744e0aff59ecb0a38f53178aac9c2e9eecfd38aa25ed83e0d1360_arm64",
"9Base-CNV-4.13:container-native-virtualization/ovs-cni-plugin-rhel9@sha256:e8e7a44edbf1713fe74de5c4b8f691cce78f4440c4a32a16ba9ad16694a55396_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-artifacts-server-rhel9@sha256:33d11c1832b49df39c1fca62bad40dbc5c30a452248339aaef449ac99509accb_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-artifacts-server-rhel9@sha256:81fc61b714baecb5a89fa6c0749c14566e0661b8e184ca602fc2e03b9cf431ee_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-apiserver-rhel9@sha256:f6128a63344ed2129f5bce648ddcfaa2869d31cde4b93328d3c22534b97ade10_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-apiserver-rhel9@sha256:feca273a691d09445c6cff6d36b5d590735e867656a9898ce0d89744d98e8006_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-cloner-rhel9@sha256:68e3b9b0291b4fb277ac430269ffce11d13b0a7688cf2ffcdb7f98759c36b4db_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-cloner-rhel9@sha256:6ac212767481bef64d8a7d0252bb8089c0f9751fad4a355aef71bd49dad2ad07_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-controller-rhel9@sha256:65f5263275d9f0a12b8fb057d82adf678778039ec873ca9bde182dea3413c9f1_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-controller-rhel9@sha256:d9e62b2019328be258489ac852eef25f8b1233f29abac6bcea5b406329f97fed_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-importer-rhel9@sha256:00a6d9d24ca1466d450b02269ec3144fc7550f0e5c696e869fbf7ce10cae6093_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-importer-rhel9@sha256:2df07fb21a3575e74aa16ded20129828f2300cd33e8ab369b0362062d49e62d0_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-operator-rhel9@sha256:20ec064750faedd97d11b797c8c1d9a1db5d60d7d76e82e65cfd05eb79d65e29_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-operator-rhel9@sha256:802ee8923d9d8e406b23911406f9748756c0ef4d6954e9e2fd5fb4bdf91dde9a_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-uploadproxy-rhel9@sha256:392d0f61f462c707adfdc21e4239c5c09d8520a80486b41d9d9ae479267d6124_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-uploadproxy-rhel9@sha256:6775f34353eec8f35bead9411dde155530d079bb8d51582fb1f2aacc27dbde1d_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-uploadserver-rhel9@sha256:4528c24672689cfb6505761b6b108fbcc04488192733f23d2bfe39cd42a1d743_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-uploadserver-rhel9@sha256:b22048390387380af94e267c8a9a66813c515997456d59d8ebac1486916b6585_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-controller-rhel9@sha256:3e7880149ee9a68286e390beb3d9779f7403c30fc5136e5370e0e4690a3fd243_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-controller-rhel9@sha256:970edc281d7a731e9f7e8c2d4440fe48a221e5e355d5235c5413b4c3adb28503_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-exportproxy-rhel9@sha256:1bda34d5bff734ad997202f29a5ff6f7362fd79fa90511a422442ef2e3681198_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-exportproxy-rhel9@sha256:de3c4afbf7669b98517cbef2490ec186f0553dd97b05bed80ec36dd883fe507b_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-exportserver-rhel9@sha256:3f7f98645176d42c63cca5c0fc3182a03121af87446ca421b6c72baf07dfca0d_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-exportserver-rhel9@sha256:8f12955cd777eb2409037a6968aa92f50c99d6e07e722951dbcfd0c8c9829b5e_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-handler-rhel9@sha256:5fc47110d866d8048aec50689090ce10705d19d3bb48d2b06727d6d569003af7_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-handler-rhel9@sha256:84ba79ae9658699147d2493df2582ab6df10adbff4d44a533c3fe6a9f45f9691_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-launcher-rhel9@sha256:4990d40d9987d5126d105dd45be2501eaded248cb61bdde5ea8d359bc1e7ebef_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-launcher-rhel9@sha256:95aeacb98209e0baef27ce0e02fbac38d693cea74808fc77107efda0f344bcb5_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-operator-rhel9@sha256:5c1a7e4ed2061938987b900a2394f07121d4037350c9bb6485213a2adfea787d_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-operator-rhel9@sha256:66b1b3b379121d6411ba22283e7d991617177330c93746d37753ab7812b9a00b_arm64",
"9Base-CNV-4.13:container-native-virtualization/virtio-win-rhel9@sha256:8735f51da918408a8826601c082d1b29accf26d59b9978da89b980cb509c1102_arm64",
"9Base-CNV-4.13:container-native-virtualization/virtio-win-rhel9@sha256:d147d2a6eb6f907d1e88f61aaca83596853bc72164583d6dda2b1154b490de25_amd64",
"9Base-CNV-4.13:container-native-virtualization/vm-console-proxy-rhel9@sha256:70a8d0cd66182c25e02679540bae1368b2a9cf687532b58dba41ef30c5ca00c1_arm64",
"9Base-CNV-4.13:container-native-virtualization/vm-console-proxy-rhel9@sha256:7ca921f98f6d81a126907127a611146fb53397869a628678faa1e289c01d22b2_amd64",
"9Base-CNV-4.13:container-native-virtualization/vm-network-latency-checkup-rhel9@sha256:503ea7ac914a9b54e9d665a0227ee0b5d5200cdb5d692aa94c07dd1518d91b70_arm64",
"9Base-CNV-4.13:container-native-virtualization/vm-network-latency-checkup-rhel9@sha256:59fd965975bccf641a0fa7aa01374d45057bd03cda7528248a84b60b1205bf57_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-27664"
},
{
"category": "external",
"summary": "RHBZ#2124669",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2124669"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-27664",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27664"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-27664",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-27664"
},
{
"category": "external",
"summary": "https://go.dev/issue/54658",
"url": "https://go.dev/issue/54658"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/x49AQzIVX-s/m/0tgO0pjiBQAJ",
"url": "https://groups.google.com/g/golang-announce/c/x49AQzIVX-s/m/0tgO0pjiBQAJ"
}
],
"release_date": "2022-09-06T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-05-18T02:55:08+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"9Base-CNV-4.13:container-native-virtualization/virt-api-rhel9@sha256:e68416321ca8c74a547b3d35897f54813c03481143e402e9bdc4daf315e35b5d_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-api-rhel9@sha256:fdb4ca1bb8b310d713d9c7e88f7d091f4460aa942dbeca5ebcf17281a06daffe_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:3205"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"9Base-CNV-4.13:container-native-virtualization/bridge-marker-rhel9@sha256:8eac196b30a648989cdca5cb153a3bc3d34e47339acba0e4f760bd366496c99d_amd64",
"9Base-CNV-4.13:container-native-virtualization/bridge-marker-rhel9@sha256:e8a55aee3d75a316bb0d7a554c737198823df04b3c05e481c17e45eb2153bced_arm64",
"9Base-CNV-4.13:container-native-virtualization/cluster-network-addons-operator-rhel9@sha256:3bff33e3f40cd1e2b519c2db56734d4bb8df883e155c2f20b1cb9d3d184daec1_amd64",
"9Base-CNV-4.13:container-native-virtualization/cluster-network-addons-operator-rhel9@sha256:f439d2f420bb59eb1d5af14ce2002648d0cfc155d1a1466c8aac9b661fe902b8_arm64",
"9Base-CNV-4.13:container-native-virtualization/cnv-containernetworking-plugins-rhel9@sha256:89f22e541f61a660c9aa9f38ef58e80b84a0517f74e84292107fc252c25465c9_arm64",
"9Base-CNV-4.13:container-native-virtualization/cnv-containernetworking-plugins-rhel9@sha256:bf471997e54e4a75b0d71f492ab295787fdbb14d8c85c4ea8c03f0552dbc3755_amd64",
"9Base-CNV-4.13:container-native-virtualization/cnv-must-gather-rhel9@sha256:9e8efd76924958eb605401abdac08eba97fb83a1ada383bc87a7fb7c87b3a455_arm64",
"9Base-CNV-4.13:container-native-virtualization/cnv-must-gather-rhel9@sha256:b9fc32b5fabedd65a4c3a471879c808af2087277de4278adaa115a732f0468da_amd64",
"9Base-CNV-4.13:container-native-virtualization/hco-bundle-registry-rhel9@sha256:60e89d7a99ff9f20e974430b802dd724a3bb6fa1e01e5a62daad98ac487b3063_amd64",
"9Base-CNV-4.13:container-native-virtualization/hco-bundle-registry-rhel9@sha256:dd20b138045ef1424d83a47e7abcfcbb2ac54577dcec5ed3c186390aaa4c9d84_arm64",
"9Base-CNV-4.13:container-native-virtualization/hostpath-csi-driver-rhel9@sha256:61e2824853d51347593ad909a5e546cd92e4216d6a1df5dffb50dd9cba277cce_amd64",
"9Base-CNV-4.13:container-native-virtualization/hostpath-csi-driver-rhel9@sha256:676d4c23a5f60dd331728af056b0a6b2d3358ac88da23299b1a98dfaca8f288e_arm64",
"9Base-CNV-4.13:container-native-virtualization/hostpath-provisioner-operator-rhel9@sha256:515be94be496c67f5b8fd5f4832fe4385e56476e6589897d6b9fbb9bb2b00f32_amd64",
"9Base-CNV-4.13:container-native-virtualization/hostpath-provisioner-operator-rhel9@sha256:571ae805641dea11646028c946039983c7fd82f138b915dcb8b80c39b465e63c_arm64",
"9Base-CNV-4.13:container-native-virtualization/hostpath-provisioner-rhel9@sha256:ac3fe350bedd6bc43596444ba0f279ccf8a144ab14ac5a9b80ea71c46390b7b4_amd64",
"9Base-CNV-4.13:container-native-virtualization/hostpath-provisioner-rhel9@sha256:d4ed87745b7ee2acca2d83e2c91c2f6dced1903c81495b50f2559b3ba2dde287_arm64",
"9Base-CNV-4.13:container-native-virtualization/hyperconverged-cluster-operator-rhel9@sha256:e5ab9f3be59d3568e3d672ab374efb16990ccf92192eac4e1244b10fcd7423e2_amd64",
"9Base-CNV-4.13:container-native-virtualization/hyperconverged-cluster-operator-rhel9@sha256:e681560b184189df03fc84c8a712f32289f42573dd348cda394b19565eb6eca8_arm64",
"9Base-CNV-4.13:container-native-virtualization/hyperconverged-cluster-webhook-rhel9@sha256:06d036d320b3027bb8370bb8e0f6fe8c9f0ec9bca7aac3b5c53698ba4a170042_arm64",
"9Base-CNV-4.13:container-native-virtualization/hyperconverged-cluster-webhook-rhel9@sha256:b5a01336180aad017df62cf8e652f2491b8263ba7e4dd07f858db1ef1924cf2f_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubemacpool-rhel9@sha256:4d190d81eeb3fbe9ed56cf3548dc83a3f81641bfdafa7b42dcfb0d2512566644_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubemacpool-rhel9@sha256:59862a59854f0d5b83dc25ba119f9586a8aff42b6e60d1922f8ae7b4567309ff_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubesecondarydns-rhel9@sha256:121d30d78cc57731ea2242ef2c32430890ac66c2723e65608d5e2f26c3f515cd_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubesecondarydns-rhel9@sha256:b1838f3c8ba3d8113bddea17b78c21e1c1490e2a4a07ea77014edee523d06347_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-console-plugin-rhel9@sha256:86a4b1e3d6ad1d56302c9c058f8bc5826dcfe6c46fb3e0ddaa06818645039020_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-console-plugin-rhel9@sha256:ffb2acd9ae09c1ef9ca756f5eaf6087d0a3957cfc824543949d25f556a97744d_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-dpdk-checkup-rhel9@sha256:525aceb9396010ebcdba14040f267889b807cd84db8e5b4030429b51f0fbf5fe_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-dpdk-checkup-rhel9@sha256:553c4686f56c66cc1e3c5ad9d4051f139d43f821eac3abb98ca5cdb8b5dfe202_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-ssp-operator-rhel9@sha256:901e6cad9534c7bd7c4018c60bccfe49d7280fba5a9901ab4c4d15e9345288c4_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-ssp-operator-rhel9@sha256:badeb0f65f543b209f6af761729d9778b7b73b97d55044016dfba3f38a1f6f18_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-cleanup-vm-rhel9@sha256:28e4975fa4dac22d9da32ed2a10aed039fd957b30140daa36bab2caa998be77a_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-cleanup-vm-rhel9@sha256:b0ff7e812a576ea848590655fc13a85832d5a39f68e7769ceab9da6949da88c7_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-copy-template-rhel9@sha256:4916a6c6b1f9b529187d3b4d5fc99b90157993767b3fe2ad36a9ec77fbb46b10_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-copy-template-rhel9@sha256:f71c36442f1b61cdde7ec58d2c3c78d2039f6d6108e6c35388ef7c1650971fa1_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-create-datavolume-rhel9@sha256:2ad49cf6e2242a9e5861929d9bcab1305a7fc4e34e708f99cff1d7253aa46167_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-create-datavolume-rhel9@sha256:7112400a4ecb23ee2110bf96372fcf9f96ad648a51aa944627b40eb59539a660_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-create-vm-from-template-rhel9@sha256:1411c65bbad7302710788327f6964a4bf5bc20ef70d5e46f4a5c6e7a0e7a0161_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-create-vm-from-template-rhel9@sha256:4d962618aa95600c60c9fc8b890186e510de91177d51949e12797a3558e31328_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-customize-rhel9@sha256:5c23d3f20ea9dcbe7109284d73078ecd516a070e964b844f8d80b1d92ebd55ee_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-customize-rhel9@sha256:a780244e48c6d4f87446d3754c3eb9ab79c0d54675c189da4a659f7a4d5668ea_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-sysprep-rhel9@sha256:84577d949a1bbcaa291c70729127bca4a8994df03068666baa23840877ea8392_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-sysprep-rhel9@sha256:aed630a597a090179e1b0e0c117e536df06b67d0f793f91936aa7388c0c5d7eb_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-modify-vm-template-rhel9@sha256:31d959b80cf57462e1705684bb7e1b78af26bd2c62f1c9e4e51e1d02199b05a8_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-modify-vm-template-rhel9@sha256:66aea526bc10e4c0136ba86e394bbdfe4fbd7f757d6f391a561b51d2ba2f4d46_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-operator-rhel9@sha256:d0cf0e81589f0938de45961eaddfc5ec4782738fd11082de0439b200534259eb_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-operator-rhel9@sha256:f1b1f5044db6bb945584f9d4f31d020597725a286ef368ed0aca2116abb31beb_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-wait-for-vmi-status-rhel9@sha256:39a15d03f113735df03b1a7408227eb9604d942c1f3c1992bcdc7eaf07662711_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-wait-for-vmi-status-rhel9@sha256:afb68af076954fcd18c7a4a1464ea0c2a766e8282eae980051906ed07eaa1707_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-template-validator-rhel9@sha256:02b22c7e7014b5e72d47fed8b6a268cf307638c5510adf3916c51f7f40a52a08_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-template-validator-rhel9@sha256:c0264b9271e602f85b2040ef7f207cdfa46038dc4fa6e4738bf196ef88a71cf8_amd64",
"9Base-CNV-4.13:container-native-virtualization/libguestfs-tools-rhel9@sha256:29ae84575bbca24553cf649256759fd96ff286971d80bc2db129154a7df9b283_amd64",
"9Base-CNV-4.13:container-native-virtualization/libguestfs-tools-rhel9@sha256:6558f60343e068b032167e2340b2c549c5f0258acc5d2614b60966ce79408b01_arm64",
"9Base-CNV-4.13:container-native-virtualization/multus-dynamic-networks-rhel9@sha256:3ecb0162a4b01d1590bf209d717b32a4f0835910d9979823f18c24acba41b503_arm64",
"9Base-CNV-4.13:container-native-virtualization/multus-dynamic-networks-rhel9@sha256:b7f68b6420009e21380d32d6459193aae45e93be9533debe17cb3108571b36b8_amd64",
"9Base-CNV-4.13:container-native-virtualization/ovs-cni-plugin-rhel9@sha256:0f1d372f418744e0aff59ecb0a38f53178aac9c2e9eecfd38aa25ed83e0d1360_arm64",
"9Base-CNV-4.13:container-native-virtualization/ovs-cni-plugin-rhel9@sha256:e8e7a44edbf1713fe74de5c4b8f691cce78f4440c4a32a16ba9ad16694a55396_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-api-rhel9@sha256:e68416321ca8c74a547b3d35897f54813c03481143e402e9bdc4daf315e35b5d_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-api-rhel9@sha256:fdb4ca1bb8b310d713d9c7e88f7d091f4460aa942dbeca5ebcf17281a06daffe_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-artifacts-server-rhel9@sha256:33d11c1832b49df39c1fca62bad40dbc5c30a452248339aaef449ac99509accb_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-artifacts-server-rhel9@sha256:81fc61b714baecb5a89fa6c0749c14566e0661b8e184ca602fc2e03b9cf431ee_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-apiserver-rhel9@sha256:f6128a63344ed2129f5bce648ddcfaa2869d31cde4b93328d3c22534b97ade10_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-apiserver-rhel9@sha256:feca273a691d09445c6cff6d36b5d590735e867656a9898ce0d89744d98e8006_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-cloner-rhel9@sha256:68e3b9b0291b4fb277ac430269ffce11d13b0a7688cf2ffcdb7f98759c36b4db_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-cloner-rhel9@sha256:6ac212767481bef64d8a7d0252bb8089c0f9751fad4a355aef71bd49dad2ad07_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-controller-rhel9@sha256:65f5263275d9f0a12b8fb057d82adf678778039ec873ca9bde182dea3413c9f1_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-controller-rhel9@sha256:d9e62b2019328be258489ac852eef25f8b1233f29abac6bcea5b406329f97fed_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-importer-rhel9@sha256:00a6d9d24ca1466d450b02269ec3144fc7550f0e5c696e869fbf7ce10cae6093_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-importer-rhel9@sha256:2df07fb21a3575e74aa16ded20129828f2300cd33e8ab369b0362062d49e62d0_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-operator-rhel9@sha256:20ec064750faedd97d11b797c8c1d9a1db5d60d7d76e82e65cfd05eb79d65e29_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-operator-rhel9@sha256:802ee8923d9d8e406b23911406f9748756c0ef4d6954e9e2fd5fb4bdf91dde9a_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-uploadproxy-rhel9@sha256:392d0f61f462c707adfdc21e4239c5c09d8520a80486b41d9d9ae479267d6124_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-uploadproxy-rhel9@sha256:6775f34353eec8f35bead9411dde155530d079bb8d51582fb1f2aacc27dbde1d_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-uploadserver-rhel9@sha256:4528c24672689cfb6505761b6b108fbcc04488192733f23d2bfe39cd42a1d743_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-uploadserver-rhel9@sha256:b22048390387380af94e267c8a9a66813c515997456d59d8ebac1486916b6585_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-controller-rhel9@sha256:3e7880149ee9a68286e390beb3d9779f7403c30fc5136e5370e0e4690a3fd243_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-controller-rhel9@sha256:970edc281d7a731e9f7e8c2d4440fe48a221e5e355d5235c5413b4c3adb28503_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-exportproxy-rhel9@sha256:1bda34d5bff734ad997202f29a5ff6f7362fd79fa90511a422442ef2e3681198_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-exportproxy-rhel9@sha256:de3c4afbf7669b98517cbef2490ec186f0553dd97b05bed80ec36dd883fe507b_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-exportserver-rhel9@sha256:3f7f98645176d42c63cca5c0fc3182a03121af87446ca421b6c72baf07dfca0d_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-exportserver-rhel9@sha256:8f12955cd777eb2409037a6968aa92f50c99d6e07e722951dbcfd0c8c9829b5e_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-handler-rhel9@sha256:5fc47110d866d8048aec50689090ce10705d19d3bb48d2b06727d6d569003af7_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-handler-rhel9@sha256:84ba79ae9658699147d2493df2582ab6df10adbff4d44a533c3fe6a9f45f9691_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-launcher-rhel9@sha256:4990d40d9987d5126d105dd45be2501eaded248cb61bdde5ea8d359bc1e7ebef_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-launcher-rhel9@sha256:95aeacb98209e0baef27ce0e02fbac38d693cea74808fc77107efda0f344bcb5_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-operator-rhel9@sha256:5c1a7e4ed2061938987b900a2394f07121d4037350c9bb6485213a2adfea787d_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-operator-rhel9@sha256:66b1b3b379121d6411ba22283e7d991617177330c93746d37753ab7812b9a00b_arm64",
"9Base-CNV-4.13:container-native-virtualization/virtio-win-rhel9@sha256:8735f51da918408a8826601c082d1b29accf26d59b9978da89b980cb509c1102_arm64",
"9Base-CNV-4.13:container-native-virtualization/virtio-win-rhel9@sha256:d147d2a6eb6f907d1e88f61aaca83596853bc72164583d6dda2b1154b490de25_amd64",
"9Base-CNV-4.13:container-native-virtualization/vm-console-proxy-rhel9@sha256:70a8d0cd66182c25e02679540bae1368b2a9cf687532b58dba41ef30c5ca00c1_arm64",
"9Base-CNV-4.13:container-native-virtualization/vm-console-proxy-rhel9@sha256:7ca921f98f6d81a126907127a611146fb53397869a628678faa1e289c01d22b2_amd64",
"9Base-CNV-4.13:container-native-virtualization/vm-network-latency-checkup-rhel9@sha256:503ea7ac914a9b54e9d665a0227ee0b5d5200cdb5d692aa94c07dd1518d91b70_arm64",
"9Base-CNV-4.13:container-native-virtualization/vm-network-latency-checkup-rhel9@sha256:59fd965975bccf641a0fa7aa01374d45057bd03cda7528248a84b60b1205bf57_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "golang: net/http: handle server errors after sending GOAWAY"
},
{
"cve": "CVE-2022-32149",
"cwe": {
"id": "CWE-407",
"name": "Inefficient Algorithmic Complexity"
},
"discovery_date": "2022-10-12T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"9Base-CNV-4.13:container-native-virtualization/bridge-marker-rhel9@sha256:8eac196b30a648989cdca5cb153a3bc3d34e47339acba0e4f760bd366496c99d_amd64",
"9Base-CNV-4.13:container-native-virtualization/bridge-marker-rhel9@sha256:e8a55aee3d75a316bb0d7a554c737198823df04b3c05e481c17e45eb2153bced_arm64",
"9Base-CNV-4.13:container-native-virtualization/cluster-network-addons-operator-rhel9@sha256:3bff33e3f40cd1e2b519c2db56734d4bb8df883e155c2f20b1cb9d3d184daec1_amd64",
"9Base-CNV-4.13:container-native-virtualization/cluster-network-addons-operator-rhel9@sha256:f439d2f420bb59eb1d5af14ce2002648d0cfc155d1a1466c8aac9b661fe902b8_arm64",
"9Base-CNV-4.13:container-native-virtualization/cnv-containernetworking-plugins-rhel9@sha256:89f22e541f61a660c9aa9f38ef58e80b84a0517f74e84292107fc252c25465c9_arm64",
"9Base-CNV-4.13:container-native-virtualization/cnv-containernetworking-plugins-rhel9@sha256:bf471997e54e4a75b0d71f492ab295787fdbb14d8c85c4ea8c03f0552dbc3755_amd64",
"9Base-CNV-4.13:container-native-virtualization/cnv-must-gather-rhel9@sha256:9e8efd76924958eb605401abdac08eba97fb83a1ada383bc87a7fb7c87b3a455_arm64",
"9Base-CNV-4.13:container-native-virtualization/cnv-must-gather-rhel9@sha256:b9fc32b5fabedd65a4c3a471879c808af2087277de4278adaa115a732f0468da_amd64",
"9Base-CNV-4.13:container-native-virtualization/hco-bundle-registry-rhel9@sha256:60e89d7a99ff9f20e974430b802dd724a3bb6fa1e01e5a62daad98ac487b3063_amd64",
"9Base-CNV-4.13:container-native-virtualization/hco-bundle-registry-rhel9@sha256:dd20b138045ef1424d83a47e7abcfcbb2ac54577dcec5ed3c186390aaa4c9d84_arm64",
"9Base-CNV-4.13:container-native-virtualization/hostpath-csi-driver-rhel9@sha256:61e2824853d51347593ad909a5e546cd92e4216d6a1df5dffb50dd9cba277cce_amd64",
"9Base-CNV-4.13:container-native-virtualization/hostpath-csi-driver-rhel9@sha256:676d4c23a5f60dd331728af056b0a6b2d3358ac88da23299b1a98dfaca8f288e_arm64",
"9Base-CNV-4.13:container-native-virtualization/hostpath-provisioner-operator-rhel9@sha256:515be94be496c67f5b8fd5f4832fe4385e56476e6589897d6b9fbb9bb2b00f32_amd64",
"9Base-CNV-4.13:container-native-virtualization/hostpath-provisioner-operator-rhel9@sha256:571ae805641dea11646028c946039983c7fd82f138b915dcb8b80c39b465e63c_arm64",
"9Base-CNV-4.13:container-native-virtualization/hostpath-provisioner-rhel9@sha256:ac3fe350bedd6bc43596444ba0f279ccf8a144ab14ac5a9b80ea71c46390b7b4_amd64",
"9Base-CNV-4.13:container-native-virtualization/hostpath-provisioner-rhel9@sha256:d4ed87745b7ee2acca2d83e2c91c2f6dced1903c81495b50f2559b3ba2dde287_arm64",
"9Base-CNV-4.13:container-native-virtualization/hyperconverged-cluster-operator-rhel9@sha256:e5ab9f3be59d3568e3d672ab374efb16990ccf92192eac4e1244b10fcd7423e2_amd64",
"9Base-CNV-4.13:container-native-virtualization/hyperconverged-cluster-operator-rhel9@sha256:e681560b184189df03fc84c8a712f32289f42573dd348cda394b19565eb6eca8_arm64",
"9Base-CNV-4.13:container-native-virtualization/hyperconverged-cluster-webhook-rhel9@sha256:06d036d320b3027bb8370bb8e0f6fe8c9f0ec9bca7aac3b5c53698ba4a170042_arm64",
"9Base-CNV-4.13:container-native-virtualization/hyperconverged-cluster-webhook-rhel9@sha256:b5a01336180aad017df62cf8e652f2491b8263ba7e4dd07f858db1ef1924cf2f_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubemacpool-rhel9@sha256:4d190d81eeb3fbe9ed56cf3548dc83a3f81641bfdafa7b42dcfb0d2512566644_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubemacpool-rhel9@sha256:59862a59854f0d5b83dc25ba119f9586a8aff42b6e60d1922f8ae7b4567309ff_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubesecondarydns-rhel9@sha256:121d30d78cc57731ea2242ef2c32430890ac66c2723e65608d5e2f26c3f515cd_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubesecondarydns-rhel9@sha256:b1838f3c8ba3d8113bddea17b78c21e1c1490e2a4a07ea77014edee523d06347_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-console-plugin-rhel9@sha256:86a4b1e3d6ad1d56302c9c058f8bc5826dcfe6c46fb3e0ddaa06818645039020_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-console-plugin-rhel9@sha256:ffb2acd9ae09c1ef9ca756f5eaf6087d0a3957cfc824543949d25f556a97744d_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-dpdk-checkup-rhel9@sha256:525aceb9396010ebcdba14040f267889b807cd84db8e5b4030429b51f0fbf5fe_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-dpdk-checkup-rhel9@sha256:553c4686f56c66cc1e3c5ad9d4051f139d43f821eac3abb98ca5cdb8b5dfe202_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-ssp-operator-rhel9@sha256:901e6cad9534c7bd7c4018c60bccfe49d7280fba5a9901ab4c4d15e9345288c4_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-ssp-operator-rhel9@sha256:badeb0f65f543b209f6af761729d9778b7b73b97d55044016dfba3f38a1f6f18_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-cleanup-vm-rhel9@sha256:28e4975fa4dac22d9da32ed2a10aed039fd957b30140daa36bab2caa998be77a_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-cleanup-vm-rhel9@sha256:b0ff7e812a576ea848590655fc13a85832d5a39f68e7769ceab9da6949da88c7_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-copy-template-rhel9@sha256:4916a6c6b1f9b529187d3b4d5fc99b90157993767b3fe2ad36a9ec77fbb46b10_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-copy-template-rhel9@sha256:f71c36442f1b61cdde7ec58d2c3c78d2039f6d6108e6c35388ef7c1650971fa1_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-create-datavolume-rhel9@sha256:2ad49cf6e2242a9e5861929d9bcab1305a7fc4e34e708f99cff1d7253aa46167_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-create-datavolume-rhel9@sha256:7112400a4ecb23ee2110bf96372fcf9f96ad648a51aa944627b40eb59539a660_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-create-vm-from-template-rhel9@sha256:1411c65bbad7302710788327f6964a4bf5bc20ef70d5e46f4a5c6e7a0e7a0161_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-create-vm-from-template-rhel9@sha256:4d962618aa95600c60c9fc8b890186e510de91177d51949e12797a3558e31328_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-customize-rhel9@sha256:5c23d3f20ea9dcbe7109284d73078ecd516a070e964b844f8d80b1d92ebd55ee_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-customize-rhel9@sha256:a780244e48c6d4f87446d3754c3eb9ab79c0d54675c189da4a659f7a4d5668ea_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-sysprep-rhel9@sha256:84577d949a1bbcaa291c70729127bca4a8994df03068666baa23840877ea8392_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-sysprep-rhel9@sha256:aed630a597a090179e1b0e0c117e536df06b67d0f793f91936aa7388c0c5d7eb_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-modify-vm-template-rhel9@sha256:31d959b80cf57462e1705684bb7e1b78af26bd2c62f1c9e4e51e1d02199b05a8_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-modify-vm-template-rhel9@sha256:66aea526bc10e4c0136ba86e394bbdfe4fbd7f757d6f391a561b51d2ba2f4d46_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-operator-rhel9@sha256:d0cf0e81589f0938de45961eaddfc5ec4782738fd11082de0439b200534259eb_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-operator-rhel9@sha256:f1b1f5044db6bb945584f9d4f31d020597725a286ef368ed0aca2116abb31beb_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-wait-for-vmi-status-rhel9@sha256:39a15d03f113735df03b1a7408227eb9604d942c1f3c1992bcdc7eaf07662711_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-wait-for-vmi-status-rhel9@sha256:afb68af076954fcd18c7a4a1464ea0c2a766e8282eae980051906ed07eaa1707_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-template-validator-rhel9@sha256:02b22c7e7014b5e72d47fed8b6a268cf307638c5510adf3916c51f7f40a52a08_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-template-validator-rhel9@sha256:c0264b9271e602f85b2040ef7f207cdfa46038dc4fa6e4738bf196ef88a71cf8_amd64",
"9Base-CNV-4.13:container-native-virtualization/libguestfs-tools-rhel9@sha256:29ae84575bbca24553cf649256759fd96ff286971d80bc2db129154a7df9b283_amd64",
"9Base-CNV-4.13:container-native-virtualization/libguestfs-tools-rhel9@sha256:6558f60343e068b032167e2340b2c549c5f0258acc5d2614b60966ce79408b01_arm64",
"9Base-CNV-4.13:container-native-virtualization/multus-dynamic-networks-rhel9@sha256:3ecb0162a4b01d1590bf209d717b32a4f0835910d9979823f18c24acba41b503_arm64",
"9Base-CNV-4.13:container-native-virtualization/multus-dynamic-networks-rhel9@sha256:b7f68b6420009e21380d32d6459193aae45e93be9533debe17cb3108571b36b8_amd64",
"9Base-CNV-4.13:container-native-virtualization/ovs-cni-plugin-rhel9@sha256:0f1d372f418744e0aff59ecb0a38f53178aac9c2e9eecfd38aa25ed83e0d1360_arm64",
"9Base-CNV-4.13:container-native-virtualization/ovs-cni-plugin-rhel9@sha256:e8e7a44edbf1713fe74de5c4b8f691cce78f4440c4a32a16ba9ad16694a55396_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-artifacts-server-rhel9@sha256:33d11c1832b49df39c1fca62bad40dbc5c30a452248339aaef449ac99509accb_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-artifacts-server-rhel9@sha256:81fc61b714baecb5a89fa6c0749c14566e0661b8e184ca602fc2e03b9cf431ee_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-apiserver-rhel9@sha256:f6128a63344ed2129f5bce648ddcfaa2869d31cde4b93328d3c22534b97ade10_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-apiserver-rhel9@sha256:feca273a691d09445c6cff6d36b5d590735e867656a9898ce0d89744d98e8006_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-cloner-rhel9@sha256:68e3b9b0291b4fb277ac430269ffce11d13b0a7688cf2ffcdb7f98759c36b4db_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-cloner-rhel9@sha256:6ac212767481bef64d8a7d0252bb8089c0f9751fad4a355aef71bd49dad2ad07_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-controller-rhel9@sha256:65f5263275d9f0a12b8fb057d82adf678778039ec873ca9bde182dea3413c9f1_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-controller-rhel9@sha256:d9e62b2019328be258489ac852eef25f8b1233f29abac6bcea5b406329f97fed_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-importer-rhel9@sha256:00a6d9d24ca1466d450b02269ec3144fc7550f0e5c696e869fbf7ce10cae6093_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-importer-rhel9@sha256:2df07fb21a3575e74aa16ded20129828f2300cd33e8ab369b0362062d49e62d0_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-operator-rhel9@sha256:20ec064750faedd97d11b797c8c1d9a1db5d60d7d76e82e65cfd05eb79d65e29_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-operator-rhel9@sha256:802ee8923d9d8e406b23911406f9748756c0ef4d6954e9e2fd5fb4bdf91dde9a_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-uploadproxy-rhel9@sha256:392d0f61f462c707adfdc21e4239c5c09d8520a80486b41d9d9ae479267d6124_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-uploadproxy-rhel9@sha256:6775f34353eec8f35bead9411dde155530d079bb8d51582fb1f2aacc27dbde1d_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-uploadserver-rhel9@sha256:4528c24672689cfb6505761b6b108fbcc04488192733f23d2bfe39cd42a1d743_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-uploadserver-rhel9@sha256:b22048390387380af94e267c8a9a66813c515997456d59d8ebac1486916b6585_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-controller-rhel9@sha256:3e7880149ee9a68286e390beb3d9779f7403c30fc5136e5370e0e4690a3fd243_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-controller-rhel9@sha256:970edc281d7a731e9f7e8c2d4440fe48a221e5e355d5235c5413b4c3adb28503_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-exportproxy-rhel9@sha256:1bda34d5bff734ad997202f29a5ff6f7362fd79fa90511a422442ef2e3681198_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-exportproxy-rhel9@sha256:de3c4afbf7669b98517cbef2490ec186f0553dd97b05bed80ec36dd883fe507b_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-exportserver-rhel9@sha256:3f7f98645176d42c63cca5c0fc3182a03121af87446ca421b6c72baf07dfca0d_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-exportserver-rhel9@sha256:8f12955cd777eb2409037a6968aa92f50c99d6e07e722951dbcfd0c8c9829b5e_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-handler-rhel9@sha256:5fc47110d866d8048aec50689090ce10705d19d3bb48d2b06727d6d569003af7_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-handler-rhel9@sha256:84ba79ae9658699147d2493df2582ab6df10adbff4d44a533c3fe6a9f45f9691_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-launcher-rhel9@sha256:4990d40d9987d5126d105dd45be2501eaded248cb61bdde5ea8d359bc1e7ebef_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-launcher-rhel9@sha256:95aeacb98209e0baef27ce0e02fbac38d693cea74808fc77107efda0f344bcb5_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-operator-rhel9@sha256:5c1a7e4ed2061938987b900a2394f07121d4037350c9bb6485213a2adfea787d_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-operator-rhel9@sha256:66b1b3b379121d6411ba22283e7d991617177330c93746d37753ab7812b9a00b_arm64",
"9Base-CNV-4.13:container-native-virtualization/virtio-win-rhel9@sha256:8735f51da918408a8826601c082d1b29accf26d59b9978da89b980cb509c1102_arm64",
"9Base-CNV-4.13:container-native-virtualization/virtio-win-rhel9@sha256:d147d2a6eb6f907d1e88f61aaca83596853bc72164583d6dda2b1154b490de25_amd64",
"9Base-CNV-4.13:container-native-virtualization/vm-console-proxy-rhel9@sha256:70a8d0cd66182c25e02679540bae1368b2a9cf687532b58dba41ef30c5ca00c1_arm64",
"9Base-CNV-4.13:container-native-virtualization/vm-console-proxy-rhel9@sha256:7ca921f98f6d81a126907127a611146fb53397869a628678faa1e289c01d22b2_amd64",
"9Base-CNV-4.13:container-native-virtualization/vm-network-latency-checkup-rhel9@sha256:503ea7ac914a9b54e9d665a0227ee0b5d5200cdb5d692aa94c07dd1518d91b70_arm64",
"9Base-CNV-4.13:container-native-virtualization/vm-network-latency-checkup-rhel9@sha256:59fd965975bccf641a0fa7aa01374d45057bd03cda7528248a84b60b1205bf57_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2134010"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in the golang.org/x/text/language package. An attacker can craft an Accept-Language header which ParseAcceptLanguage will take significant time to parse. This issue leads to a denial of service, and can impact availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: golang.org/x/text/language: ParseAcceptLanguage takes a long time to parse complex tags",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "After careful analysis of the vulnerability Redhat is choosing to keep the vulnerability severity as moderate,the vulnerability exists in the ParseAcceptLanguage function of the golang text/language package,when an attacker could craft an unusually large accept header and due to the parser taking quadratic time complexity to finish, firstly the attacker would have to find a way smuggle an input to the parser and even then this would simply not result in a crash of any kind but more of resource hang which while can be unpleasant,does not equate to any real world damage.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"9Base-CNV-4.13:container-native-virtualization/virt-api-rhel9@sha256:e68416321ca8c74a547b3d35897f54813c03481143e402e9bdc4daf315e35b5d_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-api-rhel9@sha256:fdb4ca1bb8b310d713d9c7e88f7d091f4460aa942dbeca5ebcf17281a06daffe_amd64"
],
"known_not_affected": [
"9Base-CNV-4.13:container-native-virtualization/bridge-marker-rhel9@sha256:8eac196b30a648989cdca5cb153a3bc3d34e47339acba0e4f760bd366496c99d_amd64",
"9Base-CNV-4.13:container-native-virtualization/bridge-marker-rhel9@sha256:e8a55aee3d75a316bb0d7a554c737198823df04b3c05e481c17e45eb2153bced_arm64",
"9Base-CNV-4.13:container-native-virtualization/cluster-network-addons-operator-rhel9@sha256:3bff33e3f40cd1e2b519c2db56734d4bb8df883e155c2f20b1cb9d3d184daec1_amd64",
"9Base-CNV-4.13:container-native-virtualization/cluster-network-addons-operator-rhel9@sha256:f439d2f420bb59eb1d5af14ce2002648d0cfc155d1a1466c8aac9b661fe902b8_arm64",
"9Base-CNV-4.13:container-native-virtualization/cnv-containernetworking-plugins-rhel9@sha256:89f22e541f61a660c9aa9f38ef58e80b84a0517f74e84292107fc252c25465c9_arm64",
"9Base-CNV-4.13:container-native-virtualization/cnv-containernetworking-plugins-rhel9@sha256:bf471997e54e4a75b0d71f492ab295787fdbb14d8c85c4ea8c03f0552dbc3755_amd64",
"9Base-CNV-4.13:container-native-virtualization/cnv-must-gather-rhel9@sha256:9e8efd76924958eb605401abdac08eba97fb83a1ada383bc87a7fb7c87b3a455_arm64",
"9Base-CNV-4.13:container-native-virtualization/cnv-must-gather-rhel9@sha256:b9fc32b5fabedd65a4c3a471879c808af2087277de4278adaa115a732f0468da_amd64",
"9Base-CNV-4.13:container-native-virtualization/hco-bundle-registry-rhel9@sha256:60e89d7a99ff9f20e974430b802dd724a3bb6fa1e01e5a62daad98ac487b3063_amd64",
"9Base-CNV-4.13:container-native-virtualization/hco-bundle-registry-rhel9@sha256:dd20b138045ef1424d83a47e7abcfcbb2ac54577dcec5ed3c186390aaa4c9d84_arm64",
"9Base-CNV-4.13:container-native-virtualization/hostpath-csi-driver-rhel9@sha256:61e2824853d51347593ad909a5e546cd92e4216d6a1df5dffb50dd9cba277cce_amd64",
"9Base-CNV-4.13:container-native-virtualization/hostpath-csi-driver-rhel9@sha256:676d4c23a5f60dd331728af056b0a6b2d3358ac88da23299b1a98dfaca8f288e_arm64",
"9Base-CNV-4.13:container-native-virtualization/hostpath-provisioner-operator-rhel9@sha256:515be94be496c67f5b8fd5f4832fe4385e56476e6589897d6b9fbb9bb2b00f32_amd64",
"9Base-CNV-4.13:container-native-virtualization/hostpath-provisioner-operator-rhel9@sha256:571ae805641dea11646028c946039983c7fd82f138b915dcb8b80c39b465e63c_arm64",
"9Base-CNV-4.13:container-native-virtualization/hostpath-provisioner-rhel9@sha256:ac3fe350bedd6bc43596444ba0f279ccf8a144ab14ac5a9b80ea71c46390b7b4_amd64",
"9Base-CNV-4.13:container-native-virtualization/hostpath-provisioner-rhel9@sha256:d4ed87745b7ee2acca2d83e2c91c2f6dced1903c81495b50f2559b3ba2dde287_arm64",
"9Base-CNV-4.13:container-native-virtualization/hyperconverged-cluster-operator-rhel9@sha256:e5ab9f3be59d3568e3d672ab374efb16990ccf92192eac4e1244b10fcd7423e2_amd64",
"9Base-CNV-4.13:container-native-virtualization/hyperconverged-cluster-operator-rhel9@sha256:e681560b184189df03fc84c8a712f32289f42573dd348cda394b19565eb6eca8_arm64",
"9Base-CNV-4.13:container-native-virtualization/hyperconverged-cluster-webhook-rhel9@sha256:06d036d320b3027bb8370bb8e0f6fe8c9f0ec9bca7aac3b5c53698ba4a170042_arm64",
"9Base-CNV-4.13:container-native-virtualization/hyperconverged-cluster-webhook-rhel9@sha256:b5a01336180aad017df62cf8e652f2491b8263ba7e4dd07f858db1ef1924cf2f_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubemacpool-rhel9@sha256:4d190d81eeb3fbe9ed56cf3548dc83a3f81641bfdafa7b42dcfb0d2512566644_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubemacpool-rhel9@sha256:59862a59854f0d5b83dc25ba119f9586a8aff42b6e60d1922f8ae7b4567309ff_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubesecondarydns-rhel9@sha256:121d30d78cc57731ea2242ef2c32430890ac66c2723e65608d5e2f26c3f515cd_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubesecondarydns-rhel9@sha256:b1838f3c8ba3d8113bddea17b78c21e1c1490e2a4a07ea77014edee523d06347_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-console-plugin-rhel9@sha256:86a4b1e3d6ad1d56302c9c058f8bc5826dcfe6c46fb3e0ddaa06818645039020_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-console-plugin-rhel9@sha256:ffb2acd9ae09c1ef9ca756f5eaf6087d0a3957cfc824543949d25f556a97744d_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-dpdk-checkup-rhel9@sha256:525aceb9396010ebcdba14040f267889b807cd84db8e5b4030429b51f0fbf5fe_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-dpdk-checkup-rhel9@sha256:553c4686f56c66cc1e3c5ad9d4051f139d43f821eac3abb98ca5cdb8b5dfe202_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-ssp-operator-rhel9@sha256:901e6cad9534c7bd7c4018c60bccfe49d7280fba5a9901ab4c4d15e9345288c4_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-ssp-operator-rhel9@sha256:badeb0f65f543b209f6af761729d9778b7b73b97d55044016dfba3f38a1f6f18_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-cleanup-vm-rhel9@sha256:28e4975fa4dac22d9da32ed2a10aed039fd957b30140daa36bab2caa998be77a_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-cleanup-vm-rhel9@sha256:b0ff7e812a576ea848590655fc13a85832d5a39f68e7769ceab9da6949da88c7_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-copy-template-rhel9@sha256:4916a6c6b1f9b529187d3b4d5fc99b90157993767b3fe2ad36a9ec77fbb46b10_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-copy-template-rhel9@sha256:f71c36442f1b61cdde7ec58d2c3c78d2039f6d6108e6c35388ef7c1650971fa1_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-create-datavolume-rhel9@sha256:2ad49cf6e2242a9e5861929d9bcab1305a7fc4e34e708f99cff1d7253aa46167_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-create-datavolume-rhel9@sha256:7112400a4ecb23ee2110bf96372fcf9f96ad648a51aa944627b40eb59539a660_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-create-vm-from-template-rhel9@sha256:1411c65bbad7302710788327f6964a4bf5bc20ef70d5e46f4a5c6e7a0e7a0161_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-create-vm-from-template-rhel9@sha256:4d962618aa95600c60c9fc8b890186e510de91177d51949e12797a3558e31328_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-customize-rhel9@sha256:5c23d3f20ea9dcbe7109284d73078ecd516a070e964b844f8d80b1d92ebd55ee_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-customize-rhel9@sha256:a780244e48c6d4f87446d3754c3eb9ab79c0d54675c189da4a659f7a4d5668ea_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-sysprep-rhel9@sha256:84577d949a1bbcaa291c70729127bca4a8994df03068666baa23840877ea8392_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-sysprep-rhel9@sha256:aed630a597a090179e1b0e0c117e536df06b67d0f793f91936aa7388c0c5d7eb_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-modify-vm-template-rhel9@sha256:31d959b80cf57462e1705684bb7e1b78af26bd2c62f1c9e4e51e1d02199b05a8_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-modify-vm-template-rhel9@sha256:66aea526bc10e4c0136ba86e394bbdfe4fbd7f757d6f391a561b51d2ba2f4d46_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-operator-rhel9@sha256:d0cf0e81589f0938de45961eaddfc5ec4782738fd11082de0439b200534259eb_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-operator-rhel9@sha256:f1b1f5044db6bb945584f9d4f31d020597725a286ef368ed0aca2116abb31beb_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-wait-for-vmi-status-rhel9@sha256:39a15d03f113735df03b1a7408227eb9604d942c1f3c1992bcdc7eaf07662711_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-wait-for-vmi-status-rhel9@sha256:afb68af076954fcd18c7a4a1464ea0c2a766e8282eae980051906ed07eaa1707_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-template-validator-rhel9@sha256:02b22c7e7014b5e72d47fed8b6a268cf307638c5510adf3916c51f7f40a52a08_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-template-validator-rhel9@sha256:c0264b9271e602f85b2040ef7f207cdfa46038dc4fa6e4738bf196ef88a71cf8_amd64",
"9Base-CNV-4.13:container-native-virtualization/libguestfs-tools-rhel9@sha256:29ae84575bbca24553cf649256759fd96ff286971d80bc2db129154a7df9b283_amd64",
"9Base-CNV-4.13:container-native-virtualization/libguestfs-tools-rhel9@sha256:6558f60343e068b032167e2340b2c549c5f0258acc5d2614b60966ce79408b01_arm64",
"9Base-CNV-4.13:container-native-virtualization/multus-dynamic-networks-rhel9@sha256:3ecb0162a4b01d1590bf209d717b32a4f0835910d9979823f18c24acba41b503_arm64",
"9Base-CNV-4.13:container-native-virtualization/multus-dynamic-networks-rhel9@sha256:b7f68b6420009e21380d32d6459193aae45e93be9533debe17cb3108571b36b8_amd64",
"9Base-CNV-4.13:container-native-virtualization/ovs-cni-plugin-rhel9@sha256:0f1d372f418744e0aff59ecb0a38f53178aac9c2e9eecfd38aa25ed83e0d1360_arm64",
"9Base-CNV-4.13:container-native-virtualization/ovs-cni-plugin-rhel9@sha256:e8e7a44edbf1713fe74de5c4b8f691cce78f4440c4a32a16ba9ad16694a55396_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-artifacts-server-rhel9@sha256:33d11c1832b49df39c1fca62bad40dbc5c30a452248339aaef449ac99509accb_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-artifacts-server-rhel9@sha256:81fc61b714baecb5a89fa6c0749c14566e0661b8e184ca602fc2e03b9cf431ee_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-apiserver-rhel9@sha256:f6128a63344ed2129f5bce648ddcfaa2869d31cde4b93328d3c22534b97ade10_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-apiserver-rhel9@sha256:feca273a691d09445c6cff6d36b5d590735e867656a9898ce0d89744d98e8006_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-cloner-rhel9@sha256:68e3b9b0291b4fb277ac430269ffce11d13b0a7688cf2ffcdb7f98759c36b4db_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-cloner-rhel9@sha256:6ac212767481bef64d8a7d0252bb8089c0f9751fad4a355aef71bd49dad2ad07_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-controller-rhel9@sha256:65f5263275d9f0a12b8fb057d82adf678778039ec873ca9bde182dea3413c9f1_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-controller-rhel9@sha256:d9e62b2019328be258489ac852eef25f8b1233f29abac6bcea5b406329f97fed_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-importer-rhel9@sha256:00a6d9d24ca1466d450b02269ec3144fc7550f0e5c696e869fbf7ce10cae6093_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-importer-rhel9@sha256:2df07fb21a3575e74aa16ded20129828f2300cd33e8ab369b0362062d49e62d0_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-operator-rhel9@sha256:20ec064750faedd97d11b797c8c1d9a1db5d60d7d76e82e65cfd05eb79d65e29_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-operator-rhel9@sha256:802ee8923d9d8e406b23911406f9748756c0ef4d6954e9e2fd5fb4bdf91dde9a_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-uploadproxy-rhel9@sha256:392d0f61f462c707adfdc21e4239c5c09d8520a80486b41d9d9ae479267d6124_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-uploadproxy-rhel9@sha256:6775f34353eec8f35bead9411dde155530d079bb8d51582fb1f2aacc27dbde1d_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-uploadserver-rhel9@sha256:4528c24672689cfb6505761b6b108fbcc04488192733f23d2bfe39cd42a1d743_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-uploadserver-rhel9@sha256:b22048390387380af94e267c8a9a66813c515997456d59d8ebac1486916b6585_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-controller-rhel9@sha256:3e7880149ee9a68286e390beb3d9779f7403c30fc5136e5370e0e4690a3fd243_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-controller-rhel9@sha256:970edc281d7a731e9f7e8c2d4440fe48a221e5e355d5235c5413b4c3adb28503_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-exportproxy-rhel9@sha256:1bda34d5bff734ad997202f29a5ff6f7362fd79fa90511a422442ef2e3681198_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-exportproxy-rhel9@sha256:de3c4afbf7669b98517cbef2490ec186f0553dd97b05bed80ec36dd883fe507b_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-exportserver-rhel9@sha256:3f7f98645176d42c63cca5c0fc3182a03121af87446ca421b6c72baf07dfca0d_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-exportserver-rhel9@sha256:8f12955cd777eb2409037a6968aa92f50c99d6e07e722951dbcfd0c8c9829b5e_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-handler-rhel9@sha256:5fc47110d866d8048aec50689090ce10705d19d3bb48d2b06727d6d569003af7_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-handler-rhel9@sha256:84ba79ae9658699147d2493df2582ab6df10adbff4d44a533c3fe6a9f45f9691_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-launcher-rhel9@sha256:4990d40d9987d5126d105dd45be2501eaded248cb61bdde5ea8d359bc1e7ebef_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-launcher-rhel9@sha256:95aeacb98209e0baef27ce0e02fbac38d693cea74808fc77107efda0f344bcb5_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-operator-rhel9@sha256:5c1a7e4ed2061938987b900a2394f07121d4037350c9bb6485213a2adfea787d_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-operator-rhel9@sha256:66b1b3b379121d6411ba22283e7d991617177330c93746d37753ab7812b9a00b_arm64",
"9Base-CNV-4.13:container-native-virtualization/virtio-win-rhel9@sha256:8735f51da918408a8826601c082d1b29accf26d59b9978da89b980cb509c1102_arm64",
"9Base-CNV-4.13:container-native-virtualization/virtio-win-rhel9@sha256:d147d2a6eb6f907d1e88f61aaca83596853bc72164583d6dda2b1154b490de25_amd64",
"9Base-CNV-4.13:container-native-virtualization/vm-console-proxy-rhel9@sha256:70a8d0cd66182c25e02679540bae1368b2a9cf687532b58dba41ef30c5ca00c1_arm64",
"9Base-CNV-4.13:container-native-virtualization/vm-console-proxy-rhel9@sha256:7ca921f98f6d81a126907127a611146fb53397869a628678faa1e289c01d22b2_amd64",
"9Base-CNV-4.13:container-native-virtualization/vm-network-latency-checkup-rhel9@sha256:503ea7ac914a9b54e9d665a0227ee0b5d5200cdb5d692aa94c07dd1518d91b70_arm64",
"9Base-CNV-4.13:container-native-virtualization/vm-network-latency-checkup-rhel9@sha256:59fd965975bccf641a0fa7aa01374d45057bd03cda7528248a84b60b1205bf57_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-32149"
},
{
"category": "external",
"summary": "RHBZ#2134010",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2134010"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-32149",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32149"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-32149",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-32149"
},
{
"category": "external",
"summary": "https://go.dev/issue/56152",
"url": "https://go.dev/issue/56152"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-dev/c/qfPIly0X7aU",
"url": "https://groups.google.com/g/golang-dev/c/qfPIly0X7aU"
}
],
"release_date": "2022-10-11T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-05-18T02:55:08+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"9Base-CNV-4.13:container-native-virtualization/virt-api-rhel9@sha256:e68416321ca8c74a547b3d35897f54813c03481143e402e9bdc4daf315e35b5d_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-api-rhel9@sha256:fdb4ca1bb8b310d713d9c7e88f7d091f4460aa942dbeca5ebcf17281a06daffe_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:3205"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"9Base-CNV-4.13:container-native-virtualization/bridge-marker-rhel9@sha256:8eac196b30a648989cdca5cb153a3bc3d34e47339acba0e4f760bd366496c99d_amd64",
"9Base-CNV-4.13:container-native-virtualization/bridge-marker-rhel9@sha256:e8a55aee3d75a316bb0d7a554c737198823df04b3c05e481c17e45eb2153bced_arm64",
"9Base-CNV-4.13:container-native-virtualization/cluster-network-addons-operator-rhel9@sha256:3bff33e3f40cd1e2b519c2db56734d4bb8df883e155c2f20b1cb9d3d184daec1_amd64",
"9Base-CNV-4.13:container-native-virtualization/cluster-network-addons-operator-rhel9@sha256:f439d2f420bb59eb1d5af14ce2002648d0cfc155d1a1466c8aac9b661fe902b8_arm64",
"9Base-CNV-4.13:container-native-virtualization/cnv-containernetworking-plugins-rhel9@sha256:89f22e541f61a660c9aa9f38ef58e80b84a0517f74e84292107fc252c25465c9_arm64",
"9Base-CNV-4.13:container-native-virtualization/cnv-containernetworking-plugins-rhel9@sha256:bf471997e54e4a75b0d71f492ab295787fdbb14d8c85c4ea8c03f0552dbc3755_amd64",
"9Base-CNV-4.13:container-native-virtualization/cnv-must-gather-rhel9@sha256:9e8efd76924958eb605401abdac08eba97fb83a1ada383bc87a7fb7c87b3a455_arm64",
"9Base-CNV-4.13:container-native-virtualization/cnv-must-gather-rhel9@sha256:b9fc32b5fabedd65a4c3a471879c808af2087277de4278adaa115a732f0468da_amd64",
"9Base-CNV-4.13:container-native-virtualization/hco-bundle-registry-rhel9@sha256:60e89d7a99ff9f20e974430b802dd724a3bb6fa1e01e5a62daad98ac487b3063_amd64",
"9Base-CNV-4.13:container-native-virtualization/hco-bundle-registry-rhel9@sha256:dd20b138045ef1424d83a47e7abcfcbb2ac54577dcec5ed3c186390aaa4c9d84_arm64",
"9Base-CNV-4.13:container-native-virtualization/hostpath-csi-driver-rhel9@sha256:61e2824853d51347593ad909a5e546cd92e4216d6a1df5dffb50dd9cba277cce_amd64",
"9Base-CNV-4.13:container-native-virtualization/hostpath-csi-driver-rhel9@sha256:676d4c23a5f60dd331728af056b0a6b2d3358ac88da23299b1a98dfaca8f288e_arm64",
"9Base-CNV-4.13:container-native-virtualization/hostpath-provisioner-operator-rhel9@sha256:515be94be496c67f5b8fd5f4832fe4385e56476e6589897d6b9fbb9bb2b00f32_amd64",
"9Base-CNV-4.13:container-native-virtualization/hostpath-provisioner-operator-rhel9@sha256:571ae805641dea11646028c946039983c7fd82f138b915dcb8b80c39b465e63c_arm64",
"9Base-CNV-4.13:container-native-virtualization/hostpath-provisioner-rhel9@sha256:ac3fe350bedd6bc43596444ba0f279ccf8a144ab14ac5a9b80ea71c46390b7b4_amd64",
"9Base-CNV-4.13:container-native-virtualization/hostpath-provisioner-rhel9@sha256:d4ed87745b7ee2acca2d83e2c91c2f6dced1903c81495b50f2559b3ba2dde287_arm64",
"9Base-CNV-4.13:container-native-virtualization/hyperconverged-cluster-operator-rhel9@sha256:e5ab9f3be59d3568e3d672ab374efb16990ccf92192eac4e1244b10fcd7423e2_amd64",
"9Base-CNV-4.13:container-native-virtualization/hyperconverged-cluster-operator-rhel9@sha256:e681560b184189df03fc84c8a712f32289f42573dd348cda394b19565eb6eca8_arm64",
"9Base-CNV-4.13:container-native-virtualization/hyperconverged-cluster-webhook-rhel9@sha256:06d036d320b3027bb8370bb8e0f6fe8c9f0ec9bca7aac3b5c53698ba4a170042_arm64",
"9Base-CNV-4.13:container-native-virtualization/hyperconverged-cluster-webhook-rhel9@sha256:b5a01336180aad017df62cf8e652f2491b8263ba7e4dd07f858db1ef1924cf2f_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubemacpool-rhel9@sha256:4d190d81eeb3fbe9ed56cf3548dc83a3f81641bfdafa7b42dcfb0d2512566644_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubemacpool-rhel9@sha256:59862a59854f0d5b83dc25ba119f9586a8aff42b6e60d1922f8ae7b4567309ff_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubesecondarydns-rhel9@sha256:121d30d78cc57731ea2242ef2c32430890ac66c2723e65608d5e2f26c3f515cd_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubesecondarydns-rhel9@sha256:b1838f3c8ba3d8113bddea17b78c21e1c1490e2a4a07ea77014edee523d06347_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-console-plugin-rhel9@sha256:86a4b1e3d6ad1d56302c9c058f8bc5826dcfe6c46fb3e0ddaa06818645039020_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-console-plugin-rhel9@sha256:ffb2acd9ae09c1ef9ca756f5eaf6087d0a3957cfc824543949d25f556a97744d_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-dpdk-checkup-rhel9@sha256:525aceb9396010ebcdba14040f267889b807cd84db8e5b4030429b51f0fbf5fe_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-dpdk-checkup-rhel9@sha256:553c4686f56c66cc1e3c5ad9d4051f139d43f821eac3abb98ca5cdb8b5dfe202_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-ssp-operator-rhel9@sha256:901e6cad9534c7bd7c4018c60bccfe49d7280fba5a9901ab4c4d15e9345288c4_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-ssp-operator-rhel9@sha256:badeb0f65f543b209f6af761729d9778b7b73b97d55044016dfba3f38a1f6f18_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-cleanup-vm-rhel9@sha256:28e4975fa4dac22d9da32ed2a10aed039fd957b30140daa36bab2caa998be77a_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-cleanup-vm-rhel9@sha256:b0ff7e812a576ea848590655fc13a85832d5a39f68e7769ceab9da6949da88c7_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-copy-template-rhel9@sha256:4916a6c6b1f9b529187d3b4d5fc99b90157993767b3fe2ad36a9ec77fbb46b10_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-copy-template-rhel9@sha256:f71c36442f1b61cdde7ec58d2c3c78d2039f6d6108e6c35388ef7c1650971fa1_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-create-datavolume-rhel9@sha256:2ad49cf6e2242a9e5861929d9bcab1305a7fc4e34e708f99cff1d7253aa46167_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-create-datavolume-rhel9@sha256:7112400a4ecb23ee2110bf96372fcf9f96ad648a51aa944627b40eb59539a660_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-create-vm-from-template-rhel9@sha256:1411c65bbad7302710788327f6964a4bf5bc20ef70d5e46f4a5c6e7a0e7a0161_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-create-vm-from-template-rhel9@sha256:4d962618aa95600c60c9fc8b890186e510de91177d51949e12797a3558e31328_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-customize-rhel9@sha256:5c23d3f20ea9dcbe7109284d73078ecd516a070e964b844f8d80b1d92ebd55ee_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-customize-rhel9@sha256:a780244e48c6d4f87446d3754c3eb9ab79c0d54675c189da4a659f7a4d5668ea_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-sysprep-rhel9@sha256:84577d949a1bbcaa291c70729127bca4a8994df03068666baa23840877ea8392_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-sysprep-rhel9@sha256:aed630a597a090179e1b0e0c117e536df06b67d0f793f91936aa7388c0c5d7eb_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-modify-vm-template-rhel9@sha256:31d959b80cf57462e1705684bb7e1b78af26bd2c62f1c9e4e51e1d02199b05a8_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-modify-vm-template-rhel9@sha256:66aea526bc10e4c0136ba86e394bbdfe4fbd7f757d6f391a561b51d2ba2f4d46_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-operator-rhel9@sha256:d0cf0e81589f0938de45961eaddfc5ec4782738fd11082de0439b200534259eb_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-operator-rhel9@sha256:f1b1f5044db6bb945584f9d4f31d020597725a286ef368ed0aca2116abb31beb_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-wait-for-vmi-status-rhel9@sha256:39a15d03f113735df03b1a7408227eb9604d942c1f3c1992bcdc7eaf07662711_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-wait-for-vmi-status-rhel9@sha256:afb68af076954fcd18c7a4a1464ea0c2a766e8282eae980051906ed07eaa1707_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-template-validator-rhel9@sha256:02b22c7e7014b5e72d47fed8b6a268cf307638c5510adf3916c51f7f40a52a08_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-template-validator-rhel9@sha256:c0264b9271e602f85b2040ef7f207cdfa46038dc4fa6e4738bf196ef88a71cf8_amd64",
"9Base-CNV-4.13:container-native-virtualization/libguestfs-tools-rhel9@sha256:29ae84575bbca24553cf649256759fd96ff286971d80bc2db129154a7df9b283_amd64",
"9Base-CNV-4.13:container-native-virtualization/libguestfs-tools-rhel9@sha256:6558f60343e068b032167e2340b2c549c5f0258acc5d2614b60966ce79408b01_arm64",
"9Base-CNV-4.13:container-native-virtualization/multus-dynamic-networks-rhel9@sha256:3ecb0162a4b01d1590bf209d717b32a4f0835910d9979823f18c24acba41b503_arm64",
"9Base-CNV-4.13:container-native-virtualization/multus-dynamic-networks-rhel9@sha256:b7f68b6420009e21380d32d6459193aae45e93be9533debe17cb3108571b36b8_amd64",
"9Base-CNV-4.13:container-native-virtualization/ovs-cni-plugin-rhel9@sha256:0f1d372f418744e0aff59ecb0a38f53178aac9c2e9eecfd38aa25ed83e0d1360_arm64",
"9Base-CNV-4.13:container-native-virtualization/ovs-cni-plugin-rhel9@sha256:e8e7a44edbf1713fe74de5c4b8f691cce78f4440c4a32a16ba9ad16694a55396_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-api-rhel9@sha256:e68416321ca8c74a547b3d35897f54813c03481143e402e9bdc4daf315e35b5d_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-api-rhel9@sha256:fdb4ca1bb8b310d713d9c7e88f7d091f4460aa942dbeca5ebcf17281a06daffe_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-artifacts-server-rhel9@sha256:33d11c1832b49df39c1fca62bad40dbc5c30a452248339aaef449ac99509accb_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-artifacts-server-rhel9@sha256:81fc61b714baecb5a89fa6c0749c14566e0661b8e184ca602fc2e03b9cf431ee_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-apiserver-rhel9@sha256:f6128a63344ed2129f5bce648ddcfaa2869d31cde4b93328d3c22534b97ade10_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-apiserver-rhel9@sha256:feca273a691d09445c6cff6d36b5d590735e867656a9898ce0d89744d98e8006_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-cloner-rhel9@sha256:68e3b9b0291b4fb277ac430269ffce11d13b0a7688cf2ffcdb7f98759c36b4db_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-cloner-rhel9@sha256:6ac212767481bef64d8a7d0252bb8089c0f9751fad4a355aef71bd49dad2ad07_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-controller-rhel9@sha256:65f5263275d9f0a12b8fb057d82adf678778039ec873ca9bde182dea3413c9f1_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-controller-rhel9@sha256:d9e62b2019328be258489ac852eef25f8b1233f29abac6bcea5b406329f97fed_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-importer-rhel9@sha256:00a6d9d24ca1466d450b02269ec3144fc7550f0e5c696e869fbf7ce10cae6093_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-importer-rhel9@sha256:2df07fb21a3575e74aa16ded20129828f2300cd33e8ab369b0362062d49e62d0_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-operator-rhel9@sha256:20ec064750faedd97d11b797c8c1d9a1db5d60d7d76e82e65cfd05eb79d65e29_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-operator-rhel9@sha256:802ee8923d9d8e406b23911406f9748756c0ef4d6954e9e2fd5fb4bdf91dde9a_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-uploadproxy-rhel9@sha256:392d0f61f462c707adfdc21e4239c5c09d8520a80486b41d9d9ae479267d6124_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-uploadproxy-rhel9@sha256:6775f34353eec8f35bead9411dde155530d079bb8d51582fb1f2aacc27dbde1d_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-uploadserver-rhel9@sha256:4528c24672689cfb6505761b6b108fbcc04488192733f23d2bfe39cd42a1d743_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-uploadserver-rhel9@sha256:b22048390387380af94e267c8a9a66813c515997456d59d8ebac1486916b6585_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-controller-rhel9@sha256:3e7880149ee9a68286e390beb3d9779f7403c30fc5136e5370e0e4690a3fd243_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-controller-rhel9@sha256:970edc281d7a731e9f7e8c2d4440fe48a221e5e355d5235c5413b4c3adb28503_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-exportproxy-rhel9@sha256:1bda34d5bff734ad997202f29a5ff6f7362fd79fa90511a422442ef2e3681198_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-exportproxy-rhel9@sha256:de3c4afbf7669b98517cbef2490ec186f0553dd97b05bed80ec36dd883fe507b_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-exportserver-rhel9@sha256:3f7f98645176d42c63cca5c0fc3182a03121af87446ca421b6c72baf07dfca0d_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-exportserver-rhel9@sha256:8f12955cd777eb2409037a6968aa92f50c99d6e07e722951dbcfd0c8c9829b5e_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-handler-rhel9@sha256:5fc47110d866d8048aec50689090ce10705d19d3bb48d2b06727d6d569003af7_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-handler-rhel9@sha256:84ba79ae9658699147d2493df2582ab6df10adbff4d44a533c3fe6a9f45f9691_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-launcher-rhel9@sha256:4990d40d9987d5126d105dd45be2501eaded248cb61bdde5ea8d359bc1e7ebef_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-launcher-rhel9@sha256:95aeacb98209e0baef27ce0e02fbac38d693cea74808fc77107efda0f344bcb5_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-operator-rhel9@sha256:5c1a7e4ed2061938987b900a2394f07121d4037350c9bb6485213a2adfea787d_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-operator-rhel9@sha256:66b1b3b379121d6411ba22283e7d991617177330c93746d37753ab7812b9a00b_arm64",
"9Base-CNV-4.13:container-native-virtualization/virtio-win-rhel9@sha256:8735f51da918408a8826601c082d1b29accf26d59b9978da89b980cb509c1102_arm64",
"9Base-CNV-4.13:container-native-virtualization/virtio-win-rhel9@sha256:d147d2a6eb6f907d1e88f61aaca83596853bc72164583d6dda2b1154b490de25_amd64",
"9Base-CNV-4.13:container-native-virtualization/vm-console-proxy-rhel9@sha256:70a8d0cd66182c25e02679540bae1368b2a9cf687532b58dba41ef30c5ca00c1_arm64",
"9Base-CNV-4.13:container-native-virtualization/vm-console-proxy-rhel9@sha256:7ca921f98f6d81a126907127a611146fb53397869a628678faa1e289c01d22b2_amd64",
"9Base-CNV-4.13:container-native-virtualization/vm-network-latency-checkup-rhel9@sha256:503ea7ac914a9b54e9d665a0227ee0b5d5200cdb5d692aa94c07dd1518d91b70_arm64",
"9Base-CNV-4.13:container-native-virtualization/vm-network-latency-checkup-rhel9@sha256:59fd965975bccf641a0fa7aa01374d45057bd03cda7528248a84b60b1205bf57_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "golang: golang.org/x/text/language: ParseAcceptLanguage takes a long time to parse complex tags"
},
{
"cve": "CVE-2022-32189",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"discovery_date": "2022-08-02T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"9Base-CNV-4.13:container-native-virtualization/bridge-marker-rhel9@sha256:8eac196b30a648989cdca5cb153a3bc3d34e47339acba0e4f760bd366496c99d_amd64",
"9Base-CNV-4.13:container-native-virtualization/bridge-marker-rhel9@sha256:e8a55aee3d75a316bb0d7a554c737198823df04b3c05e481c17e45eb2153bced_arm64",
"9Base-CNV-4.13:container-native-virtualization/cluster-network-addons-operator-rhel9@sha256:3bff33e3f40cd1e2b519c2db56734d4bb8df883e155c2f20b1cb9d3d184daec1_amd64",
"9Base-CNV-4.13:container-native-virtualization/cluster-network-addons-operator-rhel9@sha256:f439d2f420bb59eb1d5af14ce2002648d0cfc155d1a1466c8aac9b661fe902b8_arm64",
"9Base-CNV-4.13:container-native-virtualization/cnv-containernetworking-plugins-rhel9@sha256:89f22e541f61a660c9aa9f38ef58e80b84a0517f74e84292107fc252c25465c9_arm64",
"9Base-CNV-4.13:container-native-virtualization/cnv-containernetworking-plugins-rhel9@sha256:bf471997e54e4a75b0d71f492ab295787fdbb14d8c85c4ea8c03f0552dbc3755_amd64",
"9Base-CNV-4.13:container-native-virtualization/cnv-must-gather-rhel9@sha256:9e8efd76924958eb605401abdac08eba97fb83a1ada383bc87a7fb7c87b3a455_arm64",
"9Base-CNV-4.13:container-native-virtualization/cnv-must-gather-rhel9@sha256:b9fc32b5fabedd65a4c3a471879c808af2087277de4278adaa115a732f0468da_amd64",
"9Base-CNV-4.13:container-native-virtualization/hco-bundle-registry-rhel9@sha256:60e89d7a99ff9f20e974430b802dd724a3bb6fa1e01e5a62daad98ac487b3063_amd64",
"9Base-CNV-4.13:container-native-virtualization/hco-bundle-registry-rhel9@sha256:dd20b138045ef1424d83a47e7abcfcbb2ac54577dcec5ed3c186390aaa4c9d84_arm64",
"9Base-CNV-4.13:container-native-virtualization/hostpath-csi-driver-rhel9@sha256:61e2824853d51347593ad909a5e546cd92e4216d6a1df5dffb50dd9cba277cce_amd64",
"9Base-CNV-4.13:container-native-virtualization/hostpath-csi-driver-rhel9@sha256:676d4c23a5f60dd331728af056b0a6b2d3358ac88da23299b1a98dfaca8f288e_arm64",
"9Base-CNV-4.13:container-native-virtualization/hostpath-provisioner-operator-rhel9@sha256:515be94be496c67f5b8fd5f4832fe4385e56476e6589897d6b9fbb9bb2b00f32_amd64",
"9Base-CNV-4.13:container-native-virtualization/hostpath-provisioner-operator-rhel9@sha256:571ae805641dea11646028c946039983c7fd82f138b915dcb8b80c39b465e63c_arm64",
"9Base-CNV-4.13:container-native-virtualization/hostpath-provisioner-rhel9@sha256:ac3fe350bedd6bc43596444ba0f279ccf8a144ab14ac5a9b80ea71c46390b7b4_amd64",
"9Base-CNV-4.13:container-native-virtualization/hostpath-provisioner-rhel9@sha256:d4ed87745b7ee2acca2d83e2c91c2f6dced1903c81495b50f2559b3ba2dde287_arm64",
"9Base-CNV-4.13:container-native-virtualization/hyperconverged-cluster-operator-rhel9@sha256:e5ab9f3be59d3568e3d672ab374efb16990ccf92192eac4e1244b10fcd7423e2_amd64",
"9Base-CNV-4.13:container-native-virtualization/hyperconverged-cluster-operator-rhel9@sha256:e681560b184189df03fc84c8a712f32289f42573dd348cda394b19565eb6eca8_arm64",
"9Base-CNV-4.13:container-native-virtualization/hyperconverged-cluster-webhook-rhel9@sha256:06d036d320b3027bb8370bb8e0f6fe8c9f0ec9bca7aac3b5c53698ba4a170042_arm64",
"9Base-CNV-4.13:container-native-virtualization/hyperconverged-cluster-webhook-rhel9@sha256:b5a01336180aad017df62cf8e652f2491b8263ba7e4dd07f858db1ef1924cf2f_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubemacpool-rhel9@sha256:4d190d81eeb3fbe9ed56cf3548dc83a3f81641bfdafa7b42dcfb0d2512566644_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubemacpool-rhel9@sha256:59862a59854f0d5b83dc25ba119f9586a8aff42b6e60d1922f8ae7b4567309ff_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubesecondarydns-rhel9@sha256:121d30d78cc57731ea2242ef2c32430890ac66c2723e65608d5e2f26c3f515cd_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubesecondarydns-rhel9@sha256:b1838f3c8ba3d8113bddea17b78c21e1c1490e2a4a07ea77014edee523d06347_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-console-plugin-rhel9@sha256:86a4b1e3d6ad1d56302c9c058f8bc5826dcfe6c46fb3e0ddaa06818645039020_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-console-plugin-rhel9@sha256:ffb2acd9ae09c1ef9ca756f5eaf6087d0a3957cfc824543949d25f556a97744d_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-dpdk-checkup-rhel9@sha256:525aceb9396010ebcdba14040f267889b807cd84db8e5b4030429b51f0fbf5fe_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-dpdk-checkup-rhel9@sha256:553c4686f56c66cc1e3c5ad9d4051f139d43f821eac3abb98ca5cdb8b5dfe202_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-ssp-operator-rhel9@sha256:901e6cad9534c7bd7c4018c60bccfe49d7280fba5a9901ab4c4d15e9345288c4_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-ssp-operator-rhel9@sha256:badeb0f65f543b209f6af761729d9778b7b73b97d55044016dfba3f38a1f6f18_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-cleanup-vm-rhel9@sha256:28e4975fa4dac22d9da32ed2a10aed039fd957b30140daa36bab2caa998be77a_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-cleanup-vm-rhel9@sha256:b0ff7e812a576ea848590655fc13a85832d5a39f68e7769ceab9da6949da88c7_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-copy-template-rhel9@sha256:4916a6c6b1f9b529187d3b4d5fc99b90157993767b3fe2ad36a9ec77fbb46b10_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-copy-template-rhel9@sha256:f71c36442f1b61cdde7ec58d2c3c78d2039f6d6108e6c35388ef7c1650971fa1_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-create-datavolume-rhel9@sha256:2ad49cf6e2242a9e5861929d9bcab1305a7fc4e34e708f99cff1d7253aa46167_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-create-datavolume-rhel9@sha256:7112400a4ecb23ee2110bf96372fcf9f96ad648a51aa944627b40eb59539a660_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-create-vm-from-template-rhel9@sha256:1411c65bbad7302710788327f6964a4bf5bc20ef70d5e46f4a5c6e7a0e7a0161_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-create-vm-from-template-rhel9@sha256:4d962618aa95600c60c9fc8b890186e510de91177d51949e12797a3558e31328_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-customize-rhel9@sha256:5c23d3f20ea9dcbe7109284d73078ecd516a070e964b844f8d80b1d92ebd55ee_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-customize-rhel9@sha256:a780244e48c6d4f87446d3754c3eb9ab79c0d54675c189da4a659f7a4d5668ea_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-sysprep-rhel9@sha256:84577d949a1bbcaa291c70729127bca4a8994df03068666baa23840877ea8392_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-sysprep-rhel9@sha256:aed630a597a090179e1b0e0c117e536df06b67d0f793f91936aa7388c0c5d7eb_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-modify-vm-template-rhel9@sha256:31d959b80cf57462e1705684bb7e1b78af26bd2c62f1c9e4e51e1d02199b05a8_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-modify-vm-template-rhel9@sha256:66aea526bc10e4c0136ba86e394bbdfe4fbd7f757d6f391a561b51d2ba2f4d46_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-operator-rhel9@sha256:d0cf0e81589f0938de45961eaddfc5ec4782738fd11082de0439b200534259eb_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-operator-rhel9@sha256:f1b1f5044db6bb945584f9d4f31d020597725a286ef368ed0aca2116abb31beb_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-wait-for-vmi-status-rhel9@sha256:39a15d03f113735df03b1a7408227eb9604d942c1f3c1992bcdc7eaf07662711_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-wait-for-vmi-status-rhel9@sha256:afb68af076954fcd18c7a4a1464ea0c2a766e8282eae980051906ed07eaa1707_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-template-validator-rhel9@sha256:02b22c7e7014b5e72d47fed8b6a268cf307638c5510adf3916c51f7f40a52a08_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-template-validator-rhel9@sha256:c0264b9271e602f85b2040ef7f207cdfa46038dc4fa6e4738bf196ef88a71cf8_amd64",
"9Base-CNV-4.13:container-native-virtualization/libguestfs-tools-rhel9@sha256:29ae84575bbca24553cf649256759fd96ff286971d80bc2db129154a7df9b283_amd64",
"9Base-CNV-4.13:container-native-virtualization/libguestfs-tools-rhel9@sha256:6558f60343e068b032167e2340b2c549c5f0258acc5d2614b60966ce79408b01_arm64",
"9Base-CNV-4.13:container-native-virtualization/multus-dynamic-networks-rhel9@sha256:3ecb0162a4b01d1590bf209d717b32a4f0835910d9979823f18c24acba41b503_arm64",
"9Base-CNV-4.13:container-native-virtualization/multus-dynamic-networks-rhel9@sha256:b7f68b6420009e21380d32d6459193aae45e93be9533debe17cb3108571b36b8_amd64",
"9Base-CNV-4.13:container-native-virtualization/ovs-cni-plugin-rhel9@sha256:0f1d372f418744e0aff59ecb0a38f53178aac9c2e9eecfd38aa25ed83e0d1360_arm64",
"9Base-CNV-4.13:container-native-virtualization/ovs-cni-plugin-rhel9@sha256:e8e7a44edbf1713fe74de5c4b8f691cce78f4440c4a32a16ba9ad16694a55396_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-artifacts-server-rhel9@sha256:33d11c1832b49df39c1fca62bad40dbc5c30a452248339aaef449ac99509accb_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-artifacts-server-rhel9@sha256:81fc61b714baecb5a89fa6c0749c14566e0661b8e184ca602fc2e03b9cf431ee_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-apiserver-rhel9@sha256:f6128a63344ed2129f5bce648ddcfaa2869d31cde4b93328d3c22534b97ade10_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-apiserver-rhel9@sha256:feca273a691d09445c6cff6d36b5d590735e867656a9898ce0d89744d98e8006_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-cloner-rhel9@sha256:68e3b9b0291b4fb277ac430269ffce11d13b0a7688cf2ffcdb7f98759c36b4db_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-cloner-rhel9@sha256:6ac212767481bef64d8a7d0252bb8089c0f9751fad4a355aef71bd49dad2ad07_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-controller-rhel9@sha256:65f5263275d9f0a12b8fb057d82adf678778039ec873ca9bde182dea3413c9f1_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-controller-rhel9@sha256:d9e62b2019328be258489ac852eef25f8b1233f29abac6bcea5b406329f97fed_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-importer-rhel9@sha256:00a6d9d24ca1466d450b02269ec3144fc7550f0e5c696e869fbf7ce10cae6093_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-importer-rhel9@sha256:2df07fb21a3575e74aa16ded20129828f2300cd33e8ab369b0362062d49e62d0_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-operator-rhel9@sha256:20ec064750faedd97d11b797c8c1d9a1db5d60d7d76e82e65cfd05eb79d65e29_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-operator-rhel9@sha256:802ee8923d9d8e406b23911406f9748756c0ef4d6954e9e2fd5fb4bdf91dde9a_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-uploadproxy-rhel9@sha256:392d0f61f462c707adfdc21e4239c5c09d8520a80486b41d9d9ae479267d6124_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-uploadproxy-rhel9@sha256:6775f34353eec8f35bead9411dde155530d079bb8d51582fb1f2aacc27dbde1d_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-uploadserver-rhel9@sha256:4528c24672689cfb6505761b6b108fbcc04488192733f23d2bfe39cd42a1d743_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-uploadserver-rhel9@sha256:b22048390387380af94e267c8a9a66813c515997456d59d8ebac1486916b6585_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-controller-rhel9@sha256:3e7880149ee9a68286e390beb3d9779f7403c30fc5136e5370e0e4690a3fd243_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-controller-rhel9@sha256:970edc281d7a731e9f7e8c2d4440fe48a221e5e355d5235c5413b4c3adb28503_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-exportproxy-rhel9@sha256:1bda34d5bff734ad997202f29a5ff6f7362fd79fa90511a422442ef2e3681198_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-exportproxy-rhel9@sha256:de3c4afbf7669b98517cbef2490ec186f0553dd97b05bed80ec36dd883fe507b_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-exportserver-rhel9@sha256:3f7f98645176d42c63cca5c0fc3182a03121af87446ca421b6c72baf07dfca0d_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-exportserver-rhel9@sha256:8f12955cd777eb2409037a6968aa92f50c99d6e07e722951dbcfd0c8c9829b5e_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-handler-rhel9@sha256:5fc47110d866d8048aec50689090ce10705d19d3bb48d2b06727d6d569003af7_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-handler-rhel9@sha256:84ba79ae9658699147d2493df2582ab6df10adbff4d44a533c3fe6a9f45f9691_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-launcher-rhel9@sha256:4990d40d9987d5126d105dd45be2501eaded248cb61bdde5ea8d359bc1e7ebef_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-launcher-rhel9@sha256:95aeacb98209e0baef27ce0e02fbac38d693cea74808fc77107efda0f344bcb5_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-operator-rhel9@sha256:5c1a7e4ed2061938987b900a2394f07121d4037350c9bb6485213a2adfea787d_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-operator-rhel9@sha256:66b1b3b379121d6411ba22283e7d991617177330c93746d37753ab7812b9a00b_arm64",
"9Base-CNV-4.13:container-native-virtualization/virtio-win-rhel9@sha256:8735f51da918408a8826601c082d1b29accf26d59b9978da89b980cb509c1102_arm64",
"9Base-CNV-4.13:container-native-virtualization/virtio-win-rhel9@sha256:d147d2a6eb6f907d1e88f61aaca83596853bc72164583d6dda2b1154b490de25_amd64",
"9Base-CNV-4.13:container-native-virtualization/vm-console-proxy-rhel9@sha256:70a8d0cd66182c25e02679540bae1368b2a9cf687532b58dba41ef30c5ca00c1_arm64",
"9Base-CNV-4.13:container-native-virtualization/vm-console-proxy-rhel9@sha256:7ca921f98f6d81a126907127a611146fb53397869a628678faa1e289c01d22b2_amd64",
"9Base-CNV-4.13:container-native-virtualization/vm-network-latency-checkup-rhel9@sha256:503ea7ac914a9b54e9d665a0227ee0b5d5200cdb5d692aa94c07dd1518d91b70_arm64",
"9Base-CNV-4.13:container-native-virtualization/vm-network-latency-checkup-rhel9@sha256:59fd965975bccf641a0fa7aa01374d45057bd03cda7528248a84b60b1205bf57_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2113814"
}
],
"notes": [
{
"category": "description",
"text": "An uncontrolled resource consumption flaw was found in Golang math/big. A too-short encoded message can cause a panic in Float.GobDecode and Rat.GobDecode in math/big in Go, potentially allowing an attacker to create a denial of service, impacting availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: math/big: decoding big.Float and big.Rat types can panic if the encoded message is too short, potentially allowing a denial of service",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This flaw stems from a particular and specific method (GoBDecode) which isn\u0027t commonly used. There are few components within Red Hat offerings which call this function. In rare cases where this method is called, the component limits possible damage or it is not possible to be triggered by an attacker. For these combined reasons the impact has been downgraded to Low.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"9Base-CNV-4.13:container-native-virtualization/virt-api-rhel9@sha256:e68416321ca8c74a547b3d35897f54813c03481143e402e9bdc4daf315e35b5d_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-api-rhel9@sha256:fdb4ca1bb8b310d713d9c7e88f7d091f4460aa942dbeca5ebcf17281a06daffe_amd64"
],
"known_not_affected": [
"9Base-CNV-4.13:container-native-virtualization/bridge-marker-rhel9@sha256:8eac196b30a648989cdca5cb153a3bc3d34e47339acba0e4f760bd366496c99d_amd64",
"9Base-CNV-4.13:container-native-virtualization/bridge-marker-rhel9@sha256:e8a55aee3d75a316bb0d7a554c737198823df04b3c05e481c17e45eb2153bced_arm64",
"9Base-CNV-4.13:container-native-virtualization/cluster-network-addons-operator-rhel9@sha256:3bff33e3f40cd1e2b519c2db56734d4bb8df883e155c2f20b1cb9d3d184daec1_amd64",
"9Base-CNV-4.13:container-native-virtualization/cluster-network-addons-operator-rhel9@sha256:f439d2f420bb59eb1d5af14ce2002648d0cfc155d1a1466c8aac9b661fe902b8_arm64",
"9Base-CNV-4.13:container-native-virtualization/cnv-containernetworking-plugins-rhel9@sha256:89f22e541f61a660c9aa9f38ef58e80b84a0517f74e84292107fc252c25465c9_arm64",
"9Base-CNV-4.13:container-native-virtualization/cnv-containernetworking-plugins-rhel9@sha256:bf471997e54e4a75b0d71f492ab295787fdbb14d8c85c4ea8c03f0552dbc3755_amd64",
"9Base-CNV-4.13:container-native-virtualization/cnv-must-gather-rhel9@sha256:9e8efd76924958eb605401abdac08eba97fb83a1ada383bc87a7fb7c87b3a455_arm64",
"9Base-CNV-4.13:container-native-virtualization/cnv-must-gather-rhel9@sha256:b9fc32b5fabedd65a4c3a471879c808af2087277de4278adaa115a732f0468da_amd64",
"9Base-CNV-4.13:container-native-virtualization/hco-bundle-registry-rhel9@sha256:60e89d7a99ff9f20e974430b802dd724a3bb6fa1e01e5a62daad98ac487b3063_amd64",
"9Base-CNV-4.13:container-native-virtualization/hco-bundle-registry-rhel9@sha256:dd20b138045ef1424d83a47e7abcfcbb2ac54577dcec5ed3c186390aaa4c9d84_arm64",
"9Base-CNV-4.13:container-native-virtualization/hostpath-csi-driver-rhel9@sha256:61e2824853d51347593ad909a5e546cd92e4216d6a1df5dffb50dd9cba277cce_amd64",
"9Base-CNV-4.13:container-native-virtualization/hostpath-csi-driver-rhel9@sha256:676d4c23a5f60dd331728af056b0a6b2d3358ac88da23299b1a98dfaca8f288e_arm64",
"9Base-CNV-4.13:container-native-virtualization/hostpath-provisioner-operator-rhel9@sha256:515be94be496c67f5b8fd5f4832fe4385e56476e6589897d6b9fbb9bb2b00f32_amd64",
"9Base-CNV-4.13:container-native-virtualization/hostpath-provisioner-operator-rhel9@sha256:571ae805641dea11646028c946039983c7fd82f138b915dcb8b80c39b465e63c_arm64",
"9Base-CNV-4.13:container-native-virtualization/hostpath-provisioner-rhel9@sha256:ac3fe350bedd6bc43596444ba0f279ccf8a144ab14ac5a9b80ea71c46390b7b4_amd64",
"9Base-CNV-4.13:container-native-virtualization/hostpath-provisioner-rhel9@sha256:d4ed87745b7ee2acca2d83e2c91c2f6dced1903c81495b50f2559b3ba2dde287_arm64",
"9Base-CNV-4.13:container-native-virtualization/hyperconverged-cluster-operator-rhel9@sha256:e5ab9f3be59d3568e3d672ab374efb16990ccf92192eac4e1244b10fcd7423e2_amd64",
"9Base-CNV-4.13:container-native-virtualization/hyperconverged-cluster-operator-rhel9@sha256:e681560b184189df03fc84c8a712f32289f42573dd348cda394b19565eb6eca8_arm64",
"9Base-CNV-4.13:container-native-virtualization/hyperconverged-cluster-webhook-rhel9@sha256:06d036d320b3027bb8370bb8e0f6fe8c9f0ec9bca7aac3b5c53698ba4a170042_arm64",
"9Base-CNV-4.13:container-native-virtualization/hyperconverged-cluster-webhook-rhel9@sha256:b5a01336180aad017df62cf8e652f2491b8263ba7e4dd07f858db1ef1924cf2f_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubemacpool-rhel9@sha256:4d190d81eeb3fbe9ed56cf3548dc83a3f81641bfdafa7b42dcfb0d2512566644_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubemacpool-rhel9@sha256:59862a59854f0d5b83dc25ba119f9586a8aff42b6e60d1922f8ae7b4567309ff_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubesecondarydns-rhel9@sha256:121d30d78cc57731ea2242ef2c32430890ac66c2723e65608d5e2f26c3f515cd_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubesecondarydns-rhel9@sha256:b1838f3c8ba3d8113bddea17b78c21e1c1490e2a4a07ea77014edee523d06347_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-console-plugin-rhel9@sha256:86a4b1e3d6ad1d56302c9c058f8bc5826dcfe6c46fb3e0ddaa06818645039020_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-console-plugin-rhel9@sha256:ffb2acd9ae09c1ef9ca756f5eaf6087d0a3957cfc824543949d25f556a97744d_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-dpdk-checkup-rhel9@sha256:525aceb9396010ebcdba14040f267889b807cd84db8e5b4030429b51f0fbf5fe_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-dpdk-checkup-rhel9@sha256:553c4686f56c66cc1e3c5ad9d4051f139d43f821eac3abb98ca5cdb8b5dfe202_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-ssp-operator-rhel9@sha256:901e6cad9534c7bd7c4018c60bccfe49d7280fba5a9901ab4c4d15e9345288c4_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-ssp-operator-rhel9@sha256:badeb0f65f543b209f6af761729d9778b7b73b97d55044016dfba3f38a1f6f18_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-cleanup-vm-rhel9@sha256:28e4975fa4dac22d9da32ed2a10aed039fd957b30140daa36bab2caa998be77a_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-cleanup-vm-rhel9@sha256:b0ff7e812a576ea848590655fc13a85832d5a39f68e7769ceab9da6949da88c7_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-copy-template-rhel9@sha256:4916a6c6b1f9b529187d3b4d5fc99b90157993767b3fe2ad36a9ec77fbb46b10_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-copy-template-rhel9@sha256:f71c36442f1b61cdde7ec58d2c3c78d2039f6d6108e6c35388ef7c1650971fa1_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-create-datavolume-rhel9@sha256:2ad49cf6e2242a9e5861929d9bcab1305a7fc4e34e708f99cff1d7253aa46167_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-create-datavolume-rhel9@sha256:7112400a4ecb23ee2110bf96372fcf9f96ad648a51aa944627b40eb59539a660_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-create-vm-from-template-rhel9@sha256:1411c65bbad7302710788327f6964a4bf5bc20ef70d5e46f4a5c6e7a0e7a0161_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-create-vm-from-template-rhel9@sha256:4d962618aa95600c60c9fc8b890186e510de91177d51949e12797a3558e31328_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-customize-rhel9@sha256:5c23d3f20ea9dcbe7109284d73078ecd516a070e964b844f8d80b1d92ebd55ee_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-customize-rhel9@sha256:a780244e48c6d4f87446d3754c3eb9ab79c0d54675c189da4a659f7a4d5668ea_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-sysprep-rhel9@sha256:84577d949a1bbcaa291c70729127bca4a8994df03068666baa23840877ea8392_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-sysprep-rhel9@sha256:aed630a597a090179e1b0e0c117e536df06b67d0f793f91936aa7388c0c5d7eb_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-modify-vm-template-rhel9@sha256:31d959b80cf57462e1705684bb7e1b78af26bd2c62f1c9e4e51e1d02199b05a8_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-modify-vm-template-rhel9@sha256:66aea526bc10e4c0136ba86e394bbdfe4fbd7f757d6f391a561b51d2ba2f4d46_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-operator-rhel9@sha256:d0cf0e81589f0938de45961eaddfc5ec4782738fd11082de0439b200534259eb_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-operator-rhel9@sha256:f1b1f5044db6bb945584f9d4f31d020597725a286ef368ed0aca2116abb31beb_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-wait-for-vmi-status-rhel9@sha256:39a15d03f113735df03b1a7408227eb9604d942c1f3c1992bcdc7eaf07662711_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-wait-for-vmi-status-rhel9@sha256:afb68af076954fcd18c7a4a1464ea0c2a766e8282eae980051906ed07eaa1707_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-template-validator-rhel9@sha256:02b22c7e7014b5e72d47fed8b6a268cf307638c5510adf3916c51f7f40a52a08_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-template-validator-rhel9@sha256:c0264b9271e602f85b2040ef7f207cdfa46038dc4fa6e4738bf196ef88a71cf8_amd64",
"9Base-CNV-4.13:container-native-virtualization/libguestfs-tools-rhel9@sha256:29ae84575bbca24553cf649256759fd96ff286971d80bc2db129154a7df9b283_amd64",
"9Base-CNV-4.13:container-native-virtualization/libguestfs-tools-rhel9@sha256:6558f60343e068b032167e2340b2c549c5f0258acc5d2614b60966ce79408b01_arm64",
"9Base-CNV-4.13:container-native-virtualization/multus-dynamic-networks-rhel9@sha256:3ecb0162a4b01d1590bf209d717b32a4f0835910d9979823f18c24acba41b503_arm64",
"9Base-CNV-4.13:container-native-virtualization/multus-dynamic-networks-rhel9@sha256:b7f68b6420009e21380d32d6459193aae45e93be9533debe17cb3108571b36b8_amd64",
"9Base-CNV-4.13:container-native-virtualization/ovs-cni-plugin-rhel9@sha256:0f1d372f418744e0aff59ecb0a38f53178aac9c2e9eecfd38aa25ed83e0d1360_arm64",
"9Base-CNV-4.13:container-native-virtualization/ovs-cni-plugin-rhel9@sha256:e8e7a44edbf1713fe74de5c4b8f691cce78f4440c4a32a16ba9ad16694a55396_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-artifacts-server-rhel9@sha256:33d11c1832b49df39c1fca62bad40dbc5c30a452248339aaef449ac99509accb_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-artifacts-server-rhel9@sha256:81fc61b714baecb5a89fa6c0749c14566e0661b8e184ca602fc2e03b9cf431ee_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-apiserver-rhel9@sha256:f6128a63344ed2129f5bce648ddcfaa2869d31cde4b93328d3c22534b97ade10_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-apiserver-rhel9@sha256:feca273a691d09445c6cff6d36b5d590735e867656a9898ce0d89744d98e8006_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-cloner-rhel9@sha256:68e3b9b0291b4fb277ac430269ffce11d13b0a7688cf2ffcdb7f98759c36b4db_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-cloner-rhel9@sha256:6ac212767481bef64d8a7d0252bb8089c0f9751fad4a355aef71bd49dad2ad07_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-controller-rhel9@sha256:65f5263275d9f0a12b8fb057d82adf678778039ec873ca9bde182dea3413c9f1_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-controller-rhel9@sha256:d9e62b2019328be258489ac852eef25f8b1233f29abac6bcea5b406329f97fed_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-importer-rhel9@sha256:00a6d9d24ca1466d450b02269ec3144fc7550f0e5c696e869fbf7ce10cae6093_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-importer-rhel9@sha256:2df07fb21a3575e74aa16ded20129828f2300cd33e8ab369b0362062d49e62d0_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-operator-rhel9@sha256:20ec064750faedd97d11b797c8c1d9a1db5d60d7d76e82e65cfd05eb79d65e29_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-operator-rhel9@sha256:802ee8923d9d8e406b23911406f9748756c0ef4d6954e9e2fd5fb4bdf91dde9a_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-uploadproxy-rhel9@sha256:392d0f61f462c707adfdc21e4239c5c09d8520a80486b41d9d9ae479267d6124_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-uploadproxy-rhel9@sha256:6775f34353eec8f35bead9411dde155530d079bb8d51582fb1f2aacc27dbde1d_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-uploadserver-rhel9@sha256:4528c24672689cfb6505761b6b108fbcc04488192733f23d2bfe39cd42a1d743_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-uploadserver-rhel9@sha256:b22048390387380af94e267c8a9a66813c515997456d59d8ebac1486916b6585_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-controller-rhel9@sha256:3e7880149ee9a68286e390beb3d9779f7403c30fc5136e5370e0e4690a3fd243_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-controller-rhel9@sha256:970edc281d7a731e9f7e8c2d4440fe48a221e5e355d5235c5413b4c3adb28503_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-exportproxy-rhel9@sha256:1bda34d5bff734ad997202f29a5ff6f7362fd79fa90511a422442ef2e3681198_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-exportproxy-rhel9@sha256:de3c4afbf7669b98517cbef2490ec186f0553dd97b05bed80ec36dd883fe507b_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-exportserver-rhel9@sha256:3f7f98645176d42c63cca5c0fc3182a03121af87446ca421b6c72baf07dfca0d_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-exportserver-rhel9@sha256:8f12955cd777eb2409037a6968aa92f50c99d6e07e722951dbcfd0c8c9829b5e_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-handler-rhel9@sha256:5fc47110d866d8048aec50689090ce10705d19d3bb48d2b06727d6d569003af7_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-handler-rhel9@sha256:84ba79ae9658699147d2493df2582ab6df10adbff4d44a533c3fe6a9f45f9691_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-launcher-rhel9@sha256:4990d40d9987d5126d105dd45be2501eaded248cb61bdde5ea8d359bc1e7ebef_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-launcher-rhel9@sha256:95aeacb98209e0baef27ce0e02fbac38d693cea74808fc77107efda0f344bcb5_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-operator-rhel9@sha256:5c1a7e4ed2061938987b900a2394f07121d4037350c9bb6485213a2adfea787d_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-operator-rhel9@sha256:66b1b3b379121d6411ba22283e7d991617177330c93746d37753ab7812b9a00b_arm64",
"9Base-CNV-4.13:container-native-virtualization/virtio-win-rhel9@sha256:8735f51da918408a8826601c082d1b29accf26d59b9978da89b980cb509c1102_arm64",
"9Base-CNV-4.13:container-native-virtualization/virtio-win-rhel9@sha256:d147d2a6eb6f907d1e88f61aaca83596853bc72164583d6dda2b1154b490de25_amd64",
"9Base-CNV-4.13:container-native-virtualization/vm-console-proxy-rhel9@sha256:70a8d0cd66182c25e02679540bae1368b2a9cf687532b58dba41ef30c5ca00c1_arm64",
"9Base-CNV-4.13:container-native-virtualization/vm-console-proxy-rhel9@sha256:7ca921f98f6d81a126907127a611146fb53397869a628678faa1e289c01d22b2_amd64",
"9Base-CNV-4.13:container-native-virtualization/vm-network-latency-checkup-rhel9@sha256:503ea7ac914a9b54e9d665a0227ee0b5d5200cdb5d692aa94c07dd1518d91b70_arm64",
"9Base-CNV-4.13:container-native-virtualization/vm-network-latency-checkup-rhel9@sha256:59fd965975bccf641a0fa7aa01374d45057bd03cda7528248a84b60b1205bf57_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-32189"
},
{
"category": "external",
"summary": "RHBZ#2113814",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2113814"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-32189",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32189"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-32189",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-32189"
},
{
"category": "external",
"summary": "https://go.dev/issue/53871",
"url": "https://go.dev/issue/53871"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-nuts/c/DCFSyTGM0wU",
"url": "https://groups.google.com/g/golang-nuts/c/DCFSyTGM0wU"
}
],
"release_date": "2022-08-01T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-05-18T02:55:08+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"9Base-CNV-4.13:container-native-virtualization/virt-api-rhel9@sha256:e68416321ca8c74a547b3d35897f54813c03481143e402e9bdc4daf315e35b5d_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-api-rhel9@sha256:fdb4ca1bb8b310d713d9c7e88f7d091f4460aa942dbeca5ebcf17281a06daffe_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:3205"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"9Base-CNV-4.13:container-native-virtualization/bridge-marker-rhel9@sha256:8eac196b30a648989cdca5cb153a3bc3d34e47339acba0e4f760bd366496c99d_amd64",
"9Base-CNV-4.13:container-native-virtualization/bridge-marker-rhel9@sha256:e8a55aee3d75a316bb0d7a554c737198823df04b3c05e481c17e45eb2153bced_arm64",
"9Base-CNV-4.13:container-native-virtualization/cluster-network-addons-operator-rhel9@sha256:3bff33e3f40cd1e2b519c2db56734d4bb8df883e155c2f20b1cb9d3d184daec1_amd64",
"9Base-CNV-4.13:container-native-virtualization/cluster-network-addons-operator-rhel9@sha256:f439d2f420bb59eb1d5af14ce2002648d0cfc155d1a1466c8aac9b661fe902b8_arm64",
"9Base-CNV-4.13:container-native-virtualization/cnv-containernetworking-plugins-rhel9@sha256:89f22e541f61a660c9aa9f38ef58e80b84a0517f74e84292107fc252c25465c9_arm64",
"9Base-CNV-4.13:container-native-virtualization/cnv-containernetworking-plugins-rhel9@sha256:bf471997e54e4a75b0d71f492ab295787fdbb14d8c85c4ea8c03f0552dbc3755_amd64",
"9Base-CNV-4.13:container-native-virtualization/cnv-must-gather-rhel9@sha256:9e8efd76924958eb605401abdac08eba97fb83a1ada383bc87a7fb7c87b3a455_arm64",
"9Base-CNV-4.13:container-native-virtualization/cnv-must-gather-rhel9@sha256:b9fc32b5fabedd65a4c3a471879c808af2087277de4278adaa115a732f0468da_amd64",
"9Base-CNV-4.13:container-native-virtualization/hco-bundle-registry-rhel9@sha256:60e89d7a99ff9f20e974430b802dd724a3bb6fa1e01e5a62daad98ac487b3063_amd64",
"9Base-CNV-4.13:container-native-virtualization/hco-bundle-registry-rhel9@sha256:dd20b138045ef1424d83a47e7abcfcbb2ac54577dcec5ed3c186390aaa4c9d84_arm64",
"9Base-CNV-4.13:container-native-virtualization/hostpath-csi-driver-rhel9@sha256:61e2824853d51347593ad909a5e546cd92e4216d6a1df5dffb50dd9cba277cce_amd64",
"9Base-CNV-4.13:container-native-virtualization/hostpath-csi-driver-rhel9@sha256:676d4c23a5f60dd331728af056b0a6b2d3358ac88da23299b1a98dfaca8f288e_arm64",
"9Base-CNV-4.13:container-native-virtualization/hostpath-provisioner-operator-rhel9@sha256:515be94be496c67f5b8fd5f4832fe4385e56476e6589897d6b9fbb9bb2b00f32_amd64",
"9Base-CNV-4.13:container-native-virtualization/hostpath-provisioner-operator-rhel9@sha256:571ae805641dea11646028c946039983c7fd82f138b915dcb8b80c39b465e63c_arm64",
"9Base-CNV-4.13:container-native-virtualization/hostpath-provisioner-rhel9@sha256:ac3fe350bedd6bc43596444ba0f279ccf8a144ab14ac5a9b80ea71c46390b7b4_amd64",
"9Base-CNV-4.13:container-native-virtualization/hostpath-provisioner-rhel9@sha256:d4ed87745b7ee2acca2d83e2c91c2f6dced1903c81495b50f2559b3ba2dde287_arm64",
"9Base-CNV-4.13:container-native-virtualization/hyperconverged-cluster-operator-rhel9@sha256:e5ab9f3be59d3568e3d672ab374efb16990ccf92192eac4e1244b10fcd7423e2_amd64",
"9Base-CNV-4.13:container-native-virtualization/hyperconverged-cluster-operator-rhel9@sha256:e681560b184189df03fc84c8a712f32289f42573dd348cda394b19565eb6eca8_arm64",
"9Base-CNV-4.13:container-native-virtualization/hyperconverged-cluster-webhook-rhel9@sha256:06d036d320b3027bb8370bb8e0f6fe8c9f0ec9bca7aac3b5c53698ba4a170042_arm64",
"9Base-CNV-4.13:container-native-virtualization/hyperconverged-cluster-webhook-rhel9@sha256:b5a01336180aad017df62cf8e652f2491b8263ba7e4dd07f858db1ef1924cf2f_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubemacpool-rhel9@sha256:4d190d81eeb3fbe9ed56cf3548dc83a3f81641bfdafa7b42dcfb0d2512566644_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubemacpool-rhel9@sha256:59862a59854f0d5b83dc25ba119f9586a8aff42b6e60d1922f8ae7b4567309ff_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubesecondarydns-rhel9@sha256:121d30d78cc57731ea2242ef2c32430890ac66c2723e65608d5e2f26c3f515cd_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubesecondarydns-rhel9@sha256:b1838f3c8ba3d8113bddea17b78c21e1c1490e2a4a07ea77014edee523d06347_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-console-plugin-rhel9@sha256:86a4b1e3d6ad1d56302c9c058f8bc5826dcfe6c46fb3e0ddaa06818645039020_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-console-plugin-rhel9@sha256:ffb2acd9ae09c1ef9ca756f5eaf6087d0a3957cfc824543949d25f556a97744d_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-dpdk-checkup-rhel9@sha256:525aceb9396010ebcdba14040f267889b807cd84db8e5b4030429b51f0fbf5fe_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-dpdk-checkup-rhel9@sha256:553c4686f56c66cc1e3c5ad9d4051f139d43f821eac3abb98ca5cdb8b5dfe202_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-ssp-operator-rhel9@sha256:901e6cad9534c7bd7c4018c60bccfe49d7280fba5a9901ab4c4d15e9345288c4_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-ssp-operator-rhel9@sha256:badeb0f65f543b209f6af761729d9778b7b73b97d55044016dfba3f38a1f6f18_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-cleanup-vm-rhel9@sha256:28e4975fa4dac22d9da32ed2a10aed039fd957b30140daa36bab2caa998be77a_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-cleanup-vm-rhel9@sha256:b0ff7e812a576ea848590655fc13a85832d5a39f68e7769ceab9da6949da88c7_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-copy-template-rhel9@sha256:4916a6c6b1f9b529187d3b4d5fc99b90157993767b3fe2ad36a9ec77fbb46b10_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-copy-template-rhel9@sha256:f71c36442f1b61cdde7ec58d2c3c78d2039f6d6108e6c35388ef7c1650971fa1_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-create-datavolume-rhel9@sha256:2ad49cf6e2242a9e5861929d9bcab1305a7fc4e34e708f99cff1d7253aa46167_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-create-datavolume-rhel9@sha256:7112400a4ecb23ee2110bf96372fcf9f96ad648a51aa944627b40eb59539a660_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-create-vm-from-template-rhel9@sha256:1411c65bbad7302710788327f6964a4bf5bc20ef70d5e46f4a5c6e7a0e7a0161_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-create-vm-from-template-rhel9@sha256:4d962618aa95600c60c9fc8b890186e510de91177d51949e12797a3558e31328_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-customize-rhel9@sha256:5c23d3f20ea9dcbe7109284d73078ecd516a070e964b844f8d80b1d92ebd55ee_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-customize-rhel9@sha256:a780244e48c6d4f87446d3754c3eb9ab79c0d54675c189da4a659f7a4d5668ea_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-sysprep-rhel9@sha256:84577d949a1bbcaa291c70729127bca4a8994df03068666baa23840877ea8392_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-sysprep-rhel9@sha256:aed630a597a090179e1b0e0c117e536df06b67d0f793f91936aa7388c0c5d7eb_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-modify-vm-template-rhel9@sha256:31d959b80cf57462e1705684bb7e1b78af26bd2c62f1c9e4e51e1d02199b05a8_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-modify-vm-template-rhel9@sha256:66aea526bc10e4c0136ba86e394bbdfe4fbd7f757d6f391a561b51d2ba2f4d46_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-operator-rhel9@sha256:d0cf0e81589f0938de45961eaddfc5ec4782738fd11082de0439b200534259eb_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-operator-rhel9@sha256:f1b1f5044db6bb945584f9d4f31d020597725a286ef368ed0aca2116abb31beb_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-wait-for-vmi-status-rhel9@sha256:39a15d03f113735df03b1a7408227eb9604d942c1f3c1992bcdc7eaf07662711_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-wait-for-vmi-status-rhel9@sha256:afb68af076954fcd18c7a4a1464ea0c2a766e8282eae980051906ed07eaa1707_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-template-validator-rhel9@sha256:02b22c7e7014b5e72d47fed8b6a268cf307638c5510adf3916c51f7f40a52a08_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-template-validator-rhel9@sha256:c0264b9271e602f85b2040ef7f207cdfa46038dc4fa6e4738bf196ef88a71cf8_amd64",
"9Base-CNV-4.13:container-native-virtualization/libguestfs-tools-rhel9@sha256:29ae84575bbca24553cf649256759fd96ff286971d80bc2db129154a7df9b283_amd64",
"9Base-CNV-4.13:container-native-virtualization/libguestfs-tools-rhel9@sha256:6558f60343e068b032167e2340b2c549c5f0258acc5d2614b60966ce79408b01_arm64",
"9Base-CNV-4.13:container-native-virtualization/multus-dynamic-networks-rhel9@sha256:3ecb0162a4b01d1590bf209d717b32a4f0835910d9979823f18c24acba41b503_arm64",
"9Base-CNV-4.13:container-native-virtualization/multus-dynamic-networks-rhel9@sha256:b7f68b6420009e21380d32d6459193aae45e93be9533debe17cb3108571b36b8_amd64",
"9Base-CNV-4.13:container-native-virtualization/ovs-cni-plugin-rhel9@sha256:0f1d372f418744e0aff59ecb0a38f53178aac9c2e9eecfd38aa25ed83e0d1360_arm64",
"9Base-CNV-4.13:container-native-virtualization/ovs-cni-plugin-rhel9@sha256:e8e7a44edbf1713fe74de5c4b8f691cce78f4440c4a32a16ba9ad16694a55396_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-api-rhel9@sha256:e68416321ca8c74a547b3d35897f54813c03481143e402e9bdc4daf315e35b5d_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-api-rhel9@sha256:fdb4ca1bb8b310d713d9c7e88f7d091f4460aa942dbeca5ebcf17281a06daffe_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-artifacts-server-rhel9@sha256:33d11c1832b49df39c1fca62bad40dbc5c30a452248339aaef449ac99509accb_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-artifacts-server-rhel9@sha256:81fc61b714baecb5a89fa6c0749c14566e0661b8e184ca602fc2e03b9cf431ee_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-apiserver-rhel9@sha256:f6128a63344ed2129f5bce648ddcfaa2869d31cde4b93328d3c22534b97ade10_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-apiserver-rhel9@sha256:feca273a691d09445c6cff6d36b5d590735e867656a9898ce0d89744d98e8006_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-cloner-rhel9@sha256:68e3b9b0291b4fb277ac430269ffce11d13b0a7688cf2ffcdb7f98759c36b4db_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-cloner-rhel9@sha256:6ac212767481bef64d8a7d0252bb8089c0f9751fad4a355aef71bd49dad2ad07_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-controller-rhel9@sha256:65f5263275d9f0a12b8fb057d82adf678778039ec873ca9bde182dea3413c9f1_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-controller-rhel9@sha256:d9e62b2019328be258489ac852eef25f8b1233f29abac6bcea5b406329f97fed_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-importer-rhel9@sha256:00a6d9d24ca1466d450b02269ec3144fc7550f0e5c696e869fbf7ce10cae6093_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-importer-rhel9@sha256:2df07fb21a3575e74aa16ded20129828f2300cd33e8ab369b0362062d49e62d0_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-operator-rhel9@sha256:20ec064750faedd97d11b797c8c1d9a1db5d60d7d76e82e65cfd05eb79d65e29_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-operator-rhel9@sha256:802ee8923d9d8e406b23911406f9748756c0ef4d6954e9e2fd5fb4bdf91dde9a_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-uploadproxy-rhel9@sha256:392d0f61f462c707adfdc21e4239c5c09d8520a80486b41d9d9ae479267d6124_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-uploadproxy-rhel9@sha256:6775f34353eec8f35bead9411dde155530d079bb8d51582fb1f2aacc27dbde1d_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-uploadserver-rhel9@sha256:4528c24672689cfb6505761b6b108fbcc04488192733f23d2bfe39cd42a1d743_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-uploadserver-rhel9@sha256:b22048390387380af94e267c8a9a66813c515997456d59d8ebac1486916b6585_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-controller-rhel9@sha256:3e7880149ee9a68286e390beb3d9779f7403c30fc5136e5370e0e4690a3fd243_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-controller-rhel9@sha256:970edc281d7a731e9f7e8c2d4440fe48a221e5e355d5235c5413b4c3adb28503_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-exportproxy-rhel9@sha256:1bda34d5bff734ad997202f29a5ff6f7362fd79fa90511a422442ef2e3681198_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-exportproxy-rhel9@sha256:de3c4afbf7669b98517cbef2490ec186f0553dd97b05bed80ec36dd883fe507b_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-exportserver-rhel9@sha256:3f7f98645176d42c63cca5c0fc3182a03121af87446ca421b6c72baf07dfca0d_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-exportserver-rhel9@sha256:8f12955cd777eb2409037a6968aa92f50c99d6e07e722951dbcfd0c8c9829b5e_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-handler-rhel9@sha256:5fc47110d866d8048aec50689090ce10705d19d3bb48d2b06727d6d569003af7_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-handler-rhel9@sha256:84ba79ae9658699147d2493df2582ab6df10adbff4d44a533c3fe6a9f45f9691_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-launcher-rhel9@sha256:4990d40d9987d5126d105dd45be2501eaded248cb61bdde5ea8d359bc1e7ebef_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-launcher-rhel9@sha256:95aeacb98209e0baef27ce0e02fbac38d693cea74808fc77107efda0f344bcb5_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-operator-rhel9@sha256:5c1a7e4ed2061938987b900a2394f07121d4037350c9bb6485213a2adfea787d_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-operator-rhel9@sha256:66b1b3b379121d6411ba22283e7d991617177330c93746d37753ab7812b9a00b_arm64",
"9Base-CNV-4.13:container-native-virtualization/virtio-win-rhel9@sha256:8735f51da918408a8826601c082d1b29accf26d59b9978da89b980cb509c1102_arm64",
"9Base-CNV-4.13:container-native-virtualization/virtio-win-rhel9@sha256:d147d2a6eb6f907d1e88f61aaca83596853bc72164583d6dda2b1154b490de25_amd64",
"9Base-CNV-4.13:container-native-virtualization/vm-console-proxy-rhel9@sha256:70a8d0cd66182c25e02679540bae1368b2a9cf687532b58dba41ef30c5ca00c1_arm64",
"9Base-CNV-4.13:container-native-virtualization/vm-console-proxy-rhel9@sha256:7ca921f98f6d81a126907127a611146fb53397869a628678faa1e289c01d22b2_amd64",
"9Base-CNV-4.13:container-native-virtualization/vm-network-latency-checkup-rhel9@sha256:503ea7ac914a9b54e9d665a0227ee0b5d5200cdb5d692aa94c07dd1518d91b70_arm64",
"9Base-CNV-4.13:container-native-virtualization/vm-network-latency-checkup-rhel9@sha256:59fd965975bccf641a0fa7aa01374d45057bd03cda7528248a84b60b1205bf57_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"9Base-CNV-4.13:container-native-virtualization/bridge-marker-rhel9@sha256:8eac196b30a648989cdca5cb153a3bc3d34e47339acba0e4f760bd366496c99d_amd64",
"9Base-CNV-4.13:container-native-virtualization/bridge-marker-rhel9@sha256:e8a55aee3d75a316bb0d7a554c737198823df04b3c05e481c17e45eb2153bced_arm64",
"9Base-CNV-4.13:container-native-virtualization/cluster-network-addons-operator-rhel9@sha256:3bff33e3f40cd1e2b519c2db56734d4bb8df883e155c2f20b1cb9d3d184daec1_amd64",
"9Base-CNV-4.13:container-native-virtualization/cluster-network-addons-operator-rhel9@sha256:f439d2f420bb59eb1d5af14ce2002648d0cfc155d1a1466c8aac9b661fe902b8_arm64",
"9Base-CNV-4.13:container-native-virtualization/cnv-containernetworking-plugins-rhel9@sha256:89f22e541f61a660c9aa9f38ef58e80b84a0517f74e84292107fc252c25465c9_arm64",
"9Base-CNV-4.13:container-native-virtualization/cnv-containernetworking-plugins-rhel9@sha256:bf471997e54e4a75b0d71f492ab295787fdbb14d8c85c4ea8c03f0552dbc3755_amd64",
"9Base-CNV-4.13:container-native-virtualization/cnv-must-gather-rhel9@sha256:9e8efd76924958eb605401abdac08eba97fb83a1ada383bc87a7fb7c87b3a455_arm64",
"9Base-CNV-4.13:container-native-virtualization/cnv-must-gather-rhel9@sha256:b9fc32b5fabedd65a4c3a471879c808af2087277de4278adaa115a732f0468da_amd64",
"9Base-CNV-4.13:container-native-virtualization/hco-bundle-registry-rhel9@sha256:60e89d7a99ff9f20e974430b802dd724a3bb6fa1e01e5a62daad98ac487b3063_amd64",
"9Base-CNV-4.13:container-native-virtualization/hco-bundle-registry-rhel9@sha256:dd20b138045ef1424d83a47e7abcfcbb2ac54577dcec5ed3c186390aaa4c9d84_arm64",
"9Base-CNV-4.13:container-native-virtualization/hostpath-csi-driver-rhel9@sha256:61e2824853d51347593ad909a5e546cd92e4216d6a1df5dffb50dd9cba277cce_amd64",
"9Base-CNV-4.13:container-native-virtualization/hostpath-csi-driver-rhel9@sha256:676d4c23a5f60dd331728af056b0a6b2d3358ac88da23299b1a98dfaca8f288e_arm64",
"9Base-CNV-4.13:container-native-virtualization/hostpath-provisioner-operator-rhel9@sha256:515be94be496c67f5b8fd5f4832fe4385e56476e6589897d6b9fbb9bb2b00f32_amd64",
"9Base-CNV-4.13:container-native-virtualization/hostpath-provisioner-operator-rhel9@sha256:571ae805641dea11646028c946039983c7fd82f138b915dcb8b80c39b465e63c_arm64",
"9Base-CNV-4.13:container-native-virtualization/hostpath-provisioner-rhel9@sha256:ac3fe350bedd6bc43596444ba0f279ccf8a144ab14ac5a9b80ea71c46390b7b4_amd64",
"9Base-CNV-4.13:container-native-virtualization/hostpath-provisioner-rhel9@sha256:d4ed87745b7ee2acca2d83e2c91c2f6dced1903c81495b50f2559b3ba2dde287_arm64",
"9Base-CNV-4.13:container-native-virtualization/hyperconverged-cluster-operator-rhel9@sha256:e5ab9f3be59d3568e3d672ab374efb16990ccf92192eac4e1244b10fcd7423e2_amd64",
"9Base-CNV-4.13:container-native-virtualization/hyperconverged-cluster-operator-rhel9@sha256:e681560b184189df03fc84c8a712f32289f42573dd348cda394b19565eb6eca8_arm64",
"9Base-CNV-4.13:container-native-virtualization/hyperconverged-cluster-webhook-rhel9@sha256:06d036d320b3027bb8370bb8e0f6fe8c9f0ec9bca7aac3b5c53698ba4a170042_arm64",
"9Base-CNV-4.13:container-native-virtualization/hyperconverged-cluster-webhook-rhel9@sha256:b5a01336180aad017df62cf8e652f2491b8263ba7e4dd07f858db1ef1924cf2f_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubemacpool-rhel9@sha256:4d190d81eeb3fbe9ed56cf3548dc83a3f81641bfdafa7b42dcfb0d2512566644_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubemacpool-rhel9@sha256:59862a59854f0d5b83dc25ba119f9586a8aff42b6e60d1922f8ae7b4567309ff_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubesecondarydns-rhel9@sha256:121d30d78cc57731ea2242ef2c32430890ac66c2723e65608d5e2f26c3f515cd_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubesecondarydns-rhel9@sha256:b1838f3c8ba3d8113bddea17b78c21e1c1490e2a4a07ea77014edee523d06347_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-console-plugin-rhel9@sha256:86a4b1e3d6ad1d56302c9c058f8bc5826dcfe6c46fb3e0ddaa06818645039020_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-console-plugin-rhel9@sha256:ffb2acd9ae09c1ef9ca756f5eaf6087d0a3957cfc824543949d25f556a97744d_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-dpdk-checkup-rhel9@sha256:525aceb9396010ebcdba14040f267889b807cd84db8e5b4030429b51f0fbf5fe_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-dpdk-checkup-rhel9@sha256:553c4686f56c66cc1e3c5ad9d4051f139d43f821eac3abb98ca5cdb8b5dfe202_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-ssp-operator-rhel9@sha256:901e6cad9534c7bd7c4018c60bccfe49d7280fba5a9901ab4c4d15e9345288c4_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-ssp-operator-rhel9@sha256:badeb0f65f543b209f6af761729d9778b7b73b97d55044016dfba3f38a1f6f18_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-cleanup-vm-rhel9@sha256:28e4975fa4dac22d9da32ed2a10aed039fd957b30140daa36bab2caa998be77a_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-cleanup-vm-rhel9@sha256:b0ff7e812a576ea848590655fc13a85832d5a39f68e7769ceab9da6949da88c7_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-copy-template-rhel9@sha256:4916a6c6b1f9b529187d3b4d5fc99b90157993767b3fe2ad36a9ec77fbb46b10_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-copy-template-rhel9@sha256:f71c36442f1b61cdde7ec58d2c3c78d2039f6d6108e6c35388ef7c1650971fa1_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-create-datavolume-rhel9@sha256:2ad49cf6e2242a9e5861929d9bcab1305a7fc4e34e708f99cff1d7253aa46167_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-create-datavolume-rhel9@sha256:7112400a4ecb23ee2110bf96372fcf9f96ad648a51aa944627b40eb59539a660_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-create-vm-from-template-rhel9@sha256:1411c65bbad7302710788327f6964a4bf5bc20ef70d5e46f4a5c6e7a0e7a0161_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-create-vm-from-template-rhel9@sha256:4d962618aa95600c60c9fc8b890186e510de91177d51949e12797a3558e31328_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-customize-rhel9@sha256:5c23d3f20ea9dcbe7109284d73078ecd516a070e964b844f8d80b1d92ebd55ee_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-customize-rhel9@sha256:a780244e48c6d4f87446d3754c3eb9ab79c0d54675c189da4a659f7a4d5668ea_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-sysprep-rhel9@sha256:84577d949a1bbcaa291c70729127bca4a8994df03068666baa23840877ea8392_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-sysprep-rhel9@sha256:aed630a597a090179e1b0e0c117e536df06b67d0f793f91936aa7388c0c5d7eb_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-modify-vm-template-rhel9@sha256:31d959b80cf57462e1705684bb7e1b78af26bd2c62f1c9e4e51e1d02199b05a8_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-modify-vm-template-rhel9@sha256:66aea526bc10e4c0136ba86e394bbdfe4fbd7f757d6f391a561b51d2ba2f4d46_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-operator-rhel9@sha256:d0cf0e81589f0938de45961eaddfc5ec4782738fd11082de0439b200534259eb_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-operator-rhel9@sha256:f1b1f5044db6bb945584f9d4f31d020597725a286ef368ed0aca2116abb31beb_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-wait-for-vmi-status-rhel9@sha256:39a15d03f113735df03b1a7408227eb9604d942c1f3c1992bcdc7eaf07662711_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-wait-for-vmi-status-rhel9@sha256:afb68af076954fcd18c7a4a1464ea0c2a766e8282eae980051906ed07eaa1707_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-template-validator-rhel9@sha256:02b22c7e7014b5e72d47fed8b6a268cf307638c5510adf3916c51f7f40a52a08_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-template-validator-rhel9@sha256:c0264b9271e602f85b2040ef7f207cdfa46038dc4fa6e4738bf196ef88a71cf8_amd64",
"9Base-CNV-4.13:container-native-virtualization/libguestfs-tools-rhel9@sha256:29ae84575bbca24553cf649256759fd96ff286971d80bc2db129154a7df9b283_amd64",
"9Base-CNV-4.13:container-native-virtualization/libguestfs-tools-rhel9@sha256:6558f60343e068b032167e2340b2c549c5f0258acc5d2614b60966ce79408b01_arm64",
"9Base-CNV-4.13:container-native-virtualization/multus-dynamic-networks-rhel9@sha256:3ecb0162a4b01d1590bf209d717b32a4f0835910d9979823f18c24acba41b503_arm64",
"9Base-CNV-4.13:container-native-virtualization/multus-dynamic-networks-rhel9@sha256:b7f68b6420009e21380d32d6459193aae45e93be9533debe17cb3108571b36b8_amd64",
"9Base-CNV-4.13:container-native-virtualization/ovs-cni-plugin-rhel9@sha256:0f1d372f418744e0aff59ecb0a38f53178aac9c2e9eecfd38aa25ed83e0d1360_arm64",
"9Base-CNV-4.13:container-native-virtualization/ovs-cni-plugin-rhel9@sha256:e8e7a44edbf1713fe74de5c4b8f691cce78f4440c4a32a16ba9ad16694a55396_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-api-rhel9@sha256:e68416321ca8c74a547b3d35897f54813c03481143e402e9bdc4daf315e35b5d_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-api-rhel9@sha256:fdb4ca1bb8b310d713d9c7e88f7d091f4460aa942dbeca5ebcf17281a06daffe_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-artifacts-server-rhel9@sha256:33d11c1832b49df39c1fca62bad40dbc5c30a452248339aaef449ac99509accb_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-artifacts-server-rhel9@sha256:81fc61b714baecb5a89fa6c0749c14566e0661b8e184ca602fc2e03b9cf431ee_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-apiserver-rhel9@sha256:f6128a63344ed2129f5bce648ddcfaa2869d31cde4b93328d3c22534b97ade10_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-apiserver-rhel9@sha256:feca273a691d09445c6cff6d36b5d590735e867656a9898ce0d89744d98e8006_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-cloner-rhel9@sha256:68e3b9b0291b4fb277ac430269ffce11d13b0a7688cf2ffcdb7f98759c36b4db_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-cloner-rhel9@sha256:6ac212767481bef64d8a7d0252bb8089c0f9751fad4a355aef71bd49dad2ad07_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-controller-rhel9@sha256:65f5263275d9f0a12b8fb057d82adf678778039ec873ca9bde182dea3413c9f1_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-controller-rhel9@sha256:d9e62b2019328be258489ac852eef25f8b1233f29abac6bcea5b406329f97fed_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-importer-rhel9@sha256:00a6d9d24ca1466d450b02269ec3144fc7550f0e5c696e869fbf7ce10cae6093_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-importer-rhel9@sha256:2df07fb21a3575e74aa16ded20129828f2300cd33e8ab369b0362062d49e62d0_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-operator-rhel9@sha256:20ec064750faedd97d11b797c8c1d9a1db5d60d7d76e82e65cfd05eb79d65e29_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-operator-rhel9@sha256:802ee8923d9d8e406b23911406f9748756c0ef4d6954e9e2fd5fb4bdf91dde9a_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-uploadproxy-rhel9@sha256:392d0f61f462c707adfdc21e4239c5c09d8520a80486b41d9d9ae479267d6124_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-uploadproxy-rhel9@sha256:6775f34353eec8f35bead9411dde155530d079bb8d51582fb1f2aacc27dbde1d_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-uploadserver-rhel9@sha256:4528c24672689cfb6505761b6b108fbcc04488192733f23d2bfe39cd42a1d743_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-uploadserver-rhel9@sha256:b22048390387380af94e267c8a9a66813c515997456d59d8ebac1486916b6585_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-controller-rhel9@sha256:3e7880149ee9a68286e390beb3d9779f7403c30fc5136e5370e0e4690a3fd243_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-controller-rhel9@sha256:970edc281d7a731e9f7e8c2d4440fe48a221e5e355d5235c5413b4c3adb28503_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-exportproxy-rhel9@sha256:1bda34d5bff734ad997202f29a5ff6f7362fd79fa90511a422442ef2e3681198_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-exportproxy-rhel9@sha256:de3c4afbf7669b98517cbef2490ec186f0553dd97b05bed80ec36dd883fe507b_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-exportserver-rhel9@sha256:3f7f98645176d42c63cca5c0fc3182a03121af87446ca421b6c72baf07dfca0d_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-exportserver-rhel9@sha256:8f12955cd777eb2409037a6968aa92f50c99d6e07e722951dbcfd0c8c9829b5e_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-handler-rhel9@sha256:5fc47110d866d8048aec50689090ce10705d19d3bb48d2b06727d6d569003af7_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-handler-rhel9@sha256:84ba79ae9658699147d2493df2582ab6df10adbff4d44a533c3fe6a9f45f9691_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-launcher-rhel9@sha256:4990d40d9987d5126d105dd45be2501eaded248cb61bdde5ea8d359bc1e7ebef_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-launcher-rhel9@sha256:95aeacb98209e0baef27ce0e02fbac38d693cea74808fc77107efda0f344bcb5_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-operator-rhel9@sha256:5c1a7e4ed2061938987b900a2394f07121d4037350c9bb6485213a2adfea787d_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-operator-rhel9@sha256:66b1b3b379121d6411ba22283e7d991617177330c93746d37753ab7812b9a00b_arm64",
"9Base-CNV-4.13:container-native-virtualization/virtio-win-rhel9@sha256:8735f51da918408a8826601c082d1b29accf26d59b9978da89b980cb509c1102_arm64",
"9Base-CNV-4.13:container-native-virtualization/virtio-win-rhel9@sha256:d147d2a6eb6f907d1e88f61aaca83596853bc72164583d6dda2b1154b490de25_amd64",
"9Base-CNV-4.13:container-native-virtualization/vm-console-proxy-rhel9@sha256:70a8d0cd66182c25e02679540bae1368b2a9cf687532b58dba41ef30c5ca00c1_arm64",
"9Base-CNV-4.13:container-native-virtualization/vm-console-proxy-rhel9@sha256:7ca921f98f6d81a126907127a611146fb53397869a628678faa1e289c01d22b2_amd64",
"9Base-CNV-4.13:container-native-virtualization/vm-network-latency-checkup-rhel9@sha256:503ea7ac914a9b54e9d665a0227ee0b5d5200cdb5d692aa94c07dd1518d91b70_arm64",
"9Base-CNV-4.13:container-native-virtualization/vm-network-latency-checkup-rhel9@sha256:59fd965975bccf641a0fa7aa01374d45057bd03cda7528248a84b60b1205bf57_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "golang: math/big: decoding big.Float and big.Rat types can panic if the encoded message is too short, potentially allowing a denial of service"
},
{
"cve": "CVE-2022-32190",
"cwe": {
"id": "CWE-22",
"name": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)"
},
"discovery_date": "2022-09-06T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"9Base-CNV-4.13:container-native-virtualization/bridge-marker-rhel9@sha256:8eac196b30a648989cdca5cb153a3bc3d34e47339acba0e4f760bd366496c99d_amd64",
"9Base-CNV-4.13:container-native-virtualization/bridge-marker-rhel9@sha256:e8a55aee3d75a316bb0d7a554c737198823df04b3c05e481c17e45eb2153bced_arm64",
"9Base-CNV-4.13:container-native-virtualization/cluster-network-addons-operator-rhel9@sha256:3bff33e3f40cd1e2b519c2db56734d4bb8df883e155c2f20b1cb9d3d184daec1_amd64",
"9Base-CNV-4.13:container-native-virtualization/cluster-network-addons-operator-rhel9@sha256:f439d2f420bb59eb1d5af14ce2002648d0cfc155d1a1466c8aac9b661fe902b8_arm64",
"9Base-CNV-4.13:container-native-virtualization/cnv-containernetworking-plugins-rhel9@sha256:89f22e541f61a660c9aa9f38ef58e80b84a0517f74e84292107fc252c25465c9_arm64",
"9Base-CNV-4.13:container-native-virtualization/cnv-containernetworking-plugins-rhel9@sha256:bf471997e54e4a75b0d71f492ab295787fdbb14d8c85c4ea8c03f0552dbc3755_amd64",
"9Base-CNV-4.13:container-native-virtualization/cnv-must-gather-rhel9@sha256:9e8efd76924958eb605401abdac08eba97fb83a1ada383bc87a7fb7c87b3a455_arm64",
"9Base-CNV-4.13:container-native-virtualization/cnv-must-gather-rhel9@sha256:b9fc32b5fabedd65a4c3a471879c808af2087277de4278adaa115a732f0468da_amd64",
"9Base-CNV-4.13:container-native-virtualization/hco-bundle-registry-rhel9@sha256:60e89d7a99ff9f20e974430b802dd724a3bb6fa1e01e5a62daad98ac487b3063_amd64",
"9Base-CNV-4.13:container-native-virtualization/hco-bundle-registry-rhel9@sha256:dd20b138045ef1424d83a47e7abcfcbb2ac54577dcec5ed3c186390aaa4c9d84_arm64",
"9Base-CNV-4.13:container-native-virtualization/hostpath-csi-driver-rhel9@sha256:61e2824853d51347593ad909a5e546cd92e4216d6a1df5dffb50dd9cba277cce_amd64",
"9Base-CNV-4.13:container-native-virtualization/hostpath-csi-driver-rhel9@sha256:676d4c23a5f60dd331728af056b0a6b2d3358ac88da23299b1a98dfaca8f288e_arm64",
"9Base-CNV-4.13:container-native-virtualization/hostpath-provisioner-operator-rhel9@sha256:515be94be496c67f5b8fd5f4832fe4385e56476e6589897d6b9fbb9bb2b00f32_amd64",
"9Base-CNV-4.13:container-native-virtualization/hostpath-provisioner-operator-rhel9@sha256:571ae805641dea11646028c946039983c7fd82f138b915dcb8b80c39b465e63c_arm64",
"9Base-CNV-4.13:container-native-virtualization/hostpath-provisioner-rhel9@sha256:ac3fe350bedd6bc43596444ba0f279ccf8a144ab14ac5a9b80ea71c46390b7b4_amd64",
"9Base-CNV-4.13:container-native-virtualization/hostpath-provisioner-rhel9@sha256:d4ed87745b7ee2acca2d83e2c91c2f6dced1903c81495b50f2559b3ba2dde287_arm64",
"9Base-CNV-4.13:container-native-virtualization/hyperconverged-cluster-operator-rhel9@sha256:e5ab9f3be59d3568e3d672ab374efb16990ccf92192eac4e1244b10fcd7423e2_amd64",
"9Base-CNV-4.13:container-native-virtualization/hyperconverged-cluster-operator-rhel9@sha256:e681560b184189df03fc84c8a712f32289f42573dd348cda394b19565eb6eca8_arm64",
"9Base-CNV-4.13:container-native-virtualization/hyperconverged-cluster-webhook-rhel9@sha256:06d036d320b3027bb8370bb8e0f6fe8c9f0ec9bca7aac3b5c53698ba4a170042_arm64",
"9Base-CNV-4.13:container-native-virtualization/hyperconverged-cluster-webhook-rhel9@sha256:b5a01336180aad017df62cf8e652f2491b8263ba7e4dd07f858db1ef1924cf2f_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubemacpool-rhel9@sha256:4d190d81eeb3fbe9ed56cf3548dc83a3f81641bfdafa7b42dcfb0d2512566644_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubemacpool-rhel9@sha256:59862a59854f0d5b83dc25ba119f9586a8aff42b6e60d1922f8ae7b4567309ff_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubesecondarydns-rhel9@sha256:121d30d78cc57731ea2242ef2c32430890ac66c2723e65608d5e2f26c3f515cd_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubesecondarydns-rhel9@sha256:b1838f3c8ba3d8113bddea17b78c21e1c1490e2a4a07ea77014edee523d06347_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-console-plugin-rhel9@sha256:86a4b1e3d6ad1d56302c9c058f8bc5826dcfe6c46fb3e0ddaa06818645039020_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-console-plugin-rhel9@sha256:ffb2acd9ae09c1ef9ca756f5eaf6087d0a3957cfc824543949d25f556a97744d_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-dpdk-checkup-rhel9@sha256:525aceb9396010ebcdba14040f267889b807cd84db8e5b4030429b51f0fbf5fe_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-dpdk-checkup-rhel9@sha256:553c4686f56c66cc1e3c5ad9d4051f139d43f821eac3abb98ca5cdb8b5dfe202_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-ssp-operator-rhel9@sha256:901e6cad9534c7bd7c4018c60bccfe49d7280fba5a9901ab4c4d15e9345288c4_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-ssp-operator-rhel9@sha256:badeb0f65f543b209f6af761729d9778b7b73b97d55044016dfba3f38a1f6f18_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-cleanup-vm-rhel9@sha256:28e4975fa4dac22d9da32ed2a10aed039fd957b30140daa36bab2caa998be77a_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-cleanup-vm-rhel9@sha256:b0ff7e812a576ea848590655fc13a85832d5a39f68e7769ceab9da6949da88c7_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-copy-template-rhel9@sha256:4916a6c6b1f9b529187d3b4d5fc99b90157993767b3fe2ad36a9ec77fbb46b10_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-copy-template-rhel9@sha256:f71c36442f1b61cdde7ec58d2c3c78d2039f6d6108e6c35388ef7c1650971fa1_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-create-datavolume-rhel9@sha256:2ad49cf6e2242a9e5861929d9bcab1305a7fc4e34e708f99cff1d7253aa46167_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-create-datavolume-rhel9@sha256:7112400a4ecb23ee2110bf96372fcf9f96ad648a51aa944627b40eb59539a660_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-create-vm-from-template-rhel9@sha256:1411c65bbad7302710788327f6964a4bf5bc20ef70d5e46f4a5c6e7a0e7a0161_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-create-vm-from-template-rhel9@sha256:4d962618aa95600c60c9fc8b890186e510de91177d51949e12797a3558e31328_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-customize-rhel9@sha256:5c23d3f20ea9dcbe7109284d73078ecd516a070e964b844f8d80b1d92ebd55ee_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-customize-rhel9@sha256:a780244e48c6d4f87446d3754c3eb9ab79c0d54675c189da4a659f7a4d5668ea_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-sysprep-rhel9@sha256:84577d949a1bbcaa291c70729127bca4a8994df03068666baa23840877ea8392_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-sysprep-rhel9@sha256:aed630a597a090179e1b0e0c117e536df06b67d0f793f91936aa7388c0c5d7eb_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-modify-vm-template-rhel9@sha256:31d959b80cf57462e1705684bb7e1b78af26bd2c62f1c9e4e51e1d02199b05a8_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-modify-vm-template-rhel9@sha256:66aea526bc10e4c0136ba86e394bbdfe4fbd7f757d6f391a561b51d2ba2f4d46_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-operator-rhel9@sha256:d0cf0e81589f0938de45961eaddfc5ec4782738fd11082de0439b200534259eb_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-operator-rhel9@sha256:f1b1f5044db6bb945584f9d4f31d020597725a286ef368ed0aca2116abb31beb_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-wait-for-vmi-status-rhel9@sha256:39a15d03f113735df03b1a7408227eb9604d942c1f3c1992bcdc7eaf07662711_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-wait-for-vmi-status-rhel9@sha256:afb68af076954fcd18c7a4a1464ea0c2a766e8282eae980051906ed07eaa1707_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-template-validator-rhel9@sha256:02b22c7e7014b5e72d47fed8b6a268cf307638c5510adf3916c51f7f40a52a08_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-template-validator-rhel9@sha256:c0264b9271e602f85b2040ef7f207cdfa46038dc4fa6e4738bf196ef88a71cf8_amd64",
"9Base-CNV-4.13:container-native-virtualization/libguestfs-tools-rhel9@sha256:29ae84575bbca24553cf649256759fd96ff286971d80bc2db129154a7df9b283_amd64",
"9Base-CNV-4.13:container-native-virtualization/libguestfs-tools-rhel9@sha256:6558f60343e068b032167e2340b2c549c5f0258acc5d2614b60966ce79408b01_arm64",
"9Base-CNV-4.13:container-native-virtualization/multus-dynamic-networks-rhel9@sha256:3ecb0162a4b01d1590bf209d717b32a4f0835910d9979823f18c24acba41b503_arm64",
"9Base-CNV-4.13:container-native-virtualization/multus-dynamic-networks-rhel9@sha256:b7f68b6420009e21380d32d6459193aae45e93be9533debe17cb3108571b36b8_amd64",
"9Base-CNV-4.13:container-native-virtualization/ovs-cni-plugin-rhel9@sha256:0f1d372f418744e0aff59ecb0a38f53178aac9c2e9eecfd38aa25ed83e0d1360_arm64",
"9Base-CNV-4.13:container-native-virtualization/ovs-cni-plugin-rhel9@sha256:e8e7a44edbf1713fe74de5c4b8f691cce78f4440c4a32a16ba9ad16694a55396_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-artifacts-server-rhel9@sha256:33d11c1832b49df39c1fca62bad40dbc5c30a452248339aaef449ac99509accb_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-artifacts-server-rhel9@sha256:81fc61b714baecb5a89fa6c0749c14566e0661b8e184ca602fc2e03b9cf431ee_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-apiserver-rhel9@sha256:f6128a63344ed2129f5bce648ddcfaa2869d31cde4b93328d3c22534b97ade10_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-apiserver-rhel9@sha256:feca273a691d09445c6cff6d36b5d590735e867656a9898ce0d89744d98e8006_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-cloner-rhel9@sha256:68e3b9b0291b4fb277ac430269ffce11d13b0a7688cf2ffcdb7f98759c36b4db_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-cloner-rhel9@sha256:6ac212767481bef64d8a7d0252bb8089c0f9751fad4a355aef71bd49dad2ad07_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-controller-rhel9@sha256:65f5263275d9f0a12b8fb057d82adf678778039ec873ca9bde182dea3413c9f1_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-controller-rhel9@sha256:d9e62b2019328be258489ac852eef25f8b1233f29abac6bcea5b406329f97fed_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-importer-rhel9@sha256:00a6d9d24ca1466d450b02269ec3144fc7550f0e5c696e869fbf7ce10cae6093_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-importer-rhel9@sha256:2df07fb21a3575e74aa16ded20129828f2300cd33e8ab369b0362062d49e62d0_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-operator-rhel9@sha256:20ec064750faedd97d11b797c8c1d9a1db5d60d7d76e82e65cfd05eb79d65e29_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-operator-rhel9@sha256:802ee8923d9d8e406b23911406f9748756c0ef4d6954e9e2fd5fb4bdf91dde9a_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-uploadproxy-rhel9@sha256:392d0f61f462c707adfdc21e4239c5c09d8520a80486b41d9d9ae479267d6124_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-uploadproxy-rhel9@sha256:6775f34353eec8f35bead9411dde155530d079bb8d51582fb1f2aacc27dbde1d_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-uploadserver-rhel9@sha256:4528c24672689cfb6505761b6b108fbcc04488192733f23d2bfe39cd42a1d743_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-uploadserver-rhel9@sha256:b22048390387380af94e267c8a9a66813c515997456d59d8ebac1486916b6585_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-controller-rhel9@sha256:3e7880149ee9a68286e390beb3d9779f7403c30fc5136e5370e0e4690a3fd243_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-controller-rhel9@sha256:970edc281d7a731e9f7e8c2d4440fe48a221e5e355d5235c5413b4c3adb28503_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-exportproxy-rhel9@sha256:1bda34d5bff734ad997202f29a5ff6f7362fd79fa90511a422442ef2e3681198_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-exportproxy-rhel9@sha256:de3c4afbf7669b98517cbef2490ec186f0553dd97b05bed80ec36dd883fe507b_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-exportserver-rhel9@sha256:3f7f98645176d42c63cca5c0fc3182a03121af87446ca421b6c72baf07dfca0d_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-exportserver-rhel9@sha256:8f12955cd777eb2409037a6968aa92f50c99d6e07e722951dbcfd0c8c9829b5e_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-handler-rhel9@sha256:5fc47110d866d8048aec50689090ce10705d19d3bb48d2b06727d6d569003af7_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-handler-rhel9@sha256:84ba79ae9658699147d2493df2582ab6df10adbff4d44a533c3fe6a9f45f9691_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-launcher-rhel9@sha256:4990d40d9987d5126d105dd45be2501eaded248cb61bdde5ea8d359bc1e7ebef_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-launcher-rhel9@sha256:95aeacb98209e0baef27ce0e02fbac38d693cea74808fc77107efda0f344bcb5_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-operator-rhel9@sha256:5c1a7e4ed2061938987b900a2394f07121d4037350c9bb6485213a2adfea787d_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-operator-rhel9@sha256:66b1b3b379121d6411ba22283e7d991617177330c93746d37753ab7812b9a00b_arm64",
"9Base-CNV-4.13:container-native-virtualization/virtio-win-rhel9@sha256:8735f51da918408a8826601c082d1b29accf26d59b9978da89b980cb509c1102_arm64",
"9Base-CNV-4.13:container-native-virtualization/virtio-win-rhel9@sha256:d147d2a6eb6f907d1e88f61aaca83596853bc72164583d6dda2b1154b490de25_amd64",
"9Base-CNV-4.13:container-native-virtualization/vm-console-proxy-rhel9@sha256:70a8d0cd66182c25e02679540bae1368b2a9cf687532b58dba41ef30c5ca00c1_arm64",
"9Base-CNV-4.13:container-native-virtualization/vm-console-proxy-rhel9@sha256:7ca921f98f6d81a126907127a611146fb53397869a628678faa1e289c01d22b2_amd64",
"9Base-CNV-4.13:container-native-virtualization/vm-network-latency-checkup-rhel9@sha256:503ea7ac914a9b54e9d665a0227ee0b5d5200cdb5d692aa94c07dd1518d91b70_arm64",
"9Base-CNV-4.13:container-native-virtualization/vm-network-latency-checkup-rhel9@sha256:59fd965975bccf641a0fa7aa01374d45057bd03cda7528248a84b60b1205bf57_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2124668"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the golang package. The JoinPath doesn\u0027t remove the ../ path components appended to a domain that is not terminated by a slash, possibly leading to a directory traversal attack.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: net/url: JoinPath does not strip relative path components in all circumstances",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The vulnerable functions, JoinPath and URL.JoinPath was introduced in upstream go1.19, whereas, RHEL ships go1.17 and go1.18 versions, which does not contain the vulnerable code. Hence, packages shipped with RHEL-8, RHEL-9 are not affected.\n\nAll Y stream releases of OpenShift Container Platform 4 run on RHEL-8 or RHEL-9, so OCP 4 is also not affected.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"9Base-CNV-4.13:container-native-virtualization/virt-api-rhel9@sha256:e68416321ca8c74a547b3d35897f54813c03481143e402e9bdc4daf315e35b5d_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-api-rhel9@sha256:fdb4ca1bb8b310d713d9c7e88f7d091f4460aa942dbeca5ebcf17281a06daffe_amd64"
],
"known_not_affected": [
"9Base-CNV-4.13:container-native-virtualization/bridge-marker-rhel9@sha256:8eac196b30a648989cdca5cb153a3bc3d34e47339acba0e4f760bd366496c99d_amd64",
"9Base-CNV-4.13:container-native-virtualization/bridge-marker-rhel9@sha256:e8a55aee3d75a316bb0d7a554c737198823df04b3c05e481c17e45eb2153bced_arm64",
"9Base-CNV-4.13:container-native-virtualization/cluster-network-addons-operator-rhel9@sha256:3bff33e3f40cd1e2b519c2db56734d4bb8df883e155c2f20b1cb9d3d184daec1_amd64",
"9Base-CNV-4.13:container-native-virtualization/cluster-network-addons-operator-rhel9@sha256:f439d2f420bb59eb1d5af14ce2002648d0cfc155d1a1466c8aac9b661fe902b8_arm64",
"9Base-CNV-4.13:container-native-virtualization/cnv-containernetworking-plugins-rhel9@sha256:89f22e541f61a660c9aa9f38ef58e80b84a0517f74e84292107fc252c25465c9_arm64",
"9Base-CNV-4.13:container-native-virtualization/cnv-containernetworking-plugins-rhel9@sha256:bf471997e54e4a75b0d71f492ab295787fdbb14d8c85c4ea8c03f0552dbc3755_amd64",
"9Base-CNV-4.13:container-native-virtualization/cnv-must-gather-rhel9@sha256:9e8efd76924958eb605401abdac08eba97fb83a1ada383bc87a7fb7c87b3a455_arm64",
"9Base-CNV-4.13:container-native-virtualization/cnv-must-gather-rhel9@sha256:b9fc32b5fabedd65a4c3a471879c808af2087277de4278adaa115a732f0468da_amd64",
"9Base-CNV-4.13:container-native-virtualization/hco-bundle-registry-rhel9@sha256:60e89d7a99ff9f20e974430b802dd724a3bb6fa1e01e5a62daad98ac487b3063_amd64",
"9Base-CNV-4.13:container-native-virtualization/hco-bundle-registry-rhel9@sha256:dd20b138045ef1424d83a47e7abcfcbb2ac54577dcec5ed3c186390aaa4c9d84_arm64",
"9Base-CNV-4.13:container-native-virtualization/hostpath-csi-driver-rhel9@sha256:61e2824853d51347593ad909a5e546cd92e4216d6a1df5dffb50dd9cba277cce_amd64",
"9Base-CNV-4.13:container-native-virtualization/hostpath-csi-driver-rhel9@sha256:676d4c23a5f60dd331728af056b0a6b2d3358ac88da23299b1a98dfaca8f288e_arm64",
"9Base-CNV-4.13:container-native-virtualization/hostpath-provisioner-operator-rhel9@sha256:515be94be496c67f5b8fd5f4832fe4385e56476e6589897d6b9fbb9bb2b00f32_amd64",
"9Base-CNV-4.13:container-native-virtualization/hostpath-provisioner-operator-rhel9@sha256:571ae805641dea11646028c946039983c7fd82f138b915dcb8b80c39b465e63c_arm64",
"9Base-CNV-4.13:container-native-virtualization/hostpath-provisioner-rhel9@sha256:ac3fe350bedd6bc43596444ba0f279ccf8a144ab14ac5a9b80ea71c46390b7b4_amd64",
"9Base-CNV-4.13:container-native-virtualization/hostpath-provisioner-rhel9@sha256:d4ed87745b7ee2acca2d83e2c91c2f6dced1903c81495b50f2559b3ba2dde287_arm64",
"9Base-CNV-4.13:container-native-virtualization/hyperconverged-cluster-operator-rhel9@sha256:e5ab9f3be59d3568e3d672ab374efb16990ccf92192eac4e1244b10fcd7423e2_amd64",
"9Base-CNV-4.13:container-native-virtualization/hyperconverged-cluster-operator-rhel9@sha256:e681560b184189df03fc84c8a712f32289f42573dd348cda394b19565eb6eca8_arm64",
"9Base-CNV-4.13:container-native-virtualization/hyperconverged-cluster-webhook-rhel9@sha256:06d036d320b3027bb8370bb8e0f6fe8c9f0ec9bca7aac3b5c53698ba4a170042_arm64",
"9Base-CNV-4.13:container-native-virtualization/hyperconverged-cluster-webhook-rhel9@sha256:b5a01336180aad017df62cf8e652f2491b8263ba7e4dd07f858db1ef1924cf2f_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubemacpool-rhel9@sha256:4d190d81eeb3fbe9ed56cf3548dc83a3f81641bfdafa7b42dcfb0d2512566644_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubemacpool-rhel9@sha256:59862a59854f0d5b83dc25ba119f9586a8aff42b6e60d1922f8ae7b4567309ff_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubesecondarydns-rhel9@sha256:121d30d78cc57731ea2242ef2c32430890ac66c2723e65608d5e2f26c3f515cd_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubesecondarydns-rhel9@sha256:b1838f3c8ba3d8113bddea17b78c21e1c1490e2a4a07ea77014edee523d06347_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-console-plugin-rhel9@sha256:86a4b1e3d6ad1d56302c9c058f8bc5826dcfe6c46fb3e0ddaa06818645039020_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-console-plugin-rhel9@sha256:ffb2acd9ae09c1ef9ca756f5eaf6087d0a3957cfc824543949d25f556a97744d_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-dpdk-checkup-rhel9@sha256:525aceb9396010ebcdba14040f267889b807cd84db8e5b4030429b51f0fbf5fe_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-dpdk-checkup-rhel9@sha256:553c4686f56c66cc1e3c5ad9d4051f139d43f821eac3abb98ca5cdb8b5dfe202_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-ssp-operator-rhel9@sha256:901e6cad9534c7bd7c4018c60bccfe49d7280fba5a9901ab4c4d15e9345288c4_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-ssp-operator-rhel9@sha256:badeb0f65f543b209f6af761729d9778b7b73b97d55044016dfba3f38a1f6f18_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-cleanup-vm-rhel9@sha256:28e4975fa4dac22d9da32ed2a10aed039fd957b30140daa36bab2caa998be77a_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-cleanup-vm-rhel9@sha256:b0ff7e812a576ea848590655fc13a85832d5a39f68e7769ceab9da6949da88c7_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-copy-template-rhel9@sha256:4916a6c6b1f9b529187d3b4d5fc99b90157993767b3fe2ad36a9ec77fbb46b10_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-copy-template-rhel9@sha256:f71c36442f1b61cdde7ec58d2c3c78d2039f6d6108e6c35388ef7c1650971fa1_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-create-datavolume-rhel9@sha256:2ad49cf6e2242a9e5861929d9bcab1305a7fc4e34e708f99cff1d7253aa46167_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-create-datavolume-rhel9@sha256:7112400a4ecb23ee2110bf96372fcf9f96ad648a51aa944627b40eb59539a660_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-create-vm-from-template-rhel9@sha256:1411c65bbad7302710788327f6964a4bf5bc20ef70d5e46f4a5c6e7a0e7a0161_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-create-vm-from-template-rhel9@sha256:4d962618aa95600c60c9fc8b890186e510de91177d51949e12797a3558e31328_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-customize-rhel9@sha256:5c23d3f20ea9dcbe7109284d73078ecd516a070e964b844f8d80b1d92ebd55ee_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-customize-rhel9@sha256:a780244e48c6d4f87446d3754c3eb9ab79c0d54675c189da4a659f7a4d5668ea_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-sysprep-rhel9@sha256:84577d949a1bbcaa291c70729127bca4a8994df03068666baa23840877ea8392_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-sysprep-rhel9@sha256:aed630a597a090179e1b0e0c117e536df06b67d0f793f91936aa7388c0c5d7eb_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-modify-vm-template-rhel9@sha256:31d959b80cf57462e1705684bb7e1b78af26bd2c62f1c9e4e51e1d02199b05a8_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-modify-vm-template-rhel9@sha256:66aea526bc10e4c0136ba86e394bbdfe4fbd7f757d6f391a561b51d2ba2f4d46_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-operator-rhel9@sha256:d0cf0e81589f0938de45961eaddfc5ec4782738fd11082de0439b200534259eb_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-operator-rhel9@sha256:f1b1f5044db6bb945584f9d4f31d020597725a286ef368ed0aca2116abb31beb_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-wait-for-vmi-status-rhel9@sha256:39a15d03f113735df03b1a7408227eb9604d942c1f3c1992bcdc7eaf07662711_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-wait-for-vmi-status-rhel9@sha256:afb68af076954fcd18c7a4a1464ea0c2a766e8282eae980051906ed07eaa1707_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-template-validator-rhel9@sha256:02b22c7e7014b5e72d47fed8b6a268cf307638c5510adf3916c51f7f40a52a08_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-template-validator-rhel9@sha256:c0264b9271e602f85b2040ef7f207cdfa46038dc4fa6e4738bf196ef88a71cf8_amd64",
"9Base-CNV-4.13:container-native-virtualization/libguestfs-tools-rhel9@sha256:29ae84575bbca24553cf649256759fd96ff286971d80bc2db129154a7df9b283_amd64",
"9Base-CNV-4.13:container-native-virtualization/libguestfs-tools-rhel9@sha256:6558f60343e068b032167e2340b2c549c5f0258acc5d2614b60966ce79408b01_arm64",
"9Base-CNV-4.13:container-native-virtualization/multus-dynamic-networks-rhel9@sha256:3ecb0162a4b01d1590bf209d717b32a4f0835910d9979823f18c24acba41b503_arm64",
"9Base-CNV-4.13:container-native-virtualization/multus-dynamic-networks-rhel9@sha256:b7f68b6420009e21380d32d6459193aae45e93be9533debe17cb3108571b36b8_amd64",
"9Base-CNV-4.13:container-native-virtualization/ovs-cni-plugin-rhel9@sha256:0f1d372f418744e0aff59ecb0a38f53178aac9c2e9eecfd38aa25ed83e0d1360_arm64",
"9Base-CNV-4.13:container-native-virtualization/ovs-cni-plugin-rhel9@sha256:e8e7a44edbf1713fe74de5c4b8f691cce78f4440c4a32a16ba9ad16694a55396_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-artifacts-server-rhel9@sha256:33d11c1832b49df39c1fca62bad40dbc5c30a452248339aaef449ac99509accb_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-artifacts-server-rhel9@sha256:81fc61b714baecb5a89fa6c0749c14566e0661b8e184ca602fc2e03b9cf431ee_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-apiserver-rhel9@sha256:f6128a63344ed2129f5bce648ddcfaa2869d31cde4b93328d3c22534b97ade10_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-apiserver-rhel9@sha256:feca273a691d09445c6cff6d36b5d590735e867656a9898ce0d89744d98e8006_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-cloner-rhel9@sha256:68e3b9b0291b4fb277ac430269ffce11d13b0a7688cf2ffcdb7f98759c36b4db_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-cloner-rhel9@sha256:6ac212767481bef64d8a7d0252bb8089c0f9751fad4a355aef71bd49dad2ad07_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-controller-rhel9@sha256:65f5263275d9f0a12b8fb057d82adf678778039ec873ca9bde182dea3413c9f1_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-controller-rhel9@sha256:d9e62b2019328be258489ac852eef25f8b1233f29abac6bcea5b406329f97fed_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-importer-rhel9@sha256:00a6d9d24ca1466d450b02269ec3144fc7550f0e5c696e869fbf7ce10cae6093_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-importer-rhel9@sha256:2df07fb21a3575e74aa16ded20129828f2300cd33e8ab369b0362062d49e62d0_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-operator-rhel9@sha256:20ec064750faedd97d11b797c8c1d9a1db5d60d7d76e82e65cfd05eb79d65e29_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-operator-rhel9@sha256:802ee8923d9d8e406b23911406f9748756c0ef4d6954e9e2fd5fb4bdf91dde9a_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-uploadproxy-rhel9@sha256:392d0f61f462c707adfdc21e4239c5c09d8520a80486b41d9d9ae479267d6124_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-uploadproxy-rhel9@sha256:6775f34353eec8f35bead9411dde155530d079bb8d51582fb1f2aacc27dbde1d_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-uploadserver-rhel9@sha256:4528c24672689cfb6505761b6b108fbcc04488192733f23d2bfe39cd42a1d743_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-uploadserver-rhel9@sha256:b22048390387380af94e267c8a9a66813c515997456d59d8ebac1486916b6585_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-controller-rhel9@sha256:3e7880149ee9a68286e390beb3d9779f7403c30fc5136e5370e0e4690a3fd243_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-controller-rhel9@sha256:970edc281d7a731e9f7e8c2d4440fe48a221e5e355d5235c5413b4c3adb28503_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-exportproxy-rhel9@sha256:1bda34d5bff734ad997202f29a5ff6f7362fd79fa90511a422442ef2e3681198_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-exportproxy-rhel9@sha256:de3c4afbf7669b98517cbef2490ec186f0553dd97b05bed80ec36dd883fe507b_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-exportserver-rhel9@sha256:3f7f98645176d42c63cca5c0fc3182a03121af87446ca421b6c72baf07dfca0d_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-exportserver-rhel9@sha256:8f12955cd777eb2409037a6968aa92f50c99d6e07e722951dbcfd0c8c9829b5e_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-handler-rhel9@sha256:5fc47110d866d8048aec50689090ce10705d19d3bb48d2b06727d6d569003af7_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-handler-rhel9@sha256:84ba79ae9658699147d2493df2582ab6df10adbff4d44a533c3fe6a9f45f9691_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-launcher-rhel9@sha256:4990d40d9987d5126d105dd45be2501eaded248cb61bdde5ea8d359bc1e7ebef_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-launcher-rhel9@sha256:95aeacb98209e0baef27ce0e02fbac38d693cea74808fc77107efda0f344bcb5_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-operator-rhel9@sha256:5c1a7e4ed2061938987b900a2394f07121d4037350c9bb6485213a2adfea787d_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-operator-rhel9@sha256:66b1b3b379121d6411ba22283e7d991617177330c93746d37753ab7812b9a00b_arm64",
"9Base-CNV-4.13:container-native-virtualization/virtio-win-rhel9@sha256:8735f51da918408a8826601c082d1b29accf26d59b9978da89b980cb509c1102_arm64",
"9Base-CNV-4.13:container-native-virtualization/virtio-win-rhel9@sha256:d147d2a6eb6f907d1e88f61aaca83596853bc72164583d6dda2b1154b490de25_amd64",
"9Base-CNV-4.13:container-native-virtualization/vm-console-proxy-rhel9@sha256:70a8d0cd66182c25e02679540bae1368b2a9cf687532b58dba41ef30c5ca00c1_arm64",
"9Base-CNV-4.13:container-native-virtualization/vm-console-proxy-rhel9@sha256:7ca921f98f6d81a126907127a611146fb53397869a628678faa1e289c01d22b2_amd64",
"9Base-CNV-4.13:container-native-virtualization/vm-network-latency-checkup-rhel9@sha256:503ea7ac914a9b54e9d665a0227ee0b5d5200cdb5d692aa94c07dd1518d91b70_arm64",
"9Base-CNV-4.13:container-native-virtualization/vm-network-latency-checkup-rhel9@sha256:59fd965975bccf641a0fa7aa01374d45057bd03cda7528248a84b60b1205bf57_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-32190"
},
{
"category": "external",
"summary": "RHBZ#2124668",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2124668"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-32190",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32190"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-32190",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-32190"
},
{
"category": "external",
"summary": "https://go.dev/issue/54385",
"url": "https://go.dev/issue/54385"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/x49AQzIVX-s/m/0tgO0pjiBQAJ",
"url": "https://groups.google.com/g/golang-announce/c/x49AQzIVX-s/m/0tgO0pjiBQAJ"
}
],
"release_date": "2022-09-06T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-05-18T02:55:08+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"9Base-CNV-4.13:container-native-virtualization/virt-api-rhel9@sha256:e68416321ca8c74a547b3d35897f54813c03481143e402e9bdc4daf315e35b5d_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-api-rhel9@sha256:fdb4ca1bb8b310d713d9c7e88f7d091f4460aa942dbeca5ebcf17281a06daffe_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:3205"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"9Base-CNV-4.13:container-native-virtualization/bridge-marker-rhel9@sha256:8eac196b30a648989cdca5cb153a3bc3d34e47339acba0e4f760bd366496c99d_amd64",
"9Base-CNV-4.13:container-native-virtualization/bridge-marker-rhel9@sha256:e8a55aee3d75a316bb0d7a554c737198823df04b3c05e481c17e45eb2153bced_arm64",
"9Base-CNV-4.13:container-native-virtualization/cluster-network-addons-operator-rhel9@sha256:3bff33e3f40cd1e2b519c2db56734d4bb8df883e155c2f20b1cb9d3d184daec1_amd64",
"9Base-CNV-4.13:container-native-virtualization/cluster-network-addons-operator-rhel9@sha256:f439d2f420bb59eb1d5af14ce2002648d0cfc155d1a1466c8aac9b661fe902b8_arm64",
"9Base-CNV-4.13:container-native-virtualization/cnv-containernetworking-plugins-rhel9@sha256:89f22e541f61a660c9aa9f38ef58e80b84a0517f74e84292107fc252c25465c9_arm64",
"9Base-CNV-4.13:container-native-virtualization/cnv-containernetworking-plugins-rhel9@sha256:bf471997e54e4a75b0d71f492ab295787fdbb14d8c85c4ea8c03f0552dbc3755_amd64",
"9Base-CNV-4.13:container-native-virtualization/cnv-must-gather-rhel9@sha256:9e8efd76924958eb605401abdac08eba97fb83a1ada383bc87a7fb7c87b3a455_arm64",
"9Base-CNV-4.13:container-native-virtualization/cnv-must-gather-rhel9@sha256:b9fc32b5fabedd65a4c3a471879c808af2087277de4278adaa115a732f0468da_amd64",
"9Base-CNV-4.13:container-native-virtualization/hco-bundle-registry-rhel9@sha256:60e89d7a99ff9f20e974430b802dd724a3bb6fa1e01e5a62daad98ac487b3063_amd64",
"9Base-CNV-4.13:container-native-virtualization/hco-bundle-registry-rhel9@sha256:dd20b138045ef1424d83a47e7abcfcbb2ac54577dcec5ed3c186390aaa4c9d84_arm64",
"9Base-CNV-4.13:container-native-virtualization/hostpath-csi-driver-rhel9@sha256:61e2824853d51347593ad909a5e546cd92e4216d6a1df5dffb50dd9cba277cce_amd64",
"9Base-CNV-4.13:container-native-virtualization/hostpath-csi-driver-rhel9@sha256:676d4c23a5f60dd331728af056b0a6b2d3358ac88da23299b1a98dfaca8f288e_arm64",
"9Base-CNV-4.13:container-native-virtualization/hostpath-provisioner-operator-rhel9@sha256:515be94be496c67f5b8fd5f4832fe4385e56476e6589897d6b9fbb9bb2b00f32_amd64",
"9Base-CNV-4.13:container-native-virtualization/hostpath-provisioner-operator-rhel9@sha256:571ae805641dea11646028c946039983c7fd82f138b915dcb8b80c39b465e63c_arm64",
"9Base-CNV-4.13:container-native-virtualization/hostpath-provisioner-rhel9@sha256:ac3fe350bedd6bc43596444ba0f279ccf8a144ab14ac5a9b80ea71c46390b7b4_amd64",
"9Base-CNV-4.13:container-native-virtualization/hostpath-provisioner-rhel9@sha256:d4ed87745b7ee2acca2d83e2c91c2f6dced1903c81495b50f2559b3ba2dde287_arm64",
"9Base-CNV-4.13:container-native-virtualization/hyperconverged-cluster-operator-rhel9@sha256:e5ab9f3be59d3568e3d672ab374efb16990ccf92192eac4e1244b10fcd7423e2_amd64",
"9Base-CNV-4.13:container-native-virtualization/hyperconverged-cluster-operator-rhel9@sha256:e681560b184189df03fc84c8a712f32289f42573dd348cda394b19565eb6eca8_arm64",
"9Base-CNV-4.13:container-native-virtualization/hyperconverged-cluster-webhook-rhel9@sha256:06d036d320b3027bb8370bb8e0f6fe8c9f0ec9bca7aac3b5c53698ba4a170042_arm64",
"9Base-CNV-4.13:container-native-virtualization/hyperconverged-cluster-webhook-rhel9@sha256:b5a01336180aad017df62cf8e652f2491b8263ba7e4dd07f858db1ef1924cf2f_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubemacpool-rhel9@sha256:4d190d81eeb3fbe9ed56cf3548dc83a3f81641bfdafa7b42dcfb0d2512566644_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubemacpool-rhel9@sha256:59862a59854f0d5b83dc25ba119f9586a8aff42b6e60d1922f8ae7b4567309ff_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubesecondarydns-rhel9@sha256:121d30d78cc57731ea2242ef2c32430890ac66c2723e65608d5e2f26c3f515cd_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubesecondarydns-rhel9@sha256:b1838f3c8ba3d8113bddea17b78c21e1c1490e2a4a07ea77014edee523d06347_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-console-plugin-rhel9@sha256:86a4b1e3d6ad1d56302c9c058f8bc5826dcfe6c46fb3e0ddaa06818645039020_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-console-plugin-rhel9@sha256:ffb2acd9ae09c1ef9ca756f5eaf6087d0a3957cfc824543949d25f556a97744d_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-dpdk-checkup-rhel9@sha256:525aceb9396010ebcdba14040f267889b807cd84db8e5b4030429b51f0fbf5fe_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-dpdk-checkup-rhel9@sha256:553c4686f56c66cc1e3c5ad9d4051f139d43f821eac3abb98ca5cdb8b5dfe202_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-ssp-operator-rhel9@sha256:901e6cad9534c7bd7c4018c60bccfe49d7280fba5a9901ab4c4d15e9345288c4_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-ssp-operator-rhel9@sha256:badeb0f65f543b209f6af761729d9778b7b73b97d55044016dfba3f38a1f6f18_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-cleanup-vm-rhel9@sha256:28e4975fa4dac22d9da32ed2a10aed039fd957b30140daa36bab2caa998be77a_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-cleanup-vm-rhel9@sha256:b0ff7e812a576ea848590655fc13a85832d5a39f68e7769ceab9da6949da88c7_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-copy-template-rhel9@sha256:4916a6c6b1f9b529187d3b4d5fc99b90157993767b3fe2ad36a9ec77fbb46b10_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-copy-template-rhel9@sha256:f71c36442f1b61cdde7ec58d2c3c78d2039f6d6108e6c35388ef7c1650971fa1_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-create-datavolume-rhel9@sha256:2ad49cf6e2242a9e5861929d9bcab1305a7fc4e34e708f99cff1d7253aa46167_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-create-datavolume-rhel9@sha256:7112400a4ecb23ee2110bf96372fcf9f96ad648a51aa944627b40eb59539a660_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-create-vm-from-template-rhel9@sha256:1411c65bbad7302710788327f6964a4bf5bc20ef70d5e46f4a5c6e7a0e7a0161_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-create-vm-from-template-rhel9@sha256:4d962618aa95600c60c9fc8b890186e510de91177d51949e12797a3558e31328_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-customize-rhel9@sha256:5c23d3f20ea9dcbe7109284d73078ecd516a070e964b844f8d80b1d92ebd55ee_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-customize-rhel9@sha256:a780244e48c6d4f87446d3754c3eb9ab79c0d54675c189da4a659f7a4d5668ea_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-sysprep-rhel9@sha256:84577d949a1bbcaa291c70729127bca4a8994df03068666baa23840877ea8392_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-sysprep-rhel9@sha256:aed630a597a090179e1b0e0c117e536df06b67d0f793f91936aa7388c0c5d7eb_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-modify-vm-template-rhel9@sha256:31d959b80cf57462e1705684bb7e1b78af26bd2c62f1c9e4e51e1d02199b05a8_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-modify-vm-template-rhel9@sha256:66aea526bc10e4c0136ba86e394bbdfe4fbd7f757d6f391a561b51d2ba2f4d46_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-operator-rhel9@sha256:d0cf0e81589f0938de45961eaddfc5ec4782738fd11082de0439b200534259eb_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-operator-rhel9@sha256:f1b1f5044db6bb945584f9d4f31d020597725a286ef368ed0aca2116abb31beb_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-wait-for-vmi-status-rhel9@sha256:39a15d03f113735df03b1a7408227eb9604d942c1f3c1992bcdc7eaf07662711_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-wait-for-vmi-status-rhel9@sha256:afb68af076954fcd18c7a4a1464ea0c2a766e8282eae980051906ed07eaa1707_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-template-validator-rhel9@sha256:02b22c7e7014b5e72d47fed8b6a268cf307638c5510adf3916c51f7f40a52a08_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-template-validator-rhel9@sha256:c0264b9271e602f85b2040ef7f207cdfa46038dc4fa6e4738bf196ef88a71cf8_amd64",
"9Base-CNV-4.13:container-native-virtualization/libguestfs-tools-rhel9@sha256:29ae84575bbca24553cf649256759fd96ff286971d80bc2db129154a7df9b283_amd64",
"9Base-CNV-4.13:container-native-virtualization/libguestfs-tools-rhel9@sha256:6558f60343e068b032167e2340b2c549c5f0258acc5d2614b60966ce79408b01_arm64",
"9Base-CNV-4.13:container-native-virtualization/multus-dynamic-networks-rhel9@sha256:3ecb0162a4b01d1590bf209d717b32a4f0835910d9979823f18c24acba41b503_arm64",
"9Base-CNV-4.13:container-native-virtualization/multus-dynamic-networks-rhel9@sha256:b7f68b6420009e21380d32d6459193aae45e93be9533debe17cb3108571b36b8_amd64",
"9Base-CNV-4.13:container-native-virtualization/ovs-cni-plugin-rhel9@sha256:0f1d372f418744e0aff59ecb0a38f53178aac9c2e9eecfd38aa25ed83e0d1360_arm64",
"9Base-CNV-4.13:container-native-virtualization/ovs-cni-plugin-rhel9@sha256:e8e7a44edbf1713fe74de5c4b8f691cce78f4440c4a32a16ba9ad16694a55396_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-api-rhel9@sha256:e68416321ca8c74a547b3d35897f54813c03481143e402e9bdc4daf315e35b5d_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-api-rhel9@sha256:fdb4ca1bb8b310d713d9c7e88f7d091f4460aa942dbeca5ebcf17281a06daffe_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-artifacts-server-rhel9@sha256:33d11c1832b49df39c1fca62bad40dbc5c30a452248339aaef449ac99509accb_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-artifacts-server-rhel9@sha256:81fc61b714baecb5a89fa6c0749c14566e0661b8e184ca602fc2e03b9cf431ee_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-apiserver-rhel9@sha256:f6128a63344ed2129f5bce648ddcfaa2869d31cde4b93328d3c22534b97ade10_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-apiserver-rhel9@sha256:feca273a691d09445c6cff6d36b5d590735e867656a9898ce0d89744d98e8006_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-cloner-rhel9@sha256:68e3b9b0291b4fb277ac430269ffce11d13b0a7688cf2ffcdb7f98759c36b4db_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-cloner-rhel9@sha256:6ac212767481bef64d8a7d0252bb8089c0f9751fad4a355aef71bd49dad2ad07_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-controller-rhel9@sha256:65f5263275d9f0a12b8fb057d82adf678778039ec873ca9bde182dea3413c9f1_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-controller-rhel9@sha256:d9e62b2019328be258489ac852eef25f8b1233f29abac6bcea5b406329f97fed_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-importer-rhel9@sha256:00a6d9d24ca1466d450b02269ec3144fc7550f0e5c696e869fbf7ce10cae6093_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-importer-rhel9@sha256:2df07fb21a3575e74aa16ded20129828f2300cd33e8ab369b0362062d49e62d0_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-operator-rhel9@sha256:20ec064750faedd97d11b797c8c1d9a1db5d60d7d76e82e65cfd05eb79d65e29_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-operator-rhel9@sha256:802ee8923d9d8e406b23911406f9748756c0ef4d6954e9e2fd5fb4bdf91dde9a_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-uploadproxy-rhel9@sha256:392d0f61f462c707adfdc21e4239c5c09d8520a80486b41d9d9ae479267d6124_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-uploadproxy-rhel9@sha256:6775f34353eec8f35bead9411dde155530d079bb8d51582fb1f2aacc27dbde1d_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-uploadserver-rhel9@sha256:4528c24672689cfb6505761b6b108fbcc04488192733f23d2bfe39cd42a1d743_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-uploadserver-rhel9@sha256:b22048390387380af94e267c8a9a66813c515997456d59d8ebac1486916b6585_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-controller-rhel9@sha256:3e7880149ee9a68286e390beb3d9779f7403c30fc5136e5370e0e4690a3fd243_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-controller-rhel9@sha256:970edc281d7a731e9f7e8c2d4440fe48a221e5e355d5235c5413b4c3adb28503_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-exportproxy-rhel9@sha256:1bda34d5bff734ad997202f29a5ff6f7362fd79fa90511a422442ef2e3681198_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-exportproxy-rhel9@sha256:de3c4afbf7669b98517cbef2490ec186f0553dd97b05bed80ec36dd883fe507b_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-exportserver-rhel9@sha256:3f7f98645176d42c63cca5c0fc3182a03121af87446ca421b6c72baf07dfca0d_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-exportserver-rhel9@sha256:8f12955cd777eb2409037a6968aa92f50c99d6e07e722951dbcfd0c8c9829b5e_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-handler-rhel9@sha256:5fc47110d866d8048aec50689090ce10705d19d3bb48d2b06727d6d569003af7_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-handler-rhel9@sha256:84ba79ae9658699147d2493df2582ab6df10adbff4d44a533c3fe6a9f45f9691_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-launcher-rhel9@sha256:4990d40d9987d5126d105dd45be2501eaded248cb61bdde5ea8d359bc1e7ebef_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-launcher-rhel9@sha256:95aeacb98209e0baef27ce0e02fbac38d693cea74808fc77107efda0f344bcb5_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-operator-rhel9@sha256:5c1a7e4ed2061938987b900a2394f07121d4037350c9bb6485213a2adfea787d_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-operator-rhel9@sha256:66b1b3b379121d6411ba22283e7d991617177330c93746d37753ab7812b9a00b_arm64",
"9Base-CNV-4.13:container-native-virtualization/virtio-win-rhel9@sha256:8735f51da918408a8826601c082d1b29accf26d59b9978da89b980cb509c1102_arm64",
"9Base-CNV-4.13:container-native-virtualization/virtio-win-rhel9@sha256:d147d2a6eb6f907d1e88f61aaca83596853bc72164583d6dda2b1154b490de25_amd64",
"9Base-CNV-4.13:container-native-virtualization/vm-console-proxy-rhel9@sha256:70a8d0cd66182c25e02679540bae1368b2a9cf687532b58dba41ef30c5ca00c1_arm64",
"9Base-CNV-4.13:container-native-virtualization/vm-console-proxy-rhel9@sha256:7ca921f98f6d81a126907127a611146fb53397869a628678faa1e289c01d22b2_amd64",
"9Base-CNV-4.13:container-native-virtualization/vm-network-latency-checkup-rhel9@sha256:503ea7ac914a9b54e9d665a0227ee0b5d5200cdb5d692aa94c07dd1518d91b70_arm64",
"9Base-CNV-4.13:container-native-virtualization/vm-network-latency-checkup-rhel9@sha256:59fd965975bccf641a0fa7aa01374d45057bd03cda7528248a84b60b1205bf57_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "golang: net/url: JoinPath does not strip relative path components in all circumstances"
},
{
"acknowledgments": [
{
"names": [
"Adam Korczynski"
],
"organization": "ADA Logics"
},
{
"names": [
"OSS-Fuzz"
]
}
],
"cve": "CVE-2022-41715",
"discovery_date": "2022-10-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2132872"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the golang package, where programs that compile regular expressions from untrusted sources are vulnerable to memory exhaustion or a denial of service. The parsed regexp representation is linear in the input size. Still, in some cases, the constant factor can be as high as 40,000, making a relatively small regexp consume larger amounts of memory. After the fix, each regexp being parsed is limited to a 256 MB memory footprint. Regular expressions whose representation would use more space than that are rejected. Routine use of regular expressions is unaffected.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: regexp/syntax: limit memory used by parsing regexps",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The opportunity for a Denial of Service is limited to the golang runtime. In the case of OpenShift Container Platform, this would be restricted within each individual container. There are multiple layers of guide rails (Golang\u2019s Garbage Collector; OpenShift\u2019s resource constraints imposed at the container and cluster levels) which would require a malicious user to continue submitting attacks for there to be any enduring impact. They would also need access to external server resources to be able to send a massive volume of requests to cause a significant impact on server operations.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"9Base-CNV-4.13:container-native-virtualization/bridge-marker-rhel9@sha256:8eac196b30a648989cdca5cb153a3bc3d34e47339acba0e4f760bd366496c99d_amd64",
"9Base-CNV-4.13:container-native-virtualization/bridge-marker-rhel9@sha256:e8a55aee3d75a316bb0d7a554c737198823df04b3c05e481c17e45eb2153bced_arm64",
"9Base-CNV-4.13:container-native-virtualization/cluster-network-addons-operator-rhel9@sha256:3bff33e3f40cd1e2b519c2db56734d4bb8df883e155c2f20b1cb9d3d184daec1_amd64",
"9Base-CNV-4.13:container-native-virtualization/cluster-network-addons-operator-rhel9@sha256:f439d2f420bb59eb1d5af14ce2002648d0cfc155d1a1466c8aac9b661fe902b8_arm64",
"9Base-CNV-4.13:container-native-virtualization/cnv-containernetworking-plugins-rhel9@sha256:89f22e541f61a660c9aa9f38ef58e80b84a0517f74e84292107fc252c25465c9_arm64",
"9Base-CNV-4.13:container-native-virtualization/cnv-containernetworking-plugins-rhel9@sha256:bf471997e54e4a75b0d71f492ab295787fdbb14d8c85c4ea8c03f0552dbc3755_amd64",
"9Base-CNV-4.13:container-native-virtualization/cnv-must-gather-rhel9@sha256:9e8efd76924958eb605401abdac08eba97fb83a1ada383bc87a7fb7c87b3a455_arm64",
"9Base-CNV-4.13:container-native-virtualization/cnv-must-gather-rhel9@sha256:b9fc32b5fabedd65a4c3a471879c808af2087277de4278adaa115a732f0468da_amd64",
"9Base-CNV-4.13:container-native-virtualization/hco-bundle-registry-rhel9@sha256:60e89d7a99ff9f20e974430b802dd724a3bb6fa1e01e5a62daad98ac487b3063_amd64",
"9Base-CNV-4.13:container-native-virtualization/hco-bundle-registry-rhel9@sha256:dd20b138045ef1424d83a47e7abcfcbb2ac54577dcec5ed3c186390aaa4c9d84_arm64",
"9Base-CNV-4.13:container-native-virtualization/hostpath-csi-driver-rhel9@sha256:61e2824853d51347593ad909a5e546cd92e4216d6a1df5dffb50dd9cba277cce_amd64",
"9Base-CNV-4.13:container-native-virtualization/hostpath-csi-driver-rhel9@sha256:676d4c23a5f60dd331728af056b0a6b2d3358ac88da23299b1a98dfaca8f288e_arm64",
"9Base-CNV-4.13:container-native-virtualization/hostpath-provisioner-operator-rhel9@sha256:515be94be496c67f5b8fd5f4832fe4385e56476e6589897d6b9fbb9bb2b00f32_amd64",
"9Base-CNV-4.13:container-native-virtualization/hostpath-provisioner-operator-rhel9@sha256:571ae805641dea11646028c946039983c7fd82f138b915dcb8b80c39b465e63c_arm64",
"9Base-CNV-4.13:container-native-virtualization/hostpath-provisioner-rhel9@sha256:ac3fe350bedd6bc43596444ba0f279ccf8a144ab14ac5a9b80ea71c46390b7b4_amd64",
"9Base-CNV-4.13:container-native-virtualization/hostpath-provisioner-rhel9@sha256:d4ed87745b7ee2acca2d83e2c91c2f6dced1903c81495b50f2559b3ba2dde287_arm64",
"9Base-CNV-4.13:container-native-virtualization/hyperconverged-cluster-operator-rhel9@sha256:e5ab9f3be59d3568e3d672ab374efb16990ccf92192eac4e1244b10fcd7423e2_amd64",
"9Base-CNV-4.13:container-native-virtualization/hyperconverged-cluster-operator-rhel9@sha256:e681560b184189df03fc84c8a712f32289f42573dd348cda394b19565eb6eca8_arm64",
"9Base-CNV-4.13:container-native-virtualization/hyperconverged-cluster-webhook-rhel9@sha256:06d036d320b3027bb8370bb8e0f6fe8c9f0ec9bca7aac3b5c53698ba4a170042_arm64",
"9Base-CNV-4.13:container-native-virtualization/hyperconverged-cluster-webhook-rhel9@sha256:b5a01336180aad017df62cf8e652f2491b8263ba7e4dd07f858db1ef1924cf2f_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubemacpool-rhel9@sha256:4d190d81eeb3fbe9ed56cf3548dc83a3f81641bfdafa7b42dcfb0d2512566644_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubemacpool-rhel9@sha256:59862a59854f0d5b83dc25ba119f9586a8aff42b6e60d1922f8ae7b4567309ff_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubesecondarydns-rhel9@sha256:121d30d78cc57731ea2242ef2c32430890ac66c2723e65608d5e2f26c3f515cd_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubesecondarydns-rhel9@sha256:b1838f3c8ba3d8113bddea17b78c21e1c1490e2a4a07ea77014edee523d06347_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-console-plugin-rhel9@sha256:86a4b1e3d6ad1d56302c9c058f8bc5826dcfe6c46fb3e0ddaa06818645039020_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-console-plugin-rhel9@sha256:ffb2acd9ae09c1ef9ca756f5eaf6087d0a3957cfc824543949d25f556a97744d_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-dpdk-checkup-rhel9@sha256:525aceb9396010ebcdba14040f267889b807cd84db8e5b4030429b51f0fbf5fe_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-dpdk-checkup-rhel9@sha256:553c4686f56c66cc1e3c5ad9d4051f139d43f821eac3abb98ca5cdb8b5dfe202_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-ssp-operator-rhel9@sha256:901e6cad9534c7bd7c4018c60bccfe49d7280fba5a9901ab4c4d15e9345288c4_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-ssp-operator-rhel9@sha256:badeb0f65f543b209f6af761729d9778b7b73b97d55044016dfba3f38a1f6f18_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-cleanup-vm-rhel9@sha256:28e4975fa4dac22d9da32ed2a10aed039fd957b30140daa36bab2caa998be77a_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-cleanup-vm-rhel9@sha256:b0ff7e812a576ea848590655fc13a85832d5a39f68e7769ceab9da6949da88c7_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-copy-template-rhel9@sha256:4916a6c6b1f9b529187d3b4d5fc99b90157993767b3fe2ad36a9ec77fbb46b10_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-copy-template-rhel9@sha256:f71c36442f1b61cdde7ec58d2c3c78d2039f6d6108e6c35388ef7c1650971fa1_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-create-datavolume-rhel9@sha256:2ad49cf6e2242a9e5861929d9bcab1305a7fc4e34e708f99cff1d7253aa46167_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-create-datavolume-rhel9@sha256:7112400a4ecb23ee2110bf96372fcf9f96ad648a51aa944627b40eb59539a660_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-create-vm-from-template-rhel9@sha256:1411c65bbad7302710788327f6964a4bf5bc20ef70d5e46f4a5c6e7a0e7a0161_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-create-vm-from-template-rhel9@sha256:4d962618aa95600c60c9fc8b890186e510de91177d51949e12797a3558e31328_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-customize-rhel9@sha256:5c23d3f20ea9dcbe7109284d73078ecd516a070e964b844f8d80b1d92ebd55ee_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-customize-rhel9@sha256:a780244e48c6d4f87446d3754c3eb9ab79c0d54675c189da4a659f7a4d5668ea_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-sysprep-rhel9@sha256:84577d949a1bbcaa291c70729127bca4a8994df03068666baa23840877ea8392_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-sysprep-rhel9@sha256:aed630a597a090179e1b0e0c117e536df06b67d0f793f91936aa7388c0c5d7eb_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-modify-vm-template-rhel9@sha256:31d959b80cf57462e1705684bb7e1b78af26bd2c62f1c9e4e51e1d02199b05a8_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-modify-vm-template-rhel9@sha256:66aea526bc10e4c0136ba86e394bbdfe4fbd7f757d6f391a561b51d2ba2f4d46_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-operator-rhel9@sha256:d0cf0e81589f0938de45961eaddfc5ec4782738fd11082de0439b200534259eb_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-operator-rhel9@sha256:f1b1f5044db6bb945584f9d4f31d020597725a286ef368ed0aca2116abb31beb_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-wait-for-vmi-status-rhel9@sha256:39a15d03f113735df03b1a7408227eb9604d942c1f3c1992bcdc7eaf07662711_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-wait-for-vmi-status-rhel9@sha256:afb68af076954fcd18c7a4a1464ea0c2a766e8282eae980051906ed07eaa1707_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-template-validator-rhel9@sha256:02b22c7e7014b5e72d47fed8b6a268cf307638c5510adf3916c51f7f40a52a08_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-template-validator-rhel9@sha256:c0264b9271e602f85b2040ef7f207cdfa46038dc4fa6e4738bf196ef88a71cf8_amd64",
"9Base-CNV-4.13:container-native-virtualization/libguestfs-tools-rhel9@sha256:29ae84575bbca24553cf649256759fd96ff286971d80bc2db129154a7df9b283_amd64",
"9Base-CNV-4.13:container-native-virtualization/libguestfs-tools-rhel9@sha256:6558f60343e068b032167e2340b2c549c5f0258acc5d2614b60966ce79408b01_arm64",
"9Base-CNV-4.13:container-native-virtualization/multus-dynamic-networks-rhel9@sha256:3ecb0162a4b01d1590bf209d717b32a4f0835910d9979823f18c24acba41b503_arm64",
"9Base-CNV-4.13:container-native-virtualization/multus-dynamic-networks-rhel9@sha256:b7f68b6420009e21380d32d6459193aae45e93be9533debe17cb3108571b36b8_amd64",
"9Base-CNV-4.13:container-native-virtualization/ovs-cni-plugin-rhel9@sha256:0f1d372f418744e0aff59ecb0a38f53178aac9c2e9eecfd38aa25ed83e0d1360_arm64",
"9Base-CNV-4.13:container-native-virtualization/ovs-cni-plugin-rhel9@sha256:e8e7a44edbf1713fe74de5c4b8f691cce78f4440c4a32a16ba9ad16694a55396_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-api-rhel9@sha256:e68416321ca8c74a547b3d35897f54813c03481143e402e9bdc4daf315e35b5d_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-api-rhel9@sha256:fdb4ca1bb8b310d713d9c7e88f7d091f4460aa942dbeca5ebcf17281a06daffe_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-artifacts-server-rhel9@sha256:33d11c1832b49df39c1fca62bad40dbc5c30a452248339aaef449ac99509accb_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-artifacts-server-rhel9@sha256:81fc61b714baecb5a89fa6c0749c14566e0661b8e184ca602fc2e03b9cf431ee_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-apiserver-rhel9@sha256:f6128a63344ed2129f5bce648ddcfaa2869d31cde4b93328d3c22534b97ade10_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-apiserver-rhel9@sha256:feca273a691d09445c6cff6d36b5d590735e867656a9898ce0d89744d98e8006_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-cloner-rhel9@sha256:68e3b9b0291b4fb277ac430269ffce11d13b0a7688cf2ffcdb7f98759c36b4db_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-cloner-rhel9@sha256:6ac212767481bef64d8a7d0252bb8089c0f9751fad4a355aef71bd49dad2ad07_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-controller-rhel9@sha256:65f5263275d9f0a12b8fb057d82adf678778039ec873ca9bde182dea3413c9f1_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-controller-rhel9@sha256:d9e62b2019328be258489ac852eef25f8b1233f29abac6bcea5b406329f97fed_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-importer-rhel9@sha256:00a6d9d24ca1466d450b02269ec3144fc7550f0e5c696e869fbf7ce10cae6093_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-importer-rhel9@sha256:2df07fb21a3575e74aa16ded20129828f2300cd33e8ab369b0362062d49e62d0_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-operator-rhel9@sha256:20ec064750faedd97d11b797c8c1d9a1db5d60d7d76e82e65cfd05eb79d65e29_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-operator-rhel9@sha256:802ee8923d9d8e406b23911406f9748756c0ef4d6954e9e2fd5fb4bdf91dde9a_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-uploadproxy-rhel9@sha256:392d0f61f462c707adfdc21e4239c5c09d8520a80486b41d9d9ae479267d6124_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-uploadproxy-rhel9@sha256:6775f34353eec8f35bead9411dde155530d079bb8d51582fb1f2aacc27dbde1d_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-uploadserver-rhel9@sha256:4528c24672689cfb6505761b6b108fbcc04488192733f23d2bfe39cd42a1d743_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-uploadserver-rhel9@sha256:b22048390387380af94e267c8a9a66813c515997456d59d8ebac1486916b6585_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-controller-rhel9@sha256:3e7880149ee9a68286e390beb3d9779f7403c30fc5136e5370e0e4690a3fd243_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-controller-rhel9@sha256:970edc281d7a731e9f7e8c2d4440fe48a221e5e355d5235c5413b4c3adb28503_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-exportproxy-rhel9@sha256:1bda34d5bff734ad997202f29a5ff6f7362fd79fa90511a422442ef2e3681198_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-exportproxy-rhel9@sha256:de3c4afbf7669b98517cbef2490ec186f0553dd97b05bed80ec36dd883fe507b_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-exportserver-rhel9@sha256:3f7f98645176d42c63cca5c0fc3182a03121af87446ca421b6c72baf07dfca0d_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-exportserver-rhel9@sha256:8f12955cd777eb2409037a6968aa92f50c99d6e07e722951dbcfd0c8c9829b5e_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-handler-rhel9@sha256:5fc47110d866d8048aec50689090ce10705d19d3bb48d2b06727d6d569003af7_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-handler-rhel9@sha256:84ba79ae9658699147d2493df2582ab6df10adbff4d44a533c3fe6a9f45f9691_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-launcher-rhel9@sha256:4990d40d9987d5126d105dd45be2501eaded248cb61bdde5ea8d359bc1e7ebef_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-launcher-rhel9@sha256:95aeacb98209e0baef27ce0e02fbac38d693cea74808fc77107efda0f344bcb5_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-operator-rhel9@sha256:5c1a7e4ed2061938987b900a2394f07121d4037350c9bb6485213a2adfea787d_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-operator-rhel9@sha256:66b1b3b379121d6411ba22283e7d991617177330c93746d37753ab7812b9a00b_arm64",
"9Base-CNV-4.13:container-native-virtualization/virtio-win-rhel9@sha256:8735f51da918408a8826601c082d1b29accf26d59b9978da89b980cb509c1102_arm64",
"9Base-CNV-4.13:container-native-virtualization/virtio-win-rhel9@sha256:d147d2a6eb6f907d1e88f61aaca83596853bc72164583d6dda2b1154b490de25_amd64",
"9Base-CNV-4.13:container-native-virtualization/vm-console-proxy-rhel9@sha256:70a8d0cd66182c25e02679540bae1368b2a9cf687532b58dba41ef30c5ca00c1_arm64",
"9Base-CNV-4.13:container-native-virtualization/vm-console-proxy-rhel9@sha256:7ca921f98f6d81a126907127a611146fb53397869a628678faa1e289c01d22b2_amd64",
"9Base-CNV-4.13:container-native-virtualization/vm-network-latency-checkup-rhel9@sha256:503ea7ac914a9b54e9d665a0227ee0b5d5200cdb5d692aa94c07dd1518d91b70_arm64",
"9Base-CNV-4.13:container-native-virtualization/vm-network-latency-checkup-rhel9@sha256:59fd965975bccf641a0fa7aa01374d45057bd03cda7528248a84b60b1205bf57_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-41715"
},
{
"category": "external",
"summary": "RHBZ#2132872",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2132872"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-41715",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41715"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-41715",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-41715"
},
{
"category": "external",
"summary": "https://github.com/golang/go/issues/55949",
"url": "https://github.com/golang/go/issues/55949"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/xtuG5faxtaU?pli=1",
"url": "https://groups.google.com/g/golang-announce/c/xtuG5faxtaU?pli=1"
}
],
"release_date": "2022-10-04T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-05-18T02:55:08+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"9Base-CNV-4.13:container-native-virtualization/bridge-marker-rhel9@sha256:8eac196b30a648989cdca5cb153a3bc3d34e47339acba0e4f760bd366496c99d_amd64",
"9Base-CNV-4.13:container-native-virtualization/bridge-marker-rhel9@sha256:e8a55aee3d75a316bb0d7a554c737198823df04b3c05e481c17e45eb2153bced_arm64",
"9Base-CNV-4.13:container-native-virtualization/cluster-network-addons-operator-rhel9@sha256:3bff33e3f40cd1e2b519c2db56734d4bb8df883e155c2f20b1cb9d3d184daec1_amd64",
"9Base-CNV-4.13:container-native-virtualization/cluster-network-addons-operator-rhel9@sha256:f439d2f420bb59eb1d5af14ce2002648d0cfc155d1a1466c8aac9b661fe902b8_arm64",
"9Base-CNV-4.13:container-native-virtualization/cnv-containernetworking-plugins-rhel9@sha256:89f22e541f61a660c9aa9f38ef58e80b84a0517f74e84292107fc252c25465c9_arm64",
"9Base-CNV-4.13:container-native-virtualization/cnv-containernetworking-plugins-rhel9@sha256:bf471997e54e4a75b0d71f492ab295787fdbb14d8c85c4ea8c03f0552dbc3755_amd64",
"9Base-CNV-4.13:container-native-virtualization/cnv-must-gather-rhel9@sha256:9e8efd76924958eb605401abdac08eba97fb83a1ada383bc87a7fb7c87b3a455_arm64",
"9Base-CNV-4.13:container-native-virtualization/cnv-must-gather-rhel9@sha256:b9fc32b5fabedd65a4c3a471879c808af2087277de4278adaa115a732f0468da_amd64",
"9Base-CNV-4.13:container-native-virtualization/hco-bundle-registry-rhel9@sha256:60e89d7a99ff9f20e974430b802dd724a3bb6fa1e01e5a62daad98ac487b3063_amd64",
"9Base-CNV-4.13:container-native-virtualization/hco-bundle-registry-rhel9@sha256:dd20b138045ef1424d83a47e7abcfcbb2ac54577dcec5ed3c186390aaa4c9d84_arm64",
"9Base-CNV-4.13:container-native-virtualization/hostpath-csi-driver-rhel9@sha256:61e2824853d51347593ad909a5e546cd92e4216d6a1df5dffb50dd9cba277cce_amd64",
"9Base-CNV-4.13:container-native-virtualization/hostpath-csi-driver-rhel9@sha256:676d4c23a5f60dd331728af056b0a6b2d3358ac88da23299b1a98dfaca8f288e_arm64",
"9Base-CNV-4.13:container-native-virtualization/hostpath-provisioner-operator-rhel9@sha256:515be94be496c67f5b8fd5f4832fe4385e56476e6589897d6b9fbb9bb2b00f32_amd64",
"9Base-CNV-4.13:container-native-virtualization/hostpath-provisioner-operator-rhel9@sha256:571ae805641dea11646028c946039983c7fd82f138b915dcb8b80c39b465e63c_arm64",
"9Base-CNV-4.13:container-native-virtualization/hostpath-provisioner-rhel9@sha256:ac3fe350bedd6bc43596444ba0f279ccf8a144ab14ac5a9b80ea71c46390b7b4_amd64",
"9Base-CNV-4.13:container-native-virtualization/hostpath-provisioner-rhel9@sha256:d4ed87745b7ee2acca2d83e2c91c2f6dced1903c81495b50f2559b3ba2dde287_arm64",
"9Base-CNV-4.13:container-native-virtualization/hyperconverged-cluster-operator-rhel9@sha256:e5ab9f3be59d3568e3d672ab374efb16990ccf92192eac4e1244b10fcd7423e2_amd64",
"9Base-CNV-4.13:container-native-virtualization/hyperconverged-cluster-operator-rhel9@sha256:e681560b184189df03fc84c8a712f32289f42573dd348cda394b19565eb6eca8_arm64",
"9Base-CNV-4.13:container-native-virtualization/hyperconverged-cluster-webhook-rhel9@sha256:06d036d320b3027bb8370bb8e0f6fe8c9f0ec9bca7aac3b5c53698ba4a170042_arm64",
"9Base-CNV-4.13:container-native-virtualization/hyperconverged-cluster-webhook-rhel9@sha256:b5a01336180aad017df62cf8e652f2491b8263ba7e4dd07f858db1ef1924cf2f_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubemacpool-rhel9@sha256:4d190d81eeb3fbe9ed56cf3548dc83a3f81641bfdafa7b42dcfb0d2512566644_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubemacpool-rhel9@sha256:59862a59854f0d5b83dc25ba119f9586a8aff42b6e60d1922f8ae7b4567309ff_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubesecondarydns-rhel9@sha256:121d30d78cc57731ea2242ef2c32430890ac66c2723e65608d5e2f26c3f515cd_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubesecondarydns-rhel9@sha256:b1838f3c8ba3d8113bddea17b78c21e1c1490e2a4a07ea77014edee523d06347_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-console-plugin-rhel9@sha256:86a4b1e3d6ad1d56302c9c058f8bc5826dcfe6c46fb3e0ddaa06818645039020_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-console-plugin-rhel9@sha256:ffb2acd9ae09c1ef9ca756f5eaf6087d0a3957cfc824543949d25f556a97744d_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-dpdk-checkup-rhel9@sha256:525aceb9396010ebcdba14040f267889b807cd84db8e5b4030429b51f0fbf5fe_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-dpdk-checkup-rhel9@sha256:553c4686f56c66cc1e3c5ad9d4051f139d43f821eac3abb98ca5cdb8b5dfe202_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-ssp-operator-rhel9@sha256:901e6cad9534c7bd7c4018c60bccfe49d7280fba5a9901ab4c4d15e9345288c4_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-ssp-operator-rhel9@sha256:badeb0f65f543b209f6af761729d9778b7b73b97d55044016dfba3f38a1f6f18_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-cleanup-vm-rhel9@sha256:28e4975fa4dac22d9da32ed2a10aed039fd957b30140daa36bab2caa998be77a_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-cleanup-vm-rhel9@sha256:b0ff7e812a576ea848590655fc13a85832d5a39f68e7769ceab9da6949da88c7_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-copy-template-rhel9@sha256:4916a6c6b1f9b529187d3b4d5fc99b90157993767b3fe2ad36a9ec77fbb46b10_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-copy-template-rhel9@sha256:f71c36442f1b61cdde7ec58d2c3c78d2039f6d6108e6c35388ef7c1650971fa1_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-create-datavolume-rhel9@sha256:2ad49cf6e2242a9e5861929d9bcab1305a7fc4e34e708f99cff1d7253aa46167_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-create-datavolume-rhel9@sha256:7112400a4ecb23ee2110bf96372fcf9f96ad648a51aa944627b40eb59539a660_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-create-vm-from-template-rhel9@sha256:1411c65bbad7302710788327f6964a4bf5bc20ef70d5e46f4a5c6e7a0e7a0161_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-create-vm-from-template-rhel9@sha256:4d962618aa95600c60c9fc8b890186e510de91177d51949e12797a3558e31328_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-customize-rhel9@sha256:5c23d3f20ea9dcbe7109284d73078ecd516a070e964b844f8d80b1d92ebd55ee_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-customize-rhel9@sha256:a780244e48c6d4f87446d3754c3eb9ab79c0d54675c189da4a659f7a4d5668ea_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-sysprep-rhel9@sha256:84577d949a1bbcaa291c70729127bca4a8994df03068666baa23840877ea8392_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-sysprep-rhel9@sha256:aed630a597a090179e1b0e0c117e536df06b67d0f793f91936aa7388c0c5d7eb_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-modify-vm-template-rhel9@sha256:31d959b80cf57462e1705684bb7e1b78af26bd2c62f1c9e4e51e1d02199b05a8_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-modify-vm-template-rhel9@sha256:66aea526bc10e4c0136ba86e394bbdfe4fbd7f757d6f391a561b51d2ba2f4d46_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-operator-rhel9@sha256:d0cf0e81589f0938de45961eaddfc5ec4782738fd11082de0439b200534259eb_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-operator-rhel9@sha256:f1b1f5044db6bb945584f9d4f31d020597725a286ef368ed0aca2116abb31beb_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-wait-for-vmi-status-rhel9@sha256:39a15d03f113735df03b1a7408227eb9604d942c1f3c1992bcdc7eaf07662711_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-wait-for-vmi-status-rhel9@sha256:afb68af076954fcd18c7a4a1464ea0c2a766e8282eae980051906ed07eaa1707_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-template-validator-rhel9@sha256:02b22c7e7014b5e72d47fed8b6a268cf307638c5510adf3916c51f7f40a52a08_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-template-validator-rhel9@sha256:c0264b9271e602f85b2040ef7f207cdfa46038dc4fa6e4738bf196ef88a71cf8_amd64",
"9Base-CNV-4.13:container-native-virtualization/libguestfs-tools-rhel9@sha256:29ae84575bbca24553cf649256759fd96ff286971d80bc2db129154a7df9b283_amd64",
"9Base-CNV-4.13:container-native-virtualization/libguestfs-tools-rhel9@sha256:6558f60343e068b032167e2340b2c549c5f0258acc5d2614b60966ce79408b01_arm64",
"9Base-CNV-4.13:container-native-virtualization/multus-dynamic-networks-rhel9@sha256:3ecb0162a4b01d1590bf209d717b32a4f0835910d9979823f18c24acba41b503_arm64",
"9Base-CNV-4.13:container-native-virtualization/multus-dynamic-networks-rhel9@sha256:b7f68b6420009e21380d32d6459193aae45e93be9533debe17cb3108571b36b8_amd64",
"9Base-CNV-4.13:container-native-virtualization/ovs-cni-plugin-rhel9@sha256:0f1d372f418744e0aff59ecb0a38f53178aac9c2e9eecfd38aa25ed83e0d1360_arm64",
"9Base-CNV-4.13:container-native-virtualization/ovs-cni-plugin-rhel9@sha256:e8e7a44edbf1713fe74de5c4b8f691cce78f4440c4a32a16ba9ad16694a55396_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-api-rhel9@sha256:e68416321ca8c74a547b3d35897f54813c03481143e402e9bdc4daf315e35b5d_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-api-rhel9@sha256:fdb4ca1bb8b310d713d9c7e88f7d091f4460aa942dbeca5ebcf17281a06daffe_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-artifacts-server-rhel9@sha256:33d11c1832b49df39c1fca62bad40dbc5c30a452248339aaef449ac99509accb_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-artifacts-server-rhel9@sha256:81fc61b714baecb5a89fa6c0749c14566e0661b8e184ca602fc2e03b9cf431ee_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-apiserver-rhel9@sha256:f6128a63344ed2129f5bce648ddcfaa2869d31cde4b93328d3c22534b97ade10_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-apiserver-rhel9@sha256:feca273a691d09445c6cff6d36b5d590735e867656a9898ce0d89744d98e8006_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-cloner-rhel9@sha256:68e3b9b0291b4fb277ac430269ffce11d13b0a7688cf2ffcdb7f98759c36b4db_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-cloner-rhel9@sha256:6ac212767481bef64d8a7d0252bb8089c0f9751fad4a355aef71bd49dad2ad07_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-controller-rhel9@sha256:65f5263275d9f0a12b8fb057d82adf678778039ec873ca9bde182dea3413c9f1_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-controller-rhel9@sha256:d9e62b2019328be258489ac852eef25f8b1233f29abac6bcea5b406329f97fed_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-importer-rhel9@sha256:00a6d9d24ca1466d450b02269ec3144fc7550f0e5c696e869fbf7ce10cae6093_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-importer-rhel9@sha256:2df07fb21a3575e74aa16ded20129828f2300cd33e8ab369b0362062d49e62d0_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-operator-rhel9@sha256:20ec064750faedd97d11b797c8c1d9a1db5d60d7d76e82e65cfd05eb79d65e29_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-operator-rhel9@sha256:802ee8923d9d8e406b23911406f9748756c0ef4d6954e9e2fd5fb4bdf91dde9a_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-uploadproxy-rhel9@sha256:392d0f61f462c707adfdc21e4239c5c09d8520a80486b41d9d9ae479267d6124_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-uploadproxy-rhel9@sha256:6775f34353eec8f35bead9411dde155530d079bb8d51582fb1f2aacc27dbde1d_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-uploadserver-rhel9@sha256:4528c24672689cfb6505761b6b108fbcc04488192733f23d2bfe39cd42a1d743_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-uploadserver-rhel9@sha256:b22048390387380af94e267c8a9a66813c515997456d59d8ebac1486916b6585_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-controller-rhel9@sha256:3e7880149ee9a68286e390beb3d9779f7403c30fc5136e5370e0e4690a3fd243_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-controller-rhel9@sha256:970edc281d7a731e9f7e8c2d4440fe48a221e5e355d5235c5413b4c3adb28503_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-exportproxy-rhel9@sha256:1bda34d5bff734ad997202f29a5ff6f7362fd79fa90511a422442ef2e3681198_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-exportproxy-rhel9@sha256:de3c4afbf7669b98517cbef2490ec186f0553dd97b05bed80ec36dd883fe507b_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-exportserver-rhel9@sha256:3f7f98645176d42c63cca5c0fc3182a03121af87446ca421b6c72baf07dfca0d_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-exportserver-rhel9@sha256:8f12955cd777eb2409037a6968aa92f50c99d6e07e722951dbcfd0c8c9829b5e_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-handler-rhel9@sha256:5fc47110d866d8048aec50689090ce10705d19d3bb48d2b06727d6d569003af7_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-handler-rhel9@sha256:84ba79ae9658699147d2493df2582ab6df10adbff4d44a533c3fe6a9f45f9691_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-launcher-rhel9@sha256:4990d40d9987d5126d105dd45be2501eaded248cb61bdde5ea8d359bc1e7ebef_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-launcher-rhel9@sha256:95aeacb98209e0baef27ce0e02fbac38d693cea74808fc77107efda0f344bcb5_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-operator-rhel9@sha256:5c1a7e4ed2061938987b900a2394f07121d4037350c9bb6485213a2adfea787d_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-operator-rhel9@sha256:66b1b3b379121d6411ba22283e7d991617177330c93746d37753ab7812b9a00b_arm64",
"9Base-CNV-4.13:container-native-virtualization/virtio-win-rhel9@sha256:8735f51da918408a8826601c082d1b29accf26d59b9978da89b980cb509c1102_arm64",
"9Base-CNV-4.13:container-native-virtualization/virtio-win-rhel9@sha256:d147d2a6eb6f907d1e88f61aaca83596853bc72164583d6dda2b1154b490de25_amd64",
"9Base-CNV-4.13:container-native-virtualization/vm-console-proxy-rhel9@sha256:70a8d0cd66182c25e02679540bae1368b2a9cf687532b58dba41ef30c5ca00c1_arm64",
"9Base-CNV-4.13:container-native-virtualization/vm-console-proxy-rhel9@sha256:7ca921f98f6d81a126907127a611146fb53397869a628678faa1e289c01d22b2_amd64",
"9Base-CNV-4.13:container-native-virtualization/vm-network-latency-checkup-rhel9@sha256:503ea7ac914a9b54e9d665a0227ee0b5d5200cdb5d692aa94c07dd1518d91b70_arm64",
"9Base-CNV-4.13:container-native-virtualization/vm-network-latency-checkup-rhel9@sha256:59fd965975bccf641a0fa7aa01374d45057bd03cda7528248a84b60b1205bf57_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:3205"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"9Base-CNV-4.13:container-native-virtualization/bridge-marker-rhel9@sha256:8eac196b30a648989cdca5cb153a3bc3d34e47339acba0e4f760bd366496c99d_amd64",
"9Base-CNV-4.13:container-native-virtualization/bridge-marker-rhel9@sha256:e8a55aee3d75a316bb0d7a554c737198823df04b3c05e481c17e45eb2153bced_arm64",
"9Base-CNV-4.13:container-native-virtualization/cluster-network-addons-operator-rhel9@sha256:3bff33e3f40cd1e2b519c2db56734d4bb8df883e155c2f20b1cb9d3d184daec1_amd64",
"9Base-CNV-4.13:container-native-virtualization/cluster-network-addons-operator-rhel9@sha256:f439d2f420bb59eb1d5af14ce2002648d0cfc155d1a1466c8aac9b661fe902b8_arm64",
"9Base-CNV-4.13:container-native-virtualization/cnv-containernetworking-plugins-rhel9@sha256:89f22e541f61a660c9aa9f38ef58e80b84a0517f74e84292107fc252c25465c9_arm64",
"9Base-CNV-4.13:container-native-virtualization/cnv-containernetworking-plugins-rhel9@sha256:bf471997e54e4a75b0d71f492ab295787fdbb14d8c85c4ea8c03f0552dbc3755_amd64",
"9Base-CNV-4.13:container-native-virtualization/cnv-must-gather-rhel9@sha256:9e8efd76924958eb605401abdac08eba97fb83a1ada383bc87a7fb7c87b3a455_arm64",
"9Base-CNV-4.13:container-native-virtualization/cnv-must-gather-rhel9@sha256:b9fc32b5fabedd65a4c3a471879c808af2087277de4278adaa115a732f0468da_amd64",
"9Base-CNV-4.13:container-native-virtualization/hco-bundle-registry-rhel9@sha256:60e89d7a99ff9f20e974430b802dd724a3bb6fa1e01e5a62daad98ac487b3063_amd64",
"9Base-CNV-4.13:container-native-virtualization/hco-bundle-registry-rhel9@sha256:dd20b138045ef1424d83a47e7abcfcbb2ac54577dcec5ed3c186390aaa4c9d84_arm64",
"9Base-CNV-4.13:container-native-virtualization/hostpath-csi-driver-rhel9@sha256:61e2824853d51347593ad909a5e546cd92e4216d6a1df5dffb50dd9cba277cce_amd64",
"9Base-CNV-4.13:container-native-virtualization/hostpath-csi-driver-rhel9@sha256:676d4c23a5f60dd331728af056b0a6b2d3358ac88da23299b1a98dfaca8f288e_arm64",
"9Base-CNV-4.13:container-native-virtualization/hostpath-provisioner-operator-rhel9@sha256:515be94be496c67f5b8fd5f4832fe4385e56476e6589897d6b9fbb9bb2b00f32_amd64",
"9Base-CNV-4.13:container-native-virtualization/hostpath-provisioner-operator-rhel9@sha256:571ae805641dea11646028c946039983c7fd82f138b915dcb8b80c39b465e63c_arm64",
"9Base-CNV-4.13:container-native-virtualization/hostpath-provisioner-rhel9@sha256:ac3fe350bedd6bc43596444ba0f279ccf8a144ab14ac5a9b80ea71c46390b7b4_amd64",
"9Base-CNV-4.13:container-native-virtualization/hostpath-provisioner-rhel9@sha256:d4ed87745b7ee2acca2d83e2c91c2f6dced1903c81495b50f2559b3ba2dde287_arm64",
"9Base-CNV-4.13:container-native-virtualization/hyperconverged-cluster-operator-rhel9@sha256:e5ab9f3be59d3568e3d672ab374efb16990ccf92192eac4e1244b10fcd7423e2_amd64",
"9Base-CNV-4.13:container-native-virtualization/hyperconverged-cluster-operator-rhel9@sha256:e681560b184189df03fc84c8a712f32289f42573dd348cda394b19565eb6eca8_arm64",
"9Base-CNV-4.13:container-native-virtualization/hyperconverged-cluster-webhook-rhel9@sha256:06d036d320b3027bb8370bb8e0f6fe8c9f0ec9bca7aac3b5c53698ba4a170042_arm64",
"9Base-CNV-4.13:container-native-virtualization/hyperconverged-cluster-webhook-rhel9@sha256:b5a01336180aad017df62cf8e652f2491b8263ba7e4dd07f858db1ef1924cf2f_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubemacpool-rhel9@sha256:4d190d81eeb3fbe9ed56cf3548dc83a3f81641bfdafa7b42dcfb0d2512566644_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubemacpool-rhel9@sha256:59862a59854f0d5b83dc25ba119f9586a8aff42b6e60d1922f8ae7b4567309ff_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubesecondarydns-rhel9@sha256:121d30d78cc57731ea2242ef2c32430890ac66c2723e65608d5e2f26c3f515cd_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubesecondarydns-rhel9@sha256:b1838f3c8ba3d8113bddea17b78c21e1c1490e2a4a07ea77014edee523d06347_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-console-plugin-rhel9@sha256:86a4b1e3d6ad1d56302c9c058f8bc5826dcfe6c46fb3e0ddaa06818645039020_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-console-plugin-rhel9@sha256:ffb2acd9ae09c1ef9ca756f5eaf6087d0a3957cfc824543949d25f556a97744d_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-dpdk-checkup-rhel9@sha256:525aceb9396010ebcdba14040f267889b807cd84db8e5b4030429b51f0fbf5fe_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-dpdk-checkup-rhel9@sha256:553c4686f56c66cc1e3c5ad9d4051f139d43f821eac3abb98ca5cdb8b5dfe202_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-ssp-operator-rhel9@sha256:901e6cad9534c7bd7c4018c60bccfe49d7280fba5a9901ab4c4d15e9345288c4_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-ssp-operator-rhel9@sha256:badeb0f65f543b209f6af761729d9778b7b73b97d55044016dfba3f38a1f6f18_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-cleanup-vm-rhel9@sha256:28e4975fa4dac22d9da32ed2a10aed039fd957b30140daa36bab2caa998be77a_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-cleanup-vm-rhel9@sha256:b0ff7e812a576ea848590655fc13a85832d5a39f68e7769ceab9da6949da88c7_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-copy-template-rhel9@sha256:4916a6c6b1f9b529187d3b4d5fc99b90157993767b3fe2ad36a9ec77fbb46b10_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-copy-template-rhel9@sha256:f71c36442f1b61cdde7ec58d2c3c78d2039f6d6108e6c35388ef7c1650971fa1_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-create-datavolume-rhel9@sha256:2ad49cf6e2242a9e5861929d9bcab1305a7fc4e34e708f99cff1d7253aa46167_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-create-datavolume-rhel9@sha256:7112400a4ecb23ee2110bf96372fcf9f96ad648a51aa944627b40eb59539a660_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-create-vm-from-template-rhel9@sha256:1411c65bbad7302710788327f6964a4bf5bc20ef70d5e46f4a5c6e7a0e7a0161_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-create-vm-from-template-rhel9@sha256:4d962618aa95600c60c9fc8b890186e510de91177d51949e12797a3558e31328_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-customize-rhel9@sha256:5c23d3f20ea9dcbe7109284d73078ecd516a070e964b844f8d80b1d92ebd55ee_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-customize-rhel9@sha256:a780244e48c6d4f87446d3754c3eb9ab79c0d54675c189da4a659f7a4d5668ea_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-sysprep-rhel9@sha256:84577d949a1bbcaa291c70729127bca4a8994df03068666baa23840877ea8392_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-sysprep-rhel9@sha256:aed630a597a090179e1b0e0c117e536df06b67d0f793f91936aa7388c0c5d7eb_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-modify-vm-template-rhel9@sha256:31d959b80cf57462e1705684bb7e1b78af26bd2c62f1c9e4e51e1d02199b05a8_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-modify-vm-template-rhel9@sha256:66aea526bc10e4c0136ba86e394bbdfe4fbd7f757d6f391a561b51d2ba2f4d46_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-operator-rhel9@sha256:d0cf0e81589f0938de45961eaddfc5ec4782738fd11082de0439b200534259eb_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-operator-rhel9@sha256:f1b1f5044db6bb945584f9d4f31d020597725a286ef368ed0aca2116abb31beb_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-wait-for-vmi-status-rhel9@sha256:39a15d03f113735df03b1a7408227eb9604d942c1f3c1992bcdc7eaf07662711_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-wait-for-vmi-status-rhel9@sha256:afb68af076954fcd18c7a4a1464ea0c2a766e8282eae980051906ed07eaa1707_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-template-validator-rhel9@sha256:02b22c7e7014b5e72d47fed8b6a268cf307638c5510adf3916c51f7f40a52a08_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-template-validator-rhel9@sha256:c0264b9271e602f85b2040ef7f207cdfa46038dc4fa6e4738bf196ef88a71cf8_amd64",
"9Base-CNV-4.13:container-native-virtualization/libguestfs-tools-rhel9@sha256:29ae84575bbca24553cf649256759fd96ff286971d80bc2db129154a7df9b283_amd64",
"9Base-CNV-4.13:container-native-virtualization/libguestfs-tools-rhel9@sha256:6558f60343e068b032167e2340b2c549c5f0258acc5d2614b60966ce79408b01_arm64",
"9Base-CNV-4.13:container-native-virtualization/multus-dynamic-networks-rhel9@sha256:3ecb0162a4b01d1590bf209d717b32a4f0835910d9979823f18c24acba41b503_arm64",
"9Base-CNV-4.13:container-native-virtualization/multus-dynamic-networks-rhel9@sha256:b7f68b6420009e21380d32d6459193aae45e93be9533debe17cb3108571b36b8_amd64",
"9Base-CNV-4.13:container-native-virtualization/ovs-cni-plugin-rhel9@sha256:0f1d372f418744e0aff59ecb0a38f53178aac9c2e9eecfd38aa25ed83e0d1360_arm64",
"9Base-CNV-4.13:container-native-virtualization/ovs-cni-plugin-rhel9@sha256:e8e7a44edbf1713fe74de5c4b8f691cce78f4440c4a32a16ba9ad16694a55396_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-api-rhel9@sha256:e68416321ca8c74a547b3d35897f54813c03481143e402e9bdc4daf315e35b5d_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-api-rhel9@sha256:fdb4ca1bb8b310d713d9c7e88f7d091f4460aa942dbeca5ebcf17281a06daffe_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-artifacts-server-rhel9@sha256:33d11c1832b49df39c1fca62bad40dbc5c30a452248339aaef449ac99509accb_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-artifacts-server-rhel9@sha256:81fc61b714baecb5a89fa6c0749c14566e0661b8e184ca602fc2e03b9cf431ee_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-apiserver-rhel9@sha256:f6128a63344ed2129f5bce648ddcfaa2869d31cde4b93328d3c22534b97ade10_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-apiserver-rhel9@sha256:feca273a691d09445c6cff6d36b5d590735e867656a9898ce0d89744d98e8006_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-cloner-rhel9@sha256:68e3b9b0291b4fb277ac430269ffce11d13b0a7688cf2ffcdb7f98759c36b4db_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-cloner-rhel9@sha256:6ac212767481bef64d8a7d0252bb8089c0f9751fad4a355aef71bd49dad2ad07_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-controller-rhel9@sha256:65f5263275d9f0a12b8fb057d82adf678778039ec873ca9bde182dea3413c9f1_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-controller-rhel9@sha256:d9e62b2019328be258489ac852eef25f8b1233f29abac6bcea5b406329f97fed_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-importer-rhel9@sha256:00a6d9d24ca1466d450b02269ec3144fc7550f0e5c696e869fbf7ce10cae6093_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-importer-rhel9@sha256:2df07fb21a3575e74aa16ded20129828f2300cd33e8ab369b0362062d49e62d0_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-operator-rhel9@sha256:20ec064750faedd97d11b797c8c1d9a1db5d60d7d76e82e65cfd05eb79d65e29_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-operator-rhel9@sha256:802ee8923d9d8e406b23911406f9748756c0ef4d6954e9e2fd5fb4bdf91dde9a_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-uploadproxy-rhel9@sha256:392d0f61f462c707adfdc21e4239c5c09d8520a80486b41d9d9ae479267d6124_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-uploadproxy-rhel9@sha256:6775f34353eec8f35bead9411dde155530d079bb8d51582fb1f2aacc27dbde1d_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-uploadserver-rhel9@sha256:4528c24672689cfb6505761b6b108fbcc04488192733f23d2bfe39cd42a1d743_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-uploadserver-rhel9@sha256:b22048390387380af94e267c8a9a66813c515997456d59d8ebac1486916b6585_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-controller-rhel9@sha256:3e7880149ee9a68286e390beb3d9779f7403c30fc5136e5370e0e4690a3fd243_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-controller-rhel9@sha256:970edc281d7a731e9f7e8c2d4440fe48a221e5e355d5235c5413b4c3adb28503_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-exportproxy-rhel9@sha256:1bda34d5bff734ad997202f29a5ff6f7362fd79fa90511a422442ef2e3681198_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-exportproxy-rhel9@sha256:de3c4afbf7669b98517cbef2490ec186f0553dd97b05bed80ec36dd883fe507b_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-exportserver-rhel9@sha256:3f7f98645176d42c63cca5c0fc3182a03121af87446ca421b6c72baf07dfca0d_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-exportserver-rhel9@sha256:8f12955cd777eb2409037a6968aa92f50c99d6e07e722951dbcfd0c8c9829b5e_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-handler-rhel9@sha256:5fc47110d866d8048aec50689090ce10705d19d3bb48d2b06727d6d569003af7_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-handler-rhel9@sha256:84ba79ae9658699147d2493df2582ab6df10adbff4d44a533c3fe6a9f45f9691_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-launcher-rhel9@sha256:4990d40d9987d5126d105dd45be2501eaded248cb61bdde5ea8d359bc1e7ebef_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-launcher-rhel9@sha256:95aeacb98209e0baef27ce0e02fbac38d693cea74808fc77107efda0f344bcb5_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-operator-rhel9@sha256:5c1a7e4ed2061938987b900a2394f07121d4037350c9bb6485213a2adfea787d_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-operator-rhel9@sha256:66b1b3b379121d6411ba22283e7d991617177330c93746d37753ab7812b9a00b_arm64",
"9Base-CNV-4.13:container-native-virtualization/virtio-win-rhel9@sha256:8735f51da918408a8826601c082d1b29accf26d59b9978da89b980cb509c1102_arm64",
"9Base-CNV-4.13:container-native-virtualization/virtio-win-rhel9@sha256:d147d2a6eb6f907d1e88f61aaca83596853bc72164583d6dda2b1154b490de25_amd64",
"9Base-CNV-4.13:container-native-virtualization/vm-console-proxy-rhel9@sha256:70a8d0cd66182c25e02679540bae1368b2a9cf687532b58dba41ef30c5ca00c1_arm64",
"9Base-CNV-4.13:container-native-virtualization/vm-console-proxy-rhel9@sha256:7ca921f98f6d81a126907127a611146fb53397869a628678faa1e289c01d22b2_amd64",
"9Base-CNV-4.13:container-native-virtualization/vm-network-latency-checkup-rhel9@sha256:503ea7ac914a9b54e9d665a0227ee0b5d5200cdb5d692aa94c07dd1518d91b70_arm64",
"9Base-CNV-4.13:container-native-virtualization/vm-network-latency-checkup-rhel9@sha256:59fd965975bccf641a0fa7aa01374d45057bd03cda7528248a84b60b1205bf57_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "golang: regexp/syntax: limit memory used by parsing regexps"
},
{
"cve": "CVE-2022-41717",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"discovery_date": "2023-01-16T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2161274"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the net/http library of the golang package. This flaw allows an attacker to cause excessive memory growth in a Go server accepting HTTP/2 requests. HTTP/2 server connections contain a cache of HTTP header keys sent by the client. While the total number of entries in this cache is capped, an attacker sending very large keys can cause the server to allocate approximately 64 MiB per open connection.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: net/http: excessive memory growth in a Go server accepting HTTP/2 requests",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Within Red Hat OpenShift Container Platform, the grafana container is listed as will not fix. Since OCP 4.10, Grafana itself is not shipped and the Grafana web server is protected behind an OAuth proxy server.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"9Base-CNV-4.13:container-native-virtualization/bridge-marker-rhel9@sha256:8eac196b30a648989cdca5cb153a3bc3d34e47339acba0e4f760bd366496c99d_amd64",
"9Base-CNV-4.13:container-native-virtualization/bridge-marker-rhel9@sha256:e8a55aee3d75a316bb0d7a554c737198823df04b3c05e481c17e45eb2153bced_arm64",
"9Base-CNV-4.13:container-native-virtualization/cluster-network-addons-operator-rhel9@sha256:3bff33e3f40cd1e2b519c2db56734d4bb8df883e155c2f20b1cb9d3d184daec1_amd64",
"9Base-CNV-4.13:container-native-virtualization/cluster-network-addons-operator-rhel9@sha256:f439d2f420bb59eb1d5af14ce2002648d0cfc155d1a1466c8aac9b661fe902b8_arm64",
"9Base-CNV-4.13:container-native-virtualization/cnv-containernetworking-plugins-rhel9@sha256:89f22e541f61a660c9aa9f38ef58e80b84a0517f74e84292107fc252c25465c9_arm64",
"9Base-CNV-4.13:container-native-virtualization/cnv-containernetworking-plugins-rhel9@sha256:bf471997e54e4a75b0d71f492ab295787fdbb14d8c85c4ea8c03f0552dbc3755_amd64",
"9Base-CNV-4.13:container-native-virtualization/cnv-must-gather-rhel9@sha256:9e8efd76924958eb605401abdac08eba97fb83a1ada383bc87a7fb7c87b3a455_arm64",
"9Base-CNV-4.13:container-native-virtualization/cnv-must-gather-rhel9@sha256:b9fc32b5fabedd65a4c3a471879c808af2087277de4278adaa115a732f0468da_amd64",
"9Base-CNV-4.13:container-native-virtualization/hco-bundle-registry-rhel9@sha256:60e89d7a99ff9f20e974430b802dd724a3bb6fa1e01e5a62daad98ac487b3063_amd64",
"9Base-CNV-4.13:container-native-virtualization/hco-bundle-registry-rhel9@sha256:dd20b138045ef1424d83a47e7abcfcbb2ac54577dcec5ed3c186390aaa4c9d84_arm64",
"9Base-CNV-4.13:container-native-virtualization/hostpath-csi-driver-rhel9@sha256:61e2824853d51347593ad909a5e546cd92e4216d6a1df5dffb50dd9cba277cce_amd64",
"9Base-CNV-4.13:container-native-virtualization/hostpath-csi-driver-rhel9@sha256:676d4c23a5f60dd331728af056b0a6b2d3358ac88da23299b1a98dfaca8f288e_arm64",
"9Base-CNV-4.13:container-native-virtualization/hostpath-provisioner-operator-rhel9@sha256:515be94be496c67f5b8fd5f4832fe4385e56476e6589897d6b9fbb9bb2b00f32_amd64",
"9Base-CNV-4.13:container-native-virtualization/hostpath-provisioner-operator-rhel9@sha256:571ae805641dea11646028c946039983c7fd82f138b915dcb8b80c39b465e63c_arm64",
"9Base-CNV-4.13:container-native-virtualization/hostpath-provisioner-rhel9@sha256:ac3fe350bedd6bc43596444ba0f279ccf8a144ab14ac5a9b80ea71c46390b7b4_amd64",
"9Base-CNV-4.13:container-native-virtualization/hostpath-provisioner-rhel9@sha256:d4ed87745b7ee2acca2d83e2c91c2f6dced1903c81495b50f2559b3ba2dde287_arm64",
"9Base-CNV-4.13:container-native-virtualization/hyperconverged-cluster-operator-rhel9@sha256:e5ab9f3be59d3568e3d672ab374efb16990ccf92192eac4e1244b10fcd7423e2_amd64",
"9Base-CNV-4.13:container-native-virtualization/hyperconverged-cluster-operator-rhel9@sha256:e681560b184189df03fc84c8a712f32289f42573dd348cda394b19565eb6eca8_arm64",
"9Base-CNV-4.13:container-native-virtualization/hyperconverged-cluster-webhook-rhel9@sha256:06d036d320b3027bb8370bb8e0f6fe8c9f0ec9bca7aac3b5c53698ba4a170042_arm64",
"9Base-CNV-4.13:container-native-virtualization/hyperconverged-cluster-webhook-rhel9@sha256:b5a01336180aad017df62cf8e652f2491b8263ba7e4dd07f858db1ef1924cf2f_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubemacpool-rhel9@sha256:4d190d81eeb3fbe9ed56cf3548dc83a3f81641bfdafa7b42dcfb0d2512566644_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubemacpool-rhel9@sha256:59862a59854f0d5b83dc25ba119f9586a8aff42b6e60d1922f8ae7b4567309ff_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubesecondarydns-rhel9@sha256:121d30d78cc57731ea2242ef2c32430890ac66c2723e65608d5e2f26c3f515cd_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubesecondarydns-rhel9@sha256:b1838f3c8ba3d8113bddea17b78c21e1c1490e2a4a07ea77014edee523d06347_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-console-plugin-rhel9@sha256:86a4b1e3d6ad1d56302c9c058f8bc5826dcfe6c46fb3e0ddaa06818645039020_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-console-plugin-rhel9@sha256:ffb2acd9ae09c1ef9ca756f5eaf6087d0a3957cfc824543949d25f556a97744d_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-dpdk-checkup-rhel9@sha256:525aceb9396010ebcdba14040f267889b807cd84db8e5b4030429b51f0fbf5fe_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-dpdk-checkup-rhel9@sha256:553c4686f56c66cc1e3c5ad9d4051f139d43f821eac3abb98ca5cdb8b5dfe202_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-ssp-operator-rhel9@sha256:901e6cad9534c7bd7c4018c60bccfe49d7280fba5a9901ab4c4d15e9345288c4_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-ssp-operator-rhel9@sha256:badeb0f65f543b209f6af761729d9778b7b73b97d55044016dfba3f38a1f6f18_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-cleanup-vm-rhel9@sha256:28e4975fa4dac22d9da32ed2a10aed039fd957b30140daa36bab2caa998be77a_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-cleanup-vm-rhel9@sha256:b0ff7e812a576ea848590655fc13a85832d5a39f68e7769ceab9da6949da88c7_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-copy-template-rhel9@sha256:4916a6c6b1f9b529187d3b4d5fc99b90157993767b3fe2ad36a9ec77fbb46b10_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-copy-template-rhel9@sha256:f71c36442f1b61cdde7ec58d2c3c78d2039f6d6108e6c35388ef7c1650971fa1_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-create-datavolume-rhel9@sha256:2ad49cf6e2242a9e5861929d9bcab1305a7fc4e34e708f99cff1d7253aa46167_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-create-datavolume-rhel9@sha256:7112400a4ecb23ee2110bf96372fcf9f96ad648a51aa944627b40eb59539a660_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-create-vm-from-template-rhel9@sha256:1411c65bbad7302710788327f6964a4bf5bc20ef70d5e46f4a5c6e7a0e7a0161_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-create-vm-from-template-rhel9@sha256:4d962618aa95600c60c9fc8b890186e510de91177d51949e12797a3558e31328_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-customize-rhel9@sha256:5c23d3f20ea9dcbe7109284d73078ecd516a070e964b844f8d80b1d92ebd55ee_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-customize-rhel9@sha256:a780244e48c6d4f87446d3754c3eb9ab79c0d54675c189da4a659f7a4d5668ea_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-sysprep-rhel9@sha256:84577d949a1bbcaa291c70729127bca4a8994df03068666baa23840877ea8392_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-sysprep-rhel9@sha256:aed630a597a090179e1b0e0c117e536df06b67d0f793f91936aa7388c0c5d7eb_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-modify-vm-template-rhel9@sha256:31d959b80cf57462e1705684bb7e1b78af26bd2c62f1c9e4e51e1d02199b05a8_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-modify-vm-template-rhel9@sha256:66aea526bc10e4c0136ba86e394bbdfe4fbd7f757d6f391a561b51d2ba2f4d46_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-operator-rhel9@sha256:d0cf0e81589f0938de45961eaddfc5ec4782738fd11082de0439b200534259eb_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-operator-rhel9@sha256:f1b1f5044db6bb945584f9d4f31d020597725a286ef368ed0aca2116abb31beb_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-wait-for-vmi-status-rhel9@sha256:39a15d03f113735df03b1a7408227eb9604d942c1f3c1992bcdc7eaf07662711_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-wait-for-vmi-status-rhel9@sha256:afb68af076954fcd18c7a4a1464ea0c2a766e8282eae980051906ed07eaa1707_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-template-validator-rhel9@sha256:02b22c7e7014b5e72d47fed8b6a268cf307638c5510adf3916c51f7f40a52a08_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-template-validator-rhel9@sha256:c0264b9271e602f85b2040ef7f207cdfa46038dc4fa6e4738bf196ef88a71cf8_amd64",
"9Base-CNV-4.13:container-native-virtualization/libguestfs-tools-rhel9@sha256:29ae84575bbca24553cf649256759fd96ff286971d80bc2db129154a7df9b283_amd64",
"9Base-CNV-4.13:container-native-virtualization/libguestfs-tools-rhel9@sha256:6558f60343e068b032167e2340b2c549c5f0258acc5d2614b60966ce79408b01_arm64",
"9Base-CNV-4.13:container-native-virtualization/multus-dynamic-networks-rhel9@sha256:3ecb0162a4b01d1590bf209d717b32a4f0835910d9979823f18c24acba41b503_arm64",
"9Base-CNV-4.13:container-native-virtualization/multus-dynamic-networks-rhel9@sha256:b7f68b6420009e21380d32d6459193aae45e93be9533debe17cb3108571b36b8_amd64",
"9Base-CNV-4.13:container-native-virtualization/ovs-cni-plugin-rhel9@sha256:0f1d372f418744e0aff59ecb0a38f53178aac9c2e9eecfd38aa25ed83e0d1360_arm64",
"9Base-CNV-4.13:container-native-virtualization/ovs-cni-plugin-rhel9@sha256:e8e7a44edbf1713fe74de5c4b8f691cce78f4440c4a32a16ba9ad16694a55396_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-api-rhel9@sha256:e68416321ca8c74a547b3d35897f54813c03481143e402e9bdc4daf315e35b5d_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-api-rhel9@sha256:fdb4ca1bb8b310d713d9c7e88f7d091f4460aa942dbeca5ebcf17281a06daffe_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-artifacts-server-rhel9@sha256:33d11c1832b49df39c1fca62bad40dbc5c30a452248339aaef449ac99509accb_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-artifacts-server-rhel9@sha256:81fc61b714baecb5a89fa6c0749c14566e0661b8e184ca602fc2e03b9cf431ee_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-apiserver-rhel9@sha256:f6128a63344ed2129f5bce648ddcfaa2869d31cde4b93328d3c22534b97ade10_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-apiserver-rhel9@sha256:feca273a691d09445c6cff6d36b5d590735e867656a9898ce0d89744d98e8006_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-cloner-rhel9@sha256:68e3b9b0291b4fb277ac430269ffce11d13b0a7688cf2ffcdb7f98759c36b4db_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-cloner-rhel9@sha256:6ac212767481bef64d8a7d0252bb8089c0f9751fad4a355aef71bd49dad2ad07_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-controller-rhel9@sha256:65f5263275d9f0a12b8fb057d82adf678778039ec873ca9bde182dea3413c9f1_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-controller-rhel9@sha256:d9e62b2019328be258489ac852eef25f8b1233f29abac6bcea5b406329f97fed_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-importer-rhel9@sha256:00a6d9d24ca1466d450b02269ec3144fc7550f0e5c696e869fbf7ce10cae6093_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-importer-rhel9@sha256:2df07fb21a3575e74aa16ded20129828f2300cd33e8ab369b0362062d49e62d0_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-operator-rhel9@sha256:20ec064750faedd97d11b797c8c1d9a1db5d60d7d76e82e65cfd05eb79d65e29_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-operator-rhel9@sha256:802ee8923d9d8e406b23911406f9748756c0ef4d6954e9e2fd5fb4bdf91dde9a_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-uploadproxy-rhel9@sha256:392d0f61f462c707adfdc21e4239c5c09d8520a80486b41d9d9ae479267d6124_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-uploadproxy-rhel9@sha256:6775f34353eec8f35bead9411dde155530d079bb8d51582fb1f2aacc27dbde1d_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-uploadserver-rhel9@sha256:4528c24672689cfb6505761b6b108fbcc04488192733f23d2bfe39cd42a1d743_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-uploadserver-rhel9@sha256:b22048390387380af94e267c8a9a66813c515997456d59d8ebac1486916b6585_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-controller-rhel9@sha256:3e7880149ee9a68286e390beb3d9779f7403c30fc5136e5370e0e4690a3fd243_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-controller-rhel9@sha256:970edc281d7a731e9f7e8c2d4440fe48a221e5e355d5235c5413b4c3adb28503_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-exportproxy-rhel9@sha256:1bda34d5bff734ad997202f29a5ff6f7362fd79fa90511a422442ef2e3681198_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-exportproxy-rhel9@sha256:de3c4afbf7669b98517cbef2490ec186f0553dd97b05bed80ec36dd883fe507b_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-exportserver-rhel9@sha256:3f7f98645176d42c63cca5c0fc3182a03121af87446ca421b6c72baf07dfca0d_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-exportserver-rhel9@sha256:8f12955cd777eb2409037a6968aa92f50c99d6e07e722951dbcfd0c8c9829b5e_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-handler-rhel9@sha256:5fc47110d866d8048aec50689090ce10705d19d3bb48d2b06727d6d569003af7_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-handler-rhel9@sha256:84ba79ae9658699147d2493df2582ab6df10adbff4d44a533c3fe6a9f45f9691_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-launcher-rhel9@sha256:4990d40d9987d5126d105dd45be2501eaded248cb61bdde5ea8d359bc1e7ebef_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-launcher-rhel9@sha256:95aeacb98209e0baef27ce0e02fbac38d693cea74808fc77107efda0f344bcb5_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-operator-rhel9@sha256:5c1a7e4ed2061938987b900a2394f07121d4037350c9bb6485213a2adfea787d_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-operator-rhel9@sha256:66b1b3b379121d6411ba22283e7d991617177330c93746d37753ab7812b9a00b_arm64",
"9Base-CNV-4.13:container-native-virtualization/virtio-win-rhel9@sha256:8735f51da918408a8826601c082d1b29accf26d59b9978da89b980cb509c1102_arm64",
"9Base-CNV-4.13:container-native-virtualization/virtio-win-rhel9@sha256:d147d2a6eb6f907d1e88f61aaca83596853bc72164583d6dda2b1154b490de25_amd64",
"9Base-CNV-4.13:container-native-virtualization/vm-console-proxy-rhel9@sha256:70a8d0cd66182c25e02679540bae1368b2a9cf687532b58dba41ef30c5ca00c1_arm64",
"9Base-CNV-4.13:container-native-virtualization/vm-console-proxy-rhel9@sha256:7ca921f98f6d81a126907127a611146fb53397869a628678faa1e289c01d22b2_amd64",
"9Base-CNV-4.13:container-native-virtualization/vm-network-latency-checkup-rhel9@sha256:503ea7ac914a9b54e9d665a0227ee0b5d5200cdb5d692aa94c07dd1518d91b70_arm64",
"9Base-CNV-4.13:container-native-virtualization/vm-network-latency-checkup-rhel9@sha256:59fd965975bccf641a0fa7aa01374d45057bd03cda7528248a84b60b1205bf57_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-41717"
},
{
"category": "external",
"summary": "RHBZ#2161274",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2161274"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-41717",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41717"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-41717",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-41717"
},
{
"category": "external",
"summary": "https://go.dev/cl/455635",
"url": "https://go.dev/cl/455635"
},
{
"category": "external",
"summary": "https://go.dev/cl/455717",
"url": "https://go.dev/cl/455717"
},
{
"category": "external",
"summary": "https://go.dev/issue/56350",
"url": "https://go.dev/issue/56350"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/L_3rmdT0BMU/m/yZDrXjIiBQAJ",
"url": "https://groups.google.com/g/golang-announce/c/L_3rmdT0BMU/m/yZDrXjIiBQAJ"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2022-1144",
"url": "https://pkg.go.dev/vuln/GO-2022-1144"
}
],
"release_date": "2022-11-30T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-05-18T02:55:08+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"9Base-CNV-4.13:container-native-virtualization/bridge-marker-rhel9@sha256:8eac196b30a648989cdca5cb153a3bc3d34e47339acba0e4f760bd366496c99d_amd64",
"9Base-CNV-4.13:container-native-virtualization/bridge-marker-rhel9@sha256:e8a55aee3d75a316bb0d7a554c737198823df04b3c05e481c17e45eb2153bced_arm64",
"9Base-CNV-4.13:container-native-virtualization/cluster-network-addons-operator-rhel9@sha256:3bff33e3f40cd1e2b519c2db56734d4bb8df883e155c2f20b1cb9d3d184daec1_amd64",
"9Base-CNV-4.13:container-native-virtualization/cluster-network-addons-operator-rhel9@sha256:f439d2f420bb59eb1d5af14ce2002648d0cfc155d1a1466c8aac9b661fe902b8_arm64",
"9Base-CNV-4.13:container-native-virtualization/cnv-containernetworking-plugins-rhel9@sha256:89f22e541f61a660c9aa9f38ef58e80b84a0517f74e84292107fc252c25465c9_arm64",
"9Base-CNV-4.13:container-native-virtualization/cnv-containernetworking-plugins-rhel9@sha256:bf471997e54e4a75b0d71f492ab295787fdbb14d8c85c4ea8c03f0552dbc3755_amd64",
"9Base-CNV-4.13:container-native-virtualization/cnv-must-gather-rhel9@sha256:9e8efd76924958eb605401abdac08eba97fb83a1ada383bc87a7fb7c87b3a455_arm64",
"9Base-CNV-4.13:container-native-virtualization/cnv-must-gather-rhel9@sha256:b9fc32b5fabedd65a4c3a471879c808af2087277de4278adaa115a732f0468da_amd64",
"9Base-CNV-4.13:container-native-virtualization/hco-bundle-registry-rhel9@sha256:60e89d7a99ff9f20e974430b802dd724a3bb6fa1e01e5a62daad98ac487b3063_amd64",
"9Base-CNV-4.13:container-native-virtualization/hco-bundle-registry-rhel9@sha256:dd20b138045ef1424d83a47e7abcfcbb2ac54577dcec5ed3c186390aaa4c9d84_arm64",
"9Base-CNV-4.13:container-native-virtualization/hostpath-csi-driver-rhel9@sha256:61e2824853d51347593ad909a5e546cd92e4216d6a1df5dffb50dd9cba277cce_amd64",
"9Base-CNV-4.13:container-native-virtualization/hostpath-csi-driver-rhel9@sha256:676d4c23a5f60dd331728af056b0a6b2d3358ac88da23299b1a98dfaca8f288e_arm64",
"9Base-CNV-4.13:container-native-virtualization/hostpath-provisioner-operator-rhel9@sha256:515be94be496c67f5b8fd5f4832fe4385e56476e6589897d6b9fbb9bb2b00f32_amd64",
"9Base-CNV-4.13:container-native-virtualization/hostpath-provisioner-operator-rhel9@sha256:571ae805641dea11646028c946039983c7fd82f138b915dcb8b80c39b465e63c_arm64",
"9Base-CNV-4.13:container-native-virtualization/hostpath-provisioner-rhel9@sha256:ac3fe350bedd6bc43596444ba0f279ccf8a144ab14ac5a9b80ea71c46390b7b4_amd64",
"9Base-CNV-4.13:container-native-virtualization/hostpath-provisioner-rhel9@sha256:d4ed87745b7ee2acca2d83e2c91c2f6dced1903c81495b50f2559b3ba2dde287_arm64",
"9Base-CNV-4.13:container-native-virtualization/hyperconverged-cluster-operator-rhel9@sha256:e5ab9f3be59d3568e3d672ab374efb16990ccf92192eac4e1244b10fcd7423e2_amd64",
"9Base-CNV-4.13:container-native-virtualization/hyperconverged-cluster-operator-rhel9@sha256:e681560b184189df03fc84c8a712f32289f42573dd348cda394b19565eb6eca8_arm64",
"9Base-CNV-4.13:container-native-virtualization/hyperconverged-cluster-webhook-rhel9@sha256:06d036d320b3027bb8370bb8e0f6fe8c9f0ec9bca7aac3b5c53698ba4a170042_arm64",
"9Base-CNV-4.13:container-native-virtualization/hyperconverged-cluster-webhook-rhel9@sha256:b5a01336180aad017df62cf8e652f2491b8263ba7e4dd07f858db1ef1924cf2f_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubemacpool-rhel9@sha256:4d190d81eeb3fbe9ed56cf3548dc83a3f81641bfdafa7b42dcfb0d2512566644_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubemacpool-rhel9@sha256:59862a59854f0d5b83dc25ba119f9586a8aff42b6e60d1922f8ae7b4567309ff_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubesecondarydns-rhel9@sha256:121d30d78cc57731ea2242ef2c32430890ac66c2723e65608d5e2f26c3f515cd_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubesecondarydns-rhel9@sha256:b1838f3c8ba3d8113bddea17b78c21e1c1490e2a4a07ea77014edee523d06347_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-console-plugin-rhel9@sha256:86a4b1e3d6ad1d56302c9c058f8bc5826dcfe6c46fb3e0ddaa06818645039020_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-console-plugin-rhel9@sha256:ffb2acd9ae09c1ef9ca756f5eaf6087d0a3957cfc824543949d25f556a97744d_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-dpdk-checkup-rhel9@sha256:525aceb9396010ebcdba14040f267889b807cd84db8e5b4030429b51f0fbf5fe_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-dpdk-checkup-rhel9@sha256:553c4686f56c66cc1e3c5ad9d4051f139d43f821eac3abb98ca5cdb8b5dfe202_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-ssp-operator-rhel9@sha256:901e6cad9534c7bd7c4018c60bccfe49d7280fba5a9901ab4c4d15e9345288c4_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-ssp-operator-rhel9@sha256:badeb0f65f543b209f6af761729d9778b7b73b97d55044016dfba3f38a1f6f18_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-cleanup-vm-rhel9@sha256:28e4975fa4dac22d9da32ed2a10aed039fd957b30140daa36bab2caa998be77a_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-cleanup-vm-rhel9@sha256:b0ff7e812a576ea848590655fc13a85832d5a39f68e7769ceab9da6949da88c7_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-copy-template-rhel9@sha256:4916a6c6b1f9b529187d3b4d5fc99b90157993767b3fe2ad36a9ec77fbb46b10_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-copy-template-rhel9@sha256:f71c36442f1b61cdde7ec58d2c3c78d2039f6d6108e6c35388ef7c1650971fa1_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-create-datavolume-rhel9@sha256:2ad49cf6e2242a9e5861929d9bcab1305a7fc4e34e708f99cff1d7253aa46167_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-create-datavolume-rhel9@sha256:7112400a4ecb23ee2110bf96372fcf9f96ad648a51aa944627b40eb59539a660_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-create-vm-from-template-rhel9@sha256:1411c65bbad7302710788327f6964a4bf5bc20ef70d5e46f4a5c6e7a0e7a0161_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-create-vm-from-template-rhel9@sha256:4d962618aa95600c60c9fc8b890186e510de91177d51949e12797a3558e31328_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-customize-rhel9@sha256:5c23d3f20ea9dcbe7109284d73078ecd516a070e964b844f8d80b1d92ebd55ee_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-customize-rhel9@sha256:a780244e48c6d4f87446d3754c3eb9ab79c0d54675c189da4a659f7a4d5668ea_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-sysprep-rhel9@sha256:84577d949a1bbcaa291c70729127bca4a8994df03068666baa23840877ea8392_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-sysprep-rhel9@sha256:aed630a597a090179e1b0e0c117e536df06b67d0f793f91936aa7388c0c5d7eb_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-modify-vm-template-rhel9@sha256:31d959b80cf57462e1705684bb7e1b78af26bd2c62f1c9e4e51e1d02199b05a8_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-modify-vm-template-rhel9@sha256:66aea526bc10e4c0136ba86e394bbdfe4fbd7f757d6f391a561b51d2ba2f4d46_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-operator-rhel9@sha256:d0cf0e81589f0938de45961eaddfc5ec4782738fd11082de0439b200534259eb_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-operator-rhel9@sha256:f1b1f5044db6bb945584f9d4f31d020597725a286ef368ed0aca2116abb31beb_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-wait-for-vmi-status-rhel9@sha256:39a15d03f113735df03b1a7408227eb9604d942c1f3c1992bcdc7eaf07662711_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-wait-for-vmi-status-rhel9@sha256:afb68af076954fcd18c7a4a1464ea0c2a766e8282eae980051906ed07eaa1707_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-template-validator-rhel9@sha256:02b22c7e7014b5e72d47fed8b6a268cf307638c5510adf3916c51f7f40a52a08_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-template-validator-rhel9@sha256:c0264b9271e602f85b2040ef7f207cdfa46038dc4fa6e4738bf196ef88a71cf8_amd64",
"9Base-CNV-4.13:container-native-virtualization/libguestfs-tools-rhel9@sha256:29ae84575bbca24553cf649256759fd96ff286971d80bc2db129154a7df9b283_amd64",
"9Base-CNV-4.13:container-native-virtualization/libguestfs-tools-rhel9@sha256:6558f60343e068b032167e2340b2c549c5f0258acc5d2614b60966ce79408b01_arm64",
"9Base-CNV-4.13:container-native-virtualization/multus-dynamic-networks-rhel9@sha256:3ecb0162a4b01d1590bf209d717b32a4f0835910d9979823f18c24acba41b503_arm64",
"9Base-CNV-4.13:container-native-virtualization/multus-dynamic-networks-rhel9@sha256:b7f68b6420009e21380d32d6459193aae45e93be9533debe17cb3108571b36b8_amd64",
"9Base-CNV-4.13:container-native-virtualization/ovs-cni-plugin-rhel9@sha256:0f1d372f418744e0aff59ecb0a38f53178aac9c2e9eecfd38aa25ed83e0d1360_arm64",
"9Base-CNV-4.13:container-native-virtualization/ovs-cni-plugin-rhel9@sha256:e8e7a44edbf1713fe74de5c4b8f691cce78f4440c4a32a16ba9ad16694a55396_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-api-rhel9@sha256:e68416321ca8c74a547b3d35897f54813c03481143e402e9bdc4daf315e35b5d_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-api-rhel9@sha256:fdb4ca1bb8b310d713d9c7e88f7d091f4460aa942dbeca5ebcf17281a06daffe_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-artifacts-server-rhel9@sha256:33d11c1832b49df39c1fca62bad40dbc5c30a452248339aaef449ac99509accb_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-artifacts-server-rhel9@sha256:81fc61b714baecb5a89fa6c0749c14566e0661b8e184ca602fc2e03b9cf431ee_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-apiserver-rhel9@sha256:f6128a63344ed2129f5bce648ddcfaa2869d31cde4b93328d3c22534b97ade10_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-apiserver-rhel9@sha256:feca273a691d09445c6cff6d36b5d590735e867656a9898ce0d89744d98e8006_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-cloner-rhel9@sha256:68e3b9b0291b4fb277ac430269ffce11d13b0a7688cf2ffcdb7f98759c36b4db_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-cloner-rhel9@sha256:6ac212767481bef64d8a7d0252bb8089c0f9751fad4a355aef71bd49dad2ad07_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-controller-rhel9@sha256:65f5263275d9f0a12b8fb057d82adf678778039ec873ca9bde182dea3413c9f1_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-controller-rhel9@sha256:d9e62b2019328be258489ac852eef25f8b1233f29abac6bcea5b406329f97fed_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-importer-rhel9@sha256:00a6d9d24ca1466d450b02269ec3144fc7550f0e5c696e869fbf7ce10cae6093_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-importer-rhel9@sha256:2df07fb21a3575e74aa16ded20129828f2300cd33e8ab369b0362062d49e62d0_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-operator-rhel9@sha256:20ec064750faedd97d11b797c8c1d9a1db5d60d7d76e82e65cfd05eb79d65e29_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-operator-rhel9@sha256:802ee8923d9d8e406b23911406f9748756c0ef4d6954e9e2fd5fb4bdf91dde9a_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-uploadproxy-rhel9@sha256:392d0f61f462c707adfdc21e4239c5c09d8520a80486b41d9d9ae479267d6124_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-uploadproxy-rhel9@sha256:6775f34353eec8f35bead9411dde155530d079bb8d51582fb1f2aacc27dbde1d_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-uploadserver-rhel9@sha256:4528c24672689cfb6505761b6b108fbcc04488192733f23d2bfe39cd42a1d743_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-uploadserver-rhel9@sha256:b22048390387380af94e267c8a9a66813c515997456d59d8ebac1486916b6585_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-controller-rhel9@sha256:3e7880149ee9a68286e390beb3d9779f7403c30fc5136e5370e0e4690a3fd243_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-controller-rhel9@sha256:970edc281d7a731e9f7e8c2d4440fe48a221e5e355d5235c5413b4c3adb28503_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-exportproxy-rhel9@sha256:1bda34d5bff734ad997202f29a5ff6f7362fd79fa90511a422442ef2e3681198_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-exportproxy-rhel9@sha256:de3c4afbf7669b98517cbef2490ec186f0553dd97b05bed80ec36dd883fe507b_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-exportserver-rhel9@sha256:3f7f98645176d42c63cca5c0fc3182a03121af87446ca421b6c72baf07dfca0d_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-exportserver-rhel9@sha256:8f12955cd777eb2409037a6968aa92f50c99d6e07e722951dbcfd0c8c9829b5e_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-handler-rhel9@sha256:5fc47110d866d8048aec50689090ce10705d19d3bb48d2b06727d6d569003af7_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-handler-rhel9@sha256:84ba79ae9658699147d2493df2582ab6df10adbff4d44a533c3fe6a9f45f9691_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-launcher-rhel9@sha256:4990d40d9987d5126d105dd45be2501eaded248cb61bdde5ea8d359bc1e7ebef_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-launcher-rhel9@sha256:95aeacb98209e0baef27ce0e02fbac38d693cea74808fc77107efda0f344bcb5_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-operator-rhel9@sha256:5c1a7e4ed2061938987b900a2394f07121d4037350c9bb6485213a2adfea787d_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-operator-rhel9@sha256:66b1b3b379121d6411ba22283e7d991617177330c93746d37753ab7812b9a00b_arm64",
"9Base-CNV-4.13:container-native-virtualization/virtio-win-rhel9@sha256:8735f51da918408a8826601c082d1b29accf26d59b9978da89b980cb509c1102_arm64",
"9Base-CNV-4.13:container-native-virtualization/virtio-win-rhel9@sha256:d147d2a6eb6f907d1e88f61aaca83596853bc72164583d6dda2b1154b490de25_amd64",
"9Base-CNV-4.13:container-native-virtualization/vm-console-proxy-rhel9@sha256:70a8d0cd66182c25e02679540bae1368b2a9cf687532b58dba41ef30c5ca00c1_arm64",
"9Base-CNV-4.13:container-native-virtualization/vm-console-proxy-rhel9@sha256:7ca921f98f6d81a126907127a611146fb53397869a628678faa1e289c01d22b2_amd64",
"9Base-CNV-4.13:container-native-virtualization/vm-network-latency-checkup-rhel9@sha256:503ea7ac914a9b54e9d665a0227ee0b5d5200cdb5d692aa94c07dd1518d91b70_arm64",
"9Base-CNV-4.13:container-native-virtualization/vm-network-latency-checkup-rhel9@sha256:59fd965975bccf641a0fa7aa01374d45057bd03cda7528248a84b60b1205bf57_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:3205"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"9Base-CNV-4.13:container-native-virtualization/bridge-marker-rhel9@sha256:8eac196b30a648989cdca5cb153a3bc3d34e47339acba0e4f760bd366496c99d_amd64",
"9Base-CNV-4.13:container-native-virtualization/bridge-marker-rhel9@sha256:e8a55aee3d75a316bb0d7a554c737198823df04b3c05e481c17e45eb2153bced_arm64",
"9Base-CNV-4.13:container-native-virtualization/cluster-network-addons-operator-rhel9@sha256:3bff33e3f40cd1e2b519c2db56734d4bb8df883e155c2f20b1cb9d3d184daec1_amd64",
"9Base-CNV-4.13:container-native-virtualization/cluster-network-addons-operator-rhel9@sha256:f439d2f420bb59eb1d5af14ce2002648d0cfc155d1a1466c8aac9b661fe902b8_arm64",
"9Base-CNV-4.13:container-native-virtualization/cnv-containernetworking-plugins-rhel9@sha256:89f22e541f61a660c9aa9f38ef58e80b84a0517f74e84292107fc252c25465c9_arm64",
"9Base-CNV-4.13:container-native-virtualization/cnv-containernetworking-plugins-rhel9@sha256:bf471997e54e4a75b0d71f492ab295787fdbb14d8c85c4ea8c03f0552dbc3755_amd64",
"9Base-CNV-4.13:container-native-virtualization/cnv-must-gather-rhel9@sha256:9e8efd76924958eb605401abdac08eba97fb83a1ada383bc87a7fb7c87b3a455_arm64",
"9Base-CNV-4.13:container-native-virtualization/cnv-must-gather-rhel9@sha256:b9fc32b5fabedd65a4c3a471879c808af2087277de4278adaa115a732f0468da_amd64",
"9Base-CNV-4.13:container-native-virtualization/hco-bundle-registry-rhel9@sha256:60e89d7a99ff9f20e974430b802dd724a3bb6fa1e01e5a62daad98ac487b3063_amd64",
"9Base-CNV-4.13:container-native-virtualization/hco-bundle-registry-rhel9@sha256:dd20b138045ef1424d83a47e7abcfcbb2ac54577dcec5ed3c186390aaa4c9d84_arm64",
"9Base-CNV-4.13:container-native-virtualization/hostpath-csi-driver-rhel9@sha256:61e2824853d51347593ad909a5e546cd92e4216d6a1df5dffb50dd9cba277cce_amd64",
"9Base-CNV-4.13:container-native-virtualization/hostpath-csi-driver-rhel9@sha256:676d4c23a5f60dd331728af056b0a6b2d3358ac88da23299b1a98dfaca8f288e_arm64",
"9Base-CNV-4.13:container-native-virtualization/hostpath-provisioner-operator-rhel9@sha256:515be94be496c67f5b8fd5f4832fe4385e56476e6589897d6b9fbb9bb2b00f32_amd64",
"9Base-CNV-4.13:container-native-virtualization/hostpath-provisioner-operator-rhel9@sha256:571ae805641dea11646028c946039983c7fd82f138b915dcb8b80c39b465e63c_arm64",
"9Base-CNV-4.13:container-native-virtualization/hostpath-provisioner-rhel9@sha256:ac3fe350bedd6bc43596444ba0f279ccf8a144ab14ac5a9b80ea71c46390b7b4_amd64",
"9Base-CNV-4.13:container-native-virtualization/hostpath-provisioner-rhel9@sha256:d4ed87745b7ee2acca2d83e2c91c2f6dced1903c81495b50f2559b3ba2dde287_arm64",
"9Base-CNV-4.13:container-native-virtualization/hyperconverged-cluster-operator-rhel9@sha256:e5ab9f3be59d3568e3d672ab374efb16990ccf92192eac4e1244b10fcd7423e2_amd64",
"9Base-CNV-4.13:container-native-virtualization/hyperconverged-cluster-operator-rhel9@sha256:e681560b184189df03fc84c8a712f32289f42573dd348cda394b19565eb6eca8_arm64",
"9Base-CNV-4.13:container-native-virtualization/hyperconverged-cluster-webhook-rhel9@sha256:06d036d320b3027bb8370bb8e0f6fe8c9f0ec9bca7aac3b5c53698ba4a170042_arm64",
"9Base-CNV-4.13:container-native-virtualization/hyperconverged-cluster-webhook-rhel9@sha256:b5a01336180aad017df62cf8e652f2491b8263ba7e4dd07f858db1ef1924cf2f_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubemacpool-rhel9@sha256:4d190d81eeb3fbe9ed56cf3548dc83a3f81641bfdafa7b42dcfb0d2512566644_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubemacpool-rhel9@sha256:59862a59854f0d5b83dc25ba119f9586a8aff42b6e60d1922f8ae7b4567309ff_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubesecondarydns-rhel9@sha256:121d30d78cc57731ea2242ef2c32430890ac66c2723e65608d5e2f26c3f515cd_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubesecondarydns-rhel9@sha256:b1838f3c8ba3d8113bddea17b78c21e1c1490e2a4a07ea77014edee523d06347_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-console-plugin-rhel9@sha256:86a4b1e3d6ad1d56302c9c058f8bc5826dcfe6c46fb3e0ddaa06818645039020_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-console-plugin-rhel9@sha256:ffb2acd9ae09c1ef9ca756f5eaf6087d0a3957cfc824543949d25f556a97744d_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-dpdk-checkup-rhel9@sha256:525aceb9396010ebcdba14040f267889b807cd84db8e5b4030429b51f0fbf5fe_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-dpdk-checkup-rhel9@sha256:553c4686f56c66cc1e3c5ad9d4051f139d43f821eac3abb98ca5cdb8b5dfe202_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-ssp-operator-rhel9@sha256:901e6cad9534c7bd7c4018c60bccfe49d7280fba5a9901ab4c4d15e9345288c4_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-ssp-operator-rhel9@sha256:badeb0f65f543b209f6af761729d9778b7b73b97d55044016dfba3f38a1f6f18_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-cleanup-vm-rhel9@sha256:28e4975fa4dac22d9da32ed2a10aed039fd957b30140daa36bab2caa998be77a_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-cleanup-vm-rhel9@sha256:b0ff7e812a576ea848590655fc13a85832d5a39f68e7769ceab9da6949da88c7_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-copy-template-rhel9@sha256:4916a6c6b1f9b529187d3b4d5fc99b90157993767b3fe2ad36a9ec77fbb46b10_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-copy-template-rhel9@sha256:f71c36442f1b61cdde7ec58d2c3c78d2039f6d6108e6c35388ef7c1650971fa1_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-create-datavolume-rhel9@sha256:2ad49cf6e2242a9e5861929d9bcab1305a7fc4e34e708f99cff1d7253aa46167_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-create-datavolume-rhel9@sha256:7112400a4ecb23ee2110bf96372fcf9f96ad648a51aa944627b40eb59539a660_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-create-vm-from-template-rhel9@sha256:1411c65bbad7302710788327f6964a4bf5bc20ef70d5e46f4a5c6e7a0e7a0161_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-create-vm-from-template-rhel9@sha256:4d962618aa95600c60c9fc8b890186e510de91177d51949e12797a3558e31328_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-customize-rhel9@sha256:5c23d3f20ea9dcbe7109284d73078ecd516a070e964b844f8d80b1d92ebd55ee_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-customize-rhel9@sha256:a780244e48c6d4f87446d3754c3eb9ab79c0d54675c189da4a659f7a4d5668ea_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-sysprep-rhel9@sha256:84577d949a1bbcaa291c70729127bca4a8994df03068666baa23840877ea8392_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-sysprep-rhel9@sha256:aed630a597a090179e1b0e0c117e536df06b67d0f793f91936aa7388c0c5d7eb_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-modify-vm-template-rhel9@sha256:31d959b80cf57462e1705684bb7e1b78af26bd2c62f1c9e4e51e1d02199b05a8_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-modify-vm-template-rhel9@sha256:66aea526bc10e4c0136ba86e394bbdfe4fbd7f757d6f391a561b51d2ba2f4d46_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-operator-rhel9@sha256:d0cf0e81589f0938de45961eaddfc5ec4782738fd11082de0439b200534259eb_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-operator-rhel9@sha256:f1b1f5044db6bb945584f9d4f31d020597725a286ef368ed0aca2116abb31beb_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-wait-for-vmi-status-rhel9@sha256:39a15d03f113735df03b1a7408227eb9604d942c1f3c1992bcdc7eaf07662711_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-wait-for-vmi-status-rhel9@sha256:afb68af076954fcd18c7a4a1464ea0c2a766e8282eae980051906ed07eaa1707_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-template-validator-rhel9@sha256:02b22c7e7014b5e72d47fed8b6a268cf307638c5510adf3916c51f7f40a52a08_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-template-validator-rhel9@sha256:c0264b9271e602f85b2040ef7f207cdfa46038dc4fa6e4738bf196ef88a71cf8_amd64",
"9Base-CNV-4.13:container-native-virtualization/libguestfs-tools-rhel9@sha256:29ae84575bbca24553cf649256759fd96ff286971d80bc2db129154a7df9b283_amd64",
"9Base-CNV-4.13:container-native-virtualization/libguestfs-tools-rhel9@sha256:6558f60343e068b032167e2340b2c549c5f0258acc5d2614b60966ce79408b01_arm64",
"9Base-CNV-4.13:container-native-virtualization/multus-dynamic-networks-rhel9@sha256:3ecb0162a4b01d1590bf209d717b32a4f0835910d9979823f18c24acba41b503_arm64",
"9Base-CNV-4.13:container-native-virtualization/multus-dynamic-networks-rhel9@sha256:b7f68b6420009e21380d32d6459193aae45e93be9533debe17cb3108571b36b8_amd64",
"9Base-CNV-4.13:container-native-virtualization/ovs-cni-plugin-rhel9@sha256:0f1d372f418744e0aff59ecb0a38f53178aac9c2e9eecfd38aa25ed83e0d1360_arm64",
"9Base-CNV-4.13:container-native-virtualization/ovs-cni-plugin-rhel9@sha256:e8e7a44edbf1713fe74de5c4b8f691cce78f4440c4a32a16ba9ad16694a55396_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-api-rhel9@sha256:e68416321ca8c74a547b3d35897f54813c03481143e402e9bdc4daf315e35b5d_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-api-rhel9@sha256:fdb4ca1bb8b310d713d9c7e88f7d091f4460aa942dbeca5ebcf17281a06daffe_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-artifacts-server-rhel9@sha256:33d11c1832b49df39c1fca62bad40dbc5c30a452248339aaef449ac99509accb_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-artifacts-server-rhel9@sha256:81fc61b714baecb5a89fa6c0749c14566e0661b8e184ca602fc2e03b9cf431ee_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-apiserver-rhel9@sha256:f6128a63344ed2129f5bce648ddcfaa2869d31cde4b93328d3c22534b97ade10_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-apiserver-rhel9@sha256:feca273a691d09445c6cff6d36b5d590735e867656a9898ce0d89744d98e8006_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-cloner-rhel9@sha256:68e3b9b0291b4fb277ac430269ffce11d13b0a7688cf2ffcdb7f98759c36b4db_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-cloner-rhel9@sha256:6ac212767481bef64d8a7d0252bb8089c0f9751fad4a355aef71bd49dad2ad07_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-controller-rhel9@sha256:65f5263275d9f0a12b8fb057d82adf678778039ec873ca9bde182dea3413c9f1_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-controller-rhel9@sha256:d9e62b2019328be258489ac852eef25f8b1233f29abac6bcea5b406329f97fed_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-importer-rhel9@sha256:00a6d9d24ca1466d450b02269ec3144fc7550f0e5c696e869fbf7ce10cae6093_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-importer-rhel9@sha256:2df07fb21a3575e74aa16ded20129828f2300cd33e8ab369b0362062d49e62d0_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-operator-rhel9@sha256:20ec064750faedd97d11b797c8c1d9a1db5d60d7d76e82e65cfd05eb79d65e29_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-operator-rhel9@sha256:802ee8923d9d8e406b23911406f9748756c0ef4d6954e9e2fd5fb4bdf91dde9a_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-uploadproxy-rhel9@sha256:392d0f61f462c707adfdc21e4239c5c09d8520a80486b41d9d9ae479267d6124_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-uploadproxy-rhel9@sha256:6775f34353eec8f35bead9411dde155530d079bb8d51582fb1f2aacc27dbde1d_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-uploadserver-rhel9@sha256:4528c24672689cfb6505761b6b108fbcc04488192733f23d2bfe39cd42a1d743_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-uploadserver-rhel9@sha256:b22048390387380af94e267c8a9a66813c515997456d59d8ebac1486916b6585_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-controller-rhel9@sha256:3e7880149ee9a68286e390beb3d9779f7403c30fc5136e5370e0e4690a3fd243_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-controller-rhel9@sha256:970edc281d7a731e9f7e8c2d4440fe48a221e5e355d5235c5413b4c3adb28503_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-exportproxy-rhel9@sha256:1bda34d5bff734ad997202f29a5ff6f7362fd79fa90511a422442ef2e3681198_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-exportproxy-rhel9@sha256:de3c4afbf7669b98517cbef2490ec186f0553dd97b05bed80ec36dd883fe507b_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-exportserver-rhel9@sha256:3f7f98645176d42c63cca5c0fc3182a03121af87446ca421b6c72baf07dfca0d_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-exportserver-rhel9@sha256:8f12955cd777eb2409037a6968aa92f50c99d6e07e722951dbcfd0c8c9829b5e_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-handler-rhel9@sha256:5fc47110d866d8048aec50689090ce10705d19d3bb48d2b06727d6d569003af7_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-handler-rhel9@sha256:84ba79ae9658699147d2493df2582ab6df10adbff4d44a533c3fe6a9f45f9691_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-launcher-rhel9@sha256:4990d40d9987d5126d105dd45be2501eaded248cb61bdde5ea8d359bc1e7ebef_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-launcher-rhel9@sha256:95aeacb98209e0baef27ce0e02fbac38d693cea74808fc77107efda0f344bcb5_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-operator-rhel9@sha256:5c1a7e4ed2061938987b900a2394f07121d4037350c9bb6485213a2adfea787d_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-operator-rhel9@sha256:66b1b3b379121d6411ba22283e7d991617177330c93746d37753ab7812b9a00b_arm64",
"9Base-CNV-4.13:container-native-virtualization/virtio-win-rhel9@sha256:8735f51da918408a8826601c082d1b29accf26d59b9978da89b980cb509c1102_arm64",
"9Base-CNV-4.13:container-native-virtualization/virtio-win-rhel9@sha256:d147d2a6eb6f907d1e88f61aaca83596853bc72164583d6dda2b1154b490de25_amd64",
"9Base-CNV-4.13:container-native-virtualization/vm-console-proxy-rhel9@sha256:70a8d0cd66182c25e02679540bae1368b2a9cf687532b58dba41ef30c5ca00c1_arm64",
"9Base-CNV-4.13:container-native-virtualization/vm-console-proxy-rhel9@sha256:7ca921f98f6d81a126907127a611146fb53397869a628678faa1e289c01d22b2_amd64",
"9Base-CNV-4.13:container-native-virtualization/vm-network-latency-checkup-rhel9@sha256:503ea7ac914a9b54e9d665a0227ee0b5d5200cdb5d692aa94c07dd1518d91b70_arm64",
"9Base-CNV-4.13:container-native-virtualization/vm-network-latency-checkup-rhel9@sha256:59fd965975bccf641a0fa7aa01374d45057bd03cda7528248a84b60b1205bf57_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "golang: net/http: excessive memory growth in a Go server accepting HTTP/2 requests"
}
]
}
rhsa-2023:3613
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Red Hat OpenShift Container Platform release 4.12.22 is now available with updates to packages and images that fix several bugs and add enhancements.\n\nThis release includes a security update for Red Hat OpenShift Container Platform 4.12.\n\nRed Hat Product Security has rated this update as having a security impact of [impact]. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Red Hat OpenShift Container Platform is Red Hat\u0027s cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments.\n\nThis advisory contains the RPM packages for Red Hat OpenShift Container Platform 4.12.22. See the following advisory for the container images for this release:\n\nhttps://access.redhat.com/errata/RHSA-2023:3615\n\nSecurity Fix(es):\n\n* golang: archive/tar: unbounded memory consumption when reading headers (CVE-2022-2879)\n\n* golang: net/http/httputil: ReverseProxy should not forward unparseable query parameters (CVE-2022-2880)\n\n* golang: net/http: handle server errors after sending GOAWAY (CVE-2022-27664)\n\n* golang: golang.org/x/text/language: ParseAcceptLanguage takes a long time to parse complex tags (CVE-2022-32149)\n\n* golang: net/url: JoinPath does not strip relative path components in all circumstances (CVE-2022-32190)\n\n* golang: regexp/syntax: limit memory used by parsing regexps (CVE-2022-41715)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAll OpenShift Container Platform 4.12 users are advised to upgrade to these updated packages and images when they are available in the appropriate release channel. To check for available updates, use the OpenShift CLI (oc) or web console. Instructions for upgrading a cluster are available at https://docs.openshift.com/container-platform/4.12/updating/updating-cluster-cli.html.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2023:3613",
"url": "https://access.redhat.com/errata/RHSA-2023:3613"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#moderate",
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "https://docs.openshift.com/container-platform/4.12/release_notes/ocp-4-12-release-notes.html",
"url": "https://docs.openshift.com/container-platform/4.12/release_notes/ocp-4-12-release-notes.html"
},
{
"category": "external",
"summary": "2124668",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2124668"
},
{
"category": "external",
"summary": "2124669",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2124669"
},
{
"category": "external",
"summary": "2132867",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2132867"
},
{
"category": "external",
"summary": "2132868",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2132868"
},
{
"category": "external",
"summary": "2132872",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2132872"
},
{
"category": "external",
"summary": "2134010",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2134010"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2023/rhsa-2023_3613.json"
}
],
"title": "Red Hat Security Advisory: OpenShift Container Platform 4.12.22 packages and security update",
"tracking": {
"current_release_date": "2025-10-10T02:07:43+00:00",
"generator": {
"date": "2025-10-10T02:07:43+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.9"
}
},
"id": "RHSA-2023:3613",
"initial_release_date": "2023-06-26T01:19:15+00:00",
"revision_history": [
{
"date": "2023-06-26T01:19:15+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2023-06-26T01:19:15+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-10-10T02:07:43+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat OpenShift Container Platform 4.12",
"product": {
"name": "Red Hat OpenShift Container Platform 4.12",
"product_id": "9Base-RHOSE-4.12",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:openshift:4.12::el9"
}
}
},
{
"category": "product_name",
"name": "Red Hat OpenShift Container Platform 4.12",
"product": {
"name": "Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:openshift:4.12::el8"
}
}
}
],
"category": "product_family",
"name": "Red Hat OpenShift Enterprise"
},
{
"branches": [
{
"category": "product_version",
"name": "buildah-1:1.23.4-5.rhaos4.12.el9.src",
"product": {
"name": "buildah-1:1.23.4-5.rhaos4.12.el9.src",
"product_id": "buildah-1:1.23.4-5.rhaos4.12.el9.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/buildah@1.23.4-5.rhaos4.12.el9?arch=src\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "conmon-2:2.1.2-5.rhaos4.12.el9.src",
"product": {
"name": "conmon-2:2.1.2-5.rhaos4.12.el9.src",
"product_id": "conmon-2:2.1.2-5.rhaos4.12.el9.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/conmon@2.1.2-5.rhaos4.12.el9?arch=src\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "openshift-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el9.src",
"product": {
"name": "openshift-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el9.src",
"product_id": "openshift-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el9.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift@4.12.0-202306121916.p0.g8c21020.assembly.stream.el9?arch=src"
}
}
},
{
"category": "product_version",
"name": "openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.src",
"product": {
"name": "openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.src",
"product_id": "openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-clients@4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9?arch=src"
}
}
},
{
"category": "product_version",
"name": "podman-3:4.2.0-7.rhaos4.12.el9.src",
"product": {
"name": "podman-3:4.2.0-7.rhaos4.12.el9.src",
"product_id": "podman-3:4.2.0-7.rhaos4.12.el9.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman@4.2.0-7.rhaos4.12.el9?arch=src\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "skopeo-2:1.9.4-3.rhaos4.12.el9.src",
"product": {
"name": "skopeo-2:1.9.4-3.rhaos4.12.el9.src",
"product_id": "skopeo-2:1.9.4-3.rhaos4.12.el9.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/skopeo@1.9.4-3.rhaos4.12.el9?arch=src\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "buildah-1:1.23.4-5.1.rhaos4.12.el8.src",
"product": {
"name": "buildah-1:1.23.4-5.1.rhaos4.12.el8.src",
"product_id": "buildah-1:1.23.4-5.1.rhaos4.12.el8.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/buildah@1.23.4-5.1.rhaos4.12.el8?arch=src\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "conmon-2:2.1.2-4.rhaos4.12.el8.src",
"product": {
"name": "conmon-2:2.1.2-4.rhaos4.12.el8.src",
"product_id": "conmon-2:2.1.2-4.rhaos4.12.el8.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/conmon@2.1.2-4.rhaos4.12.el8?arch=src\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "containernetworking-plugins-0:1.0.1-7.rhaos4.12.el8.src",
"product": {
"name": "containernetworking-plugins-0:1.0.1-7.rhaos4.12.el8.src",
"product_id": "containernetworking-plugins-0:1.0.1-7.rhaos4.12.el8.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/containernetworking-plugins@1.0.1-7.rhaos4.12.el8?arch=src"
}
}
},
{
"category": "product_version",
"name": "kernel-0:4.18.0-372.59.1.el8_6.src",
"product": {
"name": "kernel-0:4.18.0-372.59.1.el8_6.src",
"product_id": "kernel-0:4.18.0-372.59.1.el8_6.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@4.18.0-372.59.1.el8_6?arch=src"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-0:4.18.0-372.59.1.rt7.217.el8_6.src",
"product": {
"name": "kernel-rt-0:4.18.0-372.59.1.rt7.217.el8_6.src",
"product_id": "kernel-rt-0:4.18.0-372.59.1.rt7.217.el8_6.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt@4.18.0-372.59.1.rt7.217.el8_6?arch=src"
}
}
},
{
"category": "product_version",
"name": "openshift-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el8.src",
"product": {
"name": "openshift-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el8.src",
"product_id": "openshift-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el8.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift@4.12.0-202306121916.p0.g8c21020.assembly.stream.el8?arch=src"
}
}
},
{
"category": "product_version",
"name": "openshift-ansible-0:4.12.0-202306090942.p0.g74dc7b3.assembly.stream.el8.src",
"product": {
"name": "openshift-ansible-0:4.12.0-202306090942.p0.g74dc7b3.assembly.stream.el8.src",
"product_id": "openshift-ansible-0:4.12.0-202306090942.p0.g74dc7b3.assembly.stream.el8.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-ansible@4.12.0-202306090942.p0.g74dc7b3.assembly.stream.el8?arch=src"
}
}
},
{
"category": "product_version",
"name": "openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.src",
"product": {
"name": "openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.src",
"product_id": "openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-clients@4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8?arch=src"
}
}
},
{
"category": "product_version",
"name": "openshift-kuryr-0:4.12.0-202306140156.p0.g31dd228.assembly.stream.el8.src",
"product": {
"name": "openshift-kuryr-0:4.12.0-202306140156.p0.g31dd228.assembly.stream.el8.src",
"product_id": "openshift-kuryr-0:4.12.0-202306140156.p0.g31dd228.assembly.stream.el8.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-kuryr@4.12.0-202306140156.p0.g31dd228.assembly.stream.el8?arch=src"
}
}
},
{
"category": "product_version",
"name": "openshift4-aws-iso-0:4.12.0-202306090942.p0.gd2acdd5.assembly.stream.el8.src",
"product": {
"name": "openshift4-aws-iso-0:4.12.0-202306090942.p0.gd2acdd5.assembly.stream.el8.src",
"product_id": "openshift4-aws-iso-0:4.12.0-202306090942.p0.gd2acdd5.assembly.stream.el8.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift4-aws-iso@4.12.0-202306090942.p0.gd2acdd5.assembly.stream.el8?arch=src"
}
}
},
{
"category": "product_version",
"name": "podman-3:4.2.0-6.1.rhaos4.12.el8.src",
"product": {
"name": "podman-3:4.2.0-6.1.rhaos4.12.el8.src",
"product_id": "podman-3:4.2.0-6.1.rhaos4.12.el8.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman@4.2.0-6.1.rhaos4.12.el8?arch=src\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "runc-3:1.1.6-4.rhaos4.12.el8.src",
"product": {
"name": "runc-3:1.1.6-4.rhaos4.12.el8.src",
"product_id": "runc-3:1.1.6-4.rhaos4.12.el8.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/runc@1.1.6-4.rhaos4.12.el8?arch=src\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "skopeo-2:1.9.4-3.1.rhaos4.12.el8.src",
"product": {
"name": "skopeo-2:1.9.4-3.1.rhaos4.12.el8.src",
"product_id": "skopeo-2:1.9.4-3.1.rhaos4.12.el8.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/skopeo@1.9.4-3.1.rhaos4.12.el8?arch=src\u0026epoch=2"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "buildah-1:1.23.4-5.rhaos4.12.el9.x86_64",
"product": {
"name": "buildah-1:1.23.4-5.rhaos4.12.el9.x86_64",
"product_id": "buildah-1:1.23.4-5.rhaos4.12.el9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/buildah@1.23.4-5.rhaos4.12.el9?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "buildah-tests-1:1.23.4-5.rhaos4.12.el9.x86_64",
"product": {
"name": "buildah-tests-1:1.23.4-5.rhaos4.12.el9.x86_64",
"product_id": "buildah-tests-1:1.23.4-5.rhaos4.12.el9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/buildah-tests@1.23.4-5.rhaos4.12.el9?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "buildah-debugsource-1:1.23.4-5.rhaos4.12.el9.x86_64",
"product": {
"name": "buildah-debugsource-1:1.23.4-5.rhaos4.12.el9.x86_64",
"product_id": "buildah-debugsource-1:1.23.4-5.rhaos4.12.el9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/buildah-debugsource@1.23.4-5.rhaos4.12.el9?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "buildah-debuginfo-1:1.23.4-5.rhaos4.12.el9.x86_64",
"product": {
"name": "buildah-debuginfo-1:1.23.4-5.rhaos4.12.el9.x86_64",
"product_id": "buildah-debuginfo-1:1.23.4-5.rhaos4.12.el9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/buildah-debuginfo@1.23.4-5.rhaos4.12.el9?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "buildah-tests-debuginfo-1:1.23.4-5.rhaos4.12.el9.x86_64",
"product": {
"name": "buildah-tests-debuginfo-1:1.23.4-5.rhaos4.12.el9.x86_64",
"product_id": "buildah-tests-debuginfo-1:1.23.4-5.rhaos4.12.el9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/buildah-tests-debuginfo@1.23.4-5.rhaos4.12.el9?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "conmon-2:2.1.2-5.rhaos4.12.el9.x86_64",
"product": {
"name": "conmon-2:2.1.2-5.rhaos4.12.el9.x86_64",
"product_id": "conmon-2:2.1.2-5.rhaos4.12.el9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/conmon@2.1.2-5.rhaos4.12.el9?arch=x86_64\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "conmon-debugsource-2:2.1.2-5.rhaos4.12.el9.x86_64",
"product": {
"name": "conmon-debugsource-2:2.1.2-5.rhaos4.12.el9.x86_64",
"product_id": "conmon-debugsource-2:2.1.2-5.rhaos4.12.el9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/conmon-debugsource@2.1.2-5.rhaos4.12.el9?arch=x86_64\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "conmon-debuginfo-2:2.1.2-5.rhaos4.12.el9.x86_64",
"product": {
"name": "conmon-debuginfo-2:2.1.2-5.rhaos4.12.el9.x86_64",
"product_id": "conmon-debuginfo-2:2.1.2-5.rhaos4.12.el9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/conmon-debuginfo@2.1.2-5.rhaos4.12.el9?arch=x86_64\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el9.x86_64",
"product": {
"name": "openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el9.x86_64",
"product_id": "openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-hyperkube@4.12.0-202306121916.p0.g8c21020.assembly.stream.el9?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.x86_64",
"product": {
"name": "openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.x86_64",
"product_id": "openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-clients@4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "openshift-clients-redistributable-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.x86_64",
"product": {
"name": "openshift-clients-redistributable-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.x86_64",
"product_id": "openshift-clients-redistributable-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-clients-redistributable@4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "podman-3:4.2.0-7.rhaos4.12.el9.x86_64",
"product": {
"name": "podman-3:4.2.0-7.rhaos4.12.el9.x86_64",
"product_id": "podman-3:4.2.0-7.rhaos4.12.el9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman@4.2.0-7.rhaos4.12.el9?arch=x86_64\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "podman-catatonit-3:4.2.0-7.rhaos4.12.el9.x86_64",
"product": {
"name": "podman-catatonit-3:4.2.0-7.rhaos4.12.el9.x86_64",
"product_id": "podman-catatonit-3:4.2.0-7.rhaos4.12.el9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-catatonit@4.2.0-7.rhaos4.12.el9?arch=x86_64\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "podman-gvproxy-3:4.2.0-7.rhaos4.12.el9.x86_64",
"product": {
"name": "podman-gvproxy-3:4.2.0-7.rhaos4.12.el9.x86_64",
"product_id": "podman-gvproxy-3:4.2.0-7.rhaos4.12.el9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-gvproxy@4.2.0-7.rhaos4.12.el9?arch=x86_64\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "podman-plugins-3:4.2.0-7.rhaos4.12.el9.x86_64",
"product": {
"name": "podman-plugins-3:4.2.0-7.rhaos4.12.el9.x86_64",
"product_id": "podman-plugins-3:4.2.0-7.rhaos4.12.el9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-plugins@4.2.0-7.rhaos4.12.el9?arch=x86_64\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "podman-remote-3:4.2.0-7.rhaos4.12.el9.x86_64",
"product": {
"name": "podman-remote-3:4.2.0-7.rhaos4.12.el9.x86_64",
"product_id": "podman-remote-3:4.2.0-7.rhaos4.12.el9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-remote@4.2.0-7.rhaos4.12.el9?arch=x86_64\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "podman-tests-3:4.2.0-7.rhaos4.12.el9.x86_64",
"product": {
"name": "podman-tests-3:4.2.0-7.rhaos4.12.el9.x86_64",
"product_id": "podman-tests-3:4.2.0-7.rhaos4.12.el9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-tests@4.2.0-7.rhaos4.12.el9?arch=x86_64\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "podman-debugsource-3:4.2.0-7.rhaos4.12.el9.x86_64",
"product": {
"name": "podman-debugsource-3:4.2.0-7.rhaos4.12.el9.x86_64",
"product_id": "podman-debugsource-3:4.2.0-7.rhaos4.12.el9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-debugsource@4.2.0-7.rhaos4.12.el9?arch=x86_64\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "podman-catatonit-debuginfo-3:4.2.0-7.rhaos4.12.el9.x86_64",
"product": {
"name": "podman-catatonit-debuginfo-3:4.2.0-7.rhaos4.12.el9.x86_64",
"product_id": "podman-catatonit-debuginfo-3:4.2.0-7.rhaos4.12.el9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-catatonit-debuginfo@4.2.0-7.rhaos4.12.el9?arch=x86_64\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "podman-debuginfo-3:4.2.0-7.rhaos4.12.el9.x86_64",
"product": {
"name": "podman-debuginfo-3:4.2.0-7.rhaos4.12.el9.x86_64",
"product_id": "podman-debuginfo-3:4.2.0-7.rhaos4.12.el9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-debuginfo@4.2.0-7.rhaos4.12.el9?arch=x86_64\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "podman-gvproxy-debuginfo-3:4.2.0-7.rhaos4.12.el9.x86_64",
"product": {
"name": "podman-gvproxy-debuginfo-3:4.2.0-7.rhaos4.12.el9.x86_64",
"product_id": "podman-gvproxy-debuginfo-3:4.2.0-7.rhaos4.12.el9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-gvproxy-debuginfo@4.2.0-7.rhaos4.12.el9?arch=x86_64\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "podman-plugins-debuginfo-3:4.2.0-7.rhaos4.12.el9.x86_64",
"product": {
"name": "podman-plugins-debuginfo-3:4.2.0-7.rhaos4.12.el9.x86_64",
"product_id": "podman-plugins-debuginfo-3:4.2.0-7.rhaos4.12.el9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-plugins-debuginfo@4.2.0-7.rhaos4.12.el9?arch=x86_64\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "podman-remote-debuginfo-3:4.2.0-7.rhaos4.12.el9.x86_64",
"product": {
"name": "podman-remote-debuginfo-3:4.2.0-7.rhaos4.12.el9.x86_64",
"product_id": "podman-remote-debuginfo-3:4.2.0-7.rhaos4.12.el9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-remote-debuginfo@4.2.0-7.rhaos4.12.el9?arch=x86_64\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "skopeo-2:1.9.4-3.rhaos4.12.el9.x86_64",
"product": {
"name": "skopeo-2:1.9.4-3.rhaos4.12.el9.x86_64",
"product_id": "skopeo-2:1.9.4-3.rhaos4.12.el9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/skopeo@1.9.4-3.rhaos4.12.el9?arch=x86_64\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "skopeo-tests-2:1.9.4-3.rhaos4.12.el9.x86_64",
"product": {
"name": "skopeo-tests-2:1.9.4-3.rhaos4.12.el9.x86_64",
"product_id": "skopeo-tests-2:1.9.4-3.rhaos4.12.el9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/skopeo-tests@1.9.4-3.rhaos4.12.el9?arch=x86_64\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "skopeo-debugsource-2:1.9.4-3.rhaos4.12.el9.x86_64",
"product": {
"name": "skopeo-debugsource-2:1.9.4-3.rhaos4.12.el9.x86_64",
"product_id": "skopeo-debugsource-2:1.9.4-3.rhaos4.12.el9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/skopeo-debugsource@1.9.4-3.rhaos4.12.el9?arch=x86_64\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "skopeo-debuginfo-2:1.9.4-3.rhaos4.12.el9.x86_64",
"product": {
"name": "skopeo-debuginfo-2:1.9.4-3.rhaos4.12.el9.x86_64",
"product_id": "skopeo-debuginfo-2:1.9.4-3.rhaos4.12.el9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/skopeo-debuginfo@1.9.4-3.rhaos4.12.el9?arch=x86_64\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "buildah-1:1.23.4-5.1.rhaos4.12.el8.x86_64",
"product": {
"name": "buildah-1:1.23.4-5.1.rhaos4.12.el8.x86_64",
"product_id": "buildah-1:1.23.4-5.1.rhaos4.12.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/buildah@1.23.4-5.1.rhaos4.12.el8?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "buildah-tests-1:1.23.4-5.1.rhaos4.12.el8.x86_64",
"product": {
"name": "buildah-tests-1:1.23.4-5.1.rhaos4.12.el8.x86_64",
"product_id": "buildah-tests-1:1.23.4-5.1.rhaos4.12.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/buildah-tests@1.23.4-5.1.rhaos4.12.el8?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "buildah-debugsource-1:1.23.4-5.1.rhaos4.12.el8.x86_64",
"product": {
"name": "buildah-debugsource-1:1.23.4-5.1.rhaos4.12.el8.x86_64",
"product_id": "buildah-debugsource-1:1.23.4-5.1.rhaos4.12.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/buildah-debugsource@1.23.4-5.1.rhaos4.12.el8?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "buildah-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.x86_64",
"product": {
"name": "buildah-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.x86_64",
"product_id": "buildah-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/buildah-debuginfo@1.23.4-5.1.rhaos4.12.el8?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "buildah-tests-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.x86_64",
"product": {
"name": "buildah-tests-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.x86_64",
"product_id": "buildah-tests-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/buildah-tests-debuginfo@1.23.4-5.1.rhaos4.12.el8?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "conmon-2:2.1.2-4.rhaos4.12.el8.x86_64",
"product": {
"name": "conmon-2:2.1.2-4.rhaos4.12.el8.x86_64",
"product_id": "conmon-2:2.1.2-4.rhaos4.12.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/conmon@2.1.2-4.rhaos4.12.el8?arch=x86_64\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "conmon-debugsource-2:2.1.2-4.rhaos4.12.el8.x86_64",
"product": {
"name": "conmon-debugsource-2:2.1.2-4.rhaos4.12.el8.x86_64",
"product_id": "conmon-debugsource-2:2.1.2-4.rhaos4.12.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/conmon-debugsource@2.1.2-4.rhaos4.12.el8?arch=x86_64\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "conmon-debuginfo-2:2.1.2-4.rhaos4.12.el8.x86_64",
"product": {
"name": "conmon-debuginfo-2:2.1.2-4.rhaos4.12.el8.x86_64",
"product_id": "conmon-debuginfo-2:2.1.2-4.rhaos4.12.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/conmon-debuginfo@2.1.2-4.rhaos4.12.el8?arch=x86_64\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "containernetworking-plugins-0:1.0.1-7.rhaos4.12.el8.x86_64",
"product": {
"name": "containernetworking-plugins-0:1.0.1-7.rhaos4.12.el8.x86_64",
"product_id": "containernetworking-plugins-0:1.0.1-7.rhaos4.12.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/containernetworking-plugins@1.0.1-7.rhaos4.12.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "containernetworking-plugins-debugsource-0:1.0.1-7.rhaos4.12.el8.x86_64",
"product": {
"name": "containernetworking-plugins-debugsource-0:1.0.1-7.rhaos4.12.el8.x86_64",
"product_id": "containernetworking-plugins-debugsource-0:1.0.1-7.rhaos4.12.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/containernetworking-plugins-debugsource@1.0.1-7.rhaos4.12.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "containernetworking-plugins-debuginfo-0:1.0.1-7.rhaos4.12.el8.x86_64",
"product": {
"name": "containernetworking-plugins-debuginfo-0:1.0.1-7.rhaos4.12.el8.x86_64",
"product_id": "containernetworking-plugins-debuginfo-0:1.0.1-7.rhaos4.12.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/containernetworking-plugins-debuginfo@1.0.1-7.rhaos4.12.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "bpftool-0:4.18.0-372.59.1.el8_6.x86_64",
"product": {
"name": "bpftool-0:4.18.0-372.59.1.el8_6.x86_64",
"product_id": "bpftool-0:4.18.0-372.59.1.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool@4.18.0-372.59.1.el8_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-0:4.18.0-372.59.1.el8_6.x86_64",
"product": {
"name": "kernel-0:4.18.0-372.59.1.el8_6.x86_64",
"product_id": "kernel-0:4.18.0-372.59.1.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@4.18.0-372.59.1.el8_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-core-0:4.18.0-372.59.1.el8_6.x86_64",
"product": {
"name": "kernel-core-0:4.18.0-372.59.1.el8_6.x86_64",
"product_id": "kernel-core-0:4.18.0-372.59.1.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-core@4.18.0-372.59.1.el8_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-cross-headers-0:4.18.0-372.59.1.el8_6.x86_64",
"product": {
"name": "kernel-cross-headers-0:4.18.0-372.59.1.el8_6.x86_64",
"product_id": "kernel-cross-headers-0:4.18.0-372.59.1.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-cross-headers@4.18.0-372.59.1.el8_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:4.18.0-372.59.1.el8_6.x86_64",
"product": {
"name": "kernel-debug-0:4.18.0-372.59.1.el8_6.x86_64",
"product_id": "kernel-debug-0:4.18.0-372.59.1.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@4.18.0-372.59.1.el8_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-core-0:4.18.0-372.59.1.el8_6.x86_64",
"product": {
"name": "kernel-debug-core-0:4.18.0-372.59.1.el8_6.x86_64",
"product_id": "kernel-debug-core-0:4.18.0-372.59.1.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-core@4.18.0-372.59.1.el8_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:4.18.0-372.59.1.el8_6.x86_64",
"product": {
"name": "kernel-debug-devel-0:4.18.0-372.59.1.el8_6.x86_64",
"product_id": "kernel-debug-devel-0:4.18.0-372.59.1.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@4.18.0-372.59.1.el8_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-0:4.18.0-372.59.1.el8_6.x86_64",
"product": {
"name": "kernel-debug-modules-0:4.18.0-372.59.1.el8_6.x86_64",
"product_id": "kernel-debug-modules-0:4.18.0-372.59.1.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules@4.18.0-372.59.1.el8_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-extra-0:4.18.0-372.59.1.el8_6.x86_64",
"product": {
"name": "kernel-debug-modules-extra-0:4.18.0-372.59.1.el8_6.x86_64",
"product_id": "kernel-debug-modules-extra-0:4.18.0-372.59.1.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules-extra@4.18.0-372.59.1.el8_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-internal-0:4.18.0-372.59.1.el8_6.x86_64",
"product": {
"name": "kernel-debug-modules-internal-0:4.18.0-372.59.1.el8_6.x86_64",
"product_id": "kernel-debug-modules-internal-0:4.18.0-372.59.1.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules-internal@4.18.0-372.59.1.el8_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:4.18.0-372.59.1.el8_6.x86_64",
"product": {
"name": "kernel-devel-0:4.18.0-372.59.1.el8_6.x86_64",
"product_id": "kernel-devel-0:4.18.0-372.59.1.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@4.18.0-372.59.1.el8_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:4.18.0-372.59.1.el8_6.x86_64",
"product": {
"name": "kernel-headers-0:4.18.0-372.59.1.el8_6.x86_64",
"product_id": "kernel-headers-0:4.18.0-372.59.1.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@4.18.0-372.59.1.el8_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-ipaclones-internal-0:4.18.0-372.59.1.el8_6.x86_64",
"product": {
"name": "kernel-ipaclones-internal-0:4.18.0-372.59.1.el8_6.x86_64",
"product_id": "kernel-ipaclones-internal-0:4.18.0-372.59.1.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-ipaclones-internal@4.18.0-372.59.1.el8_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-0:4.18.0-372.59.1.el8_6.x86_64",
"product": {
"name": "kernel-modules-0:4.18.0-372.59.1.el8_6.x86_64",
"product_id": "kernel-modules-0:4.18.0-372.59.1.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules@4.18.0-372.59.1.el8_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-extra-0:4.18.0-372.59.1.el8_6.x86_64",
"product": {
"name": "kernel-modules-extra-0:4.18.0-372.59.1.el8_6.x86_64",
"product_id": "kernel-modules-extra-0:4.18.0-372.59.1.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules-extra@4.18.0-372.59.1.el8_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-internal-0:4.18.0-372.59.1.el8_6.x86_64",
"product": {
"name": "kernel-modules-internal-0:4.18.0-372.59.1.el8_6.x86_64",
"product_id": "kernel-modules-internal-0:4.18.0-372.59.1.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules-internal@4.18.0-372.59.1.el8_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-selftests-internal-0:4.18.0-372.59.1.el8_6.x86_64",
"product": {
"name": "kernel-selftests-internal-0:4.18.0-372.59.1.el8_6.x86_64",
"product_id": "kernel-selftests-internal-0:4.18.0-372.59.1.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-selftests-internal@4.18.0-372.59.1.el8_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:4.18.0-372.59.1.el8_6.x86_64",
"product": {
"name": "kernel-tools-0:4.18.0-372.59.1.el8_6.x86_64",
"product_id": "kernel-tools-0:4.18.0-372.59.1.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@4.18.0-372.59.1.el8_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:4.18.0-372.59.1.el8_6.x86_64",
"product": {
"name": "kernel-tools-libs-0:4.18.0-372.59.1.el8_6.x86_64",
"product_id": "kernel-tools-libs-0:4.18.0-372.59.1.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@4.18.0-372.59.1.el8_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:4.18.0-372.59.1.el8_6.x86_64",
"product": {
"name": "kernel-tools-libs-devel-0:4.18.0-372.59.1.el8_6.x86_64",
"product_id": "kernel-tools-libs-devel-0:4.18.0-372.59.1.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@4.18.0-372.59.1.el8_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-0:4.18.0-372.59.1.el8_6.x86_64",
"product": {
"name": "perf-0:4.18.0-372.59.1.el8_6.x86_64",
"product_id": "perf-0:4.18.0-372.59.1.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@4.18.0-372.59.1.el8_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3-perf-0:4.18.0-372.59.1.el8_6.x86_64",
"product": {
"name": "python3-perf-0:4.18.0-372.59.1.el8_6.x86_64",
"product_id": "python3-perf-0:4.18.0-372.59.1.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf@4.18.0-372.59.1.el8_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "bpftool-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64",
"product": {
"name": "bpftool-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64",
"product_id": "bpftool-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool-debuginfo@4.18.0-372.59.1.el8_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64",
"product": {
"name": "kernel-debug-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64",
"product_id": "kernel-debug-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.18.0-372.59.1.el8_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64",
"product": {
"name": "kernel-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64",
"product_id": "kernel-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@4.18.0-372.59.1.el8_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-x86_64-0:4.18.0-372.59.1.el8_6.x86_64",
"product": {
"name": "kernel-debuginfo-common-x86_64-0:4.18.0-372.59.1.el8_6.x86_64",
"product_id": "kernel-debuginfo-common-x86_64-0:4.18.0-372.59.1.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-x86_64@4.18.0-372.59.1.el8_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64",
"product": {
"name": "kernel-tools-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64",
"product_id": "kernel-tools-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.18.0-372.59.1.el8_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64",
"product": {
"name": "perf-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64",
"product_id": "perf-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@4.18.0-372.59.1.el8_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3-perf-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64",
"product": {
"name": "python3-perf-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64",
"product_id": "python3-perf-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf-debuginfo@4.18.0-372.59.1.el8_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"product": {
"name": "kernel-rt-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"product_id": "kernel-rt-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt@4.18.0-372.59.1.rt7.217.el8_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-core-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"product": {
"name": "kernel-rt-core-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"product_id": "kernel-rt-core-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-core@4.18.0-372.59.1.rt7.217.el8_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"product": {
"name": "kernel-rt-debug-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"product_id": "kernel-rt-debug-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug@4.18.0-372.59.1.rt7.217.el8_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-core-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"product": {
"name": "kernel-rt-debug-core-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"product_id": "kernel-rt-debug-core-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-core@4.18.0-372.59.1.rt7.217.el8_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-devel-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"product": {
"name": "kernel-rt-debug-devel-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"product_id": "kernel-rt-debug-devel-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-devel@4.18.0-372.59.1.rt7.217.el8_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-kvm-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"product": {
"name": "kernel-rt-debug-kvm-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"product_id": "kernel-rt-debug-kvm-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-kvm@4.18.0-372.59.1.rt7.217.el8_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-modules-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"product": {
"name": "kernel-rt-debug-modules-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"product_id": "kernel-rt-debug-modules-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-modules@4.18.0-372.59.1.rt7.217.el8_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-modules-extra-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"product": {
"name": "kernel-rt-debug-modules-extra-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"product_id": "kernel-rt-debug-modules-extra-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-modules-extra@4.18.0-372.59.1.rt7.217.el8_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-modules-internal-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"product": {
"name": "kernel-rt-debug-modules-internal-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"product_id": "kernel-rt-debug-modules-internal-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-modules-internal@4.18.0-372.59.1.rt7.217.el8_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-devel-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"product": {
"name": "kernel-rt-devel-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"product_id": "kernel-rt-devel-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-devel@4.18.0-372.59.1.rt7.217.el8_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-kvm-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"product": {
"name": "kernel-rt-kvm-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"product_id": "kernel-rt-kvm-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-kvm@4.18.0-372.59.1.rt7.217.el8_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-modules-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"product": {
"name": "kernel-rt-modules-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"product_id": "kernel-rt-modules-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-modules@4.18.0-372.59.1.rt7.217.el8_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-modules-extra-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"product": {
"name": "kernel-rt-modules-extra-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"product_id": "kernel-rt-modules-extra-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-modules-extra@4.18.0-372.59.1.rt7.217.el8_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-modules-internal-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"product": {
"name": "kernel-rt-modules-internal-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"product_id": "kernel-rt-modules-internal-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-modules-internal@4.18.0-372.59.1.rt7.217.el8_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-selftests-internal-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"product": {
"name": "kernel-rt-selftests-internal-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"product_id": "kernel-rt-selftests-internal-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-selftests-internal@4.18.0-372.59.1.rt7.217.el8_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-debuginfo-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"product": {
"name": "kernel-rt-debug-debuginfo-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"product_id": "kernel-rt-debug-debuginfo-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-debuginfo@4.18.0-372.59.1.rt7.217.el8_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debuginfo-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"product": {
"name": "kernel-rt-debuginfo-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"product_id": "kernel-rt-debuginfo-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debuginfo@4.18.0-372.59.1.rt7.217.el8_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"product": {
"name": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"product_id": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debuginfo-common-x86_64@4.18.0-372.59.1.rt7.217.el8_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el8.x86_64",
"product": {
"name": "openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el8.x86_64",
"product_id": "openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-hyperkube@4.12.0-202306121916.p0.g8c21020.assembly.stream.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.x86_64",
"product": {
"name": "openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.x86_64",
"product_id": "openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-clients@4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "openshift-clients-redistributable-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.x86_64",
"product": {
"name": "openshift-clients-redistributable-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.x86_64",
"product_id": "openshift-clients-redistributable-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-clients-redistributable@4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "podman-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"product": {
"name": "podman-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"product_id": "podman-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman@4.2.0-6.1.rhaos4.12.el8?arch=x86_64\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "podman-catatonit-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"product": {
"name": "podman-catatonit-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"product_id": "podman-catatonit-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-catatonit@4.2.0-6.1.rhaos4.12.el8?arch=x86_64\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "podman-gvproxy-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"product": {
"name": "podman-gvproxy-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"product_id": "podman-gvproxy-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-gvproxy@4.2.0-6.1.rhaos4.12.el8?arch=x86_64\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "podman-plugins-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"product": {
"name": "podman-plugins-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"product_id": "podman-plugins-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-plugins@4.2.0-6.1.rhaos4.12.el8?arch=x86_64\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "podman-remote-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"product": {
"name": "podman-remote-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"product_id": "podman-remote-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-remote@4.2.0-6.1.rhaos4.12.el8?arch=x86_64\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "podman-tests-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"product": {
"name": "podman-tests-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"product_id": "podman-tests-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-tests@4.2.0-6.1.rhaos4.12.el8?arch=x86_64\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "podman-debugsource-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"product": {
"name": "podman-debugsource-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"product_id": "podman-debugsource-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-debugsource@4.2.0-6.1.rhaos4.12.el8?arch=x86_64\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "podman-catatonit-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"product": {
"name": "podman-catatonit-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"product_id": "podman-catatonit-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-catatonit-debuginfo@4.2.0-6.1.rhaos4.12.el8?arch=x86_64\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "podman-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"product": {
"name": "podman-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"product_id": "podman-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-debuginfo@4.2.0-6.1.rhaos4.12.el8?arch=x86_64\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "podman-gvproxy-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"product": {
"name": "podman-gvproxy-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"product_id": "podman-gvproxy-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-gvproxy-debuginfo@4.2.0-6.1.rhaos4.12.el8?arch=x86_64\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "podman-plugins-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"product": {
"name": "podman-plugins-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"product_id": "podman-plugins-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-plugins-debuginfo@4.2.0-6.1.rhaos4.12.el8?arch=x86_64\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "podman-remote-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"product": {
"name": "podman-remote-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"product_id": "podman-remote-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-remote-debuginfo@4.2.0-6.1.rhaos4.12.el8?arch=x86_64\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "runc-3:1.1.6-4.rhaos4.12.el8.x86_64",
"product": {
"name": "runc-3:1.1.6-4.rhaos4.12.el8.x86_64",
"product_id": "runc-3:1.1.6-4.rhaos4.12.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/runc@1.1.6-4.rhaos4.12.el8?arch=x86_64\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "runc-debugsource-3:1.1.6-4.rhaos4.12.el8.x86_64",
"product": {
"name": "runc-debugsource-3:1.1.6-4.rhaos4.12.el8.x86_64",
"product_id": "runc-debugsource-3:1.1.6-4.rhaos4.12.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/runc-debugsource@1.1.6-4.rhaos4.12.el8?arch=x86_64\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "runc-debuginfo-3:1.1.6-4.rhaos4.12.el8.x86_64",
"product": {
"name": "runc-debuginfo-3:1.1.6-4.rhaos4.12.el8.x86_64",
"product_id": "runc-debuginfo-3:1.1.6-4.rhaos4.12.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/runc-debuginfo@1.1.6-4.rhaos4.12.el8?arch=x86_64\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "skopeo-2:1.9.4-3.1.rhaos4.12.el8.x86_64",
"product": {
"name": "skopeo-2:1.9.4-3.1.rhaos4.12.el8.x86_64",
"product_id": "skopeo-2:1.9.4-3.1.rhaos4.12.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/skopeo@1.9.4-3.1.rhaos4.12.el8?arch=x86_64\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "skopeo-tests-2:1.9.4-3.1.rhaos4.12.el8.x86_64",
"product": {
"name": "skopeo-tests-2:1.9.4-3.1.rhaos4.12.el8.x86_64",
"product_id": "skopeo-tests-2:1.9.4-3.1.rhaos4.12.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/skopeo-tests@1.9.4-3.1.rhaos4.12.el8?arch=x86_64\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "skopeo-debugsource-2:1.9.4-3.1.rhaos4.12.el8.x86_64",
"product": {
"name": "skopeo-debugsource-2:1.9.4-3.1.rhaos4.12.el8.x86_64",
"product_id": "skopeo-debugsource-2:1.9.4-3.1.rhaos4.12.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/skopeo-debugsource@1.9.4-3.1.rhaos4.12.el8?arch=x86_64\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "skopeo-debuginfo-2:1.9.4-3.1.rhaos4.12.el8.x86_64",
"product": {
"name": "skopeo-debuginfo-2:1.9.4-3.1.rhaos4.12.el8.x86_64",
"product_id": "skopeo-debuginfo-2:1.9.4-3.1.rhaos4.12.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/skopeo-debuginfo@1.9.4-3.1.rhaos4.12.el8?arch=x86_64\u0026epoch=2"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "buildah-1:1.23.4-5.rhaos4.12.el9.aarch64",
"product": {
"name": "buildah-1:1.23.4-5.rhaos4.12.el9.aarch64",
"product_id": "buildah-1:1.23.4-5.rhaos4.12.el9.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/buildah@1.23.4-5.rhaos4.12.el9?arch=aarch64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "buildah-tests-1:1.23.4-5.rhaos4.12.el9.aarch64",
"product": {
"name": "buildah-tests-1:1.23.4-5.rhaos4.12.el9.aarch64",
"product_id": "buildah-tests-1:1.23.4-5.rhaos4.12.el9.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/buildah-tests@1.23.4-5.rhaos4.12.el9?arch=aarch64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "buildah-debugsource-1:1.23.4-5.rhaos4.12.el9.aarch64",
"product": {
"name": "buildah-debugsource-1:1.23.4-5.rhaos4.12.el9.aarch64",
"product_id": "buildah-debugsource-1:1.23.4-5.rhaos4.12.el9.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/buildah-debugsource@1.23.4-5.rhaos4.12.el9?arch=aarch64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "buildah-debuginfo-1:1.23.4-5.rhaos4.12.el9.aarch64",
"product": {
"name": "buildah-debuginfo-1:1.23.4-5.rhaos4.12.el9.aarch64",
"product_id": "buildah-debuginfo-1:1.23.4-5.rhaos4.12.el9.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/buildah-debuginfo@1.23.4-5.rhaos4.12.el9?arch=aarch64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "buildah-tests-debuginfo-1:1.23.4-5.rhaos4.12.el9.aarch64",
"product": {
"name": "buildah-tests-debuginfo-1:1.23.4-5.rhaos4.12.el9.aarch64",
"product_id": "buildah-tests-debuginfo-1:1.23.4-5.rhaos4.12.el9.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/buildah-tests-debuginfo@1.23.4-5.rhaos4.12.el9?arch=aarch64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "conmon-2:2.1.2-5.rhaos4.12.el9.aarch64",
"product": {
"name": "conmon-2:2.1.2-5.rhaos4.12.el9.aarch64",
"product_id": "conmon-2:2.1.2-5.rhaos4.12.el9.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/conmon@2.1.2-5.rhaos4.12.el9?arch=aarch64\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "conmon-debugsource-2:2.1.2-5.rhaos4.12.el9.aarch64",
"product": {
"name": "conmon-debugsource-2:2.1.2-5.rhaos4.12.el9.aarch64",
"product_id": "conmon-debugsource-2:2.1.2-5.rhaos4.12.el9.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/conmon-debugsource@2.1.2-5.rhaos4.12.el9?arch=aarch64\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "conmon-debuginfo-2:2.1.2-5.rhaos4.12.el9.aarch64",
"product": {
"name": "conmon-debuginfo-2:2.1.2-5.rhaos4.12.el9.aarch64",
"product_id": "conmon-debuginfo-2:2.1.2-5.rhaos4.12.el9.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/conmon-debuginfo@2.1.2-5.rhaos4.12.el9?arch=aarch64\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el9.aarch64",
"product": {
"name": "openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el9.aarch64",
"product_id": "openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el9.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-hyperkube@4.12.0-202306121916.p0.g8c21020.assembly.stream.el9?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.aarch64",
"product": {
"name": "openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.aarch64",
"product_id": "openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-clients@4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "podman-3:4.2.0-7.rhaos4.12.el9.aarch64",
"product": {
"name": "podman-3:4.2.0-7.rhaos4.12.el9.aarch64",
"product_id": "podman-3:4.2.0-7.rhaos4.12.el9.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman@4.2.0-7.rhaos4.12.el9?arch=aarch64\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "podman-catatonit-3:4.2.0-7.rhaos4.12.el9.aarch64",
"product": {
"name": "podman-catatonit-3:4.2.0-7.rhaos4.12.el9.aarch64",
"product_id": "podman-catatonit-3:4.2.0-7.rhaos4.12.el9.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-catatonit@4.2.0-7.rhaos4.12.el9?arch=aarch64\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "podman-gvproxy-3:4.2.0-7.rhaos4.12.el9.aarch64",
"product": {
"name": "podman-gvproxy-3:4.2.0-7.rhaos4.12.el9.aarch64",
"product_id": "podman-gvproxy-3:4.2.0-7.rhaos4.12.el9.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-gvproxy@4.2.0-7.rhaos4.12.el9?arch=aarch64\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "podman-plugins-3:4.2.0-7.rhaos4.12.el9.aarch64",
"product": {
"name": "podman-plugins-3:4.2.0-7.rhaos4.12.el9.aarch64",
"product_id": "podman-plugins-3:4.2.0-7.rhaos4.12.el9.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-plugins@4.2.0-7.rhaos4.12.el9?arch=aarch64\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "podman-remote-3:4.2.0-7.rhaos4.12.el9.aarch64",
"product": {
"name": "podman-remote-3:4.2.0-7.rhaos4.12.el9.aarch64",
"product_id": "podman-remote-3:4.2.0-7.rhaos4.12.el9.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-remote@4.2.0-7.rhaos4.12.el9?arch=aarch64\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "podman-tests-3:4.2.0-7.rhaos4.12.el9.aarch64",
"product": {
"name": "podman-tests-3:4.2.0-7.rhaos4.12.el9.aarch64",
"product_id": "podman-tests-3:4.2.0-7.rhaos4.12.el9.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-tests@4.2.0-7.rhaos4.12.el9?arch=aarch64\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "podman-debugsource-3:4.2.0-7.rhaos4.12.el9.aarch64",
"product": {
"name": "podman-debugsource-3:4.2.0-7.rhaos4.12.el9.aarch64",
"product_id": "podman-debugsource-3:4.2.0-7.rhaos4.12.el9.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-debugsource@4.2.0-7.rhaos4.12.el9?arch=aarch64\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "podman-catatonit-debuginfo-3:4.2.0-7.rhaos4.12.el9.aarch64",
"product": {
"name": "podman-catatonit-debuginfo-3:4.2.0-7.rhaos4.12.el9.aarch64",
"product_id": "podman-catatonit-debuginfo-3:4.2.0-7.rhaos4.12.el9.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-catatonit-debuginfo@4.2.0-7.rhaos4.12.el9?arch=aarch64\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "podman-debuginfo-3:4.2.0-7.rhaos4.12.el9.aarch64",
"product": {
"name": "podman-debuginfo-3:4.2.0-7.rhaos4.12.el9.aarch64",
"product_id": "podman-debuginfo-3:4.2.0-7.rhaos4.12.el9.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-debuginfo@4.2.0-7.rhaos4.12.el9?arch=aarch64\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "podman-gvproxy-debuginfo-3:4.2.0-7.rhaos4.12.el9.aarch64",
"product": {
"name": "podman-gvproxy-debuginfo-3:4.2.0-7.rhaos4.12.el9.aarch64",
"product_id": "podman-gvproxy-debuginfo-3:4.2.0-7.rhaos4.12.el9.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-gvproxy-debuginfo@4.2.0-7.rhaos4.12.el9?arch=aarch64\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "podman-plugins-debuginfo-3:4.2.0-7.rhaos4.12.el9.aarch64",
"product": {
"name": "podman-plugins-debuginfo-3:4.2.0-7.rhaos4.12.el9.aarch64",
"product_id": "podman-plugins-debuginfo-3:4.2.0-7.rhaos4.12.el9.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-plugins-debuginfo@4.2.0-7.rhaos4.12.el9?arch=aarch64\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "podman-remote-debuginfo-3:4.2.0-7.rhaos4.12.el9.aarch64",
"product": {
"name": "podman-remote-debuginfo-3:4.2.0-7.rhaos4.12.el9.aarch64",
"product_id": "podman-remote-debuginfo-3:4.2.0-7.rhaos4.12.el9.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-remote-debuginfo@4.2.0-7.rhaos4.12.el9?arch=aarch64\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "skopeo-2:1.9.4-3.rhaos4.12.el9.aarch64",
"product": {
"name": "skopeo-2:1.9.4-3.rhaos4.12.el9.aarch64",
"product_id": "skopeo-2:1.9.4-3.rhaos4.12.el9.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/skopeo@1.9.4-3.rhaos4.12.el9?arch=aarch64\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "skopeo-tests-2:1.9.4-3.rhaos4.12.el9.aarch64",
"product": {
"name": "skopeo-tests-2:1.9.4-3.rhaos4.12.el9.aarch64",
"product_id": "skopeo-tests-2:1.9.4-3.rhaos4.12.el9.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/skopeo-tests@1.9.4-3.rhaos4.12.el9?arch=aarch64\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "skopeo-debugsource-2:1.9.4-3.rhaos4.12.el9.aarch64",
"product": {
"name": "skopeo-debugsource-2:1.9.4-3.rhaos4.12.el9.aarch64",
"product_id": "skopeo-debugsource-2:1.9.4-3.rhaos4.12.el9.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/skopeo-debugsource@1.9.4-3.rhaos4.12.el9?arch=aarch64\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "skopeo-debuginfo-2:1.9.4-3.rhaos4.12.el9.aarch64",
"product": {
"name": "skopeo-debuginfo-2:1.9.4-3.rhaos4.12.el9.aarch64",
"product_id": "skopeo-debuginfo-2:1.9.4-3.rhaos4.12.el9.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/skopeo-debuginfo@1.9.4-3.rhaos4.12.el9?arch=aarch64\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "buildah-1:1.23.4-5.1.rhaos4.12.el8.aarch64",
"product": {
"name": "buildah-1:1.23.4-5.1.rhaos4.12.el8.aarch64",
"product_id": "buildah-1:1.23.4-5.1.rhaos4.12.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/buildah@1.23.4-5.1.rhaos4.12.el8?arch=aarch64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "buildah-tests-1:1.23.4-5.1.rhaos4.12.el8.aarch64",
"product": {
"name": "buildah-tests-1:1.23.4-5.1.rhaos4.12.el8.aarch64",
"product_id": "buildah-tests-1:1.23.4-5.1.rhaos4.12.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/buildah-tests@1.23.4-5.1.rhaos4.12.el8?arch=aarch64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "buildah-debugsource-1:1.23.4-5.1.rhaos4.12.el8.aarch64",
"product": {
"name": "buildah-debugsource-1:1.23.4-5.1.rhaos4.12.el8.aarch64",
"product_id": "buildah-debugsource-1:1.23.4-5.1.rhaos4.12.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/buildah-debugsource@1.23.4-5.1.rhaos4.12.el8?arch=aarch64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "buildah-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.aarch64",
"product": {
"name": "buildah-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.aarch64",
"product_id": "buildah-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/buildah-debuginfo@1.23.4-5.1.rhaos4.12.el8?arch=aarch64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "buildah-tests-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.aarch64",
"product": {
"name": "buildah-tests-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.aarch64",
"product_id": "buildah-tests-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/buildah-tests-debuginfo@1.23.4-5.1.rhaos4.12.el8?arch=aarch64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "conmon-2:2.1.2-4.rhaos4.12.el8.aarch64",
"product": {
"name": "conmon-2:2.1.2-4.rhaos4.12.el8.aarch64",
"product_id": "conmon-2:2.1.2-4.rhaos4.12.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/conmon@2.1.2-4.rhaos4.12.el8?arch=aarch64\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "conmon-debugsource-2:2.1.2-4.rhaos4.12.el8.aarch64",
"product": {
"name": "conmon-debugsource-2:2.1.2-4.rhaos4.12.el8.aarch64",
"product_id": "conmon-debugsource-2:2.1.2-4.rhaos4.12.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/conmon-debugsource@2.1.2-4.rhaos4.12.el8?arch=aarch64\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "conmon-debuginfo-2:2.1.2-4.rhaos4.12.el8.aarch64",
"product": {
"name": "conmon-debuginfo-2:2.1.2-4.rhaos4.12.el8.aarch64",
"product_id": "conmon-debuginfo-2:2.1.2-4.rhaos4.12.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/conmon-debuginfo@2.1.2-4.rhaos4.12.el8?arch=aarch64\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "containernetworking-plugins-0:1.0.1-7.rhaos4.12.el8.aarch64",
"product": {
"name": "containernetworking-plugins-0:1.0.1-7.rhaos4.12.el8.aarch64",
"product_id": "containernetworking-plugins-0:1.0.1-7.rhaos4.12.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/containernetworking-plugins@1.0.1-7.rhaos4.12.el8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "containernetworking-plugins-debugsource-0:1.0.1-7.rhaos4.12.el8.aarch64",
"product": {
"name": "containernetworking-plugins-debugsource-0:1.0.1-7.rhaos4.12.el8.aarch64",
"product_id": "containernetworking-plugins-debugsource-0:1.0.1-7.rhaos4.12.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/containernetworking-plugins-debugsource@1.0.1-7.rhaos4.12.el8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "containernetworking-plugins-debuginfo-0:1.0.1-7.rhaos4.12.el8.aarch64",
"product": {
"name": "containernetworking-plugins-debuginfo-0:1.0.1-7.rhaos4.12.el8.aarch64",
"product_id": "containernetworking-plugins-debuginfo-0:1.0.1-7.rhaos4.12.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/containernetworking-plugins-debuginfo@1.0.1-7.rhaos4.12.el8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "bpftool-0:4.18.0-372.59.1.el8_6.aarch64",
"product": {
"name": "bpftool-0:4.18.0-372.59.1.el8_6.aarch64",
"product_id": "bpftool-0:4.18.0-372.59.1.el8_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool@4.18.0-372.59.1.el8_6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-0:4.18.0-372.59.1.el8_6.aarch64",
"product": {
"name": "kernel-0:4.18.0-372.59.1.el8_6.aarch64",
"product_id": "kernel-0:4.18.0-372.59.1.el8_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@4.18.0-372.59.1.el8_6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-core-0:4.18.0-372.59.1.el8_6.aarch64",
"product": {
"name": "kernel-core-0:4.18.0-372.59.1.el8_6.aarch64",
"product_id": "kernel-core-0:4.18.0-372.59.1.el8_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-core@4.18.0-372.59.1.el8_6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-cross-headers-0:4.18.0-372.59.1.el8_6.aarch64",
"product": {
"name": "kernel-cross-headers-0:4.18.0-372.59.1.el8_6.aarch64",
"product_id": "kernel-cross-headers-0:4.18.0-372.59.1.el8_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-cross-headers@4.18.0-372.59.1.el8_6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:4.18.0-372.59.1.el8_6.aarch64",
"product": {
"name": "kernel-debug-0:4.18.0-372.59.1.el8_6.aarch64",
"product_id": "kernel-debug-0:4.18.0-372.59.1.el8_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@4.18.0-372.59.1.el8_6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-core-0:4.18.0-372.59.1.el8_6.aarch64",
"product": {
"name": "kernel-debug-core-0:4.18.0-372.59.1.el8_6.aarch64",
"product_id": "kernel-debug-core-0:4.18.0-372.59.1.el8_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-core@4.18.0-372.59.1.el8_6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:4.18.0-372.59.1.el8_6.aarch64",
"product": {
"name": "kernel-debug-devel-0:4.18.0-372.59.1.el8_6.aarch64",
"product_id": "kernel-debug-devel-0:4.18.0-372.59.1.el8_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@4.18.0-372.59.1.el8_6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-0:4.18.0-372.59.1.el8_6.aarch64",
"product": {
"name": "kernel-debug-modules-0:4.18.0-372.59.1.el8_6.aarch64",
"product_id": "kernel-debug-modules-0:4.18.0-372.59.1.el8_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules@4.18.0-372.59.1.el8_6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-extra-0:4.18.0-372.59.1.el8_6.aarch64",
"product": {
"name": "kernel-debug-modules-extra-0:4.18.0-372.59.1.el8_6.aarch64",
"product_id": "kernel-debug-modules-extra-0:4.18.0-372.59.1.el8_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules-extra@4.18.0-372.59.1.el8_6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-internal-0:4.18.0-372.59.1.el8_6.aarch64",
"product": {
"name": "kernel-debug-modules-internal-0:4.18.0-372.59.1.el8_6.aarch64",
"product_id": "kernel-debug-modules-internal-0:4.18.0-372.59.1.el8_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules-internal@4.18.0-372.59.1.el8_6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:4.18.0-372.59.1.el8_6.aarch64",
"product": {
"name": "kernel-devel-0:4.18.0-372.59.1.el8_6.aarch64",
"product_id": "kernel-devel-0:4.18.0-372.59.1.el8_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@4.18.0-372.59.1.el8_6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:4.18.0-372.59.1.el8_6.aarch64",
"product": {
"name": "kernel-headers-0:4.18.0-372.59.1.el8_6.aarch64",
"product_id": "kernel-headers-0:4.18.0-372.59.1.el8_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@4.18.0-372.59.1.el8_6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-0:4.18.0-372.59.1.el8_6.aarch64",
"product": {
"name": "kernel-modules-0:4.18.0-372.59.1.el8_6.aarch64",
"product_id": "kernel-modules-0:4.18.0-372.59.1.el8_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules@4.18.0-372.59.1.el8_6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-extra-0:4.18.0-372.59.1.el8_6.aarch64",
"product": {
"name": "kernel-modules-extra-0:4.18.0-372.59.1.el8_6.aarch64",
"product_id": "kernel-modules-extra-0:4.18.0-372.59.1.el8_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules-extra@4.18.0-372.59.1.el8_6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-internal-0:4.18.0-372.59.1.el8_6.aarch64",
"product": {
"name": "kernel-modules-internal-0:4.18.0-372.59.1.el8_6.aarch64",
"product_id": "kernel-modules-internal-0:4.18.0-372.59.1.el8_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules-internal@4.18.0-372.59.1.el8_6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-selftests-internal-0:4.18.0-372.59.1.el8_6.aarch64",
"product": {
"name": "kernel-selftests-internal-0:4.18.0-372.59.1.el8_6.aarch64",
"product_id": "kernel-selftests-internal-0:4.18.0-372.59.1.el8_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-selftests-internal@4.18.0-372.59.1.el8_6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:4.18.0-372.59.1.el8_6.aarch64",
"product": {
"name": "kernel-tools-0:4.18.0-372.59.1.el8_6.aarch64",
"product_id": "kernel-tools-0:4.18.0-372.59.1.el8_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@4.18.0-372.59.1.el8_6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:4.18.0-372.59.1.el8_6.aarch64",
"product": {
"name": "kernel-tools-libs-0:4.18.0-372.59.1.el8_6.aarch64",
"product_id": "kernel-tools-libs-0:4.18.0-372.59.1.el8_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@4.18.0-372.59.1.el8_6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:4.18.0-372.59.1.el8_6.aarch64",
"product": {
"name": "kernel-tools-libs-devel-0:4.18.0-372.59.1.el8_6.aarch64",
"product_id": "kernel-tools-libs-devel-0:4.18.0-372.59.1.el8_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@4.18.0-372.59.1.el8_6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "perf-0:4.18.0-372.59.1.el8_6.aarch64",
"product": {
"name": "perf-0:4.18.0-372.59.1.el8_6.aarch64",
"product_id": "perf-0:4.18.0-372.59.1.el8_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@4.18.0-372.59.1.el8_6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python3-perf-0:4.18.0-372.59.1.el8_6.aarch64",
"product": {
"name": "python3-perf-0:4.18.0-372.59.1.el8_6.aarch64",
"product_id": "python3-perf-0:4.18.0-372.59.1.el8_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf@4.18.0-372.59.1.el8_6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "bpftool-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64",
"product": {
"name": "bpftool-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64",
"product_id": "bpftool-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool-debuginfo@4.18.0-372.59.1.el8_6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64",
"product": {
"name": "kernel-debug-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64",
"product_id": "kernel-debug-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.18.0-372.59.1.el8_6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64",
"product": {
"name": "kernel-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64",
"product_id": "kernel-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@4.18.0-372.59.1.el8_6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-aarch64-0:4.18.0-372.59.1.el8_6.aarch64",
"product": {
"name": "kernel-debuginfo-common-aarch64-0:4.18.0-372.59.1.el8_6.aarch64",
"product_id": "kernel-debuginfo-common-aarch64-0:4.18.0-372.59.1.el8_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-aarch64@4.18.0-372.59.1.el8_6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64",
"product": {
"name": "kernel-tools-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64",
"product_id": "kernel-tools-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.18.0-372.59.1.el8_6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64",
"product": {
"name": "perf-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64",
"product_id": "perf-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@4.18.0-372.59.1.el8_6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python3-perf-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64",
"product": {
"name": "python3-perf-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64",
"product_id": "python3-perf-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf-debuginfo@4.18.0-372.59.1.el8_6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el8.aarch64",
"product": {
"name": "openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el8.aarch64",
"product_id": "openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-hyperkube@4.12.0-202306121916.p0.g8c21020.assembly.stream.el8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.aarch64",
"product": {
"name": "openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.aarch64",
"product_id": "openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-clients@4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "podman-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"product": {
"name": "podman-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"product_id": "podman-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman@4.2.0-6.1.rhaos4.12.el8?arch=aarch64\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "podman-catatonit-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"product": {
"name": "podman-catatonit-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"product_id": "podman-catatonit-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-catatonit@4.2.0-6.1.rhaos4.12.el8?arch=aarch64\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "podman-gvproxy-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"product": {
"name": "podman-gvproxy-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"product_id": "podman-gvproxy-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-gvproxy@4.2.0-6.1.rhaos4.12.el8?arch=aarch64\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "podman-plugins-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"product": {
"name": "podman-plugins-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"product_id": "podman-plugins-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-plugins@4.2.0-6.1.rhaos4.12.el8?arch=aarch64\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "podman-remote-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"product": {
"name": "podman-remote-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"product_id": "podman-remote-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-remote@4.2.0-6.1.rhaos4.12.el8?arch=aarch64\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "podman-tests-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"product": {
"name": "podman-tests-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"product_id": "podman-tests-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-tests@4.2.0-6.1.rhaos4.12.el8?arch=aarch64\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "podman-debugsource-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"product": {
"name": "podman-debugsource-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"product_id": "podman-debugsource-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-debugsource@4.2.0-6.1.rhaos4.12.el8?arch=aarch64\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "podman-catatonit-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"product": {
"name": "podman-catatonit-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"product_id": "podman-catatonit-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-catatonit-debuginfo@4.2.0-6.1.rhaos4.12.el8?arch=aarch64\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "podman-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"product": {
"name": "podman-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"product_id": "podman-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-debuginfo@4.2.0-6.1.rhaos4.12.el8?arch=aarch64\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "podman-gvproxy-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"product": {
"name": "podman-gvproxy-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"product_id": "podman-gvproxy-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-gvproxy-debuginfo@4.2.0-6.1.rhaos4.12.el8?arch=aarch64\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "podman-plugins-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"product": {
"name": "podman-plugins-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"product_id": "podman-plugins-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-plugins-debuginfo@4.2.0-6.1.rhaos4.12.el8?arch=aarch64\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "podman-remote-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"product": {
"name": "podman-remote-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"product_id": "podman-remote-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-remote-debuginfo@4.2.0-6.1.rhaos4.12.el8?arch=aarch64\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "runc-3:1.1.6-4.rhaos4.12.el8.aarch64",
"product": {
"name": "runc-3:1.1.6-4.rhaos4.12.el8.aarch64",
"product_id": "runc-3:1.1.6-4.rhaos4.12.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/runc@1.1.6-4.rhaos4.12.el8?arch=aarch64\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "runc-debugsource-3:1.1.6-4.rhaos4.12.el8.aarch64",
"product": {
"name": "runc-debugsource-3:1.1.6-4.rhaos4.12.el8.aarch64",
"product_id": "runc-debugsource-3:1.1.6-4.rhaos4.12.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/runc-debugsource@1.1.6-4.rhaos4.12.el8?arch=aarch64\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "runc-debuginfo-3:1.1.6-4.rhaos4.12.el8.aarch64",
"product": {
"name": "runc-debuginfo-3:1.1.6-4.rhaos4.12.el8.aarch64",
"product_id": "runc-debuginfo-3:1.1.6-4.rhaos4.12.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/runc-debuginfo@1.1.6-4.rhaos4.12.el8?arch=aarch64\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "skopeo-2:1.9.4-3.1.rhaos4.12.el8.aarch64",
"product": {
"name": "skopeo-2:1.9.4-3.1.rhaos4.12.el8.aarch64",
"product_id": "skopeo-2:1.9.4-3.1.rhaos4.12.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/skopeo@1.9.4-3.1.rhaos4.12.el8?arch=aarch64\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "skopeo-tests-2:1.9.4-3.1.rhaos4.12.el8.aarch64",
"product": {
"name": "skopeo-tests-2:1.9.4-3.1.rhaos4.12.el8.aarch64",
"product_id": "skopeo-tests-2:1.9.4-3.1.rhaos4.12.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/skopeo-tests@1.9.4-3.1.rhaos4.12.el8?arch=aarch64\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "skopeo-debugsource-2:1.9.4-3.1.rhaos4.12.el8.aarch64",
"product": {
"name": "skopeo-debugsource-2:1.9.4-3.1.rhaos4.12.el8.aarch64",
"product_id": "skopeo-debugsource-2:1.9.4-3.1.rhaos4.12.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/skopeo-debugsource@1.9.4-3.1.rhaos4.12.el8?arch=aarch64\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "skopeo-debuginfo-2:1.9.4-3.1.rhaos4.12.el8.aarch64",
"product": {
"name": "skopeo-debuginfo-2:1.9.4-3.1.rhaos4.12.el8.aarch64",
"product_id": "skopeo-debuginfo-2:1.9.4-3.1.rhaos4.12.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/skopeo-debuginfo@1.9.4-3.1.rhaos4.12.el8?arch=aarch64\u0026epoch=2"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "buildah-1:1.23.4-5.rhaos4.12.el9.ppc64le",
"product": {
"name": "buildah-1:1.23.4-5.rhaos4.12.el9.ppc64le",
"product_id": "buildah-1:1.23.4-5.rhaos4.12.el9.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/buildah@1.23.4-5.rhaos4.12.el9?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "buildah-tests-1:1.23.4-5.rhaos4.12.el9.ppc64le",
"product": {
"name": "buildah-tests-1:1.23.4-5.rhaos4.12.el9.ppc64le",
"product_id": "buildah-tests-1:1.23.4-5.rhaos4.12.el9.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/buildah-tests@1.23.4-5.rhaos4.12.el9?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "buildah-debugsource-1:1.23.4-5.rhaos4.12.el9.ppc64le",
"product": {
"name": "buildah-debugsource-1:1.23.4-5.rhaos4.12.el9.ppc64le",
"product_id": "buildah-debugsource-1:1.23.4-5.rhaos4.12.el9.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/buildah-debugsource@1.23.4-5.rhaos4.12.el9?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "buildah-debuginfo-1:1.23.4-5.rhaos4.12.el9.ppc64le",
"product": {
"name": "buildah-debuginfo-1:1.23.4-5.rhaos4.12.el9.ppc64le",
"product_id": "buildah-debuginfo-1:1.23.4-5.rhaos4.12.el9.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/buildah-debuginfo@1.23.4-5.rhaos4.12.el9?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "buildah-tests-debuginfo-1:1.23.4-5.rhaos4.12.el9.ppc64le",
"product": {
"name": "buildah-tests-debuginfo-1:1.23.4-5.rhaos4.12.el9.ppc64le",
"product_id": "buildah-tests-debuginfo-1:1.23.4-5.rhaos4.12.el9.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/buildah-tests-debuginfo@1.23.4-5.rhaos4.12.el9?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "conmon-2:2.1.2-5.rhaos4.12.el9.ppc64le",
"product": {
"name": "conmon-2:2.1.2-5.rhaos4.12.el9.ppc64le",
"product_id": "conmon-2:2.1.2-5.rhaos4.12.el9.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/conmon@2.1.2-5.rhaos4.12.el9?arch=ppc64le\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "conmon-debugsource-2:2.1.2-5.rhaos4.12.el9.ppc64le",
"product": {
"name": "conmon-debugsource-2:2.1.2-5.rhaos4.12.el9.ppc64le",
"product_id": "conmon-debugsource-2:2.1.2-5.rhaos4.12.el9.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/conmon-debugsource@2.1.2-5.rhaos4.12.el9?arch=ppc64le\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "conmon-debuginfo-2:2.1.2-5.rhaos4.12.el9.ppc64le",
"product": {
"name": "conmon-debuginfo-2:2.1.2-5.rhaos4.12.el9.ppc64le",
"product_id": "conmon-debuginfo-2:2.1.2-5.rhaos4.12.el9.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/conmon-debuginfo@2.1.2-5.rhaos4.12.el9?arch=ppc64le\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el9.ppc64le",
"product": {
"name": "openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el9.ppc64le",
"product_id": "openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el9.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-hyperkube@4.12.0-202306121916.p0.g8c21020.assembly.stream.el9?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.ppc64le",
"product": {
"name": "openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.ppc64le",
"product_id": "openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-clients@4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "podman-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"product": {
"name": "podman-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"product_id": "podman-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman@4.2.0-7.rhaos4.12.el9?arch=ppc64le\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "podman-catatonit-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"product": {
"name": "podman-catatonit-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"product_id": "podman-catatonit-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-catatonit@4.2.0-7.rhaos4.12.el9?arch=ppc64le\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "podman-gvproxy-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"product": {
"name": "podman-gvproxy-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"product_id": "podman-gvproxy-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-gvproxy@4.2.0-7.rhaos4.12.el9?arch=ppc64le\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "podman-plugins-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"product": {
"name": "podman-plugins-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"product_id": "podman-plugins-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-plugins@4.2.0-7.rhaos4.12.el9?arch=ppc64le\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "podman-remote-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"product": {
"name": "podman-remote-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"product_id": "podman-remote-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-remote@4.2.0-7.rhaos4.12.el9?arch=ppc64le\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "podman-tests-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"product": {
"name": "podman-tests-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"product_id": "podman-tests-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-tests@4.2.0-7.rhaos4.12.el9?arch=ppc64le\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "podman-debugsource-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"product": {
"name": "podman-debugsource-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"product_id": "podman-debugsource-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-debugsource@4.2.0-7.rhaos4.12.el9?arch=ppc64le\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "podman-catatonit-debuginfo-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"product": {
"name": "podman-catatonit-debuginfo-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"product_id": "podman-catatonit-debuginfo-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-catatonit-debuginfo@4.2.0-7.rhaos4.12.el9?arch=ppc64le\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "podman-debuginfo-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"product": {
"name": "podman-debuginfo-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"product_id": "podman-debuginfo-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-debuginfo@4.2.0-7.rhaos4.12.el9?arch=ppc64le\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "podman-gvproxy-debuginfo-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"product": {
"name": "podman-gvproxy-debuginfo-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"product_id": "podman-gvproxy-debuginfo-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-gvproxy-debuginfo@4.2.0-7.rhaos4.12.el9?arch=ppc64le\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "podman-plugins-debuginfo-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"product": {
"name": "podman-plugins-debuginfo-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"product_id": "podman-plugins-debuginfo-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-plugins-debuginfo@4.2.0-7.rhaos4.12.el9?arch=ppc64le\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "podman-remote-debuginfo-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"product": {
"name": "podman-remote-debuginfo-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"product_id": "podman-remote-debuginfo-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-remote-debuginfo@4.2.0-7.rhaos4.12.el9?arch=ppc64le\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "skopeo-2:1.9.4-3.rhaos4.12.el9.ppc64le",
"product": {
"name": "skopeo-2:1.9.4-3.rhaos4.12.el9.ppc64le",
"product_id": "skopeo-2:1.9.4-3.rhaos4.12.el9.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/skopeo@1.9.4-3.rhaos4.12.el9?arch=ppc64le\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "skopeo-tests-2:1.9.4-3.rhaos4.12.el9.ppc64le",
"product": {
"name": "skopeo-tests-2:1.9.4-3.rhaos4.12.el9.ppc64le",
"product_id": "skopeo-tests-2:1.9.4-3.rhaos4.12.el9.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/skopeo-tests@1.9.4-3.rhaos4.12.el9?arch=ppc64le\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "skopeo-debugsource-2:1.9.4-3.rhaos4.12.el9.ppc64le",
"product": {
"name": "skopeo-debugsource-2:1.9.4-3.rhaos4.12.el9.ppc64le",
"product_id": "skopeo-debugsource-2:1.9.4-3.rhaos4.12.el9.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/skopeo-debugsource@1.9.4-3.rhaos4.12.el9?arch=ppc64le\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "skopeo-debuginfo-2:1.9.4-3.rhaos4.12.el9.ppc64le",
"product": {
"name": "skopeo-debuginfo-2:1.9.4-3.rhaos4.12.el9.ppc64le",
"product_id": "skopeo-debuginfo-2:1.9.4-3.rhaos4.12.el9.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/skopeo-debuginfo@1.9.4-3.rhaos4.12.el9?arch=ppc64le\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "buildah-1:1.23.4-5.1.rhaos4.12.el8.ppc64le",
"product": {
"name": "buildah-1:1.23.4-5.1.rhaos4.12.el8.ppc64le",
"product_id": "buildah-1:1.23.4-5.1.rhaos4.12.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/buildah@1.23.4-5.1.rhaos4.12.el8?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "buildah-tests-1:1.23.4-5.1.rhaos4.12.el8.ppc64le",
"product": {
"name": "buildah-tests-1:1.23.4-5.1.rhaos4.12.el8.ppc64le",
"product_id": "buildah-tests-1:1.23.4-5.1.rhaos4.12.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/buildah-tests@1.23.4-5.1.rhaos4.12.el8?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "buildah-debugsource-1:1.23.4-5.1.rhaos4.12.el8.ppc64le",
"product": {
"name": "buildah-debugsource-1:1.23.4-5.1.rhaos4.12.el8.ppc64le",
"product_id": "buildah-debugsource-1:1.23.4-5.1.rhaos4.12.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/buildah-debugsource@1.23.4-5.1.rhaos4.12.el8?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "buildah-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.ppc64le",
"product": {
"name": "buildah-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.ppc64le",
"product_id": "buildah-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/buildah-debuginfo@1.23.4-5.1.rhaos4.12.el8?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "buildah-tests-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.ppc64le",
"product": {
"name": "buildah-tests-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.ppc64le",
"product_id": "buildah-tests-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/buildah-tests-debuginfo@1.23.4-5.1.rhaos4.12.el8?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "conmon-2:2.1.2-4.rhaos4.12.el8.ppc64le",
"product": {
"name": "conmon-2:2.1.2-4.rhaos4.12.el8.ppc64le",
"product_id": "conmon-2:2.1.2-4.rhaos4.12.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/conmon@2.1.2-4.rhaos4.12.el8?arch=ppc64le\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "conmon-debugsource-2:2.1.2-4.rhaos4.12.el8.ppc64le",
"product": {
"name": "conmon-debugsource-2:2.1.2-4.rhaos4.12.el8.ppc64le",
"product_id": "conmon-debugsource-2:2.1.2-4.rhaos4.12.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/conmon-debugsource@2.1.2-4.rhaos4.12.el8?arch=ppc64le\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "conmon-debuginfo-2:2.1.2-4.rhaos4.12.el8.ppc64le",
"product": {
"name": "conmon-debuginfo-2:2.1.2-4.rhaos4.12.el8.ppc64le",
"product_id": "conmon-debuginfo-2:2.1.2-4.rhaos4.12.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/conmon-debuginfo@2.1.2-4.rhaos4.12.el8?arch=ppc64le\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "containernetworking-plugins-0:1.0.1-7.rhaos4.12.el8.ppc64le",
"product": {
"name": "containernetworking-plugins-0:1.0.1-7.rhaos4.12.el8.ppc64le",
"product_id": "containernetworking-plugins-0:1.0.1-7.rhaos4.12.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/containernetworking-plugins@1.0.1-7.rhaos4.12.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "containernetworking-plugins-debugsource-0:1.0.1-7.rhaos4.12.el8.ppc64le",
"product": {
"name": "containernetworking-plugins-debugsource-0:1.0.1-7.rhaos4.12.el8.ppc64le",
"product_id": "containernetworking-plugins-debugsource-0:1.0.1-7.rhaos4.12.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/containernetworking-plugins-debugsource@1.0.1-7.rhaos4.12.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "containernetworking-plugins-debuginfo-0:1.0.1-7.rhaos4.12.el8.ppc64le",
"product": {
"name": "containernetworking-plugins-debuginfo-0:1.0.1-7.rhaos4.12.el8.ppc64le",
"product_id": "containernetworking-plugins-debuginfo-0:1.0.1-7.rhaos4.12.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/containernetworking-plugins-debuginfo@1.0.1-7.rhaos4.12.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "bpftool-0:4.18.0-372.59.1.el8_6.ppc64le",
"product": {
"name": "bpftool-0:4.18.0-372.59.1.el8_6.ppc64le",
"product_id": "bpftool-0:4.18.0-372.59.1.el8_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool@4.18.0-372.59.1.el8_6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-0:4.18.0-372.59.1.el8_6.ppc64le",
"product": {
"name": "kernel-0:4.18.0-372.59.1.el8_6.ppc64le",
"product_id": "kernel-0:4.18.0-372.59.1.el8_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@4.18.0-372.59.1.el8_6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-core-0:4.18.0-372.59.1.el8_6.ppc64le",
"product": {
"name": "kernel-core-0:4.18.0-372.59.1.el8_6.ppc64le",
"product_id": "kernel-core-0:4.18.0-372.59.1.el8_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-core@4.18.0-372.59.1.el8_6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-cross-headers-0:4.18.0-372.59.1.el8_6.ppc64le",
"product": {
"name": "kernel-cross-headers-0:4.18.0-372.59.1.el8_6.ppc64le",
"product_id": "kernel-cross-headers-0:4.18.0-372.59.1.el8_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-cross-headers@4.18.0-372.59.1.el8_6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:4.18.0-372.59.1.el8_6.ppc64le",
"product": {
"name": "kernel-debug-0:4.18.0-372.59.1.el8_6.ppc64le",
"product_id": "kernel-debug-0:4.18.0-372.59.1.el8_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@4.18.0-372.59.1.el8_6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-core-0:4.18.0-372.59.1.el8_6.ppc64le",
"product": {
"name": "kernel-debug-core-0:4.18.0-372.59.1.el8_6.ppc64le",
"product_id": "kernel-debug-core-0:4.18.0-372.59.1.el8_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-core@4.18.0-372.59.1.el8_6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:4.18.0-372.59.1.el8_6.ppc64le",
"product": {
"name": "kernel-debug-devel-0:4.18.0-372.59.1.el8_6.ppc64le",
"product_id": "kernel-debug-devel-0:4.18.0-372.59.1.el8_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@4.18.0-372.59.1.el8_6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-0:4.18.0-372.59.1.el8_6.ppc64le",
"product": {
"name": "kernel-debug-modules-0:4.18.0-372.59.1.el8_6.ppc64le",
"product_id": "kernel-debug-modules-0:4.18.0-372.59.1.el8_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules@4.18.0-372.59.1.el8_6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-extra-0:4.18.0-372.59.1.el8_6.ppc64le",
"product": {
"name": "kernel-debug-modules-extra-0:4.18.0-372.59.1.el8_6.ppc64le",
"product_id": "kernel-debug-modules-extra-0:4.18.0-372.59.1.el8_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules-extra@4.18.0-372.59.1.el8_6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-internal-0:4.18.0-372.59.1.el8_6.ppc64le",
"product": {
"name": "kernel-debug-modules-internal-0:4.18.0-372.59.1.el8_6.ppc64le",
"product_id": "kernel-debug-modules-internal-0:4.18.0-372.59.1.el8_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules-internal@4.18.0-372.59.1.el8_6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:4.18.0-372.59.1.el8_6.ppc64le",
"product": {
"name": "kernel-devel-0:4.18.0-372.59.1.el8_6.ppc64le",
"product_id": "kernel-devel-0:4.18.0-372.59.1.el8_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@4.18.0-372.59.1.el8_6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:4.18.0-372.59.1.el8_6.ppc64le",
"product": {
"name": "kernel-headers-0:4.18.0-372.59.1.el8_6.ppc64le",
"product_id": "kernel-headers-0:4.18.0-372.59.1.el8_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@4.18.0-372.59.1.el8_6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-ipaclones-internal-0:4.18.0-372.59.1.el8_6.ppc64le",
"product": {
"name": "kernel-ipaclones-internal-0:4.18.0-372.59.1.el8_6.ppc64le",
"product_id": "kernel-ipaclones-internal-0:4.18.0-372.59.1.el8_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-ipaclones-internal@4.18.0-372.59.1.el8_6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-0:4.18.0-372.59.1.el8_6.ppc64le",
"product": {
"name": "kernel-modules-0:4.18.0-372.59.1.el8_6.ppc64le",
"product_id": "kernel-modules-0:4.18.0-372.59.1.el8_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules@4.18.0-372.59.1.el8_6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-extra-0:4.18.0-372.59.1.el8_6.ppc64le",
"product": {
"name": "kernel-modules-extra-0:4.18.0-372.59.1.el8_6.ppc64le",
"product_id": "kernel-modules-extra-0:4.18.0-372.59.1.el8_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules-extra@4.18.0-372.59.1.el8_6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-internal-0:4.18.0-372.59.1.el8_6.ppc64le",
"product": {
"name": "kernel-modules-internal-0:4.18.0-372.59.1.el8_6.ppc64le",
"product_id": "kernel-modules-internal-0:4.18.0-372.59.1.el8_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules-internal@4.18.0-372.59.1.el8_6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-selftests-internal-0:4.18.0-372.59.1.el8_6.ppc64le",
"product": {
"name": "kernel-selftests-internal-0:4.18.0-372.59.1.el8_6.ppc64le",
"product_id": "kernel-selftests-internal-0:4.18.0-372.59.1.el8_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-selftests-internal@4.18.0-372.59.1.el8_6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:4.18.0-372.59.1.el8_6.ppc64le",
"product": {
"name": "kernel-tools-0:4.18.0-372.59.1.el8_6.ppc64le",
"product_id": "kernel-tools-0:4.18.0-372.59.1.el8_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@4.18.0-372.59.1.el8_6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:4.18.0-372.59.1.el8_6.ppc64le",
"product": {
"name": "kernel-tools-libs-0:4.18.0-372.59.1.el8_6.ppc64le",
"product_id": "kernel-tools-libs-0:4.18.0-372.59.1.el8_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@4.18.0-372.59.1.el8_6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:4.18.0-372.59.1.el8_6.ppc64le",
"product": {
"name": "kernel-tools-libs-devel-0:4.18.0-372.59.1.el8_6.ppc64le",
"product_id": "kernel-tools-libs-devel-0:4.18.0-372.59.1.el8_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@4.18.0-372.59.1.el8_6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "perf-0:4.18.0-372.59.1.el8_6.ppc64le",
"product": {
"name": "perf-0:4.18.0-372.59.1.el8_6.ppc64le",
"product_id": "perf-0:4.18.0-372.59.1.el8_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@4.18.0-372.59.1.el8_6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python3-perf-0:4.18.0-372.59.1.el8_6.ppc64le",
"product": {
"name": "python3-perf-0:4.18.0-372.59.1.el8_6.ppc64le",
"product_id": "python3-perf-0:4.18.0-372.59.1.el8_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf@4.18.0-372.59.1.el8_6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "bpftool-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le",
"product": {
"name": "bpftool-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le",
"product_id": "bpftool-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool-debuginfo@4.18.0-372.59.1.el8_6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le",
"product": {
"name": "kernel-debug-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le",
"product_id": "kernel-debug-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.18.0-372.59.1.el8_6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le",
"product": {
"name": "kernel-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le",
"product_id": "kernel-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@4.18.0-372.59.1.el8_6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-ppc64le-0:4.18.0-372.59.1.el8_6.ppc64le",
"product": {
"name": "kernel-debuginfo-common-ppc64le-0:4.18.0-372.59.1.el8_6.ppc64le",
"product_id": "kernel-debuginfo-common-ppc64le-0:4.18.0-372.59.1.el8_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-ppc64le@4.18.0-372.59.1.el8_6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le",
"product": {
"name": "kernel-tools-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le",
"product_id": "kernel-tools-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.18.0-372.59.1.el8_6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le",
"product": {
"name": "perf-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le",
"product_id": "perf-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@4.18.0-372.59.1.el8_6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python3-perf-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le",
"product": {
"name": "python3-perf-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le",
"product_id": "python3-perf-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf-debuginfo@4.18.0-372.59.1.el8_6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el8.ppc64le",
"product": {
"name": "openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el8.ppc64le",
"product_id": "openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-hyperkube@4.12.0-202306121916.p0.g8c21020.assembly.stream.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.ppc64le",
"product": {
"name": "openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.ppc64le",
"product_id": "openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-clients@4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "podman-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"product": {
"name": "podman-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"product_id": "podman-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman@4.2.0-6.1.rhaos4.12.el8?arch=ppc64le\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "podman-catatonit-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"product": {
"name": "podman-catatonit-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"product_id": "podman-catatonit-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-catatonit@4.2.0-6.1.rhaos4.12.el8?arch=ppc64le\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "podman-gvproxy-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"product": {
"name": "podman-gvproxy-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"product_id": "podman-gvproxy-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-gvproxy@4.2.0-6.1.rhaos4.12.el8?arch=ppc64le\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "podman-plugins-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"product": {
"name": "podman-plugins-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"product_id": "podman-plugins-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-plugins@4.2.0-6.1.rhaos4.12.el8?arch=ppc64le\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "podman-remote-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"product": {
"name": "podman-remote-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"product_id": "podman-remote-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-remote@4.2.0-6.1.rhaos4.12.el8?arch=ppc64le\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "podman-tests-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"product": {
"name": "podman-tests-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"product_id": "podman-tests-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-tests@4.2.0-6.1.rhaos4.12.el8?arch=ppc64le\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "podman-debugsource-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"product": {
"name": "podman-debugsource-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"product_id": "podman-debugsource-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-debugsource@4.2.0-6.1.rhaos4.12.el8?arch=ppc64le\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "podman-catatonit-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"product": {
"name": "podman-catatonit-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"product_id": "podman-catatonit-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-catatonit-debuginfo@4.2.0-6.1.rhaos4.12.el8?arch=ppc64le\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "podman-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"product": {
"name": "podman-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"product_id": "podman-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-debuginfo@4.2.0-6.1.rhaos4.12.el8?arch=ppc64le\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "podman-gvproxy-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"product": {
"name": "podman-gvproxy-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"product_id": "podman-gvproxy-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-gvproxy-debuginfo@4.2.0-6.1.rhaos4.12.el8?arch=ppc64le\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "podman-plugins-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"product": {
"name": "podman-plugins-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"product_id": "podman-plugins-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-plugins-debuginfo@4.2.0-6.1.rhaos4.12.el8?arch=ppc64le\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "podman-remote-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"product": {
"name": "podman-remote-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"product_id": "podman-remote-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-remote-debuginfo@4.2.0-6.1.rhaos4.12.el8?arch=ppc64le\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "runc-3:1.1.6-4.rhaos4.12.el8.ppc64le",
"product": {
"name": "runc-3:1.1.6-4.rhaos4.12.el8.ppc64le",
"product_id": "runc-3:1.1.6-4.rhaos4.12.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/runc@1.1.6-4.rhaos4.12.el8?arch=ppc64le\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "runc-debugsource-3:1.1.6-4.rhaos4.12.el8.ppc64le",
"product": {
"name": "runc-debugsource-3:1.1.6-4.rhaos4.12.el8.ppc64le",
"product_id": "runc-debugsource-3:1.1.6-4.rhaos4.12.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/runc-debugsource@1.1.6-4.rhaos4.12.el8?arch=ppc64le\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "runc-debuginfo-3:1.1.6-4.rhaos4.12.el8.ppc64le",
"product": {
"name": "runc-debuginfo-3:1.1.6-4.rhaos4.12.el8.ppc64le",
"product_id": "runc-debuginfo-3:1.1.6-4.rhaos4.12.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/runc-debuginfo@1.1.6-4.rhaos4.12.el8?arch=ppc64le\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "skopeo-2:1.9.4-3.1.rhaos4.12.el8.ppc64le",
"product": {
"name": "skopeo-2:1.9.4-3.1.rhaos4.12.el8.ppc64le",
"product_id": "skopeo-2:1.9.4-3.1.rhaos4.12.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/skopeo@1.9.4-3.1.rhaos4.12.el8?arch=ppc64le\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "skopeo-tests-2:1.9.4-3.1.rhaos4.12.el8.ppc64le",
"product": {
"name": "skopeo-tests-2:1.9.4-3.1.rhaos4.12.el8.ppc64le",
"product_id": "skopeo-tests-2:1.9.4-3.1.rhaos4.12.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/skopeo-tests@1.9.4-3.1.rhaos4.12.el8?arch=ppc64le\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "skopeo-debugsource-2:1.9.4-3.1.rhaos4.12.el8.ppc64le",
"product": {
"name": "skopeo-debugsource-2:1.9.4-3.1.rhaos4.12.el8.ppc64le",
"product_id": "skopeo-debugsource-2:1.9.4-3.1.rhaos4.12.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/skopeo-debugsource@1.9.4-3.1.rhaos4.12.el8?arch=ppc64le\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "skopeo-debuginfo-2:1.9.4-3.1.rhaos4.12.el8.ppc64le",
"product": {
"name": "skopeo-debuginfo-2:1.9.4-3.1.rhaos4.12.el8.ppc64le",
"product_id": "skopeo-debuginfo-2:1.9.4-3.1.rhaos4.12.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/skopeo-debuginfo@1.9.4-3.1.rhaos4.12.el8?arch=ppc64le\u0026epoch=2"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "buildah-1:1.23.4-5.rhaos4.12.el9.s390x",
"product": {
"name": "buildah-1:1.23.4-5.rhaos4.12.el9.s390x",
"product_id": "buildah-1:1.23.4-5.rhaos4.12.el9.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/buildah@1.23.4-5.rhaos4.12.el9?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "buildah-tests-1:1.23.4-5.rhaos4.12.el9.s390x",
"product": {
"name": "buildah-tests-1:1.23.4-5.rhaos4.12.el9.s390x",
"product_id": "buildah-tests-1:1.23.4-5.rhaos4.12.el9.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/buildah-tests@1.23.4-5.rhaos4.12.el9?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "buildah-debugsource-1:1.23.4-5.rhaos4.12.el9.s390x",
"product": {
"name": "buildah-debugsource-1:1.23.4-5.rhaos4.12.el9.s390x",
"product_id": "buildah-debugsource-1:1.23.4-5.rhaos4.12.el9.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/buildah-debugsource@1.23.4-5.rhaos4.12.el9?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "buildah-debuginfo-1:1.23.4-5.rhaos4.12.el9.s390x",
"product": {
"name": "buildah-debuginfo-1:1.23.4-5.rhaos4.12.el9.s390x",
"product_id": "buildah-debuginfo-1:1.23.4-5.rhaos4.12.el9.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/buildah-debuginfo@1.23.4-5.rhaos4.12.el9?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "buildah-tests-debuginfo-1:1.23.4-5.rhaos4.12.el9.s390x",
"product": {
"name": "buildah-tests-debuginfo-1:1.23.4-5.rhaos4.12.el9.s390x",
"product_id": "buildah-tests-debuginfo-1:1.23.4-5.rhaos4.12.el9.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/buildah-tests-debuginfo@1.23.4-5.rhaos4.12.el9?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "conmon-2:2.1.2-5.rhaos4.12.el9.s390x",
"product": {
"name": "conmon-2:2.1.2-5.rhaos4.12.el9.s390x",
"product_id": "conmon-2:2.1.2-5.rhaos4.12.el9.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/conmon@2.1.2-5.rhaos4.12.el9?arch=s390x\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "conmon-debugsource-2:2.1.2-5.rhaos4.12.el9.s390x",
"product": {
"name": "conmon-debugsource-2:2.1.2-5.rhaos4.12.el9.s390x",
"product_id": "conmon-debugsource-2:2.1.2-5.rhaos4.12.el9.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/conmon-debugsource@2.1.2-5.rhaos4.12.el9?arch=s390x\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "conmon-debuginfo-2:2.1.2-5.rhaos4.12.el9.s390x",
"product": {
"name": "conmon-debuginfo-2:2.1.2-5.rhaos4.12.el9.s390x",
"product_id": "conmon-debuginfo-2:2.1.2-5.rhaos4.12.el9.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/conmon-debuginfo@2.1.2-5.rhaos4.12.el9?arch=s390x\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el9.s390x",
"product": {
"name": "openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el9.s390x",
"product_id": "openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el9.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-hyperkube@4.12.0-202306121916.p0.g8c21020.assembly.stream.el9?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.s390x",
"product": {
"name": "openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.s390x",
"product_id": "openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-clients@4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "podman-3:4.2.0-7.rhaos4.12.el9.s390x",
"product": {
"name": "podman-3:4.2.0-7.rhaos4.12.el9.s390x",
"product_id": "podman-3:4.2.0-7.rhaos4.12.el9.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman@4.2.0-7.rhaos4.12.el9?arch=s390x\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "podman-catatonit-3:4.2.0-7.rhaos4.12.el9.s390x",
"product": {
"name": "podman-catatonit-3:4.2.0-7.rhaos4.12.el9.s390x",
"product_id": "podman-catatonit-3:4.2.0-7.rhaos4.12.el9.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-catatonit@4.2.0-7.rhaos4.12.el9?arch=s390x\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "podman-gvproxy-3:4.2.0-7.rhaos4.12.el9.s390x",
"product": {
"name": "podman-gvproxy-3:4.2.0-7.rhaos4.12.el9.s390x",
"product_id": "podman-gvproxy-3:4.2.0-7.rhaos4.12.el9.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-gvproxy@4.2.0-7.rhaos4.12.el9?arch=s390x\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "podman-plugins-3:4.2.0-7.rhaos4.12.el9.s390x",
"product": {
"name": "podman-plugins-3:4.2.0-7.rhaos4.12.el9.s390x",
"product_id": "podman-plugins-3:4.2.0-7.rhaos4.12.el9.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-plugins@4.2.0-7.rhaos4.12.el9?arch=s390x\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "podman-remote-3:4.2.0-7.rhaos4.12.el9.s390x",
"product": {
"name": "podman-remote-3:4.2.0-7.rhaos4.12.el9.s390x",
"product_id": "podman-remote-3:4.2.0-7.rhaos4.12.el9.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-remote@4.2.0-7.rhaos4.12.el9?arch=s390x\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "podman-tests-3:4.2.0-7.rhaos4.12.el9.s390x",
"product": {
"name": "podman-tests-3:4.2.0-7.rhaos4.12.el9.s390x",
"product_id": "podman-tests-3:4.2.0-7.rhaos4.12.el9.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-tests@4.2.0-7.rhaos4.12.el9?arch=s390x\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "podman-debugsource-3:4.2.0-7.rhaos4.12.el9.s390x",
"product": {
"name": "podman-debugsource-3:4.2.0-7.rhaos4.12.el9.s390x",
"product_id": "podman-debugsource-3:4.2.0-7.rhaos4.12.el9.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-debugsource@4.2.0-7.rhaos4.12.el9?arch=s390x\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "podman-catatonit-debuginfo-3:4.2.0-7.rhaos4.12.el9.s390x",
"product": {
"name": "podman-catatonit-debuginfo-3:4.2.0-7.rhaos4.12.el9.s390x",
"product_id": "podman-catatonit-debuginfo-3:4.2.0-7.rhaos4.12.el9.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-catatonit-debuginfo@4.2.0-7.rhaos4.12.el9?arch=s390x\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "podman-debuginfo-3:4.2.0-7.rhaos4.12.el9.s390x",
"product": {
"name": "podman-debuginfo-3:4.2.0-7.rhaos4.12.el9.s390x",
"product_id": "podman-debuginfo-3:4.2.0-7.rhaos4.12.el9.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-debuginfo@4.2.0-7.rhaos4.12.el9?arch=s390x\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "podman-gvproxy-debuginfo-3:4.2.0-7.rhaos4.12.el9.s390x",
"product": {
"name": "podman-gvproxy-debuginfo-3:4.2.0-7.rhaos4.12.el9.s390x",
"product_id": "podman-gvproxy-debuginfo-3:4.2.0-7.rhaos4.12.el9.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-gvproxy-debuginfo@4.2.0-7.rhaos4.12.el9?arch=s390x\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "podman-plugins-debuginfo-3:4.2.0-7.rhaos4.12.el9.s390x",
"product": {
"name": "podman-plugins-debuginfo-3:4.2.0-7.rhaos4.12.el9.s390x",
"product_id": "podman-plugins-debuginfo-3:4.2.0-7.rhaos4.12.el9.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-plugins-debuginfo@4.2.0-7.rhaos4.12.el9?arch=s390x\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "podman-remote-debuginfo-3:4.2.0-7.rhaos4.12.el9.s390x",
"product": {
"name": "podman-remote-debuginfo-3:4.2.0-7.rhaos4.12.el9.s390x",
"product_id": "podman-remote-debuginfo-3:4.2.0-7.rhaos4.12.el9.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-remote-debuginfo@4.2.0-7.rhaos4.12.el9?arch=s390x\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "skopeo-2:1.9.4-3.rhaos4.12.el9.s390x",
"product": {
"name": "skopeo-2:1.9.4-3.rhaos4.12.el9.s390x",
"product_id": "skopeo-2:1.9.4-3.rhaos4.12.el9.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/skopeo@1.9.4-3.rhaos4.12.el9?arch=s390x\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "skopeo-tests-2:1.9.4-3.rhaos4.12.el9.s390x",
"product": {
"name": "skopeo-tests-2:1.9.4-3.rhaos4.12.el9.s390x",
"product_id": "skopeo-tests-2:1.9.4-3.rhaos4.12.el9.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/skopeo-tests@1.9.4-3.rhaos4.12.el9?arch=s390x\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "skopeo-debugsource-2:1.9.4-3.rhaos4.12.el9.s390x",
"product": {
"name": "skopeo-debugsource-2:1.9.4-3.rhaos4.12.el9.s390x",
"product_id": "skopeo-debugsource-2:1.9.4-3.rhaos4.12.el9.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/skopeo-debugsource@1.9.4-3.rhaos4.12.el9?arch=s390x\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "skopeo-debuginfo-2:1.9.4-3.rhaos4.12.el9.s390x",
"product": {
"name": "skopeo-debuginfo-2:1.9.4-3.rhaos4.12.el9.s390x",
"product_id": "skopeo-debuginfo-2:1.9.4-3.rhaos4.12.el9.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/skopeo-debuginfo@1.9.4-3.rhaos4.12.el9?arch=s390x\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "buildah-1:1.23.4-5.1.rhaos4.12.el8.s390x",
"product": {
"name": "buildah-1:1.23.4-5.1.rhaos4.12.el8.s390x",
"product_id": "buildah-1:1.23.4-5.1.rhaos4.12.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/buildah@1.23.4-5.1.rhaos4.12.el8?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "buildah-tests-1:1.23.4-5.1.rhaos4.12.el8.s390x",
"product": {
"name": "buildah-tests-1:1.23.4-5.1.rhaos4.12.el8.s390x",
"product_id": "buildah-tests-1:1.23.4-5.1.rhaos4.12.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/buildah-tests@1.23.4-5.1.rhaos4.12.el8?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "buildah-debugsource-1:1.23.4-5.1.rhaos4.12.el8.s390x",
"product": {
"name": "buildah-debugsource-1:1.23.4-5.1.rhaos4.12.el8.s390x",
"product_id": "buildah-debugsource-1:1.23.4-5.1.rhaos4.12.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/buildah-debugsource@1.23.4-5.1.rhaos4.12.el8?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "buildah-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.s390x",
"product": {
"name": "buildah-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.s390x",
"product_id": "buildah-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/buildah-debuginfo@1.23.4-5.1.rhaos4.12.el8?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "buildah-tests-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.s390x",
"product": {
"name": "buildah-tests-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.s390x",
"product_id": "buildah-tests-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/buildah-tests-debuginfo@1.23.4-5.1.rhaos4.12.el8?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "conmon-2:2.1.2-4.rhaos4.12.el8.s390x",
"product": {
"name": "conmon-2:2.1.2-4.rhaos4.12.el8.s390x",
"product_id": "conmon-2:2.1.2-4.rhaos4.12.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/conmon@2.1.2-4.rhaos4.12.el8?arch=s390x\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "conmon-debugsource-2:2.1.2-4.rhaos4.12.el8.s390x",
"product": {
"name": "conmon-debugsource-2:2.1.2-4.rhaos4.12.el8.s390x",
"product_id": "conmon-debugsource-2:2.1.2-4.rhaos4.12.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/conmon-debugsource@2.1.2-4.rhaos4.12.el8?arch=s390x\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "conmon-debuginfo-2:2.1.2-4.rhaos4.12.el8.s390x",
"product": {
"name": "conmon-debuginfo-2:2.1.2-4.rhaos4.12.el8.s390x",
"product_id": "conmon-debuginfo-2:2.1.2-4.rhaos4.12.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/conmon-debuginfo@2.1.2-4.rhaos4.12.el8?arch=s390x\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "containernetworking-plugins-0:1.0.1-7.rhaos4.12.el8.s390x",
"product": {
"name": "containernetworking-plugins-0:1.0.1-7.rhaos4.12.el8.s390x",
"product_id": "containernetworking-plugins-0:1.0.1-7.rhaos4.12.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/containernetworking-plugins@1.0.1-7.rhaos4.12.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "containernetworking-plugins-debugsource-0:1.0.1-7.rhaos4.12.el8.s390x",
"product": {
"name": "containernetworking-plugins-debugsource-0:1.0.1-7.rhaos4.12.el8.s390x",
"product_id": "containernetworking-plugins-debugsource-0:1.0.1-7.rhaos4.12.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/containernetworking-plugins-debugsource@1.0.1-7.rhaos4.12.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "containernetworking-plugins-debuginfo-0:1.0.1-7.rhaos4.12.el8.s390x",
"product": {
"name": "containernetworking-plugins-debuginfo-0:1.0.1-7.rhaos4.12.el8.s390x",
"product_id": "containernetworking-plugins-debuginfo-0:1.0.1-7.rhaos4.12.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/containernetworking-plugins-debuginfo@1.0.1-7.rhaos4.12.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "bpftool-0:4.18.0-372.59.1.el8_6.s390x",
"product": {
"name": "bpftool-0:4.18.0-372.59.1.el8_6.s390x",
"product_id": "bpftool-0:4.18.0-372.59.1.el8_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool@4.18.0-372.59.1.el8_6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-0:4.18.0-372.59.1.el8_6.s390x",
"product": {
"name": "kernel-0:4.18.0-372.59.1.el8_6.s390x",
"product_id": "kernel-0:4.18.0-372.59.1.el8_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@4.18.0-372.59.1.el8_6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-core-0:4.18.0-372.59.1.el8_6.s390x",
"product": {
"name": "kernel-core-0:4.18.0-372.59.1.el8_6.s390x",
"product_id": "kernel-core-0:4.18.0-372.59.1.el8_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-core@4.18.0-372.59.1.el8_6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-cross-headers-0:4.18.0-372.59.1.el8_6.s390x",
"product": {
"name": "kernel-cross-headers-0:4.18.0-372.59.1.el8_6.s390x",
"product_id": "kernel-cross-headers-0:4.18.0-372.59.1.el8_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-cross-headers@4.18.0-372.59.1.el8_6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:4.18.0-372.59.1.el8_6.s390x",
"product": {
"name": "kernel-debug-0:4.18.0-372.59.1.el8_6.s390x",
"product_id": "kernel-debug-0:4.18.0-372.59.1.el8_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@4.18.0-372.59.1.el8_6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-core-0:4.18.0-372.59.1.el8_6.s390x",
"product": {
"name": "kernel-debug-core-0:4.18.0-372.59.1.el8_6.s390x",
"product_id": "kernel-debug-core-0:4.18.0-372.59.1.el8_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-core@4.18.0-372.59.1.el8_6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:4.18.0-372.59.1.el8_6.s390x",
"product": {
"name": "kernel-debug-devel-0:4.18.0-372.59.1.el8_6.s390x",
"product_id": "kernel-debug-devel-0:4.18.0-372.59.1.el8_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@4.18.0-372.59.1.el8_6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-0:4.18.0-372.59.1.el8_6.s390x",
"product": {
"name": "kernel-debug-modules-0:4.18.0-372.59.1.el8_6.s390x",
"product_id": "kernel-debug-modules-0:4.18.0-372.59.1.el8_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules@4.18.0-372.59.1.el8_6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-extra-0:4.18.0-372.59.1.el8_6.s390x",
"product": {
"name": "kernel-debug-modules-extra-0:4.18.0-372.59.1.el8_6.s390x",
"product_id": "kernel-debug-modules-extra-0:4.18.0-372.59.1.el8_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules-extra@4.18.0-372.59.1.el8_6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-internal-0:4.18.0-372.59.1.el8_6.s390x",
"product": {
"name": "kernel-debug-modules-internal-0:4.18.0-372.59.1.el8_6.s390x",
"product_id": "kernel-debug-modules-internal-0:4.18.0-372.59.1.el8_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules-internal@4.18.0-372.59.1.el8_6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:4.18.0-372.59.1.el8_6.s390x",
"product": {
"name": "kernel-devel-0:4.18.0-372.59.1.el8_6.s390x",
"product_id": "kernel-devel-0:4.18.0-372.59.1.el8_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@4.18.0-372.59.1.el8_6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:4.18.0-372.59.1.el8_6.s390x",
"product": {
"name": "kernel-headers-0:4.18.0-372.59.1.el8_6.s390x",
"product_id": "kernel-headers-0:4.18.0-372.59.1.el8_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@4.18.0-372.59.1.el8_6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-0:4.18.0-372.59.1.el8_6.s390x",
"product": {
"name": "kernel-modules-0:4.18.0-372.59.1.el8_6.s390x",
"product_id": "kernel-modules-0:4.18.0-372.59.1.el8_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules@4.18.0-372.59.1.el8_6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-extra-0:4.18.0-372.59.1.el8_6.s390x",
"product": {
"name": "kernel-modules-extra-0:4.18.0-372.59.1.el8_6.s390x",
"product_id": "kernel-modules-extra-0:4.18.0-372.59.1.el8_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules-extra@4.18.0-372.59.1.el8_6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-internal-0:4.18.0-372.59.1.el8_6.s390x",
"product": {
"name": "kernel-modules-internal-0:4.18.0-372.59.1.el8_6.s390x",
"product_id": "kernel-modules-internal-0:4.18.0-372.59.1.el8_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules-internal@4.18.0-372.59.1.el8_6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-selftests-internal-0:4.18.0-372.59.1.el8_6.s390x",
"product": {
"name": "kernel-selftests-internal-0:4.18.0-372.59.1.el8_6.s390x",
"product_id": "kernel-selftests-internal-0:4.18.0-372.59.1.el8_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-selftests-internal@4.18.0-372.59.1.el8_6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:4.18.0-372.59.1.el8_6.s390x",
"product": {
"name": "kernel-tools-0:4.18.0-372.59.1.el8_6.s390x",
"product_id": "kernel-tools-0:4.18.0-372.59.1.el8_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@4.18.0-372.59.1.el8_6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-0:4.18.0-372.59.1.el8_6.s390x",
"product": {
"name": "kernel-zfcpdump-0:4.18.0-372.59.1.el8_6.s390x",
"product_id": "kernel-zfcpdump-0:4.18.0-372.59.1.el8_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump@4.18.0-372.59.1.el8_6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-core-0:4.18.0-372.59.1.el8_6.s390x",
"product": {
"name": "kernel-zfcpdump-core-0:4.18.0-372.59.1.el8_6.s390x",
"product_id": "kernel-zfcpdump-core-0:4.18.0-372.59.1.el8_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump-core@4.18.0-372.59.1.el8_6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-devel-0:4.18.0-372.59.1.el8_6.s390x",
"product": {
"name": "kernel-zfcpdump-devel-0:4.18.0-372.59.1.el8_6.s390x",
"product_id": "kernel-zfcpdump-devel-0:4.18.0-372.59.1.el8_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump-devel@4.18.0-372.59.1.el8_6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-modules-0:4.18.0-372.59.1.el8_6.s390x",
"product": {
"name": "kernel-zfcpdump-modules-0:4.18.0-372.59.1.el8_6.s390x",
"product_id": "kernel-zfcpdump-modules-0:4.18.0-372.59.1.el8_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump-modules@4.18.0-372.59.1.el8_6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-modules-extra-0:4.18.0-372.59.1.el8_6.s390x",
"product": {
"name": "kernel-zfcpdump-modules-extra-0:4.18.0-372.59.1.el8_6.s390x",
"product_id": "kernel-zfcpdump-modules-extra-0:4.18.0-372.59.1.el8_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump-modules-extra@4.18.0-372.59.1.el8_6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-modules-internal-0:4.18.0-372.59.1.el8_6.s390x",
"product": {
"name": "kernel-zfcpdump-modules-internal-0:4.18.0-372.59.1.el8_6.s390x",
"product_id": "kernel-zfcpdump-modules-internal-0:4.18.0-372.59.1.el8_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump-modules-internal@4.18.0-372.59.1.el8_6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "perf-0:4.18.0-372.59.1.el8_6.s390x",
"product": {
"name": "perf-0:4.18.0-372.59.1.el8_6.s390x",
"product_id": "perf-0:4.18.0-372.59.1.el8_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@4.18.0-372.59.1.el8_6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python3-perf-0:4.18.0-372.59.1.el8_6.s390x",
"product": {
"name": "python3-perf-0:4.18.0-372.59.1.el8_6.s390x",
"product_id": "python3-perf-0:4.18.0-372.59.1.el8_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf@4.18.0-372.59.1.el8_6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "bpftool-debuginfo-0:4.18.0-372.59.1.el8_6.s390x",
"product": {
"name": "bpftool-debuginfo-0:4.18.0-372.59.1.el8_6.s390x",
"product_id": "bpftool-debuginfo-0:4.18.0-372.59.1.el8_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool-debuginfo@4.18.0-372.59.1.el8_6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:4.18.0-372.59.1.el8_6.s390x",
"product": {
"name": "kernel-debug-debuginfo-0:4.18.0-372.59.1.el8_6.s390x",
"product_id": "kernel-debug-debuginfo-0:4.18.0-372.59.1.el8_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.18.0-372.59.1.el8_6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:4.18.0-372.59.1.el8_6.s390x",
"product": {
"name": "kernel-debuginfo-0:4.18.0-372.59.1.el8_6.s390x",
"product_id": "kernel-debuginfo-0:4.18.0-372.59.1.el8_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@4.18.0-372.59.1.el8_6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-s390x-0:4.18.0-372.59.1.el8_6.s390x",
"product": {
"name": "kernel-debuginfo-common-s390x-0:4.18.0-372.59.1.el8_6.s390x",
"product_id": "kernel-debuginfo-common-s390x-0:4.18.0-372.59.1.el8_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-s390x@4.18.0-372.59.1.el8_6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:4.18.0-372.59.1.el8_6.s390x",
"product": {
"name": "kernel-tools-debuginfo-0:4.18.0-372.59.1.el8_6.s390x",
"product_id": "kernel-tools-debuginfo-0:4.18.0-372.59.1.el8_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.18.0-372.59.1.el8_6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-debuginfo-0:4.18.0-372.59.1.el8_6.s390x",
"product": {
"name": "kernel-zfcpdump-debuginfo-0:4.18.0-372.59.1.el8_6.s390x",
"product_id": "kernel-zfcpdump-debuginfo-0:4.18.0-372.59.1.el8_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump-debuginfo@4.18.0-372.59.1.el8_6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:4.18.0-372.59.1.el8_6.s390x",
"product": {
"name": "perf-debuginfo-0:4.18.0-372.59.1.el8_6.s390x",
"product_id": "perf-debuginfo-0:4.18.0-372.59.1.el8_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@4.18.0-372.59.1.el8_6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python3-perf-debuginfo-0:4.18.0-372.59.1.el8_6.s390x",
"product": {
"name": "python3-perf-debuginfo-0:4.18.0-372.59.1.el8_6.s390x",
"product_id": "python3-perf-debuginfo-0:4.18.0-372.59.1.el8_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf-debuginfo@4.18.0-372.59.1.el8_6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el8.s390x",
"product": {
"name": "openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el8.s390x",
"product_id": "openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-hyperkube@4.12.0-202306121916.p0.g8c21020.assembly.stream.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.s390x",
"product": {
"name": "openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.s390x",
"product_id": "openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-clients@4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "podman-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"product": {
"name": "podman-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"product_id": "podman-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman@4.2.0-6.1.rhaos4.12.el8?arch=s390x\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "podman-catatonit-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"product": {
"name": "podman-catatonit-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"product_id": "podman-catatonit-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-catatonit@4.2.0-6.1.rhaos4.12.el8?arch=s390x\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "podman-gvproxy-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"product": {
"name": "podman-gvproxy-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"product_id": "podman-gvproxy-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-gvproxy@4.2.0-6.1.rhaos4.12.el8?arch=s390x\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "podman-plugins-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"product": {
"name": "podman-plugins-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"product_id": "podman-plugins-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-plugins@4.2.0-6.1.rhaos4.12.el8?arch=s390x\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "podman-remote-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"product": {
"name": "podman-remote-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"product_id": "podman-remote-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-remote@4.2.0-6.1.rhaos4.12.el8?arch=s390x\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "podman-tests-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"product": {
"name": "podman-tests-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"product_id": "podman-tests-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-tests@4.2.0-6.1.rhaos4.12.el8?arch=s390x\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "podman-debugsource-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"product": {
"name": "podman-debugsource-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"product_id": "podman-debugsource-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-debugsource@4.2.0-6.1.rhaos4.12.el8?arch=s390x\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "podman-catatonit-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"product": {
"name": "podman-catatonit-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"product_id": "podman-catatonit-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-catatonit-debuginfo@4.2.0-6.1.rhaos4.12.el8?arch=s390x\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "podman-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"product": {
"name": "podman-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"product_id": "podman-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-debuginfo@4.2.0-6.1.rhaos4.12.el8?arch=s390x\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "podman-gvproxy-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"product": {
"name": "podman-gvproxy-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"product_id": "podman-gvproxy-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-gvproxy-debuginfo@4.2.0-6.1.rhaos4.12.el8?arch=s390x\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "podman-plugins-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"product": {
"name": "podman-plugins-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"product_id": "podman-plugins-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-plugins-debuginfo@4.2.0-6.1.rhaos4.12.el8?arch=s390x\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "podman-remote-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"product": {
"name": "podman-remote-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"product_id": "podman-remote-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-remote-debuginfo@4.2.0-6.1.rhaos4.12.el8?arch=s390x\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "runc-3:1.1.6-4.rhaos4.12.el8.s390x",
"product": {
"name": "runc-3:1.1.6-4.rhaos4.12.el8.s390x",
"product_id": "runc-3:1.1.6-4.rhaos4.12.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/runc@1.1.6-4.rhaos4.12.el8?arch=s390x\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "runc-debugsource-3:1.1.6-4.rhaos4.12.el8.s390x",
"product": {
"name": "runc-debugsource-3:1.1.6-4.rhaos4.12.el8.s390x",
"product_id": "runc-debugsource-3:1.1.6-4.rhaos4.12.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/runc-debugsource@1.1.6-4.rhaos4.12.el8?arch=s390x\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "runc-debuginfo-3:1.1.6-4.rhaos4.12.el8.s390x",
"product": {
"name": "runc-debuginfo-3:1.1.6-4.rhaos4.12.el8.s390x",
"product_id": "runc-debuginfo-3:1.1.6-4.rhaos4.12.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/runc-debuginfo@1.1.6-4.rhaos4.12.el8?arch=s390x\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "skopeo-2:1.9.4-3.1.rhaos4.12.el8.s390x",
"product": {
"name": "skopeo-2:1.9.4-3.1.rhaos4.12.el8.s390x",
"product_id": "skopeo-2:1.9.4-3.1.rhaos4.12.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/skopeo@1.9.4-3.1.rhaos4.12.el8?arch=s390x\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "skopeo-tests-2:1.9.4-3.1.rhaos4.12.el8.s390x",
"product": {
"name": "skopeo-tests-2:1.9.4-3.1.rhaos4.12.el8.s390x",
"product_id": "skopeo-tests-2:1.9.4-3.1.rhaos4.12.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/skopeo-tests@1.9.4-3.1.rhaos4.12.el8?arch=s390x\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "skopeo-debugsource-2:1.9.4-3.1.rhaos4.12.el8.s390x",
"product": {
"name": "skopeo-debugsource-2:1.9.4-3.1.rhaos4.12.el8.s390x",
"product_id": "skopeo-debugsource-2:1.9.4-3.1.rhaos4.12.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/skopeo-debugsource@1.9.4-3.1.rhaos4.12.el8?arch=s390x\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "skopeo-debuginfo-2:1.9.4-3.1.rhaos4.12.el8.s390x",
"product": {
"name": "skopeo-debuginfo-2:1.9.4-3.1.rhaos4.12.el8.s390x",
"product_id": "skopeo-debuginfo-2:1.9.4-3.1.rhaos4.12.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/skopeo-debuginfo@1.9.4-3.1.rhaos4.12.el8?arch=s390x\u0026epoch=2"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "podman-docker-3:4.2.0-7.rhaos4.12.el9.noarch",
"product": {
"name": "podman-docker-3:4.2.0-7.rhaos4.12.el9.noarch",
"product_id": "podman-docker-3:4.2.0-7.rhaos4.12.el9.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-docker@4.2.0-7.rhaos4.12.el9?arch=noarch\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "kernel-doc-0:4.18.0-372.59.1.el8_6.noarch",
"product": {
"name": "kernel-doc-0:4.18.0-372.59.1.el8_6.noarch",
"product_id": "kernel-doc-0:4.18.0-372.59.1.el8_6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-doc@4.18.0-372.59.1.el8_6?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "openshift-ansible-0:4.12.0-202306090942.p0.g74dc7b3.assembly.stream.el8.noarch",
"product": {
"name": "openshift-ansible-0:4.12.0-202306090942.p0.g74dc7b3.assembly.stream.el8.noarch",
"product_id": "openshift-ansible-0:4.12.0-202306090942.p0.g74dc7b3.assembly.stream.el8.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-ansible@4.12.0-202306090942.p0.g74dc7b3.assembly.stream.el8?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "openshift-ansible-test-0:4.12.0-202306090942.p0.g74dc7b3.assembly.stream.el8.noarch",
"product": {
"name": "openshift-ansible-test-0:4.12.0-202306090942.p0.g74dc7b3.assembly.stream.el8.noarch",
"product_id": "openshift-ansible-test-0:4.12.0-202306090942.p0.g74dc7b3.assembly.stream.el8.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-ansible-test@4.12.0-202306090942.p0.g74dc7b3.assembly.stream.el8?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "openshift-kuryr-cni-0:4.12.0-202306140156.p0.g31dd228.assembly.stream.el8.noarch",
"product": {
"name": "openshift-kuryr-cni-0:4.12.0-202306140156.p0.g31dd228.assembly.stream.el8.noarch",
"product_id": "openshift-kuryr-cni-0:4.12.0-202306140156.p0.g31dd228.assembly.stream.el8.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-kuryr-cni@4.12.0-202306140156.p0.g31dd228.assembly.stream.el8?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "openshift-kuryr-common-0:4.12.0-202306140156.p0.g31dd228.assembly.stream.el8.noarch",
"product": {
"name": "openshift-kuryr-common-0:4.12.0-202306140156.p0.g31dd228.assembly.stream.el8.noarch",
"product_id": "openshift-kuryr-common-0:4.12.0-202306140156.p0.g31dd228.assembly.stream.el8.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-kuryr-common@4.12.0-202306140156.p0.g31dd228.assembly.stream.el8?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "openshift-kuryr-controller-0:4.12.0-202306140156.p0.g31dd228.assembly.stream.el8.noarch",
"product": {
"name": "openshift-kuryr-controller-0:4.12.0-202306140156.p0.g31dd228.assembly.stream.el8.noarch",
"product_id": "openshift-kuryr-controller-0:4.12.0-202306140156.p0.g31dd228.assembly.stream.el8.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-kuryr-controller@4.12.0-202306140156.p0.g31dd228.assembly.stream.el8?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "python3-kuryr-kubernetes-0:4.12.0-202306140156.p0.g31dd228.assembly.stream.el8.noarch",
"product": {
"name": "python3-kuryr-kubernetes-0:4.12.0-202306140156.p0.g31dd228.assembly.stream.el8.noarch",
"product_id": "python3-kuryr-kubernetes-0:4.12.0-202306140156.p0.g31dd228.assembly.stream.el8.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-kuryr-kubernetes@4.12.0-202306140156.p0.g31dd228.assembly.stream.el8?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "openshift4-aws-iso-0:4.12.0-202306090942.p0.gd2acdd5.assembly.stream.el8.noarch",
"product": {
"name": "openshift4-aws-iso-0:4.12.0-202306090942.p0.gd2acdd5.assembly.stream.el8.noarch",
"product_id": "openshift4-aws-iso-0:4.12.0-202306090942.p0.gd2acdd5.assembly.stream.el8.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift4-aws-iso@4.12.0-202306090942.p0.gd2acdd5.assembly.stream.el8?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "podman-docker-3:4.2.0-6.1.rhaos4.12.el8.noarch",
"product": {
"name": "podman-docker-3:4.2.0-6.1.rhaos4.12.el8.noarch",
"product_id": "podman-docker-3:4.2.0-6.1.rhaos4.12.el8.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-docker@4.2.0-6.1.rhaos4.12.el8?arch=noarch\u0026epoch=3"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-372.59.1.el8_6.aarch64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:bpftool-0:4.18.0-372.59.1.el8_6.aarch64"
},
"product_reference": "bpftool-0:4.18.0-372.59.1.el8_6.aarch64",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-372.59.1.el8_6.ppc64le as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:bpftool-0:4.18.0-372.59.1.el8_6.ppc64le"
},
"product_reference": "bpftool-0:4.18.0-372.59.1.el8_6.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-372.59.1.el8_6.s390x as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:bpftool-0:4.18.0-372.59.1.el8_6.s390x"
},
"product_reference": "bpftool-0:4.18.0-372.59.1.el8_6.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-372.59.1.el8_6.x86_64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:bpftool-0:4.18.0-372.59.1.el8_6.x86_64"
},
"product_reference": "bpftool-0:4.18.0-372.59.1.el8_6.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:bpftool-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:bpftool-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-372.59.1.el8_6.s390x as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:bpftool-debuginfo-0:4.18.0-372.59.1.el8_6.s390x"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-372.59.1.el8_6.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:bpftool-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "buildah-1:1.23.4-5.1.rhaos4.12.el8.aarch64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:buildah-1:1.23.4-5.1.rhaos4.12.el8.aarch64"
},
"product_reference": "buildah-1:1.23.4-5.1.rhaos4.12.el8.aarch64",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "buildah-1:1.23.4-5.1.rhaos4.12.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:buildah-1:1.23.4-5.1.rhaos4.12.el8.ppc64le"
},
"product_reference": "buildah-1:1.23.4-5.1.rhaos4.12.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "buildah-1:1.23.4-5.1.rhaos4.12.el8.s390x as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:buildah-1:1.23.4-5.1.rhaos4.12.el8.s390x"
},
"product_reference": "buildah-1:1.23.4-5.1.rhaos4.12.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "buildah-1:1.23.4-5.1.rhaos4.12.el8.src as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:buildah-1:1.23.4-5.1.rhaos4.12.el8.src"
},
"product_reference": "buildah-1:1.23.4-5.1.rhaos4.12.el8.src",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "buildah-1:1.23.4-5.1.rhaos4.12.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:buildah-1:1.23.4-5.1.rhaos4.12.el8.x86_64"
},
"product_reference": "buildah-1:1.23.4-5.1.rhaos4.12.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "buildah-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.aarch64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.aarch64"
},
"product_reference": "buildah-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.aarch64",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "buildah-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.ppc64le"
},
"product_reference": "buildah-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "buildah-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.s390x as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.s390x"
},
"product_reference": "buildah-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "buildah-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.x86_64"
},
"product_reference": "buildah-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "buildah-debugsource-1:1.23.4-5.1.rhaos4.12.el8.aarch64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.1.rhaos4.12.el8.aarch64"
},
"product_reference": "buildah-debugsource-1:1.23.4-5.1.rhaos4.12.el8.aarch64",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "buildah-debugsource-1:1.23.4-5.1.rhaos4.12.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.1.rhaos4.12.el8.ppc64le"
},
"product_reference": "buildah-debugsource-1:1.23.4-5.1.rhaos4.12.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "buildah-debugsource-1:1.23.4-5.1.rhaos4.12.el8.s390x as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.1.rhaos4.12.el8.s390x"
},
"product_reference": "buildah-debugsource-1:1.23.4-5.1.rhaos4.12.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "buildah-debugsource-1:1.23.4-5.1.rhaos4.12.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.1.rhaos4.12.el8.x86_64"
},
"product_reference": "buildah-debugsource-1:1.23.4-5.1.rhaos4.12.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "buildah-tests-1:1.23.4-5.1.rhaos4.12.el8.aarch64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.1.rhaos4.12.el8.aarch64"
},
"product_reference": "buildah-tests-1:1.23.4-5.1.rhaos4.12.el8.aarch64",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "buildah-tests-1:1.23.4-5.1.rhaos4.12.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.1.rhaos4.12.el8.ppc64le"
},
"product_reference": "buildah-tests-1:1.23.4-5.1.rhaos4.12.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "buildah-tests-1:1.23.4-5.1.rhaos4.12.el8.s390x as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.1.rhaos4.12.el8.s390x"
},
"product_reference": "buildah-tests-1:1.23.4-5.1.rhaos4.12.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "buildah-tests-1:1.23.4-5.1.rhaos4.12.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.1.rhaos4.12.el8.x86_64"
},
"product_reference": "buildah-tests-1:1.23.4-5.1.rhaos4.12.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "buildah-tests-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.aarch64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.aarch64"
},
"product_reference": "buildah-tests-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.aarch64",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "buildah-tests-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.ppc64le"
},
"product_reference": "buildah-tests-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "buildah-tests-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.s390x as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.s390x"
},
"product_reference": "buildah-tests-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "buildah-tests-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.x86_64"
},
"product_reference": "buildah-tests-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "conmon-2:2.1.2-4.rhaos4.12.el8.aarch64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:conmon-2:2.1.2-4.rhaos4.12.el8.aarch64"
},
"product_reference": "conmon-2:2.1.2-4.rhaos4.12.el8.aarch64",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "conmon-2:2.1.2-4.rhaos4.12.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:conmon-2:2.1.2-4.rhaos4.12.el8.ppc64le"
},
"product_reference": "conmon-2:2.1.2-4.rhaos4.12.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "conmon-2:2.1.2-4.rhaos4.12.el8.s390x as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:conmon-2:2.1.2-4.rhaos4.12.el8.s390x"
},
"product_reference": "conmon-2:2.1.2-4.rhaos4.12.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "conmon-2:2.1.2-4.rhaos4.12.el8.src as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:conmon-2:2.1.2-4.rhaos4.12.el8.src"
},
"product_reference": "conmon-2:2.1.2-4.rhaos4.12.el8.src",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "conmon-2:2.1.2-4.rhaos4.12.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:conmon-2:2.1.2-4.rhaos4.12.el8.x86_64"
},
"product_reference": "conmon-2:2.1.2-4.rhaos4.12.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "conmon-debuginfo-2:2.1.2-4.rhaos4.12.el8.aarch64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-4.rhaos4.12.el8.aarch64"
},
"product_reference": "conmon-debuginfo-2:2.1.2-4.rhaos4.12.el8.aarch64",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "conmon-debuginfo-2:2.1.2-4.rhaos4.12.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-4.rhaos4.12.el8.ppc64le"
},
"product_reference": "conmon-debuginfo-2:2.1.2-4.rhaos4.12.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "conmon-debuginfo-2:2.1.2-4.rhaos4.12.el8.s390x as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-4.rhaos4.12.el8.s390x"
},
"product_reference": "conmon-debuginfo-2:2.1.2-4.rhaos4.12.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "conmon-debuginfo-2:2.1.2-4.rhaos4.12.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-4.rhaos4.12.el8.x86_64"
},
"product_reference": "conmon-debuginfo-2:2.1.2-4.rhaos4.12.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "conmon-debugsource-2:2.1.2-4.rhaos4.12.el8.aarch64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-4.rhaos4.12.el8.aarch64"
},
"product_reference": "conmon-debugsource-2:2.1.2-4.rhaos4.12.el8.aarch64",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "conmon-debugsource-2:2.1.2-4.rhaos4.12.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-4.rhaos4.12.el8.ppc64le"
},
"product_reference": "conmon-debugsource-2:2.1.2-4.rhaos4.12.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "conmon-debugsource-2:2.1.2-4.rhaos4.12.el8.s390x as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-4.rhaos4.12.el8.s390x"
},
"product_reference": "conmon-debugsource-2:2.1.2-4.rhaos4.12.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "conmon-debugsource-2:2.1.2-4.rhaos4.12.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-4.rhaos4.12.el8.x86_64"
},
"product_reference": "conmon-debugsource-2:2.1.2-4.rhaos4.12.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "containernetworking-plugins-0:1.0.1-7.rhaos4.12.el8.aarch64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:containernetworking-plugins-0:1.0.1-7.rhaos4.12.el8.aarch64"
},
"product_reference": "containernetworking-plugins-0:1.0.1-7.rhaos4.12.el8.aarch64",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "containernetworking-plugins-0:1.0.1-7.rhaos4.12.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:containernetworking-plugins-0:1.0.1-7.rhaos4.12.el8.ppc64le"
},
"product_reference": "containernetworking-plugins-0:1.0.1-7.rhaos4.12.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "containernetworking-plugins-0:1.0.1-7.rhaos4.12.el8.s390x as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:containernetworking-plugins-0:1.0.1-7.rhaos4.12.el8.s390x"
},
"product_reference": "containernetworking-plugins-0:1.0.1-7.rhaos4.12.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "containernetworking-plugins-0:1.0.1-7.rhaos4.12.el8.src as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:containernetworking-plugins-0:1.0.1-7.rhaos4.12.el8.src"
},
"product_reference": "containernetworking-plugins-0:1.0.1-7.rhaos4.12.el8.src",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "containernetworking-plugins-0:1.0.1-7.rhaos4.12.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:containernetworking-plugins-0:1.0.1-7.rhaos4.12.el8.x86_64"
},
"product_reference": "containernetworking-plugins-0:1.0.1-7.rhaos4.12.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "containernetworking-plugins-debuginfo-0:1.0.1-7.rhaos4.12.el8.aarch64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:containernetworking-plugins-debuginfo-0:1.0.1-7.rhaos4.12.el8.aarch64"
},
"product_reference": "containernetworking-plugins-debuginfo-0:1.0.1-7.rhaos4.12.el8.aarch64",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "containernetworking-plugins-debuginfo-0:1.0.1-7.rhaos4.12.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:containernetworking-plugins-debuginfo-0:1.0.1-7.rhaos4.12.el8.ppc64le"
},
"product_reference": "containernetworking-plugins-debuginfo-0:1.0.1-7.rhaos4.12.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "containernetworking-plugins-debuginfo-0:1.0.1-7.rhaos4.12.el8.s390x as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:containernetworking-plugins-debuginfo-0:1.0.1-7.rhaos4.12.el8.s390x"
},
"product_reference": "containernetworking-plugins-debuginfo-0:1.0.1-7.rhaos4.12.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "containernetworking-plugins-debuginfo-0:1.0.1-7.rhaos4.12.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:containernetworking-plugins-debuginfo-0:1.0.1-7.rhaos4.12.el8.x86_64"
},
"product_reference": "containernetworking-plugins-debuginfo-0:1.0.1-7.rhaos4.12.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "containernetworking-plugins-debugsource-0:1.0.1-7.rhaos4.12.el8.aarch64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:containernetworking-plugins-debugsource-0:1.0.1-7.rhaos4.12.el8.aarch64"
},
"product_reference": "containernetworking-plugins-debugsource-0:1.0.1-7.rhaos4.12.el8.aarch64",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "containernetworking-plugins-debugsource-0:1.0.1-7.rhaos4.12.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:containernetworking-plugins-debugsource-0:1.0.1-7.rhaos4.12.el8.ppc64le"
},
"product_reference": "containernetworking-plugins-debugsource-0:1.0.1-7.rhaos4.12.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "containernetworking-plugins-debugsource-0:1.0.1-7.rhaos4.12.el8.s390x as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:containernetworking-plugins-debugsource-0:1.0.1-7.rhaos4.12.el8.s390x"
},
"product_reference": "containernetworking-plugins-debugsource-0:1.0.1-7.rhaos4.12.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "containernetworking-plugins-debugsource-0:1.0.1-7.rhaos4.12.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:containernetworking-plugins-debugsource-0:1.0.1-7.rhaos4.12.el8.x86_64"
},
"product_reference": "containernetworking-plugins-debugsource-0:1.0.1-7.rhaos4.12.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-372.59.1.el8_6.aarch64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:kernel-0:4.18.0-372.59.1.el8_6.aarch64"
},
"product_reference": "kernel-0:4.18.0-372.59.1.el8_6.aarch64",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-372.59.1.el8_6.ppc64le as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:kernel-0:4.18.0-372.59.1.el8_6.ppc64le"
},
"product_reference": "kernel-0:4.18.0-372.59.1.el8_6.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-372.59.1.el8_6.s390x as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:kernel-0:4.18.0-372.59.1.el8_6.s390x"
},
"product_reference": "kernel-0:4.18.0-372.59.1.el8_6.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-372.59.1.el8_6.src as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:kernel-0:4.18.0-372.59.1.el8_6.src"
},
"product_reference": "kernel-0:4.18.0-372.59.1.el8_6.src",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-372.59.1.el8_6.x86_64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:kernel-0:4.18.0-372.59.1.el8_6.x86_64"
},
"product_reference": "kernel-0:4.18.0-372.59.1.el8_6.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-372.59.1.el8_6.aarch64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:kernel-core-0:4.18.0-372.59.1.el8_6.aarch64"
},
"product_reference": "kernel-core-0:4.18.0-372.59.1.el8_6.aarch64",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-372.59.1.el8_6.ppc64le as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:kernel-core-0:4.18.0-372.59.1.el8_6.ppc64le"
},
"product_reference": "kernel-core-0:4.18.0-372.59.1.el8_6.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-372.59.1.el8_6.s390x as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:kernel-core-0:4.18.0-372.59.1.el8_6.s390x"
},
"product_reference": "kernel-core-0:4.18.0-372.59.1.el8_6.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-372.59.1.el8_6.x86_64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:kernel-core-0:4.18.0-372.59.1.el8_6.x86_64"
},
"product_reference": "kernel-core-0:4.18.0-372.59.1.el8_6.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-372.59.1.el8_6.aarch64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:kernel-cross-headers-0:4.18.0-372.59.1.el8_6.aarch64"
},
"product_reference": "kernel-cross-headers-0:4.18.0-372.59.1.el8_6.aarch64",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-372.59.1.el8_6.ppc64le as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:kernel-cross-headers-0:4.18.0-372.59.1.el8_6.ppc64le"
},
"product_reference": "kernel-cross-headers-0:4.18.0-372.59.1.el8_6.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-372.59.1.el8_6.s390x as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:kernel-cross-headers-0:4.18.0-372.59.1.el8_6.s390x"
},
"product_reference": "kernel-cross-headers-0:4.18.0-372.59.1.el8_6.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-372.59.1.el8_6.x86_64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:kernel-cross-headers-0:4.18.0-372.59.1.el8_6.x86_64"
},
"product_reference": "kernel-cross-headers-0:4.18.0-372.59.1.el8_6.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-372.59.1.el8_6.aarch64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:kernel-debug-0:4.18.0-372.59.1.el8_6.aarch64"
},
"product_reference": "kernel-debug-0:4.18.0-372.59.1.el8_6.aarch64",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-372.59.1.el8_6.ppc64le as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:kernel-debug-0:4.18.0-372.59.1.el8_6.ppc64le"
},
"product_reference": "kernel-debug-0:4.18.0-372.59.1.el8_6.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-372.59.1.el8_6.s390x as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:kernel-debug-0:4.18.0-372.59.1.el8_6.s390x"
},
"product_reference": "kernel-debug-0:4.18.0-372.59.1.el8_6.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-372.59.1.el8_6.x86_64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:kernel-debug-0:4.18.0-372.59.1.el8_6.x86_64"
},
"product_reference": "kernel-debug-0:4.18.0-372.59.1.el8_6.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-372.59.1.el8_6.aarch64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:kernel-debug-core-0:4.18.0-372.59.1.el8_6.aarch64"
},
"product_reference": "kernel-debug-core-0:4.18.0-372.59.1.el8_6.aarch64",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-372.59.1.el8_6.ppc64le as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:kernel-debug-core-0:4.18.0-372.59.1.el8_6.ppc64le"
},
"product_reference": "kernel-debug-core-0:4.18.0-372.59.1.el8_6.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-372.59.1.el8_6.s390x as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:kernel-debug-core-0:4.18.0-372.59.1.el8_6.s390x"
},
"product_reference": "kernel-debug-core-0:4.18.0-372.59.1.el8_6.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-372.59.1.el8_6.x86_64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:kernel-debug-core-0:4.18.0-372.59.1.el8_6.x86_64"
},
"product_reference": "kernel-debug-core-0:4.18.0-372.59.1.el8_6.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:kernel-debug-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:kernel-debug-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-372.59.1.el8_6.s390x as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:kernel-debug-debuginfo-0:4.18.0-372.59.1.el8_6.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-372.59.1.el8_6.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:kernel-debug-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-372.59.1.el8_6.aarch64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:kernel-debug-devel-0:4.18.0-372.59.1.el8_6.aarch64"
},
"product_reference": "kernel-debug-devel-0:4.18.0-372.59.1.el8_6.aarch64",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-372.59.1.el8_6.ppc64le as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:kernel-debug-devel-0:4.18.0-372.59.1.el8_6.ppc64le"
},
"product_reference": "kernel-debug-devel-0:4.18.0-372.59.1.el8_6.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-372.59.1.el8_6.s390x as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:kernel-debug-devel-0:4.18.0-372.59.1.el8_6.s390x"
},
"product_reference": "kernel-debug-devel-0:4.18.0-372.59.1.el8_6.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-372.59.1.el8_6.x86_64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:kernel-debug-devel-0:4.18.0-372.59.1.el8_6.x86_64"
},
"product_reference": "kernel-debug-devel-0:4.18.0-372.59.1.el8_6.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-372.59.1.el8_6.aarch64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:kernel-debug-modules-0:4.18.0-372.59.1.el8_6.aarch64"
},
"product_reference": "kernel-debug-modules-0:4.18.0-372.59.1.el8_6.aarch64",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-372.59.1.el8_6.ppc64le as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:kernel-debug-modules-0:4.18.0-372.59.1.el8_6.ppc64le"
},
"product_reference": "kernel-debug-modules-0:4.18.0-372.59.1.el8_6.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-372.59.1.el8_6.s390x as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:kernel-debug-modules-0:4.18.0-372.59.1.el8_6.s390x"
},
"product_reference": "kernel-debug-modules-0:4.18.0-372.59.1.el8_6.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-372.59.1.el8_6.x86_64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:kernel-debug-modules-0:4.18.0-372.59.1.el8_6.x86_64"
},
"product_reference": "kernel-debug-modules-0:4.18.0-372.59.1.el8_6.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-372.59.1.el8_6.aarch64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:kernel-debug-modules-extra-0:4.18.0-372.59.1.el8_6.aarch64"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-372.59.1.el8_6.aarch64",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-372.59.1.el8_6.ppc64le as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:kernel-debug-modules-extra-0:4.18.0-372.59.1.el8_6.ppc64le"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-372.59.1.el8_6.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-372.59.1.el8_6.s390x as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:kernel-debug-modules-extra-0:4.18.0-372.59.1.el8_6.s390x"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-372.59.1.el8_6.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-372.59.1.el8_6.x86_64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:kernel-debug-modules-extra-0:4.18.0-372.59.1.el8_6.x86_64"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-372.59.1.el8_6.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-internal-0:4.18.0-372.59.1.el8_6.aarch64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:kernel-debug-modules-internal-0:4.18.0-372.59.1.el8_6.aarch64"
},
"product_reference": "kernel-debug-modules-internal-0:4.18.0-372.59.1.el8_6.aarch64",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-internal-0:4.18.0-372.59.1.el8_6.ppc64le as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:kernel-debug-modules-internal-0:4.18.0-372.59.1.el8_6.ppc64le"
},
"product_reference": "kernel-debug-modules-internal-0:4.18.0-372.59.1.el8_6.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-internal-0:4.18.0-372.59.1.el8_6.s390x as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:kernel-debug-modules-internal-0:4.18.0-372.59.1.el8_6.s390x"
},
"product_reference": "kernel-debug-modules-internal-0:4.18.0-372.59.1.el8_6.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-internal-0:4.18.0-372.59.1.el8_6.x86_64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:kernel-debug-modules-internal-0:4.18.0-372.59.1.el8_6.x86_64"
},
"product_reference": "kernel-debug-modules-internal-0:4.18.0-372.59.1.el8_6.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:kernel-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64"
},
"product_reference": "kernel-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:kernel-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le"
},
"product_reference": "kernel-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-372.59.1.el8_6.s390x as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:kernel-debuginfo-0:4.18.0-372.59.1.el8_6.s390x"
},
"product_reference": "kernel-debuginfo-0:4.18.0-372.59.1.el8_6.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:kernel-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64"
},
"product_reference": "kernel-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-aarch64-0:4.18.0-372.59.1.el8_6.aarch64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:kernel-debuginfo-common-aarch64-0:4.18.0-372.59.1.el8_6.aarch64"
},
"product_reference": "kernel-debuginfo-common-aarch64-0:4.18.0-372.59.1.el8_6.aarch64",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:4.18.0-372.59.1.el8_6.ppc64le as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:kernel-debuginfo-common-ppc64le-0:4.18.0-372.59.1.el8_6.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:4.18.0-372.59.1.el8_6.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:4.18.0-372.59.1.el8_6.s390x as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:kernel-debuginfo-common-s390x-0:4.18.0-372.59.1.el8_6.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:4.18.0-372.59.1.el8_6.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:4.18.0-372.59.1.el8_6.x86_64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:kernel-debuginfo-common-x86_64-0:4.18.0-372.59.1.el8_6.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:4.18.0-372.59.1.el8_6.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-372.59.1.el8_6.aarch64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:kernel-devel-0:4.18.0-372.59.1.el8_6.aarch64"
},
"product_reference": "kernel-devel-0:4.18.0-372.59.1.el8_6.aarch64",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-372.59.1.el8_6.ppc64le as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:kernel-devel-0:4.18.0-372.59.1.el8_6.ppc64le"
},
"product_reference": "kernel-devel-0:4.18.0-372.59.1.el8_6.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-372.59.1.el8_6.s390x as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:kernel-devel-0:4.18.0-372.59.1.el8_6.s390x"
},
"product_reference": "kernel-devel-0:4.18.0-372.59.1.el8_6.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-372.59.1.el8_6.x86_64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:kernel-devel-0:4.18.0-372.59.1.el8_6.x86_64"
},
"product_reference": "kernel-devel-0:4.18.0-372.59.1.el8_6.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:4.18.0-372.59.1.el8_6.noarch as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:kernel-doc-0:4.18.0-372.59.1.el8_6.noarch"
},
"product_reference": "kernel-doc-0:4.18.0-372.59.1.el8_6.noarch",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-372.59.1.el8_6.aarch64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:kernel-headers-0:4.18.0-372.59.1.el8_6.aarch64"
},
"product_reference": "kernel-headers-0:4.18.0-372.59.1.el8_6.aarch64",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-372.59.1.el8_6.ppc64le as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:kernel-headers-0:4.18.0-372.59.1.el8_6.ppc64le"
},
"product_reference": "kernel-headers-0:4.18.0-372.59.1.el8_6.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-372.59.1.el8_6.s390x as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:kernel-headers-0:4.18.0-372.59.1.el8_6.s390x"
},
"product_reference": "kernel-headers-0:4.18.0-372.59.1.el8_6.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-372.59.1.el8_6.x86_64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:kernel-headers-0:4.18.0-372.59.1.el8_6.x86_64"
},
"product_reference": "kernel-headers-0:4.18.0-372.59.1.el8_6.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-ipaclones-internal-0:4.18.0-372.59.1.el8_6.ppc64le as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:kernel-ipaclones-internal-0:4.18.0-372.59.1.el8_6.ppc64le"
},
"product_reference": "kernel-ipaclones-internal-0:4.18.0-372.59.1.el8_6.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-ipaclones-internal-0:4.18.0-372.59.1.el8_6.x86_64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:kernel-ipaclones-internal-0:4.18.0-372.59.1.el8_6.x86_64"
},
"product_reference": "kernel-ipaclones-internal-0:4.18.0-372.59.1.el8_6.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-372.59.1.el8_6.aarch64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:kernel-modules-0:4.18.0-372.59.1.el8_6.aarch64"
},
"product_reference": "kernel-modules-0:4.18.0-372.59.1.el8_6.aarch64",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-372.59.1.el8_6.ppc64le as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:kernel-modules-0:4.18.0-372.59.1.el8_6.ppc64le"
},
"product_reference": "kernel-modules-0:4.18.0-372.59.1.el8_6.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-372.59.1.el8_6.s390x as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:kernel-modules-0:4.18.0-372.59.1.el8_6.s390x"
},
"product_reference": "kernel-modules-0:4.18.0-372.59.1.el8_6.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-372.59.1.el8_6.x86_64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:kernel-modules-0:4.18.0-372.59.1.el8_6.x86_64"
},
"product_reference": "kernel-modules-0:4.18.0-372.59.1.el8_6.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-372.59.1.el8_6.aarch64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:kernel-modules-extra-0:4.18.0-372.59.1.el8_6.aarch64"
},
"product_reference": "kernel-modules-extra-0:4.18.0-372.59.1.el8_6.aarch64",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-372.59.1.el8_6.ppc64le as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:kernel-modules-extra-0:4.18.0-372.59.1.el8_6.ppc64le"
},
"product_reference": "kernel-modules-extra-0:4.18.0-372.59.1.el8_6.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-372.59.1.el8_6.s390x as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:kernel-modules-extra-0:4.18.0-372.59.1.el8_6.s390x"
},
"product_reference": "kernel-modules-extra-0:4.18.0-372.59.1.el8_6.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-372.59.1.el8_6.x86_64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:kernel-modules-extra-0:4.18.0-372.59.1.el8_6.x86_64"
},
"product_reference": "kernel-modules-extra-0:4.18.0-372.59.1.el8_6.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-internal-0:4.18.0-372.59.1.el8_6.aarch64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:kernel-modules-internal-0:4.18.0-372.59.1.el8_6.aarch64"
},
"product_reference": "kernel-modules-internal-0:4.18.0-372.59.1.el8_6.aarch64",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-internal-0:4.18.0-372.59.1.el8_6.ppc64le as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:kernel-modules-internal-0:4.18.0-372.59.1.el8_6.ppc64le"
},
"product_reference": "kernel-modules-internal-0:4.18.0-372.59.1.el8_6.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-internal-0:4.18.0-372.59.1.el8_6.s390x as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:kernel-modules-internal-0:4.18.0-372.59.1.el8_6.s390x"
},
"product_reference": "kernel-modules-internal-0:4.18.0-372.59.1.el8_6.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-internal-0:4.18.0-372.59.1.el8_6.x86_64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:kernel-modules-internal-0:4.18.0-372.59.1.el8_6.x86_64"
},
"product_reference": "kernel-modules-internal-0:4.18.0-372.59.1.el8_6.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-0:4.18.0-372.59.1.rt7.217.el8_6.src as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:kernel-rt-0:4.18.0-372.59.1.rt7.217.el8_6.src"
},
"product_reference": "kernel-rt-0:4.18.0-372.59.1.rt7.217.el8_6.src",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:kernel-rt-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64"
},
"product_reference": "kernel-rt-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-core-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:kernel-rt-core-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64"
},
"product_reference": "kernel-rt-core-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:kernel-rt-debug-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64"
},
"product_reference": "kernel-rt-debug-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-core-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:kernel-rt-debug-core-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64"
},
"product_reference": "kernel-rt-debug-core-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-debuginfo-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:kernel-rt-debug-debuginfo-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64"
},
"product_reference": "kernel-rt-debug-debuginfo-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-devel-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:kernel-rt-debug-devel-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64"
},
"product_reference": "kernel-rt-debug-devel-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-kvm-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:kernel-rt-debug-kvm-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64"
},
"product_reference": "kernel-rt-debug-kvm-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-modules-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:kernel-rt-debug-modules-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64"
},
"product_reference": "kernel-rt-debug-modules-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-modules-extra-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:kernel-rt-debug-modules-extra-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64"
},
"product_reference": "kernel-rt-debug-modules-extra-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-modules-internal-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:kernel-rt-debug-modules-internal-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64"
},
"product_reference": "kernel-rt-debug-modules-internal-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debuginfo-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:kernel-rt-debuginfo-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64"
},
"product_reference": "kernel-rt-debuginfo-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64"
},
"product_reference": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-devel-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:kernel-rt-devel-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64"
},
"product_reference": "kernel-rt-devel-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-kvm-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:kernel-rt-kvm-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64"
},
"product_reference": "kernel-rt-kvm-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-modules-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:kernel-rt-modules-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64"
},
"product_reference": "kernel-rt-modules-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-modules-extra-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:kernel-rt-modules-extra-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64"
},
"product_reference": "kernel-rt-modules-extra-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-modules-internal-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:kernel-rt-modules-internal-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64"
},
"product_reference": "kernel-rt-modules-internal-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-selftests-internal-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:kernel-rt-selftests-internal-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64"
},
"product_reference": "kernel-rt-selftests-internal-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-selftests-internal-0:4.18.0-372.59.1.el8_6.aarch64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:kernel-selftests-internal-0:4.18.0-372.59.1.el8_6.aarch64"
},
"product_reference": "kernel-selftests-internal-0:4.18.0-372.59.1.el8_6.aarch64",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-selftests-internal-0:4.18.0-372.59.1.el8_6.ppc64le as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:kernel-selftests-internal-0:4.18.0-372.59.1.el8_6.ppc64le"
},
"product_reference": "kernel-selftests-internal-0:4.18.0-372.59.1.el8_6.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-selftests-internal-0:4.18.0-372.59.1.el8_6.s390x as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:kernel-selftests-internal-0:4.18.0-372.59.1.el8_6.s390x"
},
"product_reference": "kernel-selftests-internal-0:4.18.0-372.59.1.el8_6.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-selftests-internal-0:4.18.0-372.59.1.el8_6.x86_64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:kernel-selftests-internal-0:4.18.0-372.59.1.el8_6.x86_64"
},
"product_reference": "kernel-selftests-internal-0:4.18.0-372.59.1.el8_6.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-372.59.1.el8_6.aarch64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:kernel-tools-0:4.18.0-372.59.1.el8_6.aarch64"
},
"product_reference": "kernel-tools-0:4.18.0-372.59.1.el8_6.aarch64",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-372.59.1.el8_6.ppc64le as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:kernel-tools-0:4.18.0-372.59.1.el8_6.ppc64le"
},
"product_reference": "kernel-tools-0:4.18.0-372.59.1.el8_6.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-372.59.1.el8_6.s390x as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:kernel-tools-0:4.18.0-372.59.1.el8_6.s390x"
},
"product_reference": "kernel-tools-0:4.18.0-372.59.1.el8_6.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-372.59.1.el8_6.x86_64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:kernel-tools-0:4.18.0-372.59.1.el8_6.x86_64"
},
"product_reference": "kernel-tools-0:4.18.0-372.59.1.el8_6.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:kernel-tools-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:kernel-tools-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-372.59.1.el8_6.s390x as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:kernel-tools-debuginfo-0:4.18.0-372.59.1.el8_6.s390x"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-372.59.1.el8_6.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:kernel-tools-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:4.18.0-372.59.1.el8_6.aarch64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:kernel-tools-libs-0:4.18.0-372.59.1.el8_6.aarch64"
},
"product_reference": "kernel-tools-libs-0:4.18.0-372.59.1.el8_6.aarch64",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:4.18.0-372.59.1.el8_6.ppc64le as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:kernel-tools-libs-0:4.18.0-372.59.1.el8_6.ppc64le"
},
"product_reference": "kernel-tools-libs-0:4.18.0-372.59.1.el8_6.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:4.18.0-372.59.1.el8_6.x86_64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:kernel-tools-libs-0:4.18.0-372.59.1.el8_6.x86_64"
},
"product_reference": "kernel-tools-libs-0:4.18.0-372.59.1.el8_6.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:4.18.0-372.59.1.el8_6.aarch64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:kernel-tools-libs-devel-0:4.18.0-372.59.1.el8_6.aarch64"
},
"product_reference": "kernel-tools-libs-devel-0:4.18.0-372.59.1.el8_6.aarch64",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:4.18.0-372.59.1.el8_6.ppc64le as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:kernel-tools-libs-devel-0:4.18.0-372.59.1.el8_6.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:4.18.0-372.59.1.el8_6.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:4.18.0-372.59.1.el8_6.x86_64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:kernel-tools-libs-devel-0:4.18.0-372.59.1.el8_6.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:4.18.0-372.59.1.el8_6.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-0:4.18.0-372.59.1.el8_6.s390x as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:kernel-zfcpdump-0:4.18.0-372.59.1.el8_6.s390x"
},
"product_reference": "kernel-zfcpdump-0:4.18.0-372.59.1.el8_6.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-core-0:4.18.0-372.59.1.el8_6.s390x as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:kernel-zfcpdump-core-0:4.18.0-372.59.1.el8_6.s390x"
},
"product_reference": "kernel-zfcpdump-core-0:4.18.0-372.59.1.el8_6.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-debuginfo-0:4.18.0-372.59.1.el8_6.s390x as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:kernel-zfcpdump-debuginfo-0:4.18.0-372.59.1.el8_6.s390x"
},
"product_reference": "kernel-zfcpdump-debuginfo-0:4.18.0-372.59.1.el8_6.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-devel-0:4.18.0-372.59.1.el8_6.s390x as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:kernel-zfcpdump-devel-0:4.18.0-372.59.1.el8_6.s390x"
},
"product_reference": "kernel-zfcpdump-devel-0:4.18.0-372.59.1.el8_6.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-modules-0:4.18.0-372.59.1.el8_6.s390x as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:kernel-zfcpdump-modules-0:4.18.0-372.59.1.el8_6.s390x"
},
"product_reference": "kernel-zfcpdump-modules-0:4.18.0-372.59.1.el8_6.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-modules-extra-0:4.18.0-372.59.1.el8_6.s390x as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:kernel-zfcpdump-modules-extra-0:4.18.0-372.59.1.el8_6.s390x"
},
"product_reference": "kernel-zfcpdump-modules-extra-0:4.18.0-372.59.1.el8_6.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-modules-internal-0:4.18.0-372.59.1.el8_6.s390x as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:kernel-zfcpdump-modules-internal-0:4.18.0-372.59.1.el8_6.s390x"
},
"product_reference": "kernel-zfcpdump-modules-internal-0:4.18.0-372.59.1.el8_6.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el8.src as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:openshift-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el8.src"
},
"product_reference": "openshift-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el8.src",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-ansible-0:4.12.0-202306090942.p0.g74dc7b3.assembly.stream.el8.noarch as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:openshift-ansible-0:4.12.0-202306090942.p0.g74dc7b3.assembly.stream.el8.noarch"
},
"product_reference": "openshift-ansible-0:4.12.0-202306090942.p0.g74dc7b3.assembly.stream.el8.noarch",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-ansible-0:4.12.0-202306090942.p0.g74dc7b3.assembly.stream.el8.src as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:openshift-ansible-0:4.12.0-202306090942.p0.g74dc7b3.assembly.stream.el8.src"
},
"product_reference": "openshift-ansible-0:4.12.0-202306090942.p0.g74dc7b3.assembly.stream.el8.src",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-ansible-test-0:4.12.0-202306090942.p0.g74dc7b3.assembly.stream.el8.noarch as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:openshift-ansible-test-0:4.12.0-202306090942.p0.g74dc7b3.assembly.stream.el8.noarch"
},
"product_reference": "openshift-ansible-test-0:4.12.0-202306090942.p0.g74dc7b3.assembly.stream.el8.noarch",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.aarch64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.aarch64"
},
"product_reference": "openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.aarch64",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.ppc64le"
},
"product_reference": "openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.s390x as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.s390x"
},
"product_reference": "openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.src as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.src"
},
"product_reference": "openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.src",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.x86_64"
},
"product_reference": "openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-clients-redistributable-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:openshift-clients-redistributable-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.x86_64"
},
"product_reference": "openshift-clients-redistributable-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el8.aarch64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el8.aarch64"
},
"product_reference": "openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el8.aarch64",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el8.ppc64le"
},
"product_reference": "openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el8.s390x as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el8.s390x"
},
"product_reference": "openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el8.x86_64"
},
"product_reference": "openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-kuryr-0:4.12.0-202306140156.p0.g31dd228.assembly.stream.el8.src as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:openshift-kuryr-0:4.12.0-202306140156.p0.g31dd228.assembly.stream.el8.src"
},
"product_reference": "openshift-kuryr-0:4.12.0-202306140156.p0.g31dd228.assembly.stream.el8.src",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-kuryr-cni-0:4.12.0-202306140156.p0.g31dd228.assembly.stream.el8.noarch as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:openshift-kuryr-cni-0:4.12.0-202306140156.p0.g31dd228.assembly.stream.el8.noarch"
},
"product_reference": "openshift-kuryr-cni-0:4.12.0-202306140156.p0.g31dd228.assembly.stream.el8.noarch",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-kuryr-common-0:4.12.0-202306140156.p0.g31dd228.assembly.stream.el8.noarch as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:openshift-kuryr-common-0:4.12.0-202306140156.p0.g31dd228.assembly.stream.el8.noarch"
},
"product_reference": "openshift-kuryr-common-0:4.12.0-202306140156.p0.g31dd228.assembly.stream.el8.noarch",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-kuryr-controller-0:4.12.0-202306140156.p0.g31dd228.assembly.stream.el8.noarch as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:openshift-kuryr-controller-0:4.12.0-202306140156.p0.g31dd228.assembly.stream.el8.noarch"
},
"product_reference": "openshift-kuryr-controller-0:4.12.0-202306140156.p0.g31dd228.assembly.stream.el8.noarch",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4-aws-iso-0:4.12.0-202306090942.p0.gd2acdd5.assembly.stream.el8.noarch as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:openshift4-aws-iso-0:4.12.0-202306090942.p0.gd2acdd5.assembly.stream.el8.noarch"
},
"product_reference": "openshift4-aws-iso-0:4.12.0-202306090942.p0.gd2acdd5.assembly.stream.el8.noarch",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4-aws-iso-0:4.12.0-202306090942.p0.gd2acdd5.assembly.stream.el8.src as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:openshift4-aws-iso-0:4.12.0-202306090942.p0.gd2acdd5.assembly.stream.el8.src"
},
"product_reference": "openshift4-aws-iso-0:4.12.0-202306090942.p0.gd2acdd5.assembly.stream.el8.src",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-372.59.1.el8_6.aarch64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:perf-0:4.18.0-372.59.1.el8_6.aarch64"
},
"product_reference": "perf-0:4.18.0-372.59.1.el8_6.aarch64",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-372.59.1.el8_6.ppc64le as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:perf-0:4.18.0-372.59.1.el8_6.ppc64le"
},
"product_reference": "perf-0:4.18.0-372.59.1.el8_6.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-372.59.1.el8_6.s390x as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:perf-0:4.18.0-372.59.1.el8_6.s390x"
},
"product_reference": "perf-0:4.18.0-372.59.1.el8_6.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-372.59.1.el8_6.x86_64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:perf-0:4.18.0-372.59.1.el8_6.x86_64"
},
"product_reference": "perf-0:4.18.0-372.59.1.el8_6.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:perf-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64"
},
"product_reference": "perf-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:perf-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le"
},
"product_reference": "perf-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-372.59.1.el8_6.s390x as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:perf-debuginfo-0:4.18.0-372.59.1.el8_6.s390x"
},
"product_reference": "perf-debuginfo-0:4.18.0-372.59.1.el8_6.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:perf-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64"
},
"product_reference": "perf-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-3:4.2.0-6.1.rhaos4.12.el8.aarch64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:podman-3:4.2.0-6.1.rhaos4.12.el8.aarch64"
},
"product_reference": "podman-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-3:4.2.0-6.1.rhaos4.12.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:podman-3:4.2.0-6.1.rhaos4.12.el8.ppc64le"
},
"product_reference": "podman-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-3:4.2.0-6.1.rhaos4.12.el8.s390x as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:podman-3:4.2.0-6.1.rhaos4.12.el8.s390x"
},
"product_reference": "podman-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-3:4.2.0-6.1.rhaos4.12.el8.src as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:podman-3:4.2.0-6.1.rhaos4.12.el8.src"
},
"product_reference": "podman-3:4.2.0-6.1.rhaos4.12.el8.src",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-3:4.2.0-6.1.rhaos4.12.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:podman-3:4.2.0-6.1.rhaos4.12.el8.x86_64"
},
"product_reference": "podman-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-catatonit-3:4.2.0-6.1.rhaos4.12.el8.aarch64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:podman-catatonit-3:4.2.0-6.1.rhaos4.12.el8.aarch64"
},
"product_reference": "podman-catatonit-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-catatonit-3:4.2.0-6.1.rhaos4.12.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:podman-catatonit-3:4.2.0-6.1.rhaos4.12.el8.ppc64le"
},
"product_reference": "podman-catatonit-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-catatonit-3:4.2.0-6.1.rhaos4.12.el8.s390x as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:podman-catatonit-3:4.2.0-6.1.rhaos4.12.el8.s390x"
},
"product_reference": "podman-catatonit-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-catatonit-3:4.2.0-6.1.rhaos4.12.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:podman-catatonit-3:4.2.0-6.1.rhaos4.12.el8.x86_64"
},
"product_reference": "podman-catatonit-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-catatonit-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.aarch64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.aarch64"
},
"product_reference": "podman-catatonit-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-catatonit-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.ppc64le"
},
"product_reference": "podman-catatonit-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-catatonit-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.s390x as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.s390x"
},
"product_reference": "podman-catatonit-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-catatonit-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.x86_64"
},
"product_reference": "podman-catatonit-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.aarch64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.aarch64"
},
"product_reference": "podman-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.ppc64le"
},
"product_reference": "podman-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.s390x as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.s390x"
},
"product_reference": "podman-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.x86_64"
},
"product_reference": "podman-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-debugsource-3:4.2.0-6.1.rhaos4.12.el8.aarch64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:podman-debugsource-3:4.2.0-6.1.rhaos4.12.el8.aarch64"
},
"product_reference": "podman-debugsource-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-debugsource-3:4.2.0-6.1.rhaos4.12.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:podman-debugsource-3:4.2.0-6.1.rhaos4.12.el8.ppc64le"
},
"product_reference": "podman-debugsource-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-debugsource-3:4.2.0-6.1.rhaos4.12.el8.s390x as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:podman-debugsource-3:4.2.0-6.1.rhaos4.12.el8.s390x"
},
"product_reference": "podman-debugsource-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-debugsource-3:4.2.0-6.1.rhaos4.12.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:podman-debugsource-3:4.2.0-6.1.rhaos4.12.el8.x86_64"
},
"product_reference": "podman-debugsource-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-docker-3:4.2.0-6.1.rhaos4.12.el8.noarch as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:podman-docker-3:4.2.0-6.1.rhaos4.12.el8.noarch"
},
"product_reference": "podman-docker-3:4.2.0-6.1.rhaos4.12.el8.noarch",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-gvproxy-3:4.2.0-6.1.rhaos4.12.el8.aarch64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-6.1.rhaos4.12.el8.aarch64"
},
"product_reference": "podman-gvproxy-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-gvproxy-3:4.2.0-6.1.rhaos4.12.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-6.1.rhaos4.12.el8.ppc64le"
},
"product_reference": "podman-gvproxy-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-gvproxy-3:4.2.0-6.1.rhaos4.12.el8.s390x as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-6.1.rhaos4.12.el8.s390x"
},
"product_reference": "podman-gvproxy-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-gvproxy-3:4.2.0-6.1.rhaos4.12.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-6.1.rhaos4.12.el8.x86_64"
},
"product_reference": "podman-gvproxy-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-gvproxy-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.aarch64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.aarch64"
},
"product_reference": "podman-gvproxy-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-gvproxy-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.ppc64le"
},
"product_reference": "podman-gvproxy-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-gvproxy-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.s390x as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.s390x"
},
"product_reference": "podman-gvproxy-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-gvproxy-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.x86_64"
},
"product_reference": "podman-gvproxy-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-plugins-3:4.2.0-6.1.rhaos4.12.el8.aarch64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:podman-plugins-3:4.2.0-6.1.rhaos4.12.el8.aarch64"
},
"product_reference": "podman-plugins-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-plugins-3:4.2.0-6.1.rhaos4.12.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:podman-plugins-3:4.2.0-6.1.rhaos4.12.el8.ppc64le"
},
"product_reference": "podman-plugins-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-plugins-3:4.2.0-6.1.rhaos4.12.el8.s390x as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:podman-plugins-3:4.2.0-6.1.rhaos4.12.el8.s390x"
},
"product_reference": "podman-plugins-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-plugins-3:4.2.0-6.1.rhaos4.12.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:podman-plugins-3:4.2.0-6.1.rhaos4.12.el8.x86_64"
},
"product_reference": "podman-plugins-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-plugins-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.aarch64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.aarch64"
},
"product_reference": "podman-plugins-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-plugins-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.ppc64le"
},
"product_reference": "podman-plugins-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-plugins-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.s390x as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.s390x"
},
"product_reference": "podman-plugins-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-plugins-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.x86_64"
},
"product_reference": "podman-plugins-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-remote-3:4.2.0-6.1.rhaos4.12.el8.aarch64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:podman-remote-3:4.2.0-6.1.rhaos4.12.el8.aarch64"
},
"product_reference": "podman-remote-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-remote-3:4.2.0-6.1.rhaos4.12.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:podman-remote-3:4.2.0-6.1.rhaos4.12.el8.ppc64le"
},
"product_reference": "podman-remote-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-remote-3:4.2.0-6.1.rhaos4.12.el8.s390x as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:podman-remote-3:4.2.0-6.1.rhaos4.12.el8.s390x"
},
"product_reference": "podman-remote-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-remote-3:4.2.0-6.1.rhaos4.12.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:podman-remote-3:4.2.0-6.1.rhaos4.12.el8.x86_64"
},
"product_reference": "podman-remote-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-remote-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.aarch64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.aarch64"
},
"product_reference": "podman-remote-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-remote-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.ppc64le"
},
"product_reference": "podman-remote-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-remote-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.s390x as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.s390x"
},
"product_reference": "podman-remote-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-remote-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.x86_64"
},
"product_reference": "podman-remote-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-tests-3:4.2.0-6.1.rhaos4.12.el8.aarch64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:podman-tests-3:4.2.0-6.1.rhaos4.12.el8.aarch64"
},
"product_reference": "podman-tests-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-tests-3:4.2.0-6.1.rhaos4.12.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:podman-tests-3:4.2.0-6.1.rhaos4.12.el8.ppc64le"
},
"product_reference": "podman-tests-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-tests-3:4.2.0-6.1.rhaos4.12.el8.s390x as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:podman-tests-3:4.2.0-6.1.rhaos4.12.el8.s390x"
},
"product_reference": "podman-tests-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-tests-3:4.2.0-6.1.rhaos4.12.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:podman-tests-3:4.2.0-6.1.rhaos4.12.el8.x86_64"
},
"product_reference": "podman-tests-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-kuryr-kubernetes-0:4.12.0-202306140156.p0.g31dd228.assembly.stream.el8.noarch as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:python3-kuryr-kubernetes-0:4.12.0-202306140156.p0.g31dd228.assembly.stream.el8.noarch"
},
"product_reference": "python3-kuryr-kubernetes-0:4.12.0-202306140156.p0.g31dd228.assembly.stream.el8.noarch",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-372.59.1.el8_6.aarch64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:python3-perf-0:4.18.0-372.59.1.el8_6.aarch64"
},
"product_reference": "python3-perf-0:4.18.0-372.59.1.el8_6.aarch64",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-372.59.1.el8_6.ppc64le as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:python3-perf-0:4.18.0-372.59.1.el8_6.ppc64le"
},
"product_reference": "python3-perf-0:4.18.0-372.59.1.el8_6.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-372.59.1.el8_6.s390x as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:python3-perf-0:4.18.0-372.59.1.el8_6.s390x"
},
"product_reference": "python3-perf-0:4.18.0-372.59.1.el8_6.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-372.59.1.el8_6.x86_64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:python3-perf-0:4.18.0-372.59.1.el8_6.x86_64"
},
"product_reference": "python3-perf-0:4.18.0-372.59.1.el8_6.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:python3-perf-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:python3-perf-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-372.59.1.el8_6.s390x as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:python3-perf-debuginfo-0:4.18.0-372.59.1.el8_6.s390x"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-372.59.1.el8_6.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:python3-perf-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "runc-3:1.1.6-4.rhaos4.12.el8.aarch64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:runc-3:1.1.6-4.rhaos4.12.el8.aarch64"
},
"product_reference": "runc-3:1.1.6-4.rhaos4.12.el8.aarch64",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "runc-3:1.1.6-4.rhaos4.12.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:runc-3:1.1.6-4.rhaos4.12.el8.ppc64le"
},
"product_reference": "runc-3:1.1.6-4.rhaos4.12.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "runc-3:1.1.6-4.rhaos4.12.el8.s390x as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:runc-3:1.1.6-4.rhaos4.12.el8.s390x"
},
"product_reference": "runc-3:1.1.6-4.rhaos4.12.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "runc-3:1.1.6-4.rhaos4.12.el8.src as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:runc-3:1.1.6-4.rhaos4.12.el8.src"
},
"product_reference": "runc-3:1.1.6-4.rhaos4.12.el8.src",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "runc-3:1.1.6-4.rhaos4.12.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:runc-3:1.1.6-4.rhaos4.12.el8.x86_64"
},
"product_reference": "runc-3:1.1.6-4.rhaos4.12.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "runc-debuginfo-3:1.1.6-4.rhaos4.12.el8.aarch64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:runc-debuginfo-3:1.1.6-4.rhaos4.12.el8.aarch64"
},
"product_reference": "runc-debuginfo-3:1.1.6-4.rhaos4.12.el8.aarch64",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "runc-debuginfo-3:1.1.6-4.rhaos4.12.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:runc-debuginfo-3:1.1.6-4.rhaos4.12.el8.ppc64le"
},
"product_reference": "runc-debuginfo-3:1.1.6-4.rhaos4.12.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "runc-debuginfo-3:1.1.6-4.rhaos4.12.el8.s390x as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:runc-debuginfo-3:1.1.6-4.rhaos4.12.el8.s390x"
},
"product_reference": "runc-debuginfo-3:1.1.6-4.rhaos4.12.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "runc-debuginfo-3:1.1.6-4.rhaos4.12.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:runc-debuginfo-3:1.1.6-4.rhaos4.12.el8.x86_64"
},
"product_reference": "runc-debuginfo-3:1.1.6-4.rhaos4.12.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "runc-debugsource-3:1.1.6-4.rhaos4.12.el8.aarch64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:runc-debugsource-3:1.1.6-4.rhaos4.12.el8.aarch64"
},
"product_reference": "runc-debugsource-3:1.1.6-4.rhaos4.12.el8.aarch64",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "runc-debugsource-3:1.1.6-4.rhaos4.12.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:runc-debugsource-3:1.1.6-4.rhaos4.12.el8.ppc64le"
},
"product_reference": "runc-debugsource-3:1.1.6-4.rhaos4.12.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "runc-debugsource-3:1.1.6-4.rhaos4.12.el8.s390x as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:runc-debugsource-3:1.1.6-4.rhaos4.12.el8.s390x"
},
"product_reference": "runc-debugsource-3:1.1.6-4.rhaos4.12.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "runc-debugsource-3:1.1.6-4.rhaos4.12.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:runc-debugsource-3:1.1.6-4.rhaos4.12.el8.x86_64"
},
"product_reference": "runc-debugsource-3:1.1.6-4.rhaos4.12.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "skopeo-2:1.9.4-3.1.rhaos4.12.el8.aarch64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:skopeo-2:1.9.4-3.1.rhaos4.12.el8.aarch64"
},
"product_reference": "skopeo-2:1.9.4-3.1.rhaos4.12.el8.aarch64",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "skopeo-2:1.9.4-3.1.rhaos4.12.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:skopeo-2:1.9.4-3.1.rhaos4.12.el8.ppc64le"
},
"product_reference": "skopeo-2:1.9.4-3.1.rhaos4.12.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "skopeo-2:1.9.4-3.1.rhaos4.12.el8.s390x as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:skopeo-2:1.9.4-3.1.rhaos4.12.el8.s390x"
},
"product_reference": "skopeo-2:1.9.4-3.1.rhaos4.12.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "skopeo-2:1.9.4-3.1.rhaos4.12.el8.src as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:skopeo-2:1.9.4-3.1.rhaos4.12.el8.src"
},
"product_reference": "skopeo-2:1.9.4-3.1.rhaos4.12.el8.src",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "skopeo-2:1.9.4-3.1.rhaos4.12.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:skopeo-2:1.9.4-3.1.rhaos4.12.el8.x86_64"
},
"product_reference": "skopeo-2:1.9.4-3.1.rhaos4.12.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "skopeo-debuginfo-2:1.9.4-3.1.rhaos4.12.el8.aarch64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.1.rhaos4.12.el8.aarch64"
},
"product_reference": "skopeo-debuginfo-2:1.9.4-3.1.rhaos4.12.el8.aarch64",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "skopeo-debuginfo-2:1.9.4-3.1.rhaos4.12.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.1.rhaos4.12.el8.ppc64le"
},
"product_reference": "skopeo-debuginfo-2:1.9.4-3.1.rhaos4.12.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "skopeo-debuginfo-2:1.9.4-3.1.rhaos4.12.el8.s390x as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.1.rhaos4.12.el8.s390x"
},
"product_reference": "skopeo-debuginfo-2:1.9.4-3.1.rhaos4.12.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "skopeo-debuginfo-2:1.9.4-3.1.rhaos4.12.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.1.rhaos4.12.el8.x86_64"
},
"product_reference": "skopeo-debuginfo-2:1.9.4-3.1.rhaos4.12.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "skopeo-debugsource-2:1.9.4-3.1.rhaos4.12.el8.aarch64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.1.rhaos4.12.el8.aarch64"
},
"product_reference": "skopeo-debugsource-2:1.9.4-3.1.rhaos4.12.el8.aarch64",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "skopeo-debugsource-2:1.9.4-3.1.rhaos4.12.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.1.rhaos4.12.el8.ppc64le"
},
"product_reference": "skopeo-debugsource-2:1.9.4-3.1.rhaos4.12.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "skopeo-debugsource-2:1.9.4-3.1.rhaos4.12.el8.s390x as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.1.rhaos4.12.el8.s390x"
},
"product_reference": "skopeo-debugsource-2:1.9.4-3.1.rhaos4.12.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "skopeo-debugsource-2:1.9.4-3.1.rhaos4.12.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.1.rhaos4.12.el8.x86_64"
},
"product_reference": "skopeo-debugsource-2:1.9.4-3.1.rhaos4.12.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "skopeo-tests-2:1.9.4-3.1.rhaos4.12.el8.aarch64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.1.rhaos4.12.el8.aarch64"
},
"product_reference": "skopeo-tests-2:1.9.4-3.1.rhaos4.12.el8.aarch64",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "skopeo-tests-2:1.9.4-3.1.rhaos4.12.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.1.rhaos4.12.el8.ppc64le"
},
"product_reference": "skopeo-tests-2:1.9.4-3.1.rhaos4.12.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "skopeo-tests-2:1.9.4-3.1.rhaos4.12.el8.s390x as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.1.rhaos4.12.el8.s390x"
},
"product_reference": "skopeo-tests-2:1.9.4-3.1.rhaos4.12.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "skopeo-tests-2:1.9.4-3.1.rhaos4.12.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.1.rhaos4.12.el8.x86_64"
},
"product_reference": "skopeo-tests-2:1.9.4-3.1.rhaos4.12.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "buildah-1:1.23.4-5.rhaos4.12.el9.aarch64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "9Base-RHOSE-4.12:buildah-1:1.23.4-5.rhaos4.12.el9.aarch64"
},
"product_reference": "buildah-1:1.23.4-5.rhaos4.12.el9.aarch64",
"relates_to_product_reference": "9Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "buildah-1:1.23.4-5.rhaos4.12.el9.ppc64le as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "9Base-RHOSE-4.12:buildah-1:1.23.4-5.rhaos4.12.el9.ppc64le"
},
"product_reference": "buildah-1:1.23.4-5.rhaos4.12.el9.ppc64le",
"relates_to_product_reference": "9Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "buildah-1:1.23.4-5.rhaos4.12.el9.s390x as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "9Base-RHOSE-4.12:buildah-1:1.23.4-5.rhaos4.12.el9.s390x"
},
"product_reference": "buildah-1:1.23.4-5.rhaos4.12.el9.s390x",
"relates_to_product_reference": "9Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "buildah-1:1.23.4-5.rhaos4.12.el9.src as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "9Base-RHOSE-4.12:buildah-1:1.23.4-5.rhaos4.12.el9.src"
},
"product_reference": "buildah-1:1.23.4-5.rhaos4.12.el9.src",
"relates_to_product_reference": "9Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "buildah-1:1.23.4-5.rhaos4.12.el9.x86_64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "9Base-RHOSE-4.12:buildah-1:1.23.4-5.rhaos4.12.el9.x86_64"
},
"product_reference": "buildah-1:1.23.4-5.rhaos4.12.el9.x86_64",
"relates_to_product_reference": "9Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "buildah-debuginfo-1:1.23.4-5.rhaos4.12.el9.aarch64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "9Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.rhaos4.12.el9.aarch64"
},
"product_reference": "buildah-debuginfo-1:1.23.4-5.rhaos4.12.el9.aarch64",
"relates_to_product_reference": "9Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "buildah-debuginfo-1:1.23.4-5.rhaos4.12.el9.ppc64le as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "9Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.rhaos4.12.el9.ppc64le"
},
"product_reference": "buildah-debuginfo-1:1.23.4-5.rhaos4.12.el9.ppc64le",
"relates_to_product_reference": "9Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "buildah-debuginfo-1:1.23.4-5.rhaos4.12.el9.s390x as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "9Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.rhaos4.12.el9.s390x"
},
"product_reference": "buildah-debuginfo-1:1.23.4-5.rhaos4.12.el9.s390x",
"relates_to_product_reference": "9Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "buildah-debuginfo-1:1.23.4-5.rhaos4.12.el9.x86_64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "9Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.rhaos4.12.el9.x86_64"
},
"product_reference": "buildah-debuginfo-1:1.23.4-5.rhaos4.12.el9.x86_64",
"relates_to_product_reference": "9Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "buildah-debugsource-1:1.23.4-5.rhaos4.12.el9.aarch64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "9Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.rhaos4.12.el9.aarch64"
},
"product_reference": "buildah-debugsource-1:1.23.4-5.rhaos4.12.el9.aarch64",
"relates_to_product_reference": "9Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "buildah-debugsource-1:1.23.4-5.rhaos4.12.el9.ppc64le as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "9Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.rhaos4.12.el9.ppc64le"
},
"product_reference": "buildah-debugsource-1:1.23.4-5.rhaos4.12.el9.ppc64le",
"relates_to_product_reference": "9Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "buildah-debugsource-1:1.23.4-5.rhaos4.12.el9.s390x as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "9Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.rhaos4.12.el9.s390x"
},
"product_reference": "buildah-debugsource-1:1.23.4-5.rhaos4.12.el9.s390x",
"relates_to_product_reference": "9Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "buildah-debugsource-1:1.23.4-5.rhaos4.12.el9.x86_64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "9Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.rhaos4.12.el9.x86_64"
},
"product_reference": "buildah-debugsource-1:1.23.4-5.rhaos4.12.el9.x86_64",
"relates_to_product_reference": "9Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "buildah-tests-1:1.23.4-5.rhaos4.12.el9.aarch64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "9Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.rhaos4.12.el9.aarch64"
},
"product_reference": "buildah-tests-1:1.23.4-5.rhaos4.12.el9.aarch64",
"relates_to_product_reference": "9Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "buildah-tests-1:1.23.4-5.rhaos4.12.el9.ppc64le as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "9Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.rhaos4.12.el9.ppc64le"
},
"product_reference": "buildah-tests-1:1.23.4-5.rhaos4.12.el9.ppc64le",
"relates_to_product_reference": "9Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "buildah-tests-1:1.23.4-5.rhaos4.12.el9.s390x as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "9Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.rhaos4.12.el9.s390x"
},
"product_reference": "buildah-tests-1:1.23.4-5.rhaos4.12.el9.s390x",
"relates_to_product_reference": "9Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "buildah-tests-1:1.23.4-5.rhaos4.12.el9.x86_64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "9Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.rhaos4.12.el9.x86_64"
},
"product_reference": "buildah-tests-1:1.23.4-5.rhaos4.12.el9.x86_64",
"relates_to_product_reference": "9Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "buildah-tests-debuginfo-1:1.23.4-5.rhaos4.12.el9.aarch64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "9Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.rhaos4.12.el9.aarch64"
},
"product_reference": "buildah-tests-debuginfo-1:1.23.4-5.rhaos4.12.el9.aarch64",
"relates_to_product_reference": "9Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "buildah-tests-debuginfo-1:1.23.4-5.rhaos4.12.el9.ppc64le as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "9Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.rhaos4.12.el9.ppc64le"
},
"product_reference": "buildah-tests-debuginfo-1:1.23.4-5.rhaos4.12.el9.ppc64le",
"relates_to_product_reference": "9Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "buildah-tests-debuginfo-1:1.23.4-5.rhaos4.12.el9.s390x as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "9Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.rhaos4.12.el9.s390x"
},
"product_reference": "buildah-tests-debuginfo-1:1.23.4-5.rhaos4.12.el9.s390x",
"relates_to_product_reference": "9Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "buildah-tests-debuginfo-1:1.23.4-5.rhaos4.12.el9.x86_64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "9Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.rhaos4.12.el9.x86_64"
},
"product_reference": "buildah-tests-debuginfo-1:1.23.4-5.rhaos4.12.el9.x86_64",
"relates_to_product_reference": "9Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "conmon-2:2.1.2-5.rhaos4.12.el9.aarch64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "9Base-RHOSE-4.12:conmon-2:2.1.2-5.rhaos4.12.el9.aarch64"
},
"product_reference": "conmon-2:2.1.2-5.rhaos4.12.el9.aarch64",
"relates_to_product_reference": "9Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "conmon-2:2.1.2-5.rhaos4.12.el9.ppc64le as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "9Base-RHOSE-4.12:conmon-2:2.1.2-5.rhaos4.12.el9.ppc64le"
},
"product_reference": "conmon-2:2.1.2-5.rhaos4.12.el9.ppc64le",
"relates_to_product_reference": "9Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "conmon-2:2.1.2-5.rhaos4.12.el9.s390x as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "9Base-RHOSE-4.12:conmon-2:2.1.2-5.rhaos4.12.el9.s390x"
},
"product_reference": "conmon-2:2.1.2-5.rhaos4.12.el9.s390x",
"relates_to_product_reference": "9Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "conmon-2:2.1.2-5.rhaos4.12.el9.src as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "9Base-RHOSE-4.12:conmon-2:2.1.2-5.rhaos4.12.el9.src"
},
"product_reference": "conmon-2:2.1.2-5.rhaos4.12.el9.src",
"relates_to_product_reference": "9Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "conmon-2:2.1.2-5.rhaos4.12.el9.x86_64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "9Base-RHOSE-4.12:conmon-2:2.1.2-5.rhaos4.12.el9.x86_64"
},
"product_reference": "conmon-2:2.1.2-5.rhaos4.12.el9.x86_64",
"relates_to_product_reference": "9Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "conmon-debuginfo-2:2.1.2-5.rhaos4.12.el9.aarch64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "9Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-5.rhaos4.12.el9.aarch64"
},
"product_reference": "conmon-debuginfo-2:2.1.2-5.rhaos4.12.el9.aarch64",
"relates_to_product_reference": "9Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "conmon-debuginfo-2:2.1.2-5.rhaos4.12.el9.ppc64le as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "9Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-5.rhaos4.12.el9.ppc64le"
},
"product_reference": "conmon-debuginfo-2:2.1.2-5.rhaos4.12.el9.ppc64le",
"relates_to_product_reference": "9Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "conmon-debuginfo-2:2.1.2-5.rhaos4.12.el9.s390x as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "9Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-5.rhaos4.12.el9.s390x"
},
"product_reference": "conmon-debuginfo-2:2.1.2-5.rhaos4.12.el9.s390x",
"relates_to_product_reference": "9Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "conmon-debuginfo-2:2.1.2-5.rhaos4.12.el9.x86_64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "9Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-5.rhaos4.12.el9.x86_64"
},
"product_reference": "conmon-debuginfo-2:2.1.2-5.rhaos4.12.el9.x86_64",
"relates_to_product_reference": "9Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "conmon-debugsource-2:2.1.2-5.rhaos4.12.el9.aarch64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "9Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-5.rhaos4.12.el9.aarch64"
},
"product_reference": "conmon-debugsource-2:2.1.2-5.rhaos4.12.el9.aarch64",
"relates_to_product_reference": "9Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "conmon-debugsource-2:2.1.2-5.rhaos4.12.el9.ppc64le as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "9Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-5.rhaos4.12.el9.ppc64le"
},
"product_reference": "conmon-debugsource-2:2.1.2-5.rhaos4.12.el9.ppc64le",
"relates_to_product_reference": "9Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "conmon-debugsource-2:2.1.2-5.rhaos4.12.el9.s390x as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "9Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-5.rhaos4.12.el9.s390x"
},
"product_reference": "conmon-debugsource-2:2.1.2-5.rhaos4.12.el9.s390x",
"relates_to_product_reference": "9Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "conmon-debugsource-2:2.1.2-5.rhaos4.12.el9.x86_64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "9Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-5.rhaos4.12.el9.x86_64"
},
"product_reference": "conmon-debugsource-2:2.1.2-5.rhaos4.12.el9.x86_64",
"relates_to_product_reference": "9Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el9.src as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "9Base-RHOSE-4.12:openshift-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el9.src"
},
"product_reference": "openshift-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el9.src",
"relates_to_product_reference": "9Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.aarch64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "9Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.aarch64"
},
"product_reference": "openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.aarch64",
"relates_to_product_reference": "9Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.ppc64le as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "9Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.ppc64le"
},
"product_reference": "openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.ppc64le",
"relates_to_product_reference": "9Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.s390x as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "9Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.s390x"
},
"product_reference": "openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.s390x",
"relates_to_product_reference": "9Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.src as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "9Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.src"
},
"product_reference": "openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.src",
"relates_to_product_reference": "9Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.x86_64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "9Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.x86_64"
},
"product_reference": "openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.x86_64",
"relates_to_product_reference": "9Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-clients-redistributable-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.x86_64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "9Base-RHOSE-4.12:openshift-clients-redistributable-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.x86_64"
},
"product_reference": "openshift-clients-redistributable-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.x86_64",
"relates_to_product_reference": "9Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el9.aarch64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "9Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el9.aarch64"
},
"product_reference": "openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el9.aarch64",
"relates_to_product_reference": "9Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el9.ppc64le as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "9Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el9.ppc64le"
},
"product_reference": "openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el9.ppc64le",
"relates_to_product_reference": "9Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el9.s390x as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "9Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el9.s390x"
},
"product_reference": "openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el9.s390x",
"relates_to_product_reference": "9Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el9.x86_64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "9Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el9.x86_64"
},
"product_reference": "openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el9.x86_64",
"relates_to_product_reference": "9Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-3:4.2.0-7.rhaos4.12.el9.aarch64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "9Base-RHOSE-4.12:podman-3:4.2.0-7.rhaos4.12.el9.aarch64"
},
"product_reference": "podman-3:4.2.0-7.rhaos4.12.el9.aarch64",
"relates_to_product_reference": "9Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-3:4.2.0-7.rhaos4.12.el9.ppc64le as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "9Base-RHOSE-4.12:podman-3:4.2.0-7.rhaos4.12.el9.ppc64le"
},
"product_reference": "podman-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"relates_to_product_reference": "9Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-3:4.2.0-7.rhaos4.12.el9.s390x as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "9Base-RHOSE-4.12:podman-3:4.2.0-7.rhaos4.12.el9.s390x"
},
"product_reference": "podman-3:4.2.0-7.rhaos4.12.el9.s390x",
"relates_to_product_reference": "9Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-3:4.2.0-7.rhaos4.12.el9.src as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "9Base-RHOSE-4.12:podman-3:4.2.0-7.rhaos4.12.el9.src"
},
"product_reference": "podman-3:4.2.0-7.rhaos4.12.el9.src",
"relates_to_product_reference": "9Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-3:4.2.0-7.rhaos4.12.el9.x86_64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "9Base-RHOSE-4.12:podman-3:4.2.0-7.rhaos4.12.el9.x86_64"
},
"product_reference": "podman-3:4.2.0-7.rhaos4.12.el9.x86_64",
"relates_to_product_reference": "9Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-catatonit-3:4.2.0-7.rhaos4.12.el9.aarch64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "9Base-RHOSE-4.12:podman-catatonit-3:4.2.0-7.rhaos4.12.el9.aarch64"
},
"product_reference": "podman-catatonit-3:4.2.0-7.rhaos4.12.el9.aarch64",
"relates_to_product_reference": "9Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-catatonit-3:4.2.0-7.rhaos4.12.el9.ppc64le as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "9Base-RHOSE-4.12:podman-catatonit-3:4.2.0-7.rhaos4.12.el9.ppc64le"
},
"product_reference": "podman-catatonit-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"relates_to_product_reference": "9Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-catatonit-3:4.2.0-7.rhaos4.12.el9.s390x as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "9Base-RHOSE-4.12:podman-catatonit-3:4.2.0-7.rhaos4.12.el9.s390x"
},
"product_reference": "podman-catatonit-3:4.2.0-7.rhaos4.12.el9.s390x",
"relates_to_product_reference": "9Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-catatonit-3:4.2.0-7.rhaos4.12.el9.x86_64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "9Base-RHOSE-4.12:podman-catatonit-3:4.2.0-7.rhaos4.12.el9.x86_64"
},
"product_reference": "podman-catatonit-3:4.2.0-7.rhaos4.12.el9.x86_64",
"relates_to_product_reference": "9Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-catatonit-debuginfo-3:4.2.0-7.rhaos4.12.el9.aarch64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "9Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-7.rhaos4.12.el9.aarch64"
},
"product_reference": "podman-catatonit-debuginfo-3:4.2.0-7.rhaos4.12.el9.aarch64",
"relates_to_product_reference": "9Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-catatonit-debuginfo-3:4.2.0-7.rhaos4.12.el9.ppc64le as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "9Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-7.rhaos4.12.el9.ppc64le"
},
"product_reference": "podman-catatonit-debuginfo-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"relates_to_product_reference": "9Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-catatonit-debuginfo-3:4.2.0-7.rhaos4.12.el9.s390x as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "9Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-7.rhaos4.12.el9.s390x"
},
"product_reference": "podman-catatonit-debuginfo-3:4.2.0-7.rhaos4.12.el9.s390x",
"relates_to_product_reference": "9Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-catatonit-debuginfo-3:4.2.0-7.rhaos4.12.el9.x86_64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "9Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-7.rhaos4.12.el9.x86_64"
},
"product_reference": "podman-catatonit-debuginfo-3:4.2.0-7.rhaos4.12.el9.x86_64",
"relates_to_product_reference": "9Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-debuginfo-3:4.2.0-7.rhaos4.12.el9.aarch64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "9Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-7.rhaos4.12.el9.aarch64"
},
"product_reference": "podman-debuginfo-3:4.2.0-7.rhaos4.12.el9.aarch64",
"relates_to_product_reference": "9Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-debuginfo-3:4.2.0-7.rhaos4.12.el9.ppc64le as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "9Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-7.rhaos4.12.el9.ppc64le"
},
"product_reference": "podman-debuginfo-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"relates_to_product_reference": "9Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-debuginfo-3:4.2.0-7.rhaos4.12.el9.s390x as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "9Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-7.rhaos4.12.el9.s390x"
},
"product_reference": "podman-debuginfo-3:4.2.0-7.rhaos4.12.el9.s390x",
"relates_to_product_reference": "9Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-debuginfo-3:4.2.0-7.rhaos4.12.el9.x86_64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "9Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-7.rhaos4.12.el9.x86_64"
},
"product_reference": "podman-debuginfo-3:4.2.0-7.rhaos4.12.el9.x86_64",
"relates_to_product_reference": "9Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-debugsource-3:4.2.0-7.rhaos4.12.el9.aarch64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "9Base-RHOSE-4.12:podman-debugsource-3:4.2.0-7.rhaos4.12.el9.aarch64"
},
"product_reference": "podman-debugsource-3:4.2.0-7.rhaos4.12.el9.aarch64",
"relates_to_product_reference": "9Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-debugsource-3:4.2.0-7.rhaos4.12.el9.ppc64le as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "9Base-RHOSE-4.12:podman-debugsource-3:4.2.0-7.rhaos4.12.el9.ppc64le"
},
"product_reference": "podman-debugsource-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"relates_to_product_reference": "9Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-debugsource-3:4.2.0-7.rhaos4.12.el9.s390x as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "9Base-RHOSE-4.12:podman-debugsource-3:4.2.0-7.rhaos4.12.el9.s390x"
},
"product_reference": "podman-debugsource-3:4.2.0-7.rhaos4.12.el9.s390x",
"relates_to_product_reference": "9Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-debugsource-3:4.2.0-7.rhaos4.12.el9.x86_64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "9Base-RHOSE-4.12:podman-debugsource-3:4.2.0-7.rhaos4.12.el9.x86_64"
},
"product_reference": "podman-debugsource-3:4.2.0-7.rhaos4.12.el9.x86_64",
"relates_to_product_reference": "9Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-docker-3:4.2.0-7.rhaos4.12.el9.noarch as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "9Base-RHOSE-4.12:podman-docker-3:4.2.0-7.rhaos4.12.el9.noarch"
},
"product_reference": "podman-docker-3:4.2.0-7.rhaos4.12.el9.noarch",
"relates_to_product_reference": "9Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-gvproxy-3:4.2.0-7.rhaos4.12.el9.aarch64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "9Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-7.rhaos4.12.el9.aarch64"
},
"product_reference": "podman-gvproxy-3:4.2.0-7.rhaos4.12.el9.aarch64",
"relates_to_product_reference": "9Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-gvproxy-3:4.2.0-7.rhaos4.12.el9.ppc64le as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "9Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-7.rhaos4.12.el9.ppc64le"
},
"product_reference": "podman-gvproxy-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"relates_to_product_reference": "9Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-gvproxy-3:4.2.0-7.rhaos4.12.el9.s390x as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "9Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-7.rhaos4.12.el9.s390x"
},
"product_reference": "podman-gvproxy-3:4.2.0-7.rhaos4.12.el9.s390x",
"relates_to_product_reference": "9Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-gvproxy-3:4.2.0-7.rhaos4.12.el9.x86_64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "9Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-7.rhaos4.12.el9.x86_64"
},
"product_reference": "podman-gvproxy-3:4.2.0-7.rhaos4.12.el9.x86_64",
"relates_to_product_reference": "9Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-gvproxy-debuginfo-3:4.2.0-7.rhaos4.12.el9.aarch64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "9Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-7.rhaos4.12.el9.aarch64"
},
"product_reference": "podman-gvproxy-debuginfo-3:4.2.0-7.rhaos4.12.el9.aarch64",
"relates_to_product_reference": "9Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-gvproxy-debuginfo-3:4.2.0-7.rhaos4.12.el9.ppc64le as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "9Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-7.rhaos4.12.el9.ppc64le"
},
"product_reference": "podman-gvproxy-debuginfo-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"relates_to_product_reference": "9Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-gvproxy-debuginfo-3:4.2.0-7.rhaos4.12.el9.s390x as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "9Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-7.rhaos4.12.el9.s390x"
},
"product_reference": "podman-gvproxy-debuginfo-3:4.2.0-7.rhaos4.12.el9.s390x",
"relates_to_product_reference": "9Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-gvproxy-debuginfo-3:4.2.0-7.rhaos4.12.el9.x86_64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "9Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-7.rhaos4.12.el9.x86_64"
},
"product_reference": "podman-gvproxy-debuginfo-3:4.2.0-7.rhaos4.12.el9.x86_64",
"relates_to_product_reference": "9Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-plugins-3:4.2.0-7.rhaos4.12.el9.aarch64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "9Base-RHOSE-4.12:podman-plugins-3:4.2.0-7.rhaos4.12.el9.aarch64"
},
"product_reference": "podman-plugins-3:4.2.0-7.rhaos4.12.el9.aarch64",
"relates_to_product_reference": "9Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-plugins-3:4.2.0-7.rhaos4.12.el9.ppc64le as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "9Base-RHOSE-4.12:podman-plugins-3:4.2.0-7.rhaos4.12.el9.ppc64le"
},
"product_reference": "podman-plugins-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"relates_to_product_reference": "9Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-plugins-3:4.2.0-7.rhaos4.12.el9.s390x as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "9Base-RHOSE-4.12:podman-plugins-3:4.2.0-7.rhaos4.12.el9.s390x"
},
"product_reference": "podman-plugins-3:4.2.0-7.rhaos4.12.el9.s390x",
"relates_to_product_reference": "9Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-plugins-3:4.2.0-7.rhaos4.12.el9.x86_64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "9Base-RHOSE-4.12:podman-plugins-3:4.2.0-7.rhaos4.12.el9.x86_64"
},
"product_reference": "podman-plugins-3:4.2.0-7.rhaos4.12.el9.x86_64",
"relates_to_product_reference": "9Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-plugins-debuginfo-3:4.2.0-7.rhaos4.12.el9.aarch64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "9Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-7.rhaos4.12.el9.aarch64"
},
"product_reference": "podman-plugins-debuginfo-3:4.2.0-7.rhaos4.12.el9.aarch64",
"relates_to_product_reference": "9Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-plugins-debuginfo-3:4.2.0-7.rhaos4.12.el9.ppc64le as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "9Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-7.rhaos4.12.el9.ppc64le"
},
"product_reference": "podman-plugins-debuginfo-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"relates_to_product_reference": "9Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-plugins-debuginfo-3:4.2.0-7.rhaos4.12.el9.s390x as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "9Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-7.rhaos4.12.el9.s390x"
},
"product_reference": "podman-plugins-debuginfo-3:4.2.0-7.rhaos4.12.el9.s390x",
"relates_to_product_reference": "9Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-plugins-debuginfo-3:4.2.0-7.rhaos4.12.el9.x86_64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "9Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-7.rhaos4.12.el9.x86_64"
},
"product_reference": "podman-plugins-debuginfo-3:4.2.0-7.rhaos4.12.el9.x86_64",
"relates_to_product_reference": "9Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-remote-3:4.2.0-7.rhaos4.12.el9.aarch64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "9Base-RHOSE-4.12:podman-remote-3:4.2.0-7.rhaos4.12.el9.aarch64"
},
"product_reference": "podman-remote-3:4.2.0-7.rhaos4.12.el9.aarch64",
"relates_to_product_reference": "9Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-remote-3:4.2.0-7.rhaos4.12.el9.ppc64le as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "9Base-RHOSE-4.12:podman-remote-3:4.2.0-7.rhaos4.12.el9.ppc64le"
},
"product_reference": "podman-remote-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"relates_to_product_reference": "9Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-remote-3:4.2.0-7.rhaos4.12.el9.s390x as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "9Base-RHOSE-4.12:podman-remote-3:4.2.0-7.rhaos4.12.el9.s390x"
},
"product_reference": "podman-remote-3:4.2.0-7.rhaos4.12.el9.s390x",
"relates_to_product_reference": "9Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-remote-3:4.2.0-7.rhaos4.12.el9.x86_64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "9Base-RHOSE-4.12:podman-remote-3:4.2.0-7.rhaos4.12.el9.x86_64"
},
"product_reference": "podman-remote-3:4.2.0-7.rhaos4.12.el9.x86_64",
"relates_to_product_reference": "9Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-remote-debuginfo-3:4.2.0-7.rhaos4.12.el9.aarch64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "9Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-7.rhaos4.12.el9.aarch64"
},
"product_reference": "podman-remote-debuginfo-3:4.2.0-7.rhaos4.12.el9.aarch64",
"relates_to_product_reference": "9Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-remote-debuginfo-3:4.2.0-7.rhaos4.12.el9.ppc64le as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "9Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-7.rhaos4.12.el9.ppc64le"
},
"product_reference": "podman-remote-debuginfo-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"relates_to_product_reference": "9Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-remote-debuginfo-3:4.2.0-7.rhaos4.12.el9.s390x as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "9Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-7.rhaos4.12.el9.s390x"
},
"product_reference": "podman-remote-debuginfo-3:4.2.0-7.rhaos4.12.el9.s390x",
"relates_to_product_reference": "9Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-remote-debuginfo-3:4.2.0-7.rhaos4.12.el9.x86_64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "9Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-7.rhaos4.12.el9.x86_64"
},
"product_reference": "podman-remote-debuginfo-3:4.2.0-7.rhaos4.12.el9.x86_64",
"relates_to_product_reference": "9Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-tests-3:4.2.0-7.rhaos4.12.el9.aarch64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "9Base-RHOSE-4.12:podman-tests-3:4.2.0-7.rhaos4.12.el9.aarch64"
},
"product_reference": "podman-tests-3:4.2.0-7.rhaos4.12.el9.aarch64",
"relates_to_product_reference": "9Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-tests-3:4.2.0-7.rhaos4.12.el9.ppc64le as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "9Base-RHOSE-4.12:podman-tests-3:4.2.0-7.rhaos4.12.el9.ppc64le"
},
"product_reference": "podman-tests-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"relates_to_product_reference": "9Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-tests-3:4.2.0-7.rhaos4.12.el9.s390x as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "9Base-RHOSE-4.12:podman-tests-3:4.2.0-7.rhaos4.12.el9.s390x"
},
"product_reference": "podman-tests-3:4.2.0-7.rhaos4.12.el9.s390x",
"relates_to_product_reference": "9Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-tests-3:4.2.0-7.rhaos4.12.el9.x86_64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "9Base-RHOSE-4.12:podman-tests-3:4.2.0-7.rhaos4.12.el9.x86_64"
},
"product_reference": "podman-tests-3:4.2.0-7.rhaos4.12.el9.x86_64",
"relates_to_product_reference": "9Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "skopeo-2:1.9.4-3.rhaos4.12.el9.aarch64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "9Base-RHOSE-4.12:skopeo-2:1.9.4-3.rhaos4.12.el9.aarch64"
},
"product_reference": "skopeo-2:1.9.4-3.rhaos4.12.el9.aarch64",
"relates_to_product_reference": "9Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "skopeo-2:1.9.4-3.rhaos4.12.el9.ppc64le as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "9Base-RHOSE-4.12:skopeo-2:1.9.4-3.rhaos4.12.el9.ppc64le"
},
"product_reference": "skopeo-2:1.9.4-3.rhaos4.12.el9.ppc64le",
"relates_to_product_reference": "9Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "skopeo-2:1.9.4-3.rhaos4.12.el9.s390x as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "9Base-RHOSE-4.12:skopeo-2:1.9.4-3.rhaos4.12.el9.s390x"
},
"product_reference": "skopeo-2:1.9.4-3.rhaos4.12.el9.s390x",
"relates_to_product_reference": "9Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "skopeo-2:1.9.4-3.rhaos4.12.el9.src as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "9Base-RHOSE-4.12:skopeo-2:1.9.4-3.rhaos4.12.el9.src"
},
"product_reference": "skopeo-2:1.9.4-3.rhaos4.12.el9.src",
"relates_to_product_reference": "9Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "skopeo-2:1.9.4-3.rhaos4.12.el9.x86_64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "9Base-RHOSE-4.12:skopeo-2:1.9.4-3.rhaos4.12.el9.x86_64"
},
"product_reference": "skopeo-2:1.9.4-3.rhaos4.12.el9.x86_64",
"relates_to_product_reference": "9Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "skopeo-debuginfo-2:1.9.4-3.rhaos4.12.el9.aarch64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "9Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.rhaos4.12.el9.aarch64"
},
"product_reference": "skopeo-debuginfo-2:1.9.4-3.rhaos4.12.el9.aarch64",
"relates_to_product_reference": "9Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "skopeo-debuginfo-2:1.9.4-3.rhaos4.12.el9.ppc64le as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "9Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.rhaos4.12.el9.ppc64le"
},
"product_reference": "skopeo-debuginfo-2:1.9.4-3.rhaos4.12.el9.ppc64le",
"relates_to_product_reference": "9Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "skopeo-debuginfo-2:1.9.4-3.rhaos4.12.el9.s390x as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "9Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.rhaos4.12.el9.s390x"
},
"product_reference": "skopeo-debuginfo-2:1.9.4-3.rhaos4.12.el9.s390x",
"relates_to_product_reference": "9Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "skopeo-debuginfo-2:1.9.4-3.rhaos4.12.el9.x86_64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "9Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.rhaos4.12.el9.x86_64"
},
"product_reference": "skopeo-debuginfo-2:1.9.4-3.rhaos4.12.el9.x86_64",
"relates_to_product_reference": "9Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "skopeo-debugsource-2:1.9.4-3.rhaos4.12.el9.aarch64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "9Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.rhaos4.12.el9.aarch64"
},
"product_reference": "skopeo-debugsource-2:1.9.4-3.rhaos4.12.el9.aarch64",
"relates_to_product_reference": "9Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "skopeo-debugsource-2:1.9.4-3.rhaos4.12.el9.ppc64le as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "9Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.rhaos4.12.el9.ppc64le"
},
"product_reference": "skopeo-debugsource-2:1.9.4-3.rhaos4.12.el9.ppc64le",
"relates_to_product_reference": "9Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "skopeo-debugsource-2:1.9.4-3.rhaos4.12.el9.s390x as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "9Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.rhaos4.12.el9.s390x"
},
"product_reference": "skopeo-debugsource-2:1.9.4-3.rhaos4.12.el9.s390x",
"relates_to_product_reference": "9Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "skopeo-debugsource-2:1.9.4-3.rhaos4.12.el9.x86_64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "9Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.rhaos4.12.el9.x86_64"
},
"product_reference": "skopeo-debugsource-2:1.9.4-3.rhaos4.12.el9.x86_64",
"relates_to_product_reference": "9Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "skopeo-tests-2:1.9.4-3.rhaos4.12.el9.aarch64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "9Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.rhaos4.12.el9.aarch64"
},
"product_reference": "skopeo-tests-2:1.9.4-3.rhaos4.12.el9.aarch64",
"relates_to_product_reference": "9Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "skopeo-tests-2:1.9.4-3.rhaos4.12.el9.ppc64le as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "9Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.rhaos4.12.el9.ppc64le"
},
"product_reference": "skopeo-tests-2:1.9.4-3.rhaos4.12.el9.ppc64le",
"relates_to_product_reference": "9Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "skopeo-tests-2:1.9.4-3.rhaos4.12.el9.s390x as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "9Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.rhaos4.12.el9.s390x"
},
"product_reference": "skopeo-tests-2:1.9.4-3.rhaos4.12.el9.s390x",
"relates_to_product_reference": "9Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "skopeo-tests-2:1.9.4-3.rhaos4.12.el9.x86_64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "9Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.rhaos4.12.el9.x86_64"
},
"product_reference": "skopeo-tests-2:1.9.4-3.rhaos4.12.el9.x86_64",
"relates_to_product_reference": "9Base-RHOSE-4.12"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Adam Korczynski"
],
"organization": "ADA Logics"
},
{
"names": [
"OSS-Fuzz"
]
}
],
"cve": "CVE-2022-2879",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"discovery_date": "2022-10-07T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-RHOSE-4.12:bpftool-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:bpftool-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:bpftool-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:bpftool-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:bpftool-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:bpftool-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:bpftool-debuginfo-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:bpftool-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:buildah-1:1.23.4-5.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:buildah-1:1.23.4-5.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:buildah-1:1.23.4-5.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:buildah-1:1.23.4-5.1.rhaos4.12.el8.src",
"8Base-RHOSE-4.12:buildah-1:1.23.4-5.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:containernetworking-plugins-0:1.0.1-7.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:containernetworking-plugins-0:1.0.1-7.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:containernetworking-plugins-0:1.0.1-7.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:containernetworking-plugins-0:1.0.1-7.rhaos4.12.el8.src",
"8Base-RHOSE-4.12:containernetworking-plugins-0:1.0.1-7.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:containernetworking-plugins-debuginfo-0:1.0.1-7.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:containernetworking-plugins-debuginfo-0:1.0.1-7.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:containernetworking-plugins-debuginfo-0:1.0.1-7.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:containernetworking-plugins-debuginfo-0:1.0.1-7.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:containernetworking-plugins-debugsource-0:1.0.1-7.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:containernetworking-plugins-debugsource-0:1.0.1-7.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:containernetworking-plugins-debugsource-0:1.0.1-7.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:containernetworking-plugins-debugsource-0:1.0.1-7.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:kernel-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-0:4.18.0-372.59.1.el8_6.src",
"8Base-RHOSE-4.12:kernel-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-core-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-core-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-core-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-core-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-cross-headers-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-cross-headers-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-cross-headers-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-cross-headers-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-debug-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-debug-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-debug-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-debug-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-debug-core-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-debug-core-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-debug-core-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-debug-core-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-debug-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-debug-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-debug-debuginfo-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-debug-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-debug-devel-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-debug-devel-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-debug-devel-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-debug-devel-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-debug-modules-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-debug-modules-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-debug-modules-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-debug-modules-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-debug-modules-extra-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-debug-modules-extra-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-debug-modules-extra-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-debug-modules-extra-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-debug-modules-internal-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-debug-modules-internal-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-debug-modules-internal-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-debug-modules-internal-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-debuginfo-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-debuginfo-common-aarch64-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-debuginfo-common-ppc64le-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-debuginfo-common-s390x-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-debuginfo-common-x86_64-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-devel-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-devel-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-devel-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-devel-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-doc-0:4.18.0-372.59.1.el8_6.noarch",
"8Base-RHOSE-4.12:kernel-headers-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-headers-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-headers-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-headers-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-ipaclones-internal-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-ipaclones-internal-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-modules-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-modules-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-modules-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-modules-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-modules-extra-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-modules-extra-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-modules-extra-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-modules-extra-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-modules-internal-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-modules-internal-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-modules-internal-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-modules-internal-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-0:4.18.0-372.59.1.rt7.217.el8_6.src",
"8Base-RHOSE-4.12:kernel-rt-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-core-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debug-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debug-core-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debug-debuginfo-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debug-devel-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debug-kvm-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debug-modules-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debug-modules-extra-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debug-modules-internal-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debuginfo-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-devel-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-kvm-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-modules-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-modules-extra-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-modules-internal-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-selftests-internal-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-selftests-internal-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-selftests-internal-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-selftests-internal-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-selftests-internal-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-tools-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-tools-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-tools-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-tools-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-tools-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-tools-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-tools-debuginfo-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-tools-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-tools-libs-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-tools-libs-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-tools-libs-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-tools-libs-devel-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-tools-libs-devel-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-tools-libs-devel-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-zfcpdump-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-zfcpdump-core-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-zfcpdump-debuginfo-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-zfcpdump-devel-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-zfcpdump-modules-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-zfcpdump-modules-extra-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-zfcpdump-modules-internal-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:openshift-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el8.src",
"8Base-RHOSE-4.12:openshift-ansible-0:4.12.0-202306090942.p0.g74dc7b3.assembly.stream.el8.noarch",
"8Base-RHOSE-4.12:openshift-ansible-0:4.12.0-202306090942.p0.g74dc7b3.assembly.stream.el8.src",
"8Base-RHOSE-4.12:openshift-ansible-test-0:4.12.0-202306090942.p0.g74dc7b3.assembly.stream.el8.noarch",
"8Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.aarch64",
"8Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.ppc64le",
"8Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.s390x",
"8Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.src",
"8Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.x86_64",
"8Base-RHOSE-4.12:openshift-clients-redistributable-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.x86_64",
"8Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el8.aarch64",
"8Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el8.ppc64le",
"8Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el8.s390x",
"8Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el8.x86_64",
"8Base-RHOSE-4.12:openshift-kuryr-0:4.12.0-202306140156.p0.g31dd228.assembly.stream.el8.src",
"8Base-RHOSE-4.12:openshift-kuryr-cni-0:4.12.0-202306140156.p0.g31dd228.assembly.stream.el8.noarch",
"8Base-RHOSE-4.12:openshift-kuryr-common-0:4.12.0-202306140156.p0.g31dd228.assembly.stream.el8.noarch",
"8Base-RHOSE-4.12:openshift-kuryr-controller-0:4.12.0-202306140156.p0.g31dd228.assembly.stream.el8.noarch",
"8Base-RHOSE-4.12:openshift4-aws-iso-0:4.12.0-202306090942.p0.gd2acdd5.assembly.stream.el8.noarch",
"8Base-RHOSE-4.12:openshift4-aws-iso-0:4.12.0-202306090942.p0.gd2acdd5.assembly.stream.el8.src",
"8Base-RHOSE-4.12:perf-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:perf-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:perf-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:perf-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:perf-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:perf-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:perf-debuginfo-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:perf-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:python3-kuryr-kubernetes-0:4.12.0-202306140156.p0.g31dd228.assembly.stream.el8.noarch",
"8Base-RHOSE-4.12:python3-perf-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:python3-perf-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:python3-perf-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:python3-perf-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:python3-perf-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:python3-perf-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:python3-perf-debuginfo-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:python3-perf-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:runc-3:1.1.6-4.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:runc-3:1.1.6-4.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:runc-3:1.1.6-4.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:runc-3:1.1.6-4.rhaos4.12.el8.src",
"8Base-RHOSE-4.12:runc-3:1.1.6-4.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:runc-debuginfo-3:1.1.6-4.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:runc-debuginfo-3:1.1.6-4.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:runc-debuginfo-3:1.1.6-4.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:runc-debuginfo-3:1.1.6-4.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:runc-debugsource-3:1.1.6-4.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:runc-debugsource-3:1.1.6-4.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:runc-debugsource-3:1.1.6-4.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:runc-debugsource-3:1.1.6-4.rhaos4.12.el8.x86_64",
"9Base-RHOSE-4.12:buildah-1:1.23.4-5.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:buildah-1:1.23.4-5.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:buildah-1:1.23.4-5.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:buildah-1:1.23.4-5.rhaos4.12.el9.src",
"9Base-RHOSE-4.12:buildah-1:1.23.4-5.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:openshift-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el9.src",
"9Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.aarch64",
"9Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.ppc64le",
"9Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.s390x",
"9Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.src",
"9Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.x86_64",
"9Base-RHOSE-4.12:openshift-clients-redistributable-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.x86_64",
"9Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el9.aarch64",
"9Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el9.ppc64le",
"9Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el9.s390x",
"9Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el9.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2132867"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the golang package, where Reader.Read does not set a limit on the maximum size of file headers. After fixing, Reader.Read limits the maximum size of header blocks to 1 MiB. This flaw allows a maliciously crafted archive to cause Read to allocate unbounded amounts of memory, potentially causing resource exhaustion or panic.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: archive/tar: github.com/vbatts/tar-split: unbounded memory consumption when reading headers",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The opportunity for a Denial of Service is limited to the golang runtime. In the case of OpenShift Container Platform, this would be restricted within each individual container. There are multiple layers of guide rails (Golang\u2019s Garbage Collector; OpenShift\u2019s resource constraints imposed at the container and cluster levels) which would require a malicious user to continue submitting attacks for there to be any enduring impact. They would also need access to external server resources to be able to send a massive volume of requests to cause a significant impact on server operations.\n\n\nThis flaw additionally affects the github.com/vbatts/tar-split library and was fixed in v0.12.1.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-RHOSE-4.12:conmon-2:2.1.2-4.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:conmon-2:2.1.2-4.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:conmon-2:2.1.2-4.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:conmon-2:2.1.2-4.rhaos4.12.el8.src",
"8Base-RHOSE-4.12:conmon-2:2.1.2-4.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-4.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-4.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-4.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-4.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-4.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-4.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-4.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-4.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-3:4.2.0-6.1.rhaos4.12.el8.src",
"8Base-RHOSE-4.12:podman-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-catatonit-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-catatonit-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-catatonit-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-catatonit-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-debugsource-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-debugsource-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-debugsource-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-debugsource-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-docker-3:4.2.0-6.1.rhaos4.12.el8.noarch",
"8Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-plugins-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-plugins-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-plugins-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-plugins-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-remote-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-remote-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-remote-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-remote-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-tests-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-tests-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-tests-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-tests-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:skopeo-2:1.9.4-3.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:skopeo-2:1.9.4-3.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:skopeo-2:1.9.4-3.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:skopeo-2:1.9.4-3.1.rhaos4.12.el8.src",
"8Base-RHOSE-4.12:skopeo-2:1.9.4-3.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.1.rhaos4.12.el8.x86_64",
"9Base-RHOSE-4.12:conmon-2:2.1.2-5.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:conmon-2:2.1.2-5.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:conmon-2:2.1.2-5.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:conmon-2:2.1.2-5.rhaos4.12.el9.src",
"9Base-RHOSE-4.12:conmon-2:2.1.2-5.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-5.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-5.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-5.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-5.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-5.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-5.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-5.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-5.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-3:4.2.0-7.rhaos4.12.el9.src",
"9Base-RHOSE-4.12:podman-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-catatonit-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-catatonit-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-catatonit-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-catatonit-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-debugsource-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-debugsource-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-debugsource-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-debugsource-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-docker-3:4.2.0-7.rhaos4.12.el9.noarch",
"9Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-plugins-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-plugins-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-plugins-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-plugins-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-remote-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-remote-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-remote-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-remote-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-tests-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-tests-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-tests-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-tests-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:skopeo-2:1.9.4-3.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:skopeo-2:1.9.4-3.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:skopeo-2:1.9.4-3.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:skopeo-2:1.9.4-3.rhaos4.12.el9.src",
"9Base-RHOSE-4.12:skopeo-2:1.9.4-3.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.rhaos4.12.el9.x86_64"
],
"known_not_affected": [
"8Base-RHOSE-4.12:bpftool-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:bpftool-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:bpftool-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:bpftool-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:bpftool-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:bpftool-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:bpftool-debuginfo-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:bpftool-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:buildah-1:1.23.4-5.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:buildah-1:1.23.4-5.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:buildah-1:1.23.4-5.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:buildah-1:1.23.4-5.1.rhaos4.12.el8.src",
"8Base-RHOSE-4.12:buildah-1:1.23.4-5.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:containernetworking-plugins-0:1.0.1-7.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:containernetworking-plugins-0:1.0.1-7.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:containernetworking-plugins-0:1.0.1-7.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:containernetworking-plugins-0:1.0.1-7.rhaos4.12.el8.src",
"8Base-RHOSE-4.12:containernetworking-plugins-0:1.0.1-7.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:containernetworking-plugins-debuginfo-0:1.0.1-7.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:containernetworking-plugins-debuginfo-0:1.0.1-7.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:containernetworking-plugins-debuginfo-0:1.0.1-7.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:containernetworking-plugins-debuginfo-0:1.0.1-7.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:containernetworking-plugins-debugsource-0:1.0.1-7.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:containernetworking-plugins-debugsource-0:1.0.1-7.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:containernetworking-plugins-debugsource-0:1.0.1-7.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:containernetworking-plugins-debugsource-0:1.0.1-7.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:kernel-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-0:4.18.0-372.59.1.el8_6.src",
"8Base-RHOSE-4.12:kernel-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-core-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-core-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-core-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-core-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-cross-headers-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-cross-headers-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-cross-headers-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-cross-headers-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-debug-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-debug-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-debug-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-debug-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-debug-core-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-debug-core-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-debug-core-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-debug-core-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-debug-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-debug-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-debug-debuginfo-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-debug-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-debug-devel-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-debug-devel-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-debug-devel-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-debug-devel-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-debug-modules-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-debug-modules-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-debug-modules-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-debug-modules-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-debug-modules-extra-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-debug-modules-extra-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-debug-modules-extra-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-debug-modules-extra-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-debug-modules-internal-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-debug-modules-internal-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-debug-modules-internal-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-debug-modules-internal-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-debuginfo-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-debuginfo-common-aarch64-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-debuginfo-common-ppc64le-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-debuginfo-common-s390x-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-debuginfo-common-x86_64-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-devel-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-devel-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-devel-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-devel-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-doc-0:4.18.0-372.59.1.el8_6.noarch",
"8Base-RHOSE-4.12:kernel-headers-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-headers-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-headers-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-headers-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-ipaclones-internal-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-ipaclones-internal-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-modules-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-modules-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-modules-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-modules-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-modules-extra-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-modules-extra-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-modules-extra-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-modules-extra-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-modules-internal-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-modules-internal-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-modules-internal-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-modules-internal-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-0:4.18.0-372.59.1.rt7.217.el8_6.src",
"8Base-RHOSE-4.12:kernel-rt-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-core-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debug-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debug-core-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debug-debuginfo-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debug-devel-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debug-kvm-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debug-modules-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debug-modules-extra-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debug-modules-internal-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debuginfo-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-devel-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-kvm-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-modules-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-modules-extra-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-modules-internal-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-selftests-internal-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-selftests-internal-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-selftests-internal-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-selftests-internal-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-selftests-internal-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-tools-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-tools-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-tools-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-tools-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-tools-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-tools-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-tools-debuginfo-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-tools-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-tools-libs-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-tools-libs-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-tools-libs-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-tools-libs-devel-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-tools-libs-devel-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-tools-libs-devel-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-zfcpdump-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-zfcpdump-core-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-zfcpdump-debuginfo-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-zfcpdump-devel-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-zfcpdump-modules-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-zfcpdump-modules-extra-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-zfcpdump-modules-internal-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:openshift-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el8.src",
"8Base-RHOSE-4.12:openshift-ansible-0:4.12.0-202306090942.p0.g74dc7b3.assembly.stream.el8.noarch",
"8Base-RHOSE-4.12:openshift-ansible-0:4.12.0-202306090942.p0.g74dc7b3.assembly.stream.el8.src",
"8Base-RHOSE-4.12:openshift-ansible-test-0:4.12.0-202306090942.p0.g74dc7b3.assembly.stream.el8.noarch",
"8Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.aarch64",
"8Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.ppc64le",
"8Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.s390x",
"8Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.src",
"8Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.x86_64",
"8Base-RHOSE-4.12:openshift-clients-redistributable-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.x86_64",
"8Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el8.aarch64",
"8Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el8.ppc64le",
"8Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el8.s390x",
"8Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el8.x86_64",
"8Base-RHOSE-4.12:openshift-kuryr-0:4.12.0-202306140156.p0.g31dd228.assembly.stream.el8.src",
"8Base-RHOSE-4.12:openshift-kuryr-cni-0:4.12.0-202306140156.p0.g31dd228.assembly.stream.el8.noarch",
"8Base-RHOSE-4.12:openshift-kuryr-common-0:4.12.0-202306140156.p0.g31dd228.assembly.stream.el8.noarch",
"8Base-RHOSE-4.12:openshift-kuryr-controller-0:4.12.0-202306140156.p0.g31dd228.assembly.stream.el8.noarch",
"8Base-RHOSE-4.12:openshift4-aws-iso-0:4.12.0-202306090942.p0.gd2acdd5.assembly.stream.el8.noarch",
"8Base-RHOSE-4.12:openshift4-aws-iso-0:4.12.0-202306090942.p0.gd2acdd5.assembly.stream.el8.src",
"8Base-RHOSE-4.12:perf-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:perf-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:perf-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:perf-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:perf-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:perf-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:perf-debuginfo-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:perf-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:python3-kuryr-kubernetes-0:4.12.0-202306140156.p0.g31dd228.assembly.stream.el8.noarch",
"8Base-RHOSE-4.12:python3-perf-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:python3-perf-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:python3-perf-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:python3-perf-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:python3-perf-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:python3-perf-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:python3-perf-debuginfo-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:python3-perf-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:runc-3:1.1.6-4.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:runc-3:1.1.6-4.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:runc-3:1.1.6-4.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:runc-3:1.1.6-4.rhaos4.12.el8.src",
"8Base-RHOSE-4.12:runc-3:1.1.6-4.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:runc-debuginfo-3:1.1.6-4.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:runc-debuginfo-3:1.1.6-4.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:runc-debuginfo-3:1.1.6-4.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:runc-debuginfo-3:1.1.6-4.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:runc-debugsource-3:1.1.6-4.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:runc-debugsource-3:1.1.6-4.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:runc-debugsource-3:1.1.6-4.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:runc-debugsource-3:1.1.6-4.rhaos4.12.el8.x86_64",
"9Base-RHOSE-4.12:buildah-1:1.23.4-5.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:buildah-1:1.23.4-5.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:buildah-1:1.23.4-5.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:buildah-1:1.23.4-5.rhaos4.12.el9.src",
"9Base-RHOSE-4.12:buildah-1:1.23.4-5.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:openshift-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el9.src",
"9Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.aarch64",
"9Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.ppc64le",
"9Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.s390x",
"9Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.src",
"9Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.x86_64",
"9Base-RHOSE-4.12:openshift-clients-redistributable-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.x86_64",
"9Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el9.aarch64",
"9Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el9.ppc64le",
"9Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el9.s390x",
"9Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-2879"
},
{
"category": "external",
"summary": "RHBZ#2132867",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2132867"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-2879",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2879"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-2879",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-2879"
},
{
"category": "external",
"summary": "https://github.com/golang/go/issues/54853",
"url": "https://github.com/golang/go/issues/54853"
},
{
"category": "external",
"summary": "https://github.com/vbatts/tar-split/releases/tag/v0.12.1",
"url": "https://github.com/vbatts/tar-split/releases/tag/v0.12.1"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/xtuG5faxtaU?pli=1",
"url": "https://groups.google.com/g/golang-announce/c/xtuG5faxtaU?pli=1"
}
],
"release_date": "2022-10-04T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-06-26T01:19:15+00:00",
"details": "For OpenShift Container Platform 4.12 see the following documentation, which will be updated shortly for this release, for important instructions on how to upgrade your cluster and fully apply this asynchronous errata update:\n\nhttps://docs.openshift.com/container-platform/4.12/release_notes/ocp-4-12-release-notes.html",
"product_ids": [
"8Base-RHOSE-4.12:conmon-2:2.1.2-4.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:conmon-2:2.1.2-4.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:conmon-2:2.1.2-4.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:conmon-2:2.1.2-4.rhaos4.12.el8.src",
"8Base-RHOSE-4.12:conmon-2:2.1.2-4.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-4.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-4.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-4.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-4.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-4.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-4.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-4.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-4.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-3:4.2.0-6.1.rhaos4.12.el8.src",
"8Base-RHOSE-4.12:podman-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-catatonit-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-catatonit-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-catatonit-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-catatonit-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-debugsource-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-debugsource-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-debugsource-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-debugsource-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-docker-3:4.2.0-6.1.rhaos4.12.el8.noarch",
"8Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-plugins-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-plugins-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-plugins-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-plugins-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-remote-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-remote-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-remote-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-remote-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-tests-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-tests-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-tests-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-tests-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:skopeo-2:1.9.4-3.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:skopeo-2:1.9.4-3.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:skopeo-2:1.9.4-3.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:skopeo-2:1.9.4-3.1.rhaos4.12.el8.src",
"8Base-RHOSE-4.12:skopeo-2:1.9.4-3.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.1.rhaos4.12.el8.x86_64",
"9Base-RHOSE-4.12:conmon-2:2.1.2-5.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:conmon-2:2.1.2-5.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:conmon-2:2.1.2-5.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:conmon-2:2.1.2-5.rhaos4.12.el9.src",
"9Base-RHOSE-4.12:conmon-2:2.1.2-5.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-5.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-5.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-5.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-5.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-5.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-5.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-5.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-5.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-3:4.2.0-7.rhaos4.12.el9.src",
"9Base-RHOSE-4.12:podman-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-catatonit-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-catatonit-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-catatonit-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-catatonit-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-debugsource-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-debugsource-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-debugsource-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-debugsource-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-docker-3:4.2.0-7.rhaos4.12.el9.noarch",
"9Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-plugins-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-plugins-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-plugins-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-plugins-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-remote-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-remote-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-remote-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-remote-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-tests-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-tests-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-tests-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-tests-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:skopeo-2:1.9.4-3.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:skopeo-2:1.9.4-3.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:skopeo-2:1.9.4-3.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:skopeo-2:1.9.4-3.rhaos4.12.el9.src",
"9Base-RHOSE-4.12:skopeo-2:1.9.4-3.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.rhaos4.12.el9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:3613"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"8Base-RHOSE-4.12:bpftool-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:bpftool-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:bpftool-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:bpftool-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:bpftool-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:bpftool-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:bpftool-debuginfo-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:bpftool-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:buildah-1:1.23.4-5.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:buildah-1:1.23.4-5.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:buildah-1:1.23.4-5.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:buildah-1:1.23.4-5.1.rhaos4.12.el8.src",
"8Base-RHOSE-4.12:buildah-1:1.23.4-5.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:conmon-2:2.1.2-4.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:conmon-2:2.1.2-4.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:conmon-2:2.1.2-4.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:conmon-2:2.1.2-4.rhaos4.12.el8.src",
"8Base-RHOSE-4.12:conmon-2:2.1.2-4.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-4.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-4.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-4.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-4.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-4.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-4.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-4.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-4.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:containernetworking-plugins-0:1.0.1-7.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:containernetworking-plugins-0:1.0.1-7.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:containernetworking-plugins-0:1.0.1-7.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:containernetworking-plugins-0:1.0.1-7.rhaos4.12.el8.src",
"8Base-RHOSE-4.12:containernetworking-plugins-0:1.0.1-7.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:containernetworking-plugins-debuginfo-0:1.0.1-7.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:containernetworking-plugins-debuginfo-0:1.0.1-7.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:containernetworking-plugins-debuginfo-0:1.0.1-7.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:containernetworking-plugins-debuginfo-0:1.0.1-7.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:containernetworking-plugins-debugsource-0:1.0.1-7.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:containernetworking-plugins-debugsource-0:1.0.1-7.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:containernetworking-plugins-debugsource-0:1.0.1-7.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:containernetworking-plugins-debugsource-0:1.0.1-7.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:kernel-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-0:4.18.0-372.59.1.el8_6.src",
"8Base-RHOSE-4.12:kernel-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-core-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-core-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-core-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-core-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-cross-headers-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-cross-headers-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-cross-headers-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-cross-headers-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-debug-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-debug-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-debug-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-debug-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-debug-core-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-debug-core-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-debug-core-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-debug-core-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-debug-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-debug-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-debug-debuginfo-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-debug-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-debug-devel-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-debug-devel-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-debug-devel-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-debug-devel-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-debug-modules-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-debug-modules-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-debug-modules-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-debug-modules-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-debug-modules-extra-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-debug-modules-extra-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-debug-modules-extra-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-debug-modules-extra-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-debug-modules-internal-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-debug-modules-internal-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-debug-modules-internal-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-debug-modules-internal-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-debuginfo-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-debuginfo-common-aarch64-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-debuginfo-common-ppc64le-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-debuginfo-common-s390x-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-debuginfo-common-x86_64-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-devel-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-devel-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-devel-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-devel-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-doc-0:4.18.0-372.59.1.el8_6.noarch",
"8Base-RHOSE-4.12:kernel-headers-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-headers-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-headers-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-headers-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-ipaclones-internal-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-ipaclones-internal-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-modules-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-modules-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-modules-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-modules-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-modules-extra-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-modules-extra-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-modules-extra-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-modules-extra-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-modules-internal-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-modules-internal-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-modules-internal-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-modules-internal-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-0:4.18.0-372.59.1.rt7.217.el8_6.src",
"8Base-RHOSE-4.12:kernel-rt-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-core-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debug-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debug-core-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debug-debuginfo-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debug-devel-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debug-kvm-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debug-modules-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debug-modules-extra-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debug-modules-internal-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debuginfo-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-devel-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-kvm-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-modules-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-modules-extra-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-modules-internal-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-selftests-internal-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-selftests-internal-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-selftests-internal-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-selftests-internal-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-selftests-internal-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-tools-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-tools-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-tools-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-tools-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-tools-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-tools-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-tools-debuginfo-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-tools-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-tools-libs-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-tools-libs-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-tools-libs-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-tools-libs-devel-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-tools-libs-devel-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-tools-libs-devel-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-zfcpdump-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-zfcpdump-core-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-zfcpdump-debuginfo-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-zfcpdump-devel-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-zfcpdump-modules-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-zfcpdump-modules-extra-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-zfcpdump-modules-internal-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:openshift-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el8.src",
"8Base-RHOSE-4.12:openshift-ansible-0:4.12.0-202306090942.p0.g74dc7b3.assembly.stream.el8.noarch",
"8Base-RHOSE-4.12:openshift-ansible-0:4.12.0-202306090942.p0.g74dc7b3.assembly.stream.el8.src",
"8Base-RHOSE-4.12:openshift-ansible-test-0:4.12.0-202306090942.p0.g74dc7b3.assembly.stream.el8.noarch",
"8Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.aarch64",
"8Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.ppc64le",
"8Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.s390x",
"8Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.src",
"8Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.x86_64",
"8Base-RHOSE-4.12:openshift-clients-redistributable-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.x86_64",
"8Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el8.aarch64",
"8Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el8.ppc64le",
"8Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el8.s390x",
"8Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el8.x86_64",
"8Base-RHOSE-4.12:openshift-kuryr-0:4.12.0-202306140156.p0.g31dd228.assembly.stream.el8.src",
"8Base-RHOSE-4.12:openshift-kuryr-cni-0:4.12.0-202306140156.p0.g31dd228.assembly.stream.el8.noarch",
"8Base-RHOSE-4.12:openshift-kuryr-common-0:4.12.0-202306140156.p0.g31dd228.assembly.stream.el8.noarch",
"8Base-RHOSE-4.12:openshift-kuryr-controller-0:4.12.0-202306140156.p0.g31dd228.assembly.stream.el8.noarch",
"8Base-RHOSE-4.12:openshift4-aws-iso-0:4.12.0-202306090942.p0.gd2acdd5.assembly.stream.el8.noarch",
"8Base-RHOSE-4.12:openshift4-aws-iso-0:4.12.0-202306090942.p0.gd2acdd5.assembly.stream.el8.src",
"8Base-RHOSE-4.12:perf-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:perf-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:perf-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:perf-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:perf-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:perf-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:perf-debuginfo-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:perf-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:podman-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-3:4.2.0-6.1.rhaos4.12.el8.src",
"8Base-RHOSE-4.12:podman-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-catatonit-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-catatonit-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-catatonit-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-catatonit-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-debugsource-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-debugsource-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-debugsource-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-debugsource-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-docker-3:4.2.0-6.1.rhaos4.12.el8.noarch",
"8Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-plugins-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-plugins-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-plugins-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-plugins-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-remote-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-remote-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-remote-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-remote-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-tests-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-tests-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-tests-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-tests-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:python3-kuryr-kubernetes-0:4.12.0-202306140156.p0.g31dd228.assembly.stream.el8.noarch",
"8Base-RHOSE-4.12:python3-perf-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:python3-perf-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:python3-perf-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:python3-perf-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:python3-perf-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:python3-perf-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:python3-perf-debuginfo-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:python3-perf-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:runc-3:1.1.6-4.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:runc-3:1.1.6-4.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:runc-3:1.1.6-4.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:runc-3:1.1.6-4.rhaos4.12.el8.src",
"8Base-RHOSE-4.12:runc-3:1.1.6-4.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:runc-debuginfo-3:1.1.6-4.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:runc-debuginfo-3:1.1.6-4.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:runc-debuginfo-3:1.1.6-4.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:runc-debuginfo-3:1.1.6-4.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:runc-debugsource-3:1.1.6-4.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:runc-debugsource-3:1.1.6-4.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:runc-debugsource-3:1.1.6-4.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:runc-debugsource-3:1.1.6-4.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:skopeo-2:1.9.4-3.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:skopeo-2:1.9.4-3.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:skopeo-2:1.9.4-3.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:skopeo-2:1.9.4-3.1.rhaos4.12.el8.src",
"8Base-RHOSE-4.12:skopeo-2:1.9.4-3.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.1.rhaos4.12.el8.x86_64",
"9Base-RHOSE-4.12:buildah-1:1.23.4-5.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:buildah-1:1.23.4-5.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:buildah-1:1.23.4-5.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:buildah-1:1.23.4-5.rhaos4.12.el9.src",
"9Base-RHOSE-4.12:buildah-1:1.23.4-5.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:conmon-2:2.1.2-5.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:conmon-2:2.1.2-5.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:conmon-2:2.1.2-5.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:conmon-2:2.1.2-5.rhaos4.12.el9.src",
"9Base-RHOSE-4.12:conmon-2:2.1.2-5.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-5.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-5.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-5.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-5.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-5.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-5.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-5.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-5.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:openshift-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el9.src",
"9Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.aarch64",
"9Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.ppc64le",
"9Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.s390x",
"9Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.src",
"9Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.x86_64",
"9Base-RHOSE-4.12:openshift-clients-redistributable-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.x86_64",
"9Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el9.aarch64",
"9Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el9.ppc64le",
"9Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el9.s390x",
"9Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el9.x86_64",
"9Base-RHOSE-4.12:podman-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-3:4.2.0-7.rhaos4.12.el9.src",
"9Base-RHOSE-4.12:podman-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-catatonit-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-catatonit-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-catatonit-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-catatonit-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-debugsource-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-debugsource-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-debugsource-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-debugsource-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-docker-3:4.2.0-7.rhaos4.12.el9.noarch",
"9Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-plugins-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-plugins-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-plugins-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-plugins-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-remote-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-remote-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-remote-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-remote-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-tests-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-tests-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-tests-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-tests-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:skopeo-2:1.9.4-3.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:skopeo-2:1.9.4-3.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:skopeo-2:1.9.4-3.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:skopeo-2:1.9.4-3.rhaos4.12.el9.src",
"9Base-RHOSE-4.12:skopeo-2:1.9.4-3.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.rhaos4.12.el9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "golang: archive/tar: github.com/vbatts/tar-split: unbounded memory consumption when reading headers"
},
{
"acknowledgments": [
{
"names": [
"Daniel Abeles"
],
"organization": "Head of Research, Oxeye"
},
{
"names": [
"Gal Goldstein"
],
"organization": "Security Researcher, Oxeye"
}
],
"cve": "CVE-2022-2880",
"cwe": {
"id": "CWE-444",
"name": "Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027)"
},
"discovery_date": "2022-10-07T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-RHOSE-4.12:bpftool-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:bpftool-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:bpftool-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:bpftool-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:bpftool-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:bpftool-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:bpftool-debuginfo-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:bpftool-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:buildah-1:1.23.4-5.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:buildah-1:1.23.4-5.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:buildah-1:1.23.4-5.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:buildah-1:1.23.4-5.1.rhaos4.12.el8.src",
"8Base-RHOSE-4.12:buildah-1:1.23.4-5.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:containernetworking-plugins-0:1.0.1-7.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:containernetworking-plugins-0:1.0.1-7.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:containernetworking-plugins-0:1.0.1-7.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:containernetworking-plugins-0:1.0.1-7.rhaos4.12.el8.src",
"8Base-RHOSE-4.12:containernetworking-plugins-0:1.0.1-7.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:containernetworking-plugins-debuginfo-0:1.0.1-7.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:containernetworking-plugins-debuginfo-0:1.0.1-7.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:containernetworking-plugins-debuginfo-0:1.0.1-7.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:containernetworking-plugins-debuginfo-0:1.0.1-7.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:containernetworking-plugins-debugsource-0:1.0.1-7.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:containernetworking-plugins-debugsource-0:1.0.1-7.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:containernetworking-plugins-debugsource-0:1.0.1-7.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:containernetworking-plugins-debugsource-0:1.0.1-7.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:kernel-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-0:4.18.0-372.59.1.el8_6.src",
"8Base-RHOSE-4.12:kernel-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-core-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-core-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-core-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-core-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-cross-headers-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-cross-headers-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-cross-headers-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-cross-headers-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-debug-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-debug-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-debug-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-debug-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-debug-core-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-debug-core-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-debug-core-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-debug-core-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-debug-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-debug-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-debug-debuginfo-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-debug-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-debug-devel-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-debug-devel-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-debug-devel-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-debug-devel-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-debug-modules-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-debug-modules-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-debug-modules-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-debug-modules-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-debug-modules-extra-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-debug-modules-extra-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-debug-modules-extra-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-debug-modules-extra-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-debug-modules-internal-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-debug-modules-internal-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-debug-modules-internal-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-debug-modules-internal-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-debuginfo-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-debuginfo-common-aarch64-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-debuginfo-common-ppc64le-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-debuginfo-common-s390x-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-debuginfo-common-x86_64-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-devel-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-devel-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-devel-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-devel-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-doc-0:4.18.0-372.59.1.el8_6.noarch",
"8Base-RHOSE-4.12:kernel-headers-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-headers-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-headers-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-headers-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-ipaclones-internal-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-ipaclones-internal-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-modules-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-modules-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-modules-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-modules-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-modules-extra-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-modules-extra-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-modules-extra-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-modules-extra-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-modules-internal-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-modules-internal-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-modules-internal-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-modules-internal-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-0:4.18.0-372.59.1.rt7.217.el8_6.src",
"8Base-RHOSE-4.12:kernel-rt-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-core-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debug-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debug-core-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debug-debuginfo-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debug-devel-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debug-kvm-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debug-modules-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debug-modules-extra-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debug-modules-internal-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debuginfo-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-devel-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-kvm-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-modules-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-modules-extra-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-modules-internal-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-selftests-internal-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-selftests-internal-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-selftests-internal-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-selftests-internal-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-selftests-internal-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-tools-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-tools-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-tools-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-tools-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-tools-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-tools-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-tools-debuginfo-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-tools-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-tools-libs-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-tools-libs-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-tools-libs-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-tools-libs-devel-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-tools-libs-devel-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-tools-libs-devel-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-zfcpdump-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-zfcpdump-core-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-zfcpdump-debuginfo-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-zfcpdump-devel-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-zfcpdump-modules-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-zfcpdump-modules-extra-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-zfcpdump-modules-internal-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:openshift-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el8.src",
"8Base-RHOSE-4.12:openshift-ansible-0:4.12.0-202306090942.p0.g74dc7b3.assembly.stream.el8.noarch",
"8Base-RHOSE-4.12:openshift-ansible-0:4.12.0-202306090942.p0.g74dc7b3.assembly.stream.el8.src",
"8Base-RHOSE-4.12:openshift-ansible-test-0:4.12.0-202306090942.p0.g74dc7b3.assembly.stream.el8.noarch",
"8Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.aarch64",
"8Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.ppc64le",
"8Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.s390x",
"8Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.src",
"8Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.x86_64",
"8Base-RHOSE-4.12:openshift-clients-redistributable-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.x86_64",
"8Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el8.aarch64",
"8Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el8.ppc64le",
"8Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el8.s390x",
"8Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el8.x86_64",
"8Base-RHOSE-4.12:openshift-kuryr-0:4.12.0-202306140156.p0.g31dd228.assembly.stream.el8.src",
"8Base-RHOSE-4.12:openshift-kuryr-cni-0:4.12.0-202306140156.p0.g31dd228.assembly.stream.el8.noarch",
"8Base-RHOSE-4.12:openshift-kuryr-common-0:4.12.0-202306140156.p0.g31dd228.assembly.stream.el8.noarch",
"8Base-RHOSE-4.12:openshift-kuryr-controller-0:4.12.0-202306140156.p0.g31dd228.assembly.stream.el8.noarch",
"8Base-RHOSE-4.12:openshift4-aws-iso-0:4.12.0-202306090942.p0.gd2acdd5.assembly.stream.el8.noarch",
"8Base-RHOSE-4.12:openshift4-aws-iso-0:4.12.0-202306090942.p0.gd2acdd5.assembly.stream.el8.src",
"8Base-RHOSE-4.12:perf-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:perf-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:perf-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:perf-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:perf-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:perf-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:perf-debuginfo-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:perf-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:python3-kuryr-kubernetes-0:4.12.0-202306140156.p0.g31dd228.assembly.stream.el8.noarch",
"8Base-RHOSE-4.12:python3-perf-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:python3-perf-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:python3-perf-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:python3-perf-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:python3-perf-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:python3-perf-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:python3-perf-debuginfo-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:python3-perf-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:runc-3:1.1.6-4.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:runc-3:1.1.6-4.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:runc-3:1.1.6-4.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:runc-3:1.1.6-4.rhaos4.12.el8.src",
"8Base-RHOSE-4.12:runc-3:1.1.6-4.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:runc-debuginfo-3:1.1.6-4.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:runc-debuginfo-3:1.1.6-4.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:runc-debuginfo-3:1.1.6-4.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:runc-debuginfo-3:1.1.6-4.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:runc-debugsource-3:1.1.6-4.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:runc-debugsource-3:1.1.6-4.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:runc-debugsource-3:1.1.6-4.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:runc-debugsource-3:1.1.6-4.rhaos4.12.el8.x86_64",
"9Base-RHOSE-4.12:buildah-1:1.23.4-5.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:buildah-1:1.23.4-5.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:buildah-1:1.23.4-5.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:buildah-1:1.23.4-5.rhaos4.12.el9.src",
"9Base-RHOSE-4.12:buildah-1:1.23.4-5.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:openshift-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el9.src",
"9Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.aarch64",
"9Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.ppc64le",
"9Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.s390x",
"9Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.src",
"9Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.x86_64",
"9Base-RHOSE-4.12:openshift-clients-redistributable-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.x86_64",
"9Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el9.aarch64",
"9Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el9.ppc64le",
"9Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el9.s390x",
"9Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el9.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2132868"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the golang package, where requests forwarded by reverse proxy include the raw query parameters from the inbound request, including unparseable parameters rejected by net/http. This issue could permit query parameter smuggling when a Go proxy forwards a parameter with an unparseable value. After the fix, the reverse proxy sanitizes the query parameters in the forwarded query when the outbound request\u0027s form field is set after the reverse proxy. The director function returns, indicating that the proxy has parsed the query parameters. Proxies that do not parse query parameters continue to forward the original query parameters unchanged.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: net/http/httputil: ReverseProxy should not forward unparseable query parameters",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The opportunity to exploit this vulnerability is limited to the Golang runtime. In the case of the OpenShift Container Platform, this would be restricted within each individual container. There are multiple layers of guide rails (Golang\u2019s Garbage Collector; OpenShift\u2019s resource constraints imposed at the container and cluster levels) which would require a malicious user to continue submitting attacks for there to be any enduring impact.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-RHOSE-4.12:conmon-2:2.1.2-4.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:conmon-2:2.1.2-4.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:conmon-2:2.1.2-4.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:conmon-2:2.1.2-4.rhaos4.12.el8.src",
"8Base-RHOSE-4.12:conmon-2:2.1.2-4.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-4.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-4.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-4.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-4.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-4.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-4.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-4.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-4.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-3:4.2.0-6.1.rhaos4.12.el8.src",
"8Base-RHOSE-4.12:podman-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-catatonit-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-catatonit-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-catatonit-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-catatonit-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-debugsource-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-debugsource-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-debugsource-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-debugsource-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-docker-3:4.2.0-6.1.rhaos4.12.el8.noarch",
"8Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-plugins-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-plugins-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-plugins-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-plugins-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-remote-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-remote-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-remote-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-remote-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-tests-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-tests-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-tests-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-tests-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:skopeo-2:1.9.4-3.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:skopeo-2:1.9.4-3.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:skopeo-2:1.9.4-3.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:skopeo-2:1.9.4-3.1.rhaos4.12.el8.src",
"8Base-RHOSE-4.12:skopeo-2:1.9.4-3.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.1.rhaos4.12.el8.x86_64",
"9Base-RHOSE-4.12:conmon-2:2.1.2-5.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:conmon-2:2.1.2-5.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:conmon-2:2.1.2-5.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:conmon-2:2.1.2-5.rhaos4.12.el9.src",
"9Base-RHOSE-4.12:conmon-2:2.1.2-5.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-5.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-5.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-5.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-5.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-5.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-5.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-5.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-5.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-3:4.2.0-7.rhaos4.12.el9.src",
"9Base-RHOSE-4.12:podman-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-catatonit-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-catatonit-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-catatonit-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-catatonit-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-debugsource-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-debugsource-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-debugsource-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-debugsource-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-docker-3:4.2.0-7.rhaos4.12.el9.noarch",
"9Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-plugins-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-plugins-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-plugins-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-plugins-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-remote-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-remote-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-remote-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-remote-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-tests-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-tests-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-tests-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-tests-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:skopeo-2:1.9.4-3.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:skopeo-2:1.9.4-3.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:skopeo-2:1.9.4-3.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:skopeo-2:1.9.4-3.rhaos4.12.el9.src",
"9Base-RHOSE-4.12:skopeo-2:1.9.4-3.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.rhaos4.12.el9.x86_64"
],
"known_not_affected": [
"8Base-RHOSE-4.12:bpftool-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:bpftool-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:bpftool-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:bpftool-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:bpftool-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:bpftool-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:bpftool-debuginfo-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:bpftool-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:buildah-1:1.23.4-5.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:buildah-1:1.23.4-5.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:buildah-1:1.23.4-5.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:buildah-1:1.23.4-5.1.rhaos4.12.el8.src",
"8Base-RHOSE-4.12:buildah-1:1.23.4-5.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:containernetworking-plugins-0:1.0.1-7.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:containernetworking-plugins-0:1.0.1-7.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:containernetworking-plugins-0:1.0.1-7.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:containernetworking-plugins-0:1.0.1-7.rhaos4.12.el8.src",
"8Base-RHOSE-4.12:containernetworking-plugins-0:1.0.1-7.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:containernetworking-plugins-debuginfo-0:1.0.1-7.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:containernetworking-plugins-debuginfo-0:1.0.1-7.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:containernetworking-plugins-debuginfo-0:1.0.1-7.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:containernetworking-plugins-debuginfo-0:1.0.1-7.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:containernetworking-plugins-debugsource-0:1.0.1-7.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:containernetworking-plugins-debugsource-0:1.0.1-7.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:containernetworking-plugins-debugsource-0:1.0.1-7.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:containernetworking-plugins-debugsource-0:1.0.1-7.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:kernel-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-0:4.18.0-372.59.1.el8_6.src",
"8Base-RHOSE-4.12:kernel-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-core-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-core-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-core-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-core-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-cross-headers-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-cross-headers-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-cross-headers-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-cross-headers-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-debug-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-debug-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-debug-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-debug-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-debug-core-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-debug-core-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-debug-core-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-debug-core-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-debug-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-debug-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-debug-debuginfo-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-debug-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-debug-devel-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-debug-devel-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-debug-devel-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-debug-devel-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-debug-modules-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-debug-modules-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-debug-modules-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-debug-modules-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-debug-modules-extra-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-debug-modules-extra-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-debug-modules-extra-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-debug-modules-extra-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-debug-modules-internal-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-debug-modules-internal-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-debug-modules-internal-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-debug-modules-internal-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-debuginfo-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-debuginfo-common-aarch64-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-debuginfo-common-ppc64le-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-debuginfo-common-s390x-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-debuginfo-common-x86_64-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-devel-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-devel-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-devel-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-devel-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-doc-0:4.18.0-372.59.1.el8_6.noarch",
"8Base-RHOSE-4.12:kernel-headers-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-headers-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-headers-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-headers-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-ipaclones-internal-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-ipaclones-internal-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-modules-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-modules-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-modules-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-modules-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-modules-extra-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-modules-extra-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-modules-extra-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-modules-extra-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-modules-internal-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-modules-internal-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-modules-internal-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-modules-internal-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-0:4.18.0-372.59.1.rt7.217.el8_6.src",
"8Base-RHOSE-4.12:kernel-rt-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-core-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debug-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debug-core-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debug-debuginfo-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debug-devel-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debug-kvm-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debug-modules-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debug-modules-extra-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debug-modules-internal-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debuginfo-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-devel-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-kvm-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-modules-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-modules-extra-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-modules-internal-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-selftests-internal-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-selftests-internal-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-selftests-internal-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-selftests-internal-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-selftests-internal-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-tools-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-tools-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-tools-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-tools-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-tools-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-tools-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-tools-debuginfo-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-tools-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-tools-libs-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-tools-libs-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-tools-libs-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-tools-libs-devel-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-tools-libs-devel-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-tools-libs-devel-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-zfcpdump-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-zfcpdump-core-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-zfcpdump-debuginfo-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-zfcpdump-devel-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-zfcpdump-modules-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-zfcpdump-modules-extra-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-zfcpdump-modules-internal-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:openshift-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el8.src",
"8Base-RHOSE-4.12:openshift-ansible-0:4.12.0-202306090942.p0.g74dc7b3.assembly.stream.el8.noarch",
"8Base-RHOSE-4.12:openshift-ansible-0:4.12.0-202306090942.p0.g74dc7b3.assembly.stream.el8.src",
"8Base-RHOSE-4.12:openshift-ansible-test-0:4.12.0-202306090942.p0.g74dc7b3.assembly.stream.el8.noarch",
"8Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.aarch64",
"8Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.ppc64le",
"8Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.s390x",
"8Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.src",
"8Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.x86_64",
"8Base-RHOSE-4.12:openshift-clients-redistributable-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.x86_64",
"8Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el8.aarch64",
"8Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el8.ppc64le",
"8Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el8.s390x",
"8Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el8.x86_64",
"8Base-RHOSE-4.12:openshift-kuryr-0:4.12.0-202306140156.p0.g31dd228.assembly.stream.el8.src",
"8Base-RHOSE-4.12:openshift-kuryr-cni-0:4.12.0-202306140156.p0.g31dd228.assembly.stream.el8.noarch",
"8Base-RHOSE-4.12:openshift-kuryr-common-0:4.12.0-202306140156.p0.g31dd228.assembly.stream.el8.noarch",
"8Base-RHOSE-4.12:openshift-kuryr-controller-0:4.12.0-202306140156.p0.g31dd228.assembly.stream.el8.noarch",
"8Base-RHOSE-4.12:openshift4-aws-iso-0:4.12.0-202306090942.p0.gd2acdd5.assembly.stream.el8.noarch",
"8Base-RHOSE-4.12:openshift4-aws-iso-0:4.12.0-202306090942.p0.gd2acdd5.assembly.stream.el8.src",
"8Base-RHOSE-4.12:perf-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:perf-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:perf-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:perf-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:perf-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:perf-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:perf-debuginfo-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:perf-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:python3-kuryr-kubernetes-0:4.12.0-202306140156.p0.g31dd228.assembly.stream.el8.noarch",
"8Base-RHOSE-4.12:python3-perf-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:python3-perf-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:python3-perf-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:python3-perf-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:python3-perf-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:python3-perf-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:python3-perf-debuginfo-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:python3-perf-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:runc-3:1.1.6-4.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:runc-3:1.1.6-4.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:runc-3:1.1.6-4.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:runc-3:1.1.6-4.rhaos4.12.el8.src",
"8Base-RHOSE-4.12:runc-3:1.1.6-4.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:runc-debuginfo-3:1.1.6-4.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:runc-debuginfo-3:1.1.6-4.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:runc-debuginfo-3:1.1.6-4.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:runc-debuginfo-3:1.1.6-4.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:runc-debugsource-3:1.1.6-4.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:runc-debugsource-3:1.1.6-4.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:runc-debugsource-3:1.1.6-4.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:runc-debugsource-3:1.1.6-4.rhaos4.12.el8.x86_64",
"9Base-RHOSE-4.12:buildah-1:1.23.4-5.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:buildah-1:1.23.4-5.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:buildah-1:1.23.4-5.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:buildah-1:1.23.4-5.rhaos4.12.el9.src",
"9Base-RHOSE-4.12:buildah-1:1.23.4-5.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:openshift-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el9.src",
"9Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.aarch64",
"9Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.ppc64le",
"9Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.s390x",
"9Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.src",
"9Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.x86_64",
"9Base-RHOSE-4.12:openshift-clients-redistributable-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.x86_64",
"9Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el9.aarch64",
"9Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el9.ppc64le",
"9Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el9.s390x",
"9Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-2880"
},
{
"category": "external",
"summary": "RHBZ#2132868",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2132868"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-2880",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2880"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-2880",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-2880"
},
{
"category": "external",
"summary": "https://github.com/golang/go/issues/54663",
"url": "https://github.com/golang/go/issues/54663"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/xtuG5faxtaU?pli=1",
"url": "https://groups.google.com/g/golang-announce/c/xtuG5faxtaU?pli=1"
}
],
"release_date": "2022-10-04T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-06-26T01:19:15+00:00",
"details": "For OpenShift Container Platform 4.12 see the following documentation, which will be updated shortly for this release, for important instructions on how to upgrade your cluster and fully apply this asynchronous errata update:\n\nhttps://docs.openshift.com/container-platform/4.12/release_notes/ocp-4-12-release-notes.html",
"product_ids": [
"8Base-RHOSE-4.12:conmon-2:2.1.2-4.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:conmon-2:2.1.2-4.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:conmon-2:2.1.2-4.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:conmon-2:2.1.2-4.rhaos4.12.el8.src",
"8Base-RHOSE-4.12:conmon-2:2.1.2-4.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-4.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-4.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-4.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-4.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-4.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-4.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-4.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-4.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-3:4.2.0-6.1.rhaos4.12.el8.src",
"8Base-RHOSE-4.12:podman-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-catatonit-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-catatonit-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-catatonit-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-catatonit-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-debugsource-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-debugsource-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-debugsource-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-debugsource-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-docker-3:4.2.0-6.1.rhaos4.12.el8.noarch",
"8Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-plugins-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-plugins-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-plugins-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-plugins-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-remote-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-remote-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-remote-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-remote-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-tests-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-tests-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-tests-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-tests-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:skopeo-2:1.9.4-3.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:skopeo-2:1.9.4-3.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:skopeo-2:1.9.4-3.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:skopeo-2:1.9.4-3.1.rhaos4.12.el8.src",
"8Base-RHOSE-4.12:skopeo-2:1.9.4-3.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.1.rhaos4.12.el8.x86_64",
"9Base-RHOSE-4.12:conmon-2:2.1.2-5.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:conmon-2:2.1.2-5.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:conmon-2:2.1.2-5.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:conmon-2:2.1.2-5.rhaos4.12.el9.src",
"9Base-RHOSE-4.12:conmon-2:2.1.2-5.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-5.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-5.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-5.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-5.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-5.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-5.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-5.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-5.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-3:4.2.0-7.rhaos4.12.el9.src",
"9Base-RHOSE-4.12:podman-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-catatonit-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-catatonit-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-catatonit-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-catatonit-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-debugsource-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-debugsource-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-debugsource-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-debugsource-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-docker-3:4.2.0-7.rhaos4.12.el9.noarch",
"9Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-plugins-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-plugins-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-plugins-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-plugins-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-remote-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-remote-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-remote-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-remote-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-tests-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-tests-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-tests-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-tests-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:skopeo-2:1.9.4-3.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:skopeo-2:1.9.4-3.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:skopeo-2:1.9.4-3.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:skopeo-2:1.9.4-3.rhaos4.12.el9.src",
"9Base-RHOSE-4.12:skopeo-2:1.9.4-3.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.rhaos4.12.el9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:3613"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"8Base-RHOSE-4.12:bpftool-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:bpftool-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:bpftool-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:bpftool-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:bpftool-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:bpftool-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:bpftool-debuginfo-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:bpftool-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:buildah-1:1.23.4-5.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:buildah-1:1.23.4-5.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:buildah-1:1.23.4-5.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:buildah-1:1.23.4-5.1.rhaos4.12.el8.src",
"8Base-RHOSE-4.12:buildah-1:1.23.4-5.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:conmon-2:2.1.2-4.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:conmon-2:2.1.2-4.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:conmon-2:2.1.2-4.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:conmon-2:2.1.2-4.rhaos4.12.el8.src",
"8Base-RHOSE-4.12:conmon-2:2.1.2-4.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-4.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-4.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-4.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-4.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-4.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-4.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-4.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-4.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:containernetworking-plugins-0:1.0.1-7.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:containernetworking-plugins-0:1.0.1-7.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:containernetworking-plugins-0:1.0.1-7.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:containernetworking-plugins-0:1.0.1-7.rhaos4.12.el8.src",
"8Base-RHOSE-4.12:containernetworking-plugins-0:1.0.1-7.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:containernetworking-plugins-debuginfo-0:1.0.1-7.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:containernetworking-plugins-debuginfo-0:1.0.1-7.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:containernetworking-plugins-debuginfo-0:1.0.1-7.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:containernetworking-plugins-debuginfo-0:1.0.1-7.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:containernetworking-plugins-debugsource-0:1.0.1-7.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:containernetworking-plugins-debugsource-0:1.0.1-7.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:containernetworking-plugins-debugsource-0:1.0.1-7.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:containernetworking-plugins-debugsource-0:1.0.1-7.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:kernel-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-0:4.18.0-372.59.1.el8_6.src",
"8Base-RHOSE-4.12:kernel-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-core-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-core-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-core-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-core-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-cross-headers-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-cross-headers-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-cross-headers-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-cross-headers-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-debug-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-debug-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-debug-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-debug-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-debug-core-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-debug-core-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-debug-core-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-debug-core-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-debug-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-debug-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-debug-debuginfo-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-debug-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-debug-devel-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-debug-devel-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-debug-devel-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-debug-devel-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-debug-modules-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-debug-modules-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-debug-modules-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-debug-modules-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-debug-modules-extra-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-debug-modules-extra-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-debug-modules-extra-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-debug-modules-extra-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-debug-modules-internal-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-debug-modules-internal-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-debug-modules-internal-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-debug-modules-internal-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-debuginfo-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-debuginfo-common-aarch64-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-debuginfo-common-ppc64le-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-debuginfo-common-s390x-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-debuginfo-common-x86_64-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-devel-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-devel-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-devel-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-devel-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-doc-0:4.18.0-372.59.1.el8_6.noarch",
"8Base-RHOSE-4.12:kernel-headers-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-headers-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-headers-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-headers-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-ipaclones-internal-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-ipaclones-internal-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-modules-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-modules-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-modules-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-modules-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-modules-extra-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-modules-extra-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-modules-extra-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-modules-extra-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-modules-internal-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-modules-internal-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-modules-internal-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-modules-internal-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-0:4.18.0-372.59.1.rt7.217.el8_6.src",
"8Base-RHOSE-4.12:kernel-rt-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-core-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debug-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debug-core-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debug-debuginfo-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debug-devel-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debug-kvm-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debug-modules-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debug-modules-extra-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debug-modules-internal-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debuginfo-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-devel-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-kvm-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-modules-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-modules-extra-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-modules-internal-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-selftests-internal-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-selftests-internal-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-selftests-internal-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-selftests-internal-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-selftests-internal-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-tools-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-tools-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-tools-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-tools-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-tools-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-tools-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-tools-debuginfo-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-tools-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-tools-libs-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-tools-libs-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-tools-libs-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-tools-libs-devel-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-tools-libs-devel-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-tools-libs-devel-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-zfcpdump-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-zfcpdump-core-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-zfcpdump-debuginfo-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-zfcpdump-devel-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-zfcpdump-modules-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-zfcpdump-modules-extra-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-zfcpdump-modules-internal-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:openshift-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el8.src",
"8Base-RHOSE-4.12:openshift-ansible-0:4.12.0-202306090942.p0.g74dc7b3.assembly.stream.el8.noarch",
"8Base-RHOSE-4.12:openshift-ansible-0:4.12.0-202306090942.p0.g74dc7b3.assembly.stream.el8.src",
"8Base-RHOSE-4.12:openshift-ansible-test-0:4.12.0-202306090942.p0.g74dc7b3.assembly.stream.el8.noarch",
"8Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.aarch64",
"8Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.ppc64le",
"8Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.s390x",
"8Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.src",
"8Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.x86_64",
"8Base-RHOSE-4.12:openshift-clients-redistributable-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.x86_64",
"8Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el8.aarch64",
"8Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el8.ppc64le",
"8Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el8.s390x",
"8Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el8.x86_64",
"8Base-RHOSE-4.12:openshift-kuryr-0:4.12.0-202306140156.p0.g31dd228.assembly.stream.el8.src",
"8Base-RHOSE-4.12:openshift-kuryr-cni-0:4.12.0-202306140156.p0.g31dd228.assembly.stream.el8.noarch",
"8Base-RHOSE-4.12:openshift-kuryr-common-0:4.12.0-202306140156.p0.g31dd228.assembly.stream.el8.noarch",
"8Base-RHOSE-4.12:openshift-kuryr-controller-0:4.12.0-202306140156.p0.g31dd228.assembly.stream.el8.noarch",
"8Base-RHOSE-4.12:openshift4-aws-iso-0:4.12.0-202306090942.p0.gd2acdd5.assembly.stream.el8.noarch",
"8Base-RHOSE-4.12:openshift4-aws-iso-0:4.12.0-202306090942.p0.gd2acdd5.assembly.stream.el8.src",
"8Base-RHOSE-4.12:perf-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:perf-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:perf-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:perf-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:perf-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:perf-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:perf-debuginfo-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:perf-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:podman-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-3:4.2.0-6.1.rhaos4.12.el8.src",
"8Base-RHOSE-4.12:podman-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-catatonit-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-catatonit-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-catatonit-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-catatonit-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-debugsource-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-debugsource-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-debugsource-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-debugsource-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-docker-3:4.2.0-6.1.rhaos4.12.el8.noarch",
"8Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-plugins-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-plugins-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-plugins-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-plugins-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-remote-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-remote-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-remote-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-remote-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-tests-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-tests-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-tests-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-tests-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:python3-kuryr-kubernetes-0:4.12.0-202306140156.p0.g31dd228.assembly.stream.el8.noarch",
"8Base-RHOSE-4.12:python3-perf-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:python3-perf-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:python3-perf-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:python3-perf-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:python3-perf-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:python3-perf-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:python3-perf-debuginfo-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:python3-perf-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:runc-3:1.1.6-4.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:runc-3:1.1.6-4.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:runc-3:1.1.6-4.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:runc-3:1.1.6-4.rhaos4.12.el8.src",
"8Base-RHOSE-4.12:runc-3:1.1.6-4.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:runc-debuginfo-3:1.1.6-4.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:runc-debuginfo-3:1.1.6-4.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:runc-debuginfo-3:1.1.6-4.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:runc-debuginfo-3:1.1.6-4.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:runc-debugsource-3:1.1.6-4.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:runc-debugsource-3:1.1.6-4.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:runc-debugsource-3:1.1.6-4.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:runc-debugsource-3:1.1.6-4.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:skopeo-2:1.9.4-3.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:skopeo-2:1.9.4-3.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:skopeo-2:1.9.4-3.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:skopeo-2:1.9.4-3.1.rhaos4.12.el8.src",
"8Base-RHOSE-4.12:skopeo-2:1.9.4-3.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.1.rhaos4.12.el8.x86_64",
"9Base-RHOSE-4.12:buildah-1:1.23.4-5.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:buildah-1:1.23.4-5.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:buildah-1:1.23.4-5.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:buildah-1:1.23.4-5.rhaos4.12.el9.src",
"9Base-RHOSE-4.12:buildah-1:1.23.4-5.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:conmon-2:2.1.2-5.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:conmon-2:2.1.2-5.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:conmon-2:2.1.2-5.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:conmon-2:2.1.2-5.rhaos4.12.el9.src",
"9Base-RHOSE-4.12:conmon-2:2.1.2-5.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-5.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-5.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-5.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-5.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-5.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-5.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-5.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-5.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:openshift-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el9.src",
"9Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.aarch64",
"9Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.ppc64le",
"9Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.s390x",
"9Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.src",
"9Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.x86_64",
"9Base-RHOSE-4.12:openshift-clients-redistributable-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.x86_64",
"9Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el9.aarch64",
"9Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el9.ppc64le",
"9Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el9.s390x",
"9Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el9.x86_64",
"9Base-RHOSE-4.12:podman-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-3:4.2.0-7.rhaos4.12.el9.src",
"9Base-RHOSE-4.12:podman-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-catatonit-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-catatonit-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-catatonit-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-catatonit-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-debugsource-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-debugsource-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-debugsource-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-debugsource-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-docker-3:4.2.0-7.rhaos4.12.el9.noarch",
"9Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-plugins-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-plugins-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-plugins-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-plugins-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-remote-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-remote-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-remote-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-remote-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-tests-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-tests-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-tests-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-tests-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:skopeo-2:1.9.4-3.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:skopeo-2:1.9.4-3.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:skopeo-2:1.9.4-3.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:skopeo-2:1.9.4-3.rhaos4.12.el9.src",
"9Base-RHOSE-4.12:skopeo-2:1.9.4-3.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.rhaos4.12.el9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "golang: net/http/httputil: ReverseProxy should not forward unparseable query parameters"
},
{
"cve": "CVE-2022-27664",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"discovery_date": "2022-09-06T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-RHOSE-4.12:bpftool-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:bpftool-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:bpftool-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:bpftool-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:bpftool-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:bpftool-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:bpftool-debuginfo-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:bpftool-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:buildah-1:1.23.4-5.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:buildah-1:1.23.4-5.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:buildah-1:1.23.4-5.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:buildah-1:1.23.4-5.1.rhaos4.12.el8.src",
"8Base-RHOSE-4.12:buildah-1:1.23.4-5.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:conmon-2:2.1.2-4.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:conmon-2:2.1.2-4.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:conmon-2:2.1.2-4.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:conmon-2:2.1.2-4.rhaos4.12.el8.src",
"8Base-RHOSE-4.12:conmon-2:2.1.2-4.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-4.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-4.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-4.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-4.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-4.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-4.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-4.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-4.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:containernetworking-plugins-0:1.0.1-7.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:containernetworking-plugins-0:1.0.1-7.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:containernetworking-plugins-0:1.0.1-7.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:containernetworking-plugins-0:1.0.1-7.rhaos4.12.el8.src",
"8Base-RHOSE-4.12:containernetworking-plugins-0:1.0.1-7.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:containernetworking-plugins-debuginfo-0:1.0.1-7.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:containernetworking-plugins-debuginfo-0:1.0.1-7.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:containernetworking-plugins-debuginfo-0:1.0.1-7.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:containernetworking-plugins-debuginfo-0:1.0.1-7.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:containernetworking-plugins-debugsource-0:1.0.1-7.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:containernetworking-plugins-debugsource-0:1.0.1-7.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:containernetworking-plugins-debugsource-0:1.0.1-7.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:containernetworking-plugins-debugsource-0:1.0.1-7.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:kernel-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-0:4.18.0-372.59.1.el8_6.src",
"8Base-RHOSE-4.12:kernel-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-core-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-core-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-core-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-core-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-cross-headers-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-cross-headers-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-cross-headers-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-cross-headers-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-debug-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-debug-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-debug-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-debug-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-debug-core-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-debug-core-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-debug-core-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-debug-core-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-debug-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-debug-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-debug-debuginfo-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-debug-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-debug-devel-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-debug-devel-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-debug-devel-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-debug-devel-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-debug-modules-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-debug-modules-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-debug-modules-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-debug-modules-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-debug-modules-extra-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-debug-modules-extra-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-debug-modules-extra-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-debug-modules-extra-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-debug-modules-internal-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-debug-modules-internal-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-debug-modules-internal-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-debug-modules-internal-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-debuginfo-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-debuginfo-common-aarch64-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-debuginfo-common-ppc64le-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-debuginfo-common-s390x-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-debuginfo-common-x86_64-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-devel-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-devel-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-devel-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-devel-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-doc-0:4.18.0-372.59.1.el8_6.noarch",
"8Base-RHOSE-4.12:kernel-headers-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-headers-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-headers-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-headers-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-ipaclones-internal-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-ipaclones-internal-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-modules-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-modules-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-modules-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-modules-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-modules-extra-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-modules-extra-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-modules-extra-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-modules-extra-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-modules-internal-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-modules-internal-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-modules-internal-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-modules-internal-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-0:4.18.0-372.59.1.rt7.217.el8_6.src",
"8Base-RHOSE-4.12:kernel-rt-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-core-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debug-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debug-core-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debug-debuginfo-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debug-devel-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debug-kvm-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debug-modules-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debug-modules-extra-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debug-modules-internal-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debuginfo-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-devel-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-kvm-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-modules-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-modules-extra-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-modules-internal-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-selftests-internal-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-selftests-internal-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-selftests-internal-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-selftests-internal-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-selftests-internal-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-tools-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-tools-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-tools-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-tools-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-tools-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-tools-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-tools-debuginfo-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-tools-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-tools-libs-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-tools-libs-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-tools-libs-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-tools-libs-devel-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-tools-libs-devel-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-tools-libs-devel-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-zfcpdump-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-zfcpdump-core-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-zfcpdump-debuginfo-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-zfcpdump-devel-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-zfcpdump-modules-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-zfcpdump-modules-extra-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-zfcpdump-modules-internal-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:openshift-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el8.src",
"8Base-RHOSE-4.12:openshift-ansible-0:4.12.0-202306090942.p0.g74dc7b3.assembly.stream.el8.noarch",
"8Base-RHOSE-4.12:openshift-ansible-0:4.12.0-202306090942.p0.g74dc7b3.assembly.stream.el8.src",
"8Base-RHOSE-4.12:openshift-ansible-test-0:4.12.0-202306090942.p0.g74dc7b3.assembly.stream.el8.noarch",
"8Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.aarch64",
"8Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.ppc64le",
"8Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.s390x",
"8Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.src",
"8Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.x86_64",
"8Base-RHOSE-4.12:openshift-clients-redistributable-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.x86_64",
"8Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el8.aarch64",
"8Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el8.ppc64le",
"8Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el8.s390x",
"8Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el8.x86_64",
"8Base-RHOSE-4.12:openshift-kuryr-0:4.12.0-202306140156.p0.g31dd228.assembly.stream.el8.src",
"8Base-RHOSE-4.12:openshift-kuryr-cni-0:4.12.0-202306140156.p0.g31dd228.assembly.stream.el8.noarch",
"8Base-RHOSE-4.12:openshift-kuryr-common-0:4.12.0-202306140156.p0.g31dd228.assembly.stream.el8.noarch",
"8Base-RHOSE-4.12:openshift-kuryr-controller-0:4.12.0-202306140156.p0.g31dd228.assembly.stream.el8.noarch",
"8Base-RHOSE-4.12:openshift4-aws-iso-0:4.12.0-202306090942.p0.gd2acdd5.assembly.stream.el8.noarch",
"8Base-RHOSE-4.12:openshift4-aws-iso-0:4.12.0-202306090942.p0.gd2acdd5.assembly.stream.el8.src",
"8Base-RHOSE-4.12:perf-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:perf-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:perf-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:perf-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:perf-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:perf-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:perf-debuginfo-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:perf-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:python3-kuryr-kubernetes-0:4.12.0-202306140156.p0.g31dd228.assembly.stream.el8.noarch",
"8Base-RHOSE-4.12:python3-perf-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:python3-perf-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:python3-perf-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:python3-perf-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:python3-perf-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:python3-perf-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:python3-perf-debuginfo-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:python3-perf-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:runc-3:1.1.6-4.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:runc-3:1.1.6-4.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:runc-3:1.1.6-4.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:runc-3:1.1.6-4.rhaos4.12.el8.src",
"8Base-RHOSE-4.12:runc-3:1.1.6-4.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:runc-debuginfo-3:1.1.6-4.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:runc-debuginfo-3:1.1.6-4.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:runc-debuginfo-3:1.1.6-4.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:runc-debuginfo-3:1.1.6-4.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:runc-debugsource-3:1.1.6-4.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:runc-debugsource-3:1.1.6-4.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:runc-debugsource-3:1.1.6-4.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:runc-debugsource-3:1.1.6-4.rhaos4.12.el8.x86_64",
"9Base-RHOSE-4.12:buildah-1:1.23.4-5.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:buildah-1:1.23.4-5.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:buildah-1:1.23.4-5.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:buildah-1:1.23.4-5.rhaos4.12.el9.src",
"9Base-RHOSE-4.12:buildah-1:1.23.4-5.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:conmon-2:2.1.2-5.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:conmon-2:2.1.2-5.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:conmon-2:2.1.2-5.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:conmon-2:2.1.2-5.rhaos4.12.el9.src",
"9Base-RHOSE-4.12:conmon-2:2.1.2-5.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-5.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-5.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-5.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-5.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-5.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-5.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-5.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-5.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:openshift-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el9.src",
"9Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.aarch64",
"9Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.ppc64le",
"9Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.s390x",
"9Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.src",
"9Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.x86_64",
"9Base-RHOSE-4.12:openshift-clients-redistributable-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.x86_64",
"9Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el9.aarch64",
"9Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el9.ppc64le",
"9Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el9.s390x",
"9Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el9.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2124669"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the golang package. In net/http in Go, attackers can cause a denial of service because an HTTP/2 connection can hang during closing if a fatal error preempts the shutdown.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: net/http: handle server errors after sending GOAWAY",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The opportunity for a Denial of Service is limited to the golang runtime. In the case of OpenShift Container Platform, this would be restricted within each individual container. There are multiple layers of guide rails (Golang\u2019s Garbage Collector; OpenShift\u2019s resource constraints imposed at the container and cluster levels) which would require a malicious user to continue submitting attacks for there to be any enduring impact. They would also need access to external server resources to be able to send a massive volume of requests to cause a significant impact on server operations.\n\nWithin regulated environments, a combination of the following controls acts as a significant barrier to successfully exploiting a CWE-400: Uncontrolled Resource Consumption vulnerability and therefore downgrades the severity of this particular CVE from Moderate to Low.\n\nRed Hat restricts access to all platform information by default, granting access only after successful hard token-based multi-factor authentication (MFA) and enforcing least privilege to ensure only authorized roles can execute or modify code. The environment employs malicious code protections, including IDS/IPS and antimalware tools to detect threats and monitor resource usage, helping prevent uncontrolled consumption that could lead to system failure. Additional safeguards, such as web application firewalls and load-balancing strategies, protect against resource exhaustion and performance degradation. Event logs are centrally collected, correlated, and analyzed to support monitoring, alerting, and retention, aiding in the detection of abnormal behavior and potential denial-of-service (DoS) conditions. Static code analysis and peer reviews enforce strong input validation and error handling, reducing the likelihood of input-based DoS attacks.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-RHOSE-4.12:podman-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-3:4.2.0-6.1.rhaos4.12.el8.src",
"8Base-RHOSE-4.12:podman-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-catatonit-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-catatonit-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-catatonit-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-catatonit-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-debugsource-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-debugsource-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-debugsource-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-debugsource-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-docker-3:4.2.0-6.1.rhaos4.12.el8.noarch",
"8Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-plugins-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-plugins-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-plugins-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-plugins-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-remote-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-remote-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-remote-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-remote-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-tests-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-tests-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-tests-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-tests-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:skopeo-2:1.9.4-3.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:skopeo-2:1.9.4-3.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:skopeo-2:1.9.4-3.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:skopeo-2:1.9.4-3.1.rhaos4.12.el8.src",
"8Base-RHOSE-4.12:skopeo-2:1.9.4-3.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.1.rhaos4.12.el8.x86_64",
"9Base-RHOSE-4.12:podman-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-3:4.2.0-7.rhaos4.12.el9.src",
"9Base-RHOSE-4.12:podman-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-catatonit-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-catatonit-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-catatonit-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-catatonit-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-debugsource-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-debugsource-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-debugsource-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-debugsource-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-docker-3:4.2.0-7.rhaos4.12.el9.noarch",
"9Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-plugins-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-plugins-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-plugins-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-plugins-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-remote-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-remote-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-remote-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-remote-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-tests-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-tests-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-tests-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-tests-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:skopeo-2:1.9.4-3.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:skopeo-2:1.9.4-3.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:skopeo-2:1.9.4-3.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:skopeo-2:1.9.4-3.rhaos4.12.el9.src",
"9Base-RHOSE-4.12:skopeo-2:1.9.4-3.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.rhaos4.12.el9.x86_64"
],
"known_not_affected": [
"8Base-RHOSE-4.12:bpftool-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:bpftool-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:bpftool-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:bpftool-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:bpftool-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:bpftool-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:bpftool-debuginfo-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:bpftool-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:buildah-1:1.23.4-5.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:buildah-1:1.23.4-5.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:buildah-1:1.23.4-5.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:buildah-1:1.23.4-5.1.rhaos4.12.el8.src",
"8Base-RHOSE-4.12:buildah-1:1.23.4-5.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:conmon-2:2.1.2-4.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:conmon-2:2.1.2-4.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:conmon-2:2.1.2-4.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:conmon-2:2.1.2-4.rhaos4.12.el8.src",
"8Base-RHOSE-4.12:conmon-2:2.1.2-4.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-4.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-4.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-4.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-4.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-4.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-4.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-4.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-4.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:containernetworking-plugins-0:1.0.1-7.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:containernetworking-plugins-0:1.0.1-7.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:containernetworking-plugins-0:1.0.1-7.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:containernetworking-plugins-0:1.0.1-7.rhaos4.12.el8.src",
"8Base-RHOSE-4.12:containernetworking-plugins-0:1.0.1-7.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:containernetworking-plugins-debuginfo-0:1.0.1-7.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:containernetworking-plugins-debuginfo-0:1.0.1-7.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:containernetworking-plugins-debuginfo-0:1.0.1-7.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:containernetworking-plugins-debuginfo-0:1.0.1-7.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:containernetworking-plugins-debugsource-0:1.0.1-7.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:containernetworking-plugins-debugsource-0:1.0.1-7.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:containernetworking-plugins-debugsource-0:1.0.1-7.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:containernetworking-plugins-debugsource-0:1.0.1-7.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:kernel-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-0:4.18.0-372.59.1.el8_6.src",
"8Base-RHOSE-4.12:kernel-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-core-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-core-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-core-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-core-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-cross-headers-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-cross-headers-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-cross-headers-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-cross-headers-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-debug-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-debug-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-debug-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-debug-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-debug-core-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-debug-core-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-debug-core-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-debug-core-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-debug-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-debug-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-debug-debuginfo-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-debug-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-debug-devel-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-debug-devel-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-debug-devel-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-debug-devel-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-debug-modules-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-debug-modules-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-debug-modules-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-debug-modules-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-debug-modules-extra-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-debug-modules-extra-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-debug-modules-extra-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-debug-modules-extra-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-debug-modules-internal-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-debug-modules-internal-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-debug-modules-internal-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-debug-modules-internal-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-debuginfo-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-debuginfo-common-aarch64-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-debuginfo-common-ppc64le-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-debuginfo-common-s390x-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-debuginfo-common-x86_64-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-devel-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-devel-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-devel-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-devel-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-doc-0:4.18.0-372.59.1.el8_6.noarch",
"8Base-RHOSE-4.12:kernel-headers-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-headers-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-headers-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-headers-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-ipaclones-internal-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-ipaclones-internal-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-modules-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-modules-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-modules-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-modules-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-modules-extra-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-modules-extra-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-modules-extra-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-modules-extra-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-modules-internal-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-modules-internal-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-modules-internal-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-modules-internal-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-0:4.18.0-372.59.1.rt7.217.el8_6.src",
"8Base-RHOSE-4.12:kernel-rt-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-core-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debug-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debug-core-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debug-debuginfo-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debug-devel-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debug-kvm-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debug-modules-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debug-modules-extra-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debug-modules-internal-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debuginfo-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-devel-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-kvm-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-modules-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-modules-extra-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-modules-internal-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-selftests-internal-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-selftests-internal-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-selftests-internal-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-selftests-internal-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-selftests-internal-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-tools-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-tools-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-tools-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-tools-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-tools-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-tools-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-tools-debuginfo-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-tools-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-tools-libs-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-tools-libs-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-tools-libs-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-tools-libs-devel-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-tools-libs-devel-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-tools-libs-devel-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-zfcpdump-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-zfcpdump-core-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-zfcpdump-debuginfo-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-zfcpdump-devel-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-zfcpdump-modules-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-zfcpdump-modules-extra-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-zfcpdump-modules-internal-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:openshift-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el8.src",
"8Base-RHOSE-4.12:openshift-ansible-0:4.12.0-202306090942.p0.g74dc7b3.assembly.stream.el8.noarch",
"8Base-RHOSE-4.12:openshift-ansible-0:4.12.0-202306090942.p0.g74dc7b3.assembly.stream.el8.src",
"8Base-RHOSE-4.12:openshift-ansible-test-0:4.12.0-202306090942.p0.g74dc7b3.assembly.stream.el8.noarch",
"8Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.aarch64",
"8Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.ppc64le",
"8Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.s390x",
"8Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.src",
"8Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.x86_64",
"8Base-RHOSE-4.12:openshift-clients-redistributable-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.x86_64",
"8Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el8.aarch64",
"8Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el8.ppc64le",
"8Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el8.s390x",
"8Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el8.x86_64",
"8Base-RHOSE-4.12:openshift-kuryr-0:4.12.0-202306140156.p0.g31dd228.assembly.stream.el8.src",
"8Base-RHOSE-4.12:openshift-kuryr-cni-0:4.12.0-202306140156.p0.g31dd228.assembly.stream.el8.noarch",
"8Base-RHOSE-4.12:openshift-kuryr-common-0:4.12.0-202306140156.p0.g31dd228.assembly.stream.el8.noarch",
"8Base-RHOSE-4.12:openshift-kuryr-controller-0:4.12.0-202306140156.p0.g31dd228.assembly.stream.el8.noarch",
"8Base-RHOSE-4.12:openshift4-aws-iso-0:4.12.0-202306090942.p0.gd2acdd5.assembly.stream.el8.noarch",
"8Base-RHOSE-4.12:openshift4-aws-iso-0:4.12.0-202306090942.p0.gd2acdd5.assembly.stream.el8.src",
"8Base-RHOSE-4.12:perf-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:perf-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:perf-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:perf-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:perf-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:perf-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:perf-debuginfo-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:perf-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:python3-kuryr-kubernetes-0:4.12.0-202306140156.p0.g31dd228.assembly.stream.el8.noarch",
"8Base-RHOSE-4.12:python3-perf-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:python3-perf-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:python3-perf-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:python3-perf-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:python3-perf-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:python3-perf-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:python3-perf-debuginfo-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:python3-perf-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:runc-3:1.1.6-4.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:runc-3:1.1.6-4.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:runc-3:1.1.6-4.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:runc-3:1.1.6-4.rhaos4.12.el8.src",
"8Base-RHOSE-4.12:runc-3:1.1.6-4.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:runc-debuginfo-3:1.1.6-4.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:runc-debuginfo-3:1.1.6-4.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:runc-debuginfo-3:1.1.6-4.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:runc-debuginfo-3:1.1.6-4.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:runc-debugsource-3:1.1.6-4.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:runc-debugsource-3:1.1.6-4.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:runc-debugsource-3:1.1.6-4.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:runc-debugsource-3:1.1.6-4.rhaos4.12.el8.x86_64",
"9Base-RHOSE-4.12:buildah-1:1.23.4-5.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:buildah-1:1.23.4-5.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:buildah-1:1.23.4-5.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:buildah-1:1.23.4-5.rhaos4.12.el9.src",
"9Base-RHOSE-4.12:buildah-1:1.23.4-5.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:conmon-2:2.1.2-5.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:conmon-2:2.1.2-5.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:conmon-2:2.1.2-5.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:conmon-2:2.1.2-5.rhaos4.12.el9.src",
"9Base-RHOSE-4.12:conmon-2:2.1.2-5.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-5.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-5.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-5.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-5.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-5.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-5.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-5.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-5.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:openshift-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el9.src",
"9Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.aarch64",
"9Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.ppc64le",
"9Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.s390x",
"9Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.src",
"9Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.x86_64",
"9Base-RHOSE-4.12:openshift-clients-redistributable-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.x86_64",
"9Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el9.aarch64",
"9Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el9.ppc64le",
"9Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el9.s390x",
"9Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-27664"
},
{
"category": "external",
"summary": "RHBZ#2124669",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2124669"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-27664",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27664"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-27664",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-27664"
},
{
"category": "external",
"summary": "https://go.dev/issue/54658",
"url": "https://go.dev/issue/54658"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/x49AQzIVX-s/m/0tgO0pjiBQAJ",
"url": "https://groups.google.com/g/golang-announce/c/x49AQzIVX-s/m/0tgO0pjiBQAJ"
}
],
"release_date": "2022-09-06T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-06-26T01:19:15+00:00",
"details": "For OpenShift Container Platform 4.12 see the following documentation, which will be updated shortly for this release, for important instructions on how to upgrade your cluster and fully apply this asynchronous errata update:\n\nhttps://docs.openshift.com/container-platform/4.12/release_notes/ocp-4-12-release-notes.html",
"product_ids": [
"8Base-RHOSE-4.12:podman-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-3:4.2.0-6.1.rhaos4.12.el8.src",
"8Base-RHOSE-4.12:podman-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-catatonit-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-catatonit-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-catatonit-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-catatonit-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-debugsource-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-debugsource-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-debugsource-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-debugsource-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-docker-3:4.2.0-6.1.rhaos4.12.el8.noarch",
"8Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-plugins-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-plugins-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-plugins-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-plugins-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-remote-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-remote-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-remote-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-remote-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-tests-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-tests-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-tests-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-tests-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:skopeo-2:1.9.4-3.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:skopeo-2:1.9.4-3.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:skopeo-2:1.9.4-3.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:skopeo-2:1.9.4-3.1.rhaos4.12.el8.src",
"8Base-RHOSE-4.12:skopeo-2:1.9.4-3.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.1.rhaos4.12.el8.x86_64",
"9Base-RHOSE-4.12:podman-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-3:4.2.0-7.rhaos4.12.el9.src",
"9Base-RHOSE-4.12:podman-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-catatonit-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-catatonit-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-catatonit-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-catatonit-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-debugsource-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-debugsource-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-debugsource-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-debugsource-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-docker-3:4.2.0-7.rhaos4.12.el9.noarch",
"9Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-plugins-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-plugins-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-plugins-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-plugins-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-remote-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-remote-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-remote-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-remote-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-tests-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-tests-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-tests-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-tests-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:skopeo-2:1.9.4-3.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:skopeo-2:1.9.4-3.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:skopeo-2:1.9.4-3.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:skopeo-2:1.9.4-3.rhaos4.12.el9.src",
"9Base-RHOSE-4.12:skopeo-2:1.9.4-3.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.rhaos4.12.el9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:3613"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"8Base-RHOSE-4.12:bpftool-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:bpftool-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:bpftool-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:bpftool-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:bpftool-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:bpftool-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:bpftool-debuginfo-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:bpftool-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:buildah-1:1.23.4-5.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:buildah-1:1.23.4-5.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:buildah-1:1.23.4-5.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:buildah-1:1.23.4-5.1.rhaos4.12.el8.src",
"8Base-RHOSE-4.12:buildah-1:1.23.4-5.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:conmon-2:2.1.2-4.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:conmon-2:2.1.2-4.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:conmon-2:2.1.2-4.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:conmon-2:2.1.2-4.rhaos4.12.el8.src",
"8Base-RHOSE-4.12:conmon-2:2.1.2-4.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-4.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-4.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-4.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-4.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-4.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-4.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-4.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-4.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:containernetworking-plugins-0:1.0.1-7.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:containernetworking-plugins-0:1.0.1-7.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:containernetworking-plugins-0:1.0.1-7.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:containernetworking-plugins-0:1.0.1-7.rhaos4.12.el8.src",
"8Base-RHOSE-4.12:containernetworking-plugins-0:1.0.1-7.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:containernetworking-plugins-debuginfo-0:1.0.1-7.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:containernetworking-plugins-debuginfo-0:1.0.1-7.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:containernetworking-plugins-debuginfo-0:1.0.1-7.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:containernetworking-plugins-debuginfo-0:1.0.1-7.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:containernetworking-plugins-debugsource-0:1.0.1-7.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:containernetworking-plugins-debugsource-0:1.0.1-7.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:containernetworking-plugins-debugsource-0:1.0.1-7.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:containernetworking-plugins-debugsource-0:1.0.1-7.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:kernel-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-0:4.18.0-372.59.1.el8_6.src",
"8Base-RHOSE-4.12:kernel-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-core-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-core-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-core-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-core-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-cross-headers-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-cross-headers-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-cross-headers-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-cross-headers-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-debug-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-debug-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-debug-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-debug-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-debug-core-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-debug-core-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-debug-core-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-debug-core-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-debug-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-debug-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-debug-debuginfo-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-debug-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-debug-devel-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-debug-devel-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-debug-devel-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-debug-devel-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-debug-modules-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-debug-modules-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-debug-modules-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-debug-modules-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-debug-modules-extra-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-debug-modules-extra-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-debug-modules-extra-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-debug-modules-extra-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-debug-modules-internal-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-debug-modules-internal-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-debug-modules-internal-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-debug-modules-internal-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-debuginfo-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-debuginfo-common-aarch64-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-debuginfo-common-ppc64le-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-debuginfo-common-s390x-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-debuginfo-common-x86_64-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-devel-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-devel-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-devel-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-devel-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-doc-0:4.18.0-372.59.1.el8_6.noarch",
"8Base-RHOSE-4.12:kernel-headers-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-headers-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-headers-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-headers-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-ipaclones-internal-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-ipaclones-internal-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-modules-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-modules-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-modules-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-modules-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-modules-extra-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-modules-extra-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-modules-extra-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-modules-extra-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-modules-internal-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-modules-internal-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-modules-internal-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-modules-internal-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-0:4.18.0-372.59.1.rt7.217.el8_6.src",
"8Base-RHOSE-4.12:kernel-rt-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-core-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debug-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debug-core-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debug-debuginfo-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debug-devel-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debug-kvm-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debug-modules-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debug-modules-extra-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debug-modules-internal-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debuginfo-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-devel-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-kvm-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-modules-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-modules-extra-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-modules-internal-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-selftests-internal-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-selftests-internal-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-selftests-internal-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-selftests-internal-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-selftests-internal-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-tools-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-tools-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-tools-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-tools-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-tools-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-tools-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-tools-debuginfo-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-tools-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-tools-libs-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-tools-libs-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-tools-libs-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-tools-libs-devel-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-tools-libs-devel-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-tools-libs-devel-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-zfcpdump-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-zfcpdump-core-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-zfcpdump-debuginfo-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-zfcpdump-devel-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-zfcpdump-modules-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-zfcpdump-modules-extra-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-zfcpdump-modules-internal-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:openshift-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el8.src",
"8Base-RHOSE-4.12:openshift-ansible-0:4.12.0-202306090942.p0.g74dc7b3.assembly.stream.el8.noarch",
"8Base-RHOSE-4.12:openshift-ansible-0:4.12.0-202306090942.p0.g74dc7b3.assembly.stream.el8.src",
"8Base-RHOSE-4.12:openshift-ansible-test-0:4.12.0-202306090942.p0.g74dc7b3.assembly.stream.el8.noarch",
"8Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.aarch64",
"8Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.ppc64le",
"8Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.s390x",
"8Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.src",
"8Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.x86_64",
"8Base-RHOSE-4.12:openshift-clients-redistributable-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.x86_64",
"8Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el8.aarch64",
"8Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el8.ppc64le",
"8Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el8.s390x",
"8Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el8.x86_64",
"8Base-RHOSE-4.12:openshift-kuryr-0:4.12.0-202306140156.p0.g31dd228.assembly.stream.el8.src",
"8Base-RHOSE-4.12:openshift-kuryr-cni-0:4.12.0-202306140156.p0.g31dd228.assembly.stream.el8.noarch",
"8Base-RHOSE-4.12:openshift-kuryr-common-0:4.12.0-202306140156.p0.g31dd228.assembly.stream.el8.noarch",
"8Base-RHOSE-4.12:openshift-kuryr-controller-0:4.12.0-202306140156.p0.g31dd228.assembly.stream.el8.noarch",
"8Base-RHOSE-4.12:openshift4-aws-iso-0:4.12.0-202306090942.p0.gd2acdd5.assembly.stream.el8.noarch",
"8Base-RHOSE-4.12:openshift4-aws-iso-0:4.12.0-202306090942.p0.gd2acdd5.assembly.stream.el8.src",
"8Base-RHOSE-4.12:perf-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:perf-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:perf-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:perf-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:perf-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:perf-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:perf-debuginfo-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:perf-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:podman-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-3:4.2.0-6.1.rhaos4.12.el8.src",
"8Base-RHOSE-4.12:podman-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-catatonit-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-catatonit-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-catatonit-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-catatonit-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-debugsource-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-debugsource-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-debugsource-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-debugsource-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-docker-3:4.2.0-6.1.rhaos4.12.el8.noarch",
"8Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-plugins-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-plugins-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-plugins-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-plugins-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-remote-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-remote-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-remote-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-remote-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-tests-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-tests-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-tests-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-tests-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:python3-kuryr-kubernetes-0:4.12.0-202306140156.p0.g31dd228.assembly.stream.el8.noarch",
"8Base-RHOSE-4.12:python3-perf-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:python3-perf-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:python3-perf-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:python3-perf-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:python3-perf-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:python3-perf-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:python3-perf-debuginfo-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:python3-perf-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:runc-3:1.1.6-4.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:runc-3:1.1.6-4.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:runc-3:1.1.6-4.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:runc-3:1.1.6-4.rhaos4.12.el8.src",
"8Base-RHOSE-4.12:runc-3:1.1.6-4.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:runc-debuginfo-3:1.1.6-4.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:runc-debuginfo-3:1.1.6-4.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:runc-debuginfo-3:1.1.6-4.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:runc-debuginfo-3:1.1.6-4.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:runc-debugsource-3:1.1.6-4.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:runc-debugsource-3:1.1.6-4.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:runc-debugsource-3:1.1.6-4.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:runc-debugsource-3:1.1.6-4.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:skopeo-2:1.9.4-3.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:skopeo-2:1.9.4-3.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:skopeo-2:1.9.4-3.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:skopeo-2:1.9.4-3.1.rhaos4.12.el8.src",
"8Base-RHOSE-4.12:skopeo-2:1.9.4-3.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.1.rhaos4.12.el8.x86_64",
"9Base-RHOSE-4.12:buildah-1:1.23.4-5.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:buildah-1:1.23.4-5.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:buildah-1:1.23.4-5.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:buildah-1:1.23.4-5.rhaos4.12.el9.src",
"9Base-RHOSE-4.12:buildah-1:1.23.4-5.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:conmon-2:2.1.2-5.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:conmon-2:2.1.2-5.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:conmon-2:2.1.2-5.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:conmon-2:2.1.2-5.rhaos4.12.el9.src",
"9Base-RHOSE-4.12:conmon-2:2.1.2-5.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-5.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-5.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-5.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-5.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-5.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-5.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-5.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-5.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:openshift-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el9.src",
"9Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.aarch64",
"9Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.ppc64le",
"9Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.s390x",
"9Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.src",
"9Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.x86_64",
"9Base-RHOSE-4.12:openshift-clients-redistributable-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.x86_64",
"9Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el9.aarch64",
"9Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el9.ppc64le",
"9Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el9.s390x",
"9Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el9.x86_64",
"9Base-RHOSE-4.12:podman-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-3:4.2.0-7.rhaos4.12.el9.src",
"9Base-RHOSE-4.12:podman-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-catatonit-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-catatonit-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-catatonit-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-catatonit-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-debugsource-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-debugsource-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-debugsource-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-debugsource-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-docker-3:4.2.0-7.rhaos4.12.el9.noarch",
"9Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-plugins-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-plugins-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-plugins-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-plugins-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-remote-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-remote-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-remote-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-remote-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-tests-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-tests-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-tests-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-tests-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:skopeo-2:1.9.4-3.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:skopeo-2:1.9.4-3.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:skopeo-2:1.9.4-3.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:skopeo-2:1.9.4-3.rhaos4.12.el9.src",
"9Base-RHOSE-4.12:skopeo-2:1.9.4-3.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.rhaos4.12.el9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "golang: net/http: handle server errors after sending GOAWAY"
},
{
"cve": "CVE-2022-32149",
"cwe": {
"id": "CWE-407",
"name": "Inefficient Algorithmic Complexity"
},
"discovery_date": "2022-10-12T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-RHOSE-4.12:bpftool-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:bpftool-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:bpftool-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:bpftool-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:bpftool-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:bpftool-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:bpftool-debuginfo-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:bpftool-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:buildah-1:1.23.4-5.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:buildah-1:1.23.4-5.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:buildah-1:1.23.4-5.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:buildah-1:1.23.4-5.1.rhaos4.12.el8.src",
"8Base-RHOSE-4.12:buildah-1:1.23.4-5.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:conmon-2:2.1.2-4.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:conmon-2:2.1.2-4.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:conmon-2:2.1.2-4.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:conmon-2:2.1.2-4.rhaos4.12.el8.src",
"8Base-RHOSE-4.12:conmon-2:2.1.2-4.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-4.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-4.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-4.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-4.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-4.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-4.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-4.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-4.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:containernetworking-plugins-0:1.0.1-7.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:containernetworking-plugins-0:1.0.1-7.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:containernetworking-plugins-0:1.0.1-7.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:containernetworking-plugins-0:1.0.1-7.rhaos4.12.el8.src",
"8Base-RHOSE-4.12:containernetworking-plugins-0:1.0.1-7.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:containernetworking-plugins-debuginfo-0:1.0.1-7.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:containernetworking-plugins-debuginfo-0:1.0.1-7.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:containernetworking-plugins-debuginfo-0:1.0.1-7.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:containernetworking-plugins-debuginfo-0:1.0.1-7.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:containernetworking-plugins-debugsource-0:1.0.1-7.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:containernetworking-plugins-debugsource-0:1.0.1-7.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:containernetworking-plugins-debugsource-0:1.0.1-7.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:containernetworking-plugins-debugsource-0:1.0.1-7.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:kernel-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-0:4.18.0-372.59.1.el8_6.src",
"8Base-RHOSE-4.12:kernel-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-core-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-core-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-core-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-core-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-cross-headers-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-cross-headers-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-cross-headers-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-cross-headers-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-debug-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-debug-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-debug-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-debug-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-debug-core-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-debug-core-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-debug-core-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-debug-core-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-debug-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-debug-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-debug-debuginfo-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-debug-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-debug-devel-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-debug-devel-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-debug-devel-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-debug-devel-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-debug-modules-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-debug-modules-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-debug-modules-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-debug-modules-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-debug-modules-extra-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-debug-modules-extra-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-debug-modules-extra-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-debug-modules-extra-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-debug-modules-internal-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-debug-modules-internal-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-debug-modules-internal-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-debug-modules-internal-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-debuginfo-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-debuginfo-common-aarch64-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-debuginfo-common-ppc64le-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-debuginfo-common-s390x-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-debuginfo-common-x86_64-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-devel-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-devel-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-devel-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-devel-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-doc-0:4.18.0-372.59.1.el8_6.noarch",
"8Base-RHOSE-4.12:kernel-headers-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-headers-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-headers-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-headers-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-ipaclones-internal-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-ipaclones-internal-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-modules-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-modules-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-modules-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-modules-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-modules-extra-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-modules-extra-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-modules-extra-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-modules-extra-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-modules-internal-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-modules-internal-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-modules-internal-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-modules-internal-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-0:4.18.0-372.59.1.rt7.217.el8_6.src",
"8Base-RHOSE-4.12:kernel-rt-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-core-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debug-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debug-core-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debug-debuginfo-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debug-devel-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debug-kvm-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debug-modules-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debug-modules-extra-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debug-modules-internal-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debuginfo-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-devel-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-kvm-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-modules-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-modules-extra-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-modules-internal-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-selftests-internal-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-selftests-internal-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-selftests-internal-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-selftests-internal-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-selftests-internal-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-tools-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-tools-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-tools-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-tools-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-tools-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-tools-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-tools-debuginfo-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-tools-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-tools-libs-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-tools-libs-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-tools-libs-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-tools-libs-devel-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-tools-libs-devel-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-tools-libs-devel-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-zfcpdump-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-zfcpdump-core-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-zfcpdump-debuginfo-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-zfcpdump-devel-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-zfcpdump-modules-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-zfcpdump-modules-extra-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-zfcpdump-modules-internal-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:openshift-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el8.src",
"8Base-RHOSE-4.12:openshift-ansible-0:4.12.0-202306090942.p0.g74dc7b3.assembly.stream.el8.noarch",
"8Base-RHOSE-4.12:openshift-ansible-0:4.12.0-202306090942.p0.g74dc7b3.assembly.stream.el8.src",
"8Base-RHOSE-4.12:openshift-ansible-test-0:4.12.0-202306090942.p0.g74dc7b3.assembly.stream.el8.noarch",
"8Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.aarch64",
"8Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.ppc64le",
"8Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.s390x",
"8Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.src",
"8Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.x86_64",
"8Base-RHOSE-4.12:openshift-clients-redistributable-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.x86_64",
"8Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el8.aarch64",
"8Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el8.ppc64le",
"8Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el8.s390x",
"8Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el8.x86_64",
"8Base-RHOSE-4.12:openshift-kuryr-0:4.12.0-202306140156.p0.g31dd228.assembly.stream.el8.src",
"8Base-RHOSE-4.12:openshift-kuryr-cni-0:4.12.0-202306140156.p0.g31dd228.assembly.stream.el8.noarch",
"8Base-RHOSE-4.12:openshift-kuryr-common-0:4.12.0-202306140156.p0.g31dd228.assembly.stream.el8.noarch",
"8Base-RHOSE-4.12:openshift-kuryr-controller-0:4.12.0-202306140156.p0.g31dd228.assembly.stream.el8.noarch",
"8Base-RHOSE-4.12:openshift4-aws-iso-0:4.12.0-202306090942.p0.gd2acdd5.assembly.stream.el8.noarch",
"8Base-RHOSE-4.12:openshift4-aws-iso-0:4.12.0-202306090942.p0.gd2acdd5.assembly.stream.el8.src",
"8Base-RHOSE-4.12:perf-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:perf-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:perf-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:perf-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:perf-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:perf-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:perf-debuginfo-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:perf-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:python3-kuryr-kubernetes-0:4.12.0-202306140156.p0.g31dd228.assembly.stream.el8.noarch",
"8Base-RHOSE-4.12:python3-perf-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:python3-perf-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:python3-perf-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:python3-perf-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:python3-perf-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:python3-perf-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:python3-perf-debuginfo-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:python3-perf-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:runc-3:1.1.6-4.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:runc-3:1.1.6-4.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:runc-3:1.1.6-4.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:runc-3:1.1.6-4.rhaos4.12.el8.src",
"8Base-RHOSE-4.12:runc-3:1.1.6-4.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:runc-debuginfo-3:1.1.6-4.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:runc-debuginfo-3:1.1.6-4.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:runc-debuginfo-3:1.1.6-4.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:runc-debuginfo-3:1.1.6-4.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:runc-debugsource-3:1.1.6-4.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:runc-debugsource-3:1.1.6-4.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:runc-debugsource-3:1.1.6-4.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:runc-debugsource-3:1.1.6-4.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:skopeo-2:1.9.4-3.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:skopeo-2:1.9.4-3.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:skopeo-2:1.9.4-3.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:skopeo-2:1.9.4-3.1.rhaos4.12.el8.src",
"8Base-RHOSE-4.12:skopeo-2:1.9.4-3.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.1.rhaos4.12.el8.x86_64",
"9Base-RHOSE-4.12:buildah-1:1.23.4-5.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:buildah-1:1.23.4-5.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:buildah-1:1.23.4-5.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:buildah-1:1.23.4-5.rhaos4.12.el9.src",
"9Base-RHOSE-4.12:buildah-1:1.23.4-5.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:conmon-2:2.1.2-5.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:conmon-2:2.1.2-5.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:conmon-2:2.1.2-5.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:conmon-2:2.1.2-5.rhaos4.12.el9.src",
"9Base-RHOSE-4.12:conmon-2:2.1.2-5.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-5.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-5.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-5.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-5.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-5.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-5.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-5.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-5.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:openshift-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el9.src",
"9Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.aarch64",
"9Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.ppc64le",
"9Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.s390x",
"9Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.src",
"9Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.x86_64",
"9Base-RHOSE-4.12:openshift-clients-redistributable-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.x86_64",
"9Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el9.aarch64",
"9Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el9.ppc64le",
"9Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el9.s390x",
"9Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el9.x86_64",
"9Base-RHOSE-4.12:skopeo-2:1.9.4-3.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:skopeo-2:1.9.4-3.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:skopeo-2:1.9.4-3.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:skopeo-2:1.9.4-3.rhaos4.12.el9.src",
"9Base-RHOSE-4.12:skopeo-2:1.9.4-3.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.rhaos4.12.el9.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2134010"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in the golang.org/x/text/language package. An attacker can craft an Accept-Language header which ParseAcceptLanguage will take significant time to parse. This issue leads to a denial of service, and can impact availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: golang.org/x/text/language: ParseAcceptLanguage takes a long time to parse complex tags",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "After careful analysis of the vulnerability Redhat is choosing to keep the vulnerability severity as moderate,the vulnerability exists in the ParseAcceptLanguage function of the golang text/language package,when an attacker could craft an unusually large accept header and due to the parser taking quadratic time complexity to finish, firstly the attacker would have to find a way smuggle an input to the parser and even then this would simply not result in a crash of any kind but more of resource hang which while can be unpleasant,does not equate to any real world damage.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-RHOSE-4.12:podman-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-3:4.2.0-6.1.rhaos4.12.el8.src",
"8Base-RHOSE-4.12:podman-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-catatonit-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-catatonit-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-catatonit-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-catatonit-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-debugsource-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-debugsource-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-debugsource-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-debugsource-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-docker-3:4.2.0-6.1.rhaos4.12.el8.noarch",
"8Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-plugins-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-plugins-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-plugins-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-plugins-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-remote-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-remote-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-remote-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-remote-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-tests-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-tests-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-tests-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-tests-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"9Base-RHOSE-4.12:podman-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-3:4.2.0-7.rhaos4.12.el9.src",
"9Base-RHOSE-4.12:podman-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-catatonit-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-catatonit-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-catatonit-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-catatonit-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-debugsource-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-debugsource-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-debugsource-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-debugsource-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-docker-3:4.2.0-7.rhaos4.12.el9.noarch",
"9Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-plugins-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-plugins-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-plugins-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-plugins-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-remote-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-remote-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-remote-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-remote-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-tests-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-tests-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-tests-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-tests-3:4.2.0-7.rhaos4.12.el9.x86_64"
],
"known_not_affected": [
"8Base-RHOSE-4.12:bpftool-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:bpftool-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:bpftool-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:bpftool-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:bpftool-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:bpftool-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:bpftool-debuginfo-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:bpftool-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:buildah-1:1.23.4-5.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:buildah-1:1.23.4-5.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:buildah-1:1.23.4-5.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:buildah-1:1.23.4-5.1.rhaos4.12.el8.src",
"8Base-RHOSE-4.12:buildah-1:1.23.4-5.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:conmon-2:2.1.2-4.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:conmon-2:2.1.2-4.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:conmon-2:2.1.2-4.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:conmon-2:2.1.2-4.rhaos4.12.el8.src",
"8Base-RHOSE-4.12:conmon-2:2.1.2-4.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-4.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-4.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-4.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-4.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-4.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-4.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-4.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-4.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:containernetworking-plugins-0:1.0.1-7.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:containernetworking-plugins-0:1.0.1-7.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:containernetworking-plugins-0:1.0.1-7.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:containernetworking-plugins-0:1.0.1-7.rhaos4.12.el8.src",
"8Base-RHOSE-4.12:containernetworking-plugins-0:1.0.1-7.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:containernetworking-plugins-debuginfo-0:1.0.1-7.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:containernetworking-plugins-debuginfo-0:1.0.1-7.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:containernetworking-plugins-debuginfo-0:1.0.1-7.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:containernetworking-plugins-debuginfo-0:1.0.1-7.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:containernetworking-plugins-debugsource-0:1.0.1-7.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:containernetworking-plugins-debugsource-0:1.0.1-7.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:containernetworking-plugins-debugsource-0:1.0.1-7.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:containernetworking-plugins-debugsource-0:1.0.1-7.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:kernel-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-0:4.18.0-372.59.1.el8_6.src",
"8Base-RHOSE-4.12:kernel-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-core-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-core-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-core-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-core-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-cross-headers-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-cross-headers-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-cross-headers-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-cross-headers-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-debug-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-debug-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-debug-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-debug-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-debug-core-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-debug-core-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-debug-core-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-debug-core-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-debug-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-debug-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-debug-debuginfo-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-debug-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-debug-devel-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-debug-devel-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-debug-devel-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-debug-devel-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-debug-modules-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-debug-modules-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-debug-modules-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-debug-modules-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-debug-modules-extra-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-debug-modules-extra-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-debug-modules-extra-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-debug-modules-extra-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-debug-modules-internal-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-debug-modules-internal-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-debug-modules-internal-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-debug-modules-internal-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-debuginfo-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-debuginfo-common-aarch64-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-debuginfo-common-ppc64le-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-debuginfo-common-s390x-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-debuginfo-common-x86_64-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-devel-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-devel-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-devel-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-devel-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-doc-0:4.18.0-372.59.1.el8_6.noarch",
"8Base-RHOSE-4.12:kernel-headers-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-headers-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-headers-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-headers-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-ipaclones-internal-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-ipaclones-internal-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-modules-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-modules-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-modules-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-modules-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-modules-extra-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-modules-extra-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-modules-extra-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-modules-extra-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-modules-internal-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-modules-internal-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-modules-internal-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-modules-internal-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-0:4.18.0-372.59.1.rt7.217.el8_6.src",
"8Base-RHOSE-4.12:kernel-rt-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-core-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debug-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debug-core-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debug-debuginfo-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debug-devel-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debug-kvm-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debug-modules-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debug-modules-extra-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debug-modules-internal-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debuginfo-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-devel-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-kvm-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-modules-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-modules-extra-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-modules-internal-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-selftests-internal-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-selftests-internal-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-selftests-internal-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-selftests-internal-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-selftests-internal-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-tools-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-tools-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-tools-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-tools-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-tools-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-tools-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-tools-debuginfo-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-tools-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-tools-libs-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-tools-libs-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-tools-libs-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-tools-libs-devel-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-tools-libs-devel-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-tools-libs-devel-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-zfcpdump-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-zfcpdump-core-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-zfcpdump-debuginfo-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-zfcpdump-devel-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-zfcpdump-modules-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-zfcpdump-modules-extra-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-zfcpdump-modules-internal-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:openshift-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el8.src",
"8Base-RHOSE-4.12:openshift-ansible-0:4.12.0-202306090942.p0.g74dc7b3.assembly.stream.el8.noarch",
"8Base-RHOSE-4.12:openshift-ansible-0:4.12.0-202306090942.p0.g74dc7b3.assembly.stream.el8.src",
"8Base-RHOSE-4.12:openshift-ansible-test-0:4.12.0-202306090942.p0.g74dc7b3.assembly.stream.el8.noarch",
"8Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.aarch64",
"8Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.ppc64le",
"8Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.s390x",
"8Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.src",
"8Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.x86_64",
"8Base-RHOSE-4.12:openshift-clients-redistributable-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.x86_64",
"8Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el8.aarch64",
"8Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el8.ppc64le",
"8Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el8.s390x",
"8Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el8.x86_64",
"8Base-RHOSE-4.12:openshift-kuryr-0:4.12.0-202306140156.p0.g31dd228.assembly.stream.el8.src",
"8Base-RHOSE-4.12:openshift-kuryr-cni-0:4.12.0-202306140156.p0.g31dd228.assembly.stream.el8.noarch",
"8Base-RHOSE-4.12:openshift-kuryr-common-0:4.12.0-202306140156.p0.g31dd228.assembly.stream.el8.noarch",
"8Base-RHOSE-4.12:openshift-kuryr-controller-0:4.12.0-202306140156.p0.g31dd228.assembly.stream.el8.noarch",
"8Base-RHOSE-4.12:openshift4-aws-iso-0:4.12.0-202306090942.p0.gd2acdd5.assembly.stream.el8.noarch",
"8Base-RHOSE-4.12:openshift4-aws-iso-0:4.12.0-202306090942.p0.gd2acdd5.assembly.stream.el8.src",
"8Base-RHOSE-4.12:perf-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:perf-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:perf-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:perf-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:perf-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:perf-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:perf-debuginfo-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:perf-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:python3-kuryr-kubernetes-0:4.12.0-202306140156.p0.g31dd228.assembly.stream.el8.noarch",
"8Base-RHOSE-4.12:python3-perf-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:python3-perf-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:python3-perf-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:python3-perf-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:python3-perf-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:python3-perf-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:python3-perf-debuginfo-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:python3-perf-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:runc-3:1.1.6-4.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:runc-3:1.1.6-4.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:runc-3:1.1.6-4.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:runc-3:1.1.6-4.rhaos4.12.el8.src",
"8Base-RHOSE-4.12:runc-3:1.1.6-4.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:runc-debuginfo-3:1.1.6-4.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:runc-debuginfo-3:1.1.6-4.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:runc-debuginfo-3:1.1.6-4.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:runc-debuginfo-3:1.1.6-4.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:runc-debugsource-3:1.1.6-4.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:runc-debugsource-3:1.1.6-4.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:runc-debugsource-3:1.1.6-4.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:runc-debugsource-3:1.1.6-4.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:skopeo-2:1.9.4-3.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:skopeo-2:1.9.4-3.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:skopeo-2:1.9.4-3.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:skopeo-2:1.9.4-3.1.rhaos4.12.el8.src",
"8Base-RHOSE-4.12:skopeo-2:1.9.4-3.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.1.rhaos4.12.el8.x86_64",
"9Base-RHOSE-4.12:buildah-1:1.23.4-5.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:buildah-1:1.23.4-5.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:buildah-1:1.23.4-5.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:buildah-1:1.23.4-5.rhaos4.12.el9.src",
"9Base-RHOSE-4.12:buildah-1:1.23.4-5.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:conmon-2:2.1.2-5.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:conmon-2:2.1.2-5.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:conmon-2:2.1.2-5.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:conmon-2:2.1.2-5.rhaos4.12.el9.src",
"9Base-RHOSE-4.12:conmon-2:2.1.2-5.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-5.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-5.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-5.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-5.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-5.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-5.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-5.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-5.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:openshift-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el9.src",
"9Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.aarch64",
"9Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.ppc64le",
"9Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.s390x",
"9Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.src",
"9Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.x86_64",
"9Base-RHOSE-4.12:openshift-clients-redistributable-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.x86_64",
"9Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el9.aarch64",
"9Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el9.ppc64le",
"9Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el9.s390x",
"9Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el9.x86_64",
"9Base-RHOSE-4.12:skopeo-2:1.9.4-3.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:skopeo-2:1.9.4-3.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:skopeo-2:1.9.4-3.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:skopeo-2:1.9.4-3.rhaos4.12.el9.src",
"9Base-RHOSE-4.12:skopeo-2:1.9.4-3.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.rhaos4.12.el9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-32149"
},
{
"category": "external",
"summary": "RHBZ#2134010",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2134010"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-32149",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32149"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-32149",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-32149"
},
{
"category": "external",
"summary": "https://go.dev/issue/56152",
"url": "https://go.dev/issue/56152"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-dev/c/qfPIly0X7aU",
"url": "https://groups.google.com/g/golang-dev/c/qfPIly0X7aU"
}
],
"release_date": "2022-10-11T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-06-26T01:19:15+00:00",
"details": "For OpenShift Container Platform 4.12 see the following documentation, which will be updated shortly for this release, for important instructions on how to upgrade your cluster and fully apply this asynchronous errata update:\n\nhttps://docs.openshift.com/container-platform/4.12/release_notes/ocp-4-12-release-notes.html",
"product_ids": [
"8Base-RHOSE-4.12:podman-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-3:4.2.0-6.1.rhaos4.12.el8.src",
"8Base-RHOSE-4.12:podman-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-catatonit-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-catatonit-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-catatonit-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-catatonit-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-debugsource-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-debugsource-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-debugsource-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-debugsource-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-docker-3:4.2.0-6.1.rhaos4.12.el8.noarch",
"8Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-plugins-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-plugins-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-plugins-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-plugins-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-remote-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-remote-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-remote-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-remote-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-tests-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-tests-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-tests-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-tests-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"9Base-RHOSE-4.12:podman-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-3:4.2.0-7.rhaos4.12.el9.src",
"9Base-RHOSE-4.12:podman-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-catatonit-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-catatonit-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-catatonit-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-catatonit-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-debugsource-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-debugsource-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-debugsource-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-debugsource-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-docker-3:4.2.0-7.rhaos4.12.el9.noarch",
"9Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-plugins-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-plugins-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-plugins-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-plugins-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-remote-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-remote-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-remote-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-remote-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-tests-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-tests-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-tests-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-tests-3:4.2.0-7.rhaos4.12.el9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:3613"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"8Base-RHOSE-4.12:bpftool-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:bpftool-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:bpftool-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:bpftool-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:bpftool-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:bpftool-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:bpftool-debuginfo-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:bpftool-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:buildah-1:1.23.4-5.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:buildah-1:1.23.4-5.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:buildah-1:1.23.4-5.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:buildah-1:1.23.4-5.1.rhaos4.12.el8.src",
"8Base-RHOSE-4.12:buildah-1:1.23.4-5.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:conmon-2:2.1.2-4.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:conmon-2:2.1.2-4.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:conmon-2:2.1.2-4.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:conmon-2:2.1.2-4.rhaos4.12.el8.src",
"8Base-RHOSE-4.12:conmon-2:2.1.2-4.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-4.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-4.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-4.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-4.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-4.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-4.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-4.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-4.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:containernetworking-plugins-0:1.0.1-7.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:containernetworking-plugins-0:1.0.1-7.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:containernetworking-plugins-0:1.0.1-7.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:containernetworking-plugins-0:1.0.1-7.rhaos4.12.el8.src",
"8Base-RHOSE-4.12:containernetworking-plugins-0:1.0.1-7.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:containernetworking-plugins-debuginfo-0:1.0.1-7.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:containernetworking-plugins-debuginfo-0:1.0.1-7.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:containernetworking-plugins-debuginfo-0:1.0.1-7.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:containernetworking-plugins-debuginfo-0:1.0.1-7.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:containernetworking-plugins-debugsource-0:1.0.1-7.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:containernetworking-plugins-debugsource-0:1.0.1-7.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:containernetworking-plugins-debugsource-0:1.0.1-7.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:containernetworking-plugins-debugsource-0:1.0.1-7.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:kernel-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-0:4.18.0-372.59.1.el8_6.src",
"8Base-RHOSE-4.12:kernel-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-core-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-core-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-core-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-core-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-cross-headers-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-cross-headers-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-cross-headers-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-cross-headers-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-debug-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-debug-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-debug-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-debug-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-debug-core-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-debug-core-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-debug-core-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-debug-core-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-debug-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-debug-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-debug-debuginfo-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-debug-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-debug-devel-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-debug-devel-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-debug-devel-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-debug-devel-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-debug-modules-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-debug-modules-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-debug-modules-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-debug-modules-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-debug-modules-extra-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-debug-modules-extra-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-debug-modules-extra-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-debug-modules-extra-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-debug-modules-internal-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-debug-modules-internal-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-debug-modules-internal-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-debug-modules-internal-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-debuginfo-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-debuginfo-common-aarch64-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-debuginfo-common-ppc64le-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-debuginfo-common-s390x-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-debuginfo-common-x86_64-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-devel-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-devel-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-devel-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-devel-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-doc-0:4.18.0-372.59.1.el8_6.noarch",
"8Base-RHOSE-4.12:kernel-headers-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-headers-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-headers-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-headers-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-ipaclones-internal-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-ipaclones-internal-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-modules-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-modules-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-modules-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-modules-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-modules-extra-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-modules-extra-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-modules-extra-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-modules-extra-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-modules-internal-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-modules-internal-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-modules-internal-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-modules-internal-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-0:4.18.0-372.59.1.rt7.217.el8_6.src",
"8Base-RHOSE-4.12:kernel-rt-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-core-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debug-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debug-core-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debug-debuginfo-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debug-devel-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debug-kvm-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debug-modules-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debug-modules-extra-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debug-modules-internal-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debuginfo-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-devel-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-kvm-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-modules-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-modules-extra-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-modules-internal-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-selftests-internal-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-selftests-internal-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-selftests-internal-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-selftests-internal-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-selftests-internal-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-tools-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-tools-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-tools-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-tools-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-tools-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-tools-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-tools-debuginfo-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-tools-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-tools-libs-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-tools-libs-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-tools-libs-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-tools-libs-devel-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-tools-libs-devel-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-tools-libs-devel-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-zfcpdump-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-zfcpdump-core-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-zfcpdump-debuginfo-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-zfcpdump-devel-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-zfcpdump-modules-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-zfcpdump-modules-extra-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-zfcpdump-modules-internal-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:openshift-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el8.src",
"8Base-RHOSE-4.12:openshift-ansible-0:4.12.0-202306090942.p0.g74dc7b3.assembly.stream.el8.noarch",
"8Base-RHOSE-4.12:openshift-ansible-0:4.12.0-202306090942.p0.g74dc7b3.assembly.stream.el8.src",
"8Base-RHOSE-4.12:openshift-ansible-test-0:4.12.0-202306090942.p0.g74dc7b3.assembly.stream.el8.noarch",
"8Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.aarch64",
"8Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.ppc64le",
"8Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.s390x",
"8Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.src",
"8Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.x86_64",
"8Base-RHOSE-4.12:openshift-clients-redistributable-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.x86_64",
"8Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el8.aarch64",
"8Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el8.ppc64le",
"8Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el8.s390x",
"8Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el8.x86_64",
"8Base-RHOSE-4.12:openshift-kuryr-0:4.12.0-202306140156.p0.g31dd228.assembly.stream.el8.src",
"8Base-RHOSE-4.12:openshift-kuryr-cni-0:4.12.0-202306140156.p0.g31dd228.assembly.stream.el8.noarch",
"8Base-RHOSE-4.12:openshift-kuryr-common-0:4.12.0-202306140156.p0.g31dd228.assembly.stream.el8.noarch",
"8Base-RHOSE-4.12:openshift-kuryr-controller-0:4.12.0-202306140156.p0.g31dd228.assembly.stream.el8.noarch",
"8Base-RHOSE-4.12:openshift4-aws-iso-0:4.12.0-202306090942.p0.gd2acdd5.assembly.stream.el8.noarch",
"8Base-RHOSE-4.12:openshift4-aws-iso-0:4.12.0-202306090942.p0.gd2acdd5.assembly.stream.el8.src",
"8Base-RHOSE-4.12:perf-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:perf-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:perf-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:perf-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:perf-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:perf-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:perf-debuginfo-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:perf-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:podman-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-3:4.2.0-6.1.rhaos4.12.el8.src",
"8Base-RHOSE-4.12:podman-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-catatonit-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-catatonit-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-catatonit-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-catatonit-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-debugsource-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-debugsource-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-debugsource-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-debugsource-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-docker-3:4.2.0-6.1.rhaos4.12.el8.noarch",
"8Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-plugins-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-plugins-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-plugins-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-plugins-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-remote-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-remote-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-remote-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-remote-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-tests-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-tests-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-tests-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-tests-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:python3-kuryr-kubernetes-0:4.12.0-202306140156.p0.g31dd228.assembly.stream.el8.noarch",
"8Base-RHOSE-4.12:python3-perf-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:python3-perf-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:python3-perf-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:python3-perf-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:python3-perf-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:python3-perf-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:python3-perf-debuginfo-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:python3-perf-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:runc-3:1.1.6-4.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:runc-3:1.1.6-4.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:runc-3:1.1.6-4.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:runc-3:1.1.6-4.rhaos4.12.el8.src",
"8Base-RHOSE-4.12:runc-3:1.1.6-4.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:runc-debuginfo-3:1.1.6-4.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:runc-debuginfo-3:1.1.6-4.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:runc-debuginfo-3:1.1.6-4.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:runc-debuginfo-3:1.1.6-4.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:runc-debugsource-3:1.1.6-4.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:runc-debugsource-3:1.1.6-4.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:runc-debugsource-3:1.1.6-4.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:runc-debugsource-3:1.1.6-4.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:skopeo-2:1.9.4-3.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:skopeo-2:1.9.4-3.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:skopeo-2:1.9.4-3.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:skopeo-2:1.9.4-3.1.rhaos4.12.el8.src",
"8Base-RHOSE-4.12:skopeo-2:1.9.4-3.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.1.rhaos4.12.el8.x86_64",
"9Base-RHOSE-4.12:buildah-1:1.23.4-5.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:buildah-1:1.23.4-5.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:buildah-1:1.23.4-5.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:buildah-1:1.23.4-5.rhaos4.12.el9.src",
"9Base-RHOSE-4.12:buildah-1:1.23.4-5.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:conmon-2:2.1.2-5.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:conmon-2:2.1.2-5.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:conmon-2:2.1.2-5.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:conmon-2:2.1.2-5.rhaos4.12.el9.src",
"9Base-RHOSE-4.12:conmon-2:2.1.2-5.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-5.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-5.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-5.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-5.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-5.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-5.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-5.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-5.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:openshift-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el9.src",
"9Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.aarch64",
"9Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.ppc64le",
"9Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.s390x",
"9Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.src",
"9Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.x86_64",
"9Base-RHOSE-4.12:openshift-clients-redistributable-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.x86_64",
"9Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el9.aarch64",
"9Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el9.ppc64le",
"9Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el9.s390x",
"9Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el9.x86_64",
"9Base-RHOSE-4.12:podman-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-3:4.2.0-7.rhaos4.12.el9.src",
"9Base-RHOSE-4.12:podman-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-catatonit-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-catatonit-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-catatonit-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-catatonit-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-debugsource-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-debugsource-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-debugsource-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-debugsource-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-docker-3:4.2.0-7.rhaos4.12.el9.noarch",
"9Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-plugins-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-plugins-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-plugins-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-plugins-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-remote-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-remote-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-remote-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-remote-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-tests-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-tests-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-tests-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-tests-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:skopeo-2:1.9.4-3.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:skopeo-2:1.9.4-3.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:skopeo-2:1.9.4-3.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:skopeo-2:1.9.4-3.rhaos4.12.el9.src",
"9Base-RHOSE-4.12:skopeo-2:1.9.4-3.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.rhaos4.12.el9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "golang: golang.org/x/text/language: ParseAcceptLanguage takes a long time to parse complex tags"
},
{
"cve": "CVE-2022-32190",
"cwe": {
"id": "CWE-22",
"name": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)"
},
"discovery_date": "2022-09-06T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-RHOSE-4.12:bpftool-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:bpftool-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:bpftool-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:bpftool-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:bpftool-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:bpftool-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:bpftool-debuginfo-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:bpftool-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:buildah-1:1.23.4-5.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:buildah-1:1.23.4-5.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:buildah-1:1.23.4-5.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:buildah-1:1.23.4-5.1.rhaos4.12.el8.src",
"8Base-RHOSE-4.12:buildah-1:1.23.4-5.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:conmon-2:2.1.2-4.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:conmon-2:2.1.2-4.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:conmon-2:2.1.2-4.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:conmon-2:2.1.2-4.rhaos4.12.el8.src",
"8Base-RHOSE-4.12:conmon-2:2.1.2-4.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-4.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-4.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-4.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-4.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-4.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-4.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-4.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-4.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:containernetworking-plugins-0:1.0.1-7.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:containernetworking-plugins-0:1.0.1-7.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:containernetworking-plugins-0:1.0.1-7.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:containernetworking-plugins-0:1.0.1-7.rhaos4.12.el8.src",
"8Base-RHOSE-4.12:containernetworking-plugins-0:1.0.1-7.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:containernetworking-plugins-debuginfo-0:1.0.1-7.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:containernetworking-plugins-debuginfo-0:1.0.1-7.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:containernetworking-plugins-debuginfo-0:1.0.1-7.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:containernetworking-plugins-debuginfo-0:1.0.1-7.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:containernetworking-plugins-debugsource-0:1.0.1-7.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:containernetworking-plugins-debugsource-0:1.0.1-7.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:containernetworking-plugins-debugsource-0:1.0.1-7.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:containernetworking-plugins-debugsource-0:1.0.1-7.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:kernel-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-0:4.18.0-372.59.1.el8_6.src",
"8Base-RHOSE-4.12:kernel-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-core-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-core-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-core-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-core-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-cross-headers-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-cross-headers-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-cross-headers-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-cross-headers-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-debug-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-debug-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-debug-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-debug-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-debug-core-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-debug-core-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-debug-core-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-debug-core-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-debug-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-debug-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-debug-debuginfo-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-debug-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-debug-devel-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-debug-devel-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-debug-devel-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-debug-devel-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-debug-modules-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-debug-modules-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-debug-modules-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-debug-modules-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-debug-modules-extra-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-debug-modules-extra-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-debug-modules-extra-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-debug-modules-extra-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-debug-modules-internal-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-debug-modules-internal-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-debug-modules-internal-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-debug-modules-internal-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-debuginfo-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-debuginfo-common-aarch64-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-debuginfo-common-ppc64le-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-debuginfo-common-s390x-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-debuginfo-common-x86_64-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-devel-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-devel-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-devel-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-devel-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-doc-0:4.18.0-372.59.1.el8_6.noarch",
"8Base-RHOSE-4.12:kernel-headers-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-headers-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-headers-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-headers-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-ipaclones-internal-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-ipaclones-internal-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-modules-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-modules-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-modules-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-modules-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-modules-extra-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-modules-extra-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-modules-extra-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-modules-extra-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-modules-internal-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-modules-internal-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-modules-internal-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-modules-internal-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-0:4.18.0-372.59.1.rt7.217.el8_6.src",
"8Base-RHOSE-4.12:kernel-rt-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-core-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debug-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debug-core-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debug-debuginfo-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debug-devel-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debug-kvm-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debug-modules-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debug-modules-extra-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debug-modules-internal-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debuginfo-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-devel-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-kvm-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-modules-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-modules-extra-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-modules-internal-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-selftests-internal-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-selftests-internal-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-selftests-internal-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-selftests-internal-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-selftests-internal-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-tools-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-tools-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-tools-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-tools-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-tools-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-tools-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-tools-debuginfo-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-tools-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-tools-libs-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-tools-libs-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-tools-libs-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-tools-libs-devel-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-tools-libs-devel-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-tools-libs-devel-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-zfcpdump-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-zfcpdump-core-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-zfcpdump-debuginfo-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-zfcpdump-devel-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-zfcpdump-modules-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-zfcpdump-modules-extra-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-zfcpdump-modules-internal-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:openshift-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el8.src",
"8Base-RHOSE-4.12:openshift-ansible-0:4.12.0-202306090942.p0.g74dc7b3.assembly.stream.el8.noarch",
"8Base-RHOSE-4.12:openshift-ansible-0:4.12.0-202306090942.p0.g74dc7b3.assembly.stream.el8.src",
"8Base-RHOSE-4.12:openshift-ansible-test-0:4.12.0-202306090942.p0.g74dc7b3.assembly.stream.el8.noarch",
"8Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.aarch64",
"8Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.ppc64le",
"8Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.s390x",
"8Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.src",
"8Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.x86_64",
"8Base-RHOSE-4.12:openshift-clients-redistributable-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.x86_64",
"8Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el8.aarch64",
"8Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el8.ppc64le",
"8Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el8.s390x",
"8Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el8.x86_64",
"8Base-RHOSE-4.12:openshift-kuryr-0:4.12.0-202306140156.p0.g31dd228.assembly.stream.el8.src",
"8Base-RHOSE-4.12:openshift-kuryr-cni-0:4.12.0-202306140156.p0.g31dd228.assembly.stream.el8.noarch",
"8Base-RHOSE-4.12:openshift-kuryr-common-0:4.12.0-202306140156.p0.g31dd228.assembly.stream.el8.noarch",
"8Base-RHOSE-4.12:openshift-kuryr-controller-0:4.12.0-202306140156.p0.g31dd228.assembly.stream.el8.noarch",
"8Base-RHOSE-4.12:openshift4-aws-iso-0:4.12.0-202306090942.p0.gd2acdd5.assembly.stream.el8.noarch",
"8Base-RHOSE-4.12:openshift4-aws-iso-0:4.12.0-202306090942.p0.gd2acdd5.assembly.stream.el8.src",
"8Base-RHOSE-4.12:perf-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:perf-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:perf-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:perf-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:perf-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:perf-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:perf-debuginfo-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:perf-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:python3-kuryr-kubernetes-0:4.12.0-202306140156.p0.g31dd228.assembly.stream.el8.noarch",
"8Base-RHOSE-4.12:python3-perf-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:python3-perf-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:python3-perf-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:python3-perf-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:python3-perf-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:python3-perf-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:python3-perf-debuginfo-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:python3-perf-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:skopeo-2:1.9.4-3.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:skopeo-2:1.9.4-3.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:skopeo-2:1.9.4-3.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:skopeo-2:1.9.4-3.1.rhaos4.12.el8.src",
"8Base-RHOSE-4.12:skopeo-2:1.9.4-3.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.1.rhaos4.12.el8.x86_64",
"9Base-RHOSE-4.12:buildah-1:1.23.4-5.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:buildah-1:1.23.4-5.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:buildah-1:1.23.4-5.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:buildah-1:1.23.4-5.rhaos4.12.el9.src",
"9Base-RHOSE-4.12:buildah-1:1.23.4-5.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:conmon-2:2.1.2-5.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:conmon-2:2.1.2-5.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:conmon-2:2.1.2-5.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:conmon-2:2.1.2-5.rhaos4.12.el9.src",
"9Base-RHOSE-4.12:conmon-2:2.1.2-5.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-5.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-5.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-5.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-5.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-5.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-5.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-5.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-5.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:openshift-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el9.src",
"9Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.aarch64",
"9Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.ppc64le",
"9Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.s390x",
"9Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.src",
"9Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.x86_64",
"9Base-RHOSE-4.12:openshift-clients-redistributable-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.x86_64",
"9Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el9.aarch64",
"9Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el9.ppc64le",
"9Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el9.s390x",
"9Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el9.x86_64",
"9Base-RHOSE-4.12:skopeo-2:1.9.4-3.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:skopeo-2:1.9.4-3.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:skopeo-2:1.9.4-3.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:skopeo-2:1.9.4-3.rhaos4.12.el9.src",
"9Base-RHOSE-4.12:skopeo-2:1.9.4-3.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.rhaos4.12.el9.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2124668"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the golang package. The JoinPath doesn\u0027t remove the ../ path components appended to a domain that is not terminated by a slash, possibly leading to a directory traversal attack.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: net/url: JoinPath does not strip relative path components in all circumstances",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The vulnerable functions, JoinPath and URL.JoinPath was introduced in upstream go1.19, whereas, RHEL ships go1.17 and go1.18 versions, which does not contain the vulnerable code. Hence, packages shipped with RHEL-8, RHEL-9 are not affected.\n\nAll Y stream releases of OpenShift Container Platform 4 run on RHEL-8 or RHEL-9, so OCP 4 is also not affected.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-RHOSE-4.12:podman-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-3:4.2.0-6.1.rhaos4.12.el8.src",
"8Base-RHOSE-4.12:podman-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-catatonit-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-catatonit-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-catatonit-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-catatonit-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-debugsource-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-debugsource-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-debugsource-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-debugsource-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-docker-3:4.2.0-6.1.rhaos4.12.el8.noarch",
"8Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-plugins-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-plugins-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-plugins-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-plugins-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-remote-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-remote-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-remote-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-remote-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-tests-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-tests-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-tests-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-tests-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:runc-3:1.1.6-4.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:runc-3:1.1.6-4.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:runc-3:1.1.6-4.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:runc-3:1.1.6-4.rhaos4.12.el8.src",
"8Base-RHOSE-4.12:runc-3:1.1.6-4.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:runc-debuginfo-3:1.1.6-4.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:runc-debuginfo-3:1.1.6-4.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:runc-debuginfo-3:1.1.6-4.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:runc-debuginfo-3:1.1.6-4.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:runc-debugsource-3:1.1.6-4.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:runc-debugsource-3:1.1.6-4.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:runc-debugsource-3:1.1.6-4.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:runc-debugsource-3:1.1.6-4.rhaos4.12.el8.x86_64",
"9Base-RHOSE-4.12:podman-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-3:4.2.0-7.rhaos4.12.el9.src",
"9Base-RHOSE-4.12:podman-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-catatonit-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-catatonit-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-catatonit-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-catatonit-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-debugsource-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-debugsource-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-debugsource-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-debugsource-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-docker-3:4.2.0-7.rhaos4.12.el9.noarch",
"9Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-plugins-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-plugins-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-plugins-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-plugins-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-remote-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-remote-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-remote-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-remote-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-tests-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-tests-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-tests-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-tests-3:4.2.0-7.rhaos4.12.el9.x86_64"
],
"known_not_affected": [
"8Base-RHOSE-4.12:bpftool-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:bpftool-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:bpftool-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:bpftool-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:bpftool-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:bpftool-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:bpftool-debuginfo-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:bpftool-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:buildah-1:1.23.4-5.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:buildah-1:1.23.4-5.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:buildah-1:1.23.4-5.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:buildah-1:1.23.4-5.1.rhaos4.12.el8.src",
"8Base-RHOSE-4.12:buildah-1:1.23.4-5.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:conmon-2:2.1.2-4.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:conmon-2:2.1.2-4.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:conmon-2:2.1.2-4.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:conmon-2:2.1.2-4.rhaos4.12.el8.src",
"8Base-RHOSE-4.12:conmon-2:2.1.2-4.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-4.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-4.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-4.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-4.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-4.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-4.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-4.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-4.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:containernetworking-plugins-0:1.0.1-7.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:containernetworking-plugins-0:1.0.1-7.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:containernetworking-plugins-0:1.0.1-7.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:containernetworking-plugins-0:1.0.1-7.rhaos4.12.el8.src",
"8Base-RHOSE-4.12:containernetworking-plugins-0:1.0.1-7.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:containernetworking-plugins-debuginfo-0:1.0.1-7.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:containernetworking-plugins-debuginfo-0:1.0.1-7.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:containernetworking-plugins-debuginfo-0:1.0.1-7.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:containernetworking-plugins-debuginfo-0:1.0.1-7.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:containernetworking-plugins-debugsource-0:1.0.1-7.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:containernetworking-plugins-debugsource-0:1.0.1-7.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:containernetworking-plugins-debugsource-0:1.0.1-7.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:containernetworking-plugins-debugsource-0:1.0.1-7.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:kernel-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-0:4.18.0-372.59.1.el8_6.src",
"8Base-RHOSE-4.12:kernel-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-core-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-core-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-core-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-core-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-cross-headers-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-cross-headers-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-cross-headers-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-cross-headers-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-debug-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-debug-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-debug-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-debug-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-debug-core-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-debug-core-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-debug-core-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-debug-core-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-debug-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-debug-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-debug-debuginfo-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-debug-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-debug-devel-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-debug-devel-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-debug-devel-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-debug-devel-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-debug-modules-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-debug-modules-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-debug-modules-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-debug-modules-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-debug-modules-extra-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-debug-modules-extra-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-debug-modules-extra-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-debug-modules-extra-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-debug-modules-internal-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-debug-modules-internal-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-debug-modules-internal-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-debug-modules-internal-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-debuginfo-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-debuginfo-common-aarch64-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-debuginfo-common-ppc64le-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-debuginfo-common-s390x-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-debuginfo-common-x86_64-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-devel-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-devel-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-devel-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-devel-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-doc-0:4.18.0-372.59.1.el8_6.noarch",
"8Base-RHOSE-4.12:kernel-headers-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-headers-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-headers-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-headers-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-ipaclones-internal-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-ipaclones-internal-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-modules-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-modules-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-modules-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-modules-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-modules-extra-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-modules-extra-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-modules-extra-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-modules-extra-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-modules-internal-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-modules-internal-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-modules-internal-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-modules-internal-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-0:4.18.0-372.59.1.rt7.217.el8_6.src",
"8Base-RHOSE-4.12:kernel-rt-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-core-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debug-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debug-core-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debug-debuginfo-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debug-devel-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debug-kvm-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debug-modules-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debug-modules-extra-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debug-modules-internal-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debuginfo-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-devel-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-kvm-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-modules-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-modules-extra-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-modules-internal-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-selftests-internal-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-selftests-internal-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-selftests-internal-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-selftests-internal-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-selftests-internal-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-tools-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-tools-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-tools-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-tools-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-tools-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-tools-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-tools-debuginfo-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-tools-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-tools-libs-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-tools-libs-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-tools-libs-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-tools-libs-devel-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-tools-libs-devel-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-tools-libs-devel-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-zfcpdump-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-zfcpdump-core-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-zfcpdump-debuginfo-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-zfcpdump-devel-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-zfcpdump-modules-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-zfcpdump-modules-extra-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-zfcpdump-modules-internal-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:openshift-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el8.src",
"8Base-RHOSE-4.12:openshift-ansible-0:4.12.0-202306090942.p0.g74dc7b3.assembly.stream.el8.noarch",
"8Base-RHOSE-4.12:openshift-ansible-0:4.12.0-202306090942.p0.g74dc7b3.assembly.stream.el8.src",
"8Base-RHOSE-4.12:openshift-ansible-test-0:4.12.0-202306090942.p0.g74dc7b3.assembly.stream.el8.noarch",
"8Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.aarch64",
"8Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.ppc64le",
"8Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.s390x",
"8Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.src",
"8Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.x86_64",
"8Base-RHOSE-4.12:openshift-clients-redistributable-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.x86_64",
"8Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el8.aarch64",
"8Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el8.ppc64le",
"8Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el8.s390x",
"8Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el8.x86_64",
"8Base-RHOSE-4.12:openshift-kuryr-0:4.12.0-202306140156.p0.g31dd228.assembly.stream.el8.src",
"8Base-RHOSE-4.12:openshift-kuryr-cni-0:4.12.0-202306140156.p0.g31dd228.assembly.stream.el8.noarch",
"8Base-RHOSE-4.12:openshift-kuryr-common-0:4.12.0-202306140156.p0.g31dd228.assembly.stream.el8.noarch",
"8Base-RHOSE-4.12:openshift-kuryr-controller-0:4.12.0-202306140156.p0.g31dd228.assembly.stream.el8.noarch",
"8Base-RHOSE-4.12:openshift4-aws-iso-0:4.12.0-202306090942.p0.gd2acdd5.assembly.stream.el8.noarch",
"8Base-RHOSE-4.12:openshift4-aws-iso-0:4.12.0-202306090942.p0.gd2acdd5.assembly.stream.el8.src",
"8Base-RHOSE-4.12:perf-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:perf-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:perf-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:perf-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:perf-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:perf-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:perf-debuginfo-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:perf-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:python3-kuryr-kubernetes-0:4.12.0-202306140156.p0.g31dd228.assembly.stream.el8.noarch",
"8Base-RHOSE-4.12:python3-perf-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:python3-perf-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:python3-perf-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:python3-perf-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:python3-perf-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:python3-perf-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:python3-perf-debuginfo-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:python3-perf-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:skopeo-2:1.9.4-3.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:skopeo-2:1.9.4-3.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:skopeo-2:1.9.4-3.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:skopeo-2:1.9.4-3.1.rhaos4.12.el8.src",
"8Base-RHOSE-4.12:skopeo-2:1.9.4-3.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.1.rhaos4.12.el8.x86_64",
"9Base-RHOSE-4.12:buildah-1:1.23.4-5.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:buildah-1:1.23.4-5.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:buildah-1:1.23.4-5.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:buildah-1:1.23.4-5.rhaos4.12.el9.src",
"9Base-RHOSE-4.12:buildah-1:1.23.4-5.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:conmon-2:2.1.2-5.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:conmon-2:2.1.2-5.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:conmon-2:2.1.2-5.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:conmon-2:2.1.2-5.rhaos4.12.el9.src",
"9Base-RHOSE-4.12:conmon-2:2.1.2-5.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-5.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-5.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-5.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-5.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-5.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-5.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-5.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-5.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:openshift-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el9.src",
"9Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.aarch64",
"9Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.ppc64le",
"9Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.s390x",
"9Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.src",
"9Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.x86_64",
"9Base-RHOSE-4.12:openshift-clients-redistributable-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.x86_64",
"9Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el9.aarch64",
"9Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el9.ppc64le",
"9Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el9.s390x",
"9Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el9.x86_64",
"9Base-RHOSE-4.12:skopeo-2:1.9.4-3.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:skopeo-2:1.9.4-3.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:skopeo-2:1.9.4-3.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:skopeo-2:1.9.4-3.rhaos4.12.el9.src",
"9Base-RHOSE-4.12:skopeo-2:1.9.4-3.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.rhaos4.12.el9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-32190"
},
{
"category": "external",
"summary": "RHBZ#2124668",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2124668"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-32190",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32190"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-32190",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-32190"
},
{
"category": "external",
"summary": "https://go.dev/issue/54385",
"url": "https://go.dev/issue/54385"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/x49AQzIVX-s/m/0tgO0pjiBQAJ",
"url": "https://groups.google.com/g/golang-announce/c/x49AQzIVX-s/m/0tgO0pjiBQAJ"
}
],
"release_date": "2022-09-06T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-06-26T01:19:15+00:00",
"details": "For OpenShift Container Platform 4.12 see the following documentation, which will be updated shortly for this release, for important instructions on how to upgrade your cluster and fully apply this asynchronous errata update:\n\nhttps://docs.openshift.com/container-platform/4.12/release_notes/ocp-4-12-release-notes.html",
"product_ids": [
"8Base-RHOSE-4.12:podman-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-3:4.2.0-6.1.rhaos4.12.el8.src",
"8Base-RHOSE-4.12:podman-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-catatonit-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-catatonit-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-catatonit-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-catatonit-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-debugsource-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-debugsource-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-debugsource-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-debugsource-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-docker-3:4.2.0-6.1.rhaos4.12.el8.noarch",
"8Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-plugins-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-plugins-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-plugins-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-plugins-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-remote-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-remote-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-remote-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-remote-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-tests-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-tests-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-tests-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-tests-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:runc-3:1.1.6-4.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:runc-3:1.1.6-4.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:runc-3:1.1.6-4.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:runc-3:1.1.6-4.rhaos4.12.el8.src",
"8Base-RHOSE-4.12:runc-3:1.1.6-4.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:runc-debuginfo-3:1.1.6-4.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:runc-debuginfo-3:1.1.6-4.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:runc-debuginfo-3:1.1.6-4.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:runc-debuginfo-3:1.1.6-4.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:runc-debugsource-3:1.1.6-4.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:runc-debugsource-3:1.1.6-4.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:runc-debugsource-3:1.1.6-4.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:runc-debugsource-3:1.1.6-4.rhaos4.12.el8.x86_64",
"9Base-RHOSE-4.12:podman-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-3:4.2.0-7.rhaos4.12.el9.src",
"9Base-RHOSE-4.12:podman-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-catatonit-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-catatonit-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-catatonit-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-catatonit-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-debugsource-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-debugsource-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-debugsource-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-debugsource-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-docker-3:4.2.0-7.rhaos4.12.el9.noarch",
"9Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-plugins-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-plugins-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-plugins-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-plugins-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-remote-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-remote-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-remote-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-remote-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-tests-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-tests-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-tests-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-tests-3:4.2.0-7.rhaos4.12.el9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:3613"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"8Base-RHOSE-4.12:bpftool-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:bpftool-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:bpftool-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:bpftool-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:bpftool-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:bpftool-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:bpftool-debuginfo-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:bpftool-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:buildah-1:1.23.4-5.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:buildah-1:1.23.4-5.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:buildah-1:1.23.4-5.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:buildah-1:1.23.4-5.1.rhaos4.12.el8.src",
"8Base-RHOSE-4.12:buildah-1:1.23.4-5.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:conmon-2:2.1.2-4.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:conmon-2:2.1.2-4.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:conmon-2:2.1.2-4.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:conmon-2:2.1.2-4.rhaos4.12.el8.src",
"8Base-RHOSE-4.12:conmon-2:2.1.2-4.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-4.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-4.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-4.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-4.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-4.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-4.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-4.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-4.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:containernetworking-plugins-0:1.0.1-7.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:containernetworking-plugins-0:1.0.1-7.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:containernetworking-plugins-0:1.0.1-7.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:containernetworking-plugins-0:1.0.1-7.rhaos4.12.el8.src",
"8Base-RHOSE-4.12:containernetworking-plugins-0:1.0.1-7.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:containernetworking-plugins-debuginfo-0:1.0.1-7.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:containernetworking-plugins-debuginfo-0:1.0.1-7.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:containernetworking-plugins-debuginfo-0:1.0.1-7.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:containernetworking-plugins-debuginfo-0:1.0.1-7.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:containernetworking-plugins-debugsource-0:1.0.1-7.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:containernetworking-plugins-debugsource-0:1.0.1-7.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:containernetworking-plugins-debugsource-0:1.0.1-7.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:containernetworking-plugins-debugsource-0:1.0.1-7.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:kernel-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-0:4.18.0-372.59.1.el8_6.src",
"8Base-RHOSE-4.12:kernel-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-core-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-core-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-core-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-core-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-cross-headers-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-cross-headers-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-cross-headers-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-cross-headers-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-debug-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-debug-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-debug-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-debug-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-debug-core-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-debug-core-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-debug-core-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-debug-core-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-debug-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-debug-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-debug-debuginfo-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-debug-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-debug-devel-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-debug-devel-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-debug-devel-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-debug-devel-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-debug-modules-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-debug-modules-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-debug-modules-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-debug-modules-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-debug-modules-extra-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-debug-modules-extra-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-debug-modules-extra-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-debug-modules-extra-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-debug-modules-internal-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-debug-modules-internal-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-debug-modules-internal-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-debug-modules-internal-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-debuginfo-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-debuginfo-common-aarch64-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-debuginfo-common-ppc64le-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-debuginfo-common-s390x-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-debuginfo-common-x86_64-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-devel-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-devel-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-devel-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-devel-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-doc-0:4.18.0-372.59.1.el8_6.noarch",
"8Base-RHOSE-4.12:kernel-headers-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-headers-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-headers-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-headers-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-ipaclones-internal-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-ipaclones-internal-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-modules-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-modules-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-modules-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-modules-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-modules-extra-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-modules-extra-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-modules-extra-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-modules-extra-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-modules-internal-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-modules-internal-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-modules-internal-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-modules-internal-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-0:4.18.0-372.59.1.rt7.217.el8_6.src",
"8Base-RHOSE-4.12:kernel-rt-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-core-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debug-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debug-core-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debug-debuginfo-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debug-devel-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debug-kvm-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debug-modules-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debug-modules-extra-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debug-modules-internal-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debuginfo-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-devel-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-kvm-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-modules-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-modules-extra-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-modules-internal-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-selftests-internal-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-selftests-internal-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-selftests-internal-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-selftests-internal-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-selftests-internal-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-tools-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-tools-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-tools-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-tools-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-tools-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-tools-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-tools-debuginfo-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-tools-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-tools-libs-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-tools-libs-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-tools-libs-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-tools-libs-devel-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-tools-libs-devel-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-tools-libs-devel-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-zfcpdump-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-zfcpdump-core-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-zfcpdump-debuginfo-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-zfcpdump-devel-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-zfcpdump-modules-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-zfcpdump-modules-extra-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-zfcpdump-modules-internal-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:openshift-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el8.src",
"8Base-RHOSE-4.12:openshift-ansible-0:4.12.0-202306090942.p0.g74dc7b3.assembly.stream.el8.noarch",
"8Base-RHOSE-4.12:openshift-ansible-0:4.12.0-202306090942.p0.g74dc7b3.assembly.stream.el8.src",
"8Base-RHOSE-4.12:openshift-ansible-test-0:4.12.0-202306090942.p0.g74dc7b3.assembly.stream.el8.noarch",
"8Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.aarch64",
"8Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.ppc64le",
"8Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.s390x",
"8Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.src",
"8Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.x86_64",
"8Base-RHOSE-4.12:openshift-clients-redistributable-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.x86_64",
"8Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el8.aarch64",
"8Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el8.ppc64le",
"8Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el8.s390x",
"8Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el8.x86_64",
"8Base-RHOSE-4.12:openshift-kuryr-0:4.12.0-202306140156.p0.g31dd228.assembly.stream.el8.src",
"8Base-RHOSE-4.12:openshift-kuryr-cni-0:4.12.0-202306140156.p0.g31dd228.assembly.stream.el8.noarch",
"8Base-RHOSE-4.12:openshift-kuryr-common-0:4.12.0-202306140156.p0.g31dd228.assembly.stream.el8.noarch",
"8Base-RHOSE-4.12:openshift-kuryr-controller-0:4.12.0-202306140156.p0.g31dd228.assembly.stream.el8.noarch",
"8Base-RHOSE-4.12:openshift4-aws-iso-0:4.12.0-202306090942.p0.gd2acdd5.assembly.stream.el8.noarch",
"8Base-RHOSE-4.12:openshift4-aws-iso-0:4.12.0-202306090942.p0.gd2acdd5.assembly.stream.el8.src",
"8Base-RHOSE-4.12:perf-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:perf-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:perf-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:perf-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:perf-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:perf-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:perf-debuginfo-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:perf-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:podman-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-3:4.2.0-6.1.rhaos4.12.el8.src",
"8Base-RHOSE-4.12:podman-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-catatonit-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-catatonit-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-catatonit-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-catatonit-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-debugsource-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-debugsource-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-debugsource-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-debugsource-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-docker-3:4.2.0-6.1.rhaos4.12.el8.noarch",
"8Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-plugins-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-plugins-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-plugins-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-plugins-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-remote-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-remote-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-remote-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-remote-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-tests-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-tests-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-tests-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-tests-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:python3-kuryr-kubernetes-0:4.12.0-202306140156.p0.g31dd228.assembly.stream.el8.noarch",
"8Base-RHOSE-4.12:python3-perf-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:python3-perf-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:python3-perf-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:python3-perf-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:python3-perf-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:python3-perf-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:python3-perf-debuginfo-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:python3-perf-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:runc-3:1.1.6-4.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:runc-3:1.1.6-4.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:runc-3:1.1.6-4.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:runc-3:1.1.6-4.rhaos4.12.el8.src",
"8Base-RHOSE-4.12:runc-3:1.1.6-4.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:runc-debuginfo-3:1.1.6-4.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:runc-debuginfo-3:1.1.6-4.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:runc-debuginfo-3:1.1.6-4.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:runc-debuginfo-3:1.1.6-4.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:runc-debugsource-3:1.1.6-4.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:runc-debugsource-3:1.1.6-4.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:runc-debugsource-3:1.1.6-4.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:runc-debugsource-3:1.1.6-4.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:skopeo-2:1.9.4-3.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:skopeo-2:1.9.4-3.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:skopeo-2:1.9.4-3.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:skopeo-2:1.9.4-3.1.rhaos4.12.el8.src",
"8Base-RHOSE-4.12:skopeo-2:1.9.4-3.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.1.rhaos4.12.el8.x86_64",
"9Base-RHOSE-4.12:buildah-1:1.23.4-5.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:buildah-1:1.23.4-5.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:buildah-1:1.23.4-5.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:buildah-1:1.23.4-5.rhaos4.12.el9.src",
"9Base-RHOSE-4.12:buildah-1:1.23.4-5.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:conmon-2:2.1.2-5.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:conmon-2:2.1.2-5.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:conmon-2:2.1.2-5.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:conmon-2:2.1.2-5.rhaos4.12.el9.src",
"9Base-RHOSE-4.12:conmon-2:2.1.2-5.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-5.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-5.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-5.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-5.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-5.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-5.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-5.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-5.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:openshift-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el9.src",
"9Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.aarch64",
"9Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.ppc64le",
"9Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.s390x",
"9Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.src",
"9Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.x86_64",
"9Base-RHOSE-4.12:openshift-clients-redistributable-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.x86_64",
"9Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el9.aarch64",
"9Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el9.ppc64le",
"9Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el9.s390x",
"9Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el9.x86_64",
"9Base-RHOSE-4.12:podman-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-3:4.2.0-7.rhaos4.12.el9.src",
"9Base-RHOSE-4.12:podman-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-catatonit-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-catatonit-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-catatonit-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-catatonit-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-debugsource-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-debugsource-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-debugsource-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-debugsource-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-docker-3:4.2.0-7.rhaos4.12.el9.noarch",
"9Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-plugins-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-plugins-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-plugins-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-plugins-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-remote-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-remote-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-remote-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-remote-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-tests-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-tests-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-tests-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-tests-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:skopeo-2:1.9.4-3.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:skopeo-2:1.9.4-3.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:skopeo-2:1.9.4-3.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:skopeo-2:1.9.4-3.rhaos4.12.el9.src",
"9Base-RHOSE-4.12:skopeo-2:1.9.4-3.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.rhaos4.12.el9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "golang: net/url: JoinPath does not strip relative path components in all circumstances"
},
{
"acknowledgments": [
{
"names": [
"Adam Korczynski"
],
"organization": "ADA Logics"
},
{
"names": [
"OSS-Fuzz"
]
}
],
"cve": "CVE-2022-41715",
"discovery_date": "2022-10-07T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-RHOSE-4.12:bpftool-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:bpftool-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:bpftool-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:bpftool-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:bpftool-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:bpftool-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:bpftool-debuginfo-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:bpftool-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:buildah-1:1.23.4-5.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:buildah-1:1.23.4-5.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:buildah-1:1.23.4-5.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:buildah-1:1.23.4-5.1.rhaos4.12.el8.src",
"8Base-RHOSE-4.12:buildah-1:1.23.4-5.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:containernetworking-plugins-0:1.0.1-7.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:containernetworking-plugins-0:1.0.1-7.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:containernetworking-plugins-0:1.0.1-7.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:containernetworking-plugins-0:1.0.1-7.rhaos4.12.el8.src",
"8Base-RHOSE-4.12:containernetworking-plugins-0:1.0.1-7.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:containernetworking-plugins-debuginfo-0:1.0.1-7.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:containernetworking-plugins-debuginfo-0:1.0.1-7.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:containernetworking-plugins-debuginfo-0:1.0.1-7.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:containernetworking-plugins-debuginfo-0:1.0.1-7.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:containernetworking-plugins-debugsource-0:1.0.1-7.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:containernetworking-plugins-debugsource-0:1.0.1-7.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:containernetworking-plugins-debugsource-0:1.0.1-7.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:containernetworking-plugins-debugsource-0:1.0.1-7.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:kernel-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-0:4.18.0-372.59.1.el8_6.src",
"8Base-RHOSE-4.12:kernel-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-core-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-core-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-core-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-core-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-cross-headers-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-cross-headers-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-cross-headers-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-cross-headers-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-debug-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-debug-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-debug-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-debug-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-debug-core-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-debug-core-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-debug-core-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-debug-core-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-debug-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-debug-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-debug-debuginfo-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-debug-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-debug-devel-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-debug-devel-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-debug-devel-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-debug-devel-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-debug-modules-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-debug-modules-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-debug-modules-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-debug-modules-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-debug-modules-extra-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-debug-modules-extra-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-debug-modules-extra-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-debug-modules-extra-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-debug-modules-internal-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-debug-modules-internal-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-debug-modules-internal-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-debug-modules-internal-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-debuginfo-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-debuginfo-common-aarch64-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-debuginfo-common-ppc64le-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-debuginfo-common-s390x-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-debuginfo-common-x86_64-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-devel-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-devel-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-devel-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-devel-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-doc-0:4.18.0-372.59.1.el8_6.noarch",
"8Base-RHOSE-4.12:kernel-headers-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-headers-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-headers-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-headers-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-ipaclones-internal-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-ipaclones-internal-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-modules-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-modules-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-modules-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-modules-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-modules-extra-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-modules-extra-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-modules-extra-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-modules-extra-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-modules-internal-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-modules-internal-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-modules-internal-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-modules-internal-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-0:4.18.0-372.59.1.rt7.217.el8_6.src",
"8Base-RHOSE-4.12:kernel-rt-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-core-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debug-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debug-core-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debug-debuginfo-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debug-devel-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debug-kvm-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debug-modules-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debug-modules-extra-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debug-modules-internal-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debuginfo-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-devel-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-kvm-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-modules-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-modules-extra-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-modules-internal-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-selftests-internal-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-selftests-internal-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-selftests-internal-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-selftests-internal-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-selftests-internal-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-tools-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-tools-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-tools-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-tools-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-tools-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-tools-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-tools-debuginfo-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-tools-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-tools-libs-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-tools-libs-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-tools-libs-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-tools-libs-devel-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-tools-libs-devel-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-tools-libs-devel-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-zfcpdump-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-zfcpdump-core-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-zfcpdump-debuginfo-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-zfcpdump-devel-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-zfcpdump-modules-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-zfcpdump-modules-extra-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-zfcpdump-modules-internal-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:openshift-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el8.src",
"8Base-RHOSE-4.12:openshift-ansible-0:4.12.0-202306090942.p0.g74dc7b3.assembly.stream.el8.noarch",
"8Base-RHOSE-4.12:openshift-ansible-0:4.12.0-202306090942.p0.g74dc7b3.assembly.stream.el8.src",
"8Base-RHOSE-4.12:openshift-ansible-test-0:4.12.0-202306090942.p0.g74dc7b3.assembly.stream.el8.noarch",
"8Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.aarch64",
"8Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.ppc64le",
"8Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.s390x",
"8Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.src",
"8Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.x86_64",
"8Base-RHOSE-4.12:openshift-clients-redistributable-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.x86_64",
"8Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el8.aarch64",
"8Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el8.ppc64le",
"8Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el8.s390x",
"8Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el8.x86_64",
"8Base-RHOSE-4.12:openshift-kuryr-0:4.12.0-202306140156.p0.g31dd228.assembly.stream.el8.src",
"8Base-RHOSE-4.12:openshift-kuryr-cni-0:4.12.0-202306140156.p0.g31dd228.assembly.stream.el8.noarch",
"8Base-RHOSE-4.12:openshift-kuryr-common-0:4.12.0-202306140156.p0.g31dd228.assembly.stream.el8.noarch",
"8Base-RHOSE-4.12:openshift-kuryr-controller-0:4.12.0-202306140156.p0.g31dd228.assembly.stream.el8.noarch",
"8Base-RHOSE-4.12:openshift4-aws-iso-0:4.12.0-202306090942.p0.gd2acdd5.assembly.stream.el8.noarch",
"8Base-RHOSE-4.12:openshift4-aws-iso-0:4.12.0-202306090942.p0.gd2acdd5.assembly.stream.el8.src",
"8Base-RHOSE-4.12:perf-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:perf-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:perf-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:perf-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:perf-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:perf-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:perf-debuginfo-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:perf-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:python3-kuryr-kubernetes-0:4.12.0-202306140156.p0.g31dd228.assembly.stream.el8.noarch",
"8Base-RHOSE-4.12:python3-perf-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:python3-perf-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:python3-perf-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:python3-perf-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:python3-perf-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:python3-perf-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:python3-perf-debuginfo-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:python3-perf-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64",
"9Base-RHOSE-4.12:buildah-1:1.23.4-5.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:buildah-1:1.23.4-5.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:buildah-1:1.23.4-5.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:buildah-1:1.23.4-5.rhaos4.12.el9.src",
"9Base-RHOSE-4.12:buildah-1:1.23.4-5.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:openshift-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el9.src",
"9Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.aarch64",
"9Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.ppc64le",
"9Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.s390x",
"9Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.src",
"9Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.x86_64",
"9Base-RHOSE-4.12:openshift-clients-redistributable-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.x86_64",
"9Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el9.aarch64",
"9Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el9.ppc64le",
"9Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el9.s390x",
"9Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el9.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2132872"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the golang package, where programs that compile regular expressions from untrusted sources are vulnerable to memory exhaustion or a denial of service. The parsed regexp representation is linear in the input size. Still, in some cases, the constant factor can be as high as 40,000, making a relatively small regexp consume larger amounts of memory. After the fix, each regexp being parsed is limited to a 256 MB memory footprint. Regular expressions whose representation would use more space than that are rejected. Routine use of regular expressions is unaffected.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: regexp/syntax: limit memory used by parsing regexps",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The opportunity for a Denial of Service is limited to the golang runtime. In the case of OpenShift Container Platform, this would be restricted within each individual container. There are multiple layers of guide rails (Golang\u2019s Garbage Collector; OpenShift\u2019s resource constraints imposed at the container and cluster levels) which would require a malicious user to continue submitting attacks for there to be any enduring impact. They would also need access to external server resources to be able to send a massive volume of requests to cause a significant impact on server operations.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-RHOSE-4.12:conmon-2:2.1.2-4.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:conmon-2:2.1.2-4.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:conmon-2:2.1.2-4.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:conmon-2:2.1.2-4.rhaos4.12.el8.src",
"8Base-RHOSE-4.12:conmon-2:2.1.2-4.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-4.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-4.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-4.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-4.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-4.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-4.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-4.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-4.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-3:4.2.0-6.1.rhaos4.12.el8.src",
"8Base-RHOSE-4.12:podman-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-catatonit-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-catatonit-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-catatonit-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-catatonit-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-debugsource-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-debugsource-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-debugsource-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-debugsource-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-docker-3:4.2.0-6.1.rhaos4.12.el8.noarch",
"8Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-plugins-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-plugins-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-plugins-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-plugins-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-remote-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-remote-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-remote-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-remote-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-tests-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-tests-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-tests-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-tests-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:runc-3:1.1.6-4.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:runc-3:1.1.6-4.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:runc-3:1.1.6-4.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:runc-3:1.1.6-4.rhaos4.12.el8.src",
"8Base-RHOSE-4.12:runc-3:1.1.6-4.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:runc-debuginfo-3:1.1.6-4.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:runc-debuginfo-3:1.1.6-4.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:runc-debuginfo-3:1.1.6-4.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:runc-debuginfo-3:1.1.6-4.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:runc-debugsource-3:1.1.6-4.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:runc-debugsource-3:1.1.6-4.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:runc-debugsource-3:1.1.6-4.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:runc-debugsource-3:1.1.6-4.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:skopeo-2:1.9.4-3.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:skopeo-2:1.9.4-3.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:skopeo-2:1.9.4-3.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:skopeo-2:1.9.4-3.1.rhaos4.12.el8.src",
"8Base-RHOSE-4.12:skopeo-2:1.9.4-3.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.1.rhaos4.12.el8.x86_64",
"9Base-RHOSE-4.12:conmon-2:2.1.2-5.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:conmon-2:2.1.2-5.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:conmon-2:2.1.2-5.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:conmon-2:2.1.2-5.rhaos4.12.el9.src",
"9Base-RHOSE-4.12:conmon-2:2.1.2-5.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-5.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-5.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-5.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-5.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-5.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-5.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-5.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-5.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-3:4.2.0-7.rhaos4.12.el9.src",
"9Base-RHOSE-4.12:podman-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-catatonit-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-catatonit-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-catatonit-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-catatonit-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-debugsource-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-debugsource-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-debugsource-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-debugsource-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-docker-3:4.2.0-7.rhaos4.12.el9.noarch",
"9Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-plugins-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-plugins-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-plugins-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-plugins-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-remote-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-remote-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-remote-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-remote-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-tests-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-tests-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-tests-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-tests-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:skopeo-2:1.9.4-3.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:skopeo-2:1.9.4-3.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:skopeo-2:1.9.4-3.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:skopeo-2:1.9.4-3.rhaos4.12.el9.src",
"9Base-RHOSE-4.12:skopeo-2:1.9.4-3.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.rhaos4.12.el9.x86_64"
],
"known_not_affected": [
"8Base-RHOSE-4.12:bpftool-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:bpftool-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:bpftool-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:bpftool-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:bpftool-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:bpftool-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:bpftool-debuginfo-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:bpftool-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:buildah-1:1.23.4-5.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:buildah-1:1.23.4-5.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:buildah-1:1.23.4-5.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:buildah-1:1.23.4-5.1.rhaos4.12.el8.src",
"8Base-RHOSE-4.12:buildah-1:1.23.4-5.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:containernetworking-plugins-0:1.0.1-7.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:containernetworking-plugins-0:1.0.1-7.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:containernetworking-plugins-0:1.0.1-7.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:containernetworking-plugins-0:1.0.1-7.rhaos4.12.el8.src",
"8Base-RHOSE-4.12:containernetworking-plugins-0:1.0.1-7.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:containernetworking-plugins-debuginfo-0:1.0.1-7.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:containernetworking-plugins-debuginfo-0:1.0.1-7.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:containernetworking-plugins-debuginfo-0:1.0.1-7.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:containernetworking-plugins-debuginfo-0:1.0.1-7.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:containernetworking-plugins-debugsource-0:1.0.1-7.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:containernetworking-plugins-debugsource-0:1.0.1-7.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:containernetworking-plugins-debugsource-0:1.0.1-7.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:containernetworking-plugins-debugsource-0:1.0.1-7.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:kernel-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-0:4.18.0-372.59.1.el8_6.src",
"8Base-RHOSE-4.12:kernel-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-core-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-core-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-core-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-core-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-cross-headers-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-cross-headers-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-cross-headers-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-cross-headers-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-debug-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-debug-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-debug-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-debug-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-debug-core-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-debug-core-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-debug-core-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-debug-core-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-debug-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-debug-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-debug-debuginfo-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-debug-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-debug-devel-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-debug-devel-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-debug-devel-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-debug-devel-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-debug-modules-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-debug-modules-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-debug-modules-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-debug-modules-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-debug-modules-extra-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-debug-modules-extra-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-debug-modules-extra-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-debug-modules-extra-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-debug-modules-internal-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-debug-modules-internal-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-debug-modules-internal-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-debug-modules-internal-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-debuginfo-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-debuginfo-common-aarch64-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-debuginfo-common-ppc64le-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-debuginfo-common-s390x-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-debuginfo-common-x86_64-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-devel-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-devel-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-devel-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-devel-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-doc-0:4.18.0-372.59.1.el8_6.noarch",
"8Base-RHOSE-4.12:kernel-headers-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-headers-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-headers-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-headers-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-ipaclones-internal-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-ipaclones-internal-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-modules-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-modules-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-modules-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-modules-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-modules-extra-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-modules-extra-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-modules-extra-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-modules-extra-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-modules-internal-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-modules-internal-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-modules-internal-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-modules-internal-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-0:4.18.0-372.59.1.rt7.217.el8_6.src",
"8Base-RHOSE-4.12:kernel-rt-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-core-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debug-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debug-core-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debug-debuginfo-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debug-devel-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debug-kvm-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debug-modules-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debug-modules-extra-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debug-modules-internal-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debuginfo-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-devel-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-kvm-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-modules-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-modules-extra-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-modules-internal-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-selftests-internal-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-selftests-internal-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-selftests-internal-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-selftests-internal-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-selftests-internal-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-tools-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-tools-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-tools-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-tools-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-tools-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-tools-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-tools-debuginfo-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-tools-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-tools-libs-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-tools-libs-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-tools-libs-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-tools-libs-devel-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-tools-libs-devel-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-tools-libs-devel-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-zfcpdump-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-zfcpdump-core-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-zfcpdump-debuginfo-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-zfcpdump-devel-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-zfcpdump-modules-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-zfcpdump-modules-extra-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-zfcpdump-modules-internal-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:openshift-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el8.src",
"8Base-RHOSE-4.12:openshift-ansible-0:4.12.0-202306090942.p0.g74dc7b3.assembly.stream.el8.noarch",
"8Base-RHOSE-4.12:openshift-ansible-0:4.12.0-202306090942.p0.g74dc7b3.assembly.stream.el8.src",
"8Base-RHOSE-4.12:openshift-ansible-test-0:4.12.0-202306090942.p0.g74dc7b3.assembly.stream.el8.noarch",
"8Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.aarch64",
"8Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.ppc64le",
"8Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.s390x",
"8Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.src",
"8Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.x86_64",
"8Base-RHOSE-4.12:openshift-clients-redistributable-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.x86_64",
"8Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el8.aarch64",
"8Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el8.ppc64le",
"8Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el8.s390x",
"8Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el8.x86_64",
"8Base-RHOSE-4.12:openshift-kuryr-0:4.12.0-202306140156.p0.g31dd228.assembly.stream.el8.src",
"8Base-RHOSE-4.12:openshift-kuryr-cni-0:4.12.0-202306140156.p0.g31dd228.assembly.stream.el8.noarch",
"8Base-RHOSE-4.12:openshift-kuryr-common-0:4.12.0-202306140156.p0.g31dd228.assembly.stream.el8.noarch",
"8Base-RHOSE-4.12:openshift-kuryr-controller-0:4.12.0-202306140156.p0.g31dd228.assembly.stream.el8.noarch",
"8Base-RHOSE-4.12:openshift4-aws-iso-0:4.12.0-202306090942.p0.gd2acdd5.assembly.stream.el8.noarch",
"8Base-RHOSE-4.12:openshift4-aws-iso-0:4.12.0-202306090942.p0.gd2acdd5.assembly.stream.el8.src",
"8Base-RHOSE-4.12:perf-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:perf-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:perf-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:perf-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:perf-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:perf-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:perf-debuginfo-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:perf-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:python3-kuryr-kubernetes-0:4.12.0-202306140156.p0.g31dd228.assembly.stream.el8.noarch",
"8Base-RHOSE-4.12:python3-perf-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:python3-perf-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:python3-perf-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:python3-perf-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:python3-perf-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:python3-perf-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:python3-perf-debuginfo-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:python3-perf-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64",
"9Base-RHOSE-4.12:buildah-1:1.23.4-5.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:buildah-1:1.23.4-5.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:buildah-1:1.23.4-5.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:buildah-1:1.23.4-5.rhaos4.12.el9.src",
"9Base-RHOSE-4.12:buildah-1:1.23.4-5.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:openshift-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el9.src",
"9Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.aarch64",
"9Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.ppc64le",
"9Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.s390x",
"9Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.src",
"9Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.x86_64",
"9Base-RHOSE-4.12:openshift-clients-redistributable-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.x86_64",
"9Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el9.aarch64",
"9Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el9.ppc64le",
"9Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el9.s390x",
"9Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-41715"
},
{
"category": "external",
"summary": "RHBZ#2132872",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2132872"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-41715",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41715"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-41715",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-41715"
},
{
"category": "external",
"summary": "https://github.com/golang/go/issues/55949",
"url": "https://github.com/golang/go/issues/55949"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/xtuG5faxtaU?pli=1",
"url": "https://groups.google.com/g/golang-announce/c/xtuG5faxtaU?pli=1"
}
],
"release_date": "2022-10-04T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-06-26T01:19:15+00:00",
"details": "For OpenShift Container Platform 4.12 see the following documentation, which will be updated shortly for this release, for important instructions on how to upgrade your cluster and fully apply this asynchronous errata update:\n\nhttps://docs.openshift.com/container-platform/4.12/release_notes/ocp-4-12-release-notes.html",
"product_ids": [
"8Base-RHOSE-4.12:conmon-2:2.1.2-4.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:conmon-2:2.1.2-4.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:conmon-2:2.1.2-4.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:conmon-2:2.1.2-4.rhaos4.12.el8.src",
"8Base-RHOSE-4.12:conmon-2:2.1.2-4.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-4.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-4.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-4.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-4.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-4.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-4.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-4.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-4.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-3:4.2.0-6.1.rhaos4.12.el8.src",
"8Base-RHOSE-4.12:podman-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-catatonit-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-catatonit-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-catatonit-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-catatonit-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-debugsource-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-debugsource-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-debugsource-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-debugsource-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-docker-3:4.2.0-6.1.rhaos4.12.el8.noarch",
"8Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-plugins-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-plugins-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-plugins-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-plugins-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-remote-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-remote-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-remote-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-remote-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-tests-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-tests-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-tests-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-tests-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:runc-3:1.1.6-4.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:runc-3:1.1.6-4.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:runc-3:1.1.6-4.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:runc-3:1.1.6-4.rhaos4.12.el8.src",
"8Base-RHOSE-4.12:runc-3:1.1.6-4.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:runc-debuginfo-3:1.1.6-4.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:runc-debuginfo-3:1.1.6-4.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:runc-debuginfo-3:1.1.6-4.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:runc-debuginfo-3:1.1.6-4.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:runc-debugsource-3:1.1.6-4.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:runc-debugsource-3:1.1.6-4.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:runc-debugsource-3:1.1.6-4.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:runc-debugsource-3:1.1.6-4.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:skopeo-2:1.9.4-3.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:skopeo-2:1.9.4-3.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:skopeo-2:1.9.4-3.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:skopeo-2:1.9.4-3.1.rhaos4.12.el8.src",
"8Base-RHOSE-4.12:skopeo-2:1.9.4-3.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.1.rhaos4.12.el8.x86_64",
"9Base-RHOSE-4.12:conmon-2:2.1.2-5.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:conmon-2:2.1.2-5.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:conmon-2:2.1.2-5.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:conmon-2:2.1.2-5.rhaos4.12.el9.src",
"9Base-RHOSE-4.12:conmon-2:2.1.2-5.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-5.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-5.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-5.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-5.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-5.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-5.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-5.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-5.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-3:4.2.0-7.rhaos4.12.el9.src",
"9Base-RHOSE-4.12:podman-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-catatonit-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-catatonit-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-catatonit-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-catatonit-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-debugsource-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-debugsource-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-debugsource-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-debugsource-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-docker-3:4.2.0-7.rhaos4.12.el9.noarch",
"9Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-plugins-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-plugins-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-plugins-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-plugins-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-remote-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-remote-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-remote-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-remote-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-tests-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-tests-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-tests-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-tests-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:skopeo-2:1.9.4-3.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:skopeo-2:1.9.4-3.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:skopeo-2:1.9.4-3.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:skopeo-2:1.9.4-3.rhaos4.12.el9.src",
"9Base-RHOSE-4.12:skopeo-2:1.9.4-3.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.rhaos4.12.el9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:3613"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"8Base-RHOSE-4.12:bpftool-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:bpftool-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:bpftool-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:bpftool-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:bpftool-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:bpftool-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:bpftool-debuginfo-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:bpftool-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:buildah-1:1.23.4-5.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:buildah-1:1.23.4-5.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:buildah-1:1.23.4-5.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:buildah-1:1.23.4-5.1.rhaos4.12.el8.src",
"8Base-RHOSE-4.12:buildah-1:1.23.4-5.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:conmon-2:2.1.2-4.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:conmon-2:2.1.2-4.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:conmon-2:2.1.2-4.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:conmon-2:2.1.2-4.rhaos4.12.el8.src",
"8Base-RHOSE-4.12:conmon-2:2.1.2-4.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-4.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-4.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-4.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-4.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-4.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-4.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-4.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-4.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:containernetworking-plugins-0:1.0.1-7.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:containernetworking-plugins-0:1.0.1-7.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:containernetworking-plugins-0:1.0.1-7.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:containernetworking-plugins-0:1.0.1-7.rhaos4.12.el8.src",
"8Base-RHOSE-4.12:containernetworking-plugins-0:1.0.1-7.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:containernetworking-plugins-debuginfo-0:1.0.1-7.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:containernetworking-plugins-debuginfo-0:1.0.1-7.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:containernetworking-plugins-debuginfo-0:1.0.1-7.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:containernetworking-plugins-debuginfo-0:1.0.1-7.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:containernetworking-plugins-debugsource-0:1.0.1-7.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:containernetworking-plugins-debugsource-0:1.0.1-7.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:containernetworking-plugins-debugsource-0:1.0.1-7.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:containernetworking-plugins-debugsource-0:1.0.1-7.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:kernel-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-0:4.18.0-372.59.1.el8_6.src",
"8Base-RHOSE-4.12:kernel-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-core-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-core-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-core-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-core-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-cross-headers-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-cross-headers-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-cross-headers-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-cross-headers-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-debug-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-debug-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-debug-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-debug-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-debug-core-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-debug-core-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-debug-core-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-debug-core-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-debug-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-debug-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-debug-debuginfo-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-debug-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-debug-devel-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-debug-devel-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-debug-devel-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-debug-devel-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-debug-modules-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-debug-modules-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-debug-modules-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-debug-modules-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-debug-modules-extra-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-debug-modules-extra-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-debug-modules-extra-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-debug-modules-extra-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-debug-modules-internal-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-debug-modules-internal-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-debug-modules-internal-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-debug-modules-internal-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-debuginfo-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-debuginfo-common-aarch64-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-debuginfo-common-ppc64le-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-debuginfo-common-s390x-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-debuginfo-common-x86_64-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-devel-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-devel-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-devel-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-devel-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-doc-0:4.18.0-372.59.1.el8_6.noarch",
"8Base-RHOSE-4.12:kernel-headers-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-headers-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-headers-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-headers-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-ipaclones-internal-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-ipaclones-internal-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-modules-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-modules-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-modules-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-modules-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-modules-extra-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-modules-extra-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-modules-extra-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-modules-extra-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-modules-internal-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-modules-internal-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-modules-internal-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-modules-internal-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-0:4.18.0-372.59.1.rt7.217.el8_6.src",
"8Base-RHOSE-4.12:kernel-rt-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-core-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debug-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debug-core-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debug-debuginfo-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debug-devel-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debug-kvm-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debug-modules-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debug-modules-extra-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debug-modules-internal-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debuginfo-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-devel-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-kvm-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-modules-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-modules-extra-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-modules-internal-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-selftests-internal-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-selftests-internal-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-selftests-internal-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-selftests-internal-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-selftests-internal-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-tools-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-tools-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-tools-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-tools-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-tools-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-tools-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-tools-debuginfo-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-tools-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-tools-libs-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-tools-libs-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-tools-libs-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-tools-libs-devel-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-tools-libs-devel-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-tools-libs-devel-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-zfcpdump-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-zfcpdump-core-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-zfcpdump-debuginfo-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-zfcpdump-devel-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-zfcpdump-modules-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-zfcpdump-modules-extra-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-zfcpdump-modules-internal-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:openshift-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el8.src",
"8Base-RHOSE-4.12:openshift-ansible-0:4.12.0-202306090942.p0.g74dc7b3.assembly.stream.el8.noarch",
"8Base-RHOSE-4.12:openshift-ansible-0:4.12.0-202306090942.p0.g74dc7b3.assembly.stream.el8.src",
"8Base-RHOSE-4.12:openshift-ansible-test-0:4.12.0-202306090942.p0.g74dc7b3.assembly.stream.el8.noarch",
"8Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.aarch64",
"8Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.ppc64le",
"8Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.s390x",
"8Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.src",
"8Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.x86_64",
"8Base-RHOSE-4.12:openshift-clients-redistributable-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.x86_64",
"8Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el8.aarch64",
"8Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el8.ppc64le",
"8Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el8.s390x",
"8Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el8.x86_64",
"8Base-RHOSE-4.12:openshift-kuryr-0:4.12.0-202306140156.p0.g31dd228.assembly.stream.el8.src",
"8Base-RHOSE-4.12:openshift-kuryr-cni-0:4.12.0-202306140156.p0.g31dd228.assembly.stream.el8.noarch",
"8Base-RHOSE-4.12:openshift-kuryr-common-0:4.12.0-202306140156.p0.g31dd228.assembly.stream.el8.noarch",
"8Base-RHOSE-4.12:openshift-kuryr-controller-0:4.12.0-202306140156.p0.g31dd228.assembly.stream.el8.noarch",
"8Base-RHOSE-4.12:openshift4-aws-iso-0:4.12.0-202306090942.p0.gd2acdd5.assembly.stream.el8.noarch",
"8Base-RHOSE-4.12:openshift4-aws-iso-0:4.12.0-202306090942.p0.gd2acdd5.assembly.stream.el8.src",
"8Base-RHOSE-4.12:perf-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:perf-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:perf-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:perf-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:perf-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:perf-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:perf-debuginfo-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:perf-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:podman-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-3:4.2.0-6.1.rhaos4.12.el8.src",
"8Base-RHOSE-4.12:podman-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-catatonit-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-catatonit-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-catatonit-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-catatonit-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-debugsource-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-debugsource-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-debugsource-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-debugsource-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-docker-3:4.2.0-6.1.rhaos4.12.el8.noarch",
"8Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-plugins-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-plugins-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-plugins-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-plugins-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-remote-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-remote-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-remote-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-remote-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-tests-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-tests-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-tests-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-tests-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:python3-kuryr-kubernetes-0:4.12.0-202306140156.p0.g31dd228.assembly.stream.el8.noarch",
"8Base-RHOSE-4.12:python3-perf-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:python3-perf-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:python3-perf-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:python3-perf-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:python3-perf-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:python3-perf-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:python3-perf-debuginfo-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:python3-perf-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:runc-3:1.1.6-4.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:runc-3:1.1.6-4.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:runc-3:1.1.6-4.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:runc-3:1.1.6-4.rhaos4.12.el8.src",
"8Base-RHOSE-4.12:runc-3:1.1.6-4.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:runc-debuginfo-3:1.1.6-4.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:runc-debuginfo-3:1.1.6-4.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:runc-debuginfo-3:1.1.6-4.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:runc-debuginfo-3:1.1.6-4.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:runc-debugsource-3:1.1.6-4.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:runc-debugsource-3:1.1.6-4.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:runc-debugsource-3:1.1.6-4.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:runc-debugsource-3:1.1.6-4.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:skopeo-2:1.9.4-3.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:skopeo-2:1.9.4-3.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:skopeo-2:1.9.4-3.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:skopeo-2:1.9.4-3.1.rhaos4.12.el8.src",
"8Base-RHOSE-4.12:skopeo-2:1.9.4-3.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.1.rhaos4.12.el8.x86_64",
"9Base-RHOSE-4.12:buildah-1:1.23.4-5.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:buildah-1:1.23.4-5.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:buildah-1:1.23.4-5.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:buildah-1:1.23.4-5.rhaos4.12.el9.src",
"9Base-RHOSE-4.12:buildah-1:1.23.4-5.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:conmon-2:2.1.2-5.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:conmon-2:2.1.2-5.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:conmon-2:2.1.2-5.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:conmon-2:2.1.2-5.rhaos4.12.el9.src",
"9Base-RHOSE-4.12:conmon-2:2.1.2-5.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-5.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-5.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-5.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-5.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-5.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-5.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-5.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-5.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:openshift-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el9.src",
"9Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.aarch64",
"9Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.ppc64le",
"9Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.s390x",
"9Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.src",
"9Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.x86_64",
"9Base-RHOSE-4.12:openshift-clients-redistributable-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.x86_64",
"9Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el9.aarch64",
"9Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el9.ppc64le",
"9Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el9.s390x",
"9Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el9.x86_64",
"9Base-RHOSE-4.12:podman-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-3:4.2.0-7.rhaos4.12.el9.src",
"9Base-RHOSE-4.12:podman-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-catatonit-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-catatonit-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-catatonit-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-catatonit-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-debugsource-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-debugsource-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-debugsource-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-debugsource-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-docker-3:4.2.0-7.rhaos4.12.el9.noarch",
"9Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-plugins-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-plugins-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-plugins-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-plugins-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-remote-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-remote-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-remote-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-remote-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-tests-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-tests-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-tests-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-tests-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:skopeo-2:1.9.4-3.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:skopeo-2:1.9.4-3.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:skopeo-2:1.9.4-3.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:skopeo-2:1.9.4-3.rhaos4.12.el9.src",
"9Base-RHOSE-4.12:skopeo-2:1.9.4-3.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.rhaos4.12.el9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "golang: regexp/syntax: limit memory used by parsing regexps"
}
]
}
rhsa-2024_1994
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for the container-tools:rhel8 module is now available for Red Hat Enterprise Linux 8.6 Extended Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc.\n\nSecurity Fix(es):\n\n* podman: golang.org/x/text/language: ParseAcceptLanguage takes a long time to parse complex tags (CVE-2022-32149)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2024:1994",
"url": "https://access.redhat.com/errata/RHSA-2024:1994"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#moderate",
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "2134010",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2134010"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_1994.json"
}
],
"title": "Red Hat Security Advisory: container-tools:rhel8 security update",
"tracking": {
"current_release_date": "2025-01-06T19:40:03+00:00",
"generator": {
"date": "2025-01-06T19:40:03+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.5"
}
},
"id": "RHSA-2024:1994",
"initial_release_date": "2024-04-23T14:16:09+00:00",
"revision_history": [
{
"date": "2024-04-23T14:16:09+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2024-04-23T14:16:09+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-01-06T19:40:03+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product": {
"name": "Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_eus:8.6::appstream"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "container-tools:rhel8:8060020240413110723:3b538bd8",
"product": {
"name": "container-tools:rhel8:8060020240413110723:3b538bd8",
"product_id": "container-tools:rhel8:8060020240413110723:3b538bd8",
"product_identification_helper": {
"purl": "pkg:rpmmod/redhat/container-tools@rhel8:8060020240413110723:3b538bd8"
}
}
},
{
"category": "product_version",
"name": "cockpit-podman-0:49.1-1.module+el8.6.0+21266+3e24c7b3.noarch",
"product": {
"name": "cockpit-podman-0:49.1-1.module+el8.6.0+21266+3e24c7b3.noarch",
"product_id": "cockpit-podman-0:49.1-1.module+el8.6.0+21266+3e24c7b3.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cockpit-podman@49.1-1.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "container-selinux-2:2.189.0-1.module+el8.6.0+21266+3e24c7b3.noarch",
"product": {
"name": "container-selinux-2:2.189.0-1.module+el8.6.0+21266+3e24c7b3.noarch",
"product_id": "container-selinux-2:2.189.0-1.module+el8.6.0+21266+3e24c7b3.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/container-selinux@2.189.0-1.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=noarch\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "podman-docker-2:4.2.0-2.module+el8.6.0+21674+8010760f.noarch",
"product": {
"name": "podman-docker-2:4.2.0-2.module+el8.6.0+21674+8010760f.noarch",
"product_id": "podman-docker-2:4.2.0-2.module+el8.6.0+21674+8010760f.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-docker@4.2.0-2.module%2Bel8.6.0%2B21674%2B8010760f?arch=noarch\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "python3-podman-0:4.0.1-1.module+el8.6.0+21266+3e24c7b3.noarch",
"product": {
"name": "python3-podman-0:4.0.1-1.module+el8.6.0+21266+3e24c7b3.noarch",
"product_id": "python3-podman-0:4.0.1-1.module+el8.6.0+21266+3e24c7b3.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-podman@4.0.1-1.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "udica-0:0.2.6-5.module+el8.6.0+21266+3e24c7b3.noarch",
"product": {
"name": "udica-0:0.2.6-5.module+el8.6.0+21266+3e24c7b3.noarch",
"product_id": "udica-0:0.2.6-5.module+el8.6.0+21266+3e24c7b3.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/udica@0.2.6-5.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "aardvark-dns-2:1.0.1-40.module+el8.6.0+21266+3e24c7b3.x86_64",
"product": {
"name": "aardvark-dns-2:1.0.1-40.module+el8.6.0+21266+3e24c7b3.x86_64",
"product_id": "aardvark-dns-2:1.0.1-40.module+el8.6.0+21266+3e24c7b3.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/aardvark-dns@1.0.1-40.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=x86_64\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "buildah-1:1.26.2-1.module+el8.6.0+21266+3e24c7b3.x86_64",
"product": {
"name": "buildah-1:1.26.2-1.module+el8.6.0+21266+3e24c7b3.x86_64",
"product_id": "buildah-1:1.26.2-1.module+el8.6.0+21266+3e24c7b3.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/buildah@1.26.2-1.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "buildah-debuginfo-1:1.26.2-1.module+el8.6.0+21266+3e24c7b3.x86_64",
"product": {
"name": "buildah-debuginfo-1:1.26.2-1.module+el8.6.0+21266+3e24c7b3.x86_64",
"product_id": "buildah-debuginfo-1:1.26.2-1.module+el8.6.0+21266+3e24c7b3.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/buildah-debuginfo@1.26.2-1.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "buildah-debugsource-1:1.26.2-1.module+el8.6.0+21266+3e24c7b3.x86_64",
"product": {
"name": "buildah-debugsource-1:1.26.2-1.module+el8.6.0+21266+3e24c7b3.x86_64",
"product_id": "buildah-debugsource-1:1.26.2-1.module+el8.6.0+21266+3e24c7b3.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/buildah-debugsource@1.26.2-1.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "buildah-tests-1:1.26.2-1.module+el8.6.0+21266+3e24c7b3.x86_64",
"product": {
"name": "buildah-tests-1:1.26.2-1.module+el8.6.0+21266+3e24c7b3.x86_64",
"product_id": "buildah-tests-1:1.26.2-1.module+el8.6.0+21266+3e24c7b3.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/buildah-tests@1.26.2-1.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "buildah-tests-debuginfo-1:1.26.2-1.module+el8.6.0+21266+3e24c7b3.x86_64",
"product": {
"name": "buildah-tests-debuginfo-1:1.26.2-1.module+el8.6.0+21266+3e24c7b3.x86_64",
"product_id": "buildah-tests-debuginfo-1:1.26.2-1.module+el8.6.0+21266+3e24c7b3.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/buildah-tests-debuginfo@1.26.2-1.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "conmon-2:2.1.4-1.module+el8.6.0+21266+3e24c7b3.x86_64",
"product": {
"name": "conmon-2:2.1.4-1.module+el8.6.0+21266+3e24c7b3.x86_64",
"product_id": "conmon-2:2.1.4-1.module+el8.6.0+21266+3e24c7b3.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/conmon@2.1.4-1.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=x86_64\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "conmon-debuginfo-2:2.1.4-1.module+el8.6.0+21266+3e24c7b3.x86_64",
"product": {
"name": "conmon-debuginfo-2:2.1.4-1.module+el8.6.0+21266+3e24c7b3.x86_64",
"product_id": "conmon-debuginfo-2:2.1.4-1.module+el8.6.0+21266+3e24c7b3.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/conmon-debuginfo@2.1.4-1.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=x86_64\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "conmon-debugsource-2:2.1.4-1.module+el8.6.0+21266+3e24c7b3.x86_64",
"product": {
"name": "conmon-debugsource-2:2.1.4-1.module+el8.6.0+21266+3e24c7b3.x86_64",
"product_id": "conmon-debugsource-2:2.1.4-1.module+el8.6.0+21266+3e24c7b3.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/conmon-debugsource@2.1.4-1.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=x86_64\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "containernetworking-plugins-1:1.1.1-4.module+el8.6.0+21266+3e24c7b3.x86_64",
"product": {
"name": "containernetworking-plugins-1:1.1.1-4.module+el8.6.0+21266+3e24c7b3.x86_64",
"product_id": "containernetworking-plugins-1:1.1.1-4.module+el8.6.0+21266+3e24c7b3.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/containernetworking-plugins@1.1.1-4.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "containernetworking-plugins-debuginfo-1:1.1.1-4.module+el8.6.0+21266+3e24c7b3.x86_64",
"product": {
"name": "containernetworking-plugins-debuginfo-1:1.1.1-4.module+el8.6.0+21266+3e24c7b3.x86_64",
"product_id": "containernetworking-plugins-debuginfo-1:1.1.1-4.module+el8.6.0+21266+3e24c7b3.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/containernetworking-plugins-debuginfo@1.1.1-4.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "containernetworking-plugins-debugsource-1:1.1.1-4.module+el8.6.0+21266+3e24c7b3.x86_64",
"product": {
"name": "containernetworking-plugins-debugsource-1:1.1.1-4.module+el8.6.0+21266+3e24c7b3.x86_64",
"product_id": "containernetworking-plugins-debugsource-1:1.1.1-4.module+el8.6.0+21266+3e24c7b3.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/containernetworking-plugins-debugsource@1.1.1-4.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "containers-common-2:1-40.module+el8.6.0+21266+3e24c7b3.x86_64",
"product": {
"name": "containers-common-2:1-40.module+el8.6.0+21266+3e24c7b3.x86_64",
"product_id": "containers-common-2:1-40.module+el8.6.0+21266+3e24c7b3.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/containers-common@1-40.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=x86_64\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "crit-0:3.15-3.module+el8.6.0+21266+3e24c7b3.x86_64",
"product": {
"name": "crit-0:3.15-3.module+el8.6.0+21266+3e24c7b3.x86_64",
"product_id": "crit-0:3.15-3.module+el8.6.0+21266+3e24c7b3.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/crit@3.15-3.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "criu-0:3.15-3.module+el8.6.0+21266+3e24c7b3.x86_64",
"product": {
"name": "criu-0:3.15-3.module+el8.6.0+21266+3e24c7b3.x86_64",
"product_id": "criu-0:3.15-3.module+el8.6.0+21266+3e24c7b3.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/criu@3.15-3.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "criu-debuginfo-0:3.15-3.module+el8.6.0+21266+3e24c7b3.x86_64",
"product": {
"name": "criu-debuginfo-0:3.15-3.module+el8.6.0+21266+3e24c7b3.x86_64",
"product_id": "criu-debuginfo-0:3.15-3.module+el8.6.0+21266+3e24c7b3.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/criu-debuginfo@3.15-3.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "criu-debugsource-0:3.15-3.module+el8.6.0+21266+3e24c7b3.x86_64",
"product": {
"name": "criu-debugsource-0:3.15-3.module+el8.6.0+21266+3e24c7b3.x86_64",
"product_id": "criu-debugsource-0:3.15-3.module+el8.6.0+21266+3e24c7b3.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/criu-debugsource@3.15-3.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "criu-devel-0:3.15-3.module+el8.6.0+21266+3e24c7b3.x86_64",
"product": {
"name": "criu-devel-0:3.15-3.module+el8.6.0+21266+3e24c7b3.x86_64",
"product_id": "criu-devel-0:3.15-3.module+el8.6.0+21266+3e24c7b3.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/criu-devel@3.15-3.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "criu-libs-0:3.15-3.module+el8.6.0+21266+3e24c7b3.x86_64",
"product": {
"name": "criu-libs-0:3.15-3.module+el8.6.0+21266+3e24c7b3.x86_64",
"product_id": "criu-libs-0:3.15-3.module+el8.6.0+21266+3e24c7b3.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/criu-libs@3.15-3.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "criu-libs-debuginfo-0:3.15-3.module+el8.6.0+21266+3e24c7b3.x86_64",
"product": {
"name": "criu-libs-debuginfo-0:3.15-3.module+el8.6.0+21266+3e24c7b3.x86_64",
"product_id": "criu-libs-debuginfo-0:3.15-3.module+el8.6.0+21266+3e24c7b3.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/criu-libs-debuginfo@3.15-3.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "crun-0:1.5-1.module+el8.6.0+21266+3e24c7b3.x86_64",
"product": {
"name": "crun-0:1.5-1.module+el8.6.0+21266+3e24c7b3.x86_64",
"product_id": "crun-0:1.5-1.module+el8.6.0+21266+3e24c7b3.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/crun@1.5-1.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "crun-debuginfo-0:1.5-1.module+el8.6.0+21266+3e24c7b3.x86_64",
"product": {
"name": "crun-debuginfo-0:1.5-1.module+el8.6.0+21266+3e24c7b3.x86_64",
"product_id": "crun-debuginfo-0:1.5-1.module+el8.6.0+21266+3e24c7b3.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/crun-debuginfo@1.5-1.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "crun-debugsource-0:1.5-1.module+el8.6.0+21266+3e24c7b3.x86_64",
"product": {
"name": "crun-debugsource-0:1.5-1.module+el8.6.0+21266+3e24c7b3.x86_64",
"product_id": "crun-debugsource-0:1.5-1.module+el8.6.0+21266+3e24c7b3.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/crun-debugsource@1.5-1.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "fuse-overlayfs-0:1.9-1.module+el8.6.0+21266+3e24c7b3.x86_64",
"product": {
"name": "fuse-overlayfs-0:1.9-1.module+el8.6.0+21266+3e24c7b3.x86_64",
"product_id": "fuse-overlayfs-0:1.9-1.module+el8.6.0+21266+3e24c7b3.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fuse-overlayfs@1.9-1.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "fuse-overlayfs-debuginfo-0:1.9-1.module+el8.6.0+21266+3e24c7b3.x86_64",
"product": {
"name": "fuse-overlayfs-debuginfo-0:1.9-1.module+el8.6.0+21266+3e24c7b3.x86_64",
"product_id": "fuse-overlayfs-debuginfo-0:1.9-1.module+el8.6.0+21266+3e24c7b3.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fuse-overlayfs-debuginfo@1.9-1.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "fuse-overlayfs-debugsource-0:1.9-1.module+el8.6.0+21266+3e24c7b3.x86_64",
"product": {
"name": "fuse-overlayfs-debugsource-0:1.9-1.module+el8.6.0+21266+3e24c7b3.x86_64",
"product_id": "fuse-overlayfs-debugsource-0:1.9-1.module+el8.6.0+21266+3e24c7b3.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fuse-overlayfs-debugsource@1.9-1.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libslirp-0:4.4.0-1.module+el8.6.0+21266+3e24c7b3.x86_64",
"product": {
"name": "libslirp-0:4.4.0-1.module+el8.6.0+21266+3e24c7b3.x86_64",
"product_id": "libslirp-0:4.4.0-1.module+el8.6.0+21266+3e24c7b3.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libslirp@4.4.0-1.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libslirp-debuginfo-0:4.4.0-1.module+el8.6.0+21266+3e24c7b3.x86_64",
"product": {
"name": "libslirp-debuginfo-0:4.4.0-1.module+el8.6.0+21266+3e24c7b3.x86_64",
"product_id": "libslirp-debuginfo-0:4.4.0-1.module+el8.6.0+21266+3e24c7b3.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libslirp-debuginfo@4.4.0-1.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libslirp-debugsource-0:4.4.0-1.module+el8.6.0+21266+3e24c7b3.x86_64",
"product": {
"name": "libslirp-debugsource-0:4.4.0-1.module+el8.6.0+21266+3e24c7b3.x86_64",
"product_id": "libslirp-debugsource-0:4.4.0-1.module+el8.6.0+21266+3e24c7b3.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libslirp-debugsource@4.4.0-1.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libslirp-devel-0:4.4.0-1.module+el8.6.0+21266+3e24c7b3.x86_64",
"product": {
"name": "libslirp-devel-0:4.4.0-1.module+el8.6.0+21266+3e24c7b3.x86_64",
"product_id": "libslirp-devel-0:4.4.0-1.module+el8.6.0+21266+3e24c7b3.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libslirp-devel@4.4.0-1.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "netavark-2:1.0.1-40.module+el8.6.0+21266+3e24c7b3.x86_64",
"product": {
"name": "netavark-2:1.0.1-40.module+el8.6.0+21266+3e24c7b3.x86_64",
"product_id": "netavark-2:1.0.1-40.module+el8.6.0+21266+3e24c7b3.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/netavark@1.0.1-40.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=x86_64\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "oci-seccomp-bpf-hook-0:1.2.6-1.module+el8.6.0+21266+3e24c7b3.x86_64",
"product": {
"name": "oci-seccomp-bpf-hook-0:1.2.6-1.module+el8.6.0+21266+3e24c7b3.x86_64",
"product_id": "oci-seccomp-bpf-hook-0:1.2.6-1.module+el8.6.0+21266+3e24c7b3.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/oci-seccomp-bpf-hook@1.2.6-1.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "oci-seccomp-bpf-hook-debuginfo-0:1.2.6-1.module+el8.6.0+21266+3e24c7b3.x86_64",
"product": {
"name": "oci-seccomp-bpf-hook-debuginfo-0:1.2.6-1.module+el8.6.0+21266+3e24c7b3.x86_64",
"product_id": "oci-seccomp-bpf-hook-debuginfo-0:1.2.6-1.module+el8.6.0+21266+3e24c7b3.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/oci-seccomp-bpf-hook-debuginfo@1.2.6-1.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "oci-seccomp-bpf-hook-debugsource-0:1.2.6-1.module+el8.6.0+21266+3e24c7b3.x86_64",
"product": {
"name": "oci-seccomp-bpf-hook-debugsource-0:1.2.6-1.module+el8.6.0+21266+3e24c7b3.x86_64",
"product_id": "oci-seccomp-bpf-hook-debugsource-0:1.2.6-1.module+el8.6.0+21266+3e24c7b3.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/oci-seccomp-bpf-hook-debugsource@1.2.6-1.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "podman-2:4.2.0-2.module+el8.6.0+21674+8010760f.x86_64",
"product": {
"name": "podman-2:4.2.0-2.module+el8.6.0+21674+8010760f.x86_64",
"product_id": "podman-2:4.2.0-2.module+el8.6.0+21674+8010760f.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman@4.2.0-2.module%2Bel8.6.0%2B21674%2B8010760f?arch=x86_64\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "podman-catatonit-2:4.2.0-2.module+el8.6.0+21674+8010760f.x86_64",
"product": {
"name": "podman-catatonit-2:4.2.0-2.module+el8.6.0+21674+8010760f.x86_64",
"product_id": "podman-catatonit-2:4.2.0-2.module+el8.6.0+21674+8010760f.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-catatonit@4.2.0-2.module%2Bel8.6.0%2B21674%2B8010760f?arch=x86_64\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "podman-catatonit-debuginfo-2:4.2.0-2.module+el8.6.0+21674+8010760f.x86_64",
"product": {
"name": "podman-catatonit-debuginfo-2:4.2.0-2.module+el8.6.0+21674+8010760f.x86_64",
"product_id": "podman-catatonit-debuginfo-2:4.2.0-2.module+el8.6.0+21674+8010760f.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-catatonit-debuginfo@4.2.0-2.module%2Bel8.6.0%2B21674%2B8010760f?arch=x86_64\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "podman-debuginfo-2:4.2.0-2.module+el8.6.0+21674+8010760f.x86_64",
"product": {
"name": "podman-debuginfo-2:4.2.0-2.module+el8.6.0+21674+8010760f.x86_64",
"product_id": "podman-debuginfo-2:4.2.0-2.module+el8.6.0+21674+8010760f.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-debuginfo@4.2.0-2.module%2Bel8.6.0%2B21674%2B8010760f?arch=x86_64\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "podman-debugsource-2:4.2.0-2.module+el8.6.0+21674+8010760f.x86_64",
"product": {
"name": "podman-debugsource-2:4.2.0-2.module+el8.6.0+21674+8010760f.x86_64",
"product_id": "podman-debugsource-2:4.2.0-2.module+el8.6.0+21674+8010760f.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-debugsource@4.2.0-2.module%2Bel8.6.0%2B21674%2B8010760f?arch=x86_64\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "podman-gvproxy-2:4.2.0-2.module+el8.6.0+21674+8010760f.x86_64",
"product": {
"name": "podman-gvproxy-2:4.2.0-2.module+el8.6.0+21674+8010760f.x86_64",
"product_id": "podman-gvproxy-2:4.2.0-2.module+el8.6.0+21674+8010760f.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-gvproxy@4.2.0-2.module%2Bel8.6.0%2B21674%2B8010760f?arch=x86_64\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "podman-gvproxy-debuginfo-2:4.2.0-2.module+el8.6.0+21674+8010760f.x86_64",
"product": {
"name": "podman-gvproxy-debuginfo-2:4.2.0-2.module+el8.6.0+21674+8010760f.x86_64",
"product_id": "podman-gvproxy-debuginfo-2:4.2.0-2.module+el8.6.0+21674+8010760f.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-gvproxy-debuginfo@4.2.0-2.module%2Bel8.6.0%2B21674%2B8010760f?arch=x86_64\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "podman-plugins-2:4.2.0-2.module+el8.6.0+21674+8010760f.x86_64",
"product": {
"name": "podman-plugins-2:4.2.0-2.module+el8.6.0+21674+8010760f.x86_64",
"product_id": "podman-plugins-2:4.2.0-2.module+el8.6.0+21674+8010760f.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-plugins@4.2.0-2.module%2Bel8.6.0%2B21674%2B8010760f?arch=x86_64\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "podman-plugins-debuginfo-2:4.2.0-2.module+el8.6.0+21674+8010760f.x86_64",
"product": {
"name": "podman-plugins-debuginfo-2:4.2.0-2.module+el8.6.0+21674+8010760f.x86_64",
"product_id": "podman-plugins-debuginfo-2:4.2.0-2.module+el8.6.0+21674+8010760f.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-plugins-debuginfo@4.2.0-2.module%2Bel8.6.0%2B21674%2B8010760f?arch=x86_64\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "podman-remote-2:4.2.0-2.module+el8.6.0+21674+8010760f.x86_64",
"product": {
"name": "podman-remote-2:4.2.0-2.module+el8.6.0+21674+8010760f.x86_64",
"product_id": "podman-remote-2:4.2.0-2.module+el8.6.0+21674+8010760f.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-remote@4.2.0-2.module%2Bel8.6.0%2B21674%2B8010760f?arch=x86_64\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "podman-remote-debuginfo-2:4.2.0-2.module+el8.6.0+21674+8010760f.x86_64",
"product": {
"name": "podman-remote-debuginfo-2:4.2.0-2.module+el8.6.0+21674+8010760f.x86_64",
"product_id": "podman-remote-debuginfo-2:4.2.0-2.module+el8.6.0+21674+8010760f.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-remote-debuginfo@4.2.0-2.module%2Bel8.6.0%2B21674%2B8010760f?arch=x86_64\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "podman-tests-2:4.2.0-2.module+el8.6.0+21674+8010760f.x86_64",
"product": {
"name": "podman-tests-2:4.2.0-2.module+el8.6.0+21674+8010760f.x86_64",
"product_id": "podman-tests-2:4.2.0-2.module+el8.6.0+21674+8010760f.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-tests@4.2.0-2.module%2Bel8.6.0%2B21674%2B8010760f?arch=x86_64\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "python3-criu-0:3.15-3.module+el8.6.0+21266+3e24c7b3.x86_64",
"product": {
"name": "python3-criu-0:3.15-3.module+el8.6.0+21266+3e24c7b3.x86_64",
"product_id": "python3-criu-0:3.15-3.module+el8.6.0+21266+3e24c7b3.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-criu@3.15-3.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "runc-1:1.1.12-1.module+el8.6.0+21266+3e24c7b3.x86_64",
"product": {
"name": "runc-1:1.1.12-1.module+el8.6.0+21266+3e24c7b3.x86_64",
"product_id": "runc-1:1.1.12-1.module+el8.6.0+21266+3e24c7b3.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/runc@1.1.12-1.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "runc-debuginfo-1:1.1.12-1.module+el8.6.0+21266+3e24c7b3.x86_64",
"product": {
"name": "runc-debuginfo-1:1.1.12-1.module+el8.6.0+21266+3e24c7b3.x86_64",
"product_id": "runc-debuginfo-1:1.1.12-1.module+el8.6.0+21266+3e24c7b3.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/runc-debuginfo@1.1.12-1.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "runc-debugsource-1:1.1.12-1.module+el8.6.0+21266+3e24c7b3.x86_64",
"product": {
"name": "runc-debugsource-1:1.1.12-1.module+el8.6.0+21266+3e24c7b3.x86_64",
"product_id": "runc-debugsource-1:1.1.12-1.module+el8.6.0+21266+3e24c7b3.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/runc-debugsource@1.1.12-1.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "skopeo-2:1.9.1-1.module+el8.6.0+21266+3e24c7b3.x86_64",
"product": {
"name": "skopeo-2:1.9.1-1.module+el8.6.0+21266+3e24c7b3.x86_64",
"product_id": "skopeo-2:1.9.1-1.module+el8.6.0+21266+3e24c7b3.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/skopeo@1.9.1-1.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=x86_64\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "skopeo-debuginfo-2:1.9.1-1.module+el8.6.0+21266+3e24c7b3.x86_64",
"product": {
"name": "skopeo-debuginfo-2:1.9.1-1.module+el8.6.0+21266+3e24c7b3.x86_64",
"product_id": "skopeo-debuginfo-2:1.9.1-1.module+el8.6.0+21266+3e24c7b3.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/skopeo-debuginfo@1.9.1-1.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=x86_64\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "skopeo-debugsource-2:1.9.1-1.module+el8.6.0+21266+3e24c7b3.x86_64",
"product": {
"name": "skopeo-debugsource-2:1.9.1-1.module+el8.6.0+21266+3e24c7b3.x86_64",
"product_id": "skopeo-debugsource-2:1.9.1-1.module+el8.6.0+21266+3e24c7b3.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/skopeo-debugsource@1.9.1-1.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=x86_64\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "skopeo-tests-2:1.9.1-1.module+el8.6.0+21266+3e24c7b3.x86_64",
"product": {
"name": "skopeo-tests-2:1.9.1-1.module+el8.6.0+21266+3e24c7b3.x86_64",
"product_id": "skopeo-tests-2:1.9.1-1.module+el8.6.0+21266+3e24c7b3.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/skopeo-tests@1.9.1-1.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=x86_64\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "slirp4netns-0:1.2.0-3.module+el8.6.0+21266+3e24c7b3.x86_64",
"product": {
"name": "slirp4netns-0:1.2.0-3.module+el8.6.0+21266+3e24c7b3.x86_64",
"product_id": "slirp4netns-0:1.2.0-3.module+el8.6.0+21266+3e24c7b3.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/slirp4netns@1.2.0-3.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "slirp4netns-debuginfo-0:1.2.0-3.module+el8.6.0+21266+3e24c7b3.x86_64",
"product": {
"name": "slirp4netns-debuginfo-0:1.2.0-3.module+el8.6.0+21266+3e24c7b3.x86_64",
"product_id": "slirp4netns-debuginfo-0:1.2.0-3.module+el8.6.0+21266+3e24c7b3.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/slirp4netns-debuginfo@1.2.0-3.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "slirp4netns-debugsource-0:1.2.0-3.module+el8.6.0+21266+3e24c7b3.x86_64",
"product": {
"name": "slirp4netns-debugsource-0:1.2.0-3.module+el8.6.0+21266+3e24c7b3.x86_64",
"product_id": "slirp4netns-debugsource-0:1.2.0-3.module+el8.6.0+21266+3e24c7b3.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/slirp4netns-debugsource@1.2.0-3.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "toolbox-0:0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.x86_64",
"product": {
"name": "toolbox-0:0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.x86_64",
"product_id": "toolbox-0:0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/toolbox@0.0.99.3-0.7.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "toolbox-debuginfo-0:0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.x86_64",
"product": {
"name": "toolbox-debuginfo-0:0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.x86_64",
"product_id": "toolbox-debuginfo-0:0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/toolbox-debuginfo@0.0.99.3-0.7.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "toolbox-debugsource-0:0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.x86_64",
"product": {
"name": "toolbox-debugsource-0:0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.x86_64",
"product_id": "toolbox-debugsource-0:0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/toolbox-debugsource@0.0.99.3-0.7.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "toolbox-tests-0:0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.x86_64",
"product": {
"name": "toolbox-tests-0:0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.x86_64",
"product_id": "toolbox-tests-0:0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/toolbox-tests@0.0.99.3-0.7.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "buildah-1:1.26.2-1.module+el8.6.0+21266+3e24c7b3.src",
"product": {
"name": "buildah-1:1.26.2-1.module+el8.6.0+21266+3e24c7b3.src",
"product_id": "buildah-1:1.26.2-1.module+el8.6.0+21266+3e24c7b3.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/buildah@1.26.2-1.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=src\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "cockpit-podman-0:49.1-1.module+el8.6.0+21266+3e24c7b3.src",
"product": {
"name": "cockpit-podman-0:49.1-1.module+el8.6.0+21266+3e24c7b3.src",
"product_id": "cockpit-podman-0:49.1-1.module+el8.6.0+21266+3e24c7b3.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cockpit-podman@49.1-1.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=src"
}
}
},
{
"category": "product_version",
"name": "conmon-2:2.1.4-1.module+el8.6.0+21266+3e24c7b3.src",
"product": {
"name": "conmon-2:2.1.4-1.module+el8.6.0+21266+3e24c7b3.src",
"product_id": "conmon-2:2.1.4-1.module+el8.6.0+21266+3e24c7b3.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/conmon@2.1.4-1.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=src\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "container-selinux-2:2.189.0-1.module+el8.6.0+21266+3e24c7b3.src",
"product": {
"name": "container-selinux-2:2.189.0-1.module+el8.6.0+21266+3e24c7b3.src",
"product_id": "container-selinux-2:2.189.0-1.module+el8.6.0+21266+3e24c7b3.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/container-selinux@2.189.0-1.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=src\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "containernetworking-plugins-1:1.1.1-4.module+el8.6.0+21266+3e24c7b3.src",
"product": {
"name": "containernetworking-plugins-1:1.1.1-4.module+el8.6.0+21266+3e24c7b3.src",
"product_id": "containernetworking-plugins-1:1.1.1-4.module+el8.6.0+21266+3e24c7b3.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/containernetworking-plugins@1.1.1-4.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=src\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "containers-common-2:1-40.module+el8.6.0+21266+3e24c7b3.src",
"product": {
"name": "containers-common-2:1-40.module+el8.6.0+21266+3e24c7b3.src",
"product_id": "containers-common-2:1-40.module+el8.6.0+21266+3e24c7b3.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/containers-common@1-40.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=src\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "criu-0:3.15-3.module+el8.6.0+21266+3e24c7b3.src",
"product": {
"name": "criu-0:3.15-3.module+el8.6.0+21266+3e24c7b3.src",
"product_id": "criu-0:3.15-3.module+el8.6.0+21266+3e24c7b3.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/criu@3.15-3.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=src"
}
}
},
{
"category": "product_version",
"name": "crun-0:1.5-1.module+el8.6.0+21266+3e24c7b3.src",
"product": {
"name": "crun-0:1.5-1.module+el8.6.0+21266+3e24c7b3.src",
"product_id": "crun-0:1.5-1.module+el8.6.0+21266+3e24c7b3.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/crun@1.5-1.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=src"
}
}
},
{
"category": "product_version",
"name": "fuse-overlayfs-0:1.9-1.module+el8.6.0+21266+3e24c7b3.src",
"product": {
"name": "fuse-overlayfs-0:1.9-1.module+el8.6.0+21266+3e24c7b3.src",
"product_id": "fuse-overlayfs-0:1.9-1.module+el8.6.0+21266+3e24c7b3.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fuse-overlayfs@1.9-1.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=src"
}
}
},
{
"category": "product_version",
"name": "libslirp-0:4.4.0-1.module+el8.6.0+21266+3e24c7b3.src",
"product": {
"name": "libslirp-0:4.4.0-1.module+el8.6.0+21266+3e24c7b3.src",
"product_id": "libslirp-0:4.4.0-1.module+el8.6.0+21266+3e24c7b3.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libslirp@4.4.0-1.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=src"
}
}
},
{
"category": "product_version",
"name": "oci-seccomp-bpf-hook-0:1.2.6-1.module+el8.6.0+21266+3e24c7b3.src",
"product": {
"name": "oci-seccomp-bpf-hook-0:1.2.6-1.module+el8.6.0+21266+3e24c7b3.src",
"product_id": "oci-seccomp-bpf-hook-0:1.2.6-1.module+el8.6.0+21266+3e24c7b3.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/oci-seccomp-bpf-hook@1.2.6-1.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=src"
}
}
},
{
"category": "product_version",
"name": "podman-2:4.2.0-2.module+el8.6.0+21674+8010760f.src",
"product": {
"name": "podman-2:4.2.0-2.module+el8.6.0+21674+8010760f.src",
"product_id": "podman-2:4.2.0-2.module+el8.6.0+21674+8010760f.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman@4.2.0-2.module%2Bel8.6.0%2B21674%2B8010760f?arch=src\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "python-podman-0:4.0.1-1.module+el8.6.0+21266+3e24c7b3.src",
"product": {
"name": "python-podman-0:4.0.1-1.module+el8.6.0+21266+3e24c7b3.src",
"product_id": "python-podman-0:4.0.1-1.module+el8.6.0+21266+3e24c7b3.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-podman@4.0.1-1.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=src"
}
}
},
{
"category": "product_version",
"name": "runc-1:1.1.12-1.module+el8.6.0+21266+3e24c7b3.src",
"product": {
"name": "runc-1:1.1.12-1.module+el8.6.0+21266+3e24c7b3.src",
"product_id": "runc-1:1.1.12-1.module+el8.6.0+21266+3e24c7b3.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/runc@1.1.12-1.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=src\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "skopeo-2:1.9.1-1.module+el8.6.0+21266+3e24c7b3.src",
"product": {
"name": "skopeo-2:1.9.1-1.module+el8.6.0+21266+3e24c7b3.src",
"product_id": "skopeo-2:1.9.1-1.module+el8.6.0+21266+3e24c7b3.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/skopeo@1.9.1-1.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=src\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "slirp4netns-0:1.2.0-3.module+el8.6.0+21266+3e24c7b3.src",
"product": {
"name": "slirp4netns-0:1.2.0-3.module+el8.6.0+21266+3e24c7b3.src",
"product_id": "slirp4netns-0:1.2.0-3.module+el8.6.0+21266+3e24c7b3.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/slirp4netns@1.2.0-3.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=src"
}
}
},
{
"category": "product_version",
"name": "toolbox-0:0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.src",
"product": {
"name": "toolbox-0:0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.src",
"product_id": "toolbox-0:0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/toolbox@0.0.99.3-0.7.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=src"
}
}
},
{
"category": "product_version",
"name": "udica-0:0.2.6-5.module+el8.6.0+21266+3e24c7b3.src",
"product": {
"name": "udica-0:0.2.6-5.module+el8.6.0+21266+3e24c7b3.src",
"product_id": "udica-0:0.2.6-5.module+el8.6.0+21266+3e24c7b3.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/udica@0.2.6-5.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "aardvark-dns-2:1.0.1-40.module+el8.6.0+21266+3e24c7b3.s390x",
"product": {
"name": "aardvark-dns-2:1.0.1-40.module+el8.6.0+21266+3e24c7b3.s390x",
"product_id": "aardvark-dns-2:1.0.1-40.module+el8.6.0+21266+3e24c7b3.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/aardvark-dns@1.0.1-40.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=s390x\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "buildah-1:1.26.2-1.module+el8.6.0+21266+3e24c7b3.s390x",
"product": {
"name": "buildah-1:1.26.2-1.module+el8.6.0+21266+3e24c7b3.s390x",
"product_id": "buildah-1:1.26.2-1.module+el8.6.0+21266+3e24c7b3.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/buildah@1.26.2-1.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "buildah-debuginfo-1:1.26.2-1.module+el8.6.0+21266+3e24c7b3.s390x",
"product": {
"name": "buildah-debuginfo-1:1.26.2-1.module+el8.6.0+21266+3e24c7b3.s390x",
"product_id": "buildah-debuginfo-1:1.26.2-1.module+el8.6.0+21266+3e24c7b3.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/buildah-debuginfo@1.26.2-1.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "buildah-debugsource-1:1.26.2-1.module+el8.6.0+21266+3e24c7b3.s390x",
"product": {
"name": "buildah-debugsource-1:1.26.2-1.module+el8.6.0+21266+3e24c7b3.s390x",
"product_id": "buildah-debugsource-1:1.26.2-1.module+el8.6.0+21266+3e24c7b3.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/buildah-debugsource@1.26.2-1.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "buildah-tests-1:1.26.2-1.module+el8.6.0+21266+3e24c7b3.s390x",
"product": {
"name": "buildah-tests-1:1.26.2-1.module+el8.6.0+21266+3e24c7b3.s390x",
"product_id": "buildah-tests-1:1.26.2-1.module+el8.6.0+21266+3e24c7b3.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/buildah-tests@1.26.2-1.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "buildah-tests-debuginfo-1:1.26.2-1.module+el8.6.0+21266+3e24c7b3.s390x",
"product": {
"name": "buildah-tests-debuginfo-1:1.26.2-1.module+el8.6.0+21266+3e24c7b3.s390x",
"product_id": "buildah-tests-debuginfo-1:1.26.2-1.module+el8.6.0+21266+3e24c7b3.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/buildah-tests-debuginfo@1.26.2-1.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "conmon-2:2.1.4-1.module+el8.6.0+21266+3e24c7b3.s390x",
"product": {
"name": "conmon-2:2.1.4-1.module+el8.6.0+21266+3e24c7b3.s390x",
"product_id": "conmon-2:2.1.4-1.module+el8.6.0+21266+3e24c7b3.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/conmon@2.1.4-1.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=s390x\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "conmon-debuginfo-2:2.1.4-1.module+el8.6.0+21266+3e24c7b3.s390x",
"product": {
"name": "conmon-debuginfo-2:2.1.4-1.module+el8.6.0+21266+3e24c7b3.s390x",
"product_id": "conmon-debuginfo-2:2.1.4-1.module+el8.6.0+21266+3e24c7b3.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/conmon-debuginfo@2.1.4-1.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=s390x\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "conmon-debugsource-2:2.1.4-1.module+el8.6.0+21266+3e24c7b3.s390x",
"product": {
"name": "conmon-debugsource-2:2.1.4-1.module+el8.6.0+21266+3e24c7b3.s390x",
"product_id": "conmon-debugsource-2:2.1.4-1.module+el8.6.0+21266+3e24c7b3.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/conmon-debugsource@2.1.4-1.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=s390x\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "containernetworking-plugins-1:1.1.1-4.module+el8.6.0+21266+3e24c7b3.s390x",
"product": {
"name": "containernetworking-plugins-1:1.1.1-4.module+el8.6.0+21266+3e24c7b3.s390x",
"product_id": "containernetworking-plugins-1:1.1.1-4.module+el8.6.0+21266+3e24c7b3.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/containernetworking-plugins@1.1.1-4.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "containernetworking-plugins-debuginfo-1:1.1.1-4.module+el8.6.0+21266+3e24c7b3.s390x",
"product": {
"name": "containernetworking-plugins-debuginfo-1:1.1.1-4.module+el8.6.0+21266+3e24c7b3.s390x",
"product_id": "containernetworking-plugins-debuginfo-1:1.1.1-4.module+el8.6.0+21266+3e24c7b3.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/containernetworking-plugins-debuginfo@1.1.1-4.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "containernetworking-plugins-debugsource-1:1.1.1-4.module+el8.6.0+21266+3e24c7b3.s390x",
"product": {
"name": "containernetworking-plugins-debugsource-1:1.1.1-4.module+el8.6.0+21266+3e24c7b3.s390x",
"product_id": "containernetworking-plugins-debugsource-1:1.1.1-4.module+el8.6.0+21266+3e24c7b3.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/containernetworking-plugins-debugsource@1.1.1-4.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "containers-common-2:1-40.module+el8.6.0+21266+3e24c7b3.s390x",
"product": {
"name": "containers-common-2:1-40.module+el8.6.0+21266+3e24c7b3.s390x",
"product_id": "containers-common-2:1-40.module+el8.6.0+21266+3e24c7b3.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/containers-common@1-40.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=s390x\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "crit-0:3.15-3.module+el8.6.0+21266+3e24c7b3.s390x",
"product": {
"name": "crit-0:3.15-3.module+el8.6.0+21266+3e24c7b3.s390x",
"product_id": "crit-0:3.15-3.module+el8.6.0+21266+3e24c7b3.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/crit@3.15-3.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "criu-0:3.15-3.module+el8.6.0+21266+3e24c7b3.s390x",
"product": {
"name": "criu-0:3.15-3.module+el8.6.0+21266+3e24c7b3.s390x",
"product_id": "criu-0:3.15-3.module+el8.6.0+21266+3e24c7b3.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/criu@3.15-3.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "criu-debuginfo-0:3.15-3.module+el8.6.0+21266+3e24c7b3.s390x",
"product": {
"name": "criu-debuginfo-0:3.15-3.module+el8.6.0+21266+3e24c7b3.s390x",
"product_id": "criu-debuginfo-0:3.15-3.module+el8.6.0+21266+3e24c7b3.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/criu-debuginfo@3.15-3.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "criu-debugsource-0:3.15-3.module+el8.6.0+21266+3e24c7b3.s390x",
"product": {
"name": "criu-debugsource-0:3.15-3.module+el8.6.0+21266+3e24c7b3.s390x",
"product_id": "criu-debugsource-0:3.15-3.module+el8.6.0+21266+3e24c7b3.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/criu-debugsource@3.15-3.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "criu-devel-0:3.15-3.module+el8.6.0+21266+3e24c7b3.s390x",
"product": {
"name": "criu-devel-0:3.15-3.module+el8.6.0+21266+3e24c7b3.s390x",
"product_id": "criu-devel-0:3.15-3.module+el8.6.0+21266+3e24c7b3.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/criu-devel@3.15-3.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "criu-libs-0:3.15-3.module+el8.6.0+21266+3e24c7b3.s390x",
"product": {
"name": "criu-libs-0:3.15-3.module+el8.6.0+21266+3e24c7b3.s390x",
"product_id": "criu-libs-0:3.15-3.module+el8.6.0+21266+3e24c7b3.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/criu-libs@3.15-3.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "criu-libs-debuginfo-0:3.15-3.module+el8.6.0+21266+3e24c7b3.s390x",
"product": {
"name": "criu-libs-debuginfo-0:3.15-3.module+el8.6.0+21266+3e24c7b3.s390x",
"product_id": "criu-libs-debuginfo-0:3.15-3.module+el8.6.0+21266+3e24c7b3.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/criu-libs-debuginfo@3.15-3.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "crun-0:1.5-1.module+el8.6.0+21266+3e24c7b3.s390x",
"product": {
"name": "crun-0:1.5-1.module+el8.6.0+21266+3e24c7b3.s390x",
"product_id": "crun-0:1.5-1.module+el8.6.0+21266+3e24c7b3.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/crun@1.5-1.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "crun-debuginfo-0:1.5-1.module+el8.6.0+21266+3e24c7b3.s390x",
"product": {
"name": "crun-debuginfo-0:1.5-1.module+el8.6.0+21266+3e24c7b3.s390x",
"product_id": "crun-debuginfo-0:1.5-1.module+el8.6.0+21266+3e24c7b3.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/crun-debuginfo@1.5-1.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "crun-debugsource-0:1.5-1.module+el8.6.0+21266+3e24c7b3.s390x",
"product": {
"name": "crun-debugsource-0:1.5-1.module+el8.6.0+21266+3e24c7b3.s390x",
"product_id": "crun-debugsource-0:1.5-1.module+el8.6.0+21266+3e24c7b3.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/crun-debugsource@1.5-1.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "fuse-overlayfs-0:1.9-1.module+el8.6.0+21266+3e24c7b3.s390x",
"product": {
"name": "fuse-overlayfs-0:1.9-1.module+el8.6.0+21266+3e24c7b3.s390x",
"product_id": "fuse-overlayfs-0:1.9-1.module+el8.6.0+21266+3e24c7b3.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fuse-overlayfs@1.9-1.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "fuse-overlayfs-debuginfo-0:1.9-1.module+el8.6.0+21266+3e24c7b3.s390x",
"product": {
"name": "fuse-overlayfs-debuginfo-0:1.9-1.module+el8.6.0+21266+3e24c7b3.s390x",
"product_id": "fuse-overlayfs-debuginfo-0:1.9-1.module+el8.6.0+21266+3e24c7b3.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fuse-overlayfs-debuginfo@1.9-1.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "fuse-overlayfs-debugsource-0:1.9-1.module+el8.6.0+21266+3e24c7b3.s390x",
"product": {
"name": "fuse-overlayfs-debugsource-0:1.9-1.module+el8.6.0+21266+3e24c7b3.s390x",
"product_id": "fuse-overlayfs-debugsource-0:1.9-1.module+el8.6.0+21266+3e24c7b3.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fuse-overlayfs-debugsource@1.9-1.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "libslirp-0:4.4.0-1.module+el8.6.0+21266+3e24c7b3.s390x",
"product": {
"name": "libslirp-0:4.4.0-1.module+el8.6.0+21266+3e24c7b3.s390x",
"product_id": "libslirp-0:4.4.0-1.module+el8.6.0+21266+3e24c7b3.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libslirp@4.4.0-1.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "libslirp-debuginfo-0:4.4.0-1.module+el8.6.0+21266+3e24c7b3.s390x",
"product": {
"name": "libslirp-debuginfo-0:4.4.0-1.module+el8.6.0+21266+3e24c7b3.s390x",
"product_id": "libslirp-debuginfo-0:4.4.0-1.module+el8.6.0+21266+3e24c7b3.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libslirp-debuginfo@4.4.0-1.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "libslirp-debugsource-0:4.4.0-1.module+el8.6.0+21266+3e24c7b3.s390x",
"product": {
"name": "libslirp-debugsource-0:4.4.0-1.module+el8.6.0+21266+3e24c7b3.s390x",
"product_id": "libslirp-debugsource-0:4.4.0-1.module+el8.6.0+21266+3e24c7b3.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libslirp-debugsource@4.4.0-1.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "libslirp-devel-0:4.4.0-1.module+el8.6.0+21266+3e24c7b3.s390x",
"product": {
"name": "libslirp-devel-0:4.4.0-1.module+el8.6.0+21266+3e24c7b3.s390x",
"product_id": "libslirp-devel-0:4.4.0-1.module+el8.6.0+21266+3e24c7b3.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libslirp-devel@4.4.0-1.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "netavark-2:1.0.1-40.module+el8.6.0+21266+3e24c7b3.s390x",
"product": {
"name": "netavark-2:1.0.1-40.module+el8.6.0+21266+3e24c7b3.s390x",
"product_id": "netavark-2:1.0.1-40.module+el8.6.0+21266+3e24c7b3.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/netavark@1.0.1-40.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=s390x\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "oci-seccomp-bpf-hook-0:1.2.6-1.module+el8.6.0+21266+3e24c7b3.s390x",
"product": {
"name": "oci-seccomp-bpf-hook-0:1.2.6-1.module+el8.6.0+21266+3e24c7b3.s390x",
"product_id": "oci-seccomp-bpf-hook-0:1.2.6-1.module+el8.6.0+21266+3e24c7b3.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/oci-seccomp-bpf-hook@1.2.6-1.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "oci-seccomp-bpf-hook-debuginfo-0:1.2.6-1.module+el8.6.0+21266+3e24c7b3.s390x",
"product": {
"name": "oci-seccomp-bpf-hook-debuginfo-0:1.2.6-1.module+el8.6.0+21266+3e24c7b3.s390x",
"product_id": "oci-seccomp-bpf-hook-debuginfo-0:1.2.6-1.module+el8.6.0+21266+3e24c7b3.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/oci-seccomp-bpf-hook-debuginfo@1.2.6-1.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "oci-seccomp-bpf-hook-debugsource-0:1.2.6-1.module+el8.6.0+21266+3e24c7b3.s390x",
"product": {
"name": "oci-seccomp-bpf-hook-debugsource-0:1.2.6-1.module+el8.6.0+21266+3e24c7b3.s390x",
"product_id": "oci-seccomp-bpf-hook-debugsource-0:1.2.6-1.module+el8.6.0+21266+3e24c7b3.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/oci-seccomp-bpf-hook-debugsource@1.2.6-1.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "podman-2:4.2.0-2.module+el8.6.0+21674+8010760f.s390x",
"product": {
"name": "podman-2:4.2.0-2.module+el8.6.0+21674+8010760f.s390x",
"product_id": "podman-2:4.2.0-2.module+el8.6.0+21674+8010760f.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman@4.2.0-2.module%2Bel8.6.0%2B21674%2B8010760f?arch=s390x\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "podman-catatonit-2:4.2.0-2.module+el8.6.0+21674+8010760f.s390x",
"product": {
"name": "podman-catatonit-2:4.2.0-2.module+el8.6.0+21674+8010760f.s390x",
"product_id": "podman-catatonit-2:4.2.0-2.module+el8.6.0+21674+8010760f.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-catatonit@4.2.0-2.module%2Bel8.6.0%2B21674%2B8010760f?arch=s390x\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "podman-catatonit-debuginfo-2:4.2.0-2.module+el8.6.0+21674+8010760f.s390x",
"product": {
"name": "podman-catatonit-debuginfo-2:4.2.0-2.module+el8.6.0+21674+8010760f.s390x",
"product_id": "podman-catatonit-debuginfo-2:4.2.0-2.module+el8.6.0+21674+8010760f.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-catatonit-debuginfo@4.2.0-2.module%2Bel8.6.0%2B21674%2B8010760f?arch=s390x\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "podman-debuginfo-2:4.2.0-2.module+el8.6.0+21674+8010760f.s390x",
"product": {
"name": "podman-debuginfo-2:4.2.0-2.module+el8.6.0+21674+8010760f.s390x",
"product_id": "podman-debuginfo-2:4.2.0-2.module+el8.6.0+21674+8010760f.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-debuginfo@4.2.0-2.module%2Bel8.6.0%2B21674%2B8010760f?arch=s390x\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "podman-debugsource-2:4.2.0-2.module+el8.6.0+21674+8010760f.s390x",
"product": {
"name": "podman-debugsource-2:4.2.0-2.module+el8.6.0+21674+8010760f.s390x",
"product_id": "podman-debugsource-2:4.2.0-2.module+el8.6.0+21674+8010760f.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-debugsource@4.2.0-2.module%2Bel8.6.0%2B21674%2B8010760f?arch=s390x\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "podman-gvproxy-2:4.2.0-2.module+el8.6.0+21674+8010760f.s390x",
"product": {
"name": "podman-gvproxy-2:4.2.0-2.module+el8.6.0+21674+8010760f.s390x",
"product_id": "podman-gvproxy-2:4.2.0-2.module+el8.6.0+21674+8010760f.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-gvproxy@4.2.0-2.module%2Bel8.6.0%2B21674%2B8010760f?arch=s390x\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "podman-gvproxy-debuginfo-2:4.2.0-2.module+el8.6.0+21674+8010760f.s390x",
"product": {
"name": "podman-gvproxy-debuginfo-2:4.2.0-2.module+el8.6.0+21674+8010760f.s390x",
"product_id": "podman-gvproxy-debuginfo-2:4.2.0-2.module+el8.6.0+21674+8010760f.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-gvproxy-debuginfo@4.2.0-2.module%2Bel8.6.0%2B21674%2B8010760f?arch=s390x\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "podman-plugins-2:4.2.0-2.module+el8.6.0+21674+8010760f.s390x",
"product": {
"name": "podman-plugins-2:4.2.0-2.module+el8.6.0+21674+8010760f.s390x",
"product_id": "podman-plugins-2:4.2.0-2.module+el8.6.0+21674+8010760f.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-plugins@4.2.0-2.module%2Bel8.6.0%2B21674%2B8010760f?arch=s390x\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "podman-plugins-debuginfo-2:4.2.0-2.module+el8.6.0+21674+8010760f.s390x",
"product": {
"name": "podman-plugins-debuginfo-2:4.2.0-2.module+el8.6.0+21674+8010760f.s390x",
"product_id": "podman-plugins-debuginfo-2:4.2.0-2.module+el8.6.0+21674+8010760f.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-plugins-debuginfo@4.2.0-2.module%2Bel8.6.0%2B21674%2B8010760f?arch=s390x\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "podman-remote-2:4.2.0-2.module+el8.6.0+21674+8010760f.s390x",
"product": {
"name": "podman-remote-2:4.2.0-2.module+el8.6.0+21674+8010760f.s390x",
"product_id": "podman-remote-2:4.2.0-2.module+el8.6.0+21674+8010760f.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-remote@4.2.0-2.module%2Bel8.6.0%2B21674%2B8010760f?arch=s390x\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "podman-remote-debuginfo-2:4.2.0-2.module+el8.6.0+21674+8010760f.s390x",
"product": {
"name": "podman-remote-debuginfo-2:4.2.0-2.module+el8.6.0+21674+8010760f.s390x",
"product_id": "podman-remote-debuginfo-2:4.2.0-2.module+el8.6.0+21674+8010760f.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-remote-debuginfo@4.2.0-2.module%2Bel8.6.0%2B21674%2B8010760f?arch=s390x\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "podman-tests-2:4.2.0-2.module+el8.6.0+21674+8010760f.s390x",
"product": {
"name": "podman-tests-2:4.2.0-2.module+el8.6.0+21674+8010760f.s390x",
"product_id": "podman-tests-2:4.2.0-2.module+el8.6.0+21674+8010760f.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-tests@4.2.0-2.module%2Bel8.6.0%2B21674%2B8010760f?arch=s390x\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "python3-criu-0:3.15-3.module+el8.6.0+21266+3e24c7b3.s390x",
"product": {
"name": "python3-criu-0:3.15-3.module+el8.6.0+21266+3e24c7b3.s390x",
"product_id": "python3-criu-0:3.15-3.module+el8.6.0+21266+3e24c7b3.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-criu@3.15-3.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "runc-1:1.1.12-1.module+el8.6.0+21266+3e24c7b3.s390x",
"product": {
"name": "runc-1:1.1.12-1.module+el8.6.0+21266+3e24c7b3.s390x",
"product_id": "runc-1:1.1.12-1.module+el8.6.0+21266+3e24c7b3.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/runc@1.1.12-1.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "runc-debuginfo-1:1.1.12-1.module+el8.6.0+21266+3e24c7b3.s390x",
"product": {
"name": "runc-debuginfo-1:1.1.12-1.module+el8.6.0+21266+3e24c7b3.s390x",
"product_id": "runc-debuginfo-1:1.1.12-1.module+el8.6.0+21266+3e24c7b3.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/runc-debuginfo@1.1.12-1.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "runc-debugsource-1:1.1.12-1.module+el8.6.0+21266+3e24c7b3.s390x",
"product": {
"name": "runc-debugsource-1:1.1.12-1.module+el8.6.0+21266+3e24c7b3.s390x",
"product_id": "runc-debugsource-1:1.1.12-1.module+el8.6.0+21266+3e24c7b3.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/runc-debugsource@1.1.12-1.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "skopeo-2:1.9.1-1.module+el8.6.0+21266+3e24c7b3.s390x",
"product": {
"name": "skopeo-2:1.9.1-1.module+el8.6.0+21266+3e24c7b3.s390x",
"product_id": "skopeo-2:1.9.1-1.module+el8.6.0+21266+3e24c7b3.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/skopeo@1.9.1-1.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=s390x\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "skopeo-debuginfo-2:1.9.1-1.module+el8.6.0+21266+3e24c7b3.s390x",
"product": {
"name": "skopeo-debuginfo-2:1.9.1-1.module+el8.6.0+21266+3e24c7b3.s390x",
"product_id": "skopeo-debuginfo-2:1.9.1-1.module+el8.6.0+21266+3e24c7b3.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/skopeo-debuginfo@1.9.1-1.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=s390x\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "skopeo-debugsource-2:1.9.1-1.module+el8.6.0+21266+3e24c7b3.s390x",
"product": {
"name": "skopeo-debugsource-2:1.9.1-1.module+el8.6.0+21266+3e24c7b3.s390x",
"product_id": "skopeo-debugsource-2:1.9.1-1.module+el8.6.0+21266+3e24c7b3.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/skopeo-debugsource@1.9.1-1.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=s390x\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "skopeo-tests-2:1.9.1-1.module+el8.6.0+21266+3e24c7b3.s390x",
"product": {
"name": "skopeo-tests-2:1.9.1-1.module+el8.6.0+21266+3e24c7b3.s390x",
"product_id": "skopeo-tests-2:1.9.1-1.module+el8.6.0+21266+3e24c7b3.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/skopeo-tests@1.9.1-1.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=s390x\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "slirp4netns-0:1.2.0-3.module+el8.6.0+21266+3e24c7b3.s390x",
"product": {
"name": "slirp4netns-0:1.2.0-3.module+el8.6.0+21266+3e24c7b3.s390x",
"product_id": "slirp4netns-0:1.2.0-3.module+el8.6.0+21266+3e24c7b3.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/slirp4netns@1.2.0-3.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "slirp4netns-debuginfo-0:1.2.0-3.module+el8.6.0+21266+3e24c7b3.s390x",
"product": {
"name": "slirp4netns-debuginfo-0:1.2.0-3.module+el8.6.0+21266+3e24c7b3.s390x",
"product_id": "slirp4netns-debuginfo-0:1.2.0-3.module+el8.6.0+21266+3e24c7b3.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/slirp4netns-debuginfo@1.2.0-3.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "slirp4netns-debugsource-0:1.2.0-3.module+el8.6.0+21266+3e24c7b3.s390x",
"product": {
"name": "slirp4netns-debugsource-0:1.2.0-3.module+el8.6.0+21266+3e24c7b3.s390x",
"product_id": "slirp4netns-debugsource-0:1.2.0-3.module+el8.6.0+21266+3e24c7b3.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/slirp4netns-debugsource@1.2.0-3.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "toolbox-0:0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.s390x",
"product": {
"name": "toolbox-0:0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.s390x",
"product_id": "toolbox-0:0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/toolbox@0.0.99.3-0.7.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "toolbox-debuginfo-0:0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.s390x",
"product": {
"name": "toolbox-debuginfo-0:0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.s390x",
"product_id": "toolbox-debuginfo-0:0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/toolbox-debuginfo@0.0.99.3-0.7.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "toolbox-debugsource-0:0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.s390x",
"product": {
"name": "toolbox-debugsource-0:0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.s390x",
"product_id": "toolbox-debugsource-0:0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/toolbox-debugsource@0.0.99.3-0.7.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "toolbox-tests-0:0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.s390x",
"product": {
"name": "toolbox-tests-0:0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.s390x",
"product_id": "toolbox-tests-0:0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/toolbox-tests@0.0.99.3-0.7.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "aardvark-dns-2:1.0.1-40.module+el8.6.0+21266+3e24c7b3.ppc64le",
"product": {
"name": "aardvark-dns-2:1.0.1-40.module+el8.6.0+21266+3e24c7b3.ppc64le",
"product_id": "aardvark-dns-2:1.0.1-40.module+el8.6.0+21266+3e24c7b3.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/aardvark-dns@1.0.1-40.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=ppc64le\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "buildah-1:1.26.2-1.module+el8.6.0+21266+3e24c7b3.ppc64le",
"product": {
"name": "buildah-1:1.26.2-1.module+el8.6.0+21266+3e24c7b3.ppc64le",
"product_id": "buildah-1:1.26.2-1.module+el8.6.0+21266+3e24c7b3.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/buildah@1.26.2-1.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "buildah-debuginfo-1:1.26.2-1.module+el8.6.0+21266+3e24c7b3.ppc64le",
"product": {
"name": "buildah-debuginfo-1:1.26.2-1.module+el8.6.0+21266+3e24c7b3.ppc64le",
"product_id": "buildah-debuginfo-1:1.26.2-1.module+el8.6.0+21266+3e24c7b3.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/buildah-debuginfo@1.26.2-1.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "buildah-debugsource-1:1.26.2-1.module+el8.6.0+21266+3e24c7b3.ppc64le",
"product": {
"name": "buildah-debugsource-1:1.26.2-1.module+el8.6.0+21266+3e24c7b3.ppc64le",
"product_id": "buildah-debugsource-1:1.26.2-1.module+el8.6.0+21266+3e24c7b3.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/buildah-debugsource@1.26.2-1.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "buildah-tests-1:1.26.2-1.module+el8.6.0+21266+3e24c7b3.ppc64le",
"product": {
"name": "buildah-tests-1:1.26.2-1.module+el8.6.0+21266+3e24c7b3.ppc64le",
"product_id": "buildah-tests-1:1.26.2-1.module+el8.6.0+21266+3e24c7b3.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/buildah-tests@1.26.2-1.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "buildah-tests-debuginfo-1:1.26.2-1.module+el8.6.0+21266+3e24c7b3.ppc64le",
"product": {
"name": "buildah-tests-debuginfo-1:1.26.2-1.module+el8.6.0+21266+3e24c7b3.ppc64le",
"product_id": "buildah-tests-debuginfo-1:1.26.2-1.module+el8.6.0+21266+3e24c7b3.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/buildah-tests-debuginfo@1.26.2-1.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "conmon-2:2.1.4-1.module+el8.6.0+21266+3e24c7b3.ppc64le",
"product": {
"name": "conmon-2:2.1.4-1.module+el8.6.0+21266+3e24c7b3.ppc64le",
"product_id": "conmon-2:2.1.4-1.module+el8.6.0+21266+3e24c7b3.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/conmon@2.1.4-1.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=ppc64le\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "conmon-debuginfo-2:2.1.4-1.module+el8.6.0+21266+3e24c7b3.ppc64le",
"product": {
"name": "conmon-debuginfo-2:2.1.4-1.module+el8.6.0+21266+3e24c7b3.ppc64le",
"product_id": "conmon-debuginfo-2:2.1.4-1.module+el8.6.0+21266+3e24c7b3.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/conmon-debuginfo@2.1.4-1.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=ppc64le\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "conmon-debugsource-2:2.1.4-1.module+el8.6.0+21266+3e24c7b3.ppc64le",
"product": {
"name": "conmon-debugsource-2:2.1.4-1.module+el8.6.0+21266+3e24c7b3.ppc64le",
"product_id": "conmon-debugsource-2:2.1.4-1.module+el8.6.0+21266+3e24c7b3.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/conmon-debugsource@2.1.4-1.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=ppc64le\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "containernetworking-plugins-1:1.1.1-4.module+el8.6.0+21266+3e24c7b3.ppc64le",
"product": {
"name": "containernetworking-plugins-1:1.1.1-4.module+el8.6.0+21266+3e24c7b3.ppc64le",
"product_id": "containernetworking-plugins-1:1.1.1-4.module+el8.6.0+21266+3e24c7b3.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/containernetworking-plugins@1.1.1-4.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "containernetworking-plugins-debuginfo-1:1.1.1-4.module+el8.6.0+21266+3e24c7b3.ppc64le",
"product": {
"name": "containernetworking-plugins-debuginfo-1:1.1.1-4.module+el8.6.0+21266+3e24c7b3.ppc64le",
"product_id": "containernetworking-plugins-debuginfo-1:1.1.1-4.module+el8.6.0+21266+3e24c7b3.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/containernetworking-plugins-debuginfo@1.1.1-4.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "containernetworking-plugins-debugsource-1:1.1.1-4.module+el8.6.0+21266+3e24c7b3.ppc64le",
"product": {
"name": "containernetworking-plugins-debugsource-1:1.1.1-4.module+el8.6.0+21266+3e24c7b3.ppc64le",
"product_id": "containernetworking-plugins-debugsource-1:1.1.1-4.module+el8.6.0+21266+3e24c7b3.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/containernetworking-plugins-debugsource@1.1.1-4.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "containers-common-2:1-40.module+el8.6.0+21266+3e24c7b3.ppc64le",
"product": {
"name": "containers-common-2:1-40.module+el8.6.0+21266+3e24c7b3.ppc64le",
"product_id": "containers-common-2:1-40.module+el8.6.0+21266+3e24c7b3.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/containers-common@1-40.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=ppc64le\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "crit-0:3.15-3.module+el8.6.0+21266+3e24c7b3.ppc64le",
"product": {
"name": "crit-0:3.15-3.module+el8.6.0+21266+3e24c7b3.ppc64le",
"product_id": "crit-0:3.15-3.module+el8.6.0+21266+3e24c7b3.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/crit@3.15-3.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "criu-0:3.15-3.module+el8.6.0+21266+3e24c7b3.ppc64le",
"product": {
"name": "criu-0:3.15-3.module+el8.6.0+21266+3e24c7b3.ppc64le",
"product_id": "criu-0:3.15-3.module+el8.6.0+21266+3e24c7b3.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/criu@3.15-3.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "criu-debuginfo-0:3.15-3.module+el8.6.0+21266+3e24c7b3.ppc64le",
"product": {
"name": "criu-debuginfo-0:3.15-3.module+el8.6.0+21266+3e24c7b3.ppc64le",
"product_id": "criu-debuginfo-0:3.15-3.module+el8.6.0+21266+3e24c7b3.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/criu-debuginfo@3.15-3.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "criu-debugsource-0:3.15-3.module+el8.6.0+21266+3e24c7b3.ppc64le",
"product": {
"name": "criu-debugsource-0:3.15-3.module+el8.6.0+21266+3e24c7b3.ppc64le",
"product_id": "criu-debugsource-0:3.15-3.module+el8.6.0+21266+3e24c7b3.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/criu-debugsource@3.15-3.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "criu-devel-0:3.15-3.module+el8.6.0+21266+3e24c7b3.ppc64le",
"product": {
"name": "criu-devel-0:3.15-3.module+el8.6.0+21266+3e24c7b3.ppc64le",
"product_id": "criu-devel-0:3.15-3.module+el8.6.0+21266+3e24c7b3.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/criu-devel@3.15-3.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "criu-libs-0:3.15-3.module+el8.6.0+21266+3e24c7b3.ppc64le",
"product": {
"name": "criu-libs-0:3.15-3.module+el8.6.0+21266+3e24c7b3.ppc64le",
"product_id": "criu-libs-0:3.15-3.module+el8.6.0+21266+3e24c7b3.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/criu-libs@3.15-3.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "criu-libs-debuginfo-0:3.15-3.module+el8.6.0+21266+3e24c7b3.ppc64le",
"product": {
"name": "criu-libs-debuginfo-0:3.15-3.module+el8.6.0+21266+3e24c7b3.ppc64le",
"product_id": "criu-libs-debuginfo-0:3.15-3.module+el8.6.0+21266+3e24c7b3.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/criu-libs-debuginfo@3.15-3.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "crun-0:1.5-1.module+el8.6.0+21266+3e24c7b3.ppc64le",
"product": {
"name": "crun-0:1.5-1.module+el8.6.0+21266+3e24c7b3.ppc64le",
"product_id": "crun-0:1.5-1.module+el8.6.0+21266+3e24c7b3.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/crun@1.5-1.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "crun-debuginfo-0:1.5-1.module+el8.6.0+21266+3e24c7b3.ppc64le",
"product": {
"name": "crun-debuginfo-0:1.5-1.module+el8.6.0+21266+3e24c7b3.ppc64le",
"product_id": "crun-debuginfo-0:1.5-1.module+el8.6.0+21266+3e24c7b3.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/crun-debuginfo@1.5-1.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "crun-debugsource-0:1.5-1.module+el8.6.0+21266+3e24c7b3.ppc64le",
"product": {
"name": "crun-debugsource-0:1.5-1.module+el8.6.0+21266+3e24c7b3.ppc64le",
"product_id": "crun-debugsource-0:1.5-1.module+el8.6.0+21266+3e24c7b3.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/crun-debugsource@1.5-1.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "fuse-overlayfs-0:1.9-1.module+el8.6.0+21266+3e24c7b3.ppc64le",
"product": {
"name": "fuse-overlayfs-0:1.9-1.module+el8.6.0+21266+3e24c7b3.ppc64le",
"product_id": "fuse-overlayfs-0:1.9-1.module+el8.6.0+21266+3e24c7b3.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fuse-overlayfs@1.9-1.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "fuse-overlayfs-debuginfo-0:1.9-1.module+el8.6.0+21266+3e24c7b3.ppc64le",
"product": {
"name": "fuse-overlayfs-debuginfo-0:1.9-1.module+el8.6.0+21266+3e24c7b3.ppc64le",
"product_id": "fuse-overlayfs-debuginfo-0:1.9-1.module+el8.6.0+21266+3e24c7b3.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fuse-overlayfs-debuginfo@1.9-1.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "fuse-overlayfs-debugsource-0:1.9-1.module+el8.6.0+21266+3e24c7b3.ppc64le",
"product": {
"name": "fuse-overlayfs-debugsource-0:1.9-1.module+el8.6.0+21266+3e24c7b3.ppc64le",
"product_id": "fuse-overlayfs-debugsource-0:1.9-1.module+el8.6.0+21266+3e24c7b3.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fuse-overlayfs-debugsource@1.9-1.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "libslirp-0:4.4.0-1.module+el8.6.0+21266+3e24c7b3.ppc64le",
"product": {
"name": "libslirp-0:4.4.0-1.module+el8.6.0+21266+3e24c7b3.ppc64le",
"product_id": "libslirp-0:4.4.0-1.module+el8.6.0+21266+3e24c7b3.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libslirp@4.4.0-1.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "libslirp-debuginfo-0:4.4.0-1.module+el8.6.0+21266+3e24c7b3.ppc64le",
"product": {
"name": "libslirp-debuginfo-0:4.4.0-1.module+el8.6.0+21266+3e24c7b3.ppc64le",
"product_id": "libslirp-debuginfo-0:4.4.0-1.module+el8.6.0+21266+3e24c7b3.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libslirp-debuginfo@4.4.0-1.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "libslirp-debugsource-0:4.4.0-1.module+el8.6.0+21266+3e24c7b3.ppc64le",
"product": {
"name": "libslirp-debugsource-0:4.4.0-1.module+el8.6.0+21266+3e24c7b3.ppc64le",
"product_id": "libslirp-debugsource-0:4.4.0-1.module+el8.6.0+21266+3e24c7b3.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libslirp-debugsource@4.4.0-1.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "libslirp-devel-0:4.4.0-1.module+el8.6.0+21266+3e24c7b3.ppc64le",
"product": {
"name": "libslirp-devel-0:4.4.0-1.module+el8.6.0+21266+3e24c7b3.ppc64le",
"product_id": "libslirp-devel-0:4.4.0-1.module+el8.6.0+21266+3e24c7b3.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libslirp-devel@4.4.0-1.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "netavark-2:1.0.1-40.module+el8.6.0+21266+3e24c7b3.ppc64le",
"product": {
"name": "netavark-2:1.0.1-40.module+el8.6.0+21266+3e24c7b3.ppc64le",
"product_id": "netavark-2:1.0.1-40.module+el8.6.0+21266+3e24c7b3.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/netavark@1.0.1-40.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=ppc64le\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "oci-seccomp-bpf-hook-0:1.2.6-1.module+el8.6.0+21266+3e24c7b3.ppc64le",
"product": {
"name": "oci-seccomp-bpf-hook-0:1.2.6-1.module+el8.6.0+21266+3e24c7b3.ppc64le",
"product_id": "oci-seccomp-bpf-hook-0:1.2.6-1.module+el8.6.0+21266+3e24c7b3.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/oci-seccomp-bpf-hook@1.2.6-1.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "oci-seccomp-bpf-hook-debuginfo-0:1.2.6-1.module+el8.6.0+21266+3e24c7b3.ppc64le",
"product": {
"name": "oci-seccomp-bpf-hook-debuginfo-0:1.2.6-1.module+el8.6.0+21266+3e24c7b3.ppc64le",
"product_id": "oci-seccomp-bpf-hook-debuginfo-0:1.2.6-1.module+el8.6.0+21266+3e24c7b3.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/oci-seccomp-bpf-hook-debuginfo@1.2.6-1.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "oci-seccomp-bpf-hook-debugsource-0:1.2.6-1.module+el8.6.0+21266+3e24c7b3.ppc64le",
"product": {
"name": "oci-seccomp-bpf-hook-debugsource-0:1.2.6-1.module+el8.6.0+21266+3e24c7b3.ppc64le",
"product_id": "oci-seccomp-bpf-hook-debugsource-0:1.2.6-1.module+el8.6.0+21266+3e24c7b3.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/oci-seccomp-bpf-hook-debugsource@1.2.6-1.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "podman-2:4.2.0-2.module+el8.6.0+21674+8010760f.ppc64le",
"product": {
"name": "podman-2:4.2.0-2.module+el8.6.0+21674+8010760f.ppc64le",
"product_id": "podman-2:4.2.0-2.module+el8.6.0+21674+8010760f.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman@4.2.0-2.module%2Bel8.6.0%2B21674%2B8010760f?arch=ppc64le\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "podman-catatonit-2:4.2.0-2.module+el8.6.0+21674+8010760f.ppc64le",
"product": {
"name": "podman-catatonit-2:4.2.0-2.module+el8.6.0+21674+8010760f.ppc64le",
"product_id": "podman-catatonit-2:4.2.0-2.module+el8.6.0+21674+8010760f.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-catatonit@4.2.0-2.module%2Bel8.6.0%2B21674%2B8010760f?arch=ppc64le\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "podman-catatonit-debuginfo-2:4.2.0-2.module+el8.6.0+21674+8010760f.ppc64le",
"product": {
"name": "podman-catatonit-debuginfo-2:4.2.0-2.module+el8.6.0+21674+8010760f.ppc64le",
"product_id": "podman-catatonit-debuginfo-2:4.2.0-2.module+el8.6.0+21674+8010760f.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-catatonit-debuginfo@4.2.0-2.module%2Bel8.6.0%2B21674%2B8010760f?arch=ppc64le\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "podman-debuginfo-2:4.2.0-2.module+el8.6.0+21674+8010760f.ppc64le",
"product": {
"name": "podman-debuginfo-2:4.2.0-2.module+el8.6.0+21674+8010760f.ppc64le",
"product_id": "podman-debuginfo-2:4.2.0-2.module+el8.6.0+21674+8010760f.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-debuginfo@4.2.0-2.module%2Bel8.6.0%2B21674%2B8010760f?arch=ppc64le\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "podman-debugsource-2:4.2.0-2.module+el8.6.0+21674+8010760f.ppc64le",
"product": {
"name": "podman-debugsource-2:4.2.0-2.module+el8.6.0+21674+8010760f.ppc64le",
"product_id": "podman-debugsource-2:4.2.0-2.module+el8.6.0+21674+8010760f.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-debugsource@4.2.0-2.module%2Bel8.6.0%2B21674%2B8010760f?arch=ppc64le\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "podman-gvproxy-2:4.2.0-2.module+el8.6.0+21674+8010760f.ppc64le",
"product": {
"name": "podman-gvproxy-2:4.2.0-2.module+el8.6.0+21674+8010760f.ppc64le",
"product_id": "podman-gvproxy-2:4.2.0-2.module+el8.6.0+21674+8010760f.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-gvproxy@4.2.0-2.module%2Bel8.6.0%2B21674%2B8010760f?arch=ppc64le\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "podman-gvproxy-debuginfo-2:4.2.0-2.module+el8.6.0+21674+8010760f.ppc64le",
"product": {
"name": "podman-gvproxy-debuginfo-2:4.2.0-2.module+el8.6.0+21674+8010760f.ppc64le",
"product_id": "podman-gvproxy-debuginfo-2:4.2.0-2.module+el8.6.0+21674+8010760f.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-gvproxy-debuginfo@4.2.0-2.module%2Bel8.6.0%2B21674%2B8010760f?arch=ppc64le\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "podman-plugins-2:4.2.0-2.module+el8.6.0+21674+8010760f.ppc64le",
"product": {
"name": "podman-plugins-2:4.2.0-2.module+el8.6.0+21674+8010760f.ppc64le",
"product_id": "podman-plugins-2:4.2.0-2.module+el8.6.0+21674+8010760f.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-plugins@4.2.0-2.module%2Bel8.6.0%2B21674%2B8010760f?arch=ppc64le\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "podman-plugins-debuginfo-2:4.2.0-2.module+el8.6.0+21674+8010760f.ppc64le",
"product": {
"name": "podman-plugins-debuginfo-2:4.2.0-2.module+el8.6.0+21674+8010760f.ppc64le",
"product_id": "podman-plugins-debuginfo-2:4.2.0-2.module+el8.6.0+21674+8010760f.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-plugins-debuginfo@4.2.0-2.module%2Bel8.6.0%2B21674%2B8010760f?arch=ppc64le\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "podman-remote-2:4.2.0-2.module+el8.6.0+21674+8010760f.ppc64le",
"product": {
"name": "podman-remote-2:4.2.0-2.module+el8.6.0+21674+8010760f.ppc64le",
"product_id": "podman-remote-2:4.2.0-2.module+el8.6.0+21674+8010760f.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-remote@4.2.0-2.module%2Bel8.6.0%2B21674%2B8010760f?arch=ppc64le\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "podman-remote-debuginfo-2:4.2.0-2.module+el8.6.0+21674+8010760f.ppc64le",
"product": {
"name": "podman-remote-debuginfo-2:4.2.0-2.module+el8.6.0+21674+8010760f.ppc64le",
"product_id": "podman-remote-debuginfo-2:4.2.0-2.module+el8.6.0+21674+8010760f.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-remote-debuginfo@4.2.0-2.module%2Bel8.6.0%2B21674%2B8010760f?arch=ppc64le\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "podman-tests-2:4.2.0-2.module+el8.6.0+21674+8010760f.ppc64le",
"product": {
"name": "podman-tests-2:4.2.0-2.module+el8.6.0+21674+8010760f.ppc64le",
"product_id": "podman-tests-2:4.2.0-2.module+el8.6.0+21674+8010760f.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-tests@4.2.0-2.module%2Bel8.6.0%2B21674%2B8010760f?arch=ppc64le\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "python3-criu-0:3.15-3.module+el8.6.0+21266+3e24c7b3.ppc64le",
"product": {
"name": "python3-criu-0:3.15-3.module+el8.6.0+21266+3e24c7b3.ppc64le",
"product_id": "python3-criu-0:3.15-3.module+el8.6.0+21266+3e24c7b3.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-criu@3.15-3.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "runc-1:1.1.12-1.module+el8.6.0+21266+3e24c7b3.ppc64le",
"product": {
"name": "runc-1:1.1.12-1.module+el8.6.0+21266+3e24c7b3.ppc64le",
"product_id": "runc-1:1.1.12-1.module+el8.6.0+21266+3e24c7b3.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/runc@1.1.12-1.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "runc-debuginfo-1:1.1.12-1.module+el8.6.0+21266+3e24c7b3.ppc64le",
"product": {
"name": "runc-debuginfo-1:1.1.12-1.module+el8.6.0+21266+3e24c7b3.ppc64le",
"product_id": "runc-debuginfo-1:1.1.12-1.module+el8.6.0+21266+3e24c7b3.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/runc-debuginfo@1.1.12-1.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "runc-debugsource-1:1.1.12-1.module+el8.6.0+21266+3e24c7b3.ppc64le",
"product": {
"name": "runc-debugsource-1:1.1.12-1.module+el8.6.0+21266+3e24c7b3.ppc64le",
"product_id": "runc-debugsource-1:1.1.12-1.module+el8.6.0+21266+3e24c7b3.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/runc-debugsource@1.1.12-1.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "skopeo-2:1.9.1-1.module+el8.6.0+21266+3e24c7b3.ppc64le",
"product": {
"name": "skopeo-2:1.9.1-1.module+el8.6.0+21266+3e24c7b3.ppc64le",
"product_id": "skopeo-2:1.9.1-1.module+el8.6.0+21266+3e24c7b3.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/skopeo@1.9.1-1.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=ppc64le\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "skopeo-debuginfo-2:1.9.1-1.module+el8.6.0+21266+3e24c7b3.ppc64le",
"product": {
"name": "skopeo-debuginfo-2:1.9.1-1.module+el8.6.0+21266+3e24c7b3.ppc64le",
"product_id": "skopeo-debuginfo-2:1.9.1-1.module+el8.6.0+21266+3e24c7b3.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/skopeo-debuginfo@1.9.1-1.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=ppc64le\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "skopeo-debugsource-2:1.9.1-1.module+el8.6.0+21266+3e24c7b3.ppc64le",
"product": {
"name": "skopeo-debugsource-2:1.9.1-1.module+el8.6.0+21266+3e24c7b3.ppc64le",
"product_id": "skopeo-debugsource-2:1.9.1-1.module+el8.6.0+21266+3e24c7b3.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/skopeo-debugsource@1.9.1-1.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=ppc64le\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "skopeo-tests-2:1.9.1-1.module+el8.6.0+21266+3e24c7b3.ppc64le",
"product": {
"name": "skopeo-tests-2:1.9.1-1.module+el8.6.0+21266+3e24c7b3.ppc64le",
"product_id": "skopeo-tests-2:1.9.1-1.module+el8.6.0+21266+3e24c7b3.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/skopeo-tests@1.9.1-1.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=ppc64le\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "slirp4netns-0:1.2.0-3.module+el8.6.0+21266+3e24c7b3.ppc64le",
"product": {
"name": "slirp4netns-0:1.2.0-3.module+el8.6.0+21266+3e24c7b3.ppc64le",
"product_id": "slirp4netns-0:1.2.0-3.module+el8.6.0+21266+3e24c7b3.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/slirp4netns@1.2.0-3.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "slirp4netns-debuginfo-0:1.2.0-3.module+el8.6.0+21266+3e24c7b3.ppc64le",
"product": {
"name": "slirp4netns-debuginfo-0:1.2.0-3.module+el8.6.0+21266+3e24c7b3.ppc64le",
"product_id": "slirp4netns-debuginfo-0:1.2.0-3.module+el8.6.0+21266+3e24c7b3.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/slirp4netns-debuginfo@1.2.0-3.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "slirp4netns-debugsource-0:1.2.0-3.module+el8.6.0+21266+3e24c7b3.ppc64le",
"product": {
"name": "slirp4netns-debugsource-0:1.2.0-3.module+el8.6.0+21266+3e24c7b3.ppc64le",
"product_id": "slirp4netns-debugsource-0:1.2.0-3.module+el8.6.0+21266+3e24c7b3.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/slirp4netns-debugsource@1.2.0-3.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "toolbox-0:0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.ppc64le",
"product": {
"name": "toolbox-0:0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.ppc64le",
"product_id": "toolbox-0:0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/toolbox@0.0.99.3-0.7.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "toolbox-debuginfo-0:0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.ppc64le",
"product": {
"name": "toolbox-debuginfo-0:0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.ppc64le",
"product_id": "toolbox-debuginfo-0:0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/toolbox-debuginfo@0.0.99.3-0.7.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "toolbox-debugsource-0:0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.ppc64le",
"product": {
"name": "toolbox-debugsource-0:0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.ppc64le",
"product_id": "toolbox-debugsource-0:0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/toolbox-debugsource@0.0.99.3-0.7.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "toolbox-tests-0:0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.ppc64le",
"product": {
"name": "toolbox-tests-0:0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.ppc64le",
"product_id": "toolbox-tests-0:0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/toolbox-tests@0.0.99.3-0.7.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "aardvark-dns-2:1.0.1-40.module+el8.6.0+21266+3e24c7b3.aarch64",
"product": {
"name": "aardvark-dns-2:1.0.1-40.module+el8.6.0+21266+3e24c7b3.aarch64",
"product_id": "aardvark-dns-2:1.0.1-40.module+el8.6.0+21266+3e24c7b3.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/aardvark-dns@1.0.1-40.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=aarch64\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "buildah-1:1.26.2-1.module+el8.6.0+21266+3e24c7b3.aarch64",
"product": {
"name": "buildah-1:1.26.2-1.module+el8.6.0+21266+3e24c7b3.aarch64",
"product_id": "buildah-1:1.26.2-1.module+el8.6.0+21266+3e24c7b3.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/buildah@1.26.2-1.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=aarch64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "buildah-debuginfo-1:1.26.2-1.module+el8.6.0+21266+3e24c7b3.aarch64",
"product": {
"name": "buildah-debuginfo-1:1.26.2-1.module+el8.6.0+21266+3e24c7b3.aarch64",
"product_id": "buildah-debuginfo-1:1.26.2-1.module+el8.6.0+21266+3e24c7b3.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/buildah-debuginfo@1.26.2-1.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=aarch64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "buildah-debugsource-1:1.26.2-1.module+el8.6.0+21266+3e24c7b3.aarch64",
"product": {
"name": "buildah-debugsource-1:1.26.2-1.module+el8.6.0+21266+3e24c7b3.aarch64",
"product_id": "buildah-debugsource-1:1.26.2-1.module+el8.6.0+21266+3e24c7b3.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/buildah-debugsource@1.26.2-1.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=aarch64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "buildah-tests-1:1.26.2-1.module+el8.6.0+21266+3e24c7b3.aarch64",
"product": {
"name": "buildah-tests-1:1.26.2-1.module+el8.6.0+21266+3e24c7b3.aarch64",
"product_id": "buildah-tests-1:1.26.2-1.module+el8.6.0+21266+3e24c7b3.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/buildah-tests@1.26.2-1.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=aarch64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "buildah-tests-debuginfo-1:1.26.2-1.module+el8.6.0+21266+3e24c7b3.aarch64",
"product": {
"name": "buildah-tests-debuginfo-1:1.26.2-1.module+el8.6.0+21266+3e24c7b3.aarch64",
"product_id": "buildah-tests-debuginfo-1:1.26.2-1.module+el8.6.0+21266+3e24c7b3.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/buildah-tests-debuginfo@1.26.2-1.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=aarch64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "conmon-2:2.1.4-1.module+el8.6.0+21266+3e24c7b3.aarch64",
"product": {
"name": "conmon-2:2.1.4-1.module+el8.6.0+21266+3e24c7b3.aarch64",
"product_id": "conmon-2:2.1.4-1.module+el8.6.0+21266+3e24c7b3.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/conmon@2.1.4-1.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=aarch64\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "conmon-debuginfo-2:2.1.4-1.module+el8.6.0+21266+3e24c7b3.aarch64",
"product": {
"name": "conmon-debuginfo-2:2.1.4-1.module+el8.6.0+21266+3e24c7b3.aarch64",
"product_id": "conmon-debuginfo-2:2.1.4-1.module+el8.6.0+21266+3e24c7b3.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/conmon-debuginfo@2.1.4-1.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=aarch64\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "conmon-debugsource-2:2.1.4-1.module+el8.6.0+21266+3e24c7b3.aarch64",
"product": {
"name": "conmon-debugsource-2:2.1.4-1.module+el8.6.0+21266+3e24c7b3.aarch64",
"product_id": "conmon-debugsource-2:2.1.4-1.module+el8.6.0+21266+3e24c7b3.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/conmon-debugsource@2.1.4-1.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=aarch64\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "containernetworking-plugins-1:1.1.1-4.module+el8.6.0+21266+3e24c7b3.aarch64",
"product": {
"name": "containernetworking-plugins-1:1.1.1-4.module+el8.6.0+21266+3e24c7b3.aarch64",
"product_id": "containernetworking-plugins-1:1.1.1-4.module+el8.6.0+21266+3e24c7b3.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/containernetworking-plugins@1.1.1-4.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=aarch64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "containernetworking-plugins-debuginfo-1:1.1.1-4.module+el8.6.0+21266+3e24c7b3.aarch64",
"product": {
"name": "containernetworking-plugins-debuginfo-1:1.1.1-4.module+el8.6.0+21266+3e24c7b3.aarch64",
"product_id": "containernetworking-plugins-debuginfo-1:1.1.1-4.module+el8.6.0+21266+3e24c7b3.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/containernetworking-plugins-debuginfo@1.1.1-4.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=aarch64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "containernetworking-plugins-debugsource-1:1.1.1-4.module+el8.6.0+21266+3e24c7b3.aarch64",
"product": {
"name": "containernetworking-plugins-debugsource-1:1.1.1-4.module+el8.6.0+21266+3e24c7b3.aarch64",
"product_id": "containernetworking-plugins-debugsource-1:1.1.1-4.module+el8.6.0+21266+3e24c7b3.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/containernetworking-plugins-debugsource@1.1.1-4.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=aarch64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "containers-common-2:1-40.module+el8.6.0+21266+3e24c7b3.aarch64",
"product": {
"name": "containers-common-2:1-40.module+el8.6.0+21266+3e24c7b3.aarch64",
"product_id": "containers-common-2:1-40.module+el8.6.0+21266+3e24c7b3.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/containers-common@1-40.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=aarch64\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "crit-0:3.15-3.module+el8.6.0+21266+3e24c7b3.aarch64",
"product": {
"name": "crit-0:3.15-3.module+el8.6.0+21266+3e24c7b3.aarch64",
"product_id": "crit-0:3.15-3.module+el8.6.0+21266+3e24c7b3.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/crit@3.15-3.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "criu-0:3.15-3.module+el8.6.0+21266+3e24c7b3.aarch64",
"product": {
"name": "criu-0:3.15-3.module+el8.6.0+21266+3e24c7b3.aarch64",
"product_id": "criu-0:3.15-3.module+el8.6.0+21266+3e24c7b3.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/criu@3.15-3.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "criu-debuginfo-0:3.15-3.module+el8.6.0+21266+3e24c7b3.aarch64",
"product": {
"name": "criu-debuginfo-0:3.15-3.module+el8.6.0+21266+3e24c7b3.aarch64",
"product_id": "criu-debuginfo-0:3.15-3.module+el8.6.0+21266+3e24c7b3.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/criu-debuginfo@3.15-3.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "criu-debugsource-0:3.15-3.module+el8.6.0+21266+3e24c7b3.aarch64",
"product": {
"name": "criu-debugsource-0:3.15-3.module+el8.6.0+21266+3e24c7b3.aarch64",
"product_id": "criu-debugsource-0:3.15-3.module+el8.6.0+21266+3e24c7b3.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/criu-debugsource@3.15-3.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "criu-devel-0:3.15-3.module+el8.6.0+21266+3e24c7b3.aarch64",
"product": {
"name": "criu-devel-0:3.15-3.module+el8.6.0+21266+3e24c7b3.aarch64",
"product_id": "criu-devel-0:3.15-3.module+el8.6.0+21266+3e24c7b3.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/criu-devel@3.15-3.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "criu-libs-0:3.15-3.module+el8.6.0+21266+3e24c7b3.aarch64",
"product": {
"name": "criu-libs-0:3.15-3.module+el8.6.0+21266+3e24c7b3.aarch64",
"product_id": "criu-libs-0:3.15-3.module+el8.6.0+21266+3e24c7b3.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/criu-libs@3.15-3.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "criu-libs-debuginfo-0:3.15-3.module+el8.6.0+21266+3e24c7b3.aarch64",
"product": {
"name": "criu-libs-debuginfo-0:3.15-3.module+el8.6.0+21266+3e24c7b3.aarch64",
"product_id": "criu-libs-debuginfo-0:3.15-3.module+el8.6.0+21266+3e24c7b3.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/criu-libs-debuginfo@3.15-3.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "crun-0:1.5-1.module+el8.6.0+21266+3e24c7b3.aarch64",
"product": {
"name": "crun-0:1.5-1.module+el8.6.0+21266+3e24c7b3.aarch64",
"product_id": "crun-0:1.5-1.module+el8.6.0+21266+3e24c7b3.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/crun@1.5-1.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "crun-debuginfo-0:1.5-1.module+el8.6.0+21266+3e24c7b3.aarch64",
"product": {
"name": "crun-debuginfo-0:1.5-1.module+el8.6.0+21266+3e24c7b3.aarch64",
"product_id": "crun-debuginfo-0:1.5-1.module+el8.6.0+21266+3e24c7b3.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/crun-debuginfo@1.5-1.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "crun-debugsource-0:1.5-1.module+el8.6.0+21266+3e24c7b3.aarch64",
"product": {
"name": "crun-debugsource-0:1.5-1.module+el8.6.0+21266+3e24c7b3.aarch64",
"product_id": "crun-debugsource-0:1.5-1.module+el8.6.0+21266+3e24c7b3.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/crun-debugsource@1.5-1.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "fuse-overlayfs-0:1.9-1.module+el8.6.0+21266+3e24c7b3.aarch64",
"product": {
"name": "fuse-overlayfs-0:1.9-1.module+el8.6.0+21266+3e24c7b3.aarch64",
"product_id": "fuse-overlayfs-0:1.9-1.module+el8.6.0+21266+3e24c7b3.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fuse-overlayfs@1.9-1.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "fuse-overlayfs-debuginfo-0:1.9-1.module+el8.6.0+21266+3e24c7b3.aarch64",
"product": {
"name": "fuse-overlayfs-debuginfo-0:1.9-1.module+el8.6.0+21266+3e24c7b3.aarch64",
"product_id": "fuse-overlayfs-debuginfo-0:1.9-1.module+el8.6.0+21266+3e24c7b3.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fuse-overlayfs-debuginfo@1.9-1.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "fuse-overlayfs-debugsource-0:1.9-1.module+el8.6.0+21266+3e24c7b3.aarch64",
"product": {
"name": "fuse-overlayfs-debugsource-0:1.9-1.module+el8.6.0+21266+3e24c7b3.aarch64",
"product_id": "fuse-overlayfs-debugsource-0:1.9-1.module+el8.6.0+21266+3e24c7b3.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fuse-overlayfs-debugsource@1.9-1.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "libslirp-0:4.4.0-1.module+el8.6.0+21266+3e24c7b3.aarch64",
"product": {
"name": "libslirp-0:4.4.0-1.module+el8.6.0+21266+3e24c7b3.aarch64",
"product_id": "libslirp-0:4.4.0-1.module+el8.6.0+21266+3e24c7b3.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libslirp@4.4.0-1.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "libslirp-debuginfo-0:4.4.0-1.module+el8.6.0+21266+3e24c7b3.aarch64",
"product": {
"name": "libslirp-debuginfo-0:4.4.0-1.module+el8.6.0+21266+3e24c7b3.aarch64",
"product_id": "libslirp-debuginfo-0:4.4.0-1.module+el8.6.0+21266+3e24c7b3.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libslirp-debuginfo@4.4.0-1.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "libslirp-debugsource-0:4.4.0-1.module+el8.6.0+21266+3e24c7b3.aarch64",
"product": {
"name": "libslirp-debugsource-0:4.4.0-1.module+el8.6.0+21266+3e24c7b3.aarch64",
"product_id": "libslirp-debugsource-0:4.4.0-1.module+el8.6.0+21266+3e24c7b3.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libslirp-debugsource@4.4.0-1.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "libslirp-devel-0:4.4.0-1.module+el8.6.0+21266+3e24c7b3.aarch64",
"product": {
"name": "libslirp-devel-0:4.4.0-1.module+el8.6.0+21266+3e24c7b3.aarch64",
"product_id": "libslirp-devel-0:4.4.0-1.module+el8.6.0+21266+3e24c7b3.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libslirp-devel@4.4.0-1.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "netavark-2:1.0.1-40.module+el8.6.0+21266+3e24c7b3.aarch64",
"product": {
"name": "netavark-2:1.0.1-40.module+el8.6.0+21266+3e24c7b3.aarch64",
"product_id": "netavark-2:1.0.1-40.module+el8.6.0+21266+3e24c7b3.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/netavark@1.0.1-40.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=aarch64\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "oci-seccomp-bpf-hook-0:1.2.6-1.module+el8.6.0+21266+3e24c7b3.aarch64",
"product": {
"name": "oci-seccomp-bpf-hook-0:1.2.6-1.module+el8.6.0+21266+3e24c7b3.aarch64",
"product_id": "oci-seccomp-bpf-hook-0:1.2.6-1.module+el8.6.0+21266+3e24c7b3.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/oci-seccomp-bpf-hook@1.2.6-1.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "oci-seccomp-bpf-hook-debuginfo-0:1.2.6-1.module+el8.6.0+21266+3e24c7b3.aarch64",
"product": {
"name": "oci-seccomp-bpf-hook-debuginfo-0:1.2.6-1.module+el8.6.0+21266+3e24c7b3.aarch64",
"product_id": "oci-seccomp-bpf-hook-debuginfo-0:1.2.6-1.module+el8.6.0+21266+3e24c7b3.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/oci-seccomp-bpf-hook-debuginfo@1.2.6-1.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "oci-seccomp-bpf-hook-debugsource-0:1.2.6-1.module+el8.6.0+21266+3e24c7b3.aarch64",
"product": {
"name": "oci-seccomp-bpf-hook-debugsource-0:1.2.6-1.module+el8.6.0+21266+3e24c7b3.aarch64",
"product_id": "oci-seccomp-bpf-hook-debugsource-0:1.2.6-1.module+el8.6.0+21266+3e24c7b3.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/oci-seccomp-bpf-hook-debugsource@1.2.6-1.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "podman-2:4.2.0-2.module+el8.6.0+21674+8010760f.aarch64",
"product": {
"name": "podman-2:4.2.0-2.module+el8.6.0+21674+8010760f.aarch64",
"product_id": "podman-2:4.2.0-2.module+el8.6.0+21674+8010760f.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman@4.2.0-2.module%2Bel8.6.0%2B21674%2B8010760f?arch=aarch64\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "podman-catatonit-2:4.2.0-2.module+el8.6.0+21674+8010760f.aarch64",
"product": {
"name": "podman-catatonit-2:4.2.0-2.module+el8.6.0+21674+8010760f.aarch64",
"product_id": "podman-catatonit-2:4.2.0-2.module+el8.6.0+21674+8010760f.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-catatonit@4.2.0-2.module%2Bel8.6.0%2B21674%2B8010760f?arch=aarch64\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "podman-catatonit-debuginfo-2:4.2.0-2.module+el8.6.0+21674+8010760f.aarch64",
"product": {
"name": "podman-catatonit-debuginfo-2:4.2.0-2.module+el8.6.0+21674+8010760f.aarch64",
"product_id": "podman-catatonit-debuginfo-2:4.2.0-2.module+el8.6.0+21674+8010760f.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-catatonit-debuginfo@4.2.0-2.module%2Bel8.6.0%2B21674%2B8010760f?arch=aarch64\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "podman-debuginfo-2:4.2.0-2.module+el8.6.0+21674+8010760f.aarch64",
"product": {
"name": "podman-debuginfo-2:4.2.0-2.module+el8.6.0+21674+8010760f.aarch64",
"product_id": "podman-debuginfo-2:4.2.0-2.module+el8.6.0+21674+8010760f.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-debuginfo@4.2.0-2.module%2Bel8.6.0%2B21674%2B8010760f?arch=aarch64\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "podman-debugsource-2:4.2.0-2.module+el8.6.0+21674+8010760f.aarch64",
"product": {
"name": "podman-debugsource-2:4.2.0-2.module+el8.6.0+21674+8010760f.aarch64",
"product_id": "podman-debugsource-2:4.2.0-2.module+el8.6.0+21674+8010760f.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-debugsource@4.2.0-2.module%2Bel8.6.0%2B21674%2B8010760f?arch=aarch64\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "podman-gvproxy-2:4.2.0-2.module+el8.6.0+21674+8010760f.aarch64",
"product": {
"name": "podman-gvproxy-2:4.2.0-2.module+el8.6.0+21674+8010760f.aarch64",
"product_id": "podman-gvproxy-2:4.2.0-2.module+el8.6.0+21674+8010760f.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-gvproxy@4.2.0-2.module%2Bel8.6.0%2B21674%2B8010760f?arch=aarch64\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "podman-gvproxy-debuginfo-2:4.2.0-2.module+el8.6.0+21674+8010760f.aarch64",
"product": {
"name": "podman-gvproxy-debuginfo-2:4.2.0-2.module+el8.6.0+21674+8010760f.aarch64",
"product_id": "podman-gvproxy-debuginfo-2:4.2.0-2.module+el8.6.0+21674+8010760f.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-gvproxy-debuginfo@4.2.0-2.module%2Bel8.6.0%2B21674%2B8010760f?arch=aarch64\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "podman-plugins-2:4.2.0-2.module+el8.6.0+21674+8010760f.aarch64",
"product": {
"name": "podman-plugins-2:4.2.0-2.module+el8.6.0+21674+8010760f.aarch64",
"product_id": "podman-plugins-2:4.2.0-2.module+el8.6.0+21674+8010760f.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-plugins@4.2.0-2.module%2Bel8.6.0%2B21674%2B8010760f?arch=aarch64\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "podman-plugins-debuginfo-2:4.2.0-2.module+el8.6.0+21674+8010760f.aarch64",
"product": {
"name": "podman-plugins-debuginfo-2:4.2.0-2.module+el8.6.0+21674+8010760f.aarch64",
"product_id": "podman-plugins-debuginfo-2:4.2.0-2.module+el8.6.0+21674+8010760f.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-plugins-debuginfo@4.2.0-2.module%2Bel8.6.0%2B21674%2B8010760f?arch=aarch64\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "podman-remote-2:4.2.0-2.module+el8.6.0+21674+8010760f.aarch64",
"product": {
"name": "podman-remote-2:4.2.0-2.module+el8.6.0+21674+8010760f.aarch64",
"product_id": "podman-remote-2:4.2.0-2.module+el8.6.0+21674+8010760f.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-remote@4.2.0-2.module%2Bel8.6.0%2B21674%2B8010760f?arch=aarch64\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "podman-remote-debuginfo-2:4.2.0-2.module+el8.6.0+21674+8010760f.aarch64",
"product": {
"name": "podman-remote-debuginfo-2:4.2.0-2.module+el8.6.0+21674+8010760f.aarch64",
"product_id": "podman-remote-debuginfo-2:4.2.0-2.module+el8.6.0+21674+8010760f.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-remote-debuginfo@4.2.0-2.module%2Bel8.6.0%2B21674%2B8010760f?arch=aarch64\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "podman-tests-2:4.2.0-2.module+el8.6.0+21674+8010760f.aarch64",
"product": {
"name": "podman-tests-2:4.2.0-2.module+el8.6.0+21674+8010760f.aarch64",
"product_id": "podman-tests-2:4.2.0-2.module+el8.6.0+21674+8010760f.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-tests@4.2.0-2.module%2Bel8.6.0%2B21674%2B8010760f?arch=aarch64\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "python3-criu-0:3.15-3.module+el8.6.0+21266+3e24c7b3.aarch64",
"product": {
"name": "python3-criu-0:3.15-3.module+el8.6.0+21266+3e24c7b3.aarch64",
"product_id": "python3-criu-0:3.15-3.module+el8.6.0+21266+3e24c7b3.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-criu@3.15-3.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "runc-1:1.1.12-1.module+el8.6.0+21266+3e24c7b3.aarch64",
"product": {
"name": "runc-1:1.1.12-1.module+el8.6.0+21266+3e24c7b3.aarch64",
"product_id": "runc-1:1.1.12-1.module+el8.6.0+21266+3e24c7b3.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/runc@1.1.12-1.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=aarch64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "runc-debuginfo-1:1.1.12-1.module+el8.6.0+21266+3e24c7b3.aarch64",
"product": {
"name": "runc-debuginfo-1:1.1.12-1.module+el8.6.0+21266+3e24c7b3.aarch64",
"product_id": "runc-debuginfo-1:1.1.12-1.module+el8.6.0+21266+3e24c7b3.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/runc-debuginfo@1.1.12-1.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=aarch64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "runc-debugsource-1:1.1.12-1.module+el8.6.0+21266+3e24c7b3.aarch64",
"product": {
"name": "runc-debugsource-1:1.1.12-1.module+el8.6.0+21266+3e24c7b3.aarch64",
"product_id": "runc-debugsource-1:1.1.12-1.module+el8.6.0+21266+3e24c7b3.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/runc-debugsource@1.1.12-1.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=aarch64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "skopeo-2:1.9.1-1.module+el8.6.0+21266+3e24c7b3.aarch64",
"product": {
"name": "skopeo-2:1.9.1-1.module+el8.6.0+21266+3e24c7b3.aarch64",
"product_id": "skopeo-2:1.9.1-1.module+el8.6.0+21266+3e24c7b3.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/skopeo@1.9.1-1.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=aarch64\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "skopeo-debuginfo-2:1.9.1-1.module+el8.6.0+21266+3e24c7b3.aarch64",
"product": {
"name": "skopeo-debuginfo-2:1.9.1-1.module+el8.6.0+21266+3e24c7b3.aarch64",
"product_id": "skopeo-debuginfo-2:1.9.1-1.module+el8.6.0+21266+3e24c7b3.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/skopeo-debuginfo@1.9.1-1.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=aarch64\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "skopeo-debugsource-2:1.9.1-1.module+el8.6.0+21266+3e24c7b3.aarch64",
"product": {
"name": "skopeo-debugsource-2:1.9.1-1.module+el8.6.0+21266+3e24c7b3.aarch64",
"product_id": "skopeo-debugsource-2:1.9.1-1.module+el8.6.0+21266+3e24c7b3.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/skopeo-debugsource@1.9.1-1.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=aarch64\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "skopeo-tests-2:1.9.1-1.module+el8.6.0+21266+3e24c7b3.aarch64",
"product": {
"name": "skopeo-tests-2:1.9.1-1.module+el8.6.0+21266+3e24c7b3.aarch64",
"product_id": "skopeo-tests-2:1.9.1-1.module+el8.6.0+21266+3e24c7b3.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/skopeo-tests@1.9.1-1.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=aarch64\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "slirp4netns-0:1.2.0-3.module+el8.6.0+21266+3e24c7b3.aarch64",
"product": {
"name": "slirp4netns-0:1.2.0-3.module+el8.6.0+21266+3e24c7b3.aarch64",
"product_id": "slirp4netns-0:1.2.0-3.module+el8.6.0+21266+3e24c7b3.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/slirp4netns@1.2.0-3.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "slirp4netns-debuginfo-0:1.2.0-3.module+el8.6.0+21266+3e24c7b3.aarch64",
"product": {
"name": "slirp4netns-debuginfo-0:1.2.0-3.module+el8.6.0+21266+3e24c7b3.aarch64",
"product_id": "slirp4netns-debuginfo-0:1.2.0-3.module+el8.6.0+21266+3e24c7b3.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/slirp4netns-debuginfo@1.2.0-3.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "slirp4netns-debugsource-0:1.2.0-3.module+el8.6.0+21266+3e24c7b3.aarch64",
"product": {
"name": "slirp4netns-debugsource-0:1.2.0-3.module+el8.6.0+21266+3e24c7b3.aarch64",
"product_id": "slirp4netns-debugsource-0:1.2.0-3.module+el8.6.0+21266+3e24c7b3.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/slirp4netns-debugsource@1.2.0-3.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "toolbox-0:0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.aarch64",
"product": {
"name": "toolbox-0:0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.aarch64",
"product_id": "toolbox-0:0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/toolbox@0.0.99.3-0.7.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "toolbox-debuginfo-0:0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.aarch64",
"product": {
"name": "toolbox-debuginfo-0:0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.aarch64",
"product_id": "toolbox-debuginfo-0:0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/toolbox-debuginfo@0.0.99.3-0.7.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "toolbox-debugsource-0:0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.aarch64",
"product": {
"name": "toolbox-debugsource-0:0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.aarch64",
"product_id": "toolbox-debugsource-0:0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/toolbox-debugsource@0.0.99.3-0.7.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "toolbox-tests-0:0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.aarch64",
"product": {
"name": "toolbox-tests-0:0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.aarch64",
"product_id": "toolbox-tests-0:0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/toolbox-tests@0.0.99.3-0.7.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=aarch64"
}
}
}
],
"category": "architecture",
"name": "aarch64"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "container-tools:rhel8:8060020240413110723:3b538bd8 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8"
},
"product_reference": "container-tools:rhel8:8060020240413110723:3b538bd8",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "aardvark-dns-2:1.0.1-40.module+el8.6.0+21266+3e24c7b3.aarch64 as a component of container-tools:rhel8:8060020240413110723:3b538bd8 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:aardvark-dns-2:1.0.1-40.module+el8.6.0+21266+3e24c7b3.aarch64"
},
"product_reference": "aardvark-dns-2:1.0.1-40.module+el8.6.0+21266+3e24c7b3.aarch64",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "aardvark-dns-2:1.0.1-40.module+el8.6.0+21266+3e24c7b3.ppc64le as a component of container-tools:rhel8:8060020240413110723:3b538bd8 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:aardvark-dns-2:1.0.1-40.module+el8.6.0+21266+3e24c7b3.ppc64le"
},
"product_reference": "aardvark-dns-2:1.0.1-40.module+el8.6.0+21266+3e24c7b3.ppc64le",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "aardvark-dns-2:1.0.1-40.module+el8.6.0+21266+3e24c7b3.s390x as a component of container-tools:rhel8:8060020240413110723:3b538bd8 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:aardvark-dns-2:1.0.1-40.module+el8.6.0+21266+3e24c7b3.s390x"
},
"product_reference": "aardvark-dns-2:1.0.1-40.module+el8.6.0+21266+3e24c7b3.s390x",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "aardvark-dns-2:1.0.1-40.module+el8.6.0+21266+3e24c7b3.x86_64 as a component of container-tools:rhel8:8060020240413110723:3b538bd8 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:aardvark-dns-2:1.0.1-40.module+el8.6.0+21266+3e24c7b3.x86_64"
},
"product_reference": "aardvark-dns-2:1.0.1-40.module+el8.6.0+21266+3e24c7b3.x86_64",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "buildah-1:1.26.2-1.module+el8.6.0+21266+3e24c7b3.aarch64 as a component of container-tools:rhel8:8060020240413110723:3b538bd8 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:buildah-1:1.26.2-1.module+el8.6.0+21266+3e24c7b3.aarch64"
},
"product_reference": "buildah-1:1.26.2-1.module+el8.6.0+21266+3e24c7b3.aarch64",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "buildah-1:1.26.2-1.module+el8.6.0+21266+3e24c7b3.ppc64le as a component of container-tools:rhel8:8060020240413110723:3b538bd8 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:buildah-1:1.26.2-1.module+el8.6.0+21266+3e24c7b3.ppc64le"
},
"product_reference": "buildah-1:1.26.2-1.module+el8.6.0+21266+3e24c7b3.ppc64le",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "buildah-1:1.26.2-1.module+el8.6.0+21266+3e24c7b3.s390x as a component of container-tools:rhel8:8060020240413110723:3b538bd8 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:buildah-1:1.26.2-1.module+el8.6.0+21266+3e24c7b3.s390x"
},
"product_reference": "buildah-1:1.26.2-1.module+el8.6.0+21266+3e24c7b3.s390x",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "buildah-1:1.26.2-1.module+el8.6.0+21266+3e24c7b3.src as a component of container-tools:rhel8:8060020240413110723:3b538bd8 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:buildah-1:1.26.2-1.module+el8.6.0+21266+3e24c7b3.src"
},
"product_reference": "buildah-1:1.26.2-1.module+el8.6.0+21266+3e24c7b3.src",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "buildah-1:1.26.2-1.module+el8.6.0+21266+3e24c7b3.x86_64 as a component of container-tools:rhel8:8060020240413110723:3b538bd8 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:buildah-1:1.26.2-1.module+el8.6.0+21266+3e24c7b3.x86_64"
},
"product_reference": "buildah-1:1.26.2-1.module+el8.6.0+21266+3e24c7b3.x86_64",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "buildah-debuginfo-1:1.26.2-1.module+el8.6.0+21266+3e24c7b3.aarch64 as a component of container-tools:rhel8:8060020240413110723:3b538bd8 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:buildah-debuginfo-1:1.26.2-1.module+el8.6.0+21266+3e24c7b3.aarch64"
},
"product_reference": "buildah-debuginfo-1:1.26.2-1.module+el8.6.0+21266+3e24c7b3.aarch64",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "buildah-debuginfo-1:1.26.2-1.module+el8.6.0+21266+3e24c7b3.ppc64le as a component of container-tools:rhel8:8060020240413110723:3b538bd8 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:buildah-debuginfo-1:1.26.2-1.module+el8.6.0+21266+3e24c7b3.ppc64le"
},
"product_reference": "buildah-debuginfo-1:1.26.2-1.module+el8.6.0+21266+3e24c7b3.ppc64le",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "buildah-debuginfo-1:1.26.2-1.module+el8.6.0+21266+3e24c7b3.s390x as a component of container-tools:rhel8:8060020240413110723:3b538bd8 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:buildah-debuginfo-1:1.26.2-1.module+el8.6.0+21266+3e24c7b3.s390x"
},
"product_reference": "buildah-debuginfo-1:1.26.2-1.module+el8.6.0+21266+3e24c7b3.s390x",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "buildah-debuginfo-1:1.26.2-1.module+el8.6.0+21266+3e24c7b3.x86_64 as a component of container-tools:rhel8:8060020240413110723:3b538bd8 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:buildah-debuginfo-1:1.26.2-1.module+el8.6.0+21266+3e24c7b3.x86_64"
},
"product_reference": "buildah-debuginfo-1:1.26.2-1.module+el8.6.0+21266+3e24c7b3.x86_64",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "buildah-debugsource-1:1.26.2-1.module+el8.6.0+21266+3e24c7b3.aarch64 as a component of container-tools:rhel8:8060020240413110723:3b538bd8 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:buildah-debugsource-1:1.26.2-1.module+el8.6.0+21266+3e24c7b3.aarch64"
},
"product_reference": "buildah-debugsource-1:1.26.2-1.module+el8.6.0+21266+3e24c7b3.aarch64",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "buildah-debugsource-1:1.26.2-1.module+el8.6.0+21266+3e24c7b3.ppc64le as a component of container-tools:rhel8:8060020240413110723:3b538bd8 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:buildah-debugsource-1:1.26.2-1.module+el8.6.0+21266+3e24c7b3.ppc64le"
},
"product_reference": "buildah-debugsource-1:1.26.2-1.module+el8.6.0+21266+3e24c7b3.ppc64le",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "buildah-debugsource-1:1.26.2-1.module+el8.6.0+21266+3e24c7b3.s390x as a component of container-tools:rhel8:8060020240413110723:3b538bd8 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:buildah-debugsource-1:1.26.2-1.module+el8.6.0+21266+3e24c7b3.s390x"
},
"product_reference": "buildah-debugsource-1:1.26.2-1.module+el8.6.0+21266+3e24c7b3.s390x",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "buildah-debugsource-1:1.26.2-1.module+el8.6.0+21266+3e24c7b3.x86_64 as a component of container-tools:rhel8:8060020240413110723:3b538bd8 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:buildah-debugsource-1:1.26.2-1.module+el8.6.0+21266+3e24c7b3.x86_64"
},
"product_reference": "buildah-debugsource-1:1.26.2-1.module+el8.6.0+21266+3e24c7b3.x86_64",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "buildah-tests-1:1.26.2-1.module+el8.6.0+21266+3e24c7b3.aarch64 as a component of container-tools:rhel8:8060020240413110723:3b538bd8 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:buildah-tests-1:1.26.2-1.module+el8.6.0+21266+3e24c7b3.aarch64"
},
"product_reference": "buildah-tests-1:1.26.2-1.module+el8.6.0+21266+3e24c7b3.aarch64",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "buildah-tests-1:1.26.2-1.module+el8.6.0+21266+3e24c7b3.ppc64le as a component of container-tools:rhel8:8060020240413110723:3b538bd8 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:buildah-tests-1:1.26.2-1.module+el8.6.0+21266+3e24c7b3.ppc64le"
},
"product_reference": "buildah-tests-1:1.26.2-1.module+el8.6.0+21266+3e24c7b3.ppc64le",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "buildah-tests-1:1.26.2-1.module+el8.6.0+21266+3e24c7b3.s390x as a component of container-tools:rhel8:8060020240413110723:3b538bd8 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:buildah-tests-1:1.26.2-1.module+el8.6.0+21266+3e24c7b3.s390x"
},
"product_reference": "buildah-tests-1:1.26.2-1.module+el8.6.0+21266+3e24c7b3.s390x",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "buildah-tests-1:1.26.2-1.module+el8.6.0+21266+3e24c7b3.x86_64 as a component of container-tools:rhel8:8060020240413110723:3b538bd8 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:buildah-tests-1:1.26.2-1.module+el8.6.0+21266+3e24c7b3.x86_64"
},
"product_reference": "buildah-tests-1:1.26.2-1.module+el8.6.0+21266+3e24c7b3.x86_64",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "buildah-tests-debuginfo-1:1.26.2-1.module+el8.6.0+21266+3e24c7b3.aarch64 as a component of container-tools:rhel8:8060020240413110723:3b538bd8 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:buildah-tests-debuginfo-1:1.26.2-1.module+el8.6.0+21266+3e24c7b3.aarch64"
},
"product_reference": "buildah-tests-debuginfo-1:1.26.2-1.module+el8.6.0+21266+3e24c7b3.aarch64",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "buildah-tests-debuginfo-1:1.26.2-1.module+el8.6.0+21266+3e24c7b3.ppc64le as a component of container-tools:rhel8:8060020240413110723:3b538bd8 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:buildah-tests-debuginfo-1:1.26.2-1.module+el8.6.0+21266+3e24c7b3.ppc64le"
},
"product_reference": "buildah-tests-debuginfo-1:1.26.2-1.module+el8.6.0+21266+3e24c7b3.ppc64le",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "buildah-tests-debuginfo-1:1.26.2-1.module+el8.6.0+21266+3e24c7b3.s390x as a component of container-tools:rhel8:8060020240413110723:3b538bd8 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:buildah-tests-debuginfo-1:1.26.2-1.module+el8.6.0+21266+3e24c7b3.s390x"
},
"product_reference": "buildah-tests-debuginfo-1:1.26.2-1.module+el8.6.0+21266+3e24c7b3.s390x",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "buildah-tests-debuginfo-1:1.26.2-1.module+el8.6.0+21266+3e24c7b3.x86_64 as a component of container-tools:rhel8:8060020240413110723:3b538bd8 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:buildah-tests-debuginfo-1:1.26.2-1.module+el8.6.0+21266+3e24c7b3.x86_64"
},
"product_reference": "buildah-tests-debuginfo-1:1.26.2-1.module+el8.6.0+21266+3e24c7b3.x86_64",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cockpit-podman-0:49.1-1.module+el8.6.0+21266+3e24c7b3.noarch as a component of container-tools:rhel8:8060020240413110723:3b538bd8 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:cockpit-podman-0:49.1-1.module+el8.6.0+21266+3e24c7b3.noarch"
},
"product_reference": "cockpit-podman-0:49.1-1.module+el8.6.0+21266+3e24c7b3.noarch",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cockpit-podman-0:49.1-1.module+el8.6.0+21266+3e24c7b3.src as a component of container-tools:rhel8:8060020240413110723:3b538bd8 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:cockpit-podman-0:49.1-1.module+el8.6.0+21266+3e24c7b3.src"
},
"product_reference": "cockpit-podman-0:49.1-1.module+el8.6.0+21266+3e24c7b3.src",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "conmon-2:2.1.4-1.module+el8.6.0+21266+3e24c7b3.aarch64 as a component of container-tools:rhel8:8060020240413110723:3b538bd8 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:conmon-2:2.1.4-1.module+el8.6.0+21266+3e24c7b3.aarch64"
},
"product_reference": "conmon-2:2.1.4-1.module+el8.6.0+21266+3e24c7b3.aarch64",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "conmon-2:2.1.4-1.module+el8.6.0+21266+3e24c7b3.ppc64le as a component of container-tools:rhel8:8060020240413110723:3b538bd8 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:conmon-2:2.1.4-1.module+el8.6.0+21266+3e24c7b3.ppc64le"
},
"product_reference": "conmon-2:2.1.4-1.module+el8.6.0+21266+3e24c7b3.ppc64le",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "conmon-2:2.1.4-1.module+el8.6.0+21266+3e24c7b3.s390x as a component of container-tools:rhel8:8060020240413110723:3b538bd8 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:conmon-2:2.1.4-1.module+el8.6.0+21266+3e24c7b3.s390x"
},
"product_reference": "conmon-2:2.1.4-1.module+el8.6.0+21266+3e24c7b3.s390x",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "conmon-2:2.1.4-1.module+el8.6.0+21266+3e24c7b3.src as a component of container-tools:rhel8:8060020240413110723:3b538bd8 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:conmon-2:2.1.4-1.module+el8.6.0+21266+3e24c7b3.src"
},
"product_reference": "conmon-2:2.1.4-1.module+el8.6.0+21266+3e24c7b3.src",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "conmon-2:2.1.4-1.module+el8.6.0+21266+3e24c7b3.x86_64 as a component of container-tools:rhel8:8060020240413110723:3b538bd8 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:conmon-2:2.1.4-1.module+el8.6.0+21266+3e24c7b3.x86_64"
},
"product_reference": "conmon-2:2.1.4-1.module+el8.6.0+21266+3e24c7b3.x86_64",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "conmon-debuginfo-2:2.1.4-1.module+el8.6.0+21266+3e24c7b3.aarch64 as a component of container-tools:rhel8:8060020240413110723:3b538bd8 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:conmon-debuginfo-2:2.1.4-1.module+el8.6.0+21266+3e24c7b3.aarch64"
},
"product_reference": "conmon-debuginfo-2:2.1.4-1.module+el8.6.0+21266+3e24c7b3.aarch64",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "conmon-debuginfo-2:2.1.4-1.module+el8.6.0+21266+3e24c7b3.ppc64le as a component of container-tools:rhel8:8060020240413110723:3b538bd8 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:conmon-debuginfo-2:2.1.4-1.module+el8.6.0+21266+3e24c7b3.ppc64le"
},
"product_reference": "conmon-debuginfo-2:2.1.4-1.module+el8.6.0+21266+3e24c7b3.ppc64le",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "conmon-debuginfo-2:2.1.4-1.module+el8.6.0+21266+3e24c7b3.s390x as a component of container-tools:rhel8:8060020240413110723:3b538bd8 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:conmon-debuginfo-2:2.1.4-1.module+el8.6.0+21266+3e24c7b3.s390x"
},
"product_reference": "conmon-debuginfo-2:2.1.4-1.module+el8.6.0+21266+3e24c7b3.s390x",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "conmon-debuginfo-2:2.1.4-1.module+el8.6.0+21266+3e24c7b3.x86_64 as a component of container-tools:rhel8:8060020240413110723:3b538bd8 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:conmon-debuginfo-2:2.1.4-1.module+el8.6.0+21266+3e24c7b3.x86_64"
},
"product_reference": "conmon-debuginfo-2:2.1.4-1.module+el8.6.0+21266+3e24c7b3.x86_64",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "conmon-debugsource-2:2.1.4-1.module+el8.6.0+21266+3e24c7b3.aarch64 as a component of container-tools:rhel8:8060020240413110723:3b538bd8 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:conmon-debugsource-2:2.1.4-1.module+el8.6.0+21266+3e24c7b3.aarch64"
},
"product_reference": "conmon-debugsource-2:2.1.4-1.module+el8.6.0+21266+3e24c7b3.aarch64",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "conmon-debugsource-2:2.1.4-1.module+el8.6.0+21266+3e24c7b3.ppc64le as a component of container-tools:rhel8:8060020240413110723:3b538bd8 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:conmon-debugsource-2:2.1.4-1.module+el8.6.0+21266+3e24c7b3.ppc64le"
},
"product_reference": "conmon-debugsource-2:2.1.4-1.module+el8.6.0+21266+3e24c7b3.ppc64le",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "conmon-debugsource-2:2.1.4-1.module+el8.6.0+21266+3e24c7b3.s390x as a component of container-tools:rhel8:8060020240413110723:3b538bd8 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:conmon-debugsource-2:2.1.4-1.module+el8.6.0+21266+3e24c7b3.s390x"
},
"product_reference": "conmon-debugsource-2:2.1.4-1.module+el8.6.0+21266+3e24c7b3.s390x",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "conmon-debugsource-2:2.1.4-1.module+el8.6.0+21266+3e24c7b3.x86_64 as a component of container-tools:rhel8:8060020240413110723:3b538bd8 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:conmon-debugsource-2:2.1.4-1.module+el8.6.0+21266+3e24c7b3.x86_64"
},
"product_reference": "conmon-debugsource-2:2.1.4-1.module+el8.6.0+21266+3e24c7b3.x86_64",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "container-selinux-2:2.189.0-1.module+el8.6.0+21266+3e24c7b3.noarch as a component of container-tools:rhel8:8060020240413110723:3b538bd8 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:container-selinux-2:2.189.0-1.module+el8.6.0+21266+3e24c7b3.noarch"
},
"product_reference": "container-selinux-2:2.189.0-1.module+el8.6.0+21266+3e24c7b3.noarch",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "container-selinux-2:2.189.0-1.module+el8.6.0+21266+3e24c7b3.src as a component of container-tools:rhel8:8060020240413110723:3b538bd8 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:container-selinux-2:2.189.0-1.module+el8.6.0+21266+3e24c7b3.src"
},
"product_reference": "container-selinux-2:2.189.0-1.module+el8.6.0+21266+3e24c7b3.src",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "containernetworking-plugins-1:1.1.1-4.module+el8.6.0+21266+3e24c7b3.aarch64 as a component of container-tools:rhel8:8060020240413110723:3b538bd8 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:containernetworking-plugins-1:1.1.1-4.module+el8.6.0+21266+3e24c7b3.aarch64"
},
"product_reference": "containernetworking-plugins-1:1.1.1-4.module+el8.6.0+21266+3e24c7b3.aarch64",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "containernetworking-plugins-1:1.1.1-4.module+el8.6.0+21266+3e24c7b3.ppc64le as a component of container-tools:rhel8:8060020240413110723:3b538bd8 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:containernetworking-plugins-1:1.1.1-4.module+el8.6.0+21266+3e24c7b3.ppc64le"
},
"product_reference": "containernetworking-plugins-1:1.1.1-4.module+el8.6.0+21266+3e24c7b3.ppc64le",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "containernetworking-plugins-1:1.1.1-4.module+el8.6.0+21266+3e24c7b3.s390x as a component of container-tools:rhel8:8060020240413110723:3b538bd8 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:containernetworking-plugins-1:1.1.1-4.module+el8.6.0+21266+3e24c7b3.s390x"
},
"product_reference": "containernetworking-plugins-1:1.1.1-4.module+el8.6.0+21266+3e24c7b3.s390x",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "containernetworking-plugins-1:1.1.1-4.module+el8.6.0+21266+3e24c7b3.src as a component of container-tools:rhel8:8060020240413110723:3b538bd8 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:containernetworking-plugins-1:1.1.1-4.module+el8.6.0+21266+3e24c7b3.src"
},
"product_reference": "containernetworking-plugins-1:1.1.1-4.module+el8.6.0+21266+3e24c7b3.src",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "containernetworking-plugins-1:1.1.1-4.module+el8.6.0+21266+3e24c7b3.x86_64 as a component of container-tools:rhel8:8060020240413110723:3b538bd8 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:containernetworking-plugins-1:1.1.1-4.module+el8.6.0+21266+3e24c7b3.x86_64"
},
"product_reference": "containernetworking-plugins-1:1.1.1-4.module+el8.6.0+21266+3e24c7b3.x86_64",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "containernetworking-plugins-debuginfo-1:1.1.1-4.module+el8.6.0+21266+3e24c7b3.aarch64 as a component of container-tools:rhel8:8060020240413110723:3b538bd8 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:containernetworking-plugins-debuginfo-1:1.1.1-4.module+el8.6.0+21266+3e24c7b3.aarch64"
},
"product_reference": "containernetworking-plugins-debuginfo-1:1.1.1-4.module+el8.6.0+21266+3e24c7b3.aarch64",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "containernetworking-plugins-debuginfo-1:1.1.1-4.module+el8.6.0+21266+3e24c7b3.ppc64le as a component of container-tools:rhel8:8060020240413110723:3b538bd8 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:containernetworking-plugins-debuginfo-1:1.1.1-4.module+el8.6.0+21266+3e24c7b3.ppc64le"
},
"product_reference": "containernetworking-plugins-debuginfo-1:1.1.1-4.module+el8.6.0+21266+3e24c7b3.ppc64le",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "containernetworking-plugins-debuginfo-1:1.1.1-4.module+el8.6.0+21266+3e24c7b3.s390x as a component of container-tools:rhel8:8060020240413110723:3b538bd8 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:containernetworking-plugins-debuginfo-1:1.1.1-4.module+el8.6.0+21266+3e24c7b3.s390x"
},
"product_reference": "containernetworking-plugins-debuginfo-1:1.1.1-4.module+el8.6.0+21266+3e24c7b3.s390x",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "containernetworking-plugins-debuginfo-1:1.1.1-4.module+el8.6.0+21266+3e24c7b3.x86_64 as a component of container-tools:rhel8:8060020240413110723:3b538bd8 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:containernetworking-plugins-debuginfo-1:1.1.1-4.module+el8.6.0+21266+3e24c7b3.x86_64"
},
"product_reference": "containernetworking-plugins-debuginfo-1:1.1.1-4.module+el8.6.0+21266+3e24c7b3.x86_64",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "containernetworking-plugins-debugsource-1:1.1.1-4.module+el8.6.0+21266+3e24c7b3.aarch64 as a component of container-tools:rhel8:8060020240413110723:3b538bd8 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:containernetworking-plugins-debugsource-1:1.1.1-4.module+el8.6.0+21266+3e24c7b3.aarch64"
},
"product_reference": "containernetworking-plugins-debugsource-1:1.1.1-4.module+el8.6.0+21266+3e24c7b3.aarch64",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "containernetworking-plugins-debugsource-1:1.1.1-4.module+el8.6.0+21266+3e24c7b3.ppc64le as a component of container-tools:rhel8:8060020240413110723:3b538bd8 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:containernetworking-plugins-debugsource-1:1.1.1-4.module+el8.6.0+21266+3e24c7b3.ppc64le"
},
"product_reference": "containernetworking-plugins-debugsource-1:1.1.1-4.module+el8.6.0+21266+3e24c7b3.ppc64le",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "containernetworking-plugins-debugsource-1:1.1.1-4.module+el8.6.0+21266+3e24c7b3.s390x as a component of container-tools:rhel8:8060020240413110723:3b538bd8 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:containernetworking-plugins-debugsource-1:1.1.1-4.module+el8.6.0+21266+3e24c7b3.s390x"
},
"product_reference": "containernetworking-plugins-debugsource-1:1.1.1-4.module+el8.6.0+21266+3e24c7b3.s390x",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "containernetworking-plugins-debugsource-1:1.1.1-4.module+el8.6.0+21266+3e24c7b3.x86_64 as a component of container-tools:rhel8:8060020240413110723:3b538bd8 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:containernetworking-plugins-debugsource-1:1.1.1-4.module+el8.6.0+21266+3e24c7b3.x86_64"
},
"product_reference": "containernetworking-plugins-debugsource-1:1.1.1-4.module+el8.6.0+21266+3e24c7b3.x86_64",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "containers-common-2:1-40.module+el8.6.0+21266+3e24c7b3.aarch64 as a component of container-tools:rhel8:8060020240413110723:3b538bd8 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:containers-common-2:1-40.module+el8.6.0+21266+3e24c7b3.aarch64"
},
"product_reference": "containers-common-2:1-40.module+el8.6.0+21266+3e24c7b3.aarch64",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "containers-common-2:1-40.module+el8.6.0+21266+3e24c7b3.ppc64le as a component of container-tools:rhel8:8060020240413110723:3b538bd8 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:containers-common-2:1-40.module+el8.6.0+21266+3e24c7b3.ppc64le"
},
"product_reference": "containers-common-2:1-40.module+el8.6.0+21266+3e24c7b3.ppc64le",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "containers-common-2:1-40.module+el8.6.0+21266+3e24c7b3.s390x as a component of container-tools:rhel8:8060020240413110723:3b538bd8 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:containers-common-2:1-40.module+el8.6.0+21266+3e24c7b3.s390x"
},
"product_reference": "containers-common-2:1-40.module+el8.6.0+21266+3e24c7b3.s390x",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "containers-common-2:1-40.module+el8.6.0+21266+3e24c7b3.src as a component of container-tools:rhel8:8060020240413110723:3b538bd8 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:containers-common-2:1-40.module+el8.6.0+21266+3e24c7b3.src"
},
"product_reference": "containers-common-2:1-40.module+el8.6.0+21266+3e24c7b3.src",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "containers-common-2:1-40.module+el8.6.0+21266+3e24c7b3.x86_64 as a component of container-tools:rhel8:8060020240413110723:3b538bd8 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:containers-common-2:1-40.module+el8.6.0+21266+3e24c7b3.x86_64"
},
"product_reference": "containers-common-2:1-40.module+el8.6.0+21266+3e24c7b3.x86_64",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "crit-0:3.15-3.module+el8.6.0+21266+3e24c7b3.aarch64 as a component of container-tools:rhel8:8060020240413110723:3b538bd8 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:crit-0:3.15-3.module+el8.6.0+21266+3e24c7b3.aarch64"
},
"product_reference": "crit-0:3.15-3.module+el8.6.0+21266+3e24c7b3.aarch64",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "crit-0:3.15-3.module+el8.6.0+21266+3e24c7b3.ppc64le as a component of container-tools:rhel8:8060020240413110723:3b538bd8 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:crit-0:3.15-3.module+el8.6.0+21266+3e24c7b3.ppc64le"
},
"product_reference": "crit-0:3.15-3.module+el8.6.0+21266+3e24c7b3.ppc64le",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "crit-0:3.15-3.module+el8.6.0+21266+3e24c7b3.s390x as a component of container-tools:rhel8:8060020240413110723:3b538bd8 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:crit-0:3.15-3.module+el8.6.0+21266+3e24c7b3.s390x"
},
"product_reference": "crit-0:3.15-3.module+el8.6.0+21266+3e24c7b3.s390x",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "crit-0:3.15-3.module+el8.6.0+21266+3e24c7b3.x86_64 as a component of container-tools:rhel8:8060020240413110723:3b538bd8 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:crit-0:3.15-3.module+el8.6.0+21266+3e24c7b3.x86_64"
},
"product_reference": "crit-0:3.15-3.module+el8.6.0+21266+3e24c7b3.x86_64",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "criu-0:3.15-3.module+el8.6.0+21266+3e24c7b3.aarch64 as a component of container-tools:rhel8:8060020240413110723:3b538bd8 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:criu-0:3.15-3.module+el8.6.0+21266+3e24c7b3.aarch64"
},
"product_reference": "criu-0:3.15-3.module+el8.6.0+21266+3e24c7b3.aarch64",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "criu-0:3.15-3.module+el8.6.0+21266+3e24c7b3.ppc64le as a component of container-tools:rhel8:8060020240413110723:3b538bd8 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:criu-0:3.15-3.module+el8.6.0+21266+3e24c7b3.ppc64le"
},
"product_reference": "criu-0:3.15-3.module+el8.6.0+21266+3e24c7b3.ppc64le",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "criu-0:3.15-3.module+el8.6.0+21266+3e24c7b3.s390x as a component of container-tools:rhel8:8060020240413110723:3b538bd8 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:criu-0:3.15-3.module+el8.6.0+21266+3e24c7b3.s390x"
},
"product_reference": "criu-0:3.15-3.module+el8.6.0+21266+3e24c7b3.s390x",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "criu-0:3.15-3.module+el8.6.0+21266+3e24c7b3.src as a component of container-tools:rhel8:8060020240413110723:3b538bd8 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:criu-0:3.15-3.module+el8.6.0+21266+3e24c7b3.src"
},
"product_reference": "criu-0:3.15-3.module+el8.6.0+21266+3e24c7b3.src",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "criu-0:3.15-3.module+el8.6.0+21266+3e24c7b3.x86_64 as a component of container-tools:rhel8:8060020240413110723:3b538bd8 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:criu-0:3.15-3.module+el8.6.0+21266+3e24c7b3.x86_64"
},
"product_reference": "criu-0:3.15-3.module+el8.6.0+21266+3e24c7b3.x86_64",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "criu-debuginfo-0:3.15-3.module+el8.6.0+21266+3e24c7b3.aarch64 as a component of container-tools:rhel8:8060020240413110723:3b538bd8 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:criu-debuginfo-0:3.15-3.module+el8.6.0+21266+3e24c7b3.aarch64"
},
"product_reference": "criu-debuginfo-0:3.15-3.module+el8.6.0+21266+3e24c7b3.aarch64",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "criu-debuginfo-0:3.15-3.module+el8.6.0+21266+3e24c7b3.ppc64le as a component of container-tools:rhel8:8060020240413110723:3b538bd8 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:criu-debuginfo-0:3.15-3.module+el8.6.0+21266+3e24c7b3.ppc64le"
},
"product_reference": "criu-debuginfo-0:3.15-3.module+el8.6.0+21266+3e24c7b3.ppc64le",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "criu-debuginfo-0:3.15-3.module+el8.6.0+21266+3e24c7b3.s390x as a component of container-tools:rhel8:8060020240413110723:3b538bd8 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:criu-debuginfo-0:3.15-3.module+el8.6.0+21266+3e24c7b3.s390x"
},
"product_reference": "criu-debuginfo-0:3.15-3.module+el8.6.0+21266+3e24c7b3.s390x",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "criu-debuginfo-0:3.15-3.module+el8.6.0+21266+3e24c7b3.x86_64 as a component of container-tools:rhel8:8060020240413110723:3b538bd8 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:criu-debuginfo-0:3.15-3.module+el8.6.0+21266+3e24c7b3.x86_64"
},
"product_reference": "criu-debuginfo-0:3.15-3.module+el8.6.0+21266+3e24c7b3.x86_64",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "criu-debugsource-0:3.15-3.module+el8.6.0+21266+3e24c7b3.aarch64 as a component of container-tools:rhel8:8060020240413110723:3b538bd8 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:criu-debugsource-0:3.15-3.module+el8.6.0+21266+3e24c7b3.aarch64"
},
"product_reference": "criu-debugsource-0:3.15-3.module+el8.6.0+21266+3e24c7b3.aarch64",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "criu-debugsource-0:3.15-3.module+el8.6.0+21266+3e24c7b3.ppc64le as a component of container-tools:rhel8:8060020240413110723:3b538bd8 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:criu-debugsource-0:3.15-3.module+el8.6.0+21266+3e24c7b3.ppc64le"
},
"product_reference": "criu-debugsource-0:3.15-3.module+el8.6.0+21266+3e24c7b3.ppc64le",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "criu-debugsource-0:3.15-3.module+el8.6.0+21266+3e24c7b3.s390x as a component of container-tools:rhel8:8060020240413110723:3b538bd8 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:criu-debugsource-0:3.15-3.module+el8.6.0+21266+3e24c7b3.s390x"
},
"product_reference": "criu-debugsource-0:3.15-3.module+el8.6.0+21266+3e24c7b3.s390x",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "criu-debugsource-0:3.15-3.module+el8.6.0+21266+3e24c7b3.x86_64 as a component of container-tools:rhel8:8060020240413110723:3b538bd8 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:criu-debugsource-0:3.15-3.module+el8.6.0+21266+3e24c7b3.x86_64"
},
"product_reference": "criu-debugsource-0:3.15-3.module+el8.6.0+21266+3e24c7b3.x86_64",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "criu-devel-0:3.15-3.module+el8.6.0+21266+3e24c7b3.aarch64 as a component of container-tools:rhel8:8060020240413110723:3b538bd8 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:criu-devel-0:3.15-3.module+el8.6.0+21266+3e24c7b3.aarch64"
},
"product_reference": "criu-devel-0:3.15-3.module+el8.6.0+21266+3e24c7b3.aarch64",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "criu-devel-0:3.15-3.module+el8.6.0+21266+3e24c7b3.ppc64le as a component of container-tools:rhel8:8060020240413110723:3b538bd8 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:criu-devel-0:3.15-3.module+el8.6.0+21266+3e24c7b3.ppc64le"
},
"product_reference": "criu-devel-0:3.15-3.module+el8.6.0+21266+3e24c7b3.ppc64le",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "criu-devel-0:3.15-3.module+el8.6.0+21266+3e24c7b3.s390x as a component of container-tools:rhel8:8060020240413110723:3b538bd8 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:criu-devel-0:3.15-3.module+el8.6.0+21266+3e24c7b3.s390x"
},
"product_reference": "criu-devel-0:3.15-3.module+el8.6.0+21266+3e24c7b3.s390x",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "criu-devel-0:3.15-3.module+el8.6.0+21266+3e24c7b3.x86_64 as a component of container-tools:rhel8:8060020240413110723:3b538bd8 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:criu-devel-0:3.15-3.module+el8.6.0+21266+3e24c7b3.x86_64"
},
"product_reference": "criu-devel-0:3.15-3.module+el8.6.0+21266+3e24c7b3.x86_64",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "criu-libs-0:3.15-3.module+el8.6.0+21266+3e24c7b3.aarch64 as a component of container-tools:rhel8:8060020240413110723:3b538bd8 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:criu-libs-0:3.15-3.module+el8.6.0+21266+3e24c7b3.aarch64"
},
"product_reference": "criu-libs-0:3.15-3.module+el8.6.0+21266+3e24c7b3.aarch64",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "criu-libs-0:3.15-3.module+el8.6.0+21266+3e24c7b3.ppc64le as a component of container-tools:rhel8:8060020240413110723:3b538bd8 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:criu-libs-0:3.15-3.module+el8.6.0+21266+3e24c7b3.ppc64le"
},
"product_reference": "criu-libs-0:3.15-3.module+el8.6.0+21266+3e24c7b3.ppc64le",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "criu-libs-0:3.15-3.module+el8.6.0+21266+3e24c7b3.s390x as a component of container-tools:rhel8:8060020240413110723:3b538bd8 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:criu-libs-0:3.15-3.module+el8.6.0+21266+3e24c7b3.s390x"
},
"product_reference": "criu-libs-0:3.15-3.module+el8.6.0+21266+3e24c7b3.s390x",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "criu-libs-0:3.15-3.module+el8.6.0+21266+3e24c7b3.x86_64 as a component of container-tools:rhel8:8060020240413110723:3b538bd8 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:criu-libs-0:3.15-3.module+el8.6.0+21266+3e24c7b3.x86_64"
},
"product_reference": "criu-libs-0:3.15-3.module+el8.6.0+21266+3e24c7b3.x86_64",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "criu-libs-debuginfo-0:3.15-3.module+el8.6.0+21266+3e24c7b3.aarch64 as a component of container-tools:rhel8:8060020240413110723:3b538bd8 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:criu-libs-debuginfo-0:3.15-3.module+el8.6.0+21266+3e24c7b3.aarch64"
},
"product_reference": "criu-libs-debuginfo-0:3.15-3.module+el8.6.0+21266+3e24c7b3.aarch64",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "criu-libs-debuginfo-0:3.15-3.module+el8.6.0+21266+3e24c7b3.ppc64le as a component of container-tools:rhel8:8060020240413110723:3b538bd8 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:criu-libs-debuginfo-0:3.15-3.module+el8.6.0+21266+3e24c7b3.ppc64le"
},
"product_reference": "criu-libs-debuginfo-0:3.15-3.module+el8.6.0+21266+3e24c7b3.ppc64le",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "criu-libs-debuginfo-0:3.15-3.module+el8.6.0+21266+3e24c7b3.s390x as a component of container-tools:rhel8:8060020240413110723:3b538bd8 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:criu-libs-debuginfo-0:3.15-3.module+el8.6.0+21266+3e24c7b3.s390x"
},
"product_reference": "criu-libs-debuginfo-0:3.15-3.module+el8.6.0+21266+3e24c7b3.s390x",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "criu-libs-debuginfo-0:3.15-3.module+el8.6.0+21266+3e24c7b3.x86_64 as a component of container-tools:rhel8:8060020240413110723:3b538bd8 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:criu-libs-debuginfo-0:3.15-3.module+el8.6.0+21266+3e24c7b3.x86_64"
},
"product_reference": "criu-libs-debuginfo-0:3.15-3.module+el8.6.0+21266+3e24c7b3.x86_64",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "crun-0:1.5-1.module+el8.6.0+21266+3e24c7b3.aarch64 as a component of container-tools:rhel8:8060020240413110723:3b538bd8 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:crun-0:1.5-1.module+el8.6.0+21266+3e24c7b3.aarch64"
},
"product_reference": "crun-0:1.5-1.module+el8.6.0+21266+3e24c7b3.aarch64",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "crun-0:1.5-1.module+el8.6.0+21266+3e24c7b3.ppc64le as a component of container-tools:rhel8:8060020240413110723:3b538bd8 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:crun-0:1.5-1.module+el8.6.0+21266+3e24c7b3.ppc64le"
},
"product_reference": "crun-0:1.5-1.module+el8.6.0+21266+3e24c7b3.ppc64le",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "crun-0:1.5-1.module+el8.6.0+21266+3e24c7b3.s390x as a component of container-tools:rhel8:8060020240413110723:3b538bd8 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:crun-0:1.5-1.module+el8.6.0+21266+3e24c7b3.s390x"
},
"product_reference": "crun-0:1.5-1.module+el8.6.0+21266+3e24c7b3.s390x",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "crun-0:1.5-1.module+el8.6.0+21266+3e24c7b3.src as a component of container-tools:rhel8:8060020240413110723:3b538bd8 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:crun-0:1.5-1.module+el8.6.0+21266+3e24c7b3.src"
},
"product_reference": "crun-0:1.5-1.module+el8.6.0+21266+3e24c7b3.src",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "crun-0:1.5-1.module+el8.6.0+21266+3e24c7b3.x86_64 as a component of container-tools:rhel8:8060020240413110723:3b538bd8 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:crun-0:1.5-1.module+el8.6.0+21266+3e24c7b3.x86_64"
},
"product_reference": "crun-0:1.5-1.module+el8.6.0+21266+3e24c7b3.x86_64",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "crun-debuginfo-0:1.5-1.module+el8.6.0+21266+3e24c7b3.aarch64 as a component of container-tools:rhel8:8060020240413110723:3b538bd8 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:crun-debuginfo-0:1.5-1.module+el8.6.0+21266+3e24c7b3.aarch64"
},
"product_reference": "crun-debuginfo-0:1.5-1.module+el8.6.0+21266+3e24c7b3.aarch64",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "crun-debuginfo-0:1.5-1.module+el8.6.0+21266+3e24c7b3.ppc64le as a component of container-tools:rhel8:8060020240413110723:3b538bd8 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:crun-debuginfo-0:1.5-1.module+el8.6.0+21266+3e24c7b3.ppc64le"
},
"product_reference": "crun-debuginfo-0:1.5-1.module+el8.6.0+21266+3e24c7b3.ppc64le",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "crun-debuginfo-0:1.5-1.module+el8.6.0+21266+3e24c7b3.s390x as a component of container-tools:rhel8:8060020240413110723:3b538bd8 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:crun-debuginfo-0:1.5-1.module+el8.6.0+21266+3e24c7b3.s390x"
},
"product_reference": "crun-debuginfo-0:1.5-1.module+el8.6.0+21266+3e24c7b3.s390x",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "crun-debuginfo-0:1.5-1.module+el8.6.0+21266+3e24c7b3.x86_64 as a component of container-tools:rhel8:8060020240413110723:3b538bd8 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:crun-debuginfo-0:1.5-1.module+el8.6.0+21266+3e24c7b3.x86_64"
},
"product_reference": "crun-debuginfo-0:1.5-1.module+el8.6.0+21266+3e24c7b3.x86_64",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "crun-debugsource-0:1.5-1.module+el8.6.0+21266+3e24c7b3.aarch64 as a component of container-tools:rhel8:8060020240413110723:3b538bd8 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:crun-debugsource-0:1.5-1.module+el8.6.0+21266+3e24c7b3.aarch64"
},
"product_reference": "crun-debugsource-0:1.5-1.module+el8.6.0+21266+3e24c7b3.aarch64",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "crun-debugsource-0:1.5-1.module+el8.6.0+21266+3e24c7b3.ppc64le as a component of container-tools:rhel8:8060020240413110723:3b538bd8 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:crun-debugsource-0:1.5-1.module+el8.6.0+21266+3e24c7b3.ppc64le"
},
"product_reference": "crun-debugsource-0:1.5-1.module+el8.6.0+21266+3e24c7b3.ppc64le",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "crun-debugsource-0:1.5-1.module+el8.6.0+21266+3e24c7b3.s390x as a component of container-tools:rhel8:8060020240413110723:3b538bd8 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:crun-debugsource-0:1.5-1.module+el8.6.0+21266+3e24c7b3.s390x"
},
"product_reference": "crun-debugsource-0:1.5-1.module+el8.6.0+21266+3e24c7b3.s390x",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "crun-debugsource-0:1.5-1.module+el8.6.0+21266+3e24c7b3.x86_64 as a component of container-tools:rhel8:8060020240413110723:3b538bd8 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:crun-debugsource-0:1.5-1.module+el8.6.0+21266+3e24c7b3.x86_64"
},
"product_reference": "crun-debugsource-0:1.5-1.module+el8.6.0+21266+3e24c7b3.x86_64",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fuse-overlayfs-0:1.9-1.module+el8.6.0+21266+3e24c7b3.aarch64 as a component of container-tools:rhel8:8060020240413110723:3b538bd8 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:fuse-overlayfs-0:1.9-1.module+el8.6.0+21266+3e24c7b3.aarch64"
},
"product_reference": "fuse-overlayfs-0:1.9-1.module+el8.6.0+21266+3e24c7b3.aarch64",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fuse-overlayfs-0:1.9-1.module+el8.6.0+21266+3e24c7b3.ppc64le as a component of container-tools:rhel8:8060020240413110723:3b538bd8 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:fuse-overlayfs-0:1.9-1.module+el8.6.0+21266+3e24c7b3.ppc64le"
},
"product_reference": "fuse-overlayfs-0:1.9-1.module+el8.6.0+21266+3e24c7b3.ppc64le",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fuse-overlayfs-0:1.9-1.module+el8.6.0+21266+3e24c7b3.s390x as a component of container-tools:rhel8:8060020240413110723:3b538bd8 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:fuse-overlayfs-0:1.9-1.module+el8.6.0+21266+3e24c7b3.s390x"
},
"product_reference": "fuse-overlayfs-0:1.9-1.module+el8.6.0+21266+3e24c7b3.s390x",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fuse-overlayfs-0:1.9-1.module+el8.6.0+21266+3e24c7b3.src as a component of container-tools:rhel8:8060020240413110723:3b538bd8 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:fuse-overlayfs-0:1.9-1.module+el8.6.0+21266+3e24c7b3.src"
},
"product_reference": "fuse-overlayfs-0:1.9-1.module+el8.6.0+21266+3e24c7b3.src",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fuse-overlayfs-0:1.9-1.module+el8.6.0+21266+3e24c7b3.x86_64 as a component of container-tools:rhel8:8060020240413110723:3b538bd8 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:fuse-overlayfs-0:1.9-1.module+el8.6.0+21266+3e24c7b3.x86_64"
},
"product_reference": "fuse-overlayfs-0:1.9-1.module+el8.6.0+21266+3e24c7b3.x86_64",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fuse-overlayfs-debuginfo-0:1.9-1.module+el8.6.0+21266+3e24c7b3.aarch64 as a component of container-tools:rhel8:8060020240413110723:3b538bd8 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:fuse-overlayfs-debuginfo-0:1.9-1.module+el8.6.0+21266+3e24c7b3.aarch64"
},
"product_reference": "fuse-overlayfs-debuginfo-0:1.9-1.module+el8.6.0+21266+3e24c7b3.aarch64",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fuse-overlayfs-debuginfo-0:1.9-1.module+el8.6.0+21266+3e24c7b3.ppc64le as a component of container-tools:rhel8:8060020240413110723:3b538bd8 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:fuse-overlayfs-debuginfo-0:1.9-1.module+el8.6.0+21266+3e24c7b3.ppc64le"
},
"product_reference": "fuse-overlayfs-debuginfo-0:1.9-1.module+el8.6.0+21266+3e24c7b3.ppc64le",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fuse-overlayfs-debuginfo-0:1.9-1.module+el8.6.0+21266+3e24c7b3.s390x as a component of container-tools:rhel8:8060020240413110723:3b538bd8 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:fuse-overlayfs-debuginfo-0:1.9-1.module+el8.6.0+21266+3e24c7b3.s390x"
},
"product_reference": "fuse-overlayfs-debuginfo-0:1.9-1.module+el8.6.0+21266+3e24c7b3.s390x",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fuse-overlayfs-debuginfo-0:1.9-1.module+el8.6.0+21266+3e24c7b3.x86_64 as a component of container-tools:rhel8:8060020240413110723:3b538bd8 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:fuse-overlayfs-debuginfo-0:1.9-1.module+el8.6.0+21266+3e24c7b3.x86_64"
},
"product_reference": "fuse-overlayfs-debuginfo-0:1.9-1.module+el8.6.0+21266+3e24c7b3.x86_64",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fuse-overlayfs-debugsource-0:1.9-1.module+el8.6.0+21266+3e24c7b3.aarch64 as a component of container-tools:rhel8:8060020240413110723:3b538bd8 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:fuse-overlayfs-debugsource-0:1.9-1.module+el8.6.0+21266+3e24c7b3.aarch64"
},
"product_reference": "fuse-overlayfs-debugsource-0:1.9-1.module+el8.6.0+21266+3e24c7b3.aarch64",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fuse-overlayfs-debugsource-0:1.9-1.module+el8.6.0+21266+3e24c7b3.ppc64le as a component of container-tools:rhel8:8060020240413110723:3b538bd8 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:fuse-overlayfs-debugsource-0:1.9-1.module+el8.6.0+21266+3e24c7b3.ppc64le"
},
"product_reference": "fuse-overlayfs-debugsource-0:1.9-1.module+el8.6.0+21266+3e24c7b3.ppc64le",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fuse-overlayfs-debugsource-0:1.9-1.module+el8.6.0+21266+3e24c7b3.s390x as a component of container-tools:rhel8:8060020240413110723:3b538bd8 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:fuse-overlayfs-debugsource-0:1.9-1.module+el8.6.0+21266+3e24c7b3.s390x"
},
"product_reference": "fuse-overlayfs-debugsource-0:1.9-1.module+el8.6.0+21266+3e24c7b3.s390x",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fuse-overlayfs-debugsource-0:1.9-1.module+el8.6.0+21266+3e24c7b3.x86_64 as a component of container-tools:rhel8:8060020240413110723:3b538bd8 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:fuse-overlayfs-debugsource-0:1.9-1.module+el8.6.0+21266+3e24c7b3.x86_64"
},
"product_reference": "fuse-overlayfs-debugsource-0:1.9-1.module+el8.6.0+21266+3e24c7b3.x86_64",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libslirp-0:4.4.0-1.module+el8.6.0+21266+3e24c7b3.aarch64 as a component of container-tools:rhel8:8060020240413110723:3b538bd8 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:libslirp-0:4.4.0-1.module+el8.6.0+21266+3e24c7b3.aarch64"
},
"product_reference": "libslirp-0:4.4.0-1.module+el8.6.0+21266+3e24c7b3.aarch64",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libslirp-0:4.4.0-1.module+el8.6.0+21266+3e24c7b3.ppc64le as a component of container-tools:rhel8:8060020240413110723:3b538bd8 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:libslirp-0:4.4.0-1.module+el8.6.0+21266+3e24c7b3.ppc64le"
},
"product_reference": "libslirp-0:4.4.0-1.module+el8.6.0+21266+3e24c7b3.ppc64le",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libslirp-0:4.4.0-1.module+el8.6.0+21266+3e24c7b3.s390x as a component of container-tools:rhel8:8060020240413110723:3b538bd8 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:libslirp-0:4.4.0-1.module+el8.6.0+21266+3e24c7b3.s390x"
},
"product_reference": "libslirp-0:4.4.0-1.module+el8.6.0+21266+3e24c7b3.s390x",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libslirp-0:4.4.0-1.module+el8.6.0+21266+3e24c7b3.src as a component of container-tools:rhel8:8060020240413110723:3b538bd8 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:libslirp-0:4.4.0-1.module+el8.6.0+21266+3e24c7b3.src"
},
"product_reference": "libslirp-0:4.4.0-1.module+el8.6.0+21266+3e24c7b3.src",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libslirp-0:4.4.0-1.module+el8.6.0+21266+3e24c7b3.x86_64 as a component of container-tools:rhel8:8060020240413110723:3b538bd8 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:libslirp-0:4.4.0-1.module+el8.6.0+21266+3e24c7b3.x86_64"
},
"product_reference": "libslirp-0:4.4.0-1.module+el8.6.0+21266+3e24c7b3.x86_64",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libslirp-debuginfo-0:4.4.0-1.module+el8.6.0+21266+3e24c7b3.aarch64 as a component of container-tools:rhel8:8060020240413110723:3b538bd8 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:libslirp-debuginfo-0:4.4.0-1.module+el8.6.0+21266+3e24c7b3.aarch64"
},
"product_reference": "libslirp-debuginfo-0:4.4.0-1.module+el8.6.0+21266+3e24c7b3.aarch64",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libslirp-debuginfo-0:4.4.0-1.module+el8.6.0+21266+3e24c7b3.ppc64le as a component of container-tools:rhel8:8060020240413110723:3b538bd8 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:libslirp-debuginfo-0:4.4.0-1.module+el8.6.0+21266+3e24c7b3.ppc64le"
},
"product_reference": "libslirp-debuginfo-0:4.4.0-1.module+el8.6.0+21266+3e24c7b3.ppc64le",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libslirp-debuginfo-0:4.4.0-1.module+el8.6.0+21266+3e24c7b3.s390x as a component of container-tools:rhel8:8060020240413110723:3b538bd8 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:libslirp-debuginfo-0:4.4.0-1.module+el8.6.0+21266+3e24c7b3.s390x"
},
"product_reference": "libslirp-debuginfo-0:4.4.0-1.module+el8.6.0+21266+3e24c7b3.s390x",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libslirp-debuginfo-0:4.4.0-1.module+el8.6.0+21266+3e24c7b3.x86_64 as a component of container-tools:rhel8:8060020240413110723:3b538bd8 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:libslirp-debuginfo-0:4.4.0-1.module+el8.6.0+21266+3e24c7b3.x86_64"
},
"product_reference": "libslirp-debuginfo-0:4.4.0-1.module+el8.6.0+21266+3e24c7b3.x86_64",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libslirp-debugsource-0:4.4.0-1.module+el8.6.0+21266+3e24c7b3.aarch64 as a component of container-tools:rhel8:8060020240413110723:3b538bd8 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:libslirp-debugsource-0:4.4.0-1.module+el8.6.0+21266+3e24c7b3.aarch64"
},
"product_reference": "libslirp-debugsource-0:4.4.0-1.module+el8.6.0+21266+3e24c7b3.aarch64",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libslirp-debugsource-0:4.4.0-1.module+el8.6.0+21266+3e24c7b3.ppc64le as a component of container-tools:rhel8:8060020240413110723:3b538bd8 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:libslirp-debugsource-0:4.4.0-1.module+el8.6.0+21266+3e24c7b3.ppc64le"
},
"product_reference": "libslirp-debugsource-0:4.4.0-1.module+el8.6.0+21266+3e24c7b3.ppc64le",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libslirp-debugsource-0:4.4.0-1.module+el8.6.0+21266+3e24c7b3.s390x as a component of container-tools:rhel8:8060020240413110723:3b538bd8 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:libslirp-debugsource-0:4.4.0-1.module+el8.6.0+21266+3e24c7b3.s390x"
},
"product_reference": "libslirp-debugsource-0:4.4.0-1.module+el8.6.0+21266+3e24c7b3.s390x",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libslirp-debugsource-0:4.4.0-1.module+el8.6.0+21266+3e24c7b3.x86_64 as a component of container-tools:rhel8:8060020240413110723:3b538bd8 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:libslirp-debugsource-0:4.4.0-1.module+el8.6.0+21266+3e24c7b3.x86_64"
},
"product_reference": "libslirp-debugsource-0:4.4.0-1.module+el8.6.0+21266+3e24c7b3.x86_64",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libslirp-devel-0:4.4.0-1.module+el8.6.0+21266+3e24c7b3.aarch64 as a component of container-tools:rhel8:8060020240413110723:3b538bd8 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:libslirp-devel-0:4.4.0-1.module+el8.6.0+21266+3e24c7b3.aarch64"
},
"product_reference": "libslirp-devel-0:4.4.0-1.module+el8.6.0+21266+3e24c7b3.aarch64",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libslirp-devel-0:4.4.0-1.module+el8.6.0+21266+3e24c7b3.ppc64le as a component of container-tools:rhel8:8060020240413110723:3b538bd8 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:libslirp-devel-0:4.4.0-1.module+el8.6.0+21266+3e24c7b3.ppc64le"
},
"product_reference": "libslirp-devel-0:4.4.0-1.module+el8.6.0+21266+3e24c7b3.ppc64le",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libslirp-devel-0:4.4.0-1.module+el8.6.0+21266+3e24c7b3.s390x as a component of container-tools:rhel8:8060020240413110723:3b538bd8 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:libslirp-devel-0:4.4.0-1.module+el8.6.0+21266+3e24c7b3.s390x"
},
"product_reference": "libslirp-devel-0:4.4.0-1.module+el8.6.0+21266+3e24c7b3.s390x",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libslirp-devel-0:4.4.0-1.module+el8.6.0+21266+3e24c7b3.x86_64 as a component of container-tools:rhel8:8060020240413110723:3b538bd8 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:libslirp-devel-0:4.4.0-1.module+el8.6.0+21266+3e24c7b3.x86_64"
},
"product_reference": "libslirp-devel-0:4.4.0-1.module+el8.6.0+21266+3e24c7b3.x86_64",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netavark-2:1.0.1-40.module+el8.6.0+21266+3e24c7b3.aarch64 as a component of container-tools:rhel8:8060020240413110723:3b538bd8 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:netavark-2:1.0.1-40.module+el8.6.0+21266+3e24c7b3.aarch64"
},
"product_reference": "netavark-2:1.0.1-40.module+el8.6.0+21266+3e24c7b3.aarch64",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netavark-2:1.0.1-40.module+el8.6.0+21266+3e24c7b3.ppc64le as a component of container-tools:rhel8:8060020240413110723:3b538bd8 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:netavark-2:1.0.1-40.module+el8.6.0+21266+3e24c7b3.ppc64le"
},
"product_reference": "netavark-2:1.0.1-40.module+el8.6.0+21266+3e24c7b3.ppc64le",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netavark-2:1.0.1-40.module+el8.6.0+21266+3e24c7b3.s390x as a component of container-tools:rhel8:8060020240413110723:3b538bd8 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:netavark-2:1.0.1-40.module+el8.6.0+21266+3e24c7b3.s390x"
},
"product_reference": "netavark-2:1.0.1-40.module+el8.6.0+21266+3e24c7b3.s390x",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netavark-2:1.0.1-40.module+el8.6.0+21266+3e24c7b3.x86_64 as a component of container-tools:rhel8:8060020240413110723:3b538bd8 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:netavark-2:1.0.1-40.module+el8.6.0+21266+3e24c7b3.x86_64"
},
"product_reference": "netavark-2:1.0.1-40.module+el8.6.0+21266+3e24c7b3.x86_64",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "oci-seccomp-bpf-hook-0:1.2.6-1.module+el8.6.0+21266+3e24c7b3.aarch64 as a component of container-tools:rhel8:8060020240413110723:3b538bd8 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:oci-seccomp-bpf-hook-0:1.2.6-1.module+el8.6.0+21266+3e24c7b3.aarch64"
},
"product_reference": "oci-seccomp-bpf-hook-0:1.2.6-1.module+el8.6.0+21266+3e24c7b3.aarch64",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "oci-seccomp-bpf-hook-0:1.2.6-1.module+el8.6.0+21266+3e24c7b3.ppc64le as a component of container-tools:rhel8:8060020240413110723:3b538bd8 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:oci-seccomp-bpf-hook-0:1.2.6-1.module+el8.6.0+21266+3e24c7b3.ppc64le"
},
"product_reference": "oci-seccomp-bpf-hook-0:1.2.6-1.module+el8.6.0+21266+3e24c7b3.ppc64le",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "oci-seccomp-bpf-hook-0:1.2.6-1.module+el8.6.0+21266+3e24c7b3.s390x as a component of container-tools:rhel8:8060020240413110723:3b538bd8 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:oci-seccomp-bpf-hook-0:1.2.6-1.module+el8.6.0+21266+3e24c7b3.s390x"
},
"product_reference": "oci-seccomp-bpf-hook-0:1.2.6-1.module+el8.6.0+21266+3e24c7b3.s390x",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "oci-seccomp-bpf-hook-0:1.2.6-1.module+el8.6.0+21266+3e24c7b3.src as a component of container-tools:rhel8:8060020240413110723:3b538bd8 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:oci-seccomp-bpf-hook-0:1.2.6-1.module+el8.6.0+21266+3e24c7b3.src"
},
"product_reference": "oci-seccomp-bpf-hook-0:1.2.6-1.module+el8.6.0+21266+3e24c7b3.src",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "oci-seccomp-bpf-hook-0:1.2.6-1.module+el8.6.0+21266+3e24c7b3.x86_64 as a component of container-tools:rhel8:8060020240413110723:3b538bd8 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:oci-seccomp-bpf-hook-0:1.2.6-1.module+el8.6.0+21266+3e24c7b3.x86_64"
},
"product_reference": "oci-seccomp-bpf-hook-0:1.2.6-1.module+el8.6.0+21266+3e24c7b3.x86_64",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "oci-seccomp-bpf-hook-debuginfo-0:1.2.6-1.module+el8.6.0+21266+3e24c7b3.aarch64 as a component of container-tools:rhel8:8060020240413110723:3b538bd8 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:oci-seccomp-bpf-hook-debuginfo-0:1.2.6-1.module+el8.6.0+21266+3e24c7b3.aarch64"
},
"product_reference": "oci-seccomp-bpf-hook-debuginfo-0:1.2.6-1.module+el8.6.0+21266+3e24c7b3.aarch64",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "oci-seccomp-bpf-hook-debuginfo-0:1.2.6-1.module+el8.6.0+21266+3e24c7b3.ppc64le as a component of container-tools:rhel8:8060020240413110723:3b538bd8 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:oci-seccomp-bpf-hook-debuginfo-0:1.2.6-1.module+el8.6.0+21266+3e24c7b3.ppc64le"
},
"product_reference": "oci-seccomp-bpf-hook-debuginfo-0:1.2.6-1.module+el8.6.0+21266+3e24c7b3.ppc64le",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "oci-seccomp-bpf-hook-debuginfo-0:1.2.6-1.module+el8.6.0+21266+3e24c7b3.s390x as a component of container-tools:rhel8:8060020240413110723:3b538bd8 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:oci-seccomp-bpf-hook-debuginfo-0:1.2.6-1.module+el8.6.0+21266+3e24c7b3.s390x"
},
"product_reference": "oci-seccomp-bpf-hook-debuginfo-0:1.2.6-1.module+el8.6.0+21266+3e24c7b3.s390x",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "oci-seccomp-bpf-hook-debuginfo-0:1.2.6-1.module+el8.6.0+21266+3e24c7b3.x86_64 as a component of container-tools:rhel8:8060020240413110723:3b538bd8 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:oci-seccomp-bpf-hook-debuginfo-0:1.2.6-1.module+el8.6.0+21266+3e24c7b3.x86_64"
},
"product_reference": "oci-seccomp-bpf-hook-debuginfo-0:1.2.6-1.module+el8.6.0+21266+3e24c7b3.x86_64",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "oci-seccomp-bpf-hook-debugsource-0:1.2.6-1.module+el8.6.0+21266+3e24c7b3.aarch64 as a component of container-tools:rhel8:8060020240413110723:3b538bd8 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:oci-seccomp-bpf-hook-debugsource-0:1.2.6-1.module+el8.6.0+21266+3e24c7b3.aarch64"
},
"product_reference": "oci-seccomp-bpf-hook-debugsource-0:1.2.6-1.module+el8.6.0+21266+3e24c7b3.aarch64",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "oci-seccomp-bpf-hook-debugsource-0:1.2.6-1.module+el8.6.0+21266+3e24c7b3.ppc64le as a component of container-tools:rhel8:8060020240413110723:3b538bd8 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:oci-seccomp-bpf-hook-debugsource-0:1.2.6-1.module+el8.6.0+21266+3e24c7b3.ppc64le"
},
"product_reference": "oci-seccomp-bpf-hook-debugsource-0:1.2.6-1.module+el8.6.0+21266+3e24c7b3.ppc64le",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "oci-seccomp-bpf-hook-debugsource-0:1.2.6-1.module+el8.6.0+21266+3e24c7b3.s390x as a component of container-tools:rhel8:8060020240413110723:3b538bd8 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:oci-seccomp-bpf-hook-debugsource-0:1.2.6-1.module+el8.6.0+21266+3e24c7b3.s390x"
},
"product_reference": "oci-seccomp-bpf-hook-debugsource-0:1.2.6-1.module+el8.6.0+21266+3e24c7b3.s390x",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "oci-seccomp-bpf-hook-debugsource-0:1.2.6-1.module+el8.6.0+21266+3e24c7b3.x86_64 as a component of container-tools:rhel8:8060020240413110723:3b538bd8 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:oci-seccomp-bpf-hook-debugsource-0:1.2.6-1.module+el8.6.0+21266+3e24c7b3.x86_64"
},
"product_reference": "oci-seccomp-bpf-hook-debugsource-0:1.2.6-1.module+el8.6.0+21266+3e24c7b3.x86_64",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-2:4.2.0-2.module+el8.6.0+21674+8010760f.aarch64 as a component of container-tools:rhel8:8060020240413110723:3b538bd8 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:podman-2:4.2.0-2.module+el8.6.0+21674+8010760f.aarch64"
},
"product_reference": "podman-2:4.2.0-2.module+el8.6.0+21674+8010760f.aarch64",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-2:4.2.0-2.module+el8.6.0+21674+8010760f.ppc64le as a component of container-tools:rhel8:8060020240413110723:3b538bd8 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:podman-2:4.2.0-2.module+el8.6.0+21674+8010760f.ppc64le"
},
"product_reference": "podman-2:4.2.0-2.module+el8.6.0+21674+8010760f.ppc64le",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-2:4.2.0-2.module+el8.6.0+21674+8010760f.s390x as a component of container-tools:rhel8:8060020240413110723:3b538bd8 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:podman-2:4.2.0-2.module+el8.6.0+21674+8010760f.s390x"
},
"product_reference": "podman-2:4.2.0-2.module+el8.6.0+21674+8010760f.s390x",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-2:4.2.0-2.module+el8.6.0+21674+8010760f.src as a component of container-tools:rhel8:8060020240413110723:3b538bd8 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:podman-2:4.2.0-2.module+el8.6.0+21674+8010760f.src"
},
"product_reference": "podman-2:4.2.0-2.module+el8.6.0+21674+8010760f.src",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-2:4.2.0-2.module+el8.6.0+21674+8010760f.x86_64 as a component of container-tools:rhel8:8060020240413110723:3b538bd8 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:podman-2:4.2.0-2.module+el8.6.0+21674+8010760f.x86_64"
},
"product_reference": "podman-2:4.2.0-2.module+el8.6.0+21674+8010760f.x86_64",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-catatonit-2:4.2.0-2.module+el8.6.0+21674+8010760f.aarch64 as a component of container-tools:rhel8:8060020240413110723:3b538bd8 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:podman-catatonit-2:4.2.0-2.module+el8.6.0+21674+8010760f.aarch64"
},
"product_reference": "podman-catatonit-2:4.2.0-2.module+el8.6.0+21674+8010760f.aarch64",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-catatonit-2:4.2.0-2.module+el8.6.0+21674+8010760f.ppc64le as a component of container-tools:rhel8:8060020240413110723:3b538bd8 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:podman-catatonit-2:4.2.0-2.module+el8.6.0+21674+8010760f.ppc64le"
},
"product_reference": "podman-catatonit-2:4.2.0-2.module+el8.6.0+21674+8010760f.ppc64le",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-catatonit-2:4.2.0-2.module+el8.6.0+21674+8010760f.s390x as a component of container-tools:rhel8:8060020240413110723:3b538bd8 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:podman-catatonit-2:4.2.0-2.module+el8.6.0+21674+8010760f.s390x"
},
"product_reference": "podman-catatonit-2:4.2.0-2.module+el8.6.0+21674+8010760f.s390x",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-catatonit-2:4.2.0-2.module+el8.6.0+21674+8010760f.x86_64 as a component of container-tools:rhel8:8060020240413110723:3b538bd8 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:podman-catatonit-2:4.2.0-2.module+el8.6.0+21674+8010760f.x86_64"
},
"product_reference": "podman-catatonit-2:4.2.0-2.module+el8.6.0+21674+8010760f.x86_64",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-catatonit-debuginfo-2:4.2.0-2.module+el8.6.0+21674+8010760f.aarch64 as a component of container-tools:rhel8:8060020240413110723:3b538bd8 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:podman-catatonit-debuginfo-2:4.2.0-2.module+el8.6.0+21674+8010760f.aarch64"
},
"product_reference": "podman-catatonit-debuginfo-2:4.2.0-2.module+el8.6.0+21674+8010760f.aarch64",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-catatonit-debuginfo-2:4.2.0-2.module+el8.6.0+21674+8010760f.ppc64le as a component of container-tools:rhel8:8060020240413110723:3b538bd8 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:podman-catatonit-debuginfo-2:4.2.0-2.module+el8.6.0+21674+8010760f.ppc64le"
},
"product_reference": "podman-catatonit-debuginfo-2:4.2.0-2.module+el8.6.0+21674+8010760f.ppc64le",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-catatonit-debuginfo-2:4.2.0-2.module+el8.6.0+21674+8010760f.s390x as a component of container-tools:rhel8:8060020240413110723:3b538bd8 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:podman-catatonit-debuginfo-2:4.2.0-2.module+el8.6.0+21674+8010760f.s390x"
},
"product_reference": "podman-catatonit-debuginfo-2:4.2.0-2.module+el8.6.0+21674+8010760f.s390x",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-catatonit-debuginfo-2:4.2.0-2.module+el8.6.0+21674+8010760f.x86_64 as a component of container-tools:rhel8:8060020240413110723:3b538bd8 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:podman-catatonit-debuginfo-2:4.2.0-2.module+el8.6.0+21674+8010760f.x86_64"
},
"product_reference": "podman-catatonit-debuginfo-2:4.2.0-2.module+el8.6.0+21674+8010760f.x86_64",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-debuginfo-2:4.2.0-2.module+el8.6.0+21674+8010760f.aarch64 as a component of container-tools:rhel8:8060020240413110723:3b538bd8 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:podman-debuginfo-2:4.2.0-2.module+el8.6.0+21674+8010760f.aarch64"
},
"product_reference": "podman-debuginfo-2:4.2.0-2.module+el8.6.0+21674+8010760f.aarch64",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-debuginfo-2:4.2.0-2.module+el8.6.0+21674+8010760f.ppc64le as a component of container-tools:rhel8:8060020240413110723:3b538bd8 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:podman-debuginfo-2:4.2.0-2.module+el8.6.0+21674+8010760f.ppc64le"
},
"product_reference": "podman-debuginfo-2:4.2.0-2.module+el8.6.0+21674+8010760f.ppc64le",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-debuginfo-2:4.2.0-2.module+el8.6.0+21674+8010760f.s390x as a component of container-tools:rhel8:8060020240413110723:3b538bd8 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:podman-debuginfo-2:4.2.0-2.module+el8.6.0+21674+8010760f.s390x"
},
"product_reference": "podman-debuginfo-2:4.2.0-2.module+el8.6.0+21674+8010760f.s390x",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-debuginfo-2:4.2.0-2.module+el8.6.0+21674+8010760f.x86_64 as a component of container-tools:rhel8:8060020240413110723:3b538bd8 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:podman-debuginfo-2:4.2.0-2.module+el8.6.0+21674+8010760f.x86_64"
},
"product_reference": "podman-debuginfo-2:4.2.0-2.module+el8.6.0+21674+8010760f.x86_64",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-debugsource-2:4.2.0-2.module+el8.6.0+21674+8010760f.aarch64 as a component of container-tools:rhel8:8060020240413110723:3b538bd8 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:podman-debugsource-2:4.2.0-2.module+el8.6.0+21674+8010760f.aarch64"
},
"product_reference": "podman-debugsource-2:4.2.0-2.module+el8.6.0+21674+8010760f.aarch64",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-debugsource-2:4.2.0-2.module+el8.6.0+21674+8010760f.ppc64le as a component of container-tools:rhel8:8060020240413110723:3b538bd8 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:podman-debugsource-2:4.2.0-2.module+el8.6.0+21674+8010760f.ppc64le"
},
"product_reference": "podman-debugsource-2:4.2.0-2.module+el8.6.0+21674+8010760f.ppc64le",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-debugsource-2:4.2.0-2.module+el8.6.0+21674+8010760f.s390x as a component of container-tools:rhel8:8060020240413110723:3b538bd8 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:podman-debugsource-2:4.2.0-2.module+el8.6.0+21674+8010760f.s390x"
},
"product_reference": "podman-debugsource-2:4.2.0-2.module+el8.6.0+21674+8010760f.s390x",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-debugsource-2:4.2.0-2.module+el8.6.0+21674+8010760f.x86_64 as a component of container-tools:rhel8:8060020240413110723:3b538bd8 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:podman-debugsource-2:4.2.0-2.module+el8.6.0+21674+8010760f.x86_64"
},
"product_reference": "podman-debugsource-2:4.2.0-2.module+el8.6.0+21674+8010760f.x86_64",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-docker-2:4.2.0-2.module+el8.6.0+21674+8010760f.noarch as a component of container-tools:rhel8:8060020240413110723:3b538bd8 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:podman-docker-2:4.2.0-2.module+el8.6.0+21674+8010760f.noarch"
},
"product_reference": "podman-docker-2:4.2.0-2.module+el8.6.0+21674+8010760f.noarch",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-gvproxy-2:4.2.0-2.module+el8.6.0+21674+8010760f.aarch64 as a component of container-tools:rhel8:8060020240413110723:3b538bd8 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:podman-gvproxy-2:4.2.0-2.module+el8.6.0+21674+8010760f.aarch64"
},
"product_reference": "podman-gvproxy-2:4.2.0-2.module+el8.6.0+21674+8010760f.aarch64",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-gvproxy-2:4.2.0-2.module+el8.6.0+21674+8010760f.ppc64le as a component of container-tools:rhel8:8060020240413110723:3b538bd8 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:podman-gvproxy-2:4.2.0-2.module+el8.6.0+21674+8010760f.ppc64le"
},
"product_reference": "podman-gvproxy-2:4.2.0-2.module+el8.6.0+21674+8010760f.ppc64le",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-gvproxy-2:4.2.0-2.module+el8.6.0+21674+8010760f.s390x as a component of container-tools:rhel8:8060020240413110723:3b538bd8 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:podman-gvproxy-2:4.2.0-2.module+el8.6.0+21674+8010760f.s390x"
},
"product_reference": "podman-gvproxy-2:4.2.0-2.module+el8.6.0+21674+8010760f.s390x",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-gvproxy-2:4.2.0-2.module+el8.6.0+21674+8010760f.x86_64 as a component of container-tools:rhel8:8060020240413110723:3b538bd8 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:podman-gvproxy-2:4.2.0-2.module+el8.6.0+21674+8010760f.x86_64"
},
"product_reference": "podman-gvproxy-2:4.2.0-2.module+el8.6.0+21674+8010760f.x86_64",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-gvproxy-debuginfo-2:4.2.0-2.module+el8.6.0+21674+8010760f.aarch64 as a component of container-tools:rhel8:8060020240413110723:3b538bd8 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:podman-gvproxy-debuginfo-2:4.2.0-2.module+el8.6.0+21674+8010760f.aarch64"
},
"product_reference": "podman-gvproxy-debuginfo-2:4.2.0-2.module+el8.6.0+21674+8010760f.aarch64",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-gvproxy-debuginfo-2:4.2.0-2.module+el8.6.0+21674+8010760f.ppc64le as a component of container-tools:rhel8:8060020240413110723:3b538bd8 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:podman-gvproxy-debuginfo-2:4.2.0-2.module+el8.6.0+21674+8010760f.ppc64le"
},
"product_reference": "podman-gvproxy-debuginfo-2:4.2.0-2.module+el8.6.0+21674+8010760f.ppc64le",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-gvproxy-debuginfo-2:4.2.0-2.module+el8.6.0+21674+8010760f.s390x as a component of container-tools:rhel8:8060020240413110723:3b538bd8 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:podman-gvproxy-debuginfo-2:4.2.0-2.module+el8.6.0+21674+8010760f.s390x"
},
"product_reference": "podman-gvproxy-debuginfo-2:4.2.0-2.module+el8.6.0+21674+8010760f.s390x",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-gvproxy-debuginfo-2:4.2.0-2.module+el8.6.0+21674+8010760f.x86_64 as a component of container-tools:rhel8:8060020240413110723:3b538bd8 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:podman-gvproxy-debuginfo-2:4.2.0-2.module+el8.6.0+21674+8010760f.x86_64"
},
"product_reference": "podman-gvproxy-debuginfo-2:4.2.0-2.module+el8.6.0+21674+8010760f.x86_64",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-plugins-2:4.2.0-2.module+el8.6.0+21674+8010760f.aarch64 as a component of container-tools:rhel8:8060020240413110723:3b538bd8 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:podman-plugins-2:4.2.0-2.module+el8.6.0+21674+8010760f.aarch64"
},
"product_reference": "podman-plugins-2:4.2.0-2.module+el8.6.0+21674+8010760f.aarch64",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-plugins-2:4.2.0-2.module+el8.6.0+21674+8010760f.ppc64le as a component of container-tools:rhel8:8060020240413110723:3b538bd8 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:podman-plugins-2:4.2.0-2.module+el8.6.0+21674+8010760f.ppc64le"
},
"product_reference": "podman-plugins-2:4.2.0-2.module+el8.6.0+21674+8010760f.ppc64le",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-plugins-2:4.2.0-2.module+el8.6.0+21674+8010760f.s390x as a component of container-tools:rhel8:8060020240413110723:3b538bd8 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:podman-plugins-2:4.2.0-2.module+el8.6.0+21674+8010760f.s390x"
},
"product_reference": "podman-plugins-2:4.2.0-2.module+el8.6.0+21674+8010760f.s390x",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-plugins-2:4.2.0-2.module+el8.6.0+21674+8010760f.x86_64 as a component of container-tools:rhel8:8060020240413110723:3b538bd8 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:podman-plugins-2:4.2.0-2.module+el8.6.0+21674+8010760f.x86_64"
},
"product_reference": "podman-plugins-2:4.2.0-2.module+el8.6.0+21674+8010760f.x86_64",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-plugins-debuginfo-2:4.2.0-2.module+el8.6.0+21674+8010760f.aarch64 as a component of container-tools:rhel8:8060020240413110723:3b538bd8 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:podman-plugins-debuginfo-2:4.2.0-2.module+el8.6.0+21674+8010760f.aarch64"
},
"product_reference": "podman-plugins-debuginfo-2:4.2.0-2.module+el8.6.0+21674+8010760f.aarch64",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-plugins-debuginfo-2:4.2.0-2.module+el8.6.0+21674+8010760f.ppc64le as a component of container-tools:rhel8:8060020240413110723:3b538bd8 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:podman-plugins-debuginfo-2:4.2.0-2.module+el8.6.0+21674+8010760f.ppc64le"
},
"product_reference": "podman-plugins-debuginfo-2:4.2.0-2.module+el8.6.0+21674+8010760f.ppc64le",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-plugins-debuginfo-2:4.2.0-2.module+el8.6.0+21674+8010760f.s390x as a component of container-tools:rhel8:8060020240413110723:3b538bd8 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:podman-plugins-debuginfo-2:4.2.0-2.module+el8.6.0+21674+8010760f.s390x"
},
"product_reference": "podman-plugins-debuginfo-2:4.2.0-2.module+el8.6.0+21674+8010760f.s390x",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-plugins-debuginfo-2:4.2.0-2.module+el8.6.0+21674+8010760f.x86_64 as a component of container-tools:rhel8:8060020240413110723:3b538bd8 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:podman-plugins-debuginfo-2:4.2.0-2.module+el8.6.0+21674+8010760f.x86_64"
},
"product_reference": "podman-plugins-debuginfo-2:4.2.0-2.module+el8.6.0+21674+8010760f.x86_64",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-remote-2:4.2.0-2.module+el8.6.0+21674+8010760f.aarch64 as a component of container-tools:rhel8:8060020240413110723:3b538bd8 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:podman-remote-2:4.2.0-2.module+el8.6.0+21674+8010760f.aarch64"
},
"product_reference": "podman-remote-2:4.2.0-2.module+el8.6.0+21674+8010760f.aarch64",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-remote-2:4.2.0-2.module+el8.6.0+21674+8010760f.ppc64le as a component of container-tools:rhel8:8060020240413110723:3b538bd8 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:podman-remote-2:4.2.0-2.module+el8.6.0+21674+8010760f.ppc64le"
},
"product_reference": "podman-remote-2:4.2.0-2.module+el8.6.0+21674+8010760f.ppc64le",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-remote-2:4.2.0-2.module+el8.6.0+21674+8010760f.s390x as a component of container-tools:rhel8:8060020240413110723:3b538bd8 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:podman-remote-2:4.2.0-2.module+el8.6.0+21674+8010760f.s390x"
},
"product_reference": "podman-remote-2:4.2.0-2.module+el8.6.0+21674+8010760f.s390x",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-remote-2:4.2.0-2.module+el8.6.0+21674+8010760f.x86_64 as a component of container-tools:rhel8:8060020240413110723:3b538bd8 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:podman-remote-2:4.2.0-2.module+el8.6.0+21674+8010760f.x86_64"
},
"product_reference": "podman-remote-2:4.2.0-2.module+el8.6.0+21674+8010760f.x86_64",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-remote-debuginfo-2:4.2.0-2.module+el8.6.0+21674+8010760f.aarch64 as a component of container-tools:rhel8:8060020240413110723:3b538bd8 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:podman-remote-debuginfo-2:4.2.0-2.module+el8.6.0+21674+8010760f.aarch64"
},
"product_reference": "podman-remote-debuginfo-2:4.2.0-2.module+el8.6.0+21674+8010760f.aarch64",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-remote-debuginfo-2:4.2.0-2.module+el8.6.0+21674+8010760f.ppc64le as a component of container-tools:rhel8:8060020240413110723:3b538bd8 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:podman-remote-debuginfo-2:4.2.0-2.module+el8.6.0+21674+8010760f.ppc64le"
},
"product_reference": "podman-remote-debuginfo-2:4.2.0-2.module+el8.6.0+21674+8010760f.ppc64le",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-remote-debuginfo-2:4.2.0-2.module+el8.6.0+21674+8010760f.s390x as a component of container-tools:rhel8:8060020240413110723:3b538bd8 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:podman-remote-debuginfo-2:4.2.0-2.module+el8.6.0+21674+8010760f.s390x"
},
"product_reference": "podman-remote-debuginfo-2:4.2.0-2.module+el8.6.0+21674+8010760f.s390x",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-remote-debuginfo-2:4.2.0-2.module+el8.6.0+21674+8010760f.x86_64 as a component of container-tools:rhel8:8060020240413110723:3b538bd8 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:podman-remote-debuginfo-2:4.2.0-2.module+el8.6.0+21674+8010760f.x86_64"
},
"product_reference": "podman-remote-debuginfo-2:4.2.0-2.module+el8.6.0+21674+8010760f.x86_64",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-tests-2:4.2.0-2.module+el8.6.0+21674+8010760f.aarch64 as a component of container-tools:rhel8:8060020240413110723:3b538bd8 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:podman-tests-2:4.2.0-2.module+el8.6.0+21674+8010760f.aarch64"
},
"product_reference": "podman-tests-2:4.2.0-2.module+el8.6.0+21674+8010760f.aarch64",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-tests-2:4.2.0-2.module+el8.6.0+21674+8010760f.ppc64le as a component of container-tools:rhel8:8060020240413110723:3b538bd8 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:podman-tests-2:4.2.0-2.module+el8.6.0+21674+8010760f.ppc64le"
},
"product_reference": "podman-tests-2:4.2.0-2.module+el8.6.0+21674+8010760f.ppc64le",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-tests-2:4.2.0-2.module+el8.6.0+21674+8010760f.s390x as a component of container-tools:rhel8:8060020240413110723:3b538bd8 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:podman-tests-2:4.2.0-2.module+el8.6.0+21674+8010760f.s390x"
},
"product_reference": "podman-tests-2:4.2.0-2.module+el8.6.0+21674+8010760f.s390x",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-tests-2:4.2.0-2.module+el8.6.0+21674+8010760f.x86_64 as a component of container-tools:rhel8:8060020240413110723:3b538bd8 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:podman-tests-2:4.2.0-2.module+el8.6.0+21674+8010760f.x86_64"
},
"product_reference": "podman-tests-2:4.2.0-2.module+el8.6.0+21674+8010760f.x86_64",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-podman-0:4.0.1-1.module+el8.6.0+21266+3e24c7b3.src as a component of container-tools:rhel8:8060020240413110723:3b538bd8 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:python-podman-0:4.0.1-1.module+el8.6.0+21266+3e24c7b3.src"
},
"product_reference": "python-podman-0:4.0.1-1.module+el8.6.0+21266+3e24c7b3.src",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-criu-0:3.15-3.module+el8.6.0+21266+3e24c7b3.aarch64 as a component of container-tools:rhel8:8060020240413110723:3b538bd8 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:python3-criu-0:3.15-3.module+el8.6.0+21266+3e24c7b3.aarch64"
},
"product_reference": "python3-criu-0:3.15-3.module+el8.6.0+21266+3e24c7b3.aarch64",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-criu-0:3.15-3.module+el8.6.0+21266+3e24c7b3.ppc64le as a component of container-tools:rhel8:8060020240413110723:3b538bd8 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:python3-criu-0:3.15-3.module+el8.6.0+21266+3e24c7b3.ppc64le"
},
"product_reference": "python3-criu-0:3.15-3.module+el8.6.0+21266+3e24c7b3.ppc64le",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-criu-0:3.15-3.module+el8.6.0+21266+3e24c7b3.s390x as a component of container-tools:rhel8:8060020240413110723:3b538bd8 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:python3-criu-0:3.15-3.module+el8.6.0+21266+3e24c7b3.s390x"
},
"product_reference": "python3-criu-0:3.15-3.module+el8.6.0+21266+3e24c7b3.s390x",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-criu-0:3.15-3.module+el8.6.0+21266+3e24c7b3.x86_64 as a component of container-tools:rhel8:8060020240413110723:3b538bd8 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:python3-criu-0:3.15-3.module+el8.6.0+21266+3e24c7b3.x86_64"
},
"product_reference": "python3-criu-0:3.15-3.module+el8.6.0+21266+3e24c7b3.x86_64",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-podman-0:4.0.1-1.module+el8.6.0+21266+3e24c7b3.noarch as a component of container-tools:rhel8:8060020240413110723:3b538bd8 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:python3-podman-0:4.0.1-1.module+el8.6.0+21266+3e24c7b3.noarch"
},
"product_reference": "python3-podman-0:4.0.1-1.module+el8.6.0+21266+3e24c7b3.noarch",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "runc-1:1.1.12-1.module+el8.6.0+21266+3e24c7b3.aarch64 as a component of container-tools:rhel8:8060020240413110723:3b538bd8 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:runc-1:1.1.12-1.module+el8.6.0+21266+3e24c7b3.aarch64"
},
"product_reference": "runc-1:1.1.12-1.module+el8.6.0+21266+3e24c7b3.aarch64",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "runc-1:1.1.12-1.module+el8.6.0+21266+3e24c7b3.ppc64le as a component of container-tools:rhel8:8060020240413110723:3b538bd8 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:runc-1:1.1.12-1.module+el8.6.0+21266+3e24c7b3.ppc64le"
},
"product_reference": "runc-1:1.1.12-1.module+el8.6.0+21266+3e24c7b3.ppc64le",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "runc-1:1.1.12-1.module+el8.6.0+21266+3e24c7b3.s390x as a component of container-tools:rhel8:8060020240413110723:3b538bd8 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:runc-1:1.1.12-1.module+el8.6.0+21266+3e24c7b3.s390x"
},
"product_reference": "runc-1:1.1.12-1.module+el8.6.0+21266+3e24c7b3.s390x",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "runc-1:1.1.12-1.module+el8.6.0+21266+3e24c7b3.src as a component of container-tools:rhel8:8060020240413110723:3b538bd8 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:runc-1:1.1.12-1.module+el8.6.0+21266+3e24c7b3.src"
},
"product_reference": "runc-1:1.1.12-1.module+el8.6.0+21266+3e24c7b3.src",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "runc-1:1.1.12-1.module+el8.6.0+21266+3e24c7b3.x86_64 as a component of container-tools:rhel8:8060020240413110723:3b538bd8 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:runc-1:1.1.12-1.module+el8.6.0+21266+3e24c7b3.x86_64"
},
"product_reference": "runc-1:1.1.12-1.module+el8.6.0+21266+3e24c7b3.x86_64",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "runc-debuginfo-1:1.1.12-1.module+el8.6.0+21266+3e24c7b3.aarch64 as a component of container-tools:rhel8:8060020240413110723:3b538bd8 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:runc-debuginfo-1:1.1.12-1.module+el8.6.0+21266+3e24c7b3.aarch64"
},
"product_reference": "runc-debuginfo-1:1.1.12-1.module+el8.6.0+21266+3e24c7b3.aarch64",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "runc-debuginfo-1:1.1.12-1.module+el8.6.0+21266+3e24c7b3.ppc64le as a component of container-tools:rhel8:8060020240413110723:3b538bd8 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:runc-debuginfo-1:1.1.12-1.module+el8.6.0+21266+3e24c7b3.ppc64le"
},
"product_reference": "runc-debuginfo-1:1.1.12-1.module+el8.6.0+21266+3e24c7b3.ppc64le",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "runc-debuginfo-1:1.1.12-1.module+el8.6.0+21266+3e24c7b3.s390x as a component of container-tools:rhel8:8060020240413110723:3b538bd8 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:runc-debuginfo-1:1.1.12-1.module+el8.6.0+21266+3e24c7b3.s390x"
},
"product_reference": "runc-debuginfo-1:1.1.12-1.module+el8.6.0+21266+3e24c7b3.s390x",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "runc-debuginfo-1:1.1.12-1.module+el8.6.0+21266+3e24c7b3.x86_64 as a component of container-tools:rhel8:8060020240413110723:3b538bd8 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:runc-debuginfo-1:1.1.12-1.module+el8.6.0+21266+3e24c7b3.x86_64"
},
"product_reference": "runc-debuginfo-1:1.1.12-1.module+el8.6.0+21266+3e24c7b3.x86_64",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "runc-debugsource-1:1.1.12-1.module+el8.6.0+21266+3e24c7b3.aarch64 as a component of container-tools:rhel8:8060020240413110723:3b538bd8 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:runc-debugsource-1:1.1.12-1.module+el8.6.0+21266+3e24c7b3.aarch64"
},
"product_reference": "runc-debugsource-1:1.1.12-1.module+el8.6.0+21266+3e24c7b3.aarch64",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "runc-debugsource-1:1.1.12-1.module+el8.6.0+21266+3e24c7b3.ppc64le as a component of container-tools:rhel8:8060020240413110723:3b538bd8 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:runc-debugsource-1:1.1.12-1.module+el8.6.0+21266+3e24c7b3.ppc64le"
},
"product_reference": "runc-debugsource-1:1.1.12-1.module+el8.6.0+21266+3e24c7b3.ppc64le",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "runc-debugsource-1:1.1.12-1.module+el8.6.0+21266+3e24c7b3.s390x as a component of container-tools:rhel8:8060020240413110723:3b538bd8 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:runc-debugsource-1:1.1.12-1.module+el8.6.0+21266+3e24c7b3.s390x"
},
"product_reference": "runc-debugsource-1:1.1.12-1.module+el8.6.0+21266+3e24c7b3.s390x",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "runc-debugsource-1:1.1.12-1.module+el8.6.0+21266+3e24c7b3.x86_64 as a component of container-tools:rhel8:8060020240413110723:3b538bd8 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:runc-debugsource-1:1.1.12-1.module+el8.6.0+21266+3e24c7b3.x86_64"
},
"product_reference": "runc-debugsource-1:1.1.12-1.module+el8.6.0+21266+3e24c7b3.x86_64",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "skopeo-2:1.9.1-1.module+el8.6.0+21266+3e24c7b3.aarch64 as a component of container-tools:rhel8:8060020240413110723:3b538bd8 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:skopeo-2:1.9.1-1.module+el8.6.0+21266+3e24c7b3.aarch64"
},
"product_reference": "skopeo-2:1.9.1-1.module+el8.6.0+21266+3e24c7b3.aarch64",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "skopeo-2:1.9.1-1.module+el8.6.0+21266+3e24c7b3.ppc64le as a component of container-tools:rhel8:8060020240413110723:3b538bd8 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:skopeo-2:1.9.1-1.module+el8.6.0+21266+3e24c7b3.ppc64le"
},
"product_reference": "skopeo-2:1.9.1-1.module+el8.6.0+21266+3e24c7b3.ppc64le",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "skopeo-2:1.9.1-1.module+el8.6.0+21266+3e24c7b3.s390x as a component of container-tools:rhel8:8060020240413110723:3b538bd8 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:skopeo-2:1.9.1-1.module+el8.6.0+21266+3e24c7b3.s390x"
},
"product_reference": "skopeo-2:1.9.1-1.module+el8.6.0+21266+3e24c7b3.s390x",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "skopeo-2:1.9.1-1.module+el8.6.0+21266+3e24c7b3.src as a component of container-tools:rhel8:8060020240413110723:3b538bd8 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:skopeo-2:1.9.1-1.module+el8.6.0+21266+3e24c7b3.src"
},
"product_reference": "skopeo-2:1.9.1-1.module+el8.6.0+21266+3e24c7b3.src",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "skopeo-2:1.9.1-1.module+el8.6.0+21266+3e24c7b3.x86_64 as a component of container-tools:rhel8:8060020240413110723:3b538bd8 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:skopeo-2:1.9.1-1.module+el8.6.0+21266+3e24c7b3.x86_64"
},
"product_reference": "skopeo-2:1.9.1-1.module+el8.6.0+21266+3e24c7b3.x86_64",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "skopeo-debuginfo-2:1.9.1-1.module+el8.6.0+21266+3e24c7b3.aarch64 as a component of container-tools:rhel8:8060020240413110723:3b538bd8 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:skopeo-debuginfo-2:1.9.1-1.module+el8.6.0+21266+3e24c7b3.aarch64"
},
"product_reference": "skopeo-debuginfo-2:1.9.1-1.module+el8.6.0+21266+3e24c7b3.aarch64",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "skopeo-debuginfo-2:1.9.1-1.module+el8.6.0+21266+3e24c7b3.ppc64le as a component of container-tools:rhel8:8060020240413110723:3b538bd8 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:skopeo-debuginfo-2:1.9.1-1.module+el8.6.0+21266+3e24c7b3.ppc64le"
},
"product_reference": "skopeo-debuginfo-2:1.9.1-1.module+el8.6.0+21266+3e24c7b3.ppc64le",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "skopeo-debuginfo-2:1.9.1-1.module+el8.6.0+21266+3e24c7b3.s390x as a component of container-tools:rhel8:8060020240413110723:3b538bd8 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:skopeo-debuginfo-2:1.9.1-1.module+el8.6.0+21266+3e24c7b3.s390x"
},
"product_reference": "skopeo-debuginfo-2:1.9.1-1.module+el8.6.0+21266+3e24c7b3.s390x",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "skopeo-debuginfo-2:1.9.1-1.module+el8.6.0+21266+3e24c7b3.x86_64 as a component of container-tools:rhel8:8060020240413110723:3b538bd8 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:skopeo-debuginfo-2:1.9.1-1.module+el8.6.0+21266+3e24c7b3.x86_64"
},
"product_reference": "skopeo-debuginfo-2:1.9.1-1.module+el8.6.0+21266+3e24c7b3.x86_64",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "skopeo-debugsource-2:1.9.1-1.module+el8.6.0+21266+3e24c7b3.aarch64 as a component of container-tools:rhel8:8060020240413110723:3b538bd8 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:skopeo-debugsource-2:1.9.1-1.module+el8.6.0+21266+3e24c7b3.aarch64"
},
"product_reference": "skopeo-debugsource-2:1.9.1-1.module+el8.6.0+21266+3e24c7b3.aarch64",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "skopeo-debugsource-2:1.9.1-1.module+el8.6.0+21266+3e24c7b3.ppc64le as a component of container-tools:rhel8:8060020240413110723:3b538bd8 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:skopeo-debugsource-2:1.9.1-1.module+el8.6.0+21266+3e24c7b3.ppc64le"
},
"product_reference": "skopeo-debugsource-2:1.9.1-1.module+el8.6.0+21266+3e24c7b3.ppc64le",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "skopeo-debugsource-2:1.9.1-1.module+el8.6.0+21266+3e24c7b3.s390x as a component of container-tools:rhel8:8060020240413110723:3b538bd8 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:skopeo-debugsource-2:1.9.1-1.module+el8.6.0+21266+3e24c7b3.s390x"
},
"product_reference": "skopeo-debugsource-2:1.9.1-1.module+el8.6.0+21266+3e24c7b3.s390x",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "skopeo-debugsource-2:1.9.1-1.module+el8.6.0+21266+3e24c7b3.x86_64 as a component of container-tools:rhel8:8060020240413110723:3b538bd8 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:skopeo-debugsource-2:1.9.1-1.module+el8.6.0+21266+3e24c7b3.x86_64"
},
"product_reference": "skopeo-debugsource-2:1.9.1-1.module+el8.6.0+21266+3e24c7b3.x86_64",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "skopeo-tests-2:1.9.1-1.module+el8.6.0+21266+3e24c7b3.aarch64 as a component of container-tools:rhel8:8060020240413110723:3b538bd8 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:skopeo-tests-2:1.9.1-1.module+el8.6.0+21266+3e24c7b3.aarch64"
},
"product_reference": "skopeo-tests-2:1.9.1-1.module+el8.6.0+21266+3e24c7b3.aarch64",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "skopeo-tests-2:1.9.1-1.module+el8.6.0+21266+3e24c7b3.ppc64le as a component of container-tools:rhel8:8060020240413110723:3b538bd8 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:skopeo-tests-2:1.9.1-1.module+el8.6.0+21266+3e24c7b3.ppc64le"
},
"product_reference": "skopeo-tests-2:1.9.1-1.module+el8.6.0+21266+3e24c7b3.ppc64le",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "skopeo-tests-2:1.9.1-1.module+el8.6.0+21266+3e24c7b3.s390x as a component of container-tools:rhel8:8060020240413110723:3b538bd8 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:skopeo-tests-2:1.9.1-1.module+el8.6.0+21266+3e24c7b3.s390x"
},
"product_reference": "skopeo-tests-2:1.9.1-1.module+el8.6.0+21266+3e24c7b3.s390x",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "skopeo-tests-2:1.9.1-1.module+el8.6.0+21266+3e24c7b3.x86_64 as a component of container-tools:rhel8:8060020240413110723:3b538bd8 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:skopeo-tests-2:1.9.1-1.module+el8.6.0+21266+3e24c7b3.x86_64"
},
"product_reference": "skopeo-tests-2:1.9.1-1.module+el8.6.0+21266+3e24c7b3.x86_64",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "slirp4netns-0:1.2.0-3.module+el8.6.0+21266+3e24c7b3.aarch64 as a component of container-tools:rhel8:8060020240413110723:3b538bd8 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:slirp4netns-0:1.2.0-3.module+el8.6.0+21266+3e24c7b3.aarch64"
},
"product_reference": "slirp4netns-0:1.2.0-3.module+el8.6.0+21266+3e24c7b3.aarch64",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "slirp4netns-0:1.2.0-3.module+el8.6.0+21266+3e24c7b3.ppc64le as a component of container-tools:rhel8:8060020240413110723:3b538bd8 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:slirp4netns-0:1.2.0-3.module+el8.6.0+21266+3e24c7b3.ppc64le"
},
"product_reference": "slirp4netns-0:1.2.0-3.module+el8.6.0+21266+3e24c7b3.ppc64le",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "slirp4netns-0:1.2.0-3.module+el8.6.0+21266+3e24c7b3.s390x as a component of container-tools:rhel8:8060020240413110723:3b538bd8 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:slirp4netns-0:1.2.0-3.module+el8.6.0+21266+3e24c7b3.s390x"
},
"product_reference": "slirp4netns-0:1.2.0-3.module+el8.6.0+21266+3e24c7b3.s390x",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "slirp4netns-0:1.2.0-3.module+el8.6.0+21266+3e24c7b3.src as a component of container-tools:rhel8:8060020240413110723:3b538bd8 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:slirp4netns-0:1.2.0-3.module+el8.6.0+21266+3e24c7b3.src"
},
"product_reference": "slirp4netns-0:1.2.0-3.module+el8.6.0+21266+3e24c7b3.src",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "slirp4netns-0:1.2.0-3.module+el8.6.0+21266+3e24c7b3.x86_64 as a component of container-tools:rhel8:8060020240413110723:3b538bd8 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:slirp4netns-0:1.2.0-3.module+el8.6.0+21266+3e24c7b3.x86_64"
},
"product_reference": "slirp4netns-0:1.2.0-3.module+el8.6.0+21266+3e24c7b3.x86_64",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "slirp4netns-debuginfo-0:1.2.0-3.module+el8.6.0+21266+3e24c7b3.aarch64 as a component of container-tools:rhel8:8060020240413110723:3b538bd8 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:slirp4netns-debuginfo-0:1.2.0-3.module+el8.6.0+21266+3e24c7b3.aarch64"
},
"product_reference": "slirp4netns-debuginfo-0:1.2.0-3.module+el8.6.0+21266+3e24c7b3.aarch64",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "slirp4netns-debuginfo-0:1.2.0-3.module+el8.6.0+21266+3e24c7b3.ppc64le as a component of container-tools:rhel8:8060020240413110723:3b538bd8 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:slirp4netns-debuginfo-0:1.2.0-3.module+el8.6.0+21266+3e24c7b3.ppc64le"
},
"product_reference": "slirp4netns-debuginfo-0:1.2.0-3.module+el8.6.0+21266+3e24c7b3.ppc64le",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "slirp4netns-debuginfo-0:1.2.0-3.module+el8.6.0+21266+3e24c7b3.s390x as a component of container-tools:rhel8:8060020240413110723:3b538bd8 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:slirp4netns-debuginfo-0:1.2.0-3.module+el8.6.0+21266+3e24c7b3.s390x"
},
"product_reference": "slirp4netns-debuginfo-0:1.2.0-3.module+el8.6.0+21266+3e24c7b3.s390x",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "slirp4netns-debuginfo-0:1.2.0-3.module+el8.6.0+21266+3e24c7b3.x86_64 as a component of container-tools:rhel8:8060020240413110723:3b538bd8 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:slirp4netns-debuginfo-0:1.2.0-3.module+el8.6.0+21266+3e24c7b3.x86_64"
},
"product_reference": "slirp4netns-debuginfo-0:1.2.0-3.module+el8.6.0+21266+3e24c7b3.x86_64",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "slirp4netns-debugsource-0:1.2.0-3.module+el8.6.0+21266+3e24c7b3.aarch64 as a component of container-tools:rhel8:8060020240413110723:3b538bd8 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:slirp4netns-debugsource-0:1.2.0-3.module+el8.6.0+21266+3e24c7b3.aarch64"
},
"product_reference": "slirp4netns-debugsource-0:1.2.0-3.module+el8.6.0+21266+3e24c7b3.aarch64",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "slirp4netns-debugsource-0:1.2.0-3.module+el8.6.0+21266+3e24c7b3.ppc64le as a component of container-tools:rhel8:8060020240413110723:3b538bd8 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:slirp4netns-debugsource-0:1.2.0-3.module+el8.6.0+21266+3e24c7b3.ppc64le"
},
"product_reference": "slirp4netns-debugsource-0:1.2.0-3.module+el8.6.0+21266+3e24c7b3.ppc64le",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "slirp4netns-debugsource-0:1.2.0-3.module+el8.6.0+21266+3e24c7b3.s390x as a component of container-tools:rhel8:8060020240413110723:3b538bd8 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:slirp4netns-debugsource-0:1.2.0-3.module+el8.6.0+21266+3e24c7b3.s390x"
},
"product_reference": "slirp4netns-debugsource-0:1.2.0-3.module+el8.6.0+21266+3e24c7b3.s390x",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "slirp4netns-debugsource-0:1.2.0-3.module+el8.6.0+21266+3e24c7b3.x86_64 as a component of container-tools:rhel8:8060020240413110723:3b538bd8 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:slirp4netns-debugsource-0:1.2.0-3.module+el8.6.0+21266+3e24c7b3.x86_64"
},
"product_reference": "slirp4netns-debugsource-0:1.2.0-3.module+el8.6.0+21266+3e24c7b3.x86_64",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "toolbox-0:0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.aarch64 as a component of container-tools:rhel8:8060020240413110723:3b538bd8 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:toolbox-0:0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.aarch64"
},
"product_reference": "toolbox-0:0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.aarch64",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "toolbox-0:0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.ppc64le as a component of container-tools:rhel8:8060020240413110723:3b538bd8 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:toolbox-0:0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.ppc64le"
},
"product_reference": "toolbox-0:0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.ppc64le",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "toolbox-0:0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.s390x as a component of container-tools:rhel8:8060020240413110723:3b538bd8 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:toolbox-0:0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.s390x"
},
"product_reference": "toolbox-0:0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.s390x",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "toolbox-0:0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.src as a component of container-tools:rhel8:8060020240413110723:3b538bd8 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:toolbox-0:0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.src"
},
"product_reference": "toolbox-0:0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.src",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "toolbox-0:0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.x86_64 as a component of container-tools:rhel8:8060020240413110723:3b538bd8 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:toolbox-0:0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.x86_64"
},
"product_reference": "toolbox-0:0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.x86_64",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "toolbox-debuginfo-0:0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.aarch64 as a component of container-tools:rhel8:8060020240413110723:3b538bd8 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:toolbox-debuginfo-0:0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.aarch64"
},
"product_reference": "toolbox-debuginfo-0:0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.aarch64",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "toolbox-debuginfo-0:0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.ppc64le as a component of container-tools:rhel8:8060020240413110723:3b538bd8 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:toolbox-debuginfo-0:0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.ppc64le"
},
"product_reference": "toolbox-debuginfo-0:0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.ppc64le",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "toolbox-debuginfo-0:0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.s390x as a component of container-tools:rhel8:8060020240413110723:3b538bd8 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:toolbox-debuginfo-0:0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.s390x"
},
"product_reference": "toolbox-debuginfo-0:0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.s390x",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "toolbox-debuginfo-0:0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.x86_64 as a component of container-tools:rhel8:8060020240413110723:3b538bd8 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:toolbox-debuginfo-0:0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.x86_64"
},
"product_reference": "toolbox-debuginfo-0:0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.x86_64",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "toolbox-debugsource-0:0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.aarch64 as a component of container-tools:rhel8:8060020240413110723:3b538bd8 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:toolbox-debugsource-0:0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.aarch64"
},
"product_reference": "toolbox-debugsource-0:0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.aarch64",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "toolbox-debugsource-0:0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.ppc64le as a component of container-tools:rhel8:8060020240413110723:3b538bd8 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:toolbox-debugsource-0:0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.ppc64le"
},
"product_reference": "toolbox-debugsource-0:0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.ppc64le",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "toolbox-debugsource-0:0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.s390x as a component of container-tools:rhel8:8060020240413110723:3b538bd8 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:toolbox-debugsource-0:0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.s390x"
},
"product_reference": "toolbox-debugsource-0:0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.s390x",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "toolbox-debugsource-0:0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.x86_64 as a component of container-tools:rhel8:8060020240413110723:3b538bd8 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:toolbox-debugsource-0:0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.x86_64"
},
"product_reference": "toolbox-debugsource-0:0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.x86_64",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "toolbox-tests-0:0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.aarch64 as a component of container-tools:rhel8:8060020240413110723:3b538bd8 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:toolbox-tests-0:0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.aarch64"
},
"product_reference": "toolbox-tests-0:0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.aarch64",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "toolbox-tests-0:0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.ppc64le as a component of container-tools:rhel8:8060020240413110723:3b538bd8 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:toolbox-tests-0:0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.ppc64le"
},
"product_reference": "toolbox-tests-0:0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.ppc64le",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "toolbox-tests-0:0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.s390x as a component of container-tools:rhel8:8060020240413110723:3b538bd8 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:toolbox-tests-0:0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.s390x"
},
"product_reference": "toolbox-tests-0:0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.s390x",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "toolbox-tests-0:0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.x86_64 as a component of container-tools:rhel8:8060020240413110723:3b538bd8 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:toolbox-tests-0:0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.x86_64"
},
"product_reference": "toolbox-tests-0:0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.x86_64",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "udica-0:0.2.6-5.module+el8.6.0+21266+3e24c7b3.noarch as a component of container-tools:rhel8:8060020240413110723:3b538bd8 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:udica-0:0.2.6-5.module+el8.6.0+21266+3e24c7b3.noarch"
},
"product_reference": "udica-0:0.2.6-5.module+el8.6.0+21266+3e24c7b3.noarch",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "udica-0:0.2.6-5.module+el8.6.0+21266+3e24c7b3.src as a component of container-tools:rhel8:8060020240413110723:3b538bd8 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:udica-0:0.2.6-5.module+el8.6.0+21266+3e24c7b3.src"
},
"product_reference": "udica-0:0.2.6-5.module+el8.6.0+21266+3e24c7b3.src",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2022-32149",
"cwe": {
"id": "CWE-407",
"name": "Inefficient Algorithmic Complexity"
},
"discovery_date": "2022-10-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2134010"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in the golang.org/x/text/language package. An attacker can craft an Accept-Language header which ParseAcceptLanguage will take significant time to parse. This issue leads to a denial of service, and can impact availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: golang.org/x/text/language: ParseAcceptLanguage takes a long time to parse complex tags",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:aardvark-dns-2:1.0.1-40.module+el8.6.0+21266+3e24c7b3.aarch64",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:aardvark-dns-2:1.0.1-40.module+el8.6.0+21266+3e24c7b3.ppc64le",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:aardvark-dns-2:1.0.1-40.module+el8.6.0+21266+3e24c7b3.s390x",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:aardvark-dns-2:1.0.1-40.module+el8.6.0+21266+3e24c7b3.x86_64",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:buildah-1:1.26.2-1.module+el8.6.0+21266+3e24c7b3.aarch64",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:buildah-1:1.26.2-1.module+el8.6.0+21266+3e24c7b3.ppc64le",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:buildah-1:1.26.2-1.module+el8.6.0+21266+3e24c7b3.s390x",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:buildah-1:1.26.2-1.module+el8.6.0+21266+3e24c7b3.src",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:buildah-1:1.26.2-1.module+el8.6.0+21266+3e24c7b3.x86_64",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:buildah-debuginfo-1:1.26.2-1.module+el8.6.0+21266+3e24c7b3.aarch64",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:buildah-debuginfo-1:1.26.2-1.module+el8.6.0+21266+3e24c7b3.ppc64le",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:buildah-debuginfo-1:1.26.2-1.module+el8.6.0+21266+3e24c7b3.s390x",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:buildah-debuginfo-1:1.26.2-1.module+el8.6.0+21266+3e24c7b3.x86_64",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:buildah-debugsource-1:1.26.2-1.module+el8.6.0+21266+3e24c7b3.aarch64",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:buildah-debugsource-1:1.26.2-1.module+el8.6.0+21266+3e24c7b3.ppc64le",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:buildah-debugsource-1:1.26.2-1.module+el8.6.0+21266+3e24c7b3.s390x",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:buildah-debugsource-1:1.26.2-1.module+el8.6.0+21266+3e24c7b3.x86_64",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:buildah-tests-1:1.26.2-1.module+el8.6.0+21266+3e24c7b3.aarch64",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:buildah-tests-1:1.26.2-1.module+el8.6.0+21266+3e24c7b3.ppc64le",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:buildah-tests-1:1.26.2-1.module+el8.6.0+21266+3e24c7b3.s390x",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:buildah-tests-1:1.26.2-1.module+el8.6.0+21266+3e24c7b3.x86_64",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:buildah-tests-debuginfo-1:1.26.2-1.module+el8.6.0+21266+3e24c7b3.aarch64",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:buildah-tests-debuginfo-1:1.26.2-1.module+el8.6.0+21266+3e24c7b3.ppc64le",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:buildah-tests-debuginfo-1:1.26.2-1.module+el8.6.0+21266+3e24c7b3.s390x",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:buildah-tests-debuginfo-1:1.26.2-1.module+el8.6.0+21266+3e24c7b3.x86_64",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:cockpit-podman-0:49.1-1.module+el8.6.0+21266+3e24c7b3.noarch",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:cockpit-podman-0:49.1-1.module+el8.6.0+21266+3e24c7b3.src",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:conmon-2:2.1.4-1.module+el8.6.0+21266+3e24c7b3.aarch64",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:conmon-2:2.1.4-1.module+el8.6.0+21266+3e24c7b3.ppc64le",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:conmon-2:2.1.4-1.module+el8.6.0+21266+3e24c7b3.s390x",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:conmon-2:2.1.4-1.module+el8.6.0+21266+3e24c7b3.src",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:conmon-2:2.1.4-1.module+el8.6.0+21266+3e24c7b3.x86_64",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:conmon-debuginfo-2:2.1.4-1.module+el8.6.0+21266+3e24c7b3.aarch64",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:conmon-debuginfo-2:2.1.4-1.module+el8.6.0+21266+3e24c7b3.ppc64le",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:conmon-debuginfo-2:2.1.4-1.module+el8.6.0+21266+3e24c7b3.s390x",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:conmon-debuginfo-2:2.1.4-1.module+el8.6.0+21266+3e24c7b3.x86_64",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:conmon-debugsource-2:2.1.4-1.module+el8.6.0+21266+3e24c7b3.aarch64",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:conmon-debugsource-2:2.1.4-1.module+el8.6.0+21266+3e24c7b3.ppc64le",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:conmon-debugsource-2:2.1.4-1.module+el8.6.0+21266+3e24c7b3.s390x",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:conmon-debugsource-2:2.1.4-1.module+el8.6.0+21266+3e24c7b3.x86_64",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:container-selinux-2:2.189.0-1.module+el8.6.0+21266+3e24c7b3.noarch",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:container-selinux-2:2.189.0-1.module+el8.6.0+21266+3e24c7b3.src",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:containernetworking-plugins-1:1.1.1-4.module+el8.6.0+21266+3e24c7b3.aarch64",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:containernetworking-plugins-1:1.1.1-4.module+el8.6.0+21266+3e24c7b3.ppc64le",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:containernetworking-plugins-1:1.1.1-4.module+el8.6.0+21266+3e24c7b3.s390x",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:containernetworking-plugins-1:1.1.1-4.module+el8.6.0+21266+3e24c7b3.src",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:containernetworking-plugins-1:1.1.1-4.module+el8.6.0+21266+3e24c7b3.x86_64",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:containernetworking-plugins-debuginfo-1:1.1.1-4.module+el8.6.0+21266+3e24c7b3.aarch64",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:containernetworking-plugins-debuginfo-1:1.1.1-4.module+el8.6.0+21266+3e24c7b3.ppc64le",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:containernetworking-plugins-debuginfo-1:1.1.1-4.module+el8.6.0+21266+3e24c7b3.s390x",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:containernetworking-plugins-debuginfo-1:1.1.1-4.module+el8.6.0+21266+3e24c7b3.x86_64",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:containernetworking-plugins-debugsource-1:1.1.1-4.module+el8.6.0+21266+3e24c7b3.aarch64",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:containernetworking-plugins-debugsource-1:1.1.1-4.module+el8.6.0+21266+3e24c7b3.ppc64le",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:containernetworking-plugins-debugsource-1:1.1.1-4.module+el8.6.0+21266+3e24c7b3.s390x",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:containernetworking-plugins-debugsource-1:1.1.1-4.module+el8.6.0+21266+3e24c7b3.x86_64",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:containers-common-2:1-40.module+el8.6.0+21266+3e24c7b3.aarch64",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:containers-common-2:1-40.module+el8.6.0+21266+3e24c7b3.ppc64le",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:containers-common-2:1-40.module+el8.6.0+21266+3e24c7b3.s390x",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:containers-common-2:1-40.module+el8.6.0+21266+3e24c7b3.src",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:containers-common-2:1-40.module+el8.6.0+21266+3e24c7b3.x86_64",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:crit-0:3.15-3.module+el8.6.0+21266+3e24c7b3.aarch64",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:crit-0:3.15-3.module+el8.6.0+21266+3e24c7b3.ppc64le",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:crit-0:3.15-3.module+el8.6.0+21266+3e24c7b3.s390x",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:crit-0:3.15-3.module+el8.6.0+21266+3e24c7b3.x86_64",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:criu-0:3.15-3.module+el8.6.0+21266+3e24c7b3.aarch64",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:criu-0:3.15-3.module+el8.6.0+21266+3e24c7b3.ppc64le",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:criu-0:3.15-3.module+el8.6.0+21266+3e24c7b3.s390x",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:criu-0:3.15-3.module+el8.6.0+21266+3e24c7b3.src",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:criu-0:3.15-3.module+el8.6.0+21266+3e24c7b3.x86_64",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:criu-debuginfo-0:3.15-3.module+el8.6.0+21266+3e24c7b3.aarch64",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:criu-debuginfo-0:3.15-3.module+el8.6.0+21266+3e24c7b3.ppc64le",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:criu-debuginfo-0:3.15-3.module+el8.6.0+21266+3e24c7b3.s390x",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:criu-debuginfo-0:3.15-3.module+el8.6.0+21266+3e24c7b3.x86_64",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:criu-debugsource-0:3.15-3.module+el8.6.0+21266+3e24c7b3.aarch64",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:criu-debugsource-0:3.15-3.module+el8.6.0+21266+3e24c7b3.ppc64le",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:criu-debugsource-0:3.15-3.module+el8.6.0+21266+3e24c7b3.s390x",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:criu-debugsource-0:3.15-3.module+el8.6.0+21266+3e24c7b3.x86_64",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:criu-devel-0:3.15-3.module+el8.6.0+21266+3e24c7b3.aarch64",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:criu-devel-0:3.15-3.module+el8.6.0+21266+3e24c7b3.ppc64le",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:criu-devel-0:3.15-3.module+el8.6.0+21266+3e24c7b3.s390x",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:criu-devel-0:3.15-3.module+el8.6.0+21266+3e24c7b3.x86_64",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:criu-libs-0:3.15-3.module+el8.6.0+21266+3e24c7b3.aarch64",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:criu-libs-0:3.15-3.module+el8.6.0+21266+3e24c7b3.ppc64le",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:criu-libs-0:3.15-3.module+el8.6.0+21266+3e24c7b3.s390x",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:criu-libs-0:3.15-3.module+el8.6.0+21266+3e24c7b3.x86_64",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:criu-libs-debuginfo-0:3.15-3.module+el8.6.0+21266+3e24c7b3.aarch64",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:criu-libs-debuginfo-0:3.15-3.module+el8.6.0+21266+3e24c7b3.ppc64le",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:criu-libs-debuginfo-0:3.15-3.module+el8.6.0+21266+3e24c7b3.s390x",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:criu-libs-debuginfo-0:3.15-3.module+el8.6.0+21266+3e24c7b3.x86_64",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:crun-0:1.5-1.module+el8.6.0+21266+3e24c7b3.aarch64",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:crun-0:1.5-1.module+el8.6.0+21266+3e24c7b3.ppc64le",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:crun-0:1.5-1.module+el8.6.0+21266+3e24c7b3.s390x",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:crun-0:1.5-1.module+el8.6.0+21266+3e24c7b3.src",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:crun-0:1.5-1.module+el8.6.0+21266+3e24c7b3.x86_64",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:crun-debuginfo-0:1.5-1.module+el8.6.0+21266+3e24c7b3.aarch64",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:crun-debuginfo-0:1.5-1.module+el8.6.0+21266+3e24c7b3.ppc64le",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:crun-debuginfo-0:1.5-1.module+el8.6.0+21266+3e24c7b3.s390x",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:crun-debuginfo-0:1.5-1.module+el8.6.0+21266+3e24c7b3.x86_64",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:crun-debugsource-0:1.5-1.module+el8.6.0+21266+3e24c7b3.aarch64",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:crun-debugsource-0:1.5-1.module+el8.6.0+21266+3e24c7b3.ppc64le",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:crun-debugsource-0:1.5-1.module+el8.6.0+21266+3e24c7b3.s390x",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:crun-debugsource-0:1.5-1.module+el8.6.0+21266+3e24c7b3.x86_64",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:fuse-overlayfs-0:1.9-1.module+el8.6.0+21266+3e24c7b3.aarch64",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:fuse-overlayfs-0:1.9-1.module+el8.6.0+21266+3e24c7b3.ppc64le",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:fuse-overlayfs-0:1.9-1.module+el8.6.0+21266+3e24c7b3.s390x",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:fuse-overlayfs-0:1.9-1.module+el8.6.0+21266+3e24c7b3.src",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:fuse-overlayfs-0:1.9-1.module+el8.6.0+21266+3e24c7b3.x86_64",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:fuse-overlayfs-debuginfo-0:1.9-1.module+el8.6.0+21266+3e24c7b3.aarch64",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:fuse-overlayfs-debuginfo-0:1.9-1.module+el8.6.0+21266+3e24c7b3.ppc64le",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:fuse-overlayfs-debuginfo-0:1.9-1.module+el8.6.0+21266+3e24c7b3.s390x",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:fuse-overlayfs-debuginfo-0:1.9-1.module+el8.6.0+21266+3e24c7b3.x86_64",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:fuse-overlayfs-debugsource-0:1.9-1.module+el8.6.0+21266+3e24c7b3.aarch64",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:fuse-overlayfs-debugsource-0:1.9-1.module+el8.6.0+21266+3e24c7b3.ppc64le",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:fuse-overlayfs-debugsource-0:1.9-1.module+el8.6.0+21266+3e24c7b3.s390x",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:fuse-overlayfs-debugsource-0:1.9-1.module+el8.6.0+21266+3e24c7b3.x86_64",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:libslirp-0:4.4.0-1.module+el8.6.0+21266+3e24c7b3.aarch64",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:libslirp-0:4.4.0-1.module+el8.6.0+21266+3e24c7b3.ppc64le",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:libslirp-0:4.4.0-1.module+el8.6.0+21266+3e24c7b3.s390x",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:libslirp-0:4.4.0-1.module+el8.6.0+21266+3e24c7b3.src",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:libslirp-0:4.4.0-1.module+el8.6.0+21266+3e24c7b3.x86_64",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:libslirp-debuginfo-0:4.4.0-1.module+el8.6.0+21266+3e24c7b3.aarch64",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:libslirp-debuginfo-0:4.4.0-1.module+el8.6.0+21266+3e24c7b3.ppc64le",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:libslirp-debuginfo-0:4.4.0-1.module+el8.6.0+21266+3e24c7b3.s390x",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:libslirp-debuginfo-0:4.4.0-1.module+el8.6.0+21266+3e24c7b3.x86_64",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:libslirp-debugsource-0:4.4.0-1.module+el8.6.0+21266+3e24c7b3.aarch64",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:libslirp-debugsource-0:4.4.0-1.module+el8.6.0+21266+3e24c7b3.ppc64le",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:libslirp-debugsource-0:4.4.0-1.module+el8.6.0+21266+3e24c7b3.s390x",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:libslirp-debugsource-0:4.4.0-1.module+el8.6.0+21266+3e24c7b3.x86_64",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:libslirp-devel-0:4.4.0-1.module+el8.6.0+21266+3e24c7b3.aarch64",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:libslirp-devel-0:4.4.0-1.module+el8.6.0+21266+3e24c7b3.ppc64le",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:libslirp-devel-0:4.4.0-1.module+el8.6.0+21266+3e24c7b3.s390x",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:libslirp-devel-0:4.4.0-1.module+el8.6.0+21266+3e24c7b3.x86_64",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:netavark-2:1.0.1-40.module+el8.6.0+21266+3e24c7b3.aarch64",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:netavark-2:1.0.1-40.module+el8.6.0+21266+3e24c7b3.ppc64le",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:netavark-2:1.0.1-40.module+el8.6.0+21266+3e24c7b3.s390x",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:netavark-2:1.0.1-40.module+el8.6.0+21266+3e24c7b3.x86_64",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:oci-seccomp-bpf-hook-0:1.2.6-1.module+el8.6.0+21266+3e24c7b3.aarch64",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:oci-seccomp-bpf-hook-0:1.2.6-1.module+el8.6.0+21266+3e24c7b3.ppc64le",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:oci-seccomp-bpf-hook-0:1.2.6-1.module+el8.6.0+21266+3e24c7b3.s390x",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:oci-seccomp-bpf-hook-0:1.2.6-1.module+el8.6.0+21266+3e24c7b3.src",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:oci-seccomp-bpf-hook-0:1.2.6-1.module+el8.6.0+21266+3e24c7b3.x86_64",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:oci-seccomp-bpf-hook-debuginfo-0:1.2.6-1.module+el8.6.0+21266+3e24c7b3.aarch64",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:oci-seccomp-bpf-hook-debuginfo-0:1.2.6-1.module+el8.6.0+21266+3e24c7b3.ppc64le",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:oci-seccomp-bpf-hook-debuginfo-0:1.2.6-1.module+el8.6.0+21266+3e24c7b3.s390x",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:oci-seccomp-bpf-hook-debuginfo-0:1.2.6-1.module+el8.6.0+21266+3e24c7b3.x86_64",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:oci-seccomp-bpf-hook-debugsource-0:1.2.6-1.module+el8.6.0+21266+3e24c7b3.aarch64",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:oci-seccomp-bpf-hook-debugsource-0:1.2.6-1.module+el8.6.0+21266+3e24c7b3.ppc64le",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:oci-seccomp-bpf-hook-debugsource-0:1.2.6-1.module+el8.6.0+21266+3e24c7b3.s390x",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:oci-seccomp-bpf-hook-debugsource-0:1.2.6-1.module+el8.6.0+21266+3e24c7b3.x86_64",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:podman-2:4.2.0-2.module+el8.6.0+21674+8010760f.aarch64",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:podman-2:4.2.0-2.module+el8.6.0+21674+8010760f.ppc64le",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:podman-2:4.2.0-2.module+el8.6.0+21674+8010760f.s390x",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:podman-2:4.2.0-2.module+el8.6.0+21674+8010760f.src",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:podman-2:4.2.0-2.module+el8.6.0+21674+8010760f.x86_64",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:podman-catatonit-2:4.2.0-2.module+el8.6.0+21674+8010760f.aarch64",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:podman-catatonit-2:4.2.0-2.module+el8.6.0+21674+8010760f.ppc64le",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:podman-catatonit-2:4.2.0-2.module+el8.6.0+21674+8010760f.s390x",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:podman-catatonit-2:4.2.0-2.module+el8.6.0+21674+8010760f.x86_64",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:podman-catatonit-debuginfo-2:4.2.0-2.module+el8.6.0+21674+8010760f.aarch64",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:podman-catatonit-debuginfo-2:4.2.0-2.module+el8.6.0+21674+8010760f.ppc64le",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:podman-catatonit-debuginfo-2:4.2.0-2.module+el8.6.0+21674+8010760f.s390x",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:podman-catatonit-debuginfo-2:4.2.0-2.module+el8.6.0+21674+8010760f.x86_64",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:podman-debuginfo-2:4.2.0-2.module+el8.6.0+21674+8010760f.aarch64",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:podman-debuginfo-2:4.2.0-2.module+el8.6.0+21674+8010760f.ppc64le",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:podman-debuginfo-2:4.2.0-2.module+el8.6.0+21674+8010760f.s390x",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:podman-debuginfo-2:4.2.0-2.module+el8.6.0+21674+8010760f.x86_64",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:podman-debugsource-2:4.2.0-2.module+el8.6.0+21674+8010760f.aarch64",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:podman-debugsource-2:4.2.0-2.module+el8.6.0+21674+8010760f.ppc64le",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:podman-debugsource-2:4.2.0-2.module+el8.6.0+21674+8010760f.s390x",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:podman-debugsource-2:4.2.0-2.module+el8.6.0+21674+8010760f.x86_64",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:podman-docker-2:4.2.0-2.module+el8.6.0+21674+8010760f.noarch",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:podman-gvproxy-2:4.2.0-2.module+el8.6.0+21674+8010760f.aarch64",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:podman-gvproxy-2:4.2.0-2.module+el8.6.0+21674+8010760f.ppc64le",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:podman-gvproxy-2:4.2.0-2.module+el8.6.0+21674+8010760f.s390x",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:podman-gvproxy-2:4.2.0-2.module+el8.6.0+21674+8010760f.x86_64",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:podman-gvproxy-debuginfo-2:4.2.0-2.module+el8.6.0+21674+8010760f.aarch64",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:podman-gvproxy-debuginfo-2:4.2.0-2.module+el8.6.0+21674+8010760f.ppc64le",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:podman-gvproxy-debuginfo-2:4.2.0-2.module+el8.6.0+21674+8010760f.s390x",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:podman-gvproxy-debuginfo-2:4.2.0-2.module+el8.6.0+21674+8010760f.x86_64",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:podman-plugins-2:4.2.0-2.module+el8.6.0+21674+8010760f.aarch64",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:podman-plugins-2:4.2.0-2.module+el8.6.0+21674+8010760f.ppc64le",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:podman-plugins-2:4.2.0-2.module+el8.6.0+21674+8010760f.s390x",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:podman-plugins-2:4.2.0-2.module+el8.6.0+21674+8010760f.x86_64",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:podman-plugins-debuginfo-2:4.2.0-2.module+el8.6.0+21674+8010760f.aarch64",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:podman-plugins-debuginfo-2:4.2.0-2.module+el8.6.0+21674+8010760f.ppc64le",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:podman-plugins-debuginfo-2:4.2.0-2.module+el8.6.0+21674+8010760f.s390x",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:podman-plugins-debuginfo-2:4.2.0-2.module+el8.6.0+21674+8010760f.x86_64",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:podman-remote-2:4.2.0-2.module+el8.6.0+21674+8010760f.aarch64",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:podman-remote-2:4.2.0-2.module+el8.6.0+21674+8010760f.ppc64le",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:podman-remote-2:4.2.0-2.module+el8.6.0+21674+8010760f.s390x",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:podman-remote-2:4.2.0-2.module+el8.6.0+21674+8010760f.x86_64",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:podman-remote-debuginfo-2:4.2.0-2.module+el8.6.0+21674+8010760f.aarch64",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:podman-remote-debuginfo-2:4.2.0-2.module+el8.6.0+21674+8010760f.ppc64le",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:podman-remote-debuginfo-2:4.2.0-2.module+el8.6.0+21674+8010760f.s390x",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:podman-remote-debuginfo-2:4.2.0-2.module+el8.6.0+21674+8010760f.x86_64",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:podman-tests-2:4.2.0-2.module+el8.6.0+21674+8010760f.aarch64",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:podman-tests-2:4.2.0-2.module+el8.6.0+21674+8010760f.ppc64le",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:podman-tests-2:4.2.0-2.module+el8.6.0+21674+8010760f.s390x",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:podman-tests-2:4.2.0-2.module+el8.6.0+21674+8010760f.x86_64",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:python-podman-0:4.0.1-1.module+el8.6.0+21266+3e24c7b3.src",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:python3-criu-0:3.15-3.module+el8.6.0+21266+3e24c7b3.aarch64",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:python3-criu-0:3.15-3.module+el8.6.0+21266+3e24c7b3.ppc64le",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:python3-criu-0:3.15-3.module+el8.6.0+21266+3e24c7b3.s390x",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:python3-criu-0:3.15-3.module+el8.6.0+21266+3e24c7b3.x86_64",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:python3-podman-0:4.0.1-1.module+el8.6.0+21266+3e24c7b3.noarch",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:runc-1:1.1.12-1.module+el8.6.0+21266+3e24c7b3.aarch64",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:runc-1:1.1.12-1.module+el8.6.0+21266+3e24c7b3.ppc64le",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:runc-1:1.1.12-1.module+el8.6.0+21266+3e24c7b3.s390x",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:runc-1:1.1.12-1.module+el8.6.0+21266+3e24c7b3.src",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:runc-1:1.1.12-1.module+el8.6.0+21266+3e24c7b3.x86_64",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:runc-debuginfo-1:1.1.12-1.module+el8.6.0+21266+3e24c7b3.aarch64",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:runc-debuginfo-1:1.1.12-1.module+el8.6.0+21266+3e24c7b3.ppc64le",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:runc-debuginfo-1:1.1.12-1.module+el8.6.0+21266+3e24c7b3.s390x",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:runc-debuginfo-1:1.1.12-1.module+el8.6.0+21266+3e24c7b3.x86_64",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:runc-debugsource-1:1.1.12-1.module+el8.6.0+21266+3e24c7b3.aarch64",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:runc-debugsource-1:1.1.12-1.module+el8.6.0+21266+3e24c7b3.ppc64le",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:runc-debugsource-1:1.1.12-1.module+el8.6.0+21266+3e24c7b3.s390x",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:runc-debugsource-1:1.1.12-1.module+el8.6.0+21266+3e24c7b3.x86_64",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:skopeo-2:1.9.1-1.module+el8.6.0+21266+3e24c7b3.aarch64",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:skopeo-2:1.9.1-1.module+el8.6.0+21266+3e24c7b3.ppc64le",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:skopeo-2:1.9.1-1.module+el8.6.0+21266+3e24c7b3.s390x",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:skopeo-2:1.9.1-1.module+el8.6.0+21266+3e24c7b3.src",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:skopeo-2:1.9.1-1.module+el8.6.0+21266+3e24c7b3.x86_64",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:skopeo-debuginfo-2:1.9.1-1.module+el8.6.0+21266+3e24c7b3.aarch64",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:skopeo-debuginfo-2:1.9.1-1.module+el8.6.0+21266+3e24c7b3.ppc64le",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:skopeo-debuginfo-2:1.9.1-1.module+el8.6.0+21266+3e24c7b3.s390x",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:skopeo-debuginfo-2:1.9.1-1.module+el8.6.0+21266+3e24c7b3.x86_64",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:skopeo-debugsource-2:1.9.1-1.module+el8.6.0+21266+3e24c7b3.aarch64",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:skopeo-debugsource-2:1.9.1-1.module+el8.6.0+21266+3e24c7b3.ppc64le",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:skopeo-debugsource-2:1.9.1-1.module+el8.6.0+21266+3e24c7b3.s390x",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:skopeo-debugsource-2:1.9.1-1.module+el8.6.0+21266+3e24c7b3.x86_64",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:skopeo-tests-2:1.9.1-1.module+el8.6.0+21266+3e24c7b3.aarch64",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:skopeo-tests-2:1.9.1-1.module+el8.6.0+21266+3e24c7b3.ppc64le",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:skopeo-tests-2:1.9.1-1.module+el8.6.0+21266+3e24c7b3.s390x",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:skopeo-tests-2:1.9.1-1.module+el8.6.0+21266+3e24c7b3.x86_64",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:slirp4netns-0:1.2.0-3.module+el8.6.0+21266+3e24c7b3.aarch64",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:slirp4netns-0:1.2.0-3.module+el8.6.0+21266+3e24c7b3.ppc64le",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:slirp4netns-0:1.2.0-3.module+el8.6.0+21266+3e24c7b3.s390x",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:slirp4netns-0:1.2.0-3.module+el8.6.0+21266+3e24c7b3.src",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:slirp4netns-0:1.2.0-3.module+el8.6.0+21266+3e24c7b3.x86_64",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:slirp4netns-debuginfo-0:1.2.0-3.module+el8.6.0+21266+3e24c7b3.aarch64",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:slirp4netns-debuginfo-0:1.2.0-3.module+el8.6.0+21266+3e24c7b3.ppc64le",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:slirp4netns-debuginfo-0:1.2.0-3.module+el8.6.0+21266+3e24c7b3.s390x",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:slirp4netns-debuginfo-0:1.2.0-3.module+el8.6.0+21266+3e24c7b3.x86_64",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:slirp4netns-debugsource-0:1.2.0-3.module+el8.6.0+21266+3e24c7b3.aarch64",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:slirp4netns-debugsource-0:1.2.0-3.module+el8.6.0+21266+3e24c7b3.ppc64le",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:slirp4netns-debugsource-0:1.2.0-3.module+el8.6.0+21266+3e24c7b3.s390x",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:slirp4netns-debugsource-0:1.2.0-3.module+el8.6.0+21266+3e24c7b3.x86_64",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:toolbox-0:0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.aarch64",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:toolbox-0:0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.ppc64le",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:toolbox-0:0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.s390x",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:toolbox-0:0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.src",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:toolbox-0:0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.x86_64",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:toolbox-debuginfo-0:0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.aarch64",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:toolbox-debuginfo-0:0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.ppc64le",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:toolbox-debuginfo-0:0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.s390x",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:toolbox-debuginfo-0:0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.x86_64",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:toolbox-debugsource-0:0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.aarch64",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:toolbox-debugsource-0:0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.ppc64le",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:toolbox-debugsource-0:0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.s390x",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:toolbox-debugsource-0:0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.x86_64",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:toolbox-tests-0:0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.aarch64",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:toolbox-tests-0:0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.ppc64le",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:toolbox-tests-0:0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.s390x",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:toolbox-tests-0:0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.x86_64",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:udica-0:0.2.6-5.module+el8.6.0+21266+3e24c7b3.noarch",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:udica-0:0.2.6-5.module+el8.6.0+21266+3e24c7b3.src"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-32149"
},
{
"category": "external",
"summary": "RHBZ#2134010",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2134010"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-32149",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32149"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-32149",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-32149"
},
{
"category": "external",
"summary": "https://go.dev/issue/56152",
"url": "https://go.dev/issue/56152"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-dev/c/qfPIly0X7aU",
"url": "https://groups.google.com/g/golang-dev/c/qfPIly0X7aU"
}
],
"release_date": "2022-10-11T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-04-23T14:16:09+00:00",
"details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:aardvark-dns-2:1.0.1-40.module+el8.6.0+21266+3e24c7b3.aarch64",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:aardvark-dns-2:1.0.1-40.module+el8.6.0+21266+3e24c7b3.ppc64le",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:aardvark-dns-2:1.0.1-40.module+el8.6.0+21266+3e24c7b3.s390x",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:aardvark-dns-2:1.0.1-40.module+el8.6.0+21266+3e24c7b3.x86_64",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:buildah-1:1.26.2-1.module+el8.6.0+21266+3e24c7b3.aarch64",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:buildah-1:1.26.2-1.module+el8.6.0+21266+3e24c7b3.ppc64le",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:buildah-1:1.26.2-1.module+el8.6.0+21266+3e24c7b3.s390x",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:buildah-1:1.26.2-1.module+el8.6.0+21266+3e24c7b3.src",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:buildah-1:1.26.2-1.module+el8.6.0+21266+3e24c7b3.x86_64",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:buildah-debuginfo-1:1.26.2-1.module+el8.6.0+21266+3e24c7b3.aarch64",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:buildah-debuginfo-1:1.26.2-1.module+el8.6.0+21266+3e24c7b3.ppc64le",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:buildah-debuginfo-1:1.26.2-1.module+el8.6.0+21266+3e24c7b3.s390x",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:buildah-debuginfo-1:1.26.2-1.module+el8.6.0+21266+3e24c7b3.x86_64",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:buildah-debugsource-1:1.26.2-1.module+el8.6.0+21266+3e24c7b3.aarch64",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:buildah-debugsource-1:1.26.2-1.module+el8.6.0+21266+3e24c7b3.ppc64le",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:buildah-debugsource-1:1.26.2-1.module+el8.6.0+21266+3e24c7b3.s390x",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:buildah-debugsource-1:1.26.2-1.module+el8.6.0+21266+3e24c7b3.x86_64",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:buildah-tests-1:1.26.2-1.module+el8.6.0+21266+3e24c7b3.aarch64",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:buildah-tests-1:1.26.2-1.module+el8.6.0+21266+3e24c7b3.ppc64le",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:buildah-tests-1:1.26.2-1.module+el8.6.0+21266+3e24c7b3.s390x",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:buildah-tests-1:1.26.2-1.module+el8.6.0+21266+3e24c7b3.x86_64",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:buildah-tests-debuginfo-1:1.26.2-1.module+el8.6.0+21266+3e24c7b3.aarch64",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:buildah-tests-debuginfo-1:1.26.2-1.module+el8.6.0+21266+3e24c7b3.ppc64le",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:buildah-tests-debuginfo-1:1.26.2-1.module+el8.6.0+21266+3e24c7b3.s390x",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:buildah-tests-debuginfo-1:1.26.2-1.module+el8.6.0+21266+3e24c7b3.x86_64",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:cockpit-podman-0:49.1-1.module+el8.6.0+21266+3e24c7b3.noarch",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:cockpit-podman-0:49.1-1.module+el8.6.0+21266+3e24c7b3.src",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:conmon-2:2.1.4-1.module+el8.6.0+21266+3e24c7b3.aarch64",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:conmon-2:2.1.4-1.module+el8.6.0+21266+3e24c7b3.ppc64le",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:conmon-2:2.1.4-1.module+el8.6.0+21266+3e24c7b3.s390x",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:conmon-2:2.1.4-1.module+el8.6.0+21266+3e24c7b3.src",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:conmon-2:2.1.4-1.module+el8.6.0+21266+3e24c7b3.x86_64",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:conmon-debuginfo-2:2.1.4-1.module+el8.6.0+21266+3e24c7b3.aarch64",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:conmon-debuginfo-2:2.1.4-1.module+el8.6.0+21266+3e24c7b3.ppc64le",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:conmon-debuginfo-2:2.1.4-1.module+el8.6.0+21266+3e24c7b3.s390x",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:conmon-debuginfo-2:2.1.4-1.module+el8.6.0+21266+3e24c7b3.x86_64",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:conmon-debugsource-2:2.1.4-1.module+el8.6.0+21266+3e24c7b3.aarch64",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:conmon-debugsource-2:2.1.4-1.module+el8.6.0+21266+3e24c7b3.ppc64le",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:conmon-debugsource-2:2.1.4-1.module+el8.6.0+21266+3e24c7b3.s390x",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:conmon-debugsource-2:2.1.4-1.module+el8.6.0+21266+3e24c7b3.x86_64",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:container-selinux-2:2.189.0-1.module+el8.6.0+21266+3e24c7b3.noarch",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:container-selinux-2:2.189.0-1.module+el8.6.0+21266+3e24c7b3.src",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:containernetworking-plugins-1:1.1.1-4.module+el8.6.0+21266+3e24c7b3.aarch64",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:containernetworking-plugins-1:1.1.1-4.module+el8.6.0+21266+3e24c7b3.ppc64le",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:containernetworking-plugins-1:1.1.1-4.module+el8.6.0+21266+3e24c7b3.s390x",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:containernetworking-plugins-1:1.1.1-4.module+el8.6.0+21266+3e24c7b3.src",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:containernetworking-plugins-1:1.1.1-4.module+el8.6.0+21266+3e24c7b3.x86_64",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:containernetworking-plugins-debuginfo-1:1.1.1-4.module+el8.6.0+21266+3e24c7b3.aarch64",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:containernetworking-plugins-debuginfo-1:1.1.1-4.module+el8.6.0+21266+3e24c7b3.ppc64le",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:containernetworking-plugins-debuginfo-1:1.1.1-4.module+el8.6.0+21266+3e24c7b3.s390x",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:containernetworking-plugins-debuginfo-1:1.1.1-4.module+el8.6.0+21266+3e24c7b3.x86_64",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:containernetworking-plugins-debugsource-1:1.1.1-4.module+el8.6.0+21266+3e24c7b3.aarch64",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:containernetworking-plugins-debugsource-1:1.1.1-4.module+el8.6.0+21266+3e24c7b3.ppc64le",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:containernetworking-plugins-debugsource-1:1.1.1-4.module+el8.6.0+21266+3e24c7b3.s390x",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:containernetworking-plugins-debugsource-1:1.1.1-4.module+el8.6.0+21266+3e24c7b3.x86_64",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:containers-common-2:1-40.module+el8.6.0+21266+3e24c7b3.aarch64",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:containers-common-2:1-40.module+el8.6.0+21266+3e24c7b3.ppc64le",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:containers-common-2:1-40.module+el8.6.0+21266+3e24c7b3.s390x",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:containers-common-2:1-40.module+el8.6.0+21266+3e24c7b3.src",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:containers-common-2:1-40.module+el8.6.0+21266+3e24c7b3.x86_64",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:crit-0:3.15-3.module+el8.6.0+21266+3e24c7b3.aarch64",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:crit-0:3.15-3.module+el8.6.0+21266+3e24c7b3.ppc64le",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:crit-0:3.15-3.module+el8.6.0+21266+3e24c7b3.s390x",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:crit-0:3.15-3.module+el8.6.0+21266+3e24c7b3.x86_64",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:criu-0:3.15-3.module+el8.6.0+21266+3e24c7b3.aarch64",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:criu-0:3.15-3.module+el8.6.0+21266+3e24c7b3.ppc64le",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:criu-0:3.15-3.module+el8.6.0+21266+3e24c7b3.s390x",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:criu-0:3.15-3.module+el8.6.0+21266+3e24c7b3.src",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:criu-0:3.15-3.module+el8.6.0+21266+3e24c7b3.x86_64",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:criu-debuginfo-0:3.15-3.module+el8.6.0+21266+3e24c7b3.aarch64",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:criu-debuginfo-0:3.15-3.module+el8.6.0+21266+3e24c7b3.ppc64le",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:criu-debuginfo-0:3.15-3.module+el8.6.0+21266+3e24c7b3.s390x",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:criu-debuginfo-0:3.15-3.module+el8.6.0+21266+3e24c7b3.x86_64",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:criu-debugsource-0:3.15-3.module+el8.6.0+21266+3e24c7b3.aarch64",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:criu-debugsource-0:3.15-3.module+el8.6.0+21266+3e24c7b3.ppc64le",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:criu-debugsource-0:3.15-3.module+el8.6.0+21266+3e24c7b3.s390x",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:criu-debugsource-0:3.15-3.module+el8.6.0+21266+3e24c7b3.x86_64",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:criu-devel-0:3.15-3.module+el8.6.0+21266+3e24c7b3.aarch64",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:criu-devel-0:3.15-3.module+el8.6.0+21266+3e24c7b3.ppc64le",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:criu-devel-0:3.15-3.module+el8.6.0+21266+3e24c7b3.s390x",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:criu-devel-0:3.15-3.module+el8.6.0+21266+3e24c7b3.x86_64",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:criu-libs-0:3.15-3.module+el8.6.0+21266+3e24c7b3.aarch64",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:criu-libs-0:3.15-3.module+el8.6.0+21266+3e24c7b3.ppc64le",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:criu-libs-0:3.15-3.module+el8.6.0+21266+3e24c7b3.s390x",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:criu-libs-0:3.15-3.module+el8.6.0+21266+3e24c7b3.x86_64",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:criu-libs-debuginfo-0:3.15-3.module+el8.6.0+21266+3e24c7b3.aarch64",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:criu-libs-debuginfo-0:3.15-3.module+el8.6.0+21266+3e24c7b3.ppc64le",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:criu-libs-debuginfo-0:3.15-3.module+el8.6.0+21266+3e24c7b3.s390x",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:criu-libs-debuginfo-0:3.15-3.module+el8.6.0+21266+3e24c7b3.x86_64",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:crun-0:1.5-1.module+el8.6.0+21266+3e24c7b3.aarch64",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:crun-0:1.5-1.module+el8.6.0+21266+3e24c7b3.ppc64le",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:crun-0:1.5-1.module+el8.6.0+21266+3e24c7b3.s390x",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:crun-0:1.5-1.module+el8.6.0+21266+3e24c7b3.src",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:crun-0:1.5-1.module+el8.6.0+21266+3e24c7b3.x86_64",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:crun-debuginfo-0:1.5-1.module+el8.6.0+21266+3e24c7b3.aarch64",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:crun-debuginfo-0:1.5-1.module+el8.6.0+21266+3e24c7b3.ppc64le",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:crun-debuginfo-0:1.5-1.module+el8.6.0+21266+3e24c7b3.s390x",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:crun-debuginfo-0:1.5-1.module+el8.6.0+21266+3e24c7b3.x86_64",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:crun-debugsource-0:1.5-1.module+el8.6.0+21266+3e24c7b3.aarch64",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:crun-debugsource-0:1.5-1.module+el8.6.0+21266+3e24c7b3.ppc64le",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:crun-debugsource-0:1.5-1.module+el8.6.0+21266+3e24c7b3.s390x",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:crun-debugsource-0:1.5-1.module+el8.6.0+21266+3e24c7b3.x86_64",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:fuse-overlayfs-0:1.9-1.module+el8.6.0+21266+3e24c7b3.aarch64",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:fuse-overlayfs-0:1.9-1.module+el8.6.0+21266+3e24c7b3.ppc64le",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:fuse-overlayfs-0:1.9-1.module+el8.6.0+21266+3e24c7b3.s390x",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:fuse-overlayfs-0:1.9-1.module+el8.6.0+21266+3e24c7b3.src",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:fuse-overlayfs-0:1.9-1.module+el8.6.0+21266+3e24c7b3.x86_64",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:fuse-overlayfs-debuginfo-0:1.9-1.module+el8.6.0+21266+3e24c7b3.aarch64",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:fuse-overlayfs-debuginfo-0:1.9-1.module+el8.6.0+21266+3e24c7b3.ppc64le",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:fuse-overlayfs-debuginfo-0:1.9-1.module+el8.6.0+21266+3e24c7b3.s390x",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:fuse-overlayfs-debuginfo-0:1.9-1.module+el8.6.0+21266+3e24c7b3.x86_64",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:fuse-overlayfs-debugsource-0:1.9-1.module+el8.6.0+21266+3e24c7b3.aarch64",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:fuse-overlayfs-debugsource-0:1.9-1.module+el8.6.0+21266+3e24c7b3.ppc64le",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:fuse-overlayfs-debugsource-0:1.9-1.module+el8.6.0+21266+3e24c7b3.s390x",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:fuse-overlayfs-debugsource-0:1.9-1.module+el8.6.0+21266+3e24c7b3.x86_64",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:libslirp-0:4.4.0-1.module+el8.6.0+21266+3e24c7b3.aarch64",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:libslirp-0:4.4.0-1.module+el8.6.0+21266+3e24c7b3.ppc64le",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:libslirp-0:4.4.0-1.module+el8.6.0+21266+3e24c7b3.s390x",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:libslirp-0:4.4.0-1.module+el8.6.0+21266+3e24c7b3.src",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:libslirp-0:4.4.0-1.module+el8.6.0+21266+3e24c7b3.x86_64",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:libslirp-debuginfo-0:4.4.0-1.module+el8.6.0+21266+3e24c7b3.aarch64",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:libslirp-debuginfo-0:4.4.0-1.module+el8.6.0+21266+3e24c7b3.ppc64le",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:libslirp-debuginfo-0:4.4.0-1.module+el8.6.0+21266+3e24c7b3.s390x",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:libslirp-debuginfo-0:4.4.0-1.module+el8.6.0+21266+3e24c7b3.x86_64",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:libslirp-debugsource-0:4.4.0-1.module+el8.6.0+21266+3e24c7b3.aarch64",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:libslirp-debugsource-0:4.4.0-1.module+el8.6.0+21266+3e24c7b3.ppc64le",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:libslirp-debugsource-0:4.4.0-1.module+el8.6.0+21266+3e24c7b3.s390x",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:libslirp-debugsource-0:4.4.0-1.module+el8.6.0+21266+3e24c7b3.x86_64",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:libslirp-devel-0:4.4.0-1.module+el8.6.0+21266+3e24c7b3.aarch64",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:libslirp-devel-0:4.4.0-1.module+el8.6.0+21266+3e24c7b3.ppc64le",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:libslirp-devel-0:4.4.0-1.module+el8.6.0+21266+3e24c7b3.s390x",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:libslirp-devel-0:4.4.0-1.module+el8.6.0+21266+3e24c7b3.x86_64",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:netavark-2:1.0.1-40.module+el8.6.0+21266+3e24c7b3.aarch64",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:netavark-2:1.0.1-40.module+el8.6.0+21266+3e24c7b3.ppc64le",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:netavark-2:1.0.1-40.module+el8.6.0+21266+3e24c7b3.s390x",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:netavark-2:1.0.1-40.module+el8.6.0+21266+3e24c7b3.x86_64",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:oci-seccomp-bpf-hook-0:1.2.6-1.module+el8.6.0+21266+3e24c7b3.aarch64",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:oci-seccomp-bpf-hook-0:1.2.6-1.module+el8.6.0+21266+3e24c7b3.ppc64le",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:oci-seccomp-bpf-hook-0:1.2.6-1.module+el8.6.0+21266+3e24c7b3.s390x",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:oci-seccomp-bpf-hook-0:1.2.6-1.module+el8.6.0+21266+3e24c7b3.src",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:oci-seccomp-bpf-hook-0:1.2.6-1.module+el8.6.0+21266+3e24c7b3.x86_64",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:oci-seccomp-bpf-hook-debuginfo-0:1.2.6-1.module+el8.6.0+21266+3e24c7b3.aarch64",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:oci-seccomp-bpf-hook-debuginfo-0:1.2.6-1.module+el8.6.0+21266+3e24c7b3.ppc64le",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:oci-seccomp-bpf-hook-debuginfo-0:1.2.6-1.module+el8.6.0+21266+3e24c7b3.s390x",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:oci-seccomp-bpf-hook-debuginfo-0:1.2.6-1.module+el8.6.0+21266+3e24c7b3.x86_64",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:oci-seccomp-bpf-hook-debugsource-0:1.2.6-1.module+el8.6.0+21266+3e24c7b3.aarch64",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:oci-seccomp-bpf-hook-debugsource-0:1.2.6-1.module+el8.6.0+21266+3e24c7b3.ppc64le",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:oci-seccomp-bpf-hook-debugsource-0:1.2.6-1.module+el8.6.0+21266+3e24c7b3.s390x",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:oci-seccomp-bpf-hook-debugsource-0:1.2.6-1.module+el8.6.0+21266+3e24c7b3.x86_64",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:podman-2:4.2.0-2.module+el8.6.0+21674+8010760f.aarch64",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:podman-2:4.2.0-2.module+el8.6.0+21674+8010760f.ppc64le",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:podman-2:4.2.0-2.module+el8.6.0+21674+8010760f.s390x",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:podman-2:4.2.0-2.module+el8.6.0+21674+8010760f.src",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:podman-2:4.2.0-2.module+el8.6.0+21674+8010760f.x86_64",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:podman-catatonit-2:4.2.0-2.module+el8.6.0+21674+8010760f.aarch64",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:podman-catatonit-2:4.2.0-2.module+el8.6.0+21674+8010760f.ppc64le",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:podman-catatonit-2:4.2.0-2.module+el8.6.0+21674+8010760f.s390x",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:podman-catatonit-2:4.2.0-2.module+el8.6.0+21674+8010760f.x86_64",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:podman-catatonit-debuginfo-2:4.2.0-2.module+el8.6.0+21674+8010760f.aarch64",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:podman-catatonit-debuginfo-2:4.2.0-2.module+el8.6.0+21674+8010760f.ppc64le",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:podman-catatonit-debuginfo-2:4.2.0-2.module+el8.6.0+21674+8010760f.s390x",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:podman-catatonit-debuginfo-2:4.2.0-2.module+el8.6.0+21674+8010760f.x86_64",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:podman-debuginfo-2:4.2.0-2.module+el8.6.0+21674+8010760f.aarch64",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:podman-debuginfo-2:4.2.0-2.module+el8.6.0+21674+8010760f.ppc64le",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:podman-debuginfo-2:4.2.0-2.module+el8.6.0+21674+8010760f.s390x",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:podman-debuginfo-2:4.2.0-2.module+el8.6.0+21674+8010760f.x86_64",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:podman-debugsource-2:4.2.0-2.module+el8.6.0+21674+8010760f.aarch64",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:podman-debugsource-2:4.2.0-2.module+el8.6.0+21674+8010760f.ppc64le",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:podman-debugsource-2:4.2.0-2.module+el8.6.0+21674+8010760f.s390x",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:podman-debugsource-2:4.2.0-2.module+el8.6.0+21674+8010760f.x86_64",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:podman-docker-2:4.2.0-2.module+el8.6.0+21674+8010760f.noarch",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:podman-gvproxy-2:4.2.0-2.module+el8.6.0+21674+8010760f.aarch64",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:podman-gvproxy-2:4.2.0-2.module+el8.6.0+21674+8010760f.ppc64le",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:podman-gvproxy-2:4.2.0-2.module+el8.6.0+21674+8010760f.s390x",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:podman-gvproxy-2:4.2.0-2.module+el8.6.0+21674+8010760f.x86_64",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:podman-gvproxy-debuginfo-2:4.2.0-2.module+el8.6.0+21674+8010760f.aarch64",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:podman-gvproxy-debuginfo-2:4.2.0-2.module+el8.6.0+21674+8010760f.ppc64le",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:podman-gvproxy-debuginfo-2:4.2.0-2.module+el8.6.0+21674+8010760f.s390x",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:podman-gvproxy-debuginfo-2:4.2.0-2.module+el8.6.0+21674+8010760f.x86_64",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:podman-plugins-2:4.2.0-2.module+el8.6.0+21674+8010760f.aarch64",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:podman-plugins-2:4.2.0-2.module+el8.6.0+21674+8010760f.ppc64le",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:podman-plugins-2:4.2.0-2.module+el8.6.0+21674+8010760f.s390x",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:podman-plugins-2:4.2.0-2.module+el8.6.0+21674+8010760f.x86_64",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:podman-plugins-debuginfo-2:4.2.0-2.module+el8.6.0+21674+8010760f.aarch64",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:podman-plugins-debuginfo-2:4.2.0-2.module+el8.6.0+21674+8010760f.ppc64le",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:podman-plugins-debuginfo-2:4.2.0-2.module+el8.6.0+21674+8010760f.s390x",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:podman-plugins-debuginfo-2:4.2.0-2.module+el8.6.0+21674+8010760f.x86_64",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:podman-remote-2:4.2.0-2.module+el8.6.0+21674+8010760f.aarch64",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:podman-remote-2:4.2.0-2.module+el8.6.0+21674+8010760f.ppc64le",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:podman-remote-2:4.2.0-2.module+el8.6.0+21674+8010760f.s390x",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:podman-remote-2:4.2.0-2.module+el8.6.0+21674+8010760f.x86_64",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:podman-remote-debuginfo-2:4.2.0-2.module+el8.6.0+21674+8010760f.aarch64",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:podman-remote-debuginfo-2:4.2.0-2.module+el8.6.0+21674+8010760f.ppc64le",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:podman-remote-debuginfo-2:4.2.0-2.module+el8.6.0+21674+8010760f.s390x",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:podman-remote-debuginfo-2:4.2.0-2.module+el8.6.0+21674+8010760f.x86_64",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:podman-tests-2:4.2.0-2.module+el8.6.0+21674+8010760f.aarch64",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:podman-tests-2:4.2.0-2.module+el8.6.0+21674+8010760f.ppc64le",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:podman-tests-2:4.2.0-2.module+el8.6.0+21674+8010760f.s390x",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:podman-tests-2:4.2.0-2.module+el8.6.0+21674+8010760f.x86_64",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:python-podman-0:4.0.1-1.module+el8.6.0+21266+3e24c7b3.src",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:python3-criu-0:3.15-3.module+el8.6.0+21266+3e24c7b3.aarch64",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:python3-criu-0:3.15-3.module+el8.6.0+21266+3e24c7b3.ppc64le",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:python3-criu-0:3.15-3.module+el8.6.0+21266+3e24c7b3.s390x",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:python3-criu-0:3.15-3.module+el8.6.0+21266+3e24c7b3.x86_64",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:python3-podman-0:4.0.1-1.module+el8.6.0+21266+3e24c7b3.noarch",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:runc-1:1.1.12-1.module+el8.6.0+21266+3e24c7b3.aarch64",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:runc-1:1.1.12-1.module+el8.6.0+21266+3e24c7b3.ppc64le",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:runc-1:1.1.12-1.module+el8.6.0+21266+3e24c7b3.s390x",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:runc-1:1.1.12-1.module+el8.6.0+21266+3e24c7b3.src",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:runc-1:1.1.12-1.module+el8.6.0+21266+3e24c7b3.x86_64",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:runc-debuginfo-1:1.1.12-1.module+el8.6.0+21266+3e24c7b3.aarch64",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:runc-debuginfo-1:1.1.12-1.module+el8.6.0+21266+3e24c7b3.ppc64le",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:runc-debuginfo-1:1.1.12-1.module+el8.6.0+21266+3e24c7b3.s390x",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:runc-debuginfo-1:1.1.12-1.module+el8.6.0+21266+3e24c7b3.x86_64",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:runc-debugsource-1:1.1.12-1.module+el8.6.0+21266+3e24c7b3.aarch64",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:runc-debugsource-1:1.1.12-1.module+el8.6.0+21266+3e24c7b3.ppc64le",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:runc-debugsource-1:1.1.12-1.module+el8.6.0+21266+3e24c7b3.s390x",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:runc-debugsource-1:1.1.12-1.module+el8.6.0+21266+3e24c7b3.x86_64",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:skopeo-2:1.9.1-1.module+el8.6.0+21266+3e24c7b3.aarch64",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:skopeo-2:1.9.1-1.module+el8.6.0+21266+3e24c7b3.ppc64le",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:skopeo-2:1.9.1-1.module+el8.6.0+21266+3e24c7b3.s390x",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:skopeo-2:1.9.1-1.module+el8.6.0+21266+3e24c7b3.src",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:skopeo-2:1.9.1-1.module+el8.6.0+21266+3e24c7b3.x86_64",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:skopeo-debuginfo-2:1.9.1-1.module+el8.6.0+21266+3e24c7b3.aarch64",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:skopeo-debuginfo-2:1.9.1-1.module+el8.6.0+21266+3e24c7b3.ppc64le",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:skopeo-debuginfo-2:1.9.1-1.module+el8.6.0+21266+3e24c7b3.s390x",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:skopeo-debuginfo-2:1.9.1-1.module+el8.6.0+21266+3e24c7b3.x86_64",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:skopeo-debugsource-2:1.9.1-1.module+el8.6.0+21266+3e24c7b3.aarch64",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:skopeo-debugsource-2:1.9.1-1.module+el8.6.0+21266+3e24c7b3.ppc64le",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:skopeo-debugsource-2:1.9.1-1.module+el8.6.0+21266+3e24c7b3.s390x",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:skopeo-debugsource-2:1.9.1-1.module+el8.6.0+21266+3e24c7b3.x86_64",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:skopeo-tests-2:1.9.1-1.module+el8.6.0+21266+3e24c7b3.aarch64",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:skopeo-tests-2:1.9.1-1.module+el8.6.0+21266+3e24c7b3.ppc64le",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:skopeo-tests-2:1.9.1-1.module+el8.6.0+21266+3e24c7b3.s390x",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:skopeo-tests-2:1.9.1-1.module+el8.6.0+21266+3e24c7b3.x86_64",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:slirp4netns-0:1.2.0-3.module+el8.6.0+21266+3e24c7b3.aarch64",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:slirp4netns-0:1.2.0-3.module+el8.6.0+21266+3e24c7b3.ppc64le",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:slirp4netns-0:1.2.0-3.module+el8.6.0+21266+3e24c7b3.s390x",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:slirp4netns-0:1.2.0-3.module+el8.6.0+21266+3e24c7b3.src",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:slirp4netns-0:1.2.0-3.module+el8.6.0+21266+3e24c7b3.x86_64",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:slirp4netns-debuginfo-0:1.2.0-3.module+el8.6.0+21266+3e24c7b3.aarch64",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:slirp4netns-debuginfo-0:1.2.0-3.module+el8.6.0+21266+3e24c7b3.ppc64le",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:slirp4netns-debuginfo-0:1.2.0-3.module+el8.6.0+21266+3e24c7b3.s390x",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:slirp4netns-debuginfo-0:1.2.0-3.module+el8.6.0+21266+3e24c7b3.x86_64",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:slirp4netns-debugsource-0:1.2.0-3.module+el8.6.0+21266+3e24c7b3.aarch64",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:slirp4netns-debugsource-0:1.2.0-3.module+el8.6.0+21266+3e24c7b3.ppc64le",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:slirp4netns-debugsource-0:1.2.0-3.module+el8.6.0+21266+3e24c7b3.s390x",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:slirp4netns-debugsource-0:1.2.0-3.module+el8.6.0+21266+3e24c7b3.x86_64",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:toolbox-0:0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.aarch64",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:toolbox-0:0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.ppc64le",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:toolbox-0:0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.s390x",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:toolbox-0:0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.src",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:toolbox-0:0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.x86_64",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:toolbox-debuginfo-0:0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.aarch64",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:toolbox-debuginfo-0:0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.ppc64le",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:toolbox-debuginfo-0:0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.s390x",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:toolbox-debuginfo-0:0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.x86_64",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:toolbox-debugsource-0:0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.aarch64",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:toolbox-debugsource-0:0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.ppc64le",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:toolbox-debugsource-0:0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.s390x",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:toolbox-debugsource-0:0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.x86_64",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:toolbox-tests-0:0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.aarch64",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:toolbox-tests-0:0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.ppc64le",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:toolbox-tests-0:0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.s390x",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:toolbox-tests-0:0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.x86_64",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:udica-0:0.2.6-5.module+el8.6.0+21266+3e24c7b3.noarch",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:udica-0:0.2.6-5.module+el8.6.0+21266+3e24c7b3.src"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:1994"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:aardvark-dns-2:1.0.1-40.module+el8.6.0+21266+3e24c7b3.aarch64",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:aardvark-dns-2:1.0.1-40.module+el8.6.0+21266+3e24c7b3.ppc64le",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:aardvark-dns-2:1.0.1-40.module+el8.6.0+21266+3e24c7b3.s390x",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:aardvark-dns-2:1.0.1-40.module+el8.6.0+21266+3e24c7b3.x86_64",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:buildah-1:1.26.2-1.module+el8.6.0+21266+3e24c7b3.aarch64",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:buildah-1:1.26.2-1.module+el8.6.0+21266+3e24c7b3.ppc64le",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:buildah-1:1.26.2-1.module+el8.6.0+21266+3e24c7b3.s390x",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:buildah-1:1.26.2-1.module+el8.6.0+21266+3e24c7b3.src",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:buildah-1:1.26.2-1.module+el8.6.0+21266+3e24c7b3.x86_64",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:buildah-debuginfo-1:1.26.2-1.module+el8.6.0+21266+3e24c7b3.aarch64",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:buildah-debuginfo-1:1.26.2-1.module+el8.6.0+21266+3e24c7b3.ppc64le",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:buildah-debuginfo-1:1.26.2-1.module+el8.6.0+21266+3e24c7b3.s390x",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:buildah-debuginfo-1:1.26.2-1.module+el8.6.0+21266+3e24c7b3.x86_64",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:buildah-debugsource-1:1.26.2-1.module+el8.6.0+21266+3e24c7b3.aarch64",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:buildah-debugsource-1:1.26.2-1.module+el8.6.0+21266+3e24c7b3.ppc64le",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:buildah-debugsource-1:1.26.2-1.module+el8.6.0+21266+3e24c7b3.s390x",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:buildah-debugsource-1:1.26.2-1.module+el8.6.0+21266+3e24c7b3.x86_64",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:buildah-tests-1:1.26.2-1.module+el8.6.0+21266+3e24c7b3.aarch64",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:buildah-tests-1:1.26.2-1.module+el8.6.0+21266+3e24c7b3.ppc64le",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:buildah-tests-1:1.26.2-1.module+el8.6.0+21266+3e24c7b3.s390x",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:buildah-tests-1:1.26.2-1.module+el8.6.0+21266+3e24c7b3.x86_64",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:buildah-tests-debuginfo-1:1.26.2-1.module+el8.6.0+21266+3e24c7b3.aarch64",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:buildah-tests-debuginfo-1:1.26.2-1.module+el8.6.0+21266+3e24c7b3.ppc64le",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:buildah-tests-debuginfo-1:1.26.2-1.module+el8.6.0+21266+3e24c7b3.s390x",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:buildah-tests-debuginfo-1:1.26.2-1.module+el8.6.0+21266+3e24c7b3.x86_64",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:cockpit-podman-0:49.1-1.module+el8.6.0+21266+3e24c7b3.noarch",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:cockpit-podman-0:49.1-1.module+el8.6.0+21266+3e24c7b3.src",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:conmon-2:2.1.4-1.module+el8.6.0+21266+3e24c7b3.aarch64",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:conmon-2:2.1.4-1.module+el8.6.0+21266+3e24c7b3.ppc64le",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:conmon-2:2.1.4-1.module+el8.6.0+21266+3e24c7b3.s390x",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:conmon-2:2.1.4-1.module+el8.6.0+21266+3e24c7b3.src",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:conmon-2:2.1.4-1.module+el8.6.0+21266+3e24c7b3.x86_64",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:conmon-debuginfo-2:2.1.4-1.module+el8.6.0+21266+3e24c7b3.aarch64",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:conmon-debuginfo-2:2.1.4-1.module+el8.6.0+21266+3e24c7b3.ppc64le",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:conmon-debuginfo-2:2.1.4-1.module+el8.6.0+21266+3e24c7b3.s390x",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:conmon-debuginfo-2:2.1.4-1.module+el8.6.0+21266+3e24c7b3.x86_64",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:conmon-debugsource-2:2.1.4-1.module+el8.6.0+21266+3e24c7b3.aarch64",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:conmon-debugsource-2:2.1.4-1.module+el8.6.0+21266+3e24c7b3.ppc64le",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:conmon-debugsource-2:2.1.4-1.module+el8.6.0+21266+3e24c7b3.s390x",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:conmon-debugsource-2:2.1.4-1.module+el8.6.0+21266+3e24c7b3.x86_64",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:container-selinux-2:2.189.0-1.module+el8.6.0+21266+3e24c7b3.noarch",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:container-selinux-2:2.189.0-1.module+el8.6.0+21266+3e24c7b3.src",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:containernetworking-plugins-1:1.1.1-4.module+el8.6.0+21266+3e24c7b3.aarch64",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:containernetworking-plugins-1:1.1.1-4.module+el8.6.0+21266+3e24c7b3.ppc64le",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:containernetworking-plugins-1:1.1.1-4.module+el8.6.0+21266+3e24c7b3.s390x",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:containernetworking-plugins-1:1.1.1-4.module+el8.6.0+21266+3e24c7b3.src",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:containernetworking-plugins-1:1.1.1-4.module+el8.6.0+21266+3e24c7b3.x86_64",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:containernetworking-plugins-debuginfo-1:1.1.1-4.module+el8.6.0+21266+3e24c7b3.aarch64",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:containernetworking-plugins-debuginfo-1:1.1.1-4.module+el8.6.0+21266+3e24c7b3.ppc64le",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:containernetworking-plugins-debuginfo-1:1.1.1-4.module+el8.6.0+21266+3e24c7b3.s390x",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:containernetworking-plugins-debuginfo-1:1.1.1-4.module+el8.6.0+21266+3e24c7b3.x86_64",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:containernetworking-plugins-debugsource-1:1.1.1-4.module+el8.6.0+21266+3e24c7b3.aarch64",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:containernetworking-plugins-debugsource-1:1.1.1-4.module+el8.6.0+21266+3e24c7b3.ppc64le",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:containernetworking-plugins-debugsource-1:1.1.1-4.module+el8.6.0+21266+3e24c7b3.s390x",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:containernetworking-plugins-debugsource-1:1.1.1-4.module+el8.6.0+21266+3e24c7b3.x86_64",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:containers-common-2:1-40.module+el8.6.0+21266+3e24c7b3.aarch64",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:containers-common-2:1-40.module+el8.6.0+21266+3e24c7b3.ppc64le",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:containers-common-2:1-40.module+el8.6.0+21266+3e24c7b3.s390x",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:containers-common-2:1-40.module+el8.6.0+21266+3e24c7b3.src",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:containers-common-2:1-40.module+el8.6.0+21266+3e24c7b3.x86_64",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:crit-0:3.15-3.module+el8.6.0+21266+3e24c7b3.aarch64",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:crit-0:3.15-3.module+el8.6.0+21266+3e24c7b3.ppc64le",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:crit-0:3.15-3.module+el8.6.0+21266+3e24c7b3.s390x",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:crit-0:3.15-3.module+el8.6.0+21266+3e24c7b3.x86_64",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:criu-0:3.15-3.module+el8.6.0+21266+3e24c7b3.aarch64",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:criu-0:3.15-3.module+el8.6.0+21266+3e24c7b3.ppc64le",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:criu-0:3.15-3.module+el8.6.0+21266+3e24c7b3.s390x",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:criu-0:3.15-3.module+el8.6.0+21266+3e24c7b3.src",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:criu-0:3.15-3.module+el8.6.0+21266+3e24c7b3.x86_64",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:criu-debuginfo-0:3.15-3.module+el8.6.0+21266+3e24c7b3.aarch64",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:criu-debuginfo-0:3.15-3.module+el8.6.0+21266+3e24c7b3.ppc64le",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:criu-debuginfo-0:3.15-3.module+el8.6.0+21266+3e24c7b3.s390x",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:criu-debuginfo-0:3.15-3.module+el8.6.0+21266+3e24c7b3.x86_64",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:criu-debugsource-0:3.15-3.module+el8.6.0+21266+3e24c7b3.aarch64",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:criu-debugsource-0:3.15-3.module+el8.6.0+21266+3e24c7b3.ppc64le",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:criu-debugsource-0:3.15-3.module+el8.6.0+21266+3e24c7b3.s390x",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:criu-debugsource-0:3.15-3.module+el8.6.0+21266+3e24c7b3.x86_64",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:criu-devel-0:3.15-3.module+el8.6.0+21266+3e24c7b3.aarch64",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:criu-devel-0:3.15-3.module+el8.6.0+21266+3e24c7b3.ppc64le",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:criu-devel-0:3.15-3.module+el8.6.0+21266+3e24c7b3.s390x",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:criu-devel-0:3.15-3.module+el8.6.0+21266+3e24c7b3.x86_64",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:criu-libs-0:3.15-3.module+el8.6.0+21266+3e24c7b3.aarch64",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:criu-libs-0:3.15-3.module+el8.6.0+21266+3e24c7b3.ppc64le",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:criu-libs-0:3.15-3.module+el8.6.0+21266+3e24c7b3.s390x",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:criu-libs-0:3.15-3.module+el8.6.0+21266+3e24c7b3.x86_64",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:criu-libs-debuginfo-0:3.15-3.module+el8.6.0+21266+3e24c7b3.aarch64",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:criu-libs-debuginfo-0:3.15-3.module+el8.6.0+21266+3e24c7b3.ppc64le",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:criu-libs-debuginfo-0:3.15-3.module+el8.6.0+21266+3e24c7b3.s390x",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:criu-libs-debuginfo-0:3.15-3.module+el8.6.0+21266+3e24c7b3.x86_64",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:crun-0:1.5-1.module+el8.6.0+21266+3e24c7b3.aarch64",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:crun-0:1.5-1.module+el8.6.0+21266+3e24c7b3.ppc64le",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:crun-0:1.5-1.module+el8.6.0+21266+3e24c7b3.s390x",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:crun-0:1.5-1.module+el8.6.0+21266+3e24c7b3.src",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:crun-0:1.5-1.module+el8.6.0+21266+3e24c7b3.x86_64",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:crun-debuginfo-0:1.5-1.module+el8.6.0+21266+3e24c7b3.aarch64",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:crun-debuginfo-0:1.5-1.module+el8.6.0+21266+3e24c7b3.ppc64le",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:crun-debuginfo-0:1.5-1.module+el8.6.0+21266+3e24c7b3.s390x",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:crun-debuginfo-0:1.5-1.module+el8.6.0+21266+3e24c7b3.x86_64",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:crun-debugsource-0:1.5-1.module+el8.6.0+21266+3e24c7b3.aarch64",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:crun-debugsource-0:1.5-1.module+el8.6.0+21266+3e24c7b3.ppc64le",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:crun-debugsource-0:1.5-1.module+el8.6.0+21266+3e24c7b3.s390x",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:crun-debugsource-0:1.5-1.module+el8.6.0+21266+3e24c7b3.x86_64",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:fuse-overlayfs-0:1.9-1.module+el8.6.0+21266+3e24c7b3.aarch64",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:fuse-overlayfs-0:1.9-1.module+el8.6.0+21266+3e24c7b3.ppc64le",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:fuse-overlayfs-0:1.9-1.module+el8.6.0+21266+3e24c7b3.s390x",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:fuse-overlayfs-0:1.9-1.module+el8.6.0+21266+3e24c7b3.src",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:fuse-overlayfs-0:1.9-1.module+el8.6.0+21266+3e24c7b3.x86_64",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:fuse-overlayfs-debuginfo-0:1.9-1.module+el8.6.0+21266+3e24c7b3.aarch64",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:fuse-overlayfs-debuginfo-0:1.9-1.module+el8.6.0+21266+3e24c7b3.ppc64le",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:fuse-overlayfs-debuginfo-0:1.9-1.module+el8.6.0+21266+3e24c7b3.s390x",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:fuse-overlayfs-debuginfo-0:1.9-1.module+el8.6.0+21266+3e24c7b3.x86_64",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:fuse-overlayfs-debugsource-0:1.9-1.module+el8.6.0+21266+3e24c7b3.aarch64",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:fuse-overlayfs-debugsource-0:1.9-1.module+el8.6.0+21266+3e24c7b3.ppc64le",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:fuse-overlayfs-debugsource-0:1.9-1.module+el8.6.0+21266+3e24c7b3.s390x",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:fuse-overlayfs-debugsource-0:1.9-1.module+el8.6.0+21266+3e24c7b3.x86_64",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:libslirp-0:4.4.0-1.module+el8.6.0+21266+3e24c7b3.aarch64",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:libslirp-0:4.4.0-1.module+el8.6.0+21266+3e24c7b3.ppc64le",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:libslirp-0:4.4.0-1.module+el8.6.0+21266+3e24c7b3.s390x",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:libslirp-0:4.4.0-1.module+el8.6.0+21266+3e24c7b3.src",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:libslirp-0:4.4.0-1.module+el8.6.0+21266+3e24c7b3.x86_64",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:libslirp-debuginfo-0:4.4.0-1.module+el8.6.0+21266+3e24c7b3.aarch64",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:libslirp-debuginfo-0:4.4.0-1.module+el8.6.0+21266+3e24c7b3.ppc64le",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:libslirp-debuginfo-0:4.4.0-1.module+el8.6.0+21266+3e24c7b3.s390x",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:libslirp-debuginfo-0:4.4.0-1.module+el8.6.0+21266+3e24c7b3.x86_64",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:libslirp-debugsource-0:4.4.0-1.module+el8.6.0+21266+3e24c7b3.aarch64",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:libslirp-debugsource-0:4.4.0-1.module+el8.6.0+21266+3e24c7b3.ppc64le",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:libslirp-debugsource-0:4.4.0-1.module+el8.6.0+21266+3e24c7b3.s390x",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:libslirp-debugsource-0:4.4.0-1.module+el8.6.0+21266+3e24c7b3.x86_64",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:libslirp-devel-0:4.4.0-1.module+el8.6.0+21266+3e24c7b3.aarch64",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:libslirp-devel-0:4.4.0-1.module+el8.6.0+21266+3e24c7b3.ppc64le",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:libslirp-devel-0:4.4.0-1.module+el8.6.0+21266+3e24c7b3.s390x",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:libslirp-devel-0:4.4.0-1.module+el8.6.0+21266+3e24c7b3.x86_64",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:netavark-2:1.0.1-40.module+el8.6.0+21266+3e24c7b3.aarch64",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:netavark-2:1.0.1-40.module+el8.6.0+21266+3e24c7b3.ppc64le",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:netavark-2:1.0.1-40.module+el8.6.0+21266+3e24c7b3.s390x",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:netavark-2:1.0.1-40.module+el8.6.0+21266+3e24c7b3.x86_64",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:oci-seccomp-bpf-hook-0:1.2.6-1.module+el8.6.0+21266+3e24c7b3.aarch64",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:oci-seccomp-bpf-hook-0:1.2.6-1.module+el8.6.0+21266+3e24c7b3.ppc64le",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:oci-seccomp-bpf-hook-0:1.2.6-1.module+el8.6.0+21266+3e24c7b3.s390x",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:oci-seccomp-bpf-hook-0:1.2.6-1.module+el8.6.0+21266+3e24c7b3.src",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:oci-seccomp-bpf-hook-0:1.2.6-1.module+el8.6.0+21266+3e24c7b3.x86_64",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:oci-seccomp-bpf-hook-debuginfo-0:1.2.6-1.module+el8.6.0+21266+3e24c7b3.aarch64",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:oci-seccomp-bpf-hook-debuginfo-0:1.2.6-1.module+el8.6.0+21266+3e24c7b3.ppc64le",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:oci-seccomp-bpf-hook-debuginfo-0:1.2.6-1.module+el8.6.0+21266+3e24c7b3.s390x",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:oci-seccomp-bpf-hook-debuginfo-0:1.2.6-1.module+el8.6.0+21266+3e24c7b3.x86_64",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:oci-seccomp-bpf-hook-debugsource-0:1.2.6-1.module+el8.6.0+21266+3e24c7b3.aarch64",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:oci-seccomp-bpf-hook-debugsource-0:1.2.6-1.module+el8.6.0+21266+3e24c7b3.ppc64le",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:oci-seccomp-bpf-hook-debugsource-0:1.2.6-1.module+el8.6.0+21266+3e24c7b3.s390x",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:oci-seccomp-bpf-hook-debugsource-0:1.2.6-1.module+el8.6.0+21266+3e24c7b3.x86_64",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:podman-2:4.2.0-2.module+el8.6.0+21674+8010760f.aarch64",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:podman-2:4.2.0-2.module+el8.6.0+21674+8010760f.ppc64le",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:podman-2:4.2.0-2.module+el8.6.0+21674+8010760f.s390x",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:podman-2:4.2.0-2.module+el8.6.0+21674+8010760f.src",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:podman-2:4.2.0-2.module+el8.6.0+21674+8010760f.x86_64",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:podman-catatonit-2:4.2.0-2.module+el8.6.0+21674+8010760f.aarch64",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:podman-catatonit-2:4.2.0-2.module+el8.6.0+21674+8010760f.ppc64le",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:podman-catatonit-2:4.2.0-2.module+el8.6.0+21674+8010760f.s390x",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:podman-catatonit-2:4.2.0-2.module+el8.6.0+21674+8010760f.x86_64",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:podman-catatonit-debuginfo-2:4.2.0-2.module+el8.6.0+21674+8010760f.aarch64",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:podman-catatonit-debuginfo-2:4.2.0-2.module+el8.6.0+21674+8010760f.ppc64le",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:podman-catatonit-debuginfo-2:4.2.0-2.module+el8.6.0+21674+8010760f.s390x",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:podman-catatonit-debuginfo-2:4.2.0-2.module+el8.6.0+21674+8010760f.x86_64",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:podman-debuginfo-2:4.2.0-2.module+el8.6.0+21674+8010760f.aarch64",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:podman-debuginfo-2:4.2.0-2.module+el8.6.0+21674+8010760f.ppc64le",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:podman-debuginfo-2:4.2.0-2.module+el8.6.0+21674+8010760f.s390x",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:podman-debuginfo-2:4.2.0-2.module+el8.6.0+21674+8010760f.x86_64",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:podman-debugsource-2:4.2.0-2.module+el8.6.0+21674+8010760f.aarch64",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:podman-debugsource-2:4.2.0-2.module+el8.6.0+21674+8010760f.ppc64le",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:podman-debugsource-2:4.2.0-2.module+el8.6.0+21674+8010760f.s390x",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:podman-debugsource-2:4.2.0-2.module+el8.6.0+21674+8010760f.x86_64",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:podman-docker-2:4.2.0-2.module+el8.6.0+21674+8010760f.noarch",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:podman-gvproxy-2:4.2.0-2.module+el8.6.0+21674+8010760f.aarch64",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:podman-gvproxy-2:4.2.0-2.module+el8.6.0+21674+8010760f.ppc64le",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:podman-gvproxy-2:4.2.0-2.module+el8.6.0+21674+8010760f.s390x",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:podman-gvproxy-2:4.2.0-2.module+el8.6.0+21674+8010760f.x86_64",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:podman-gvproxy-debuginfo-2:4.2.0-2.module+el8.6.0+21674+8010760f.aarch64",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:podman-gvproxy-debuginfo-2:4.2.0-2.module+el8.6.0+21674+8010760f.ppc64le",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:podman-gvproxy-debuginfo-2:4.2.0-2.module+el8.6.0+21674+8010760f.s390x",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:podman-gvproxy-debuginfo-2:4.2.0-2.module+el8.6.0+21674+8010760f.x86_64",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:podman-plugins-2:4.2.0-2.module+el8.6.0+21674+8010760f.aarch64",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:podman-plugins-2:4.2.0-2.module+el8.6.0+21674+8010760f.ppc64le",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:podman-plugins-2:4.2.0-2.module+el8.6.0+21674+8010760f.s390x",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:podman-plugins-2:4.2.0-2.module+el8.6.0+21674+8010760f.x86_64",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:podman-plugins-debuginfo-2:4.2.0-2.module+el8.6.0+21674+8010760f.aarch64",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:podman-plugins-debuginfo-2:4.2.0-2.module+el8.6.0+21674+8010760f.ppc64le",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:podman-plugins-debuginfo-2:4.2.0-2.module+el8.6.0+21674+8010760f.s390x",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:podman-plugins-debuginfo-2:4.2.0-2.module+el8.6.0+21674+8010760f.x86_64",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:podman-remote-2:4.2.0-2.module+el8.6.0+21674+8010760f.aarch64",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:podman-remote-2:4.2.0-2.module+el8.6.0+21674+8010760f.ppc64le",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:podman-remote-2:4.2.0-2.module+el8.6.0+21674+8010760f.s390x",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:podman-remote-2:4.2.0-2.module+el8.6.0+21674+8010760f.x86_64",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:podman-remote-debuginfo-2:4.2.0-2.module+el8.6.0+21674+8010760f.aarch64",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:podman-remote-debuginfo-2:4.2.0-2.module+el8.6.0+21674+8010760f.ppc64le",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:podman-remote-debuginfo-2:4.2.0-2.module+el8.6.0+21674+8010760f.s390x",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:podman-remote-debuginfo-2:4.2.0-2.module+el8.6.0+21674+8010760f.x86_64",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:podman-tests-2:4.2.0-2.module+el8.6.0+21674+8010760f.aarch64",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:podman-tests-2:4.2.0-2.module+el8.6.0+21674+8010760f.ppc64le",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:podman-tests-2:4.2.0-2.module+el8.6.0+21674+8010760f.s390x",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:podman-tests-2:4.2.0-2.module+el8.6.0+21674+8010760f.x86_64",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:python-podman-0:4.0.1-1.module+el8.6.0+21266+3e24c7b3.src",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:python3-criu-0:3.15-3.module+el8.6.0+21266+3e24c7b3.aarch64",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:python3-criu-0:3.15-3.module+el8.6.0+21266+3e24c7b3.ppc64le",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:python3-criu-0:3.15-3.module+el8.6.0+21266+3e24c7b3.s390x",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:python3-criu-0:3.15-3.module+el8.6.0+21266+3e24c7b3.x86_64",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:python3-podman-0:4.0.1-1.module+el8.6.0+21266+3e24c7b3.noarch",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:runc-1:1.1.12-1.module+el8.6.0+21266+3e24c7b3.aarch64",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:runc-1:1.1.12-1.module+el8.6.0+21266+3e24c7b3.ppc64le",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:runc-1:1.1.12-1.module+el8.6.0+21266+3e24c7b3.s390x",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:runc-1:1.1.12-1.module+el8.6.0+21266+3e24c7b3.src",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:runc-1:1.1.12-1.module+el8.6.0+21266+3e24c7b3.x86_64",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:runc-debuginfo-1:1.1.12-1.module+el8.6.0+21266+3e24c7b3.aarch64",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:runc-debuginfo-1:1.1.12-1.module+el8.6.0+21266+3e24c7b3.ppc64le",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:runc-debuginfo-1:1.1.12-1.module+el8.6.0+21266+3e24c7b3.s390x",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:runc-debuginfo-1:1.1.12-1.module+el8.6.0+21266+3e24c7b3.x86_64",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:runc-debugsource-1:1.1.12-1.module+el8.6.0+21266+3e24c7b3.aarch64",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:runc-debugsource-1:1.1.12-1.module+el8.6.0+21266+3e24c7b3.ppc64le",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:runc-debugsource-1:1.1.12-1.module+el8.6.0+21266+3e24c7b3.s390x",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:runc-debugsource-1:1.1.12-1.module+el8.6.0+21266+3e24c7b3.x86_64",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:skopeo-2:1.9.1-1.module+el8.6.0+21266+3e24c7b3.aarch64",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:skopeo-2:1.9.1-1.module+el8.6.0+21266+3e24c7b3.ppc64le",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:skopeo-2:1.9.1-1.module+el8.6.0+21266+3e24c7b3.s390x",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:skopeo-2:1.9.1-1.module+el8.6.0+21266+3e24c7b3.src",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:skopeo-2:1.9.1-1.module+el8.6.0+21266+3e24c7b3.x86_64",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:skopeo-debuginfo-2:1.9.1-1.module+el8.6.0+21266+3e24c7b3.aarch64",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:skopeo-debuginfo-2:1.9.1-1.module+el8.6.0+21266+3e24c7b3.ppc64le",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:skopeo-debuginfo-2:1.9.1-1.module+el8.6.0+21266+3e24c7b3.s390x",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:skopeo-debuginfo-2:1.9.1-1.module+el8.6.0+21266+3e24c7b3.x86_64",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:skopeo-debugsource-2:1.9.1-1.module+el8.6.0+21266+3e24c7b3.aarch64",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:skopeo-debugsource-2:1.9.1-1.module+el8.6.0+21266+3e24c7b3.ppc64le",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:skopeo-debugsource-2:1.9.1-1.module+el8.6.0+21266+3e24c7b3.s390x",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:skopeo-debugsource-2:1.9.1-1.module+el8.6.0+21266+3e24c7b3.x86_64",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:skopeo-tests-2:1.9.1-1.module+el8.6.0+21266+3e24c7b3.aarch64",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:skopeo-tests-2:1.9.1-1.module+el8.6.0+21266+3e24c7b3.ppc64le",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:skopeo-tests-2:1.9.1-1.module+el8.6.0+21266+3e24c7b3.s390x",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:skopeo-tests-2:1.9.1-1.module+el8.6.0+21266+3e24c7b3.x86_64",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:slirp4netns-0:1.2.0-3.module+el8.6.0+21266+3e24c7b3.aarch64",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:slirp4netns-0:1.2.0-3.module+el8.6.0+21266+3e24c7b3.ppc64le",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:slirp4netns-0:1.2.0-3.module+el8.6.0+21266+3e24c7b3.s390x",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:slirp4netns-0:1.2.0-3.module+el8.6.0+21266+3e24c7b3.src",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:slirp4netns-0:1.2.0-3.module+el8.6.0+21266+3e24c7b3.x86_64",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:slirp4netns-debuginfo-0:1.2.0-3.module+el8.6.0+21266+3e24c7b3.aarch64",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:slirp4netns-debuginfo-0:1.2.0-3.module+el8.6.0+21266+3e24c7b3.ppc64le",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:slirp4netns-debuginfo-0:1.2.0-3.module+el8.6.0+21266+3e24c7b3.s390x",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:slirp4netns-debuginfo-0:1.2.0-3.module+el8.6.0+21266+3e24c7b3.x86_64",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:slirp4netns-debugsource-0:1.2.0-3.module+el8.6.0+21266+3e24c7b3.aarch64",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:slirp4netns-debugsource-0:1.2.0-3.module+el8.6.0+21266+3e24c7b3.ppc64le",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:slirp4netns-debugsource-0:1.2.0-3.module+el8.6.0+21266+3e24c7b3.s390x",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:slirp4netns-debugsource-0:1.2.0-3.module+el8.6.0+21266+3e24c7b3.x86_64",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:toolbox-0:0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.aarch64",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:toolbox-0:0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.ppc64le",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:toolbox-0:0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.s390x",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:toolbox-0:0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.src",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:toolbox-0:0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.x86_64",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:toolbox-debuginfo-0:0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.aarch64",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:toolbox-debuginfo-0:0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.ppc64le",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:toolbox-debuginfo-0:0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.s390x",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:toolbox-debuginfo-0:0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.x86_64",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:toolbox-debugsource-0:0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.aarch64",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:toolbox-debugsource-0:0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.ppc64le",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:toolbox-debugsource-0:0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.s390x",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:toolbox-debugsource-0:0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.x86_64",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:toolbox-tests-0:0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.aarch64",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:toolbox-tests-0:0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.ppc64le",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:toolbox-tests-0:0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.s390x",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:toolbox-tests-0:0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.x86_64",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:udica-0:0.2.6-5.module+el8.6.0+21266+3e24c7b3.noarch",
"AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:udica-0:0.2.6-5.module+el8.6.0+21266+3e24c7b3.src"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "golang: golang.org/x/text/language: ParseAcceptLanguage takes a long time to parse complex tags"
}
]
}
RHSA-2024:1994
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for the container-tools:rhel8 module is now available for Red Hat Enterprise Linux 8.6 Extended Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc.\n\nSecurity Fix(es):\n\n* podman: golang.org/x/text/language: ParseAcceptLanguage takes a long time to parse complex tags (CVE-2022-32149)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2024:1994",
"url": "https://access.redhat.com/errata/RHSA-2024:1994"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#moderate",
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "2134010",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2134010"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_1994.json"
}
],
"title": "Red Hat Security Advisory: container-tools:rhel8 security update",
"tracking": {
"current_release_date": "2025-10-10T01:55:35+00:00",
"generator": {
"date": "2025-10-10T01:55:35+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.9"
}
},
"id": "RHSA-2024:1994",
"initial_release_date": "2024-04-23T14:16:09+00:00",
"revision_history": [
{
"date": "2024-04-23T14:16:09+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2024-04-23T14:16:09+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-10-10T01:55:35+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product": {
"name": "Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_eus:8.6::appstream"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "aardvark-dns-1.0.1-40.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"product": {
"name": "aardvark-dns-1.0.1-40.module+el8.6.0+21266+3e24c7b3.x86_64.rpm (container-tools:rhel8)",
"product_id": "aardvark-dns-1.0.1-40.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/aardvark-dns@1.0.1-40.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=x86_64\u0026epoch=2\u0026rpmmod=container-tools:rhel8:8060020240413110723:3b538bd8"
}
}
},
{
"category": "product_version",
"name": "buildah-1.26.2-1.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"product": {
"name": "buildah-1.26.2-1.module+el8.6.0+21266+3e24c7b3.x86_64.rpm (container-tools:rhel8)",
"product_id": "buildah-1.26.2-1.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/buildah@1.26.2-1.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=x86_64\u0026epoch=1\u0026rpmmod=container-tools:rhel8:8060020240413110723:3b538bd8"
}
}
},
{
"category": "product_version",
"name": "buildah-debuginfo-1.26.2-1.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"product": {
"name": "buildah-debuginfo-1.26.2-1.module+el8.6.0+21266+3e24c7b3.x86_64.rpm (container-tools:rhel8)",
"product_id": "buildah-debuginfo-1.26.2-1.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/buildah-debuginfo@1.26.2-1.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=x86_64\u0026epoch=1\u0026rpmmod=container-tools:rhel8:8060020240413110723:3b538bd8"
}
}
},
{
"category": "product_version",
"name": "buildah-debugsource-1.26.2-1.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"product": {
"name": "buildah-debugsource-1.26.2-1.module+el8.6.0+21266+3e24c7b3.x86_64.rpm (container-tools:rhel8)",
"product_id": "buildah-debugsource-1.26.2-1.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/buildah-debugsource@1.26.2-1.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=x86_64\u0026epoch=1\u0026rpmmod=container-tools:rhel8:8060020240413110723:3b538bd8"
}
}
},
{
"category": "product_version",
"name": "buildah-tests-1.26.2-1.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"product": {
"name": "buildah-tests-1.26.2-1.module+el8.6.0+21266+3e24c7b3.x86_64.rpm (container-tools:rhel8)",
"product_id": "buildah-tests-1.26.2-1.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/buildah-tests@1.26.2-1.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=x86_64\u0026epoch=1\u0026rpmmod=container-tools:rhel8:8060020240413110723:3b538bd8"
}
}
},
{
"category": "product_version",
"name": "buildah-tests-debuginfo-1.26.2-1.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"product": {
"name": "buildah-tests-debuginfo-1.26.2-1.module+el8.6.0+21266+3e24c7b3.x86_64.rpm (container-tools:rhel8)",
"product_id": "buildah-tests-debuginfo-1.26.2-1.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/buildah-tests-debuginfo@1.26.2-1.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=x86_64\u0026epoch=1\u0026rpmmod=container-tools:rhel8:8060020240413110723:3b538bd8"
}
}
},
{
"category": "product_version",
"name": "conmon-2.1.4-1.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"product": {
"name": "conmon-2.1.4-1.module+el8.6.0+21266+3e24c7b3.x86_64.rpm (container-tools:rhel8)",
"product_id": "conmon-2.1.4-1.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/conmon@2.1.4-1.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=x86_64\u0026epoch=2\u0026rpmmod=container-tools:rhel8:8060020240413110723:3b538bd8"
}
}
},
{
"category": "product_version",
"name": "conmon-debuginfo-2.1.4-1.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"product": {
"name": "conmon-debuginfo-2.1.4-1.module+el8.6.0+21266+3e24c7b3.x86_64.rpm (container-tools:rhel8)",
"product_id": "conmon-debuginfo-2.1.4-1.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/conmon-debuginfo@2.1.4-1.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=x86_64\u0026epoch=2\u0026rpmmod=container-tools:rhel8:8060020240413110723:3b538bd8"
}
}
},
{
"category": "product_version",
"name": "conmon-debugsource-2.1.4-1.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"product": {
"name": "conmon-debugsource-2.1.4-1.module+el8.6.0+21266+3e24c7b3.x86_64.rpm (container-tools:rhel8)",
"product_id": "conmon-debugsource-2.1.4-1.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/conmon-debugsource@2.1.4-1.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=x86_64\u0026epoch=2\u0026rpmmod=container-tools:rhel8:8060020240413110723:3b538bd8"
}
}
},
{
"category": "product_version",
"name": "containernetworking-plugins-1.1.1-4.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"product": {
"name": "containernetworking-plugins-1.1.1-4.module+el8.6.0+21266+3e24c7b3.x86_64.rpm (container-tools:rhel8)",
"product_id": "containernetworking-plugins-1.1.1-4.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/containernetworking-plugins@1.1.1-4.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=x86_64\u0026epoch=1\u0026rpmmod=container-tools:rhel8:8060020240413110723:3b538bd8"
}
}
},
{
"category": "product_version",
"name": "containernetworking-plugins-debuginfo-1.1.1-4.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"product": {
"name": "containernetworking-plugins-debuginfo-1.1.1-4.module+el8.6.0+21266+3e24c7b3.x86_64.rpm (container-tools:rhel8)",
"product_id": "containernetworking-plugins-debuginfo-1.1.1-4.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/containernetworking-plugins-debuginfo@1.1.1-4.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=x86_64\u0026epoch=1\u0026rpmmod=container-tools:rhel8:8060020240413110723:3b538bd8"
}
}
},
{
"category": "product_version",
"name": "containernetworking-plugins-debugsource-1.1.1-4.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"product": {
"name": "containernetworking-plugins-debugsource-1.1.1-4.module+el8.6.0+21266+3e24c7b3.x86_64.rpm (container-tools:rhel8)",
"product_id": "containernetworking-plugins-debugsource-1.1.1-4.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/containernetworking-plugins-debugsource@1.1.1-4.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=x86_64\u0026epoch=1\u0026rpmmod=container-tools:rhel8:8060020240413110723:3b538bd8"
}
}
},
{
"category": "product_version",
"name": "containers-common-1-40.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"product": {
"name": "containers-common-1-40.module+el8.6.0+21266+3e24c7b3.x86_64.rpm (container-tools:rhel8)",
"product_id": "containers-common-1-40.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/containers-common@1-40.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=x86_64\u0026epoch=2\u0026rpmmod=container-tools:rhel8:8060020240413110723:3b538bd8"
}
}
},
{
"category": "product_version",
"name": "crit-3.15-3.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"product": {
"name": "crit-3.15-3.module+el8.6.0+21266+3e24c7b3.x86_64.rpm (container-tools:rhel8)",
"product_id": "crit-3.15-3.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/crit@3.15-3.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=x86_64\u0026rpmmod=container-tools:rhel8:8060020240413110723:3b538bd8"
}
}
},
{
"category": "product_version",
"name": "criu-3.15-3.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"product": {
"name": "criu-3.15-3.module+el8.6.0+21266+3e24c7b3.x86_64.rpm (container-tools:rhel8)",
"product_id": "criu-3.15-3.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/criu@3.15-3.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=x86_64\u0026rpmmod=container-tools:rhel8:8060020240413110723:3b538bd8"
}
}
},
{
"category": "product_version",
"name": "criu-debuginfo-3.15-3.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"product": {
"name": "criu-debuginfo-3.15-3.module+el8.6.0+21266+3e24c7b3.x86_64.rpm (container-tools:rhel8)",
"product_id": "criu-debuginfo-3.15-3.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/criu-debuginfo@3.15-3.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=x86_64\u0026rpmmod=container-tools:rhel8:8060020240413110723:3b538bd8"
}
}
},
{
"category": "product_version",
"name": "criu-debugsource-3.15-3.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"product": {
"name": "criu-debugsource-3.15-3.module+el8.6.0+21266+3e24c7b3.x86_64.rpm (container-tools:rhel8)",
"product_id": "criu-debugsource-3.15-3.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/criu-debugsource@3.15-3.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=x86_64\u0026rpmmod=container-tools:rhel8:8060020240413110723:3b538bd8"
}
}
},
{
"category": "product_version",
"name": "criu-devel-3.15-3.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"product": {
"name": "criu-devel-3.15-3.module+el8.6.0+21266+3e24c7b3.x86_64.rpm (container-tools:rhel8)",
"product_id": "criu-devel-3.15-3.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/criu-devel@3.15-3.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=x86_64\u0026rpmmod=container-tools:rhel8:8060020240413110723:3b538bd8"
}
}
},
{
"category": "product_version",
"name": "criu-libs-3.15-3.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"product": {
"name": "criu-libs-3.15-3.module+el8.6.0+21266+3e24c7b3.x86_64.rpm (container-tools:rhel8)",
"product_id": "criu-libs-3.15-3.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/criu-libs@3.15-3.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=x86_64\u0026rpmmod=container-tools:rhel8:8060020240413110723:3b538bd8"
}
}
},
{
"category": "product_version",
"name": "criu-libs-debuginfo-3.15-3.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"product": {
"name": "criu-libs-debuginfo-3.15-3.module+el8.6.0+21266+3e24c7b3.x86_64.rpm (container-tools:rhel8)",
"product_id": "criu-libs-debuginfo-3.15-3.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/criu-libs-debuginfo@3.15-3.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=x86_64\u0026rpmmod=container-tools:rhel8:8060020240413110723:3b538bd8"
}
}
},
{
"category": "product_version",
"name": "crun-1.5-1.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"product": {
"name": "crun-1.5-1.module+el8.6.0+21266+3e24c7b3.x86_64.rpm (container-tools:rhel8)",
"product_id": "crun-1.5-1.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/crun@1.5-1.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=x86_64\u0026rpmmod=container-tools:rhel8:8060020240413110723:3b538bd8"
}
}
},
{
"category": "product_version",
"name": "crun-debuginfo-1.5-1.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"product": {
"name": "crun-debuginfo-1.5-1.module+el8.6.0+21266+3e24c7b3.x86_64.rpm (container-tools:rhel8)",
"product_id": "crun-debuginfo-1.5-1.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/crun-debuginfo@1.5-1.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=x86_64\u0026rpmmod=container-tools:rhel8:8060020240413110723:3b538bd8"
}
}
},
{
"category": "product_version",
"name": "crun-debugsource-1.5-1.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"product": {
"name": "crun-debugsource-1.5-1.module+el8.6.0+21266+3e24c7b3.x86_64.rpm (container-tools:rhel8)",
"product_id": "crun-debugsource-1.5-1.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/crun-debugsource@1.5-1.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=x86_64\u0026rpmmod=container-tools:rhel8:8060020240413110723:3b538bd8"
}
}
},
{
"category": "product_version",
"name": "fuse-overlayfs-1.9-1.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"product": {
"name": "fuse-overlayfs-1.9-1.module+el8.6.0+21266+3e24c7b3.x86_64.rpm (container-tools:rhel8)",
"product_id": "fuse-overlayfs-1.9-1.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fuse-overlayfs@1.9-1.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=x86_64\u0026rpmmod=container-tools:rhel8:8060020240413110723:3b538bd8"
}
}
},
{
"category": "product_version",
"name": "fuse-overlayfs-debuginfo-1.9-1.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"product": {
"name": "fuse-overlayfs-debuginfo-1.9-1.module+el8.6.0+21266+3e24c7b3.x86_64.rpm (container-tools:rhel8)",
"product_id": "fuse-overlayfs-debuginfo-1.9-1.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fuse-overlayfs-debuginfo@1.9-1.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=x86_64\u0026rpmmod=container-tools:rhel8:8060020240413110723:3b538bd8"
}
}
},
{
"category": "product_version",
"name": "fuse-overlayfs-debugsource-1.9-1.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"product": {
"name": "fuse-overlayfs-debugsource-1.9-1.module+el8.6.0+21266+3e24c7b3.x86_64.rpm (container-tools:rhel8)",
"product_id": "fuse-overlayfs-debugsource-1.9-1.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fuse-overlayfs-debugsource@1.9-1.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=x86_64\u0026rpmmod=container-tools:rhel8:8060020240413110723:3b538bd8"
}
}
},
{
"category": "product_version",
"name": "libslirp-4.4.0-1.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"product": {
"name": "libslirp-4.4.0-1.module+el8.6.0+21266+3e24c7b3.x86_64.rpm (container-tools:rhel8)",
"product_id": "libslirp-4.4.0-1.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libslirp@4.4.0-1.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=x86_64\u0026rpmmod=container-tools:rhel8:8060020240413110723:3b538bd8"
}
}
},
{
"category": "product_version",
"name": "libslirp-debuginfo-4.4.0-1.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"product": {
"name": "libslirp-debuginfo-4.4.0-1.module+el8.6.0+21266+3e24c7b3.x86_64.rpm (container-tools:rhel8)",
"product_id": "libslirp-debuginfo-4.4.0-1.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libslirp-debuginfo@4.4.0-1.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=x86_64\u0026rpmmod=container-tools:rhel8:8060020240413110723:3b538bd8"
}
}
},
{
"category": "product_version",
"name": "libslirp-debugsource-4.4.0-1.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"product": {
"name": "libslirp-debugsource-4.4.0-1.module+el8.6.0+21266+3e24c7b3.x86_64.rpm (container-tools:rhel8)",
"product_id": "libslirp-debugsource-4.4.0-1.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libslirp-debugsource@4.4.0-1.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=x86_64\u0026rpmmod=container-tools:rhel8:8060020240413110723:3b538bd8"
}
}
},
{
"category": "product_version",
"name": "libslirp-devel-4.4.0-1.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"product": {
"name": "libslirp-devel-4.4.0-1.module+el8.6.0+21266+3e24c7b3.x86_64.rpm (container-tools:rhel8)",
"product_id": "libslirp-devel-4.4.0-1.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libslirp-devel@4.4.0-1.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=x86_64\u0026rpmmod=container-tools:rhel8:8060020240413110723:3b538bd8"
}
}
},
{
"category": "product_version",
"name": "netavark-1.0.1-40.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"product": {
"name": "netavark-1.0.1-40.module+el8.6.0+21266+3e24c7b3.x86_64.rpm (container-tools:rhel8)",
"product_id": "netavark-1.0.1-40.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/netavark@1.0.1-40.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=x86_64\u0026epoch=2\u0026rpmmod=container-tools:rhel8:8060020240413110723:3b538bd8"
}
}
},
{
"category": "product_version",
"name": "oci-seccomp-bpf-hook-1.2.6-1.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"product": {
"name": "oci-seccomp-bpf-hook-1.2.6-1.module+el8.6.0+21266+3e24c7b3.x86_64.rpm (container-tools:rhel8)",
"product_id": "oci-seccomp-bpf-hook-1.2.6-1.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/oci-seccomp-bpf-hook@1.2.6-1.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=x86_64\u0026rpmmod=container-tools:rhel8:8060020240413110723:3b538bd8"
}
}
},
{
"category": "product_version",
"name": "oci-seccomp-bpf-hook-debuginfo-1.2.6-1.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"product": {
"name": "oci-seccomp-bpf-hook-debuginfo-1.2.6-1.module+el8.6.0+21266+3e24c7b3.x86_64.rpm (container-tools:rhel8)",
"product_id": "oci-seccomp-bpf-hook-debuginfo-1.2.6-1.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/oci-seccomp-bpf-hook-debuginfo@1.2.6-1.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=x86_64\u0026rpmmod=container-tools:rhel8:8060020240413110723:3b538bd8"
}
}
},
{
"category": "product_version",
"name": "oci-seccomp-bpf-hook-debugsource-1.2.6-1.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"product": {
"name": "oci-seccomp-bpf-hook-debugsource-1.2.6-1.module+el8.6.0+21266+3e24c7b3.x86_64.rpm (container-tools:rhel8)",
"product_id": "oci-seccomp-bpf-hook-debugsource-1.2.6-1.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/oci-seccomp-bpf-hook-debugsource@1.2.6-1.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=x86_64\u0026rpmmod=container-tools:rhel8:8060020240413110723:3b538bd8"
}
}
},
{
"category": "product_version",
"name": "podman-4.2.0-2.module+el8.6.0+21674+8010760f.x86_64.rpm-container-tools:rhel8",
"product": {
"name": "podman-4.2.0-2.module+el8.6.0+21674+8010760f.x86_64.rpm (container-tools:rhel8)",
"product_id": "podman-4.2.0-2.module+el8.6.0+21674+8010760f.x86_64.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman@4.2.0-2.module%2Bel8.6.0%2B21674%2B8010760f?arch=x86_64\u0026epoch=2\u0026rpmmod=container-tools:rhel8:8060020240413110723:3b538bd8"
}
}
},
{
"category": "product_version",
"name": "podman-catatonit-4.2.0-2.module+el8.6.0+21674+8010760f.x86_64.rpm-container-tools:rhel8",
"product": {
"name": "podman-catatonit-4.2.0-2.module+el8.6.0+21674+8010760f.x86_64.rpm (container-tools:rhel8)",
"product_id": "podman-catatonit-4.2.0-2.module+el8.6.0+21674+8010760f.x86_64.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-catatonit@4.2.0-2.module%2Bel8.6.0%2B21674%2B8010760f?arch=x86_64\u0026epoch=2\u0026rpmmod=container-tools:rhel8:8060020240413110723:3b538bd8"
}
}
},
{
"category": "product_version",
"name": "podman-catatonit-debuginfo-4.2.0-2.module+el8.6.0+21674+8010760f.x86_64.rpm-container-tools:rhel8",
"product": {
"name": "podman-catatonit-debuginfo-4.2.0-2.module+el8.6.0+21674+8010760f.x86_64.rpm (container-tools:rhel8)",
"product_id": "podman-catatonit-debuginfo-4.2.0-2.module+el8.6.0+21674+8010760f.x86_64.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-catatonit-debuginfo@4.2.0-2.module%2Bel8.6.0%2B21674%2B8010760f?arch=x86_64\u0026epoch=2\u0026rpmmod=container-tools:rhel8:8060020240413110723:3b538bd8"
}
}
},
{
"category": "product_version",
"name": "podman-debuginfo-4.2.0-2.module+el8.6.0+21674+8010760f.x86_64.rpm-container-tools:rhel8",
"product": {
"name": "podman-debuginfo-4.2.0-2.module+el8.6.0+21674+8010760f.x86_64.rpm (container-tools:rhel8)",
"product_id": "podman-debuginfo-4.2.0-2.module+el8.6.0+21674+8010760f.x86_64.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-debuginfo@4.2.0-2.module%2Bel8.6.0%2B21674%2B8010760f?arch=x86_64\u0026epoch=2\u0026rpmmod=container-tools:rhel8:8060020240413110723:3b538bd8"
}
}
},
{
"category": "product_version",
"name": "podman-debugsource-4.2.0-2.module+el8.6.0+21674+8010760f.x86_64.rpm-container-tools:rhel8",
"product": {
"name": "podman-debugsource-4.2.0-2.module+el8.6.0+21674+8010760f.x86_64.rpm (container-tools:rhel8)",
"product_id": "podman-debugsource-4.2.0-2.module+el8.6.0+21674+8010760f.x86_64.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-debugsource@4.2.0-2.module%2Bel8.6.0%2B21674%2B8010760f?arch=x86_64\u0026epoch=2\u0026rpmmod=container-tools:rhel8:8060020240413110723:3b538bd8"
}
}
},
{
"category": "product_version",
"name": "podman-gvproxy-4.2.0-2.module+el8.6.0+21674+8010760f.x86_64.rpm-container-tools:rhel8",
"product": {
"name": "podman-gvproxy-4.2.0-2.module+el8.6.0+21674+8010760f.x86_64.rpm (container-tools:rhel8)",
"product_id": "podman-gvproxy-4.2.0-2.module+el8.6.0+21674+8010760f.x86_64.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-gvproxy@4.2.0-2.module%2Bel8.6.0%2B21674%2B8010760f?arch=x86_64\u0026epoch=2\u0026rpmmod=container-tools:rhel8:8060020240413110723:3b538bd8"
}
}
},
{
"category": "product_version",
"name": "podman-gvproxy-debuginfo-4.2.0-2.module+el8.6.0+21674+8010760f.x86_64.rpm-container-tools:rhel8",
"product": {
"name": "podman-gvproxy-debuginfo-4.2.0-2.module+el8.6.0+21674+8010760f.x86_64.rpm (container-tools:rhel8)",
"product_id": "podman-gvproxy-debuginfo-4.2.0-2.module+el8.6.0+21674+8010760f.x86_64.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-gvproxy-debuginfo@4.2.0-2.module%2Bel8.6.0%2B21674%2B8010760f?arch=x86_64\u0026epoch=2\u0026rpmmod=container-tools:rhel8:8060020240413110723:3b538bd8"
}
}
},
{
"category": "product_version",
"name": "podman-plugins-4.2.0-2.module+el8.6.0+21674+8010760f.x86_64.rpm-container-tools:rhel8",
"product": {
"name": "podman-plugins-4.2.0-2.module+el8.6.0+21674+8010760f.x86_64.rpm (container-tools:rhel8)",
"product_id": "podman-plugins-4.2.0-2.module+el8.6.0+21674+8010760f.x86_64.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-plugins@4.2.0-2.module%2Bel8.6.0%2B21674%2B8010760f?arch=x86_64\u0026epoch=2\u0026rpmmod=container-tools:rhel8:8060020240413110723:3b538bd8"
}
}
},
{
"category": "product_version",
"name": "podman-plugins-debuginfo-4.2.0-2.module+el8.6.0+21674+8010760f.x86_64.rpm-container-tools:rhel8",
"product": {
"name": "podman-plugins-debuginfo-4.2.0-2.module+el8.6.0+21674+8010760f.x86_64.rpm (container-tools:rhel8)",
"product_id": "podman-plugins-debuginfo-4.2.0-2.module+el8.6.0+21674+8010760f.x86_64.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-plugins-debuginfo@4.2.0-2.module%2Bel8.6.0%2B21674%2B8010760f?arch=x86_64\u0026epoch=2\u0026rpmmod=container-tools:rhel8:8060020240413110723:3b538bd8"
}
}
},
{
"category": "product_version",
"name": "podman-remote-4.2.0-2.module+el8.6.0+21674+8010760f.x86_64.rpm-container-tools:rhel8",
"product": {
"name": "podman-remote-4.2.0-2.module+el8.6.0+21674+8010760f.x86_64.rpm (container-tools:rhel8)",
"product_id": "podman-remote-4.2.0-2.module+el8.6.0+21674+8010760f.x86_64.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-remote@4.2.0-2.module%2Bel8.6.0%2B21674%2B8010760f?arch=x86_64\u0026epoch=2\u0026rpmmod=container-tools:rhel8:8060020240413110723:3b538bd8"
}
}
},
{
"category": "product_version",
"name": "podman-remote-debuginfo-4.2.0-2.module+el8.6.0+21674+8010760f.x86_64.rpm-container-tools:rhel8",
"product": {
"name": "podman-remote-debuginfo-4.2.0-2.module+el8.6.0+21674+8010760f.x86_64.rpm (container-tools:rhel8)",
"product_id": "podman-remote-debuginfo-4.2.0-2.module+el8.6.0+21674+8010760f.x86_64.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-remote-debuginfo@4.2.0-2.module%2Bel8.6.0%2B21674%2B8010760f?arch=x86_64\u0026epoch=2\u0026rpmmod=container-tools:rhel8:8060020240413110723:3b538bd8"
}
}
},
{
"category": "product_version",
"name": "podman-tests-4.2.0-2.module+el8.6.0+21674+8010760f.x86_64.rpm-container-tools:rhel8",
"product": {
"name": "podman-tests-4.2.0-2.module+el8.6.0+21674+8010760f.x86_64.rpm (container-tools:rhel8)",
"product_id": "podman-tests-4.2.0-2.module+el8.6.0+21674+8010760f.x86_64.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-tests@4.2.0-2.module%2Bel8.6.0%2B21674%2B8010760f?arch=x86_64\u0026epoch=2\u0026rpmmod=container-tools:rhel8:8060020240413110723:3b538bd8"
}
}
},
{
"category": "product_version",
"name": "python3-criu-3.15-3.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"product": {
"name": "python3-criu-3.15-3.module+el8.6.0+21266+3e24c7b3.x86_64.rpm (container-tools:rhel8)",
"product_id": "python3-criu-3.15-3.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-criu@3.15-3.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=x86_64\u0026rpmmod=container-tools:rhel8:8060020240413110723:3b538bd8"
}
}
},
{
"category": "product_version",
"name": "runc-1.1.12-1.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"product": {
"name": "runc-1.1.12-1.module+el8.6.0+21266+3e24c7b3.x86_64.rpm (container-tools:rhel8)",
"product_id": "runc-1.1.12-1.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/runc@1.1.12-1.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=x86_64\u0026epoch=1\u0026rpmmod=container-tools:rhel8:8060020240413110723:3b538bd8"
}
}
},
{
"category": "product_version",
"name": "runc-debuginfo-1.1.12-1.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"product": {
"name": "runc-debuginfo-1.1.12-1.module+el8.6.0+21266+3e24c7b3.x86_64.rpm (container-tools:rhel8)",
"product_id": "runc-debuginfo-1.1.12-1.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/runc-debuginfo@1.1.12-1.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=x86_64\u0026epoch=1\u0026rpmmod=container-tools:rhel8:8060020240413110723:3b538bd8"
}
}
},
{
"category": "product_version",
"name": "runc-debugsource-1.1.12-1.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"product": {
"name": "runc-debugsource-1.1.12-1.module+el8.6.0+21266+3e24c7b3.x86_64.rpm (container-tools:rhel8)",
"product_id": "runc-debugsource-1.1.12-1.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/runc-debugsource@1.1.12-1.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=x86_64\u0026epoch=1\u0026rpmmod=container-tools:rhel8:8060020240413110723:3b538bd8"
}
}
},
{
"category": "product_version",
"name": "skopeo-1.9.1-1.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"product": {
"name": "skopeo-1.9.1-1.module+el8.6.0+21266+3e24c7b3.x86_64.rpm (container-tools:rhel8)",
"product_id": "skopeo-1.9.1-1.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/skopeo@1.9.1-1.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=x86_64\u0026epoch=2\u0026rpmmod=container-tools:rhel8:8060020240413110723:3b538bd8"
}
}
},
{
"category": "product_version",
"name": "skopeo-debuginfo-1.9.1-1.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"product": {
"name": "skopeo-debuginfo-1.9.1-1.module+el8.6.0+21266+3e24c7b3.x86_64.rpm (container-tools:rhel8)",
"product_id": "skopeo-debuginfo-1.9.1-1.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/skopeo-debuginfo@1.9.1-1.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=x86_64\u0026epoch=2\u0026rpmmod=container-tools:rhel8:8060020240413110723:3b538bd8"
}
}
},
{
"category": "product_version",
"name": "skopeo-debugsource-1.9.1-1.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"product": {
"name": "skopeo-debugsource-1.9.1-1.module+el8.6.0+21266+3e24c7b3.x86_64.rpm (container-tools:rhel8)",
"product_id": "skopeo-debugsource-1.9.1-1.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/skopeo-debugsource@1.9.1-1.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=x86_64\u0026epoch=2\u0026rpmmod=container-tools:rhel8:8060020240413110723:3b538bd8"
}
}
},
{
"category": "product_version",
"name": "skopeo-tests-1.9.1-1.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"product": {
"name": "skopeo-tests-1.9.1-1.module+el8.6.0+21266+3e24c7b3.x86_64.rpm (container-tools:rhel8)",
"product_id": "skopeo-tests-1.9.1-1.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/skopeo-tests@1.9.1-1.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=x86_64\u0026epoch=2\u0026rpmmod=container-tools:rhel8:8060020240413110723:3b538bd8"
}
}
},
{
"category": "product_version",
"name": "slirp4netns-1.2.0-3.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"product": {
"name": "slirp4netns-1.2.0-3.module+el8.6.0+21266+3e24c7b3.x86_64.rpm (container-tools:rhel8)",
"product_id": "slirp4netns-1.2.0-3.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/slirp4netns@1.2.0-3.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=x86_64\u0026rpmmod=container-tools:rhel8:8060020240413110723:3b538bd8"
}
}
},
{
"category": "product_version",
"name": "slirp4netns-debuginfo-1.2.0-3.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"product": {
"name": "slirp4netns-debuginfo-1.2.0-3.module+el8.6.0+21266+3e24c7b3.x86_64.rpm (container-tools:rhel8)",
"product_id": "slirp4netns-debuginfo-1.2.0-3.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/slirp4netns-debuginfo@1.2.0-3.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=x86_64\u0026rpmmod=container-tools:rhel8:8060020240413110723:3b538bd8"
}
}
},
{
"category": "product_version",
"name": "slirp4netns-debugsource-1.2.0-3.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"product": {
"name": "slirp4netns-debugsource-1.2.0-3.module+el8.6.0+21266+3e24c7b3.x86_64.rpm (container-tools:rhel8)",
"product_id": "slirp4netns-debugsource-1.2.0-3.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/slirp4netns-debugsource@1.2.0-3.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=x86_64\u0026rpmmod=container-tools:rhel8:8060020240413110723:3b538bd8"
}
}
},
{
"category": "product_version",
"name": "toolbox-0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"product": {
"name": "toolbox-0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.x86_64.rpm (container-tools:rhel8)",
"product_id": "toolbox-0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/toolbox@0.0.99.3-0.7.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=x86_64\u0026rpmmod=container-tools:rhel8:8060020240413110723:3b538bd8"
}
}
},
{
"category": "product_version",
"name": "toolbox-debuginfo-0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"product": {
"name": "toolbox-debuginfo-0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.x86_64.rpm (container-tools:rhel8)",
"product_id": "toolbox-debuginfo-0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/toolbox-debuginfo@0.0.99.3-0.7.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=x86_64\u0026rpmmod=container-tools:rhel8:8060020240413110723:3b538bd8"
}
}
},
{
"category": "product_version",
"name": "toolbox-debugsource-0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"product": {
"name": "toolbox-debugsource-0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.x86_64.rpm (container-tools:rhel8)",
"product_id": "toolbox-debugsource-0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/toolbox-debugsource@0.0.99.3-0.7.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=x86_64\u0026rpmmod=container-tools:rhel8:8060020240413110723:3b538bd8"
}
}
},
{
"category": "product_version",
"name": "toolbox-tests-0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"product": {
"name": "toolbox-tests-0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.x86_64.rpm (container-tools:rhel8)",
"product_id": "toolbox-tests-0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/toolbox-tests@0.0.99.3-0.7.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=x86_64\u0026rpmmod=container-tools:rhel8:8060020240413110723:3b538bd8"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "buildah-1.26.2-1.module+el8.6.0+21266+3e24c7b3.src.rpm-container-tools:rhel8",
"product": {
"name": "buildah-1.26.2-1.module+el8.6.0+21266+3e24c7b3.src.rpm (container-tools:rhel8)",
"product_id": "buildah-1.26.2-1.module+el8.6.0+21266+3e24c7b3.src.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/buildah@1.26.2-1.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=src\u0026epoch=1\u0026rpmmod=container-tools:rhel8:8060020240413110723:3b538bd8"
}
}
},
{
"category": "product_version",
"name": "cockpit-podman-49.1-1.module+el8.6.0+21266+3e24c7b3.src.rpm-container-tools:rhel8",
"product": {
"name": "cockpit-podman-49.1-1.module+el8.6.0+21266+3e24c7b3.src.rpm (container-tools:rhel8)",
"product_id": "cockpit-podman-49.1-1.module+el8.6.0+21266+3e24c7b3.src.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cockpit-podman@49.1-1.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=src\u0026rpmmod=container-tools:rhel8:8060020240413110723:3b538bd8"
}
}
},
{
"category": "product_version",
"name": "conmon-2.1.4-1.module+el8.6.0+21266+3e24c7b3.src.rpm-container-tools:rhel8",
"product": {
"name": "conmon-2.1.4-1.module+el8.6.0+21266+3e24c7b3.src.rpm (container-tools:rhel8)",
"product_id": "conmon-2.1.4-1.module+el8.6.0+21266+3e24c7b3.src.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/conmon@2.1.4-1.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=src\u0026epoch=2\u0026rpmmod=container-tools:rhel8:8060020240413110723:3b538bd8"
}
}
},
{
"category": "product_version",
"name": "container-selinux-2.189.0-1.module+el8.6.0+21266+3e24c7b3.src.rpm-container-tools:rhel8",
"product": {
"name": "container-selinux-2.189.0-1.module+el8.6.0+21266+3e24c7b3.src.rpm (container-tools:rhel8)",
"product_id": "container-selinux-2.189.0-1.module+el8.6.0+21266+3e24c7b3.src.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/container-selinux@2.189.0-1.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=src\u0026epoch=2\u0026rpmmod=container-tools:rhel8:8060020240413110723:3b538bd8"
}
}
},
{
"category": "product_version",
"name": "containernetworking-plugins-1.1.1-4.module+el8.6.0+21266+3e24c7b3.src.rpm-container-tools:rhel8",
"product": {
"name": "containernetworking-plugins-1.1.1-4.module+el8.6.0+21266+3e24c7b3.src.rpm (container-tools:rhel8)",
"product_id": "containernetworking-plugins-1.1.1-4.module+el8.6.0+21266+3e24c7b3.src.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/containernetworking-plugins@1.1.1-4.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=src\u0026epoch=1\u0026rpmmod=container-tools:rhel8:8060020240413110723:3b538bd8"
}
}
},
{
"category": "product_version",
"name": "containers-common-1-40.module+el8.6.0+21266+3e24c7b3.src.rpm-container-tools:rhel8",
"product": {
"name": "containers-common-1-40.module+el8.6.0+21266+3e24c7b3.src.rpm (container-tools:rhel8)",
"product_id": "containers-common-1-40.module+el8.6.0+21266+3e24c7b3.src.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/containers-common@1-40.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=src\u0026epoch=2\u0026rpmmod=container-tools:rhel8:8060020240413110723:3b538bd8"
}
}
},
{
"category": "product_version",
"name": "criu-3.15-3.module+el8.6.0+21266+3e24c7b3.src.rpm-container-tools:rhel8",
"product": {
"name": "criu-3.15-3.module+el8.6.0+21266+3e24c7b3.src.rpm (container-tools:rhel8)",
"product_id": "criu-3.15-3.module+el8.6.0+21266+3e24c7b3.src.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/criu@3.15-3.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=src\u0026rpmmod=container-tools:rhel8:8060020240413110723:3b538bd8"
}
}
},
{
"category": "product_version",
"name": "crun-1.5-1.module+el8.6.0+21266+3e24c7b3.src.rpm-container-tools:rhel8",
"product": {
"name": "crun-1.5-1.module+el8.6.0+21266+3e24c7b3.src.rpm (container-tools:rhel8)",
"product_id": "crun-1.5-1.module+el8.6.0+21266+3e24c7b3.src.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/crun@1.5-1.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=src\u0026rpmmod=container-tools:rhel8:8060020240413110723:3b538bd8"
}
}
},
{
"category": "product_version",
"name": "fuse-overlayfs-1.9-1.module+el8.6.0+21266+3e24c7b3.src.rpm-container-tools:rhel8",
"product": {
"name": "fuse-overlayfs-1.9-1.module+el8.6.0+21266+3e24c7b3.src.rpm (container-tools:rhel8)",
"product_id": "fuse-overlayfs-1.9-1.module+el8.6.0+21266+3e24c7b3.src.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fuse-overlayfs@1.9-1.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=src\u0026rpmmod=container-tools:rhel8:8060020240413110723:3b538bd8"
}
}
},
{
"category": "product_version",
"name": "libslirp-4.4.0-1.module+el8.6.0+21266+3e24c7b3.src.rpm-container-tools:rhel8",
"product": {
"name": "libslirp-4.4.0-1.module+el8.6.0+21266+3e24c7b3.src.rpm (container-tools:rhel8)",
"product_id": "libslirp-4.4.0-1.module+el8.6.0+21266+3e24c7b3.src.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libslirp@4.4.0-1.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=src\u0026rpmmod=container-tools:rhel8:8060020240413110723:3b538bd8"
}
}
},
{
"category": "product_version",
"name": "oci-seccomp-bpf-hook-1.2.6-1.module+el8.6.0+21266+3e24c7b3.src.rpm-container-tools:rhel8",
"product": {
"name": "oci-seccomp-bpf-hook-1.2.6-1.module+el8.6.0+21266+3e24c7b3.src.rpm (container-tools:rhel8)",
"product_id": "oci-seccomp-bpf-hook-1.2.6-1.module+el8.6.0+21266+3e24c7b3.src.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/oci-seccomp-bpf-hook@1.2.6-1.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=src\u0026rpmmod=container-tools:rhel8:8060020240413110723:3b538bd8"
}
}
},
{
"category": "product_version",
"name": "podman-4.2.0-2.module+el8.6.0+21674+8010760f.src.rpm-container-tools:rhel8",
"product": {
"name": "podman-4.2.0-2.module+el8.6.0+21674+8010760f.src.rpm (container-tools:rhel8)",
"product_id": "podman-4.2.0-2.module+el8.6.0+21674+8010760f.src.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman@4.2.0-2.module%2Bel8.6.0%2B21674%2B8010760f?arch=src\u0026epoch=2\u0026rpmmod=container-tools:rhel8:8060020240413110723:3b538bd8"
}
}
},
{
"category": "product_version",
"name": "python-podman-4.0.1-1.module+el8.6.0+21266+3e24c7b3.src.rpm-container-tools:rhel8",
"product": {
"name": "python-podman-4.0.1-1.module+el8.6.0+21266+3e24c7b3.src.rpm (container-tools:rhel8)",
"product_id": "python-podman-4.0.1-1.module+el8.6.0+21266+3e24c7b3.src.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-podman@4.0.1-1.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=src\u0026rpmmod=container-tools:rhel8:8060020240413110723:3b538bd8"
}
}
},
{
"category": "product_version",
"name": "runc-1.1.12-1.module+el8.6.0+21266+3e24c7b3.src.rpm-container-tools:rhel8",
"product": {
"name": "runc-1.1.12-1.module+el8.6.0+21266+3e24c7b3.src.rpm (container-tools:rhel8)",
"product_id": "runc-1.1.12-1.module+el8.6.0+21266+3e24c7b3.src.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/runc@1.1.12-1.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=src\u0026epoch=1\u0026rpmmod=container-tools:rhel8:8060020240413110723:3b538bd8"
}
}
},
{
"category": "product_version",
"name": "skopeo-1.9.1-1.module+el8.6.0+21266+3e24c7b3.src.rpm-container-tools:rhel8",
"product": {
"name": "skopeo-1.9.1-1.module+el8.6.0+21266+3e24c7b3.src.rpm (container-tools:rhel8)",
"product_id": "skopeo-1.9.1-1.module+el8.6.0+21266+3e24c7b3.src.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/skopeo@1.9.1-1.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=src\u0026epoch=2\u0026rpmmod=container-tools:rhel8:8060020240413110723:3b538bd8"
}
}
},
{
"category": "product_version",
"name": "slirp4netns-1.2.0-3.module+el8.6.0+21266+3e24c7b3.src.rpm-container-tools:rhel8",
"product": {
"name": "slirp4netns-1.2.0-3.module+el8.6.0+21266+3e24c7b3.src.rpm (container-tools:rhel8)",
"product_id": "slirp4netns-1.2.0-3.module+el8.6.0+21266+3e24c7b3.src.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/slirp4netns@1.2.0-3.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=src\u0026rpmmod=container-tools:rhel8:8060020240413110723:3b538bd8"
}
}
},
{
"category": "product_version",
"name": "toolbox-0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.src.rpm-container-tools:rhel8",
"product": {
"name": "toolbox-0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.src.rpm (container-tools:rhel8)",
"product_id": "toolbox-0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.src.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/toolbox@0.0.99.3-0.7.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=src\u0026rpmmod=container-tools:rhel8:8060020240413110723:3b538bd8"
}
}
},
{
"category": "product_version",
"name": "udica-0.2.6-5.module+el8.6.0+21266+3e24c7b3.src.rpm-container-tools:rhel8",
"product": {
"name": "udica-0.2.6-5.module+el8.6.0+21266+3e24c7b3.src.rpm (container-tools:rhel8)",
"product_id": "udica-0.2.6-5.module+el8.6.0+21266+3e24c7b3.src.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/udica@0.2.6-5.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=src\u0026rpmmod=container-tools:rhel8:8060020240413110723:3b538bd8"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "cockpit-podman-49.1-1.module+el8.6.0+21266+3e24c7b3.noarch.rpm-container-tools:rhel8",
"product": {
"name": "cockpit-podman-49.1-1.module+el8.6.0+21266+3e24c7b3.noarch.rpm (container-tools:rhel8)",
"product_id": "cockpit-podman-49.1-1.module+el8.6.0+21266+3e24c7b3.noarch.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cockpit-podman@49.1-1.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=noarch\u0026rpmmod=container-tools:rhel8:8060020240413110723:3b538bd8"
}
}
},
{
"category": "product_version",
"name": "container-selinux-2.189.0-1.module+el8.6.0+21266+3e24c7b3.noarch.rpm-container-tools:rhel8",
"product": {
"name": "container-selinux-2.189.0-1.module+el8.6.0+21266+3e24c7b3.noarch.rpm (container-tools:rhel8)",
"product_id": "container-selinux-2.189.0-1.module+el8.6.0+21266+3e24c7b3.noarch.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/container-selinux@2.189.0-1.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=noarch\u0026epoch=2\u0026rpmmod=container-tools:rhel8:8060020240413110723:3b538bd8"
}
}
},
{
"category": "product_version",
"name": "podman-docker-4.2.0-2.module+el8.6.0+21674+8010760f.noarch.rpm-container-tools:rhel8",
"product": {
"name": "podman-docker-4.2.0-2.module+el8.6.0+21674+8010760f.noarch.rpm (container-tools:rhel8)",
"product_id": "podman-docker-4.2.0-2.module+el8.6.0+21674+8010760f.noarch.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-docker@4.2.0-2.module%2Bel8.6.0%2B21674%2B8010760f?arch=noarch\u0026epoch=2\u0026rpmmod=container-tools:rhel8:8060020240413110723:3b538bd8"
}
}
},
{
"category": "product_version",
"name": "python3-podman-4.0.1-1.module+el8.6.0+21266+3e24c7b3.noarch.rpm-container-tools:rhel8",
"product": {
"name": "python3-podman-4.0.1-1.module+el8.6.0+21266+3e24c7b3.noarch.rpm (container-tools:rhel8)",
"product_id": "python3-podman-4.0.1-1.module+el8.6.0+21266+3e24c7b3.noarch.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-podman@4.0.1-1.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=noarch\u0026rpmmod=container-tools:rhel8:8060020240413110723:3b538bd8"
}
}
},
{
"category": "product_version",
"name": "udica-0.2.6-5.module+el8.6.0+21266+3e24c7b3.noarch.rpm-container-tools:rhel8",
"product": {
"name": "udica-0.2.6-5.module+el8.6.0+21266+3e24c7b3.noarch.rpm (container-tools:rhel8)",
"product_id": "udica-0.2.6-5.module+el8.6.0+21266+3e24c7b3.noarch.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/udica@0.2.6-5.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=noarch\u0026rpmmod=container-tools:rhel8:8060020240413110723:3b538bd8"
}
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "aardvark-dns-1.0.1-40.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"product": {
"name": "aardvark-dns-1.0.1-40.module+el8.6.0+21266+3e24c7b3.s390x.rpm (container-tools:rhel8)",
"product_id": "aardvark-dns-1.0.1-40.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/aardvark-dns@1.0.1-40.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=s390x\u0026epoch=2\u0026rpmmod=container-tools:rhel8:8060020240413110723:3b538bd8"
}
}
},
{
"category": "product_version",
"name": "buildah-1.26.2-1.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"product": {
"name": "buildah-1.26.2-1.module+el8.6.0+21266+3e24c7b3.s390x.rpm (container-tools:rhel8)",
"product_id": "buildah-1.26.2-1.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/buildah@1.26.2-1.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=s390x\u0026epoch=1\u0026rpmmod=container-tools:rhel8:8060020240413110723:3b538bd8"
}
}
},
{
"category": "product_version",
"name": "buildah-debuginfo-1.26.2-1.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"product": {
"name": "buildah-debuginfo-1.26.2-1.module+el8.6.0+21266+3e24c7b3.s390x.rpm (container-tools:rhel8)",
"product_id": "buildah-debuginfo-1.26.2-1.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/buildah-debuginfo@1.26.2-1.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=s390x\u0026epoch=1\u0026rpmmod=container-tools:rhel8:8060020240413110723:3b538bd8"
}
}
},
{
"category": "product_version",
"name": "buildah-debugsource-1.26.2-1.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"product": {
"name": "buildah-debugsource-1.26.2-1.module+el8.6.0+21266+3e24c7b3.s390x.rpm (container-tools:rhel8)",
"product_id": "buildah-debugsource-1.26.2-1.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/buildah-debugsource@1.26.2-1.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=s390x\u0026epoch=1\u0026rpmmod=container-tools:rhel8:8060020240413110723:3b538bd8"
}
}
},
{
"category": "product_version",
"name": "buildah-tests-1.26.2-1.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"product": {
"name": "buildah-tests-1.26.2-1.module+el8.6.0+21266+3e24c7b3.s390x.rpm (container-tools:rhel8)",
"product_id": "buildah-tests-1.26.2-1.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/buildah-tests@1.26.2-1.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=s390x\u0026epoch=1\u0026rpmmod=container-tools:rhel8:8060020240413110723:3b538bd8"
}
}
},
{
"category": "product_version",
"name": "buildah-tests-debuginfo-1.26.2-1.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"product": {
"name": "buildah-tests-debuginfo-1.26.2-1.module+el8.6.0+21266+3e24c7b3.s390x.rpm (container-tools:rhel8)",
"product_id": "buildah-tests-debuginfo-1.26.2-1.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/buildah-tests-debuginfo@1.26.2-1.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=s390x\u0026epoch=1\u0026rpmmod=container-tools:rhel8:8060020240413110723:3b538bd8"
}
}
},
{
"category": "product_version",
"name": "conmon-2.1.4-1.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"product": {
"name": "conmon-2.1.4-1.module+el8.6.0+21266+3e24c7b3.s390x.rpm (container-tools:rhel8)",
"product_id": "conmon-2.1.4-1.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/conmon@2.1.4-1.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=s390x\u0026epoch=2\u0026rpmmod=container-tools:rhel8:8060020240413110723:3b538bd8"
}
}
},
{
"category": "product_version",
"name": "conmon-debuginfo-2.1.4-1.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"product": {
"name": "conmon-debuginfo-2.1.4-1.module+el8.6.0+21266+3e24c7b3.s390x.rpm (container-tools:rhel8)",
"product_id": "conmon-debuginfo-2.1.4-1.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/conmon-debuginfo@2.1.4-1.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=s390x\u0026epoch=2\u0026rpmmod=container-tools:rhel8:8060020240413110723:3b538bd8"
}
}
},
{
"category": "product_version",
"name": "conmon-debugsource-2.1.4-1.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"product": {
"name": "conmon-debugsource-2.1.4-1.module+el8.6.0+21266+3e24c7b3.s390x.rpm (container-tools:rhel8)",
"product_id": "conmon-debugsource-2.1.4-1.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/conmon-debugsource@2.1.4-1.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=s390x\u0026epoch=2\u0026rpmmod=container-tools:rhel8:8060020240413110723:3b538bd8"
}
}
},
{
"category": "product_version",
"name": "containernetworking-plugins-1.1.1-4.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"product": {
"name": "containernetworking-plugins-1.1.1-4.module+el8.6.0+21266+3e24c7b3.s390x.rpm (container-tools:rhel8)",
"product_id": "containernetworking-plugins-1.1.1-4.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/containernetworking-plugins@1.1.1-4.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=s390x\u0026epoch=1\u0026rpmmod=container-tools:rhel8:8060020240413110723:3b538bd8"
}
}
},
{
"category": "product_version",
"name": "containernetworking-plugins-debuginfo-1.1.1-4.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"product": {
"name": "containernetworking-plugins-debuginfo-1.1.1-4.module+el8.6.0+21266+3e24c7b3.s390x.rpm (container-tools:rhel8)",
"product_id": "containernetworking-plugins-debuginfo-1.1.1-4.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/containernetworking-plugins-debuginfo@1.1.1-4.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=s390x\u0026epoch=1\u0026rpmmod=container-tools:rhel8:8060020240413110723:3b538bd8"
}
}
},
{
"category": "product_version",
"name": "containernetworking-plugins-debugsource-1.1.1-4.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"product": {
"name": "containernetworking-plugins-debugsource-1.1.1-4.module+el8.6.0+21266+3e24c7b3.s390x.rpm (container-tools:rhel8)",
"product_id": "containernetworking-plugins-debugsource-1.1.1-4.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/containernetworking-plugins-debugsource@1.1.1-4.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=s390x\u0026epoch=1\u0026rpmmod=container-tools:rhel8:8060020240413110723:3b538bd8"
}
}
},
{
"category": "product_version",
"name": "containers-common-1-40.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"product": {
"name": "containers-common-1-40.module+el8.6.0+21266+3e24c7b3.s390x.rpm (container-tools:rhel8)",
"product_id": "containers-common-1-40.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/containers-common@1-40.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=s390x\u0026epoch=2\u0026rpmmod=container-tools:rhel8:8060020240413110723:3b538bd8"
}
}
},
{
"category": "product_version",
"name": "crit-3.15-3.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"product": {
"name": "crit-3.15-3.module+el8.6.0+21266+3e24c7b3.s390x.rpm (container-tools:rhel8)",
"product_id": "crit-3.15-3.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/crit@3.15-3.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=s390x\u0026rpmmod=container-tools:rhel8:8060020240413110723:3b538bd8"
}
}
},
{
"category": "product_version",
"name": "criu-3.15-3.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"product": {
"name": "criu-3.15-3.module+el8.6.0+21266+3e24c7b3.s390x.rpm (container-tools:rhel8)",
"product_id": "criu-3.15-3.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/criu@3.15-3.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=s390x\u0026rpmmod=container-tools:rhel8:8060020240413110723:3b538bd8"
}
}
},
{
"category": "product_version",
"name": "criu-debuginfo-3.15-3.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"product": {
"name": "criu-debuginfo-3.15-3.module+el8.6.0+21266+3e24c7b3.s390x.rpm (container-tools:rhel8)",
"product_id": "criu-debuginfo-3.15-3.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/criu-debuginfo@3.15-3.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=s390x\u0026rpmmod=container-tools:rhel8:8060020240413110723:3b538bd8"
}
}
},
{
"category": "product_version",
"name": "criu-debugsource-3.15-3.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"product": {
"name": "criu-debugsource-3.15-3.module+el8.6.0+21266+3e24c7b3.s390x.rpm (container-tools:rhel8)",
"product_id": "criu-debugsource-3.15-3.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/criu-debugsource@3.15-3.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=s390x\u0026rpmmod=container-tools:rhel8:8060020240413110723:3b538bd8"
}
}
},
{
"category": "product_version",
"name": "criu-devel-3.15-3.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"product": {
"name": "criu-devel-3.15-3.module+el8.6.0+21266+3e24c7b3.s390x.rpm (container-tools:rhel8)",
"product_id": "criu-devel-3.15-3.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/criu-devel@3.15-3.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=s390x\u0026rpmmod=container-tools:rhel8:8060020240413110723:3b538bd8"
}
}
},
{
"category": "product_version",
"name": "criu-libs-3.15-3.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"product": {
"name": "criu-libs-3.15-3.module+el8.6.0+21266+3e24c7b3.s390x.rpm (container-tools:rhel8)",
"product_id": "criu-libs-3.15-3.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/criu-libs@3.15-3.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=s390x\u0026rpmmod=container-tools:rhel8:8060020240413110723:3b538bd8"
}
}
},
{
"category": "product_version",
"name": "criu-libs-debuginfo-3.15-3.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"product": {
"name": "criu-libs-debuginfo-3.15-3.module+el8.6.0+21266+3e24c7b3.s390x.rpm (container-tools:rhel8)",
"product_id": "criu-libs-debuginfo-3.15-3.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/criu-libs-debuginfo@3.15-3.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=s390x\u0026rpmmod=container-tools:rhel8:8060020240413110723:3b538bd8"
}
}
},
{
"category": "product_version",
"name": "crun-1.5-1.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"product": {
"name": "crun-1.5-1.module+el8.6.0+21266+3e24c7b3.s390x.rpm (container-tools:rhel8)",
"product_id": "crun-1.5-1.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/crun@1.5-1.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=s390x\u0026rpmmod=container-tools:rhel8:8060020240413110723:3b538bd8"
}
}
},
{
"category": "product_version",
"name": "crun-debuginfo-1.5-1.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"product": {
"name": "crun-debuginfo-1.5-1.module+el8.6.0+21266+3e24c7b3.s390x.rpm (container-tools:rhel8)",
"product_id": "crun-debuginfo-1.5-1.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/crun-debuginfo@1.5-1.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=s390x\u0026rpmmod=container-tools:rhel8:8060020240413110723:3b538bd8"
}
}
},
{
"category": "product_version",
"name": "crun-debugsource-1.5-1.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"product": {
"name": "crun-debugsource-1.5-1.module+el8.6.0+21266+3e24c7b3.s390x.rpm (container-tools:rhel8)",
"product_id": "crun-debugsource-1.5-1.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/crun-debugsource@1.5-1.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=s390x\u0026rpmmod=container-tools:rhel8:8060020240413110723:3b538bd8"
}
}
},
{
"category": "product_version",
"name": "fuse-overlayfs-1.9-1.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"product": {
"name": "fuse-overlayfs-1.9-1.module+el8.6.0+21266+3e24c7b3.s390x.rpm (container-tools:rhel8)",
"product_id": "fuse-overlayfs-1.9-1.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fuse-overlayfs@1.9-1.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=s390x\u0026rpmmod=container-tools:rhel8:8060020240413110723:3b538bd8"
}
}
},
{
"category": "product_version",
"name": "fuse-overlayfs-debuginfo-1.9-1.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"product": {
"name": "fuse-overlayfs-debuginfo-1.9-1.module+el8.6.0+21266+3e24c7b3.s390x.rpm (container-tools:rhel8)",
"product_id": "fuse-overlayfs-debuginfo-1.9-1.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fuse-overlayfs-debuginfo@1.9-1.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=s390x\u0026rpmmod=container-tools:rhel8:8060020240413110723:3b538bd8"
}
}
},
{
"category": "product_version",
"name": "fuse-overlayfs-debugsource-1.9-1.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"product": {
"name": "fuse-overlayfs-debugsource-1.9-1.module+el8.6.0+21266+3e24c7b3.s390x.rpm (container-tools:rhel8)",
"product_id": "fuse-overlayfs-debugsource-1.9-1.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fuse-overlayfs-debugsource@1.9-1.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=s390x\u0026rpmmod=container-tools:rhel8:8060020240413110723:3b538bd8"
}
}
},
{
"category": "product_version",
"name": "libslirp-4.4.0-1.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"product": {
"name": "libslirp-4.4.0-1.module+el8.6.0+21266+3e24c7b3.s390x.rpm (container-tools:rhel8)",
"product_id": "libslirp-4.4.0-1.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libslirp@4.4.0-1.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=s390x\u0026rpmmod=container-tools:rhel8:8060020240413110723:3b538bd8"
}
}
},
{
"category": "product_version",
"name": "libslirp-debuginfo-4.4.0-1.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"product": {
"name": "libslirp-debuginfo-4.4.0-1.module+el8.6.0+21266+3e24c7b3.s390x.rpm (container-tools:rhel8)",
"product_id": "libslirp-debuginfo-4.4.0-1.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libslirp-debuginfo@4.4.0-1.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=s390x\u0026rpmmod=container-tools:rhel8:8060020240413110723:3b538bd8"
}
}
},
{
"category": "product_version",
"name": "libslirp-debugsource-4.4.0-1.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"product": {
"name": "libslirp-debugsource-4.4.0-1.module+el8.6.0+21266+3e24c7b3.s390x.rpm (container-tools:rhel8)",
"product_id": "libslirp-debugsource-4.4.0-1.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libslirp-debugsource@4.4.0-1.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=s390x\u0026rpmmod=container-tools:rhel8:8060020240413110723:3b538bd8"
}
}
},
{
"category": "product_version",
"name": "libslirp-devel-4.4.0-1.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"product": {
"name": "libslirp-devel-4.4.0-1.module+el8.6.0+21266+3e24c7b3.s390x.rpm (container-tools:rhel8)",
"product_id": "libslirp-devel-4.4.0-1.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libslirp-devel@4.4.0-1.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=s390x\u0026rpmmod=container-tools:rhel8:8060020240413110723:3b538bd8"
}
}
},
{
"category": "product_version",
"name": "netavark-1.0.1-40.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"product": {
"name": "netavark-1.0.1-40.module+el8.6.0+21266+3e24c7b3.s390x.rpm (container-tools:rhel8)",
"product_id": "netavark-1.0.1-40.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/netavark@1.0.1-40.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=s390x\u0026epoch=2\u0026rpmmod=container-tools:rhel8:8060020240413110723:3b538bd8"
}
}
},
{
"category": "product_version",
"name": "oci-seccomp-bpf-hook-1.2.6-1.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"product": {
"name": "oci-seccomp-bpf-hook-1.2.6-1.module+el8.6.0+21266+3e24c7b3.s390x.rpm (container-tools:rhel8)",
"product_id": "oci-seccomp-bpf-hook-1.2.6-1.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/oci-seccomp-bpf-hook@1.2.6-1.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=s390x\u0026rpmmod=container-tools:rhel8:8060020240413110723:3b538bd8"
}
}
},
{
"category": "product_version",
"name": "oci-seccomp-bpf-hook-debuginfo-1.2.6-1.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"product": {
"name": "oci-seccomp-bpf-hook-debuginfo-1.2.6-1.module+el8.6.0+21266+3e24c7b3.s390x.rpm (container-tools:rhel8)",
"product_id": "oci-seccomp-bpf-hook-debuginfo-1.2.6-1.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/oci-seccomp-bpf-hook-debuginfo@1.2.6-1.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=s390x\u0026rpmmod=container-tools:rhel8:8060020240413110723:3b538bd8"
}
}
},
{
"category": "product_version",
"name": "oci-seccomp-bpf-hook-debugsource-1.2.6-1.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"product": {
"name": "oci-seccomp-bpf-hook-debugsource-1.2.6-1.module+el8.6.0+21266+3e24c7b3.s390x.rpm (container-tools:rhel8)",
"product_id": "oci-seccomp-bpf-hook-debugsource-1.2.6-1.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/oci-seccomp-bpf-hook-debugsource@1.2.6-1.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=s390x\u0026rpmmod=container-tools:rhel8:8060020240413110723:3b538bd8"
}
}
},
{
"category": "product_version",
"name": "podman-4.2.0-2.module+el8.6.0+21674+8010760f.s390x.rpm-container-tools:rhel8",
"product": {
"name": "podman-4.2.0-2.module+el8.6.0+21674+8010760f.s390x.rpm (container-tools:rhel8)",
"product_id": "podman-4.2.0-2.module+el8.6.0+21674+8010760f.s390x.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman@4.2.0-2.module%2Bel8.6.0%2B21674%2B8010760f?arch=s390x\u0026epoch=2\u0026rpmmod=container-tools:rhel8:8060020240413110723:3b538bd8"
}
}
},
{
"category": "product_version",
"name": "podman-catatonit-4.2.0-2.module+el8.6.0+21674+8010760f.s390x.rpm-container-tools:rhel8",
"product": {
"name": "podman-catatonit-4.2.0-2.module+el8.6.0+21674+8010760f.s390x.rpm (container-tools:rhel8)",
"product_id": "podman-catatonit-4.2.0-2.module+el8.6.0+21674+8010760f.s390x.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-catatonit@4.2.0-2.module%2Bel8.6.0%2B21674%2B8010760f?arch=s390x\u0026epoch=2\u0026rpmmod=container-tools:rhel8:8060020240413110723:3b538bd8"
}
}
},
{
"category": "product_version",
"name": "podman-catatonit-debuginfo-4.2.0-2.module+el8.6.0+21674+8010760f.s390x.rpm-container-tools:rhel8",
"product": {
"name": "podman-catatonit-debuginfo-4.2.0-2.module+el8.6.0+21674+8010760f.s390x.rpm (container-tools:rhel8)",
"product_id": "podman-catatonit-debuginfo-4.2.0-2.module+el8.6.0+21674+8010760f.s390x.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-catatonit-debuginfo@4.2.0-2.module%2Bel8.6.0%2B21674%2B8010760f?arch=s390x\u0026epoch=2\u0026rpmmod=container-tools:rhel8:8060020240413110723:3b538bd8"
}
}
},
{
"category": "product_version",
"name": "podman-debuginfo-4.2.0-2.module+el8.6.0+21674+8010760f.s390x.rpm-container-tools:rhel8",
"product": {
"name": "podman-debuginfo-4.2.0-2.module+el8.6.0+21674+8010760f.s390x.rpm (container-tools:rhel8)",
"product_id": "podman-debuginfo-4.2.0-2.module+el8.6.0+21674+8010760f.s390x.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-debuginfo@4.2.0-2.module%2Bel8.6.0%2B21674%2B8010760f?arch=s390x\u0026epoch=2\u0026rpmmod=container-tools:rhel8:8060020240413110723:3b538bd8"
}
}
},
{
"category": "product_version",
"name": "podman-debugsource-4.2.0-2.module+el8.6.0+21674+8010760f.s390x.rpm-container-tools:rhel8",
"product": {
"name": "podman-debugsource-4.2.0-2.module+el8.6.0+21674+8010760f.s390x.rpm (container-tools:rhel8)",
"product_id": "podman-debugsource-4.2.0-2.module+el8.6.0+21674+8010760f.s390x.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-debugsource@4.2.0-2.module%2Bel8.6.0%2B21674%2B8010760f?arch=s390x\u0026epoch=2\u0026rpmmod=container-tools:rhel8:8060020240413110723:3b538bd8"
}
}
},
{
"category": "product_version",
"name": "podman-gvproxy-4.2.0-2.module+el8.6.0+21674+8010760f.s390x.rpm-container-tools:rhel8",
"product": {
"name": "podman-gvproxy-4.2.0-2.module+el8.6.0+21674+8010760f.s390x.rpm (container-tools:rhel8)",
"product_id": "podman-gvproxy-4.2.0-2.module+el8.6.0+21674+8010760f.s390x.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-gvproxy@4.2.0-2.module%2Bel8.6.0%2B21674%2B8010760f?arch=s390x\u0026epoch=2\u0026rpmmod=container-tools:rhel8:8060020240413110723:3b538bd8"
}
}
},
{
"category": "product_version",
"name": "podman-gvproxy-debuginfo-4.2.0-2.module+el8.6.0+21674+8010760f.s390x.rpm-container-tools:rhel8",
"product": {
"name": "podman-gvproxy-debuginfo-4.2.0-2.module+el8.6.0+21674+8010760f.s390x.rpm (container-tools:rhel8)",
"product_id": "podman-gvproxy-debuginfo-4.2.0-2.module+el8.6.0+21674+8010760f.s390x.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-gvproxy-debuginfo@4.2.0-2.module%2Bel8.6.0%2B21674%2B8010760f?arch=s390x\u0026epoch=2\u0026rpmmod=container-tools:rhel8:8060020240413110723:3b538bd8"
}
}
},
{
"category": "product_version",
"name": "podman-plugins-4.2.0-2.module+el8.6.0+21674+8010760f.s390x.rpm-container-tools:rhel8",
"product": {
"name": "podman-plugins-4.2.0-2.module+el8.6.0+21674+8010760f.s390x.rpm (container-tools:rhel8)",
"product_id": "podman-plugins-4.2.0-2.module+el8.6.0+21674+8010760f.s390x.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-plugins@4.2.0-2.module%2Bel8.6.0%2B21674%2B8010760f?arch=s390x\u0026epoch=2\u0026rpmmod=container-tools:rhel8:8060020240413110723:3b538bd8"
}
}
},
{
"category": "product_version",
"name": "podman-plugins-debuginfo-4.2.0-2.module+el8.6.0+21674+8010760f.s390x.rpm-container-tools:rhel8",
"product": {
"name": "podman-plugins-debuginfo-4.2.0-2.module+el8.6.0+21674+8010760f.s390x.rpm (container-tools:rhel8)",
"product_id": "podman-plugins-debuginfo-4.2.0-2.module+el8.6.0+21674+8010760f.s390x.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-plugins-debuginfo@4.2.0-2.module%2Bel8.6.0%2B21674%2B8010760f?arch=s390x\u0026epoch=2\u0026rpmmod=container-tools:rhel8:8060020240413110723:3b538bd8"
}
}
},
{
"category": "product_version",
"name": "podman-remote-4.2.0-2.module+el8.6.0+21674+8010760f.s390x.rpm-container-tools:rhel8",
"product": {
"name": "podman-remote-4.2.0-2.module+el8.6.0+21674+8010760f.s390x.rpm (container-tools:rhel8)",
"product_id": "podman-remote-4.2.0-2.module+el8.6.0+21674+8010760f.s390x.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-remote@4.2.0-2.module%2Bel8.6.0%2B21674%2B8010760f?arch=s390x\u0026epoch=2\u0026rpmmod=container-tools:rhel8:8060020240413110723:3b538bd8"
}
}
},
{
"category": "product_version",
"name": "podman-remote-debuginfo-4.2.0-2.module+el8.6.0+21674+8010760f.s390x.rpm-container-tools:rhel8",
"product": {
"name": "podman-remote-debuginfo-4.2.0-2.module+el8.6.0+21674+8010760f.s390x.rpm (container-tools:rhel8)",
"product_id": "podman-remote-debuginfo-4.2.0-2.module+el8.6.0+21674+8010760f.s390x.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-remote-debuginfo@4.2.0-2.module%2Bel8.6.0%2B21674%2B8010760f?arch=s390x\u0026epoch=2\u0026rpmmod=container-tools:rhel8:8060020240413110723:3b538bd8"
}
}
},
{
"category": "product_version",
"name": "podman-tests-4.2.0-2.module+el8.6.0+21674+8010760f.s390x.rpm-container-tools:rhel8",
"product": {
"name": "podman-tests-4.2.0-2.module+el8.6.0+21674+8010760f.s390x.rpm (container-tools:rhel8)",
"product_id": "podman-tests-4.2.0-2.module+el8.6.0+21674+8010760f.s390x.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-tests@4.2.0-2.module%2Bel8.6.0%2B21674%2B8010760f?arch=s390x\u0026epoch=2\u0026rpmmod=container-tools:rhel8:8060020240413110723:3b538bd8"
}
}
},
{
"category": "product_version",
"name": "python3-criu-3.15-3.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"product": {
"name": "python3-criu-3.15-3.module+el8.6.0+21266+3e24c7b3.s390x.rpm (container-tools:rhel8)",
"product_id": "python3-criu-3.15-3.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-criu@3.15-3.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=s390x\u0026rpmmod=container-tools:rhel8:8060020240413110723:3b538bd8"
}
}
},
{
"category": "product_version",
"name": "runc-1.1.12-1.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"product": {
"name": "runc-1.1.12-1.module+el8.6.0+21266+3e24c7b3.s390x.rpm (container-tools:rhel8)",
"product_id": "runc-1.1.12-1.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/runc@1.1.12-1.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=s390x\u0026epoch=1\u0026rpmmod=container-tools:rhel8:8060020240413110723:3b538bd8"
}
}
},
{
"category": "product_version",
"name": "runc-debuginfo-1.1.12-1.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"product": {
"name": "runc-debuginfo-1.1.12-1.module+el8.6.0+21266+3e24c7b3.s390x.rpm (container-tools:rhel8)",
"product_id": "runc-debuginfo-1.1.12-1.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/runc-debuginfo@1.1.12-1.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=s390x\u0026epoch=1\u0026rpmmod=container-tools:rhel8:8060020240413110723:3b538bd8"
}
}
},
{
"category": "product_version",
"name": "runc-debugsource-1.1.12-1.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"product": {
"name": "runc-debugsource-1.1.12-1.module+el8.6.0+21266+3e24c7b3.s390x.rpm (container-tools:rhel8)",
"product_id": "runc-debugsource-1.1.12-1.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/runc-debugsource@1.1.12-1.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=s390x\u0026epoch=1\u0026rpmmod=container-tools:rhel8:8060020240413110723:3b538bd8"
}
}
},
{
"category": "product_version",
"name": "skopeo-1.9.1-1.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"product": {
"name": "skopeo-1.9.1-1.module+el8.6.0+21266+3e24c7b3.s390x.rpm (container-tools:rhel8)",
"product_id": "skopeo-1.9.1-1.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/skopeo@1.9.1-1.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=s390x\u0026epoch=2\u0026rpmmod=container-tools:rhel8:8060020240413110723:3b538bd8"
}
}
},
{
"category": "product_version",
"name": "skopeo-debuginfo-1.9.1-1.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"product": {
"name": "skopeo-debuginfo-1.9.1-1.module+el8.6.0+21266+3e24c7b3.s390x.rpm (container-tools:rhel8)",
"product_id": "skopeo-debuginfo-1.9.1-1.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/skopeo-debuginfo@1.9.1-1.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=s390x\u0026epoch=2\u0026rpmmod=container-tools:rhel8:8060020240413110723:3b538bd8"
}
}
},
{
"category": "product_version",
"name": "skopeo-debugsource-1.9.1-1.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"product": {
"name": "skopeo-debugsource-1.9.1-1.module+el8.6.0+21266+3e24c7b3.s390x.rpm (container-tools:rhel8)",
"product_id": "skopeo-debugsource-1.9.1-1.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/skopeo-debugsource@1.9.1-1.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=s390x\u0026epoch=2\u0026rpmmod=container-tools:rhel8:8060020240413110723:3b538bd8"
}
}
},
{
"category": "product_version",
"name": "skopeo-tests-1.9.1-1.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"product": {
"name": "skopeo-tests-1.9.1-1.module+el8.6.0+21266+3e24c7b3.s390x.rpm (container-tools:rhel8)",
"product_id": "skopeo-tests-1.9.1-1.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/skopeo-tests@1.9.1-1.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=s390x\u0026epoch=2\u0026rpmmod=container-tools:rhel8:8060020240413110723:3b538bd8"
}
}
},
{
"category": "product_version",
"name": "slirp4netns-1.2.0-3.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"product": {
"name": "slirp4netns-1.2.0-3.module+el8.6.0+21266+3e24c7b3.s390x.rpm (container-tools:rhel8)",
"product_id": "slirp4netns-1.2.0-3.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/slirp4netns@1.2.0-3.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=s390x\u0026rpmmod=container-tools:rhel8:8060020240413110723:3b538bd8"
}
}
},
{
"category": "product_version",
"name": "slirp4netns-debuginfo-1.2.0-3.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"product": {
"name": "slirp4netns-debuginfo-1.2.0-3.module+el8.6.0+21266+3e24c7b3.s390x.rpm (container-tools:rhel8)",
"product_id": "slirp4netns-debuginfo-1.2.0-3.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/slirp4netns-debuginfo@1.2.0-3.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=s390x\u0026rpmmod=container-tools:rhel8:8060020240413110723:3b538bd8"
}
}
},
{
"category": "product_version",
"name": "slirp4netns-debugsource-1.2.0-3.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"product": {
"name": "slirp4netns-debugsource-1.2.0-3.module+el8.6.0+21266+3e24c7b3.s390x.rpm (container-tools:rhel8)",
"product_id": "slirp4netns-debugsource-1.2.0-3.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/slirp4netns-debugsource@1.2.0-3.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=s390x\u0026rpmmod=container-tools:rhel8:8060020240413110723:3b538bd8"
}
}
},
{
"category": "product_version",
"name": "toolbox-0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"product": {
"name": "toolbox-0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.s390x.rpm (container-tools:rhel8)",
"product_id": "toolbox-0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/toolbox@0.0.99.3-0.7.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=s390x\u0026rpmmod=container-tools:rhel8:8060020240413110723:3b538bd8"
}
}
},
{
"category": "product_version",
"name": "toolbox-debuginfo-0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"product": {
"name": "toolbox-debuginfo-0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.s390x.rpm (container-tools:rhel8)",
"product_id": "toolbox-debuginfo-0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/toolbox-debuginfo@0.0.99.3-0.7.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=s390x\u0026rpmmod=container-tools:rhel8:8060020240413110723:3b538bd8"
}
}
},
{
"category": "product_version",
"name": "toolbox-debugsource-0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"product": {
"name": "toolbox-debugsource-0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.s390x.rpm (container-tools:rhel8)",
"product_id": "toolbox-debugsource-0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/toolbox-debugsource@0.0.99.3-0.7.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=s390x\u0026rpmmod=container-tools:rhel8:8060020240413110723:3b538bd8"
}
}
},
{
"category": "product_version",
"name": "toolbox-tests-0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"product": {
"name": "toolbox-tests-0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.s390x.rpm (container-tools:rhel8)",
"product_id": "toolbox-tests-0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/toolbox-tests@0.0.99.3-0.7.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=s390x\u0026rpmmod=container-tools:rhel8:8060020240413110723:3b538bd8"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "aardvark-dns-1.0.1-40.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"product": {
"name": "aardvark-dns-1.0.1-40.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm (container-tools:rhel8)",
"product_id": "aardvark-dns-1.0.1-40.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/aardvark-dns@1.0.1-40.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=ppc64le\u0026epoch=2\u0026rpmmod=container-tools:rhel8:8060020240413110723:3b538bd8"
}
}
},
{
"category": "product_version",
"name": "buildah-1.26.2-1.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"product": {
"name": "buildah-1.26.2-1.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm (container-tools:rhel8)",
"product_id": "buildah-1.26.2-1.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/buildah@1.26.2-1.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=ppc64le\u0026epoch=1\u0026rpmmod=container-tools:rhel8:8060020240413110723:3b538bd8"
}
}
},
{
"category": "product_version",
"name": "buildah-debuginfo-1.26.2-1.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"product": {
"name": "buildah-debuginfo-1.26.2-1.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm (container-tools:rhel8)",
"product_id": "buildah-debuginfo-1.26.2-1.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/buildah-debuginfo@1.26.2-1.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=ppc64le\u0026epoch=1\u0026rpmmod=container-tools:rhel8:8060020240413110723:3b538bd8"
}
}
},
{
"category": "product_version",
"name": "buildah-debugsource-1.26.2-1.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"product": {
"name": "buildah-debugsource-1.26.2-1.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm (container-tools:rhel8)",
"product_id": "buildah-debugsource-1.26.2-1.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/buildah-debugsource@1.26.2-1.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=ppc64le\u0026epoch=1\u0026rpmmod=container-tools:rhel8:8060020240413110723:3b538bd8"
}
}
},
{
"category": "product_version",
"name": "buildah-tests-1.26.2-1.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"product": {
"name": "buildah-tests-1.26.2-1.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm (container-tools:rhel8)",
"product_id": "buildah-tests-1.26.2-1.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/buildah-tests@1.26.2-1.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=ppc64le\u0026epoch=1\u0026rpmmod=container-tools:rhel8:8060020240413110723:3b538bd8"
}
}
},
{
"category": "product_version",
"name": "buildah-tests-debuginfo-1.26.2-1.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"product": {
"name": "buildah-tests-debuginfo-1.26.2-1.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm (container-tools:rhel8)",
"product_id": "buildah-tests-debuginfo-1.26.2-1.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/buildah-tests-debuginfo@1.26.2-1.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=ppc64le\u0026epoch=1\u0026rpmmod=container-tools:rhel8:8060020240413110723:3b538bd8"
}
}
},
{
"category": "product_version",
"name": "conmon-2.1.4-1.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"product": {
"name": "conmon-2.1.4-1.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm (container-tools:rhel8)",
"product_id": "conmon-2.1.4-1.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/conmon@2.1.4-1.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=ppc64le\u0026epoch=2\u0026rpmmod=container-tools:rhel8:8060020240413110723:3b538bd8"
}
}
},
{
"category": "product_version",
"name": "conmon-debuginfo-2.1.4-1.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"product": {
"name": "conmon-debuginfo-2.1.4-1.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm (container-tools:rhel8)",
"product_id": "conmon-debuginfo-2.1.4-1.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/conmon-debuginfo@2.1.4-1.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=ppc64le\u0026epoch=2\u0026rpmmod=container-tools:rhel8:8060020240413110723:3b538bd8"
}
}
},
{
"category": "product_version",
"name": "conmon-debugsource-2.1.4-1.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"product": {
"name": "conmon-debugsource-2.1.4-1.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm (container-tools:rhel8)",
"product_id": "conmon-debugsource-2.1.4-1.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/conmon-debugsource@2.1.4-1.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=ppc64le\u0026epoch=2\u0026rpmmod=container-tools:rhel8:8060020240413110723:3b538bd8"
}
}
},
{
"category": "product_version",
"name": "containernetworking-plugins-1.1.1-4.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"product": {
"name": "containernetworking-plugins-1.1.1-4.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm (container-tools:rhel8)",
"product_id": "containernetworking-plugins-1.1.1-4.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/containernetworking-plugins@1.1.1-4.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=ppc64le\u0026epoch=1\u0026rpmmod=container-tools:rhel8:8060020240413110723:3b538bd8"
}
}
},
{
"category": "product_version",
"name": "containernetworking-plugins-debuginfo-1.1.1-4.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"product": {
"name": "containernetworking-plugins-debuginfo-1.1.1-4.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm (container-tools:rhel8)",
"product_id": "containernetworking-plugins-debuginfo-1.1.1-4.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/containernetworking-plugins-debuginfo@1.1.1-4.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=ppc64le\u0026epoch=1\u0026rpmmod=container-tools:rhel8:8060020240413110723:3b538bd8"
}
}
},
{
"category": "product_version",
"name": "containernetworking-plugins-debugsource-1.1.1-4.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"product": {
"name": "containernetworking-plugins-debugsource-1.1.1-4.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm (container-tools:rhel8)",
"product_id": "containernetworking-plugins-debugsource-1.1.1-4.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/containernetworking-plugins-debugsource@1.1.1-4.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=ppc64le\u0026epoch=1\u0026rpmmod=container-tools:rhel8:8060020240413110723:3b538bd8"
}
}
},
{
"category": "product_version",
"name": "containers-common-1-40.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"product": {
"name": "containers-common-1-40.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm (container-tools:rhel8)",
"product_id": "containers-common-1-40.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/containers-common@1-40.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=ppc64le\u0026epoch=2\u0026rpmmod=container-tools:rhel8:8060020240413110723:3b538bd8"
}
}
},
{
"category": "product_version",
"name": "crit-3.15-3.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"product": {
"name": "crit-3.15-3.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm (container-tools:rhel8)",
"product_id": "crit-3.15-3.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/crit@3.15-3.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=ppc64le\u0026rpmmod=container-tools:rhel8:8060020240413110723:3b538bd8"
}
}
},
{
"category": "product_version",
"name": "criu-3.15-3.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"product": {
"name": "criu-3.15-3.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm (container-tools:rhel8)",
"product_id": "criu-3.15-3.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/criu@3.15-3.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=ppc64le\u0026rpmmod=container-tools:rhel8:8060020240413110723:3b538bd8"
}
}
},
{
"category": "product_version",
"name": "criu-debuginfo-3.15-3.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"product": {
"name": "criu-debuginfo-3.15-3.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm (container-tools:rhel8)",
"product_id": "criu-debuginfo-3.15-3.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/criu-debuginfo@3.15-3.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=ppc64le\u0026rpmmod=container-tools:rhel8:8060020240413110723:3b538bd8"
}
}
},
{
"category": "product_version",
"name": "criu-debugsource-3.15-3.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"product": {
"name": "criu-debugsource-3.15-3.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm (container-tools:rhel8)",
"product_id": "criu-debugsource-3.15-3.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/criu-debugsource@3.15-3.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=ppc64le\u0026rpmmod=container-tools:rhel8:8060020240413110723:3b538bd8"
}
}
},
{
"category": "product_version",
"name": "criu-devel-3.15-3.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"product": {
"name": "criu-devel-3.15-3.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm (container-tools:rhel8)",
"product_id": "criu-devel-3.15-3.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/criu-devel@3.15-3.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=ppc64le\u0026rpmmod=container-tools:rhel8:8060020240413110723:3b538bd8"
}
}
},
{
"category": "product_version",
"name": "criu-libs-3.15-3.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"product": {
"name": "criu-libs-3.15-3.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm (container-tools:rhel8)",
"product_id": "criu-libs-3.15-3.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/criu-libs@3.15-3.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=ppc64le\u0026rpmmod=container-tools:rhel8:8060020240413110723:3b538bd8"
}
}
},
{
"category": "product_version",
"name": "criu-libs-debuginfo-3.15-3.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"product": {
"name": "criu-libs-debuginfo-3.15-3.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm (container-tools:rhel8)",
"product_id": "criu-libs-debuginfo-3.15-3.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/criu-libs-debuginfo@3.15-3.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=ppc64le\u0026rpmmod=container-tools:rhel8:8060020240413110723:3b538bd8"
}
}
},
{
"category": "product_version",
"name": "crun-1.5-1.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"product": {
"name": "crun-1.5-1.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm (container-tools:rhel8)",
"product_id": "crun-1.5-1.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/crun@1.5-1.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=ppc64le\u0026rpmmod=container-tools:rhel8:8060020240413110723:3b538bd8"
}
}
},
{
"category": "product_version",
"name": "crun-debuginfo-1.5-1.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"product": {
"name": "crun-debuginfo-1.5-1.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm (container-tools:rhel8)",
"product_id": "crun-debuginfo-1.5-1.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/crun-debuginfo@1.5-1.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=ppc64le\u0026rpmmod=container-tools:rhel8:8060020240413110723:3b538bd8"
}
}
},
{
"category": "product_version",
"name": "crun-debugsource-1.5-1.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"product": {
"name": "crun-debugsource-1.5-1.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm (container-tools:rhel8)",
"product_id": "crun-debugsource-1.5-1.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/crun-debugsource@1.5-1.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=ppc64le\u0026rpmmod=container-tools:rhel8:8060020240413110723:3b538bd8"
}
}
},
{
"category": "product_version",
"name": "fuse-overlayfs-1.9-1.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"product": {
"name": "fuse-overlayfs-1.9-1.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm (container-tools:rhel8)",
"product_id": "fuse-overlayfs-1.9-1.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fuse-overlayfs@1.9-1.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=ppc64le\u0026rpmmod=container-tools:rhel8:8060020240413110723:3b538bd8"
}
}
},
{
"category": "product_version",
"name": "fuse-overlayfs-debuginfo-1.9-1.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"product": {
"name": "fuse-overlayfs-debuginfo-1.9-1.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm (container-tools:rhel8)",
"product_id": "fuse-overlayfs-debuginfo-1.9-1.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fuse-overlayfs-debuginfo@1.9-1.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=ppc64le\u0026rpmmod=container-tools:rhel8:8060020240413110723:3b538bd8"
}
}
},
{
"category": "product_version",
"name": "fuse-overlayfs-debugsource-1.9-1.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"product": {
"name": "fuse-overlayfs-debugsource-1.9-1.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm (container-tools:rhel8)",
"product_id": "fuse-overlayfs-debugsource-1.9-1.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fuse-overlayfs-debugsource@1.9-1.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=ppc64le\u0026rpmmod=container-tools:rhel8:8060020240413110723:3b538bd8"
}
}
},
{
"category": "product_version",
"name": "libslirp-4.4.0-1.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"product": {
"name": "libslirp-4.4.0-1.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm (container-tools:rhel8)",
"product_id": "libslirp-4.4.0-1.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libslirp@4.4.0-1.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=ppc64le\u0026rpmmod=container-tools:rhel8:8060020240413110723:3b538bd8"
}
}
},
{
"category": "product_version",
"name": "libslirp-debuginfo-4.4.0-1.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"product": {
"name": "libslirp-debuginfo-4.4.0-1.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm (container-tools:rhel8)",
"product_id": "libslirp-debuginfo-4.4.0-1.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libslirp-debuginfo@4.4.0-1.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=ppc64le\u0026rpmmod=container-tools:rhel8:8060020240413110723:3b538bd8"
}
}
},
{
"category": "product_version",
"name": "libslirp-debugsource-4.4.0-1.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"product": {
"name": "libslirp-debugsource-4.4.0-1.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm (container-tools:rhel8)",
"product_id": "libslirp-debugsource-4.4.0-1.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libslirp-debugsource@4.4.0-1.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=ppc64le\u0026rpmmod=container-tools:rhel8:8060020240413110723:3b538bd8"
}
}
},
{
"category": "product_version",
"name": "libslirp-devel-4.4.0-1.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"product": {
"name": "libslirp-devel-4.4.0-1.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm (container-tools:rhel8)",
"product_id": "libslirp-devel-4.4.0-1.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libslirp-devel@4.4.0-1.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=ppc64le\u0026rpmmod=container-tools:rhel8:8060020240413110723:3b538bd8"
}
}
},
{
"category": "product_version",
"name": "netavark-1.0.1-40.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"product": {
"name": "netavark-1.0.1-40.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm (container-tools:rhel8)",
"product_id": "netavark-1.0.1-40.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/netavark@1.0.1-40.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=ppc64le\u0026epoch=2\u0026rpmmod=container-tools:rhel8:8060020240413110723:3b538bd8"
}
}
},
{
"category": "product_version",
"name": "oci-seccomp-bpf-hook-1.2.6-1.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"product": {
"name": "oci-seccomp-bpf-hook-1.2.6-1.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm (container-tools:rhel8)",
"product_id": "oci-seccomp-bpf-hook-1.2.6-1.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/oci-seccomp-bpf-hook@1.2.6-1.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=ppc64le\u0026rpmmod=container-tools:rhel8:8060020240413110723:3b538bd8"
}
}
},
{
"category": "product_version",
"name": "oci-seccomp-bpf-hook-debuginfo-1.2.6-1.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"product": {
"name": "oci-seccomp-bpf-hook-debuginfo-1.2.6-1.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm (container-tools:rhel8)",
"product_id": "oci-seccomp-bpf-hook-debuginfo-1.2.6-1.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/oci-seccomp-bpf-hook-debuginfo@1.2.6-1.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=ppc64le\u0026rpmmod=container-tools:rhel8:8060020240413110723:3b538bd8"
}
}
},
{
"category": "product_version",
"name": "oci-seccomp-bpf-hook-debugsource-1.2.6-1.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"product": {
"name": "oci-seccomp-bpf-hook-debugsource-1.2.6-1.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm (container-tools:rhel8)",
"product_id": "oci-seccomp-bpf-hook-debugsource-1.2.6-1.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/oci-seccomp-bpf-hook-debugsource@1.2.6-1.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=ppc64le\u0026rpmmod=container-tools:rhel8:8060020240413110723:3b538bd8"
}
}
},
{
"category": "product_version",
"name": "podman-4.2.0-2.module+el8.6.0+21674+8010760f.ppc64le.rpm-container-tools:rhel8",
"product": {
"name": "podman-4.2.0-2.module+el8.6.0+21674+8010760f.ppc64le.rpm (container-tools:rhel8)",
"product_id": "podman-4.2.0-2.module+el8.6.0+21674+8010760f.ppc64le.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman@4.2.0-2.module%2Bel8.6.0%2B21674%2B8010760f?arch=ppc64le\u0026epoch=2\u0026rpmmod=container-tools:rhel8:8060020240413110723:3b538bd8"
}
}
},
{
"category": "product_version",
"name": "podman-catatonit-4.2.0-2.module+el8.6.0+21674+8010760f.ppc64le.rpm-container-tools:rhel8",
"product": {
"name": "podman-catatonit-4.2.0-2.module+el8.6.0+21674+8010760f.ppc64le.rpm (container-tools:rhel8)",
"product_id": "podman-catatonit-4.2.0-2.module+el8.6.0+21674+8010760f.ppc64le.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-catatonit@4.2.0-2.module%2Bel8.6.0%2B21674%2B8010760f?arch=ppc64le\u0026epoch=2\u0026rpmmod=container-tools:rhel8:8060020240413110723:3b538bd8"
}
}
},
{
"category": "product_version",
"name": "podman-catatonit-debuginfo-4.2.0-2.module+el8.6.0+21674+8010760f.ppc64le.rpm-container-tools:rhel8",
"product": {
"name": "podman-catatonit-debuginfo-4.2.0-2.module+el8.6.0+21674+8010760f.ppc64le.rpm (container-tools:rhel8)",
"product_id": "podman-catatonit-debuginfo-4.2.0-2.module+el8.6.0+21674+8010760f.ppc64le.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-catatonit-debuginfo@4.2.0-2.module%2Bel8.6.0%2B21674%2B8010760f?arch=ppc64le\u0026epoch=2\u0026rpmmod=container-tools:rhel8:8060020240413110723:3b538bd8"
}
}
},
{
"category": "product_version",
"name": "podman-debuginfo-4.2.0-2.module+el8.6.0+21674+8010760f.ppc64le.rpm-container-tools:rhel8",
"product": {
"name": "podman-debuginfo-4.2.0-2.module+el8.6.0+21674+8010760f.ppc64le.rpm (container-tools:rhel8)",
"product_id": "podman-debuginfo-4.2.0-2.module+el8.6.0+21674+8010760f.ppc64le.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-debuginfo@4.2.0-2.module%2Bel8.6.0%2B21674%2B8010760f?arch=ppc64le\u0026epoch=2\u0026rpmmod=container-tools:rhel8:8060020240413110723:3b538bd8"
}
}
},
{
"category": "product_version",
"name": "podman-debugsource-4.2.0-2.module+el8.6.0+21674+8010760f.ppc64le.rpm-container-tools:rhel8",
"product": {
"name": "podman-debugsource-4.2.0-2.module+el8.6.0+21674+8010760f.ppc64le.rpm (container-tools:rhel8)",
"product_id": "podman-debugsource-4.2.0-2.module+el8.6.0+21674+8010760f.ppc64le.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-debugsource@4.2.0-2.module%2Bel8.6.0%2B21674%2B8010760f?arch=ppc64le\u0026epoch=2\u0026rpmmod=container-tools:rhel8:8060020240413110723:3b538bd8"
}
}
},
{
"category": "product_version",
"name": "podman-gvproxy-4.2.0-2.module+el8.6.0+21674+8010760f.ppc64le.rpm-container-tools:rhel8",
"product": {
"name": "podman-gvproxy-4.2.0-2.module+el8.6.0+21674+8010760f.ppc64le.rpm (container-tools:rhel8)",
"product_id": "podman-gvproxy-4.2.0-2.module+el8.6.0+21674+8010760f.ppc64le.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-gvproxy@4.2.0-2.module%2Bel8.6.0%2B21674%2B8010760f?arch=ppc64le\u0026epoch=2\u0026rpmmod=container-tools:rhel8:8060020240413110723:3b538bd8"
}
}
},
{
"category": "product_version",
"name": "podman-gvproxy-debuginfo-4.2.0-2.module+el8.6.0+21674+8010760f.ppc64le.rpm-container-tools:rhel8",
"product": {
"name": "podman-gvproxy-debuginfo-4.2.0-2.module+el8.6.0+21674+8010760f.ppc64le.rpm (container-tools:rhel8)",
"product_id": "podman-gvproxy-debuginfo-4.2.0-2.module+el8.6.0+21674+8010760f.ppc64le.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-gvproxy-debuginfo@4.2.0-2.module%2Bel8.6.0%2B21674%2B8010760f?arch=ppc64le\u0026epoch=2\u0026rpmmod=container-tools:rhel8:8060020240413110723:3b538bd8"
}
}
},
{
"category": "product_version",
"name": "podman-plugins-4.2.0-2.module+el8.6.0+21674+8010760f.ppc64le.rpm-container-tools:rhel8",
"product": {
"name": "podman-plugins-4.2.0-2.module+el8.6.0+21674+8010760f.ppc64le.rpm (container-tools:rhel8)",
"product_id": "podman-plugins-4.2.0-2.module+el8.6.0+21674+8010760f.ppc64le.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-plugins@4.2.0-2.module%2Bel8.6.0%2B21674%2B8010760f?arch=ppc64le\u0026epoch=2\u0026rpmmod=container-tools:rhel8:8060020240413110723:3b538bd8"
}
}
},
{
"category": "product_version",
"name": "podman-plugins-debuginfo-4.2.0-2.module+el8.6.0+21674+8010760f.ppc64le.rpm-container-tools:rhel8",
"product": {
"name": "podman-plugins-debuginfo-4.2.0-2.module+el8.6.0+21674+8010760f.ppc64le.rpm (container-tools:rhel8)",
"product_id": "podman-plugins-debuginfo-4.2.0-2.module+el8.6.0+21674+8010760f.ppc64le.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-plugins-debuginfo@4.2.0-2.module%2Bel8.6.0%2B21674%2B8010760f?arch=ppc64le\u0026epoch=2\u0026rpmmod=container-tools:rhel8:8060020240413110723:3b538bd8"
}
}
},
{
"category": "product_version",
"name": "podman-remote-4.2.0-2.module+el8.6.0+21674+8010760f.ppc64le.rpm-container-tools:rhel8",
"product": {
"name": "podman-remote-4.2.0-2.module+el8.6.0+21674+8010760f.ppc64le.rpm (container-tools:rhel8)",
"product_id": "podman-remote-4.2.0-2.module+el8.6.0+21674+8010760f.ppc64le.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-remote@4.2.0-2.module%2Bel8.6.0%2B21674%2B8010760f?arch=ppc64le\u0026epoch=2\u0026rpmmod=container-tools:rhel8:8060020240413110723:3b538bd8"
}
}
},
{
"category": "product_version",
"name": "podman-remote-debuginfo-4.2.0-2.module+el8.6.0+21674+8010760f.ppc64le.rpm-container-tools:rhel8",
"product": {
"name": "podman-remote-debuginfo-4.2.0-2.module+el8.6.0+21674+8010760f.ppc64le.rpm (container-tools:rhel8)",
"product_id": "podman-remote-debuginfo-4.2.0-2.module+el8.6.0+21674+8010760f.ppc64le.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-remote-debuginfo@4.2.0-2.module%2Bel8.6.0%2B21674%2B8010760f?arch=ppc64le\u0026epoch=2\u0026rpmmod=container-tools:rhel8:8060020240413110723:3b538bd8"
}
}
},
{
"category": "product_version",
"name": "podman-tests-4.2.0-2.module+el8.6.0+21674+8010760f.ppc64le.rpm-container-tools:rhel8",
"product": {
"name": "podman-tests-4.2.0-2.module+el8.6.0+21674+8010760f.ppc64le.rpm (container-tools:rhel8)",
"product_id": "podman-tests-4.2.0-2.module+el8.6.0+21674+8010760f.ppc64le.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-tests@4.2.0-2.module%2Bel8.6.0%2B21674%2B8010760f?arch=ppc64le\u0026epoch=2\u0026rpmmod=container-tools:rhel8:8060020240413110723:3b538bd8"
}
}
},
{
"category": "product_version",
"name": "python3-criu-3.15-3.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"product": {
"name": "python3-criu-3.15-3.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm (container-tools:rhel8)",
"product_id": "python3-criu-3.15-3.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-criu@3.15-3.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=ppc64le\u0026rpmmod=container-tools:rhel8:8060020240413110723:3b538bd8"
}
}
},
{
"category": "product_version",
"name": "runc-1.1.12-1.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"product": {
"name": "runc-1.1.12-1.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm (container-tools:rhel8)",
"product_id": "runc-1.1.12-1.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/runc@1.1.12-1.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=ppc64le\u0026epoch=1\u0026rpmmod=container-tools:rhel8:8060020240413110723:3b538bd8"
}
}
},
{
"category": "product_version",
"name": "runc-debuginfo-1.1.12-1.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"product": {
"name": "runc-debuginfo-1.1.12-1.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm (container-tools:rhel8)",
"product_id": "runc-debuginfo-1.1.12-1.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/runc-debuginfo@1.1.12-1.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=ppc64le\u0026epoch=1\u0026rpmmod=container-tools:rhel8:8060020240413110723:3b538bd8"
}
}
},
{
"category": "product_version",
"name": "runc-debugsource-1.1.12-1.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"product": {
"name": "runc-debugsource-1.1.12-1.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm (container-tools:rhel8)",
"product_id": "runc-debugsource-1.1.12-1.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/runc-debugsource@1.1.12-1.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=ppc64le\u0026epoch=1\u0026rpmmod=container-tools:rhel8:8060020240413110723:3b538bd8"
}
}
},
{
"category": "product_version",
"name": "skopeo-1.9.1-1.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"product": {
"name": "skopeo-1.9.1-1.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm (container-tools:rhel8)",
"product_id": "skopeo-1.9.1-1.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/skopeo@1.9.1-1.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=ppc64le\u0026epoch=2\u0026rpmmod=container-tools:rhel8:8060020240413110723:3b538bd8"
}
}
},
{
"category": "product_version",
"name": "skopeo-debuginfo-1.9.1-1.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"product": {
"name": "skopeo-debuginfo-1.9.1-1.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm (container-tools:rhel8)",
"product_id": "skopeo-debuginfo-1.9.1-1.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/skopeo-debuginfo@1.9.1-1.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=ppc64le\u0026epoch=2\u0026rpmmod=container-tools:rhel8:8060020240413110723:3b538bd8"
}
}
},
{
"category": "product_version",
"name": "skopeo-debugsource-1.9.1-1.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"product": {
"name": "skopeo-debugsource-1.9.1-1.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm (container-tools:rhel8)",
"product_id": "skopeo-debugsource-1.9.1-1.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/skopeo-debugsource@1.9.1-1.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=ppc64le\u0026epoch=2\u0026rpmmod=container-tools:rhel8:8060020240413110723:3b538bd8"
}
}
},
{
"category": "product_version",
"name": "skopeo-tests-1.9.1-1.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"product": {
"name": "skopeo-tests-1.9.1-1.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm (container-tools:rhel8)",
"product_id": "skopeo-tests-1.9.1-1.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/skopeo-tests@1.9.1-1.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=ppc64le\u0026epoch=2\u0026rpmmod=container-tools:rhel8:8060020240413110723:3b538bd8"
}
}
},
{
"category": "product_version",
"name": "slirp4netns-1.2.0-3.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"product": {
"name": "slirp4netns-1.2.0-3.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm (container-tools:rhel8)",
"product_id": "slirp4netns-1.2.0-3.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/slirp4netns@1.2.0-3.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=ppc64le\u0026rpmmod=container-tools:rhel8:8060020240413110723:3b538bd8"
}
}
},
{
"category": "product_version",
"name": "slirp4netns-debuginfo-1.2.0-3.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"product": {
"name": "slirp4netns-debuginfo-1.2.0-3.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm (container-tools:rhel8)",
"product_id": "slirp4netns-debuginfo-1.2.0-3.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/slirp4netns-debuginfo@1.2.0-3.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=ppc64le\u0026rpmmod=container-tools:rhel8:8060020240413110723:3b538bd8"
}
}
},
{
"category": "product_version",
"name": "slirp4netns-debugsource-1.2.0-3.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"product": {
"name": "slirp4netns-debugsource-1.2.0-3.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm (container-tools:rhel8)",
"product_id": "slirp4netns-debugsource-1.2.0-3.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/slirp4netns-debugsource@1.2.0-3.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=ppc64le\u0026rpmmod=container-tools:rhel8:8060020240413110723:3b538bd8"
}
}
},
{
"category": "product_version",
"name": "toolbox-0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"product": {
"name": "toolbox-0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm (container-tools:rhel8)",
"product_id": "toolbox-0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/toolbox@0.0.99.3-0.7.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=ppc64le\u0026rpmmod=container-tools:rhel8:8060020240413110723:3b538bd8"
}
}
},
{
"category": "product_version",
"name": "toolbox-debuginfo-0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"product": {
"name": "toolbox-debuginfo-0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm (container-tools:rhel8)",
"product_id": "toolbox-debuginfo-0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/toolbox-debuginfo@0.0.99.3-0.7.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=ppc64le\u0026rpmmod=container-tools:rhel8:8060020240413110723:3b538bd8"
}
}
},
{
"category": "product_version",
"name": "toolbox-debugsource-0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"product": {
"name": "toolbox-debugsource-0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm (container-tools:rhel8)",
"product_id": "toolbox-debugsource-0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/toolbox-debugsource@0.0.99.3-0.7.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=ppc64le\u0026rpmmod=container-tools:rhel8:8060020240413110723:3b538bd8"
}
}
},
{
"category": "product_version",
"name": "toolbox-tests-0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"product": {
"name": "toolbox-tests-0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm (container-tools:rhel8)",
"product_id": "toolbox-tests-0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/toolbox-tests@0.0.99.3-0.7.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=ppc64le\u0026rpmmod=container-tools:rhel8:8060020240413110723:3b538bd8"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "aardvark-dns-1.0.1-40.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"product": {
"name": "aardvark-dns-1.0.1-40.module+el8.6.0+21266+3e24c7b3.aarch64.rpm (container-tools:rhel8)",
"product_id": "aardvark-dns-1.0.1-40.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/aardvark-dns@1.0.1-40.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=aarch64\u0026epoch=2\u0026rpmmod=container-tools:rhel8:8060020240413110723:3b538bd8"
}
}
},
{
"category": "product_version",
"name": "buildah-1.26.2-1.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"product": {
"name": "buildah-1.26.2-1.module+el8.6.0+21266+3e24c7b3.aarch64.rpm (container-tools:rhel8)",
"product_id": "buildah-1.26.2-1.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/buildah@1.26.2-1.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=aarch64\u0026epoch=1\u0026rpmmod=container-tools:rhel8:8060020240413110723:3b538bd8"
}
}
},
{
"category": "product_version",
"name": "buildah-debuginfo-1.26.2-1.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"product": {
"name": "buildah-debuginfo-1.26.2-1.module+el8.6.0+21266+3e24c7b3.aarch64.rpm (container-tools:rhel8)",
"product_id": "buildah-debuginfo-1.26.2-1.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/buildah-debuginfo@1.26.2-1.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=aarch64\u0026epoch=1\u0026rpmmod=container-tools:rhel8:8060020240413110723:3b538bd8"
}
}
},
{
"category": "product_version",
"name": "buildah-debugsource-1.26.2-1.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"product": {
"name": "buildah-debugsource-1.26.2-1.module+el8.6.0+21266+3e24c7b3.aarch64.rpm (container-tools:rhel8)",
"product_id": "buildah-debugsource-1.26.2-1.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/buildah-debugsource@1.26.2-1.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=aarch64\u0026epoch=1\u0026rpmmod=container-tools:rhel8:8060020240413110723:3b538bd8"
}
}
},
{
"category": "product_version",
"name": "buildah-tests-1.26.2-1.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"product": {
"name": "buildah-tests-1.26.2-1.module+el8.6.0+21266+3e24c7b3.aarch64.rpm (container-tools:rhel8)",
"product_id": "buildah-tests-1.26.2-1.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/buildah-tests@1.26.2-1.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=aarch64\u0026epoch=1\u0026rpmmod=container-tools:rhel8:8060020240413110723:3b538bd8"
}
}
},
{
"category": "product_version",
"name": "buildah-tests-debuginfo-1.26.2-1.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"product": {
"name": "buildah-tests-debuginfo-1.26.2-1.module+el8.6.0+21266+3e24c7b3.aarch64.rpm (container-tools:rhel8)",
"product_id": "buildah-tests-debuginfo-1.26.2-1.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/buildah-tests-debuginfo@1.26.2-1.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=aarch64\u0026epoch=1\u0026rpmmod=container-tools:rhel8:8060020240413110723:3b538bd8"
}
}
},
{
"category": "product_version",
"name": "conmon-2.1.4-1.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"product": {
"name": "conmon-2.1.4-1.module+el8.6.0+21266+3e24c7b3.aarch64.rpm (container-tools:rhel8)",
"product_id": "conmon-2.1.4-1.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/conmon@2.1.4-1.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=aarch64\u0026epoch=2\u0026rpmmod=container-tools:rhel8:8060020240413110723:3b538bd8"
}
}
},
{
"category": "product_version",
"name": "conmon-debuginfo-2.1.4-1.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"product": {
"name": "conmon-debuginfo-2.1.4-1.module+el8.6.0+21266+3e24c7b3.aarch64.rpm (container-tools:rhel8)",
"product_id": "conmon-debuginfo-2.1.4-1.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/conmon-debuginfo@2.1.4-1.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=aarch64\u0026epoch=2\u0026rpmmod=container-tools:rhel8:8060020240413110723:3b538bd8"
}
}
},
{
"category": "product_version",
"name": "conmon-debugsource-2.1.4-1.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"product": {
"name": "conmon-debugsource-2.1.4-1.module+el8.6.0+21266+3e24c7b3.aarch64.rpm (container-tools:rhel8)",
"product_id": "conmon-debugsource-2.1.4-1.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/conmon-debugsource@2.1.4-1.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=aarch64\u0026epoch=2\u0026rpmmod=container-tools:rhel8:8060020240413110723:3b538bd8"
}
}
},
{
"category": "product_version",
"name": "containernetworking-plugins-1.1.1-4.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"product": {
"name": "containernetworking-plugins-1.1.1-4.module+el8.6.0+21266+3e24c7b3.aarch64.rpm (container-tools:rhel8)",
"product_id": "containernetworking-plugins-1.1.1-4.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/containernetworking-plugins@1.1.1-4.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=aarch64\u0026epoch=1\u0026rpmmod=container-tools:rhel8:8060020240413110723:3b538bd8"
}
}
},
{
"category": "product_version",
"name": "containernetworking-plugins-debuginfo-1.1.1-4.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"product": {
"name": "containernetworking-plugins-debuginfo-1.1.1-4.module+el8.6.0+21266+3e24c7b3.aarch64.rpm (container-tools:rhel8)",
"product_id": "containernetworking-plugins-debuginfo-1.1.1-4.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/containernetworking-plugins-debuginfo@1.1.1-4.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=aarch64\u0026epoch=1\u0026rpmmod=container-tools:rhel8:8060020240413110723:3b538bd8"
}
}
},
{
"category": "product_version",
"name": "containernetworking-plugins-debugsource-1.1.1-4.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"product": {
"name": "containernetworking-plugins-debugsource-1.1.1-4.module+el8.6.0+21266+3e24c7b3.aarch64.rpm (container-tools:rhel8)",
"product_id": "containernetworking-plugins-debugsource-1.1.1-4.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/containernetworking-plugins-debugsource@1.1.1-4.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=aarch64\u0026epoch=1\u0026rpmmod=container-tools:rhel8:8060020240413110723:3b538bd8"
}
}
},
{
"category": "product_version",
"name": "containers-common-1-40.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"product": {
"name": "containers-common-1-40.module+el8.6.0+21266+3e24c7b3.aarch64.rpm (container-tools:rhel8)",
"product_id": "containers-common-1-40.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/containers-common@1-40.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=aarch64\u0026epoch=2\u0026rpmmod=container-tools:rhel8:8060020240413110723:3b538bd8"
}
}
},
{
"category": "product_version",
"name": "crit-3.15-3.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"product": {
"name": "crit-3.15-3.module+el8.6.0+21266+3e24c7b3.aarch64.rpm (container-tools:rhel8)",
"product_id": "crit-3.15-3.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/crit@3.15-3.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=aarch64\u0026rpmmod=container-tools:rhel8:8060020240413110723:3b538bd8"
}
}
},
{
"category": "product_version",
"name": "criu-3.15-3.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"product": {
"name": "criu-3.15-3.module+el8.6.0+21266+3e24c7b3.aarch64.rpm (container-tools:rhel8)",
"product_id": "criu-3.15-3.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/criu@3.15-3.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=aarch64\u0026rpmmod=container-tools:rhel8:8060020240413110723:3b538bd8"
}
}
},
{
"category": "product_version",
"name": "criu-debuginfo-3.15-3.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"product": {
"name": "criu-debuginfo-3.15-3.module+el8.6.0+21266+3e24c7b3.aarch64.rpm (container-tools:rhel8)",
"product_id": "criu-debuginfo-3.15-3.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/criu-debuginfo@3.15-3.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=aarch64\u0026rpmmod=container-tools:rhel8:8060020240413110723:3b538bd8"
}
}
},
{
"category": "product_version",
"name": "criu-debugsource-3.15-3.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"product": {
"name": "criu-debugsource-3.15-3.module+el8.6.0+21266+3e24c7b3.aarch64.rpm (container-tools:rhel8)",
"product_id": "criu-debugsource-3.15-3.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/criu-debugsource@3.15-3.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=aarch64\u0026rpmmod=container-tools:rhel8:8060020240413110723:3b538bd8"
}
}
},
{
"category": "product_version",
"name": "criu-devel-3.15-3.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"product": {
"name": "criu-devel-3.15-3.module+el8.6.0+21266+3e24c7b3.aarch64.rpm (container-tools:rhel8)",
"product_id": "criu-devel-3.15-3.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/criu-devel@3.15-3.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=aarch64\u0026rpmmod=container-tools:rhel8:8060020240413110723:3b538bd8"
}
}
},
{
"category": "product_version",
"name": "criu-libs-3.15-3.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"product": {
"name": "criu-libs-3.15-3.module+el8.6.0+21266+3e24c7b3.aarch64.rpm (container-tools:rhel8)",
"product_id": "criu-libs-3.15-3.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/criu-libs@3.15-3.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=aarch64\u0026rpmmod=container-tools:rhel8:8060020240413110723:3b538bd8"
}
}
},
{
"category": "product_version",
"name": "criu-libs-debuginfo-3.15-3.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"product": {
"name": "criu-libs-debuginfo-3.15-3.module+el8.6.0+21266+3e24c7b3.aarch64.rpm (container-tools:rhel8)",
"product_id": "criu-libs-debuginfo-3.15-3.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/criu-libs-debuginfo@3.15-3.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=aarch64\u0026rpmmod=container-tools:rhel8:8060020240413110723:3b538bd8"
}
}
},
{
"category": "product_version",
"name": "crun-1.5-1.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"product": {
"name": "crun-1.5-1.module+el8.6.0+21266+3e24c7b3.aarch64.rpm (container-tools:rhel8)",
"product_id": "crun-1.5-1.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/crun@1.5-1.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=aarch64\u0026rpmmod=container-tools:rhel8:8060020240413110723:3b538bd8"
}
}
},
{
"category": "product_version",
"name": "crun-debuginfo-1.5-1.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"product": {
"name": "crun-debuginfo-1.5-1.module+el8.6.0+21266+3e24c7b3.aarch64.rpm (container-tools:rhel8)",
"product_id": "crun-debuginfo-1.5-1.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/crun-debuginfo@1.5-1.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=aarch64\u0026rpmmod=container-tools:rhel8:8060020240413110723:3b538bd8"
}
}
},
{
"category": "product_version",
"name": "crun-debugsource-1.5-1.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"product": {
"name": "crun-debugsource-1.5-1.module+el8.6.0+21266+3e24c7b3.aarch64.rpm (container-tools:rhel8)",
"product_id": "crun-debugsource-1.5-1.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/crun-debugsource@1.5-1.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=aarch64\u0026rpmmod=container-tools:rhel8:8060020240413110723:3b538bd8"
}
}
},
{
"category": "product_version",
"name": "fuse-overlayfs-1.9-1.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"product": {
"name": "fuse-overlayfs-1.9-1.module+el8.6.0+21266+3e24c7b3.aarch64.rpm (container-tools:rhel8)",
"product_id": "fuse-overlayfs-1.9-1.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fuse-overlayfs@1.9-1.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=aarch64\u0026rpmmod=container-tools:rhel8:8060020240413110723:3b538bd8"
}
}
},
{
"category": "product_version",
"name": "fuse-overlayfs-debuginfo-1.9-1.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"product": {
"name": "fuse-overlayfs-debuginfo-1.9-1.module+el8.6.0+21266+3e24c7b3.aarch64.rpm (container-tools:rhel8)",
"product_id": "fuse-overlayfs-debuginfo-1.9-1.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fuse-overlayfs-debuginfo@1.9-1.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=aarch64\u0026rpmmod=container-tools:rhel8:8060020240413110723:3b538bd8"
}
}
},
{
"category": "product_version",
"name": "fuse-overlayfs-debugsource-1.9-1.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"product": {
"name": "fuse-overlayfs-debugsource-1.9-1.module+el8.6.0+21266+3e24c7b3.aarch64.rpm (container-tools:rhel8)",
"product_id": "fuse-overlayfs-debugsource-1.9-1.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fuse-overlayfs-debugsource@1.9-1.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=aarch64\u0026rpmmod=container-tools:rhel8:8060020240413110723:3b538bd8"
}
}
},
{
"category": "product_version",
"name": "libslirp-4.4.0-1.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"product": {
"name": "libslirp-4.4.0-1.module+el8.6.0+21266+3e24c7b3.aarch64.rpm (container-tools:rhel8)",
"product_id": "libslirp-4.4.0-1.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libslirp@4.4.0-1.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=aarch64\u0026rpmmod=container-tools:rhel8:8060020240413110723:3b538bd8"
}
}
},
{
"category": "product_version",
"name": "libslirp-debuginfo-4.4.0-1.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"product": {
"name": "libslirp-debuginfo-4.4.0-1.module+el8.6.0+21266+3e24c7b3.aarch64.rpm (container-tools:rhel8)",
"product_id": "libslirp-debuginfo-4.4.0-1.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libslirp-debuginfo@4.4.0-1.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=aarch64\u0026rpmmod=container-tools:rhel8:8060020240413110723:3b538bd8"
}
}
},
{
"category": "product_version",
"name": "libslirp-debugsource-4.4.0-1.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"product": {
"name": "libslirp-debugsource-4.4.0-1.module+el8.6.0+21266+3e24c7b3.aarch64.rpm (container-tools:rhel8)",
"product_id": "libslirp-debugsource-4.4.0-1.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libslirp-debugsource@4.4.0-1.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=aarch64\u0026rpmmod=container-tools:rhel8:8060020240413110723:3b538bd8"
}
}
},
{
"category": "product_version",
"name": "libslirp-devel-4.4.0-1.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"product": {
"name": "libslirp-devel-4.4.0-1.module+el8.6.0+21266+3e24c7b3.aarch64.rpm (container-tools:rhel8)",
"product_id": "libslirp-devel-4.4.0-1.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libslirp-devel@4.4.0-1.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=aarch64\u0026rpmmod=container-tools:rhel8:8060020240413110723:3b538bd8"
}
}
},
{
"category": "product_version",
"name": "netavark-1.0.1-40.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"product": {
"name": "netavark-1.0.1-40.module+el8.6.0+21266+3e24c7b3.aarch64.rpm (container-tools:rhel8)",
"product_id": "netavark-1.0.1-40.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/netavark@1.0.1-40.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=aarch64\u0026epoch=2\u0026rpmmod=container-tools:rhel8:8060020240413110723:3b538bd8"
}
}
},
{
"category": "product_version",
"name": "oci-seccomp-bpf-hook-1.2.6-1.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"product": {
"name": "oci-seccomp-bpf-hook-1.2.6-1.module+el8.6.0+21266+3e24c7b3.aarch64.rpm (container-tools:rhel8)",
"product_id": "oci-seccomp-bpf-hook-1.2.6-1.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/oci-seccomp-bpf-hook@1.2.6-1.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=aarch64\u0026rpmmod=container-tools:rhel8:8060020240413110723:3b538bd8"
}
}
},
{
"category": "product_version",
"name": "oci-seccomp-bpf-hook-debuginfo-1.2.6-1.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"product": {
"name": "oci-seccomp-bpf-hook-debuginfo-1.2.6-1.module+el8.6.0+21266+3e24c7b3.aarch64.rpm (container-tools:rhel8)",
"product_id": "oci-seccomp-bpf-hook-debuginfo-1.2.6-1.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/oci-seccomp-bpf-hook-debuginfo@1.2.6-1.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=aarch64\u0026rpmmod=container-tools:rhel8:8060020240413110723:3b538bd8"
}
}
},
{
"category": "product_version",
"name": "oci-seccomp-bpf-hook-debugsource-1.2.6-1.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"product": {
"name": "oci-seccomp-bpf-hook-debugsource-1.2.6-1.module+el8.6.0+21266+3e24c7b3.aarch64.rpm (container-tools:rhel8)",
"product_id": "oci-seccomp-bpf-hook-debugsource-1.2.6-1.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/oci-seccomp-bpf-hook-debugsource@1.2.6-1.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=aarch64\u0026rpmmod=container-tools:rhel8:8060020240413110723:3b538bd8"
}
}
},
{
"category": "product_version",
"name": "podman-4.2.0-2.module+el8.6.0+21674+8010760f.aarch64.rpm-container-tools:rhel8",
"product": {
"name": "podman-4.2.0-2.module+el8.6.0+21674+8010760f.aarch64.rpm (container-tools:rhel8)",
"product_id": "podman-4.2.0-2.module+el8.6.0+21674+8010760f.aarch64.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman@4.2.0-2.module%2Bel8.6.0%2B21674%2B8010760f?arch=aarch64\u0026epoch=2\u0026rpmmod=container-tools:rhel8:8060020240413110723:3b538bd8"
}
}
},
{
"category": "product_version",
"name": "podman-catatonit-4.2.0-2.module+el8.6.0+21674+8010760f.aarch64.rpm-container-tools:rhel8",
"product": {
"name": "podman-catatonit-4.2.0-2.module+el8.6.0+21674+8010760f.aarch64.rpm (container-tools:rhel8)",
"product_id": "podman-catatonit-4.2.0-2.module+el8.6.0+21674+8010760f.aarch64.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-catatonit@4.2.0-2.module%2Bel8.6.0%2B21674%2B8010760f?arch=aarch64\u0026epoch=2\u0026rpmmod=container-tools:rhel8:8060020240413110723:3b538bd8"
}
}
},
{
"category": "product_version",
"name": "podman-catatonit-debuginfo-4.2.0-2.module+el8.6.0+21674+8010760f.aarch64.rpm-container-tools:rhel8",
"product": {
"name": "podman-catatonit-debuginfo-4.2.0-2.module+el8.6.0+21674+8010760f.aarch64.rpm (container-tools:rhel8)",
"product_id": "podman-catatonit-debuginfo-4.2.0-2.module+el8.6.0+21674+8010760f.aarch64.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-catatonit-debuginfo@4.2.0-2.module%2Bel8.6.0%2B21674%2B8010760f?arch=aarch64\u0026epoch=2\u0026rpmmod=container-tools:rhel8:8060020240413110723:3b538bd8"
}
}
},
{
"category": "product_version",
"name": "podman-debuginfo-4.2.0-2.module+el8.6.0+21674+8010760f.aarch64.rpm-container-tools:rhel8",
"product": {
"name": "podman-debuginfo-4.2.0-2.module+el8.6.0+21674+8010760f.aarch64.rpm (container-tools:rhel8)",
"product_id": "podman-debuginfo-4.2.0-2.module+el8.6.0+21674+8010760f.aarch64.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-debuginfo@4.2.0-2.module%2Bel8.6.0%2B21674%2B8010760f?arch=aarch64\u0026epoch=2\u0026rpmmod=container-tools:rhel8:8060020240413110723:3b538bd8"
}
}
},
{
"category": "product_version",
"name": "podman-debugsource-4.2.0-2.module+el8.6.0+21674+8010760f.aarch64.rpm-container-tools:rhel8",
"product": {
"name": "podman-debugsource-4.2.0-2.module+el8.6.0+21674+8010760f.aarch64.rpm (container-tools:rhel8)",
"product_id": "podman-debugsource-4.2.0-2.module+el8.6.0+21674+8010760f.aarch64.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-debugsource@4.2.0-2.module%2Bel8.6.0%2B21674%2B8010760f?arch=aarch64\u0026epoch=2\u0026rpmmod=container-tools:rhel8:8060020240413110723:3b538bd8"
}
}
},
{
"category": "product_version",
"name": "podman-gvproxy-4.2.0-2.module+el8.6.0+21674+8010760f.aarch64.rpm-container-tools:rhel8",
"product": {
"name": "podman-gvproxy-4.2.0-2.module+el8.6.0+21674+8010760f.aarch64.rpm (container-tools:rhel8)",
"product_id": "podman-gvproxy-4.2.0-2.module+el8.6.0+21674+8010760f.aarch64.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-gvproxy@4.2.0-2.module%2Bel8.6.0%2B21674%2B8010760f?arch=aarch64\u0026epoch=2\u0026rpmmod=container-tools:rhel8:8060020240413110723:3b538bd8"
}
}
},
{
"category": "product_version",
"name": "podman-gvproxy-debuginfo-4.2.0-2.module+el8.6.0+21674+8010760f.aarch64.rpm-container-tools:rhel8",
"product": {
"name": "podman-gvproxy-debuginfo-4.2.0-2.module+el8.6.0+21674+8010760f.aarch64.rpm (container-tools:rhel8)",
"product_id": "podman-gvproxy-debuginfo-4.2.0-2.module+el8.6.0+21674+8010760f.aarch64.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-gvproxy-debuginfo@4.2.0-2.module%2Bel8.6.0%2B21674%2B8010760f?arch=aarch64\u0026epoch=2\u0026rpmmod=container-tools:rhel8:8060020240413110723:3b538bd8"
}
}
},
{
"category": "product_version",
"name": "podman-plugins-4.2.0-2.module+el8.6.0+21674+8010760f.aarch64.rpm-container-tools:rhel8",
"product": {
"name": "podman-plugins-4.2.0-2.module+el8.6.0+21674+8010760f.aarch64.rpm (container-tools:rhel8)",
"product_id": "podman-plugins-4.2.0-2.module+el8.6.0+21674+8010760f.aarch64.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-plugins@4.2.0-2.module%2Bel8.6.0%2B21674%2B8010760f?arch=aarch64\u0026epoch=2\u0026rpmmod=container-tools:rhel8:8060020240413110723:3b538bd8"
}
}
},
{
"category": "product_version",
"name": "podman-plugins-debuginfo-4.2.0-2.module+el8.6.0+21674+8010760f.aarch64.rpm-container-tools:rhel8",
"product": {
"name": "podman-plugins-debuginfo-4.2.0-2.module+el8.6.0+21674+8010760f.aarch64.rpm (container-tools:rhel8)",
"product_id": "podman-plugins-debuginfo-4.2.0-2.module+el8.6.0+21674+8010760f.aarch64.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-plugins-debuginfo@4.2.0-2.module%2Bel8.6.0%2B21674%2B8010760f?arch=aarch64\u0026epoch=2\u0026rpmmod=container-tools:rhel8:8060020240413110723:3b538bd8"
}
}
},
{
"category": "product_version",
"name": "podman-remote-4.2.0-2.module+el8.6.0+21674+8010760f.aarch64.rpm-container-tools:rhel8",
"product": {
"name": "podman-remote-4.2.0-2.module+el8.6.0+21674+8010760f.aarch64.rpm (container-tools:rhel8)",
"product_id": "podman-remote-4.2.0-2.module+el8.6.0+21674+8010760f.aarch64.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-remote@4.2.0-2.module%2Bel8.6.0%2B21674%2B8010760f?arch=aarch64\u0026epoch=2\u0026rpmmod=container-tools:rhel8:8060020240413110723:3b538bd8"
}
}
},
{
"category": "product_version",
"name": "podman-remote-debuginfo-4.2.0-2.module+el8.6.0+21674+8010760f.aarch64.rpm-container-tools:rhel8",
"product": {
"name": "podman-remote-debuginfo-4.2.0-2.module+el8.6.0+21674+8010760f.aarch64.rpm (container-tools:rhel8)",
"product_id": "podman-remote-debuginfo-4.2.0-2.module+el8.6.0+21674+8010760f.aarch64.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-remote-debuginfo@4.2.0-2.module%2Bel8.6.0%2B21674%2B8010760f?arch=aarch64\u0026epoch=2\u0026rpmmod=container-tools:rhel8:8060020240413110723:3b538bd8"
}
}
},
{
"category": "product_version",
"name": "podman-tests-4.2.0-2.module+el8.6.0+21674+8010760f.aarch64.rpm-container-tools:rhel8",
"product": {
"name": "podman-tests-4.2.0-2.module+el8.6.0+21674+8010760f.aarch64.rpm (container-tools:rhel8)",
"product_id": "podman-tests-4.2.0-2.module+el8.6.0+21674+8010760f.aarch64.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-tests@4.2.0-2.module%2Bel8.6.0%2B21674%2B8010760f?arch=aarch64\u0026epoch=2\u0026rpmmod=container-tools:rhel8:8060020240413110723:3b538bd8"
}
}
},
{
"category": "product_version",
"name": "python3-criu-3.15-3.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"product": {
"name": "python3-criu-3.15-3.module+el8.6.0+21266+3e24c7b3.aarch64.rpm (container-tools:rhel8)",
"product_id": "python3-criu-3.15-3.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-criu@3.15-3.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=aarch64\u0026rpmmod=container-tools:rhel8:8060020240413110723:3b538bd8"
}
}
},
{
"category": "product_version",
"name": "runc-1.1.12-1.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"product": {
"name": "runc-1.1.12-1.module+el8.6.0+21266+3e24c7b3.aarch64.rpm (container-tools:rhel8)",
"product_id": "runc-1.1.12-1.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/runc@1.1.12-1.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=aarch64\u0026epoch=1\u0026rpmmod=container-tools:rhel8:8060020240413110723:3b538bd8"
}
}
},
{
"category": "product_version",
"name": "runc-debuginfo-1.1.12-1.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"product": {
"name": "runc-debuginfo-1.1.12-1.module+el8.6.0+21266+3e24c7b3.aarch64.rpm (container-tools:rhel8)",
"product_id": "runc-debuginfo-1.1.12-1.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/runc-debuginfo@1.1.12-1.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=aarch64\u0026epoch=1\u0026rpmmod=container-tools:rhel8:8060020240413110723:3b538bd8"
}
}
},
{
"category": "product_version",
"name": "runc-debugsource-1.1.12-1.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"product": {
"name": "runc-debugsource-1.1.12-1.module+el8.6.0+21266+3e24c7b3.aarch64.rpm (container-tools:rhel8)",
"product_id": "runc-debugsource-1.1.12-1.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/runc-debugsource@1.1.12-1.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=aarch64\u0026epoch=1\u0026rpmmod=container-tools:rhel8:8060020240413110723:3b538bd8"
}
}
},
{
"category": "product_version",
"name": "skopeo-1.9.1-1.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"product": {
"name": "skopeo-1.9.1-1.module+el8.6.0+21266+3e24c7b3.aarch64.rpm (container-tools:rhel8)",
"product_id": "skopeo-1.9.1-1.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/skopeo@1.9.1-1.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=aarch64\u0026epoch=2\u0026rpmmod=container-tools:rhel8:8060020240413110723:3b538bd8"
}
}
},
{
"category": "product_version",
"name": "skopeo-debuginfo-1.9.1-1.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"product": {
"name": "skopeo-debuginfo-1.9.1-1.module+el8.6.0+21266+3e24c7b3.aarch64.rpm (container-tools:rhel8)",
"product_id": "skopeo-debuginfo-1.9.1-1.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/skopeo-debuginfo@1.9.1-1.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=aarch64\u0026epoch=2\u0026rpmmod=container-tools:rhel8:8060020240413110723:3b538bd8"
}
}
},
{
"category": "product_version",
"name": "skopeo-debugsource-1.9.1-1.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"product": {
"name": "skopeo-debugsource-1.9.1-1.module+el8.6.0+21266+3e24c7b3.aarch64.rpm (container-tools:rhel8)",
"product_id": "skopeo-debugsource-1.9.1-1.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/skopeo-debugsource@1.9.1-1.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=aarch64\u0026epoch=2\u0026rpmmod=container-tools:rhel8:8060020240413110723:3b538bd8"
}
}
},
{
"category": "product_version",
"name": "skopeo-tests-1.9.1-1.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"product": {
"name": "skopeo-tests-1.9.1-1.module+el8.6.0+21266+3e24c7b3.aarch64.rpm (container-tools:rhel8)",
"product_id": "skopeo-tests-1.9.1-1.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/skopeo-tests@1.9.1-1.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=aarch64\u0026epoch=2\u0026rpmmod=container-tools:rhel8:8060020240413110723:3b538bd8"
}
}
},
{
"category": "product_version",
"name": "slirp4netns-1.2.0-3.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"product": {
"name": "slirp4netns-1.2.0-3.module+el8.6.0+21266+3e24c7b3.aarch64.rpm (container-tools:rhel8)",
"product_id": "slirp4netns-1.2.0-3.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/slirp4netns@1.2.0-3.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=aarch64\u0026rpmmod=container-tools:rhel8:8060020240413110723:3b538bd8"
}
}
},
{
"category": "product_version",
"name": "slirp4netns-debuginfo-1.2.0-3.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"product": {
"name": "slirp4netns-debuginfo-1.2.0-3.module+el8.6.0+21266+3e24c7b3.aarch64.rpm (container-tools:rhel8)",
"product_id": "slirp4netns-debuginfo-1.2.0-3.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/slirp4netns-debuginfo@1.2.0-3.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=aarch64\u0026rpmmod=container-tools:rhel8:8060020240413110723:3b538bd8"
}
}
},
{
"category": "product_version",
"name": "slirp4netns-debugsource-1.2.0-3.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"product": {
"name": "slirp4netns-debugsource-1.2.0-3.module+el8.6.0+21266+3e24c7b3.aarch64.rpm (container-tools:rhel8)",
"product_id": "slirp4netns-debugsource-1.2.0-3.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/slirp4netns-debugsource@1.2.0-3.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=aarch64\u0026rpmmod=container-tools:rhel8:8060020240413110723:3b538bd8"
}
}
},
{
"category": "product_version",
"name": "toolbox-0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"product": {
"name": "toolbox-0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.aarch64.rpm (container-tools:rhel8)",
"product_id": "toolbox-0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/toolbox@0.0.99.3-0.7.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=aarch64\u0026rpmmod=container-tools:rhel8:8060020240413110723:3b538bd8"
}
}
},
{
"category": "product_version",
"name": "toolbox-debuginfo-0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"product": {
"name": "toolbox-debuginfo-0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.aarch64.rpm (container-tools:rhel8)",
"product_id": "toolbox-debuginfo-0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/toolbox-debuginfo@0.0.99.3-0.7.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=aarch64\u0026rpmmod=container-tools:rhel8:8060020240413110723:3b538bd8"
}
}
},
{
"category": "product_version",
"name": "toolbox-debugsource-0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"product": {
"name": "toolbox-debugsource-0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.aarch64.rpm (container-tools:rhel8)",
"product_id": "toolbox-debugsource-0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/toolbox-debugsource@0.0.99.3-0.7.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=aarch64\u0026rpmmod=container-tools:rhel8:8060020240413110723:3b538bd8"
}
}
},
{
"category": "product_version",
"name": "toolbox-tests-0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"product": {
"name": "toolbox-tests-0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.aarch64.rpm (container-tools:rhel8)",
"product_id": "toolbox-tests-0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/toolbox-tests@0.0.99.3-0.7.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=aarch64\u0026rpmmod=container-tools:rhel8:8060020240413110723:3b538bd8"
}
}
}
],
"category": "architecture",
"name": "aarch64"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "aardvark-dns-1.0.1-40.module+el8.6.0+21266+3e24c7b3.aarch64.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:aardvark-dns-1.0.1-40.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8"
},
"product_reference": "aardvark-dns-1.0.1-40.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "aardvark-dns-1.0.1-40.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:aardvark-dns-1.0.1-40.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8"
},
"product_reference": "aardvark-dns-1.0.1-40.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "aardvark-dns-1.0.1-40.module+el8.6.0+21266+3e24c7b3.s390x.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:aardvark-dns-1.0.1-40.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8"
},
"product_reference": "aardvark-dns-1.0.1-40.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "aardvark-dns-1.0.1-40.module+el8.6.0+21266+3e24c7b3.x86_64.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:aardvark-dns-1.0.1-40.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8"
},
"product_reference": "aardvark-dns-1.0.1-40.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "buildah-1.26.2-1.module+el8.6.0+21266+3e24c7b3.aarch64.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:buildah-1.26.2-1.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8"
},
"product_reference": "buildah-1.26.2-1.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "buildah-1.26.2-1.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:buildah-1.26.2-1.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8"
},
"product_reference": "buildah-1.26.2-1.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "buildah-1.26.2-1.module+el8.6.0+21266+3e24c7b3.s390x.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:buildah-1.26.2-1.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8"
},
"product_reference": "buildah-1.26.2-1.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "buildah-1.26.2-1.module+el8.6.0+21266+3e24c7b3.src.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:buildah-1.26.2-1.module+el8.6.0+21266+3e24c7b3.src.rpm-container-tools:rhel8"
},
"product_reference": "buildah-1.26.2-1.module+el8.6.0+21266+3e24c7b3.src.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "buildah-1.26.2-1.module+el8.6.0+21266+3e24c7b3.x86_64.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:buildah-1.26.2-1.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8"
},
"product_reference": "buildah-1.26.2-1.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "buildah-debuginfo-1.26.2-1.module+el8.6.0+21266+3e24c7b3.aarch64.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:buildah-debuginfo-1.26.2-1.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8"
},
"product_reference": "buildah-debuginfo-1.26.2-1.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "buildah-debuginfo-1.26.2-1.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:buildah-debuginfo-1.26.2-1.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8"
},
"product_reference": "buildah-debuginfo-1.26.2-1.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "buildah-debuginfo-1.26.2-1.module+el8.6.0+21266+3e24c7b3.s390x.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:buildah-debuginfo-1.26.2-1.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8"
},
"product_reference": "buildah-debuginfo-1.26.2-1.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "buildah-debuginfo-1.26.2-1.module+el8.6.0+21266+3e24c7b3.x86_64.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:buildah-debuginfo-1.26.2-1.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8"
},
"product_reference": "buildah-debuginfo-1.26.2-1.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "buildah-debugsource-1.26.2-1.module+el8.6.0+21266+3e24c7b3.aarch64.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:buildah-debugsource-1.26.2-1.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8"
},
"product_reference": "buildah-debugsource-1.26.2-1.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "buildah-debugsource-1.26.2-1.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:buildah-debugsource-1.26.2-1.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8"
},
"product_reference": "buildah-debugsource-1.26.2-1.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "buildah-debugsource-1.26.2-1.module+el8.6.0+21266+3e24c7b3.s390x.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:buildah-debugsource-1.26.2-1.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8"
},
"product_reference": "buildah-debugsource-1.26.2-1.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "buildah-debugsource-1.26.2-1.module+el8.6.0+21266+3e24c7b3.x86_64.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:buildah-debugsource-1.26.2-1.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8"
},
"product_reference": "buildah-debugsource-1.26.2-1.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "buildah-tests-1.26.2-1.module+el8.6.0+21266+3e24c7b3.aarch64.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:buildah-tests-1.26.2-1.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8"
},
"product_reference": "buildah-tests-1.26.2-1.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "buildah-tests-1.26.2-1.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:buildah-tests-1.26.2-1.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8"
},
"product_reference": "buildah-tests-1.26.2-1.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "buildah-tests-1.26.2-1.module+el8.6.0+21266+3e24c7b3.s390x.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:buildah-tests-1.26.2-1.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8"
},
"product_reference": "buildah-tests-1.26.2-1.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "buildah-tests-1.26.2-1.module+el8.6.0+21266+3e24c7b3.x86_64.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:buildah-tests-1.26.2-1.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8"
},
"product_reference": "buildah-tests-1.26.2-1.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "buildah-tests-debuginfo-1.26.2-1.module+el8.6.0+21266+3e24c7b3.aarch64.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:buildah-tests-debuginfo-1.26.2-1.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8"
},
"product_reference": "buildah-tests-debuginfo-1.26.2-1.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "buildah-tests-debuginfo-1.26.2-1.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:buildah-tests-debuginfo-1.26.2-1.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8"
},
"product_reference": "buildah-tests-debuginfo-1.26.2-1.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "buildah-tests-debuginfo-1.26.2-1.module+el8.6.0+21266+3e24c7b3.s390x.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:buildah-tests-debuginfo-1.26.2-1.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8"
},
"product_reference": "buildah-tests-debuginfo-1.26.2-1.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "buildah-tests-debuginfo-1.26.2-1.module+el8.6.0+21266+3e24c7b3.x86_64.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:buildah-tests-debuginfo-1.26.2-1.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8"
},
"product_reference": "buildah-tests-debuginfo-1.26.2-1.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cockpit-podman-49.1-1.module+el8.6.0+21266+3e24c7b3.noarch.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:cockpit-podman-49.1-1.module+el8.6.0+21266+3e24c7b3.noarch.rpm-container-tools:rhel8"
},
"product_reference": "cockpit-podman-49.1-1.module+el8.6.0+21266+3e24c7b3.noarch.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cockpit-podman-49.1-1.module+el8.6.0+21266+3e24c7b3.src.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:cockpit-podman-49.1-1.module+el8.6.0+21266+3e24c7b3.src.rpm-container-tools:rhel8"
},
"product_reference": "cockpit-podman-49.1-1.module+el8.6.0+21266+3e24c7b3.src.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "conmon-2.1.4-1.module+el8.6.0+21266+3e24c7b3.aarch64.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:conmon-2.1.4-1.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8"
},
"product_reference": "conmon-2.1.4-1.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "conmon-2.1.4-1.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:conmon-2.1.4-1.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8"
},
"product_reference": "conmon-2.1.4-1.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "conmon-2.1.4-1.module+el8.6.0+21266+3e24c7b3.s390x.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:conmon-2.1.4-1.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8"
},
"product_reference": "conmon-2.1.4-1.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "conmon-2.1.4-1.module+el8.6.0+21266+3e24c7b3.src.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:conmon-2.1.4-1.module+el8.6.0+21266+3e24c7b3.src.rpm-container-tools:rhel8"
},
"product_reference": "conmon-2.1.4-1.module+el8.6.0+21266+3e24c7b3.src.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "conmon-2.1.4-1.module+el8.6.0+21266+3e24c7b3.x86_64.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:conmon-2.1.4-1.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8"
},
"product_reference": "conmon-2.1.4-1.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "conmon-debuginfo-2.1.4-1.module+el8.6.0+21266+3e24c7b3.aarch64.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:conmon-debuginfo-2.1.4-1.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8"
},
"product_reference": "conmon-debuginfo-2.1.4-1.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "conmon-debuginfo-2.1.4-1.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:conmon-debuginfo-2.1.4-1.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8"
},
"product_reference": "conmon-debuginfo-2.1.4-1.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "conmon-debuginfo-2.1.4-1.module+el8.6.0+21266+3e24c7b3.s390x.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:conmon-debuginfo-2.1.4-1.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8"
},
"product_reference": "conmon-debuginfo-2.1.4-1.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "conmon-debuginfo-2.1.4-1.module+el8.6.0+21266+3e24c7b3.x86_64.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:conmon-debuginfo-2.1.4-1.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8"
},
"product_reference": "conmon-debuginfo-2.1.4-1.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "conmon-debugsource-2.1.4-1.module+el8.6.0+21266+3e24c7b3.aarch64.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:conmon-debugsource-2.1.4-1.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8"
},
"product_reference": "conmon-debugsource-2.1.4-1.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "conmon-debugsource-2.1.4-1.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:conmon-debugsource-2.1.4-1.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8"
},
"product_reference": "conmon-debugsource-2.1.4-1.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "conmon-debugsource-2.1.4-1.module+el8.6.0+21266+3e24c7b3.s390x.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:conmon-debugsource-2.1.4-1.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8"
},
"product_reference": "conmon-debugsource-2.1.4-1.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "conmon-debugsource-2.1.4-1.module+el8.6.0+21266+3e24c7b3.x86_64.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:conmon-debugsource-2.1.4-1.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8"
},
"product_reference": "conmon-debugsource-2.1.4-1.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "container-selinux-2.189.0-1.module+el8.6.0+21266+3e24c7b3.noarch.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:container-selinux-2.189.0-1.module+el8.6.0+21266+3e24c7b3.noarch.rpm-container-tools:rhel8"
},
"product_reference": "container-selinux-2.189.0-1.module+el8.6.0+21266+3e24c7b3.noarch.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "container-selinux-2.189.0-1.module+el8.6.0+21266+3e24c7b3.src.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:container-selinux-2.189.0-1.module+el8.6.0+21266+3e24c7b3.src.rpm-container-tools:rhel8"
},
"product_reference": "container-selinux-2.189.0-1.module+el8.6.0+21266+3e24c7b3.src.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "containernetworking-plugins-1.1.1-4.module+el8.6.0+21266+3e24c7b3.aarch64.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:containernetworking-plugins-1.1.1-4.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8"
},
"product_reference": "containernetworking-plugins-1.1.1-4.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "containernetworking-plugins-1.1.1-4.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:containernetworking-plugins-1.1.1-4.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8"
},
"product_reference": "containernetworking-plugins-1.1.1-4.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "containernetworking-plugins-1.1.1-4.module+el8.6.0+21266+3e24c7b3.s390x.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:containernetworking-plugins-1.1.1-4.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8"
},
"product_reference": "containernetworking-plugins-1.1.1-4.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "containernetworking-plugins-1.1.1-4.module+el8.6.0+21266+3e24c7b3.src.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:containernetworking-plugins-1.1.1-4.module+el8.6.0+21266+3e24c7b3.src.rpm-container-tools:rhel8"
},
"product_reference": "containernetworking-plugins-1.1.1-4.module+el8.6.0+21266+3e24c7b3.src.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "containernetworking-plugins-1.1.1-4.module+el8.6.0+21266+3e24c7b3.x86_64.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:containernetworking-plugins-1.1.1-4.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8"
},
"product_reference": "containernetworking-plugins-1.1.1-4.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "containernetworking-plugins-debuginfo-1.1.1-4.module+el8.6.0+21266+3e24c7b3.aarch64.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:containernetworking-plugins-debuginfo-1.1.1-4.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8"
},
"product_reference": "containernetworking-plugins-debuginfo-1.1.1-4.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "containernetworking-plugins-debuginfo-1.1.1-4.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:containernetworking-plugins-debuginfo-1.1.1-4.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8"
},
"product_reference": "containernetworking-plugins-debuginfo-1.1.1-4.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "containernetworking-plugins-debuginfo-1.1.1-4.module+el8.6.0+21266+3e24c7b3.s390x.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:containernetworking-plugins-debuginfo-1.1.1-4.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8"
},
"product_reference": "containernetworking-plugins-debuginfo-1.1.1-4.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "containernetworking-plugins-debuginfo-1.1.1-4.module+el8.6.0+21266+3e24c7b3.x86_64.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:containernetworking-plugins-debuginfo-1.1.1-4.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8"
},
"product_reference": "containernetworking-plugins-debuginfo-1.1.1-4.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "containernetworking-plugins-debugsource-1.1.1-4.module+el8.6.0+21266+3e24c7b3.aarch64.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:containernetworking-plugins-debugsource-1.1.1-4.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8"
},
"product_reference": "containernetworking-plugins-debugsource-1.1.1-4.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "containernetworking-plugins-debugsource-1.1.1-4.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:containernetworking-plugins-debugsource-1.1.1-4.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8"
},
"product_reference": "containernetworking-plugins-debugsource-1.1.1-4.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "containernetworking-plugins-debugsource-1.1.1-4.module+el8.6.0+21266+3e24c7b3.s390x.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:containernetworking-plugins-debugsource-1.1.1-4.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8"
},
"product_reference": "containernetworking-plugins-debugsource-1.1.1-4.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "containernetworking-plugins-debugsource-1.1.1-4.module+el8.6.0+21266+3e24c7b3.x86_64.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:containernetworking-plugins-debugsource-1.1.1-4.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8"
},
"product_reference": "containernetworking-plugins-debugsource-1.1.1-4.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "containers-common-1-40.module+el8.6.0+21266+3e24c7b3.aarch64.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:containers-common-1-40.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8"
},
"product_reference": "containers-common-1-40.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "containers-common-1-40.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:containers-common-1-40.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8"
},
"product_reference": "containers-common-1-40.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "containers-common-1-40.module+el8.6.0+21266+3e24c7b3.s390x.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:containers-common-1-40.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8"
},
"product_reference": "containers-common-1-40.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "containers-common-1-40.module+el8.6.0+21266+3e24c7b3.src.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:containers-common-1-40.module+el8.6.0+21266+3e24c7b3.src.rpm-container-tools:rhel8"
},
"product_reference": "containers-common-1-40.module+el8.6.0+21266+3e24c7b3.src.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "containers-common-1-40.module+el8.6.0+21266+3e24c7b3.x86_64.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:containers-common-1-40.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8"
},
"product_reference": "containers-common-1-40.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "crit-3.15-3.module+el8.6.0+21266+3e24c7b3.aarch64.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:crit-3.15-3.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8"
},
"product_reference": "crit-3.15-3.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "crit-3.15-3.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:crit-3.15-3.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8"
},
"product_reference": "crit-3.15-3.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "crit-3.15-3.module+el8.6.0+21266+3e24c7b3.s390x.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:crit-3.15-3.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8"
},
"product_reference": "crit-3.15-3.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "crit-3.15-3.module+el8.6.0+21266+3e24c7b3.x86_64.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:crit-3.15-3.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8"
},
"product_reference": "crit-3.15-3.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "criu-3.15-3.module+el8.6.0+21266+3e24c7b3.aarch64.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:criu-3.15-3.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8"
},
"product_reference": "criu-3.15-3.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "criu-3.15-3.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:criu-3.15-3.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8"
},
"product_reference": "criu-3.15-3.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "criu-3.15-3.module+el8.6.0+21266+3e24c7b3.s390x.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:criu-3.15-3.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8"
},
"product_reference": "criu-3.15-3.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "criu-3.15-3.module+el8.6.0+21266+3e24c7b3.src.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:criu-3.15-3.module+el8.6.0+21266+3e24c7b3.src.rpm-container-tools:rhel8"
},
"product_reference": "criu-3.15-3.module+el8.6.0+21266+3e24c7b3.src.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "criu-3.15-3.module+el8.6.0+21266+3e24c7b3.x86_64.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:criu-3.15-3.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8"
},
"product_reference": "criu-3.15-3.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "criu-debuginfo-3.15-3.module+el8.6.0+21266+3e24c7b3.aarch64.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:criu-debuginfo-3.15-3.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8"
},
"product_reference": "criu-debuginfo-3.15-3.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "criu-debuginfo-3.15-3.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:criu-debuginfo-3.15-3.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8"
},
"product_reference": "criu-debuginfo-3.15-3.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "criu-debuginfo-3.15-3.module+el8.6.0+21266+3e24c7b3.s390x.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:criu-debuginfo-3.15-3.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8"
},
"product_reference": "criu-debuginfo-3.15-3.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "criu-debuginfo-3.15-3.module+el8.6.0+21266+3e24c7b3.x86_64.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:criu-debuginfo-3.15-3.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8"
},
"product_reference": "criu-debuginfo-3.15-3.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "criu-debugsource-3.15-3.module+el8.6.0+21266+3e24c7b3.aarch64.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:criu-debugsource-3.15-3.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8"
},
"product_reference": "criu-debugsource-3.15-3.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "criu-debugsource-3.15-3.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:criu-debugsource-3.15-3.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8"
},
"product_reference": "criu-debugsource-3.15-3.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "criu-debugsource-3.15-3.module+el8.6.0+21266+3e24c7b3.s390x.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:criu-debugsource-3.15-3.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8"
},
"product_reference": "criu-debugsource-3.15-3.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "criu-debugsource-3.15-3.module+el8.6.0+21266+3e24c7b3.x86_64.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:criu-debugsource-3.15-3.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8"
},
"product_reference": "criu-debugsource-3.15-3.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "criu-devel-3.15-3.module+el8.6.0+21266+3e24c7b3.aarch64.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:criu-devel-3.15-3.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8"
},
"product_reference": "criu-devel-3.15-3.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "criu-devel-3.15-3.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:criu-devel-3.15-3.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8"
},
"product_reference": "criu-devel-3.15-3.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "criu-devel-3.15-3.module+el8.6.0+21266+3e24c7b3.s390x.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:criu-devel-3.15-3.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8"
},
"product_reference": "criu-devel-3.15-3.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "criu-devel-3.15-3.module+el8.6.0+21266+3e24c7b3.x86_64.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:criu-devel-3.15-3.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8"
},
"product_reference": "criu-devel-3.15-3.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "criu-libs-3.15-3.module+el8.6.0+21266+3e24c7b3.aarch64.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:criu-libs-3.15-3.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8"
},
"product_reference": "criu-libs-3.15-3.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "criu-libs-3.15-3.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:criu-libs-3.15-3.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8"
},
"product_reference": "criu-libs-3.15-3.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "criu-libs-3.15-3.module+el8.6.0+21266+3e24c7b3.s390x.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:criu-libs-3.15-3.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8"
},
"product_reference": "criu-libs-3.15-3.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "criu-libs-3.15-3.module+el8.6.0+21266+3e24c7b3.x86_64.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:criu-libs-3.15-3.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8"
},
"product_reference": "criu-libs-3.15-3.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "criu-libs-debuginfo-3.15-3.module+el8.6.0+21266+3e24c7b3.aarch64.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:criu-libs-debuginfo-3.15-3.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8"
},
"product_reference": "criu-libs-debuginfo-3.15-3.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "criu-libs-debuginfo-3.15-3.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:criu-libs-debuginfo-3.15-3.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8"
},
"product_reference": "criu-libs-debuginfo-3.15-3.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "criu-libs-debuginfo-3.15-3.module+el8.6.0+21266+3e24c7b3.s390x.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:criu-libs-debuginfo-3.15-3.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8"
},
"product_reference": "criu-libs-debuginfo-3.15-3.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "criu-libs-debuginfo-3.15-3.module+el8.6.0+21266+3e24c7b3.x86_64.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:criu-libs-debuginfo-3.15-3.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8"
},
"product_reference": "criu-libs-debuginfo-3.15-3.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "crun-1.5-1.module+el8.6.0+21266+3e24c7b3.aarch64.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:crun-1.5-1.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8"
},
"product_reference": "crun-1.5-1.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "crun-1.5-1.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:crun-1.5-1.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8"
},
"product_reference": "crun-1.5-1.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "crun-1.5-1.module+el8.6.0+21266+3e24c7b3.s390x.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:crun-1.5-1.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8"
},
"product_reference": "crun-1.5-1.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "crun-1.5-1.module+el8.6.0+21266+3e24c7b3.src.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:crun-1.5-1.module+el8.6.0+21266+3e24c7b3.src.rpm-container-tools:rhel8"
},
"product_reference": "crun-1.5-1.module+el8.6.0+21266+3e24c7b3.src.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "crun-1.5-1.module+el8.6.0+21266+3e24c7b3.x86_64.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:crun-1.5-1.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8"
},
"product_reference": "crun-1.5-1.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "crun-debuginfo-1.5-1.module+el8.6.0+21266+3e24c7b3.aarch64.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:crun-debuginfo-1.5-1.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8"
},
"product_reference": "crun-debuginfo-1.5-1.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "crun-debuginfo-1.5-1.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:crun-debuginfo-1.5-1.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8"
},
"product_reference": "crun-debuginfo-1.5-1.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "crun-debuginfo-1.5-1.module+el8.6.0+21266+3e24c7b3.s390x.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:crun-debuginfo-1.5-1.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8"
},
"product_reference": "crun-debuginfo-1.5-1.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "crun-debuginfo-1.5-1.module+el8.6.0+21266+3e24c7b3.x86_64.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:crun-debuginfo-1.5-1.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8"
},
"product_reference": "crun-debuginfo-1.5-1.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "crun-debugsource-1.5-1.module+el8.6.0+21266+3e24c7b3.aarch64.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:crun-debugsource-1.5-1.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8"
},
"product_reference": "crun-debugsource-1.5-1.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "crun-debugsource-1.5-1.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:crun-debugsource-1.5-1.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8"
},
"product_reference": "crun-debugsource-1.5-1.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "crun-debugsource-1.5-1.module+el8.6.0+21266+3e24c7b3.s390x.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:crun-debugsource-1.5-1.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8"
},
"product_reference": "crun-debugsource-1.5-1.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "crun-debugsource-1.5-1.module+el8.6.0+21266+3e24c7b3.x86_64.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:crun-debugsource-1.5-1.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8"
},
"product_reference": "crun-debugsource-1.5-1.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fuse-overlayfs-1.9-1.module+el8.6.0+21266+3e24c7b3.aarch64.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:fuse-overlayfs-1.9-1.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8"
},
"product_reference": "fuse-overlayfs-1.9-1.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fuse-overlayfs-1.9-1.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:fuse-overlayfs-1.9-1.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8"
},
"product_reference": "fuse-overlayfs-1.9-1.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fuse-overlayfs-1.9-1.module+el8.6.0+21266+3e24c7b3.s390x.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:fuse-overlayfs-1.9-1.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8"
},
"product_reference": "fuse-overlayfs-1.9-1.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fuse-overlayfs-1.9-1.module+el8.6.0+21266+3e24c7b3.src.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:fuse-overlayfs-1.9-1.module+el8.6.0+21266+3e24c7b3.src.rpm-container-tools:rhel8"
},
"product_reference": "fuse-overlayfs-1.9-1.module+el8.6.0+21266+3e24c7b3.src.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fuse-overlayfs-1.9-1.module+el8.6.0+21266+3e24c7b3.x86_64.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:fuse-overlayfs-1.9-1.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8"
},
"product_reference": "fuse-overlayfs-1.9-1.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fuse-overlayfs-debuginfo-1.9-1.module+el8.6.0+21266+3e24c7b3.aarch64.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:fuse-overlayfs-debuginfo-1.9-1.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8"
},
"product_reference": "fuse-overlayfs-debuginfo-1.9-1.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fuse-overlayfs-debuginfo-1.9-1.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:fuse-overlayfs-debuginfo-1.9-1.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8"
},
"product_reference": "fuse-overlayfs-debuginfo-1.9-1.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fuse-overlayfs-debuginfo-1.9-1.module+el8.6.0+21266+3e24c7b3.s390x.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:fuse-overlayfs-debuginfo-1.9-1.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8"
},
"product_reference": "fuse-overlayfs-debuginfo-1.9-1.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fuse-overlayfs-debuginfo-1.9-1.module+el8.6.0+21266+3e24c7b3.x86_64.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:fuse-overlayfs-debuginfo-1.9-1.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8"
},
"product_reference": "fuse-overlayfs-debuginfo-1.9-1.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fuse-overlayfs-debugsource-1.9-1.module+el8.6.0+21266+3e24c7b3.aarch64.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:fuse-overlayfs-debugsource-1.9-1.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8"
},
"product_reference": "fuse-overlayfs-debugsource-1.9-1.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fuse-overlayfs-debugsource-1.9-1.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:fuse-overlayfs-debugsource-1.9-1.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8"
},
"product_reference": "fuse-overlayfs-debugsource-1.9-1.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fuse-overlayfs-debugsource-1.9-1.module+el8.6.0+21266+3e24c7b3.s390x.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:fuse-overlayfs-debugsource-1.9-1.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8"
},
"product_reference": "fuse-overlayfs-debugsource-1.9-1.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fuse-overlayfs-debugsource-1.9-1.module+el8.6.0+21266+3e24c7b3.x86_64.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:fuse-overlayfs-debugsource-1.9-1.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8"
},
"product_reference": "fuse-overlayfs-debugsource-1.9-1.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libslirp-4.4.0-1.module+el8.6.0+21266+3e24c7b3.aarch64.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:libslirp-4.4.0-1.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8"
},
"product_reference": "libslirp-4.4.0-1.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libslirp-4.4.0-1.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:libslirp-4.4.0-1.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8"
},
"product_reference": "libslirp-4.4.0-1.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libslirp-4.4.0-1.module+el8.6.0+21266+3e24c7b3.s390x.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:libslirp-4.4.0-1.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8"
},
"product_reference": "libslirp-4.4.0-1.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libslirp-4.4.0-1.module+el8.6.0+21266+3e24c7b3.src.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:libslirp-4.4.0-1.module+el8.6.0+21266+3e24c7b3.src.rpm-container-tools:rhel8"
},
"product_reference": "libslirp-4.4.0-1.module+el8.6.0+21266+3e24c7b3.src.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libslirp-4.4.0-1.module+el8.6.0+21266+3e24c7b3.x86_64.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:libslirp-4.4.0-1.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8"
},
"product_reference": "libslirp-4.4.0-1.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libslirp-debuginfo-4.4.0-1.module+el8.6.0+21266+3e24c7b3.aarch64.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:libslirp-debuginfo-4.4.0-1.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8"
},
"product_reference": "libslirp-debuginfo-4.4.0-1.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libslirp-debuginfo-4.4.0-1.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:libslirp-debuginfo-4.4.0-1.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8"
},
"product_reference": "libslirp-debuginfo-4.4.0-1.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libslirp-debuginfo-4.4.0-1.module+el8.6.0+21266+3e24c7b3.s390x.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:libslirp-debuginfo-4.4.0-1.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8"
},
"product_reference": "libslirp-debuginfo-4.4.0-1.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libslirp-debuginfo-4.4.0-1.module+el8.6.0+21266+3e24c7b3.x86_64.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:libslirp-debuginfo-4.4.0-1.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8"
},
"product_reference": "libslirp-debuginfo-4.4.0-1.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libslirp-debugsource-4.4.0-1.module+el8.6.0+21266+3e24c7b3.aarch64.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:libslirp-debugsource-4.4.0-1.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8"
},
"product_reference": "libslirp-debugsource-4.4.0-1.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libslirp-debugsource-4.4.0-1.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:libslirp-debugsource-4.4.0-1.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8"
},
"product_reference": "libslirp-debugsource-4.4.0-1.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libslirp-debugsource-4.4.0-1.module+el8.6.0+21266+3e24c7b3.s390x.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:libslirp-debugsource-4.4.0-1.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8"
},
"product_reference": "libslirp-debugsource-4.4.0-1.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libslirp-debugsource-4.4.0-1.module+el8.6.0+21266+3e24c7b3.x86_64.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:libslirp-debugsource-4.4.0-1.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8"
},
"product_reference": "libslirp-debugsource-4.4.0-1.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libslirp-devel-4.4.0-1.module+el8.6.0+21266+3e24c7b3.aarch64.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:libslirp-devel-4.4.0-1.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8"
},
"product_reference": "libslirp-devel-4.4.0-1.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libslirp-devel-4.4.0-1.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:libslirp-devel-4.4.0-1.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8"
},
"product_reference": "libslirp-devel-4.4.0-1.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libslirp-devel-4.4.0-1.module+el8.6.0+21266+3e24c7b3.s390x.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:libslirp-devel-4.4.0-1.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8"
},
"product_reference": "libslirp-devel-4.4.0-1.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libslirp-devel-4.4.0-1.module+el8.6.0+21266+3e24c7b3.x86_64.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:libslirp-devel-4.4.0-1.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8"
},
"product_reference": "libslirp-devel-4.4.0-1.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netavark-1.0.1-40.module+el8.6.0+21266+3e24c7b3.aarch64.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:netavark-1.0.1-40.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8"
},
"product_reference": "netavark-1.0.1-40.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netavark-1.0.1-40.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:netavark-1.0.1-40.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8"
},
"product_reference": "netavark-1.0.1-40.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netavark-1.0.1-40.module+el8.6.0+21266+3e24c7b3.s390x.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:netavark-1.0.1-40.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8"
},
"product_reference": "netavark-1.0.1-40.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netavark-1.0.1-40.module+el8.6.0+21266+3e24c7b3.x86_64.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:netavark-1.0.1-40.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8"
},
"product_reference": "netavark-1.0.1-40.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "oci-seccomp-bpf-hook-1.2.6-1.module+el8.6.0+21266+3e24c7b3.aarch64.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:oci-seccomp-bpf-hook-1.2.6-1.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8"
},
"product_reference": "oci-seccomp-bpf-hook-1.2.6-1.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "oci-seccomp-bpf-hook-1.2.6-1.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:oci-seccomp-bpf-hook-1.2.6-1.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8"
},
"product_reference": "oci-seccomp-bpf-hook-1.2.6-1.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "oci-seccomp-bpf-hook-1.2.6-1.module+el8.6.0+21266+3e24c7b3.s390x.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:oci-seccomp-bpf-hook-1.2.6-1.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8"
},
"product_reference": "oci-seccomp-bpf-hook-1.2.6-1.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "oci-seccomp-bpf-hook-1.2.6-1.module+el8.6.0+21266+3e24c7b3.src.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:oci-seccomp-bpf-hook-1.2.6-1.module+el8.6.0+21266+3e24c7b3.src.rpm-container-tools:rhel8"
},
"product_reference": "oci-seccomp-bpf-hook-1.2.6-1.module+el8.6.0+21266+3e24c7b3.src.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "oci-seccomp-bpf-hook-1.2.6-1.module+el8.6.0+21266+3e24c7b3.x86_64.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:oci-seccomp-bpf-hook-1.2.6-1.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8"
},
"product_reference": "oci-seccomp-bpf-hook-1.2.6-1.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "oci-seccomp-bpf-hook-debuginfo-1.2.6-1.module+el8.6.0+21266+3e24c7b3.aarch64.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:oci-seccomp-bpf-hook-debuginfo-1.2.6-1.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8"
},
"product_reference": "oci-seccomp-bpf-hook-debuginfo-1.2.6-1.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "oci-seccomp-bpf-hook-debuginfo-1.2.6-1.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:oci-seccomp-bpf-hook-debuginfo-1.2.6-1.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8"
},
"product_reference": "oci-seccomp-bpf-hook-debuginfo-1.2.6-1.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "oci-seccomp-bpf-hook-debuginfo-1.2.6-1.module+el8.6.0+21266+3e24c7b3.s390x.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:oci-seccomp-bpf-hook-debuginfo-1.2.6-1.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8"
},
"product_reference": "oci-seccomp-bpf-hook-debuginfo-1.2.6-1.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "oci-seccomp-bpf-hook-debuginfo-1.2.6-1.module+el8.6.0+21266+3e24c7b3.x86_64.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:oci-seccomp-bpf-hook-debuginfo-1.2.6-1.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8"
},
"product_reference": "oci-seccomp-bpf-hook-debuginfo-1.2.6-1.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "oci-seccomp-bpf-hook-debugsource-1.2.6-1.module+el8.6.0+21266+3e24c7b3.aarch64.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:oci-seccomp-bpf-hook-debugsource-1.2.6-1.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8"
},
"product_reference": "oci-seccomp-bpf-hook-debugsource-1.2.6-1.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "oci-seccomp-bpf-hook-debugsource-1.2.6-1.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:oci-seccomp-bpf-hook-debugsource-1.2.6-1.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8"
},
"product_reference": "oci-seccomp-bpf-hook-debugsource-1.2.6-1.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "oci-seccomp-bpf-hook-debugsource-1.2.6-1.module+el8.6.0+21266+3e24c7b3.s390x.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:oci-seccomp-bpf-hook-debugsource-1.2.6-1.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8"
},
"product_reference": "oci-seccomp-bpf-hook-debugsource-1.2.6-1.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "oci-seccomp-bpf-hook-debugsource-1.2.6-1.module+el8.6.0+21266+3e24c7b3.x86_64.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:oci-seccomp-bpf-hook-debugsource-1.2.6-1.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8"
},
"product_reference": "oci-seccomp-bpf-hook-debugsource-1.2.6-1.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-4.2.0-2.module+el8.6.0+21674+8010760f.aarch64.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:podman-4.2.0-2.module+el8.6.0+21674+8010760f.aarch64.rpm-container-tools:rhel8"
},
"product_reference": "podman-4.2.0-2.module+el8.6.0+21674+8010760f.aarch64.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-4.2.0-2.module+el8.6.0+21674+8010760f.ppc64le.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:podman-4.2.0-2.module+el8.6.0+21674+8010760f.ppc64le.rpm-container-tools:rhel8"
},
"product_reference": "podman-4.2.0-2.module+el8.6.0+21674+8010760f.ppc64le.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-4.2.0-2.module+el8.6.0+21674+8010760f.s390x.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:podman-4.2.0-2.module+el8.6.0+21674+8010760f.s390x.rpm-container-tools:rhel8"
},
"product_reference": "podman-4.2.0-2.module+el8.6.0+21674+8010760f.s390x.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-4.2.0-2.module+el8.6.0+21674+8010760f.src.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:podman-4.2.0-2.module+el8.6.0+21674+8010760f.src.rpm-container-tools:rhel8"
},
"product_reference": "podman-4.2.0-2.module+el8.6.0+21674+8010760f.src.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-4.2.0-2.module+el8.6.0+21674+8010760f.x86_64.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:podman-4.2.0-2.module+el8.6.0+21674+8010760f.x86_64.rpm-container-tools:rhel8"
},
"product_reference": "podman-4.2.0-2.module+el8.6.0+21674+8010760f.x86_64.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-catatonit-4.2.0-2.module+el8.6.0+21674+8010760f.aarch64.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:podman-catatonit-4.2.0-2.module+el8.6.0+21674+8010760f.aarch64.rpm-container-tools:rhel8"
},
"product_reference": "podman-catatonit-4.2.0-2.module+el8.6.0+21674+8010760f.aarch64.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-catatonit-4.2.0-2.module+el8.6.0+21674+8010760f.ppc64le.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:podman-catatonit-4.2.0-2.module+el8.6.0+21674+8010760f.ppc64le.rpm-container-tools:rhel8"
},
"product_reference": "podman-catatonit-4.2.0-2.module+el8.6.0+21674+8010760f.ppc64le.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-catatonit-4.2.0-2.module+el8.6.0+21674+8010760f.s390x.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:podman-catatonit-4.2.0-2.module+el8.6.0+21674+8010760f.s390x.rpm-container-tools:rhel8"
},
"product_reference": "podman-catatonit-4.2.0-2.module+el8.6.0+21674+8010760f.s390x.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-catatonit-4.2.0-2.module+el8.6.0+21674+8010760f.x86_64.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:podman-catatonit-4.2.0-2.module+el8.6.0+21674+8010760f.x86_64.rpm-container-tools:rhel8"
},
"product_reference": "podman-catatonit-4.2.0-2.module+el8.6.0+21674+8010760f.x86_64.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-catatonit-debuginfo-4.2.0-2.module+el8.6.0+21674+8010760f.aarch64.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:podman-catatonit-debuginfo-4.2.0-2.module+el8.6.0+21674+8010760f.aarch64.rpm-container-tools:rhel8"
},
"product_reference": "podman-catatonit-debuginfo-4.2.0-2.module+el8.6.0+21674+8010760f.aarch64.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-catatonit-debuginfo-4.2.0-2.module+el8.6.0+21674+8010760f.ppc64le.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:podman-catatonit-debuginfo-4.2.0-2.module+el8.6.0+21674+8010760f.ppc64le.rpm-container-tools:rhel8"
},
"product_reference": "podman-catatonit-debuginfo-4.2.0-2.module+el8.6.0+21674+8010760f.ppc64le.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-catatonit-debuginfo-4.2.0-2.module+el8.6.0+21674+8010760f.s390x.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:podman-catatonit-debuginfo-4.2.0-2.module+el8.6.0+21674+8010760f.s390x.rpm-container-tools:rhel8"
},
"product_reference": "podman-catatonit-debuginfo-4.2.0-2.module+el8.6.0+21674+8010760f.s390x.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-catatonit-debuginfo-4.2.0-2.module+el8.6.0+21674+8010760f.x86_64.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:podman-catatonit-debuginfo-4.2.0-2.module+el8.6.0+21674+8010760f.x86_64.rpm-container-tools:rhel8"
},
"product_reference": "podman-catatonit-debuginfo-4.2.0-2.module+el8.6.0+21674+8010760f.x86_64.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-debuginfo-4.2.0-2.module+el8.6.0+21674+8010760f.aarch64.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:podman-debuginfo-4.2.0-2.module+el8.6.0+21674+8010760f.aarch64.rpm-container-tools:rhel8"
},
"product_reference": "podman-debuginfo-4.2.0-2.module+el8.6.0+21674+8010760f.aarch64.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-debuginfo-4.2.0-2.module+el8.6.0+21674+8010760f.ppc64le.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:podman-debuginfo-4.2.0-2.module+el8.6.0+21674+8010760f.ppc64le.rpm-container-tools:rhel8"
},
"product_reference": "podman-debuginfo-4.2.0-2.module+el8.6.0+21674+8010760f.ppc64le.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-debuginfo-4.2.0-2.module+el8.6.0+21674+8010760f.s390x.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:podman-debuginfo-4.2.0-2.module+el8.6.0+21674+8010760f.s390x.rpm-container-tools:rhel8"
},
"product_reference": "podman-debuginfo-4.2.0-2.module+el8.6.0+21674+8010760f.s390x.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-debuginfo-4.2.0-2.module+el8.6.0+21674+8010760f.x86_64.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:podman-debuginfo-4.2.0-2.module+el8.6.0+21674+8010760f.x86_64.rpm-container-tools:rhel8"
},
"product_reference": "podman-debuginfo-4.2.0-2.module+el8.6.0+21674+8010760f.x86_64.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-debugsource-4.2.0-2.module+el8.6.0+21674+8010760f.aarch64.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:podman-debugsource-4.2.0-2.module+el8.6.0+21674+8010760f.aarch64.rpm-container-tools:rhel8"
},
"product_reference": "podman-debugsource-4.2.0-2.module+el8.6.0+21674+8010760f.aarch64.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-debugsource-4.2.0-2.module+el8.6.0+21674+8010760f.ppc64le.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:podman-debugsource-4.2.0-2.module+el8.6.0+21674+8010760f.ppc64le.rpm-container-tools:rhel8"
},
"product_reference": "podman-debugsource-4.2.0-2.module+el8.6.0+21674+8010760f.ppc64le.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-debugsource-4.2.0-2.module+el8.6.0+21674+8010760f.s390x.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:podman-debugsource-4.2.0-2.module+el8.6.0+21674+8010760f.s390x.rpm-container-tools:rhel8"
},
"product_reference": "podman-debugsource-4.2.0-2.module+el8.6.0+21674+8010760f.s390x.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-debugsource-4.2.0-2.module+el8.6.0+21674+8010760f.x86_64.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:podman-debugsource-4.2.0-2.module+el8.6.0+21674+8010760f.x86_64.rpm-container-tools:rhel8"
},
"product_reference": "podman-debugsource-4.2.0-2.module+el8.6.0+21674+8010760f.x86_64.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-docker-4.2.0-2.module+el8.6.0+21674+8010760f.noarch.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:podman-docker-4.2.0-2.module+el8.6.0+21674+8010760f.noarch.rpm-container-tools:rhel8"
},
"product_reference": "podman-docker-4.2.0-2.module+el8.6.0+21674+8010760f.noarch.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-gvproxy-4.2.0-2.module+el8.6.0+21674+8010760f.aarch64.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:podman-gvproxy-4.2.0-2.module+el8.6.0+21674+8010760f.aarch64.rpm-container-tools:rhel8"
},
"product_reference": "podman-gvproxy-4.2.0-2.module+el8.6.0+21674+8010760f.aarch64.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-gvproxy-4.2.0-2.module+el8.6.0+21674+8010760f.ppc64le.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:podman-gvproxy-4.2.0-2.module+el8.6.0+21674+8010760f.ppc64le.rpm-container-tools:rhel8"
},
"product_reference": "podman-gvproxy-4.2.0-2.module+el8.6.0+21674+8010760f.ppc64le.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-gvproxy-4.2.0-2.module+el8.6.0+21674+8010760f.s390x.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:podman-gvproxy-4.2.0-2.module+el8.6.0+21674+8010760f.s390x.rpm-container-tools:rhel8"
},
"product_reference": "podman-gvproxy-4.2.0-2.module+el8.6.0+21674+8010760f.s390x.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-gvproxy-4.2.0-2.module+el8.6.0+21674+8010760f.x86_64.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:podman-gvproxy-4.2.0-2.module+el8.6.0+21674+8010760f.x86_64.rpm-container-tools:rhel8"
},
"product_reference": "podman-gvproxy-4.2.0-2.module+el8.6.0+21674+8010760f.x86_64.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-gvproxy-debuginfo-4.2.0-2.module+el8.6.0+21674+8010760f.aarch64.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:podman-gvproxy-debuginfo-4.2.0-2.module+el8.6.0+21674+8010760f.aarch64.rpm-container-tools:rhel8"
},
"product_reference": "podman-gvproxy-debuginfo-4.2.0-2.module+el8.6.0+21674+8010760f.aarch64.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-gvproxy-debuginfo-4.2.0-2.module+el8.6.0+21674+8010760f.ppc64le.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:podman-gvproxy-debuginfo-4.2.0-2.module+el8.6.0+21674+8010760f.ppc64le.rpm-container-tools:rhel8"
},
"product_reference": "podman-gvproxy-debuginfo-4.2.0-2.module+el8.6.0+21674+8010760f.ppc64le.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-gvproxy-debuginfo-4.2.0-2.module+el8.6.0+21674+8010760f.s390x.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:podman-gvproxy-debuginfo-4.2.0-2.module+el8.6.0+21674+8010760f.s390x.rpm-container-tools:rhel8"
},
"product_reference": "podman-gvproxy-debuginfo-4.2.0-2.module+el8.6.0+21674+8010760f.s390x.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-gvproxy-debuginfo-4.2.0-2.module+el8.6.0+21674+8010760f.x86_64.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:podman-gvproxy-debuginfo-4.2.0-2.module+el8.6.0+21674+8010760f.x86_64.rpm-container-tools:rhel8"
},
"product_reference": "podman-gvproxy-debuginfo-4.2.0-2.module+el8.6.0+21674+8010760f.x86_64.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-plugins-4.2.0-2.module+el8.6.0+21674+8010760f.aarch64.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:podman-plugins-4.2.0-2.module+el8.6.0+21674+8010760f.aarch64.rpm-container-tools:rhel8"
},
"product_reference": "podman-plugins-4.2.0-2.module+el8.6.0+21674+8010760f.aarch64.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-plugins-4.2.0-2.module+el8.6.0+21674+8010760f.ppc64le.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:podman-plugins-4.2.0-2.module+el8.6.0+21674+8010760f.ppc64le.rpm-container-tools:rhel8"
},
"product_reference": "podman-plugins-4.2.0-2.module+el8.6.0+21674+8010760f.ppc64le.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-plugins-4.2.0-2.module+el8.6.0+21674+8010760f.s390x.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:podman-plugins-4.2.0-2.module+el8.6.0+21674+8010760f.s390x.rpm-container-tools:rhel8"
},
"product_reference": "podman-plugins-4.2.0-2.module+el8.6.0+21674+8010760f.s390x.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-plugins-4.2.0-2.module+el8.6.0+21674+8010760f.x86_64.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:podman-plugins-4.2.0-2.module+el8.6.0+21674+8010760f.x86_64.rpm-container-tools:rhel8"
},
"product_reference": "podman-plugins-4.2.0-2.module+el8.6.0+21674+8010760f.x86_64.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-plugins-debuginfo-4.2.0-2.module+el8.6.0+21674+8010760f.aarch64.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:podman-plugins-debuginfo-4.2.0-2.module+el8.6.0+21674+8010760f.aarch64.rpm-container-tools:rhel8"
},
"product_reference": "podman-plugins-debuginfo-4.2.0-2.module+el8.6.0+21674+8010760f.aarch64.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-plugins-debuginfo-4.2.0-2.module+el8.6.0+21674+8010760f.ppc64le.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:podman-plugins-debuginfo-4.2.0-2.module+el8.6.0+21674+8010760f.ppc64le.rpm-container-tools:rhel8"
},
"product_reference": "podman-plugins-debuginfo-4.2.0-2.module+el8.6.0+21674+8010760f.ppc64le.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-plugins-debuginfo-4.2.0-2.module+el8.6.0+21674+8010760f.s390x.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:podman-plugins-debuginfo-4.2.0-2.module+el8.6.0+21674+8010760f.s390x.rpm-container-tools:rhel8"
},
"product_reference": "podman-plugins-debuginfo-4.2.0-2.module+el8.6.0+21674+8010760f.s390x.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-plugins-debuginfo-4.2.0-2.module+el8.6.0+21674+8010760f.x86_64.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:podman-plugins-debuginfo-4.2.0-2.module+el8.6.0+21674+8010760f.x86_64.rpm-container-tools:rhel8"
},
"product_reference": "podman-plugins-debuginfo-4.2.0-2.module+el8.6.0+21674+8010760f.x86_64.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-remote-4.2.0-2.module+el8.6.0+21674+8010760f.aarch64.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:podman-remote-4.2.0-2.module+el8.6.0+21674+8010760f.aarch64.rpm-container-tools:rhel8"
},
"product_reference": "podman-remote-4.2.0-2.module+el8.6.0+21674+8010760f.aarch64.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-remote-4.2.0-2.module+el8.6.0+21674+8010760f.ppc64le.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:podman-remote-4.2.0-2.module+el8.6.0+21674+8010760f.ppc64le.rpm-container-tools:rhel8"
},
"product_reference": "podman-remote-4.2.0-2.module+el8.6.0+21674+8010760f.ppc64le.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-remote-4.2.0-2.module+el8.6.0+21674+8010760f.s390x.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:podman-remote-4.2.0-2.module+el8.6.0+21674+8010760f.s390x.rpm-container-tools:rhel8"
},
"product_reference": "podman-remote-4.2.0-2.module+el8.6.0+21674+8010760f.s390x.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-remote-4.2.0-2.module+el8.6.0+21674+8010760f.x86_64.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:podman-remote-4.2.0-2.module+el8.6.0+21674+8010760f.x86_64.rpm-container-tools:rhel8"
},
"product_reference": "podman-remote-4.2.0-2.module+el8.6.0+21674+8010760f.x86_64.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-remote-debuginfo-4.2.0-2.module+el8.6.0+21674+8010760f.aarch64.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:podman-remote-debuginfo-4.2.0-2.module+el8.6.0+21674+8010760f.aarch64.rpm-container-tools:rhel8"
},
"product_reference": "podman-remote-debuginfo-4.2.0-2.module+el8.6.0+21674+8010760f.aarch64.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-remote-debuginfo-4.2.0-2.module+el8.6.0+21674+8010760f.ppc64le.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:podman-remote-debuginfo-4.2.0-2.module+el8.6.0+21674+8010760f.ppc64le.rpm-container-tools:rhel8"
},
"product_reference": "podman-remote-debuginfo-4.2.0-2.module+el8.6.0+21674+8010760f.ppc64le.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-remote-debuginfo-4.2.0-2.module+el8.6.0+21674+8010760f.s390x.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:podman-remote-debuginfo-4.2.0-2.module+el8.6.0+21674+8010760f.s390x.rpm-container-tools:rhel8"
},
"product_reference": "podman-remote-debuginfo-4.2.0-2.module+el8.6.0+21674+8010760f.s390x.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-remote-debuginfo-4.2.0-2.module+el8.6.0+21674+8010760f.x86_64.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:podman-remote-debuginfo-4.2.0-2.module+el8.6.0+21674+8010760f.x86_64.rpm-container-tools:rhel8"
},
"product_reference": "podman-remote-debuginfo-4.2.0-2.module+el8.6.0+21674+8010760f.x86_64.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-tests-4.2.0-2.module+el8.6.0+21674+8010760f.aarch64.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:podman-tests-4.2.0-2.module+el8.6.0+21674+8010760f.aarch64.rpm-container-tools:rhel8"
},
"product_reference": "podman-tests-4.2.0-2.module+el8.6.0+21674+8010760f.aarch64.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-tests-4.2.0-2.module+el8.6.0+21674+8010760f.ppc64le.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:podman-tests-4.2.0-2.module+el8.6.0+21674+8010760f.ppc64le.rpm-container-tools:rhel8"
},
"product_reference": "podman-tests-4.2.0-2.module+el8.6.0+21674+8010760f.ppc64le.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-tests-4.2.0-2.module+el8.6.0+21674+8010760f.s390x.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:podman-tests-4.2.0-2.module+el8.6.0+21674+8010760f.s390x.rpm-container-tools:rhel8"
},
"product_reference": "podman-tests-4.2.0-2.module+el8.6.0+21674+8010760f.s390x.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-tests-4.2.0-2.module+el8.6.0+21674+8010760f.x86_64.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:podman-tests-4.2.0-2.module+el8.6.0+21674+8010760f.x86_64.rpm-container-tools:rhel8"
},
"product_reference": "podman-tests-4.2.0-2.module+el8.6.0+21674+8010760f.x86_64.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-podman-4.0.1-1.module+el8.6.0+21266+3e24c7b3.src.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:python-podman-4.0.1-1.module+el8.6.0+21266+3e24c7b3.src.rpm-container-tools:rhel8"
},
"product_reference": "python-podman-4.0.1-1.module+el8.6.0+21266+3e24c7b3.src.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-criu-3.15-3.module+el8.6.0+21266+3e24c7b3.aarch64.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:python3-criu-3.15-3.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8"
},
"product_reference": "python3-criu-3.15-3.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-criu-3.15-3.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:python3-criu-3.15-3.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8"
},
"product_reference": "python3-criu-3.15-3.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-criu-3.15-3.module+el8.6.0+21266+3e24c7b3.s390x.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:python3-criu-3.15-3.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8"
},
"product_reference": "python3-criu-3.15-3.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-criu-3.15-3.module+el8.6.0+21266+3e24c7b3.x86_64.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:python3-criu-3.15-3.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8"
},
"product_reference": "python3-criu-3.15-3.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-podman-4.0.1-1.module+el8.6.0+21266+3e24c7b3.noarch.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:python3-podman-4.0.1-1.module+el8.6.0+21266+3e24c7b3.noarch.rpm-container-tools:rhel8"
},
"product_reference": "python3-podman-4.0.1-1.module+el8.6.0+21266+3e24c7b3.noarch.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "runc-1.1.12-1.module+el8.6.0+21266+3e24c7b3.aarch64.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:runc-1.1.12-1.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8"
},
"product_reference": "runc-1.1.12-1.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "runc-1.1.12-1.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:runc-1.1.12-1.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8"
},
"product_reference": "runc-1.1.12-1.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "runc-1.1.12-1.module+el8.6.0+21266+3e24c7b3.s390x.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:runc-1.1.12-1.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8"
},
"product_reference": "runc-1.1.12-1.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "runc-1.1.12-1.module+el8.6.0+21266+3e24c7b3.src.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:runc-1.1.12-1.module+el8.6.0+21266+3e24c7b3.src.rpm-container-tools:rhel8"
},
"product_reference": "runc-1.1.12-1.module+el8.6.0+21266+3e24c7b3.src.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "runc-1.1.12-1.module+el8.6.0+21266+3e24c7b3.x86_64.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:runc-1.1.12-1.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8"
},
"product_reference": "runc-1.1.12-1.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "runc-debuginfo-1.1.12-1.module+el8.6.0+21266+3e24c7b3.aarch64.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:runc-debuginfo-1.1.12-1.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8"
},
"product_reference": "runc-debuginfo-1.1.12-1.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "runc-debuginfo-1.1.12-1.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:runc-debuginfo-1.1.12-1.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8"
},
"product_reference": "runc-debuginfo-1.1.12-1.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "runc-debuginfo-1.1.12-1.module+el8.6.0+21266+3e24c7b3.s390x.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:runc-debuginfo-1.1.12-1.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8"
},
"product_reference": "runc-debuginfo-1.1.12-1.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "runc-debuginfo-1.1.12-1.module+el8.6.0+21266+3e24c7b3.x86_64.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:runc-debuginfo-1.1.12-1.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8"
},
"product_reference": "runc-debuginfo-1.1.12-1.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "runc-debugsource-1.1.12-1.module+el8.6.0+21266+3e24c7b3.aarch64.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:runc-debugsource-1.1.12-1.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8"
},
"product_reference": "runc-debugsource-1.1.12-1.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "runc-debugsource-1.1.12-1.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:runc-debugsource-1.1.12-1.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8"
},
"product_reference": "runc-debugsource-1.1.12-1.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "runc-debugsource-1.1.12-1.module+el8.6.0+21266+3e24c7b3.s390x.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:runc-debugsource-1.1.12-1.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8"
},
"product_reference": "runc-debugsource-1.1.12-1.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "runc-debugsource-1.1.12-1.module+el8.6.0+21266+3e24c7b3.x86_64.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:runc-debugsource-1.1.12-1.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8"
},
"product_reference": "runc-debugsource-1.1.12-1.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "skopeo-1.9.1-1.module+el8.6.0+21266+3e24c7b3.aarch64.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:skopeo-1.9.1-1.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8"
},
"product_reference": "skopeo-1.9.1-1.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "skopeo-1.9.1-1.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:skopeo-1.9.1-1.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8"
},
"product_reference": "skopeo-1.9.1-1.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "skopeo-1.9.1-1.module+el8.6.0+21266+3e24c7b3.s390x.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:skopeo-1.9.1-1.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8"
},
"product_reference": "skopeo-1.9.1-1.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "skopeo-1.9.1-1.module+el8.6.0+21266+3e24c7b3.src.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:skopeo-1.9.1-1.module+el8.6.0+21266+3e24c7b3.src.rpm-container-tools:rhel8"
},
"product_reference": "skopeo-1.9.1-1.module+el8.6.0+21266+3e24c7b3.src.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "skopeo-1.9.1-1.module+el8.6.0+21266+3e24c7b3.x86_64.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:skopeo-1.9.1-1.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8"
},
"product_reference": "skopeo-1.9.1-1.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "skopeo-debuginfo-1.9.1-1.module+el8.6.0+21266+3e24c7b3.aarch64.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:skopeo-debuginfo-1.9.1-1.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8"
},
"product_reference": "skopeo-debuginfo-1.9.1-1.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "skopeo-debuginfo-1.9.1-1.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:skopeo-debuginfo-1.9.1-1.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8"
},
"product_reference": "skopeo-debuginfo-1.9.1-1.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "skopeo-debuginfo-1.9.1-1.module+el8.6.0+21266+3e24c7b3.s390x.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:skopeo-debuginfo-1.9.1-1.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8"
},
"product_reference": "skopeo-debuginfo-1.9.1-1.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "skopeo-debuginfo-1.9.1-1.module+el8.6.0+21266+3e24c7b3.x86_64.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:skopeo-debuginfo-1.9.1-1.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8"
},
"product_reference": "skopeo-debuginfo-1.9.1-1.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "skopeo-debugsource-1.9.1-1.module+el8.6.0+21266+3e24c7b3.aarch64.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:skopeo-debugsource-1.9.1-1.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8"
},
"product_reference": "skopeo-debugsource-1.9.1-1.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "skopeo-debugsource-1.9.1-1.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:skopeo-debugsource-1.9.1-1.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8"
},
"product_reference": "skopeo-debugsource-1.9.1-1.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "skopeo-debugsource-1.9.1-1.module+el8.6.0+21266+3e24c7b3.s390x.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:skopeo-debugsource-1.9.1-1.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8"
},
"product_reference": "skopeo-debugsource-1.9.1-1.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "skopeo-debugsource-1.9.1-1.module+el8.6.0+21266+3e24c7b3.x86_64.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:skopeo-debugsource-1.9.1-1.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8"
},
"product_reference": "skopeo-debugsource-1.9.1-1.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "skopeo-tests-1.9.1-1.module+el8.6.0+21266+3e24c7b3.aarch64.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:skopeo-tests-1.9.1-1.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8"
},
"product_reference": "skopeo-tests-1.9.1-1.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "skopeo-tests-1.9.1-1.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:skopeo-tests-1.9.1-1.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8"
},
"product_reference": "skopeo-tests-1.9.1-1.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "skopeo-tests-1.9.1-1.module+el8.6.0+21266+3e24c7b3.s390x.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:skopeo-tests-1.9.1-1.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8"
},
"product_reference": "skopeo-tests-1.9.1-1.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "skopeo-tests-1.9.1-1.module+el8.6.0+21266+3e24c7b3.x86_64.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:skopeo-tests-1.9.1-1.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8"
},
"product_reference": "skopeo-tests-1.9.1-1.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "slirp4netns-1.2.0-3.module+el8.6.0+21266+3e24c7b3.aarch64.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:slirp4netns-1.2.0-3.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8"
},
"product_reference": "slirp4netns-1.2.0-3.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "slirp4netns-1.2.0-3.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:slirp4netns-1.2.0-3.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8"
},
"product_reference": "slirp4netns-1.2.0-3.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "slirp4netns-1.2.0-3.module+el8.6.0+21266+3e24c7b3.s390x.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:slirp4netns-1.2.0-3.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8"
},
"product_reference": "slirp4netns-1.2.0-3.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "slirp4netns-1.2.0-3.module+el8.6.0+21266+3e24c7b3.src.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:slirp4netns-1.2.0-3.module+el8.6.0+21266+3e24c7b3.src.rpm-container-tools:rhel8"
},
"product_reference": "slirp4netns-1.2.0-3.module+el8.6.0+21266+3e24c7b3.src.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "slirp4netns-1.2.0-3.module+el8.6.0+21266+3e24c7b3.x86_64.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:slirp4netns-1.2.0-3.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8"
},
"product_reference": "slirp4netns-1.2.0-3.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "slirp4netns-debuginfo-1.2.0-3.module+el8.6.0+21266+3e24c7b3.aarch64.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:slirp4netns-debuginfo-1.2.0-3.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8"
},
"product_reference": "slirp4netns-debuginfo-1.2.0-3.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "slirp4netns-debuginfo-1.2.0-3.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:slirp4netns-debuginfo-1.2.0-3.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8"
},
"product_reference": "slirp4netns-debuginfo-1.2.0-3.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "slirp4netns-debuginfo-1.2.0-3.module+el8.6.0+21266+3e24c7b3.s390x.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:slirp4netns-debuginfo-1.2.0-3.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8"
},
"product_reference": "slirp4netns-debuginfo-1.2.0-3.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "slirp4netns-debuginfo-1.2.0-3.module+el8.6.0+21266+3e24c7b3.x86_64.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:slirp4netns-debuginfo-1.2.0-3.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8"
},
"product_reference": "slirp4netns-debuginfo-1.2.0-3.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "slirp4netns-debugsource-1.2.0-3.module+el8.6.0+21266+3e24c7b3.aarch64.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:slirp4netns-debugsource-1.2.0-3.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8"
},
"product_reference": "slirp4netns-debugsource-1.2.0-3.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "slirp4netns-debugsource-1.2.0-3.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:slirp4netns-debugsource-1.2.0-3.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8"
},
"product_reference": "slirp4netns-debugsource-1.2.0-3.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "slirp4netns-debugsource-1.2.0-3.module+el8.6.0+21266+3e24c7b3.s390x.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:slirp4netns-debugsource-1.2.0-3.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8"
},
"product_reference": "slirp4netns-debugsource-1.2.0-3.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "slirp4netns-debugsource-1.2.0-3.module+el8.6.0+21266+3e24c7b3.x86_64.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:slirp4netns-debugsource-1.2.0-3.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8"
},
"product_reference": "slirp4netns-debugsource-1.2.0-3.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "toolbox-0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.aarch64.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:toolbox-0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8"
},
"product_reference": "toolbox-0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "toolbox-0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:toolbox-0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8"
},
"product_reference": "toolbox-0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "toolbox-0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.s390x.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:toolbox-0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8"
},
"product_reference": "toolbox-0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "toolbox-0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.src.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:toolbox-0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.src.rpm-container-tools:rhel8"
},
"product_reference": "toolbox-0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.src.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "toolbox-0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.x86_64.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:toolbox-0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8"
},
"product_reference": "toolbox-0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "toolbox-debuginfo-0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.aarch64.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:toolbox-debuginfo-0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8"
},
"product_reference": "toolbox-debuginfo-0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "toolbox-debuginfo-0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:toolbox-debuginfo-0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8"
},
"product_reference": "toolbox-debuginfo-0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "toolbox-debuginfo-0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.s390x.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:toolbox-debuginfo-0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8"
},
"product_reference": "toolbox-debuginfo-0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "toolbox-debuginfo-0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.x86_64.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:toolbox-debuginfo-0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8"
},
"product_reference": "toolbox-debuginfo-0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "toolbox-debugsource-0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.aarch64.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:toolbox-debugsource-0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8"
},
"product_reference": "toolbox-debugsource-0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "toolbox-debugsource-0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:toolbox-debugsource-0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8"
},
"product_reference": "toolbox-debugsource-0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "toolbox-debugsource-0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.s390x.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:toolbox-debugsource-0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8"
},
"product_reference": "toolbox-debugsource-0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "toolbox-debugsource-0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.x86_64.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:toolbox-debugsource-0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8"
},
"product_reference": "toolbox-debugsource-0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "toolbox-tests-0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.aarch64.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:toolbox-tests-0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8"
},
"product_reference": "toolbox-tests-0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "toolbox-tests-0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:toolbox-tests-0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8"
},
"product_reference": "toolbox-tests-0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "toolbox-tests-0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.s390x.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:toolbox-tests-0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8"
},
"product_reference": "toolbox-tests-0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "toolbox-tests-0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.x86_64.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:toolbox-tests-0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8"
},
"product_reference": "toolbox-tests-0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "udica-0.2.6-5.module+el8.6.0+21266+3e24c7b3.noarch.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:udica-0.2.6-5.module+el8.6.0+21266+3e24c7b3.noarch.rpm-container-tools:rhel8"
},
"product_reference": "udica-0.2.6-5.module+el8.6.0+21266+3e24c7b3.noarch.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "udica-0.2.6-5.module+el8.6.0+21266+3e24c7b3.src.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:udica-0.2.6-5.module+el8.6.0+21266+3e24c7b3.src.rpm-container-tools:rhel8"
},
"product_reference": "udica-0.2.6-5.module+el8.6.0+21266+3e24c7b3.src.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2022-32149",
"cwe": {
"id": "CWE-407",
"name": "Inefficient Algorithmic Complexity"
},
"discovery_date": "2022-10-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2134010"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in the golang.org/x/text/language package. An attacker can craft an Accept-Language header which ParseAcceptLanguage will take significant time to parse. This issue leads to a denial of service, and can impact availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: golang.org/x/text/language: ParseAcceptLanguage takes a long time to parse complex tags",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "After careful analysis of the vulnerability Redhat is choosing to keep the vulnerability severity as moderate,the vulnerability exists in the ParseAcceptLanguage function of the golang text/language package,when an attacker could craft an unusually large accept header and due to the parser taking quadratic time complexity to finish, firstly the attacker would have to find a way smuggle an input to the parser and even then this would simply not result in a crash of any kind but more of resource hang which while can be unpleasant,does not equate to any real world damage.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.6.0.Z.EUS:aardvark-dns-1.0.1-40.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:aardvark-dns-1.0.1-40.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:aardvark-dns-1.0.1-40.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:aardvark-dns-1.0.1-40.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:buildah-1.26.2-1.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:buildah-1.26.2-1.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:buildah-1.26.2-1.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:buildah-1.26.2-1.module+el8.6.0+21266+3e24c7b3.src.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:buildah-1.26.2-1.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:buildah-debuginfo-1.26.2-1.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:buildah-debuginfo-1.26.2-1.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:buildah-debuginfo-1.26.2-1.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:buildah-debuginfo-1.26.2-1.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:buildah-debugsource-1.26.2-1.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:buildah-debugsource-1.26.2-1.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:buildah-debugsource-1.26.2-1.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:buildah-debugsource-1.26.2-1.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:buildah-tests-1.26.2-1.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:buildah-tests-1.26.2-1.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:buildah-tests-1.26.2-1.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:buildah-tests-1.26.2-1.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:buildah-tests-debuginfo-1.26.2-1.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:buildah-tests-debuginfo-1.26.2-1.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:buildah-tests-debuginfo-1.26.2-1.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:buildah-tests-debuginfo-1.26.2-1.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:cockpit-podman-49.1-1.module+el8.6.0+21266+3e24c7b3.noarch.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:cockpit-podman-49.1-1.module+el8.6.0+21266+3e24c7b3.src.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:conmon-2.1.4-1.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:conmon-2.1.4-1.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:conmon-2.1.4-1.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:conmon-2.1.4-1.module+el8.6.0+21266+3e24c7b3.src.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:conmon-2.1.4-1.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:conmon-debuginfo-2.1.4-1.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:conmon-debuginfo-2.1.4-1.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:conmon-debuginfo-2.1.4-1.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:conmon-debuginfo-2.1.4-1.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:conmon-debugsource-2.1.4-1.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:conmon-debugsource-2.1.4-1.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:conmon-debugsource-2.1.4-1.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:conmon-debugsource-2.1.4-1.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:container-selinux-2.189.0-1.module+el8.6.0+21266+3e24c7b3.noarch.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:container-selinux-2.189.0-1.module+el8.6.0+21266+3e24c7b3.src.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:containernetworking-plugins-1.1.1-4.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:containernetworking-plugins-1.1.1-4.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:containernetworking-plugins-1.1.1-4.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:containernetworking-plugins-1.1.1-4.module+el8.6.0+21266+3e24c7b3.src.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:containernetworking-plugins-1.1.1-4.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:containernetworking-plugins-debuginfo-1.1.1-4.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:containernetworking-plugins-debuginfo-1.1.1-4.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:containernetworking-plugins-debuginfo-1.1.1-4.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:containernetworking-plugins-debuginfo-1.1.1-4.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:containernetworking-plugins-debugsource-1.1.1-4.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:containernetworking-plugins-debugsource-1.1.1-4.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:containernetworking-plugins-debugsource-1.1.1-4.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:containernetworking-plugins-debugsource-1.1.1-4.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:containers-common-1-40.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:containers-common-1-40.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:containers-common-1-40.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:containers-common-1-40.module+el8.6.0+21266+3e24c7b3.src.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:containers-common-1-40.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:crit-3.15-3.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:crit-3.15-3.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:crit-3.15-3.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:crit-3.15-3.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:criu-3.15-3.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:criu-3.15-3.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:criu-3.15-3.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:criu-3.15-3.module+el8.6.0+21266+3e24c7b3.src.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:criu-3.15-3.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:criu-debuginfo-3.15-3.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:criu-debuginfo-3.15-3.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:criu-debuginfo-3.15-3.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:criu-debuginfo-3.15-3.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:criu-debugsource-3.15-3.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:criu-debugsource-3.15-3.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:criu-debugsource-3.15-3.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:criu-debugsource-3.15-3.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:criu-devel-3.15-3.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:criu-devel-3.15-3.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:criu-devel-3.15-3.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:criu-devel-3.15-3.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:criu-libs-3.15-3.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:criu-libs-3.15-3.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:criu-libs-3.15-3.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:criu-libs-3.15-3.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:criu-libs-debuginfo-3.15-3.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:criu-libs-debuginfo-3.15-3.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:criu-libs-debuginfo-3.15-3.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:criu-libs-debuginfo-3.15-3.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:crun-1.5-1.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:crun-1.5-1.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:crun-1.5-1.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:crun-1.5-1.module+el8.6.0+21266+3e24c7b3.src.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:crun-1.5-1.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:crun-debuginfo-1.5-1.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:crun-debuginfo-1.5-1.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:crun-debuginfo-1.5-1.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:crun-debuginfo-1.5-1.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:crun-debugsource-1.5-1.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:crun-debugsource-1.5-1.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:crun-debugsource-1.5-1.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:crun-debugsource-1.5-1.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:fuse-overlayfs-1.9-1.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:fuse-overlayfs-1.9-1.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:fuse-overlayfs-1.9-1.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:fuse-overlayfs-1.9-1.module+el8.6.0+21266+3e24c7b3.src.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:fuse-overlayfs-1.9-1.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:fuse-overlayfs-debuginfo-1.9-1.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:fuse-overlayfs-debuginfo-1.9-1.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:fuse-overlayfs-debuginfo-1.9-1.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:fuse-overlayfs-debuginfo-1.9-1.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:fuse-overlayfs-debugsource-1.9-1.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:fuse-overlayfs-debugsource-1.9-1.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:fuse-overlayfs-debugsource-1.9-1.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:fuse-overlayfs-debugsource-1.9-1.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:libslirp-4.4.0-1.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:libslirp-4.4.0-1.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:libslirp-4.4.0-1.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:libslirp-4.4.0-1.module+el8.6.0+21266+3e24c7b3.src.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:libslirp-4.4.0-1.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:libslirp-debuginfo-4.4.0-1.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:libslirp-debuginfo-4.4.0-1.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:libslirp-debuginfo-4.4.0-1.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:libslirp-debuginfo-4.4.0-1.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:libslirp-debugsource-4.4.0-1.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:libslirp-debugsource-4.4.0-1.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:libslirp-debugsource-4.4.0-1.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:libslirp-debugsource-4.4.0-1.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:libslirp-devel-4.4.0-1.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:libslirp-devel-4.4.0-1.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:libslirp-devel-4.4.0-1.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:libslirp-devel-4.4.0-1.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:netavark-1.0.1-40.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:netavark-1.0.1-40.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:netavark-1.0.1-40.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:netavark-1.0.1-40.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:oci-seccomp-bpf-hook-1.2.6-1.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:oci-seccomp-bpf-hook-1.2.6-1.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:oci-seccomp-bpf-hook-1.2.6-1.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:oci-seccomp-bpf-hook-1.2.6-1.module+el8.6.0+21266+3e24c7b3.src.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:oci-seccomp-bpf-hook-1.2.6-1.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:oci-seccomp-bpf-hook-debuginfo-1.2.6-1.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:oci-seccomp-bpf-hook-debuginfo-1.2.6-1.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:oci-seccomp-bpf-hook-debuginfo-1.2.6-1.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:oci-seccomp-bpf-hook-debuginfo-1.2.6-1.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:oci-seccomp-bpf-hook-debugsource-1.2.6-1.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:oci-seccomp-bpf-hook-debugsource-1.2.6-1.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:oci-seccomp-bpf-hook-debugsource-1.2.6-1.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:oci-seccomp-bpf-hook-debugsource-1.2.6-1.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:podman-4.2.0-2.module+el8.6.0+21674+8010760f.aarch64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:podman-4.2.0-2.module+el8.6.0+21674+8010760f.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:podman-4.2.0-2.module+el8.6.0+21674+8010760f.s390x.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:podman-4.2.0-2.module+el8.6.0+21674+8010760f.src.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:podman-4.2.0-2.module+el8.6.0+21674+8010760f.x86_64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:podman-catatonit-4.2.0-2.module+el8.6.0+21674+8010760f.aarch64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:podman-catatonit-4.2.0-2.module+el8.6.0+21674+8010760f.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:podman-catatonit-4.2.0-2.module+el8.6.0+21674+8010760f.s390x.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:podman-catatonit-4.2.0-2.module+el8.6.0+21674+8010760f.x86_64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:podman-catatonit-debuginfo-4.2.0-2.module+el8.6.0+21674+8010760f.aarch64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:podman-catatonit-debuginfo-4.2.0-2.module+el8.6.0+21674+8010760f.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:podman-catatonit-debuginfo-4.2.0-2.module+el8.6.0+21674+8010760f.s390x.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:podman-catatonit-debuginfo-4.2.0-2.module+el8.6.0+21674+8010760f.x86_64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:podman-debuginfo-4.2.0-2.module+el8.6.0+21674+8010760f.aarch64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:podman-debuginfo-4.2.0-2.module+el8.6.0+21674+8010760f.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:podman-debuginfo-4.2.0-2.module+el8.6.0+21674+8010760f.s390x.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:podman-debuginfo-4.2.0-2.module+el8.6.0+21674+8010760f.x86_64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:podman-debugsource-4.2.0-2.module+el8.6.0+21674+8010760f.aarch64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:podman-debugsource-4.2.0-2.module+el8.6.0+21674+8010760f.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:podman-debugsource-4.2.0-2.module+el8.6.0+21674+8010760f.s390x.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:podman-debugsource-4.2.0-2.module+el8.6.0+21674+8010760f.x86_64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:podman-docker-4.2.0-2.module+el8.6.0+21674+8010760f.noarch.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:podman-gvproxy-4.2.0-2.module+el8.6.0+21674+8010760f.aarch64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:podman-gvproxy-4.2.0-2.module+el8.6.0+21674+8010760f.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:podman-gvproxy-4.2.0-2.module+el8.6.0+21674+8010760f.s390x.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:podman-gvproxy-4.2.0-2.module+el8.6.0+21674+8010760f.x86_64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:podman-gvproxy-debuginfo-4.2.0-2.module+el8.6.0+21674+8010760f.aarch64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:podman-gvproxy-debuginfo-4.2.0-2.module+el8.6.0+21674+8010760f.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:podman-gvproxy-debuginfo-4.2.0-2.module+el8.6.0+21674+8010760f.s390x.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:podman-gvproxy-debuginfo-4.2.0-2.module+el8.6.0+21674+8010760f.x86_64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:podman-plugins-4.2.0-2.module+el8.6.0+21674+8010760f.aarch64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:podman-plugins-4.2.0-2.module+el8.6.0+21674+8010760f.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:podman-plugins-4.2.0-2.module+el8.6.0+21674+8010760f.s390x.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:podman-plugins-4.2.0-2.module+el8.6.0+21674+8010760f.x86_64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:podman-plugins-debuginfo-4.2.0-2.module+el8.6.0+21674+8010760f.aarch64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:podman-plugins-debuginfo-4.2.0-2.module+el8.6.0+21674+8010760f.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:podman-plugins-debuginfo-4.2.0-2.module+el8.6.0+21674+8010760f.s390x.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:podman-plugins-debuginfo-4.2.0-2.module+el8.6.0+21674+8010760f.x86_64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:podman-remote-4.2.0-2.module+el8.6.0+21674+8010760f.aarch64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:podman-remote-4.2.0-2.module+el8.6.0+21674+8010760f.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:podman-remote-4.2.0-2.module+el8.6.0+21674+8010760f.s390x.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:podman-remote-4.2.0-2.module+el8.6.0+21674+8010760f.x86_64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:podman-remote-debuginfo-4.2.0-2.module+el8.6.0+21674+8010760f.aarch64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:podman-remote-debuginfo-4.2.0-2.module+el8.6.0+21674+8010760f.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:podman-remote-debuginfo-4.2.0-2.module+el8.6.0+21674+8010760f.s390x.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:podman-remote-debuginfo-4.2.0-2.module+el8.6.0+21674+8010760f.x86_64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:podman-tests-4.2.0-2.module+el8.6.0+21674+8010760f.aarch64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:podman-tests-4.2.0-2.module+el8.6.0+21674+8010760f.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:podman-tests-4.2.0-2.module+el8.6.0+21674+8010760f.s390x.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:podman-tests-4.2.0-2.module+el8.6.0+21674+8010760f.x86_64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:python-podman-4.0.1-1.module+el8.6.0+21266+3e24c7b3.src.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:python3-criu-3.15-3.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:python3-criu-3.15-3.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:python3-criu-3.15-3.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:python3-criu-3.15-3.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:python3-podman-4.0.1-1.module+el8.6.0+21266+3e24c7b3.noarch.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:runc-1.1.12-1.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:runc-1.1.12-1.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:runc-1.1.12-1.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:runc-1.1.12-1.module+el8.6.0+21266+3e24c7b3.src.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:runc-1.1.12-1.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:runc-debuginfo-1.1.12-1.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:runc-debuginfo-1.1.12-1.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:runc-debuginfo-1.1.12-1.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:runc-debuginfo-1.1.12-1.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:runc-debugsource-1.1.12-1.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:runc-debugsource-1.1.12-1.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:runc-debugsource-1.1.12-1.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:runc-debugsource-1.1.12-1.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:skopeo-1.9.1-1.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:skopeo-1.9.1-1.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:skopeo-1.9.1-1.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:skopeo-1.9.1-1.module+el8.6.0+21266+3e24c7b3.src.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:skopeo-1.9.1-1.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:skopeo-debuginfo-1.9.1-1.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:skopeo-debuginfo-1.9.1-1.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:skopeo-debuginfo-1.9.1-1.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:skopeo-debuginfo-1.9.1-1.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:skopeo-debugsource-1.9.1-1.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:skopeo-debugsource-1.9.1-1.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:skopeo-debugsource-1.9.1-1.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:skopeo-debugsource-1.9.1-1.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:skopeo-tests-1.9.1-1.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:skopeo-tests-1.9.1-1.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:skopeo-tests-1.9.1-1.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:skopeo-tests-1.9.1-1.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:slirp4netns-1.2.0-3.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:slirp4netns-1.2.0-3.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:slirp4netns-1.2.0-3.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:slirp4netns-1.2.0-3.module+el8.6.0+21266+3e24c7b3.src.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:slirp4netns-1.2.0-3.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:slirp4netns-debuginfo-1.2.0-3.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:slirp4netns-debuginfo-1.2.0-3.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:slirp4netns-debuginfo-1.2.0-3.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:slirp4netns-debuginfo-1.2.0-3.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:slirp4netns-debugsource-1.2.0-3.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:slirp4netns-debugsource-1.2.0-3.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:slirp4netns-debugsource-1.2.0-3.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:slirp4netns-debugsource-1.2.0-3.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:toolbox-0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:toolbox-0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:toolbox-0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:toolbox-0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.src.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:toolbox-0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:toolbox-debuginfo-0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:toolbox-debuginfo-0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:toolbox-debuginfo-0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:toolbox-debuginfo-0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:toolbox-debugsource-0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:toolbox-debugsource-0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:toolbox-debugsource-0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:toolbox-debugsource-0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:toolbox-tests-0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:toolbox-tests-0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:toolbox-tests-0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:toolbox-tests-0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:udica-0.2.6-5.module+el8.6.0+21266+3e24c7b3.noarch.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:udica-0.2.6-5.module+el8.6.0+21266+3e24c7b3.src.rpm-container-tools:rhel8"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-32149"
},
{
"category": "external",
"summary": "RHBZ#2134010",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2134010"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-32149",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32149"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-32149",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-32149"
},
{
"category": "external",
"summary": "https://go.dev/issue/56152",
"url": "https://go.dev/issue/56152"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-dev/c/qfPIly0X7aU",
"url": "https://groups.google.com/g/golang-dev/c/qfPIly0X7aU"
}
],
"release_date": "2022-10-11T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-04-23T14:16:09+00:00",
"details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.6.0.Z.EUS:aardvark-dns-1.0.1-40.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:aardvark-dns-1.0.1-40.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:aardvark-dns-1.0.1-40.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:aardvark-dns-1.0.1-40.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:buildah-1.26.2-1.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:buildah-1.26.2-1.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:buildah-1.26.2-1.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:buildah-1.26.2-1.module+el8.6.0+21266+3e24c7b3.src.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:buildah-1.26.2-1.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:buildah-debuginfo-1.26.2-1.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:buildah-debuginfo-1.26.2-1.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:buildah-debuginfo-1.26.2-1.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:buildah-debuginfo-1.26.2-1.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:buildah-debugsource-1.26.2-1.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:buildah-debugsource-1.26.2-1.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:buildah-debugsource-1.26.2-1.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:buildah-debugsource-1.26.2-1.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:buildah-tests-1.26.2-1.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:buildah-tests-1.26.2-1.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:buildah-tests-1.26.2-1.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:buildah-tests-1.26.2-1.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:buildah-tests-debuginfo-1.26.2-1.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:buildah-tests-debuginfo-1.26.2-1.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:buildah-tests-debuginfo-1.26.2-1.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:buildah-tests-debuginfo-1.26.2-1.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:cockpit-podman-49.1-1.module+el8.6.0+21266+3e24c7b3.noarch.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:cockpit-podman-49.1-1.module+el8.6.0+21266+3e24c7b3.src.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:conmon-2.1.4-1.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:conmon-2.1.4-1.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:conmon-2.1.4-1.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:conmon-2.1.4-1.module+el8.6.0+21266+3e24c7b3.src.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:conmon-2.1.4-1.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:conmon-debuginfo-2.1.4-1.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:conmon-debuginfo-2.1.4-1.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:conmon-debuginfo-2.1.4-1.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:conmon-debuginfo-2.1.4-1.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:conmon-debugsource-2.1.4-1.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:conmon-debugsource-2.1.4-1.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:conmon-debugsource-2.1.4-1.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:conmon-debugsource-2.1.4-1.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:container-selinux-2.189.0-1.module+el8.6.0+21266+3e24c7b3.noarch.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:container-selinux-2.189.0-1.module+el8.6.0+21266+3e24c7b3.src.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:containernetworking-plugins-1.1.1-4.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:containernetworking-plugins-1.1.1-4.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:containernetworking-plugins-1.1.1-4.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:containernetworking-plugins-1.1.1-4.module+el8.6.0+21266+3e24c7b3.src.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:containernetworking-plugins-1.1.1-4.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:containernetworking-plugins-debuginfo-1.1.1-4.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:containernetworking-plugins-debuginfo-1.1.1-4.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:containernetworking-plugins-debuginfo-1.1.1-4.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:containernetworking-plugins-debuginfo-1.1.1-4.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:containernetworking-plugins-debugsource-1.1.1-4.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:containernetworking-plugins-debugsource-1.1.1-4.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:containernetworking-plugins-debugsource-1.1.1-4.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:containernetworking-plugins-debugsource-1.1.1-4.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:containers-common-1-40.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:containers-common-1-40.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:containers-common-1-40.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:containers-common-1-40.module+el8.6.0+21266+3e24c7b3.src.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:containers-common-1-40.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:crit-3.15-3.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:crit-3.15-3.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:crit-3.15-3.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:crit-3.15-3.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:criu-3.15-3.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:criu-3.15-3.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:criu-3.15-3.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:criu-3.15-3.module+el8.6.0+21266+3e24c7b3.src.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:criu-3.15-3.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:criu-debuginfo-3.15-3.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:criu-debuginfo-3.15-3.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:criu-debuginfo-3.15-3.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:criu-debuginfo-3.15-3.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:criu-debugsource-3.15-3.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:criu-debugsource-3.15-3.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:criu-debugsource-3.15-3.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:criu-debugsource-3.15-3.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:criu-devel-3.15-3.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:criu-devel-3.15-3.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:criu-devel-3.15-3.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:criu-devel-3.15-3.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:criu-libs-3.15-3.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:criu-libs-3.15-3.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:criu-libs-3.15-3.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:criu-libs-3.15-3.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:criu-libs-debuginfo-3.15-3.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:criu-libs-debuginfo-3.15-3.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:criu-libs-debuginfo-3.15-3.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:criu-libs-debuginfo-3.15-3.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:crun-1.5-1.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:crun-1.5-1.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:crun-1.5-1.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:crun-1.5-1.module+el8.6.0+21266+3e24c7b3.src.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:crun-1.5-1.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:crun-debuginfo-1.5-1.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:crun-debuginfo-1.5-1.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:crun-debuginfo-1.5-1.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:crun-debuginfo-1.5-1.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:crun-debugsource-1.5-1.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:crun-debugsource-1.5-1.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:crun-debugsource-1.5-1.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:crun-debugsource-1.5-1.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:fuse-overlayfs-1.9-1.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:fuse-overlayfs-1.9-1.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:fuse-overlayfs-1.9-1.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:fuse-overlayfs-1.9-1.module+el8.6.0+21266+3e24c7b3.src.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:fuse-overlayfs-1.9-1.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:fuse-overlayfs-debuginfo-1.9-1.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:fuse-overlayfs-debuginfo-1.9-1.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:fuse-overlayfs-debuginfo-1.9-1.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:fuse-overlayfs-debuginfo-1.9-1.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:fuse-overlayfs-debugsource-1.9-1.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:fuse-overlayfs-debugsource-1.9-1.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:fuse-overlayfs-debugsource-1.9-1.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:fuse-overlayfs-debugsource-1.9-1.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:libslirp-4.4.0-1.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:libslirp-4.4.0-1.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:libslirp-4.4.0-1.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:libslirp-4.4.0-1.module+el8.6.0+21266+3e24c7b3.src.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:libslirp-4.4.0-1.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:libslirp-debuginfo-4.4.0-1.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:libslirp-debuginfo-4.4.0-1.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:libslirp-debuginfo-4.4.0-1.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:libslirp-debuginfo-4.4.0-1.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:libslirp-debugsource-4.4.0-1.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:libslirp-debugsource-4.4.0-1.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:libslirp-debugsource-4.4.0-1.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:libslirp-debugsource-4.4.0-1.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:libslirp-devel-4.4.0-1.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:libslirp-devel-4.4.0-1.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:libslirp-devel-4.4.0-1.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:libslirp-devel-4.4.0-1.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:netavark-1.0.1-40.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:netavark-1.0.1-40.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:netavark-1.0.1-40.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:netavark-1.0.1-40.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:oci-seccomp-bpf-hook-1.2.6-1.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:oci-seccomp-bpf-hook-1.2.6-1.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:oci-seccomp-bpf-hook-1.2.6-1.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:oci-seccomp-bpf-hook-1.2.6-1.module+el8.6.0+21266+3e24c7b3.src.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:oci-seccomp-bpf-hook-1.2.6-1.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:oci-seccomp-bpf-hook-debuginfo-1.2.6-1.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:oci-seccomp-bpf-hook-debuginfo-1.2.6-1.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:oci-seccomp-bpf-hook-debuginfo-1.2.6-1.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:oci-seccomp-bpf-hook-debuginfo-1.2.6-1.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:oci-seccomp-bpf-hook-debugsource-1.2.6-1.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:oci-seccomp-bpf-hook-debugsource-1.2.6-1.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:oci-seccomp-bpf-hook-debugsource-1.2.6-1.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:oci-seccomp-bpf-hook-debugsource-1.2.6-1.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:podman-4.2.0-2.module+el8.6.0+21674+8010760f.aarch64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:podman-4.2.0-2.module+el8.6.0+21674+8010760f.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:podman-4.2.0-2.module+el8.6.0+21674+8010760f.s390x.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:podman-4.2.0-2.module+el8.6.0+21674+8010760f.src.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:podman-4.2.0-2.module+el8.6.0+21674+8010760f.x86_64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:podman-catatonit-4.2.0-2.module+el8.6.0+21674+8010760f.aarch64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:podman-catatonit-4.2.0-2.module+el8.6.0+21674+8010760f.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:podman-catatonit-4.2.0-2.module+el8.6.0+21674+8010760f.s390x.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:podman-catatonit-4.2.0-2.module+el8.6.0+21674+8010760f.x86_64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:podman-catatonit-debuginfo-4.2.0-2.module+el8.6.0+21674+8010760f.aarch64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:podman-catatonit-debuginfo-4.2.0-2.module+el8.6.0+21674+8010760f.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:podman-catatonit-debuginfo-4.2.0-2.module+el8.6.0+21674+8010760f.s390x.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:podman-catatonit-debuginfo-4.2.0-2.module+el8.6.0+21674+8010760f.x86_64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:podman-debuginfo-4.2.0-2.module+el8.6.0+21674+8010760f.aarch64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:podman-debuginfo-4.2.0-2.module+el8.6.0+21674+8010760f.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:podman-debuginfo-4.2.0-2.module+el8.6.0+21674+8010760f.s390x.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:podman-debuginfo-4.2.0-2.module+el8.6.0+21674+8010760f.x86_64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:podman-debugsource-4.2.0-2.module+el8.6.0+21674+8010760f.aarch64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:podman-debugsource-4.2.0-2.module+el8.6.0+21674+8010760f.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:podman-debugsource-4.2.0-2.module+el8.6.0+21674+8010760f.s390x.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:podman-debugsource-4.2.0-2.module+el8.6.0+21674+8010760f.x86_64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:podman-docker-4.2.0-2.module+el8.6.0+21674+8010760f.noarch.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:podman-gvproxy-4.2.0-2.module+el8.6.0+21674+8010760f.aarch64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:podman-gvproxy-4.2.0-2.module+el8.6.0+21674+8010760f.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:podman-gvproxy-4.2.0-2.module+el8.6.0+21674+8010760f.s390x.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:podman-gvproxy-4.2.0-2.module+el8.6.0+21674+8010760f.x86_64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:podman-gvproxy-debuginfo-4.2.0-2.module+el8.6.0+21674+8010760f.aarch64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:podman-gvproxy-debuginfo-4.2.0-2.module+el8.6.0+21674+8010760f.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:podman-gvproxy-debuginfo-4.2.0-2.module+el8.6.0+21674+8010760f.s390x.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:podman-gvproxy-debuginfo-4.2.0-2.module+el8.6.0+21674+8010760f.x86_64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:podman-plugins-4.2.0-2.module+el8.6.0+21674+8010760f.aarch64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:podman-plugins-4.2.0-2.module+el8.6.0+21674+8010760f.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:podman-plugins-4.2.0-2.module+el8.6.0+21674+8010760f.s390x.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:podman-plugins-4.2.0-2.module+el8.6.0+21674+8010760f.x86_64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:podman-plugins-debuginfo-4.2.0-2.module+el8.6.0+21674+8010760f.aarch64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:podman-plugins-debuginfo-4.2.0-2.module+el8.6.0+21674+8010760f.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:podman-plugins-debuginfo-4.2.0-2.module+el8.6.0+21674+8010760f.s390x.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:podman-plugins-debuginfo-4.2.0-2.module+el8.6.0+21674+8010760f.x86_64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:podman-remote-4.2.0-2.module+el8.6.0+21674+8010760f.aarch64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:podman-remote-4.2.0-2.module+el8.6.0+21674+8010760f.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:podman-remote-4.2.0-2.module+el8.6.0+21674+8010760f.s390x.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:podman-remote-4.2.0-2.module+el8.6.0+21674+8010760f.x86_64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:podman-remote-debuginfo-4.2.0-2.module+el8.6.0+21674+8010760f.aarch64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:podman-remote-debuginfo-4.2.0-2.module+el8.6.0+21674+8010760f.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:podman-remote-debuginfo-4.2.0-2.module+el8.6.0+21674+8010760f.s390x.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:podman-remote-debuginfo-4.2.0-2.module+el8.6.0+21674+8010760f.x86_64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:podman-tests-4.2.0-2.module+el8.6.0+21674+8010760f.aarch64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:podman-tests-4.2.0-2.module+el8.6.0+21674+8010760f.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:podman-tests-4.2.0-2.module+el8.6.0+21674+8010760f.s390x.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:podman-tests-4.2.0-2.module+el8.6.0+21674+8010760f.x86_64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:python-podman-4.0.1-1.module+el8.6.0+21266+3e24c7b3.src.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:python3-criu-3.15-3.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:python3-criu-3.15-3.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:python3-criu-3.15-3.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:python3-criu-3.15-3.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:python3-podman-4.0.1-1.module+el8.6.0+21266+3e24c7b3.noarch.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:runc-1.1.12-1.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:runc-1.1.12-1.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:runc-1.1.12-1.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:runc-1.1.12-1.module+el8.6.0+21266+3e24c7b3.src.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:runc-1.1.12-1.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:runc-debuginfo-1.1.12-1.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:runc-debuginfo-1.1.12-1.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:runc-debuginfo-1.1.12-1.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:runc-debuginfo-1.1.12-1.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:runc-debugsource-1.1.12-1.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:runc-debugsource-1.1.12-1.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:runc-debugsource-1.1.12-1.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:runc-debugsource-1.1.12-1.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:skopeo-1.9.1-1.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:skopeo-1.9.1-1.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:skopeo-1.9.1-1.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:skopeo-1.9.1-1.module+el8.6.0+21266+3e24c7b3.src.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:skopeo-1.9.1-1.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:skopeo-debuginfo-1.9.1-1.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:skopeo-debuginfo-1.9.1-1.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:skopeo-debuginfo-1.9.1-1.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:skopeo-debuginfo-1.9.1-1.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:skopeo-debugsource-1.9.1-1.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:skopeo-debugsource-1.9.1-1.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:skopeo-debugsource-1.9.1-1.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:skopeo-debugsource-1.9.1-1.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:skopeo-tests-1.9.1-1.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:skopeo-tests-1.9.1-1.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:skopeo-tests-1.9.1-1.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:skopeo-tests-1.9.1-1.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:slirp4netns-1.2.0-3.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:slirp4netns-1.2.0-3.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:slirp4netns-1.2.0-3.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:slirp4netns-1.2.0-3.module+el8.6.0+21266+3e24c7b3.src.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:slirp4netns-1.2.0-3.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:slirp4netns-debuginfo-1.2.0-3.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:slirp4netns-debuginfo-1.2.0-3.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:slirp4netns-debuginfo-1.2.0-3.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:slirp4netns-debuginfo-1.2.0-3.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:slirp4netns-debugsource-1.2.0-3.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:slirp4netns-debugsource-1.2.0-3.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:slirp4netns-debugsource-1.2.0-3.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:slirp4netns-debugsource-1.2.0-3.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:toolbox-0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:toolbox-0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:toolbox-0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:toolbox-0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.src.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:toolbox-0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:toolbox-debuginfo-0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:toolbox-debuginfo-0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:toolbox-debuginfo-0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:toolbox-debuginfo-0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:toolbox-debugsource-0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:toolbox-debugsource-0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:toolbox-debugsource-0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:toolbox-debugsource-0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:toolbox-tests-0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:toolbox-tests-0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:toolbox-tests-0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:toolbox-tests-0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:udica-0.2.6-5.module+el8.6.0+21266+3e24c7b3.noarch.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:udica-0.2.6-5.module+el8.6.0+21266+3e24c7b3.src.rpm-container-tools:rhel8"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:1994"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.6.0.Z.EUS:aardvark-dns-1.0.1-40.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:aardvark-dns-1.0.1-40.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:aardvark-dns-1.0.1-40.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:aardvark-dns-1.0.1-40.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:buildah-1.26.2-1.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:buildah-1.26.2-1.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:buildah-1.26.2-1.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:buildah-1.26.2-1.module+el8.6.0+21266+3e24c7b3.src.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:buildah-1.26.2-1.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:buildah-debuginfo-1.26.2-1.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:buildah-debuginfo-1.26.2-1.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:buildah-debuginfo-1.26.2-1.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:buildah-debuginfo-1.26.2-1.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:buildah-debugsource-1.26.2-1.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:buildah-debugsource-1.26.2-1.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:buildah-debugsource-1.26.2-1.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:buildah-debugsource-1.26.2-1.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:buildah-tests-1.26.2-1.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:buildah-tests-1.26.2-1.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:buildah-tests-1.26.2-1.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:buildah-tests-1.26.2-1.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:buildah-tests-debuginfo-1.26.2-1.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:buildah-tests-debuginfo-1.26.2-1.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:buildah-tests-debuginfo-1.26.2-1.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:buildah-tests-debuginfo-1.26.2-1.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:cockpit-podman-49.1-1.module+el8.6.0+21266+3e24c7b3.noarch.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:cockpit-podman-49.1-1.module+el8.6.0+21266+3e24c7b3.src.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:conmon-2.1.4-1.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:conmon-2.1.4-1.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:conmon-2.1.4-1.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:conmon-2.1.4-1.module+el8.6.0+21266+3e24c7b3.src.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:conmon-2.1.4-1.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:conmon-debuginfo-2.1.4-1.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:conmon-debuginfo-2.1.4-1.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:conmon-debuginfo-2.1.4-1.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:conmon-debuginfo-2.1.4-1.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:conmon-debugsource-2.1.4-1.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:conmon-debugsource-2.1.4-1.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:conmon-debugsource-2.1.4-1.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:conmon-debugsource-2.1.4-1.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:container-selinux-2.189.0-1.module+el8.6.0+21266+3e24c7b3.noarch.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:container-selinux-2.189.0-1.module+el8.6.0+21266+3e24c7b3.src.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:containernetworking-plugins-1.1.1-4.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:containernetworking-plugins-1.1.1-4.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:containernetworking-plugins-1.1.1-4.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:containernetworking-plugins-1.1.1-4.module+el8.6.0+21266+3e24c7b3.src.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:containernetworking-plugins-1.1.1-4.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:containernetworking-plugins-debuginfo-1.1.1-4.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:containernetworking-plugins-debuginfo-1.1.1-4.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:containernetworking-plugins-debuginfo-1.1.1-4.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:containernetworking-plugins-debuginfo-1.1.1-4.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:containernetworking-plugins-debugsource-1.1.1-4.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:containernetworking-plugins-debugsource-1.1.1-4.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:containernetworking-plugins-debugsource-1.1.1-4.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:containernetworking-plugins-debugsource-1.1.1-4.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:containers-common-1-40.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:containers-common-1-40.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:containers-common-1-40.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:containers-common-1-40.module+el8.6.0+21266+3e24c7b3.src.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:containers-common-1-40.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:crit-3.15-3.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:crit-3.15-3.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:crit-3.15-3.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:crit-3.15-3.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:criu-3.15-3.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:criu-3.15-3.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:criu-3.15-3.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:criu-3.15-3.module+el8.6.0+21266+3e24c7b3.src.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:criu-3.15-3.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:criu-debuginfo-3.15-3.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:criu-debuginfo-3.15-3.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:criu-debuginfo-3.15-3.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:criu-debuginfo-3.15-3.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:criu-debugsource-3.15-3.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:criu-debugsource-3.15-3.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:criu-debugsource-3.15-3.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:criu-debugsource-3.15-3.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:criu-devel-3.15-3.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:criu-devel-3.15-3.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:criu-devel-3.15-3.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:criu-devel-3.15-3.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:criu-libs-3.15-3.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:criu-libs-3.15-3.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:criu-libs-3.15-3.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:criu-libs-3.15-3.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:criu-libs-debuginfo-3.15-3.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:criu-libs-debuginfo-3.15-3.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:criu-libs-debuginfo-3.15-3.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:criu-libs-debuginfo-3.15-3.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:crun-1.5-1.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:crun-1.5-1.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:crun-1.5-1.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:crun-1.5-1.module+el8.6.0+21266+3e24c7b3.src.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:crun-1.5-1.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:crun-debuginfo-1.5-1.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:crun-debuginfo-1.5-1.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:crun-debuginfo-1.5-1.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:crun-debuginfo-1.5-1.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:crun-debugsource-1.5-1.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:crun-debugsource-1.5-1.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:crun-debugsource-1.5-1.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:crun-debugsource-1.5-1.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:fuse-overlayfs-1.9-1.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:fuse-overlayfs-1.9-1.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:fuse-overlayfs-1.9-1.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:fuse-overlayfs-1.9-1.module+el8.6.0+21266+3e24c7b3.src.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:fuse-overlayfs-1.9-1.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:fuse-overlayfs-debuginfo-1.9-1.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:fuse-overlayfs-debuginfo-1.9-1.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:fuse-overlayfs-debuginfo-1.9-1.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:fuse-overlayfs-debuginfo-1.9-1.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:fuse-overlayfs-debugsource-1.9-1.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:fuse-overlayfs-debugsource-1.9-1.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:fuse-overlayfs-debugsource-1.9-1.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:fuse-overlayfs-debugsource-1.9-1.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:libslirp-4.4.0-1.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:libslirp-4.4.0-1.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:libslirp-4.4.0-1.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:libslirp-4.4.0-1.module+el8.6.0+21266+3e24c7b3.src.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:libslirp-4.4.0-1.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:libslirp-debuginfo-4.4.0-1.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:libslirp-debuginfo-4.4.0-1.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:libslirp-debuginfo-4.4.0-1.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:libslirp-debuginfo-4.4.0-1.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:libslirp-debugsource-4.4.0-1.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:libslirp-debugsource-4.4.0-1.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:libslirp-debugsource-4.4.0-1.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:libslirp-debugsource-4.4.0-1.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:libslirp-devel-4.4.0-1.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:libslirp-devel-4.4.0-1.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:libslirp-devel-4.4.0-1.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:libslirp-devel-4.4.0-1.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:netavark-1.0.1-40.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:netavark-1.0.1-40.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:netavark-1.0.1-40.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:netavark-1.0.1-40.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:oci-seccomp-bpf-hook-1.2.6-1.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:oci-seccomp-bpf-hook-1.2.6-1.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:oci-seccomp-bpf-hook-1.2.6-1.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:oci-seccomp-bpf-hook-1.2.6-1.module+el8.6.0+21266+3e24c7b3.src.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:oci-seccomp-bpf-hook-1.2.6-1.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:oci-seccomp-bpf-hook-debuginfo-1.2.6-1.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:oci-seccomp-bpf-hook-debuginfo-1.2.6-1.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:oci-seccomp-bpf-hook-debuginfo-1.2.6-1.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:oci-seccomp-bpf-hook-debuginfo-1.2.6-1.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:oci-seccomp-bpf-hook-debugsource-1.2.6-1.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:oci-seccomp-bpf-hook-debugsource-1.2.6-1.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:oci-seccomp-bpf-hook-debugsource-1.2.6-1.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:oci-seccomp-bpf-hook-debugsource-1.2.6-1.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:podman-4.2.0-2.module+el8.6.0+21674+8010760f.aarch64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:podman-4.2.0-2.module+el8.6.0+21674+8010760f.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:podman-4.2.0-2.module+el8.6.0+21674+8010760f.s390x.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:podman-4.2.0-2.module+el8.6.0+21674+8010760f.src.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:podman-4.2.0-2.module+el8.6.0+21674+8010760f.x86_64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:podman-catatonit-4.2.0-2.module+el8.6.0+21674+8010760f.aarch64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:podman-catatonit-4.2.0-2.module+el8.6.0+21674+8010760f.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:podman-catatonit-4.2.0-2.module+el8.6.0+21674+8010760f.s390x.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:podman-catatonit-4.2.0-2.module+el8.6.0+21674+8010760f.x86_64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:podman-catatonit-debuginfo-4.2.0-2.module+el8.6.0+21674+8010760f.aarch64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:podman-catatonit-debuginfo-4.2.0-2.module+el8.6.0+21674+8010760f.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:podman-catatonit-debuginfo-4.2.0-2.module+el8.6.0+21674+8010760f.s390x.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:podman-catatonit-debuginfo-4.2.0-2.module+el8.6.0+21674+8010760f.x86_64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:podman-debuginfo-4.2.0-2.module+el8.6.0+21674+8010760f.aarch64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:podman-debuginfo-4.2.0-2.module+el8.6.0+21674+8010760f.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:podman-debuginfo-4.2.0-2.module+el8.6.0+21674+8010760f.s390x.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:podman-debuginfo-4.2.0-2.module+el8.6.0+21674+8010760f.x86_64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:podman-debugsource-4.2.0-2.module+el8.6.0+21674+8010760f.aarch64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:podman-debugsource-4.2.0-2.module+el8.6.0+21674+8010760f.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:podman-debugsource-4.2.0-2.module+el8.6.0+21674+8010760f.s390x.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:podman-debugsource-4.2.0-2.module+el8.6.0+21674+8010760f.x86_64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:podman-docker-4.2.0-2.module+el8.6.0+21674+8010760f.noarch.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:podman-gvproxy-4.2.0-2.module+el8.6.0+21674+8010760f.aarch64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:podman-gvproxy-4.2.0-2.module+el8.6.0+21674+8010760f.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:podman-gvproxy-4.2.0-2.module+el8.6.0+21674+8010760f.s390x.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:podman-gvproxy-4.2.0-2.module+el8.6.0+21674+8010760f.x86_64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:podman-gvproxy-debuginfo-4.2.0-2.module+el8.6.0+21674+8010760f.aarch64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:podman-gvproxy-debuginfo-4.2.0-2.module+el8.6.0+21674+8010760f.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:podman-gvproxy-debuginfo-4.2.0-2.module+el8.6.0+21674+8010760f.s390x.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:podman-gvproxy-debuginfo-4.2.0-2.module+el8.6.0+21674+8010760f.x86_64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:podman-plugins-4.2.0-2.module+el8.6.0+21674+8010760f.aarch64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:podman-plugins-4.2.0-2.module+el8.6.0+21674+8010760f.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:podman-plugins-4.2.0-2.module+el8.6.0+21674+8010760f.s390x.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:podman-plugins-4.2.0-2.module+el8.6.0+21674+8010760f.x86_64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:podman-plugins-debuginfo-4.2.0-2.module+el8.6.0+21674+8010760f.aarch64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:podman-plugins-debuginfo-4.2.0-2.module+el8.6.0+21674+8010760f.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:podman-plugins-debuginfo-4.2.0-2.module+el8.6.0+21674+8010760f.s390x.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:podman-plugins-debuginfo-4.2.0-2.module+el8.6.0+21674+8010760f.x86_64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:podman-remote-4.2.0-2.module+el8.6.0+21674+8010760f.aarch64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:podman-remote-4.2.0-2.module+el8.6.0+21674+8010760f.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:podman-remote-4.2.0-2.module+el8.6.0+21674+8010760f.s390x.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:podman-remote-4.2.0-2.module+el8.6.0+21674+8010760f.x86_64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:podman-remote-debuginfo-4.2.0-2.module+el8.6.0+21674+8010760f.aarch64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:podman-remote-debuginfo-4.2.0-2.module+el8.6.0+21674+8010760f.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:podman-remote-debuginfo-4.2.0-2.module+el8.6.0+21674+8010760f.s390x.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:podman-remote-debuginfo-4.2.0-2.module+el8.6.0+21674+8010760f.x86_64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:podman-tests-4.2.0-2.module+el8.6.0+21674+8010760f.aarch64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:podman-tests-4.2.0-2.module+el8.6.0+21674+8010760f.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:podman-tests-4.2.0-2.module+el8.6.0+21674+8010760f.s390x.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:podman-tests-4.2.0-2.module+el8.6.0+21674+8010760f.x86_64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:python-podman-4.0.1-1.module+el8.6.0+21266+3e24c7b3.src.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:python3-criu-3.15-3.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:python3-criu-3.15-3.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:python3-criu-3.15-3.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:python3-criu-3.15-3.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:python3-podman-4.0.1-1.module+el8.6.0+21266+3e24c7b3.noarch.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:runc-1.1.12-1.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:runc-1.1.12-1.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:runc-1.1.12-1.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:runc-1.1.12-1.module+el8.6.0+21266+3e24c7b3.src.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:runc-1.1.12-1.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:runc-debuginfo-1.1.12-1.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:runc-debuginfo-1.1.12-1.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:runc-debuginfo-1.1.12-1.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:runc-debuginfo-1.1.12-1.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:runc-debugsource-1.1.12-1.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:runc-debugsource-1.1.12-1.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:runc-debugsource-1.1.12-1.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:runc-debugsource-1.1.12-1.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:skopeo-1.9.1-1.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:skopeo-1.9.1-1.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:skopeo-1.9.1-1.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:skopeo-1.9.1-1.module+el8.6.0+21266+3e24c7b3.src.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:skopeo-1.9.1-1.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:skopeo-debuginfo-1.9.1-1.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:skopeo-debuginfo-1.9.1-1.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:skopeo-debuginfo-1.9.1-1.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:skopeo-debuginfo-1.9.1-1.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:skopeo-debugsource-1.9.1-1.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:skopeo-debugsource-1.9.1-1.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:skopeo-debugsource-1.9.1-1.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:skopeo-debugsource-1.9.1-1.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:skopeo-tests-1.9.1-1.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:skopeo-tests-1.9.1-1.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:skopeo-tests-1.9.1-1.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:skopeo-tests-1.9.1-1.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:slirp4netns-1.2.0-3.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:slirp4netns-1.2.0-3.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:slirp4netns-1.2.0-3.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:slirp4netns-1.2.0-3.module+el8.6.0+21266+3e24c7b3.src.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:slirp4netns-1.2.0-3.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:slirp4netns-debuginfo-1.2.0-3.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:slirp4netns-debuginfo-1.2.0-3.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:slirp4netns-debuginfo-1.2.0-3.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:slirp4netns-debuginfo-1.2.0-3.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:slirp4netns-debugsource-1.2.0-3.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:slirp4netns-debugsource-1.2.0-3.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:slirp4netns-debugsource-1.2.0-3.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:slirp4netns-debugsource-1.2.0-3.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:toolbox-0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:toolbox-0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:toolbox-0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:toolbox-0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.src.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:toolbox-0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:toolbox-debuginfo-0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:toolbox-debuginfo-0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:toolbox-debuginfo-0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:toolbox-debuginfo-0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:toolbox-debugsource-0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:toolbox-debugsource-0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:toolbox-debugsource-0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:toolbox-debugsource-0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:toolbox-tests-0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.aarch64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:toolbox-tests-0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:toolbox-tests-0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.s390x.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:toolbox-tests-0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.x86_64.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:udica-0.2.6-5.module+el8.6.0+21266+3e24c7b3.noarch.rpm-container-tools:rhel8",
"AppStream-8.6.0.Z.EUS:udica-0.2.6-5.module+el8.6.0+21266+3e24c7b3.src.rpm-container-tools:rhel8"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "golang: golang.org/x/text/language: ParseAcceptLanguage takes a long time to parse complex tags"
}
]
}
RHSA-2024:2077
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for the container-tools:rhel8 module is now available for Red Hat Enterprise Linux 8.8 Extended Update Support.\n\nSecurity team has rated the vulnerability impact of the fixed issues as Important.",
"title": "Topic"
},
{
"category": "general",
"text": "The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc.\n\nSecurity Fix(es):\n\n* golang: golang.org/x/text/language: ParseAcceptLanguage takes a long time to parse complex tags (CVE-2022-32149)\n\n* podman: Symlink error leads to information disclosure (CVE-2022-4122)\n\n* buildah: full container escape at build time (CVE-2024-1753)\n\nFor more details about the security issue(s), including the impact, a CVSS\nscore, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2024:2077",
"url": "https://access.redhat.com/errata/RHSA-2024:2077"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "2134010",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2134010"
},
{
"category": "external",
"summary": "2144983",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2144983"
},
{
"category": "external",
"summary": "2265513",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2265513"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_2077.json"
}
],
"title": "Red Hat Security Advisory: container-tools:rhel8 security and bug fix update",
"tracking": {
"current_release_date": "2025-10-10T01:55:36+00:00",
"generator": {
"date": "2025-10-10T01:55:36+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.9"
}
},
"id": "RHSA-2024:2077",
"initial_release_date": "2024-04-29T12:00:29+00:00",
"revision_history": [
{
"date": "2024-04-29T12:00:29+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2024-04-29T12:00:29+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-10-10T01:55:36+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product": {
"name": "Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_eus:8.8::appstream"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "aardvark-dns-1.5.0-2.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8",
"product": {
"name": "aardvark-dns-1.5.0-2.module+el8.8.0+21741+dd5be1e7.src.rpm (container-tools:rhel8)",
"product_id": "aardvark-dns-1.5.0-2.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/aardvark-dns@1.5.0-2.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=src\u0026epoch=2\u0026rpmmod=container-tools:rhel8:8080020240422101606:0f77c1b7"
}
}
},
{
"category": "product_version",
"name": "buildah-1.29.3-1.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8",
"product": {
"name": "buildah-1.29.3-1.module+el8.8.0+21741+dd5be1e7.src.rpm (container-tools:rhel8)",
"product_id": "buildah-1.29.3-1.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/buildah@1.29.3-1.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=src\u0026epoch=1\u0026rpmmod=container-tools:rhel8:8080020240422101606:0f77c1b7"
}
}
},
{
"category": "product_version",
"name": "cockpit-podman-63.1-1.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8",
"product": {
"name": "cockpit-podman-63.1-1.module+el8.8.0+21741+dd5be1e7.src.rpm (container-tools:rhel8)",
"product_id": "cockpit-podman-63.1-1.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cockpit-podman@63.1-1.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=src\u0026rpmmod=container-tools:rhel8:8080020240422101606:0f77c1b7"
}
}
},
{
"category": "product_version",
"name": "conmon-2.1.6-1.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8",
"product": {
"name": "conmon-2.1.6-1.module+el8.8.0+21741+dd5be1e7.src.rpm (container-tools:rhel8)",
"product_id": "conmon-2.1.6-1.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/conmon@2.1.6-1.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=src\u0026epoch=3\u0026rpmmod=container-tools:rhel8:8080020240422101606:0f77c1b7"
}
}
},
{
"category": "product_version",
"name": "container-selinux-2.229.0-1.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8",
"product": {
"name": "container-selinux-2.229.0-1.module+el8.8.0+21741+dd5be1e7.src.rpm (container-tools:rhel8)",
"product_id": "container-selinux-2.229.0-1.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/container-selinux@2.229.0-1.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=src\u0026epoch=2\u0026rpmmod=container-tools:rhel8:8080020240422101606:0f77c1b7"
}
}
},
{
"category": "product_version",
"name": "containernetworking-plugins-1.2.0-1.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8",
"product": {
"name": "containernetworking-plugins-1.2.0-1.module+el8.8.0+21741+dd5be1e7.src.rpm (container-tools:rhel8)",
"product_id": "containernetworking-plugins-1.2.0-1.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/containernetworking-plugins@1.2.0-1.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=src\u0026epoch=1\u0026rpmmod=container-tools:rhel8:8080020240422101606:0f77c1b7"
}
}
},
{
"category": "product_version",
"name": "containers-common-1-65.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8",
"product": {
"name": "containers-common-1-65.module+el8.8.0+21741+dd5be1e7.src.rpm (container-tools:rhel8)",
"product_id": "containers-common-1-65.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/containers-common@1-65.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=src\u0026epoch=2\u0026rpmmod=container-tools:rhel8:8080020240422101606:0f77c1b7"
}
}
},
{
"category": "product_version",
"name": "criu-3.15-4.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8",
"product": {
"name": "criu-3.15-4.module+el8.8.0+21741+dd5be1e7.src.rpm (container-tools:rhel8)",
"product_id": "criu-3.15-4.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/criu@3.15-4.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=src\u0026rpmmod=container-tools:rhel8:8080020240422101606:0f77c1b7"
}
}
},
{
"category": "product_version",
"name": "crun-1.8.4-2.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8",
"product": {
"name": "crun-1.8.4-2.module+el8.8.0+21741+dd5be1e7.src.rpm (container-tools:rhel8)",
"product_id": "crun-1.8.4-2.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/crun@1.8.4-2.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=src\u0026rpmmod=container-tools:rhel8:8080020240422101606:0f77c1b7"
}
}
},
{
"category": "product_version",
"name": "fuse-overlayfs-1.11-1.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8",
"product": {
"name": "fuse-overlayfs-1.11-1.module+el8.8.0+21741+dd5be1e7.src.rpm (container-tools:rhel8)",
"product_id": "fuse-overlayfs-1.11-1.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fuse-overlayfs@1.11-1.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=src\u0026rpmmod=container-tools:rhel8:8080020240422101606:0f77c1b7"
}
}
},
{
"category": "product_version",
"name": "libslirp-4.4.0-1.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8",
"product": {
"name": "libslirp-4.4.0-1.module+el8.8.0+21741+dd5be1e7.src.rpm (container-tools:rhel8)",
"product_id": "libslirp-4.4.0-1.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libslirp@4.4.0-1.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=src\u0026rpmmod=container-tools:rhel8:8080020240422101606:0f77c1b7"
}
}
},
{
"category": "product_version",
"name": "netavark-1.5.1-3.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8",
"product": {
"name": "netavark-1.5.1-3.module+el8.8.0+21741+dd5be1e7.src.rpm (container-tools:rhel8)",
"product_id": "netavark-1.5.1-3.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/netavark@1.5.1-3.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=src\u0026epoch=2\u0026rpmmod=container-tools:rhel8:8080020240422101606:0f77c1b7"
}
}
},
{
"category": "product_version",
"name": "oci-seccomp-bpf-hook-1.2.8-1.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8",
"product": {
"name": "oci-seccomp-bpf-hook-1.2.8-1.module+el8.8.0+21741+dd5be1e7.src.rpm (container-tools:rhel8)",
"product_id": "oci-seccomp-bpf-hook-1.2.8-1.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/oci-seccomp-bpf-hook@1.2.8-1.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=src\u0026rpmmod=container-tools:rhel8:8080020240422101606:0f77c1b7"
}
}
},
{
"category": "product_version",
"name": "podman-4.4.1-19.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8",
"product": {
"name": "podman-4.4.1-19.module+el8.8.0+21741+dd5be1e7.src.rpm (container-tools:rhel8)",
"product_id": "podman-4.4.1-19.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman@4.4.1-19.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=src\u0026epoch=3\u0026rpmmod=container-tools:rhel8:8080020240422101606:0f77c1b7"
}
}
},
{
"category": "product_version",
"name": "python-podman-4.4.1-1.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8",
"product": {
"name": "python-podman-4.4.1-1.module+el8.8.0+21741+dd5be1e7.src.rpm (container-tools:rhel8)",
"product_id": "python-podman-4.4.1-1.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-podman@4.4.1-1.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=src\u0026rpmmod=container-tools:rhel8:8080020240422101606:0f77c1b7"
}
}
},
{
"category": "product_version",
"name": "runc-1.1.12-1.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8",
"product": {
"name": "runc-1.1.12-1.module+el8.8.0+21741+dd5be1e7.src.rpm (container-tools:rhel8)",
"product_id": "runc-1.1.12-1.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/runc@1.1.12-1.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=src\u0026epoch=1\u0026rpmmod=container-tools:rhel8:8080020240422101606:0f77c1b7"
}
}
},
{
"category": "product_version",
"name": "skopeo-1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8",
"product": {
"name": "skopeo-1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.src.rpm (container-tools:rhel8)",
"product_id": "skopeo-1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/skopeo@1.11.2-0.2.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=src\u0026epoch=2\u0026rpmmod=container-tools:rhel8:8080020240422101606:0f77c1b7"
}
}
},
{
"category": "product_version",
"name": "slirp4netns-1.2.0-3.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8",
"product": {
"name": "slirp4netns-1.2.0-3.module+el8.8.0+21741+dd5be1e7.src.rpm (container-tools:rhel8)",
"product_id": "slirp4netns-1.2.0-3.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/slirp4netns@1.2.0-3.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=src\u0026rpmmod=container-tools:rhel8:8080020240422101606:0f77c1b7"
}
}
},
{
"category": "product_version",
"name": "toolbox-0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8",
"product": {
"name": "toolbox-0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.src.rpm (container-tools:rhel8)",
"product_id": "toolbox-0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/toolbox@0.0.99.3-7.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=src\u0026rpmmod=container-tools:rhel8:8080020240422101606:0f77c1b7"
}
}
},
{
"category": "product_version",
"name": "udica-0.2.6-20.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8",
"product": {
"name": "udica-0.2.6-20.module+el8.8.0+21741+dd5be1e7.src.rpm (container-tools:rhel8)",
"product_id": "udica-0.2.6-20.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/udica@0.2.6-20.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=src\u0026rpmmod=container-tools:rhel8:8080020240422101606:0f77c1b7"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "aardvark-dns-1.5.0-2.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"product": {
"name": "aardvark-dns-1.5.0-2.module+el8.8.0+21741+dd5be1e7.x86_64.rpm (container-tools:rhel8)",
"product_id": "aardvark-dns-1.5.0-2.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/aardvark-dns@1.5.0-2.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=x86_64\u0026epoch=2\u0026rpmmod=container-tools:rhel8:8080020240422101606:0f77c1b7"
}
}
},
{
"category": "product_version",
"name": "buildah-1.29.3-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"product": {
"name": "buildah-1.29.3-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm (container-tools:rhel8)",
"product_id": "buildah-1.29.3-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/buildah@1.29.3-1.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=x86_64\u0026epoch=1\u0026rpmmod=container-tools:rhel8:8080020240422101606:0f77c1b7"
}
}
},
{
"category": "product_version",
"name": "buildah-debuginfo-1.29.3-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"product": {
"name": "buildah-debuginfo-1.29.3-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm (container-tools:rhel8)",
"product_id": "buildah-debuginfo-1.29.3-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/buildah-debuginfo@1.29.3-1.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=x86_64\u0026epoch=1\u0026rpmmod=container-tools:rhel8:8080020240422101606:0f77c1b7"
}
}
},
{
"category": "product_version",
"name": "buildah-debugsource-1.29.3-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"product": {
"name": "buildah-debugsource-1.29.3-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm (container-tools:rhel8)",
"product_id": "buildah-debugsource-1.29.3-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/buildah-debugsource@1.29.3-1.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=x86_64\u0026epoch=1\u0026rpmmod=container-tools:rhel8:8080020240422101606:0f77c1b7"
}
}
},
{
"category": "product_version",
"name": "buildah-tests-1.29.3-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"product": {
"name": "buildah-tests-1.29.3-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm (container-tools:rhel8)",
"product_id": "buildah-tests-1.29.3-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/buildah-tests@1.29.3-1.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=x86_64\u0026epoch=1\u0026rpmmod=container-tools:rhel8:8080020240422101606:0f77c1b7"
}
}
},
{
"category": "product_version",
"name": "buildah-tests-debuginfo-1.29.3-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"product": {
"name": "buildah-tests-debuginfo-1.29.3-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm (container-tools:rhel8)",
"product_id": "buildah-tests-debuginfo-1.29.3-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/buildah-tests-debuginfo@1.29.3-1.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=x86_64\u0026epoch=1\u0026rpmmod=container-tools:rhel8:8080020240422101606:0f77c1b7"
}
}
},
{
"category": "product_version",
"name": "conmon-2.1.6-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"product": {
"name": "conmon-2.1.6-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm (container-tools:rhel8)",
"product_id": "conmon-2.1.6-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/conmon@2.1.6-1.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=x86_64\u0026epoch=3\u0026rpmmod=container-tools:rhel8:8080020240422101606:0f77c1b7"
}
}
},
{
"category": "product_version",
"name": "conmon-debuginfo-2.1.6-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"product": {
"name": "conmon-debuginfo-2.1.6-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm (container-tools:rhel8)",
"product_id": "conmon-debuginfo-2.1.6-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/conmon-debuginfo@2.1.6-1.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=x86_64\u0026epoch=3\u0026rpmmod=container-tools:rhel8:8080020240422101606:0f77c1b7"
}
}
},
{
"category": "product_version",
"name": "conmon-debugsource-2.1.6-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"product": {
"name": "conmon-debugsource-2.1.6-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm (container-tools:rhel8)",
"product_id": "conmon-debugsource-2.1.6-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/conmon-debugsource@2.1.6-1.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=x86_64\u0026epoch=3\u0026rpmmod=container-tools:rhel8:8080020240422101606:0f77c1b7"
}
}
},
{
"category": "product_version",
"name": "containernetworking-plugins-1.2.0-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"product": {
"name": "containernetworking-plugins-1.2.0-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm (container-tools:rhel8)",
"product_id": "containernetworking-plugins-1.2.0-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/containernetworking-plugins@1.2.0-1.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=x86_64\u0026epoch=1\u0026rpmmod=container-tools:rhel8:8080020240422101606:0f77c1b7"
}
}
},
{
"category": "product_version",
"name": "containernetworking-plugins-debuginfo-1.2.0-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"product": {
"name": "containernetworking-plugins-debuginfo-1.2.0-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm (container-tools:rhel8)",
"product_id": "containernetworking-plugins-debuginfo-1.2.0-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/containernetworking-plugins-debuginfo@1.2.0-1.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=x86_64\u0026epoch=1\u0026rpmmod=container-tools:rhel8:8080020240422101606:0f77c1b7"
}
}
},
{
"category": "product_version",
"name": "containernetworking-plugins-debugsource-1.2.0-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"product": {
"name": "containernetworking-plugins-debugsource-1.2.0-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm (container-tools:rhel8)",
"product_id": "containernetworking-plugins-debugsource-1.2.0-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/containernetworking-plugins-debugsource@1.2.0-1.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=x86_64\u0026epoch=1\u0026rpmmod=container-tools:rhel8:8080020240422101606:0f77c1b7"
}
}
},
{
"category": "product_version",
"name": "containers-common-1-65.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"product": {
"name": "containers-common-1-65.module+el8.8.0+21741+dd5be1e7.x86_64.rpm (container-tools:rhel8)",
"product_id": "containers-common-1-65.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/containers-common@1-65.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=x86_64\u0026epoch=2\u0026rpmmod=container-tools:rhel8:8080020240422101606:0f77c1b7"
}
}
},
{
"category": "product_version",
"name": "crit-3.15-4.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"product": {
"name": "crit-3.15-4.module+el8.8.0+21741+dd5be1e7.x86_64.rpm (container-tools:rhel8)",
"product_id": "crit-3.15-4.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/crit@3.15-4.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=x86_64\u0026rpmmod=container-tools:rhel8:8080020240422101606:0f77c1b7"
}
}
},
{
"category": "product_version",
"name": "criu-3.15-4.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"product": {
"name": "criu-3.15-4.module+el8.8.0+21741+dd5be1e7.x86_64.rpm (container-tools:rhel8)",
"product_id": "criu-3.15-4.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/criu@3.15-4.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=x86_64\u0026rpmmod=container-tools:rhel8:8080020240422101606:0f77c1b7"
}
}
},
{
"category": "product_version",
"name": "criu-debuginfo-3.15-4.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"product": {
"name": "criu-debuginfo-3.15-4.module+el8.8.0+21741+dd5be1e7.x86_64.rpm (container-tools:rhel8)",
"product_id": "criu-debuginfo-3.15-4.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/criu-debuginfo@3.15-4.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=x86_64\u0026rpmmod=container-tools:rhel8:8080020240422101606:0f77c1b7"
}
}
},
{
"category": "product_version",
"name": "criu-debugsource-3.15-4.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"product": {
"name": "criu-debugsource-3.15-4.module+el8.8.0+21741+dd5be1e7.x86_64.rpm (container-tools:rhel8)",
"product_id": "criu-debugsource-3.15-4.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/criu-debugsource@3.15-4.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=x86_64\u0026rpmmod=container-tools:rhel8:8080020240422101606:0f77c1b7"
}
}
},
{
"category": "product_version",
"name": "criu-devel-3.15-4.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"product": {
"name": "criu-devel-3.15-4.module+el8.8.0+21741+dd5be1e7.x86_64.rpm (container-tools:rhel8)",
"product_id": "criu-devel-3.15-4.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/criu-devel@3.15-4.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=x86_64\u0026rpmmod=container-tools:rhel8:8080020240422101606:0f77c1b7"
}
}
},
{
"category": "product_version",
"name": "criu-libs-3.15-4.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"product": {
"name": "criu-libs-3.15-4.module+el8.8.0+21741+dd5be1e7.x86_64.rpm (container-tools:rhel8)",
"product_id": "criu-libs-3.15-4.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/criu-libs@3.15-4.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=x86_64\u0026rpmmod=container-tools:rhel8:8080020240422101606:0f77c1b7"
}
}
},
{
"category": "product_version",
"name": "criu-libs-debuginfo-3.15-4.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"product": {
"name": "criu-libs-debuginfo-3.15-4.module+el8.8.0+21741+dd5be1e7.x86_64.rpm (container-tools:rhel8)",
"product_id": "criu-libs-debuginfo-3.15-4.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/criu-libs-debuginfo@3.15-4.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=x86_64\u0026rpmmod=container-tools:rhel8:8080020240422101606:0f77c1b7"
}
}
},
{
"category": "product_version",
"name": "crun-1.8.4-2.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"product": {
"name": "crun-1.8.4-2.module+el8.8.0+21741+dd5be1e7.x86_64.rpm (container-tools:rhel8)",
"product_id": "crun-1.8.4-2.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/crun@1.8.4-2.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=x86_64\u0026rpmmod=container-tools:rhel8:8080020240422101606:0f77c1b7"
}
}
},
{
"category": "product_version",
"name": "crun-debuginfo-1.8.4-2.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"product": {
"name": "crun-debuginfo-1.8.4-2.module+el8.8.0+21741+dd5be1e7.x86_64.rpm (container-tools:rhel8)",
"product_id": "crun-debuginfo-1.8.4-2.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/crun-debuginfo@1.8.4-2.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=x86_64\u0026rpmmod=container-tools:rhel8:8080020240422101606:0f77c1b7"
}
}
},
{
"category": "product_version",
"name": "crun-debugsource-1.8.4-2.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"product": {
"name": "crun-debugsource-1.8.4-2.module+el8.8.0+21741+dd5be1e7.x86_64.rpm (container-tools:rhel8)",
"product_id": "crun-debugsource-1.8.4-2.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/crun-debugsource@1.8.4-2.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=x86_64\u0026rpmmod=container-tools:rhel8:8080020240422101606:0f77c1b7"
}
}
},
{
"category": "product_version",
"name": "fuse-overlayfs-1.11-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"product": {
"name": "fuse-overlayfs-1.11-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm (container-tools:rhel8)",
"product_id": "fuse-overlayfs-1.11-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fuse-overlayfs@1.11-1.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=x86_64\u0026rpmmod=container-tools:rhel8:8080020240422101606:0f77c1b7"
}
}
},
{
"category": "product_version",
"name": "fuse-overlayfs-debuginfo-1.11-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"product": {
"name": "fuse-overlayfs-debuginfo-1.11-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm (container-tools:rhel8)",
"product_id": "fuse-overlayfs-debuginfo-1.11-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fuse-overlayfs-debuginfo@1.11-1.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=x86_64\u0026rpmmod=container-tools:rhel8:8080020240422101606:0f77c1b7"
}
}
},
{
"category": "product_version",
"name": "fuse-overlayfs-debugsource-1.11-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"product": {
"name": "fuse-overlayfs-debugsource-1.11-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm (container-tools:rhel8)",
"product_id": "fuse-overlayfs-debugsource-1.11-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fuse-overlayfs-debugsource@1.11-1.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=x86_64\u0026rpmmod=container-tools:rhel8:8080020240422101606:0f77c1b7"
}
}
},
{
"category": "product_version",
"name": "libslirp-4.4.0-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"product": {
"name": "libslirp-4.4.0-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm (container-tools:rhel8)",
"product_id": "libslirp-4.4.0-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libslirp@4.4.0-1.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=x86_64\u0026rpmmod=container-tools:rhel8:8080020240422101606:0f77c1b7"
}
}
},
{
"category": "product_version",
"name": "libslirp-debuginfo-4.4.0-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"product": {
"name": "libslirp-debuginfo-4.4.0-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm (container-tools:rhel8)",
"product_id": "libslirp-debuginfo-4.4.0-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libslirp-debuginfo@4.4.0-1.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=x86_64\u0026rpmmod=container-tools:rhel8:8080020240422101606:0f77c1b7"
}
}
},
{
"category": "product_version",
"name": "libslirp-debugsource-4.4.0-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"product": {
"name": "libslirp-debugsource-4.4.0-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm (container-tools:rhel8)",
"product_id": "libslirp-debugsource-4.4.0-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libslirp-debugsource@4.4.0-1.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=x86_64\u0026rpmmod=container-tools:rhel8:8080020240422101606:0f77c1b7"
}
}
},
{
"category": "product_version",
"name": "libslirp-devel-4.4.0-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"product": {
"name": "libslirp-devel-4.4.0-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm (container-tools:rhel8)",
"product_id": "libslirp-devel-4.4.0-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libslirp-devel@4.4.0-1.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=x86_64\u0026rpmmod=container-tools:rhel8:8080020240422101606:0f77c1b7"
}
}
},
{
"category": "product_version",
"name": "netavark-1.5.1-3.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"product": {
"name": "netavark-1.5.1-3.module+el8.8.0+21741+dd5be1e7.x86_64.rpm (container-tools:rhel8)",
"product_id": "netavark-1.5.1-3.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/netavark@1.5.1-3.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=x86_64\u0026epoch=2\u0026rpmmod=container-tools:rhel8:8080020240422101606:0f77c1b7"
}
}
},
{
"category": "product_version",
"name": "oci-seccomp-bpf-hook-1.2.8-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"product": {
"name": "oci-seccomp-bpf-hook-1.2.8-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm (container-tools:rhel8)",
"product_id": "oci-seccomp-bpf-hook-1.2.8-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/oci-seccomp-bpf-hook@1.2.8-1.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=x86_64\u0026rpmmod=container-tools:rhel8:8080020240422101606:0f77c1b7"
}
}
},
{
"category": "product_version",
"name": "oci-seccomp-bpf-hook-debuginfo-1.2.8-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"product": {
"name": "oci-seccomp-bpf-hook-debuginfo-1.2.8-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm (container-tools:rhel8)",
"product_id": "oci-seccomp-bpf-hook-debuginfo-1.2.8-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/oci-seccomp-bpf-hook-debuginfo@1.2.8-1.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=x86_64\u0026rpmmod=container-tools:rhel8:8080020240422101606:0f77c1b7"
}
}
},
{
"category": "product_version",
"name": "oci-seccomp-bpf-hook-debugsource-1.2.8-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"product": {
"name": "oci-seccomp-bpf-hook-debugsource-1.2.8-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm (container-tools:rhel8)",
"product_id": "oci-seccomp-bpf-hook-debugsource-1.2.8-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/oci-seccomp-bpf-hook-debugsource@1.2.8-1.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=x86_64\u0026rpmmod=container-tools:rhel8:8080020240422101606:0f77c1b7"
}
}
},
{
"category": "product_version",
"name": "podman-4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"product": {
"name": "podman-4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64.rpm (container-tools:rhel8)",
"product_id": "podman-4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman@4.4.1-19.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=x86_64\u0026epoch=3\u0026rpmmod=container-tools:rhel8:8080020240422101606:0f77c1b7"
}
}
},
{
"category": "product_version",
"name": "podman-catatonit-4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"product": {
"name": "podman-catatonit-4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64.rpm (container-tools:rhel8)",
"product_id": "podman-catatonit-4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-catatonit@4.4.1-19.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=x86_64\u0026epoch=3\u0026rpmmod=container-tools:rhel8:8080020240422101606:0f77c1b7"
}
}
},
{
"category": "product_version",
"name": "podman-catatonit-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"product": {
"name": "podman-catatonit-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64.rpm (container-tools:rhel8)",
"product_id": "podman-catatonit-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-catatonit-debuginfo@4.4.1-19.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=x86_64\u0026epoch=3\u0026rpmmod=container-tools:rhel8:8080020240422101606:0f77c1b7"
}
}
},
{
"category": "product_version",
"name": "podman-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"product": {
"name": "podman-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64.rpm (container-tools:rhel8)",
"product_id": "podman-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-debuginfo@4.4.1-19.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=x86_64\u0026epoch=3\u0026rpmmod=container-tools:rhel8:8080020240422101606:0f77c1b7"
}
}
},
{
"category": "product_version",
"name": "podman-debugsource-4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"product": {
"name": "podman-debugsource-4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64.rpm (container-tools:rhel8)",
"product_id": "podman-debugsource-4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-debugsource@4.4.1-19.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=x86_64\u0026epoch=3\u0026rpmmod=container-tools:rhel8:8080020240422101606:0f77c1b7"
}
}
},
{
"category": "product_version",
"name": "podman-gvproxy-4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"product": {
"name": "podman-gvproxy-4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64.rpm (container-tools:rhel8)",
"product_id": "podman-gvproxy-4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-gvproxy@4.4.1-19.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=x86_64\u0026epoch=3\u0026rpmmod=container-tools:rhel8:8080020240422101606:0f77c1b7"
}
}
},
{
"category": "product_version",
"name": "podman-gvproxy-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"product": {
"name": "podman-gvproxy-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64.rpm (container-tools:rhel8)",
"product_id": "podman-gvproxy-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-gvproxy-debuginfo@4.4.1-19.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=x86_64\u0026epoch=3\u0026rpmmod=container-tools:rhel8:8080020240422101606:0f77c1b7"
}
}
},
{
"category": "product_version",
"name": "podman-plugins-4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"product": {
"name": "podman-plugins-4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64.rpm (container-tools:rhel8)",
"product_id": "podman-plugins-4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-plugins@4.4.1-19.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=x86_64\u0026epoch=3\u0026rpmmod=container-tools:rhel8:8080020240422101606:0f77c1b7"
}
}
},
{
"category": "product_version",
"name": "podman-plugins-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"product": {
"name": "podman-plugins-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64.rpm (container-tools:rhel8)",
"product_id": "podman-plugins-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-plugins-debuginfo@4.4.1-19.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=x86_64\u0026epoch=3\u0026rpmmod=container-tools:rhel8:8080020240422101606:0f77c1b7"
}
}
},
{
"category": "product_version",
"name": "podman-remote-4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"product": {
"name": "podman-remote-4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64.rpm (container-tools:rhel8)",
"product_id": "podman-remote-4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-remote@4.4.1-19.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=x86_64\u0026epoch=3\u0026rpmmod=container-tools:rhel8:8080020240422101606:0f77c1b7"
}
}
},
{
"category": "product_version",
"name": "podman-remote-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"product": {
"name": "podman-remote-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64.rpm (container-tools:rhel8)",
"product_id": "podman-remote-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-remote-debuginfo@4.4.1-19.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=x86_64\u0026epoch=3\u0026rpmmod=container-tools:rhel8:8080020240422101606:0f77c1b7"
}
}
},
{
"category": "product_version",
"name": "podman-tests-4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"product": {
"name": "podman-tests-4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64.rpm (container-tools:rhel8)",
"product_id": "podman-tests-4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-tests@4.4.1-19.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=x86_64\u0026epoch=3\u0026rpmmod=container-tools:rhel8:8080020240422101606:0f77c1b7"
}
}
},
{
"category": "product_version",
"name": "python3-criu-3.15-4.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"product": {
"name": "python3-criu-3.15-4.module+el8.8.0+21741+dd5be1e7.x86_64.rpm (container-tools:rhel8)",
"product_id": "python3-criu-3.15-4.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-criu@3.15-4.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=x86_64\u0026rpmmod=container-tools:rhel8:8080020240422101606:0f77c1b7"
}
}
},
{
"category": "product_version",
"name": "runc-1.1.12-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"product": {
"name": "runc-1.1.12-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm (container-tools:rhel8)",
"product_id": "runc-1.1.12-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/runc@1.1.12-1.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=x86_64\u0026epoch=1\u0026rpmmod=container-tools:rhel8:8080020240422101606:0f77c1b7"
}
}
},
{
"category": "product_version",
"name": "runc-debuginfo-1.1.12-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"product": {
"name": "runc-debuginfo-1.1.12-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm (container-tools:rhel8)",
"product_id": "runc-debuginfo-1.1.12-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/runc-debuginfo@1.1.12-1.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=x86_64\u0026epoch=1\u0026rpmmod=container-tools:rhel8:8080020240422101606:0f77c1b7"
}
}
},
{
"category": "product_version",
"name": "runc-debugsource-1.1.12-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"product": {
"name": "runc-debugsource-1.1.12-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm (container-tools:rhel8)",
"product_id": "runc-debugsource-1.1.12-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/runc-debugsource@1.1.12-1.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=x86_64\u0026epoch=1\u0026rpmmod=container-tools:rhel8:8080020240422101606:0f77c1b7"
}
}
},
{
"category": "product_version",
"name": "skopeo-1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"product": {
"name": "skopeo-1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.x86_64.rpm (container-tools:rhel8)",
"product_id": "skopeo-1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/skopeo@1.11.2-0.2.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=x86_64\u0026epoch=2\u0026rpmmod=container-tools:rhel8:8080020240422101606:0f77c1b7"
}
}
},
{
"category": "product_version",
"name": "skopeo-tests-1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"product": {
"name": "skopeo-tests-1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.x86_64.rpm (container-tools:rhel8)",
"product_id": "skopeo-tests-1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/skopeo-tests@1.11.2-0.2.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=x86_64\u0026epoch=2\u0026rpmmod=container-tools:rhel8:8080020240422101606:0f77c1b7"
}
}
},
{
"category": "product_version",
"name": "slirp4netns-1.2.0-3.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"product": {
"name": "slirp4netns-1.2.0-3.module+el8.8.0+21741+dd5be1e7.x86_64.rpm (container-tools:rhel8)",
"product_id": "slirp4netns-1.2.0-3.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/slirp4netns@1.2.0-3.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=x86_64\u0026rpmmod=container-tools:rhel8:8080020240422101606:0f77c1b7"
}
}
},
{
"category": "product_version",
"name": "slirp4netns-debuginfo-1.2.0-3.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"product": {
"name": "slirp4netns-debuginfo-1.2.0-3.module+el8.8.0+21741+dd5be1e7.x86_64.rpm (container-tools:rhel8)",
"product_id": "slirp4netns-debuginfo-1.2.0-3.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/slirp4netns-debuginfo@1.2.0-3.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=x86_64\u0026rpmmod=container-tools:rhel8:8080020240422101606:0f77c1b7"
}
}
},
{
"category": "product_version",
"name": "slirp4netns-debugsource-1.2.0-3.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"product": {
"name": "slirp4netns-debugsource-1.2.0-3.module+el8.8.0+21741+dd5be1e7.x86_64.rpm (container-tools:rhel8)",
"product_id": "slirp4netns-debugsource-1.2.0-3.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/slirp4netns-debugsource@1.2.0-3.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=x86_64\u0026rpmmod=container-tools:rhel8:8080020240422101606:0f77c1b7"
}
}
},
{
"category": "product_version",
"name": "toolbox-0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"product": {
"name": "toolbox-0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.x86_64.rpm (container-tools:rhel8)",
"product_id": "toolbox-0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/toolbox@0.0.99.3-7.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=x86_64\u0026rpmmod=container-tools:rhel8:8080020240422101606:0f77c1b7"
}
}
},
{
"category": "product_version",
"name": "toolbox-debuginfo-0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"product": {
"name": "toolbox-debuginfo-0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.x86_64.rpm (container-tools:rhel8)",
"product_id": "toolbox-debuginfo-0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/toolbox-debuginfo@0.0.99.3-7.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=x86_64\u0026rpmmod=container-tools:rhel8:8080020240422101606:0f77c1b7"
}
}
},
{
"category": "product_version",
"name": "toolbox-debugsource-0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"product": {
"name": "toolbox-debugsource-0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.x86_64.rpm (container-tools:rhel8)",
"product_id": "toolbox-debugsource-0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/toolbox-debugsource@0.0.99.3-7.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=x86_64\u0026rpmmod=container-tools:rhel8:8080020240422101606:0f77c1b7"
}
}
},
{
"category": "product_version",
"name": "toolbox-tests-0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"product": {
"name": "toolbox-tests-0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.x86_64.rpm (container-tools:rhel8)",
"product_id": "toolbox-tests-0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/toolbox-tests@0.0.99.3-7.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=x86_64\u0026rpmmod=container-tools:rhel8:8080020240422101606:0f77c1b7"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "cockpit-podman-63.1-1.module+el8.8.0+21741+dd5be1e7.noarch.rpm-container-tools:rhel8",
"product": {
"name": "cockpit-podman-63.1-1.module+el8.8.0+21741+dd5be1e7.noarch.rpm (container-tools:rhel8)",
"product_id": "cockpit-podman-63.1-1.module+el8.8.0+21741+dd5be1e7.noarch.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cockpit-podman@63.1-1.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=noarch\u0026rpmmod=container-tools:rhel8:8080020240422101606:0f77c1b7"
}
}
},
{
"category": "product_version",
"name": "container-selinux-2.229.0-1.module+el8.8.0+21741+dd5be1e7.noarch.rpm-container-tools:rhel8",
"product": {
"name": "container-selinux-2.229.0-1.module+el8.8.0+21741+dd5be1e7.noarch.rpm (container-tools:rhel8)",
"product_id": "container-selinux-2.229.0-1.module+el8.8.0+21741+dd5be1e7.noarch.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/container-selinux@2.229.0-1.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=noarch\u0026epoch=2\u0026rpmmod=container-tools:rhel8:8080020240422101606:0f77c1b7"
}
}
},
{
"category": "product_version",
"name": "podman-docker-4.4.1-19.module+el8.8.0+21741+dd5be1e7.noarch.rpm-container-tools:rhel8",
"product": {
"name": "podman-docker-4.4.1-19.module+el8.8.0+21741+dd5be1e7.noarch.rpm (container-tools:rhel8)",
"product_id": "podman-docker-4.4.1-19.module+el8.8.0+21741+dd5be1e7.noarch.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-docker@4.4.1-19.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=noarch\u0026epoch=3\u0026rpmmod=container-tools:rhel8:8080020240422101606:0f77c1b7"
}
}
},
{
"category": "product_version",
"name": "python3-podman-4.4.1-1.module+el8.8.0+21741+dd5be1e7.noarch.rpm-container-tools:rhel8",
"product": {
"name": "python3-podman-4.4.1-1.module+el8.8.0+21741+dd5be1e7.noarch.rpm (container-tools:rhel8)",
"product_id": "python3-podman-4.4.1-1.module+el8.8.0+21741+dd5be1e7.noarch.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-podman@4.4.1-1.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=noarch\u0026rpmmod=container-tools:rhel8:8080020240422101606:0f77c1b7"
}
}
},
{
"category": "product_version",
"name": "udica-0.2.6-20.module+el8.8.0+21741+dd5be1e7.noarch.rpm-container-tools:rhel8",
"product": {
"name": "udica-0.2.6-20.module+el8.8.0+21741+dd5be1e7.noarch.rpm (container-tools:rhel8)",
"product_id": "udica-0.2.6-20.module+el8.8.0+21741+dd5be1e7.noarch.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/udica@0.2.6-20.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=noarch\u0026rpmmod=container-tools:rhel8:8080020240422101606:0f77c1b7"
}
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "aardvark-dns-1.5.0-2.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"product": {
"name": "aardvark-dns-1.5.0-2.module+el8.8.0+21741+dd5be1e7.s390x.rpm (container-tools:rhel8)",
"product_id": "aardvark-dns-1.5.0-2.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/aardvark-dns@1.5.0-2.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=s390x\u0026epoch=2\u0026rpmmod=container-tools:rhel8:8080020240422101606:0f77c1b7"
}
}
},
{
"category": "product_version",
"name": "buildah-1.29.3-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"product": {
"name": "buildah-1.29.3-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm (container-tools:rhel8)",
"product_id": "buildah-1.29.3-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/buildah@1.29.3-1.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=s390x\u0026epoch=1\u0026rpmmod=container-tools:rhel8:8080020240422101606:0f77c1b7"
}
}
},
{
"category": "product_version",
"name": "buildah-debuginfo-1.29.3-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"product": {
"name": "buildah-debuginfo-1.29.3-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm (container-tools:rhel8)",
"product_id": "buildah-debuginfo-1.29.3-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/buildah-debuginfo@1.29.3-1.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=s390x\u0026epoch=1\u0026rpmmod=container-tools:rhel8:8080020240422101606:0f77c1b7"
}
}
},
{
"category": "product_version",
"name": "buildah-debugsource-1.29.3-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"product": {
"name": "buildah-debugsource-1.29.3-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm (container-tools:rhel8)",
"product_id": "buildah-debugsource-1.29.3-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/buildah-debugsource@1.29.3-1.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=s390x\u0026epoch=1\u0026rpmmod=container-tools:rhel8:8080020240422101606:0f77c1b7"
}
}
},
{
"category": "product_version",
"name": "buildah-tests-1.29.3-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"product": {
"name": "buildah-tests-1.29.3-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm (container-tools:rhel8)",
"product_id": "buildah-tests-1.29.3-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/buildah-tests@1.29.3-1.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=s390x\u0026epoch=1\u0026rpmmod=container-tools:rhel8:8080020240422101606:0f77c1b7"
}
}
},
{
"category": "product_version",
"name": "buildah-tests-debuginfo-1.29.3-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"product": {
"name": "buildah-tests-debuginfo-1.29.3-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm (container-tools:rhel8)",
"product_id": "buildah-tests-debuginfo-1.29.3-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/buildah-tests-debuginfo@1.29.3-1.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=s390x\u0026epoch=1\u0026rpmmod=container-tools:rhel8:8080020240422101606:0f77c1b7"
}
}
},
{
"category": "product_version",
"name": "conmon-2.1.6-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"product": {
"name": "conmon-2.1.6-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm (container-tools:rhel8)",
"product_id": "conmon-2.1.6-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/conmon@2.1.6-1.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=s390x\u0026epoch=3\u0026rpmmod=container-tools:rhel8:8080020240422101606:0f77c1b7"
}
}
},
{
"category": "product_version",
"name": "conmon-debuginfo-2.1.6-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"product": {
"name": "conmon-debuginfo-2.1.6-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm (container-tools:rhel8)",
"product_id": "conmon-debuginfo-2.1.6-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/conmon-debuginfo@2.1.6-1.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=s390x\u0026epoch=3\u0026rpmmod=container-tools:rhel8:8080020240422101606:0f77c1b7"
}
}
},
{
"category": "product_version",
"name": "conmon-debugsource-2.1.6-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"product": {
"name": "conmon-debugsource-2.1.6-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm (container-tools:rhel8)",
"product_id": "conmon-debugsource-2.1.6-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/conmon-debugsource@2.1.6-1.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=s390x\u0026epoch=3\u0026rpmmod=container-tools:rhel8:8080020240422101606:0f77c1b7"
}
}
},
{
"category": "product_version",
"name": "containernetworking-plugins-1.2.0-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"product": {
"name": "containernetworking-plugins-1.2.0-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm (container-tools:rhel8)",
"product_id": "containernetworking-plugins-1.2.0-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/containernetworking-plugins@1.2.0-1.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=s390x\u0026epoch=1\u0026rpmmod=container-tools:rhel8:8080020240422101606:0f77c1b7"
}
}
},
{
"category": "product_version",
"name": "containernetworking-plugins-debuginfo-1.2.0-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"product": {
"name": "containernetworking-plugins-debuginfo-1.2.0-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm (container-tools:rhel8)",
"product_id": "containernetworking-plugins-debuginfo-1.2.0-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/containernetworking-plugins-debuginfo@1.2.0-1.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=s390x\u0026epoch=1\u0026rpmmod=container-tools:rhel8:8080020240422101606:0f77c1b7"
}
}
},
{
"category": "product_version",
"name": "containernetworking-plugins-debugsource-1.2.0-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"product": {
"name": "containernetworking-plugins-debugsource-1.2.0-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm (container-tools:rhel8)",
"product_id": "containernetworking-plugins-debugsource-1.2.0-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/containernetworking-plugins-debugsource@1.2.0-1.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=s390x\u0026epoch=1\u0026rpmmod=container-tools:rhel8:8080020240422101606:0f77c1b7"
}
}
},
{
"category": "product_version",
"name": "containers-common-1-65.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"product": {
"name": "containers-common-1-65.module+el8.8.0+21741+dd5be1e7.s390x.rpm (container-tools:rhel8)",
"product_id": "containers-common-1-65.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/containers-common@1-65.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=s390x\u0026epoch=2\u0026rpmmod=container-tools:rhel8:8080020240422101606:0f77c1b7"
}
}
},
{
"category": "product_version",
"name": "crit-3.15-4.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"product": {
"name": "crit-3.15-4.module+el8.8.0+21741+dd5be1e7.s390x.rpm (container-tools:rhel8)",
"product_id": "crit-3.15-4.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/crit@3.15-4.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=s390x\u0026rpmmod=container-tools:rhel8:8080020240422101606:0f77c1b7"
}
}
},
{
"category": "product_version",
"name": "criu-3.15-4.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"product": {
"name": "criu-3.15-4.module+el8.8.0+21741+dd5be1e7.s390x.rpm (container-tools:rhel8)",
"product_id": "criu-3.15-4.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/criu@3.15-4.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=s390x\u0026rpmmod=container-tools:rhel8:8080020240422101606:0f77c1b7"
}
}
},
{
"category": "product_version",
"name": "criu-debuginfo-3.15-4.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"product": {
"name": "criu-debuginfo-3.15-4.module+el8.8.0+21741+dd5be1e7.s390x.rpm (container-tools:rhel8)",
"product_id": "criu-debuginfo-3.15-4.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/criu-debuginfo@3.15-4.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=s390x\u0026rpmmod=container-tools:rhel8:8080020240422101606:0f77c1b7"
}
}
},
{
"category": "product_version",
"name": "criu-debugsource-3.15-4.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"product": {
"name": "criu-debugsource-3.15-4.module+el8.8.0+21741+dd5be1e7.s390x.rpm (container-tools:rhel8)",
"product_id": "criu-debugsource-3.15-4.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/criu-debugsource@3.15-4.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=s390x\u0026rpmmod=container-tools:rhel8:8080020240422101606:0f77c1b7"
}
}
},
{
"category": "product_version",
"name": "criu-devel-3.15-4.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"product": {
"name": "criu-devel-3.15-4.module+el8.8.0+21741+dd5be1e7.s390x.rpm (container-tools:rhel8)",
"product_id": "criu-devel-3.15-4.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/criu-devel@3.15-4.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=s390x\u0026rpmmod=container-tools:rhel8:8080020240422101606:0f77c1b7"
}
}
},
{
"category": "product_version",
"name": "criu-libs-3.15-4.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"product": {
"name": "criu-libs-3.15-4.module+el8.8.0+21741+dd5be1e7.s390x.rpm (container-tools:rhel8)",
"product_id": "criu-libs-3.15-4.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/criu-libs@3.15-4.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=s390x\u0026rpmmod=container-tools:rhel8:8080020240422101606:0f77c1b7"
}
}
},
{
"category": "product_version",
"name": "criu-libs-debuginfo-3.15-4.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"product": {
"name": "criu-libs-debuginfo-3.15-4.module+el8.8.0+21741+dd5be1e7.s390x.rpm (container-tools:rhel8)",
"product_id": "criu-libs-debuginfo-3.15-4.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/criu-libs-debuginfo@3.15-4.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=s390x\u0026rpmmod=container-tools:rhel8:8080020240422101606:0f77c1b7"
}
}
},
{
"category": "product_version",
"name": "crun-1.8.4-2.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"product": {
"name": "crun-1.8.4-2.module+el8.8.0+21741+dd5be1e7.s390x.rpm (container-tools:rhel8)",
"product_id": "crun-1.8.4-2.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/crun@1.8.4-2.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=s390x\u0026rpmmod=container-tools:rhel8:8080020240422101606:0f77c1b7"
}
}
},
{
"category": "product_version",
"name": "crun-debuginfo-1.8.4-2.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"product": {
"name": "crun-debuginfo-1.8.4-2.module+el8.8.0+21741+dd5be1e7.s390x.rpm (container-tools:rhel8)",
"product_id": "crun-debuginfo-1.8.4-2.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/crun-debuginfo@1.8.4-2.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=s390x\u0026rpmmod=container-tools:rhel8:8080020240422101606:0f77c1b7"
}
}
},
{
"category": "product_version",
"name": "crun-debugsource-1.8.4-2.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"product": {
"name": "crun-debugsource-1.8.4-2.module+el8.8.0+21741+dd5be1e7.s390x.rpm (container-tools:rhel8)",
"product_id": "crun-debugsource-1.8.4-2.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/crun-debugsource@1.8.4-2.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=s390x\u0026rpmmod=container-tools:rhel8:8080020240422101606:0f77c1b7"
}
}
},
{
"category": "product_version",
"name": "fuse-overlayfs-1.11-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"product": {
"name": "fuse-overlayfs-1.11-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm (container-tools:rhel8)",
"product_id": "fuse-overlayfs-1.11-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fuse-overlayfs@1.11-1.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=s390x\u0026rpmmod=container-tools:rhel8:8080020240422101606:0f77c1b7"
}
}
},
{
"category": "product_version",
"name": "fuse-overlayfs-debuginfo-1.11-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"product": {
"name": "fuse-overlayfs-debuginfo-1.11-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm (container-tools:rhel8)",
"product_id": "fuse-overlayfs-debuginfo-1.11-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fuse-overlayfs-debuginfo@1.11-1.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=s390x\u0026rpmmod=container-tools:rhel8:8080020240422101606:0f77c1b7"
}
}
},
{
"category": "product_version",
"name": "fuse-overlayfs-debugsource-1.11-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"product": {
"name": "fuse-overlayfs-debugsource-1.11-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm (container-tools:rhel8)",
"product_id": "fuse-overlayfs-debugsource-1.11-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fuse-overlayfs-debugsource@1.11-1.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=s390x\u0026rpmmod=container-tools:rhel8:8080020240422101606:0f77c1b7"
}
}
},
{
"category": "product_version",
"name": "libslirp-4.4.0-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"product": {
"name": "libslirp-4.4.0-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm (container-tools:rhel8)",
"product_id": "libslirp-4.4.0-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libslirp@4.4.0-1.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=s390x\u0026rpmmod=container-tools:rhel8:8080020240422101606:0f77c1b7"
}
}
},
{
"category": "product_version",
"name": "libslirp-debuginfo-4.4.0-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"product": {
"name": "libslirp-debuginfo-4.4.0-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm (container-tools:rhel8)",
"product_id": "libslirp-debuginfo-4.4.0-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libslirp-debuginfo@4.4.0-1.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=s390x\u0026rpmmod=container-tools:rhel8:8080020240422101606:0f77c1b7"
}
}
},
{
"category": "product_version",
"name": "libslirp-debugsource-4.4.0-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"product": {
"name": "libslirp-debugsource-4.4.0-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm (container-tools:rhel8)",
"product_id": "libslirp-debugsource-4.4.0-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libslirp-debugsource@4.4.0-1.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=s390x\u0026rpmmod=container-tools:rhel8:8080020240422101606:0f77c1b7"
}
}
},
{
"category": "product_version",
"name": "libslirp-devel-4.4.0-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"product": {
"name": "libslirp-devel-4.4.0-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm (container-tools:rhel8)",
"product_id": "libslirp-devel-4.4.0-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libslirp-devel@4.4.0-1.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=s390x\u0026rpmmod=container-tools:rhel8:8080020240422101606:0f77c1b7"
}
}
},
{
"category": "product_version",
"name": "netavark-1.5.1-3.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"product": {
"name": "netavark-1.5.1-3.module+el8.8.0+21741+dd5be1e7.s390x.rpm (container-tools:rhel8)",
"product_id": "netavark-1.5.1-3.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/netavark@1.5.1-3.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=s390x\u0026epoch=2\u0026rpmmod=container-tools:rhel8:8080020240422101606:0f77c1b7"
}
}
},
{
"category": "product_version",
"name": "oci-seccomp-bpf-hook-1.2.8-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"product": {
"name": "oci-seccomp-bpf-hook-1.2.8-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm (container-tools:rhel8)",
"product_id": "oci-seccomp-bpf-hook-1.2.8-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/oci-seccomp-bpf-hook@1.2.8-1.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=s390x\u0026rpmmod=container-tools:rhel8:8080020240422101606:0f77c1b7"
}
}
},
{
"category": "product_version",
"name": "oci-seccomp-bpf-hook-debuginfo-1.2.8-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"product": {
"name": "oci-seccomp-bpf-hook-debuginfo-1.2.8-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm (container-tools:rhel8)",
"product_id": "oci-seccomp-bpf-hook-debuginfo-1.2.8-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/oci-seccomp-bpf-hook-debuginfo@1.2.8-1.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=s390x\u0026rpmmod=container-tools:rhel8:8080020240422101606:0f77c1b7"
}
}
},
{
"category": "product_version",
"name": "oci-seccomp-bpf-hook-debugsource-1.2.8-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"product": {
"name": "oci-seccomp-bpf-hook-debugsource-1.2.8-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm (container-tools:rhel8)",
"product_id": "oci-seccomp-bpf-hook-debugsource-1.2.8-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/oci-seccomp-bpf-hook-debugsource@1.2.8-1.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=s390x\u0026rpmmod=container-tools:rhel8:8080020240422101606:0f77c1b7"
}
}
},
{
"category": "product_version",
"name": "podman-4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"product": {
"name": "podman-4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x.rpm (container-tools:rhel8)",
"product_id": "podman-4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman@4.4.1-19.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=s390x\u0026epoch=3\u0026rpmmod=container-tools:rhel8:8080020240422101606:0f77c1b7"
}
}
},
{
"category": "product_version",
"name": "podman-catatonit-4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"product": {
"name": "podman-catatonit-4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x.rpm (container-tools:rhel8)",
"product_id": "podman-catatonit-4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-catatonit@4.4.1-19.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=s390x\u0026epoch=3\u0026rpmmod=container-tools:rhel8:8080020240422101606:0f77c1b7"
}
}
},
{
"category": "product_version",
"name": "podman-catatonit-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"product": {
"name": "podman-catatonit-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x.rpm (container-tools:rhel8)",
"product_id": "podman-catatonit-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-catatonit-debuginfo@4.4.1-19.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=s390x\u0026epoch=3\u0026rpmmod=container-tools:rhel8:8080020240422101606:0f77c1b7"
}
}
},
{
"category": "product_version",
"name": "podman-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"product": {
"name": "podman-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x.rpm (container-tools:rhel8)",
"product_id": "podman-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-debuginfo@4.4.1-19.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=s390x\u0026epoch=3\u0026rpmmod=container-tools:rhel8:8080020240422101606:0f77c1b7"
}
}
},
{
"category": "product_version",
"name": "podman-debugsource-4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"product": {
"name": "podman-debugsource-4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x.rpm (container-tools:rhel8)",
"product_id": "podman-debugsource-4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-debugsource@4.4.1-19.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=s390x\u0026epoch=3\u0026rpmmod=container-tools:rhel8:8080020240422101606:0f77c1b7"
}
}
},
{
"category": "product_version",
"name": "podman-gvproxy-4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"product": {
"name": "podman-gvproxy-4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x.rpm (container-tools:rhel8)",
"product_id": "podman-gvproxy-4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-gvproxy@4.4.1-19.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=s390x\u0026epoch=3\u0026rpmmod=container-tools:rhel8:8080020240422101606:0f77c1b7"
}
}
},
{
"category": "product_version",
"name": "podman-gvproxy-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"product": {
"name": "podman-gvproxy-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x.rpm (container-tools:rhel8)",
"product_id": "podman-gvproxy-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-gvproxy-debuginfo@4.4.1-19.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=s390x\u0026epoch=3\u0026rpmmod=container-tools:rhel8:8080020240422101606:0f77c1b7"
}
}
},
{
"category": "product_version",
"name": "podman-plugins-4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"product": {
"name": "podman-plugins-4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x.rpm (container-tools:rhel8)",
"product_id": "podman-plugins-4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-plugins@4.4.1-19.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=s390x\u0026epoch=3\u0026rpmmod=container-tools:rhel8:8080020240422101606:0f77c1b7"
}
}
},
{
"category": "product_version",
"name": "podman-plugins-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"product": {
"name": "podman-plugins-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x.rpm (container-tools:rhel8)",
"product_id": "podman-plugins-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-plugins-debuginfo@4.4.1-19.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=s390x\u0026epoch=3\u0026rpmmod=container-tools:rhel8:8080020240422101606:0f77c1b7"
}
}
},
{
"category": "product_version",
"name": "podman-remote-4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"product": {
"name": "podman-remote-4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x.rpm (container-tools:rhel8)",
"product_id": "podman-remote-4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-remote@4.4.1-19.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=s390x\u0026epoch=3\u0026rpmmod=container-tools:rhel8:8080020240422101606:0f77c1b7"
}
}
},
{
"category": "product_version",
"name": "podman-remote-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"product": {
"name": "podman-remote-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x.rpm (container-tools:rhel8)",
"product_id": "podman-remote-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-remote-debuginfo@4.4.1-19.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=s390x\u0026epoch=3\u0026rpmmod=container-tools:rhel8:8080020240422101606:0f77c1b7"
}
}
},
{
"category": "product_version",
"name": "podman-tests-4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"product": {
"name": "podman-tests-4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x.rpm (container-tools:rhel8)",
"product_id": "podman-tests-4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-tests@4.4.1-19.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=s390x\u0026epoch=3\u0026rpmmod=container-tools:rhel8:8080020240422101606:0f77c1b7"
}
}
},
{
"category": "product_version",
"name": "python3-criu-3.15-4.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"product": {
"name": "python3-criu-3.15-4.module+el8.8.0+21741+dd5be1e7.s390x.rpm (container-tools:rhel8)",
"product_id": "python3-criu-3.15-4.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-criu@3.15-4.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=s390x\u0026rpmmod=container-tools:rhel8:8080020240422101606:0f77c1b7"
}
}
},
{
"category": "product_version",
"name": "runc-1.1.12-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"product": {
"name": "runc-1.1.12-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm (container-tools:rhel8)",
"product_id": "runc-1.1.12-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/runc@1.1.12-1.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=s390x\u0026epoch=1\u0026rpmmod=container-tools:rhel8:8080020240422101606:0f77c1b7"
}
}
},
{
"category": "product_version",
"name": "runc-debuginfo-1.1.12-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"product": {
"name": "runc-debuginfo-1.1.12-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm (container-tools:rhel8)",
"product_id": "runc-debuginfo-1.1.12-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/runc-debuginfo@1.1.12-1.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=s390x\u0026epoch=1\u0026rpmmod=container-tools:rhel8:8080020240422101606:0f77c1b7"
}
}
},
{
"category": "product_version",
"name": "runc-debugsource-1.1.12-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"product": {
"name": "runc-debugsource-1.1.12-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm (container-tools:rhel8)",
"product_id": "runc-debugsource-1.1.12-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/runc-debugsource@1.1.12-1.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=s390x\u0026epoch=1\u0026rpmmod=container-tools:rhel8:8080020240422101606:0f77c1b7"
}
}
},
{
"category": "product_version",
"name": "skopeo-1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"product": {
"name": "skopeo-1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.s390x.rpm (container-tools:rhel8)",
"product_id": "skopeo-1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/skopeo@1.11.2-0.2.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=s390x\u0026epoch=2\u0026rpmmod=container-tools:rhel8:8080020240422101606:0f77c1b7"
}
}
},
{
"category": "product_version",
"name": "skopeo-tests-1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"product": {
"name": "skopeo-tests-1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.s390x.rpm (container-tools:rhel8)",
"product_id": "skopeo-tests-1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/skopeo-tests@1.11.2-0.2.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=s390x\u0026epoch=2\u0026rpmmod=container-tools:rhel8:8080020240422101606:0f77c1b7"
}
}
},
{
"category": "product_version",
"name": "slirp4netns-1.2.0-3.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"product": {
"name": "slirp4netns-1.2.0-3.module+el8.8.0+21741+dd5be1e7.s390x.rpm (container-tools:rhel8)",
"product_id": "slirp4netns-1.2.0-3.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/slirp4netns@1.2.0-3.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=s390x\u0026rpmmod=container-tools:rhel8:8080020240422101606:0f77c1b7"
}
}
},
{
"category": "product_version",
"name": "slirp4netns-debuginfo-1.2.0-3.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"product": {
"name": "slirp4netns-debuginfo-1.2.0-3.module+el8.8.0+21741+dd5be1e7.s390x.rpm (container-tools:rhel8)",
"product_id": "slirp4netns-debuginfo-1.2.0-3.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/slirp4netns-debuginfo@1.2.0-3.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=s390x\u0026rpmmod=container-tools:rhel8:8080020240422101606:0f77c1b7"
}
}
},
{
"category": "product_version",
"name": "slirp4netns-debugsource-1.2.0-3.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"product": {
"name": "slirp4netns-debugsource-1.2.0-3.module+el8.8.0+21741+dd5be1e7.s390x.rpm (container-tools:rhel8)",
"product_id": "slirp4netns-debugsource-1.2.0-3.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/slirp4netns-debugsource@1.2.0-3.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=s390x\u0026rpmmod=container-tools:rhel8:8080020240422101606:0f77c1b7"
}
}
},
{
"category": "product_version",
"name": "toolbox-0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"product": {
"name": "toolbox-0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.s390x.rpm (container-tools:rhel8)",
"product_id": "toolbox-0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/toolbox@0.0.99.3-7.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=s390x\u0026rpmmod=container-tools:rhel8:8080020240422101606:0f77c1b7"
}
}
},
{
"category": "product_version",
"name": "toolbox-debuginfo-0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"product": {
"name": "toolbox-debuginfo-0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.s390x.rpm (container-tools:rhel8)",
"product_id": "toolbox-debuginfo-0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/toolbox-debuginfo@0.0.99.3-7.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=s390x\u0026rpmmod=container-tools:rhel8:8080020240422101606:0f77c1b7"
}
}
},
{
"category": "product_version",
"name": "toolbox-debugsource-0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"product": {
"name": "toolbox-debugsource-0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.s390x.rpm (container-tools:rhel8)",
"product_id": "toolbox-debugsource-0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/toolbox-debugsource@0.0.99.3-7.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=s390x\u0026rpmmod=container-tools:rhel8:8080020240422101606:0f77c1b7"
}
}
},
{
"category": "product_version",
"name": "toolbox-tests-0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"product": {
"name": "toolbox-tests-0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.s390x.rpm (container-tools:rhel8)",
"product_id": "toolbox-tests-0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/toolbox-tests@0.0.99.3-7.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=s390x\u0026rpmmod=container-tools:rhel8:8080020240422101606:0f77c1b7"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "aardvark-dns-1.5.0-2.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"product": {
"name": "aardvark-dns-1.5.0-2.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm (container-tools:rhel8)",
"product_id": "aardvark-dns-1.5.0-2.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/aardvark-dns@1.5.0-2.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=ppc64le\u0026epoch=2\u0026rpmmod=container-tools:rhel8:8080020240422101606:0f77c1b7"
}
}
},
{
"category": "product_version",
"name": "buildah-1.29.3-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"product": {
"name": "buildah-1.29.3-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm (container-tools:rhel8)",
"product_id": "buildah-1.29.3-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/buildah@1.29.3-1.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=ppc64le\u0026epoch=1\u0026rpmmod=container-tools:rhel8:8080020240422101606:0f77c1b7"
}
}
},
{
"category": "product_version",
"name": "buildah-debuginfo-1.29.3-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"product": {
"name": "buildah-debuginfo-1.29.3-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm (container-tools:rhel8)",
"product_id": "buildah-debuginfo-1.29.3-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/buildah-debuginfo@1.29.3-1.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=ppc64le\u0026epoch=1\u0026rpmmod=container-tools:rhel8:8080020240422101606:0f77c1b7"
}
}
},
{
"category": "product_version",
"name": "buildah-debugsource-1.29.3-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"product": {
"name": "buildah-debugsource-1.29.3-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm (container-tools:rhel8)",
"product_id": "buildah-debugsource-1.29.3-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/buildah-debugsource@1.29.3-1.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=ppc64le\u0026epoch=1\u0026rpmmod=container-tools:rhel8:8080020240422101606:0f77c1b7"
}
}
},
{
"category": "product_version",
"name": "buildah-tests-1.29.3-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"product": {
"name": "buildah-tests-1.29.3-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm (container-tools:rhel8)",
"product_id": "buildah-tests-1.29.3-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/buildah-tests@1.29.3-1.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=ppc64le\u0026epoch=1\u0026rpmmod=container-tools:rhel8:8080020240422101606:0f77c1b7"
}
}
},
{
"category": "product_version",
"name": "buildah-tests-debuginfo-1.29.3-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"product": {
"name": "buildah-tests-debuginfo-1.29.3-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm (container-tools:rhel8)",
"product_id": "buildah-tests-debuginfo-1.29.3-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/buildah-tests-debuginfo@1.29.3-1.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=ppc64le\u0026epoch=1\u0026rpmmod=container-tools:rhel8:8080020240422101606:0f77c1b7"
}
}
},
{
"category": "product_version",
"name": "conmon-2.1.6-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"product": {
"name": "conmon-2.1.6-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm (container-tools:rhel8)",
"product_id": "conmon-2.1.6-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/conmon@2.1.6-1.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=ppc64le\u0026epoch=3\u0026rpmmod=container-tools:rhel8:8080020240422101606:0f77c1b7"
}
}
},
{
"category": "product_version",
"name": "conmon-debuginfo-2.1.6-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"product": {
"name": "conmon-debuginfo-2.1.6-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm (container-tools:rhel8)",
"product_id": "conmon-debuginfo-2.1.6-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/conmon-debuginfo@2.1.6-1.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=ppc64le\u0026epoch=3\u0026rpmmod=container-tools:rhel8:8080020240422101606:0f77c1b7"
}
}
},
{
"category": "product_version",
"name": "conmon-debugsource-2.1.6-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"product": {
"name": "conmon-debugsource-2.1.6-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm (container-tools:rhel8)",
"product_id": "conmon-debugsource-2.1.6-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/conmon-debugsource@2.1.6-1.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=ppc64le\u0026epoch=3\u0026rpmmod=container-tools:rhel8:8080020240422101606:0f77c1b7"
}
}
},
{
"category": "product_version",
"name": "containernetworking-plugins-1.2.0-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"product": {
"name": "containernetworking-plugins-1.2.0-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm (container-tools:rhel8)",
"product_id": "containernetworking-plugins-1.2.0-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/containernetworking-plugins@1.2.0-1.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=ppc64le\u0026epoch=1\u0026rpmmod=container-tools:rhel8:8080020240422101606:0f77c1b7"
}
}
},
{
"category": "product_version",
"name": "containernetworking-plugins-debuginfo-1.2.0-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"product": {
"name": "containernetworking-plugins-debuginfo-1.2.0-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm (container-tools:rhel8)",
"product_id": "containernetworking-plugins-debuginfo-1.2.0-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/containernetworking-plugins-debuginfo@1.2.0-1.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=ppc64le\u0026epoch=1\u0026rpmmod=container-tools:rhel8:8080020240422101606:0f77c1b7"
}
}
},
{
"category": "product_version",
"name": "containernetworking-plugins-debugsource-1.2.0-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"product": {
"name": "containernetworking-plugins-debugsource-1.2.0-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm (container-tools:rhel8)",
"product_id": "containernetworking-plugins-debugsource-1.2.0-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/containernetworking-plugins-debugsource@1.2.0-1.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=ppc64le\u0026epoch=1\u0026rpmmod=container-tools:rhel8:8080020240422101606:0f77c1b7"
}
}
},
{
"category": "product_version",
"name": "containers-common-1-65.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"product": {
"name": "containers-common-1-65.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm (container-tools:rhel8)",
"product_id": "containers-common-1-65.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/containers-common@1-65.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=ppc64le\u0026epoch=2\u0026rpmmod=container-tools:rhel8:8080020240422101606:0f77c1b7"
}
}
},
{
"category": "product_version",
"name": "crit-3.15-4.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"product": {
"name": "crit-3.15-4.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm (container-tools:rhel8)",
"product_id": "crit-3.15-4.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/crit@3.15-4.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=ppc64le\u0026rpmmod=container-tools:rhel8:8080020240422101606:0f77c1b7"
}
}
},
{
"category": "product_version",
"name": "criu-3.15-4.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"product": {
"name": "criu-3.15-4.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm (container-tools:rhel8)",
"product_id": "criu-3.15-4.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/criu@3.15-4.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=ppc64le\u0026rpmmod=container-tools:rhel8:8080020240422101606:0f77c1b7"
}
}
},
{
"category": "product_version",
"name": "criu-debuginfo-3.15-4.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"product": {
"name": "criu-debuginfo-3.15-4.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm (container-tools:rhel8)",
"product_id": "criu-debuginfo-3.15-4.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/criu-debuginfo@3.15-4.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=ppc64le\u0026rpmmod=container-tools:rhel8:8080020240422101606:0f77c1b7"
}
}
},
{
"category": "product_version",
"name": "criu-debugsource-3.15-4.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"product": {
"name": "criu-debugsource-3.15-4.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm (container-tools:rhel8)",
"product_id": "criu-debugsource-3.15-4.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/criu-debugsource@3.15-4.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=ppc64le\u0026rpmmod=container-tools:rhel8:8080020240422101606:0f77c1b7"
}
}
},
{
"category": "product_version",
"name": "criu-devel-3.15-4.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"product": {
"name": "criu-devel-3.15-4.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm (container-tools:rhel8)",
"product_id": "criu-devel-3.15-4.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/criu-devel@3.15-4.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=ppc64le\u0026rpmmod=container-tools:rhel8:8080020240422101606:0f77c1b7"
}
}
},
{
"category": "product_version",
"name": "criu-libs-3.15-4.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"product": {
"name": "criu-libs-3.15-4.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm (container-tools:rhel8)",
"product_id": "criu-libs-3.15-4.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/criu-libs@3.15-4.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=ppc64le\u0026rpmmod=container-tools:rhel8:8080020240422101606:0f77c1b7"
}
}
},
{
"category": "product_version",
"name": "criu-libs-debuginfo-3.15-4.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"product": {
"name": "criu-libs-debuginfo-3.15-4.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm (container-tools:rhel8)",
"product_id": "criu-libs-debuginfo-3.15-4.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/criu-libs-debuginfo@3.15-4.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=ppc64le\u0026rpmmod=container-tools:rhel8:8080020240422101606:0f77c1b7"
}
}
},
{
"category": "product_version",
"name": "crun-1.8.4-2.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"product": {
"name": "crun-1.8.4-2.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm (container-tools:rhel8)",
"product_id": "crun-1.8.4-2.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/crun@1.8.4-2.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=ppc64le\u0026rpmmod=container-tools:rhel8:8080020240422101606:0f77c1b7"
}
}
},
{
"category": "product_version",
"name": "crun-debuginfo-1.8.4-2.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"product": {
"name": "crun-debuginfo-1.8.4-2.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm (container-tools:rhel8)",
"product_id": "crun-debuginfo-1.8.4-2.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/crun-debuginfo@1.8.4-2.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=ppc64le\u0026rpmmod=container-tools:rhel8:8080020240422101606:0f77c1b7"
}
}
},
{
"category": "product_version",
"name": "crun-debugsource-1.8.4-2.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"product": {
"name": "crun-debugsource-1.8.4-2.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm (container-tools:rhel8)",
"product_id": "crun-debugsource-1.8.4-2.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/crun-debugsource@1.8.4-2.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=ppc64le\u0026rpmmod=container-tools:rhel8:8080020240422101606:0f77c1b7"
}
}
},
{
"category": "product_version",
"name": "fuse-overlayfs-1.11-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"product": {
"name": "fuse-overlayfs-1.11-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm (container-tools:rhel8)",
"product_id": "fuse-overlayfs-1.11-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fuse-overlayfs@1.11-1.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=ppc64le\u0026rpmmod=container-tools:rhel8:8080020240422101606:0f77c1b7"
}
}
},
{
"category": "product_version",
"name": "fuse-overlayfs-debuginfo-1.11-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"product": {
"name": "fuse-overlayfs-debuginfo-1.11-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm (container-tools:rhel8)",
"product_id": "fuse-overlayfs-debuginfo-1.11-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fuse-overlayfs-debuginfo@1.11-1.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=ppc64le\u0026rpmmod=container-tools:rhel8:8080020240422101606:0f77c1b7"
}
}
},
{
"category": "product_version",
"name": "fuse-overlayfs-debugsource-1.11-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"product": {
"name": "fuse-overlayfs-debugsource-1.11-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm (container-tools:rhel8)",
"product_id": "fuse-overlayfs-debugsource-1.11-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fuse-overlayfs-debugsource@1.11-1.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=ppc64le\u0026rpmmod=container-tools:rhel8:8080020240422101606:0f77c1b7"
}
}
},
{
"category": "product_version",
"name": "libslirp-4.4.0-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"product": {
"name": "libslirp-4.4.0-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm (container-tools:rhel8)",
"product_id": "libslirp-4.4.0-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libslirp@4.4.0-1.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=ppc64le\u0026rpmmod=container-tools:rhel8:8080020240422101606:0f77c1b7"
}
}
},
{
"category": "product_version",
"name": "libslirp-debuginfo-4.4.0-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"product": {
"name": "libslirp-debuginfo-4.4.0-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm (container-tools:rhel8)",
"product_id": "libslirp-debuginfo-4.4.0-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libslirp-debuginfo@4.4.0-1.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=ppc64le\u0026rpmmod=container-tools:rhel8:8080020240422101606:0f77c1b7"
}
}
},
{
"category": "product_version",
"name": "libslirp-debugsource-4.4.0-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"product": {
"name": "libslirp-debugsource-4.4.0-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm (container-tools:rhel8)",
"product_id": "libslirp-debugsource-4.4.0-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libslirp-debugsource@4.4.0-1.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=ppc64le\u0026rpmmod=container-tools:rhel8:8080020240422101606:0f77c1b7"
}
}
},
{
"category": "product_version",
"name": "libslirp-devel-4.4.0-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"product": {
"name": "libslirp-devel-4.4.0-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm (container-tools:rhel8)",
"product_id": "libslirp-devel-4.4.0-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libslirp-devel@4.4.0-1.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=ppc64le\u0026rpmmod=container-tools:rhel8:8080020240422101606:0f77c1b7"
}
}
},
{
"category": "product_version",
"name": "netavark-1.5.1-3.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"product": {
"name": "netavark-1.5.1-3.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm (container-tools:rhel8)",
"product_id": "netavark-1.5.1-3.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/netavark@1.5.1-3.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=ppc64le\u0026epoch=2\u0026rpmmod=container-tools:rhel8:8080020240422101606:0f77c1b7"
}
}
},
{
"category": "product_version",
"name": "oci-seccomp-bpf-hook-1.2.8-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"product": {
"name": "oci-seccomp-bpf-hook-1.2.8-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm (container-tools:rhel8)",
"product_id": "oci-seccomp-bpf-hook-1.2.8-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/oci-seccomp-bpf-hook@1.2.8-1.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=ppc64le\u0026rpmmod=container-tools:rhel8:8080020240422101606:0f77c1b7"
}
}
},
{
"category": "product_version",
"name": "oci-seccomp-bpf-hook-debuginfo-1.2.8-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"product": {
"name": "oci-seccomp-bpf-hook-debuginfo-1.2.8-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm (container-tools:rhel8)",
"product_id": "oci-seccomp-bpf-hook-debuginfo-1.2.8-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/oci-seccomp-bpf-hook-debuginfo@1.2.8-1.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=ppc64le\u0026rpmmod=container-tools:rhel8:8080020240422101606:0f77c1b7"
}
}
},
{
"category": "product_version",
"name": "oci-seccomp-bpf-hook-debugsource-1.2.8-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"product": {
"name": "oci-seccomp-bpf-hook-debugsource-1.2.8-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm (container-tools:rhel8)",
"product_id": "oci-seccomp-bpf-hook-debugsource-1.2.8-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/oci-seccomp-bpf-hook-debugsource@1.2.8-1.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=ppc64le\u0026rpmmod=container-tools:rhel8:8080020240422101606:0f77c1b7"
}
}
},
{
"category": "product_version",
"name": "podman-4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"product": {
"name": "podman-4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm (container-tools:rhel8)",
"product_id": "podman-4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman@4.4.1-19.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=ppc64le\u0026epoch=3\u0026rpmmod=container-tools:rhel8:8080020240422101606:0f77c1b7"
}
}
},
{
"category": "product_version",
"name": "podman-catatonit-4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"product": {
"name": "podman-catatonit-4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm (container-tools:rhel8)",
"product_id": "podman-catatonit-4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-catatonit@4.4.1-19.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=ppc64le\u0026epoch=3\u0026rpmmod=container-tools:rhel8:8080020240422101606:0f77c1b7"
}
}
},
{
"category": "product_version",
"name": "podman-catatonit-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"product": {
"name": "podman-catatonit-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm (container-tools:rhel8)",
"product_id": "podman-catatonit-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-catatonit-debuginfo@4.4.1-19.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=ppc64le\u0026epoch=3\u0026rpmmod=container-tools:rhel8:8080020240422101606:0f77c1b7"
}
}
},
{
"category": "product_version",
"name": "podman-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"product": {
"name": "podman-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm (container-tools:rhel8)",
"product_id": "podman-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-debuginfo@4.4.1-19.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=ppc64le\u0026epoch=3\u0026rpmmod=container-tools:rhel8:8080020240422101606:0f77c1b7"
}
}
},
{
"category": "product_version",
"name": "podman-debugsource-4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"product": {
"name": "podman-debugsource-4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm (container-tools:rhel8)",
"product_id": "podman-debugsource-4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-debugsource@4.4.1-19.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=ppc64le\u0026epoch=3\u0026rpmmod=container-tools:rhel8:8080020240422101606:0f77c1b7"
}
}
},
{
"category": "product_version",
"name": "podman-gvproxy-4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"product": {
"name": "podman-gvproxy-4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm (container-tools:rhel8)",
"product_id": "podman-gvproxy-4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-gvproxy@4.4.1-19.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=ppc64le\u0026epoch=3\u0026rpmmod=container-tools:rhel8:8080020240422101606:0f77c1b7"
}
}
},
{
"category": "product_version",
"name": "podman-gvproxy-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"product": {
"name": "podman-gvproxy-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm (container-tools:rhel8)",
"product_id": "podman-gvproxy-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-gvproxy-debuginfo@4.4.1-19.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=ppc64le\u0026epoch=3\u0026rpmmod=container-tools:rhel8:8080020240422101606:0f77c1b7"
}
}
},
{
"category": "product_version",
"name": "podman-plugins-4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"product": {
"name": "podman-plugins-4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm (container-tools:rhel8)",
"product_id": "podman-plugins-4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-plugins@4.4.1-19.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=ppc64le\u0026epoch=3\u0026rpmmod=container-tools:rhel8:8080020240422101606:0f77c1b7"
}
}
},
{
"category": "product_version",
"name": "podman-plugins-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"product": {
"name": "podman-plugins-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm (container-tools:rhel8)",
"product_id": "podman-plugins-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-plugins-debuginfo@4.4.1-19.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=ppc64le\u0026epoch=3\u0026rpmmod=container-tools:rhel8:8080020240422101606:0f77c1b7"
}
}
},
{
"category": "product_version",
"name": "podman-remote-4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"product": {
"name": "podman-remote-4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm (container-tools:rhel8)",
"product_id": "podman-remote-4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-remote@4.4.1-19.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=ppc64le\u0026epoch=3\u0026rpmmod=container-tools:rhel8:8080020240422101606:0f77c1b7"
}
}
},
{
"category": "product_version",
"name": "podman-remote-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"product": {
"name": "podman-remote-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm (container-tools:rhel8)",
"product_id": "podman-remote-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-remote-debuginfo@4.4.1-19.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=ppc64le\u0026epoch=3\u0026rpmmod=container-tools:rhel8:8080020240422101606:0f77c1b7"
}
}
},
{
"category": "product_version",
"name": "podman-tests-4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"product": {
"name": "podman-tests-4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm (container-tools:rhel8)",
"product_id": "podman-tests-4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-tests@4.4.1-19.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=ppc64le\u0026epoch=3\u0026rpmmod=container-tools:rhel8:8080020240422101606:0f77c1b7"
}
}
},
{
"category": "product_version",
"name": "python3-criu-3.15-4.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"product": {
"name": "python3-criu-3.15-4.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm (container-tools:rhel8)",
"product_id": "python3-criu-3.15-4.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-criu@3.15-4.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=ppc64le\u0026rpmmod=container-tools:rhel8:8080020240422101606:0f77c1b7"
}
}
},
{
"category": "product_version",
"name": "runc-1.1.12-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"product": {
"name": "runc-1.1.12-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm (container-tools:rhel8)",
"product_id": "runc-1.1.12-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/runc@1.1.12-1.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=ppc64le\u0026epoch=1\u0026rpmmod=container-tools:rhel8:8080020240422101606:0f77c1b7"
}
}
},
{
"category": "product_version",
"name": "runc-debuginfo-1.1.12-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"product": {
"name": "runc-debuginfo-1.1.12-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm (container-tools:rhel8)",
"product_id": "runc-debuginfo-1.1.12-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/runc-debuginfo@1.1.12-1.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=ppc64le\u0026epoch=1\u0026rpmmod=container-tools:rhel8:8080020240422101606:0f77c1b7"
}
}
},
{
"category": "product_version",
"name": "runc-debugsource-1.1.12-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"product": {
"name": "runc-debugsource-1.1.12-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm (container-tools:rhel8)",
"product_id": "runc-debugsource-1.1.12-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/runc-debugsource@1.1.12-1.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=ppc64le\u0026epoch=1\u0026rpmmod=container-tools:rhel8:8080020240422101606:0f77c1b7"
}
}
},
{
"category": "product_version",
"name": "skopeo-1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"product": {
"name": "skopeo-1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm (container-tools:rhel8)",
"product_id": "skopeo-1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/skopeo@1.11.2-0.2.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=ppc64le\u0026epoch=2\u0026rpmmod=container-tools:rhel8:8080020240422101606:0f77c1b7"
}
}
},
{
"category": "product_version",
"name": "skopeo-tests-1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"product": {
"name": "skopeo-tests-1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm (container-tools:rhel8)",
"product_id": "skopeo-tests-1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/skopeo-tests@1.11.2-0.2.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=ppc64le\u0026epoch=2\u0026rpmmod=container-tools:rhel8:8080020240422101606:0f77c1b7"
}
}
},
{
"category": "product_version",
"name": "slirp4netns-1.2.0-3.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"product": {
"name": "slirp4netns-1.2.0-3.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm (container-tools:rhel8)",
"product_id": "slirp4netns-1.2.0-3.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/slirp4netns@1.2.0-3.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=ppc64le\u0026rpmmod=container-tools:rhel8:8080020240422101606:0f77c1b7"
}
}
},
{
"category": "product_version",
"name": "slirp4netns-debuginfo-1.2.0-3.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"product": {
"name": "slirp4netns-debuginfo-1.2.0-3.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm (container-tools:rhel8)",
"product_id": "slirp4netns-debuginfo-1.2.0-3.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/slirp4netns-debuginfo@1.2.0-3.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=ppc64le\u0026rpmmod=container-tools:rhel8:8080020240422101606:0f77c1b7"
}
}
},
{
"category": "product_version",
"name": "slirp4netns-debugsource-1.2.0-3.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"product": {
"name": "slirp4netns-debugsource-1.2.0-3.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm (container-tools:rhel8)",
"product_id": "slirp4netns-debugsource-1.2.0-3.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/slirp4netns-debugsource@1.2.0-3.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=ppc64le\u0026rpmmod=container-tools:rhel8:8080020240422101606:0f77c1b7"
}
}
},
{
"category": "product_version",
"name": "toolbox-0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"product": {
"name": "toolbox-0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm (container-tools:rhel8)",
"product_id": "toolbox-0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/toolbox@0.0.99.3-7.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=ppc64le\u0026rpmmod=container-tools:rhel8:8080020240422101606:0f77c1b7"
}
}
},
{
"category": "product_version",
"name": "toolbox-debuginfo-0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"product": {
"name": "toolbox-debuginfo-0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm (container-tools:rhel8)",
"product_id": "toolbox-debuginfo-0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/toolbox-debuginfo@0.0.99.3-7.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=ppc64le\u0026rpmmod=container-tools:rhel8:8080020240422101606:0f77c1b7"
}
}
},
{
"category": "product_version",
"name": "toolbox-debugsource-0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"product": {
"name": "toolbox-debugsource-0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm (container-tools:rhel8)",
"product_id": "toolbox-debugsource-0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/toolbox-debugsource@0.0.99.3-7.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=ppc64le\u0026rpmmod=container-tools:rhel8:8080020240422101606:0f77c1b7"
}
}
},
{
"category": "product_version",
"name": "toolbox-tests-0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"product": {
"name": "toolbox-tests-0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm (container-tools:rhel8)",
"product_id": "toolbox-tests-0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/toolbox-tests@0.0.99.3-7.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=ppc64le\u0026rpmmod=container-tools:rhel8:8080020240422101606:0f77c1b7"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "aardvark-dns-1.5.0-2.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"product": {
"name": "aardvark-dns-1.5.0-2.module+el8.8.0+21741+dd5be1e7.aarch64.rpm (container-tools:rhel8)",
"product_id": "aardvark-dns-1.5.0-2.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/aardvark-dns@1.5.0-2.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=aarch64\u0026epoch=2\u0026rpmmod=container-tools:rhel8:8080020240422101606:0f77c1b7"
}
}
},
{
"category": "product_version",
"name": "buildah-1.29.3-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"product": {
"name": "buildah-1.29.3-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm (container-tools:rhel8)",
"product_id": "buildah-1.29.3-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/buildah@1.29.3-1.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=aarch64\u0026epoch=1\u0026rpmmod=container-tools:rhel8:8080020240422101606:0f77c1b7"
}
}
},
{
"category": "product_version",
"name": "buildah-debuginfo-1.29.3-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"product": {
"name": "buildah-debuginfo-1.29.3-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm (container-tools:rhel8)",
"product_id": "buildah-debuginfo-1.29.3-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/buildah-debuginfo@1.29.3-1.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=aarch64\u0026epoch=1\u0026rpmmod=container-tools:rhel8:8080020240422101606:0f77c1b7"
}
}
},
{
"category": "product_version",
"name": "buildah-debugsource-1.29.3-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"product": {
"name": "buildah-debugsource-1.29.3-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm (container-tools:rhel8)",
"product_id": "buildah-debugsource-1.29.3-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/buildah-debugsource@1.29.3-1.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=aarch64\u0026epoch=1\u0026rpmmod=container-tools:rhel8:8080020240422101606:0f77c1b7"
}
}
},
{
"category": "product_version",
"name": "buildah-tests-1.29.3-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"product": {
"name": "buildah-tests-1.29.3-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm (container-tools:rhel8)",
"product_id": "buildah-tests-1.29.3-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/buildah-tests@1.29.3-1.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=aarch64\u0026epoch=1\u0026rpmmod=container-tools:rhel8:8080020240422101606:0f77c1b7"
}
}
},
{
"category": "product_version",
"name": "buildah-tests-debuginfo-1.29.3-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"product": {
"name": "buildah-tests-debuginfo-1.29.3-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm (container-tools:rhel8)",
"product_id": "buildah-tests-debuginfo-1.29.3-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/buildah-tests-debuginfo@1.29.3-1.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=aarch64\u0026epoch=1\u0026rpmmod=container-tools:rhel8:8080020240422101606:0f77c1b7"
}
}
},
{
"category": "product_version",
"name": "conmon-2.1.6-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"product": {
"name": "conmon-2.1.6-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm (container-tools:rhel8)",
"product_id": "conmon-2.1.6-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/conmon@2.1.6-1.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=aarch64\u0026epoch=3\u0026rpmmod=container-tools:rhel8:8080020240422101606:0f77c1b7"
}
}
},
{
"category": "product_version",
"name": "conmon-debuginfo-2.1.6-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"product": {
"name": "conmon-debuginfo-2.1.6-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm (container-tools:rhel8)",
"product_id": "conmon-debuginfo-2.1.6-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/conmon-debuginfo@2.1.6-1.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=aarch64\u0026epoch=3\u0026rpmmod=container-tools:rhel8:8080020240422101606:0f77c1b7"
}
}
},
{
"category": "product_version",
"name": "conmon-debugsource-2.1.6-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"product": {
"name": "conmon-debugsource-2.1.6-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm (container-tools:rhel8)",
"product_id": "conmon-debugsource-2.1.6-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/conmon-debugsource@2.1.6-1.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=aarch64\u0026epoch=3\u0026rpmmod=container-tools:rhel8:8080020240422101606:0f77c1b7"
}
}
},
{
"category": "product_version",
"name": "containernetworking-plugins-1.2.0-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"product": {
"name": "containernetworking-plugins-1.2.0-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm (container-tools:rhel8)",
"product_id": "containernetworking-plugins-1.2.0-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/containernetworking-plugins@1.2.0-1.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=aarch64\u0026epoch=1\u0026rpmmod=container-tools:rhel8:8080020240422101606:0f77c1b7"
}
}
},
{
"category": "product_version",
"name": "containernetworking-plugins-debuginfo-1.2.0-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"product": {
"name": "containernetworking-plugins-debuginfo-1.2.0-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm (container-tools:rhel8)",
"product_id": "containernetworking-plugins-debuginfo-1.2.0-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/containernetworking-plugins-debuginfo@1.2.0-1.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=aarch64\u0026epoch=1\u0026rpmmod=container-tools:rhel8:8080020240422101606:0f77c1b7"
}
}
},
{
"category": "product_version",
"name": "containernetworking-plugins-debugsource-1.2.0-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"product": {
"name": "containernetworking-plugins-debugsource-1.2.0-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm (container-tools:rhel8)",
"product_id": "containernetworking-plugins-debugsource-1.2.0-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/containernetworking-plugins-debugsource@1.2.0-1.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=aarch64\u0026epoch=1\u0026rpmmod=container-tools:rhel8:8080020240422101606:0f77c1b7"
}
}
},
{
"category": "product_version",
"name": "containers-common-1-65.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"product": {
"name": "containers-common-1-65.module+el8.8.0+21741+dd5be1e7.aarch64.rpm (container-tools:rhel8)",
"product_id": "containers-common-1-65.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/containers-common@1-65.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=aarch64\u0026epoch=2\u0026rpmmod=container-tools:rhel8:8080020240422101606:0f77c1b7"
}
}
},
{
"category": "product_version",
"name": "crit-3.15-4.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"product": {
"name": "crit-3.15-4.module+el8.8.0+21741+dd5be1e7.aarch64.rpm (container-tools:rhel8)",
"product_id": "crit-3.15-4.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/crit@3.15-4.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=aarch64\u0026rpmmod=container-tools:rhel8:8080020240422101606:0f77c1b7"
}
}
},
{
"category": "product_version",
"name": "criu-3.15-4.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"product": {
"name": "criu-3.15-4.module+el8.8.0+21741+dd5be1e7.aarch64.rpm (container-tools:rhel8)",
"product_id": "criu-3.15-4.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/criu@3.15-4.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=aarch64\u0026rpmmod=container-tools:rhel8:8080020240422101606:0f77c1b7"
}
}
},
{
"category": "product_version",
"name": "criu-debuginfo-3.15-4.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"product": {
"name": "criu-debuginfo-3.15-4.module+el8.8.0+21741+dd5be1e7.aarch64.rpm (container-tools:rhel8)",
"product_id": "criu-debuginfo-3.15-4.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/criu-debuginfo@3.15-4.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=aarch64\u0026rpmmod=container-tools:rhel8:8080020240422101606:0f77c1b7"
}
}
},
{
"category": "product_version",
"name": "criu-debugsource-3.15-4.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"product": {
"name": "criu-debugsource-3.15-4.module+el8.8.0+21741+dd5be1e7.aarch64.rpm (container-tools:rhel8)",
"product_id": "criu-debugsource-3.15-4.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/criu-debugsource@3.15-4.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=aarch64\u0026rpmmod=container-tools:rhel8:8080020240422101606:0f77c1b7"
}
}
},
{
"category": "product_version",
"name": "criu-devel-3.15-4.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"product": {
"name": "criu-devel-3.15-4.module+el8.8.0+21741+dd5be1e7.aarch64.rpm (container-tools:rhel8)",
"product_id": "criu-devel-3.15-4.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/criu-devel@3.15-4.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=aarch64\u0026rpmmod=container-tools:rhel8:8080020240422101606:0f77c1b7"
}
}
},
{
"category": "product_version",
"name": "criu-libs-3.15-4.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"product": {
"name": "criu-libs-3.15-4.module+el8.8.0+21741+dd5be1e7.aarch64.rpm (container-tools:rhel8)",
"product_id": "criu-libs-3.15-4.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/criu-libs@3.15-4.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=aarch64\u0026rpmmod=container-tools:rhel8:8080020240422101606:0f77c1b7"
}
}
},
{
"category": "product_version",
"name": "criu-libs-debuginfo-3.15-4.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"product": {
"name": "criu-libs-debuginfo-3.15-4.module+el8.8.0+21741+dd5be1e7.aarch64.rpm (container-tools:rhel8)",
"product_id": "criu-libs-debuginfo-3.15-4.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/criu-libs-debuginfo@3.15-4.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=aarch64\u0026rpmmod=container-tools:rhel8:8080020240422101606:0f77c1b7"
}
}
},
{
"category": "product_version",
"name": "crun-1.8.4-2.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"product": {
"name": "crun-1.8.4-2.module+el8.8.0+21741+dd5be1e7.aarch64.rpm (container-tools:rhel8)",
"product_id": "crun-1.8.4-2.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/crun@1.8.4-2.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=aarch64\u0026rpmmod=container-tools:rhel8:8080020240422101606:0f77c1b7"
}
}
},
{
"category": "product_version",
"name": "crun-debuginfo-1.8.4-2.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"product": {
"name": "crun-debuginfo-1.8.4-2.module+el8.8.0+21741+dd5be1e7.aarch64.rpm (container-tools:rhel8)",
"product_id": "crun-debuginfo-1.8.4-2.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/crun-debuginfo@1.8.4-2.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=aarch64\u0026rpmmod=container-tools:rhel8:8080020240422101606:0f77c1b7"
}
}
},
{
"category": "product_version",
"name": "crun-debugsource-1.8.4-2.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"product": {
"name": "crun-debugsource-1.8.4-2.module+el8.8.0+21741+dd5be1e7.aarch64.rpm (container-tools:rhel8)",
"product_id": "crun-debugsource-1.8.4-2.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/crun-debugsource@1.8.4-2.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=aarch64\u0026rpmmod=container-tools:rhel8:8080020240422101606:0f77c1b7"
}
}
},
{
"category": "product_version",
"name": "fuse-overlayfs-1.11-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"product": {
"name": "fuse-overlayfs-1.11-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm (container-tools:rhel8)",
"product_id": "fuse-overlayfs-1.11-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fuse-overlayfs@1.11-1.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=aarch64\u0026rpmmod=container-tools:rhel8:8080020240422101606:0f77c1b7"
}
}
},
{
"category": "product_version",
"name": "fuse-overlayfs-debuginfo-1.11-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"product": {
"name": "fuse-overlayfs-debuginfo-1.11-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm (container-tools:rhel8)",
"product_id": "fuse-overlayfs-debuginfo-1.11-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fuse-overlayfs-debuginfo@1.11-1.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=aarch64\u0026rpmmod=container-tools:rhel8:8080020240422101606:0f77c1b7"
}
}
},
{
"category": "product_version",
"name": "fuse-overlayfs-debugsource-1.11-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"product": {
"name": "fuse-overlayfs-debugsource-1.11-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm (container-tools:rhel8)",
"product_id": "fuse-overlayfs-debugsource-1.11-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fuse-overlayfs-debugsource@1.11-1.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=aarch64\u0026rpmmod=container-tools:rhel8:8080020240422101606:0f77c1b7"
}
}
},
{
"category": "product_version",
"name": "libslirp-4.4.0-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"product": {
"name": "libslirp-4.4.0-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm (container-tools:rhel8)",
"product_id": "libslirp-4.4.0-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libslirp@4.4.0-1.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=aarch64\u0026rpmmod=container-tools:rhel8:8080020240422101606:0f77c1b7"
}
}
},
{
"category": "product_version",
"name": "libslirp-debuginfo-4.4.0-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"product": {
"name": "libslirp-debuginfo-4.4.0-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm (container-tools:rhel8)",
"product_id": "libslirp-debuginfo-4.4.0-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libslirp-debuginfo@4.4.0-1.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=aarch64\u0026rpmmod=container-tools:rhel8:8080020240422101606:0f77c1b7"
}
}
},
{
"category": "product_version",
"name": "libslirp-debugsource-4.4.0-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"product": {
"name": "libslirp-debugsource-4.4.0-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm (container-tools:rhel8)",
"product_id": "libslirp-debugsource-4.4.0-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libslirp-debugsource@4.4.0-1.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=aarch64\u0026rpmmod=container-tools:rhel8:8080020240422101606:0f77c1b7"
}
}
},
{
"category": "product_version",
"name": "libslirp-devel-4.4.0-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"product": {
"name": "libslirp-devel-4.4.0-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm (container-tools:rhel8)",
"product_id": "libslirp-devel-4.4.0-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libslirp-devel@4.4.0-1.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=aarch64\u0026rpmmod=container-tools:rhel8:8080020240422101606:0f77c1b7"
}
}
},
{
"category": "product_version",
"name": "netavark-1.5.1-3.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"product": {
"name": "netavark-1.5.1-3.module+el8.8.0+21741+dd5be1e7.aarch64.rpm (container-tools:rhel8)",
"product_id": "netavark-1.5.1-3.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/netavark@1.5.1-3.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=aarch64\u0026epoch=2\u0026rpmmod=container-tools:rhel8:8080020240422101606:0f77c1b7"
}
}
},
{
"category": "product_version",
"name": "oci-seccomp-bpf-hook-1.2.8-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"product": {
"name": "oci-seccomp-bpf-hook-1.2.8-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm (container-tools:rhel8)",
"product_id": "oci-seccomp-bpf-hook-1.2.8-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/oci-seccomp-bpf-hook@1.2.8-1.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=aarch64\u0026rpmmod=container-tools:rhel8:8080020240422101606:0f77c1b7"
}
}
},
{
"category": "product_version",
"name": "oci-seccomp-bpf-hook-debuginfo-1.2.8-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"product": {
"name": "oci-seccomp-bpf-hook-debuginfo-1.2.8-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm (container-tools:rhel8)",
"product_id": "oci-seccomp-bpf-hook-debuginfo-1.2.8-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/oci-seccomp-bpf-hook-debuginfo@1.2.8-1.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=aarch64\u0026rpmmod=container-tools:rhel8:8080020240422101606:0f77c1b7"
}
}
},
{
"category": "product_version",
"name": "oci-seccomp-bpf-hook-debugsource-1.2.8-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"product": {
"name": "oci-seccomp-bpf-hook-debugsource-1.2.8-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm (container-tools:rhel8)",
"product_id": "oci-seccomp-bpf-hook-debugsource-1.2.8-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/oci-seccomp-bpf-hook-debugsource@1.2.8-1.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=aarch64\u0026rpmmod=container-tools:rhel8:8080020240422101606:0f77c1b7"
}
}
},
{
"category": "product_version",
"name": "podman-4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"product": {
"name": "podman-4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64.rpm (container-tools:rhel8)",
"product_id": "podman-4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman@4.4.1-19.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=aarch64\u0026epoch=3\u0026rpmmod=container-tools:rhel8:8080020240422101606:0f77c1b7"
}
}
},
{
"category": "product_version",
"name": "podman-catatonit-4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"product": {
"name": "podman-catatonit-4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64.rpm (container-tools:rhel8)",
"product_id": "podman-catatonit-4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-catatonit@4.4.1-19.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=aarch64\u0026epoch=3\u0026rpmmod=container-tools:rhel8:8080020240422101606:0f77c1b7"
}
}
},
{
"category": "product_version",
"name": "podman-catatonit-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"product": {
"name": "podman-catatonit-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64.rpm (container-tools:rhel8)",
"product_id": "podman-catatonit-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-catatonit-debuginfo@4.4.1-19.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=aarch64\u0026epoch=3\u0026rpmmod=container-tools:rhel8:8080020240422101606:0f77c1b7"
}
}
},
{
"category": "product_version",
"name": "podman-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"product": {
"name": "podman-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64.rpm (container-tools:rhel8)",
"product_id": "podman-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-debuginfo@4.4.1-19.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=aarch64\u0026epoch=3\u0026rpmmod=container-tools:rhel8:8080020240422101606:0f77c1b7"
}
}
},
{
"category": "product_version",
"name": "podman-debugsource-4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"product": {
"name": "podman-debugsource-4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64.rpm (container-tools:rhel8)",
"product_id": "podman-debugsource-4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-debugsource@4.4.1-19.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=aarch64\u0026epoch=3\u0026rpmmod=container-tools:rhel8:8080020240422101606:0f77c1b7"
}
}
},
{
"category": "product_version",
"name": "podman-gvproxy-4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"product": {
"name": "podman-gvproxy-4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64.rpm (container-tools:rhel8)",
"product_id": "podman-gvproxy-4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-gvproxy@4.4.1-19.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=aarch64\u0026epoch=3\u0026rpmmod=container-tools:rhel8:8080020240422101606:0f77c1b7"
}
}
},
{
"category": "product_version",
"name": "podman-gvproxy-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"product": {
"name": "podman-gvproxy-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64.rpm (container-tools:rhel8)",
"product_id": "podman-gvproxy-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-gvproxy-debuginfo@4.4.1-19.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=aarch64\u0026epoch=3\u0026rpmmod=container-tools:rhel8:8080020240422101606:0f77c1b7"
}
}
},
{
"category": "product_version",
"name": "podman-plugins-4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"product": {
"name": "podman-plugins-4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64.rpm (container-tools:rhel8)",
"product_id": "podman-plugins-4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-plugins@4.4.1-19.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=aarch64\u0026epoch=3\u0026rpmmod=container-tools:rhel8:8080020240422101606:0f77c1b7"
}
}
},
{
"category": "product_version",
"name": "podman-plugins-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"product": {
"name": "podman-plugins-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64.rpm (container-tools:rhel8)",
"product_id": "podman-plugins-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-plugins-debuginfo@4.4.1-19.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=aarch64\u0026epoch=3\u0026rpmmod=container-tools:rhel8:8080020240422101606:0f77c1b7"
}
}
},
{
"category": "product_version",
"name": "podman-remote-4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"product": {
"name": "podman-remote-4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64.rpm (container-tools:rhel8)",
"product_id": "podman-remote-4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-remote@4.4.1-19.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=aarch64\u0026epoch=3\u0026rpmmod=container-tools:rhel8:8080020240422101606:0f77c1b7"
}
}
},
{
"category": "product_version",
"name": "podman-remote-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"product": {
"name": "podman-remote-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64.rpm (container-tools:rhel8)",
"product_id": "podman-remote-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-remote-debuginfo@4.4.1-19.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=aarch64\u0026epoch=3\u0026rpmmod=container-tools:rhel8:8080020240422101606:0f77c1b7"
}
}
},
{
"category": "product_version",
"name": "podman-tests-4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"product": {
"name": "podman-tests-4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64.rpm (container-tools:rhel8)",
"product_id": "podman-tests-4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-tests@4.4.1-19.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=aarch64\u0026epoch=3\u0026rpmmod=container-tools:rhel8:8080020240422101606:0f77c1b7"
}
}
},
{
"category": "product_version",
"name": "python3-criu-3.15-4.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"product": {
"name": "python3-criu-3.15-4.module+el8.8.0+21741+dd5be1e7.aarch64.rpm (container-tools:rhel8)",
"product_id": "python3-criu-3.15-4.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-criu@3.15-4.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=aarch64\u0026rpmmod=container-tools:rhel8:8080020240422101606:0f77c1b7"
}
}
},
{
"category": "product_version",
"name": "runc-1.1.12-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"product": {
"name": "runc-1.1.12-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm (container-tools:rhel8)",
"product_id": "runc-1.1.12-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/runc@1.1.12-1.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=aarch64\u0026epoch=1\u0026rpmmod=container-tools:rhel8:8080020240422101606:0f77c1b7"
}
}
},
{
"category": "product_version",
"name": "runc-debuginfo-1.1.12-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"product": {
"name": "runc-debuginfo-1.1.12-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm (container-tools:rhel8)",
"product_id": "runc-debuginfo-1.1.12-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/runc-debuginfo@1.1.12-1.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=aarch64\u0026epoch=1\u0026rpmmod=container-tools:rhel8:8080020240422101606:0f77c1b7"
}
}
},
{
"category": "product_version",
"name": "runc-debugsource-1.1.12-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"product": {
"name": "runc-debugsource-1.1.12-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm (container-tools:rhel8)",
"product_id": "runc-debugsource-1.1.12-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/runc-debugsource@1.1.12-1.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=aarch64\u0026epoch=1\u0026rpmmod=container-tools:rhel8:8080020240422101606:0f77c1b7"
}
}
},
{
"category": "product_version",
"name": "skopeo-1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"product": {
"name": "skopeo-1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.aarch64.rpm (container-tools:rhel8)",
"product_id": "skopeo-1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/skopeo@1.11.2-0.2.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=aarch64\u0026epoch=2\u0026rpmmod=container-tools:rhel8:8080020240422101606:0f77c1b7"
}
}
},
{
"category": "product_version",
"name": "skopeo-tests-1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"product": {
"name": "skopeo-tests-1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.aarch64.rpm (container-tools:rhel8)",
"product_id": "skopeo-tests-1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/skopeo-tests@1.11.2-0.2.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=aarch64\u0026epoch=2\u0026rpmmod=container-tools:rhel8:8080020240422101606:0f77c1b7"
}
}
},
{
"category": "product_version",
"name": "slirp4netns-1.2.0-3.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"product": {
"name": "slirp4netns-1.2.0-3.module+el8.8.0+21741+dd5be1e7.aarch64.rpm (container-tools:rhel8)",
"product_id": "slirp4netns-1.2.0-3.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/slirp4netns@1.2.0-3.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=aarch64\u0026rpmmod=container-tools:rhel8:8080020240422101606:0f77c1b7"
}
}
},
{
"category": "product_version",
"name": "slirp4netns-debuginfo-1.2.0-3.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"product": {
"name": "slirp4netns-debuginfo-1.2.0-3.module+el8.8.0+21741+dd5be1e7.aarch64.rpm (container-tools:rhel8)",
"product_id": "slirp4netns-debuginfo-1.2.0-3.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/slirp4netns-debuginfo@1.2.0-3.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=aarch64\u0026rpmmod=container-tools:rhel8:8080020240422101606:0f77c1b7"
}
}
},
{
"category": "product_version",
"name": "slirp4netns-debugsource-1.2.0-3.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"product": {
"name": "slirp4netns-debugsource-1.2.0-3.module+el8.8.0+21741+dd5be1e7.aarch64.rpm (container-tools:rhel8)",
"product_id": "slirp4netns-debugsource-1.2.0-3.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/slirp4netns-debugsource@1.2.0-3.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=aarch64\u0026rpmmod=container-tools:rhel8:8080020240422101606:0f77c1b7"
}
}
},
{
"category": "product_version",
"name": "toolbox-0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"product": {
"name": "toolbox-0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.aarch64.rpm (container-tools:rhel8)",
"product_id": "toolbox-0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/toolbox@0.0.99.3-7.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=aarch64\u0026rpmmod=container-tools:rhel8:8080020240422101606:0f77c1b7"
}
}
},
{
"category": "product_version",
"name": "toolbox-debuginfo-0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"product": {
"name": "toolbox-debuginfo-0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.aarch64.rpm (container-tools:rhel8)",
"product_id": "toolbox-debuginfo-0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/toolbox-debuginfo@0.0.99.3-7.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=aarch64\u0026rpmmod=container-tools:rhel8:8080020240422101606:0f77c1b7"
}
}
},
{
"category": "product_version",
"name": "toolbox-debugsource-0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"product": {
"name": "toolbox-debugsource-0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.aarch64.rpm (container-tools:rhel8)",
"product_id": "toolbox-debugsource-0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/toolbox-debugsource@0.0.99.3-7.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=aarch64\u0026rpmmod=container-tools:rhel8:8080020240422101606:0f77c1b7"
}
}
},
{
"category": "product_version",
"name": "toolbox-tests-0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"product": {
"name": "toolbox-tests-0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.aarch64.rpm (container-tools:rhel8)",
"product_id": "toolbox-tests-0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/toolbox-tests@0.0.99.3-7.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=aarch64\u0026rpmmod=container-tools:rhel8:8080020240422101606:0f77c1b7"
}
}
}
],
"category": "architecture",
"name": "aarch64"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "aardvark-dns-1.5.0-2.module+el8.8.0+21741+dd5be1e7.aarch64.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:aardvark-dns-1.5.0-2.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8"
},
"product_reference": "aardvark-dns-1.5.0-2.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "aardvark-dns-1.5.0-2.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:aardvark-dns-1.5.0-2.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8"
},
"product_reference": "aardvark-dns-1.5.0-2.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "aardvark-dns-1.5.0-2.module+el8.8.0+21741+dd5be1e7.s390x.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:aardvark-dns-1.5.0-2.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8"
},
"product_reference": "aardvark-dns-1.5.0-2.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "aardvark-dns-1.5.0-2.module+el8.8.0+21741+dd5be1e7.src.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:aardvark-dns-1.5.0-2.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8"
},
"product_reference": "aardvark-dns-1.5.0-2.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "aardvark-dns-1.5.0-2.module+el8.8.0+21741+dd5be1e7.x86_64.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:aardvark-dns-1.5.0-2.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8"
},
"product_reference": "aardvark-dns-1.5.0-2.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "buildah-1.29.3-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:buildah-1.29.3-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8"
},
"product_reference": "buildah-1.29.3-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "buildah-1.29.3-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:buildah-1.29.3-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8"
},
"product_reference": "buildah-1.29.3-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "buildah-1.29.3-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:buildah-1.29.3-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8"
},
"product_reference": "buildah-1.29.3-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "buildah-1.29.3-1.module+el8.8.0+21741+dd5be1e7.src.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:buildah-1.29.3-1.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8"
},
"product_reference": "buildah-1.29.3-1.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "buildah-1.29.3-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:buildah-1.29.3-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8"
},
"product_reference": "buildah-1.29.3-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "buildah-debuginfo-1.29.3-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:buildah-debuginfo-1.29.3-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8"
},
"product_reference": "buildah-debuginfo-1.29.3-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "buildah-debuginfo-1.29.3-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:buildah-debuginfo-1.29.3-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8"
},
"product_reference": "buildah-debuginfo-1.29.3-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "buildah-debuginfo-1.29.3-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:buildah-debuginfo-1.29.3-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8"
},
"product_reference": "buildah-debuginfo-1.29.3-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "buildah-debuginfo-1.29.3-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:buildah-debuginfo-1.29.3-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8"
},
"product_reference": "buildah-debuginfo-1.29.3-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "buildah-debugsource-1.29.3-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:buildah-debugsource-1.29.3-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8"
},
"product_reference": "buildah-debugsource-1.29.3-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "buildah-debugsource-1.29.3-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:buildah-debugsource-1.29.3-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8"
},
"product_reference": "buildah-debugsource-1.29.3-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "buildah-debugsource-1.29.3-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:buildah-debugsource-1.29.3-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8"
},
"product_reference": "buildah-debugsource-1.29.3-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "buildah-debugsource-1.29.3-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:buildah-debugsource-1.29.3-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8"
},
"product_reference": "buildah-debugsource-1.29.3-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "buildah-tests-1.29.3-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:buildah-tests-1.29.3-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8"
},
"product_reference": "buildah-tests-1.29.3-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "buildah-tests-1.29.3-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:buildah-tests-1.29.3-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8"
},
"product_reference": "buildah-tests-1.29.3-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "buildah-tests-1.29.3-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:buildah-tests-1.29.3-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8"
},
"product_reference": "buildah-tests-1.29.3-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "buildah-tests-1.29.3-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:buildah-tests-1.29.3-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8"
},
"product_reference": "buildah-tests-1.29.3-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "buildah-tests-debuginfo-1.29.3-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:buildah-tests-debuginfo-1.29.3-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8"
},
"product_reference": "buildah-tests-debuginfo-1.29.3-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "buildah-tests-debuginfo-1.29.3-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:buildah-tests-debuginfo-1.29.3-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8"
},
"product_reference": "buildah-tests-debuginfo-1.29.3-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "buildah-tests-debuginfo-1.29.3-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:buildah-tests-debuginfo-1.29.3-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8"
},
"product_reference": "buildah-tests-debuginfo-1.29.3-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "buildah-tests-debuginfo-1.29.3-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:buildah-tests-debuginfo-1.29.3-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8"
},
"product_reference": "buildah-tests-debuginfo-1.29.3-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cockpit-podman-63.1-1.module+el8.8.0+21741+dd5be1e7.noarch.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:cockpit-podman-63.1-1.module+el8.8.0+21741+dd5be1e7.noarch.rpm-container-tools:rhel8"
},
"product_reference": "cockpit-podman-63.1-1.module+el8.8.0+21741+dd5be1e7.noarch.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cockpit-podman-63.1-1.module+el8.8.0+21741+dd5be1e7.src.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:cockpit-podman-63.1-1.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8"
},
"product_reference": "cockpit-podman-63.1-1.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "conmon-2.1.6-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:conmon-2.1.6-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8"
},
"product_reference": "conmon-2.1.6-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "conmon-2.1.6-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:conmon-2.1.6-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8"
},
"product_reference": "conmon-2.1.6-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "conmon-2.1.6-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:conmon-2.1.6-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8"
},
"product_reference": "conmon-2.1.6-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "conmon-2.1.6-1.module+el8.8.0+21741+dd5be1e7.src.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:conmon-2.1.6-1.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8"
},
"product_reference": "conmon-2.1.6-1.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "conmon-2.1.6-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:conmon-2.1.6-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8"
},
"product_reference": "conmon-2.1.6-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "conmon-debuginfo-2.1.6-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:conmon-debuginfo-2.1.6-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8"
},
"product_reference": "conmon-debuginfo-2.1.6-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "conmon-debuginfo-2.1.6-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:conmon-debuginfo-2.1.6-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8"
},
"product_reference": "conmon-debuginfo-2.1.6-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "conmon-debuginfo-2.1.6-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:conmon-debuginfo-2.1.6-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8"
},
"product_reference": "conmon-debuginfo-2.1.6-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "conmon-debuginfo-2.1.6-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:conmon-debuginfo-2.1.6-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8"
},
"product_reference": "conmon-debuginfo-2.1.6-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "conmon-debugsource-2.1.6-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:conmon-debugsource-2.1.6-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8"
},
"product_reference": "conmon-debugsource-2.1.6-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "conmon-debugsource-2.1.6-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:conmon-debugsource-2.1.6-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8"
},
"product_reference": "conmon-debugsource-2.1.6-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "conmon-debugsource-2.1.6-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:conmon-debugsource-2.1.6-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8"
},
"product_reference": "conmon-debugsource-2.1.6-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "conmon-debugsource-2.1.6-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:conmon-debugsource-2.1.6-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8"
},
"product_reference": "conmon-debugsource-2.1.6-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "container-selinux-2.229.0-1.module+el8.8.0+21741+dd5be1e7.noarch.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:container-selinux-2.229.0-1.module+el8.8.0+21741+dd5be1e7.noarch.rpm-container-tools:rhel8"
},
"product_reference": "container-selinux-2.229.0-1.module+el8.8.0+21741+dd5be1e7.noarch.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "container-selinux-2.229.0-1.module+el8.8.0+21741+dd5be1e7.src.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:container-selinux-2.229.0-1.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8"
},
"product_reference": "container-selinux-2.229.0-1.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "containernetworking-plugins-1.2.0-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:containernetworking-plugins-1.2.0-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8"
},
"product_reference": "containernetworking-plugins-1.2.0-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "containernetworking-plugins-1.2.0-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:containernetworking-plugins-1.2.0-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8"
},
"product_reference": "containernetworking-plugins-1.2.0-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "containernetworking-plugins-1.2.0-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:containernetworking-plugins-1.2.0-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8"
},
"product_reference": "containernetworking-plugins-1.2.0-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "containernetworking-plugins-1.2.0-1.module+el8.8.0+21741+dd5be1e7.src.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:containernetworking-plugins-1.2.0-1.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8"
},
"product_reference": "containernetworking-plugins-1.2.0-1.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "containernetworking-plugins-1.2.0-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:containernetworking-plugins-1.2.0-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8"
},
"product_reference": "containernetworking-plugins-1.2.0-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "containernetworking-plugins-debuginfo-1.2.0-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:containernetworking-plugins-debuginfo-1.2.0-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8"
},
"product_reference": "containernetworking-plugins-debuginfo-1.2.0-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "containernetworking-plugins-debuginfo-1.2.0-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:containernetworking-plugins-debuginfo-1.2.0-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8"
},
"product_reference": "containernetworking-plugins-debuginfo-1.2.0-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "containernetworking-plugins-debuginfo-1.2.0-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:containernetworking-plugins-debuginfo-1.2.0-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8"
},
"product_reference": "containernetworking-plugins-debuginfo-1.2.0-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "containernetworking-plugins-debuginfo-1.2.0-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:containernetworking-plugins-debuginfo-1.2.0-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8"
},
"product_reference": "containernetworking-plugins-debuginfo-1.2.0-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "containernetworking-plugins-debugsource-1.2.0-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:containernetworking-plugins-debugsource-1.2.0-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8"
},
"product_reference": "containernetworking-plugins-debugsource-1.2.0-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "containernetworking-plugins-debugsource-1.2.0-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:containernetworking-plugins-debugsource-1.2.0-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8"
},
"product_reference": "containernetworking-plugins-debugsource-1.2.0-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "containernetworking-plugins-debugsource-1.2.0-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:containernetworking-plugins-debugsource-1.2.0-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8"
},
"product_reference": "containernetworking-plugins-debugsource-1.2.0-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "containernetworking-plugins-debugsource-1.2.0-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:containernetworking-plugins-debugsource-1.2.0-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8"
},
"product_reference": "containernetworking-plugins-debugsource-1.2.0-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "containers-common-1-65.module+el8.8.0+21741+dd5be1e7.aarch64.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:containers-common-1-65.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8"
},
"product_reference": "containers-common-1-65.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "containers-common-1-65.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:containers-common-1-65.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8"
},
"product_reference": "containers-common-1-65.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "containers-common-1-65.module+el8.8.0+21741+dd5be1e7.s390x.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:containers-common-1-65.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8"
},
"product_reference": "containers-common-1-65.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "containers-common-1-65.module+el8.8.0+21741+dd5be1e7.src.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:containers-common-1-65.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8"
},
"product_reference": "containers-common-1-65.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "containers-common-1-65.module+el8.8.0+21741+dd5be1e7.x86_64.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:containers-common-1-65.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8"
},
"product_reference": "containers-common-1-65.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "crit-3.15-4.module+el8.8.0+21741+dd5be1e7.aarch64.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:crit-3.15-4.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8"
},
"product_reference": "crit-3.15-4.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "crit-3.15-4.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:crit-3.15-4.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8"
},
"product_reference": "crit-3.15-4.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "crit-3.15-4.module+el8.8.0+21741+dd5be1e7.s390x.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:crit-3.15-4.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8"
},
"product_reference": "crit-3.15-4.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "crit-3.15-4.module+el8.8.0+21741+dd5be1e7.x86_64.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:crit-3.15-4.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8"
},
"product_reference": "crit-3.15-4.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "criu-3.15-4.module+el8.8.0+21741+dd5be1e7.aarch64.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:criu-3.15-4.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8"
},
"product_reference": "criu-3.15-4.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "criu-3.15-4.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:criu-3.15-4.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8"
},
"product_reference": "criu-3.15-4.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "criu-3.15-4.module+el8.8.0+21741+dd5be1e7.s390x.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:criu-3.15-4.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8"
},
"product_reference": "criu-3.15-4.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "criu-3.15-4.module+el8.8.0+21741+dd5be1e7.src.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:criu-3.15-4.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8"
},
"product_reference": "criu-3.15-4.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "criu-3.15-4.module+el8.8.0+21741+dd5be1e7.x86_64.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:criu-3.15-4.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8"
},
"product_reference": "criu-3.15-4.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "criu-debuginfo-3.15-4.module+el8.8.0+21741+dd5be1e7.aarch64.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:criu-debuginfo-3.15-4.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8"
},
"product_reference": "criu-debuginfo-3.15-4.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "criu-debuginfo-3.15-4.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:criu-debuginfo-3.15-4.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8"
},
"product_reference": "criu-debuginfo-3.15-4.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "criu-debuginfo-3.15-4.module+el8.8.0+21741+dd5be1e7.s390x.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:criu-debuginfo-3.15-4.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8"
},
"product_reference": "criu-debuginfo-3.15-4.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "criu-debuginfo-3.15-4.module+el8.8.0+21741+dd5be1e7.x86_64.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:criu-debuginfo-3.15-4.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8"
},
"product_reference": "criu-debuginfo-3.15-4.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "criu-debugsource-3.15-4.module+el8.8.0+21741+dd5be1e7.aarch64.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:criu-debugsource-3.15-4.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8"
},
"product_reference": "criu-debugsource-3.15-4.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "criu-debugsource-3.15-4.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:criu-debugsource-3.15-4.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8"
},
"product_reference": "criu-debugsource-3.15-4.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "criu-debugsource-3.15-4.module+el8.8.0+21741+dd5be1e7.s390x.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:criu-debugsource-3.15-4.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8"
},
"product_reference": "criu-debugsource-3.15-4.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "criu-debugsource-3.15-4.module+el8.8.0+21741+dd5be1e7.x86_64.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:criu-debugsource-3.15-4.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8"
},
"product_reference": "criu-debugsource-3.15-4.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "criu-devel-3.15-4.module+el8.8.0+21741+dd5be1e7.aarch64.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:criu-devel-3.15-4.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8"
},
"product_reference": "criu-devel-3.15-4.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "criu-devel-3.15-4.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:criu-devel-3.15-4.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8"
},
"product_reference": "criu-devel-3.15-4.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "criu-devel-3.15-4.module+el8.8.0+21741+dd5be1e7.s390x.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:criu-devel-3.15-4.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8"
},
"product_reference": "criu-devel-3.15-4.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "criu-devel-3.15-4.module+el8.8.0+21741+dd5be1e7.x86_64.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:criu-devel-3.15-4.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8"
},
"product_reference": "criu-devel-3.15-4.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "criu-libs-3.15-4.module+el8.8.0+21741+dd5be1e7.aarch64.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:criu-libs-3.15-4.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8"
},
"product_reference": "criu-libs-3.15-4.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "criu-libs-3.15-4.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:criu-libs-3.15-4.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8"
},
"product_reference": "criu-libs-3.15-4.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "criu-libs-3.15-4.module+el8.8.0+21741+dd5be1e7.s390x.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:criu-libs-3.15-4.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8"
},
"product_reference": "criu-libs-3.15-4.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "criu-libs-3.15-4.module+el8.8.0+21741+dd5be1e7.x86_64.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:criu-libs-3.15-4.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8"
},
"product_reference": "criu-libs-3.15-4.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "criu-libs-debuginfo-3.15-4.module+el8.8.0+21741+dd5be1e7.aarch64.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:criu-libs-debuginfo-3.15-4.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8"
},
"product_reference": "criu-libs-debuginfo-3.15-4.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "criu-libs-debuginfo-3.15-4.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:criu-libs-debuginfo-3.15-4.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8"
},
"product_reference": "criu-libs-debuginfo-3.15-4.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "criu-libs-debuginfo-3.15-4.module+el8.8.0+21741+dd5be1e7.s390x.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:criu-libs-debuginfo-3.15-4.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8"
},
"product_reference": "criu-libs-debuginfo-3.15-4.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "criu-libs-debuginfo-3.15-4.module+el8.8.0+21741+dd5be1e7.x86_64.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:criu-libs-debuginfo-3.15-4.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8"
},
"product_reference": "criu-libs-debuginfo-3.15-4.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "crun-1.8.4-2.module+el8.8.0+21741+dd5be1e7.aarch64.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:crun-1.8.4-2.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8"
},
"product_reference": "crun-1.8.4-2.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "crun-1.8.4-2.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:crun-1.8.4-2.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8"
},
"product_reference": "crun-1.8.4-2.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "crun-1.8.4-2.module+el8.8.0+21741+dd5be1e7.s390x.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:crun-1.8.4-2.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8"
},
"product_reference": "crun-1.8.4-2.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "crun-1.8.4-2.module+el8.8.0+21741+dd5be1e7.src.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:crun-1.8.4-2.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8"
},
"product_reference": "crun-1.8.4-2.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "crun-1.8.4-2.module+el8.8.0+21741+dd5be1e7.x86_64.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:crun-1.8.4-2.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8"
},
"product_reference": "crun-1.8.4-2.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "crun-debuginfo-1.8.4-2.module+el8.8.0+21741+dd5be1e7.aarch64.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:crun-debuginfo-1.8.4-2.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8"
},
"product_reference": "crun-debuginfo-1.8.4-2.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "crun-debuginfo-1.8.4-2.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:crun-debuginfo-1.8.4-2.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8"
},
"product_reference": "crun-debuginfo-1.8.4-2.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "crun-debuginfo-1.8.4-2.module+el8.8.0+21741+dd5be1e7.s390x.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:crun-debuginfo-1.8.4-2.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8"
},
"product_reference": "crun-debuginfo-1.8.4-2.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "crun-debuginfo-1.8.4-2.module+el8.8.0+21741+dd5be1e7.x86_64.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:crun-debuginfo-1.8.4-2.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8"
},
"product_reference": "crun-debuginfo-1.8.4-2.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "crun-debugsource-1.8.4-2.module+el8.8.0+21741+dd5be1e7.aarch64.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:crun-debugsource-1.8.4-2.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8"
},
"product_reference": "crun-debugsource-1.8.4-2.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "crun-debugsource-1.8.4-2.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:crun-debugsource-1.8.4-2.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8"
},
"product_reference": "crun-debugsource-1.8.4-2.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "crun-debugsource-1.8.4-2.module+el8.8.0+21741+dd5be1e7.s390x.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:crun-debugsource-1.8.4-2.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8"
},
"product_reference": "crun-debugsource-1.8.4-2.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "crun-debugsource-1.8.4-2.module+el8.8.0+21741+dd5be1e7.x86_64.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:crun-debugsource-1.8.4-2.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8"
},
"product_reference": "crun-debugsource-1.8.4-2.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fuse-overlayfs-1.11-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:fuse-overlayfs-1.11-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8"
},
"product_reference": "fuse-overlayfs-1.11-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fuse-overlayfs-1.11-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:fuse-overlayfs-1.11-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8"
},
"product_reference": "fuse-overlayfs-1.11-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fuse-overlayfs-1.11-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:fuse-overlayfs-1.11-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8"
},
"product_reference": "fuse-overlayfs-1.11-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fuse-overlayfs-1.11-1.module+el8.8.0+21741+dd5be1e7.src.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:fuse-overlayfs-1.11-1.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8"
},
"product_reference": "fuse-overlayfs-1.11-1.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fuse-overlayfs-1.11-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:fuse-overlayfs-1.11-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8"
},
"product_reference": "fuse-overlayfs-1.11-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fuse-overlayfs-debuginfo-1.11-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:fuse-overlayfs-debuginfo-1.11-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8"
},
"product_reference": "fuse-overlayfs-debuginfo-1.11-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fuse-overlayfs-debuginfo-1.11-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:fuse-overlayfs-debuginfo-1.11-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8"
},
"product_reference": "fuse-overlayfs-debuginfo-1.11-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fuse-overlayfs-debuginfo-1.11-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:fuse-overlayfs-debuginfo-1.11-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8"
},
"product_reference": "fuse-overlayfs-debuginfo-1.11-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fuse-overlayfs-debuginfo-1.11-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:fuse-overlayfs-debuginfo-1.11-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8"
},
"product_reference": "fuse-overlayfs-debuginfo-1.11-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fuse-overlayfs-debugsource-1.11-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:fuse-overlayfs-debugsource-1.11-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8"
},
"product_reference": "fuse-overlayfs-debugsource-1.11-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fuse-overlayfs-debugsource-1.11-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:fuse-overlayfs-debugsource-1.11-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8"
},
"product_reference": "fuse-overlayfs-debugsource-1.11-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fuse-overlayfs-debugsource-1.11-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:fuse-overlayfs-debugsource-1.11-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8"
},
"product_reference": "fuse-overlayfs-debugsource-1.11-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fuse-overlayfs-debugsource-1.11-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:fuse-overlayfs-debugsource-1.11-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8"
},
"product_reference": "fuse-overlayfs-debugsource-1.11-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libslirp-4.4.0-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:libslirp-4.4.0-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8"
},
"product_reference": "libslirp-4.4.0-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libslirp-4.4.0-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:libslirp-4.4.0-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8"
},
"product_reference": "libslirp-4.4.0-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libslirp-4.4.0-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:libslirp-4.4.0-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8"
},
"product_reference": "libslirp-4.4.0-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libslirp-4.4.0-1.module+el8.8.0+21741+dd5be1e7.src.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:libslirp-4.4.0-1.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8"
},
"product_reference": "libslirp-4.4.0-1.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libslirp-4.4.0-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:libslirp-4.4.0-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8"
},
"product_reference": "libslirp-4.4.0-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libslirp-debuginfo-4.4.0-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:libslirp-debuginfo-4.4.0-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8"
},
"product_reference": "libslirp-debuginfo-4.4.0-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libslirp-debuginfo-4.4.0-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:libslirp-debuginfo-4.4.0-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8"
},
"product_reference": "libslirp-debuginfo-4.4.0-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libslirp-debuginfo-4.4.0-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:libslirp-debuginfo-4.4.0-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8"
},
"product_reference": "libslirp-debuginfo-4.4.0-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libslirp-debuginfo-4.4.0-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:libslirp-debuginfo-4.4.0-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8"
},
"product_reference": "libslirp-debuginfo-4.4.0-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libslirp-debugsource-4.4.0-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:libslirp-debugsource-4.4.0-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8"
},
"product_reference": "libslirp-debugsource-4.4.0-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libslirp-debugsource-4.4.0-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:libslirp-debugsource-4.4.0-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8"
},
"product_reference": "libslirp-debugsource-4.4.0-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libslirp-debugsource-4.4.0-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:libslirp-debugsource-4.4.0-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8"
},
"product_reference": "libslirp-debugsource-4.4.0-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libslirp-debugsource-4.4.0-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:libslirp-debugsource-4.4.0-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8"
},
"product_reference": "libslirp-debugsource-4.4.0-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libslirp-devel-4.4.0-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:libslirp-devel-4.4.0-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8"
},
"product_reference": "libslirp-devel-4.4.0-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libslirp-devel-4.4.0-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:libslirp-devel-4.4.0-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8"
},
"product_reference": "libslirp-devel-4.4.0-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libslirp-devel-4.4.0-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:libslirp-devel-4.4.0-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8"
},
"product_reference": "libslirp-devel-4.4.0-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libslirp-devel-4.4.0-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:libslirp-devel-4.4.0-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8"
},
"product_reference": "libslirp-devel-4.4.0-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netavark-1.5.1-3.module+el8.8.0+21741+dd5be1e7.aarch64.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:netavark-1.5.1-3.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8"
},
"product_reference": "netavark-1.5.1-3.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netavark-1.5.1-3.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:netavark-1.5.1-3.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8"
},
"product_reference": "netavark-1.5.1-3.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netavark-1.5.1-3.module+el8.8.0+21741+dd5be1e7.s390x.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:netavark-1.5.1-3.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8"
},
"product_reference": "netavark-1.5.1-3.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netavark-1.5.1-3.module+el8.8.0+21741+dd5be1e7.src.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:netavark-1.5.1-3.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8"
},
"product_reference": "netavark-1.5.1-3.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netavark-1.5.1-3.module+el8.8.0+21741+dd5be1e7.x86_64.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:netavark-1.5.1-3.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8"
},
"product_reference": "netavark-1.5.1-3.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "oci-seccomp-bpf-hook-1.2.8-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:oci-seccomp-bpf-hook-1.2.8-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8"
},
"product_reference": "oci-seccomp-bpf-hook-1.2.8-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "oci-seccomp-bpf-hook-1.2.8-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:oci-seccomp-bpf-hook-1.2.8-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8"
},
"product_reference": "oci-seccomp-bpf-hook-1.2.8-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "oci-seccomp-bpf-hook-1.2.8-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:oci-seccomp-bpf-hook-1.2.8-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8"
},
"product_reference": "oci-seccomp-bpf-hook-1.2.8-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "oci-seccomp-bpf-hook-1.2.8-1.module+el8.8.0+21741+dd5be1e7.src.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:oci-seccomp-bpf-hook-1.2.8-1.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8"
},
"product_reference": "oci-seccomp-bpf-hook-1.2.8-1.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "oci-seccomp-bpf-hook-1.2.8-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:oci-seccomp-bpf-hook-1.2.8-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8"
},
"product_reference": "oci-seccomp-bpf-hook-1.2.8-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "oci-seccomp-bpf-hook-debuginfo-1.2.8-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:oci-seccomp-bpf-hook-debuginfo-1.2.8-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8"
},
"product_reference": "oci-seccomp-bpf-hook-debuginfo-1.2.8-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "oci-seccomp-bpf-hook-debuginfo-1.2.8-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:oci-seccomp-bpf-hook-debuginfo-1.2.8-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8"
},
"product_reference": "oci-seccomp-bpf-hook-debuginfo-1.2.8-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "oci-seccomp-bpf-hook-debuginfo-1.2.8-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:oci-seccomp-bpf-hook-debuginfo-1.2.8-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8"
},
"product_reference": "oci-seccomp-bpf-hook-debuginfo-1.2.8-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "oci-seccomp-bpf-hook-debuginfo-1.2.8-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:oci-seccomp-bpf-hook-debuginfo-1.2.8-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8"
},
"product_reference": "oci-seccomp-bpf-hook-debuginfo-1.2.8-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "oci-seccomp-bpf-hook-debugsource-1.2.8-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:oci-seccomp-bpf-hook-debugsource-1.2.8-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8"
},
"product_reference": "oci-seccomp-bpf-hook-debugsource-1.2.8-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "oci-seccomp-bpf-hook-debugsource-1.2.8-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:oci-seccomp-bpf-hook-debugsource-1.2.8-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8"
},
"product_reference": "oci-seccomp-bpf-hook-debugsource-1.2.8-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "oci-seccomp-bpf-hook-debugsource-1.2.8-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:oci-seccomp-bpf-hook-debugsource-1.2.8-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8"
},
"product_reference": "oci-seccomp-bpf-hook-debugsource-1.2.8-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "oci-seccomp-bpf-hook-debugsource-1.2.8-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:oci-seccomp-bpf-hook-debugsource-1.2.8-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8"
},
"product_reference": "oci-seccomp-bpf-hook-debugsource-1.2.8-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:podman-4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8"
},
"product_reference": "podman-4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:podman-4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8"
},
"product_reference": "podman-4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:podman-4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8"
},
"product_reference": "podman-4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-4.4.1-19.module+el8.8.0+21741+dd5be1e7.src.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:podman-4.4.1-19.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8"
},
"product_reference": "podman-4.4.1-19.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:podman-4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8"
},
"product_reference": "podman-4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-catatonit-4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:podman-catatonit-4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8"
},
"product_reference": "podman-catatonit-4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-catatonit-4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:podman-catatonit-4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8"
},
"product_reference": "podman-catatonit-4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-catatonit-4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:podman-catatonit-4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8"
},
"product_reference": "podman-catatonit-4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-catatonit-4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:podman-catatonit-4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8"
},
"product_reference": "podman-catatonit-4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-catatonit-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:podman-catatonit-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8"
},
"product_reference": "podman-catatonit-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-catatonit-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:podman-catatonit-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8"
},
"product_reference": "podman-catatonit-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-catatonit-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:podman-catatonit-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8"
},
"product_reference": "podman-catatonit-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-catatonit-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:podman-catatonit-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8"
},
"product_reference": "podman-catatonit-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:podman-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8"
},
"product_reference": "podman-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:podman-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8"
},
"product_reference": "podman-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:podman-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8"
},
"product_reference": "podman-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:podman-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8"
},
"product_reference": "podman-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-debugsource-4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:podman-debugsource-4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8"
},
"product_reference": "podman-debugsource-4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-debugsource-4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:podman-debugsource-4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8"
},
"product_reference": "podman-debugsource-4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-debugsource-4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:podman-debugsource-4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8"
},
"product_reference": "podman-debugsource-4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-debugsource-4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:podman-debugsource-4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8"
},
"product_reference": "podman-debugsource-4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-docker-4.4.1-19.module+el8.8.0+21741+dd5be1e7.noarch.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:podman-docker-4.4.1-19.module+el8.8.0+21741+dd5be1e7.noarch.rpm-container-tools:rhel8"
},
"product_reference": "podman-docker-4.4.1-19.module+el8.8.0+21741+dd5be1e7.noarch.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-gvproxy-4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:podman-gvproxy-4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8"
},
"product_reference": "podman-gvproxy-4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-gvproxy-4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:podman-gvproxy-4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8"
},
"product_reference": "podman-gvproxy-4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-gvproxy-4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:podman-gvproxy-4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8"
},
"product_reference": "podman-gvproxy-4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-gvproxy-4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:podman-gvproxy-4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8"
},
"product_reference": "podman-gvproxy-4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-gvproxy-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:podman-gvproxy-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8"
},
"product_reference": "podman-gvproxy-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-gvproxy-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:podman-gvproxy-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8"
},
"product_reference": "podman-gvproxy-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-gvproxy-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:podman-gvproxy-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8"
},
"product_reference": "podman-gvproxy-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-gvproxy-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:podman-gvproxy-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8"
},
"product_reference": "podman-gvproxy-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-plugins-4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:podman-plugins-4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8"
},
"product_reference": "podman-plugins-4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-plugins-4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:podman-plugins-4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8"
},
"product_reference": "podman-plugins-4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-plugins-4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:podman-plugins-4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8"
},
"product_reference": "podman-plugins-4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-plugins-4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:podman-plugins-4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8"
},
"product_reference": "podman-plugins-4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-plugins-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:podman-plugins-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8"
},
"product_reference": "podman-plugins-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-plugins-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:podman-plugins-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8"
},
"product_reference": "podman-plugins-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-plugins-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:podman-plugins-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8"
},
"product_reference": "podman-plugins-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-plugins-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:podman-plugins-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8"
},
"product_reference": "podman-plugins-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-remote-4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:podman-remote-4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8"
},
"product_reference": "podman-remote-4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-remote-4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:podman-remote-4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8"
},
"product_reference": "podman-remote-4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-remote-4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:podman-remote-4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8"
},
"product_reference": "podman-remote-4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-remote-4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:podman-remote-4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8"
},
"product_reference": "podman-remote-4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-remote-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:podman-remote-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8"
},
"product_reference": "podman-remote-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-remote-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:podman-remote-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8"
},
"product_reference": "podman-remote-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-remote-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:podman-remote-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8"
},
"product_reference": "podman-remote-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-remote-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:podman-remote-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8"
},
"product_reference": "podman-remote-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-tests-4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:podman-tests-4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8"
},
"product_reference": "podman-tests-4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-tests-4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:podman-tests-4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8"
},
"product_reference": "podman-tests-4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-tests-4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:podman-tests-4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8"
},
"product_reference": "podman-tests-4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-tests-4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:podman-tests-4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8"
},
"product_reference": "podman-tests-4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-podman-4.4.1-1.module+el8.8.0+21741+dd5be1e7.src.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:python-podman-4.4.1-1.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8"
},
"product_reference": "python-podman-4.4.1-1.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-criu-3.15-4.module+el8.8.0+21741+dd5be1e7.aarch64.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:python3-criu-3.15-4.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8"
},
"product_reference": "python3-criu-3.15-4.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-criu-3.15-4.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:python3-criu-3.15-4.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8"
},
"product_reference": "python3-criu-3.15-4.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-criu-3.15-4.module+el8.8.0+21741+dd5be1e7.s390x.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:python3-criu-3.15-4.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8"
},
"product_reference": "python3-criu-3.15-4.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-criu-3.15-4.module+el8.8.0+21741+dd5be1e7.x86_64.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:python3-criu-3.15-4.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8"
},
"product_reference": "python3-criu-3.15-4.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-podman-4.4.1-1.module+el8.8.0+21741+dd5be1e7.noarch.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:python3-podman-4.4.1-1.module+el8.8.0+21741+dd5be1e7.noarch.rpm-container-tools:rhel8"
},
"product_reference": "python3-podman-4.4.1-1.module+el8.8.0+21741+dd5be1e7.noarch.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "runc-1.1.12-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:runc-1.1.12-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8"
},
"product_reference": "runc-1.1.12-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "runc-1.1.12-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:runc-1.1.12-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8"
},
"product_reference": "runc-1.1.12-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "runc-1.1.12-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:runc-1.1.12-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8"
},
"product_reference": "runc-1.1.12-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "runc-1.1.12-1.module+el8.8.0+21741+dd5be1e7.src.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:runc-1.1.12-1.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8"
},
"product_reference": "runc-1.1.12-1.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "runc-1.1.12-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:runc-1.1.12-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8"
},
"product_reference": "runc-1.1.12-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "runc-debuginfo-1.1.12-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:runc-debuginfo-1.1.12-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8"
},
"product_reference": "runc-debuginfo-1.1.12-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "runc-debuginfo-1.1.12-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:runc-debuginfo-1.1.12-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8"
},
"product_reference": "runc-debuginfo-1.1.12-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "runc-debuginfo-1.1.12-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:runc-debuginfo-1.1.12-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8"
},
"product_reference": "runc-debuginfo-1.1.12-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "runc-debuginfo-1.1.12-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:runc-debuginfo-1.1.12-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8"
},
"product_reference": "runc-debuginfo-1.1.12-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "runc-debugsource-1.1.12-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:runc-debugsource-1.1.12-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8"
},
"product_reference": "runc-debugsource-1.1.12-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "runc-debugsource-1.1.12-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:runc-debugsource-1.1.12-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8"
},
"product_reference": "runc-debugsource-1.1.12-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "runc-debugsource-1.1.12-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:runc-debugsource-1.1.12-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8"
},
"product_reference": "runc-debugsource-1.1.12-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "runc-debugsource-1.1.12-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:runc-debugsource-1.1.12-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8"
},
"product_reference": "runc-debugsource-1.1.12-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "skopeo-1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.aarch64.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:skopeo-1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8"
},
"product_reference": "skopeo-1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "skopeo-1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:skopeo-1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8"
},
"product_reference": "skopeo-1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "skopeo-1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.s390x.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:skopeo-1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8"
},
"product_reference": "skopeo-1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "skopeo-1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.src.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:skopeo-1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8"
},
"product_reference": "skopeo-1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "skopeo-1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.x86_64.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:skopeo-1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8"
},
"product_reference": "skopeo-1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "skopeo-tests-1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.aarch64.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:skopeo-tests-1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8"
},
"product_reference": "skopeo-tests-1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "skopeo-tests-1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:skopeo-tests-1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8"
},
"product_reference": "skopeo-tests-1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "skopeo-tests-1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.s390x.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:skopeo-tests-1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8"
},
"product_reference": "skopeo-tests-1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "skopeo-tests-1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.x86_64.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:skopeo-tests-1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8"
},
"product_reference": "skopeo-tests-1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "slirp4netns-1.2.0-3.module+el8.8.0+21741+dd5be1e7.aarch64.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:slirp4netns-1.2.0-3.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8"
},
"product_reference": "slirp4netns-1.2.0-3.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "slirp4netns-1.2.0-3.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:slirp4netns-1.2.0-3.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8"
},
"product_reference": "slirp4netns-1.2.0-3.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "slirp4netns-1.2.0-3.module+el8.8.0+21741+dd5be1e7.s390x.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:slirp4netns-1.2.0-3.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8"
},
"product_reference": "slirp4netns-1.2.0-3.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "slirp4netns-1.2.0-3.module+el8.8.0+21741+dd5be1e7.src.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:slirp4netns-1.2.0-3.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8"
},
"product_reference": "slirp4netns-1.2.0-3.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "slirp4netns-1.2.0-3.module+el8.8.0+21741+dd5be1e7.x86_64.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:slirp4netns-1.2.0-3.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8"
},
"product_reference": "slirp4netns-1.2.0-3.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "slirp4netns-debuginfo-1.2.0-3.module+el8.8.0+21741+dd5be1e7.aarch64.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:slirp4netns-debuginfo-1.2.0-3.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8"
},
"product_reference": "slirp4netns-debuginfo-1.2.0-3.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "slirp4netns-debuginfo-1.2.0-3.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:slirp4netns-debuginfo-1.2.0-3.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8"
},
"product_reference": "slirp4netns-debuginfo-1.2.0-3.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "slirp4netns-debuginfo-1.2.0-3.module+el8.8.0+21741+dd5be1e7.s390x.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:slirp4netns-debuginfo-1.2.0-3.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8"
},
"product_reference": "slirp4netns-debuginfo-1.2.0-3.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "slirp4netns-debuginfo-1.2.0-3.module+el8.8.0+21741+dd5be1e7.x86_64.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:slirp4netns-debuginfo-1.2.0-3.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8"
},
"product_reference": "slirp4netns-debuginfo-1.2.0-3.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "slirp4netns-debugsource-1.2.0-3.module+el8.8.0+21741+dd5be1e7.aarch64.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:slirp4netns-debugsource-1.2.0-3.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8"
},
"product_reference": "slirp4netns-debugsource-1.2.0-3.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "slirp4netns-debugsource-1.2.0-3.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:slirp4netns-debugsource-1.2.0-3.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8"
},
"product_reference": "slirp4netns-debugsource-1.2.0-3.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "slirp4netns-debugsource-1.2.0-3.module+el8.8.0+21741+dd5be1e7.s390x.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:slirp4netns-debugsource-1.2.0-3.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8"
},
"product_reference": "slirp4netns-debugsource-1.2.0-3.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "slirp4netns-debugsource-1.2.0-3.module+el8.8.0+21741+dd5be1e7.x86_64.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:slirp4netns-debugsource-1.2.0-3.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8"
},
"product_reference": "slirp4netns-debugsource-1.2.0-3.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "toolbox-0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.aarch64.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:toolbox-0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8"
},
"product_reference": "toolbox-0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "toolbox-0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:toolbox-0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8"
},
"product_reference": "toolbox-0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "toolbox-0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.s390x.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:toolbox-0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8"
},
"product_reference": "toolbox-0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "toolbox-0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.src.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:toolbox-0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8"
},
"product_reference": "toolbox-0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "toolbox-0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.x86_64.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:toolbox-0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8"
},
"product_reference": "toolbox-0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "toolbox-debuginfo-0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.aarch64.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:toolbox-debuginfo-0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8"
},
"product_reference": "toolbox-debuginfo-0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "toolbox-debuginfo-0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:toolbox-debuginfo-0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8"
},
"product_reference": "toolbox-debuginfo-0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "toolbox-debuginfo-0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.s390x.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:toolbox-debuginfo-0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8"
},
"product_reference": "toolbox-debuginfo-0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "toolbox-debuginfo-0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.x86_64.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:toolbox-debuginfo-0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8"
},
"product_reference": "toolbox-debuginfo-0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "toolbox-debugsource-0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.aarch64.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:toolbox-debugsource-0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8"
},
"product_reference": "toolbox-debugsource-0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "toolbox-debugsource-0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:toolbox-debugsource-0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8"
},
"product_reference": "toolbox-debugsource-0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "toolbox-debugsource-0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.s390x.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:toolbox-debugsource-0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8"
},
"product_reference": "toolbox-debugsource-0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "toolbox-debugsource-0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.x86_64.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:toolbox-debugsource-0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8"
},
"product_reference": "toolbox-debugsource-0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "toolbox-tests-0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.aarch64.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:toolbox-tests-0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8"
},
"product_reference": "toolbox-tests-0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "toolbox-tests-0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:toolbox-tests-0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8"
},
"product_reference": "toolbox-tests-0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "toolbox-tests-0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.s390x.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:toolbox-tests-0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8"
},
"product_reference": "toolbox-tests-0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "toolbox-tests-0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.x86_64.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:toolbox-tests-0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8"
},
"product_reference": "toolbox-tests-0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "udica-0.2.6-20.module+el8.8.0+21741+dd5be1e7.noarch.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:udica-0.2.6-20.module+el8.8.0+21741+dd5be1e7.noarch.rpm-container-tools:rhel8"
},
"product_reference": "udica-0.2.6-20.module+el8.8.0+21741+dd5be1e7.noarch.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "udica-0.2.6-20.module+el8.8.0+21741+dd5be1e7.src.rpm (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:udica-0.2.6-20.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8"
},
"product_reference": "udica-0.2.6-20.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Erik Sj\u00f6lund"
],
"organization": "Upstream"
}
],
"cve": "CVE-2022-4122",
"cwe": {
"id": "CWE-59",
"name": "Improper Link Resolution Before File Access (\u0027Link Following\u0027)"
},
"discovery_date": "2022-11-22T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2144983"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in buildah and podman. Incorrect following of symlinks while reading .containerignore and .dockerignore results in information disclosure.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "podman: Symlink error leads to information disclosure",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "These bugs come about when \"podman --remote build ...\" is run, thus affecting buildah, but the bug itself needs to be fixed in podman, and ported to Buildah.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.8.0.Z.EUS:aardvark-dns-1.5.0-2.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:aardvark-dns-1.5.0-2.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:aardvark-dns-1.5.0-2.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:aardvark-dns-1.5.0-2.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:aardvark-dns-1.5.0-2.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:buildah-1.29.3-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:buildah-1.29.3-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:buildah-1.29.3-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:buildah-1.29.3-1.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:buildah-1.29.3-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:buildah-debuginfo-1.29.3-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:buildah-debuginfo-1.29.3-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:buildah-debuginfo-1.29.3-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:buildah-debuginfo-1.29.3-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:buildah-debugsource-1.29.3-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:buildah-debugsource-1.29.3-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:buildah-debugsource-1.29.3-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:buildah-debugsource-1.29.3-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:buildah-tests-1.29.3-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:buildah-tests-1.29.3-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:buildah-tests-1.29.3-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:buildah-tests-1.29.3-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:buildah-tests-debuginfo-1.29.3-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:buildah-tests-debuginfo-1.29.3-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:buildah-tests-debuginfo-1.29.3-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:buildah-tests-debuginfo-1.29.3-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:cockpit-podman-63.1-1.module+el8.8.0+21741+dd5be1e7.noarch.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:cockpit-podman-63.1-1.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:conmon-2.1.6-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:conmon-2.1.6-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:conmon-2.1.6-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:conmon-2.1.6-1.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:conmon-2.1.6-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:conmon-debuginfo-2.1.6-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:conmon-debuginfo-2.1.6-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:conmon-debuginfo-2.1.6-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:conmon-debuginfo-2.1.6-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:conmon-debugsource-2.1.6-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:conmon-debugsource-2.1.6-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:conmon-debugsource-2.1.6-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:conmon-debugsource-2.1.6-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:container-selinux-2.229.0-1.module+el8.8.0+21741+dd5be1e7.noarch.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:container-selinux-2.229.0-1.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:containernetworking-plugins-1.2.0-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:containernetworking-plugins-1.2.0-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:containernetworking-plugins-1.2.0-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:containernetworking-plugins-1.2.0-1.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:containernetworking-plugins-1.2.0-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:containernetworking-plugins-debuginfo-1.2.0-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:containernetworking-plugins-debuginfo-1.2.0-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:containernetworking-plugins-debuginfo-1.2.0-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:containernetworking-plugins-debuginfo-1.2.0-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:containernetworking-plugins-debugsource-1.2.0-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:containernetworking-plugins-debugsource-1.2.0-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:containernetworking-plugins-debugsource-1.2.0-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:containernetworking-plugins-debugsource-1.2.0-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:containers-common-1-65.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:containers-common-1-65.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:containers-common-1-65.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:containers-common-1-65.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:containers-common-1-65.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:crit-3.15-4.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:crit-3.15-4.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:crit-3.15-4.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:crit-3.15-4.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:criu-3.15-4.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:criu-3.15-4.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:criu-3.15-4.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:criu-3.15-4.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:criu-3.15-4.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:criu-debuginfo-3.15-4.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:criu-debuginfo-3.15-4.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:criu-debuginfo-3.15-4.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:criu-debuginfo-3.15-4.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:criu-debugsource-3.15-4.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:criu-debugsource-3.15-4.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:criu-debugsource-3.15-4.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:criu-debugsource-3.15-4.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:criu-devel-3.15-4.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:criu-devel-3.15-4.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:criu-devel-3.15-4.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:criu-devel-3.15-4.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:criu-libs-3.15-4.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:criu-libs-3.15-4.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:criu-libs-3.15-4.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:criu-libs-3.15-4.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:criu-libs-debuginfo-3.15-4.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:criu-libs-debuginfo-3.15-4.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:criu-libs-debuginfo-3.15-4.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:criu-libs-debuginfo-3.15-4.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:crun-1.8.4-2.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:crun-1.8.4-2.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:crun-1.8.4-2.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:crun-1.8.4-2.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:crun-1.8.4-2.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:crun-debuginfo-1.8.4-2.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:crun-debuginfo-1.8.4-2.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:crun-debuginfo-1.8.4-2.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:crun-debuginfo-1.8.4-2.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:crun-debugsource-1.8.4-2.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:crun-debugsource-1.8.4-2.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:crun-debugsource-1.8.4-2.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:crun-debugsource-1.8.4-2.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:fuse-overlayfs-1.11-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:fuse-overlayfs-1.11-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:fuse-overlayfs-1.11-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:fuse-overlayfs-1.11-1.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:fuse-overlayfs-1.11-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:fuse-overlayfs-debuginfo-1.11-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:fuse-overlayfs-debuginfo-1.11-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:fuse-overlayfs-debuginfo-1.11-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:fuse-overlayfs-debuginfo-1.11-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:fuse-overlayfs-debugsource-1.11-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:fuse-overlayfs-debugsource-1.11-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:fuse-overlayfs-debugsource-1.11-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:fuse-overlayfs-debugsource-1.11-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:libslirp-4.4.0-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:libslirp-4.4.0-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:libslirp-4.4.0-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:libslirp-4.4.0-1.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:libslirp-4.4.0-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:libslirp-debuginfo-4.4.0-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:libslirp-debuginfo-4.4.0-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:libslirp-debuginfo-4.4.0-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:libslirp-debuginfo-4.4.0-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:libslirp-debugsource-4.4.0-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:libslirp-debugsource-4.4.0-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:libslirp-debugsource-4.4.0-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:libslirp-debugsource-4.4.0-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:libslirp-devel-4.4.0-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:libslirp-devel-4.4.0-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:libslirp-devel-4.4.0-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:libslirp-devel-4.4.0-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:netavark-1.5.1-3.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:netavark-1.5.1-3.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:netavark-1.5.1-3.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:netavark-1.5.1-3.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:netavark-1.5.1-3.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:oci-seccomp-bpf-hook-1.2.8-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:oci-seccomp-bpf-hook-1.2.8-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:oci-seccomp-bpf-hook-1.2.8-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:oci-seccomp-bpf-hook-1.2.8-1.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:oci-seccomp-bpf-hook-1.2.8-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:oci-seccomp-bpf-hook-debuginfo-1.2.8-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:oci-seccomp-bpf-hook-debuginfo-1.2.8-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:oci-seccomp-bpf-hook-debuginfo-1.2.8-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:oci-seccomp-bpf-hook-debuginfo-1.2.8-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:oci-seccomp-bpf-hook-debugsource-1.2.8-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:oci-seccomp-bpf-hook-debugsource-1.2.8-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:oci-seccomp-bpf-hook-debugsource-1.2.8-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:oci-seccomp-bpf-hook-debugsource-1.2.8-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-4.4.1-19.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-catatonit-4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-catatonit-4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-catatonit-4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-catatonit-4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-catatonit-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-catatonit-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-catatonit-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-catatonit-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-debugsource-4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-debugsource-4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-debugsource-4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-debugsource-4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-docker-4.4.1-19.module+el8.8.0+21741+dd5be1e7.noarch.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-gvproxy-4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-gvproxy-4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-gvproxy-4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-gvproxy-4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-gvproxy-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-gvproxy-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-gvproxy-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-gvproxy-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-plugins-4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-plugins-4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-plugins-4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-plugins-4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-plugins-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-plugins-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-plugins-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-plugins-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-remote-4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-remote-4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-remote-4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-remote-4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-remote-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-remote-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-remote-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-remote-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-tests-4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-tests-4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-tests-4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-tests-4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:python-podman-4.4.1-1.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:python3-criu-3.15-4.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:python3-criu-3.15-4.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:python3-criu-3.15-4.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:python3-criu-3.15-4.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:python3-podman-4.4.1-1.module+el8.8.0+21741+dd5be1e7.noarch.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:runc-1.1.12-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:runc-1.1.12-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:runc-1.1.12-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:runc-1.1.12-1.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:runc-1.1.12-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:runc-debuginfo-1.1.12-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:runc-debuginfo-1.1.12-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:runc-debuginfo-1.1.12-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:runc-debuginfo-1.1.12-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:runc-debugsource-1.1.12-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:runc-debugsource-1.1.12-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:runc-debugsource-1.1.12-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:runc-debugsource-1.1.12-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:skopeo-1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:skopeo-1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:skopeo-1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:skopeo-1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:skopeo-1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:skopeo-tests-1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:skopeo-tests-1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:skopeo-tests-1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:skopeo-tests-1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:slirp4netns-1.2.0-3.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:slirp4netns-1.2.0-3.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:slirp4netns-1.2.0-3.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:slirp4netns-1.2.0-3.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:slirp4netns-1.2.0-3.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:slirp4netns-debuginfo-1.2.0-3.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:slirp4netns-debuginfo-1.2.0-3.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:slirp4netns-debuginfo-1.2.0-3.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:slirp4netns-debuginfo-1.2.0-3.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:slirp4netns-debugsource-1.2.0-3.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:slirp4netns-debugsource-1.2.0-3.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:slirp4netns-debugsource-1.2.0-3.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:slirp4netns-debugsource-1.2.0-3.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:toolbox-0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:toolbox-0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:toolbox-0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:toolbox-0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:toolbox-0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:toolbox-debuginfo-0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:toolbox-debuginfo-0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:toolbox-debuginfo-0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:toolbox-debuginfo-0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:toolbox-debugsource-0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:toolbox-debugsource-0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:toolbox-debugsource-0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:toolbox-debugsource-0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:toolbox-tests-0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:toolbox-tests-0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:toolbox-tests-0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:toolbox-tests-0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:udica-0.2.6-20.module+el8.8.0+21741+dd5be1e7.noarch.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:udica-0.2.6-20.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-4122"
},
{
"category": "external",
"summary": "RHBZ#2144983",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2144983"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-4122",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4122"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-4122",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-4122"
},
{
"category": "external",
"summary": "https://github.com/containers/podman/pull/16315",
"url": "https://github.com/containers/podman/pull/16315"
}
],
"release_date": "2022-11-22T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-04-29T12:00:29+00:00",
"details": "For details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.8.0.Z.EUS:aardvark-dns-1.5.0-2.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:aardvark-dns-1.5.0-2.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:aardvark-dns-1.5.0-2.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:aardvark-dns-1.5.0-2.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:aardvark-dns-1.5.0-2.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:buildah-1.29.3-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:buildah-1.29.3-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:buildah-1.29.3-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:buildah-1.29.3-1.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:buildah-1.29.3-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:buildah-debuginfo-1.29.3-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:buildah-debuginfo-1.29.3-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:buildah-debuginfo-1.29.3-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:buildah-debuginfo-1.29.3-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:buildah-debugsource-1.29.3-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:buildah-debugsource-1.29.3-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:buildah-debugsource-1.29.3-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:buildah-debugsource-1.29.3-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:buildah-tests-1.29.3-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:buildah-tests-1.29.3-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:buildah-tests-1.29.3-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:buildah-tests-1.29.3-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:buildah-tests-debuginfo-1.29.3-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:buildah-tests-debuginfo-1.29.3-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:buildah-tests-debuginfo-1.29.3-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:buildah-tests-debuginfo-1.29.3-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:cockpit-podman-63.1-1.module+el8.8.0+21741+dd5be1e7.noarch.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:cockpit-podman-63.1-1.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:conmon-2.1.6-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:conmon-2.1.6-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:conmon-2.1.6-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:conmon-2.1.6-1.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:conmon-2.1.6-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:conmon-debuginfo-2.1.6-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:conmon-debuginfo-2.1.6-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:conmon-debuginfo-2.1.6-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:conmon-debuginfo-2.1.6-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:conmon-debugsource-2.1.6-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:conmon-debugsource-2.1.6-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:conmon-debugsource-2.1.6-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:conmon-debugsource-2.1.6-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:container-selinux-2.229.0-1.module+el8.8.0+21741+dd5be1e7.noarch.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:container-selinux-2.229.0-1.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:containernetworking-plugins-1.2.0-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:containernetworking-plugins-1.2.0-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:containernetworking-plugins-1.2.0-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:containernetworking-plugins-1.2.0-1.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:containernetworking-plugins-1.2.0-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:containernetworking-plugins-debuginfo-1.2.0-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:containernetworking-plugins-debuginfo-1.2.0-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:containernetworking-plugins-debuginfo-1.2.0-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:containernetworking-plugins-debuginfo-1.2.0-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:containernetworking-plugins-debugsource-1.2.0-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:containernetworking-plugins-debugsource-1.2.0-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:containernetworking-plugins-debugsource-1.2.0-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:containernetworking-plugins-debugsource-1.2.0-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:containers-common-1-65.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:containers-common-1-65.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:containers-common-1-65.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:containers-common-1-65.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:containers-common-1-65.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:crit-3.15-4.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:crit-3.15-4.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:crit-3.15-4.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:crit-3.15-4.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:criu-3.15-4.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:criu-3.15-4.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:criu-3.15-4.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:criu-3.15-4.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:criu-3.15-4.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:criu-debuginfo-3.15-4.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:criu-debuginfo-3.15-4.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:criu-debuginfo-3.15-4.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:criu-debuginfo-3.15-4.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:criu-debugsource-3.15-4.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:criu-debugsource-3.15-4.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:criu-debugsource-3.15-4.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:criu-debugsource-3.15-4.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:criu-devel-3.15-4.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:criu-devel-3.15-4.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:criu-devel-3.15-4.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:criu-devel-3.15-4.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:criu-libs-3.15-4.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:criu-libs-3.15-4.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:criu-libs-3.15-4.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:criu-libs-3.15-4.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:criu-libs-debuginfo-3.15-4.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:criu-libs-debuginfo-3.15-4.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:criu-libs-debuginfo-3.15-4.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:criu-libs-debuginfo-3.15-4.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:crun-1.8.4-2.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:crun-1.8.4-2.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:crun-1.8.4-2.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:crun-1.8.4-2.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:crun-1.8.4-2.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:crun-debuginfo-1.8.4-2.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:crun-debuginfo-1.8.4-2.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:crun-debuginfo-1.8.4-2.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:crun-debuginfo-1.8.4-2.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:crun-debugsource-1.8.4-2.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:crun-debugsource-1.8.4-2.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:crun-debugsource-1.8.4-2.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:crun-debugsource-1.8.4-2.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:fuse-overlayfs-1.11-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:fuse-overlayfs-1.11-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:fuse-overlayfs-1.11-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:fuse-overlayfs-1.11-1.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:fuse-overlayfs-1.11-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:fuse-overlayfs-debuginfo-1.11-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:fuse-overlayfs-debuginfo-1.11-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:fuse-overlayfs-debuginfo-1.11-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:fuse-overlayfs-debuginfo-1.11-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:fuse-overlayfs-debugsource-1.11-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:fuse-overlayfs-debugsource-1.11-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:fuse-overlayfs-debugsource-1.11-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:fuse-overlayfs-debugsource-1.11-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:libslirp-4.4.0-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:libslirp-4.4.0-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:libslirp-4.4.0-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:libslirp-4.4.0-1.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:libslirp-4.4.0-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:libslirp-debuginfo-4.4.0-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:libslirp-debuginfo-4.4.0-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:libslirp-debuginfo-4.4.0-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:libslirp-debuginfo-4.4.0-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:libslirp-debugsource-4.4.0-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:libslirp-debugsource-4.4.0-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:libslirp-debugsource-4.4.0-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:libslirp-debugsource-4.4.0-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:libslirp-devel-4.4.0-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:libslirp-devel-4.4.0-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:libslirp-devel-4.4.0-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:libslirp-devel-4.4.0-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:netavark-1.5.1-3.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:netavark-1.5.1-3.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:netavark-1.5.1-3.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:netavark-1.5.1-3.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:netavark-1.5.1-3.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:oci-seccomp-bpf-hook-1.2.8-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:oci-seccomp-bpf-hook-1.2.8-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:oci-seccomp-bpf-hook-1.2.8-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:oci-seccomp-bpf-hook-1.2.8-1.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:oci-seccomp-bpf-hook-1.2.8-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:oci-seccomp-bpf-hook-debuginfo-1.2.8-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:oci-seccomp-bpf-hook-debuginfo-1.2.8-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:oci-seccomp-bpf-hook-debuginfo-1.2.8-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:oci-seccomp-bpf-hook-debuginfo-1.2.8-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:oci-seccomp-bpf-hook-debugsource-1.2.8-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:oci-seccomp-bpf-hook-debugsource-1.2.8-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:oci-seccomp-bpf-hook-debugsource-1.2.8-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:oci-seccomp-bpf-hook-debugsource-1.2.8-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-4.4.1-19.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-catatonit-4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-catatonit-4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-catatonit-4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-catatonit-4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-catatonit-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-catatonit-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-catatonit-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-catatonit-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-debugsource-4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-debugsource-4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-debugsource-4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-debugsource-4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-docker-4.4.1-19.module+el8.8.0+21741+dd5be1e7.noarch.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-gvproxy-4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-gvproxy-4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-gvproxy-4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-gvproxy-4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-gvproxy-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-gvproxy-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-gvproxy-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-gvproxy-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-plugins-4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-plugins-4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-plugins-4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-plugins-4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-plugins-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-plugins-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-plugins-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-plugins-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-remote-4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-remote-4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-remote-4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-remote-4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-remote-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-remote-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-remote-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-remote-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-tests-4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-tests-4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-tests-4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-tests-4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:python-podman-4.4.1-1.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:python3-criu-3.15-4.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:python3-criu-3.15-4.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:python3-criu-3.15-4.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:python3-criu-3.15-4.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:python3-podman-4.4.1-1.module+el8.8.0+21741+dd5be1e7.noarch.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:runc-1.1.12-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:runc-1.1.12-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:runc-1.1.12-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:runc-1.1.12-1.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:runc-1.1.12-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:runc-debuginfo-1.1.12-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:runc-debuginfo-1.1.12-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:runc-debuginfo-1.1.12-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:runc-debuginfo-1.1.12-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:runc-debugsource-1.1.12-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:runc-debugsource-1.1.12-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:runc-debugsource-1.1.12-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:runc-debugsource-1.1.12-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:skopeo-1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:skopeo-1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:skopeo-1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:skopeo-1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:skopeo-1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:skopeo-tests-1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:skopeo-tests-1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:skopeo-tests-1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:skopeo-tests-1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:slirp4netns-1.2.0-3.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:slirp4netns-1.2.0-3.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:slirp4netns-1.2.0-3.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:slirp4netns-1.2.0-3.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:slirp4netns-1.2.0-3.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:slirp4netns-debuginfo-1.2.0-3.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:slirp4netns-debuginfo-1.2.0-3.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:slirp4netns-debuginfo-1.2.0-3.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:slirp4netns-debuginfo-1.2.0-3.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:slirp4netns-debugsource-1.2.0-3.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:slirp4netns-debugsource-1.2.0-3.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:slirp4netns-debugsource-1.2.0-3.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:slirp4netns-debugsource-1.2.0-3.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:toolbox-0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:toolbox-0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:toolbox-0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:toolbox-0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:toolbox-0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:toolbox-debuginfo-0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:toolbox-debuginfo-0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:toolbox-debuginfo-0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:toolbox-debuginfo-0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:toolbox-debugsource-0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:toolbox-debugsource-0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:toolbox-debugsource-0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:toolbox-debugsource-0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:toolbox-tests-0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:toolbox-tests-0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:toolbox-tests-0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:toolbox-tests-0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:udica-0.2.6-20.module+el8.8.0+21741+dd5be1e7.noarch.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:udica-0.2.6-20.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:2077"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"AppStream-8.8.0.Z.EUS:aardvark-dns-1.5.0-2.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:aardvark-dns-1.5.0-2.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:aardvark-dns-1.5.0-2.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:aardvark-dns-1.5.0-2.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:aardvark-dns-1.5.0-2.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:buildah-1.29.3-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:buildah-1.29.3-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:buildah-1.29.3-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:buildah-1.29.3-1.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:buildah-1.29.3-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:buildah-debuginfo-1.29.3-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:buildah-debuginfo-1.29.3-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:buildah-debuginfo-1.29.3-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:buildah-debuginfo-1.29.3-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:buildah-debugsource-1.29.3-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:buildah-debugsource-1.29.3-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:buildah-debugsource-1.29.3-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:buildah-debugsource-1.29.3-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:buildah-tests-1.29.3-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:buildah-tests-1.29.3-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:buildah-tests-1.29.3-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:buildah-tests-1.29.3-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:buildah-tests-debuginfo-1.29.3-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:buildah-tests-debuginfo-1.29.3-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:buildah-tests-debuginfo-1.29.3-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:buildah-tests-debuginfo-1.29.3-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:cockpit-podman-63.1-1.module+el8.8.0+21741+dd5be1e7.noarch.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:cockpit-podman-63.1-1.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:conmon-2.1.6-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:conmon-2.1.6-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:conmon-2.1.6-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:conmon-2.1.6-1.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:conmon-2.1.6-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:conmon-debuginfo-2.1.6-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:conmon-debuginfo-2.1.6-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:conmon-debuginfo-2.1.6-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:conmon-debuginfo-2.1.6-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:conmon-debugsource-2.1.6-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:conmon-debugsource-2.1.6-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:conmon-debugsource-2.1.6-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:conmon-debugsource-2.1.6-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:container-selinux-2.229.0-1.module+el8.8.0+21741+dd5be1e7.noarch.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:container-selinux-2.229.0-1.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:containernetworking-plugins-1.2.0-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:containernetworking-plugins-1.2.0-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:containernetworking-plugins-1.2.0-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:containernetworking-plugins-1.2.0-1.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:containernetworking-plugins-1.2.0-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:containernetworking-plugins-debuginfo-1.2.0-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:containernetworking-plugins-debuginfo-1.2.0-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:containernetworking-plugins-debuginfo-1.2.0-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:containernetworking-plugins-debuginfo-1.2.0-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:containernetworking-plugins-debugsource-1.2.0-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:containernetworking-plugins-debugsource-1.2.0-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:containernetworking-plugins-debugsource-1.2.0-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:containernetworking-plugins-debugsource-1.2.0-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:containers-common-1-65.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:containers-common-1-65.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:containers-common-1-65.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:containers-common-1-65.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:containers-common-1-65.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:crit-3.15-4.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:crit-3.15-4.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:crit-3.15-4.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:crit-3.15-4.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:criu-3.15-4.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:criu-3.15-4.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:criu-3.15-4.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:criu-3.15-4.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:criu-3.15-4.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:criu-debuginfo-3.15-4.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:criu-debuginfo-3.15-4.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:criu-debuginfo-3.15-4.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:criu-debuginfo-3.15-4.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:criu-debugsource-3.15-4.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:criu-debugsource-3.15-4.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:criu-debugsource-3.15-4.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:criu-debugsource-3.15-4.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:criu-devel-3.15-4.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:criu-devel-3.15-4.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:criu-devel-3.15-4.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:criu-devel-3.15-4.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:criu-libs-3.15-4.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:criu-libs-3.15-4.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:criu-libs-3.15-4.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:criu-libs-3.15-4.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:criu-libs-debuginfo-3.15-4.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:criu-libs-debuginfo-3.15-4.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:criu-libs-debuginfo-3.15-4.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:criu-libs-debuginfo-3.15-4.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:crun-1.8.4-2.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:crun-1.8.4-2.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:crun-1.8.4-2.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:crun-1.8.4-2.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:crun-1.8.4-2.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:crun-debuginfo-1.8.4-2.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:crun-debuginfo-1.8.4-2.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:crun-debuginfo-1.8.4-2.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:crun-debuginfo-1.8.4-2.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:crun-debugsource-1.8.4-2.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:crun-debugsource-1.8.4-2.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:crun-debugsource-1.8.4-2.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:crun-debugsource-1.8.4-2.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:fuse-overlayfs-1.11-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:fuse-overlayfs-1.11-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:fuse-overlayfs-1.11-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:fuse-overlayfs-1.11-1.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:fuse-overlayfs-1.11-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:fuse-overlayfs-debuginfo-1.11-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:fuse-overlayfs-debuginfo-1.11-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:fuse-overlayfs-debuginfo-1.11-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:fuse-overlayfs-debuginfo-1.11-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:fuse-overlayfs-debugsource-1.11-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:fuse-overlayfs-debugsource-1.11-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:fuse-overlayfs-debugsource-1.11-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:fuse-overlayfs-debugsource-1.11-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:libslirp-4.4.0-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:libslirp-4.4.0-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:libslirp-4.4.0-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:libslirp-4.4.0-1.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:libslirp-4.4.0-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:libslirp-debuginfo-4.4.0-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:libslirp-debuginfo-4.4.0-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:libslirp-debuginfo-4.4.0-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:libslirp-debuginfo-4.4.0-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:libslirp-debugsource-4.4.0-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:libslirp-debugsource-4.4.0-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:libslirp-debugsource-4.4.0-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:libslirp-debugsource-4.4.0-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:libslirp-devel-4.4.0-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:libslirp-devel-4.4.0-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:libslirp-devel-4.4.0-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:libslirp-devel-4.4.0-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:netavark-1.5.1-3.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:netavark-1.5.1-3.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:netavark-1.5.1-3.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:netavark-1.5.1-3.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:netavark-1.5.1-3.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:oci-seccomp-bpf-hook-1.2.8-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:oci-seccomp-bpf-hook-1.2.8-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:oci-seccomp-bpf-hook-1.2.8-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:oci-seccomp-bpf-hook-1.2.8-1.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:oci-seccomp-bpf-hook-1.2.8-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:oci-seccomp-bpf-hook-debuginfo-1.2.8-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:oci-seccomp-bpf-hook-debuginfo-1.2.8-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:oci-seccomp-bpf-hook-debuginfo-1.2.8-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:oci-seccomp-bpf-hook-debuginfo-1.2.8-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:oci-seccomp-bpf-hook-debugsource-1.2.8-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:oci-seccomp-bpf-hook-debugsource-1.2.8-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:oci-seccomp-bpf-hook-debugsource-1.2.8-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:oci-seccomp-bpf-hook-debugsource-1.2.8-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-4.4.1-19.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-catatonit-4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-catatonit-4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-catatonit-4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-catatonit-4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-catatonit-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-catatonit-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-catatonit-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-catatonit-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-debugsource-4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-debugsource-4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-debugsource-4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-debugsource-4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-docker-4.4.1-19.module+el8.8.0+21741+dd5be1e7.noarch.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-gvproxy-4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-gvproxy-4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-gvproxy-4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-gvproxy-4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-gvproxy-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-gvproxy-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-gvproxy-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-gvproxy-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-plugins-4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-plugins-4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-plugins-4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-plugins-4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-plugins-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-plugins-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-plugins-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-plugins-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-remote-4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-remote-4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-remote-4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-remote-4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-remote-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-remote-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-remote-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-remote-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-tests-4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-tests-4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-tests-4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-tests-4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:python-podman-4.4.1-1.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:python3-criu-3.15-4.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:python3-criu-3.15-4.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:python3-criu-3.15-4.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:python3-criu-3.15-4.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:python3-podman-4.4.1-1.module+el8.8.0+21741+dd5be1e7.noarch.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:runc-1.1.12-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:runc-1.1.12-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:runc-1.1.12-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:runc-1.1.12-1.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:runc-1.1.12-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:runc-debuginfo-1.1.12-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:runc-debuginfo-1.1.12-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:runc-debuginfo-1.1.12-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:runc-debuginfo-1.1.12-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:runc-debugsource-1.1.12-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:runc-debugsource-1.1.12-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:runc-debugsource-1.1.12-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:runc-debugsource-1.1.12-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:skopeo-1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:skopeo-1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:skopeo-1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:skopeo-1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:skopeo-1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:skopeo-tests-1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:skopeo-tests-1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:skopeo-tests-1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:skopeo-tests-1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:slirp4netns-1.2.0-3.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:slirp4netns-1.2.0-3.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:slirp4netns-1.2.0-3.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:slirp4netns-1.2.0-3.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:slirp4netns-1.2.0-3.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:slirp4netns-debuginfo-1.2.0-3.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:slirp4netns-debuginfo-1.2.0-3.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:slirp4netns-debuginfo-1.2.0-3.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:slirp4netns-debuginfo-1.2.0-3.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:slirp4netns-debugsource-1.2.0-3.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:slirp4netns-debugsource-1.2.0-3.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:slirp4netns-debugsource-1.2.0-3.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:slirp4netns-debugsource-1.2.0-3.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:toolbox-0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:toolbox-0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:toolbox-0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:toolbox-0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:toolbox-0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:toolbox-debuginfo-0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:toolbox-debuginfo-0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:toolbox-debuginfo-0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:toolbox-debuginfo-0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:toolbox-debugsource-0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:toolbox-debugsource-0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:toolbox-debugsource-0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:toolbox-debugsource-0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:toolbox-tests-0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:toolbox-tests-0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:toolbox-tests-0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:toolbox-tests-0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:udica-0.2.6-20.module+el8.8.0+21741+dd5be1e7.noarch.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:udica-0.2.6-20.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "podman: Symlink error leads to information disclosure"
},
{
"cve": "CVE-2022-32149",
"cwe": {
"id": "CWE-407",
"name": "Inefficient Algorithmic Complexity"
},
"discovery_date": "2022-10-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2134010"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in the golang.org/x/text/language package. An attacker can craft an Accept-Language header which ParseAcceptLanguage will take significant time to parse. This issue leads to a denial of service, and can impact availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: golang.org/x/text/language: ParseAcceptLanguage takes a long time to parse complex tags",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "After careful analysis of the vulnerability Redhat is choosing to keep the vulnerability severity as moderate,the vulnerability exists in the ParseAcceptLanguage function of the golang text/language package,when an attacker could craft an unusually large accept header and due to the parser taking quadratic time complexity to finish, firstly the attacker would have to find a way smuggle an input to the parser and even then this would simply not result in a crash of any kind but more of resource hang which while can be unpleasant,does not equate to any real world damage.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.8.0.Z.EUS:aardvark-dns-1.5.0-2.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:aardvark-dns-1.5.0-2.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:aardvark-dns-1.5.0-2.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:aardvark-dns-1.5.0-2.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:aardvark-dns-1.5.0-2.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:buildah-1.29.3-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:buildah-1.29.3-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:buildah-1.29.3-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:buildah-1.29.3-1.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:buildah-1.29.3-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:buildah-debuginfo-1.29.3-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:buildah-debuginfo-1.29.3-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:buildah-debuginfo-1.29.3-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:buildah-debuginfo-1.29.3-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:buildah-debugsource-1.29.3-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:buildah-debugsource-1.29.3-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:buildah-debugsource-1.29.3-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:buildah-debugsource-1.29.3-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:buildah-tests-1.29.3-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:buildah-tests-1.29.3-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:buildah-tests-1.29.3-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:buildah-tests-1.29.3-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:buildah-tests-debuginfo-1.29.3-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:buildah-tests-debuginfo-1.29.3-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:buildah-tests-debuginfo-1.29.3-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:buildah-tests-debuginfo-1.29.3-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:cockpit-podman-63.1-1.module+el8.8.0+21741+dd5be1e7.noarch.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:cockpit-podman-63.1-1.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:conmon-2.1.6-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:conmon-2.1.6-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:conmon-2.1.6-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:conmon-2.1.6-1.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:conmon-2.1.6-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:conmon-debuginfo-2.1.6-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:conmon-debuginfo-2.1.6-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:conmon-debuginfo-2.1.6-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:conmon-debuginfo-2.1.6-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:conmon-debugsource-2.1.6-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:conmon-debugsource-2.1.6-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:conmon-debugsource-2.1.6-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:conmon-debugsource-2.1.6-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:container-selinux-2.229.0-1.module+el8.8.0+21741+dd5be1e7.noarch.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:container-selinux-2.229.0-1.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:containernetworking-plugins-1.2.0-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:containernetworking-plugins-1.2.0-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:containernetworking-plugins-1.2.0-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:containernetworking-plugins-1.2.0-1.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:containernetworking-plugins-1.2.0-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:containernetworking-plugins-debuginfo-1.2.0-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:containernetworking-plugins-debuginfo-1.2.0-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:containernetworking-plugins-debuginfo-1.2.0-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:containernetworking-plugins-debuginfo-1.2.0-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:containernetworking-plugins-debugsource-1.2.0-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:containernetworking-plugins-debugsource-1.2.0-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:containernetworking-plugins-debugsource-1.2.0-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:containernetworking-plugins-debugsource-1.2.0-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:containers-common-1-65.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:containers-common-1-65.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:containers-common-1-65.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:containers-common-1-65.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:containers-common-1-65.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:crit-3.15-4.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:crit-3.15-4.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:crit-3.15-4.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:crit-3.15-4.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:criu-3.15-4.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:criu-3.15-4.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:criu-3.15-4.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:criu-3.15-4.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:criu-3.15-4.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:criu-debuginfo-3.15-4.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:criu-debuginfo-3.15-4.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:criu-debuginfo-3.15-4.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:criu-debuginfo-3.15-4.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:criu-debugsource-3.15-4.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:criu-debugsource-3.15-4.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:criu-debugsource-3.15-4.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:criu-debugsource-3.15-4.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:criu-devel-3.15-4.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:criu-devel-3.15-4.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:criu-devel-3.15-4.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:criu-devel-3.15-4.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:criu-libs-3.15-4.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:criu-libs-3.15-4.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:criu-libs-3.15-4.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:criu-libs-3.15-4.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:criu-libs-debuginfo-3.15-4.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:criu-libs-debuginfo-3.15-4.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:criu-libs-debuginfo-3.15-4.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:criu-libs-debuginfo-3.15-4.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:crun-1.8.4-2.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:crun-1.8.4-2.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:crun-1.8.4-2.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:crun-1.8.4-2.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:crun-1.8.4-2.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:crun-debuginfo-1.8.4-2.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:crun-debuginfo-1.8.4-2.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:crun-debuginfo-1.8.4-2.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:crun-debuginfo-1.8.4-2.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:crun-debugsource-1.8.4-2.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:crun-debugsource-1.8.4-2.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:crun-debugsource-1.8.4-2.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:crun-debugsource-1.8.4-2.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:fuse-overlayfs-1.11-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:fuse-overlayfs-1.11-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:fuse-overlayfs-1.11-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:fuse-overlayfs-1.11-1.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:fuse-overlayfs-1.11-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:fuse-overlayfs-debuginfo-1.11-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:fuse-overlayfs-debuginfo-1.11-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:fuse-overlayfs-debuginfo-1.11-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:fuse-overlayfs-debuginfo-1.11-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:fuse-overlayfs-debugsource-1.11-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:fuse-overlayfs-debugsource-1.11-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:fuse-overlayfs-debugsource-1.11-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:fuse-overlayfs-debugsource-1.11-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:libslirp-4.4.0-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:libslirp-4.4.0-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:libslirp-4.4.0-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:libslirp-4.4.0-1.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:libslirp-4.4.0-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:libslirp-debuginfo-4.4.0-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:libslirp-debuginfo-4.4.0-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:libslirp-debuginfo-4.4.0-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:libslirp-debuginfo-4.4.0-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:libslirp-debugsource-4.4.0-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:libslirp-debugsource-4.4.0-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:libslirp-debugsource-4.4.0-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:libslirp-debugsource-4.4.0-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:libslirp-devel-4.4.0-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:libslirp-devel-4.4.0-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:libslirp-devel-4.4.0-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:libslirp-devel-4.4.0-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:netavark-1.5.1-3.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:netavark-1.5.1-3.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:netavark-1.5.1-3.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:netavark-1.5.1-3.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:netavark-1.5.1-3.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:oci-seccomp-bpf-hook-1.2.8-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:oci-seccomp-bpf-hook-1.2.8-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:oci-seccomp-bpf-hook-1.2.8-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:oci-seccomp-bpf-hook-1.2.8-1.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:oci-seccomp-bpf-hook-1.2.8-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:oci-seccomp-bpf-hook-debuginfo-1.2.8-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:oci-seccomp-bpf-hook-debuginfo-1.2.8-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:oci-seccomp-bpf-hook-debuginfo-1.2.8-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:oci-seccomp-bpf-hook-debuginfo-1.2.8-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:oci-seccomp-bpf-hook-debugsource-1.2.8-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:oci-seccomp-bpf-hook-debugsource-1.2.8-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:oci-seccomp-bpf-hook-debugsource-1.2.8-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:oci-seccomp-bpf-hook-debugsource-1.2.8-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-4.4.1-19.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-catatonit-4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-catatonit-4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-catatonit-4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-catatonit-4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-catatonit-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-catatonit-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-catatonit-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-catatonit-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-debugsource-4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-debugsource-4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-debugsource-4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-debugsource-4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-docker-4.4.1-19.module+el8.8.0+21741+dd5be1e7.noarch.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-gvproxy-4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-gvproxy-4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-gvproxy-4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-gvproxy-4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-gvproxy-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-gvproxy-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-gvproxy-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-gvproxy-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-plugins-4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-plugins-4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-plugins-4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-plugins-4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-plugins-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-plugins-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-plugins-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-plugins-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-remote-4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-remote-4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-remote-4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-remote-4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-remote-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-remote-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-remote-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-remote-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-tests-4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-tests-4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-tests-4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-tests-4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:python-podman-4.4.1-1.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:python3-criu-3.15-4.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:python3-criu-3.15-4.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:python3-criu-3.15-4.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:python3-criu-3.15-4.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:python3-podman-4.4.1-1.module+el8.8.0+21741+dd5be1e7.noarch.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:runc-1.1.12-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:runc-1.1.12-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:runc-1.1.12-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:runc-1.1.12-1.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:runc-1.1.12-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:runc-debuginfo-1.1.12-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:runc-debuginfo-1.1.12-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:runc-debuginfo-1.1.12-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:runc-debuginfo-1.1.12-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:runc-debugsource-1.1.12-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:runc-debugsource-1.1.12-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:runc-debugsource-1.1.12-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:runc-debugsource-1.1.12-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:skopeo-1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:skopeo-1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:skopeo-1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:skopeo-1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:skopeo-1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:skopeo-tests-1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:skopeo-tests-1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:skopeo-tests-1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:skopeo-tests-1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:slirp4netns-1.2.0-3.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:slirp4netns-1.2.0-3.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:slirp4netns-1.2.0-3.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:slirp4netns-1.2.0-3.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:slirp4netns-1.2.0-3.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:slirp4netns-debuginfo-1.2.0-3.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:slirp4netns-debuginfo-1.2.0-3.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:slirp4netns-debuginfo-1.2.0-3.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:slirp4netns-debuginfo-1.2.0-3.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:slirp4netns-debugsource-1.2.0-3.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:slirp4netns-debugsource-1.2.0-3.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:slirp4netns-debugsource-1.2.0-3.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:slirp4netns-debugsource-1.2.0-3.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:toolbox-0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:toolbox-0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:toolbox-0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:toolbox-0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:toolbox-0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:toolbox-debuginfo-0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:toolbox-debuginfo-0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:toolbox-debuginfo-0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:toolbox-debuginfo-0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:toolbox-debugsource-0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:toolbox-debugsource-0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:toolbox-debugsource-0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:toolbox-debugsource-0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:toolbox-tests-0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:toolbox-tests-0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:toolbox-tests-0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:toolbox-tests-0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:udica-0.2.6-20.module+el8.8.0+21741+dd5be1e7.noarch.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:udica-0.2.6-20.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-32149"
},
{
"category": "external",
"summary": "RHBZ#2134010",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2134010"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-32149",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32149"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-32149",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-32149"
},
{
"category": "external",
"summary": "https://go.dev/issue/56152",
"url": "https://go.dev/issue/56152"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-dev/c/qfPIly0X7aU",
"url": "https://groups.google.com/g/golang-dev/c/qfPIly0X7aU"
}
],
"release_date": "2022-10-11T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-04-29T12:00:29+00:00",
"details": "For details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.8.0.Z.EUS:aardvark-dns-1.5.0-2.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:aardvark-dns-1.5.0-2.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:aardvark-dns-1.5.0-2.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:aardvark-dns-1.5.0-2.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:aardvark-dns-1.5.0-2.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:buildah-1.29.3-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:buildah-1.29.3-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:buildah-1.29.3-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:buildah-1.29.3-1.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:buildah-1.29.3-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:buildah-debuginfo-1.29.3-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:buildah-debuginfo-1.29.3-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:buildah-debuginfo-1.29.3-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:buildah-debuginfo-1.29.3-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:buildah-debugsource-1.29.3-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:buildah-debugsource-1.29.3-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:buildah-debugsource-1.29.3-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:buildah-debugsource-1.29.3-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:buildah-tests-1.29.3-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:buildah-tests-1.29.3-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:buildah-tests-1.29.3-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:buildah-tests-1.29.3-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:buildah-tests-debuginfo-1.29.3-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:buildah-tests-debuginfo-1.29.3-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:buildah-tests-debuginfo-1.29.3-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:buildah-tests-debuginfo-1.29.3-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:cockpit-podman-63.1-1.module+el8.8.0+21741+dd5be1e7.noarch.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:cockpit-podman-63.1-1.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:conmon-2.1.6-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:conmon-2.1.6-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:conmon-2.1.6-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:conmon-2.1.6-1.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:conmon-2.1.6-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:conmon-debuginfo-2.1.6-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:conmon-debuginfo-2.1.6-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:conmon-debuginfo-2.1.6-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:conmon-debuginfo-2.1.6-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:conmon-debugsource-2.1.6-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:conmon-debugsource-2.1.6-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:conmon-debugsource-2.1.6-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:conmon-debugsource-2.1.6-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:container-selinux-2.229.0-1.module+el8.8.0+21741+dd5be1e7.noarch.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:container-selinux-2.229.0-1.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:containernetworking-plugins-1.2.0-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:containernetworking-plugins-1.2.0-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:containernetworking-plugins-1.2.0-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:containernetworking-plugins-1.2.0-1.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:containernetworking-plugins-1.2.0-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:containernetworking-plugins-debuginfo-1.2.0-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:containernetworking-plugins-debuginfo-1.2.0-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:containernetworking-plugins-debuginfo-1.2.0-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:containernetworking-plugins-debuginfo-1.2.0-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:containernetworking-plugins-debugsource-1.2.0-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:containernetworking-plugins-debugsource-1.2.0-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:containernetworking-plugins-debugsource-1.2.0-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:containernetworking-plugins-debugsource-1.2.0-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:containers-common-1-65.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:containers-common-1-65.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:containers-common-1-65.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:containers-common-1-65.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:containers-common-1-65.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:crit-3.15-4.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:crit-3.15-4.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:crit-3.15-4.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:crit-3.15-4.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:criu-3.15-4.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:criu-3.15-4.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:criu-3.15-4.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:criu-3.15-4.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:criu-3.15-4.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:criu-debuginfo-3.15-4.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:criu-debuginfo-3.15-4.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:criu-debuginfo-3.15-4.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:criu-debuginfo-3.15-4.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:criu-debugsource-3.15-4.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:criu-debugsource-3.15-4.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:criu-debugsource-3.15-4.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:criu-debugsource-3.15-4.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:criu-devel-3.15-4.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:criu-devel-3.15-4.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:criu-devel-3.15-4.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:criu-devel-3.15-4.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:criu-libs-3.15-4.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:criu-libs-3.15-4.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:criu-libs-3.15-4.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:criu-libs-3.15-4.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:criu-libs-debuginfo-3.15-4.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:criu-libs-debuginfo-3.15-4.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:criu-libs-debuginfo-3.15-4.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:criu-libs-debuginfo-3.15-4.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:crun-1.8.4-2.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:crun-1.8.4-2.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:crun-1.8.4-2.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:crun-1.8.4-2.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:crun-1.8.4-2.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:crun-debuginfo-1.8.4-2.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:crun-debuginfo-1.8.4-2.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:crun-debuginfo-1.8.4-2.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:crun-debuginfo-1.8.4-2.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:crun-debugsource-1.8.4-2.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:crun-debugsource-1.8.4-2.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:crun-debugsource-1.8.4-2.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:crun-debugsource-1.8.4-2.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:fuse-overlayfs-1.11-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:fuse-overlayfs-1.11-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:fuse-overlayfs-1.11-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:fuse-overlayfs-1.11-1.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:fuse-overlayfs-1.11-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:fuse-overlayfs-debuginfo-1.11-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:fuse-overlayfs-debuginfo-1.11-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:fuse-overlayfs-debuginfo-1.11-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:fuse-overlayfs-debuginfo-1.11-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:fuse-overlayfs-debugsource-1.11-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:fuse-overlayfs-debugsource-1.11-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:fuse-overlayfs-debugsource-1.11-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:fuse-overlayfs-debugsource-1.11-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:libslirp-4.4.0-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:libslirp-4.4.0-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:libslirp-4.4.0-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:libslirp-4.4.0-1.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:libslirp-4.4.0-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:libslirp-debuginfo-4.4.0-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:libslirp-debuginfo-4.4.0-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:libslirp-debuginfo-4.4.0-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:libslirp-debuginfo-4.4.0-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:libslirp-debugsource-4.4.0-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:libslirp-debugsource-4.4.0-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:libslirp-debugsource-4.4.0-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:libslirp-debugsource-4.4.0-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:libslirp-devel-4.4.0-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:libslirp-devel-4.4.0-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:libslirp-devel-4.4.0-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:libslirp-devel-4.4.0-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:netavark-1.5.1-3.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:netavark-1.5.1-3.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:netavark-1.5.1-3.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:netavark-1.5.1-3.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:netavark-1.5.1-3.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:oci-seccomp-bpf-hook-1.2.8-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:oci-seccomp-bpf-hook-1.2.8-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:oci-seccomp-bpf-hook-1.2.8-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:oci-seccomp-bpf-hook-1.2.8-1.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:oci-seccomp-bpf-hook-1.2.8-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:oci-seccomp-bpf-hook-debuginfo-1.2.8-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:oci-seccomp-bpf-hook-debuginfo-1.2.8-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:oci-seccomp-bpf-hook-debuginfo-1.2.8-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:oci-seccomp-bpf-hook-debuginfo-1.2.8-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:oci-seccomp-bpf-hook-debugsource-1.2.8-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:oci-seccomp-bpf-hook-debugsource-1.2.8-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:oci-seccomp-bpf-hook-debugsource-1.2.8-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:oci-seccomp-bpf-hook-debugsource-1.2.8-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-4.4.1-19.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-catatonit-4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-catatonit-4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-catatonit-4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-catatonit-4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-catatonit-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-catatonit-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-catatonit-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-catatonit-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-debugsource-4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-debugsource-4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-debugsource-4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-debugsource-4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-docker-4.4.1-19.module+el8.8.0+21741+dd5be1e7.noarch.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-gvproxy-4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-gvproxy-4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-gvproxy-4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-gvproxy-4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-gvproxy-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-gvproxy-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-gvproxy-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-gvproxy-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-plugins-4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-plugins-4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-plugins-4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-plugins-4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-plugins-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-plugins-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-plugins-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-plugins-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-remote-4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-remote-4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-remote-4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-remote-4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-remote-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-remote-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-remote-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-remote-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-tests-4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-tests-4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-tests-4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-tests-4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:python-podman-4.4.1-1.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:python3-criu-3.15-4.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:python3-criu-3.15-4.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:python3-criu-3.15-4.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:python3-criu-3.15-4.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:python3-podman-4.4.1-1.module+el8.8.0+21741+dd5be1e7.noarch.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:runc-1.1.12-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:runc-1.1.12-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:runc-1.1.12-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:runc-1.1.12-1.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:runc-1.1.12-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:runc-debuginfo-1.1.12-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:runc-debuginfo-1.1.12-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:runc-debuginfo-1.1.12-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:runc-debuginfo-1.1.12-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:runc-debugsource-1.1.12-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:runc-debugsource-1.1.12-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:runc-debugsource-1.1.12-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:runc-debugsource-1.1.12-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:skopeo-1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:skopeo-1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:skopeo-1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:skopeo-1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:skopeo-1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:skopeo-tests-1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:skopeo-tests-1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:skopeo-tests-1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:skopeo-tests-1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:slirp4netns-1.2.0-3.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:slirp4netns-1.2.0-3.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:slirp4netns-1.2.0-3.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:slirp4netns-1.2.0-3.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:slirp4netns-1.2.0-3.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:slirp4netns-debuginfo-1.2.0-3.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:slirp4netns-debuginfo-1.2.0-3.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:slirp4netns-debuginfo-1.2.0-3.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:slirp4netns-debuginfo-1.2.0-3.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:slirp4netns-debugsource-1.2.0-3.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:slirp4netns-debugsource-1.2.0-3.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:slirp4netns-debugsource-1.2.0-3.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:slirp4netns-debugsource-1.2.0-3.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:toolbox-0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:toolbox-0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:toolbox-0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:toolbox-0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:toolbox-0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:toolbox-debuginfo-0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:toolbox-debuginfo-0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:toolbox-debuginfo-0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:toolbox-debuginfo-0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:toolbox-debugsource-0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:toolbox-debugsource-0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:toolbox-debugsource-0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:toolbox-debugsource-0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:toolbox-tests-0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:toolbox-tests-0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:toolbox-tests-0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:toolbox-tests-0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:udica-0.2.6-20.module+el8.8.0+21741+dd5be1e7.noarch.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:udica-0.2.6-20.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:2077"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.8.0.Z.EUS:aardvark-dns-1.5.0-2.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:aardvark-dns-1.5.0-2.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:aardvark-dns-1.5.0-2.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:aardvark-dns-1.5.0-2.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:aardvark-dns-1.5.0-2.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:buildah-1.29.3-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:buildah-1.29.3-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:buildah-1.29.3-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:buildah-1.29.3-1.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:buildah-1.29.3-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:buildah-debuginfo-1.29.3-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:buildah-debuginfo-1.29.3-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:buildah-debuginfo-1.29.3-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:buildah-debuginfo-1.29.3-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:buildah-debugsource-1.29.3-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:buildah-debugsource-1.29.3-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:buildah-debugsource-1.29.3-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:buildah-debugsource-1.29.3-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:buildah-tests-1.29.3-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:buildah-tests-1.29.3-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:buildah-tests-1.29.3-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:buildah-tests-1.29.3-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:buildah-tests-debuginfo-1.29.3-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:buildah-tests-debuginfo-1.29.3-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:buildah-tests-debuginfo-1.29.3-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:buildah-tests-debuginfo-1.29.3-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:cockpit-podman-63.1-1.module+el8.8.0+21741+dd5be1e7.noarch.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:cockpit-podman-63.1-1.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:conmon-2.1.6-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:conmon-2.1.6-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:conmon-2.1.6-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:conmon-2.1.6-1.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:conmon-2.1.6-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:conmon-debuginfo-2.1.6-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:conmon-debuginfo-2.1.6-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:conmon-debuginfo-2.1.6-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:conmon-debuginfo-2.1.6-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:conmon-debugsource-2.1.6-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:conmon-debugsource-2.1.6-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:conmon-debugsource-2.1.6-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:conmon-debugsource-2.1.6-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:container-selinux-2.229.0-1.module+el8.8.0+21741+dd5be1e7.noarch.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:container-selinux-2.229.0-1.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:containernetworking-plugins-1.2.0-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:containernetworking-plugins-1.2.0-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:containernetworking-plugins-1.2.0-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:containernetworking-plugins-1.2.0-1.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:containernetworking-plugins-1.2.0-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:containernetworking-plugins-debuginfo-1.2.0-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:containernetworking-plugins-debuginfo-1.2.0-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:containernetworking-plugins-debuginfo-1.2.0-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:containernetworking-plugins-debuginfo-1.2.0-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:containernetworking-plugins-debugsource-1.2.0-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:containernetworking-plugins-debugsource-1.2.0-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:containernetworking-plugins-debugsource-1.2.0-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:containernetworking-plugins-debugsource-1.2.0-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:containers-common-1-65.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:containers-common-1-65.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:containers-common-1-65.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:containers-common-1-65.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:containers-common-1-65.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:crit-3.15-4.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:crit-3.15-4.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:crit-3.15-4.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:crit-3.15-4.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:criu-3.15-4.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:criu-3.15-4.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:criu-3.15-4.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:criu-3.15-4.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:criu-3.15-4.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:criu-debuginfo-3.15-4.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:criu-debuginfo-3.15-4.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:criu-debuginfo-3.15-4.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:criu-debuginfo-3.15-4.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:criu-debugsource-3.15-4.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:criu-debugsource-3.15-4.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:criu-debugsource-3.15-4.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:criu-debugsource-3.15-4.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:criu-devel-3.15-4.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:criu-devel-3.15-4.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:criu-devel-3.15-4.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:criu-devel-3.15-4.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:criu-libs-3.15-4.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:criu-libs-3.15-4.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:criu-libs-3.15-4.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:criu-libs-3.15-4.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:criu-libs-debuginfo-3.15-4.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:criu-libs-debuginfo-3.15-4.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:criu-libs-debuginfo-3.15-4.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:criu-libs-debuginfo-3.15-4.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:crun-1.8.4-2.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:crun-1.8.4-2.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:crun-1.8.4-2.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:crun-1.8.4-2.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:crun-1.8.4-2.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:crun-debuginfo-1.8.4-2.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:crun-debuginfo-1.8.4-2.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:crun-debuginfo-1.8.4-2.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:crun-debuginfo-1.8.4-2.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:crun-debugsource-1.8.4-2.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:crun-debugsource-1.8.4-2.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:crun-debugsource-1.8.4-2.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:crun-debugsource-1.8.4-2.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:fuse-overlayfs-1.11-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:fuse-overlayfs-1.11-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:fuse-overlayfs-1.11-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:fuse-overlayfs-1.11-1.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:fuse-overlayfs-1.11-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:fuse-overlayfs-debuginfo-1.11-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:fuse-overlayfs-debuginfo-1.11-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:fuse-overlayfs-debuginfo-1.11-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:fuse-overlayfs-debuginfo-1.11-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:fuse-overlayfs-debugsource-1.11-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:fuse-overlayfs-debugsource-1.11-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:fuse-overlayfs-debugsource-1.11-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:fuse-overlayfs-debugsource-1.11-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:libslirp-4.4.0-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:libslirp-4.4.0-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:libslirp-4.4.0-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:libslirp-4.4.0-1.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:libslirp-4.4.0-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:libslirp-debuginfo-4.4.0-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:libslirp-debuginfo-4.4.0-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:libslirp-debuginfo-4.4.0-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:libslirp-debuginfo-4.4.0-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:libslirp-debugsource-4.4.0-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:libslirp-debugsource-4.4.0-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:libslirp-debugsource-4.4.0-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:libslirp-debugsource-4.4.0-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:libslirp-devel-4.4.0-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:libslirp-devel-4.4.0-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:libslirp-devel-4.4.0-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:libslirp-devel-4.4.0-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:netavark-1.5.1-3.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:netavark-1.5.1-3.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:netavark-1.5.1-3.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:netavark-1.5.1-3.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:netavark-1.5.1-3.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:oci-seccomp-bpf-hook-1.2.8-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:oci-seccomp-bpf-hook-1.2.8-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:oci-seccomp-bpf-hook-1.2.8-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:oci-seccomp-bpf-hook-1.2.8-1.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:oci-seccomp-bpf-hook-1.2.8-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:oci-seccomp-bpf-hook-debuginfo-1.2.8-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:oci-seccomp-bpf-hook-debuginfo-1.2.8-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:oci-seccomp-bpf-hook-debuginfo-1.2.8-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:oci-seccomp-bpf-hook-debuginfo-1.2.8-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:oci-seccomp-bpf-hook-debugsource-1.2.8-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:oci-seccomp-bpf-hook-debugsource-1.2.8-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:oci-seccomp-bpf-hook-debugsource-1.2.8-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:oci-seccomp-bpf-hook-debugsource-1.2.8-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-4.4.1-19.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-catatonit-4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-catatonit-4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-catatonit-4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-catatonit-4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-catatonit-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-catatonit-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-catatonit-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-catatonit-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-debugsource-4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-debugsource-4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-debugsource-4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-debugsource-4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-docker-4.4.1-19.module+el8.8.0+21741+dd5be1e7.noarch.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-gvproxy-4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-gvproxy-4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-gvproxy-4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-gvproxy-4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-gvproxy-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-gvproxy-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-gvproxy-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-gvproxy-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-plugins-4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-plugins-4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-plugins-4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-plugins-4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-plugins-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-plugins-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-plugins-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-plugins-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-remote-4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-remote-4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-remote-4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-remote-4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-remote-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-remote-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-remote-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-remote-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-tests-4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-tests-4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-tests-4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-tests-4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:python-podman-4.4.1-1.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:python3-criu-3.15-4.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:python3-criu-3.15-4.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:python3-criu-3.15-4.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:python3-criu-3.15-4.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:python3-podman-4.4.1-1.module+el8.8.0+21741+dd5be1e7.noarch.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:runc-1.1.12-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:runc-1.1.12-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:runc-1.1.12-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:runc-1.1.12-1.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:runc-1.1.12-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:runc-debuginfo-1.1.12-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:runc-debuginfo-1.1.12-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:runc-debuginfo-1.1.12-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:runc-debuginfo-1.1.12-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:runc-debugsource-1.1.12-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:runc-debugsource-1.1.12-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:runc-debugsource-1.1.12-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:runc-debugsource-1.1.12-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:skopeo-1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:skopeo-1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:skopeo-1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:skopeo-1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:skopeo-1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:skopeo-tests-1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:skopeo-tests-1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:skopeo-tests-1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:skopeo-tests-1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:slirp4netns-1.2.0-3.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:slirp4netns-1.2.0-3.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:slirp4netns-1.2.0-3.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:slirp4netns-1.2.0-3.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:slirp4netns-1.2.0-3.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:slirp4netns-debuginfo-1.2.0-3.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:slirp4netns-debuginfo-1.2.0-3.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:slirp4netns-debuginfo-1.2.0-3.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:slirp4netns-debuginfo-1.2.0-3.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:slirp4netns-debugsource-1.2.0-3.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:slirp4netns-debugsource-1.2.0-3.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:slirp4netns-debugsource-1.2.0-3.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:slirp4netns-debugsource-1.2.0-3.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:toolbox-0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:toolbox-0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:toolbox-0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:toolbox-0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:toolbox-0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:toolbox-debuginfo-0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:toolbox-debuginfo-0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:toolbox-debuginfo-0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:toolbox-debuginfo-0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:toolbox-debugsource-0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:toolbox-debugsource-0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:toolbox-debugsource-0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:toolbox-debugsource-0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:toolbox-tests-0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:toolbox-tests-0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:toolbox-tests-0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:toolbox-tests-0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:udica-0.2.6-20.module+el8.8.0+21741+dd5be1e7.noarch.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:udica-0.2.6-20.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "golang: golang.org/x/text/language: ParseAcceptLanguage takes a long time to parse complex tags"
},
{
"cve": "CVE-2024-1753",
"cwe": {
"id": "CWE-59",
"name": "Improper Link Resolution Before File Access (\u0027Link Following\u0027)"
},
"discovery_date": "2024-02-22T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2265513"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in Buildah (and subsequently Podman Build) which allows containers to mount arbitrary locations on the host filesystem into build containers. A malicious Containerfile can use a dummy image with a symbolic link to the root filesystem as a mount source and cause the mount operation to mount the host root filesystem inside the RUN step. The commands inside the RUN step will then have read-write access to the host filesystem, allowing for full container escape at build time.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "buildah: full container escape at build time",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.8.0.Z.EUS:aardvark-dns-1.5.0-2.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:aardvark-dns-1.5.0-2.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:aardvark-dns-1.5.0-2.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:aardvark-dns-1.5.0-2.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:aardvark-dns-1.5.0-2.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:buildah-1.29.3-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:buildah-1.29.3-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:buildah-1.29.3-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:buildah-1.29.3-1.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:buildah-1.29.3-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:buildah-debuginfo-1.29.3-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:buildah-debuginfo-1.29.3-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:buildah-debuginfo-1.29.3-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:buildah-debuginfo-1.29.3-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:buildah-debugsource-1.29.3-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:buildah-debugsource-1.29.3-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:buildah-debugsource-1.29.3-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:buildah-debugsource-1.29.3-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:buildah-tests-1.29.3-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:buildah-tests-1.29.3-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:buildah-tests-1.29.3-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:buildah-tests-1.29.3-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:buildah-tests-debuginfo-1.29.3-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:buildah-tests-debuginfo-1.29.3-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:buildah-tests-debuginfo-1.29.3-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:buildah-tests-debuginfo-1.29.3-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:cockpit-podman-63.1-1.module+el8.8.0+21741+dd5be1e7.noarch.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:cockpit-podman-63.1-1.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:conmon-2.1.6-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:conmon-2.1.6-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:conmon-2.1.6-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:conmon-2.1.6-1.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:conmon-2.1.6-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:conmon-debuginfo-2.1.6-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:conmon-debuginfo-2.1.6-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:conmon-debuginfo-2.1.6-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:conmon-debuginfo-2.1.6-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:conmon-debugsource-2.1.6-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:conmon-debugsource-2.1.6-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:conmon-debugsource-2.1.6-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:conmon-debugsource-2.1.6-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:container-selinux-2.229.0-1.module+el8.8.0+21741+dd5be1e7.noarch.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:container-selinux-2.229.0-1.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:containernetworking-plugins-1.2.0-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:containernetworking-plugins-1.2.0-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:containernetworking-plugins-1.2.0-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:containernetworking-plugins-1.2.0-1.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:containernetworking-plugins-1.2.0-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:containernetworking-plugins-debuginfo-1.2.0-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:containernetworking-plugins-debuginfo-1.2.0-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:containernetworking-plugins-debuginfo-1.2.0-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:containernetworking-plugins-debuginfo-1.2.0-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:containernetworking-plugins-debugsource-1.2.0-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:containernetworking-plugins-debugsource-1.2.0-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:containernetworking-plugins-debugsource-1.2.0-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:containernetworking-plugins-debugsource-1.2.0-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:containers-common-1-65.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:containers-common-1-65.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:containers-common-1-65.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:containers-common-1-65.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:containers-common-1-65.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:crit-3.15-4.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:crit-3.15-4.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:crit-3.15-4.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:crit-3.15-4.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:criu-3.15-4.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:criu-3.15-4.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:criu-3.15-4.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:criu-3.15-4.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:criu-3.15-4.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:criu-debuginfo-3.15-4.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:criu-debuginfo-3.15-4.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:criu-debuginfo-3.15-4.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:criu-debuginfo-3.15-4.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:criu-debugsource-3.15-4.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:criu-debugsource-3.15-4.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:criu-debugsource-3.15-4.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:criu-debugsource-3.15-4.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:criu-devel-3.15-4.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:criu-devel-3.15-4.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:criu-devel-3.15-4.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:criu-devel-3.15-4.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:criu-libs-3.15-4.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:criu-libs-3.15-4.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:criu-libs-3.15-4.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:criu-libs-3.15-4.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:criu-libs-debuginfo-3.15-4.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:criu-libs-debuginfo-3.15-4.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:criu-libs-debuginfo-3.15-4.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:criu-libs-debuginfo-3.15-4.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:crun-1.8.4-2.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:crun-1.8.4-2.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:crun-1.8.4-2.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:crun-1.8.4-2.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:crun-1.8.4-2.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:crun-debuginfo-1.8.4-2.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:crun-debuginfo-1.8.4-2.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:crun-debuginfo-1.8.4-2.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:crun-debuginfo-1.8.4-2.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:crun-debugsource-1.8.4-2.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:crun-debugsource-1.8.4-2.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:crun-debugsource-1.8.4-2.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:crun-debugsource-1.8.4-2.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:fuse-overlayfs-1.11-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:fuse-overlayfs-1.11-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:fuse-overlayfs-1.11-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:fuse-overlayfs-1.11-1.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:fuse-overlayfs-1.11-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:fuse-overlayfs-debuginfo-1.11-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:fuse-overlayfs-debuginfo-1.11-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:fuse-overlayfs-debuginfo-1.11-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:fuse-overlayfs-debuginfo-1.11-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:fuse-overlayfs-debugsource-1.11-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:fuse-overlayfs-debugsource-1.11-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:fuse-overlayfs-debugsource-1.11-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:fuse-overlayfs-debugsource-1.11-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:libslirp-4.4.0-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:libslirp-4.4.0-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:libslirp-4.4.0-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:libslirp-4.4.0-1.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:libslirp-4.4.0-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:libslirp-debuginfo-4.4.0-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:libslirp-debuginfo-4.4.0-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:libslirp-debuginfo-4.4.0-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:libslirp-debuginfo-4.4.0-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:libslirp-debugsource-4.4.0-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:libslirp-debugsource-4.4.0-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:libslirp-debugsource-4.4.0-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:libslirp-debugsource-4.4.0-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:libslirp-devel-4.4.0-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:libslirp-devel-4.4.0-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:libslirp-devel-4.4.0-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:libslirp-devel-4.4.0-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:netavark-1.5.1-3.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:netavark-1.5.1-3.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:netavark-1.5.1-3.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:netavark-1.5.1-3.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:netavark-1.5.1-3.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:oci-seccomp-bpf-hook-1.2.8-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:oci-seccomp-bpf-hook-1.2.8-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:oci-seccomp-bpf-hook-1.2.8-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:oci-seccomp-bpf-hook-1.2.8-1.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:oci-seccomp-bpf-hook-1.2.8-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:oci-seccomp-bpf-hook-debuginfo-1.2.8-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:oci-seccomp-bpf-hook-debuginfo-1.2.8-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:oci-seccomp-bpf-hook-debuginfo-1.2.8-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:oci-seccomp-bpf-hook-debuginfo-1.2.8-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:oci-seccomp-bpf-hook-debugsource-1.2.8-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:oci-seccomp-bpf-hook-debugsource-1.2.8-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:oci-seccomp-bpf-hook-debugsource-1.2.8-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:oci-seccomp-bpf-hook-debugsource-1.2.8-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-4.4.1-19.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-catatonit-4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-catatonit-4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-catatonit-4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-catatonit-4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-catatonit-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-catatonit-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-catatonit-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-catatonit-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-debugsource-4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-debugsource-4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-debugsource-4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-debugsource-4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-docker-4.4.1-19.module+el8.8.0+21741+dd5be1e7.noarch.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-gvproxy-4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-gvproxy-4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-gvproxy-4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-gvproxy-4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-gvproxy-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-gvproxy-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-gvproxy-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-gvproxy-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-plugins-4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-plugins-4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-plugins-4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-plugins-4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-plugins-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-plugins-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-plugins-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-plugins-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-remote-4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-remote-4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-remote-4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-remote-4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-remote-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-remote-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-remote-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-remote-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-tests-4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-tests-4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-tests-4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-tests-4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:python-podman-4.4.1-1.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:python3-criu-3.15-4.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:python3-criu-3.15-4.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:python3-criu-3.15-4.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:python3-criu-3.15-4.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:python3-podman-4.4.1-1.module+el8.8.0+21741+dd5be1e7.noarch.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:runc-1.1.12-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:runc-1.1.12-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:runc-1.1.12-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:runc-1.1.12-1.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:runc-1.1.12-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:runc-debuginfo-1.1.12-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:runc-debuginfo-1.1.12-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:runc-debuginfo-1.1.12-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:runc-debuginfo-1.1.12-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:runc-debugsource-1.1.12-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:runc-debugsource-1.1.12-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:runc-debugsource-1.1.12-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:runc-debugsource-1.1.12-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:skopeo-1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:skopeo-1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:skopeo-1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:skopeo-1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:skopeo-1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:skopeo-tests-1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:skopeo-tests-1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:skopeo-tests-1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:skopeo-tests-1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:slirp4netns-1.2.0-3.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:slirp4netns-1.2.0-3.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:slirp4netns-1.2.0-3.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:slirp4netns-1.2.0-3.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:slirp4netns-1.2.0-3.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:slirp4netns-debuginfo-1.2.0-3.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:slirp4netns-debuginfo-1.2.0-3.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:slirp4netns-debuginfo-1.2.0-3.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:slirp4netns-debuginfo-1.2.0-3.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:slirp4netns-debugsource-1.2.0-3.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:slirp4netns-debugsource-1.2.0-3.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:slirp4netns-debugsource-1.2.0-3.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:slirp4netns-debugsource-1.2.0-3.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:toolbox-0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:toolbox-0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:toolbox-0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:toolbox-0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:toolbox-0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:toolbox-debuginfo-0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:toolbox-debuginfo-0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:toolbox-debuginfo-0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:toolbox-debuginfo-0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:toolbox-debugsource-0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:toolbox-debugsource-0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:toolbox-debugsource-0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:toolbox-debugsource-0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:toolbox-tests-0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:toolbox-tests-0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:toolbox-tests-0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:toolbox-tests-0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:udica-0.2.6-20.module+el8.8.0+21741+dd5be1e7.noarch.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:udica-0.2.6-20.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-1753"
},
{
"category": "external",
"summary": "RHBZ#2265513",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2265513"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-1753",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-1753"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-1753",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-1753"
},
{
"category": "external",
"summary": "https://github.com/containers/buildah/security/advisories/GHSA-pmf3-c36m-g5cf",
"url": "https://github.com/containers/buildah/security/advisories/GHSA-pmf3-c36m-g5cf"
},
{
"category": "external",
"summary": "https://github.com/containers/podman/security/advisories/GHSA-874v-pj72-92f3",
"url": "https://github.com/containers/podman/security/advisories/GHSA-874v-pj72-92f3"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2024-2658",
"url": "https://pkg.go.dev/vuln/GO-2024-2658"
}
],
"release_date": "2024-03-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-04-29T12:00:29+00:00",
"details": "For details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.8.0.Z.EUS:aardvark-dns-1.5.0-2.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:aardvark-dns-1.5.0-2.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:aardvark-dns-1.5.0-2.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:aardvark-dns-1.5.0-2.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:aardvark-dns-1.5.0-2.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:buildah-1.29.3-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:buildah-1.29.3-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:buildah-1.29.3-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:buildah-1.29.3-1.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:buildah-1.29.3-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:buildah-debuginfo-1.29.3-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:buildah-debuginfo-1.29.3-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:buildah-debuginfo-1.29.3-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:buildah-debuginfo-1.29.3-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:buildah-debugsource-1.29.3-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:buildah-debugsource-1.29.3-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:buildah-debugsource-1.29.3-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:buildah-debugsource-1.29.3-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:buildah-tests-1.29.3-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:buildah-tests-1.29.3-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:buildah-tests-1.29.3-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:buildah-tests-1.29.3-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:buildah-tests-debuginfo-1.29.3-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:buildah-tests-debuginfo-1.29.3-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:buildah-tests-debuginfo-1.29.3-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:buildah-tests-debuginfo-1.29.3-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:cockpit-podman-63.1-1.module+el8.8.0+21741+dd5be1e7.noarch.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:cockpit-podman-63.1-1.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:conmon-2.1.6-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:conmon-2.1.6-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:conmon-2.1.6-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:conmon-2.1.6-1.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:conmon-2.1.6-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:conmon-debuginfo-2.1.6-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:conmon-debuginfo-2.1.6-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:conmon-debuginfo-2.1.6-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:conmon-debuginfo-2.1.6-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:conmon-debugsource-2.1.6-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:conmon-debugsource-2.1.6-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:conmon-debugsource-2.1.6-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:conmon-debugsource-2.1.6-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:container-selinux-2.229.0-1.module+el8.8.0+21741+dd5be1e7.noarch.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:container-selinux-2.229.0-1.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:containernetworking-plugins-1.2.0-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:containernetworking-plugins-1.2.0-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:containernetworking-plugins-1.2.0-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:containernetworking-plugins-1.2.0-1.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:containernetworking-plugins-1.2.0-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:containernetworking-plugins-debuginfo-1.2.0-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:containernetworking-plugins-debuginfo-1.2.0-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:containernetworking-plugins-debuginfo-1.2.0-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:containernetworking-plugins-debuginfo-1.2.0-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:containernetworking-plugins-debugsource-1.2.0-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:containernetworking-plugins-debugsource-1.2.0-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:containernetworking-plugins-debugsource-1.2.0-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:containernetworking-plugins-debugsource-1.2.0-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:containers-common-1-65.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:containers-common-1-65.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:containers-common-1-65.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:containers-common-1-65.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:containers-common-1-65.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:crit-3.15-4.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:crit-3.15-4.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:crit-3.15-4.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:crit-3.15-4.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:criu-3.15-4.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:criu-3.15-4.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:criu-3.15-4.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:criu-3.15-4.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:criu-3.15-4.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:criu-debuginfo-3.15-4.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:criu-debuginfo-3.15-4.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:criu-debuginfo-3.15-4.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:criu-debuginfo-3.15-4.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:criu-debugsource-3.15-4.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:criu-debugsource-3.15-4.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:criu-debugsource-3.15-4.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:criu-debugsource-3.15-4.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:criu-devel-3.15-4.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:criu-devel-3.15-4.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:criu-devel-3.15-4.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:criu-devel-3.15-4.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:criu-libs-3.15-4.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:criu-libs-3.15-4.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:criu-libs-3.15-4.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:criu-libs-3.15-4.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:criu-libs-debuginfo-3.15-4.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:criu-libs-debuginfo-3.15-4.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:criu-libs-debuginfo-3.15-4.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:criu-libs-debuginfo-3.15-4.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:crun-1.8.4-2.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:crun-1.8.4-2.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:crun-1.8.4-2.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:crun-1.8.4-2.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:crun-1.8.4-2.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:crun-debuginfo-1.8.4-2.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:crun-debuginfo-1.8.4-2.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:crun-debuginfo-1.8.4-2.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:crun-debuginfo-1.8.4-2.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:crun-debugsource-1.8.4-2.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:crun-debugsource-1.8.4-2.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:crun-debugsource-1.8.4-2.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:crun-debugsource-1.8.4-2.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:fuse-overlayfs-1.11-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:fuse-overlayfs-1.11-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:fuse-overlayfs-1.11-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:fuse-overlayfs-1.11-1.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:fuse-overlayfs-1.11-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:fuse-overlayfs-debuginfo-1.11-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:fuse-overlayfs-debuginfo-1.11-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:fuse-overlayfs-debuginfo-1.11-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:fuse-overlayfs-debuginfo-1.11-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:fuse-overlayfs-debugsource-1.11-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:fuse-overlayfs-debugsource-1.11-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:fuse-overlayfs-debugsource-1.11-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:fuse-overlayfs-debugsource-1.11-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:libslirp-4.4.0-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:libslirp-4.4.0-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:libslirp-4.4.0-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:libslirp-4.4.0-1.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:libslirp-4.4.0-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:libslirp-debuginfo-4.4.0-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:libslirp-debuginfo-4.4.0-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:libslirp-debuginfo-4.4.0-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:libslirp-debuginfo-4.4.0-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:libslirp-debugsource-4.4.0-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:libslirp-debugsource-4.4.0-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:libslirp-debugsource-4.4.0-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:libslirp-debugsource-4.4.0-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:libslirp-devel-4.4.0-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:libslirp-devel-4.4.0-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:libslirp-devel-4.4.0-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:libslirp-devel-4.4.0-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:netavark-1.5.1-3.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:netavark-1.5.1-3.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:netavark-1.5.1-3.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:netavark-1.5.1-3.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:netavark-1.5.1-3.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:oci-seccomp-bpf-hook-1.2.8-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:oci-seccomp-bpf-hook-1.2.8-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:oci-seccomp-bpf-hook-1.2.8-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:oci-seccomp-bpf-hook-1.2.8-1.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:oci-seccomp-bpf-hook-1.2.8-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:oci-seccomp-bpf-hook-debuginfo-1.2.8-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:oci-seccomp-bpf-hook-debuginfo-1.2.8-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:oci-seccomp-bpf-hook-debuginfo-1.2.8-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:oci-seccomp-bpf-hook-debuginfo-1.2.8-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:oci-seccomp-bpf-hook-debugsource-1.2.8-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:oci-seccomp-bpf-hook-debugsource-1.2.8-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:oci-seccomp-bpf-hook-debugsource-1.2.8-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:oci-seccomp-bpf-hook-debugsource-1.2.8-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-4.4.1-19.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-catatonit-4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-catatonit-4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-catatonit-4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-catatonit-4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-catatonit-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-catatonit-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-catatonit-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-catatonit-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-debugsource-4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-debugsource-4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-debugsource-4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-debugsource-4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-docker-4.4.1-19.module+el8.8.0+21741+dd5be1e7.noarch.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-gvproxy-4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-gvproxy-4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-gvproxy-4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-gvproxy-4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-gvproxy-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-gvproxy-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-gvproxy-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-gvproxy-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-plugins-4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-plugins-4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-plugins-4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-plugins-4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-plugins-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-plugins-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-plugins-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-plugins-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-remote-4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-remote-4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-remote-4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-remote-4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-remote-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-remote-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-remote-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-remote-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-tests-4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-tests-4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-tests-4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-tests-4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:python-podman-4.4.1-1.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:python3-criu-3.15-4.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:python3-criu-3.15-4.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:python3-criu-3.15-4.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:python3-criu-3.15-4.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:python3-podman-4.4.1-1.module+el8.8.0+21741+dd5be1e7.noarch.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:runc-1.1.12-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:runc-1.1.12-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:runc-1.1.12-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:runc-1.1.12-1.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:runc-1.1.12-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:runc-debuginfo-1.1.12-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:runc-debuginfo-1.1.12-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:runc-debuginfo-1.1.12-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:runc-debuginfo-1.1.12-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:runc-debugsource-1.1.12-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:runc-debugsource-1.1.12-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:runc-debugsource-1.1.12-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:runc-debugsource-1.1.12-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:skopeo-1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:skopeo-1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:skopeo-1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:skopeo-1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:skopeo-1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:skopeo-tests-1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:skopeo-tests-1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:skopeo-tests-1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:skopeo-tests-1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:slirp4netns-1.2.0-3.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:slirp4netns-1.2.0-3.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:slirp4netns-1.2.0-3.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:slirp4netns-1.2.0-3.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:slirp4netns-1.2.0-3.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:slirp4netns-debuginfo-1.2.0-3.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:slirp4netns-debuginfo-1.2.0-3.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:slirp4netns-debuginfo-1.2.0-3.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:slirp4netns-debuginfo-1.2.0-3.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:slirp4netns-debugsource-1.2.0-3.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:slirp4netns-debugsource-1.2.0-3.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:slirp4netns-debugsource-1.2.0-3.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:slirp4netns-debugsource-1.2.0-3.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:toolbox-0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:toolbox-0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:toolbox-0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:toolbox-0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:toolbox-0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:toolbox-debuginfo-0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:toolbox-debuginfo-0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:toolbox-debuginfo-0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:toolbox-debuginfo-0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:toolbox-debugsource-0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:toolbox-debugsource-0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:toolbox-debugsource-0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:toolbox-debugsource-0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:toolbox-tests-0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:toolbox-tests-0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:toolbox-tests-0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:toolbox-tests-0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:udica-0.2.6-20.module+el8.8.0+21741+dd5be1e7.noarch.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:udica-0.2.6-20.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:2077"
},
{
"category": "workaround",
"details": "When SELinux is enabled, the container is restricted to limited read-only access.",
"product_ids": [
"AppStream-8.8.0.Z.EUS:aardvark-dns-1.5.0-2.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:aardvark-dns-1.5.0-2.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:aardvark-dns-1.5.0-2.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:aardvark-dns-1.5.0-2.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:aardvark-dns-1.5.0-2.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:buildah-1.29.3-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:buildah-1.29.3-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:buildah-1.29.3-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:buildah-1.29.3-1.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:buildah-1.29.3-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:buildah-debuginfo-1.29.3-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:buildah-debuginfo-1.29.3-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:buildah-debuginfo-1.29.3-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:buildah-debuginfo-1.29.3-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:buildah-debugsource-1.29.3-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:buildah-debugsource-1.29.3-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:buildah-debugsource-1.29.3-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:buildah-debugsource-1.29.3-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:buildah-tests-1.29.3-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:buildah-tests-1.29.3-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:buildah-tests-1.29.3-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:buildah-tests-1.29.3-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:buildah-tests-debuginfo-1.29.3-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:buildah-tests-debuginfo-1.29.3-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:buildah-tests-debuginfo-1.29.3-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:buildah-tests-debuginfo-1.29.3-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:cockpit-podman-63.1-1.module+el8.8.0+21741+dd5be1e7.noarch.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:cockpit-podman-63.1-1.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:conmon-2.1.6-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:conmon-2.1.6-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:conmon-2.1.6-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:conmon-2.1.6-1.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:conmon-2.1.6-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:conmon-debuginfo-2.1.6-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:conmon-debuginfo-2.1.6-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:conmon-debuginfo-2.1.6-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:conmon-debuginfo-2.1.6-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:conmon-debugsource-2.1.6-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:conmon-debugsource-2.1.6-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:conmon-debugsource-2.1.6-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:conmon-debugsource-2.1.6-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:container-selinux-2.229.0-1.module+el8.8.0+21741+dd5be1e7.noarch.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:container-selinux-2.229.0-1.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:containernetworking-plugins-1.2.0-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:containernetworking-plugins-1.2.0-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:containernetworking-plugins-1.2.0-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:containernetworking-plugins-1.2.0-1.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:containernetworking-plugins-1.2.0-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:containernetworking-plugins-debuginfo-1.2.0-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:containernetworking-plugins-debuginfo-1.2.0-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:containernetworking-plugins-debuginfo-1.2.0-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:containernetworking-plugins-debuginfo-1.2.0-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:containernetworking-plugins-debugsource-1.2.0-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:containernetworking-plugins-debugsource-1.2.0-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:containernetworking-plugins-debugsource-1.2.0-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:containernetworking-plugins-debugsource-1.2.0-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:containers-common-1-65.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:containers-common-1-65.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:containers-common-1-65.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:containers-common-1-65.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:containers-common-1-65.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:crit-3.15-4.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:crit-3.15-4.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:crit-3.15-4.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:crit-3.15-4.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:criu-3.15-4.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:criu-3.15-4.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:criu-3.15-4.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:criu-3.15-4.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:criu-3.15-4.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:criu-debuginfo-3.15-4.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:criu-debuginfo-3.15-4.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:criu-debuginfo-3.15-4.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:criu-debuginfo-3.15-4.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:criu-debugsource-3.15-4.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:criu-debugsource-3.15-4.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:criu-debugsource-3.15-4.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:criu-debugsource-3.15-4.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:criu-devel-3.15-4.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:criu-devel-3.15-4.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:criu-devel-3.15-4.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:criu-devel-3.15-4.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:criu-libs-3.15-4.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:criu-libs-3.15-4.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:criu-libs-3.15-4.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:criu-libs-3.15-4.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:criu-libs-debuginfo-3.15-4.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:criu-libs-debuginfo-3.15-4.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:criu-libs-debuginfo-3.15-4.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:criu-libs-debuginfo-3.15-4.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:crun-1.8.4-2.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:crun-1.8.4-2.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:crun-1.8.4-2.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:crun-1.8.4-2.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:crun-1.8.4-2.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:crun-debuginfo-1.8.4-2.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:crun-debuginfo-1.8.4-2.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:crun-debuginfo-1.8.4-2.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:crun-debuginfo-1.8.4-2.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:crun-debugsource-1.8.4-2.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:crun-debugsource-1.8.4-2.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:crun-debugsource-1.8.4-2.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:crun-debugsource-1.8.4-2.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:fuse-overlayfs-1.11-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:fuse-overlayfs-1.11-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:fuse-overlayfs-1.11-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:fuse-overlayfs-1.11-1.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:fuse-overlayfs-1.11-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:fuse-overlayfs-debuginfo-1.11-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:fuse-overlayfs-debuginfo-1.11-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:fuse-overlayfs-debuginfo-1.11-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:fuse-overlayfs-debuginfo-1.11-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:fuse-overlayfs-debugsource-1.11-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:fuse-overlayfs-debugsource-1.11-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:fuse-overlayfs-debugsource-1.11-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:fuse-overlayfs-debugsource-1.11-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:libslirp-4.4.0-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:libslirp-4.4.0-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:libslirp-4.4.0-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:libslirp-4.4.0-1.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:libslirp-4.4.0-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:libslirp-debuginfo-4.4.0-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:libslirp-debuginfo-4.4.0-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:libslirp-debuginfo-4.4.0-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:libslirp-debuginfo-4.4.0-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:libslirp-debugsource-4.4.0-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:libslirp-debugsource-4.4.0-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:libslirp-debugsource-4.4.0-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:libslirp-debugsource-4.4.0-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:libslirp-devel-4.4.0-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:libslirp-devel-4.4.0-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:libslirp-devel-4.4.0-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:libslirp-devel-4.4.0-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:netavark-1.5.1-3.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:netavark-1.5.1-3.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:netavark-1.5.1-3.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:netavark-1.5.1-3.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:netavark-1.5.1-3.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:oci-seccomp-bpf-hook-1.2.8-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:oci-seccomp-bpf-hook-1.2.8-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:oci-seccomp-bpf-hook-1.2.8-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:oci-seccomp-bpf-hook-1.2.8-1.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:oci-seccomp-bpf-hook-1.2.8-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:oci-seccomp-bpf-hook-debuginfo-1.2.8-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:oci-seccomp-bpf-hook-debuginfo-1.2.8-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:oci-seccomp-bpf-hook-debuginfo-1.2.8-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:oci-seccomp-bpf-hook-debuginfo-1.2.8-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:oci-seccomp-bpf-hook-debugsource-1.2.8-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:oci-seccomp-bpf-hook-debugsource-1.2.8-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:oci-seccomp-bpf-hook-debugsource-1.2.8-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:oci-seccomp-bpf-hook-debugsource-1.2.8-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-4.4.1-19.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-catatonit-4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-catatonit-4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-catatonit-4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-catatonit-4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-catatonit-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-catatonit-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-catatonit-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-catatonit-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-debugsource-4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-debugsource-4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-debugsource-4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-debugsource-4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-docker-4.4.1-19.module+el8.8.0+21741+dd5be1e7.noarch.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-gvproxy-4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-gvproxy-4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-gvproxy-4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-gvproxy-4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-gvproxy-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-gvproxy-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-gvproxy-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-gvproxy-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-plugins-4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-plugins-4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-plugins-4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-plugins-4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-plugins-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-plugins-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-plugins-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-plugins-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-remote-4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-remote-4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-remote-4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-remote-4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-remote-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-remote-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-remote-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-remote-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-tests-4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-tests-4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-tests-4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-tests-4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:python-podman-4.4.1-1.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:python3-criu-3.15-4.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:python3-criu-3.15-4.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:python3-criu-3.15-4.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:python3-criu-3.15-4.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:python3-podman-4.4.1-1.module+el8.8.0+21741+dd5be1e7.noarch.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:runc-1.1.12-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:runc-1.1.12-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:runc-1.1.12-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:runc-1.1.12-1.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:runc-1.1.12-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:runc-debuginfo-1.1.12-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:runc-debuginfo-1.1.12-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:runc-debuginfo-1.1.12-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:runc-debuginfo-1.1.12-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:runc-debugsource-1.1.12-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:runc-debugsource-1.1.12-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:runc-debugsource-1.1.12-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:runc-debugsource-1.1.12-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:skopeo-1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:skopeo-1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:skopeo-1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:skopeo-1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:skopeo-1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:skopeo-tests-1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:skopeo-tests-1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:skopeo-tests-1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:skopeo-tests-1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:slirp4netns-1.2.0-3.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:slirp4netns-1.2.0-3.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:slirp4netns-1.2.0-3.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:slirp4netns-1.2.0-3.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:slirp4netns-1.2.0-3.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:slirp4netns-debuginfo-1.2.0-3.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:slirp4netns-debuginfo-1.2.0-3.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:slirp4netns-debuginfo-1.2.0-3.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:slirp4netns-debuginfo-1.2.0-3.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:slirp4netns-debugsource-1.2.0-3.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:slirp4netns-debugsource-1.2.0-3.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:slirp4netns-debugsource-1.2.0-3.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:slirp4netns-debugsource-1.2.0-3.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:toolbox-0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:toolbox-0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:toolbox-0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:toolbox-0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:toolbox-0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:toolbox-debuginfo-0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:toolbox-debuginfo-0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:toolbox-debuginfo-0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:toolbox-debuginfo-0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:toolbox-debugsource-0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:toolbox-debugsource-0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:toolbox-debugsource-0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:toolbox-debugsource-0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:toolbox-tests-0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:toolbox-tests-0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:toolbox-tests-0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:toolbox-tests-0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:udica-0.2.6-20.module+el8.8.0+21741+dd5be1e7.noarch.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:udica-0.2.6-20.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 8.6,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.8.0.Z.EUS:aardvark-dns-1.5.0-2.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:aardvark-dns-1.5.0-2.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:aardvark-dns-1.5.0-2.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:aardvark-dns-1.5.0-2.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:aardvark-dns-1.5.0-2.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:buildah-1.29.3-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:buildah-1.29.3-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:buildah-1.29.3-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:buildah-1.29.3-1.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:buildah-1.29.3-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:buildah-debuginfo-1.29.3-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:buildah-debuginfo-1.29.3-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:buildah-debuginfo-1.29.3-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:buildah-debuginfo-1.29.3-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:buildah-debugsource-1.29.3-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:buildah-debugsource-1.29.3-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:buildah-debugsource-1.29.3-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:buildah-debugsource-1.29.3-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:buildah-tests-1.29.3-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:buildah-tests-1.29.3-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:buildah-tests-1.29.3-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:buildah-tests-1.29.3-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:buildah-tests-debuginfo-1.29.3-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:buildah-tests-debuginfo-1.29.3-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:buildah-tests-debuginfo-1.29.3-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:buildah-tests-debuginfo-1.29.3-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:cockpit-podman-63.1-1.module+el8.8.0+21741+dd5be1e7.noarch.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:cockpit-podman-63.1-1.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:conmon-2.1.6-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:conmon-2.1.6-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:conmon-2.1.6-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:conmon-2.1.6-1.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:conmon-2.1.6-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:conmon-debuginfo-2.1.6-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:conmon-debuginfo-2.1.6-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:conmon-debuginfo-2.1.6-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:conmon-debuginfo-2.1.6-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:conmon-debugsource-2.1.6-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:conmon-debugsource-2.1.6-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:conmon-debugsource-2.1.6-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:conmon-debugsource-2.1.6-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:container-selinux-2.229.0-1.module+el8.8.0+21741+dd5be1e7.noarch.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:container-selinux-2.229.0-1.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:containernetworking-plugins-1.2.0-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:containernetworking-plugins-1.2.0-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:containernetworking-plugins-1.2.0-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:containernetworking-plugins-1.2.0-1.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:containernetworking-plugins-1.2.0-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:containernetworking-plugins-debuginfo-1.2.0-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:containernetworking-plugins-debuginfo-1.2.0-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:containernetworking-plugins-debuginfo-1.2.0-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:containernetworking-plugins-debuginfo-1.2.0-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:containernetworking-plugins-debugsource-1.2.0-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:containernetworking-plugins-debugsource-1.2.0-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:containernetworking-plugins-debugsource-1.2.0-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:containernetworking-plugins-debugsource-1.2.0-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:containers-common-1-65.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:containers-common-1-65.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:containers-common-1-65.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:containers-common-1-65.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:containers-common-1-65.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:crit-3.15-4.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:crit-3.15-4.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:crit-3.15-4.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:crit-3.15-4.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:criu-3.15-4.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:criu-3.15-4.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:criu-3.15-4.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:criu-3.15-4.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:criu-3.15-4.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:criu-debuginfo-3.15-4.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:criu-debuginfo-3.15-4.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:criu-debuginfo-3.15-4.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:criu-debuginfo-3.15-4.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:criu-debugsource-3.15-4.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:criu-debugsource-3.15-4.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:criu-debugsource-3.15-4.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:criu-debugsource-3.15-4.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:criu-devel-3.15-4.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:criu-devel-3.15-4.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:criu-devel-3.15-4.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:criu-devel-3.15-4.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:criu-libs-3.15-4.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:criu-libs-3.15-4.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:criu-libs-3.15-4.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:criu-libs-3.15-4.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:criu-libs-debuginfo-3.15-4.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:criu-libs-debuginfo-3.15-4.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:criu-libs-debuginfo-3.15-4.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:criu-libs-debuginfo-3.15-4.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:crun-1.8.4-2.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:crun-1.8.4-2.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:crun-1.8.4-2.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:crun-1.8.4-2.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:crun-1.8.4-2.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:crun-debuginfo-1.8.4-2.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:crun-debuginfo-1.8.4-2.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:crun-debuginfo-1.8.4-2.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:crun-debuginfo-1.8.4-2.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:crun-debugsource-1.8.4-2.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:crun-debugsource-1.8.4-2.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:crun-debugsource-1.8.4-2.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:crun-debugsource-1.8.4-2.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:fuse-overlayfs-1.11-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:fuse-overlayfs-1.11-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:fuse-overlayfs-1.11-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:fuse-overlayfs-1.11-1.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:fuse-overlayfs-1.11-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:fuse-overlayfs-debuginfo-1.11-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:fuse-overlayfs-debuginfo-1.11-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:fuse-overlayfs-debuginfo-1.11-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:fuse-overlayfs-debuginfo-1.11-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:fuse-overlayfs-debugsource-1.11-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:fuse-overlayfs-debugsource-1.11-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:fuse-overlayfs-debugsource-1.11-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:fuse-overlayfs-debugsource-1.11-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:libslirp-4.4.0-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:libslirp-4.4.0-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:libslirp-4.4.0-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:libslirp-4.4.0-1.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:libslirp-4.4.0-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:libslirp-debuginfo-4.4.0-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:libslirp-debuginfo-4.4.0-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:libslirp-debuginfo-4.4.0-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:libslirp-debuginfo-4.4.0-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:libslirp-debugsource-4.4.0-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:libslirp-debugsource-4.4.0-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:libslirp-debugsource-4.4.0-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:libslirp-debugsource-4.4.0-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:libslirp-devel-4.4.0-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:libslirp-devel-4.4.0-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:libslirp-devel-4.4.0-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:libslirp-devel-4.4.0-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:netavark-1.5.1-3.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:netavark-1.5.1-3.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:netavark-1.5.1-3.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:netavark-1.5.1-3.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:netavark-1.5.1-3.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:oci-seccomp-bpf-hook-1.2.8-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:oci-seccomp-bpf-hook-1.2.8-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:oci-seccomp-bpf-hook-1.2.8-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:oci-seccomp-bpf-hook-1.2.8-1.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:oci-seccomp-bpf-hook-1.2.8-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:oci-seccomp-bpf-hook-debuginfo-1.2.8-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:oci-seccomp-bpf-hook-debuginfo-1.2.8-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:oci-seccomp-bpf-hook-debuginfo-1.2.8-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:oci-seccomp-bpf-hook-debuginfo-1.2.8-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:oci-seccomp-bpf-hook-debugsource-1.2.8-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:oci-seccomp-bpf-hook-debugsource-1.2.8-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:oci-seccomp-bpf-hook-debugsource-1.2.8-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:oci-seccomp-bpf-hook-debugsource-1.2.8-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-4.4.1-19.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-catatonit-4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-catatonit-4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-catatonit-4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-catatonit-4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-catatonit-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-catatonit-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-catatonit-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-catatonit-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-debugsource-4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-debugsource-4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-debugsource-4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-debugsource-4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-docker-4.4.1-19.module+el8.8.0+21741+dd5be1e7.noarch.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-gvproxy-4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-gvproxy-4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-gvproxy-4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-gvproxy-4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-gvproxy-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-gvproxy-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-gvproxy-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-gvproxy-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-plugins-4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-plugins-4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-plugins-4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-plugins-4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-plugins-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-plugins-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-plugins-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-plugins-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-remote-4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-remote-4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-remote-4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-remote-4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-remote-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-remote-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-remote-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-remote-debuginfo-4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-tests-4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-tests-4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-tests-4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:podman-tests-4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:python-podman-4.4.1-1.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:python3-criu-3.15-4.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:python3-criu-3.15-4.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:python3-criu-3.15-4.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:python3-criu-3.15-4.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:python3-podman-4.4.1-1.module+el8.8.0+21741+dd5be1e7.noarch.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:runc-1.1.12-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:runc-1.1.12-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:runc-1.1.12-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:runc-1.1.12-1.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:runc-1.1.12-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:runc-debuginfo-1.1.12-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:runc-debuginfo-1.1.12-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:runc-debuginfo-1.1.12-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:runc-debuginfo-1.1.12-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:runc-debugsource-1.1.12-1.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:runc-debugsource-1.1.12-1.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:runc-debugsource-1.1.12-1.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:runc-debugsource-1.1.12-1.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:skopeo-1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:skopeo-1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:skopeo-1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:skopeo-1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:skopeo-1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:skopeo-tests-1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:skopeo-tests-1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:skopeo-tests-1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:skopeo-tests-1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:slirp4netns-1.2.0-3.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:slirp4netns-1.2.0-3.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:slirp4netns-1.2.0-3.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:slirp4netns-1.2.0-3.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:slirp4netns-1.2.0-3.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:slirp4netns-debuginfo-1.2.0-3.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:slirp4netns-debuginfo-1.2.0-3.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:slirp4netns-debuginfo-1.2.0-3.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:slirp4netns-debuginfo-1.2.0-3.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:slirp4netns-debugsource-1.2.0-3.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:slirp4netns-debugsource-1.2.0-3.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:slirp4netns-debugsource-1.2.0-3.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:slirp4netns-debugsource-1.2.0-3.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:toolbox-0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:toolbox-0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:toolbox-0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:toolbox-0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:toolbox-0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:toolbox-debuginfo-0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:toolbox-debuginfo-0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:toolbox-debuginfo-0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:toolbox-debuginfo-0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:toolbox-debugsource-0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:toolbox-debugsource-0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:toolbox-debugsource-0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:toolbox-debugsource-0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:toolbox-tests-0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.aarch64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:toolbox-tests-0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.ppc64le.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:toolbox-tests-0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.s390x.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:toolbox-tests-0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.x86_64.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:udica-0.2.6-20.module+el8.8.0+21741+dd5be1e7.noarch.rpm-container-tools:rhel8",
"AppStream-8.8.0.Z.EUS:udica-0.2.6-20.module+el8.8.0+21741+dd5be1e7.src.rpm-container-tools:rhel8"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "buildah: full container escape at build time"
}
]
}
rhsa-2022:6882
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update is now available for OpenShift Logging 5.3.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Openshift Logging 5.3.13 security and bug fix release\n\nSecurity Fix(es):\n\n* golang: golang.org/x/text/language: ParseAcceptLanguage takes a long time to parse complex tags (CVE-2022-32149)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2022:6882",
"url": "https://access.redhat.com/errata/RHSA-2022:6882"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#moderate",
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "2134010",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2134010"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2022/rhsa-2022_6882.json"
}
],
"title": "Red Hat Security Advisory: Openshift Logging 5.3.13 security and bug fix release",
"tracking": {
"current_release_date": "2025-10-10T01:53:18+00:00",
"generator": {
"date": "2025-10-10T01:53:18+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.9"
}
},
"id": "RHSA-2022:6882",
"initial_release_date": "2022-11-09T16:43:13+00:00",
"revision_history": [
{
"date": "2022-11-09T16:43:13+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2022-11-09T16:43:13+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-10-10T01:53:18+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "OpenShift Logging 5.3",
"product": {
"name": "OpenShift Logging 5.3",
"product_id": "8Base-OSE-LOGGING-5.3",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:logging:5.3::el8"
}
}
}
],
"category": "product_family",
"name": "Red Hat OpenShift Enterprise"
},
{
"branches": [
{
"category": "product_version",
"name": "openshift-logging/cluster-logging-rhel8-operator@sha256:e785074e66edd55f68d4971cb42bcc9612c9b2713593555162d82b9218368023_s390x",
"product": {
"name": "openshift-logging/cluster-logging-rhel8-operator@sha256:e785074e66edd55f68d4971cb42bcc9612c9b2713593555162d82b9218368023_s390x",
"product_id": "openshift-logging/cluster-logging-rhel8-operator@sha256:e785074e66edd55f68d4971cb42bcc9612c9b2713593555162d82b9218368023_s390x",
"product_identification_helper": {
"purl": "pkg:oci/cluster-logging-rhel8-operator@sha256:e785074e66edd55f68d4971cb42bcc9612c9b2713593555162d82b9218368023?arch=s390x\u0026repository_url=registry.redhat.io/openshift-logging/cluster-logging-rhel8-operator\u0026tag=v5.3.13-9"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/elasticsearch-rhel8-operator@sha256:34de2b2acd8ee51055a51659b5a9e8331ebdd1512be34969e60e412269b4d494_s390x",
"product": {
"name": "openshift-logging/elasticsearch-rhel8-operator@sha256:34de2b2acd8ee51055a51659b5a9e8331ebdd1512be34969e60e412269b4d494_s390x",
"product_id": "openshift-logging/elasticsearch-rhel8-operator@sha256:34de2b2acd8ee51055a51659b5a9e8331ebdd1512be34969e60e412269b4d494_s390x",
"product_identification_helper": {
"purl": "pkg:oci/elasticsearch-rhel8-operator@sha256:34de2b2acd8ee51055a51659b5a9e8331ebdd1512be34969e60e412269b4d494?arch=s390x\u0026repository_url=registry.redhat.io/openshift-logging/elasticsearch-rhel8-operator\u0026tag=v5.3.13-5"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/elasticsearch-proxy-rhel8@sha256:cea0810e580ab422b8f54ae0f095f1ef4346cfef81873b5999a66cdc2687165a_s390x",
"product": {
"name": "openshift-logging/elasticsearch-proxy-rhel8@sha256:cea0810e580ab422b8f54ae0f095f1ef4346cfef81873b5999a66cdc2687165a_s390x",
"product_id": "openshift-logging/elasticsearch-proxy-rhel8@sha256:cea0810e580ab422b8f54ae0f095f1ef4346cfef81873b5999a66cdc2687165a_s390x",
"product_identification_helper": {
"purl": "pkg:oci/elasticsearch-proxy-rhel8@sha256:cea0810e580ab422b8f54ae0f095f1ef4346cfef81873b5999a66cdc2687165a?arch=s390x\u0026repository_url=registry.redhat.io/openshift-logging/elasticsearch-proxy-rhel8\u0026tag=v1.0.0-302"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/log-file-metric-exporter-rhel8@sha256:db3841437512ac4716465336e1a520a6a702433b169e955ba04cdc41d6fa4eea_s390x",
"product": {
"name": "openshift-logging/log-file-metric-exporter-rhel8@sha256:db3841437512ac4716465336e1a520a6a702433b169e955ba04cdc41d6fa4eea_s390x",
"product_id": "openshift-logging/log-file-metric-exporter-rhel8@sha256:db3841437512ac4716465336e1a520a6a702433b169e955ba04cdc41d6fa4eea_s390x",
"product_identification_helper": {
"purl": "pkg:oci/log-file-metric-exporter-rhel8@sha256:db3841437512ac4716465336e1a520a6a702433b169e955ba04cdc41d6fa4eea?arch=s390x\u0026repository_url=registry.redhat.io/openshift-logging/log-file-metric-exporter-rhel8\u0026tag=v1.0.0-164"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/logging-curator5-rhel8@sha256:f7fa0d3ea11001123fa1f59b2ae1edb230fb96157b19ec230d876793b4ed1554_s390x",
"product": {
"name": "openshift-logging/logging-curator5-rhel8@sha256:f7fa0d3ea11001123fa1f59b2ae1edb230fb96157b19ec230d876793b4ed1554_s390x",
"product_id": "openshift-logging/logging-curator5-rhel8@sha256:f7fa0d3ea11001123fa1f59b2ae1edb230fb96157b19ec230d876793b4ed1554_s390x",
"product_identification_helper": {
"purl": "pkg:oci/logging-curator5-rhel8@sha256:f7fa0d3ea11001123fa1f59b2ae1edb230fb96157b19ec230d876793b4ed1554?arch=s390x\u0026repository_url=registry.redhat.io/openshift-logging/logging-curator5-rhel8\u0026tag=v5.8.1-242"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/elasticsearch6-rhel8@sha256:211271d2e88eaf7f0930dbf2badf78dbe051ae14b68e67073b1b1b992fa9ea6e_s390x",
"product": {
"name": "openshift-logging/elasticsearch6-rhel8@sha256:211271d2e88eaf7f0930dbf2badf78dbe051ae14b68e67073b1b1b992fa9ea6e_s390x",
"product_id": "openshift-logging/elasticsearch6-rhel8@sha256:211271d2e88eaf7f0930dbf2badf78dbe051ae14b68e67073b1b1b992fa9ea6e_s390x",
"product_identification_helper": {
"purl": "pkg:oci/elasticsearch6-rhel8@sha256:211271d2e88eaf7f0930dbf2badf78dbe051ae14b68e67073b1b1b992fa9ea6e?arch=s390x\u0026repository_url=registry.redhat.io/openshift-logging/elasticsearch6-rhel8\u0026tag=v6.8.1-261"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/fluentd-rhel8@sha256:b712b4568533eccc3e67894c69a27f024a710c0a0759cb04a799077bc21ad7b0_s390x",
"product": {
"name": "openshift-logging/fluentd-rhel8@sha256:b712b4568533eccc3e67894c69a27f024a710c0a0759cb04a799077bc21ad7b0_s390x",
"product_id": "openshift-logging/fluentd-rhel8@sha256:b712b4568533eccc3e67894c69a27f024a710c0a0759cb04a799077bc21ad7b0_s390x",
"product_identification_helper": {
"purl": "pkg:oci/fluentd-rhel8@sha256:b712b4568533eccc3e67894c69a27f024a710c0a0759cb04a799077bc21ad7b0?arch=s390x\u0026repository_url=registry.redhat.io/openshift-logging/fluentd-rhel8\u0026tag=v1.7.4-217"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/kibana6-rhel8@sha256:a3c5a69dba9fafdbbe21b7eaf0792a8d0d7dbc108977dde72bce3af4ba709a01_s390x",
"product": {
"name": "openshift-logging/kibana6-rhel8@sha256:a3c5a69dba9fafdbbe21b7eaf0792a8d0d7dbc108977dde72bce3af4ba709a01_s390x",
"product_id": "openshift-logging/kibana6-rhel8@sha256:a3c5a69dba9fafdbbe21b7eaf0792a8d0d7dbc108977dde72bce3af4ba709a01_s390x",
"product_identification_helper": {
"purl": "pkg:oci/kibana6-rhel8@sha256:a3c5a69dba9fafdbbe21b7eaf0792a8d0d7dbc108977dde72bce3af4ba709a01?arch=s390x\u0026repository_url=registry.redhat.io/openshift-logging/kibana6-rhel8\u0026tag=v6.8.1-298"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "openshift-logging/cluster-logging-rhel8-operator@sha256:d05f697c6da62036fcbba633a4cb6d253fdd6882c9205ad9a7cb9710878402a0_amd64",
"product": {
"name": "openshift-logging/cluster-logging-rhel8-operator@sha256:d05f697c6da62036fcbba633a4cb6d253fdd6882c9205ad9a7cb9710878402a0_amd64",
"product_id": "openshift-logging/cluster-logging-rhel8-operator@sha256:d05f697c6da62036fcbba633a4cb6d253fdd6882c9205ad9a7cb9710878402a0_amd64",
"product_identification_helper": {
"purl": "pkg:oci/cluster-logging-rhel8-operator@sha256:d05f697c6da62036fcbba633a4cb6d253fdd6882c9205ad9a7cb9710878402a0?arch=amd64\u0026repository_url=registry.redhat.io/openshift-logging/cluster-logging-rhel8-operator\u0026tag=v5.3.13-9"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/cluster-logging-operator-bundle@sha256:b78456120cab1aac6044a6953e4dfd899f3c7d6b58a0e5cd8f166e4bffb5d941_amd64",
"product": {
"name": "openshift-logging/cluster-logging-operator-bundle@sha256:b78456120cab1aac6044a6953e4dfd899f3c7d6b58a0e5cd8f166e4bffb5d941_amd64",
"product_id": "openshift-logging/cluster-logging-operator-bundle@sha256:b78456120cab1aac6044a6953e4dfd899f3c7d6b58a0e5cd8f166e4bffb5d941_amd64",
"product_identification_helper": {
"purl": "pkg:oci/cluster-logging-operator-bundle@sha256:b78456120cab1aac6044a6953e4dfd899f3c7d6b58a0e5cd8f166e4bffb5d941?arch=amd64\u0026repository_url=registry.redhat.io/openshift-logging/cluster-logging-operator-bundle\u0026tag=v5.3.13-10"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/elasticsearch-rhel8-operator@sha256:a57abda6ba1cde99d47f6ea7a63e17a258f1f9ea73ca8bceadad7541477e7b81_amd64",
"product": {
"name": "openshift-logging/elasticsearch-rhel8-operator@sha256:a57abda6ba1cde99d47f6ea7a63e17a258f1f9ea73ca8bceadad7541477e7b81_amd64",
"product_id": "openshift-logging/elasticsearch-rhel8-operator@sha256:a57abda6ba1cde99d47f6ea7a63e17a258f1f9ea73ca8bceadad7541477e7b81_amd64",
"product_identification_helper": {
"purl": "pkg:oci/elasticsearch-rhel8-operator@sha256:a57abda6ba1cde99d47f6ea7a63e17a258f1f9ea73ca8bceadad7541477e7b81?arch=amd64\u0026repository_url=registry.redhat.io/openshift-logging/elasticsearch-rhel8-operator\u0026tag=v5.3.13-5"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/elasticsearch-operator-bundle@sha256:c5218abf99c5401fbcec34c93f99805e109d889b27c28719f0ce75a952015f17_amd64",
"product": {
"name": "openshift-logging/elasticsearch-operator-bundle@sha256:c5218abf99c5401fbcec34c93f99805e109d889b27c28719f0ce75a952015f17_amd64",
"product_id": "openshift-logging/elasticsearch-operator-bundle@sha256:c5218abf99c5401fbcec34c93f99805e109d889b27c28719f0ce75a952015f17_amd64",
"product_identification_helper": {
"purl": "pkg:oci/elasticsearch-operator-bundle@sha256:c5218abf99c5401fbcec34c93f99805e109d889b27c28719f0ce75a952015f17?arch=amd64\u0026repository_url=registry.redhat.io/openshift-logging/elasticsearch-operator-bundle\u0026tag=v5.3.13-24"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/elasticsearch-proxy-rhel8@sha256:2eb93d134ac01322408a31538fa14f3d29b77568ad20f71e2bc2303eca957c05_amd64",
"product": {
"name": "openshift-logging/elasticsearch-proxy-rhel8@sha256:2eb93d134ac01322408a31538fa14f3d29b77568ad20f71e2bc2303eca957c05_amd64",
"product_id": "openshift-logging/elasticsearch-proxy-rhel8@sha256:2eb93d134ac01322408a31538fa14f3d29b77568ad20f71e2bc2303eca957c05_amd64",
"product_identification_helper": {
"purl": "pkg:oci/elasticsearch-proxy-rhel8@sha256:2eb93d134ac01322408a31538fa14f3d29b77568ad20f71e2bc2303eca957c05?arch=amd64\u0026repository_url=registry.redhat.io/openshift-logging/elasticsearch-proxy-rhel8\u0026tag=v1.0.0-302"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/log-file-metric-exporter-rhel8@sha256:45a595d11960d01f153dfe7ff6f8336aa1ccf09c044d7e26763ae348c8dc1181_amd64",
"product": {
"name": "openshift-logging/log-file-metric-exporter-rhel8@sha256:45a595d11960d01f153dfe7ff6f8336aa1ccf09c044d7e26763ae348c8dc1181_amd64",
"product_id": "openshift-logging/log-file-metric-exporter-rhel8@sha256:45a595d11960d01f153dfe7ff6f8336aa1ccf09c044d7e26763ae348c8dc1181_amd64",
"product_identification_helper": {
"purl": "pkg:oci/log-file-metric-exporter-rhel8@sha256:45a595d11960d01f153dfe7ff6f8336aa1ccf09c044d7e26763ae348c8dc1181?arch=amd64\u0026repository_url=registry.redhat.io/openshift-logging/log-file-metric-exporter-rhel8\u0026tag=v1.0.0-164"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/logging-curator5-rhel8@sha256:e8297522f54b2649a08e10dd5a2ff7d01e6012e87cc82de876be7a2ace292011_amd64",
"product": {
"name": "openshift-logging/logging-curator5-rhel8@sha256:e8297522f54b2649a08e10dd5a2ff7d01e6012e87cc82de876be7a2ace292011_amd64",
"product_id": "openshift-logging/logging-curator5-rhel8@sha256:e8297522f54b2649a08e10dd5a2ff7d01e6012e87cc82de876be7a2ace292011_amd64",
"product_identification_helper": {
"purl": "pkg:oci/logging-curator5-rhel8@sha256:e8297522f54b2649a08e10dd5a2ff7d01e6012e87cc82de876be7a2ace292011?arch=amd64\u0026repository_url=registry.redhat.io/openshift-logging/logging-curator5-rhel8\u0026tag=v5.8.1-242"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/elasticsearch6-rhel8@sha256:96fa422c95c3aa328015bfa158f22885653191eb418718fbc416b9de1fed0a0c_amd64",
"product": {
"name": "openshift-logging/elasticsearch6-rhel8@sha256:96fa422c95c3aa328015bfa158f22885653191eb418718fbc416b9de1fed0a0c_amd64",
"product_id": "openshift-logging/elasticsearch6-rhel8@sha256:96fa422c95c3aa328015bfa158f22885653191eb418718fbc416b9de1fed0a0c_amd64",
"product_identification_helper": {
"purl": "pkg:oci/elasticsearch6-rhel8@sha256:96fa422c95c3aa328015bfa158f22885653191eb418718fbc416b9de1fed0a0c?arch=amd64\u0026repository_url=registry.redhat.io/openshift-logging/elasticsearch6-rhel8\u0026tag=v6.8.1-261"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/fluentd-rhel8@sha256:e7fbe0c13c6fd405701b13af609008e8c954c489ab567aeae27f035835c327e8_amd64",
"product": {
"name": "openshift-logging/fluentd-rhel8@sha256:e7fbe0c13c6fd405701b13af609008e8c954c489ab567aeae27f035835c327e8_amd64",
"product_id": "openshift-logging/fluentd-rhel8@sha256:e7fbe0c13c6fd405701b13af609008e8c954c489ab567aeae27f035835c327e8_amd64",
"product_identification_helper": {
"purl": "pkg:oci/fluentd-rhel8@sha256:e7fbe0c13c6fd405701b13af609008e8c954c489ab567aeae27f035835c327e8?arch=amd64\u0026repository_url=registry.redhat.io/openshift-logging/fluentd-rhel8\u0026tag=v1.7.4-217"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/kibana6-rhel8@sha256:8b3b9895d498036e7fb7451f52757ce8f3832d711254ed6649e97fe06d16195a_amd64",
"product": {
"name": "openshift-logging/kibana6-rhel8@sha256:8b3b9895d498036e7fb7451f52757ce8f3832d711254ed6649e97fe06d16195a_amd64",
"product_id": "openshift-logging/kibana6-rhel8@sha256:8b3b9895d498036e7fb7451f52757ce8f3832d711254ed6649e97fe06d16195a_amd64",
"product_identification_helper": {
"purl": "pkg:oci/kibana6-rhel8@sha256:8b3b9895d498036e7fb7451f52757ce8f3832d711254ed6649e97fe06d16195a?arch=amd64\u0026repository_url=registry.redhat.io/openshift-logging/kibana6-rhel8\u0026tag=v6.8.1-298"
}
}
}
],
"category": "architecture",
"name": "amd64"
},
{
"branches": [
{
"category": "product_version",
"name": "openshift-logging/cluster-logging-rhel8-operator@sha256:29aab5ce5c349a6370de9dec73e1c27dba1f8ee7a82e7da7cd3957839743c1d8_ppc64le",
"product": {
"name": "openshift-logging/cluster-logging-rhel8-operator@sha256:29aab5ce5c349a6370de9dec73e1c27dba1f8ee7a82e7da7cd3957839743c1d8_ppc64le",
"product_id": "openshift-logging/cluster-logging-rhel8-operator@sha256:29aab5ce5c349a6370de9dec73e1c27dba1f8ee7a82e7da7cd3957839743c1d8_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/cluster-logging-rhel8-operator@sha256:29aab5ce5c349a6370de9dec73e1c27dba1f8ee7a82e7da7cd3957839743c1d8?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-logging/cluster-logging-rhel8-operator\u0026tag=v5.3.13-9"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/elasticsearch-rhel8-operator@sha256:819e2985a882f2ddb34a137b0886d13ed764dac5b976fc4b450ba23cbc09597a_ppc64le",
"product": {
"name": "openshift-logging/elasticsearch-rhel8-operator@sha256:819e2985a882f2ddb34a137b0886d13ed764dac5b976fc4b450ba23cbc09597a_ppc64le",
"product_id": "openshift-logging/elasticsearch-rhel8-operator@sha256:819e2985a882f2ddb34a137b0886d13ed764dac5b976fc4b450ba23cbc09597a_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/elasticsearch-rhel8-operator@sha256:819e2985a882f2ddb34a137b0886d13ed764dac5b976fc4b450ba23cbc09597a?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-logging/elasticsearch-rhel8-operator\u0026tag=v5.3.13-5"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/elasticsearch-proxy-rhel8@sha256:6a0c8026b1fbc39d1a012f963eed016f3df99745235a256898cc3f92b5c913f3_ppc64le",
"product": {
"name": "openshift-logging/elasticsearch-proxy-rhel8@sha256:6a0c8026b1fbc39d1a012f963eed016f3df99745235a256898cc3f92b5c913f3_ppc64le",
"product_id": "openshift-logging/elasticsearch-proxy-rhel8@sha256:6a0c8026b1fbc39d1a012f963eed016f3df99745235a256898cc3f92b5c913f3_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/elasticsearch-proxy-rhel8@sha256:6a0c8026b1fbc39d1a012f963eed016f3df99745235a256898cc3f92b5c913f3?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-logging/elasticsearch-proxy-rhel8\u0026tag=v1.0.0-302"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/log-file-metric-exporter-rhel8@sha256:3c36dfe54c3597a2c0ba0fcf6fbd991e479847f9b7f8957fb60eb7039e1e662e_ppc64le",
"product": {
"name": "openshift-logging/log-file-metric-exporter-rhel8@sha256:3c36dfe54c3597a2c0ba0fcf6fbd991e479847f9b7f8957fb60eb7039e1e662e_ppc64le",
"product_id": "openshift-logging/log-file-metric-exporter-rhel8@sha256:3c36dfe54c3597a2c0ba0fcf6fbd991e479847f9b7f8957fb60eb7039e1e662e_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/log-file-metric-exporter-rhel8@sha256:3c36dfe54c3597a2c0ba0fcf6fbd991e479847f9b7f8957fb60eb7039e1e662e?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-logging/log-file-metric-exporter-rhel8\u0026tag=v1.0.0-164"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/logging-curator5-rhel8@sha256:8fde863a056af0d59dfa63ffa9f65af94ce5a6d2713ee84d35ea19dc5357f583_ppc64le",
"product": {
"name": "openshift-logging/logging-curator5-rhel8@sha256:8fde863a056af0d59dfa63ffa9f65af94ce5a6d2713ee84d35ea19dc5357f583_ppc64le",
"product_id": "openshift-logging/logging-curator5-rhel8@sha256:8fde863a056af0d59dfa63ffa9f65af94ce5a6d2713ee84d35ea19dc5357f583_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/logging-curator5-rhel8@sha256:8fde863a056af0d59dfa63ffa9f65af94ce5a6d2713ee84d35ea19dc5357f583?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-logging/logging-curator5-rhel8\u0026tag=v5.8.1-242"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/elasticsearch6-rhel8@sha256:1cd6bbc32620099b0e2b6a31ec0d0a82a3d4819f3d3c4ce5312b24277e89e4bf_ppc64le",
"product": {
"name": "openshift-logging/elasticsearch6-rhel8@sha256:1cd6bbc32620099b0e2b6a31ec0d0a82a3d4819f3d3c4ce5312b24277e89e4bf_ppc64le",
"product_id": "openshift-logging/elasticsearch6-rhel8@sha256:1cd6bbc32620099b0e2b6a31ec0d0a82a3d4819f3d3c4ce5312b24277e89e4bf_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/elasticsearch6-rhel8@sha256:1cd6bbc32620099b0e2b6a31ec0d0a82a3d4819f3d3c4ce5312b24277e89e4bf?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-logging/elasticsearch6-rhel8\u0026tag=v6.8.1-261"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/fluentd-rhel8@sha256:85dbeff544f48c08d0351eca88b10b7b07cea181382472a8d6b766d4facbbb5f_ppc64le",
"product": {
"name": "openshift-logging/fluentd-rhel8@sha256:85dbeff544f48c08d0351eca88b10b7b07cea181382472a8d6b766d4facbbb5f_ppc64le",
"product_id": "openshift-logging/fluentd-rhel8@sha256:85dbeff544f48c08d0351eca88b10b7b07cea181382472a8d6b766d4facbbb5f_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/fluentd-rhel8@sha256:85dbeff544f48c08d0351eca88b10b7b07cea181382472a8d6b766d4facbbb5f?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-logging/fluentd-rhel8\u0026tag=v1.7.4-217"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/kibana6-rhel8@sha256:f7ac478a6b3a33ab3be1f64a8ecf389194f9c6a1c07d936b318d7918a5f782d3_ppc64le",
"product": {
"name": "openshift-logging/kibana6-rhel8@sha256:f7ac478a6b3a33ab3be1f64a8ecf389194f9c6a1c07d936b318d7918a5f782d3_ppc64le",
"product_id": "openshift-logging/kibana6-rhel8@sha256:f7ac478a6b3a33ab3be1f64a8ecf389194f9c6a1c07d936b318d7918a5f782d3_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/kibana6-rhel8@sha256:f7ac478a6b3a33ab3be1f64a8ecf389194f9c6a1c07d936b318d7918a5f782d3?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-logging/kibana6-rhel8\u0026tag=v6.8.1-298"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/cluster-logging-operator-bundle@sha256:b78456120cab1aac6044a6953e4dfd899f3c7d6b58a0e5cd8f166e4bffb5d941_amd64 as a component of OpenShift Logging 5.3",
"product_id": "8Base-OSE-LOGGING-5.3:openshift-logging/cluster-logging-operator-bundle@sha256:b78456120cab1aac6044a6953e4dfd899f3c7d6b58a0e5cd8f166e4bffb5d941_amd64"
},
"product_reference": "openshift-logging/cluster-logging-operator-bundle@sha256:b78456120cab1aac6044a6953e4dfd899f3c7d6b58a0e5cd8f166e4bffb5d941_amd64",
"relates_to_product_reference": "8Base-OSE-LOGGING-5.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/cluster-logging-rhel8-operator@sha256:29aab5ce5c349a6370de9dec73e1c27dba1f8ee7a82e7da7cd3957839743c1d8_ppc64le as a component of OpenShift Logging 5.3",
"product_id": "8Base-OSE-LOGGING-5.3:openshift-logging/cluster-logging-rhel8-operator@sha256:29aab5ce5c349a6370de9dec73e1c27dba1f8ee7a82e7da7cd3957839743c1d8_ppc64le"
},
"product_reference": "openshift-logging/cluster-logging-rhel8-operator@sha256:29aab5ce5c349a6370de9dec73e1c27dba1f8ee7a82e7da7cd3957839743c1d8_ppc64le",
"relates_to_product_reference": "8Base-OSE-LOGGING-5.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/cluster-logging-rhel8-operator@sha256:d05f697c6da62036fcbba633a4cb6d253fdd6882c9205ad9a7cb9710878402a0_amd64 as a component of OpenShift Logging 5.3",
"product_id": "8Base-OSE-LOGGING-5.3:openshift-logging/cluster-logging-rhel8-operator@sha256:d05f697c6da62036fcbba633a4cb6d253fdd6882c9205ad9a7cb9710878402a0_amd64"
},
"product_reference": "openshift-logging/cluster-logging-rhel8-operator@sha256:d05f697c6da62036fcbba633a4cb6d253fdd6882c9205ad9a7cb9710878402a0_amd64",
"relates_to_product_reference": "8Base-OSE-LOGGING-5.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/cluster-logging-rhel8-operator@sha256:e785074e66edd55f68d4971cb42bcc9612c9b2713593555162d82b9218368023_s390x as a component of OpenShift Logging 5.3",
"product_id": "8Base-OSE-LOGGING-5.3:openshift-logging/cluster-logging-rhel8-operator@sha256:e785074e66edd55f68d4971cb42bcc9612c9b2713593555162d82b9218368023_s390x"
},
"product_reference": "openshift-logging/cluster-logging-rhel8-operator@sha256:e785074e66edd55f68d4971cb42bcc9612c9b2713593555162d82b9218368023_s390x",
"relates_to_product_reference": "8Base-OSE-LOGGING-5.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/elasticsearch-operator-bundle@sha256:c5218abf99c5401fbcec34c93f99805e109d889b27c28719f0ce75a952015f17_amd64 as a component of OpenShift Logging 5.3",
"product_id": "8Base-OSE-LOGGING-5.3:openshift-logging/elasticsearch-operator-bundle@sha256:c5218abf99c5401fbcec34c93f99805e109d889b27c28719f0ce75a952015f17_amd64"
},
"product_reference": "openshift-logging/elasticsearch-operator-bundle@sha256:c5218abf99c5401fbcec34c93f99805e109d889b27c28719f0ce75a952015f17_amd64",
"relates_to_product_reference": "8Base-OSE-LOGGING-5.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/elasticsearch-proxy-rhel8@sha256:2eb93d134ac01322408a31538fa14f3d29b77568ad20f71e2bc2303eca957c05_amd64 as a component of OpenShift Logging 5.3",
"product_id": "8Base-OSE-LOGGING-5.3:openshift-logging/elasticsearch-proxy-rhel8@sha256:2eb93d134ac01322408a31538fa14f3d29b77568ad20f71e2bc2303eca957c05_amd64"
},
"product_reference": "openshift-logging/elasticsearch-proxy-rhel8@sha256:2eb93d134ac01322408a31538fa14f3d29b77568ad20f71e2bc2303eca957c05_amd64",
"relates_to_product_reference": "8Base-OSE-LOGGING-5.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/elasticsearch-proxy-rhel8@sha256:6a0c8026b1fbc39d1a012f963eed016f3df99745235a256898cc3f92b5c913f3_ppc64le as a component of OpenShift Logging 5.3",
"product_id": "8Base-OSE-LOGGING-5.3:openshift-logging/elasticsearch-proxy-rhel8@sha256:6a0c8026b1fbc39d1a012f963eed016f3df99745235a256898cc3f92b5c913f3_ppc64le"
},
"product_reference": "openshift-logging/elasticsearch-proxy-rhel8@sha256:6a0c8026b1fbc39d1a012f963eed016f3df99745235a256898cc3f92b5c913f3_ppc64le",
"relates_to_product_reference": "8Base-OSE-LOGGING-5.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/elasticsearch-proxy-rhel8@sha256:cea0810e580ab422b8f54ae0f095f1ef4346cfef81873b5999a66cdc2687165a_s390x as a component of OpenShift Logging 5.3",
"product_id": "8Base-OSE-LOGGING-5.3:openshift-logging/elasticsearch-proxy-rhel8@sha256:cea0810e580ab422b8f54ae0f095f1ef4346cfef81873b5999a66cdc2687165a_s390x"
},
"product_reference": "openshift-logging/elasticsearch-proxy-rhel8@sha256:cea0810e580ab422b8f54ae0f095f1ef4346cfef81873b5999a66cdc2687165a_s390x",
"relates_to_product_reference": "8Base-OSE-LOGGING-5.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/elasticsearch-rhel8-operator@sha256:34de2b2acd8ee51055a51659b5a9e8331ebdd1512be34969e60e412269b4d494_s390x as a component of OpenShift Logging 5.3",
"product_id": "8Base-OSE-LOGGING-5.3:openshift-logging/elasticsearch-rhel8-operator@sha256:34de2b2acd8ee51055a51659b5a9e8331ebdd1512be34969e60e412269b4d494_s390x"
},
"product_reference": "openshift-logging/elasticsearch-rhel8-operator@sha256:34de2b2acd8ee51055a51659b5a9e8331ebdd1512be34969e60e412269b4d494_s390x",
"relates_to_product_reference": "8Base-OSE-LOGGING-5.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/elasticsearch-rhel8-operator@sha256:819e2985a882f2ddb34a137b0886d13ed764dac5b976fc4b450ba23cbc09597a_ppc64le as a component of OpenShift Logging 5.3",
"product_id": "8Base-OSE-LOGGING-5.3:openshift-logging/elasticsearch-rhel8-operator@sha256:819e2985a882f2ddb34a137b0886d13ed764dac5b976fc4b450ba23cbc09597a_ppc64le"
},
"product_reference": "openshift-logging/elasticsearch-rhel8-operator@sha256:819e2985a882f2ddb34a137b0886d13ed764dac5b976fc4b450ba23cbc09597a_ppc64le",
"relates_to_product_reference": "8Base-OSE-LOGGING-5.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/elasticsearch-rhel8-operator@sha256:a57abda6ba1cde99d47f6ea7a63e17a258f1f9ea73ca8bceadad7541477e7b81_amd64 as a component of OpenShift Logging 5.3",
"product_id": "8Base-OSE-LOGGING-5.3:openshift-logging/elasticsearch-rhel8-operator@sha256:a57abda6ba1cde99d47f6ea7a63e17a258f1f9ea73ca8bceadad7541477e7b81_amd64"
},
"product_reference": "openshift-logging/elasticsearch-rhel8-operator@sha256:a57abda6ba1cde99d47f6ea7a63e17a258f1f9ea73ca8bceadad7541477e7b81_amd64",
"relates_to_product_reference": "8Base-OSE-LOGGING-5.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/elasticsearch6-rhel8@sha256:1cd6bbc32620099b0e2b6a31ec0d0a82a3d4819f3d3c4ce5312b24277e89e4bf_ppc64le as a component of OpenShift Logging 5.3",
"product_id": "8Base-OSE-LOGGING-5.3:openshift-logging/elasticsearch6-rhel8@sha256:1cd6bbc32620099b0e2b6a31ec0d0a82a3d4819f3d3c4ce5312b24277e89e4bf_ppc64le"
},
"product_reference": "openshift-logging/elasticsearch6-rhel8@sha256:1cd6bbc32620099b0e2b6a31ec0d0a82a3d4819f3d3c4ce5312b24277e89e4bf_ppc64le",
"relates_to_product_reference": "8Base-OSE-LOGGING-5.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/elasticsearch6-rhel8@sha256:211271d2e88eaf7f0930dbf2badf78dbe051ae14b68e67073b1b1b992fa9ea6e_s390x as a component of OpenShift Logging 5.3",
"product_id": "8Base-OSE-LOGGING-5.3:openshift-logging/elasticsearch6-rhel8@sha256:211271d2e88eaf7f0930dbf2badf78dbe051ae14b68e67073b1b1b992fa9ea6e_s390x"
},
"product_reference": "openshift-logging/elasticsearch6-rhel8@sha256:211271d2e88eaf7f0930dbf2badf78dbe051ae14b68e67073b1b1b992fa9ea6e_s390x",
"relates_to_product_reference": "8Base-OSE-LOGGING-5.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/elasticsearch6-rhel8@sha256:96fa422c95c3aa328015bfa158f22885653191eb418718fbc416b9de1fed0a0c_amd64 as a component of OpenShift Logging 5.3",
"product_id": "8Base-OSE-LOGGING-5.3:openshift-logging/elasticsearch6-rhel8@sha256:96fa422c95c3aa328015bfa158f22885653191eb418718fbc416b9de1fed0a0c_amd64"
},
"product_reference": "openshift-logging/elasticsearch6-rhel8@sha256:96fa422c95c3aa328015bfa158f22885653191eb418718fbc416b9de1fed0a0c_amd64",
"relates_to_product_reference": "8Base-OSE-LOGGING-5.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/fluentd-rhel8@sha256:85dbeff544f48c08d0351eca88b10b7b07cea181382472a8d6b766d4facbbb5f_ppc64le as a component of OpenShift Logging 5.3",
"product_id": "8Base-OSE-LOGGING-5.3:openshift-logging/fluentd-rhel8@sha256:85dbeff544f48c08d0351eca88b10b7b07cea181382472a8d6b766d4facbbb5f_ppc64le"
},
"product_reference": "openshift-logging/fluentd-rhel8@sha256:85dbeff544f48c08d0351eca88b10b7b07cea181382472a8d6b766d4facbbb5f_ppc64le",
"relates_to_product_reference": "8Base-OSE-LOGGING-5.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/fluentd-rhel8@sha256:b712b4568533eccc3e67894c69a27f024a710c0a0759cb04a799077bc21ad7b0_s390x as a component of OpenShift Logging 5.3",
"product_id": "8Base-OSE-LOGGING-5.3:openshift-logging/fluentd-rhel8@sha256:b712b4568533eccc3e67894c69a27f024a710c0a0759cb04a799077bc21ad7b0_s390x"
},
"product_reference": "openshift-logging/fluentd-rhel8@sha256:b712b4568533eccc3e67894c69a27f024a710c0a0759cb04a799077bc21ad7b0_s390x",
"relates_to_product_reference": "8Base-OSE-LOGGING-5.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/fluentd-rhel8@sha256:e7fbe0c13c6fd405701b13af609008e8c954c489ab567aeae27f035835c327e8_amd64 as a component of OpenShift Logging 5.3",
"product_id": "8Base-OSE-LOGGING-5.3:openshift-logging/fluentd-rhel8@sha256:e7fbe0c13c6fd405701b13af609008e8c954c489ab567aeae27f035835c327e8_amd64"
},
"product_reference": "openshift-logging/fluentd-rhel8@sha256:e7fbe0c13c6fd405701b13af609008e8c954c489ab567aeae27f035835c327e8_amd64",
"relates_to_product_reference": "8Base-OSE-LOGGING-5.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/kibana6-rhel8@sha256:8b3b9895d498036e7fb7451f52757ce8f3832d711254ed6649e97fe06d16195a_amd64 as a component of OpenShift Logging 5.3",
"product_id": "8Base-OSE-LOGGING-5.3:openshift-logging/kibana6-rhel8@sha256:8b3b9895d498036e7fb7451f52757ce8f3832d711254ed6649e97fe06d16195a_amd64"
},
"product_reference": "openshift-logging/kibana6-rhel8@sha256:8b3b9895d498036e7fb7451f52757ce8f3832d711254ed6649e97fe06d16195a_amd64",
"relates_to_product_reference": "8Base-OSE-LOGGING-5.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/kibana6-rhel8@sha256:a3c5a69dba9fafdbbe21b7eaf0792a8d0d7dbc108977dde72bce3af4ba709a01_s390x as a component of OpenShift Logging 5.3",
"product_id": "8Base-OSE-LOGGING-5.3:openshift-logging/kibana6-rhel8@sha256:a3c5a69dba9fafdbbe21b7eaf0792a8d0d7dbc108977dde72bce3af4ba709a01_s390x"
},
"product_reference": "openshift-logging/kibana6-rhel8@sha256:a3c5a69dba9fafdbbe21b7eaf0792a8d0d7dbc108977dde72bce3af4ba709a01_s390x",
"relates_to_product_reference": "8Base-OSE-LOGGING-5.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/kibana6-rhel8@sha256:f7ac478a6b3a33ab3be1f64a8ecf389194f9c6a1c07d936b318d7918a5f782d3_ppc64le as a component of OpenShift Logging 5.3",
"product_id": "8Base-OSE-LOGGING-5.3:openshift-logging/kibana6-rhel8@sha256:f7ac478a6b3a33ab3be1f64a8ecf389194f9c6a1c07d936b318d7918a5f782d3_ppc64le"
},
"product_reference": "openshift-logging/kibana6-rhel8@sha256:f7ac478a6b3a33ab3be1f64a8ecf389194f9c6a1c07d936b318d7918a5f782d3_ppc64le",
"relates_to_product_reference": "8Base-OSE-LOGGING-5.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/log-file-metric-exporter-rhel8@sha256:3c36dfe54c3597a2c0ba0fcf6fbd991e479847f9b7f8957fb60eb7039e1e662e_ppc64le as a component of OpenShift Logging 5.3",
"product_id": "8Base-OSE-LOGGING-5.3:openshift-logging/log-file-metric-exporter-rhel8@sha256:3c36dfe54c3597a2c0ba0fcf6fbd991e479847f9b7f8957fb60eb7039e1e662e_ppc64le"
},
"product_reference": "openshift-logging/log-file-metric-exporter-rhel8@sha256:3c36dfe54c3597a2c0ba0fcf6fbd991e479847f9b7f8957fb60eb7039e1e662e_ppc64le",
"relates_to_product_reference": "8Base-OSE-LOGGING-5.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/log-file-metric-exporter-rhel8@sha256:45a595d11960d01f153dfe7ff6f8336aa1ccf09c044d7e26763ae348c8dc1181_amd64 as a component of OpenShift Logging 5.3",
"product_id": "8Base-OSE-LOGGING-5.3:openshift-logging/log-file-metric-exporter-rhel8@sha256:45a595d11960d01f153dfe7ff6f8336aa1ccf09c044d7e26763ae348c8dc1181_amd64"
},
"product_reference": "openshift-logging/log-file-metric-exporter-rhel8@sha256:45a595d11960d01f153dfe7ff6f8336aa1ccf09c044d7e26763ae348c8dc1181_amd64",
"relates_to_product_reference": "8Base-OSE-LOGGING-5.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/log-file-metric-exporter-rhel8@sha256:db3841437512ac4716465336e1a520a6a702433b169e955ba04cdc41d6fa4eea_s390x as a component of OpenShift Logging 5.3",
"product_id": "8Base-OSE-LOGGING-5.3:openshift-logging/log-file-metric-exporter-rhel8@sha256:db3841437512ac4716465336e1a520a6a702433b169e955ba04cdc41d6fa4eea_s390x"
},
"product_reference": "openshift-logging/log-file-metric-exporter-rhel8@sha256:db3841437512ac4716465336e1a520a6a702433b169e955ba04cdc41d6fa4eea_s390x",
"relates_to_product_reference": "8Base-OSE-LOGGING-5.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/logging-curator5-rhel8@sha256:8fde863a056af0d59dfa63ffa9f65af94ce5a6d2713ee84d35ea19dc5357f583_ppc64le as a component of OpenShift Logging 5.3",
"product_id": "8Base-OSE-LOGGING-5.3:openshift-logging/logging-curator5-rhel8@sha256:8fde863a056af0d59dfa63ffa9f65af94ce5a6d2713ee84d35ea19dc5357f583_ppc64le"
},
"product_reference": "openshift-logging/logging-curator5-rhel8@sha256:8fde863a056af0d59dfa63ffa9f65af94ce5a6d2713ee84d35ea19dc5357f583_ppc64le",
"relates_to_product_reference": "8Base-OSE-LOGGING-5.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/logging-curator5-rhel8@sha256:e8297522f54b2649a08e10dd5a2ff7d01e6012e87cc82de876be7a2ace292011_amd64 as a component of OpenShift Logging 5.3",
"product_id": "8Base-OSE-LOGGING-5.3:openshift-logging/logging-curator5-rhel8@sha256:e8297522f54b2649a08e10dd5a2ff7d01e6012e87cc82de876be7a2ace292011_amd64"
},
"product_reference": "openshift-logging/logging-curator5-rhel8@sha256:e8297522f54b2649a08e10dd5a2ff7d01e6012e87cc82de876be7a2ace292011_amd64",
"relates_to_product_reference": "8Base-OSE-LOGGING-5.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/logging-curator5-rhel8@sha256:f7fa0d3ea11001123fa1f59b2ae1edb230fb96157b19ec230d876793b4ed1554_s390x as a component of OpenShift Logging 5.3",
"product_id": "8Base-OSE-LOGGING-5.3:openshift-logging/logging-curator5-rhel8@sha256:f7fa0d3ea11001123fa1f59b2ae1edb230fb96157b19ec230d876793b4ed1554_s390x"
},
"product_reference": "openshift-logging/logging-curator5-rhel8@sha256:f7fa0d3ea11001123fa1f59b2ae1edb230fb96157b19ec230d876793b4ed1554_s390x",
"relates_to_product_reference": "8Base-OSE-LOGGING-5.3"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2022-32149",
"cwe": {
"id": "CWE-407",
"name": "Inefficient Algorithmic Complexity"
},
"discovery_date": "2022-10-12T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-OSE-LOGGING-5.3:openshift-logging/cluster-logging-operator-bundle@sha256:b78456120cab1aac6044a6953e4dfd899f3c7d6b58a0e5cd8f166e4bffb5d941_amd64",
"8Base-OSE-LOGGING-5.3:openshift-logging/cluster-logging-rhel8-operator@sha256:29aab5ce5c349a6370de9dec73e1c27dba1f8ee7a82e7da7cd3957839743c1d8_ppc64le",
"8Base-OSE-LOGGING-5.3:openshift-logging/cluster-logging-rhel8-operator@sha256:d05f697c6da62036fcbba633a4cb6d253fdd6882c9205ad9a7cb9710878402a0_amd64",
"8Base-OSE-LOGGING-5.3:openshift-logging/cluster-logging-rhel8-operator@sha256:e785074e66edd55f68d4971cb42bcc9612c9b2713593555162d82b9218368023_s390x",
"8Base-OSE-LOGGING-5.3:openshift-logging/elasticsearch-operator-bundle@sha256:c5218abf99c5401fbcec34c93f99805e109d889b27c28719f0ce75a952015f17_amd64",
"8Base-OSE-LOGGING-5.3:openshift-logging/elasticsearch-rhel8-operator@sha256:34de2b2acd8ee51055a51659b5a9e8331ebdd1512be34969e60e412269b4d494_s390x",
"8Base-OSE-LOGGING-5.3:openshift-logging/elasticsearch-rhel8-operator@sha256:819e2985a882f2ddb34a137b0886d13ed764dac5b976fc4b450ba23cbc09597a_ppc64le",
"8Base-OSE-LOGGING-5.3:openshift-logging/elasticsearch-rhel8-operator@sha256:a57abda6ba1cde99d47f6ea7a63e17a258f1f9ea73ca8bceadad7541477e7b81_amd64",
"8Base-OSE-LOGGING-5.3:openshift-logging/elasticsearch6-rhel8@sha256:1cd6bbc32620099b0e2b6a31ec0d0a82a3d4819f3d3c4ce5312b24277e89e4bf_ppc64le",
"8Base-OSE-LOGGING-5.3:openshift-logging/elasticsearch6-rhel8@sha256:211271d2e88eaf7f0930dbf2badf78dbe051ae14b68e67073b1b1b992fa9ea6e_s390x",
"8Base-OSE-LOGGING-5.3:openshift-logging/elasticsearch6-rhel8@sha256:96fa422c95c3aa328015bfa158f22885653191eb418718fbc416b9de1fed0a0c_amd64",
"8Base-OSE-LOGGING-5.3:openshift-logging/fluentd-rhel8@sha256:85dbeff544f48c08d0351eca88b10b7b07cea181382472a8d6b766d4facbbb5f_ppc64le",
"8Base-OSE-LOGGING-5.3:openshift-logging/fluentd-rhel8@sha256:b712b4568533eccc3e67894c69a27f024a710c0a0759cb04a799077bc21ad7b0_s390x",
"8Base-OSE-LOGGING-5.3:openshift-logging/fluentd-rhel8@sha256:e7fbe0c13c6fd405701b13af609008e8c954c489ab567aeae27f035835c327e8_amd64",
"8Base-OSE-LOGGING-5.3:openshift-logging/kibana6-rhel8@sha256:8b3b9895d498036e7fb7451f52757ce8f3832d711254ed6649e97fe06d16195a_amd64",
"8Base-OSE-LOGGING-5.3:openshift-logging/kibana6-rhel8@sha256:a3c5a69dba9fafdbbe21b7eaf0792a8d0d7dbc108977dde72bce3af4ba709a01_s390x",
"8Base-OSE-LOGGING-5.3:openshift-logging/kibana6-rhel8@sha256:f7ac478a6b3a33ab3be1f64a8ecf389194f9c6a1c07d936b318d7918a5f782d3_ppc64le",
"8Base-OSE-LOGGING-5.3:openshift-logging/log-file-metric-exporter-rhel8@sha256:3c36dfe54c3597a2c0ba0fcf6fbd991e479847f9b7f8957fb60eb7039e1e662e_ppc64le",
"8Base-OSE-LOGGING-5.3:openshift-logging/log-file-metric-exporter-rhel8@sha256:45a595d11960d01f153dfe7ff6f8336aa1ccf09c044d7e26763ae348c8dc1181_amd64",
"8Base-OSE-LOGGING-5.3:openshift-logging/log-file-metric-exporter-rhel8@sha256:db3841437512ac4716465336e1a520a6a702433b169e955ba04cdc41d6fa4eea_s390x",
"8Base-OSE-LOGGING-5.3:openshift-logging/logging-curator5-rhel8@sha256:8fde863a056af0d59dfa63ffa9f65af94ce5a6d2713ee84d35ea19dc5357f583_ppc64le",
"8Base-OSE-LOGGING-5.3:openshift-logging/logging-curator5-rhel8@sha256:e8297522f54b2649a08e10dd5a2ff7d01e6012e87cc82de876be7a2ace292011_amd64",
"8Base-OSE-LOGGING-5.3:openshift-logging/logging-curator5-rhel8@sha256:f7fa0d3ea11001123fa1f59b2ae1edb230fb96157b19ec230d876793b4ed1554_s390x"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2134010"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in the golang.org/x/text/language package. An attacker can craft an Accept-Language header which ParseAcceptLanguage will take significant time to parse. This issue leads to a denial of service, and can impact availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: golang.org/x/text/language: ParseAcceptLanguage takes a long time to parse complex tags",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "After careful analysis of the vulnerability Redhat is choosing to keep the vulnerability severity as moderate,the vulnerability exists in the ParseAcceptLanguage function of the golang text/language package,when an attacker could craft an unusually large accept header and due to the parser taking quadratic time complexity to finish, firstly the attacker would have to find a way smuggle an input to the parser and even then this would simply not result in a crash of any kind but more of resource hang which while can be unpleasant,does not equate to any real world damage.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-OSE-LOGGING-5.3:openshift-logging/elasticsearch-proxy-rhel8@sha256:2eb93d134ac01322408a31538fa14f3d29b77568ad20f71e2bc2303eca957c05_amd64",
"8Base-OSE-LOGGING-5.3:openshift-logging/elasticsearch-proxy-rhel8@sha256:6a0c8026b1fbc39d1a012f963eed016f3df99745235a256898cc3f92b5c913f3_ppc64le",
"8Base-OSE-LOGGING-5.3:openshift-logging/elasticsearch-proxy-rhel8@sha256:cea0810e580ab422b8f54ae0f095f1ef4346cfef81873b5999a66cdc2687165a_s390x"
],
"known_not_affected": [
"8Base-OSE-LOGGING-5.3:openshift-logging/cluster-logging-operator-bundle@sha256:b78456120cab1aac6044a6953e4dfd899f3c7d6b58a0e5cd8f166e4bffb5d941_amd64",
"8Base-OSE-LOGGING-5.3:openshift-logging/cluster-logging-rhel8-operator@sha256:29aab5ce5c349a6370de9dec73e1c27dba1f8ee7a82e7da7cd3957839743c1d8_ppc64le",
"8Base-OSE-LOGGING-5.3:openshift-logging/cluster-logging-rhel8-operator@sha256:d05f697c6da62036fcbba633a4cb6d253fdd6882c9205ad9a7cb9710878402a0_amd64",
"8Base-OSE-LOGGING-5.3:openshift-logging/cluster-logging-rhel8-operator@sha256:e785074e66edd55f68d4971cb42bcc9612c9b2713593555162d82b9218368023_s390x",
"8Base-OSE-LOGGING-5.3:openshift-logging/elasticsearch-operator-bundle@sha256:c5218abf99c5401fbcec34c93f99805e109d889b27c28719f0ce75a952015f17_amd64",
"8Base-OSE-LOGGING-5.3:openshift-logging/elasticsearch-rhel8-operator@sha256:34de2b2acd8ee51055a51659b5a9e8331ebdd1512be34969e60e412269b4d494_s390x",
"8Base-OSE-LOGGING-5.3:openshift-logging/elasticsearch-rhel8-operator@sha256:819e2985a882f2ddb34a137b0886d13ed764dac5b976fc4b450ba23cbc09597a_ppc64le",
"8Base-OSE-LOGGING-5.3:openshift-logging/elasticsearch-rhel8-operator@sha256:a57abda6ba1cde99d47f6ea7a63e17a258f1f9ea73ca8bceadad7541477e7b81_amd64",
"8Base-OSE-LOGGING-5.3:openshift-logging/elasticsearch6-rhel8@sha256:1cd6bbc32620099b0e2b6a31ec0d0a82a3d4819f3d3c4ce5312b24277e89e4bf_ppc64le",
"8Base-OSE-LOGGING-5.3:openshift-logging/elasticsearch6-rhel8@sha256:211271d2e88eaf7f0930dbf2badf78dbe051ae14b68e67073b1b1b992fa9ea6e_s390x",
"8Base-OSE-LOGGING-5.3:openshift-logging/elasticsearch6-rhel8@sha256:96fa422c95c3aa328015bfa158f22885653191eb418718fbc416b9de1fed0a0c_amd64",
"8Base-OSE-LOGGING-5.3:openshift-logging/fluentd-rhel8@sha256:85dbeff544f48c08d0351eca88b10b7b07cea181382472a8d6b766d4facbbb5f_ppc64le",
"8Base-OSE-LOGGING-5.3:openshift-logging/fluentd-rhel8@sha256:b712b4568533eccc3e67894c69a27f024a710c0a0759cb04a799077bc21ad7b0_s390x",
"8Base-OSE-LOGGING-5.3:openshift-logging/fluentd-rhel8@sha256:e7fbe0c13c6fd405701b13af609008e8c954c489ab567aeae27f035835c327e8_amd64",
"8Base-OSE-LOGGING-5.3:openshift-logging/kibana6-rhel8@sha256:8b3b9895d498036e7fb7451f52757ce8f3832d711254ed6649e97fe06d16195a_amd64",
"8Base-OSE-LOGGING-5.3:openshift-logging/kibana6-rhel8@sha256:a3c5a69dba9fafdbbe21b7eaf0792a8d0d7dbc108977dde72bce3af4ba709a01_s390x",
"8Base-OSE-LOGGING-5.3:openshift-logging/kibana6-rhel8@sha256:f7ac478a6b3a33ab3be1f64a8ecf389194f9c6a1c07d936b318d7918a5f782d3_ppc64le",
"8Base-OSE-LOGGING-5.3:openshift-logging/log-file-metric-exporter-rhel8@sha256:3c36dfe54c3597a2c0ba0fcf6fbd991e479847f9b7f8957fb60eb7039e1e662e_ppc64le",
"8Base-OSE-LOGGING-5.3:openshift-logging/log-file-metric-exporter-rhel8@sha256:45a595d11960d01f153dfe7ff6f8336aa1ccf09c044d7e26763ae348c8dc1181_amd64",
"8Base-OSE-LOGGING-5.3:openshift-logging/log-file-metric-exporter-rhel8@sha256:db3841437512ac4716465336e1a520a6a702433b169e955ba04cdc41d6fa4eea_s390x",
"8Base-OSE-LOGGING-5.3:openshift-logging/logging-curator5-rhel8@sha256:8fde863a056af0d59dfa63ffa9f65af94ce5a6d2713ee84d35ea19dc5357f583_ppc64le",
"8Base-OSE-LOGGING-5.3:openshift-logging/logging-curator5-rhel8@sha256:e8297522f54b2649a08e10dd5a2ff7d01e6012e87cc82de876be7a2ace292011_amd64",
"8Base-OSE-LOGGING-5.3:openshift-logging/logging-curator5-rhel8@sha256:f7fa0d3ea11001123fa1f59b2ae1edb230fb96157b19ec230d876793b4ed1554_s390x"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-32149"
},
{
"category": "external",
"summary": "RHBZ#2134010",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2134010"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-32149",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32149"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-32149",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-32149"
},
{
"category": "external",
"summary": "https://go.dev/issue/56152",
"url": "https://go.dev/issue/56152"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-dev/c/qfPIly0X7aU",
"url": "https://groups.google.com/g/golang-dev/c/qfPIly0X7aU"
}
],
"release_date": "2022-10-11T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-11-09T16:43:13+00:00",
"details": "For OpenShift Container Platform 4.9 see the following documentation, which will be updated shortly, for detailed release notes:\n\nhttps://docs.openshift.com/container-platform/4.9/logging/cluster-logging-release-notes.html\n\nFor Red Hat OpenShift Logging 5.3, see the following instructions to apply this update:\n\nhttps://docs.openshift.com/container-platform/4.9/logging/cluster-logging-upgrading.html",
"product_ids": [
"8Base-OSE-LOGGING-5.3:openshift-logging/elasticsearch-proxy-rhel8@sha256:2eb93d134ac01322408a31538fa14f3d29b77568ad20f71e2bc2303eca957c05_amd64",
"8Base-OSE-LOGGING-5.3:openshift-logging/elasticsearch-proxy-rhel8@sha256:6a0c8026b1fbc39d1a012f963eed016f3df99745235a256898cc3f92b5c913f3_ppc64le",
"8Base-OSE-LOGGING-5.3:openshift-logging/elasticsearch-proxy-rhel8@sha256:cea0810e580ab422b8f54ae0f095f1ef4346cfef81873b5999a66cdc2687165a_s390x"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:6882"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"8Base-OSE-LOGGING-5.3:openshift-logging/cluster-logging-operator-bundle@sha256:b78456120cab1aac6044a6953e4dfd899f3c7d6b58a0e5cd8f166e4bffb5d941_amd64",
"8Base-OSE-LOGGING-5.3:openshift-logging/cluster-logging-rhel8-operator@sha256:29aab5ce5c349a6370de9dec73e1c27dba1f8ee7a82e7da7cd3957839743c1d8_ppc64le",
"8Base-OSE-LOGGING-5.3:openshift-logging/cluster-logging-rhel8-operator@sha256:d05f697c6da62036fcbba633a4cb6d253fdd6882c9205ad9a7cb9710878402a0_amd64",
"8Base-OSE-LOGGING-5.3:openshift-logging/cluster-logging-rhel8-operator@sha256:e785074e66edd55f68d4971cb42bcc9612c9b2713593555162d82b9218368023_s390x",
"8Base-OSE-LOGGING-5.3:openshift-logging/elasticsearch-operator-bundle@sha256:c5218abf99c5401fbcec34c93f99805e109d889b27c28719f0ce75a952015f17_amd64",
"8Base-OSE-LOGGING-5.3:openshift-logging/elasticsearch-proxy-rhel8@sha256:2eb93d134ac01322408a31538fa14f3d29b77568ad20f71e2bc2303eca957c05_amd64",
"8Base-OSE-LOGGING-5.3:openshift-logging/elasticsearch-proxy-rhel8@sha256:6a0c8026b1fbc39d1a012f963eed016f3df99745235a256898cc3f92b5c913f3_ppc64le",
"8Base-OSE-LOGGING-5.3:openshift-logging/elasticsearch-proxy-rhel8@sha256:cea0810e580ab422b8f54ae0f095f1ef4346cfef81873b5999a66cdc2687165a_s390x",
"8Base-OSE-LOGGING-5.3:openshift-logging/elasticsearch-rhel8-operator@sha256:34de2b2acd8ee51055a51659b5a9e8331ebdd1512be34969e60e412269b4d494_s390x",
"8Base-OSE-LOGGING-5.3:openshift-logging/elasticsearch-rhel8-operator@sha256:819e2985a882f2ddb34a137b0886d13ed764dac5b976fc4b450ba23cbc09597a_ppc64le",
"8Base-OSE-LOGGING-5.3:openshift-logging/elasticsearch-rhel8-operator@sha256:a57abda6ba1cde99d47f6ea7a63e17a258f1f9ea73ca8bceadad7541477e7b81_amd64",
"8Base-OSE-LOGGING-5.3:openshift-logging/elasticsearch6-rhel8@sha256:1cd6bbc32620099b0e2b6a31ec0d0a82a3d4819f3d3c4ce5312b24277e89e4bf_ppc64le",
"8Base-OSE-LOGGING-5.3:openshift-logging/elasticsearch6-rhel8@sha256:211271d2e88eaf7f0930dbf2badf78dbe051ae14b68e67073b1b1b992fa9ea6e_s390x",
"8Base-OSE-LOGGING-5.3:openshift-logging/elasticsearch6-rhel8@sha256:96fa422c95c3aa328015bfa158f22885653191eb418718fbc416b9de1fed0a0c_amd64",
"8Base-OSE-LOGGING-5.3:openshift-logging/fluentd-rhel8@sha256:85dbeff544f48c08d0351eca88b10b7b07cea181382472a8d6b766d4facbbb5f_ppc64le",
"8Base-OSE-LOGGING-5.3:openshift-logging/fluentd-rhel8@sha256:b712b4568533eccc3e67894c69a27f024a710c0a0759cb04a799077bc21ad7b0_s390x",
"8Base-OSE-LOGGING-5.3:openshift-logging/fluentd-rhel8@sha256:e7fbe0c13c6fd405701b13af609008e8c954c489ab567aeae27f035835c327e8_amd64",
"8Base-OSE-LOGGING-5.3:openshift-logging/kibana6-rhel8@sha256:8b3b9895d498036e7fb7451f52757ce8f3832d711254ed6649e97fe06d16195a_amd64",
"8Base-OSE-LOGGING-5.3:openshift-logging/kibana6-rhel8@sha256:a3c5a69dba9fafdbbe21b7eaf0792a8d0d7dbc108977dde72bce3af4ba709a01_s390x",
"8Base-OSE-LOGGING-5.3:openshift-logging/kibana6-rhel8@sha256:f7ac478a6b3a33ab3be1f64a8ecf389194f9c6a1c07d936b318d7918a5f782d3_ppc64le",
"8Base-OSE-LOGGING-5.3:openshift-logging/log-file-metric-exporter-rhel8@sha256:3c36dfe54c3597a2c0ba0fcf6fbd991e479847f9b7f8957fb60eb7039e1e662e_ppc64le",
"8Base-OSE-LOGGING-5.3:openshift-logging/log-file-metric-exporter-rhel8@sha256:45a595d11960d01f153dfe7ff6f8336aa1ccf09c044d7e26763ae348c8dc1181_amd64",
"8Base-OSE-LOGGING-5.3:openshift-logging/log-file-metric-exporter-rhel8@sha256:db3841437512ac4716465336e1a520a6a702433b169e955ba04cdc41d6fa4eea_s390x",
"8Base-OSE-LOGGING-5.3:openshift-logging/logging-curator5-rhel8@sha256:8fde863a056af0d59dfa63ffa9f65af94ce5a6d2713ee84d35ea19dc5357f583_ppc64le",
"8Base-OSE-LOGGING-5.3:openshift-logging/logging-curator5-rhel8@sha256:e8297522f54b2649a08e10dd5a2ff7d01e6012e87cc82de876be7a2ace292011_amd64",
"8Base-OSE-LOGGING-5.3:openshift-logging/logging-curator5-rhel8@sha256:f7fa0d3ea11001123fa1f59b2ae1edb230fb96157b19ec230d876793b4ed1554_s390x"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "golang: golang.org/x/text/language: ParseAcceptLanguage takes a long time to parse complex tags"
}
]
}
RHSA-2023:3613
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Red Hat OpenShift Container Platform release 4.12.22 is now available with updates to packages and images that fix several bugs and add enhancements.\n\nThis release includes a security update for Red Hat OpenShift Container Platform 4.12.\n\nRed Hat Product Security has rated this update as having a security impact of [impact]. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Red Hat OpenShift Container Platform is Red Hat\u0027s cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments.\n\nThis advisory contains the RPM packages for Red Hat OpenShift Container Platform 4.12.22. See the following advisory for the container images for this release:\n\nhttps://access.redhat.com/errata/RHSA-2023:3615\n\nSecurity Fix(es):\n\n* golang: archive/tar: unbounded memory consumption when reading headers (CVE-2022-2879)\n\n* golang: net/http/httputil: ReverseProxy should not forward unparseable query parameters (CVE-2022-2880)\n\n* golang: net/http: handle server errors after sending GOAWAY (CVE-2022-27664)\n\n* golang: golang.org/x/text/language: ParseAcceptLanguage takes a long time to parse complex tags (CVE-2022-32149)\n\n* golang: net/url: JoinPath does not strip relative path components in all circumstances (CVE-2022-32190)\n\n* golang: regexp/syntax: limit memory used by parsing regexps (CVE-2022-41715)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAll OpenShift Container Platform 4.12 users are advised to upgrade to these updated packages and images when they are available in the appropriate release channel. To check for available updates, use the OpenShift CLI (oc) or web console. Instructions for upgrading a cluster are available at https://docs.openshift.com/container-platform/4.12/updating/updating-cluster-cli.html.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2023:3613",
"url": "https://access.redhat.com/errata/RHSA-2023:3613"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#moderate",
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "https://docs.openshift.com/container-platform/4.12/release_notes/ocp-4-12-release-notes.html",
"url": "https://docs.openshift.com/container-platform/4.12/release_notes/ocp-4-12-release-notes.html"
},
{
"category": "external",
"summary": "2124668",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2124668"
},
{
"category": "external",
"summary": "2124669",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2124669"
},
{
"category": "external",
"summary": "2132867",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2132867"
},
{
"category": "external",
"summary": "2132868",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2132868"
},
{
"category": "external",
"summary": "2132872",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2132872"
},
{
"category": "external",
"summary": "2134010",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2134010"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2023/rhsa-2023_3613.json"
}
],
"title": "Red Hat Security Advisory: OpenShift Container Platform 4.12.22 packages and security update",
"tracking": {
"current_release_date": "2025-10-10T02:07:43+00:00",
"generator": {
"date": "2025-10-10T02:07:43+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.9"
}
},
"id": "RHSA-2023:3613",
"initial_release_date": "2023-06-26T01:19:15+00:00",
"revision_history": [
{
"date": "2023-06-26T01:19:15+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2023-06-26T01:19:15+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-10-10T02:07:43+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat OpenShift Container Platform 4.12",
"product": {
"name": "Red Hat OpenShift Container Platform 4.12",
"product_id": "9Base-RHOSE-4.12",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:openshift:4.12::el9"
}
}
},
{
"category": "product_name",
"name": "Red Hat OpenShift Container Platform 4.12",
"product": {
"name": "Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:openshift:4.12::el8"
}
}
}
],
"category": "product_family",
"name": "Red Hat OpenShift Enterprise"
},
{
"branches": [
{
"category": "product_version",
"name": "buildah-1:1.23.4-5.rhaos4.12.el9.src",
"product": {
"name": "buildah-1:1.23.4-5.rhaos4.12.el9.src",
"product_id": "buildah-1:1.23.4-5.rhaos4.12.el9.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/buildah@1.23.4-5.rhaos4.12.el9?arch=src\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "conmon-2:2.1.2-5.rhaos4.12.el9.src",
"product": {
"name": "conmon-2:2.1.2-5.rhaos4.12.el9.src",
"product_id": "conmon-2:2.1.2-5.rhaos4.12.el9.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/conmon@2.1.2-5.rhaos4.12.el9?arch=src\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "openshift-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el9.src",
"product": {
"name": "openshift-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el9.src",
"product_id": "openshift-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el9.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift@4.12.0-202306121916.p0.g8c21020.assembly.stream.el9?arch=src"
}
}
},
{
"category": "product_version",
"name": "openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.src",
"product": {
"name": "openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.src",
"product_id": "openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-clients@4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9?arch=src"
}
}
},
{
"category": "product_version",
"name": "podman-3:4.2.0-7.rhaos4.12.el9.src",
"product": {
"name": "podman-3:4.2.0-7.rhaos4.12.el9.src",
"product_id": "podman-3:4.2.0-7.rhaos4.12.el9.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman@4.2.0-7.rhaos4.12.el9?arch=src\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "skopeo-2:1.9.4-3.rhaos4.12.el9.src",
"product": {
"name": "skopeo-2:1.9.4-3.rhaos4.12.el9.src",
"product_id": "skopeo-2:1.9.4-3.rhaos4.12.el9.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/skopeo@1.9.4-3.rhaos4.12.el9?arch=src\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "buildah-1:1.23.4-5.1.rhaos4.12.el8.src",
"product": {
"name": "buildah-1:1.23.4-5.1.rhaos4.12.el8.src",
"product_id": "buildah-1:1.23.4-5.1.rhaos4.12.el8.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/buildah@1.23.4-5.1.rhaos4.12.el8?arch=src\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "conmon-2:2.1.2-4.rhaos4.12.el8.src",
"product": {
"name": "conmon-2:2.1.2-4.rhaos4.12.el8.src",
"product_id": "conmon-2:2.1.2-4.rhaos4.12.el8.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/conmon@2.1.2-4.rhaos4.12.el8?arch=src\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "containernetworking-plugins-0:1.0.1-7.rhaos4.12.el8.src",
"product": {
"name": "containernetworking-plugins-0:1.0.1-7.rhaos4.12.el8.src",
"product_id": "containernetworking-plugins-0:1.0.1-7.rhaos4.12.el8.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/containernetworking-plugins@1.0.1-7.rhaos4.12.el8?arch=src"
}
}
},
{
"category": "product_version",
"name": "kernel-0:4.18.0-372.59.1.el8_6.src",
"product": {
"name": "kernel-0:4.18.0-372.59.1.el8_6.src",
"product_id": "kernel-0:4.18.0-372.59.1.el8_6.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@4.18.0-372.59.1.el8_6?arch=src"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-0:4.18.0-372.59.1.rt7.217.el8_6.src",
"product": {
"name": "kernel-rt-0:4.18.0-372.59.1.rt7.217.el8_6.src",
"product_id": "kernel-rt-0:4.18.0-372.59.1.rt7.217.el8_6.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt@4.18.0-372.59.1.rt7.217.el8_6?arch=src"
}
}
},
{
"category": "product_version",
"name": "openshift-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el8.src",
"product": {
"name": "openshift-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el8.src",
"product_id": "openshift-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el8.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift@4.12.0-202306121916.p0.g8c21020.assembly.stream.el8?arch=src"
}
}
},
{
"category": "product_version",
"name": "openshift-ansible-0:4.12.0-202306090942.p0.g74dc7b3.assembly.stream.el8.src",
"product": {
"name": "openshift-ansible-0:4.12.0-202306090942.p0.g74dc7b3.assembly.stream.el8.src",
"product_id": "openshift-ansible-0:4.12.0-202306090942.p0.g74dc7b3.assembly.stream.el8.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-ansible@4.12.0-202306090942.p0.g74dc7b3.assembly.stream.el8?arch=src"
}
}
},
{
"category": "product_version",
"name": "openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.src",
"product": {
"name": "openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.src",
"product_id": "openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-clients@4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8?arch=src"
}
}
},
{
"category": "product_version",
"name": "openshift-kuryr-0:4.12.0-202306140156.p0.g31dd228.assembly.stream.el8.src",
"product": {
"name": "openshift-kuryr-0:4.12.0-202306140156.p0.g31dd228.assembly.stream.el8.src",
"product_id": "openshift-kuryr-0:4.12.0-202306140156.p0.g31dd228.assembly.stream.el8.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-kuryr@4.12.0-202306140156.p0.g31dd228.assembly.stream.el8?arch=src"
}
}
},
{
"category": "product_version",
"name": "openshift4-aws-iso-0:4.12.0-202306090942.p0.gd2acdd5.assembly.stream.el8.src",
"product": {
"name": "openshift4-aws-iso-0:4.12.0-202306090942.p0.gd2acdd5.assembly.stream.el8.src",
"product_id": "openshift4-aws-iso-0:4.12.0-202306090942.p0.gd2acdd5.assembly.stream.el8.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift4-aws-iso@4.12.0-202306090942.p0.gd2acdd5.assembly.stream.el8?arch=src"
}
}
},
{
"category": "product_version",
"name": "podman-3:4.2.0-6.1.rhaos4.12.el8.src",
"product": {
"name": "podman-3:4.2.0-6.1.rhaos4.12.el8.src",
"product_id": "podman-3:4.2.0-6.1.rhaos4.12.el8.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman@4.2.0-6.1.rhaos4.12.el8?arch=src\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "runc-3:1.1.6-4.rhaos4.12.el8.src",
"product": {
"name": "runc-3:1.1.6-4.rhaos4.12.el8.src",
"product_id": "runc-3:1.1.6-4.rhaos4.12.el8.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/runc@1.1.6-4.rhaos4.12.el8?arch=src\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "skopeo-2:1.9.4-3.1.rhaos4.12.el8.src",
"product": {
"name": "skopeo-2:1.9.4-3.1.rhaos4.12.el8.src",
"product_id": "skopeo-2:1.9.4-3.1.rhaos4.12.el8.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/skopeo@1.9.4-3.1.rhaos4.12.el8?arch=src\u0026epoch=2"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "buildah-1:1.23.4-5.rhaos4.12.el9.x86_64",
"product": {
"name": "buildah-1:1.23.4-5.rhaos4.12.el9.x86_64",
"product_id": "buildah-1:1.23.4-5.rhaos4.12.el9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/buildah@1.23.4-5.rhaos4.12.el9?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "buildah-tests-1:1.23.4-5.rhaos4.12.el9.x86_64",
"product": {
"name": "buildah-tests-1:1.23.4-5.rhaos4.12.el9.x86_64",
"product_id": "buildah-tests-1:1.23.4-5.rhaos4.12.el9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/buildah-tests@1.23.4-5.rhaos4.12.el9?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "buildah-debugsource-1:1.23.4-5.rhaos4.12.el9.x86_64",
"product": {
"name": "buildah-debugsource-1:1.23.4-5.rhaos4.12.el9.x86_64",
"product_id": "buildah-debugsource-1:1.23.4-5.rhaos4.12.el9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/buildah-debugsource@1.23.4-5.rhaos4.12.el9?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "buildah-debuginfo-1:1.23.4-5.rhaos4.12.el9.x86_64",
"product": {
"name": "buildah-debuginfo-1:1.23.4-5.rhaos4.12.el9.x86_64",
"product_id": "buildah-debuginfo-1:1.23.4-5.rhaos4.12.el9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/buildah-debuginfo@1.23.4-5.rhaos4.12.el9?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "buildah-tests-debuginfo-1:1.23.4-5.rhaos4.12.el9.x86_64",
"product": {
"name": "buildah-tests-debuginfo-1:1.23.4-5.rhaos4.12.el9.x86_64",
"product_id": "buildah-tests-debuginfo-1:1.23.4-5.rhaos4.12.el9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/buildah-tests-debuginfo@1.23.4-5.rhaos4.12.el9?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "conmon-2:2.1.2-5.rhaos4.12.el9.x86_64",
"product": {
"name": "conmon-2:2.1.2-5.rhaos4.12.el9.x86_64",
"product_id": "conmon-2:2.1.2-5.rhaos4.12.el9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/conmon@2.1.2-5.rhaos4.12.el9?arch=x86_64\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "conmon-debugsource-2:2.1.2-5.rhaos4.12.el9.x86_64",
"product": {
"name": "conmon-debugsource-2:2.1.2-5.rhaos4.12.el9.x86_64",
"product_id": "conmon-debugsource-2:2.1.2-5.rhaos4.12.el9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/conmon-debugsource@2.1.2-5.rhaos4.12.el9?arch=x86_64\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "conmon-debuginfo-2:2.1.2-5.rhaos4.12.el9.x86_64",
"product": {
"name": "conmon-debuginfo-2:2.1.2-5.rhaos4.12.el9.x86_64",
"product_id": "conmon-debuginfo-2:2.1.2-5.rhaos4.12.el9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/conmon-debuginfo@2.1.2-5.rhaos4.12.el9?arch=x86_64\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el9.x86_64",
"product": {
"name": "openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el9.x86_64",
"product_id": "openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-hyperkube@4.12.0-202306121916.p0.g8c21020.assembly.stream.el9?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.x86_64",
"product": {
"name": "openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.x86_64",
"product_id": "openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-clients@4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "openshift-clients-redistributable-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.x86_64",
"product": {
"name": "openshift-clients-redistributable-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.x86_64",
"product_id": "openshift-clients-redistributable-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-clients-redistributable@4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "podman-3:4.2.0-7.rhaos4.12.el9.x86_64",
"product": {
"name": "podman-3:4.2.0-7.rhaos4.12.el9.x86_64",
"product_id": "podman-3:4.2.0-7.rhaos4.12.el9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman@4.2.0-7.rhaos4.12.el9?arch=x86_64\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "podman-catatonit-3:4.2.0-7.rhaos4.12.el9.x86_64",
"product": {
"name": "podman-catatonit-3:4.2.0-7.rhaos4.12.el9.x86_64",
"product_id": "podman-catatonit-3:4.2.0-7.rhaos4.12.el9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-catatonit@4.2.0-7.rhaos4.12.el9?arch=x86_64\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "podman-gvproxy-3:4.2.0-7.rhaos4.12.el9.x86_64",
"product": {
"name": "podman-gvproxy-3:4.2.0-7.rhaos4.12.el9.x86_64",
"product_id": "podman-gvproxy-3:4.2.0-7.rhaos4.12.el9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-gvproxy@4.2.0-7.rhaos4.12.el9?arch=x86_64\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "podman-plugins-3:4.2.0-7.rhaos4.12.el9.x86_64",
"product": {
"name": "podman-plugins-3:4.2.0-7.rhaos4.12.el9.x86_64",
"product_id": "podman-plugins-3:4.2.0-7.rhaos4.12.el9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-plugins@4.2.0-7.rhaos4.12.el9?arch=x86_64\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "podman-remote-3:4.2.0-7.rhaos4.12.el9.x86_64",
"product": {
"name": "podman-remote-3:4.2.0-7.rhaos4.12.el9.x86_64",
"product_id": "podman-remote-3:4.2.0-7.rhaos4.12.el9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-remote@4.2.0-7.rhaos4.12.el9?arch=x86_64\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "podman-tests-3:4.2.0-7.rhaos4.12.el9.x86_64",
"product": {
"name": "podman-tests-3:4.2.0-7.rhaos4.12.el9.x86_64",
"product_id": "podman-tests-3:4.2.0-7.rhaos4.12.el9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-tests@4.2.0-7.rhaos4.12.el9?arch=x86_64\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "podman-debugsource-3:4.2.0-7.rhaos4.12.el9.x86_64",
"product": {
"name": "podman-debugsource-3:4.2.0-7.rhaos4.12.el9.x86_64",
"product_id": "podman-debugsource-3:4.2.0-7.rhaos4.12.el9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-debugsource@4.2.0-7.rhaos4.12.el9?arch=x86_64\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "podman-catatonit-debuginfo-3:4.2.0-7.rhaos4.12.el9.x86_64",
"product": {
"name": "podman-catatonit-debuginfo-3:4.2.0-7.rhaos4.12.el9.x86_64",
"product_id": "podman-catatonit-debuginfo-3:4.2.0-7.rhaos4.12.el9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-catatonit-debuginfo@4.2.0-7.rhaos4.12.el9?arch=x86_64\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "podman-debuginfo-3:4.2.0-7.rhaos4.12.el9.x86_64",
"product": {
"name": "podman-debuginfo-3:4.2.0-7.rhaos4.12.el9.x86_64",
"product_id": "podman-debuginfo-3:4.2.0-7.rhaos4.12.el9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-debuginfo@4.2.0-7.rhaos4.12.el9?arch=x86_64\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "podman-gvproxy-debuginfo-3:4.2.0-7.rhaos4.12.el9.x86_64",
"product": {
"name": "podman-gvproxy-debuginfo-3:4.2.0-7.rhaos4.12.el9.x86_64",
"product_id": "podman-gvproxy-debuginfo-3:4.2.0-7.rhaos4.12.el9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-gvproxy-debuginfo@4.2.0-7.rhaos4.12.el9?arch=x86_64\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "podman-plugins-debuginfo-3:4.2.0-7.rhaos4.12.el9.x86_64",
"product": {
"name": "podman-plugins-debuginfo-3:4.2.0-7.rhaos4.12.el9.x86_64",
"product_id": "podman-plugins-debuginfo-3:4.2.0-7.rhaos4.12.el9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-plugins-debuginfo@4.2.0-7.rhaos4.12.el9?arch=x86_64\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "podman-remote-debuginfo-3:4.2.0-7.rhaos4.12.el9.x86_64",
"product": {
"name": "podman-remote-debuginfo-3:4.2.0-7.rhaos4.12.el9.x86_64",
"product_id": "podman-remote-debuginfo-3:4.2.0-7.rhaos4.12.el9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-remote-debuginfo@4.2.0-7.rhaos4.12.el9?arch=x86_64\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "skopeo-2:1.9.4-3.rhaos4.12.el9.x86_64",
"product": {
"name": "skopeo-2:1.9.4-3.rhaos4.12.el9.x86_64",
"product_id": "skopeo-2:1.9.4-3.rhaos4.12.el9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/skopeo@1.9.4-3.rhaos4.12.el9?arch=x86_64\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "skopeo-tests-2:1.9.4-3.rhaos4.12.el9.x86_64",
"product": {
"name": "skopeo-tests-2:1.9.4-3.rhaos4.12.el9.x86_64",
"product_id": "skopeo-tests-2:1.9.4-3.rhaos4.12.el9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/skopeo-tests@1.9.4-3.rhaos4.12.el9?arch=x86_64\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "skopeo-debugsource-2:1.9.4-3.rhaos4.12.el9.x86_64",
"product": {
"name": "skopeo-debugsource-2:1.9.4-3.rhaos4.12.el9.x86_64",
"product_id": "skopeo-debugsource-2:1.9.4-3.rhaos4.12.el9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/skopeo-debugsource@1.9.4-3.rhaos4.12.el9?arch=x86_64\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "skopeo-debuginfo-2:1.9.4-3.rhaos4.12.el9.x86_64",
"product": {
"name": "skopeo-debuginfo-2:1.9.4-3.rhaos4.12.el9.x86_64",
"product_id": "skopeo-debuginfo-2:1.9.4-3.rhaos4.12.el9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/skopeo-debuginfo@1.9.4-3.rhaos4.12.el9?arch=x86_64\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "buildah-1:1.23.4-5.1.rhaos4.12.el8.x86_64",
"product": {
"name": "buildah-1:1.23.4-5.1.rhaos4.12.el8.x86_64",
"product_id": "buildah-1:1.23.4-5.1.rhaos4.12.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/buildah@1.23.4-5.1.rhaos4.12.el8?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "buildah-tests-1:1.23.4-5.1.rhaos4.12.el8.x86_64",
"product": {
"name": "buildah-tests-1:1.23.4-5.1.rhaos4.12.el8.x86_64",
"product_id": "buildah-tests-1:1.23.4-5.1.rhaos4.12.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/buildah-tests@1.23.4-5.1.rhaos4.12.el8?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "buildah-debugsource-1:1.23.4-5.1.rhaos4.12.el8.x86_64",
"product": {
"name": "buildah-debugsource-1:1.23.4-5.1.rhaos4.12.el8.x86_64",
"product_id": "buildah-debugsource-1:1.23.4-5.1.rhaos4.12.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/buildah-debugsource@1.23.4-5.1.rhaos4.12.el8?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "buildah-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.x86_64",
"product": {
"name": "buildah-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.x86_64",
"product_id": "buildah-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/buildah-debuginfo@1.23.4-5.1.rhaos4.12.el8?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "buildah-tests-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.x86_64",
"product": {
"name": "buildah-tests-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.x86_64",
"product_id": "buildah-tests-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/buildah-tests-debuginfo@1.23.4-5.1.rhaos4.12.el8?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "conmon-2:2.1.2-4.rhaos4.12.el8.x86_64",
"product": {
"name": "conmon-2:2.1.2-4.rhaos4.12.el8.x86_64",
"product_id": "conmon-2:2.1.2-4.rhaos4.12.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/conmon@2.1.2-4.rhaos4.12.el8?arch=x86_64\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "conmon-debugsource-2:2.1.2-4.rhaos4.12.el8.x86_64",
"product": {
"name": "conmon-debugsource-2:2.1.2-4.rhaos4.12.el8.x86_64",
"product_id": "conmon-debugsource-2:2.1.2-4.rhaos4.12.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/conmon-debugsource@2.1.2-4.rhaos4.12.el8?arch=x86_64\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "conmon-debuginfo-2:2.1.2-4.rhaos4.12.el8.x86_64",
"product": {
"name": "conmon-debuginfo-2:2.1.2-4.rhaos4.12.el8.x86_64",
"product_id": "conmon-debuginfo-2:2.1.2-4.rhaos4.12.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/conmon-debuginfo@2.1.2-4.rhaos4.12.el8?arch=x86_64\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "containernetworking-plugins-0:1.0.1-7.rhaos4.12.el8.x86_64",
"product": {
"name": "containernetworking-plugins-0:1.0.1-7.rhaos4.12.el8.x86_64",
"product_id": "containernetworking-plugins-0:1.0.1-7.rhaos4.12.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/containernetworking-plugins@1.0.1-7.rhaos4.12.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "containernetworking-plugins-debugsource-0:1.0.1-7.rhaos4.12.el8.x86_64",
"product": {
"name": "containernetworking-plugins-debugsource-0:1.0.1-7.rhaos4.12.el8.x86_64",
"product_id": "containernetworking-plugins-debugsource-0:1.0.1-7.rhaos4.12.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/containernetworking-plugins-debugsource@1.0.1-7.rhaos4.12.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "containernetworking-plugins-debuginfo-0:1.0.1-7.rhaos4.12.el8.x86_64",
"product": {
"name": "containernetworking-plugins-debuginfo-0:1.0.1-7.rhaos4.12.el8.x86_64",
"product_id": "containernetworking-plugins-debuginfo-0:1.0.1-7.rhaos4.12.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/containernetworking-plugins-debuginfo@1.0.1-7.rhaos4.12.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "bpftool-0:4.18.0-372.59.1.el8_6.x86_64",
"product": {
"name": "bpftool-0:4.18.0-372.59.1.el8_6.x86_64",
"product_id": "bpftool-0:4.18.0-372.59.1.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool@4.18.0-372.59.1.el8_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-0:4.18.0-372.59.1.el8_6.x86_64",
"product": {
"name": "kernel-0:4.18.0-372.59.1.el8_6.x86_64",
"product_id": "kernel-0:4.18.0-372.59.1.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@4.18.0-372.59.1.el8_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-core-0:4.18.0-372.59.1.el8_6.x86_64",
"product": {
"name": "kernel-core-0:4.18.0-372.59.1.el8_6.x86_64",
"product_id": "kernel-core-0:4.18.0-372.59.1.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-core@4.18.0-372.59.1.el8_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-cross-headers-0:4.18.0-372.59.1.el8_6.x86_64",
"product": {
"name": "kernel-cross-headers-0:4.18.0-372.59.1.el8_6.x86_64",
"product_id": "kernel-cross-headers-0:4.18.0-372.59.1.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-cross-headers@4.18.0-372.59.1.el8_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:4.18.0-372.59.1.el8_6.x86_64",
"product": {
"name": "kernel-debug-0:4.18.0-372.59.1.el8_6.x86_64",
"product_id": "kernel-debug-0:4.18.0-372.59.1.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@4.18.0-372.59.1.el8_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-core-0:4.18.0-372.59.1.el8_6.x86_64",
"product": {
"name": "kernel-debug-core-0:4.18.0-372.59.1.el8_6.x86_64",
"product_id": "kernel-debug-core-0:4.18.0-372.59.1.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-core@4.18.0-372.59.1.el8_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:4.18.0-372.59.1.el8_6.x86_64",
"product": {
"name": "kernel-debug-devel-0:4.18.0-372.59.1.el8_6.x86_64",
"product_id": "kernel-debug-devel-0:4.18.0-372.59.1.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@4.18.0-372.59.1.el8_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-0:4.18.0-372.59.1.el8_6.x86_64",
"product": {
"name": "kernel-debug-modules-0:4.18.0-372.59.1.el8_6.x86_64",
"product_id": "kernel-debug-modules-0:4.18.0-372.59.1.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules@4.18.0-372.59.1.el8_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-extra-0:4.18.0-372.59.1.el8_6.x86_64",
"product": {
"name": "kernel-debug-modules-extra-0:4.18.0-372.59.1.el8_6.x86_64",
"product_id": "kernel-debug-modules-extra-0:4.18.0-372.59.1.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules-extra@4.18.0-372.59.1.el8_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-internal-0:4.18.0-372.59.1.el8_6.x86_64",
"product": {
"name": "kernel-debug-modules-internal-0:4.18.0-372.59.1.el8_6.x86_64",
"product_id": "kernel-debug-modules-internal-0:4.18.0-372.59.1.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules-internal@4.18.0-372.59.1.el8_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:4.18.0-372.59.1.el8_6.x86_64",
"product": {
"name": "kernel-devel-0:4.18.0-372.59.1.el8_6.x86_64",
"product_id": "kernel-devel-0:4.18.0-372.59.1.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@4.18.0-372.59.1.el8_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:4.18.0-372.59.1.el8_6.x86_64",
"product": {
"name": "kernel-headers-0:4.18.0-372.59.1.el8_6.x86_64",
"product_id": "kernel-headers-0:4.18.0-372.59.1.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@4.18.0-372.59.1.el8_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-ipaclones-internal-0:4.18.0-372.59.1.el8_6.x86_64",
"product": {
"name": "kernel-ipaclones-internal-0:4.18.0-372.59.1.el8_6.x86_64",
"product_id": "kernel-ipaclones-internal-0:4.18.0-372.59.1.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-ipaclones-internal@4.18.0-372.59.1.el8_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-0:4.18.0-372.59.1.el8_6.x86_64",
"product": {
"name": "kernel-modules-0:4.18.0-372.59.1.el8_6.x86_64",
"product_id": "kernel-modules-0:4.18.0-372.59.1.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules@4.18.0-372.59.1.el8_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-extra-0:4.18.0-372.59.1.el8_6.x86_64",
"product": {
"name": "kernel-modules-extra-0:4.18.0-372.59.1.el8_6.x86_64",
"product_id": "kernel-modules-extra-0:4.18.0-372.59.1.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules-extra@4.18.0-372.59.1.el8_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-internal-0:4.18.0-372.59.1.el8_6.x86_64",
"product": {
"name": "kernel-modules-internal-0:4.18.0-372.59.1.el8_6.x86_64",
"product_id": "kernel-modules-internal-0:4.18.0-372.59.1.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules-internal@4.18.0-372.59.1.el8_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-selftests-internal-0:4.18.0-372.59.1.el8_6.x86_64",
"product": {
"name": "kernel-selftests-internal-0:4.18.0-372.59.1.el8_6.x86_64",
"product_id": "kernel-selftests-internal-0:4.18.0-372.59.1.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-selftests-internal@4.18.0-372.59.1.el8_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:4.18.0-372.59.1.el8_6.x86_64",
"product": {
"name": "kernel-tools-0:4.18.0-372.59.1.el8_6.x86_64",
"product_id": "kernel-tools-0:4.18.0-372.59.1.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@4.18.0-372.59.1.el8_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:4.18.0-372.59.1.el8_6.x86_64",
"product": {
"name": "kernel-tools-libs-0:4.18.0-372.59.1.el8_6.x86_64",
"product_id": "kernel-tools-libs-0:4.18.0-372.59.1.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@4.18.0-372.59.1.el8_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:4.18.0-372.59.1.el8_6.x86_64",
"product": {
"name": "kernel-tools-libs-devel-0:4.18.0-372.59.1.el8_6.x86_64",
"product_id": "kernel-tools-libs-devel-0:4.18.0-372.59.1.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@4.18.0-372.59.1.el8_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-0:4.18.0-372.59.1.el8_6.x86_64",
"product": {
"name": "perf-0:4.18.0-372.59.1.el8_6.x86_64",
"product_id": "perf-0:4.18.0-372.59.1.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@4.18.0-372.59.1.el8_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3-perf-0:4.18.0-372.59.1.el8_6.x86_64",
"product": {
"name": "python3-perf-0:4.18.0-372.59.1.el8_6.x86_64",
"product_id": "python3-perf-0:4.18.0-372.59.1.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf@4.18.0-372.59.1.el8_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "bpftool-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64",
"product": {
"name": "bpftool-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64",
"product_id": "bpftool-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool-debuginfo@4.18.0-372.59.1.el8_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64",
"product": {
"name": "kernel-debug-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64",
"product_id": "kernel-debug-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.18.0-372.59.1.el8_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64",
"product": {
"name": "kernel-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64",
"product_id": "kernel-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@4.18.0-372.59.1.el8_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-x86_64-0:4.18.0-372.59.1.el8_6.x86_64",
"product": {
"name": "kernel-debuginfo-common-x86_64-0:4.18.0-372.59.1.el8_6.x86_64",
"product_id": "kernel-debuginfo-common-x86_64-0:4.18.0-372.59.1.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-x86_64@4.18.0-372.59.1.el8_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64",
"product": {
"name": "kernel-tools-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64",
"product_id": "kernel-tools-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.18.0-372.59.1.el8_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64",
"product": {
"name": "perf-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64",
"product_id": "perf-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@4.18.0-372.59.1.el8_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3-perf-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64",
"product": {
"name": "python3-perf-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64",
"product_id": "python3-perf-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf-debuginfo@4.18.0-372.59.1.el8_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"product": {
"name": "kernel-rt-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"product_id": "kernel-rt-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt@4.18.0-372.59.1.rt7.217.el8_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-core-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"product": {
"name": "kernel-rt-core-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"product_id": "kernel-rt-core-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-core@4.18.0-372.59.1.rt7.217.el8_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"product": {
"name": "kernel-rt-debug-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"product_id": "kernel-rt-debug-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug@4.18.0-372.59.1.rt7.217.el8_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-core-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"product": {
"name": "kernel-rt-debug-core-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"product_id": "kernel-rt-debug-core-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-core@4.18.0-372.59.1.rt7.217.el8_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-devel-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"product": {
"name": "kernel-rt-debug-devel-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"product_id": "kernel-rt-debug-devel-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-devel@4.18.0-372.59.1.rt7.217.el8_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-kvm-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"product": {
"name": "kernel-rt-debug-kvm-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"product_id": "kernel-rt-debug-kvm-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-kvm@4.18.0-372.59.1.rt7.217.el8_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-modules-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"product": {
"name": "kernel-rt-debug-modules-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"product_id": "kernel-rt-debug-modules-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-modules@4.18.0-372.59.1.rt7.217.el8_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-modules-extra-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"product": {
"name": "kernel-rt-debug-modules-extra-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"product_id": "kernel-rt-debug-modules-extra-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-modules-extra@4.18.0-372.59.1.rt7.217.el8_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-modules-internal-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"product": {
"name": "kernel-rt-debug-modules-internal-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"product_id": "kernel-rt-debug-modules-internal-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-modules-internal@4.18.0-372.59.1.rt7.217.el8_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-devel-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"product": {
"name": "kernel-rt-devel-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"product_id": "kernel-rt-devel-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-devel@4.18.0-372.59.1.rt7.217.el8_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-kvm-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"product": {
"name": "kernel-rt-kvm-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"product_id": "kernel-rt-kvm-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-kvm@4.18.0-372.59.1.rt7.217.el8_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-modules-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"product": {
"name": "kernel-rt-modules-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"product_id": "kernel-rt-modules-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-modules@4.18.0-372.59.1.rt7.217.el8_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-modules-extra-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"product": {
"name": "kernel-rt-modules-extra-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"product_id": "kernel-rt-modules-extra-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-modules-extra@4.18.0-372.59.1.rt7.217.el8_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-modules-internal-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"product": {
"name": "kernel-rt-modules-internal-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"product_id": "kernel-rt-modules-internal-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-modules-internal@4.18.0-372.59.1.rt7.217.el8_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-selftests-internal-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"product": {
"name": "kernel-rt-selftests-internal-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"product_id": "kernel-rt-selftests-internal-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-selftests-internal@4.18.0-372.59.1.rt7.217.el8_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-debuginfo-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"product": {
"name": "kernel-rt-debug-debuginfo-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"product_id": "kernel-rt-debug-debuginfo-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-debuginfo@4.18.0-372.59.1.rt7.217.el8_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debuginfo-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"product": {
"name": "kernel-rt-debuginfo-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"product_id": "kernel-rt-debuginfo-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debuginfo@4.18.0-372.59.1.rt7.217.el8_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"product": {
"name": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"product_id": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debuginfo-common-x86_64@4.18.0-372.59.1.rt7.217.el8_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el8.x86_64",
"product": {
"name": "openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el8.x86_64",
"product_id": "openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-hyperkube@4.12.0-202306121916.p0.g8c21020.assembly.stream.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.x86_64",
"product": {
"name": "openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.x86_64",
"product_id": "openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-clients@4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "openshift-clients-redistributable-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.x86_64",
"product": {
"name": "openshift-clients-redistributable-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.x86_64",
"product_id": "openshift-clients-redistributable-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-clients-redistributable@4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "podman-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"product": {
"name": "podman-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"product_id": "podman-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman@4.2.0-6.1.rhaos4.12.el8?arch=x86_64\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "podman-catatonit-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"product": {
"name": "podman-catatonit-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"product_id": "podman-catatonit-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-catatonit@4.2.0-6.1.rhaos4.12.el8?arch=x86_64\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "podman-gvproxy-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"product": {
"name": "podman-gvproxy-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"product_id": "podman-gvproxy-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-gvproxy@4.2.0-6.1.rhaos4.12.el8?arch=x86_64\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "podman-plugins-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"product": {
"name": "podman-plugins-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"product_id": "podman-plugins-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-plugins@4.2.0-6.1.rhaos4.12.el8?arch=x86_64\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "podman-remote-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"product": {
"name": "podman-remote-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"product_id": "podman-remote-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-remote@4.2.0-6.1.rhaos4.12.el8?arch=x86_64\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "podman-tests-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"product": {
"name": "podman-tests-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"product_id": "podman-tests-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-tests@4.2.0-6.1.rhaos4.12.el8?arch=x86_64\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "podman-debugsource-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"product": {
"name": "podman-debugsource-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"product_id": "podman-debugsource-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-debugsource@4.2.0-6.1.rhaos4.12.el8?arch=x86_64\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "podman-catatonit-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"product": {
"name": "podman-catatonit-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"product_id": "podman-catatonit-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-catatonit-debuginfo@4.2.0-6.1.rhaos4.12.el8?arch=x86_64\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "podman-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"product": {
"name": "podman-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"product_id": "podman-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-debuginfo@4.2.0-6.1.rhaos4.12.el8?arch=x86_64\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "podman-gvproxy-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"product": {
"name": "podman-gvproxy-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"product_id": "podman-gvproxy-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-gvproxy-debuginfo@4.2.0-6.1.rhaos4.12.el8?arch=x86_64\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "podman-plugins-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"product": {
"name": "podman-plugins-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"product_id": "podman-plugins-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-plugins-debuginfo@4.2.0-6.1.rhaos4.12.el8?arch=x86_64\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "podman-remote-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"product": {
"name": "podman-remote-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"product_id": "podman-remote-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-remote-debuginfo@4.2.0-6.1.rhaos4.12.el8?arch=x86_64\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "runc-3:1.1.6-4.rhaos4.12.el8.x86_64",
"product": {
"name": "runc-3:1.1.6-4.rhaos4.12.el8.x86_64",
"product_id": "runc-3:1.1.6-4.rhaos4.12.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/runc@1.1.6-4.rhaos4.12.el8?arch=x86_64\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "runc-debugsource-3:1.1.6-4.rhaos4.12.el8.x86_64",
"product": {
"name": "runc-debugsource-3:1.1.6-4.rhaos4.12.el8.x86_64",
"product_id": "runc-debugsource-3:1.1.6-4.rhaos4.12.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/runc-debugsource@1.1.6-4.rhaos4.12.el8?arch=x86_64\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "runc-debuginfo-3:1.1.6-4.rhaos4.12.el8.x86_64",
"product": {
"name": "runc-debuginfo-3:1.1.6-4.rhaos4.12.el8.x86_64",
"product_id": "runc-debuginfo-3:1.1.6-4.rhaos4.12.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/runc-debuginfo@1.1.6-4.rhaos4.12.el8?arch=x86_64\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "skopeo-2:1.9.4-3.1.rhaos4.12.el8.x86_64",
"product": {
"name": "skopeo-2:1.9.4-3.1.rhaos4.12.el8.x86_64",
"product_id": "skopeo-2:1.9.4-3.1.rhaos4.12.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/skopeo@1.9.4-3.1.rhaos4.12.el8?arch=x86_64\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "skopeo-tests-2:1.9.4-3.1.rhaos4.12.el8.x86_64",
"product": {
"name": "skopeo-tests-2:1.9.4-3.1.rhaos4.12.el8.x86_64",
"product_id": "skopeo-tests-2:1.9.4-3.1.rhaos4.12.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/skopeo-tests@1.9.4-3.1.rhaos4.12.el8?arch=x86_64\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "skopeo-debugsource-2:1.9.4-3.1.rhaos4.12.el8.x86_64",
"product": {
"name": "skopeo-debugsource-2:1.9.4-3.1.rhaos4.12.el8.x86_64",
"product_id": "skopeo-debugsource-2:1.9.4-3.1.rhaos4.12.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/skopeo-debugsource@1.9.4-3.1.rhaos4.12.el8?arch=x86_64\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "skopeo-debuginfo-2:1.9.4-3.1.rhaos4.12.el8.x86_64",
"product": {
"name": "skopeo-debuginfo-2:1.9.4-3.1.rhaos4.12.el8.x86_64",
"product_id": "skopeo-debuginfo-2:1.9.4-3.1.rhaos4.12.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/skopeo-debuginfo@1.9.4-3.1.rhaos4.12.el8?arch=x86_64\u0026epoch=2"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "buildah-1:1.23.4-5.rhaos4.12.el9.aarch64",
"product": {
"name": "buildah-1:1.23.4-5.rhaos4.12.el9.aarch64",
"product_id": "buildah-1:1.23.4-5.rhaos4.12.el9.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/buildah@1.23.4-5.rhaos4.12.el9?arch=aarch64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "buildah-tests-1:1.23.4-5.rhaos4.12.el9.aarch64",
"product": {
"name": "buildah-tests-1:1.23.4-5.rhaos4.12.el9.aarch64",
"product_id": "buildah-tests-1:1.23.4-5.rhaos4.12.el9.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/buildah-tests@1.23.4-5.rhaos4.12.el9?arch=aarch64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "buildah-debugsource-1:1.23.4-5.rhaos4.12.el9.aarch64",
"product": {
"name": "buildah-debugsource-1:1.23.4-5.rhaos4.12.el9.aarch64",
"product_id": "buildah-debugsource-1:1.23.4-5.rhaos4.12.el9.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/buildah-debugsource@1.23.4-5.rhaos4.12.el9?arch=aarch64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "buildah-debuginfo-1:1.23.4-5.rhaos4.12.el9.aarch64",
"product": {
"name": "buildah-debuginfo-1:1.23.4-5.rhaos4.12.el9.aarch64",
"product_id": "buildah-debuginfo-1:1.23.4-5.rhaos4.12.el9.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/buildah-debuginfo@1.23.4-5.rhaos4.12.el9?arch=aarch64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "buildah-tests-debuginfo-1:1.23.4-5.rhaos4.12.el9.aarch64",
"product": {
"name": "buildah-tests-debuginfo-1:1.23.4-5.rhaos4.12.el9.aarch64",
"product_id": "buildah-tests-debuginfo-1:1.23.4-5.rhaos4.12.el9.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/buildah-tests-debuginfo@1.23.4-5.rhaos4.12.el9?arch=aarch64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "conmon-2:2.1.2-5.rhaos4.12.el9.aarch64",
"product": {
"name": "conmon-2:2.1.2-5.rhaos4.12.el9.aarch64",
"product_id": "conmon-2:2.1.2-5.rhaos4.12.el9.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/conmon@2.1.2-5.rhaos4.12.el9?arch=aarch64\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "conmon-debugsource-2:2.1.2-5.rhaos4.12.el9.aarch64",
"product": {
"name": "conmon-debugsource-2:2.1.2-5.rhaos4.12.el9.aarch64",
"product_id": "conmon-debugsource-2:2.1.2-5.rhaos4.12.el9.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/conmon-debugsource@2.1.2-5.rhaos4.12.el9?arch=aarch64\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "conmon-debuginfo-2:2.1.2-5.rhaos4.12.el9.aarch64",
"product": {
"name": "conmon-debuginfo-2:2.1.2-5.rhaos4.12.el9.aarch64",
"product_id": "conmon-debuginfo-2:2.1.2-5.rhaos4.12.el9.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/conmon-debuginfo@2.1.2-5.rhaos4.12.el9?arch=aarch64\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el9.aarch64",
"product": {
"name": "openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el9.aarch64",
"product_id": "openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el9.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-hyperkube@4.12.0-202306121916.p0.g8c21020.assembly.stream.el9?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.aarch64",
"product": {
"name": "openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.aarch64",
"product_id": "openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-clients@4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "podman-3:4.2.0-7.rhaos4.12.el9.aarch64",
"product": {
"name": "podman-3:4.2.0-7.rhaos4.12.el9.aarch64",
"product_id": "podman-3:4.2.0-7.rhaos4.12.el9.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman@4.2.0-7.rhaos4.12.el9?arch=aarch64\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "podman-catatonit-3:4.2.0-7.rhaos4.12.el9.aarch64",
"product": {
"name": "podman-catatonit-3:4.2.0-7.rhaos4.12.el9.aarch64",
"product_id": "podman-catatonit-3:4.2.0-7.rhaos4.12.el9.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-catatonit@4.2.0-7.rhaos4.12.el9?arch=aarch64\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "podman-gvproxy-3:4.2.0-7.rhaos4.12.el9.aarch64",
"product": {
"name": "podman-gvproxy-3:4.2.0-7.rhaos4.12.el9.aarch64",
"product_id": "podman-gvproxy-3:4.2.0-7.rhaos4.12.el9.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-gvproxy@4.2.0-7.rhaos4.12.el9?arch=aarch64\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "podman-plugins-3:4.2.0-7.rhaos4.12.el9.aarch64",
"product": {
"name": "podman-plugins-3:4.2.0-7.rhaos4.12.el9.aarch64",
"product_id": "podman-plugins-3:4.2.0-7.rhaos4.12.el9.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-plugins@4.2.0-7.rhaos4.12.el9?arch=aarch64\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "podman-remote-3:4.2.0-7.rhaos4.12.el9.aarch64",
"product": {
"name": "podman-remote-3:4.2.0-7.rhaos4.12.el9.aarch64",
"product_id": "podman-remote-3:4.2.0-7.rhaos4.12.el9.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-remote@4.2.0-7.rhaos4.12.el9?arch=aarch64\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "podman-tests-3:4.2.0-7.rhaos4.12.el9.aarch64",
"product": {
"name": "podman-tests-3:4.2.0-7.rhaos4.12.el9.aarch64",
"product_id": "podman-tests-3:4.2.0-7.rhaos4.12.el9.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-tests@4.2.0-7.rhaos4.12.el9?arch=aarch64\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "podman-debugsource-3:4.2.0-7.rhaos4.12.el9.aarch64",
"product": {
"name": "podman-debugsource-3:4.2.0-7.rhaos4.12.el9.aarch64",
"product_id": "podman-debugsource-3:4.2.0-7.rhaos4.12.el9.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-debugsource@4.2.0-7.rhaos4.12.el9?arch=aarch64\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "podman-catatonit-debuginfo-3:4.2.0-7.rhaos4.12.el9.aarch64",
"product": {
"name": "podman-catatonit-debuginfo-3:4.2.0-7.rhaos4.12.el9.aarch64",
"product_id": "podman-catatonit-debuginfo-3:4.2.0-7.rhaos4.12.el9.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-catatonit-debuginfo@4.2.0-7.rhaos4.12.el9?arch=aarch64\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "podman-debuginfo-3:4.2.0-7.rhaos4.12.el9.aarch64",
"product": {
"name": "podman-debuginfo-3:4.2.0-7.rhaos4.12.el9.aarch64",
"product_id": "podman-debuginfo-3:4.2.0-7.rhaos4.12.el9.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-debuginfo@4.2.0-7.rhaos4.12.el9?arch=aarch64\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "podman-gvproxy-debuginfo-3:4.2.0-7.rhaos4.12.el9.aarch64",
"product": {
"name": "podman-gvproxy-debuginfo-3:4.2.0-7.rhaos4.12.el9.aarch64",
"product_id": "podman-gvproxy-debuginfo-3:4.2.0-7.rhaos4.12.el9.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-gvproxy-debuginfo@4.2.0-7.rhaos4.12.el9?arch=aarch64\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "podman-plugins-debuginfo-3:4.2.0-7.rhaos4.12.el9.aarch64",
"product": {
"name": "podman-plugins-debuginfo-3:4.2.0-7.rhaos4.12.el9.aarch64",
"product_id": "podman-plugins-debuginfo-3:4.2.0-7.rhaos4.12.el9.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-plugins-debuginfo@4.2.0-7.rhaos4.12.el9?arch=aarch64\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "podman-remote-debuginfo-3:4.2.0-7.rhaos4.12.el9.aarch64",
"product": {
"name": "podman-remote-debuginfo-3:4.2.0-7.rhaos4.12.el9.aarch64",
"product_id": "podman-remote-debuginfo-3:4.2.0-7.rhaos4.12.el9.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-remote-debuginfo@4.2.0-7.rhaos4.12.el9?arch=aarch64\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "skopeo-2:1.9.4-3.rhaos4.12.el9.aarch64",
"product": {
"name": "skopeo-2:1.9.4-3.rhaos4.12.el9.aarch64",
"product_id": "skopeo-2:1.9.4-3.rhaos4.12.el9.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/skopeo@1.9.4-3.rhaos4.12.el9?arch=aarch64\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "skopeo-tests-2:1.9.4-3.rhaos4.12.el9.aarch64",
"product": {
"name": "skopeo-tests-2:1.9.4-3.rhaos4.12.el9.aarch64",
"product_id": "skopeo-tests-2:1.9.4-3.rhaos4.12.el9.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/skopeo-tests@1.9.4-3.rhaos4.12.el9?arch=aarch64\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "skopeo-debugsource-2:1.9.4-3.rhaos4.12.el9.aarch64",
"product": {
"name": "skopeo-debugsource-2:1.9.4-3.rhaos4.12.el9.aarch64",
"product_id": "skopeo-debugsource-2:1.9.4-3.rhaos4.12.el9.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/skopeo-debugsource@1.9.4-3.rhaos4.12.el9?arch=aarch64\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "skopeo-debuginfo-2:1.9.4-3.rhaos4.12.el9.aarch64",
"product": {
"name": "skopeo-debuginfo-2:1.9.4-3.rhaos4.12.el9.aarch64",
"product_id": "skopeo-debuginfo-2:1.9.4-3.rhaos4.12.el9.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/skopeo-debuginfo@1.9.4-3.rhaos4.12.el9?arch=aarch64\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "buildah-1:1.23.4-5.1.rhaos4.12.el8.aarch64",
"product": {
"name": "buildah-1:1.23.4-5.1.rhaos4.12.el8.aarch64",
"product_id": "buildah-1:1.23.4-5.1.rhaos4.12.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/buildah@1.23.4-5.1.rhaos4.12.el8?arch=aarch64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "buildah-tests-1:1.23.4-5.1.rhaos4.12.el8.aarch64",
"product": {
"name": "buildah-tests-1:1.23.4-5.1.rhaos4.12.el8.aarch64",
"product_id": "buildah-tests-1:1.23.4-5.1.rhaos4.12.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/buildah-tests@1.23.4-5.1.rhaos4.12.el8?arch=aarch64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "buildah-debugsource-1:1.23.4-5.1.rhaos4.12.el8.aarch64",
"product": {
"name": "buildah-debugsource-1:1.23.4-5.1.rhaos4.12.el8.aarch64",
"product_id": "buildah-debugsource-1:1.23.4-5.1.rhaos4.12.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/buildah-debugsource@1.23.4-5.1.rhaos4.12.el8?arch=aarch64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "buildah-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.aarch64",
"product": {
"name": "buildah-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.aarch64",
"product_id": "buildah-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/buildah-debuginfo@1.23.4-5.1.rhaos4.12.el8?arch=aarch64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "buildah-tests-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.aarch64",
"product": {
"name": "buildah-tests-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.aarch64",
"product_id": "buildah-tests-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/buildah-tests-debuginfo@1.23.4-5.1.rhaos4.12.el8?arch=aarch64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "conmon-2:2.1.2-4.rhaos4.12.el8.aarch64",
"product": {
"name": "conmon-2:2.1.2-4.rhaos4.12.el8.aarch64",
"product_id": "conmon-2:2.1.2-4.rhaos4.12.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/conmon@2.1.2-4.rhaos4.12.el8?arch=aarch64\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "conmon-debugsource-2:2.1.2-4.rhaos4.12.el8.aarch64",
"product": {
"name": "conmon-debugsource-2:2.1.2-4.rhaos4.12.el8.aarch64",
"product_id": "conmon-debugsource-2:2.1.2-4.rhaos4.12.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/conmon-debugsource@2.1.2-4.rhaos4.12.el8?arch=aarch64\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "conmon-debuginfo-2:2.1.2-4.rhaos4.12.el8.aarch64",
"product": {
"name": "conmon-debuginfo-2:2.1.2-4.rhaos4.12.el8.aarch64",
"product_id": "conmon-debuginfo-2:2.1.2-4.rhaos4.12.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/conmon-debuginfo@2.1.2-4.rhaos4.12.el8?arch=aarch64\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "containernetworking-plugins-0:1.0.1-7.rhaos4.12.el8.aarch64",
"product": {
"name": "containernetworking-plugins-0:1.0.1-7.rhaos4.12.el8.aarch64",
"product_id": "containernetworking-plugins-0:1.0.1-7.rhaos4.12.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/containernetworking-plugins@1.0.1-7.rhaos4.12.el8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "containernetworking-plugins-debugsource-0:1.0.1-7.rhaos4.12.el8.aarch64",
"product": {
"name": "containernetworking-plugins-debugsource-0:1.0.1-7.rhaos4.12.el8.aarch64",
"product_id": "containernetworking-plugins-debugsource-0:1.0.1-7.rhaos4.12.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/containernetworking-plugins-debugsource@1.0.1-7.rhaos4.12.el8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "containernetworking-plugins-debuginfo-0:1.0.1-7.rhaos4.12.el8.aarch64",
"product": {
"name": "containernetworking-plugins-debuginfo-0:1.0.1-7.rhaos4.12.el8.aarch64",
"product_id": "containernetworking-plugins-debuginfo-0:1.0.1-7.rhaos4.12.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/containernetworking-plugins-debuginfo@1.0.1-7.rhaos4.12.el8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "bpftool-0:4.18.0-372.59.1.el8_6.aarch64",
"product": {
"name": "bpftool-0:4.18.0-372.59.1.el8_6.aarch64",
"product_id": "bpftool-0:4.18.0-372.59.1.el8_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool@4.18.0-372.59.1.el8_6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-0:4.18.0-372.59.1.el8_6.aarch64",
"product": {
"name": "kernel-0:4.18.0-372.59.1.el8_6.aarch64",
"product_id": "kernel-0:4.18.0-372.59.1.el8_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@4.18.0-372.59.1.el8_6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-core-0:4.18.0-372.59.1.el8_6.aarch64",
"product": {
"name": "kernel-core-0:4.18.0-372.59.1.el8_6.aarch64",
"product_id": "kernel-core-0:4.18.0-372.59.1.el8_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-core@4.18.0-372.59.1.el8_6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-cross-headers-0:4.18.0-372.59.1.el8_6.aarch64",
"product": {
"name": "kernel-cross-headers-0:4.18.0-372.59.1.el8_6.aarch64",
"product_id": "kernel-cross-headers-0:4.18.0-372.59.1.el8_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-cross-headers@4.18.0-372.59.1.el8_6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:4.18.0-372.59.1.el8_6.aarch64",
"product": {
"name": "kernel-debug-0:4.18.0-372.59.1.el8_6.aarch64",
"product_id": "kernel-debug-0:4.18.0-372.59.1.el8_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@4.18.0-372.59.1.el8_6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-core-0:4.18.0-372.59.1.el8_6.aarch64",
"product": {
"name": "kernel-debug-core-0:4.18.0-372.59.1.el8_6.aarch64",
"product_id": "kernel-debug-core-0:4.18.0-372.59.1.el8_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-core@4.18.0-372.59.1.el8_6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:4.18.0-372.59.1.el8_6.aarch64",
"product": {
"name": "kernel-debug-devel-0:4.18.0-372.59.1.el8_6.aarch64",
"product_id": "kernel-debug-devel-0:4.18.0-372.59.1.el8_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@4.18.0-372.59.1.el8_6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-0:4.18.0-372.59.1.el8_6.aarch64",
"product": {
"name": "kernel-debug-modules-0:4.18.0-372.59.1.el8_6.aarch64",
"product_id": "kernel-debug-modules-0:4.18.0-372.59.1.el8_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules@4.18.0-372.59.1.el8_6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-extra-0:4.18.0-372.59.1.el8_6.aarch64",
"product": {
"name": "kernel-debug-modules-extra-0:4.18.0-372.59.1.el8_6.aarch64",
"product_id": "kernel-debug-modules-extra-0:4.18.0-372.59.1.el8_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules-extra@4.18.0-372.59.1.el8_6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-internal-0:4.18.0-372.59.1.el8_6.aarch64",
"product": {
"name": "kernel-debug-modules-internal-0:4.18.0-372.59.1.el8_6.aarch64",
"product_id": "kernel-debug-modules-internal-0:4.18.0-372.59.1.el8_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules-internal@4.18.0-372.59.1.el8_6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:4.18.0-372.59.1.el8_6.aarch64",
"product": {
"name": "kernel-devel-0:4.18.0-372.59.1.el8_6.aarch64",
"product_id": "kernel-devel-0:4.18.0-372.59.1.el8_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@4.18.0-372.59.1.el8_6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:4.18.0-372.59.1.el8_6.aarch64",
"product": {
"name": "kernel-headers-0:4.18.0-372.59.1.el8_6.aarch64",
"product_id": "kernel-headers-0:4.18.0-372.59.1.el8_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@4.18.0-372.59.1.el8_6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-0:4.18.0-372.59.1.el8_6.aarch64",
"product": {
"name": "kernel-modules-0:4.18.0-372.59.1.el8_6.aarch64",
"product_id": "kernel-modules-0:4.18.0-372.59.1.el8_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules@4.18.0-372.59.1.el8_6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-extra-0:4.18.0-372.59.1.el8_6.aarch64",
"product": {
"name": "kernel-modules-extra-0:4.18.0-372.59.1.el8_6.aarch64",
"product_id": "kernel-modules-extra-0:4.18.0-372.59.1.el8_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules-extra@4.18.0-372.59.1.el8_6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-internal-0:4.18.0-372.59.1.el8_6.aarch64",
"product": {
"name": "kernel-modules-internal-0:4.18.0-372.59.1.el8_6.aarch64",
"product_id": "kernel-modules-internal-0:4.18.0-372.59.1.el8_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules-internal@4.18.0-372.59.1.el8_6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-selftests-internal-0:4.18.0-372.59.1.el8_6.aarch64",
"product": {
"name": "kernel-selftests-internal-0:4.18.0-372.59.1.el8_6.aarch64",
"product_id": "kernel-selftests-internal-0:4.18.0-372.59.1.el8_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-selftests-internal@4.18.0-372.59.1.el8_6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:4.18.0-372.59.1.el8_6.aarch64",
"product": {
"name": "kernel-tools-0:4.18.0-372.59.1.el8_6.aarch64",
"product_id": "kernel-tools-0:4.18.0-372.59.1.el8_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@4.18.0-372.59.1.el8_6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:4.18.0-372.59.1.el8_6.aarch64",
"product": {
"name": "kernel-tools-libs-0:4.18.0-372.59.1.el8_6.aarch64",
"product_id": "kernel-tools-libs-0:4.18.0-372.59.1.el8_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@4.18.0-372.59.1.el8_6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:4.18.0-372.59.1.el8_6.aarch64",
"product": {
"name": "kernel-tools-libs-devel-0:4.18.0-372.59.1.el8_6.aarch64",
"product_id": "kernel-tools-libs-devel-0:4.18.0-372.59.1.el8_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@4.18.0-372.59.1.el8_6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "perf-0:4.18.0-372.59.1.el8_6.aarch64",
"product": {
"name": "perf-0:4.18.0-372.59.1.el8_6.aarch64",
"product_id": "perf-0:4.18.0-372.59.1.el8_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@4.18.0-372.59.1.el8_6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python3-perf-0:4.18.0-372.59.1.el8_6.aarch64",
"product": {
"name": "python3-perf-0:4.18.0-372.59.1.el8_6.aarch64",
"product_id": "python3-perf-0:4.18.0-372.59.1.el8_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf@4.18.0-372.59.1.el8_6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "bpftool-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64",
"product": {
"name": "bpftool-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64",
"product_id": "bpftool-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool-debuginfo@4.18.0-372.59.1.el8_6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64",
"product": {
"name": "kernel-debug-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64",
"product_id": "kernel-debug-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.18.0-372.59.1.el8_6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64",
"product": {
"name": "kernel-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64",
"product_id": "kernel-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@4.18.0-372.59.1.el8_6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-aarch64-0:4.18.0-372.59.1.el8_6.aarch64",
"product": {
"name": "kernel-debuginfo-common-aarch64-0:4.18.0-372.59.1.el8_6.aarch64",
"product_id": "kernel-debuginfo-common-aarch64-0:4.18.0-372.59.1.el8_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-aarch64@4.18.0-372.59.1.el8_6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64",
"product": {
"name": "kernel-tools-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64",
"product_id": "kernel-tools-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.18.0-372.59.1.el8_6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64",
"product": {
"name": "perf-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64",
"product_id": "perf-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@4.18.0-372.59.1.el8_6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python3-perf-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64",
"product": {
"name": "python3-perf-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64",
"product_id": "python3-perf-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf-debuginfo@4.18.0-372.59.1.el8_6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el8.aarch64",
"product": {
"name": "openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el8.aarch64",
"product_id": "openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-hyperkube@4.12.0-202306121916.p0.g8c21020.assembly.stream.el8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.aarch64",
"product": {
"name": "openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.aarch64",
"product_id": "openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-clients@4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "podman-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"product": {
"name": "podman-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"product_id": "podman-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman@4.2.0-6.1.rhaos4.12.el8?arch=aarch64\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "podman-catatonit-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"product": {
"name": "podman-catatonit-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"product_id": "podman-catatonit-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-catatonit@4.2.0-6.1.rhaos4.12.el8?arch=aarch64\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "podman-gvproxy-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"product": {
"name": "podman-gvproxy-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"product_id": "podman-gvproxy-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-gvproxy@4.2.0-6.1.rhaos4.12.el8?arch=aarch64\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "podman-plugins-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"product": {
"name": "podman-plugins-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"product_id": "podman-plugins-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-plugins@4.2.0-6.1.rhaos4.12.el8?arch=aarch64\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "podman-remote-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"product": {
"name": "podman-remote-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"product_id": "podman-remote-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-remote@4.2.0-6.1.rhaos4.12.el8?arch=aarch64\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "podman-tests-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"product": {
"name": "podman-tests-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"product_id": "podman-tests-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-tests@4.2.0-6.1.rhaos4.12.el8?arch=aarch64\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "podman-debugsource-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"product": {
"name": "podman-debugsource-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"product_id": "podman-debugsource-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-debugsource@4.2.0-6.1.rhaos4.12.el8?arch=aarch64\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "podman-catatonit-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"product": {
"name": "podman-catatonit-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"product_id": "podman-catatonit-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-catatonit-debuginfo@4.2.0-6.1.rhaos4.12.el8?arch=aarch64\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "podman-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"product": {
"name": "podman-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"product_id": "podman-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-debuginfo@4.2.0-6.1.rhaos4.12.el8?arch=aarch64\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "podman-gvproxy-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"product": {
"name": "podman-gvproxy-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"product_id": "podman-gvproxy-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-gvproxy-debuginfo@4.2.0-6.1.rhaos4.12.el8?arch=aarch64\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "podman-plugins-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"product": {
"name": "podman-plugins-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"product_id": "podman-plugins-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-plugins-debuginfo@4.2.0-6.1.rhaos4.12.el8?arch=aarch64\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "podman-remote-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"product": {
"name": "podman-remote-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"product_id": "podman-remote-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-remote-debuginfo@4.2.0-6.1.rhaos4.12.el8?arch=aarch64\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "runc-3:1.1.6-4.rhaos4.12.el8.aarch64",
"product": {
"name": "runc-3:1.1.6-4.rhaos4.12.el8.aarch64",
"product_id": "runc-3:1.1.6-4.rhaos4.12.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/runc@1.1.6-4.rhaos4.12.el8?arch=aarch64\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "runc-debugsource-3:1.1.6-4.rhaos4.12.el8.aarch64",
"product": {
"name": "runc-debugsource-3:1.1.6-4.rhaos4.12.el8.aarch64",
"product_id": "runc-debugsource-3:1.1.6-4.rhaos4.12.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/runc-debugsource@1.1.6-4.rhaos4.12.el8?arch=aarch64\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "runc-debuginfo-3:1.1.6-4.rhaos4.12.el8.aarch64",
"product": {
"name": "runc-debuginfo-3:1.1.6-4.rhaos4.12.el8.aarch64",
"product_id": "runc-debuginfo-3:1.1.6-4.rhaos4.12.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/runc-debuginfo@1.1.6-4.rhaos4.12.el8?arch=aarch64\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "skopeo-2:1.9.4-3.1.rhaos4.12.el8.aarch64",
"product": {
"name": "skopeo-2:1.9.4-3.1.rhaos4.12.el8.aarch64",
"product_id": "skopeo-2:1.9.4-3.1.rhaos4.12.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/skopeo@1.9.4-3.1.rhaos4.12.el8?arch=aarch64\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "skopeo-tests-2:1.9.4-3.1.rhaos4.12.el8.aarch64",
"product": {
"name": "skopeo-tests-2:1.9.4-3.1.rhaos4.12.el8.aarch64",
"product_id": "skopeo-tests-2:1.9.4-3.1.rhaos4.12.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/skopeo-tests@1.9.4-3.1.rhaos4.12.el8?arch=aarch64\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "skopeo-debugsource-2:1.9.4-3.1.rhaos4.12.el8.aarch64",
"product": {
"name": "skopeo-debugsource-2:1.9.4-3.1.rhaos4.12.el8.aarch64",
"product_id": "skopeo-debugsource-2:1.9.4-3.1.rhaos4.12.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/skopeo-debugsource@1.9.4-3.1.rhaos4.12.el8?arch=aarch64\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "skopeo-debuginfo-2:1.9.4-3.1.rhaos4.12.el8.aarch64",
"product": {
"name": "skopeo-debuginfo-2:1.9.4-3.1.rhaos4.12.el8.aarch64",
"product_id": "skopeo-debuginfo-2:1.9.4-3.1.rhaos4.12.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/skopeo-debuginfo@1.9.4-3.1.rhaos4.12.el8?arch=aarch64\u0026epoch=2"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "buildah-1:1.23.4-5.rhaos4.12.el9.ppc64le",
"product": {
"name": "buildah-1:1.23.4-5.rhaos4.12.el9.ppc64le",
"product_id": "buildah-1:1.23.4-5.rhaos4.12.el9.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/buildah@1.23.4-5.rhaos4.12.el9?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "buildah-tests-1:1.23.4-5.rhaos4.12.el9.ppc64le",
"product": {
"name": "buildah-tests-1:1.23.4-5.rhaos4.12.el9.ppc64le",
"product_id": "buildah-tests-1:1.23.4-5.rhaos4.12.el9.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/buildah-tests@1.23.4-5.rhaos4.12.el9?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "buildah-debugsource-1:1.23.4-5.rhaos4.12.el9.ppc64le",
"product": {
"name": "buildah-debugsource-1:1.23.4-5.rhaos4.12.el9.ppc64le",
"product_id": "buildah-debugsource-1:1.23.4-5.rhaos4.12.el9.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/buildah-debugsource@1.23.4-5.rhaos4.12.el9?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "buildah-debuginfo-1:1.23.4-5.rhaos4.12.el9.ppc64le",
"product": {
"name": "buildah-debuginfo-1:1.23.4-5.rhaos4.12.el9.ppc64le",
"product_id": "buildah-debuginfo-1:1.23.4-5.rhaos4.12.el9.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/buildah-debuginfo@1.23.4-5.rhaos4.12.el9?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "buildah-tests-debuginfo-1:1.23.4-5.rhaos4.12.el9.ppc64le",
"product": {
"name": "buildah-tests-debuginfo-1:1.23.4-5.rhaos4.12.el9.ppc64le",
"product_id": "buildah-tests-debuginfo-1:1.23.4-5.rhaos4.12.el9.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/buildah-tests-debuginfo@1.23.4-5.rhaos4.12.el9?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "conmon-2:2.1.2-5.rhaos4.12.el9.ppc64le",
"product": {
"name": "conmon-2:2.1.2-5.rhaos4.12.el9.ppc64le",
"product_id": "conmon-2:2.1.2-5.rhaos4.12.el9.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/conmon@2.1.2-5.rhaos4.12.el9?arch=ppc64le\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "conmon-debugsource-2:2.1.2-5.rhaos4.12.el9.ppc64le",
"product": {
"name": "conmon-debugsource-2:2.1.2-5.rhaos4.12.el9.ppc64le",
"product_id": "conmon-debugsource-2:2.1.2-5.rhaos4.12.el9.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/conmon-debugsource@2.1.2-5.rhaos4.12.el9?arch=ppc64le\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "conmon-debuginfo-2:2.1.2-5.rhaos4.12.el9.ppc64le",
"product": {
"name": "conmon-debuginfo-2:2.1.2-5.rhaos4.12.el9.ppc64le",
"product_id": "conmon-debuginfo-2:2.1.2-5.rhaos4.12.el9.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/conmon-debuginfo@2.1.2-5.rhaos4.12.el9?arch=ppc64le\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el9.ppc64le",
"product": {
"name": "openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el9.ppc64le",
"product_id": "openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el9.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-hyperkube@4.12.0-202306121916.p0.g8c21020.assembly.stream.el9?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.ppc64le",
"product": {
"name": "openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.ppc64le",
"product_id": "openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-clients@4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "podman-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"product": {
"name": "podman-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"product_id": "podman-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman@4.2.0-7.rhaos4.12.el9?arch=ppc64le\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "podman-catatonit-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"product": {
"name": "podman-catatonit-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"product_id": "podman-catatonit-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-catatonit@4.2.0-7.rhaos4.12.el9?arch=ppc64le\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "podman-gvproxy-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"product": {
"name": "podman-gvproxy-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"product_id": "podman-gvproxy-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-gvproxy@4.2.0-7.rhaos4.12.el9?arch=ppc64le\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "podman-plugins-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"product": {
"name": "podman-plugins-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"product_id": "podman-plugins-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-plugins@4.2.0-7.rhaos4.12.el9?arch=ppc64le\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "podman-remote-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"product": {
"name": "podman-remote-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"product_id": "podman-remote-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-remote@4.2.0-7.rhaos4.12.el9?arch=ppc64le\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "podman-tests-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"product": {
"name": "podman-tests-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"product_id": "podman-tests-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-tests@4.2.0-7.rhaos4.12.el9?arch=ppc64le\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "podman-debugsource-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"product": {
"name": "podman-debugsource-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"product_id": "podman-debugsource-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-debugsource@4.2.0-7.rhaos4.12.el9?arch=ppc64le\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "podman-catatonit-debuginfo-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"product": {
"name": "podman-catatonit-debuginfo-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"product_id": "podman-catatonit-debuginfo-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-catatonit-debuginfo@4.2.0-7.rhaos4.12.el9?arch=ppc64le\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "podman-debuginfo-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"product": {
"name": "podman-debuginfo-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"product_id": "podman-debuginfo-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-debuginfo@4.2.0-7.rhaos4.12.el9?arch=ppc64le\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "podman-gvproxy-debuginfo-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"product": {
"name": "podman-gvproxy-debuginfo-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"product_id": "podman-gvproxy-debuginfo-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-gvproxy-debuginfo@4.2.0-7.rhaos4.12.el9?arch=ppc64le\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "podman-plugins-debuginfo-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"product": {
"name": "podman-plugins-debuginfo-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"product_id": "podman-plugins-debuginfo-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-plugins-debuginfo@4.2.0-7.rhaos4.12.el9?arch=ppc64le\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "podman-remote-debuginfo-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"product": {
"name": "podman-remote-debuginfo-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"product_id": "podman-remote-debuginfo-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-remote-debuginfo@4.2.0-7.rhaos4.12.el9?arch=ppc64le\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "skopeo-2:1.9.4-3.rhaos4.12.el9.ppc64le",
"product": {
"name": "skopeo-2:1.9.4-3.rhaos4.12.el9.ppc64le",
"product_id": "skopeo-2:1.9.4-3.rhaos4.12.el9.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/skopeo@1.9.4-3.rhaos4.12.el9?arch=ppc64le\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "skopeo-tests-2:1.9.4-3.rhaos4.12.el9.ppc64le",
"product": {
"name": "skopeo-tests-2:1.9.4-3.rhaos4.12.el9.ppc64le",
"product_id": "skopeo-tests-2:1.9.4-3.rhaos4.12.el9.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/skopeo-tests@1.9.4-3.rhaos4.12.el9?arch=ppc64le\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "skopeo-debugsource-2:1.9.4-3.rhaos4.12.el9.ppc64le",
"product": {
"name": "skopeo-debugsource-2:1.9.4-3.rhaos4.12.el9.ppc64le",
"product_id": "skopeo-debugsource-2:1.9.4-3.rhaos4.12.el9.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/skopeo-debugsource@1.9.4-3.rhaos4.12.el9?arch=ppc64le\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "skopeo-debuginfo-2:1.9.4-3.rhaos4.12.el9.ppc64le",
"product": {
"name": "skopeo-debuginfo-2:1.9.4-3.rhaos4.12.el9.ppc64le",
"product_id": "skopeo-debuginfo-2:1.9.4-3.rhaos4.12.el9.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/skopeo-debuginfo@1.9.4-3.rhaos4.12.el9?arch=ppc64le\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "buildah-1:1.23.4-5.1.rhaos4.12.el8.ppc64le",
"product": {
"name": "buildah-1:1.23.4-5.1.rhaos4.12.el8.ppc64le",
"product_id": "buildah-1:1.23.4-5.1.rhaos4.12.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/buildah@1.23.4-5.1.rhaos4.12.el8?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "buildah-tests-1:1.23.4-5.1.rhaos4.12.el8.ppc64le",
"product": {
"name": "buildah-tests-1:1.23.4-5.1.rhaos4.12.el8.ppc64le",
"product_id": "buildah-tests-1:1.23.4-5.1.rhaos4.12.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/buildah-tests@1.23.4-5.1.rhaos4.12.el8?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "buildah-debugsource-1:1.23.4-5.1.rhaos4.12.el8.ppc64le",
"product": {
"name": "buildah-debugsource-1:1.23.4-5.1.rhaos4.12.el8.ppc64le",
"product_id": "buildah-debugsource-1:1.23.4-5.1.rhaos4.12.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/buildah-debugsource@1.23.4-5.1.rhaos4.12.el8?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "buildah-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.ppc64le",
"product": {
"name": "buildah-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.ppc64le",
"product_id": "buildah-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/buildah-debuginfo@1.23.4-5.1.rhaos4.12.el8?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "buildah-tests-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.ppc64le",
"product": {
"name": "buildah-tests-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.ppc64le",
"product_id": "buildah-tests-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/buildah-tests-debuginfo@1.23.4-5.1.rhaos4.12.el8?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "conmon-2:2.1.2-4.rhaos4.12.el8.ppc64le",
"product": {
"name": "conmon-2:2.1.2-4.rhaos4.12.el8.ppc64le",
"product_id": "conmon-2:2.1.2-4.rhaos4.12.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/conmon@2.1.2-4.rhaos4.12.el8?arch=ppc64le\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "conmon-debugsource-2:2.1.2-4.rhaos4.12.el8.ppc64le",
"product": {
"name": "conmon-debugsource-2:2.1.2-4.rhaos4.12.el8.ppc64le",
"product_id": "conmon-debugsource-2:2.1.2-4.rhaos4.12.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/conmon-debugsource@2.1.2-4.rhaos4.12.el8?arch=ppc64le\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "conmon-debuginfo-2:2.1.2-4.rhaos4.12.el8.ppc64le",
"product": {
"name": "conmon-debuginfo-2:2.1.2-4.rhaos4.12.el8.ppc64le",
"product_id": "conmon-debuginfo-2:2.1.2-4.rhaos4.12.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/conmon-debuginfo@2.1.2-4.rhaos4.12.el8?arch=ppc64le\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "containernetworking-plugins-0:1.0.1-7.rhaos4.12.el8.ppc64le",
"product": {
"name": "containernetworking-plugins-0:1.0.1-7.rhaos4.12.el8.ppc64le",
"product_id": "containernetworking-plugins-0:1.0.1-7.rhaos4.12.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/containernetworking-plugins@1.0.1-7.rhaos4.12.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "containernetworking-plugins-debugsource-0:1.0.1-7.rhaos4.12.el8.ppc64le",
"product": {
"name": "containernetworking-plugins-debugsource-0:1.0.1-7.rhaos4.12.el8.ppc64le",
"product_id": "containernetworking-plugins-debugsource-0:1.0.1-7.rhaos4.12.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/containernetworking-plugins-debugsource@1.0.1-7.rhaos4.12.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "containernetworking-plugins-debuginfo-0:1.0.1-7.rhaos4.12.el8.ppc64le",
"product": {
"name": "containernetworking-plugins-debuginfo-0:1.0.1-7.rhaos4.12.el8.ppc64le",
"product_id": "containernetworking-plugins-debuginfo-0:1.0.1-7.rhaos4.12.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/containernetworking-plugins-debuginfo@1.0.1-7.rhaos4.12.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "bpftool-0:4.18.0-372.59.1.el8_6.ppc64le",
"product": {
"name": "bpftool-0:4.18.0-372.59.1.el8_6.ppc64le",
"product_id": "bpftool-0:4.18.0-372.59.1.el8_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool@4.18.0-372.59.1.el8_6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-0:4.18.0-372.59.1.el8_6.ppc64le",
"product": {
"name": "kernel-0:4.18.0-372.59.1.el8_6.ppc64le",
"product_id": "kernel-0:4.18.0-372.59.1.el8_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@4.18.0-372.59.1.el8_6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-core-0:4.18.0-372.59.1.el8_6.ppc64le",
"product": {
"name": "kernel-core-0:4.18.0-372.59.1.el8_6.ppc64le",
"product_id": "kernel-core-0:4.18.0-372.59.1.el8_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-core@4.18.0-372.59.1.el8_6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-cross-headers-0:4.18.0-372.59.1.el8_6.ppc64le",
"product": {
"name": "kernel-cross-headers-0:4.18.0-372.59.1.el8_6.ppc64le",
"product_id": "kernel-cross-headers-0:4.18.0-372.59.1.el8_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-cross-headers@4.18.0-372.59.1.el8_6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:4.18.0-372.59.1.el8_6.ppc64le",
"product": {
"name": "kernel-debug-0:4.18.0-372.59.1.el8_6.ppc64le",
"product_id": "kernel-debug-0:4.18.0-372.59.1.el8_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@4.18.0-372.59.1.el8_6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-core-0:4.18.0-372.59.1.el8_6.ppc64le",
"product": {
"name": "kernel-debug-core-0:4.18.0-372.59.1.el8_6.ppc64le",
"product_id": "kernel-debug-core-0:4.18.0-372.59.1.el8_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-core@4.18.0-372.59.1.el8_6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:4.18.0-372.59.1.el8_6.ppc64le",
"product": {
"name": "kernel-debug-devel-0:4.18.0-372.59.1.el8_6.ppc64le",
"product_id": "kernel-debug-devel-0:4.18.0-372.59.1.el8_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@4.18.0-372.59.1.el8_6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-0:4.18.0-372.59.1.el8_6.ppc64le",
"product": {
"name": "kernel-debug-modules-0:4.18.0-372.59.1.el8_6.ppc64le",
"product_id": "kernel-debug-modules-0:4.18.0-372.59.1.el8_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules@4.18.0-372.59.1.el8_6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-extra-0:4.18.0-372.59.1.el8_6.ppc64le",
"product": {
"name": "kernel-debug-modules-extra-0:4.18.0-372.59.1.el8_6.ppc64le",
"product_id": "kernel-debug-modules-extra-0:4.18.0-372.59.1.el8_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules-extra@4.18.0-372.59.1.el8_6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-internal-0:4.18.0-372.59.1.el8_6.ppc64le",
"product": {
"name": "kernel-debug-modules-internal-0:4.18.0-372.59.1.el8_6.ppc64le",
"product_id": "kernel-debug-modules-internal-0:4.18.0-372.59.1.el8_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules-internal@4.18.0-372.59.1.el8_6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:4.18.0-372.59.1.el8_6.ppc64le",
"product": {
"name": "kernel-devel-0:4.18.0-372.59.1.el8_6.ppc64le",
"product_id": "kernel-devel-0:4.18.0-372.59.1.el8_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@4.18.0-372.59.1.el8_6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:4.18.0-372.59.1.el8_6.ppc64le",
"product": {
"name": "kernel-headers-0:4.18.0-372.59.1.el8_6.ppc64le",
"product_id": "kernel-headers-0:4.18.0-372.59.1.el8_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@4.18.0-372.59.1.el8_6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-ipaclones-internal-0:4.18.0-372.59.1.el8_6.ppc64le",
"product": {
"name": "kernel-ipaclones-internal-0:4.18.0-372.59.1.el8_6.ppc64le",
"product_id": "kernel-ipaclones-internal-0:4.18.0-372.59.1.el8_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-ipaclones-internal@4.18.0-372.59.1.el8_6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-0:4.18.0-372.59.1.el8_6.ppc64le",
"product": {
"name": "kernel-modules-0:4.18.0-372.59.1.el8_6.ppc64le",
"product_id": "kernel-modules-0:4.18.0-372.59.1.el8_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules@4.18.0-372.59.1.el8_6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-extra-0:4.18.0-372.59.1.el8_6.ppc64le",
"product": {
"name": "kernel-modules-extra-0:4.18.0-372.59.1.el8_6.ppc64le",
"product_id": "kernel-modules-extra-0:4.18.0-372.59.1.el8_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules-extra@4.18.0-372.59.1.el8_6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-internal-0:4.18.0-372.59.1.el8_6.ppc64le",
"product": {
"name": "kernel-modules-internal-0:4.18.0-372.59.1.el8_6.ppc64le",
"product_id": "kernel-modules-internal-0:4.18.0-372.59.1.el8_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules-internal@4.18.0-372.59.1.el8_6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-selftests-internal-0:4.18.0-372.59.1.el8_6.ppc64le",
"product": {
"name": "kernel-selftests-internal-0:4.18.0-372.59.1.el8_6.ppc64le",
"product_id": "kernel-selftests-internal-0:4.18.0-372.59.1.el8_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-selftests-internal@4.18.0-372.59.1.el8_6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:4.18.0-372.59.1.el8_6.ppc64le",
"product": {
"name": "kernel-tools-0:4.18.0-372.59.1.el8_6.ppc64le",
"product_id": "kernel-tools-0:4.18.0-372.59.1.el8_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@4.18.0-372.59.1.el8_6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:4.18.0-372.59.1.el8_6.ppc64le",
"product": {
"name": "kernel-tools-libs-0:4.18.0-372.59.1.el8_6.ppc64le",
"product_id": "kernel-tools-libs-0:4.18.0-372.59.1.el8_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@4.18.0-372.59.1.el8_6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:4.18.0-372.59.1.el8_6.ppc64le",
"product": {
"name": "kernel-tools-libs-devel-0:4.18.0-372.59.1.el8_6.ppc64le",
"product_id": "kernel-tools-libs-devel-0:4.18.0-372.59.1.el8_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@4.18.0-372.59.1.el8_6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "perf-0:4.18.0-372.59.1.el8_6.ppc64le",
"product": {
"name": "perf-0:4.18.0-372.59.1.el8_6.ppc64le",
"product_id": "perf-0:4.18.0-372.59.1.el8_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@4.18.0-372.59.1.el8_6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python3-perf-0:4.18.0-372.59.1.el8_6.ppc64le",
"product": {
"name": "python3-perf-0:4.18.0-372.59.1.el8_6.ppc64le",
"product_id": "python3-perf-0:4.18.0-372.59.1.el8_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf@4.18.0-372.59.1.el8_6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "bpftool-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le",
"product": {
"name": "bpftool-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le",
"product_id": "bpftool-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool-debuginfo@4.18.0-372.59.1.el8_6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le",
"product": {
"name": "kernel-debug-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le",
"product_id": "kernel-debug-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.18.0-372.59.1.el8_6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le",
"product": {
"name": "kernel-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le",
"product_id": "kernel-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@4.18.0-372.59.1.el8_6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-ppc64le-0:4.18.0-372.59.1.el8_6.ppc64le",
"product": {
"name": "kernel-debuginfo-common-ppc64le-0:4.18.0-372.59.1.el8_6.ppc64le",
"product_id": "kernel-debuginfo-common-ppc64le-0:4.18.0-372.59.1.el8_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-ppc64le@4.18.0-372.59.1.el8_6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le",
"product": {
"name": "kernel-tools-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le",
"product_id": "kernel-tools-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.18.0-372.59.1.el8_6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le",
"product": {
"name": "perf-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le",
"product_id": "perf-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@4.18.0-372.59.1.el8_6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python3-perf-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le",
"product": {
"name": "python3-perf-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le",
"product_id": "python3-perf-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf-debuginfo@4.18.0-372.59.1.el8_6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el8.ppc64le",
"product": {
"name": "openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el8.ppc64le",
"product_id": "openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-hyperkube@4.12.0-202306121916.p0.g8c21020.assembly.stream.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.ppc64le",
"product": {
"name": "openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.ppc64le",
"product_id": "openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-clients@4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "podman-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"product": {
"name": "podman-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"product_id": "podman-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman@4.2.0-6.1.rhaos4.12.el8?arch=ppc64le\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "podman-catatonit-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"product": {
"name": "podman-catatonit-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"product_id": "podman-catatonit-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-catatonit@4.2.0-6.1.rhaos4.12.el8?arch=ppc64le\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "podman-gvproxy-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"product": {
"name": "podman-gvproxy-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"product_id": "podman-gvproxy-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-gvproxy@4.2.0-6.1.rhaos4.12.el8?arch=ppc64le\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "podman-plugins-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"product": {
"name": "podman-plugins-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"product_id": "podman-plugins-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-plugins@4.2.0-6.1.rhaos4.12.el8?arch=ppc64le\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "podman-remote-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"product": {
"name": "podman-remote-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"product_id": "podman-remote-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-remote@4.2.0-6.1.rhaos4.12.el8?arch=ppc64le\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "podman-tests-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"product": {
"name": "podman-tests-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"product_id": "podman-tests-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-tests@4.2.0-6.1.rhaos4.12.el8?arch=ppc64le\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "podman-debugsource-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"product": {
"name": "podman-debugsource-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"product_id": "podman-debugsource-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-debugsource@4.2.0-6.1.rhaos4.12.el8?arch=ppc64le\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "podman-catatonit-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"product": {
"name": "podman-catatonit-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"product_id": "podman-catatonit-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-catatonit-debuginfo@4.2.0-6.1.rhaos4.12.el8?arch=ppc64le\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "podman-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"product": {
"name": "podman-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"product_id": "podman-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-debuginfo@4.2.0-6.1.rhaos4.12.el8?arch=ppc64le\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "podman-gvproxy-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"product": {
"name": "podman-gvproxy-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"product_id": "podman-gvproxy-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-gvproxy-debuginfo@4.2.0-6.1.rhaos4.12.el8?arch=ppc64le\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "podman-plugins-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"product": {
"name": "podman-plugins-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"product_id": "podman-plugins-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-plugins-debuginfo@4.2.0-6.1.rhaos4.12.el8?arch=ppc64le\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "podman-remote-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"product": {
"name": "podman-remote-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"product_id": "podman-remote-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-remote-debuginfo@4.2.0-6.1.rhaos4.12.el8?arch=ppc64le\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "runc-3:1.1.6-4.rhaos4.12.el8.ppc64le",
"product": {
"name": "runc-3:1.1.6-4.rhaos4.12.el8.ppc64le",
"product_id": "runc-3:1.1.6-4.rhaos4.12.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/runc@1.1.6-4.rhaos4.12.el8?arch=ppc64le\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "runc-debugsource-3:1.1.6-4.rhaos4.12.el8.ppc64le",
"product": {
"name": "runc-debugsource-3:1.1.6-4.rhaos4.12.el8.ppc64le",
"product_id": "runc-debugsource-3:1.1.6-4.rhaos4.12.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/runc-debugsource@1.1.6-4.rhaos4.12.el8?arch=ppc64le\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "runc-debuginfo-3:1.1.6-4.rhaos4.12.el8.ppc64le",
"product": {
"name": "runc-debuginfo-3:1.1.6-4.rhaos4.12.el8.ppc64le",
"product_id": "runc-debuginfo-3:1.1.6-4.rhaos4.12.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/runc-debuginfo@1.1.6-4.rhaos4.12.el8?arch=ppc64le\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "skopeo-2:1.9.4-3.1.rhaos4.12.el8.ppc64le",
"product": {
"name": "skopeo-2:1.9.4-3.1.rhaos4.12.el8.ppc64le",
"product_id": "skopeo-2:1.9.4-3.1.rhaos4.12.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/skopeo@1.9.4-3.1.rhaos4.12.el8?arch=ppc64le\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "skopeo-tests-2:1.9.4-3.1.rhaos4.12.el8.ppc64le",
"product": {
"name": "skopeo-tests-2:1.9.4-3.1.rhaos4.12.el8.ppc64le",
"product_id": "skopeo-tests-2:1.9.4-3.1.rhaos4.12.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/skopeo-tests@1.9.4-3.1.rhaos4.12.el8?arch=ppc64le\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "skopeo-debugsource-2:1.9.4-3.1.rhaos4.12.el8.ppc64le",
"product": {
"name": "skopeo-debugsource-2:1.9.4-3.1.rhaos4.12.el8.ppc64le",
"product_id": "skopeo-debugsource-2:1.9.4-3.1.rhaos4.12.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/skopeo-debugsource@1.9.4-3.1.rhaos4.12.el8?arch=ppc64le\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "skopeo-debuginfo-2:1.9.4-3.1.rhaos4.12.el8.ppc64le",
"product": {
"name": "skopeo-debuginfo-2:1.9.4-3.1.rhaos4.12.el8.ppc64le",
"product_id": "skopeo-debuginfo-2:1.9.4-3.1.rhaos4.12.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/skopeo-debuginfo@1.9.4-3.1.rhaos4.12.el8?arch=ppc64le\u0026epoch=2"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "buildah-1:1.23.4-5.rhaos4.12.el9.s390x",
"product": {
"name": "buildah-1:1.23.4-5.rhaos4.12.el9.s390x",
"product_id": "buildah-1:1.23.4-5.rhaos4.12.el9.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/buildah@1.23.4-5.rhaos4.12.el9?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "buildah-tests-1:1.23.4-5.rhaos4.12.el9.s390x",
"product": {
"name": "buildah-tests-1:1.23.4-5.rhaos4.12.el9.s390x",
"product_id": "buildah-tests-1:1.23.4-5.rhaos4.12.el9.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/buildah-tests@1.23.4-5.rhaos4.12.el9?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "buildah-debugsource-1:1.23.4-5.rhaos4.12.el9.s390x",
"product": {
"name": "buildah-debugsource-1:1.23.4-5.rhaos4.12.el9.s390x",
"product_id": "buildah-debugsource-1:1.23.4-5.rhaos4.12.el9.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/buildah-debugsource@1.23.4-5.rhaos4.12.el9?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "buildah-debuginfo-1:1.23.4-5.rhaos4.12.el9.s390x",
"product": {
"name": "buildah-debuginfo-1:1.23.4-5.rhaos4.12.el9.s390x",
"product_id": "buildah-debuginfo-1:1.23.4-5.rhaos4.12.el9.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/buildah-debuginfo@1.23.4-5.rhaos4.12.el9?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "buildah-tests-debuginfo-1:1.23.4-5.rhaos4.12.el9.s390x",
"product": {
"name": "buildah-tests-debuginfo-1:1.23.4-5.rhaos4.12.el9.s390x",
"product_id": "buildah-tests-debuginfo-1:1.23.4-5.rhaos4.12.el9.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/buildah-tests-debuginfo@1.23.4-5.rhaos4.12.el9?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "conmon-2:2.1.2-5.rhaos4.12.el9.s390x",
"product": {
"name": "conmon-2:2.1.2-5.rhaos4.12.el9.s390x",
"product_id": "conmon-2:2.1.2-5.rhaos4.12.el9.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/conmon@2.1.2-5.rhaos4.12.el9?arch=s390x\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "conmon-debugsource-2:2.1.2-5.rhaos4.12.el9.s390x",
"product": {
"name": "conmon-debugsource-2:2.1.2-5.rhaos4.12.el9.s390x",
"product_id": "conmon-debugsource-2:2.1.2-5.rhaos4.12.el9.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/conmon-debugsource@2.1.2-5.rhaos4.12.el9?arch=s390x\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "conmon-debuginfo-2:2.1.2-5.rhaos4.12.el9.s390x",
"product": {
"name": "conmon-debuginfo-2:2.1.2-5.rhaos4.12.el9.s390x",
"product_id": "conmon-debuginfo-2:2.1.2-5.rhaos4.12.el9.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/conmon-debuginfo@2.1.2-5.rhaos4.12.el9?arch=s390x\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el9.s390x",
"product": {
"name": "openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el9.s390x",
"product_id": "openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el9.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-hyperkube@4.12.0-202306121916.p0.g8c21020.assembly.stream.el9?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.s390x",
"product": {
"name": "openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.s390x",
"product_id": "openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-clients@4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "podman-3:4.2.0-7.rhaos4.12.el9.s390x",
"product": {
"name": "podman-3:4.2.0-7.rhaos4.12.el9.s390x",
"product_id": "podman-3:4.2.0-7.rhaos4.12.el9.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman@4.2.0-7.rhaos4.12.el9?arch=s390x\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "podman-catatonit-3:4.2.0-7.rhaos4.12.el9.s390x",
"product": {
"name": "podman-catatonit-3:4.2.0-7.rhaos4.12.el9.s390x",
"product_id": "podman-catatonit-3:4.2.0-7.rhaos4.12.el9.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-catatonit@4.2.0-7.rhaos4.12.el9?arch=s390x\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "podman-gvproxy-3:4.2.0-7.rhaos4.12.el9.s390x",
"product": {
"name": "podman-gvproxy-3:4.2.0-7.rhaos4.12.el9.s390x",
"product_id": "podman-gvproxy-3:4.2.0-7.rhaos4.12.el9.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-gvproxy@4.2.0-7.rhaos4.12.el9?arch=s390x\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "podman-plugins-3:4.2.0-7.rhaos4.12.el9.s390x",
"product": {
"name": "podman-plugins-3:4.2.0-7.rhaos4.12.el9.s390x",
"product_id": "podman-plugins-3:4.2.0-7.rhaos4.12.el9.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-plugins@4.2.0-7.rhaos4.12.el9?arch=s390x\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "podman-remote-3:4.2.0-7.rhaos4.12.el9.s390x",
"product": {
"name": "podman-remote-3:4.2.0-7.rhaos4.12.el9.s390x",
"product_id": "podman-remote-3:4.2.0-7.rhaos4.12.el9.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-remote@4.2.0-7.rhaos4.12.el9?arch=s390x\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "podman-tests-3:4.2.0-7.rhaos4.12.el9.s390x",
"product": {
"name": "podman-tests-3:4.2.0-7.rhaos4.12.el9.s390x",
"product_id": "podman-tests-3:4.2.0-7.rhaos4.12.el9.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-tests@4.2.0-7.rhaos4.12.el9?arch=s390x\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "podman-debugsource-3:4.2.0-7.rhaos4.12.el9.s390x",
"product": {
"name": "podman-debugsource-3:4.2.0-7.rhaos4.12.el9.s390x",
"product_id": "podman-debugsource-3:4.2.0-7.rhaos4.12.el9.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-debugsource@4.2.0-7.rhaos4.12.el9?arch=s390x\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "podman-catatonit-debuginfo-3:4.2.0-7.rhaos4.12.el9.s390x",
"product": {
"name": "podman-catatonit-debuginfo-3:4.2.0-7.rhaos4.12.el9.s390x",
"product_id": "podman-catatonit-debuginfo-3:4.2.0-7.rhaos4.12.el9.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-catatonit-debuginfo@4.2.0-7.rhaos4.12.el9?arch=s390x\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "podman-debuginfo-3:4.2.0-7.rhaos4.12.el9.s390x",
"product": {
"name": "podman-debuginfo-3:4.2.0-7.rhaos4.12.el9.s390x",
"product_id": "podman-debuginfo-3:4.2.0-7.rhaos4.12.el9.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-debuginfo@4.2.0-7.rhaos4.12.el9?arch=s390x\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "podman-gvproxy-debuginfo-3:4.2.0-7.rhaos4.12.el9.s390x",
"product": {
"name": "podman-gvproxy-debuginfo-3:4.2.0-7.rhaos4.12.el9.s390x",
"product_id": "podman-gvproxy-debuginfo-3:4.2.0-7.rhaos4.12.el9.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-gvproxy-debuginfo@4.2.0-7.rhaos4.12.el9?arch=s390x\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "podman-plugins-debuginfo-3:4.2.0-7.rhaos4.12.el9.s390x",
"product": {
"name": "podman-plugins-debuginfo-3:4.2.0-7.rhaos4.12.el9.s390x",
"product_id": "podman-plugins-debuginfo-3:4.2.0-7.rhaos4.12.el9.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-plugins-debuginfo@4.2.0-7.rhaos4.12.el9?arch=s390x\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "podman-remote-debuginfo-3:4.2.0-7.rhaos4.12.el9.s390x",
"product": {
"name": "podman-remote-debuginfo-3:4.2.0-7.rhaos4.12.el9.s390x",
"product_id": "podman-remote-debuginfo-3:4.2.0-7.rhaos4.12.el9.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-remote-debuginfo@4.2.0-7.rhaos4.12.el9?arch=s390x\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "skopeo-2:1.9.4-3.rhaos4.12.el9.s390x",
"product": {
"name": "skopeo-2:1.9.4-3.rhaos4.12.el9.s390x",
"product_id": "skopeo-2:1.9.4-3.rhaos4.12.el9.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/skopeo@1.9.4-3.rhaos4.12.el9?arch=s390x\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "skopeo-tests-2:1.9.4-3.rhaos4.12.el9.s390x",
"product": {
"name": "skopeo-tests-2:1.9.4-3.rhaos4.12.el9.s390x",
"product_id": "skopeo-tests-2:1.9.4-3.rhaos4.12.el9.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/skopeo-tests@1.9.4-3.rhaos4.12.el9?arch=s390x\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "skopeo-debugsource-2:1.9.4-3.rhaos4.12.el9.s390x",
"product": {
"name": "skopeo-debugsource-2:1.9.4-3.rhaos4.12.el9.s390x",
"product_id": "skopeo-debugsource-2:1.9.4-3.rhaos4.12.el9.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/skopeo-debugsource@1.9.4-3.rhaos4.12.el9?arch=s390x\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "skopeo-debuginfo-2:1.9.4-3.rhaos4.12.el9.s390x",
"product": {
"name": "skopeo-debuginfo-2:1.9.4-3.rhaos4.12.el9.s390x",
"product_id": "skopeo-debuginfo-2:1.9.4-3.rhaos4.12.el9.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/skopeo-debuginfo@1.9.4-3.rhaos4.12.el9?arch=s390x\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "buildah-1:1.23.4-5.1.rhaos4.12.el8.s390x",
"product": {
"name": "buildah-1:1.23.4-5.1.rhaos4.12.el8.s390x",
"product_id": "buildah-1:1.23.4-5.1.rhaos4.12.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/buildah@1.23.4-5.1.rhaos4.12.el8?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "buildah-tests-1:1.23.4-5.1.rhaos4.12.el8.s390x",
"product": {
"name": "buildah-tests-1:1.23.4-5.1.rhaos4.12.el8.s390x",
"product_id": "buildah-tests-1:1.23.4-5.1.rhaos4.12.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/buildah-tests@1.23.4-5.1.rhaos4.12.el8?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "buildah-debugsource-1:1.23.4-5.1.rhaos4.12.el8.s390x",
"product": {
"name": "buildah-debugsource-1:1.23.4-5.1.rhaos4.12.el8.s390x",
"product_id": "buildah-debugsource-1:1.23.4-5.1.rhaos4.12.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/buildah-debugsource@1.23.4-5.1.rhaos4.12.el8?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "buildah-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.s390x",
"product": {
"name": "buildah-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.s390x",
"product_id": "buildah-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/buildah-debuginfo@1.23.4-5.1.rhaos4.12.el8?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "buildah-tests-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.s390x",
"product": {
"name": "buildah-tests-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.s390x",
"product_id": "buildah-tests-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/buildah-tests-debuginfo@1.23.4-5.1.rhaos4.12.el8?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "conmon-2:2.1.2-4.rhaos4.12.el8.s390x",
"product": {
"name": "conmon-2:2.1.2-4.rhaos4.12.el8.s390x",
"product_id": "conmon-2:2.1.2-4.rhaos4.12.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/conmon@2.1.2-4.rhaos4.12.el8?arch=s390x\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "conmon-debugsource-2:2.1.2-4.rhaos4.12.el8.s390x",
"product": {
"name": "conmon-debugsource-2:2.1.2-4.rhaos4.12.el8.s390x",
"product_id": "conmon-debugsource-2:2.1.2-4.rhaos4.12.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/conmon-debugsource@2.1.2-4.rhaos4.12.el8?arch=s390x\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "conmon-debuginfo-2:2.1.2-4.rhaos4.12.el8.s390x",
"product": {
"name": "conmon-debuginfo-2:2.1.2-4.rhaos4.12.el8.s390x",
"product_id": "conmon-debuginfo-2:2.1.2-4.rhaos4.12.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/conmon-debuginfo@2.1.2-4.rhaos4.12.el8?arch=s390x\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "containernetworking-plugins-0:1.0.1-7.rhaos4.12.el8.s390x",
"product": {
"name": "containernetworking-plugins-0:1.0.1-7.rhaos4.12.el8.s390x",
"product_id": "containernetworking-plugins-0:1.0.1-7.rhaos4.12.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/containernetworking-plugins@1.0.1-7.rhaos4.12.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "containernetworking-plugins-debugsource-0:1.0.1-7.rhaos4.12.el8.s390x",
"product": {
"name": "containernetworking-plugins-debugsource-0:1.0.1-7.rhaos4.12.el8.s390x",
"product_id": "containernetworking-plugins-debugsource-0:1.0.1-7.rhaos4.12.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/containernetworking-plugins-debugsource@1.0.1-7.rhaos4.12.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "containernetworking-plugins-debuginfo-0:1.0.1-7.rhaos4.12.el8.s390x",
"product": {
"name": "containernetworking-plugins-debuginfo-0:1.0.1-7.rhaos4.12.el8.s390x",
"product_id": "containernetworking-plugins-debuginfo-0:1.0.1-7.rhaos4.12.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/containernetworking-plugins-debuginfo@1.0.1-7.rhaos4.12.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "bpftool-0:4.18.0-372.59.1.el8_6.s390x",
"product": {
"name": "bpftool-0:4.18.0-372.59.1.el8_6.s390x",
"product_id": "bpftool-0:4.18.0-372.59.1.el8_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool@4.18.0-372.59.1.el8_6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-0:4.18.0-372.59.1.el8_6.s390x",
"product": {
"name": "kernel-0:4.18.0-372.59.1.el8_6.s390x",
"product_id": "kernel-0:4.18.0-372.59.1.el8_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@4.18.0-372.59.1.el8_6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-core-0:4.18.0-372.59.1.el8_6.s390x",
"product": {
"name": "kernel-core-0:4.18.0-372.59.1.el8_6.s390x",
"product_id": "kernel-core-0:4.18.0-372.59.1.el8_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-core@4.18.0-372.59.1.el8_6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-cross-headers-0:4.18.0-372.59.1.el8_6.s390x",
"product": {
"name": "kernel-cross-headers-0:4.18.0-372.59.1.el8_6.s390x",
"product_id": "kernel-cross-headers-0:4.18.0-372.59.1.el8_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-cross-headers@4.18.0-372.59.1.el8_6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:4.18.0-372.59.1.el8_6.s390x",
"product": {
"name": "kernel-debug-0:4.18.0-372.59.1.el8_6.s390x",
"product_id": "kernel-debug-0:4.18.0-372.59.1.el8_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@4.18.0-372.59.1.el8_6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-core-0:4.18.0-372.59.1.el8_6.s390x",
"product": {
"name": "kernel-debug-core-0:4.18.0-372.59.1.el8_6.s390x",
"product_id": "kernel-debug-core-0:4.18.0-372.59.1.el8_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-core@4.18.0-372.59.1.el8_6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:4.18.0-372.59.1.el8_6.s390x",
"product": {
"name": "kernel-debug-devel-0:4.18.0-372.59.1.el8_6.s390x",
"product_id": "kernel-debug-devel-0:4.18.0-372.59.1.el8_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@4.18.0-372.59.1.el8_6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-0:4.18.0-372.59.1.el8_6.s390x",
"product": {
"name": "kernel-debug-modules-0:4.18.0-372.59.1.el8_6.s390x",
"product_id": "kernel-debug-modules-0:4.18.0-372.59.1.el8_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules@4.18.0-372.59.1.el8_6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-extra-0:4.18.0-372.59.1.el8_6.s390x",
"product": {
"name": "kernel-debug-modules-extra-0:4.18.0-372.59.1.el8_6.s390x",
"product_id": "kernel-debug-modules-extra-0:4.18.0-372.59.1.el8_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules-extra@4.18.0-372.59.1.el8_6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-internal-0:4.18.0-372.59.1.el8_6.s390x",
"product": {
"name": "kernel-debug-modules-internal-0:4.18.0-372.59.1.el8_6.s390x",
"product_id": "kernel-debug-modules-internal-0:4.18.0-372.59.1.el8_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules-internal@4.18.0-372.59.1.el8_6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:4.18.0-372.59.1.el8_6.s390x",
"product": {
"name": "kernel-devel-0:4.18.0-372.59.1.el8_6.s390x",
"product_id": "kernel-devel-0:4.18.0-372.59.1.el8_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@4.18.0-372.59.1.el8_6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:4.18.0-372.59.1.el8_6.s390x",
"product": {
"name": "kernel-headers-0:4.18.0-372.59.1.el8_6.s390x",
"product_id": "kernel-headers-0:4.18.0-372.59.1.el8_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@4.18.0-372.59.1.el8_6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-0:4.18.0-372.59.1.el8_6.s390x",
"product": {
"name": "kernel-modules-0:4.18.0-372.59.1.el8_6.s390x",
"product_id": "kernel-modules-0:4.18.0-372.59.1.el8_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules@4.18.0-372.59.1.el8_6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-extra-0:4.18.0-372.59.1.el8_6.s390x",
"product": {
"name": "kernel-modules-extra-0:4.18.0-372.59.1.el8_6.s390x",
"product_id": "kernel-modules-extra-0:4.18.0-372.59.1.el8_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules-extra@4.18.0-372.59.1.el8_6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-internal-0:4.18.0-372.59.1.el8_6.s390x",
"product": {
"name": "kernel-modules-internal-0:4.18.0-372.59.1.el8_6.s390x",
"product_id": "kernel-modules-internal-0:4.18.0-372.59.1.el8_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules-internal@4.18.0-372.59.1.el8_6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-selftests-internal-0:4.18.0-372.59.1.el8_6.s390x",
"product": {
"name": "kernel-selftests-internal-0:4.18.0-372.59.1.el8_6.s390x",
"product_id": "kernel-selftests-internal-0:4.18.0-372.59.1.el8_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-selftests-internal@4.18.0-372.59.1.el8_6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:4.18.0-372.59.1.el8_6.s390x",
"product": {
"name": "kernel-tools-0:4.18.0-372.59.1.el8_6.s390x",
"product_id": "kernel-tools-0:4.18.0-372.59.1.el8_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@4.18.0-372.59.1.el8_6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-0:4.18.0-372.59.1.el8_6.s390x",
"product": {
"name": "kernel-zfcpdump-0:4.18.0-372.59.1.el8_6.s390x",
"product_id": "kernel-zfcpdump-0:4.18.0-372.59.1.el8_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump@4.18.0-372.59.1.el8_6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-core-0:4.18.0-372.59.1.el8_6.s390x",
"product": {
"name": "kernel-zfcpdump-core-0:4.18.0-372.59.1.el8_6.s390x",
"product_id": "kernel-zfcpdump-core-0:4.18.0-372.59.1.el8_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump-core@4.18.0-372.59.1.el8_6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-devel-0:4.18.0-372.59.1.el8_6.s390x",
"product": {
"name": "kernel-zfcpdump-devel-0:4.18.0-372.59.1.el8_6.s390x",
"product_id": "kernel-zfcpdump-devel-0:4.18.0-372.59.1.el8_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump-devel@4.18.0-372.59.1.el8_6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-modules-0:4.18.0-372.59.1.el8_6.s390x",
"product": {
"name": "kernel-zfcpdump-modules-0:4.18.0-372.59.1.el8_6.s390x",
"product_id": "kernel-zfcpdump-modules-0:4.18.0-372.59.1.el8_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump-modules@4.18.0-372.59.1.el8_6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-modules-extra-0:4.18.0-372.59.1.el8_6.s390x",
"product": {
"name": "kernel-zfcpdump-modules-extra-0:4.18.0-372.59.1.el8_6.s390x",
"product_id": "kernel-zfcpdump-modules-extra-0:4.18.0-372.59.1.el8_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump-modules-extra@4.18.0-372.59.1.el8_6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-modules-internal-0:4.18.0-372.59.1.el8_6.s390x",
"product": {
"name": "kernel-zfcpdump-modules-internal-0:4.18.0-372.59.1.el8_6.s390x",
"product_id": "kernel-zfcpdump-modules-internal-0:4.18.0-372.59.1.el8_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump-modules-internal@4.18.0-372.59.1.el8_6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "perf-0:4.18.0-372.59.1.el8_6.s390x",
"product": {
"name": "perf-0:4.18.0-372.59.1.el8_6.s390x",
"product_id": "perf-0:4.18.0-372.59.1.el8_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@4.18.0-372.59.1.el8_6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python3-perf-0:4.18.0-372.59.1.el8_6.s390x",
"product": {
"name": "python3-perf-0:4.18.0-372.59.1.el8_6.s390x",
"product_id": "python3-perf-0:4.18.0-372.59.1.el8_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf@4.18.0-372.59.1.el8_6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "bpftool-debuginfo-0:4.18.0-372.59.1.el8_6.s390x",
"product": {
"name": "bpftool-debuginfo-0:4.18.0-372.59.1.el8_6.s390x",
"product_id": "bpftool-debuginfo-0:4.18.0-372.59.1.el8_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool-debuginfo@4.18.0-372.59.1.el8_6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:4.18.0-372.59.1.el8_6.s390x",
"product": {
"name": "kernel-debug-debuginfo-0:4.18.0-372.59.1.el8_6.s390x",
"product_id": "kernel-debug-debuginfo-0:4.18.0-372.59.1.el8_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.18.0-372.59.1.el8_6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:4.18.0-372.59.1.el8_6.s390x",
"product": {
"name": "kernel-debuginfo-0:4.18.0-372.59.1.el8_6.s390x",
"product_id": "kernel-debuginfo-0:4.18.0-372.59.1.el8_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@4.18.0-372.59.1.el8_6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-s390x-0:4.18.0-372.59.1.el8_6.s390x",
"product": {
"name": "kernel-debuginfo-common-s390x-0:4.18.0-372.59.1.el8_6.s390x",
"product_id": "kernel-debuginfo-common-s390x-0:4.18.0-372.59.1.el8_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-s390x@4.18.0-372.59.1.el8_6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:4.18.0-372.59.1.el8_6.s390x",
"product": {
"name": "kernel-tools-debuginfo-0:4.18.0-372.59.1.el8_6.s390x",
"product_id": "kernel-tools-debuginfo-0:4.18.0-372.59.1.el8_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.18.0-372.59.1.el8_6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-debuginfo-0:4.18.0-372.59.1.el8_6.s390x",
"product": {
"name": "kernel-zfcpdump-debuginfo-0:4.18.0-372.59.1.el8_6.s390x",
"product_id": "kernel-zfcpdump-debuginfo-0:4.18.0-372.59.1.el8_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump-debuginfo@4.18.0-372.59.1.el8_6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:4.18.0-372.59.1.el8_6.s390x",
"product": {
"name": "perf-debuginfo-0:4.18.0-372.59.1.el8_6.s390x",
"product_id": "perf-debuginfo-0:4.18.0-372.59.1.el8_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@4.18.0-372.59.1.el8_6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python3-perf-debuginfo-0:4.18.0-372.59.1.el8_6.s390x",
"product": {
"name": "python3-perf-debuginfo-0:4.18.0-372.59.1.el8_6.s390x",
"product_id": "python3-perf-debuginfo-0:4.18.0-372.59.1.el8_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf-debuginfo@4.18.0-372.59.1.el8_6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el8.s390x",
"product": {
"name": "openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el8.s390x",
"product_id": "openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-hyperkube@4.12.0-202306121916.p0.g8c21020.assembly.stream.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.s390x",
"product": {
"name": "openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.s390x",
"product_id": "openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-clients@4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "podman-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"product": {
"name": "podman-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"product_id": "podman-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman@4.2.0-6.1.rhaos4.12.el8?arch=s390x\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "podman-catatonit-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"product": {
"name": "podman-catatonit-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"product_id": "podman-catatonit-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-catatonit@4.2.0-6.1.rhaos4.12.el8?arch=s390x\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "podman-gvproxy-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"product": {
"name": "podman-gvproxy-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"product_id": "podman-gvproxy-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-gvproxy@4.2.0-6.1.rhaos4.12.el8?arch=s390x\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "podman-plugins-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"product": {
"name": "podman-plugins-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"product_id": "podman-plugins-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-plugins@4.2.0-6.1.rhaos4.12.el8?arch=s390x\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "podman-remote-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"product": {
"name": "podman-remote-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"product_id": "podman-remote-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-remote@4.2.0-6.1.rhaos4.12.el8?arch=s390x\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "podman-tests-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"product": {
"name": "podman-tests-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"product_id": "podman-tests-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-tests@4.2.0-6.1.rhaos4.12.el8?arch=s390x\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "podman-debugsource-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"product": {
"name": "podman-debugsource-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"product_id": "podman-debugsource-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-debugsource@4.2.0-6.1.rhaos4.12.el8?arch=s390x\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "podman-catatonit-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"product": {
"name": "podman-catatonit-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"product_id": "podman-catatonit-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-catatonit-debuginfo@4.2.0-6.1.rhaos4.12.el8?arch=s390x\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "podman-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"product": {
"name": "podman-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"product_id": "podman-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-debuginfo@4.2.0-6.1.rhaos4.12.el8?arch=s390x\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "podman-gvproxy-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"product": {
"name": "podman-gvproxy-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"product_id": "podman-gvproxy-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-gvproxy-debuginfo@4.2.0-6.1.rhaos4.12.el8?arch=s390x\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "podman-plugins-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"product": {
"name": "podman-plugins-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"product_id": "podman-plugins-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-plugins-debuginfo@4.2.0-6.1.rhaos4.12.el8?arch=s390x\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "podman-remote-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"product": {
"name": "podman-remote-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"product_id": "podman-remote-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-remote-debuginfo@4.2.0-6.1.rhaos4.12.el8?arch=s390x\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "runc-3:1.1.6-4.rhaos4.12.el8.s390x",
"product": {
"name": "runc-3:1.1.6-4.rhaos4.12.el8.s390x",
"product_id": "runc-3:1.1.6-4.rhaos4.12.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/runc@1.1.6-4.rhaos4.12.el8?arch=s390x\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "runc-debugsource-3:1.1.6-4.rhaos4.12.el8.s390x",
"product": {
"name": "runc-debugsource-3:1.1.6-4.rhaos4.12.el8.s390x",
"product_id": "runc-debugsource-3:1.1.6-4.rhaos4.12.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/runc-debugsource@1.1.6-4.rhaos4.12.el8?arch=s390x\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "runc-debuginfo-3:1.1.6-4.rhaos4.12.el8.s390x",
"product": {
"name": "runc-debuginfo-3:1.1.6-4.rhaos4.12.el8.s390x",
"product_id": "runc-debuginfo-3:1.1.6-4.rhaos4.12.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/runc-debuginfo@1.1.6-4.rhaos4.12.el8?arch=s390x\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "skopeo-2:1.9.4-3.1.rhaos4.12.el8.s390x",
"product": {
"name": "skopeo-2:1.9.4-3.1.rhaos4.12.el8.s390x",
"product_id": "skopeo-2:1.9.4-3.1.rhaos4.12.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/skopeo@1.9.4-3.1.rhaos4.12.el8?arch=s390x\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "skopeo-tests-2:1.9.4-3.1.rhaos4.12.el8.s390x",
"product": {
"name": "skopeo-tests-2:1.9.4-3.1.rhaos4.12.el8.s390x",
"product_id": "skopeo-tests-2:1.9.4-3.1.rhaos4.12.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/skopeo-tests@1.9.4-3.1.rhaos4.12.el8?arch=s390x\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "skopeo-debugsource-2:1.9.4-3.1.rhaos4.12.el8.s390x",
"product": {
"name": "skopeo-debugsource-2:1.9.4-3.1.rhaos4.12.el8.s390x",
"product_id": "skopeo-debugsource-2:1.9.4-3.1.rhaos4.12.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/skopeo-debugsource@1.9.4-3.1.rhaos4.12.el8?arch=s390x\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "skopeo-debuginfo-2:1.9.4-3.1.rhaos4.12.el8.s390x",
"product": {
"name": "skopeo-debuginfo-2:1.9.4-3.1.rhaos4.12.el8.s390x",
"product_id": "skopeo-debuginfo-2:1.9.4-3.1.rhaos4.12.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/skopeo-debuginfo@1.9.4-3.1.rhaos4.12.el8?arch=s390x\u0026epoch=2"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "podman-docker-3:4.2.0-7.rhaos4.12.el9.noarch",
"product": {
"name": "podman-docker-3:4.2.0-7.rhaos4.12.el9.noarch",
"product_id": "podman-docker-3:4.2.0-7.rhaos4.12.el9.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-docker@4.2.0-7.rhaos4.12.el9?arch=noarch\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "kernel-doc-0:4.18.0-372.59.1.el8_6.noarch",
"product": {
"name": "kernel-doc-0:4.18.0-372.59.1.el8_6.noarch",
"product_id": "kernel-doc-0:4.18.0-372.59.1.el8_6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-doc@4.18.0-372.59.1.el8_6?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "openshift-ansible-0:4.12.0-202306090942.p0.g74dc7b3.assembly.stream.el8.noarch",
"product": {
"name": "openshift-ansible-0:4.12.0-202306090942.p0.g74dc7b3.assembly.stream.el8.noarch",
"product_id": "openshift-ansible-0:4.12.0-202306090942.p0.g74dc7b3.assembly.stream.el8.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-ansible@4.12.0-202306090942.p0.g74dc7b3.assembly.stream.el8?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "openshift-ansible-test-0:4.12.0-202306090942.p0.g74dc7b3.assembly.stream.el8.noarch",
"product": {
"name": "openshift-ansible-test-0:4.12.0-202306090942.p0.g74dc7b3.assembly.stream.el8.noarch",
"product_id": "openshift-ansible-test-0:4.12.0-202306090942.p0.g74dc7b3.assembly.stream.el8.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-ansible-test@4.12.0-202306090942.p0.g74dc7b3.assembly.stream.el8?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "openshift-kuryr-cni-0:4.12.0-202306140156.p0.g31dd228.assembly.stream.el8.noarch",
"product": {
"name": "openshift-kuryr-cni-0:4.12.0-202306140156.p0.g31dd228.assembly.stream.el8.noarch",
"product_id": "openshift-kuryr-cni-0:4.12.0-202306140156.p0.g31dd228.assembly.stream.el8.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-kuryr-cni@4.12.0-202306140156.p0.g31dd228.assembly.stream.el8?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "openshift-kuryr-common-0:4.12.0-202306140156.p0.g31dd228.assembly.stream.el8.noarch",
"product": {
"name": "openshift-kuryr-common-0:4.12.0-202306140156.p0.g31dd228.assembly.stream.el8.noarch",
"product_id": "openshift-kuryr-common-0:4.12.0-202306140156.p0.g31dd228.assembly.stream.el8.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-kuryr-common@4.12.0-202306140156.p0.g31dd228.assembly.stream.el8?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "openshift-kuryr-controller-0:4.12.0-202306140156.p0.g31dd228.assembly.stream.el8.noarch",
"product": {
"name": "openshift-kuryr-controller-0:4.12.0-202306140156.p0.g31dd228.assembly.stream.el8.noarch",
"product_id": "openshift-kuryr-controller-0:4.12.0-202306140156.p0.g31dd228.assembly.stream.el8.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-kuryr-controller@4.12.0-202306140156.p0.g31dd228.assembly.stream.el8?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "python3-kuryr-kubernetes-0:4.12.0-202306140156.p0.g31dd228.assembly.stream.el8.noarch",
"product": {
"name": "python3-kuryr-kubernetes-0:4.12.0-202306140156.p0.g31dd228.assembly.stream.el8.noarch",
"product_id": "python3-kuryr-kubernetes-0:4.12.0-202306140156.p0.g31dd228.assembly.stream.el8.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-kuryr-kubernetes@4.12.0-202306140156.p0.g31dd228.assembly.stream.el8?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "openshift4-aws-iso-0:4.12.0-202306090942.p0.gd2acdd5.assembly.stream.el8.noarch",
"product": {
"name": "openshift4-aws-iso-0:4.12.0-202306090942.p0.gd2acdd5.assembly.stream.el8.noarch",
"product_id": "openshift4-aws-iso-0:4.12.0-202306090942.p0.gd2acdd5.assembly.stream.el8.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift4-aws-iso@4.12.0-202306090942.p0.gd2acdd5.assembly.stream.el8?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "podman-docker-3:4.2.0-6.1.rhaos4.12.el8.noarch",
"product": {
"name": "podman-docker-3:4.2.0-6.1.rhaos4.12.el8.noarch",
"product_id": "podman-docker-3:4.2.0-6.1.rhaos4.12.el8.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-docker@4.2.0-6.1.rhaos4.12.el8?arch=noarch\u0026epoch=3"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-372.59.1.el8_6.aarch64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:bpftool-0:4.18.0-372.59.1.el8_6.aarch64"
},
"product_reference": "bpftool-0:4.18.0-372.59.1.el8_6.aarch64",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-372.59.1.el8_6.ppc64le as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:bpftool-0:4.18.0-372.59.1.el8_6.ppc64le"
},
"product_reference": "bpftool-0:4.18.0-372.59.1.el8_6.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-372.59.1.el8_6.s390x as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:bpftool-0:4.18.0-372.59.1.el8_6.s390x"
},
"product_reference": "bpftool-0:4.18.0-372.59.1.el8_6.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-372.59.1.el8_6.x86_64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:bpftool-0:4.18.0-372.59.1.el8_6.x86_64"
},
"product_reference": "bpftool-0:4.18.0-372.59.1.el8_6.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:bpftool-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:bpftool-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-372.59.1.el8_6.s390x as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:bpftool-debuginfo-0:4.18.0-372.59.1.el8_6.s390x"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-372.59.1.el8_6.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:bpftool-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "buildah-1:1.23.4-5.1.rhaos4.12.el8.aarch64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:buildah-1:1.23.4-5.1.rhaos4.12.el8.aarch64"
},
"product_reference": "buildah-1:1.23.4-5.1.rhaos4.12.el8.aarch64",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "buildah-1:1.23.4-5.1.rhaos4.12.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:buildah-1:1.23.4-5.1.rhaos4.12.el8.ppc64le"
},
"product_reference": "buildah-1:1.23.4-5.1.rhaos4.12.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "buildah-1:1.23.4-5.1.rhaos4.12.el8.s390x as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:buildah-1:1.23.4-5.1.rhaos4.12.el8.s390x"
},
"product_reference": "buildah-1:1.23.4-5.1.rhaos4.12.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "buildah-1:1.23.4-5.1.rhaos4.12.el8.src as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:buildah-1:1.23.4-5.1.rhaos4.12.el8.src"
},
"product_reference": "buildah-1:1.23.4-5.1.rhaos4.12.el8.src",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "buildah-1:1.23.4-5.1.rhaos4.12.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:buildah-1:1.23.4-5.1.rhaos4.12.el8.x86_64"
},
"product_reference": "buildah-1:1.23.4-5.1.rhaos4.12.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "buildah-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.aarch64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.aarch64"
},
"product_reference": "buildah-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.aarch64",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "buildah-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.ppc64le"
},
"product_reference": "buildah-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "buildah-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.s390x as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.s390x"
},
"product_reference": "buildah-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "buildah-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.x86_64"
},
"product_reference": "buildah-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "buildah-debugsource-1:1.23.4-5.1.rhaos4.12.el8.aarch64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.1.rhaos4.12.el8.aarch64"
},
"product_reference": "buildah-debugsource-1:1.23.4-5.1.rhaos4.12.el8.aarch64",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "buildah-debugsource-1:1.23.4-5.1.rhaos4.12.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.1.rhaos4.12.el8.ppc64le"
},
"product_reference": "buildah-debugsource-1:1.23.4-5.1.rhaos4.12.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "buildah-debugsource-1:1.23.4-5.1.rhaos4.12.el8.s390x as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.1.rhaos4.12.el8.s390x"
},
"product_reference": "buildah-debugsource-1:1.23.4-5.1.rhaos4.12.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "buildah-debugsource-1:1.23.4-5.1.rhaos4.12.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.1.rhaos4.12.el8.x86_64"
},
"product_reference": "buildah-debugsource-1:1.23.4-5.1.rhaos4.12.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "buildah-tests-1:1.23.4-5.1.rhaos4.12.el8.aarch64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.1.rhaos4.12.el8.aarch64"
},
"product_reference": "buildah-tests-1:1.23.4-5.1.rhaos4.12.el8.aarch64",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "buildah-tests-1:1.23.4-5.1.rhaos4.12.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.1.rhaos4.12.el8.ppc64le"
},
"product_reference": "buildah-tests-1:1.23.4-5.1.rhaos4.12.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "buildah-tests-1:1.23.4-5.1.rhaos4.12.el8.s390x as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.1.rhaos4.12.el8.s390x"
},
"product_reference": "buildah-tests-1:1.23.4-5.1.rhaos4.12.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "buildah-tests-1:1.23.4-5.1.rhaos4.12.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.1.rhaos4.12.el8.x86_64"
},
"product_reference": "buildah-tests-1:1.23.4-5.1.rhaos4.12.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "buildah-tests-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.aarch64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.aarch64"
},
"product_reference": "buildah-tests-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.aarch64",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "buildah-tests-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.ppc64le"
},
"product_reference": "buildah-tests-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "buildah-tests-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.s390x as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.s390x"
},
"product_reference": "buildah-tests-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "buildah-tests-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.x86_64"
},
"product_reference": "buildah-tests-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "conmon-2:2.1.2-4.rhaos4.12.el8.aarch64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:conmon-2:2.1.2-4.rhaos4.12.el8.aarch64"
},
"product_reference": "conmon-2:2.1.2-4.rhaos4.12.el8.aarch64",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "conmon-2:2.1.2-4.rhaos4.12.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:conmon-2:2.1.2-4.rhaos4.12.el8.ppc64le"
},
"product_reference": "conmon-2:2.1.2-4.rhaos4.12.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "conmon-2:2.1.2-4.rhaos4.12.el8.s390x as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:conmon-2:2.1.2-4.rhaos4.12.el8.s390x"
},
"product_reference": "conmon-2:2.1.2-4.rhaos4.12.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "conmon-2:2.1.2-4.rhaos4.12.el8.src as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:conmon-2:2.1.2-4.rhaos4.12.el8.src"
},
"product_reference": "conmon-2:2.1.2-4.rhaos4.12.el8.src",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "conmon-2:2.1.2-4.rhaos4.12.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:conmon-2:2.1.2-4.rhaos4.12.el8.x86_64"
},
"product_reference": "conmon-2:2.1.2-4.rhaos4.12.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "conmon-debuginfo-2:2.1.2-4.rhaos4.12.el8.aarch64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-4.rhaos4.12.el8.aarch64"
},
"product_reference": "conmon-debuginfo-2:2.1.2-4.rhaos4.12.el8.aarch64",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "conmon-debuginfo-2:2.1.2-4.rhaos4.12.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-4.rhaos4.12.el8.ppc64le"
},
"product_reference": "conmon-debuginfo-2:2.1.2-4.rhaos4.12.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "conmon-debuginfo-2:2.1.2-4.rhaos4.12.el8.s390x as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-4.rhaos4.12.el8.s390x"
},
"product_reference": "conmon-debuginfo-2:2.1.2-4.rhaos4.12.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "conmon-debuginfo-2:2.1.2-4.rhaos4.12.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-4.rhaos4.12.el8.x86_64"
},
"product_reference": "conmon-debuginfo-2:2.1.2-4.rhaos4.12.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "conmon-debugsource-2:2.1.2-4.rhaos4.12.el8.aarch64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-4.rhaos4.12.el8.aarch64"
},
"product_reference": "conmon-debugsource-2:2.1.2-4.rhaos4.12.el8.aarch64",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "conmon-debugsource-2:2.1.2-4.rhaos4.12.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-4.rhaos4.12.el8.ppc64le"
},
"product_reference": "conmon-debugsource-2:2.1.2-4.rhaos4.12.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "conmon-debugsource-2:2.1.2-4.rhaos4.12.el8.s390x as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-4.rhaos4.12.el8.s390x"
},
"product_reference": "conmon-debugsource-2:2.1.2-4.rhaos4.12.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "conmon-debugsource-2:2.1.2-4.rhaos4.12.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-4.rhaos4.12.el8.x86_64"
},
"product_reference": "conmon-debugsource-2:2.1.2-4.rhaos4.12.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "containernetworking-plugins-0:1.0.1-7.rhaos4.12.el8.aarch64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:containernetworking-plugins-0:1.0.1-7.rhaos4.12.el8.aarch64"
},
"product_reference": "containernetworking-plugins-0:1.0.1-7.rhaos4.12.el8.aarch64",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "containernetworking-plugins-0:1.0.1-7.rhaos4.12.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:containernetworking-plugins-0:1.0.1-7.rhaos4.12.el8.ppc64le"
},
"product_reference": "containernetworking-plugins-0:1.0.1-7.rhaos4.12.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "containernetworking-plugins-0:1.0.1-7.rhaos4.12.el8.s390x as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:containernetworking-plugins-0:1.0.1-7.rhaos4.12.el8.s390x"
},
"product_reference": "containernetworking-plugins-0:1.0.1-7.rhaos4.12.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "containernetworking-plugins-0:1.0.1-7.rhaos4.12.el8.src as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:containernetworking-plugins-0:1.0.1-7.rhaos4.12.el8.src"
},
"product_reference": "containernetworking-plugins-0:1.0.1-7.rhaos4.12.el8.src",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "containernetworking-plugins-0:1.0.1-7.rhaos4.12.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:containernetworking-plugins-0:1.0.1-7.rhaos4.12.el8.x86_64"
},
"product_reference": "containernetworking-plugins-0:1.0.1-7.rhaos4.12.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "containernetworking-plugins-debuginfo-0:1.0.1-7.rhaos4.12.el8.aarch64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:containernetworking-plugins-debuginfo-0:1.0.1-7.rhaos4.12.el8.aarch64"
},
"product_reference": "containernetworking-plugins-debuginfo-0:1.0.1-7.rhaos4.12.el8.aarch64",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "containernetworking-plugins-debuginfo-0:1.0.1-7.rhaos4.12.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:containernetworking-plugins-debuginfo-0:1.0.1-7.rhaos4.12.el8.ppc64le"
},
"product_reference": "containernetworking-plugins-debuginfo-0:1.0.1-7.rhaos4.12.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "containernetworking-plugins-debuginfo-0:1.0.1-7.rhaos4.12.el8.s390x as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:containernetworking-plugins-debuginfo-0:1.0.1-7.rhaos4.12.el8.s390x"
},
"product_reference": "containernetworking-plugins-debuginfo-0:1.0.1-7.rhaos4.12.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "containernetworking-plugins-debuginfo-0:1.0.1-7.rhaos4.12.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:containernetworking-plugins-debuginfo-0:1.0.1-7.rhaos4.12.el8.x86_64"
},
"product_reference": "containernetworking-plugins-debuginfo-0:1.0.1-7.rhaos4.12.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "containernetworking-plugins-debugsource-0:1.0.1-7.rhaos4.12.el8.aarch64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:containernetworking-plugins-debugsource-0:1.0.1-7.rhaos4.12.el8.aarch64"
},
"product_reference": "containernetworking-plugins-debugsource-0:1.0.1-7.rhaos4.12.el8.aarch64",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "containernetworking-plugins-debugsource-0:1.0.1-7.rhaos4.12.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:containernetworking-plugins-debugsource-0:1.0.1-7.rhaos4.12.el8.ppc64le"
},
"product_reference": "containernetworking-plugins-debugsource-0:1.0.1-7.rhaos4.12.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "containernetworking-plugins-debugsource-0:1.0.1-7.rhaos4.12.el8.s390x as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:containernetworking-plugins-debugsource-0:1.0.1-7.rhaos4.12.el8.s390x"
},
"product_reference": "containernetworking-plugins-debugsource-0:1.0.1-7.rhaos4.12.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "containernetworking-plugins-debugsource-0:1.0.1-7.rhaos4.12.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:containernetworking-plugins-debugsource-0:1.0.1-7.rhaos4.12.el8.x86_64"
},
"product_reference": "containernetworking-plugins-debugsource-0:1.0.1-7.rhaos4.12.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-372.59.1.el8_6.aarch64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:kernel-0:4.18.0-372.59.1.el8_6.aarch64"
},
"product_reference": "kernel-0:4.18.0-372.59.1.el8_6.aarch64",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-372.59.1.el8_6.ppc64le as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:kernel-0:4.18.0-372.59.1.el8_6.ppc64le"
},
"product_reference": "kernel-0:4.18.0-372.59.1.el8_6.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-372.59.1.el8_6.s390x as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:kernel-0:4.18.0-372.59.1.el8_6.s390x"
},
"product_reference": "kernel-0:4.18.0-372.59.1.el8_6.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-372.59.1.el8_6.src as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:kernel-0:4.18.0-372.59.1.el8_6.src"
},
"product_reference": "kernel-0:4.18.0-372.59.1.el8_6.src",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-372.59.1.el8_6.x86_64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:kernel-0:4.18.0-372.59.1.el8_6.x86_64"
},
"product_reference": "kernel-0:4.18.0-372.59.1.el8_6.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-372.59.1.el8_6.aarch64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:kernel-core-0:4.18.0-372.59.1.el8_6.aarch64"
},
"product_reference": "kernel-core-0:4.18.0-372.59.1.el8_6.aarch64",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-372.59.1.el8_6.ppc64le as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:kernel-core-0:4.18.0-372.59.1.el8_6.ppc64le"
},
"product_reference": "kernel-core-0:4.18.0-372.59.1.el8_6.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-372.59.1.el8_6.s390x as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:kernel-core-0:4.18.0-372.59.1.el8_6.s390x"
},
"product_reference": "kernel-core-0:4.18.0-372.59.1.el8_6.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-372.59.1.el8_6.x86_64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:kernel-core-0:4.18.0-372.59.1.el8_6.x86_64"
},
"product_reference": "kernel-core-0:4.18.0-372.59.1.el8_6.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-372.59.1.el8_6.aarch64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:kernel-cross-headers-0:4.18.0-372.59.1.el8_6.aarch64"
},
"product_reference": "kernel-cross-headers-0:4.18.0-372.59.1.el8_6.aarch64",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-372.59.1.el8_6.ppc64le as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:kernel-cross-headers-0:4.18.0-372.59.1.el8_6.ppc64le"
},
"product_reference": "kernel-cross-headers-0:4.18.0-372.59.1.el8_6.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-372.59.1.el8_6.s390x as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:kernel-cross-headers-0:4.18.0-372.59.1.el8_6.s390x"
},
"product_reference": "kernel-cross-headers-0:4.18.0-372.59.1.el8_6.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-372.59.1.el8_6.x86_64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:kernel-cross-headers-0:4.18.0-372.59.1.el8_6.x86_64"
},
"product_reference": "kernel-cross-headers-0:4.18.0-372.59.1.el8_6.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-372.59.1.el8_6.aarch64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:kernel-debug-0:4.18.0-372.59.1.el8_6.aarch64"
},
"product_reference": "kernel-debug-0:4.18.0-372.59.1.el8_6.aarch64",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-372.59.1.el8_6.ppc64le as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:kernel-debug-0:4.18.0-372.59.1.el8_6.ppc64le"
},
"product_reference": "kernel-debug-0:4.18.0-372.59.1.el8_6.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-372.59.1.el8_6.s390x as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:kernel-debug-0:4.18.0-372.59.1.el8_6.s390x"
},
"product_reference": "kernel-debug-0:4.18.0-372.59.1.el8_6.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-372.59.1.el8_6.x86_64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:kernel-debug-0:4.18.0-372.59.1.el8_6.x86_64"
},
"product_reference": "kernel-debug-0:4.18.0-372.59.1.el8_6.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-372.59.1.el8_6.aarch64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:kernel-debug-core-0:4.18.0-372.59.1.el8_6.aarch64"
},
"product_reference": "kernel-debug-core-0:4.18.0-372.59.1.el8_6.aarch64",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-372.59.1.el8_6.ppc64le as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:kernel-debug-core-0:4.18.0-372.59.1.el8_6.ppc64le"
},
"product_reference": "kernel-debug-core-0:4.18.0-372.59.1.el8_6.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-372.59.1.el8_6.s390x as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:kernel-debug-core-0:4.18.0-372.59.1.el8_6.s390x"
},
"product_reference": "kernel-debug-core-0:4.18.0-372.59.1.el8_6.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-372.59.1.el8_6.x86_64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:kernel-debug-core-0:4.18.0-372.59.1.el8_6.x86_64"
},
"product_reference": "kernel-debug-core-0:4.18.0-372.59.1.el8_6.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:kernel-debug-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:kernel-debug-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-372.59.1.el8_6.s390x as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:kernel-debug-debuginfo-0:4.18.0-372.59.1.el8_6.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-372.59.1.el8_6.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:kernel-debug-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-372.59.1.el8_6.aarch64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:kernel-debug-devel-0:4.18.0-372.59.1.el8_6.aarch64"
},
"product_reference": "kernel-debug-devel-0:4.18.0-372.59.1.el8_6.aarch64",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-372.59.1.el8_6.ppc64le as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:kernel-debug-devel-0:4.18.0-372.59.1.el8_6.ppc64le"
},
"product_reference": "kernel-debug-devel-0:4.18.0-372.59.1.el8_6.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-372.59.1.el8_6.s390x as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:kernel-debug-devel-0:4.18.0-372.59.1.el8_6.s390x"
},
"product_reference": "kernel-debug-devel-0:4.18.0-372.59.1.el8_6.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-372.59.1.el8_6.x86_64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:kernel-debug-devel-0:4.18.0-372.59.1.el8_6.x86_64"
},
"product_reference": "kernel-debug-devel-0:4.18.0-372.59.1.el8_6.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-372.59.1.el8_6.aarch64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:kernel-debug-modules-0:4.18.0-372.59.1.el8_6.aarch64"
},
"product_reference": "kernel-debug-modules-0:4.18.0-372.59.1.el8_6.aarch64",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-372.59.1.el8_6.ppc64le as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:kernel-debug-modules-0:4.18.0-372.59.1.el8_6.ppc64le"
},
"product_reference": "kernel-debug-modules-0:4.18.0-372.59.1.el8_6.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-372.59.1.el8_6.s390x as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:kernel-debug-modules-0:4.18.0-372.59.1.el8_6.s390x"
},
"product_reference": "kernel-debug-modules-0:4.18.0-372.59.1.el8_6.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-372.59.1.el8_6.x86_64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:kernel-debug-modules-0:4.18.0-372.59.1.el8_6.x86_64"
},
"product_reference": "kernel-debug-modules-0:4.18.0-372.59.1.el8_6.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-372.59.1.el8_6.aarch64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:kernel-debug-modules-extra-0:4.18.0-372.59.1.el8_6.aarch64"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-372.59.1.el8_6.aarch64",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-372.59.1.el8_6.ppc64le as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:kernel-debug-modules-extra-0:4.18.0-372.59.1.el8_6.ppc64le"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-372.59.1.el8_6.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-372.59.1.el8_6.s390x as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:kernel-debug-modules-extra-0:4.18.0-372.59.1.el8_6.s390x"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-372.59.1.el8_6.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-372.59.1.el8_6.x86_64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:kernel-debug-modules-extra-0:4.18.0-372.59.1.el8_6.x86_64"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-372.59.1.el8_6.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-internal-0:4.18.0-372.59.1.el8_6.aarch64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:kernel-debug-modules-internal-0:4.18.0-372.59.1.el8_6.aarch64"
},
"product_reference": "kernel-debug-modules-internal-0:4.18.0-372.59.1.el8_6.aarch64",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-internal-0:4.18.0-372.59.1.el8_6.ppc64le as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:kernel-debug-modules-internal-0:4.18.0-372.59.1.el8_6.ppc64le"
},
"product_reference": "kernel-debug-modules-internal-0:4.18.0-372.59.1.el8_6.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-internal-0:4.18.0-372.59.1.el8_6.s390x as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:kernel-debug-modules-internal-0:4.18.0-372.59.1.el8_6.s390x"
},
"product_reference": "kernel-debug-modules-internal-0:4.18.0-372.59.1.el8_6.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-internal-0:4.18.0-372.59.1.el8_6.x86_64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:kernel-debug-modules-internal-0:4.18.0-372.59.1.el8_6.x86_64"
},
"product_reference": "kernel-debug-modules-internal-0:4.18.0-372.59.1.el8_6.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:kernel-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64"
},
"product_reference": "kernel-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:kernel-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le"
},
"product_reference": "kernel-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-372.59.1.el8_6.s390x as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:kernel-debuginfo-0:4.18.0-372.59.1.el8_6.s390x"
},
"product_reference": "kernel-debuginfo-0:4.18.0-372.59.1.el8_6.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:kernel-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64"
},
"product_reference": "kernel-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-aarch64-0:4.18.0-372.59.1.el8_6.aarch64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:kernel-debuginfo-common-aarch64-0:4.18.0-372.59.1.el8_6.aarch64"
},
"product_reference": "kernel-debuginfo-common-aarch64-0:4.18.0-372.59.1.el8_6.aarch64",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:4.18.0-372.59.1.el8_6.ppc64le as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:kernel-debuginfo-common-ppc64le-0:4.18.0-372.59.1.el8_6.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:4.18.0-372.59.1.el8_6.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:4.18.0-372.59.1.el8_6.s390x as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:kernel-debuginfo-common-s390x-0:4.18.0-372.59.1.el8_6.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:4.18.0-372.59.1.el8_6.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:4.18.0-372.59.1.el8_6.x86_64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:kernel-debuginfo-common-x86_64-0:4.18.0-372.59.1.el8_6.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:4.18.0-372.59.1.el8_6.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-372.59.1.el8_6.aarch64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:kernel-devel-0:4.18.0-372.59.1.el8_6.aarch64"
},
"product_reference": "kernel-devel-0:4.18.0-372.59.1.el8_6.aarch64",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-372.59.1.el8_6.ppc64le as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:kernel-devel-0:4.18.0-372.59.1.el8_6.ppc64le"
},
"product_reference": "kernel-devel-0:4.18.0-372.59.1.el8_6.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-372.59.1.el8_6.s390x as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:kernel-devel-0:4.18.0-372.59.1.el8_6.s390x"
},
"product_reference": "kernel-devel-0:4.18.0-372.59.1.el8_6.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-372.59.1.el8_6.x86_64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:kernel-devel-0:4.18.0-372.59.1.el8_6.x86_64"
},
"product_reference": "kernel-devel-0:4.18.0-372.59.1.el8_6.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:4.18.0-372.59.1.el8_6.noarch as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:kernel-doc-0:4.18.0-372.59.1.el8_6.noarch"
},
"product_reference": "kernel-doc-0:4.18.0-372.59.1.el8_6.noarch",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-372.59.1.el8_6.aarch64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:kernel-headers-0:4.18.0-372.59.1.el8_6.aarch64"
},
"product_reference": "kernel-headers-0:4.18.0-372.59.1.el8_6.aarch64",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-372.59.1.el8_6.ppc64le as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:kernel-headers-0:4.18.0-372.59.1.el8_6.ppc64le"
},
"product_reference": "kernel-headers-0:4.18.0-372.59.1.el8_6.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-372.59.1.el8_6.s390x as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:kernel-headers-0:4.18.0-372.59.1.el8_6.s390x"
},
"product_reference": "kernel-headers-0:4.18.0-372.59.1.el8_6.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-372.59.1.el8_6.x86_64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:kernel-headers-0:4.18.0-372.59.1.el8_6.x86_64"
},
"product_reference": "kernel-headers-0:4.18.0-372.59.1.el8_6.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-ipaclones-internal-0:4.18.0-372.59.1.el8_6.ppc64le as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:kernel-ipaclones-internal-0:4.18.0-372.59.1.el8_6.ppc64le"
},
"product_reference": "kernel-ipaclones-internal-0:4.18.0-372.59.1.el8_6.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-ipaclones-internal-0:4.18.0-372.59.1.el8_6.x86_64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:kernel-ipaclones-internal-0:4.18.0-372.59.1.el8_6.x86_64"
},
"product_reference": "kernel-ipaclones-internal-0:4.18.0-372.59.1.el8_6.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-372.59.1.el8_6.aarch64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:kernel-modules-0:4.18.0-372.59.1.el8_6.aarch64"
},
"product_reference": "kernel-modules-0:4.18.0-372.59.1.el8_6.aarch64",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-372.59.1.el8_6.ppc64le as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:kernel-modules-0:4.18.0-372.59.1.el8_6.ppc64le"
},
"product_reference": "kernel-modules-0:4.18.0-372.59.1.el8_6.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-372.59.1.el8_6.s390x as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:kernel-modules-0:4.18.0-372.59.1.el8_6.s390x"
},
"product_reference": "kernel-modules-0:4.18.0-372.59.1.el8_6.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-372.59.1.el8_6.x86_64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:kernel-modules-0:4.18.0-372.59.1.el8_6.x86_64"
},
"product_reference": "kernel-modules-0:4.18.0-372.59.1.el8_6.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-372.59.1.el8_6.aarch64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:kernel-modules-extra-0:4.18.0-372.59.1.el8_6.aarch64"
},
"product_reference": "kernel-modules-extra-0:4.18.0-372.59.1.el8_6.aarch64",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-372.59.1.el8_6.ppc64le as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:kernel-modules-extra-0:4.18.0-372.59.1.el8_6.ppc64le"
},
"product_reference": "kernel-modules-extra-0:4.18.0-372.59.1.el8_6.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-372.59.1.el8_6.s390x as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:kernel-modules-extra-0:4.18.0-372.59.1.el8_6.s390x"
},
"product_reference": "kernel-modules-extra-0:4.18.0-372.59.1.el8_6.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-372.59.1.el8_6.x86_64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:kernel-modules-extra-0:4.18.0-372.59.1.el8_6.x86_64"
},
"product_reference": "kernel-modules-extra-0:4.18.0-372.59.1.el8_6.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-internal-0:4.18.0-372.59.1.el8_6.aarch64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:kernel-modules-internal-0:4.18.0-372.59.1.el8_6.aarch64"
},
"product_reference": "kernel-modules-internal-0:4.18.0-372.59.1.el8_6.aarch64",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-internal-0:4.18.0-372.59.1.el8_6.ppc64le as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:kernel-modules-internal-0:4.18.0-372.59.1.el8_6.ppc64le"
},
"product_reference": "kernel-modules-internal-0:4.18.0-372.59.1.el8_6.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-internal-0:4.18.0-372.59.1.el8_6.s390x as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:kernel-modules-internal-0:4.18.0-372.59.1.el8_6.s390x"
},
"product_reference": "kernel-modules-internal-0:4.18.0-372.59.1.el8_6.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-internal-0:4.18.0-372.59.1.el8_6.x86_64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:kernel-modules-internal-0:4.18.0-372.59.1.el8_6.x86_64"
},
"product_reference": "kernel-modules-internal-0:4.18.0-372.59.1.el8_6.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-0:4.18.0-372.59.1.rt7.217.el8_6.src as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:kernel-rt-0:4.18.0-372.59.1.rt7.217.el8_6.src"
},
"product_reference": "kernel-rt-0:4.18.0-372.59.1.rt7.217.el8_6.src",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:kernel-rt-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64"
},
"product_reference": "kernel-rt-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-core-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:kernel-rt-core-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64"
},
"product_reference": "kernel-rt-core-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:kernel-rt-debug-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64"
},
"product_reference": "kernel-rt-debug-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-core-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:kernel-rt-debug-core-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64"
},
"product_reference": "kernel-rt-debug-core-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-debuginfo-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:kernel-rt-debug-debuginfo-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64"
},
"product_reference": "kernel-rt-debug-debuginfo-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-devel-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:kernel-rt-debug-devel-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64"
},
"product_reference": "kernel-rt-debug-devel-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-kvm-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:kernel-rt-debug-kvm-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64"
},
"product_reference": "kernel-rt-debug-kvm-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-modules-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:kernel-rt-debug-modules-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64"
},
"product_reference": "kernel-rt-debug-modules-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-modules-extra-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:kernel-rt-debug-modules-extra-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64"
},
"product_reference": "kernel-rt-debug-modules-extra-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-modules-internal-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:kernel-rt-debug-modules-internal-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64"
},
"product_reference": "kernel-rt-debug-modules-internal-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debuginfo-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:kernel-rt-debuginfo-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64"
},
"product_reference": "kernel-rt-debuginfo-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64"
},
"product_reference": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-devel-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:kernel-rt-devel-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64"
},
"product_reference": "kernel-rt-devel-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-kvm-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:kernel-rt-kvm-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64"
},
"product_reference": "kernel-rt-kvm-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-modules-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:kernel-rt-modules-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64"
},
"product_reference": "kernel-rt-modules-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-modules-extra-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:kernel-rt-modules-extra-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64"
},
"product_reference": "kernel-rt-modules-extra-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-modules-internal-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:kernel-rt-modules-internal-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64"
},
"product_reference": "kernel-rt-modules-internal-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-selftests-internal-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:kernel-rt-selftests-internal-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64"
},
"product_reference": "kernel-rt-selftests-internal-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-selftests-internal-0:4.18.0-372.59.1.el8_6.aarch64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:kernel-selftests-internal-0:4.18.0-372.59.1.el8_6.aarch64"
},
"product_reference": "kernel-selftests-internal-0:4.18.0-372.59.1.el8_6.aarch64",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-selftests-internal-0:4.18.0-372.59.1.el8_6.ppc64le as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:kernel-selftests-internal-0:4.18.0-372.59.1.el8_6.ppc64le"
},
"product_reference": "kernel-selftests-internal-0:4.18.0-372.59.1.el8_6.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-selftests-internal-0:4.18.0-372.59.1.el8_6.s390x as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:kernel-selftests-internal-0:4.18.0-372.59.1.el8_6.s390x"
},
"product_reference": "kernel-selftests-internal-0:4.18.0-372.59.1.el8_6.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-selftests-internal-0:4.18.0-372.59.1.el8_6.x86_64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:kernel-selftests-internal-0:4.18.0-372.59.1.el8_6.x86_64"
},
"product_reference": "kernel-selftests-internal-0:4.18.0-372.59.1.el8_6.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-372.59.1.el8_6.aarch64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:kernel-tools-0:4.18.0-372.59.1.el8_6.aarch64"
},
"product_reference": "kernel-tools-0:4.18.0-372.59.1.el8_6.aarch64",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-372.59.1.el8_6.ppc64le as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:kernel-tools-0:4.18.0-372.59.1.el8_6.ppc64le"
},
"product_reference": "kernel-tools-0:4.18.0-372.59.1.el8_6.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-372.59.1.el8_6.s390x as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:kernel-tools-0:4.18.0-372.59.1.el8_6.s390x"
},
"product_reference": "kernel-tools-0:4.18.0-372.59.1.el8_6.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-372.59.1.el8_6.x86_64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:kernel-tools-0:4.18.0-372.59.1.el8_6.x86_64"
},
"product_reference": "kernel-tools-0:4.18.0-372.59.1.el8_6.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:kernel-tools-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:kernel-tools-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-372.59.1.el8_6.s390x as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:kernel-tools-debuginfo-0:4.18.0-372.59.1.el8_6.s390x"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-372.59.1.el8_6.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:kernel-tools-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:4.18.0-372.59.1.el8_6.aarch64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:kernel-tools-libs-0:4.18.0-372.59.1.el8_6.aarch64"
},
"product_reference": "kernel-tools-libs-0:4.18.0-372.59.1.el8_6.aarch64",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:4.18.0-372.59.1.el8_6.ppc64le as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:kernel-tools-libs-0:4.18.0-372.59.1.el8_6.ppc64le"
},
"product_reference": "kernel-tools-libs-0:4.18.0-372.59.1.el8_6.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:4.18.0-372.59.1.el8_6.x86_64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:kernel-tools-libs-0:4.18.0-372.59.1.el8_6.x86_64"
},
"product_reference": "kernel-tools-libs-0:4.18.0-372.59.1.el8_6.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:4.18.0-372.59.1.el8_6.aarch64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:kernel-tools-libs-devel-0:4.18.0-372.59.1.el8_6.aarch64"
},
"product_reference": "kernel-tools-libs-devel-0:4.18.0-372.59.1.el8_6.aarch64",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:4.18.0-372.59.1.el8_6.ppc64le as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:kernel-tools-libs-devel-0:4.18.0-372.59.1.el8_6.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:4.18.0-372.59.1.el8_6.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:4.18.0-372.59.1.el8_6.x86_64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:kernel-tools-libs-devel-0:4.18.0-372.59.1.el8_6.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:4.18.0-372.59.1.el8_6.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-0:4.18.0-372.59.1.el8_6.s390x as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:kernel-zfcpdump-0:4.18.0-372.59.1.el8_6.s390x"
},
"product_reference": "kernel-zfcpdump-0:4.18.0-372.59.1.el8_6.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-core-0:4.18.0-372.59.1.el8_6.s390x as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:kernel-zfcpdump-core-0:4.18.0-372.59.1.el8_6.s390x"
},
"product_reference": "kernel-zfcpdump-core-0:4.18.0-372.59.1.el8_6.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-debuginfo-0:4.18.0-372.59.1.el8_6.s390x as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:kernel-zfcpdump-debuginfo-0:4.18.0-372.59.1.el8_6.s390x"
},
"product_reference": "kernel-zfcpdump-debuginfo-0:4.18.0-372.59.1.el8_6.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-devel-0:4.18.0-372.59.1.el8_6.s390x as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:kernel-zfcpdump-devel-0:4.18.0-372.59.1.el8_6.s390x"
},
"product_reference": "kernel-zfcpdump-devel-0:4.18.0-372.59.1.el8_6.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-modules-0:4.18.0-372.59.1.el8_6.s390x as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:kernel-zfcpdump-modules-0:4.18.0-372.59.1.el8_6.s390x"
},
"product_reference": "kernel-zfcpdump-modules-0:4.18.0-372.59.1.el8_6.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-modules-extra-0:4.18.0-372.59.1.el8_6.s390x as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:kernel-zfcpdump-modules-extra-0:4.18.0-372.59.1.el8_6.s390x"
},
"product_reference": "kernel-zfcpdump-modules-extra-0:4.18.0-372.59.1.el8_6.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-modules-internal-0:4.18.0-372.59.1.el8_6.s390x as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:kernel-zfcpdump-modules-internal-0:4.18.0-372.59.1.el8_6.s390x"
},
"product_reference": "kernel-zfcpdump-modules-internal-0:4.18.0-372.59.1.el8_6.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el8.src as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:openshift-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el8.src"
},
"product_reference": "openshift-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el8.src",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-ansible-0:4.12.0-202306090942.p0.g74dc7b3.assembly.stream.el8.noarch as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:openshift-ansible-0:4.12.0-202306090942.p0.g74dc7b3.assembly.stream.el8.noarch"
},
"product_reference": "openshift-ansible-0:4.12.0-202306090942.p0.g74dc7b3.assembly.stream.el8.noarch",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-ansible-0:4.12.0-202306090942.p0.g74dc7b3.assembly.stream.el8.src as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:openshift-ansible-0:4.12.0-202306090942.p0.g74dc7b3.assembly.stream.el8.src"
},
"product_reference": "openshift-ansible-0:4.12.0-202306090942.p0.g74dc7b3.assembly.stream.el8.src",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-ansible-test-0:4.12.0-202306090942.p0.g74dc7b3.assembly.stream.el8.noarch as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:openshift-ansible-test-0:4.12.0-202306090942.p0.g74dc7b3.assembly.stream.el8.noarch"
},
"product_reference": "openshift-ansible-test-0:4.12.0-202306090942.p0.g74dc7b3.assembly.stream.el8.noarch",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.aarch64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.aarch64"
},
"product_reference": "openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.aarch64",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.ppc64le"
},
"product_reference": "openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.s390x as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.s390x"
},
"product_reference": "openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.src as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.src"
},
"product_reference": "openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.src",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.x86_64"
},
"product_reference": "openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-clients-redistributable-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:openshift-clients-redistributable-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.x86_64"
},
"product_reference": "openshift-clients-redistributable-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el8.aarch64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el8.aarch64"
},
"product_reference": "openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el8.aarch64",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el8.ppc64le"
},
"product_reference": "openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el8.s390x as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el8.s390x"
},
"product_reference": "openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el8.x86_64"
},
"product_reference": "openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-kuryr-0:4.12.0-202306140156.p0.g31dd228.assembly.stream.el8.src as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:openshift-kuryr-0:4.12.0-202306140156.p0.g31dd228.assembly.stream.el8.src"
},
"product_reference": "openshift-kuryr-0:4.12.0-202306140156.p0.g31dd228.assembly.stream.el8.src",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-kuryr-cni-0:4.12.0-202306140156.p0.g31dd228.assembly.stream.el8.noarch as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:openshift-kuryr-cni-0:4.12.0-202306140156.p0.g31dd228.assembly.stream.el8.noarch"
},
"product_reference": "openshift-kuryr-cni-0:4.12.0-202306140156.p0.g31dd228.assembly.stream.el8.noarch",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-kuryr-common-0:4.12.0-202306140156.p0.g31dd228.assembly.stream.el8.noarch as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:openshift-kuryr-common-0:4.12.0-202306140156.p0.g31dd228.assembly.stream.el8.noarch"
},
"product_reference": "openshift-kuryr-common-0:4.12.0-202306140156.p0.g31dd228.assembly.stream.el8.noarch",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-kuryr-controller-0:4.12.0-202306140156.p0.g31dd228.assembly.stream.el8.noarch as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:openshift-kuryr-controller-0:4.12.0-202306140156.p0.g31dd228.assembly.stream.el8.noarch"
},
"product_reference": "openshift-kuryr-controller-0:4.12.0-202306140156.p0.g31dd228.assembly.stream.el8.noarch",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4-aws-iso-0:4.12.0-202306090942.p0.gd2acdd5.assembly.stream.el8.noarch as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:openshift4-aws-iso-0:4.12.0-202306090942.p0.gd2acdd5.assembly.stream.el8.noarch"
},
"product_reference": "openshift4-aws-iso-0:4.12.0-202306090942.p0.gd2acdd5.assembly.stream.el8.noarch",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4-aws-iso-0:4.12.0-202306090942.p0.gd2acdd5.assembly.stream.el8.src as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:openshift4-aws-iso-0:4.12.0-202306090942.p0.gd2acdd5.assembly.stream.el8.src"
},
"product_reference": "openshift4-aws-iso-0:4.12.0-202306090942.p0.gd2acdd5.assembly.stream.el8.src",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-372.59.1.el8_6.aarch64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:perf-0:4.18.0-372.59.1.el8_6.aarch64"
},
"product_reference": "perf-0:4.18.0-372.59.1.el8_6.aarch64",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-372.59.1.el8_6.ppc64le as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:perf-0:4.18.0-372.59.1.el8_6.ppc64le"
},
"product_reference": "perf-0:4.18.0-372.59.1.el8_6.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-372.59.1.el8_6.s390x as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:perf-0:4.18.0-372.59.1.el8_6.s390x"
},
"product_reference": "perf-0:4.18.0-372.59.1.el8_6.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-372.59.1.el8_6.x86_64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:perf-0:4.18.0-372.59.1.el8_6.x86_64"
},
"product_reference": "perf-0:4.18.0-372.59.1.el8_6.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:perf-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64"
},
"product_reference": "perf-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:perf-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le"
},
"product_reference": "perf-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-372.59.1.el8_6.s390x as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:perf-debuginfo-0:4.18.0-372.59.1.el8_6.s390x"
},
"product_reference": "perf-debuginfo-0:4.18.0-372.59.1.el8_6.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:perf-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64"
},
"product_reference": "perf-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-3:4.2.0-6.1.rhaos4.12.el8.aarch64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:podman-3:4.2.0-6.1.rhaos4.12.el8.aarch64"
},
"product_reference": "podman-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-3:4.2.0-6.1.rhaos4.12.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:podman-3:4.2.0-6.1.rhaos4.12.el8.ppc64le"
},
"product_reference": "podman-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-3:4.2.0-6.1.rhaos4.12.el8.s390x as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:podman-3:4.2.0-6.1.rhaos4.12.el8.s390x"
},
"product_reference": "podman-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-3:4.2.0-6.1.rhaos4.12.el8.src as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:podman-3:4.2.0-6.1.rhaos4.12.el8.src"
},
"product_reference": "podman-3:4.2.0-6.1.rhaos4.12.el8.src",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-3:4.2.0-6.1.rhaos4.12.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:podman-3:4.2.0-6.1.rhaos4.12.el8.x86_64"
},
"product_reference": "podman-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-catatonit-3:4.2.0-6.1.rhaos4.12.el8.aarch64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:podman-catatonit-3:4.2.0-6.1.rhaos4.12.el8.aarch64"
},
"product_reference": "podman-catatonit-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-catatonit-3:4.2.0-6.1.rhaos4.12.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:podman-catatonit-3:4.2.0-6.1.rhaos4.12.el8.ppc64le"
},
"product_reference": "podman-catatonit-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-catatonit-3:4.2.0-6.1.rhaos4.12.el8.s390x as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:podman-catatonit-3:4.2.0-6.1.rhaos4.12.el8.s390x"
},
"product_reference": "podman-catatonit-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-catatonit-3:4.2.0-6.1.rhaos4.12.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:podman-catatonit-3:4.2.0-6.1.rhaos4.12.el8.x86_64"
},
"product_reference": "podman-catatonit-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-catatonit-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.aarch64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.aarch64"
},
"product_reference": "podman-catatonit-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-catatonit-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.ppc64le"
},
"product_reference": "podman-catatonit-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-catatonit-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.s390x as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.s390x"
},
"product_reference": "podman-catatonit-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-catatonit-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.x86_64"
},
"product_reference": "podman-catatonit-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.aarch64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.aarch64"
},
"product_reference": "podman-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.ppc64le"
},
"product_reference": "podman-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.s390x as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.s390x"
},
"product_reference": "podman-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.x86_64"
},
"product_reference": "podman-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-debugsource-3:4.2.0-6.1.rhaos4.12.el8.aarch64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:podman-debugsource-3:4.2.0-6.1.rhaos4.12.el8.aarch64"
},
"product_reference": "podman-debugsource-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-debugsource-3:4.2.0-6.1.rhaos4.12.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:podman-debugsource-3:4.2.0-6.1.rhaos4.12.el8.ppc64le"
},
"product_reference": "podman-debugsource-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-debugsource-3:4.2.0-6.1.rhaos4.12.el8.s390x as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:podman-debugsource-3:4.2.0-6.1.rhaos4.12.el8.s390x"
},
"product_reference": "podman-debugsource-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-debugsource-3:4.2.0-6.1.rhaos4.12.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:podman-debugsource-3:4.2.0-6.1.rhaos4.12.el8.x86_64"
},
"product_reference": "podman-debugsource-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-docker-3:4.2.0-6.1.rhaos4.12.el8.noarch as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:podman-docker-3:4.2.0-6.1.rhaos4.12.el8.noarch"
},
"product_reference": "podman-docker-3:4.2.0-6.1.rhaos4.12.el8.noarch",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-gvproxy-3:4.2.0-6.1.rhaos4.12.el8.aarch64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-6.1.rhaos4.12.el8.aarch64"
},
"product_reference": "podman-gvproxy-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-gvproxy-3:4.2.0-6.1.rhaos4.12.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-6.1.rhaos4.12.el8.ppc64le"
},
"product_reference": "podman-gvproxy-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-gvproxy-3:4.2.0-6.1.rhaos4.12.el8.s390x as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-6.1.rhaos4.12.el8.s390x"
},
"product_reference": "podman-gvproxy-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-gvproxy-3:4.2.0-6.1.rhaos4.12.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-6.1.rhaos4.12.el8.x86_64"
},
"product_reference": "podman-gvproxy-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-gvproxy-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.aarch64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.aarch64"
},
"product_reference": "podman-gvproxy-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-gvproxy-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.ppc64le"
},
"product_reference": "podman-gvproxy-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-gvproxy-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.s390x as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.s390x"
},
"product_reference": "podman-gvproxy-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-gvproxy-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.x86_64"
},
"product_reference": "podman-gvproxy-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-plugins-3:4.2.0-6.1.rhaos4.12.el8.aarch64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:podman-plugins-3:4.2.0-6.1.rhaos4.12.el8.aarch64"
},
"product_reference": "podman-plugins-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-plugins-3:4.2.0-6.1.rhaos4.12.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:podman-plugins-3:4.2.0-6.1.rhaos4.12.el8.ppc64le"
},
"product_reference": "podman-plugins-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-plugins-3:4.2.0-6.1.rhaos4.12.el8.s390x as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:podman-plugins-3:4.2.0-6.1.rhaos4.12.el8.s390x"
},
"product_reference": "podman-plugins-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-plugins-3:4.2.0-6.1.rhaos4.12.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:podman-plugins-3:4.2.0-6.1.rhaos4.12.el8.x86_64"
},
"product_reference": "podman-plugins-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-plugins-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.aarch64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.aarch64"
},
"product_reference": "podman-plugins-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-plugins-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.ppc64le"
},
"product_reference": "podman-plugins-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-plugins-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.s390x as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.s390x"
},
"product_reference": "podman-plugins-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-plugins-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.x86_64"
},
"product_reference": "podman-plugins-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-remote-3:4.2.0-6.1.rhaos4.12.el8.aarch64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:podman-remote-3:4.2.0-6.1.rhaos4.12.el8.aarch64"
},
"product_reference": "podman-remote-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-remote-3:4.2.0-6.1.rhaos4.12.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:podman-remote-3:4.2.0-6.1.rhaos4.12.el8.ppc64le"
},
"product_reference": "podman-remote-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-remote-3:4.2.0-6.1.rhaos4.12.el8.s390x as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:podman-remote-3:4.2.0-6.1.rhaos4.12.el8.s390x"
},
"product_reference": "podman-remote-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-remote-3:4.2.0-6.1.rhaos4.12.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:podman-remote-3:4.2.0-6.1.rhaos4.12.el8.x86_64"
},
"product_reference": "podman-remote-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-remote-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.aarch64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.aarch64"
},
"product_reference": "podman-remote-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-remote-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.ppc64le"
},
"product_reference": "podman-remote-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-remote-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.s390x as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.s390x"
},
"product_reference": "podman-remote-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-remote-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.x86_64"
},
"product_reference": "podman-remote-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-tests-3:4.2.0-6.1.rhaos4.12.el8.aarch64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:podman-tests-3:4.2.0-6.1.rhaos4.12.el8.aarch64"
},
"product_reference": "podman-tests-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-tests-3:4.2.0-6.1.rhaos4.12.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:podman-tests-3:4.2.0-6.1.rhaos4.12.el8.ppc64le"
},
"product_reference": "podman-tests-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-tests-3:4.2.0-6.1.rhaos4.12.el8.s390x as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:podman-tests-3:4.2.0-6.1.rhaos4.12.el8.s390x"
},
"product_reference": "podman-tests-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-tests-3:4.2.0-6.1.rhaos4.12.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:podman-tests-3:4.2.0-6.1.rhaos4.12.el8.x86_64"
},
"product_reference": "podman-tests-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-kuryr-kubernetes-0:4.12.0-202306140156.p0.g31dd228.assembly.stream.el8.noarch as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:python3-kuryr-kubernetes-0:4.12.0-202306140156.p0.g31dd228.assembly.stream.el8.noarch"
},
"product_reference": "python3-kuryr-kubernetes-0:4.12.0-202306140156.p0.g31dd228.assembly.stream.el8.noarch",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-372.59.1.el8_6.aarch64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:python3-perf-0:4.18.0-372.59.1.el8_6.aarch64"
},
"product_reference": "python3-perf-0:4.18.0-372.59.1.el8_6.aarch64",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-372.59.1.el8_6.ppc64le as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:python3-perf-0:4.18.0-372.59.1.el8_6.ppc64le"
},
"product_reference": "python3-perf-0:4.18.0-372.59.1.el8_6.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-372.59.1.el8_6.s390x as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:python3-perf-0:4.18.0-372.59.1.el8_6.s390x"
},
"product_reference": "python3-perf-0:4.18.0-372.59.1.el8_6.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-372.59.1.el8_6.x86_64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:python3-perf-0:4.18.0-372.59.1.el8_6.x86_64"
},
"product_reference": "python3-perf-0:4.18.0-372.59.1.el8_6.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:python3-perf-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:python3-perf-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-372.59.1.el8_6.s390x as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:python3-perf-debuginfo-0:4.18.0-372.59.1.el8_6.s390x"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-372.59.1.el8_6.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:python3-perf-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "runc-3:1.1.6-4.rhaos4.12.el8.aarch64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:runc-3:1.1.6-4.rhaos4.12.el8.aarch64"
},
"product_reference": "runc-3:1.1.6-4.rhaos4.12.el8.aarch64",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "runc-3:1.1.6-4.rhaos4.12.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:runc-3:1.1.6-4.rhaos4.12.el8.ppc64le"
},
"product_reference": "runc-3:1.1.6-4.rhaos4.12.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "runc-3:1.1.6-4.rhaos4.12.el8.s390x as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:runc-3:1.1.6-4.rhaos4.12.el8.s390x"
},
"product_reference": "runc-3:1.1.6-4.rhaos4.12.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "runc-3:1.1.6-4.rhaos4.12.el8.src as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:runc-3:1.1.6-4.rhaos4.12.el8.src"
},
"product_reference": "runc-3:1.1.6-4.rhaos4.12.el8.src",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "runc-3:1.1.6-4.rhaos4.12.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:runc-3:1.1.6-4.rhaos4.12.el8.x86_64"
},
"product_reference": "runc-3:1.1.6-4.rhaos4.12.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "runc-debuginfo-3:1.1.6-4.rhaos4.12.el8.aarch64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:runc-debuginfo-3:1.1.6-4.rhaos4.12.el8.aarch64"
},
"product_reference": "runc-debuginfo-3:1.1.6-4.rhaos4.12.el8.aarch64",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "runc-debuginfo-3:1.1.6-4.rhaos4.12.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:runc-debuginfo-3:1.1.6-4.rhaos4.12.el8.ppc64le"
},
"product_reference": "runc-debuginfo-3:1.1.6-4.rhaos4.12.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "runc-debuginfo-3:1.1.6-4.rhaos4.12.el8.s390x as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:runc-debuginfo-3:1.1.6-4.rhaos4.12.el8.s390x"
},
"product_reference": "runc-debuginfo-3:1.1.6-4.rhaos4.12.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "runc-debuginfo-3:1.1.6-4.rhaos4.12.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:runc-debuginfo-3:1.1.6-4.rhaos4.12.el8.x86_64"
},
"product_reference": "runc-debuginfo-3:1.1.6-4.rhaos4.12.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "runc-debugsource-3:1.1.6-4.rhaos4.12.el8.aarch64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:runc-debugsource-3:1.1.6-4.rhaos4.12.el8.aarch64"
},
"product_reference": "runc-debugsource-3:1.1.6-4.rhaos4.12.el8.aarch64",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "runc-debugsource-3:1.1.6-4.rhaos4.12.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:runc-debugsource-3:1.1.6-4.rhaos4.12.el8.ppc64le"
},
"product_reference": "runc-debugsource-3:1.1.6-4.rhaos4.12.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "runc-debugsource-3:1.1.6-4.rhaos4.12.el8.s390x as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:runc-debugsource-3:1.1.6-4.rhaos4.12.el8.s390x"
},
"product_reference": "runc-debugsource-3:1.1.6-4.rhaos4.12.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "runc-debugsource-3:1.1.6-4.rhaos4.12.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:runc-debugsource-3:1.1.6-4.rhaos4.12.el8.x86_64"
},
"product_reference": "runc-debugsource-3:1.1.6-4.rhaos4.12.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "skopeo-2:1.9.4-3.1.rhaos4.12.el8.aarch64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:skopeo-2:1.9.4-3.1.rhaos4.12.el8.aarch64"
},
"product_reference": "skopeo-2:1.9.4-3.1.rhaos4.12.el8.aarch64",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "skopeo-2:1.9.4-3.1.rhaos4.12.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:skopeo-2:1.9.4-3.1.rhaos4.12.el8.ppc64le"
},
"product_reference": "skopeo-2:1.9.4-3.1.rhaos4.12.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "skopeo-2:1.9.4-3.1.rhaos4.12.el8.s390x as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:skopeo-2:1.9.4-3.1.rhaos4.12.el8.s390x"
},
"product_reference": "skopeo-2:1.9.4-3.1.rhaos4.12.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "skopeo-2:1.9.4-3.1.rhaos4.12.el8.src as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:skopeo-2:1.9.4-3.1.rhaos4.12.el8.src"
},
"product_reference": "skopeo-2:1.9.4-3.1.rhaos4.12.el8.src",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "skopeo-2:1.9.4-3.1.rhaos4.12.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:skopeo-2:1.9.4-3.1.rhaos4.12.el8.x86_64"
},
"product_reference": "skopeo-2:1.9.4-3.1.rhaos4.12.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "skopeo-debuginfo-2:1.9.4-3.1.rhaos4.12.el8.aarch64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.1.rhaos4.12.el8.aarch64"
},
"product_reference": "skopeo-debuginfo-2:1.9.4-3.1.rhaos4.12.el8.aarch64",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "skopeo-debuginfo-2:1.9.4-3.1.rhaos4.12.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.1.rhaos4.12.el8.ppc64le"
},
"product_reference": "skopeo-debuginfo-2:1.9.4-3.1.rhaos4.12.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "skopeo-debuginfo-2:1.9.4-3.1.rhaos4.12.el8.s390x as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.1.rhaos4.12.el8.s390x"
},
"product_reference": "skopeo-debuginfo-2:1.9.4-3.1.rhaos4.12.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "skopeo-debuginfo-2:1.9.4-3.1.rhaos4.12.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.1.rhaos4.12.el8.x86_64"
},
"product_reference": "skopeo-debuginfo-2:1.9.4-3.1.rhaos4.12.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "skopeo-debugsource-2:1.9.4-3.1.rhaos4.12.el8.aarch64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.1.rhaos4.12.el8.aarch64"
},
"product_reference": "skopeo-debugsource-2:1.9.4-3.1.rhaos4.12.el8.aarch64",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "skopeo-debugsource-2:1.9.4-3.1.rhaos4.12.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.1.rhaos4.12.el8.ppc64le"
},
"product_reference": "skopeo-debugsource-2:1.9.4-3.1.rhaos4.12.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "skopeo-debugsource-2:1.9.4-3.1.rhaos4.12.el8.s390x as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.1.rhaos4.12.el8.s390x"
},
"product_reference": "skopeo-debugsource-2:1.9.4-3.1.rhaos4.12.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "skopeo-debugsource-2:1.9.4-3.1.rhaos4.12.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.1.rhaos4.12.el8.x86_64"
},
"product_reference": "skopeo-debugsource-2:1.9.4-3.1.rhaos4.12.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "skopeo-tests-2:1.9.4-3.1.rhaos4.12.el8.aarch64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.1.rhaos4.12.el8.aarch64"
},
"product_reference": "skopeo-tests-2:1.9.4-3.1.rhaos4.12.el8.aarch64",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "skopeo-tests-2:1.9.4-3.1.rhaos4.12.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.1.rhaos4.12.el8.ppc64le"
},
"product_reference": "skopeo-tests-2:1.9.4-3.1.rhaos4.12.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "skopeo-tests-2:1.9.4-3.1.rhaos4.12.el8.s390x as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.1.rhaos4.12.el8.s390x"
},
"product_reference": "skopeo-tests-2:1.9.4-3.1.rhaos4.12.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "skopeo-tests-2:1.9.4-3.1.rhaos4.12.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.1.rhaos4.12.el8.x86_64"
},
"product_reference": "skopeo-tests-2:1.9.4-3.1.rhaos4.12.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "buildah-1:1.23.4-5.rhaos4.12.el9.aarch64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "9Base-RHOSE-4.12:buildah-1:1.23.4-5.rhaos4.12.el9.aarch64"
},
"product_reference": "buildah-1:1.23.4-5.rhaos4.12.el9.aarch64",
"relates_to_product_reference": "9Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "buildah-1:1.23.4-5.rhaos4.12.el9.ppc64le as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "9Base-RHOSE-4.12:buildah-1:1.23.4-5.rhaos4.12.el9.ppc64le"
},
"product_reference": "buildah-1:1.23.4-5.rhaos4.12.el9.ppc64le",
"relates_to_product_reference": "9Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "buildah-1:1.23.4-5.rhaos4.12.el9.s390x as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "9Base-RHOSE-4.12:buildah-1:1.23.4-5.rhaos4.12.el9.s390x"
},
"product_reference": "buildah-1:1.23.4-5.rhaos4.12.el9.s390x",
"relates_to_product_reference": "9Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "buildah-1:1.23.4-5.rhaos4.12.el9.src as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "9Base-RHOSE-4.12:buildah-1:1.23.4-5.rhaos4.12.el9.src"
},
"product_reference": "buildah-1:1.23.4-5.rhaos4.12.el9.src",
"relates_to_product_reference": "9Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "buildah-1:1.23.4-5.rhaos4.12.el9.x86_64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "9Base-RHOSE-4.12:buildah-1:1.23.4-5.rhaos4.12.el9.x86_64"
},
"product_reference": "buildah-1:1.23.4-5.rhaos4.12.el9.x86_64",
"relates_to_product_reference": "9Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "buildah-debuginfo-1:1.23.4-5.rhaos4.12.el9.aarch64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "9Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.rhaos4.12.el9.aarch64"
},
"product_reference": "buildah-debuginfo-1:1.23.4-5.rhaos4.12.el9.aarch64",
"relates_to_product_reference": "9Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "buildah-debuginfo-1:1.23.4-5.rhaos4.12.el9.ppc64le as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "9Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.rhaos4.12.el9.ppc64le"
},
"product_reference": "buildah-debuginfo-1:1.23.4-5.rhaos4.12.el9.ppc64le",
"relates_to_product_reference": "9Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "buildah-debuginfo-1:1.23.4-5.rhaos4.12.el9.s390x as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "9Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.rhaos4.12.el9.s390x"
},
"product_reference": "buildah-debuginfo-1:1.23.4-5.rhaos4.12.el9.s390x",
"relates_to_product_reference": "9Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "buildah-debuginfo-1:1.23.4-5.rhaos4.12.el9.x86_64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "9Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.rhaos4.12.el9.x86_64"
},
"product_reference": "buildah-debuginfo-1:1.23.4-5.rhaos4.12.el9.x86_64",
"relates_to_product_reference": "9Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "buildah-debugsource-1:1.23.4-5.rhaos4.12.el9.aarch64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "9Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.rhaos4.12.el9.aarch64"
},
"product_reference": "buildah-debugsource-1:1.23.4-5.rhaos4.12.el9.aarch64",
"relates_to_product_reference": "9Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "buildah-debugsource-1:1.23.4-5.rhaos4.12.el9.ppc64le as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "9Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.rhaos4.12.el9.ppc64le"
},
"product_reference": "buildah-debugsource-1:1.23.4-5.rhaos4.12.el9.ppc64le",
"relates_to_product_reference": "9Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "buildah-debugsource-1:1.23.4-5.rhaos4.12.el9.s390x as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "9Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.rhaos4.12.el9.s390x"
},
"product_reference": "buildah-debugsource-1:1.23.4-5.rhaos4.12.el9.s390x",
"relates_to_product_reference": "9Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "buildah-debugsource-1:1.23.4-5.rhaos4.12.el9.x86_64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "9Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.rhaos4.12.el9.x86_64"
},
"product_reference": "buildah-debugsource-1:1.23.4-5.rhaos4.12.el9.x86_64",
"relates_to_product_reference": "9Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "buildah-tests-1:1.23.4-5.rhaos4.12.el9.aarch64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "9Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.rhaos4.12.el9.aarch64"
},
"product_reference": "buildah-tests-1:1.23.4-5.rhaos4.12.el9.aarch64",
"relates_to_product_reference": "9Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "buildah-tests-1:1.23.4-5.rhaos4.12.el9.ppc64le as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "9Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.rhaos4.12.el9.ppc64le"
},
"product_reference": "buildah-tests-1:1.23.4-5.rhaos4.12.el9.ppc64le",
"relates_to_product_reference": "9Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "buildah-tests-1:1.23.4-5.rhaos4.12.el9.s390x as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "9Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.rhaos4.12.el9.s390x"
},
"product_reference": "buildah-tests-1:1.23.4-5.rhaos4.12.el9.s390x",
"relates_to_product_reference": "9Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "buildah-tests-1:1.23.4-5.rhaos4.12.el9.x86_64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "9Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.rhaos4.12.el9.x86_64"
},
"product_reference": "buildah-tests-1:1.23.4-5.rhaos4.12.el9.x86_64",
"relates_to_product_reference": "9Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "buildah-tests-debuginfo-1:1.23.4-5.rhaos4.12.el9.aarch64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "9Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.rhaos4.12.el9.aarch64"
},
"product_reference": "buildah-tests-debuginfo-1:1.23.4-5.rhaos4.12.el9.aarch64",
"relates_to_product_reference": "9Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "buildah-tests-debuginfo-1:1.23.4-5.rhaos4.12.el9.ppc64le as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "9Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.rhaos4.12.el9.ppc64le"
},
"product_reference": "buildah-tests-debuginfo-1:1.23.4-5.rhaos4.12.el9.ppc64le",
"relates_to_product_reference": "9Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "buildah-tests-debuginfo-1:1.23.4-5.rhaos4.12.el9.s390x as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "9Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.rhaos4.12.el9.s390x"
},
"product_reference": "buildah-tests-debuginfo-1:1.23.4-5.rhaos4.12.el9.s390x",
"relates_to_product_reference": "9Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "buildah-tests-debuginfo-1:1.23.4-5.rhaos4.12.el9.x86_64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "9Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.rhaos4.12.el9.x86_64"
},
"product_reference": "buildah-tests-debuginfo-1:1.23.4-5.rhaos4.12.el9.x86_64",
"relates_to_product_reference": "9Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "conmon-2:2.1.2-5.rhaos4.12.el9.aarch64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "9Base-RHOSE-4.12:conmon-2:2.1.2-5.rhaos4.12.el9.aarch64"
},
"product_reference": "conmon-2:2.1.2-5.rhaos4.12.el9.aarch64",
"relates_to_product_reference": "9Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "conmon-2:2.1.2-5.rhaos4.12.el9.ppc64le as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "9Base-RHOSE-4.12:conmon-2:2.1.2-5.rhaos4.12.el9.ppc64le"
},
"product_reference": "conmon-2:2.1.2-5.rhaos4.12.el9.ppc64le",
"relates_to_product_reference": "9Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "conmon-2:2.1.2-5.rhaos4.12.el9.s390x as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "9Base-RHOSE-4.12:conmon-2:2.1.2-5.rhaos4.12.el9.s390x"
},
"product_reference": "conmon-2:2.1.2-5.rhaos4.12.el9.s390x",
"relates_to_product_reference": "9Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "conmon-2:2.1.2-5.rhaos4.12.el9.src as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "9Base-RHOSE-4.12:conmon-2:2.1.2-5.rhaos4.12.el9.src"
},
"product_reference": "conmon-2:2.1.2-5.rhaos4.12.el9.src",
"relates_to_product_reference": "9Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "conmon-2:2.1.2-5.rhaos4.12.el9.x86_64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "9Base-RHOSE-4.12:conmon-2:2.1.2-5.rhaos4.12.el9.x86_64"
},
"product_reference": "conmon-2:2.1.2-5.rhaos4.12.el9.x86_64",
"relates_to_product_reference": "9Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "conmon-debuginfo-2:2.1.2-5.rhaos4.12.el9.aarch64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "9Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-5.rhaos4.12.el9.aarch64"
},
"product_reference": "conmon-debuginfo-2:2.1.2-5.rhaos4.12.el9.aarch64",
"relates_to_product_reference": "9Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "conmon-debuginfo-2:2.1.2-5.rhaos4.12.el9.ppc64le as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "9Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-5.rhaos4.12.el9.ppc64le"
},
"product_reference": "conmon-debuginfo-2:2.1.2-5.rhaos4.12.el9.ppc64le",
"relates_to_product_reference": "9Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "conmon-debuginfo-2:2.1.2-5.rhaos4.12.el9.s390x as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "9Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-5.rhaos4.12.el9.s390x"
},
"product_reference": "conmon-debuginfo-2:2.1.2-5.rhaos4.12.el9.s390x",
"relates_to_product_reference": "9Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "conmon-debuginfo-2:2.1.2-5.rhaos4.12.el9.x86_64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "9Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-5.rhaos4.12.el9.x86_64"
},
"product_reference": "conmon-debuginfo-2:2.1.2-5.rhaos4.12.el9.x86_64",
"relates_to_product_reference": "9Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "conmon-debugsource-2:2.1.2-5.rhaos4.12.el9.aarch64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "9Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-5.rhaos4.12.el9.aarch64"
},
"product_reference": "conmon-debugsource-2:2.1.2-5.rhaos4.12.el9.aarch64",
"relates_to_product_reference": "9Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "conmon-debugsource-2:2.1.2-5.rhaos4.12.el9.ppc64le as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "9Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-5.rhaos4.12.el9.ppc64le"
},
"product_reference": "conmon-debugsource-2:2.1.2-5.rhaos4.12.el9.ppc64le",
"relates_to_product_reference": "9Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "conmon-debugsource-2:2.1.2-5.rhaos4.12.el9.s390x as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "9Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-5.rhaos4.12.el9.s390x"
},
"product_reference": "conmon-debugsource-2:2.1.2-5.rhaos4.12.el9.s390x",
"relates_to_product_reference": "9Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "conmon-debugsource-2:2.1.2-5.rhaos4.12.el9.x86_64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "9Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-5.rhaos4.12.el9.x86_64"
},
"product_reference": "conmon-debugsource-2:2.1.2-5.rhaos4.12.el9.x86_64",
"relates_to_product_reference": "9Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el9.src as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "9Base-RHOSE-4.12:openshift-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el9.src"
},
"product_reference": "openshift-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el9.src",
"relates_to_product_reference": "9Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.aarch64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "9Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.aarch64"
},
"product_reference": "openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.aarch64",
"relates_to_product_reference": "9Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.ppc64le as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "9Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.ppc64le"
},
"product_reference": "openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.ppc64le",
"relates_to_product_reference": "9Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.s390x as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "9Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.s390x"
},
"product_reference": "openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.s390x",
"relates_to_product_reference": "9Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.src as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "9Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.src"
},
"product_reference": "openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.src",
"relates_to_product_reference": "9Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.x86_64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "9Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.x86_64"
},
"product_reference": "openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.x86_64",
"relates_to_product_reference": "9Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-clients-redistributable-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.x86_64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "9Base-RHOSE-4.12:openshift-clients-redistributable-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.x86_64"
},
"product_reference": "openshift-clients-redistributable-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.x86_64",
"relates_to_product_reference": "9Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el9.aarch64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "9Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el9.aarch64"
},
"product_reference": "openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el9.aarch64",
"relates_to_product_reference": "9Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el9.ppc64le as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "9Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el9.ppc64le"
},
"product_reference": "openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el9.ppc64le",
"relates_to_product_reference": "9Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el9.s390x as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "9Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el9.s390x"
},
"product_reference": "openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el9.s390x",
"relates_to_product_reference": "9Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el9.x86_64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "9Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el9.x86_64"
},
"product_reference": "openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el9.x86_64",
"relates_to_product_reference": "9Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-3:4.2.0-7.rhaos4.12.el9.aarch64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "9Base-RHOSE-4.12:podman-3:4.2.0-7.rhaos4.12.el9.aarch64"
},
"product_reference": "podman-3:4.2.0-7.rhaos4.12.el9.aarch64",
"relates_to_product_reference": "9Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-3:4.2.0-7.rhaos4.12.el9.ppc64le as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "9Base-RHOSE-4.12:podman-3:4.2.0-7.rhaos4.12.el9.ppc64le"
},
"product_reference": "podman-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"relates_to_product_reference": "9Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-3:4.2.0-7.rhaos4.12.el9.s390x as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "9Base-RHOSE-4.12:podman-3:4.2.0-7.rhaos4.12.el9.s390x"
},
"product_reference": "podman-3:4.2.0-7.rhaos4.12.el9.s390x",
"relates_to_product_reference": "9Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-3:4.2.0-7.rhaos4.12.el9.src as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "9Base-RHOSE-4.12:podman-3:4.2.0-7.rhaos4.12.el9.src"
},
"product_reference": "podman-3:4.2.0-7.rhaos4.12.el9.src",
"relates_to_product_reference": "9Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-3:4.2.0-7.rhaos4.12.el9.x86_64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "9Base-RHOSE-4.12:podman-3:4.2.0-7.rhaos4.12.el9.x86_64"
},
"product_reference": "podman-3:4.2.0-7.rhaos4.12.el9.x86_64",
"relates_to_product_reference": "9Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-catatonit-3:4.2.0-7.rhaos4.12.el9.aarch64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "9Base-RHOSE-4.12:podman-catatonit-3:4.2.0-7.rhaos4.12.el9.aarch64"
},
"product_reference": "podman-catatonit-3:4.2.0-7.rhaos4.12.el9.aarch64",
"relates_to_product_reference": "9Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-catatonit-3:4.2.0-7.rhaos4.12.el9.ppc64le as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "9Base-RHOSE-4.12:podman-catatonit-3:4.2.0-7.rhaos4.12.el9.ppc64le"
},
"product_reference": "podman-catatonit-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"relates_to_product_reference": "9Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-catatonit-3:4.2.0-7.rhaos4.12.el9.s390x as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "9Base-RHOSE-4.12:podman-catatonit-3:4.2.0-7.rhaos4.12.el9.s390x"
},
"product_reference": "podman-catatonit-3:4.2.0-7.rhaos4.12.el9.s390x",
"relates_to_product_reference": "9Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-catatonit-3:4.2.0-7.rhaos4.12.el9.x86_64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "9Base-RHOSE-4.12:podman-catatonit-3:4.2.0-7.rhaos4.12.el9.x86_64"
},
"product_reference": "podman-catatonit-3:4.2.0-7.rhaos4.12.el9.x86_64",
"relates_to_product_reference": "9Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-catatonit-debuginfo-3:4.2.0-7.rhaos4.12.el9.aarch64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "9Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-7.rhaos4.12.el9.aarch64"
},
"product_reference": "podman-catatonit-debuginfo-3:4.2.0-7.rhaos4.12.el9.aarch64",
"relates_to_product_reference": "9Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-catatonit-debuginfo-3:4.2.0-7.rhaos4.12.el9.ppc64le as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "9Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-7.rhaos4.12.el9.ppc64le"
},
"product_reference": "podman-catatonit-debuginfo-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"relates_to_product_reference": "9Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-catatonit-debuginfo-3:4.2.0-7.rhaos4.12.el9.s390x as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "9Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-7.rhaos4.12.el9.s390x"
},
"product_reference": "podman-catatonit-debuginfo-3:4.2.0-7.rhaos4.12.el9.s390x",
"relates_to_product_reference": "9Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-catatonit-debuginfo-3:4.2.0-7.rhaos4.12.el9.x86_64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "9Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-7.rhaos4.12.el9.x86_64"
},
"product_reference": "podman-catatonit-debuginfo-3:4.2.0-7.rhaos4.12.el9.x86_64",
"relates_to_product_reference": "9Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-debuginfo-3:4.2.0-7.rhaos4.12.el9.aarch64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "9Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-7.rhaos4.12.el9.aarch64"
},
"product_reference": "podman-debuginfo-3:4.2.0-7.rhaos4.12.el9.aarch64",
"relates_to_product_reference": "9Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-debuginfo-3:4.2.0-7.rhaos4.12.el9.ppc64le as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "9Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-7.rhaos4.12.el9.ppc64le"
},
"product_reference": "podman-debuginfo-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"relates_to_product_reference": "9Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-debuginfo-3:4.2.0-7.rhaos4.12.el9.s390x as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "9Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-7.rhaos4.12.el9.s390x"
},
"product_reference": "podman-debuginfo-3:4.2.0-7.rhaos4.12.el9.s390x",
"relates_to_product_reference": "9Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-debuginfo-3:4.2.0-7.rhaos4.12.el9.x86_64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "9Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-7.rhaos4.12.el9.x86_64"
},
"product_reference": "podman-debuginfo-3:4.2.0-7.rhaos4.12.el9.x86_64",
"relates_to_product_reference": "9Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-debugsource-3:4.2.0-7.rhaos4.12.el9.aarch64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "9Base-RHOSE-4.12:podman-debugsource-3:4.2.0-7.rhaos4.12.el9.aarch64"
},
"product_reference": "podman-debugsource-3:4.2.0-7.rhaos4.12.el9.aarch64",
"relates_to_product_reference": "9Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-debugsource-3:4.2.0-7.rhaos4.12.el9.ppc64le as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "9Base-RHOSE-4.12:podman-debugsource-3:4.2.0-7.rhaos4.12.el9.ppc64le"
},
"product_reference": "podman-debugsource-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"relates_to_product_reference": "9Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-debugsource-3:4.2.0-7.rhaos4.12.el9.s390x as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "9Base-RHOSE-4.12:podman-debugsource-3:4.2.0-7.rhaos4.12.el9.s390x"
},
"product_reference": "podman-debugsource-3:4.2.0-7.rhaos4.12.el9.s390x",
"relates_to_product_reference": "9Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-debugsource-3:4.2.0-7.rhaos4.12.el9.x86_64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "9Base-RHOSE-4.12:podman-debugsource-3:4.2.0-7.rhaos4.12.el9.x86_64"
},
"product_reference": "podman-debugsource-3:4.2.0-7.rhaos4.12.el9.x86_64",
"relates_to_product_reference": "9Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-docker-3:4.2.0-7.rhaos4.12.el9.noarch as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "9Base-RHOSE-4.12:podman-docker-3:4.2.0-7.rhaos4.12.el9.noarch"
},
"product_reference": "podman-docker-3:4.2.0-7.rhaos4.12.el9.noarch",
"relates_to_product_reference": "9Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-gvproxy-3:4.2.0-7.rhaos4.12.el9.aarch64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "9Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-7.rhaos4.12.el9.aarch64"
},
"product_reference": "podman-gvproxy-3:4.2.0-7.rhaos4.12.el9.aarch64",
"relates_to_product_reference": "9Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-gvproxy-3:4.2.0-7.rhaos4.12.el9.ppc64le as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "9Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-7.rhaos4.12.el9.ppc64le"
},
"product_reference": "podman-gvproxy-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"relates_to_product_reference": "9Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-gvproxy-3:4.2.0-7.rhaos4.12.el9.s390x as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "9Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-7.rhaos4.12.el9.s390x"
},
"product_reference": "podman-gvproxy-3:4.2.0-7.rhaos4.12.el9.s390x",
"relates_to_product_reference": "9Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-gvproxy-3:4.2.0-7.rhaos4.12.el9.x86_64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "9Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-7.rhaos4.12.el9.x86_64"
},
"product_reference": "podman-gvproxy-3:4.2.0-7.rhaos4.12.el9.x86_64",
"relates_to_product_reference": "9Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-gvproxy-debuginfo-3:4.2.0-7.rhaos4.12.el9.aarch64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "9Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-7.rhaos4.12.el9.aarch64"
},
"product_reference": "podman-gvproxy-debuginfo-3:4.2.0-7.rhaos4.12.el9.aarch64",
"relates_to_product_reference": "9Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-gvproxy-debuginfo-3:4.2.0-7.rhaos4.12.el9.ppc64le as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "9Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-7.rhaos4.12.el9.ppc64le"
},
"product_reference": "podman-gvproxy-debuginfo-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"relates_to_product_reference": "9Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-gvproxy-debuginfo-3:4.2.0-7.rhaos4.12.el9.s390x as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "9Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-7.rhaos4.12.el9.s390x"
},
"product_reference": "podman-gvproxy-debuginfo-3:4.2.0-7.rhaos4.12.el9.s390x",
"relates_to_product_reference": "9Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-gvproxy-debuginfo-3:4.2.0-7.rhaos4.12.el9.x86_64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "9Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-7.rhaos4.12.el9.x86_64"
},
"product_reference": "podman-gvproxy-debuginfo-3:4.2.0-7.rhaos4.12.el9.x86_64",
"relates_to_product_reference": "9Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-plugins-3:4.2.0-7.rhaos4.12.el9.aarch64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "9Base-RHOSE-4.12:podman-plugins-3:4.2.0-7.rhaos4.12.el9.aarch64"
},
"product_reference": "podman-plugins-3:4.2.0-7.rhaos4.12.el9.aarch64",
"relates_to_product_reference": "9Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-plugins-3:4.2.0-7.rhaos4.12.el9.ppc64le as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "9Base-RHOSE-4.12:podman-plugins-3:4.2.0-7.rhaos4.12.el9.ppc64le"
},
"product_reference": "podman-plugins-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"relates_to_product_reference": "9Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-plugins-3:4.2.0-7.rhaos4.12.el9.s390x as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "9Base-RHOSE-4.12:podman-plugins-3:4.2.0-7.rhaos4.12.el9.s390x"
},
"product_reference": "podman-plugins-3:4.2.0-7.rhaos4.12.el9.s390x",
"relates_to_product_reference": "9Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-plugins-3:4.2.0-7.rhaos4.12.el9.x86_64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "9Base-RHOSE-4.12:podman-plugins-3:4.2.0-7.rhaos4.12.el9.x86_64"
},
"product_reference": "podman-plugins-3:4.2.0-7.rhaos4.12.el9.x86_64",
"relates_to_product_reference": "9Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-plugins-debuginfo-3:4.2.0-7.rhaos4.12.el9.aarch64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "9Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-7.rhaos4.12.el9.aarch64"
},
"product_reference": "podman-plugins-debuginfo-3:4.2.0-7.rhaos4.12.el9.aarch64",
"relates_to_product_reference": "9Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-plugins-debuginfo-3:4.2.0-7.rhaos4.12.el9.ppc64le as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "9Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-7.rhaos4.12.el9.ppc64le"
},
"product_reference": "podman-plugins-debuginfo-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"relates_to_product_reference": "9Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-plugins-debuginfo-3:4.2.0-7.rhaos4.12.el9.s390x as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "9Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-7.rhaos4.12.el9.s390x"
},
"product_reference": "podman-plugins-debuginfo-3:4.2.0-7.rhaos4.12.el9.s390x",
"relates_to_product_reference": "9Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-plugins-debuginfo-3:4.2.0-7.rhaos4.12.el9.x86_64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "9Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-7.rhaos4.12.el9.x86_64"
},
"product_reference": "podman-plugins-debuginfo-3:4.2.0-7.rhaos4.12.el9.x86_64",
"relates_to_product_reference": "9Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-remote-3:4.2.0-7.rhaos4.12.el9.aarch64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "9Base-RHOSE-4.12:podman-remote-3:4.2.0-7.rhaos4.12.el9.aarch64"
},
"product_reference": "podman-remote-3:4.2.0-7.rhaos4.12.el9.aarch64",
"relates_to_product_reference": "9Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-remote-3:4.2.0-7.rhaos4.12.el9.ppc64le as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "9Base-RHOSE-4.12:podman-remote-3:4.2.0-7.rhaos4.12.el9.ppc64le"
},
"product_reference": "podman-remote-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"relates_to_product_reference": "9Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-remote-3:4.2.0-7.rhaos4.12.el9.s390x as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "9Base-RHOSE-4.12:podman-remote-3:4.2.0-7.rhaos4.12.el9.s390x"
},
"product_reference": "podman-remote-3:4.2.0-7.rhaos4.12.el9.s390x",
"relates_to_product_reference": "9Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-remote-3:4.2.0-7.rhaos4.12.el9.x86_64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "9Base-RHOSE-4.12:podman-remote-3:4.2.0-7.rhaos4.12.el9.x86_64"
},
"product_reference": "podman-remote-3:4.2.0-7.rhaos4.12.el9.x86_64",
"relates_to_product_reference": "9Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-remote-debuginfo-3:4.2.0-7.rhaos4.12.el9.aarch64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "9Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-7.rhaos4.12.el9.aarch64"
},
"product_reference": "podman-remote-debuginfo-3:4.2.0-7.rhaos4.12.el9.aarch64",
"relates_to_product_reference": "9Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-remote-debuginfo-3:4.2.0-7.rhaos4.12.el9.ppc64le as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "9Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-7.rhaos4.12.el9.ppc64le"
},
"product_reference": "podman-remote-debuginfo-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"relates_to_product_reference": "9Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-remote-debuginfo-3:4.2.0-7.rhaos4.12.el9.s390x as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "9Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-7.rhaos4.12.el9.s390x"
},
"product_reference": "podman-remote-debuginfo-3:4.2.0-7.rhaos4.12.el9.s390x",
"relates_to_product_reference": "9Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-remote-debuginfo-3:4.2.0-7.rhaos4.12.el9.x86_64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "9Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-7.rhaos4.12.el9.x86_64"
},
"product_reference": "podman-remote-debuginfo-3:4.2.0-7.rhaos4.12.el9.x86_64",
"relates_to_product_reference": "9Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-tests-3:4.2.0-7.rhaos4.12.el9.aarch64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "9Base-RHOSE-4.12:podman-tests-3:4.2.0-7.rhaos4.12.el9.aarch64"
},
"product_reference": "podman-tests-3:4.2.0-7.rhaos4.12.el9.aarch64",
"relates_to_product_reference": "9Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-tests-3:4.2.0-7.rhaos4.12.el9.ppc64le as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "9Base-RHOSE-4.12:podman-tests-3:4.2.0-7.rhaos4.12.el9.ppc64le"
},
"product_reference": "podman-tests-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"relates_to_product_reference": "9Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-tests-3:4.2.0-7.rhaos4.12.el9.s390x as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "9Base-RHOSE-4.12:podman-tests-3:4.2.0-7.rhaos4.12.el9.s390x"
},
"product_reference": "podman-tests-3:4.2.0-7.rhaos4.12.el9.s390x",
"relates_to_product_reference": "9Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-tests-3:4.2.0-7.rhaos4.12.el9.x86_64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "9Base-RHOSE-4.12:podman-tests-3:4.2.0-7.rhaos4.12.el9.x86_64"
},
"product_reference": "podman-tests-3:4.2.0-7.rhaos4.12.el9.x86_64",
"relates_to_product_reference": "9Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "skopeo-2:1.9.4-3.rhaos4.12.el9.aarch64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "9Base-RHOSE-4.12:skopeo-2:1.9.4-3.rhaos4.12.el9.aarch64"
},
"product_reference": "skopeo-2:1.9.4-3.rhaos4.12.el9.aarch64",
"relates_to_product_reference": "9Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "skopeo-2:1.9.4-3.rhaos4.12.el9.ppc64le as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "9Base-RHOSE-4.12:skopeo-2:1.9.4-3.rhaos4.12.el9.ppc64le"
},
"product_reference": "skopeo-2:1.9.4-3.rhaos4.12.el9.ppc64le",
"relates_to_product_reference": "9Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "skopeo-2:1.9.4-3.rhaos4.12.el9.s390x as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "9Base-RHOSE-4.12:skopeo-2:1.9.4-3.rhaos4.12.el9.s390x"
},
"product_reference": "skopeo-2:1.9.4-3.rhaos4.12.el9.s390x",
"relates_to_product_reference": "9Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "skopeo-2:1.9.4-3.rhaos4.12.el9.src as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "9Base-RHOSE-4.12:skopeo-2:1.9.4-3.rhaos4.12.el9.src"
},
"product_reference": "skopeo-2:1.9.4-3.rhaos4.12.el9.src",
"relates_to_product_reference": "9Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "skopeo-2:1.9.4-3.rhaos4.12.el9.x86_64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "9Base-RHOSE-4.12:skopeo-2:1.9.4-3.rhaos4.12.el9.x86_64"
},
"product_reference": "skopeo-2:1.9.4-3.rhaos4.12.el9.x86_64",
"relates_to_product_reference": "9Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "skopeo-debuginfo-2:1.9.4-3.rhaos4.12.el9.aarch64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "9Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.rhaos4.12.el9.aarch64"
},
"product_reference": "skopeo-debuginfo-2:1.9.4-3.rhaos4.12.el9.aarch64",
"relates_to_product_reference": "9Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "skopeo-debuginfo-2:1.9.4-3.rhaos4.12.el9.ppc64le as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "9Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.rhaos4.12.el9.ppc64le"
},
"product_reference": "skopeo-debuginfo-2:1.9.4-3.rhaos4.12.el9.ppc64le",
"relates_to_product_reference": "9Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "skopeo-debuginfo-2:1.9.4-3.rhaos4.12.el9.s390x as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "9Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.rhaos4.12.el9.s390x"
},
"product_reference": "skopeo-debuginfo-2:1.9.4-3.rhaos4.12.el9.s390x",
"relates_to_product_reference": "9Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "skopeo-debuginfo-2:1.9.4-3.rhaos4.12.el9.x86_64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "9Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.rhaos4.12.el9.x86_64"
},
"product_reference": "skopeo-debuginfo-2:1.9.4-3.rhaos4.12.el9.x86_64",
"relates_to_product_reference": "9Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "skopeo-debugsource-2:1.9.4-3.rhaos4.12.el9.aarch64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "9Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.rhaos4.12.el9.aarch64"
},
"product_reference": "skopeo-debugsource-2:1.9.4-3.rhaos4.12.el9.aarch64",
"relates_to_product_reference": "9Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "skopeo-debugsource-2:1.9.4-3.rhaos4.12.el9.ppc64le as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "9Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.rhaos4.12.el9.ppc64le"
},
"product_reference": "skopeo-debugsource-2:1.9.4-3.rhaos4.12.el9.ppc64le",
"relates_to_product_reference": "9Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "skopeo-debugsource-2:1.9.4-3.rhaos4.12.el9.s390x as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "9Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.rhaos4.12.el9.s390x"
},
"product_reference": "skopeo-debugsource-2:1.9.4-3.rhaos4.12.el9.s390x",
"relates_to_product_reference": "9Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "skopeo-debugsource-2:1.9.4-3.rhaos4.12.el9.x86_64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "9Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.rhaos4.12.el9.x86_64"
},
"product_reference": "skopeo-debugsource-2:1.9.4-3.rhaos4.12.el9.x86_64",
"relates_to_product_reference": "9Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "skopeo-tests-2:1.9.4-3.rhaos4.12.el9.aarch64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "9Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.rhaos4.12.el9.aarch64"
},
"product_reference": "skopeo-tests-2:1.9.4-3.rhaos4.12.el9.aarch64",
"relates_to_product_reference": "9Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "skopeo-tests-2:1.9.4-3.rhaos4.12.el9.ppc64le as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "9Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.rhaos4.12.el9.ppc64le"
},
"product_reference": "skopeo-tests-2:1.9.4-3.rhaos4.12.el9.ppc64le",
"relates_to_product_reference": "9Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "skopeo-tests-2:1.9.4-3.rhaos4.12.el9.s390x as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "9Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.rhaos4.12.el9.s390x"
},
"product_reference": "skopeo-tests-2:1.9.4-3.rhaos4.12.el9.s390x",
"relates_to_product_reference": "9Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "skopeo-tests-2:1.9.4-3.rhaos4.12.el9.x86_64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "9Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.rhaos4.12.el9.x86_64"
},
"product_reference": "skopeo-tests-2:1.9.4-3.rhaos4.12.el9.x86_64",
"relates_to_product_reference": "9Base-RHOSE-4.12"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Adam Korczynski"
],
"organization": "ADA Logics"
},
{
"names": [
"OSS-Fuzz"
]
}
],
"cve": "CVE-2022-2879",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"discovery_date": "2022-10-07T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-RHOSE-4.12:bpftool-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:bpftool-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:bpftool-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:bpftool-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:bpftool-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:bpftool-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:bpftool-debuginfo-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:bpftool-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:buildah-1:1.23.4-5.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:buildah-1:1.23.4-5.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:buildah-1:1.23.4-5.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:buildah-1:1.23.4-5.1.rhaos4.12.el8.src",
"8Base-RHOSE-4.12:buildah-1:1.23.4-5.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:containernetworking-plugins-0:1.0.1-7.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:containernetworking-plugins-0:1.0.1-7.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:containernetworking-plugins-0:1.0.1-7.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:containernetworking-plugins-0:1.0.1-7.rhaos4.12.el8.src",
"8Base-RHOSE-4.12:containernetworking-plugins-0:1.0.1-7.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:containernetworking-plugins-debuginfo-0:1.0.1-7.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:containernetworking-plugins-debuginfo-0:1.0.1-7.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:containernetworking-plugins-debuginfo-0:1.0.1-7.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:containernetworking-plugins-debuginfo-0:1.0.1-7.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:containernetworking-plugins-debugsource-0:1.0.1-7.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:containernetworking-plugins-debugsource-0:1.0.1-7.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:containernetworking-plugins-debugsource-0:1.0.1-7.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:containernetworking-plugins-debugsource-0:1.0.1-7.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:kernel-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-0:4.18.0-372.59.1.el8_6.src",
"8Base-RHOSE-4.12:kernel-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-core-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-core-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-core-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-core-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-cross-headers-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-cross-headers-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-cross-headers-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-cross-headers-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-debug-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-debug-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-debug-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-debug-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-debug-core-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-debug-core-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-debug-core-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-debug-core-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-debug-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-debug-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-debug-debuginfo-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-debug-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-debug-devel-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-debug-devel-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-debug-devel-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-debug-devel-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-debug-modules-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-debug-modules-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-debug-modules-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-debug-modules-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-debug-modules-extra-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-debug-modules-extra-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-debug-modules-extra-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-debug-modules-extra-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-debug-modules-internal-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-debug-modules-internal-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-debug-modules-internal-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-debug-modules-internal-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-debuginfo-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-debuginfo-common-aarch64-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-debuginfo-common-ppc64le-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-debuginfo-common-s390x-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-debuginfo-common-x86_64-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-devel-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-devel-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-devel-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-devel-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-doc-0:4.18.0-372.59.1.el8_6.noarch",
"8Base-RHOSE-4.12:kernel-headers-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-headers-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-headers-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-headers-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-ipaclones-internal-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-ipaclones-internal-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-modules-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-modules-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-modules-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-modules-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-modules-extra-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-modules-extra-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-modules-extra-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-modules-extra-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-modules-internal-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-modules-internal-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-modules-internal-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-modules-internal-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-0:4.18.0-372.59.1.rt7.217.el8_6.src",
"8Base-RHOSE-4.12:kernel-rt-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-core-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debug-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debug-core-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debug-debuginfo-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debug-devel-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debug-kvm-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debug-modules-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debug-modules-extra-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debug-modules-internal-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debuginfo-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-devel-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-kvm-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-modules-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-modules-extra-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-modules-internal-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-selftests-internal-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-selftests-internal-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-selftests-internal-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-selftests-internal-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-selftests-internal-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-tools-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-tools-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-tools-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-tools-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-tools-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-tools-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-tools-debuginfo-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-tools-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-tools-libs-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-tools-libs-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-tools-libs-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-tools-libs-devel-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-tools-libs-devel-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-tools-libs-devel-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-zfcpdump-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-zfcpdump-core-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-zfcpdump-debuginfo-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-zfcpdump-devel-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-zfcpdump-modules-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-zfcpdump-modules-extra-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-zfcpdump-modules-internal-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:openshift-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el8.src",
"8Base-RHOSE-4.12:openshift-ansible-0:4.12.0-202306090942.p0.g74dc7b3.assembly.stream.el8.noarch",
"8Base-RHOSE-4.12:openshift-ansible-0:4.12.0-202306090942.p0.g74dc7b3.assembly.stream.el8.src",
"8Base-RHOSE-4.12:openshift-ansible-test-0:4.12.0-202306090942.p0.g74dc7b3.assembly.stream.el8.noarch",
"8Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.aarch64",
"8Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.ppc64le",
"8Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.s390x",
"8Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.src",
"8Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.x86_64",
"8Base-RHOSE-4.12:openshift-clients-redistributable-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.x86_64",
"8Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el8.aarch64",
"8Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el8.ppc64le",
"8Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el8.s390x",
"8Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el8.x86_64",
"8Base-RHOSE-4.12:openshift-kuryr-0:4.12.0-202306140156.p0.g31dd228.assembly.stream.el8.src",
"8Base-RHOSE-4.12:openshift-kuryr-cni-0:4.12.0-202306140156.p0.g31dd228.assembly.stream.el8.noarch",
"8Base-RHOSE-4.12:openshift-kuryr-common-0:4.12.0-202306140156.p0.g31dd228.assembly.stream.el8.noarch",
"8Base-RHOSE-4.12:openshift-kuryr-controller-0:4.12.0-202306140156.p0.g31dd228.assembly.stream.el8.noarch",
"8Base-RHOSE-4.12:openshift4-aws-iso-0:4.12.0-202306090942.p0.gd2acdd5.assembly.stream.el8.noarch",
"8Base-RHOSE-4.12:openshift4-aws-iso-0:4.12.0-202306090942.p0.gd2acdd5.assembly.stream.el8.src",
"8Base-RHOSE-4.12:perf-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:perf-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:perf-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:perf-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:perf-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:perf-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:perf-debuginfo-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:perf-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:python3-kuryr-kubernetes-0:4.12.0-202306140156.p0.g31dd228.assembly.stream.el8.noarch",
"8Base-RHOSE-4.12:python3-perf-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:python3-perf-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:python3-perf-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:python3-perf-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:python3-perf-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:python3-perf-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:python3-perf-debuginfo-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:python3-perf-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:runc-3:1.1.6-4.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:runc-3:1.1.6-4.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:runc-3:1.1.6-4.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:runc-3:1.1.6-4.rhaos4.12.el8.src",
"8Base-RHOSE-4.12:runc-3:1.1.6-4.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:runc-debuginfo-3:1.1.6-4.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:runc-debuginfo-3:1.1.6-4.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:runc-debuginfo-3:1.1.6-4.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:runc-debuginfo-3:1.1.6-4.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:runc-debugsource-3:1.1.6-4.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:runc-debugsource-3:1.1.6-4.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:runc-debugsource-3:1.1.6-4.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:runc-debugsource-3:1.1.6-4.rhaos4.12.el8.x86_64",
"9Base-RHOSE-4.12:buildah-1:1.23.4-5.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:buildah-1:1.23.4-5.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:buildah-1:1.23.4-5.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:buildah-1:1.23.4-5.rhaos4.12.el9.src",
"9Base-RHOSE-4.12:buildah-1:1.23.4-5.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:openshift-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el9.src",
"9Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.aarch64",
"9Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.ppc64le",
"9Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.s390x",
"9Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.src",
"9Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.x86_64",
"9Base-RHOSE-4.12:openshift-clients-redistributable-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.x86_64",
"9Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el9.aarch64",
"9Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el9.ppc64le",
"9Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el9.s390x",
"9Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el9.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2132867"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the golang package, where Reader.Read does not set a limit on the maximum size of file headers. After fixing, Reader.Read limits the maximum size of header blocks to 1 MiB. This flaw allows a maliciously crafted archive to cause Read to allocate unbounded amounts of memory, potentially causing resource exhaustion or panic.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: archive/tar: github.com/vbatts/tar-split: unbounded memory consumption when reading headers",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The opportunity for a Denial of Service is limited to the golang runtime. In the case of OpenShift Container Platform, this would be restricted within each individual container. There are multiple layers of guide rails (Golang\u2019s Garbage Collector; OpenShift\u2019s resource constraints imposed at the container and cluster levels) which would require a malicious user to continue submitting attacks for there to be any enduring impact. They would also need access to external server resources to be able to send a massive volume of requests to cause a significant impact on server operations.\n\n\nThis flaw additionally affects the github.com/vbatts/tar-split library and was fixed in v0.12.1.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-RHOSE-4.12:conmon-2:2.1.2-4.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:conmon-2:2.1.2-4.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:conmon-2:2.1.2-4.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:conmon-2:2.1.2-4.rhaos4.12.el8.src",
"8Base-RHOSE-4.12:conmon-2:2.1.2-4.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-4.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-4.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-4.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-4.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-4.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-4.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-4.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-4.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-3:4.2.0-6.1.rhaos4.12.el8.src",
"8Base-RHOSE-4.12:podman-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-catatonit-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-catatonit-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-catatonit-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-catatonit-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-debugsource-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-debugsource-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-debugsource-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-debugsource-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-docker-3:4.2.0-6.1.rhaos4.12.el8.noarch",
"8Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-plugins-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-plugins-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-plugins-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-plugins-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-remote-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-remote-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-remote-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-remote-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-tests-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-tests-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-tests-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-tests-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:skopeo-2:1.9.4-3.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:skopeo-2:1.9.4-3.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:skopeo-2:1.9.4-3.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:skopeo-2:1.9.4-3.1.rhaos4.12.el8.src",
"8Base-RHOSE-4.12:skopeo-2:1.9.4-3.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.1.rhaos4.12.el8.x86_64",
"9Base-RHOSE-4.12:conmon-2:2.1.2-5.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:conmon-2:2.1.2-5.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:conmon-2:2.1.2-5.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:conmon-2:2.1.2-5.rhaos4.12.el9.src",
"9Base-RHOSE-4.12:conmon-2:2.1.2-5.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-5.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-5.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-5.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-5.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-5.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-5.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-5.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-5.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-3:4.2.0-7.rhaos4.12.el9.src",
"9Base-RHOSE-4.12:podman-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-catatonit-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-catatonit-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-catatonit-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-catatonit-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-debugsource-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-debugsource-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-debugsource-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-debugsource-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-docker-3:4.2.0-7.rhaos4.12.el9.noarch",
"9Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-plugins-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-plugins-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-plugins-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-plugins-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-remote-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-remote-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-remote-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-remote-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-tests-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-tests-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-tests-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-tests-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:skopeo-2:1.9.4-3.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:skopeo-2:1.9.4-3.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:skopeo-2:1.9.4-3.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:skopeo-2:1.9.4-3.rhaos4.12.el9.src",
"9Base-RHOSE-4.12:skopeo-2:1.9.4-3.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.rhaos4.12.el9.x86_64"
],
"known_not_affected": [
"8Base-RHOSE-4.12:bpftool-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:bpftool-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:bpftool-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:bpftool-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:bpftool-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:bpftool-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:bpftool-debuginfo-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:bpftool-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:buildah-1:1.23.4-5.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:buildah-1:1.23.4-5.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:buildah-1:1.23.4-5.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:buildah-1:1.23.4-5.1.rhaos4.12.el8.src",
"8Base-RHOSE-4.12:buildah-1:1.23.4-5.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:containernetworking-plugins-0:1.0.1-7.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:containernetworking-plugins-0:1.0.1-7.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:containernetworking-plugins-0:1.0.1-7.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:containernetworking-plugins-0:1.0.1-7.rhaos4.12.el8.src",
"8Base-RHOSE-4.12:containernetworking-plugins-0:1.0.1-7.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:containernetworking-plugins-debuginfo-0:1.0.1-7.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:containernetworking-plugins-debuginfo-0:1.0.1-7.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:containernetworking-plugins-debuginfo-0:1.0.1-7.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:containernetworking-plugins-debuginfo-0:1.0.1-7.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:containernetworking-plugins-debugsource-0:1.0.1-7.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:containernetworking-plugins-debugsource-0:1.0.1-7.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:containernetworking-plugins-debugsource-0:1.0.1-7.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:containernetworking-plugins-debugsource-0:1.0.1-7.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:kernel-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-0:4.18.0-372.59.1.el8_6.src",
"8Base-RHOSE-4.12:kernel-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-core-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-core-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-core-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-core-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-cross-headers-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-cross-headers-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-cross-headers-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-cross-headers-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-debug-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-debug-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-debug-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-debug-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-debug-core-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-debug-core-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-debug-core-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-debug-core-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-debug-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-debug-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-debug-debuginfo-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-debug-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-debug-devel-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-debug-devel-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-debug-devel-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-debug-devel-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-debug-modules-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-debug-modules-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-debug-modules-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-debug-modules-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-debug-modules-extra-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-debug-modules-extra-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-debug-modules-extra-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-debug-modules-extra-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-debug-modules-internal-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-debug-modules-internal-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-debug-modules-internal-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-debug-modules-internal-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-debuginfo-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-debuginfo-common-aarch64-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-debuginfo-common-ppc64le-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-debuginfo-common-s390x-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-debuginfo-common-x86_64-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-devel-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-devel-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-devel-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-devel-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-doc-0:4.18.0-372.59.1.el8_6.noarch",
"8Base-RHOSE-4.12:kernel-headers-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-headers-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-headers-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-headers-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-ipaclones-internal-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-ipaclones-internal-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-modules-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-modules-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-modules-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-modules-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-modules-extra-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-modules-extra-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-modules-extra-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-modules-extra-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-modules-internal-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-modules-internal-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-modules-internal-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-modules-internal-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-0:4.18.0-372.59.1.rt7.217.el8_6.src",
"8Base-RHOSE-4.12:kernel-rt-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-core-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debug-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debug-core-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debug-debuginfo-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debug-devel-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debug-kvm-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debug-modules-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debug-modules-extra-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debug-modules-internal-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debuginfo-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-devel-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-kvm-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-modules-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-modules-extra-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-modules-internal-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-selftests-internal-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-selftests-internal-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-selftests-internal-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-selftests-internal-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-selftests-internal-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-tools-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-tools-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-tools-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-tools-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-tools-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-tools-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-tools-debuginfo-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-tools-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-tools-libs-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-tools-libs-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-tools-libs-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-tools-libs-devel-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-tools-libs-devel-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-tools-libs-devel-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-zfcpdump-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-zfcpdump-core-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-zfcpdump-debuginfo-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-zfcpdump-devel-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-zfcpdump-modules-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-zfcpdump-modules-extra-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-zfcpdump-modules-internal-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:openshift-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el8.src",
"8Base-RHOSE-4.12:openshift-ansible-0:4.12.0-202306090942.p0.g74dc7b3.assembly.stream.el8.noarch",
"8Base-RHOSE-4.12:openshift-ansible-0:4.12.0-202306090942.p0.g74dc7b3.assembly.stream.el8.src",
"8Base-RHOSE-4.12:openshift-ansible-test-0:4.12.0-202306090942.p0.g74dc7b3.assembly.stream.el8.noarch",
"8Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.aarch64",
"8Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.ppc64le",
"8Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.s390x",
"8Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.src",
"8Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.x86_64",
"8Base-RHOSE-4.12:openshift-clients-redistributable-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.x86_64",
"8Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el8.aarch64",
"8Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el8.ppc64le",
"8Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el8.s390x",
"8Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el8.x86_64",
"8Base-RHOSE-4.12:openshift-kuryr-0:4.12.0-202306140156.p0.g31dd228.assembly.stream.el8.src",
"8Base-RHOSE-4.12:openshift-kuryr-cni-0:4.12.0-202306140156.p0.g31dd228.assembly.stream.el8.noarch",
"8Base-RHOSE-4.12:openshift-kuryr-common-0:4.12.0-202306140156.p0.g31dd228.assembly.stream.el8.noarch",
"8Base-RHOSE-4.12:openshift-kuryr-controller-0:4.12.0-202306140156.p0.g31dd228.assembly.stream.el8.noarch",
"8Base-RHOSE-4.12:openshift4-aws-iso-0:4.12.0-202306090942.p0.gd2acdd5.assembly.stream.el8.noarch",
"8Base-RHOSE-4.12:openshift4-aws-iso-0:4.12.0-202306090942.p0.gd2acdd5.assembly.stream.el8.src",
"8Base-RHOSE-4.12:perf-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:perf-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:perf-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:perf-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:perf-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:perf-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:perf-debuginfo-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:perf-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:python3-kuryr-kubernetes-0:4.12.0-202306140156.p0.g31dd228.assembly.stream.el8.noarch",
"8Base-RHOSE-4.12:python3-perf-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:python3-perf-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:python3-perf-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:python3-perf-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:python3-perf-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:python3-perf-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:python3-perf-debuginfo-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:python3-perf-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:runc-3:1.1.6-4.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:runc-3:1.1.6-4.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:runc-3:1.1.6-4.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:runc-3:1.1.6-4.rhaos4.12.el8.src",
"8Base-RHOSE-4.12:runc-3:1.1.6-4.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:runc-debuginfo-3:1.1.6-4.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:runc-debuginfo-3:1.1.6-4.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:runc-debuginfo-3:1.1.6-4.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:runc-debuginfo-3:1.1.6-4.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:runc-debugsource-3:1.1.6-4.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:runc-debugsource-3:1.1.6-4.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:runc-debugsource-3:1.1.6-4.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:runc-debugsource-3:1.1.6-4.rhaos4.12.el8.x86_64",
"9Base-RHOSE-4.12:buildah-1:1.23.4-5.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:buildah-1:1.23.4-5.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:buildah-1:1.23.4-5.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:buildah-1:1.23.4-5.rhaos4.12.el9.src",
"9Base-RHOSE-4.12:buildah-1:1.23.4-5.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:openshift-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el9.src",
"9Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.aarch64",
"9Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.ppc64le",
"9Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.s390x",
"9Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.src",
"9Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.x86_64",
"9Base-RHOSE-4.12:openshift-clients-redistributable-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.x86_64",
"9Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el9.aarch64",
"9Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el9.ppc64le",
"9Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el9.s390x",
"9Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-2879"
},
{
"category": "external",
"summary": "RHBZ#2132867",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2132867"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-2879",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2879"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-2879",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-2879"
},
{
"category": "external",
"summary": "https://github.com/golang/go/issues/54853",
"url": "https://github.com/golang/go/issues/54853"
},
{
"category": "external",
"summary": "https://github.com/vbatts/tar-split/releases/tag/v0.12.1",
"url": "https://github.com/vbatts/tar-split/releases/tag/v0.12.1"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/xtuG5faxtaU?pli=1",
"url": "https://groups.google.com/g/golang-announce/c/xtuG5faxtaU?pli=1"
}
],
"release_date": "2022-10-04T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-06-26T01:19:15+00:00",
"details": "For OpenShift Container Platform 4.12 see the following documentation, which will be updated shortly for this release, for important instructions on how to upgrade your cluster and fully apply this asynchronous errata update:\n\nhttps://docs.openshift.com/container-platform/4.12/release_notes/ocp-4-12-release-notes.html",
"product_ids": [
"8Base-RHOSE-4.12:conmon-2:2.1.2-4.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:conmon-2:2.1.2-4.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:conmon-2:2.1.2-4.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:conmon-2:2.1.2-4.rhaos4.12.el8.src",
"8Base-RHOSE-4.12:conmon-2:2.1.2-4.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-4.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-4.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-4.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-4.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-4.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-4.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-4.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-4.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-3:4.2.0-6.1.rhaos4.12.el8.src",
"8Base-RHOSE-4.12:podman-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-catatonit-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-catatonit-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-catatonit-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-catatonit-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-debugsource-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-debugsource-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-debugsource-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-debugsource-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-docker-3:4.2.0-6.1.rhaos4.12.el8.noarch",
"8Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-plugins-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-plugins-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-plugins-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-plugins-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-remote-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-remote-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-remote-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-remote-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-tests-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-tests-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-tests-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-tests-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:skopeo-2:1.9.4-3.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:skopeo-2:1.9.4-3.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:skopeo-2:1.9.4-3.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:skopeo-2:1.9.4-3.1.rhaos4.12.el8.src",
"8Base-RHOSE-4.12:skopeo-2:1.9.4-3.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.1.rhaos4.12.el8.x86_64",
"9Base-RHOSE-4.12:conmon-2:2.1.2-5.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:conmon-2:2.1.2-5.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:conmon-2:2.1.2-5.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:conmon-2:2.1.2-5.rhaos4.12.el9.src",
"9Base-RHOSE-4.12:conmon-2:2.1.2-5.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-5.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-5.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-5.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-5.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-5.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-5.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-5.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-5.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-3:4.2.0-7.rhaos4.12.el9.src",
"9Base-RHOSE-4.12:podman-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-catatonit-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-catatonit-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-catatonit-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-catatonit-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-debugsource-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-debugsource-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-debugsource-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-debugsource-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-docker-3:4.2.0-7.rhaos4.12.el9.noarch",
"9Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-plugins-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-plugins-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-plugins-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-plugins-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-remote-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-remote-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-remote-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-remote-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-tests-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-tests-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-tests-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-tests-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:skopeo-2:1.9.4-3.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:skopeo-2:1.9.4-3.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:skopeo-2:1.9.4-3.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:skopeo-2:1.9.4-3.rhaos4.12.el9.src",
"9Base-RHOSE-4.12:skopeo-2:1.9.4-3.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.rhaos4.12.el9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:3613"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"8Base-RHOSE-4.12:bpftool-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:bpftool-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:bpftool-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:bpftool-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:bpftool-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:bpftool-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:bpftool-debuginfo-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:bpftool-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:buildah-1:1.23.4-5.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:buildah-1:1.23.4-5.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:buildah-1:1.23.4-5.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:buildah-1:1.23.4-5.1.rhaos4.12.el8.src",
"8Base-RHOSE-4.12:buildah-1:1.23.4-5.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:conmon-2:2.1.2-4.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:conmon-2:2.1.2-4.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:conmon-2:2.1.2-4.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:conmon-2:2.1.2-4.rhaos4.12.el8.src",
"8Base-RHOSE-4.12:conmon-2:2.1.2-4.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-4.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-4.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-4.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-4.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-4.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-4.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-4.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-4.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:containernetworking-plugins-0:1.0.1-7.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:containernetworking-plugins-0:1.0.1-7.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:containernetworking-plugins-0:1.0.1-7.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:containernetworking-plugins-0:1.0.1-7.rhaos4.12.el8.src",
"8Base-RHOSE-4.12:containernetworking-plugins-0:1.0.1-7.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:containernetworking-plugins-debuginfo-0:1.0.1-7.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:containernetworking-plugins-debuginfo-0:1.0.1-7.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:containernetworking-plugins-debuginfo-0:1.0.1-7.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:containernetworking-plugins-debuginfo-0:1.0.1-7.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:containernetworking-plugins-debugsource-0:1.0.1-7.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:containernetworking-plugins-debugsource-0:1.0.1-7.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:containernetworking-plugins-debugsource-0:1.0.1-7.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:containernetworking-plugins-debugsource-0:1.0.1-7.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:kernel-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-0:4.18.0-372.59.1.el8_6.src",
"8Base-RHOSE-4.12:kernel-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-core-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-core-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-core-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-core-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-cross-headers-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-cross-headers-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-cross-headers-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-cross-headers-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-debug-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-debug-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-debug-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-debug-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-debug-core-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-debug-core-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-debug-core-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-debug-core-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-debug-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-debug-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-debug-debuginfo-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-debug-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-debug-devel-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-debug-devel-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-debug-devel-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-debug-devel-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-debug-modules-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-debug-modules-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-debug-modules-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-debug-modules-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-debug-modules-extra-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-debug-modules-extra-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-debug-modules-extra-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-debug-modules-extra-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-debug-modules-internal-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-debug-modules-internal-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-debug-modules-internal-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-debug-modules-internal-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-debuginfo-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-debuginfo-common-aarch64-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-debuginfo-common-ppc64le-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-debuginfo-common-s390x-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-debuginfo-common-x86_64-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-devel-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-devel-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-devel-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-devel-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-doc-0:4.18.0-372.59.1.el8_6.noarch",
"8Base-RHOSE-4.12:kernel-headers-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-headers-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-headers-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-headers-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-ipaclones-internal-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-ipaclones-internal-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-modules-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-modules-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-modules-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-modules-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-modules-extra-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-modules-extra-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-modules-extra-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-modules-extra-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-modules-internal-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-modules-internal-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-modules-internal-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-modules-internal-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-0:4.18.0-372.59.1.rt7.217.el8_6.src",
"8Base-RHOSE-4.12:kernel-rt-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-core-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debug-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debug-core-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debug-debuginfo-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debug-devel-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debug-kvm-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debug-modules-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debug-modules-extra-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debug-modules-internal-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debuginfo-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-devel-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-kvm-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-modules-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-modules-extra-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-modules-internal-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-selftests-internal-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-selftests-internal-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-selftests-internal-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-selftests-internal-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-selftests-internal-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-tools-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-tools-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-tools-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-tools-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-tools-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-tools-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-tools-debuginfo-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-tools-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-tools-libs-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-tools-libs-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-tools-libs-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-tools-libs-devel-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-tools-libs-devel-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-tools-libs-devel-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-zfcpdump-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-zfcpdump-core-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-zfcpdump-debuginfo-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-zfcpdump-devel-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-zfcpdump-modules-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-zfcpdump-modules-extra-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-zfcpdump-modules-internal-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:openshift-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el8.src",
"8Base-RHOSE-4.12:openshift-ansible-0:4.12.0-202306090942.p0.g74dc7b3.assembly.stream.el8.noarch",
"8Base-RHOSE-4.12:openshift-ansible-0:4.12.0-202306090942.p0.g74dc7b3.assembly.stream.el8.src",
"8Base-RHOSE-4.12:openshift-ansible-test-0:4.12.0-202306090942.p0.g74dc7b3.assembly.stream.el8.noarch",
"8Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.aarch64",
"8Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.ppc64le",
"8Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.s390x",
"8Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.src",
"8Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.x86_64",
"8Base-RHOSE-4.12:openshift-clients-redistributable-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.x86_64",
"8Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el8.aarch64",
"8Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el8.ppc64le",
"8Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el8.s390x",
"8Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el8.x86_64",
"8Base-RHOSE-4.12:openshift-kuryr-0:4.12.0-202306140156.p0.g31dd228.assembly.stream.el8.src",
"8Base-RHOSE-4.12:openshift-kuryr-cni-0:4.12.0-202306140156.p0.g31dd228.assembly.stream.el8.noarch",
"8Base-RHOSE-4.12:openshift-kuryr-common-0:4.12.0-202306140156.p0.g31dd228.assembly.stream.el8.noarch",
"8Base-RHOSE-4.12:openshift-kuryr-controller-0:4.12.0-202306140156.p0.g31dd228.assembly.stream.el8.noarch",
"8Base-RHOSE-4.12:openshift4-aws-iso-0:4.12.0-202306090942.p0.gd2acdd5.assembly.stream.el8.noarch",
"8Base-RHOSE-4.12:openshift4-aws-iso-0:4.12.0-202306090942.p0.gd2acdd5.assembly.stream.el8.src",
"8Base-RHOSE-4.12:perf-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:perf-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:perf-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:perf-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:perf-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:perf-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:perf-debuginfo-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:perf-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:podman-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-3:4.2.0-6.1.rhaos4.12.el8.src",
"8Base-RHOSE-4.12:podman-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-catatonit-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-catatonit-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-catatonit-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-catatonit-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-debugsource-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-debugsource-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-debugsource-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-debugsource-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-docker-3:4.2.0-6.1.rhaos4.12.el8.noarch",
"8Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-plugins-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-plugins-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-plugins-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-plugins-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-remote-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-remote-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-remote-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-remote-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-tests-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-tests-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-tests-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-tests-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:python3-kuryr-kubernetes-0:4.12.0-202306140156.p0.g31dd228.assembly.stream.el8.noarch",
"8Base-RHOSE-4.12:python3-perf-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:python3-perf-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:python3-perf-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:python3-perf-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:python3-perf-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:python3-perf-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:python3-perf-debuginfo-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:python3-perf-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:runc-3:1.1.6-4.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:runc-3:1.1.6-4.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:runc-3:1.1.6-4.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:runc-3:1.1.6-4.rhaos4.12.el8.src",
"8Base-RHOSE-4.12:runc-3:1.1.6-4.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:runc-debuginfo-3:1.1.6-4.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:runc-debuginfo-3:1.1.6-4.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:runc-debuginfo-3:1.1.6-4.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:runc-debuginfo-3:1.1.6-4.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:runc-debugsource-3:1.1.6-4.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:runc-debugsource-3:1.1.6-4.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:runc-debugsource-3:1.1.6-4.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:runc-debugsource-3:1.1.6-4.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:skopeo-2:1.9.4-3.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:skopeo-2:1.9.4-3.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:skopeo-2:1.9.4-3.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:skopeo-2:1.9.4-3.1.rhaos4.12.el8.src",
"8Base-RHOSE-4.12:skopeo-2:1.9.4-3.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.1.rhaos4.12.el8.x86_64",
"9Base-RHOSE-4.12:buildah-1:1.23.4-5.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:buildah-1:1.23.4-5.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:buildah-1:1.23.4-5.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:buildah-1:1.23.4-5.rhaos4.12.el9.src",
"9Base-RHOSE-4.12:buildah-1:1.23.4-5.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:conmon-2:2.1.2-5.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:conmon-2:2.1.2-5.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:conmon-2:2.1.2-5.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:conmon-2:2.1.2-5.rhaos4.12.el9.src",
"9Base-RHOSE-4.12:conmon-2:2.1.2-5.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-5.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-5.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-5.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-5.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-5.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-5.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-5.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-5.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:openshift-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el9.src",
"9Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.aarch64",
"9Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.ppc64le",
"9Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.s390x",
"9Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.src",
"9Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.x86_64",
"9Base-RHOSE-4.12:openshift-clients-redistributable-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.x86_64",
"9Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el9.aarch64",
"9Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el9.ppc64le",
"9Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el9.s390x",
"9Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el9.x86_64",
"9Base-RHOSE-4.12:podman-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-3:4.2.0-7.rhaos4.12.el9.src",
"9Base-RHOSE-4.12:podman-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-catatonit-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-catatonit-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-catatonit-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-catatonit-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-debugsource-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-debugsource-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-debugsource-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-debugsource-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-docker-3:4.2.0-7.rhaos4.12.el9.noarch",
"9Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-plugins-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-plugins-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-plugins-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-plugins-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-remote-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-remote-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-remote-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-remote-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-tests-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-tests-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-tests-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-tests-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:skopeo-2:1.9.4-3.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:skopeo-2:1.9.4-3.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:skopeo-2:1.9.4-3.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:skopeo-2:1.9.4-3.rhaos4.12.el9.src",
"9Base-RHOSE-4.12:skopeo-2:1.9.4-3.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.rhaos4.12.el9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "golang: archive/tar: github.com/vbatts/tar-split: unbounded memory consumption when reading headers"
},
{
"acknowledgments": [
{
"names": [
"Daniel Abeles"
],
"organization": "Head of Research, Oxeye"
},
{
"names": [
"Gal Goldstein"
],
"organization": "Security Researcher, Oxeye"
}
],
"cve": "CVE-2022-2880",
"cwe": {
"id": "CWE-444",
"name": "Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027)"
},
"discovery_date": "2022-10-07T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-RHOSE-4.12:bpftool-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:bpftool-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:bpftool-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:bpftool-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:bpftool-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:bpftool-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:bpftool-debuginfo-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:bpftool-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:buildah-1:1.23.4-5.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:buildah-1:1.23.4-5.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:buildah-1:1.23.4-5.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:buildah-1:1.23.4-5.1.rhaos4.12.el8.src",
"8Base-RHOSE-4.12:buildah-1:1.23.4-5.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:containernetworking-plugins-0:1.0.1-7.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:containernetworking-plugins-0:1.0.1-7.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:containernetworking-plugins-0:1.0.1-7.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:containernetworking-plugins-0:1.0.1-7.rhaos4.12.el8.src",
"8Base-RHOSE-4.12:containernetworking-plugins-0:1.0.1-7.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:containernetworking-plugins-debuginfo-0:1.0.1-7.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:containernetworking-plugins-debuginfo-0:1.0.1-7.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:containernetworking-plugins-debuginfo-0:1.0.1-7.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:containernetworking-plugins-debuginfo-0:1.0.1-7.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:containernetworking-plugins-debugsource-0:1.0.1-7.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:containernetworking-plugins-debugsource-0:1.0.1-7.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:containernetworking-plugins-debugsource-0:1.0.1-7.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:containernetworking-plugins-debugsource-0:1.0.1-7.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:kernel-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-0:4.18.0-372.59.1.el8_6.src",
"8Base-RHOSE-4.12:kernel-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-core-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-core-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-core-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-core-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-cross-headers-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-cross-headers-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-cross-headers-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-cross-headers-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-debug-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-debug-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-debug-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-debug-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-debug-core-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-debug-core-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-debug-core-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-debug-core-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-debug-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-debug-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-debug-debuginfo-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-debug-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-debug-devel-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-debug-devel-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-debug-devel-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-debug-devel-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-debug-modules-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-debug-modules-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-debug-modules-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-debug-modules-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-debug-modules-extra-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-debug-modules-extra-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-debug-modules-extra-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-debug-modules-extra-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-debug-modules-internal-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-debug-modules-internal-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-debug-modules-internal-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-debug-modules-internal-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-debuginfo-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-debuginfo-common-aarch64-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-debuginfo-common-ppc64le-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-debuginfo-common-s390x-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-debuginfo-common-x86_64-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-devel-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-devel-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-devel-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-devel-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-doc-0:4.18.0-372.59.1.el8_6.noarch",
"8Base-RHOSE-4.12:kernel-headers-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-headers-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-headers-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-headers-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-ipaclones-internal-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-ipaclones-internal-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-modules-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-modules-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-modules-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-modules-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-modules-extra-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-modules-extra-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-modules-extra-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-modules-extra-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-modules-internal-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-modules-internal-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-modules-internal-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-modules-internal-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-0:4.18.0-372.59.1.rt7.217.el8_6.src",
"8Base-RHOSE-4.12:kernel-rt-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-core-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debug-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debug-core-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debug-debuginfo-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debug-devel-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debug-kvm-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debug-modules-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debug-modules-extra-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debug-modules-internal-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debuginfo-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-devel-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-kvm-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-modules-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-modules-extra-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-modules-internal-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-selftests-internal-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-selftests-internal-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-selftests-internal-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-selftests-internal-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-selftests-internal-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-tools-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-tools-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-tools-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-tools-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-tools-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-tools-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-tools-debuginfo-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-tools-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-tools-libs-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-tools-libs-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-tools-libs-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-tools-libs-devel-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-tools-libs-devel-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-tools-libs-devel-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-zfcpdump-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-zfcpdump-core-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-zfcpdump-debuginfo-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-zfcpdump-devel-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-zfcpdump-modules-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-zfcpdump-modules-extra-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-zfcpdump-modules-internal-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:openshift-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el8.src",
"8Base-RHOSE-4.12:openshift-ansible-0:4.12.0-202306090942.p0.g74dc7b3.assembly.stream.el8.noarch",
"8Base-RHOSE-4.12:openshift-ansible-0:4.12.0-202306090942.p0.g74dc7b3.assembly.stream.el8.src",
"8Base-RHOSE-4.12:openshift-ansible-test-0:4.12.0-202306090942.p0.g74dc7b3.assembly.stream.el8.noarch",
"8Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.aarch64",
"8Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.ppc64le",
"8Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.s390x",
"8Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.src",
"8Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.x86_64",
"8Base-RHOSE-4.12:openshift-clients-redistributable-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.x86_64",
"8Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el8.aarch64",
"8Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el8.ppc64le",
"8Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el8.s390x",
"8Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el8.x86_64",
"8Base-RHOSE-4.12:openshift-kuryr-0:4.12.0-202306140156.p0.g31dd228.assembly.stream.el8.src",
"8Base-RHOSE-4.12:openshift-kuryr-cni-0:4.12.0-202306140156.p0.g31dd228.assembly.stream.el8.noarch",
"8Base-RHOSE-4.12:openshift-kuryr-common-0:4.12.0-202306140156.p0.g31dd228.assembly.stream.el8.noarch",
"8Base-RHOSE-4.12:openshift-kuryr-controller-0:4.12.0-202306140156.p0.g31dd228.assembly.stream.el8.noarch",
"8Base-RHOSE-4.12:openshift4-aws-iso-0:4.12.0-202306090942.p0.gd2acdd5.assembly.stream.el8.noarch",
"8Base-RHOSE-4.12:openshift4-aws-iso-0:4.12.0-202306090942.p0.gd2acdd5.assembly.stream.el8.src",
"8Base-RHOSE-4.12:perf-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:perf-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:perf-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:perf-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:perf-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:perf-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:perf-debuginfo-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:perf-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:python3-kuryr-kubernetes-0:4.12.0-202306140156.p0.g31dd228.assembly.stream.el8.noarch",
"8Base-RHOSE-4.12:python3-perf-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:python3-perf-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:python3-perf-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:python3-perf-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:python3-perf-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:python3-perf-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:python3-perf-debuginfo-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:python3-perf-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:runc-3:1.1.6-4.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:runc-3:1.1.6-4.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:runc-3:1.1.6-4.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:runc-3:1.1.6-4.rhaos4.12.el8.src",
"8Base-RHOSE-4.12:runc-3:1.1.6-4.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:runc-debuginfo-3:1.1.6-4.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:runc-debuginfo-3:1.1.6-4.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:runc-debuginfo-3:1.1.6-4.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:runc-debuginfo-3:1.1.6-4.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:runc-debugsource-3:1.1.6-4.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:runc-debugsource-3:1.1.6-4.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:runc-debugsource-3:1.1.6-4.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:runc-debugsource-3:1.1.6-4.rhaos4.12.el8.x86_64",
"9Base-RHOSE-4.12:buildah-1:1.23.4-5.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:buildah-1:1.23.4-5.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:buildah-1:1.23.4-5.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:buildah-1:1.23.4-5.rhaos4.12.el9.src",
"9Base-RHOSE-4.12:buildah-1:1.23.4-5.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:openshift-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el9.src",
"9Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.aarch64",
"9Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.ppc64le",
"9Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.s390x",
"9Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.src",
"9Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.x86_64",
"9Base-RHOSE-4.12:openshift-clients-redistributable-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.x86_64",
"9Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el9.aarch64",
"9Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el9.ppc64le",
"9Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el9.s390x",
"9Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el9.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2132868"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the golang package, where requests forwarded by reverse proxy include the raw query parameters from the inbound request, including unparseable parameters rejected by net/http. This issue could permit query parameter smuggling when a Go proxy forwards a parameter with an unparseable value. After the fix, the reverse proxy sanitizes the query parameters in the forwarded query when the outbound request\u0027s form field is set after the reverse proxy. The director function returns, indicating that the proxy has parsed the query parameters. Proxies that do not parse query parameters continue to forward the original query parameters unchanged.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: net/http/httputil: ReverseProxy should not forward unparseable query parameters",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The opportunity to exploit this vulnerability is limited to the Golang runtime. In the case of the OpenShift Container Platform, this would be restricted within each individual container. There are multiple layers of guide rails (Golang\u2019s Garbage Collector; OpenShift\u2019s resource constraints imposed at the container and cluster levels) which would require a malicious user to continue submitting attacks for there to be any enduring impact.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-RHOSE-4.12:conmon-2:2.1.2-4.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:conmon-2:2.1.2-4.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:conmon-2:2.1.2-4.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:conmon-2:2.1.2-4.rhaos4.12.el8.src",
"8Base-RHOSE-4.12:conmon-2:2.1.2-4.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-4.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-4.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-4.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-4.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-4.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-4.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-4.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-4.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-3:4.2.0-6.1.rhaos4.12.el8.src",
"8Base-RHOSE-4.12:podman-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-catatonit-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-catatonit-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-catatonit-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-catatonit-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-debugsource-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-debugsource-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-debugsource-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-debugsource-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-docker-3:4.2.0-6.1.rhaos4.12.el8.noarch",
"8Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-plugins-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-plugins-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-plugins-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-plugins-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-remote-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-remote-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-remote-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-remote-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-tests-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-tests-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-tests-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-tests-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:skopeo-2:1.9.4-3.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:skopeo-2:1.9.4-3.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:skopeo-2:1.9.4-3.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:skopeo-2:1.9.4-3.1.rhaos4.12.el8.src",
"8Base-RHOSE-4.12:skopeo-2:1.9.4-3.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.1.rhaos4.12.el8.x86_64",
"9Base-RHOSE-4.12:conmon-2:2.1.2-5.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:conmon-2:2.1.2-5.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:conmon-2:2.1.2-5.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:conmon-2:2.1.2-5.rhaos4.12.el9.src",
"9Base-RHOSE-4.12:conmon-2:2.1.2-5.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-5.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-5.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-5.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-5.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-5.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-5.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-5.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-5.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-3:4.2.0-7.rhaos4.12.el9.src",
"9Base-RHOSE-4.12:podman-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-catatonit-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-catatonit-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-catatonit-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-catatonit-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-debugsource-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-debugsource-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-debugsource-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-debugsource-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-docker-3:4.2.0-7.rhaos4.12.el9.noarch",
"9Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-plugins-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-plugins-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-plugins-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-plugins-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-remote-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-remote-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-remote-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-remote-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-tests-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-tests-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-tests-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-tests-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:skopeo-2:1.9.4-3.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:skopeo-2:1.9.4-3.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:skopeo-2:1.9.4-3.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:skopeo-2:1.9.4-3.rhaos4.12.el9.src",
"9Base-RHOSE-4.12:skopeo-2:1.9.4-3.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.rhaos4.12.el9.x86_64"
],
"known_not_affected": [
"8Base-RHOSE-4.12:bpftool-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:bpftool-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:bpftool-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:bpftool-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:bpftool-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:bpftool-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:bpftool-debuginfo-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:bpftool-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:buildah-1:1.23.4-5.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:buildah-1:1.23.4-5.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:buildah-1:1.23.4-5.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:buildah-1:1.23.4-5.1.rhaos4.12.el8.src",
"8Base-RHOSE-4.12:buildah-1:1.23.4-5.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:containernetworking-plugins-0:1.0.1-7.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:containernetworking-plugins-0:1.0.1-7.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:containernetworking-plugins-0:1.0.1-7.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:containernetworking-plugins-0:1.0.1-7.rhaos4.12.el8.src",
"8Base-RHOSE-4.12:containernetworking-plugins-0:1.0.1-7.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:containernetworking-plugins-debuginfo-0:1.0.1-7.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:containernetworking-plugins-debuginfo-0:1.0.1-7.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:containernetworking-plugins-debuginfo-0:1.0.1-7.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:containernetworking-plugins-debuginfo-0:1.0.1-7.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:containernetworking-plugins-debugsource-0:1.0.1-7.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:containernetworking-plugins-debugsource-0:1.0.1-7.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:containernetworking-plugins-debugsource-0:1.0.1-7.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:containernetworking-plugins-debugsource-0:1.0.1-7.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:kernel-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-0:4.18.0-372.59.1.el8_6.src",
"8Base-RHOSE-4.12:kernel-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-core-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-core-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-core-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-core-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-cross-headers-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-cross-headers-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-cross-headers-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-cross-headers-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-debug-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-debug-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-debug-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-debug-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-debug-core-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-debug-core-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-debug-core-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-debug-core-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-debug-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-debug-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-debug-debuginfo-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-debug-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-debug-devel-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-debug-devel-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-debug-devel-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-debug-devel-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-debug-modules-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-debug-modules-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-debug-modules-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-debug-modules-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-debug-modules-extra-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-debug-modules-extra-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-debug-modules-extra-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-debug-modules-extra-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-debug-modules-internal-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-debug-modules-internal-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-debug-modules-internal-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-debug-modules-internal-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-debuginfo-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-debuginfo-common-aarch64-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-debuginfo-common-ppc64le-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-debuginfo-common-s390x-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-debuginfo-common-x86_64-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-devel-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-devel-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-devel-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-devel-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-doc-0:4.18.0-372.59.1.el8_6.noarch",
"8Base-RHOSE-4.12:kernel-headers-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-headers-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-headers-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-headers-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-ipaclones-internal-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-ipaclones-internal-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-modules-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-modules-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-modules-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-modules-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-modules-extra-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-modules-extra-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-modules-extra-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-modules-extra-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-modules-internal-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-modules-internal-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-modules-internal-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-modules-internal-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-0:4.18.0-372.59.1.rt7.217.el8_6.src",
"8Base-RHOSE-4.12:kernel-rt-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-core-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debug-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debug-core-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debug-debuginfo-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debug-devel-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debug-kvm-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debug-modules-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debug-modules-extra-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debug-modules-internal-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debuginfo-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-devel-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-kvm-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-modules-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-modules-extra-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-modules-internal-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-selftests-internal-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-selftests-internal-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-selftests-internal-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-selftests-internal-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-selftests-internal-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-tools-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-tools-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-tools-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-tools-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-tools-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-tools-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-tools-debuginfo-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-tools-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-tools-libs-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-tools-libs-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-tools-libs-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-tools-libs-devel-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-tools-libs-devel-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-tools-libs-devel-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-zfcpdump-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-zfcpdump-core-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-zfcpdump-debuginfo-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-zfcpdump-devel-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-zfcpdump-modules-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-zfcpdump-modules-extra-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-zfcpdump-modules-internal-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:openshift-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el8.src",
"8Base-RHOSE-4.12:openshift-ansible-0:4.12.0-202306090942.p0.g74dc7b3.assembly.stream.el8.noarch",
"8Base-RHOSE-4.12:openshift-ansible-0:4.12.0-202306090942.p0.g74dc7b3.assembly.stream.el8.src",
"8Base-RHOSE-4.12:openshift-ansible-test-0:4.12.0-202306090942.p0.g74dc7b3.assembly.stream.el8.noarch",
"8Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.aarch64",
"8Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.ppc64le",
"8Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.s390x",
"8Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.src",
"8Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.x86_64",
"8Base-RHOSE-4.12:openshift-clients-redistributable-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.x86_64",
"8Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el8.aarch64",
"8Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el8.ppc64le",
"8Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el8.s390x",
"8Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el8.x86_64",
"8Base-RHOSE-4.12:openshift-kuryr-0:4.12.0-202306140156.p0.g31dd228.assembly.stream.el8.src",
"8Base-RHOSE-4.12:openshift-kuryr-cni-0:4.12.0-202306140156.p0.g31dd228.assembly.stream.el8.noarch",
"8Base-RHOSE-4.12:openshift-kuryr-common-0:4.12.0-202306140156.p0.g31dd228.assembly.stream.el8.noarch",
"8Base-RHOSE-4.12:openshift-kuryr-controller-0:4.12.0-202306140156.p0.g31dd228.assembly.stream.el8.noarch",
"8Base-RHOSE-4.12:openshift4-aws-iso-0:4.12.0-202306090942.p0.gd2acdd5.assembly.stream.el8.noarch",
"8Base-RHOSE-4.12:openshift4-aws-iso-0:4.12.0-202306090942.p0.gd2acdd5.assembly.stream.el8.src",
"8Base-RHOSE-4.12:perf-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:perf-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:perf-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:perf-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:perf-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:perf-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:perf-debuginfo-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:perf-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:python3-kuryr-kubernetes-0:4.12.0-202306140156.p0.g31dd228.assembly.stream.el8.noarch",
"8Base-RHOSE-4.12:python3-perf-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:python3-perf-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:python3-perf-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:python3-perf-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:python3-perf-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:python3-perf-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:python3-perf-debuginfo-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:python3-perf-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:runc-3:1.1.6-4.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:runc-3:1.1.6-4.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:runc-3:1.1.6-4.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:runc-3:1.1.6-4.rhaos4.12.el8.src",
"8Base-RHOSE-4.12:runc-3:1.1.6-4.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:runc-debuginfo-3:1.1.6-4.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:runc-debuginfo-3:1.1.6-4.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:runc-debuginfo-3:1.1.6-4.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:runc-debuginfo-3:1.1.6-4.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:runc-debugsource-3:1.1.6-4.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:runc-debugsource-3:1.1.6-4.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:runc-debugsource-3:1.1.6-4.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:runc-debugsource-3:1.1.6-4.rhaos4.12.el8.x86_64",
"9Base-RHOSE-4.12:buildah-1:1.23.4-5.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:buildah-1:1.23.4-5.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:buildah-1:1.23.4-5.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:buildah-1:1.23.4-5.rhaos4.12.el9.src",
"9Base-RHOSE-4.12:buildah-1:1.23.4-5.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:openshift-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el9.src",
"9Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.aarch64",
"9Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.ppc64le",
"9Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.s390x",
"9Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.src",
"9Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.x86_64",
"9Base-RHOSE-4.12:openshift-clients-redistributable-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.x86_64",
"9Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el9.aarch64",
"9Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el9.ppc64le",
"9Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el9.s390x",
"9Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-2880"
},
{
"category": "external",
"summary": "RHBZ#2132868",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2132868"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-2880",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2880"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-2880",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-2880"
},
{
"category": "external",
"summary": "https://github.com/golang/go/issues/54663",
"url": "https://github.com/golang/go/issues/54663"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/xtuG5faxtaU?pli=1",
"url": "https://groups.google.com/g/golang-announce/c/xtuG5faxtaU?pli=1"
}
],
"release_date": "2022-10-04T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-06-26T01:19:15+00:00",
"details": "For OpenShift Container Platform 4.12 see the following documentation, which will be updated shortly for this release, for important instructions on how to upgrade your cluster and fully apply this asynchronous errata update:\n\nhttps://docs.openshift.com/container-platform/4.12/release_notes/ocp-4-12-release-notes.html",
"product_ids": [
"8Base-RHOSE-4.12:conmon-2:2.1.2-4.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:conmon-2:2.1.2-4.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:conmon-2:2.1.2-4.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:conmon-2:2.1.2-4.rhaos4.12.el8.src",
"8Base-RHOSE-4.12:conmon-2:2.1.2-4.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-4.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-4.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-4.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-4.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-4.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-4.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-4.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-4.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-3:4.2.0-6.1.rhaos4.12.el8.src",
"8Base-RHOSE-4.12:podman-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-catatonit-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-catatonit-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-catatonit-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-catatonit-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-debugsource-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-debugsource-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-debugsource-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-debugsource-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-docker-3:4.2.0-6.1.rhaos4.12.el8.noarch",
"8Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-plugins-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-plugins-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-plugins-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-plugins-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-remote-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-remote-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-remote-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-remote-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-tests-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-tests-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-tests-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-tests-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:skopeo-2:1.9.4-3.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:skopeo-2:1.9.4-3.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:skopeo-2:1.9.4-3.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:skopeo-2:1.9.4-3.1.rhaos4.12.el8.src",
"8Base-RHOSE-4.12:skopeo-2:1.9.4-3.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.1.rhaos4.12.el8.x86_64",
"9Base-RHOSE-4.12:conmon-2:2.1.2-5.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:conmon-2:2.1.2-5.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:conmon-2:2.1.2-5.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:conmon-2:2.1.2-5.rhaos4.12.el9.src",
"9Base-RHOSE-4.12:conmon-2:2.1.2-5.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-5.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-5.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-5.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-5.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-5.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-5.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-5.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-5.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-3:4.2.0-7.rhaos4.12.el9.src",
"9Base-RHOSE-4.12:podman-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-catatonit-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-catatonit-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-catatonit-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-catatonit-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-debugsource-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-debugsource-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-debugsource-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-debugsource-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-docker-3:4.2.0-7.rhaos4.12.el9.noarch",
"9Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-plugins-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-plugins-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-plugins-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-plugins-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-remote-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-remote-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-remote-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-remote-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-tests-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-tests-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-tests-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-tests-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:skopeo-2:1.9.4-3.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:skopeo-2:1.9.4-3.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:skopeo-2:1.9.4-3.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:skopeo-2:1.9.4-3.rhaos4.12.el9.src",
"9Base-RHOSE-4.12:skopeo-2:1.9.4-3.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.rhaos4.12.el9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:3613"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"8Base-RHOSE-4.12:bpftool-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:bpftool-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:bpftool-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:bpftool-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:bpftool-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:bpftool-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:bpftool-debuginfo-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:bpftool-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:buildah-1:1.23.4-5.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:buildah-1:1.23.4-5.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:buildah-1:1.23.4-5.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:buildah-1:1.23.4-5.1.rhaos4.12.el8.src",
"8Base-RHOSE-4.12:buildah-1:1.23.4-5.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:conmon-2:2.1.2-4.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:conmon-2:2.1.2-4.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:conmon-2:2.1.2-4.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:conmon-2:2.1.2-4.rhaos4.12.el8.src",
"8Base-RHOSE-4.12:conmon-2:2.1.2-4.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-4.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-4.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-4.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-4.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-4.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-4.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-4.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-4.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:containernetworking-plugins-0:1.0.1-7.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:containernetworking-plugins-0:1.0.1-7.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:containernetworking-plugins-0:1.0.1-7.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:containernetworking-plugins-0:1.0.1-7.rhaos4.12.el8.src",
"8Base-RHOSE-4.12:containernetworking-plugins-0:1.0.1-7.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:containernetworking-plugins-debuginfo-0:1.0.1-7.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:containernetworking-plugins-debuginfo-0:1.0.1-7.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:containernetworking-plugins-debuginfo-0:1.0.1-7.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:containernetworking-plugins-debuginfo-0:1.0.1-7.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:containernetworking-plugins-debugsource-0:1.0.1-7.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:containernetworking-plugins-debugsource-0:1.0.1-7.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:containernetworking-plugins-debugsource-0:1.0.1-7.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:containernetworking-plugins-debugsource-0:1.0.1-7.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:kernel-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-0:4.18.0-372.59.1.el8_6.src",
"8Base-RHOSE-4.12:kernel-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-core-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-core-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-core-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-core-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-cross-headers-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-cross-headers-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-cross-headers-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-cross-headers-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-debug-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-debug-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-debug-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-debug-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-debug-core-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-debug-core-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-debug-core-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-debug-core-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-debug-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-debug-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-debug-debuginfo-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-debug-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-debug-devel-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-debug-devel-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-debug-devel-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-debug-devel-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-debug-modules-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-debug-modules-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-debug-modules-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-debug-modules-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-debug-modules-extra-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-debug-modules-extra-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-debug-modules-extra-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-debug-modules-extra-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-debug-modules-internal-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-debug-modules-internal-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-debug-modules-internal-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-debug-modules-internal-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-debuginfo-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-debuginfo-common-aarch64-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-debuginfo-common-ppc64le-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-debuginfo-common-s390x-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-debuginfo-common-x86_64-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-devel-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-devel-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-devel-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-devel-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-doc-0:4.18.0-372.59.1.el8_6.noarch",
"8Base-RHOSE-4.12:kernel-headers-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-headers-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-headers-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-headers-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-ipaclones-internal-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-ipaclones-internal-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-modules-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-modules-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-modules-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-modules-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-modules-extra-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-modules-extra-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-modules-extra-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-modules-extra-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-modules-internal-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-modules-internal-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-modules-internal-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-modules-internal-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-0:4.18.0-372.59.1.rt7.217.el8_6.src",
"8Base-RHOSE-4.12:kernel-rt-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-core-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debug-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debug-core-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debug-debuginfo-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debug-devel-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debug-kvm-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debug-modules-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debug-modules-extra-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debug-modules-internal-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debuginfo-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-devel-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-kvm-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-modules-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-modules-extra-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-modules-internal-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-selftests-internal-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-selftests-internal-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-selftests-internal-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-selftests-internal-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-selftests-internal-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-tools-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-tools-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-tools-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-tools-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-tools-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-tools-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-tools-debuginfo-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-tools-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-tools-libs-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-tools-libs-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-tools-libs-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-tools-libs-devel-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-tools-libs-devel-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-tools-libs-devel-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-zfcpdump-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-zfcpdump-core-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-zfcpdump-debuginfo-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-zfcpdump-devel-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-zfcpdump-modules-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-zfcpdump-modules-extra-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-zfcpdump-modules-internal-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:openshift-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el8.src",
"8Base-RHOSE-4.12:openshift-ansible-0:4.12.0-202306090942.p0.g74dc7b3.assembly.stream.el8.noarch",
"8Base-RHOSE-4.12:openshift-ansible-0:4.12.0-202306090942.p0.g74dc7b3.assembly.stream.el8.src",
"8Base-RHOSE-4.12:openshift-ansible-test-0:4.12.0-202306090942.p0.g74dc7b3.assembly.stream.el8.noarch",
"8Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.aarch64",
"8Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.ppc64le",
"8Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.s390x",
"8Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.src",
"8Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.x86_64",
"8Base-RHOSE-4.12:openshift-clients-redistributable-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.x86_64",
"8Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el8.aarch64",
"8Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el8.ppc64le",
"8Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el8.s390x",
"8Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el8.x86_64",
"8Base-RHOSE-4.12:openshift-kuryr-0:4.12.0-202306140156.p0.g31dd228.assembly.stream.el8.src",
"8Base-RHOSE-4.12:openshift-kuryr-cni-0:4.12.0-202306140156.p0.g31dd228.assembly.stream.el8.noarch",
"8Base-RHOSE-4.12:openshift-kuryr-common-0:4.12.0-202306140156.p0.g31dd228.assembly.stream.el8.noarch",
"8Base-RHOSE-4.12:openshift-kuryr-controller-0:4.12.0-202306140156.p0.g31dd228.assembly.stream.el8.noarch",
"8Base-RHOSE-4.12:openshift4-aws-iso-0:4.12.0-202306090942.p0.gd2acdd5.assembly.stream.el8.noarch",
"8Base-RHOSE-4.12:openshift4-aws-iso-0:4.12.0-202306090942.p0.gd2acdd5.assembly.stream.el8.src",
"8Base-RHOSE-4.12:perf-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:perf-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:perf-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:perf-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:perf-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:perf-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:perf-debuginfo-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:perf-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:podman-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-3:4.2.0-6.1.rhaos4.12.el8.src",
"8Base-RHOSE-4.12:podman-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-catatonit-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-catatonit-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-catatonit-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-catatonit-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-debugsource-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-debugsource-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-debugsource-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-debugsource-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-docker-3:4.2.0-6.1.rhaos4.12.el8.noarch",
"8Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-plugins-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-plugins-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-plugins-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-plugins-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-remote-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-remote-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-remote-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-remote-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-tests-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-tests-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-tests-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-tests-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:python3-kuryr-kubernetes-0:4.12.0-202306140156.p0.g31dd228.assembly.stream.el8.noarch",
"8Base-RHOSE-4.12:python3-perf-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:python3-perf-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:python3-perf-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:python3-perf-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:python3-perf-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:python3-perf-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:python3-perf-debuginfo-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:python3-perf-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:runc-3:1.1.6-4.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:runc-3:1.1.6-4.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:runc-3:1.1.6-4.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:runc-3:1.1.6-4.rhaos4.12.el8.src",
"8Base-RHOSE-4.12:runc-3:1.1.6-4.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:runc-debuginfo-3:1.1.6-4.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:runc-debuginfo-3:1.1.6-4.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:runc-debuginfo-3:1.1.6-4.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:runc-debuginfo-3:1.1.6-4.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:runc-debugsource-3:1.1.6-4.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:runc-debugsource-3:1.1.6-4.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:runc-debugsource-3:1.1.6-4.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:runc-debugsource-3:1.1.6-4.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:skopeo-2:1.9.4-3.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:skopeo-2:1.9.4-3.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:skopeo-2:1.9.4-3.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:skopeo-2:1.9.4-3.1.rhaos4.12.el8.src",
"8Base-RHOSE-4.12:skopeo-2:1.9.4-3.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.1.rhaos4.12.el8.x86_64",
"9Base-RHOSE-4.12:buildah-1:1.23.4-5.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:buildah-1:1.23.4-5.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:buildah-1:1.23.4-5.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:buildah-1:1.23.4-5.rhaos4.12.el9.src",
"9Base-RHOSE-4.12:buildah-1:1.23.4-5.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:conmon-2:2.1.2-5.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:conmon-2:2.1.2-5.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:conmon-2:2.1.2-5.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:conmon-2:2.1.2-5.rhaos4.12.el9.src",
"9Base-RHOSE-4.12:conmon-2:2.1.2-5.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-5.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-5.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-5.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-5.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-5.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-5.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-5.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-5.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:openshift-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el9.src",
"9Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.aarch64",
"9Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.ppc64le",
"9Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.s390x",
"9Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.src",
"9Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.x86_64",
"9Base-RHOSE-4.12:openshift-clients-redistributable-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.x86_64",
"9Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el9.aarch64",
"9Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el9.ppc64le",
"9Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el9.s390x",
"9Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el9.x86_64",
"9Base-RHOSE-4.12:podman-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-3:4.2.0-7.rhaos4.12.el9.src",
"9Base-RHOSE-4.12:podman-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-catatonit-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-catatonit-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-catatonit-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-catatonit-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-debugsource-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-debugsource-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-debugsource-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-debugsource-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-docker-3:4.2.0-7.rhaos4.12.el9.noarch",
"9Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-plugins-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-plugins-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-plugins-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-plugins-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-remote-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-remote-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-remote-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-remote-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-tests-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-tests-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-tests-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-tests-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:skopeo-2:1.9.4-3.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:skopeo-2:1.9.4-3.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:skopeo-2:1.9.4-3.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:skopeo-2:1.9.4-3.rhaos4.12.el9.src",
"9Base-RHOSE-4.12:skopeo-2:1.9.4-3.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.rhaos4.12.el9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "golang: net/http/httputil: ReverseProxy should not forward unparseable query parameters"
},
{
"cve": "CVE-2022-27664",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"discovery_date": "2022-09-06T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-RHOSE-4.12:bpftool-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:bpftool-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:bpftool-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:bpftool-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:bpftool-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:bpftool-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:bpftool-debuginfo-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:bpftool-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:buildah-1:1.23.4-5.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:buildah-1:1.23.4-5.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:buildah-1:1.23.4-5.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:buildah-1:1.23.4-5.1.rhaos4.12.el8.src",
"8Base-RHOSE-4.12:buildah-1:1.23.4-5.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:conmon-2:2.1.2-4.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:conmon-2:2.1.2-4.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:conmon-2:2.1.2-4.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:conmon-2:2.1.2-4.rhaos4.12.el8.src",
"8Base-RHOSE-4.12:conmon-2:2.1.2-4.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-4.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-4.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-4.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-4.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-4.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-4.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-4.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-4.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:containernetworking-plugins-0:1.0.1-7.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:containernetworking-plugins-0:1.0.1-7.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:containernetworking-plugins-0:1.0.1-7.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:containernetworking-plugins-0:1.0.1-7.rhaos4.12.el8.src",
"8Base-RHOSE-4.12:containernetworking-plugins-0:1.0.1-7.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:containernetworking-plugins-debuginfo-0:1.0.1-7.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:containernetworking-plugins-debuginfo-0:1.0.1-7.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:containernetworking-plugins-debuginfo-0:1.0.1-7.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:containernetworking-plugins-debuginfo-0:1.0.1-7.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:containernetworking-plugins-debugsource-0:1.0.1-7.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:containernetworking-plugins-debugsource-0:1.0.1-7.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:containernetworking-plugins-debugsource-0:1.0.1-7.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:containernetworking-plugins-debugsource-0:1.0.1-7.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:kernel-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-0:4.18.0-372.59.1.el8_6.src",
"8Base-RHOSE-4.12:kernel-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-core-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-core-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-core-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-core-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-cross-headers-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-cross-headers-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-cross-headers-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-cross-headers-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-debug-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-debug-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-debug-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-debug-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-debug-core-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-debug-core-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-debug-core-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-debug-core-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-debug-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-debug-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-debug-debuginfo-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-debug-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-debug-devel-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-debug-devel-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-debug-devel-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-debug-devel-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-debug-modules-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-debug-modules-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-debug-modules-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-debug-modules-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-debug-modules-extra-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-debug-modules-extra-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-debug-modules-extra-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-debug-modules-extra-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-debug-modules-internal-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-debug-modules-internal-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-debug-modules-internal-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-debug-modules-internal-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-debuginfo-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-debuginfo-common-aarch64-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-debuginfo-common-ppc64le-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-debuginfo-common-s390x-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-debuginfo-common-x86_64-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-devel-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-devel-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-devel-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-devel-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-doc-0:4.18.0-372.59.1.el8_6.noarch",
"8Base-RHOSE-4.12:kernel-headers-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-headers-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-headers-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-headers-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-ipaclones-internal-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-ipaclones-internal-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-modules-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-modules-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-modules-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-modules-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-modules-extra-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-modules-extra-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-modules-extra-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-modules-extra-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-modules-internal-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-modules-internal-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-modules-internal-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-modules-internal-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-0:4.18.0-372.59.1.rt7.217.el8_6.src",
"8Base-RHOSE-4.12:kernel-rt-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-core-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debug-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debug-core-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debug-debuginfo-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debug-devel-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debug-kvm-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debug-modules-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debug-modules-extra-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debug-modules-internal-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debuginfo-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-devel-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-kvm-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-modules-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-modules-extra-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-modules-internal-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-selftests-internal-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-selftests-internal-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-selftests-internal-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-selftests-internal-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-selftests-internal-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-tools-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-tools-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-tools-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-tools-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-tools-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-tools-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-tools-debuginfo-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-tools-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-tools-libs-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-tools-libs-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-tools-libs-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-tools-libs-devel-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-tools-libs-devel-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-tools-libs-devel-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-zfcpdump-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-zfcpdump-core-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-zfcpdump-debuginfo-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-zfcpdump-devel-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-zfcpdump-modules-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-zfcpdump-modules-extra-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-zfcpdump-modules-internal-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:openshift-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el8.src",
"8Base-RHOSE-4.12:openshift-ansible-0:4.12.0-202306090942.p0.g74dc7b3.assembly.stream.el8.noarch",
"8Base-RHOSE-4.12:openshift-ansible-0:4.12.0-202306090942.p0.g74dc7b3.assembly.stream.el8.src",
"8Base-RHOSE-4.12:openshift-ansible-test-0:4.12.0-202306090942.p0.g74dc7b3.assembly.stream.el8.noarch",
"8Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.aarch64",
"8Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.ppc64le",
"8Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.s390x",
"8Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.src",
"8Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.x86_64",
"8Base-RHOSE-4.12:openshift-clients-redistributable-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.x86_64",
"8Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el8.aarch64",
"8Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el8.ppc64le",
"8Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el8.s390x",
"8Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el8.x86_64",
"8Base-RHOSE-4.12:openshift-kuryr-0:4.12.0-202306140156.p0.g31dd228.assembly.stream.el8.src",
"8Base-RHOSE-4.12:openshift-kuryr-cni-0:4.12.0-202306140156.p0.g31dd228.assembly.stream.el8.noarch",
"8Base-RHOSE-4.12:openshift-kuryr-common-0:4.12.0-202306140156.p0.g31dd228.assembly.stream.el8.noarch",
"8Base-RHOSE-4.12:openshift-kuryr-controller-0:4.12.0-202306140156.p0.g31dd228.assembly.stream.el8.noarch",
"8Base-RHOSE-4.12:openshift4-aws-iso-0:4.12.0-202306090942.p0.gd2acdd5.assembly.stream.el8.noarch",
"8Base-RHOSE-4.12:openshift4-aws-iso-0:4.12.0-202306090942.p0.gd2acdd5.assembly.stream.el8.src",
"8Base-RHOSE-4.12:perf-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:perf-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:perf-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:perf-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:perf-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:perf-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:perf-debuginfo-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:perf-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:python3-kuryr-kubernetes-0:4.12.0-202306140156.p0.g31dd228.assembly.stream.el8.noarch",
"8Base-RHOSE-4.12:python3-perf-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:python3-perf-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:python3-perf-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:python3-perf-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:python3-perf-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:python3-perf-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:python3-perf-debuginfo-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:python3-perf-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:runc-3:1.1.6-4.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:runc-3:1.1.6-4.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:runc-3:1.1.6-4.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:runc-3:1.1.6-4.rhaos4.12.el8.src",
"8Base-RHOSE-4.12:runc-3:1.1.6-4.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:runc-debuginfo-3:1.1.6-4.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:runc-debuginfo-3:1.1.6-4.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:runc-debuginfo-3:1.1.6-4.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:runc-debuginfo-3:1.1.6-4.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:runc-debugsource-3:1.1.6-4.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:runc-debugsource-3:1.1.6-4.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:runc-debugsource-3:1.1.6-4.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:runc-debugsource-3:1.1.6-4.rhaos4.12.el8.x86_64",
"9Base-RHOSE-4.12:buildah-1:1.23.4-5.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:buildah-1:1.23.4-5.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:buildah-1:1.23.4-5.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:buildah-1:1.23.4-5.rhaos4.12.el9.src",
"9Base-RHOSE-4.12:buildah-1:1.23.4-5.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:conmon-2:2.1.2-5.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:conmon-2:2.1.2-5.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:conmon-2:2.1.2-5.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:conmon-2:2.1.2-5.rhaos4.12.el9.src",
"9Base-RHOSE-4.12:conmon-2:2.1.2-5.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-5.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-5.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-5.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-5.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-5.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-5.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-5.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-5.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:openshift-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el9.src",
"9Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.aarch64",
"9Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.ppc64le",
"9Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.s390x",
"9Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.src",
"9Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.x86_64",
"9Base-RHOSE-4.12:openshift-clients-redistributable-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.x86_64",
"9Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el9.aarch64",
"9Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el9.ppc64le",
"9Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el9.s390x",
"9Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el9.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2124669"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the golang package. In net/http in Go, attackers can cause a denial of service because an HTTP/2 connection can hang during closing if a fatal error preempts the shutdown.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: net/http: handle server errors after sending GOAWAY",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The opportunity for a Denial of Service is limited to the golang runtime. In the case of OpenShift Container Platform, this would be restricted within each individual container. There are multiple layers of guide rails (Golang\u2019s Garbage Collector; OpenShift\u2019s resource constraints imposed at the container and cluster levels) which would require a malicious user to continue submitting attacks for there to be any enduring impact. They would also need access to external server resources to be able to send a massive volume of requests to cause a significant impact on server operations.\n\nWithin regulated environments, a combination of the following controls acts as a significant barrier to successfully exploiting a CWE-400: Uncontrolled Resource Consumption vulnerability and therefore downgrades the severity of this particular CVE from Moderate to Low.\n\nRed Hat restricts access to all platform information by default, granting access only after successful hard token-based multi-factor authentication (MFA) and enforcing least privilege to ensure only authorized roles can execute or modify code. The environment employs malicious code protections, including IDS/IPS and antimalware tools to detect threats and monitor resource usage, helping prevent uncontrolled consumption that could lead to system failure. Additional safeguards, such as web application firewalls and load-balancing strategies, protect against resource exhaustion and performance degradation. Event logs are centrally collected, correlated, and analyzed to support monitoring, alerting, and retention, aiding in the detection of abnormal behavior and potential denial-of-service (DoS) conditions. Static code analysis and peer reviews enforce strong input validation and error handling, reducing the likelihood of input-based DoS attacks.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-RHOSE-4.12:podman-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-3:4.2.0-6.1.rhaos4.12.el8.src",
"8Base-RHOSE-4.12:podman-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-catatonit-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-catatonit-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-catatonit-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-catatonit-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-debugsource-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-debugsource-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-debugsource-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-debugsource-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-docker-3:4.2.0-6.1.rhaos4.12.el8.noarch",
"8Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-plugins-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-plugins-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-plugins-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-plugins-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-remote-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-remote-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-remote-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-remote-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-tests-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-tests-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-tests-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-tests-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:skopeo-2:1.9.4-3.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:skopeo-2:1.9.4-3.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:skopeo-2:1.9.4-3.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:skopeo-2:1.9.4-3.1.rhaos4.12.el8.src",
"8Base-RHOSE-4.12:skopeo-2:1.9.4-3.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.1.rhaos4.12.el8.x86_64",
"9Base-RHOSE-4.12:podman-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-3:4.2.0-7.rhaos4.12.el9.src",
"9Base-RHOSE-4.12:podman-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-catatonit-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-catatonit-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-catatonit-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-catatonit-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-debugsource-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-debugsource-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-debugsource-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-debugsource-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-docker-3:4.2.0-7.rhaos4.12.el9.noarch",
"9Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-plugins-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-plugins-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-plugins-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-plugins-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-remote-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-remote-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-remote-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-remote-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-tests-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-tests-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-tests-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-tests-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:skopeo-2:1.9.4-3.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:skopeo-2:1.9.4-3.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:skopeo-2:1.9.4-3.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:skopeo-2:1.9.4-3.rhaos4.12.el9.src",
"9Base-RHOSE-4.12:skopeo-2:1.9.4-3.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.rhaos4.12.el9.x86_64"
],
"known_not_affected": [
"8Base-RHOSE-4.12:bpftool-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:bpftool-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:bpftool-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:bpftool-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:bpftool-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:bpftool-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:bpftool-debuginfo-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:bpftool-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:buildah-1:1.23.4-5.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:buildah-1:1.23.4-5.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:buildah-1:1.23.4-5.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:buildah-1:1.23.4-5.1.rhaos4.12.el8.src",
"8Base-RHOSE-4.12:buildah-1:1.23.4-5.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:conmon-2:2.1.2-4.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:conmon-2:2.1.2-4.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:conmon-2:2.1.2-4.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:conmon-2:2.1.2-4.rhaos4.12.el8.src",
"8Base-RHOSE-4.12:conmon-2:2.1.2-4.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-4.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-4.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-4.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-4.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-4.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-4.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-4.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-4.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:containernetworking-plugins-0:1.0.1-7.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:containernetworking-plugins-0:1.0.1-7.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:containernetworking-plugins-0:1.0.1-7.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:containernetworking-plugins-0:1.0.1-7.rhaos4.12.el8.src",
"8Base-RHOSE-4.12:containernetworking-plugins-0:1.0.1-7.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:containernetworking-plugins-debuginfo-0:1.0.1-7.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:containernetworking-plugins-debuginfo-0:1.0.1-7.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:containernetworking-plugins-debuginfo-0:1.0.1-7.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:containernetworking-plugins-debuginfo-0:1.0.1-7.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:containernetworking-plugins-debugsource-0:1.0.1-7.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:containernetworking-plugins-debugsource-0:1.0.1-7.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:containernetworking-plugins-debugsource-0:1.0.1-7.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:containernetworking-plugins-debugsource-0:1.0.1-7.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:kernel-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-0:4.18.0-372.59.1.el8_6.src",
"8Base-RHOSE-4.12:kernel-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-core-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-core-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-core-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-core-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-cross-headers-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-cross-headers-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-cross-headers-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-cross-headers-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-debug-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-debug-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-debug-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-debug-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-debug-core-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-debug-core-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-debug-core-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-debug-core-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-debug-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-debug-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-debug-debuginfo-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-debug-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-debug-devel-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-debug-devel-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-debug-devel-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-debug-devel-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-debug-modules-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-debug-modules-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-debug-modules-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-debug-modules-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-debug-modules-extra-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-debug-modules-extra-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-debug-modules-extra-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-debug-modules-extra-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-debug-modules-internal-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-debug-modules-internal-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-debug-modules-internal-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-debug-modules-internal-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-debuginfo-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-debuginfo-common-aarch64-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-debuginfo-common-ppc64le-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-debuginfo-common-s390x-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-debuginfo-common-x86_64-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-devel-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-devel-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-devel-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-devel-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-doc-0:4.18.0-372.59.1.el8_6.noarch",
"8Base-RHOSE-4.12:kernel-headers-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-headers-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-headers-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-headers-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-ipaclones-internal-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-ipaclones-internal-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-modules-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-modules-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-modules-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-modules-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-modules-extra-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-modules-extra-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-modules-extra-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-modules-extra-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-modules-internal-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-modules-internal-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-modules-internal-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-modules-internal-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-0:4.18.0-372.59.1.rt7.217.el8_6.src",
"8Base-RHOSE-4.12:kernel-rt-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-core-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debug-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debug-core-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debug-debuginfo-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debug-devel-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debug-kvm-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debug-modules-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debug-modules-extra-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debug-modules-internal-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debuginfo-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-devel-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-kvm-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-modules-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-modules-extra-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-modules-internal-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-selftests-internal-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-selftests-internal-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-selftests-internal-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-selftests-internal-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-selftests-internal-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-tools-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-tools-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-tools-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-tools-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-tools-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-tools-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-tools-debuginfo-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-tools-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-tools-libs-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-tools-libs-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-tools-libs-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-tools-libs-devel-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-tools-libs-devel-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-tools-libs-devel-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-zfcpdump-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-zfcpdump-core-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-zfcpdump-debuginfo-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-zfcpdump-devel-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-zfcpdump-modules-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-zfcpdump-modules-extra-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-zfcpdump-modules-internal-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:openshift-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el8.src",
"8Base-RHOSE-4.12:openshift-ansible-0:4.12.0-202306090942.p0.g74dc7b3.assembly.stream.el8.noarch",
"8Base-RHOSE-4.12:openshift-ansible-0:4.12.0-202306090942.p0.g74dc7b3.assembly.stream.el8.src",
"8Base-RHOSE-4.12:openshift-ansible-test-0:4.12.0-202306090942.p0.g74dc7b3.assembly.stream.el8.noarch",
"8Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.aarch64",
"8Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.ppc64le",
"8Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.s390x",
"8Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.src",
"8Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.x86_64",
"8Base-RHOSE-4.12:openshift-clients-redistributable-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.x86_64",
"8Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el8.aarch64",
"8Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el8.ppc64le",
"8Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el8.s390x",
"8Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el8.x86_64",
"8Base-RHOSE-4.12:openshift-kuryr-0:4.12.0-202306140156.p0.g31dd228.assembly.stream.el8.src",
"8Base-RHOSE-4.12:openshift-kuryr-cni-0:4.12.0-202306140156.p0.g31dd228.assembly.stream.el8.noarch",
"8Base-RHOSE-4.12:openshift-kuryr-common-0:4.12.0-202306140156.p0.g31dd228.assembly.stream.el8.noarch",
"8Base-RHOSE-4.12:openshift-kuryr-controller-0:4.12.0-202306140156.p0.g31dd228.assembly.stream.el8.noarch",
"8Base-RHOSE-4.12:openshift4-aws-iso-0:4.12.0-202306090942.p0.gd2acdd5.assembly.stream.el8.noarch",
"8Base-RHOSE-4.12:openshift4-aws-iso-0:4.12.0-202306090942.p0.gd2acdd5.assembly.stream.el8.src",
"8Base-RHOSE-4.12:perf-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:perf-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:perf-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:perf-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:perf-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:perf-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:perf-debuginfo-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:perf-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:python3-kuryr-kubernetes-0:4.12.0-202306140156.p0.g31dd228.assembly.stream.el8.noarch",
"8Base-RHOSE-4.12:python3-perf-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:python3-perf-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:python3-perf-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:python3-perf-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:python3-perf-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:python3-perf-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:python3-perf-debuginfo-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:python3-perf-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:runc-3:1.1.6-4.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:runc-3:1.1.6-4.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:runc-3:1.1.6-4.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:runc-3:1.1.6-4.rhaos4.12.el8.src",
"8Base-RHOSE-4.12:runc-3:1.1.6-4.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:runc-debuginfo-3:1.1.6-4.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:runc-debuginfo-3:1.1.6-4.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:runc-debuginfo-3:1.1.6-4.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:runc-debuginfo-3:1.1.6-4.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:runc-debugsource-3:1.1.6-4.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:runc-debugsource-3:1.1.6-4.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:runc-debugsource-3:1.1.6-4.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:runc-debugsource-3:1.1.6-4.rhaos4.12.el8.x86_64",
"9Base-RHOSE-4.12:buildah-1:1.23.4-5.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:buildah-1:1.23.4-5.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:buildah-1:1.23.4-5.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:buildah-1:1.23.4-5.rhaos4.12.el9.src",
"9Base-RHOSE-4.12:buildah-1:1.23.4-5.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:conmon-2:2.1.2-5.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:conmon-2:2.1.2-5.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:conmon-2:2.1.2-5.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:conmon-2:2.1.2-5.rhaos4.12.el9.src",
"9Base-RHOSE-4.12:conmon-2:2.1.2-5.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-5.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-5.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-5.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-5.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-5.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-5.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-5.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-5.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:openshift-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el9.src",
"9Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.aarch64",
"9Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.ppc64le",
"9Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.s390x",
"9Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.src",
"9Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.x86_64",
"9Base-RHOSE-4.12:openshift-clients-redistributable-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.x86_64",
"9Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el9.aarch64",
"9Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el9.ppc64le",
"9Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el9.s390x",
"9Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-27664"
},
{
"category": "external",
"summary": "RHBZ#2124669",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2124669"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-27664",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27664"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-27664",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-27664"
},
{
"category": "external",
"summary": "https://go.dev/issue/54658",
"url": "https://go.dev/issue/54658"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/x49AQzIVX-s/m/0tgO0pjiBQAJ",
"url": "https://groups.google.com/g/golang-announce/c/x49AQzIVX-s/m/0tgO0pjiBQAJ"
}
],
"release_date": "2022-09-06T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-06-26T01:19:15+00:00",
"details": "For OpenShift Container Platform 4.12 see the following documentation, which will be updated shortly for this release, for important instructions on how to upgrade your cluster and fully apply this asynchronous errata update:\n\nhttps://docs.openshift.com/container-platform/4.12/release_notes/ocp-4-12-release-notes.html",
"product_ids": [
"8Base-RHOSE-4.12:podman-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-3:4.2.0-6.1.rhaos4.12.el8.src",
"8Base-RHOSE-4.12:podman-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-catatonit-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-catatonit-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-catatonit-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-catatonit-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-debugsource-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-debugsource-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-debugsource-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-debugsource-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-docker-3:4.2.0-6.1.rhaos4.12.el8.noarch",
"8Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-plugins-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-plugins-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-plugins-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-plugins-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-remote-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-remote-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-remote-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-remote-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-tests-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-tests-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-tests-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-tests-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:skopeo-2:1.9.4-3.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:skopeo-2:1.9.4-3.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:skopeo-2:1.9.4-3.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:skopeo-2:1.9.4-3.1.rhaos4.12.el8.src",
"8Base-RHOSE-4.12:skopeo-2:1.9.4-3.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.1.rhaos4.12.el8.x86_64",
"9Base-RHOSE-4.12:podman-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-3:4.2.0-7.rhaos4.12.el9.src",
"9Base-RHOSE-4.12:podman-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-catatonit-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-catatonit-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-catatonit-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-catatonit-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-debugsource-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-debugsource-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-debugsource-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-debugsource-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-docker-3:4.2.0-7.rhaos4.12.el9.noarch",
"9Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-plugins-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-plugins-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-plugins-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-plugins-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-remote-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-remote-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-remote-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-remote-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-tests-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-tests-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-tests-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-tests-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:skopeo-2:1.9.4-3.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:skopeo-2:1.9.4-3.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:skopeo-2:1.9.4-3.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:skopeo-2:1.9.4-3.rhaos4.12.el9.src",
"9Base-RHOSE-4.12:skopeo-2:1.9.4-3.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.rhaos4.12.el9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:3613"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"8Base-RHOSE-4.12:bpftool-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:bpftool-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:bpftool-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:bpftool-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:bpftool-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:bpftool-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:bpftool-debuginfo-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:bpftool-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:buildah-1:1.23.4-5.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:buildah-1:1.23.4-5.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:buildah-1:1.23.4-5.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:buildah-1:1.23.4-5.1.rhaos4.12.el8.src",
"8Base-RHOSE-4.12:buildah-1:1.23.4-5.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:conmon-2:2.1.2-4.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:conmon-2:2.1.2-4.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:conmon-2:2.1.2-4.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:conmon-2:2.1.2-4.rhaos4.12.el8.src",
"8Base-RHOSE-4.12:conmon-2:2.1.2-4.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-4.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-4.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-4.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-4.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-4.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-4.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-4.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-4.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:containernetworking-plugins-0:1.0.1-7.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:containernetworking-plugins-0:1.0.1-7.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:containernetworking-plugins-0:1.0.1-7.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:containernetworking-plugins-0:1.0.1-7.rhaos4.12.el8.src",
"8Base-RHOSE-4.12:containernetworking-plugins-0:1.0.1-7.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:containernetworking-plugins-debuginfo-0:1.0.1-7.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:containernetworking-plugins-debuginfo-0:1.0.1-7.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:containernetworking-plugins-debuginfo-0:1.0.1-7.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:containernetworking-plugins-debuginfo-0:1.0.1-7.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:containernetworking-plugins-debugsource-0:1.0.1-7.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:containernetworking-plugins-debugsource-0:1.0.1-7.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:containernetworking-plugins-debugsource-0:1.0.1-7.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:containernetworking-plugins-debugsource-0:1.0.1-7.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:kernel-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-0:4.18.0-372.59.1.el8_6.src",
"8Base-RHOSE-4.12:kernel-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-core-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-core-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-core-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-core-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-cross-headers-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-cross-headers-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-cross-headers-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-cross-headers-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-debug-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-debug-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-debug-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-debug-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-debug-core-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-debug-core-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-debug-core-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-debug-core-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-debug-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-debug-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-debug-debuginfo-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-debug-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-debug-devel-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-debug-devel-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-debug-devel-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-debug-devel-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-debug-modules-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-debug-modules-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-debug-modules-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-debug-modules-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-debug-modules-extra-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-debug-modules-extra-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-debug-modules-extra-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-debug-modules-extra-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-debug-modules-internal-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-debug-modules-internal-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-debug-modules-internal-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-debug-modules-internal-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-debuginfo-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-debuginfo-common-aarch64-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-debuginfo-common-ppc64le-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-debuginfo-common-s390x-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-debuginfo-common-x86_64-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-devel-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-devel-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-devel-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-devel-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-doc-0:4.18.0-372.59.1.el8_6.noarch",
"8Base-RHOSE-4.12:kernel-headers-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-headers-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-headers-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-headers-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-ipaclones-internal-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-ipaclones-internal-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-modules-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-modules-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-modules-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-modules-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-modules-extra-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-modules-extra-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-modules-extra-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-modules-extra-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-modules-internal-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-modules-internal-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-modules-internal-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-modules-internal-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-0:4.18.0-372.59.1.rt7.217.el8_6.src",
"8Base-RHOSE-4.12:kernel-rt-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-core-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debug-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debug-core-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debug-debuginfo-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debug-devel-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debug-kvm-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debug-modules-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debug-modules-extra-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debug-modules-internal-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debuginfo-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-devel-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-kvm-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-modules-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-modules-extra-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-modules-internal-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-selftests-internal-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-selftests-internal-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-selftests-internal-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-selftests-internal-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-selftests-internal-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-tools-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-tools-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-tools-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-tools-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-tools-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-tools-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-tools-debuginfo-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-tools-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-tools-libs-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-tools-libs-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-tools-libs-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-tools-libs-devel-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-tools-libs-devel-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-tools-libs-devel-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-zfcpdump-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-zfcpdump-core-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-zfcpdump-debuginfo-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-zfcpdump-devel-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-zfcpdump-modules-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-zfcpdump-modules-extra-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-zfcpdump-modules-internal-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:openshift-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el8.src",
"8Base-RHOSE-4.12:openshift-ansible-0:4.12.0-202306090942.p0.g74dc7b3.assembly.stream.el8.noarch",
"8Base-RHOSE-4.12:openshift-ansible-0:4.12.0-202306090942.p0.g74dc7b3.assembly.stream.el8.src",
"8Base-RHOSE-4.12:openshift-ansible-test-0:4.12.0-202306090942.p0.g74dc7b3.assembly.stream.el8.noarch",
"8Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.aarch64",
"8Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.ppc64le",
"8Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.s390x",
"8Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.src",
"8Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.x86_64",
"8Base-RHOSE-4.12:openshift-clients-redistributable-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.x86_64",
"8Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el8.aarch64",
"8Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el8.ppc64le",
"8Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el8.s390x",
"8Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el8.x86_64",
"8Base-RHOSE-4.12:openshift-kuryr-0:4.12.0-202306140156.p0.g31dd228.assembly.stream.el8.src",
"8Base-RHOSE-4.12:openshift-kuryr-cni-0:4.12.0-202306140156.p0.g31dd228.assembly.stream.el8.noarch",
"8Base-RHOSE-4.12:openshift-kuryr-common-0:4.12.0-202306140156.p0.g31dd228.assembly.stream.el8.noarch",
"8Base-RHOSE-4.12:openshift-kuryr-controller-0:4.12.0-202306140156.p0.g31dd228.assembly.stream.el8.noarch",
"8Base-RHOSE-4.12:openshift4-aws-iso-0:4.12.0-202306090942.p0.gd2acdd5.assembly.stream.el8.noarch",
"8Base-RHOSE-4.12:openshift4-aws-iso-0:4.12.0-202306090942.p0.gd2acdd5.assembly.stream.el8.src",
"8Base-RHOSE-4.12:perf-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:perf-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:perf-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:perf-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:perf-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:perf-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:perf-debuginfo-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:perf-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:podman-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-3:4.2.0-6.1.rhaos4.12.el8.src",
"8Base-RHOSE-4.12:podman-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-catatonit-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-catatonit-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-catatonit-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-catatonit-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-debugsource-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-debugsource-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-debugsource-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-debugsource-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-docker-3:4.2.0-6.1.rhaos4.12.el8.noarch",
"8Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-plugins-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-plugins-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-plugins-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-plugins-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-remote-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-remote-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-remote-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-remote-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-tests-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-tests-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-tests-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-tests-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:python3-kuryr-kubernetes-0:4.12.0-202306140156.p0.g31dd228.assembly.stream.el8.noarch",
"8Base-RHOSE-4.12:python3-perf-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:python3-perf-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:python3-perf-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:python3-perf-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:python3-perf-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:python3-perf-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:python3-perf-debuginfo-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:python3-perf-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:runc-3:1.1.6-4.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:runc-3:1.1.6-4.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:runc-3:1.1.6-4.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:runc-3:1.1.6-4.rhaos4.12.el8.src",
"8Base-RHOSE-4.12:runc-3:1.1.6-4.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:runc-debuginfo-3:1.1.6-4.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:runc-debuginfo-3:1.1.6-4.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:runc-debuginfo-3:1.1.6-4.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:runc-debuginfo-3:1.1.6-4.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:runc-debugsource-3:1.1.6-4.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:runc-debugsource-3:1.1.6-4.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:runc-debugsource-3:1.1.6-4.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:runc-debugsource-3:1.1.6-4.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:skopeo-2:1.9.4-3.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:skopeo-2:1.9.4-3.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:skopeo-2:1.9.4-3.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:skopeo-2:1.9.4-3.1.rhaos4.12.el8.src",
"8Base-RHOSE-4.12:skopeo-2:1.9.4-3.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.1.rhaos4.12.el8.x86_64",
"9Base-RHOSE-4.12:buildah-1:1.23.4-5.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:buildah-1:1.23.4-5.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:buildah-1:1.23.4-5.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:buildah-1:1.23.4-5.rhaos4.12.el9.src",
"9Base-RHOSE-4.12:buildah-1:1.23.4-5.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:conmon-2:2.1.2-5.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:conmon-2:2.1.2-5.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:conmon-2:2.1.2-5.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:conmon-2:2.1.2-5.rhaos4.12.el9.src",
"9Base-RHOSE-4.12:conmon-2:2.1.2-5.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-5.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-5.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-5.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-5.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-5.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-5.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-5.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-5.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:openshift-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el9.src",
"9Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.aarch64",
"9Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.ppc64le",
"9Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.s390x",
"9Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.src",
"9Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.x86_64",
"9Base-RHOSE-4.12:openshift-clients-redistributable-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.x86_64",
"9Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el9.aarch64",
"9Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el9.ppc64le",
"9Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el9.s390x",
"9Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el9.x86_64",
"9Base-RHOSE-4.12:podman-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-3:4.2.0-7.rhaos4.12.el9.src",
"9Base-RHOSE-4.12:podman-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-catatonit-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-catatonit-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-catatonit-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-catatonit-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-debugsource-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-debugsource-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-debugsource-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-debugsource-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-docker-3:4.2.0-7.rhaos4.12.el9.noarch",
"9Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-plugins-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-plugins-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-plugins-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-plugins-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-remote-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-remote-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-remote-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-remote-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-tests-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-tests-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-tests-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-tests-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:skopeo-2:1.9.4-3.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:skopeo-2:1.9.4-3.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:skopeo-2:1.9.4-3.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:skopeo-2:1.9.4-3.rhaos4.12.el9.src",
"9Base-RHOSE-4.12:skopeo-2:1.9.4-3.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.rhaos4.12.el9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "golang: net/http: handle server errors after sending GOAWAY"
},
{
"cve": "CVE-2022-32149",
"cwe": {
"id": "CWE-407",
"name": "Inefficient Algorithmic Complexity"
},
"discovery_date": "2022-10-12T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-RHOSE-4.12:bpftool-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:bpftool-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:bpftool-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:bpftool-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:bpftool-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:bpftool-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:bpftool-debuginfo-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:bpftool-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:buildah-1:1.23.4-5.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:buildah-1:1.23.4-5.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:buildah-1:1.23.4-5.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:buildah-1:1.23.4-5.1.rhaos4.12.el8.src",
"8Base-RHOSE-4.12:buildah-1:1.23.4-5.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:conmon-2:2.1.2-4.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:conmon-2:2.1.2-4.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:conmon-2:2.1.2-4.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:conmon-2:2.1.2-4.rhaos4.12.el8.src",
"8Base-RHOSE-4.12:conmon-2:2.1.2-4.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-4.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-4.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-4.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-4.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-4.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-4.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-4.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-4.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:containernetworking-plugins-0:1.0.1-7.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:containernetworking-plugins-0:1.0.1-7.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:containernetworking-plugins-0:1.0.1-7.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:containernetworking-plugins-0:1.0.1-7.rhaos4.12.el8.src",
"8Base-RHOSE-4.12:containernetworking-plugins-0:1.0.1-7.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:containernetworking-plugins-debuginfo-0:1.0.1-7.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:containernetworking-plugins-debuginfo-0:1.0.1-7.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:containernetworking-plugins-debuginfo-0:1.0.1-7.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:containernetworking-plugins-debuginfo-0:1.0.1-7.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:containernetworking-plugins-debugsource-0:1.0.1-7.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:containernetworking-plugins-debugsource-0:1.0.1-7.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:containernetworking-plugins-debugsource-0:1.0.1-7.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:containernetworking-plugins-debugsource-0:1.0.1-7.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:kernel-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-0:4.18.0-372.59.1.el8_6.src",
"8Base-RHOSE-4.12:kernel-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-core-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-core-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-core-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-core-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-cross-headers-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-cross-headers-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-cross-headers-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-cross-headers-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-debug-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-debug-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-debug-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-debug-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-debug-core-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-debug-core-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-debug-core-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-debug-core-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-debug-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-debug-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-debug-debuginfo-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-debug-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-debug-devel-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-debug-devel-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-debug-devel-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-debug-devel-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-debug-modules-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-debug-modules-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-debug-modules-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-debug-modules-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-debug-modules-extra-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-debug-modules-extra-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-debug-modules-extra-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-debug-modules-extra-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-debug-modules-internal-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-debug-modules-internal-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-debug-modules-internal-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-debug-modules-internal-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-debuginfo-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-debuginfo-common-aarch64-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-debuginfo-common-ppc64le-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-debuginfo-common-s390x-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-debuginfo-common-x86_64-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-devel-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-devel-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-devel-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-devel-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-doc-0:4.18.0-372.59.1.el8_6.noarch",
"8Base-RHOSE-4.12:kernel-headers-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-headers-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-headers-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-headers-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-ipaclones-internal-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-ipaclones-internal-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-modules-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-modules-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-modules-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-modules-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-modules-extra-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-modules-extra-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-modules-extra-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-modules-extra-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-modules-internal-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-modules-internal-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-modules-internal-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-modules-internal-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-0:4.18.0-372.59.1.rt7.217.el8_6.src",
"8Base-RHOSE-4.12:kernel-rt-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-core-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debug-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debug-core-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debug-debuginfo-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debug-devel-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debug-kvm-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debug-modules-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debug-modules-extra-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debug-modules-internal-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debuginfo-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-devel-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-kvm-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-modules-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-modules-extra-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-modules-internal-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-selftests-internal-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-selftests-internal-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-selftests-internal-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-selftests-internal-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-selftests-internal-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-tools-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-tools-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-tools-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-tools-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-tools-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-tools-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-tools-debuginfo-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-tools-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-tools-libs-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-tools-libs-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-tools-libs-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-tools-libs-devel-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-tools-libs-devel-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-tools-libs-devel-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-zfcpdump-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-zfcpdump-core-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-zfcpdump-debuginfo-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-zfcpdump-devel-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-zfcpdump-modules-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-zfcpdump-modules-extra-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-zfcpdump-modules-internal-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:openshift-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el8.src",
"8Base-RHOSE-4.12:openshift-ansible-0:4.12.0-202306090942.p0.g74dc7b3.assembly.stream.el8.noarch",
"8Base-RHOSE-4.12:openshift-ansible-0:4.12.0-202306090942.p0.g74dc7b3.assembly.stream.el8.src",
"8Base-RHOSE-4.12:openshift-ansible-test-0:4.12.0-202306090942.p0.g74dc7b3.assembly.stream.el8.noarch",
"8Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.aarch64",
"8Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.ppc64le",
"8Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.s390x",
"8Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.src",
"8Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.x86_64",
"8Base-RHOSE-4.12:openshift-clients-redistributable-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.x86_64",
"8Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el8.aarch64",
"8Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el8.ppc64le",
"8Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el8.s390x",
"8Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el8.x86_64",
"8Base-RHOSE-4.12:openshift-kuryr-0:4.12.0-202306140156.p0.g31dd228.assembly.stream.el8.src",
"8Base-RHOSE-4.12:openshift-kuryr-cni-0:4.12.0-202306140156.p0.g31dd228.assembly.stream.el8.noarch",
"8Base-RHOSE-4.12:openshift-kuryr-common-0:4.12.0-202306140156.p0.g31dd228.assembly.stream.el8.noarch",
"8Base-RHOSE-4.12:openshift-kuryr-controller-0:4.12.0-202306140156.p0.g31dd228.assembly.stream.el8.noarch",
"8Base-RHOSE-4.12:openshift4-aws-iso-0:4.12.0-202306090942.p0.gd2acdd5.assembly.stream.el8.noarch",
"8Base-RHOSE-4.12:openshift4-aws-iso-0:4.12.0-202306090942.p0.gd2acdd5.assembly.stream.el8.src",
"8Base-RHOSE-4.12:perf-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:perf-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:perf-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:perf-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:perf-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:perf-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:perf-debuginfo-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:perf-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:python3-kuryr-kubernetes-0:4.12.0-202306140156.p0.g31dd228.assembly.stream.el8.noarch",
"8Base-RHOSE-4.12:python3-perf-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:python3-perf-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:python3-perf-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:python3-perf-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:python3-perf-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:python3-perf-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:python3-perf-debuginfo-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:python3-perf-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:runc-3:1.1.6-4.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:runc-3:1.1.6-4.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:runc-3:1.1.6-4.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:runc-3:1.1.6-4.rhaos4.12.el8.src",
"8Base-RHOSE-4.12:runc-3:1.1.6-4.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:runc-debuginfo-3:1.1.6-4.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:runc-debuginfo-3:1.1.6-4.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:runc-debuginfo-3:1.1.6-4.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:runc-debuginfo-3:1.1.6-4.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:runc-debugsource-3:1.1.6-4.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:runc-debugsource-3:1.1.6-4.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:runc-debugsource-3:1.1.6-4.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:runc-debugsource-3:1.1.6-4.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:skopeo-2:1.9.4-3.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:skopeo-2:1.9.4-3.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:skopeo-2:1.9.4-3.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:skopeo-2:1.9.4-3.1.rhaos4.12.el8.src",
"8Base-RHOSE-4.12:skopeo-2:1.9.4-3.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.1.rhaos4.12.el8.x86_64",
"9Base-RHOSE-4.12:buildah-1:1.23.4-5.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:buildah-1:1.23.4-5.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:buildah-1:1.23.4-5.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:buildah-1:1.23.4-5.rhaos4.12.el9.src",
"9Base-RHOSE-4.12:buildah-1:1.23.4-5.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:conmon-2:2.1.2-5.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:conmon-2:2.1.2-5.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:conmon-2:2.1.2-5.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:conmon-2:2.1.2-5.rhaos4.12.el9.src",
"9Base-RHOSE-4.12:conmon-2:2.1.2-5.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-5.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-5.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-5.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-5.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-5.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-5.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-5.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-5.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:openshift-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el9.src",
"9Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.aarch64",
"9Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.ppc64le",
"9Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.s390x",
"9Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.src",
"9Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.x86_64",
"9Base-RHOSE-4.12:openshift-clients-redistributable-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.x86_64",
"9Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el9.aarch64",
"9Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el9.ppc64le",
"9Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el9.s390x",
"9Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el9.x86_64",
"9Base-RHOSE-4.12:skopeo-2:1.9.4-3.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:skopeo-2:1.9.4-3.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:skopeo-2:1.9.4-3.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:skopeo-2:1.9.4-3.rhaos4.12.el9.src",
"9Base-RHOSE-4.12:skopeo-2:1.9.4-3.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.rhaos4.12.el9.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2134010"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in the golang.org/x/text/language package. An attacker can craft an Accept-Language header which ParseAcceptLanguage will take significant time to parse. This issue leads to a denial of service, and can impact availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: golang.org/x/text/language: ParseAcceptLanguage takes a long time to parse complex tags",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "After careful analysis of the vulnerability Redhat is choosing to keep the vulnerability severity as moderate,the vulnerability exists in the ParseAcceptLanguage function of the golang text/language package,when an attacker could craft an unusually large accept header and due to the parser taking quadratic time complexity to finish, firstly the attacker would have to find a way smuggle an input to the parser and even then this would simply not result in a crash of any kind but more of resource hang which while can be unpleasant,does not equate to any real world damage.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-RHOSE-4.12:podman-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-3:4.2.0-6.1.rhaos4.12.el8.src",
"8Base-RHOSE-4.12:podman-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-catatonit-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-catatonit-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-catatonit-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-catatonit-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-debugsource-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-debugsource-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-debugsource-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-debugsource-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-docker-3:4.2.0-6.1.rhaos4.12.el8.noarch",
"8Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-plugins-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-plugins-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-plugins-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-plugins-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-remote-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-remote-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-remote-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-remote-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-tests-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-tests-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-tests-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-tests-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"9Base-RHOSE-4.12:podman-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-3:4.2.0-7.rhaos4.12.el9.src",
"9Base-RHOSE-4.12:podman-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-catatonit-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-catatonit-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-catatonit-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-catatonit-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-debugsource-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-debugsource-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-debugsource-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-debugsource-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-docker-3:4.2.0-7.rhaos4.12.el9.noarch",
"9Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-plugins-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-plugins-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-plugins-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-plugins-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-remote-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-remote-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-remote-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-remote-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-tests-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-tests-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-tests-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-tests-3:4.2.0-7.rhaos4.12.el9.x86_64"
],
"known_not_affected": [
"8Base-RHOSE-4.12:bpftool-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:bpftool-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:bpftool-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:bpftool-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:bpftool-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:bpftool-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:bpftool-debuginfo-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:bpftool-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:buildah-1:1.23.4-5.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:buildah-1:1.23.4-5.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:buildah-1:1.23.4-5.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:buildah-1:1.23.4-5.1.rhaos4.12.el8.src",
"8Base-RHOSE-4.12:buildah-1:1.23.4-5.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:conmon-2:2.1.2-4.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:conmon-2:2.1.2-4.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:conmon-2:2.1.2-4.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:conmon-2:2.1.2-4.rhaos4.12.el8.src",
"8Base-RHOSE-4.12:conmon-2:2.1.2-4.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-4.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-4.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-4.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-4.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-4.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-4.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-4.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-4.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:containernetworking-plugins-0:1.0.1-7.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:containernetworking-plugins-0:1.0.1-7.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:containernetworking-plugins-0:1.0.1-7.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:containernetworking-plugins-0:1.0.1-7.rhaos4.12.el8.src",
"8Base-RHOSE-4.12:containernetworking-plugins-0:1.0.1-7.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:containernetworking-plugins-debuginfo-0:1.0.1-7.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:containernetworking-plugins-debuginfo-0:1.0.1-7.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:containernetworking-plugins-debuginfo-0:1.0.1-7.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:containernetworking-plugins-debuginfo-0:1.0.1-7.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:containernetworking-plugins-debugsource-0:1.0.1-7.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:containernetworking-plugins-debugsource-0:1.0.1-7.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:containernetworking-plugins-debugsource-0:1.0.1-7.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:containernetworking-plugins-debugsource-0:1.0.1-7.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:kernel-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-0:4.18.0-372.59.1.el8_6.src",
"8Base-RHOSE-4.12:kernel-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-core-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-core-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-core-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-core-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-cross-headers-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-cross-headers-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-cross-headers-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-cross-headers-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-debug-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-debug-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-debug-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-debug-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-debug-core-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-debug-core-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-debug-core-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-debug-core-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-debug-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-debug-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-debug-debuginfo-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-debug-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-debug-devel-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-debug-devel-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-debug-devel-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-debug-devel-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-debug-modules-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-debug-modules-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-debug-modules-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-debug-modules-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-debug-modules-extra-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-debug-modules-extra-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-debug-modules-extra-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-debug-modules-extra-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-debug-modules-internal-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-debug-modules-internal-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-debug-modules-internal-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-debug-modules-internal-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-debuginfo-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-debuginfo-common-aarch64-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-debuginfo-common-ppc64le-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-debuginfo-common-s390x-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-debuginfo-common-x86_64-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-devel-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-devel-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-devel-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-devel-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-doc-0:4.18.0-372.59.1.el8_6.noarch",
"8Base-RHOSE-4.12:kernel-headers-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-headers-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-headers-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-headers-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-ipaclones-internal-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-ipaclones-internal-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-modules-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-modules-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-modules-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-modules-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-modules-extra-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-modules-extra-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-modules-extra-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-modules-extra-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-modules-internal-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-modules-internal-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-modules-internal-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-modules-internal-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-0:4.18.0-372.59.1.rt7.217.el8_6.src",
"8Base-RHOSE-4.12:kernel-rt-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-core-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debug-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debug-core-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debug-debuginfo-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debug-devel-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debug-kvm-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debug-modules-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debug-modules-extra-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debug-modules-internal-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debuginfo-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-devel-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-kvm-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-modules-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-modules-extra-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-modules-internal-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-selftests-internal-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-selftests-internal-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-selftests-internal-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-selftests-internal-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-selftests-internal-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-tools-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-tools-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-tools-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-tools-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-tools-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-tools-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-tools-debuginfo-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-tools-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-tools-libs-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-tools-libs-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-tools-libs-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-tools-libs-devel-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-tools-libs-devel-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-tools-libs-devel-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-zfcpdump-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-zfcpdump-core-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-zfcpdump-debuginfo-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-zfcpdump-devel-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-zfcpdump-modules-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-zfcpdump-modules-extra-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-zfcpdump-modules-internal-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:openshift-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el8.src",
"8Base-RHOSE-4.12:openshift-ansible-0:4.12.0-202306090942.p0.g74dc7b3.assembly.stream.el8.noarch",
"8Base-RHOSE-4.12:openshift-ansible-0:4.12.0-202306090942.p0.g74dc7b3.assembly.stream.el8.src",
"8Base-RHOSE-4.12:openshift-ansible-test-0:4.12.0-202306090942.p0.g74dc7b3.assembly.stream.el8.noarch",
"8Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.aarch64",
"8Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.ppc64le",
"8Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.s390x",
"8Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.src",
"8Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.x86_64",
"8Base-RHOSE-4.12:openshift-clients-redistributable-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.x86_64",
"8Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el8.aarch64",
"8Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el8.ppc64le",
"8Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el8.s390x",
"8Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el8.x86_64",
"8Base-RHOSE-4.12:openshift-kuryr-0:4.12.0-202306140156.p0.g31dd228.assembly.stream.el8.src",
"8Base-RHOSE-4.12:openshift-kuryr-cni-0:4.12.0-202306140156.p0.g31dd228.assembly.stream.el8.noarch",
"8Base-RHOSE-4.12:openshift-kuryr-common-0:4.12.0-202306140156.p0.g31dd228.assembly.stream.el8.noarch",
"8Base-RHOSE-4.12:openshift-kuryr-controller-0:4.12.0-202306140156.p0.g31dd228.assembly.stream.el8.noarch",
"8Base-RHOSE-4.12:openshift4-aws-iso-0:4.12.0-202306090942.p0.gd2acdd5.assembly.stream.el8.noarch",
"8Base-RHOSE-4.12:openshift4-aws-iso-0:4.12.0-202306090942.p0.gd2acdd5.assembly.stream.el8.src",
"8Base-RHOSE-4.12:perf-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:perf-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:perf-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:perf-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:perf-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:perf-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:perf-debuginfo-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:perf-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:python3-kuryr-kubernetes-0:4.12.0-202306140156.p0.g31dd228.assembly.stream.el8.noarch",
"8Base-RHOSE-4.12:python3-perf-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:python3-perf-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:python3-perf-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:python3-perf-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:python3-perf-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:python3-perf-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:python3-perf-debuginfo-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:python3-perf-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:runc-3:1.1.6-4.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:runc-3:1.1.6-4.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:runc-3:1.1.6-4.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:runc-3:1.1.6-4.rhaos4.12.el8.src",
"8Base-RHOSE-4.12:runc-3:1.1.6-4.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:runc-debuginfo-3:1.1.6-4.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:runc-debuginfo-3:1.1.6-4.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:runc-debuginfo-3:1.1.6-4.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:runc-debuginfo-3:1.1.6-4.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:runc-debugsource-3:1.1.6-4.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:runc-debugsource-3:1.1.6-4.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:runc-debugsource-3:1.1.6-4.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:runc-debugsource-3:1.1.6-4.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:skopeo-2:1.9.4-3.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:skopeo-2:1.9.4-3.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:skopeo-2:1.9.4-3.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:skopeo-2:1.9.4-3.1.rhaos4.12.el8.src",
"8Base-RHOSE-4.12:skopeo-2:1.9.4-3.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.1.rhaos4.12.el8.x86_64",
"9Base-RHOSE-4.12:buildah-1:1.23.4-5.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:buildah-1:1.23.4-5.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:buildah-1:1.23.4-5.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:buildah-1:1.23.4-5.rhaos4.12.el9.src",
"9Base-RHOSE-4.12:buildah-1:1.23.4-5.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:conmon-2:2.1.2-5.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:conmon-2:2.1.2-5.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:conmon-2:2.1.2-5.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:conmon-2:2.1.2-5.rhaos4.12.el9.src",
"9Base-RHOSE-4.12:conmon-2:2.1.2-5.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-5.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-5.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-5.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-5.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-5.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-5.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-5.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-5.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:openshift-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el9.src",
"9Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.aarch64",
"9Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.ppc64le",
"9Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.s390x",
"9Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.src",
"9Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.x86_64",
"9Base-RHOSE-4.12:openshift-clients-redistributable-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.x86_64",
"9Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el9.aarch64",
"9Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el9.ppc64le",
"9Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el9.s390x",
"9Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el9.x86_64",
"9Base-RHOSE-4.12:skopeo-2:1.9.4-3.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:skopeo-2:1.9.4-3.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:skopeo-2:1.9.4-3.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:skopeo-2:1.9.4-3.rhaos4.12.el9.src",
"9Base-RHOSE-4.12:skopeo-2:1.9.4-3.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.rhaos4.12.el9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-32149"
},
{
"category": "external",
"summary": "RHBZ#2134010",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2134010"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-32149",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32149"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-32149",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-32149"
},
{
"category": "external",
"summary": "https://go.dev/issue/56152",
"url": "https://go.dev/issue/56152"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-dev/c/qfPIly0X7aU",
"url": "https://groups.google.com/g/golang-dev/c/qfPIly0X7aU"
}
],
"release_date": "2022-10-11T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-06-26T01:19:15+00:00",
"details": "For OpenShift Container Platform 4.12 see the following documentation, which will be updated shortly for this release, for important instructions on how to upgrade your cluster and fully apply this asynchronous errata update:\n\nhttps://docs.openshift.com/container-platform/4.12/release_notes/ocp-4-12-release-notes.html",
"product_ids": [
"8Base-RHOSE-4.12:podman-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-3:4.2.0-6.1.rhaos4.12.el8.src",
"8Base-RHOSE-4.12:podman-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-catatonit-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-catatonit-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-catatonit-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-catatonit-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-debugsource-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-debugsource-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-debugsource-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-debugsource-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-docker-3:4.2.0-6.1.rhaos4.12.el8.noarch",
"8Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-plugins-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-plugins-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-plugins-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-plugins-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-remote-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-remote-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-remote-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-remote-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-tests-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-tests-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-tests-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-tests-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"9Base-RHOSE-4.12:podman-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-3:4.2.0-7.rhaos4.12.el9.src",
"9Base-RHOSE-4.12:podman-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-catatonit-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-catatonit-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-catatonit-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-catatonit-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-debugsource-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-debugsource-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-debugsource-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-debugsource-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-docker-3:4.2.0-7.rhaos4.12.el9.noarch",
"9Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-plugins-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-plugins-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-plugins-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-plugins-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-remote-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-remote-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-remote-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-remote-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-tests-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-tests-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-tests-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-tests-3:4.2.0-7.rhaos4.12.el9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:3613"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"8Base-RHOSE-4.12:bpftool-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:bpftool-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:bpftool-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:bpftool-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:bpftool-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:bpftool-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:bpftool-debuginfo-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:bpftool-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:buildah-1:1.23.4-5.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:buildah-1:1.23.4-5.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:buildah-1:1.23.4-5.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:buildah-1:1.23.4-5.1.rhaos4.12.el8.src",
"8Base-RHOSE-4.12:buildah-1:1.23.4-5.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:conmon-2:2.1.2-4.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:conmon-2:2.1.2-4.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:conmon-2:2.1.2-4.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:conmon-2:2.1.2-4.rhaos4.12.el8.src",
"8Base-RHOSE-4.12:conmon-2:2.1.2-4.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-4.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-4.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-4.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-4.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-4.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-4.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-4.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-4.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:containernetworking-plugins-0:1.0.1-7.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:containernetworking-plugins-0:1.0.1-7.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:containernetworking-plugins-0:1.0.1-7.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:containernetworking-plugins-0:1.0.1-7.rhaos4.12.el8.src",
"8Base-RHOSE-4.12:containernetworking-plugins-0:1.0.1-7.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:containernetworking-plugins-debuginfo-0:1.0.1-7.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:containernetworking-plugins-debuginfo-0:1.0.1-7.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:containernetworking-plugins-debuginfo-0:1.0.1-7.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:containernetworking-plugins-debuginfo-0:1.0.1-7.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:containernetworking-plugins-debugsource-0:1.0.1-7.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:containernetworking-plugins-debugsource-0:1.0.1-7.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:containernetworking-plugins-debugsource-0:1.0.1-7.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:containernetworking-plugins-debugsource-0:1.0.1-7.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:kernel-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-0:4.18.0-372.59.1.el8_6.src",
"8Base-RHOSE-4.12:kernel-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-core-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-core-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-core-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-core-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-cross-headers-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-cross-headers-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-cross-headers-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-cross-headers-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-debug-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-debug-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-debug-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-debug-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-debug-core-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-debug-core-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-debug-core-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-debug-core-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-debug-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-debug-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-debug-debuginfo-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-debug-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-debug-devel-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-debug-devel-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-debug-devel-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-debug-devel-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-debug-modules-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-debug-modules-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-debug-modules-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-debug-modules-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-debug-modules-extra-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-debug-modules-extra-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-debug-modules-extra-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-debug-modules-extra-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-debug-modules-internal-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-debug-modules-internal-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-debug-modules-internal-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-debug-modules-internal-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-debuginfo-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-debuginfo-common-aarch64-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-debuginfo-common-ppc64le-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-debuginfo-common-s390x-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-debuginfo-common-x86_64-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-devel-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-devel-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-devel-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-devel-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-doc-0:4.18.0-372.59.1.el8_6.noarch",
"8Base-RHOSE-4.12:kernel-headers-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-headers-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-headers-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-headers-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-ipaclones-internal-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-ipaclones-internal-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-modules-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-modules-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-modules-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-modules-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-modules-extra-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-modules-extra-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-modules-extra-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-modules-extra-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-modules-internal-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-modules-internal-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-modules-internal-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-modules-internal-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-0:4.18.0-372.59.1.rt7.217.el8_6.src",
"8Base-RHOSE-4.12:kernel-rt-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-core-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debug-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debug-core-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debug-debuginfo-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debug-devel-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debug-kvm-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debug-modules-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debug-modules-extra-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debug-modules-internal-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debuginfo-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-devel-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-kvm-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-modules-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-modules-extra-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-modules-internal-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-selftests-internal-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-selftests-internal-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-selftests-internal-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-selftests-internal-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-selftests-internal-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-tools-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-tools-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-tools-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-tools-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-tools-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-tools-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-tools-debuginfo-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-tools-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-tools-libs-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-tools-libs-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-tools-libs-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-tools-libs-devel-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-tools-libs-devel-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-tools-libs-devel-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-zfcpdump-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-zfcpdump-core-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-zfcpdump-debuginfo-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-zfcpdump-devel-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-zfcpdump-modules-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-zfcpdump-modules-extra-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-zfcpdump-modules-internal-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:openshift-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el8.src",
"8Base-RHOSE-4.12:openshift-ansible-0:4.12.0-202306090942.p0.g74dc7b3.assembly.stream.el8.noarch",
"8Base-RHOSE-4.12:openshift-ansible-0:4.12.0-202306090942.p0.g74dc7b3.assembly.stream.el8.src",
"8Base-RHOSE-4.12:openshift-ansible-test-0:4.12.0-202306090942.p0.g74dc7b3.assembly.stream.el8.noarch",
"8Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.aarch64",
"8Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.ppc64le",
"8Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.s390x",
"8Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.src",
"8Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.x86_64",
"8Base-RHOSE-4.12:openshift-clients-redistributable-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.x86_64",
"8Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el8.aarch64",
"8Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el8.ppc64le",
"8Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el8.s390x",
"8Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el8.x86_64",
"8Base-RHOSE-4.12:openshift-kuryr-0:4.12.0-202306140156.p0.g31dd228.assembly.stream.el8.src",
"8Base-RHOSE-4.12:openshift-kuryr-cni-0:4.12.0-202306140156.p0.g31dd228.assembly.stream.el8.noarch",
"8Base-RHOSE-4.12:openshift-kuryr-common-0:4.12.0-202306140156.p0.g31dd228.assembly.stream.el8.noarch",
"8Base-RHOSE-4.12:openshift-kuryr-controller-0:4.12.0-202306140156.p0.g31dd228.assembly.stream.el8.noarch",
"8Base-RHOSE-4.12:openshift4-aws-iso-0:4.12.0-202306090942.p0.gd2acdd5.assembly.stream.el8.noarch",
"8Base-RHOSE-4.12:openshift4-aws-iso-0:4.12.0-202306090942.p0.gd2acdd5.assembly.stream.el8.src",
"8Base-RHOSE-4.12:perf-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:perf-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:perf-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:perf-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:perf-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:perf-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:perf-debuginfo-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:perf-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:podman-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-3:4.2.0-6.1.rhaos4.12.el8.src",
"8Base-RHOSE-4.12:podman-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-catatonit-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-catatonit-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-catatonit-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-catatonit-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-debugsource-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-debugsource-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-debugsource-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-debugsource-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-docker-3:4.2.0-6.1.rhaos4.12.el8.noarch",
"8Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-plugins-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-plugins-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-plugins-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-plugins-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-remote-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-remote-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-remote-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-remote-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-tests-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-tests-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-tests-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-tests-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:python3-kuryr-kubernetes-0:4.12.0-202306140156.p0.g31dd228.assembly.stream.el8.noarch",
"8Base-RHOSE-4.12:python3-perf-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:python3-perf-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:python3-perf-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:python3-perf-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:python3-perf-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:python3-perf-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:python3-perf-debuginfo-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:python3-perf-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:runc-3:1.1.6-4.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:runc-3:1.1.6-4.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:runc-3:1.1.6-4.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:runc-3:1.1.6-4.rhaos4.12.el8.src",
"8Base-RHOSE-4.12:runc-3:1.1.6-4.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:runc-debuginfo-3:1.1.6-4.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:runc-debuginfo-3:1.1.6-4.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:runc-debuginfo-3:1.1.6-4.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:runc-debuginfo-3:1.1.6-4.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:runc-debugsource-3:1.1.6-4.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:runc-debugsource-3:1.1.6-4.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:runc-debugsource-3:1.1.6-4.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:runc-debugsource-3:1.1.6-4.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:skopeo-2:1.9.4-3.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:skopeo-2:1.9.4-3.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:skopeo-2:1.9.4-3.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:skopeo-2:1.9.4-3.1.rhaos4.12.el8.src",
"8Base-RHOSE-4.12:skopeo-2:1.9.4-3.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.1.rhaos4.12.el8.x86_64",
"9Base-RHOSE-4.12:buildah-1:1.23.4-5.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:buildah-1:1.23.4-5.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:buildah-1:1.23.4-5.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:buildah-1:1.23.4-5.rhaos4.12.el9.src",
"9Base-RHOSE-4.12:buildah-1:1.23.4-5.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:conmon-2:2.1.2-5.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:conmon-2:2.1.2-5.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:conmon-2:2.1.2-5.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:conmon-2:2.1.2-5.rhaos4.12.el9.src",
"9Base-RHOSE-4.12:conmon-2:2.1.2-5.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-5.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-5.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-5.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-5.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-5.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-5.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-5.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-5.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:openshift-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el9.src",
"9Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.aarch64",
"9Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.ppc64le",
"9Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.s390x",
"9Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.src",
"9Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.x86_64",
"9Base-RHOSE-4.12:openshift-clients-redistributable-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.x86_64",
"9Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el9.aarch64",
"9Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el9.ppc64le",
"9Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el9.s390x",
"9Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el9.x86_64",
"9Base-RHOSE-4.12:podman-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-3:4.2.0-7.rhaos4.12.el9.src",
"9Base-RHOSE-4.12:podman-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-catatonit-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-catatonit-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-catatonit-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-catatonit-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-debugsource-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-debugsource-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-debugsource-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-debugsource-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-docker-3:4.2.0-7.rhaos4.12.el9.noarch",
"9Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-plugins-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-plugins-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-plugins-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-plugins-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-remote-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-remote-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-remote-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-remote-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-tests-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-tests-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-tests-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-tests-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:skopeo-2:1.9.4-3.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:skopeo-2:1.9.4-3.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:skopeo-2:1.9.4-3.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:skopeo-2:1.9.4-3.rhaos4.12.el9.src",
"9Base-RHOSE-4.12:skopeo-2:1.9.4-3.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.rhaos4.12.el9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "golang: golang.org/x/text/language: ParseAcceptLanguage takes a long time to parse complex tags"
},
{
"cve": "CVE-2022-32190",
"cwe": {
"id": "CWE-22",
"name": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)"
},
"discovery_date": "2022-09-06T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-RHOSE-4.12:bpftool-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:bpftool-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:bpftool-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:bpftool-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:bpftool-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:bpftool-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:bpftool-debuginfo-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:bpftool-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:buildah-1:1.23.4-5.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:buildah-1:1.23.4-5.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:buildah-1:1.23.4-5.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:buildah-1:1.23.4-5.1.rhaos4.12.el8.src",
"8Base-RHOSE-4.12:buildah-1:1.23.4-5.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:conmon-2:2.1.2-4.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:conmon-2:2.1.2-4.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:conmon-2:2.1.2-4.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:conmon-2:2.1.2-4.rhaos4.12.el8.src",
"8Base-RHOSE-4.12:conmon-2:2.1.2-4.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-4.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-4.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-4.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-4.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-4.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-4.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-4.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-4.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:containernetworking-plugins-0:1.0.1-7.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:containernetworking-plugins-0:1.0.1-7.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:containernetworking-plugins-0:1.0.1-7.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:containernetworking-plugins-0:1.0.1-7.rhaos4.12.el8.src",
"8Base-RHOSE-4.12:containernetworking-plugins-0:1.0.1-7.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:containernetworking-plugins-debuginfo-0:1.0.1-7.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:containernetworking-plugins-debuginfo-0:1.0.1-7.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:containernetworking-plugins-debuginfo-0:1.0.1-7.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:containernetworking-plugins-debuginfo-0:1.0.1-7.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:containernetworking-plugins-debugsource-0:1.0.1-7.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:containernetworking-plugins-debugsource-0:1.0.1-7.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:containernetworking-plugins-debugsource-0:1.0.1-7.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:containernetworking-plugins-debugsource-0:1.0.1-7.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:kernel-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-0:4.18.0-372.59.1.el8_6.src",
"8Base-RHOSE-4.12:kernel-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-core-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-core-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-core-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-core-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-cross-headers-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-cross-headers-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-cross-headers-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-cross-headers-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-debug-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-debug-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-debug-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-debug-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-debug-core-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-debug-core-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-debug-core-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-debug-core-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-debug-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-debug-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-debug-debuginfo-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-debug-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-debug-devel-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-debug-devel-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-debug-devel-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-debug-devel-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-debug-modules-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-debug-modules-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-debug-modules-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-debug-modules-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-debug-modules-extra-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-debug-modules-extra-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-debug-modules-extra-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-debug-modules-extra-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-debug-modules-internal-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-debug-modules-internal-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-debug-modules-internal-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-debug-modules-internal-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-debuginfo-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-debuginfo-common-aarch64-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-debuginfo-common-ppc64le-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-debuginfo-common-s390x-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-debuginfo-common-x86_64-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-devel-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-devel-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-devel-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-devel-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-doc-0:4.18.0-372.59.1.el8_6.noarch",
"8Base-RHOSE-4.12:kernel-headers-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-headers-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-headers-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-headers-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-ipaclones-internal-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-ipaclones-internal-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-modules-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-modules-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-modules-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-modules-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-modules-extra-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-modules-extra-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-modules-extra-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-modules-extra-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-modules-internal-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-modules-internal-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-modules-internal-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-modules-internal-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-0:4.18.0-372.59.1.rt7.217.el8_6.src",
"8Base-RHOSE-4.12:kernel-rt-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-core-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debug-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debug-core-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debug-debuginfo-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debug-devel-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debug-kvm-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debug-modules-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debug-modules-extra-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debug-modules-internal-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debuginfo-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-devel-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-kvm-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-modules-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-modules-extra-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-modules-internal-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-selftests-internal-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-selftests-internal-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-selftests-internal-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-selftests-internal-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-selftests-internal-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-tools-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-tools-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-tools-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-tools-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-tools-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-tools-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-tools-debuginfo-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-tools-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-tools-libs-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-tools-libs-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-tools-libs-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-tools-libs-devel-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-tools-libs-devel-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-tools-libs-devel-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-zfcpdump-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-zfcpdump-core-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-zfcpdump-debuginfo-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-zfcpdump-devel-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-zfcpdump-modules-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-zfcpdump-modules-extra-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-zfcpdump-modules-internal-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:openshift-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el8.src",
"8Base-RHOSE-4.12:openshift-ansible-0:4.12.0-202306090942.p0.g74dc7b3.assembly.stream.el8.noarch",
"8Base-RHOSE-4.12:openshift-ansible-0:4.12.0-202306090942.p0.g74dc7b3.assembly.stream.el8.src",
"8Base-RHOSE-4.12:openshift-ansible-test-0:4.12.0-202306090942.p0.g74dc7b3.assembly.stream.el8.noarch",
"8Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.aarch64",
"8Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.ppc64le",
"8Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.s390x",
"8Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.src",
"8Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.x86_64",
"8Base-RHOSE-4.12:openshift-clients-redistributable-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.x86_64",
"8Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el8.aarch64",
"8Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el8.ppc64le",
"8Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el8.s390x",
"8Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el8.x86_64",
"8Base-RHOSE-4.12:openshift-kuryr-0:4.12.0-202306140156.p0.g31dd228.assembly.stream.el8.src",
"8Base-RHOSE-4.12:openshift-kuryr-cni-0:4.12.0-202306140156.p0.g31dd228.assembly.stream.el8.noarch",
"8Base-RHOSE-4.12:openshift-kuryr-common-0:4.12.0-202306140156.p0.g31dd228.assembly.stream.el8.noarch",
"8Base-RHOSE-4.12:openshift-kuryr-controller-0:4.12.0-202306140156.p0.g31dd228.assembly.stream.el8.noarch",
"8Base-RHOSE-4.12:openshift4-aws-iso-0:4.12.0-202306090942.p0.gd2acdd5.assembly.stream.el8.noarch",
"8Base-RHOSE-4.12:openshift4-aws-iso-0:4.12.0-202306090942.p0.gd2acdd5.assembly.stream.el8.src",
"8Base-RHOSE-4.12:perf-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:perf-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:perf-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:perf-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:perf-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:perf-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:perf-debuginfo-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:perf-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:python3-kuryr-kubernetes-0:4.12.0-202306140156.p0.g31dd228.assembly.stream.el8.noarch",
"8Base-RHOSE-4.12:python3-perf-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:python3-perf-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:python3-perf-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:python3-perf-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:python3-perf-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:python3-perf-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:python3-perf-debuginfo-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:python3-perf-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:skopeo-2:1.9.4-3.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:skopeo-2:1.9.4-3.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:skopeo-2:1.9.4-3.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:skopeo-2:1.9.4-3.1.rhaos4.12.el8.src",
"8Base-RHOSE-4.12:skopeo-2:1.9.4-3.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.1.rhaos4.12.el8.x86_64",
"9Base-RHOSE-4.12:buildah-1:1.23.4-5.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:buildah-1:1.23.4-5.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:buildah-1:1.23.4-5.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:buildah-1:1.23.4-5.rhaos4.12.el9.src",
"9Base-RHOSE-4.12:buildah-1:1.23.4-5.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:conmon-2:2.1.2-5.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:conmon-2:2.1.2-5.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:conmon-2:2.1.2-5.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:conmon-2:2.1.2-5.rhaos4.12.el9.src",
"9Base-RHOSE-4.12:conmon-2:2.1.2-5.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-5.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-5.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-5.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-5.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-5.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-5.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-5.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-5.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:openshift-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el9.src",
"9Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.aarch64",
"9Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.ppc64le",
"9Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.s390x",
"9Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.src",
"9Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.x86_64",
"9Base-RHOSE-4.12:openshift-clients-redistributable-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.x86_64",
"9Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el9.aarch64",
"9Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el9.ppc64le",
"9Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el9.s390x",
"9Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el9.x86_64",
"9Base-RHOSE-4.12:skopeo-2:1.9.4-3.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:skopeo-2:1.9.4-3.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:skopeo-2:1.9.4-3.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:skopeo-2:1.9.4-3.rhaos4.12.el9.src",
"9Base-RHOSE-4.12:skopeo-2:1.9.4-3.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.rhaos4.12.el9.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2124668"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the golang package. The JoinPath doesn\u0027t remove the ../ path components appended to a domain that is not terminated by a slash, possibly leading to a directory traversal attack.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: net/url: JoinPath does not strip relative path components in all circumstances",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The vulnerable functions, JoinPath and URL.JoinPath was introduced in upstream go1.19, whereas, RHEL ships go1.17 and go1.18 versions, which does not contain the vulnerable code. Hence, packages shipped with RHEL-8, RHEL-9 are not affected.\n\nAll Y stream releases of OpenShift Container Platform 4 run on RHEL-8 or RHEL-9, so OCP 4 is also not affected.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-RHOSE-4.12:podman-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-3:4.2.0-6.1.rhaos4.12.el8.src",
"8Base-RHOSE-4.12:podman-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-catatonit-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-catatonit-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-catatonit-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-catatonit-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-debugsource-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-debugsource-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-debugsource-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-debugsource-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-docker-3:4.2.0-6.1.rhaos4.12.el8.noarch",
"8Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-plugins-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-plugins-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-plugins-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-plugins-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-remote-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-remote-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-remote-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-remote-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-tests-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-tests-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-tests-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-tests-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:runc-3:1.1.6-4.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:runc-3:1.1.6-4.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:runc-3:1.1.6-4.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:runc-3:1.1.6-4.rhaos4.12.el8.src",
"8Base-RHOSE-4.12:runc-3:1.1.6-4.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:runc-debuginfo-3:1.1.6-4.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:runc-debuginfo-3:1.1.6-4.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:runc-debuginfo-3:1.1.6-4.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:runc-debuginfo-3:1.1.6-4.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:runc-debugsource-3:1.1.6-4.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:runc-debugsource-3:1.1.6-4.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:runc-debugsource-3:1.1.6-4.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:runc-debugsource-3:1.1.6-4.rhaos4.12.el8.x86_64",
"9Base-RHOSE-4.12:podman-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-3:4.2.0-7.rhaos4.12.el9.src",
"9Base-RHOSE-4.12:podman-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-catatonit-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-catatonit-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-catatonit-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-catatonit-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-debugsource-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-debugsource-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-debugsource-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-debugsource-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-docker-3:4.2.0-7.rhaos4.12.el9.noarch",
"9Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-plugins-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-plugins-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-plugins-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-plugins-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-remote-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-remote-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-remote-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-remote-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-tests-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-tests-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-tests-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-tests-3:4.2.0-7.rhaos4.12.el9.x86_64"
],
"known_not_affected": [
"8Base-RHOSE-4.12:bpftool-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:bpftool-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:bpftool-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:bpftool-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:bpftool-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:bpftool-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:bpftool-debuginfo-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:bpftool-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:buildah-1:1.23.4-5.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:buildah-1:1.23.4-5.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:buildah-1:1.23.4-5.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:buildah-1:1.23.4-5.1.rhaos4.12.el8.src",
"8Base-RHOSE-4.12:buildah-1:1.23.4-5.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:conmon-2:2.1.2-4.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:conmon-2:2.1.2-4.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:conmon-2:2.1.2-4.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:conmon-2:2.1.2-4.rhaos4.12.el8.src",
"8Base-RHOSE-4.12:conmon-2:2.1.2-4.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-4.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-4.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-4.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-4.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-4.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-4.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-4.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-4.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:containernetworking-plugins-0:1.0.1-7.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:containernetworking-plugins-0:1.0.1-7.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:containernetworking-plugins-0:1.0.1-7.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:containernetworking-plugins-0:1.0.1-7.rhaos4.12.el8.src",
"8Base-RHOSE-4.12:containernetworking-plugins-0:1.0.1-7.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:containernetworking-plugins-debuginfo-0:1.0.1-7.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:containernetworking-plugins-debuginfo-0:1.0.1-7.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:containernetworking-plugins-debuginfo-0:1.0.1-7.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:containernetworking-plugins-debuginfo-0:1.0.1-7.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:containernetworking-plugins-debugsource-0:1.0.1-7.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:containernetworking-plugins-debugsource-0:1.0.1-7.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:containernetworking-plugins-debugsource-0:1.0.1-7.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:containernetworking-plugins-debugsource-0:1.0.1-7.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:kernel-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-0:4.18.0-372.59.1.el8_6.src",
"8Base-RHOSE-4.12:kernel-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-core-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-core-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-core-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-core-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-cross-headers-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-cross-headers-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-cross-headers-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-cross-headers-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-debug-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-debug-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-debug-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-debug-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-debug-core-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-debug-core-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-debug-core-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-debug-core-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-debug-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-debug-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-debug-debuginfo-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-debug-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-debug-devel-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-debug-devel-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-debug-devel-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-debug-devel-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-debug-modules-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-debug-modules-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-debug-modules-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-debug-modules-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-debug-modules-extra-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-debug-modules-extra-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-debug-modules-extra-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-debug-modules-extra-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-debug-modules-internal-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-debug-modules-internal-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-debug-modules-internal-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-debug-modules-internal-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-debuginfo-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-debuginfo-common-aarch64-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-debuginfo-common-ppc64le-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-debuginfo-common-s390x-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-debuginfo-common-x86_64-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-devel-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-devel-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-devel-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-devel-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-doc-0:4.18.0-372.59.1.el8_6.noarch",
"8Base-RHOSE-4.12:kernel-headers-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-headers-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-headers-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-headers-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-ipaclones-internal-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-ipaclones-internal-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-modules-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-modules-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-modules-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-modules-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-modules-extra-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-modules-extra-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-modules-extra-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-modules-extra-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-modules-internal-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-modules-internal-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-modules-internal-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-modules-internal-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-0:4.18.0-372.59.1.rt7.217.el8_6.src",
"8Base-RHOSE-4.12:kernel-rt-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-core-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debug-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debug-core-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debug-debuginfo-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debug-devel-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debug-kvm-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debug-modules-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debug-modules-extra-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debug-modules-internal-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debuginfo-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-devel-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-kvm-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-modules-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-modules-extra-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-modules-internal-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-selftests-internal-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-selftests-internal-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-selftests-internal-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-selftests-internal-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-selftests-internal-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-tools-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-tools-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-tools-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-tools-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-tools-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-tools-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-tools-debuginfo-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-tools-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-tools-libs-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-tools-libs-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-tools-libs-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-tools-libs-devel-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-tools-libs-devel-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-tools-libs-devel-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-zfcpdump-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-zfcpdump-core-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-zfcpdump-debuginfo-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-zfcpdump-devel-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-zfcpdump-modules-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-zfcpdump-modules-extra-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-zfcpdump-modules-internal-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:openshift-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el8.src",
"8Base-RHOSE-4.12:openshift-ansible-0:4.12.0-202306090942.p0.g74dc7b3.assembly.stream.el8.noarch",
"8Base-RHOSE-4.12:openshift-ansible-0:4.12.0-202306090942.p0.g74dc7b3.assembly.stream.el8.src",
"8Base-RHOSE-4.12:openshift-ansible-test-0:4.12.0-202306090942.p0.g74dc7b3.assembly.stream.el8.noarch",
"8Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.aarch64",
"8Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.ppc64le",
"8Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.s390x",
"8Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.src",
"8Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.x86_64",
"8Base-RHOSE-4.12:openshift-clients-redistributable-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.x86_64",
"8Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el8.aarch64",
"8Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el8.ppc64le",
"8Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el8.s390x",
"8Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el8.x86_64",
"8Base-RHOSE-4.12:openshift-kuryr-0:4.12.0-202306140156.p0.g31dd228.assembly.stream.el8.src",
"8Base-RHOSE-4.12:openshift-kuryr-cni-0:4.12.0-202306140156.p0.g31dd228.assembly.stream.el8.noarch",
"8Base-RHOSE-4.12:openshift-kuryr-common-0:4.12.0-202306140156.p0.g31dd228.assembly.stream.el8.noarch",
"8Base-RHOSE-4.12:openshift-kuryr-controller-0:4.12.0-202306140156.p0.g31dd228.assembly.stream.el8.noarch",
"8Base-RHOSE-4.12:openshift4-aws-iso-0:4.12.0-202306090942.p0.gd2acdd5.assembly.stream.el8.noarch",
"8Base-RHOSE-4.12:openshift4-aws-iso-0:4.12.0-202306090942.p0.gd2acdd5.assembly.stream.el8.src",
"8Base-RHOSE-4.12:perf-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:perf-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:perf-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:perf-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:perf-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:perf-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:perf-debuginfo-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:perf-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:python3-kuryr-kubernetes-0:4.12.0-202306140156.p0.g31dd228.assembly.stream.el8.noarch",
"8Base-RHOSE-4.12:python3-perf-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:python3-perf-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:python3-perf-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:python3-perf-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:python3-perf-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:python3-perf-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:python3-perf-debuginfo-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:python3-perf-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:skopeo-2:1.9.4-3.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:skopeo-2:1.9.4-3.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:skopeo-2:1.9.4-3.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:skopeo-2:1.9.4-3.1.rhaos4.12.el8.src",
"8Base-RHOSE-4.12:skopeo-2:1.9.4-3.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.1.rhaos4.12.el8.x86_64",
"9Base-RHOSE-4.12:buildah-1:1.23.4-5.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:buildah-1:1.23.4-5.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:buildah-1:1.23.4-5.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:buildah-1:1.23.4-5.rhaos4.12.el9.src",
"9Base-RHOSE-4.12:buildah-1:1.23.4-5.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:conmon-2:2.1.2-5.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:conmon-2:2.1.2-5.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:conmon-2:2.1.2-5.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:conmon-2:2.1.2-5.rhaos4.12.el9.src",
"9Base-RHOSE-4.12:conmon-2:2.1.2-5.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-5.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-5.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-5.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-5.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-5.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-5.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-5.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-5.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:openshift-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el9.src",
"9Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.aarch64",
"9Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.ppc64le",
"9Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.s390x",
"9Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.src",
"9Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.x86_64",
"9Base-RHOSE-4.12:openshift-clients-redistributable-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.x86_64",
"9Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el9.aarch64",
"9Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el9.ppc64le",
"9Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el9.s390x",
"9Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el9.x86_64",
"9Base-RHOSE-4.12:skopeo-2:1.9.4-3.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:skopeo-2:1.9.4-3.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:skopeo-2:1.9.4-3.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:skopeo-2:1.9.4-3.rhaos4.12.el9.src",
"9Base-RHOSE-4.12:skopeo-2:1.9.4-3.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.rhaos4.12.el9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-32190"
},
{
"category": "external",
"summary": "RHBZ#2124668",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2124668"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-32190",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32190"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-32190",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-32190"
},
{
"category": "external",
"summary": "https://go.dev/issue/54385",
"url": "https://go.dev/issue/54385"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/x49AQzIVX-s/m/0tgO0pjiBQAJ",
"url": "https://groups.google.com/g/golang-announce/c/x49AQzIVX-s/m/0tgO0pjiBQAJ"
}
],
"release_date": "2022-09-06T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-06-26T01:19:15+00:00",
"details": "For OpenShift Container Platform 4.12 see the following documentation, which will be updated shortly for this release, for important instructions on how to upgrade your cluster and fully apply this asynchronous errata update:\n\nhttps://docs.openshift.com/container-platform/4.12/release_notes/ocp-4-12-release-notes.html",
"product_ids": [
"8Base-RHOSE-4.12:podman-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-3:4.2.0-6.1.rhaos4.12.el8.src",
"8Base-RHOSE-4.12:podman-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-catatonit-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-catatonit-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-catatonit-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-catatonit-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-debugsource-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-debugsource-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-debugsource-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-debugsource-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-docker-3:4.2.0-6.1.rhaos4.12.el8.noarch",
"8Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-plugins-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-plugins-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-plugins-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-plugins-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-remote-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-remote-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-remote-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-remote-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-tests-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-tests-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-tests-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-tests-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:runc-3:1.1.6-4.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:runc-3:1.1.6-4.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:runc-3:1.1.6-4.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:runc-3:1.1.6-4.rhaos4.12.el8.src",
"8Base-RHOSE-4.12:runc-3:1.1.6-4.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:runc-debuginfo-3:1.1.6-4.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:runc-debuginfo-3:1.1.6-4.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:runc-debuginfo-3:1.1.6-4.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:runc-debuginfo-3:1.1.6-4.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:runc-debugsource-3:1.1.6-4.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:runc-debugsource-3:1.1.6-4.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:runc-debugsource-3:1.1.6-4.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:runc-debugsource-3:1.1.6-4.rhaos4.12.el8.x86_64",
"9Base-RHOSE-4.12:podman-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-3:4.2.0-7.rhaos4.12.el9.src",
"9Base-RHOSE-4.12:podman-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-catatonit-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-catatonit-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-catatonit-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-catatonit-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-debugsource-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-debugsource-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-debugsource-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-debugsource-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-docker-3:4.2.0-7.rhaos4.12.el9.noarch",
"9Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-plugins-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-plugins-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-plugins-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-plugins-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-remote-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-remote-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-remote-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-remote-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-tests-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-tests-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-tests-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-tests-3:4.2.0-7.rhaos4.12.el9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:3613"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"8Base-RHOSE-4.12:bpftool-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:bpftool-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:bpftool-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:bpftool-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:bpftool-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:bpftool-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:bpftool-debuginfo-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:bpftool-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:buildah-1:1.23.4-5.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:buildah-1:1.23.4-5.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:buildah-1:1.23.4-5.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:buildah-1:1.23.4-5.1.rhaos4.12.el8.src",
"8Base-RHOSE-4.12:buildah-1:1.23.4-5.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:conmon-2:2.1.2-4.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:conmon-2:2.1.2-4.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:conmon-2:2.1.2-4.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:conmon-2:2.1.2-4.rhaos4.12.el8.src",
"8Base-RHOSE-4.12:conmon-2:2.1.2-4.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-4.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-4.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-4.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-4.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-4.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-4.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-4.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-4.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:containernetworking-plugins-0:1.0.1-7.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:containernetworking-plugins-0:1.0.1-7.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:containernetworking-plugins-0:1.0.1-7.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:containernetworking-plugins-0:1.0.1-7.rhaos4.12.el8.src",
"8Base-RHOSE-4.12:containernetworking-plugins-0:1.0.1-7.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:containernetworking-plugins-debuginfo-0:1.0.1-7.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:containernetworking-plugins-debuginfo-0:1.0.1-7.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:containernetworking-plugins-debuginfo-0:1.0.1-7.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:containernetworking-plugins-debuginfo-0:1.0.1-7.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:containernetworking-plugins-debugsource-0:1.0.1-7.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:containernetworking-plugins-debugsource-0:1.0.1-7.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:containernetworking-plugins-debugsource-0:1.0.1-7.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:containernetworking-plugins-debugsource-0:1.0.1-7.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:kernel-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-0:4.18.0-372.59.1.el8_6.src",
"8Base-RHOSE-4.12:kernel-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-core-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-core-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-core-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-core-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-cross-headers-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-cross-headers-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-cross-headers-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-cross-headers-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-debug-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-debug-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-debug-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-debug-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-debug-core-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-debug-core-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-debug-core-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-debug-core-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-debug-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-debug-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-debug-debuginfo-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-debug-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-debug-devel-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-debug-devel-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-debug-devel-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-debug-devel-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-debug-modules-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-debug-modules-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-debug-modules-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-debug-modules-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-debug-modules-extra-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-debug-modules-extra-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-debug-modules-extra-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-debug-modules-extra-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-debug-modules-internal-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-debug-modules-internal-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-debug-modules-internal-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-debug-modules-internal-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-debuginfo-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-debuginfo-common-aarch64-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-debuginfo-common-ppc64le-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-debuginfo-common-s390x-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-debuginfo-common-x86_64-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-devel-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-devel-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-devel-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-devel-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-doc-0:4.18.0-372.59.1.el8_6.noarch",
"8Base-RHOSE-4.12:kernel-headers-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-headers-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-headers-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-headers-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-ipaclones-internal-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-ipaclones-internal-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-modules-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-modules-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-modules-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-modules-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-modules-extra-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-modules-extra-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-modules-extra-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-modules-extra-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-modules-internal-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-modules-internal-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-modules-internal-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-modules-internal-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-0:4.18.0-372.59.1.rt7.217.el8_6.src",
"8Base-RHOSE-4.12:kernel-rt-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-core-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debug-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debug-core-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debug-debuginfo-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debug-devel-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debug-kvm-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debug-modules-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debug-modules-extra-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debug-modules-internal-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debuginfo-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-devel-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-kvm-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-modules-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-modules-extra-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-modules-internal-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-selftests-internal-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-selftests-internal-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-selftests-internal-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-selftests-internal-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-selftests-internal-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-tools-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-tools-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-tools-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-tools-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-tools-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-tools-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-tools-debuginfo-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-tools-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-tools-libs-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-tools-libs-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-tools-libs-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-tools-libs-devel-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-tools-libs-devel-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-tools-libs-devel-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-zfcpdump-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-zfcpdump-core-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-zfcpdump-debuginfo-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-zfcpdump-devel-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-zfcpdump-modules-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-zfcpdump-modules-extra-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-zfcpdump-modules-internal-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:openshift-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el8.src",
"8Base-RHOSE-4.12:openshift-ansible-0:4.12.0-202306090942.p0.g74dc7b3.assembly.stream.el8.noarch",
"8Base-RHOSE-4.12:openshift-ansible-0:4.12.0-202306090942.p0.g74dc7b3.assembly.stream.el8.src",
"8Base-RHOSE-4.12:openshift-ansible-test-0:4.12.0-202306090942.p0.g74dc7b3.assembly.stream.el8.noarch",
"8Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.aarch64",
"8Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.ppc64le",
"8Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.s390x",
"8Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.src",
"8Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.x86_64",
"8Base-RHOSE-4.12:openshift-clients-redistributable-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.x86_64",
"8Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el8.aarch64",
"8Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el8.ppc64le",
"8Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el8.s390x",
"8Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el8.x86_64",
"8Base-RHOSE-4.12:openshift-kuryr-0:4.12.0-202306140156.p0.g31dd228.assembly.stream.el8.src",
"8Base-RHOSE-4.12:openshift-kuryr-cni-0:4.12.0-202306140156.p0.g31dd228.assembly.stream.el8.noarch",
"8Base-RHOSE-4.12:openshift-kuryr-common-0:4.12.0-202306140156.p0.g31dd228.assembly.stream.el8.noarch",
"8Base-RHOSE-4.12:openshift-kuryr-controller-0:4.12.0-202306140156.p0.g31dd228.assembly.stream.el8.noarch",
"8Base-RHOSE-4.12:openshift4-aws-iso-0:4.12.0-202306090942.p0.gd2acdd5.assembly.stream.el8.noarch",
"8Base-RHOSE-4.12:openshift4-aws-iso-0:4.12.0-202306090942.p0.gd2acdd5.assembly.stream.el8.src",
"8Base-RHOSE-4.12:perf-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:perf-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:perf-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:perf-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:perf-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:perf-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:perf-debuginfo-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:perf-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:podman-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-3:4.2.0-6.1.rhaos4.12.el8.src",
"8Base-RHOSE-4.12:podman-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-catatonit-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-catatonit-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-catatonit-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-catatonit-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-debugsource-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-debugsource-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-debugsource-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-debugsource-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-docker-3:4.2.0-6.1.rhaos4.12.el8.noarch",
"8Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-plugins-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-plugins-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-plugins-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-plugins-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-remote-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-remote-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-remote-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-remote-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-tests-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-tests-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-tests-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-tests-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:python3-kuryr-kubernetes-0:4.12.0-202306140156.p0.g31dd228.assembly.stream.el8.noarch",
"8Base-RHOSE-4.12:python3-perf-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:python3-perf-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:python3-perf-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:python3-perf-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:python3-perf-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:python3-perf-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:python3-perf-debuginfo-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:python3-perf-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:runc-3:1.1.6-4.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:runc-3:1.1.6-4.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:runc-3:1.1.6-4.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:runc-3:1.1.6-4.rhaos4.12.el8.src",
"8Base-RHOSE-4.12:runc-3:1.1.6-4.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:runc-debuginfo-3:1.1.6-4.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:runc-debuginfo-3:1.1.6-4.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:runc-debuginfo-3:1.1.6-4.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:runc-debuginfo-3:1.1.6-4.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:runc-debugsource-3:1.1.6-4.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:runc-debugsource-3:1.1.6-4.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:runc-debugsource-3:1.1.6-4.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:runc-debugsource-3:1.1.6-4.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:skopeo-2:1.9.4-3.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:skopeo-2:1.9.4-3.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:skopeo-2:1.9.4-3.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:skopeo-2:1.9.4-3.1.rhaos4.12.el8.src",
"8Base-RHOSE-4.12:skopeo-2:1.9.4-3.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.1.rhaos4.12.el8.x86_64",
"9Base-RHOSE-4.12:buildah-1:1.23.4-5.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:buildah-1:1.23.4-5.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:buildah-1:1.23.4-5.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:buildah-1:1.23.4-5.rhaos4.12.el9.src",
"9Base-RHOSE-4.12:buildah-1:1.23.4-5.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:conmon-2:2.1.2-5.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:conmon-2:2.1.2-5.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:conmon-2:2.1.2-5.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:conmon-2:2.1.2-5.rhaos4.12.el9.src",
"9Base-RHOSE-4.12:conmon-2:2.1.2-5.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-5.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-5.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-5.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-5.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-5.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-5.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-5.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-5.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:openshift-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el9.src",
"9Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.aarch64",
"9Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.ppc64le",
"9Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.s390x",
"9Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.src",
"9Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.x86_64",
"9Base-RHOSE-4.12:openshift-clients-redistributable-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.x86_64",
"9Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el9.aarch64",
"9Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el9.ppc64le",
"9Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el9.s390x",
"9Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el9.x86_64",
"9Base-RHOSE-4.12:podman-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-3:4.2.0-7.rhaos4.12.el9.src",
"9Base-RHOSE-4.12:podman-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-catatonit-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-catatonit-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-catatonit-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-catatonit-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-debugsource-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-debugsource-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-debugsource-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-debugsource-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-docker-3:4.2.0-7.rhaos4.12.el9.noarch",
"9Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-plugins-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-plugins-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-plugins-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-plugins-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-remote-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-remote-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-remote-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-remote-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-tests-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-tests-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-tests-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-tests-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:skopeo-2:1.9.4-3.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:skopeo-2:1.9.4-3.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:skopeo-2:1.9.4-3.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:skopeo-2:1.9.4-3.rhaos4.12.el9.src",
"9Base-RHOSE-4.12:skopeo-2:1.9.4-3.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.rhaos4.12.el9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "golang: net/url: JoinPath does not strip relative path components in all circumstances"
},
{
"acknowledgments": [
{
"names": [
"Adam Korczynski"
],
"organization": "ADA Logics"
},
{
"names": [
"OSS-Fuzz"
]
}
],
"cve": "CVE-2022-41715",
"discovery_date": "2022-10-07T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-RHOSE-4.12:bpftool-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:bpftool-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:bpftool-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:bpftool-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:bpftool-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:bpftool-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:bpftool-debuginfo-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:bpftool-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:buildah-1:1.23.4-5.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:buildah-1:1.23.4-5.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:buildah-1:1.23.4-5.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:buildah-1:1.23.4-5.1.rhaos4.12.el8.src",
"8Base-RHOSE-4.12:buildah-1:1.23.4-5.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:containernetworking-plugins-0:1.0.1-7.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:containernetworking-plugins-0:1.0.1-7.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:containernetworking-plugins-0:1.0.1-7.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:containernetworking-plugins-0:1.0.1-7.rhaos4.12.el8.src",
"8Base-RHOSE-4.12:containernetworking-plugins-0:1.0.1-7.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:containernetworking-plugins-debuginfo-0:1.0.1-7.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:containernetworking-plugins-debuginfo-0:1.0.1-7.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:containernetworking-plugins-debuginfo-0:1.0.1-7.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:containernetworking-plugins-debuginfo-0:1.0.1-7.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:containernetworking-plugins-debugsource-0:1.0.1-7.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:containernetworking-plugins-debugsource-0:1.0.1-7.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:containernetworking-plugins-debugsource-0:1.0.1-7.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:containernetworking-plugins-debugsource-0:1.0.1-7.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:kernel-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-0:4.18.0-372.59.1.el8_6.src",
"8Base-RHOSE-4.12:kernel-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-core-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-core-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-core-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-core-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-cross-headers-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-cross-headers-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-cross-headers-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-cross-headers-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-debug-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-debug-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-debug-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-debug-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-debug-core-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-debug-core-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-debug-core-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-debug-core-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-debug-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-debug-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-debug-debuginfo-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-debug-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-debug-devel-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-debug-devel-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-debug-devel-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-debug-devel-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-debug-modules-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-debug-modules-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-debug-modules-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-debug-modules-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-debug-modules-extra-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-debug-modules-extra-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-debug-modules-extra-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-debug-modules-extra-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-debug-modules-internal-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-debug-modules-internal-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-debug-modules-internal-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-debug-modules-internal-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-debuginfo-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-debuginfo-common-aarch64-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-debuginfo-common-ppc64le-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-debuginfo-common-s390x-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-debuginfo-common-x86_64-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-devel-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-devel-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-devel-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-devel-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-doc-0:4.18.0-372.59.1.el8_6.noarch",
"8Base-RHOSE-4.12:kernel-headers-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-headers-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-headers-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-headers-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-ipaclones-internal-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-ipaclones-internal-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-modules-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-modules-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-modules-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-modules-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-modules-extra-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-modules-extra-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-modules-extra-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-modules-extra-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-modules-internal-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-modules-internal-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-modules-internal-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-modules-internal-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-0:4.18.0-372.59.1.rt7.217.el8_6.src",
"8Base-RHOSE-4.12:kernel-rt-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-core-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debug-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debug-core-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debug-debuginfo-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debug-devel-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debug-kvm-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debug-modules-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debug-modules-extra-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debug-modules-internal-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debuginfo-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-devel-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-kvm-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-modules-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-modules-extra-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-modules-internal-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-selftests-internal-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-selftests-internal-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-selftests-internal-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-selftests-internal-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-selftests-internal-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-tools-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-tools-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-tools-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-tools-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-tools-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-tools-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-tools-debuginfo-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-tools-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-tools-libs-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-tools-libs-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-tools-libs-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-tools-libs-devel-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-tools-libs-devel-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-tools-libs-devel-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-zfcpdump-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-zfcpdump-core-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-zfcpdump-debuginfo-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-zfcpdump-devel-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-zfcpdump-modules-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-zfcpdump-modules-extra-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-zfcpdump-modules-internal-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:openshift-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el8.src",
"8Base-RHOSE-4.12:openshift-ansible-0:4.12.0-202306090942.p0.g74dc7b3.assembly.stream.el8.noarch",
"8Base-RHOSE-4.12:openshift-ansible-0:4.12.0-202306090942.p0.g74dc7b3.assembly.stream.el8.src",
"8Base-RHOSE-4.12:openshift-ansible-test-0:4.12.0-202306090942.p0.g74dc7b3.assembly.stream.el8.noarch",
"8Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.aarch64",
"8Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.ppc64le",
"8Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.s390x",
"8Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.src",
"8Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.x86_64",
"8Base-RHOSE-4.12:openshift-clients-redistributable-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.x86_64",
"8Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el8.aarch64",
"8Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el8.ppc64le",
"8Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el8.s390x",
"8Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el8.x86_64",
"8Base-RHOSE-4.12:openshift-kuryr-0:4.12.0-202306140156.p0.g31dd228.assembly.stream.el8.src",
"8Base-RHOSE-4.12:openshift-kuryr-cni-0:4.12.0-202306140156.p0.g31dd228.assembly.stream.el8.noarch",
"8Base-RHOSE-4.12:openshift-kuryr-common-0:4.12.0-202306140156.p0.g31dd228.assembly.stream.el8.noarch",
"8Base-RHOSE-4.12:openshift-kuryr-controller-0:4.12.0-202306140156.p0.g31dd228.assembly.stream.el8.noarch",
"8Base-RHOSE-4.12:openshift4-aws-iso-0:4.12.0-202306090942.p0.gd2acdd5.assembly.stream.el8.noarch",
"8Base-RHOSE-4.12:openshift4-aws-iso-0:4.12.0-202306090942.p0.gd2acdd5.assembly.stream.el8.src",
"8Base-RHOSE-4.12:perf-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:perf-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:perf-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:perf-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:perf-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:perf-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:perf-debuginfo-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:perf-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:python3-kuryr-kubernetes-0:4.12.0-202306140156.p0.g31dd228.assembly.stream.el8.noarch",
"8Base-RHOSE-4.12:python3-perf-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:python3-perf-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:python3-perf-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:python3-perf-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:python3-perf-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:python3-perf-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:python3-perf-debuginfo-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:python3-perf-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64",
"9Base-RHOSE-4.12:buildah-1:1.23.4-5.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:buildah-1:1.23.4-5.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:buildah-1:1.23.4-5.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:buildah-1:1.23.4-5.rhaos4.12.el9.src",
"9Base-RHOSE-4.12:buildah-1:1.23.4-5.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:openshift-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el9.src",
"9Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.aarch64",
"9Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.ppc64le",
"9Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.s390x",
"9Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.src",
"9Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.x86_64",
"9Base-RHOSE-4.12:openshift-clients-redistributable-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.x86_64",
"9Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el9.aarch64",
"9Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el9.ppc64le",
"9Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el9.s390x",
"9Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el9.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2132872"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the golang package, where programs that compile regular expressions from untrusted sources are vulnerable to memory exhaustion or a denial of service. The parsed regexp representation is linear in the input size. Still, in some cases, the constant factor can be as high as 40,000, making a relatively small regexp consume larger amounts of memory. After the fix, each regexp being parsed is limited to a 256 MB memory footprint. Regular expressions whose representation would use more space than that are rejected. Routine use of regular expressions is unaffected.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: regexp/syntax: limit memory used by parsing regexps",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The opportunity for a Denial of Service is limited to the golang runtime. In the case of OpenShift Container Platform, this would be restricted within each individual container. There are multiple layers of guide rails (Golang\u2019s Garbage Collector; OpenShift\u2019s resource constraints imposed at the container and cluster levels) which would require a malicious user to continue submitting attacks for there to be any enduring impact. They would also need access to external server resources to be able to send a massive volume of requests to cause a significant impact on server operations.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-RHOSE-4.12:conmon-2:2.1.2-4.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:conmon-2:2.1.2-4.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:conmon-2:2.1.2-4.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:conmon-2:2.1.2-4.rhaos4.12.el8.src",
"8Base-RHOSE-4.12:conmon-2:2.1.2-4.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-4.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-4.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-4.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-4.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-4.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-4.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-4.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-4.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-3:4.2.0-6.1.rhaos4.12.el8.src",
"8Base-RHOSE-4.12:podman-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-catatonit-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-catatonit-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-catatonit-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-catatonit-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-debugsource-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-debugsource-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-debugsource-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-debugsource-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-docker-3:4.2.0-6.1.rhaos4.12.el8.noarch",
"8Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-plugins-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-plugins-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-plugins-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-plugins-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-remote-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-remote-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-remote-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-remote-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-tests-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-tests-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-tests-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-tests-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:runc-3:1.1.6-4.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:runc-3:1.1.6-4.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:runc-3:1.1.6-4.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:runc-3:1.1.6-4.rhaos4.12.el8.src",
"8Base-RHOSE-4.12:runc-3:1.1.6-4.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:runc-debuginfo-3:1.1.6-4.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:runc-debuginfo-3:1.1.6-4.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:runc-debuginfo-3:1.1.6-4.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:runc-debuginfo-3:1.1.6-4.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:runc-debugsource-3:1.1.6-4.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:runc-debugsource-3:1.1.6-4.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:runc-debugsource-3:1.1.6-4.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:runc-debugsource-3:1.1.6-4.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:skopeo-2:1.9.4-3.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:skopeo-2:1.9.4-3.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:skopeo-2:1.9.4-3.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:skopeo-2:1.9.4-3.1.rhaos4.12.el8.src",
"8Base-RHOSE-4.12:skopeo-2:1.9.4-3.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.1.rhaos4.12.el8.x86_64",
"9Base-RHOSE-4.12:conmon-2:2.1.2-5.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:conmon-2:2.1.2-5.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:conmon-2:2.1.2-5.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:conmon-2:2.1.2-5.rhaos4.12.el9.src",
"9Base-RHOSE-4.12:conmon-2:2.1.2-5.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-5.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-5.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-5.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-5.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-5.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-5.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-5.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-5.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-3:4.2.0-7.rhaos4.12.el9.src",
"9Base-RHOSE-4.12:podman-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-catatonit-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-catatonit-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-catatonit-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-catatonit-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-debugsource-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-debugsource-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-debugsource-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-debugsource-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-docker-3:4.2.0-7.rhaos4.12.el9.noarch",
"9Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-plugins-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-plugins-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-plugins-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-plugins-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-remote-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-remote-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-remote-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-remote-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-tests-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-tests-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-tests-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-tests-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:skopeo-2:1.9.4-3.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:skopeo-2:1.9.4-3.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:skopeo-2:1.9.4-3.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:skopeo-2:1.9.4-3.rhaos4.12.el9.src",
"9Base-RHOSE-4.12:skopeo-2:1.9.4-3.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.rhaos4.12.el9.x86_64"
],
"known_not_affected": [
"8Base-RHOSE-4.12:bpftool-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:bpftool-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:bpftool-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:bpftool-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:bpftool-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:bpftool-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:bpftool-debuginfo-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:bpftool-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:buildah-1:1.23.4-5.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:buildah-1:1.23.4-5.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:buildah-1:1.23.4-5.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:buildah-1:1.23.4-5.1.rhaos4.12.el8.src",
"8Base-RHOSE-4.12:buildah-1:1.23.4-5.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:containernetworking-plugins-0:1.0.1-7.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:containernetworking-plugins-0:1.0.1-7.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:containernetworking-plugins-0:1.0.1-7.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:containernetworking-plugins-0:1.0.1-7.rhaos4.12.el8.src",
"8Base-RHOSE-4.12:containernetworking-plugins-0:1.0.1-7.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:containernetworking-plugins-debuginfo-0:1.0.1-7.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:containernetworking-plugins-debuginfo-0:1.0.1-7.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:containernetworking-plugins-debuginfo-0:1.0.1-7.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:containernetworking-plugins-debuginfo-0:1.0.1-7.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:containernetworking-plugins-debugsource-0:1.0.1-7.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:containernetworking-plugins-debugsource-0:1.0.1-7.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:containernetworking-plugins-debugsource-0:1.0.1-7.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:containernetworking-plugins-debugsource-0:1.0.1-7.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:kernel-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-0:4.18.0-372.59.1.el8_6.src",
"8Base-RHOSE-4.12:kernel-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-core-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-core-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-core-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-core-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-cross-headers-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-cross-headers-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-cross-headers-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-cross-headers-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-debug-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-debug-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-debug-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-debug-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-debug-core-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-debug-core-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-debug-core-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-debug-core-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-debug-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-debug-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-debug-debuginfo-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-debug-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-debug-devel-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-debug-devel-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-debug-devel-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-debug-devel-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-debug-modules-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-debug-modules-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-debug-modules-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-debug-modules-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-debug-modules-extra-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-debug-modules-extra-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-debug-modules-extra-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-debug-modules-extra-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-debug-modules-internal-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-debug-modules-internal-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-debug-modules-internal-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-debug-modules-internal-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-debuginfo-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-debuginfo-common-aarch64-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-debuginfo-common-ppc64le-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-debuginfo-common-s390x-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-debuginfo-common-x86_64-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-devel-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-devel-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-devel-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-devel-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-doc-0:4.18.0-372.59.1.el8_6.noarch",
"8Base-RHOSE-4.12:kernel-headers-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-headers-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-headers-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-headers-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-ipaclones-internal-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-ipaclones-internal-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-modules-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-modules-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-modules-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-modules-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-modules-extra-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-modules-extra-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-modules-extra-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-modules-extra-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-modules-internal-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-modules-internal-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-modules-internal-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-modules-internal-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-0:4.18.0-372.59.1.rt7.217.el8_6.src",
"8Base-RHOSE-4.12:kernel-rt-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-core-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debug-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debug-core-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debug-debuginfo-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debug-devel-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debug-kvm-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debug-modules-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debug-modules-extra-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debug-modules-internal-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debuginfo-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-devel-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-kvm-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-modules-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-modules-extra-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-modules-internal-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-selftests-internal-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-selftests-internal-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-selftests-internal-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-selftests-internal-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-selftests-internal-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-tools-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-tools-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-tools-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-tools-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-tools-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-tools-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-tools-debuginfo-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-tools-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-tools-libs-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-tools-libs-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-tools-libs-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-tools-libs-devel-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-tools-libs-devel-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-tools-libs-devel-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-zfcpdump-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-zfcpdump-core-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-zfcpdump-debuginfo-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-zfcpdump-devel-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-zfcpdump-modules-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-zfcpdump-modules-extra-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-zfcpdump-modules-internal-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:openshift-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el8.src",
"8Base-RHOSE-4.12:openshift-ansible-0:4.12.0-202306090942.p0.g74dc7b3.assembly.stream.el8.noarch",
"8Base-RHOSE-4.12:openshift-ansible-0:4.12.0-202306090942.p0.g74dc7b3.assembly.stream.el8.src",
"8Base-RHOSE-4.12:openshift-ansible-test-0:4.12.0-202306090942.p0.g74dc7b3.assembly.stream.el8.noarch",
"8Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.aarch64",
"8Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.ppc64le",
"8Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.s390x",
"8Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.src",
"8Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.x86_64",
"8Base-RHOSE-4.12:openshift-clients-redistributable-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.x86_64",
"8Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el8.aarch64",
"8Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el8.ppc64le",
"8Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el8.s390x",
"8Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el8.x86_64",
"8Base-RHOSE-4.12:openshift-kuryr-0:4.12.0-202306140156.p0.g31dd228.assembly.stream.el8.src",
"8Base-RHOSE-4.12:openshift-kuryr-cni-0:4.12.0-202306140156.p0.g31dd228.assembly.stream.el8.noarch",
"8Base-RHOSE-4.12:openshift-kuryr-common-0:4.12.0-202306140156.p0.g31dd228.assembly.stream.el8.noarch",
"8Base-RHOSE-4.12:openshift-kuryr-controller-0:4.12.0-202306140156.p0.g31dd228.assembly.stream.el8.noarch",
"8Base-RHOSE-4.12:openshift4-aws-iso-0:4.12.0-202306090942.p0.gd2acdd5.assembly.stream.el8.noarch",
"8Base-RHOSE-4.12:openshift4-aws-iso-0:4.12.0-202306090942.p0.gd2acdd5.assembly.stream.el8.src",
"8Base-RHOSE-4.12:perf-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:perf-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:perf-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:perf-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:perf-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:perf-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:perf-debuginfo-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:perf-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:python3-kuryr-kubernetes-0:4.12.0-202306140156.p0.g31dd228.assembly.stream.el8.noarch",
"8Base-RHOSE-4.12:python3-perf-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:python3-perf-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:python3-perf-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:python3-perf-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:python3-perf-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:python3-perf-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:python3-perf-debuginfo-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:python3-perf-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64",
"9Base-RHOSE-4.12:buildah-1:1.23.4-5.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:buildah-1:1.23.4-5.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:buildah-1:1.23.4-5.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:buildah-1:1.23.4-5.rhaos4.12.el9.src",
"9Base-RHOSE-4.12:buildah-1:1.23.4-5.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:openshift-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el9.src",
"9Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.aarch64",
"9Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.ppc64le",
"9Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.s390x",
"9Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.src",
"9Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.x86_64",
"9Base-RHOSE-4.12:openshift-clients-redistributable-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.x86_64",
"9Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el9.aarch64",
"9Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el9.ppc64le",
"9Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el9.s390x",
"9Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-41715"
},
{
"category": "external",
"summary": "RHBZ#2132872",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2132872"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-41715",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41715"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-41715",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-41715"
},
{
"category": "external",
"summary": "https://github.com/golang/go/issues/55949",
"url": "https://github.com/golang/go/issues/55949"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/xtuG5faxtaU?pli=1",
"url": "https://groups.google.com/g/golang-announce/c/xtuG5faxtaU?pli=1"
}
],
"release_date": "2022-10-04T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-06-26T01:19:15+00:00",
"details": "For OpenShift Container Platform 4.12 see the following documentation, which will be updated shortly for this release, for important instructions on how to upgrade your cluster and fully apply this asynchronous errata update:\n\nhttps://docs.openshift.com/container-platform/4.12/release_notes/ocp-4-12-release-notes.html",
"product_ids": [
"8Base-RHOSE-4.12:conmon-2:2.1.2-4.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:conmon-2:2.1.2-4.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:conmon-2:2.1.2-4.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:conmon-2:2.1.2-4.rhaos4.12.el8.src",
"8Base-RHOSE-4.12:conmon-2:2.1.2-4.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-4.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-4.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-4.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-4.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-4.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-4.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-4.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-4.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-3:4.2.0-6.1.rhaos4.12.el8.src",
"8Base-RHOSE-4.12:podman-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-catatonit-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-catatonit-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-catatonit-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-catatonit-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-debugsource-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-debugsource-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-debugsource-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-debugsource-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-docker-3:4.2.0-6.1.rhaos4.12.el8.noarch",
"8Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-plugins-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-plugins-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-plugins-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-plugins-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-remote-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-remote-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-remote-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-remote-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-tests-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-tests-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-tests-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-tests-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:runc-3:1.1.6-4.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:runc-3:1.1.6-4.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:runc-3:1.1.6-4.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:runc-3:1.1.6-4.rhaos4.12.el8.src",
"8Base-RHOSE-4.12:runc-3:1.1.6-4.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:runc-debuginfo-3:1.1.6-4.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:runc-debuginfo-3:1.1.6-4.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:runc-debuginfo-3:1.1.6-4.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:runc-debuginfo-3:1.1.6-4.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:runc-debugsource-3:1.1.6-4.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:runc-debugsource-3:1.1.6-4.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:runc-debugsource-3:1.1.6-4.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:runc-debugsource-3:1.1.6-4.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:skopeo-2:1.9.4-3.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:skopeo-2:1.9.4-3.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:skopeo-2:1.9.4-3.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:skopeo-2:1.9.4-3.1.rhaos4.12.el8.src",
"8Base-RHOSE-4.12:skopeo-2:1.9.4-3.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.1.rhaos4.12.el8.x86_64",
"9Base-RHOSE-4.12:conmon-2:2.1.2-5.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:conmon-2:2.1.2-5.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:conmon-2:2.1.2-5.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:conmon-2:2.1.2-5.rhaos4.12.el9.src",
"9Base-RHOSE-4.12:conmon-2:2.1.2-5.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-5.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-5.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-5.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-5.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-5.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-5.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-5.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-5.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-3:4.2.0-7.rhaos4.12.el9.src",
"9Base-RHOSE-4.12:podman-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-catatonit-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-catatonit-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-catatonit-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-catatonit-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-debugsource-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-debugsource-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-debugsource-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-debugsource-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-docker-3:4.2.0-7.rhaos4.12.el9.noarch",
"9Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-plugins-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-plugins-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-plugins-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-plugins-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-remote-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-remote-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-remote-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-remote-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-tests-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-tests-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-tests-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-tests-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:skopeo-2:1.9.4-3.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:skopeo-2:1.9.4-3.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:skopeo-2:1.9.4-3.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:skopeo-2:1.9.4-3.rhaos4.12.el9.src",
"9Base-RHOSE-4.12:skopeo-2:1.9.4-3.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.rhaos4.12.el9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:3613"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"8Base-RHOSE-4.12:bpftool-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:bpftool-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:bpftool-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:bpftool-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:bpftool-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:bpftool-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:bpftool-debuginfo-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:bpftool-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:buildah-1:1.23.4-5.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:buildah-1:1.23.4-5.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:buildah-1:1.23.4-5.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:buildah-1:1.23.4-5.1.rhaos4.12.el8.src",
"8Base-RHOSE-4.12:buildah-1:1.23.4-5.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:conmon-2:2.1.2-4.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:conmon-2:2.1.2-4.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:conmon-2:2.1.2-4.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:conmon-2:2.1.2-4.rhaos4.12.el8.src",
"8Base-RHOSE-4.12:conmon-2:2.1.2-4.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-4.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-4.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-4.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-4.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-4.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-4.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-4.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-4.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:containernetworking-plugins-0:1.0.1-7.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:containernetworking-plugins-0:1.0.1-7.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:containernetworking-plugins-0:1.0.1-7.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:containernetworking-plugins-0:1.0.1-7.rhaos4.12.el8.src",
"8Base-RHOSE-4.12:containernetworking-plugins-0:1.0.1-7.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:containernetworking-plugins-debuginfo-0:1.0.1-7.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:containernetworking-plugins-debuginfo-0:1.0.1-7.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:containernetworking-plugins-debuginfo-0:1.0.1-7.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:containernetworking-plugins-debuginfo-0:1.0.1-7.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:containernetworking-plugins-debugsource-0:1.0.1-7.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:containernetworking-plugins-debugsource-0:1.0.1-7.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:containernetworking-plugins-debugsource-0:1.0.1-7.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:containernetworking-plugins-debugsource-0:1.0.1-7.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:kernel-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-0:4.18.0-372.59.1.el8_6.src",
"8Base-RHOSE-4.12:kernel-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-core-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-core-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-core-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-core-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-cross-headers-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-cross-headers-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-cross-headers-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-cross-headers-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-debug-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-debug-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-debug-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-debug-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-debug-core-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-debug-core-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-debug-core-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-debug-core-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-debug-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-debug-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-debug-debuginfo-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-debug-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-debug-devel-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-debug-devel-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-debug-devel-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-debug-devel-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-debug-modules-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-debug-modules-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-debug-modules-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-debug-modules-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-debug-modules-extra-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-debug-modules-extra-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-debug-modules-extra-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-debug-modules-extra-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-debug-modules-internal-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-debug-modules-internal-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-debug-modules-internal-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-debug-modules-internal-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-debuginfo-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-debuginfo-common-aarch64-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-debuginfo-common-ppc64le-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-debuginfo-common-s390x-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-debuginfo-common-x86_64-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-devel-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-devel-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-devel-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-devel-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-doc-0:4.18.0-372.59.1.el8_6.noarch",
"8Base-RHOSE-4.12:kernel-headers-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-headers-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-headers-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-headers-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-ipaclones-internal-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-ipaclones-internal-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-modules-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-modules-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-modules-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-modules-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-modules-extra-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-modules-extra-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-modules-extra-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-modules-extra-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-modules-internal-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-modules-internal-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-modules-internal-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-modules-internal-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-0:4.18.0-372.59.1.rt7.217.el8_6.src",
"8Base-RHOSE-4.12:kernel-rt-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-core-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debug-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debug-core-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debug-debuginfo-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debug-devel-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debug-kvm-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debug-modules-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debug-modules-extra-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debug-modules-internal-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debuginfo-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-devel-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-kvm-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-modules-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-modules-extra-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-modules-internal-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-selftests-internal-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-selftests-internal-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-selftests-internal-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-selftests-internal-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-selftests-internal-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-tools-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-tools-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-tools-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-tools-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-tools-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-tools-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-tools-debuginfo-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-tools-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-tools-libs-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-tools-libs-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-tools-libs-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-tools-libs-devel-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-tools-libs-devel-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-tools-libs-devel-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-zfcpdump-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-zfcpdump-core-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-zfcpdump-debuginfo-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-zfcpdump-devel-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-zfcpdump-modules-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-zfcpdump-modules-extra-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-zfcpdump-modules-internal-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:openshift-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el8.src",
"8Base-RHOSE-4.12:openshift-ansible-0:4.12.0-202306090942.p0.g74dc7b3.assembly.stream.el8.noarch",
"8Base-RHOSE-4.12:openshift-ansible-0:4.12.0-202306090942.p0.g74dc7b3.assembly.stream.el8.src",
"8Base-RHOSE-4.12:openshift-ansible-test-0:4.12.0-202306090942.p0.g74dc7b3.assembly.stream.el8.noarch",
"8Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.aarch64",
"8Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.ppc64le",
"8Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.s390x",
"8Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.src",
"8Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.x86_64",
"8Base-RHOSE-4.12:openshift-clients-redistributable-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.x86_64",
"8Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el8.aarch64",
"8Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el8.ppc64le",
"8Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el8.s390x",
"8Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el8.x86_64",
"8Base-RHOSE-4.12:openshift-kuryr-0:4.12.0-202306140156.p0.g31dd228.assembly.stream.el8.src",
"8Base-RHOSE-4.12:openshift-kuryr-cni-0:4.12.0-202306140156.p0.g31dd228.assembly.stream.el8.noarch",
"8Base-RHOSE-4.12:openshift-kuryr-common-0:4.12.0-202306140156.p0.g31dd228.assembly.stream.el8.noarch",
"8Base-RHOSE-4.12:openshift-kuryr-controller-0:4.12.0-202306140156.p0.g31dd228.assembly.stream.el8.noarch",
"8Base-RHOSE-4.12:openshift4-aws-iso-0:4.12.0-202306090942.p0.gd2acdd5.assembly.stream.el8.noarch",
"8Base-RHOSE-4.12:openshift4-aws-iso-0:4.12.0-202306090942.p0.gd2acdd5.assembly.stream.el8.src",
"8Base-RHOSE-4.12:perf-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:perf-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:perf-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:perf-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:perf-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:perf-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:perf-debuginfo-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:perf-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:podman-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-3:4.2.0-6.1.rhaos4.12.el8.src",
"8Base-RHOSE-4.12:podman-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-catatonit-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-catatonit-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-catatonit-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-catatonit-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-debugsource-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-debugsource-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-debugsource-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-debugsource-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-docker-3:4.2.0-6.1.rhaos4.12.el8.noarch",
"8Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-plugins-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-plugins-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-plugins-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-plugins-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-remote-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-remote-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-remote-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-remote-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:podman-tests-3:4.2.0-6.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:podman-tests-3:4.2.0-6.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:podman-tests-3:4.2.0-6.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:podman-tests-3:4.2.0-6.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:python3-kuryr-kubernetes-0:4.12.0-202306140156.p0.g31dd228.assembly.stream.el8.noarch",
"8Base-RHOSE-4.12:python3-perf-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:python3-perf-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:python3-perf-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:python3-perf-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:python3-perf-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64",
"8Base-RHOSE-4.12:python3-perf-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:python3-perf-debuginfo-0:4.18.0-372.59.1.el8_6.s390x",
"8Base-RHOSE-4.12:python3-perf-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64",
"8Base-RHOSE-4.12:runc-3:1.1.6-4.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:runc-3:1.1.6-4.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:runc-3:1.1.6-4.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:runc-3:1.1.6-4.rhaos4.12.el8.src",
"8Base-RHOSE-4.12:runc-3:1.1.6-4.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:runc-debuginfo-3:1.1.6-4.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:runc-debuginfo-3:1.1.6-4.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:runc-debuginfo-3:1.1.6-4.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:runc-debuginfo-3:1.1.6-4.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:runc-debugsource-3:1.1.6-4.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:runc-debugsource-3:1.1.6-4.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:runc-debugsource-3:1.1.6-4.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:runc-debugsource-3:1.1.6-4.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:skopeo-2:1.9.4-3.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:skopeo-2:1.9.4-3.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:skopeo-2:1.9.4-3.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:skopeo-2:1.9.4-3.1.rhaos4.12.el8.src",
"8Base-RHOSE-4.12:skopeo-2:1.9.4-3.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.1.rhaos4.12.el8.x86_64",
"8Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.1.rhaos4.12.el8.aarch64",
"8Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.1.rhaos4.12.el8.ppc64le",
"8Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.1.rhaos4.12.el8.s390x",
"8Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.1.rhaos4.12.el8.x86_64",
"9Base-RHOSE-4.12:buildah-1:1.23.4-5.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:buildah-1:1.23.4-5.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:buildah-1:1.23.4-5.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:buildah-1:1.23.4-5.rhaos4.12.el9.src",
"9Base-RHOSE-4.12:buildah-1:1.23.4-5.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:conmon-2:2.1.2-5.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:conmon-2:2.1.2-5.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:conmon-2:2.1.2-5.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:conmon-2:2.1.2-5.rhaos4.12.el9.src",
"9Base-RHOSE-4.12:conmon-2:2.1.2-5.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-5.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-5.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-5.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-5.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-5.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-5.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-5.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-5.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:openshift-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el9.src",
"9Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.aarch64",
"9Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.ppc64le",
"9Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.s390x",
"9Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.src",
"9Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.x86_64",
"9Base-RHOSE-4.12:openshift-clients-redistributable-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.x86_64",
"9Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el9.aarch64",
"9Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el9.ppc64le",
"9Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el9.s390x",
"9Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el9.x86_64",
"9Base-RHOSE-4.12:podman-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-3:4.2.0-7.rhaos4.12.el9.src",
"9Base-RHOSE-4.12:podman-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-catatonit-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-catatonit-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-catatonit-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-catatonit-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-debugsource-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-debugsource-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-debugsource-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-debugsource-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-docker-3:4.2.0-7.rhaos4.12.el9.noarch",
"9Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-plugins-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-plugins-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-plugins-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-plugins-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-remote-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-remote-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-remote-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-remote-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:podman-tests-3:4.2.0-7.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:podman-tests-3:4.2.0-7.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:podman-tests-3:4.2.0-7.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:podman-tests-3:4.2.0-7.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:skopeo-2:1.9.4-3.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:skopeo-2:1.9.4-3.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:skopeo-2:1.9.4-3.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:skopeo-2:1.9.4-3.rhaos4.12.el9.src",
"9Base-RHOSE-4.12:skopeo-2:1.9.4-3.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.rhaos4.12.el9.x86_64",
"9Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.rhaos4.12.el9.aarch64",
"9Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.rhaos4.12.el9.ppc64le",
"9Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.rhaos4.12.el9.s390x",
"9Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.rhaos4.12.el9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "golang: regexp/syntax: limit memory used by parsing regexps"
}
]
}
rhsa-2022_7407
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for service-binding-operator-bundle-container and service-binding-operator-container is now available for OpenShift Developer Tools and Services for OCP 4.9.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Service Binding Operator 1.3.1 is now available for OpenShift Developer Tools and Services for OCP 4.9 +\n\nSecurity Fix(es):\n\n* golang: golang.org/x/text/language: ParseAcceptLanguage takes a long time to parse complex tags (CVE-2022-32149)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2022:7407",
"url": "https://access.redhat.com/errata/RHSA-2022:7407"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#moderate",
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "https://docs.openshift.com/container-platform/latest/applications/connecting_applications_to_services/odc-connecting-an-application-to-a-service-using-the-developer-perspective.html",
"url": "https://docs.openshift.com/container-platform/latest/applications/connecting_applications_to_services/odc-connecting-an-application-to-a-service-using-the-developer-perspective.html"
},
{
"category": "external",
"summary": "2134010",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2134010"
},
{
"category": "external",
"summary": "APPSVC-1220",
"url": "https://issues.redhat.com/browse/APPSVC-1220"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2022/rhsa-2022_7407.json"
}
],
"title": "Red Hat Security Advisory: Service Binding Operator 1.3.1 security update",
"tracking": {
"current_release_date": "2025-01-06T19:21:42+00:00",
"generator": {
"date": "2025-01-06T19:21:42+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.5"
}
},
"id": "RHSA-2022:7407",
"initial_release_date": "2022-11-03T13:32:17+00:00",
"revision_history": [
{
"date": "2022-11-03T13:32:17+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2022-11-03T13:32:17+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-01-06T19:21:42+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "OpenShift Developer Tools and Services for OCP 4.9 for RHEL 8",
"product": {
"name": "OpenShift Developer Tools and Services for OCP 4.9 for RHEL 8",
"product_id": "8Base-OCP-Tools-4.9",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:ocp_tools:4.9::el8"
}
}
}
],
"category": "product_family",
"name": "OpenShift Jenkins"
},
{
"branches": [
{
"category": "product_version",
"name": "ocp-tools-4/service-binding-operator-bundle@sha256:ed577a367afc96253a125e8868dc992f832bbca209d7abe57fc939ed686715b6_amd64",
"product": {
"name": "ocp-tools-4/service-binding-operator-bundle@sha256:ed577a367afc96253a125e8868dc992f832bbca209d7abe57fc939ed686715b6_amd64",
"product_id": "ocp-tools-4/service-binding-operator-bundle@sha256:ed577a367afc96253a125e8868dc992f832bbca209d7abe57fc939ed686715b6_amd64",
"product_identification_helper": {
"purl": "pkg:oci/service-binding-operator-bundle@sha256:ed577a367afc96253a125e8868dc992f832bbca209d7abe57fc939ed686715b6?arch=amd64\u0026repository_url=registry.redhat.io/ocp-tools-4/service-binding-operator-bundle\u0026tag=v1.3.1-7"
}
}
},
{
"category": "product_version",
"name": "ocp-tools-4/service-binding-rhel8-operator@sha256:1640967bb2d7feb690921d81c5938d43e06a9794d8bd32f817fc8b5816d339d0_amd64",
"product": {
"name": "ocp-tools-4/service-binding-rhel8-operator@sha256:1640967bb2d7feb690921d81c5938d43e06a9794d8bd32f817fc8b5816d339d0_amd64",
"product_id": "ocp-tools-4/service-binding-rhel8-operator@sha256:1640967bb2d7feb690921d81c5938d43e06a9794d8bd32f817fc8b5816d339d0_amd64",
"product_identification_helper": {
"purl": "pkg:oci/service-binding-rhel8-operator@sha256:1640967bb2d7feb690921d81c5938d43e06a9794d8bd32f817fc8b5816d339d0?arch=amd64\u0026repository_url=registry.redhat.io/ocp-tools-4/service-binding-rhel8-operator\u0026tag=v1.3.1-5"
}
}
}
],
"category": "architecture",
"name": "amd64"
},
{
"branches": [
{
"category": "product_version",
"name": "ocp-tools-4/service-binding-rhel8-operator@sha256:1f14186b1fb24aebb5a706ab9560003fa57c595d37a65092a1443a0d0bf8e9c2_arm64",
"product": {
"name": "ocp-tools-4/service-binding-rhel8-operator@sha256:1f14186b1fb24aebb5a706ab9560003fa57c595d37a65092a1443a0d0bf8e9c2_arm64",
"product_id": "ocp-tools-4/service-binding-rhel8-operator@sha256:1f14186b1fb24aebb5a706ab9560003fa57c595d37a65092a1443a0d0bf8e9c2_arm64",
"product_identification_helper": {
"purl": "pkg:oci/service-binding-rhel8-operator@sha256:1f14186b1fb24aebb5a706ab9560003fa57c595d37a65092a1443a0d0bf8e9c2?arch=arm64\u0026repository_url=registry.redhat.io/ocp-tools-4/service-binding-rhel8-operator\u0026tag=v1.3.1-5"
}
}
}
],
"category": "architecture",
"name": "arm64"
},
{
"branches": [
{
"category": "product_version",
"name": "ocp-tools-4/service-binding-rhel8-operator@sha256:98f9de0d64607fc9a8dade067d12ba73bdae4006f7ef0571e628f7fcaecf8959_s390x",
"product": {
"name": "ocp-tools-4/service-binding-rhel8-operator@sha256:98f9de0d64607fc9a8dade067d12ba73bdae4006f7ef0571e628f7fcaecf8959_s390x",
"product_id": "ocp-tools-4/service-binding-rhel8-operator@sha256:98f9de0d64607fc9a8dade067d12ba73bdae4006f7ef0571e628f7fcaecf8959_s390x",
"product_identification_helper": {
"purl": "pkg:oci/service-binding-rhel8-operator@sha256:98f9de0d64607fc9a8dade067d12ba73bdae4006f7ef0571e628f7fcaecf8959?arch=s390x\u0026repository_url=registry.redhat.io/ocp-tools-4/service-binding-rhel8-operator\u0026tag=v1.3.1-5"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "ocp-tools-4/service-binding-rhel8-operator@sha256:eb70d8863ec16d3c78d72455c12ea121c52e485e812dd2903ef4c5b52ce78c08_ppc64le",
"product": {
"name": "ocp-tools-4/service-binding-rhel8-operator@sha256:eb70d8863ec16d3c78d72455c12ea121c52e485e812dd2903ef4c5b52ce78c08_ppc64le",
"product_id": "ocp-tools-4/service-binding-rhel8-operator@sha256:eb70d8863ec16d3c78d72455c12ea121c52e485e812dd2903ef4c5b52ce78c08_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/service-binding-rhel8-operator@sha256:eb70d8863ec16d3c78d72455c12ea121c52e485e812dd2903ef4c5b52ce78c08?arch=ppc64le\u0026repository_url=registry.redhat.io/ocp-tools-4/service-binding-rhel8-operator\u0026tag=v1.3.1-5"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "ocp-tools-4/service-binding-operator-bundle@sha256:ed577a367afc96253a125e8868dc992f832bbca209d7abe57fc939ed686715b6_amd64 as a component of OpenShift Developer Tools and Services for OCP 4.9 for RHEL 8",
"product_id": "8Base-OCP-Tools-4.9:ocp-tools-4/service-binding-operator-bundle@sha256:ed577a367afc96253a125e8868dc992f832bbca209d7abe57fc939ed686715b6_amd64"
},
"product_reference": "ocp-tools-4/service-binding-operator-bundle@sha256:ed577a367afc96253a125e8868dc992f832bbca209d7abe57fc939ed686715b6_amd64",
"relates_to_product_reference": "8Base-OCP-Tools-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocp-tools-4/service-binding-rhel8-operator@sha256:1640967bb2d7feb690921d81c5938d43e06a9794d8bd32f817fc8b5816d339d0_amd64 as a component of OpenShift Developer Tools and Services for OCP 4.9 for RHEL 8",
"product_id": "8Base-OCP-Tools-4.9:ocp-tools-4/service-binding-rhel8-operator@sha256:1640967bb2d7feb690921d81c5938d43e06a9794d8bd32f817fc8b5816d339d0_amd64"
},
"product_reference": "ocp-tools-4/service-binding-rhel8-operator@sha256:1640967bb2d7feb690921d81c5938d43e06a9794d8bd32f817fc8b5816d339d0_amd64",
"relates_to_product_reference": "8Base-OCP-Tools-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocp-tools-4/service-binding-rhel8-operator@sha256:1f14186b1fb24aebb5a706ab9560003fa57c595d37a65092a1443a0d0bf8e9c2_arm64 as a component of OpenShift Developer Tools and Services for OCP 4.9 for RHEL 8",
"product_id": "8Base-OCP-Tools-4.9:ocp-tools-4/service-binding-rhel8-operator@sha256:1f14186b1fb24aebb5a706ab9560003fa57c595d37a65092a1443a0d0bf8e9c2_arm64"
},
"product_reference": "ocp-tools-4/service-binding-rhel8-operator@sha256:1f14186b1fb24aebb5a706ab9560003fa57c595d37a65092a1443a0d0bf8e9c2_arm64",
"relates_to_product_reference": "8Base-OCP-Tools-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocp-tools-4/service-binding-rhel8-operator@sha256:98f9de0d64607fc9a8dade067d12ba73bdae4006f7ef0571e628f7fcaecf8959_s390x as a component of OpenShift Developer Tools and Services for OCP 4.9 for RHEL 8",
"product_id": "8Base-OCP-Tools-4.9:ocp-tools-4/service-binding-rhel8-operator@sha256:98f9de0d64607fc9a8dade067d12ba73bdae4006f7ef0571e628f7fcaecf8959_s390x"
},
"product_reference": "ocp-tools-4/service-binding-rhel8-operator@sha256:98f9de0d64607fc9a8dade067d12ba73bdae4006f7ef0571e628f7fcaecf8959_s390x",
"relates_to_product_reference": "8Base-OCP-Tools-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocp-tools-4/service-binding-rhel8-operator@sha256:eb70d8863ec16d3c78d72455c12ea121c52e485e812dd2903ef4c5b52ce78c08_ppc64le as a component of OpenShift Developer Tools and Services for OCP 4.9 for RHEL 8",
"product_id": "8Base-OCP-Tools-4.9:ocp-tools-4/service-binding-rhel8-operator@sha256:eb70d8863ec16d3c78d72455c12ea121c52e485e812dd2903ef4c5b52ce78c08_ppc64le"
},
"product_reference": "ocp-tools-4/service-binding-rhel8-operator@sha256:eb70d8863ec16d3c78d72455c12ea121c52e485e812dd2903ef4c5b52ce78c08_ppc64le",
"relates_to_product_reference": "8Base-OCP-Tools-4.9"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2022-32149",
"cwe": {
"id": "CWE-407",
"name": "Inefficient Algorithmic Complexity"
},
"discovery_date": "2022-10-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2134010"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in the golang.org/x/text/language package. An attacker can craft an Accept-Language header which ParseAcceptLanguage will take significant time to parse. This issue leads to a denial of service, and can impact availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: golang.org/x/text/language: ParseAcceptLanguage takes a long time to parse complex tags",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-OCP-Tools-4.9:ocp-tools-4/service-binding-operator-bundle@sha256:ed577a367afc96253a125e8868dc992f832bbca209d7abe57fc939ed686715b6_amd64",
"8Base-OCP-Tools-4.9:ocp-tools-4/service-binding-rhel8-operator@sha256:1640967bb2d7feb690921d81c5938d43e06a9794d8bd32f817fc8b5816d339d0_amd64",
"8Base-OCP-Tools-4.9:ocp-tools-4/service-binding-rhel8-operator@sha256:1f14186b1fb24aebb5a706ab9560003fa57c595d37a65092a1443a0d0bf8e9c2_arm64",
"8Base-OCP-Tools-4.9:ocp-tools-4/service-binding-rhel8-operator@sha256:98f9de0d64607fc9a8dade067d12ba73bdae4006f7ef0571e628f7fcaecf8959_s390x",
"8Base-OCP-Tools-4.9:ocp-tools-4/service-binding-rhel8-operator@sha256:eb70d8863ec16d3c78d72455c12ea121c52e485e812dd2903ef4c5b52ce78c08_ppc64le"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-32149"
},
{
"category": "external",
"summary": "RHBZ#2134010",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2134010"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-32149",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32149"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-32149",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-32149"
},
{
"category": "external",
"summary": "https://go.dev/issue/56152",
"url": "https://go.dev/issue/56152"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-dev/c/qfPIly0X7aU",
"url": "https://groups.google.com/g/golang-dev/c/qfPIly0X7aU"
}
],
"release_date": "2022-10-11T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-11-03T13:32:17+00:00",
"details": "Before applying this update, ensure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, see: https://access.redhat.com/articles/11258.\n\nFollow the instructions linked in the References section to create service binding connections between applications and services using the Developer perspective in the OpenShift Container Platform web console.",
"product_ids": [
"8Base-OCP-Tools-4.9:ocp-tools-4/service-binding-operator-bundle@sha256:ed577a367afc96253a125e8868dc992f832bbca209d7abe57fc939ed686715b6_amd64",
"8Base-OCP-Tools-4.9:ocp-tools-4/service-binding-rhel8-operator@sha256:1640967bb2d7feb690921d81c5938d43e06a9794d8bd32f817fc8b5816d339d0_amd64",
"8Base-OCP-Tools-4.9:ocp-tools-4/service-binding-rhel8-operator@sha256:1f14186b1fb24aebb5a706ab9560003fa57c595d37a65092a1443a0d0bf8e9c2_arm64",
"8Base-OCP-Tools-4.9:ocp-tools-4/service-binding-rhel8-operator@sha256:98f9de0d64607fc9a8dade067d12ba73bdae4006f7ef0571e628f7fcaecf8959_s390x",
"8Base-OCP-Tools-4.9:ocp-tools-4/service-binding-rhel8-operator@sha256:eb70d8863ec16d3c78d72455c12ea121c52e485e812dd2903ef4c5b52ce78c08_ppc64le"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:7407"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"8Base-OCP-Tools-4.9:ocp-tools-4/service-binding-operator-bundle@sha256:ed577a367afc96253a125e8868dc992f832bbca209d7abe57fc939ed686715b6_amd64",
"8Base-OCP-Tools-4.9:ocp-tools-4/service-binding-rhel8-operator@sha256:1640967bb2d7feb690921d81c5938d43e06a9794d8bd32f817fc8b5816d339d0_amd64",
"8Base-OCP-Tools-4.9:ocp-tools-4/service-binding-rhel8-operator@sha256:1f14186b1fb24aebb5a706ab9560003fa57c595d37a65092a1443a0d0bf8e9c2_arm64",
"8Base-OCP-Tools-4.9:ocp-tools-4/service-binding-rhel8-operator@sha256:98f9de0d64607fc9a8dade067d12ba73bdae4006f7ef0571e628f7fcaecf8959_s390x",
"8Base-OCP-Tools-4.9:ocp-tools-4/service-binding-rhel8-operator@sha256:eb70d8863ec16d3c78d72455c12ea121c52e485e812dd2903ef4c5b52ce78c08_ppc64le"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "golang: golang.org/x/text/language: ParseAcceptLanguage takes a long time to parse complex tags"
}
]
}
rhsa-2023:0693
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "The Migration Toolkit for Containers (MTC) 1.7.7 is now available.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The Migration Toolkit for Containers (MTC) enables you to migrate Kubernetes resources, persistent volume data, and internal container images between OpenShift Container Platform clusters, using the MTC web console or the Kubernetes API.\n\nSecurity Fix(es) from Bugzilla:\n\n* async: Prototype Pollution in async (CVE-2021-43138)\n\n* golang: archive/tar: unbounded memory consumption when reading headers (CVE-2022-2879)\n\n* golang: net/http/httputil: ReverseProxy should not forward unparseable query parameters (CVE-2022-2880)\n\n* golang: net/http: handle server errors after sending GOAWAY (CVE-2022-27664)\n\n* golang: golang.org/x/text/language: ParseAcceptLanguage takes a long time to parse complex tags (CVE-2022-32149)\n\n* golang: net/url: JoinPath does not strip relative path components in all circumstances (CVE-2022-32190)\n\n* golang: regexp/syntax: limit memory used by parsing regexps (CVE-2022-41715)\n\n* golang: net/http: An attacker can cause excessive memory growth in a Go server accepting HTTP/2 requests (CVE-2022-41717)\n\n* golang: math/big: decoding big.Float and big.Rat types can panic if the encoded message is too short, potentially allowing a denial of service (CVE-2022-32189)\n\nFor more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2023:0693",
"url": "https://access.redhat.com/errata/RHSA-2023:0693"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#moderate",
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "2113814",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2113814"
},
{
"category": "external",
"summary": "2124668",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2124668"
},
{
"category": "external",
"summary": "2124669",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2124669"
},
{
"category": "external",
"summary": "2126276",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2126276"
},
{
"category": "external",
"summary": "2132867",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2132867"
},
{
"category": "external",
"summary": "2132868",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2132868"
},
{
"category": "external",
"summary": "2132872",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2132872"
},
{
"category": "external",
"summary": "2134010",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2134010"
},
{
"category": "external",
"summary": "2160662",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2160662"
},
{
"category": "external",
"summary": "2161274",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2161274"
},
{
"category": "external",
"summary": "MIG-1275",
"url": "https://issues.redhat.com/browse/MIG-1275"
},
{
"category": "external",
"summary": "MIG-1281",
"url": "https://issues.redhat.com/browse/MIG-1281"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2023/rhsa-2023_0693.json"
}
],
"title": "Red Hat Security Advisory: Migration Toolkit for Containers (MTC) 1.7.7 security and bug fix update",
"tracking": {
"current_release_date": "2025-10-24T13:31:43+00:00",
"generator": {
"date": "2025-10-24T13:31:43+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.10"
}
},
"id": "RHSA-2023:0693",
"initial_release_date": "2023-02-09T02:17:22+00:00",
"revision_history": [
{
"date": "2023-02-09T02:17:22+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2023-02-09T02:17:22+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-10-24T13:31:43+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "8Base-RHMTC-1.7",
"product": {
"name": "8Base-RHMTC-1.7",
"product_id": "8Base-RHMTC-1.7",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhmt:1.7::el8"
}
}
}
],
"category": "product_family",
"name": "Red Hat Migration Toolkit"
},
{
"branches": [
{
"category": "product_version",
"name": "rhmtc/openshift-migration-controller-rhel8@sha256:362eb32d0d2607f72b4f425dabaea7cde5d292ac41aea0c18c78bc6e408fff9e_amd64",
"product": {
"name": "rhmtc/openshift-migration-controller-rhel8@sha256:362eb32d0d2607f72b4f425dabaea7cde5d292ac41aea0c18c78bc6e408fff9e_amd64",
"product_id": "rhmtc/openshift-migration-controller-rhel8@sha256:362eb32d0d2607f72b4f425dabaea7cde5d292ac41aea0c18c78bc6e408fff9e_amd64",
"product_identification_helper": {
"purl": "pkg:oci/openshift-migration-controller-rhel8@sha256:362eb32d0d2607f72b4f425dabaea7cde5d292ac41aea0c18c78bc6e408fff9e?arch=amd64\u0026repository_url=registry.redhat.io/rhmtc/openshift-migration-controller-rhel8\u0026tag=v1.7.7-4"
}
}
},
{
"category": "product_version",
"name": "rhmtc/openshift-migration-hook-runner-rhel8@sha256:aa63717ac3a4961e774ed0baa3a73f01eda185516e7380579d97b9d25764d10d_amd64",
"product": {
"name": "rhmtc/openshift-migration-hook-runner-rhel8@sha256:aa63717ac3a4961e774ed0baa3a73f01eda185516e7380579d97b9d25764d10d_amd64",
"product_id": "rhmtc/openshift-migration-hook-runner-rhel8@sha256:aa63717ac3a4961e774ed0baa3a73f01eda185516e7380579d97b9d25764d10d_amd64",
"product_identification_helper": {
"purl": "pkg:oci/openshift-migration-hook-runner-rhel8@sha256:aa63717ac3a4961e774ed0baa3a73f01eda185516e7380579d97b9d25764d10d?arch=amd64\u0026repository_url=registry.redhat.io/rhmtc/openshift-migration-hook-runner-rhel8\u0026tag=v1.7.7-3"
}
}
},
{
"category": "product_version",
"name": "rhmtc/openshift-migration-legacy-rhel8-operator@sha256:1ac9cdfbdce8f7b6e4ebf5e40013f766b71b6dd604c92f602aca96612a228eda_amd64",
"product": {
"name": "rhmtc/openshift-migration-legacy-rhel8-operator@sha256:1ac9cdfbdce8f7b6e4ebf5e40013f766b71b6dd604c92f602aca96612a228eda_amd64",
"product_id": "rhmtc/openshift-migration-legacy-rhel8-operator@sha256:1ac9cdfbdce8f7b6e4ebf5e40013f766b71b6dd604c92f602aca96612a228eda_amd64",
"product_identification_helper": {
"purl": "pkg:oci/openshift-migration-legacy-rhel8-operator@sha256:1ac9cdfbdce8f7b6e4ebf5e40013f766b71b6dd604c92f602aca96612a228eda?arch=amd64\u0026repository_url=registry.redhat.io/rhmtc/openshift-migration-legacy-rhel8-operator\u0026tag=v1.7.7-9"
}
}
},
{
"category": "product_version",
"name": "rhmtc/openshift-migration-log-reader-rhel8@sha256:d89e9ef65993466d25b26702d0210c14ce191155501774f4d2f1f08dbdad9804_amd64",
"product": {
"name": "rhmtc/openshift-migration-log-reader-rhel8@sha256:d89e9ef65993466d25b26702d0210c14ce191155501774f4d2f1f08dbdad9804_amd64",
"product_id": "rhmtc/openshift-migration-log-reader-rhel8@sha256:d89e9ef65993466d25b26702d0210c14ce191155501774f4d2f1f08dbdad9804_amd64",
"product_identification_helper": {
"purl": "pkg:oci/openshift-migration-log-reader-rhel8@sha256:d89e9ef65993466d25b26702d0210c14ce191155501774f4d2f1f08dbdad9804?arch=amd64\u0026repository_url=registry.redhat.io/rhmtc/openshift-migration-log-reader-rhel8\u0026tag=v1.7.7-3"
}
}
},
{
"category": "product_version",
"name": "rhmtc/openshift-migration-must-gather-rhel8@sha256:5acf34dc4041b694b452d46c2f656db566241773285ca305a79ab7b9dc087b43_amd64",
"product": {
"name": "rhmtc/openshift-migration-must-gather-rhel8@sha256:5acf34dc4041b694b452d46c2f656db566241773285ca305a79ab7b9dc087b43_amd64",
"product_id": "rhmtc/openshift-migration-must-gather-rhel8@sha256:5acf34dc4041b694b452d46c2f656db566241773285ca305a79ab7b9dc087b43_amd64",
"product_identification_helper": {
"purl": "pkg:oci/openshift-migration-must-gather-rhel8@sha256:5acf34dc4041b694b452d46c2f656db566241773285ca305a79ab7b9dc087b43?arch=amd64\u0026repository_url=registry.redhat.io/rhmtc/openshift-migration-must-gather-rhel8\u0026tag=v1.7.7-4"
}
}
},
{
"category": "product_version",
"name": "rhmtc/openshift-migration-openvpn-rhel8@sha256:15df7304827ce49d422554551f08d99cfffa1afc4ffacac145d4399ccb1cbd68_amd64",
"product": {
"name": "rhmtc/openshift-migration-openvpn-rhel8@sha256:15df7304827ce49d422554551f08d99cfffa1afc4ffacac145d4399ccb1cbd68_amd64",
"product_id": "rhmtc/openshift-migration-openvpn-rhel8@sha256:15df7304827ce49d422554551f08d99cfffa1afc4ffacac145d4399ccb1cbd68_amd64",
"product_identification_helper": {
"purl": "pkg:oci/openshift-migration-openvpn-rhel8@sha256:15df7304827ce49d422554551f08d99cfffa1afc4ffacac145d4399ccb1cbd68?arch=amd64\u0026repository_url=registry.redhat.io/rhmtc/openshift-migration-openvpn-rhel8\u0026tag=v1.7.7-2"
}
}
},
{
"category": "product_version",
"name": "rhmtc/openshift-migration-rhel8-operator@sha256:aaaf4f6095294b497889749390f0a3aac04b83131a423799c44b5e367e0b370a_amd64",
"product": {
"name": "rhmtc/openshift-migration-rhel8-operator@sha256:aaaf4f6095294b497889749390f0a3aac04b83131a423799c44b5e367e0b370a_amd64",
"product_id": "rhmtc/openshift-migration-rhel8-operator@sha256:aaaf4f6095294b497889749390f0a3aac04b83131a423799c44b5e367e0b370a_amd64",
"product_identification_helper": {
"purl": "pkg:oci/openshift-migration-rhel8-operator@sha256:aaaf4f6095294b497889749390f0a3aac04b83131a423799c44b5e367e0b370a?arch=amd64\u0026repository_url=registry.redhat.io/rhmtc/openshift-migration-rhel8-operator\u0026tag=v1.7.7-9"
}
}
},
{
"category": "product_version",
"name": "rhmtc/openshift-migration-operator-bundle@sha256:90ed03a5e0cb0b0ffd85f7434cc4eda9bd8fe81cd90b597772d9b7caccd4b80f_amd64",
"product": {
"name": "rhmtc/openshift-migration-operator-bundle@sha256:90ed03a5e0cb0b0ffd85f7434cc4eda9bd8fe81cd90b597772d9b7caccd4b80f_amd64",
"product_id": "rhmtc/openshift-migration-operator-bundle@sha256:90ed03a5e0cb0b0ffd85f7434cc4eda9bd8fe81cd90b597772d9b7caccd4b80f_amd64",
"product_identification_helper": {
"purl": "pkg:oci/openshift-migration-operator-bundle@sha256:90ed03a5e0cb0b0ffd85f7434cc4eda9bd8fe81cd90b597772d9b7caccd4b80f?arch=amd64\u0026repository_url=registry.redhat.io/rhmtc/openshift-migration-operator-bundle\u0026tag=v1.7.7-9"
}
}
},
{
"category": "product_version",
"name": "rhmtc/openshift-migration-registry-rhel8@sha256:aaa03ef0769d38185675db2a7a78454659de14bdebe5ff842614bf2124e5adfe_amd64",
"product": {
"name": "rhmtc/openshift-migration-registry-rhel8@sha256:aaa03ef0769d38185675db2a7a78454659de14bdebe5ff842614bf2124e5adfe_amd64",
"product_id": "rhmtc/openshift-migration-registry-rhel8@sha256:aaa03ef0769d38185675db2a7a78454659de14bdebe5ff842614bf2124e5adfe_amd64",
"product_identification_helper": {
"purl": "pkg:oci/openshift-migration-registry-rhel8@sha256:aaa03ef0769d38185675db2a7a78454659de14bdebe5ff842614bf2124e5adfe?arch=amd64\u0026repository_url=registry.redhat.io/rhmtc/openshift-migration-registry-rhel8\u0026tag=v1.7.7-3"
}
}
},
{
"category": "product_version",
"name": "rhmtc/openshift-migration-rsync-transfer-rhel8@sha256:58bd4ffc3e9599401251ac929cf15c1773ecc03a57177118adbe23ac8d7762af_amd64",
"product": {
"name": "rhmtc/openshift-migration-rsync-transfer-rhel8@sha256:58bd4ffc3e9599401251ac929cf15c1773ecc03a57177118adbe23ac8d7762af_amd64",
"product_id": "rhmtc/openshift-migration-rsync-transfer-rhel8@sha256:58bd4ffc3e9599401251ac929cf15c1773ecc03a57177118adbe23ac8d7762af_amd64",
"product_identification_helper": {
"purl": "pkg:oci/openshift-migration-rsync-transfer-rhel8@sha256:58bd4ffc3e9599401251ac929cf15c1773ecc03a57177118adbe23ac8d7762af?arch=amd64\u0026repository_url=registry.redhat.io/rhmtc/openshift-migration-rsync-transfer-rhel8\u0026tag=v1.7.7-2"
}
}
},
{
"category": "product_version",
"name": "rhmtc/openshift-migration-ui-rhel8@sha256:4141db5099ae659270297eb4aaff695ac43fce67d91fea49dbc76583f419d3a1_amd64",
"product": {
"name": "rhmtc/openshift-migration-ui-rhel8@sha256:4141db5099ae659270297eb4aaff695ac43fce67d91fea49dbc76583f419d3a1_amd64",
"product_id": "rhmtc/openshift-migration-ui-rhel8@sha256:4141db5099ae659270297eb4aaff695ac43fce67d91fea49dbc76583f419d3a1_amd64",
"product_identification_helper": {
"purl": "pkg:oci/openshift-migration-ui-rhel8@sha256:4141db5099ae659270297eb4aaff695ac43fce67d91fea49dbc76583f419d3a1?arch=amd64\u0026repository_url=registry.redhat.io/rhmtc/openshift-migration-ui-rhel8\u0026tag=v1.7.7-3"
}
}
},
{
"category": "product_version",
"name": "rhmtc/openshift-migration-velero-rhel8@sha256:1ca6945c3918f1743a4cee86a507f9f6581c8f8e572b6b8739d79a675a64d1db_amd64",
"product": {
"name": "rhmtc/openshift-migration-velero-rhel8@sha256:1ca6945c3918f1743a4cee86a507f9f6581c8f8e572b6b8739d79a675a64d1db_amd64",
"product_id": "rhmtc/openshift-migration-velero-rhel8@sha256:1ca6945c3918f1743a4cee86a507f9f6581c8f8e572b6b8739d79a675a64d1db_amd64",
"product_identification_helper": {
"purl": "pkg:oci/openshift-migration-velero-rhel8@sha256:1ca6945c3918f1743a4cee86a507f9f6581c8f8e572b6b8739d79a675a64d1db?arch=amd64\u0026repository_url=registry.redhat.io/rhmtc/openshift-migration-velero-rhel8\u0026tag=v1.7.7-5"
}
}
},
{
"category": "product_version",
"name": "rhmtc/openshift-migration-velero-plugin-for-aws-rhel8@sha256:633eeb0b6b50e21bbc0fb12fd2262294733fc9ac8b1e9eedcdb9d1433534d88d_amd64",
"product": {
"name": "rhmtc/openshift-migration-velero-plugin-for-aws-rhel8@sha256:633eeb0b6b50e21bbc0fb12fd2262294733fc9ac8b1e9eedcdb9d1433534d88d_amd64",
"product_id": "rhmtc/openshift-migration-velero-plugin-for-aws-rhel8@sha256:633eeb0b6b50e21bbc0fb12fd2262294733fc9ac8b1e9eedcdb9d1433534d88d_amd64",
"product_identification_helper": {
"purl": "pkg:oci/openshift-migration-velero-plugin-for-aws-rhel8@sha256:633eeb0b6b50e21bbc0fb12fd2262294733fc9ac8b1e9eedcdb9d1433534d88d?arch=amd64\u0026repository_url=registry.redhat.io/rhmtc/openshift-migration-velero-plugin-for-aws-rhel8\u0026tag=v1.7.7-3"
}
}
},
{
"category": "product_version",
"name": "rhmtc/openshift-migration-velero-plugin-for-gcp-rhel8@sha256:19dbf2bb83f8a0f35079d6ae25f8fcddad970e48ecb21694fd2d4c553313e4aa_amd64",
"product": {
"name": "rhmtc/openshift-migration-velero-plugin-for-gcp-rhel8@sha256:19dbf2bb83f8a0f35079d6ae25f8fcddad970e48ecb21694fd2d4c553313e4aa_amd64",
"product_id": "rhmtc/openshift-migration-velero-plugin-for-gcp-rhel8@sha256:19dbf2bb83f8a0f35079d6ae25f8fcddad970e48ecb21694fd2d4c553313e4aa_amd64",
"product_identification_helper": {
"purl": "pkg:oci/openshift-migration-velero-plugin-for-gcp-rhel8@sha256:19dbf2bb83f8a0f35079d6ae25f8fcddad970e48ecb21694fd2d4c553313e4aa?arch=amd64\u0026repository_url=registry.redhat.io/rhmtc/openshift-migration-velero-plugin-for-gcp-rhel8\u0026tag=v1.7.7-3"
}
}
},
{
"category": "product_version",
"name": "rhmtc/openshift-migration-velero-plugin-for-microsoft-azure-rhel8@sha256:93e95f065eadaa41154b9012dd5ddc824607758e2bce85c4256c2689125b80a4_amd64",
"product": {
"name": "rhmtc/openshift-migration-velero-plugin-for-microsoft-azure-rhel8@sha256:93e95f065eadaa41154b9012dd5ddc824607758e2bce85c4256c2689125b80a4_amd64",
"product_id": "rhmtc/openshift-migration-velero-plugin-for-microsoft-azure-rhel8@sha256:93e95f065eadaa41154b9012dd5ddc824607758e2bce85c4256c2689125b80a4_amd64",
"product_identification_helper": {
"purl": "pkg:oci/openshift-migration-velero-plugin-for-microsoft-azure-rhel8@sha256:93e95f065eadaa41154b9012dd5ddc824607758e2bce85c4256c2689125b80a4?arch=amd64\u0026repository_url=registry.redhat.io/rhmtc/openshift-migration-velero-plugin-for-microsoft-azure-rhel8\u0026tag=v1.7.7-3"
}
}
},
{
"category": "product_version",
"name": "rhmtc/openshift-migration-velero-restic-restore-helper-rhel8@sha256:70d3d46f54b91538e047df62e7e5b161fabac195a2f2e45cdba78215b4c82a7d_amd64",
"product": {
"name": "rhmtc/openshift-migration-velero-restic-restore-helper-rhel8@sha256:70d3d46f54b91538e047df62e7e5b161fabac195a2f2e45cdba78215b4c82a7d_amd64",
"product_id": "rhmtc/openshift-migration-velero-restic-restore-helper-rhel8@sha256:70d3d46f54b91538e047df62e7e5b161fabac195a2f2e45cdba78215b4c82a7d_amd64",
"product_identification_helper": {
"purl": "pkg:oci/openshift-migration-velero-restic-restore-helper-rhel8@sha256:70d3d46f54b91538e047df62e7e5b161fabac195a2f2e45cdba78215b4c82a7d?arch=amd64\u0026repository_url=registry.redhat.io/rhmtc/openshift-migration-velero-restic-restore-helper-rhel8\u0026tag=v1.7.7-5"
}
}
},
{
"category": "product_version",
"name": "rhmtc/openshift-velero-plugin-rhel8@sha256:26f8fb5c41ece82626325ba502505ba1ca7986602cc147b492f9857caa0be868_amd64",
"product": {
"name": "rhmtc/openshift-velero-plugin-rhel8@sha256:26f8fb5c41ece82626325ba502505ba1ca7986602cc147b492f9857caa0be868_amd64",
"product_id": "rhmtc/openshift-velero-plugin-rhel8@sha256:26f8fb5c41ece82626325ba502505ba1ca7986602cc147b492f9857caa0be868_amd64",
"product_identification_helper": {
"purl": "pkg:oci/openshift-velero-plugin-rhel8@sha256:26f8fb5c41ece82626325ba502505ba1ca7986602cc147b492f9857caa0be868?arch=amd64\u0026repository_url=registry.redhat.io/rhmtc/openshift-velero-plugin-rhel8\u0026tag=v1.7.7-3"
}
}
}
],
"category": "architecture",
"name": "amd64"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "rhmtc/openshift-migration-controller-rhel8@sha256:362eb32d0d2607f72b4f425dabaea7cde5d292ac41aea0c18c78bc6e408fff9e_amd64 as a component of 8Base-RHMTC-1.7",
"product_id": "8Base-RHMTC-1.7:rhmtc/openshift-migration-controller-rhel8@sha256:362eb32d0d2607f72b4f425dabaea7cde5d292ac41aea0c18c78bc6e408fff9e_amd64"
},
"product_reference": "rhmtc/openshift-migration-controller-rhel8@sha256:362eb32d0d2607f72b4f425dabaea7cde5d292ac41aea0c18c78bc6e408fff9e_amd64",
"relates_to_product_reference": "8Base-RHMTC-1.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhmtc/openshift-migration-hook-runner-rhel8@sha256:aa63717ac3a4961e774ed0baa3a73f01eda185516e7380579d97b9d25764d10d_amd64 as a component of 8Base-RHMTC-1.7",
"product_id": "8Base-RHMTC-1.7:rhmtc/openshift-migration-hook-runner-rhel8@sha256:aa63717ac3a4961e774ed0baa3a73f01eda185516e7380579d97b9d25764d10d_amd64"
},
"product_reference": "rhmtc/openshift-migration-hook-runner-rhel8@sha256:aa63717ac3a4961e774ed0baa3a73f01eda185516e7380579d97b9d25764d10d_amd64",
"relates_to_product_reference": "8Base-RHMTC-1.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhmtc/openshift-migration-legacy-rhel8-operator@sha256:1ac9cdfbdce8f7b6e4ebf5e40013f766b71b6dd604c92f602aca96612a228eda_amd64 as a component of 8Base-RHMTC-1.7",
"product_id": "8Base-RHMTC-1.7:rhmtc/openshift-migration-legacy-rhel8-operator@sha256:1ac9cdfbdce8f7b6e4ebf5e40013f766b71b6dd604c92f602aca96612a228eda_amd64"
},
"product_reference": "rhmtc/openshift-migration-legacy-rhel8-operator@sha256:1ac9cdfbdce8f7b6e4ebf5e40013f766b71b6dd604c92f602aca96612a228eda_amd64",
"relates_to_product_reference": "8Base-RHMTC-1.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhmtc/openshift-migration-log-reader-rhel8@sha256:d89e9ef65993466d25b26702d0210c14ce191155501774f4d2f1f08dbdad9804_amd64 as a component of 8Base-RHMTC-1.7",
"product_id": "8Base-RHMTC-1.7:rhmtc/openshift-migration-log-reader-rhel8@sha256:d89e9ef65993466d25b26702d0210c14ce191155501774f4d2f1f08dbdad9804_amd64"
},
"product_reference": "rhmtc/openshift-migration-log-reader-rhel8@sha256:d89e9ef65993466d25b26702d0210c14ce191155501774f4d2f1f08dbdad9804_amd64",
"relates_to_product_reference": "8Base-RHMTC-1.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhmtc/openshift-migration-must-gather-rhel8@sha256:5acf34dc4041b694b452d46c2f656db566241773285ca305a79ab7b9dc087b43_amd64 as a component of 8Base-RHMTC-1.7",
"product_id": "8Base-RHMTC-1.7:rhmtc/openshift-migration-must-gather-rhel8@sha256:5acf34dc4041b694b452d46c2f656db566241773285ca305a79ab7b9dc087b43_amd64"
},
"product_reference": "rhmtc/openshift-migration-must-gather-rhel8@sha256:5acf34dc4041b694b452d46c2f656db566241773285ca305a79ab7b9dc087b43_amd64",
"relates_to_product_reference": "8Base-RHMTC-1.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhmtc/openshift-migration-openvpn-rhel8@sha256:15df7304827ce49d422554551f08d99cfffa1afc4ffacac145d4399ccb1cbd68_amd64 as a component of 8Base-RHMTC-1.7",
"product_id": "8Base-RHMTC-1.7:rhmtc/openshift-migration-openvpn-rhel8@sha256:15df7304827ce49d422554551f08d99cfffa1afc4ffacac145d4399ccb1cbd68_amd64"
},
"product_reference": "rhmtc/openshift-migration-openvpn-rhel8@sha256:15df7304827ce49d422554551f08d99cfffa1afc4ffacac145d4399ccb1cbd68_amd64",
"relates_to_product_reference": "8Base-RHMTC-1.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhmtc/openshift-migration-operator-bundle@sha256:90ed03a5e0cb0b0ffd85f7434cc4eda9bd8fe81cd90b597772d9b7caccd4b80f_amd64 as a component of 8Base-RHMTC-1.7",
"product_id": "8Base-RHMTC-1.7:rhmtc/openshift-migration-operator-bundle@sha256:90ed03a5e0cb0b0ffd85f7434cc4eda9bd8fe81cd90b597772d9b7caccd4b80f_amd64"
},
"product_reference": "rhmtc/openshift-migration-operator-bundle@sha256:90ed03a5e0cb0b0ffd85f7434cc4eda9bd8fe81cd90b597772d9b7caccd4b80f_amd64",
"relates_to_product_reference": "8Base-RHMTC-1.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhmtc/openshift-migration-registry-rhel8@sha256:aaa03ef0769d38185675db2a7a78454659de14bdebe5ff842614bf2124e5adfe_amd64 as a component of 8Base-RHMTC-1.7",
"product_id": "8Base-RHMTC-1.7:rhmtc/openshift-migration-registry-rhel8@sha256:aaa03ef0769d38185675db2a7a78454659de14bdebe5ff842614bf2124e5adfe_amd64"
},
"product_reference": "rhmtc/openshift-migration-registry-rhel8@sha256:aaa03ef0769d38185675db2a7a78454659de14bdebe5ff842614bf2124e5adfe_amd64",
"relates_to_product_reference": "8Base-RHMTC-1.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhmtc/openshift-migration-rhel8-operator@sha256:aaaf4f6095294b497889749390f0a3aac04b83131a423799c44b5e367e0b370a_amd64 as a component of 8Base-RHMTC-1.7",
"product_id": "8Base-RHMTC-1.7:rhmtc/openshift-migration-rhel8-operator@sha256:aaaf4f6095294b497889749390f0a3aac04b83131a423799c44b5e367e0b370a_amd64"
},
"product_reference": "rhmtc/openshift-migration-rhel8-operator@sha256:aaaf4f6095294b497889749390f0a3aac04b83131a423799c44b5e367e0b370a_amd64",
"relates_to_product_reference": "8Base-RHMTC-1.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhmtc/openshift-migration-rsync-transfer-rhel8@sha256:58bd4ffc3e9599401251ac929cf15c1773ecc03a57177118adbe23ac8d7762af_amd64 as a component of 8Base-RHMTC-1.7",
"product_id": "8Base-RHMTC-1.7:rhmtc/openshift-migration-rsync-transfer-rhel8@sha256:58bd4ffc3e9599401251ac929cf15c1773ecc03a57177118adbe23ac8d7762af_amd64"
},
"product_reference": "rhmtc/openshift-migration-rsync-transfer-rhel8@sha256:58bd4ffc3e9599401251ac929cf15c1773ecc03a57177118adbe23ac8d7762af_amd64",
"relates_to_product_reference": "8Base-RHMTC-1.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhmtc/openshift-migration-ui-rhel8@sha256:4141db5099ae659270297eb4aaff695ac43fce67d91fea49dbc76583f419d3a1_amd64 as a component of 8Base-RHMTC-1.7",
"product_id": "8Base-RHMTC-1.7:rhmtc/openshift-migration-ui-rhel8@sha256:4141db5099ae659270297eb4aaff695ac43fce67d91fea49dbc76583f419d3a1_amd64"
},
"product_reference": "rhmtc/openshift-migration-ui-rhel8@sha256:4141db5099ae659270297eb4aaff695ac43fce67d91fea49dbc76583f419d3a1_amd64",
"relates_to_product_reference": "8Base-RHMTC-1.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhmtc/openshift-migration-velero-plugin-for-aws-rhel8@sha256:633eeb0b6b50e21bbc0fb12fd2262294733fc9ac8b1e9eedcdb9d1433534d88d_amd64 as a component of 8Base-RHMTC-1.7",
"product_id": "8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-plugin-for-aws-rhel8@sha256:633eeb0b6b50e21bbc0fb12fd2262294733fc9ac8b1e9eedcdb9d1433534d88d_amd64"
},
"product_reference": "rhmtc/openshift-migration-velero-plugin-for-aws-rhel8@sha256:633eeb0b6b50e21bbc0fb12fd2262294733fc9ac8b1e9eedcdb9d1433534d88d_amd64",
"relates_to_product_reference": "8Base-RHMTC-1.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhmtc/openshift-migration-velero-plugin-for-gcp-rhel8@sha256:19dbf2bb83f8a0f35079d6ae25f8fcddad970e48ecb21694fd2d4c553313e4aa_amd64 as a component of 8Base-RHMTC-1.7",
"product_id": "8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-plugin-for-gcp-rhel8@sha256:19dbf2bb83f8a0f35079d6ae25f8fcddad970e48ecb21694fd2d4c553313e4aa_amd64"
},
"product_reference": "rhmtc/openshift-migration-velero-plugin-for-gcp-rhel8@sha256:19dbf2bb83f8a0f35079d6ae25f8fcddad970e48ecb21694fd2d4c553313e4aa_amd64",
"relates_to_product_reference": "8Base-RHMTC-1.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhmtc/openshift-migration-velero-plugin-for-microsoft-azure-rhel8@sha256:93e95f065eadaa41154b9012dd5ddc824607758e2bce85c4256c2689125b80a4_amd64 as a component of 8Base-RHMTC-1.7",
"product_id": "8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-plugin-for-microsoft-azure-rhel8@sha256:93e95f065eadaa41154b9012dd5ddc824607758e2bce85c4256c2689125b80a4_amd64"
},
"product_reference": "rhmtc/openshift-migration-velero-plugin-for-microsoft-azure-rhel8@sha256:93e95f065eadaa41154b9012dd5ddc824607758e2bce85c4256c2689125b80a4_amd64",
"relates_to_product_reference": "8Base-RHMTC-1.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhmtc/openshift-migration-velero-restic-restore-helper-rhel8@sha256:70d3d46f54b91538e047df62e7e5b161fabac195a2f2e45cdba78215b4c82a7d_amd64 as a component of 8Base-RHMTC-1.7",
"product_id": "8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-restic-restore-helper-rhel8@sha256:70d3d46f54b91538e047df62e7e5b161fabac195a2f2e45cdba78215b4c82a7d_amd64"
},
"product_reference": "rhmtc/openshift-migration-velero-restic-restore-helper-rhel8@sha256:70d3d46f54b91538e047df62e7e5b161fabac195a2f2e45cdba78215b4c82a7d_amd64",
"relates_to_product_reference": "8Base-RHMTC-1.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhmtc/openshift-migration-velero-rhel8@sha256:1ca6945c3918f1743a4cee86a507f9f6581c8f8e572b6b8739d79a675a64d1db_amd64 as a component of 8Base-RHMTC-1.7",
"product_id": "8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-rhel8@sha256:1ca6945c3918f1743a4cee86a507f9f6581c8f8e572b6b8739d79a675a64d1db_amd64"
},
"product_reference": "rhmtc/openshift-migration-velero-rhel8@sha256:1ca6945c3918f1743a4cee86a507f9f6581c8f8e572b6b8739d79a675a64d1db_amd64",
"relates_to_product_reference": "8Base-RHMTC-1.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhmtc/openshift-velero-plugin-rhel8@sha256:26f8fb5c41ece82626325ba502505ba1ca7986602cc147b492f9857caa0be868_amd64 as a component of 8Base-RHMTC-1.7",
"product_id": "8Base-RHMTC-1.7:rhmtc/openshift-velero-plugin-rhel8@sha256:26f8fb5c41ece82626325ba502505ba1ca7986602cc147b492f9857caa0be868_amd64"
},
"product_reference": "rhmtc/openshift-velero-plugin-rhel8@sha256:26f8fb5c41ece82626325ba502505ba1ca7986602cc147b492f9857caa0be868_amd64",
"relates_to_product_reference": "8Base-RHMTC-1.7"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2021-43138",
"cwe": {
"id": "CWE-1321",
"name": "Improperly Controlled Modification of Object Prototype Attributes (\u0027Prototype Pollution\u0027)"
},
"discovery_date": "2022-09-13T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-RHMTC-1.7:rhmtc/openshift-migration-controller-rhel8@sha256:362eb32d0d2607f72b4f425dabaea7cde5d292ac41aea0c18c78bc6e408fff9e_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-hook-runner-rhel8@sha256:aa63717ac3a4961e774ed0baa3a73f01eda185516e7380579d97b9d25764d10d_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-legacy-rhel8-operator@sha256:1ac9cdfbdce8f7b6e4ebf5e40013f766b71b6dd604c92f602aca96612a228eda_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-log-reader-rhel8@sha256:d89e9ef65993466d25b26702d0210c14ce191155501774f4d2f1f08dbdad9804_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-must-gather-rhel8@sha256:5acf34dc4041b694b452d46c2f656db566241773285ca305a79ab7b9dc087b43_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-openvpn-rhel8@sha256:15df7304827ce49d422554551f08d99cfffa1afc4ffacac145d4399ccb1cbd68_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-operator-bundle@sha256:90ed03a5e0cb0b0ffd85f7434cc4eda9bd8fe81cd90b597772d9b7caccd4b80f_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-registry-rhel8@sha256:aaa03ef0769d38185675db2a7a78454659de14bdebe5ff842614bf2124e5adfe_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-rhel8-operator@sha256:aaaf4f6095294b497889749390f0a3aac04b83131a423799c44b5e367e0b370a_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-rsync-transfer-rhel8@sha256:58bd4ffc3e9599401251ac929cf15c1773ecc03a57177118adbe23ac8d7762af_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-plugin-for-aws-rhel8@sha256:633eeb0b6b50e21bbc0fb12fd2262294733fc9ac8b1e9eedcdb9d1433534d88d_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-plugin-for-gcp-rhel8@sha256:19dbf2bb83f8a0f35079d6ae25f8fcddad970e48ecb21694fd2d4c553313e4aa_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-plugin-for-microsoft-azure-rhel8@sha256:93e95f065eadaa41154b9012dd5ddc824607758e2bce85c4256c2689125b80a4_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-restic-restore-helper-rhel8@sha256:70d3d46f54b91538e047df62e7e5b161fabac195a2f2e45cdba78215b4c82a7d_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-rhel8@sha256:1ca6945c3918f1743a4cee86a507f9f6581c8f8e572b6b8739d79a675a64d1db_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-velero-plugin-rhel8@sha256:26f8fb5c41ece82626325ba502505ba1ca7986602cc147b492f9857caa0be868_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2126276"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in the async package. This flaw allows a malicious user to obtain privileges via the mapValues() method.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "async: Prototype Pollution in async",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-RHMTC-1.7:rhmtc/openshift-migration-ui-rhel8@sha256:4141db5099ae659270297eb4aaff695ac43fce67d91fea49dbc76583f419d3a1_amd64"
],
"known_not_affected": [
"8Base-RHMTC-1.7:rhmtc/openshift-migration-controller-rhel8@sha256:362eb32d0d2607f72b4f425dabaea7cde5d292ac41aea0c18c78bc6e408fff9e_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-hook-runner-rhel8@sha256:aa63717ac3a4961e774ed0baa3a73f01eda185516e7380579d97b9d25764d10d_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-legacy-rhel8-operator@sha256:1ac9cdfbdce8f7b6e4ebf5e40013f766b71b6dd604c92f602aca96612a228eda_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-log-reader-rhel8@sha256:d89e9ef65993466d25b26702d0210c14ce191155501774f4d2f1f08dbdad9804_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-must-gather-rhel8@sha256:5acf34dc4041b694b452d46c2f656db566241773285ca305a79ab7b9dc087b43_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-openvpn-rhel8@sha256:15df7304827ce49d422554551f08d99cfffa1afc4ffacac145d4399ccb1cbd68_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-operator-bundle@sha256:90ed03a5e0cb0b0ffd85f7434cc4eda9bd8fe81cd90b597772d9b7caccd4b80f_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-registry-rhel8@sha256:aaa03ef0769d38185675db2a7a78454659de14bdebe5ff842614bf2124e5adfe_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-rhel8-operator@sha256:aaaf4f6095294b497889749390f0a3aac04b83131a423799c44b5e367e0b370a_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-rsync-transfer-rhel8@sha256:58bd4ffc3e9599401251ac929cf15c1773ecc03a57177118adbe23ac8d7762af_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-plugin-for-aws-rhel8@sha256:633eeb0b6b50e21bbc0fb12fd2262294733fc9ac8b1e9eedcdb9d1433534d88d_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-plugin-for-gcp-rhel8@sha256:19dbf2bb83f8a0f35079d6ae25f8fcddad970e48ecb21694fd2d4c553313e4aa_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-plugin-for-microsoft-azure-rhel8@sha256:93e95f065eadaa41154b9012dd5ddc824607758e2bce85c4256c2689125b80a4_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-restic-restore-helper-rhel8@sha256:70d3d46f54b91538e047df62e7e5b161fabac195a2f2e45cdba78215b4c82a7d_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-rhel8@sha256:1ca6945c3918f1743a4cee86a507f9f6581c8f8e572b6b8739d79a675a64d1db_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-velero-plugin-rhel8@sha256:26f8fb5c41ece82626325ba502505ba1ca7986602cc147b492f9857caa0be868_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-43138"
},
{
"category": "external",
"summary": "RHBZ#2126276",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2126276"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-43138",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-43138"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-43138",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-43138"
},
{
"category": "external",
"summary": "https://github.com/advisories/GHSA-fwr7-v2mv-hh25",
"url": "https://github.com/advisories/GHSA-fwr7-v2mv-hh25"
}
],
"release_date": "2022-04-07T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-02-09T02:17:22+00:00",
"details": "For details on how to install and use MTC, refer to:\n\nhttps://docs.openshift.com/container-platform/latest/migration_toolkit_for_containers/installing-mtc.html",
"product_ids": [
"8Base-RHMTC-1.7:rhmtc/openshift-migration-ui-rhel8@sha256:4141db5099ae659270297eb4aaff695ac43fce67d91fea49dbc76583f419d3a1_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:0693"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"8Base-RHMTC-1.7:rhmtc/openshift-migration-controller-rhel8@sha256:362eb32d0d2607f72b4f425dabaea7cde5d292ac41aea0c18c78bc6e408fff9e_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-hook-runner-rhel8@sha256:aa63717ac3a4961e774ed0baa3a73f01eda185516e7380579d97b9d25764d10d_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-legacy-rhel8-operator@sha256:1ac9cdfbdce8f7b6e4ebf5e40013f766b71b6dd604c92f602aca96612a228eda_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-log-reader-rhel8@sha256:d89e9ef65993466d25b26702d0210c14ce191155501774f4d2f1f08dbdad9804_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-must-gather-rhel8@sha256:5acf34dc4041b694b452d46c2f656db566241773285ca305a79ab7b9dc087b43_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-openvpn-rhel8@sha256:15df7304827ce49d422554551f08d99cfffa1afc4ffacac145d4399ccb1cbd68_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-operator-bundle@sha256:90ed03a5e0cb0b0ffd85f7434cc4eda9bd8fe81cd90b597772d9b7caccd4b80f_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-registry-rhel8@sha256:aaa03ef0769d38185675db2a7a78454659de14bdebe5ff842614bf2124e5adfe_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-rhel8-operator@sha256:aaaf4f6095294b497889749390f0a3aac04b83131a423799c44b5e367e0b370a_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-rsync-transfer-rhel8@sha256:58bd4ffc3e9599401251ac929cf15c1773ecc03a57177118adbe23ac8d7762af_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-ui-rhel8@sha256:4141db5099ae659270297eb4aaff695ac43fce67d91fea49dbc76583f419d3a1_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-plugin-for-aws-rhel8@sha256:633eeb0b6b50e21bbc0fb12fd2262294733fc9ac8b1e9eedcdb9d1433534d88d_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-plugin-for-gcp-rhel8@sha256:19dbf2bb83f8a0f35079d6ae25f8fcddad970e48ecb21694fd2d4c553313e4aa_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-plugin-for-microsoft-azure-rhel8@sha256:93e95f065eadaa41154b9012dd5ddc824607758e2bce85c4256c2689125b80a4_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-restic-restore-helper-rhel8@sha256:70d3d46f54b91538e047df62e7e5b161fabac195a2f2e45cdba78215b4c82a7d_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-rhel8@sha256:1ca6945c3918f1743a4cee86a507f9f6581c8f8e572b6b8739d79a675a64d1db_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-velero-plugin-rhel8@sha256:26f8fb5c41ece82626325ba502505ba1ca7986602cc147b492f9857caa0be868_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "async: Prototype Pollution in async"
},
{
"acknowledgments": [
{
"names": [
"Adam Korczynski"
],
"organization": "ADA Logics"
},
{
"names": [
"OSS-Fuzz"
]
}
],
"cve": "CVE-2022-2879",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"discovery_date": "2022-10-07T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-RHMTC-1.7:rhmtc/openshift-migration-controller-rhel8@sha256:362eb32d0d2607f72b4f425dabaea7cde5d292ac41aea0c18c78bc6e408fff9e_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-hook-runner-rhel8@sha256:aa63717ac3a4961e774ed0baa3a73f01eda185516e7380579d97b9d25764d10d_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-legacy-rhel8-operator@sha256:1ac9cdfbdce8f7b6e4ebf5e40013f766b71b6dd604c92f602aca96612a228eda_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-log-reader-rhel8@sha256:d89e9ef65993466d25b26702d0210c14ce191155501774f4d2f1f08dbdad9804_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-must-gather-rhel8@sha256:5acf34dc4041b694b452d46c2f656db566241773285ca305a79ab7b9dc087b43_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-openvpn-rhel8@sha256:15df7304827ce49d422554551f08d99cfffa1afc4ffacac145d4399ccb1cbd68_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-operator-bundle@sha256:90ed03a5e0cb0b0ffd85f7434cc4eda9bd8fe81cd90b597772d9b7caccd4b80f_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-registry-rhel8@sha256:aaa03ef0769d38185675db2a7a78454659de14bdebe5ff842614bf2124e5adfe_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-rhel8-operator@sha256:aaaf4f6095294b497889749390f0a3aac04b83131a423799c44b5e367e0b370a_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-rsync-transfer-rhel8@sha256:58bd4ffc3e9599401251ac929cf15c1773ecc03a57177118adbe23ac8d7762af_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-ui-rhel8@sha256:4141db5099ae659270297eb4aaff695ac43fce67d91fea49dbc76583f419d3a1_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-plugin-for-aws-rhel8@sha256:633eeb0b6b50e21bbc0fb12fd2262294733fc9ac8b1e9eedcdb9d1433534d88d_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-plugin-for-gcp-rhel8@sha256:19dbf2bb83f8a0f35079d6ae25f8fcddad970e48ecb21694fd2d4c553313e4aa_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-plugin-for-microsoft-azure-rhel8@sha256:93e95f065eadaa41154b9012dd5ddc824607758e2bce85c4256c2689125b80a4_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-restic-restore-helper-rhel8@sha256:70d3d46f54b91538e047df62e7e5b161fabac195a2f2e45cdba78215b4c82a7d_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-rhel8@sha256:1ca6945c3918f1743a4cee86a507f9f6581c8f8e572b6b8739d79a675a64d1db_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2132867"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the golang package, where Reader.Read does not set a limit on the maximum size of file headers. After fixing, Reader.Read limits the maximum size of header blocks to 1 MiB. This flaw allows a maliciously crafted archive to cause Read to allocate unbounded amounts of memory, potentially causing resource exhaustion or panic.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: archive/tar: github.com/vbatts/tar-split: unbounded memory consumption when reading headers",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The opportunity for a Denial of Service is limited to the golang runtime. In the case of OpenShift Container Platform, this would be restricted within each individual container. There are multiple layers of guide rails (Golang\u2019s Garbage Collector; OpenShift\u2019s resource constraints imposed at the container and cluster levels) which would require a malicious user to continue submitting attacks for there to be any enduring impact. They would also need access to external server resources to be able to send a massive volume of requests to cause a significant impact on server operations.\n\n\nThis flaw additionally affects the github.com/vbatts/tar-split library and was fixed in v0.12.1.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-RHMTC-1.7:rhmtc/openshift-velero-plugin-rhel8@sha256:26f8fb5c41ece82626325ba502505ba1ca7986602cc147b492f9857caa0be868_amd64"
],
"known_not_affected": [
"8Base-RHMTC-1.7:rhmtc/openshift-migration-controller-rhel8@sha256:362eb32d0d2607f72b4f425dabaea7cde5d292ac41aea0c18c78bc6e408fff9e_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-hook-runner-rhel8@sha256:aa63717ac3a4961e774ed0baa3a73f01eda185516e7380579d97b9d25764d10d_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-legacy-rhel8-operator@sha256:1ac9cdfbdce8f7b6e4ebf5e40013f766b71b6dd604c92f602aca96612a228eda_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-log-reader-rhel8@sha256:d89e9ef65993466d25b26702d0210c14ce191155501774f4d2f1f08dbdad9804_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-must-gather-rhel8@sha256:5acf34dc4041b694b452d46c2f656db566241773285ca305a79ab7b9dc087b43_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-openvpn-rhel8@sha256:15df7304827ce49d422554551f08d99cfffa1afc4ffacac145d4399ccb1cbd68_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-operator-bundle@sha256:90ed03a5e0cb0b0ffd85f7434cc4eda9bd8fe81cd90b597772d9b7caccd4b80f_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-registry-rhel8@sha256:aaa03ef0769d38185675db2a7a78454659de14bdebe5ff842614bf2124e5adfe_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-rhel8-operator@sha256:aaaf4f6095294b497889749390f0a3aac04b83131a423799c44b5e367e0b370a_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-rsync-transfer-rhel8@sha256:58bd4ffc3e9599401251ac929cf15c1773ecc03a57177118adbe23ac8d7762af_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-ui-rhel8@sha256:4141db5099ae659270297eb4aaff695ac43fce67d91fea49dbc76583f419d3a1_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-plugin-for-aws-rhel8@sha256:633eeb0b6b50e21bbc0fb12fd2262294733fc9ac8b1e9eedcdb9d1433534d88d_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-plugin-for-gcp-rhel8@sha256:19dbf2bb83f8a0f35079d6ae25f8fcddad970e48ecb21694fd2d4c553313e4aa_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-plugin-for-microsoft-azure-rhel8@sha256:93e95f065eadaa41154b9012dd5ddc824607758e2bce85c4256c2689125b80a4_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-restic-restore-helper-rhel8@sha256:70d3d46f54b91538e047df62e7e5b161fabac195a2f2e45cdba78215b4c82a7d_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-rhel8@sha256:1ca6945c3918f1743a4cee86a507f9f6581c8f8e572b6b8739d79a675a64d1db_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-2879"
},
{
"category": "external",
"summary": "RHBZ#2132867",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2132867"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-2879",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2879"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-2879",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-2879"
},
{
"category": "external",
"summary": "https://github.com/golang/go/issues/54853",
"url": "https://github.com/golang/go/issues/54853"
},
{
"category": "external",
"summary": "https://github.com/vbatts/tar-split/releases/tag/v0.12.1",
"url": "https://github.com/vbatts/tar-split/releases/tag/v0.12.1"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/xtuG5faxtaU?pli=1",
"url": "https://groups.google.com/g/golang-announce/c/xtuG5faxtaU?pli=1"
}
],
"release_date": "2022-10-04T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-02-09T02:17:22+00:00",
"details": "For details on how to install and use MTC, refer to:\n\nhttps://docs.openshift.com/container-platform/latest/migration_toolkit_for_containers/installing-mtc.html",
"product_ids": [
"8Base-RHMTC-1.7:rhmtc/openshift-velero-plugin-rhel8@sha256:26f8fb5c41ece82626325ba502505ba1ca7986602cc147b492f9857caa0be868_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:0693"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"8Base-RHMTC-1.7:rhmtc/openshift-migration-controller-rhel8@sha256:362eb32d0d2607f72b4f425dabaea7cde5d292ac41aea0c18c78bc6e408fff9e_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-hook-runner-rhel8@sha256:aa63717ac3a4961e774ed0baa3a73f01eda185516e7380579d97b9d25764d10d_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-legacy-rhel8-operator@sha256:1ac9cdfbdce8f7b6e4ebf5e40013f766b71b6dd604c92f602aca96612a228eda_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-log-reader-rhel8@sha256:d89e9ef65993466d25b26702d0210c14ce191155501774f4d2f1f08dbdad9804_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-must-gather-rhel8@sha256:5acf34dc4041b694b452d46c2f656db566241773285ca305a79ab7b9dc087b43_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-openvpn-rhel8@sha256:15df7304827ce49d422554551f08d99cfffa1afc4ffacac145d4399ccb1cbd68_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-operator-bundle@sha256:90ed03a5e0cb0b0ffd85f7434cc4eda9bd8fe81cd90b597772d9b7caccd4b80f_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-registry-rhel8@sha256:aaa03ef0769d38185675db2a7a78454659de14bdebe5ff842614bf2124e5adfe_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-rhel8-operator@sha256:aaaf4f6095294b497889749390f0a3aac04b83131a423799c44b5e367e0b370a_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-rsync-transfer-rhel8@sha256:58bd4ffc3e9599401251ac929cf15c1773ecc03a57177118adbe23ac8d7762af_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-ui-rhel8@sha256:4141db5099ae659270297eb4aaff695ac43fce67d91fea49dbc76583f419d3a1_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-plugin-for-aws-rhel8@sha256:633eeb0b6b50e21bbc0fb12fd2262294733fc9ac8b1e9eedcdb9d1433534d88d_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-plugin-for-gcp-rhel8@sha256:19dbf2bb83f8a0f35079d6ae25f8fcddad970e48ecb21694fd2d4c553313e4aa_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-plugin-for-microsoft-azure-rhel8@sha256:93e95f065eadaa41154b9012dd5ddc824607758e2bce85c4256c2689125b80a4_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-restic-restore-helper-rhel8@sha256:70d3d46f54b91538e047df62e7e5b161fabac195a2f2e45cdba78215b4c82a7d_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-rhel8@sha256:1ca6945c3918f1743a4cee86a507f9f6581c8f8e572b6b8739d79a675a64d1db_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-velero-plugin-rhel8@sha256:26f8fb5c41ece82626325ba502505ba1ca7986602cc147b492f9857caa0be868_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "golang: archive/tar: github.com/vbatts/tar-split: unbounded memory consumption when reading headers"
},
{
"acknowledgments": [
{
"names": [
"Daniel Abeles"
],
"organization": "Head of Research, Oxeye"
},
{
"names": [
"Gal Goldstein"
],
"organization": "Security Researcher, Oxeye"
}
],
"cve": "CVE-2022-2880",
"cwe": {
"id": "CWE-444",
"name": "Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027)"
},
"discovery_date": "2022-10-07T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-RHMTC-1.7:rhmtc/openshift-migration-controller-rhel8@sha256:362eb32d0d2607f72b4f425dabaea7cde5d292ac41aea0c18c78bc6e408fff9e_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-hook-runner-rhel8@sha256:aa63717ac3a4961e774ed0baa3a73f01eda185516e7380579d97b9d25764d10d_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-legacy-rhel8-operator@sha256:1ac9cdfbdce8f7b6e4ebf5e40013f766b71b6dd604c92f602aca96612a228eda_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-log-reader-rhel8@sha256:d89e9ef65993466d25b26702d0210c14ce191155501774f4d2f1f08dbdad9804_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-must-gather-rhel8@sha256:5acf34dc4041b694b452d46c2f656db566241773285ca305a79ab7b9dc087b43_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-openvpn-rhel8@sha256:15df7304827ce49d422554551f08d99cfffa1afc4ffacac145d4399ccb1cbd68_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-operator-bundle@sha256:90ed03a5e0cb0b0ffd85f7434cc4eda9bd8fe81cd90b597772d9b7caccd4b80f_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-registry-rhel8@sha256:aaa03ef0769d38185675db2a7a78454659de14bdebe5ff842614bf2124e5adfe_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-rhel8-operator@sha256:aaaf4f6095294b497889749390f0a3aac04b83131a423799c44b5e367e0b370a_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-rsync-transfer-rhel8@sha256:58bd4ffc3e9599401251ac929cf15c1773ecc03a57177118adbe23ac8d7762af_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-ui-rhel8@sha256:4141db5099ae659270297eb4aaff695ac43fce67d91fea49dbc76583f419d3a1_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-plugin-for-aws-rhel8@sha256:633eeb0b6b50e21bbc0fb12fd2262294733fc9ac8b1e9eedcdb9d1433534d88d_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-plugin-for-gcp-rhel8@sha256:19dbf2bb83f8a0f35079d6ae25f8fcddad970e48ecb21694fd2d4c553313e4aa_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-plugin-for-microsoft-azure-rhel8@sha256:93e95f065eadaa41154b9012dd5ddc824607758e2bce85c4256c2689125b80a4_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-restic-restore-helper-rhel8@sha256:70d3d46f54b91538e047df62e7e5b161fabac195a2f2e45cdba78215b4c82a7d_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-rhel8@sha256:1ca6945c3918f1743a4cee86a507f9f6581c8f8e572b6b8739d79a675a64d1db_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2132868"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the golang package, where requests forwarded by reverse proxy include the raw query parameters from the inbound request, including unparseable parameters rejected by net/http. This issue could permit query parameter smuggling when a Go proxy forwards a parameter with an unparseable value. After the fix, the reverse proxy sanitizes the query parameters in the forwarded query when the outbound request\u0027s form field is set after the reverse proxy. The director function returns, indicating that the proxy has parsed the query parameters. Proxies that do not parse query parameters continue to forward the original query parameters unchanged.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: net/http/httputil: ReverseProxy should not forward unparseable query parameters",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The opportunity to exploit this vulnerability is limited to the Golang runtime. In the case of the OpenShift Container Platform, this would be restricted within each individual container. There are multiple layers of guide rails (Golang\u2019s Garbage Collector; OpenShift\u2019s resource constraints imposed at the container and cluster levels) which would require a malicious user to continue submitting attacks for there to be any enduring impact.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-RHMTC-1.7:rhmtc/openshift-velero-plugin-rhel8@sha256:26f8fb5c41ece82626325ba502505ba1ca7986602cc147b492f9857caa0be868_amd64"
],
"known_not_affected": [
"8Base-RHMTC-1.7:rhmtc/openshift-migration-controller-rhel8@sha256:362eb32d0d2607f72b4f425dabaea7cde5d292ac41aea0c18c78bc6e408fff9e_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-hook-runner-rhel8@sha256:aa63717ac3a4961e774ed0baa3a73f01eda185516e7380579d97b9d25764d10d_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-legacy-rhel8-operator@sha256:1ac9cdfbdce8f7b6e4ebf5e40013f766b71b6dd604c92f602aca96612a228eda_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-log-reader-rhel8@sha256:d89e9ef65993466d25b26702d0210c14ce191155501774f4d2f1f08dbdad9804_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-must-gather-rhel8@sha256:5acf34dc4041b694b452d46c2f656db566241773285ca305a79ab7b9dc087b43_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-openvpn-rhel8@sha256:15df7304827ce49d422554551f08d99cfffa1afc4ffacac145d4399ccb1cbd68_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-operator-bundle@sha256:90ed03a5e0cb0b0ffd85f7434cc4eda9bd8fe81cd90b597772d9b7caccd4b80f_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-registry-rhel8@sha256:aaa03ef0769d38185675db2a7a78454659de14bdebe5ff842614bf2124e5adfe_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-rhel8-operator@sha256:aaaf4f6095294b497889749390f0a3aac04b83131a423799c44b5e367e0b370a_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-rsync-transfer-rhel8@sha256:58bd4ffc3e9599401251ac929cf15c1773ecc03a57177118adbe23ac8d7762af_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-ui-rhel8@sha256:4141db5099ae659270297eb4aaff695ac43fce67d91fea49dbc76583f419d3a1_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-plugin-for-aws-rhel8@sha256:633eeb0b6b50e21bbc0fb12fd2262294733fc9ac8b1e9eedcdb9d1433534d88d_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-plugin-for-gcp-rhel8@sha256:19dbf2bb83f8a0f35079d6ae25f8fcddad970e48ecb21694fd2d4c553313e4aa_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-plugin-for-microsoft-azure-rhel8@sha256:93e95f065eadaa41154b9012dd5ddc824607758e2bce85c4256c2689125b80a4_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-restic-restore-helper-rhel8@sha256:70d3d46f54b91538e047df62e7e5b161fabac195a2f2e45cdba78215b4c82a7d_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-rhel8@sha256:1ca6945c3918f1743a4cee86a507f9f6581c8f8e572b6b8739d79a675a64d1db_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-2880"
},
{
"category": "external",
"summary": "RHBZ#2132868",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2132868"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-2880",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2880"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-2880",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-2880"
},
{
"category": "external",
"summary": "https://github.com/golang/go/issues/54663",
"url": "https://github.com/golang/go/issues/54663"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/xtuG5faxtaU?pli=1",
"url": "https://groups.google.com/g/golang-announce/c/xtuG5faxtaU?pli=1"
}
],
"release_date": "2022-10-04T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-02-09T02:17:22+00:00",
"details": "For details on how to install and use MTC, refer to:\n\nhttps://docs.openshift.com/container-platform/latest/migration_toolkit_for_containers/installing-mtc.html",
"product_ids": [
"8Base-RHMTC-1.7:rhmtc/openshift-velero-plugin-rhel8@sha256:26f8fb5c41ece82626325ba502505ba1ca7986602cc147b492f9857caa0be868_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:0693"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"8Base-RHMTC-1.7:rhmtc/openshift-migration-controller-rhel8@sha256:362eb32d0d2607f72b4f425dabaea7cde5d292ac41aea0c18c78bc6e408fff9e_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-hook-runner-rhel8@sha256:aa63717ac3a4961e774ed0baa3a73f01eda185516e7380579d97b9d25764d10d_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-legacy-rhel8-operator@sha256:1ac9cdfbdce8f7b6e4ebf5e40013f766b71b6dd604c92f602aca96612a228eda_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-log-reader-rhel8@sha256:d89e9ef65993466d25b26702d0210c14ce191155501774f4d2f1f08dbdad9804_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-must-gather-rhel8@sha256:5acf34dc4041b694b452d46c2f656db566241773285ca305a79ab7b9dc087b43_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-openvpn-rhel8@sha256:15df7304827ce49d422554551f08d99cfffa1afc4ffacac145d4399ccb1cbd68_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-operator-bundle@sha256:90ed03a5e0cb0b0ffd85f7434cc4eda9bd8fe81cd90b597772d9b7caccd4b80f_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-registry-rhel8@sha256:aaa03ef0769d38185675db2a7a78454659de14bdebe5ff842614bf2124e5adfe_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-rhel8-operator@sha256:aaaf4f6095294b497889749390f0a3aac04b83131a423799c44b5e367e0b370a_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-rsync-transfer-rhel8@sha256:58bd4ffc3e9599401251ac929cf15c1773ecc03a57177118adbe23ac8d7762af_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-ui-rhel8@sha256:4141db5099ae659270297eb4aaff695ac43fce67d91fea49dbc76583f419d3a1_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-plugin-for-aws-rhel8@sha256:633eeb0b6b50e21bbc0fb12fd2262294733fc9ac8b1e9eedcdb9d1433534d88d_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-plugin-for-gcp-rhel8@sha256:19dbf2bb83f8a0f35079d6ae25f8fcddad970e48ecb21694fd2d4c553313e4aa_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-plugin-for-microsoft-azure-rhel8@sha256:93e95f065eadaa41154b9012dd5ddc824607758e2bce85c4256c2689125b80a4_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-restic-restore-helper-rhel8@sha256:70d3d46f54b91538e047df62e7e5b161fabac195a2f2e45cdba78215b4c82a7d_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-rhel8@sha256:1ca6945c3918f1743a4cee86a507f9f6581c8f8e572b6b8739d79a675a64d1db_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-velero-plugin-rhel8@sha256:26f8fb5c41ece82626325ba502505ba1ca7986602cc147b492f9857caa0be868_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "golang: net/http/httputil: ReverseProxy should not forward unparseable query parameters"
},
{
"cve": "CVE-2022-27664",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"discovery_date": "2022-09-06T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-RHMTC-1.7:rhmtc/openshift-migration-controller-rhel8@sha256:362eb32d0d2607f72b4f425dabaea7cde5d292ac41aea0c18c78bc6e408fff9e_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-hook-runner-rhel8@sha256:aa63717ac3a4961e774ed0baa3a73f01eda185516e7380579d97b9d25764d10d_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-legacy-rhel8-operator@sha256:1ac9cdfbdce8f7b6e4ebf5e40013f766b71b6dd604c92f602aca96612a228eda_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-log-reader-rhel8@sha256:d89e9ef65993466d25b26702d0210c14ce191155501774f4d2f1f08dbdad9804_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-must-gather-rhel8@sha256:5acf34dc4041b694b452d46c2f656db566241773285ca305a79ab7b9dc087b43_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-operator-bundle@sha256:90ed03a5e0cb0b0ffd85f7434cc4eda9bd8fe81cd90b597772d9b7caccd4b80f_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-registry-rhel8@sha256:aaa03ef0769d38185675db2a7a78454659de14bdebe5ff842614bf2124e5adfe_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-rhel8-operator@sha256:aaaf4f6095294b497889749390f0a3aac04b83131a423799c44b5e367e0b370a_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-rsync-transfer-rhel8@sha256:58bd4ffc3e9599401251ac929cf15c1773ecc03a57177118adbe23ac8d7762af_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-ui-rhel8@sha256:4141db5099ae659270297eb4aaff695ac43fce67d91fea49dbc76583f419d3a1_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-plugin-for-aws-rhel8@sha256:633eeb0b6b50e21bbc0fb12fd2262294733fc9ac8b1e9eedcdb9d1433534d88d_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-plugin-for-gcp-rhel8@sha256:19dbf2bb83f8a0f35079d6ae25f8fcddad970e48ecb21694fd2d4c553313e4aa_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-plugin-for-microsoft-azure-rhel8@sha256:93e95f065eadaa41154b9012dd5ddc824607758e2bce85c4256c2689125b80a4_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-restic-restore-helper-rhel8@sha256:70d3d46f54b91538e047df62e7e5b161fabac195a2f2e45cdba78215b4c82a7d_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-rhel8@sha256:1ca6945c3918f1743a4cee86a507f9f6581c8f8e572b6b8739d79a675a64d1db_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2124669"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the golang package. In net/http in Go, attackers can cause a denial of service because an HTTP/2 connection can hang during closing if a fatal error preempts the shutdown.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: net/http: handle server errors after sending GOAWAY",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The opportunity for a Denial of Service is limited to the golang runtime. In the case of OpenShift Container Platform, this would be restricted within each individual container. There are multiple layers of guide rails (Golang\u2019s Garbage Collector; OpenShift\u2019s resource constraints imposed at the container and cluster levels) which would require a malicious user to continue submitting attacks for there to be any enduring impact. They would also need access to external server resources to be able to send a massive volume of requests to cause a significant impact on server operations.\n\nWithin regulated environments, a combination of the following controls acts as a significant barrier to successfully exploiting a CWE-400: Uncontrolled Resource Consumption vulnerability and therefore downgrades the severity of this particular CVE from Moderate to Low.\n\nRed Hat restricts access to all platform information by default, granting access only after successful hard token-based multi-factor authentication (MFA) and enforcing least privilege to ensure only authorized roles can execute or modify code. The environment employs malicious code protections, including IDS/IPS and antimalware tools to detect threats and monitor resource usage, helping prevent uncontrolled consumption that could lead to system failure. Additional safeguards, such as web application firewalls and load-balancing strategies, protect against resource exhaustion and performance degradation. Event logs are centrally collected, correlated, and analyzed to support monitoring, alerting, and retention, aiding in the detection of abnormal behavior and potential denial-of-service (DoS) conditions. Static code analysis and peer reviews enforce strong input validation and error handling, reducing the likelihood of input-based DoS attacks.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-RHMTC-1.7:rhmtc/openshift-migration-openvpn-rhel8@sha256:15df7304827ce49d422554551f08d99cfffa1afc4ffacac145d4399ccb1cbd68_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-velero-plugin-rhel8@sha256:26f8fb5c41ece82626325ba502505ba1ca7986602cc147b492f9857caa0be868_amd64"
],
"known_not_affected": [
"8Base-RHMTC-1.7:rhmtc/openshift-migration-controller-rhel8@sha256:362eb32d0d2607f72b4f425dabaea7cde5d292ac41aea0c18c78bc6e408fff9e_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-hook-runner-rhel8@sha256:aa63717ac3a4961e774ed0baa3a73f01eda185516e7380579d97b9d25764d10d_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-legacy-rhel8-operator@sha256:1ac9cdfbdce8f7b6e4ebf5e40013f766b71b6dd604c92f602aca96612a228eda_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-log-reader-rhel8@sha256:d89e9ef65993466d25b26702d0210c14ce191155501774f4d2f1f08dbdad9804_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-must-gather-rhel8@sha256:5acf34dc4041b694b452d46c2f656db566241773285ca305a79ab7b9dc087b43_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-operator-bundle@sha256:90ed03a5e0cb0b0ffd85f7434cc4eda9bd8fe81cd90b597772d9b7caccd4b80f_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-registry-rhel8@sha256:aaa03ef0769d38185675db2a7a78454659de14bdebe5ff842614bf2124e5adfe_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-rhel8-operator@sha256:aaaf4f6095294b497889749390f0a3aac04b83131a423799c44b5e367e0b370a_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-rsync-transfer-rhel8@sha256:58bd4ffc3e9599401251ac929cf15c1773ecc03a57177118adbe23ac8d7762af_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-ui-rhel8@sha256:4141db5099ae659270297eb4aaff695ac43fce67d91fea49dbc76583f419d3a1_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-plugin-for-aws-rhel8@sha256:633eeb0b6b50e21bbc0fb12fd2262294733fc9ac8b1e9eedcdb9d1433534d88d_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-plugin-for-gcp-rhel8@sha256:19dbf2bb83f8a0f35079d6ae25f8fcddad970e48ecb21694fd2d4c553313e4aa_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-plugin-for-microsoft-azure-rhel8@sha256:93e95f065eadaa41154b9012dd5ddc824607758e2bce85c4256c2689125b80a4_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-restic-restore-helper-rhel8@sha256:70d3d46f54b91538e047df62e7e5b161fabac195a2f2e45cdba78215b4c82a7d_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-rhel8@sha256:1ca6945c3918f1743a4cee86a507f9f6581c8f8e572b6b8739d79a675a64d1db_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-27664"
},
{
"category": "external",
"summary": "RHBZ#2124669",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2124669"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-27664",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27664"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-27664",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-27664"
},
{
"category": "external",
"summary": "https://go.dev/issue/54658",
"url": "https://go.dev/issue/54658"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/x49AQzIVX-s/m/0tgO0pjiBQAJ",
"url": "https://groups.google.com/g/golang-announce/c/x49AQzIVX-s/m/0tgO0pjiBQAJ"
}
],
"release_date": "2022-09-06T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-02-09T02:17:22+00:00",
"details": "For details on how to install and use MTC, refer to:\n\nhttps://docs.openshift.com/container-platform/latest/migration_toolkit_for_containers/installing-mtc.html",
"product_ids": [
"8Base-RHMTC-1.7:rhmtc/openshift-migration-openvpn-rhel8@sha256:15df7304827ce49d422554551f08d99cfffa1afc4ffacac145d4399ccb1cbd68_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-velero-plugin-rhel8@sha256:26f8fb5c41ece82626325ba502505ba1ca7986602cc147b492f9857caa0be868_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:0693"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"8Base-RHMTC-1.7:rhmtc/openshift-migration-controller-rhel8@sha256:362eb32d0d2607f72b4f425dabaea7cde5d292ac41aea0c18c78bc6e408fff9e_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-hook-runner-rhel8@sha256:aa63717ac3a4961e774ed0baa3a73f01eda185516e7380579d97b9d25764d10d_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-legacy-rhel8-operator@sha256:1ac9cdfbdce8f7b6e4ebf5e40013f766b71b6dd604c92f602aca96612a228eda_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-log-reader-rhel8@sha256:d89e9ef65993466d25b26702d0210c14ce191155501774f4d2f1f08dbdad9804_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-must-gather-rhel8@sha256:5acf34dc4041b694b452d46c2f656db566241773285ca305a79ab7b9dc087b43_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-openvpn-rhel8@sha256:15df7304827ce49d422554551f08d99cfffa1afc4ffacac145d4399ccb1cbd68_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-operator-bundle@sha256:90ed03a5e0cb0b0ffd85f7434cc4eda9bd8fe81cd90b597772d9b7caccd4b80f_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-registry-rhel8@sha256:aaa03ef0769d38185675db2a7a78454659de14bdebe5ff842614bf2124e5adfe_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-rhel8-operator@sha256:aaaf4f6095294b497889749390f0a3aac04b83131a423799c44b5e367e0b370a_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-rsync-transfer-rhel8@sha256:58bd4ffc3e9599401251ac929cf15c1773ecc03a57177118adbe23ac8d7762af_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-ui-rhel8@sha256:4141db5099ae659270297eb4aaff695ac43fce67d91fea49dbc76583f419d3a1_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-plugin-for-aws-rhel8@sha256:633eeb0b6b50e21bbc0fb12fd2262294733fc9ac8b1e9eedcdb9d1433534d88d_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-plugin-for-gcp-rhel8@sha256:19dbf2bb83f8a0f35079d6ae25f8fcddad970e48ecb21694fd2d4c553313e4aa_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-plugin-for-microsoft-azure-rhel8@sha256:93e95f065eadaa41154b9012dd5ddc824607758e2bce85c4256c2689125b80a4_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-restic-restore-helper-rhel8@sha256:70d3d46f54b91538e047df62e7e5b161fabac195a2f2e45cdba78215b4c82a7d_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-rhel8@sha256:1ca6945c3918f1743a4cee86a507f9f6581c8f8e572b6b8739d79a675a64d1db_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-velero-plugin-rhel8@sha256:26f8fb5c41ece82626325ba502505ba1ca7986602cc147b492f9857caa0be868_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "golang: net/http: handle server errors after sending GOAWAY"
},
{
"cve": "CVE-2022-32149",
"cwe": {
"id": "CWE-407",
"name": "Inefficient Algorithmic Complexity"
},
"discovery_date": "2022-10-12T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-RHMTC-1.7:rhmtc/openshift-migration-controller-rhel8@sha256:362eb32d0d2607f72b4f425dabaea7cde5d292ac41aea0c18c78bc6e408fff9e_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-hook-runner-rhel8@sha256:aa63717ac3a4961e774ed0baa3a73f01eda185516e7380579d97b9d25764d10d_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-legacy-rhel8-operator@sha256:1ac9cdfbdce8f7b6e4ebf5e40013f766b71b6dd604c92f602aca96612a228eda_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-log-reader-rhel8@sha256:d89e9ef65993466d25b26702d0210c14ce191155501774f4d2f1f08dbdad9804_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-must-gather-rhel8@sha256:5acf34dc4041b694b452d46c2f656db566241773285ca305a79ab7b9dc087b43_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-openvpn-rhel8@sha256:15df7304827ce49d422554551f08d99cfffa1afc4ffacac145d4399ccb1cbd68_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-operator-bundle@sha256:90ed03a5e0cb0b0ffd85f7434cc4eda9bd8fe81cd90b597772d9b7caccd4b80f_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-registry-rhel8@sha256:aaa03ef0769d38185675db2a7a78454659de14bdebe5ff842614bf2124e5adfe_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-rhel8-operator@sha256:aaaf4f6095294b497889749390f0a3aac04b83131a423799c44b5e367e0b370a_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-rsync-transfer-rhel8@sha256:58bd4ffc3e9599401251ac929cf15c1773ecc03a57177118adbe23ac8d7762af_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-ui-rhel8@sha256:4141db5099ae659270297eb4aaff695ac43fce67d91fea49dbc76583f419d3a1_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-plugin-for-aws-rhel8@sha256:633eeb0b6b50e21bbc0fb12fd2262294733fc9ac8b1e9eedcdb9d1433534d88d_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-plugin-for-gcp-rhel8@sha256:19dbf2bb83f8a0f35079d6ae25f8fcddad970e48ecb21694fd2d4c553313e4aa_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-plugin-for-microsoft-azure-rhel8@sha256:93e95f065eadaa41154b9012dd5ddc824607758e2bce85c4256c2689125b80a4_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-restic-restore-helper-rhel8@sha256:70d3d46f54b91538e047df62e7e5b161fabac195a2f2e45cdba78215b4c82a7d_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-velero-plugin-rhel8@sha256:26f8fb5c41ece82626325ba502505ba1ca7986602cc147b492f9857caa0be868_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2134010"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in the golang.org/x/text/language package. An attacker can craft an Accept-Language header which ParseAcceptLanguage will take significant time to parse. This issue leads to a denial of service, and can impact availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: golang.org/x/text/language: ParseAcceptLanguage takes a long time to parse complex tags",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "After careful analysis of the vulnerability Redhat is choosing to keep the vulnerability severity as moderate,the vulnerability exists in the ParseAcceptLanguage function of the golang text/language package,when an attacker could craft an unusually large accept header and due to the parser taking quadratic time complexity to finish, firstly the attacker would have to find a way smuggle an input to the parser and even then this would simply not result in a crash of any kind but more of resource hang which while can be unpleasant,does not equate to any real world damage.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-rhel8@sha256:1ca6945c3918f1743a4cee86a507f9f6581c8f8e572b6b8739d79a675a64d1db_amd64"
],
"known_not_affected": [
"8Base-RHMTC-1.7:rhmtc/openshift-migration-controller-rhel8@sha256:362eb32d0d2607f72b4f425dabaea7cde5d292ac41aea0c18c78bc6e408fff9e_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-hook-runner-rhel8@sha256:aa63717ac3a4961e774ed0baa3a73f01eda185516e7380579d97b9d25764d10d_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-legacy-rhel8-operator@sha256:1ac9cdfbdce8f7b6e4ebf5e40013f766b71b6dd604c92f602aca96612a228eda_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-log-reader-rhel8@sha256:d89e9ef65993466d25b26702d0210c14ce191155501774f4d2f1f08dbdad9804_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-must-gather-rhel8@sha256:5acf34dc4041b694b452d46c2f656db566241773285ca305a79ab7b9dc087b43_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-openvpn-rhel8@sha256:15df7304827ce49d422554551f08d99cfffa1afc4ffacac145d4399ccb1cbd68_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-operator-bundle@sha256:90ed03a5e0cb0b0ffd85f7434cc4eda9bd8fe81cd90b597772d9b7caccd4b80f_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-registry-rhel8@sha256:aaa03ef0769d38185675db2a7a78454659de14bdebe5ff842614bf2124e5adfe_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-rhel8-operator@sha256:aaaf4f6095294b497889749390f0a3aac04b83131a423799c44b5e367e0b370a_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-rsync-transfer-rhel8@sha256:58bd4ffc3e9599401251ac929cf15c1773ecc03a57177118adbe23ac8d7762af_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-ui-rhel8@sha256:4141db5099ae659270297eb4aaff695ac43fce67d91fea49dbc76583f419d3a1_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-plugin-for-aws-rhel8@sha256:633eeb0b6b50e21bbc0fb12fd2262294733fc9ac8b1e9eedcdb9d1433534d88d_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-plugin-for-gcp-rhel8@sha256:19dbf2bb83f8a0f35079d6ae25f8fcddad970e48ecb21694fd2d4c553313e4aa_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-plugin-for-microsoft-azure-rhel8@sha256:93e95f065eadaa41154b9012dd5ddc824607758e2bce85c4256c2689125b80a4_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-restic-restore-helper-rhel8@sha256:70d3d46f54b91538e047df62e7e5b161fabac195a2f2e45cdba78215b4c82a7d_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-velero-plugin-rhel8@sha256:26f8fb5c41ece82626325ba502505ba1ca7986602cc147b492f9857caa0be868_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-32149"
},
{
"category": "external",
"summary": "RHBZ#2134010",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2134010"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-32149",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32149"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-32149",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-32149"
},
{
"category": "external",
"summary": "https://go.dev/issue/56152",
"url": "https://go.dev/issue/56152"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-dev/c/qfPIly0X7aU",
"url": "https://groups.google.com/g/golang-dev/c/qfPIly0X7aU"
}
],
"release_date": "2022-10-11T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-02-09T02:17:22+00:00",
"details": "For details on how to install and use MTC, refer to:\n\nhttps://docs.openshift.com/container-platform/latest/migration_toolkit_for_containers/installing-mtc.html",
"product_ids": [
"8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-rhel8@sha256:1ca6945c3918f1743a4cee86a507f9f6581c8f8e572b6b8739d79a675a64d1db_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:0693"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"8Base-RHMTC-1.7:rhmtc/openshift-migration-controller-rhel8@sha256:362eb32d0d2607f72b4f425dabaea7cde5d292ac41aea0c18c78bc6e408fff9e_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-hook-runner-rhel8@sha256:aa63717ac3a4961e774ed0baa3a73f01eda185516e7380579d97b9d25764d10d_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-legacy-rhel8-operator@sha256:1ac9cdfbdce8f7b6e4ebf5e40013f766b71b6dd604c92f602aca96612a228eda_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-log-reader-rhel8@sha256:d89e9ef65993466d25b26702d0210c14ce191155501774f4d2f1f08dbdad9804_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-must-gather-rhel8@sha256:5acf34dc4041b694b452d46c2f656db566241773285ca305a79ab7b9dc087b43_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-openvpn-rhel8@sha256:15df7304827ce49d422554551f08d99cfffa1afc4ffacac145d4399ccb1cbd68_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-operator-bundle@sha256:90ed03a5e0cb0b0ffd85f7434cc4eda9bd8fe81cd90b597772d9b7caccd4b80f_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-registry-rhel8@sha256:aaa03ef0769d38185675db2a7a78454659de14bdebe5ff842614bf2124e5adfe_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-rhel8-operator@sha256:aaaf4f6095294b497889749390f0a3aac04b83131a423799c44b5e367e0b370a_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-rsync-transfer-rhel8@sha256:58bd4ffc3e9599401251ac929cf15c1773ecc03a57177118adbe23ac8d7762af_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-ui-rhel8@sha256:4141db5099ae659270297eb4aaff695ac43fce67d91fea49dbc76583f419d3a1_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-plugin-for-aws-rhel8@sha256:633eeb0b6b50e21bbc0fb12fd2262294733fc9ac8b1e9eedcdb9d1433534d88d_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-plugin-for-gcp-rhel8@sha256:19dbf2bb83f8a0f35079d6ae25f8fcddad970e48ecb21694fd2d4c553313e4aa_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-plugin-for-microsoft-azure-rhel8@sha256:93e95f065eadaa41154b9012dd5ddc824607758e2bce85c4256c2689125b80a4_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-restic-restore-helper-rhel8@sha256:70d3d46f54b91538e047df62e7e5b161fabac195a2f2e45cdba78215b4c82a7d_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-rhel8@sha256:1ca6945c3918f1743a4cee86a507f9f6581c8f8e572b6b8739d79a675a64d1db_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-velero-plugin-rhel8@sha256:26f8fb5c41ece82626325ba502505ba1ca7986602cc147b492f9857caa0be868_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "golang: golang.org/x/text/language: ParseAcceptLanguage takes a long time to parse complex tags"
},
{
"cve": "CVE-2022-32189",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"discovery_date": "2022-08-02T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-RHMTC-1.7:rhmtc/openshift-migration-controller-rhel8@sha256:362eb32d0d2607f72b4f425dabaea7cde5d292ac41aea0c18c78bc6e408fff9e_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-hook-runner-rhel8@sha256:aa63717ac3a4961e774ed0baa3a73f01eda185516e7380579d97b9d25764d10d_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-legacy-rhel8-operator@sha256:1ac9cdfbdce8f7b6e4ebf5e40013f766b71b6dd604c92f602aca96612a228eda_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-log-reader-rhel8@sha256:d89e9ef65993466d25b26702d0210c14ce191155501774f4d2f1f08dbdad9804_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-must-gather-rhel8@sha256:5acf34dc4041b694b452d46c2f656db566241773285ca305a79ab7b9dc087b43_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-openvpn-rhel8@sha256:15df7304827ce49d422554551f08d99cfffa1afc4ffacac145d4399ccb1cbd68_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-operator-bundle@sha256:90ed03a5e0cb0b0ffd85f7434cc4eda9bd8fe81cd90b597772d9b7caccd4b80f_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-registry-rhel8@sha256:aaa03ef0769d38185675db2a7a78454659de14bdebe5ff842614bf2124e5adfe_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-rhel8-operator@sha256:aaaf4f6095294b497889749390f0a3aac04b83131a423799c44b5e367e0b370a_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-rsync-transfer-rhel8@sha256:58bd4ffc3e9599401251ac929cf15c1773ecc03a57177118adbe23ac8d7762af_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-ui-rhel8@sha256:4141db5099ae659270297eb4aaff695ac43fce67d91fea49dbc76583f419d3a1_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-plugin-for-aws-rhel8@sha256:633eeb0b6b50e21bbc0fb12fd2262294733fc9ac8b1e9eedcdb9d1433534d88d_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-plugin-for-gcp-rhel8@sha256:19dbf2bb83f8a0f35079d6ae25f8fcddad970e48ecb21694fd2d4c553313e4aa_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-plugin-for-microsoft-azure-rhel8@sha256:93e95f065eadaa41154b9012dd5ddc824607758e2bce85c4256c2689125b80a4_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-restic-restore-helper-rhel8@sha256:70d3d46f54b91538e047df62e7e5b161fabac195a2f2e45cdba78215b4c82a7d_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-rhel8@sha256:1ca6945c3918f1743a4cee86a507f9f6581c8f8e572b6b8739d79a675a64d1db_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2113814"
}
],
"notes": [
{
"category": "description",
"text": "An uncontrolled resource consumption flaw was found in Golang math/big. A too-short encoded message can cause a panic in Float.GobDecode and Rat.GobDecode in math/big in Go, potentially allowing an attacker to create a denial of service, impacting availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: math/big: decoding big.Float and big.Rat types can panic if the encoded message is too short, potentially allowing a denial of service",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This flaw stems from a particular and specific method (GoBDecode) which isn\u0027t commonly used. There are few components within Red Hat offerings which call this function. In rare cases where this method is called, the component limits possible damage or it is not possible to be triggered by an attacker. For these combined reasons the impact has been downgraded to Low.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-RHMTC-1.7:rhmtc/openshift-velero-plugin-rhel8@sha256:26f8fb5c41ece82626325ba502505ba1ca7986602cc147b492f9857caa0be868_amd64"
],
"known_not_affected": [
"8Base-RHMTC-1.7:rhmtc/openshift-migration-controller-rhel8@sha256:362eb32d0d2607f72b4f425dabaea7cde5d292ac41aea0c18c78bc6e408fff9e_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-hook-runner-rhel8@sha256:aa63717ac3a4961e774ed0baa3a73f01eda185516e7380579d97b9d25764d10d_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-legacy-rhel8-operator@sha256:1ac9cdfbdce8f7b6e4ebf5e40013f766b71b6dd604c92f602aca96612a228eda_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-log-reader-rhel8@sha256:d89e9ef65993466d25b26702d0210c14ce191155501774f4d2f1f08dbdad9804_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-must-gather-rhel8@sha256:5acf34dc4041b694b452d46c2f656db566241773285ca305a79ab7b9dc087b43_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-openvpn-rhel8@sha256:15df7304827ce49d422554551f08d99cfffa1afc4ffacac145d4399ccb1cbd68_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-operator-bundle@sha256:90ed03a5e0cb0b0ffd85f7434cc4eda9bd8fe81cd90b597772d9b7caccd4b80f_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-registry-rhel8@sha256:aaa03ef0769d38185675db2a7a78454659de14bdebe5ff842614bf2124e5adfe_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-rhel8-operator@sha256:aaaf4f6095294b497889749390f0a3aac04b83131a423799c44b5e367e0b370a_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-rsync-transfer-rhel8@sha256:58bd4ffc3e9599401251ac929cf15c1773ecc03a57177118adbe23ac8d7762af_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-ui-rhel8@sha256:4141db5099ae659270297eb4aaff695ac43fce67d91fea49dbc76583f419d3a1_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-plugin-for-aws-rhel8@sha256:633eeb0b6b50e21bbc0fb12fd2262294733fc9ac8b1e9eedcdb9d1433534d88d_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-plugin-for-gcp-rhel8@sha256:19dbf2bb83f8a0f35079d6ae25f8fcddad970e48ecb21694fd2d4c553313e4aa_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-plugin-for-microsoft-azure-rhel8@sha256:93e95f065eadaa41154b9012dd5ddc824607758e2bce85c4256c2689125b80a4_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-restic-restore-helper-rhel8@sha256:70d3d46f54b91538e047df62e7e5b161fabac195a2f2e45cdba78215b4c82a7d_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-rhel8@sha256:1ca6945c3918f1743a4cee86a507f9f6581c8f8e572b6b8739d79a675a64d1db_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-32189"
},
{
"category": "external",
"summary": "RHBZ#2113814",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2113814"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-32189",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32189"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-32189",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-32189"
},
{
"category": "external",
"summary": "https://go.dev/issue/53871",
"url": "https://go.dev/issue/53871"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-nuts/c/DCFSyTGM0wU",
"url": "https://groups.google.com/g/golang-nuts/c/DCFSyTGM0wU"
}
],
"release_date": "2022-08-01T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-02-09T02:17:22+00:00",
"details": "For details on how to install and use MTC, refer to:\n\nhttps://docs.openshift.com/container-platform/latest/migration_toolkit_for_containers/installing-mtc.html",
"product_ids": [
"8Base-RHMTC-1.7:rhmtc/openshift-velero-plugin-rhel8@sha256:26f8fb5c41ece82626325ba502505ba1ca7986602cc147b492f9857caa0be868_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:0693"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"8Base-RHMTC-1.7:rhmtc/openshift-migration-controller-rhel8@sha256:362eb32d0d2607f72b4f425dabaea7cde5d292ac41aea0c18c78bc6e408fff9e_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-hook-runner-rhel8@sha256:aa63717ac3a4961e774ed0baa3a73f01eda185516e7380579d97b9d25764d10d_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-legacy-rhel8-operator@sha256:1ac9cdfbdce8f7b6e4ebf5e40013f766b71b6dd604c92f602aca96612a228eda_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-log-reader-rhel8@sha256:d89e9ef65993466d25b26702d0210c14ce191155501774f4d2f1f08dbdad9804_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-must-gather-rhel8@sha256:5acf34dc4041b694b452d46c2f656db566241773285ca305a79ab7b9dc087b43_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-openvpn-rhel8@sha256:15df7304827ce49d422554551f08d99cfffa1afc4ffacac145d4399ccb1cbd68_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-operator-bundle@sha256:90ed03a5e0cb0b0ffd85f7434cc4eda9bd8fe81cd90b597772d9b7caccd4b80f_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-registry-rhel8@sha256:aaa03ef0769d38185675db2a7a78454659de14bdebe5ff842614bf2124e5adfe_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-rhel8-operator@sha256:aaaf4f6095294b497889749390f0a3aac04b83131a423799c44b5e367e0b370a_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-rsync-transfer-rhel8@sha256:58bd4ffc3e9599401251ac929cf15c1773ecc03a57177118adbe23ac8d7762af_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-ui-rhel8@sha256:4141db5099ae659270297eb4aaff695ac43fce67d91fea49dbc76583f419d3a1_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-plugin-for-aws-rhel8@sha256:633eeb0b6b50e21bbc0fb12fd2262294733fc9ac8b1e9eedcdb9d1433534d88d_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-plugin-for-gcp-rhel8@sha256:19dbf2bb83f8a0f35079d6ae25f8fcddad970e48ecb21694fd2d4c553313e4aa_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-plugin-for-microsoft-azure-rhel8@sha256:93e95f065eadaa41154b9012dd5ddc824607758e2bce85c4256c2689125b80a4_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-restic-restore-helper-rhel8@sha256:70d3d46f54b91538e047df62e7e5b161fabac195a2f2e45cdba78215b4c82a7d_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-rhel8@sha256:1ca6945c3918f1743a4cee86a507f9f6581c8f8e572b6b8739d79a675a64d1db_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-velero-plugin-rhel8@sha256:26f8fb5c41ece82626325ba502505ba1ca7986602cc147b492f9857caa0be868_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"8Base-RHMTC-1.7:rhmtc/openshift-migration-controller-rhel8@sha256:362eb32d0d2607f72b4f425dabaea7cde5d292ac41aea0c18c78bc6e408fff9e_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-hook-runner-rhel8@sha256:aa63717ac3a4961e774ed0baa3a73f01eda185516e7380579d97b9d25764d10d_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-legacy-rhel8-operator@sha256:1ac9cdfbdce8f7b6e4ebf5e40013f766b71b6dd604c92f602aca96612a228eda_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-log-reader-rhel8@sha256:d89e9ef65993466d25b26702d0210c14ce191155501774f4d2f1f08dbdad9804_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-must-gather-rhel8@sha256:5acf34dc4041b694b452d46c2f656db566241773285ca305a79ab7b9dc087b43_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-openvpn-rhel8@sha256:15df7304827ce49d422554551f08d99cfffa1afc4ffacac145d4399ccb1cbd68_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-operator-bundle@sha256:90ed03a5e0cb0b0ffd85f7434cc4eda9bd8fe81cd90b597772d9b7caccd4b80f_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-registry-rhel8@sha256:aaa03ef0769d38185675db2a7a78454659de14bdebe5ff842614bf2124e5adfe_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-rhel8-operator@sha256:aaaf4f6095294b497889749390f0a3aac04b83131a423799c44b5e367e0b370a_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-rsync-transfer-rhel8@sha256:58bd4ffc3e9599401251ac929cf15c1773ecc03a57177118adbe23ac8d7762af_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-ui-rhel8@sha256:4141db5099ae659270297eb4aaff695ac43fce67d91fea49dbc76583f419d3a1_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-plugin-for-aws-rhel8@sha256:633eeb0b6b50e21bbc0fb12fd2262294733fc9ac8b1e9eedcdb9d1433534d88d_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-plugin-for-gcp-rhel8@sha256:19dbf2bb83f8a0f35079d6ae25f8fcddad970e48ecb21694fd2d4c553313e4aa_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-plugin-for-microsoft-azure-rhel8@sha256:93e95f065eadaa41154b9012dd5ddc824607758e2bce85c4256c2689125b80a4_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-restic-restore-helper-rhel8@sha256:70d3d46f54b91538e047df62e7e5b161fabac195a2f2e45cdba78215b4c82a7d_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-rhel8@sha256:1ca6945c3918f1743a4cee86a507f9f6581c8f8e572b6b8739d79a675a64d1db_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-velero-plugin-rhel8@sha256:26f8fb5c41ece82626325ba502505ba1ca7986602cc147b492f9857caa0be868_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "golang: math/big: decoding big.Float and big.Rat types can panic if the encoded message is too short, potentially allowing a denial of service"
},
{
"cve": "CVE-2022-32190",
"cwe": {
"id": "CWE-22",
"name": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)"
},
"discovery_date": "2022-09-06T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-RHMTC-1.7:rhmtc/openshift-migration-controller-rhel8@sha256:362eb32d0d2607f72b4f425dabaea7cde5d292ac41aea0c18c78bc6e408fff9e_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-hook-runner-rhel8@sha256:aa63717ac3a4961e774ed0baa3a73f01eda185516e7380579d97b9d25764d10d_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-legacy-rhel8-operator@sha256:1ac9cdfbdce8f7b6e4ebf5e40013f766b71b6dd604c92f602aca96612a228eda_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-log-reader-rhel8@sha256:d89e9ef65993466d25b26702d0210c14ce191155501774f4d2f1f08dbdad9804_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-must-gather-rhel8@sha256:5acf34dc4041b694b452d46c2f656db566241773285ca305a79ab7b9dc087b43_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-openvpn-rhel8@sha256:15df7304827ce49d422554551f08d99cfffa1afc4ffacac145d4399ccb1cbd68_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-operator-bundle@sha256:90ed03a5e0cb0b0ffd85f7434cc4eda9bd8fe81cd90b597772d9b7caccd4b80f_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-registry-rhel8@sha256:aaa03ef0769d38185675db2a7a78454659de14bdebe5ff842614bf2124e5adfe_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-rhel8-operator@sha256:aaaf4f6095294b497889749390f0a3aac04b83131a423799c44b5e367e0b370a_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-rsync-transfer-rhel8@sha256:58bd4ffc3e9599401251ac929cf15c1773ecc03a57177118adbe23ac8d7762af_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-ui-rhel8@sha256:4141db5099ae659270297eb4aaff695ac43fce67d91fea49dbc76583f419d3a1_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-plugin-for-aws-rhel8@sha256:633eeb0b6b50e21bbc0fb12fd2262294733fc9ac8b1e9eedcdb9d1433534d88d_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-plugin-for-gcp-rhel8@sha256:19dbf2bb83f8a0f35079d6ae25f8fcddad970e48ecb21694fd2d4c553313e4aa_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-plugin-for-microsoft-azure-rhel8@sha256:93e95f065eadaa41154b9012dd5ddc824607758e2bce85c4256c2689125b80a4_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-restic-restore-helper-rhel8@sha256:70d3d46f54b91538e047df62e7e5b161fabac195a2f2e45cdba78215b4c82a7d_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-rhel8@sha256:1ca6945c3918f1743a4cee86a507f9f6581c8f8e572b6b8739d79a675a64d1db_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2124668"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the golang package. The JoinPath doesn\u0027t remove the ../ path components appended to a domain that is not terminated by a slash, possibly leading to a directory traversal attack.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: net/url: JoinPath does not strip relative path components in all circumstances",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The vulnerable functions, JoinPath and URL.JoinPath was introduced in upstream go1.19, whereas, RHEL ships go1.17 and go1.18 versions, which does not contain the vulnerable code. Hence, packages shipped with RHEL-8, RHEL-9 are not affected.\n\nAll Y stream releases of OpenShift Container Platform 4 run on RHEL-8 or RHEL-9, so OCP 4 is also not affected.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-RHMTC-1.7:rhmtc/openshift-velero-plugin-rhel8@sha256:26f8fb5c41ece82626325ba502505ba1ca7986602cc147b492f9857caa0be868_amd64"
],
"known_not_affected": [
"8Base-RHMTC-1.7:rhmtc/openshift-migration-controller-rhel8@sha256:362eb32d0d2607f72b4f425dabaea7cde5d292ac41aea0c18c78bc6e408fff9e_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-hook-runner-rhel8@sha256:aa63717ac3a4961e774ed0baa3a73f01eda185516e7380579d97b9d25764d10d_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-legacy-rhel8-operator@sha256:1ac9cdfbdce8f7b6e4ebf5e40013f766b71b6dd604c92f602aca96612a228eda_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-log-reader-rhel8@sha256:d89e9ef65993466d25b26702d0210c14ce191155501774f4d2f1f08dbdad9804_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-must-gather-rhel8@sha256:5acf34dc4041b694b452d46c2f656db566241773285ca305a79ab7b9dc087b43_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-openvpn-rhel8@sha256:15df7304827ce49d422554551f08d99cfffa1afc4ffacac145d4399ccb1cbd68_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-operator-bundle@sha256:90ed03a5e0cb0b0ffd85f7434cc4eda9bd8fe81cd90b597772d9b7caccd4b80f_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-registry-rhel8@sha256:aaa03ef0769d38185675db2a7a78454659de14bdebe5ff842614bf2124e5adfe_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-rhel8-operator@sha256:aaaf4f6095294b497889749390f0a3aac04b83131a423799c44b5e367e0b370a_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-rsync-transfer-rhel8@sha256:58bd4ffc3e9599401251ac929cf15c1773ecc03a57177118adbe23ac8d7762af_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-ui-rhel8@sha256:4141db5099ae659270297eb4aaff695ac43fce67d91fea49dbc76583f419d3a1_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-plugin-for-aws-rhel8@sha256:633eeb0b6b50e21bbc0fb12fd2262294733fc9ac8b1e9eedcdb9d1433534d88d_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-plugin-for-gcp-rhel8@sha256:19dbf2bb83f8a0f35079d6ae25f8fcddad970e48ecb21694fd2d4c553313e4aa_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-plugin-for-microsoft-azure-rhel8@sha256:93e95f065eadaa41154b9012dd5ddc824607758e2bce85c4256c2689125b80a4_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-restic-restore-helper-rhel8@sha256:70d3d46f54b91538e047df62e7e5b161fabac195a2f2e45cdba78215b4c82a7d_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-rhel8@sha256:1ca6945c3918f1743a4cee86a507f9f6581c8f8e572b6b8739d79a675a64d1db_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-32190"
},
{
"category": "external",
"summary": "RHBZ#2124668",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2124668"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-32190",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32190"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-32190",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-32190"
},
{
"category": "external",
"summary": "https://go.dev/issue/54385",
"url": "https://go.dev/issue/54385"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/x49AQzIVX-s/m/0tgO0pjiBQAJ",
"url": "https://groups.google.com/g/golang-announce/c/x49AQzIVX-s/m/0tgO0pjiBQAJ"
}
],
"release_date": "2022-09-06T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-02-09T02:17:22+00:00",
"details": "For details on how to install and use MTC, refer to:\n\nhttps://docs.openshift.com/container-platform/latest/migration_toolkit_for_containers/installing-mtc.html",
"product_ids": [
"8Base-RHMTC-1.7:rhmtc/openshift-velero-plugin-rhel8@sha256:26f8fb5c41ece82626325ba502505ba1ca7986602cc147b492f9857caa0be868_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:0693"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"8Base-RHMTC-1.7:rhmtc/openshift-migration-controller-rhel8@sha256:362eb32d0d2607f72b4f425dabaea7cde5d292ac41aea0c18c78bc6e408fff9e_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-hook-runner-rhel8@sha256:aa63717ac3a4961e774ed0baa3a73f01eda185516e7380579d97b9d25764d10d_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-legacy-rhel8-operator@sha256:1ac9cdfbdce8f7b6e4ebf5e40013f766b71b6dd604c92f602aca96612a228eda_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-log-reader-rhel8@sha256:d89e9ef65993466d25b26702d0210c14ce191155501774f4d2f1f08dbdad9804_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-must-gather-rhel8@sha256:5acf34dc4041b694b452d46c2f656db566241773285ca305a79ab7b9dc087b43_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-openvpn-rhel8@sha256:15df7304827ce49d422554551f08d99cfffa1afc4ffacac145d4399ccb1cbd68_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-operator-bundle@sha256:90ed03a5e0cb0b0ffd85f7434cc4eda9bd8fe81cd90b597772d9b7caccd4b80f_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-registry-rhel8@sha256:aaa03ef0769d38185675db2a7a78454659de14bdebe5ff842614bf2124e5adfe_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-rhel8-operator@sha256:aaaf4f6095294b497889749390f0a3aac04b83131a423799c44b5e367e0b370a_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-rsync-transfer-rhel8@sha256:58bd4ffc3e9599401251ac929cf15c1773ecc03a57177118adbe23ac8d7762af_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-ui-rhel8@sha256:4141db5099ae659270297eb4aaff695ac43fce67d91fea49dbc76583f419d3a1_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-plugin-for-aws-rhel8@sha256:633eeb0b6b50e21bbc0fb12fd2262294733fc9ac8b1e9eedcdb9d1433534d88d_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-plugin-for-gcp-rhel8@sha256:19dbf2bb83f8a0f35079d6ae25f8fcddad970e48ecb21694fd2d4c553313e4aa_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-plugin-for-microsoft-azure-rhel8@sha256:93e95f065eadaa41154b9012dd5ddc824607758e2bce85c4256c2689125b80a4_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-restic-restore-helper-rhel8@sha256:70d3d46f54b91538e047df62e7e5b161fabac195a2f2e45cdba78215b4c82a7d_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-rhel8@sha256:1ca6945c3918f1743a4cee86a507f9f6581c8f8e572b6b8739d79a675a64d1db_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-velero-plugin-rhel8@sha256:26f8fb5c41ece82626325ba502505ba1ca7986602cc147b492f9857caa0be868_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "golang: net/url: JoinPath does not strip relative path components in all circumstances"
},
{
"acknowledgments": [
{
"names": [
"Adam Korczynski"
],
"organization": "ADA Logics"
},
{
"names": [
"OSS-Fuzz"
]
}
],
"cve": "CVE-2022-41715",
"discovery_date": "2022-10-07T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-RHMTC-1.7:rhmtc/openshift-migration-controller-rhel8@sha256:362eb32d0d2607f72b4f425dabaea7cde5d292ac41aea0c18c78bc6e408fff9e_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-hook-runner-rhel8@sha256:aa63717ac3a4961e774ed0baa3a73f01eda185516e7380579d97b9d25764d10d_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-legacy-rhel8-operator@sha256:1ac9cdfbdce8f7b6e4ebf5e40013f766b71b6dd604c92f602aca96612a228eda_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-log-reader-rhel8@sha256:d89e9ef65993466d25b26702d0210c14ce191155501774f4d2f1f08dbdad9804_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-must-gather-rhel8@sha256:5acf34dc4041b694b452d46c2f656db566241773285ca305a79ab7b9dc087b43_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-openvpn-rhel8@sha256:15df7304827ce49d422554551f08d99cfffa1afc4ffacac145d4399ccb1cbd68_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-operator-bundle@sha256:90ed03a5e0cb0b0ffd85f7434cc4eda9bd8fe81cd90b597772d9b7caccd4b80f_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-registry-rhel8@sha256:aaa03ef0769d38185675db2a7a78454659de14bdebe5ff842614bf2124e5adfe_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-rhel8-operator@sha256:aaaf4f6095294b497889749390f0a3aac04b83131a423799c44b5e367e0b370a_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-rsync-transfer-rhel8@sha256:58bd4ffc3e9599401251ac929cf15c1773ecc03a57177118adbe23ac8d7762af_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-ui-rhel8@sha256:4141db5099ae659270297eb4aaff695ac43fce67d91fea49dbc76583f419d3a1_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-plugin-for-aws-rhel8@sha256:633eeb0b6b50e21bbc0fb12fd2262294733fc9ac8b1e9eedcdb9d1433534d88d_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-plugin-for-gcp-rhel8@sha256:19dbf2bb83f8a0f35079d6ae25f8fcddad970e48ecb21694fd2d4c553313e4aa_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-plugin-for-microsoft-azure-rhel8@sha256:93e95f065eadaa41154b9012dd5ddc824607758e2bce85c4256c2689125b80a4_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-restic-restore-helper-rhel8@sha256:70d3d46f54b91538e047df62e7e5b161fabac195a2f2e45cdba78215b4c82a7d_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-rhel8@sha256:1ca6945c3918f1743a4cee86a507f9f6581c8f8e572b6b8739d79a675a64d1db_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2132872"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the golang package, where programs that compile regular expressions from untrusted sources are vulnerable to memory exhaustion or a denial of service. The parsed regexp representation is linear in the input size. Still, in some cases, the constant factor can be as high as 40,000, making a relatively small regexp consume larger amounts of memory. After the fix, each regexp being parsed is limited to a 256 MB memory footprint. Regular expressions whose representation would use more space than that are rejected. Routine use of regular expressions is unaffected.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: regexp/syntax: limit memory used by parsing regexps",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The opportunity for a Denial of Service is limited to the golang runtime. In the case of OpenShift Container Platform, this would be restricted within each individual container. There are multiple layers of guide rails (Golang\u2019s Garbage Collector; OpenShift\u2019s resource constraints imposed at the container and cluster levels) which would require a malicious user to continue submitting attacks for there to be any enduring impact. They would also need access to external server resources to be able to send a massive volume of requests to cause a significant impact on server operations.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-RHMTC-1.7:rhmtc/openshift-velero-plugin-rhel8@sha256:26f8fb5c41ece82626325ba502505ba1ca7986602cc147b492f9857caa0be868_amd64"
],
"known_not_affected": [
"8Base-RHMTC-1.7:rhmtc/openshift-migration-controller-rhel8@sha256:362eb32d0d2607f72b4f425dabaea7cde5d292ac41aea0c18c78bc6e408fff9e_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-hook-runner-rhel8@sha256:aa63717ac3a4961e774ed0baa3a73f01eda185516e7380579d97b9d25764d10d_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-legacy-rhel8-operator@sha256:1ac9cdfbdce8f7b6e4ebf5e40013f766b71b6dd604c92f602aca96612a228eda_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-log-reader-rhel8@sha256:d89e9ef65993466d25b26702d0210c14ce191155501774f4d2f1f08dbdad9804_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-must-gather-rhel8@sha256:5acf34dc4041b694b452d46c2f656db566241773285ca305a79ab7b9dc087b43_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-openvpn-rhel8@sha256:15df7304827ce49d422554551f08d99cfffa1afc4ffacac145d4399ccb1cbd68_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-operator-bundle@sha256:90ed03a5e0cb0b0ffd85f7434cc4eda9bd8fe81cd90b597772d9b7caccd4b80f_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-registry-rhel8@sha256:aaa03ef0769d38185675db2a7a78454659de14bdebe5ff842614bf2124e5adfe_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-rhel8-operator@sha256:aaaf4f6095294b497889749390f0a3aac04b83131a423799c44b5e367e0b370a_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-rsync-transfer-rhel8@sha256:58bd4ffc3e9599401251ac929cf15c1773ecc03a57177118adbe23ac8d7762af_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-ui-rhel8@sha256:4141db5099ae659270297eb4aaff695ac43fce67d91fea49dbc76583f419d3a1_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-plugin-for-aws-rhel8@sha256:633eeb0b6b50e21bbc0fb12fd2262294733fc9ac8b1e9eedcdb9d1433534d88d_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-plugin-for-gcp-rhel8@sha256:19dbf2bb83f8a0f35079d6ae25f8fcddad970e48ecb21694fd2d4c553313e4aa_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-plugin-for-microsoft-azure-rhel8@sha256:93e95f065eadaa41154b9012dd5ddc824607758e2bce85c4256c2689125b80a4_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-restic-restore-helper-rhel8@sha256:70d3d46f54b91538e047df62e7e5b161fabac195a2f2e45cdba78215b4c82a7d_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-rhel8@sha256:1ca6945c3918f1743a4cee86a507f9f6581c8f8e572b6b8739d79a675a64d1db_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-41715"
},
{
"category": "external",
"summary": "RHBZ#2132872",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2132872"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-41715",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41715"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-41715",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-41715"
},
{
"category": "external",
"summary": "https://github.com/golang/go/issues/55949",
"url": "https://github.com/golang/go/issues/55949"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/xtuG5faxtaU?pli=1",
"url": "https://groups.google.com/g/golang-announce/c/xtuG5faxtaU?pli=1"
}
],
"release_date": "2022-10-04T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-02-09T02:17:22+00:00",
"details": "For details on how to install and use MTC, refer to:\n\nhttps://docs.openshift.com/container-platform/latest/migration_toolkit_for_containers/installing-mtc.html",
"product_ids": [
"8Base-RHMTC-1.7:rhmtc/openshift-velero-plugin-rhel8@sha256:26f8fb5c41ece82626325ba502505ba1ca7986602cc147b492f9857caa0be868_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:0693"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"8Base-RHMTC-1.7:rhmtc/openshift-migration-controller-rhel8@sha256:362eb32d0d2607f72b4f425dabaea7cde5d292ac41aea0c18c78bc6e408fff9e_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-hook-runner-rhel8@sha256:aa63717ac3a4961e774ed0baa3a73f01eda185516e7380579d97b9d25764d10d_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-legacy-rhel8-operator@sha256:1ac9cdfbdce8f7b6e4ebf5e40013f766b71b6dd604c92f602aca96612a228eda_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-log-reader-rhel8@sha256:d89e9ef65993466d25b26702d0210c14ce191155501774f4d2f1f08dbdad9804_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-must-gather-rhel8@sha256:5acf34dc4041b694b452d46c2f656db566241773285ca305a79ab7b9dc087b43_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-openvpn-rhel8@sha256:15df7304827ce49d422554551f08d99cfffa1afc4ffacac145d4399ccb1cbd68_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-operator-bundle@sha256:90ed03a5e0cb0b0ffd85f7434cc4eda9bd8fe81cd90b597772d9b7caccd4b80f_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-registry-rhel8@sha256:aaa03ef0769d38185675db2a7a78454659de14bdebe5ff842614bf2124e5adfe_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-rhel8-operator@sha256:aaaf4f6095294b497889749390f0a3aac04b83131a423799c44b5e367e0b370a_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-rsync-transfer-rhel8@sha256:58bd4ffc3e9599401251ac929cf15c1773ecc03a57177118adbe23ac8d7762af_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-ui-rhel8@sha256:4141db5099ae659270297eb4aaff695ac43fce67d91fea49dbc76583f419d3a1_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-plugin-for-aws-rhel8@sha256:633eeb0b6b50e21bbc0fb12fd2262294733fc9ac8b1e9eedcdb9d1433534d88d_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-plugin-for-gcp-rhel8@sha256:19dbf2bb83f8a0f35079d6ae25f8fcddad970e48ecb21694fd2d4c553313e4aa_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-plugin-for-microsoft-azure-rhel8@sha256:93e95f065eadaa41154b9012dd5ddc824607758e2bce85c4256c2689125b80a4_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-restic-restore-helper-rhel8@sha256:70d3d46f54b91538e047df62e7e5b161fabac195a2f2e45cdba78215b4c82a7d_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-rhel8@sha256:1ca6945c3918f1743a4cee86a507f9f6581c8f8e572b6b8739d79a675a64d1db_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-velero-plugin-rhel8@sha256:26f8fb5c41ece82626325ba502505ba1ca7986602cc147b492f9857caa0be868_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "golang: regexp/syntax: limit memory used by parsing regexps"
},
{
"cve": "CVE-2022-41717",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"discovery_date": "2023-01-16T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-RHMTC-1.7:rhmtc/openshift-migration-hook-runner-rhel8@sha256:aa63717ac3a4961e774ed0baa3a73f01eda185516e7380579d97b9d25764d10d_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-legacy-rhel8-operator@sha256:1ac9cdfbdce8f7b6e4ebf5e40013f766b71b6dd604c92f602aca96612a228eda_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-log-reader-rhel8@sha256:d89e9ef65993466d25b26702d0210c14ce191155501774f4d2f1f08dbdad9804_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-openvpn-rhel8@sha256:15df7304827ce49d422554551f08d99cfffa1afc4ffacac145d4399ccb1cbd68_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-operator-bundle@sha256:90ed03a5e0cb0b0ffd85f7434cc4eda9bd8fe81cd90b597772d9b7caccd4b80f_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-rhel8-operator@sha256:aaaf4f6095294b497889749390f0a3aac04b83131a423799c44b5e367e0b370a_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-rsync-transfer-rhel8@sha256:58bd4ffc3e9599401251ac929cf15c1773ecc03a57177118adbe23ac8d7762af_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-ui-rhel8@sha256:4141db5099ae659270297eb4aaff695ac43fce67d91fea49dbc76583f419d3a1_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2161274"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the net/http library of the golang package. This flaw allows an attacker to cause excessive memory growth in a Go server accepting HTTP/2 requests. HTTP/2 server connections contain a cache of HTTP header keys sent by the client. While the total number of entries in this cache is capped, an attacker sending very large keys can cause the server to allocate approximately 64 MiB per open connection.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: net/http: excessive memory growth in a Go server accepting HTTP/2 requests",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Within Red Hat OpenShift Container Platform, the grafana container is listed as will not fix. Since OCP 4.10, Grafana itself is not shipped and the Grafana web server is protected behind an OAuth proxy server.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-RHMTC-1.7:rhmtc/openshift-migration-controller-rhel8@sha256:362eb32d0d2607f72b4f425dabaea7cde5d292ac41aea0c18c78bc6e408fff9e_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-must-gather-rhel8@sha256:5acf34dc4041b694b452d46c2f656db566241773285ca305a79ab7b9dc087b43_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-registry-rhel8@sha256:aaa03ef0769d38185675db2a7a78454659de14bdebe5ff842614bf2124e5adfe_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-plugin-for-aws-rhel8@sha256:633eeb0b6b50e21bbc0fb12fd2262294733fc9ac8b1e9eedcdb9d1433534d88d_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-plugin-for-gcp-rhel8@sha256:19dbf2bb83f8a0f35079d6ae25f8fcddad970e48ecb21694fd2d4c553313e4aa_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-plugin-for-microsoft-azure-rhel8@sha256:93e95f065eadaa41154b9012dd5ddc824607758e2bce85c4256c2689125b80a4_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-restic-restore-helper-rhel8@sha256:70d3d46f54b91538e047df62e7e5b161fabac195a2f2e45cdba78215b4c82a7d_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-rhel8@sha256:1ca6945c3918f1743a4cee86a507f9f6581c8f8e572b6b8739d79a675a64d1db_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-velero-plugin-rhel8@sha256:26f8fb5c41ece82626325ba502505ba1ca7986602cc147b492f9857caa0be868_amd64"
],
"known_not_affected": [
"8Base-RHMTC-1.7:rhmtc/openshift-migration-hook-runner-rhel8@sha256:aa63717ac3a4961e774ed0baa3a73f01eda185516e7380579d97b9d25764d10d_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-legacy-rhel8-operator@sha256:1ac9cdfbdce8f7b6e4ebf5e40013f766b71b6dd604c92f602aca96612a228eda_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-log-reader-rhel8@sha256:d89e9ef65993466d25b26702d0210c14ce191155501774f4d2f1f08dbdad9804_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-openvpn-rhel8@sha256:15df7304827ce49d422554551f08d99cfffa1afc4ffacac145d4399ccb1cbd68_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-operator-bundle@sha256:90ed03a5e0cb0b0ffd85f7434cc4eda9bd8fe81cd90b597772d9b7caccd4b80f_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-rhel8-operator@sha256:aaaf4f6095294b497889749390f0a3aac04b83131a423799c44b5e367e0b370a_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-rsync-transfer-rhel8@sha256:58bd4ffc3e9599401251ac929cf15c1773ecc03a57177118adbe23ac8d7762af_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-ui-rhel8@sha256:4141db5099ae659270297eb4aaff695ac43fce67d91fea49dbc76583f419d3a1_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-41717"
},
{
"category": "external",
"summary": "RHBZ#2161274",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2161274"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-41717",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41717"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-41717",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-41717"
},
{
"category": "external",
"summary": "https://go.dev/cl/455635",
"url": "https://go.dev/cl/455635"
},
{
"category": "external",
"summary": "https://go.dev/cl/455717",
"url": "https://go.dev/cl/455717"
},
{
"category": "external",
"summary": "https://go.dev/issue/56350",
"url": "https://go.dev/issue/56350"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/L_3rmdT0BMU/m/yZDrXjIiBQAJ",
"url": "https://groups.google.com/g/golang-announce/c/L_3rmdT0BMU/m/yZDrXjIiBQAJ"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2022-1144",
"url": "https://pkg.go.dev/vuln/GO-2022-1144"
}
],
"release_date": "2022-11-30T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-02-09T02:17:22+00:00",
"details": "For details on how to install and use MTC, refer to:\n\nhttps://docs.openshift.com/container-platform/latest/migration_toolkit_for_containers/installing-mtc.html",
"product_ids": [
"8Base-RHMTC-1.7:rhmtc/openshift-migration-controller-rhel8@sha256:362eb32d0d2607f72b4f425dabaea7cde5d292ac41aea0c18c78bc6e408fff9e_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-must-gather-rhel8@sha256:5acf34dc4041b694b452d46c2f656db566241773285ca305a79ab7b9dc087b43_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-registry-rhel8@sha256:aaa03ef0769d38185675db2a7a78454659de14bdebe5ff842614bf2124e5adfe_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-plugin-for-aws-rhel8@sha256:633eeb0b6b50e21bbc0fb12fd2262294733fc9ac8b1e9eedcdb9d1433534d88d_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-plugin-for-gcp-rhel8@sha256:19dbf2bb83f8a0f35079d6ae25f8fcddad970e48ecb21694fd2d4c553313e4aa_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-plugin-for-microsoft-azure-rhel8@sha256:93e95f065eadaa41154b9012dd5ddc824607758e2bce85c4256c2689125b80a4_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-restic-restore-helper-rhel8@sha256:70d3d46f54b91538e047df62e7e5b161fabac195a2f2e45cdba78215b4c82a7d_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-rhel8@sha256:1ca6945c3918f1743a4cee86a507f9f6581c8f8e572b6b8739d79a675a64d1db_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-velero-plugin-rhel8@sha256:26f8fb5c41ece82626325ba502505ba1ca7986602cc147b492f9857caa0be868_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:0693"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"8Base-RHMTC-1.7:rhmtc/openshift-migration-controller-rhel8@sha256:362eb32d0d2607f72b4f425dabaea7cde5d292ac41aea0c18c78bc6e408fff9e_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-hook-runner-rhel8@sha256:aa63717ac3a4961e774ed0baa3a73f01eda185516e7380579d97b9d25764d10d_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-legacy-rhel8-operator@sha256:1ac9cdfbdce8f7b6e4ebf5e40013f766b71b6dd604c92f602aca96612a228eda_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-log-reader-rhel8@sha256:d89e9ef65993466d25b26702d0210c14ce191155501774f4d2f1f08dbdad9804_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-must-gather-rhel8@sha256:5acf34dc4041b694b452d46c2f656db566241773285ca305a79ab7b9dc087b43_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-openvpn-rhel8@sha256:15df7304827ce49d422554551f08d99cfffa1afc4ffacac145d4399ccb1cbd68_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-operator-bundle@sha256:90ed03a5e0cb0b0ffd85f7434cc4eda9bd8fe81cd90b597772d9b7caccd4b80f_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-registry-rhel8@sha256:aaa03ef0769d38185675db2a7a78454659de14bdebe5ff842614bf2124e5adfe_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-rhel8-operator@sha256:aaaf4f6095294b497889749390f0a3aac04b83131a423799c44b5e367e0b370a_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-rsync-transfer-rhel8@sha256:58bd4ffc3e9599401251ac929cf15c1773ecc03a57177118adbe23ac8d7762af_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-ui-rhel8@sha256:4141db5099ae659270297eb4aaff695ac43fce67d91fea49dbc76583f419d3a1_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-plugin-for-aws-rhel8@sha256:633eeb0b6b50e21bbc0fb12fd2262294733fc9ac8b1e9eedcdb9d1433534d88d_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-plugin-for-gcp-rhel8@sha256:19dbf2bb83f8a0f35079d6ae25f8fcddad970e48ecb21694fd2d4c553313e4aa_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-plugin-for-microsoft-azure-rhel8@sha256:93e95f065eadaa41154b9012dd5ddc824607758e2bce85c4256c2689125b80a4_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-restic-restore-helper-rhel8@sha256:70d3d46f54b91538e047df62e7e5b161fabac195a2f2e45cdba78215b4c82a7d_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-rhel8@sha256:1ca6945c3918f1743a4cee86a507f9f6581c8f8e572b6b8739d79a675a64d1db_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-velero-plugin-rhel8@sha256:26f8fb5c41ece82626325ba502505ba1ca7986602cc147b492f9857caa0be868_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "golang: net/http: excessive memory growth in a Go server accepting HTTP/2 requests"
}
]
}
RHSA-2022:7407
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for service-binding-operator-bundle-container and service-binding-operator-container is now available for OpenShift Developer Tools and Services for OCP 4.9.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Service Binding Operator 1.3.1 is now available for OpenShift Developer Tools and Services for OCP 4.9 +\n\nSecurity Fix(es):\n\n* golang: golang.org/x/text/language: ParseAcceptLanguage takes a long time to parse complex tags (CVE-2022-32149)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2022:7407",
"url": "https://access.redhat.com/errata/RHSA-2022:7407"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#moderate",
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "https://docs.openshift.com/container-platform/latest/applications/connecting_applications_to_services/odc-connecting-an-application-to-a-service-using-the-developer-perspective.html",
"url": "https://docs.openshift.com/container-platform/latest/applications/connecting_applications_to_services/odc-connecting-an-application-to-a-service-using-the-developer-perspective.html"
},
{
"category": "external",
"summary": "2134010",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2134010"
},
{
"category": "external",
"summary": "APPSVC-1220",
"url": "https://issues.redhat.com/browse/APPSVC-1220"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2022/rhsa-2022_7407.json"
}
],
"title": "Red Hat Security Advisory: Service Binding Operator 1.3.1 security update",
"tracking": {
"current_release_date": "2025-10-10T01:53:20+00:00",
"generator": {
"date": "2025-10-10T01:53:20+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.9"
}
},
"id": "RHSA-2022:7407",
"initial_release_date": "2022-11-03T13:32:17+00:00",
"revision_history": [
{
"date": "2022-11-03T13:32:17+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2022-11-03T13:32:17+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-10-10T01:53:20+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "OpenShift Developer Tools and Services for OCP 4.9 for RHEL 8",
"product": {
"name": "OpenShift Developer Tools and Services for OCP 4.9 for RHEL 8",
"product_id": "8Base-OCP-Tools-4.9",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:ocp_tools:4.9::el8"
}
}
}
],
"category": "product_family",
"name": "OpenShift Jenkins"
},
{
"branches": [
{
"category": "product_version",
"name": "ocp-tools-4/service-binding-operator-bundle@sha256:ed577a367afc96253a125e8868dc992f832bbca209d7abe57fc939ed686715b6_amd64",
"product": {
"name": "ocp-tools-4/service-binding-operator-bundle@sha256:ed577a367afc96253a125e8868dc992f832bbca209d7abe57fc939ed686715b6_amd64",
"product_id": "ocp-tools-4/service-binding-operator-bundle@sha256:ed577a367afc96253a125e8868dc992f832bbca209d7abe57fc939ed686715b6_amd64",
"product_identification_helper": {
"purl": "pkg:oci/service-binding-operator-bundle@sha256:ed577a367afc96253a125e8868dc992f832bbca209d7abe57fc939ed686715b6?arch=amd64\u0026repository_url=registry.redhat.io/ocp-tools-4/service-binding-operator-bundle\u0026tag=v1.3.1-7"
}
}
},
{
"category": "product_version",
"name": "ocp-tools-4/service-binding-rhel8-operator@sha256:1640967bb2d7feb690921d81c5938d43e06a9794d8bd32f817fc8b5816d339d0_amd64",
"product": {
"name": "ocp-tools-4/service-binding-rhel8-operator@sha256:1640967bb2d7feb690921d81c5938d43e06a9794d8bd32f817fc8b5816d339d0_amd64",
"product_id": "ocp-tools-4/service-binding-rhel8-operator@sha256:1640967bb2d7feb690921d81c5938d43e06a9794d8bd32f817fc8b5816d339d0_amd64",
"product_identification_helper": {
"purl": "pkg:oci/service-binding-rhel8-operator@sha256:1640967bb2d7feb690921d81c5938d43e06a9794d8bd32f817fc8b5816d339d0?arch=amd64\u0026repository_url=registry.redhat.io/ocp-tools-4/service-binding-rhel8-operator\u0026tag=v1.3.1-5"
}
}
}
],
"category": "architecture",
"name": "amd64"
},
{
"branches": [
{
"category": "product_version",
"name": "ocp-tools-4/service-binding-rhel8-operator@sha256:1f14186b1fb24aebb5a706ab9560003fa57c595d37a65092a1443a0d0bf8e9c2_arm64",
"product": {
"name": "ocp-tools-4/service-binding-rhel8-operator@sha256:1f14186b1fb24aebb5a706ab9560003fa57c595d37a65092a1443a0d0bf8e9c2_arm64",
"product_id": "ocp-tools-4/service-binding-rhel8-operator@sha256:1f14186b1fb24aebb5a706ab9560003fa57c595d37a65092a1443a0d0bf8e9c2_arm64",
"product_identification_helper": {
"purl": "pkg:oci/service-binding-rhel8-operator@sha256:1f14186b1fb24aebb5a706ab9560003fa57c595d37a65092a1443a0d0bf8e9c2?arch=arm64\u0026repository_url=registry.redhat.io/ocp-tools-4/service-binding-rhel8-operator\u0026tag=v1.3.1-5"
}
}
}
],
"category": "architecture",
"name": "arm64"
},
{
"branches": [
{
"category": "product_version",
"name": "ocp-tools-4/service-binding-rhel8-operator@sha256:98f9de0d64607fc9a8dade067d12ba73bdae4006f7ef0571e628f7fcaecf8959_s390x",
"product": {
"name": "ocp-tools-4/service-binding-rhel8-operator@sha256:98f9de0d64607fc9a8dade067d12ba73bdae4006f7ef0571e628f7fcaecf8959_s390x",
"product_id": "ocp-tools-4/service-binding-rhel8-operator@sha256:98f9de0d64607fc9a8dade067d12ba73bdae4006f7ef0571e628f7fcaecf8959_s390x",
"product_identification_helper": {
"purl": "pkg:oci/service-binding-rhel8-operator@sha256:98f9de0d64607fc9a8dade067d12ba73bdae4006f7ef0571e628f7fcaecf8959?arch=s390x\u0026repository_url=registry.redhat.io/ocp-tools-4/service-binding-rhel8-operator\u0026tag=v1.3.1-5"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "ocp-tools-4/service-binding-rhel8-operator@sha256:eb70d8863ec16d3c78d72455c12ea121c52e485e812dd2903ef4c5b52ce78c08_ppc64le",
"product": {
"name": "ocp-tools-4/service-binding-rhel8-operator@sha256:eb70d8863ec16d3c78d72455c12ea121c52e485e812dd2903ef4c5b52ce78c08_ppc64le",
"product_id": "ocp-tools-4/service-binding-rhel8-operator@sha256:eb70d8863ec16d3c78d72455c12ea121c52e485e812dd2903ef4c5b52ce78c08_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/service-binding-rhel8-operator@sha256:eb70d8863ec16d3c78d72455c12ea121c52e485e812dd2903ef4c5b52ce78c08?arch=ppc64le\u0026repository_url=registry.redhat.io/ocp-tools-4/service-binding-rhel8-operator\u0026tag=v1.3.1-5"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "ocp-tools-4/service-binding-operator-bundle@sha256:ed577a367afc96253a125e8868dc992f832bbca209d7abe57fc939ed686715b6_amd64 as a component of OpenShift Developer Tools and Services for OCP 4.9 for RHEL 8",
"product_id": "8Base-OCP-Tools-4.9:ocp-tools-4/service-binding-operator-bundle@sha256:ed577a367afc96253a125e8868dc992f832bbca209d7abe57fc939ed686715b6_amd64"
},
"product_reference": "ocp-tools-4/service-binding-operator-bundle@sha256:ed577a367afc96253a125e8868dc992f832bbca209d7abe57fc939ed686715b6_amd64",
"relates_to_product_reference": "8Base-OCP-Tools-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocp-tools-4/service-binding-rhel8-operator@sha256:1640967bb2d7feb690921d81c5938d43e06a9794d8bd32f817fc8b5816d339d0_amd64 as a component of OpenShift Developer Tools and Services for OCP 4.9 for RHEL 8",
"product_id": "8Base-OCP-Tools-4.9:ocp-tools-4/service-binding-rhel8-operator@sha256:1640967bb2d7feb690921d81c5938d43e06a9794d8bd32f817fc8b5816d339d0_amd64"
},
"product_reference": "ocp-tools-4/service-binding-rhel8-operator@sha256:1640967bb2d7feb690921d81c5938d43e06a9794d8bd32f817fc8b5816d339d0_amd64",
"relates_to_product_reference": "8Base-OCP-Tools-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocp-tools-4/service-binding-rhel8-operator@sha256:1f14186b1fb24aebb5a706ab9560003fa57c595d37a65092a1443a0d0bf8e9c2_arm64 as a component of OpenShift Developer Tools and Services for OCP 4.9 for RHEL 8",
"product_id": "8Base-OCP-Tools-4.9:ocp-tools-4/service-binding-rhel8-operator@sha256:1f14186b1fb24aebb5a706ab9560003fa57c595d37a65092a1443a0d0bf8e9c2_arm64"
},
"product_reference": "ocp-tools-4/service-binding-rhel8-operator@sha256:1f14186b1fb24aebb5a706ab9560003fa57c595d37a65092a1443a0d0bf8e9c2_arm64",
"relates_to_product_reference": "8Base-OCP-Tools-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocp-tools-4/service-binding-rhel8-operator@sha256:98f9de0d64607fc9a8dade067d12ba73bdae4006f7ef0571e628f7fcaecf8959_s390x as a component of OpenShift Developer Tools and Services for OCP 4.9 for RHEL 8",
"product_id": "8Base-OCP-Tools-4.9:ocp-tools-4/service-binding-rhel8-operator@sha256:98f9de0d64607fc9a8dade067d12ba73bdae4006f7ef0571e628f7fcaecf8959_s390x"
},
"product_reference": "ocp-tools-4/service-binding-rhel8-operator@sha256:98f9de0d64607fc9a8dade067d12ba73bdae4006f7ef0571e628f7fcaecf8959_s390x",
"relates_to_product_reference": "8Base-OCP-Tools-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocp-tools-4/service-binding-rhel8-operator@sha256:eb70d8863ec16d3c78d72455c12ea121c52e485e812dd2903ef4c5b52ce78c08_ppc64le as a component of OpenShift Developer Tools and Services for OCP 4.9 for RHEL 8",
"product_id": "8Base-OCP-Tools-4.9:ocp-tools-4/service-binding-rhel8-operator@sha256:eb70d8863ec16d3c78d72455c12ea121c52e485e812dd2903ef4c5b52ce78c08_ppc64le"
},
"product_reference": "ocp-tools-4/service-binding-rhel8-operator@sha256:eb70d8863ec16d3c78d72455c12ea121c52e485e812dd2903ef4c5b52ce78c08_ppc64le",
"relates_to_product_reference": "8Base-OCP-Tools-4.9"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2022-32149",
"cwe": {
"id": "CWE-407",
"name": "Inefficient Algorithmic Complexity"
},
"discovery_date": "2022-10-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2134010"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in the golang.org/x/text/language package. An attacker can craft an Accept-Language header which ParseAcceptLanguage will take significant time to parse. This issue leads to a denial of service, and can impact availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: golang.org/x/text/language: ParseAcceptLanguage takes a long time to parse complex tags",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "After careful analysis of the vulnerability Redhat is choosing to keep the vulnerability severity as moderate,the vulnerability exists in the ParseAcceptLanguage function of the golang text/language package,when an attacker could craft an unusually large accept header and due to the parser taking quadratic time complexity to finish, firstly the attacker would have to find a way smuggle an input to the parser and even then this would simply not result in a crash of any kind but more of resource hang which while can be unpleasant,does not equate to any real world damage.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-OCP-Tools-4.9:ocp-tools-4/service-binding-operator-bundle@sha256:ed577a367afc96253a125e8868dc992f832bbca209d7abe57fc939ed686715b6_amd64",
"8Base-OCP-Tools-4.9:ocp-tools-4/service-binding-rhel8-operator@sha256:1640967bb2d7feb690921d81c5938d43e06a9794d8bd32f817fc8b5816d339d0_amd64",
"8Base-OCP-Tools-4.9:ocp-tools-4/service-binding-rhel8-operator@sha256:1f14186b1fb24aebb5a706ab9560003fa57c595d37a65092a1443a0d0bf8e9c2_arm64",
"8Base-OCP-Tools-4.9:ocp-tools-4/service-binding-rhel8-operator@sha256:98f9de0d64607fc9a8dade067d12ba73bdae4006f7ef0571e628f7fcaecf8959_s390x",
"8Base-OCP-Tools-4.9:ocp-tools-4/service-binding-rhel8-operator@sha256:eb70d8863ec16d3c78d72455c12ea121c52e485e812dd2903ef4c5b52ce78c08_ppc64le"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-32149"
},
{
"category": "external",
"summary": "RHBZ#2134010",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2134010"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-32149",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32149"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-32149",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-32149"
},
{
"category": "external",
"summary": "https://go.dev/issue/56152",
"url": "https://go.dev/issue/56152"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-dev/c/qfPIly0X7aU",
"url": "https://groups.google.com/g/golang-dev/c/qfPIly0X7aU"
}
],
"release_date": "2022-10-11T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-11-03T13:32:17+00:00",
"details": "Before applying this update, ensure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, see: https://access.redhat.com/articles/11258.\n\nFollow the instructions linked in the References section to create service binding connections between applications and services using the Developer perspective in the OpenShift Container Platform web console.",
"product_ids": [
"8Base-OCP-Tools-4.9:ocp-tools-4/service-binding-operator-bundle@sha256:ed577a367afc96253a125e8868dc992f832bbca209d7abe57fc939ed686715b6_amd64",
"8Base-OCP-Tools-4.9:ocp-tools-4/service-binding-rhel8-operator@sha256:1640967bb2d7feb690921d81c5938d43e06a9794d8bd32f817fc8b5816d339d0_amd64",
"8Base-OCP-Tools-4.9:ocp-tools-4/service-binding-rhel8-operator@sha256:1f14186b1fb24aebb5a706ab9560003fa57c595d37a65092a1443a0d0bf8e9c2_arm64",
"8Base-OCP-Tools-4.9:ocp-tools-4/service-binding-rhel8-operator@sha256:98f9de0d64607fc9a8dade067d12ba73bdae4006f7ef0571e628f7fcaecf8959_s390x",
"8Base-OCP-Tools-4.9:ocp-tools-4/service-binding-rhel8-operator@sha256:eb70d8863ec16d3c78d72455c12ea121c52e485e812dd2903ef4c5b52ce78c08_ppc64le"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:7407"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"8Base-OCP-Tools-4.9:ocp-tools-4/service-binding-operator-bundle@sha256:ed577a367afc96253a125e8868dc992f832bbca209d7abe57fc939ed686715b6_amd64",
"8Base-OCP-Tools-4.9:ocp-tools-4/service-binding-rhel8-operator@sha256:1640967bb2d7feb690921d81c5938d43e06a9794d8bd32f817fc8b5816d339d0_amd64",
"8Base-OCP-Tools-4.9:ocp-tools-4/service-binding-rhel8-operator@sha256:1f14186b1fb24aebb5a706ab9560003fa57c595d37a65092a1443a0d0bf8e9c2_arm64",
"8Base-OCP-Tools-4.9:ocp-tools-4/service-binding-rhel8-operator@sha256:98f9de0d64607fc9a8dade067d12ba73bdae4006f7ef0571e628f7fcaecf8959_s390x",
"8Base-OCP-Tools-4.9:ocp-tools-4/service-binding-rhel8-operator@sha256:eb70d8863ec16d3c78d72455c12ea121c52e485e812dd2903ef4c5b52ce78c08_ppc64le"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "golang: golang.org/x/text/language: ParseAcceptLanguage takes a long time to parse complex tags"
}
]
}
rhsa-2022:7435
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update is now available for Logging subsystem for Red Hat OpenShift 5.4.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Logging Subsystem 5.4.8 - Red Hat OpenShift\n\nSecurity Fix(es):\n\n* jackson-databind: denial of service via a large depth of nested objects (CVE-2020-36518)\n\n* golang: golang.org/x/text/language: ParseAcceptLanguage takes a long time to parse complex tags (CVE-2022-32149)\n\n* jackson-databind: deep wrapper array nesting wrt UNWRAP_SINGLE_VALUE_ARRAYS (CVE-2022-42003)\n\n* jackson-databind: use of deeply nested arrays (CVE-2022-42004)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2022:7435",
"url": "https://access.redhat.com/errata/RHSA-2022:7435"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#moderate",
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "2064698",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2064698"
},
{
"category": "external",
"summary": "2134010",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2134010"
},
{
"category": "external",
"summary": "2135244",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2135244"
},
{
"category": "external",
"summary": "2135247",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2135247"
},
{
"category": "external",
"summary": "LOG-3250",
"url": "https://issues.redhat.com/browse/LOG-3250"
},
{
"category": "external",
"summary": "LOG-3252",
"url": "https://issues.redhat.com/browse/LOG-3252"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2022/rhsa-2022_7435.json"
}
],
"title": "Red Hat Security Advisory: Logging Subsystem 5.4.8 - Red Hat OpenShift security update",
"tracking": {
"current_release_date": "2025-10-24T11:19:52+00:00",
"generator": {
"date": "2025-10-24T11:19:52+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.10"
}
},
"id": "RHSA-2022:7435",
"initial_release_date": "2022-11-16T12:13:01+00:00",
"revision_history": [
{
"date": "2022-11-16T12:13:01+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2022-11-16T12:13:01+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-10-24T11:19:52+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "RHOL 5.4 for RHEL 8",
"product": {
"name": "RHOL 5.4 for RHEL 8",
"product_id": "8Base-RHOL-5.4",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:logging:5.4::el8"
}
}
}
],
"category": "product_family",
"name": "logging for Red Hat OpenShift"
},
{
"branches": [
{
"category": "product_version",
"name": "openshift-logging/cluster-logging-rhel8-operator@sha256:617cc8b0011110981674b75fe1e3041bfa434c952e4a0193818b971edbc7a480_s390x",
"product": {
"name": "openshift-logging/cluster-logging-rhel8-operator@sha256:617cc8b0011110981674b75fe1e3041bfa434c952e4a0193818b971edbc7a480_s390x",
"product_id": "openshift-logging/cluster-logging-rhel8-operator@sha256:617cc8b0011110981674b75fe1e3041bfa434c952e4a0193818b971edbc7a480_s390x",
"product_identification_helper": {
"purl": "pkg:oci/cluster-logging-rhel8-operator@sha256:617cc8b0011110981674b75fe1e3041bfa434c952e4a0193818b971edbc7a480?arch=s390x\u0026repository_url=registry.redhat.io/openshift-logging/cluster-logging-rhel8-operator\u0026tag=v5.4.8-6"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/elasticsearch-rhel8-operator@sha256:dd211d42eaad043d9bdb519e3ad6a86255b7280a2cdf47dd3fe0458a77cb110f_s390x",
"product": {
"name": "openshift-logging/elasticsearch-rhel8-operator@sha256:dd211d42eaad043d9bdb519e3ad6a86255b7280a2cdf47dd3fe0458a77cb110f_s390x",
"product_id": "openshift-logging/elasticsearch-rhel8-operator@sha256:dd211d42eaad043d9bdb519e3ad6a86255b7280a2cdf47dd3fe0458a77cb110f_s390x",
"product_identification_helper": {
"purl": "pkg:oci/elasticsearch-rhel8-operator@sha256:dd211d42eaad043d9bdb519e3ad6a86255b7280a2cdf47dd3fe0458a77cb110f?arch=s390x\u0026repository_url=registry.redhat.io/openshift-logging/elasticsearch-rhel8-operator\u0026tag=v5.4.8-3"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/elasticsearch-proxy-rhel8@sha256:b9c2e58b39dc3de97013f8806178f6327bf2e4590fe55db144527d64d468f64f_s390x",
"product": {
"name": "openshift-logging/elasticsearch-proxy-rhel8@sha256:b9c2e58b39dc3de97013f8806178f6327bf2e4590fe55db144527d64d468f64f_s390x",
"product_id": "openshift-logging/elasticsearch-proxy-rhel8@sha256:b9c2e58b39dc3de97013f8806178f6327bf2e4590fe55db144527d64d468f64f_s390x",
"product_identification_helper": {
"purl": "pkg:oci/elasticsearch-proxy-rhel8@sha256:b9c2e58b39dc3de97013f8806178f6327bf2e4590fe55db144527d64d468f64f?arch=s390x\u0026repository_url=registry.redhat.io/openshift-logging/elasticsearch-proxy-rhel8\u0026tag=v1.0.0-300"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/log-file-metric-exporter-rhel8@sha256:85827db708c0927027435b05732cc7e34b0675eaa86665c91efacc76aecd6227_s390x",
"product": {
"name": "openshift-logging/log-file-metric-exporter-rhel8@sha256:85827db708c0927027435b05732cc7e34b0675eaa86665c91efacc76aecd6227_s390x",
"product_id": "openshift-logging/log-file-metric-exporter-rhel8@sha256:85827db708c0927027435b05732cc7e34b0675eaa86665c91efacc76aecd6227_s390x",
"product_identification_helper": {
"purl": "pkg:oci/log-file-metric-exporter-rhel8@sha256:85827db708c0927027435b05732cc7e34b0675eaa86665c91efacc76aecd6227?arch=s390x\u0026repository_url=registry.redhat.io/openshift-logging/log-file-metric-exporter-rhel8\u0026tag=v1.1.0-74"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/logging-curator5-rhel8@sha256:7016e867ddfe970d6d2d54d5615e8f613786bcfbfe52ebf3139c07da3d5a53db_s390x",
"product": {
"name": "openshift-logging/logging-curator5-rhel8@sha256:7016e867ddfe970d6d2d54d5615e8f613786bcfbfe52ebf3139c07da3d5a53db_s390x",
"product_id": "openshift-logging/logging-curator5-rhel8@sha256:7016e867ddfe970d6d2d54d5615e8f613786bcfbfe52ebf3139c07da3d5a53db_s390x",
"product_identification_helper": {
"purl": "pkg:oci/logging-curator5-rhel8@sha256:7016e867ddfe970d6d2d54d5615e8f613786bcfbfe52ebf3139c07da3d5a53db?arch=s390x\u0026repository_url=registry.redhat.io/openshift-logging/logging-curator5-rhel8\u0026tag=v5.8.1-246"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/elasticsearch6-rhel8@sha256:5b1cfc2f9a96601439cf17d1fe49a6bc6cad3b7273af87b23528090aefbfd915_s390x",
"product": {
"name": "openshift-logging/elasticsearch6-rhel8@sha256:5b1cfc2f9a96601439cf17d1fe49a6bc6cad3b7273af87b23528090aefbfd915_s390x",
"product_id": "openshift-logging/elasticsearch6-rhel8@sha256:5b1cfc2f9a96601439cf17d1fe49a6bc6cad3b7273af87b23528090aefbfd915_s390x",
"product_identification_helper": {
"purl": "pkg:oci/elasticsearch6-rhel8@sha256:5b1cfc2f9a96601439cf17d1fe49a6bc6cad3b7273af87b23528090aefbfd915?arch=s390x\u0026repository_url=registry.redhat.io/openshift-logging/elasticsearch6-rhel8\u0026tag=v6.8.1-265"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/eventrouter-rhel8@sha256:f05aee8433dec1c9f6cf835038f9e5a47847d4095383bf3c22ca57c3fb69fa98_s390x",
"product": {
"name": "openshift-logging/eventrouter-rhel8@sha256:f05aee8433dec1c9f6cf835038f9e5a47847d4095383bf3c22ca57c3fb69fa98_s390x",
"product_id": "openshift-logging/eventrouter-rhel8@sha256:f05aee8433dec1c9f6cf835038f9e5a47847d4095383bf3c22ca57c3fb69fa98_s390x",
"product_identification_helper": {
"purl": "pkg:oci/eventrouter-rhel8@sha256:f05aee8433dec1c9f6cf835038f9e5a47847d4095383bf3c22ca57c3fb69fa98?arch=s390x\u0026repository_url=registry.redhat.io/openshift-logging/eventrouter-rhel8\u0026tag=v0.4.0-55"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/fluentd-rhel8@sha256:36aecf05ca3cdaf29982b3efa4a1c97087be29b0a58c9777e6b0c11a34861aa8_s390x",
"product": {
"name": "openshift-logging/fluentd-rhel8@sha256:36aecf05ca3cdaf29982b3efa4a1c97087be29b0a58c9777e6b0c11a34861aa8_s390x",
"product_id": "openshift-logging/fluentd-rhel8@sha256:36aecf05ca3cdaf29982b3efa4a1c97087be29b0a58c9777e6b0c11a34861aa8_s390x",
"product_identification_helper": {
"purl": "pkg:oci/fluentd-rhel8@sha256:36aecf05ca3cdaf29982b3efa4a1c97087be29b0a58c9777e6b0c11a34861aa8?arch=s390x\u0026repository_url=registry.redhat.io/openshift-logging/fluentd-rhel8\u0026tag=v1.14.5-36"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/kibana6-rhel8@sha256:4a029733337b10bb9fb8d98c91abc5451ca0b98713c8f2271a675251e025b6c0_s390x",
"product": {
"name": "openshift-logging/kibana6-rhel8@sha256:4a029733337b10bb9fb8d98c91abc5451ca0b98713c8f2271a675251e025b6c0_s390x",
"product_id": "openshift-logging/kibana6-rhel8@sha256:4a029733337b10bb9fb8d98c91abc5451ca0b98713c8f2271a675251e025b6c0_s390x",
"product_identification_helper": {
"purl": "pkg:oci/kibana6-rhel8@sha256:4a029733337b10bb9fb8d98c91abc5451ca0b98713c8f2271a675251e025b6c0?arch=s390x\u0026repository_url=registry.redhat.io/openshift-logging/kibana6-rhel8\u0026tag=v6.8.1-302"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/logging-loki-rhel8@sha256:cfe410d498940a95da631ea213866a96a119034d78d5d53f7f9c7e8da56e0f45_s390x",
"product": {
"name": "openshift-logging/logging-loki-rhel8@sha256:cfe410d498940a95da631ea213866a96a119034d78d5d53f7f9c7e8da56e0f45_s390x",
"product_id": "openshift-logging/logging-loki-rhel8@sha256:cfe410d498940a95da631ea213866a96a119034d78d5d53f7f9c7e8da56e0f45_s390x",
"product_identification_helper": {
"purl": "pkg:oci/logging-loki-rhel8@sha256:cfe410d498940a95da631ea213866a96a119034d78d5d53f7f9c7e8da56e0f45?arch=s390x\u0026repository_url=registry.redhat.io/openshift-logging/logging-loki-rhel8\u0026tag=v2.5.0-51"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/vector-rhel8@sha256:48bb136d11b44428c87489978873370848ac2b219b107ef7e81ab679db095234_s390x",
"product": {
"name": "openshift-logging/vector-rhel8@sha256:48bb136d11b44428c87489978873370848ac2b219b107ef7e81ab679db095234_s390x",
"product_id": "openshift-logging/vector-rhel8@sha256:48bb136d11b44428c87489978873370848ac2b219b107ef7e81ab679db095234_s390x",
"product_identification_helper": {
"purl": "pkg:oci/vector-rhel8@sha256:48bb136d11b44428c87489978873370848ac2b219b107ef7e81ab679db095234?arch=s390x\u0026repository_url=registry.redhat.io/openshift-logging/vector-rhel8\u0026tag=v0.14-67"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/loki-rhel8-operator@sha256:0f1be625b4012820f7ac439fed000808d7acb4e885ace16014461bf802be935a_s390x",
"product": {
"name": "openshift-logging/loki-rhel8-operator@sha256:0f1be625b4012820f7ac439fed000808d7acb4e885ace16014461bf802be935a_s390x",
"product_id": "openshift-logging/loki-rhel8-operator@sha256:0f1be625b4012820f7ac439fed000808d7acb4e885ace16014461bf802be935a_s390x",
"product_identification_helper": {
"purl": "pkg:oci/loki-rhel8-operator@sha256:0f1be625b4012820f7ac439fed000808d7acb4e885ace16014461bf802be935a?arch=s390x\u0026repository_url=registry.redhat.io/openshift-logging/loki-rhel8-operator\u0026tag=v5.4.8-4"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/lokistack-gateway-rhel8@sha256:9c4959525339b607a98889d56f4c26f2e4af25032466c439903a7f1cb593f721_s390x",
"product": {
"name": "openshift-logging/lokistack-gateway-rhel8@sha256:9c4959525339b607a98889d56f4c26f2e4af25032466c439903a7f1cb593f721_s390x",
"product_id": "openshift-logging/lokistack-gateway-rhel8@sha256:9c4959525339b607a98889d56f4c26f2e4af25032466c439903a7f1cb593f721_s390x",
"product_identification_helper": {
"purl": "pkg:oci/lokistack-gateway-rhel8@sha256:9c4959525339b607a98889d56f4c26f2e4af25032466c439903a7f1cb593f721?arch=s390x\u0026repository_url=registry.redhat.io/openshift-logging/lokistack-gateway-rhel8\u0026tag=v5.4.8-5"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/opa-openshift-rhel8@sha256:be8ba0e4c5f24c7b4549700a25c89b10d4b2fc0b0e3888163bb53827914e95c1_s390x",
"product": {
"name": "openshift-logging/opa-openshift-rhel8@sha256:be8ba0e4c5f24c7b4549700a25c89b10d4b2fc0b0e3888163bb53827914e95c1_s390x",
"product_id": "openshift-logging/opa-openshift-rhel8@sha256:be8ba0e4c5f24c7b4549700a25c89b10d4b2fc0b0e3888163bb53827914e95c1_s390x",
"product_identification_helper": {
"purl": "pkg:oci/opa-openshift-rhel8@sha256:be8ba0e4c5f24c7b4549700a25c89b10d4b2fc0b0e3888163bb53827914e95c1?arch=s390x\u0026repository_url=registry.redhat.io/openshift-logging/opa-openshift-rhel8\u0026tag=v5.4.8-4"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "openshift-logging/cluster-logging-rhel8-operator@sha256:aa1602fe2abe23bd8a4c791bc45d425686a6e6d1aab4face0fac28bfc7cebbe1_ppc64le",
"product": {
"name": "openshift-logging/cluster-logging-rhel8-operator@sha256:aa1602fe2abe23bd8a4c791bc45d425686a6e6d1aab4face0fac28bfc7cebbe1_ppc64le",
"product_id": "openshift-logging/cluster-logging-rhel8-operator@sha256:aa1602fe2abe23bd8a4c791bc45d425686a6e6d1aab4face0fac28bfc7cebbe1_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/cluster-logging-rhel8-operator@sha256:aa1602fe2abe23bd8a4c791bc45d425686a6e6d1aab4face0fac28bfc7cebbe1?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-logging/cluster-logging-rhel8-operator\u0026tag=v5.4.8-6"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/elasticsearch-rhel8-operator@sha256:6a55934cf7af0c03e06d4ec7a15a80acf53491fb7a183c16fdf8018fbf9b4174_ppc64le",
"product": {
"name": "openshift-logging/elasticsearch-rhel8-operator@sha256:6a55934cf7af0c03e06d4ec7a15a80acf53491fb7a183c16fdf8018fbf9b4174_ppc64le",
"product_id": "openshift-logging/elasticsearch-rhel8-operator@sha256:6a55934cf7af0c03e06d4ec7a15a80acf53491fb7a183c16fdf8018fbf9b4174_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/elasticsearch-rhel8-operator@sha256:6a55934cf7af0c03e06d4ec7a15a80acf53491fb7a183c16fdf8018fbf9b4174?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-logging/elasticsearch-rhel8-operator\u0026tag=v5.4.8-3"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/elasticsearch-proxy-rhel8@sha256:4f4e5bb267ad391bc0fc6a010ec9ecdf3bf48d5b6e9db0d2510960c13c97bd71_ppc64le",
"product": {
"name": "openshift-logging/elasticsearch-proxy-rhel8@sha256:4f4e5bb267ad391bc0fc6a010ec9ecdf3bf48d5b6e9db0d2510960c13c97bd71_ppc64le",
"product_id": "openshift-logging/elasticsearch-proxy-rhel8@sha256:4f4e5bb267ad391bc0fc6a010ec9ecdf3bf48d5b6e9db0d2510960c13c97bd71_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/elasticsearch-proxy-rhel8@sha256:4f4e5bb267ad391bc0fc6a010ec9ecdf3bf48d5b6e9db0d2510960c13c97bd71?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-logging/elasticsearch-proxy-rhel8\u0026tag=v1.0.0-300"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/log-file-metric-exporter-rhel8@sha256:4fe26adac10cf20b83812e4fa513231d7e1fd4b6cd4e09d4fd425c391885cfcc_ppc64le",
"product": {
"name": "openshift-logging/log-file-metric-exporter-rhel8@sha256:4fe26adac10cf20b83812e4fa513231d7e1fd4b6cd4e09d4fd425c391885cfcc_ppc64le",
"product_id": "openshift-logging/log-file-metric-exporter-rhel8@sha256:4fe26adac10cf20b83812e4fa513231d7e1fd4b6cd4e09d4fd425c391885cfcc_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/log-file-metric-exporter-rhel8@sha256:4fe26adac10cf20b83812e4fa513231d7e1fd4b6cd4e09d4fd425c391885cfcc?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-logging/log-file-metric-exporter-rhel8\u0026tag=v1.1.0-74"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/logging-curator5-rhel8@sha256:d24afbc9228ef7f3d0a6fd716a3a57abde88a1f65d149c7df4f959a775b670bd_ppc64le",
"product": {
"name": "openshift-logging/logging-curator5-rhel8@sha256:d24afbc9228ef7f3d0a6fd716a3a57abde88a1f65d149c7df4f959a775b670bd_ppc64le",
"product_id": "openshift-logging/logging-curator5-rhel8@sha256:d24afbc9228ef7f3d0a6fd716a3a57abde88a1f65d149c7df4f959a775b670bd_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/logging-curator5-rhel8@sha256:d24afbc9228ef7f3d0a6fd716a3a57abde88a1f65d149c7df4f959a775b670bd?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-logging/logging-curator5-rhel8\u0026tag=v5.8.1-246"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/elasticsearch6-rhel8@sha256:17a9f3ae042b92693a374e3d60a07f2ab2e52419f8df25d446dd0654f6a858f6_ppc64le",
"product": {
"name": "openshift-logging/elasticsearch6-rhel8@sha256:17a9f3ae042b92693a374e3d60a07f2ab2e52419f8df25d446dd0654f6a858f6_ppc64le",
"product_id": "openshift-logging/elasticsearch6-rhel8@sha256:17a9f3ae042b92693a374e3d60a07f2ab2e52419f8df25d446dd0654f6a858f6_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/elasticsearch6-rhel8@sha256:17a9f3ae042b92693a374e3d60a07f2ab2e52419f8df25d446dd0654f6a858f6?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-logging/elasticsearch6-rhel8\u0026tag=v6.8.1-265"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/eventrouter-rhel8@sha256:bc408fc4b0482c5eb1b0deb3a9090f3e3dd9b370001d54cd076254562c72fec9_ppc64le",
"product": {
"name": "openshift-logging/eventrouter-rhel8@sha256:bc408fc4b0482c5eb1b0deb3a9090f3e3dd9b370001d54cd076254562c72fec9_ppc64le",
"product_id": "openshift-logging/eventrouter-rhel8@sha256:bc408fc4b0482c5eb1b0deb3a9090f3e3dd9b370001d54cd076254562c72fec9_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/eventrouter-rhel8@sha256:bc408fc4b0482c5eb1b0deb3a9090f3e3dd9b370001d54cd076254562c72fec9?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-logging/eventrouter-rhel8\u0026tag=v0.4.0-55"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/fluentd-rhel8@sha256:ea07da04f06df6bf0d9dd981a3795dfdb51eca83f59a6291114650e3e98a9e71_ppc64le",
"product": {
"name": "openshift-logging/fluentd-rhel8@sha256:ea07da04f06df6bf0d9dd981a3795dfdb51eca83f59a6291114650e3e98a9e71_ppc64le",
"product_id": "openshift-logging/fluentd-rhel8@sha256:ea07da04f06df6bf0d9dd981a3795dfdb51eca83f59a6291114650e3e98a9e71_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/fluentd-rhel8@sha256:ea07da04f06df6bf0d9dd981a3795dfdb51eca83f59a6291114650e3e98a9e71?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-logging/fluentd-rhel8\u0026tag=v1.14.5-36"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/kibana6-rhel8@sha256:812f4380024dc3df42310ad14d173d390f2bdf4b3dbdb02550c00552534f79ce_ppc64le",
"product": {
"name": "openshift-logging/kibana6-rhel8@sha256:812f4380024dc3df42310ad14d173d390f2bdf4b3dbdb02550c00552534f79ce_ppc64le",
"product_id": "openshift-logging/kibana6-rhel8@sha256:812f4380024dc3df42310ad14d173d390f2bdf4b3dbdb02550c00552534f79ce_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/kibana6-rhel8@sha256:812f4380024dc3df42310ad14d173d390f2bdf4b3dbdb02550c00552534f79ce?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-logging/kibana6-rhel8\u0026tag=v6.8.1-302"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/logging-loki-rhel8@sha256:f7979c82140a0ab1a97c9f3151465bfbd9f79c4db9b0cc20f974cd7b890f074f_ppc64le",
"product": {
"name": "openshift-logging/logging-loki-rhel8@sha256:f7979c82140a0ab1a97c9f3151465bfbd9f79c4db9b0cc20f974cd7b890f074f_ppc64le",
"product_id": "openshift-logging/logging-loki-rhel8@sha256:f7979c82140a0ab1a97c9f3151465bfbd9f79c4db9b0cc20f974cd7b890f074f_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/logging-loki-rhel8@sha256:f7979c82140a0ab1a97c9f3151465bfbd9f79c4db9b0cc20f974cd7b890f074f?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-logging/logging-loki-rhel8\u0026tag=v2.5.0-51"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/vector-rhel8@sha256:48f0317d167710ff5b0787c73f6b7dd0249e7c8d2d001159132a97299c30b62d_ppc64le",
"product": {
"name": "openshift-logging/vector-rhel8@sha256:48f0317d167710ff5b0787c73f6b7dd0249e7c8d2d001159132a97299c30b62d_ppc64le",
"product_id": "openshift-logging/vector-rhel8@sha256:48f0317d167710ff5b0787c73f6b7dd0249e7c8d2d001159132a97299c30b62d_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/vector-rhel8@sha256:48f0317d167710ff5b0787c73f6b7dd0249e7c8d2d001159132a97299c30b62d?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-logging/vector-rhel8\u0026tag=v0.14-67"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/loki-rhel8-operator@sha256:28f45a80846c5e11638fb479be42cafcb2bdb3af94dff3629a820de295cbe31d_ppc64le",
"product": {
"name": "openshift-logging/loki-rhel8-operator@sha256:28f45a80846c5e11638fb479be42cafcb2bdb3af94dff3629a820de295cbe31d_ppc64le",
"product_id": "openshift-logging/loki-rhel8-operator@sha256:28f45a80846c5e11638fb479be42cafcb2bdb3af94dff3629a820de295cbe31d_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/loki-rhel8-operator@sha256:28f45a80846c5e11638fb479be42cafcb2bdb3af94dff3629a820de295cbe31d?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-logging/loki-rhel8-operator\u0026tag=v5.4.8-4"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/lokistack-gateway-rhel8@sha256:7b0c2c99cf0f710166b749dbfd7f544caf5fe35516c743fca251c7cec896e1d6_ppc64le",
"product": {
"name": "openshift-logging/lokistack-gateway-rhel8@sha256:7b0c2c99cf0f710166b749dbfd7f544caf5fe35516c743fca251c7cec896e1d6_ppc64le",
"product_id": "openshift-logging/lokistack-gateway-rhel8@sha256:7b0c2c99cf0f710166b749dbfd7f544caf5fe35516c743fca251c7cec896e1d6_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/lokistack-gateway-rhel8@sha256:7b0c2c99cf0f710166b749dbfd7f544caf5fe35516c743fca251c7cec896e1d6?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-logging/lokistack-gateway-rhel8\u0026tag=v5.4.8-5"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/opa-openshift-rhel8@sha256:92ddf24824c8f8ae93dec07184c446615b635389472d3a525df72da07c8d9b97_ppc64le",
"product": {
"name": "openshift-logging/opa-openshift-rhel8@sha256:92ddf24824c8f8ae93dec07184c446615b635389472d3a525df72da07c8d9b97_ppc64le",
"product_id": "openshift-logging/opa-openshift-rhel8@sha256:92ddf24824c8f8ae93dec07184c446615b635389472d3a525df72da07c8d9b97_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/opa-openshift-rhel8@sha256:92ddf24824c8f8ae93dec07184c446615b635389472d3a525df72da07c8d9b97?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-logging/opa-openshift-rhel8\u0026tag=v5.4.8-4"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "openshift-logging/cluster-logging-rhel8-operator@sha256:637df49756fe85e7b38b279ffa7672d72c658d3d47df7f9dada2dd70563af83b_arm64",
"product": {
"name": "openshift-logging/cluster-logging-rhel8-operator@sha256:637df49756fe85e7b38b279ffa7672d72c658d3d47df7f9dada2dd70563af83b_arm64",
"product_id": "openshift-logging/cluster-logging-rhel8-operator@sha256:637df49756fe85e7b38b279ffa7672d72c658d3d47df7f9dada2dd70563af83b_arm64",
"product_identification_helper": {
"purl": "pkg:oci/cluster-logging-rhel8-operator@sha256:637df49756fe85e7b38b279ffa7672d72c658d3d47df7f9dada2dd70563af83b?arch=arm64\u0026repository_url=registry.redhat.io/openshift-logging/cluster-logging-rhel8-operator\u0026tag=v5.4.8-6"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/elasticsearch-rhel8-operator@sha256:2005f41e59a130bb86c2ec47d1b060e3e2ed32f9a4cef3897e2c05fc94043dbb_arm64",
"product": {
"name": "openshift-logging/elasticsearch-rhel8-operator@sha256:2005f41e59a130bb86c2ec47d1b060e3e2ed32f9a4cef3897e2c05fc94043dbb_arm64",
"product_id": "openshift-logging/elasticsearch-rhel8-operator@sha256:2005f41e59a130bb86c2ec47d1b060e3e2ed32f9a4cef3897e2c05fc94043dbb_arm64",
"product_identification_helper": {
"purl": "pkg:oci/elasticsearch-rhel8-operator@sha256:2005f41e59a130bb86c2ec47d1b060e3e2ed32f9a4cef3897e2c05fc94043dbb?arch=arm64\u0026repository_url=registry.redhat.io/openshift-logging/elasticsearch-rhel8-operator\u0026tag=v5.4.8-3"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/elasticsearch-proxy-rhel8@sha256:c9a2b9e7cca14d9596ccbe0f64e2abe4452f91f029f42eefead43c9f526f6a58_arm64",
"product": {
"name": "openshift-logging/elasticsearch-proxy-rhel8@sha256:c9a2b9e7cca14d9596ccbe0f64e2abe4452f91f029f42eefead43c9f526f6a58_arm64",
"product_id": "openshift-logging/elasticsearch-proxy-rhel8@sha256:c9a2b9e7cca14d9596ccbe0f64e2abe4452f91f029f42eefead43c9f526f6a58_arm64",
"product_identification_helper": {
"purl": "pkg:oci/elasticsearch-proxy-rhel8@sha256:c9a2b9e7cca14d9596ccbe0f64e2abe4452f91f029f42eefead43c9f526f6a58?arch=arm64\u0026repository_url=registry.redhat.io/openshift-logging/elasticsearch-proxy-rhel8\u0026tag=v1.0.0-300"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/log-file-metric-exporter-rhel8@sha256:a5285db276a5545fdbaa9f0743a49ba72ce1c5da61b5cccc9422320a03e08bea_arm64",
"product": {
"name": "openshift-logging/log-file-metric-exporter-rhel8@sha256:a5285db276a5545fdbaa9f0743a49ba72ce1c5da61b5cccc9422320a03e08bea_arm64",
"product_id": "openshift-logging/log-file-metric-exporter-rhel8@sha256:a5285db276a5545fdbaa9f0743a49ba72ce1c5da61b5cccc9422320a03e08bea_arm64",
"product_identification_helper": {
"purl": "pkg:oci/log-file-metric-exporter-rhel8@sha256:a5285db276a5545fdbaa9f0743a49ba72ce1c5da61b5cccc9422320a03e08bea?arch=arm64\u0026repository_url=registry.redhat.io/openshift-logging/log-file-metric-exporter-rhel8\u0026tag=v1.1.0-74"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/logging-curator5-rhel8@sha256:0b28415b8115ff3216002faa5c9ecf3c46995085e3364c8028cb544cb4787ed2_arm64",
"product": {
"name": "openshift-logging/logging-curator5-rhel8@sha256:0b28415b8115ff3216002faa5c9ecf3c46995085e3364c8028cb544cb4787ed2_arm64",
"product_id": "openshift-logging/logging-curator5-rhel8@sha256:0b28415b8115ff3216002faa5c9ecf3c46995085e3364c8028cb544cb4787ed2_arm64",
"product_identification_helper": {
"purl": "pkg:oci/logging-curator5-rhel8@sha256:0b28415b8115ff3216002faa5c9ecf3c46995085e3364c8028cb544cb4787ed2?arch=arm64\u0026repository_url=registry.redhat.io/openshift-logging/logging-curator5-rhel8\u0026tag=v5.8.1-246"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/elasticsearch6-rhel8@sha256:8e0ba10f91db4cb8786d0501ec33a3d54f7c7c5337e0495cc2286a6ea20cca20_arm64",
"product": {
"name": "openshift-logging/elasticsearch6-rhel8@sha256:8e0ba10f91db4cb8786d0501ec33a3d54f7c7c5337e0495cc2286a6ea20cca20_arm64",
"product_id": "openshift-logging/elasticsearch6-rhel8@sha256:8e0ba10f91db4cb8786d0501ec33a3d54f7c7c5337e0495cc2286a6ea20cca20_arm64",
"product_identification_helper": {
"purl": "pkg:oci/elasticsearch6-rhel8@sha256:8e0ba10f91db4cb8786d0501ec33a3d54f7c7c5337e0495cc2286a6ea20cca20?arch=arm64\u0026repository_url=registry.redhat.io/openshift-logging/elasticsearch6-rhel8\u0026tag=v6.8.1-265"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/eventrouter-rhel8@sha256:4438a3bba34418a9dc566bf15f6b4764de4295ab8b05a7b1a86f9e8cd332b3f7_arm64",
"product": {
"name": "openshift-logging/eventrouter-rhel8@sha256:4438a3bba34418a9dc566bf15f6b4764de4295ab8b05a7b1a86f9e8cd332b3f7_arm64",
"product_id": "openshift-logging/eventrouter-rhel8@sha256:4438a3bba34418a9dc566bf15f6b4764de4295ab8b05a7b1a86f9e8cd332b3f7_arm64",
"product_identification_helper": {
"purl": "pkg:oci/eventrouter-rhel8@sha256:4438a3bba34418a9dc566bf15f6b4764de4295ab8b05a7b1a86f9e8cd332b3f7?arch=arm64\u0026repository_url=registry.redhat.io/openshift-logging/eventrouter-rhel8\u0026tag=v0.4.0-55"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/fluentd-rhel8@sha256:e3a51d2bdc632b8376e28c33e9d4fac3464e3a84a313a17246b1f1cf21cb5710_arm64",
"product": {
"name": "openshift-logging/fluentd-rhel8@sha256:e3a51d2bdc632b8376e28c33e9d4fac3464e3a84a313a17246b1f1cf21cb5710_arm64",
"product_id": "openshift-logging/fluentd-rhel8@sha256:e3a51d2bdc632b8376e28c33e9d4fac3464e3a84a313a17246b1f1cf21cb5710_arm64",
"product_identification_helper": {
"purl": "pkg:oci/fluentd-rhel8@sha256:e3a51d2bdc632b8376e28c33e9d4fac3464e3a84a313a17246b1f1cf21cb5710?arch=arm64\u0026repository_url=registry.redhat.io/openshift-logging/fluentd-rhel8\u0026tag=v1.14.5-36"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/kibana6-rhel8@sha256:958ba6856cc76fc77d34a9c78888eb37b9c39b83a2f044ef2337610560ba9323_arm64",
"product": {
"name": "openshift-logging/kibana6-rhel8@sha256:958ba6856cc76fc77d34a9c78888eb37b9c39b83a2f044ef2337610560ba9323_arm64",
"product_id": "openshift-logging/kibana6-rhel8@sha256:958ba6856cc76fc77d34a9c78888eb37b9c39b83a2f044ef2337610560ba9323_arm64",
"product_identification_helper": {
"purl": "pkg:oci/kibana6-rhel8@sha256:958ba6856cc76fc77d34a9c78888eb37b9c39b83a2f044ef2337610560ba9323?arch=arm64\u0026repository_url=registry.redhat.io/openshift-logging/kibana6-rhel8\u0026tag=v6.8.1-302"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/logging-loki-rhel8@sha256:40d4989b4733f54a01a73831fa00b12e49fff69c75138902eac0d894d432e4d9_arm64",
"product": {
"name": "openshift-logging/logging-loki-rhel8@sha256:40d4989b4733f54a01a73831fa00b12e49fff69c75138902eac0d894d432e4d9_arm64",
"product_id": "openshift-logging/logging-loki-rhel8@sha256:40d4989b4733f54a01a73831fa00b12e49fff69c75138902eac0d894d432e4d9_arm64",
"product_identification_helper": {
"purl": "pkg:oci/logging-loki-rhel8@sha256:40d4989b4733f54a01a73831fa00b12e49fff69c75138902eac0d894d432e4d9?arch=arm64\u0026repository_url=registry.redhat.io/openshift-logging/logging-loki-rhel8\u0026tag=v2.5.0-51"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/vector-rhel8@sha256:bde21c03fb831d01e85b28245881f7e3f2bb2ef6d2671eb92b2e0cc4bd3898e2_arm64",
"product": {
"name": "openshift-logging/vector-rhel8@sha256:bde21c03fb831d01e85b28245881f7e3f2bb2ef6d2671eb92b2e0cc4bd3898e2_arm64",
"product_id": "openshift-logging/vector-rhel8@sha256:bde21c03fb831d01e85b28245881f7e3f2bb2ef6d2671eb92b2e0cc4bd3898e2_arm64",
"product_identification_helper": {
"purl": "pkg:oci/vector-rhel8@sha256:bde21c03fb831d01e85b28245881f7e3f2bb2ef6d2671eb92b2e0cc4bd3898e2?arch=arm64\u0026repository_url=registry.redhat.io/openshift-logging/vector-rhel8\u0026tag=v0.14-67"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/loki-rhel8-operator@sha256:df7de1e9f5a4396df6f14b1c4b6bb2a9ae4bc50d82cbc954ec535c26e8df2cb1_arm64",
"product": {
"name": "openshift-logging/loki-rhel8-operator@sha256:df7de1e9f5a4396df6f14b1c4b6bb2a9ae4bc50d82cbc954ec535c26e8df2cb1_arm64",
"product_id": "openshift-logging/loki-rhel8-operator@sha256:df7de1e9f5a4396df6f14b1c4b6bb2a9ae4bc50d82cbc954ec535c26e8df2cb1_arm64",
"product_identification_helper": {
"purl": "pkg:oci/loki-rhel8-operator@sha256:df7de1e9f5a4396df6f14b1c4b6bb2a9ae4bc50d82cbc954ec535c26e8df2cb1?arch=arm64\u0026repository_url=registry.redhat.io/openshift-logging/loki-rhel8-operator\u0026tag=v5.4.8-4"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/lokistack-gateway-rhel8@sha256:178fcf44e6a1fa90d27a40565f69ae2880622b017bc8d9e33a441353eb45609d_arm64",
"product": {
"name": "openshift-logging/lokistack-gateway-rhel8@sha256:178fcf44e6a1fa90d27a40565f69ae2880622b017bc8d9e33a441353eb45609d_arm64",
"product_id": "openshift-logging/lokistack-gateway-rhel8@sha256:178fcf44e6a1fa90d27a40565f69ae2880622b017bc8d9e33a441353eb45609d_arm64",
"product_identification_helper": {
"purl": "pkg:oci/lokistack-gateway-rhel8@sha256:178fcf44e6a1fa90d27a40565f69ae2880622b017bc8d9e33a441353eb45609d?arch=arm64\u0026repository_url=registry.redhat.io/openshift-logging/lokistack-gateway-rhel8\u0026tag=v5.4.8-5"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/opa-openshift-rhel8@sha256:1b106af51bb50f1ce4db13ebbf6f6c67eae45611c0d5dc46476f1dfaa8aca166_arm64",
"product": {
"name": "openshift-logging/opa-openshift-rhel8@sha256:1b106af51bb50f1ce4db13ebbf6f6c67eae45611c0d5dc46476f1dfaa8aca166_arm64",
"product_id": "openshift-logging/opa-openshift-rhel8@sha256:1b106af51bb50f1ce4db13ebbf6f6c67eae45611c0d5dc46476f1dfaa8aca166_arm64",
"product_identification_helper": {
"purl": "pkg:oci/opa-openshift-rhel8@sha256:1b106af51bb50f1ce4db13ebbf6f6c67eae45611c0d5dc46476f1dfaa8aca166?arch=arm64\u0026repository_url=registry.redhat.io/openshift-logging/opa-openshift-rhel8\u0026tag=v5.4.8-4"
}
}
}
],
"category": "architecture",
"name": "arm64"
},
{
"branches": [
{
"category": "product_version",
"name": "openshift-logging/cluster-logging-rhel8-operator@sha256:c698b52c46d41007e5ac4f90b9540d430820bd20a93468fddd3a949c7ef5b332_amd64",
"product": {
"name": "openshift-logging/cluster-logging-rhel8-operator@sha256:c698b52c46d41007e5ac4f90b9540d430820bd20a93468fddd3a949c7ef5b332_amd64",
"product_id": "openshift-logging/cluster-logging-rhel8-operator@sha256:c698b52c46d41007e5ac4f90b9540d430820bd20a93468fddd3a949c7ef5b332_amd64",
"product_identification_helper": {
"purl": "pkg:oci/cluster-logging-rhel8-operator@sha256:c698b52c46d41007e5ac4f90b9540d430820bd20a93468fddd3a949c7ef5b332?arch=amd64\u0026repository_url=registry.redhat.io/openshift-logging/cluster-logging-rhel8-operator\u0026tag=v5.4.8-6"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/cluster-logging-operator-bundle@sha256:cb26d9e55f781dd535901a90f1ec2f8e02e8e1de72c0fde638c90fcc228ec4b2_amd64",
"product": {
"name": "openshift-logging/cluster-logging-operator-bundle@sha256:cb26d9e55f781dd535901a90f1ec2f8e02e8e1de72c0fde638c90fcc228ec4b2_amd64",
"product_id": "openshift-logging/cluster-logging-operator-bundle@sha256:cb26d9e55f781dd535901a90f1ec2f8e02e8e1de72c0fde638c90fcc228ec4b2_amd64",
"product_identification_helper": {
"purl": "pkg:oci/cluster-logging-operator-bundle@sha256:cb26d9e55f781dd535901a90f1ec2f8e02e8e1de72c0fde638c90fcc228ec4b2?arch=amd64\u0026repository_url=registry.redhat.io/openshift-logging/cluster-logging-operator-bundle\u0026tag=v5.4.8-7"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/elasticsearch-rhel8-operator@sha256:8ce04536772f31ad022b9c66cddc090d2962b44d66c06a1db56d1447be198326_amd64",
"product": {
"name": "openshift-logging/elasticsearch-rhel8-operator@sha256:8ce04536772f31ad022b9c66cddc090d2962b44d66c06a1db56d1447be198326_amd64",
"product_id": "openshift-logging/elasticsearch-rhel8-operator@sha256:8ce04536772f31ad022b9c66cddc090d2962b44d66c06a1db56d1447be198326_amd64",
"product_identification_helper": {
"purl": "pkg:oci/elasticsearch-rhel8-operator@sha256:8ce04536772f31ad022b9c66cddc090d2962b44d66c06a1db56d1447be198326?arch=amd64\u0026repository_url=registry.redhat.io/openshift-logging/elasticsearch-rhel8-operator\u0026tag=v5.4.8-3"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/elasticsearch-operator-bundle@sha256:7659606e0418a1920161b7ca67524ea6a7b1ed366b817f1a5cde0b346152243c_amd64",
"product": {
"name": "openshift-logging/elasticsearch-operator-bundle@sha256:7659606e0418a1920161b7ca67524ea6a7b1ed366b817f1a5cde0b346152243c_amd64",
"product_id": "openshift-logging/elasticsearch-operator-bundle@sha256:7659606e0418a1920161b7ca67524ea6a7b1ed366b817f1a5cde0b346152243c_amd64",
"product_identification_helper": {
"purl": "pkg:oci/elasticsearch-operator-bundle@sha256:7659606e0418a1920161b7ca67524ea6a7b1ed366b817f1a5cde0b346152243c?arch=amd64\u0026repository_url=registry.redhat.io/openshift-logging/elasticsearch-operator-bundle\u0026tag=v5.4.8-11"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/elasticsearch-proxy-rhel8@sha256:e38c55762c1eef39b401c46d44c899067b1566173e1ce239f17a95c52b30d8c7_amd64",
"product": {
"name": "openshift-logging/elasticsearch-proxy-rhel8@sha256:e38c55762c1eef39b401c46d44c899067b1566173e1ce239f17a95c52b30d8c7_amd64",
"product_id": "openshift-logging/elasticsearch-proxy-rhel8@sha256:e38c55762c1eef39b401c46d44c899067b1566173e1ce239f17a95c52b30d8c7_amd64",
"product_identification_helper": {
"purl": "pkg:oci/elasticsearch-proxy-rhel8@sha256:e38c55762c1eef39b401c46d44c899067b1566173e1ce239f17a95c52b30d8c7?arch=amd64\u0026repository_url=registry.redhat.io/openshift-logging/elasticsearch-proxy-rhel8\u0026tag=v1.0.0-300"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/log-file-metric-exporter-rhel8@sha256:043e4d3481fbfedf3115e18fade3a2f33b891b0d9a641bf973c2c7f492cb0489_amd64",
"product": {
"name": "openshift-logging/log-file-metric-exporter-rhel8@sha256:043e4d3481fbfedf3115e18fade3a2f33b891b0d9a641bf973c2c7f492cb0489_amd64",
"product_id": "openshift-logging/log-file-metric-exporter-rhel8@sha256:043e4d3481fbfedf3115e18fade3a2f33b891b0d9a641bf973c2c7f492cb0489_amd64",
"product_identification_helper": {
"purl": "pkg:oci/log-file-metric-exporter-rhel8@sha256:043e4d3481fbfedf3115e18fade3a2f33b891b0d9a641bf973c2c7f492cb0489?arch=amd64\u0026repository_url=registry.redhat.io/openshift-logging/log-file-metric-exporter-rhel8\u0026tag=v1.1.0-74"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/logging-curator5-rhel8@sha256:94c435f45e9dbd9fa633e137356cfb1d6ac2d4dd7574b359367665da42d6203d_amd64",
"product": {
"name": "openshift-logging/logging-curator5-rhel8@sha256:94c435f45e9dbd9fa633e137356cfb1d6ac2d4dd7574b359367665da42d6203d_amd64",
"product_id": "openshift-logging/logging-curator5-rhel8@sha256:94c435f45e9dbd9fa633e137356cfb1d6ac2d4dd7574b359367665da42d6203d_amd64",
"product_identification_helper": {
"purl": "pkg:oci/logging-curator5-rhel8@sha256:94c435f45e9dbd9fa633e137356cfb1d6ac2d4dd7574b359367665da42d6203d?arch=amd64\u0026repository_url=registry.redhat.io/openshift-logging/logging-curator5-rhel8\u0026tag=v5.8.1-246"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/elasticsearch6-rhel8@sha256:fa8182b69328077500f89becc7621b48efa8d99f34247c2e6855dcfec13980e3_amd64",
"product": {
"name": "openshift-logging/elasticsearch6-rhel8@sha256:fa8182b69328077500f89becc7621b48efa8d99f34247c2e6855dcfec13980e3_amd64",
"product_id": "openshift-logging/elasticsearch6-rhel8@sha256:fa8182b69328077500f89becc7621b48efa8d99f34247c2e6855dcfec13980e3_amd64",
"product_identification_helper": {
"purl": "pkg:oci/elasticsearch6-rhel8@sha256:fa8182b69328077500f89becc7621b48efa8d99f34247c2e6855dcfec13980e3?arch=amd64\u0026repository_url=registry.redhat.io/openshift-logging/elasticsearch6-rhel8\u0026tag=v6.8.1-265"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/eventrouter-rhel8@sha256:d50a2b89442d04b1163c01b3a3951857a95df76c57b14e7f51d835c3ac6d75b3_amd64",
"product": {
"name": "openshift-logging/eventrouter-rhel8@sha256:d50a2b89442d04b1163c01b3a3951857a95df76c57b14e7f51d835c3ac6d75b3_amd64",
"product_id": "openshift-logging/eventrouter-rhel8@sha256:d50a2b89442d04b1163c01b3a3951857a95df76c57b14e7f51d835c3ac6d75b3_amd64",
"product_identification_helper": {
"purl": "pkg:oci/eventrouter-rhel8@sha256:d50a2b89442d04b1163c01b3a3951857a95df76c57b14e7f51d835c3ac6d75b3?arch=amd64\u0026repository_url=registry.redhat.io/openshift-logging/eventrouter-rhel8\u0026tag=v0.4.0-55"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/fluentd-rhel8@sha256:150e17cb645cf2f4cb7ab592572dd3abd145d9a33e790778280e256666248022_amd64",
"product": {
"name": "openshift-logging/fluentd-rhel8@sha256:150e17cb645cf2f4cb7ab592572dd3abd145d9a33e790778280e256666248022_amd64",
"product_id": "openshift-logging/fluentd-rhel8@sha256:150e17cb645cf2f4cb7ab592572dd3abd145d9a33e790778280e256666248022_amd64",
"product_identification_helper": {
"purl": "pkg:oci/fluentd-rhel8@sha256:150e17cb645cf2f4cb7ab592572dd3abd145d9a33e790778280e256666248022?arch=amd64\u0026repository_url=registry.redhat.io/openshift-logging/fluentd-rhel8\u0026tag=v1.14.5-36"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/kibana6-rhel8@sha256:167ee6a645c7397bde3d12e9b9685279505c25ffb3bda11ae68bdf0b34229f2e_amd64",
"product": {
"name": "openshift-logging/kibana6-rhel8@sha256:167ee6a645c7397bde3d12e9b9685279505c25ffb3bda11ae68bdf0b34229f2e_amd64",
"product_id": "openshift-logging/kibana6-rhel8@sha256:167ee6a645c7397bde3d12e9b9685279505c25ffb3bda11ae68bdf0b34229f2e_amd64",
"product_identification_helper": {
"purl": "pkg:oci/kibana6-rhel8@sha256:167ee6a645c7397bde3d12e9b9685279505c25ffb3bda11ae68bdf0b34229f2e?arch=amd64\u0026repository_url=registry.redhat.io/openshift-logging/kibana6-rhel8\u0026tag=v6.8.1-302"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/logging-loki-rhel8@sha256:b444af35118c24bde0dfa2a8825ba427b3345451f6081133477254213a3460f0_amd64",
"product": {
"name": "openshift-logging/logging-loki-rhel8@sha256:b444af35118c24bde0dfa2a8825ba427b3345451f6081133477254213a3460f0_amd64",
"product_id": "openshift-logging/logging-loki-rhel8@sha256:b444af35118c24bde0dfa2a8825ba427b3345451f6081133477254213a3460f0_amd64",
"product_identification_helper": {
"purl": "pkg:oci/logging-loki-rhel8@sha256:b444af35118c24bde0dfa2a8825ba427b3345451f6081133477254213a3460f0?arch=amd64\u0026repository_url=registry.redhat.io/openshift-logging/logging-loki-rhel8\u0026tag=v2.5.0-51"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/vector-rhel8@sha256:cc6b9c6a344aac56c99c96b5120ffe2dad479000b34964ff89d030ae762bda43_amd64",
"product": {
"name": "openshift-logging/vector-rhel8@sha256:cc6b9c6a344aac56c99c96b5120ffe2dad479000b34964ff89d030ae762bda43_amd64",
"product_id": "openshift-logging/vector-rhel8@sha256:cc6b9c6a344aac56c99c96b5120ffe2dad479000b34964ff89d030ae762bda43_amd64",
"product_identification_helper": {
"purl": "pkg:oci/vector-rhel8@sha256:cc6b9c6a344aac56c99c96b5120ffe2dad479000b34964ff89d030ae762bda43?arch=amd64\u0026repository_url=registry.redhat.io/openshift-logging/vector-rhel8\u0026tag=v0.14-67"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/loki-operator-bundle@sha256:02cceda51028eb55a3b82aa5275f03dbaf8f8f9ab3fd27c650d1a07a93044e37_amd64",
"product": {
"name": "openshift-logging/loki-operator-bundle@sha256:02cceda51028eb55a3b82aa5275f03dbaf8f8f9ab3fd27c650d1a07a93044e37_amd64",
"product_id": "openshift-logging/loki-operator-bundle@sha256:02cceda51028eb55a3b82aa5275f03dbaf8f8f9ab3fd27c650d1a07a93044e37_amd64",
"product_identification_helper": {
"purl": "pkg:oci/loki-operator-bundle@sha256:02cceda51028eb55a3b82aa5275f03dbaf8f8f9ab3fd27c650d1a07a93044e37?arch=amd64\u0026repository_url=registry.redhat.io/openshift-logging/loki-operator-bundle\u0026tag=v5.4.8-20"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/loki-rhel8-operator@sha256:f8a35557c9eb27f703ffa9320a9d39a2361d93fdb0b8c874d97da458048e7eec_amd64",
"product": {
"name": "openshift-logging/loki-rhel8-operator@sha256:f8a35557c9eb27f703ffa9320a9d39a2361d93fdb0b8c874d97da458048e7eec_amd64",
"product_id": "openshift-logging/loki-rhel8-operator@sha256:f8a35557c9eb27f703ffa9320a9d39a2361d93fdb0b8c874d97da458048e7eec_amd64",
"product_identification_helper": {
"purl": "pkg:oci/loki-rhel8-operator@sha256:f8a35557c9eb27f703ffa9320a9d39a2361d93fdb0b8c874d97da458048e7eec?arch=amd64\u0026repository_url=registry.redhat.io/openshift-logging/loki-rhel8-operator\u0026tag=v5.4.8-4"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/lokistack-gateway-rhel8@sha256:a967d5be7d3a6fdd75965a5f9a7396a52cdcb37d6a8521c440b0b5c650c230f2_amd64",
"product": {
"name": "openshift-logging/lokistack-gateway-rhel8@sha256:a967d5be7d3a6fdd75965a5f9a7396a52cdcb37d6a8521c440b0b5c650c230f2_amd64",
"product_id": "openshift-logging/lokistack-gateway-rhel8@sha256:a967d5be7d3a6fdd75965a5f9a7396a52cdcb37d6a8521c440b0b5c650c230f2_amd64",
"product_identification_helper": {
"purl": "pkg:oci/lokistack-gateway-rhel8@sha256:a967d5be7d3a6fdd75965a5f9a7396a52cdcb37d6a8521c440b0b5c650c230f2?arch=amd64\u0026repository_url=registry.redhat.io/openshift-logging/lokistack-gateway-rhel8\u0026tag=v5.4.8-5"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/opa-openshift-rhel8@sha256:9fd0c5df785564b35392705a479d6fb9245e3329719438c76c0282f9ef2f2d55_amd64",
"product": {
"name": "openshift-logging/opa-openshift-rhel8@sha256:9fd0c5df785564b35392705a479d6fb9245e3329719438c76c0282f9ef2f2d55_amd64",
"product_id": "openshift-logging/opa-openshift-rhel8@sha256:9fd0c5df785564b35392705a479d6fb9245e3329719438c76c0282f9ef2f2d55_amd64",
"product_identification_helper": {
"purl": "pkg:oci/opa-openshift-rhel8@sha256:9fd0c5df785564b35392705a479d6fb9245e3329719438c76c0282f9ef2f2d55?arch=amd64\u0026repository_url=registry.redhat.io/openshift-logging/opa-openshift-rhel8\u0026tag=v5.4.8-4"
}
}
}
],
"category": "architecture",
"name": "amd64"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/cluster-logging-operator-bundle@sha256:cb26d9e55f781dd535901a90f1ec2f8e02e8e1de72c0fde638c90fcc228ec4b2_amd64 as a component of RHOL 5.4 for RHEL 8",
"product_id": "8Base-RHOL-5.4:openshift-logging/cluster-logging-operator-bundle@sha256:cb26d9e55f781dd535901a90f1ec2f8e02e8e1de72c0fde638c90fcc228ec4b2_amd64"
},
"product_reference": "openshift-logging/cluster-logging-operator-bundle@sha256:cb26d9e55f781dd535901a90f1ec2f8e02e8e1de72c0fde638c90fcc228ec4b2_amd64",
"relates_to_product_reference": "8Base-RHOL-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/cluster-logging-rhel8-operator@sha256:617cc8b0011110981674b75fe1e3041bfa434c952e4a0193818b971edbc7a480_s390x as a component of RHOL 5.4 for RHEL 8",
"product_id": "8Base-RHOL-5.4:openshift-logging/cluster-logging-rhel8-operator@sha256:617cc8b0011110981674b75fe1e3041bfa434c952e4a0193818b971edbc7a480_s390x"
},
"product_reference": "openshift-logging/cluster-logging-rhel8-operator@sha256:617cc8b0011110981674b75fe1e3041bfa434c952e4a0193818b971edbc7a480_s390x",
"relates_to_product_reference": "8Base-RHOL-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/cluster-logging-rhel8-operator@sha256:637df49756fe85e7b38b279ffa7672d72c658d3d47df7f9dada2dd70563af83b_arm64 as a component of RHOL 5.4 for RHEL 8",
"product_id": "8Base-RHOL-5.4:openshift-logging/cluster-logging-rhel8-operator@sha256:637df49756fe85e7b38b279ffa7672d72c658d3d47df7f9dada2dd70563af83b_arm64"
},
"product_reference": "openshift-logging/cluster-logging-rhel8-operator@sha256:637df49756fe85e7b38b279ffa7672d72c658d3d47df7f9dada2dd70563af83b_arm64",
"relates_to_product_reference": "8Base-RHOL-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/cluster-logging-rhel8-operator@sha256:aa1602fe2abe23bd8a4c791bc45d425686a6e6d1aab4face0fac28bfc7cebbe1_ppc64le as a component of RHOL 5.4 for RHEL 8",
"product_id": "8Base-RHOL-5.4:openshift-logging/cluster-logging-rhel8-operator@sha256:aa1602fe2abe23bd8a4c791bc45d425686a6e6d1aab4face0fac28bfc7cebbe1_ppc64le"
},
"product_reference": "openshift-logging/cluster-logging-rhel8-operator@sha256:aa1602fe2abe23bd8a4c791bc45d425686a6e6d1aab4face0fac28bfc7cebbe1_ppc64le",
"relates_to_product_reference": "8Base-RHOL-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/cluster-logging-rhel8-operator@sha256:c698b52c46d41007e5ac4f90b9540d430820bd20a93468fddd3a949c7ef5b332_amd64 as a component of RHOL 5.4 for RHEL 8",
"product_id": "8Base-RHOL-5.4:openshift-logging/cluster-logging-rhel8-operator@sha256:c698b52c46d41007e5ac4f90b9540d430820bd20a93468fddd3a949c7ef5b332_amd64"
},
"product_reference": "openshift-logging/cluster-logging-rhel8-operator@sha256:c698b52c46d41007e5ac4f90b9540d430820bd20a93468fddd3a949c7ef5b332_amd64",
"relates_to_product_reference": "8Base-RHOL-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/elasticsearch-operator-bundle@sha256:7659606e0418a1920161b7ca67524ea6a7b1ed366b817f1a5cde0b346152243c_amd64 as a component of RHOL 5.4 for RHEL 8",
"product_id": "8Base-RHOL-5.4:openshift-logging/elasticsearch-operator-bundle@sha256:7659606e0418a1920161b7ca67524ea6a7b1ed366b817f1a5cde0b346152243c_amd64"
},
"product_reference": "openshift-logging/elasticsearch-operator-bundle@sha256:7659606e0418a1920161b7ca67524ea6a7b1ed366b817f1a5cde0b346152243c_amd64",
"relates_to_product_reference": "8Base-RHOL-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/elasticsearch-proxy-rhel8@sha256:4f4e5bb267ad391bc0fc6a010ec9ecdf3bf48d5b6e9db0d2510960c13c97bd71_ppc64le as a component of RHOL 5.4 for RHEL 8",
"product_id": "8Base-RHOL-5.4:openshift-logging/elasticsearch-proxy-rhel8@sha256:4f4e5bb267ad391bc0fc6a010ec9ecdf3bf48d5b6e9db0d2510960c13c97bd71_ppc64le"
},
"product_reference": "openshift-logging/elasticsearch-proxy-rhel8@sha256:4f4e5bb267ad391bc0fc6a010ec9ecdf3bf48d5b6e9db0d2510960c13c97bd71_ppc64le",
"relates_to_product_reference": "8Base-RHOL-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/elasticsearch-proxy-rhel8@sha256:b9c2e58b39dc3de97013f8806178f6327bf2e4590fe55db144527d64d468f64f_s390x as a component of RHOL 5.4 for RHEL 8",
"product_id": "8Base-RHOL-5.4:openshift-logging/elasticsearch-proxy-rhel8@sha256:b9c2e58b39dc3de97013f8806178f6327bf2e4590fe55db144527d64d468f64f_s390x"
},
"product_reference": "openshift-logging/elasticsearch-proxy-rhel8@sha256:b9c2e58b39dc3de97013f8806178f6327bf2e4590fe55db144527d64d468f64f_s390x",
"relates_to_product_reference": "8Base-RHOL-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/elasticsearch-proxy-rhel8@sha256:c9a2b9e7cca14d9596ccbe0f64e2abe4452f91f029f42eefead43c9f526f6a58_arm64 as a component of RHOL 5.4 for RHEL 8",
"product_id": "8Base-RHOL-5.4:openshift-logging/elasticsearch-proxy-rhel8@sha256:c9a2b9e7cca14d9596ccbe0f64e2abe4452f91f029f42eefead43c9f526f6a58_arm64"
},
"product_reference": "openshift-logging/elasticsearch-proxy-rhel8@sha256:c9a2b9e7cca14d9596ccbe0f64e2abe4452f91f029f42eefead43c9f526f6a58_arm64",
"relates_to_product_reference": "8Base-RHOL-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/elasticsearch-proxy-rhel8@sha256:e38c55762c1eef39b401c46d44c899067b1566173e1ce239f17a95c52b30d8c7_amd64 as a component of RHOL 5.4 for RHEL 8",
"product_id": "8Base-RHOL-5.4:openshift-logging/elasticsearch-proxy-rhel8@sha256:e38c55762c1eef39b401c46d44c899067b1566173e1ce239f17a95c52b30d8c7_amd64"
},
"product_reference": "openshift-logging/elasticsearch-proxy-rhel8@sha256:e38c55762c1eef39b401c46d44c899067b1566173e1ce239f17a95c52b30d8c7_amd64",
"relates_to_product_reference": "8Base-RHOL-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/elasticsearch-rhel8-operator@sha256:2005f41e59a130bb86c2ec47d1b060e3e2ed32f9a4cef3897e2c05fc94043dbb_arm64 as a component of RHOL 5.4 for RHEL 8",
"product_id": "8Base-RHOL-5.4:openshift-logging/elasticsearch-rhel8-operator@sha256:2005f41e59a130bb86c2ec47d1b060e3e2ed32f9a4cef3897e2c05fc94043dbb_arm64"
},
"product_reference": "openshift-logging/elasticsearch-rhel8-operator@sha256:2005f41e59a130bb86c2ec47d1b060e3e2ed32f9a4cef3897e2c05fc94043dbb_arm64",
"relates_to_product_reference": "8Base-RHOL-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/elasticsearch-rhel8-operator@sha256:6a55934cf7af0c03e06d4ec7a15a80acf53491fb7a183c16fdf8018fbf9b4174_ppc64le as a component of RHOL 5.4 for RHEL 8",
"product_id": "8Base-RHOL-5.4:openshift-logging/elasticsearch-rhel8-operator@sha256:6a55934cf7af0c03e06d4ec7a15a80acf53491fb7a183c16fdf8018fbf9b4174_ppc64le"
},
"product_reference": "openshift-logging/elasticsearch-rhel8-operator@sha256:6a55934cf7af0c03e06d4ec7a15a80acf53491fb7a183c16fdf8018fbf9b4174_ppc64le",
"relates_to_product_reference": "8Base-RHOL-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/elasticsearch-rhel8-operator@sha256:8ce04536772f31ad022b9c66cddc090d2962b44d66c06a1db56d1447be198326_amd64 as a component of RHOL 5.4 for RHEL 8",
"product_id": "8Base-RHOL-5.4:openshift-logging/elasticsearch-rhel8-operator@sha256:8ce04536772f31ad022b9c66cddc090d2962b44d66c06a1db56d1447be198326_amd64"
},
"product_reference": "openshift-logging/elasticsearch-rhel8-operator@sha256:8ce04536772f31ad022b9c66cddc090d2962b44d66c06a1db56d1447be198326_amd64",
"relates_to_product_reference": "8Base-RHOL-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/elasticsearch-rhel8-operator@sha256:dd211d42eaad043d9bdb519e3ad6a86255b7280a2cdf47dd3fe0458a77cb110f_s390x as a component of RHOL 5.4 for RHEL 8",
"product_id": "8Base-RHOL-5.4:openshift-logging/elasticsearch-rhel8-operator@sha256:dd211d42eaad043d9bdb519e3ad6a86255b7280a2cdf47dd3fe0458a77cb110f_s390x"
},
"product_reference": "openshift-logging/elasticsearch-rhel8-operator@sha256:dd211d42eaad043d9bdb519e3ad6a86255b7280a2cdf47dd3fe0458a77cb110f_s390x",
"relates_to_product_reference": "8Base-RHOL-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/elasticsearch6-rhel8@sha256:17a9f3ae042b92693a374e3d60a07f2ab2e52419f8df25d446dd0654f6a858f6_ppc64le as a component of RHOL 5.4 for RHEL 8",
"product_id": "8Base-RHOL-5.4:openshift-logging/elasticsearch6-rhel8@sha256:17a9f3ae042b92693a374e3d60a07f2ab2e52419f8df25d446dd0654f6a858f6_ppc64le"
},
"product_reference": "openshift-logging/elasticsearch6-rhel8@sha256:17a9f3ae042b92693a374e3d60a07f2ab2e52419f8df25d446dd0654f6a858f6_ppc64le",
"relates_to_product_reference": "8Base-RHOL-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/elasticsearch6-rhel8@sha256:5b1cfc2f9a96601439cf17d1fe49a6bc6cad3b7273af87b23528090aefbfd915_s390x as a component of RHOL 5.4 for RHEL 8",
"product_id": "8Base-RHOL-5.4:openshift-logging/elasticsearch6-rhel8@sha256:5b1cfc2f9a96601439cf17d1fe49a6bc6cad3b7273af87b23528090aefbfd915_s390x"
},
"product_reference": "openshift-logging/elasticsearch6-rhel8@sha256:5b1cfc2f9a96601439cf17d1fe49a6bc6cad3b7273af87b23528090aefbfd915_s390x",
"relates_to_product_reference": "8Base-RHOL-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/elasticsearch6-rhel8@sha256:8e0ba10f91db4cb8786d0501ec33a3d54f7c7c5337e0495cc2286a6ea20cca20_arm64 as a component of RHOL 5.4 for RHEL 8",
"product_id": "8Base-RHOL-5.4:openshift-logging/elasticsearch6-rhel8@sha256:8e0ba10f91db4cb8786d0501ec33a3d54f7c7c5337e0495cc2286a6ea20cca20_arm64"
},
"product_reference": "openshift-logging/elasticsearch6-rhel8@sha256:8e0ba10f91db4cb8786d0501ec33a3d54f7c7c5337e0495cc2286a6ea20cca20_arm64",
"relates_to_product_reference": "8Base-RHOL-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/elasticsearch6-rhel8@sha256:fa8182b69328077500f89becc7621b48efa8d99f34247c2e6855dcfec13980e3_amd64 as a component of RHOL 5.4 for RHEL 8",
"product_id": "8Base-RHOL-5.4:openshift-logging/elasticsearch6-rhel8@sha256:fa8182b69328077500f89becc7621b48efa8d99f34247c2e6855dcfec13980e3_amd64"
},
"product_reference": "openshift-logging/elasticsearch6-rhel8@sha256:fa8182b69328077500f89becc7621b48efa8d99f34247c2e6855dcfec13980e3_amd64",
"relates_to_product_reference": "8Base-RHOL-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/eventrouter-rhel8@sha256:4438a3bba34418a9dc566bf15f6b4764de4295ab8b05a7b1a86f9e8cd332b3f7_arm64 as a component of RHOL 5.4 for RHEL 8",
"product_id": "8Base-RHOL-5.4:openshift-logging/eventrouter-rhel8@sha256:4438a3bba34418a9dc566bf15f6b4764de4295ab8b05a7b1a86f9e8cd332b3f7_arm64"
},
"product_reference": "openshift-logging/eventrouter-rhel8@sha256:4438a3bba34418a9dc566bf15f6b4764de4295ab8b05a7b1a86f9e8cd332b3f7_arm64",
"relates_to_product_reference": "8Base-RHOL-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/eventrouter-rhel8@sha256:bc408fc4b0482c5eb1b0deb3a9090f3e3dd9b370001d54cd076254562c72fec9_ppc64le as a component of RHOL 5.4 for RHEL 8",
"product_id": "8Base-RHOL-5.4:openshift-logging/eventrouter-rhel8@sha256:bc408fc4b0482c5eb1b0deb3a9090f3e3dd9b370001d54cd076254562c72fec9_ppc64le"
},
"product_reference": "openshift-logging/eventrouter-rhel8@sha256:bc408fc4b0482c5eb1b0deb3a9090f3e3dd9b370001d54cd076254562c72fec9_ppc64le",
"relates_to_product_reference": "8Base-RHOL-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/eventrouter-rhel8@sha256:d50a2b89442d04b1163c01b3a3951857a95df76c57b14e7f51d835c3ac6d75b3_amd64 as a component of RHOL 5.4 for RHEL 8",
"product_id": "8Base-RHOL-5.4:openshift-logging/eventrouter-rhel8@sha256:d50a2b89442d04b1163c01b3a3951857a95df76c57b14e7f51d835c3ac6d75b3_amd64"
},
"product_reference": "openshift-logging/eventrouter-rhel8@sha256:d50a2b89442d04b1163c01b3a3951857a95df76c57b14e7f51d835c3ac6d75b3_amd64",
"relates_to_product_reference": "8Base-RHOL-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/eventrouter-rhel8@sha256:f05aee8433dec1c9f6cf835038f9e5a47847d4095383bf3c22ca57c3fb69fa98_s390x as a component of RHOL 5.4 for RHEL 8",
"product_id": "8Base-RHOL-5.4:openshift-logging/eventrouter-rhel8@sha256:f05aee8433dec1c9f6cf835038f9e5a47847d4095383bf3c22ca57c3fb69fa98_s390x"
},
"product_reference": "openshift-logging/eventrouter-rhel8@sha256:f05aee8433dec1c9f6cf835038f9e5a47847d4095383bf3c22ca57c3fb69fa98_s390x",
"relates_to_product_reference": "8Base-RHOL-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/fluentd-rhel8@sha256:150e17cb645cf2f4cb7ab592572dd3abd145d9a33e790778280e256666248022_amd64 as a component of RHOL 5.4 for RHEL 8",
"product_id": "8Base-RHOL-5.4:openshift-logging/fluentd-rhel8@sha256:150e17cb645cf2f4cb7ab592572dd3abd145d9a33e790778280e256666248022_amd64"
},
"product_reference": "openshift-logging/fluentd-rhel8@sha256:150e17cb645cf2f4cb7ab592572dd3abd145d9a33e790778280e256666248022_amd64",
"relates_to_product_reference": "8Base-RHOL-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/fluentd-rhel8@sha256:36aecf05ca3cdaf29982b3efa4a1c97087be29b0a58c9777e6b0c11a34861aa8_s390x as a component of RHOL 5.4 for RHEL 8",
"product_id": "8Base-RHOL-5.4:openshift-logging/fluentd-rhel8@sha256:36aecf05ca3cdaf29982b3efa4a1c97087be29b0a58c9777e6b0c11a34861aa8_s390x"
},
"product_reference": "openshift-logging/fluentd-rhel8@sha256:36aecf05ca3cdaf29982b3efa4a1c97087be29b0a58c9777e6b0c11a34861aa8_s390x",
"relates_to_product_reference": "8Base-RHOL-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/fluentd-rhel8@sha256:e3a51d2bdc632b8376e28c33e9d4fac3464e3a84a313a17246b1f1cf21cb5710_arm64 as a component of RHOL 5.4 for RHEL 8",
"product_id": "8Base-RHOL-5.4:openshift-logging/fluentd-rhel8@sha256:e3a51d2bdc632b8376e28c33e9d4fac3464e3a84a313a17246b1f1cf21cb5710_arm64"
},
"product_reference": "openshift-logging/fluentd-rhel8@sha256:e3a51d2bdc632b8376e28c33e9d4fac3464e3a84a313a17246b1f1cf21cb5710_arm64",
"relates_to_product_reference": "8Base-RHOL-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/fluentd-rhel8@sha256:ea07da04f06df6bf0d9dd981a3795dfdb51eca83f59a6291114650e3e98a9e71_ppc64le as a component of RHOL 5.4 for RHEL 8",
"product_id": "8Base-RHOL-5.4:openshift-logging/fluentd-rhel8@sha256:ea07da04f06df6bf0d9dd981a3795dfdb51eca83f59a6291114650e3e98a9e71_ppc64le"
},
"product_reference": "openshift-logging/fluentd-rhel8@sha256:ea07da04f06df6bf0d9dd981a3795dfdb51eca83f59a6291114650e3e98a9e71_ppc64le",
"relates_to_product_reference": "8Base-RHOL-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/kibana6-rhel8@sha256:167ee6a645c7397bde3d12e9b9685279505c25ffb3bda11ae68bdf0b34229f2e_amd64 as a component of RHOL 5.4 for RHEL 8",
"product_id": "8Base-RHOL-5.4:openshift-logging/kibana6-rhel8@sha256:167ee6a645c7397bde3d12e9b9685279505c25ffb3bda11ae68bdf0b34229f2e_amd64"
},
"product_reference": "openshift-logging/kibana6-rhel8@sha256:167ee6a645c7397bde3d12e9b9685279505c25ffb3bda11ae68bdf0b34229f2e_amd64",
"relates_to_product_reference": "8Base-RHOL-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/kibana6-rhel8@sha256:4a029733337b10bb9fb8d98c91abc5451ca0b98713c8f2271a675251e025b6c0_s390x as a component of RHOL 5.4 for RHEL 8",
"product_id": "8Base-RHOL-5.4:openshift-logging/kibana6-rhel8@sha256:4a029733337b10bb9fb8d98c91abc5451ca0b98713c8f2271a675251e025b6c0_s390x"
},
"product_reference": "openshift-logging/kibana6-rhel8@sha256:4a029733337b10bb9fb8d98c91abc5451ca0b98713c8f2271a675251e025b6c0_s390x",
"relates_to_product_reference": "8Base-RHOL-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/kibana6-rhel8@sha256:812f4380024dc3df42310ad14d173d390f2bdf4b3dbdb02550c00552534f79ce_ppc64le as a component of RHOL 5.4 for RHEL 8",
"product_id": "8Base-RHOL-5.4:openshift-logging/kibana6-rhel8@sha256:812f4380024dc3df42310ad14d173d390f2bdf4b3dbdb02550c00552534f79ce_ppc64le"
},
"product_reference": "openshift-logging/kibana6-rhel8@sha256:812f4380024dc3df42310ad14d173d390f2bdf4b3dbdb02550c00552534f79ce_ppc64le",
"relates_to_product_reference": "8Base-RHOL-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/kibana6-rhel8@sha256:958ba6856cc76fc77d34a9c78888eb37b9c39b83a2f044ef2337610560ba9323_arm64 as a component of RHOL 5.4 for RHEL 8",
"product_id": "8Base-RHOL-5.4:openshift-logging/kibana6-rhel8@sha256:958ba6856cc76fc77d34a9c78888eb37b9c39b83a2f044ef2337610560ba9323_arm64"
},
"product_reference": "openshift-logging/kibana6-rhel8@sha256:958ba6856cc76fc77d34a9c78888eb37b9c39b83a2f044ef2337610560ba9323_arm64",
"relates_to_product_reference": "8Base-RHOL-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/log-file-metric-exporter-rhel8@sha256:043e4d3481fbfedf3115e18fade3a2f33b891b0d9a641bf973c2c7f492cb0489_amd64 as a component of RHOL 5.4 for RHEL 8",
"product_id": "8Base-RHOL-5.4:openshift-logging/log-file-metric-exporter-rhel8@sha256:043e4d3481fbfedf3115e18fade3a2f33b891b0d9a641bf973c2c7f492cb0489_amd64"
},
"product_reference": "openshift-logging/log-file-metric-exporter-rhel8@sha256:043e4d3481fbfedf3115e18fade3a2f33b891b0d9a641bf973c2c7f492cb0489_amd64",
"relates_to_product_reference": "8Base-RHOL-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/log-file-metric-exporter-rhel8@sha256:4fe26adac10cf20b83812e4fa513231d7e1fd4b6cd4e09d4fd425c391885cfcc_ppc64le as a component of RHOL 5.4 for RHEL 8",
"product_id": "8Base-RHOL-5.4:openshift-logging/log-file-metric-exporter-rhel8@sha256:4fe26adac10cf20b83812e4fa513231d7e1fd4b6cd4e09d4fd425c391885cfcc_ppc64le"
},
"product_reference": "openshift-logging/log-file-metric-exporter-rhel8@sha256:4fe26adac10cf20b83812e4fa513231d7e1fd4b6cd4e09d4fd425c391885cfcc_ppc64le",
"relates_to_product_reference": "8Base-RHOL-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/log-file-metric-exporter-rhel8@sha256:85827db708c0927027435b05732cc7e34b0675eaa86665c91efacc76aecd6227_s390x as a component of RHOL 5.4 for RHEL 8",
"product_id": "8Base-RHOL-5.4:openshift-logging/log-file-metric-exporter-rhel8@sha256:85827db708c0927027435b05732cc7e34b0675eaa86665c91efacc76aecd6227_s390x"
},
"product_reference": "openshift-logging/log-file-metric-exporter-rhel8@sha256:85827db708c0927027435b05732cc7e34b0675eaa86665c91efacc76aecd6227_s390x",
"relates_to_product_reference": "8Base-RHOL-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/log-file-metric-exporter-rhel8@sha256:a5285db276a5545fdbaa9f0743a49ba72ce1c5da61b5cccc9422320a03e08bea_arm64 as a component of RHOL 5.4 for RHEL 8",
"product_id": "8Base-RHOL-5.4:openshift-logging/log-file-metric-exporter-rhel8@sha256:a5285db276a5545fdbaa9f0743a49ba72ce1c5da61b5cccc9422320a03e08bea_arm64"
},
"product_reference": "openshift-logging/log-file-metric-exporter-rhel8@sha256:a5285db276a5545fdbaa9f0743a49ba72ce1c5da61b5cccc9422320a03e08bea_arm64",
"relates_to_product_reference": "8Base-RHOL-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/logging-curator5-rhel8@sha256:0b28415b8115ff3216002faa5c9ecf3c46995085e3364c8028cb544cb4787ed2_arm64 as a component of RHOL 5.4 for RHEL 8",
"product_id": "8Base-RHOL-5.4:openshift-logging/logging-curator5-rhel8@sha256:0b28415b8115ff3216002faa5c9ecf3c46995085e3364c8028cb544cb4787ed2_arm64"
},
"product_reference": "openshift-logging/logging-curator5-rhel8@sha256:0b28415b8115ff3216002faa5c9ecf3c46995085e3364c8028cb544cb4787ed2_arm64",
"relates_to_product_reference": "8Base-RHOL-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/logging-curator5-rhel8@sha256:7016e867ddfe970d6d2d54d5615e8f613786bcfbfe52ebf3139c07da3d5a53db_s390x as a component of RHOL 5.4 for RHEL 8",
"product_id": "8Base-RHOL-5.4:openshift-logging/logging-curator5-rhel8@sha256:7016e867ddfe970d6d2d54d5615e8f613786bcfbfe52ebf3139c07da3d5a53db_s390x"
},
"product_reference": "openshift-logging/logging-curator5-rhel8@sha256:7016e867ddfe970d6d2d54d5615e8f613786bcfbfe52ebf3139c07da3d5a53db_s390x",
"relates_to_product_reference": "8Base-RHOL-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/logging-curator5-rhel8@sha256:94c435f45e9dbd9fa633e137356cfb1d6ac2d4dd7574b359367665da42d6203d_amd64 as a component of RHOL 5.4 for RHEL 8",
"product_id": "8Base-RHOL-5.4:openshift-logging/logging-curator5-rhel8@sha256:94c435f45e9dbd9fa633e137356cfb1d6ac2d4dd7574b359367665da42d6203d_amd64"
},
"product_reference": "openshift-logging/logging-curator5-rhel8@sha256:94c435f45e9dbd9fa633e137356cfb1d6ac2d4dd7574b359367665da42d6203d_amd64",
"relates_to_product_reference": "8Base-RHOL-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/logging-curator5-rhel8@sha256:d24afbc9228ef7f3d0a6fd716a3a57abde88a1f65d149c7df4f959a775b670bd_ppc64le as a component of RHOL 5.4 for RHEL 8",
"product_id": "8Base-RHOL-5.4:openshift-logging/logging-curator5-rhel8@sha256:d24afbc9228ef7f3d0a6fd716a3a57abde88a1f65d149c7df4f959a775b670bd_ppc64le"
},
"product_reference": "openshift-logging/logging-curator5-rhel8@sha256:d24afbc9228ef7f3d0a6fd716a3a57abde88a1f65d149c7df4f959a775b670bd_ppc64le",
"relates_to_product_reference": "8Base-RHOL-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/logging-loki-rhel8@sha256:40d4989b4733f54a01a73831fa00b12e49fff69c75138902eac0d894d432e4d9_arm64 as a component of RHOL 5.4 for RHEL 8",
"product_id": "8Base-RHOL-5.4:openshift-logging/logging-loki-rhel8@sha256:40d4989b4733f54a01a73831fa00b12e49fff69c75138902eac0d894d432e4d9_arm64"
},
"product_reference": "openshift-logging/logging-loki-rhel8@sha256:40d4989b4733f54a01a73831fa00b12e49fff69c75138902eac0d894d432e4d9_arm64",
"relates_to_product_reference": "8Base-RHOL-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/logging-loki-rhel8@sha256:b444af35118c24bde0dfa2a8825ba427b3345451f6081133477254213a3460f0_amd64 as a component of RHOL 5.4 for RHEL 8",
"product_id": "8Base-RHOL-5.4:openshift-logging/logging-loki-rhel8@sha256:b444af35118c24bde0dfa2a8825ba427b3345451f6081133477254213a3460f0_amd64"
},
"product_reference": "openshift-logging/logging-loki-rhel8@sha256:b444af35118c24bde0dfa2a8825ba427b3345451f6081133477254213a3460f0_amd64",
"relates_to_product_reference": "8Base-RHOL-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/logging-loki-rhel8@sha256:cfe410d498940a95da631ea213866a96a119034d78d5d53f7f9c7e8da56e0f45_s390x as a component of RHOL 5.4 for RHEL 8",
"product_id": "8Base-RHOL-5.4:openshift-logging/logging-loki-rhel8@sha256:cfe410d498940a95da631ea213866a96a119034d78d5d53f7f9c7e8da56e0f45_s390x"
},
"product_reference": "openshift-logging/logging-loki-rhel8@sha256:cfe410d498940a95da631ea213866a96a119034d78d5d53f7f9c7e8da56e0f45_s390x",
"relates_to_product_reference": "8Base-RHOL-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/logging-loki-rhel8@sha256:f7979c82140a0ab1a97c9f3151465bfbd9f79c4db9b0cc20f974cd7b890f074f_ppc64le as a component of RHOL 5.4 for RHEL 8",
"product_id": "8Base-RHOL-5.4:openshift-logging/logging-loki-rhel8@sha256:f7979c82140a0ab1a97c9f3151465bfbd9f79c4db9b0cc20f974cd7b890f074f_ppc64le"
},
"product_reference": "openshift-logging/logging-loki-rhel8@sha256:f7979c82140a0ab1a97c9f3151465bfbd9f79c4db9b0cc20f974cd7b890f074f_ppc64le",
"relates_to_product_reference": "8Base-RHOL-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/loki-operator-bundle@sha256:02cceda51028eb55a3b82aa5275f03dbaf8f8f9ab3fd27c650d1a07a93044e37_amd64 as a component of RHOL 5.4 for RHEL 8",
"product_id": "8Base-RHOL-5.4:openshift-logging/loki-operator-bundle@sha256:02cceda51028eb55a3b82aa5275f03dbaf8f8f9ab3fd27c650d1a07a93044e37_amd64"
},
"product_reference": "openshift-logging/loki-operator-bundle@sha256:02cceda51028eb55a3b82aa5275f03dbaf8f8f9ab3fd27c650d1a07a93044e37_amd64",
"relates_to_product_reference": "8Base-RHOL-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/loki-rhel8-operator@sha256:0f1be625b4012820f7ac439fed000808d7acb4e885ace16014461bf802be935a_s390x as a component of RHOL 5.4 for RHEL 8",
"product_id": "8Base-RHOL-5.4:openshift-logging/loki-rhel8-operator@sha256:0f1be625b4012820f7ac439fed000808d7acb4e885ace16014461bf802be935a_s390x"
},
"product_reference": "openshift-logging/loki-rhel8-operator@sha256:0f1be625b4012820f7ac439fed000808d7acb4e885ace16014461bf802be935a_s390x",
"relates_to_product_reference": "8Base-RHOL-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/loki-rhel8-operator@sha256:28f45a80846c5e11638fb479be42cafcb2bdb3af94dff3629a820de295cbe31d_ppc64le as a component of RHOL 5.4 for RHEL 8",
"product_id": "8Base-RHOL-5.4:openshift-logging/loki-rhel8-operator@sha256:28f45a80846c5e11638fb479be42cafcb2bdb3af94dff3629a820de295cbe31d_ppc64le"
},
"product_reference": "openshift-logging/loki-rhel8-operator@sha256:28f45a80846c5e11638fb479be42cafcb2bdb3af94dff3629a820de295cbe31d_ppc64le",
"relates_to_product_reference": "8Base-RHOL-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/loki-rhel8-operator@sha256:df7de1e9f5a4396df6f14b1c4b6bb2a9ae4bc50d82cbc954ec535c26e8df2cb1_arm64 as a component of RHOL 5.4 for RHEL 8",
"product_id": "8Base-RHOL-5.4:openshift-logging/loki-rhel8-operator@sha256:df7de1e9f5a4396df6f14b1c4b6bb2a9ae4bc50d82cbc954ec535c26e8df2cb1_arm64"
},
"product_reference": "openshift-logging/loki-rhel8-operator@sha256:df7de1e9f5a4396df6f14b1c4b6bb2a9ae4bc50d82cbc954ec535c26e8df2cb1_arm64",
"relates_to_product_reference": "8Base-RHOL-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/loki-rhel8-operator@sha256:f8a35557c9eb27f703ffa9320a9d39a2361d93fdb0b8c874d97da458048e7eec_amd64 as a component of RHOL 5.4 for RHEL 8",
"product_id": "8Base-RHOL-5.4:openshift-logging/loki-rhel8-operator@sha256:f8a35557c9eb27f703ffa9320a9d39a2361d93fdb0b8c874d97da458048e7eec_amd64"
},
"product_reference": "openshift-logging/loki-rhel8-operator@sha256:f8a35557c9eb27f703ffa9320a9d39a2361d93fdb0b8c874d97da458048e7eec_amd64",
"relates_to_product_reference": "8Base-RHOL-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/lokistack-gateway-rhel8@sha256:178fcf44e6a1fa90d27a40565f69ae2880622b017bc8d9e33a441353eb45609d_arm64 as a component of RHOL 5.4 for RHEL 8",
"product_id": "8Base-RHOL-5.4:openshift-logging/lokistack-gateway-rhel8@sha256:178fcf44e6a1fa90d27a40565f69ae2880622b017bc8d9e33a441353eb45609d_arm64"
},
"product_reference": "openshift-logging/lokistack-gateway-rhel8@sha256:178fcf44e6a1fa90d27a40565f69ae2880622b017bc8d9e33a441353eb45609d_arm64",
"relates_to_product_reference": "8Base-RHOL-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/lokistack-gateway-rhel8@sha256:7b0c2c99cf0f710166b749dbfd7f544caf5fe35516c743fca251c7cec896e1d6_ppc64le as a component of RHOL 5.4 for RHEL 8",
"product_id": "8Base-RHOL-5.4:openshift-logging/lokistack-gateway-rhel8@sha256:7b0c2c99cf0f710166b749dbfd7f544caf5fe35516c743fca251c7cec896e1d6_ppc64le"
},
"product_reference": "openshift-logging/lokistack-gateway-rhel8@sha256:7b0c2c99cf0f710166b749dbfd7f544caf5fe35516c743fca251c7cec896e1d6_ppc64le",
"relates_to_product_reference": "8Base-RHOL-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/lokistack-gateway-rhel8@sha256:9c4959525339b607a98889d56f4c26f2e4af25032466c439903a7f1cb593f721_s390x as a component of RHOL 5.4 for RHEL 8",
"product_id": "8Base-RHOL-5.4:openshift-logging/lokistack-gateway-rhel8@sha256:9c4959525339b607a98889d56f4c26f2e4af25032466c439903a7f1cb593f721_s390x"
},
"product_reference": "openshift-logging/lokistack-gateway-rhel8@sha256:9c4959525339b607a98889d56f4c26f2e4af25032466c439903a7f1cb593f721_s390x",
"relates_to_product_reference": "8Base-RHOL-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/lokistack-gateway-rhel8@sha256:a967d5be7d3a6fdd75965a5f9a7396a52cdcb37d6a8521c440b0b5c650c230f2_amd64 as a component of RHOL 5.4 for RHEL 8",
"product_id": "8Base-RHOL-5.4:openshift-logging/lokistack-gateway-rhel8@sha256:a967d5be7d3a6fdd75965a5f9a7396a52cdcb37d6a8521c440b0b5c650c230f2_amd64"
},
"product_reference": "openshift-logging/lokistack-gateway-rhel8@sha256:a967d5be7d3a6fdd75965a5f9a7396a52cdcb37d6a8521c440b0b5c650c230f2_amd64",
"relates_to_product_reference": "8Base-RHOL-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/opa-openshift-rhel8@sha256:1b106af51bb50f1ce4db13ebbf6f6c67eae45611c0d5dc46476f1dfaa8aca166_arm64 as a component of RHOL 5.4 for RHEL 8",
"product_id": "8Base-RHOL-5.4:openshift-logging/opa-openshift-rhel8@sha256:1b106af51bb50f1ce4db13ebbf6f6c67eae45611c0d5dc46476f1dfaa8aca166_arm64"
},
"product_reference": "openshift-logging/opa-openshift-rhel8@sha256:1b106af51bb50f1ce4db13ebbf6f6c67eae45611c0d5dc46476f1dfaa8aca166_arm64",
"relates_to_product_reference": "8Base-RHOL-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/opa-openshift-rhel8@sha256:92ddf24824c8f8ae93dec07184c446615b635389472d3a525df72da07c8d9b97_ppc64le as a component of RHOL 5.4 for RHEL 8",
"product_id": "8Base-RHOL-5.4:openshift-logging/opa-openshift-rhel8@sha256:92ddf24824c8f8ae93dec07184c446615b635389472d3a525df72da07c8d9b97_ppc64le"
},
"product_reference": "openshift-logging/opa-openshift-rhel8@sha256:92ddf24824c8f8ae93dec07184c446615b635389472d3a525df72da07c8d9b97_ppc64le",
"relates_to_product_reference": "8Base-RHOL-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/opa-openshift-rhel8@sha256:9fd0c5df785564b35392705a479d6fb9245e3329719438c76c0282f9ef2f2d55_amd64 as a component of RHOL 5.4 for RHEL 8",
"product_id": "8Base-RHOL-5.4:openshift-logging/opa-openshift-rhel8@sha256:9fd0c5df785564b35392705a479d6fb9245e3329719438c76c0282f9ef2f2d55_amd64"
},
"product_reference": "openshift-logging/opa-openshift-rhel8@sha256:9fd0c5df785564b35392705a479d6fb9245e3329719438c76c0282f9ef2f2d55_amd64",
"relates_to_product_reference": "8Base-RHOL-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/opa-openshift-rhel8@sha256:be8ba0e4c5f24c7b4549700a25c89b10d4b2fc0b0e3888163bb53827914e95c1_s390x as a component of RHOL 5.4 for RHEL 8",
"product_id": "8Base-RHOL-5.4:openshift-logging/opa-openshift-rhel8@sha256:be8ba0e4c5f24c7b4549700a25c89b10d4b2fc0b0e3888163bb53827914e95c1_s390x"
},
"product_reference": "openshift-logging/opa-openshift-rhel8@sha256:be8ba0e4c5f24c7b4549700a25c89b10d4b2fc0b0e3888163bb53827914e95c1_s390x",
"relates_to_product_reference": "8Base-RHOL-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/vector-rhel8@sha256:48bb136d11b44428c87489978873370848ac2b219b107ef7e81ab679db095234_s390x as a component of RHOL 5.4 for RHEL 8",
"product_id": "8Base-RHOL-5.4:openshift-logging/vector-rhel8@sha256:48bb136d11b44428c87489978873370848ac2b219b107ef7e81ab679db095234_s390x"
},
"product_reference": "openshift-logging/vector-rhel8@sha256:48bb136d11b44428c87489978873370848ac2b219b107ef7e81ab679db095234_s390x",
"relates_to_product_reference": "8Base-RHOL-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/vector-rhel8@sha256:48f0317d167710ff5b0787c73f6b7dd0249e7c8d2d001159132a97299c30b62d_ppc64le as a component of RHOL 5.4 for RHEL 8",
"product_id": "8Base-RHOL-5.4:openshift-logging/vector-rhel8@sha256:48f0317d167710ff5b0787c73f6b7dd0249e7c8d2d001159132a97299c30b62d_ppc64le"
},
"product_reference": "openshift-logging/vector-rhel8@sha256:48f0317d167710ff5b0787c73f6b7dd0249e7c8d2d001159132a97299c30b62d_ppc64le",
"relates_to_product_reference": "8Base-RHOL-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/vector-rhel8@sha256:bde21c03fb831d01e85b28245881f7e3f2bb2ef6d2671eb92b2e0cc4bd3898e2_arm64 as a component of RHOL 5.4 for RHEL 8",
"product_id": "8Base-RHOL-5.4:openshift-logging/vector-rhel8@sha256:bde21c03fb831d01e85b28245881f7e3f2bb2ef6d2671eb92b2e0cc4bd3898e2_arm64"
},
"product_reference": "openshift-logging/vector-rhel8@sha256:bde21c03fb831d01e85b28245881f7e3f2bb2ef6d2671eb92b2e0cc4bd3898e2_arm64",
"relates_to_product_reference": "8Base-RHOL-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/vector-rhel8@sha256:cc6b9c6a344aac56c99c96b5120ffe2dad479000b34964ff89d030ae762bda43_amd64 as a component of RHOL 5.4 for RHEL 8",
"product_id": "8Base-RHOL-5.4:openshift-logging/vector-rhel8@sha256:cc6b9c6a344aac56c99c96b5120ffe2dad479000b34964ff89d030ae762bda43_amd64"
},
"product_reference": "openshift-logging/vector-rhel8@sha256:cc6b9c6a344aac56c99c96b5120ffe2dad479000b34964ff89d030ae762bda43_amd64",
"relates_to_product_reference": "8Base-RHOL-5.4"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2020-36518",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"discovery_date": "2022-03-16T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-RHOL-5.4:openshift-logging/cluster-logging-operator-bundle@sha256:cb26d9e55f781dd535901a90f1ec2f8e02e8e1de72c0fde638c90fcc228ec4b2_amd64",
"8Base-RHOL-5.4:openshift-logging/cluster-logging-rhel8-operator@sha256:617cc8b0011110981674b75fe1e3041bfa434c952e4a0193818b971edbc7a480_s390x",
"8Base-RHOL-5.4:openshift-logging/cluster-logging-rhel8-operator@sha256:637df49756fe85e7b38b279ffa7672d72c658d3d47df7f9dada2dd70563af83b_arm64",
"8Base-RHOL-5.4:openshift-logging/cluster-logging-rhel8-operator@sha256:aa1602fe2abe23bd8a4c791bc45d425686a6e6d1aab4face0fac28bfc7cebbe1_ppc64le",
"8Base-RHOL-5.4:openshift-logging/cluster-logging-rhel8-operator@sha256:c698b52c46d41007e5ac4f90b9540d430820bd20a93468fddd3a949c7ef5b332_amd64",
"8Base-RHOL-5.4:openshift-logging/elasticsearch-operator-bundle@sha256:7659606e0418a1920161b7ca67524ea6a7b1ed366b817f1a5cde0b346152243c_amd64",
"8Base-RHOL-5.4:openshift-logging/elasticsearch-proxy-rhel8@sha256:4f4e5bb267ad391bc0fc6a010ec9ecdf3bf48d5b6e9db0d2510960c13c97bd71_ppc64le",
"8Base-RHOL-5.4:openshift-logging/elasticsearch-proxy-rhel8@sha256:b9c2e58b39dc3de97013f8806178f6327bf2e4590fe55db144527d64d468f64f_s390x",
"8Base-RHOL-5.4:openshift-logging/elasticsearch-proxy-rhel8@sha256:c9a2b9e7cca14d9596ccbe0f64e2abe4452f91f029f42eefead43c9f526f6a58_arm64",
"8Base-RHOL-5.4:openshift-logging/elasticsearch-proxy-rhel8@sha256:e38c55762c1eef39b401c46d44c899067b1566173e1ce239f17a95c52b30d8c7_amd64",
"8Base-RHOL-5.4:openshift-logging/elasticsearch-rhel8-operator@sha256:2005f41e59a130bb86c2ec47d1b060e3e2ed32f9a4cef3897e2c05fc94043dbb_arm64",
"8Base-RHOL-5.4:openshift-logging/elasticsearch-rhel8-operator@sha256:6a55934cf7af0c03e06d4ec7a15a80acf53491fb7a183c16fdf8018fbf9b4174_ppc64le",
"8Base-RHOL-5.4:openshift-logging/elasticsearch-rhel8-operator@sha256:8ce04536772f31ad022b9c66cddc090d2962b44d66c06a1db56d1447be198326_amd64",
"8Base-RHOL-5.4:openshift-logging/elasticsearch-rhel8-operator@sha256:dd211d42eaad043d9bdb519e3ad6a86255b7280a2cdf47dd3fe0458a77cb110f_s390x",
"8Base-RHOL-5.4:openshift-logging/eventrouter-rhel8@sha256:4438a3bba34418a9dc566bf15f6b4764de4295ab8b05a7b1a86f9e8cd332b3f7_arm64",
"8Base-RHOL-5.4:openshift-logging/eventrouter-rhel8@sha256:bc408fc4b0482c5eb1b0deb3a9090f3e3dd9b370001d54cd076254562c72fec9_ppc64le",
"8Base-RHOL-5.4:openshift-logging/eventrouter-rhel8@sha256:d50a2b89442d04b1163c01b3a3951857a95df76c57b14e7f51d835c3ac6d75b3_amd64",
"8Base-RHOL-5.4:openshift-logging/eventrouter-rhel8@sha256:f05aee8433dec1c9f6cf835038f9e5a47847d4095383bf3c22ca57c3fb69fa98_s390x",
"8Base-RHOL-5.4:openshift-logging/fluentd-rhel8@sha256:150e17cb645cf2f4cb7ab592572dd3abd145d9a33e790778280e256666248022_amd64",
"8Base-RHOL-5.4:openshift-logging/fluentd-rhel8@sha256:36aecf05ca3cdaf29982b3efa4a1c97087be29b0a58c9777e6b0c11a34861aa8_s390x",
"8Base-RHOL-5.4:openshift-logging/fluentd-rhel8@sha256:e3a51d2bdc632b8376e28c33e9d4fac3464e3a84a313a17246b1f1cf21cb5710_arm64",
"8Base-RHOL-5.4:openshift-logging/fluentd-rhel8@sha256:ea07da04f06df6bf0d9dd981a3795dfdb51eca83f59a6291114650e3e98a9e71_ppc64le",
"8Base-RHOL-5.4:openshift-logging/kibana6-rhel8@sha256:167ee6a645c7397bde3d12e9b9685279505c25ffb3bda11ae68bdf0b34229f2e_amd64",
"8Base-RHOL-5.4:openshift-logging/kibana6-rhel8@sha256:4a029733337b10bb9fb8d98c91abc5451ca0b98713c8f2271a675251e025b6c0_s390x",
"8Base-RHOL-5.4:openshift-logging/kibana6-rhel8@sha256:812f4380024dc3df42310ad14d173d390f2bdf4b3dbdb02550c00552534f79ce_ppc64le",
"8Base-RHOL-5.4:openshift-logging/kibana6-rhel8@sha256:958ba6856cc76fc77d34a9c78888eb37b9c39b83a2f044ef2337610560ba9323_arm64",
"8Base-RHOL-5.4:openshift-logging/log-file-metric-exporter-rhel8@sha256:043e4d3481fbfedf3115e18fade3a2f33b891b0d9a641bf973c2c7f492cb0489_amd64",
"8Base-RHOL-5.4:openshift-logging/log-file-metric-exporter-rhel8@sha256:4fe26adac10cf20b83812e4fa513231d7e1fd4b6cd4e09d4fd425c391885cfcc_ppc64le",
"8Base-RHOL-5.4:openshift-logging/log-file-metric-exporter-rhel8@sha256:85827db708c0927027435b05732cc7e34b0675eaa86665c91efacc76aecd6227_s390x",
"8Base-RHOL-5.4:openshift-logging/log-file-metric-exporter-rhel8@sha256:a5285db276a5545fdbaa9f0743a49ba72ce1c5da61b5cccc9422320a03e08bea_arm64",
"8Base-RHOL-5.4:openshift-logging/logging-curator5-rhel8@sha256:0b28415b8115ff3216002faa5c9ecf3c46995085e3364c8028cb544cb4787ed2_arm64",
"8Base-RHOL-5.4:openshift-logging/logging-curator5-rhel8@sha256:7016e867ddfe970d6d2d54d5615e8f613786bcfbfe52ebf3139c07da3d5a53db_s390x",
"8Base-RHOL-5.4:openshift-logging/logging-curator5-rhel8@sha256:94c435f45e9dbd9fa633e137356cfb1d6ac2d4dd7574b359367665da42d6203d_amd64",
"8Base-RHOL-5.4:openshift-logging/logging-curator5-rhel8@sha256:d24afbc9228ef7f3d0a6fd716a3a57abde88a1f65d149c7df4f959a775b670bd_ppc64le",
"8Base-RHOL-5.4:openshift-logging/logging-loki-rhel8@sha256:40d4989b4733f54a01a73831fa00b12e49fff69c75138902eac0d894d432e4d9_arm64",
"8Base-RHOL-5.4:openshift-logging/logging-loki-rhel8@sha256:b444af35118c24bde0dfa2a8825ba427b3345451f6081133477254213a3460f0_amd64",
"8Base-RHOL-5.4:openshift-logging/logging-loki-rhel8@sha256:cfe410d498940a95da631ea213866a96a119034d78d5d53f7f9c7e8da56e0f45_s390x",
"8Base-RHOL-5.4:openshift-logging/logging-loki-rhel8@sha256:f7979c82140a0ab1a97c9f3151465bfbd9f79c4db9b0cc20f974cd7b890f074f_ppc64le",
"8Base-RHOL-5.4:openshift-logging/loki-operator-bundle@sha256:02cceda51028eb55a3b82aa5275f03dbaf8f8f9ab3fd27c650d1a07a93044e37_amd64",
"8Base-RHOL-5.4:openshift-logging/loki-rhel8-operator@sha256:0f1be625b4012820f7ac439fed000808d7acb4e885ace16014461bf802be935a_s390x",
"8Base-RHOL-5.4:openshift-logging/loki-rhel8-operator@sha256:28f45a80846c5e11638fb479be42cafcb2bdb3af94dff3629a820de295cbe31d_ppc64le",
"8Base-RHOL-5.4:openshift-logging/loki-rhel8-operator@sha256:df7de1e9f5a4396df6f14b1c4b6bb2a9ae4bc50d82cbc954ec535c26e8df2cb1_arm64",
"8Base-RHOL-5.4:openshift-logging/loki-rhel8-operator@sha256:f8a35557c9eb27f703ffa9320a9d39a2361d93fdb0b8c874d97da458048e7eec_amd64",
"8Base-RHOL-5.4:openshift-logging/lokistack-gateway-rhel8@sha256:178fcf44e6a1fa90d27a40565f69ae2880622b017bc8d9e33a441353eb45609d_arm64",
"8Base-RHOL-5.4:openshift-logging/lokistack-gateway-rhel8@sha256:7b0c2c99cf0f710166b749dbfd7f544caf5fe35516c743fca251c7cec896e1d6_ppc64le",
"8Base-RHOL-5.4:openshift-logging/lokistack-gateway-rhel8@sha256:9c4959525339b607a98889d56f4c26f2e4af25032466c439903a7f1cb593f721_s390x",
"8Base-RHOL-5.4:openshift-logging/lokistack-gateway-rhel8@sha256:a967d5be7d3a6fdd75965a5f9a7396a52cdcb37d6a8521c440b0b5c650c230f2_amd64",
"8Base-RHOL-5.4:openshift-logging/opa-openshift-rhel8@sha256:1b106af51bb50f1ce4db13ebbf6f6c67eae45611c0d5dc46476f1dfaa8aca166_arm64",
"8Base-RHOL-5.4:openshift-logging/opa-openshift-rhel8@sha256:92ddf24824c8f8ae93dec07184c446615b635389472d3a525df72da07c8d9b97_ppc64le",
"8Base-RHOL-5.4:openshift-logging/opa-openshift-rhel8@sha256:9fd0c5df785564b35392705a479d6fb9245e3329719438c76c0282f9ef2f2d55_amd64",
"8Base-RHOL-5.4:openshift-logging/opa-openshift-rhel8@sha256:be8ba0e4c5f24c7b4549700a25c89b10d4b2fc0b0e3888163bb53827914e95c1_s390x",
"8Base-RHOL-5.4:openshift-logging/vector-rhel8@sha256:48bb136d11b44428c87489978873370848ac2b219b107ef7e81ab679db095234_s390x",
"8Base-RHOL-5.4:openshift-logging/vector-rhel8@sha256:48f0317d167710ff5b0787c73f6b7dd0249e7c8d2d001159132a97299c30b62d_ppc64le",
"8Base-RHOL-5.4:openshift-logging/vector-rhel8@sha256:bde21c03fb831d01e85b28245881f7e3f2bb2ef6d2671eb92b2e0cc4bd3898e2_arm64",
"8Base-RHOL-5.4:openshift-logging/vector-rhel8@sha256:cc6b9c6a344aac56c99c96b5120ffe2dad479000b34964ff89d030ae762bda43_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2064698"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Jackson Databind package. This cause of the issue is due to a Java StackOverflow exception and a denial of service via a significant depth of nested objects.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "jackson-databind: denial of service via a large depth of nested objects",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "CodeReady Studio is no longer supported and therefore this flaw will not be addressed in CodeReady Studio.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-RHOL-5.4:openshift-logging/elasticsearch6-rhel8@sha256:17a9f3ae042b92693a374e3d60a07f2ab2e52419f8df25d446dd0654f6a858f6_ppc64le",
"8Base-RHOL-5.4:openshift-logging/elasticsearch6-rhel8@sha256:5b1cfc2f9a96601439cf17d1fe49a6bc6cad3b7273af87b23528090aefbfd915_s390x",
"8Base-RHOL-5.4:openshift-logging/elasticsearch6-rhel8@sha256:8e0ba10f91db4cb8786d0501ec33a3d54f7c7c5337e0495cc2286a6ea20cca20_arm64",
"8Base-RHOL-5.4:openshift-logging/elasticsearch6-rhel8@sha256:fa8182b69328077500f89becc7621b48efa8d99f34247c2e6855dcfec13980e3_amd64"
],
"known_not_affected": [
"8Base-RHOL-5.4:openshift-logging/cluster-logging-operator-bundle@sha256:cb26d9e55f781dd535901a90f1ec2f8e02e8e1de72c0fde638c90fcc228ec4b2_amd64",
"8Base-RHOL-5.4:openshift-logging/cluster-logging-rhel8-operator@sha256:617cc8b0011110981674b75fe1e3041bfa434c952e4a0193818b971edbc7a480_s390x",
"8Base-RHOL-5.4:openshift-logging/cluster-logging-rhel8-operator@sha256:637df49756fe85e7b38b279ffa7672d72c658d3d47df7f9dada2dd70563af83b_arm64",
"8Base-RHOL-5.4:openshift-logging/cluster-logging-rhel8-operator@sha256:aa1602fe2abe23bd8a4c791bc45d425686a6e6d1aab4face0fac28bfc7cebbe1_ppc64le",
"8Base-RHOL-5.4:openshift-logging/cluster-logging-rhel8-operator@sha256:c698b52c46d41007e5ac4f90b9540d430820bd20a93468fddd3a949c7ef5b332_amd64",
"8Base-RHOL-5.4:openshift-logging/elasticsearch-operator-bundle@sha256:7659606e0418a1920161b7ca67524ea6a7b1ed366b817f1a5cde0b346152243c_amd64",
"8Base-RHOL-5.4:openshift-logging/elasticsearch-proxy-rhel8@sha256:4f4e5bb267ad391bc0fc6a010ec9ecdf3bf48d5b6e9db0d2510960c13c97bd71_ppc64le",
"8Base-RHOL-5.4:openshift-logging/elasticsearch-proxy-rhel8@sha256:b9c2e58b39dc3de97013f8806178f6327bf2e4590fe55db144527d64d468f64f_s390x",
"8Base-RHOL-5.4:openshift-logging/elasticsearch-proxy-rhel8@sha256:c9a2b9e7cca14d9596ccbe0f64e2abe4452f91f029f42eefead43c9f526f6a58_arm64",
"8Base-RHOL-5.4:openshift-logging/elasticsearch-proxy-rhel8@sha256:e38c55762c1eef39b401c46d44c899067b1566173e1ce239f17a95c52b30d8c7_amd64",
"8Base-RHOL-5.4:openshift-logging/elasticsearch-rhel8-operator@sha256:2005f41e59a130bb86c2ec47d1b060e3e2ed32f9a4cef3897e2c05fc94043dbb_arm64",
"8Base-RHOL-5.4:openshift-logging/elasticsearch-rhel8-operator@sha256:6a55934cf7af0c03e06d4ec7a15a80acf53491fb7a183c16fdf8018fbf9b4174_ppc64le",
"8Base-RHOL-5.4:openshift-logging/elasticsearch-rhel8-operator@sha256:8ce04536772f31ad022b9c66cddc090d2962b44d66c06a1db56d1447be198326_amd64",
"8Base-RHOL-5.4:openshift-logging/elasticsearch-rhel8-operator@sha256:dd211d42eaad043d9bdb519e3ad6a86255b7280a2cdf47dd3fe0458a77cb110f_s390x",
"8Base-RHOL-5.4:openshift-logging/eventrouter-rhel8@sha256:4438a3bba34418a9dc566bf15f6b4764de4295ab8b05a7b1a86f9e8cd332b3f7_arm64",
"8Base-RHOL-5.4:openshift-logging/eventrouter-rhel8@sha256:bc408fc4b0482c5eb1b0deb3a9090f3e3dd9b370001d54cd076254562c72fec9_ppc64le",
"8Base-RHOL-5.4:openshift-logging/eventrouter-rhel8@sha256:d50a2b89442d04b1163c01b3a3951857a95df76c57b14e7f51d835c3ac6d75b3_amd64",
"8Base-RHOL-5.4:openshift-logging/eventrouter-rhel8@sha256:f05aee8433dec1c9f6cf835038f9e5a47847d4095383bf3c22ca57c3fb69fa98_s390x",
"8Base-RHOL-5.4:openshift-logging/fluentd-rhel8@sha256:150e17cb645cf2f4cb7ab592572dd3abd145d9a33e790778280e256666248022_amd64",
"8Base-RHOL-5.4:openshift-logging/fluentd-rhel8@sha256:36aecf05ca3cdaf29982b3efa4a1c97087be29b0a58c9777e6b0c11a34861aa8_s390x",
"8Base-RHOL-5.4:openshift-logging/fluentd-rhel8@sha256:e3a51d2bdc632b8376e28c33e9d4fac3464e3a84a313a17246b1f1cf21cb5710_arm64",
"8Base-RHOL-5.4:openshift-logging/fluentd-rhel8@sha256:ea07da04f06df6bf0d9dd981a3795dfdb51eca83f59a6291114650e3e98a9e71_ppc64le",
"8Base-RHOL-5.4:openshift-logging/kibana6-rhel8@sha256:167ee6a645c7397bde3d12e9b9685279505c25ffb3bda11ae68bdf0b34229f2e_amd64",
"8Base-RHOL-5.4:openshift-logging/kibana6-rhel8@sha256:4a029733337b10bb9fb8d98c91abc5451ca0b98713c8f2271a675251e025b6c0_s390x",
"8Base-RHOL-5.4:openshift-logging/kibana6-rhel8@sha256:812f4380024dc3df42310ad14d173d390f2bdf4b3dbdb02550c00552534f79ce_ppc64le",
"8Base-RHOL-5.4:openshift-logging/kibana6-rhel8@sha256:958ba6856cc76fc77d34a9c78888eb37b9c39b83a2f044ef2337610560ba9323_arm64",
"8Base-RHOL-5.4:openshift-logging/log-file-metric-exporter-rhel8@sha256:043e4d3481fbfedf3115e18fade3a2f33b891b0d9a641bf973c2c7f492cb0489_amd64",
"8Base-RHOL-5.4:openshift-logging/log-file-metric-exporter-rhel8@sha256:4fe26adac10cf20b83812e4fa513231d7e1fd4b6cd4e09d4fd425c391885cfcc_ppc64le",
"8Base-RHOL-5.4:openshift-logging/log-file-metric-exporter-rhel8@sha256:85827db708c0927027435b05732cc7e34b0675eaa86665c91efacc76aecd6227_s390x",
"8Base-RHOL-5.4:openshift-logging/log-file-metric-exporter-rhel8@sha256:a5285db276a5545fdbaa9f0743a49ba72ce1c5da61b5cccc9422320a03e08bea_arm64",
"8Base-RHOL-5.4:openshift-logging/logging-curator5-rhel8@sha256:0b28415b8115ff3216002faa5c9ecf3c46995085e3364c8028cb544cb4787ed2_arm64",
"8Base-RHOL-5.4:openshift-logging/logging-curator5-rhel8@sha256:7016e867ddfe970d6d2d54d5615e8f613786bcfbfe52ebf3139c07da3d5a53db_s390x",
"8Base-RHOL-5.4:openshift-logging/logging-curator5-rhel8@sha256:94c435f45e9dbd9fa633e137356cfb1d6ac2d4dd7574b359367665da42d6203d_amd64",
"8Base-RHOL-5.4:openshift-logging/logging-curator5-rhel8@sha256:d24afbc9228ef7f3d0a6fd716a3a57abde88a1f65d149c7df4f959a775b670bd_ppc64le",
"8Base-RHOL-5.4:openshift-logging/logging-loki-rhel8@sha256:40d4989b4733f54a01a73831fa00b12e49fff69c75138902eac0d894d432e4d9_arm64",
"8Base-RHOL-5.4:openshift-logging/logging-loki-rhel8@sha256:b444af35118c24bde0dfa2a8825ba427b3345451f6081133477254213a3460f0_amd64",
"8Base-RHOL-5.4:openshift-logging/logging-loki-rhel8@sha256:cfe410d498940a95da631ea213866a96a119034d78d5d53f7f9c7e8da56e0f45_s390x",
"8Base-RHOL-5.4:openshift-logging/logging-loki-rhel8@sha256:f7979c82140a0ab1a97c9f3151465bfbd9f79c4db9b0cc20f974cd7b890f074f_ppc64le",
"8Base-RHOL-5.4:openshift-logging/loki-operator-bundle@sha256:02cceda51028eb55a3b82aa5275f03dbaf8f8f9ab3fd27c650d1a07a93044e37_amd64",
"8Base-RHOL-5.4:openshift-logging/loki-rhel8-operator@sha256:0f1be625b4012820f7ac439fed000808d7acb4e885ace16014461bf802be935a_s390x",
"8Base-RHOL-5.4:openshift-logging/loki-rhel8-operator@sha256:28f45a80846c5e11638fb479be42cafcb2bdb3af94dff3629a820de295cbe31d_ppc64le",
"8Base-RHOL-5.4:openshift-logging/loki-rhel8-operator@sha256:df7de1e9f5a4396df6f14b1c4b6bb2a9ae4bc50d82cbc954ec535c26e8df2cb1_arm64",
"8Base-RHOL-5.4:openshift-logging/loki-rhel8-operator@sha256:f8a35557c9eb27f703ffa9320a9d39a2361d93fdb0b8c874d97da458048e7eec_amd64",
"8Base-RHOL-5.4:openshift-logging/lokistack-gateway-rhel8@sha256:178fcf44e6a1fa90d27a40565f69ae2880622b017bc8d9e33a441353eb45609d_arm64",
"8Base-RHOL-5.4:openshift-logging/lokistack-gateway-rhel8@sha256:7b0c2c99cf0f710166b749dbfd7f544caf5fe35516c743fca251c7cec896e1d6_ppc64le",
"8Base-RHOL-5.4:openshift-logging/lokistack-gateway-rhel8@sha256:9c4959525339b607a98889d56f4c26f2e4af25032466c439903a7f1cb593f721_s390x",
"8Base-RHOL-5.4:openshift-logging/lokistack-gateway-rhel8@sha256:a967d5be7d3a6fdd75965a5f9a7396a52cdcb37d6a8521c440b0b5c650c230f2_amd64",
"8Base-RHOL-5.4:openshift-logging/opa-openshift-rhel8@sha256:1b106af51bb50f1ce4db13ebbf6f6c67eae45611c0d5dc46476f1dfaa8aca166_arm64",
"8Base-RHOL-5.4:openshift-logging/opa-openshift-rhel8@sha256:92ddf24824c8f8ae93dec07184c446615b635389472d3a525df72da07c8d9b97_ppc64le",
"8Base-RHOL-5.4:openshift-logging/opa-openshift-rhel8@sha256:9fd0c5df785564b35392705a479d6fb9245e3329719438c76c0282f9ef2f2d55_amd64",
"8Base-RHOL-5.4:openshift-logging/opa-openshift-rhel8@sha256:be8ba0e4c5f24c7b4549700a25c89b10d4b2fc0b0e3888163bb53827914e95c1_s390x",
"8Base-RHOL-5.4:openshift-logging/vector-rhel8@sha256:48bb136d11b44428c87489978873370848ac2b219b107ef7e81ab679db095234_s390x",
"8Base-RHOL-5.4:openshift-logging/vector-rhel8@sha256:48f0317d167710ff5b0787c73f6b7dd0249e7c8d2d001159132a97299c30b62d_ppc64le",
"8Base-RHOL-5.4:openshift-logging/vector-rhel8@sha256:bde21c03fb831d01e85b28245881f7e3f2bb2ef6d2671eb92b2e0cc4bd3898e2_arm64",
"8Base-RHOL-5.4:openshift-logging/vector-rhel8@sha256:cc6b9c6a344aac56c99c96b5120ffe2dad479000b34964ff89d030ae762bda43_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-36518"
},
{
"category": "external",
"summary": "RHBZ#2064698",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2064698"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-36518",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-36518"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-36518",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-36518"
},
{
"category": "external",
"summary": "https://github.com/advisories/GHSA-57j2-w4cx-62h2",
"url": "https://github.com/advisories/GHSA-57j2-w4cx-62h2"
}
],
"release_date": "2020-08-13T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-11-16T12:13:01+00:00",
"details": "For OpenShift Container Platform 4.10 see the following documentation, which will be updated shortly, for detailed release notes:\n\nhttps://docs.openshift.com/container-platform/4.10/logging/cluster-logging-release-notes.html\n\nFor Red Hat OpenShift Logging 5.4, see the following instructions to apply this update:\n\nhttps://docs.openshift.com/container-platform/4.10/logging/cluster-logging-upgrading.html",
"product_ids": [
"8Base-RHOL-5.4:openshift-logging/elasticsearch6-rhel8@sha256:17a9f3ae042b92693a374e3d60a07f2ab2e52419f8df25d446dd0654f6a858f6_ppc64le",
"8Base-RHOL-5.4:openshift-logging/elasticsearch6-rhel8@sha256:5b1cfc2f9a96601439cf17d1fe49a6bc6cad3b7273af87b23528090aefbfd915_s390x",
"8Base-RHOL-5.4:openshift-logging/elasticsearch6-rhel8@sha256:8e0ba10f91db4cb8786d0501ec33a3d54f7c7c5337e0495cc2286a6ea20cca20_arm64",
"8Base-RHOL-5.4:openshift-logging/elasticsearch6-rhel8@sha256:fa8182b69328077500f89becc7621b48efa8d99f34247c2e6855dcfec13980e3_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:7435"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"8Base-RHOL-5.4:openshift-logging/cluster-logging-operator-bundle@sha256:cb26d9e55f781dd535901a90f1ec2f8e02e8e1de72c0fde638c90fcc228ec4b2_amd64",
"8Base-RHOL-5.4:openshift-logging/cluster-logging-rhel8-operator@sha256:617cc8b0011110981674b75fe1e3041bfa434c952e4a0193818b971edbc7a480_s390x",
"8Base-RHOL-5.4:openshift-logging/cluster-logging-rhel8-operator@sha256:637df49756fe85e7b38b279ffa7672d72c658d3d47df7f9dada2dd70563af83b_arm64",
"8Base-RHOL-5.4:openshift-logging/cluster-logging-rhel8-operator@sha256:aa1602fe2abe23bd8a4c791bc45d425686a6e6d1aab4face0fac28bfc7cebbe1_ppc64le",
"8Base-RHOL-5.4:openshift-logging/cluster-logging-rhel8-operator@sha256:c698b52c46d41007e5ac4f90b9540d430820bd20a93468fddd3a949c7ef5b332_amd64",
"8Base-RHOL-5.4:openshift-logging/elasticsearch-operator-bundle@sha256:7659606e0418a1920161b7ca67524ea6a7b1ed366b817f1a5cde0b346152243c_amd64",
"8Base-RHOL-5.4:openshift-logging/elasticsearch-proxy-rhel8@sha256:4f4e5bb267ad391bc0fc6a010ec9ecdf3bf48d5b6e9db0d2510960c13c97bd71_ppc64le",
"8Base-RHOL-5.4:openshift-logging/elasticsearch-proxy-rhel8@sha256:b9c2e58b39dc3de97013f8806178f6327bf2e4590fe55db144527d64d468f64f_s390x",
"8Base-RHOL-5.4:openshift-logging/elasticsearch-proxy-rhel8@sha256:c9a2b9e7cca14d9596ccbe0f64e2abe4452f91f029f42eefead43c9f526f6a58_arm64",
"8Base-RHOL-5.4:openshift-logging/elasticsearch-proxy-rhel8@sha256:e38c55762c1eef39b401c46d44c899067b1566173e1ce239f17a95c52b30d8c7_amd64",
"8Base-RHOL-5.4:openshift-logging/elasticsearch-rhel8-operator@sha256:2005f41e59a130bb86c2ec47d1b060e3e2ed32f9a4cef3897e2c05fc94043dbb_arm64",
"8Base-RHOL-5.4:openshift-logging/elasticsearch-rhel8-operator@sha256:6a55934cf7af0c03e06d4ec7a15a80acf53491fb7a183c16fdf8018fbf9b4174_ppc64le",
"8Base-RHOL-5.4:openshift-logging/elasticsearch-rhel8-operator@sha256:8ce04536772f31ad022b9c66cddc090d2962b44d66c06a1db56d1447be198326_amd64",
"8Base-RHOL-5.4:openshift-logging/elasticsearch-rhel8-operator@sha256:dd211d42eaad043d9bdb519e3ad6a86255b7280a2cdf47dd3fe0458a77cb110f_s390x",
"8Base-RHOL-5.4:openshift-logging/elasticsearch6-rhel8@sha256:17a9f3ae042b92693a374e3d60a07f2ab2e52419f8df25d446dd0654f6a858f6_ppc64le",
"8Base-RHOL-5.4:openshift-logging/elasticsearch6-rhel8@sha256:5b1cfc2f9a96601439cf17d1fe49a6bc6cad3b7273af87b23528090aefbfd915_s390x",
"8Base-RHOL-5.4:openshift-logging/elasticsearch6-rhel8@sha256:8e0ba10f91db4cb8786d0501ec33a3d54f7c7c5337e0495cc2286a6ea20cca20_arm64",
"8Base-RHOL-5.4:openshift-logging/elasticsearch6-rhel8@sha256:fa8182b69328077500f89becc7621b48efa8d99f34247c2e6855dcfec13980e3_amd64",
"8Base-RHOL-5.4:openshift-logging/eventrouter-rhel8@sha256:4438a3bba34418a9dc566bf15f6b4764de4295ab8b05a7b1a86f9e8cd332b3f7_arm64",
"8Base-RHOL-5.4:openshift-logging/eventrouter-rhel8@sha256:bc408fc4b0482c5eb1b0deb3a9090f3e3dd9b370001d54cd076254562c72fec9_ppc64le",
"8Base-RHOL-5.4:openshift-logging/eventrouter-rhel8@sha256:d50a2b89442d04b1163c01b3a3951857a95df76c57b14e7f51d835c3ac6d75b3_amd64",
"8Base-RHOL-5.4:openshift-logging/eventrouter-rhel8@sha256:f05aee8433dec1c9f6cf835038f9e5a47847d4095383bf3c22ca57c3fb69fa98_s390x",
"8Base-RHOL-5.4:openshift-logging/fluentd-rhel8@sha256:150e17cb645cf2f4cb7ab592572dd3abd145d9a33e790778280e256666248022_amd64",
"8Base-RHOL-5.4:openshift-logging/fluentd-rhel8@sha256:36aecf05ca3cdaf29982b3efa4a1c97087be29b0a58c9777e6b0c11a34861aa8_s390x",
"8Base-RHOL-5.4:openshift-logging/fluentd-rhel8@sha256:e3a51d2bdc632b8376e28c33e9d4fac3464e3a84a313a17246b1f1cf21cb5710_arm64",
"8Base-RHOL-5.4:openshift-logging/fluentd-rhel8@sha256:ea07da04f06df6bf0d9dd981a3795dfdb51eca83f59a6291114650e3e98a9e71_ppc64le",
"8Base-RHOL-5.4:openshift-logging/kibana6-rhel8@sha256:167ee6a645c7397bde3d12e9b9685279505c25ffb3bda11ae68bdf0b34229f2e_amd64",
"8Base-RHOL-5.4:openshift-logging/kibana6-rhel8@sha256:4a029733337b10bb9fb8d98c91abc5451ca0b98713c8f2271a675251e025b6c0_s390x",
"8Base-RHOL-5.4:openshift-logging/kibana6-rhel8@sha256:812f4380024dc3df42310ad14d173d390f2bdf4b3dbdb02550c00552534f79ce_ppc64le",
"8Base-RHOL-5.4:openshift-logging/kibana6-rhel8@sha256:958ba6856cc76fc77d34a9c78888eb37b9c39b83a2f044ef2337610560ba9323_arm64",
"8Base-RHOL-5.4:openshift-logging/log-file-metric-exporter-rhel8@sha256:043e4d3481fbfedf3115e18fade3a2f33b891b0d9a641bf973c2c7f492cb0489_amd64",
"8Base-RHOL-5.4:openshift-logging/log-file-metric-exporter-rhel8@sha256:4fe26adac10cf20b83812e4fa513231d7e1fd4b6cd4e09d4fd425c391885cfcc_ppc64le",
"8Base-RHOL-5.4:openshift-logging/log-file-metric-exporter-rhel8@sha256:85827db708c0927027435b05732cc7e34b0675eaa86665c91efacc76aecd6227_s390x",
"8Base-RHOL-5.4:openshift-logging/log-file-metric-exporter-rhel8@sha256:a5285db276a5545fdbaa9f0743a49ba72ce1c5da61b5cccc9422320a03e08bea_arm64",
"8Base-RHOL-5.4:openshift-logging/logging-curator5-rhel8@sha256:0b28415b8115ff3216002faa5c9ecf3c46995085e3364c8028cb544cb4787ed2_arm64",
"8Base-RHOL-5.4:openshift-logging/logging-curator5-rhel8@sha256:7016e867ddfe970d6d2d54d5615e8f613786bcfbfe52ebf3139c07da3d5a53db_s390x",
"8Base-RHOL-5.4:openshift-logging/logging-curator5-rhel8@sha256:94c435f45e9dbd9fa633e137356cfb1d6ac2d4dd7574b359367665da42d6203d_amd64",
"8Base-RHOL-5.4:openshift-logging/logging-curator5-rhel8@sha256:d24afbc9228ef7f3d0a6fd716a3a57abde88a1f65d149c7df4f959a775b670bd_ppc64le",
"8Base-RHOL-5.4:openshift-logging/logging-loki-rhel8@sha256:40d4989b4733f54a01a73831fa00b12e49fff69c75138902eac0d894d432e4d9_arm64",
"8Base-RHOL-5.4:openshift-logging/logging-loki-rhel8@sha256:b444af35118c24bde0dfa2a8825ba427b3345451f6081133477254213a3460f0_amd64",
"8Base-RHOL-5.4:openshift-logging/logging-loki-rhel8@sha256:cfe410d498940a95da631ea213866a96a119034d78d5d53f7f9c7e8da56e0f45_s390x",
"8Base-RHOL-5.4:openshift-logging/logging-loki-rhel8@sha256:f7979c82140a0ab1a97c9f3151465bfbd9f79c4db9b0cc20f974cd7b890f074f_ppc64le",
"8Base-RHOL-5.4:openshift-logging/loki-operator-bundle@sha256:02cceda51028eb55a3b82aa5275f03dbaf8f8f9ab3fd27c650d1a07a93044e37_amd64",
"8Base-RHOL-5.4:openshift-logging/loki-rhel8-operator@sha256:0f1be625b4012820f7ac439fed000808d7acb4e885ace16014461bf802be935a_s390x",
"8Base-RHOL-5.4:openshift-logging/loki-rhel8-operator@sha256:28f45a80846c5e11638fb479be42cafcb2bdb3af94dff3629a820de295cbe31d_ppc64le",
"8Base-RHOL-5.4:openshift-logging/loki-rhel8-operator@sha256:df7de1e9f5a4396df6f14b1c4b6bb2a9ae4bc50d82cbc954ec535c26e8df2cb1_arm64",
"8Base-RHOL-5.4:openshift-logging/loki-rhel8-operator@sha256:f8a35557c9eb27f703ffa9320a9d39a2361d93fdb0b8c874d97da458048e7eec_amd64",
"8Base-RHOL-5.4:openshift-logging/lokistack-gateway-rhel8@sha256:178fcf44e6a1fa90d27a40565f69ae2880622b017bc8d9e33a441353eb45609d_arm64",
"8Base-RHOL-5.4:openshift-logging/lokistack-gateway-rhel8@sha256:7b0c2c99cf0f710166b749dbfd7f544caf5fe35516c743fca251c7cec896e1d6_ppc64le",
"8Base-RHOL-5.4:openshift-logging/lokistack-gateway-rhel8@sha256:9c4959525339b607a98889d56f4c26f2e4af25032466c439903a7f1cb593f721_s390x",
"8Base-RHOL-5.4:openshift-logging/lokistack-gateway-rhel8@sha256:a967d5be7d3a6fdd75965a5f9a7396a52cdcb37d6a8521c440b0b5c650c230f2_amd64",
"8Base-RHOL-5.4:openshift-logging/opa-openshift-rhel8@sha256:1b106af51bb50f1ce4db13ebbf6f6c67eae45611c0d5dc46476f1dfaa8aca166_arm64",
"8Base-RHOL-5.4:openshift-logging/opa-openshift-rhel8@sha256:92ddf24824c8f8ae93dec07184c446615b635389472d3a525df72da07c8d9b97_ppc64le",
"8Base-RHOL-5.4:openshift-logging/opa-openshift-rhel8@sha256:9fd0c5df785564b35392705a479d6fb9245e3329719438c76c0282f9ef2f2d55_amd64",
"8Base-RHOL-5.4:openshift-logging/opa-openshift-rhel8@sha256:be8ba0e4c5f24c7b4549700a25c89b10d4b2fc0b0e3888163bb53827914e95c1_s390x",
"8Base-RHOL-5.4:openshift-logging/vector-rhel8@sha256:48bb136d11b44428c87489978873370848ac2b219b107ef7e81ab679db095234_s390x",
"8Base-RHOL-5.4:openshift-logging/vector-rhel8@sha256:48f0317d167710ff5b0787c73f6b7dd0249e7c8d2d001159132a97299c30b62d_ppc64le",
"8Base-RHOL-5.4:openshift-logging/vector-rhel8@sha256:bde21c03fb831d01e85b28245881f7e3f2bb2ef6d2671eb92b2e0cc4bd3898e2_arm64",
"8Base-RHOL-5.4:openshift-logging/vector-rhel8@sha256:cc6b9c6a344aac56c99c96b5120ffe2dad479000b34964ff89d030ae762bda43_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "jackson-databind: denial of service via a large depth of nested objects"
},
{
"cve": "CVE-2022-32149",
"cwe": {
"id": "CWE-407",
"name": "Inefficient Algorithmic Complexity"
},
"discovery_date": "2022-10-12T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-RHOL-5.4:openshift-logging/cluster-logging-operator-bundle@sha256:cb26d9e55f781dd535901a90f1ec2f8e02e8e1de72c0fde638c90fcc228ec4b2_amd64",
"8Base-RHOL-5.4:openshift-logging/cluster-logging-rhel8-operator@sha256:617cc8b0011110981674b75fe1e3041bfa434c952e4a0193818b971edbc7a480_s390x",
"8Base-RHOL-5.4:openshift-logging/cluster-logging-rhel8-operator@sha256:637df49756fe85e7b38b279ffa7672d72c658d3d47df7f9dada2dd70563af83b_arm64",
"8Base-RHOL-5.4:openshift-logging/cluster-logging-rhel8-operator@sha256:aa1602fe2abe23bd8a4c791bc45d425686a6e6d1aab4face0fac28bfc7cebbe1_ppc64le",
"8Base-RHOL-5.4:openshift-logging/cluster-logging-rhel8-operator@sha256:c698b52c46d41007e5ac4f90b9540d430820bd20a93468fddd3a949c7ef5b332_amd64",
"8Base-RHOL-5.4:openshift-logging/elasticsearch-operator-bundle@sha256:7659606e0418a1920161b7ca67524ea6a7b1ed366b817f1a5cde0b346152243c_amd64",
"8Base-RHOL-5.4:openshift-logging/elasticsearch-rhel8-operator@sha256:2005f41e59a130bb86c2ec47d1b060e3e2ed32f9a4cef3897e2c05fc94043dbb_arm64",
"8Base-RHOL-5.4:openshift-logging/elasticsearch-rhel8-operator@sha256:6a55934cf7af0c03e06d4ec7a15a80acf53491fb7a183c16fdf8018fbf9b4174_ppc64le",
"8Base-RHOL-5.4:openshift-logging/elasticsearch-rhel8-operator@sha256:8ce04536772f31ad022b9c66cddc090d2962b44d66c06a1db56d1447be198326_amd64",
"8Base-RHOL-5.4:openshift-logging/elasticsearch-rhel8-operator@sha256:dd211d42eaad043d9bdb519e3ad6a86255b7280a2cdf47dd3fe0458a77cb110f_s390x",
"8Base-RHOL-5.4:openshift-logging/elasticsearch6-rhel8@sha256:17a9f3ae042b92693a374e3d60a07f2ab2e52419f8df25d446dd0654f6a858f6_ppc64le",
"8Base-RHOL-5.4:openshift-logging/elasticsearch6-rhel8@sha256:5b1cfc2f9a96601439cf17d1fe49a6bc6cad3b7273af87b23528090aefbfd915_s390x",
"8Base-RHOL-5.4:openshift-logging/elasticsearch6-rhel8@sha256:8e0ba10f91db4cb8786d0501ec33a3d54f7c7c5337e0495cc2286a6ea20cca20_arm64",
"8Base-RHOL-5.4:openshift-logging/elasticsearch6-rhel8@sha256:fa8182b69328077500f89becc7621b48efa8d99f34247c2e6855dcfec13980e3_amd64",
"8Base-RHOL-5.4:openshift-logging/eventrouter-rhel8@sha256:4438a3bba34418a9dc566bf15f6b4764de4295ab8b05a7b1a86f9e8cd332b3f7_arm64",
"8Base-RHOL-5.4:openshift-logging/eventrouter-rhel8@sha256:bc408fc4b0482c5eb1b0deb3a9090f3e3dd9b370001d54cd076254562c72fec9_ppc64le",
"8Base-RHOL-5.4:openshift-logging/eventrouter-rhel8@sha256:d50a2b89442d04b1163c01b3a3951857a95df76c57b14e7f51d835c3ac6d75b3_amd64",
"8Base-RHOL-5.4:openshift-logging/eventrouter-rhel8@sha256:f05aee8433dec1c9f6cf835038f9e5a47847d4095383bf3c22ca57c3fb69fa98_s390x",
"8Base-RHOL-5.4:openshift-logging/fluentd-rhel8@sha256:150e17cb645cf2f4cb7ab592572dd3abd145d9a33e790778280e256666248022_amd64",
"8Base-RHOL-5.4:openshift-logging/fluentd-rhel8@sha256:36aecf05ca3cdaf29982b3efa4a1c97087be29b0a58c9777e6b0c11a34861aa8_s390x",
"8Base-RHOL-5.4:openshift-logging/fluentd-rhel8@sha256:e3a51d2bdc632b8376e28c33e9d4fac3464e3a84a313a17246b1f1cf21cb5710_arm64",
"8Base-RHOL-5.4:openshift-logging/fluentd-rhel8@sha256:ea07da04f06df6bf0d9dd981a3795dfdb51eca83f59a6291114650e3e98a9e71_ppc64le",
"8Base-RHOL-5.4:openshift-logging/kibana6-rhel8@sha256:167ee6a645c7397bde3d12e9b9685279505c25ffb3bda11ae68bdf0b34229f2e_amd64",
"8Base-RHOL-5.4:openshift-logging/kibana6-rhel8@sha256:4a029733337b10bb9fb8d98c91abc5451ca0b98713c8f2271a675251e025b6c0_s390x",
"8Base-RHOL-5.4:openshift-logging/kibana6-rhel8@sha256:812f4380024dc3df42310ad14d173d390f2bdf4b3dbdb02550c00552534f79ce_ppc64le",
"8Base-RHOL-5.4:openshift-logging/kibana6-rhel8@sha256:958ba6856cc76fc77d34a9c78888eb37b9c39b83a2f044ef2337610560ba9323_arm64",
"8Base-RHOL-5.4:openshift-logging/log-file-metric-exporter-rhel8@sha256:043e4d3481fbfedf3115e18fade3a2f33b891b0d9a641bf973c2c7f492cb0489_amd64",
"8Base-RHOL-5.4:openshift-logging/log-file-metric-exporter-rhel8@sha256:4fe26adac10cf20b83812e4fa513231d7e1fd4b6cd4e09d4fd425c391885cfcc_ppc64le",
"8Base-RHOL-5.4:openshift-logging/log-file-metric-exporter-rhel8@sha256:85827db708c0927027435b05732cc7e34b0675eaa86665c91efacc76aecd6227_s390x",
"8Base-RHOL-5.4:openshift-logging/log-file-metric-exporter-rhel8@sha256:a5285db276a5545fdbaa9f0743a49ba72ce1c5da61b5cccc9422320a03e08bea_arm64",
"8Base-RHOL-5.4:openshift-logging/logging-curator5-rhel8@sha256:0b28415b8115ff3216002faa5c9ecf3c46995085e3364c8028cb544cb4787ed2_arm64",
"8Base-RHOL-5.4:openshift-logging/logging-curator5-rhel8@sha256:7016e867ddfe970d6d2d54d5615e8f613786bcfbfe52ebf3139c07da3d5a53db_s390x",
"8Base-RHOL-5.4:openshift-logging/logging-curator5-rhel8@sha256:94c435f45e9dbd9fa633e137356cfb1d6ac2d4dd7574b359367665da42d6203d_amd64",
"8Base-RHOL-5.4:openshift-logging/logging-curator5-rhel8@sha256:d24afbc9228ef7f3d0a6fd716a3a57abde88a1f65d149c7df4f959a775b670bd_ppc64le",
"8Base-RHOL-5.4:openshift-logging/logging-loki-rhel8@sha256:40d4989b4733f54a01a73831fa00b12e49fff69c75138902eac0d894d432e4d9_arm64",
"8Base-RHOL-5.4:openshift-logging/logging-loki-rhel8@sha256:b444af35118c24bde0dfa2a8825ba427b3345451f6081133477254213a3460f0_amd64",
"8Base-RHOL-5.4:openshift-logging/logging-loki-rhel8@sha256:cfe410d498940a95da631ea213866a96a119034d78d5d53f7f9c7e8da56e0f45_s390x",
"8Base-RHOL-5.4:openshift-logging/logging-loki-rhel8@sha256:f7979c82140a0ab1a97c9f3151465bfbd9f79c4db9b0cc20f974cd7b890f074f_ppc64le",
"8Base-RHOL-5.4:openshift-logging/loki-operator-bundle@sha256:02cceda51028eb55a3b82aa5275f03dbaf8f8f9ab3fd27c650d1a07a93044e37_amd64",
"8Base-RHOL-5.4:openshift-logging/loki-rhel8-operator@sha256:0f1be625b4012820f7ac439fed000808d7acb4e885ace16014461bf802be935a_s390x",
"8Base-RHOL-5.4:openshift-logging/loki-rhel8-operator@sha256:28f45a80846c5e11638fb479be42cafcb2bdb3af94dff3629a820de295cbe31d_ppc64le",
"8Base-RHOL-5.4:openshift-logging/loki-rhel8-operator@sha256:df7de1e9f5a4396df6f14b1c4b6bb2a9ae4bc50d82cbc954ec535c26e8df2cb1_arm64",
"8Base-RHOL-5.4:openshift-logging/loki-rhel8-operator@sha256:f8a35557c9eb27f703ffa9320a9d39a2361d93fdb0b8c874d97da458048e7eec_amd64",
"8Base-RHOL-5.4:openshift-logging/lokistack-gateway-rhel8@sha256:178fcf44e6a1fa90d27a40565f69ae2880622b017bc8d9e33a441353eb45609d_arm64",
"8Base-RHOL-5.4:openshift-logging/lokistack-gateway-rhel8@sha256:7b0c2c99cf0f710166b749dbfd7f544caf5fe35516c743fca251c7cec896e1d6_ppc64le",
"8Base-RHOL-5.4:openshift-logging/lokistack-gateway-rhel8@sha256:9c4959525339b607a98889d56f4c26f2e4af25032466c439903a7f1cb593f721_s390x",
"8Base-RHOL-5.4:openshift-logging/lokistack-gateway-rhel8@sha256:a967d5be7d3a6fdd75965a5f9a7396a52cdcb37d6a8521c440b0b5c650c230f2_amd64",
"8Base-RHOL-5.4:openshift-logging/opa-openshift-rhel8@sha256:1b106af51bb50f1ce4db13ebbf6f6c67eae45611c0d5dc46476f1dfaa8aca166_arm64",
"8Base-RHOL-5.4:openshift-logging/opa-openshift-rhel8@sha256:92ddf24824c8f8ae93dec07184c446615b635389472d3a525df72da07c8d9b97_ppc64le",
"8Base-RHOL-5.4:openshift-logging/opa-openshift-rhel8@sha256:9fd0c5df785564b35392705a479d6fb9245e3329719438c76c0282f9ef2f2d55_amd64",
"8Base-RHOL-5.4:openshift-logging/opa-openshift-rhel8@sha256:be8ba0e4c5f24c7b4549700a25c89b10d4b2fc0b0e3888163bb53827914e95c1_s390x",
"8Base-RHOL-5.4:openshift-logging/vector-rhel8@sha256:48bb136d11b44428c87489978873370848ac2b219b107ef7e81ab679db095234_s390x",
"8Base-RHOL-5.4:openshift-logging/vector-rhel8@sha256:48f0317d167710ff5b0787c73f6b7dd0249e7c8d2d001159132a97299c30b62d_ppc64le",
"8Base-RHOL-5.4:openshift-logging/vector-rhel8@sha256:bde21c03fb831d01e85b28245881f7e3f2bb2ef6d2671eb92b2e0cc4bd3898e2_arm64",
"8Base-RHOL-5.4:openshift-logging/vector-rhel8@sha256:cc6b9c6a344aac56c99c96b5120ffe2dad479000b34964ff89d030ae762bda43_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2134010"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in the golang.org/x/text/language package. An attacker can craft an Accept-Language header which ParseAcceptLanguage will take significant time to parse. This issue leads to a denial of service, and can impact availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: golang.org/x/text/language: ParseAcceptLanguage takes a long time to parse complex tags",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "After careful analysis of the vulnerability Redhat is choosing to keep the vulnerability severity as moderate,the vulnerability exists in the ParseAcceptLanguage function of the golang text/language package,when an attacker could craft an unusually large accept header and due to the parser taking quadratic time complexity to finish, firstly the attacker would have to find a way smuggle an input to the parser and even then this would simply not result in a crash of any kind but more of resource hang which while can be unpleasant,does not equate to any real world damage.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-RHOL-5.4:openshift-logging/elasticsearch-proxy-rhel8@sha256:4f4e5bb267ad391bc0fc6a010ec9ecdf3bf48d5b6e9db0d2510960c13c97bd71_ppc64le",
"8Base-RHOL-5.4:openshift-logging/elasticsearch-proxy-rhel8@sha256:b9c2e58b39dc3de97013f8806178f6327bf2e4590fe55db144527d64d468f64f_s390x",
"8Base-RHOL-5.4:openshift-logging/elasticsearch-proxy-rhel8@sha256:c9a2b9e7cca14d9596ccbe0f64e2abe4452f91f029f42eefead43c9f526f6a58_arm64",
"8Base-RHOL-5.4:openshift-logging/elasticsearch-proxy-rhel8@sha256:e38c55762c1eef39b401c46d44c899067b1566173e1ce239f17a95c52b30d8c7_amd64"
],
"known_not_affected": [
"8Base-RHOL-5.4:openshift-logging/cluster-logging-operator-bundle@sha256:cb26d9e55f781dd535901a90f1ec2f8e02e8e1de72c0fde638c90fcc228ec4b2_amd64",
"8Base-RHOL-5.4:openshift-logging/cluster-logging-rhel8-operator@sha256:617cc8b0011110981674b75fe1e3041bfa434c952e4a0193818b971edbc7a480_s390x",
"8Base-RHOL-5.4:openshift-logging/cluster-logging-rhel8-operator@sha256:637df49756fe85e7b38b279ffa7672d72c658d3d47df7f9dada2dd70563af83b_arm64",
"8Base-RHOL-5.4:openshift-logging/cluster-logging-rhel8-operator@sha256:aa1602fe2abe23bd8a4c791bc45d425686a6e6d1aab4face0fac28bfc7cebbe1_ppc64le",
"8Base-RHOL-5.4:openshift-logging/cluster-logging-rhel8-operator@sha256:c698b52c46d41007e5ac4f90b9540d430820bd20a93468fddd3a949c7ef5b332_amd64",
"8Base-RHOL-5.4:openshift-logging/elasticsearch-operator-bundle@sha256:7659606e0418a1920161b7ca67524ea6a7b1ed366b817f1a5cde0b346152243c_amd64",
"8Base-RHOL-5.4:openshift-logging/elasticsearch-rhel8-operator@sha256:2005f41e59a130bb86c2ec47d1b060e3e2ed32f9a4cef3897e2c05fc94043dbb_arm64",
"8Base-RHOL-5.4:openshift-logging/elasticsearch-rhel8-operator@sha256:6a55934cf7af0c03e06d4ec7a15a80acf53491fb7a183c16fdf8018fbf9b4174_ppc64le",
"8Base-RHOL-5.4:openshift-logging/elasticsearch-rhel8-operator@sha256:8ce04536772f31ad022b9c66cddc090d2962b44d66c06a1db56d1447be198326_amd64",
"8Base-RHOL-5.4:openshift-logging/elasticsearch-rhel8-operator@sha256:dd211d42eaad043d9bdb519e3ad6a86255b7280a2cdf47dd3fe0458a77cb110f_s390x",
"8Base-RHOL-5.4:openshift-logging/elasticsearch6-rhel8@sha256:17a9f3ae042b92693a374e3d60a07f2ab2e52419f8df25d446dd0654f6a858f6_ppc64le",
"8Base-RHOL-5.4:openshift-logging/elasticsearch6-rhel8@sha256:5b1cfc2f9a96601439cf17d1fe49a6bc6cad3b7273af87b23528090aefbfd915_s390x",
"8Base-RHOL-5.4:openshift-logging/elasticsearch6-rhel8@sha256:8e0ba10f91db4cb8786d0501ec33a3d54f7c7c5337e0495cc2286a6ea20cca20_arm64",
"8Base-RHOL-5.4:openshift-logging/elasticsearch6-rhel8@sha256:fa8182b69328077500f89becc7621b48efa8d99f34247c2e6855dcfec13980e3_amd64",
"8Base-RHOL-5.4:openshift-logging/eventrouter-rhel8@sha256:4438a3bba34418a9dc566bf15f6b4764de4295ab8b05a7b1a86f9e8cd332b3f7_arm64",
"8Base-RHOL-5.4:openshift-logging/eventrouter-rhel8@sha256:bc408fc4b0482c5eb1b0deb3a9090f3e3dd9b370001d54cd076254562c72fec9_ppc64le",
"8Base-RHOL-5.4:openshift-logging/eventrouter-rhel8@sha256:d50a2b89442d04b1163c01b3a3951857a95df76c57b14e7f51d835c3ac6d75b3_amd64",
"8Base-RHOL-5.4:openshift-logging/eventrouter-rhel8@sha256:f05aee8433dec1c9f6cf835038f9e5a47847d4095383bf3c22ca57c3fb69fa98_s390x",
"8Base-RHOL-5.4:openshift-logging/fluentd-rhel8@sha256:150e17cb645cf2f4cb7ab592572dd3abd145d9a33e790778280e256666248022_amd64",
"8Base-RHOL-5.4:openshift-logging/fluentd-rhel8@sha256:36aecf05ca3cdaf29982b3efa4a1c97087be29b0a58c9777e6b0c11a34861aa8_s390x",
"8Base-RHOL-5.4:openshift-logging/fluentd-rhel8@sha256:e3a51d2bdc632b8376e28c33e9d4fac3464e3a84a313a17246b1f1cf21cb5710_arm64",
"8Base-RHOL-5.4:openshift-logging/fluentd-rhel8@sha256:ea07da04f06df6bf0d9dd981a3795dfdb51eca83f59a6291114650e3e98a9e71_ppc64le",
"8Base-RHOL-5.4:openshift-logging/kibana6-rhel8@sha256:167ee6a645c7397bde3d12e9b9685279505c25ffb3bda11ae68bdf0b34229f2e_amd64",
"8Base-RHOL-5.4:openshift-logging/kibana6-rhel8@sha256:4a029733337b10bb9fb8d98c91abc5451ca0b98713c8f2271a675251e025b6c0_s390x",
"8Base-RHOL-5.4:openshift-logging/kibana6-rhel8@sha256:812f4380024dc3df42310ad14d173d390f2bdf4b3dbdb02550c00552534f79ce_ppc64le",
"8Base-RHOL-5.4:openshift-logging/kibana6-rhel8@sha256:958ba6856cc76fc77d34a9c78888eb37b9c39b83a2f044ef2337610560ba9323_arm64",
"8Base-RHOL-5.4:openshift-logging/log-file-metric-exporter-rhel8@sha256:043e4d3481fbfedf3115e18fade3a2f33b891b0d9a641bf973c2c7f492cb0489_amd64",
"8Base-RHOL-5.4:openshift-logging/log-file-metric-exporter-rhel8@sha256:4fe26adac10cf20b83812e4fa513231d7e1fd4b6cd4e09d4fd425c391885cfcc_ppc64le",
"8Base-RHOL-5.4:openshift-logging/log-file-metric-exporter-rhel8@sha256:85827db708c0927027435b05732cc7e34b0675eaa86665c91efacc76aecd6227_s390x",
"8Base-RHOL-5.4:openshift-logging/log-file-metric-exporter-rhel8@sha256:a5285db276a5545fdbaa9f0743a49ba72ce1c5da61b5cccc9422320a03e08bea_arm64",
"8Base-RHOL-5.4:openshift-logging/logging-curator5-rhel8@sha256:0b28415b8115ff3216002faa5c9ecf3c46995085e3364c8028cb544cb4787ed2_arm64",
"8Base-RHOL-5.4:openshift-logging/logging-curator5-rhel8@sha256:7016e867ddfe970d6d2d54d5615e8f613786bcfbfe52ebf3139c07da3d5a53db_s390x",
"8Base-RHOL-5.4:openshift-logging/logging-curator5-rhel8@sha256:94c435f45e9dbd9fa633e137356cfb1d6ac2d4dd7574b359367665da42d6203d_amd64",
"8Base-RHOL-5.4:openshift-logging/logging-curator5-rhel8@sha256:d24afbc9228ef7f3d0a6fd716a3a57abde88a1f65d149c7df4f959a775b670bd_ppc64le",
"8Base-RHOL-5.4:openshift-logging/logging-loki-rhel8@sha256:40d4989b4733f54a01a73831fa00b12e49fff69c75138902eac0d894d432e4d9_arm64",
"8Base-RHOL-5.4:openshift-logging/logging-loki-rhel8@sha256:b444af35118c24bde0dfa2a8825ba427b3345451f6081133477254213a3460f0_amd64",
"8Base-RHOL-5.4:openshift-logging/logging-loki-rhel8@sha256:cfe410d498940a95da631ea213866a96a119034d78d5d53f7f9c7e8da56e0f45_s390x",
"8Base-RHOL-5.4:openshift-logging/logging-loki-rhel8@sha256:f7979c82140a0ab1a97c9f3151465bfbd9f79c4db9b0cc20f974cd7b890f074f_ppc64le",
"8Base-RHOL-5.4:openshift-logging/loki-operator-bundle@sha256:02cceda51028eb55a3b82aa5275f03dbaf8f8f9ab3fd27c650d1a07a93044e37_amd64",
"8Base-RHOL-5.4:openshift-logging/loki-rhel8-operator@sha256:0f1be625b4012820f7ac439fed000808d7acb4e885ace16014461bf802be935a_s390x",
"8Base-RHOL-5.4:openshift-logging/loki-rhel8-operator@sha256:28f45a80846c5e11638fb479be42cafcb2bdb3af94dff3629a820de295cbe31d_ppc64le",
"8Base-RHOL-5.4:openshift-logging/loki-rhel8-operator@sha256:df7de1e9f5a4396df6f14b1c4b6bb2a9ae4bc50d82cbc954ec535c26e8df2cb1_arm64",
"8Base-RHOL-5.4:openshift-logging/loki-rhel8-operator@sha256:f8a35557c9eb27f703ffa9320a9d39a2361d93fdb0b8c874d97da458048e7eec_amd64",
"8Base-RHOL-5.4:openshift-logging/lokistack-gateway-rhel8@sha256:178fcf44e6a1fa90d27a40565f69ae2880622b017bc8d9e33a441353eb45609d_arm64",
"8Base-RHOL-5.4:openshift-logging/lokistack-gateway-rhel8@sha256:7b0c2c99cf0f710166b749dbfd7f544caf5fe35516c743fca251c7cec896e1d6_ppc64le",
"8Base-RHOL-5.4:openshift-logging/lokistack-gateway-rhel8@sha256:9c4959525339b607a98889d56f4c26f2e4af25032466c439903a7f1cb593f721_s390x",
"8Base-RHOL-5.4:openshift-logging/lokistack-gateway-rhel8@sha256:a967d5be7d3a6fdd75965a5f9a7396a52cdcb37d6a8521c440b0b5c650c230f2_amd64",
"8Base-RHOL-5.4:openshift-logging/opa-openshift-rhel8@sha256:1b106af51bb50f1ce4db13ebbf6f6c67eae45611c0d5dc46476f1dfaa8aca166_arm64",
"8Base-RHOL-5.4:openshift-logging/opa-openshift-rhel8@sha256:92ddf24824c8f8ae93dec07184c446615b635389472d3a525df72da07c8d9b97_ppc64le",
"8Base-RHOL-5.4:openshift-logging/opa-openshift-rhel8@sha256:9fd0c5df785564b35392705a479d6fb9245e3329719438c76c0282f9ef2f2d55_amd64",
"8Base-RHOL-5.4:openshift-logging/opa-openshift-rhel8@sha256:be8ba0e4c5f24c7b4549700a25c89b10d4b2fc0b0e3888163bb53827914e95c1_s390x",
"8Base-RHOL-5.4:openshift-logging/vector-rhel8@sha256:48bb136d11b44428c87489978873370848ac2b219b107ef7e81ab679db095234_s390x",
"8Base-RHOL-5.4:openshift-logging/vector-rhel8@sha256:48f0317d167710ff5b0787c73f6b7dd0249e7c8d2d001159132a97299c30b62d_ppc64le",
"8Base-RHOL-5.4:openshift-logging/vector-rhel8@sha256:bde21c03fb831d01e85b28245881f7e3f2bb2ef6d2671eb92b2e0cc4bd3898e2_arm64",
"8Base-RHOL-5.4:openshift-logging/vector-rhel8@sha256:cc6b9c6a344aac56c99c96b5120ffe2dad479000b34964ff89d030ae762bda43_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-32149"
},
{
"category": "external",
"summary": "RHBZ#2134010",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2134010"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-32149",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32149"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-32149",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-32149"
},
{
"category": "external",
"summary": "https://go.dev/issue/56152",
"url": "https://go.dev/issue/56152"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-dev/c/qfPIly0X7aU",
"url": "https://groups.google.com/g/golang-dev/c/qfPIly0X7aU"
}
],
"release_date": "2022-10-11T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-11-16T12:13:01+00:00",
"details": "For OpenShift Container Platform 4.10 see the following documentation, which will be updated shortly, for detailed release notes:\n\nhttps://docs.openshift.com/container-platform/4.10/logging/cluster-logging-release-notes.html\n\nFor Red Hat OpenShift Logging 5.4, see the following instructions to apply this update:\n\nhttps://docs.openshift.com/container-platform/4.10/logging/cluster-logging-upgrading.html",
"product_ids": [
"8Base-RHOL-5.4:openshift-logging/elasticsearch-proxy-rhel8@sha256:4f4e5bb267ad391bc0fc6a010ec9ecdf3bf48d5b6e9db0d2510960c13c97bd71_ppc64le",
"8Base-RHOL-5.4:openshift-logging/elasticsearch-proxy-rhel8@sha256:b9c2e58b39dc3de97013f8806178f6327bf2e4590fe55db144527d64d468f64f_s390x",
"8Base-RHOL-5.4:openshift-logging/elasticsearch-proxy-rhel8@sha256:c9a2b9e7cca14d9596ccbe0f64e2abe4452f91f029f42eefead43c9f526f6a58_arm64",
"8Base-RHOL-5.4:openshift-logging/elasticsearch-proxy-rhel8@sha256:e38c55762c1eef39b401c46d44c899067b1566173e1ce239f17a95c52b30d8c7_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:7435"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"8Base-RHOL-5.4:openshift-logging/cluster-logging-operator-bundle@sha256:cb26d9e55f781dd535901a90f1ec2f8e02e8e1de72c0fde638c90fcc228ec4b2_amd64",
"8Base-RHOL-5.4:openshift-logging/cluster-logging-rhel8-operator@sha256:617cc8b0011110981674b75fe1e3041bfa434c952e4a0193818b971edbc7a480_s390x",
"8Base-RHOL-5.4:openshift-logging/cluster-logging-rhel8-operator@sha256:637df49756fe85e7b38b279ffa7672d72c658d3d47df7f9dada2dd70563af83b_arm64",
"8Base-RHOL-5.4:openshift-logging/cluster-logging-rhel8-operator@sha256:aa1602fe2abe23bd8a4c791bc45d425686a6e6d1aab4face0fac28bfc7cebbe1_ppc64le",
"8Base-RHOL-5.4:openshift-logging/cluster-logging-rhel8-operator@sha256:c698b52c46d41007e5ac4f90b9540d430820bd20a93468fddd3a949c7ef5b332_amd64",
"8Base-RHOL-5.4:openshift-logging/elasticsearch-operator-bundle@sha256:7659606e0418a1920161b7ca67524ea6a7b1ed366b817f1a5cde0b346152243c_amd64",
"8Base-RHOL-5.4:openshift-logging/elasticsearch-proxy-rhel8@sha256:4f4e5bb267ad391bc0fc6a010ec9ecdf3bf48d5b6e9db0d2510960c13c97bd71_ppc64le",
"8Base-RHOL-5.4:openshift-logging/elasticsearch-proxy-rhel8@sha256:b9c2e58b39dc3de97013f8806178f6327bf2e4590fe55db144527d64d468f64f_s390x",
"8Base-RHOL-5.4:openshift-logging/elasticsearch-proxy-rhel8@sha256:c9a2b9e7cca14d9596ccbe0f64e2abe4452f91f029f42eefead43c9f526f6a58_arm64",
"8Base-RHOL-5.4:openshift-logging/elasticsearch-proxy-rhel8@sha256:e38c55762c1eef39b401c46d44c899067b1566173e1ce239f17a95c52b30d8c7_amd64",
"8Base-RHOL-5.4:openshift-logging/elasticsearch-rhel8-operator@sha256:2005f41e59a130bb86c2ec47d1b060e3e2ed32f9a4cef3897e2c05fc94043dbb_arm64",
"8Base-RHOL-5.4:openshift-logging/elasticsearch-rhel8-operator@sha256:6a55934cf7af0c03e06d4ec7a15a80acf53491fb7a183c16fdf8018fbf9b4174_ppc64le",
"8Base-RHOL-5.4:openshift-logging/elasticsearch-rhel8-operator@sha256:8ce04536772f31ad022b9c66cddc090d2962b44d66c06a1db56d1447be198326_amd64",
"8Base-RHOL-5.4:openshift-logging/elasticsearch-rhel8-operator@sha256:dd211d42eaad043d9bdb519e3ad6a86255b7280a2cdf47dd3fe0458a77cb110f_s390x",
"8Base-RHOL-5.4:openshift-logging/elasticsearch6-rhel8@sha256:17a9f3ae042b92693a374e3d60a07f2ab2e52419f8df25d446dd0654f6a858f6_ppc64le",
"8Base-RHOL-5.4:openshift-logging/elasticsearch6-rhel8@sha256:5b1cfc2f9a96601439cf17d1fe49a6bc6cad3b7273af87b23528090aefbfd915_s390x",
"8Base-RHOL-5.4:openshift-logging/elasticsearch6-rhel8@sha256:8e0ba10f91db4cb8786d0501ec33a3d54f7c7c5337e0495cc2286a6ea20cca20_arm64",
"8Base-RHOL-5.4:openshift-logging/elasticsearch6-rhel8@sha256:fa8182b69328077500f89becc7621b48efa8d99f34247c2e6855dcfec13980e3_amd64",
"8Base-RHOL-5.4:openshift-logging/eventrouter-rhel8@sha256:4438a3bba34418a9dc566bf15f6b4764de4295ab8b05a7b1a86f9e8cd332b3f7_arm64",
"8Base-RHOL-5.4:openshift-logging/eventrouter-rhel8@sha256:bc408fc4b0482c5eb1b0deb3a9090f3e3dd9b370001d54cd076254562c72fec9_ppc64le",
"8Base-RHOL-5.4:openshift-logging/eventrouter-rhel8@sha256:d50a2b89442d04b1163c01b3a3951857a95df76c57b14e7f51d835c3ac6d75b3_amd64",
"8Base-RHOL-5.4:openshift-logging/eventrouter-rhel8@sha256:f05aee8433dec1c9f6cf835038f9e5a47847d4095383bf3c22ca57c3fb69fa98_s390x",
"8Base-RHOL-5.4:openshift-logging/fluentd-rhel8@sha256:150e17cb645cf2f4cb7ab592572dd3abd145d9a33e790778280e256666248022_amd64",
"8Base-RHOL-5.4:openshift-logging/fluentd-rhel8@sha256:36aecf05ca3cdaf29982b3efa4a1c97087be29b0a58c9777e6b0c11a34861aa8_s390x",
"8Base-RHOL-5.4:openshift-logging/fluentd-rhel8@sha256:e3a51d2bdc632b8376e28c33e9d4fac3464e3a84a313a17246b1f1cf21cb5710_arm64",
"8Base-RHOL-5.4:openshift-logging/fluentd-rhel8@sha256:ea07da04f06df6bf0d9dd981a3795dfdb51eca83f59a6291114650e3e98a9e71_ppc64le",
"8Base-RHOL-5.4:openshift-logging/kibana6-rhel8@sha256:167ee6a645c7397bde3d12e9b9685279505c25ffb3bda11ae68bdf0b34229f2e_amd64",
"8Base-RHOL-5.4:openshift-logging/kibana6-rhel8@sha256:4a029733337b10bb9fb8d98c91abc5451ca0b98713c8f2271a675251e025b6c0_s390x",
"8Base-RHOL-5.4:openshift-logging/kibana6-rhel8@sha256:812f4380024dc3df42310ad14d173d390f2bdf4b3dbdb02550c00552534f79ce_ppc64le",
"8Base-RHOL-5.4:openshift-logging/kibana6-rhel8@sha256:958ba6856cc76fc77d34a9c78888eb37b9c39b83a2f044ef2337610560ba9323_arm64",
"8Base-RHOL-5.4:openshift-logging/log-file-metric-exporter-rhel8@sha256:043e4d3481fbfedf3115e18fade3a2f33b891b0d9a641bf973c2c7f492cb0489_amd64",
"8Base-RHOL-5.4:openshift-logging/log-file-metric-exporter-rhel8@sha256:4fe26adac10cf20b83812e4fa513231d7e1fd4b6cd4e09d4fd425c391885cfcc_ppc64le",
"8Base-RHOL-5.4:openshift-logging/log-file-metric-exporter-rhel8@sha256:85827db708c0927027435b05732cc7e34b0675eaa86665c91efacc76aecd6227_s390x",
"8Base-RHOL-5.4:openshift-logging/log-file-metric-exporter-rhel8@sha256:a5285db276a5545fdbaa9f0743a49ba72ce1c5da61b5cccc9422320a03e08bea_arm64",
"8Base-RHOL-5.4:openshift-logging/logging-curator5-rhel8@sha256:0b28415b8115ff3216002faa5c9ecf3c46995085e3364c8028cb544cb4787ed2_arm64",
"8Base-RHOL-5.4:openshift-logging/logging-curator5-rhel8@sha256:7016e867ddfe970d6d2d54d5615e8f613786bcfbfe52ebf3139c07da3d5a53db_s390x",
"8Base-RHOL-5.4:openshift-logging/logging-curator5-rhel8@sha256:94c435f45e9dbd9fa633e137356cfb1d6ac2d4dd7574b359367665da42d6203d_amd64",
"8Base-RHOL-5.4:openshift-logging/logging-curator5-rhel8@sha256:d24afbc9228ef7f3d0a6fd716a3a57abde88a1f65d149c7df4f959a775b670bd_ppc64le",
"8Base-RHOL-5.4:openshift-logging/logging-loki-rhel8@sha256:40d4989b4733f54a01a73831fa00b12e49fff69c75138902eac0d894d432e4d9_arm64",
"8Base-RHOL-5.4:openshift-logging/logging-loki-rhel8@sha256:b444af35118c24bde0dfa2a8825ba427b3345451f6081133477254213a3460f0_amd64",
"8Base-RHOL-5.4:openshift-logging/logging-loki-rhel8@sha256:cfe410d498940a95da631ea213866a96a119034d78d5d53f7f9c7e8da56e0f45_s390x",
"8Base-RHOL-5.4:openshift-logging/logging-loki-rhel8@sha256:f7979c82140a0ab1a97c9f3151465bfbd9f79c4db9b0cc20f974cd7b890f074f_ppc64le",
"8Base-RHOL-5.4:openshift-logging/loki-operator-bundle@sha256:02cceda51028eb55a3b82aa5275f03dbaf8f8f9ab3fd27c650d1a07a93044e37_amd64",
"8Base-RHOL-5.4:openshift-logging/loki-rhel8-operator@sha256:0f1be625b4012820f7ac439fed000808d7acb4e885ace16014461bf802be935a_s390x",
"8Base-RHOL-5.4:openshift-logging/loki-rhel8-operator@sha256:28f45a80846c5e11638fb479be42cafcb2bdb3af94dff3629a820de295cbe31d_ppc64le",
"8Base-RHOL-5.4:openshift-logging/loki-rhel8-operator@sha256:df7de1e9f5a4396df6f14b1c4b6bb2a9ae4bc50d82cbc954ec535c26e8df2cb1_arm64",
"8Base-RHOL-5.4:openshift-logging/loki-rhel8-operator@sha256:f8a35557c9eb27f703ffa9320a9d39a2361d93fdb0b8c874d97da458048e7eec_amd64",
"8Base-RHOL-5.4:openshift-logging/lokistack-gateway-rhel8@sha256:178fcf44e6a1fa90d27a40565f69ae2880622b017bc8d9e33a441353eb45609d_arm64",
"8Base-RHOL-5.4:openshift-logging/lokistack-gateway-rhel8@sha256:7b0c2c99cf0f710166b749dbfd7f544caf5fe35516c743fca251c7cec896e1d6_ppc64le",
"8Base-RHOL-5.4:openshift-logging/lokistack-gateway-rhel8@sha256:9c4959525339b607a98889d56f4c26f2e4af25032466c439903a7f1cb593f721_s390x",
"8Base-RHOL-5.4:openshift-logging/lokistack-gateway-rhel8@sha256:a967d5be7d3a6fdd75965a5f9a7396a52cdcb37d6a8521c440b0b5c650c230f2_amd64",
"8Base-RHOL-5.4:openshift-logging/opa-openshift-rhel8@sha256:1b106af51bb50f1ce4db13ebbf6f6c67eae45611c0d5dc46476f1dfaa8aca166_arm64",
"8Base-RHOL-5.4:openshift-logging/opa-openshift-rhel8@sha256:92ddf24824c8f8ae93dec07184c446615b635389472d3a525df72da07c8d9b97_ppc64le",
"8Base-RHOL-5.4:openshift-logging/opa-openshift-rhel8@sha256:9fd0c5df785564b35392705a479d6fb9245e3329719438c76c0282f9ef2f2d55_amd64",
"8Base-RHOL-5.4:openshift-logging/opa-openshift-rhel8@sha256:be8ba0e4c5f24c7b4549700a25c89b10d4b2fc0b0e3888163bb53827914e95c1_s390x",
"8Base-RHOL-5.4:openshift-logging/vector-rhel8@sha256:48bb136d11b44428c87489978873370848ac2b219b107ef7e81ab679db095234_s390x",
"8Base-RHOL-5.4:openshift-logging/vector-rhel8@sha256:48f0317d167710ff5b0787c73f6b7dd0249e7c8d2d001159132a97299c30b62d_ppc64le",
"8Base-RHOL-5.4:openshift-logging/vector-rhel8@sha256:bde21c03fb831d01e85b28245881f7e3f2bb2ef6d2671eb92b2e0cc4bd3898e2_arm64",
"8Base-RHOL-5.4:openshift-logging/vector-rhel8@sha256:cc6b9c6a344aac56c99c96b5120ffe2dad479000b34964ff89d030ae762bda43_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "golang: golang.org/x/text/language: ParseAcceptLanguage takes a long time to parse complex tags"
},
{
"cve": "CVE-2022-42003",
"cwe": {
"id": "CWE-502",
"name": "Deserialization of Untrusted Data"
},
"discovery_date": "2022-10-17T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-RHOL-5.4:openshift-logging/cluster-logging-operator-bundle@sha256:cb26d9e55f781dd535901a90f1ec2f8e02e8e1de72c0fde638c90fcc228ec4b2_amd64",
"8Base-RHOL-5.4:openshift-logging/cluster-logging-rhel8-operator@sha256:617cc8b0011110981674b75fe1e3041bfa434c952e4a0193818b971edbc7a480_s390x",
"8Base-RHOL-5.4:openshift-logging/cluster-logging-rhel8-operator@sha256:637df49756fe85e7b38b279ffa7672d72c658d3d47df7f9dada2dd70563af83b_arm64",
"8Base-RHOL-5.4:openshift-logging/cluster-logging-rhel8-operator@sha256:aa1602fe2abe23bd8a4c791bc45d425686a6e6d1aab4face0fac28bfc7cebbe1_ppc64le",
"8Base-RHOL-5.4:openshift-logging/cluster-logging-rhel8-operator@sha256:c698b52c46d41007e5ac4f90b9540d430820bd20a93468fddd3a949c7ef5b332_amd64",
"8Base-RHOL-5.4:openshift-logging/eventrouter-rhel8@sha256:4438a3bba34418a9dc566bf15f6b4764de4295ab8b05a7b1a86f9e8cd332b3f7_arm64",
"8Base-RHOL-5.4:openshift-logging/eventrouter-rhel8@sha256:bc408fc4b0482c5eb1b0deb3a9090f3e3dd9b370001d54cd076254562c72fec9_ppc64le",
"8Base-RHOL-5.4:openshift-logging/eventrouter-rhel8@sha256:d50a2b89442d04b1163c01b3a3951857a95df76c57b14e7f51d835c3ac6d75b3_amd64",
"8Base-RHOL-5.4:openshift-logging/eventrouter-rhel8@sha256:f05aee8433dec1c9f6cf835038f9e5a47847d4095383bf3c22ca57c3fb69fa98_s390x",
"8Base-RHOL-5.4:openshift-logging/fluentd-rhel8@sha256:150e17cb645cf2f4cb7ab592572dd3abd145d9a33e790778280e256666248022_amd64",
"8Base-RHOL-5.4:openshift-logging/fluentd-rhel8@sha256:36aecf05ca3cdaf29982b3efa4a1c97087be29b0a58c9777e6b0c11a34861aa8_s390x",
"8Base-RHOL-5.4:openshift-logging/fluentd-rhel8@sha256:e3a51d2bdc632b8376e28c33e9d4fac3464e3a84a313a17246b1f1cf21cb5710_arm64",
"8Base-RHOL-5.4:openshift-logging/fluentd-rhel8@sha256:ea07da04f06df6bf0d9dd981a3795dfdb51eca83f59a6291114650e3e98a9e71_ppc64le",
"8Base-RHOL-5.4:openshift-logging/kibana6-rhel8@sha256:167ee6a645c7397bde3d12e9b9685279505c25ffb3bda11ae68bdf0b34229f2e_amd64",
"8Base-RHOL-5.4:openshift-logging/kibana6-rhel8@sha256:4a029733337b10bb9fb8d98c91abc5451ca0b98713c8f2271a675251e025b6c0_s390x",
"8Base-RHOL-5.4:openshift-logging/kibana6-rhel8@sha256:812f4380024dc3df42310ad14d173d390f2bdf4b3dbdb02550c00552534f79ce_ppc64le",
"8Base-RHOL-5.4:openshift-logging/kibana6-rhel8@sha256:958ba6856cc76fc77d34a9c78888eb37b9c39b83a2f044ef2337610560ba9323_arm64",
"8Base-RHOL-5.4:openshift-logging/log-file-metric-exporter-rhel8@sha256:043e4d3481fbfedf3115e18fade3a2f33b891b0d9a641bf973c2c7f492cb0489_amd64",
"8Base-RHOL-5.4:openshift-logging/log-file-metric-exporter-rhel8@sha256:4fe26adac10cf20b83812e4fa513231d7e1fd4b6cd4e09d4fd425c391885cfcc_ppc64le",
"8Base-RHOL-5.4:openshift-logging/log-file-metric-exporter-rhel8@sha256:85827db708c0927027435b05732cc7e34b0675eaa86665c91efacc76aecd6227_s390x",
"8Base-RHOL-5.4:openshift-logging/log-file-metric-exporter-rhel8@sha256:a5285db276a5545fdbaa9f0743a49ba72ce1c5da61b5cccc9422320a03e08bea_arm64",
"8Base-RHOL-5.4:openshift-logging/logging-curator5-rhel8@sha256:0b28415b8115ff3216002faa5c9ecf3c46995085e3364c8028cb544cb4787ed2_arm64",
"8Base-RHOL-5.4:openshift-logging/logging-curator5-rhel8@sha256:7016e867ddfe970d6d2d54d5615e8f613786bcfbfe52ebf3139c07da3d5a53db_s390x",
"8Base-RHOL-5.4:openshift-logging/logging-curator5-rhel8@sha256:94c435f45e9dbd9fa633e137356cfb1d6ac2d4dd7574b359367665da42d6203d_amd64",
"8Base-RHOL-5.4:openshift-logging/logging-curator5-rhel8@sha256:d24afbc9228ef7f3d0a6fd716a3a57abde88a1f65d149c7df4f959a775b670bd_ppc64le",
"8Base-RHOL-5.4:openshift-logging/logging-loki-rhel8@sha256:40d4989b4733f54a01a73831fa00b12e49fff69c75138902eac0d894d432e4d9_arm64",
"8Base-RHOL-5.4:openshift-logging/logging-loki-rhel8@sha256:b444af35118c24bde0dfa2a8825ba427b3345451f6081133477254213a3460f0_amd64",
"8Base-RHOL-5.4:openshift-logging/logging-loki-rhel8@sha256:cfe410d498940a95da631ea213866a96a119034d78d5d53f7f9c7e8da56e0f45_s390x",
"8Base-RHOL-5.4:openshift-logging/logging-loki-rhel8@sha256:f7979c82140a0ab1a97c9f3151465bfbd9f79c4db9b0cc20f974cd7b890f074f_ppc64le",
"8Base-RHOL-5.4:openshift-logging/loki-operator-bundle@sha256:02cceda51028eb55a3b82aa5275f03dbaf8f8f9ab3fd27c650d1a07a93044e37_amd64",
"8Base-RHOL-5.4:openshift-logging/loki-rhel8-operator@sha256:0f1be625b4012820f7ac439fed000808d7acb4e885ace16014461bf802be935a_s390x",
"8Base-RHOL-5.4:openshift-logging/loki-rhel8-operator@sha256:28f45a80846c5e11638fb479be42cafcb2bdb3af94dff3629a820de295cbe31d_ppc64le",
"8Base-RHOL-5.4:openshift-logging/loki-rhel8-operator@sha256:df7de1e9f5a4396df6f14b1c4b6bb2a9ae4bc50d82cbc954ec535c26e8df2cb1_arm64",
"8Base-RHOL-5.4:openshift-logging/loki-rhel8-operator@sha256:f8a35557c9eb27f703ffa9320a9d39a2361d93fdb0b8c874d97da458048e7eec_amd64",
"8Base-RHOL-5.4:openshift-logging/lokistack-gateway-rhel8@sha256:178fcf44e6a1fa90d27a40565f69ae2880622b017bc8d9e33a441353eb45609d_arm64",
"8Base-RHOL-5.4:openshift-logging/lokistack-gateway-rhel8@sha256:7b0c2c99cf0f710166b749dbfd7f544caf5fe35516c743fca251c7cec896e1d6_ppc64le",
"8Base-RHOL-5.4:openshift-logging/lokistack-gateway-rhel8@sha256:9c4959525339b607a98889d56f4c26f2e4af25032466c439903a7f1cb593f721_s390x",
"8Base-RHOL-5.4:openshift-logging/lokistack-gateway-rhel8@sha256:a967d5be7d3a6fdd75965a5f9a7396a52cdcb37d6a8521c440b0b5c650c230f2_amd64",
"8Base-RHOL-5.4:openshift-logging/opa-openshift-rhel8@sha256:1b106af51bb50f1ce4db13ebbf6f6c67eae45611c0d5dc46476f1dfaa8aca166_arm64",
"8Base-RHOL-5.4:openshift-logging/opa-openshift-rhel8@sha256:92ddf24824c8f8ae93dec07184c446615b635389472d3a525df72da07c8d9b97_ppc64le",
"8Base-RHOL-5.4:openshift-logging/opa-openshift-rhel8@sha256:9fd0c5df785564b35392705a479d6fb9245e3329719438c76c0282f9ef2f2d55_amd64",
"8Base-RHOL-5.4:openshift-logging/opa-openshift-rhel8@sha256:be8ba0e4c5f24c7b4549700a25c89b10d4b2fc0b0e3888163bb53827914e95c1_s390x",
"8Base-RHOL-5.4:openshift-logging/vector-rhel8@sha256:48bb136d11b44428c87489978873370848ac2b219b107ef7e81ab679db095234_s390x",
"8Base-RHOL-5.4:openshift-logging/vector-rhel8@sha256:48f0317d167710ff5b0787c73f6b7dd0249e7c8d2d001159132a97299c30b62d_ppc64le",
"8Base-RHOL-5.4:openshift-logging/vector-rhel8@sha256:bde21c03fb831d01e85b28245881f7e3f2bb2ef6d2671eb92b2e0cc4bd3898e2_arm64",
"8Base-RHOL-5.4:openshift-logging/vector-rhel8@sha256:cc6b9c6a344aac56c99c96b5120ffe2dad479000b34964ff89d030ae762bda43_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2135244"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in FasterXML jackson-databind. This issue could allow an attacker to benefit from resource exhaustion when the UNWRAP_SINGLE_VALUE_ARRAYS feature is enabled due to unchecked primitive value deserializers to avoid deep wrapper array nesting.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "jackson-databind: deep wrapper array nesting wrt UNWRAP_SINGLE_VALUE_ARRAYS",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-RHOL-5.4:openshift-logging/elasticsearch-operator-bundle@sha256:7659606e0418a1920161b7ca67524ea6a7b1ed366b817f1a5cde0b346152243c_amd64",
"8Base-RHOL-5.4:openshift-logging/elasticsearch-proxy-rhel8@sha256:4f4e5bb267ad391bc0fc6a010ec9ecdf3bf48d5b6e9db0d2510960c13c97bd71_ppc64le",
"8Base-RHOL-5.4:openshift-logging/elasticsearch-proxy-rhel8@sha256:b9c2e58b39dc3de97013f8806178f6327bf2e4590fe55db144527d64d468f64f_s390x",
"8Base-RHOL-5.4:openshift-logging/elasticsearch-proxy-rhel8@sha256:c9a2b9e7cca14d9596ccbe0f64e2abe4452f91f029f42eefead43c9f526f6a58_arm64",
"8Base-RHOL-5.4:openshift-logging/elasticsearch-proxy-rhel8@sha256:e38c55762c1eef39b401c46d44c899067b1566173e1ce239f17a95c52b30d8c7_amd64",
"8Base-RHOL-5.4:openshift-logging/elasticsearch-rhel8-operator@sha256:2005f41e59a130bb86c2ec47d1b060e3e2ed32f9a4cef3897e2c05fc94043dbb_arm64",
"8Base-RHOL-5.4:openshift-logging/elasticsearch-rhel8-operator@sha256:6a55934cf7af0c03e06d4ec7a15a80acf53491fb7a183c16fdf8018fbf9b4174_ppc64le",
"8Base-RHOL-5.4:openshift-logging/elasticsearch-rhel8-operator@sha256:8ce04536772f31ad022b9c66cddc090d2962b44d66c06a1db56d1447be198326_amd64",
"8Base-RHOL-5.4:openshift-logging/elasticsearch-rhel8-operator@sha256:dd211d42eaad043d9bdb519e3ad6a86255b7280a2cdf47dd3fe0458a77cb110f_s390x",
"8Base-RHOL-5.4:openshift-logging/elasticsearch6-rhel8@sha256:17a9f3ae042b92693a374e3d60a07f2ab2e52419f8df25d446dd0654f6a858f6_ppc64le",
"8Base-RHOL-5.4:openshift-logging/elasticsearch6-rhel8@sha256:5b1cfc2f9a96601439cf17d1fe49a6bc6cad3b7273af87b23528090aefbfd915_s390x",
"8Base-RHOL-5.4:openshift-logging/elasticsearch6-rhel8@sha256:8e0ba10f91db4cb8786d0501ec33a3d54f7c7c5337e0495cc2286a6ea20cca20_arm64",
"8Base-RHOL-5.4:openshift-logging/elasticsearch6-rhel8@sha256:fa8182b69328077500f89becc7621b48efa8d99f34247c2e6855dcfec13980e3_amd64"
],
"known_not_affected": [
"8Base-RHOL-5.4:openshift-logging/cluster-logging-operator-bundle@sha256:cb26d9e55f781dd535901a90f1ec2f8e02e8e1de72c0fde638c90fcc228ec4b2_amd64",
"8Base-RHOL-5.4:openshift-logging/cluster-logging-rhel8-operator@sha256:617cc8b0011110981674b75fe1e3041bfa434c952e4a0193818b971edbc7a480_s390x",
"8Base-RHOL-5.4:openshift-logging/cluster-logging-rhel8-operator@sha256:637df49756fe85e7b38b279ffa7672d72c658d3d47df7f9dada2dd70563af83b_arm64",
"8Base-RHOL-5.4:openshift-logging/cluster-logging-rhel8-operator@sha256:aa1602fe2abe23bd8a4c791bc45d425686a6e6d1aab4face0fac28bfc7cebbe1_ppc64le",
"8Base-RHOL-5.4:openshift-logging/cluster-logging-rhel8-operator@sha256:c698b52c46d41007e5ac4f90b9540d430820bd20a93468fddd3a949c7ef5b332_amd64",
"8Base-RHOL-5.4:openshift-logging/eventrouter-rhel8@sha256:4438a3bba34418a9dc566bf15f6b4764de4295ab8b05a7b1a86f9e8cd332b3f7_arm64",
"8Base-RHOL-5.4:openshift-logging/eventrouter-rhel8@sha256:bc408fc4b0482c5eb1b0deb3a9090f3e3dd9b370001d54cd076254562c72fec9_ppc64le",
"8Base-RHOL-5.4:openshift-logging/eventrouter-rhel8@sha256:d50a2b89442d04b1163c01b3a3951857a95df76c57b14e7f51d835c3ac6d75b3_amd64",
"8Base-RHOL-5.4:openshift-logging/eventrouter-rhel8@sha256:f05aee8433dec1c9f6cf835038f9e5a47847d4095383bf3c22ca57c3fb69fa98_s390x",
"8Base-RHOL-5.4:openshift-logging/fluentd-rhel8@sha256:150e17cb645cf2f4cb7ab592572dd3abd145d9a33e790778280e256666248022_amd64",
"8Base-RHOL-5.4:openshift-logging/fluentd-rhel8@sha256:36aecf05ca3cdaf29982b3efa4a1c97087be29b0a58c9777e6b0c11a34861aa8_s390x",
"8Base-RHOL-5.4:openshift-logging/fluentd-rhel8@sha256:e3a51d2bdc632b8376e28c33e9d4fac3464e3a84a313a17246b1f1cf21cb5710_arm64",
"8Base-RHOL-5.4:openshift-logging/fluentd-rhel8@sha256:ea07da04f06df6bf0d9dd981a3795dfdb51eca83f59a6291114650e3e98a9e71_ppc64le",
"8Base-RHOL-5.4:openshift-logging/kibana6-rhel8@sha256:167ee6a645c7397bde3d12e9b9685279505c25ffb3bda11ae68bdf0b34229f2e_amd64",
"8Base-RHOL-5.4:openshift-logging/kibana6-rhel8@sha256:4a029733337b10bb9fb8d98c91abc5451ca0b98713c8f2271a675251e025b6c0_s390x",
"8Base-RHOL-5.4:openshift-logging/kibana6-rhel8@sha256:812f4380024dc3df42310ad14d173d390f2bdf4b3dbdb02550c00552534f79ce_ppc64le",
"8Base-RHOL-5.4:openshift-logging/kibana6-rhel8@sha256:958ba6856cc76fc77d34a9c78888eb37b9c39b83a2f044ef2337610560ba9323_arm64",
"8Base-RHOL-5.4:openshift-logging/log-file-metric-exporter-rhel8@sha256:043e4d3481fbfedf3115e18fade3a2f33b891b0d9a641bf973c2c7f492cb0489_amd64",
"8Base-RHOL-5.4:openshift-logging/log-file-metric-exporter-rhel8@sha256:4fe26adac10cf20b83812e4fa513231d7e1fd4b6cd4e09d4fd425c391885cfcc_ppc64le",
"8Base-RHOL-5.4:openshift-logging/log-file-metric-exporter-rhel8@sha256:85827db708c0927027435b05732cc7e34b0675eaa86665c91efacc76aecd6227_s390x",
"8Base-RHOL-5.4:openshift-logging/log-file-metric-exporter-rhel8@sha256:a5285db276a5545fdbaa9f0743a49ba72ce1c5da61b5cccc9422320a03e08bea_arm64",
"8Base-RHOL-5.4:openshift-logging/logging-curator5-rhel8@sha256:0b28415b8115ff3216002faa5c9ecf3c46995085e3364c8028cb544cb4787ed2_arm64",
"8Base-RHOL-5.4:openshift-logging/logging-curator5-rhel8@sha256:7016e867ddfe970d6d2d54d5615e8f613786bcfbfe52ebf3139c07da3d5a53db_s390x",
"8Base-RHOL-5.4:openshift-logging/logging-curator5-rhel8@sha256:94c435f45e9dbd9fa633e137356cfb1d6ac2d4dd7574b359367665da42d6203d_amd64",
"8Base-RHOL-5.4:openshift-logging/logging-curator5-rhel8@sha256:d24afbc9228ef7f3d0a6fd716a3a57abde88a1f65d149c7df4f959a775b670bd_ppc64le",
"8Base-RHOL-5.4:openshift-logging/logging-loki-rhel8@sha256:40d4989b4733f54a01a73831fa00b12e49fff69c75138902eac0d894d432e4d9_arm64",
"8Base-RHOL-5.4:openshift-logging/logging-loki-rhel8@sha256:b444af35118c24bde0dfa2a8825ba427b3345451f6081133477254213a3460f0_amd64",
"8Base-RHOL-5.4:openshift-logging/logging-loki-rhel8@sha256:cfe410d498940a95da631ea213866a96a119034d78d5d53f7f9c7e8da56e0f45_s390x",
"8Base-RHOL-5.4:openshift-logging/logging-loki-rhel8@sha256:f7979c82140a0ab1a97c9f3151465bfbd9f79c4db9b0cc20f974cd7b890f074f_ppc64le",
"8Base-RHOL-5.4:openshift-logging/loki-operator-bundle@sha256:02cceda51028eb55a3b82aa5275f03dbaf8f8f9ab3fd27c650d1a07a93044e37_amd64",
"8Base-RHOL-5.4:openshift-logging/loki-rhel8-operator@sha256:0f1be625b4012820f7ac439fed000808d7acb4e885ace16014461bf802be935a_s390x",
"8Base-RHOL-5.4:openshift-logging/loki-rhel8-operator@sha256:28f45a80846c5e11638fb479be42cafcb2bdb3af94dff3629a820de295cbe31d_ppc64le",
"8Base-RHOL-5.4:openshift-logging/loki-rhel8-operator@sha256:df7de1e9f5a4396df6f14b1c4b6bb2a9ae4bc50d82cbc954ec535c26e8df2cb1_arm64",
"8Base-RHOL-5.4:openshift-logging/loki-rhel8-operator@sha256:f8a35557c9eb27f703ffa9320a9d39a2361d93fdb0b8c874d97da458048e7eec_amd64",
"8Base-RHOL-5.4:openshift-logging/lokistack-gateway-rhel8@sha256:178fcf44e6a1fa90d27a40565f69ae2880622b017bc8d9e33a441353eb45609d_arm64",
"8Base-RHOL-5.4:openshift-logging/lokistack-gateway-rhel8@sha256:7b0c2c99cf0f710166b749dbfd7f544caf5fe35516c743fca251c7cec896e1d6_ppc64le",
"8Base-RHOL-5.4:openshift-logging/lokistack-gateway-rhel8@sha256:9c4959525339b607a98889d56f4c26f2e4af25032466c439903a7f1cb593f721_s390x",
"8Base-RHOL-5.4:openshift-logging/lokistack-gateway-rhel8@sha256:a967d5be7d3a6fdd75965a5f9a7396a52cdcb37d6a8521c440b0b5c650c230f2_amd64",
"8Base-RHOL-5.4:openshift-logging/opa-openshift-rhel8@sha256:1b106af51bb50f1ce4db13ebbf6f6c67eae45611c0d5dc46476f1dfaa8aca166_arm64",
"8Base-RHOL-5.4:openshift-logging/opa-openshift-rhel8@sha256:92ddf24824c8f8ae93dec07184c446615b635389472d3a525df72da07c8d9b97_ppc64le",
"8Base-RHOL-5.4:openshift-logging/opa-openshift-rhel8@sha256:9fd0c5df785564b35392705a479d6fb9245e3329719438c76c0282f9ef2f2d55_amd64",
"8Base-RHOL-5.4:openshift-logging/opa-openshift-rhel8@sha256:be8ba0e4c5f24c7b4549700a25c89b10d4b2fc0b0e3888163bb53827914e95c1_s390x",
"8Base-RHOL-5.4:openshift-logging/vector-rhel8@sha256:48bb136d11b44428c87489978873370848ac2b219b107ef7e81ab679db095234_s390x",
"8Base-RHOL-5.4:openshift-logging/vector-rhel8@sha256:48f0317d167710ff5b0787c73f6b7dd0249e7c8d2d001159132a97299c30b62d_ppc64le",
"8Base-RHOL-5.4:openshift-logging/vector-rhel8@sha256:bde21c03fb831d01e85b28245881f7e3f2bb2ef6d2671eb92b2e0cc4bd3898e2_arm64",
"8Base-RHOL-5.4:openshift-logging/vector-rhel8@sha256:cc6b9c6a344aac56c99c96b5120ffe2dad479000b34964ff89d030ae762bda43_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-42003"
},
{
"category": "external",
"summary": "RHBZ#2135244",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2135244"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-42003",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42003"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-42003",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-42003"
}
],
"release_date": "2022-10-02T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-11-16T12:13:01+00:00",
"details": "For OpenShift Container Platform 4.10 see the following documentation, which will be updated shortly, for detailed release notes:\n\nhttps://docs.openshift.com/container-platform/4.10/logging/cluster-logging-release-notes.html\n\nFor Red Hat OpenShift Logging 5.4, see the following instructions to apply this update:\n\nhttps://docs.openshift.com/container-platform/4.10/logging/cluster-logging-upgrading.html",
"product_ids": [
"8Base-RHOL-5.4:openshift-logging/elasticsearch-operator-bundle@sha256:7659606e0418a1920161b7ca67524ea6a7b1ed366b817f1a5cde0b346152243c_amd64",
"8Base-RHOL-5.4:openshift-logging/elasticsearch-proxy-rhel8@sha256:4f4e5bb267ad391bc0fc6a010ec9ecdf3bf48d5b6e9db0d2510960c13c97bd71_ppc64le",
"8Base-RHOL-5.4:openshift-logging/elasticsearch-proxy-rhel8@sha256:b9c2e58b39dc3de97013f8806178f6327bf2e4590fe55db144527d64d468f64f_s390x",
"8Base-RHOL-5.4:openshift-logging/elasticsearch-proxy-rhel8@sha256:c9a2b9e7cca14d9596ccbe0f64e2abe4452f91f029f42eefead43c9f526f6a58_arm64",
"8Base-RHOL-5.4:openshift-logging/elasticsearch-proxy-rhel8@sha256:e38c55762c1eef39b401c46d44c899067b1566173e1ce239f17a95c52b30d8c7_amd64",
"8Base-RHOL-5.4:openshift-logging/elasticsearch-rhel8-operator@sha256:2005f41e59a130bb86c2ec47d1b060e3e2ed32f9a4cef3897e2c05fc94043dbb_arm64",
"8Base-RHOL-5.4:openshift-logging/elasticsearch-rhel8-operator@sha256:6a55934cf7af0c03e06d4ec7a15a80acf53491fb7a183c16fdf8018fbf9b4174_ppc64le",
"8Base-RHOL-5.4:openshift-logging/elasticsearch-rhel8-operator@sha256:8ce04536772f31ad022b9c66cddc090d2962b44d66c06a1db56d1447be198326_amd64",
"8Base-RHOL-5.4:openshift-logging/elasticsearch-rhel8-operator@sha256:dd211d42eaad043d9bdb519e3ad6a86255b7280a2cdf47dd3fe0458a77cb110f_s390x",
"8Base-RHOL-5.4:openshift-logging/elasticsearch6-rhel8@sha256:17a9f3ae042b92693a374e3d60a07f2ab2e52419f8df25d446dd0654f6a858f6_ppc64le",
"8Base-RHOL-5.4:openshift-logging/elasticsearch6-rhel8@sha256:5b1cfc2f9a96601439cf17d1fe49a6bc6cad3b7273af87b23528090aefbfd915_s390x",
"8Base-RHOL-5.4:openshift-logging/elasticsearch6-rhel8@sha256:8e0ba10f91db4cb8786d0501ec33a3d54f7c7c5337e0495cc2286a6ea20cca20_arm64",
"8Base-RHOL-5.4:openshift-logging/elasticsearch6-rhel8@sha256:fa8182b69328077500f89becc7621b48efa8d99f34247c2e6855dcfec13980e3_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:7435"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"8Base-RHOL-5.4:openshift-logging/cluster-logging-operator-bundle@sha256:cb26d9e55f781dd535901a90f1ec2f8e02e8e1de72c0fde638c90fcc228ec4b2_amd64",
"8Base-RHOL-5.4:openshift-logging/cluster-logging-rhel8-operator@sha256:617cc8b0011110981674b75fe1e3041bfa434c952e4a0193818b971edbc7a480_s390x",
"8Base-RHOL-5.4:openshift-logging/cluster-logging-rhel8-operator@sha256:637df49756fe85e7b38b279ffa7672d72c658d3d47df7f9dada2dd70563af83b_arm64",
"8Base-RHOL-5.4:openshift-logging/cluster-logging-rhel8-operator@sha256:aa1602fe2abe23bd8a4c791bc45d425686a6e6d1aab4face0fac28bfc7cebbe1_ppc64le",
"8Base-RHOL-5.4:openshift-logging/cluster-logging-rhel8-operator@sha256:c698b52c46d41007e5ac4f90b9540d430820bd20a93468fddd3a949c7ef5b332_amd64",
"8Base-RHOL-5.4:openshift-logging/elasticsearch-operator-bundle@sha256:7659606e0418a1920161b7ca67524ea6a7b1ed366b817f1a5cde0b346152243c_amd64",
"8Base-RHOL-5.4:openshift-logging/elasticsearch-proxy-rhel8@sha256:4f4e5bb267ad391bc0fc6a010ec9ecdf3bf48d5b6e9db0d2510960c13c97bd71_ppc64le",
"8Base-RHOL-5.4:openshift-logging/elasticsearch-proxy-rhel8@sha256:b9c2e58b39dc3de97013f8806178f6327bf2e4590fe55db144527d64d468f64f_s390x",
"8Base-RHOL-5.4:openshift-logging/elasticsearch-proxy-rhel8@sha256:c9a2b9e7cca14d9596ccbe0f64e2abe4452f91f029f42eefead43c9f526f6a58_arm64",
"8Base-RHOL-5.4:openshift-logging/elasticsearch-proxy-rhel8@sha256:e38c55762c1eef39b401c46d44c899067b1566173e1ce239f17a95c52b30d8c7_amd64",
"8Base-RHOL-5.4:openshift-logging/elasticsearch-rhel8-operator@sha256:2005f41e59a130bb86c2ec47d1b060e3e2ed32f9a4cef3897e2c05fc94043dbb_arm64",
"8Base-RHOL-5.4:openshift-logging/elasticsearch-rhel8-operator@sha256:6a55934cf7af0c03e06d4ec7a15a80acf53491fb7a183c16fdf8018fbf9b4174_ppc64le",
"8Base-RHOL-5.4:openshift-logging/elasticsearch-rhel8-operator@sha256:8ce04536772f31ad022b9c66cddc090d2962b44d66c06a1db56d1447be198326_amd64",
"8Base-RHOL-5.4:openshift-logging/elasticsearch-rhel8-operator@sha256:dd211d42eaad043d9bdb519e3ad6a86255b7280a2cdf47dd3fe0458a77cb110f_s390x",
"8Base-RHOL-5.4:openshift-logging/elasticsearch6-rhel8@sha256:17a9f3ae042b92693a374e3d60a07f2ab2e52419f8df25d446dd0654f6a858f6_ppc64le",
"8Base-RHOL-5.4:openshift-logging/elasticsearch6-rhel8@sha256:5b1cfc2f9a96601439cf17d1fe49a6bc6cad3b7273af87b23528090aefbfd915_s390x",
"8Base-RHOL-5.4:openshift-logging/elasticsearch6-rhel8@sha256:8e0ba10f91db4cb8786d0501ec33a3d54f7c7c5337e0495cc2286a6ea20cca20_arm64",
"8Base-RHOL-5.4:openshift-logging/elasticsearch6-rhel8@sha256:fa8182b69328077500f89becc7621b48efa8d99f34247c2e6855dcfec13980e3_amd64",
"8Base-RHOL-5.4:openshift-logging/eventrouter-rhel8@sha256:4438a3bba34418a9dc566bf15f6b4764de4295ab8b05a7b1a86f9e8cd332b3f7_arm64",
"8Base-RHOL-5.4:openshift-logging/eventrouter-rhel8@sha256:bc408fc4b0482c5eb1b0deb3a9090f3e3dd9b370001d54cd076254562c72fec9_ppc64le",
"8Base-RHOL-5.4:openshift-logging/eventrouter-rhel8@sha256:d50a2b89442d04b1163c01b3a3951857a95df76c57b14e7f51d835c3ac6d75b3_amd64",
"8Base-RHOL-5.4:openshift-logging/eventrouter-rhel8@sha256:f05aee8433dec1c9f6cf835038f9e5a47847d4095383bf3c22ca57c3fb69fa98_s390x",
"8Base-RHOL-5.4:openshift-logging/fluentd-rhel8@sha256:150e17cb645cf2f4cb7ab592572dd3abd145d9a33e790778280e256666248022_amd64",
"8Base-RHOL-5.4:openshift-logging/fluentd-rhel8@sha256:36aecf05ca3cdaf29982b3efa4a1c97087be29b0a58c9777e6b0c11a34861aa8_s390x",
"8Base-RHOL-5.4:openshift-logging/fluentd-rhel8@sha256:e3a51d2bdc632b8376e28c33e9d4fac3464e3a84a313a17246b1f1cf21cb5710_arm64",
"8Base-RHOL-5.4:openshift-logging/fluentd-rhel8@sha256:ea07da04f06df6bf0d9dd981a3795dfdb51eca83f59a6291114650e3e98a9e71_ppc64le",
"8Base-RHOL-5.4:openshift-logging/kibana6-rhel8@sha256:167ee6a645c7397bde3d12e9b9685279505c25ffb3bda11ae68bdf0b34229f2e_amd64",
"8Base-RHOL-5.4:openshift-logging/kibana6-rhel8@sha256:4a029733337b10bb9fb8d98c91abc5451ca0b98713c8f2271a675251e025b6c0_s390x",
"8Base-RHOL-5.4:openshift-logging/kibana6-rhel8@sha256:812f4380024dc3df42310ad14d173d390f2bdf4b3dbdb02550c00552534f79ce_ppc64le",
"8Base-RHOL-5.4:openshift-logging/kibana6-rhel8@sha256:958ba6856cc76fc77d34a9c78888eb37b9c39b83a2f044ef2337610560ba9323_arm64",
"8Base-RHOL-5.4:openshift-logging/log-file-metric-exporter-rhel8@sha256:043e4d3481fbfedf3115e18fade3a2f33b891b0d9a641bf973c2c7f492cb0489_amd64",
"8Base-RHOL-5.4:openshift-logging/log-file-metric-exporter-rhel8@sha256:4fe26adac10cf20b83812e4fa513231d7e1fd4b6cd4e09d4fd425c391885cfcc_ppc64le",
"8Base-RHOL-5.4:openshift-logging/log-file-metric-exporter-rhel8@sha256:85827db708c0927027435b05732cc7e34b0675eaa86665c91efacc76aecd6227_s390x",
"8Base-RHOL-5.4:openshift-logging/log-file-metric-exporter-rhel8@sha256:a5285db276a5545fdbaa9f0743a49ba72ce1c5da61b5cccc9422320a03e08bea_arm64",
"8Base-RHOL-5.4:openshift-logging/logging-curator5-rhel8@sha256:0b28415b8115ff3216002faa5c9ecf3c46995085e3364c8028cb544cb4787ed2_arm64",
"8Base-RHOL-5.4:openshift-logging/logging-curator5-rhel8@sha256:7016e867ddfe970d6d2d54d5615e8f613786bcfbfe52ebf3139c07da3d5a53db_s390x",
"8Base-RHOL-5.4:openshift-logging/logging-curator5-rhel8@sha256:94c435f45e9dbd9fa633e137356cfb1d6ac2d4dd7574b359367665da42d6203d_amd64",
"8Base-RHOL-5.4:openshift-logging/logging-curator5-rhel8@sha256:d24afbc9228ef7f3d0a6fd716a3a57abde88a1f65d149c7df4f959a775b670bd_ppc64le",
"8Base-RHOL-5.4:openshift-logging/logging-loki-rhel8@sha256:40d4989b4733f54a01a73831fa00b12e49fff69c75138902eac0d894d432e4d9_arm64",
"8Base-RHOL-5.4:openshift-logging/logging-loki-rhel8@sha256:b444af35118c24bde0dfa2a8825ba427b3345451f6081133477254213a3460f0_amd64",
"8Base-RHOL-5.4:openshift-logging/logging-loki-rhel8@sha256:cfe410d498940a95da631ea213866a96a119034d78d5d53f7f9c7e8da56e0f45_s390x",
"8Base-RHOL-5.4:openshift-logging/logging-loki-rhel8@sha256:f7979c82140a0ab1a97c9f3151465bfbd9f79c4db9b0cc20f974cd7b890f074f_ppc64le",
"8Base-RHOL-5.4:openshift-logging/loki-operator-bundle@sha256:02cceda51028eb55a3b82aa5275f03dbaf8f8f9ab3fd27c650d1a07a93044e37_amd64",
"8Base-RHOL-5.4:openshift-logging/loki-rhel8-operator@sha256:0f1be625b4012820f7ac439fed000808d7acb4e885ace16014461bf802be935a_s390x",
"8Base-RHOL-5.4:openshift-logging/loki-rhel8-operator@sha256:28f45a80846c5e11638fb479be42cafcb2bdb3af94dff3629a820de295cbe31d_ppc64le",
"8Base-RHOL-5.4:openshift-logging/loki-rhel8-operator@sha256:df7de1e9f5a4396df6f14b1c4b6bb2a9ae4bc50d82cbc954ec535c26e8df2cb1_arm64",
"8Base-RHOL-5.4:openshift-logging/loki-rhel8-operator@sha256:f8a35557c9eb27f703ffa9320a9d39a2361d93fdb0b8c874d97da458048e7eec_amd64",
"8Base-RHOL-5.4:openshift-logging/lokistack-gateway-rhel8@sha256:178fcf44e6a1fa90d27a40565f69ae2880622b017bc8d9e33a441353eb45609d_arm64",
"8Base-RHOL-5.4:openshift-logging/lokistack-gateway-rhel8@sha256:7b0c2c99cf0f710166b749dbfd7f544caf5fe35516c743fca251c7cec896e1d6_ppc64le",
"8Base-RHOL-5.4:openshift-logging/lokistack-gateway-rhel8@sha256:9c4959525339b607a98889d56f4c26f2e4af25032466c439903a7f1cb593f721_s390x",
"8Base-RHOL-5.4:openshift-logging/lokistack-gateway-rhel8@sha256:a967d5be7d3a6fdd75965a5f9a7396a52cdcb37d6a8521c440b0b5c650c230f2_amd64",
"8Base-RHOL-5.4:openshift-logging/opa-openshift-rhel8@sha256:1b106af51bb50f1ce4db13ebbf6f6c67eae45611c0d5dc46476f1dfaa8aca166_arm64",
"8Base-RHOL-5.4:openshift-logging/opa-openshift-rhel8@sha256:92ddf24824c8f8ae93dec07184c446615b635389472d3a525df72da07c8d9b97_ppc64le",
"8Base-RHOL-5.4:openshift-logging/opa-openshift-rhel8@sha256:9fd0c5df785564b35392705a479d6fb9245e3329719438c76c0282f9ef2f2d55_amd64",
"8Base-RHOL-5.4:openshift-logging/opa-openshift-rhel8@sha256:be8ba0e4c5f24c7b4549700a25c89b10d4b2fc0b0e3888163bb53827914e95c1_s390x",
"8Base-RHOL-5.4:openshift-logging/vector-rhel8@sha256:48bb136d11b44428c87489978873370848ac2b219b107ef7e81ab679db095234_s390x",
"8Base-RHOL-5.4:openshift-logging/vector-rhel8@sha256:48f0317d167710ff5b0787c73f6b7dd0249e7c8d2d001159132a97299c30b62d_ppc64le",
"8Base-RHOL-5.4:openshift-logging/vector-rhel8@sha256:bde21c03fb831d01e85b28245881f7e3f2bb2ef6d2671eb92b2e0cc4bd3898e2_arm64",
"8Base-RHOL-5.4:openshift-logging/vector-rhel8@sha256:cc6b9c6a344aac56c99c96b5120ffe2dad479000b34964ff89d030ae762bda43_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "jackson-databind: deep wrapper array nesting wrt UNWRAP_SINGLE_VALUE_ARRAYS"
},
{
"cve": "CVE-2022-42004",
"cwe": {
"id": "CWE-502",
"name": "Deserialization of Untrusted Data"
},
"discovery_date": "2022-10-17T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-RHOL-5.4:openshift-logging/cluster-logging-operator-bundle@sha256:cb26d9e55f781dd535901a90f1ec2f8e02e8e1de72c0fde638c90fcc228ec4b2_amd64",
"8Base-RHOL-5.4:openshift-logging/cluster-logging-rhel8-operator@sha256:617cc8b0011110981674b75fe1e3041bfa434c952e4a0193818b971edbc7a480_s390x",
"8Base-RHOL-5.4:openshift-logging/cluster-logging-rhel8-operator@sha256:637df49756fe85e7b38b279ffa7672d72c658d3d47df7f9dada2dd70563af83b_arm64",
"8Base-RHOL-5.4:openshift-logging/cluster-logging-rhel8-operator@sha256:aa1602fe2abe23bd8a4c791bc45d425686a6e6d1aab4face0fac28bfc7cebbe1_ppc64le",
"8Base-RHOL-5.4:openshift-logging/cluster-logging-rhel8-operator@sha256:c698b52c46d41007e5ac4f90b9540d430820bd20a93468fddd3a949c7ef5b332_amd64",
"8Base-RHOL-5.4:openshift-logging/eventrouter-rhel8@sha256:4438a3bba34418a9dc566bf15f6b4764de4295ab8b05a7b1a86f9e8cd332b3f7_arm64",
"8Base-RHOL-5.4:openshift-logging/eventrouter-rhel8@sha256:bc408fc4b0482c5eb1b0deb3a9090f3e3dd9b370001d54cd076254562c72fec9_ppc64le",
"8Base-RHOL-5.4:openshift-logging/eventrouter-rhel8@sha256:d50a2b89442d04b1163c01b3a3951857a95df76c57b14e7f51d835c3ac6d75b3_amd64",
"8Base-RHOL-5.4:openshift-logging/eventrouter-rhel8@sha256:f05aee8433dec1c9f6cf835038f9e5a47847d4095383bf3c22ca57c3fb69fa98_s390x",
"8Base-RHOL-5.4:openshift-logging/fluentd-rhel8@sha256:150e17cb645cf2f4cb7ab592572dd3abd145d9a33e790778280e256666248022_amd64",
"8Base-RHOL-5.4:openshift-logging/fluentd-rhel8@sha256:36aecf05ca3cdaf29982b3efa4a1c97087be29b0a58c9777e6b0c11a34861aa8_s390x",
"8Base-RHOL-5.4:openshift-logging/fluentd-rhel8@sha256:e3a51d2bdc632b8376e28c33e9d4fac3464e3a84a313a17246b1f1cf21cb5710_arm64",
"8Base-RHOL-5.4:openshift-logging/fluentd-rhel8@sha256:ea07da04f06df6bf0d9dd981a3795dfdb51eca83f59a6291114650e3e98a9e71_ppc64le",
"8Base-RHOL-5.4:openshift-logging/kibana6-rhel8@sha256:167ee6a645c7397bde3d12e9b9685279505c25ffb3bda11ae68bdf0b34229f2e_amd64",
"8Base-RHOL-5.4:openshift-logging/kibana6-rhel8@sha256:4a029733337b10bb9fb8d98c91abc5451ca0b98713c8f2271a675251e025b6c0_s390x",
"8Base-RHOL-5.4:openshift-logging/kibana6-rhel8@sha256:812f4380024dc3df42310ad14d173d390f2bdf4b3dbdb02550c00552534f79ce_ppc64le",
"8Base-RHOL-5.4:openshift-logging/kibana6-rhel8@sha256:958ba6856cc76fc77d34a9c78888eb37b9c39b83a2f044ef2337610560ba9323_arm64",
"8Base-RHOL-5.4:openshift-logging/log-file-metric-exporter-rhel8@sha256:043e4d3481fbfedf3115e18fade3a2f33b891b0d9a641bf973c2c7f492cb0489_amd64",
"8Base-RHOL-5.4:openshift-logging/log-file-metric-exporter-rhel8@sha256:4fe26adac10cf20b83812e4fa513231d7e1fd4b6cd4e09d4fd425c391885cfcc_ppc64le",
"8Base-RHOL-5.4:openshift-logging/log-file-metric-exporter-rhel8@sha256:85827db708c0927027435b05732cc7e34b0675eaa86665c91efacc76aecd6227_s390x",
"8Base-RHOL-5.4:openshift-logging/log-file-metric-exporter-rhel8@sha256:a5285db276a5545fdbaa9f0743a49ba72ce1c5da61b5cccc9422320a03e08bea_arm64",
"8Base-RHOL-5.4:openshift-logging/logging-curator5-rhel8@sha256:0b28415b8115ff3216002faa5c9ecf3c46995085e3364c8028cb544cb4787ed2_arm64",
"8Base-RHOL-5.4:openshift-logging/logging-curator5-rhel8@sha256:7016e867ddfe970d6d2d54d5615e8f613786bcfbfe52ebf3139c07da3d5a53db_s390x",
"8Base-RHOL-5.4:openshift-logging/logging-curator5-rhel8@sha256:94c435f45e9dbd9fa633e137356cfb1d6ac2d4dd7574b359367665da42d6203d_amd64",
"8Base-RHOL-5.4:openshift-logging/logging-curator5-rhel8@sha256:d24afbc9228ef7f3d0a6fd716a3a57abde88a1f65d149c7df4f959a775b670bd_ppc64le",
"8Base-RHOL-5.4:openshift-logging/logging-loki-rhel8@sha256:40d4989b4733f54a01a73831fa00b12e49fff69c75138902eac0d894d432e4d9_arm64",
"8Base-RHOL-5.4:openshift-logging/logging-loki-rhel8@sha256:b444af35118c24bde0dfa2a8825ba427b3345451f6081133477254213a3460f0_amd64",
"8Base-RHOL-5.4:openshift-logging/logging-loki-rhel8@sha256:cfe410d498940a95da631ea213866a96a119034d78d5d53f7f9c7e8da56e0f45_s390x",
"8Base-RHOL-5.4:openshift-logging/logging-loki-rhel8@sha256:f7979c82140a0ab1a97c9f3151465bfbd9f79c4db9b0cc20f974cd7b890f074f_ppc64le",
"8Base-RHOL-5.4:openshift-logging/loki-operator-bundle@sha256:02cceda51028eb55a3b82aa5275f03dbaf8f8f9ab3fd27c650d1a07a93044e37_amd64",
"8Base-RHOL-5.4:openshift-logging/loki-rhel8-operator@sha256:0f1be625b4012820f7ac439fed000808d7acb4e885ace16014461bf802be935a_s390x",
"8Base-RHOL-5.4:openshift-logging/loki-rhel8-operator@sha256:28f45a80846c5e11638fb479be42cafcb2bdb3af94dff3629a820de295cbe31d_ppc64le",
"8Base-RHOL-5.4:openshift-logging/loki-rhel8-operator@sha256:df7de1e9f5a4396df6f14b1c4b6bb2a9ae4bc50d82cbc954ec535c26e8df2cb1_arm64",
"8Base-RHOL-5.4:openshift-logging/loki-rhel8-operator@sha256:f8a35557c9eb27f703ffa9320a9d39a2361d93fdb0b8c874d97da458048e7eec_amd64",
"8Base-RHOL-5.4:openshift-logging/lokistack-gateway-rhel8@sha256:178fcf44e6a1fa90d27a40565f69ae2880622b017bc8d9e33a441353eb45609d_arm64",
"8Base-RHOL-5.4:openshift-logging/lokistack-gateway-rhel8@sha256:7b0c2c99cf0f710166b749dbfd7f544caf5fe35516c743fca251c7cec896e1d6_ppc64le",
"8Base-RHOL-5.4:openshift-logging/lokistack-gateway-rhel8@sha256:9c4959525339b607a98889d56f4c26f2e4af25032466c439903a7f1cb593f721_s390x",
"8Base-RHOL-5.4:openshift-logging/lokistack-gateway-rhel8@sha256:a967d5be7d3a6fdd75965a5f9a7396a52cdcb37d6a8521c440b0b5c650c230f2_amd64",
"8Base-RHOL-5.4:openshift-logging/opa-openshift-rhel8@sha256:1b106af51bb50f1ce4db13ebbf6f6c67eae45611c0d5dc46476f1dfaa8aca166_arm64",
"8Base-RHOL-5.4:openshift-logging/opa-openshift-rhel8@sha256:92ddf24824c8f8ae93dec07184c446615b635389472d3a525df72da07c8d9b97_ppc64le",
"8Base-RHOL-5.4:openshift-logging/opa-openshift-rhel8@sha256:9fd0c5df785564b35392705a479d6fb9245e3329719438c76c0282f9ef2f2d55_amd64",
"8Base-RHOL-5.4:openshift-logging/opa-openshift-rhel8@sha256:be8ba0e4c5f24c7b4549700a25c89b10d4b2fc0b0e3888163bb53827914e95c1_s390x",
"8Base-RHOL-5.4:openshift-logging/vector-rhel8@sha256:48bb136d11b44428c87489978873370848ac2b219b107ef7e81ab679db095234_s390x",
"8Base-RHOL-5.4:openshift-logging/vector-rhel8@sha256:48f0317d167710ff5b0787c73f6b7dd0249e7c8d2d001159132a97299c30b62d_ppc64le",
"8Base-RHOL-5.4:openshift-logging/vector-rhel8@sha256:bde21c03fb831d01e85b28245881f7e3f2bb2ef6d2671eb92b2e0cc4bd3898e2_arm64",
"8Base-RHOL-5.4:openshift-logging/vector-rhel8@sha256:cc6b9c6a344aac56c99c96b5120ffe2dad479000b34964ff89d030ae762bda43_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2135247"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found In FasterXML jackson-databind. This issue could allow an attacker to benefit from resource exhaustion due to the lack of a check in BeanDeserializer._deserializeFromArray to prevent the use of deeply nested arrays. An application is only vulnerable with certain customized choices for deserialization.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "jackson-databind: use of deeply nested arrays",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-RHOL-5.4:openshift-logging/elasticsearch-operator-bundle@sha256:7659606e0418a1920161b7ca67524ea6a7b1ed366b817f1a5cde0b346152243c_amd64",
"8Base-RHOL-5.4:openshift-logging/elasticsearch-proxy-rhel8@sha256:4f4e5bb267ad391bc0fc6a010ec9ecdf3bf48d5b6e9db0d2510960c13c97bd71_ppc64le",
"8Base-RHOL-5.4:openshift-logging/elasticsearch-proxy-rhel8@sha256:b9c2e58b39dc3de97013f8806178f6327bf2e4590fe55db144527d64d468f64f_s390x",
"8Base-RHOL-5.4:openshift-logging/elasticsearch-proxy-rhel8@sha256:c9a2b9e7cca14d9596ccbe0f64e2abe4452f91f029f42eefead43c9f526f6a58_arm64",
"8Base-RHOL-5.4:openshift-logging/elasticsearch-proxy-rhel8@sha256:e38c55762c1eef39b401c46d44c899067b1566173e1ce239f17a95c52b30d8c7_amd64",
"8Base-RHOL-5.4:openshift-logging/elasticsearch-rhel8-operator@sha256:2005f41e59a130bb86c2ec47d1b060e3e2ed32f9a4cef3897e2c05fc94043dbb_arm64",
"8Base-RHOL-5.4:openshift-logging/elasticsearch-rhel8-operator@sha256:6a55934cf7af0c03e06d4ec7a15a80acf53491fb7a183c16fdf8018fbf9b4174_ppc64le",
"8Base-RHOL-5.4:openshift-logging/elasticsearch-rhel8-operator@sha256:8ce04536772f31ad022b9c66cddc090d2962b44d66c06a1db56d1447be198326_amd64",
"8Base-RHOL-5.4:openshift-logging/elasticsearch-rhel8-operator@sha256:dd211d42eaad043d9bdb519e3ad6a86255b7280a2cdf47dd3fe0458a77cb110f_s390x",
"8Base-RHOL-5.4:openshift-logging/elasticsearch6-rhel8@sha256:17a9f3ae042b92693a374e3d60a07f2ab2e52419f8df25d446dd0654f6a858f6_ppc64le",
"8Base-RHOL-5.4:openshift-logging/elasticsearch6-rhel8@sha256:5b1cfc2f9a96601439cf17d1fe49a6bc6cad3b7273af87b23528090aefbfd915_s390x",
"8Base-RHOL-5.4:openshift-logging/elasticsearch6-rhel8@sha256:8e0ba10f91db4cb8786d0501ec33a3d54f7c7c5337e0495cc2286a6ea20cca20_arm64",
"8Base-RHOL-5.4:openshift-logging/elasticsearch6-rhel8@sha256:fa8182b69328077500f89becc7621b48efa8d99f34247c2e6855dcfec13980e3_amd64"
],
"known_not_affected": [
"8Base-RHOL-5.4:openshift-logging/cluster-logging-operator-bundle@sha256:cb26d9e55f781dd535901a90f1ec2f8e02e8e1de72c0fde638c90fcc228ec4b2_amd64",
"8Base-RHOL-5.4:openshift-logging/cluster-logging-rhel8-operator@sha256:617cc8b0011110981674b75fe1e3041bfa434c952e4a0193818b971edbc7a480_s390x",
"8Base-RHOL-5.4:openshift-logging/cluster-logging-rhel8-operator@sha256:637df49756fe85e7b38b279ffa7672d72c658d3d47df7f9dada2dd70563af83b_arm64",
"8Base-RHOL-5.4:openshift-logging/cluster-logging-rhel8-operator@sha256:aa1602fe2abe23bd8a4c791bc45d425686a6e6d1aab4face0fac28bfc7cebbe1_ppc64le",
"8Base-RHOL-5.4:openshift-logging/cluster-logging-rhel8-operator@sha256:c698b52c46d41007e5ac4f90b9540d430820bd20a93468fddd3a949c7ef5b332_amd64",
"8Base-RHOL-5.4:openshift-logging/eventrouter-rhel8@sha256:4438a3bba34418a9dc566bf15f6b4764de4295ab8b05a7b1a86f9e8cd332b3f7_arm64",
"8Base-RHOL-5.4:openshift-logging/eventrouter-rhel8@sha256:bc408fc4b0482c5eb1b0deb3a9090f3e3dd9b370001d54cd076254562c72fec9_ppc64le",
"8Base-RHOL-5.4:openshift-logging/eventrouter-rhel8@sha256:d50a2b89442d04b1163c01b3a3951857a95df76c57b14e7f51d835c3ac6d75b3_amd64",
"8Base-RHOL-5.4:openshift-logging/eventrouter-rhel8@sha256:f05aee8433dec1c9f6cf835038f9e5a47847d4095383bf3c22ca57c3fb69fa98_s390x",
"8Base-RHOL-5.4:openshift-logging/fluentd-rhel8@sha256:150e17cb645cf2f4cb7ab592572dd3abd145d9a33e790778280e256666248022_amd64",
"8Base-RHOL-5.4:openshift-logging/fluentd-rhel8@sha256:36aecf05ca3cdaf29982b3efa4a1c97087be29b0a58c9777e6b0c11a34861aa8_s390x",
"8Base-RHOL-5.4:openshift-logging/fluentd-rhel8@sha256:e3a51d2bdc632b8376e28c33e9d4fac3464e3a84a313a17246b1f1cf21cb5710_arm64",
"8Base-RHOL-5.4:openshift-logging/fluentd-rhel8@sha256:ea07da04f06df6bf0d9dd981a3795dfdb51eca83f59a6291114650e3e98a9e71_ppc64le",
"8Base-RHOL-5.4:openshift-logging/kibana6-rhel8@sha256:167ee6a645c7397bde3d12e9b9685279505c25ffb3bda11ae68bdf0b34229f2e_amd64",
"8Base-RHOL-5.4:openshift-logging/kibana6-rhel8@sha256:4a029733337b10bb9fb8d98c91abc5451ca0b98713c8f2271a675251e025b6c0_s390x",
"8Base-RHOL-5.4:openshift-logging/kibana6-rhel8@sha256:812f4380024dc3df42310ad14d173d390f2bdf4b3dbdb02550c00552534f79ce_ppc64le",
"8Base-RHOL-5.4:openshift-logging/kibana6-rhel8@sha256:958ba6856cc76fc77d34a9c78888eb37b9c39b83a2f044ef2337610560ba9323_arm64",
"8Base-RHOL-5.4:openshift-logging/log-file-metric-exporter-rhel8@sha256:043e4d3481fbfedf3115e18fade3a2f33b891b0d9a641bf973c2c7f492cb0489_amd64",
"8Base-RHOL-5.4:openshift-logging/log-file-metric-exporter-rhel8@sha256:4fe26adac10cf20b83812e4fa513231d7e1fd4b6cd4e09d4fd425c391885cfcc_ppc64le",
"8Base-RHOL-5.4:openshift-logging/log-file-metric-exporter-rhel8@sha256:85827db708c0927027435b05732cc7e34b0675eaa86665c91efacc76aecd6227_s390x",
"8Base-RHOL-5.4:openshift-logging/log-file-metric-exporter-rhel8@sha256:a5285db276a5545fdbaa9f0743a49ba72ce1c5da61b5cccc9422320a03e08bea_arm64",
"8Base-RHOL-5.4:openshift-logging/logging-curator5-rhel8@sha256:0b28415b8115ff3216002faa5c9ecf3c46995085e3364c8028cb544cb4787ed2_arm64",
"8Base-RHOL-5.4:openshift-logging/logging-curator5-rhel8@sha256:7016e867ddfe970d6d2d54d5615e8f613786bcfbfe52ebf3139c07da3d5a53db_s390x",
"8Base-RHOL-5.4:openshift-logging/logging-curator5-rhel8@sha256:94c435f45e9dbd9fa633e137356cfb1d6ac2d4dd7574b359367665da42d6203d_amd64",
"8Base-RHOL-5.4:openshift-logging/logging-curator5-rhel8@sha256:d24afbc9228ef7f3d0a6fd716a3a57abde88a1f65d149c7df4f959a775b670bd_ppc64le",
"8Base-RHOL-5.4:openshift-logging/logging-loki-rhel8@sha256:40d4989b4733f54a01a73831fa00b12e49fff69c75138902eac0d894d432e4d9_arm64",
"8Base-RHOL-5.4:openshift-logging/logging-loki-rhel8@sha256:b444af35118c24bde0dfa2a8825ba427b3345451f6081133477254213a3460f0_amd64",
"8Base-RHOL-5.4:openshift-logging/logging-loki-rhel8@sha256:cfe410d498940a95da631ea213866a96a119034d78d5d53f7f9c7e8da56e0f45_s390x",
"8Base-RHOL-5.4:openshift-logging/logging-loki-rhel8@sha256:f7979c82140a0ab1a97c9f3151465bfbd9f79c4db9b0cc20f974cd7b890f074f_ppc64le",
"8Base-RHOL-5.4:openshift-logging/loki-operator-bundle@sha256:02cceda51028eb55a3b82aa5275f03dbaf8f8f9ab3fd27c650d1a07a93044e37_amd64",
"8Base-RHOL-5.4:openshift-logging/loki-rhel8-operator@sha256:0f1be625b4012820f7ac439fed000808d7acb4e885ace16014461bf802be935a_s390x",
"8Base-RHOL-5.4:openshift-logging/loki-rhel8-operator@sha256:28f45a80846c5e11638fb479be42cafcb2bdb3af94dff3629a820de295cbe31d_ppc64le",
"8Base-RHOL-5.4:openshift-logging/loki-rhel8-operator@sha256:df7de1e9f5a4396df6f14b1c4b6bb2a9ae4bc50d82cbc954ec535c26e8df2cb1_arm64",
"8Base-RHOL-5.4:openshift-logging/loki-rhel8-operator@sha256:f8a35557c9eb27f703ffa9320a9d39a2361d93fdb0b8c874d97da458048e7eec_amd64",
"8Base-RHOL-5.4:openshift-logging/lokistack-gateway-rhel8@sha256:178fcf44e6a1fa90d27a40565f69ae2880622b017bc8d9e33a441353eb45609d_arm64",
"8Base-RHOL-5.4:openshift-logging/lokistack-gateway-rhel8@sha256:7b0c2c99cf0f710166b749dbfd7f544caf5fe35516c743fca251c7cec896e1d6_ppc64le",
"8Base-RHOL-5.4:openshift-logging/lokistack-gateway-rhel8@sha256:9c4959525339b607a98889d56f4c26f2e4af25032466c439903a7f1cb593f721_s390x",
"8Base-RHOL-5.4:openshift-logging/lokistack-gateway-rhel8@sha256:a967d5be7d3a6fdd75965a5f9a7396a52cdcb37d6a8521c440b0b5c650c230f2_amd64",
"8Base-RHOL-5.4:openshift-logging/opa-openshift-rhel8@sha256:1b106af51bb50f1ce4db13ebbf6f6c67eae45611c0d5dc46476f1dfaa8aca166_arm64",
"8Base-RHOL-5.4:openshift-logging/opa-openshift-rhel8@sha256:92ddf24824c8f8ae93dec07184c446615b635389472d3a525df72da07c8d9b97_ppc64le",
"8Base-RHOL-5.4:openshift-logging/opa-openshift-rhel8@sha256:9fd0c5df785564b35392705a479d6fb9245e3329719438c76c0282f9ef2f2d55_amd64",
"8Base-RHOL-5.4:openshift-logging/opa-openshift-rhel8@sha256:be8ba0e4c5f24c7b4549700a25c89b10d4b2fc0b0e3888163bb53827914e95c1_s390x",
"8Base-RHOL-5.4:openshift-logging/vector-rhel8@sha256:48bb136d11b44428c87489978873370848ac2b219b107ef7e81ab679db095234_s390x",
"8Base-RHOL-5.4:openshift-logging/vector-rhel8@sha256:48f0317d167710ff5b0787c73f6b7dd0249e7c8d2d001159132a97299c30b62d_ppc64le",
"8Base-RHOL-5.4:openshift-logging/vector-rhel8@sha256:bde21c03fb831d01e85b28245881f7e3f2bb2ef6d2671eb92b2e0cc4bd3898e2_arm64",
"8Base-RHOL-5.4:openshift-logging/vector-rhel8@sha256:cc6b9c6a344aac56c99c96b5120ffe2dad479000b34964ff89d030ae762bda43_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-42004"
},
{
"category": "external",
"summary": "RHBZ#2135247",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2135247"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-42004",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42004"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-42004",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-42004"
}
],
"release_date": "2022-10-02T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-11-16T12:13:01+00:00",
"details": "For OpenShift Container Platform 4.10 see the following documentation, which will be updated shortly, for detailed release notes:\n\nhttps://docs.openshift.com/container-platform/4.10/logging/cluster-logging-release-notes.html\n\nFor Red Hat OpenShift Logging 5.4, see the following instructions to apply this update:\n\nhttps://docs.openshift.com/container-platform/4.10/logging/cluster-logging-upgrading.html",
"product_ids": [
"8Base-RHOL-5.4:openshift-logging/elasticsearch-operator-bundle@sha256:7659606e0418a1920161b7ca67524ea6a7b1ed366b817f1a5cde0b346152243c_amd64",
"8Base-RHOL-5.4:openshift-logging/elasticsearch-proxy-rhel8@sha256:4f4e5bb267ad391bc0fc6a010ec9ecdf3bf48d5b6e9db0d2510960c13c97bd71_ppc64le",
"8Base-RHOL-5.4:openshift-logging/elasticsearch-proxy-rhel8@sha256:b9c2e58b39dc3de97013f8806178f6327bf2e4590fe55db144527d64d468f64f_s390x",
"8Base-RHOL-5.4:openshift-logging/elasticsearch-proxy-rhel8@sha256:c9a2b9e7cca14d9596ccbe0f64e2abe4452f91f029f42eefead43c9f526f6a58_arm64",
"8Base-RHOL-5.4:openshift-logging/elasticsearch-proxy-rhel8@sha256:e38c55762c1eef39b401c46d44c899067b1566173e1ce239f17a95c52b30d8c7_amd64",
"8Base-RHOL-5.4:openshift-logging/elasticsearch-rhel8-operator@sha256:2005f41e59a130bb86c2ec47d1b060e3e2ed32f9a4cef3897e2c05fc94043dbb_arm64",
"8Base-RHOL-5.4:openshift-logging/elasticsearch-rhel8-operator@sha256:6a55934cf7af0c03e06d4ec7a15a80acf53491fb7a183c16fdf8018fbf9b4174_ppc64le",
"8Base-RHOL-5.4:openshift-logging/elasticsearch-rhel8-operator@sha256:8ce04536772f31ad022b9c66cddc090d2962b44d66c06a1db56d1447be198326_amd64",
"8Base-RHOL-5.4:openshift-logging/elasticsearch-rhel8-operator@sha256:dd211d42eaad043d9bdb519e3ad6a86255b7280a2cdf47dd3fe0458a77cb110f_s390x",
"8Base-RHOL-5.4:openshift-logging/elasticsearch6-rhel8@sha256:17a9f3ae042b92693a374e3d60a07f2ab2e52419f8df25d446dd0654f6a858f6_ppc64le",
"8Base-RHOL-5.4:openshift-logging/elasticsearch6-rhel8@sha256:5b1cfc2f9a96601439cf17d1fe49a6bc6cad3b7273af87b23528090aefbfd915_s390x",
"8Base-RHOL-5.4:openshift-logging/elasticsearch6-rhel8@sha256:8e0ba10f91db4cb8786d0501ec33a3d54f7c7c5337e0495cc2286a6ea20cca20_arm64",
"8Base-RHOL-5.4:openshift-logging/elasticsearch6-rhel8@sha256:fa8182b69328077500f89becc7621b48efa8d99f34247c2e6855dcfec13980e3_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:7435"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"8Base-RHOL-5.4:openshift-logging/cluster-logging-operator-bundle@sha256:cb26d9e55f781dd535901a90f1ec2f8e02e8e1de72c0fde638c90fcc228ec4b2_amd64",
"8Base-RHOL-5.4:openshift-logging/cluster-logging-rhel8-operator@sha256:617cc8b0011110981674b75fe1e3041bfa434c952e4a0193818b971edbc7a480_s390x",
"8Base-RHOL-5.4:openshift-logging/cluster-logging-rhel8-operator@sha256:637df49756fe85e7b38b279ffa7672d72c658d3d47df7f9dada2dd70563af83b_arm64",
"8Base-RHOL-5.4:openshift-logging/cluster-logging-rhel8-operator@sha256:aa1602fe2abe23bd8a4c791bc45d425686a6e6d1aab4face0fac28bfc7cebbe1_ppc64le",
"8Base-RHOL-5.4:openshift-logging/cluster-logging-rhel8-operator@sha256:c698b52c46d41007e5ac4f90b9540d430820bd20a93468fddd3a949c7ef5b332_amd64",
"8Base-RHOL-5.4:openshift-logging/elasticsearch-operator-bundle@sha256:7659606e0418a1920161b7ca67524ea6a7b1ed366b817f1a5cde0b346152243c_amd64",
"8Base-RHOL-5.4:openshift-logging/elasticsearch-proxy-rhel8@sha256:4f4e5bb267ad391bc0fc6a010ec9ecdf3bf48d5b6e9db0d2510960c13c97bd71_ppc64le",
"8Base-RHOL-5.4:openshift-logging/elasticsearch-proxy-rhel8@sha256:b9c2e58b39dc3de97013f8806178f6327bf2e4590fe55db144527d64d468f64f_s390x",
"8Base-RHOL-5.4:openshift-logging/elasticsearch-proxy-rhel8@sha256:c9a2b9e7cca14d9596ccbe0f64e2abe4452f91f029f42eefead43c9f526f6a58_arm64",
"8Base-RHOL-5.4:openshift-logging/elasticsearch-proxy-rhel8@sha256:e38c55762c1eef39b401c46d44c899067b1566173e1ce239f17a95c52b30d8c7_amd64",
"8Base-RHOL-5.4:openshift-logging/elasticsearch-rhel8-operator@sha256:2005f41e59a130bb86c2ec47d1b060e3e2ed32f9a4cef3897e2c05fc94043dbb_arm64",
"8Base-RHOL-5.4:openshift-logging/elasticsearch-rhel8-operator@sha256:6a55934cf7af0c03e06d4ec7a15a80acf53491fb7a183c16fdf8018fbf9b4174_ppc64le",
"8Base-RHOL-5.4:openshift-logging/elasticsearch-rhel8-operator@sha256:8ce04536772f31ad022b9c66cddc090d2962b44d66c06a1db56d1447be198326_amd64",
"8Base-RHOL-5.4:openshift-logging/elasticsearch-rhel8-operator@sha256:dd211d42eaad043d9bdb519e3ad6a86255b7280a2cdf47dd3fe0458a77cb110f_s390x",
"8Base-RHOL-5.4:openshift-logging/elasticsearch6-rhel8@sha256:17a9f3ae042b92693a374e3d60a07f2ab2e52419f8df25d446dd0654f6a858f6_ppc64le",
"8Base-RHOL-5.4:openshift-logging/elasticsearch6-rhel8@sha256:5b1cfc2f9a96601439cf17d1fe49a6bc6cad3b7273af87b23528090aefbfd915_s390x",
"8Base-RHOL-5.4:openshift-logging/elasticsearch6-rhel8@sha256:8e0ba10f91db4cb8786d0501ec33a3d54f7c7c5337e0495cc2286a6ea20cca20_arm64",
"8Base-RHOL-5.4:openshift-logging/elasticsearch6-rhel8@sha256:fa8182b69328077500f89becc7621b48efa8d99f34247c2e6855dcfec13980e3_amd64",
"8Base-RHOL-5.4:openshift-logging/eventrouter-rhel8@sha256:4438a3bba34418a9dc566bf15f6b4764de4295ab8b05a7b1a86f9e8cd332b3f7_arm64",
"8Base-RHOL-5.4:openshift-logging/eventrouter-rhel8@sha256:bc408fc4b0482c5eb1b0deb3a9090f3e3dd9b370001d54cd076254562c72fec9_ppc64le",
"8Base-RHOL-5.4:openshift-logging/eventrouter-rhel8@sha256:d50a2b89442d04b1163c01b3a3951857a95df76c57b14e7f51d835c3ac6d75b3_amd64",
"8Base-RHOL-5.4:openshift-logging/eventrouter-rhel8@sha256:f05aee8433dec1c9f6cf835038f9e5a47847d4095383bf3c22ca57c3fb69fa98_s390x",
"8Base-RHOL-5.4:openshift-logging/fluentd-rhel8@sha256:150e17cb645cf2f4cb7ab592572dd3abd145d9a33e790778280e256666248022_amd64",
"8Base-RHOL-5.4:openshift-logging/fluentd-rhel8@sha256:36aecf05ca3cdaf29982b3efa4a1c97087be29b0a58c9777e6b0c11a34861aa8_s390x",
"8Base-RHOL-5.4:openshift-logging/fluentd-rhel8@sha256:e3a51d2bdc632b8376e28c33e9d4fac3464e3a84a313a17246b1f1cf21cb5710_arm64",
"8Base-RHOL-5.4:openshift-logging/fluentd-rhel8@sha256:ea07da04f06df6bf0d9dd981a3795dfdb51eca83f59a6291114650e3e98a9e71_ppc64le",
"8Base-RHOL-5.4:openshift-logging/kibana6-rhel8@sha256:167ee6a645c7397bde3d12e9b9685279505c25ffb3bda11ae68bdf0b34229f2e_amd64",
"8Base-RHOL-5.4:openshift-logging/kibana6-rhel8@sha256:4a029733337b10bb9fb8d98c91abc5451ca0b98713c8f2271a675251e025b6c0_s390x",
"8Base-RHOL-5.4:openshift-logging/kibana6-rhel8@sha256:812f4380024dc3df42310ad14d173d390f2bdf4b3dbdb02550c00552534f79ce_ppc64le",
"8Base-RHOL-5.4:openshift-logging/kibana6-rhel8@sha256:958ba6856cc76fc77d34a9c78888eb37b9c39b83a2f044ef2337610560ba9323_arm64",
"8Base-RHOL-5.4:openshift-logging/log-file-metric-exporter-rhel8@sha256:043e4d3481fbfedf3115e18fade3a2f33b891b0d9a641bf973c2c7f492cb0489_amd64",
"8Base-RHOL-5.4:openshift-logging/log-file-metric-exporter-rhel8@sha256:4fe26adac10cf20b83812e4fa513231d7e1fd4b6cd4e09d4fd425c391885cfcc_ppc64le",
"8Base-RHOL-5.4:openshift-logging/log-file-metric-exporter-rhel8@sha256:85827db708c0927027435b05732cc7e34b0675eaa86665c91efacc76aecd6227_s390x",
"8Base-RHOL-5.4:openshift-logging/log-file-metric-exporter-rhel8@sha256:a5285db276a5545fdbaa9f0743a49ba72ce1c5da61b5cccc9422320a03e08bea_arm64",
"8Base-RHOL-5.4:openshift-logging/logging-curator5-rhel8@sha256:0b28415b8115ff3216002faa5c9ecf3c46995085e3364c8028cb544cb4787ed2_arm64",
"8Base-RHOL-5.4:openshift-logging/logging-curator5-rhel8@sha256:7016e867ddfe970d6d2d54d5615e8f613786bcfbfe52ebf3139c07da3d5a53db_s390x",
"8Base-RHOL-5.4:openshift-logging/logging-curator5-rhel8@sha256:94c435f45e9dbd9fa633e137356cfb1d6ac2d4dd7574b359367665da42d6203d_amd64",
"8Base-RHOL-5.4:openshift-logging/logging-curator5-rhel8@sha256:d24afbc9228ef7f3d0a6fd716a3a57abde88a1f65d149c7df4f959a775b670bd_ppc64le",
"8Base-RHOL-5.4:openshift-logging/logging-loki-rhel8@sha256:40d4989b4733f54a01a73831fa00b12e49fff69c75138902eac0d894d432e4d9_arm64",
"8Base-RHOL-5.4:openshift-logging/logging-loki-rhel8@sha256:b444af35118c24bde0dfa2a8825ba427b3345451f6081133477254213a3460f0_amd64",
"8Base-RHOL-5.4:openshift-logging/logging-loki-rhel8@sha256:cfe410d498940a95da631ea213866a96a119034d78d5d53f7f9c7e8da56e0f45_s390x",
"8Base-RHOL-5.4:openshift-logging/logging-loki-rhel8@sha256:f7979c82140a0ab1a97c9f3151465bfbd9f79c4db9b0cc20f974cd7b890f074f_ppc64le",
"8Base-RHOL-5.4:openshift-logging/loki-operator-bundle@sha256:02cceda51028eb55a3b82aa5275f03dbaf8f8f9ab3fd27c650d1a07a93044e37_amd64",
"8Base-RHOL-5.4:openshift-logging/loki-rhel8-operator@sha256:0f1be625b4012820f7ac439fed000808d7acb4e885ace16014461bf802be935a_s390x",
"8Base-RHOL-5.4:openshift-logging/loki-rhel8-operator@sha256:28f45a80846c5e11638fb479be42cafcb2bdb3af94dff3629a820de295cbe31d_ppc64le",
"8Base-RHOL-5.4:openshift-logging/loki-rhel8-operator@sha256:df7de1e9f5a4396df6f14b1c4b6bb2a9ae4bc50d82cbc954ec535c26e8df2cb1_arm64",
"8Base-RHOL-5.4:openshift-logging/loki-rhel8-operator@sha256:f8a35557c9eb27f703ffa9320a9d39a2361d93fdb0b8c874d97da458048e7eec_amd64",
"8Base-RHOL-5.4:openshift-logging/lokistack-gateway-rhel8@sha256:178fcf44e6a1fa90d27a40565f69ae2880622b017bc8d9e33a441353eb45609d_arm64",
"8Base-RHOL-5.4:openshift-logging/lokistack-gateway-rhel8@sha256:7b0c2c99cf0f710166b749dbfd7f544caf5fe35516c743fca251c7cec896e1d6_ppc64le",
"8Base-RHOL-5.4:openshift-logging/lokistack-gateway-rhel8@sha256:9c4959525339b607a98889d56f4c26f2e4af25032466c439903a7f1cb593f721_s390x",
"8Base-RHOL-5.4:openshift-logging/lokistack-gateway-rhel8@sha256:a967d5be7d3a6fdd75965a5f9a7396a52cdcb37d6a8521c440b0b5c650c230f2_amd64",
"8Base-RHOL-5.4:openshift-logging/opa-openshift-rhel8@sha256:1b106af51bb50f1ce4db13ebbf6f6c67eae45611c0d5dc46476f1dfaa8aca166_arm64",
"8Base-RHOL-5.4:openshift-logging/opa-openshift-rhel8@sha256:92ddf24824c8f8ae93dec07184c446615b635389472d3a525df72da07c8d9b97_ppc64le",
"8Base-RHOL-5.4:openshift-logging/opa-openshift-rhel8@sha256:9fd0c5df785564b35392705a479d6fb9245e3329719438c76c0282f9ef2f2d55_amd64",
"8Base-RHOL-5.4:openshift-logging/opa-openshift-rhel8@sha256:be8ba0e4c5f24c7b4549700a25c89b10d4b2fc0b0e3888163bb53827914e95c1_s390x",
"8Base-RHOL-5.4:openshift-logging/vector-rhel8@sha256:48bb136d11b44428c87489978873370848ac2b219b107ef7e81ab679db095234_s390x",
"8Base-RHOL-5.4:openshift-logging/vector-rhel8@sha256:48f0317d167710ff5b0787c73f6b7dd0249e7c8d2d001159132a97299c30b62d_ppc64le",
"8Base-RHOL-5.4:openshift-logging/vector-rhel8@sha256:bde21c03fb831d01e85b28245881f7e3f2bb2ef6d2671eb92b2e0cc4bd3898e2_arm64",
"8Base-RHOL-5.4:openshift-logging/vector-rhel8@sha256:cc6b9c6a344aac56c99c96b5120ffe2dad479000b34964ff89d030ae762bda43_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "jackson-databind: use of deeply nested arrays"
}
]
}
rhsa-2023_0481
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Submariner 0.12.3 packages that fix various bugs and add various enhancements that are now available for Red Hat Advanced Cluster Management for Kubernetes version 2.5.\n\nRed Hat Product Security has rated this update as having a security impact\nof Moderate. A Common Vulnerability Scoring System (CVSS) base score,\nwhich gives a detailed severity rating, is available for each vulnerability\nfrom the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Submariner enables direct networking between pods and services on different Kubernetes clusters that are either on-premises or in the cloud.\n\nFor more information about Submariner, see the Submariner open source community website at: https://submariner.io/.\n\nThis advisory contains bug fixes and enhancements to the Submariner container images.\n\nMajor bug addressed: \n\nACM-2318: Submariner gateway node: Error updating load balancer with new hosts map\n\nSecurity fix:\n\n* CVE-2022-32149 golang: golang.org/x/text/language: ParseAcceptLanguage takes a long time to parse complex tags",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2023:0481",
"url": "https://access.redhat.com/errata/RHSA-2023:0481"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#moderate",
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "2134010",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2134010"
},
{
"category": "external",
"summary": "ACM-2318",
"url": "https://issues.redhat.com/browse/ACM-2318"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2023/rhsa-2023_0481.json"
}
],
"title": "Red Hat Security Advisory: Submariner 0.12.3 - security update and bug fix",
"tracking": {
"current_release_date": "2025-01-06T19:23:03+00:00",
"generator": {
"date": "2025-01-06T19:23:03+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.5"
}
},
"id": "RHSA-2023:0481",
"initial_release_date": "2023-01-26T21:22:22+00:00",
"revision_history": [
{
"date": "2023-01-26T21:22:22+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2023-01-26T21:22:22+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-01-06T19:23:03+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8",
"product": {
"name": "Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8",
"product_id": "8Base-RHACM-2.5",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:acm:2.5::el8"
}
}
}
],
"category": "product_family",
"name": "Red Hat ACM"
},
{
"branches": [
{
"category": "product_version",
"name": "rhacm2/lighthouse-agent-rhel8@sha256:33ac96a6dd01e698c6d037acd701ee0fc5a09bb1cdd8f761c229e6a2be9ea799_amd64",
"product": {
"name": "rhacm2/lighthouse-agent-rhel8@sha256:33ac96a6dd01e698c6d037acd701ee0fc5a09bb1cdd8f761c229e6a2be9ea799_amd64",
"product_id": "rhacm2/lighthouse-agent-rhel8@sha256:33ac96a6dd01e698c6d037acd701ee0fc5a09bb1cdd8f761c229e6a2be9ea799_amd64",
"product_identification_helper": {
"purl": "pkg:oci/lighthouse-agent-rhel8@sha256:33ac96a6dd01e698c6d037acd701ee0fc5a09bb1cdd8f761c229e6a2be9ea799?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/lighthouse-agent-rhel8\u0026tag=v0.12.3-1"
}
}
},
{
"category": "product_version",
"name": "rhacm2/lighthouse-coredns-rhel8@sha256:f27e7895a859ee2ab5f36134522349c1c04f3b18284787e0d14c3380126bf402_amd64",
"product": {
"name": "rhacm2/lighthouse-coredns-rhel8@sha256:f27e7895a859ee2ab5f36134522349c1c04f3b18284787e0d14c3380126bf402_amd64",
"product_id": "rhacm2/lighthouse-coredns-rhel8@sha256:f27e7895a859ee2ab5f36134522349c1c04f3b18284787e0d14c3380126bf402_amd64",
"product_identification_helper": {
"purl": "pkg:oci/lighthouse-coredns-rhel8@sha256:f27e7895a859ee2ab5f36134522349c1c04f3b18284787e0d14c3380126bf402?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/lighthouse-coredns-rhel8\u0026tag=v0.12.3-1"
}
}
},
{
"category": "product_version",
"name": "rhacm2/subctl-rhel8@sha256:e6f5f07b97d4998c122cadeee693dce4d72f3bbe2c1f9703b15621b6531cf3a4_amd64",
"product": {
"name": "rhacm2/subctl-rhel8@sha256:e6f5f07b97d4998c122cadeee693dce4d72f3bbe2c1f9703b15621b6531cf3a4_amd64",
"product_id": "rhacm2/subctl-rhel8@sha256:e6f5f07b97d4998c122cadeee693dce4d72f3bbe2c1f9703b15621b6531cf3a4_amd64",
"product_identification_helper": {
"purl": "pkg:oci/subctl-rhel8@sha256:e6f5f07b97d4998c122cadeee693dce4d72f3bbe2c1f9703b15621b6531cf3a4?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/subctl-rhel8\u0026tag=v0.12.3-1"
}
}
},
{
"category": "product_version",
"name": "rhacm2/submariner-gateway-rhel8@sha256:7b343f4f8ea08b2e2a670ee938a2286a92d701e5e92f4f43ee58e620e2ee070b_amd64",
"product": {
"name": "rhacm2/submariner-gateway-rhel8@sha256:7b343f4f8ea08b2e2a670ee938a2286a92d701e5e92f4f43ee58e620e2ee070b_amd64",
"product_id": "rhacm2/submariner-gateway-rhel8@sha256:7b343f4f8ea08b2e2a670ee938a2286a92d701e5e92f4f43ee58e620e2ee070b_amd64",
"product_identification_helper": {
"purl": "pkg:oci/submariner-gateway-rhel8@sha256:7b343f4f8ea08b2e2a670ee938a2286a92d701e5e92f4f43ee58e620e2ee070b?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/submariner-gateway-rhel8\u0026tag=v0.12.3-1"
}
}
},
{
"category": "product_version",
"name": "rhacm2/submariner-globalnet-rhel8@sha256:3b04b0be64ea639e82496102236899cc62a2521c8e8bebd07c852118e76bce88_amd64",
"product": {
"name": "rhacm2/submariner-globalnet-rhel8@sha256:3b04b0be64ea639e82496102236899cc62a2521c8e8bebd07c852118e76bce88_amd64",
"product_id": "rhacm2/submariner-globalnet-rhel8@sha256:3b04b0be64ea639e82496102236899cc62a2521c8e8bebd07c852118e76bce88_amd64",
"product_identification_helper": {
"purl": "pkg:oci/submariner-globalnet-rhel8@sha256:3b04b0be64ea639e82496102236899cc62a2521c8e8bebd07c852118e76bce88?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/submariner-globalnet-rhel8\u0026tag=v0.12.3-1"
}
}
},
{
"category": "product_version",
"name": "rhacm2/submariner-networkplugin-syncer-rhel8@sha256:91bc8d57c88c771bda7a6703ced10e32e9999116fe8cb7e4adddb6198591eeac_amd64",
"product": {
"name": "rhacm2/submariner-networkplugin-syncer-rhel8@sha256:91bc8d57c88c771bda7a6703ced10e32e9999116fe8cb7e4adddb6198591eeac_amd64",
"product_id": "rhacm2/submariner-networkplugin-syncer-rhel8@sha256:91bc8d57c88c771bda7a6703ced10e32e9999116fe8cb7e4adddb6198591eeac_amd64",
"product_identification_helper": {
"purl": "pkg:oci/submariner-networkplugin-syncer-rhel8@sha256:91bc8d57c88c771bda7a6703ced10e32e9999116fe8cb7e4adddb6198591eeac?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/submariner-networkplugin-syncer-rhel8\u0026tag=v0.12.3-1"
}
}
},
{
"category": "product_version",
"name": "rhacm2/submariner-operator-bundle@sha256:fa2fd74dc3918d962ee6ea162e765f45b75a9588017145cd8322469456bc7164_amd64",
"product": {
"name": "rhacm2/submariner-operator-bundle@sha256:fa2fd74dc3918d962ee6ea162e765f45b75a9588017145cd8322469456bc7164_amd64",
"product_id": "rhacm2/submariner-operator-bundle@sha256:fa2fd74dc3918d962ee6ea162e765f45b75a9588017145cd8322469456bc7164_amd64",
"product_identification_helper": {
"purl": "pkg:oci/submariner-operator-bundle@sha256:fa2fd74dc3918d962ee6ea162e765f45b75a9588017145cd8322469456bc7164?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/submariner-operator-bundle\u0026tag=v0.12.3-1"
}
}
},
{
"category": "product_version",
"name": "rhacm2/submariner-rhel8-operator@sha256:98811cc217f48bc7a6fbe7d4ccf7b1b7b239e19e24b7fcfeacbec8b297880f89_amd64",
"product": {
"name": "rhacm2/submariner-rhel8-operator@sha256:98811cc217f48bc7a6fbe7d4ccf7b1b7b239e19e24b7fcfeacbec8b297880f89_amd64",
"product_id": "rhacm2/submariner-rhel8-operator@sha256:98811cc217f48bc7a6fbe7d4ccf7b1b7b239e19e24b7fcfeacbec8b297880f89_amd64",
"product_identification_helper": {
"purl": "pkg:oci/submariner-rhel8-operator@sha256:98811cc217f48bc7a6fbe7d4ccf7b1b7b239e19e24b7fcfeacbec8b297880f89?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/submariner-rhel8-operator\u0026tag=v0.12.3-1"
}
}
},
{
"category": "product_version",
"name": "rhacm2/submariner-route-agent-rhel8@sha256:6bff7c4285999b218937924fc75e6303525089064f21d23234a01f453529fbf6_amd64",
"product": {
"name": "rhacm2/submariner-route-agent-rhel8@sha256:6bff7c4285999b218937924fc75e6303525089064f21d23234a01f453529fbf6_amd64",
"product_id": "rhacm2/submariner-route-agent-rhel8@sha256:6bff7c4285999b218937924fc75e6303525089064f21d23234a01f453529fbf6_amd64",
"product_identification_helper": {
"purl": "pkg:oci/submariner-route-agent-rhel8@sha256:6bff7c4285999b218937924fc75e6303525089064f21d23234a01f453529fbf6?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/submariner-route-agent-rhel8\u0026tag=v0.12.3-1"
}
}
}
],
"category": "architecture",
"name": "amd64"
},
{
"branches": [
{
"category": "product_version",
"name": "rhacm2/lighthouse-agent-rhel8@sha256:6b579e761576bd97f05c1f5ba42df74db5d22d0203e9d0253efc324cb0bf6378_ppc64le",
"product": {
"name": "rhacm2/lighthouse-agent-rhel8@sha256:6b579e761576bd97f05c1f5ba42df74db5d22d0203e9d0253efc324cb0bf6378_ppc64le",
"product_id": "rhacm2/lighthouse-agent-rhel8@sha256:6b579e761576bd97f05c1f5ba42df74db5d22d0203e9d0253efc324cb0bf6378_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/lighthouse-agent-rhel8@sha256:6b579e761576bd97f05c1f5ba42df74db5d22d0203e9d0253efc324cb0bf6378?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/lighthouse-agent-rhel8\u0026tag=v0.12.3-1"
}
}
},
{
"category": "product_version",
"name": "rhacm2/lighthouse-coredns-rhel8@sha256:77e474f4e0be091c3772ec0c16f2a67168dfea599a1f4220deb2fcb795d2d9c7_ppc64le",
"product": {
"name": "rhacm2/lighthouse-coredns-rhel8@sha256:77e474f4e0be091c3772ec0c16f2a67168dfea599a1f4220deb2fcb795d2d9c7_ppc64le",
"product_id": "rhacm2/lighthouse-coredns-rhel8@sha256:77e474f4e0be091c3772ec0c16f2a67168dfea599a1f4220deb2fcb795d2d9c7_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/lighthouse-coredns-rhel8@sha256:77e474f4e0be091c3772ec0c16f2a67168dfea599a1f4220deb2fcb795d2d9c7?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/lighthouse-coredns-rhel8\u0026tag=v0.12.3-1"
}
}
},
{
"category": "product_version",
"name": "rhacm2/subctl-rhel8@sha256:47cd1ee9aff93dad2e554805836e3393a0d5fc408ffc41a3ffef4676e10ce1f9_ppc64le",
"product": {
"name": "rhacm2/subctl-rhel8@sha256:47cd1ee9aff93dad2e554805836e3393a0d5fc408ffc41a3ffef4676e10ce1f9_ppc64le",
"product_id": "rhacm2/subctl-rhel8@sha256:47cd1ee9aff93dad2e554805836e3393a0d5fc408ffc41a3ffef4676e10ce1f9_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/subctl-rhel8@sha256:47cd1ee9aff93dad2e554805836e3393a0d5fc408ffc41a3ffef4676e10ce1f9?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/subctl-rhel8\u0026tag=v0.12.3-1"
}
}
},
{
"category": "product_version",
"name": "rhacm2/submariner-gateway-rhel8@sha256:522bddc7d016659157c51f7425098eb92f2b0857f921f5ef01e188af3c9056c6_ppc64le",
"product": {
"name": "rhacm2/submariner-gateway-rhel8@sha256:522bddc7d016659157c51f7425098eb92f2b0857f921f5ef01e188af3c9056c6_ppc64le",
"product_id": "rhacm2/submariner-gateway-rhel8@sha256:522bddc7d016659157c51f7425098eb92f2b0857f921f5ef01e188af3c9056c6_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/submariner-gateway-rhel8@sha256:522bddc7d016659157c51f7425098eb92f2b0857f921f5ef01e188af3c9056c6?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/submariner-gateway-rhel8\u0026tag=v0.12.3-1"
}
}
},
{
"category": "product_version",
"name": "rhacm2/submariner-globalnet-rhel8@sha256:c9050e94421701df533d7bc7fb2736de3b923a1b9689f7db9285e902d1d9c173_ppc64le",
"product": {
"name": "rhacm2/submariner-globalnet-rhel8@sha256:c9050e94421701df533d7bc7fb2736de3b923a1b9689f7db9285e902d1d9c173_ppc64le",
"product_id": "rhacm2/submariner-globalnet-rhel8@sha256:c9050e94421701df533d7bc7fb2736de3b923a1b9689f7db9285e902d1d9c173_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/submariner-globalnet-rhel8@sha256:c9050e94421701df533d7bc7fb2736de3b923a1b9689f7db9285e902d1d9c173?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/submariner-globalnet-rhel8\u0026tag=v0.12.3-1"
}
}
},
{
"category": "product_version",
"name": "rhacm2/submariner-networkplugin-syncer-rhel8@sha256:5a86959a38334532e5a33ab76b0553a9eae4cfad8897d5f92457a11cb6a5374b_ppc64le",
"product": {
"name": "rhacm2/submariner-networkplugin-syncer-rhel8@sha256:5a86959a38334532e5a33ab76b0553a9eae4cfad8897d5f92457a11cb6a5374b_ppc64le",
"product_id": "rhacm2/submariner-networkplugin-syncer-rhel8@sha256:5a86959a38334532e5a33ab76b0553a9eae4cfad8897d5f92457a11cb6a5374b_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/submariner-networkplugin-syncer-rhel8@sha256:5a86959a38334532e5a33ab76b0553a9eae4cfad8897d5f92457a11cb6a5374b?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/submariner-networkplugin-syncer-rhel8\u0026tag=v0.12.3-1"
}
}
},
{
"category": "product_version",
"name": "rhacm2/submariner-operator-bundle@sha256:40b62e497e8280cb4db3803ad140e9aa15f038e15b3e1218d0c506646f576aec_ppc64le",
"product": {
"name": "rhacm2/submariner-operator-bundle@sha256:40b62e497e8280cb4db3803ad140e9aa15f038e15b3e1218d0c506646f576aec_ppc64le",
"product_id": "rhacm2/submariner-operator-bundle@sha256:40b62e497e8280cb4db3803ad140e9aa15f038e15b3e1218d0c506646f576aec_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/submariner-operator-bundle@sha256:40b62e497e8280cb4db3803ad140e9aa15f038e15b3e1218d0c506646f576aec?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/submariner-operator-bundle\u0026tag=v0.12.3-1"
}
}
},
{
"category": "product_version",
"name": "rhacm2/submariner-rhel8-operator@sha256:2aad67f470d3a58382029b4db1459916036a8f41aed167d567eb1abef45cda3f_ppc64le",
"product": {
"name": "rhacm2/submariner-rhel8-operator@sha256:2aad67f470d3a58382029b4db1459916036a8f41aed167d567eb1abef45cda3f_ppc64le",
"product_id": "rhacm2/submariner-rhel8-operator@sha256:2aad67f470d3a58382029b4db1459916036a8f41aed167d567eb1abef45cda3f_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/submariner-rhel8-operator@sha256:2aad67f470d3a58382029b4db1459916036a8f41aed167d567eb1abef45cda3f?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/submariner-rhel8-operator\u0026tag=v0.12.3-1"
}
}
},
{
"category": "product_version",
"name": "rhacm2/submariner-route-agent-rhel8@sha256:0f13ca7bb60b17115395a51421916f0136a6d1296da563ba609cf37ec4e31440_ppc64le",
"product": {
"name": "rhacm2/submariner-route-agent-rhel8@sha256:0f13ca7bb60b17115395a51421916f0136a6d1296da563ba609cf37ec4e31440_ppc64le",
"product_id": "rhacm2/submariner-route-agent-rhel8@sha256:0f13ca7bb60b17115395a51421916f0136a6d1296da563ba609cf37ec4e31440_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/submariner-route-agent-rhel8@sha256:0f13ca7bb60b17115395a51421916f0136a6d1296da563ba609cf37ec4e31440?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/submariner-route-agent-rhel8\u0026tag=v0.12.3-1"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "rhacm2/lighthouse-agent-rhel8@sha256:b76b9fc2f08fdedd74511526b3f049a37e8beab3dddd9c3463ea20064aadf194_arm64",
"product": {
"name": "rhacm2/lighthouse-agent-rhel8@sha256:b76b9fc2f08fdedd74511526b3f049a37e8beab3dddd9c3463ea20064aadf194_arm64",
"product_id": "rhacm2/lighthouse-agent-rhel8@sha256:b76b9fc2f08fdedd74511526b3f049a37e8beab3dddd9c3463ea20064aadf194_arm64",
"product_identification_helper": {
"purl": "pkg:oci/lighthouse-agent-rhel8@sha256:b76b9fc2f08fdedd74511526b3f049a37e8beab3dddd9c3463ea20064aadf194?arch=arm64\u0026repository_url=registry.redhat.io/rhacm2/lighthouse-agent-rhel8\u0026tag=v0.12.3-1"
}
}
},
{
"category": "product_version",
"name": "rhacm2/lighthouse-coredns-rhel8@sha256:4af85e8acaa3b787828a3352bbfff427c6668936c428169e5fcbd345e802fcc3_arm64",
"product": {
"name": "rhacm2/lighthouse-coredns-rhel8@sha256:4af85e8acaa3b787828a3352bbfff427c6668936c428169e5fcbd345e802fcc3_arm64",
"product_id": "rhacm2/lighthouse-coredns-rhel8@sha256:4af85e8acaa3b787828a3352bbfff427c6668936c428169e5fcbd345e802fcc3_arm64",
"product_identification_helper": {
"purl": "pkg:oci/lighthouse-coredns-rhel8@sha256:4af85e8acaa3b787828a3352bbfff427c6668936c428169e5fcbd345e802fcc3?arch=arm64\u0026repository_url=registry.redhat.io/rhacm2/lighthouse-coredns-rhel8\u0026tag=v0.12.3-1"
}
}
},
{
"category": "product_version",
"name": "rhacm2/subctl-rhel8@sha256:dae78580dc26a6beaaeef47575e0cc13c487d5cef1d72c415ddc19368ef3b4a5_arm64",
"product": {
"name": "rhacm2/subctl-rhel8@sha256:dae78580dc26a6beaaeef47575e0cc13c487d5cef1d72c415ddc19368ef3b4a5_arm64",
"product_id": "rhacm2/subctl-rhel8@sha256:dae78580dc26a6beaaeef47575e0cc13c487d5cef1d72c415ddc19368ef3b4a5_arm64",
"product_identification_helper": {
"purl": "pkg:oci/subctl-rhel8@sha256:dae78580dc26a6beaaeef47575e0cc13c487d5cef1d72c415ddc19368ef3b4a5?arch=arm64\u0026repository_url=registry.redhat.io/rhacm2/subctl-rhel8\u0026tag=v0.12.3-1"
}
}
},
{
"category": "product_version",
"name": "rhacm2/submariner-gateway-rhel8@sha256:2bdd80c985f13cc90a223979c7b26bd5a273504ce973ea2c24b599e1c5f1b3fc_arm64",
"product": {
"name": "rhacm2/submariner-gateway-rhel8@sha256:2bdd80c985f13cc90a223979c7b26bd5a273504ce973ea2c24b599e1c5f1b3fc_arm64",
"product_id": "rhacm2/submariner-gateway-rhel8@sha256:2bdd80c985f13cc90a223979c7b26bd5a273504ce973ea2c24b599e1c5f1b3fc_arm64",
"product_identification_helper": {
"purl": "pkg:oci/submariner-gateway-rhel8@sha256:2bdd80c985f13cc90a223979c7b26bd5a273504ce973ea2c24b599e1c5f1b3fc?arch=arm64\u0026repository_url=registry.redhat.io/rhacm2/submariner-gateway-rhel8\u0026tag=v0.12.3-1"
}
}
},
{
"category": "product_version",
"name": "rhacm2/submariner-globalnet-rhel8@sha256:d7fdc22644e6dbf19f21130c0f635e0a6c6e11fb9cbf9d9cbd9635d17fe25fbf_arm64",
"product": {
"name": "rhacm2/submariner-globalnet-rhel8@sha256:d7fdc22644e6dbf19f21130c0f635e0a6c6e11fb9cbf9d9cbd9635d17fe25fbf_arm64",
"product_id": "rhacm2/submariner-globalnet-rhel8@sha256:d7fdc22644e6dbf19f21130c0f635e0a6c6e11fb9cbf9d9cbd9635d17fe25fbf_arm64",
"product_identification_helper": {
"purl": "pkg:oci/submariner-globalnet-rhel8@sha256:d7fdc22644e6dbf19f21130c0f635e0a6c6e11fb9cbf9d9cbd9635d17fe25fbf?arch=arm64\u0026repository_url=registry.redhat.io/rhacm2/submariner-globalnet-rhel8\u0026tag=v0.12.3-1"
}
}
},
{
"category": "product_version",
"name": "rhacm2/submariner-networkplugin-syncer-rhel8@sha256:0b72b8b294483dcf92d8acaaa56e8ac1141db3c6811ab64298117fafde99936a_arm64",
"product": {
"name": "rhacm2/submariner-networkplugin-syncer-rhel8@sha256:0b72b8b294483dcf92d8acaaa56e8ac1141db3c6811ab64298117fafde99936a_arm64",
"product_id": "rhacm2/submariner-networkplugin-syncer-rhel8@sha256:0b72b8b294483dcf92d8acaaa56e8ac1141db3c6811ab64298117fafde99936a_arm64",
"product_identification_helper": {
"purl": "pkg:oci/submariner-networkplugin-syncer-rhel8@sha256:0b72b8b294483dcf92d8acaaa56e8ac1141db3c6811ab64298117fafde99936a?arch=arm64\u0026repository_url=registry.redhat.io/rhacm2/submariner-networkplugin-syncer-rhel8\u0026tag=v0.12.3-1"
}
}
},
{
"category": "product_version",
"name": "rhacm2/submariner-operator-bundle@sha256:71c8912419b9a6ac3ddd911c0a2fd097170743efab7dcb1c14141e5e1defc738_arm64",
"product": {
"name": "rhacm2/submariner-operator-bundle@sha256:71c8912419b9a6ac3ddd911c0a2fd097170743efab7dcb1c14141e5e1defc738_arm64",
"product_id": "rhacm2/submariner-operator-bundle@sha256:71c8912419b9a6ac3ddd911c0a2fd097170743efab7dcb1c14141e5e1defc738_arm64",
"product_identification_helper": {
"purl": "pkg:oci/submariner-operator-bundle@sha256:71c8912419b9a6ac3ddd911c0a2fd097170743efab7dcb1c14141e5e1defc738?arch=arm64\u0026repository_url=registry.redhat.io/rhacm2/submariner-operator-bundle\u0026tag=v0.12.3-1"
}
}
},
{
"category": "product_version",
"name": "rhacm2/submariner-rhel8-operator@sha256:dc2a4dace498a5c6238c555411362c2e6166011582a572d3cab431c745143301_arm64",
"product": {
"name": "rhacm2/submariner-rhel8-operator@sha256:dc2a4dace498a5c6238c555411362c2e6166011582a572d3cab431c745143301_arm64",
"product_id": "rhacm2/submariner-rhel8-operator@sha256:dc2a4dace498a5c6238c555411362c2e6166011582a572d3cab431c745143301_arm64",
"product_identification_helper": {
"purl": "pkg:oci/submariner-rhel8-operator@sha256:dc2a4dace498a5c6238c555411362c2e6166011582a572d3cab431c745143301?arch=arm64\u0026repository_url=registry.redhat.io/rhacm2/submariner-rhel8-operator\u0026tag=v0.12.3-1"
}
}
},
{
"category": "product_version",
"name": "rhacm2/submariner-route-agent-rhel8@sha256:d0140f18ad07368201a6e34af970ac9ee402f8ac292e71c42244af85eb37db08_arm64",
"product": {
"name": "rhacm2/submariner-route-agent-rhel8@sha256:d0140f18ad07368201a6e34af970ac9ee402f8ac292e71c42244af85eb37db08_arm64",
"product_id": "rhacm2/submariner-route-agent-rhel8@sha256:d0140f18ad07368201a6e34af970ac9ee402f8ac292e71c42244af85eb37db08_arm64",
"product_identification_helper": {
"purl": "pkg:oci/submariner-route-agent-rhel8@sha256:d0140f18ad07368201a6e34af970ac9ee402f8ac292e71c42244af85eb37db08?arch=arm64\u0026repository_url=registry.redhat.io/rhacm2/submariner-route-agent-rhel8\u0026tag=v0.12.3-1"
}
}
}
],
"category": "architecture",
"name": "arm64"
},
{
"branches": [
{
"category": "product_version",
"name": "rhacm2/lighthouse-agent-rhel8@sha256:998706bb956a4fdd15526b5bb6a0458d59ea5cc537e2784b6dec1bb24b6aebbd_s390x",
"product": {
"name": "rhacm2/lighthouse-agent-rhel8@sha256:998706bb956a4fdd15526b5bb6a0458d59ea5cc537e2784b6dec1bb24b6aebbd_s390x",
"product_id": "rhacm2/lighthouse-agent-rhel8@sha256:998706bb956a4fdd15526b5bb6a0458d59ea5cc537e2784b6dec1bb24b6aebbd_s390x",
"product_identification_helper": {
"purl": "pkg:oci/lighthouse-agent-rhel8@sha256:998706bb956a4fdd15526b5bb6a0458d59ea5cc537e2784b6dec1bb24b6aebbd?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/lighthouse-agent-rhel8\u0026tag=v0.12.3-1"
}
}
},
{
"category": "product_version",
"name": "rhacm2/lighthouse-coredns-rhel8@sha256:dbc246166dd35202221ac3f885a0e46160a6d277a058b6d2f1c7ee571c673b50_s390x",
"product": {
"name": "rhacm2/lighthouse-coredns-rhel8@sha256:dbc246166dd35202221ac3f885a0e46160a6d277a058b6d2f1c7ee571c673b50_s390x",
"product_id": "rhacm2/lighthouse-coredns-rhel8@sha256:dbc246166dd35202221ac3f885a0e46160a6d277a058b6d2f1c7ee571c673b50_s390x",
"product_identification_helper": {
"purl": "pkg:oci/lighthouse-coredns-rhel8@sha256:dbc246166dd35202221ac3f885a0e46160a6d277a058b6d2f1c7ee571c673b50?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/lighthouse-coredns-rhel8\u0026tag=v0.12.3-1"
}
}
},
{
"category": "product_version",
"name": "rhacm2/subctl-rhel8@sha256:9ab13f289008d38a7cfa2182e4a5fb3a29b0b8efa2da40916018f2449ca730c7_s390x",
"product": {
"name": "rhacm2/subctl-rhel8@sha256:9ab13f289008d38a7cfa2182e4a5fb3a29b0b8efa2da40916018f2449ca730c7_s390x",
"product_id": "rhacm2/subctl-rhel8@sha256:9ab13f289008d38a7cfa2182e4a5fb3a29b0b8efa2da40916018f2449ca730c7_s390x",
"product_identification_helper": {
"purl": "pkg:oci/subctl-rhel8@sha256:9ab13f289008d38a7cfa2182e4a5fb3a29b0b8efa2da40916018f2449ca730c7?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/subctl-rhel8\u0026tag=v0.12.3-1"
}
}
},
{
"category": "product_version",
"name": "rhacm2/submariner-gateway-rhel8@sha256:825db9cddd68a762e934bc855e5836e4f16a566f59d1310f45a06dac85ab8035_s390x",
"product": {
"name": "rhacm2/submariner-gateway-rhel8@sha256:825db9cddd68a762e934bc855e5836e4f16a566f59d1310f45a06dac85ab8035_s390x",
"product_id": "rhacm2/submariner-gateway-rhel8@sha256:825db9cddd68a762e934bc855e5836e4f16a566f59d1310f45a06dac85ab8035_s390x",
"product_identification_helper": {
"purl": "pkg:oci/submariner-gateway-rhel8@sha256:825db9cddd68a762e934bc855e5836e4f16a566f59d1310f45a06dac85ab8035?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/submariner-gateway-rhel8\u0026tag=v0.12.3-1"
}
}
},
{
"category": "product_version",
"name": "rhacm2/submariner-globalnet-rhel8@sha256:d855b05d15a54a88e2c026e0d1935b189dc7ceddb3a7b5b0672e8e4c715f3845_s390x",
"product": {
"name": "rhacm2/submariner-globalnet-rhel8@sha256:d855b05d15a54a88e2c026e0d1935b189dc7ceddb3a7b5b0672e8e4c715f3845_s390x",
"product_id": "rhacm2/submariner-globalnet-rhel8@sha256:d855b05d15a54a88e2c026e0d1935b189dc7ceddb3a7b5b0672e8e4c715f3845_s390x",
"product_identification_helper": {
"purl": "pkg:oci/submariner-globalnet-rhel8@sha256:d855b05d15a54a88e2c026e0d1935b189dc7ceddb3a7b5b0672e8e4c715f3845?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/submariner-globalnet-rhel8\u0026tag=v0.12.3-1"
}
}
},
{
"category": "product_version",
"name": "rhacm2/submariner-networkplugin-syncer-rhel8@sha256:39ca01ef63bc7d2663186a516456c90657b918a2ec044af7aadb1315a607f429_s390x",
"product": {
"name": "rhacm2/submariner-networkplugin-syncer-rhel8@sha256:39ca01ef63bc7d2663186a516456c90657b918a2ec044af7aadb1315a607f429_s390x",
"product_id": "rhacm2/submariner-networkplugin-syncer-rhel8@sha256:39ca01ef63bc7d2663186a516456c90657b918a2ec044af7aadb1315a607f429_s390x",
"product_identification_helper": {
"purl": "pkg:oci/submariner-networkplugin-syncer-rhel8@sha256:39ca01ef63bc7d2663186a516456c90657b918a2ec044af7aadb1315a607f429?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/submariner-networkplugin-syncer-rhel8\u0026tag=v0.12.3-1"
}
}
},
{
"category": "product_version",
"name": "rhacm2/submariner-operator-bundle@sha256:f86cb9bb9dc189057de11e2a5c3c1c10597c78e82432a34cf2864c6a32f8e6fa_s390x",
"product": {
"name": "rhacm2/submariner-operator-bundle@sha256:f86cb9bb9dc189057de11e2a5c3c1c10597c78e82432a34cf2864c6a32f8e6fa_s390x",
"product_id": "rhacm2/submariner-operator-bundle@sha256:f86cb9bb9dc189057de11e2a5c3c1c10597c78e82432a34cf2864c6a32f8e6fa_s390x",
"product_identification_helper": {
"purl": "pkg:oci/submariner-operator-bundle@sha256:f86cb9bb9dc189057de11e2a5c3c1c10597c78e82432a34cf2864c6a32f8e6fa?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/submariner-operator-bundle\u0026tag=v0.12.3-1"
}
}
},
{
"category": "product_version",
"name": "rhacm2/submariner-rhel8-operator@sha256:971eeffff35343edb6da2be6d2d3620d13536cbbaddacbbd13f285a70490df3a_s390x",
"product": {
"name": "rhacm2/submariner-rhel8-operator@sha256:971eeffff35343edb6da2be6d2d3620d13536cbbaddacbbd13f285a70490df3a_s390x",
"product_id": "rhacm2/submariner-rhel8-operator@sha256:971eeffff35343edb6da2be6d2d3620d13536cbbaddacbbd13f285a70490df3a_s390x",
"product_identification_helper": {
"purl": "pkg:oci/submariner-rhel8-operator@sha256:971eeffff35343edb6da2be6d2d3620d13536cbbaddacbbd13f285a70490df3a?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/submariner-rhel8-operator\u0026tag=v0.12.3-1"
}
}
},
{
"category": "product_version",
"name": "rhacm2/submariner-route-agent-rhel8@sha256:497545ae0c5ae10463c5ef4a56c0e3733efbff2da65754dce4bbb977cb80d55a_s390x",
"product": {
"name": "rhacm2/submariner-route-agent-rhel8@sha256:497545ae0c5ae10463c5ef4a56c0e3733efbff2da65754dce4bbb977cb80d55a_s390x",
"product_id": "rhacm2/submariner-route-agent-rhel8@sha256:497545ae0c5ae10463c5ef4a56c0e3733efbff2da65754dce4bbb977cb80d55a_s390x",
"product_identification_helper": {
"purl": "pkg:oci/submariner-route-agent-rhel8@sha256:497545ae0c5ae10463c5ef4a56c0e3733efbff2da65754dce4bbb977cb80d55a?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/submariner-route-agent-rhel8\u0026tag=v0.12.3-1"
}
}
}
],
"category": "architecture",
"name": "s390x"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "rhacm2/lighthouse-agent-rhel8@sha256:33ac96a6dd01e698c6d037acd701ee0fc5a09bb1cdd8f761c229e6a2be9ea799_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8",
"product_id": "8Base-RHACM-2.5:rhacm2/lighthouse-agent-rhel8@sha256:33ac96a6dd01e698c6d037acd701ee0fc5a09bb1cdd8f761c229e6a2be9ea799_amd64"
},
"product_reference": "rhacm2/lighthouse-agent-rhel8@sha256:33ac96a6dd01e698c6d037acd701ee0fc5a09bb1cdd8f761c229e6a2be9ea799_amd64",
"relates_to_product_reference": "8Base-RHACM-2.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhacm2/lighthouse-agent-rhel8@sha256:6b579e761576bd97f05c1f5ba42df74db5d22d0203e9d0253efc324cb0bf6378_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8",
"product_id": "8Base-RHACM-2.5:rhacm2/lighthouse-agent-rhel8@sha256:6b579e761576bd97f05c1f5ba42df74db5d22d0203e9d0253efc324cb0bf6378_ppc64le"
},
"product_reference": "rhacm2/lighthouse-agent-rhel8@sha256:6b579e761576bd97f05c1f5ba42df74db5d22d0203e9d0253efc324cb0bf6378_ppc64le",
"relates_to_product_reference": "8Base-RHACM-2.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhacm2/lighthouse-agent-rhel8@sha256:998706bb956a4fdd15526b5bb6a0458d59ea5cc537e2784b6dec1bb24b6aebbd_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8",
"product_id": "8Base-RHACM-2.5:rhacm2/lighthouse-agent-rhel8@sha256:998706bb956a4fdd15526b5bb6a0458d59ea5cc537e2784b6dec1bb24b6aebbd_s390x"
},
"product_reference": "rhacm2/lighthouse-agent-rhel8@sha256:998706bb956a4fdd15526b5bb6a0458d59ea5cc537e2784b6dec1bb24b6aebbd_s390x",
"relates_to_product_reference": "8Base-RHACM-2.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhacm2/lighthouse-agent-rhel8@sha256:b76b9fc2f08fdedd74511526b3f049a37e8beab3dddd9c3463ea20064aadf194_arm64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8",
"product_id": "8Base-RHACM-2.5:rhacm2/lighthouse-agent-rhel8@sha256:b76b9fc2f08fdedd74511526b3f049a37e8beab3dddd9c3463ea20064aadf194_arm64"
},
"product_reference": "rhacm2/lighthouse-agent-rhel8@sha256:b76b9fc2f08fdedd74511526b3f049a37e8beab3dddd9c3463ea20064aadf194_arm64",
"relates_to_product_reference": "8Base-RHACM-2.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhacm2/lighthouse-coredns-rhel8@sha256:4af85e8acaa3b787828a3352bbfff427c6668936c428169e5fcbd345e802fcc3_arm64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8",
"product_id": "8Base-RHACM-2.5:rhacm2/lighthouse-coredns-rhel8@sha256:4af85e8acaa3b787828a3352bbfff427c6668936c428169e5fcbd345e802fcc3_arm64"
},
"product_reference": "rhacm2/lighthouse-coredns-rhel8@sha256:4af85e8acaa3b787828a3352bbfff427c6668936c428169e5fcbd345e802fcc3_arm64",
"relates_to_product_reference": "8Base-RHACM-2.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhacm2/lighthouse-coredns-rhel8@sha256:77e474f4e0be091c3772ec0c16f2a67168dfea599a1f4220deb2fcb795d2d9c7_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8",
"product_id": "8Base-RHACM-2.5:rhacm2/lighthouse-coredns-rhel8@sha256:77e474f4e0be091c3772ec0c16f2a67168dfea599a1f4220deb2fcb795d2d9c7_ppc64le"
},
"product_reference": "rhacm2/lighthouse-coredns-rhel8@sha256:77e474f4e0be091c3772ec0c16f2a67168dfea599a1f4220deb2fcb795d2d9c7_ppc64le",
"relates_to_product_reference": "8Base-RHACM-2.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhacm2/lighthouse-coredns-rhel8@sha256:dbc246166dd35202221ac3f885a0e46160a6d277a058b6d2f1c7ee571c673b50_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8",
"product_id": "8Base-RHACM-2.5:rhacm2/lighthouse-coredns-rhel8@sha256:dbc246166dd35202221ac3f885a0e46160a6d277a058b6d2f1c7ee571c673b50_s390x"
},
"product_reference": "rhacm2/lighthouse-coredns-rhel8@sha256:dbc246166dd35202221ac3f885a0e46160a6d277a058b6d2f1c7ee571c673b50_s390x",
"relates_to_product_reference": "8Base-RHACM-2.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhacm2/lighthouse-coredns-rhel8@sha256:f27e7895a859ee2ab5f36134522349c1c04f3b18284787e0d14c3380126bf402_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8",
"product_id": "8Base-RHACM-2.5:rhacm2/lighthouse-coredns-rhel8@sha256:f27e7895a859ee2ab5f36134522349c1c04f3b18284787e0d14c3380126bf402_amd64"
},
"product_reference": "rhacm2/lighthouse-coredns-rhel8@sha256:f27e7895a859ee2ab5f36134522349c1c04f3b18284787e0d14c3380126bf402_amd64",
"relates_to_product_reference": "8Base-RHACM-2.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhacm2/subctl-rhel8@sha256:47cd1ee9aff93dad2e554805836e3393a0d5fc408ffc41a3ffef4676e10ce1f9_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8",
"product_id": "8Base-RHACM-2.5:rhacm2/subctl-rhel8@sha256:47cd1ee9aff93dad2e554805836e3393a0d5fc408ffc41a3ffef4676e10ce1f9_ppc64le"
},
"product_reference": "rhacm2/subctl-rhel8@sha256:47cd1ee9aff93dad2e554805836e3393a0d5fc408ffc41a3ffef4676e10ce1f9_ppc64le",
"relates_to_product_reference": "8Base-RHACM-2.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhacm2/subctl-rhel8@sha256:9ab13f289008d38a7cfa2182e4a5fb3a29b0b8efa2da40916018f2449ca730c7_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8",
"product_id": "8Base-RHACM-2.5:rhacm2/subctl-rhel8@sha256:9ab13f289008d38a7cfa2182e4a5fb3a29b0b8efa2da40916018f2449ca730c7_s390x"
},
"product_reference": "rhacm2/subctl-rhel8@sha256:9ab13f289008d38a7cfa2182e4a5fb3a29b0b8efa2da40916018f2449ca730c7_s390x",
"relates_to_product_reference": "8Base-RHACM-2.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhacm2/subctl-rhel8@sha256:dae78580dc26a6beaaeef47575e0cc13c487d5cef1d72c415ddc19368ef3b4a5_arm64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8",
"product_id": "8Base-RHACM-2.5:rhacm2/subctl-rhel8@sha256:dae78580dc26a6beaaeef47575e0cc13c487d5cef1d72c415ddc19368ef3b4a5_arm64"
},
"product_reference": "rhacm2/subctl-rhel8@sha256:dae78580dc26a6beaaeef47575e0cc13c487d5cef1d72c415ddc19368ef3b4a5_arm64",
"relates_to_product_reference": "8Base-RHACM-2.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhacm2/subctl-rhel8@sha256:e6f5f07b97d4998c122cadeee693dce4d72f3bbe2c1f9703b15621b6531cf3a4_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8",
"product_id": "8Base-RHACM-2.5:rhacm2/subctl-rhel8@sha256:e6f5f07b97d4998c122cadeee693dce4d72f3bbe2c1f9703b15621b6531cf3a4_amd64"
},
"product_reference": "rhacm2/subctl-rhel8@sha256:e6f5f07b97d4998c122cadeee693dce4d72f3bbe2c1f9703b15621b6531cf3a4_amd64",
"relates_to_product_reference": "8Base-RHACM-2.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhacm2/submariner-gateway-rhel8@sha256:2bdd80c985f13cc90a223979c7b26bd5a273504ce973ea2c24b599e1c5f1b3fc_arm64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8",
"product_id": "8Base-RHACM-2.5:rhacm2/submariner-gateway-rhel8@sha256:2bdd80c985f13cc90a223979c7b26bd5a273504ce973ea2c24b599e1c5f1b3fc_arm64"
},
"product_reference": "rhacm2/submariner-gateway-rhel8@sha256:2bdd80c985f13cc90a223979c7b26bd5a273504ce973ea2c24b599e1c5f1b3fc_arm64",
"relates_to_product_reference": "8Base-RHACM-2.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhacm2/submariner-gateway-rhel8@sha256:522bddc7d016659157c51f7425098eb92f2b0857f921f5ef01e188af3c9056c6_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8",
"product_id": "8Base-RHACM-2.5:rhacm2/submariner-gateway-rhel8@sha256:522bddc7d016659157c51f7425098eb92f2b0857f921f5ef01e188af3c9056c6_ppc64le"
},
"product_reference": "rhacm2/submariner-gateway-rhel8@sha256:522bddc7d016659157c51f7425098eb92f2b0857f921f5ef01e188af3c9056c6_ppc64le",
"relates_to_product_reference": "8Base-RHACM-2.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhacm2/submariner-gateway-rhel8@sha256:7b343f4f8ea08b2e2a670ee938a2286a92d701e5e92f4f43ee58e620e2ee070b_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8",
"product_id": "8Base-RHACM-2.5:rhacm2/submariner-gateway-rhel8@sha256:7b343f4f8ea08b2e2a670ee938a2286a92d701e5e92f4f43ee58e620e2ee070b_amd64"
},
"product_reference": "rhacm2/submariner-gateway-rhel8@sha256:7b343f4f8ea08b2e2a670ee938a2286a92d701e5e92f4f43ee58e620e2ee070b_amd64",
"relates_to_product_reference": "8Base-RHACM-2.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhacm2/submariner-gateway-rhel8@sha256:825db9cddd68a762e934bc855e5836e4f16a566f59d1310f45a06dac85ab8035_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8",
"product_id": "8Base-RHACM-2.5:rhacm2/submariner-gateway-rhel8@sha256:825db9cddd68a762e934bc855e5836e4f16a566f59d1310f45a06dac85ab8035_s390x"
},
"product_reference": "rhacm2/submariner-gateway-rhel8@sha256:825db9cddd68a762e934bc855e5836e4f16a566f59d1310f45a06dac85ab8035_s390x",
"relates_to_product_reference": "8Base-RHACM-2.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhacm2/submariner-globalnet-rhel8@sha256:3b04b0be64ea639e82496102236899cc62a2521c8e8bebd07c852118e76bce88_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8",
"product_id": "8Base-RHACM-2.5:rhacm2/submariner-globalnet-rhel8@sha256:3b04b0be64ea639e82496102236899cc62a2521c8e8bebd07c852118e76bce88_amd64"
},
"product_reference": "rhacm2/submariner-globalnet-rhel8@sha256:3b04b0be64ea639e82496102236899cc62a2521c8e8bebd07c852118e76bce88_amd64",
"relates_to_product_reference": "8Base-RHACM-2.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhacm2/submariner-globalnet-rhel8@sha256:c9050e94421701df533d7bc7fb2736de3b923a1b9689f7db9285e902d1d9c173_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8",
"product_id": "8Base-RHACM-2.5:rhacm2/submariner-globalnet-rhel8@sha256:c9050e94421701df533d7bc7fb2736de3b923a1b9689f7db9285e902d1d9c173_ppc64le"
},
"product_reference": "rhacm2/submariner-globalnet-rhel8@sha256:c9050e94421701df533d7bc7fb2736de3b923a1b9689f7db9285e902d1d9c173_ppc64le",
"relates_to_product_reference": "8Base-RHACM-2.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhacm2/submariner-globalnet-rhel8@sha256:d7fdc22644e6dbf19f21130c0f635e0a6c6e11fb9cbf9d9cbd9635d17fe25fbf_arm64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8",
"product_id": "8Base-RHACM-2.5:rhacm2/submariner-globalnet-rhel8@sha256:d7fdc22644e6dbf19f21130c0f635e0a6c6e11fb9cbf9d9cbd9635d17fe25fbf_arm64"
},
"product_reference": "rhacm2/submariner-globalnet-rhel8@sha256:d7fdc22644e6dbf19f21130c0f635e0a6c6e11fb9cbf9d9cbd9635d17fe25fbf_arm64",
"relates_to_product_reference": "8Base-RHACM-2.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhacm2/submariner-globalnet-rhel8@sha256:d855b05d15a54a88e2c026e0d1935b189dc7ceddb3a7b5b0672e8e4c715f3845_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8",
"product_id": "8Base-RHACM-2.5:rhacm2/submariner-globalnet-rhel8@sha256:d855b05d15a54a88e2c026e0d1935b189dc7ceddb3a7b5b0672e8e4c715f3845_s390x"
},
"product_reference": "rhacm2/submariner-globalnet-rhel8@sha256:d855b05d15a54a88e2c026e0d1935b189dc7ceddb3a7b5b0672e8e4c715f3845_s390x",
"relates_to_product_reference": "8Base-RHACM-2.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhacm2/submariner-networkplugin-syncer-rhel8@sha256:0b72b8b294483dcf92d8acaaa56e8ac1141db3c6811ab64298117fafde99936a_arm64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8",
"product_id": "8Base-RHACM-2.5:rhacm2/submariner-networkplugin-syncer-rhel8@sha256:0b72b8b294483dcf92d8acaaa56e8ac1141db3c6811ab64298117fafde99936a_arm64"
},
"product_reference": "rhacm2/submariner-networkplugin-syncer-rhel8@sha256:0b72b8b294483dcf92d8acaaa56e8ac1141db3c6811ab64298117fafde99936a_arm64",
"relates_to_product_reference": "8Base-RHACM-2.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhacm2/submariner-networkplugin-syncer-rhel8@sha256:39ca01ef63bc7d2663186a516456c90657b918a2ec044af7aadb1315a607f429_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8",
"product_id": "8Base-RHACM-2.5:rhacm2/submariner-networkplugin-syncer-rhel8@sha256:39ca01ef63bc7d2663186a516456c90657b918a2ec044af7aadb1315a607f429_s390x"
},
"product_reference": "rhacm2/submariner-networkplugin-syncer-rhel8@sha256:39ca01ef63bc7d2663186a516456c90657b918a2ec044af7aadb1315a607f429_s390x",
"relates_to_product_reference": "8Base-RHACM-2.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhacm2/submariner-networkplugin-syncer-rhel8@sha256:5a86959a38334532e5a33ab76b0553a9eae4cfad8897d5f92457a11cb6a5374b_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8",
"product_id": "8Base-RHACM-2.5:rhacm2/submariner-networkplugin-syncer-rhel8@sha256:5a86959a38334532e5a33ab76b0553a9eae4cfad8897d5f92457a11cb6a5374b_ppc64le"
},
"product_reference": "rhacm2/submariner-networkplugin-syncer-rhel8@sha256:5a86959a38334532e5a33ab76b0553a9eae4cfad8897d5f92457a11cb6a5374b_ppc64le",
"relates_to_product_reference": "8Base-RHACM-2.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhacm2/submariner-networkplugin-syncer-rhel8@sha256:91bc8d57c88c771bda7a6703ced10e32e9999116fe8cb7e4adddb6198591eeac_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8",
"product_id": "8Base-RHACM-2.5:rhacm2/submariner-networkplugin-syncer-rhel8@sha256:91bc8d57c88c771bda7a6703ced10e32e9999116fe8cb7e4adddb6198591eeac_amd64"
},
"product_reference": "rhacm2/submariner-networkplugin-syncer-rhel8@sha256:91bc8d57c88c771bda7a6703ced10e32e9999116fe8cb7e4adddb6198591eeac_amd64",
"relates_to_product_reference": "8Base-RHACM-2.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhacm2/submariner-operator-bundle@sha256:40b62e497e8280cb4db3803ad140e9aa15f038e15b3e1218d0c506646f576aec_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8",
"product_id": "8Base-RHACM-2.5:rhacm2/submariner-operator-bundle@sha256:40b62e497e8280cb4db3803ad140e9aa15f038e15b3e1218d0c506646f576aec_ppc64le"
},
"product_reference": "rhacm2/submariner-operator-bundle@sha256:40b62e497e8280cb4db3803ad140e9aa15f038e15b3e1218d0c506646f576aec_ppc64le",
"relates_to_product_reference": "8Base-RHACM-2.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhacm2/submariner-operator-bundle@sha256:71c8912419b9a6ac3ddd911c0a2fd097170743efab7dcb1c14141e5e1defc738_arm64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8",
"product_id": "8Base-RHACM-2.5:rhacm2/submariner-operator-bundle@sha256:71c8912419b9a6ac3ddd911c0a2fd097170743efab7dcb1c14141e5e1defc738_arm64"
},
"product_reference": "rhacm2/submariner-operator-bundle@sha256:71c8912419b9a6ac3ddd911c0a2fd097170743efab7dcb1c14141e5e1defc738_arm64",
"relates_to_product_reference": "8Base-RHACM-2.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhacm2/submariner-operator-bundle@sha256:f86cb9bb9dc189057de11e2a5c3c1c10597c78e82432a34cf2864c6a32f8e6fa_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8",
"product_id": "8Base-RHACM-2.5:rhacm2/submariner-operator-bundle@sha256:f86cb9bb9dc189057de11e2a5c3c1c10597c78e82432a34cf2864c6a32f8e6fa_s390x"
},
"product_reference": "rhacm2/submariner-operator-bundle@sha256:f86cb9bb9dc189057de11e2a5c3c1c10597c78e82432a34cf2864c6a32f8e6fa_s390x",
"relates_to_product_reference": "8Base-RHACM-2.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhacm2/submariner-operator-bundle@sha256:fa2fd74dc3918d962ee6ea162e765f45b75a9588017145cd8322469456bc7164_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8",
"product_id": "8Base-RHACM-2.5:rhacm2/submariner-operator-bundle@sha256:fa2fd74dc3918d962ee6ea162e765f45b75a9588017145cd8322469456bc7164_amd64"
},
"product_reference": "rhacm2/submariner-operator-bundle@sha256:fa2fd74dc3918d962ee6ea162e765f45b75a9588017145cd8322469456bc7164_amd64",
"relates_to_product_reference": "8Base-RHACM-2.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhacm2/submariner-rhel8-operator@sha256:2aad67f470d3a58382029b4db1459916036a8f41aed167d567eb1abef45cda3f_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8",
"product_id": "8Base-RHACM-2.5:rhacm2/submariner-rhel8-operator@sha256:2aad67f470d3a58382029b4db1459916036a8f41aed167d567eb1abef45cda3f_ppc64le"
},
"product_reference": "rhacm2/submariner-rhel8-operator@sha256:2aad67f470d3a58382029b4db1459916036a8f41aed167d567eb1abef45cda3f_ppc64le",
"relates_to_product_reference": "8Base-RHACM-2.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhacm2/submariner-rhel8-operator@sha256:971eeffff35343edb6da2be6d2d3620d13536cbbaddacbbd13f285a70490df3a_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8",
"product_id": "8Base-RHACM-2.5:rhacm2/submariner-rhel8-operator@sha256:971eeffff35343edb6da2be6d2d3620d13536cbbaddacbbd13f285a70490df3a_s390x"
},
"product_reference": "rhacm2/submariner-rhel8-operator@sha256:971eeffff35343edb6da2be6d2d3620d13536cbbaddacbbd13f285a70490df3a_s390x",
"relates_to_product_reference": "8Base-RHACM-2.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhacm2/submariner-rhel8-operator@sha256:98811cc217f48bc7a6fbe7d4ccf7b1b7b239e19e24b7fcfeacbec8b297880f89_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8",
"product_id": "8Base-RHACM-2.5:rhacm2/submariner-rhel8-operator@sha256:98811cc217f48bc7a6fbe7d4ccf7b1b7b239e19e24b7fcfeacbec8b297880f89_amd64"
},
"product_reference": "rhacm2/submariner-rhel8-operator@sha256:98811cc217f48bc7a6fbe7d4ccf7b1b7b239e19e24b7fcfeacbec8b297880f89_amd64",
"relates_to_product_reference": "8Base-RHACM-2.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhacm2/submariner-rhel8-operator@sha256:dc2a4dace498a5c6238c555411362c2e6166011582a572d3cab431c745143301_arm64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8",
"product_id": "8Base-RHACM-2.5:rhacm2/submariner-rhel8-operator@sha256:dc2a4dace498a5c6238c555411362c2e6166011582a572d3cab431c745143301_arm64"
},
"product_reference": "rhacm2/submariner-rhel8-operator@sha256:dc2a4dace498a5c6238c555411362c2e6166011582a572d3cab431c745143301_arm64",
"relates_to_product_reference": "8Base-RHACM-2.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhacm2/submariner-route-agent-rhel8@sha256:0f13ca7bb60b17115395a51421916f0136a6d1296da563ba609cf37ec4e31440_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8",
"product_id": "8Base-RHACM-2.5:rhacm2/submariner-route-agent-rhel8@sha256:0f13ca7bb60b17115395a51421916f0136a6d1296da563ba609cf37ec4e31440_ppc64le"
},
"product_reference": "rhacm2/submariner-route-agent-rhel8@sha256:0f13ca7bb60b17115395a51421916f0136a6d1296da563ba609cf37ec4e31440_ppc64le",
"relates_to_product_reference": "8Base-RHACM-2.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhacm2/submariner-route-agent-rhel8@sha256:497545ae0c5ae10463c5ef4a56c0e3733efbff2da65754dce4bbb977cb80d55a_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8",
"product_id": "8Base-RHACM-2.5:rhacm2/submariner-route-agent-rhel8@sha256:497545ae0c5ae10463c5ef4a56c0e3733efbff2da65754dce4bbb977cb80d55a_s390x"
},
"product_reference": "rhacm2/submariner-route-agent-rhel8@sha256:497545ae0c5ae10463c5ef4a56c0e3733efbff2da65754dce4bbb977cb80d55a_s390x",
"relates_to_product_reference": "8Base-RHACM-2.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhacm2/submariner-route-agent-rhel8@sha256:6bff7c4285999b218937924fc75e6303525089064f21d23234a01f453529fbf6_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8",
"product_id": "8Base-RHACM-2.5:rhacm2/submariner-route-agent-rhel8@sha256:6bff7c4285999b218937924fc75e6303525089064f21d23234a01f453529fbf6_amd64"
},
"product_reference": "rhacm2/submariner-route-agent-rhel8@sha256:6bff7c4285999b218937924fc75e6303525089064f21d23234a01f453529fbf6_amd64",
"relates_to_product_reference": "8Base-RHACM-2.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhacm2/submariner-route-agent-rhel8@sha256:d0140f18ad07368201a6e34af970ac9ee402f8ac292e71c42244af85eb37db08_arm64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8",
"product_id": "8Base-RHACM-2.5:rhacm2/submariner-route-agent-rhel8@sha256:d0140f18ad07368201a6e34af970ac9ee402f8ac292e71c42244af85eb37db08_arm64"
},
"product_reference": "rhacm2/submariner-route-agent-rhel8@sha256:d0140f18ad07368201a6e34af970ac9ee402f8ac292e71c42244af85eb37db08_arm64",
"relates_to_product_reference": "8Base-RHACM-2.5"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2022-32149",
"cwe": {
"id": "CWE-407",
"name": "Inefficient Algorithmic Complexity"
},
"discovery_date": "2022-10-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2134010"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in the golang.org/x/text/language package. An attacker can craft an Accept-Language header which ParseAcceptLanguage will take significant time to parse. This issue leads to a denial of service, and can impact availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: golang.org/x/text/language: ParseAcceptLanguage takes a long time to parse complex tags",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-RHACM-2.5:rhacm2/lighthouse-agent-rhel8@sha256:33ac96a6dd01e698c6d037acd701ee0fc5a09bb1cdd8f761c229e6a2be9ea799_amd64",
"8Base-RHACM-2.5:rhacm2/lighthouse-agent-rhel8@sha256:6b579e761576bd97f05c1f5ba42df74db5d22d0203e9d0253efc324cb0bf6378_ppc64le",
"8Base-RHACM-2.5:rhacm2/lighthouse-agent-rhel8@sha256:998706bb956a4fdd15526b5bb6a0458d59ea5cc537e2784b6dec1bb24b6aebbd_s390x",
"8Base-RHACM-2.5:rhacm2/lighthouse-agent-rhel8@sha256:b76b9fc2f08fdedd74511526b3f049a37e8beab3dddd9c3463ea20064aadf194_arm64",
"8Base-RHACM-2.5:rhacm2/lighthouse-coredns-rhel8@sha256:4af85e8acaa3b787828a3352bbfff427c6668936c428169e5fcbd345e802fcc3_arm64",
"8Base-RHACM-2.5:rhacm2/lighthouse-coredns-rhel8@sha256:77e474f4e0be091c3772ec0c16f2a67168dfea599a1f4220deb2fcb795d2d9c7_ppc64le",
"8Base-RHACM-2.5:rhacm2/lighthouse-coredns-rhel8@sha256:dbc246166dd35202221ac3f885a0e46160a6d277a058b6d2f1c7ee571c673b50_s390x",
"8Base-RHACM-2.5:rhacm2/lighthouse-coredns-rhel8@sha256:f27e7895a859ee2ab5f36134522349c1c04f3b18284787e0d14c3380126bf402_amd64",
"8Base-RHACM-2.5:rhacm2/subctl-rhel8@sha256:47cd1ee9aff93dad2e554805836e3393a0d5fc408ffc41a3ffef4676e10ce1f9_ppc64le",
"8Base-RHACM-2.5:rhacm2/subctl-rhel8@sha256:9ab13f289008d38a7cfa2182e4a5fb3a29b0b8efa2da40916018f2449ca730c7_s390x",
"8Base-RHACM-2.5:rhacm2/subctl-rhel8@sha256:dae78580dc26a6beaaeef47575e0cc13c487d5cef1d72c415ddc19368ef3b4a5_arm64",
"8Base-RHACM-2.5:rhacm2/subctl-rhel8@sha256:e6f5f07b97d4998c122cadeee693dce4d72f3bbe2c1f9703b15621b6531cf3a4_amd64",
"8Base-RHACM-2.5:rhacm2/submariner-gateway-rhel8@sha256:2bdd80c985f13cc90a223979c7b26bd5a273504ce973ea2c24b599e1c5f1b3fc_arm64",
"8Base-RHACM-2.5:rhacm2/submariner-gateway-rhel8@sha256:522bddc7d016659157c51f7425098eb92f2b0857f921f5ef01e188af3c9056c6_ppc64le",
"8Base-RHACM-2.5:rhacm2/submariner-gateway-rhel8@sha256:7b343f4f8ea08b2e2a670ee938a2286a92d701e5e92f4f43ee58e620e2ee070b_amd64",
"8Base-RHACM-2.5:rhacm2/submariner-gateway-rhel8@sha256:825db9cddd68a762e934bc855e5836e4f16a566f59d1310f45a06dac85ab8035_s390x",
"8Base-RHACM-2.5:rhacm2/submariner-globalnet-rhel8@sha256:3b04b0be64ea639e82496102236899cc62a2521c8e8bebd07c852118e76bce88_amd64",
"8Base-RHACM-2.5:rhacm2/submariner-globalnet-rhel8@sha256:c9050e94421701df533d7bc7fb2736de3b923a1b9689f7db9285e902d1d9c173_ppc64le",
"8Base-RHACM-2.5:rhacm2/submariner-globalnet-rhel8@sha256:d7fdc22644e6dbf19f21130c0f635e0a6c6e11fb9cbf9d9cbd9635d17fe25fbf_arm64",
"8Base-RHACM-2.5:rhacm2/submariner-globalnet-rhel8@sha256:d855b05d15a54a88e2c026e0d1935b189dc7ceddb3a7b5b0672e8e4c715f3845_s390x",
"8Base-RHACM-2.5:rhacm2/submariner-networkplugin-syncer-rhel8@sha256:0b72b8b294483dcf92d8acaaa56e8ac1141db3c6811ab64298117fafde99936a_arm64",
"8Base-RHACM-2.5:rhacm2/submariner-networkplugin-syncer-rhel8@sha256:39ca01ef63bc7d2663186a516456c90657b918a2ec044af7aadb1315a607f429_s390x",
"8Base-RHACM-2.5:rhacm2/submariner-networkplugin-syncer-rhel8@sha256:5a86959a38334532e5a33ab76b0553a9eae4cfad8897d5f92457a11cb6a5374b_ppc64le",
"8Base-RHACM-2.5:rhacm2/submariner-networkplugin-syncer-rhel8@sha256:91bc8d57c88c771bda7a6703ced10e32e9999116fe8cb7e4adddb6198591eeac_amd64",
"8Base-RHACM-2.5:rhacm2/submariner-operator-bundle@sha256:40b62e497e8280cb4db3803ad140e9aa15f038e15b3e1218d0c506646f576aec_ppc64le",
"8Base-RHACM-2.5:rhacm2/submariner-operator-bundle@sha256:71c8912419b9a6ac3ddd911c0a2fd097170743efab7dcb1c14141e5e1defc738_arm64",
"8Base-RHACM-2.5:rhacm2/submariner-operator-bundle@sha256:f86cb9bb9dc189057de11e2a5c3c1c10597c78e82432a34cf2864c6a32f8e6fa_s390x",
"8Base-RHACM-2.5:rhacm2/submariner-operator-bundle@sha256:fa2fd74dc3918d962ee6ea162e765f45b75a9588017145cd8322469456bc7164_amd64",
"8Base-RHACM-2.5:rhacm2/submariner-rhel8-operator@sha256:2aad67f470d3a58382029b4db1459916036a8f41aed167d567eb1abef45cda3f_ppc64le",
"8Base-RHACM-2.5:rhacm2/submariner-rhel8-operator@sha256:971eeffff35343edb6da2be6d2d3620d13536cbbaddacbbd13f285a70490df3a_s390x",
"8Base-RHACM-2.5:rhacm2/submariner-rhel8-operator@sha256:98811cc217f48bc7a6fbe7d4ccf7b1b7b239e19e24b7fcfeacbec8b297880f89_amd64",
"8Base-RHACM-2.5:rhacm2/submariner-rhel8-operator@sha256:dc2a4dace498a5c6238c555411362c2e6166011582a572d3cab431c745143301_arm64",
"8Base-RHACM-2.5:rhacm2/submariner-route-agent-rhel8@sha256:0f13ca7bb60b17115395a51421916f0136a6d1296da563ba609cf37ec4e31440_ppc64le",
"8Base-RHACM-2.5:rhacm2/submariner-route-agent-rhel8@sha256:497545ae0c5ae10463c5ef4a56c0e3733efbff2da65754dce4bbb977cb80d55a_s390x",
"8Base-RHACM-2.5:rhacm2/submariner-route-agent-rhel8@sha256:6bff7c4285999b218937924fc75e6303525089064f21d23234a01f453529fbf6_amd64",
"8Base-RHACM-2.5:rhacm2/submariner-route-agent-rhel8@sha256:d0140f18ad07368201a6e34af970ac9ee402f8ac292e71c42244af85eb37db08_arm64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-32149"
},
{
"category": "external",
"summary": "RHBZ#2134010",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2134010"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-32149",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32149"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-32149",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-32149"
},
{
"category": "external",
"summary": "https://go.dev/issue/56152",
"url": "https://go.dev/issue/56152"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-dev/c/qfPIly0X7aU",
"url": "https://groups.google.com/g/golang-dev/c/qfPIly0X7aU"
}
],
"release_date": "2022-10-11T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-01-26T21:22:22+00:00",
"details": "For details on how to install Submariner, refer to:\n\nhttps://access.redhat.com/documentation/en-us/red_hat_advanced_cluster_management_for_kubernetes/2.5/html/add-ons/add-ons-overview#submariner-deploy-console \n\nand\n\nhttps://submariner.io/getting-started/",
"product_ids": [
"8Base-RHACM-2.5:rhacm2/lighthouse-agent-rhel8@sha256:33ac96a6dd01e698c6d037acd701ee0fc5a09bb1cdd8f761c229e6a2be9ea799_amd64",
"8Base-RHACM-2.5:rhacm2/lighthouse-agent-rhel8@sha256:6b579e761576bd97f05c1f5ba42df74db5d22d0203e9d0253efc324cb0bf6378_ppc64le",
"8Base-RHACM-2.5:rhacm2/lighthouse-agent-rhel8@sha256:998706bb956a4fdd15526b5bb6a0458d59ea5cc537e2784b6dec1bb24b6aebbd_s390x",
"8Base-RHACM-2.5:rhacm2/lighthouse-agent-rhel8@sha256:b76b9fc2f08fdedd74511526b3f049a37e8beab3dddd9c3463ea20064aadf194_arm64",
"8Base-RHACM-2.5:rhacm2/lighthouse-coredns-rhel8@sha256:4af85e8acaa3b787828a3352bbfff427c6668936c428169e5fcbd345e802fcc3_arm64",
"8Base-RHACM-2.5:rhacm2/lighthouse-coredns-rhel8@sha256:77e474f4e0be091c3772ec0c16f2a67168dfea599a1f4220deb2fcb795d2d9c7_ppc64le",
"8Base-RHACM-2.5:rhacm2/lighthouse-coredns-rhel8@sha256:dbc246166dd35202221ac3f885a0e46160a6d277a058b6d2f1c7ee571c673b50_s390x",
"8Base-RHACM-2.5:rhacm2/lighthouse-coredns-rhel8@sha256:f27e7895a859ee2ab5f36134522349c1c04f3b18284787e0d14c3380126bf402_amd64",
"8Base-RHACM-2.5:rhacm2/subctl-rhel8@sha256:47cd1ee9aff93dad2e554805836e3393a0d5fc408ffc41a3ffef4676e10ce1f9_ppc64le",
"8Base-RHACM-2.5:rhacm2/subctl-rhel8@sha256:9ab13f289008d38a7cfa2182e4a5fb3a29b0b8efa2da40916018f2449ca730c7_s390x",
"8Base-RHACM-2.5:rhacm2/subctl-rhel8@sha256:dae78580dc26a6beaaeef47575e0cc13c487d5cef1d72c415ddc19368ef3b4a5_arm64",
"8Base-RHACM-2.5:rhacm2/subctl-rhel8@sha256:e6f5f07b97d4998c122cadeee693dce4d72f3bbe2c1f9703b15621b6531cf3a4_amd64",
"8Base-RHACM-2.5:rhacm2/submariner-gateway-rhel8@sha256:2bdd80c985f13cc90a223979c7b26bd5a273504ce973ea2c24b599e1c5f1b3fc_arm64",
"8Base-RHACM-2.5:rhacm2/submariner-gateway-rhel8@sha256:522bddc7d016659157c51f7425098eb92f2b0857f921f5ef01e188af3c9056c6_ppc64le",
"8Base-RHACM-2.5:rhacm2/submariner-gateway-rhel8@sha256:7b343f4f8ea08b2e2a670ee938a2286a92d701e5e92f4f43ee58e620e2ee070b_amd64",
"8Base-RHACM-2.5:rhacm2/submariner-gateway-rhel8@sha256:825db9cddd68a762e934bc855e5836e4f16a566f59d1310f45a06dac85ab8035_s390x",
"8Base-RHACM-2.5:rhacm2/submariner-globalnet-rhel8@sha256:3b04b0be64ea639e82496102236899cc62a2521c8e8bebd07c852118e76bce88_amd64",
"8Base-RHACM-2.5:rhacm2/submariner-globalnet-rhel8@sha256:c9050e94421701df533d7bc7fb2736de3b923a1b9689f7db9285e902d1d9c173_ppc64le",
"8Base-RHACM-2.5:rhacm2/submariner-globalnet-rhel8@sha256:d7fdc22644e6dbf19f21130c0f635e0a6c6e11fb9cbf9d9cbd9635d17fe25fbf_arm64",
"8Base-RHACM-2.5:rhacm2/submariner-globalnet-rhel8@sha256:d855b05d15a54a88e2c026e0d1935b189dc7ceddb3a7b5b0672e8e4c715f3845_s390x",
"8Base-RHACM-2.5:rhacm2/submariner-networkplugin-syncer-rhel8@sha256:0b72b8b294483dcf92d8acaaa56e8ac1141db3c6811ab64298117fafde99936a_arm64",
"8Base-RHACM-2.5:rhacm2/submariner-networkplugin-syncer-rhel8@sha256:39ca01ef63bc7d2663186a516456c90657b918a2ec044af7aadb1315a607f429_s390x",
"8Base-RHACM-2.5:rhacm2/submariner-networkplugin-syncer-rhel8@sha256:5a86959a38334532e5a33ab76b0553a9eae4cfad8897d5f92457a11cb6a5374b_ppc64le",
"8Base-RHACM-2.5:rhacm2/submariner-networkplugin-syncer-rhel8@sha256:91bc8d57c88c771bda7a6703ced10e32e9999116fe8cb7e4adddb6198591eeac_amd64",
"8Base-RHACM-2.5:rhacm2/submariner-operator-bundle@sha256:40b62e497e8280cb4db3803ad140e9aa15f038e15b3e1218d0c506646f576aec_ppc64le",
"8Base-RHACM-2.5:rhacm2/submariner-operator-bundle@sha256:71c8912419b9a6ac3ddd911c0a2fd097170743efab7dcb1c14141e5e1defc738_arm64",
"8Base-RHACM-2.5:rhacm2/submariner-operator-bundle@sha256:f86cb9bb9dc189057de11e2a5c3c1c10597c78e82432a34cf2864c6a32f8e6fa_s390x",
"8Base-RHACM-2.5:rhacm2/submariner-operator-bundle@sha256:fa2fd74dc3918d962ee6ea162e765f45b75a9588017145cd8322469456bc7164_amd64",
"8Base-RHACM-2.5:rhacm2/submariner-rhel8-operator@sha256:2aad67f470d3a58382029b4db1459916036a8f41aed167d567eb1abef45cda3f_ppc64le",
"8Base-RHACM-2.5:rhacm2/submariner-rhel8-operator@sha256:971eeffff35343edb6da2be6d2d3620d13536cbbaddacbbd13f285a70490df3a_s390x",
"8Base-RHACM-2.5:rhacm2/submariner-rhel8-operator@sha256:98811cc217f48bc7a6fbe7d4ccf7b1b7b239e19e24b7fcfeacbec8b297880f89_amd64",
"8Base-RHACM-2.5:rhacm2/submariner-rhel8-operator@sha256:dc2a4dace498a5c6238c555411362c2e6166011582a572d3cab431c745143301_arm64",
"8Base-RHACM-2.5:rhacm2/submariner-route-agent-rhel8@sha256:0f13ca7bb60b17115395a51421916f0136a6d1296da563ba609cf37ec4e31440_ppc64le",
"8Base-RHACM-2.5:rhacm2/submariner-route-agent-rhel8@sha256:497545ae0c5ae10463c5ef4a56c0e3733efbff2da65754dce4bbb977cb80d55a_s390x",
"8Base-RHACM-2.5:rhacm2/submariner-route-agent-rhel8@sha256:6bff7c4285999b218937924fc75e6303525089064f21d23234a01f453529fbf6_amd64",
"8Base-RHACM-2.5:rhacm2/submariner-route-agent-rhel8@sha256:d0140f18ad07368201a6e34af970ac9ee402f8ac292e71c42244af85eb37db08_arm64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:0481"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"8Base-RHACM-2.5:rhacm2/lighthouse-agent-rhel8@sha256:33ac96a6dd01e698c6d037acd701ee0fc5a09bb1cdd8f761c229e6a2be9ea799_amd64",
"8Base-RHACM-2.5:rhacm2/lighthouse-agent-rhel8@sha256:6b579e761576bd97f05c1f5ba42df74db5d22d0203e9d0253efc324cb0bf6378_ppc64le",
"8Base-RHACM-2.5:rhacm2/lighthouse-agent-rhel8@sha256:998706bb956a4fdd15526b5bb6a0458d59ea5cc537e2784b6dec1bb24b6aebbd_s390x",
"8Base-RHACM-2.5:rhacm2/lighthouse-agent-rhel8@sha256:b76b9fc2f08fdedd74511526b3f049a37e8beab3dddd9c3463ea20064aadf194_arm64",
"8Base-RHACM-2.5:rhacm2/lighthouse-coredns-rhel8@sha256:4af85e8acaa3b787828a3352bbfff427c6668936c428169e5fcbd345e802fcc3_arm64",
"8Base-RHACM-2.5:rhacm2/lighthouse-coredns-rhel8@sha256:77e474f4e0be091c3772ec0c16f2a67168dfea599a1f4220deb2fcb795d2d9c7_ppc64le",
"8Base-RHACM-2.5:rhacm2/lighthouse-coredns-rhel8@sha256:dbc246166dd35202221ac3f885a0e46160a6d277a058b6d2f1c7ee571c673b50_s390x",
"8Base-RHACM-2.5:rhacm2/lighthouse-coredns-rhel8@sha256:f27e7895a859ee2ab5f36134522349c1c04f3b18284787e0d14c3380126bf402_amd64",
"8Base-RHACM-2.5:rhacm2/subctl-rhel8@sha256:47cd1ee9aff93dad2e554805836e3393a0d5fc408ffc41a3ffef4676e10ce1f9_ppc64le",
"8Base-RHACM-2.5:rhacm2/subctl-rhel8@sha256:9ab13f289008d38a7cfa2182e4a5fb3a29b0b8efa2da40916018f2449ca730c7_s390x",
"8Base-RHACM-2.5:rhacm2/subctl-rhel8@sha256:dae78580dc26a6beaaeef47575e0cc13c487d5cef1d72c415ddc19368ef3b4a5_arm64",
"8Base-RHACM-2.5:rhacm2/subctl-rhel8@sha256:e6f5f07b97d4998c122cadeee693dce4d72f3bbe2c1f9703b15621b6531cf3a4_amd64",
"8Base-RHACM-2.5:rhacm2/submariner-gateway-rhel8@sha256:2bdd80c985f13cc90a223979c7b26bd5a273504ce973ea2c24b599e1c5f1b3fc_arm64",
"8Base-RHACM-2.5:rhacm2/submariner-gateway-rhel8@sha256:522bddc7d016659157c51f7425098eb92f2b0857f921f5ef01e188af3c9056c6_ppc64le",
"8Base-RHACM-2.5:rhacm2/submariner-gateway-rhel8@sha256:7b343f4f8ea08b2e2a670ee938a2286a92d701e5e92f4f43ee58e620e2ee070b_amd64",
"8Base-RHACM-2.5:rhacm2/submariner-gateway-rhel8@sha256:825db9cddd68a762e934bc855e5836e4f16a566f59d1310f45a06dac85ab8035_s390x",
"8Base-RHACM-2.5:rhacm2/submariner-globalnet-rhel8@sha256:3b04b0be64ea639e82496102236899cc62a2521c8e8bebd07c852118e76bce88_amd64",
"8Base-RHACM-2.5:rhacm2/submariner-globalnet-rhel8@sha256:c9050e94421701df533d7bc7fb2736de3b923a1b9689f7db9285e902d1d9c173_ppc64le",
"8Base-RHACM-2.5:rhacm2/submariner-globalnet-rhel8@sha256:d7fdc22644e6dbf19f21130c0f635e0a6c6e11fb9cbf9d9cbd9635d17fe25fbf_arm64",
"8Base-RHACM-2.5:rhacm2/submariner-globalnet-rhel8@sha256:d855b05d15a54a88e2c026e0d1935b189dc7ceddb3a7b5b0672e8e4c715f3845_s390x",
"8Base-RHACM-2.5:rhacm2/submariner-networkplugin-syncer-rhel8@sha256:0b72b8b294483dcf92d8acaaa56e8ac1141db3c6811ab64298117fafde99936a_arm64",
"8Base-RHACM-2.5:rhacm2/submariner-networkplugin-syncer-rhel8@sha256:39ca01ef63bc7d2663186a516456c90657b918a2ec044af7aadb1315a607f429_s390x",
"8Base-RHACM-2.5:rhacm2/submariner-networkplugin-syncer-rhel8@sha256:5a86959a38334532e5a33ab76b0553a9eae4cfad8897d5f92457a11cb6a5374b_ppc64le",
"8Base-RHACM-2.5:rhacm2/submariner-networkplugin-syncer-rhel8@sha256:91bc8d57c88c771bda7a6703ced10e32e9999116fe8cb7e4adddb6198591eeac_amd64",
"8Base-RHACM-2.5:rhacm2/submariner-operator-bundle@sha256:40b62e497e8280cb4db3803ad140e9aa15f038e15b3e1218d0c506646f576aec_ppc64le",
"8Base-RHACM-2.5:rhacm2/submariner-operator-bundle@sha256:71c8912419b9a6ac3ddd911c0a2fd097170743efab7dcb1c14141e5e1defc738_arm64",
"8Base-RHACM-2.5:rhacm2/submariner-operator-bundle@sha256:f86cb9bb9dc189057de11e2a5c3c1c10597c78e82432a34cf2864c6a32f8e6fa_s390x",
"8Base-RHACM-2.5:rhacm2/submariner-operator-bundle@sha256:fa2fd74dc3918d962ee6ea162e765f45b75a9588017145cd8322469456bc7164_amd64",
"8Base-RHACM-2.5:rhacm2/submariner-rhel8-operator@sha256:2aad67f470d3a58382029b4db1459916036a8f41aed167d567eb1abef45cda3f_ppc64le",
"8Base-RHACM-2.5:rhacm2/submariner-rhel8-operator@sha256:971eeffff35343edb6da2be6d2d3620d13536cbbaddacbbd13f285a70490df3a_s390x",
"8Base-RHACM-2.5:rhacm2/submariner-rhel8-operator@sha256:98811cc217f48bc7a6fbe7d4ccf7b1b7b239e19e24b7fcfeacbec8b297880f89_amd64",
"8Base-RHACM-2.5:rhacm2/submariner-rhel8-operator@sha256:dc2a4dace498a5c6238c555411362c2e6166011582a572d3cab431c745143301_arm64",
"8Base-RHACM-2.5:rhacm2/submariner-route-agent-rhel8@sha256:0f13ca7bb60b17115395a51421916f0136a6d1296da563ba609cf37ec4e31440_ppc64le",
"8Base-RHACM-2.5:rhacm2/submariner-route-agent-rhel8@sha256:497545ae0c5ae10463c5ef4a56c0e3733efbff2da65754dce4bbb977cb80d55a_s390x",
"8Base-RHACM-2.5:rhacm2/submariner-route-agent-rhel8@sha256:6bff7c4285999b218937924fc75e6303525089064f21d23234a01f453529fbf6_amd64",
"8Base-RHACM-2.5:rhacm2/submariner-route-agent-rhel8@sha256:d0140f18ad07368201a6e34af970ac9ee402f8ac292e71c42244af85eb37db08_arm64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "golang: golang.org/x/text/language: ParseAcceptLanguage takes a long time to parse complex tags"
}
]
}
rhsa-2024_2077
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for the container-tools:rhel8 module is now available for Red Hat Enterprise Linux 8.8 Extended Update Support.\n\nSecurity team has rated the vulnerability impact of the fixed issues as Important.",
"title": "Topic"
},
{
"category": "general",
"text": "The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc.\n\nSecurity Fix(es):\n\n* golang: golang.org/x/text/language: ParseAcceptLanguage takes a long time to parse complex tags (CVE-2022-32149)\n\n* podman: Symlink error leads to information disclosure (CVE-2022-4122)\n\n* buildah: full container escape at build time (CVE-2024-1753)\n\nFor more details about the security issue(s), including the impact, a CVSS\nscore, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2024:2077",
"url": "https://access.redhat.com/errata/RHSA-2024:2077"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "2134010",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2134010"
},
{
"category": "external",
"summary": "2144983",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2144983"
},
{
"category": "external",
"summary": "2265513",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2265513"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_2077.json"
}
],
"title": "Red Hat Security Advisory: container-tools:rhel8 security and bug fix update",
"tracking": {
"current_release_date": "2025-01-06T19:40:47+00:00",
"generator": {
"date": "2025-01-06T19:40:47+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.5"
}
},
"id": "RHSA-2024:2077",
"initial_release_date": "2024-04-29T12:00:29+00:00",
"revision_history": [
{
"date": "2024-04-29T12:00:29+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2024-04-29T12:00:29+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-01-06T19:40:47+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product": {
"name": "Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_eus:8.8::appstream"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "container-tools:rhel8:8080020240422101606:0f77c1b7",
"product": {
"name": "container-tools:rhel8:8080020240422101606:0f77c1b7",
"product_id": "container-tools:rhel8:8080020240422101606:0f77c1b7",
"product_identification_helper": {
"purl": "pkg:rpmmod/redhat/container-tools@rhel8:8080020240422101606:0f77c1b7"
}
}
},
{
"category": "product_version",
"name": "cockpit-podman-0:63.1-1.module+el8.8.0+21741+dd5be1e7.noarch",
"product": {
"name": "cockpit-podman-0:63.1-1.module+el8.8.0+21741+dd5be1e7.noarch",
"product_id": "cockpit-podman-0:63.1-1.module+el8.8.0+21741+dd5be1e7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cockpit-podman@63.1-1.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "container-selinux-2:2.229.0-1.module+el8.8.0+21741+dd5be1e7.noarch",
"product": {
"name": "container-selinux-2:2.229.0-1.module+el8.8.0+21741+dd5be1e7.noarch",
"product_id": "container-selinux-2:2.229.0-1.module+el8.8.0+21741+dd5be1e7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/container-selinux@2.229.0-1.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=noarch\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "podman-docker-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.noarch",
"product": {
"name": "podman-docker-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.noarch",
"product_id": "podman-docker-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-docker@4.4.1-19.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=noarch\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "python3-podman-0:4.4.1-1.module+el8.8.0+21741+dd5be1e7.noarch",
"product": {
"name": "python3-podman-0:4.4.1-1.module+el8.8.0+21741+dd5be1e7.noarch",
"product_id": "python3-podman-0:4.4.1-1.module+el8.8.0+21741+dd5be1e7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-podman@4.4.1-1.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "udica-0:0.2.6-20.module+el8.8.0+21741+dd5be1e7.noarch",
"product": {
"name": "udica-0:0.2.6-20.module+el8.8.0+21741+dd5be1e7.noarch",
"product_id": "udica-0:0.2.6-20.module+el8.8.0+21741+dd5be1e7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/udica@0.2.6-20.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "aardvark-dns-2:1.5.0-2.module+el8.8.0+21741+dd5be1e7.src",
"product": {
"name": "aardvark-dns-2:1.5.0-2.module+el8.8.0+21741+dd5be1e7.src",
"product_id": "aardvark-dns-2:1.5.0-2.module+el8.8.0+21741+dd5be1e7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/aardvark-dns@1.5.0-2.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=src\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "buildah-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.src",
"product": {
"name": "buildah-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.src",
"product_id": "buildah-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/buildah@1.29.3-1.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=src\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "cockpit-podman-0:63.1-1.module+el8.8.0+21741+dd5be1e7.src",
"product": {
"name": "cockpit-podman-0:63.1-1.module+el8.8.0+21741+dd5be1e7.src",
"product_id": "cockpit-podman-0:63.1-1.module+el8.8.0+21741+dd5be1e7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cockpit-podman@63.1-1.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=src"
}
}
},
{
"category": "product_version",
"name": "conmon-3:2.1.6-1.module+el8.8.0+21741+dd5be1e7.src",
"product": {
"name": "conmon-3:2.1.6-1.module+el8.8.0+21741+dd5be1e7.src",
"product_id": "conmon-3:2.1.6-1.module+el8.8.0+21741+dd5be1e7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/conmon@2.1.6-1.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=src\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "container-selinux-2:2.229.0-1.module+el8.8.0+21741+dd5be1e7.src",
"product": {
"name": "container-selinux-2:2.229.0-1.module+el8.8.0+21741+dd5be1e7.src",
"product_id": "container-selinux-2:2.229.0-1.module+el8.8.0+21741+dd5be1e7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/container-selinux@2.229.0-1.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=src\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "containernetworking-plugins-1:1.2.0-1.module+el8.8.0+21741+dd5be1e7.src",
"product": {
"name": "containernetworking-plugins-1:1.2.0-1.module+el8.8.0+21741+dd5be1e7.src",
"product_id": "containernetworking-plugins-1:1.2.0-1.module+el8.8.0+21741+dd5be1e7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/containernetworking-plugins@1.2.0-1.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=src\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "containers-common-2:1-65.module+el8.8.0+21741+dd5be1e7.src",
"product": {
"name": "containers-common-2:1-65.module+el8.8.0+21741+dd5be1e7.src",
"product_id": "containers-common-2:1-65.module+el8.8.0+21741+dd5be1e7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/containers-common@1-65.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=src\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "criu-0:3.15-4.module+el8.8.0+21741+dd5be1e7.src",
"product": {
"name": "criu-0:3.15-4.module+el8.8.0+21741+dd5be1e7.src",
"product_id": "criu-0:3.15-4.module+el8.8.0+21741+dd5be1e7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/criu@3.15-4.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=src"
}
}
},
{
"category": "product_version",
"name": "crun-0:1.8.4-2.module+el8.8.0+21741+dd5be1e7.src",
"product": {
"name": "crun-0:1.8.4-2.module+el8.8.0+21741+dd5be1e7.src",
"product_id": "crun-0:1.8.4-2.module+el8.8.0+21741+dd5be1e7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/crun@1.8.4-2.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=src"
}
}
},
{
"category": "product_version",
"name": "fuse-overlayfs-0:1.11-1.module+el8.8.0+21741+dd5be1e7.src",
"product": {
"name": "fuse-overlayfs-0:1.11-1.module+el8.8.0+21741+dd5be1e7.src",
"product_id": "fuse-overlayfs-0:1.11-1.module+el8.8.0+21741+dd5be1e7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fuse-overlayfs@1.11-1.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=src"
}
}
},
{
"category": "product_version",
"name": "libslirp-0:4.4.0-1.module+el8.8.0+21741+dd5be1e7.src",
"product": {
"name": "libslirp-0:4.4.0-1.module+el8.8.0+21741+dd5be1e7.src",
"product_id": "libslirp-0:4.4.0-1.module+el8.8.0+21741+dd5be1e7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libslirp@4.4.0-1.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=src"
}
}
},
{
"category": "product_version",
"name": "netavark-2:1.5.1-3.module+el8.8.0+21741+dd5be1e7.src",
"product": {
"name": "netavark-2:1.5.1-3.module+el8.8.0+21741+dd5be1e7.src",
"product_id": "netavark-2:1.5.1-3.module+el8.8.0+21741+dd5be1e7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/netavark@1.5.1-3.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=src\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "oci-seccomp-bpf-hook-0:1.2.8-1.module+el8.8.0+21741+dd5be1e7.src",
"product": {
"name": "oci-seccomp-bpf-hook-0:1.2.8-1.module+el8.8.0+21741+dd5be1e7.src",
"product_id": "oci-seccomp-bpf-hook-0:1.2.8-1.module+el8.8.0+21741+dd5be1e7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/oci-seccomp-bpf-hook@1.2.8-1.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=src"
}
}
},
{
"category": "product_version",
"name": "podman-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.src",
"product": {
"name": "podman-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.src",
"product_id": "podman-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman@4.4.1-19.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=src\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "python-podman-0:4.4.1-1.module+el8.8.0+21741+dd5be1e7.src",
"product": {
"name": "python-podman-0:4.4.1-1.module+el8.8.0+21741+dd5be1e7.src",
"product_id": "python-podman-0:4.4.1-1.module+el8.8.0+21741+dd5be1e7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-podman@4.4.1-1.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=src"
}
}
},
{
"category": "product_version",
"name": "runc-1:1.1.12-1.module+el8.8.0+21741+dd5be1e7.src",
"product": {
"name": "runc-1:1.1.12-1.module+el8.8.0+21741+dd5be1e7.src",
"product_id": "runc-1:1.1.12-1.module+el8.8.0+21741+dd5be1e7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/runc@1.1.12-1.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=src\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "skopeo-2:1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.src",
"product": {
"name": "skopeo-2:1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.src",
"product_id": "skopeo-2:1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/skopeo@1.11.2-0.2.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=src\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "slirp4netns-0:1.2.0-3.module+el8.8.0+21741+dd5be1e7.src",
"product": {
"name": "slirp4netns-0:1.2.0-3.module+el8.8.0+21741+dd5be1e7.src",
"product_id": "slirp4netns-0:1.2.0-3.module+el8.8.0+21741+dd5be1e7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/slirp4netns@1.2.0-3.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=src"
}
}
},
{
"category": "product_version",
"name": "toolbox-0:0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.src",
"product": {
"name": "toolbox-0:0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.src",
"product_id": "toolbox-0:0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/toolbox@0.0.99.3-7.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=src"
}
}
},
{
"category": "product_version",
"name": "udica-0:0.2.6-20.module+el8.8.0+21741+dd5be1e7.src",
"product": {
"name": "udica-0:0.2.6-20.module+el8.8.0+21741+dd5be1e7.src",
"product_id": "udica-0:0.2.6-20.module+el8.8.0+21741+dd5be1e7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/udica@0.2.6-20.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "aardvark-dns-2:1.5.0-2.module+el8.8.0+21741+dd5be1e7.x86_64",
"product": {
"name": "aardvark-dns-2:1.5.0-2.module+el8.8.0+21741+dd5be1e7.x86_64",
"product_id": "aardvark-dns-2:1.5.0-2.module+el8.8.0+21741+dd5be1e7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/aardvark-dns@1.5.0-2.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=x86_64\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "buildah-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.x86_64",
"product": {
"name": "buildah-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.x86_64",
"product_id": "buildah-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/buildah@1.29.3-1.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "buildah-debuginfo-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.x86_64",
"product": {
"name": "buildah-debuginfo-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.x86_64",
"product_id": "buildah-debuginfo-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/buildah-debuginfo@1.29.3-1.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "buildah-debugsource-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.x86_64",
"product": {
"name": "buildah-debugsource-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.x86_64",
"product_id": "buildah-debugsource-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/buildah-debugsource@1.29.3-1.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "buildah-tests-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.x86_64",
"product": {
"name": "buildah-tests-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.x86_64",
"product_id": "buildah-tests-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/buildah-tests@1.29.3-1.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "buildah-tests-debuginfo-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.x86_64",
"product": {
"name": "buildah-tests-debuginfo-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.x86_64",
"product_id": "buildah-tests-debuginfo-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/buildah-tests-debuginfo@1.29.3-1.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "conmon-3:2.1.6-1.module+el8.8.0+21741+dd5be1e7.x86_64",
"product": {
"name": "conmon-3:2.1.6-1.module+el8.8.0+21741+dd5be1e7.x86_64",
"product_id": "conmon-3:2.1.6-1.module+el8.8.0+21741+dd5be1e7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/conmon@2.1.6-1.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=x86_64\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "conmon-debuginfo-3:2.1.6-1.module+el8.8.0+21741+dd5be1e7.x86_64",
"product": {
"name": "conmon-debuginfo-3:2.1.6-1.module+el8.8.0+21741+dd5be1e7.x86_64",
"product_id": "conmon-debuginfo-3:2.1.6-1.module+el8.8.0+21741+dd5be1e7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/conmon-debuginfo@2.1.6-1.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=x86_64\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "conmon-debugsource-3:2.1.6-1.module+el8.8.0+21741+dd5be1e7.x86_64",
"product": {
"name": "conmon-debugsource-3:2.1.6-1.module+el8.8.0+21741+dd5be1e7.x86_64",
"product_id": "conmon-debugsource-3:2.1.6-1.module+el8.8.0+21741+dd5be1e7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/conmon-debugsource@2.1.6-1.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=x86_64\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "containernetworking-plugins-1:1.2.0-1.module+el8.8.0+21741+dd5be1e7.x86_64",
"product": {
"name": "containernetworking-plugins-1:1.2.0-1.module+el8.8.0+21741+dd5be1e7.x86_64",
"product_id": "containernetworking-plugins-1:1.2.0-1.module+el8.8.0+21741+dd5be1e7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/containernetworking-plugins@1.2.0-1.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "containernetworking-plugins-debuginfo-1:1.2.0-1.module+el8.8.0+21741+dd5be1e7.x86_64",
"product": {
"name": "containernetworking-plugins-debuginfo-1:1.2.0-1.module+el8.8.0+21741+dd5be1e7.x86_64",
"product_id": "containernetworking-plugins-debuginfo-1:1.2.0-1.module+el8.8.0+21741+dd5be1e7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/containernetworking-plugins-debuginfo@1.2.0-1.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "containernetworking-plugins-debugsource-1:1.2.0-1.module+el8.8.0+21741+dd5be1e7.x86_64",
"product": {
"name": "containernetworking-plugins-debugsource-1:1.2.0-1.module+el8.8.0+21741+dd5be1e7.x86_64",
"product_id": "containernetworking-plugins-debugsource-1:1.2.0-1.module+el8.8.0+21741+dd5be1e7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/containernetworking-plugins-debugsource@1.2.0-1.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "containers-common-2:1-65.module+el8.8.0+21741+dd5be1e7.x86_64",
"product": {
"name": "containers-common-2:1-65.module+el8.8.0+21741+dd5be1e7.x86_64",
"product_id": "containers-common-2:1-65.module+el8.8.0+21741+dd5be1e7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/containers-common@1-65.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=x86_64\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "crit-0:3.15-4.module+el8.8.0+21741+dd5be1e7.x86_64",
"product": {
"name": "crit-0:3.15-4.module+el8.8.0+21741+dd5be1e7.x86_64",
"product_id": "crit-0:3.15-4.module+el8.8.0+21741+dd5be1e7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/crit@3.15-4.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "criu-0:3.15-4.module+el8.8.0+21741+dd5be1e7.x86_64",
"product": {
"name": "criu-0:3.15-4.module+el8.8.0+21741+dd5be1e7.x86_64",
"product_id": "criu-0:3.15-4.module+el8.8.0+21741+dd5be1e7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/criu@3.15-4.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "criu-debuginfo-0:3.15-4.module+el8.8.0+21741+dd5be1e7.x86_64",
"product": {
"name": "criu-debuginfo-0:3.15-4.module+el8.8.0+21741+dd5be1e7.x86_64",
"product_id": "criu-debuginfo-0:3.15-4.module+el8.8.0+21741+dd5be1e7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/criu-debuginfo@3.15-4.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "criu-debugsource-0:3.15-4.module+el8.8.0+21741+dd5be1e7.x86_64",
"product": {
"name": "criu-debugsource-0:3.15-4.module+el8.8.0+21741+dd5be1e7.x86_64",
"product_id": "criu-debugsource-0:3.15-4.module+el8.8.0+21741+dd5be1e7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/criu-debugsource@3.15-4.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "criu-devel-0:3.15-4.module+el8.8.0+21741+dd5be1e7.x86_64",
"product": {
"name": "criu-devel-0:3.15-4.module+el8.8.0+21741+dd5be1e7.x86_64",
"product_id": "criu-devel-0:3.15-4.module+el8.8.0+21741+dd5be1e7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/criu-devel@3.15-4.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "criu-libs-0:3.15-4.module+el8.8.0+21741+dd5be1e7.x86_64",
"product": {
"name": "criu-libs-0:3.15-4.module+el8.8.0+21741+dd5be1e7.x86_64",
"product_id": "criu-libs-0:3.15-4.module+el8.8.0+21741+dd5be1e7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/criu-libs@3.15-4.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "criu-libs-debuginfo-0:3.15-4.module+el8.8.0+21741+dd5be1e7.x86_64",
"product": {
"name": "criu-libs-debuginfo-0:3.15-4.module+el8.8.0+21741+dd5be1e7.x86_64",
"product_id": "criu-libs-debuginfo-0:3.15-4.module+el8.8.0+21741+dd5be1e7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/criu-libs-debuginfo@3.15-4.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "crun-0:1.8.4-2.module+el8.8.0+21741+dd5be1e7.x86_64",
"product": {
"name": "crun-0:1.8.4-2.module+el8.8.0+21741+dd5be1e7.x86_64",
"product_id": "crun-0:1.8.4-2.module+el8.8.0+21741+dd5be1e7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/crun@1.8.4-2.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "crun-debuginfo-0:1.8.4-2.module+el8.8.0+21741+dd5be1e7.x86_64",
"product": {
"name": "crun-debuginfo-0:1.8.4-2.module+el8.8.0+21741+dd5be1e7.x86_64",
"product_id": "crun-debuginfo-0:1.8.4-2.module+el8.8.0+21741+dd5be1e7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/crun-debuginfo@1.8.4-2.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "crun-debugsource-0:1.8.4-2.module+el8.8.0+21741+dd5be1e7.x86_64",
"product": {
"name": "crun-debugsource-0:1.8.4-2.module+el8.8.0+21741+dd5be1e7.x86_64",
"product_id": "crun-debugsource-0:1.8.4-2.module+el8.8.0+21741+dd5be1e7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/crun-debugsource@1.8.4-2.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "fuse-overlayfs-0:1.11-1.module+el8.8.0+21741+dd5be1e7.x86_64",
"product": {
"name": "fuse-overlayfs-0:1.11-1.module+el8.8.0+21741+dd5be1e7.x86_64",
"product_id": "fuse-overlayfs-0:1.11-1.module+el8.8.0+21741+dd5be1e7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fuse-overlayfs@1.11-1.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "fuse-overlayfs-debuginfo-0:1.11-1.module+el8.8.0+21741+dd5be1e7.x86_64",
"product": {
"name": "fuse-overlayfs-debuginfo-0:1.11-1.module+el8.8.0+21741+dd5be1e7.x86_64",
"product_id": "fuse-overlayfs-debuginfo-0:1.11-1.module+el8.8.0+21741+dd5be1e7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fuse-overlayfs-debuginfo@1.11-1.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "fuse-overlayfs-debugsource-0:1.11-1.module+el8.8.0+21741+dd5be1e7.x86_64",
"product": {
"name": "fuse-overlayfs-debugsource-0:1.11-1.module+el8.8.0+21741+dd5be1e7.x86_64",
"product_id": "fuse-overlayfs-debugsource-0:1.11-1.module+el8.8.0+21741+dd5be1e7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fuse-overlayfs-debugsource@1.11-1.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libslirp-0:4.4.0-1.module+el8.8.0+21741+dd5be1e7.x86_64",
"product": {
"name": "libslirp-0:4.4.0-1.module+el8.8.0+21741+dd5be1e7.x86_64",
"product_id": "libslirp-0:4.4.0-1.module+el8.8.0+21741+dd5be1e7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libslirp@4.4.0-1.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libslirp-debuginfo-0:4.4.0-1.module+el8.8.0+21741+dd5be1e7.x86_64",
"product": {
"name": "libslirp-debuginfo-0:4.4.0-1.module+el8.8.0+21741+dd5be1e7.x86_64",
"product_id": "libslirp-debuginfo-0:4.4.0-1.module+el8.8.0+21741+dd5be1e7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libslirp-debuginfo@4.4.0-1.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libslirp-debugsource-0:4.4.0-1.module+el8.8.0+21741+dd5be1e7.x86_64",
"product": {
"name": "libslirp-debugsource-0:4.4.0-1.module+el8.8.0+21741+dd5be1e7.x86_64",
"product_id": "libslirp-debugsource-0:4.4.0-1.module+el8.8.0+21741+dd5be1e7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libslirp-debugsource@4.4.0-1.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libslirp-devel-0:4.4.0-1.module+el8.8.0+21741+dd5be1e7.x86_64",
"product": {
"name": "libslirp-devel-0:4.4.0-1.module+el8.8.0+21741+dd5be1e7.x86_64",
"product_id": "libslirp-devel-0:4.4.0-1.module+el8.8.0+21741+dd5be1e7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libslirp-devel@4.4.0-1.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "netavark-2:1.5.1-3.module+el8.8.0+21741+dd5be1e7.x86_64",
"product": {
"name": "netavark-2:1.5.1-3.module+el8.8.0+21741+dd5be1e7.x86_64",
"product_id": "netavark-2:1.5.1-3.module+el8.8.0+21741+dd5be1e7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/netavark@1.5.1-3.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=x86_64\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "oci-seccomp-bpf-hook-0:1.2.8-1.module+el8.8.0+21741+dd5be1e7.x86_64",
"product": {
"name": "oci-seccomp-bpf-hook-0:1.2.8-1.module+el8.8.0+21741+dd5be1e7.x86_64",
"product_id": "oci-seccomp-bpf-hook-0:1.2.8-1.module+el8.8.0+21741+dd5be1e7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/oci-seccomp-bpf-hook@1.2.8-1.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "oci-seccomp-bpf-hook-debuginfo-0:1.2.8-1.module+el8.8.0+21741+dd5be1e7.x86_64",
"product": {
"name": "oci-seccomp-bpf-hook-debuginfo-0:1.2.8-1.module+el8.8.0+21741+dd5be1e7.x86_64",
"product_id": "oci-seccomp-bpf-hook-debuginfo-0:1.2.8-1.module+el8.8.0+21741+dd5be1e7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/oci-seccomp-bpf-hook-debuginfo@1.2.8-1.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "oci-seccomp-bpf-hook-debugsource-0:1.2.8-1.module+el8.8.0+21741+dd5be1e7.x86_64",
"product": {
"name": "oci-seccomp-bpf-hook-debugsource-0:1.2.8-1.module+el8.8.0+21741+dd5be1e7.x86_64",
"product_id": "oci-seccomp-bpf-hook-debugsource-0:1.2.8-1.module+el8.8.0+21741+dd5be1e7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/oci-seccomp-bpf-hook-debugsource@1.2.8-1.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "podman-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64",
"product": {
"name": "podman-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64",
"product_id": "podman-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman@4.4.1-19.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=x86_64\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "podman-catatonit-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64",
"product": {
"name": "podman-catatonit-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64",
"product_id": "podman-catatonit-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-catatonit@4.4.1-19.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=x86_64\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "podman-catatonit-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64",
"product": {
"name": "podman-catatonit-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64",
"product_id": "podman-catatonit-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-catatonit-debuginfo@4.4.1-19.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=x86_64\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "podman-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64",
"product": {
"name": "podman-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64",
"product_id": "podman-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-debuginfo@4.4.1-19.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=x86_64\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "podman-debugsource-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64",
"product": {
"name": "podman-debugsource-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64",
"product_id": "podman-debugsource-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-debugsource@4.4.1-19.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=x86_64\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "podman-gvproxy-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64",
"product": {
"name": "podman-gvproxy-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64",
"product_id": "podman-gvproxy-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-gvproxy@4.4.1-19.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=x86_64\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "podman-gvproxy-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64",
"product": {
"name": "podman-gvproxy-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64",
"product_id": "podman-gvproxy-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-gvproxy-debuginfo@4.4.1-19.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=x86_64\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "podman-plugins-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64",
"product": {
"name": "podman-plugins-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64",
"product_id": "podman-plugins-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-plugins@4.4.1-19.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=x86_64\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "podman-plugins-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64",
"product": {
"name": "podman-plugins-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64",
"product_id": "podman-plugins-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-plugins-debuginfo@4.4.1-19.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=x86_64\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "podman-remote-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64",
"product": {
"name": "podman-remote-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64",
"product_id": "podman-remote-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-remote@4.4.1-19.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=x86_64\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "podman-remote-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64",
"product": {
"name": "podman-remote-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64",
"product_id": "podman-remote-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-remote-debuginfo@4.4.1-19.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=x86_64\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "podman-tests-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64",
"product": {
"name": "podman-tests-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64",
"product_id": "podman-tests-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-tests@4.4.1-19.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=x86_64\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "python3-criu-0:3.15-4.module+el8.8.0+21741+dd5be1e7.x86_64",
"product": {
"name": "python3-criu-0:3.15-4.module+el8.8.0+21741+dd5be1e7.x86_64",
"product_id": "python3-criu-0:3.15-4.module+el8.8.0+21741+dd5be1e7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-criu@3.15-4.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "runc-1:1.1.12-1.module+el8.8.0+21741+dd5be1e7.x86_64",
"product": {
"name": "runc-1:1.1.12-1.module+el8.8.0+21741+dd5be1e7.x86_64",
"product_id": "runc-1:1.1.12-1.module+el8.8.0+21741+dd5be1e7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/runc@1.1.12-1.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "runc-debuginfo-1:1.1.12-1.module+el8.8.0+21741+dd5be1e7.x86_64",
"product": {
"name": "runc-debuginfo-1:1.1.12-1.module+el8.8.0+21741+dd5be1e7.x86_64",
"product_id": "runc-debuginfo-1:1.1.12-1.module+el8.8.0+21741+dd5be1e7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/runc-debuginfo@1.1.12-1.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "runc-debugsource-1:1.1.12-1.module+el8.8.0+21741+dd5be1e7.x86_64",
"product": {
"name": "runc-debugsource-1:1.1.12-1.module+el8.8.0+21741+dd5be1e7.x86_64",
"product_id": "runc-debugsource-1:1.1.12-1.module+el8.8.0+21741+dd5be1e7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/runc-debugsource@1.1.12-1.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "skopeo-2:1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.x86_64",
"product": {
"name": "skopeo-2:1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.x86_64",
"product_id": "skopeo-2:1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/skopeo@1.11.2-0.2.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=x86_64\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "skopeo-tests-2:1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.x86_64",
"product": {
"name": "skopeo-tests-2:1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.x86_64",
"product_id": "skopeo-tests-2:1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/skopeo-tests@1.11.2-0.2.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=x86_64\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "slirp4netns-0:1.2.0-3.module+el8.8.0+21741+dd5be1e7.x86_64",
"product": {
"name": "slirp4netns-0:1.2.0-3.module+el8.8.0+21741+dd5be1e7.x86_64",
"product_id": "slirp4netns-0:1.2.0-3.module+el8.8.0+21741+dd5be1e7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/slirp4netns@1.2.0-3.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "slirp4netns-debuginfo-0:1.2.0-3.module+el8.8.0+21741+dd5be1e7.x86_64",
"product": {
"name": "slirp4netns-debuginfo-0:1.2.0-3.module+el8.8.0+21741+dd5be1e7.x86_64",
"product_id": "slirp4netns-debuginfo-0:1.2.0-3.module+el8.8.0+21741+dd5be1e7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/slirp4netns-debuginfo@1.2.0-3.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "slirp4netns-debugsource-0:1.2.0-3.module+el8.8.0+21741+dd5be1e7.x86_64",
"product": {
"name": "slirp4netns-debugsource-0:1.2.0-3.module+el8.8.0+21741+dd5be1e7.x86_64",
"product_id": "slirp4netns-debugsource-0:1.2.0-3.module+el8.8.0+21741+dd5be1e7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/slirp4netns-debugsource@1.2.0-3.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "toolbox-0:0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.x86_64",
"product": {
"name": "toolbox-0:0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.x86_64",
"product_id": "toolbox-0:0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/toolbox@0.0.99.3-7.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "toolbox-debuginfo-0:0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.x86_64",
"product": {
"name": "toolbox-debuginfo-0:0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.x86_64",
"product_id": "toolbox-debuginfo-0:0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/toolbox-debuginfo@0.0.99.3-7.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "toolbox-debugsource-0:0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.x86_64",
"product": {
"name": "toolbox-debugsource-0:0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.x86_64",
"product_id": "toolbox-debugsource-0:0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/toolbox-debugsource@0.0.99.3-7.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "toolbox-tests-0:0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.x86_64",
"product": {
"name": "toolbox-tests-0:0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.x86_64",
"product_id": "toolbox-tests-0:0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/toolbox-tests@0.0.99.3-7.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "aardvark-dns-2:1.5.0-2.module+el8.8.0+21741+dd5be1e7.s390x",
"product": {
"name": "aardvark-dns-2:1.5.0-2.module+el8.8.0+21741+dd5be1e7.s390x",
"product_id": "aardvark-dns-2:1.5.0-2.module+el8.8.0+21741+dd5be1e7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/aardvark-dns@1.5.0-2.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=s390x\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "buildah-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.s390x",
"product": {
"name": "buildah-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.s390x",
"product_id": "buildah-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/buildah@1.29.3-1.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "buildah-debuginfo-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.s390x",
"product": {
"name": "buildah-debuginfo-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.s390x",
"product_id": "buildah-debuginfo-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/buildah-debuginfo@1.29.3-1.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "buildah-debugsource-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.s390x",
"product": {
"name": "buildah-debugsource-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.s390x",
"product_id": "buildah-debugsource-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/buildah-debugsource@1.29.3-1.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "buildah-tests-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.s390x",
"product": {
"name": "buildah-tests-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.s390x",
"product_id": "buildah-tests-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/buildah-tests@1.29.3-1.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "buildah-tests-debuginfo-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.s390x",
"product": {
"name": "buildah-tests-debuginfo-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.s390x",
"product_id": "buildah-tests-debuginfo-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/buildah-tests-debuginfo@1.29.3-1.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "conmon-3:2.1.6-1.module+el8.8.0+21741+dd5be1e7.s390x",
"product": {
"name": "conmon-3:2.1.6-1.module+el8.8.0+21741+dd5be1e7.s390x",
"product_id": "conmon-3:2.1.6-1.module+el8.8.0+21741+dd5be1e7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/conmon@2.1.6-1.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=s390x\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "conmon-debuginfo-3:2.1.6-1.module+el8.8.0+21741+dd5be1e7.s390x",
"product": {
"name": "conmon-debuginfo-3:2.1.6-1.module+el8.8.0+21741+dd5be1e7.s390x",
"product_id": "conmon-debuginfo-3:2.1.6-1.module+el8.8.0+21741+dd5be1e7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/conmon-debuginfo@2.1.6-1.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=s390x\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "conmon-debugsource-3:2.1.6-1.module+el8.8.0+21741+dd5be1e7.s390x",
"product": {
"name": "conmon-debugsource-3:2.1.6-1.module+el8.8.0+21741+dd5be1e7.s390x",
"product_id": "conmon-debugsource-3:2.1.6-1.module+el8.8.0+21741+dd5be1e7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/conmon-debugsource@2.1.6-1.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=s390x\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "containernetworking-plugins-1:1.2.0-1.module+el8.8.0+21741+dd5be1e7.s390x",
"product": {
"name": "containernetworking-plugins-1:1.2.0-1.module+el8.8.0+21741+dd5be1e7.s390x",
"product_id": "containernetworking-plugins-1:1.2.0-1.module+el8.8.0+21741+dd5be1e7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/containernetworking-plugins@1.2.0-1.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "containernetworking-plugins-debuginfo-1:1.2.0-1.module+el8.8.0+21741+dd5be1e7.s390x",
"product": {
"name": "containernetworking-plugins-debuginfo-1:1.2.0-1.module+el8.8.0+21741+dd5be1e7.s390x",
"product_id": "containernetworking-plugins-debuginfo-1:1.2.0-1.module+el8.8.0+21741+dd5be1e7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/containernetworking-plugins-debuginfo@1.2.0-1.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "containernetworking-plugins-debugsource-1:1.2.0-1.module+el8.8.0+21741+dd5be1e7.s390x",
"product": {
"name": "containernetworking-plugins-debugsource-1:1.2.0-1.module+el8.8.0+21741+dd5be1e7.s390x",
"product_id": "containernetworking-plugins-debugsource-1:1.2.0-1.module+el8.8.0+21741+dd5be1e7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/containernetworking-plugins-debugsource@1.2.0-1.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "containers-common-2:1-65.module+el8.8.0+21741+dd5be1e7.s390x",
"product": {
"name": "containers-common-2:1-65.module+el8.8.0+21741+dd5be1e7.s390x",
"product_id": "containers-common-2:1-65.module+el8.8.0+21741+dd5be1e7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/containers-common@1-65.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=s390x\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "crit-0:3.15-4.module+el8.8.0+21741+dd5be1e7.s390x",
"product": {
"name": "crit-0:3.15-4.module+el8.8.0+21741+dd5be1e7.s390x",
"product_id": "crit-0:3.15-4.module+el8.8.0+21741+dd5be1e7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/crit@3.15-4.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "criu-0:3.15-4.module+el8.8.0+21741+dd5be1e7.s390x",
"product": {
"name": "criu-0:3.15-4.module+el8.8.0+21741+dd5be1e7.s390x",
"product_id": "criu-0:3.15-4.module+el8.8.0+21741+dd5be1e7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/criu@3.15-4.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "criu-debuginfo-0:3.15-4.module+el8.8.0+21741+dd5be1e7.s390x",
"product": {
"name": "criu-debuginfo-0:3.15-4.module+el8.8.0+21741+dd5be1e7.s390x",
"product_id": "criu-debuginfo-0:3.15-4.module+el8.8.0+21741+dd5be1e7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/criu-debuginfo@3.15-4.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "criu-debugsource-0:3.15-4.module+el8.8.0+21741+dd5be1e7.s390x",
"product": {
"name": "criu-debugsource-0:3.15-4.module+el8.8.0+21741+dd5be1e7.s390x",
"product_id": "criu-debugsource-0:3.15-4.module+el8.8.0+21741+dd5be1e7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/criu-debugsource@3.15-4.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "criu-devel-0:3.15-4.module+el8.8.0+21741+dd5be1e7.s390x",
"product": {
"name": "criu-devel-0:3.15-4.module+el8.8.0+21741+dd5be1e7.s390x",
"product_id": "criu-devel-0:3.15-4.module+el8.8.0+21741+dd5be1e7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/criu-devel@3.15-4.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "criu-libs-0:3.15-4.module+el8.8.0+21741+dd5be1e7.s390x",
"product": {
"name": "criu-libs-0:3.15-4.module+el8.8.0+21741+dd5be1e7.s390x",
"product_id": "criu-libs-0:3.15-4.module+el8.8.0+21741+dd5be1e7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/criu-libs@3.15-4.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "criu-libs-debuginfo-0:3.15-4.module+el8.8.0+21741+dd5be1e7.s390x",
"product": {
"name": "criu-libs-debuginfo-0:3.15-4.module+el8.8.0+21741+dd5be1e7.s390x",
"product_id": "criu-libs-debuginfo-0:3.15-4.module+el8.8.0+21741+dd5be1e7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/criu-libs-debuginfo@3.15-4.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "crun-0:1.8.4-2.module+el8.8.0+21741+dd5be1e7.s390x",
"product": {
"name": "crun-0:1.8.4-2.module+el8.8.0+21741+dd5be1e7.s390x",
"product_id": "crun-0:1.8.4-2.module+el8.8.0+21741+dd5be1e7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/crun@1.8.4-2.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "crun-debuginfo-0:1.8.4-2.module+el8.8.0+21741+dd5be1e7.s390x",
"product": {
"name": "crun-debuginfo-0:1.8.4-2.module+el8.8.0+21741+dd5be1e7.s390x",
"product_id": "crun-debuginfo-0:1.8.4-2.module+el8.8.0+21741+dd5be1e7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/crun-debuginfo@1.8.4-2.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "crun-debugsource-0:1.8.4-2.module+el8.8.0+21741+dd5be1e7.s390x",
"product": {
"name": "crun-debugsource-0:1.8.4-2.module+el8.8.0+21741+dd5be1e7.s390x",
"product_id": "crun-debugsource-0:1.8.4-2.module+el8.8.0+21741+dd5be1e7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/crun-debugsource@1.8.4-2.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "fuse-overlayfs-0:1.11-1.module+el8.8.0+21741+dd5be1e7.s390x",
"product": {
"name": "fuse-overlayfs-0:1.11-1.module+el8.8.0+21741+dd5be1e7.s390x",
"product_id": "fuse-overlayfs-0:1.11-1.module+el8.8.0+21741+dd5be1e7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fuse-overlayfs@1.11-1.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "fuse-overlayfs-debuginfo-0:1.11-1.module+el8.8.0+21741+dd5be1e7.s390x",
"product": {
"name": "fuse-overlayfs-debuginfo-0:1.11-1.module+el8.8.0+21741+dd5be1e7.s390x",
"product_id": "fuse-overlayfs-debuginfo-0:1.11-1.module+el8.8.0+21741+dd5be1e7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fuse-overlayfs-debuginfo@1.11-1.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "fuse-overlayfs-debugsource-0:1.11-1.module+el8.8.0+21741+dd5be1e7.s390x",
"product": {
"name": "fuse-overlayfs-debugsource-0:1.11-1.module+el8.8.0+21741+dd5be1e7.s390x",
"product_id": "fuse-overlayfs-debugsource-0:1.11-1.module+el8.8.0+21741+dd5be1e7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fuse-overlayfs-debugsource@1.11-1.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "libslirp-0:4.4.0-1.module+el8.8.0+21741+dd5be1e7.s390x",
"product": {
"name": "libslirp-0:4.4.0-1.module+el8.8.0+21741+dd5be1e7.s390x",
"product_id": "libslirp-0:4.4.0-1.module+el8.8.0+21741+dd5be1e7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libslirp@4.4.0-1.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "libslirp-debuginfo-0:4.4.0-1.module+el8.8.0+21741+dd5be1e7.s390x",
"product": {
"name": "libslirp-debuginfo-0:4.4.0-1.module+el8.8.0+21741+dd5be1e7.s390x",
"product_id": "libslirp-debuginfo-0:4.4.0-1.module+el8.8.0+21741+dd5be1e7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libslirp-debuginfo@4.4.0-1.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "libslirp-debugsource-0:4.4.0-1.module+el8.8.0+21741+dd5be1e7.s390x",
"product": {
"name": "libslirp-debugsource-0:4.4.0-1.module+el8.8.0+21741+dd5be1e7.s390x",
"product_id": "libslirp-debugsource-0:4.4.0-1.module+el8.8.0+21741+dd5be1e7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libslirp-debugsource@4.4.0-1.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "libslirp-devel-0:4.4.0-1.module+el8.8.0+21741+dd5be1e7.s390x",
"product": {
"name": "libslirp-devel-0:4.4.0-1.module+el8.8.0+21741+dd5be1e7.s390x",
"product_id": "libslirp-devel-0:4.4.0-1.module+el8.8.0+21741+dd5be1e7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libslirp-devel@4.4.0-1.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "netavark-2:1.5.1-3.module+el8.8.0+21741+dd5be1e7.s390x",
"product": {
"name": "netavark-2:1.5.1-3.module+el8.8.0+21741+dd5be1e7.s390x",
"product_id": "netavark-2:1.5.1-3.module+el8.8.0+21741+dd5be1e7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/netavark@1.5.1-3.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=s390x\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "oci-seccomp-bpf-hook-0:1.2.8-1.module+el8.8.0+21741+dd5be1e7.s390x",
"product": {
"name": "oci-seccomp-bpf-hook-0:1.2.8-1.module+el8.8.0+21741+dd5be1e7.s390x",
"product_id": "oci-seccomp-bpf-hook-0:1.2.8-1.module+el8.8.0+21741+dd5be1e7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/oci-seccomp-bpf-hook@1.2.8-1.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "oci-seccomp-bpf-hook-debuginfo-0:1.2.8-1.module+el8.8.0+21741+dd5be1e7.s390x",
"product": {
"name": "oci-seccomp-bpf-hook-debuginfo-0:1.2.8-1.module+el8.8.0+21741+dd5be1e7.s390x",
"product_id": "oci-seccomp-bpf-hook-debuginfo-0:1.2.8-1.module+el8.8.0+21741+dd5be1e7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/oci-seccomp-bpf-hook-debuginfo@1.2.8-1.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "oci-seccomp-bpf-hook-debugsource-0:1.2.8-1.module+el8.8.0+21741+dd5be1e7.s390x",
"product": {
"name": "oci-seccomp-bpf-hook-debugsource-0:1.2.8-1.module+el8.8.0+21741+dd5be1e7.s390x",
"product_id": "oci-seccomp-bpf-hook-debugsource-0:1.2.8-1.module+el8.8.0+21741+dd5be1e7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/oci-seccomp-bpf-hook-debugsource@1.2.8-1.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "podman-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x",
"product": {
"name": "podman-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x",
"product_id": "podman-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman@4.4.1-19.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=s390x\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "podman-catatonit-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x",
"product": {
"name": "podman-catatonit-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x",
"product_id": "podman-catatonit-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-catatonit@4.4.1-19.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=s390x\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "podman-catatonit-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x",
"product": {
"name": "podman-catatonit-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x",
"product_id": "podman-catatonit-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-catatonit-debuginfo@4.4.1-19.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=s390x\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "podman-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x",
"product": {
"name": "podman-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x",
"product_id": "podman-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-debuginfo@4.4.1-19.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=s390x\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "podman-debugsource-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x",
"product": {
"name": "podman-debugsource-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x",
"product_id": "podman-debugsource-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-debugsource@4.4.1-19.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=s390x\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "podman-gvproxy-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x",
"product": {
"name": "podman-gvproxy-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x",
"product_id": "podman-gvproxy-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-gvproxy@4.4.1-19.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=s390x\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "podman-gvproxy-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x",
"product": {
"name": "podman-gvproxy-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x",
"product_id": "podman-gvproxy-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-gvproxy-debuginfo@4.4.1-19.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=s390x\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "podman-plugins-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x",
"product": {
"name": "podman-plugins-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x",
"product_id": "podman-plugins-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-plugins@4.4.1-19.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=s390x\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "podman-plugins-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x",
"product": {
"name": "podman-plugins-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x",
"product_id": "podman-plugins-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-plugins-debuginfo@4.4.1-19.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=s390x\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "podman-remote-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x",
"product": {
"name": "podman-remote-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x",
"product_id": "podman-remote-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-remote@4.4.1-19.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=s390x\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "podman-remote-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x",
"product": {
"name": "podman-remote-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x",
"product_id": "podman-remote-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-remote-debuginfo@4.4.1-19.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=s390x\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "podman-tests-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x",
"product": {
"name": "podman-tests-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x",
"product_id": "podman-tests-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-tests@4.4.1-19.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=s390x\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "python3-criu-0:3.15-4.module+el8.8.0+21741+dd5be1e7.s390x",
"product": {
"name": "python3-criu-0:3.15-4.module+el8.8.0+21741+dd5be1e7.s390x",
"product_id": "python3-criu-0:3.15-4.module+el8.8.0+21741+dd5be1e7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-criu@3.15-4.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "runc-1:1.1.12-1.module+el8.8.0+21741+dd5be1e7.s390x",
"product": {
"name": "runc-1:1.1.12-1.module+el8.8.0+21741+dd5be1e7.s390x",
"product_id": "runc-1:1.1.12-1.module+el8.8.0+21741+dd5be1e7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/runc@1.1.12-1.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "runc-debuginfo-1:1.1.12-1.module+el8.8.0+21741+dd5be1e7.s390x",
"product": {
"name": "runc-debuginfo-1:1.1.12-1.module+el8.8.0+21741+dd5be1e7.s390x",
"product_id": "runc-debuginfo-1:1.1.12-1.module+el8.8.0+21741+dd5be1e7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/runc-debuginfo@1.1.12-1.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "runc-debugsource-1:1.1.12-1.module+el8.8.0+21741+dd5be1e7.s390x",
"product": {
"name": "runc-debugsource-1:1.1.12-1.module+el8.8.0+21741+dd5be1e7.s390x",
"product_id": "runc-debugsource-1:1.1.12-1.module+el8.8.0+21741+dd5be1e7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/runc-debugsource@1.1.12-1.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "skopeo-2:1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.s390x",
"product": {
"name": "skopeo-2:1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.s390x",
"product_id": "skopeo-2:1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/skopeo@1.11.2-0.2.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=s390x\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "skopeo-tests-2:1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.s390x",
"product": {
"name": "skopeo-tests-2:1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.s390x",
"product_id": "skopeo-tests-2:1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/skopeo-tests@1.11.2-0.2.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=s390x\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "slirp4netns-0:1.2.0-3.module+el8.8.0+21741+dd5be1e7.s390x",
"product": {
"name": "slirp4netns-0:1.2.0-3.module+el8.8.0+21741+dd5be1e7.s390x",
"product_id": "slirp4netns-0:1.2.0-3.module+el8.8.0+21741+dd5be1e7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/slirp4netns@1.2.0-3.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "slirp4netns-debuginfo-0:1.2.0-3.module+el8.8.0+21741+dd5be1e7.s390x",
"product": {
"name": "slirp4netns-debuginfo-0:1.2.0-3.module+el8.8.0+21741+dd5be1e7.s390x",
"product_id": "slirp4netns-debuginfo-0:1.2.0-3.module+el8.8.0+21741+dd5be1e7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/slirp4netns-debuginfo@1.2.0-3.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "slirp4netns-debugsource-0:1.2.0-3.module+el8.8.0+21741+dd5be1e7.s390x",
"product": {
"name": "slirp4netns-debugsource-0:1.2.0-3.module+el8.8.0+21741+dd5be1e7.s390x",
"product_id": "slirp4netns-debugsource-0:1.2.0-3.module+el8.8.0+21741+dd5be1e7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/slirp4netns-debugsource@1.2.0-3.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "toolbox-0:0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.s390x",
"product": {
"name": "toolbox-0:0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.s390x",
"product_id": "toolbox-0:0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/toolbox@0.0.99.3-7.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "toolbox-debuginfo-0:0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.s390x",
"product": {
"name": "toolbox-debuginfo-0:0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.s390x",
"product_id": "toolbox-debuginfo-0:0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/toolbox-debuginfo@0.0.99.3-7.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "toolbox-debugsource-0:0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.s390x",
"product": {
"name": "toolbox-debugsource-0:0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.s390x",
"product_id": "toolbox-debugsource-0:0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/toolbox-debugsource@0.0.99.3-7.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "toolbox-tests-0:0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.s390x",
"product": {
"name": "toolbox-tests-0:0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.s390x",
"product_id": "toolbox-tests-0:0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/toolbox-tests@0.0.99.3-7.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "aardvark-dns-2:1.5.0-2.module+el8.8.0+21741+dd5be1e7.ppc64le",
"product": {
"name": "aardvark-dns-2:1.5.0-2.module+el8.8.0+21741+dd5be1e7.ppc64le",
"product_id": "aardvark-dns-2:1.5.0-2.module+el8.8.0+21741+dd5be1e7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/aardvark-dns@1.5.0-2.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=ppc64le\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "buildah-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.ppc64le",
"product": {
"name": "buildah-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.ppc64le",
"product_id": "buildah-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/buildah@1.29.3-1.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "buildah-debuginfo-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.ppc64le",
"product": {
"name": "buildah-debuginfo-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.ppc64le",
"product_id": "buildah-debuginfo-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/buildah-debuginfo@1.29.3-1.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "buildah-debugsource-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.ppc64le",
"product": {
"name": "buildah-debugsource-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.ppc64le",
"product_id": "buildah-debugsource-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/buildah-debugsource@1.29.3-1.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "buildah-tests-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.ppc64le",
"product": {
"name": "buildah-tests-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.ppc64le",
"product_id": "buildah-tests-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/buildah-tests@1.29.3-1.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "buildah-tests-debuginfo-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.ppc64le",
"product": {
"name": "buildah-tests-debuginfo-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.ppc64le",
"product_id": "buildah-tests-debuginfo-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/buildah-tests-debuginfo@1.29.3-1.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "conmon-3:2.1.6-1.module+el8.8.0+21741+dd5be1e7.ppc64le",
"product": {
"name": "conmon-3:2.1.6-1.module+el8.8.0+21741+dd5be1e7.ppc64le",
"product_id": "conmon-3:2.1.6-1.module+el8.8.0+21741+dd5be1e7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/conmon@2.1.6-1.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=ppc64le\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "conmon-debuginfo-3:2.1.6-1.module+el8.8.0+21741+dd5be1e7.ppc64le",
"product": {
"name": "conmon-debuginfo-3:2.1.6-1.module+el8.8.0+21741+dd5be1e7.ppc64le",
"product_id": "conmon-debuginfo-3:2.1.6-1.module+el8.8.0+21741+dd5be1e7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/conmon-debuginfo@2.1.6-1.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=ppc64le\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "conmon-debugsource-3:2.1.6-1.module+el8.8.0+21741+dd5be1e7.ppc64le",
"product": {
"name": "conmon-debugsource-3:2.1.6-1.module+el8.8.0+21741+dd5be1e7.ppc64le",
"product_id": "conmon-debugsource-3:2.1.6-1.module+el8.8.0+21741+dd5be1e7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/conmon-debugsource@2.1.6-1.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=ppc64le\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "containernetworking-plugins-1:1.2.0-1.module+el8.8.0+21741+dd5be1e7.ppc64le",
"product": {
"name": "containernetworking-plugins-1:1.2.0-1.module+el8.8.0+21741+dd5be1e7.ppc64le",
"product_id": "containernetworking-plugins-1:1.2.0-1.module+el8.8.0+21741+dd5be1e7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/containernetworking-plugins@1.2.0-1.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "containernetworking-plugins-debuginfo-1:1.2.0-1.module+el8.8.0+21741+dd5be1e7.ppc64le",
"product": {
"name": "containernetworking-plugins-debuginfo-1:1.2.0-1.module+el8.8.0+21741+dd5be1e7.ppc64le",
"product_id": "containernetworking-plugins-debuginfo-1:1.2.0-1.module+el8.8.0+21741+dd5be1e7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/containernetworking-plugins-debuginfo@1.2.0-1.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "containernetworking-plugins-debugsource-1:1.2.0-1.module+el8.8.0+21741+dd5be1e7.ppc64le",
"product": {
"name": "containernetworking-plugins-debugsource-1:1.2.0-1.module+el8.8.0+21741+dd5be1e7.ppc64le",
"product_id": "containernetworking-plugins-debugsource-1:1.2.0-1.module+el8.8.0+21741+dd5be1e7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/containernetworking-plugins-debugsource@1.2.0-1.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "containers-common-2:1-65.module+el8.8.0+21741+dd5be1e7.ppc64le",
"product": {
"name": "containers-common-2:1-65.module+el8.8.0+21741+dd5be1e7.ppc64le",
"product_id": "containers-common-2:1-65.module+el8.8.0+21741+dd5be1e7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/containers-common@1-65.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=ppc64le\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "crit-0:3.15-4.module+el8.8.0+21741+dd5be1e7.ppc64le",
"product": {
"name": "crit-0:3.15-4.module+el8.8.0+21741+dd5be1e7.ppc64le",
"product_id": "crit-0:3.15-4.module+el8.8.0+21741+dd5be1e7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/crit@3.15-4.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "criu-0:3.15-4.module+el8.8.0+21741+dd5be1e7.ppc64le",
"product": {
"name": "criu-0:3.15-4.module+el8.8.0+21741+dd5be1e7.ppc64le",
"product_id": "criu-0:3.15-4.module+el8.8.0+21741+dd5be1e7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/criu@3.15-4.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "criu-debuginfo-0:3.15-4.module+el8.8.0+21741+dd5be1e7.ppc64le",
"product": {
"name": "criu-debuginfo-0:3.15-4.module+el8.8.0+21741+dd5be1e7.ppc64le",
"product_id": "criu-debuginfo-0:3.15-4.module+el8.8.0+21741+dd5be1e7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/criu-debuginfo@3.15-4.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "criu-debugsource-0:3.15-4.module+el8.8.0+21741+dd5be1e7.ppc64le",
"product": {
"name": "criu-debugsource-0:3.15-4.module+el8.8.0+21741+dd5be1e7.ppc64le",
"product_id": "criu-debugsource-0:3.15-4.module+el8.8.0+21741+dd5be1e7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/criu-debugsource@3.15-4.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "criu-devel-0:3.15-4.module+el8.8.0+21741+dd5be1e7.ppc64le",
"product": {
"name": "criu-devel-0:3.15-4.module+el8.8.0+21741+dd5be1e7.ppc64le",
"product_id": "criu-devel-0:3.15-4.module+el8.8.0+21741+dd5be1e7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/criu-devel@3.15-4.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "criu-libs-0:3.15-4.module+el8.8.0+21741+dd5be1e7.ppc64le",
"product": {
"name": "criu-libs-0:3.15-4.module+el8.8.0+21741+dd5be1e7.ppc64le",
"product_id": "criu-libs-0:3.15-4.module+el8.8.0+21741+dd5be1e7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/criu-libs@3.15-4.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "criu-libs-debuginfo-0:3.15-4.module+el8.8.0+21741+dd5be1e7.ppc64le",
"product": {
"name": "criu-libs-debuginfo-0:3.15-4.module+el8.8.0+21741+dd5be1e7.ppc64le",
"product_id": "criu-libs-debuginfo-0:3.15-4.module+el8.8.0+21741+dd5be1e7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/criu-libs-debuginfo@3.15-4.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "crun-0:1.8.4-2.module+el8.8.0+21741+dd5be1e7.ppc64le",
"product": {
"name": "crun-0:1.8.4-2.module+el8.8.0+21741+dd5be1e7.ppc64le",
"product_id": "crun-0:1.8.4-2.module+el8.8.0+21741+dd5be1e7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/crun@1.8.4-2.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "crun-debuginfo-0:1.8.4-2.module+el8.8.0+21741+dd5be1e7.ppc64le",
"product": {
"name": "crun-debuginfo-0:1.8.4-2.module+el8.8.0+21741+dd5be1e7.ppc64le",
"product_id": "crun-debuginfo-0:1.8.4-2.module+el8.8.0+21741+dd5be1e7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/crun-debuginfo@1.8.4-2.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "crun-debugsource-0:1.8.4-2.module+el8.8.0+21741+dd5be1e7.ppc64le",
"product": {
"name": "crun-debugsource-0:1.8.4-2.module+el8.8.0+21741+dd5be1e7.ppc64le",
"product_id": "crun-debugsource-0:1.8.4-2.module+el8.8.0+21741+dd5be1e7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/crun-debugsource@1.8.4-2.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "fuse-overlayfs-0:1.11-1.module+el8.8.0+21741+dd5be1e7.ppc64le",
"product": {
"name": "fuse-overlayfs-0:1.11-1.module+el8.8.0+21741+dd5be1e7.ppc64le",
"product_id": "fuse-overlayfs-0:1.11-1.module+el8.8.0+21741+dd5be1e7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fuse-overlayfs@1.11-1.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "fuse-overlayfs-debuginfo-0:1.11-1.module+el8.8.0+21741+dd5be1e7.ppc64le",
"product": {
"name": "fuse-overlayfs-debuginfo-0:1.11-1.module+el8.8.0+21741+dd5be1e7.ppc64le",
"product_id": "fuse-overlayfs-debuginfo-0:1.11-1.module+el8.8.0+21741+dd5be1e7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fuse-overlayfs-debuginfo@1.11-1.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "fuse-overlayfs-debugsource-0:1.11-1.module+el8.8.0+21741+dd5be1e7.ppc64le",
"product": {
"name": "fuse-overlayfs-debugsource-0:1.11-1.module+el8.8.0+21741+dd5be1e7.ppc64le",
"product_id": "fuse-overlayfs-debugsource-0:1.11-1.module+el8.8.0+21741+dd5be1e7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fuse-overlayfs-debugsource@1.11-1.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "libslirp-0:4.4.0-1.module+el8.8.0+21741+dd5be1e7.ppc64le",
"product": {
"name": "libslirp-0:4.4.0-1.module+el8.8.0+21741+dd5be1e7.ppc64le",
"product_id": "libslirp-0:4.4.0-1.module+el8.8.0+21741+dd5be1e7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libslirp@4.4.0-1.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "libslirp-debuginfo-0:4.4.0-1.module+el8.8.0+21741+dd5be1e7.ppc64le",
"product": {
"name": "libslirp-debuginfo-0:4.4.0-1.module+el8.8.0+21741+dd5be1e7.ppc64le",
"product_id": "libslirp-debuginfo-0:4.4.0-1.module+el8.8.0+21741+dd5be1e7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libslirp-debuginfo@4.4.0-1.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "libslirp-debugsource-0:4.4.0-1.module+el8.8.0+21741+dd5be1e7.ppc64le",
"product": {
"name": "libslirp-debugsource-0:4.4.0-1.module+el8.8.0+21741+dd5be1e7.ppc64le",
"product_id": "libslirp-debugsource-0:4.4.0-1.module+el8.8.0+21741+dd5be1e7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libslirp-debugsource@4.4.0-1.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "libslirp-devel-0:4.4.0-1.module+el8.8.0+21741+dd5be1e7.ppc64le",
"product": {
"name": "libslirp-devel-0:4.4.0-1.module+el8.8.0+21741+dd5be1e7.ppc64le",
"product_id": "libslirp-devel-0:4.4.0-1.module+el8.8.0+21741+dd5be1e7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libslirp-devel@4.4.0-1.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "netavark-2:1.5.1-3.module+el8.8.0+21741+dd5be1e7.ppc64le",
"product": {
"name": "netavark-2:1.5.1-3.module+el8.8.0+21741+dd5be1e7.ppc64le",
"product_id": "netavark-2:1.5.1-3.module+el8.8.0+21741+dd5be1e7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/netavark@1.5.1-3.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=ppc64le\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "oci-seccomp-bpf-hook-0:1.2.8-1.module+el8.8.0+21741+dd5be1e7.ppc64le",
"product": {
"name": "oci-seccomp-bpf-hook-0:1.2.8-1.module+el8.8.0+21741+dd5be1e7.ppc64le",
"product_id": "oci-seccomp-bpf-hook-0:1.2.8-1.module+el8.8.0+21741+dd5be1e7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/oci-seccomp-bpf-hook@1.2.8-1.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "oci-seccomp-bpf-hook-debuginfo-0:1.2.8-1.module+el8.8.0+21741+dd5be1e7.ppc64le",
"product": {
"name": "oci-seccomp-bpf-hook-debuginfo-0:1.2.8-1.module+el8.8.0+21741+dd5be1e7.ppc64le",
"product_id": "oci-seccomp-bpf-hook-debuginfo-0:1.2.8-1.module+el8.8.0+21741+dd5be1e7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/oci-seccomp-bpf-hook-debuginfo@1.2.8-1.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "oci-seccomp-bpf-hook-debugsource-0:1.2.8-1.module+el8.8.0+21741+dd5be1e7.ppc64le",
"product": {
"name": "oci-seccomp-bpf-hook-debugsource-0:1.2.8-1.module+el8.8.0+21741+dd5be1e7.ppc64le",
"product_id": "oci-seccomp-bpf-hook-debugsource-0:1.2.8-1.module+el8.8.0+21741+dd5be1e7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/oci-seccomp-bpf-hook-debugsource@1.2.8-1.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "podman-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le",
"product": {
"name": "podman-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le",
"product_id": "podman-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman@4.4.1-19.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=ppc64le\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "podman-catatonit-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le",
"product": {
"name": "podman-catatonit-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le",
"product_id": "podman-catatonit-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-catatonit@4.4.1-19.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=ppc64le\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "podman-catatonit-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le",
"product": {
"name": "podman-catatonit-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le",
"product_id": "podman-catatonit-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-catatonit-debuginfo@4.4.1-19.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=ppc64le\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "podman-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le",
"product": {
"name": "podman-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le",
"product_id": "podman-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-debuginfo@4.4.1-19.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=ppc64le\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "podman-debugsource-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le",
"product": {
"name": "podman-debugsource-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le",
"product_id": "podman-debugsource-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-debugsource@4.4.1-19.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=ppc64le\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "podman-gvproxy-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le",
"product": {
"name": "podman-gvproxy-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le",
"product_id": "podman-gvproxy-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-gvproxy@4.4.1-19.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=ppc64le\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "podman-gvproxy-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le",
"product": {
"name": "podman-gvproxy-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le",
"product_id": "podman-gvproxy-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-gvproxy-debuginfo@4.4.1-19.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=ppc64le\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "podman-plugins-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le",
"product": {
"name": "podman-plugins-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le",
"product_id": "podman-plugins-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-plugins@4.4.1-19.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=ppc64le\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "podman-plugins-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le",
"product": {
"name": "podman-plugins-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le",
"product_id": "podman-plugins-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-plugins-debuginfo@4.4.1-19.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=ppc64le\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "podman-remote-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le",
"product": {
"name": "podman-remote-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le",
"product_id": "podman-remote-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-remote@4.4.1-19.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=ppc64le\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "podman-remote-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le",
"product": {
"name": "podman-remote-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le",
"product_id": "podman-remote-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-remote-debuginfo@4.4.1-19.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=ppc64le\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "podman-tests-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le",
"product": {
"name": "podman-tests-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le",
"product_id": "podman-tests-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-tests@4.4.1-19.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=ppc64le\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "python3-criu-0:3.15-4.module+el8.8.0+21741+dd5be1e7.ppc64le",
"product": {
"name": "python3-criu-0:3.15-4.module+el8.8.0+21741+dd5be1e7.ppc64le",
"product_id": "python3-criu-0:3.15-4.module+el8.8.0+21741+dd5be1e7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-criu@3.15-4.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "runc-1:1.1.12-1.module+el8.8.0+21741+dd5be1e7.ppc64le",
"product": {
"name": "runc-1:1.1.12-1.module+el8.8.0+21741+dd5be1e7.ppc64le",
"product_id": "runc-1:1.1.12-1.module+el8.8.0+21741+dd5be1e7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/runc@1.1.12-1.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "runc-debuginfo-1:1.1.12-1.module+el8.8.0+21741+dd5be1e7.ppc64le",
"product": {
"name": "runc-debuginfo-1:1.1.12-1.module+el8.8.0+21741+dd5be1e7.ppc64le",
"product_id": "runc-debuginfo-1:1.1.12-1.module+el8.8.0+21741+dd5be1e7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/runc-debuginfo@1.1.12-1.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "runc-debugsource-1:1.1.12-1.module+el8.8.0+21741+dd5be1e7.ppc64le",
"product": {
"name": "runc-debugsource-1:1.1.12-1.module+el8.8.0+21741+dd5be1e7.ppc64le",
"product_id": "runc-debugsource-1:1.1.12-1.module+el8.8.0+21741+dd5be1e7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/runc-debugsource@1.1.12-1.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "skopeo-2:1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.ppc64le",
"product": {
"name": "skopeo-2:1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.ppc64le",
"product_id": "skopeo-2:1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/skopeo@1.11.2-0.2.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=ppc64le\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "skopeo-tests-2:1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.ppc64le",
"product": {
"name": "skopeo-tests-2:1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.ppc64le",
"product_id": "skopeo-tests-2:1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/skopeo-tests@1.11.2-0.2.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=ppc64le\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "slirp4netns-0:1.2.0-3.module+el8.8.0+21741+dd5be1e7.ppc64le",
"product": {
"name": "slirp4netns-0:1.2.0-3.module+el8.8.0+21741+dd5be1e7.ppc64le",
"product_id": "slirp4netns-0:1.2.0-3.module+el8.8.0+21741+dd5be1e7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/slirp4netns@1.2.0-3.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "slirp4netns-debuginfo-0:1.2.0-3.module+el8.8.0+21741+dd5be1e7.ppc64le",
"product": {
"name": "slirp4netns-debuginfo-0:1.2.0-3.module+el8.8.0+21741+dd5be1e7.ppc64le",
"product_id": "slirp4netns-debuginfo-0:1.2.0-3.module+el8.8.0+21741+dd5be1e7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/slirp4netns-debuginfo@1.2.0-3.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "slirp4netns-debugsource-0:1.2.0-3.module+el8.8.0+21741+dd5be1e7.ppc64le",
"product": {
"name": "slirp4netns-debugsource-0:1.2.0-3.module+el8.8.0+21741+dd5be1e7.ppc64le",
"product_id": "slirp4netns-debugsource-0:1.2.0-3.module+el8.8.0+21741+dd5be1e7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/slirp4netns-debugsource@1.2.0-3.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "toolbox-0:0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.ppc64le",
"product": {
"name": "toolbox-0:0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.ppc64le",
"product_id": "toolbox-0:0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/toolbox@0.0.99.3-7.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "toolbox-debuginfo-0:0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.ppc64le",
"product": {
"name": "toolbox-debuginfo-0:0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.ppc64le",
"product_id": "toolbox-debuginfo-0:0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/toolbox-debuginfo@0.0.99.3-7.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "toolbox-debugsource-0:0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.ppc64le",
"product": {
"name": "toolbox-debugsource-0:0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.ppc64le",
"product_id": "toolbox-debugsource-0:0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/toolbox-debugsource@0.0.99.3-7.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "toolbox-tests-0:0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.ppc64le",
"product": {
"name": "toolbox-tests-0:0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.ppc64le",
"product_id": "toolbox-tests-0:0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/toolbox-tests@0.0.99.3-7.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "aardvark-dns-2:1.5.0-2.module+el8.8.0+21741+dd5be1e7.aarch64",
"product": {
"name": "aardvark-dns-2:1.5.0-2.module+el8.8.0+21741+dd5be1e7.aarch64",
"product_id": "aardvark-dns-2:1.5.0-2.module+el8.8.0+21741+dd5be1e7.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/aardvark-dns@1.5.0-2.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=aarch64\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "buildah-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.aarch64",
"product": {
"name": "buildah-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.aarch64",
"product_id": "buildah-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/buildah@1.29.3-1.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=aarch64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "buildah-debuginfo-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.aarch64",
"product": {
"name": "buildah-debuginfo-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.aarch64",
"product_id": "buildah-debuginfo-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/buildah-debuginfo@1.29.3-1.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=aarch64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "buildah-debugsource-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.aarch64",
"product": {
"name": "buildah-debugsource-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.aarch64",
"product_id": "buildah-debugsource-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/buildah-debugsource@1.29.3-1.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=aarch64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "buildah-tests-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.aarch64",
"product": {
"name": "buildah-tests-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.aarch64",
"product_id": "buildah-tests-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/buildah-tests@1.29.3-1.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=aarch64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "buildah-tests-debuginfo-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.aarch64",
"product": {
"name": "buildah-tests-debuginfo-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.aarch64",
"product_id": "buildah-tests-debuginfo-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/buildah-tests-debuginfo@1.29.3-1.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=aarch64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "conmon-3:2.1.6-1.module+el8.8.0+21741+dd5be1e7.aarch64",
"product": {
"name": "conmon-3:2.1.6-1.module+el8.8.0+21741+dd5be1e7.aarch64",
"product_id": "conmon-3:2.1.6-1.module+el8.8.0+21741+dd5be1e7.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/conmon@2.1.6-1.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=aarch64\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "conmon-debuginfo-3:2.1.6-1.module+el8.8.0+21741+dd5be1e7.aarch64",
"product": {
"name": "conmon-debuginfo-3:2.1.6-1.module+el8.8.0+21741+dd5be1e7.aarch64",
"product_id": "conmon-debuginfo-3:2.1.6-1.module+el8.8.0+21741+dd5be1e7.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/conmon-debuginfo@2.1.6-1.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=aarch64\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "conmon-debugsource-3:2.1.6-1.module+el8.8.0+21741+dd5be1e7.aarch64",
"product": {
"name": "conmon-debugsource-3:2.1.6-1.module+el8.8.0+21741+dd5be1e7.aarch64",
"product_id": "conmon-debugsource-3:2.1.6-1.module+el8.8.0+21741+dd5be1e7.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/conmon-debugsource@2.1.6-1.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=aarch64\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "containernetworking-plugins-1:1.2.0-1.module+el8.8.0+21741+dd5be1e7.aarch64",
"product": {
"name": "containernetworking-plugins-1:1.2.0-1.module+el8.8.0+21741+dd5be1e7.aarch64",
"product_id": "containernetworking-plugins-1:1.2.0-1.module+el8.8.0+21741+dd5be1e7.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/containernetworking-plugins@1.2.0-1.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=aarch64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "containernetworking-plugins-debuginfo-1:1.2.0-1.module+el8.8.0+21741+dd5be1e7.aarch64",
"product": {
"name": "containernetworking-plugins-debuginfo-1:1.2.0-1.module+el8.8.0+21741+dd5be1e7.aarch64",
"product_id": "containernetworking-plugins-debuginfo-1:1.2.0-1.module+el8.8.0+21741+dd5be1e7.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/containernetworking-plugins-debuginfo@1.2.0-1.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=aarch64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "containernetworking-plugins-debugsource-1:1.2.0-1.module+el8.8.0+21741+dd5be1e7.aarch64",
"product": {
"name": "containernetworking-plugins-debugsource-1:1.2.0-1.module+el8.8.0+21741+dd5be1e7.aarch64",
"product_id": "containernetworking-plugins-debugsource-1:1.2.0-1.module+el8.8.0+21741+dd5be1e7.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/containernetworking-plugins-debugsource@1.2.0-1.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=aarch64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "containers-common-2:1-65.module+el8.8.0+21741+dd5be1e7.aarch64",
"product": {
"name": "containers-common-2:1-65.module+el8.8.0+21741+dd5be1e7.aarch64",
"product_id": "containers-common-2:1-65.module+el8.8.0+21741+dd5be1e7.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/containers-common@1-65.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=aarch64\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "crit-0:3.15-4.module+el8.8.0+21741+dd5be1e7.aarch64",
"product": {
"name": "crit-0:3.15-4.module+el8.8.0+21741+dd5be1e7.aarch64",
"product_id": "crit-0:3.15-4.module+el8.8.0+21741+dd5be1e7.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/crit@3.15-4.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "criu-0:3.15-4.module+el8.8.0+21741+dd5be1e7.aarch64",
"product": {
"name": "criu-0:3.15-4.module+el8.8.0+21741+dd5be1e7.aarch64",
"product_id": "criu-0:3.15-4.module+el8.8.0+21741+dd5be1e7.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/criu@3.15-4.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "criu-debuginfo-0:3.15-4.module+el8.8.0+21741+dd5be1e7.aarch64",
"product": {
"name": "criu-debuginfo-0:3.15-4.module+el8.8.0+21741+dd5be1e7.aarch64",
"product_id": "criu-debuginfo-0:3.15-4.module+el8.8.0+21741+dd5be1e7.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/criu-debuginfo@3.15-4.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "criu-debugsource-0:3.15-4.module+el8.8.0+21741+dd5be1e7.aarch64",
"product": {
"name": "criu-debugsource-0:3.15-4.module+el8.8.0+21741+dd5be1e7.aarch64",
"product_id": "criu-debugsource-0:3.15-4.module+el8.8.0+21741+dd5be1e7.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/criu-debugsource@3.15-4.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "criu-devel-0:3.15-4.module+el8.8.0+21741+dd5be1e7.aarch64",
"product": {
"name": "criu-devel-0:3.15-4.module+el8.8.0+21741+dd5be1e7.aarch64",
"product_id": "criu-devel-0:3.15-4.module+el8.8.0+21741+dd5be1e7.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/criu-devel@3.15-4.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "criu-libs-0:3.15-4.module+el8.8.0+21741+dd5be1e7.aarch64",
"product": {
"name": "criu-libs-0:3.15-4.module+el8.8.0+21741+dd5be1e7.aarch64",
"product_id": "criu-libs-0:3.15-4.module+el8.8.0+21741+dd5be1e7.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/criu-libs@3.15-4.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "criu-libs-debuginfo-0:3.15-4.module+el8.8.0+21741+dd5be1e7.aarch64",
"product": {
"name": "criu-libs-debuginfo-0:3.15-4.module+el8.8.0+21741+dd5be1e7.aarch64",
"product_id": "criu-libs-debuginfo-0:3.15-4.module+el8.8.0+21741+dd5be1e7.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/criu-libs-debuginfo@3.15-4.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "crun-0:1.8.4-2.module+el8.8.0+21741+dd5be1e7.aarch64",
"product": {
"name": "crun-0:1.8.4-2.module+el8.8.0+21741+dd5be1e7.aarch64",
"product_id": "crun-0:1.8.4-2.module+el8.8.0+21741+dd5be1e7.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/crun@1.8.4-2.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "crun-debuginfo-0:1.8.4-2.module+el8.8.0+21741+dd5be1e7.aarch64",
"product": {
"name": "crun-debuginfo-0:1.8.4-2.module+el8.8.0+21741+dd5be1e7.aarch64",
"product_id": "crun-debuginfo-0:1.8.4-2.module+el8.8.0+21741+dd5be1e7.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/crun-debuginfo@1.8.4-2.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "crun-debugsource-0:1.8.4-2.module+el8.8.0+21741+dd5be1e7.aarch64",
"product": {
"name": "crun-debugsource-0:1.8.4-2.module+el8.8.0+21741+dd5be1e7.aarch64",
"product_id": "crun-debugsource-0:1.8.4-2.module+el8.8.0+21741+dd5be1e7.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/crun-debugsource@1.8.4-2.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "fuse-overlayfs-0:1.11-1.module+el8.8.0+21741+dd5be1e7.aarch64",
"product": {
"name": "fuse-overlayfs-0:1.11-1.module+el8.8.0+21741+dd5be1e7.aarch64",
"product_id": "fuse-overlayfs-0:1.11-1.module+el8.8.0+21741+dd5be1e7.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fuse-overlayfs@1.11-1.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "fuse-overlayfs-debuginfo-0:1.11-1.module+el8.8.0+21741+dd5be1e7.aarch64",
"product": {
"name": "fuse-overlayfs-debuginfo-0:1.11-1.module+el8.8.0+21741+dd5be1e7.aarch64",
"product_id": "fuse-overlayfs-debuginfo-0:1.11-1.module+el8.8.0+21741+dd5be1e7.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fuse-overlayfs-debuginfo@1.11-1.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "fuse-overlayfs-debugsource-0:1.11-1.module+el8.8.0+21741+dd5be1e7.aarch64",
"product": {
"name": "fuse-overlayfs-debugsource-0:1.11-1.module+el8.8.0+21741+dd5be1e7.aarch64",
"product_id": "fuse-overlayfs-debugsource-0:1.11-1.module+el8.8.0+21741+dd5be1e7.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fuse-overlayfs-debugsource@1.11-1.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "libslirp-0:4.4.0-1.module+el8.8.0+21741+dd5be1e7.aarch64",
"product": {
"name": "libslirp-0:4.4.0-1.module+el8.8.0+21741+dd5be1e7.aarch64",
"product_id": "libslirp-0:4.4.0-1.module+el8.8.0+21741+dd5be1e7.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libslirp@4.4.0-1.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "libslirp-debuginfo-0:4.4.0-1.module+el8.8.0+21741+dd5be1e7.aarch64",
"product": {
"name": "libslirp-debuginfo-0:4.4.0-1.module+el8.8.0+21741+dd5be1e7.aarch64",
"product_id": "libslirp-debuginfo-0:4.4.0-1.module+el8.8.0+21741+dd5be1e7.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libslirp-debuginfo@4.4.0-1.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "libslirp-debugsource-0:4.4.0-1.module+el8.8.0+21741+dd5be1e7.aarch64",
"product": {
"name": "libslirp-debugsource-0:4.4.0-1.module+el8.8.0+21741+dd5be1e7.aarch64",
"product_id": "libslirp-debugsource-0:4.4.0-1.module+el8.8.0+21741+dd5be1e7.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libslirp-debugsource@4.4.0-1.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "libslirp-devel-0:4.4.0-1.module+el8.8.0+21741+dd5be1e7.aarch64",
"product": {
"name": "libslirp-devel-0:4.4.0-1.module+el8.8.0+21741+dd5be1e7.aarch64",
"product_id": "libslirp-devel-0:4.4.0-1.module+el8.8.0+21741+dd5be1e7.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libslirp-devel@4.4.0-1.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "netavark-2:1.5.1-3.module+el8.8.0+21741+dd5be1e7.aarch64",
"product": {
"name": "netavark-2:1.5.1-3.module+el8.8.0+21741+dd5be1e7.aarch64",
"product_id": "netavark-2:1.5.1-3.module+el8.8.0+21741+dd5be1e7.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/netavark@1.5.1-3.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=aarch64\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "oci-seccomp-bpf-hook-0:1.2.8-1.module+el8.8.0+21741+dd5be1e7.aarch64",
"product": {
"name": "oci-seccomp-bpf-hook-0:1.2.8-1.module+el8.8.0+21741+dd5be1e7.aarch64",
"product_id": "oci-seccomp-bpf-hook-0:1.2.8-1.module+el8.8.0+21741+dd5be1e7.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/oci-seccomp-bpf-hook@1.2.8-1.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "oci-seccomp-bpf-hook-debuginfo-0:1.2.8-1.module+el8.8.0+21741+dd5be1e7.aarch64",
"product": {
"name": "oci-seccomp-bpf-hook-debuginfo-0:1.2.8-1.module+el8.8.0+21741+dd5be1e7.aarch64",
"product_id": "oci-seccomp-bpf-hook-debuginfo-0:1.2.8-1.module+el8.8.0+21741+dd5be1e7.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/oci-seccomp-bpf-hook-debuginfo@1.2.8-1.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "oci-seccomp-bpf-hook-debugsource-0:1.2.8-1.module+el8.8.0+21741+dd5be1e7.aarch64",
"product": {
"name": "oci-seccomp-bpf-hook-debugsource-0:1.2.8-1.module+el8.8.0+21741+dd5be1e7.aarch64",
"product_id": "oci-seccomp-bpf-hook-debugsource-0:1.2.8-1.module+el8.8.0+21741+dd5be1e7.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/oci-seccomp-bpf-hook-debugsource@1.2.8-1.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "podman-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64",
"product": {
"name": "podman-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64",
"product_id": "podman-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman@4.4.1-19.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=aarch64\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "podman-catatonit-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64",
"product": {
"name": "podman-catatonit-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64",
"product_id": "podman-catatonit-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-catatonit@4.4.1-19.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=aarch64\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "podman-catatonit-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64",
"product": {
"name": "podman-catatonit-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64",
"product_id": "podman-catatonit-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-catatonit-debuginfo@4.4.1-19.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=aarch64\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "podman-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64",
"product": {
"name": "podman-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64",
"product_id": "podman-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-debuginfo@4.4.1-19.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=aarch64\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "podman-debugsource-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64",
"product": {
"name": "podman-debugsource-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64",
"product_id": "podman-debugsource-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-debugsource@4.4.1-19.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=aarch64\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "podman-gvproxy-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64",
"product": {
"name": "podman-gvproxy-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64",
"product_id": "podman-gvproxy-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-gvproxy@4.4.1-19.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=aarch64\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "podman-gvproxy-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64",
"product": {
"name": "podman-gvproxy-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64",
"product_id": "podman-gvproxy-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-gvproxy-debuginfo@4.4.1-19.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=aarch64\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "podman-plugins-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64",
"product": {
"name": "podman-plugins-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64",
"product_id": "podman-plugins-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-plugins@4.4.1-19.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=aarch64\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "podman-plugins-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64",
"product": {
"name": "podman-plugins-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64",
"product_id": "podman-plugins-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-plugins-debuginfo@4.4.1-19.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=aarch64\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "podman-remote-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64",
"product": {
"name": "podman-remote-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64",
"product_id": "podman-remote-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-remote@4.4.1-19.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=aarch64\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "podman-remote-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64",
"product": {
"name": "podman-remote-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64",
"product_id": "podman-remote-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-remote-debuginfo@4.4.1-19.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=aarch64\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "podman-tests-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64",
"product": {
"name": "podman-tests-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64",
"product_id": "podman-tests-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-tests@4.4.1-19.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=aarch64\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "python3-criu-0:3.15-4.module+el8.8.0+21741+dd5be1e7.aarch64",
"product": {
"name": "python3-criu-0:3.15-4.module+el8.8.0+21741+dd5be1e7.aarch64",
"product_id": "python3-criu-0:3.15-4.module+el8.8.0+21741+dd5be1e7.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-criu@3.15-4.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "runc-1:1.1.12-1.module+el8.8.0+21741+dd5be1e7.aarch64",
"product": {
"name": "runc-1:1.1.12-1.module+el8.8.0+21741+dd5be1e7.aarch64",
"product_id": "runc-1:1.1.12-1.module+el8.8.0+21741+dd5be1e7.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/runc@1.1.12-1.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=aarch64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "runc-debuginfo-1:1.1.12-1.module+el8.8.0+21741+dd5be1e7.aarch64",
"product": {
"name": "runc-debuginfo-1:1.1.12-1.module+el8.8.0+21741+dd5be1e7.aarch64",
"product_id": "runc-debuginfo-1:1.1.12-1.module+el8.8.0+21741+dd5be1e7.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/runc-debuginfo@1.1.12-1.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=aarch64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "runc-debugsource-1:1.1.12-1.module+el8.8.0+21741+dd5be1e7.aarch64",
"product": {
"name": "runc-debugsource-1:1.1.12-1.module+el8.8.0+21741+dd5be1e7.aarch64",
"product_id": "runc-debugsource-1:1.1.12-1.module+el8.8.0+21741+dd5be1e7.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/runc-debugsource@1.1.12-1.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=aarch64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "skopeo-2:1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.aarch64",
"product": {
"name": "skopeo-2:1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.aarch64",
"product_id": "skopeo-2:1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/skopeo@1.11.2-0.2.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=aarch64\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "skopeo-tests-2:1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.aarch64",
"product": {
"name": "skopeo-tests-2:1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.aarch64",
"product_id": "skopeo-tests-2:1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/skopeo-tests@1.11.2-0.2.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=aarch64\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "slirp4netns-0:1.2.0-3.module+el8.8.0+21741+dd5be1e7.aarch64",
"product": {
"name": "slirp4netns-0:1.2.0-3.module+el8.8.0+21741+dd5be1e7.aarch64",
"product_id": "slirp4netns-0:1.2.0-3.module+el8.8.0+21741+dd5be1e7.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/slirp4netns@1.2.0-3.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "slirp4netns-debuginfo-0:1.2.0-3.module+el8.8.0+21741+dd5be1e7.aarch64",
"product": {
"name": "slirp4netns-debuginfo-0:1.2.0-3.module+el8.8.0+21741+dd5be1e7.aarch64",
"product_id": "slirp4netns-debuginfo-0:1.2.0-3.module+el8.8.0+21741+dd5be1e7.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/slirp4netns-debuginfo@1.2.0-3.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "slirp4netns-debugsource-0:1.2.0-3.module+el8.8.0+21741+dd5be1e7.aarch64",
"product": {
"name": "slirp4netns-debugsource-0:1.2.0-3.module+el8.8.0+21741+dd5be1e7.aarch64",
"product_id": "slirp4netns-debugsource-0:1.2.0-3.module+el8.8.0+21741+dd5be1e7.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/slirp4netns-debugsource@1.2.0-3.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "toolbox-0:0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.aarch64",
"product": {
"name": "toolbox-0:0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.aarch64",
"product_id": "toolbox-0:0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/toolbox@0.0.99.3-7.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "toolbox-debuginfo-0:0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.aarch64",
"product": {
"name": "toolbox-debuginfo-0:0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.aarch64",
"product_id": "toolbox-debuginfo-0:0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/toolbox-debuginfo@0.0.99.3-7.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "toolbox-debugsource-0:0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.aarch64",
"product": {
"name": "toolbox-debugsource-0:0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.aarch64",
"product_id": "toolbox-debugsource-0:0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/toolbox-debugsource@0.0.99.3-7.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "toolbox-tests-0:0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.aarch64",
"product": {
"name": "toolbox-tests-0:0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.aarch64",
"product_id": "toolbox-tests-0:0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/toolbox-tests@0.0.99.3-7.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=aarch64"
}
}
}
],
"category": "architecture",
"name": "aarch64"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "container-tools:rhel8:8080020240422101606:0f77c1b7 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7"
},
"product_reference": "container-tools:rhel8:8080020240422101606:0f77c1b7",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "aardvark-dns-2:1.5.0-2.module+el8.8.0+21741+dd5be1e7.aarch64 as a component of container-tools:rhel8:8080020240422101606:0f77c1b7 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:aardvark-dns-2:1.5.0-2.module+el8.8.0+21741+dd5be1e7.aarch64"
},
"product_reference": "aardvark-dns-2:1.5.0-2.module+el8.8.0+21741+dd5be1e7.aarch64",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "aardvark-dns-2:1.5.0-2.module+el8.8.0+21741+dd5be1e7.ppc64le as a component of container-tools:rhel8:8080020240422101606:0f77c1b7 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:aardvark-dns-2:1.5.0-2.module+el8.8.0+21741+dd5be1e7.ppc64le"
},
"product_reference": "aardvark-dns-2:1.5.0-2.module+el8.8.0+21741+dd5be1e7.ppc64le",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "aardvark-dns-2:1.5.0-2.module+el8.8.0+21741+dd5be1e7.s390x as a component of container-tools:rhel8:8080020240422101606:0f77c1b7 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:aardvark-dns-2:1.5.0-2.module+el8.8.0+21741+dd5be1e7.s390x"
},
"product_reference": "aardvark-dns-2:1.5.0-2.module+el8.8.0+21741+dd5be1e7.s390x",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "aardvark-dns-2:1.5.0-2.module+el8.8.0+21741+dd5be1e7.src as a component of container-tools:rhel8:8080020240422101606:0f77c1b7 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:aardvark-dns-2:1.5.0-2.module+el8.8.0+21741+dd5be1e7.src"
},
"product_reference": "aardvark-dns-2:1.5.0-2.module+el8.8.0+21741+dd5be1e7.src",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "aardvark-dns-2:1.5.0-2.module+el8.8.0+21741+dd5be1e7.x86_64 as a component of container-tools:rhel8:8080020240422101606:0f77c1b7 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:aardvark-dns-2:1.5.0-2.module+el8.8.0+21741+dd5be1e7.x86_64"
},
"product_reference": "aardvark-dns-2:1.5.0-2.module+el8.8.0+21741+dd5be1e7.x86_64",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "buildah-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.aarch64 as a component of container-tools:rhel8:8080020240422101606:0f77c1b7 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:buildah-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.aarch64"
},
"product_reference": "buildah-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.aarch64",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "buildah-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.ppc64le as a component of container-tools:rhel8:8080020240422101606:0f77c1b7 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:buildah-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.ppc64le"
},
"product_reference": "buildah-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.ppc64le",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "buildah-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.s390x as a component of container-tools:rhel8:8080020240422101606:0f77c1b7 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:buildah-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.s390x"
},
"product_reference": "buildah-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.s390x",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "buildah-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.src as a component of container-tools:rhel8:8080020240422101606:0f77c1b7 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:buildah-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.src"
},
"product_reference": "buildah-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.src",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "buildah-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.x86_64 as a component of container-tools:rhel8:8080020240422101606:0f77c1b7 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:buildah-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.x86_64"
},
"product_reference": "buildah-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.x86_64",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "buildah-debuginfo-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.aarch64 as a component of container-tools:rhel8:8080020240422101606:0f77c1b7 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:buildah-debuginfo-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.aarch64"
},
"product_reference": "buildah-debuginfo-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.aarch64",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "buildah-debuginfo-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.ppc64le as a component of container-tools:rhel8:8080020240422101606:0f77c1b7 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:buildah-debuginfo-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.ppc64le"
},
"product_reference": "buildah-debuginfo-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.ppc64le",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "buildah-debuginfo-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.s390x as a component of container-tools:rhel8:8080020240422101606:0f77c1b7 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:buildah-debuginfo-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.s390x"
},
"product_reference": "buildah-debuginfo-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.s390x",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "buildah-debuginfo-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.x86_64 as a component of container-tools:rhel8:8080020240422101606:0f77c1b7 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:buildah-debuginfo-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.x86_64"
},
"product_reference": "buildah-debuginfo-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.x86_64",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "buildah-debugsource-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.aarch64 as a component of container-tools:rhel8:8080020240422101606:0f77c1b7 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:buildah-debugsource-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.aarch64"
},
"product_reference": "buildah-debugsource-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.aarch64",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "buildah-debugsource-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.ppc64le as a component of container-tools:rhel8:8080020240422101606:0f77c1b7 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:buildah-debugsource-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.ppc64le"
},
"product_reference": "buildah-debugsource-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.ppc64le",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "buildah-debugsource-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.s390x as a component of container-tools:rhel8:8080020240422101606:0f77c1b7 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:buildah-debugsource-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.s390x"
},
"product_reference": "buildah-debugsource-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.s390x",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "buildah-debugsource-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.x86_64 as a component of container-tools:rhel8:8080020240422101606:0f77c1b7 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:buildah-debugsource-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.x86_64"
},
"product_reference": "buildah-debugsource-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.x86_64",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "buildah-tests-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.aarch64 as a component of container-tools:rhel8:8080020240422101606:0f77c1b7 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:buildah-tests-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.aarch64"
},
"product_reference": "buildah-tests-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.aarch64",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "buildah-tests-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.ppc64le as a component of container-tools:rhel8:8080020240422101606:0f77c1b7 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:buildah-tests-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.ppc64le"
},
"product_reference": "buildah-tests-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.ppc64le",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "buildah-tests-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.s390x as a component of container-tools:rhel8:8080020240422101606:0f77c1b7 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:buildah-tests-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.s390x"
},
"product_reference": "buildah-tests-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.s390x",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "buildah-tests-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.x86_64 as a component of container-tools:rhel8:8080020240422101606:0f77c1b7 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:buildah-tests-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.x86_64"
},
"product_reference": "buildah-tests-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.x86_64",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "buildah-tests-debuginfo-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.aarch64 as a component of container-tools:rhel8:8080020240422101606:0f77c1b7 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:buildah-tests-debuginfo-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.aarch64"
},
"product_reference": "buildah-tests-debuginfo-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.aarch64",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "buildah-tests-debuginfo-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.ppc64le as a component of container-tools:rhel8:8080020240422101606:0f77c1b7 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:buildah-tests-debuginfo-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.ppc64le"
},
"product_reference": "buildah-tests-debuginfo-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.ppc64le",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "buildah-tests-debuginfo-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.s390x as a component of container-tools:rhel8:8080020240422101606:0f77c1b7 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:buildah-tests-debuginfo-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.s390x"
},
"product_reference": "buildah-tests-debuginfo-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.s390x",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "buildah-tests-debuginfo-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.x86_64 as a component of container-tools:rhel8:8080020240422101606:0f77c1b7 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:buildah-tests-debuginfo-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.x86_64"
},
"product_reference": "buildah-tests-debuginfo-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.x86_64",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cockpit-podman-0:63.1-1.module+el8.8.0+21741+dd5be1e7.noarch as a component of container-tools:rhel8:8080020240422101606:0f77c1b7 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:cockpit-podman-0:63.1-1.module+el8.8.0+21741+dd5be1e7.noarch"
},
"product_reference": "cockpit-podman-0:63.1-1.module+el8.8.0+21741+dd5be1e7.noarch",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cockpit-podman-0:63.1-1.module+el8.8.0+21741+dd5be1e7.src as a component of container-tools:rhel8:8080020240422101606:0f77c1b7 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:cockpit-podman-0:63.1-1.module+el8.8.0+21741+dd5be1e7.src"
},
"product_reference": "cockpit-podman-0:63.1-1.module+el8.8.0+21741+dd5be1e7.src",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "conmon-3:2.1.6-1.module+el8.8.0+21741+dd5be1e7.aarch64 as a component of container-tools:rhel8:8080020240422101606:0f77c1b7 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:conmon-3:2.1.6-1.module+el8.8.0+21741+dd5be1e7.aarch64"
},
"product_reference": "conmon-3:2.1.6-1.module+el8.8.0+21741+dd5be1e7.aarch64",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "conmon-3:2.1.6-1.module+el8.8.0+21741+dd5be1e7.ppc64le as a component of container-tools:rhel8:8080020240422101606:0f77c1b7 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:conmon-3:2.1.6-1.module+el8.8.0+21741+dd5be1e7.ppc64le"
},
"product_reference": "conmon-3:2.1.6-1.module+el8.8.0+21741+dd5be1e7.ppc64le",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "conmon-3:2.1.6-1.module+el8.8.0+21741+dd5be1e7.s390x as a component of container-tools:rhel8:8080020240422101606:0f77c1b7 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:conmon-3:2.1.6-1.module+el8.8.0+21741+dd5be1e7.s390x"
},
"product_reference": "conmon-3:2.1.6-1.module+el8.8.0+21741+dd5be1e7.s390x",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "conmon-3:2.1.6-1.module+el8.8.0+21741+dd5be1e7.src as a component of container-tools:rhel8:8080020240422101606:0f77c1b7 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:conmon-3:2.1.6-1.module+el8.8.0+21741+dd5be1e7.src"
},
"product_reference": "conmon-3:2.1.6-1.module+el8.8.0+21741+dd5be1e7.src",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "conmon-3:2.1.6-1.module+el8.8.0+21741+dd5be1e7.x86_64 as a component of container-tools:rhel8:8080020240422101606:0f77c1b7 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:conmon-3:2.1.6-1.module+el8.8.0+21741+dd5be1e7.x86_64"
},
"product_reference": "conmon-3:2.1.6-1.module+el8.8.0+21741+dd5be1e7.x86_64",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "conmon-debuginfo-3:2.1.6-1.module+el8.8.0+21741+dd5be1e7.aarch64 as a component of container-tools:rhel8:8080020240422101606:0f77c1b7 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:conmon-debuginfo-3:2.1.6-1.module+el8.8.0+21741+dd5be1e7.aarch64"
},
"product_reference": "conmon-debuginfo-3:2.1.6-1.module+el8.8.0+21741+dd5be1e7.aarch64",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "conmon-debuginfo-3:2.1.6-1.module+el8.8.0+21741+dd5be1e7.ppc64le as a component of container-tools:rhel8:8080020240422101606:0f77c1b7 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:conmon-debuginfo-3:2.1.6-1.module+el8.8.0+21741+dd5be1e7.ppc64le"
},
"product_reference": "conmon-debuginfo-3:2.1.6-1.module+el8.8.0+21741+dd5be1e7.ppc64le",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "conmon-debuginfo-3:2.1.6-1.module+el8.8.0+21741+dd5be1e7.s390x as a component of container-tools:rhel8:8080020240422101606:0f77c1b7 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:conmon-debuginfo-3:2.1.6-1.module+el8.8.0+21741+dd5be1e7.s390x"
},
"product_reference": "conmon-debuginfo-3:2.1.6-1.module+el8.8.0+21741+dd5be1e7.s390x",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "conmon-debuginfo-3:2.1.6-1.module+el8.8.0+21741+dd5be1e7.x86_64 as a component of container-tools:rhel8:8080020240422101606:0f77c1b7 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:conmon-debuginfo-3:2.1.6-1.module+el8.8.0+21741+dd5be1e7.x86_64"
},
"product_reference": "conmon-debuginfo-3:2.1.6-1.module+el8.8.0+21741+dd5be1e7.x86_64",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "conmon-debugsource-3:2.1.6-1.module+el8.8.0+21741+dd5be1e7.aarch64 as a component of container-tools:rhel8:8080020240422101606:0f77c1b7 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:conmon-debugsource-3:2.1.6-1.module+el8.8.0+21741+dd5be1e7.aarch64"
},
"product_reference": "conmon-debugsource-3:2.1.6-1.module+el8.8.0+21741+dd5be1e7.aarch64",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "conmon-debugsource-3:2.1.6-1.module+el8.8.0+21741+dd5be1e7.ppc64le as a component of container-tools:rhel8:8080020240422101606:0f77c1b7 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:conmon-debugsource-3:2.1.6-1.module+el8.8.0+21741+dd5be1e7.ppc64le"
},
"product_reference": "conmon-debugsource-3:2.1.6-1.module+el8.8.0+21741+dd5be1e7.ppc64le",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "conmon-debugsource-3:2.1.6-1.module+el8.8.0+21741+dd5be1e7.s390x as a component of container-tools:rhel8:8080020240422101606:0f77c1b7 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:conmon-debugsource-3:2.1.6-1.module+el8.8.0+21741+dd5be1e7.s390x"
},
"product_reference": "conmon-debugsource-3:2.1.6-1.module+el8.8.0+21741+dd5be1e7.s390x",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "conmon-debugsource-3:2.1.6-1.module+el8.8.0+21741+dd5be1e7.x86_64 as a component of container-tools:rhel8:8080020240422101606:0f77c1b7 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:conmon-debugsource-3:2.1.6-1.module+el8.8.0+21741+dd5be1e7.x86_64"
},
"product_reference": "conmon-debugsource-3:2.1.6-1.module+el8.8.0+21741+dd5be1e7.x86_64",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "container-selinux-2:2.229.0-1.module+el8.8.0+21741+dd5be1e7.noarch as a component of container-tools:rhel8:8080020240422101606:0f77c1b7 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:container-selinux-2:2.229.0-1.module+el8.8.0+21741+dd5be1e7.noarch"
},
"product_reference": "container-selinux-2:2.229.0-1.module+el8.8.0+21741+dd5be1e7.noarch",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "container-selinux-2:2.229.0-1.module+el8.8.0+21741+dd5be1e7.src as a component of container-tools:rhel8:8080020240422101606:0f77c1b7 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:container-selinux-2:2.229.0-1.module+el8.8.0+21741+dd5be1e7.src"
},
"product_reference": "container-selinux-2:2.229.0-1.module+el8.8.0+21741+dd5be1e7.src",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "containernetworking-plugins-1:1.2.0-1.module+el8.8.0+21741+dd5be1e7.aarch64 as a component of container-tools:rhel8:8080020240422101606:0f77c1b7 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:containernetworking-plugins-1:1.2.0-1.module+el8.8.0+21741+dd5be1e7.aarch64"
},
"product_reference": "containernetworking-plugins-1:1.2.0-1.module+el8.8.0+21741+dd5be1e7.aarch64",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "containernetworking-plugins-1:1.2.0-1.module+el8.8.0+21741+dd5be1e7.ppc64le as a component of container-tools:rhel8:8080020240422101606:0f77c1b7 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:containernetworking-plugins-1:1.2.0-1.module+el8.8.0+21741+dd5be1e7.ppc64le"
},
"product_reference": "containernetworking-plugins-1:1.2.0-1.module+el8.8.0+21741+dd5be1e7.ppc64le",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "containernetworking-plugins-1:1.2.0-1.module+el8.8.0+21741+dd5be1e7.s390x as a component of container-tools:rhel8:8080020240422101606:0f77c1b7 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:containernetworking-plugins-1:1.2.0-1.module+el8.8.0+21741+dd5be1e7.s390x"
},
"product_reference": "containernetworking-plugins-1:1.2.0-1.module+el8.8.0+21741+dd5be1e7.s390x",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "containernetworking-plugins-1:1.2.0-1.module+el8.8.0+21741+dd5be1e7.src as a component of container-tools:rhel8:8080020240422101606:0f77c1b7 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:containernetworking-plugins-1:1.2.0-1.module+el8.8.0+21741+dd5be1e7.src"
},
"product_reference": "containernetworking-plugins-1:1.2.0-1.module+el8.8.0+21741+dd5be1e7.src",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "containernetworking-plugins-1:1.2.0-1.module+el8.8.0+21741+dd5be1e7.x86_64 as a component of container-tools:rhel8:8080020240422101606:0f77c1b7 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:containernetworking-plugins-1:1.2.0-1.module+el8.8.0+21741+dd5be1e7.x86_64"
},
"product_reference": "containernetworking-plugins-1:1.2.0-1.module+el8.8.0+21741+dd5be1e7.x86_64",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "containernetworking-plugins-debuginfo-1:1.2.0-1.module+el8.8.0+21741+dd5be1e7.aarch64 as a component of container-tools:rhel8:8080020240422101606:0f77c1b7 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:containernetworking-plugins-debuginfo-1:1.2.0-1.module+el8.8.0+21741+dd5be1e7.aarch64"
},
"product_reference": "containernetworking-plugins-debuginfo-1:1.2.0-1.module+el8.8.0+21741+dd5be1e7.aarch64",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "containernetworking-plugins-debuginfo-1:1.2.0-1.module+el8.8.0+21741+dd5be1e7.ppc64le as a component of container-tools:rhel8:8080020240422101606:0f77c1b7 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:containernetworking-plugins-debuginfo-1:1.2.0-1.module+el8.8.0+21741+dd5be1e7.ppc64le"
},
"product_reference": "containernetworking-plugins-debuginfo-1:1.2.0-1.module+el8.8.0+21741+dd5be1e7.ppc64le",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "containernetworking-plugins-debuginfo-1:1.2.0-1.module+el8.8.0+21741+dd5be1e7.s390x as a component of container-tools:rhel8:8080020240422101606:0f77c1b7 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:containernetworking-plugins-debuginfo-1:1.2.0-1.module+el8.8.0+21741+dd5be1e7.s390x"
},
"product_reference": "containernetworking-plugins-debuginfo-1:1.2.0-1.module+el8.8.0+21741+dd5be1e7.s390x",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "containernetworking-plugins-debuginfo-1:1.2.0-1.module+el8.8.0+21741+dd5be1e7.x86_64 as a component of container-tools:rhel8:8080020240422101606:0f77c1b7 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:containernetworking-plugins-debuginfo-1:1.2.0-1.module+el8.8.0+21741+dd5be1e7.x86_64"
},
"product_reference": "containernetworking-plugins-debuginfo-1:1.2.0-1.module+el8.8.0+21741+dd5be1e7.x86_64",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "containernetworking-plugins-debugsource-1:1.2.0-1.module+el8.8.0+21741+dd5be1e7.aarch64 as a component of container-tools:rhel8:8080020240422101606:0f77c1b7 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:containernetworking-plugins-debugsource-1:1.2.0-1.module+el8.8.0+21741+dd5be1e7.aarch64"
},
"product_reference": "containernetworking-plugins-debugsource-1:1.2.0-1.module+el8.8.0+21741+dd5be1e7.aarch64",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "containernetworking-plugins-debugsource-1:1.2.0-1.module+el8.8.0+21741+dd5be1e7.ppc64le as a component of container-tools:rhel8:8080020240422101606:0f77c1b7 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:containernetworking-plugins-debugsource-1:1.2.0-1.module+el8.8.0+21741+dd5be1e7.ppc64le"
},
"product_reference": "containernetworking-plugins-debugsource-1:1.2.0-1.module+el8.8.0+21741+dd5be1e7.ppc64le",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "containernetworking-plugins-debugsource-1:1.2.0-1.module+el8.8.0+21741+dd5be1e7.s390x as a component of container-tools:rhel8:8080020240422101606:0f77c1b7 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:containernetworking-plugins-debugsource-1:1.2.0-1.module+el8.8.0+21741+dd5be1e7.s390x"
},
"product_reference": "containernetworking-plugins-debugsource-1:1.2.0-1.module+el8.8.0+21741+dd5be1e7.s390x",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "containernetworking-plugins-debugsource-1:1.2.0-1.module+el8.8.0+21741+dd5be1e7.x86_64 as a component of container-tools:rhel8:8080020240422101606:0f77c1b7 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:containernetworking-plugins-debugsource-1:1.2.0-1.module+el8.8.0+21741+dd5be1e7.x86_64"
},
"product_reference": "containernetworking-plugins-debugsource-1:1.2.0-1.module+el8.8.0+21741+dd5be1e7.x86_64",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "containers-common-2:1-65.module+el8.8.0+21741+dd5be1e7.aarch64 as a component of container-tools:rhel8:8080020240422101606:0f77c1b7 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:containers-common-2:1-65.module+el8.8.0+21741+dd5be1e7.aarch64"
},
"product_reference": "containers-common-2:1-65.module+el8.8.0+21741+dd5be1e7.aarch64",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "containers-common-2:1-65.module+el8.8.0+21741+dd5be1e7.ppc64le as a component of container-tools:rhel8:8080020240422101606:0f77c1b7 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:containers-common-2:1-65.module+el8.8.0+21741+dd5be1e7.ppc64le"
},
"product_reference": "containers-common-2:1-65.module+el8.8.0+21741+dd5be1e7.ppc64le",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "containers-common-2:1-65.module+el8.8.0+21741+dd5be1e7.s390x as a component of container-tools:rhel8:8080020240422101606:0f77c1b7 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:containers-common-2:1-65.module+el8.8.0+21741+dd5be1e7.s390x"
},
"product_reference": "containers-common-2:1-65.module+el8.8.0+21741+dd5be1e7.s390x",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "containers-common-2:1-65.module+el8.8.0+21741+dd5be1e7.src as a component of container-tools:rhel8:8080020240422101606:0f77c1b7 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:containers-common-2:1-65.module+el8.8.0+21741+dd5be1e7.src"
},
"product_reference": "containers-common-2:1-65.module+el8.8.0+21741+dd5be1e7.src",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "containers-common-2:1-65.module+el8.8.0+21741+dd5be1e7.x86_64 as a component of container-tools:rhel8:8080020240422101606:0f77c1b7 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:containers-common-2:1-65.module+el8.8.0+21741+dd5be1e7.x86_64"
},
"product_reference": "containers-common-2:1-65.module+el8.8.0+21741+dd5be1e7.x86_64",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "crit-0:3.15-4.module+el8.8.0+21741+dd5be1e7.aarch64 as a component of container-tools:rhel8:8080020240422101606:0f77c1b7 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:crit-0:3.15-4.module+el8.8.0+21741+dd5be1e7.aarch64"
},
"product_reference": "crit-0:3.15-4.module+el8.8.0+21741+dd5be1e7.aarch64",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "crit-0:3.15-4.module+el8.8.0+21741+dd5be1e7.ppc64le as a component of container-tools:rhel8:8080020240422101606:0f77c1b7 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:crit-0:3.15-4.module+el8.8.0+21741+dd5be1e7.ppc64le"
},
"product_reference": "crit-0:3.15-4.module+el8.8.0+21741+dd5be1e7.ppc64le",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "crit-0:3.15-4.module+el8.8.0+21741+dd5be1e7.s390x as a component of container-tools:rhel8:8080020240422101606:0f77c1b7 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:crit-0:3.15-4.module+el8.8.0+21741+dd5be1e7.s390x"
},
"product_reference": "crit-0:3.15-4.module+el8.8.0+21741+dd5be1e7.s390x",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "crit-0:3.15-4.module+el8.8.0+21741+dd5be1e7.x86_64 as a component of container-tools:rhel8:8080020240422101606:0f77c1b7 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:crit-0:3.15-4.module+el8.8.0+21741+dd5be1e7.x86_64"
},
"product_reference": "crit-0:3.15-4.module+el8.8.0+21741+dd5be1e7.x86_64",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "criu-0:3.15-4.module+el8.8.0+21741+dd5be1e7.aarch64 as a component of container-tools:rhel8:8080020240422101606:0f77c1b7 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:criu-0:3.15-4.module+el8.8.0+21741+dd5be1e7.aarch64"
},
"product_reference": "criu-0:3.15-4.module+el8.8.0+21741+dd5be1e7.aarch64",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "criu-0:3.15-4.module+el8.8.0+21741+dd5be1e7.ppc64le as a component of container-tools:rhel8:8080020240422101606:0f77c1b7 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:criu-0:3.15-4.module+el8.8.0+21741+dd5be1e7.ppc64le"
},
"product_reference": "criu-0:3.15-4.module+el8.8.0+21741+dd5be1e7.ppc64le",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "criu-0:3.15-4.module+el8.8.0+21741+dd5be1e7.s390x as a component of container-tools:rhel8:8080020240422101606:0f77c1b7 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:criu-0:3.15-4.module+el8.8.0+21741+dd5be1e7.s390x"
},
"product_reference": "criu-0:3.15-4.module+el8.8.0+21741+dd5be1e7.s390x",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "criu-0:3.15-4.module+el8.8.0+21741+dd5be1e7.src as a component of container-tools:rhel8:8080020240422101606:0f77c1b7 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:criu-0:3.15-4.module+el8.8.0+21741+dd5be1e7.src"
},
"product_reference": "criu-0:3.15-4.module+el8.8.0+21741+dd5be1e7.src",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "criu-0:3.15-4.module+el8.8.0+21741+dd5be1e7.x86_64 as a component of container-tools:rhel8:8080020240422101606:0f77c1b7 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:criu-0:3.15-4.module+el8.8.0+21741+dd5be1e7.x86_64"
},
"product_reference": "criu-0:3.15-4.module+el8.8.0+21741+dd5be1e7.x86_64",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "criu-debuginfo-0:3.15-4.module+el8.8.0+21741+dd5be1e7.aarch64 as a component of container-tools:rhel8:8080020240422101606:0f77c1b7 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:criu-debuginfo-0:3.15-4.module+el8.8.0+21741+dd5be1e7.aarch64"
},
"product_reference": "criu-debuginfo-0:3.15-4.module+el8.8.0+21741+dd5be1e7.aarch64",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "criu-debuginfo-0:3.15-4.module+el8.8.0+21741+dd5be1e7.ppc64le as a component of container-tools:rhel8:8080020240422101606:0f77c1b7 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:criu-debuginfo-0:3.15-4.module+el8.8.0+21741+dd5be1e7.ppc64le"
},
"product_reference": "criu-debuginfo-0:3.15-4.module+el8.8.0+21741+dd5be1e7.ppc64le",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "criu-debuginfo-0:3.15-4.module+el8.8.0+21741+dd5be1e7.s390x as a component of container-tools:rhel8:8080020240422101606:0f77c1b7 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:criu-debuginfo-0:3.15-4.module+el8.8.0+21741+dd5be1e7.s390x"
},
"product_reference": "criu-debuginfo-0:3.15-4.module+el8.8.0+21741+dd5be1e7.s390x",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "criu-debuginfo-0:3.15-4.module+el8.8.0+21741+dd5be1e7.x86_64 as a component of container-tools:rhel8:8080020240422101606:0f77c1b7 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:criu-debuginfo-0:3.15-4.module+el8.8.0+21741+dd5be1e7.x86_64"
},
"product_reference": "criu-debuginfo-0:3.15-4.module+el8.8.0+21741+dd5be1e7.x86_64",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "criu-debugsource-0:3.15-4.module+el8.8.0+21741+dd5be1e7.aarch64 as a component of container-tools:rhel8:8080020240422101606:0f77c1b7 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:criu-debugsource-0:3.15-4.module+el8.8.0+21741+dd5be1e7.aarch64"
},
"product_reference": "criu-debugsource-0:3.15-4.module+el8.8.0+21741+dd5be1e7.aarch64",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "criu-debugsource-0:3.15-4.module+el8.8.0+21741+dd5be1e7.ppc64le as a component of container-tools:rhel8:8080020240422101606:0f77c1b7 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:criu-debugsource-0:3.15-4.module+el8.8.0+21741+dd5be1e7.ppc64le"
},
"product_reference": "criu-debugsource-0:3.15-4.module+el8.8.0+21741+dd5be1e7.ppc64le",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "criu-debugsource-0:3.15-4.module+el8.8.0+21741+dd5be1e7.s390x as a component of container-tools:rhel8:8080020240422101606:0f77c1b7 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:criu-debugsource-0:3.15-4.module+el8.8.0+21741+dd5be1e7.s390x"
},
"product_reference": "criu-debugsource-0:3.15-4.module+el8.8.0+21741+dd5be1e7.s390x",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "criu-debugsource-0:3.15-4.module+el8.8.0+21741+dd5be1e7.x86_64 as a component of container-tools:rhel8:8080020240422101606:0f77c1b7 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:criu-debugsource-0:3.15-4.module+el8.8.0+21741+dd5be1e7.x86_64"
},
"product_reference": "criu-debugsource-0:3.15-4.module+el8.8.0+21741+dd5be1e7.x86_64",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "criu-devel-0:3.15-4.module+el8.8.0+21741+dd5be1e7.aarch64 as a component of container-tools:rhel8:8080020240422101606:0f77c1b7 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:criu-devel-0:3.15-4.module+el8.8.0+21741+dd5be1e7.aarch64"
},
"product_reference": "criu-devel-0:3.15-4.module+el8.8.0+21741+dd5be1e7.aarch64",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "criu-devel-0:3.15-4.module+el8.8.0+21741+dd5be1e7.ppc64le as a component of container-tools:rhel8:8080020240422101606:0f77c1b7 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:criu-devel-0:3.15-4.module+el8.8.0+21741+dd5be1e7.ppc64le"
},
"product_reference": "criu-devel-0:3.15-4.module+el8.8.0+21741+dd5be1e7.ppc64le",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "criu-devel-0:3.15-4.module+el8.8.0+21741+dd5be1e7.s390x as a component of container-tools:rhel8:8080020240422101606:0f77c1b7 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:criu-devel-0:3.15-4.module+el8.8.0+21741+dd5be1e7.s390x"
},
"product_reference": "criu-devel-0:3.15-4.module+el8.8.0+21741+dd5be1e7.s390x",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "criu-devel-0:3.15-4.module+el8.8.0+21741+dd5be1e7.x86_64 as a component of container-tools:rhel8:8080020240422101606:0f77c1b7 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:criu-devel-0:3.15-4.module+el8.8.0+21741+dd5be1e7.x86_64"
},
"product_reference": "criu-devel-0:3.15-4.module+el8.8.0+21741+dd5be1e7.x86_64",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "criu-libs-0:3.15-4.module+el8.8.0+21741+dd5be1e7.aarch64 as a component of container-tools:rhel8:8080020240422101606:0f77c1b7 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:criu-libs-0:3.15-4.module+el8.8.0+21741+dd5be1e7.aarch64"
},
"product_reference": "criu-libs-0:3.15-4.module+el8.8.0+21741+dd5be1e7.aarch64",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "criu-libs-0:3.15-4.module+el8.8.0+21741+dd5be1e7.ppc64le as a component of container-tools:rhel8:8080020240422101606:0f77c1b7 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:criu-libs-0:3.15-4.module+el8.8.0+21741+dd5be1e7.ppc64le"
},
"product_reference": "criu-libs-0:3.15-4.module+el8.8.0+21741+dd5be1e7.ppc64le",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "criu-libs-0:3.15-4.module+el8.8.0+21741+dd5be1e7.s390x as a component of container-tools:rhel8:8080020240422101606:0f77c1b7 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:criu-libs-0:3.15-4.module+el8.8.0+21741+dd5be1e7.s390x"
},
"product_reference": "criu-libs-0:3.15-4.module+el8.8.0+21741+dd5be1e7.s390x",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "criu-libs-0:3.15-4.module+el8.8.0+21741+dd5be1e7.x86_64 as a component of container-tools:rhel8:8080020240422101606:0f77c1b7 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:criu-libs-0:3.15-4.module+el8.8.0+21741+dd5be1e7.x86_64"
},
"product_reference": "criu-libs-0:3.15-4.module+el8.8.0+21741+dd5be1e7.x86_64",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "criu-libs-debuginfo-0:3.15-4.module+el8.8.0+21741+dd5be1e7.aarch64 as a component of container-tools:rhel8:8080020240422101606:0f77c1b7 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:criu-libs-debuginfo-0:3.15-4.module+el8.8.0+21741+dd5be1e7.aarch64"
},
"product_reference": "criu-libs-debuginfo-0:3.15-4.module+el8.8.0+21741+dd5be1e7.aarch64",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "criu-libs-debuginfo-0:3.15-4.module+el8.8.0+21741+dd5be1e7.ppc64le as a component of container-tools:rhel8:8080020240422101606:0f77c1b7 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:criu-libs-debuginfo-0:3.15-4.module+el8.8.0+21741+dd5be1e7.ppc64le"
},
"product_reference": "criu-libs-debuginfo-0:3.15-4.module+el8.8.0+21741+dd5be1e7.ppc64le",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "criu-libs-debuginfo-0:3.15-4.module+el8.8.0+21741+dd5be1e7.s390x as a component of container-tools:rhel8:8080020240422101606:0f77c1b7 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:criu-libs-debuginfo-0:3.15-4.module+el8.8.0+21741+dd5be1e7.s390x"
},
"product_reference": "criu-libs-debuginfo-0:3.15-4.module+el8.8.0+21741+dd5be1e7.s390x",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "criu-libs-debuginfo-0:3.15-4.module+el8.8.0+21741+dd5be1e7.x86_64 as a component of container-tools:rhel8:8080020240422101606:0f77c1b7 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:criu-libs-debuginfo-0:3.15-4.module+el8.8.0+21741+dd5be1e7.x86_64"
},
"product_reference": "criu-libs-debuginfo-0:3.15-4.module+el8.8.0+21741+dd5be1e7.x86_64",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "crun-0:1.8.4-2.module+el8.8.0+21741+dd5be1e7.aarch64 as a component of container-tools:rhel8:8080020240422101606:0f77c1b7 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:crun-0:1.8.4-2.module+el8.8.0+21741+dd5be1e7.aarch64"
},
"product_reference": "crun-0:1.8.4-2.module+el8.8.0+21741+dd5be1e7.aarch64",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "crun-0:1.8.4-2.module+el8.8.0+21741+dd5be1e7.ppc64le as a component of container-tools:rhel8:8080020240422101606:0f77c1b7 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:crun-0:1.8.4-2.module+el8.8.0+21741+dd5be1e7.ppc64le"
},
"product_reference": "crun-0:1.8.4-2.module+el8.8.0+21741+dd5be1e7.ppc64le",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "crun-0:1.8.4-2.module+el8.8.0+21741+dd5be1e7.s390x as a component of container-tools:rhel8:8080020240422101606:0f77c1b7 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:crun-0:1.8.4-2.module+el8.8.0+21741+dd5be1e7.s390x"
},
"product_reference": "crun-0:1.8.4-2.module+el8.8.0+21741+dd5be1e7.s390x",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "crun-0:1.8.4-2.module+el8.8.0+21741+dd5be1e7.src as a component of container-tools:rhel8:8080020240422101606:0f77c1b7 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:crun-0:1.8.4-2.module+el8.8.0+21741+dd5be1e7.src"
},
"product_reference": "crun-0:1.8.4-2.module+el8.8.0+21741+dd5be1e7.src",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "crun-0:1.8.4-2.module+el8.8.0+21741+dd5be1e7.x86_64 as a component of container-tools:rhel8:8080020240422101606:0f77c1b7 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:crun-0:1.8.4-2.module+el8.8.0+21741+dd5be1e7.x86_64"
},
"product_reference": "crun-0:1.8.4-2.module+el8.8.0+21741+dd5be1e7.x86_64",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "crun-debuginfo-0:1.8.4-2.module+el8.8.0+21741+dd5be1e7.aarch64 as a component of container-tools:rhel8:8080020240422101606:0f77c1b7 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:crun-debuginfo-0:1.8.4-2.module+el8.8.0+21741+dd5be1e7.aarch64"
},
"product_reference": "crun-debuginfo-0:1.8.4-2.module+el8.8.0+21741+dd5be1e7.aarch64",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "crun-debuginfo-0:1.8.4-2.module+el8.8.0+21741+dd5be1e7.ppc64le as a component of container-tools:rhel8:8080020240422101606:0f77c1b7 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:crun-debuginfo-0:1.8.4-2.module+el8.8.0+21741+dd5be1e7.ppc64le"
},
"product_reference": "crun-debuginfo-0:1.8.4-2.module+el8.8.0+21741+dd5be1e7.ppc64le",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "crun-debuginfo-0:1.8.4-2.module+el8.8.0+21741+dd5be1e7.s390x as a component of container-tools:rhel8:8080020240422101606:0f77c1b7 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:crun-debuginfo-0:1.8.4-2.module+el8.8.0+21741+dd5be1e7.s390x"
},
"product_reference": "crun-debuginfo-0:1.8.4-2.module+el8.8.0+21741+dd5be1e7.s390x",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "crun-debuginfo-0:1.8.4-2.module+el8.8.0+21741+dd5be1e7.x86_64 as a component of container-tools:rhel8:8080020240422101606:0f77c1b7 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:crun-debuginfo-0:1.8.4-2.module+el8.8.0+21741+dd5be1e7.x86_64"
},
"product_reference": "crun-debuginfo-0:1.8.4-2.module+el8.8.0+21741+dd5be1e7.x86_64",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "crun-debugsource-0:1.8.4-2.module+el8.8.0+21741+dd5be1e7.aarch64 as a component of container-tools:rhel8:8080020240422101606:0f77c1b7 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:crun-debugsource-0:1.8.4-2.module+el8.8.0+21741+dd5be1e7.aarch64"
},
"product_reference": "crun-debugsource-0:1.8.4-2.module+el8.8.0+21741+dd5be1e7.aarch64",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "crun-debugsource-0:1.8.4-2.module+el8.8.0+21741+dd5be1e7.ppc64le as a component of container-tools:rhel8:8080020240422101606:0f77c1b7 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:crun-debugsource-0:1.8.4-2.module+el8.8.0+21741+dd5be1e7.ppc64le"
},
"product_reference": "crun-debugsource-0:1.8.4-2.module+el8.8.0+21741+dd5be1e7.ppc64le",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "crun-debugsource-0:1.8.4-2.module+el8.8.0+21741+dd5be1e7.s390x as a component of container-tools:rhel8:8080020240422101606:0f77c1b7 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:crun-debugsource-0:1.8.4-2.module+el8.8.0+21741+dd5be1e7.s390x"
},
"product_reference": "crun-debugsource-0:1.8.4-2.module+el8.8.0+21741+dd5be1e7.s390x",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "crun-debugsource-0:1.8.4-2.module+el8.8.0+21741+dd5be1e7.x86_64 as a component of container-tools:rhel8:8080020240422101606:0f77c1b7 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:crun-debugsource-0:1.8.4-2.module+el8.8.0+21741+dd5be1e7.x86_64"
},
"product_reference": "crun-debugsource-0:1.8.4-2.module+el8.8.0+21741+dd5be1e7.x86_64",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fuse-overlayfs-0:1.11-1.module+el8.8.0+21741+dd5be1e7.aarch64 as a component of container-tools:rhel8:8080020240422101606:0f77c1b7 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:fuse-overlayfs-0:1.11-1.module+el8.8.0+21741+dd5be1e7.aarch64"
},
"product_reference": "fuse-overlayfs-0:1.11-1.module+el8.8.0+21741+dd5be1e7.aarch64",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fuse-overlayfs-0:1.11-1.module+el8.8.0+21741+dd5be1e7.ppc64le as a component of container-tools:rhel8:8080020240422101606:0f77c1b7 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:fuse-overlayfs-0:1.11-1.module+el8.8.0+21741+dd5be1e7.ppc64le"
},
"product_reference": "fuse-overlayfs-0:1.11-1.module+el8.8.0+21741+dd5be1e7.ppc64le",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fuse-overlayfs-0:1.11-1.module+el8.8.0+21741+dd5be1e7.s390x as a component of container-tools:rhel8:8080020240422101606:0f77c1b7 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:fuse-overlayfs-0:1.11-1.module+el8.8.0+21741+dd5be1e7.s390x"
},
"product_reference": "fuse-overlayfs-0:1.11-1.module+el8.8.0+21741+dd5be1e7.s390x",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fuse-overlayfs-0:1.11-1.module+el8.8.0+21741+dd5be1e7.src as a component of container-tools:rhel8:8080020240422101606:0f77c1b7 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:fuse-overlayfs-0:1.11-1.module+el8.8.0+21741+dd5be1e7.src"
},
"product_reference": "fuse-overlayfs-0:1.11-1.module+el8.8.0+21741+dd5be1e7.src",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fuse-overlayfs-0:1.11-1.module+el8.8.0+21741+dd5be1e7.x86_64 as a component of container-tools:rhel8:8080020240422101606:0f77c1b7 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:fuse-overlayfs-0:1.11-1.module+el8.8.0+21741+dd5be1e7.x86_64"
},
"product_reference": "fuse-overlayfs-0:1.11-1.module+el8.8.0+21741+dd5be1e7.x86_64",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fuse-overlayfs-debuginfo-0:1.11-1.module+el8.8.0+21741+dd5be1e7.aarch64 as a component of container-tools:rhel8:8080020240422101606:0f77c1b7 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:fuse-overlayfs-debuginfo-0:1.11-1.module+el8.8.0+21741+dd5be1e7.aarch64"
},
"product_reference": "fuse-overlayfs-debuginfo-0:1.11-1.module+el8.8.0+21741+dd5be1e7.aarch64",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fuse-overlayfs-debuginfo-0:1.11-1.module+el8.8.0+21741+dd5be1e7.ppc64le as a component of container-tools:rhel8:8080020240422101606:0f77c1b7 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:fuse-overlayfs-debuginfo-0:1.11-1.module+el8.8.0+21741+dd5be1e7.ppc64le"
},
"product_reference": "fuse-overlayfs-debuginfo-0:1.11-1.module+el8.8.0+21741+dd5be1e7.ppc64le",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fuse-overlayfs-debuginfo-0:1.11-1.module+el8.8.0+21741+dd5be1e7.s390x as a component of container-tools:rhel8:8080020240422101606:0f77c1b7 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:fuse-overlayfs-debuginfo-0:1.11-1.module+el8.8.0+21741+dd5be1e7.s390x"
},
"product_reference": "fuse-overlayfs-debuginfo-0:1.11-1.module+el8.8.0+21741+dd5be1e7.s390x",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fuse-overlayfs-debuginfo-0:1.11-1.module+el8.8.0+21741+dd5be1e7.x86_64 as a component of container-tools:rhel8:8080020240422101606:0f77c1b7 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:fuse-overlayfs-debuginfo-0:1.11-1.module+el8.8.0+21741+dd5be1e7.x86_64"
},
"product_reference": "fuse-overlayfs-debuginfo-0:1.11-1.module+el8.8.0+21741+dd5be1e7.x86_64",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fuse-overlayfs-debugsource-0:1.11-1.module+el8.8.0+21741+dd5be1e7.aarch64 as a component of container-tools:rhel8:8080020240422101606:0f77c1b7 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:fuse-overlayfs-debugsource-0:1.11-1.module+el8.8.0+21741+dd5be1e7.aarch64"
},
"product_reference": "fuse-overlayfs-debugsource-0:1.11-1.module+el8.8.0+21741+dd5be1e7.aarch64",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fuse-overlayfs-debugsource-0:1.11-1.module+el8.8.0+21741+dd5be1e7.ppc64le as a component of container-tools:rhel8:8080020240422101606:0f77c1b7 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:fuse-overlayfs-debugsource-0:1.11-1.module+el8.8.0+21741+dd5be1e7.ppc64le"
},
"product_reference": "fuse-overlayfs-debugsource-0:1.11-1.module+el8.8.0+21741+dd5be1e7.ppc64le",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fuse-overlayfs-debugsource-0:1.11-1.module+el8.8.0+21741+dd5be1e7.s390x as a component of container-tools:rhel8:8080020240422101606:0f77c1b7 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:fuse-overlayfs-debugsource-0:1.11-1.module+el8.8.0+21741+dd5be1e7.s390x"
},
"product_reference": "fuse-overlayfs-debugsource-0:1.11-1.module+el8.8.0+21741+dd5be1e7.s390x",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fuse-overlayfs-debugsource-0:1.11-1.module+el8.8.0+21741+dd5be1e7.x86_64 as a component of container-tools:rhel8:8080020240422101606:0f77c1b7 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:fuse-overlayfs-debugsource-0:1.11-1.module+el8.8.0+21741+dd5be1e7.x86_64"
},
"product_reference": "fuse-overlayfs-debugsource-0:1.11-1.module+el8.8.0+21741+dd5be1e7.x86_64",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libslirp-0:4.4.0-1.module+el8.8.0+21741+dd5be1e7.aarch64 as a component of container-tools:rhel8:8080020240422101606:0f77c1b7 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:libslirp-0:4.4.0-1.module+el8.8.0+21741+dd5be1e7.aarch64"
},
"product_reference": "libslirp-0:4.4.0-1.module+el8.8.0+21741+dd5be1e7.aarch64",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libslirp-0:4.4.0-1.module+el8.8.0+21741+dd5be1e7.ppc64le as a component of container-tools:rhel8:8080020240422101606:0f77c1b7 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:libslirp-0:4.4.0-1.module+el8.8.0+21741+dd5be1e7.ppc64le"
},
"product_reference": "libslirp-0:4.4.0-1.module+el8.8.0+21741+dd5be1e7.ppc64le",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libslirp-0:4.4.0-1.module+el8.8.0+21741+dd5be1e7.s390x as a component of container-tools:rhel8:8080020240422101606:0f77c1b7 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:libslirp-0:4.4.0-1.module+el8.8.0+21741+dd5be1e7.s390x"
},
"product_reference": "libslirp-0:4.4.0-1.module+el8.8.0+21741+dd5be1e7.s390x",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libslirp-0:4.4.0-1.module+el8.8.0+21741+dd5be1e7.src as a component of container-tools:rhel8:8080020240422101606:0f77c1b7 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:libslirp-0:4.4.0-1.module+el8.8.0+21741+dd5be1e7.src"
},
"product_reference": "libslirp-0:4.4.0-1.module+el8.8.0+21741+dd5be1e7.src",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libslirp-0:4.4.0-1.module+el8.8.0+21741+dd5be1e7.x86_64 as a component of container-tools:rhel8:8080020240422101606:0f77c1b7 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:libslirp-0:4.4.0-1.module+el8.8.0+21741+dd5be1e7.x86_64"
},
"product_reference": "libslirp-0:4.4.0-1.module+el8.8.0+21741+dd5be1e7.x86_64",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libslirp-debuginfo-0:4.4.0-1.module+el8.8.0+21741+dd5be1e7.aarch64 as a component of container-tools:rhel8:8080020240422101606:0f77c1b7 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:libslirp-debuginfo-0:4.4.0-1.module+el8.8.0+21741+dd5be1e7.aarch64"
},
"product_reference": "libslirp-debuginfo-0:4.4.0-1.module+el8.8.0+21741+dd5be1e7.aarch64",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libslirp-debuginfo-0:4.4.0-1.module+el8.8.0+21741+dd5be1e7.ppc64le as a component of container-tools:rhel8:8080020240422101606:0f77c1b7 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:libslirp-debuginfo-0:4.4.0-1.module+el8.8.0+21741+dd5be1e7.ppc64le"
},
"product_reference": "libslirp-debuginfo-0:4.4.0-1.module+el8.8.0+21741+dd5be1e7.ppc64le",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libslirp-debuginfo-0:4.4.0-1.module+el8.8.0+21741+dd5be1e7.s390x as a component of container-tools:rhel8:8080020240422101606:0f77c1b7 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:libslirp-debuginfo-0:4.4.0-1.module+el8.8.0+21741+dd5be1e7.s390x"
},
"product_reference": "libslirp-debuginfo-0:4.4.0-1.module+el8.8.0+21741+dd5be1e7.s390x",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libslirp-debuginfo-0:4.4.0-1.module+el8.8.0+21741+dd5be1e7.x86_64 as a component of container-tools:rhel8:8080020240422101606:0f77c1b7 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:libslirp-debuginfo-0:4.4.0-1.module+el8.8.0+21741+dd5be1e7.x86_64"
},
"product_reference": "libslirp-debuginfo-0:4.4.0-1.module+el8.8.0+21741+dd5be1e7.x86_64",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libslirp-debugsource-0:4.4.0-1.module+el8.8.0+21741+dd5be1e7.aarch64 as a component of container-tools:rhel8:8080020240422101606:0f77c1b7 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:libslirp-debugsource-0:4.4.0-1.module+el8.8.0+21741+dd5be1e7.aarch64"
},
"product_reference": "libslirp-debugsource-0:4.4.0-1.module+el8.8.0+21741+dd5be1e7.aarch64",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libslirp-debugsource-0:4.4.0-1.module+el8.8.0+21741+dd5be1e7.ppc64le as a component of container-tools:rhel8:8080020240422101606:0f77c1b7 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:libslirp-debugsource-0:4.4.0-1.module+el8.8.0+21741+dd5be1e7.ppc64le"
},
"product_reference": "libslirp-debugsource-0:4.4.0-1.module+el8.8.0+21741+dd5be1e7.ppc64le",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libslirp-debugsource-0:4.4.0-1.module+el8.8.0+21741+dd5be1e7.s390x as a component of container-tools:rhel8:8080020240422101606:0f77c1b7 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:libslirp-debugsource-0:4.4.0-1.module+el8.8.0+21741+dd5be1e7.s390x"
},
"product_reference": "libslirp-debugsource-0:4.4.0-1.module+el8.8.0+21741+dd5be1e7.s390x",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libslirp-debugsource-0:4.4.0-1.module+el8.8.0+21741+dd5be1e7.x86_64 as a component of container-tools:rhel8:8080020240422101606:0f77c1b7 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:libslirp-debugsource-0:4.4.0-1.module+el8.8.0+21741+dd5be1e7.x86_64"
},
"product_reference": "libslirp-debugsource-0:4.4.0-1.module+el8.8.0+21741+dd5be1e7.x86_64",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libslirp-devel-0:4.4.0-1.module+el8.8.0+21741+dd5be1e7.aarch64 as a component of container-tools:rhel8:8080020240422101606:0f77c1b7 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:libslirp-devel-0:4.4.0-1.module+el8.8.0+21741+dd5be1e7.aarch64"
},
"product_reference": "libslirp-devel-0:4.4.0-1.module+el8.8.0+21741+dd5be1e7.aarch64",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libslirp-devel-0:4.4.0-1.module+el8.8.0+21741+dd5be1e7.ppc64le as a component of container-tools:rhel8:8080020240422101606:0f77c1b7 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:libslirp-devel-0:4.4.0-1.module+el8.8.0+21741+dd5be1e7.ppc64le"
},
"product_reference": "libslirp-devel-0:4.4.0-1.module+el8.8.0+21741+dd5be1e7.ppc64le",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libslirp-devel-0:4.4.0-1.module+el8.8.0+21741+dd5be1e7.s390x as a component of container-tools:rhel8:8080020240422101606:0f77c1b7 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:libslirp-devel-0:4.4.0-1.module+el8.8.0+21741+dd5be1e7.s390x"
},
"product_reference": "libslirp-devel-0:4.4.0-1.module+el8.8.0+21741+dd5be1e7.s390x",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libslirp-devel-0:4.4.0-1.module+el8.8.0+21741+dd5be1e7.x86_64 as a component of container-tools:rhel8:8080020240422101606:0f77c1b7 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:libslirp-devel-0:4.4.0-1.module+el8.8.0+21741+dd5be1e7.x86_64"
},
"product_reference": "libslirp-devel-0:4.4.0-1.module+el8.8.0+21741+dd5be1e7.x86_64",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netavark-2:1.5.1-3.module+el8.8.0+21741+dd5be1e7.aarch64 as a component of container-tools:rhel8:8080020240422101606:0f77c1b7 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:netavark-2:1.5.1-3.module+el8.8.0+21741+dd5be1e7.aarch64"
},
"product_reference": "netavark-2:1.5.1-3.module+el8.8.0+21741+dd5be1e7.aarch64",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netavark-2:1.5.1-3.module+el8.8.0+21741+dd5be1e7.ppc64le as a component of container-tools:rhel8:8080020240422101606:0f77c1b7 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:netavark-2:1.5.1-3.module+el8.8.0+21741+dd5be1e7.ppc64le"
},
"product_reference": "netavark-2:1.5.1-3.module+el8.8.0+21741+dd5be1e7.ppc64le",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netavark-2:1.5.1-3.module+el8.8.0+21741+dd5be1e7.s390x as a component of container-tools:rhel8:8080020240422101606:0f77c1b7 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:netavark-2:1.5.1-3.module+el8.8.0+21741+dd5be1e7.s390x"
},
"product_reference": "netavark-2:1.5.1-3.module+el8.8.0+21741+dd5be1e7.s390x",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netavark-2:1.5.1-3.module+el8.8.0+21741+dd5be1e7.src as a component of container-tools:rhel8:8080020240422101606:0f77c1b7 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:netavark-2:1.5.1-3.module+el8.8.0+21741+dd5be1e7.src"
},
"product_reference": "netavark-2:1.5.1-3.module+el8.8.0+21741+dd5be1e7.src",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netavark-2:1.5.1-3.module+el8.8.0+21741+dd5be1e7.x86_64 as a component of container-tools:rhel8:8080020240422101606:0f77c1b7 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:netavark-2:1.5.1-3.module+el8.8.0+21741+dd5be1e7.x86_64"
},
"product_reference": "netavark-2:1.5.1-3.module+el8.8.0+21741+dd5be1e7.x86_64",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "oci-seccomp-bpf-hook-0:1.2.8-1.module+el8.8.0+21741+dd5be1e7.aarch64 as a component of container-tools:rhel8:8080020240422101606:0f77c1b7 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:oci-seccomp-bpf-hook-0:1.2.8-1.module+el8.8.0+21741+dd5be1e7.aarch64"
},
"product_reference": "oci-seccomp-bpf-hook-0:1.2.8-1.module+el8.8.0+21741+dd5be1e7.aarch64",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "oci-seccomp-bpf-hook-0:1.2.8-1.module+el8.8.0+21741+dd5be1e7.ppc64le as a component of container-tools:rhel8:8080020240422101606:0f77c1b7 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:oci-seccomp-bpf-hook-0:1.2.8-1.module+el8.8.0+21741+dd5be1e7.ppc64le"
},
"product_reference": "oci-seccomp-bpf-hook-0:1.2.8-1.module+el8.8.0+21741+dd5be1e7.ppc64le",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "oci-seccomp-bpf-hook-0:1.2.8-1.module+el8.8.0+21741+dd5be1e7.s390x as a component of container-tools:rhel8:8080020240422101606:0f77c1b7 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:oci-seccomp-bpf-hook-0:1.2.8-1.module+el8.8.0+21741+dd5be1e7.s390x"
},
"product_reference": "oci-seccomp-bpf-hook-0:1.2.8-1.module+el8.8.0+21741+dd5be1e7.s390x",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "oci-seccomp-bpf-hook-0:1.2.8-1.module+el8.8.0+21741+dd5be1e7.src as a component of container-tools:rhel8:8080020240422101606:0f77c1b7 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:oci-seccomp-bpf-hook-0:1.2.8-1.module+el8.8.0+21741+dd5be1e7.src"
},
"product_reference": "oci-seccomp-bpf-hook-0:1.2.8-1.module+el8.8.0+21741+dd5be1e7.src",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "oci-seccomp-bpf-hook-0:1.2.8-1.module+el8.8.0+21741+dd5be1e7.x86_64 as a component of container-tools:rhel8:8080020240422101606:0f77c1b7 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:oci-seccomp-bpf-hook-0:1.2.8-1.module+el8.8.0+21741+dd5be1e7.x86_64"
},
"product_reference": "oci-seccomp-bpf-hook-0:1.2.8-1.module+el8.8.0+21741+dd5be1e7.x86_64",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "oci-seccomp-bpf-hook-debuginfo-0:1.2.8-1.module+el8.8.0+21741+dd5be1e7.aarch64 as a component of container-tools:rhel8:8080020240422101606:0f77c1b7 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:oci-seccomp-bpf-hook-debuginfo-0:1.2.8-1.module+el8.8.0+21741+dd5be1e7.aarch64"
},
"product_reference": "oci-seccomp-bpf-hook-debuginfo-0:1.2.8-1.module+el8.8.0+21741+dd5be1e7.aarch64",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "oci-seccomp-bpf-hook-debuginfo-0:1.2.8-1.module+el8.8.0+21741+dd5be1e7.ppc64le as a component of container-tools:rhel8:8080020240422101606:0f77c1b7 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:oci-seccomp-bpf-hook-debuginfo-0:1.2.8-1.module+el8.8.0+21741+dd5be1e7.ppc64le"
},
"product_reference": "oci-seccomp-bpf-hook-debuginfo-0:1.2.8-1.module+el8.8.0+21741+dd5be1e7.ppc64le",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "oci-seccomp-bpf-hook-debuginfo-0:1.2.8-1.module+el8.8.0+21741+dd5be1e7.s390x as a component of container-tools:rhel8:8080020240422101606:0f77c1b7 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:oci-seccomp-bpf-hook-debuginfo-0:1.2.8-1.module+el8.8.0+21741+dd5be1e7.s390x"
},
"product_reference": "oci-seccomp-bpf-hook-debuginfo-0:1.2.8-1.module+el8.8.0+21741+dd5be1e7.s390x",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "oci-seccomp-bpf-hook-debuginfo-0:1.2.8-1.module+el8.8.0+21741+dd5be1e7.x86_64 as a component of container-tools:rhel8:8080020240422101606:0f77c1b7 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:oci-seccomp-bpf-hook-debuginfo-0:1.2.8-1.module+el8.8.0+21741+dd5be1e7.x86_64"
},
"product_reference": "oci-seccomp-bpf-hook-debuginfo-0:1.2.8-1.module+el8.8.0+21741+dd5be1e7.x86_64",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "oci-seccomp-bpf-hook-debugsource-0:1.2.8-1.module+el8.8.0+21741+dd5be1e7.aarch64 as a component of container-tools:rhel8:8080020240422101606:0f77c1b7 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:oci-seccomp-bpf-hook-debugsource-0:1.2.8-1.module+el8.8.0+21741+dd5be1e7.aarch64"
},
"product_reference": "oci-seccomp-bpf-hook-debugsource-0:1.2.8-1.module+el8.8.0+21741+dd5be1e7.aarch64",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "oci-seccomp-bpf-hook-debugsource-0:1.2.8-1.module+el8.8.0+21741+dd5be1e7.ppc64le as a component of container-tools:rhel8:8080020240422101606:0f77c1b7 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:oci-seccomp-bpf-hook-debugsource-0:1.2.8-1.module+el8.8.0+21741+dd5be1e7.ppc64le"
},
"product_reference": "oci-seccomp-bpf-hook-debugsource-0:1.2.8-1.module+el8.8.0+21741+dd5be1e7.ppc64le",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "oci-seccomp-bpf-hook-debugsource-0:1.2.8-1.module+el8.8.0+21741+dd5be1e7.s390x as a component of container-tools:rhel8:8080020240422101606:0f77c1b7 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:oci-seccomp-bpf-hook-debugsource-0:1.2.8-1.module+el8.8.0+21741+dd5be1e7.s390x"
},
"product_reference": "oci-seccomp-bpf-hook-debugsource-0:1.2.8-1.module+el8.8.0+21741+dd5be1e7.s390x",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "oci-seccomp-bpf-hook-debugsource-0:1.2.8-1.module+el8.8.0+21741+dd5be1e7.x86_64 as a component of container-tools:rhel8:8080020240422101606:0f77c1b7 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:oci-seccomp-bpf-hook-debugsource-0:1.2.8-1.module+el8.8.0+21741+dd5be1e7.x86_64"
},
"product_reference": "oci-seccomp-bpf-hook-debugsource-0:1.2.8-1.module+el8.8.0+21741+dd5be1e7.x86_64",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64 as a component of container-tools:rhel8:8080020240422101606:0f77c1b7 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64"
},
"product_reference": "podman-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le as a component of container-tools:rhel8:8080020240422101606:0f77c1b7 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le"
},
"product_reference": "podman-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x as a component of container-tools:rhel8:8080020240422101606:0f77c1b7 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x"
},
"product_reference": "podman-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.src as a component of container-tools:rhel8:8080020240422101606:0f77c1b7 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.src"
},
"product_reference": "podman-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.src",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64 as a component of container-tools:rhel8:8080020240422101606:0f77c1b7 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64"
},
"product_reference": "podman-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-catatonit-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64 as a component of container-tools:rhel8:8080020240422101606:0f77c1b7 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-catatonit-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64"
},
"product_reference": "podman-catatonit-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-catatonit-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le as a component of container-tools:rhel8:8080020240422101606:0f77c1b7 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-catatonit-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le"
},
"product_reference": "podman-catatonit-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-catatonit-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x as a component of container-tools:rhel8:8080020240422101606:0f77c1b7 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-catatonit-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x"
},
"product_reference": "podman-catatonit-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-catatonit-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64 as a component of container-tools:rhel8:8080020240422101606:0f77c1b7 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-catatonit-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64"
},
"product_reference": "podman-catatonit-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-catatonit-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64 as a component of container-tools:rhel8:8080020240422101606:0f77c1b7 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-catatonit-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64"
},
"product_reference": "podman-catatonit-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-catatonit-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le as a component of container-tools:rhel8:8080020240422101606:0f77c1b7 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-catatonit-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le"
},
"product_reference": "podman-catatonit-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-catatonit-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x as a component of container-tools:rhel8:8080020240422101606:0f77c1b7 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-catatonit-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x"
},
"product_reference": "podman-catatonit-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-catatonit-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64 as a component of container-tools:rhel8:8080020240422101606:0f77c1b7 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-catatonit-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64"
},
"product_reference": "podman-catatonit-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64 as a component of container-tools:rhel8:8080020240422101606:0f77c1b7 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64"
},
"product_reference": "podman-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le as a component of container-tools:rhel8:8080020240422101606:0f77c1b7 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le"
},
"product_reference": "podman-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x as a component of container-tools:rhel8:8080020240422101606:0f77c1b7 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x"
},
"product_reference": "podman-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64 as a component of container-tools:rhel8:8080020240422101606:0f77c1b7 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64"
},
"product_reference": "podman-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-debugsource-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64 as a component of container-tools:rhel8:8080020240422101606:0f77c1b7 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-debugsource-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64"
},
"product_reference": "podman-debugsource-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-debugsource-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le as a component of container-tools:rhel8:8080020240422101606:0f77c1b7 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-debugsource-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le"
},
"product_reference": "podman-debugsource-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-debugsource-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x as a component of container-tools:rhel8:8080020240422101606:0f77c1b7 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-debugsource-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x"
},
"product_reference": "podman-debugsource-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-debugsource-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64 as a component of container-tools:rhel8:8080020240422101606:0f77c1b7 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-debugsource-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64"
},
"product_reference": "podman-debugsource-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-docker-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.noarch as a component of container-tools:rhel8:8080020240422101606:0f77c1b7 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-docker-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.noarch"
},
"product_reference": "podman-docker-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.noarch",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-gvproxy-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64 as a component of container-tools:rhel8:8080020240422101606:0f77c1b7 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-gvproxy-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64"
},
"product_reference": "podman-gvproxy-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-gvproxy-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le as a component of container-tools:rhel8:8080020240422101606:0f77c1b7 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-gvproxy-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le"
},
"product_reference": "podman-gvproxy-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-gvproxy-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x as a component of container-tools:rhel8:8080020240422101606:0f77c1b7 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-gvproxy-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x"
},
"product_reference": "podman-gvproxy-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-gvproxy-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64 as a component of container-tools:rhel8:8080020240422101606:0f77c1b7 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-gvproxy-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64"
},
"product_reference": "podman-gvproxy-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-gvproxy-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64 as a component of container-tools:rhel8:8080020240422101606:0f77c1b7 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-gvproxy-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64"
},
"product_reference": "podman-gvproxy-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-gvproxy-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le as a component of container-tools:rhel8:8080020240422101606:0f77c1b7 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-gvproxy-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le"
},
"product_reference": "podman-gvproxy-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-gvproxy-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x as a component of container-tools:rhel8:8080020240422101606:0f77c1b7 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-gvproxy-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x"
},
"product_reference": "podman-gvproxy-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-gvproxy-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64 as a component of container-tools:rhel8:8080020240422101606:0f77c1b7 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-gvproxy-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64"
},
"product_reference": "podman-gvproxy-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-plugins-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64 as a component of container-tools:rhel8:8080020240422101606:0f77c1b7 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-plugins-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64"
},
"product_reference": "podman-plugins-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-plugins-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le as a component of container-tools:rhel8:8080020240422101606:0f77c1b7 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-plugins-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le"
},
"product_reference": "podman-plugins-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-plugins-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x as a component of container-tools:rhel8:8080020240422101606:0f77c1b7 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-plugins-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x"
},
"product_reference": "podman-plugins-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-plugins-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64 as a component of container-tools:rhel8:8080020240422101606:0f77c1b7 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-plugins-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64"
},
"product_reference": "podman-plugins-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-plugins-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64 as a component of container-tools:rhel8:8080020240422101606:0f77c1b7 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-plugins-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64"
},
"product_reference": "podman-plugins-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-plugins-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le as a component of container-tools:rhel8:8080020240422101606:0f77c1b7 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-plugins-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le"
},
"product_reference": "podman-plugins-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-plugins-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x as a component of container-tools:rhel8:8080020240422101606:0f77c1b7 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-plugins-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x"
},
"product_reference": "podman-plugins-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-plugins-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64 as a component of container-tools:rhel8:8080020240422101606:0f77c1b7 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-plugins-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64"
},
"product_reference": "podman-plugins-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-remote-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64 as a component of container-tools:rhel8:8080020240422101606:0f77c1b7 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-remote-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64"
},
"product_reference": "podman-remote-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-remote-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le as a component of container-tools:rhel8:8080020240422101606:0f77c1b7 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-remote-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le"
},
"product_reference": "podman-remote-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-remote-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x as a component of container-tools:rhel8:8080020240422101606:0f77c1b7 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-remote-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x"
},
"product_reference": "podman-remote-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-remote-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64 as a component of container-tools:rhel8:8080020240422101606:0f77c1b7 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-remote-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64"
},
"product_reference": "podman-remote-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-remote-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64 as a component of container-tools:rhel8:8080020240422101606:0f77c1b7 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-remote-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64"
},
"product_reference": "podman-remote-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-remote-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le as a component of container-tools:rhel8:8080020240422101606:0f77c1b7 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-remote-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le"
},
"product_reference": "podman-remote-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-remote-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x as a component of container-tools:rhel8:8080020240422101606:0f77c1b7 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-remote-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x"
},
"product_reference": "podman-remote-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-remote-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64 as a component of container-tools:rhel8:8080020240422101606:0f77c1b7 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-remote-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64"
},
"product_reference": "podman-remote-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-tests-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64 as a component of container-tools:rhel8:8080020240422101606:0f77c1b7 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-tests-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64"
},
"product_reference": "podman-tests-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-tests-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le as a component of container-tools:rhel8:8080020240422101606:0f77c1b7 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-tests-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le"
},
"product_reference": "podman-tests-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-tests-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x as a component of container-tools:rhel8:8080020240422101606:0f77c1b7 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-tests-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x"
},
"product_reference": "podman-tests-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-tests-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64 as a component of container-tools:rhel8:8080020240422101606:0f77c1b7 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-tests-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64"
},
"product_reference": "podman-tests-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-podman-0:4.4.1-1.module+el8.8.0+21741+dd5be1e7.src as a component of container-tools:rhel8:8080020240422101606:0f77c1b7 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:python-podman-0:4.4.1-1.module+el8.8.0+21741+dd5be1e7.src"
},
"product_reference": "python-podman-0:4.4.1-1.module+el8.8.0+21741+dd5be1e7.src",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-criu-0:3.15-4.module+el8.8.0+21741+dd5be1e7.aarch64 as a component of container-tools:rhel8:8080020240422101606:0f77c1b7 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:python3-criu-0:3.15-4.module+el8.8.0+21741+dd5be1e7.aarch64"
},
"product_reference": "python3-criu-0:3.15-4.module+el8.8.0+21741+dd5be1e7.aarch64",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-criu-0:3.15-4.module+el8.8.0+21741+dd5be1e7.ppc64le as a component of container-tools:rhel8:8080020240422101606:0f77c1b7 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:python3-criu-0:3.15-4.module+el8.8.0+21741+dd5be1e7.ppc64le"
},
"product_reference": "python3-criu-0:3.15-4.module+el8.8.0+21741+dd5be1e7.ppc64le",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-criu-0:3.15-4.module+el8.8.0+21741+dd5be1e7.s390x as a component of container-tools:rhel8:8080020240422101606:0f77c1b7 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:python3-criu-0:3.15-4.module+el8.8.0+21741+dd5be1e7.s390x"
},
"product_reference": "python3-criu-0:3.15-4.module+el8.8.0+21741+dd5be1e7.s390x",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-criu-0:3.15-4.module+el8.8.0+21741+dd5be1e7.x86_64 as a component of container-tools:rhel8:8080020240422101606:0f77c1b7 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:python3-criu-0:3.15-4.module+el8.8.0+21741+dd5be1e7.x86_64"
},
"product_reference": "python3-criu-0:3.15-4.module+el8.8.0+21741+dd5be1e7.x86_64",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-podman-0:4.4.1-1.module+el8.8.0+21741+dd5be1e7.noarch as a component of container-tools:rhel8:8080020240422101606:0f77c1b7 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:python3-podman-0:4.4.1-1.module+el8.8.0+21741+dd5be1e7.noarch"
},
"product_reference": "python3-podman-0:4.4.1-1.module+el8.8.0+21741+dd5be1e7.noarch",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "runc-1:1.1.12-1.module+el8.8.0+21741+dd5be1e7.aarch64 as a component of container-tools:rhel8:8080020240422101606:0f77c1b7 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:runc-1:1.1.12-1.module+el8.8.0+21741+dd5be1e7.aarch64"
},
"product_reference": "runc-1:1.1.12-1.module+el8.8.0+21741+dd5be1e7.aarch64",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "runc-1:1.1.12-1.module+el8.8.0+21741+dd5be1e7.ppc64le as a component of container-tools:rhel8:8080020240422101606:0f77c1b7 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:runc-1:1.1.12-1.module+el8.8.0+21741+dd5be1e7.ppc64le"
},
"product_reference": "runc-1:1.1.12-1.module+el8.8.0+21741+dd5be1e7.ppc64le",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "runc-1:1.1.12-1.module+el8.8.0+21741+dd5be1e7.s390x as a component of container-tools:rhel8:8080020240422101606:0f77c1b7 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:runc-1:1.1.12-1.module+el8.8.0+21741+dd5be1e7.s390x"
},
"product_reference": "runc-1:1.1.12-1.module+el8.8.0+21741+dd5be1e7.s390x",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "runc-1:1.1.12-1.module+el8.8.0+21741+dd5be1e7.src as a component of container-tools:rhel8:8080020240422101606:0f77c1b7 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:runc-1:1.1.12-1.module+el8.8.0+21741+dd5be1e7.src"
},
"product_reference": "runc-1:1.1.12-1.module+el8.8.0+21741+dd5be1e7.src",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "runc-1:1.1.12-1.module+el8.8.0+21741+dd5be1e7.x86_64 as a component of container-tools:rhel8:8080020240422101606:0f77c1b7 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:runc-1:1.1.12-1.module+el8.8.0+21741+dd5be1e7.x86_64"
},
"product_reference": "runc-1:1.1.12-1.module+el8.8.0+21741+dd5be1e7.x86_64",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "runc-debuginfo-1:1.1.12-1.module+el8.8.0+21741+dd5be1e7.aarch64 as a component of container-tools:rhel8:8080020240422101606:0f77c1b7 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:runc-debuginfo-1:1.1.12-1.module+el8.8.0+21741+dd5be1e7.aarch64"
},
"product_reference": "runc-debuginfo-1:1.1.12-1.module+el8.8.0+21741+dd5be1e7.aarch64",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "runc-debuginfo-1:1.1.12-1.module+el8.8.0+21741+dd5be1e7.ppc64le as a component of container-tools:rhel8:8080020240422101606:0f77c1b7 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:runc-debuginfo-1:1.1.12-1.module+el8.8.0+21741+dd5be1e7.ppc64le"
},
"product_reference": "runc-debuginfo-1:1.1.12-1.module+el8.8.0+21741+dd5be1e7.ppc64le",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "runc-debuginfo-1:1.1.12-1.module+el8.8.0+21741+dd5be1e7.s390x as a component of container-tools:rhel8:8080020240422101606:0f77c1b7 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:runc-debuginfo-1:1.1.12-1.module+el8.8.0+21741+dd5be1e7.s390x"
},
"product_reference": "runc-debuginfo-1:1.1.12-1.module+el8.8.0+21741+dd5be1e7.s390x",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "runc-debuginfo-1:1.1.12-1.module+el8.8.0+21741+dd5be1e7.x86_64 as a component of container-tools:rhel8:8080020240422101606:0f77c1b7 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:runc-debuginfo-1:1.1.12-1.module+el8.8.0+21741+dd5be1e7.x86_64"
},
"product_reference": "runc-debuginfo-1:1.1.12-1.module+el8.8.0+21741+dd5be1e7.x86_64",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "runc-debugsource-1:1.1.12-1.module+el8.8.0+21741+dd5be1e7.aarch64 as a component of container-tools:rhel8:8080020240422101606:0f77c1b7 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:runc-debugsource-1:1.1.12-1.module+el8.8.0+21741+dd5be1e7.aarch64"
},
"product_reference": "runc-debugsource-1:1.1.12-1.module+el8.8.0+21741+dd5be1e7.aarch64",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "runc-debugsource-1:1.1.12-1.module+el8.8.0+21741+dd5be1e7.ppc64le as a component of container-tools:rhel8:8080020240422101606:0f77c1b7 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:runc-debugsource-1:1.1.12-1.module+el8.8.0+21741+dd5be1e7.ppc64le"
},
"product_reference": "runc-debugsource-1:1.1.12-1.module+el8.8.0+21741+dd5be1e7.ppc64le",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "runc-debugsource-1:1.1.12-1.module+el8.8.0+21741+dd5be1e7.s390x as a component of container-tools:rhel8:8080020240422101606:0f77c1b7 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:runc-debugsource-1:1.1.12-1.module+el8.8.0+21741+dd5be1e7.s390x"
},
"product_reference": "runc-debugsource-1:1.1.12-1.module+el8.8.0+21741+dd5be1e7.s390x",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "runc-debugsource-1:1.1.12-1.module+el8.8.0+21741+dd5be1e7.x86_64 as a component of container-tools:rhel8:8080020240422101606:0f77c1b7 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:runc-debugsource-1:1.1.12-1.module+el8.8.0+21741+dd5be1e7.x86_64"
},
"product_reference": "runc-debugsource-1:1.1.12-1.module+el8.8.0+21741+dd5be1e7.x86_64",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "skopeo-2:1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.aarch64 as a component of container-tools:rhel8:8080020240422101606:0f77c1b7 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:skopeo-2:1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.aarch64"
},
"product_reference": "skopeo-2:1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.aarch64",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "skopeo-2:1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.ppc64le as a component of container-tools:rhel8:8080020240422101606:0f77c1b7 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:skopeo-2:1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.ppc64le"
},
"product_reference": "skopeo-2:1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.ppc64le",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "skopeo-2:1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.s390x as a component of container-tools:rhel8:8080020240422101606:0f77c1b7 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:skopeo-2:1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.s390x"
},
"product_reference": "skopeo-2:1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.s390x",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "skopeo-2:1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.src as a component of container-tools:rhel8:8080020240422101606:0f77c1b7 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:skopeo-2:1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.src"
},
"product_reference": "skopeo-2:1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.src",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "skopeo-2:1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.x86_64 as a component of container-tools:rhel8:8080020240422101606:0f77c1b7 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:skopeo-2:1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.x86_64"
},
"product_reference": "skopeo-2:1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.x86_64",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "skopeo-tests-2:1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.aarch64 as a component of container-tools:rhel8:8080020240422101606:0f77c1b7 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:skopeo-tests-2:1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.aarch64"
},
"product_reference": "skopeo-tests-2:1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.aarch64",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "skopeo-tests-2:1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.ppc64le as a component of container-tools:rhel8:8080020240422101606:0f77c1b7 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:skopeo-tests-2:1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.ppc64le"
},
"product_reference": "skopeo-tests-2:1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.ppc64le",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "skopeo-tests-2:1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.s390x as a component of container-tools:rhel8:8080020240422101606:0f77c1b7 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:skopeo-tests-2:1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.s390x"
},
"product_reference": "skopeo-tests-2:1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.s390x",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "skopeo-tests-2:1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.x86_64 as a component of container-tools:rhel8:8080020240422101606:0f77c1b7 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:skopeo-tests-2:1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.x86_64"
},
"product_reference": "skopeo-tests-2:1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.x86_64",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "slirp4netns-0:1.2.0-3.module+el8.8.0+21741+dd5be1e7.aarch64 as a component of container-tools:rhel8:8080020240422101606:0f77c1b7 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:slirp4netns-0:1.2.0-3.module+el8.8.0+21741+dd5be1e7.aarch64"
},
"product_reference": "slirp4netns-0:1.2.0-3.module+el8.8.0+21741+dd5be1e7.aarch64",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "slirp4netns-0:1.2.0-3.module+el8.8.0+21741+dd5be1e7.ppc64le as a component of container-tools:rhel8:8080020240422101606:0f77c1b7 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:slirp4netns-0:1.2.0-3.module+el8.8.0+21741+dd5be1e7.ppc64le"
},
"product_reference": "slirp4netns-0:1.2.0-3.module+el8.8.0+21741+dd5be1e7.ppc64le",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "slirp4netns-0:1.2.0-3.module+el8.8.0+21741+dd5be1e7.s390x as a component of container-tools:rhel8:8080020240422101606:0f77c1b7 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:slirp4netns-0:1.2.0-3.module+el8.8.0+21741+dd5be1e7.s390x"
},
"product_reference": "slirp4netns-0:1.2.0-3.module+el8.8.0+21741+dd5be1e7.s390x",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "slirp4netns-0:1.2.0-3.module+el8.8.0+21741+dd5be1e7.src as a component of container-tools:rhel8:8080020240422101606:0f77c1b7 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:slirp4netns-0:1.2.0-3.module+el8.8.0+21741+dd5be1e7.src"
},
"product_reference": "slirp4netns-0:1.2.0-3.module+el8.8.0+21741+dd5be1e7.src",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "slirp4netns-0:1.2.0-3.module+el8.8.0+21741+dd5be1e7.x86_64 as a component of container-tools:rhel8:8080020240422101606:0f77c1b7 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:slirp4netns-0:1.2.0-3.module+el8.8.0+21741+dd5be1e7.x86_64"
},
"product_reference": "slirp4netns-0:1.2.0-3.module+el8.8.0+21741+dd5be1e7.x86_64",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "slirp4netns-debuginfo-0:1.2.0-3.module+el8.8.0+21741+dd5be1e7.aarch64 as a component of container-tools:rhel8:8080020240422101606:0f77c1b7 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:slirp4netns-debuginfo-0:1.2.0-3.module+el8.8.0+21741+dd5be1e7.aarch64"
},
"product_reference": "slirp4netns-debuginfo-0:1.2.0-3.module+el8.8.0+21741+dd5be1e7.aarch64",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "slirp4netns-debuginfo-0:1.2.0-3.module+el8.8.0+21741+dd5be1e7.ppc64le as a component of container-tools:rhel8:8080020240422101606:0f77c1b7 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:slirp4netns-debuginfo-0:1.2.0-3.module+el8.8.0+21741+dd5be1e7.ppc64le"
},
"product_reference": "slirp4netns-debuginfo-0:1.2.0-3.module+el8.8.0+21741+dd5be1e7.ppc64le",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "slirp4netns-debuginfo-0:1.2.0-3.module+el8.8.0+21741+dd5be1e7.s390x as a component of container-tools:rhel8:8080020240422101606:0f77c1b7 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:slirp4netns-debuginfo-0:1.2.0-3.module+el8.8.0+21741+dd5be1e7.s390x"
},
"product_reference": "slirp4netns-debuginfo-0:1.2.0-3.module+el8.8.0+21741+dd5be1e7.s390x",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "slirp4netns-debuginfo-0:1.2.0-3.module+el8.8.0+21741+dd5be1e7.x86_64 as a component of container-tools:rhel8:8080020240422101606:0f77c1b7 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:slirp4netns-debuginfo-0:1.2.0-3.module+el8.8.0+21741+dd5be1e7.x86_64"
},
"product_reference": "slirp4netns-debuginfo-0:1.2.0-3.module+el8.8.0+21741+dd5be1e7.x86_64",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "slirp4netns-debugsource-0:1.2.0-3.module+el8.8.0+21741+dd5be1e7.aarch64 as a component of container-tools:rhel8:8080020240422101606:0f77c1b7 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:slirp4netns-debugsource-0:1.2.0-3.module+el8.8.0+21741+dd5be1e7.aarch64"
},
"product_reference": "slirp4netns-debugsource-0:1.2.0-3.module+el8.8.0+21741+dd5be1e7.aarch64",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "slirp4netns-debugsource-0:1.2.0-3.module+el8.8.0+21741+dd5be1e7.ppc64le as a component of container-tools:rhel8:8080020240422101606:0f77c1b7 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:slirp4netns-debugsource-0:1.2.0-3.module+el8.8.0+21741+dd5be1e7.ppc64le"
},
"product_reference": "slirp4netns-debugsource-0:1.2.0-3.module+el8.8.0+21741+dd5be1e7.ppc64le",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "slirp4netns-debugsource-0:1.2.0-3.module+el8.8.0+21741+dd5be1e7.s390x as a component of container-tools:rhel8:8080020240422101606:0f77c1b7 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:slirp4netns-debugsource-0:1.2.0-3.module+el8.8.0+21741+dd5be1e7.s390x"
},
"product_reference": "slirp4netns-debugsource-0:1.2.0-3.module+el8.8.0+21741+dd5be1e7.s390x",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "slirp4netns-debugsource-0:1.2.0-3.module+el8.8.0+21741+dd5be1e7.x86_64 as a component of container-tools:rhel8:8080020240422101606:0f77c1b7 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:slirp4netns-debugsource-0:1.2.0-3.module+el8.8.0+21741+dd5be1e7.x86_64"
},
"product_reference": "slirp4netns-debugsource-0:1.2.0-3.module+el8.8.0+21741+dd5be1e7.x86_64",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "toolbox-0:0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.aarch64 as a component of container-tools:rhel8:8080020240422101606:0f77c1b7 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:toolbox-0:0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.aarch64"
},
"product_reference": "toolbox-0:0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.aarch64",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "toolbox-0:0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.ppc64le as a component of container-tools:rhel8:8080020240422101606:0f77c1b7 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:toolbox-0:0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.ppc64le"
},
"product_reference": "toolbox-0:0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.ppc64le",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "toolbox-0:0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.s390x as a component of container-tools:rhel8:8080020240422101606:0f77c1b7 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:toolbox-0:0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.s390x"
},
"product_reference": "toolbox-0:0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.s390x",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "toolbox-0:0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.src as a component of container-tools:rhel8:8080020240422101606:0f77c1b7 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:toolbox-0:0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.src"
},
"product_reference": "toolbox-0:0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.src",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "toolbox-0:0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.x86_64 as a component of container-tools:rhel8:8080020240422101606:0f77c1b7 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:toolbox-0:0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.x86_64"
},
"product_reference": "toolbox-0:0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.x86_64",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "toolbox-debuginfo-0:0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.aarch64 as a component of container-tools:rhel8:8080020240422101606:0f77c1b7 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:toolbox-debuginfo-0:0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.aarch64"
},
"product_reference": "toolbox-debuginfo-0:0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.aarch64",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "toolbox-debuginfo-0:0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.ppc64le as a component of container-tools:rhel8:8080020240422101606:0f77c1b7 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:toolbox-debuginfo-0:0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.ppc64le"
},
"product_reference": "toolbox-debuginfo-0:0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.ppc64le",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "toolbox-debuginfo-0:0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.s390x as a component of container-tools:rhel8:8080020240422101606:0f77c1b7 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:toolbox-debuginfo-0:0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.s390x"
},
"product_reference": "toolbox-debuginfo-0:0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.s390x",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "toolbox-debuginfo-0:0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.x86_64 as a component of container-tools:rhel8:8080020240422101606:0f77c1b7 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:toolbox-debuginfo-0:0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.x86_64"
},
"product_reference": "toolbox-debuginfo-0:0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.x86_64",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "toolbox-debugsource-0:0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.aarch64 as a component of container-tools:rhel8:8080020240422101606:0f77c1b7 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:toolbox-debugsource-0:0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.aarch64"
},
"product_reference": "toolbox-debugsource-0:0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.aarch64",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "toolbox-debugsource-0:0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.ppc64le as a component of container-tools:rhel8:8080020240422101606:0f77c1b7 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:toolbox-debugsource-0:0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.ppc64le"
},
"product_reference": "toolbox-debugsource-0:0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.ppc64le",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "toolbox-debugsource-0:0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.s390x as a component of container-tools:rhel8:8080020240422101606:0f77c1b7 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:toolbox-debugsource-0:0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.s390x"
},
"product_reference": "toolbox-debugsource-0:0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.s390x",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "toolbox-debugsource-0:0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.x86_64 as a component of container-tools:rhel8:8080020240422101606:0f77c1b7 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:toolbox-debugsource-0:0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.x86_64"
},
"product_reference": "toolbox-debugsource-0:0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.x86_64",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "toolbox-tests-0:0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.aarch64 as a component of container-tools:rhel8:8080020240422101606:0f77c1b7 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:toolbox-tests-0:0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.aarch64"
},
"product_reference": "toolbox-tests-0:0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.aarch64",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "toolbox-tests-0:0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.ppc64le as a component of container-tools:rhel8:8080020240422101606:0f77c1b7 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:toolbox-tests-0:0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.ppc64le"
},
"product_reference": "toolbox-tests-0:0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.ppc64le",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "toolbox-tests-0:0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.s390x as a component of container-tools:rhel8:8080020240422101606:0f77c1b7 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:toolbox-tests-0:0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.s390x"
},
"product_reference": "toolbox-tests-0:0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.s390x",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "toolbox-tests-0:0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.x86_64 as a component of container-tools:rhel8:8080020240422101606:0f77c1b7 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:toolbox-tests-0:0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.x86_64"
},
"product_reference": "toolbox-tests-0:0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.x86_64",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "udica-0:0.2.6-20.module+el8.8.0+21741+dd5be1e7.noarch as a component of container-tools:rhel8:8080020240422101606:0f77c1b7 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:udica-0:0.2.6-20.module+el8.8.0+21741+dd5be1e7.noarch"
},
"product_reference": "udica-0:0.2.6-20.module+el8.8.0+21741+dd5be1e7.noarch",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "udica-0:0.2.6-20.module+el8.8.0+21741+dd5be1e7.src as a component of container-tools:rhel8:8080020240422101606:0f77c1b7 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:udica-0:0.2.6-20.module+el8.8.0+21741+dd5be1e7.src"
},
"product_reference": "udica-0:0.2.6-20.module+el8.8.0+21741+dd5be1e7.src",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2022-4122",
"cwe": {
"id": "CWE-59",
"name": "Improper Link Resolution Before File Access (\u0027Link Following\u0027)"
},
"discovery_date": "2022-11-22T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2144983"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in buildah and podman. Incorrect following of symlinks while reading .containerignore and .dockerignore results in information disclosure.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "podman: Symlink error leads to information disclosure",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "These bugs come about when \"podman --remote build ...\" is run, thus affecting buildah, but the bug itself needs to be fixed in podman, and ported to Buildah.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:aardvark-dns-2:1.5.0-2.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:aardvark-dns-2:1.5.0-2.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:aardvark-dns-2:1.5.0-2.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:aardvark-dns-2:1.5.0-2.module+el8.8.0+21741+dd5be1e7.src",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:aardvark-dns-2:1.5.0-2.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:buildah-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:buildah-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:buildah-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:buildah-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.src",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:buildah-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:buildah-debuginfo-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:buildah-debuginfo-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:buildah-debuginfo-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:buildah-debuginfo-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:buildah-debugsource-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:buildah-debugsource-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:buildah-debugsource-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:buildah-debugsource-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:buildah-tests-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:buildah-tests-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:buildah-tests-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:buildah-tests-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:buildah-tests-debuginfo-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:buildah-tests-debuginfo-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:buildah-tests-debuginfo-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:buildah-tests-debuginfo-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:cockpit-podman-0:63.1-1.module+el8.8.0+21741+dd5be1e7.noarch",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:cockpit-podman-0:63.1-1.module+el8.8.0+21741+dd5be1e7.src",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:conmon-3:2.1.6-1.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:conmon-3:2.1.6-1.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:conmon-3:2.1.6-1.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:conmon-3:2.1.6-1.module+el8.8.0+21741+dd5be1e7.src",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:conmon-3:2.1.6-1.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:conmon-debuginfo-3:2.1.6-1.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:conmon-debuginfo-3:2.1.6-1.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:conmon-debuginfo-3:2.1.6-1.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:conmon-debuginfo-3:2.1.6-1.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:conmon-debugsource-3:2.1.6-1.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:conmon-debugsource-3:2.1.6-1.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:conmon-debugsource-3:2.1.6-1.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:conmon-debugsource-3:2.1.6-1.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:container-selinux-2:2.229.0-1.module+el8.8.0+21741+dd5be1e7.noarch",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:container-selinux-2:2.229.0-1.module+el8.8.0+21741+dd5be1e7.src",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:containernetworking-plugins-1:1.2.0-1.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:containernetworking-plugins-1:1.2.0-1.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:containernetworking-plugins-1:1.2.0-1.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:containernetworking-plugins-1:1.2.0-1.module+el8.8.0+21741+dd5be1e7.src",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:containernetworking-plugins-1:1.2.0-1.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:containernetworking-plugins-debuginfo-1:1.2.0-1.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:containernetworking-plugins-debuginfo-1:1.2.0-1.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:containernetworking-plugins-debuginfo-1:1.2.0-1.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:containernetworking-plugins-debuginfo-1:1.2.0-1.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:containernetworking-plugins-debugsource-1:1.2.0-1.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:containernetworking-plugins-debugsource-1:1.2.0-1.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:containernetworking-plugins-debugsource-1:1.2.0-1.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:containernetworking-plugins-debugsource-1:1.2.0-1.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:containers-common-2:1-65.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:containers-common-2:1-65.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:containers-common-2:1-65.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:containers-common-2:1-65.module+el8.8.0+21741+dd5be1e7.src",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:containers-common-2:1-65.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:crit-0:3.15-4.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:crit-0:3.15-4.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:crit-0:3.15-4.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:crit-0:3.15-4.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:criu-0:3.15-4.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:criu-0:3.15-4.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:criu-0:3.15-4.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:criu-0:3.15-4.module+el8.8.0+21741+dd5be1e7.src",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:criu-0:3.15-4.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:criu-debuginfo-0:3.15-4.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:criu-debuginfo-0:3.15-4.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:criu-debuginfo-0:3.15-4.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:criu-debuginfo-0:3.15-4.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:criu-debugsource-0:3.15-4.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:criu-debugsource-0:3.15-4.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:criu-debugsource-0:3.15-4.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:criu-debugsource-0:3.15-4.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:criu-devel-0:3.15-4.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:criu-devel-0:3.15-4.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:criu-devel-0:3.15-4.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:criu-devel-0:3.15-4.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:criu-libs-0:3.15-4.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:criu-libs-0:3.15-4.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:criu-libs-0:3.15-4.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:criu-libs-0:3.15-4.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:criu-libs-debuginfo-0:3.15-4.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:criu-libs-debuginfo-0:3.15-4.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:criu-libs-debuginfo-0:3.15-4.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:criu-libs-debuginfo-0:3.15-4.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:crun-0:1.8.4-2.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:crun-0:1.8.4-2.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:crun-0:1.8.4-2.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:crun-0:1.8.4-2.module+el8.8.0+21741+dd5be1e7.src",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:crun-0:1.8.4-2.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:crun-debuginfo-0:1.8.4-2.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:crun-debuginfo-0:1.8.4-2.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:crun-debuginfo-0:1.8.4-2.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:crun-debuginfo-0:1.8.4-2.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:crun-debugsource-0:1.8.4-2.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:crun-debugsource-0:1.8.4-2.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:crun-debugsource-0:1.8.4-2.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:crun-debugsource-0:1.8.4-2.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:fuse-overlayfs-0:1.11-1.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:fuse-overlayfs-0:1.11-1.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:fuse-overlayfs-0:1.11-1.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:fuse-overlayfs-0:1.11-1.module+el8.8.0+21741+dd5be1e7.src",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:fuse-overlayfs-0:1.11-1.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:fuse-overlayfs-debuginfo-0:1.11-1.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:fuse-overlayfs-debuginfo-0:1.11-1.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:fuse-overlayfs-debuginfo-0:1.11-1.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:fuse-overlayfs-debuginfo-0:1.11-1.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:fuse-overlayfs-debugsource-0:1.11-1.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:fuse-overlayfs-debugsource-0:1.11-1.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:fuse-overlayfs-debugsource-0:1.11-1.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:fuse-overlayfs-debugsource-0:1.11-1.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:libslirp-0:4.4.0-1.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:libslirp-0:4.4.0-1.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:libslirp-0:4.4.0-1.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:libslirp-0:4.4.0-1.module+el8.8.0+21741+dd5be1e7.src",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:libslirp-0:4.4.0-1.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:libslirp-debuginfo-0:4.4.0-1.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:libslirp-debuginfo-0:4.4.0-1.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:libslirp-debuginfo-0:4.4.0-1.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:libslirp-debuginfo-0:4.4.0-1.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:libslirp-debugsource-0:4.4.0-1.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:libslirp-debugsource-0:4.4.0-1.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:libslirp-debugsource-0:4.4.0-1.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:libslirp-debugsource-0:4.4.0-1.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:libslirp-devel-0:4.4.0-1.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:libslirp-devel-0:4.4.0-1.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:libslirp-devel-0:4.4.0-1.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:libslirp-devel-0:4.4.0-1.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:netavark-2:1.5.1-3.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:netavark-2:1.5.1-3.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:netavark-2:1.5.1-3.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:netavark-2:1.5.1-3.module+el8.8.0+21741+dd5be1e7.src",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:netavark-2:1.5.1-3.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:oci-seccomp-bpf-hook-0:1.2.8-1.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:oci-seccomp-bpf-hook-0:1.2.8-1.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:oci-seccomp-bpf-hook-0:1.2.8-1.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:oci-seccomp-bpf-hook-0:1.2.8-1.module+el8.8.0+21741+dd5be1e7.src",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:oci-seccomp-bpf-hook-0:1.2.8-1.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:oci-seccomp-bpf-hook-debuginfo-0:1.2.8-1.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:oci-seccomp-bpf-hook-debuginfo-0:1.2.8-1.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:oci-seccomp-bpf-hook-debuginfo-0:1.2.8-1.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:oci-seccomp-bpf-hook-debuginfo-0:1.2.8-1.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:oci-seccomp-bpf-hook-debugsource-0:1.2.8-1.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:oci-seccomp-bpf-hook-debugsource-0:1.2.8-1.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:oci-seccomp-bpf-hook-debugsource-0:1.2.8-1.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:oci-seccomp-bpf-hook-debugsource-0:1.2.8-1.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.src",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-catatonit-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-catatonit-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-catatonit-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-catatonit-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-catatonit-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-catatonit-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-catatonit-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-catatonit-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-debugsource-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-debugsource-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-debugsource-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-debugsource-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-docker-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.noarch",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-gvproxy-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-gvproxy-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-gvproxy-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-gvproxy-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-gvproxy-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-gvproxy-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-gvproxy-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-gvproxy-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-plugins-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-plugins-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-plugins-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-plugins-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-plugins-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-plugins-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-plugins-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-plugins-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-remote-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-remote-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-remote-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-remote-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-remote-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-remote-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-remote-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-remote-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-tests-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-tests-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-tests-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-tests-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:python-podman-0:4.4.1-1.module+el8.8.0+21741+dd5be1e7.src",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:python3-criu-0:3.15-4.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:python3-criu-0:3.15-4.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:python3-criu-0:3.15-4.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:python3-criu-0:3.15-4.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:python3-podman-0:4.4.1-1.module+el8.8.0+21741+dd5be1e7.noarch",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:runc-1:1.1.12-1.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:runc-1:1.1.12-1.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:runc-1:1.1.12-1.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:runc-1:1.1.12-1.module+el8.8.0+21741+dd5be1e7.src",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:runc-1:1.1.12-1.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:runc-debuginfo-1:1.1.12-1.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:runc-debuginfo-1:1.1.12-1.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:runc-debuginfo-1:1.1.12-1.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:runc-debuginfo-1:1.1.12-1.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:runc-debugsource-1:1.1.12-1.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:runc-debugsource-1:1.1.12-1.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:runc-debugsource-1:1.1.12-1.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:runc-debugsource-1:1.1.12-1.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:skopeo-2:1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:skopeo-2:1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:skopeo-2:1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:skopeo-2:1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.src",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:skopeo-2:1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:skopeo-tests-2:1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:skopeo-tests-2:1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:skopeo-tests-2:1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:skopeo-tests-2:1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:slirp4netns-0:1.2.0-3.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:slirp4netns-0:1.2.0-3.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:slirp4netns-0:1.2.0-3.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:slirp4netns-0:1.2.0-3.module+el8.8.0+21741+dd5be1e7.src",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:slirp4netns-0:1.2.0-3.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:slirp4netns-debuginfo-0:1.2.0-3.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:slirp4netns-debuginfo-0:1.2.0-3.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:slirp4netns-debuginfo-0:1.2.0-3.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:slirp4netns-debuginfo-0:1.2.0-3.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:slirp4netns-debugsource-0:1.2.0-3.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:slirp4netns-debugsource-0:1.2.0-3.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:slirp4netns-debugsource-0:1.2.0-3.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:slirp4netns-debugsource-0:1.2.0-3.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:toolbox-0:0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:toolbox-0:0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:toolbox-0:0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:toolbox-0:0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.src",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:toolbox-0:0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:toolbox-debuginfo-0:0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:toolbox-debuginfo-0:0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:toolbox-debuginfo-0:0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:toolbox-debuginfo-0:0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:toolbox-debugsource-0:0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:toolbox-debugsource-0:0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:toolbox-debugsource-0:0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:toolbox-debugsource-0:0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:toolbox-tests-0:0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:toolbox-tests-0:0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:toolbox-tests-0:0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:toolbox-tests-0:0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:udica-0:0.2.6-20.module+el8.8.0+21741+dd5be1e7.noarch",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:udica-0:0.2.6-20.module+el8.8.0+21741+dd5be1e7.src"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-4122"
},
{
"category": "external",
"summary": "RHBZ#2144983",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2144983"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-4122",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4122"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-4122",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-4122"
},
{
"category": "external",
"summary": "https://github.com/containers/podman/pull/16315",
"url": "https://github.com/containers/podman/pull/16315"
}
],
"release_date": "2022-11-22T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-04-29T12:00:29+00:00",
"details": "For details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:aardvark-dns-2:1.5.0-2.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:aardvark-dns-2:1.5.0-2.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:aardvark-dns-2:1.5.0-2.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:aardvark-dns-2:1.5.0-2.module+el8.8.0+21741+dd5be1e7.src",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:aardvark-dns-2:1.5.0-2.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:buildah-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:buildah-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:buildah-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:buildah-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.src",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:buildah-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:buildah-debuginfo-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:buildah-debuginfo-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:buildah-debuginfo-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:buildah-debuginfo-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:buildah-debugsource-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:buildah-debugsource-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:buildah-debugsource-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:buildah-debugsource-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:buildah-tests-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:buildah-tests-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:buildah-tests-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:buildah-tests-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:buildah-tests-debuginfo-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:buildah-tests-debuginfo-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:buildah-tests-debuginfo-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:buildah-tests-debuginfo-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:cockpit-podman-0:63.1-1.module+el8.8.0+21741+dd5be1e7.noarch",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:cockpit-podman-0:63.1-1.module+el8.8.0+21741+dd5be1e7.src",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:conmon-3:2.1.6-1.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:conmon-3:2.1.6-1.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:conmon-3:2.1.6-1.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:conmon-3:2.1.6-1.module+el8.8.0+21741+dd5be1e7.src",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:conmon-3:2.1.6-1.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:conmon-debuginfo-3:2.1.6-1.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:conmon-debuginfo-3:2.1.6-1.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:conmon-debuginfo-3:2.1.6-1.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:conmon-debuginfo-3:2.1.6-1.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:conmon-debugsource-3:2.1.6-1.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:conmon-debugsource-3:2.1.6-1.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:conmon-debugsource-3:2.1.6-1.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:conmon-debugsource-3:2.1.6-1.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:container-selinux-2:2.229.0-1.module+el8.8.0+21741+dd5be1e7.noarch",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:container-selinux-2:2.229.0-1.module+el8.8.0+21741+dd5be1e7.src",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:containernetworking-plugins-1:1.2.0-1.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:containernetworking-plugins-1:1.2.0-1.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:containernetworking-plugins-1:1.2.0-1.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:containernetworking-plugins-1:1.2.0-1.module+el8.8.0+21741+dd5be1e7.src",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:containernetworking-plugins-1:1.2.0-1.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:containernetworking-plugins-debuginfo-1:1.2.0-1.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:containernetworking-plugins-debuginfo-1:1.2.0-1.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:containernetworking-plugins-debuginfo-1:1.2.0-1.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:containernetworking-plugins-debuginfo-1:1.2.0-1.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:containernetworking-plugins-debugsource-1:1.2.0-1.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:containernetworking-plugins-debugsource-1:1.2.0-1.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:containernetworking-plugins-debugsource-1:1.2.0-1.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:containernetworking-plugins-debugsource-1:1.2.0-1.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:containers-common-2:1-65.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:containers-common-2:1-65.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:containers-common-2:1-65.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:containers-common-2:1-65.module+el8.8.0+21741+dd5be1e7.src",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:containers-common-2:1-65.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:crit-0:3.15-4.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:crit-0:3.15-4.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:crit-0:3.15-4.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:crit-0:3.15-4.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:criu-0:3.15-4.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:criu-0:3.15-4.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:criu-0:3.15-4.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:criu-0:3.15-4.module+el8.8.0+21741+dd5be1e7.src",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:criu-0:3.15-4.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:criu-debuginfo-0:3.15-4.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:criu-debuginfo-0:3.15-4.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:criu-debuginfo-0:3.15-4.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:criu-debuginfo-0:3.15-4.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:criu-debugsource-0:3.15-4.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:criu-debugsource-0:3.15-4.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:criu-debugsource-0:3.15-4.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:criu-debugsource-0:3.15-4.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:criu-devel-0:3.15-4.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:criu-devel-0:3.15-4.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:criu-devel-0:3.15-4.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:criu-devel-0:3.15-4.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:criu-libs-0:3.15-4.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:criu-libs-0:3.15-4.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:criu-libs-0:3.15-4.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:criu-libs-0:3.15-4.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:criu-libs-debuginfo-0:3.15-4.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:criu-libs-debuginfo-0:3.15-4.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:criu-libs-debuginfo-0:3.15-4.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:criu-libs-debuginfo-0:3.15-4.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:crun-0:1.8.4-2.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:crun-0:1.8.4-2.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:crun-0:1.8.4-2.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:crun-0:1.8.4-2.module+el8.8.0+21741+dd5be1e7.src",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:crun-0:1.8.4-2.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:crun-debuginfo-0:1.8.4-2.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:crun-debuginfo-0:1.8.4-2.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:crun-debuginfo-0:1.8.4-2.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:crun-debuginfo-0:1.8.4-2.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:crun-debugsource-0:1.8.4-2.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:crun-debugsource-0:1.8.4-2.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:crun-debugsource-0:1.8.4-2.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:crun-debugsource-0:1.8.4-2.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:fuse-overlayfs-0:1.11-1.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:fuse-overlayfs-0:1.11-1.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:fuse-overlayfs-0:1.11-1.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:fuse-overlayfs-0:1.11-1.module+el8.8.0+21741+dd5be1e7.src",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:fuse-overlayfs-0:1.11-1.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:fuse-overlayfs-debuginfo-0:1.11-1.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:fuse-overlayfs-debuginfo-0:1.11-1.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:fuse-overlayfs-debuginfo-0:1.11-1.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:fuse-overlayfs-debuginfo-0:1.11-1.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:fuse-overlayfs-debugsource-0:1.11-1.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:fuse-overlayfs-debugsource-0:1.11-1.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:fuse-overlayfs-debugsource-0:1.11-1.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:fuse-overlayfs-debugsource-0:1.11-1.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:libslirp-0:4.4.0-1.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:libslirp-0:4.4.0-1.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:libslirp-0:4.4.0-1.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:libslirp-0:4.4.0-1.module+el8.8.0+21741+dd5be1e7.src",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:libslirp-0:4.4.0-1.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:libslirp-debuginfo-0:4.4.0-1.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:libslirp-debuginfo-0:4.4.0-1.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:libslirp-debuginfo-0:4.4.0-1.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:libslirp-debuginfo-0:4.4.0-1.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:libslirp-debugsource-0:4.4.0-1.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:libslirp-debugsource-0:4.4.0-1.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:libslirp-debugsource-0:4.4.0-1.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:libslirp-debugsource-0:4.4.0-1.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:libslirp-devel-0:4.4.0-1.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:libslirp-devel-0:4.4.0-1.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:libslirp-devel-0:4.4.0-1.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:libslirp-devel-0:4.4.0-1.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:netavark-2:1.5.1-3.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:netavark-2:1.5.1-3.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:netavark-2:1.5.1-3.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:netavark-2:1.5.1-3.module+el8.8.0+21741+dd5be1e7.src",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:netavark-2:1.5.1-3.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:oci-seccomp-bpf-hook-0:1.2.8-1.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:oci-seccomp-bpf-hook-0:1.2.8-1.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:oci-seccomp-bpf-hook-0:1.2.8-1.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:oci-seccomp-bpf-hook-0:1.2.8-1.module+el8.8.0+21741+dd5be1e7.src",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:oci-seccomp-bpf-hook-0:1.2.8-1.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:oci-seccomp-bpf-hook-debuginfo-0:1.2.8-1.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:oci-seccomp-bpf-hook-debuginfo-0:1.2.8-1.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:oci-seccomp-bpf-hook-debuginfo-0:1.2.8-1.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:oci-seccomp-bpf-hook-debuginfo-0:1.2.8-1.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:oci-seccomp-bpf-hook-debugsource-0:1.2.8-1.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:oci-seccomp-bpf-hook-debugsource-0:1.2.8-1.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:oci-seccomp-bpf-hook-debugsource-0:1.2.8-1.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:oci-seccomp-bpf-hook-debugsource-0:1.2.8-1.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.src",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-catatonit-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-catatonit-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-catatonit-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-catatonit-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-catatonit-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-catatonit-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-catatonit-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-catatonit-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-debugsource-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-debugsource-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-debugsource-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-debugsource-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-docker-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.noarch",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-gvproxy-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-gvproxy-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-gvproxy-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-gvproxy-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-gvproxy-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-gvproxy-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-gvproxy-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-gvproxy-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-plugins-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-plugins-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-plugins-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-plugins-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-plugins-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-plugins-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-plugins-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-plugins-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-remote-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-remote-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-remote-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-remote-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-remote-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-remote-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-remote-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-remote-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-tests-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-tests-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-tests-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-tests-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:python-podman-0:4.4.1-1.module+el8.8.0+21741+dd5be1e7.src",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:python3-criu-0:3.15-4.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:python3-criu-0:3.15-4.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:python3-criu-0:3.15-4.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:python3-criu-0:3.15-4.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:python3-podman-0:4.4.1-1.module+el8.8.0+21741+dd5be1e7.noarch",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:runc-1:1.1.12-1.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:runc-1:1.1.12-1.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:runc-1:1.1.12-1.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:runc-1:1.1.12-1.module+el8.8.0+21741+dd5be1e7.src",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:runc-1:1.1.12-1.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:runc-debuginfo-1:1.1.12-1.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:runc-debuginfo-1:1.1.12-1.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:runc-debuginfo-1:1.1.12-1.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:runc-debuginfo-1:1.1.12-1.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:runc-debugsource-1:1.1.12-1.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:runc-debugsource-1:1.1.12-1.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:runc-debugsource-1:1.1.12-1.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:runc-debugsource-1:1.1.12-1.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:skopeo-2:1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:skopeo-2:1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:skopeo-2:1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:skopeo-2:1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.src",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:skopeo-2:1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:skopeo-tests-2:1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:skopeo-tests-2:1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:skopeo-tests-2:1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:skopeo-tests-2:1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:slirp4netns-0:1.2.0-3.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:slirp4netns-0:1.2.0-3.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:slirp4netns-0:1.2.0-3.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:slirp4netns-0:1.2.0-3.module+el8.8.0+21741+dd5be1e7.src",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:slirp4netns-0:1.2.0-3.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:slirp4netns-debuginfo-0:1.2.0-3.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:slirp4netns-debuginfo-0:1.2.0-3.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:slirp4netns-debuginfo-0:1.2.0-3.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:slirp4netns-debuginfo-0:1.2.0-3.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:slirp4netns-debugsource-0:1.2.0-3.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:slirp4netns-debugsource-0:1.2.0-3.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:slirp4netns-debugsource-0:1.2.0-3.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:slirp4netns-debugsource-0:1.2.0-3.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:toolbox-0:0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:toolbox-0:0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:toolbox-0:0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:toolbox-0:0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.src",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:toolbox-0:0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:toolbox-debuginfo-0:0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:toolbox-debuginfo-0:0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:toolbox-debuginfo-0:0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:toolbox-debuginfo-0:0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:toolbox-debugsource-0:0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:toolbox-debugsource-0:0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:toolbox-debugsource-0:0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:toolbox-debugsource-0:0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:toolbox-tests-0:0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:toolbox-tests-0:0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:toolbox-tests-0:0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:toolbox-tests-0:0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:udica-0:0.2.6-20.module+el8.8.0+21741+dd5be1e7.noarch",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:udica-0:0.2.6-20.module+el8.8.0+21741+dd5be1e7.src"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:2077"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:aardvark-dns-2:1.5.0-2.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:aardvark-dns-2:1.5.0-2.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:aardvark-dns-2:1.5.0-2.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:aardvark-dns-2:1.5.0-2.module+el8.8.0+21741+dd5be1e7.src",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:aardvark-dns-2:1.5.0-2.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:buildah-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:buildah-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:buildah-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:buildah-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.src",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:buildah-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:buildah-debuginfo-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:buildah-debuginfo-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:buildah-debuginfo-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:buildah-debuginfo-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:buildah-debugsource-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:buildah-debugsource-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:buildah-debugsource-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:buildah-debugsource-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:buildah-tests-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:buildah-tests-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:buildah-tests-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:buildah-tests-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:buildah-tests-debuginfo-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:buildah-tests-debuginfo-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:buildah-tests-debuginfo-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:buildah-tests-debuginfo-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:cockpit-podman-0:63.1-1.module+el8.8.0+21741+dd5be1e7.noarch",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:cockpit-podman-0:63.1-1.module+el8.8.0+21741+dd5be1e7.src",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:conmon-3:2.1.6-1.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:conmon-3:2.1.6-1.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:conmon-3:2.1.6-1.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:conmon-3:2.1.6-1.module+el8.8.0+21741+dd5be1e7.src",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:conmon-3:2.1.6-1.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:conmon-debuginfo-3:2.1.6-1.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:conmon-debuginfo-3:2.1.6-1.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:conmon-debuginfo-3:2.1.6-1.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:conmon-debuginfo-3:2.1.6-1.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:conmon-debugsource-3:2.1.6-1.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:conmon-debugsource-3:2.1.6-1.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:conmon-debugsource-3:2.1.6-1.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:conmon-debugsource-3:2.1.6-1.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:container-selinux-2:2.229.0-1.module+el8.8.0+21741+dd5be1e7.noarch",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:container-selinux-2:2.229.0-1.module+el8.8.0+21741+dd5be1e7.src",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:containernetworking-plugins-1:1.2.0-1.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:containernetworking-plugins-1:1.2.0-1.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:containernetworking-plugins-1:1.2.0-1.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:containernetworking-plugins-1:1.2.0-1.module+el8.8.0+21741+dd5be1e7.src",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:containernetworking-plugins-1:1.2.0-1.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:containernetworking-plugins-debuginfo-1:1.2.0-1.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:containernetworking-plugins-debuginfo-1:1.2.0-1.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:containernetworking-plugins-debuginfo-1:1.2.0-1.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:containernetworking-plugins-debuginfo-1:1.2.0-1.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:containernetworking-plugins-debugsource-1:1.2.0-1.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:containernetworking-plugins-debugsource-1:1.2.0-1.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:containernetworking-plugins-debugsource-1:1.2.0-1.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:containernetworking-plugins-debugsource-1:1.2.0-1.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:containers-common-2:1-65.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:containers-common-2:1-65.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:containers-common-2:1-65.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:containers-common-2:1-65.module+el8.8.0+21741+dd5be1e7.src",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:containers-common-2:1-65.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:crit-0:3.15-4.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:crit-0:3.15-4.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:crit-0:3.15-4.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:crit-0:3.15-4.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:criu-0:3.15-4.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:criu-0:3.15-4.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:criu-0:3.15-4.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:criu-0:3.15-4.module+el8.8.0+21741+dd5be1e7.src",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:criu-0:3.15-4.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:criu-debuginfo-0:3.15-4.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:criu-debuginfo-0:3.15-4.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:criu-debuginfo-0:3.15-4.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:criu-debuginfo-0:3.15-4.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:criu-debugsource-0:3.15-4.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:criu-debugsource-0:3.15-4.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:criu-debugsource-0:3.15-4.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:criu-debugsource-0:3.15-4.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:criu-devel-0:3.15-4.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:criu-devel-0:3.15-4.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:criu-devel-0:3.15-4.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:criu-devel-0:3.15-4.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:criu-libs-0:3.15-4.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:criu-libs-0:3.15-4.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:criu-libs-0:3.15-4.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:criu-libs-0:3.15-4.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:criu-libs-debuginfo-0:3.15-4.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:criu-libs-debuginfo-0:3.15-4.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:criu-libs-debuginfo-0:3.15-4.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:criu-libs-debuginfo-0:3.15-4.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:crun-0:1.8.4-2.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:crun-0:1.8.4-2.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:crun-0:1.8.4-2.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:crun-0:1.8.4-2.module+el8.8.0+21741+dd5be1e7.src",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:crun-0:1.8.4-2.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:crun-debuginfo-0:1.8.4-2.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:crun-debuginfo-0:1.8.4-2.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:crun-debuginfo-0:1.8.4-2.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:crun-debuginfo-0:1.8.4-2.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:crun-debugsource-0:1.8.4-2.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:crun-debugsource-0:1.8.4-2.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:crun-debugsource-0:1.8.4-2.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:crun-debugsource-0:1.8.4-2.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:fuse-overlayfs-0:1.11-1.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:fuse-overlayfs-0:1.11-1.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:fuse-overlayfs-0:1.11-1.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:fuse-overlayfs-0:1.11-1.module+el8.8.0+21741+dd5be1e7.src",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:fuse-overlayfs-0:1.11-1.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:fuse-overlayfs-debuginfo-0:1.11-1.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:fuse-overlayfs-debuginfo-0:1.11-1.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:fuse-overlayfs-debuginfo-0:1.11-1.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:fuse-overlayfs-debuginfo-0:1.11-1.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:fuse-overlayfs-debugsource-0:1.11-1.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:fuse-overlayfs-debugsource-0:1.11-1.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:fuse-overlayfs-debugsource-0:1.11-1.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:fuse-overlayfs-debugsource-0:1.11-1.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:libslirp-0:4.4.0-1.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:libslirp-0:4.4.0-1.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:libslirp-0:4.4.0-1.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:libslirp-0:4.4.0-1.module+el8.8.0+21741+dd5be1e7.src",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:libslirp-0:4.4.0-1.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:libslirp-debuginfo-0:4.4.0-1.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:libslirp-debuginfo-0:4.4.0-1.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:libslirp-debuginfo-0:4.4.0-1.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:libslirp-debuginfo-0:4.4.0-1.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:libslirp-debugsource-0:4.4.0-1.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:libslirp-debugsource-0:4.4.0-1.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:libslirp-debugsource-0:4.4.0-1.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:libslirp-debugsource-0:4.4.0-1.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:libslirp-devel-0:4.4.0-1.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:libslirp-devel-0:4.4.0-1.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:libslirp-devel-0:4.4.0-1.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:libslirp-devel-0:4.4.0-1.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:netavark-2:1.5.1-3.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:netavark-2:1.5.1-3.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:netavark-2:1.5.1-3.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:netavark-2:1.5.1-3.module+el8.8.0+21741+dd5be1e7.src",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:netavark-2:1.5.1-3.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:oci-seccomp-bpf-hook-0:1.2.8-1.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:oci-seccomp-bpf-hook-0:1.2.8-1.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:oci-seccomp-bpf-hook-0:1.2.8-1.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:oci-seccomp-bpf-hook-0:1.2.8-1.module+el8.8.0+21741+dd5be1e7.src",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:oci-seccomp-bpf-hook-0:1.2.8-1.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:oci-seccomp-bpf-hook-debuginfo-0:1.2.8-1.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:oci-seccomp-bpf-hook-debuginfo-0:1.2.8-1.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:oci-seccomp-bpf-hook-debuginfo-0:1.2.8-1.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:oci-seccomp-bpf-hook-debuginfo-0:1.2.8-1.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:oci-seccomp-bpf-hook-debugsource-0:1.2.8-1.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:oci-seccomp-bpf-hook-debugsource-0:1.2.8-1.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:oci-seccomp-bpf-hook-debugsource-0:1.2.8-1.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:oci-seccomp-bpf-hook-debugsource-0:1.2.8-1.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.src",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-catatonit-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-catatonit-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-catatonit-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-catatonit-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-catatonit-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-catatonit-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-catatonit-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-catatonit-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-debugsource-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-debugsource-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-debugsource-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-debugsource-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-docker-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.noarch",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-gvproxy-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-gvproxy-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-gvproxy-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-gvproxy-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-gvproxy-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-gvproxy-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-gvproxy-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-gvproxy-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-plugins-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-plugins-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-plugins-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-plugins-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-plugins-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-plugins-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-plugins-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-plugins-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-remote-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-remote-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-remote-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-remote-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-remote-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-remote-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-remote-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-remote-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-tests-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-tests-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-tests-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-tests-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:python-podman-0:4.4.1-1.module+el8.8.0+21741+dd5be1e7.src",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:python3-criu-0:3.15-4.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:python3-criu-0:3.15-4.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:python3-criu-0:3.15-4.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:python3-criu-0:3.15-4.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:python3-podman-0:4.4.1-1.module+el8.8.0+21741+dd5be1e7.noarch",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:runc-1:1.1.12-1.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:runc-1:1.1.12-1.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:runc-1:1.1.12-1.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:runc-1:1.1.12-1.module+el8.8.0+21741+dd5be1e7.src",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:runc-1:1.1.12-1.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:runc-debuginfo-1:1.1.12-1.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:runc-debuginfo-1:1.1.12-1.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:runc-debuginfo-1:1.1.12-1.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:runc-debuginfo-1:1.1.12-1.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:runc-debugsource-1:1.1.12-1.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:runc-debugsource-1:1.1.12-1.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:runc-debugsource-1:1.1.12-1.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:runc-debugsource-1:1.1.12-1.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:skopeo-2:1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:skopeo-2:1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:skopeo-2:1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:skopeo-2:1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.src",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:skopeo-2:1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:skopeo-tests-2:1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:skopeo-tests-2:1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:skopeo-tests-2:1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:skopeo-tests-2:1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:slirp4netns-0:1.2.0-3.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:slirp4netns-0:1.2.0-3.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:slirp4netns-0:1.2.0-3.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:slirp4netns-0:1.2.0-3.module+el8.8.0+21741+dd5be1e7.src",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:slirp4netns-0:1.2.0-3.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:slirp4netns-debuginfo-0:1.2.0-3.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:slirp4netns-debuginfo-0:1.2.0-3.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:slirp4netns-debuginfo-0:1.2.0-3.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:slirp4netns-debuginfo-0:1.2.0-3.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:slirp4netns-debugsource-0:1.2.0-3.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:slirp4netns-debugsource-0:1.2.0-3.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:slirp4netns-debugsource-0:1.2.0-3.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:slirp4netns-debugsource-0:1.2.0-3.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:toolbox-0:0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:toolbox-0:0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:toolbox-0:0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:toolbox-0:0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.src",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:toolbox-0:0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:toolbox-debuginfo-0:0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:toolbox-debuginfo-0:0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:toolbox-debuginfo-0:0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:toolbox-debuginfo-0:0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:toolbox-debugsource-0:0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:toolbox-debugsource-0:0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:toolbox-debugsource-0:0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:toolbox-debugsource-0:0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:toolbox-tests-0:0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:toolbox-tests-0:0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:toolbox-tests-0:0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:toolbox-tests-0:0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:udica-0:0.2.6-20.module+el8.8.0+21741+dd5be1e7.noarch",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:udica-0:0.2.6-20.module+el8.8.0+21741+dd5be1e7.src"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "podman: Symlink error leads to information disclosure"
},
{
"cve": "CVE-2022-32149",
"cwe": {
"id": "CWE-407",
"name": "Inefficient Algorithmic Complexity"
},
"discovery_date": "2022-10-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2134010"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in the golang.org/x/text/language package. An attacker can craft an Accept-Language header which ParseAcceptLanguage will take significant time to parse. This issue leads to a denial of service, and can impact availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: golang.org/x/text/language: ParseAcceptLanguage takes a long time to parse complex tags",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:aardvark-dns-2:1.5.0-2.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:aardvark-dns-2:1.5.0-2.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:aardvark-dns-2:1.5.0-2.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:aardvark-dns-2:1.5.0-2.module+el8.8.0+21741+dd5be1e7.src",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:aardvark-dns-2:1.5.0-2.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:buildah-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:buildah-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:buildah-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:buildah-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.src",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:buildah-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:buildah-debuginfo-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:buildah-debuginfo-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:buildah-debuginfo-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:buildah-debuginfo-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:buildah-debugsource-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:buildah-debugsource-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:buildah-debugsource-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:buildah-debugsource-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:buildah-tests-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:buildah-tests-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:buildah-tests-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:buildah-tests-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:buildah-tests-debuginfo-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:buildah-tests-debuginfo-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:buildah-tests-debuginfo-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:buildah-tests-debuginfo-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:cockpit-podman-0:63.1-1.module+el8.8.0+21741+dd5be1e7.noarch",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:cockpit-podman-0:63.1-1.module+el8.8.0+21741+dd5be1e7.src",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:conmon-3:2.1.6-1.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:conmon-3:2.1.6-1.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:conmon-3:2.1.6-1.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:conmon-3:2.1.6-1.module+el8.8.0+21741+dd5be1e7.src",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:conmon-3:2.1.6-1.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:conmon-debuginfo-3:2.1.6-1.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:conmon-debuginfo-3:2.1.6-1.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:conmon-debuginfo-3:2.1.6-1.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:conmon-debuginfo-3:2.1.6-1.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:conmon-debugsource-3:2.1.6-1.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:conmon-debugsource-3:2.1.6-1.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:conmon-debugsource-3:2.1.6-1.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:conmon-debugsource-3:2.1.6-1.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:container-selinux-2:2.229.0-1.module+el8.8.0+21741+dd5be1e7.noarch",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:container-selinux-2:2.229.0-1.module+el8.8.0+21741+dd5be1e7.src",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:containernetworking-plugins-1:1.2.0-1.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:containernetworking-plugins-1:1.2.0-1.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:containernetworking-plugins-1:1.2.0-1.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:containernetworking-plugins-1:1.2.0-1.module+el8.8.0+21741+dd5be1e7.src",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:containernetworking-plugins-1:1.2.0-1.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:containernetworking-plugins-debuginfo-1:1.2.0-1.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:containernetworking-plugins-debuginfo-1:1.2.0-1.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:containernetworking-plugins-debuginfo-1:1.2.0-1.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:containernetworking-plugins-debuginfo-1:1.2.0-1.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:containernetworking-plugins-debugsource-1:1.2.0-1.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:containernetworking-plugins-debugsource-1:1.2.0-1.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:containernetworking-plugins-debugsource-1:1.2.0-1.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:containernetworking-plugins-debugsource-1:1.2.0-1.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:containers-common-2:1-65.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:containers-common-2:1-65.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:containers-common-2:1-65.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:containers-common-2:1-65.module+el8.8.0+21741+dd5be1e7.src",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:containers-common-2:1-65.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:crit-0:3.15-4.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:crit-0:3.15-4.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:crit-0:3.15-4.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:crit-0:3.15-4.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:criu-0:3.15-4.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:criu-0:3.15-4.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:criu-0:3.15-4.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:criu-0:3.15-4.module+el8.8.0+21741+dd5be1e7.src",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:criu-0:3.15-4.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:criu-debuginfo-0:3.15-4.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:criu-debuginfo-0:3.15-4.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:criu-debuginfo-0:3.15-4.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:criu-debuginfo-0:3.15-4.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:criu-debugsource-0:3.15-4.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:criu-debugsource-0:3.15-4.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:criu-debugsource-0:3.15-4.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:criu-debugsource-0:3.15-4.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:criu-devel-0:3.15-4.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:criu-devel-0:3.15-4.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:criu-devel-0:3.15-4.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:criu-devel-0:3.15-4.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:criu-libs-0:3.15-4.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:criu-libs-0:3.15-4.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:criu-libs-0:3.15-4.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:criu-libs-0:3.15-4.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:criu-libs-debuginfo-0:3.15-4.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:criu-libs-debuginfo-0:3.15-4.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:criu-libs-debuginfo-0:3.15-4.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:criu-libs-debuginfo-0:3.15-4.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:crun-0:1.8.4-2.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:crun-0:1.8.4-2.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:crun-0:1.8.4-2.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:crun-0:1.8.4-2.module+el8.8.0+21741+dd5be1e7.src",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:crun-0:1.8.4-2.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:crun-debuginfo-0:1.8.4-2.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:crun-debuginfo-0:1.8.4-2.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:crun-debuginfo-0:1.8.4-2.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:crun-debuginfo-0:1.8.4-2.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:crun-debugsource-0:1.8.4-2.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:crun-debugsource-0:1.8.4-2.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:crun-debugsource-0:1.8.4-2.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:crun-debugsource-0:1.8.4-2.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:fuse-overlayfs-0:1.11-1.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:fuse-overlayfs-0:1.11-1.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:fuse-overlayfs-0:1.11-1.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:fuse-overlayfs-0:1.11-1.module+el8.8.0+21741+dd5be1e7.src",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:fuse-overlayfs-0:1.11-1.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:fuse-overlayfs-debuginfo-0:1.11-1.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:fuse-overlayfs-debuginfo-0:1.11-1.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:fuse-overlayfs-debuginfo-0:1.11-1.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:fuse-overlayfs-debuginfo-0:1.11-1.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:fuse-overlayfs-debugsource-0:1.11-1.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:fuse-overlayfs-debugsource-0:1.11-1.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:fuse-overlayfs-debugsource-0:1.11-1.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:fuse-overlayfs-debugsource-0:1.11-1.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:libslirp-0:4.4.0-1.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:libslirp-0:4.4.0-1.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:libslirp-0:4.4.0-1.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:libslirp-0:4.4.0-1.module+el8.8.0+21741+dd5be1e7.src",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:libslirp-0:4.4.0-1.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:libslirp-debuginfo-0:4.4.0-1.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:libslirp-debuginfo-0:4.4.0-1.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:libslirp-debuginfo-0:4.4.0-1.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:libslirp-debuginfo-0:4.4.0-1.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:libslirp-debugsource-0:4.4.0-1.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:libslirp-debugsource-0:4.4.0-1.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:libslirp-debugsource-0:4.4.0-1.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:libslirp-debugsource-0:4.4.0-1.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:libslirp-devel-0:4.4.0-1.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:libslirp-devel-0:4.4.0-1.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:libslirp-devel-0:4.4.0-1.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:libslirp-devel-0:4.4.0-1.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:netavark-2:1.5.1-3.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:netavark-2:1.5.1-3.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:netavark-2:1.5.1-3.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:netavark-2:1.5.1-3.module+el8.8.0+21741+dd5be1e7.src",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:netavark-2:1.5.1-3.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:oci-seccomp-bpf-hook-0:1.2.8-1.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:oci-seccomp-bpf-hook-0:1.2.8-1.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:oci-seccomp-bpf-hook-0:1.2.8-1.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:oci-seccomp-bpf-hook-0:1.2.8-1.module+el8.8.0+21741+dd5be1e7.src",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:oci-seccomp-bpf-hook-0:1.2.8-1.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:oci-seccomp-bpf-hook-debuginfo-0:1.2.8-1.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:oci-seccomp-bpf-hook-debuginfo-0:1.2.8-1.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:oci-seccomp-bpf-hook-debuginfo-0:1.2.8-1.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:oci-seccomp-bpf-hook-debuginfo-0:1.2.8-1.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:oci-seccomp-bpf-hook-debugsource-0:1.2.8-1.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:oci-seccomp-bpf-hook-debugsource-0:1.2.8-1.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:oci-seccomp-bpf-hook-debugsource-0:1.2.8-1.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:oci-seccomp-bpf-hook-debugsource-0:1.2.8-1.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.src",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-catatonit-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-catatonit-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-catatonit-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-catatonit-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-catatonit-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-catatonit-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-catatonit-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-catatonit-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-debugsource-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-debugsource-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-debugsource-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-debugsource-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-docker-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.noarch",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-gvproxy-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-gvproxy-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-gvproxy-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-gvproxy-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-gvproxy-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-gvproxy-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-gvproxy-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-gvproxy-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-plugins-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-plugins-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-plugins-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-plugins-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-plugins-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-plugins-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-plugins-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-plugins-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-remote-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-remote-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-remote-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-remote-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-remote-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-remote-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-remote-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-remote-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-tests-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-tests-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-tests-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-tests-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:python-podman-0:4.4.1-1.module+el8.8.0+21741+dd5be1e7.src",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:python3-criu-0:3.15-4.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:python3-criu-0:3.15-4.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:python3-criu-0:3.15-4.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:python3-criu-0:3.15-4.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:python3-podman-0:4.4.1-1.module+el8.8.0+21741+dd5be1e7.noarch",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:runc-1:1.1.12-1.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:runc-1:1.1.12-1.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:runc-1:1.1.12-1.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:runc-1:1.1.12-1.module+el8.8.0+21741+dd5be1e7.src",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:runc-1:1.1.12-1.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:runc-debuginfo-1:1.1.12-1.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:runc-debuginfo-1:1.1.12-1.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:runc-debuginfo-1:1.1.12-1.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:runc-debuginfo-1:1.1.12-1.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:runc-debugsource-1:1.1.12-1.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:runc-debugsource-1:1.1.12-1.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:runc-debugsource-1:1.1.12-1.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:runc-debugsource-1:1.1.12-1.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:skopeo-2:1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:skopeo-2:1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:skopeo-2:1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:skopeo-2:1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.src",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:skopeo-2:1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:skopeo-tests-2:1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:skopeo-tests-2:1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:skopeo-tests-2:1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:skopeo-tests-2:1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:slirp4netns-0:1.2.0-3.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:slirp4netns-0:1.2.0-3.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:slirp4netns-0:1.2.0-3.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:slirp4netns-0:1.2.0-3.module+el8.8.0+21741+dd5be1e7.src",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:slirp4netns-0:1.2.0-3.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:slirp4netns-debuginfo-0:1.2.0-3.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:slirp4netns-debuginfo-0:1.2.0-3.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:slirp4netns-debuginfo-0:1.2.0-3.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:slirp4netns-debuginfo-0:1.2.0-3.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:slirp4netns-debugsource-0:1.2.0-3.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:slirp4netns-debugsource-0:1.2.0-3.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:slirp4netns-debugsource-0:1.2.0-3.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:slirp4netns-debugsource-0:1.2.0-3.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:toolbox-0:0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:toolbox-0:0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:toolbox-0:0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:toolbox-0:0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.src",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:toolbox-0:0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:toolbox-debuginfo-0:0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:toolbox-debuginfo-0:0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:toolbox-debuginfo-0:0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:toolbox-debuginfo-0:0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:toolbox-debugsource-0:0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:toolbox-debugsource-0:0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:toolbox-debugsource-0:0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:toolbox-debugsource-0:0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:toolbox-tests-0:0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:toolbox-tests-0:0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:toolbox-tests-0:0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:toolbox-tests-0:0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:udica-0:0.2.6-20.module+el8.8.0+21741+dd5be1e7.noarch",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:udica-0:0.2.6-20.module+el8.8.0+21741+dd5be1e7.src"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-32149"
},
{
"category": "external",
"summary": "RHBZ#2134010",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2134010"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-32149",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32149"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-32149",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-32149"
},
{
"category": "external",
"summary": "https://go.dev/issue/56152",
"url": "https://go.dev/issue/56152"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-dev/c/qfPIly0X7aU",
"url": "https://groups.google.com/g/golang-dev/c/qfPIly0X7aU"
}
],
"release_date": "2022-10-11T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-04-29T12:00:29+00:00",
"details": "For details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:aardvark-dns-2:1.5.0-2.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:aardvark-dns-2:1.5.0-2.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:aardvark-dns-2:1.5.0-2.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:aardvark-dns-2:1.5.0-2.module+el8.8.0+21741+dd5be1e7.src",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:aardvark-dns-2:1.5.0-2.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:buildah-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:buildah-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:buildah-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:buildah-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.src",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:buildah-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:buildah-debuginfo-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:buildah-debuginfo-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:buildah-debuginfo-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:buildah-debuginfo-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:buildah-debugsource-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:buildah-debugsource-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:buildah-debugsource-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:buildah-debugsource-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:buildah-tests-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:buildah-tests-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:buildah-tests-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:buildah-tests-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:buildah-tests-debuginfo-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:buildah-tests-debuginfo-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:buildah-tests-debuginfo-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:buildah-tests-debuginfo-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:cockpit-podman-0:63.1-1.module+el8.8.0+21741+dd5be1e7.noarch",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:cockpit-podman-0:63.1-1.module+el8.8.0+21741+dd5be1e7.src",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:conmon-3:2.1.6-1.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:conmon-3:2.1.6-1.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:conmon-3:2.1.6-1.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:conmon-3:2.1.6-1.module+el8.8.0+21741+dd5be1e7.src",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:conmon-3:2.1.6-1.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:conmon-debuginfo-3:2.1.6-1.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:conmon-debuginfo-3:2.1.6-1.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:conmon-debuginfo-3:2.1.6-1.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:conmon-debuginfo-3:2.1.6-1.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:conmon-debugsource-3:2.1.6-1.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:conmon-debugsource-3:2.1.6-1.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:conmon-debugsource-3:2.1.6-1.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:conmon-debugsource-3:2.1.6-1.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:container-selinux-2:2.229.0-1.module+el8.8.0+21741+dd5be1e7.noarch",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:container-selinux-2:2.229.0-1.module+el8.8.0+21741+dd5be1e7.src",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:containernetworking-plugins-1:1.2.0-1.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:containernetworking-plugins-1:1.2.0-1.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:containernetworking-plugins-1:1.2.0-1.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:containernetworking-plugins-1:1.2.0-1.module+el8.8.0+21741+dd5be1e7.src",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:containernetworking-plugins-1:1.2.0-1.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:containernetworking-plugins-debuginfo-1:1.2.0-1.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:containernetworking-plugins-debuginfo-1:1.2.0-1.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:containernetworking-plugins-debuginfo-1:1.2.0-1.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:containernetworking-plugins-debuginfo-1:1.2.0-1.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:containernetworking-plugins-debugsource-1:1.2.0-1.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:containernetworking-plugins-debugsource-1:1.2.0-1.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:containernetworking-plugins-debugsource-1:1.2.0-1.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:containernetworking-plugins-debugsource-1:1.2.0-1.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:containers-common-2:1-65.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:containers-common-2:1-65.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:containers-common-2:1-65.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:containers-common-2:1-65.module+el8.8.0+21741+dd5be1e7.src",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:containers-common-2:1-65.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:crit-0:3.15-4.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:crit-0:3.15-4.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:crit-0:3.15-4.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:crit-0:3.15-4.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:criu-0:3.15-4.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:criu-0:3.15-4.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:criu-0:3.15-4.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:criu-0:3.15-4.module+el8.8.0+21741+dd5be1e7.src",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:criu-0:3.15-4.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:criu-debuginfo-0:3.15-4.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:criu-debuginfo-0:3.15-4.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:criu-debuginfo-0:3.15-4.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:criu-debuginfo-0:3.15-4.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:criu-debugsource-0:3.15-4.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:criu-debugsource-0:3.15-4.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:criu-debugsource-0:3.15-4.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:criu-debugsource-0:3.15-4.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:criu-devel-0:3.15-4.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:criu-devel-0:3.15-4.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:criu-devel-0:3.15-4.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:criu-devel-0:3.15-4.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:criu-libs-0:3.15-4.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:criu-libs-0:3.15-4.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:criu-libs-0:3.15-4.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:criu-libs-0:3.15-4.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:criu-libs-debuginfo-0:3.15-4.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:criu-libs-debuginfo-0:3.15-4.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:criu-libs-debuginfo-0:3.15-4.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:criu-libs-debuginfo-0:3.15-4.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:crun-0:1.8.4-2.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:crun-0:1.8.4-2.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:crun-0:1.8.4-2.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:crun-0:1.8.4-2.module+el8.8.0+21741+dd5be1e7.src",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:crun-0:1.8.4-2.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:crun-debuginfo-0:1.8.4-2.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:crun-debuginfo-0:1.8.4-2.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:crun-debuginfo-0:1.8.4-2.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:crun-debuginfo-0:1.8.4-2.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:crun-debugsource-0:1.8.4-2.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:crun-debugsource-0:1.8.4-2.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:crun-debugsource-0:1.8.4-2.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:crun-debugsource-0:1.8.4-2.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:fuse-overlayfs-0:1.11-1.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:fuse-overlayfs-0:1.11-1.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:fuse-overlayfs-0:1.11-1.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:fuse-overlayfs-0:1.11-1.module+el8.8.0+21741+dd5be1e7.src",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:fuse-overlayfs-0:1.11-1.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:fuse-overlayfs-debuginfo-0:1.11-1.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:fuse-overlayfs-debuginfo-0:1.11-1.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:fuse-overlayfs-debuginfo-0:1.11-1.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:fuse-overlayfs-debuginfo-0:1.11-1.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:fuse-overlayfs-debugsource-0:1.11-1.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:fuse-overlayfs-debugsource-0:1.11-1.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:fuse-overlayfs-debugsource-0:1.11-1.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:fuse-overlayfs-debugsource-0:1.11-1.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:libslirp-0:4.4.0-1.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:libslirp-0:4.4.0-1.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:libslirp-0:4.4.0-1.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:libslirp-0:4.4.0-1.module+el8.8.0+21741+dd5be1e7.src",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:libslirp-0:4.4.0-1.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:libslirp-debuginfo-0:4.4.0-1.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:libslirp-debuginfo-0:4.4.0-1.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:libslirp-debuginfo-0:4.4.0-1.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:libslirp-debuginfo-0:4.4.0-1.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:libslirp-debugsource-0:4.4.0-1.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:libslirp-debugsource-0:4.4.0-1.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:libslirp-debugsource-0:4.4.0-1.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:libslirp-debugsource-0:4.4.0-1.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:libslirp-devel-0:4.4.0-1.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:libslirp-devel-0:4.4.0-1.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:libslirp-devel-0:4.4.0-1.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:libslirp-devel-0:4.4.0-1.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:netavark-2:1.5.1-3.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:netavark-2:1.5.1-3.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:netavark-2:1.5.1-3.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:netavark-2:1.5.1-3.module+el8.8.0+21741+dd5be1e7.src",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:netavark-2:1.5.1-3.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:oci-seccomp-bpf-hook-0:1.2.8-1.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:oci-seccomp-bpf-hook-0:1.2.8-1.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:oci-seccomp-bpf-hook-0:1.2.8-1.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:oci-seccomp-bpf-hook-0:1.2.8-1.module+el8.8.0+21741+dd5be1e7.src",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:oci-seccomp-bpf-hook-0:1.2.8-1.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:oci-seccomp-bpf-hook-debuginfo-0:1.2.8-1.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:oci-seccomp-bpf-hook-debuginfo-0:1.2.8-1.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:oci-seccomp-bpf-hook-debuginfo-0:1.2.8-1.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:oci-seccomp-bpf-hook-debuginfo-0:1.2.8-1.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:oci-seccomp-bpf-hook-debugsource-0:1.2.8-1.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:oci-seccomp-bpf-hook-debugsource-0:1.2.8-1.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:oci-seccomp-bpf-hook-debugsource-0:1.2.8-1.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:oci-seccomp-bpf-hook-debugsource-0:1.2.8-1.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.src",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-catatonit-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-catatonit-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-catatonit-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-catatonit-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-catatonit-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-catatonit-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-catatonit-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-catatonit-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-debugsource-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-debugsource-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-debugsource-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-debugsource-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-docker-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.noarch",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-gvproxy-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-gvproxy-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-gvproxy-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-gvproxy-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-gvproxy-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-gvproxy-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-gvproxy-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-gvproxy-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-plugins-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-plugins-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-plugins-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-plugins-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-plugins-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-plugins-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-plugins-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-plugins-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-remote-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-remote-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-remote-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-remote-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-remote-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-remote-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-remote-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-remote-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-tests-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-tests-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-tests-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-tests-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:python-podman-0:4.4.1-1.module+el8.8.0+21741+dd5be1e7.src",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:python3-criu-0:3.15-4.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:python3-criu-0:3.15-4.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:python3-criu-0:3.15-4.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:python3-criu-0:3.15-4.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:python3-podman-0:4.4.1-1.module+el8.8.0+21741+dd5be1e7.noarch",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:runc-1:1.1.12-1.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:runc-1:1.1.12-1.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:runc-1:1.1.12-1.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:runc-1:1.1.12-1.module+el8.8.0+21741+dd5be1e7.src",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:runc-1:1.1.12-1.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:runc-debuginfo-1:1.1.12-1.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:runc-debuginfo-1:1.1.12-1.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:runc-debuginfo-1:1.1.12-1.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:runc-debuginfo-1:1.1.12-1.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:runc-debugsource-1:1.1.12-1.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:runc-debugsource-1:1.1.12-1.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:runc-debugsource-1:1.1.12-1.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:runc-debugsource-1:1.1.12-1.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:skopeo-2:1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:skopeo-2:1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:skopeo-2:1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:skopeo-2:1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.src",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:skopeo-2:1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:skopeo-tests-2:1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:skopeo-tests-2:1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:skopeo-tests-2:1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:skopeo-tests-2:1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:slirp4netns-0:1.2.0-3.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:slirp4netns-0:1.2.0-3.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:slirp4netns-0:1.2.0-3.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:slirp4netns-0:1.2.0-3.module+el8.8.0+21741+dd5be1e7.src",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:slirp4netns-0:1.2.0-3.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:slirp4netns-debuginfo-0:1.2.0-3.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:slirp4netns-debuginfo-0:1.2.0-3.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:slirp4netns-debuginfo-0:1.2.0-3.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:slirp4netns-debuginfo-0:1.2.0-3.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:slirp4netns-debugsource-0:1.2.0-3.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:slirp4netns-debugsource-0:1.2.0-3.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:slirp4netns-debugsource-0:1.2.0-3.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:slirp4netns-debugsource-0:1.2.0-3.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:toolbox-0:0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:toolbox-0:0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:toolbox-0:0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:toolbox-0:0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.src",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:toolbox-0:0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:toolbox-debuginfo-0:0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:toolbox-debuginfo-0:0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:toolbox-debuginfo-0:0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:toolbox-debuginfo-0:0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:toolbox-debugsource-0:0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:toolbox-debugsource-0:0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:toolbox-debugsource-0:0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:toolbox-debugsource-0:0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:toolbox-tests-0:0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:toolbox-tests-0:0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:toolbox-tests-0:0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:toolbox-tests-0:0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:udica-0:0.2.6-20.module+el8.8.0+21741+dd5be1e7.noarch",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:udica-0:0.2.6-20.module+el8.8.0+21741+dd5be1e7.src"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:2077"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:aardvark-dns-2:1.5.0-2.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:aardvark-dns-2:1.5.0-2.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:aardvark-dns-2:1.5.0-2.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:aardvark-dns-2:1.5.0-2.module+el8.8.0+21741+dd5be1e7.src",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:aardvark-dns-2:1.5.0-2.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:buildah-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:buildah-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:buildah-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:buildah-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.src",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:buildah-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:buildah-debuginfo-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:buildah-debuginfo-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:buildah-debuginfo-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:buildah-debuginfo-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:buildah-debugsource-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:buildah-debugsource-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:buildah-debugsource-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:buildah-debugsource-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:buildah-tests-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:buildah-tests-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:buildah-tests-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:buildah-tests-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:buildah-tests-debuginfo-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:buildah-tests-debuginfo-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:buildah-tests-debuginfo-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:buildah-tests-debuginfo-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:cockpit-podman-0:63.1-1.module+el8.8.0+21741+dd5be1e7.noarch",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:cockpit-podman-0:63.1-1.module+el8.8.0+21741+dd5be1e7.src",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:conmon-3:2.1.6-1.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:conmon-3:2.1.6-1.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:conmon-3:2.1.6-1.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:conmon-3:2.1.6-1.module+el8.8.0+21741+dd5be1e7.src",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:conmon-3:2.1.6-1.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:conmon-debuginfo-3:2.1.6-1.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:conmon-debuginfo-3:2.1.6-1.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:conmon-debuginfo-3:2.1.6-1.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:conmon-debuginfo-3:2.1.6-1.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:conmon-debugsource-3:2.1.6-1.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:conmon-debugsource-3:2.1.6-1.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:conmon-debugsource-3:2.1.6-1.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:conmon-debugsource-3:2.1.6-1.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:container-selinux-2:2.229.0-1.module+el8.8.0+21741+dd5be1e7.noarch",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:container-selinux-2:2.229.0-1.module+el8.8.0+21741+dd5be1e7.src",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:containernetworking-plugins-1:1.2.0-1.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:containernetworking-plugins-1:1.2.0-1.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:containernetworking-plugins-1:1.2.0-1.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:containernetworking-plugins-1:1.2.0-1.module+el8.8.0+21741+dd5be1e7.src",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:containernetworking-plugins-1:1.2.0-1.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:containernetworking-plugins-debuginfo-1:1.2.0-1.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:containernetworking-plugins-debuginfo-1:1.2.0-1.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:containernetworking-plugins-debuginfo-1:1.2.0-1.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:containernetworking-plugins-debuginfo-1:1.2.0-1.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:containernetworking-plugins-debugsource-1:1.2.0-1.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:containernetworking-plugins-debugsource-1:1.2.0-1.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:containernetworking-plugins-debugsource-1:1.2.0-1.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:containernetworking-plugins-debugsource-1:1.2.0-1.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:containers-common-2:1-65.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:containers-common-2:1-65.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:containers-common-2:1-65.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:containers-common-2:1-65.module+el8.8.0+21741+dd5be1e7.src",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:containers-common-2:1-65.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:crit-0:3.15-4.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:crit-0:3.15-4.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:crit-0:3.15-4.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:crit-0:3.15-4.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:criu-0:3.15-4.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:criu-0:3.15-4.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:criu-0:3.15-4.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:criu-0:3.15-4.module+el8.8.0+21741+dd5be1e7.src",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:criu-0:3.15-4.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:criu-debuginfo-0:3.15-4.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:criu-debuginfo-0:3.15-4.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:criu-debuginfo-0:3.15-4.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:criu-debuginfo-0:3.15-4.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:criu-debugsource-0:3.15-4.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:criu-debugsource-0:3.15-4.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:criu-debugsource-0:3.15-4.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:criu-debugsource-0:3.15-4.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:criu-devel-0:3.15-4.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:criu-devel-0:3.15-4.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:criu-devel-0:3.15-4.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:criu-devel-0:3.15-4.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:criu-libs-0:3.15-4.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:criu-libs-0:3.15-4.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:criu-libs-0:3.15-4.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:criu-libs-0:3.15-4.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:criu-libs-debuginfo-0:3.15-4.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:criu-libs-debuginfo-0:3.15-4.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:criu-libs-debuginfo-0:3.15-4.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:criu-libs-debuginfo-0:3.15-4.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:crun-0:1.8.4-2.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:crun-0:1.8.4-2.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:crun-0:1.8.4-2.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:crun-0:1.8.4-2.module+el8.8.0+21741+dd5be1e7.src",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:crun-0:1.8.4-2.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:crun-debuginfo-0:1.8.4-2.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:crun-debuginfo-0:1.8.4-2.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:crun-debuginfo-0:1.8.4-2.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:crun-debuginfo-0:1.8.4-2.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:crun-debugsource-0:1.8.4-2.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:crun-debugsource-0:1.8.4-2.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:crun-debugsource-0:1.8.4-2.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:crun-debugsource-0:1.8.4-2.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:fuse-overlayfs-0:1.11-1.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:fuse-overlayfs-0:1.11-1.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:fuse-overlayfs-0:1.11-1.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:fuse-overlayfs-0:1.11-1.module+el8.8.0+21741+dd5be1e7.src",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:fuse-overlayfs-0:1.11-1.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:fuse-overlayfs-debuginfo-0:1.11-1.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:fuse-overlayfs-debuginfo-0:1.11-1.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:fuse-overlayfs-debuginfo-0:1.11-1.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:fuse-overlayfs-debuginfo-0:1.11-1.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:fuse-overlayfs-debugsource-0:1.11-1.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:fuse-overlayfs-debugsource-0:1.11-1.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:fuse-overlayfs-debugsource-0:1.11-1.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:fuse-overlayfs-debugsource-0:1.11-1.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:libslirp-0:4.4.0-1.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:libslirp-0:4.4.0-1.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:libslirp-0:4.4.0-1.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:libslirp-0:4.4.0-1.module+el8.8.0+21741+dd5be1e7.src",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:libslirp-0:4.4.0-1.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:libslirp-debuginfo-0:4.4.0-1.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:libslirp-debuginfo-0:4.4.0-1.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:libslirp-debuginfo-0:4.4.0-1.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:libslirp-debuginfo-0:4.4.0-1.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:libslirp-debugsource-0:4.4.0-1.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:libslirp-debugsource-0:4.4.0-1.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:libslirp-debugsource-0:4.4.0-1.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:libslirp-debugsource-0:4.4.0-1.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:libslirp-devel-0:4.4.0-1.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:libslirp-devel-0:4.4.0-1.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:libslirp-devel-0:4.4.0-1.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:libslirp-devel-0:4.4.0-1.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:netavark-2:1.5.1-3.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:netavark-2:1.5.1-3.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:netavark-2:1.5.1-3.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:netavark-2:1.5.1-3.module+el8.8.0+21741+dd5be1e7.src",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:netavark-2:1.5.1-3.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:oci-seccomp-bpf-hook-0:1.2.8-1.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:oci-seccomp-bpf-hook-0:1.2.8-1.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:oci-seccomp-bpf-hook-0:1.2.8-1.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:oci-seccomp-bpf-hook-0:1.2.8-1.module+el8.8.0+21741+dd5be1e7.src",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:oci-seccomp-bpf-hook-0:1.2.8-1.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:oci-seccomp-bpf-hook-debuginfo-0:1.2.8-1.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:oci-seccomp-bpf-hook-debuginfo-0:1.2.8-1.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:oci-seccomp-bpf-hook-debuginfo-0:1.2.8-1.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:oci-seccomp-bpf-hook-debuginfo-0:1.2.8-1.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:oci-seccomp-bpf-hook-debugsource-0:1.2.8-1.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:oci-seccomp-bpf-hook-debugsource-0:1.2.8-1.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:oci-seccomp-bpf-hook-debugsource-0:1.2.8-1.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:oci-seccomp-bpf-hook-debugsource-0:1.2.8-1.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.src",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-catatonit-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-catatonit-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-catatonit-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-catatonit-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-catatonit-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-catatonit-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-catatonit-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-catatonit-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-debugsource-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-debugsource-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-debugsource-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-debugsource-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-docker-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.noarch",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-gvproxy-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-gvproxy-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-gvproxy-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-gvproxy-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-gvproxy-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-gvproxy-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-gvproxy-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-gvproxy-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-plugins-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-plugins-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-plugins-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-plugins-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-plugins-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-plugins-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-plugins-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-plugins-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-remote-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-remote-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-remote-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-remote-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-remote-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-remote-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-remote-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-remote-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-tests-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-tests-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-tests-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-tests-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:python-podman-0:4.4.1-1.module+el8.8.0+21741+dd5be1e7.src",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:python3-criu-0:3.15-4.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:python3-criu-0:3.15-4.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:python3-criu-0:3.15-4.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:python3-criu-0:3.15-4.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:python3-podman-0:4.4.1-1.module+el8.8.0+21741+dd5be1e7.noarch",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:runc-1:1.1.12-1.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:runc-1:1.1.12-1.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:runc-1:1.1.12-1.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:runc-1:1.1.12-1.module+el8.8.0+21741+dd5be1e7.src",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:runc-1:1.1.12-1.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:runc-debuginfo-1:1.1.12-1.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:runc-debuginfo-1:1.1.12-1.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:runc-debuginfo-1:1.1.12-1.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:runc-debuginfo-1:1.1.12-1.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:runc-debugsource-1:1.1.12-1.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:runc-debugsource-1:1.1.12-1.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:runc-debugsource-1:1.1.12-1.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:runc-debugsource-1:1.1.12-1.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:skopeo-2:1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:skopeo-2:1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:skopeo-2:1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:skopeo-2:1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.src",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:skopeo-2:1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:skopeo-tests-2:1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:skopeo-tests-2:1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:skopeo-tests-2:1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:skopeo-tests-2:1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:slirp4netns-0:1.2.0-3.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:slirp4netns-0:1.2.0-3.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:slirp4netns-0:1.2.0-3.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:slirp4netns-0:1.2.0-3.module+el8.8.0+21741+dd5be1e7.src",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:slirp4netns-0:1.2.0-3.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:slirp4netns-debuginfo-0:1.2.0-3.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:slirp4netns-debuginfo-0:1.2.0-3.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:slirp4netns-debuginfo-0:1.2.0-3.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:slirp4netns-debuginfo-0:1.2.0-3.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:slirp4netns-debugsource-0:1.2.0-3.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:slirp4netns-debugsource-0:1.2.0-3.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:slirp4netns-debugsource-0:1.2.0-3.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:slirp4netns-debugsource-0:1.2.0-3.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:toolbox-0:0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:toolbox-0:0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:toolbox-0:0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:toolbox-0:0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.src",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:toolbox-0:0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:toolbox-debuginfo-0:0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:toolbox-debuginfo-0:0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:toolbox-debuginfo-0:0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:toolbox-debuginfo-0:0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:toolbox-debugsource-0:0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:toolbox-debugsource-0:0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:toolbox-debugsource-0:0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:toolbox-debugsource-0:0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:toolbox-tests-0:0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:toolbox-tests-0:0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:toolbox-tests-0:0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:toolbox-tests-0:0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:udica-0:0.2.6-20.module+el8.8.0+21741+dd5be1e7.noarch",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:udica-0:0.2.6-20.module+el8.8.0+21741+dd5be1e7.src"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "golang: golang.org/x/text/language: ParseAcceptLanguage takes a long time to parse complex tags"
},
{
"cve": "CVE-2024-1753",
"cwe": {
"id": "CWE-59",
"name": "Improper Link Resolution Before File Access (\u0027Link Following\u0027)"
},
"discovery_date": "2024-02-22T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2265513"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in Buildah (and subsequently Podman Build) which allows containers to mount arbitrary locations on the host filesystem into build containers. A malicious Containerfile can use a dummy image with a symbolic link to the root filesystem as a mount source and cause the mount operation to mount the host root filesystem inside the RUN step. The commands inside the RUN step will then have read-write access to the host filesystem, allowing for full container escape at build time.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "buildah: full container escape at build time",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:aardvark-dns-2:1.5.0-2.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:aardvark-dns-2:1.5.0-2.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:aardvark-dns-2:1.5.0-2.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:aardvark-dns-2:1.5.0-2.module+el8.8.0+21741+dd5be1e7.src",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:aardvark-dns-2:1.5.0-2.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:buildah-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:buildah-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:buildah-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:buildah-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.src",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:buildah-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:buildah-debuginfo-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:buildah-debuginfo-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:buildah-debuginfo-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:buildah-debuginfo-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:buildah-debugsource-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:buildah-debugsource-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:buildah-debugsource-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:buildah-debugsource-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:buildah-tests-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:buildah-tests-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:buildah-tests-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:buildah-tests-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:buildah-tests-debuginfo-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:buildah-tests-debuginfo-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:buildah-tests-debuginfo-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:buildah-tests-debuginfo-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:cockpit-podman-0:63.1-1.module+el8.8.0+21741+dd5be1e7.noarch",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:cockpit-podman-0:63.1-1.module+el8.8.0+21741+dd5be1e7.src",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:conmon-3:2.1.6-1.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:conmon-3:2.1.6-1.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:conmon-3:2.1.6-1.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:conmon-3:2.1.6-1.module+el8.8.0+21741+dd5be1e7.src",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:conmon-3:2.1.6-1.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:conmon-debuginfo-3:2.1.6-1.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:conmon-debuginfo-3:2.1.6-1.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:conmon-debuginfo-3:2.1.6-1.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:conmon-debuginfo-3:2.1.6-1.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:conmon-debugsource-3:2.1.6-1.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:conmon-debugsource-3:2.1.6-1.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:conmon-debugsource-3:2.1.6-1.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:conmon-debugsource-3:2.1.6-1.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:container-selinux-2:2.229.0-1.module+el8.8.0+21741+dd5be1e7.noarch",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:container-selinux-2:2.229.0-1.module+el8.8.0+21741+dd5be1e7.src",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:containernetworking-plugins-1:1.2.0-1.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:containernetworking-plugins-1:1.2.0-1.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:containernetworking-plugins-1:1.2.0-1.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:containernetworking-plugins-1:1.2.0-1.module+el8.8.0+21741+dd5be1e7.src",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:containernetworking-plugins-1:1.2.0-1.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:containernetworking-plugins-debuginfo-1:1.2.0-1.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:containernetworking-plugins-debuginfo-1:1.2.0-1.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:containernetworking-plugins-debuginfo-1:1.2.0-1.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:containernetworking-plugins-debuginfo-1:1.2.0-1.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:containernetworking-plugins-debugsource-1:1.2.0-1.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:containernetworking-plugins-debugsource-1:1.2.0-1.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:containernetworking-plugins-debugsource-1:1.2.0-1.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:containernetworking-plugins-debugsource-1:1.2.0-1.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:containers-common-2:1-65.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:containers-common-2:1-65.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:containers-common-2:1-65.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:containers-common-2:1-65.module+el8.8.0+21741+dd5be1e7.src",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:containers-common-2:1-65.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:crit-0:3.15-4.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:crit-0:3.15-4.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:crit-0:3.15-4.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:crit-0:3.15-4.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:criu-0:3.15-4.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:criu-0:3.15-4.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:criu-0:3.15-4.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:criu-0:3.15-4.module+el8.8.0+21741+dd5be1e7.src",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:criu-0:3.15-4.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:criu-debuginfo-0:3.15-4.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:criu-debuginfo-0:3.15-4.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:criu-debuginfo-0:3.15-4.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:criu-debuginfo-0:3.15-4.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:criu-debugsource-0:3.15-4.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:criu-debugsource-0:3.15-4.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:criu-debugsource-0:3.15-4.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:criu-debugsource-0:3.15-4.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:criu-devel-0:3.15-4.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:criu-devel-0:3.15-4.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:criu-devel-0:3.15-4.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:criu-devel-0:3.15-4.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:criu-libs-0:3.15-4.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:criu-libs-0:3.15-4.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:criu-libs-0:3.15-4.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:criu-libs-0:3.15-4.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:criu-libs-debuginfo-0:3.15-4.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:criu-libs-debuginfo-0:3.15-4.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:criu-libs-debuginfo-0:3.15-4.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:criu-libs-debuginfo-0:3.15-4.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:crun-0:1.8.4-2.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:crun-0:1.8.4-2.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:crun-0:1.8.4-2.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:crun-0:1.8.4-2.module+el8.8.0+21741+dd5be1e7.src",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:crun-0:1.8.4-2.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:crun-debuginfo-0:1.8.4-2.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:crun-debuginfo-0:1.8.4-2.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:crun-debuginfo-0:1.8.4-2.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:crun-debuginfo-0:1.8.4-2.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:crun-debugsource-0:1.8.4-2.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:crun-debugsource-0:1.8.4-2.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:crun-debugsource-0:1.8.4-2.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:crun-debugsource-0:1.8.4-2.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:fuse-overlayfs-0:1.11-1.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:fuse-overlayfs-0:1.11-1.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:fuse-overlayfs-0:1.11-1.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:fuse-overlayfs-0:1.11-1.module+el8.8.0+21741+dd5be1e7.src",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:fuse-overlayfs-0:1.11-1.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:fuse-overlayfs-debuginfo-0:1.11-1.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:fuse-overlayfs-debuginfo-0:1.11-1.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:fuse-overlayfs-debuginfo-0:1.11-1.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:fuse-overlayfs-debuginfo-0:1.11-1.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:fuse-overlayfs-debugsource-0:1.11-1.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:fuse-overlayfs-debugsource-0:1.11-1.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:fuse-overlayfs-debugsource-0:1.11-1.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:fuse-overlayfs-debugsource-0:1.11-1.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:libslirp-0:4.4.0-1.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:libslirp-0:4.4.0-1.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:libslirp-0:4.4.0-1.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:libslirp-0:4.4.0-1.module+el8.8.0+21741+dd5be1e7.src",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:libslirp-0:4.4.0-1.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:libslirp-debuginfo-0:4.4.0-1.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:libslirp-debuginfo-0:4.4.0-1.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:libslirp-debuginfo-0:4.4.0-1.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:libslirp-debuginfo-0:4.4.0-1.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:libslirp-debugsource-0:4.4.0-1.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:libslirp-debugsource-0:4.4.0-1.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:libslirp-debugsource-0:4.4.0-1.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:libslirp-debugsource-0:4.4.0-1.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:libslirp-devel-0:4.4.0-1.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:libslirp-devel-0:4.4.0-1.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:libslirp-devel-0:4.4.0-1.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:libslirp-devel-0:4.4.0-1.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:netavark-2:1.5.1-3.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:netavark-2:1.5.1-3.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:netavark-2:1.5.1-3.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:netavark-2:1.5.1-3.module+el8.8.0+21741+dd5be1e7.src",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:netavark-2:1.5.1-3.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:oci-seccomp-bpf-hook-0:1.2.8-1.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:oci-seccomp-bpf-hook-0:1.2.8-1.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:oci-seccomp-bpf-hook-0:1.2.8-1.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:oci-seccomp-bpf-hook-0:1.2.8-1.module+el8.8.0+21741+dd5be1e7.src",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:oci-seccomp-bpf-hook-0:1.2.8-1.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:oci-seccomp-bpf-hook-debuginfo-0:1.2.8-1.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:oci-seccomp-bpf-hook-debuginfo-0:1.2.8-1.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:oci-seccomp-bpf-hook-debuginfo-0:1.2.8-1.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:oci-seccomp-bpf-hook-debuginfo-0:1.2.8-1.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:oci-seccomp-bpf-hook-debugsource-0:1.2.8-1.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:oci-seccomp-bpf-hook-debugsource-0:1.2.8-1.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:oci-seccomp-bpf-hook-debugsource-0:1.2.8-1.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:oci-seccomp-bpf-hook-debugsource-0:1.2.8-1.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.src",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-catatonit-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-catatonit-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-catatonit-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-catatonit-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-catatonit-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-catatonit-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-catatonit-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-catatonit-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-debugsource-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-debugsource-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-debugsource-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-debugsource-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-docker-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.noarch",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-gvproxy-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-gvproxy-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-gvproxy-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-gvproxy-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-gvproxy-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-gvproxy-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-gvproxy-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-gvproxy-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-plugins-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-plugins-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-plugins-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-plugins-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-plugins-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-plugins-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-plugins-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-plugins-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-remote-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-remote-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-remote-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-remote-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-remote-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-remote-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-remote-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-remote-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-tests-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-tests-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-tests-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-tests-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:python-podman-0:4.4.1-1.module+el8.8.0+21741+dd5be1e7.src",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:python3-criu-0:3.15-4.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:python3-criu-0:3.15-4.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:python3-criu-0:3.15-4.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:python3-criu-0:3.15-4.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:python3-podman-0:4.4.1-1.module+el8.8.0+21741+dd5be1e7.noarch",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:runc-1:1.1.12-1.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:runc-1:1.1.12-1.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:runc-1:1.1.12-1.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:runc-1:1.1.12-1.module+el8.8.0+21741+dd5be1e7.src",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:runc-1:1.1.12-1.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:runc-debuginfo-1:1.1.12-1.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:runc-debuginfo-1:1.1.12-1.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:runc-debuginfo-1:1.1.12-1.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:runc-debuginfo-1:1.1.12-1.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:runc-debugsource-1:1.1.12-1.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:runc-debugsource-1:1.1.12-1.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:runc-debugsource-1:1.1.12-1.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:runc-debugsource-1:1.1.12-1.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:skopeo-2:1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:skopeo-2:1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:skopeo-2:1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:skopeo-2:1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.src",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:skopeo-2:1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:skopeo-tests-2:1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:skopeo-tests-2:1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:skopeo-tests-2:1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:skopeo-tests-2:1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:slirp4netns-0:1.2.0-3.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:slirp4netns-0:1.2.0-3.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:slirp4netns-0:1.2.0-3.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:slirp4netns-0:1.2.0-3.module+el8.8.0+21741+dd5be1e7.src",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:slirp4netns-0:1.2.0-3.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:slirp4netns-debuginfo-0:1.2.0-3.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:slirp4netns-debuginfo-0:1.2.0-3.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:slirp4netns-debuginfo-0:1.2.0-3.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:slirp4netns-debuginfo-0:1.2.0-3.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:slirp4netns-debugsource-0:1.2.0-3.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:slirp4netns-debugsource-0:1.2.0-3.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:slirp4netns-debugsource-0:1.2.0-3.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:slirp4netns-debugsource-0:1.2.0-3.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:toolbox-0:0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:toolbox-0:0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:toolbox-0:0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:toolbox-0:0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.src",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:toolbox-0:0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:toolbox-debuginfo-0:0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:toolbox-debuginfo-0:0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:toolbox-debuginfo-0:0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:toolbox-debuginfo-0:0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:toolbox-debugsource-0:0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:toolbox-debugsource-0:0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:toolbox-debugsource-0:0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:toolbox-debugsource-0:0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:toolbox-tests-0:0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:toolbox-tests-0:0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:toolbox-tests-0:0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:toolbox-tests-0:0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:udica-0:0.2.6-20.module+el8.8.0+21741+dd5be1e7.noarch",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:udica-0:0.2.6-20.module+el8.8.0+21741+dd5be1e7.src"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-1753"
},
{
"category": "external",
"summary": "RHBZ#2265513",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2265513"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-1753",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-1753"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-1753",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-1753"
},
{
"category": "external",
"summary": "https://github.com/containers/buildah/security/advisories/GHSA-pmf3-c36m-g5cf",
"url": "https://github.com/containers/buildah/security/advisories/GHSA-pmf3-c36m-g5cf"
},
{
"category": "external",
"summary": "https://github.com/containers/podman/security/advisories/GHSA-874v-pj72-92f3",
"url": "https://github.com/containers/podman/security/advisories/GHSA-874v-pj72-92f3"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2024-2658",
"url": "https://pkg.go.dev/vuln/GO-2024-2658"
}
],
"release_date": "2024-03-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-04-29T12:00:29+00:00",
"details": "For details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:aardvark-dns-2:1.5.0-2.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:aardvark-dns-2:1.5.0-2.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:aardvark-dns-2:1.5.0-2.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:aardvark-dns-2:1.5.0-2.module+el8.8.0+21741+dd5be1e7.src",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:aardvark-dns-2:1.5.0-2.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:buildah-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:buildah-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:buildah-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:buildah-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.src",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:buildah-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:buildah-debuginfo-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:buildah-debuginfo-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:buildah-debuginfo-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:buildah-debuginfo-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:buildah-debugsource-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:buildah-debugsource-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:buildah-debugsource-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:buildah-debugsource-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:buildah-tests-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:buildah-tests-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:buildah-tests-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:buildah-tests-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:buildah-tests-debuginfo-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:buildah-tests-debuginfo-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:buildah-tests-debuginfo-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:buildah-tests-debuginfo-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:cockpit-podman-0:63.1-1.module+el8.8.0+21741+dd5be1e7.noarch",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:cockpit-podman-0:63.1-1.module+el8.8.0+21741+dd5be1e7.src",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:conmon-3:2.1.6-1.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:conmon-3:2.1.6-1.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:conmon-3:2.1.6-1.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:conmon-3:2.1.6-1.module+el8.8.0+21741+dd5be1e7.src",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:conmon-3:2.1.6-1.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:conmon-debuginfo-3:2.1.6-1.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:conmon-debuginfo-3:2.1.6-1.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:conmon-debuginfo-3:2.1.6-1.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:conmon-debuginfo-3:2.1.6-1.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:conmon-debugsource-3:2.1.6-1.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:conmon-debugsource-3:2.1.6-1.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:conmon-debugsource-3:2.1.6-1.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:conmon-debugsource-3:2.1.6-1.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:container-selinux-2:2.229.0-1.module+el8.8.0+21741+dd5be1e7.noarch",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:container-selinux-2:2.229.0-1.module+el8.8.0+21741+dd5be1e7.src",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:containernetworking-plugins-1:1.2.0-1.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:containernetworking-plugins-1:1.2.0-1.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:containernetworking-plugins-1:1.2.0-1.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:containernetworking-plugins-1:1.2.0-1.module+el8.8.0+21741+dd5be1e7.src",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:containernetworking-plugins-1:1.2.0-1.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:containernetworking-plugins-debuginfo-1:1.2.0-1.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:containernetworking-plugins-debuginfo-1:1.2.0-1.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:containernetworking-plugins-debuginfo-1:1.2.0-1.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:containernetworking-plugins-debuginfo-1:1.2.0-1.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:containernetworking-plugins-debugsource-1:1.2.0-1.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:containernetworking-plugins-debugsource-1:1.2.0-1.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:containernetworking-plugins-debugsource-1:1.2.0-1.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:containernetworking-plugins-debugsource-1:1.2.0-1.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:containers-common-2:1-65.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:containers-common-2:1-65.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:containers-common-2:1-65.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:containers-common-2:1-65.module+el8.8.0+21741+dd5be1e7.src",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:containers-common-2:1-65.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:crit-0:3.15-4.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:crit-0:3.15-4.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:crit-0:3.15-4.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:crit-0:3.15-4.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:criu-0:3.15-4.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:criu-0:3.15-4.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:criu-0:3.15-4.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:criu-0:3.15-4.module+el8.8.0+21741+dd5be1e7.src",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:criu-0:3.15-4.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:criu-debuginfo-0:3.15-4.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:criu-debuginfo-0:3.15-4.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:criu-debuginfo-0:3.15-4.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:criu-debuginfo-0:3.15-4.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:criu-debugsource-0:3.15-4.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:criu-debugsource-0:3.15-4.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:criu-debugsource-0:3.15-4.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:criu-debugsource-0:3.15-4.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:criu-devel-0:3.15-4.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:criu-devel-0:3.15-4.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:criu-devel-0:3.15-4.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:criu-devel-0:3.15-4.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:criu-libs-0:3.15-4.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:criu-libs-0:3.15-4.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:criu-libs-0:3.15-4.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:criu-libs-0:3.15-4.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:criu-libs-debuginfo-0:3.15-4.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:criu-libs-debuginfo-0:3.15-4.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:criu-libs-debuginfo-0:3.15-4.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:criu-libs-debuginfo-0:3.15-4.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:crun-0:1.8.4-2.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:crun-0:1.8.4-2.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:crun-0:1.8.4-2.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:crun-0:1.8.4-2.module+el8.8.0+21741+dd5be1e7.src",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:crun-0:1.8.4-2.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:crun-debuginfo-0:1.8.4-2.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:crun-debuginfo-0:1.8.4-2.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:crun-debuginfo-0:1.8.4-2.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:crun-debuginfo-0:1.8.4-2.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:crun-debugsource-0:1.8.4-2.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:crun-debugsource-0:1.8.4-2.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:crun-debugsource-0:1.8.4-2.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:crun-debugsource-0:1.8.4-2.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:fuse-overlayfs-0:1.11-1.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:fuse-overlayfs-0:1.11-1.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:fuse-overlayfs-0:1.11-1.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:fuse-overlayfs-0:1.11-1.module+el8.8.0+21741+dd5be1e7.src",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:fuse-overlayfs-0:1.11-1.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:fuse-overlayfs-debuginfo-0:1.11-1.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:fuse-overlayfs-debuginfo-0:1.11-1.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:fuse-overlayfs-debuginfo-0:1.11-1.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:fuse-overlayfs-debuginfo-0:1.11-1.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:fuse-overlayfs-debugsource-0:1.11-1.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:fuse-overlayfs-debugsource-0:1.11-1.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:fuse-overlayfs-debugsource-0:1.11-1.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:fuse-overlayfs-debugsource-0:1.11-1.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:libslirp-0:4.4.0-1.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:libslirp-0:4.4.0-1.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:libslirp-0:4.4.0-1.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:libslirp-0:4.4.0-1.module+el8.8.0+21741+dd5be1e7.src",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:libslirp-0:4.4.0-1.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:libslirp-debuginfo-0:4.4.0-1.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:libslirp-debuginfo-0:4.4.0-1.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:libslirp-debuginfo-0:4.4.0-1.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:libslirp-debuginfo-0:4.4.0-1.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:libslirp-debugsource-0:4.4.0-1.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:libslirp-debugsource-0:4.4.0-1.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:libslirp-debugsource-0:4.4.0-1.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:libslirp-debugsource-0:4.4.0-1.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:libslirp-devel-0:4.4.0-1.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:libslirp-devel-0:4.4.0-1.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:libslirp-devel-0:4.4.0-1.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:libslirp-devel-0:4.4.0-1.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:netavark-2:1.5.1-3.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:netavark-2:1.5.1-3.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:netavark-2:1.5.1-3.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:netavark-2:1.5.1-3.module+el8.8.0+21741+dd5be1e7.src",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:netavark-2:1.5.1-3.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:oci-seccomp-bpf-hook-0:1.2.8-1.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:oci-seccomp-bpf-hook-0:1.2.8-1.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:oci-seccomp-bpf-hook-0:1.2.8-1.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:oci-seccomp-bpf-hook-0:1.2.8-1.module+el8.8.0+21741+dd5be1e7.src",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:oci-seccomp-bpf-hook-0:1.2.8-1.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:oci-seccomp-bpf-hook-debuginfo-0:1.2.8-1.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:oci-seccomp-bpf-hook-debuginfo-0:1.2.8-1.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:oci-seccomp-bpf-hook-debuginfo-0:1.2.8-1.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:oci-seccomp-bpf-hook-debuginfo-0:1.2.8-1.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:oci-seccomp-bpf-hook-debugsource-0:1.2.8-1.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:oci-seccomp-bpf-hook-debugsource-0:1.2.8-1.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:oci-seccomp-bpf-hook-debugsource-0:1.2.8-1.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:oci-seccomp-bpf-hook-debugsource-0:1.2.8-1.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.src",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-catatonit-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-catatonit-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-catatonit-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-catatonit-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-catatonit-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-catatonit-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-catatonit-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-catatonit-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-debugsource-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-debugsource-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-debugsource-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-debugsource-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-docker-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.noarch",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-gvproxy-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-gvproxy-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-gvproxy-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-gvproxy-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-gvproxy-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-gvproxy-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-gvproxy-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-gvproxy-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-plugins-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-plugins-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-plugins-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-plugins-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-plugins-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-plugins-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-plugins-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-plugins-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-remote-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-remote-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-remote-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-remote-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-remote-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-remote-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-remote-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-remote-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-tests-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-tests-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-tests-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-tests-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:python-podman-0:4.4.1-1.module+el8.8.0+21741+dd5be1e7.src",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:python3-criu-0:3.15-4.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:python3-criu-0:3.15-4.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:python3-criu-0:3.15-4.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:python3-criu-0:3.15-4.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:python3-podman-0:4.4.1-1.module+el8.8.0+21741+dd5be1e7.noarch",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:runc-1:1.1.12-1.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:runc-1:1.1.12-1.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:runc-1:1.1.12-1.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:runc-1:1.1.12-1.module+el8.8.0+21741+dd5be1e7.src",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:runc-1:1.1.12-1.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:runc-debuginfo-1:1.1.12-1.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:runc-debuginfo-1:1.1.12-1.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:runc-debuginfo-1:1.1.12-1.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:runc-debuginfo-1:1.1.12-1.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:runc-debugsource-1:1.1.12-1.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:runc-debugsource-1:1.1.12-1.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:runc-debugsource-1:1.1.12-1.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:runc-debugsource-1:1.1.12-1.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:skopeo-2:1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:skopeo-2:1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:skopeo-2:1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:skopeo-2:1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.src",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:skopeo-2:1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:skopeo-tests-2:1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:skopeo-tests-2:1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:skopeo-tests-2:1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:skopeo-tests-2:1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:slirp4netns-0:1.2.0-3.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:slirp4netns-0:1.2.0-3.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:slirp4netns-0:1.2.0-3.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:slirp4netns-0:1.2.0-3.module+el8.8.0+21741+dd5be1e7.src",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:slirp4netns-0:1.2.0-3.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:slirp4netns-debuginfo-0:1.2.0-3.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:slirp4netns-debuginfo-0:1.2.0-3.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:slirp4netns-debuginfo-0:1.2.0-3.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:slirp4netns-debuginfo-0:1.2.0-3.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:slirp4netns-debugsource-0:1.2.0-3.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:slirp4netns-debugsource-0:1.2.0-3.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:slirp4netns-debugsource-0:1.2.0-3.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:slirp4netns-debugsource-0:1.2.0-3.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:toolbox-0:0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:toolbox-0:0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:toolbox-0:0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:toolbox-0:0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.src",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:toolbox-0:0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:toolbox-debuginfo-0:0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:toolbox-debuginfo-0:0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:toolbox-debuginfo-0:0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:toolbox-debuginfo-0:0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:toolbox-debugsource-0:0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:toolbox-debugsource-0:0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:toolbox-debugsource-0:0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:toolbox-debugsource-0:0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:toolbox-tests-0:0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:toolbox-tests-0:0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:toolbox-tests-0:0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:toolbox-tests-0:0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:udica-0:0.2.6-20.module+el8.8.0+21741+dd5be1e7.noarch",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:udica-0:0.2.6-20.module+el8.8.0+21741+dd5be1e7.src"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:2077"
},
{
"category": "workaround",
"details": "When SELinux is enabled, the container is restricted to limited read-only access.",
"product_ids": [
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:aardvark-dns-2:1.5.0-2.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:aardvark-dns-2:1.5.0-2.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:aardvark-dns-2:1.5.0-2.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:aardvark-dns-2:1.5.0-2.module+el8.8.0+21741+dd5be1e7.src",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:aardvark-dns-2:1.5.0-2.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:buildah-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:buildah-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:buildah-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:buildah-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.src",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:buildah-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:buildah-debuginfo-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:buildah-debuginfo-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:buildah-debuginfo-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:buildah-debuginfo-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:buildah-debugsource-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:buildah-debugsource-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:buildah-debugsource-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:buildah-debugsource-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:buildah-tests-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:buildah-tests-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:buildah-tests-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:buildah-tests-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:buildah-tests-debuginfo-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:buildah-tests-debuginfo-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:buildah-tests-debuginfo-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:buildah-tests-debuginfo-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:cockpit-podman-0:63.1-1.module+el8.8.0+21741+dd5be1e7.noarch",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:cockpit-podman-0:63.1-1.module+el8.8.0+21741+dd5be1e7.src",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:conmon-3:2.1.6-1.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:conmon-3:2.1.6-1.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:conmon-3:2.1.6-1.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:conmon-3:2.1.6-1.module+el8.8.0+21741+dd5be1e7.src",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:conmon-3:2.1.6-1.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:conmon-debuginfo-3:2.1.6-1.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:conmon-debuginfo-3:2.1.6-1.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:conmon-debuginfo-3:2.1.6-1.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:conmon-debuginfo-3:2.1.6-1.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:conmon-debugsource-3:2.1.6-1.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:conmon-debugsource-3:2.1.6-1.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:conmon-debugsource-3:2.1.6-1.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:conmon-debugsource-3:2.1.6-1.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:container-selinux-2:2.229.0-1.module+el8.8.0+21741+dd5be1e7.noarch",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:container-selinux-2:2.229.0-1.module+el8.8.0+21741+dd5be1e7.src",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:containernetworking-plugins-1:1.2.0-1.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:containernetworking-plugins-1:1.2.0-1.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:containernetworking-plugins-1:1.2.0-1.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:containernetworking-plugins-1:1.2.0-1.module+el8.8.0+21741+dd5be1e7.src",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:containernetworking-plugins-1:1.2.0-1.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:containernetworking-plugins-debuginfo-1:1.2.0-1.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:containernetworking-plugins-debuginfo-1:1.2.0-1.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:containernetworking-plugins-debuginfo-1:1.2.0-1.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:containernetworking-plugins-debuginfo-1:1.2.0-1.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:containernetworking-plugins-debugsource-1:1.2.0-1.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:containernetworking-plugins-debugsource-1:1.2.0-1.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:containernetworking-plugins-debugsource-1:1.2.0-1.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:containernetworking-plugins-debugsource-1:1.2.0-1.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:containers-common-2:1-65.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:containers-common-2:1-65.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:containers-common-2:1-65.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:containers-common-2:1-65.module+el8.8.0+21741+dd5be1e7.src",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:containers-common-2:1-65.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:crit-0:3.15-4.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:crit-0:3.15-4.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:crit-0:3.15-4.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:crit-0:3.15-4.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:criu-0:3.15-4.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:criu-0:3.15-4.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:criu-0:3.15-4.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:criu-0:3.15-4.module+el8.8.0+21741+dd5be1e7.src",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:criu-0:3.15-4.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:criu-debuginfo-0:3.15-4.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:criu-debuginfo-0:3.15-4.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:criu-debuginfo-0:3.15-4.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:criu-debuginfo-0:3.15-4.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:criu-debugsource-0:3.15-4.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:criu-debugsource-0:3.15-4.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:criu-debugsource-0:3.15-4.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:criu-debugsource-0:3.15-4.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:criu-devel-0:3.15-4.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:criu-devel-0:3.15-4.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:criu-devel-0:3.15-4.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:criu-devel-0:3.15-4.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:criu-libs-0:3.15-4.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:criu-libs-0:3.15-4.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:criu-libs-0:3.15-4.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:criu-libs-0:3.15-4.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:criu-libs-debuginfo-0:3.15-4.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:criu-libs-debuginfo-0:3.15-4.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:criu-libs-debuginfo-0:3.15-4.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:criu-libs-debuginfo-0:3.15-4.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:crun-0:1.8.4-2.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:crun-0:1.8.4-2.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:crun-0:1.8.4-2.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:crun-0:1.8.4-2.module+el8.8.0+21741+dd5be1e7.src",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:crun-0:1.8.4-2.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:crun-debuginfo-0:1.8.4-2.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:crun-debuginfo-0:1.8.4-2.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:crun-debuginfo-0:1.8.4-2.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:crun-debuginfo-0:1.8.4-2.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:crun-debugsource-0:1.8.4-2.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:crun-debugsource-0:1.8.4-2.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:crun-debugsource-0:1.8.4-2.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:crun-debugsource-0:1.8.4-2.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:fuse-overlayfs-0:1.11-1.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:fuse-overlayfs-0:1.11-1.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:fuse-overlayfs-0:1.11-1.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:fuse-overlayfs-0:1.11-1.module+el8.8.0+21741+dd5be1e7.src",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:fuse-overlayfs-0:1.11-1.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:fuse-overlayfs-debuginfo-0:1.11-1.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:fuse-overlayfs-debuginfo-0:1.11-1.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:fuse-overlayfs-debuginfo-0:1.11-1.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:fuse-overlayfs-debuginfo-0:1.11-1.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:fuse-overlayfs-debugsource-0:1.11-1.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:fuse-overlayfs-debugsource-0:1.11-1.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:fuse-overlayfs-debugsource-0:1.11-1.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:fuse-overlayfs-debugsource-0:1.11-1.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:libslirp-0:4.4.0-1.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:libslirp-0:4.4.0-1.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:libslirp-0:4.4.0-1.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:libslirp-0:4.4.0-1.module+el8.8.0+21741+dd5be1e7.src",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:libslirp-0:4.4.0-1.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:libslirp-debuginfo-0:4.4.0-1.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:libslirp-debuginfo-0:4.4.0-1.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:libslirp-debuginfo-0:4.4.0-1.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:libslirp-debuginfo-0:4.4.0-1.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:libslirp-debugsource-0:4.4.0-1.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:libslirp-debugsource-0:4.4.0-1.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:libslirp-debugsource-0:4.4.0-1.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:libslirp-debugsource-0:4.4.0-1.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:libslirp-devel-0:4.4.0-1.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:libslirp-devel-0:4.4.0-1.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:libslirp-devel-0:4.4.0-1.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:libslirp-devel-0:4.4.0-1.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:netavark-2:1.5.1-3.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:netavark-2:1.5.1-3.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:netavark-2:1.5.1-3.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:netavark-2:1.5.1-3.module+el8.8.0+21741+dd5be1e7.src",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:netavark-2:1.5.1-3.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:oci-seccomp-bpf-hook-0:1.2.8-1.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:oci-seccomp-bpf-hook-0:1.2.8-1.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:oci-seccomp-bpf-hook-0:1.2.8-1.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:oci-seccomp-bpf-hook-0:1.2.8-1.module+el8.8.0+21741+dd5be1e7.src",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:oci-seccomp-bpf-hook-0:1.2.8-1.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:oci-seccomp-bpf-hook-debuginfo-0:1.2.8-1.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:oci-seccomp-bpf-hook-debuginfo-0:1.2.8-1.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:oci-seccomp-bpf-hook-debuginfo-0:1.2.8-1.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:oci-seccomp-bpf-hook-debuginfo-0:1.2.8-1.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:oci-seccomp-bpf-hook-debugsource-0:1.2.8-1.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:oci-seccomp-bpf-hook-debugsource-0:1.2.8-1.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:oci-seccomp-bpf-hook-debugsource-0:1.2.8-1.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:oci-seccomp-bpf-hook-debugsource-0:1.2.8-1.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.src",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-catatonit-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-catatonit-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-catatonit-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-catatonit-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-catatonit-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-catatonit-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-catatonit-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-catatonit-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-debugsource-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-debugsource-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-debugsource-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-debugsource-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-docker-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.noarch",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-gvproxy-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-gvproxy-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-gvproxy-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-gvproxy-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-gvproxy-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-gvproxy-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-gvproxy-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-gvproxy-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-plugins-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-plugins-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-plugins-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-plugins-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-plugins-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-plugins-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-plugins-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-plugins-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-remote-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-remote-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-remote-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-remote-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-remote-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-remote-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-remote-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-remote-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-tests-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-tests-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-tests-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-tests-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:python-podman-0:4.4.1-1.module+el8.8.0+21741+dd5be1e7.src",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:python3-criu-0:3.15-4.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:python3-criu-0:3.15-4.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:python3-criu-0:3.15-4.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:python3-criu-0:3.15-4.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:python3-podman-0:4.4.1-1.module+el8.8.0+21741+dd5be1e7.noarch",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:runc-1:1.1.12-1.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:runc-1:1.1.12-1.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:runc-1:1.1.12-1.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:runc-1:1.1.12-1.module+el8.8.0+21741+dd5be1e7.src",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:runc-1:1.1.12-1.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:runc-debuginfo-1:1.1.12-1.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:runc-debuginfo-1:1.1.12-1.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:runc-debuginfo-1:1.1.12-1.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:runc-debuginfo-1:1.1.12-1.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:runc-debugsource-1:1.1.12-1.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:runc-debugsource-1:1.1.12-1.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:runc-debugsource-1:1.1.12-1.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:runc-debugsource-1:1.1.12-1.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:skopeo-2:1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:skopeo-2:1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:skopeo-2:1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:skopeo-2:1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.src",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:skopeo-2:1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:skopeo-tests-2:1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:skopeo-tests-2:1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:skopeo-tests-2:1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:skopeo-tests-2:1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:slirp4netns-0:1.2.0-3.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:slirp4netns-0:1.2.0-3.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:slirp4netns-0:1.2.0-3.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:slirp4netns-0:1.2.0-3.module+el8.8.0+21741+dd5be1e7.src",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:slirp4netns-0:1.2.0-3.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:slirp4netns-debuginfo-0:1.2.0-3.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:slirp4netns-debuginfo-0:1.2.0-3.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:slirp4netns-debuginfo-0:1.2.0-3.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:slirp4netns-debuginfo-0:1.2.0-3.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:slirp4netns-debugsource-0:1.2.0-3.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:slirp4netns-debugsource-0:1.2.0-3.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:slirp4netns-debugsource-0:1.2.0-3.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:slirp4netns-debugsource-0:1.2.0-3.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:toolbox-0:0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:toolbox-0:0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:toolbox-0:0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:toolbox-0:0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.src",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:toolbox-0:0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:toolbox-debuginfo-0:0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:toolbox-debuginfo-0:0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:toolbox-debuginfo-0:0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:toolbox-debuginfo-0:0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:toolbox-debugsource-0:0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:toolbox-debugsource-0:0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:toolbox-debugsource-0:0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:toolbox-debugsource-0:0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:toolbox-tests-0:0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:toolbox-tests-0:0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:toolbox-tests-0:0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:toolbox-tests-0:0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:udica-0:0.2.6-20.module+el8.8.0+21741+dd5be1e7.noarch",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:udica-0:0.2.6-20.module+el8.8.0+21741+dd5be1e7.src"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 8.6,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:aardvark-dns-2:1.5.0-2.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:aardvark-dns-2:1.5.0-2.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:aardvark-dns-2:1.5.0-2.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:aardvark-dns-2:1.5.0-2.module+el8.8.0+21741+dd5be1e7.src",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:aardvark-dns-2:1.5.0-2.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:buildah-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:buildah-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:buildah-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:buildah-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.src",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:buildah-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:buildah-debuginfo-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:buildah-debuginfo-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:buildah-debuginfo-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:buildah-debuginfo-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:buildah-debugsource-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:buildah-debugsource-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:buildah-debugsource-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:buildah-debugsource-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:buildah-tests-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:buildah-tests-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:buildah-tests-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:buildah-tests-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:buildah-tests-debuginfo-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:buildah-tests-debuginfo-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:buildah-tests-debuginfo-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:buildah-tests-debuginfo-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:cockpit-podman-0:63.1-1.module+el8.8.0+21741+dd5be1e7.noarch",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:cockpit-podman-0:63.1-1.module+el8.8.0+21741+dd5be1e7.src",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:conmon-3:2.1.6-1.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:conmon-3:2.1.6-1.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:conmon-3:2.1.6-1.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:conmon-3:2.1.6-1.module+el8.8.0+21741+dd5be1e7.src",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:conmon-3:2.1.6-1.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:conmon-debuginfo-3:2.1.6-1.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:conmon-debuginfo-3:2.1.6-1.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:conmon-debuginfo-3:2.1.6-1.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:conmon-debuginfo-3:2.1.6-1.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:conmon-debugsource-3:2.1.6-1.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:conmon-debugsource-3:2.1.6-1.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:conmon-debugsource-3:2.1.6-1.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:conmon-debugsource-3:2.1.6-1.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:container-selinux-2:2.229.0-1.module+el8.8.0+21741+dd5be1e7.noarch",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:container-selinux-2:2.229.0-1.module+el8.8.0+21741+dd5be1e7.src",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:containernetworking-plugins-1:1.2.0-1.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:containernetworking-plugins-1:1.2.0-1.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:containernetworking-plugins-1:1.2.0-1.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:containernetworking-plugins-1:1.2.0-1.module+el8.8.0+21741+dd5be1e7.src",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:containernetworking-plugins-1:1.2.0-1.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:containernetworking-plugins-debuginfo-1:1.2.0-1.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:containernetworking-plugins-debuginfo-1:1.2.0-1.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:containernetworking-plugins-debuginfo-1:1.2.0-1.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:containernetworking-plugins-debuginfo-1:1.2.0-1.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:containernetworking-plugins-debugsource-1:1.2.0-1.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:containernetworking-plugins-debugsource-1:1.2.0-1.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:containernetworking-plugins-debugsource-1:1.2.0-1.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:containernetworking-plugins-debugsource-1:1.2.0-1.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:containers-common-2:1-65.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:containers-common-2:1-65.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:containers-common-2:1-65.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:containers-common-2:1-65.module+el8.8.0+21741+dd5be1e7.src",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:containers-common-2:1-65.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:crit-0:3.15-4.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:crit-0:3.15-4.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:crit-0:3.15-4.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:crit-0:3.15-4.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:criu-0:3.15-4.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:criu-0:3.15-4.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:criu-0:3.15-4.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:criu-0:3.15-4.module+el8.8.0+21741+dd5be1e7.src",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:criu-0:3.15-4.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:criu-debuginfo-0:3.15-4.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:criu-debuginfo-0:3.15-4.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:criu-debuginfo-0:3.15-4.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:criu-debuginfo-0:3.15-4.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:criu-debugsource-0:3.15-4.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:criu-debugsource-0:3.15-4.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:criu-debugsource-0:3.15-4.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:criu-debugsource-0:3.15-4.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:criu-devel-0:3.15-4.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:criu-devel-0:3.15-4.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:criu-devel-0:3.15-4.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:criu-devel-0:3.15-4.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:criu-libs-0:3.15-4.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:criu-libs-0:3.15-4.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:criu-libs-0:3.15-4.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:criu-libs-0:3.15-4.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:criu-libs-debuginfo-0:3.15-4.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:criu-libs-debuginfo-0:3.15-4.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:criu-libs-debuginfo-0:3.15-4.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:criu-libs-debuginfo-0:3.15-4.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:crun-0:1.8.4-2.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:crun-0:1.8.4-2.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:crun-0:1.8.4-2.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:crun-0:1.8.4-2.module+el8.8.0+21741+dd5be1e7.src",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:crun-0:1.8.4-2.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:crun-debuginfo-0:1.8.4-2.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:crun-debuginfo-0:1.8.4-2.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:crun-debuginfo-0:1.8.4-2.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:crun-debuginfo-0:1.8.4-2.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:crun-debugsource-0:1.8.4-2.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:crun-debugsource-0:1.8.4-2.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:crun-debugsource-0:1.8.4-2.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:crun-debugsource-0:1.8.4-2.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:fuse-overlayfs-0:1.11-1.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:fuse-overlayfs-0:1.11-1.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:fuse-overlayfs-0:1.11-1.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:fuse-overlayfs-0:1.11-1.module+el8.8.0+21741+dd5be1e7.src",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:fuse-overlayfs-0:1.11-1.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:fuse-overlayfs-debuginfo-0:1.11-1.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:fuse-overlayfs-debuginfo-0:1.11-1.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:fuse-overlayfs-debuginfo-0:1.11-1.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:fuse-overlayfs-debuginfo-0:1.11-1.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:fuse-overlayfs-debugsource-0:1.11-1.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:fuse-overlayfs-debugsource-0:1.11-1.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:fuse-overlayfs-debugsource-0:1.11-1.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:fuse-overlayfs-debugsource-0:1.11-1.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:libslirp-0:4.4.0-1.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:libslirp-0:4.4.0-1.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:libslirp-0:4.4.0-1.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:libslirp-0:4.4.0-1.module+el8.8.0+21741+dd5be1e7.src",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:libslirp-0:4.4.0-1.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:libslirp-debuginfo-0:4.4.0-1.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:libslirp-debuginfo-0:4.4.0-1.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:libslirp-debuginfo-0:4.4.0-1.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:libslirp-debuginfo-0:4.4.0-1.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:libslirp-debugsource-0:4.4.0-1.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:libslirp-debugsource-0:4.4.0-1.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:libslirp-debugsource-0:4.4.0-1.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:libslirp-debugsource-0:4.4.0-1.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:libslirp-devel-0:4.4.0-1.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:libslirp-devel-0:4.4.0-1.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:libslirp-devel-0:4.4.0-1.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:libslirp-devel-0:4.4.0-1.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:netavark-2:1.5.1-3.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:netavark-2:1.5.1-3.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:netavark-2:1.5.1-3.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:netavark-2:1.5.1-3.module+el8.8.0+21741+dd5be1e7.src",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:netavark-2:1.5.1-3.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:oci-seccomp-bpf-hook-0:1.2.8-1.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:oci-seccomp-bpf-hook-0:1.2.8-1.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:oci-seccomp-bpf-hook-0:1.2.8-1.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:oci-seccomp-bpf-hook-0:1.2.8-1.module+el8.8.0+21741+dd5be1e7.src",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:oci-seccomp-bpf-hook-0:1.2.8-1.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:oci-seccomp-bpf-hook-debuginfo-0:1.2.8-1.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:oci-seccomp-bpf-hook-debuginfo-0:1.2.8-1.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:oci-seccomp-bpf-hook-debuginfo-0:1.2.8-1.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:oci-seccomp-bpf-hook-debuginfo-0:1.2.8-1.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:oci-seccomp-bpf-hook-debugsource-0:1.2.8-1.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:oci-seccomp-bpf-hook-debugsource-0:1.2.8-1.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:oci-seccomp-bpf-hook-debugsource-0:1.2.8-1.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:oci-seccomp-bpf-hook-debugsource-0:1.2.8-1.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.src",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-catatonit-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-catatonit-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-catatonit-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-catatonit-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-catatonit-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-catatonit-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-catatonit-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-catatonit-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-debugsource-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-debugsource-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-debugsource-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-debugsource-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-docker-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.noarch",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-gvproxy-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-gvproxy-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-gvproxy-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-gvproxy-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-gvproxy-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-gvproxy-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-gvproxy-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-gvproxy-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-plugins-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-plugins-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-plugins-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-plugins-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-plugins-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-plugins-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-plugins-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-plugins-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-remote-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-remote-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-remote-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-remote-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-remote-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-remote-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-remote-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-remote-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-tests-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-tests-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-tests-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-tests-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:python-podman-0:4.4.1-1.module+el8.8.0+21741+dd5be1e7.src",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:python3-criu-0:3.15-4.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:python3-criu-0:3.15-4.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:python3-criu-0:3.15-4.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:python3-criu-0:3.15-4.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:python3-podman-0:4.4.1-1.module+el8.8.0+21741+dd5be1e7.noarch",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:runc-1:1.1.12-1.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:runc-1:1.1.12-1.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:runc-1:1.1.12-1.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:runc-1:1.1.12-1.module+el8.8.0+21741+dd5be1e7.src",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:runc-1:1.1.12-1.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:runc-debuginfo-1:1.1.12-1.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:runc-debuginfo-1:1.1.12-1.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:runc-debuginfo-1:1.1.12-1.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:runc-debuginfo-1:1.1.12-1.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:runc-debugsource-1:1.1.12-1.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:runc-debugsource-1:1.1.12-1.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:runc-debugsource-1:1.1.12-1.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:runc-debugsource-1:1.1.12-1.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:skopeo-2:1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:skopeo-2:1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:skopeo-2:1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:skopeo-2:1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.src",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:skopeo-2:1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:skopeo-tests-2:1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:skopeo-tests-2:1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:skopeo-tests-2:1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:skopeo-tests-2:1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:slirp4netns-0:1.2.0-3.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:slirp4netns-0:1.2.0-3.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:slirp4netns-0:1.2.0-3.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:slirp4netns-0:1.2.0-3.module+el8.8.0+21741+dd5be1e7.src",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:slirp4netns-0:1.2.0-3.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:slirp4netns-debuginfo-0:1.2.0-3.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:slirp4netns-debuginfo-0:1.2.0-3.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:slirp4netns-debuginfo-0:1.2.0-3.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:slirp4netns-debuginfo-0:1.2.0-3.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:slirp4netns-debugsource-0:1.2.0-3.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:slirp4netns-debugsource-0:1.2.0-3.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:slirp4netns-debugsource-0:1.2.0-3.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:slirp4netns-debugsource-0:1.2.0-3.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:toolbox-0:0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:toolbox-0:0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:toolbox-0:0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:toolbox-0:0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.src",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:toolbox-0:0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:toolbox-debuginfo-0:0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:toolbox-debuginfo-0:0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:toolbox-debuginfo-0:0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:toolbox-debuginfo-0:0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:toolbox-debugsource-0:0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:toolbox-debugsource-0:0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:toolbox-debugsource-0:0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:toolbox-debugsource-0:0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:toolbox-tests-0:0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.aarch64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:toolbox-tests-0:0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.ppc64le",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:toolbox-tests-0:0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.s390x",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:toolbox-tests-0:0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.x86_64",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:udica-0:0.2.6-20.module+el8.8.0+21741+dd5be1e7.noarch",
"AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:udica-0:0.2.6-20.module+el8.8.0+21741+dd5be1e7.src"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "buildah: full container escape at build time"
}
]
}
RHSA-2023:0692
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "OpenShift API for Data Protection (OADP) 1.0.7 is now available.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "OpenShift API for Data Protection (OADP) enables you to back up and restore application resources, persistent volume data, and internal container images to external backup storage. OADP enables both file system-based and snapshot-based backups for persistent volumes.\n\nSecurity Fix(es) from Bugzilla:\n\n* golang: golang.org/x/text/language: ParseAcceptLanguage takes a long time to parse complex tags (CVE-2022-32149)\n\n* golang: net/http: An attacker can cause excessive memory growth in a Go server accepting HTTP/2 requests (CVE-2022-41717)\n\nFor more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2023:0692",
"url": "https://access.redhat.com/errata/RHSA-2023:0692"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#moderate",
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "2134010",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2134010"
},
{
"category": "external",
"summary": "2161274",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2161274"
},
{
"category": "external",
"summary": "MIG-1050",
"url": "https://issues.redhat.com/browse/MIG-1050"
},
{
"category": "external",
"summary": "OADP-1180",
"url": "https://issues.redhat.com/browse/OADP-1180"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2023/rhsa-2023_0692.json"
}
],
"title": "Red Hat Security Advisory: OpenShift API for Data Protection (OADP) 1.0.7 security and bug fix update",
"tracking": {
"current_release_date": "2025-10-24T13:31:42+00:00",
"generator": {
"date": "2025-10-24T13:31:42+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.10"
}
},
"id": "RHSA-2023:0692",
"initial_release_date": "2023-02-09T01:07:26+00:00",
"revision_history": [
{
"date": "2023-02-09T01:07:26+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2023-02-09T01:07:26+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-10-24T13:31:42+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "8Base-OADP-1.0",
"product": {
"name": "8Base-OADP-1.0",
"product_id": "8Base-OADP-1.0",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:openshift_api_data_protection:1.0::el8"
}
}
}
],
"category": "product_family",
"name": "OpenShift API for Data Protection"
},
{
"branches": [
{
"category": "product_version",
"name": "oadp/oadp-kubevirt-velero-plugin-rhel8@sha256:3749d7386635cf598147d5021584672ab26761b9dca52ca05b179d47557ac549_amd64",
"product": {
"name": "oadp/oadp-kubevirt-velero-plugin-rhel8@sha256:3749d7386635cf598147d5021584672ab26761b9dca52ca05b179d47557ac549_amd64",
"product_id": "oadp/oadp-kubevirt-velero-plugin-rhel8@sha256:3749d7386635cf598147d5021584672ab26761b9dca52ca05b179d47557ac549_amd64",
"product_identification_helper": {
"purl": "pkg:oci/oadp-kubevirt-velero-plugin-rhel8@sha256:3749d7386635cf598147d5021584672ab26761b9dca52ca05b179d47557ac549?arch=amd64\u0026repository_url=registry.redhat.io/oadp/oadp-kubevirt-velero-plugin-rhel8\u0026tag=1.0.7-4"
}
}
},
{
"category": "product_version",
"name": "oadp/oadp-mustgather-rhel8@sha256:f269ee31bf0eb544ccabb2d72d807dc5d6587186d76bb020a00fac20221c7b0f_amd64",
"product": {
"name": "oadp/oadp-mustgather-rhel8@sha256:f269ee31bf0eb544ccabb2d72d807dc5d6587186d76bb020a00fac20221c7b0f_amd64",
"product_id": "oadp/oadp-mustgather-rhel8@sha256:f269ee31bf0eb544ccabb2d72d807dc5d6587186d76bb020a00fac20221c7b0f_amd64",
"product_identification_helper": {
"purl": "pkg:oci/oadp-mustgather-rhel8@sha256:f269ee31bf0eb544ccabb2d72d807dc5d6587186d76bb020a00fac20221c7b0f?arch=amd64\u0026repository_url=registry.redhat.io/oadp/oadp-mustgather-rhel8\u0026tag=1.0.7-4"
}
}
},
{
"category": "product_version",
"name": "oadp/oadp-operator-bundle@sha256:d0927b9f279ad60a073773ec624dc66db000b3d0b727254fbadb6af3a3c7b646_amd64",
"product": {
"name": "oadp/oadp-operator-bundle@sha256:d0927b9f279ad60a073773ec624dc66db000b3d0b727254fbadb6af3a3c7b646_amd64",
"product_id": "oadp/oadp-operator-bundle@sha256:d0927b9f279ad60a073773ec624dc66db000b3d0b727254fbadb6af3a3c7b646_amd64",
"product_identification_helper": {
"purl": "pkg:oci/oadp-operator-bundle@sha256:d0927b9f279ad60a073773ec624dc66db000b3d0b727254fbadb6af3a3c7b646?arch=amd64\u0026repository_url=registry.redhat.io/oadp/oadp-operator-bundle\u0026tag=1.0.7-8"
}
}
},
{
"category": "product_version",
"name": "oadp/oadp-rhel8-operator@sha256:4d983585501df88bd5f602010cb72ea460982b25fa91c05a83f0b711a457661a_amd64",
"product": {
"name": "oadp/oadp-rhel8-operator@sha256:4d983585501df88bd5f602010cb72ea460982b25fa91c05a83f0b711a457661a_amd64",
"product_id": "oadp/oadp-rhel8-operator@sha256:4d983585501df88bd5f602010cb72ea460982b25fa91c05a83f0b711a457661a_amd64",
"product_identification_helper": {
"purl": "pkg:oci/oadp-rhel8-operator@sha256:4d983585501df88bd5f602010cb72ea460982b25fa91c05a83f0b711a457661a?arch=amd64\u0026repository_url=registry.redhat.io/oadp/oadp-rhel8-operator\u0026tag=1.0.7-2"
}
}
},
{
"category": "product_version",
"name": "oadp/oadp-registry-rhel8@sha256:ea215cbf22a37c2f2b77c9901dc5c7493f1f3a694276f42d11fcefbf045a8b38_amd64",
"product": {
"name": "oadp/oadp-registry-rhel8@sha256:ea215cbf22a37c2f2b77c9901dc5c7493f1f3a694276f42d11fcefbf045a8b38_amd64",
"product_id": "oadp/oadp-registry-rhel8@sha256:ea215cbf22a37c2f2b77c9901dc5c7493f1f3a694276f42d11fcefbf045a8b38_amd64",
"product_identification_helper": {
"purl": "pkg:oci/oadp-registry-rhel8@sha256:ea215cbf22a37c2f2b77c9901dc5c7493f1f3a694276f42d11fcefbf045a8b38?arch=amd64\u0026repository_url=registry.redhat.io/oadp/oadp-registry-rhel8\u0026tag=1.0.7-3"
}
}
},
{
"category": "product_version",
"name": "oadp/oadp-velero-rhel8@sha256:a5973be01956a09f75bcd65481d484c12fd7bcefad5b852fd0567f6d8b51f0be_amd64",
"product": {
"name": "oadp/oadp-velero-rhel8@sha256:a5973be01956a09f75bcd65481d484c12fd7bcefad5b852fd0567f6d8b51f0be_amd64",
"product_id": "oadp/oadp-velero-rhel8@sha256:a5973be01956a09f75bcd65481d484c12fd7bcefad5b852fd0567f6d8b51f0be_amd64",
"product_identification_helper": {
"purl": "pkg:oci/oadp-velero-rhel8@sha256:a5973be01956a09f75bcd65481d484c12fd7bcefad5b852fd0567f6d8b51f0be?arch=amd64\u0026repository_url=registry.redhat.io/oadp/oadp-velero-rhel8\u0026tag=1.0.7-5"
}
}
},
{
"category": "product_version",
"name": "oadp/oadp-velero-plugin-rhel8@sha256:d9a46e3da52db4880cde8faa6f5e406039e6f38585dd14dc97db4b5846b4f7e5_amd64",
"product": {
"name": "oadp/oadp-velero-plugin-rhel8@sha256:d9a46e3da52db4880cde8faa6f5e406039e6f38585dd14dc97db4b5846b4f7e5_amd64",
"product_id": "oadp/oadp-velero-plugin-rhel8@sha256:d9a46e3da52db4880cde8faa6f5e406039e6f38585dd14dc97db4b5846b4f7e5_amd64",
"product_identification_helper": {
"purl": "pkg:oci/oadp-velero-plugin-rhel8@sha256:d9a46e3da52db4880cde8faa6f5e406039e6f38585dd14dc97db4b5846b4f7e5?arch=amd64\u0026repository_url=registry.redhat.io/oadp/oadp-velero-plugin-rhel8\u0026tag=1.0.7-2"
}
}
},
{
"category": "product_version",
"name": "oadp/oadp-velero-plugin-for-aws-rhel8@sha256:1792552893fe7f146f04033f342e9095f0068dd60e1f3a1e2dad9c5111dd28e6_amd64",
"product": {
"name": "oadp/oadp-velero-plugin-for-aws-rhel8@sha256:1792552893fe7f146f04033f342e9095f0068dd60e1f3a1e2dad9c5111dd28e6_amd64",
"product_id": "oadp/oadp-velero-plugin-for-aws-rhel8@sha256:1792552893fe7f146f04033f342e9095f0068dd60e1f3a1e2dad9c5111dd28e6_amd64",
"product_identification_helper": {
"purl": "pkg:oci/oadp-velero-plugin-for-aws-rhel8@sha256:1792552893fe7f146f04033f342e9095f0068dd60e1f3a1e2dad9c5111dd28e6?arch=amd64\u0026repository_url=registry.redhat.io/oadp/oadp-velero-plugin-for-aws-rhel8\u0026tag=1.0.7-2"
}
}
},
{
"category": "product_version",
"name": "oadp/oadp-velero-plugin-for-csi-rhel8@sha256:aed05c3b1e7eee9054ee45b499e2eb31a534979468ba22be46f83459d0dab4ae_amd64",
"product": {
"name": "oadp/oadp-velero-plugin-for-csi-rhel8@sha256:aed05c3b1e7eee9054ee45b499e2eb31a534979468ba22be46f83459d0dab4ae_amd64",
"product_id": "oadp/oadp-velero-plugin-for-csi-rhel8@sha256:aed05c3b1e7eee9054ee45b499e2eb31a534979468ba22be46f83459d0dab4ae_amd64",
"product_identification_helper": {
"purl": "pkg:oci/oadp-velero-plugin-for-csi-rhel8@sha256:aed05c3b1e7eee9054ee45b499e2eb31a534979468ba22be46f83459d0dab4ae?arch=amd64\u0026repository_url=registry.redhat.io/oadp/oadp-velero-plugin-for-csi-rhel8\u0026tag=1.0.7-2"
}
}
},
{
"category": "product_version",
"name": "oadp/oadp-velero-plugin-for-gcp-rhel8@sha256:82ebe14f59b19d628ecbe63a212ecaf4623a98a432b8b4525b118c6b24c87d90_amd64",
"product": {
"name": "oadp/oadp-velero-plugin-for-gcp-rhel8@sha256:82ebe14f59b19d628ecbe63a212ecaf4623a98a432b8b4525b118c6b24c87d90_amd64",
"product_id": "oadp/oadp-velero-plugin-for-gcp-rhel8@sha256:82ebe14f59b19d628ecbe63a212ecaf4623a98a432b8b4525b118c6b24c87d90_amd64",
"product_identification_helper": {
"purl": "pkg:oci/oadp-velero-plugin-for-gcp-rhel8@sha256:82ebe14f59b19d628ecbe63a212ecaf4623a98a432b8b4525b118c6b24c87d90?arch=amd64\u0026repository_url=registry.redhat.io/oadp/oadp-velero-plugin-for-gcp-rhel8\u0026tag=1.0.7-2"
}
}
},
{
"category": "product_version",
"name": "oadp/oadp-velero-plugin-for-microsoft-azure-rhel8@sha256:1200ba024b3301c4ea18817c81e06133a52bcc7565302ebf9aa4677080b64e56_amd64",
"product": {
"name": "oadp/oadp-velero-plugin-for-microsoft-azure-rhel8@sha256:1200ba024b3301c4ea18817c81e06133a52bcc7565302ebf9aa4677080b64e56_amd64",
"product_id": "oadp/oadp-velero-plugin-for-microsoft-azure-rhel8@sha256:1200ba024b3301c4ea18817c81e06133a52bcc7565302ebf9aa4677080b64e56_amd64",
"product_identification_helper": {
"purl": "pkg:oci/oadp-velero-plugin-for-microsoft-azure-rhel8@sha256:1200ba024b3301c4ea18817c81e06133a52bcc7565302ebf9aa4677080b64e56?arch=amd64\u0026repository_url=registry.redhat.io/oadp/oadp-velero-plugin-for-microsoft-azure-rhel8\u0026tag=1.0.7-2"
}
}
},
{
"category": "product_version",
"name": "oadp/oadp-velero-restic-restore-helper-rhel8@sha256:9fda0732f74519e71a4f10f10b32a451f01c3bf9eae37f7bd1ff90ad8baf3a9f_amd64",
"product": {
"name": "oadp/oadp-velero-restic-restore-helper-rhel8@sha256:9fda0732f74519e71a4f10f10b32a451f01c3bf9eae37f7bd1ff90ad8baf3a9f_amd64",
"product_id": "oadp/oadp-velero-restic-restore-helper-rhel8@sha256:9fda0732f74519e71a4f10f10b32a451f01c3bf9eae37f7bd1ff90ad8baf3a9f_amd64",
"product_identification_helper": {
"purl": "pkg:oci/oadp-velero-restic-restore-helper-rhel8@sha256:9fda0732f74519e71a4f10f10b32a451f01c3bf9eae37f7bd1ff90ad8baf3a9f?arch=amd64\u0026repository_url=registry.redhat.io/oadp/oadp-velero-restic-restore-helper-rhel8\u0026tag=1.0.7-5"
}
}
}
],
"category": "architecture",
"name": "amd64"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "oadp/oadp-kubevirt-velero-plugin-rhel8@sha256:3749d7386635cf598147d5021584672ab26761b9dca52ca05b179d47557ac549_amd64 as a component of 8Base-OADP-1.0",
"product_id": "8Base-OADP-1.0:oadp/oadp-kubevirt-velero-plugin-rhel8@sha256:3749d7386635cf598147d5021584672ab26761b9dca52ca05b179d47557ac549_amd64"
},
"product_reference": "oadp/oadp-kubevirt-velero-plugin-rhel8@sha256:3749d7386635cf598147d5021584672ab26761b9dca52ca05b179d47557ac549_amd64",
"relates_to_product_reference": "8Base-OADP-1.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "oadp/oadp-mustgather-rhel8@sha256:f269ee31bf0eb544ccabb2d72d807dc5d6587186d76bb020a00fac20221c7b0f_amd64 as a component of 8Base-OADP-1.0",
"product_id": "8Base-OADP-1.0:oadp/oadp-mustgather-rhel8@sha256:f269ee31bf0eb544ccabb2d72d807dc5d6587186d76bb020a00fac20221c7b0f_amd64"
},
"product_reference": "oadp/oadp-mustgather-rhel8@sha256:f269ee31bf0eb544ccabb2d72d807dc5d6587186d76bb020a00fac20221c7b0f_amd64",
"relates_to_product_reference": "8Base-OADP-1.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "oadp/oadp-operator-bundle@sha256:d0927b9f279ad60a073773ec624dc66db000b3d0b727254fbadb6af3a3c7b646_amd64 as a component of 8Base-OADP-1.0",
"product_id": "8Base-OADP-1.0:oadp/oadp-operator-bundle@sha256:d0927b9f279ad60a073773ec624dc66db000b3d0b727254fbadb6af3a3c7b646_amd64"
},
"product_reference": "oadp/oadp-operator-bundle@sha256:d0927b9f279ad60a073773ec624dc66db000b3d0b727254fbadb6af3a3c7b646_amd64",
"relates_to_product_reference": "8Base-OADP-1.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "oadp/oadp-registry-rhel8@sha256:ea215cbf22a37c2f2b77c9901dc5c7493f1f3a694276f42d11fcefbf045a8b38_amd64 as a component of 8Base-OADP-1.0",
"product_id": "8Base-OADP-1.0:oadp/oadp-registry-rhel8@sha256:ea215cbf22a37c2f2b77c9901dc5c7493f1f3a694276f42d11fcefbf045a8b38_amd64"
},
"product_reference": "oadp/oadp-registry-rhel8@sha256:ea215cbf22a37c2f2b77c9901dc5c7493f1f3a694276f42d11fcefbf045a8b38_amd64",
"relates_to_product_reference": "8Base-OADP-1.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "oadp/oadp-rhel8-operator@sha256:4d983585501df88bd5f602010cb72ea460982b25fa91c05a83f0b711a457661a_amd64 as a component of 8Base-OADP-1.0",
"product_id": "8Base-OADP-1.0:oadp/oadp-rhel8-operator@sha256:4d983585501df88bd5f602010cb72ea460982b25fa91c05a83f0b711a457661a_amd64"
},
"product_reference": "oadp/oadp-rhel8-operator@sha256:4d983585501df88bd5f602010cb72ea460982b25fa91c05a83f0b711a457661a_amd64",
"relates_to_product_reference": "8Base-OADP-1.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "oadp/oadp-velero-plugin-for-aws-rhel8@sha256:1792552893fe7f146f04033f342e9095f0068dd60e1f3a1e2dad9c5111dd28e6_amd64 as a component of 8Base-OADP-1.0",
"product_id": "8Base-OADP-1.0:oadp/oadp-velero-plugin-for-aws-rhel8@sha256:1792552893fe7f146f04033f342e9095f0068dd60e1f3a1e2dad9c5111dd28e6_amd64"
},
"product_reference": "oadp/oadp-velero-plugin-for-aws-rhel8@sha256:1792552893fe7f146f04033f342e9095f0068dd60e1f3a1e2dad9c5111dd28e6_amd64",
"relates_to_product_reference": "8Base-OADP-1.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "oadp/oadp-velero-plugin-for-csi-rhel8@sha256:aed05c3b1e7eee9054ee45b499e2eb31a534979468ba22be46f83459d0dab4ae_amd64 as a component of 8Base-OADP-1.0",
"product_id": "8Base-OADP-1.0:oadp/oadp-velero-plugin-for-csi-rhel8@sha256:aed05c3b1e7eee9054ee45b499e2eb31a534979468ba22be46f83459d0dab4ae_amd64"
},
"product_reference": "oadp/oadp-velero-plugin-for-csi-rhel8@sha256:aed05c3b1e7eee9054ee45b499e2eb31a534979468ba22be46f83459d0dab4ae_amd64",
"relates_to_product_reference": "8Base-OADP-1.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "oadp/oadp-velero-plugin-for-gcp-rhel8@sha256:82ebe14f59b19d628ecbe63a212ecaf4623a98a432b8b4525b118c6b24c87d90_amd64 as a component of 8Base-OADP-1.0",
"product_id": "8Base-OADP-1.0:oadp/oadp-velero-plugin-for-gcp-rhel8@sha256:82ebe14f59b19d628ecbe63a212ecaf4623a98a432b8b4525b118c6b24c87d90_amd64"
},
"product_reference": "oadp/oadp-velero-plugin-for-gcp-rhel8@sha256:82ebe14f59b19d628ecbe63a212ecaf4623a98a432b8b4525b118c6b24c87d90_amd64",
"relates_to_product_reference": "8Base-OADP-1.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "oadp/oadp-velero-plugin-for-microsoft-azure-rhel8@sha256:1200ba024b3301c4ea18817c81e06133a52bcc7565302ebf9aa4677080b64e56_amd64 as a component of 8Base-OADP-1.0",
"product_id": "8Base-OADP-1.0:oadp/oadp-velero-plugin-for-microsoft-azure-rhel8@sha256:1200ba024b3301c4ea18817c81e06133a52bcc7565302ebf9aa4677080b64e56_amd64"
},
"product_reference": "oadp/oadp-velero-plugin-for-microsoft-azure-rhel8@sha256:1200ba024b3301c4ea18817c81e06133a52bcc7565302ebf9aa4677080b64e56_amd64",
"relates_to_product_reference": "8Base-OADP-1.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "oadp/oadp-velero-plugin-rhel8@sha256:d9a46e3da52db4880cde8faa6f5e406039e6f38585dd14dc97db4b5846b4f7e5_amd64 as a component of 8Base-OADP-1.0",
"product_id": "8Base-OADP-1.0:oadp/oadp-velero-plugin-rhel8@sha256:d9a46e3da52db4880cde8faa6f5e406039e6f38585dd14dc97db4b5846b4f7e5_amd64"
},
"product_reference": "oadp/oadp-velero-plugin-rhel8@sha256:d9a46e3da52db4880cde8faa6f5e406039e6f38585dd14dc97db4b5846b4f7e5_amd64",
"relates_to_product_reference": "8Base-OADP-1.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "oadp/oadp-velero-restic-restore-helper-rhel8@sha256:9fda0732f74519e71a4f10f10b32a451f01c3bf9eae37f7bd1ff90ad8baf3a9f_amd64 as a component of 8Base-OADP-1.0",
"product_id": "8Base-OADP-1.0:oadp/oadp-velero-restic-restore-helper-rhel8@sha256:9fda0732f74519e71a4f10f10b32a451f01c3bf9eae37f7bd1ff90ad8baf3a9f_amd64"
},
"product_reference": "oadp/oadp-velero-restic-restore-helper-rhel8@sha256:9fda0732f74519e71a4f10f10b32a451f01c3bf9eae37f7bd1ff90ad8baf3a9f_amd64",
"relates_to_product_reference": "8Base-OADP-1.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "oadp/oadp-velero-rhel8@sha256:a5973be01956a09f75bcd65481d484c12fd7bcefad5b852fd0567f6d8b51f0be_amd64 as a component of 8Base-OADP-1.0",
"product_id": "8Base-OADP-1.0:oadp/oadp-velero-rhel8@sha256:a5973be01956a09f75bcd65481d484c12fd7bcefad5b852fd0567f6d8b51f0be_amd64"
},
"product_reference": "oadp/oadp-velero-rhel8@sha256:a5973be01956a09f75bcd65481d484c12fd7bcefad5b852fd0567f6d8b51f0be_amd64",
"relates_to_product_reference": "8Base-OADP-1.0"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2022-32149",
"cwe": {
"id": "CWE-407",
"name": "Inefficient Algorithmic Complexity"
},
"discovery_date": "2022-10-12T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-OADP-1.0:oadp/oadp-kubevirt-velero-plugin-rhel8@sha256:3749d7386635cf598147d5021584672ab26761b9dca52ca05b179d47557ac549_amd64",
"8Base-OADP-1.0:oadp/oadp-mustgather-rhel8@sha256:f269ee31bf0eb544ccabb2d72d807dc5d6587186d76bb020a00fac20221c7b0f_amd64",
"8Base-OADP-1.0:oadp/oadp-operator-bundle@sha256:d0927b9f279ad60a073773ec624dc66db000b3d0b727254fbadb6af3a3c7b646_amd64",
"8Base-OADP-1.0:oadp/oadp-registry-rhel8@sha256:ea215cbf22a37c2f2b77c9901dc5c7493f1f3a694276f42d11fcefbf045a8b38_amd64",
"8Base-OADP-1.0:oadp/oadp-rhel8-operator@sha256:4d983585501df88bd5f602010cb72ea460982b25fa91c05a83f0b711a457661a_amd64",
"8Base-OADP-1.0:oadp/oadp-velero-plugin-for-aws-rhel8@sha256:1792552893fe7f146f04033f342e9095f0068dd60e1f3a1e2dad9c5111dd28e6_amd64",
"8Base-OADP-1.0:oadp/oadp-velero-plugin-for-csi-rhel8@sha256:aed05c3b1e7eee9054ee45b499e2eb31a534979468ba22be46f83459d0dab4ae_amd64",
"8Base-OADP-1.0:oadp/oadp-velero-plugin-for-gcp-rhel8@sha256:82ebe14f59b19d628ecbe63a212ecaf4623a98a432b8b4525b118c6b24c87d90_amd64",
"8Base-OADP-1.0:oadp/oadp-velero-plugin-for-microsoft-azure-rhel8@sha256:1200ba024b3301c4ea18817c81e06133a52bcc7565302ebf9aa4677080b64e56_amd64",
"8Base-OADP-1.0:oadp/oadp-velero-plugin-rhel8@sha256:d9a46e3da52db4880cde8faa6f5e406039e6f38585dd14dc97db4b5846b4f7e5_amd64",
"8Base-OADP-1.0:oadp/oadp-velero-restic-restore-helper-rhel8@sha256:9fda0732f74519e71a4f10f10b32a451f01c3bf9eae37f7bd1ff90ad8baf3a9f_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2134010"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in the golang.org/x/text/language package. An attacker can craft an Accept-Language header which ParseAcceptLanguage will take significant time to parse. This issue leads to a denial of service, and can impact availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: golang.org/x/text/language: ParseAcceptLanguage takes a long time to parse complex tags",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "After careful analysis of the vulnerability Redhat is choosing to keep the vulnerability severity as moderate,the vulnerability exists in the ParseAcceptLanguage function of the golang text/language package,when an attacker could craft an unusually large accept header and due to the parser taking quadratic time complexity to finish, firstly the attacker would have to find a way smuggle an input to the parser and even then this would simply not result in a crash of any kind but more of resource hang which while can be unpleasant,does not equate to any real world damage.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-OADP-1.0:oadp/oadp-velero-rhel8@sha256:a5973be01956a09f75bcd65481d484c12fd7bcefad5b852fd0567f6d8b51f0be_amd64"
],
"known_not_affected": [
"8Base-OADP-1.0:oadp/oadp-kubevirt-velero-plugin-rhel8@sha256:3749d7386635cf598147d5021584672ab26761b9dca52ca05b179d47557ac549_amd64",
"8Base-OADP-1.0:oadp/oadp-mustgather-rhel8@sha256:f269ee31bf0eb544ccabb2d72d807dc5d6587186d76bb020a00fac20221c7b0f_amd64",
"8Base-OADP-1.0:oadp/oadp-operator-bundle@sha256:d0927b9f279ad60a073773ec624dc66db000b3d0b727254fbadb6af3a3c7b646_amd64",
"8Base-OADP-1.0:oadp/oadp-registry-rhel8@sha256:ea215cbf22a37c2f2b77c9901dc5c7493f1f3a694276f42d11fcefbf045a8b38_amd64",
"8Base-OADP-1.0:oadp/oadp-rhel8-operator@sha256:4d983585501df88bd5f602010cb72ea460982b25fa91c05a83f0b711a457661a_amd64",
"8Base-OADP-1.0:oadp/oadp-velero-plugin-for-aws-rhel8@sha256:1792552893fe7f146f04033f342e9095f0068dd60e1f3a1e2dad9c5111dd28e6_amd64",
"8Base-OADP-1.0:oadp/oadp-velero-plugin-for-csi-rhel8@sha256:aed05c3b1e7eee9054ee45b499e2eb31a534979468ba22be46f83459d0dab4ae_amd64",
"8Base-OADP-1.0:oadp/oadp-velero-plugin-for-gcp-rhel8@sha256:82ebe14f59b19d628ecbe63a212ecaf4623a98a432b8b4525b118c6b24c87d90_amd64",
"8Base-OADP-1.0:oadp/oadp-velero-plugin-for-microsoft-azure-rhel8@sha256:1200ba024b3301c4ea18817c81e06133a52bcc7565302ebf9aa4677080b64e56_amd64",
"8Base-OADP-1.0:oadp/oadp-velero-plugin-rhel8@sha256:d9a46e3da52db4880cde8faa6f5e406039e6f38585dd14dc97db4b5846b4f7e5_amd64",
"8Base-OADP-1.0:oadp/oadp-velero-restic-restore-helper-rhel8@sha256:9fda0732f74519e71a4f10f10b32a451f01c3bf9eae37f7bd1ff90ad8baf3a9f_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-32149"
},
{
"category": "external",
"summary": "RHBZ#2134010",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2134010"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-32149",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32149"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-32149",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-32149"
},
{
"category": "external",
"summary": "https://go.dev/issue/56152",
"url": "https://go.dev/issue/56152"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-dev/c/qfPIly0X7aU",
"url": "https://groups.google.com/g/golang-dev/c/qfPIly0X7aU"
}
],
"release_date": "2022-10-11T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-02-09T01:07:26+00:00",
"details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"8Base-OADP-1.0:oadp/oadp-velero-rhel8@sha256:a5973be01956a09f75bcd65481d484c12fd7bcefad5b852fd0567f6d8b51f0be_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:0692"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"8Base-OADP-1.0:oadp/oadp-kubevirt-velero-plugin-rhel8@sha256:3749d7386635cf598147d5021584672ab26761b9dca52ca05b179d47557ac549_amd64",
"8Base-OADP-1.0:oadp/oadp-mustgather-rhel8@sha256:f269ee31bf0eb544ccabb2d72d807dc5d6587186d76bb020a00fac20221c7b0f_amd64",
"8Base-OADP-1.0:oadp/oadp-operator-bundle@sha256:d0927b9f279ad60a073773ec624dc66db000b3d0b727254fbadb6af3a3c7b646_amd64",
"8Base-OADP-1.0:oadp/oadp-registry-rhel8@sha256:ea215cbf22a37c2f2b77c9901dc5c7493f1f3a694276f42d11fcefbf045a8b38_amd64",
"8Base-OADP-1.0:oadp/oadp-rhel8-operator@sha256:4d983585501df88bd5f602010cb72ea460982b25fa91c05a83f0b711a457661a_amd64",
"8Base-OADP-1.0:oadp/oadp-velero-plugin-for-aws-rhel8@sha256:1792552893fe7f146f04033f342e9095f0068dd60e1f3a1e2dad9c5111dd28e6_amd64",
"8Base-OADP-1.0:oadp/oadp-velero-plugin-for-csi-rhel8@sha256:aed05c3b1e7eee9054ee45b499e2eb31a534979468ba22be46f83459d0dab4ae_amd64",
"8Base-OADP-1.0:oadp/oadp-velero-plugin-for-gcp-rhel8@sha256:82ebe14f59b19d628ecbe63a212ecaf4623a98a432b8b4525b118c6b24c87d90_amd64",
"8Base-OADP-1.0:oadp/oadp-velero-plugin-for-microsoft-azure-rhel8@sha256:1200ba024b3301c4ea18817c81e06133a52bcc7565302ebf9aa4677080b64e56_amd64",
"8Base-OADP-1.0:oadp/oadp-velero-plugin-rhel8@sha256:d9a46e3da52db4880cde8faa6f5e406039e6f38585dd14dc97db4b5846b4f7e5_amd64",
"8Base-OADP-1.0:oadp/oadp-velero-restic-restore-helper-rhel8@sha256:9fda0732f74519e71a4f10f10b32a451f01c3bf9eae37f7bd1ff90ad8baf3a9f_amd64",
"8Base-OADP-1.0:oadp/oadp-velero-rhel8@sha256:a5973be01956a09f75bcd65481d484c12fd7bcefad5b852fd0567f6d8b51f0be_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "golang: golang.org/x/text/language: ParseAcceptLanguage takes a long time to parse complex tags"
},
{
"cve": "CVE-2022-41717",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"discovery_date": "2023-01-16T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-OADP-1.0:oadp/oadp-kubevirt-velero-plugin-rhel8@sha256:3749d7386635cf598147d5021584672ab26761b9dca52ca05b179d47557ac549_amd64",
"8Base-OADP-1.0:oadp/oadp-mustgather-rhel8@sha256:f269ee31bf0eb544ccabb2d72d807dc5d6587186d76bb020a00fac20221c7b0f_amd64",
"8Base-OADP-1.0:oadp/oadp-operator-bundle@sha256:d0927b9f279ad60a073773ec624dc66db000b3d0b727254fbadb6af3a3c7b646_amd64",
"8Base-OADP-1.0:oadp/oadp-rhel8-operator@sha256:4d983585501df88bd5f602010cb72ea460982b25fa91c05a83f0b711a457661a_amd64",
"8Base-OADP-1.0:oadp/oadp-velero-plugin-for-aws-rhel8@sha256:1792552893fe7f146f04033f342e9095f0068dd60e1f3a1e2dad9c5111dd28e6_amd64",
"8Base-OADP-1.0:oadp/oadp-velero-plugin-for-csi-rhel8@sha256:aed05c3b1e7eee9054ee45b499e2eb31a534979468ba22be46f83459d0dab4ae_amd64",
"8Base-OADP-1.0:oadp/oadp-velero-plugin-for-gcp-rhel8@sha256:82ebe14f59b19d628ecbe63a212ecaf4623a98a432b8b4525b118c6b24c87d90_amd64",
"8Base-OADP-1.0:oadp/oadp-velero-plugin-for-microsoft-azure-rhel8@sha256:1200ba024b3301c4ea18817c81e06133a52bcc7565302ebf9aa4677080b64e56_amd64",
"8Base-OADP-1.0:oadp/oadp-velero-plugin-rhel8@sha256:d9a46e3da52db4880cde8faa6f5e406039e6f38585dd14dc97db4b5846b4f7e5_amd64",
"8Base-OADP-1.0:oadp/oadp-velero-restic-restore-helper-rhel8@sha256:9fda0732f74519e71a4f10f10b32a451f01c3bf9eae37f7bd1ff90ad8baf3a9f_amd64",
"8Base-OADP-1.0:oadp/oadp-velero-rhel8@sha256:a5973be01956a09f75bcd65481d484c12fd7bcefad5b852fd0567f6d8b51f0be_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2161274"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the net/http library of the golang package. This flaw allows an attacker to cause excessive memory growth in a Go server accepting HTTP/2 requests. HTTP/2 server connections contain a cache of HTTP header keys sent by the client. While the total number of entries in this cache is capped, an attacker sending very large keys can cause the server to allocate approximately 64 MiB per open connection.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: net/http: excessive memory growth in a Go server accepting HTTP/2 requests",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Within Red Hat OpenShift Container Platform, the grafana container is listed as will not fix. Since OCP 4.10, Grafana itself is not shipped and the Grafana web server is protected behind an OAuth proxy server.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-OADP-1.0:oadp/oadp-registry-rhel8@sha256:ea215cbf22a37c2f2b77c9901dc5c7493f1f3a694276f42d11fcefbf045a8b38_amd64"
],
"known_not_affected": [
"8Base-OADP-1.0:oadp/oadp-kubevirt-velero-plugin-rhel8@sha256:3749d7386635cf598147d5021584672ab26761b9dca52ca05b179d47557ac549_amd64",
"8Base-OADP-1.0:oadp/oadp-mustgather-rhel8@sha256:f269ee31bf0eb544ccabb2d72d807dc5d6587186d76bb020a00fac20221c7b0f_amd64",
"8Base-OADP-1.0:oadp/oadp-operator-bundle@sha256:d0927b9f279ad60a073773ec624dc66db000b3d0b727254fbadb6af3a3c7b646_amd64",
"8Base-OADP-1.0:oadp/oadp-rhel8-operator@sha256:4d983585501df88bd5f602010cb72ea460982b25fa91c05a83f0b711a457661a_amd64",
"8Base-OADP-1.0:oadp/oadp-velero-plugin-for-aws-rhel8@sha256:1792552893fe7f146f04033f342e9095f0068dd60e1f3a1e2dad9c5111dd28e6_amd64",
"8Base-OADP-1.0:oadp/oadp-velero-plugin-for-csi-rhel8@sha256:aed05c3b1e7eee9054ee45b499e2eb31a534979468ba22be46f83459d0dab4ae_amd64",
"8Base-OADP-1.0:oadp/oadp-velero-plugin-for-gcp-rhel8@sha256:82ebe14f59b19d628ecbe63a212ecaf4623a98a432b8b4525b118c6b24c87d90_amd64",
"8Base-OADP-1.0:oadp/oadp-velero-plugin-for-microsoft-azure-rhel8@sha256:1200ba024b3301c4ea18817c81e06133a52bcc7565302ebf9aa4677080b64e56_amd64",
"8Base-OADP-1.0:oadp/oadp-velero-plugin-rhel8@sha256:d9a46e3da52db4880cde8faa6f5e406039e6f38585dd14dc97db4b5846b4f7e5_amd64",
"8Base-OADP-1.0:oadp/oadp-velero-restic-restore-helper-rhel8@sha256:9fda0732f74519e71a4f10f10b32a451f01c3bf9eae37f7bd1ff90ad8baf3a9f_amd64",
"8Base-OADP-1.0:oadp/oadp-velero-rhel8@sha256:a5973be01956a09f75bcd65481d484c12fd7bcefad5b852fd0567f6d8b51f0be_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-41717"
},
{
"category": "external",
"summary": "RHBZ#2161274",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2161274"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-41717",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41717"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-41717",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-41717"
},
{
"category": "external",
"summary": "https://go.dev/cl/455635",
"url": "https://go.dev/cl/455635"
},
{
"category": "external",
"summary": "https://go.dev/cl/455717",
"url": "https://go.dev/cl/455717"
},
{
"category": "external",
"summary": "https://go.dev/issue/56350",
"url": "https://go.dev/issue/56350"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/L_3rmdT0BMU/m/yZDrXjIiBQAJ",
"url": "https://groups.google.com/g/golang-announce/c/L_3rmdT0BMU/m/yZDrXjIiBQAJ"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2022-1144",
"url": "https://pkg.go.dev/vuln/GO-2022-1144"
}
],
"release_date": "2022-11-30T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-02-09T01:07:26+00:00",
"details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"8Base-OADP-1.0:oadp/oadp-registry-rhel8@sha256:ea215cbf22a37c2f2b77c9901dc5c7493f1f3a694276f42d11fcefbf045a8b38_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:0692"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"8Base-OADP-1.0:oadp/oadp-kubevirt-velero-plugin-rhel8@sha256:3749d7386635cf598147d5021584672ab26761b9dca52ca05b179d47557ac549_amd64",
"8Base-OADP-1.0:oadp/oadp-mustgather-rhel8@sha256:f269ee31bf0eb544ccabb2d72d807dc5d6587186d76bb020a00fac20221c7b0f_amd64",
"8Base-OADP-1.0:oadp/oadp-operator-bundle@sha256:d0927b9f279ad60a073773ec624dc66db000b3d0b727254fbadb6af3a3c7b646_amd64",
"8Base-OADP-1.0:oadp/oadp-registry-rhel8@sha256:ea215cbf22a37c2f2b77c9901dc5c7493f1f3a694276f42d11fcefbf045a8b38_amd64",
"8Base-OADP-1.0:oadp/oadp-rhel8-operator@sha256:4d983585501df88bd5f602010cb72ea460982b25fa91c05a83f0b711a457661a_amd64",
"8Base-OADP-1.0:oadp/oadp-velero-plugin-for-aws-rhel8@sha256:1792552893fe7f146f04033f342e9095f0068dd60e1f3a1e2dad9c5111dd28e6_amd64",
"8Base-OADP-1.0:oadp/oadp-velero-plugin-for-csi-rhel8@sha256:aed05c3b1e7eee9054ee45b499e2eb31a534979468ba22be46f83459d0dab4ae_amd64",
"8Base-OADP-1.0:oadp/oadp-velero-plugin-for-gcp-rhel8@sha256:82ebe14f59b19d628ecbe63a212ecaf4623a98a432b8b4525b118c6b24c87d90_amd64",
"8Base-OADP-1.0:oadp/oadp-velero-plugin-for-microsoft-azure-rhel8@sha256:1200ba024b3301c4ea18817c81e06133a52bcc7565302ebf9aa4677080b64e56_amd64",
"8Base-OADP-1.0:oadp/oadp-velero-plugin-rhel8@sha256:d9a46e3da52db4880cde8faa6f5e406039e6f38585dd14dc97db4b5846b4f7e5_amd64",
"8Base-OADP-1.0:oadp/oadp-velero-restic-restore-helper-rhel8@sha256:9fda0732f74519e71a4f10f10b32a451f01c3bf9eae37f7bd1ff90ad8baf3a9f_amd64",
"8Base-OADP-1.0:oadp/oadp-velero-rhel8@sha256:a5973be01956a09f75bcd65481d484c12fd7bcefad5b852fd0567f6d8b51f0be_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "golang: net/http: excessive memory growth in a Go server accepting HTTP/2 requests"
}
]
}
rhsa-2023:3205
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Red Hat OpenShift Virtualization release 4.13.0 is now available with updates to packages and images that fix several bugs and add enhancements.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "OpenShift Virtualization is Red Hat\u0027s virtualization solution designed for Red Hat OpenShift Container Platform.\n\nThis advisory contains OpenShift Virtualization 4.13.0 images.\n\nSecurity Fix(es):\n\n* golang: archive/tar: unbounded memory consumption when reading headers (CVE-2022-2879)\n\n* golang: net/http/httputil: ReverseProxy should not forward unparseable query parameters (CVE-2022-2880)\n\n* golang: net/http: handle server errors after sending GOAWAY (CVE-2022-27664)\n\n* golang: golang.org/x/text/language: ParseAcceptLanguage takes a long time to parse complex tags (CVE-2022-32149)\n\n* golang: net/url: JoinPath does not strip relative path components in all circumstances (CVE-2022-32190)\n\n* golang: regexp/syntax: limit memory used by parsing regexps (CVE-2022-41715)\n\n* golang: net/http: excessive memory growth in a Go server accepting HTTP/2 requests (CVE-2022-41717)\n\n* golang: math/big: decoding big.Float and big.Rat types can panic if the encoded message is too short, potentially allowing a denial of service (CVE-2022-32189)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nThis update also fixes several bugs and adds various enhancements. Documentation for these changes is available from the Release Notes document linked to in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2023:3205",
"url": "https://access.redhat.com/errata/RHSA-2023:3205"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#moderate",
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "2023393",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2023393"
},
{
"category": "external",
"summary": "2029391",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2029391"
},
{
"category": "external",
"summary": "2052556",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2052556"
},
{
"category": "external",
"summary": "2060499",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2060499"
},
{
"category": "external",
"summary": "2070132",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2070132"
},
{
"category": "external",
"summary": "2087540",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2087540"
},
{
"category": "external",
"summary": "2101390",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2101390"
},
{
"category": "external",
"summary": "2104424",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2104424"
},
{
"category": "external",
"summary": "2104479",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2104479"
},
{
"category": "external",
"summary": "2104859",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2104859"
},
{
"category": "external",
"summary": "2110562",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2110562"
},
{
"category": "external",
"summary": "2111794",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2111794"
},
{
"category": "external",
"summary": "2113814",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2113814"
},
{
"category": "external",
"summary": "2114922",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2114922"
},
{
"category": "external",
"summary": "2116562",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2116562"
},
{
"category": "external",
"summary": "2117803",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2117803"
},
{
"category": "external",
"summary": "2122119",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2122119"
},
{
"category": "external",
"summary": "2122168",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2122168"
},
{
"category": "external",
"summary": "2123209",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2123209"
},
{
"category": "external",
"summary": "2124668",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2124668"
},
{
"category": "external",
"summary": "2124669",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2124669"
},
{
"category": "external",
"summary": "2132867",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2132867"
},
{
"category": "external",
"summary": "2132868",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2132868"
},
{
"category": "external",
"summary": "2132872",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2132872"
},
{
"category": "external",
"summary": "2132873",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2132873"
},
{
"category": "external",
"summary": "2134010",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2134010"
},
{
"category": "external",
"summary": "2138199",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2138199"
},
{
"category": "external",
"summary": "2138653",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2138653"
},
{
"category": "external",
"summary": "2138664",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2138664"
},
{
"category": "external",
"summary": "2139235",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2139235"
},
{
"category": "external",
"summary": "2139257",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2139257"
},
{
"category": "external",
"summary": "2139260",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2139260"
},
{
"category": "external",
"summary": "2139293",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2139293"
},
{
"category": "external",
"summary": "2139296",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2139296"
},
{
"category": "external",
"summary": "2139299",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2139299"
},
{
"category": "external",
"summary": "2139306",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2139306"
},
{
"category": "external",
"summary": "2139479",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2139479"
},
{
"category": "external",
"summary": "2139574",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2139574"
},
{
"category": "external",
"summary": "2139651",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2139651"
},
{
"category": "external",
"summary": "2139687",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2139687"
},
{
"category": "external",
"summary": "2139820",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2139820"
},
{
"category": "external",
"summary": "2140730",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2140730"
},
{
"category": "external",
"summary": "2140977",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2140977"
},
{
"category": "external",
"summary": "2140982",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2140982"
},
{
"category": "external",
"summary": "2140998",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2140998"
},
{
"category": "external",
"summary": "2142511",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2142511"
},
{
"category": "external",
"summary": "2143039",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2143039"
},
{
"category": "external",
"summary": "2143498",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2143498"
},
{
"category": "external",
"summary": "2143716",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2143716"
},
{
"category": "external",
"summary": "2144580",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2144580"
},
{
"category": "external",
"summary": "2145092",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2145092"
},
{
"category": "external",
"summary": "2145126",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2145126"
},
{
"category": "external",
"summary": "2145137",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2145137"
},
{
"category": "external",
"summary": "2145223",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2145223"
},
{
"category": "external",
"summary": "2147582",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2147582"
},
{
"category": "external",
"summary": "2148322",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2148322"
},
{
"category": "external",
"summary": "2148849",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2148849"
},
{
"category": "external",
"summary": "2148850",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2148850"
},
{
"category": "external",
"summary": "2149118",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2149118"
},
{
"category": "external",
"summary": "2149201",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2149201"
},
{
"category": "external",
"summary": "2149227",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2149227"
},
{
"category": "external",
"summary": "2149897",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2149897"
},
{
"category": "external",
"summary": "2150364",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2150364"
},
{
"category": "external",
"summary": "2150653",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2150653"
},
{
"category": "external",
"summary": "2150832",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2150832"
},
{
"category": "external",
"summary": "2151053",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2151053"
},
{
"category": "external",
"summary": "2151056",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2151056"
},
{
"category": "external",
"summary": "2151427",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2151427"
},
{
"category": "external",
"summary": "2151508",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2151508"
},
{
"category": "external",
"summary": "2151521",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2151521"
},
{
"category": "external",
"summary": "2151759",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2151759"
},
{
"category": "external",
"summary": "2151766",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2151766"
},
{
"category": "external",
"summary": "2151831",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2151831"
},
{
"category": "external",
"summary": "2152122",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2152122"
},
{
"category": "external",
"summary": "2152534",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2152534"
},
{
"category": "external",
"summary": "2152537",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2152537"
},
{
"category": "external",
"summary": "2155403",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2155403"
},
{
"category": "external",
"summary": "2155409",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2155409"
},
{
"category": "external",
"summary": "2155796",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2155796"
},
{
"category": "external",
"summary": "2156392",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2156392"
},
{
"category": "external",
"summary": "2156902",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2156902"
},
{
"category": "external",
"summary": "2158060",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2158060"
},
{
"category": "external",
"summary": "2158079",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2158079"
},
{
"category": "external",
"summary": "2158362",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2158362"
},
{
"category": "external",
"summary": "2158424",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2158424"
},
{
"category": "external",
"summary": "2158515",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2158515"
},
{
"category": "external",
"summary": "2159715",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2159715"
},
{
"category": "external",
"summary": "2159975",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2159975"
},
{
"category": "external",
"summary": "2160298",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2160298"
},
{
"category": "external",
"summary": "2161274",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2161274"
},
{
"category": "external",
"summary": "2161340",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2161340"
},
{
"category": "external",
"summary": "2162016",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2162016"
},
{
"category": "external",
"summary": "2162333",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2162333"
},
{
"category": "external",
"summary": "2163460",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2163460"
},
{
"category": "external",
"summary": "2164590",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2164590"
},
{
"category": "external",
"summary": "2164807",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2164807"
},
{
"category": "external",
"summary": "2164814",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2164814"
},
{
"category": "external",
"summary": "2164838",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2164838"
},
{
"category": "external",
"summary": "2165618",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2165618"
},
{
"category": "external",
"summary": "2165943",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2165943"
},
{
"category": "external",
"summary": "2166165",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2166165"
},
{
"category": "external",
"summary": "2166394",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2166394"
},
{
"category": "external",
"summary": "2166507",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2166507"
},
{
"category": "external",
"summary": "2166508",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2166508"
},
{
"category": "external",
"summary": "2166512",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2166512"
},
{
"category": "external",
"summary": "2167012",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2167012"
},
{
"category": "external",
"summary": "2167226",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2167226"
},
{
"category": "external",
"summary": "2167251",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2167251"
},
{
"category": "external",
"summary": "2167661",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2167661"
},
{
"category": "external",
"summary": "2167979",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2167979"
},
{
"category": "external",
"summary": "2168032",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2168032"
},
{
"category": "external",
"summary": "2168111",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2168111"
},
{
"category": "external",
"summary": "2168165",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2168165"
},
{
"category": "external",
"summary": "2168180",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2168180"
},
{
"category": "external",
"summary": "2168480",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2168480"
},
{
"category": "external",
"summary": "2168484",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2168484"
},
{
"category": "external",
"summary": "2168486",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2168486"
},
{
"category": "external",
"summary": "2168488",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2168488"
},
{
"category": "external",
"summary": "2168561",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2168561"
},
{
"category": "external",
"summary": "2168770",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2168770"
},
{
"category": "external",
"summary": "2168859",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2168859"
},
{
"category": "external",
"summary": "2168861",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2168861"
},
{
"category": "external",
"summary": "2169699",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2169699"
},
{
"category": "external",
"summary": "2169880",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2169880"
},
{
"category": "external",
"summary": "2170703",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2170703"
},
{
"category": "external",
"summary": "2170740",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2170740"
},
{
"category": "external",
"summary": "2171395",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2171395"
},
{
"category": "external",
"summary": "2172371",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2172371"
},
{
"category": "external",
"summary": "2172375",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2172375"
},
{
"category": "external",
"summary": "2172612",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2172612"
},
{
"category": "external",
"summary": "2172842",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2172842"
},
{
"category": "external",
"summary": "2172952",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2172952"
},
{
"category": "external",
"summary": "2173527",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2173527"
},
{
"category": "external",
"summary": "2173562",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2173562"
},
{
"category": "external",
"summary": "2173563",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2173563"
},
{
"category": "external",
"summary": "2173593",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2173593"
},
{
"category": "external",
"summary": "2173595",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2173595"
},
{
"category": "external",
"summary": "2174288",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2174288"
},
{
"category": "external",
"summary": "2174324",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2174324"
},
{
"category": "external",
"summary": "2174334",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2174334"
},
{
"category": "external",
"summary": "2174619",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2174619"
},
{
"category": "external",
"summary": "2174636",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2174636"
},
{
"category": "external",
"summary": "2174742",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2174742"
},
{
"category": "external",
"summary": "2175054",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2175054"
},
{
"category": "external",
"summary": "2175171",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2175171"
},
{
"category": "external",
"summary": "2175256",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2175256"
},
{
"category": "external",
"summary": "2175274",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2175274"
},
{
"category": "external",
"summary": "2175571",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2175571"
},
{
"category": "external",
"summary": "2175601",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2175601"
},
{
"category": "external",
"summary": "2175636",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2175636"
},
{
"category": "external",
"summary": "2175641",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2175641"
},
{
"category": "external",
"summary": "2175643",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2175643"
},
{
"category": "external",
"summary": "2175888",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2175888"
},
{
"category": "external",
"summary": "2175890",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2175890"
},
{
"category": "external",
"summary": "2175974",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2175974"
},
{
"category": "external",
"summary": "2175976",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2175976"
},
{
"category": "external",
"summary": "2175977",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2175977"
},
{
"category": "external",
"summary": "2175979",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2175979"
},
{
"category": "external",
"summary": "2175983",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2175983"
},
{
"category": "external",
"summary": "2175985",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2175985"
},
{
"category": "external",
"summary": "2175986",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2175986"
},
{
"category": "external",
"summary": "2175988",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2175988"
},
{
"category": "external",
"summary": "2176353",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2176353"
},
{
"category": "external",
"summary": "2176355",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2176355"
},
{
"category": "external",
"summary": "2176422",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2176422"
},
{
"category": "external",
"summary": "2176706",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2176706"
},
{
"category": "external",
"summary": "2176708",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2176708"
},
{
"category": "external",
"summary": "2176725",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2176725"
},
{
"category": "external",
"summary": "2176753",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2176753"
},
{
"category": "external",
"summary": "2176804",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2176804"
},
{
"category": "external",
"summary": "2176843",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2176843"
},
{
"category": "external",
"summary": "2177091",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2177091"
},
{
"category": "external",
"summary": "2177578",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2177578"
},
{
"category": "external",
"summary": "2177586",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2177586"
},
{
"category": "external",
"summary": "2177589",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2177589"
},
{
"category": "external",
"summary": "2177668",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2177668"
},
{
"category": "external",
"summary": "2177763",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2177763"
},
{
"category": "external",
"summary": "2177888",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2177888"
},
{
"category": "external",
"summary": "2177961",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2177961"
},
{
"category": "external",
"summary": "2177973",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2177973"
},
{
"category": "external",
"summary": "2178037",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2178037"
},
{
"category": "external",
"summary": "2178628",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2178628"
},
{
"category": "external",
"summary": "2178629",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2178629"
},
{
"category": "external",
"summary": "2179225",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2179225"
},
{
"category": "external",
"summary": "2179226",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2179226"
},
{
"category": "external",
"summary": "2179565",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2179565"
},
{
"category": "external",
"summary": "2179626",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2179626"
},
{
"category": "external",
"summary": "2179811",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2179811"
},
{
"category": "external",
"summary": "2180146",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2180146"
},
{
"category": "external",
"summary": "2180279",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2180279"
},
{
"category": "external",
"summary": "2180553",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2180553"
},
{
"category": "external",
"summary": "2180853",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2180853"
},
{
"category": "external",
"summary": "2182006",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2182006"
},
{
"category": "external",
"summary": "2182097",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2182097"
},
{
"category": "external",
"summary": "2182534",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2182534"
},
{
"category": "external",
"summary": "2182535",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2182535"
},
{
"category": "external",
"summary": "2182536",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2182536"
},
{
"category": "external",
"summary": "2182538",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2182538"
},
{
"category": "external",
"summary": "2182539",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2182539"
},
{
"category": "external",
"summary": "2182661",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2182661"
},
{
"category": "external",
"summary": "2183026",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2183026"
},
{
"category": "external",
"summary": "2183205",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2183205"
},
{
"category": "external",
"summary": "2183397",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2183397"
},
{
"category": "external",
"summary": "2183968",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2183968"
},
{
"category": "external",
"summary": "2186767",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2186767"
},
{
"category": "external",
"summary": "2187437",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2187437"
},
{
"category": "external",
"summary": "2187547",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2187547"
},
{
"category": "external",
"summary": "2187581",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2187581"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2023/rhsa-2023_3205.json"
}
],
"title": "Red Hat Security Advisory: OpenShift Virtualization 4.13.0 Images security, bug fix, and enhancement update",
"tracking": {
"current_release_date": "2025-10-24T13:32:17+00:00",
"generator": {
"date": "2025-10-24T13:32:17+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.10"
}
},
"id": "RHSA-2023:3205",
"initial_release_date": "2023-05-18T02:55:08+00:00",
"revision_history": [
{
"date": "2023-05-18T02:55:08+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2023-05-18T02:55:08+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-10-24T13:32:17+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "CNV 4.13 for RHEL 9",
"product": {
"name": "CNV 4.13 for RHEL 9",
"product_id": "9Base-CNV-4.13",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:container_native_virtualization:4.13::el9"
}
}
}
],
"category": "product_family",
"name": "OpenShift Virtualization"
},
{
"branches": [
{
"category": "product_version",
"name": "container-native-virtualization/bridge-marker-rhel9@sha256:8eac196b30a648989cdca5cb153a3bc3d34e47339acba0e4f760bd366496c99d_amd64",
"product": {
"name": "container-native-virtualization/bridge-marker-rhel9@sha256:8eac196b30a648989cdca5cb153a3bc3d34e47339acba0e4f760bd366496c99d_amd64",
"product_id": "container-native-virtualization/bridge-marker-rhel9@sha256:8eac196b30a648989cdca5cb153a3bc3d34e47339acba0e4f760bd366496c99d_amd64",
"product_identification_helper": {
"purl": "pkg:oci/bridge-marker-rhel9@sha256:8eac196b30a648989cdca5cb153a3bc3d34e47339acba0e4f760bd366496c99d?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/bridge-marker-rhel9\u0026tag=v4.13.0--2022-101182"
}
}
},
{
"category": "product_version",
"name": "container-native-virtualization/cluster-network-addons-operator-rhel9@sha256:3bff33e3f40cd1e2b519c2db56734d4bb8df883e155c2f20b1cb9d3d184daec1_amd64",
"product": {
"name": "container-native-virtualization/cluster-network-addons-operator-rhel9@sha256:3bff33e3f40cd1e2b519c2db56734d4bb8df883e155c2f20b1cb9d3d184daec1_amd64",
"product_id": "container-native-virtualization/cluster-network-addons-operator-rhel9@sha256:3bff33e3f40cd1e2b519c2db56734d4bb8df883e155c2f20b1cb9d3d184daec1_amd64",
"product_identification_helper": {
"purl": "pkg:oci/cluster-network-addons-operator-rhel9@sha256:3bff33e3f40cd1e2b519c2db56734d4bb8df883e155c2f20b1cb9d3d184daec1?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/cluster-network-addons-operator-rhel9\u0026tag=v4.13.0--2022-101182"
}
}
},
{
"category": "product_version",
"name": "container-native-virtualization/cnv-containernetworking-plugins-rhel9@sha256:bf471997e54e4a75b0d71f492ab295787fdbb14d8c85c4ea8c03f0552dbc3755_amd64",
"product": {
"name": "container-native-virtualization/cnv-containernetworking-plugins-rhel9@sha256:bf471997e54e4a75b0d71f492ab295787fdbb14d8c85c4ea8c03f0552dbc3755_amd64",
"product_id": "container-native-virtualization/cnv-containernetworking-plugins-rhel9@sha256:bf471997e54e4a75b0d71f492ab295787fdbb14d8c85c4ea8c03f0552dbc3755_amd64",
"product_identification_helper": {
"purl": "pkg:oci/cnv-containernetworking-plugins-rhel9@sha256:bf471997e54e4a75b0d71f492ab295787fdbb14d8c85c4ea8c03f0552dbc3755?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/cnv-containernetworking-plugins-rhel9\u0026tag=v4.13.0--2022-101182"
}
}
},
{
"category": "product_version",
"name": "container-native-virtualization/cnv-must-gather-rhel9@sha256:b9fc32b5fabedd65a4c3a471879c808af2087277de4278adaa115a732f0468da_amd64",
"product": {
"name": "container-native-virtualization/cnv-must-gather-rhel9@sha256:b9fc32b5fabedd65a4c3a471879c808af2087277de4278adaa115a732f0468da_amd64",
"product_id": "container-native-virtualization/cnv-must-gather-rhel9@sha256:b9fc32b5fabedd65a4c3a471879c808af2087277de4278adaa115a732f0468da_amd64",
"product_identification_helper": {
"purl": "pkg:oci/cnv-must-gather-rhel9@sha256:b9fc32b5fabedd65a4c3a471879c808af2087277de4278adaa115a732f0468da?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/cnv-must-gather-rhel9\u0026tag=v4.13.0--2022-101182"
}
}
},
{
"category": "product_version",
"name": "container-native-virtualization/hco-bundle-registry-rhel9@sha256:60e89d7a99ff9f20e974430b802dd724a3bb6fa1e01e5a62daad98ac487b3063_amd64",
"product": {
"name": "container-native-virtualization/hco-bundle-registry-rhel9@sha256:60e89d7a99ff9f20e974430b802dd724a3bb6fa1e01e5a62daad98ac487b3063_amd64",
"product_id": "container-native-virtualization/hco-bundle-registry-rhel9@sha256:60e89d7a99ff9f20e974430b802dd724a3bb6fa1e01e5a62daad98ac487b3063_amd64",
"product_identification_helper": {
"purl": "pkg:oci/hco-bundle-registry-rhel9@sha256:60e89d7a99ff9f20e974430b802dd724a3bb6fa1e01e5a62daad98ac487b3063?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/hco-bundle-registry-rhel9\u0026tag=v4.13.0.rhel9--2022-101182"
}
}
},
{
"category": "product_version",
"name": "container-native-virtualization/hostpath-csi-driver-rhel9@sha256:61e2824853d51347593ad909a5e546cd92e4216d6a1df5dffb50dd9cba277cce_amd64",
"product": {
"name": "container-native-virtualization/hostpath-csi-driver-rhel9@sha256:61e2824853d51347593ad909a5e546cd92e4216d6a1df5dffb50dd9cba277cce_amd64",
"product_id": "container-native-virtualization/hostpath-csi-driver-rhel9@sha256:61e2824853d51347593ad909a5e546cd92e4216d6a1df5dffb50dd9cba277cce_amd64",
"product_identification_helper": {
"purl": "pkg:oci/hostpath-csi-driver-rhel9@sha256:61e2824853d51347593ad909a5e546cd92e4216d6a1df5dffb50dd9cba277cce?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/hostpath-csi-driver-rhel9\u0026tag=v4.13.0--2022-101182"
}
}
},
{
"category": "product_version",
"name": "container-native-virtualization/hostpath-provisioner-operator-rhel9@sha256:515be94be496c67f5b8fd5f4832fe4385e56476e6589897d6b9fbb9bb2b00f32_amd64",
"product": {
"name": "container-native-virtualization/hostpath-provisioner-operator-rhel9@sha256:515be94be496c67f5b8fd5f4832fe4385e56476e6589897d6b9fbb9bb2b00f32_amd64",
"product_id": "container-native-virtualization/hostpath-provisioner-operator-rhel9@sha256:515be94be496c67f5b8fd5f4832fe4385e56476e6589897d6b9fbb9bb2b00f32_amd64",
"product_identification_helper": {
"purl": "pkg:oci/hostpath-provisioner-operator-rhel9@sha256:515be94be496c67f5b8fd5f4832fe4385e56476e6589897d6b9fbb9bb2b00f32?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/hostpath-provisioner-operator-rhel9\u0026tag=v4.13.0-37"
}
}
},
{
"category": "product_version",
"name": "container-native-virtualization/hostpath-provisioner-rhel9@sha256:ac3fe350bedd6bc43596444ba0f279ccf8a144ab14ac5a9b80ea71c46390b7b4_amd64",
"product": {
"name": "container-native-virtualization/hostpath-provisioner-rhel9@sha256:ac3fe350bedd6bc43596444ba0f279ccf8a144ab14ac5a9b80ea71c46390b7b4_amd64",
"product_id": "container-native-virtualization/hostpath-provisioner-rhel9@sha256:ac3fe350bedd6bc43596444ba0f279ccf8a144ab14ac5a9b80ea71c46390b7b4_amd64",
"product_identification_helper": {
"purl": "pkg:oci/hostpath-provisioner-rhel9@sha256:ac3fe350bedd6bc43596444ba0f279ccf8a144ab14ac5a9b80ea71c46390b7b4?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/hostpath-provisioner-rhel9\u0026tag=v4.13.0--2022-101182"
}
}
},
{
"category": "product_version",
"name": "container-native-virtualization/hyperconverged-cluster-operator-rhel9@sha256:e5ab9f3be59d3568e3d672ab374efb16990ccf92192eac4e1244b10fcd7423e2_amd64",
"product": {
"name": "container-native-virtualization/hyperconverged-cluster-operator-rhel9@sha256:e5ab9f3be59d3568e3d672ab374efb16990ccf92192eac4e1244b10fcd7423e2_amd64",
"product_id": "container-native-virtualization/hyperconverged-cluster-operator-rhel9@sha256:e5ab9f3be59d3568e3d672ab374efb16990ccf92192eac4e1244b10fcd7423e2_amd64",
"product_identification_helper": {
"purl": "pkg:oci/hyperconverged-cluster-operator-rhel9@sha256:e5ab9f3be59d3568e3d672ab374efb16990ccf92192eac4e1244b10fcd7423e2?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/hyperconverged-cluster-operator-rhel9\u0026tag=v4.13.0--2022-101182"
}
}
},
{
"category": "product_version",
"name": "container-native-virtualization/hyperconverged-cluster-webhook-rhel9@sha256:b5a01336180aad017df62cf8e652f2491b8263ba7e4dd07f858db1ef1924cf2f_amd64",
"product": {
"name": "container-native-virtualization/hyperconverged-cluster-webhook-rhel9@sha256:b5a01336180aad017df62cf8e652f2491b8263ba7e4dd07f858db1ef1924cf2f_amd64",
"product_id": "container-native-virtualization/hyperconverged-cluster-webhook-rhel9@sha256:b5a01336180aad017df62cf8e652f2491b8263ba7e4dd07f858db1ef1924cf2f_amd64",
"product_identification_helper": {
"purl": "pkg:oci/hyperconverged-cluster-webhook-rhel9@sha256:b5a01336180aad017df62cf8e652f2491b8263ba7e4dd07f858db1ef1924cf2f?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/hyperconverged-cluster-webhook-rhel9\u0026tag=v4.13.0--2022-101182"
}
}
},
{
"category": "product_version",
"name": "container-native-virtualization/kubemacpool-rhel9@sha256:4d190d81eeb3fbe9ed56cf3548dc83a3f81641bfdafa7b42dcfb0d2512566644_amd64",
"product": {
"name": "container-native-virtualization/kubemacpool-rhel9@sha256:4d190d81eeb3fbe9ed56cf3548dc83a3f81641bfdafa7b42dcfb0d2512566644_amd64",
"product_id": "container-native-virtualization/kubemacpool-rhel9@sha256:4d190d81eeb3fbe9ed56cf3548dc83a3f81641bfdafa7b42dcfb0d2512566644_amd64",
"product_identification_helper": {
"purl": "pkg:oci/kubemacpool-rhel9@sha256:4d190d81eeb3fbe9ed56cf3548dc83a3f81641bfdafa7b42dcfb0d2512566644?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/kubemacpool-rhel9\u0026tag=v4.13.0--2022-101182"
}
}
},
{
"category": "product_version",
"name": "container-native-virtualization/kubesecondarydns-rhel9@sha256:121d30d78cc57731ea2242ef2c32430890ac66c2723e65608d5e2f26c3f515cd_amd64",
"product": {
"name": "container-native-virtualization/kubesecondarydns-rhel9@sha256:121d30d78cc57731ea2242ef2c32430890ac66c2723e65608d5e2f26c3f515cd_amd64",
"product_id": "container-native-virtualization/kubesecondarydns-rhel9@sha256:121d30d78cc57731ea2242ef2c32430890ac66c2723e65608d5e2f26c3f515cd_amd64",
"product_identification_helper": {
"purl": "pkg:oci/kubesecondarydns-rhel9@sha256:121d30d78cc57731ea2242ef2c32430890ac66c2723e65608d5e2f26c3f515cd?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/kubesecondarydns-rhel9\u0026tag=v4.13.0--2022-101182"
}
}
},
{
"category": "product_version",
"name": "container-native-virtualization/kubevirt-console-plugin-rhel9@sha256:86a4b1e3d6ad1d56302c9c058f8bc5826dcfe6c46fb3e0ddaa06818645039020_amd64",
"product": {
"name": "container-native-virtualization/kubevirt-console-plugin-rhel9@sha256:86a4b1e3d6ad1d56302c9c058f8bc5826dcfe6c46fb3e0ddaa06818645039020_amd64",
"product_id": "container-native-virtualization/kubevirt-console-plugin-rhel9@sha256:86a4b1e3d6ad1d56302c9c058f8bc5826dcfe6c46fb3e0ddaa06818645039020_amd64",
"product_identification_helper": {
"purl": "pkg:oci/kubevirt-console-plugin-rhel9@sha256:86a4b1e3d6ad1d56302c9c058f8bc5826dcfe6c46fb3e0ddaa06818645039020?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/kubevirt-console-plugin-rhel9\u0026tag=v4.13.0--2022-101182"
}
}
},
{
"category": "product_version",
"name": "container-native-virtualization/kubevirt-dpdk-checkup-rhel9@sha256:553c4686f56c66cc1e3c5ad9d4051f139d43f821eac3abb98ca5cdb8b5dfe202_amd64",
"product": {
"name": "container-native-virtualization/kubevirt-dpdk-checkup-rhel9@sha256:553c4686f56c66cc1e3c5ad9d4051f139d43f821eac3abb98ca5cdb8b5dfe202_amd64",
"product_id": "container-native-virtualization/kubevirt-dpdk-checkup-rhel9@sha256:553c4686f56c66cc1e3c5ad9d4051f139d43f821eac3abb98ca5cdb8b5dfe202_amd64",
"product_identification_helper": {
"purl": "pkg:oci/kubevirt-dpdk-checkup-rhel9@sha256:553c4686f56c66cc1e3c5ad9d4051f139d43f821eac3abb98ca5cdb8b5dfe202?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/kubevirt-dpdk-checkup-rhel9\u0026tag=v4.13.0--2022-101182"
}
}
},
{
"category": "product_version",
"name": "container-native-virtualization/kubevirt-ssp-operator-rhel9@sha256:901e6cad9534c7bd7c4018c60bccfe49d7280fba5a9901ab4c4d15e9345288c4_amd64",
"product": {
"name": "container-native-virtualization/kubevirt-ssp-operator-rhel9@sha256:901e6cad9534c7bd7c4018c60bccfe49d7280fba5a9901ab4c4d15e9345288c4_amd64",
"product_id": "container-native-virtualization/kubevirt-ssp-operator-rhel9@sha256:901e6cad9534c7bd7c4018c60bccfe49d7280fba5a9901ab4c4d15e9345288c4_amd64",
"product_identification_helper": {
"purl": "pkg:oci/kubevirt-ssp-operator-rhel9@sha256:901e6cad9534c7bd7c4018c60bccfe49d7280fba5a9901ab4c4d15e9345288c4?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/kubevirt-ssp-operator-rhel9\u0026tag=v4.13.0--2022-101182"
}
}
},
{
"category": "product_version",
"name": "container-native-virtualization/kubevirt-tekton-tasks-cleanup-vm-rhel9@sha256:28e4975fa4dac22d9da32ed2a10aed039fd957b30140daa36bab2caa998be77a_amd64",
"product": {
"name": "container-native-virtualization/kubevirt-tekton-tasks-cleanup-vm-rhel9@sha256:28e4975fa4dac22d9da32ed2a10aed039fd957b30140daa36bab2caa998be77a_amd64",
"product_id": "container-native-virtualization/kubevirt-tekton-tasks-cleanup-vm-rhel9@sha256:28e4975fa4dac22d9da32ed2a10aed039fd957b30140daa36bab2caa998be77a_amd64",
"product_identification_helper": {
"purl": "pkg:oci/kubevirt-tekton-tasks-cleanup-vm-rhel9@sha256:28e4975fa4dac22d9da32ed2a10aed039fd957b30140daa36bab2caa998be77a?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/kubevirt-tekton-tasks-cleanup-vm-rhel9\u0026tag=v4.13.0--2022-101182"
}
}
},
{
"category": "product_version",
"name": "container-native-virtualization/kubevirt-tekton-tasks-copy-template-rhel9@sha256:f71c36442f1b61cdde7ec58d2c3c78d2039f6d6108e6c35388ef7c1650971fa1_amd64",
"product": {
"name": "container-native-virtualization/kubevirt-tekton-tasks-copy-template-rhel9@sha256:f71c36442f1b61cdde7ec58d2c3c78d2039f6d6108e6c35388ef7c1650971fa1_amd64",
"product_id": "container-native-virtualization/kubevirt-tekton-tasks-copy-template-rhel9@sha256:f71c36442f1b61cdde7ec58d2c3c78d2039f6d6108e6c35388ef7c1650971fa1_amd64",
"product_identification_helper": {
"purl": "pkg:oci/kubevirt-tekton-tasks-copy-template-rhel9@sha256:f71c36442f1b61cdde7ec58d2c3c78d2039f6d6108e6c35388ef7c1650971fa1?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/kubevirt-tekton-tasks-copy-template-rhel9\u0026tag=v4.13.0--2022-101182"
}
}
},
{
"category": "product_version",
"name": "container-native-virtualization/kubevirt-tekton-tasks-create-datavolume-rhel9@sha256:2ad49cf6e2242a9e5861929d9bcab1305a7fc4e34e708f99cff1d7253aa46167_amd64",
"product": {
"name": "container-native-virtualization/kubevirt-tekton-tasks-create-datavolume-rhel9@sha256:2ad49cf6e2242a9e5861929d9bcab1305a7fc4e34e708f99cff1d7253aa46167_amd64",
"product_id": "container-native-virtualization/kubevirt-tekton-tasks-create-datavolume-rhel9@sha256:2ad49cf6e2242a9e5861929d9bcab1305a7fc4e34e708f99cff1d7253aa46167_amd64",
"product_identification_helper": {
"purl": "pkg:oci/kubevirt-tekton-tasks-create-datavolume-rhel9@sha256:2ad49cf6e2242a9e5861929d9bcab1305a7fc4e34e708f99cff1d7253aa46167?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/kubevirt-tekton-tasks-create-datavolume-rhel9\u0026tag=v4.13.0--2022-101182"
}
}
},
{
"category": "product_version",
"name": "container-native-virtualization/kubevirt-tekton-tasks-create-vm-from-template-rhel9@sha256:1411c65bbad7302710788327f6964a4bf5bc20ef70d5e46f4a5c6e7a0e7a0161_amd64",
"product": {
"name": "container-native-virtualization/kubevirt-tekton-tasks-create-vm-from-template-rhel9@sha256:1411c65bbad7302710788327f6964a4bf5bc20ef70d5e46f4a5c6e7a0e7a0161_amd64",
"product_id": "container-native-virtualization/kubevirt-tekton-tasks-create-vm-from-template-rhel9@sha256:1411c65bbad7302710788327f6964a4bf5bc20ef70d5e46f4a5c6e7a0e7a0161_amd64",
"product_identification_helper": {
"purl": "pkg:oci/kubevirt-tekton-tasks-create-vm-from-template-rhel9@sha256:1411c65bbad7302710788327f6964a4bf5bc20ef70d5e46f4a5c6e7a0e7a0161?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/kubevirt-tekton-tasks-create-vm-from-template-rhel9\u0026tag=v4.13.0--2022-101182"
}
}
},
{
"category": "product_version",
"name": "container-native-virtualization/kubevirt-tekton-tasks-disk-virt-customize-rhel9@sha256:5c23d3f20ea9dcbe7109284d73078ecd516a070e964b844f8d80b1d92ebd55ee_amd64",
"product": {
"name": "container-native-virtualization/kubevirt-tekton-tasks-disk-virt-customize-rhel9@sha256:5c23d3f20ea9dcbe7109284d73078ecd516a070e964b844f8d80b1d92ebd55ee_amd64",
"product_id": "container-native-virtualization/kubevirt-tekton-tasks-disk-virt-customize-rhel9@sha256:5c23d3f20ea9dcbe7109284d73078ecd516a070e964b844f8d80b1d92ebd55ee_amd64",
"product_identification_helper": {
"purl": "pkg:oci/kubevirt-tekton-tasks-disk-virt-customize-rhel9@sha256:5c23d3f20ea9dcbe7109284d73078ecd516a070e964b844f8d80b1d92ebd55ee?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/kubevirt-tekton-tasks-disk-virt-customize-rhel9\u0026tag=v4.13.0--2022-101182"
}
}
},
{
"category": "product_version",
"name": "container-native-virtualization/kubevirt-tekton-tasks-disk-virt-sysprep-rhel9@sha256:aed630a597a090179e1b0e0c117e536df06b67d0f793f91936aa7388c0c5d7eb_amd64",
"product": {
"name": "container-native-virtualization/kubevirt-tekton-tasks-disk-virt-sysprep-rhel9@sha256:aed630a597a090179e1b0e0c117e536df06b67d0f793f91936aa7388c0c5d7eb_amd64",
"product_id": "container-native-virtualization/kubevirt-tekton-tasks-disk-virt-sysprep-rhel9@sha256:aed630a597a090179e1b0e0c117e536df06b67d0f793f91936aa7388c0c5d7eb_amd64",
"product_identification_helper": {
"purl": "pkg:oci/kubevirt-tekton-tasks-disk-virt-sysprep-rhel9@sha256:aed630a597a090179e1b0e0c117e536df06b67d0f793f91936aa7388c0c5d7eb?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/kubevirt-tekton-tasks-disk-virt-sysprep-rhel9\u0026tag=v4.13.0--2022-101182"
}
}
},
{
"category": "product_version",
"name": "container-native-virtualization/kubevirt-tekton-tasks-modify-vm-template-rhel9@sha256:66aea526bc10e4c0136ba86e394bbdfe4fbd7f757d6f391a561b51d2ba2f4d46_amd64",
"product": {
"name": "container-native-virtualization/kubevirt-tekton-tasks-modify-vm-template-rhel9@sha256:66aea526bc10e4c0136ba86e394bbdfe4fbd7f757d6f391a561b51d2ba2f4d46_amd64",
"product_id": "container-native-virtualization/kubevirt-tekton-tasks-modify-vm-template-rhel9@sha256:66aea526bc10e4c0136ba86e394bbdfe4fbd7f757d6f391a561b51d2ba2f4d46_amd64",
"product_identification_helper": {
"purl": "pkg:oci/kubevirt-tekton-tasks-modify-vm-template-rhel9@sha256:66aea526bc10e4c0136ba86e394bbdfe4fbd7f757d6f391a561b51d2ba2f4d46?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/kubevirt-tekton-tasks-modify-vm-template-rhel9\u0026tag=v4.13.0--2022-101182"
}
}
},
{
"category": "product_version",
"name": "container-native-virtualization/kubevirt-tekton-tasks-operator-rhel9@sha256:f1b1f5044db6bb945584f9d4f31d020597725a286ef368ed0aca2116abb31beb_amd64",
"product": {
"name": "container-native-virtualization/kubevirt-tekton-tasks-operator-rhel9@sha256:f1b1f5044db6bb945584f9d4f31d020597725a286ef368ed0aca2116abb31beb_amd64",
"product_id": "container-native-virtualization/kubevirt-tekton-tasks-operator-rhel9@sha256:f1b1f5044db6bb945584f9d4f31d020597725a286ef368ed0aca2116abb31beb_amd64",
"product_identification_helper": {
"purl": "pkg:oci/kubevirt-tekton-tasks-operator-rhel9@sha256:f1b1f5044db6bb945584f9d4f31d020597725a286ef368ed0aca2116abb31beb?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/kubevirt-tekton-tasks-operator-rhel9\u0026tag=v4.13.0--2022-101182"
}
}
},
{
"category": "product_version",
"name": "container-native-virtualization/kubevirt-tekton-tasks-wait-for-vmi-status-rhel9@sha256:39a15d03f113735df03b1a7408227eb9604d942c1f3c1992bcdc7eaf07662711_amd64",
"product": {
"name": "container-native-virtualization/kubevirt-tekton-tasks-wait-for-vmi-status-rhel9@sha256:39a15d03f113735df03b1a7408227eb9604d942c1f3c1992bcdc7eaf07662711_amd64",
"product_id": "container-native-virtualization/kubevirt-tekton-tasks-wait-for-vmi-status-rhel9@sha256:39a15d03f113735df03b1a7408227eb9604d942c1f3c1992bcdc7eaf07662711_amd64",
"product_identification_helper": {
"purl": "pkg:oci/kubevirt-tekton-tasks-wait-for-vmi-status-rhel9@sha256:39a15d03f113735df03b1a7408227eb9604d942c1f3c1992bcdc7eaf07662711?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/kubevirt-tekton-tasks-wait-for-vmi-status-rhel9\u0026tag=v4.13.0--2022-101182"
}
}
},
{
"category": "product_version",
"name": "container-native-virtualization/kubevirt-template-validator-rhel9@sha256:c0264b9271e602f85b2040ef7f207cdfa46038dc4fa6e4738bf196ef88a71cf8_amd64",
"product": {
"name": "container-native-virtualization/kubevirt-template-validator-rhel9@sha256:c0264b9271e602f85b2040ef7f207cdfa46038dc4fa6e4738bf196ef88a71cf8_amd64",
"product_id": "container-native-virtualization/kubevirt-template-validator-rhel9@sha256:c0264b9271e602f85b2040ef7f207cdfa46038dc4fa6e4738bf196ef88a71cf8_amd64",
"product_identification_helper": {
"purl": "pkg:oci/kubevirt-template-validator-rhel9@sha256:c0264b9271e602f85b2040ef7f207cdfa46038dc4fa6e4738bf196ef88a71cf8?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/kubevirt-template-validator-rhel9\u0026tag=v4.13.0--2022-101182"
}
}
},
{
"category": "product_version",
"name": "container-native-virtualization/libguestfs-tools-rhel9@sha256:29ae84575bbca24553cf649256759fd96ff286971d80bc2db129154a7df9b283_amd64",
"product": {
"name": "container-native-virtualization/libguestfs-tools-rhel9@sha256:29ae84575bbca24553cf649256759fd96ff286971d80bc2db129154a7df9b283_amd64",
"product_id": "container-native-virtualization/libguestfs-tools-rhel9@sha256:29ae84575bbca24553cf649256759fd96ff286971d80bc2db129154a7df9b283_amd64",
"product_identification_helper": {
"purl": "pkg:oci/libguestfs-tools-rhel9@sha256:29ae84575bbca24553cf649256759fd96ff286971d80bc2db129154a7df9b283?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/libguestfs-tools-rhel9\u0026tag=v4.13.0--2022-101182"
}
}
},
{
"category": "product_version",
"name": "container-native-virtualization/multus-dynamic-networks-rhel9@sha256:b7f68b6420009e21380d32d6459193aae45e93be9533debe17cb3108571b36b8_amd64",
"product": {
"name": "container-native-virtualization/multus-dynamic-networks-rhel9@sha256:b7f68b6420009e21380d32d6459193aae45e93be9533debe17cb3108571b36b8_amd64",
"product_id": "container-native-virtualization/multus-dynamic-networks-rhel9@sha256:b7f68b6420009e21380d32d6459193aae45e93be9533debe17cb3108571b36b8_amd64",
"product_identification_helper": {
"purl": "pkg:oci/multus-dynamic-networks-rhel9@sha256:b7f68b6420009e21380d32d6459193aae45e93be9533debe17cb3108571b36b8?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/multus-dynamic-networks-rhel9\u0026tag=v4.13.0-37"
}
}
},
{
"category": "product_version",
"name": "container-native-virtualization/ovs-cni-plugin-rhel9@sha256:e8e7a44edbf1713fe74de5c4b8f691cce78f4440c4a32a16ba9ad16694a55396_amd64",
"product": {
"name": "container-native-virtualization/ovs-cni-plugin-rhel9@sha256:e8e7a44edbf1713fe74de5c4b8f691cce78f4440c4a32a16ba9ad16694a55396_amd64",
"product_id": "container-native-virtualization/ovs-cni-plugin-rhel9@sha256:e8e7a44edbf1713fe74de5c4b8f691cce78f4440c4a32a16ba9ad16694a55396_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ovs-cni-plugin-rhel9@sha256:e8e7a44edbf1713fe74de5c4b8f691cce78f4440c4a32a16ba9ad16694a55396?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/ovs-cni-plugin-rhel9\u0026tag=v4.13.0--2022-101182"
}
}
},
{
"category": "product_version",
"name": "container-native-virtualization/virt-api-rhel9@sha256:fdb4ca1bb8b310d713d9c7e88f7d091f4460aa942dbeca5ebcf17281a06daffe_amd64",
"product": {
"name": "container-native-virtualization/virt-api-rhel9@sha256:fdb4ca1bb8b310d713d9c7e88f7d091f4460aa942dbeca5ebcf17281a06daffe_amd64",
"product_id": "container-native-virtualization/virt-api-rhel9@sha256:fdb4ca1bb8b310d713d9c7e88f7d091f4460aa942dbeca5ebcf17281a06daffe_amd64",
"product_identification_helper": {
"purl": "pkg:oci/virt-api-rhel9@sha256:fdb4ca1bb8b310d713d9c7e88f7d091f4460aa942dbeca5ebcf17281a06daffe?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/virt-api-rhel9\u0026tag=v4.13.0--2022-101182"
}
}
},
{
"category": "product_version",
"name": "container-native-virtualization/virt-artifacts-server-rhel9@sha256:81fc61b714baecb5a89fa6c0749c14566e0661b8e184ca602fc2e03b9cf431ee_amd64",
"product": {
"name": "container-native-virtualization/virt-artifacts-server-rhel9@sha256:81fc61b714baecb5a89fa6c0749c14566e0661b8e184ca602fc2e03b9cf431ee_amd64",
"product_id": "container-native-virtualization/virt-artifacts-server-rhel9@sha256:81fc61b714baecb5a89fa6c0749c14566e0661b8e184ca602fc2e03b9cf431ee_amd64",
"product_identification_helper": {
"purl": "pkg:oci/virt-artifacts-server-rhel9@sha256:81fc61b714baecb5a89fa6c0749c14566e0661b8e184ca602fc2e03b9cf431ee?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/virt-artifacts-server-rhel9\u0026tag=v4.13.0--2022-101182"
}
}
},
{
"category": "product_version",
"name": "container-native-virtualization/virt-cdi-apiserver-rhel9@sha256:feca273a691d09445c6cff6d36b5d590735e867656a9898ce0d89744d98e8006_amd64",
"product": {
"name": "container-native-virtualization/virt-cdi-apiserver-rhel9@sha256:feca273a691d09445c6cff6d36b5d590735e867656a9898ce0d89744d98e8006_amd64",
"product_id": "container-native-virtualization/virt-cdi-apiserver-rhel9@sha256:feca273a691d09445c6cff6d36b5d590735e867656a9898ce0d89744d98e8006_amd64",
"product_identification_helper": {
"purl": "pkg:oci/virt-cdi-apiserver-rhel9@sha256:feca273a691d09445c6cff6d36b5d590735e867656a9898ce0d89744d98e8006?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/virt-cdi-apiserver-rhel9\u0026tag=v4.13.0--2022-101182"
}
}
},
{
"category": "product_version",
"name": "container-native-virtualization/virt-cdi-cloner-rhel9@sha256:68e3b9b0291b4fb277ac430269ffce11d13b0a7688cf2ffcdb7f98759c36b4db_amd64",
"product": {
"name": "container-native-virtualization/virt-cdi-cloner-rhel9@sha256:68e3b9b0291b4fb277ac430269ffce11d13b0a7688cf2ffcdb7f98759c36b4db_amd64",
"product_id": "container-native-virtualization/virt-cdi-cloner-rhel9@sha256:68e3b9b0291b4fb277ac430269ffce11d13b0a7688cf2ffcdb7f98759c36b4db_amd64",
"product_identification_helper": {
"purl": "pkg:oci/virt-cdi-cloner-rhel9@sha256:68e3b9b0291b4fb277ac430269ffce11d13b0a7688cf2ffcdb7f98759c36b4db?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/virt-cdi-cloner-rhel9\u0026tag=v4.13.0--2022-101182"
}
}
},
{
"category": "product_version",
"name": "container-native-virtualization/virt-cdi-controller-rhel9@sha256:d9e62b2019328be258489ac852eef25f8b1233f29abac6bcea5b406329f97fed_amd64",
"product": {
"name": "container-native-virtualization/virt-cdi-controller-rhel9@sha256:d9e62b2019328be258489ac852eef25f8b1233f29abac6bcea5b406329f97fed_amd64",
"product_id": "container-native-virtualization/virt-cdi-controller-rhel9@sha256:d9e62b2019328be258489ac852eef25f8b1233f29abac6bcea5b406329f97fed_amd64",
"product_identification_helper": {
"purl": "pkg:oci/virt-cdi-controller-rhel9@sha256:d9e62b2019328be258489ac852eef25f8b1233f29abac6bcea5b406329f97fed?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/virt-cdi-controller-rhel9\u0026tag=v4.13.0--2022-101182"
}
}
},
{
"category": "product_version",
"name": "container-native-virtualization/virt-cdi-importer-rhel9@sha256:2df07fb21a3575e74aa16ded20129828f2300cd33e8ab369b0362062d49e62d0_amd64",
"product": {
"name": "container-native-virtualization/virt-cdi-importer-rhel9@sha256:2df07fb21a3575e74aa16ded20129828f2300cd33e8ab369b0362062d49e62d0_amd64",
"product_id": "container-native-virtualization/virt-cdi-importer-rhel9@sha256:2df07fb21a3575e74aa16ded20129828f2300cd33e8ab369b0362062d49e62d0_amd64",
"product_identification_helper": {
"purl": "pkg:oci/virt-cdi-importer-rhel9@sha256:2df07fb21a3575e74aa16ded20129828f2300cd33e8ab369b0362062d49e62d0?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/virt-cdi-importer-rhel9\u0026tag=v4.13.0--2022-101182"
}
}
},
{
"category": "product_version",
"name": "container-native-virtualization/virt-cdi-operator-rhel9@sha256:802ee8923d9d8e406b23911406f9748756c0ef4d6954e9e2fd5fb4bdf91dde9a_amd64",
"product": {
"name": "container-native-virtualization/virt-cdi-operator-rhel9@sha256:802ee8923d9d8e406b23911406f9748756c0ef4d6954e9e2fd5fb4bdf91dde9a_amd64",
"product_id": "container-native-virtualization/virt-cdi-operator-rhel9@sha256:802ee8923d9d8e406b23911406f9748756c0ef4d6954e9e2fd5fb4bdf91dde9a_amd64",
"product_identification_helper": {
"purl": "pkg:oci/virt-cdi-operator-rhel9@sha256:802ee8923d9d8e406b23911406f9748756c0ef4d6954e9e2fd5fb4bdf91dde9a?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/virt-cdi-operator-rhel9\u0026tag=v4.13.0--2022-101182"
}
}
},
{
"category": "product_version",
"name": "container-native-virtualization/virt-cdi-uploadproxy-rhel9@sha256:6775f34353eec8f35bead9411dde155530d079bb8d51582fb1f2aacc27dbde1d_amd64",
"product": {
"name": "container-native-virtualization/virt-cdi-uploadproxy-rhel9@sha256:6775f34353eec8f35bead9411dde155530d079bb8d51582fb1f2aacc27dbde1d_amd64",
"product_id": "container-native-virtualization/virt-cdi-uploadproxy-rhel9@sha256:6775f34353eec8f35bead9411dde155530d079bb8d51582fb1f2aacc27dbde1d_amd64",
"product_identification_helper": {
"purl": "pkg:oci/virt-cdi-uploadproxy-rhel9@sha256:6775f34353eec8f35bead9411dde155530d079bb8d51582fb1f2aacc27dbde1d?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/virt-cdi-uploadproxy-rhel9\u0026tag=v4.13.0--2022-101182"
}
}
},
{
"category": "product_version",
"name": "container-native-virtualization/virt-cdi-uploadserver-rhel9@sha256:b22048390387380af94e267c8a9a66813c515997456d59d8ebac1486916b6585_amd64",
"product": {
"name": "container-native-virtualization/virt-cdi-uploadserver-rhel9@sha256:b22048390387380af94e267c8a9a66813c515997456d59d8ebac1486916b6585_amd64",
"product_id": "container-native-virtualization/virt-cdi-uploadserver-rhel9@sha256:b22048390387380af94e267c8a9a66813c515997456d59d8ebac1486916b6585_amd64",
"product_identification_helper": {
"purl": "pkg:oci/virt-cdi-uploadserver-rhel9@sha256:b22048390387380af94e267c8a9a66813c515997456d59d8ebac1486916b6585?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/virt-cdi-uploadserver-rhel9\u0026tag=v4.13.0--2022-101182"
}
}
},
{
"category": "product_version",
"name": "container-native-virtualization/virt-controller-rhel9@sha256:3e7880149ee9a68286e390beb3d9779f7403c30fc5136e5370e0e4690a3fd243_amd64",
"product": {
"name": "container-native-virtualization/virt-controller-rhel9@sha256:3e7880149ee9a68286e390beb3d9779f7403c30fc5136e5370e0e4690a3fd243_amd64",
"product_id": "container-native-virtualization/virt-controller-rhel9@sha256:3e7880149ee9a68286e390beb3d9779f7403c30fc5136e5370e0e4690a3fd243_amd64",
"product_identification_helper": {
"purl": "pkg:oci/virt-controller-rhel9@sha256:3e7880149ee9a68286e390beb3d9779f7403c30fc5136e5370e0e4690a3fd243?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/virt-controller-rhel9\u0026tag=v4.13.0--2022-101182"
}
}
},
{
"category": "product_version",
"name": "container-native-virtualization/virt-exportproxy-rhel9@sha256:1bda34d5bff734ad997202f29a5ff6f7362fd79fa90511a422442ef2e3681198_amd64",
"product": {
"name": "container-native-virtualization/virt-exportproxy-rhel9@sha256:1bda34d5bff734ad997202f29a5ff6f7362fd79fa90511a422442ef2e3681198_amd64",
"product_id": "container-native-virtualization/virt-exportproxy-rhel9@sha256:1bda34d5bff734ad997202f29a5ff6f7362fd79fa90511a422442ef2e3681198_amd64",
"product_identification_helper": {
"purl": "pkg:oci/virt-exportproxy-rhel9@sha256:1bda34d5bff734ad997202f29a5ff6f7362fd79fa90511a422442ef2e3681198?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/virt-exportproxy-rhel9\u0026tag=v4.13.0--2022-101182"
}
}
},
{
"category": "product_version",
"name": "container-native-virtualization/virt-exportserver-rhel9@sha256:8f12955cd777eb2409037a6968aa92f50c99d6e07e722951dbcfd0c8c9829b5e_amd64",
"product": {
"name": "container-native-virtualization/virt-exportserver-rhel9@sha256:8f12955cd777eb2409037a6968aa92f50c99d6e07e722951dbcfd0c8c9829b5e_amd64",
"product_id": "container-native-virtualization/virt-exportserver-rhel9@sha256:8f12955cd777eb2409037a6968aa92f50c99d6e07e722951dbcfd0c8c9829b5e_amd64",
"product_identification_helper": {
"purl": "pkg:oci/virt-exportserver-rhel9@sha256:8f12955cd777eb2409037a6968aa92f50c99d6e07e722951dbcfd0c8c9829b5e?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/virt-exportserver-rhel9\u0026tag=v4.13.0--2022-101182"
}
}
},
{
"category": "product_version",
"name": "container-native-virtualization/virt-handler-rhel9@sha256:84ba79ae9658699147d2493df2582ab6df10adbff4d44a533c3fe6a9f45f9691_amd64",
"product": {
"name": "container-native-virtualization/virt-handler-rhel9@sha256:84ba79ae9658699147d2493df2582ab6df10adbff4d44a533c3fe6a9f45f9691_amd64",
"product_id": "container-native-virtualization/virt-handler-rhel9@sha256:84ba79ae9658699147d2493df2582ab6df10adbff4d44a533c3fe6a9f45f9691_amd64",
"product_identification_helper": {
"purl": "pkg:oci/virt-handler-rhel9@sha256:84ba79ae9658699147d2493df2582ab6df10adbff4d44a533c3fe6a9f45f9691?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/virt-handler-rhel9\u0026tag=v4.13.0--2022-101182"
}
}
},
{
"category": "product_version",
"name": "container-native-virtualization/virtio-win-rhel9@sha256:d147d2a6eb6f907d1e88f61aaca83596853bc72164583d6dda2b1154b490de25_amd64",
"product": {
"name": "container-native-virtualization/virtio-win-rhel9@sha256:d147d2a6eb6f907d1e88f61aaca83596853bc72164583d6dda2b1154b490de25_amd64",
"product_id": "container-native-virtualization/virtio-win-rhel9@sha256:d147d2a6eb6f907d1e88f61aaca83596853bc72164583d6dda2b1154b490de25_amd64",
"product_identification_helper": {
"purl": "pkg:oci/virtio-win-rhel9@sha256:d147d2a6eb6f907d1e88f61aaca83596853bc72164583d6dda2b1154b490de25?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/virtio-win-rhel9\u0026tag=v4.13.0--2022-101182"
}
}
},
{
"category": "product_version",
"name": "container-native-virtualization/virt-launcher-rhel9@sha256:4990d40d9987d5126d105dd45be2501eaded248cb61bdde5ea8d359bc1e7ebef_amd64",
"product": {
"name": "container-native-virtualization/virt-launcher-rhel9@sha256:4990d40d9987d5126d105dd45be2501eaded248cb61bdde5ea8d359bc1e7ebef_amd64",
"product_id": "container-native-virtualization/virt-launcher-rhel9@sha256:4990d40d9987d5126d105dd45be2501eaded248cb61bdde5ea8d359bc1e7ebef_amd64",
"product_identification_helper": {
"purl": "pkg:oci/virt-launcher-rhel9@sha256:4990d40d9987d5126d105dd45be2501eaded248cb61bdde5ea8d359bc1e7ebef?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/virt-launcher-rhel9\u0026tag=v4.13.0--2022-101182"
}
}
},
{
"category": "product_version",
"name": "container-native-virtualization/virt-operator-rhel9@sha256:5c1a7e4ed2061938987b900a2394f07121d4037350c9bb6485213a2adfea787d_amd64",
"product": {
"name": "container-native-virtualization/virt-operator-rhel9@sha256:5c1a7e4ed2061938987b900a2394f07121d4037350c9bb6485213a2adfea787d_amd64",
"product_id": "container-native-virtualization/virt-operator-rhel9@sha256:5c1a7e4ed2061938987b900a2394f07121d4037350c9bb6485213a2adfea787d_amd64",
"product_identification_helper": {
"purl": "pkg:oci/virt-operator-rhel9@sha256:5c1a7e4ed2061938987b900a2394f07121d4037350c9bb6485213a2adfea787d?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/virt-operator-rhel9\u0026tag=v4.13.0--2022-101182"
}
}
},
{
"category": "product_version",
"name": "container-native-virtualization/vm-console-proxy-rhel9@sha256:7ca921f98f6d81a126907127a611146fb53397869a628678faa1e289c01d22b2_amd64",
"product": {
"name": "container-native-virtualization/vm-console-proxy-rhel9@sha256:7ca921f98f6d81a126907127a611146fb53397869a628678faa1e289c01d22b2_amd64",
"product_id": "container-native-virtualization/vm-console-proxy-rhel9@sha256:7ca921f98f6d81a126907127a611146fb53397869a628678faa1e289c01d22b2_amd64",
"product_identification_helper": {
"purl": "pkg:oci/vm-console-proxy-rhel9@sha256:7ca921f98f6d81a126907127a611146fb53397869a628678faa1e289c01d22b2?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/vm-console-proxy-rhel9\u0026tag=v4.13.0--2022-101182"
}
}
},
{
"category": "product_version",
"name": "container-native-virtualization/vm-network-latency-checkup-rhel9@sha256:59fd965975bccf641a0fa7aa01374d45057bd03cda7528248a84b60b1205bf57_amd64",
"product": {
"name": "container-native-virtualization/vm-network-latency-checkup-rhel9@sha256:59fd965975bccf641a0fa7aa01374d45057bd03cda7528248a84b60b1205bf57_amd64",
"product_id": "container-native-virtualization/vm-network-latency-checkup-rhel9@sha256:59fd965975bccf641a0fa7aa01374d45057bd03cda7528248a84b60b1205bf57_amd64",
"product_identification_helper": {
"purl": "pkg:oci/vm-network-latency-checkup-rhel9@sha256:59fd965975bccf641a0fa7aa01374d45057bd03cda7528248a84b60b1205bf57?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/vm-network-latency-checkup-rhel9\u0026tag=v4.13.0--2022-101182"
}
}
}
],
"category": "architecture",
"name": "amd64"
},
{
"branches": [
{
"category": "product_version",
"name": "container-native-virtualization/bridge-marker-rhel9@sha256:e8a55aee3d75a316bb0d7a554c737198823df04b3c05e481c17e45eb2153bced_arm64",
"product": {
"name": "container-native-virtualization/bridge-marker-rhel9@sha256:e8a55aee3d75a316bb0d7a554c737198823df04b3c05e481c17e45eb2153bced_arm64",
"product_id": "container-native-virtualization/bridge-marker-rhel9@sha256:e8a55aee3d75a316bb0d7a554c737198823df04b3c05e481c17e45eb2153bced_arm64",
"product_identification_helper": {
"purl": "pkg:oci/bridge-marker-rhel9@sha256:e8a55aee3d75a316bb0d7a554c737198823df04b3c05e481c17e45eb2153bced?arch=arm64\u0026repository_url=registry.redhat.io/container-native-virtualization/bridge-marker-rhel9\u0026tag=v4.13.0--2022-101182"
}
}
},
{
"category": "product_version",
"name": "container-native-virtualization/cluster-network-addons-operator-rhel9@sha256:f439d2f420bb59eb1d5af14ce2002648d0cfc155d1a1466c8aac9b661fe902b8_arm64",
"product": {
"name": "container-native-virtualization/cluster-network-addons-operator-rhel9@sha256:f439d2f420bb59eb1d5af14ce2002648d0cfc155d1a1466c8aac9b661fe902b8_arm64",
"product_id": "container-native-virtualization/cluster-network-addons-operator-rhel9@sha256:f439d2f420bb59eb1d5af14ce2002648d0cfc155d1a1466c8aac9b661fe902b8_arm64",
"product_identification_helper": {
"purl": "pkg:oci/cluster-network-addons-operator-rhel9@sha256:f439d2f420bb59eb1d5af14ce2002648d0cfc155d1a1466c8aac9b661fe902b8?arch=arm64\u0026repository_url=registry.redhat.io/container-native-virtualization/cluster-network-addons-operator-rhel9\u0026tag=v4.13.0--2022-101182"
}
}
},
{
"category": "product_version",
"name": "container-native-virtualization/cnv-containernetworking-plugins-rhel9@sha256:89f22e541f61a660c9aa9f38ef58e80b84a0517f74e84292107fc252c25465c9_arm64",
"product": {
"name": "container-native-virtualization/cnv-containernetworking-plugins-rhel9@sha256:89f22e541f61a660c9aa9f38ef58e80b84a0517f74e84292107fc252c25465c9_arm64",
"product_id": "container-native-virtualization/cnv-containernetworking-plugins-rhel9@sha256:89f22e541f61a660c9aa9f38ef58e80b84a0517f74e84292107fc252c25465c9_arm64",
"product_identification_helper": {
"purl": "pkg:oci/cnv-containernetworking-plugins-rhel9@sha256:89f22e541f61a660c9aa9f38ef58e80b84a0517f74e84292107fc252c25465c9?arch=arm64\u0026repository_url=registry.redhat.io/container-native-virtualization/cnv-containernetworking-plugins-rhel9\u0026tag=v4.13.0--2022-101182"
}
}
},
{
"category": "product_version",
"name": "container-native-virtualization/cnv-must-gather-rhel9@sha256:9e8efd76924958eb605401abdac08eba97fb83a1ada383bc87a7fb7c87b3a455_arm64",
"product": {
"name": "container-native-virtualization/cnv-must-gather-rhel9@sha256:9e8efd76924958eb605401abdac08eba97fb83a1ada383bc87a7fb7c87b3a455_arm64",
"product_id": "container-native-virtualization/cnv-must-gather-rhel9@sha256:9e8efd76924958eb605401abdac08eba97fb83a1ada383bc87a7fb7c87b3a455_arm64",
"product_identification_helper": {
"purl": "pkg:oci/cnv-must-gather-rhel9@sha256:9e8efd76924958eb605401abdac08eba97fb83a1ada383bc87a7fb7c87b3a455?arch=arm64\u0026repository_url=registry.redhat.io/container-native-virtualization/cnv-must-gather-rhel9\u0026tag=v4.13.0--2022-101182"
}
}
},
{
"category": "product_version",
"name": "container-native-virtualization/hco-bundle-registry-rhel9@sha256:dd20b138045ef1424d83a47e7abcfcbb2ac54577dcec5ed3c186390aaa4c9d84_arm64",
"product": {
"name": "container-native-virtualization/hco-bundle-registry-rhel9@sha256:dd20b138045ef1424d83a47e7abcfcbb2ac54577dcec5ed3c186390aaa4c9d84_arm64",
"product_id": "container-native-virtualization/hco-bundle-registry-rhel9@sha256:dd20b138045ef1424d83a47e7abcfcbb2ac54577dcec5ed3c186390aaa4c9d84_arm64",
"product_identification_helper": {
"purl": "pkg:oci/hco-bundle-registry-rhel9@sha256:dd20b138045ef1424d83a47e7abcfcbb2ac54577dcec5ed3c186390aaa4c9d84?arch=arm64\u0026repository_url=registry.redhat.io/container-native-virtualization/hco-bundle-registry-rhel9\u0026tag=v4.13.0.rhel9--2022-101182"
}
}
},
{
"category": "product_version",
"name": "container-native-virtualization/hostpath-csi-driver-rhel9@sha256:676d4c23a5f60dd331728af056b0a6b2d3358ac88da23299b1a98dfaca8f288e_arm64",
"product": {
"name": "container-native-virtualization/hostpath-csi-driver-rhel9@sha256:676d4c23a5f60dd331728af056b0a6b2d3358ac88da23299b1a98dfaca8f288e_arm64",
"product_id": "container-native-virtualization/hostpath-csi-driver-rhel9@sha256:676d4c23a5f60dd331728af056b0a6b2d3358ac88da23299b1a98dfaca8f288e_arm64",
"product_identification_helper": {
"purl": "pkg:oci/hostpath-csi-driver-rhel9@sha256:676d4c23a5f60dd331728af056b0a6b2d3358ac88da23299b1a98dfaca8f288e?arch=arm64\u0026repository_url=registry.redhat.io/container-native-virtualization/hostpath-csi-driver-rhel9\u0026tag=v4.13.0--2022-101182"
}
}
},
{
"category": "product_version",
"name": "container-native-virtualization/hostpath-provisioner-operator-rhel9@sha256:571ae805641dea11646028c946039983c7fd82f138b915dcb8b80c39b465e63c_arm64",
"product": {
"name": "container-native-virtualization/hostpath-provisioner-operator-rhel9@sha256:571ae805641dea11646028c946039983c7fd82f138b915dcb8b80c39b465e63c_arm64",
"product_id": "container-native-virtualization/hostpath-provisioner-operator-rhel9@sha256:571ae805641dea11646028c946039983c7fd82f138b915dcb8b80c39b465e63c_arm64",
"product_identification_helper": {
"purl": "pkg:oci/hostpath-provisioner-operator-rhel9@sha256:571ae805641dea11646028c946039983c7fd82f138b915dcb8b80c39b465e63c?arch=arm64\u0026repository_url=registry.redhat.io/container-native-virtualization/hostpath-provisioner-operator-rhel9\u0026tag=v4.13.0-37"
}
}
},
{
"category": "product_version",
"name": "container-native-virtualization/hostpath-provisioner-rhel9@sha256:d4ed87745b7ee2acca2d83e2c91c2f6dced1903c81495b50f2559b3ba2dde287_arm64",
"product": {
"name": "container-native-virtualization/hostpath-provisioner-rhel9@sha256:d4ed87745b7ee2acca2d83e2c91c2f6dced1903c81495b50f2559b3ba2dde287_arm64",
"product_id": "container-native-virtualization/hostpath-provisioner-rhel9@sha256:d4ed87745b7ee2acca2d83e2c91c2f6dced1903c81495b50f2559b3ba2dde287_arm64",
"product_identification_helper": {
"purl": "pkg:oci/hostpath-provisioner-rhel9@sha256:d4ed87745b7ee2acca2d83e2c91c2f6dced1903c81495b50f2559b3ba2dde287?arch=arm64\u0026repository_url=registry.redhat.io/container-native-virtualization/hostpath-provisioner-rhel9\u0026tag=v4.13.0--2022-101182"
}
}
},
{
"category": "product_version",
"name": "container-native-virtualization/hyperconverged-cluster-operator-rhel9@sha256:e681560b184189df03fc84c8a712f32289f42573dd348cda394b19565eb6eca8_arm64",
"product": {
"name": "container-native-virtualization/hyperconverged-cluster-operator-rhel9@sha256:e681560b184189df03fc84c8a712f32289f42573dd348cda394b19565eb6eca8_arm64",
"product_id": "container-native-virtualization/hyperconverged-cluster-operator-rhel9@sha256:e681560b184189df03fc84c8a712f32289f42573dd348cda394b19565eb6eca8_arm64",
"product_identification_helper": {
"purl": "pkg:oci/hyperconverged-cluster-operator-rhel9@sha256:e681560b184189df03fc84c8a712f32289f42573dd348cda394b19565eb6eca8?arch=arm64\u0026repository_url=registry.redhat.io/container-native-virtualization/hyperconverged-cluster-operator-rhel9\u0026tag=v4.13.0--2022-101182"
}
}
},
{
"category": "product_version",
"name": "container-native-virtualization/hyperconverged-cluster-webhook-rhel9@sha256:06d036d320b3027bb8370bb8e0f6fe8c9f0ec9bca7aac3b5c53698ba4a170042_arm64",
"product": {
"name": "container-native-virtualization/hyperconverged-cluster-webhook-rhel9@sha256:06d036d320b3027bb8370bb8e0f6fe8c9f0ec9bca7aac3b5c53698ba4a170042_arm64",
"product_id": "container-native-virtualization/hyperconverged-cluster-webhook-rhel9@sha256:06d036d320b3027bb8370bb8e0f6fe8c9f0ec9bca7aac3b5c53698ba4a170042_arm64",
"product_identification_helper": {
"purl": "pkg:oci/hyperconverged-cluster-webhook-rhel9@sha256:06d036d320b3027bb8370bb8e0f6fe8c9f0ec9bca7aac3b5c53698ba4a170042?arch=arm64\u0026repository_url=registry.redhat.io/container-native-virtualization/hyperconverged-cluster-webhook-rhel9\u0026tag=v4.13.0--2022-101182"
}
}
},
{
"category": "product_version",
"name": "container-native-virtualization/kubemacpool-rhel9@sha256:59862a59854f0d5b83dc25ba119f9586a8aff42b6e60d1922f8ae7b4567309ff_arm64",
"product": {
"name": "container-native-virtualization/kubemacpool-rhel9@sha256:59862a59854f0d5b83dc25ba119f9586a8aff42b6e60d1922f8ae7b4567309ff_arm64",
"product_id": "container-native-virtualization/kubemacpool-rhel9@sha256:59862a59854f0d5b83dc25ba119f9586a8aff42b6e60d1922f8ae7b4567309ff_arm64",
"product_identification_helper": {
"purl": "pkg:oci/kubemacpool-rhel9@sha256:59862a59854f0d5b83dc25ba119f9586a8aff42b6e60d1922f8ae7b4567309ff?arch=arm64\u0026repository_url=registry.redhat.io/container-native-virtualization/kubemacpool-rhel9\u0026tag=v4.13.0--2022-101182"
}
}
},
{
"category": "product_version",
"name": "container-native-virtualization/kubesecondarydns-rhel9@sha256:b1838f3c8ba3d8113bddea17b78c21e1c1490e2a4a07ea77014edee523d06347_arm64",
"product": {
"name": "container-native-virtualization/kubesecondarydns-rhel9@sha256:b1838f3c8ba3d8113bddea17b78c21e1c1490e2a4a07ea77014edee523d06347_arm64",
"product_id": "container-native-virtualization/kubesecondarydns-rhel9@sha256:b1838f3c8ba3d8113bddea17b78c21e1c1490e2a4a07ea77014edee523d06347_arm64",
"product_identification_helper": {
"purl": "pkg:oci/kubesecondarydns-rhel9@sha256:b1838f3c8ba3d8113bddea17b78c21e1c1490e2a4a07ea77014edee523d06347?arch=arm64\u0026repository_url=registry.redhat.io/container-native-virtualization/kubesecondarydns-rhel9\u0026tag=v4.13.0--2022-101182"
}
}
},
{
"category": "product_version",
"name": "container-native-virtualization/kubevirt-console-plugin-rhel9@sha256:ffb2acd9ae09c1ef9ca756f5eaf6087d0a3957cfc824543949d25f556a97744d_arm64",
"product": {
"name": "container-native-virtualization/kubevirt-console-plugin-rhel9@sha256:ffb2acd9ae09c1ef9ca756f5eaf6087d0a3957cfc824543949d25f556a97744d_arm64",
"product_id": "container-native-virtualization/kubevirt-console-plugin-rhel9@sha256:ffb2acd9ae09c1ef9ca756f5eaf6087d0a3957cfc824543949d25f556a97744d_arm64",
"product_identification_helper": {
"purl": "pkg:oci/kubevirt-console-plugin-rhel9@sha256:ffb2acd9ae09c1ef9ca756f5eaf6087d0a3957cfc824543949d25f556a97744d?arch=arm64\u0026repository_url=registry.redhat.io/container-native-virtualization/kubevirt-console-plugin-rhel9\u0026tag=v4.13.0--2022-101182"
}
}
},
{
"category": "product_version",
"name": "container-native-virtualization/kubevirt-dpdk-checkup-rhel9@sha256:525aceb9396010ebcdba14040f267889b807cd84db8e5b4030429b51f0fbf5fe_arm64",
"product": {
"name": "container-native-virtualization/kubevirt-dpdk-checkup-rhel9@sha256:525aceb9396010ebcdba14040f267889b807cd84db8e5b4030429b51f0fbf5fe_arm64",
"product_id": "container-native-virtualization/kubevirt-dpdk-checkup-rhel9@sha256:525aceb9396010ebcdba14040f267889b807cd84db8e5b4030429b51f0fbf5fe_arm64",
"product_identification_helper": {
"purl": "pkg:oci/kubevirt-dpdk-checkup-rhel9@sha256:525aceb9396010ebcdba14040f267889b807cd84db8e5b4030429b51f0fbf5fe?arch=arm64\u0026repository_url=registry.redhat.io/container-native-virtualization/kubevirt-dpdk-checkup-rhel9\u0026tag=v4.13.0--2022-101182"
}
}
},
{
"category": "product_version",
"name": "container-native-virtualization/kubevirt-ssp-operator-rhel9@sha256:badeb0f65f543b209f6af761729d9778b7b73b97d55044016dfba3f38a1f6f18_arm64",
"product": {
"name": "container-native-virtualization/kubevirt-ssp-operator-rhel9@sha256:badeb0f65f543b209f6af761729d9778b7b73b97d55044016dfba3f38a1f6f18_arm64",
"product_id": "container-native-virtualization/kubevirt-ssp-operator-rhel9@sha256:badeb0f65f543b209f6af761729d9778b7b73b97d55044016dfba3f38a1f6f18_arm64",
"product_identification_helper": {
"purl": "pkg:oci/kubevirt-ssp-operator-rhel9@sha256:badeb0f65f543b209f6af761729d9778b7b73b97d55044016dfba3f38a1f6f18?arch=arm64\u0026repository_url=registry.redhat.io/container-native-virtualization/kubevirt-ssp-operator-rhel9\u0026tag=v4.13.0--2022-101182"
}
}
},
{
"category": "product_version",
"name": "container-native-virtualization/kubevirt-tekton-tasks-cleanup-vm-rhel9@sha256:b0ff7e812a576ea848590655fc13a85832d5a39f68e7769ceab9da6949da88c7_arm64",
"product": {
"name": "container-native-virtualization/kubevirt-tekton-tasks-cleanup-vm-rhel9@sha256:b0ff7e812a576ea848590655fc13a85832d5a39f68e7769ceab9da6949da88c7_arm64",
"product_id": "container-native-virtualization/kubevirt-tekton-tasks-cleanup-vm-rhel9@sha256:b0ff7e812a576ea848590655fc13a85832d5a39f68e7769ceab9da6949da88c7_arm64",
"product_identification_helper": {
"purl": "pkg:oci/kubevirt-tekton-tasks-cleanup-vm-rhel9@sha256:b0ff7e812a576ea848590655fc13a85832d5a39f68e7769ceab9da6949da88c7?arch=arm64\u0026repository_url=registry.redhat.io/container-native-virtualization/kubevirt-tekton-tasks-cleanup-vm-rhel9\u0026tag=v4.13.0--2022-101182"
}
}
},
{
"category": "product_version",
"name": "container-native-virtualization/kubevirt-tekton-tasks-copy-template-rhel9@sha256:4916a6c6b1f9b529187d3b4d5fc99b90157993767b3fe2ad36a9ec77fbb46b10_arm64",
"product": {
"name": "container-native-virtualization/kubevirt-tekton-tasks-copy-template-rhel9@sha256:4916a6c6b1f9b529187d3b4d5fc99b90157993767b3fe2ad36a9ec77fbb46b10_arm64",
"product_id": "container-native-virtualization/kubevirt-tekton-tasks-copy-template-rhel9@sha256:4916a6c6b1f9b529187d3b4d5fc99b90157993767b3fe2ad36a9ec77fbb46b10_arm64",
"product_identification_helper": {
"purl": "pkg:oci/kubevirt-tekton-tasks-copy-template-rhel9@sha256:4916a6c6b1f9b529187d3b4d5fc99b90157993767b3fe2ad36a9ec77fbb46b10?arch=arm64\u0026repository_url=registry.redhat.io/container-native-virtualization/kubevirt-tekton-tasks-copy-template-rhel9\u0026tag=v4.13.0--2022-101182"
}
}
},
{
"category": "product_version",
"name": "container-native-virtualization/kubevirt-tekton-tasks-create-datavolume-rhel9@sha256:7112400a4ecb23ee2110bf96372fcf9f96ad648a51aa944627b40eb59539a660_arm64",
"product": {
"name": "container-native-virtualization/kubevirt-tekton-tasks-create-datavolume-rhel9@sha256:7112400a4ecb23ee2110bf96372fcf9f96ad648a51aa944627b40eb59539a660_arm64",
"product_id": "container-native-virtualization/kubevirt-tekton-tasks-create-datavolume-rhel9@sha256:7112400a4ecb23ee2110bf96372fcf9f96ad648a51aa944627b40eb59539a660_arm64",
"product_identification_helper": {
"purl": "pkg:oci/kubevirt-tekton-tasks-create-datavolume-rhel9@sha256:7112400a4ecb23ee2110bf96372fcf9f96ad648a51aa944627b40eb59539a660?arch=arm64\u0026repository_url=registry.redhat.io/container-native-virtualization/kubevirt-tekton-tasks-create-datavolume-rhel9\u0026tag=v4.13.0--2022-101182"
}
}
},
{
"category": "product_version",
"name": "container-native-virtualization/kubevirt-tekton-tasks-create-vm-from-template-rhel9@sha256:4d962618aa95600c60c9fc8b890186e510de91177d51949e12797a3558e31328_arm64",
"product": {
"name": "container-native-virtualization/kubevirt-tekton-tasks-create-vm-from-template-rhel9@sha256:4d962618aa95600c60c9fc8b890186e510de91177d51949e12797a3558e31328_arm64",
"product_id": "container-native-virtualization/kubevirt-tekton-tasks-create-vm-from-template-rhel9@sha256:4d962618aa95600c60c9fc8b890186e510de91177d51949e12797a3558e31328_arm64",
"product_identification_helper": {
"purl": "pkg:oci/kubevirt-tekton-tasks-create-vm-from-template-rhel9@sha256:4d962618aa95600c60c9fc8b890186e510de91177d51949e12797a3558e31328?arch=arm64\u0026repository_url=registry.redhat.io/container-native-virtualization/kubevirt-tekton-tasks-create-vm-from-template-rhel9\u0026tag=v4.13.0--2022-101182"
}
}
},
{
"category": "product_version",
"name": "container-native-virtualization/kubevirt-tekton-tasks-disk-virt-customize-rhel9@sha256:a780244e48c6d4f87446d3754c3eb9ab79c0d54675c189da4a659f7a4d5668ea_arm64",
"product": {
"name": "container-native-virtualization/kubevirt-tekton-tasks-disk-virt-customize-rhel9@sha256:a780244e48c6d4f87446d3754c3eb9ab79c0d54675c189da4a659f7a4d5668ea_arm64",
"product_id": "container-native-virtualization/kubevirt-tekton-tasks-disk-virt-customize-rhel9@sha256:a780244e48c6d4f87446d3754c3eb9ab79c0d54675c189da4a659f7a4d5668ea_arm64",
"product_identification_helper": {
"purl": "pkg:oci/kubevirt-tekton-tasks-disk-virt-customize-rhel9@sha256:a780244e48c6d4f87446d3754c3eb9ab79c0d54675c189da4a659f7a4d5668ea?arch=arm64\u0026repository_url=registry.redhat.io/container-native-virtualization/kubevirt-tekton-tasks-disk-virt-customize-rhel9\u0026tag=v4.13.0--2022-101182"
}
}
},
{
"category": "product_version",
"name": "container-native-virtualization/kubevirt-tekton-tasks-disk-virt-sysprep-rhel9@sha256:84577d949a1bbcaa291c70729127bca4a8994df03068666baa23840877ea8392_arm64",
"product": {
"name": "container-native-virtualization/kubevirt-tekton-tasks-disk-virt-sysprep-rhel9@sha256:84577d949a1bbcaa291c70729127bca4a8994df03068666baa23840877ea8392_arm64",
"product_id": "container-native-virtualization/kubevirt-tekton-tasks-disk-virt-sysprep-rhel9@sha256:84577d949a1bbcaa291c70729127bca4a8994df03068666baa23840877ea8392_arm64",
"product_identification_helper": {
"purl": "pkg:oci/kubevirt-tekton-tasks-disk-virt-sysprep-rhel9@sha256:84577d949a1bbcaa291c70729127bca4a8994df03068666baa23840877ea8392?arch=arm64\u0026repository_url=registry.redhat.io/container-native-virtualization/kubevirt-tekton-tasks-disk-virt-sysprep-rhel9\u0026tag=v4.13.0--2022-101182"
}
}
},
{
"category": "product_version",
"name": "container-native-virtualization/kubevirt-tekton-tasks-modify-vm-template-rhel9@sha256:31d959b80cf57462e1705684bb7e1b78af26bd2c62f1c9e4e51e1d02199b05a8_arm64",
"product": {
"name": "container-native-virtualization/kubevirt-tekton-tasks-modify-vm-template-rhel9@sha256:31d959b80cf57462e1705684bb7e1b78af26bd2c62f1c9e4e51e1d02199b05a8_arm64",
"product_id": "container-native-virtualization/kubevirt-tekton-tasks-modify-vm-template-rhel9@sha256:31d959b80cf57462e1705684bb7e1b78af26bd2c62f1c9e4e51e1d02199b05a8_arm64",
"product_identification_helper": {
"purl": "pkg:oci/kubevirt-tekton-tasks-modify-vm-template-rhel9@sha256:31d959b80cf57462e1705684bb7e1b78af26bd2c62f1c9e4e51e1d02199b05a8?arch=arm64\u0026repository_url=registry.redhat.io/container-native-virtualization/kubevirt-tekton-tasks-modify-vm-template-rhel9\u0026tag=v4.13.0--2022-101182"
}
}
},
{
"category": "product_version",
"name": "container-native-virtualization/kubevirt-tekton-tasks-operator-rhel9@sha256:d0cf0e81589f0938de45961eaddfc5ec4782738fd11082de0439b200534259eb_arm64",
"product": {
"name": "container-native-virtualization/kubevirt-tekton-tasks-operator-rhel9@sha256:d0cf0e81589f0938de45961eaddfc5ec4782738fd11082de0439b200534259eb_arm64",
"product_id": "container-native-virtualization/kubevirt-tekton-tasks-operator-rhel9@sha256:d0cf0e81589f0938de45961eaddfc5ec4782738fd11082de0439b200534259eb_arm64",
"product_identification_helper": {
"purl": "pkg:oci/kubevirt-tekton-tasks-operator-rhel9@sha256:d0cf0e81589f0938de45961eaddfc5ec4782738fd11082de0439b200534259eb?arch=arm64\u0026repository_url=registry.redhat.io/container-native-virtualization/kubevirt-tekton-tasks-operator-rhel9\u0026tag=v4.13.0--2022-101182"
}
}
},
{
"category": "product_version",
"name": "container-native-virtualization/kubevirt-tekton-tasks-wait-for-vmi-status-rhel9@sha256:afb68af076954fcd18c7a4a1464ea0c2a766e8282eae980051906ed07eaa1707_arm64",
"product": {
"name": "container-native-virtualization/kubevirt-tekton-tasks-wait-for-vmi-status-rhel9@sha256:afb68af076954fcd18c7a4a1464ea0c2a766e8282eae980051906ed07eaa1707_arm64",
"product_id": "container-native-virtualization/kubevirt-tekton-tasks-wait-for-vmi-status-rhel9@sha256:afb68af076954fcd18c7a4a1464ea0c2a766e8282eae980051906ed07eaa1707_arm64",
"product_identification_helper": {
"purl": "pkg:oci/kubevirt-tekton-tasks-wait-for-vmi-status-rhel9@sha256:afb68af076954fcd18c7a4a1464ea0c2a766e8282eae980051906ed07eaa1707?arch=arm64\u0026repository_url=registry.redhat.io/container-native-virtualization/kubevirt-tekton-tasks-wait-for-vmi-status-rhel9\u0026tag=v4.13.0--2022-101182"
}
}
},
{
"category": "product_version",
"name": "container-native-virtualization/kubevirt-template-validator-rhel9@sha256:02b22c7e7014b5e72d47fed8b6a268cf307638c5510adf3916c51f7f40a52a08_arm64",
"product": {
"name": "container-native-virtualization/kubevirt-template-validator-rhel9@sha256:02b22c7e7014b5e72d47fed8b6a268cf307638c5510adf3916c51f7f40a52a08_arm64",
"product_id": "container-native-virtualization/kubevirt-template-validator-rhel9@sha256:02b22c7e7014b5e72d47fed8b6a268cf307638c5510adf3916c51f7f40a52a08_arm64",
"product_identification_helper": {
"purl": "pkg:oci/kubevirt-template-validator-rhel9@sha256:02b22c7e7014b5e72d47fed8b6a268cf307638c5510adf3916c51f7f40a52a08?arch=arm64\u0026repository_url=registry.redhat.io/container-native-virtualization/kubevirt-template-validator-rhel9\u0026tag=v4.13.0--2022-101182"
}
}
},
{
"category": "product_version",
"name": "container-native-virtualization/libguestfs-tools-rhel9@sha256:6558f60343e068b032167e2340b2c549c5f0258acc5d2614b60966ce79408b01_arm64",
"product": {
"name": "container-native-virtualization/libguestfs-tools-rhel9@sha256:6558f60343e068b032167e2340b2c549c5f0258acc5d2614b60966ce79408b01_arm64",
"product_id": "container-native-virtualization/libguestfs-tools-rhel9@sha256:6558f60343e068b032167e2340b2c549c5f0258acc5d2614b60966ce79408b01_arm64",
"product_identification_helper": {
"purl": "pkg:oci/libguestfs-tools-rhel9@sha256:6558f60343e068b032167e2340b2c549c5f0258acc5d2614b60966ce79408b01?arch=arm64\u0026repository_url=registry.redhat.io/container-native-virtualization/libguestfs-tools-rhel9\u0026tag=v4.13.0--2022-101182"
}
}
},
{
"category": "product_version",
"name": "container-native-virtualization/multus-dynamic-networks-rhel9@sha256:3ecb0162a4b01d1590bf209d717b32a4f0835910d9979823f18c24acba41b503_arm64",
"product": {
"name": "container-native-virtualization/multus-dynamic-networks-rhel9@sha256:3ecb0162a4b01d1590bf209d717b32a4f0835910d9979823f18c24acba41b503_arm64",
"product_id": "container-native-virtualization/multus-dynamic-networks-rhel9@sha256:3ecb0162a4b01d1590bf209d717b32a4f0835910d9979823f18c24acba41b503_arm64",
"product_identification_helper": {
"purl": "pkg:oci/multus-dynamic-networks-rhel9@sha256:3ecb0162a4b01d1590bf209d717b32a4f0835910d9979823f18c24acba41b503?arch=arm64\u0026repository_url=registry.redhat.io/container-native-virtualization/multus-dynamic-networks-rhel9\u0026tag=v4.13.0-37"
}
}
},
{
"category": "product_version",
"name": "container-native-virtualization/ovs-cni-plugin-rhel9@sha256:0f1d372f418744e0aff59ecb0a38f53178aac9c2e9eecfd38aa25ed83e0d1360_arm64",
"product": {
"name": "container-native-virtualization/ovs-cni-plugin-rhel9@sha256:0f1d372f418744e0aff59ecb0a38f53178aac9c2e9eecfd38aa25ed83e0d1360_arm64",
"product_id": "container-native-virtualization/ovs-cni-plugin-rhel9@sha256:0f1d372f418744e0aff59ecb0a38f53178aac9c2e9eecfd38aa25ed83e0d1360_arm64",
"product_identification_helper": {
"purl": "pkg:oci/ovs-cni-plugin-rhel9@sha256:0f1d372f418744e0aff59ecb0a38f53178aac9c2e9eecfd38aa25ed83e0d1360?arch=arm64\u0026repository_url=registry.redhat.io/container-native-virtualization/ovs-cni-plugin-rhel9\u0026tag=v4.13.0--2022-101182"
}
}
},
{
"category": "product_version",
"name": "container-native-virtualization/virt-api-rhel9@sha256:e68416321ca8c74a547b3d35897f54813c03481143e402e9bdc4daf315e35b5d_arm64",
"product": {
"name": "container-native-virtualization/virt-api-rhel9@sha256:e68416321ca8c74a547b3d35897f54813c03481143e402e9bdc4daf315e35b5d_arm64",
"product_id": "container-native-virtualization/virt-api-rhel9@sha256:e68416321ca8c74a547b3d35897f54813c03481143e402e9bdc4daf315e35b5d_arm64",
"product_identification_helper": {
"purl": "pkg:oci/virt-api-rhel9@sha256:e68416321ca8c74a547b3d35897f54813c03481143e402e9bdc4daf315e35b5d?arch=arm64\u0026repository_url=registry.redhat.io/container-native-virtualization/virt-api-rhel9\u0026tag=v4.13.0--2022-101182"
}
}
},
{
"category": "product_version",
"name": "container-native-virtualization/virt-artifacts-server-rhel9@sha256:33d11c1832b49df39c1fca62bad40dbc5c30a452248339aaef449ac99509accb_arm64",
"product": {
"name": "container-native-virtualization/virt-artifacts-server-rhel9@sha256:33d11c1832b49df39c1fca62bad40dbc5c30a452248339aaef449ac99509accb_arm64",
"product_id": "container-native-virtualization/virt-artifacts-server-rhel9@sha256:33d11c1832b49df39c1fca62bad40dbc5c30a452248339aaef449ac99509accb_arm64",
"product_identification_helper": {
"purl": "pkg:oci/virt-artifacts-server-rhel9@sha256:33d11c1832b49df39c1fca62bad40dbc5c30a452248339aaef449ac99509accb?arch=arm64\u0026repository_url=registry.redhat.io/container-native-virtualization/virt-artifacts-server-rhel9\u0026tag=v4.13.0--2022-101182"
}
}
},
{
"category": "product_version",
"name": "container-native-virtualization/virt-cdi-apiserver-rhel9@sha256:f6128a63344ed2129f5bce648ddcfaa2869d31cde4b93328d3c22534b97ade10_arm64",
"product": {
"name": "container-native-virtualization/virt-cdi-apiserver-rhel9@sha256:f6128a63344ed2129f5bce648ddcfaa2869d31cde4b93328d3c22534b97ade10_arm64",
"product_id": "container-native-virtualization/virt-cdi-apiserver-rhel9@sha256:f6128a63344ed2129f5bce648ddcfaa2869d31cde4b93328d3c22534b97ade10_arm64",
"product_identification_helper": {
"purl": "pkg:oci/virt-cdi-apiserver-rhel9@sha256:f6128a63344ed2129f5bce648ddcfaa2869d31cde4b93328d3c22534b97ade10?arch=arm64\u0026repository_url=registry.redhat.io/container-native-virtualization/virt-cdi-apiserver-rhel9\u0026tag=v4.13.0--2022-101182"
}
}
},
{
"category": "product_version",
"name": "container-native-virtualization/virt-cdi-cloner-rhel9@sha256:6ac212767481bef64d8a7d0252bb8089c0f9751fad4a355aef71bd49dad2ad07_arm64",
"product": {
"name": "container-native-virtualization/virt-cdi-cloner-rhel9@sha256:6ac212767481bef64d8a7d0252bb8089c0f9751fad4a355aef71bd49dad2ad07_arm64",
"product_id": "container-native-virtualization/virt-cdi-cloner-rhel9@sha256:6ac212767481bef64d8a7d0252bb8089c0f9751fad4a355aef71bd49dad2ad07_arm64",
"product_identification_helper": {
"purl": "pkg:oci/virt-cdi-cloner-rhel9@sha256:6ac212767481bef64d8a7d0252bb8089c0f9751fad4a355aef71bd49dad2ad07?arch=arm64\u0026repository_url=registry.redhat.io/container-native-virtualization/virt-cdi-cloner-rhel9\u0026tag=v4.13.0--2022-101182"
}
}
},
{
"category": "product_version",
"name": "container-native-virtualization/virt-cdi-controller-rhel9@sha256:65f5263275d9f0a12b8fb057d82adf678778039ec873ca9bde182dea3413c9f1_arm64",
"product": {
"name": "container-native-virtualization/virt-cdi-controller-rhel9@sha256:65f5263275d9f0a12b8fb057d82adf678778039ec873ca9bde182dea3413c9f1_arm64",
"product_id": "container-native-virtualization/virt-cdi-controller-rhel9@sha256:65f5263275d9f0a12b8fb057d82adf678778039ec873ca9bde182dea3413c9f1_arm64",
"product_identification_helper": {
"purl": "pkg:oci/virt-cdi-controller-rhel9@sha256:65f5263275d9f0a12b8fb057d82adf678778039ec873ca9bde182dea3413c9f1?arch=arm64\u0026repository_url=registry.redhat.io/container-native-virtualization/virt-cdi-controller-rhel9\u0026tag=v4.13.0--2022-101182"
}
}
},
{
"category": "product_version",
"name": "container-native-virtualization/virt-cdi-importer-rhel9@sha256:00a6d9d24ca1466d450b02269ec3144fc7550f0e5c696e869fbf7ce10cae6093_arm64",
"product": {
"name": "container-native-virtualization/virt-cdi-importer-rhel9@sha256:00a6d9d24ca1466d450b02269ec3144fc7550f0e5c696e869fbf7ce10cae6093_arm64",
"product_id": "container-native-virtualization/virt-cdi-importer-rhel9@sha256:00a6d9d24ca1466d450b02269ec3144fc7550f0e5c696e869fbf7ce10cae6093_arm64",
"product_identification_helper": {
"purl": "pkg:oci/virt-cdi-importer-rhel9@sha256:00a6d9d24ca1466d450b02269ec3144fc7550f0e5c696e869fbf7ce10cae6093?arch=arm64\u0026repository_url=registry.redhat.io/container-native-virtualization/virt-cdi-importer-rhel9\u0026tag=v4.13.0--2022-101182"
}
}
},
{
"category": "product_version",
"name": "container-native-virtualization/virt-cdi-operator-rhel9@sha256:20ec064750faedd97d11b797c8c1d9a1db5d60d7d76e82e65cfd05eb79d65e29_arm64",
"product": {
"name": "container-native-virtualization/virt-cdi-operator-rhel9@sha256:20ec064750faedd97d11b797c8c1d9a1db5d60d7d76e82e65cfd05eb79d65e29_arm64",
"product_id": "container-native-virtualization/virt-cdi-operator-rhel9@sha256:20ec064750faedd97d11b797c8c1d9a1db5d60d7d76e82e65cfd05eb79d65e29_arm64",
"product_identification_helper": {
"purl": "pkg:oci/virt-cdi-operator-rhel9@sha256:20ec064750faedd97d11b797c8c1d9a1db5d60d7d76e82e65cfd05eb79d65e29?arch=arm64\u0026repository_url=registry.redhat.io/container-native-virtualization/virt-cdi-operator-rhel9\u0026tag=v4.13.0--2022-101182"
}
}
},
{
"category": "product_version",
"name": "container-native-virtualization/virt-cdi-uploadproxy-rhel9@sha256:392d0f61f462c707adfdc21e4239c5c09d8520a80486b41d9d9ae479267d6124_arm64",
"product": {
"name": "container-native-virtualization/virt-cdi-uploadproxy-rhel9@sha256:392d0f61f462c707adfdc21e4239c5c09d8520a80486b41d9d9ae479267d6124_arm64",
"product_id": "container-native-virtualization/virt-cdi-uploadproxy-rhel9@sha256:392d0f61f462c707adfdc21e4239c5c09d8520a80486b41d9d9ae479267d6124_arm64",
"product_identification_helper": {
"purl": "pkg:oci/virt-cdi-uploadproxy-rhel9@sha256:392d0f61f462c707adfdc21e4239c5c09d8520a80486b41d9d9ae479267d6124?arch=arm64\u0026repository_url=registry.redhat.io/container-native-virtualization/virt-cdi-uploadproxy-rhel9\u0026tag=v4.13.0--2022-101182"
}
}
},
{
"category": "product_version",
"name": "container-native-virtualization/virt-cdi-uploadserver-rhel9@sha256:4528c24672689cfb6505761b6b108fbcc04488192733f23d2bfe39cd42a1d743_arm64",
"product": {
"name": "container-native-virtualization/virt-cdi-uploadserver-rhel9@sha256:4528c24672689cfb6505761b6b108fbcc04488192733f23d2bfe39cd42a1d743_arm64",
"product_id": "container-native-virtualization/virt-cdi-uploadserver-rhel9@sha256:4528c24672689cfb6505761b6b108fbcc04488192733f23d2bfe39cd42a1d743_arm64",
"product_identification_helper": {
"purl": "pkg:oci/virt-cdi-uploadserver-rhel9@sha256:4528c24672689cfb6505761b6b108fbcc04488192733f23d2bfe39cd42a1d743?arch=arm64\u0026repository_url=registry.redhat.io/container-native-virtualization/virt-cdi-uploadserver-rhel9\u0026tag=v4.13.0--2022-101182"
}
}
},
{
"category": "product_version",
"name": "container-native-virtualization/virt-controller-rhel9@sha256:970edc281d7a731e9f7e8c2d4440fe48a221e5e355d5235c5413b4c3adb28503_arm64",
"product": {
"name": "container-native-virtualization/virt-controller-rhel9@sha256:970edc281d7a731e9f7e8c2d4440fe48a221e5e355d5235c5413b4c3adb28503_arm64",
"product_id": "container-native-virtualization/virt-controller-rhel9@sha256:970edc281d7a731e9f7e8c2d4440fe48a221e5e355d5235c5413b4c3adb28503_arm64",
"product_identification_helper": {
"purl": "pkg:oci/virt-controller-rhel9@sha256:970edc281d7a731e9f7e8c2d4440fe48a221e5e355d5235c5413b4c3adb28503?arch=arm64\u0026repository_url=registry.redhat.io/container-native-virtualization/virt-controller-rhel9\u0026tag=v4.13.0--2022-101182"
}
}
},
{
"category": "product_version",
"name": "container-native-virtualization/virt-exportproxy-rhel9@sha256:de3c4afbf7669b98517cbef2490ec186f0553dd97b05bed80ec36dd883fe507b_arm64",
"product": {
"name": "container-native-virtualization/virt-exportproxy-rhel9@sha256:de3c4afbf7669b98517cbef2490ec186f0553dd97b05bed80ec36dd883fe507b_arm64",
"product_id": "container-native-virtualization/virt-exportproxy-rhel9@sha256:de3c4afbf7669b98517cbef2490ec186f0553dd97b05bed80ec36dd883fe507b_arm64",
"product_identification_helper": {
"purl": "pkg:oci/virt-exportproxy-rhel9@sha256:de3c4afbf7669b98517cbef2490ec186f0553dd97b05bed80ec36dd883fe507b?arch=arm64\u0026repository_url=registry.redhat.io/container-native-virtualization/virt-exportproxy-rhel9\u0026tag=v4.13.0--2022-101182"
}
}
},
{
"category": "product_version",
"name": "container-native-virtualization/virt-exportserver-rhel9@sha256:3f7f98645176d42c63cca5c0fc3182a03121af87446ca421b6c72baf07dfca0d_arm64",
"product": {
"name": "container-native-virtualization/virt-exportserver-rhel9@sha256:3f7f98645176d42c63cca5c0fc3182a03121af87446ca421b6c72baf07dfca0d_arm64",
"product_id": "container-native-virtualization/virt-exportserver-rhel9@sha256:3f7f98645176d42c63cca5c0fc3182a03121af87446ca421b6c72baf07dfca0d_arm64",
"product_identification_helper": {
"purl": "pkg:oci/virt-exportserver-rhel9@sha256:3f7f98645176d42c63cca5c0fc3182a03121af87446ca421b6c72baf07dfca0d?arch=arm64\u0026repository_url=registry.redhat.io/container-native-virtualization/virt-exportserver-rhel9\u0026tag=v4.13.0--2022-101182"
}
}
},
{
"category": "product_version",
"name": "container-native-virtualization/virt-handler-rhel9@sha256:5fc47110d866d8048aec50689090ce10705d19d3bb48d2b06727d6d569003af7_arm64",
"product": {
"name": "container-native-virtualization/virt-handler-rhel9@sha256:5fc47110d866d8048aec50689090ce10705d19d3bb48d2b06727d6d569003af7_arm64",
"product_id": "container-native-virtualization/virt-handler-rhel9@sha256:5fc47110d866d8048aec50689090ce10705d19d3bb48d2b06727d6d569003af7_arm64",
"product_identification_helper": {
"purl": "pkg:oci/virt-handler-rhel9@sha256:5fc47110d866d8048aec50689090ce10705d19d3bb48d2b06727d6d569003af7?arch=arm64\u0026repository_url=registry.redhat.io/container-native-virtualization/virt-handler-rhel9\u0026tag=v4.13.0--2022-101182"
}
}
},
{
"category": "product_version",
"name": "container-native-virtualization/virtio-win-rhel9@sha256:8735f51da918408a8826601c082d1b29accf26d59b9978da89b980cb509c1102_arm64",
"product": {
"name": "container-native-virtualization/virtio-win-rhel9@sha256:8735f51da918408a8826601c082d1b29accf26d59b9978da89b980cb509c1102_arm64",
"product_id": "container-native-virtualization/virtio-win-rhel9@sha256:8735f51da918408a8826601c082d1b29accf26d59b9978da89b980cb509c1102_arm64",
"product_identification_helper": {
"purl": "pkg:oci/virtio-win-rhel9@sha256:8735f51da918408a8826601c082d1b29accf26d59b9978da89b980cb509c1102?arch=arm64\u0026repository_url=registry.redhat.io/container-native-virtualization/virtio-win-rhel9\u0026tag=v4.13.0--2022-101182"
}
}
},
{
"category": "product_version",
"name": "container-native-virtualization/virt-launcher-rhel9@sha256:95aeacb98209e0baef27ce0e02fbac38d693cea74808fc77107efda0f344bcb5_arm64",
"product": {
"name": "container-native-virtualization/virt-launcher-rhel9@sha256:95aeacb98209e0baef27ce0e02fbac38d693cea74808fc77107efda0f344bcb5_arm64",
"product_id": "container-native-virtualization/virt-launcher-rhel9@sha256:95aeacb98209e0baef27ce0e02fbac38d693cea74808fc77107efda0f344bcb5_arm64",
"product_identification_helper": {
"purl": "pkg:oci/virt-launcher-rhel9@sha256:95aeacb98209e0baef27ce0e02fbac38d693cea74808fc77107efda0f344bcb5?arch=arm64\u0026repository_url=registry.redhat.io/container-native-virtualization/virt-launcher-rhel9\u0026tag=v4.13.0--2022-101182"
}
}
},
{
"category": "product_version",
"name": "container-native-virtualization/virt-operator-rhel9@sha256:66b1b3b379121d6411ba22283e7d991617177330c93746d37753ab7812b9a00b_arm64",
"product": {
"name": "container-native-virtualization/virt-operator-rhel9@sha256:66b1b3b379121d6411ba22283e7d991617177330c93746d37753ab7812b9a00b_arm64",
"product_id": "container-native-virtualization/virt-operator-rhel9@sha256:66b1b3b379121d6411ba22283e7d991617177330c93746d37753ab7812b9a00b_arm64",
"product_identification_helper": {
"purl": "pkg:oci/virt-operator-rhel9@sha256:66b1b3b379121d6411ba22283e7d991617177330c93746d37753ab7812b9a00b?arch=arm64\u0026repository_url=registry.redhat.io/container-native-virtualization/virt-operator-rhel9\u0026tag=v4.13.0--2022-101182"
}
}
},
{
"category": "product_version",
"name": "container-native-virtualization/vm-console-proxy-rhel9@sha256:70a8d0cd66182c25e02679540bae1368b2a9cf687532b58dba41ef30c5ca00c1_arm64",
"product": {
"name": "container-native-virtualization/vm-console-proxy-rhel9@sha256:70a8d0cd66182c25e02679540bae1368b2a9cf687532b58dba41ef30c5ca00c1_arm64",
"product_id": "container-native-virtualization/vm-console-proxy-rhel9@sha256:70a8d0cd66182c25e02679540bae1368b2a9cf687532b58dba41ef30c5ca00c1_arm64",
"product_identification_helper": {
"purl": "pkg:oci/vm-console-proxy-rhel9@sha256:70a8d0cd66182c25e02679540bae1368b2a9cf687532b58dba41ef30c5ca00c1?arch=arm64\u0026repository_url=registry.redhat.io/container-native-virtualization/vm-console-proxy-rhel9\u0026tag=v4.13.0--2022-101182"
}
}
},
{
"category": "product_version",
"name": "container-native-virtualization/vm-network-latency-checkup-rhel9@sha256:503ea7ac914a9b54e9d665a0227ee0b5d5200cdb5d692aa94c07dd1518d91b70_arm64",
"product": {
"name": "container-native-virtualization/vm-network-latency-checkup-rhel9@sha256:503ea7ac914a9b54e9d665a0227ee0b5d5200cdb5d692aa94c07dd1518d91b70_arm64",
"product_id": "container-native-virtualization/vm-network-latency-checkup-rhel9@sha256:503ea7ac914a9b54e9d665a0227ee0b5d5200cdb5d692aa94c07dd1518d91b70_arm64",
"product_identification_helper": {
"purl": "pkg:oci/vm-network-latency-checkup-rhel9@sha256:503ea7ac914a9b54e9d665a0227ee0b5d5200cdb5d692aa94c07dd1518d91b70?arch=arm64\u0026repository_url=registry.redhat.io/container-native-virtualization/vm-network-latency-checkup-rhel9\u0026tag=v4.13.0--2022-101182"
}
}
}
],
"category": "architecture",
"name": "arm64"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "container-native-virtualization/bridge-marker-rhel9@sha256:8eac196b30a648989cdca5cb153a3bc3d34e47339acba0e4f760bd366496c99d_amd64 as a component of CNV 4.13 for RHEL 9",
"product_id": "9Base-CNV-4.13:container-native-virtualization/bridge-marker-rhel9@sha256:8eac196b30a648989cdca5cb153a3bc3d34e47339acba0e4f760bd366496c99d_amd64"
},
"product_reference": "container-native-virtualization/bridge-marker-rhel9@sha256:8eac196b30a648989cdca5cb153a3bc3d34e47339acba0e4f760bd366496c99d_amd64",
"relates_to_product_reference": "9Base-CNV-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "container-native-virtualization/bridge-marker-rhel9@sha256:e8a55aee3d75a316bb0d7a554c737198823df04b3c05e481c17e45eb2153bced_arm64 as a component of CNV 4.13 for RHEL 9",
"product_id": "9Base-CNV-4.13:container-native-virtualization/bridge-marker-rhel9@sha256:e8a55aee3d75a316bb0d7a554c737198823df04b3c05e481c17e45eb2153bced_arm64"
},
"product_reference": "container-native-virtualization/bridge-marker-rhel9@sha256:e8a55aee3d75a316bb0d7a554c737198823df04b3c05e481c17e45eb2153bced_arm64",
"relates_to_product_reference": "9Base-CNV-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "container-native-virtualization/cluster-network-addons-operator-rhel9@sha256:3bff33e3f40cd1e2b519c2db56734d4bb8df883e155c2f20b1cb9d3d184daec1_amd64 as a component of CNV 4.13 for RHEL 9",
"product_id": "9Base-CNV-4.13:container-native-virtualization/cluster-network-addons-operator-rhel9@sha256:3bff33e3f40cd1e2b519c2db56734d4bb8df883e155c2f20b1cb9d3d184daec1_amd64"
},
"product_reference": "container-native-virtualization/cluster-network-addons-operator-rhel9@sha256:3bff33e3f40cd1e2b519c2db56734d4bb8df883e155c2f20b1cb9d3d184daec1_amd64",
"relates_to_product_reference": "9Base-CNV-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "container-native-virtualization/cluster-network-addons-operator-rhel9@sha256:f439d2f420bb59eb1d5af14ce2002648d0cfc155d1a1466c8aac9b661fe902b8_arm64 as a component of CNV 4.13 for RHEL 9",
"product_id": "9Base-CNV-4.13:container-native-virtualization/cluster-network-addons-operator-rhel9@sha256:f439d2f420bb59eb1d5af14ce2002648d0cfc155d1a1466c8aac9b661fe902b8_arm64"
},
"product_reference": "container-native-virtualization/cluster-network-addons-operator-rhel9@sha256:f439d2f420bb59eb1d5af14ce2002648d0cfc155d1a1466c8aac9b661fe902b8_arm64",
"relates_to_product_reference": "9Base-CNV-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "container-native-virtualization/cnv-containernetworking-plugins-rhel9@sha256:89f22e541f61a660c9aa9f38ef58e80b84a0517f74e84292107fc252c25465c9_arm64 as a component of CNV 4.13 for RHEL 9",
"product_id": "9Base-CNV-4.13:container-native-virtualization/cnv-containernetworking-plugins-rhel9@sha256:89f22e541f61a660c9aa9f38ef58e80b84a0517f74e84292107fc252c25465c9_arm64"
},
"product_reference": "container-native-virtualization/cnv-containernetworking-plugins-rhel9@sha256:89f22e541f61a660c9aa9f38ef58e80b84a0517f74e84292107fc252c25465c9_arm64",
"relates_to_product_reference": "9Base-CNV-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "container-native-virtualization/cnv-containernetworking-plugins-rhel9@sha256:bf471997e54e4a75b0d71f492ab295787fdbb14d8c85c4ea8c03f0552dbc3755_amd64 as a component of CNV 4.13 for RHEL 9",
"product_id": "9Base-CNV-4.13:container-native-virtualization/cnv-containernetworking-plugins-rhel9@sha256:bf471997e54e4a75b0d71f492ab295787fdbb14d8c85c4ea8c03f0552dbc3755_amd64"
},
"product_reference": "container-native-virtualization/cnv-containernetworking-plugins-rhel9@sha256:bf471997e54e4a75b0d71f492ab295787fdbb14d8c85c4ea8c03f0552dbc3755_amd64",
"relates_to_product_reference": "9Base-CNV-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "container-native-virtualization/cnv-must-gather-rhel9@sha256:9e8efd76924958eb605401abdac08eba97fb83a1ada383bc87a7fb7c87b3a455_arm64 as a component of CNV 4.13 for RHEL 9",
"product_id": "9Base-CNV-4.13:container-native-virtualization/cnv-must-gather-rhel9@sha256:9e8efd76924958eb605401abdac08eba97fb83a1ada383bc87a7fb7c87b3a455_arm64"
},
"product_reference": "container-native-virtualization/cnv-must-gather-rhel9@sha256:9e8efd76924958eb605401abdac08eba97fb83a1ada383bc87a7fb7c87b3a455_arm64",
"relates_to_product_reference": "9Base-CNV-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "container-native-virtualization/cnv-must-gather-rhel9@sha256:b9fc32b5fabedd65a4c3a471879c808af2087277de4278adaa115a732f0468da_amd64 as a component of CNV 4.13 for RHEL 9",
"product_id": "9Base-CNV-4.13:container-native-virtualization/cnv-must-gather-rhel9@sha256:b9fc32b5fabedd65a4c3a471879c808af2087277de4278adaa115a732f0468da_amd64"
},
"product_reference": "container-native-virtualization/cnv-must-gather-rhel9@sha256:b9fc32b5fabedd65a4c3a471879c808af2087277de4278adaa115a732f0468da_amd64",
"relates_to_product_reference": "9Base-CNV-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "container-native-virtualization/hco-bundle-registry-rhel9@sha256:60e89d7a99ff9f20e974430b802dd724a3bb6fa1e01e5a62daad98ac487b3063_amd64 as a component of CNV 4.13 for RHEL 9",
"product_id": "9Base-CNV-4.13:container-native-virtualization/hco-bundle-registry-rhel9@sha256:60e89d7a99ff9f20e974430b802dd724a3bb6fa1e01e5a62daad98ac487b3063_amd64"
},
"product_reference": "container-native-virtualization/hco-bundle-registry-rhel9@sha256:60e89d7a99ff9f20e974430b802dd724a3bb6fa1e01e5a62daad98ac487b3063_amd64",
"relates_to_product_reference": "9Base-CNV-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "container-native-virtualization/hco-bundle-registry-rhel9@sha256:dd20b138045ef1424d83a47e7abcfcbb2ac54577dcec5ed3c186390aaa4c9d84_arm64 as a component of CNV 4.13 for RHEL 9",
"product_id": "9Base-CNV-4.13:container-native-virtualization/hco-bundle-registry-rhel9@sha256:dd20b138045ef1424d83a47e7abcfcbb2ac54577dcec5ed3c186390aaa4c9d84_arm64"
},
"product_reference": "container-native-virtualization/hco-bundle-registry-rhel9@sha256:dd20b138045ef1424d83a47e7abcfcbb2ac54577dcec5ed3c186390aaa4c9d84_arm64",
"relates_to_product_reference": "9Base-CNV-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "container-native-virtualization/hostpath-csi-driver-rhel9@sha256:61e2824853d51347593ad909a5e546cd92e4216d6a1df5dffb50dd9cba277cce_amd64 as a component of CNV 4.13 for RHEL 9",
"product_id": "9Base-CNV-4.13:container-native-virtualization/hostpath-csi-driver-rhel9@sha256:61e2824853d51347593ad909a5e546cd92e4216d6a1df5dffb50dd9cba277cce_amd64"
},
"product_reference": "container-native-virtualization/hostpath-csi-driver-rhel9@sha256:61e2824853d51347593ad909a5e546cd92e4216d6a1df5dffb50dd9cba277cce_amd64",
"relates_to_product_reference": "9Base-CNV-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "container-native-virtualization/hostpath-csi-driver-rhel9@sha256:676d4c23a5f60dd331728af056b0a6b2d3358ac88da23299b1a98dfaca8f288e_arm64 as a component of CNV 4.13 for RHEL 9",
"product_id": "9Base-CNV-4.13:container-native-virtualization/hostpath-csi-driver-rhel9@sha256:676d4c23a5f60dd331728af056b0a6b2d3358ac88da23299b1a98dfaca8f288e_arm64"
},
"product_reference": "container-native-virtualization/hostpath-csi-driver-rhel9@sha256:676d4c23a5f60dd331728af056b0a6b2d3358ac88da23299b1a98dfaca8f288e_arm64",
"relates_to_product_reference": "9Base-CNV-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "container-native-virtualization/hostpath-provisioner-operator-rhel9@sha256:515be94be496c67f5b8fd5f4832fe4385e56476e6589897d6b9fbb9bb2b00f32_amd64 as a component of CNV 4.13 for RHEL 9",
"product_id": "9Base-CNV-4.13:container-native-virtualization/hostpath-provisioner-operator-rhel9@sha256:515be94be496c67f5b8fd5f4832fe4385e56476e6589897d6b9fbb9bb2b00f32_amd64"
},
"product_reference": "container-native-virtualization/hostpath-provisioner-operator-rhel9@sha256:515be94be496c67f5b8fd5f4832fe4385e56476e6589897d6b9fbb9bb2b00f32_amd64",
"relates_to_product_reference": "9Base-CNV-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "container-native-virtualization/hostpath-provisioner-operator-rhel9@sha256:571ae805641dea11646028c946039983c7fd82f138b915dcb8b80c39b465e63c_arm64 as a component of CNV 4.13 for RHEL 9",
"product_id": "9Base-CNV-4.13:container-native-virtualization/hostpath-provisioner-operator-rhel9@sha256:571ae805641dea11646028c946039983c7fd82f138b915dcb8b80c39b465e63c_arm64"
},
"product_reference": "container-native-virtualization/hostpath-provisioner-operator-rhel9@sha256:571ae805641dea11646028c946039983c7fd82f138b915dcb8b80c39b465e63c_arm64",
"relates_to_product_reference": "9Base-CNV-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "container-native-virtualization/hostpath-provisioner-rhel9@sha256:ac3fe350bedd6bc43596444ba0f279ccf8a144ab14ac5a9b80ea71c46390b7b4_amd64 as a component of CNV 4.13 for RHEL 9",
"product_id": "9Base-CNV-4.13:container-native-virtualization/hostpath-provisioner-rhel9@sha256:ac3fe350bedd6bc43596444ba0f279ccf8a144ab14ac5a9b80ea71c46390b7b4_amd64"
},
"product_reference": "container-native-virtualization/hostpath-provisioner-rhel9@sha256:ac3fe350bedd6bc43596444ba0f279ccf8a144ab14ac5a9b80ea71c46390b7b4_amd64",
"relates_to_product_reference": "9Base-CNV-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "container-native-virtualization/hostpath-provisioner-rhel9@sha256:d4ed87745b7ee2acca2d83e2c91c2f6dced1903c81495b50f2559b3ba2dde287_arm64 as a component of CNV 4.13 for RHEL 9",
"product_id": "9Base-CNV-4.13:container-native-virtualization/hostpath-provisioner-rhel9@sha256:d4ed87745b7ee2acca2d83e2c91c2f6dced1903c81495b50f2559b3ba2dde287_arm64"
},
"product_reference": "container-native-virtualization/hostpath-provisioner-rhel9@sha256:d4ed87745b7ee2acca2d83e2c91c2f6dced1903c81495b50f2559b3ba2dde287_arm64",
"relates_to_product_reference": "9Base-CNV-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "container-native-virtualization/hyperconverged-cluster-operator-rhel9@sha256:e5ab9f3be59d3568e3d672ab374efb16990ccf92192eac4e1244b10fcd7423e2_amd64 as a component of CNV 4.13 for RHEL 9",
"product_id": "9Base-CNV-4.13:container-native-virtualization/hyperconverged-cluster-operator-rhel9@sha256:e5ab9f3be59d3568e3d672ab374efb16990ccf92192eac4e1244b10fcd7423e2_amd64"
},
"product_reference": "container-native-virtualization/hyperconverged-cluster-operator-rhel9@sha256:e5ab9f3be59d3568e3d672ab374efb16990ccf92192eac4e1244b10fcd7423e2_amd64",
"relates_to_product_reference": "9Base-CNV-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "container-native-virtualization/hyperconverged-cluster-operator-rhel9@sha256:e681560b184189df03fc84c8a712f32289f42573dd348cda394b19565eb6eca8_arm64 as a component of CNV 4.13 for RHEL 9",
"product_id": "9Base-CNV-4.13:container-native-virtualization/hyperconverged-cluster-operator-rhel9@sha256:e681560b184189df03fc84c8a712f32289f42573dd348cda394b19565eb6eca8_arm64"
},
"product_reference": "container-native-virtualization/hyperconverged-cluster-operator-rhel9@sha256:e681560b184189df03fc84c8a712f32289f42573dd348cda394b19565eb6eca8_arm64",
"relates_to_product_reference": "9Base-CNV-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "container-native-virtualization/hyperconverged-cluster-webhook-rhel9@sha256:06d036d320b3027bb8370bb8e0f6fe8c9f0ec9bca7aac3b5c53698ba4a170042_arm64 as a component of CNV 4.13 for RHEL 9",
"product_id": "9Base-CNV-4.13:container-native-virtualization/hyperconverged-cluster-webhook-rhel9@sha256:06d036d320b3027bb8370bb8e0f6fe8c9f0ec9bca7aac3b5c53698ba4a170042_arm64"
},
"product_reference": "container-native-virtualization/hyperconverged-cluster-webhook-rhel9@sha256:06d036d320b3027bb8370bb8e0f6fe8c9f0ec9bca7aac3b5c53698ba4a170042_arm64",
"relates_to_product_reference": "9Base-CNV-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "container-native-virtualization/hyperconverged-cluster-webhook-rhel9@sha256:b5a01336180aad017df62cf8e652f2491b8263ba7e4dd07f858db1ef1924cf2f_amd64 as a component of CNV 4.13 for RHEL 9",
"product_id": "9Base-CNV-4.13:container-native-virtualization/hyperconverged-cluster-webhook-rhel9@sha256:b5a01336180aad017df62cf8e652f2491b8263ba7e4dd07f858db1ef1924cf2f_amd64"
},
"product_reference": "container-native-virtualization/hyperconverged-cluster-webhook-rhel9@sha256:b5a01336180aad017df62cf8e652f2491b8263ba7e4dd07f858db1ef1924cf2f_amd64",
"relates_to_product_reference": "9Base-CNV-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "container-native-virtualization/kubemacpool-rhel9@sha256:4d190d81eeb3fbe9ed56cf3548dc83a3f81641bfdafa7b42dcfb0d2512566644_amd64 as a component of CNV 4.13 for RHEL 9",
"product_id": "9Base-CNV-4.13:container-native-virtualization/kubemacpool-rhel9@sha256:4d190d81eeb3fbe9ed56cf3548dc83a3f81641bfdafa7b42dcfb0d2512566644_amd64"
},
"product_reference": "container-native-virtualization/kubemacpool-rhel9@sha256:4d190d81eeb3fbe9ed56cf3548dc83a3f81641bfdafa7b42dcfb0d2512566644_amd64",
"relates_to_product_reference": "9Base-CNV-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "container-native-virtualization/kubemacpool-rhel9@sha256:59862a59854f0d5b83dc25ba119f9586a8aff42b6e60d1922f8ae7b4567309ff_arm64 as a component of CNV 4.13 for RHEL 9",
"product_id": "9Base-CNV-4.13:container-native-virtualization/kubemacpool-rhel9@sha256:59862a59854f0d5b83dc25ba119f9586a8aff42b6e60d1922f8ae7b4567309ff_arm64"
},
"product_reference": "container-native-virtualization/kubemacpool-rhel9@sha256:59862a59854f0d5b83dc25ba119f9586a8aff42b6e60d1922f8ae7b4567309ff_arm64",
"relates_to_product_reference": "9Base-CNV-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "container-native-virtualization/kubesecondarydns-rhel9@sha256:121d30d78cc57731ea2242ef2c32430890ac66c2723e65608d5e2f26c3f515cd_amd64 as a component of CNV 4.13 for RHEL 9",
"product_id": "9Base-CNV-4.13:container-native-virtualization/kubesecondarydns-rhel9@sha256:121d30d78cc57731ea2242ef2c32430890ac66c2723e65608d5e2f26c3f515cd_amd64"
},
"product_reference": "container-native-virtualization/kubesecondarydns-rhel9@sha256:121d30d78cc57731ea2242ef2c32430890ac66c2723e65608d5e2f26c3f515cd_amd64",
"relates_to_product_reference": "9Base-CNV-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "container-native-virtualization/kubesecondarydns-rhel9@sha256:b1838f3c8ba3d8113bddea17b78c21e1c1490e2a4a07ea77014edee523d06347_arm64 as a component of CNV 4.13 for RHEL 9",
"product_id": "9Base-CNV-4.13:container-native-virtualization/kubesecondarydns-rhel9@sha256:b1838f3c8ba3d8113bddea17b78c21e1c1490e2a4a07ea77014edee523d06347_arm64"
},
"product_reference": "container-native-virtualization/kubesecondarydns-rhel9@sha256:b1838f3c8ba3d8113bddea17b78c21e1c1490e2a4a07ea77014edee523d06347_arm64",
"relates_to_product_reference": "9Base-CNV-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "container-native-virtualization/kubevirt-console-plugin-rhel9@sha256:86a4b1e3d6ad1d56302c9c058f8bc5826dcfe6c46fb3e0ddaa06818645039020_amd64 as a component of CNV 4.13 for RHEL 9",
"product_id": "9Base-CNV-4.13:container-native-virtualization/kubevirt-console-plugin-rhel9@sha256:86a4b1e3d6ad1d56302c9c058f8bc5826dcfe6c46fb3e0ddaa06818645039020_amd64"
},
"product_reference": "container-native-virtualization/kubevirt-console-plugin-rhel9@sha256:86a4b1e3d6ad1d56302c9c058f8bc5826dcfe6c46fb3e0ddaa06818645039020_amd64",
"relates_to_product_reference": "9Base-CNV-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "container-native-virtualization/kubevirt-console-plugin-rhel9@sha256:ffb2acd9ae09c1ef9ca756f5eaf6087d0a3957cfc824543949d25f556a97744d_arm64 as a component of CNV 4.13 for RHEL 9",
"product_id": "9Base-CNV-4.13:container-native-virtualization/kubevirt-console-plugin-rhel9@sha256:ffb2acd9ae09c1ef9ca756f5eaf6087d0a3957cfc824543949d25f556a97744d_arm64"
},
"product_reference": "container-native-virtualization/kubevirt-console-plugin-rhel9@sha256:ffb2acd9ae09c1ef9ca756f5eaf6087d0a3957cfc824543949d25f556a97744d_arm64",
"relates_to_product_reference": "9Base-CNV-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "container-native-virtualization/kubevirt-dpdk-checkup-rhel9@sha256:525aceb9396010ebcdba14040f267889b807cd84db8e5b4030429b51f0fbf5fe_arm64 as a component of CNV 4.13 for RHEL 9",
"product_id": "9Base-CNV-4.13:container-native-virtualization/kubevirt-dpdk-checkup-rhel9@sha256:525aceb9396010ebcdba14040f267889b807cd84db8e5b4030429b51f0fbf5fe_arm64"
},
"product_reference": "container-native-virtualization/kubevirt-dpdk-checkup-rhel9@sha256:525aceb9396010ebcdba14040f267889b807cd84db8e5b4030429b51f0fbf5fe_arm64",
"relates_to_product_reference": "9Base-CNV-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "container-native-virtualization/kubevirt-dpdk-checkup-rhel9@sha256:553c4686f56c66cc1e3c5ad9d4051f139d43f821eac3abb98ca5cdb8b5dfe202_amd64 as a component of CNV 4.13 for RHEL 9",
"product_id": "9Base-CNV-4.13:container-native-virtualization/kubevirt-dpdk-checkup-rhel9@sha256:553c4686f56c66cc1e3c5ad9d4051f139d43f821eac3abb98ca5cdb8b5dfe202_amd64"
},
"product_reference": "container-native-virtualization/kubevirt-dpdk-checkup-rhel9@sha256:553c4686f56c66cc1e3c5ad9d4051f139d43f821eac3abb98ca5cdb8b5dfe202_amd64",
"relates_to_product_reference": "9Base-CNV-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "container-native-virtualization/kubevirt-ssp-operator-rhel9@sha256:901e6cad9534c7bd7c4018c60bccfe49d7280fba5a9901ab4c4d15e9345288c4_amd64 as a component of CNV 4.13 for RHEL 9",
"product_id": "9Base-CNV-4.13:container-native-virtualization/kubevirt-ssp-operator-rhel9@sha256:901e6cad9534c7bd7c4018c60bccfe49d7280fba5a9901ab4c4d15e9345288c4_amd64"
},
"product_reference": "container-native-virtualization/kubevirt-ssp-operator-rhel9@sha256:901e6cad9534c7bd7c4018c60bccfe49d7280fba5a9901ab4c4d15e9345288c4_amd64",
"relates_to_product_reference": "9Base-CNV-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "container-native-virtualization/kubevirt-ssp-operator-rhel9@sha256:badeb0f65f543b209f6af761729d9778b7b73b97d55044016dfba3f38a1f6f18_arm64 as a component of CNV 4.13 for RHEL 9",
"product_id": "9Base-CNV-4.13:container-native-virtualization/kubevirt-ssp-operator-rhel9@sha256:badeb0f65f543b209f6af761729d9778b7b73b97d55044016dfba3f38a1f6f18_arm64"
},
"product_reference": "container-native-virtualization/kubevirt-ssp-operator-rhel9@sha256:badeb0f65f543b209f6af761729d9778b7b73b97d55044016dfba3f38a1f6f18_arm64",
"relates_to_product_reference": "9Base-CNV-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "container-native-virtualization/kubevirt-tekton-tasks-cleanup-vm-rhel9@sha256:28e4975fa4dac22d9da32ed2a10aed039fd957b30140daa36bab2caa998be77a_amd64 as a component of CNV 4.13 for RHEL 9",
"product_id": "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-cleanup-vm-rhel9@sha256:28e4975fa4dac22d9da32ed2a10aed039fd957b30140daa36bab2caa998be77a_amd64"
},
"product_reference": "container-native-virtualization/kubevirt-tekton-tasks-cleanup-vm-rhel9@sha256:28e4975fa4dac22d9da32ed2a10aed039fd957b30140daa36bab2caa998be77a_amd64",
"relates_to_product_reference": "9Base-CNV-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "container-native-virtualization/kubevirt-tekton-tasks-cleanup-vm-rhel9@sha256:b0ff7e812a576ea848590655fc13a85832d5a39f68e7769ceab9da6949da88c7_arm64 as a component of CNV 4.13 for RHEL 9",
"product_id": "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-cleanup-vm-rhel9@sha256:b0ff7e812a576ea848590655fc13a85832d5a39f68e7769ceab9da6949da88c7_arm64"
},
"product_reference": "container-native-virtualization/kubevirt-tekton-tasks-cleanup-vm-rhel9@sha256:b0ff7e812a576ea848590655fc13a85832d5a39f68e7769ceab9da6949da88c7_arm64",
"relates_to_product_reference": "9Base-CNV-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "container-native-virtualization/kubevirt-tekton-tasks-copy-template-rhel9@sha256:4916a6c6b1f9b529187d3b4d5fc99b90157993767b3fe2ad36a9ec77fbb46b10_arm64 as a component of CNV 4.13 for RHEL 9",
"product_id": "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-copy-template-rhel9@sha256:4916a6c6b1f9b529187d3b4d5fc99b90157993767b3fe2ad36a9ec77fbb46b10_arm64"
},
"product_reference": "container-native-virtualization/kubevirt-tekton-tasks-copy-template-rhel9@sha256:4916a6c6b1f9b529187d3b4d5fc99b90157993767b3fe2ad36a9ec77fbb46b10_arm64",
"relates_to_product_reference": "9Base-CNV-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "container-native-virtualization/kubevirt-tekton-tasks-copy-template-rhel9@sha256:f71c36442f1b61cdde7ec58d2c3c78d2039f6d6108e6c35388ef7c1650971fa1_amd64 as a component of CNV 4.13 for RHEL 9",
"product_id": "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-copy-template-rhel9@sha256:f71c36442f1b61cdde7ec58d2c3c78d2039f6d6108e6c35388ef7c1650971fa1_amd64"
},
"product_reference": "container-native-virtualization/kubevirt-tekton-tasks-copy-template-rhel9@sha256:f71c36442f1b61cdde7ec58d2c3c78d2039f6d6108e6c35388ef7c1650971fa1_amd64",
"relates_to_product_reference": "9Base-CNV-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "container-native-virtualization/kubevirt-tekton-tasks-create-datavolume-rhel9@sha256:2ad49cf6e2242a9e5861929d9bcab1305a7fc4e34e708f99cff1d7253aa46167_amd64 as a component of CNV 4.13 for RHEL 9",
"product_id": "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-create-datavolume-rhel9@sha256:2ad49cf6e2242a9e5861929d9bcab1305a7fc4e34e708f99cff1d7253aa46167_amd64"
},
"product_reference": "container-native-virtualization/kubevirt-tekton-tasks-create-datavolume-rhel9@sha256:2ad49cf6e2242a9e5861929d9bcab1305a7fc4e34e708f99cff1d7253aa46167_amd64",
"relates_to_product_reference": "9Base-CNV-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "container-native-virtualization/kubevirt-tekton-tasks-create-datavolume-rhel9@sha256:7112400a4ecb23ee2110bf96372fcf9f96ad648a51aa944627b40eb59539a660_arm64 as a component of CNV 4.13 for RHEL 9",
"product_id": "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-create-datavolume-rhel9@sha256:7112400a4ecb23ee2110bf96372fcf9f96ad648a51aa944627b40eb59539a660_arm64"
},
"product_reference": "container-native-virtualization/kubevirt-tekton-tasks-create-datavolume-rhel9@sha256:7112400a4ecb23ee2110bf96372fcf9f96ad648a51aa944627b40eb59539a660_arm64",
"relates_to_product_reference": "9Base-CNV-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "container-native-virtualization/kubevirt-tekton-tasks-create-vm-from-template-rhel9@sha256:1411c65bbad7302710788327f6964a4bf5bc20ef70d5e46f4a5c6e7a0e7a0161_amd64 as a component of CNV 4.13 for RHEL 9",
"product_id": "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-create-vm-from-template-rhel9@sha256:1411c65bbad7302710788327f6964a4bf5bc20ef70d5e46f4a5c6e7a0e7a0161_amd64"
},
"product_reference": "container-native-virtualization/kubevirt-tekton-tasks-create-vm-from-template-rhel9@sha256:1411c65bbad7302710788327f6964a4bf5bc20ef70d5e46f4a5c6e7a0e7a0161_amd64",
"relates_to_product_reference": "9Base-CNV-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "container-native-virtualization/kubevirt-tekton-tasks-create-vm-from-template-rhel9@sha256:4d962618aa95600c60c9fc8b890186e510de91177d51949e12797a3558e31328_arm64 as a component of CNV 4.13 for RHEL 9",
"product_id": "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-create-vm-from-template-rhel9@sha256:4d962618aa95600c60c9fc8b890186e510de91177d51949e12797a3558e31328_arm64"
},
"product_reference": "container-native-virtualization/kubevirt-tekton-tasks-create-vm-from-template-rhel9@sha256:4d962618aa95600c60c9fc8b890186e510de91177d51949e12797a3558e31328_arm64",
"relates_to_product_reference": "9Base-CNV-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "container-native-virtualization/kubevirt-tekton-tasks-disk-virt-customize-rhel9@sha256:5c23d3f20ea9dcbe7109284d73078ecd516a070e964b844f8d80b1d92ebd55ee_amd64 as a component of CNV 4.13 for RHEL 9",
"product_id": "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-customize-rhel9@sha256:5c23d3f20ea9dcbe7109284d73078ecd516a070e964b844f8d80b1d92ebd55ee_amd64"
},
"product_reference": "container-native-virtualization/kubevirt-tekton-tasks-disk-virt-customize-rhel9@sha256:5c23d3f20ea9dcbe7109284d73078ecd516a070e964b844f8d80b1d92ebd55ee_amd64",
"relates_to_product_reference": "9Base-CNV-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "container-native-virtualization/kubevirt-tekton-tasks-disk-virt-customize-rhel9@sha256:a780244e48c6d4f87446d3754c3eb9ab79c0d54675c189da4a659f7a4d5668ea_arm64 as a component of CNV 4.13 for RHEL 9",
"product_id": "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-customize-rhel9@sha256:a780244e48c6d4f87446d3754c3eb9ab79c0d54675c189da4a659f7a4d5668ea_arm64"
},
"product_reference": "container-native-virtualization/kubevirt-tekton-tasks-disk-virt-customize-rhel9@sha256:a780244e48c6d4f87446d3754c3eb9ab79c0d54675c189da4a659f7a4d5668ea_arm64",
"relates_to_product_reference": "9Base-CNV-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "container-native-virtualization/kubevirt-tekton-tasks-disk-virt-sysprep-rhel9@sha256:84577d949a1bbcaa291c70729127bca4a8994df03068666baa23840877ea8392_arm64 as a component of CNV 4.13 for RHEL 9",
"product_id": "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-sysprep-rhel9@sha256:84577d949a1bbcaa291c70729127bca4a8994df03068666baa23840877ea8392_arm64"
},
"product_reference": "container-native-virtualization/kubevirt-tekton-tasks-disk-virt-sysprep-rhel9@sha256:84577d949a1bbcaa291c70729127bca4a8994df03068666baa23840877ea8392_arm64",
"relates_to_product_reference": "9Base-CNV-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "container-native-virtualization/kubevirt-tekton-tasks-disk-virt-sysprep-rhel9@sha256:aed630a597a090179e1b0e0c117e536df06b67d0f793f91936aa7388c0c5d7eb_amd64 as a component of CNV 4.13 for RHEL 9",
"product_id": "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-sysprep-rhel9@sha256:aed630a597a090179e1b0e0c117e536df06b67d0f793f91936aa7388c0c5d7eb_amd64"
},
"product_reference": "container-native-virtualization/kubevirt-tekton-tasks-disk-virt-sysprep-rhel9@sha256:aed630a597a090179e1b0e0c117e536df06b67d0f793f91936aa7388c0c5d7eb_amd64",
"relates_to_product_reference": "9Base-CNV-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "container-native-virtualization/kubevirt-tekton-tasks-modify-vm-template-rhel9@sha256:31d959b80cf57462e1705684bb7e1b78af26bd2c62f1c9e4e51e1d02199b05a8_arm64 as a component of CNV 4.13 for RHEL 9",
"product_id": "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-modify-vm-template-rhel9@sha256:31d959b80cf57462e1705684bb7e1b78af26bd2c62f1c9e4e51e1d02199b05a8_arm64"
},
"product_reference": "container-native-virtualization/kubevirt-tekton-tasks-modify-vm-template-rhel9@sha256:31d959b80cf57462e1705684bb7e1b78af26bd2c62f1c9e4e51e1d02199b05a8_arm64",
"relates_to_product_reference": "9Base-CNV-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "container-native-virtualization/kubevirt-tekton-tasks-modify-vm-template-rhel9@sha256:66aea526bc10e4c0136ba86e394bbdfe4fbd7f757d6f391a561b51d2ba2f4d46_amd64 as a component of CNV 4.13 for RHEL 9",
"product_id": "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-modify-vm-template-rhel9@sha256:66aea526bc10e4c0136ba86e394bbdfe4fbd7f757d6f391a561b51d2ba2f4d46_amd64"
},
"product_reference": "container-native-virtualization/kubevirt-tekton-tasks-modify-vm-template-rhel9@sha256:66aea526bc10e4c0136ba86e394bbdfe4fbd7f757d6f391a561b51d2ba2f4d46_amd64",
"relates_to_product_reference": "9Base-CNV-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "container-native-virtualization/kubevirt-tekton-tasks-operator-rhel9@sha256:d0cf0e81589f0938de45961eaddfc5ec4782738fd11082de0439b200534259eb_arm64 as a component of CNV 4.13 for RHEL 9",
"product_id": "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-operator-rhel9@sha256:d0cf0e81589f0938de45961eaddfc5ec4782738fd11082de0439b200534259eb_arm64"
},
"product_reference": "container-native-virtualization/kubevirt-tekton-tasks-operator-rhel9@sha256:d0cf0e81589f0938de45961eaddfc5ec4782738fd11082de0439b200534259eb_arm64",
"relates_to_product_reference": "9Base-CNV-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "container-native-virtualization/kubevirt-tekton-tasks-operator-rhel9@sha256:f1b1f5044db6bb945584f9d4f31d020597725a286ef368ed0aca2116abb31beb_amd64 as a component of CNV 4.13 for RHEL 9",
"product_id": "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-operator-rhel9@sha256:f1b1f5044db6bb945584f9d4f31d020597725a286ef368ed0aca2116abb31beb_amd64"
},
"product_reference": "container-native-virtualization/kubevirt-tekton-tasks-operator-rhel9@sha256:f1b1f5044db6bb945584f9d4f31d020597725a286ef368ed0aca2116abb31beb_amd64",
"relates_to_product_reference": "9Base-CNV-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "container-native-virtualization/kubevirt-tekton-tasks-wait-for-vmi-status-rhel9@sha256:39a15d03f113735df03b1a7408227eb9604d942c1f3c1992bcdc7eaf07662711_amd64 as a component of CNV 4.13 for RHEL 9",
"product_id": "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-wait-for-vmi-status-rhel9@sha256:39a15d03f113735df03b1a7408227eb9604d942c1f3c1992bcdc7eaf07662711_amd64"
},
"product_reference": "container-native-virtualization/kubevirt-tekton-tasks-wait-for-vmi-status-rhel9@sha256:39a15d03f113735df03b1a7408227eb9604d942c1f3c1992bcdc7eaf07662711_amd64",
"relates_to_product_reference": "9Base-CNV-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "container-native-virtualization/kubevirt-tekton-tasks-wait-for-vmi-status-rhel9@sha256:afb68af076954fcd18c7a4a1464ea0c2a766e8282eae980051906ed07eaa1707_arm64 as a component of CNV 4.13 for RHEL 9",
"product_id": "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-wait-for-vmi-status-rhel9@sha256:afb68af076954fcd18c7a4a1464ea0c2a766e8282eae980051906ed07eaa1707_arm64"
},
"product_reference": "container-native-virtualization/kubevirt-tekton-tasks-wait-for-vmi-status-rhel9@sha256:afb68af076954fcd18c7a4a1464ea0c2a766e8282eae980051906ed07eaa1707_arm64",
"relates_to_product_reference": "9Base-CNV-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "container-native-virtualization/kubevirt-template-validator-rhel9@sha256:02b22c7e7014b5e72d47fed8b6a268cf307638c5510adf3916c51f7f40a52a08_arm64 as a component of CNV 4.13 for RHEL 9",
"product_id": "9Base-CNV-4.13:container-native-virtualization/kubevirt-template-validator-rhel9@sha256:02b22c7e7014b5e72d47fed8b6a268cf307638c5510adf3916c51f7f40a52a08_arm64"
},
"product_reference": "container-native-virtualization/kubevirt-template-validator-rhel9@sha256:02b22c7e7014b5e72d47fed8b6a268cf307638c5510adf3916c51f7f40a52a08_arm64",
"relates_to_product_reference": "9Base-CNV-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "container-native-virtualization/kubevirt-template-validator-rhel9@sha256:c0264b9271e602f85b2040ef7f207cdfa46038dc4fa6e4738bf196ef88a71cf8_amd64 as a component of CNV 4.13 for RHEL 9",
"product_id": "9Base-CNV-4.13:container-native-virtualization/kubevirt-template-validator-rhel9@sha256:c0264b9271e602f85b2040ef7f207cdfa46038dc4fa6e4738bf196ef88a71cf8_amd64"
},
"product_reference": "container-native-virtualization/kubevirt-template-validator-rhel9@sha256:c0264b9271e602f85b2040ef7f207cdfa46038dc4fa6e4738bf196ef88a71cf8_amd64",
"relates_to_product_reference": "9Base-CNV-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "container-native-virtualization/libguestfs-tools-rhel9@sha256:29ae84575bbca24553cf649256759fd96ff286971d80bc2db129154a7df9b283_amd64 as a component of CNV 4.13 for RHEL 9",
"product_id": "9Base-CNV-4.13:container-native-virtualization/libguestfs-tools-rhel9@sha256:29ae84575bbca24553cf649256759fd96ff286971d80bc2db129154a7df9b283_amd64"
},
"product_reference": "container-native-virtualization/libguestfs-tools-rhel9@sha256:29ae84575bbca24553cf649256759fd96ff286971d80bc2db129154a7df9b283_amd64",
"relates_to_product_reference": "9Base-CNV-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "container-native-virtualization/libguestfs-tools-rhel9@sha256:6558f60343e068b032167e2340b2c549c5f0258acc5d2614b60966ce79408b01_arm64 as a component of CNV 4.13 for RHEL 9",
"product_id": "9Base-CNV-4.13:container-native-virtualization/libguestfs-tools-rhel9@sha256:6558f60343e068b032167e2340b2c549c5f0258acc5d2614b60966ce79408b01_arm64"
},
"product_reference": "container-native-virtualization/libguestfs-tools-rhel9@sha256:6558f60343e068b032167e2340b2c549c5f0258acc5d2614b60966ce79408b01_arm64",
"relates_to_product_reference": "9Base-CNV-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "container-native-virtualization/multus-dynamic-networks-rhel9@sha256:3ecb0162a4b01d1590bf209d717b32a4f0835910d9979823f18c24acba41b503_arm64 as a component of CNV 4.13 for RHEL 9",
"product_id": "9Base-CNV-4.13:container-native-virtualization/multus-dynamic-networks-rhel9@sha256:3ecb0162a4b01d1590bf209d717b32a4f0835910d9979823f18c24acba41b503_arm64"
},
"product_reference": "container-native-virtualization/multus-dynamic-networks-rhel9@sha256:3ecb0162a4b01d1590bf209d717b32a4f0835910d9979823f18c24acba41b503_arm64",
"relates_to_product_reference": "9Base-CNV-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "container-native-virtualization/multus-dynamic-networks-rhel9@sha256:b7f68b6420009e21380d32d6459193aae45e93be9533debe17cb3108571b36b8_amd64 as a component of CNV 4.13 for RHEL 9",
"product_id": "9Base-CNV-4.13:container-native-virtualization/multus-dynamic-networks-rhel9@sha256:b7f68b6420009e21380d32d6459193aae45e93be9533debe17cb3108571b36b8_amd64"
},
"product_reference": "container-native-virtualization/multus-dynamic-networks-rhel9@sha256:b7f68b6420009e21380d32d6459193aae45e93be9533debe17cb3108571b36b8_amd64",
"relates_to_product_reference": "9Base-CNV-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "container-native-virtualization/ovs-cni-plugin-rhel9@sha256:0f1d372f418744e0aff59ecb0a38f53178aac9c2e9eecfd38aa25ed83e0d1360_arm64 as a component of CNV 4.13 for RHEL 9",
"product_id": "9Base-CNV-4.13:container-native-virtualization/ovs-cni-plugin-rhel9@sha256:0f1d372f418744e0aff59ecb0a38f53178aac9c2e9eecfd38aa25ed83e0d1360_arm64"
},
"product_reference": "container-native-virtualization/ovs-cni-plugin-rhel9@sha256:0f1d372f418744e0aff59ecb0a38f53178aac9c2e9eecfd38aa25ed83e0d1360_arm64",
"relates_to_product_reference": "9Base-CNV-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "container-native-virtualization/ovs-cni-plugin-rhel9@sha256:e8e7a44edbf1713fe74de5c4b8f691cce78f4440c4a32a16ba9ad16694a55396_amd64 as a component of CNV 4.13 for RHEL 9",
"product_id": "9Base-CNV-4.13:container-native-virtualization/ovs-cni-plugin-rhel9@sha256:e8e7a44edbf1713fe74de5c4b8f691cce78f4440c4a32a16ba9ad16694a55396_amd64"
},
"product_reference": "container-native-virtualization/ovs-cni-plugin-rhel9@sha256:e8e7a44edbf1713fe74de5c4b8f691cce78f4440c4a32a16ba9ad16694a55396_amd64",
"relates_to_product_reference": "9Base-CNV-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "container-native-virtualization/virt-api-rhel9@sha256:e68416321ca8c74a547b3d35897f54813c03481143e402e9bdc4daf315e35b5d_arm64 as a component of CNV 4.13 for RHEL 9",
"product_id": "9Base-CNV-4.13:container-native-virtualization/virt-api-rhel9@sha256:e68416321ca8c74a547b3d35897f54813c03481143e402e9bdc4daf315e35b5d_arm64"
},
"product_reference": "container-native-virtualization/virt-api-rhel9@sha256:e68416321ca8c74a547b3d35897f54813c03481143e402e9bdc4daf315e35b5d_arm64",
"relates_to_product_reference": "9Base-CNV-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "container-native-virtualization/virt-api-rhel9@sha256:fdb4ca1bb8b310d713d9c7e88f7d091f4460aa942dbeca5ebcf17281a06daffe_amd64 as a component of CNV 4.13 for RHEL 9",
"product_id": "9Base-CNV-4.13:container-native-virtualization/virt-api-rhel9@sha256:fdb4ca1bb8b310d713d9c7e88f7d091f4460aa942dbeca5ebcf17281a06daffe_amd64"
},
"product_reference": "container-native-virtualization/virt-api-rhel9@sha256:fdb4ca1bb8b310d713d9c7e88f7d091f4460aa942dbeca5ebcf17281a06daffe_amd64",
"relates_to_product_reference": "9Base-CNV-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "container-native-virtualization/virt-artifacts-server-rhel9@sha256:33d11c1832b49df39c1fca62bad40dbc5c30a452248339aaef449ac99509accb_arm64 as a component of CNV 4.13 for RHEL 9",
"product_id": "9Base-CNV-4.13:container-native-virtualization/virt-artifacts-server-rhel9@sha256:33d11c1832b49df39c1fca62bad40dbc5c30a452248339aaef449ac99509accb_arm64"
},
"product_reference": "container-native-virtualization/virt-artifacts-server-rhel9@sha256:33d11c1832b49df39c1fca62bad40dbc5c30a452248339aaef449ac99509accb_arm64",
"relates_to_product_reference": "9Base-CNV-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "container-native-virtualization/virt-artifacts-server-rhel9@sha256:81fc61b714baecb5a89fa6c0749c14566e0661b8e184ca602fc2e03b9cf431ee_amd64 as a component of CNV 4.13 for RHEL 9",
"product_id": "9Base-CNV-4.13:container-native-virtualization/virt-artifacts-server-rhel9@sha256:81fc61b714baecb5a89fa6c0749c14566e0661b8e184ca602fc2e03b9cf431ee_amd64"
},
"product_reference": "container-native-virtualization/virt-artifacts-server-rhel9@sha256:81fc61b714baecb5a89fa6c0749c14566e0661b8e184ca602fc2e03b9cf431ee_amd64",
"relates_to_product_reference": "9Base-CNV-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "container-native-virtualization/virt-cdi-apiserver-rhel9@sha256:f6128a63344ed2129f5bce648ddcfaa2869d31cde4b93328d3c22534b97ade10_arm64 as a component of CNV 4.13 for RHEL 9",
"product_id": "9Base-CNV-4.13:container-native-virtualization/virt-cdi-apiserver-rhel9@sha256:f6128a63344ed2129f5bce648ddcfaa2869d31cde4b93328d3c22534b97ade10_arm64"
},
"product_reference": "container-native-virtualization/virt-cdi-apiserver-rhel9@sha256:f6128a63344ed2129f5bce648ddcfaa2869d31cde4b93328d3c22534b97ade10_arm64",
"relates_to_product_reference": "9Base-CNV-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "container-native-virtualization/virt-cdi-apiserver-rhel9@sha256:feca273a691d09445c6cff6d36b5d590735e867656a9898ce0d89744d98e8006_amd64 as a component of CNV 4.13 for RHEL 9",
"product_id": "9Base-CNV-4.13:container-native-virtualization/virt-cdi-apiserver-rhel9@sha256:feca273a691d09445c6cff6d36b5d590735e867656a9898ce0d89744d98e8006_amd64"
},
"product_reference": "container-native-virtualization/virt-cdi-apiserver-rhel9@sha256:feca273a691d09445c6cff6d36b5d590735e867656a9898ce0d89744d98e8006_amd64",
"relates_to_product_reference": "9Base-CNV-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "container-native-virtualization/virt-cdi-cloner-rhel9@sha256:68e3b9b0291b4fb277ac430269ffce11d13b0a7688cf2ffcdb7f98759c36b4db_amd64 as a component of CNV 4.13 for RHEL 9",
"product_id": "9Base-CNV-4.13:container-native-virtualization/virt-cdi-cloner-rhel9@sha256:68e3b9b0291b4fb277ac430269ffce11d13b0a7688cf2ffcdb7f98759c36b4db_amd64"
},
"product_reference": "container-native-virtualization/virt-cdi-cloner-rhel9@sha256:68e3b9b0291b4fb277ac430269ffce11d13b0a7688cf2ffcdb7f98759c36b4db_amd64",
"relates_to_product_reference": "9Base-CNV-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "container-native-virtualization/virt-cdi-cloner-rhel9@sha256:6ac212767481bef64d8a7d0252bb8089c0f9751fad4a355aef71bd49dad2ad07_arm64 as a component of CNV 4.13 for RHEL 9",
"product_id": "9Base-CNV-4.13:container-native-virtualization/virt-cdi-cloner-rhel9@sha256:6ac212767481bef64d8a7d0252bb8089c0f9751fad4a355aef71bd49dad2ad07_arm64"
},
"product_reference": "container-native-virtualization/virt-cdi-cloner-rhel9@sha256:6ac212767481bef64d8a7d0252bb8089c0f9751fad4a355aef71bd49dad2ad07_arm64",
"relates_to_product_reference": "9Base-CNV-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "container-native-virtualization/virt-cdi-controller-rhel9@sha256:65f5263275d9f0a12b8fb057d82adf678778039ec873ca9bde182dea3413c9f1_arm64 as a component of CNV 4.13 for RHEL 9",
"product_id": "9Base-CNV-4.13:container-native-virtualization/virt-cdi-controller-rhel9@sha256:65f5263275d9f0a12b8fb057d82adf678778039ec873ca9bde182dea3413c9f1_arm64"
},
"product_reference": "container-native-virtualization/virt-cdi-controller-rhel9@sha256:65f5263275d9f0a12b8fb057d82adf678778039ec873ca9bde182dea3413c9f1_arm64",
"relates_to_product_reference": "9Base-CNV-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "container-native-virtualization/virt-cdi-controller-rhel9@sha256:d9e62b2019328be258489ac852eef25f8b1233f29abac6bcea5b406329f97fed_amd64 as a component of CNV 4.13 for RHEL 9",
"product_id": "9Base-CNV-4.13:container-native-virtualization/virt-cdi-controller-rhel9@sha256:d9e62b2019328be258489ac852eef25f8b1233f29abac6bcea5b406329f97fed_amd64"
},
"product_reference": "container-native-virtualization/virt-cdi-controller-rhel9@sha256:d9e62b2019328be258489ac852eef25f8b1233f29abac6bcea5b406329f97fed_amd64",
"relates_to_product_reference": "9Base-CNV-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "container-native-virtualization/virt-cdi-importer-rhel9@sha256:00a6d9d24ca1466d450b02269ec3144fc7550f0e5c696e869fbf7ce10cae6093_arm64 as a component of CNV 4.13 for RHEL 9",
"product_id": "9Base-CNV-4.13:container-native-virtualization/virt-cdi-importer-rhel9@sha256:00a6d9d24ca1466d450b02269ec3144fc7550f0e5c696e869fbf7ce10cae6093_arm64"
},
"product_reference": "container-native-virtualization/virt-cdi-importer-rhel9@sha256:00a6d9d24ca1466d450b02269ec3144fc7550f0e5c696e869fbf7ce10cae6093_arm64",
"relates_to_product_reference": "9Base-CNV-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "container-native-virtualization/virt-cdi-importer-rhel9@sha256:2df07fb21a3575e74aa16ded20129828f2300cd33e8ab369b0362062d49e62d0_amd64 as a component of CNV 4.13 for RHEL 9",
"product_id": "9Base-CNV-4.13:container-native-virtualization/virt-cdi-importer-rhel9@sha256:2df07fb21a3575e74aa16ded20129828f2300cd33e8ab369b0362062d49e62d0_amd64"
},
"product_reference": "container-native-virtualization/virt-cdi-importer-rhel9@sha256:2df07fb21a3575e74aa16ded20129828f2300cd33e8ab369b0362062d49e62d0_amd64",
"relates_to_product_reference": "9Base-CNV-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "container-native-virtualization/virt-cdi-operator-rhel9@sha256:20ec064750faedd97d11b797c8c1d9a1db5d60d7d76e82e65cfd05eb79d65e29_arm64 as a component of CNV 4.13 for RHEL 9",
"product_id": "9Base-CNV-4.13:container-native-virtualization/virt-cdi-operator-rhel9@sha256:20ec064750faedd97d11b797c8c1d9a1db5d60d7d76e82e65cfd05eb79d65e29_arm64"
},
"product_reference": "container-native-virtualization/virt-cdi-operator-rhel9@sha256:20ec064750faedd97d11b797c8c1d9a1db5d60d7d76e82e65cfd05eb79d65e29_arm64",
"relates_to_product_reference": "9Base-CNV-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "container-native-virtualization/virt-cdi-operator-rhel9@sha256:802ee8923d9d8e406b23911406f9748756c0ef4d6954e9e2fd5fb4bdf91dde9a_amd64 as a component of CNV 4.13 for RHEL 9",
"product_id": "9Base-CNV-4.13:container-native-virtualization/virt-cdi-operator-rhel9@sha256:802ee8923d9d8e406b23911406f9748756c0ef4d6954e9e2fd5fb4bdf91dde9a_amd64"
},
"product_reference": "container-native-virtualization/virt-cdi-operator-rhel9@sha256:802ee8923d9d8e406b23911406f9748756c0ef4d6954e9e2fd5fb4bdf91dde9a_amd64",
"relates_to_product_reference": "9Base-CNV-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "container-native-virtualization/virt-cdi-uploadproxy-rhel9@sha256:392d0f61f462c707adfdc21e4239c5c09d8520a80486b41d9d9ae479267d6124_arm64 as a component of CNV 4.13 for RHEL 9",
"product_id": "9Base-CNV-4.13:container-native-virtualization/virt-cdi-uploadproxy-rhel9@sha256:392d0f61f462c707adfdc21e4239c5c09d8520a80486b41d9d9ae479267d6124_arm64"
},
"product_reference": "container-native-virtualization/virt-cdi-uploadproxy-rhel9@sha256:392d0f61f462c707adfdc21e4239c5c09d8520a80486b41d9d9ae479267d6124_arm64",
"relates_to_product_reference": "9Base-CNV-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "container-native-virtualization/virt-cdi-uploadproxy-rhel9@sha256:6775f34353eec8f35bead9411dde155530d079bb8d51582fb1f2aacc27dbde1d_amd64 as a component of CNV 4.13 for RHEL 9",
"product_id": "9Base-CNV-4.13:container-native-virtualization/virt-cdi-uploadproxy-rhel9@sha256:6775f34353eec8f35bead9411dde155530d079bb8d51582fb1f2aacc27dbde1d_amd64"
},
"product_reference": "container-native-virtualization/virt-cdi-uploadproxy-rhel9@sha256:6775f34353eec8f35bead9411dde155530d079bb8d51582fb1f2aacc27dbde1d_amd64",
"relates_to_product_reference": "9Base-CNV-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "container-native-virtualization/virt-cdi-uploadserver-rhel9@sha256:4528c24672689cfb6505761b6b108fbcc04488192733f23d2bfe39cd42a1d743_arm64 as a component of CNV 4.13 for RHEL 9",
"product_id": "9Base-CNV-4.13:container-native-virtualization/virt-cdi-uploadserver-rhel9@sha256:4528c24672689cfb6505761b6b108fbcc04488192733f23d2bfe39cd42a1d743_arm64"
},
"product_reference": "container-native-virtualization/virt-cdi-uploadserver-rhel9@sha256:4528c24672689cfb6505761b6b108fbcc04488192733f23d2bfe39cd42a1d743_arm64",
"relates_to_product_reference": "9Base-CNV-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "container-native-virtualization/virt-cdi-uploadserver-rhel9@sha256:b22048390387380af94e267c8a9a66813c515997456d59d8ebac1486916b6585_amd64 as a component of CNV 4.13 for RHEL 9",
"product_id": "9Base-CNV-4.13:container-native-virtualization/virt-cdi-uploadserver-rhel9@sha256:b22048390387380af94e267c8a9a66813c515997456d59d8ebac1486916b6585_amd64"
},
"product_reference": "container-native-virtualization/virt-cdi-uploadserver-rhel9@sha256:b22048390387380af94e267c8a9a66813c515997456d59d8ebac1486916b6585_amd64",
"relates_to_product_reference": "9Base-CNV-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "container-native-virtualization/virt-controller-rhel9@sha256:3e7880149ee9a68286e390beb3d9779f7403c30fc5136e5370e0e4690a3fd243_amd64 as a component of CNV 4.13 for RHEL 9",
"product_id": "9Base-CNV-4.13:container-native-virtualization/virt-controller-rhel9@sha256:3e7880149ee9a68286e390beb3d9779f7403c30fc5136e5370e0e4690a3fd243_amd64"
},
"product_reference": "container-native-virtualization/virt-controller-rhel9@sha256:3e7880149ee9a68286e390beb3d9779f7403c30fc5136e5370e0e4690a3fd243_amd64",
"relates_to_product_reference": "9Base-CNV-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "container-native-virtualization/virt-controller-rhel9@sha256:970edc281d7a731e9f7e8c2d4440fe48a221e5e355d5235c5413b4c3adb28503_arm64 as a component of CNV 4.13 for RHEL 9",
"product_id": "9Base-CNV-4.13:container-native-virtualization/virt-controller-rhel9@sha256:970edc281d7a731e9f7e8c2d4440fe48a221e5e355d5235c5413b4c3adb28503_arm64"
},
"product_reference": "container-native-virtualization/virt-controller-rhel9@sha256:970edc281d7a731e9f7e8c2d4440fe48a221e5e355d5235c5413b4c3adb28503_arm64",
"relates_to_product_reference": "9Base-CNV-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "container-native-virtualization/virt-exportproxy-rhel9@sha256:1bda34d5bff734ad997202f29a5ff6f7362fd79fa90511a422442ef2e3681198_amd64 as a component of CNV 4.13 for RHEL 9",
"product_id": "9Base-CNV-4.13:container-native-virtualization/virt-exportproxy-rhel9@sha256:1bda34d5bff734ad997202f29a5ff6f7362fd79fa90511a422442ef2e3681198_amd64"
},
"product_reference": "container-native-virtualization/virt-exportproxy-rhel9@sha256:1bda34d5bff734ad997202f29a5ff6f7362fd79fa90511a422442ef2e3681198_amd64",
"relates_to_product_reference": "9Base-CNV-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "container-native-virtualization/virt-exportproxy-rhel9@sha256:de3c4afbf7669b98517cbef2490ec186f0553dd97b05bed80ec36dd883fe507b_arm64 as a component of CNV 4.13 for RHEL 9",
"product_id": "9Base-CNV-4.13:container-native-virtualization/virt-exportproxy-rhel9@sha256:de3c4afbf7669b98517cbef2490ec186f0553dd97b05bed80ec36dd883fe507b_arm64"
},
"product_reference": "container-native-virtualization/virt-exportproxy-rhel9@sha256:de3c4afbf7669b98517cbef2490ec186f0553dd97b05bed80ec36dd883fe507b_arm64",
"relates_to_product_reference": "9Base-CNV-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "container-native-virtualization/virt-exportserver-rhel9@sha256:3f7f98645176d42c63cca5c0fc3182a03121af87446ca421b6c72baf07dfca0d_arm64 as a component of CNV 4.13 for RHEL 9",
"product_id": "9Base-CNV-4.13:container-native-virtualization/virt-exportserver-rhel9@sha256:3f7f98645176d42c63cca5c0fc3182a03121af87446ca421b6c72baf07dfca0d_arm64"
},
"product_reference": "container-native-virtualization/virt-exportserver-rhel9@sha256:3f7f98645176d42c63cca5c0fc3182a03121af87446ca421b6c72baf07dfca0d_arm64",
"relates_to_product_reference": "9Base-CNV-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "container-native-virtualization/virt-exportserver-rhel9@sha256:8f12955cd777eb2409037a6968aa92f50c99d6e07e722951dbcfd0c8c9829b5e_amd64 as a component of CNV 4.13 for RHEL 9",
"product_id": "9Base-CNV-4.13:container-native-virtualization/virt-exportserver-rhel9@sha256:8f12955cd777eb2409037a6968aa92f50c99d6e07e722951dbcfd0c8c9829b5e_amd64"
},
"product_reference": "container-native-virtualization/virt-exportserver-rhel9@sha256:8f12955cd777eb2409037a6968aa92f50c99d6e07e722951dbcfd0c8c9829b5e_amd64",
"relates_to_product_reference": "9Base-CNV-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "container-native-virtualization/virt-handler-rhel9@sha256:5fc47110d866d8048aec50689090ce10705d19d3bb48d2b06727d6d569003af7_arm64 as a component of CNV 4.13 for RHEL 9",
"product_id": "9Base-CNV-4.13:container-native-virtualization/virt-handler-rhel9@sha256:5fc47110d866d8048aec50689090ce10705d19d3bb48d2b06727d6d569003af7_arm64"
},
"product_reference": "container-native-virtualization/virt-handler-rhel9@sha256:5fc47110d866d8048aec50689090ce10705d19d3bb48d2b06727d6d569003af7_arm64",
"relates_to_product_reference": "9Base-CNV-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "container-native-virtualization/virt-handler-rhel9@sha256:84ba79ae9658699147d2493df2582ab6df10adbff4d44a533c3fe6a9f45f9691_amd64 as a component of CNV 4.13 for RHEL 9",
"product_id": "9Base-CNV-4.13:container-native-virtualization/virt-handler-rhel9@sha256:84ba79ae9658699147d2493df2582ab6df10adbff4d44a533c3fe6a9f45f9691_amd64"
},
"product_reference": "container-native-virtualization/virt-handler-rhel9@sha256:84ba79ae9658699147d2493df2582ab6df10adbff4d44a533c3fe6a9f45f9691_amd64",
"relates_to_product_reference": "9Base-CNV-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "container-native-virtualization/virt-launcher-rhel9@sha256:4990d40d9987d5126d105dd45be2501eaded248cb61bdde5ea8d359bc1e7ebef_amd64 as a component of CNV 4.13 for RHEL 9",
"product_id": "9Base-CNV-4.13:container-native-virtualization/virt-launcher-rhel9@sha256:4990d40d9987d5126d105dd45be2501eaded248cb61bdde5ea8d359bc1e7ebef_amd64"
},
"product_reference": "container-native-virtualization/virt-launcher-rhel9@sha256:4990d40d9987d5126d105dd45be2501eaded248cb61bdde5ea8d359bc1e7ebef_amd64",
"relates_to_product_reference": "9Base-CNV-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "container-native-virtualization/virt-launcher-rhel9@sha256:95aeacb98209e0baef27ce0e02fbac38d693cea74808fc77107efda0f344bcb5_arm64 as a component of CNV 4.13 for RHEL 9",
"product_id": "9Base-CNV-4.13:container-native-virtualization/virt-launcher-rhel9@sha256:95aeacb98209e0baef27ce0e02fbac38d693cea74808fc77107efda0f344bcb5_arm64"
},
"product_reference": "container-native-virtualization/virt-launcher-rhel9@sha256:95aeacb98209e0baef27ce0e02fbac38d693cea74808fc77107efda0f344bcb5_arm64",
"relates_to_product_reference": "9Base-CNV-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "container-native-virtualization/virt-operator-rhel9@sha256:5c1a7e4ed2061938987b900a2394f07121d4037350c9bb6485213a2adfea787d_amd64 as a component of CNV 4.13 for RHEL 9",
"product_id": "9Base-CNV-4.13:container-native-virtualization/virt-operator-rhel9@sha256:5c1a7e4ed2061938987b900a2394f07121d4037350c9bb6485213a2adfea787d_amd64"
},
"product_reference": "container-native-virtualization/virt-operator-rhel9@sha256:5c1a7e4ed2061938987b900a2394f07121d4037350c9bb6485213a2adfea787d_amd64",
"relates_to_product_reference": "9Base-CNV-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "container-native-virtualization/virt-operator-rhel9@sha256:66b1b3b379121d6411ba22283e7d991617177330c93746d37753ab7812b9a00b_arm64 as a component of CNV 4.13 for RHEL 9",
"product_id": "9Base-CNV-4.13:container-native-virtualization/virt-operator-rhel9@sha256:66b1b3b379121d6411ba22283e7d991617177330c93746d37753ab7812b9a00b_arm64"
},
"product_reference": "container-native-virtualization/virt-operator-rhel9@sha256:66b1b3b379121d6411ba22283e7d991617177330c93746d37753ab7812b9a00b_arm64",
"relates_to_product_reference": "9Base-CNV-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "container-native-virtualization/virtio-win-rhel9@sha256:8735f51da918408a8826601c082d1b29accf26d59b9978da89b980cb509c1102_arm64 as a component of CNV 4.13 for RHEL 9",
"product_id": "9Base-CNV-4.13:container-native-virtualization/virtio-win-rhel9@sha256:8735f51da918408a8826601c082d1b29accf26d59b9978da89b980cb509c1102_arm64"
},
"product_reference": "container-native-virtualization/virtio-win-rhel9@sha256:8735f51da918408a8826601c082d1b29accf26d59b9978da89b980cb509c1102_arm64",
"relates_to_product_reference": "9Base-CNV-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "container-native-virtualization/virtio-win-rhel9@sha256:d147d2a6eb6f907d1e88f61aaca83596853bc72164583d6dda2b1154b490de25_amd64 as a component of CNV 4.13 for RHEL 9",
"product_id": "9Base-CNV-4.13:container-native-virtualization/virtio-win-rhel9@sha256:d147d2a6eb6f907d1e88f61aaca83596853bc72164583d6dda2b1154b490de25_amd64"
},
"product_reference": "container-native-virtualization/virtio-win-rhel9@sha256:d147d2a6eb6f907d1e88f61aaca83596853bc72164583d6dda2b1154b490de25_amd64",
"relates_to_product_reference": "9Base-CNV-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "container-native-virtualization/vm-console-proxy-rhel9@sha256:70a8d0cd66182c25e02679540bae1368b2a9cf687532b58dba41ef30c5ca00c1_arm64 as a component of CNV 4.13 for RHEL 9",
"product_id": "9Base-CNV-4.13:container-native-virtualization/vm-console-proxy-rhel9@sha256:70a8d0cd66182c25e02679540bae1368b2a9cf687532b58dba41ef30c5ca00c1_arm64"
},
"product_reference": "container-native-virtualization/vm-console-proxy-rhel9@sha256:70a8d0cd66182c25e02679540bae1368b2a9cf687532b58dba41ef30c5ca00c1_arm64",
"relates_to_product_reference": "9Base-CNV-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "container-native-virtualization/vm-console-proxy-rhel9@sha256:7ca921f98f6d81a126907127a611146fb53397869a628678faa1e289c01d22b2_amd64 as a component of CNV 4.13 for RHEL 9",
"product_id": "9Base-CNV-4.13:container-native-virtualization/vm-console-proxy-rhel9@sha256:7ca921f98f6d81a126907127a611146fb53397869a628678faa1e289c01d22b2_amd64"
},
"product_reference": "container-native-virtualization/vm-console-proxy-rhel9@sha256:7ca921f98f6d81a126907127a611146fb53397869a628678faa1e289c01d22b2_amd64",
"relates_to_product_reference": "9Base-CNV-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "container-native-virtualization/vm-network-latency-checkup-rhel9@sha256:503ea7ac914a9b54e9d665a0227ee0b5d5200cdb5d692aa94c07dd1518d91b70_arm64 as a component of CNV 4.13 for RHEL 9",
"product_id": "9Base-CNV-4.13:container-native-virtualization/vm-network-latency-checkup-rhel9@sha256:503ea7ac914a9b54e9d665a0227ee0b5d5200cdb5d692aa94c07dd1518d91b70_arm64"
},
"product_reference": "container-native-virtualization/vm-network-latency-checkup-rhel9@sha256:503ea7ac914a9b54e9d665a0227ee0b5d5200cdb5d692aa94c07dd1518d91b70_arm64",
"relates_to_product_reference": "9Base-CNV-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "container-native-virtualization/vm-network-latency-checkup-rhel9@sha256:59fd965975bccf641a0fa7aa01374d45057bd03cda7528248a84b60b1205bf57_amd64 as a component of CNV 4.13 for RHEL 9",
"product_id": "9Base-CNV-4.13:container-native-virtualization/vm-network-latency-checkup-rhel9@sha256:59fd965975bccf641a0fa7aa01374d45057bd03cda7528248a84b60b1205bf57_amd64"
},
"product_reference": "container-native-virtualization/vm-network-latency-checkup-rhel9@sha256:59fd965975bccf641a0fa7aa01374d45057bd03cda7528248a84b60b1205bf57_amd64",
"relates_to_product_reference": "9Base-CNV-4.13"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Adam Korczynski"
],
"organization": "ADA Logics"
},
{
"names": [
"OSS-Fuzz"
]
}
],
"cve": "CVE-2022-2879",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"discovery_date": "2022-10-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2132867"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the golang package, where Reader.Read does not set a limit on the maximum size of file headers. After fixing, Reader.Read limits the maximum size of header blocks to 1 MiB. This flaw allows a maliciously crafted archive to cause Read to allocate unbounded amounts of memory, potentially causing resource exhaustion or panic.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: archive/tar: github.com/vbatts/tar-split: unbounded memory consumption when reading headers",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The opportunity for a Denial of Service is limited to the golang runtime. In the case of OpenShift Container Platform, this would be restricted within each individual container. There are multiple layers of guide rails (Golang\u2019s Garbage Collector; OpenShift\u2019s resource constraints imposed at the container and cluster levels) which would require a malicious user to continue submitting attacks for there to be any enduring impact. They would also need access to external server resources to be able to send a massive volume of requests to cause a significant impact on server operations.\n\n\nThis flaw additionally affects the github.com/vbatts/tar-split library and was fixed in v0.12.1.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"9Base-CNV-4.13:container-native-virtualization/bridge-marker-rhel9@sha256:8eac196b30a648989cdca5cb153a3bc3d34e47339acba0e4f760bd366496c99d_amd64",
"9Base-CNV-4.13:container-native-virtualization/bridge-marker-rhel9@sha256:e8a55aee3d75a316bb0d7a554c737198823df04b3c05e481c17e45eb2153bced_arm64",
"9Base-CNV-4.13:container-native-virtualization/cluster-network-addons-operator-rhel9@sha256:3bff33e3f40cd1e2b519c2db56734d4bb8df883e155c2f20b1cb9d3d184daec1_amd64",
"9Base-CNV-4.13:container-native-virtualization/cluster-network-addons-operator-rhel9@sha256:f439d2f420bb59eb1d5af14ce2002648d0cfc155d1a1466c8aac9b661fe902b8_arm64",
"9Base-CNV-4.13:container-native-virtualization/cnv-containernetworking-plugins-rhel9@sha256:89f22e541f61a660c9aa9f38ef58e80b84a0517f74e84292107fc252c25465c9_arm64",
"9Base-CNV-4.13:container-native-virtualization/cnv-containernetworking-plugins-rhel9@sha256:bf471997e54e4a75b0d71f492ab295787fdbb14d8c85c4ea8c03f0552dbc3755_amd64",
"9Base-CNV-4.13:container-native-virtualization/cnv-must-gather-rhel9@sha256:9e8efd76924958eb605401abdac08eba97fb83a1ada383bc87a7fb7c87b3a455_arm64",
"9Base-CNV-4.13:container-native-virtualization/cnv-must-gather-rhel9@sha256:b9fc32b5fabedd65a4c3a471879c808af2087277de4278adaa115a732f0468da_amd64",
"9Base-CNV-4.13:container-native-virtualization/hco-bundle-registry-rhel9@sha256:60e89d7a99ff9f20e974430b802dd724a3bb6fa1e01e5a62daad98ac487b3063_amd64",
"9Base-CNV-4.13:container-native-virtualization/hco-bundle-registry-rhel9@sha256:dd20b138045ef1424d83a47e7abcfcbb2ac54577dcec5ed3c186390aaa4c9d84_arm64",
"9Base-CNV-4.13:container-native-virtualization/hostpath-csi-driver-rhel9@sha256:61e2824853d51347593ad909a5e546cd92e4216d6a1df5dffb50dd9cba277cce_amd64",
"9Base-CNV-4.13:container-native-virtualization/hostpath-csi-driver-rhel9@sha256:676d4c23a5f60dd331728af056b0a6b2d3358ac88da23299b1a98dfaca8f288e_arm64",
"9Base-CNV-4.13:container-native-virtualization/hostpath-provisioner-operator-rhel9@sha256:515be94be496c67f5b8fd5f4832fe4385e56476e6589897d6b9fbb9bb2b00f32_amd64",
"9Base-CNV-4.13:container-native-virtualization/hostpath-provisioner-operator-rhel9@sha256:571ae805641dea11646028c946039983c7fd82f138b915dcb8b80c39b465e63c_arm64",
"9Base-CNV-4.13:container-native-virtualization/hostpath-provisioner-rhel9@sha256:ac3fe350bedd6bc43596444ba0f279ccf8a144ab14ac5a9b80ea71c46390b7b4_amd64",
"9Base-CNV-4.13:container-native-virtualization/hostpath-provisioner-rhel9@sha256:d4ed87745b7ee2acca2d83e2c91c2f6dced1903c81495b50f2559b3ba2dde287_arm64",
"9Base-CNV-4.13:container-native-virtualization/hyperconverged-cluster-operator-rhel9@sha256:e5ab9f3be59d3568e3d672ab374efb16990ccf92192eac4e1244b10fcd7423e2_amd64",
"9Base-CNV-4.13:container-native-virtualization/hyperconverged-cluster-operator-rhel9@sha256:e681560b184189df03fc84c8a712f32289f42573dd348cda394b19565eb6eca8_arm64",
"9Base-CNV-4.13:container-native-virtualization/hyperconverged-cluster-webhook-rhel9@sha256:06d036d320b3027bb8370bb8e0f6fe8c9f0ec9bca7aac3b5c53698ba4a170042_arm64",
"9Base-CNV-4.13:container-native-virtualization/hyperconverged-cluster-webhook-rhel9@sha256:b5a01336180aad017df62cf8e652f2491b8263ba7e4dd07f858db1ef1924cf2f_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubemacpool-rhel9@sha256:4d190d81eeb3fbe9ed56cf3548dc83a3f81641bfdafa7b42dcfb0d2512566644_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubemacpool-rhel9@sha256:59862a59854f0d5b83dc25ba119f9586a8aff42b6e60d1922f8ae7b4567309ff_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubesecondarydns-rhel9@sha256:121d30d78cc57731ea2242ef2c32430890ac66c2723e65608d5e2f26c3f515cd_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubesecondarydns-rhel9@sha256:b1838f3c8ba3d8113bddea17b78c21e1c1490e2a4a07ea77014edee523d06347_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-console-plugin-rhel9@sha256:86a4b1e3d6ad1d56302c9c058f8bc5826dcfe6c46fb3e0ddaa06818645039020_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-console-plugin-rhel9@sha256:ffb2acd9ae09c1ef9ca756f5eaf6087d0a3957cfc824543949d25f556a97744d_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-dpdk-checkup-rhel9@sha256:525aceb9396010ebcdba14040f267889b807cd84db8e5b4030429b51f0fbf5fe_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-dpdk-checkup-rhel9@sha256:553c4686f56c66cc1e3c5ad9d4051f139d43f821eac3abb98ca5cdb8b5dfe202_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-ssp-operator-rhel9@sha256:901e6cad9534c7bd7c4018c60bccfe49d7280fba5a9901ab4c4d15e9345288c4_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-ssp-operator-rhel9@sha256:badeb0f65f543b209f6af761729d9778b7b73b97d55044016dfba3f38a1f6f18_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-cleanup-vm-rhel9@sha256:28e4975fa4dac22d9da32ed2a10aed039fd957b30140daa36bab2caa998be77a_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-cleanup-vm-rhel9@sha256:b0ff7e812a576ea848590655fc13a85832d5a39f68e7769ceab9da6949da88c7_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-copy-template-rhel9@sha256:4916a6c6b1f9b529187d3b4d5fc99b90157993767b3fe2ad36a9ec77fbb46b10_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-copy-template-rhel9@sha256:f71c36442f1b61cdde7ec58d2c3c78d2039f6d6108e6c35388ef7c1650971fa1_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-create-datavolume-rhel9@sha256:2ad49cf6e2242a9e5861929d9bcab1305a7fc4e34e708f99cff1d7253aa46167_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-create-datavolume-rhel9@sha256:7112400a4ecb23ee2110bf96372fcf9f96ad648a51aa944627b40eb59539a660_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-create-vm-from-template-rhel9@sha256:1411c65bbad7302710788327f6964a4bf5bc20ef70d5e46f4a5c6e7a0e7a0161_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-create-vm-from-template-rhel9@sha256:4d962618aa95600c60c9fc8b890186e510de91177d51949e12797a3558e31328_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-customize-rhel9@sha256:5c23d3f20ea9dcbe7109284d73078ecd516a070e964b844f8d80b1d92ebd55ee_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-customize-rhel9@sha256:a780244e48c6d4f87446d3754c3eb9ab79c0d54675c189da4a659f7a4d5668ea_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-sysprep-rhel9@sha256:84577d949a1bbcaa291c70729127bca4a8994df03068666baa23840877ea8392_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-sysprep-rhel9@sha256:aed630a597a090179e1b0e0c117e536df06b67d0f793f91936aa7388c0c5d7eb_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-modify-vm-template-rhel9@sha256:31d959b80cf57462e1705684bb7e1b78af26bd2c62f1c9e4e51e1d02199b05a8_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-modify-vm-template-rhel9@sha256:66aea526bc10e4c0136ba86e394bbdfe4fbd7f757d6f391a561b51d2ba2f4d46_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-operator-rhel9@sha256:d0cf0e81589f0938de45961eaddfc5ec4782738fd11082de0439b200534259eb_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-operator-rhel9@sha256:f1b1f5044db6bb945584f9d4f31d020597725a286ef368ed0aca2116abb31beb_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-wait-for-vmi-status-rhel9@sha256:39a15d03f113735df03b1a7408227eb9604d942c1f3c1992bcdc7eaf07662711_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-wait-for-vmi-status-rhel9@sha256:afb68af076954fcd18c7a4a1464ea0c2a766e8282eae980051906ed07eaa1707_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-template-validator-rhel9@sha256:02b22c7e7014b5e72d47fed8b6a268cf307638c5510adf3916c51f7f40a52a08_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-template-validator-rhel9@sha256:c0264b9271e602f85b2040ef7f207cdfa46038dc4fa6e4738bf196ef88a71cf8_amd64",
"9Base-CNV-4.13:container-native-virtualization/libguestfs-tools-rhel9@sha256:29ae84575bbca24553cf649256759fd96ff286971d80bc2db129154a7df9b283_amd64",
"9Base-CNV-4.13:container-native-virtualization/libguestfs-tools-rhel9@sha256:6558f60343e068b032167e2340b2c549c5f0258acc5d2614b60966ce79408b01_arm64",
"9Base-CNV-4.13:container-native-virtualization/multus-dynamic-networks-rhel9@sha256:3ecb0162a4b01d1590bf209d717b32a4f0835910d9979823f18c24acba41b503_arm64",
"9Base-CNV-4.13:container-native-virtualization/multus-dynamic-networks-rhel9@sha256:b7f68b6420009e21380d32d6459193aae45e93be9533debe17cb3108571b36b8_amd64",
"9Base-CNV-4.13:container-native-virtualization/ovs-cni-plugin-rhel9@sha256:0f1d372f418744e0aff59ecb0a38f53178aac9c2e9eecfd38aa25ed83e0d1360_arm64",
"9Base-CNV-4.13:container-native-virtualization/ovs-cni-plugin-rhel9@sha256:e8e7a44edbf1713fe74de5c4b8f691cce78f4440c4a32a16ba9ad16694a55396_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-api-rhel9@sha256:e68416321ca8c74a547b3d35897f54813c03481143e402e9bdc4daf315e35b5d_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-api-rhel9@sha256:fdb4ca1bb8b310d713d9c7e88f7d091f4460aa942dbeca5ebcf17281a06daffe_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-artifacts-server-rhel9@sha256:33d11c1832b49df39c1fca62bad40dbc5c30a452248339aaef449ac99509accb_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-artifacts-server-rhel9@sha256:81fc61b714baecb5a89fa6c0749c14566e0661b8e184ca602fc2e03b9cf431ee_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-apiserver-rhel9@sha256:f6128a63344ed2129f5bce648ddcfaa2869d31cde4b93328d3c22534b97ade10_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-apiserver-rhel9@sha256:feca273a691d09445c6cff6d36b5d590735e867656a9898ce0d89744d98e8006_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-cloner-rhel9@sha256:68e3b9b0291b4fb277ac430269ffce11d13b0a7688cf2ffcdb7f98759c36b4db_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-cloner-rhel9@sha256:6ac212767481bef64d8a7d0252bb8089c0f9751fad4a355aef71bd49dad2ad07_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-controller-rhel9@sha256:65f5263275d9f0a12b8fb057d82adf678778039ec873ca9bde182dea3413c9f1_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-controller-rhel9@sha256:d9e62b2019328be258489ac852eef25f8b1233f29abac6bcea5b406329f97fed_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-importer-rhel9@sha256:00a6d9d24ca1466d450b02269ec3144fc7550f0e5c696e869fbf7ce10cae6093_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-importer-rhel9@sha256:2df07fb21a3575e74aa16ded20129828f2300cd33e8ab369b0362062d49e62d0_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-operator-rhel9@sha256:20ec064750faedd97d11b797c8c1d9a1db5d60d7d76e82e65cfd05eb79d65e29_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-operator-rhel9@sha256:802ee8923d9d8e406b23911406f9748756c0ef4d6954e9e2fd5fb4bdf91dde9a_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-uploadproxy-rhel9@sha256:392d0f61f462c707adfdc21e4239c5c09d8520a80486b41d9d9ae479267d6124_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-uploadproxy-rhel9@sha256:6775f34353eec8f35bead9411dde155530d079bb8d51582fb1f2aacc27dbde1d_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-uploadserver-rhel9@sha256:4528c24672689cfb6505761b6b108fbcc04488192733f23d2bfe39cd42a1d743_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-uploadserver-rhel9@sha256:b22048390387380af94e267c8a9a66813c515997456d59d8ebac1486916b6585_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-controller-rhel9@sha256:3e7880149ee9a68286e390beb3d9779f7403c30fc5136e5370e0e4690a3fd243_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-controller-rhel9@sha256:970edc281d7a731e9f7e8c2d4440fe48a221e5e355d5235c5413b4c3adb28503_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-exportproxy-rhel9@sha256:1bda34d5bff734ad997202f29a5ff6f7362fd79fa90511a422442ef2e3681198_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-exportproxy-rhel9@sha256:de3c4afbf7669b98517cbef2490ec186f0553dd97b05bed80ec36dd883fe507b_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-exportserver-rhel9@sha256:3f7f98645176d42c63cca5c0fc3182a03121af87446ca421b6c72baf07dfca0d_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-exportserver-rhel9@sha256:8f12955cd777eb2409037a6968aa92f50c99d6e07e722951dbcfd0c8c9829b5e_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-handler-rhel9@sha256:5fc47110d866d8048aec50689090ce10705d19d3bb48d2b06727d6d569003af7_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-handler-rhel9@sha256:84ba79ae9658699147d2493df2582ab6df10adbff4d44a533c3fe6a9f45f9691_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-launcher-rhel9@sha256:4990d40d9987d5126d105dd45be2501eaded248cb61bdde5ea8d359bc1e7ebef_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-launcher-rhel9@sha256:95aeacb98209e0baef27ce0e02fbac38d693cea74808fc77107efda0f344bcb5_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-operator-rhel9@sha256:5c1a7e4ed2061938987b900a2394f07121d4037350c9bb6485213a2adfea787d_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-operator-rhel9@sha256:66b1b3b379121d6411ba22283e7d991617177330c93746d37753ab7812b9a00b_arm64",
"9Base-CNV-4.13:container-native-virtualization/virtio-win-rhel9@sha256:8735f51da918408a8826601c082d1b29accf26d59b9978da89b980cb509c1102_arm64",
"9Base-CNV-4.13:container-native-virtualization/virtio-win-rhel9@sha256:d147d2a6eb6f907d1e88f61aaca83596853bc72164583d6dda2b1154b490de25_amd64",
"9Base-CNV-4.13:container-native-virtualization/vm-console-proxy-rhel9@sha256:70a8d0cd66182c25e02679540bae1368b2a9cf687532b58dba41ef30c5ca00c1_arm64",
"9Base-CNV-4.13:container-native-virtualization/vm-console-proxy-rhel9@sha256:7ca921f98f6d81a126907127a611146fb53397869a628678faa1e289c01d22b2_amd64",
"9Base-CNV-4.13:container-native-virtualization/vm-network-latency-checkup-rhel9@sha256:503ea7ac914a9b54e9d665a0227ee0b5d5200cdb5d692aa94c07dd1518d91b70_arm64",
"9Base-CNV-4.13:container-native-virtualization/vm-network-latency-checkup-rhel9@sha256:59fd965975bccf641a0fa7aa01374d45057bd03cda7528248a84b60b1205bf57_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-2879"
},
{
"category": "external",
"summary": "RHBZ#2132867",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2132867"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-2879",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2879"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-2879",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-2879"
},
{
"category": "external",
"summary": "https://github.com/golang/go/issues/54853",
"url": "https://github.com/golang/go/issues/54853"
},
{
"category": "external",
"summary": "https://github.com/vbatts/tar-split/releases/tag/v0.12.1",
"url": "https://github.com/vbatts/tar-split/releases/tag/v0.12.1"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/xtuG5faxtaU?pli=1",
"url": "https://groups.google.com/g/golang-announce/c/xtuG5faxtaU?pli=1"
}
],
"release_date": "2022-10-04T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-05-18T02:55:08+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"9Base-CNV-4.13:container-native-virtualization/bridge-marker-rhel9@sha256:8eac196b30a648989cdca5cb153a3bc3d34e47339acba0e4f760bd366496c99d_amd64",
"9Base-CNV-4.13:container-native-virtualization/bridge-marker-rhel9@sha256:e8a55aee3d75a316bb0d7a554c737198823df04b3c05e481c17e45eb2153bced_arm64",
"9Base-CNV-4.13:container-native-virtualization/cluster-network-addons-operator-rhel9@sha256:3bff33e3f40cd1e2b519c2db56734d4bb8df883e155c2f20b1cb9d3d184daec1_amd64",
"9Base-CNV-4.13:container-native-virtualization/cluster-network-addons-operator-rhel9@sha256:f439d2f420bb59eb1d5af14ce2002648d0cfc155d1a1466c8aac9b661fe902b8_arm64",
"9Base-CNV-4.13:container-native-virtualization/cnv-containernetworking-plugins-rhel9@sha256:89f22e541f61a660c9aa9f38ef58e80b84a0517f74e84292107fc252c25465c9_arm64",
"9Base-CNV-4.13:container-native-virtualization/cnv-containernetworking-plugins-rhel9@sha256:bf471997e54e4a75b0d71f492ab295787fdbb14d8c85c4ea8c03f0552dbc3755_amd64",
"9Base-CNV-4.13:container-native-virtualization/cnv-must-gather-rhel9@sha256:9e8efd76924958eb605401abdac08eba97fb83a1ada383bc87a7fb7c87b3a455_arm64",
"9Base-CNV-4.13:container-native-virtualization/cnv-must-gather-rhel9@sha256:b9fc32b5fabedd65a4c3a471879c808af2087277de4278adaa115a732f0468da_amd64",
"9Base-CNV-4.13:container-native-virtualization/hco-bundle-registry-rhel9@sha256:60e89d7a99ff9f20e974430b802dd724a3bb6fa1e01e5a62daad98ac487b3063_amd64",
"9Base-CNV-4.13:container-native-virtualization/hco-bundle-registry-rhel9@sha256:dd20b138045ef1424d83a47e7abcfcbb2ac54577dcec5ed3c186390aaa4c9d84_arm64",
"9Base-CNV-4.13:container-native-virtualization/hostpath-csi-driver-rhel9@sha256:61e2824853d51347593ad909a5e546cd92e4216d6a1df5dffb50dd9cba277cce_amd64",
"9Base-CNV-4.13:container-native-virtualization/hostpath-csi-driver-rhel9@sha256:676d4c23a5f60dd331728af056b0a6b2d3358ac88da23299b1a98dfaca8f288e_arm64",
"9Base-CNV-4.13:container-native-virtualization/hostpath-provisioner-operator-rhel9@sha256:515be94be496c67f5b8fd5f4832fe4385e56476e6589897d6b9fbb9bb2b00f32_amd64",
"9Base-CNV-4.13:container-native-virtualization/hostpath-provisioner-operator-rhel9@sha256:571ae805641dea11646028c946039983c7fd82f138b915dcb8b80c39b465e63c_arm64",
"9Base-CNV-4.13:container-native-virtualization/hostpath-provisioner-rhel9@sha256:ac3fe350bedd6bc43596444ba0f279ccf8a144ab14ac5a9b80ea71c46390b7b4_amd64",
"9Base-CNV-4.13:container-native-virtualization/hostpath-provisioner-rhel9@sha256:d4ed87745b7ee2acca2d83e2c91c2f6dced1903c81495b50f2559b3ba2dde287_arm64",
"9Base-CNV-4.13:container-native-virtualization/hyperconverged-cluster-operator-rhel9@sha256:e5ab9f3be59d3568e3d672ab374efb16990ccf92192eac4e1244b10fcd7423e2_amd64",
"9Base-CNV-4.13:container-native-virtualization/hyperconverged-cluster-operator-rhel9@sha256:e681560b184189df03fc84c8a712f32289f42573dd348cda394b19565eb6eca8_arm64",
"9Base-CNV-4.13:container-native-virtualization/hyperconverged-cluster-webhook-rhel9@sha256:06d036d320b3027bb8370bb8e0f6fe8c9f0ec9bca7aac3b5c53698ba4a170042_arm64",
"9Base-CNV-4.13:container-native-virtualization/hyperconverged-cluster-webhook-rhel9@sha256:b5a01336180aad017df62cf8e652f2491b8263ba7e4dd07f858db1ef1924cf2f_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubemacpool-rhel9@sha256:4d190d81eeb3fbe9ed56cf3548dc83a3f81641bfdafa7b42dcfb0d2512566644_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubemacpool-rhel9@sha256:59862a59854f0d5b83dc25ba119f9586a8aff42b6e60d1922f8ae7b4567309ff_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubesecondarydns-rhel9@sha256:121d30d78cc57731ea2242ef2c32430890ac66c2723e65608d5e2f26c3f515cd_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubesecondarydns-rhel9@sha256:b1838f3c8ba3d8113bddea17b78c21e1c1490e2a4a07ea77014edee523d06347_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-console-plugin-rhel9@sha256:86a4b1e3d6ad1d56302c9c058f8bc5826dcfe6c46fb3e0ddaa06818645039020_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-console-plugin-rhel9@sha256:ffb2acd9ae09c1ef9ca756f5eaf6087d0a3957cfc824543949d25f556a97744d_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-dpdk-checkup-rhel9@sha256:525aceb9396010ebcdba14040f267889b807cd84db8e5b4030429b51f0fbf5fe_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-dpdk-checkup-rhel9@sha256:553c4686f56c66cc1e3c5ad9d4051f139d43f821eac3abb98ca5cdb8b5dfe202_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-ssp-operator-rhel9@sha256:901e6cad9534c7bd7c4018c60bccfe49d7280fba5a9901ab4c4d15e9345288c4_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-ssp-operator-rhel9@sha256:badeb0f65f543b209f6af761729d9778b7b73b97d55044016dfba3f38a1f6f18_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-cleanup-vm-rhel9@sha256:28e4975fa4dac22d9da32ed2a10aed039fd957b30140daa36bab2caa998be77a_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-cleanup-vm-rhel9@sha256:b0ff7e812a576ea848590655fc13a85832d5a39f68e7769ceab9da6949da88c7_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-copy-template-rhel9@sha256:4916a6c6b1f9b529187d3b4d5fc99b90157993767b3fe2ad36a9ec77fbb46b10_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-copy-template-rhel9@sha256:f71c36442f1b61cdde7ec58d2c3c78d2039f6d6108e6c35388ef7c1650971fa1_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-create-datavolume-rhel9@sha256:2ad49cf6e2242a9e5861929d9bcab1305a7fc4e34e708f99cff1d7253aa46167_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-create-datavolume-rhel9@sha256:7112400a4ecb23ee2110bf96372fcf9f96ad648a51aa944627b40eb59539a660_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-create-vm-from-template-rhel9@sha256:1411c65bbad7302710788327f6964a4bf5bc20ef70d5e46f4a5c6e7a0e7a0161_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-create-vm-from-template-rhel9@sha256:4d962618aa95600c60c9fc8b890186e510de91177d51949e12797a3558e31328_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-customize-rhel9@sha256:5c23d3f20ea9dcbe7109284d73078ecd516a070e964b844f8d80b1d92ebd55ee_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-customize-rhel9@sha256:a780244e48c6d4f87446d3754c3eb9ab79c0d54675c189da4a659f7a4d5668ea_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-sysprep-rhel9@sha256:84577d949a1bbcaa291c70729127bca4a8994df03068666baa23840877ea8392_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-sysprep-rhel9@sha256:aed630a597a090179e1b0e0c117e536df06b67d0f793f91936aa7388c0c5d7eb_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-modify-vm-template-rhel9@sha256:31d959b80cf57462e1705684bb7e1b78af26bd2c62f1c9e4e51e1d02199b05a8_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-modify-vm-template-rhel9@sha256:66aea526bc10e4c0136ba86e394bbdfe4fbd7f757d6f391a561b51d2ba2f4d46_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-operator-rhel9@sha256:d0cf0e81589f0938de45961eaddfc5ec4782738fd11082de0439b200534259eb_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-operator-rhel9@sha256:f1b1f5044db6bb945584f9d4f31d020597725a286ef368ed0aca2116abb31beb_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-wait-for-vmi-status-rhel9@sha256:39a15d03f113735df03b1a7408227eb9604d942c1f3c1992bcdc7eaf07662711_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-wait-for-vmi-status-rhel9@sha256:afb68af076954fcd18c7a4a1464ea0c2a766e8282eae980051906ed07eaa1707_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-template-validator-rhel9@sha256:02b22c7e7014b5e72d47fed8b6a268cf307638c5510adf3916c51f7f40a52a08_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-template-validator-rhel9@sha256:c0264b9271e602f85b2040ef7f207cdfa46038dc4fa6e4738bf196ef88a71cf8_amd64",
"9Base-CNV-4.13:container-native-virtualization/libguestfs-tools-rhel9@sha256:29ae84575bbca24553cf649256759fd96ff286971d80bc2db129154a7df9b283_amd64",
"9Base-CNV-4.13:container-native-virtualization/libguestfs-tools-rhel9@sha256:6558f60343e068b032167e2340b2c549c5f0258acc5d2614b60966ce79408b01_arm64",
"9Base-CNV-4.13:container-native-virtualization/multus-dynamic-networks-rhel9@sha256:3ecb0162a4b01d1590bf209d717b32a4f0835910d9979823f18c24acba41b503_arm64",
"9Base-CNV-4.13:container-native-virtualization/multus-dynamic-networks-rhel9@sha256:b7f68b6420009e21380d32d6459193aae45e93be9533debe17cb3108571b36b8_amd64",
"9Base-CNV-4.13:container-native-virtualization/ovs-cni-plugin-rhel9@sha256:0f1d372f418744e0aff59ecb0a38f53178aac9c2e9eecfd38aa25ed83e0d1360_arm64",
"9Base-CNV-4.13:container-native-virtualization/ovs-cni-plugin-rhel9@sha256:e8e7a44edbf1713fe74de5c4b8f691cce78f4440c4a32a16ba9ad16694a55396_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-api-rhel9@sha256:e68416321ca8c74a547b3d35897f54813c03481143e402e9bdc4daf315e35b5d_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-api-rhel9@sha256:fdb4ca1bb8b310d713d9c7e88f7d091f4460aa942dbeca5ebcf17281a06daffe_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-artifacts-server-rhel9@sha256:33d11c1832b49df39c1fca62bad40dbc5c30a452248339aaef449ac99509accb_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-artifacts-server-rhel9@sha256:81fc61b714baecb5a89fa6c0749c14566e0661b8e184ca602fc2e03b9cf431ee_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-apiserver-rhel9@sha256:f6128a63344ed2129f5bce648ddcfaa2869d31cde4b93328d3c22534b97ade10_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-apiserver-rhel9@sha256:feca273a691d09445c6cff6d36b5d590735e867656a9898ce0d89744d98e8006_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-cloner-rhel9@sha256:68e3b9b0291b4fb277ac430269ffce11d13b0a7688cf2ffcdb7f98759c36b4db_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-cloner-rhel9@sha256:6ac212767481bef64d8a7d0252bb8089c0f9751fad4a355aef71bd49dad2ad07_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-controller-rhel9@sha256:65f5263275d9f0a12b8fb057d82adf678778039ec873ca9bde182dea3413c9f1_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-controller-rhel9@sha256:d9e62b2019328be258489ac852eef25f8b1233f29abac6bcea5b406329f97fed_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-importer-rhel9@sha256:00a6d9d24ca1466d450b02269ec3144fc7550f0e5c696e869fbf7ce10cae6093_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-importer-rhel9@sha256:2df07fb21a3575e74aa16ded20129828f2300cd33e8ab369b0362062d49e62d0_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-operator-rhel9@sha256:20ec064750faedd97d11b797c8c1d9a1db5d60d7d76e82e65cfd05eb79d65e29_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-operator-rhel9@sha256:802ee8923d9d8e406b23911406f9748756c0ef4d6954e9e2fd5fb4bdf91dde9a_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-uploadproxy-rhel9@sha256:392d0f61f462c707adfdc21e4239c5c09d8520a80486b41d9d9ae479267d6124_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-uploadproxy-rhel9@sha256:6775f34353eec8f35bead9411dde155530d079bb8d51582fb1f2aacc27dbde1d_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-uploadserver-rhel9@sha256:4528c24672689cfb6505761b6b108fbcc04488192733f23d2bfe39cd42a1d743_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-uploadserver-rhel9@sha256:b22048390387380af94e267c8a9a66813c515997456d59d8ebac1486916b6585_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-controller-rhel9@sha256:3e7880149ee9a68286e390beb3d9779f7403c30fc5136e5370e0e4690a3fd243_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-controller-rhel9@sha256:970edc281d7a731e9f7e8c2d4440fe48a221e5e355d5235c5413b4c3adb28503_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-exportproxy-rhel9@sha256:1bda34d5bff734ad997202f29a5ff6f7362fd79fa90511a422442ef2e3681198_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-exportproxy-rhel9@sha256:de3c4afbf7669b98517cbef2490ec186f0553dd97b05bed80ec36dd883fe507b_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-exportserver-rhel9@sha256:3f7f98645176d42c63cca5c0fc3182a03121af87446ca421b6c72baf07dfca0d_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-exportserver-rhel9@sha256:8f12955cd777eb2409037a6968aa92f50c99d6e07e722951dbcfd0c8c9829b5e_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-handler-rhel9@sha256:5fc47110d866d8048aec50689090ce10705d19d3bb48d2b06727d6d569003af7_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-handler-rhel9@sha256:84ba79ae9658699147d2493df2582ab6df10adbff4d44a533c3fe6a9f45f9691_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-launcher-rhel9@sha256:4990d40d9987d5126d105dd45be2501eaded248cb61bdde5ea8d359bc1e7ebef_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-launcher-rhel9@sha256:95aeacb98209e0baef27ce0e02fbac38d693cea74808fc77107efda0f344bcb5_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-operator-rhel9@sha256:5c1a7e4ed2061938987b900a2394f07121d4037350c9bb6485213a2adfea787d_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-operator-rhel9@sha256:66b1b3b379121d6411ba22283e7d991617177330c93746d37753ab7812b9a00b_arm64",
"9Base-CNV-4.13:container-native-virtualization/virtio-win-rhel9@sha256:8735f51da918408a8826601c082d1b29accf26d59b9978da89b980cb509c1102_arm64",
"9Base-CNV-4.13:container-native-virtualization/virtio-win-rhel9@sha256:d147d2a6eb6f907d1e88f61aaca83596853bc72164583d6dda2b1154b490de25_amd64",
"9Base-CNV-4.13:container-native-virtualization/vm-console-proxy-rhel9@sha256:70a8d0cd66182c25e02679540bae1368b2a9cf687532b58dba41ef30c5ca00c1_arm64",
"9Base-CNV-4.13:container-native-virtualization/vm-console-proxy-rhel9@sha256:7ca921f98f6d81a126907127a611146fb53397869a628678faa1e289c01d22b2_amd64",
"9Base-CNV-4.13:container-native-virtualization/vm-network-latency-checkup-rhel9@sha256:503ea7ac914a9b54e9d665a0227ee0b5d5200cdb5d692aa94c07dd1518d91b70_arm64",
"9Base-CNV-4.13:container-native-virtualization/vm-network-latency-checkup-rhel9@sha256:59fd965975bccf641a0fa7aa01374d45057bd03cda7528248a84b60b1205bf57_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:3205"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"9Base-CNV-4.13:container-native-virtualization/bridge-marker-rhel9@sha256:8eac196b30a648989cdca5cb153a3bc3d34e47339acba0e4f760bd366496c99d_amd64",
"9Base-CNV-4.13:container-native-virtualization/bridge-marker-rhel9@sha256:e8a55aee3d75a316bb0d7a554c737198823df04b3c05e481c17e45eb2153bced_arm64",
"9Base-CNV-4.13:container-native-virtualization/cluster-network-addons-operator-rhel9@sha256:3bff33e3f40cd1e2b519c2db56734d4bb8df883e155c2f20b1cb9d3d184daec1_amd64",
"9Base-CNV-4.13:container-native-virtualization/cluster-network-addons-operator-rhel9@sha256:f439d2f420bb59eb1d5af14ce2002648d0cfc155d1a1466c8aac9b661fe902b8_arm64",
"9Base-CNV-4.13:container-native-virtualization/cnv-containernetworking-plugins-rhel9@sha256:89f22e541f61a660c9aa9f38ef58e80b84a0517f74e84292107fc252c25465c9_arm64",
"9Base-CNV-4.13:container-native-virtualization/cnv-containernetworking-plugins-rhel9@sha256:bf471997e54e4a75b0d71f492ab295787fdbb14d8c85c4ea8c03f0552dbc3755_amd64",
"9Base-CNV-4.13:container-native-virtualization/cnv-must-gather-rhel9@sha256:9e8efd76924958eb605401abdac08eba97fb83a1ada383bc87a7fb7c87b3a455_arm64",
"9Base-CNV-4.13:container-native-virtualization/cnv-must-gather-rhel9@sha256:b9fc32b5fabedd65a4c3a471879c808af2087277de4278adaa115a732f0468da_amd64",
"9Base-CNV-4.13:container-native-virtualization/hco-bundle-registry-rhel9@sha256:60e89d7a99ff9f20e974430b802dd724a3bb6fa1e01e5a62daad98ac487b3063_amd64",
"9Base-CNV-4.13:container-native-virtualization/hco-bundle-registry-rhel9@sha256:dd20b138045ef1424d83a47e7abcfcbb2ac54577dcec5ed3c186390aaa4c9d84_arm64",
"9Base-CNV-4.13:container-native-virtualization/hostpath-csi-driver-rhel9@sha256:61e2824853d51347593ad909a5e546cd92e4216d6a1df5dffb50dd9cba277cce_amd64",
"9Base-CNV-4.13:container-native-virtualization/hostpath-csi-driver-rhel9@sha256:676d4c23a5f60dd331728af056b0a6b2d3358ac88da23299b1a98dfaca8f288e_arm64",
"9Base-CNV-4.13:container-native-virtualization/hostpath-provisioner-operator-rhel9@sha256:515be94be496c67f5b8fd5f4832fe4385e56476e6589897d6b9fbb9bb2b00f32_amd64",
"9Base-CNV-4.13:container-native-virtualization/hostpath-provisioner-operator-rhel9@sha256:571ae805641dea11646028c946039983c7fd82f138b915dcb8b80c39b465e63c_arm64",
"9Base-CNV-4.13:container-native-virtualization/hostpath-provisioner-rhel9@sha256:ac3fe350bedd6bc43596444ba0f279ccf8a144ab14ac5a9b80ea71c46390b7b4_amd64",
"9Base-CNV-4.13:container-native-virtualization/hostpath-provisioner-rhel9@sha256:d4ed87745b7ee2acca2d83e2c91c2f6dced1903c81495b50f2559b3ba2dde287_arm64",
"9Base-CNV-4.13:container-native-virtualization/hyperconverged-cluster-operator-rhel9@sha256:e5ab9f3be59d3568e3d672ab374efb16990ccf92192eac4e1244b10fcd7423e2_amd64",
"9Base-CNV-4.13:container-native-virtualization/hyperconverged-cluster-operator-rhel9@sha256:e681560b184189df03fc84c8a712f32289f42573dd348cda394b19565eb6eca8_arm64",
"9Base-CNV-4.13:container-native-virtualization/hyperconverged-cluster-webhook-rhel9@sha256:06d036d320b3027bb8370bb8e0f6fe8c9f0ec9bca7aac3b5c53698ba4a170042_arm64",
"9Base-CNV-4.13:container-native-virtualization/hyperconverged-cluster-webhook-rhel9@sha256:b5a01336180aad017df62cf8e652f2491b8263ba7e4dd07f858db1ef1924cf2f_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubemacpool-rhel9@sha256:4d190d81eeb3fbe9ed56cf3548dc83a3f81641bfdafa7b42dcfb0d2512566644_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubemacpool-rhel9@sha256:59862a59854f0d5b83dc25ba119f9586a8aff42b6e60d1922f8ae7b4567309ff_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubesecondarydns-rhel9@sha256:121d30d78cc57731ea2242ef2c32430890ac66c2723e65608d5e2f26c3f515cd_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubesecondarydns-rhel9@sha256:b1838f3c8ba3d8113bddea17b78c21e1c1490e2a4a07ea77014edee523d06347_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-console-plugin-rhel9@sha256:86a4b1e3d6ad1d56302c9c058f8bc5826dcfe6c46fb3e0ddaa06818645039020_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-console-plugin-rhel9@sha256:ffb2acd9ae09c1ef9ca756f5eaf6087d0a3957cfc824543949d25f556a97744d_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-dpdk-checkup-rhel9@sha256:525aceb9396010ebcdba14040f267889b807cd84db8e5b4030429b51f0fbf5fe_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-dpdk-checkup-rhel9@sha256:553c4686f56c66cc1e3c5ad9d4051f139d43f821eac3abb98ca5cdb8b5dfe202_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-ssp-operator-rhel9@sha256:901e6cad9534c7bd7c4018c60bccfe49d7280fba5a9901ab4c4d15e9345288c4_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-ssp-operator-rhel9@sha256:badeb0f65f543b209f6af761729d9778b7b73b97d55044016dfba3f38a1f6f18_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-cleanup-vm-rhel9@sha256:28e4975fa4dac22d9da32ed2a10aed039fd957b30140daa36bab2caa998be77a_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-cleanup-vm-rhel9@sha256:b0ff7e812a576ea848590655fc13a85832d5a39f68e7769ceab9da6949da88c7_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-copy-template-rhel9@sha256:4916a6c6b1f9b529187d3b4d5fc99b90157993767b3fe2ad36a9ec77fbb46b10_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-copy-template-rhel9@sha256:f71c36442f1b61cdde7ec58d2c3c78d2039f6d6108e6c35388ef7c1650971fa1_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-create-datavolume-rhel9@sha256:2ad49cf6e2242a9e5861929d9bcab1305a7fc4e34e708f99cff1d7253aa46167_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-create-datavolume-rhel9@sha256:7112400a4ecb23ee2110bf96372fcf9f96ad648a51aa944627b40eb59539a660_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-create-vm-from-template-rhel9@sha256:1411c65bbad7302710788327f6964a4bf5bc20ef70d5e46f4a5c6e7a0e7a0161_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-create-vm-from-template-rhel9@sha256:4d962618aa95600c60c9fc8b890186e510de91177d51949e12797a3558e31328_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-customize-rhel9@sha256:5c23d3f20ea9dcbe7109284d73078ecd516a070e964b844f8d80b1d92ebd55ee_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-customize-rhel9@sha256:a780244e48c6d4f87446d3754c3eb9ab79c0d54675c189da4a659f7a4d5668ea_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-sysprep-rhel9@sha256:84577d949a1bbcaa291c70729127bca4a8994df03068666baa23840877ea8392_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-sysprep-rhel9@sha256:aed630a597a090179e1b0e0c117e536df06b67d0f793f91936aa7388c0c5d7eb_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-modify-vm-template-rhel9@sha256:31d959b80cf57462e1705684bb7e1b78af26bd2c62f1c9e4e51e1d02199b05a8_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-modify-vm-template-rhel9@sha256:66aea526bc10e4c0136ba86e394bbdfe4fbd7f757d6f391a561b51d2ba2f4d46_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-operator-rhel9@sha256:d0cf0e81589f0938de45961eaddfc5ec4782738fd11082de0439b200534259eb_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-operator-rhel9@sha256:f1b1f5044db6bb945584f9d4f31d020597725a286ef368ed0aca2116abb31beb_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-wait-for-vmi-status-rhel9@sha256:39a15d03f113735df03b1a7408227eb9604d942c1f3c1992bcdc7eaf07662711_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-wait-for-vmi-status-rhel9@sha256:afb68af076954fcd18c7a4a1464ea0c2a766e8282eae980051906ed07eaa1707_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-template-validator-rhel9@sha256:02b22c7e7014b5e72d47fed8b6a268cf307638c5510adf3916c51f7f40a52a08_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-template-validator-rhel9@sha256:c0264b9271e602f85b2040ef7f207cdfa46038dc4fa6e4738bf196ef88a71cf8_amd64",
"9Base-CNV-4.13:container-native-virtualization/libguestfs-tools-rhel9@sha256:29ae84575bbca24553cf649256759fd96ff286971d80bc2db129154a7df9b283_amd64",
"9Base-CNV-4.13:container-native-virtualization/libguestfs-tools-rhel9@sha256:6558f60343e068b032167e2340b2c549c5f0258acc5d2614b60966ce79408b01_arm64",
"9Base-CNV-4.13:container-native-virtualization/multus-dynamic-networks-rhel9@sha256:3ecb0162a4b01d1590bf209d717b32a4f0835910d9979823f18c24acba41b503_arm64",
"9Base-CNV-4.13:container-native-virtualization/multus-dynamic-networks-rhel9@sha256:b7f68b6420009e21380d32d6459193aae45e93be9533debe17cb3108571b36b8_amd64",
"9Base-CNV-4.13:container-native-virtualization/ovs-cni-plugin-rhel9@sha256:0f1d372f418744e0aff59ecb0a38f53178aac9c2e9eecfd38aa25ed83e0d1360_arm64",
"9Base-CNV-4.13:container-native-virtualization/ovs-cni-plugin-rhel9@sha256:e8e7a44edbf1713fe74de5c4b8f691cce78f4440c4a32a16ba9ad16694a55396_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-api-rhel9@sha256:e68416321ca8c74a547b3d35897f54813c03481143e402e9bdc4daf315e35b5d_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-api-rhel9@sha256:fdb4ca1bb8b310d713d9c7e88f7d091f4460aa942dbeca5ebcf17281a06daffe_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-artifacts-server-rhel9@sha256:33d11c1832b49df39c1fca62bad40dbc5c30a452248339aaef449ac99509accb_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-artifacts-server-rhel9@sha256:81fc61b714baecb5a89fa6c0749c14566e0661b8e184ca602fc2e03b9cf431ee_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-apiserver-rhel9@sha256:f6128a63344ed2129f5bce648ddcfaa2869d31cde4b93328d3c22534b97ade10_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-apiserver-rhel9@sha256:feca273a691d09445c6cff6d36b5d590735e867656a9898ce0d89744d98e8006_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-cloner-rhel9@sha256:68e3b9b0291b4fb277ac430269ffce11d13b0a7688cf2ffcdb7f98759c36b4db_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-cloner-rhel9@sha256:6ac212767481bef64d8a7d0252bb8089c0f9751fad4a355aef71bd49dad2ad07_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-controller-rhel9@sha256:65f5263275d9f0a12b8fb057d82adf678778039ec873ca9bde182dea3413c9f1_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-controller-rhel9@sha256:d9e62b2019328be258489ac852eef25f8b1233f29abac6bcea5b406329f97fed_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-importer-rhel9@sha256:00a6d9d24ca1466d450b02269ec3144fc7550f0e5c696e869fbf7ce10cae6093_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-importer-rhel9@sha256:2df07fb21a3575e74aa16ded20129828f2300cd33e8ab369b0362062d49e62d0_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-operator-rhel9@sha256:20ec064750faedd97d11b797c8c1d9a1db5d60d7d76e82e65cfd05eb79d65e29_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-operator-rhel9@sha256:802ee8923d9d8e406b23911406f9748756c0ef4d6954e9e2fd5fb4bdf91dde9a_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-uploadproxy-rhel9@sha256:392d0f61f462c707adfdc21e4239c5c09d8520a80486b41d9d9ae479267d6124_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-uploadproxy-rhel9@sha256:6775f34353eec8f35bead9411dde155530d079bb8d51582fb1f2aacc27dbde1d_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-uploadserver-rhel9@sha256:4528c24672689cfb6505761b6b108fbcc04488192733f23d2bfe39cd42a1d743_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-uploadserver-rhel9@sha256:b22048390387380af94e267c8a9a66813c515997456d59d8ebac1486916b6585_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-controller-rhel9@sha256:3e7880149ee9a68286e390beb3d9779f7403c30fc5136e5370e0e4690a3fd243_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-controller-rhel9@sha256:970edc281d7a731e9f7e8c2d4440fe48a221e5e355d5235c5413b4c3adb28503_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-exportproxy-rhel9@sha256:1bda34d5bff734ad997202f29a5ff6f7362fd79fa90511a422442ef2e3681198_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-exportproxy-rhel9@sha256:de3c4afbf7669b98517cbef2490ec186f0553dd97b05bed80ec36dd883fe507b_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-exportserver-rhel9@sha256:3f7f98645176d42c63cca5c0fc3182a03121af87446ca421b6c72baf07dfca0d_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-exportserver-rhel9@sha256:8f12955cd777eb2409037a6968aa92f50c99d6e07e722951dbcfd0c8c9829b5e_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-handler-rhel9@sha256:5fc47110d866d8048aec50689090ce10705d19d3bb48d2b06727d6d569003af7_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-handler-rhel9@sha256:84ba79ae9658699147d2493df2582ab6df10adbff4d44a533c3fe6a9f45f9691_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-launcher-rhel9@sha256:4990d40d9987d5126d105dd45be2501eaded248cb61bdde5ea8d359bc1e7ebef_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-launcher-rhel9@sha256:95aeacb98209e0baef27ce0e02fbac38d693cea74808fc77107efda0f344bcb5_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-operator-rhel9@sha256:5c1a7e4ed2061938987b900a2394f07121d4037350c9bb6485213a2adfea787d_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-operator-rhel9@sha256:66b1b3b379121d6411ba22283e7d991617177330c93746d37753ab7812b9a00b_arm64",
"9Base-CNV-4.13:container-native-virtualization/virtio-win-rhel9@sha256:8735f51da918408a8826601c082d1b29accf26d59b9978da89b980cb509c1102_arm64",
"9Base-CNV-4.13:container-native-virtualization/virtio-win-rhel9@sha256:d147d2a6eb6f907d1e88f61aaca83596853bc72164583d6dda2b1154b490de25_amd64",
"9Base-CNV-4.13:container-native-virtualization/vm-console-proxy-rhel9@sha256:70a8d0cd66182c25e02679540bae1368b2a9cf687532b58dba41ef30c5ca00c1_arm64",
"9Base-CNV-4.13:container-native-virtualization/vm-console-proxy-rhel9@sha256:7ca921f98f6d81a126907127a611146fb53397869a628678faa1e289c01d22b2_amd64",
"9Base-CNV-4.13:container-native-virtualization/vm-network-latency-checkup-rhel9@sha256:503ea7ac914a9b54e9d665a0227ee0b5d5200cdb5d692aa94c07dd1518d91b70_arm64",
"9Base-CNV-4.13:container-native-virtualization/vm-network-latency-checkup-rhel9@sha256:59fd965975bccf641a0fa7aa01374d45057bd03cda7528248a84b60b1205bf57_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "golang: archive/tar: github.com/vbatts/tar-split: unbounded memory consumption when reading headers"
},
{
"acknowledgments": [
{
"names": [
"Daniel Abeles"
],
"organization": "Head of Research, Oxeye"
},
{
"names": [
"Gal Goldstein"
],
"organization": "Security Researcher, Oxeye"
}
],
"cve": "CVE-2022-2880",
"cwe": {
"id": "CWE-444",
"name": "Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027)"
},
"discovery_date": "2022-10-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2132868"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the golang package, where requests forwarded by reverse proxy include the raw query parameters from the inbound request, including unparseable parameters rejected by net/http. This issue could permit query parameter smuggling when a Go proxy forwards a parameter with an unparseable value. After the fix, the reverse proxy sanitizes the query parameters in the forwarded query when the outbound request\u0027s form field is set after the reverse proxy. The director function returns, indicating that the proxy has parsed the query parameters. Proxies that do not parse query parameters continue to forward the original query parameters unchanged.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: net/http/httputil: ReverseProxy should not forward unparseable query parameters",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The opportunity to exploit this vulnerability is limited to the Golang runtime. In the case of the OpenShift Container Platform, this would be restricted within each individual container. There are multiple layers of guide rails (Golang\u2019s Garbage Collector; OpenShift\u2019s resource constraints imposed at the container and cluster levels) which would require a malicious user to continue submitting attacks for there to be any enduring impact.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"9Base-CNV-4.13:container-native-virtualization/bridge-marker-rhel9@sha256:8eac196b30a648989cdca5cb153a3bc3d34e47339acba0e4f760bd366496c99d_amd64",
"9Base-CNV-4.13:container-native-virtualization/bridge-marker-rhel9@sha256:e8a55aee3d75a316bb0d7a554c737198823df04b3c05e481c17e45eb2153bced_arm64",
"9Base-CNV-4.13:container-native-virtualization/cluster-network-addons-operator-rhel9@sha256:3bff33e3f40cd1e2b519c2db56734d4bb8df883e155c2f20b1cb9d3d184daec1_amd64",
"9Base-CNV-4.13:container-native-virtualization/cluster-network-addons-operator-rhel9@sha256:f439d2f420bb59eb1d5af14ce2002648d0cfc155d1a1466c8aac9b661fe902b8_arm64",
"9Base-CNV-4.13:container-native-virtualization/cnv-containernetworking-plugins-rhel9@sha256:89f22e541f61a660c9aa9f38ef58e80b84a0517f74e84292107fc252c25465c9_arm64",
"9Base-CNV-4.13:container-native-virtualization/cnv-containernetworking-plugins-rhel9@sha256:bf471997e54e4a75b0d71f492ab295787fdbb14d8c85c4ea8c03f0552dbc3755_amd64",
"9Base-CNV-4.13:container-native-virtualization/cnv-must-gather-rhel9@sha256:9e8efd76924958eb605401abdac08eba97fb83a1ada383bc87a7fb7c87b3a455_arm64",
"9Base-CNV-4.13:container-native-virtualization/cnv-must-gather-rhel9@sha256:b9fc32b5fabedd65a4c3a471879c808af2087277de4278adaa115a732f0468da_amd64",
"9Base-CNV-4.13:container-native-virtualization/hco-bundle-registry-rhel9@sha256:60e89d7a99ff9f20e974430b802dd724a3bb6fa1e01e5a62daad98ac487b3063_amd64",
"9Base-CNV-4.13:container-native-virtualization/hco-bundle-registry-rhel9@sha256:dd20b138045ef1424d83a47e7abcfcbb2ac54577dcec5ed3c186390aaa4c9d84_arm64",
"9Base-CNV-4.13:container-native-virtualization/hostpath-csi-driver-rhel9@sha256:61e2824853d51347593ad909a5e546cd92e4216d6a1df5dffb50dd9cba277cce_amd64",
"9Base-CNV-4.13:container-native-virtualization/hostpath-csi-driver-rhel9@sha256:676d4c23a5f60dd331728af056b0a6b2d3358ac88da23299b1a98dfaca8f288e_arm64",
"9Base-CNV-4.13:container-native-virtualization/hostpath-provisioner-operator-rhel9@sha256:515be94be496c67f5b8fd5f4832fe4385e56476e6589897d6b9fbb9bb2b00f32_amd64",
"9Base-CNV-4.13:container-native-virtualization/hostpath-provisioner-operator-rhel9@sha256:571ae805641dea11646028c946039983c7fd82f138b915dcb8b80c39b465e63c_arm64",
"9Base-CNV-4.13:container-native-virtualization/hostpath-provisioner-rhel9@sha256:ac3fe350bedd6bc43596444ba0f279ccf8a144ab14ac5a9b80ea71c46390b7b4_amd64",
"9Base-CNV-4.13:container-native-virtualization/hostpath-provisioner-rhel9@sha256:d4ed87745b7ee2acca2d83e2c91c2f6dced1903c81495b50f2559b3ba2dde287_arm64",
"9Base-CNV-4.13:container-native-virtualization/hyperconverged-cluster-operator-rhel9@sha256:e5ab9f3be59d3568e3d672ab374efb16990ccf92192eac4e1244b10fcd7423e2_amd64",
"9Base-CNV-4.13:container-native-virtualization/hyperconverged-cluster-operator-rhel9@sha256:e681560b184189df03fc84c8a712f32289f42573dd348cda394b19565eb6eca8_arm64",
"9Base-CNV-4.13:container-native-virtualization/hyperconverged-cluster-webhook-rhel9@sha256:06d036d320b3027bb8370bb8e0f6fe8c9f0ec9bca7aac3b5c53698ba4a170042_arm64",
"9Base-CNV-4.13:container-native-virtualization/hyperconverged-cluster-webhook-rhel9@sha256:b5a01336180aad017df62cf8e652f2491b8263ba7e4dd07f858db1ef1924cf2f_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubemacpool-rhel9@sha256:4d190d81eeb3fbe9ed56cf3548dc83a3f81641bfdafa7b42dcfb0d2512566644_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubemacpool-rhel9@sha256:59862a59854f0d5b83dc25ba119f9586a8aff42b6e60d1922f8ae7b4567309ff_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubesecondarydns-rhel9@sha256:121d30d78cc57731ea2242ef2c32430890ac66c2723e65608d5e2f26c3f515cd_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubesecondarydns-rhel9@sha256:b1838f3c8ba3d8113bddea17b78c21e1c1490e2a4a07ea77014edee523d06347_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-console-plugin-rhel9@sha256:86a4b1e3d6ad1d56302c9c058f8bc5826dcfe6c46fb3e0ddaa06818645039020_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-console-plugin-rhel9@sha256:ffb2acd9ae09c1ef9ca756f5eaf6087d0a3957cfc824543949d25f556a97744d_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-dpdk-checkup-rhel9@sha256:525aceb9396010ebcdba14040f267889b807cd84db8e5b4030429b51f0fbf5fe_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-dpdk-checkup-rhel9@sha256:553c4686f56c66cc1e3c5ad9d4051f139d43f821eac3abb98ca5cdb8b5dfe202_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-ssp-operator-rhel9@sha256:901e6cad9534c7bd7c4018c60bccfe49d7280fba5a9901ab4c4d15e9345288c4_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-ssp-operator-rhel9@sha256:badeb0f65f543b209f6af761729d9778b7b73b97d55044016dfba3f38a1f6f18_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-cleanup-vm-rhel9@sha256:28e4975fa4dac22d9da32ed2a10aed039fd957b30140daa36bab2caa998be77a_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-cleanup-vm-rhel9@sha256:b0ff7e812a576ea848590655fc13a85832d5a39f68e7769ceab9da6949da88c7_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-copy-template-rhel9@sha256:4916a6c6b1f9b529187d3b4d5fc99b90157993767b3fe2ad36a9ec77fbb46b10_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-copy-template-rhel9@sha256:f71c36442f1b61cdde7ec58d2c3c78d2039f6d6108e6c35388ef7c1650971fa1_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-create-datavolume-rhel9@sha256:2ad49cf6e2242a9e5861929d9bcab1305a7fc4e34e708f99cff1d7253aa46167_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-create-datavolume-rhel9@sha256:7112400a4ecb23ee2110bf96372fcf9f96ad648a51aa944627b40eb59539a660_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-create-vm-from-template-rhel9@sha256:1411c65bbad7302710788327f6964a4bf5bc20ef70d5e46f4a5c6e7a0e7a0161_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-create-vm-from-template-rhel9@sha256:4d962618aa95600c60c9fc8b890186e510de91177d51949e12797a3558e31328_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-customize-rhel9@sha256:5c23d3f20ea9dcbe7109284d73078ecd516a070e964b844f8d80b1d92ebd55ee_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-customize-rhel9@sha256:a780244e48c6d4f87446d3754c3eb9ab79c0d54675c189da4a659f7a4d5668ea_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-sysprep-rhel9@sha256:84577d949a1bbcaa291c70729127bca4a8994df03068666baa23840877ea8392_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-sysprep-rhel9@sha256:aed630a597a090179e1b0e0c117e536df06b67d0f793f91936aa7388c0c5d7eb_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-modify-vm-template-rhel9@sha256:31d959b80cf57462e1705684bb7e1b78af26bd2c62f1c9e4e51e1d02199b05a8_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-modify-vm-template-rhel9@sha256:66aea526bc10e4c0136ba86e394bbdfe4fbd7f757d6f391a561b51d2ba2f4d46_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-operator-rhel9@sha256:d0cf0e81589f0938de45961eaddfc5ec4782738fd11082de0439b200534259eb_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-operator-rhel9@sha256:f1b1f5044db6bb945584f9d4f31d020597725a286ef368ed0aca2116abb31beb_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-wait-for-vmi-status-rhel9@sha256:39a15d03f113735df03b1a7408227eb9604d942c1f3c1992bcdc7eaf07662711_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-wait-for-vmi-status-rhel9@sha256:afb68af076954fcd18c7a4a1464ea0c2a766e8282eae980051906ed07eaa1707_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-template-validator-rhel9@sha256:02b22c7e7014b5e72d47fed8b6a268cf307638c5510adf3916c51f7f40a52a08_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-template-validator-rhel9@sha256:c0264b9271e602f85b2040ef7f207cdfa46038dc4fa6e4738bf196ef88a71cf8_amd64",
"9Base-CNV-4.13:container-native-virtualization/libguestfs-tools-rhel9@sha256:29ae84575bbca24553cf649256759fd96ff286971d80bc2db129154a7df9b283_amd64",
"9Base-CNV-4.13:container-native-virtualization/libguestfs-tools-rhel9@sha256:6558f60343e068b032167e2340b2c549c5f0258acc5d2614b60966ce79408b01_arm64",
"9Base-CNV-4.13:container-native-virtualization/multus-dynamic-networks-rhel9@sha256:3ecb0162a4b01d1590bf209d717b32a4f0835910d9979823f18c24acba41b503_arm64",
"9Base-CNV-4.13:container-native-virtualization/multus-dynamic-networks-rhel9@sha256:b7f68b6420009e21380d32d6459193aae45e93be9533debe17cb3108571b36b8_amd64",
"9Base-CNV-4.13:container-native-virtualization/ovs-cni-plugin-rhel9@sha256:0f1d372f418744e0aff59ecb0a38f53178aac9c2e9eecfd38aa25ed83e0d1360_arm64",
"9Base-CNV-4.13:container-native-virtualization/ovs-cni-plugin-rhel9@sha256:e8e7a44edbf1713fe74de5c4b8f691cce78f4440c4a32a16ba9ad16694a55396_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-api-rhel9@sha256:e68416321ca8c74a547b3d35897f54813c03481143e402e9bdc4daf315e35b5d_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-api-rhel9@sha256:fdb4ca1bb8b310d713d9c7e88f7d091f4460aa942dbeca5ebcf17281a06daffe_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-artifacts-server-rhel9@sha256:33d11c1832b49df39c1fca62bad40dbc5c30a452248339aaef449ac99509accb_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-artifacts-server-rhel9@sha256:81fc61b714baecb5a89fa6c0749c14566e0661b8e184ca602fc2e03b9cf431ee_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-apiserver-rhel9@sha256:f6128a63344ed2129f5bce648ddcfaa2869d31cde4b93328d3c22534b97ade10_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-apiserver-rhel9@sha256:feca273a691d09445c6cff6d36b5d590735e867656a9898ce0d89744d98e8006_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-cloner-rhel9@sha256:68e3b9b0291b4fb277ac430269ffce11d13b0a7688cf2ffcdb7f98759c36b4db_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-cloner-rhel9@sha256:6ac212767481bef64d8a7d0252bb8089c0f9751fad4a355aef71bd49dad2ad07_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-controller-rhel9@sha256:65f5263275d9f0a12b8fb057d82adf678778039ec873ca9bde182dea3413c9f1_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-controller-rhel9@sha256:d9e62b2019328be258489ac852eef25f8b1233f29abac6bcea5b406329f97fed_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-importer-rhel9@sha256:00a6d9d24ca1466d450b02269ec3144fc7550f0e5c696e869fbf7ce10cae6093_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-importer-rhel9@sha256:2df07fb21a3575e74aa16ded20129828f2300cd33e8ab369b0362062d49e62d0_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-operator-rhel9@sha256:20ec064750faedd97d11b797c8c1d9a1db5d60d7d76e82e65cfd05eb79d65e29_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-operator-rhel9@sha256:802ee8923d9d8e406b23911406f9748756c0ef4d6954e9e2fd5fb4bdf91dde9a_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-uploadproxy-rhel9@sha256:392d0f61f462c707adfdc21e4239c5c09d8520a80486b41d9d9ae479267d6124_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-uploadproxy-rhel9@sha256:6775f34353eec8f35bead9411dde155530d079bb8d51582fb1f2aacc27dbde1d_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-uploadserver-rhel9@sha256:4528c24672689cfb6505761b6b108fbcc04488192733f23d2bfe39cd42a1d743_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-uploadserver-rhel9@sha256:b22048390387380af94e267c8a9a66813c515997456d59d8ebac1486916b6585_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-controller-rhel9@sha256:3e7880149ee9a68286e390beb3d9779f7403c30fc5136e5370e0e4690a3fd243_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-controller-rhel9@sha256:970edc281d7a731e9f7e8c2d4440fe48a221e5e355d5235c5413b4c3adb28503_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-exportproxy-rhel9@sha256:1bda34d5bff734ad997202f29a5ff6f7362fd79fa90511a422442ef2e3681198_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-exportproxy-rhel9@sha256:de3c4afbf7669b98517cbef2490ec186f0553dd97b05bed80ec36dd883fe507b_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-exportserver-rhel9@sha256:3f7f98645176d42c63cca5c0fc3182a03121af87446ca421b6c72baf07dfca0d_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-exportserver-rhel9@sha256:8f12955cd777eb2409037a6968aa92f50c99d6e07e722951dbcfd0c8c9829b5e_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-handler-rhel9@sha256:5fc47110d866d8048aec50689090ce10705d19d3bb48d2b06727d6d569003af7_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-handler-rhel9@sha256:84ba79ae9658699147d2493df2582ab6df10adbff4d44a533c3fe6a9f45f9691_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-launcher-rhel9@sha256:4990d40d9987d5126d105dd45be2501eaded248cb61bdde5ea8d359bc1e7ebef_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-launcher-rhel9@sha256:95aeacb98209e0baef27ce0e02fbac38d693cea74808fc77107efda0f344bcb5_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-operator-rhel9@sha256:5c1a7e4ed2061938987b900a2394f07121d4037350c9bb6485213a2adfea787d_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-operator-rhel9@sha256:66b1b3b379121d6411ba22283e7d991617177330c93746d37753ab7812b9a00b_arm64",
"9Base-CNV-4.13:container-native-virtualization/virtio-win-rhel9@sha256:8735f51da918408a8826601c082d1b29accf26d59b9978da89b980cb509c1102_arm64",
"9Base-CNV-4.13:container-native-virtualization/virtio-win-rhel9@sha256:d147d2a6eb6f907d1e88f61aaca83596853bc72164583d6dda2b1154b490de25_amd64",
"9Base-CNV-4.13:container-native-virtualization/vm-console-proxy-rhel9@sha256:70a8d0cd66182c25e02679540bae1368b2a9cf687532b58dba41ef30c5ca00c1_arm64",
"9Base-CNV-4.13:container-native-virtualization/vm-console-proxy-rhel9@sha256:7ca921f98f6d81a126907127a611146fb53397869a628678faa1e289c01d22b2_amd64",
"9Base-CNV-4.13:container-native-virtualization/vm-network-latency-checkup-rhel9@sha256:503ea7ac914a9b54e9d665a0227ee0b5d5200cdb5d692aa94c07dd1518d91b70_arm64",
"9Base-CNV-4.13:container-native-virtualization/vm-network-latency-checkup-rhel9@sha256:59fd965975bccf641a0fa7aa01374d45057bd03cda7528248a84b60b1205bf57_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-2880"
},
{
"category": "external",
"summary": "RHBZ#2132868",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2132868"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-2880",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2880"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-2880",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-2880"
},
{
"category": "external",
"summary": "https://github.com/golang/go/issues/54663",
"url": "https://github.com/golang/go/issues/54663"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/xtuG5faxtaU?pli=1",
"url": "https://groups.google.com/g/golang-announce/c/xtuG5faxtaU?pli=1"
}
],
"release_date": "2022-10-04T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-05-18T02:55:08+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"9Base-CNV-4.13:container-native-virtualization/bridge-marker-rhel9@sha256:8eac196b30a648989cdca5cb153a3bc3d34e47339acba0e4f760bd366496c99d_amd64",
"9Base-CNV-4.13:container-native-virtualization/bridge-marker-rhel9@sha256:e8a55aee3d75a316bb0d7a554c737198823df04b3c05e481c17e45eb2153bced_arm64",
"9Base-CNV-4.13:container-native-virtualization/cluster-network-addons-operator-rhel9@sha256:3bff33e3f40cd1e2b519c2db56734d4bb8df883e155c2f20b1cb9d3d184daec1_amd64",
"9Base-CNV-4.13:container-native-virtualization/cluster-network-addons-operator-rhel9@sha256:f439d2f420bb59eb1d5af14ce2002648d0cfc155d1a1466c8aac9b661fe902b8_arm64",
"9Base-CNV-4.13:container-native-virtualization/cnv-containernetworking-plugins-rhel9@sha256:89f22e541f61a660c9aa9f38ef58e80b84a0517f74e84292107fc252c25465c9_arm64",
"9Base-CNV-4.13:container-native-virtualization/cnv-containernetworking-plugins-rhel9@sha256:bf471997e54e4a75b0d71f492ab295787fdbb14d8c85c4ea8c03f0552dbc3755_amd64",
"9Base-CNV-4.13:container-native-virtualization/cnv-must-gather-rhel9@sha256:9e8efd76924958eb605401abdac08eba97fb83a1ada383bc87a7fb7c87b3a455_arm64",
"9Base-CNV-4.13:container-native-virtualization/cnv-must-gather-rhel9@sha256:b9fc32b5fabedd65a4c3a471879c808af2087277de4278adaa115a732f0468da_amd64",
"9Base-CNV-4.13:container-native-virtualization/hco-bundle-registry-rhel9@sha256:60e89d7a99ff9f20e974430b802dd724a3bb6fa1e01e5a62daad98ac487b3063_amd64",
"9Base-CNV-4.13:container-native-virtualization/hco-bundle-registry-rhel9@sha256:dd20b138045ef1424d83a47e7abcfcbb2ac54577dcec5ed3c186390aaa4c9d84_arm64",
"9Base-CNV-4.13:container-native-virtualization/hostpath-csi-driver-rhel9@sha256:61e2824853d51347593ad909a5e546cd92e4216d6a1df5dffb50dd9cba277cce_amd64",
"9Base-CNV-4.13:container-native-virtualization/hostpath-csi-driver-rhel9@sha256:676d4c23a5f60dd331728af056b0a6b2d3358ac88da23299b1a98dfaca8f288e_arm64",
"9Base-CNV-4.13:container-native-virtualization/hostpath-provisioner-operator-rhel9@sha256:515be94be496c67f5b8fd5f4832fe4385e56476e6589897d6b9fbb9bb2b00f32_amd64",
"9Base-CNV-4.13:container-native-virtualization/hostpath-provisioner-operator-rhel9@sha256:571ae805641dea11646028c946039983c7fd82f138b915dcb8b80c39b465e63c_arm64",
"9Base-CNV-4.13:container-native-virtualization/hostpath-provisioner-rhel9@sha256:ac3fe350bedd6bc43596444ba0f279ccf8a144ab14ac5a9b80ea71c46390b7b4_amd64",
"9Base-CNV-4.13:container-native-virtualization/hostpath-provisioner-rhel9@sha256:d4ed87745b7ee2acca2d83e2c91c2f6dced1903c81495b50f2559b3ba2dde287_arm64",
"9Base-CNV-4.13:container-native-virtualization/hyperconverged-cluster-operator-rhel9@sha256:e5ab9f3be59d3568e3d672ab374efb16990ccf92192eac4e1244b10fcd7423e2_amd64",
"9Base-CNV-4.13:container-native-virtualization/hyperconverged-cluster-operator-rhel9@sha256:e681560b184189df03fc84c8a712f32289f42573dd348cda394b19565eb6eca8_arm64",
"9Base-CNV-4.13:container-native-virtualization/hyperconverged-cluster-webhook-rhel9@sha256:06d036d320b3027bb8370bb8e0f6fe8c9f0ec9bca7aac3b5c53698ba4a170042_arm64",
"9Base-CNV-4.13:container-native-virtualization/hyperconverged-cluster-webhook-rhel9@sha256:b5a01336180aad017df62cf8e652f2491b8263ba7e4dd07f858db1ef1924cf2f_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubemacpool-rhel9@sha256:4d190d81eeb3fbe9ed56cf3548dc83a3f81641bfdafa7b42dcfb0d2512566644_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubemacpool-rhel9@sha256:59862a59854f0d5b83dc25ba119f9586a8aff42b6e60d1922f8ae7b4567309ff_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubesecondarydns-rhel9@sha256:121d30d78cc57731ea2242ef2c32430890ac66c2723e65608d5e2f26c3f515cd_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubesecondarydns-rhel9@sha256:b1838f3c8ba3d8113bddea17b78c21e1c1490e2a4a07ea77014edee523d06347_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-console-plugin-rhel9@sha256:86a4b1e3d6ad1d56302c9c058f8bc5826dcfe6c46fb3e0ddaa06818645039020_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-console-plugin-rhel9@sha256:ffb2acd9ae09c1ef9ca756f5eaf6087d0a3957cfc824543949d25f556a97744d_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-dpdk-checkup-rhel9@sha256:525aceb9396010ebcdba14040f267889b807cd84db8e5b4030429b51f0fbf5fe_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-dpdk-checkup-rhel9@sha256:553c4686f56c66cc1e3c5ad9d4051f139d43f821eac3abb98ca5cdb8b5dfe202_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-ssp-operator-rhel9@sha256:901e6cad9534c7bd7c4018c60bccfe49d7280fba5a9901ab4c4d15e9345288c4_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-ssp-operator-rhel9@sha256:badeb0f65f543b209f6af761729d9778b7b73b97d55044016dfba3f38a1f6f18_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-cleanup-vm-rhel9@sha256:28e4975fa4dac22d9da32ed2a10aed039fd957b30140daa36bab2caa998be77a_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-cleanup-vm-rhel9@sha256:b0ff7e812a576ea848590655fc13a85832d5a39f68e7769ceab9da6949da88c7_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-copy-template-rhel9@sha256:4916a6c6b1f9b529187d3b4d5fc99b90157993767b3fe2ad36a9ec77fbb46b10_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-copy-template-rhel9@sha256:f71c36442f1b61cdde7ec58d2c3c78d2039f6d6108e6c35388ef7c1650971fa1_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-create-datavolume-rhel9@sha256:2ad49cf6e2242a9e5861929d9bcab1305a7fc4e34e708f99cff1d7253aa46167_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-create-datavolume-rhel9@sha256:7112400a4ecb23ee2110bf96372fcf9f96ad648a51aa944627b40eb59539a660_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-create-vm-from-template-rhel9@sha256:1411c65bbad7302710788327f6964a4bf5bc20ef70d5e46f4a5c6e7a0e7a0161_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-create-vm-from-template-rhel9@sha256:4d962618aa95600c60c9fc8b890186e510de91177d51949e12797a3558e31328_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-customize-rhel9@sha256:5c23d3f20ea9dcbe7109284d73078ecd516a070e964b844f8d80b1d92ebd55ee_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-customize-rhel9@sha256:a780244e48c6d4f87446d3754c3eb9ab79c0d54675c189da4a659f7a4d5668ea_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-sysprep-rhel9@sha256:84577d949a1bbcaa291c70729127bca4a8994df03068666baa23840877ea8392_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-sysprep-rhel9@sha256:aed630a597a090179e1b0e0c117e536df06b67d0f793f91936aa7388c0c5d7eb_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-modify-vm-template-rhel9@sha256:31d959b80cf57462e1705684bb7e1b78af26bd2c62f1c9e4e51e1d02199b05a8_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-modify-vm-template-rhel9@sha256:66aea526bc10e4c0136ba86e394bbdfe4fbd7f757d6f391a561b51d2ba2f4d46_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-operator-rhel9@sha256:d0cf0e81589f0938de45961eaddfc5ec4782738fd11082de0439b200534259eb_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-operator-rhel9@sha256:f1b1f5044db6bb945584f9d4f31d020597725a286ef368ed0aca2116abb31beb_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-wait-for-vmi-status-rhel9@sha256:39a15d03f113735df03b1a7408227eb9604d942c1f3c1992bcdc7eaf07662711_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-wait-for-vmi-status-rhel9@sha256:afb68af076954fcd18c7a4a1464ea0c2a766e8282eae980051906ed07eaa1707_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-template-validator-rhel9@sha256:02b22c7e7014b5e72d47fed8b6a268cf307638c5510adf3916c51f7f40a52a08_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-template-validator-rhel9@sha256:c0264b9271e602f85b2040ef7f207cdfa46038dc4fa6e4738bf196ef88a71cf8_amd64",
"9Base-CNV-4.13:container-native-virtualization/libguestfs-tools-rhel9@sha256:29ae84575bbca24553cf649256759fd96ff286971d80bc2db129154a7df9b283_amd64",
"9Base-CNV-4.13:container-native-virtualization/libguestfs-tools-rhel9@sha256:6558f60343e068b032167e2340b2c549c5f0258acc5d2614b60966ce79408b01_arm64",
"9Base-CNV-4.13:container-native-virtualization/multus-dynamic-networks-rhel9@sha256:3ecb0162a4b01d1590bf209d717b32a4f0835910d9979823f18c24acba41b503_arm64",
"9Base-CNV-4.13:container-native-virtualization/multus-dynamic-networks-rhel9@sha256:b7f68b6420009e21380d32d6459193aae45e93be9533debe17cb3108571b36b8_amd64",
"9Base-CNV-4.13:container-native-virtualization/ovs-cni-plugin-rhel9@sha256:0f1d372f418744e0aff59ecb0a38f53178aac9c2e9eecfd38aa25ed83e0d1360_arm64",
"9Base-CNV-4.13:container-native-virtualization/ovs-cni-plugin-rhel9@sha256:e8e7a44edbf1713fe74de5c4b8f691cce78f4440c4a32a16ba9ad16694a55396_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-api-rhel9@sha256:e68416321ca8c74a547b3d35897f54813c03481143e402e9bdc4daf315e35b5d_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-api-rhel9@sha256:fdb4ca1bb8b310d713d9c7e88f7d091f4460aa942dbeca5ebcf17281a06daffe_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-artifacts-server-rhel9@sha256:33d11c1832b49df39c1fca62bad40dbc5c30a452248339aaef449ac99509accb_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-artifacts-server-rhel9@sha256:81fc61b714baecb5a89fa6c0749c14566e0661b8e184ca602fc2e03b9cf431ee_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-apiserver-rhel9@sha256:f6128a63344ed2129f5bce648ddcfaa2869d31cde4b93328d3c22534b97ade10_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-apiserver-rhel9@sha256:feca273a691d09445c6cff6d36b5d590735e867656a9898ce0d89744d98e8006_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-cloner-rhel9@sha256:68e3b9b0291b4fb277ac430269ffce11d13b0a7688cf2ffcdb7f98759c36b4db_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-cloner-rhel9@sha256:6ac212767481bef64d8a7d0252bb8089c0f9751fad4a355aef71bd49dad2ad07_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-controller-rhel9@sha256:65f5263275d9f0a12b8fb057d82adf678778039ec873ca9bde182dea3413c9f1_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-controller-rhel9@sha256:d9e62b2019328be258489ac852eef25f8b1233f29abac6bcea5b406329f97fed_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-importer-rhel9@sha256:00a6d9d24ca1466d450b02269ec3144fc7550f0e5c696e869fbf7ce10cae6093_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-importer-rhel9@sha256:2df07fb21a3575e74aa16ded20129828f2300cd33e8ab369b0362062d49e62d0_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-operator-rhel9@sha256:20ec064750faedd97d11b797c8c1d9a1db5d60d7d76e82e65cfd05eb79d65e29_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-operator-rhel9@sha256:802ee8923d9d8e406b23911406f9748756c0ef4d6954e9e2fd5fb4bdf91dde9a_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-uploadproxy-rhel9@sha256:392d0f61f462c707adfdc21e4239c5c09d8520a80486b41d9d9ae479267d6124_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-uploadproxy-rhel9@sha256:6775f34353eec8f35bead9411dde155530d079bb8d51582fb1f2aacc27dbde1d_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-uploadserver-rhel9@sha256:4528c24672689cfb6505761b6b108fbcc04488192733f23d2bfe39cd42a1d743_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-uploadserver-rhel9@sha256:b22048390387380af94e267c8a9a66813c515997456d59d8ebac1486916b6585_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-controller-rhel9@sha256:3e7880149ee9a68286e390beb3d9779f7403c30fc5136e5370e0e4690a3fd243_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-controller-rhel9@sha256:970edc281d7a731e9f7e8c2d4440fe48a221e5e355d5235c5413b4c3adb28503_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-exportproxy-rhel9@sha256:1bda34d5bff734ad997202f29a5ff6f7362fd79fa90511a422442ef2e3681198_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-exportproxy-rhel9@sha256:de3c4afbf7669b98517cbef2490ec186f0553dd97b05bed80ec36dd883fe507b_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-exportserver-rhel9@sha256:3f7f98645176d42c63cca5c0fc3182a03121af87446ca421b6c72baf07dfca0d_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-exportserver-rhel9@sha256:8f12955cd777eb2409037a6968aa92f50c99d6e07e722951dbcfd0c8c9829b5e_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-handler-rhel9@sha256:5fc47110d866d8048aec50689090ce10705d19d3bb48d2b06727d6d569003af7_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-handler-rhel9@sha256:84ba79ae9658699147d2493df2582ab6df10adbff4d44a533c3fe6a9f45f9691_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-launcher-rhel9@sha256:4990d40d9987d5126d105dd45be2501eaded248cb61bdde5ea8d359bc1e7ebef_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-launcher-rhel9@sha256:95aeacb98209e0baef27ce0e02fbac38d693cea74808fc77107efda0f344bcb5_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-operator-rhel9@sha256:5c1a7e4ed2061938987b900a2394f07121d4037350c9bb6485213a2adfea787d_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-operator-rhel9@sha256:66b1b3b379121d6411ba22283e7d991617177330c93746d37753ab7812b9a00b_arm64",
"9Base-CNV-4.13:container-native-virtualization/virtio-win-rhel9@sha256:8735f51da918408a8826601c082d1b29accf26d59b9978da89b980cb509c1102_arm64",
"9Base-CNV-4.13:container-native-virtualization/virtio-win-rhel9@sha256:d147d2a6eb6f907d1e88f61aaca83596853bc72164583d6dda2b1154b490de25_amd64",
"9Base-CNV-4.13:container-native-virtualization/vm-console-proxy-rhel9@sha256:70a8d0cd66182c25e02679540bae1368b2a9cf687532b58dba41ef30c5ca00c1_arm64",
"9Base-CNV-4.13:container-native-virtualization/vm-console-proxy-rhel9@sha256:7ca921f98f6d81a126907127a611146fb53397869a628678faa1e289c01d22b2_amd64",
"9Base-CNV-4.13:container-native-virtualization/vm-network-latency-checkup-rhel9@sha256:503ea7ac914a9b54e9d665a0227ee0b5d5200cdb5d692aa94c07dd1518d91b70_arm64",
"9Base-CNV-4.13:container-native-virtualization/vm-network-latency-checkup-rhel9@sha256:59fd965975bccf641a0fa7aa01374d45057bd03cda7528248a84b60b1205bf57_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:3205"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"9Base-CNV-4.13:container-native-virtualization/bridge-marker-rhel9@sha256:8eac196b30a648989cdca5cb153a3bc3d34e47339acba0e4f760bd366496c99d_amd64",
"9Base-CNV-4.13:container-native-virtualization/bridge-marker-rhel9@sha256:e8a55aee3d75a316bb0d7a554c737198823df04b3c05e481c17e45eb2153bced_arm64",
"9Base-CNV-4.13:container-native-virtualization/cluster-network-addons-operator-rhel9@sha256:3bff33e3f40cd1e2b519c2db56734d4bb8df883e155c2f20b1cb9d3d184daec1_amd64",
"9Base-CNV-4.13:container-native-virtualization/cluster-network-addons-operator-rhel9@sha256:f439d2f420bb59eb1d5af14ce2002648d0cfc155d1a1466c8aac9b661fe902b8_arm64",
"9Base-CNV-4.13:container-native-virtualization/cnv-containernetworking-plugins-rhel9@sha256:89f22e541f61a660c9aa9f38ef58e80b84a0517f74e84292107fc252c25465c9_arm64",
"9Base-CNV-4.13:container-native-virtualization/cnv-containernetworking-plugins-rhel9@sha256:bf471997e54e4a75b0d71f492ab295787fdbb14d8c85c4ea8c03f0552dbc3755_amd64",
"9Base-CNV-4.13:container-native-virtualization/cnv-must-gather-rhel9@sha256:9e8efd76924958eb605401abdac08eba97fb83a1ada383bc87a7fb7c87b3a455_arm64",
"9Base-CNV-4.13:container-native-virtualization/cnv-must-gather-rhel9@sha256:b9fc32b5fabedd65a4c3a471879c808af2087277de4278adaa115a732f0468da_amd64",
"9Base-CNV-4.13:container-native-virtualization/hco-bundle-registry-rhel9@sha256:60e89d7a99ff9f20e974430b802dd724a3bb6fa1e01e5a62daad98ac487b3063_amd64",
"9Base-CNV-4.13:container-native-virtualization/hco-bundle-registry-rhel9@sha256:dd20b138045ef1424d83a47e7abcfcbb2ac54577dcec5ed3c186390aaa4c9d84_arm64",
"9Base-CNV-4.13:container-native-virtualization/hostpath-csi-driver-rhel9@sha256:61e2824853d51347593ad909a5e546cd92e4216d6a1df5dffb50dd9cba277cce_amd64",
"9Base-CNV-4.13:container-native-virtualization/hostpath-csi-driver-rhel9@sha256:676d4c23a5f60dd331728af056b0a6b2d3358ac88da23299b1a98dfaca8f288e_arm64",
"9Base-CNV-4.13:container-native-virtualization/hostpath-provisioner-operator-rhel9@sha256:515be94be496c67f5b8fd5f4832fe4385e56476e6589897d6b9fbb9bb2b00f32_amd64",
"9Base-CNV-4.13:container-native-virtualization/hostpath-provisioner-operator-rhel9@sha256:571ae805641dea11646028c946039983c7fd82f138b915dcb8b80c39b465e63c_arm64",
"9Base-CNV-4.13:container-native-virtualization/hostpath-provisioner-rhel9@sha256:ac3fe350bedd6bc43596444ba0f279ccf8a144ab14ac5a9b80ea71c46390b7b4_amd64",
"9Base-CNV-4.13:container-native-virtualization/hostpath-provisioner-rhel9@sha256:d4ed87745b7ee2acca2d83e2c91c2f6dced1903c81495b50f2559b3ba2dde287_arm64",
"9Base-CNV-4.13:container-native-virtualization/hyperconverged-cluster-operator-rhel9@sha256:e5ab9f3be59d3568e3d672ab374efb16990ccf92192eac4e1244b10fcd7423e2_amd64",
"9Base-CNV-4.13:container-native-virtualization/hyperconverged-cluster-operator-rhel9@sha256:e681560b184189df03fc84c8a712f32289f42573dd348cda394b19565eb6eca8_arm64",
"9Base-CNV-4.13:container-native-virtualization/hyperconverged-cluster-webhook-rhel9@sha256:06d036d320b3027bb8370bb8e0f6fe8c9f0ec9bca7aac3b5c53698ba4a170042_arm64",
"9Base-CNV-4.13:container-native-virtualization/hyperconverged-cluster-webhook-rhel9@sha256:b5a01336180aad017df62cf8e652f2491b8263ba7e4dd07f858db1ef1924cf2f_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubemacpool-rhel9@sha256:4d190d81eeb3fbe9ed56cf3548dc83a3f81641bfdafa7b42dcfb0d2512566644_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubemacpool-rhel9@sha256:59862a59854f0d5b83dc25ba119f9586a8aff42b6e60d1922f8ae7b4567309ff_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubesecondarydns-rhel9@sha256:121d30d78cc57731ea2242ef2c32430890ac66c2723e65608d5e2f26c3f515cd_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubesecondarydns-rhel9@sha256:b1838f3c8ba3d8113bddea17b78c21e1c1490e2a4a07ea77014edee523d06347_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-console-plugin-rhel9@sha256:86a4b1e3d6ad1d56302c9c058f8bc5826dcfe6c46fb3e0ddaa06818645039020_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-console-plugin-rhel9@sha256:ffb2acd9ae09c1ef9ca756f5eaf6087d0a3957cfc824543949d25f556a97744d_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-dpdk-checkup-rhel9@sha256:525aceb9396010ebcdba14040f267889b807cd84db8e5b4030429b51f0fbf5fe_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-dpdk-checkup-rhel9@sha256:553c4686f56c66cc1e3c5ad9d4051f139d43f821eac3abb98ca5cdb8b5dfe202_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-ssp-operator-rhel9@sha256:901e6cad9534c7bd7c4018c60bccfe49d7280fba5a9901ab4c4d15e9345288c4_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-ssp-operator-rhel9@sha256:badeb0f65f543b209f6af761729d9778b7b73b97d55044016dfba3f38a1f6f18_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-cleanup-vm-rhel9@sha256:28e4975fa4dac22d9da32ed2a10aed039fd957b30140daa36bab2caa998be77a_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-cleanup-vm-rhel9@sha256:b0ff7e812a576ea848590655fc13a85832d5a39f68e7769ceab9da6949da88c7_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-copy-template-rhel9@sha256:4916a6c6b1f9b529187d3b4d5fc99b90157993767b3fe2ad36a9ec77fbb46b10_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-copy-template-rhel9@sha256:f71c36442f1b61cdde7ec58d2c3c78d2039f6d6108e6c35388ef7c1650971fa1_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-create-datavolume-rhel9@sha256:2ad49cf6e2242a9e5861929d9bcab1305a7fc4e34e708f99cff1d7253aa46167_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-create-datavolume-rhel9@sha256:7112400a4ecb23ee2110bf96372fcf9f96ad648a51aa944627b40eb59539a660_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-create-vm-from-template-rhel9@sha256:1411c65bbad7302710788327f6964a4bf5bc20ef70d5e46f4a5c6e7a0e7a0161_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-create-vm-from-template-rhel9@sha256:4d962618aa95600c60c9fc8b890186e510de91177d51949e12797a3558e31328_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-customize-rhel9@sha256:5c23d3f20ea9dcbe7109284d73078ecd516a070e964b844f8d80b1d92ebd55ee_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-customize-rhel9@sha256:a780244e48c6d4f87446d3754c3eb9ab79c0d54675c189da4a659f7a4d5668ea_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-sysprep-rhel9@sha256:84577d949a1bbcaa291c70729127bca4a8994df03068666baa23840877ea8392_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-sysprep-rhel9@sha256:aed630a597a090179e1b0e0c117e536df06b67d0f793f91936aa7388c0c5d7eb_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-modify-vm-template-rhel9@sha256:31d959b80cf57462e1705684bb7e1b78af26bd2c62f1c9e4e51e1d02199b05a8_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-modify-vm-template-rhel9@sha256:66aea526bc10e4c0136ba86e394bbdfe4fbd7f757d6f391a561b51d2ba2f4d46_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-operator-rhel9@sha256:d0cf0e81589f0938de45961eaddfc5ec4782738fd11082de0439b200534259eb_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-operator-rhel9@sha256:f1b1f5044db6bb945584f9d4f31d020597725a286ef368ed0aca2116abb31beb_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-wait-for-vmi-status-rhel9@sha256:39a15d03f113735df03b1a7408227eb9604d942c1f3c1992bcdc7eaf07662711_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-wait-for-vmi-status-rhel9@sha256:afb68af076954fcd18c7a4a1464ea0c2a766e8282eae980051906ed07eaa1707_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-template-validator-rhel9@sha256:02b22c7e7014b5e72d47fed8b6a268cf307638c5510adf3916c51f7f40a52a08_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-template-validator-rhel9@sha256:c0264b9271e602f85b2040ef7f207cdfa46038dc4fa6e4738bf196ef88a71cf8_amd64",
"9Base-CNV-4.13:container-native-virtualization/libguestfs-tools-rhel9@sha256:29ae84575bbca24553cf649256759fd96ff286971d80bc2db129154a7df9b283_amd64",
"9Base-CNV-4.13:container-native-virtualization/libguestfs-tools-rhel9@sha256:6558f60343e068b032167e2340b2c549c5f0258acc5d2614b60966ce79408b01_arm64",
"9Base-CNV-4.13:container-native-virtualization/multus-dynamic-networks-rhel9@sha256:3ecb0162a4b01d1590bf209d717b32a4f0835910d9979823f18c24acba41b503_arm64",
"9Base-CNV-4.13:container-native-virtualization/multus-dynamic-networks-rhel9@sha256:b7f68b6420009e21380d32d6459193aae45e93be9533debe17cb3108571b36b8_amd64",
"9Base-CNV-4.13:container-native-virtualization/ovs-cni-plugin-rhel9@sha256:0f1d372f418744e0aff59ecb0a38f53178aac9c2e9eecfd38aa25ed83e0d1360_arm64",
"9Base-CNV-4.13:container-native-virtualization/ovs-cni-plugin-rhel9@sha256:e8e7a44edbf1713fe74de5c4b8f691cce78f4440c4a32a16ba9ad16694a55396_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-api-rhel9@sha256:e68416321ca8c74a547b3d35897f54813c03481143e402e9bdc4daf315e35b5d_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-api-rhel9@sha256:fdb4ca1bb8b310d713d9c7e88f7d091f4460aa942dbeca5ebcf17281a06daffe_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-artifacts-server-rhel9@sha256:33d11c1832b49df39c1fca62bad40dbc5c30a452248339aaef449ac99509accb_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-artifacts-server-rhel9@sha256:81fc61b714baecb5a89fa6c0749c14566e0661b8e184ca602fc2e03b9cf431ee_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-apiserver-rhel9@sha256:f6128a63344ed2129f5bce648ddcfaa2869d31cde4b93328d3c22534b97ade10_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-apiserver-rhel9@sha256:feca273a691d09445c6cff6d36b5d590735e867656a9898ce0d89744d98e8006_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-cloner-rhel9@sha256:68e3b9b0291b4fb277ac430269ffce11d13b0a7688cf2ffcdb7f98759c36b4db_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-cloner-rhel9@sha256:6ac212767481bef64d8a7d0252bb8089c0f9751fad4a355aef71bd49dad2ad07_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-controller-rhel9@sha256:65f5263275d9f0a12b8fb057d82adf678778039ec873ca9bde182dea3413c9f1_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-controller-rhel9@sha256:d9e62b2019328be258489ac852eef25f8b1233f29abac6bcea5b406329f97fed_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-importer-rhel9@sha256:00a6d9d24ca1466d450b02269ec3144fc7550f0e5c696e869fbf7ce10cae6093_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-importer-rhel9@sha256:2df07fb21a3575e74aa16ded20129828f2300cd33e8ab369b0362062d49e62d0_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-operator-rhel9@sha256:20ec064750faedd97d11b797c8c1d9a1db5d60d7d76e82e65cfd05eb79d65e29_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-operator-rhel9@sha256:802ee8923d9d8e406b23911406f9748756c0ef4d6954e9e2fd5fb4bdf91dde9a_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-uploadproxy-rhel9@sha256:392d0f61f462c707adfdc21e4239c5c09d8520a80486b41d9d9ae479267d6124_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-uploadproxy-rhel9@sha256:6775f34353eec8f35bead9411dde155530d079bb8d51582fb1f2aacc27dbde1d_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-uploadserver-rhel9@sha256:4528c24672689cfb6505761b6b108fbcc04488192733f23d2bfe39cd42a1d743_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-uploadserver-rhel9@sha256:b22048390387380af94e267c8a9a66813c515997456d59d8ebac1486916b6585_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-controller-rhel9@sha256:3e7880149ee9a68286e390beb3d9779f7403c30fc5136e5370e0e4690a3fd243_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-controller-rhel9@sha256:970edc281d7a731e9f7e8c2d4440fe48a221e5e355d5235c5413b4c3adb28503_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-exportproxy-rhel9@sha256:1bda34d5bff734ad997202f29a5ff6f7362fd79fa90511a422442ef2e3681198_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-exportproxy-rhel9@sha256:de3c4afbf7669b98517cbef2490ec186f0553dd97b05bed80ec36dd883fe507b_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-exportserver-rhel9@sha256:3f7f98645176d42c63cca5c0fc3182a03121af87446ca421b6c72baf07dfca0d_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-exportserver-rhel9@sha256:8f12955cd777eb2409037a6968aa92f50c99d6e07e722951dbcfd0c8c9829b5e_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-handler-rhel9@sha256:5fc47110d866d8048aec50689090ce10705d19d3bb48d2b06727d6d569003af7_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-handler-rhel9@sha256:84ba79ae9658699147d2493df2582ab6df10adbff4d44a533c3fe6a9f45f9691_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-launcher-rhel9@sha256:4990d40d9987d5126d105dd45be2501eaded248cb61bdde5ea8d359bc1e7ebef_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-launcher-rhel9@sha256:95aeacb98209e0baef27ce0e02fbac38d693cea74808fc77107efda0f344bcb5_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-operator-rhel9@sha256:5c1a7e4ed2061938987b900a2394f07121d4037350c9bb6485213a2adfea787d_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-operator-rhel9@sha256:66b1b3b379121d6411ba22283e7d991617177330c93746d37753ab7812b9a00b_arm64",
"9Base-CNV-4.13:container-native-virtualization/virtio-win-rhel9@sha256:8735f51da918408a8826601c082d1b29accf26d59b9978da89b980cb509c1102_arm64",
"9Base-CNV-4.13:container-native-virtualization/virtio-win-rhel9@sha256:d147d2a6eb6f907d1e88f61aaca83596853bc72164583d6dda2b1154b490de25_amd64",
"9Base-CNV-4.13:container-native-virtualization/vm-console-proxy-rhel9@sha256:70a8d0cd66182c25e02679540bae1368b2a9cf687532b58dba41ef30c5ca00c1_arm64",
"9Base-CNV-4.13:container-native-virtualization/vm-console-proxy-rhel9@sha256:7ca921f98f6d81a126907127a611146fb53397869a628678faa1e289c01d22b2_amd64",
"9Base-CNV-4.13:container-native-virtualization/vm-network-latency-checkup-rhel9@sha256:503ea7ac914a9b54e9d665a0227ee0b5d5200cdb5d692aa94c07dd1518d91b70_arm64",
"9Base-CNV-4.13:container-native-virtualization/vm-network-latency-checkup-rhel9@sha256:59fd965975bccf641a0fa7aa01374d45057bd03cda7528248a84b60b1205bf57_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "golang: net/http/httputil: ReverseProxy should not forward unparseable query parameters"
},
{
"cve": "CVE-2022-27664",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"discovery_date": "2022-09-06T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"9Base-CNV-4.13:container-native-virtualization/bridge-marker-rhel9@sha256:8eac196b30a648989cdca5cb153a3bc3d34e47339acba0e4f760bd366496c99d_amd64",
"9Base-CNV-4.13:container-native-virtualization/bridge-marker-rhel9@sha256:e8a55aee3d75a316bb0d7a554c737198823df04b3c05e481c17e45eb2153bced_arm64",
"9Base-CNV-4.13:container-native-virtualization/cluster-network-addons-operator-rhel9@sha256:3bff33e3f40cd1e2b519c2db56734d4bb8df883e155c2f20b1cb9d3d184daec1_amd64",
"9Base-CNV-4.13:container-native-virtualization/cluster-network-addons-operator-rhel9@sha256:f439d2f420bb59eb1d5af14ce2002648d0cfc155d1a1466c8aac9b661fe902b8_arm64",
"9Base-CNV-4.13:container-native-virtualization/cnv-containernetworking-plugins-rhel9@sha256:89f22e541f61a660c9aa9f38ef58e80b84a0517f74e84292107fc252c25465c9_arm64",
"9Base-CNV-4.13:container-native-virtualization/cnv-containernetworking-plugins-rhel9@sha256:bf471997e54e4a75b0d71f492ab295787fdbb14d8c85c4ea8c03f0552dbc3755_amd64",
"9Base-CNV-4.13:container-native-virtualization/cnv-must-gather-rhel9@sha256:9e8efd76924958eb605401abdac08eba97fb83a1ada383bc87a7fb7c87b3a455_arm64",
"9Base-CNV-4.13:container-native-virtualization/cnv-must-gather-rhel9@sha256:b9fc32b5fabedd65a4c3a471879c808af2087277de4278adaa115a732f0468da_amd64",
"9Base-CNV-4.13:container-native-virtualization/hco-bundle-registry-rhel9@sha256:60e89d7a99ff9f20e974430b802dd724a3bb6fa1e01e5a62daad98ac487b3063_amd64",
"9Base-CNV-4.13:container-native-virtualization/hco-bundle-registry-rhel9@sha256:dd20b138045ef1424d83a47e7abcfcbb2ac54577dcec5ed3c186390aaa4c9d84_arm64",
"9Base-CNV-4.13:container-native-virtualization/hostpath-csi-driver-rhel9@sha256:61e2824853d51347593ad909a5e546cd92e4216d6a1df5dffb50dd9cba277cce_amd64",
"9Base-CNV-4.13:container-native-virtualization/hostpath-csi-driver-rhel9@sha256:676d4c23a5f60dd331728af056b0a6b2d3358ac88da23299b1a98dfaca8f288e_arm64",
"9Base-CNV-4.13:container-native-virtualization/hostpath-provisioner-operator-rhel9@sha256:515be94be496c67f5b8fd5f4832fe4385e56476e6589897d6b9fbb9bb2b00f32_amd64",
"9Base-CNV-4.13:container-native-virtualization/hostpath-provisioner-operator-rhel9@sha256:571ae805641dea11646028c946039983c7fd82f138b915dcb8b80c39b465e63c_arm64",
"9Base-CNV-4.13:container-native-virtualization/hostpath-provisioner-rhel9@sha256:ac3fe350bedd6bc43596444ba0f279ccf8a144ab14ac5a9b80ea71c46390b7b4_amd64",
"9Base-CNV-4.13:container-native-virtualization/hostpath-provisioner-rhel9@sha256:d4ed87745b7ee2acca2d83e2c91c2f6dced1903c81495b50f2559b3ba2dde287_arm64",
"9Base-CNV-4.13:container-native-virtualization/hyperconverged-cluster-operator-rhel9@sha256:e5ab9f3be59d3568e3d672ab374efb16990ccf92192eac4e1244b10fcd7423e2_amd64",
"9Base-CNV-4.13:container-native-virtualization/hyperconverged-cluster-operator-rhel9@sha256:e681560b184189df03fc84c8a712f32289f42573dd348cda394b19565eb6eca8_arm64",
"9Base-CNV-4.13:container-native-virtualization/hyperconverged-cluster-webhook-rhel9@sha256:06d036d320b3027bb8370bb8e0f6fe8c9f0ec9bca7aac3b5c53698ba4a170042_arm64",
"9Base-CNV-4.13:container-native-virtualization/hyperconverged-cluster-webhook-rhel9@sha256:b5a01336180aad017df62cf8e652f2491b8263ba7e4dd07f858db1ef1924cf2f_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubemacpool-rhel9@sha256:4d190d81eeb3fbe9ed56cf3548dc83a3f81641bfdafa7b42dcfb0d2512566644_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubemacpool-rhel9@sha256:59862a59854f0d5b83dc25ba119f9586a8aff42b6e60d1922f8ae7b4567309ff_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubesecondarydns-rhel9@sha256:121d30d78cc57731ea2242ef2c32430890ac66c2723e65608d5e2f26c3f515cd_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubesecondarydns-rhel9@sha256:b1838f3c8ba3d8113bddea17b78c21e1c1490e2a4a07ea77014edee523d06347_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-console-plugin-rhel9@sha256:86a4b1e3d6ad1d56302c9c058f8bc5826dcfe6c46fb3e0ddaa06818645039020_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-console-plugin-rhel9@sha256:ffb2acd9ae09c1ef9ca756f5eaf6087d0a3957cfc824543949d25f556a97744d_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-dpdk-checkup-rhel9@sha256:525aceb9396010ebcdba14040f267889b807cd84db8e5b4030429b51f0fbf5fe_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-dpdk-checkup-rhel9@sha256:553c4686f56c66cc1e3c5ad9d4051f139d43f821eac3abb98ca5cdb8b5dfe202_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-ssp-operator-rhel9@sha256:901e6cad9534c7bd7c4018c60bccfe49d7280fba5a9901ab4c4d15e9345288c4_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-ssp-operator-rhel9@sha256:badeb0f65f543b209f6af761729d9778b7b73b97d55044016dfba3f38a1f6f18_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-cleanup-vm-rhel9@sha256:28e4975fa4dac22d9da32ed2a10aed039fd957b30140daa36bab2caa998be77a_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-cleanup-vm-rhel9@sha256:b0ff7e812a576ea848590655fc13a85832d5a39f68e7769ceab9da6949da88c7_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-copy-template-rhel9@sha256:4916a6c6b1f9b529187d3b4d5fc99b90157993767b3fe2ad36a9ec77fbb46b10_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-copy-template-rhel9@sha256:f71c36442f1b61cdde7ec58d2c3c78d2039f6d6108e6c35388ef7c1650971fa1_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-create-datavolume-rhel9@sha256:2ad49cf6e2242a9e5861929d9bcab1305a7fc4e34e708f99cff1d7253aa46167_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-create-datavolume-rhel9@sha256:7112400a4ecb23ee2110bf96372fcf9f96ad648a51aa944627b40eb59539a660_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-create-vm-from-template-rhel9@sha256:1411c65bbad7302710788327f6964a4bf5bc20ef70d5e46f4a5c6e7a0e7a0161_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-create-vm-from-template-rhel9@sha256:4d962618aa95600c60c9fc8b890186e510de91177d51949e12797a3558e31328_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-customize-rhel9@sha256:5c23d3f20ea9dcbe7109284d73078ecd516a070e964b844f8d80b1d92ebd55ee_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-customize-rhel9@sha256:a780244e48c6d4f87446d3754c3eb9ab79c0d54675c189da4a659f7a4d5668ea_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-sysprep-rhel9@sha256:84577d949a1bbcaa291c70729127bca4a8994df03068666baa23840877ea8392_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-sysprep-rhel9@sha256:aed630a597a090179e1b0e0c117e536df06b67d0f793f91936aa7388c0c5d7eb_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-modify-vm-template-rhel9@sha256:31d959b80cf57462e1705684bb7e1b78af26bd2c62f1c9e4e51e1d02199b05a8_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-modify-vm-template-rhel9@sha256:66aea526bc10e4c0136ba86e394bbdfe4fbd7f757d6f391a561b51d2ba2f4d46_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-operator-rhel9@sha256:d0cf0e81589f0938de45961eaddfc5ec4782738fd11082de0439b200534259eb_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-operator-rhel9@sha256:f1b1f5044db6bb945584f9d4f31d020597725a286ef368ed0aca2116abb31beb_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-wait-for-vmi-status-rhel9@sha256:39a15d03f113735df03b1a7408227eb9604d942c1f3c1992bcdc7eaf07662711_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-wait-for-vmi-status-rhel9@sha256:afb68af076954fcd18c7a4a1464ea0c2a766e8282eae980051906ed07eaa1707_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-template-validator-rhel9@sha256:02b22c7e7014b5e72d47fed8b6a268cf307638c5510adf3916c51f7f40a52a08_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-template-validator-rhel9@sha256:c0264b9271e602f85b2040ef7f207cdfa46038dc4fa6e4738bf196ef88a71cf8_amd64",
"9Base-CNV-4.13:container-native-virtualization/libguestfs-tools-rhel9@sha256:29ae84575bbca24553cf649256759fd96ff286971d80bc2db129154a7df9b283_amd64",
"9Base-CNV-4.13:container-native-virtualization/libguestfs-tools-rhel9@sha256:6558f60343e068b032167e2340b2c549c5f0258acc5d2614b60966ce79408b01_arm64",
"9Base-CNV-4.13:container-native-virtualization/multus-dynamic-networks-rhel9@sha256:3ecb0162a4b01d1590bf209d717b32a4f0835910d9979823f18c24acba41b503_arm64",
"9Base-CNV-4.13:container-native-virtualization/multus-dynamic-networks-rhel9@sha256:b7f68b6420009e21380d32d6459193aae45e93be9533debe17cb3108571b36b8_amd64",
"9Base-CNV-4.13:container-native-virtualization/ovs-cni-plugin-rhel9@sha256:0f1d372f418744e0aff59ecb0a38f53178aac9c2e9eecfd38aa25ed83e0d1360_arm64",
"9Base-CNV-4.13:container-native-virtualization/ovs-cni-plugin-rhel9@sha256:e8e7a44edbf1713fe74de5c4b8f691cce78f4440c4a32a16ba9ad16694a55396_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-artifacts-server-rhel9@sha256:33d11c1832b49df39c1fca62bad40dbc5c30a452248339aaef449ac99509accb_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-artifacts-server-rhel9@sha256:81fc61b714baecb5a89fa6c0749c14566e0661b8e184ca602fc2e03b9cf431ee_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-apiserver-rhel9@sha256:f6128a63344ed2129f5bce648ddcfaa2869d31cde4b93328d3c22534b97ade10_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-apiserver-rhel9@sha256:feca273a691d09445c6cff6d36b5d590735e867656a9898ce0d89744d98e8006_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-cloner-rhel9@sha256:68e3b9b0291b4fb277ac430269ffce11d13b0a7688cf2ffcdb7f98759c36b4db_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-cloner-rhel9@sha256:6ac212767481bef64d8a7d0252bb8089c0f9751fad4a355aef71bd49dad2ad07_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-controller-rhel9@sha256:65f5263275d9f0a12b8fb057d82adf678778039ec873ca9bde182dea3413c9f1_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-controller-rhel9@sha256:d9e62b2019328be258489ac852eef25f8b1233f29abac6bcea5b406329f97fed_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-importer-rhel9@sha256:00a6d9d24ca1466d450b02269ec3144fc7550f0e5c696e869fbf7ce10cae6093_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-importer-rhel9@sha256:2df07fb21a3575e74aa16ded20129828f2300cd33e8ab369b0362062d49e62d0_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-operator-rhel9@sha256:20ec064750faedd97d11b797c8c1d9a1db5d60d7d76e82e65cfd05eb79d65e29_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-operator-rhel9@sha256:802ee8923d9d8e406b23911406f9748756c0ef4d6954e9e2fd5fb4bdf91dde9a_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-uploadproxy-rhel9@sha256:392d0f61f462c707adfdc21e4239c5c09d8520a80486b41d9d9ae479267d6124_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-uploadproxy-rhel9@sha256:6775f34353eec8f35bead9411dde155530d079bb8d51582fb1f2aacc27dbde1d_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-uploadserver-rhel9@sha256:4528c24672689cfb6505761b6b108fbcc04488192733f23d2bfe39cd42a1d743_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-uploadserver-rhel9@sha256:b22048390387380af94e267c8a9a66813c515997456d59d8ebac1486916b6585_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-controller-rhel9@sha256:3e7880149ee9a68286e390beb3d9779f7403c30fc5136e5370e0e4690a3fd243_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-controller-rhel9@sha256:970edc281d7a731e9f7e8c2d4440fe48a221e5e355d5235c5413b4c3adb28503_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-exportproxy-rhel9@sha256:1bda34d5bff734ad997202f29a5ff6f7362fd79fa90511a422442ef2e3681198_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-exportproxy-rhel9@sha256:de3c4afbf7669b98517cbef2490ec186f0553dd97b05bed80ec36dd883fe507b_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-exportserver-rhel9@sha256:3f7f98645176d42c63cca5c0fc3182a03121af87446ca421b6c72baf07dfca0d_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-exportserver-rhel9@sha256:8f12955cd777eb2409037a6968aa92f50c99d6e07e722951dbcfd0c8c9829b5e_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-handler-rhel9@sha256:5fc47110d866d8048aec50689090ce10705d19d3bb48d2b06727d6d569003af7_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-handler-rhel9@sha256:84ba79ae9658699147d2493df2582ab6df10adbff4d44a533c3fe6a9f45f9691_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-launcher-rhel9@sha256:4990d40d9987d5126d105dd45be2501eaded248cb61bdde5ea8d359bc1e7ebef_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-launcher-rhel9@sha256:95aeacb98209e0baef27ce0e02fbac38d693cea74808fc77107efda0f344bcb5_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-operator-rhel9@sha256:5c1a7e4ed2061938987b900a2394f07121d4037350c9bb6485213a2adfea787d_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-operator-rhel9@sha256:66b1b3b379121d6411ba22283e7d991617177330c93746d37753ab7812b9a00b_arm64",
"9Base-CNV-4.13:container-native-virtualization/virtio-win-rhel9@sha256:8735f51da918408a8826601c082d1b29accf26d59b9978da89b980cb509c1102_arm64",
"9Base-CNV-4.13:container-native-virtualization/virtio-win-rhel9@sha256:d147d2a6eb6f907d1e88f61aaca83596853bc72164583d6dda2b1154b490de25_amd64",
"9Base-CNV-4.13:container-native-virtualization/vm-console-proxy-rhel9@sha256:70a8d0cd66182c25e02679540bae1368b2a9cf687532b58dba41ef30c5ca00c1_arm64",
"9Base-CNV-4.13:container-native-virtualization/vm-console-proxy-rhel9@sha256:7ca921f98f6d81a126907127a611146fb53397869a628678faa1e289c01d22b2_amd64",
"9Base-CNV-4.13:container-native-virtualization/vm-network-latency-checkup-rhel9@sha256:503ea7ac914a9b54e9d665a0227ee0b5d5200cdb5d692aa94c07dd1518d91b70_arm64",
"9Base-CNV-4.13:container-native-virtualization/vm-network-latency-checkup-rhel9@sha256:59fd965975bccf641a0fa7aa01374d45057bd03cda7528248a84b60b1205bf57_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2124669"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the golang package. In net/http in Go, attackers can cause a denial of service because an HTTP/2 connection can hang during closing if a fatal error preempts the shutdown.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: net/http: handle server errors after sending GOAWAY",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The opportunity for a Denial of Service is limited to the golang runtime. In the case of OpenShift Container Platform, this would be restricted within each individual container. There are multiple layers of guide rails (Golang\u2019s Garbage Collector; OpenShift\u2019s resource constraints imposed at the container and cluster levels) which would require a malicious user to continue submitting attacks for there to be any enduring impact. They would also need access to external server resources to be able to send a massive volume of requests to cause a significant impact on server operations.\n\nWithin regulated environments, a combination of the following controls acts as a significant barrier to successfully exploiting a CWE-400: Uncontrolled Resource Consumption vulnerability and therefore downgrades the severity of this particular CVE from Moderate to Low.\n\nRed Hat restricts access to all platform information by default, granting access only after successful hard token-based multi-factor authentication (MFA) and enforcing least privilege to ensure only authorized roles can execute or modify code. The environment employs malicious code protections, including IDS/IPS and antimalware tools to detect threats and monitor resource usage, helping prevent uncontrolled consumption that could lead to system failure. Additional safeguards, such as web application firewalls and load-balancing strategies, protect against resource exhaustion and performance degradation. Event logs are centrally collected, correlated, and analyzed to support monitoring, alerting, and retention, aiding in the detection of abnormal behavior and potential denial-of-service (DoS) conditions. Static code analysis and peer reviews enforce strong input validation and error handling, reducing the likelihood of input-based DoS attacks.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"9Base-CNV-4.13:container-native-virtualization/virt-api-rhel9@sha256:e68416321ca8c74a547b3d35897f54813c03481143e402e9bdc4daf315e35b5d_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-api-rhel9@sha256:fdb4ca1bb8b310d713d9c7e88f7d091f4460aa942dbeca5ebcf17281a06daffe_amd64"
],
"known_not_affected": [
"9Base-CNV-4.13:container-native-virtualization/bridge-marker-rhel9@sha256:8eac196b30a648989cdca5cb153a3bc3d34e47339acba0e4f760bd366496c99d_amd64",
"9Base-CNV-4.13:container-native-virtualization/bridge-marker-rhel9@sha256:e8a55aee3d75a316bb0d7a554c737198823df04b3c05e481c17e45eb2153bced_arm64",
"9Base-CNV-4.13:container-native-virtualization/cluster-network-addons-operator-rhel9@sha256:3bff33e3f40cd1e2b519c2db56734d4bb8df883e155c2f20b1cb9d3d184daec1_amd64",
"9Base-CNV-4.13:container-native-virtualization/cluster-network-addons-operator-rhel9@sha256:f439d2f420bb59eb1d5af14ce2002648d0cfc155d1a1466c8aac9b661fe902b8_arm64",
"9Base-CNV-4.13:container-native-virtualization/cnv-containernetworking-plugins-rhel9@sha256:89f22e541f61a660c9aa9f38ef58e80b84a0517f74e84292107fc252c25465c9_arm64",
"9Base-CNV-4.13:container-native-virtualization/cnv-containernetworking-plugins-rhel9@sha256:bf471997e54e4a75b0d71f492ab295787fdbb14d8c85c4ea8c03f0552dbc3755_amd64",
"9Base-CNV-4.13:container-native-virtualization/cnv-must-gather-rhel9@sha256:9e8efd76924958eb605401abdac08eba97fb83a1ada383bc87a7fb7c87b3a455_arm64",
"9Base-CNV-4.13:container-native-virtualization/cnv-must-gather-rhel9@sha256:b9fc32b5fabedd65a4c3a471879c808af2087277de4278adaa115a732f0468da_amd64",
"9Base-CNV-4.13:container-native-virtualization/hco-bundle-registry-rhel9@sha256:60e89d7a99ff9f20e974430b802dd724a3bb6fa1e01e5a62daad98ac487b3063_amd64",
"9Base-CNV-4.13:container-native-virtualization/hco-bundle-registry-rhel9@sha256:dd20b138045ef1424d83a47e7abcfcbb2ac54577dcec5ed3c186390aaa4c9d84_arm64",
"9Base-CNV-4.13:container-native-virtualization/hostpath-csi-driver-rhel9@sha256:61e2824853d51347593ad909a5e546cd92e4216d6a1df5dffb50dd9cba277cce_amd64",
"9Base-CNV-4.13:container-native-virtualization/hostpath-csi-driver-rhel9@sha256:676d4c23a5f60dd331728af056b0a6b2d3358ac88da23299b1a98dfaca8f288e_arm64",
"9Base-CNV-4.13:container-native-virtualization/hostpath-provisioner-operator-rhel9@sha256:515be94be496c67f5b8fd5f4832fe4385e56476e6589897d6b9fbb9bb2b00f32_amd64",
"9Base-CNV-4.13:container-native-virtualization/hostpath-provisioner-operator-rhel9@sha256:571ae805641dea11646028c946039983c7fd82f138b915dcb8b80c39b465e63c_arm64",
"9Base-CNV-4.13:container-native-virtualization/hostpath-provisioner-rhel9@sha256:ac3fe350bedd6bc43596444ba0f279ccf8a144ab14ac5a9b80ea71c46390b7b4_amd64",
"9Base-CNV-4.13:container-native-virtualization/hostpath-provisioner-rhel9@sha256:d4ed87745b7ee2acca2d83e2c91c2f6dced1903c81495b50f2559b3ba2dde287_arm64",
"9Base-CNV-4.13:container-native-virtualization/hyperconverged-cluster-operator-rhel9@sha256:e5ab9f3be59d3568e3d672ab374efb16990ccf92192eac4e1244b10fcd7423e2_amd64",
"9Base-CNV-4.13:container-native-virtualization/hyperconverged-cluster-operator-rhel9@sha256:e681560b184189df03fc84c8a712f32289f42573dd348cda394b19565eb6eca8_arm64",
"9Base-CNV-4.13:container-native-virtualization/hyperconverged-cluster-webhook-rhel9@sha256:06d036d320b3027bb8370bb8e0f6fe8c9f0ec9bca7aac3b5c53698ba4a170042_arm64",
"9Base-CNV-4.13:container-native-virtualization/hyperconverged-cluster-webhook-rhel9@sha256:b5a01336180aad017df62cf8e652f2491b8263ba7e4dd07f858db1ef1924cf2f_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubemacpool-rhel9@sha256:4d190d81eeb3fbe9ed56cf3548dc83a3f81641bfdafa7b42dcfb0d2512566644_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubemacpool-rhel9@sha256:59862a59854f0d5b83dc25ba119f9586a8aff42b6e60d1922f8ae7b4567309ff_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubesecondarydns-rhel9@sha256:121d30d78cc57731ea2242ef2c32430890ac66c2723e65608d5e2f26c3f515cd_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubesecondarydns-rhel9@sha256:b1838f3c8ba3d8113bddea17b78c21e1c1490e2a4a07ea77014edee523d06347_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-console-plugin-rhel9@sha256:86a4b1e3d6ad1d56302c9c058f8bc5826dcfe6c46fb3e0ddaa06818645039020_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-console-plugin-rhel9@sha256:ffb2acd9ae09c1ef9ca756f5eaf6087d0a3957cfc824543949d25f556a97744d_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-dpdk-checkup-rhel9@sha256:525aceb9396010ebcdba14040f267889b807cd84db8e5b4030429b51f0fbf5fe_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-dpdk-checkup-rhel9@sha256:553c4686f56c66cc1e3c5ad9d4051f139d43f821eac3abb98ca5cdb8b5dfe202_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-ssp-operator-rhel9@sha256:901e6cad9534c7bd7c4018c60bccfe49d7280fba5a9901ab4c4d15e9345288c4_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-ssp-operator-rhel9@sha256:badeb0f65f543b209f6af761729d9778b7b73b97d55044016dfba3f38a1f6f18_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-cleanup-vm-rhel9@sha256:28e4975fa4dac22d9da32ed2a10aed039fd957b30140daa36bab2caa998be77a_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-cleanup-vm-rhel9@sha256:b0ff7e812a576ea848590655fc13a85832d5a39f68e7769ceab9da6949da88c7_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-copy-template-rhel9@sha256:4916a6c6b1f9b529187d3b4d5fc99b90157993767b3fe2ad36a9ec77fbb46b10_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-copy-template-rhel9@sha256:f71c36442f1b61cdde7ec58d2c3c78d2039f6d6108e6c35388ef7c1650971fa1_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-create-datavolume-rhel9@sha256:2ad49cf6e2242a9e5861929d9bcab1305a7fc4e34e708f99cff1d7253aa46167_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-create-datavolume-rhel9@sha256:7112400a4ecb23ee2110bf96372fcf9f96ad648a51aa944627b40eb59539a660_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-create-vm-from-template-rhel9@sha256:1411c65bbad7302710788327f6964a4bf5bc20ef70d5e46f4a5c6e7a0e7a0161_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-create-vm-from-template-rhel9@sha256:4d962618aa95600c60c9fc8b890186e510de91177d51949e12797a3558e31328_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-customize-rhel9@sha256:5c23d3f20ea9dcbe7109284d73078ecd516a070e964b844f8d80b1d92ebd55ee_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-customize-rhel9@sha256:a780244e48c6d4f87446d3754c3eb9ab79c0d54675c189da4a659f7a4d5668ea_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-sysprep-rhel9@sha256:84577d949a1bbcaa291c70729127bca4a8994df03068666baa23840877ea8392_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-sysprep-rhel9@sha256:aed630a597a090179e1b0e0c117e536df06b67d0f793f91936aa7388c0c5d7eb_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-modify-vm-template-rhel9@sha256:31d959b80cf57462e1705684bb7e1b78af26bd2c62f1c9e4e51e1d02199b05a8_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-modify-vm-template-rhel9@sha256:66aea526bc10e4c0136ba86e394bbdfe4fbd7f757d6f391a561b51d2ba2f4d46_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-operator-rhel9@sha256:d0cf0e81589f0938de45961eaddfc5ec4782738fd11082de0439b200534259eb_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-operator-rhel9@sha256:f1b1f5044db6bb945584f9d4f31d020597725a286ef368ed0aca2116abb31beb_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-wait-for-vmi-status-rhel9@sha256:39a15d03f113735df03b1a7408227eb9604d942c1f3c1992bcdc7eaf07662711_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-wait-for-vmi-status-rhel9@sha256:afb68af076954fcd18c7a4a1464ea0c2a766e8282eae980051906ed07eaa1707_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-template-validator-rhel9@sha256:02b22c7e7014b5e72d47fed8b6a268cf307638c5510adf3916c51f7f40a52a08_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-template-validator-rhel9@sha256:c0264b9271e602f85b2040ef7f207cdfa46038dc4fa6e4738bf196ef88a71cf8_amd64",
"9Base-CNV-4.13:container-native-virtualization/libguestfs-tools-rhel9@sha256:29ae84575bbca24553cf649256759fd96ff286971d80bc2db129154a7df9b283_amd64",
"9Base-CNV-4.13:container-native-virtualization/libguestfs-tools-rhel9@sha256:6558f60343e068b032167e2340b2c549c5f0258acc5d2614b60966ce79408b01_arm64",
"9Base-CNV-4.13:container-native-virtualization/multus-dynamic-networks-rhel9@sha256:3ecb0162a4b01d1590bf209d717b32a4f0835910d9979823f18c24acba41b503_arm64",
"9Base-CNV-4.13:container-native-virtualization/multus-dynamic-networks-rhel9@sha256:b7f68b6420009e21380d32d6459193aae45e93be9533debe17cb3108571b36b8_amd64",
"9Base-CNV-4.13:container-native-virtualization/ovs-cni-plugin-rhel9@sha256:0f1d372f418744e0aff59ecb0a38f53178aac9c2e9eecfd38aa25ed83e0d1360_arm64",
"9Base-CNV-4.13:container-native-virtualization/ovs-cni-plugin-rhel9@sha256:e8e7a44edbf1713fe74de5c4b8f691cce78f4440c4a32a16ba9ad16694a55396_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-artifacts-server-rhel9@sha256:33d11c1832b49df39c1fca62bad40dbc5c30a452248339aaef449ac99509accb_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-artifacts-server-rhel9@sha256:81fc61b714baecb5a89fa6c0749c14566e0661b8e184ca602fc2e03b9cf431ee_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-apiserver-rhel9@sha256:f6128a63344ed2129f5bce648ddcfaa2869d31cde4b93328d3c22534b97ade10_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-apiserver-rhel9@sha256:feca273a691d09445c6cff6d36b5d590735e867656a9898ce0d89744d98e8006_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-cloner-rhel9@sha256:68e3b9b0291b4fb277ac430269ffce11d13b0a7688cf2ffcdb7f98759c36b4db_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-cloner-rhel9@sha256:6ac212767481bef64d8a7d0252bb8089c0f9751fad4a355aef71bd49dad2ad07_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-controller-rhel9@sha256:65f5263275d9f0a12b8fb057d82adf678778039ec873ca9bde182dea3413c9f1_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-controller-rhel9@sha256:d9e62b2019328be258489ac852eef25f8b1233f29abac6bcea5b406329f97fed_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-importer-rhel9@sha256:00a6d9d24ca1466d450b02269ec3144fc7550f0e5c696e869fbf7ce10cae6093_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-importer-rhel9@sha256:2df07fb21a3575e74aa16ded20129828f2300cd33e8ab369b0362062d49e62d0_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-operator-rhel9@sha256:20ec064750faedd97d11b797c8c1d9a1db5d60d7d76e82e65cfd05eb79d65e29_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-operator-rhel9@sha256:802ee8923d9d8e406b23911406f9748756c0ef4d6954e9e2fd5fb4bdf91dde9a_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-uploadproxy-rhel9@sha256:392d0f61f462c707adfdc21e4239c5c09d8520a80486b41d9d9ae479267d6124_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-uploadproxy-rhel9@sha256:6775f34353eec8f35bead9411dde155530d079bb8d51582fb1f2aacc27dbde1d_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-uploadserver-rhel9@sha256:4528c24672689cfb6505761b6b108fbcc04488192733f23d2bfe39cd42a1d743_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-uploadserver-rhel9@sha256:b22048390387380af94e267c8a9a66813c515997456d59d8ebac1486916b6585_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-controller-rhel9@sha256:3e7880149ee9a68286e390beb3d9779f7403c30fc5136e5370e0e4690a3fd243_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-controller-rhel9@sha256:970edc281d7a731e9f7e8c2d4440fe48a221e5e355d5235c5413b4c3adb28503_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-exportproxy-rhel9@sha256:1bda34d5bff734ad997202f29a5ff6f7362fd79fa90511a422442ef2e3681198_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-exportproxy-rhel9@sha256:de3c4afbf7669b98517cbef2490ec186f0553dd97b05bed80ec36dd883fe507b_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-exportserver-rhel9@sha256:3f7f98645176d42c63cca5c0fc3182a03121af87446ca421b6c72baf07dfca0d_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-exportserver-rhel9@sha256:8f12955cd777eb2409037a6968aa92f50c99d6e07e722951dbcfd0c8c9829b5e_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-handler-rhel9@sha256:5fc47110d866d8048aec50689090ce10705d19d3bb48d2b06727d6d569003af7_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-handler-rhel9@sha256:84ba79ae9658699147d2493df2582ab6df10adbff4d44a533c3fe6a9f45f9691_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-launcher-rhel9@sha256:4990d40d9987d5126d105dd45be2501eaded248cb61bdde5ea8d359bc1e7ebef_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-launcher-rhel9@sha256:95aeacb98209e0baef27ce0e02fbac38d693cea74808fc77107efda0f344bcb5_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-operator-rhel9@sha256:5c1a7e4ed2061938987b900a2394f07121d4037350c9bb6485213a2adfea787d_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-operator-rhel9@sha256:66b1b3b379121d6411ba22283e7d991617177330c93746d37753ab7812b9a00b_arm64",
"9Base-CNV-4.13:container-native-virtualization/virtio-win-rhel9@sha256:8735f51da918408a8826601c082d1b29accf26d59b9978da89b980cb509c1102_arm64",
"9Base-CNV-4.13:container-native-virtualization/virtio-win-rhel9@sha256:d147d2a6eb6f907d1e88f61aaca83596853bc72164583d6dda2b1154b490de25_amd64",
"9Base-CNV-4.13:container-native-virtualization/vm-console-proxy-rhel9@sha256:70a8d0cd66182c25e02679540bae1368b2a9cf687532b58dba41ef30c5ca00c1_arm64",
"9Base-CNV-4.13:container-native-virtualization/vm-console-proxy-rhel9@sha256:7ca921f98f6d81a126907127a611146fb53397869a628678faa1e289c01d22b2_amd64",
"9Base-CNV-4.13:container-native-virtualization/vm-network-latency-checkup-rhel9@sha256:503ea7ac914a9b54e9d665a0227ee0b5d5200cdb5d692aa94c07dd1518d91b70_arm64",
"9Base-CNV-4.13:container-native-virtualization/vm-network-latency-checkup-rhel9@sha256:59fd965975bccf641a0fa7aa01374d45057bd03cda7528248a84b60b1205bf57_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-27664"
},
{
"category": "external",
"summary": "RHBZ#2124669",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2124669"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-27664",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27664"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-27664",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-27664"
},
{
"category": "external",
"summary": "https://go.dev/issue/54658",
"url": "https://go.dev/issue/54658"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/x49AQzIVX-s/m/0tgO0pjiBQAJ",
"url": "https://groups.google.com/g/golang-announce/c/x49AQzIVX-s/m/0tgO0pjiBQAJ"
}
],
"release_date": "2022-09-06T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-05-18T02:55:08+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"9Base-CNV-4.13:container-native-virtualization/virt-api-rhel9@sha256:e68416321ca8c74a547b3d35897f54813c03481143e402e9bdc4daf315e35b5d_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-api-rhel9@sha256:fdb4ca1bb8b310d713d9c7e88f7d091f4460aa942dbeca5ebcf17281a06daffe_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:3205"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"9Base-CNV-4.13:container-native-virtualization/bridge-marker-rhel9@sha256:8eac196b30a648989cdca5cb153a3bc3d34e47339acba0e4f760bd366496c99d_amd64",
"9Base-CNV-4.13:container-native-virtualization/bridge-marker-rhel9@sha256:e8a55aee3d75a316bb0d7a554c737198823df04b3c05e481c17e45eb2153bced_arm64",
"9Base-CNV-4.13:container-native-virtualization/cluster-network-addons-operator-rhel9@sha256:3bff33e3f40cd1e2b519c2db56734d4bb8df883e155c2f20b1cb9d3d184daec1_amd64",
"9Base-CNV-4.13:container-native-virtualization/cluster-network-addons-operator-rhel9@sha256:f439d2f420bb59eb1d5af14ce2002648d0cfc155d1a1466c8aac9b661fe902b8_arm64",
"9Base-CNV-4.13:container-native-virtualization/cnv-containernetworking-plugins-rhel9@sha256:89f22e541f61a660c9aa9f38ef58e80b84a0517f74e84292107fc252c25465c9_arm64",
"9Base-CNV-4.13:container-native-virtualization/cnv-containernetworking-plugins-rhel9@sha256:bf471997e54e4a75b0d71f492ab295787fdbb14d8c85c4ea8c03f0552dbc3755_amd64",
"9Base-CNV-4.13:container-native-virtualization/cnv-must-gather-rhel9@sha256:9e8efd76924958eb605401abdac08eba97fb83a1ada383bc87a7fb7c87b3a455_arm64",
"9Base-CNV-4.13:container-native-virtualization/cnv-must-gather-rhel9@sha256:b9fc32b5fabedd65a4c3a471879c808af2087277de4278adaa115a732f0468da_amd64",
"9Base-CNV-4.13:container-native-virtualization/hco-bundle-registry-rhel9@sha256:60e89d7a99ff9f20e974430b802dd724a3bb6fa1e01e5a62daad98ac487b3063_amd64",
"9Base-CNV-4.13:container-native-virtualization/hco-bundle-registry-rhel9@sha256:dd20b138045ef1424d83a47e7abcfcbb2ac54577dcec5ed3c186390aaa4c9d84_arm64",
"9Base-CNV-4.13:container-native-virtualization/hostpath-csi-driver-rhel9@sha256:61e2824853d51347593ad909a5e546cd92e4216d6a1df5dffb50dd9cba277cce_amd64",
"9Base-CNV-4.13:container-native-virtualization/hostpath-csi-driver-rhel9@sha256:676d4c23a5f60dd331728af056b0a6b2d3358ac88da23299b1a98dfaca8f288e_arm64",
"9Base-CNV-4.13:container-native-virtualization/hostpath-provisioner-operator-rhel9@sha256:515be94be496c67f5b8fd5f4832fe4385e56476e6589897d6b9fbb9bb2b00f32_amd64",
"9Base-CNV-4.13:container-native-virtualization/hostpath-provisioner-operator-rhel9@sha256:571ae805641dea11646028c946039983c7fd82f138b915dcb8b80c39b465e63c_arm64",
"9Base-CNV-4.13:container-native-virtualization/hostpath-provisioner-rhel9@sha256:ac3fe350bedd6bc43596444ba0f279ccf8a144ab14ac5a9b80ea71c46390b7b4_amd64",
"9Base-CNV-4.13:container-native-virtualization/hostpath-provisioner-rhel9@sha256:d4ed87745b7ee2acca2d83e2c91c2f6dced1903c81495b50f2559b3ba2dde287_arm64",
"9Base-CNV-4.13:container-native-virtualization/hyperconverged-cluster-operator-rhel9@sha256:e5ab9f3be59d3568e3d672ab374efb16990ccf92192eac4e1244b10fcd7423e2_amd64",
"9Base-CNV-4.13:container-native-virtualization/hyperconverged-cluster-operator-rhel9@sha256:e681560b184189df03fc84c8a712f32289f42573dd348cda394b19565eb6eca8_arm64",
"9Base-CNV-4.13:container-native-virtualization/hyperconverged-cluster-webhook-rhel9@sha256:06d036d320b3027bb8370bb8e0f6fe8c9f0ec9bca7aac3b5c53698ba4a170042_arm64",
"9Base-CNV-4.13:container-native-virtualization/hyperconverged-cluster-webhook-rhel9@sha256:b5a01336180aad017df62cf8e652f2491b8263ba7e4dd07f858db1ef1924cf2f_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubemacpool-rhel9@sha256:4d190d81eeb3fbe9ed56cf3548dc83a3f81641bfdafa7b42dcfb0d2512566644_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubemacpool-rhel9@sha256:59862a59854f0d5b83dc25ba119f9586a8aff42b6e60d1922f8ae7b4567309ff_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubesecondarydns-rhel9@sha256:121d30d78cc57731ea2242ef2c32430890ac66c2723e65608d5e2f26c3f515cd_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubesecondarydns-rhel9@sha256:b1838f3c8ba3d8113bddea17b78c21e1c1490e2a4a07ea77014edee523d06347_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-console-plugin-rhel9@sha256:86a4b1e3d6ad1d56302c9c058f8bc5826dcfe6c46fb3e0ddaa06818645039020_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-console-plugin-rhel9@sha256:ffb2acd9ae09c1ef9ca756f5eaf6087d0a3957cfc824543949d25f556a97744d_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-dpdk-checkup-rhel9@sha256:525aceb9396010ebcdba14040f267889b807cd84db8e5b4030429b51f0fbf5fe_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-dpdk-checkup-rhel9@sha256:553c4686f56c66cc1e3c5ad9d4051f139d43f821eac3abb98ca5cdb8b5dfe202_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-ssp-operator-rhel9@sha256:901e6cad9534c7bd7c4018c60bccfe49d7280fba5a9901ab4c4d15e9345288c4_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-ssp-operator-rhel9@sha256:badeb0f65f543b209f6af761729d9778b7b73b97d55044016dfba3f38a1f6f18_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-cleanup-vm-rhel9@sha256:28e4975fa4dac22d9da32ed2a10aed039fd957b30140daa36bab2caa998be77a_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-cleanup-vm-rhel9@sha256:b0ff7e812a576ea848590655fc13a85832d5a39f68e7769ceab9da6949da88c7_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-copy-template-rhel9@sha256:4916a6c6b1f9b529187d3b4d5fc99b90157993767b3fe2ad36a9ec77fbb46b10_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-copy-template-rhel9@sha256:f71c36442f1b61cdde7ec58d2c3c78d2039f6d6108e6c35388ef7c1650971fa1_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-create-datavolume-rhel9@sha256:2ad49cf6e2242a9e5861929d9bcab1305a7fc4e34e708f99cff1d7253aa46167_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-create-datavolume-rhel9@sha256:7112400a4ecb23ee2110bf96372fcf9f96ad648a51aa944627b40eb59539a660_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-create-vm-from-template-rhel9@sha256:1411c65bbad7302710788327f6964a4bf5bc20ef70d5e46f4a5c6e7a0e7a0161_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-create-vm-from-template-rhel9@sha256:4d962618aa95600c60c9fc8b890186e510de91177d51949e12797a3558e31328_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-customize-rhel9@sha256:5c23d3f20ea9dcbe7109284d73078ecd516a070e964b844f8d80b1d92ebd55ee_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-customize-rhel9@sha256:a780244e48c6d4f87446d3754c3eb9ab79c0d54675c189da4a659f7a4d5668ea_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-sysprep-rhel9@sha256:84577d949a1bbcaa291c70729127bca4a8994df03068666baa23840877ea8392_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-sysprep-rhel9@sha256:aed630a597a090179e1b0e0c117e536df06b67d0f793f91936aa7388c0c5d7eb_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-modify-vm-template-rhel9@sha256:31d959b80cf57462e1705684bb7e1b78af26bd2c62f1c9e4e51e1d02199b05a8_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-modify-vm-template-rhel9@sha256:66aea526bc10e4c0136ba86e394bbdfe4fbd7f757d6f391a561b51d2ba2f4d46_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-operator-rhel9@sha256:d0cf0e81589f0938de45961eaddfc5ec4782738fd11082de0439b200534259eb_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-operator-rhel9@sha256:f1b1f5044db6bb945584f9d4f31d020597725a286ef368ed0aca2116abb31beb_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-wait-for-vmi-status-rhel9@sha256:39a15d03f113735df03b1a7408227eb9604d942c1f3c1992bcdc7eaf07662711_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-wait-for-vmi-status-rhel9@sha256:afb68af076954fcd18c7a4a1464ea0c2a766e8282eae980051906ed07eaa1707_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-template-validator-rhel9@sha256:02b22c7e7014b5e72d47fed8b6a268cf307638c5510adf3916c51f7f40a52a08_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-template-validator-rhel9@sha256:c0264b9271e602f85b2040ef7f207cdfa46038dc4fa6e4738bf196ef88a71cf8_amd64",
"9Base-CNV-4.13:container-native-virtualization/libguestfs-tools-rhel9@sha256:29ae84575bbca24553cf649256759fd96ff286971d80bc2db129154a7df9b283_amd64",
"9Base-CNV-4.13:container-native-virtualization/libguestfs-tools-rhel9@sha256:6558f60343e068b032167e2340b2c549c5f0258acc5d2614b60966ce79408b01_arm64",
"9Base-CNV-4.13:container-native-virtualization/multus-dynamic-networks-rhel9@sha256:3ecb0162a4b01d1590bf209d717b32a4f0835910d9979823f18c24acba41b503_arm64",
"9Base-CNV-4.13:container-native-virtualization/multus-dynamic-networks-rhel9@sha256:b7f68b6420009e21380d32d6459193aae45e93be9533debe17cb3108571b36b8_amd64",
"9Base-CNV-4.13:container-native-virtualization/ovs-cni-plugin-rhel9@sha256:0f1d372f418744e0aff59ecb0a38f53178aac9c2e9eecfd38aa25ed83e0d1360_arm64",
"9Base-CNV-4.13:container-native-virtualization/ovs-cni-plugin-rhel9@sha256:e8e7a44edbf1713fe74de5c4b8f691cce78f4440c4a32a16ba9ad16694a55396_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-api-rhel9@sha256:e68416321ca8c74a547b3d35897f54813c03481143e402e9bdc4daf315e35b5d_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-api-rhel9@sha256:fdb4ca1bb8b310d713d9c7e88f7d091f4460aa942dbeca5ebcf17281a06daffe_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-artifacts-server-rhel9@sha256:33d11c1832b49df39c1fca62bad40dbc5c30a452248339aaef449ac99509accb_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-artifacts-server-rhel9@sha256:81fc61b714baecb5a89fa6c0749c14566e0661b8e184ca602fc2e03b9cf431ee_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-apiserver-rhel9@sha256:f6128a63344ed2129f5bce648ddcfaa2869d31cde4b93328d3c22534b97ade10_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-apiserver-rhel9@sha256:feca273a691d09445c6cff6d36b5d590735e867656a9898ce0d89744d98e8006_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-cloner-rhel9@sha256:68e3b9b0291b4fb277ac430269ffce11d13b0a7688cf2ffcdb7f98759c36b4db_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-cloner-rhel9@sha256:6ac212767481bef64d8a7d0252bb8089c0f9751fad4a355aef71bd49dad2ad07_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-controller-rhel9@sha256:65f5263275d9f0a12b8fb057d82adf678778039ec873ca9bde182dea3413c9f1_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-controller-rhel9@sha256:d9e62b2019328be258489ac852eef25f8b1233f29abac6bcea5b406329f97fed_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-importer-rhel9@sha256:00a6d9d24ca1466d450b02269ec3144fc7550f0e5c696e869fbf7ce10cae6093_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-importer-rhel9@sha256:2df07fb21a3575e74aa16ded20129828f2300cd33e8ab369b0362062d49e62d0_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-operator-rhel9@sha256:20ec064750faedd97d11b797c8c1d9a1db5d60d7d76e82e65cfd05eb79d65e29_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-operator-rhel9@sha256:802ee8923d9d8e406b23911406f9748756c0ef4d6954e9e2fd5fb4bdf91dde9a_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-uploadproxy-rhel9@sha256:392d0f61f462c707adfdc21e4239c5c09d8520a80486b41d9d9ae479267d6124_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-uploadproxy-rhel9@sha256:6775f34353eec8f35bead9411dde155530d079bb8d51582fb1f2aacc27dbde1d_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-uploadserver-rhel9@sha256:4528c24672689cfb6505761b6b108fbcc04488192733f23d2bfe39cd42a1d743_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-uploadserver-rhel9@sha256:b22048390387380af94e267c8a9a66813c515997456d59d8ebac1486916b6585_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-controller-rhel9@sha256:3e7880149ee9a68286e390beb3d9779f7403c30fc5136e5370e0e4690a3fd243_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-controller-rhel9@sha256:970edc281d7a731e9f7e8c2d4440fe48a221e5e355d5235c5413b4c3adb28503_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-exportproxy-rhel9@sha256:1bda34d5bff734ad997202f29a5ff6f7362fd79fa90511a422442ef2e3681198_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-exportproxy-rhel9@sha256:de3c4afbf7669b98517cbef2490ec186f0553dd97b05bed80ec36dd883fe507b_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-exportserver-rhel9@sha256:3f7f98645176d42c63cca5c0fc3182a03121af87446ca421b6c72baf07dfca0d_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-exportserver-rhel9@sha256:8f12955cd777eb2409037a6968aa92f50c99d6e07e722951dbcfd0c8c9829b5e_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-handler-rhel9@sha256:5fc47110d866d8048aec50689090ce10705d19d3bb48d2b06727d6d569003af7_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-handler-rhel9@sha256:84ba79ae9658699147d2493df2582ab6df10adbff4d44a533c3fe6a9f45f9691_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-launcher-rhel9@sha256:4990d40d9987d5126d105dd45be2501eaded248cb61bdde5ea8d359bc1e7ebef_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-launcher-rhel9@sha256:95aeacb98209e0baef27ce0e02fbac38d693cea74808fc77107efda0f344bcb5_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-operator-rhel9@sha256:5c1a7e4ed2061938987b900a2394f07121d4037350c9bb6485213a2adfea787d_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-operator-rhel9@sha256:66b1b3b379121d6411ba22283e7d991617177330c93746d37753ab7812b9a00b_arm64",
"9Base-CNV-4.13:container-native-virtualization/virtio-win-rhel9@sha256:8735f51da918408a8826601c082d1b29accf26d59b9978da89b980cb509c1102_arm64",
"9Base-CNV-4.13:container-native-virtualization/virtio-win-rhel9@sha256:d147d2a6eb6f907d1e88f61aaca83596853bc72164583d6dda2b1154b490de25_amd64",
"9Base-CNV-4.13:container-native-virtualization/vm-console-proxy-rhel9@sha256:70a8d0cd66182c25e02679540bae1368b2a9cf687532b58dba41ef30c5ca00c1_arm64",
"9Base-CNV-4.13:container-native-virtualization/vm-console-proxy-rhel9@sha256:7ca921f98f6d81a126907127a611146fb53397869a628678faa1e289c01d22b2_amd64",
"9Base-CNV-4.13:container-native-virtualization/vm-network-latency-checkup-rhel9@sha256:503ea7ac914a9b54e9d665a0227ee0b5d5200cdb5d692aa94c07dd1518d91b70_arm64",
"9Base-CNV-4.13:container-native-virtualization/vm-network-latency-checkup-rhel9@sha256:59fd965975bccf641a0fa7aa01374d45057bd03cda7528248a84b60b1205bf57_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "golang: net/http: handle server errors after sending GOAWAY"
},
{
"cve": "CVE-2022-32149",
"cwe": {
"id": "CWE-407",
"name": "Inefficient Algorithmic Complexity"
},
"discovery_date": "2022-10-12T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"9Base-CNV-4.13:container-native-virtualization/bridge-marker-rhel9@sha256:8eac196b30a648989cdca5cb153a3bc3d34e47339acba0e4f760bd366496c99d_amd64",
"9Base-CNV-4.13:container-native-virtualization/bridge-marker-rhel9@sha256:e8a55aee3d75a316bb0d7a554c737198823df04b3c05e481c17e45eb2153bced_arm64",
"9Base-CNV-4.13:container-native-virtualization/cluster-network-addons-operator-rhel9@sha256:3bff33e3f40cd1e2b519c2db56734d4bb8df883e155c2f20b1cb9d3d184daec1_amd64",
"9Base-CNV-4.13:container-native-virtualization/cluster-network-addons-operator-rhel9@sha256:f439d2f420bb59eb1d5af14ce2002648d0cfc155d1a1466c8aac9b661fe902b8_arm64",
"9Base-CNV-4.13:container-native-virtualization/cnv-containernetworking-plugins-rhel9@sha256:89f22e541f61a660c9aa9f38ef58e80b84a0517f74e84292107fc252c25465c9_arm64",
"9Base-CNV-4.13:container-native-virtualization/cnv-containernetworking-plugins-rhel9@sha256:bf471997e54e4a75b0d71f492ab295787fdbb14d8c85c4ea8c03f0552dbc3755_amd64",
"9Base-CNV-4.13:container-native-virtualization/cnv-must-gather-rhel9@sha256:9e8efd76924958eb605401abdac08eba97fb83a1ada383bc87a7fb7c87b3a455_arm64",
"9Base-CNV-4.13:container-native-virtualization/cnv-must-gather-rhel9@sha256:b9fc32b5fabedd65a4c3a471879c808af2087277de4278adaa115a732f0468da_amd64",
"9Base-CNV-4.13:container-native-virtualization/hco-bundle-registry-rhel9@sha256:60e89d7a99ff9f20e974430b802dd724a3bb6fa1e01e5a62daad98ac487b3063_amd64",
"9Base-CNV-4.13:container-native-virtualization/hco-bundle-registry-rhel9@sha256:dd20b138045ef1424d83a47e7abcfcbb2ac54577dcec5ed3c186390aaa4c9d84_arm64",
"9Base-CNV-4.13:container-native-virtualization/hostpath-csi-driver-rhel9@sha256:61e2824853d51347593ad909a5e546cd92e4216d6a1df5dffb50dd9cba277cce_amd64",
"9Base-CNV-4.13:container-native-virtualization/hostpath-csi-driver-rhel9@sha256:676d4c23a5f60dd331728af056b0a6b2d3358ac88da23299b1a98dfaca8f288e_arm64",
"9Base-CNV-4.13:container-native-virtualization/hostpath-provisioner-operator-rhel9@sha256:515be94be496c67f5b8fd5f4832fe4385e56476e6589897d6b9fbb9bb2b00f32_amd64",
"9Base-CNV-4.13:container-native-virtualization/hostpath-provisioner-operator-rhel9@sha256:571ae805641dea11646028c946039983c7fd82f138b915dcb8b80c39b465e63c_arm64",
"9Base-CNV-4.13:container-native-virtualization/hostpath-provisioner-rhel9@sha256:ac3fe350bedd6bc43596444ba0f279ccf8a144ab14ac5a9b80ea71c46390b7b4_amd64",
"9Base-CNV-4.13:container-native-virtualization/hostpath-provisioner-rhel9@sha256:d4ed87745b7ee2acca2d83e2c91c2f6dced1903c81495b50f2559b3ba2dde287_arm64",
"9Base-CNV-4.13:container-native-virtualization/hyperconverged-cluster-operator-rhel9@sha256:e5ab9f3be59d3568e3d672ab374efb16990ccf92192eac4e1244b10fcd7423e2_amd64",
"9Base-CNV-4.13:container-native-virtualization/hyperconverged-cluster-operator-rhel9@sha256:e681560b184189df03fc84c8a712f32289f42573dd348cda394b19565eb6eca8_arm64",
"9Base-CNV-4.13:container-native-virtualization/hyperconverged-cluster-webhook-rhel9@sha256:06d036d320b3027bb8370bb8e0f6fe8c9f0ec9bca7aac3b5c53698ba4a170042_arm64",
"9Base-CNV-4.13:container-native-virtualization/hyperconverged-cluster-webhook-rhel9@sha256:b5a01336180aad017df62cf8e652f2491b8263ba7e4dd07f858db1ef1924cf2f_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubemacpool-rhel9@sha256:4d190d81eeb3fbe9ed56cf3548dc83a3f81641bfdafa7b42dcfb0d2512566644_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubemacpool-rhel9@sha256:59862a59854f0d5b83dc25ba119f9586a8aff42b6e60d1922f8ae7b4567309ff_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubesecondarydns-rhel9@sha256:121d30d78cc57731ea2242ef2c32430890ac66c2723e65608d5e2f26c3f515cd_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubesecondarydns-rhel9@sha256:b1838f3c8ba3d8113bddea17b78c21e1c1490e2a4a07ea77014edee523d06347_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-console-plugin-rhel9@sha256:86a4b1e3d6ad1d56302c9c058f8bc5826dcfe6c46fb3e0ddaa06818645039020_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-console-plugin-rhel9@sha256:ffb2acd9ae09c1ef9ca756f5eaf6087d0a3957cfc824543949d25f556a97744d_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-dpdk-checkup-rhel9@sha256:525aceb9396010ebcdba14040f267889b807cd84db8e5b4030429b51f0fbf5fe_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-dpdk-checkup-rhel9@sha256:553c4686f56c66cc1e3c5ad9d4051f139d43f821eac3abb98ca5cdb8b5dfe202_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-ssp-operator-rhel9@sha256:901e6cad9534c7bd7c4018c60bccfe49d7280fba5a9901ab4c4d15e9345288c4_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-ssp-operator-rhel9@sha256:badeb0f65f543b209f6af761729d9778b7b73b97d55044016dfba3f38a1f6f18_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-cleanup-vm-rhel9@sha256:28e4975fa4dac22d9da32ed2a10aed039fd957b30140daa36bab2caa998be77a_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-cleanup-vm-rhel9@sha256:b0ff7e812a576ea848590655fc13a85832d5a39f68e7769ceab9da6949da88c7_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-copy-template-rhel9@sha256:4916a6c6b1f9b529187d3b4d5fc99b90157993767b3fe2ad36a9ec77fbb46b10_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-copy-template-rhel9@sha256:f71c36442f1b61cdde7ec58d2c3c78d2039f6d6108e6c35388ef7c1650971fa1_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-create-datavolume-rhel9@sha256:2ad49cf6e2242a9e5861929d9bcab1305a7fc4e34e708f99cff1d7253aa46167_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-create-datavolume-rhel9@sha256:7112400a4ecb23ee2110bf96372fcf9f96ad648a51aa944627b40eb59539a660_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-create-vm-from-template-rhel9@sha256:1411c65bbad7302710788327f6964a4bf5bc20ef70d5e46f4a5c6e7a0e7a0161_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-create-vm-from-template-rhel9@sha256:4d962618aa95600c60c9fc8b890186e510de91177d51949e12797a3558e31328_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-customize-rhel9@sha256:5c23d3f20ea9dcbe7109284d73078ecd516a070e964b844f8d80b1d92ebd55ee_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-customize-rhel9@sha256:a780244e48c6d4f87446d3754c3eb9ab79c0d54675c189da4a659f7a4d5668ea_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-sysprep-rhel9@sha256:84577d949a1bbcaa291c70729127bca4a8994df03068666baa23840877ea8392_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-sysprep-rhel9@sha256:aed630a597a090179e1b0e0c117e536df06b67d0f793f91936aa7388c0c5d7eb_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-modify-vm-template-rhel9@sha256:31d959b80cf57462e1705684bb7e1b78af26bd2c62f1c9e4e51e1d02199b05a8_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-modify-vm-template-rhel9@sha256:66aea526bc10e4c0136ba86e394bbdfe4fbd7f757d6f391a561b51d2ba2f4d46_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-operator-rhel9@sha256:d0cf0e81589f0938de45961eaddfc5ec4782738fd11082de0439b200534259eb_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-operator-rhel9@sha256:f1b1f5044db6bb945584f9d4f31d020597725a286ef368ed0aca2116abb31beb_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-wait-for-vmi-status-rhel9@sha256:39a15d03f113735df03b1a7408227eb9604d942c1f3c1992bcdc7eaf07662711_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-wait-for-vmi-status-rhel9@sha256:afb68af076954fcd18c7a4a1464ea0c2a766e8282eae980051906ed07eaa1707_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-template-validator-rhel9@sha256:02b22c7e7014b5e72d47fed8b6a268cf307638c5510adf3916c51f7f40a52a08_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-template-validator-rhel9@sha256:c0264b9271e602f85b2040ef7f207cdfa46038dc4fa6e4738bf196ef88a71cf8_amd64",
"9Base-CNV-4.13:container-native-virtualization/libguestfs-tools-rhel9@sha256:29ae84575bbca24553cf649256759fd96ff286971d80bc2db129154a7df9b283_amd64",
"9Base-CNV-4.13:container-native-virtualization/libguestfs-tools-rhel9@sha256:6558f60343e068b032167e2340b2c549c5f0258acc5d2614b60966ce79408b01_arm64",
"9Base-CNV-4.13:container-native-virtualization/multus-dynamic-networks-rhel9@sha256:3ecb0162a4b01d1590bf209d717b32a4f0835910d9979823f18c24acba41b503_arm64",
"9Base-CNV-4.13:container-native-virtualization/multus-dynamic-networks-rhel9@sha256:b7f68b6420009e21380d32d6459193aae45e93be9533debe17cb3108571b36b8_amd64",
"9Base-CNV-4.13:container-native-virtualization/ovs-cni-plugin-rhel9@sha256:0f1d372f418744e0aff59ecb0a38f53178aac9c2e9eecfd38aa25ed83e0d1360_arm64",
"9Base-CNV-4.13:container-native-virtualization/ovs-cni-plugin-rhel9@sha256:e8e7a44edbf1713fe74de5c4b8f691cce78f4440c4a32a16ba9ad16694a55396_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-artifacts-server-rhel9@sha256:33d11c1832b49df39c1fca62bad40dbc5c30a452248339aaef449ac99509accb_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-artifacts-server-rhel9@sha256:81fc61b714baecb5a89fa6c0749c14566e0661b8e184ca602fc2e03b9cf431ee_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-apiserver-rhel9@sha256:f6128a63344ed2129f5bce648ddcfaa2869d31cde4b93328d3c22534b97ade10_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-apiserver-rhel9@sha256:feca273a691d09445c6cff6d36b5d590735e867656a9898ce0d89744d98e8006_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-cloner-rhel9@sha256:68e3b9b0291b4fb277ac430269ffce11d13b0a7688cf2ffcdb7f98759c36b4db_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-cloner-rhel9@sha256:6ac212767481bef64d8a7d0252bb8089c0f9751fad4a355aef71bd49dad2ad07_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-controller-rhel9@sha256:65f5263275d9f0a12b8fb057d82adf678778039ec873ca9bde182dea3413c9f1_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-controller-rhel9@sha256:d9e62b2019328be258489ac852eef25f8b1233f29abac6bcea5b406329f97fed_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-importer-rhel9@sha256:00a6d9d24ca1466d450b02269ec3144fc7550f0e5c696e869fbf7ce10cae6093_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-importer-rhel9@sha256:2df07fb21a3575e74aa16ded20129828f2300cd33e8ab369b0362062d49e62d0_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-operator-rhel9@sha256:20ec064750faedd97d11b797c8c1d9a1db5d60d7d76e82e65cfd05eb79d65e29_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-operator-rhel9@sha256:802ee8923d9d8e406b23911406f9748756c0ef4d6954e9e2fd5fb4bdf91dde9a_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-uploadproxy-rhel9@sha256:392d0f61f462c707adfdc21e4239c5c09d8520a80486b41d9d9ae479267d6124_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-uploadproxy-rhel9@sha256:6775f34353eec8f35bead9411dde155530d079bb8d51582fb1f2aacc27dbde1d_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-uploadserver-rhel9@sha256:4528c24672689cfb6505761b6b108fbcc04488192733f23d2bfe39cd42a1d743_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-uploadserver-rhel9@sha256:b22048390387380af94e267c8a9a66813c515997456d59d8ebac1486916b6585_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-controller-rhel9@sha256:3e7880149ee9a68286e390beb3d9779f7403c30fc5136e5370e0e4690a3fd243_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-controller-rhel9@sha256:970edc281d7a731e9f7e8c2d4440fe48a221e5e355d5235c5413b4c3adb28503_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-exportproxy-rhel9@sha256:1bda34d5bff734ad997202f29a5ff6f7362fd79fa90511a422442ef2e3681198_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-exportproxy-rhel9@sha256:de3c4afbf7669b98517cbef2490ec186f0553dd97b05bed80ec36dd883fe507b_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-exportserver-rhel9@sha256:3f7f98645176d42c63cca5c0fc3182a03121af87446ca421b6c72baf07dfca0d_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-exportserver-rhel9@sha256:8f12955cd777eb2409037a6968aa92f50c99d6e07e722951dbcfd0c8c9829b5e_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-handler-rhel9@sha256:5fc47110d866d8048aec50689090ce10705d19d3bb48d2b06727d6d569003af7_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-handler-rhel9@sha256:84ba79ae9658699147d2493df2582ab6df10adbff4d44a533c3fe6a9f45f9691_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-launcher-rhel9@sha256:4990d40d9987d5126d105dd45be2501eaded248cb61bdde5ea8d359bc1e7ebef_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-launcher-rhel9@sha256:95aeacb98209e0baef27ce0e02fbac38d693cea74808fc77107efda0f344bcb5_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-operator-rhel9@sha256:5c1a7e4ed2061938987b900a2394f07121d4037350c9bb6485213a2adfea787d_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-operator-rhel9@sha256:66b1b3b379121d6411ba22283e7d991617177330c93746d37753ab7812b9a00b_arm64",
"9Base-CNV-4.13:container-native-virtualization/virtio-win-rhel9@sha256:8735f51da918408a8826601c082d1b29accf26d59b9978da89b980cb509c1102_arm64",
"9Base-CNV-4.13:container-native-virtualization/virtio-win-rhel9@sha256:d147d2a6eb6f907d1e88f61aaca83596853bc72164583d6dda2b1154b490de25_amd64",
"9Base-CNV-4.13:container-native-virtualization/vm-console-proxy-rhel9@sha256:70a8d0cd66182c25e02679540bae1368b2a9cf687532b58dba41ef30c5ca00c1_arm64",
"9Base-CNV-4.13:container-native-virtualization/vm-console-proxy-rhel9@sha256:7ca921f98f6d81a126907127a611146fb53397869a628678faa1e289c01d22b2_amd64",
"9Base-CNV-4.13:container-native-virtualization/vm-network-latency-checkup-rhel9@sha256:503ea7ac914a9b54e9d665a0227ee0b5d5200cdb5d692aa94c07dd1518d91b70_arm64",
"9Base-CNV-4.13:container-native-virtualization/vm-network-latency-checkup-rhel9@sha256:59fd965975bccf641a0fa7aa01374d45057bd03cda7528248a84b60b1205bf57_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2134010"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in the golang.org/x/text/language package. An attacker can craft an Accept-Language header which ParseAcceptLanguage will take significant time to parse. This issue leads to a denial of service, and can impact availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: golang.org/x/text/language: ParseAcceptLanguage takes a long time to parse complex tags",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "After careful analysis of the vulnerability Redhat is choosing to keep the vulnerability severity as moderate,the vulnerability exists in the ParseAcceptLanguage function of the golang text/language package,when an attacker could craft an unusually large accept header and due to the parser taking quadratic time complexity to finish, firstly the attacker would have to find a way smuggle an input to the parser and even then this would simply not result in a crash of any kind but more of resource hang which while can be unpleasant,does not equate to any real world damage.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"9Base-CNV-4.13:container-native-virtualization/virt-api-rhel9@sha256:e68416321ca8c74a547b3d35897f54813c03481143e402e9bdc4daf315e35b5d_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-api-rhel9@sha256:fdb4ca1bb8b310d713d9c7e88f7d091f4460aa942dbeca5ebcf17281a06daffe_amd64"
],
"known_not_affected": [
"9Base-CNV-4.13:container-native-virtualization/bridge-marker-rhel9@sha256:8eac196b30a648989cdca5cb153a3bc3d34e47339acba0e4f760bd366496c99d_amd64",
"9Base-CNV-4.13:container-native-virtualization/bridge-marker-rhel9@sha256:e8a55aee3d75a316bb0d7a554c737198823df04b3c05e481c17e45eb2153bced_arm64",
"9Base-CNV-4.13:container-native-virtualization/cluster-network-addons-operator-rhel9@sha256:3bff33e3f40cd1e2b519c2db56734d4bb8df883e155c2f20b1cb9d3d184daec1_amd64",
"9Base-CNV-4.13:container-native-virtualization/cluster-network-addons-operator-rhel9@sha256:f439d2f420bb59eb1d5af14ce2002648d0cfc155d1a1466c8aac9b661fe902b8_arm64",
"9Base-CNV-4.13:container-native-virtualization/cnv-containernetworking-plugins-rhel9@sha256:89f22e541f61a660c9aa9f38ef58e80b84a0517f74e84292107fc252c25465c9_arm64",
"9Base-CNV-4.13:container-native-virtualization/cnv-containernetworking-plugins-rhel9@sha256:bf471997e54e4a75b0d71f492ab295787fdbb14d8c85c4ea8c03f0552dbc3755_amd64",
"9Base-CNV-4.13:container-native-virtualization/cnv-must-gather-rhel9@sha256:9e8efd76924958eb605401abdac08eba97fb83a1ada383bc87a7fb7c87b3a455_arm64",
"9Base-CNV-4.13:container-native-virtualization/cnv-must-gather-rhel9@sha256:b9fc32b5fabedd65a4c3a471879c808af2087277de4278adaa115a732f0468da_amd64",
"9Base-CNV-4.13:container-native-virtualization/hco-bundle-registry-rhel9@sha256:60e89d7a99ff9f20e974430b802dd724a3bb6fa1e01e5a62daad98ac487b3063_amd64",
"9Base-CNV-4.13:container-native-virtualization/hco-bundle-registry-rhel9@sha256:dd20b138045ef1424d83a47e7abcfcbb2ac54577dcec5ed3c186390aaa4c9d84_arm64",
"9Base-CNV-4.13:container-native-virtualization/hostpath-csi-driver-rhel9@sha256:61e2824853d51347593ad909a5e546cd92e4216d6a1df5dffb50dd9cba277cce_amd64",
"9Base-CNV-4.13:container-native-virtualization/hostpath-csi-driver-rhel9@sha256:676d4c23a5f60dd331728af056b0a6b2d3358ac88da23299b1a98dfaca8f288e_arm64",
"9Base-CNV-4.13:container-native-virtualization/hostpath-provisioner-operator-rhel9@sha256:515be94be496c67f5b8fd5f4832fe4385e56476e6589897d6b9fbb9bb2b00f32_amd64",
"9Base-CNV-4.13:container-native-virtualization/hostpath-provisioner-operator-rhel9@sha256:571ae805641dea11646028c946039983c7fd82f138b915dcb8b80c39b465e63c_arm64",
"9Base-CNV-4.13:container-native-virtualization/hostpath-provisioner-rhel9@sha256:ac3fe350bedd6bc43596444ba0f279ccf8a144ab14ac5a9b80ea71c46390b7b4_amd64",
"9Base-CNV-4.13:container-native-virtualization/hostpath-provisioner-rhel9@sha256:d4ed87745b7ee2acca2d83e2c91c2f6dced1903c81495b50f2559b3ba2dde287_arm64",
"9Base-CNV-4.13:container-native-virtualization/hyperconverged-cluster-operator-rhel9@sha256:e5ab9f3be59d3568e3d672ab374efb16990ccf92192eac4e1244b10fcd7423e2_amd64",
"9Base-CNV-4.13:container-native-virtualization/hyperconverged-cluster-operator-rhel9@sha256:e681560b184189df03fc84c8a712f32289f42573dd348cda394b19565eb6eca8_arm64",
"9Base-CNV-4.13:container-native-virtualization/hyperconverged-cluster-webhook-rhel9@sha256:06d036d320b3027bb8370bb8e0f6fe8c9f0ec9bca7aac3b5c53698ba4a170042_arm64",
"9Base-CNV-4.13:container-native-virtualization/hyperconverged-cluster-webhook-rhel9@sha256:b5a01336180aad017df62cf8e652f2491b8263ba7e4dd07f858db1ef1924cf2f_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubemacpool-rhel9@sha256:4d190d81eeb3fbe9ed56cf3548dc83a3f81641bfdafa7b42dcfb0d2512566644_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubemacpool-rhel9@sha256:59862a59854f0d5b83dc25ba119f9586a8aff42b6e60d1922f8ae7b4567309ff_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubesecondarydns-rhel9@sha256:121d30d78cc57731ea2242ef2c32430890ac66c2723e65608d5e2f26c3f515cd_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubesecondarydns-rhel9@sha256:b1838f3c8ba3d8113bddea17b78c21e1c1490e2a4a07ea77014edee523d06347_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-console-plugin-rhel9@sha256:86a4b1e3d6ad1d56302c9c058f8bc5826dcfe6c46fb3e0ddaa06818645039020_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-console-plugin-rhel9@sha256:ffb2acd9ae09c1ef9ca756f5eaf6087d0a3957cfc824543949d25f556a97744d_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-dpdk-checkup-rhel9@sha256:525aceb9396010ebcdba14040f267889b807cd84db8e5b4030429b51f0fbf5fe_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-dpdk-checkup-rhel9@sha256:553c4686f56c66cc1e3c5ad9d4051f139d43f821eac3abb98ca5cdb8b5dfe202_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-ssp-operator-rhel9@sha256:901e6cad9534c7bd7c4018c60bccfe49d7280fba5a9901ab4c4d15e9345288c4_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-ssp-operator-rhel9@sha256:badeb0f65f543b209f6af761729d9778b7b73b97d55044016dfba3f38a1f6f18_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-cleanup-vm-rhel9@sha256:28e4975fa4dac22d9da32ed2a10aed039fd957b30140daa36bab2caa998be77a_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-cleanup-vm-rhel9@sha256:b0ff7e812a576ea848590655fc13a85832d5a39f68e7769ceab9da6949da88c7_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-copy-template-rhel9@sha256:4916a6c6b1f9b529187d3b4d5fc99b90157993767b3fe2ad36a9ec77fbb46b10_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-copy-template-rhel9@sha256:f71c36442f1b61cdde7ec58d2c3c78d2039f6d6108e6c35388ef7c1650971fa1_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-create-datavolume-rhel9@sha256:2ad49cf6e2242a9e5861929d9bcab1305a7fc4e34e708f99cff1d7253aa46167_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-create-datavolume-rhel9@sha256:7112400a4ecb23ee2110bf96372fcf9f96ad648a51aa944627b40eb59539a660_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-create-vm-from-template-rhel9@sha256:1411c65bbad7302710788327f6964a4bf5bc20ef70d5e46f4a5c6e7a0e7a0161_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-create-vm-from-template-rhel9@sha256:4d962618aa95600c60c9fc8b890186e510de91177d51949e12797a3558e31328_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-customize-rhel9@sha256:5c23d3f20ea9dcbe7109284d73078ecd516a070e964b844f8d80b1d92ebd55ee_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-customize-rhel9@sha256:a780244e48c6d4f87446d3754c3eb9ab79c0d54675c189da4a659f7a4d5668ea_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-sysprep-rhel9@sha256:84577d949a1bbcaa291c70729127bca4a8994df03068666baa23840877ea8392_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-sysprep-rhel9@sha256:aed630a597a090179e1b0e0c117e536df06b67d0f793f91936aa7388c0c5d7eb_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-modify-vm-template-rhel9@sha256:31d959b80cf57462e1705684bb7e1b78af26bd2c62f1c9e4e51e1d02199b05a8_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-modify-vm-template-rhel9@sha256:66aea526bc10e4c0136ba86e394bbdfe4fbd7f757d6f391a561b51d2ba2f4d46_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-operator-rhel9@sha256:d0cf0e81589f0938de45961eaddfc5ec4782738fd11082de0439b200534259eb_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-operator-rhel9@sha256:f1b1f5044db6bb945584f9d4f31d020597725a286ef368ed0aca2116abb31beb_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-wait-for-vmi-status-rhel9@sha256:39a15d03f113735df03b1a7408227eb9604d942c1f3c1992bcdc7eaf07662711_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-wait-for-vmi-status-rhel9@sha256:afb68af076954fcd18c7a4a1464ea0c2a766e8282eae980051906ed07eaa1707_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-template-validator-rhel9@sha256:02b22c7e7014b5e72d47fed8b6a268cf307638c5510adf3916c51f7f40a52a08_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-template-validator-rhel9@sha256:c0264b9271e602f85b2040ef7f207cdfa46038dc4fa6e4738bf196ef88a71cf8_amd64",
"9Base-CNV-4.13:container-native-virtualization/libguestfs-tools-rhel9@sha256:29ae84575bbca24553cf649256759fd96ff286971d80bc2db129154a7df9b283_amd64",
"9Base-CNV-4.13:container-native-virtualization/libguestfs-tools-rhel9@sha256:6558f60343e068b032167e2340b2c549c5f0258acc5d2614b60966ce79408b01_arm64",
"9Base-CNV-4.13:container-native-virtualization/multus-dynamic-networks-rhel9@sha256:3ecb0162a4b01d1590bf209d717b32a4f0835910d9979823f18c24acba41b503_arm64",
"9Base-CNV-4.13:container-native-virtualization/multus-dynamic-networks-rhel9@sha256:b7f68b6420009e21380d32d6459193aae45e93be9533debe17cb3108571b36b8_amd64",
"9Base-CNV-4.13:container-native-virtualization/ovs-cni-plugin-rhel9@sha256:0f1d372f418744e0aff59ecb0a38f53178aac9c2e9eecfd38aa25ed83e0d1360_arm64",
"9Base-CNV-4.13:container-native-virtualization/ovs-cni-plugin-rhel9@sha256:e8e7a44edbf1713fe74de5c4b8f691cce78f4440c4a32a16ba9ad16694a55396_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-artifacts-server-rhel9@sha256:33d11c1832b49df39c1fca62bad40dbc5c30a452248339aaef449ac99509accb_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-artifacts-server-rhel9@sha256:81fc61b714baecb5a89fa6c0749c14566e0661b8e184ca602fc2e03b9cf431ee_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-apiserver-rhel9@sha256:f6128a63344ed2129f5bce648ddcfaa2869d31cde4b93328d3c22534b97ade10_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-apiserver-rhel9@sha256:feca273a691d09445c6cff6d36b5d590735e867656a9898ce0d89744d98e8006_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-cloner-rhel9@sha256:68e3b9b0291b4fb277ac430269ffce11d13b0a7688cf2ffcdb7f98759c36b4db_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-cloner-rhel9@sha256:6ac212767481bef64d8a7d0252bb8089c0f9751fad4a355aef71bd49dad2ad07_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-controller-rhel9@sha256:65f5263275d9f0a12b8fb057d82adf678778039ec873ca9bde182dea3413c9f1_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-controller-rhel9@sha256:d9e62b2019328be258489ac852eef25f8b1233f29abac6bcea5b406329f97fed_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-importer-rhel9@sha256:00a6d9d24ca1466d450b02269ec3144fc7550f0e5c696e869fbf7ce10cae6093_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-importer-rhel9@sha256:2df07fb21a3575e74aa16ded20129828f2300cd33e8ab369b0362062d49e62d0_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-operator-rhel9@sha256:20ec064750faedd97d11b797c8c1d9a1db5d60d7d76e82e65cfd05eb79d65e29_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-operator-rhel9@sha256:802ee8923d9d8e406b23911406f9748756c0ef4d6954e9e2fd5fb4bdf91dde9a_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-uploadproxy-rhel9@sha256:392d0f61f462c707adfdc21e4239c5c09d8520a80486b41d9d9ae479267d6124_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-uploadproxy-rhel9@sha256:6775f34353eec8f35bead9411dde155530d079bb8d51582fb1f2aacc27dbde1d_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-uploadserver-rhel9@sha256:4528c24672689cfb6505761b6b108fbcc04488192733f23d2bfe39cd42a1d743_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-uploadserver-rhel9@sha256:b22048390387380af94e267c8a9a66813c515997456d59d8ebac1486916b6585_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-controller-rhel9@sha256:3e7880149ee9a68286e390beb3d9779f7403c30fc5136e5370e0e4690a3fd243_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-controller-rhel9@sha256:970edc281d7a731e9f7e8c2d4440fe48a221e5e355d5235c5413b4c3adb28503_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-exportproxy-rhel9@sha256:1bda34d5bff734ad997202f29a5ff6f7362fd79fa90511a422442ef2e3681198_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-exportproxy-rhel9@sha256:de3c4afbf7669b98517cbef2490ec186f0553dd97b05bed80ec36dd883fe507b_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-exportserver-rhel9@sha256:3f7f98645176d42c63cca5c0fc3182a03121af87446ca421b6c72baf07dfca0d_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-exportserver-rhel9@sha256:8f12955cd777eb2409037a6968aa92f50c99d6e07e722951dbcfd0c8c9829b5e_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-handler-rhel9@sha256:5fc47110d866d8048aec50689090ce10705d19d3bb48d2b06727d6d569003af7_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-handler-rhel9@sha256:84ba79ae9658699147d2493df2582ab6df10adbff4d44a533c3fe6a9f45f9691_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-launcher-rhel9@sha256:4990d40d9987d5126d105dd45be2501eaded248cb61bdde5ea8d359bc1e7ebef_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-launcher-rhel9@sha256:95aeacb98209e0baef27ce0e02fbac38d693cea74808fc77107efda0f344bcb5_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-operator-rhel9@sha256:5c1a7e4ed2061938987b900a2394f07121d4037350c9bb6485213a2adfea787d_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-operator-rhel9@sha256:66b1b3b379121d6411ba22283e7d991617177330c93746d37753ab7812b9a00b_arm64",
"9Base-CNV-4.13:container-native-virtualization/virtio-win-rhel9@sha256:8735f51da918408a8826601c082d1b29accf26d59b9978da89b980cb509c1102_arm64",
"9Base-CNV-4.13:container-native-virtualization/virtio-win-rhel9@sha256:d147d2a6eb6f907d1e88f61aaca83596853bc72164583d6dda2b1154b490de25_amd64",
"9Base-CNV-4.13:container-native-virtualization/vm-console-proxy-rhel9@sha256:70a8d0cd66182c25e02679540bae1368b2a9cf687532b58dba41ef30c5ca00c1_arm64",
"9Base-CNV-4.13:container-native-virtualization/vm-console-proxy-rhel9@sha256:7ca921f98f6d81a126907127a611146fb53397869a628678faa1e289c01d22b2_amd64",
"9Base-CNV-4.13:container-native-virtualization/vm-network-latency-checkup-rhel9@sha256:503ea7ac914a9b54e9d665a0227ee0b5d5200cdb5d692aa94c07dd1518d91b70_arm64",
"9Base-CNV-4.13:container-native-virtualization/vm-network-latency-checkup-rhel9@sha256:59fd965975bccf641a0fa7aa01374d45057bd03cda7528248a84b60b1205bf57_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-32149"
},
{
"category": "external",
"summary": "RHBZ#2134010",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2134010"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-32149",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32149"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-32149",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-32149"
},
{
"category": "external",
"summary": "https://go.dev/issue/56152",
"url": "https://go.dev/issue/56152"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-dev/c/qfPIly0X7aU",
"url": "https://groups.google.com/g/golang-dev/c/qfPIly0X7aU"
}
],
"release_date": "2022-10-11T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-05-18T02:55:08+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"9Base-CNV-4.13:container-native-virtualization/virt-api-rhel9@sha256:e68416321ca8c74a547b3d35897f54813c03481143e402e9bdc4daf315e35b5d_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-api-rhel9@sha256:fdb4ca1bb8b310d713d9c7e88f7d091f4460aa942dbeca5ebcf17281a06daffe_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:3205"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"9Base-CNV-4.13:container-native-virtualization/bridge-marker-rhel9@sha256:8eac196b30a648989cdca5cb153a3bc3d34e47339acba0e4f760bd366496c99d_amd64",
"9Base-CNV-4.13:container-native-virtualization/bridge-marker-rhel9@sha256:e8a55aee3d75a316bb0d7a554c737198823df04b3c05e481c17e45eb2153bced_arm64",
"9Base-CNV-4.13:container-native-virtualization/cluster-network-addons-operator-rhel9@sha256:3bff33e3f40cd1e2b519c2db56734d4bb8df883e155c2f20b1cb9d3d184daec1_amd64",
"9Base-CNV-4.13:container-native-virtualization/cluster-network-addons-operator-rhel9@sha256:f439d2f420bb59eb1d5af14ce2002648d0cfc155d1a1466c8aac9b661fe902b8_arm64",
"9Base-CNV-4.13:container-native-virtualization/cnv-containernetworking-plugins-rhel9@sha256:89f22e541f61a660c9aa9f38ef58e80b84a0517f74e84292107fc252c25465c9_arm64",
"9Base-CNV-4.13:container-native-virtualization/cnv-containernetworking-plugins-rhel9@sha256:bf471997e54e4a75b0d71f492ab295787fdbb14d8c85c4ea8c03f0552dbc3755_amd64",
"9Base-CNV-4.13:container-native-virtualization/cnv-must-gather-rhel9@sha256:9e8efd76924958eb605401abdac08eba97fb83a1ada383bc87a7fb7c87b3a455_arm64",
"9Base-CNV-4.13:container-native-virtualization/cnv-must-gather-rhel9@sha256:b9fc32b5fabedd65a4c3a471879c808af2087277de4278adaa115a732f0468da_amd64",
"9Base-CNV-4.13:container-native-virtualization/hco-bundle-registry-rhel9@sha256:60e89d7a99ff9f20e974430b802dd724a3bb6fa1e01e5a62daad98ac487b3063_amd64",
"9Base-CNV-4.13:container-native-virtualization/hco-bundle-registry-rhel9@sha256:dd20b138045ef1424d83a47e7abcfcbb2ac54577dcec5ed3c186390aaa4c9d84_arm64",
"9Base-CNV-4.13:container-native-virtualization/hostpath-csi-driver-rhel9@sha256:61e2824853d51347593ad909a5e546cd92e4216d6a1df5dffb50dd9cba277cce_amd64",
"9Base-CNV-4.13:container-native-virtualization/hostpath-csi-driver-rhel9@sha256:676d4c23a5f60dd331728af056b0a6b2d3358ac88da23299b1a98dfaca8f288e_arm64",
"9Base-CNV-4.13:container-native-virtualization/hostpath-provisioner-operator-rhel9@sha256:515be94be496c67f5b8fd5f4832fe4385e56476e6589897d6b9fbb9bb2b00f32_amd64",
"9Base-CNV-4.13:container-native-virtualization/hostpath-provisioner-operator-rhel9@sha256:571ae805641dea11646028c946039983c7fd82f138b915dcb8b80c39b465e63c_arm64",
"9Base-CNV-4.13:container-native-virtualization/hostpath-provisioner-rhel9@sha256:ac3fe350bedd6bc43596444ba0f279ccf8a144ab14ac5a9b80ea71c46390b7b4_amd64",
"9Base-CNV-4.13:container-native-virtualization/hostpath-provisioner-rhel9@sha256:d4ed87745b7ee2acca2d83e2c91c2f6dced1903c81495b50f2559b3ba2dde287_arm64",
"9Base-CNV-4.13:container-native-virtualization/hyperconverged-cluster-operator-rhel9@sha256:e5ab9f3be59d3568e3d672ab374efb16990ccf92192eac4e1244b10fcd7423e2_amd64",
"9Base-CNV-4.13:container-native-virtualization/hyperconverged-cluster-operator-rhel9@sha256:e681560b184189df03fc84c8a712f32289f42573dd348cda394b19565eb6eca8_arm64",
"9Base-CNV-4.13:container-native-virtualization/hyperconverged-cluster-webhook-rhel9@sha256:06d036d320b3027bb8370bb8e0f6fe8c9f0ec9bca7aac3b5c53698ba4a170042_arm64",
"9Base-CNV-4.13:container-native-virtualization/hyperconverged-cluster-webhook-rhel9@sha256:b5a01336180aad017df62cf8e652f2491b8263ba7e4dd07f858db1ef1924cf2f_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubemacpool-rhel9@sha256:4d190d81eeb3fbe9ed56cf3548dc83a3f81641bfdafa7b42dcfb0d2512566644_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubemacpool-rhel9@sha256:59862a59854f0d5b83dc25ba119f9586a8aff42b6e60d1922f8ae7b4567309ff_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubesecondarydns-rhel9@sha256:121d30d78cc57731ea2242ef2c32430890ac66c2723e65608d5e2f26c3f515cd_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubesecondarydns-rhel9@sha256:b1838f3c8ba3d8113bddea17b78c21e1c1490e2a4a07ea77014edee523d06347_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-console-plugin-rhel9@sha256:86a4b1e3d6ad1d56302c9c058f8bc5826dcfe6c46fb3e0ddaa06818645039020_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-console-plugin-rhel9@sha256:ffb2acd9ae09c1ef9ca756f5eaf6087d0a3957cfc824543949d25f556a97744d_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-dpdk-checkup-rhel9@sha256:525aceb9396010ebcdba14040f267889b807cd84db8e5b4030429b51f0fbf5fe_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-dpdk-checkup-rhel9@sha256:553c4686f56c66cc1e3c5ad9d4051f139d43f821eac3abb98ca5cdb8b5dfe202_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-ssp-operator-rhel9@sha256:901e6cad9534c7bd7c4018c60bccfe49d7280fba5a9901ab4c4d15e9345288c4_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-ssp-operator-rhel9@sha256:badeb0f65f543b209f6af761729d9778b7b73b97d55044016dfba3f38a1f6f18_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-cleanup-vm-rhel9@sha256:28e4975fa4dac22d9da32ed2a10aed039fd957b30140daa36bab2caa998be77a_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-cleanup-vm-rhel9@sha256:b0ff7e812a576ea848590655fc13a85832d5a39f68e7769ceab9da6949da88c7_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-copy-template-rhel9@sha256:4916a6c6b1f9b529187d3b4d5fc99b90157993767b3fe2ad36a9ec77fbb46b10_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-copy-template-rhel9@sha256:f71c36442f1b61cdde7ec58d2c3c78d2039f6d6108e6c35388ef7c1650971fa1_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-create-datavolume-rhel9@sha256:2ad49cf6e2242a9e5861929d9bcab1305a7fc4e34e708f99cff1d7253aa46167_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-create-datavolume-rhel9@sha256:7112400a4ecb23ee2110bf96372fcf9f96ad648a51aa944627b40eb59539a660_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-create-vm-from-template-rhel9@sha256:1411c65bbad7302710788327f6964a4bf5bc20ef70d5e46f4a5c6e7a0e7a0161_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-create-vm-from-template-rhel9@sha256:4d962618aa95600c60c9fc8b890186e510de91177d51949e12797a3558e31328_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-customize-rhel9@sha256:5c23d3f20ea9dcbe7109284d73078ecd516a070e964b844f8d80b1d92ebd55ee_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-customize-rhel9@sha256:a780244e48c6d4f87446d3754c3eb9ab79c0d54675c189da4a659f7a4d5668ea_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-sysprep-rhel9@sha256:84577d949a1bbcaa291c70729127bca4a8994df03068666baa23840877ea8392_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-sysprep-rhel9@sha256:aed630a597a090179e1b0e0c117e536df06b67d0f793f91936aa7388c0c5d7eb_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-modify-vm-template-rhel9@sha256:31d959b80cf57462e1705684bb7e1b78af26bd2c62f1c9e4e51e1d02199b05a8_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-modify-vm-template-rhel9@sha256:66aea526bc10e4c0136ba86e394bbdfe4fbd7f757d6f391a561b51d2ba2f4d46_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-operator-rhel9@sha256:d0cf0e81589f0938de45961eaddfc5ec4782738fd11082de0439b200534259eb_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-operator-rhel9@sha256:f1b1f5044db6bb945584f9d4f31d020597725a286ef368ed0aca2116abb31beb_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-wait-for-vmi-status-rhel9@sha256:39a15d03f113735df03b1a7408227eb9604d942c1f3c1992bcdc7eaf07662711_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-wait-for-vmi-status-rhel9@sha256:afb68af076954fcd18c7a4a1464ea0c2a766e8282eae980051906ed07eaa1707_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-template-validator-rhel9@sha256:02b22c7e7014b5e72d47fed8b6a268cf307638c5510adf3916c51f7f40a52a08_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-template-validator-rhel9@sha256:c0264b9271e602f85b2040ef7f207cdfa46038dc4fa6e4738bf196ef88a71cf8_amd64",
"9Base-CNV-4.13:container-native-virtualization/libguestfs-tools-rhel9@sha256:29ae84575bbca24553cf649256759fd96ff286971d80bc2db129154a7df9b283_amd64",
"9Base-CNV-4.13:container-native-virtualization/libguestfs-tools-rhel9@sha256:6558f60343e068b032167e2340b2c549c5f0258acc5d2614b60966ce79408b01_arm64",
"9Base-CNV-4.13:container-native-virtualization/multus-dynamic-networks-rhel9@sha256:3ecb0162a4b01d1590bf209d717b32a4f0835910d9979823f18c24acba41b503_arm64",
"9Base-CNV-4.13:container-native-virtualization/multus-dynamic-networks-rhel9@sha256:b7f68b6420009e21380d32d6459193aae45e93be9533debe17cb3108571b36b8_amd64",
"9Base-CNV-4.13:container-native-virtualization/ovs-cni-plugin-rhel9@sha256:0f1d372f418744e0aff59ecb0a38f53178aac9c2e9eecfd38aa25ed83e0d1360_arm64",
"9Base-CNV-4.13:container-native-virtualization/ovs-cni-plugin-rhel9@sha256:e8e7a44edbf1713fe74de5c4b8f691cce78f4440c4a32a16ba9ad16694a55396_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-api-rhel9@sha256:e68416321ca8c74a547b3d35897f54813c03481143e402e9bdc4daf315e35b5d_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-api-rhel9@sha256:fdb4ca1bb8b310d713d9c7e88f7d091f4460aa942dbeca5ebcf17281a06daffe_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-artifacts-server-rhel9@sha256:33d11c1832b49df39c1fca62bad40dbc5c30a452248339aaef449ac99509accb_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-artifacts-server-rhel9@sha256:81fc61b714baecb5a89fa6c0749c14566e0661b8e184ca602fc2e03b9cf431ee_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-apiserver-rhel9@sha256:f6128a63344ed2129f5bce648ddcfaa2869d31cde4b93328d3c22534b97ade10_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-apiserver-rhel9@sha256:feca273a691d09445c6cff6d36b5d590735e867656a9898ce0d89744d98e8006_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-cloner-rhel9@sha256:68e3b9b0291b4fb277ac430269ffce11d13b0a7688cf2ffcdb7f98759c36b4db_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-cloner-rhel9@sha256:6ac212767481bef64d8a7d0252bb8089c0f9751fad4a355aef71bd49dad2ad07_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-controller-rhel9@sha256:65f5263275d9f0a12b8fb057d82adf678778039ec873ca9bde182dea3413c9f1_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-controller-rhel9@sha256:d9e62b2019328be258489ac852eef25f8b1233f29abac6bcea5b406329f97fed_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-importer-rhel9@sha256:00a6d9d24ca1466d450b02269ec3144fc7550f0e5c696e869fbf7ce10cae6093_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-importer-rhel9@sha256:2df07fb21a3575e74aa16ded20129828f2300cd33e8ab369b0362062d49e62d0_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-operator-rhel9@sha256:20ec064750faedd97d11b797c8c1d9a1db5d60d7d76e82e65cfd05eb79d65e29_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-operator-rhel9@sha256:802ee8923d9d8e406b23911406f9748756c0ef4d6954e9e2fd5fb4bdf91dde9a_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-uploadproxy-rhel9@sha256:392d0f61f462c707adfdc21e4239c5c09d8520a80486b41d9d9ae479267d6124_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-uploadproxy-rhel9@sha256:6775f34353eec8f35bead9411dde155530d079bb8d51582fb1f2aacc27dbde1d_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-uploadserver-rhel9@sha256:4528c24672689cfb6505761b6b108fbcc04488192733f23d2bfe39cd42a1d743_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-uploadserver-rhel9@sha256:b22048390387380af94e267c8a9a66813c515997456d59d8ebac1486916b6585_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-controller-rhel9@sha256:3e7880149ee9a68286e390beb3d9779f7403c30fc5136e5370e0e4690a3fd243_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-controller-rhel9@sha256:970edc281d7a731e9f7e8c2d4440fe48a221e5e355d5235c5413b4c3adb28503_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-exportproxy-rhel9@sha256:1bda34d5bff734ad997202f29a5ff6f7362fd79fa90511a422442ef2e3681198_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-exportproxy-rhel9@sha256:de3c4afbf7669b98517cbef2490ec186f0553dd97b05bed80ec36dd883fe507b_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-exportserver-rhel9@sha256:3f7f98645176d42c63cca5c0fc3182a03121af87446ca421b6c72baf07dfca0d_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-exportserver-rhel9@sha256:8f12955cd777eb2409037a6968aa92f50c99d6e07e722951dbcfd0c8c9829b5e_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-handler-rhel9@sha256:5fc47110d866d8048aec50689090ce10705d19d3bb48d2b06727d6d569003af7_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-handler-rhel9@sha256:84ba79ae9658699147d2493df2582ab6df10adbff4d44a533c3fe6a9f45f9691_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-launcher-rhel9@sha256:4990d40d9987d5126d105dd45be2501eaded248cb61bdde5ea8d359bc1e7ebef_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-launcher-rhel9@sha256:95aeacb98209e0baef27ce0e02fbac38d693cea74808fc77107efda0f344bcb5_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-operator-rhel9@sha256:5c1a7e4ed2061938987b900a2394f07121d4037350c9bb6485213a2adfea787d_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-operator-rhel9@sha256:66b1b3b379121d6411ba22283e7d991617177330c93746d37753ab7812b9a00b_arm64",
"9Base-CNV-4.13:container-native-virtualization/virtio-win-rhel9@sha256:8735f51da918408a8826601c082d1b29accf26d59b9978da89b980cb509c1102_arm64",
"9Base-CNV-4.13:container-native-virtualization/virtio-win-rhel9@sha256:d147d2a6eb6f907d1e88f61aaca83596853bc72164583d6dda2b1154b490de25_amd64",
"9Base-CNV-4.13:container-native-virtualization/vm-console-proxy-rhel9@sha256:70a8d0cd66182c25e02679540bae1368b2a9cf687532b58dba41ef30c5ca00c1_arm64",
"9Base-CNV-4.13:container-native-virtualization/vm-console-proxy-rhel9@sha256:7ca921f98f6d81a126907127a611146fb53397869a628678faa1e289c01d22b2_amd64",
"9Base-CNV-4.13:container-native-virtualization/vm-network-latency-checkup-rhel9@sha256:503ea7ac914a9b54e9d665a0227ee0b5d5200cdb5d692aa94c07dd1518d91b70_arm64",
"9Base-CNV-4.13:container-native-virtualization/vm-network-latency-checkup-rhel9@sha256:59fd965975bccf641a0fa7aa01374d45057bd03cda7528248a84b60b1205bf57_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "golang: golang.org/x/text/language: ParseAcceptLanguage takes a long time to parse complex tags"
},
{
"cve": "CVE-2022-32189",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"discovery_date": "2022-08-02T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"9Base-CNV-4.13:container-native-virtualization/bridge-marker-rhel9@sha256:8eac196b30a648989cdca5cb153a3bc3d34e47339acba0e4f760bd366496c99d_amd64",
"9Base-CNV-4.13:container-native-virtualization/bridge-marker-rhel9@sha256:e8a55aee3d75a316bb0d7a554c737198823df04b3c05e481c17e45eb2153bced_arm64",
"9Base-CNV-4.13:container-native-virtualization/cluster-network-addons-operator-rhel9@sha256:3bff33e3f40cd1e2b519c2db56734d4bb8df883e155c2f20b1cb9d3d184daec1_amd64",
"9Base-CNV-4.13:container-native-virtualization/cluster-network-addons-operator-rhel9@sha256:f439d2f420bb59eb1d5af14ce2002648d0cfc155d1a1466c8aac9b661fe902b8_arm64",
"9Base-CNV-4.13:container-native-virtualization/cnv-containernetworking-plugins-rhel9@sha256:89f22e541f61a660c9aa9f38ef58e80b84a0517f74e84292107fc252c25465c9_arm64",
"9Base-CNV-4.13:container-native-virtualization/cnv-containernetworking-plugins-rhel9@sha256:bf471997e54e4a75b0d71f492ab295787fdbb14d8c85c4ea8c03f0552dbc3755_amd64",
"9Base-CNV-4.13:container-native-virtualization/cnv-must-gather-rhel9@sha256:9e8efd76924958eb605401abdac08eba97fb83a1ada383bc87a7fb7c87b3a455_arm64",
"9Base-CNV-4.13:container-native-virtualization/cnv-must-gather-rhel9@sha256:b9fc32b5fabedd65a4c3a471879c808af2087277de4278adaa115a732f0468da_amd64",
"9Base-CNV-4.13:container-native-virtualization/hco-bundle-registry-rhel9@sha256:60e89d7a99ff9f20e974430b802dd724a3bb6fa1e01e5a62daad98ac487b3063_amd64",
"9Base-CNV-4.13:container-native-virtualization/hco-bundle-registry-rhel9@sha256:dd20b138045ef1424d83a47e7abcfcbb2ac54577dcec5ed3c186390aaa4c9d84_arm64",
"9Base-CNV-4.13:container-native-virtualization/hostpath-csi-driver-rhel9@sha256:61e2824853d51347593ad909a5e546cd92e4216d6a1df5dffb50dd9cba277cce_amd64",
"9Base-CNV-4.13:container-native-virtualization/hostpath-csi-driver-rhel9@sha256:676d4c23a5f60dd331728af056b0a6b2d3358ac88da23299b1a98dfaca8f288e_arm64",
"9Base-CNV-4.13:container-native-virtualization/hostpath-provisioner-operator-rhel9@sha256:515be94be496c67f5b8fd5f4832fe4385e56476e6589897d6b9fbb9bb2b00f32_amd64",
"9Base-CNV-4.13:container-native-virtualization/hostpath-provisioner-operator-rhel9@sha256:571ae805641dea11646028c946039983c7fd82f138b915dcb8b80c39b465e63c_arm64",
"9Base-CNV-4.13:container-native-virtualization/hostpath-provisioner-rhel9@sha256:ac3fe350bedd6bc43596444ba0f279ccf8a144ab14ac5a9b80ea71c46390b7b4_amd64",
"9Base-CNV-4.13:container-native-virtualization/hostpath-provisioner-rhel9@sha256:d4ed87745b7ee2acca2d83e2c91c2f6dced1903c81495b50f2559b3ba2dde287_arm64",
"9Base-CNV-4.13:container-native-virtualization/hyperconverged-cluster-operator-rhel9@sha256:e5ab9f3be59d3568e3d672ab374efb16990ccf92192eac4e1244b10fcd7423e2_amd64",
"9Base-CNV-4.13:container-native-virtualization/hyperconverged-cluster-operator-rhel9@sha256:e681560b184189df03fc84c8a712f32289f42573dd348cda394b19565eb6eca8_arm64",
"9Base-CNV-4.13:container-native-virtualization/hyperconverged-cluster-webhook-rhel9@sha256:06d036d320b3027bb8370bb8e0f6fe8c9f0ec9bca7aac3b5c53698ba4a170042_arm64",
"9Base-CNV-4.13:container-native-virtualization/hyperconverged-cluster-webhook-rhel9@sha256:b5a01336180aad017df62cf8e652f2491b8263ba7e4dd07f858db1ef1924cf2f_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubemacpool-rhel9@sha256:4d190d81eeb3fbe9ed56cf3548dc83a3f81641bfdafa7b42dcfb0d2512566644_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubemacpool-rhel9@sha256:59862a59854f0d5b83dc25ba119f9586a8aff42b6e60d1922f8ae7b4567309ff_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubesecondarydns-rhel9@sha256:121d30d78cc57731ea2242ef2c32430890ac66c2723e65608d5e2f26c3f515cd_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubesecondarydns-rhel9@sha256:b1838f3c8ba3d8113bddea17b78c21e1c1490e2a4a07ea77014edee523d06347_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-console-plugin-rhel9@sha256:86a4b1e3d6ad1d56302c9c058f8bc5826dcfe6c46fb3e0ddaa06818645039020_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-console-plugin-rhel9@sha256:ffb2acd9ae09c1ef9ca756f5eaf6087d0a3957cfc824543949d25f556a97744d_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-dpdk-checkup-rhel9@sha256:525aceb9396010ebcdba14040f267889b807cd84db8e5b4030429b51f0fbf5fe_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-dpdk-checkup-rhel9@sha256:553c4686f56c66cc1e3c5ad9d4051f139d43f821eac3abb98ca5cdb8b5dfe202_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-ssp-operator-rhel9@sha256:901e6cad9534c7bd7c4018c60bccfe49d7280fba5a9901ab4c4d15e9345288c4_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-ssp-operator-rhel9@sha256:badeb0f65f543b209f6af761729d9778b7b73b97d55044016dfba3f38a1f6f18_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-cleanup-vm-rhel9@sha256:28e4975fa4dac22d9da32ed2a10aed039fd957b30140daa36bab2caa998be77a_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-cleanup-vm-rhel9@sha256:b0ff7e812a576ea848590655fc13a85832d5a39f68e7769ceab9da6949da88c7_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-copy-template-rhel9@sha256:4916a6c6b1f9b529187d3b4d5fc99b90157993767b3fe2ad36a9ec77fbb46b10_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-copy-template-rhel9@sha256:f71c36442f1b61cdde7ec58d2c3c78d2039f6d6108e6c35388ef7c1650971fa1_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-create-datavolume-rhel9@sha256:2ad49cf6e2242a9e5861929d9bcab1305a7fc4e34e708f99cff1d7253aa46167_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-create-datavolume-rhel9@sha256:7112400a4ecb23ee2110bf96372fcf9f96ad648a51aa944627b40eb59539a660_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-create-vm-from-template-rhel9@sha256:1411c65bbad7302710788327f6964a4bf5bc20ef70d5e46f4a5c6e7a0e7a0161_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-create-vm-from-template-rhel9@sha256:4d962618aa95600c60c9fc8b890186e510de91177d51949e12797a3558e31328_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-customize-rhel9@sha256:5c23d3f20ea9dcbe7109284d73078ecd516a070e964b844f8d80b1d92ebd55ee_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-customize-rhel9@sha256:a780244e48c6d4f87446d3754c3eb9ab79c0d54675c189da4a659f7a4d5668ea_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-sysprep-rhel9@sha256:84577d949a1bbcaa291c70729127bca4a8994df03068666baa23840877ea8392_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-sysprep-rhel9@sha256:aed630a597a090179e1b0e0c117e536df06b67d0f793f91936aa7388c0c5d7eb_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-modify-vm-template-rhel9@sha256:31d959b80cf57462e1705684bb7e1b78af26bd2c62f1c9e4e51e1d02199b05a8_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-modify-vm-template-rhel9@sha256:66aea526bc10e4c0136ba86e394bbdfe4fbd7f757d6f391a561b51d2ba2f4d46_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-operator-rhel9@sha256:d0cf0e81589f0938de45961eaddfc5ec4782738fd11082de0439b200534259eb_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-operator-rhel9@sha256:f1b1f5044db6bb945584f9d4f31d020597725a286ef368ed0aca2116abb31beb_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-wait-for-vmi-status-rhel9@sha256:39a15d03f113735df03b1a7408227eb9604d942c1f3c1992bcdc7eaf07662711_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-wait-for-vmi-status-rhel9@sha256:afb68af076954fcd18c7a4a1464ea0c2a766e8282eae980051906ed07eaa1707_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-template-validator-rhel9@sha256:02b22c7e7014b5e72d47fed8b6a268cf307638c5510adf3916c51f7f40a52a08_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-template-validator-rhel9@sha256:c0264b9271e602f85b2040ef7f207cdfa46038dc4fa6e4738bf196ef88a71cf8_amd64",
"9Base-CNV-4.13:container-native-virtualization/libguestfs-tools-rhel9@sha256:29ae84575bbca24553cf649256759fd96ff286971d80bc2db129154a7df9b283_amd64",
"9Base-CNV-4.13:container-native-virtualization/libguestfs-tools-rhel9@sha256:6558f60343e068b032167e2340b2c549c5f0258acc5d2614b60966ce79408b01_arm64",
"9Base-CNV-4.13:container-native-virtualization/multus-dynamic-networks-rhel9@sha256:3ecb0162a4b01d1590bf209d717b32a4f0835910d9979823f18c24acba41b503_arm64",
"9Base-CNV-4.13:container-native-virtualization/multus-dynamic-networks-rhel9@sha256:b7f68b6420009e21380d32d6459193aae45e93be9533debe17cb3108571b36b8_amd64",
"9Base-CNV-4.13:container-native-virtualization/ovs-cni-plugin-rhel9@sha256:0f1d372f418744e0aff59ecb0a38f53178aac9c2e9eecfd38aa25ed83e0d1360_arm64",
"9Base-CNV-4.13:container-native-virtualization/ovs-cni-plugin-rhel9@sha256:e8e7a44edbf1713fe74de5c4b8f691cce78f4440c4a32a16ba9ad16694a55396_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-artifacts-server-rhel9@sha256:33d11c1832b49df39c1fca62bad40dbc5c30a452248339aaef449ac99509accb_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-artifacts-server-rhel9@sha256:81fc61b714baecb5a89fa6c0749c14566e0661b8e184ca602fc2e03b9cf431ee_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-apiserver-rhel9@sha256:f6128a63344ed2129f5bce648ddcfaa2869d31cde4b93328d3c22534b97ade10_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-apiserver-rhel9@sha256:feca273a691d09445c6cff6d36b5d590735e867656a9898ce0d89744d98e8006_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-cloner-rhel9@sha256:68e3b9b0291b4fb277ac430269ffce11d13b0a7688cf2ffcdb7f98759c36b4db_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-cloner-rhel9@sha256:6ac212767481bef64d8a7d0252bb8089c0f9751fad4a355aef71bd49dad2ad07_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-controller-rhel9@sha256:65f5263275d9f0a12b8fb057d82adf678778039ec873ca9bde182dea3413c9f1_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-controller-rhel9@sha256:d9e62b2019328be258489ac852eef25f8b1233f29abac6bcea5b406329f97fed_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-importer-rhel9@sha256:00a6d9d24ca1466d450b02269ec3144fc7550f0e5c696e869fbf7ce10cae6093_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-importer-rhel9@sha256:2df07fb21a3575e74aa16ded20129828f2300cd33e8ab369b0362062d49e62d0_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-operator-rhel9@sha256:20ec064750faedd97d11b797c8c1d9a1db5d60d7d76e82e65cfd05eb79d65e29_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-operator-rhel9@sha256:802ee8923d9d8e406b23911406f9748756c0ef4d6954e9e2fd5fb4bdf91dde9a_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-uploadproxy-rhel9@sha256:392d0f61f462c707adfdc21e4239c5c09d8520a80486b41d9d9ae479267d6124_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-uploadproxy-rhel9@sha256:6775f34353eec8f35bead9411dde155530d079bb8d51582fb1f2aacc27dbde1d_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-uploadserver-rhel9@sha256:4528c24672689cfb6505761b6b108fbcc04488192733f23d2bfe39cd42a1d743_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-uploadserver-rhel9@sha256:b22048390387380af94e267c8a9a66813c515997456d59d8ebac1486916b6585_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-controller-rhel9@sha256:3e7880149ee9a68286e390beb3d9779f7403c30fc5136e5370e0e4690a3fd243_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-controller-rhel9@sha256:970edc281d7a731e9f7e8c2d4440fe48a221e5e355d5235c5413b4c3adb28503_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-exportproxy-rhel9@sha256:1bda34d5bff734ad997202f29a5ff6f7362fd79fa90511a422442ef2e3681198_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-exportproxy-rhel9@sha256:de3c4afbf7669b98517cbef2490ec186f0553dd97b05bed80ec36dd883fe507b_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-exportserver-rhel9@sha256:3f7f98645176d42c63cca5c0fc3182a03121af87446ca421b6c72baf07dfca0d_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-exportserver-rhel9@sha256:8f12955cd777eb2409037a6968aa92f50c99d6e07e722951dbcfd0c8c9829b5e_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-handler-rhel9@sha256:5fc47110d866d8048aec50689090ce10705d19d3bb48d2b06727d6d569003af7_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-handler-rhel9@sha256:84ba79ae9658699147d2493df2582ab6df10adbff4d44a533c3fe6a9f45f9691_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-launcher-rhel9@sha256:4990d40d9987d5126d105dd45be2501eaded248cb61bdde5ea8d359bc1e7ebef_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-launcher-rhel9@sha256:95aeacb98209e0baef27ce0e02fbac38d693cea74808fc77107efda0f344bcb5_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-operator-rhel9@sha256:5c1a7e4ed2061938987b900a2394f07121d4037350c9bb6485213a2adfea787d_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-operator-rhel9@sha256:66b1b3b379121d6411ba22283e7d991617177330c93746d37753ab7812b9a00b_arm64",
"9Base-CNV-4.13:container-native-virtualization/virtio-win-rhel9@sha256:8735f51da918408a8826601c082d1b29accf26d59b9978da89b980cb509c1102_arm64",
"9Base-CNV-4.13:container-native-virtualization/virtio-win-rhel9@sha256:d147d2a6eb6f907d1e88f61aaca83596853bc72164583d6dda2b1154b490de25_amd64",
"9Base-CNV-4.13:container-native-virtualization/vm-console-proxy-rhel9@sha256:70a8d0cd66182c25e02679540bae1368b2a9cf687532b58dba41ef30c5ca00c1_arm64",
"9Base-CNV-4.13:container-native-virtualization/vm-console-proxy-rhel9@sha256:7ca921f98f6d81a126907127a611146fb53397869a628678faa1e289c01d22b2_amd64",
"9Base-CNV-4.13:container-native-virtualization/vm-network-latency-checkup-rhel9@sha256:503ea7ac914a9b54e9d665a0227ee0b5d5200cdb5d692aa94c07dd1518d91b70_arm64",
"9Base-CNV-4.13:container-native-virtualization/vm-network-latency-checkup-rhel9@sha256:59fd965975bccf641a0fa7aa01374d45057bd03cda7528248a84b60b1205bf57_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2113814"
}
],
"notes": [
{
"category": "description",
"text": "An uncontrolled resource consumption flaw was found in Golang math/big. A too-short encoded message can cause a panic in Float.GobDecode and Rat.GobDecode in math/big in Go, potentially allowing an attacker to create a denial of service, impacting availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: math/big: decoding big.Float and big.Rat types can panic if the encoded message is too short, potentially allowing a denial of service",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This flaw stems from a particular and specific method (GoBDecode) which isn\u0027t commonly used. There are few components within Red Hat offerings which call this function. In rare cases where this method is called, the component limits possible damage or it is not possible to be triggered by an attacker. For these combined reasons the impact has been downgraded to Low.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"9Base-CNV-4.13:container-native-virtualization/virt-api-rhel9@sha256:e68416321ca8c74a547b3d35897f54813c03481143e402e9bdc4daf315e35b5d_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-api-rhel9@sha256:fdb4ca1bb8b310d713d9c7e88f7d091f4460aa942dbeca5ebcf17281a06daffe_amd64"
],
"known_not_affected": [
"9Base-CNV-4.13:container-native-virtualization/bridge-marker-rhel9@sha256:8eac196b30a648989cdca5cb153a3bc3d34e47339acba0e4f760bd366496c99d_amd64",
"9Base-CNV-4.13:container-native-virtualization/bridge-marker-rhel9@sha256:e8a55aee3d75a316bb0d7a554c737198823df04b3c05e481c17e45eb2153bced_arm64",
"9Base-CNV-4.13:container-native-virtualization/cluster-network-addons-operator-rhel9@sha256:3bff33e3f40cd1e2b519c2db56734d4bb8df883e155c2f20b1cb9d3d184daec1_amd64",
"9Base-CNV-4.13:container-native-virtualization/cluster-network-addons-operator-rhel9@sha256:f439d2f420bb59eb1d5af14ce2002648d0cfc155d1a1466c8aac9b661fe902b8_arm64",
"9Base-CNV-4.13:container-native-virtualization/cnv-containernetworking-plugins-rhel9@sha256:89f22e541f61a660c9aa9f38ef58e80b84a0517f74e84292107fc252c25465c9_arm64",
"9Base-CNV-4.13:container-native-virtualization/cnv-containernetworking-plugins-rhel9@sha256:bf471997e54e4a75b0d71f492ab295787fdbb14d8c85c4ea8c03f0552dbc3755_amd64",
"9Base-CNV-4.13:container-native-virtualization/cnv-must-gather-rhel9@sha256:9e8efd76924958eb605401abdac08eba97fb83a1ada383bc87a7fb7c87b3a455_arm64",
"9Base-CNV-4.13:container-native-virtualization/cnv-must-gather-rhel9@sha256:b9fc32b5fabedd65a4c3a471879c808af2087277de4278adaa115a732f0468da_amd64",
"9Base-CNV-4.13:container-native-virtualization/hco-bundle-registry-rhel9@sha256:60e89d7a99ff9f20e974430b802dd724a3bb6fa1e01e5a62daad98ac487b3063_amd64",
"9Base-CNV-4.13:container-native-virtualization/hco-bundle-registry-rhel9@sha256:dd20b138045ef1424d83a47e7abcfcbb2ac54577dcec5ed3c186390aaa4c9d84_arm64",
"9Base-CNV-4.13:container-native-virtualization/hostpath-csi-driver-rhel9@sha256:61e2824853d51347593ad909a5e546cd92e4216d6a1df5dffb50dd9cba277cce_amd64",
"9Base-CNV-4.13:container-native-virtualization/hostpath-csi-driver-rhel9@sha256:676d4c23a5f60dd331728af056b0a6b2d3358ac88da23299b1a98dfaca8f288e_arm64",
"9Base-CNV-4.13:container-native-virtualization/hostpath-provisioner-operator-rhel9@sha256:515be94be496c67f5b8fd5f4832fe4385e56476e6589897d6b9fbb9bb2b00f32_amd64",
"9Base-CNV-4.13:container-native-virtualization/hostpath-provisioner-operator-rhel9@sha256:571ae805641dea11646028c946039983c7fd82f138b915dcb8b80c39b465e63c_arm64",
"9Base-CNV-4.13:container-native-virtualization/hostpath-provisioner-rhel9@sha256:ac3fe350bedd6bc43596444ba0f279ccf8a144ab14ac5a9b80ea71c46390b7b4_amd64",
"9Base-CNV-4.13:container-native-virtualization/hostpath-provisioner-rhel9@sha256:d4ed87745b7ee2acca2d83e2c91c2f6dced1903c81495b50f2559b3ba2dde287_arm64",
"9Base-CNV-4.13:container-native-virtualization/hyperconverged-cluster-operator-rhel9@sha256:e5ab9f3be59d3568e3d672ab374efb16990ccf92192eac4e1244b10fcd7423e2_amd64",
"9Base-CNV-4.13:container-native-virtualization/hyperconverged-cluster-operator-rhel9@sha256:e681560b184189df03fc84c8a712f32289f42573dd348cda394b19565eb6eca8_arm64",
"9Base-CNV-4.13:container-native-virtualization/hyperconverged-cluster-webhook-rhel9@sha256:06d036d320b3027bb8370bb8e0f6fe8c9f0ec9bca7aac3b5c53698ba4a170042_arm64",
"9Base-CNV-4.13:container-native-virtualization/hyperconverged-cluster-webhook-rhel9@sha256:b5a01336180aad017df62cf8e652f2491b8263ba7e4dd07f858db1ef1924cf2f_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubemacpool-rhel9@sha256:4d190d81eeb3fbe9ed56cf3548dc83a3f81641bfdafa7b42dcfb0d2512566644_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubemacpool-rhel9@sha256:59862a59854f0d5b83dc25ba119f9586a8aff42b6e60d1922f8ae7b4567309ff_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubesecondarydns-rhel9@sha256:121d30d78cc57731ea2242ef2c32430890ac66c2723e65608d5e2f26c3f515cd_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubesecondarydns-rhel9@sha256:b1838f3c8ba3d8113bddea17b78c21e1c1490e2a4a07ea77014edee523d06347_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-console-plugin-rhel9@sha256:86a4b1e3d6ad1d56302c9c058f8bc5826dcfe6c46fb3e0ddaa06818645039020_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-console-plugin-rhel9@sha256:ffb2acd9ae09c1ef9ca756f5eaf6087d0a3957cfc824543949d25f556a97744d_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-dpdk-checkup-rhel9@sha256:525aceb9396010ebcdba14040f267889b807cd84db8e5b4030429b51f0fbf5fe_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-dpdk-checkup-rhel9@sha256:553c4686f56c66cc1e3c5ad9d4051f139d43f821eac3abb98ca5cdb8b5dfe202_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-ssp-operator-rhel9@sha256:901e6cad9534c7bd7c4018c60bccfe49d7280fba5a9901ab4c4d15e9345288c4_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-ssp-operator-rhel9@sha256:badeb0f65f543b209f6af761729d9778b7b73b97d55044016dfba3f38a1f6f18_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-cleanup-vm-rhel9@sha256:28e4975fa4dac22d9da32ed2a10aed039fd957b30140daa36bab2caa998be77a_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-cleanup-vm-rhel9@sha256:b0ff7e812a576ea848590655fc13a85832d5a39f68e7769ceab9da6949da88c7_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-copy-template-rhel9@sha256:4916a6c6b1f9b529187d3b4d5fc99b90157993767b3fe2ad36a9ec77fbb46b10_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-copy-template-rhel9@sha256:f71c36442f1b61cdde7ec58d2c3c78d2039f6d6108e6c35388ef7c1650971fa1_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-create-datavolume-rhel9@sha256:2ad49cf6e2242a9e5861929d9bcab1305a7fc4e34e708f99cff1d7253aa46167_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-create-datavolume-rhel9@sha256:7112400a4ecb23ee2110bf96372fcf9f96ad648a51aa944627b40eb59539a660_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-create-vm-from-template-rhel9@sha256:1411c65bbad7302710788327f6964a4bf5bc20ef70d5e46f4a5c6e7a0e7a0161_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-create-vm-from-template-rhel9@sha256:4d962618aa95600c60c9fc8b890186e510de91177d51949e12797a3558e31328_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-customize-rhel9@sha256:5c23d3f20ea9dcbe7109284d73078ecd516a070e964b844f8d80b1d92ebd55ee_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-customize-rhel9@sha256:a780244e48c6d4f87446d3754c3eb9ab79c0d54675c189da4a659f7a4d5668ea_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-sysprep-rhel9@sha256:84577d949a1bbcaa291c70729127bca4a8994df03068666baa23840877ea8392_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-sysprep-rhel9@sha256:aed630a597a090179e1b0e0c117e536df06b67d0f793f91936aa7388c0c5d7eb_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-modify-vm-template-rhel9@sha256:31d959b80cf57462e1705684bb7e1b78af26bd2c62f1c9e4e51e1d02199b05a8_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-modify-vm-template-rhel9@sha256:66aea526bc10e4c0136ba86e394bbdfe4fbd7f757d6f391a561b51d2ba2f4d46_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-operator-rhel9@sha256:d0cf0e81589f0938de45961eaddfc5ec4782738fd11082de0439b200534259eb_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-operator-rhel9@sha256:f1b1f5044db6bb945584f9d4f31d020597725a286ef368ed0aca2116abb31beb_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-wait-for-vmi-status-rhel9@sha256:39a15d03f113735df03b1a7408227eb9604d942c1f3c1992bcdc7eaf07662711_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-wait-for-vmi-status-rhel9@sha256:afb68af076954fcd18c7a4a1464ea0c2a766e8282eae980051906ed07eaa1707_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-template-validator-rhel9@sha256:02b22c7e7014b5e72d47fed8b6a268cf307638c5510adf3916c51f7f40a52a08_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-template-validator-rhel9@sha256:c0264b9271e602f85b2040ef7f207cdfa46038dc4fa6e4738bf196ef88a71cf8_amd64",
"9Base-CNV-4.13:container-native-virtualization/libguestfs-tools-rhel9@sha256:29ae84575bbca24553cf649256759fd96ff286971d80bc2db129154a7df9b283_amd64",
"9Base-CNV-4.13:container-native-virtualization/libguestfs-tools-rhel9@sha256:6558f60343e068b032167e2340b2c549c5f0258acc5d2614b60966ce79408b01_arm64",
"9Base-CNV-4.13:container-native-virtualization/multus-dynamic-networks-rhel9@sha256:3ecb0162a4b01d1590bf209d717b32a4f0835910d9979823f18c24acba41b503_arm64",
"9Base-CNV-4.13:container-native-virtualization/multus-dynamic-networks-rhel9@sha256:b7f68b6420009e21380d32d6459193aae45e93be9533debe17cb3108571b36b8_amd64",
"9Base-CNV-4.13:container-native-virtualization/ovs-cni-plugin-rhel9@sha256:0f1d372f418744e0aff59ecb0a38f53178aac9c2e9eecfd38aa25ed83e0d1360_arm64",
"9Base-CNV-4.13:container-native-virtualization/ovs-cni-plugin-rhel9@sha256:e8e7a44edbf1713fe74de5c4b8f691cce78f4440c4a32a16ba9ad16694a55396_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-artifacts-server-rhel9@sha256:33d11c1832b49df39c1fca62bad40dbc5c30a452248339aaef449ac99509accb_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-artifacts-server-rhel9@sha256:81fc61b714baecb5a89fa6c0749c14566e0661b8e184ca602fc2e03b9cf431ee_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-apiserver-rhel9@sha256:f6128a63344ed2129f5bce648ddcfaa2869d31cde4b93328d3c22534b97ade10_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-apiserver-rhel9@sha256:feca273a691d09445c6cff6d36b5d590735e867656a9898ce0d89744d98e8006_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-cloner-rhel9@sha256:68e3b9b0291b4fb277ac430269ffce11d13b0a7688cf2ffcdb7f98759c36b4db_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-cloner-rhel9@sha256:6ac212767481bef64d8a7d0252bb8089c0f9751fad4a355aef71bd49dad2ad07_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-controller-rhel9@sha256:65f5263275d9f0a12b8fb057d82adf678778039ec873ca9bde182dea3413c9f1_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-controller-rhel9@sha256:d9e62b2019328be258489ac852eef25f8b1233f29abac6bcea5b406329f97fed_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-importer-rhel9@sha256:00a6d9d24ca1466d450b02269ec3144fc7550f0e5c696e869fbf7ce10cae6093_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-importer-rhel9@sha256:2df07fb21a3575e74aa16ded20129828f2300cd33e8ab369b0362062d49e62d0_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-operator-rhel9@sha256:20ec064750faedd97d11b797c8c1d9a1db5d60d7d76e82e65cfd05eb79d65e29_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-operator-rhel9@sha256:802ee8923d9d8e406b23911406f9748756c0ef4d6954e9e2fd5fb4bdf91dde9a_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-uploadproxy-rhel9@sha256:392d0f61f462c707adfdc21e4239c5c09d8520a80486b41d9d9ae479267d6124_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-uploadproxy-rhel9@sha256:6775f34353eec8f35bead9411dde155530d079bb8d51582fb1f2aacc27dbde1d_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-uploadserver-rhel9@sha256:4528c24672689cfb6505761b6b108fbcc04488192733f23d2bfe39cd42a1d743_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-uploadserver-rhel9@sha256:b22048390387380af94e267c8a9a66813c515997456d59d8ebac1486916b6585_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-controller-rhel9@sha256:3e7880149ee9a68286e390beb3d9779f7403c30fc5136e5370e0e4690a3fd243_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-controller-rhel9@sha256:970edc281d7a731e9f7e8c2d4440fe48a221e5e355d5235c5413b4c3adb28503_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-exportproxy-rhel9@sha256:1bda34d5bff734ad997202f29a5ff6f7362fd79fa90511a422442ef2e3681198_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-exportproxy-rhel9@sha256:de3c4afbf7669b98517cbef2490ec186f0553dd97b05bed80ec36dd883fe507b_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-exportserver-rhel9@sha256:3f7f98645176d42c63cca5c0fc3182a03121af87446ca421b6c72baf07dfca0d_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-exportserver-rhel9@sha256:8f12955cd777eb2409037a6968aa92f50c99d6e07e722951dbcfd0c8c9829b5e_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-handler-rhel9@sha256:5fc47110d866d8048aec50689090ce10705d19d3bb48d2b06727d6d569003af7_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-handler-rhel9@sha256:84ba79ae9658699147d2493df2582ab6df10adbff4d44a533c3fe6a9f45f9691_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-launcher-rhel9@sha256:4990d40d9987d5126d105dd45be2501eaded248cb61bdde5ea8d359bc1e7ebef_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-launcher-rhel9@sha256:95aeacb98209e0baef27ce0e02fbac38d693cea74808fc77107efda0f344bcb5_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-operator-rhel9@sha256:5c1a7e4ed2061938987b900a2394f07121d4037350c9bb6485213a2adfea787d_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-operator-rhel9@sha256:66b1b3b379121d6411ba22283e7d991617177330c93746d37753ab7812b9a00b_arm64",
"9Base-CNV-4.13:container-native-virtualization/virtio-win-rhel9@sha256:8735f51da918408a8826601c082d1b29accf26d59b9978da89b980cb509c1102_arm64",
"9Base-CNV-4.13:container-native-virtualization/virtio-win-rhel9@sha256:d147d2a6eb6f907d1e88f61aaca83596853bc72164583d6dda2b1154b490de25_amd64",
"9Base-CNV-4.13:container-native-virtualization/vm-console-proxy-rhel9@sha256:70a8d0cd66182c25e02679540bae1368b2a9cf687532b58dba41ef30c5ca00c1_arm64",
"9Base-CNV-4.13:container-native-virtualization/vm-console-proxy-rhel9@sha256:7ca921f98f6d81a126907127a611146fb53397869a628678faa1e289c01d22b2_amd64",
"9Base-CNV-4.13:container-native-virtualization/vm-network-latency-checkup-rhel9@sha256:503ea7ac914a9b54e9d665a0227ee0b5d5200cdb5d692aa94c07dd1518d91b70_arm64",
"9Base-CNV-4.13:container-native-virtualization/vm-network-latency-checkup-rhel9@sha256:59fd965975bccf641a0fa7aa01374d45057bd03cda7528248a84b60b1205bf57_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-32189"
},
{
"category": "external",
"summary": "RHBZ#2113814",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2113814"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-32189",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32189"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-32189",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-32189"
},
{
"category": "external",
"summary": "https://go.dev/issue/53871",
"url": "https://go.dev/issue/53871"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-nuts/c/DCFSyTGM0wU",
"url": "https://groups.google.com/g/golang-nuts/c/DCFSyTGM0wU"
}
],
"release_date": "2022-08-01T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-05-18T02:55:08+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"9Base-CNV-4.13:container-native-virtualization/virt-api-rhel9@sha256:e68416321ca8c74a547b3d35897f54813c03481143e402e9bdc4daf315e35b5d_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-api-rhel9@sha256:fdb4ca1bb8b310d713d9c7e88f7d091f4460aa942dbeca5ebcf17281a06daffe_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:3205"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"9Base-CNV-4.13:container-native-virtualization/bridge-marker-rhel9@sha256:8eac196b30a648989cdca5cb153a3bc3d34e47339acba0e4f760bd366496c99d_amd64",
"9Base-CNV-4.13:container-native-virtualization/bridge-marker-rhel9@sha256:e8a55aee3d75a316bb0d7a554c737198823df04b3c05e481c17e45eb2153bced_arm64",
"9Base-CNV-4.13:container-native-virtualization/cluster-network-addons-operator-rhel9@sha256:3bff33e3f40cd1e2b519c2db56734d4bb8df883e155c2f20b1cb9d3d184daec1_amd64",
"9Base-CNV-4.13:container-native-virtualization/cluster-network-addons-operator-rhel9@sha256:f439d2f420bb59eb1d5af14ce2002648d0cfc155d1a1466c8aac9b661fe902b8_arm64",
"9Base-CNV-4.13:container-native-virtualization/cnv-containernetworking-plugins-rhel9@sha256:89f22e541f61a660c9aa9f38ef58e80b84a0517f74e84292107fc252c25465c9_arm64",
"9Base-CNV-4.13:container-native-virtualization/cnv-containernetworking-plugins-rhel9@sha256:bf471997e54e4a75b0d71f492ab295787fdbb14d8c85c4ea8c03f0552dbc3755_amd64",
"9Base-CNV-4.13:container-native-virtualization/cnv-must-gather-rhel9@sha256:9e8efd76924958eb605401abdac08eba97fb83a1ada383bc87a7fb7c87b3a455_arm64",
"9Base-CNV-4.13:container-native-virtualization/cnv-must-gather-rhel9@sha256:b9fc32b5fabedd65a4c3a471879c808af2087277de4278adaa115a732f0468da_amd64",
"9Base-CNV-4.13:container-native-virtualization/hco-bundle-registry-rhel9@sha256:60e89d7a99ff9f20e974430b802dd724a3bb6fa1e01e5a62daad98ac487b3063_amd64",
"9Base-CNV-4.13:container-native-virtualization/hco-bundle-registry-rhel9@sha256:dd20b138045ef1424d83a47e7abcfcbb2ac54577dcec5ed3c186390aaa4c9d84_arm64",
"9Base-CNV-4.13:container-native-virtualization/hostpath-csi-driver-rhel9@sha256:61e2824853d51347593ad909a5e546cd92e4216d6a1df5dffb50dd9cba277cce_amd64",
"9Base-CNV-4.13:container-native-virtualization/hostpath-csi-driver-rhel9@sha256:676d4c23a5f60dd331728af056b0a6b2d3358ac88da23299b1a98dfaca8f288e_arm64",
"9Base-CNV-4.13:container-native-virtualization/hostpath-provisioner-operator-rhel9@sha256:515be94be496c67f5b8fd5f4832fe4385e56476e6589897d6b9fbb9bb2b00f32_amd64",
"9Base-CNV-4.13:container-native-virtualization/hostpath-provisioner-operator-rhel9@sha256:571ae805641dea11646028c946039983c7fd82f138b915dcb8b80c39b465e63c_arm64",
"9Base-CNV-4.13:container-native-virtualization/hostpath-provisioner-rhel9@sha256:ac3fe350bedd6bc43596444ba0f279ccf8a144ab14ac5a9b80ea71c46390b7b4_amd64",
"9Base-CNV-4.13:container-native-virtualization/hostpath-provisioner-rhel9@sha256:d4ed87745b7ee2acca2d83e2c91c2f6dced1903c81495b50f2559b3ba2dde287_arm64",
"9Base-CNV-4.13:container-native-virtualization/hyperconverged-cluster-operator-rhel9@sha256:e5ab9f3be59d3568e3d672ab374efb16990ccf92192eac4e1244b10fcd7423e2_amd64",
"9Base-CNV-4.13:container-native-virtualization/hyperconverged-cluster-operator-rhel9@sha256:e681560b184189df03fc84c8a712f32289f42573dd348cda394b19565eb6eca8_arm64",
"9Base-CNV-4.13:container-native-virtualization/hyperconverged-cluster-webhook-rhel9@sha256:06d036d320b3027bb8370bb8e0f6fe8c9f0ec9bca7aac3b5c53698ba4a170042_arm64",
"9Base-CNV-4.13:container-native-virtualization/hyperconverged-cluster-webhook-rhel9@sha256:b5a01336180aad017df62cf8e652f2491b8263ba7e4dd07f858db1ef1924cf2f_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubemacpool-rhel9@sha256:4d190d81eeb3fbe9ed56cf3548dc83a3f81641bfdafa7b42dcfb0d2512566644_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubemacpool-rhel9@sha256:59862a59854f0d5b83dc25ba119f9586a8aff42b6e60d1922f8ae7b4567309ff_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubesecondarydns-rhel9@sha256:121d30d78cc57731ea2242ef2c32430890ac66c2723e65608d5e2f26c3f515cd_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubesecondarydns-rhel9@sha256:b1838f3c8ba3d8113bddea17b78c21e1c1490e2a4a07ea77014edee523d06347_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-console-plugin-rhel9@sha256:86a4b1e3d6ad1d56302c9c058f8bc5826dcfe6c46fb3e0ddaa06818645039020_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-console-plugin-rhel9@sha256:ffb2acd9ae09c1ef9ca756f5eaf6087d0a3957cfc824543949d25f556a97744d_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-dpdk-checkup-rhel9@sha256:525aceb9396010ebcdba14040f267889b807cd84db8e5b4030429b51f0fbf5fe_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-dpdk-checkup-rhel9@sha256:553c4686f56c66cc1e3c5ad9d4051f139d43f821eac3abb98ca5cdb8b5dfe202_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-ssp-operator-rhel9@sha256:901e6cad9534c7bd7c4018c60bccfe49d7280fba5a9901ab4c4d15e9345288c4_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-ssp-operator-rhel9@sha256:badeb0f65f543b209f6af761729d9778b7b73b97d55044016dfba3f38a1f6f18_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-cleanup-vm-rhel9@sha256:28e4975fa4dac22d9da32ed2a10aed039fd957b30140daa36bab2caa998be77a_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-cleanup-vm-rhel9@sha256:b0ff7e812a576ea848590655fc13a85832d5a39f68e7769ceab9da6949da88c7_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-copy-template-rhel9@sha256:4916a6c6b1f9b529187d3b4d5fc99b90157993767b3fe2ad36a9ec77fbb46b10_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-copy-template-rhel9@sha256:f71c36442f1b61cdde7ec58d2c3c78d2039f6d6108e6c35388ef7c1650971fa1_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-create-datavolume-rhel9@sha256:2ad49cf6e2242a9e5861929d9bcab1305a7fc4e34e708f99cff1d7253aa46167_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-create-datavolume-rhel9@sha256:7112400a4ecb23ee2110bf96372fcf9f96ad648a51aa944627b40eb59539a660_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-create-vm-from-template-rhel9@sha256:1411c65bbad7302710788327f6964a4bf5bc20ef70d5e46f4a5c6e7a0e7a0161_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-create-vm-from-template-rhel9@sha256:4d962618aa95600c60c9fc8b890186e510de91177d51949e12797a3558e31328_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-customize-rhel9@sha256:5c23d3f20ea9dcbe7109284d73078ecd516a070e964b844f8d80b1d92ebd55ee_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-customize-rhel9@sha256:a780244e48c6d4f87446d3754c3eb9ab79c0d54675c189da4a659f7a4d5668ea_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-sysprep-rhel9@sha256:84577d949a1bbcaa291c70729127bca4a8994df03068666baa23840877ea8392_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-sysprep-rhel9@sha256:aed630a597a090179e1b0e0c117e536df06b67d0f793f91936aa7388c0c5d7eb_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-modify-vm-template-rhel9@sha256:31d959b80cf57462e1705684bb7e1b78af26bd2c62f1c9e4e51e1d02199b05a8_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-modify-vm-template-rhel9@sha256:66aea526bc10e4c0136ba86e394bbdfe4fbd7f757d6f391a561b51d2ba2f4d46_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-operator-rhel9@sha256:d0cf0e81589f0938de45961eaddfc5ec4782738fd11082de0439b200534259eb_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-operator-rhel9@sha256:f1b1f5044db6bb945584f9d4f31d020597725a286ef368ed0aca2116abb31beb_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-wait-for-vmi-status-rhel9@sha256:39a15d03f113735df03b1a7408227eb9604d942c1f3c1992bcdc7eaf07662711_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-wait-for-vmi-status-rhel9@sha256:afb68af076954fcd18c7a4a1464ea0c2a766e8282eae980051906ed07eaa1707_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-template-validator-rhel9@sha256:02b22c7e7014b5e72d47fed8b6a268cf307638c5510adf3916c51f7f40a52a08_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-template-validator-rhel9@sha256:c0264b9271e602f85b2040ef7f207cdfa46038dc4fa6e4738bf196ef88a71cf8_amd64",
"9Base-CNV-4.13:container-native-virtualization/libguestfs-tools-rhel9@sha256:29ae84575bbca24553cf649256759fd96ff286971d80bc2db129154a7df9b283_amd64",
"9Base-CNV-4.13:container-native-virtualization/libguestfs-tools-rhel9@sha256:6558f60343e068b032167e2340b2c549c5f0258acc5d2614b60966ce79408b01_arm64",
"9Base-CNV-4.13:container-native-virtualization/multus-dynamic-networks-rhel9@sha256:3ecb0162a4b01d1590bf209d717b32a4f0835910d9979823f18c24acba41b503_arm64",
"9Base-CNV-4.13:container-native-virtualization/multus-dynamic-networks-rhel9@sha256:b7f68b6420009e21380d32d6459193aae45e93be9533debe17cb3108571b36b8_amd64",
"9Base-CNV-4.13:container-native-virtualization/ovs-cni-plugin-rhel9@sha256:0f1d372f418744e0aff59ecb0a38f53178aac9c2e9eecfd38aa25ed83e0d1360_arm64",
"9Base-CNV-4.13:container-native-virtualization/ovs-cni-plugin-rhel9@sha256:e8e7a44edbf1713fe74de5c4b8f691cce78f4440c4a32a16ba9ad16694a55396_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-api-rhel9@sha256:e68416321ca8c74a547b3d35897f54813c03481143e402e9bdc4daf315e35b5d_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-api-rhel9@sha256:fdb4ca1bb8b310d713d9c7e88f7d091f4460aa942dbeca5ebcf17281a06daffe_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-artifacts-server-rhel9@sha256:33d11c1832b49df39c1fca62bad40dbc5c30a452248339aaef449ac99509accb_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-artifacts-server-rhel9@sha256:81fc61b714baecb5a89fa6c0749c14566e0661b8e184ca602fc2e03b9cf431ee_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-apiserver-rhel9@sha256:f6128a63344ed2129f5bce648ddcfaa2869d31cde4b93328d3c22534b97ade10_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-apiserver-rhel9@sha256:feca273a691d09445c6cff6d36b5d590735e867656a9898ce0d89744d98e8006_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-cloner-rhel9@sha256:68e3b9b0291b4fb277ac430269ffce11d13b0a7688cf2ffcdb7f98759c36b4db_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-cloner-rhel9@sha256:6ac212767481bef64d8a7d0252bb8089c0f9751fad4a355aef71bd49dad2ad07_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-controller-rhel9@sha256:65f5263275d9f0a12b8fb057d82adf678778039ec873ca9bde182dea3413c9f1_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-controller-rhel9@sha256:d9e62b2019328be258489ac852eef25f8b1233f29abac6bcea5b406329f97fed_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-importer-rhel9@sha256:00a6d9d24ca1466d450b02269ec3144fc7550f0e5c696e869fbf7ce10cae6093_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-importer-rhel9@sha256:2df07fb21a3575e74aa16ded20129828f2300cd33e8ab369b0362062d49e62d0_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-operator-rhel9@sha256:20ec064750faedd97d11b797c8c1d9a1db5d60d7d76e82e65cfd05eb79d65e29_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-operator-rhel9@sha256:802ee8923d9d8e406b23911406f9748756c0ef4d6954e9e2fd5fb4bdf91dde9a_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-uploadproxy-rhel9@sha256:392d0f61f462c707adfdc21e4239c5c09d8520a80486b41d9d9ae479267d6124_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-uploadproxy-rhel9@sha256:6775f34353eec8f35bead9411dde155530d079bb8d51582fb1f2aacc27dbde1d_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-uploadserver-rhel9@sha256:4528c24672689cfb6505761b6b108fbcc04488192733f23d2bfe39cd42a1d743_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-uploadserver-rhel9@sha256:b22048390387380af94e267c8a9a66813c515997456d59d8ebac1486916b6585_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-controller-rhel9@sha256:3e7880149ee9a68286e390beb3d9779f7403c30fc5136e5370e0e4690a3fd243_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-controller-rhel9@sha256:970edc281d7a731e9f7e8c2d4440fe48a221e5e355d5235c5413b4c3adb28503_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-exportproxy-rhel9@sha256:1bda34d5bff734ad997202f29a5ff6f7362fd79fa90511a422442ef2e3681198_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-exportproxy-rhel9@sha256:de3c4afbf7669b98517cbef2490ec186f0553dd97b05bed80ec36dd883fe507b_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-exportserver-rhel9@sha256:3f7f98645176d42c63cca5c0fc3182a03121af87446ca421b6c72baf07dfca0d_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-exportserver-rhel9@sha256:8f12955cd777eb2409037a6968aa92f50c99d6e07e722951dbcfd0c8c9829b5e_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-handler-rhel9@sha256:5fc47110d866d8048aec50689090ce10705d19d3bb48d2b06727d6d569003af7_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-handler-rhel9@sha256:84ba79ae9658699147d2493df2582ab6df10adbff4d44a533c3fe6a9f45f9691_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-launcher-rhel9@sha256:4990d40d9987d5126d105dd45be2501eaded248cb61bdde5ea8d359bc1e7ebef_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-launcher-rhel9@sha256:95aeacb98209e0baef27ce0e02fbac38d693cea74808fc77107efda0f344bcb5_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-operator-rhel9@sha256:5c1a7e4ed2061938987b900a2394f07121d4037350c9bb6485213a2adfea787d_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-operator-rhel9@sha256:66b1b3b379121d6411ba22283e7d991617177330c93746d37753ab7812b9a00b_arm64",
"9Base-CNV-4.13:container-native-virtualization/virtio-win-rhel9@sha256:8735f51da918408a8826601c082d1b29accf26d59b9978da89b980cb509c1102_arm64",
"9Base-CNV-4.13:container-native-virtualization/virtio-win-rhel9@sha256:d147d2a6eb6f907d1e88f61aaca83596853bc72164583d6dda2b1154b490de25_amd64",
"9Base-CNV-4.13:container-native-virtualization/vm-console-proxy-rhel9@sha256:70a8d0cd66182c25e02679540bae1368b2a9cf687532b58dba41ef30c5ca00c1_arm64",
"9Base-CNV-4.13:container-native-virtualization/vm-console-proxy-rhel9@sha256:7ca921f98f6d81a126907127a611146fb53397869a628678faa1e289c01d22b2_amd64",
"9Base-CNV-4.13:container-native-virtualization/vm-network-latency-checkup-rhel9@sha256:503ea7ac914a9b54e9d665a0227ee0b5d5200cdb5d692aa94c07dd1518d91b70_arm64",
"9Base-CNV-4.13:container-native-virtualization/vm-network-latency-checkup-rhel9@sha256:59fd965975bccf641a0fa7aa01374d45057bd03cda7528248a84b60b1205bf57_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"9Base-CNV-4.13:container-native-virtualization/bridge-marker-rhel9@sha256:8eac196b30a648989cdca5cb153a3bc3d34e47339acba0e4f760bd366496c99d_amd64",
"9Base-CNV-4.13:container-native-virtualization/bridge-marker-rhel9@sha256:e8a55aee3d75a316bb0d7a554c737198823df04b3c05e481c17e45eb2153bced_arm64",
"9Base-CNV-4.13:container-native-virtualization/cluster-network-addons-operator-rhel9@sha256:3bff33e3f40cd1e2b519c2db56734d4bb8df883e155c2f20b1cb9d3d184daec1_amd64",
"9Base-CNV-4.13:container-native-virtualization/cluster-network-addons-operator-rhel9@sha256:f439d2f420bb59eb1d5af14ce2002648d0cfc155d1a1466c8aac9b661fe902b8_arm64",
"9Base-CNV-4.13:container-native-virtualization/cnv-containernetworking-plugins-rhel9@sha256:89f22e541f61a660c9aa9f38ef58e80b84a0517f74e84292107fc252c25465c9_arm64",
"9Base-CNV-4.13:container-native-virtualization/cnv-containernetworking-plugins-rhel9@sha256:bf471997e54e4a75b0d71f492ab295787fdbb14d8c85c4ea8c03f0552dbc3755_amd64",
"9Base-CNV-4.13:container-native-virtualization/cnv-must-gather-rhel9@sha256:9e8efd76924958eb605401abdac08eba97fb83a1ada383bc87a7fb7c87b3a455_arm64",
"9Base-CNV-4.13:container-native-virtualization/cnv-must-gather-rhel9@sha256:b9fc32b5fabedd65a4c3a471879c808af2087277de4278adaa115a732f0468da_amd64",
"9Base-CNV-4.13:container-native-virtualization/hco-bundle-registry-rhel9@sha256:60e89d7a99ff9f20e974430b802dd724a3bb6fa1e01e5a62daad98ac487b3063_amd64",
"9Base-CNV-4.13:container-native-virtualization/hco-bundle-registry-rhel9@sha256:dd20b138045ef1424d83a47e7abcfcbb2ac54577dcec5ed3c186390aaa4c9d84_arm64",
"9Base-CNV-4.13:container-native-virtualization/hostpath-csi-driver-rhel9@sha256:61e2824853d51347593ad909a5e546cd92e4216d6a1df5dffb50dd9cba277cce_amd64",
"9Base-CNV-4.13:container-native-virtualization/hostpath-csi-driver-rhel9@sha256:676d4c23a5f60dd331728af056b0a6b2d3358ac88da23299b1a98dfaca8f288e_arm64",
"9Base-CNV-4.13:container-native-virtualization/hostpath-provisioner-operator-rhel9@sha256:515be94be496c67f5b8fd5f4832fe4385e56476e6589897d6b9fbb9bb2b00f32_amd64",
"9Base-CNV-4.13:container-native-virtualization/hostpath-provisioner-operator-rhel9@sha256:571ae805641dea11646028c946039983c7fd82f138b915dcb8b80c39b465e63c_arm64",
"9Base-CNV-4.13:container-native-virtualization/hostpath-provisioner-rhel9@sha256:ac3fe350bedd6bc43596444ba0f279ccf8a144ab14ac5a9b80ea71c46390b7b4_amd64",
"9Base-CNV-4.13:container-native-virtualization/hostpath-provisioner-rhel9@sha256:d4ed87745b7ee2acca2d83e2c91c2f6dced1903c81495b50f2559b3ba2dde287_arm64",
"9Base-CNV-4.13:container-native-virtualization/hyperconverged-cluster-operator-rhel9@sha256:e5ab9f3be59d3568e3d672ab374efb16990ccf92192eac4e1244b10fcd7423e2_amd64",
"9Base-CNV-4.13:container-native-virtualization/hyperconverged-cluster-operator-rhel9@sha256:e681560b184189df03fc84c8a712f32289f42573dd348cda394b19565eb6eca8_arm64",
"9Base-CNV-4.13:container-native-virtualization/hyperconverged-cluster-webhook-rhel9@sha256:06d036d320b3027bb8370bb8e0f6fe8c9f0ec9bca7aac3b5c53698ba4a170042_arm64",
"9Base-CNV-4.13:container-native-virtualization/hyperconverged-cluster-webhook-rhel9@sha256:b5a01336180aad017df62cf8e652f2491b8263ba7e4dd07f858db1ef1924cf2f_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubemacpool-rhel9@sha256:4d190d81eeb3fbe9ed56cf3548dc83a3f81641bfdafa7b42dcfb0d2512566644_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubemacpool-rhel9@sha256:59862a59854f0d5b83dc25ba119f9586a8aff42b6e60d1922f8ae7b4567309ff_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubesecondarydns-rhel9@sha256:121d30d78cc57731ea2242ef2c32430890ac66c2723e65608d5e2f26c3f515cd_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubesecondarydns-rhel9@sha256:b1838f3c8ba3d8113bddea17b78c21e1c1490e2a4a07ea77014edee523d06347_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-console-plugin-rhel9@sha256:86a4b1e3d6ad1d56302c9c058f8bc5826dcfe6c46fb3e0ddaa06818645039020_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-console-plugin-rhel9@sha256:ffb2acd9ae09c1ef9ca756f5eaf6087d0a3957cfc824543949d25f556a97744d_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-dpdk-checkup-rhel9@sha256:525aceb9396010ebcdba14040f267889b807cd84db8e5b4030429b51f0fbf5fe_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-dpdk-checkup-rhel9@sha256:553c4686f56c66cc1e3c5ad9d4051f139d43f821eac3abb98ca5cdb8b5dfe202_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-ssp-operator-rhel9@sha256:901e6cad9534c7bd7c4018c60bccfe49d7280fba5a9901ab4c4d15e9345288c4_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-ssp-operator-rhel9@sha256:badeb0f65f543b209f6af761729d9778b7b73b97d55044016dfba3f38a1f6f18_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-cleanup-vm-rhel9@sha256:28e4975fa4dac22d9da32ed2a10aed039fd957b30140daa36bab2caa998be77a_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-cleanup-vm-rhel9@sha256:b0ff7e812a576ea848590655fc13a85832d5a39f68e7769ceab9da6949da88c7_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-copy-template-rhel9@sha256:4916a6c6b1f9b529187d3b4d5fc99b90157993767b3fe2ad36a9ec77fbb46b10_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-copy-template-rhel9@sha256:f71c36442f1b61cdde7ec58d2c3c78d2039f6d6108e6c35388ef7c1650971fa1_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-create-datavolume-rhel9@sha256:2ad49cf6e2242a9e5861929d9bcab1305a7fc4e34e708f99cff1d7253aa46167_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-create-datavolume-rhel9@sha256:7112400a4ecb23ee2110bf96372fcf9f96ad648a51aa944627b40eb59539a660_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-create-vm-from-template-rhel9@sha256:1411c65bbad7302710788327f6964a4bf5bc20ef70d5e46f4a5c6e7a0e7a0161_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-create-vm-from-template-rhel9@sha256:4d962618aa95600c60c9fc8b890186e510de91177d51949e12797a3558e31328_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-customize-rhel9@sha256:5c23d3f20ea9dcbe7109284d73078ecd516a070e964b844f8d80b1d92ebd55ee_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-customize-rhel9@sha256:a780244e48c6d4f87446d3754c3eb9ab79c0d54675c189da4a659f7a4d5668ea_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-sysprep-rhel9@sha256:84577d949a1bbcaa291c70729127bca4a8994df03068666baa23840877ea8392_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-sysprep-rhel9@sha256:aed630a597a090179e1b0e0c117e536df06b67d0f793f91936aa7388c0c5d7eb_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-modify-vm-template-rhel9@sha256:31d959b80cf57462e1705684bb7e1b78af26bd2c62f1c9e4e51e1d02199b05a8_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-modify-vm-template-rhel9@sha256:66aea526bc10e4c0136ba86e394bbdfe4fbd7f757d6f391a561b51d2ba2f4d46_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-operator-rhel9@sha256:d0cf0e81589f0938de45961eaddfc5ec4782738fd11082de0439b200534259eb_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-operator-rhel9@sha256:f1b1f5044db6bb945584f9d4f31d020597725a286ef368ed0aca2116abb31beb_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-wait-for-vmi-status-rhel9@sha256:39a15d03f113735df03b1a7408227eb9604d942c1f3c1992bcdc7eaf07662711_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-wait-for-vmi-status-rhel9@sha256:afb68af076954fcd18c7a4a1464ea0c2a766e8282eae980051906ed07eaa1707_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-template-validator-rhel9@sha256:02b22c7e7014b5e72d47fed8b6a268cf307638c5510adf3916c51f7f40a52a08_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-template-validator-rhel9@sha256:c0264b9271e602f85b2040ef7f207cdfa46038dc4fa6e4738bf196ef88a71cf8_amd64",
"9Base-CNV-4.13:container-native-virtualization/libguestfs-tools-rhel9@sha256:29ae84575bbca24553cf649256759fd96ff286971d80bc2db129154a7df9b283_amd64",
"9Base-CNV-4.13:container-native-virtualization/libguestfs-tools-rhel9@sha256:6558f60343e068b032167e2340b2c549c5f0258acc5d2614b60966ce79408b01_arm64",
"9Base-CNV-4.13:container-native-virtualization/multus-dynamic-networks-rhel9@sha256:3ecb0162a4b01d1590bf209d717b32a4f0835910d9979823f18c24acba41b503_arm64",
"9Base-CNV-4.13:container-native-virtualization/multus-dynamic-networks-rhel9@sha256:b7f68b6420009e21380d32d6459193aae45e93be9533debe17cb3108571b36b8_amd64",
"9Base-CNV-4.13:container-native-virtualization/ovs-cni-plugin-rhel9@sha256:0f1d372f418744e0aff59ecb0a38f53178aac9c2e9eecfd38aa25ed83e0d1360_arm64",
"9Base-CNV-4.13:container-native-virtualization/ovs-cni-plugin-rhel9@sha256:e8e7a44edbf1713fe74de5c4b8f691cce78f4440c4a32a16ba9ad16694a55396_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-api-rhel9@sha256:e68416321ca8c74a547b3d35897f54813c03481143e402e9bdc4daf315e35b5d_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-api-rhel9@sha256:fdb4ca1bb8b310d713d9c7e88f7d091f4460aa942dbeca5ebcf17281a06daffe_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-artifacts-server-rhel9@sha256:33d11c1832b49df39c1fca62bad40dbc5c30a452248339aaef449ac99509accb_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-artifacts-server-rhel9@sha256:81fc61b714baecb5a89fa6c0749c14566e0661b8e184ca602fc2e03b9cf431ee_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-apiserver-rhel9@sha256:f6128a63344ed2129f5bce648ddcfaa2869d31cde4b93328d3c22534b97ade10_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-apiserver-rhel9@sha256:feca273a691d09445c6cff6d36b5d590735e867656a9898ce0d89744d98e8006_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-cloner-rhel9@sha256:68e3b9b0291b4fb277ac430269ffce11d13b0a7688cf2ffcdb7f98759c36b4db_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-cloner-rhel9@sha256:6ac212767481bef64d8a7d0252bb8089c0f9751fad4a355aef71bd49dad2ad07_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-controller-rhel9@sha256:65f5263275d9f0a12b8fb057d82adf678778039ec873ca9bde182dea3413c9f1_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-controller-rhel9@sha256:d9e62b2019328be258489ac852eef25f8b1233f29abac6bcea5b406329f97fed_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-importer-rhel9@sha256:00a6d9d24ca1466d450b02269ec3144fc7550f0e5c696e869fbf7ce10cae6093_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-importer-rhel9@sha256:2df07fb21a3575e74aa16ded20129828f2300cd33e8ab369b0362062d49e62d0_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-operator-rhel9@sha256:20ec064750faedd97d11b797c8c1d9a1db5d60d7d76e82e65cfd05eb79d65e29_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-operator-rhel9@sha256:802ee8923d9d8e406b23911406f9748756c0ef4d6954e9e2fd5fb4bdf91dde9a_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-uploadproxy-rhel9@sha256:392d0f61f462c707adfdc21e4239c5c09d8520a80486b41d9d9ae479267d6124_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-uploadproxy-rhel9@sha256:6775f34353eec8f35bead9411dde155530d079bb8d51582fb1f2aacc27dbde1d_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-uploadserver-rhel9@sha256:4528c24672689cfb6505761b6b108fbcc04488192733f23d2bfe39cd42a1d743_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-uploadserver-rhel9@sha256:b22048390387380af94e267c8a9a66813c515997456d59d8ebac1486916b6585_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-controller-rhel9@sha256:3e7880149ee9a68286e390beb3d9779f7403c30fc5136e5370e0e4690a3fd243_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-controller-rhel9@sha256:970edc281d7a731e9f7e8c2d4440fe48a221e5e355d5235c5413b4c3adb28503_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-exportproxy-rhel9@sha256:1bda34d5bff734ad997202f29a5ff6f7362fd79fa90511a422442ef2e3681198_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-exportproxy-rhel9@sha256:de3c4afbf7669b98517cbef2490ec186f0553dd97b05bed80ec36dd883fe507b_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-exportserver-rhel9@sha256:3f7f98645176d42c63cca5c0fc3182a03121af87446ca421b6c72baf07dfca0d_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-exportserver-rhel9@sha256:8f12955cd777eb2409037a6968aa92f50c99d6e07e722951dbcfd0c8c9829b5e_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-handler-rhel9@sha256:5fc47110d866d8048aec50689090ce10705d19d3bb48d2b06727d6d569003af7_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-handler-rhel9@sha256:84ba79ae9658699147d2493df2582ab6df10adbff4d44a533c3fe6a9f45f9691_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-launcher-rhel9@sha256:4990d40d9987d5126d105dd45be2501eaded248cb61bdde5ea8d359bc1e7ebef_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-launcher-rhel9@sha256:95aeacb98209e0baef27ce0e02fbac38d693cea74808fc77107efda0f344bcb5_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-operator-rhel9@sha256:5c1a7e4ed2061938987b900a2394f07121d4037350c9bb6485213a2adfea787d_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-operator-rhel9@sha256:66b1b3b379121d6411ba22283e7d991617177330c93746d37753ab7812b9a00b_arm64",
"9Base-CNV-4.13:container-native-virtualization/virtio-win-rhel9@sha256:8735f51da918408a8826601c082d1b29accf26d59b9978da89b980cb509c1102_arm64",
"9Base-CNV-4.13:container-native-virtualization/virtio-win-rhel9@sha256:d147d2a6eb6f907d1e88f61aaca83596853bc72164583d6dda2b1154b490de25_amd64",
"9Base-CNV-4.13:container-native-virtualization/vm-console-proxy-rhel9@sha256:70a8d0cd66182c25e02679540bae1368b2a9cf687532b58dba41ef30c5ca00c1_arm64",
"9Base-CNV-4.13:container-native-virtualization/vm-console-proxy-rhel9@sha256:7ca921f98f6d81a126907127a611146fb53397869a628678faa1e289c01d22b2_amd64",
"9Base-CNV-4.13:container-native-virtualization/vm-network-latency-checkup-rhel9@sha256:503ea7ac914a9b54e9d665a0227ee0b5d5200cdb5d692aa94c07dd1518d91b70_arm64",
"9Base-CNV-4.13:container-native-virtualization/vm-network-latency-checkup-rhel9@sha256:59fd965975bccf641a0fa7aa01374d45057bd03cda7528248a84b60b1205bf57_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "golang: math/big: decoding big.Float and big.Rat types can panic if the encoded message is too short, potentially allowing a denial of service"
},
{
"cve": "CVE-2022-32190",
"cwe": {
"id": "CWE-22",
"name": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)"
},
"discovery_date": "2022-09-06T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"9Base-CNV-4.13:container-native-virtualization/bridge-marker-rhel9@sha256:8eac196b30a648989cdca5cb153a3bc3d34e47339acba0e4f760bd366496c99d_amd64",
"9Base-CNV-4.13:container-native-virtualization/bridge-marker-rhel9@sha256:e8a55aee3d75a316bb0d7a554c737198823df04b3c05e481c17e45eb2153bced_arm64",
"9Base-CNV-4.13:container-native-virtualization/cluster-network-addons-operator-rhel9@sha256:3bff33e3f40cd1e2b519c2db56734d4bb8df883e155c2f20b1cb9d3d184daec1_amd64",
"9Base-CNV-4.13:container-native-virtualization/cluster-network-addons-operator-rhel9@sha256:f439d2f420bb59eb1d5af14ce2002648d0cfc155d1a1466c8aac9b661fe902b8_arm64",
"9Base-CNV-4.13:container-native-virtualization/cnv-containernetworking-plugins-rhel9@sha256:89f22e541f61a660c9aa9f38ef58e80b84a0517f74e84292107fc252c25465c9_arm64",
"9Base-CNV-4.13:container-native-virtualization/cnv-containernetworking-plugins-rhel9@sha256:bf471997e54e4a75b0d71f492ab295787fdbb14d8c85c4ea8c03f0552dbc3755_amd64",
"9Base-CNV-4.13:container-native-virtualization/cnv-must-gather-rhel9@sha256:9e8efd76924958eb605401abdac08eba97fb83a1ada383bc87a7fb7c87b3a455_arm64",
"9Base-CNV-4.13:container-native-virtualization/cnv-must-gather-rhel9@sha256:b9fc32b5fabedd65a4c3a471879c808af2087277de4278adaa115a732f0468da_amd64",
"9Base-CNV-4.13:container-native-virtualization/hco-bundle-registry-rhel9@sha256:60e89d7a99ff9f20e974430b802dd724a3bb6fa1e01e5a62daad98ac487b3063_amd64",
"9Base-CNV-4.13:container-native-virtualization/hco-bundle-registry-rhel9@sha256:dd20b138045ef1424d83a47e7abcfcbb2ac54577dcec5ed3c186390aaa4c9d84_arm64",
"9Base-CNV-4.13:container-native-virtualization/hostpath-csi-driver-rhel9@sha256:61e2824853d51347593ad909a5e546cd92e4216d6a1df5dffb50dd9cba277cce_amd64",
"9Base-CNV-4.13:container-native-virtualization/hostpath-csi-driver-rhel9@sha256:676d4c23a5f60dd331728af056b0a6b2d3358ac88da23299b1a98dfaca8f288e_arm64",
"9Base-CNV-4.13:container-native-virtualization/hostpath-provisioner-operator-rhel9@sha256:515be94be496c67f5b8fd5f4832fe4385e56476e6589897d6b9fbb9bb2b00f32_amd64",
"9Base-CNV-4.13:container-native-virtualization/hostpath-provisioner-operator-rhel9@sha256:571ae805641dea11646028c946039983c7fd82f138b915dcb8b80c39b465e63c_arm64",
"9Base-CNV-4.13:container-native-virtualization/hostpath-provisioner-rhel9@sha256:ac3fe350bedd6bc43596444ba0f279ccf8a144ab14ac5a9b80ea71c46390b7b4_amd64",
"9Base-CNV-4.13:container-native-virtualization/hostpath-provisioner-rhel9@sha256:d4ed87745b7ee2acca2d83e2c91c2f6dced1903c81495b50f2559b3ba2dde287_arm64",
"9Base-CNV-4.13:container-native-virtualization/hyperconverged-cluster-operator-rhel9@sha256:e5ab9f3be59d3568e3d672ab374efb16990ccf92192eac4e1244b10fcd7423e2_amd64",
"9Base-CNV-4.13:container-native-virtualization/hyperconverged-cluster-operator-rhel9@sha256:e681560b184189df03fc84c8a712f32289f42573dd348cda394b19565eb6eca8_arm64",
"9Base-CNV-4.13:container-native-virtualization/hyperconverged-cluster-webhook-rhel9@sha256:06d036d320b3027bb8370bb8e0f6fe8c9f0ec9bca7aac3b5c53698ba4a170042_arm64",
"9Base-CNV-4.13:container-native-virtualization/hyperconverged-cluster-webhook-rhel9@sha256:b5a01336180aad017df62cf8e652f2491b8263ba7e4dd07f858db1ef1924cf2f_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubemacpool-rhel9@sha256:4d190d81eeb3fbe9ed56cf3548dc83a3f81641bfdafa7b42dcfb0d2512566644_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubemacpool-rhel9@sha256:59862a59854f0d5b83dc25ba119f9586a8aff42b6e60d1922f8ae7b4567309ff_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubesecondarydns-rhel9@sha256:121d30d78cc57731ea2242ef2c32430890ac66c2723e65608d5e2f26c3f515cd_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubesecondarydns-rhel9@sha256:b1838f3c8ba3d8113bddea17b78c21e1c1490e2a4a07ea77014edee523d06347_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-console-plugin-rhel9@sha256:86a4b1e3d6ad1d56302c9c058f8bc5826dcfe6c46fb3e0ddaa06818645039020_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-console-plugin-rhel9@sha256:ffb2acd9ae09c1ef9ca756f5eaf6087d0a3957cfc824543949d25f556a97744d_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-dpdk-checkup-rhel9@sha256:525aceb9396010ebcdba14040f267889b807cd84db8e5b4030429b51f0fbf5fe_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-dpdk-checkup-rhel9@sha256:553c4686f56c66cc1e3c5ad9d4051f139d43f821eac3abb98ca5cdb8b5dfe202_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-ssp-operator-rhel9@sha256:901e6cad9534c7bd7c4018c60bccfe49d7280fba5a9901ab4c4d15e9345288c4_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-ssp-operator-rhel9@sha256:badeb0f65f543b209f6af761729d9778b7b73b97d55044016dfba3f38a1f6f18_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-cleanup-vm-rhel9@sha256:28e4975fa4dac22d9da32ed2a10aed039fd957b30140daa36bab2caa998be77a_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-cleanup-vm-rhel9@sha256:b0ff7e812a576ea848590655fc13a85832d5a39f68e7769ceab9da6949da88c7_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-copy-template-rhel9@sha256:4916a6c6b1f9b529187d3b4d5fc99b90157993767b3fe2ad36a9ec77fbb46b10_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-copy-template-rhel9@sha256:f71c36442f1b61cdde7ec58d2c3c78d2039f6d6108e6c35388ef7c1650971fa1_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-create-datavolume-rhel9@sha256:2ad49cf6e2242a9e5861929d9bcab1305a7fc4e34e708f99cff1d7253aa46167_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-create-datavolume-rhel9@sha256:7112400a4ecb23ee2110bf96372fcf9f96ad648a51aa944627b40eb59539a660_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-create-vm-from-template-rhel9@sha256:1411c65bbad7302710788327f6964a4bf5bc20ef70d5e46f4a5c6e7a0e7a0161_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-create-vm-from-template-rhel9@sha256:4d962618aa95600c60c9fc8b890186e510de91177d51949e12797a3558e31328_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-customize-rhel9@sha256:5c23d3f20ea9dcbe7109284d73078ecd516a070e964b844f8d80b1d92ebd55ee_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-customize-rhel9@sha256:a780244e48c6d4f87446d3754c3eb9ab79c0d54675c189da4a659f7a4d5668ea_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-sysprep-rhel9@sha256:84577d949a1bbcaa291c70729127bca4a8994df03068666baa23840877ea8392_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-sysprep-rhel9@sha256:aed630a597a090179e1b0e0c117e536df06b67d0f793f91936aa7388c0c5d7eb_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-modify-vm-template-rhel9@sha256:31d959b80cf57462e1705684bb7e1b78af26bd2c62f1c9e4e51e1d02199b05a8_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-modify-vm-template-rhel9@sha256:66aea526bc10e4c0136ba86e394bbdfe4fbd7f757d6f391a561b51d2ba2f4d46_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-operator-rhel9@sha256:d0cf0e81589f0938de45961eaddfc5ec4782738fd11082de0439b200534259eb_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-operator-rhel9@sha256:f1b1f5044db6bb945584f9d4f31d020597725a286ef368ed0aca2116abb31beb_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-wait-for-vmi-status-rhel9@sha256:39a15d03f113735df03b1a7408227eb9604d942c1f3c1992bcdc7eaf07662711_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-wait-for-vmi-status-rhel9@sha256:afb68af076954fcd18c7a4a1464ea0c2a766e8282eae980051906ed07eaa1707_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-template-validator-rhel9@sha256:02b22c7e7014b5e72d47fed8b6a268cf307638c5510adf3916c51f7f40a52a08_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-template-validator-rhel9@sha256:c0264b9271e602f85b2040ef7f207cdfa46038dc4fa6e4738bf196ef88a71cf8_amd64",
"9Base-CNV-4.13:container-native-virtualization/libguestfs-tools-rhel9@sha256:29ae84575bbca24553cf649256759fd96ff286971d80bc2db129154a7df9b283_amd64",
"9Base-CNV-4.13:container-native-virtualization/libguestfs-tools-rhel9@sha256:6558f60343e068b032167e2340b2c549c5f0258acc5d2614b60966ce79408b01_arm64",
"9Base-CNV-4.13:container-native-virtualization/multus-dynamic-networks-rhel9@sha256:3ecb0162a4b01d1590bf209d717b32a4f0835910d9979823f18c24acba41b503_arm64",
"9Base-CNV-4.13:container-native-virtualization/multus-dynamic-networks-rhel9@sha256:b7f68b6420009e21380d32d6459193aae45e93be9533debe17cb3108571b36b8_amd64",
"9Base-CNV-4.13:container-native-virtualization/ovs-cni-plugin-rhel9@sha256:0f1d372f418744e0aff59ecb0a38f53178aac9c2e9eecfd38aa25ed83e0d1360_arm64",
"9Base-CNV-4.13:container-native-virtualization/ovs-cni-plugin-rhel9@sha256:e8e7a44edbf1713fe74de5c4b8f691cce78f4440c4a32a16ba9ad16694a55396_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-artifacts-server-rhel9@sha256:33d11c1832b49df39c1fca62bad40dbc5c30a452248339aaef449ac99509accb_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-artifacts-server-rhel9@sha256:81fc61b714baecb5a89fa6c0749c14566e0661b8e184ca602fc2e03b9cf431ee_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-apiserver-rhel9@sha256:f6128a63344ed2129f5bce648ddcfaa2869d31cde4b93328d3c22534b97ade10_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-apiserver-rhel9@sha256:feca273a691d09445c6cff6d36b5d590735e867656a9898ce0d89744d98e8006_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-cloner-rhel9@sha256:68e3b9b0291b4fb277ac430269ffce11d13b0a7688cf2ffcdb7f98759c36b4db_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-cloner-rhel9@sha256:6ac212767481bef64d8a7d0252bb8089c0f9751fad4a355aef71bd49dad2ad07_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-controller-rhel9@sha256:65f5263275d9f0a12b8fb057d82adf678778039ec873ca9bde182dea3413c9f1_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-controller-rhel9@sha256:d9e62b2019328be258489ac852eef25f8b1233f29abac6bcea5b406329f97fed_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-importer-rhel9@sha256:00a6d9d24ca1466d450b02269ec3144fc7550f0e5c696e869fbf7ce10cae6093_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-importer-rhel9@sha256:2df07fb21a3575e74aa16ded20129828f2300cd33e8ab369b0362062d49e62d0_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-operator-rhel9@sha256:20ec064750faedd97d11b797c8c1d9a1db5d60d7d76e82e65cfd05eb79d65e29_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-operator-rhel9@sha256:802ee8923d9d8e406b23911406f9748756c0ef4d6954e9e2fd5fb4bdf91dde9a_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-uploadproxy-rhel9@sha256:392d0f61f462c707adfdc21e4239c5c09d8520a80486b41d9d9ae479267d6124_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-uploadproxy-rhel9@sha256:6775f34353eec8f35bead9411dde155530d079bb8d51582fb1f2aacc27dbde1d_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-uploadserver-rhel9@sha256:4528c24672689cfb6505761b6b108fbcc04488192733f23d2bfe39cd42a1d743_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-uploadserver-rhel9@sha256:b22048390387380af94e267c8a9a66813c515997456d59d8ebac1486916b6585_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-controller-rhel9@sha256:3e7880149ee9a68286e390beb3d9779f7403c30fc5136e5370e0e4690a3fd243_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-controller-rhel9@sha256:970edc281d7a731e9f7e8c2d4440fe48a221e5e355d5235c5413b4c3adb28503_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-exportproxy-rhel9@sha256:1bda34d5bff734ad997202f29a5ff6f7362fd79fa90511a422442ef2e3681198_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-exportproxy-rhel9@sha256:de3c4afbf7669b98517cbef2490ec186f0553dd97b05bed80ec36dd883fe507b_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-exportserver-rhel9@sha256:3f7f98645176d42c63cca5c0fc3182a03121af87446ca421b6c72baf07dfca0d_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-exportserver-rhel9@sha256:8f12955cd777eb2409037a6968aa92f50c99d6e07e722951dbcfd0c8c9829b5e_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-handler-rhel9@sha256:5fc47110d866d8048aec50689090ce10705d19d3bb48d2b06727d6d569003af7_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-handler-rhel9@sha256:84ba79ae9658699147d2493df2582ab6df10adbff4d44a533c3fe6a9f45f9691_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-launcher-rhel9@sha256:4990d40d9987d5126d105dd45be2501eaded248cb61bdde5ea8d359bc1e7ebef_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-launcher-rhel9@sha256:95aeacb98209e0baef27ce0e02fbac38d693cea74808fc77107efda0f344bcb5_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-operator-rhel9@sha256:5c1a7e4ed2061938987b900a2394f07121d4037350c9bb6485213a2adfea787d_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-operator-rhel9@sha256:66b1b3b379121d6411ba22283e7d991617177330c93746d37753ab7812b9a00b_arm64",
"9Base-CNV-4.13:container-native-virtualization/virtio-win-rhel9@sha256:8735f51da918408a8826601c082d1b29accf26d59b9978da89b980cb509c1102_arm64",
"9Base-CNV-4.13:container-native-virtualization/virtio-win-rhel9@sha256:d147d2a6eb6f907d1e88f61aaca83596853bc72164583d6dda2b1154b490de25_amd64",
"9Base-CNV-4.13:container-native-virtualization/vm-console-proxy-rhel9@sha256:70a8d0cd66182c25e02679540bae1368b2a9cf687532b58dba41ef30c5ca00c1_arm64",
"9Base-CNV-4.13:container-native-virtualization/vm-console-proxy-rhel9@sha256:7ca921f98f6d81a126907127a611146fb53397869a628678faa1e289c01d22b2_amd64",
"9Base-CNV-4.13:container-native-virtualization/vm-network-latency-checkup-rhel9@sha256:503ea7ac914a9b54e9d665a0227ee0b5d5200cdb5d692aa94c07dd1518d91b70_arm64",
"9Base-CNV-4.13:container-native-virtualization/vm-network-latency-checkup-rhel9@sha256:59fd965975bccf641a0fa7aa01374d45057bd03cda7528248a84b60b1205bf57_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2124668"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the golang package. The JoinPath doesn\u0027t remove the ../ path components appended to a domain that is not terminated by a slash, possibly leading to a directory traversal attack.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: net/url: JoinPath does not strip relative path components in all circumstances",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The vulnerable functions, JoinPath and URL.JoinPath was introduced in upstream go1.19, whereas, RHEL ships go1.17 and go1.18 versions, which does not contain the vulnerable code. Hence, packages shipped with RHEL-8, RHEL-9 are not affected.\n\nAll Y stream releases of OpenShift Container Platform 4 run on RHEL-8 or RHEL-9, so OCP 4 is also not affected.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"9Base-CNV-4.13:container-native-virtualization/virt-api-rhel9@sha256:e68416321ca8c74a547b3d35897f54813c03481143e402e9bdc4daf315e35b5d_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-api-rhel9@sha256:fdb4ca1bb8b310d713d9c7e88f7d091f4460aa942dbeca5ebcf17281a06daffe_amd64"
],
"known_not_affected": [
"9Base-CNV-4.13:container-native-virtualization/bridge-marker-rhel9@sha256:8eac196b30a648989cdca5cb153a3bc3d34e47339acba0e4f760bd366496c99d_amd64",
"9Base-CNV-4.13:container-native-virtualization/bridge-marker-rhel9@sha256:e8a55aee3d75a316bb0d7a554c737198823df04b3c05e481c17e45eb2153bced_arm64",
"9Base-CNV-4.13:container-native-virtualization/cluster-network-addons-operator-rhel9@sha256:3bff33e3f40cd1e2b519c2db56734d4bb8df883e155c2f20b1cb9d3d184daec1_amd64",
"9Base-CNV-4.13:container-native-virtualization/cluster-network-addons-operator-rhel9@sha256:f439d2f420bb59eb1d5af14ce2002648d0cfc155d1a1466c8aac9b661fe902b8_arm64",
"9Base-CNV-4.13:container-native-virtualization/cnv-containernetworking-plugins-rhel9@sha256:89f22e541f61a660c9aa9f38ef58e80b84a0517f74e84292107fc252c25465c9_arm64",
"9Base-CNV-4.13:container-native-virtualization/cnv-containernetworking-plugins-rhel9@sha256:bf471997e54e4a75b0d71f492ab295787fdbb14d8c85c4ea8c03f0552dbc3755_amd64",
"9Base-CNV-4.13:container-native-virtualization/cnv-must-gather-rhel9@sha256:9e8efd76924958eb605401abdac08eba97fb83a1ada383bc87a7fb7c87b3a455_arm64",
"9Base-CNV-4.13:container-native-virtualization/cnv-must-gather-rhel9@sha256:b9fc32b5fabedd65a4c3a471879c808af2087277de4278adaa115a732f0468da_amd64",
"9Base-CNV-4.13:container-native-virtualization/hco-bundle-registry-rhel9@sha256:60e89d7a99ff9f20e974430b802dd724a3bb6fa1e01e5a62daad98ac487b3063_amd64",
"9Base-CNV-4.13:container-native-virtualization/hco-bundle-registry-rhel9@sha256:dd20b138045ef1424d83a47e7abcfcbb2ac54577dcec5ed3c186390aaa4c9d84_arm64",
"9Base-CNV-4.13:container-native-virtualization/hostpath-csi-driver-rhel9@sha256:61e2824853d51347593ad909a5e546cd92e4216d6a1df5dffb50dd9cba277cce_amd64",
"9Base-CNV-4.13:container-native-virtualization/hostpath-csi-driver-rhel9@sha256:676d4c23a5f60dd331728af056b0a6b2d3358ac88da23299b1a98dfaca8f288e_arm64",
"9Base-CNV-4.13:container-native-virtualization/hostpath-provisioner-operator-rhel9@sha256:515be94be496c67f5b8fd5f4832fe4385e56476e6589897d6b9fbb9bb2b00f32_amd64",
"9Base-CNV-4.13:container-native-virtualization/hostpath-provisioner-operator-rhel9@sha256:571ae805641dea11646028c946039983c7fd82f138b915dcb8b80c39b465e63c_arm64",
"9Base-CNV-4.13:container-native-virtualization/hostpath-provisioner-rhel9@sha256:ac3fe350bedd6bc43596444ba0f279ccf8a144ab14ac5a9b80ea71c46390b7b4_amd64",
"9Base-CNV-4.13:container-native-virtualization/hostpath-provisioner-rhel9@sha256:d4ed87745b7ee2acca2d83e2c91c2f6dced1903c81495b50f2559b3ba2dde287_arm64",
"9Base-CNV-4.13:container-native-virtualization/hyperconverged-cluster-operator-rhel9@sha256:e5ab9f3be59d3568e3d672ab374efb16990ccf92192eac4e1244b10fcd7423e2_amd64",
"9Base-CNV-4.13:container-native-virtualization/hyperconverged-cluster-operator-rhel9@sha256:e681560b184189df03fc84c8a712f32289f42573dd348cda394b19565eb6eca8_arm64",
"9Base-CNV-4.13:container-native-virtualization/hyperconverged-cluster-webhook-rhel9@sha256:06d036d320b3027bb8370bb8e0f6fe8c9f0ec9bca7aac3b5c53698ba4a170042_arm64",
"9Base-CNV-4.13:container-native-virtualization/hyperconverged-cluster-webhook-rhel9@sha256:b5a01336180aad017df62cf8e652f2491b8263ba7e4dd07f858db1ef1924cf2f_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubemacpool-rhel9@sha256:4d190d81eeb3fbe9ed56cf3548dc83a3f81641bfdafa7b42dcfb0d2512566644_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubemacpool-rhel9@sha256:59862a59854f0d5b83dc25ba119f9586a8aff42b6e60d1922f8ae7b4567309ff_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubesecondarydns-rhel9@sha256:121d30d78cc57731ea2242ef2c32430890ac66c2723e65608d5e2f26c3f515cd_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubesecondarydns-rhel9@sha256:b1838f3c8ba3d8113bddea17b78c21e1c1490e2a4a07ea77014edee523d06347_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-console-plugin-rhel9@sha256:86a4b1e3d6ad1d56302c9c058f8bc5826dcfe6c46fb3e0ddaa06818645039020_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-console-plugin-rhel9@sha256:ffb2acd9ae09c1ef9ca756f5eaf6087d0a3957cfc824543949d25f556a97744d_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-dpdk-checkup-rhel9@sha256:525aceb9396010ebcdba14040f267889b807cd84db8e5b4030429b51f0fbf5fe_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-dpdk-checkup-rhel9@sha256:553c4686f56c66cc1e3c5ad9d4051f139d43f821eac3abb98ca5cdb8b5dfe202_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-ssp-operator-rhel9@sha256:901e6cad9534c7bd7c4018c60bccfe49d7280fba5a9901ab4c4d15e9345288c4_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-ssp-operator-rhel9@sha256:badeb0f65f543b209f6af761729d9778b7b73b97d55044016dfba3f38a1f6f18_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-cleanup-vm-rhel9@sha256:28e4975fa4dac22d9da32ed2a10aed039fd957b30140daa36bab2caa998be77a_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-cleanup-vm-rhel9@sha256:b0ff7e812a576ea848590655fc13a85832d5a39f68e7769ceab9da6949da88c7_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-copy-template-rhel9@sha256:4916a6c6b1f9b529187d3b4d5fc99b90157993767b3fe2ad36a9ec77fbb46b10_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-copy-template-rhel9@sha256:f71c36442f1b61cdde7ec58d2c3c78d2039f6d6108e6c35388ef7c1650971fa1_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-create-datavolume-rhel9@sha256:2ad49cf6e2242a9e5861929d9bcab1305a7fc4e34e708f99cff1d7253aa46167_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-create-datavolume-rhel9@sha256:7112400a4ecb23ee2110bf96372fcf9f96ad648a51aa944627b40eb59539a660_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-create-vm-from-template-rhel9@sha256:1411c65bbad7302710788327f6964a4bf5bc20ef70d5e46f4a5c6e7a0e7a0161_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-create-vm-from-template-rhel9@sha256:4d962618aa95600c60c9fc8b890186e510de91177d51949e12797a3558e31328_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-customize-rhel9@sha256:5c23d3f20ea9dcbe7109284d73078ecd516a070e964b844f8d80b1d92ebd55ee_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-customize-rhel9@sha256:a780244e48c6d4f87446d3754c3eb9ab79c0d54675c189da4a659f7a4d5668ea_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-sysprep-rhel9@sha256:84577d949a1bbcaa291c70729127bca4a8994df03068666baa23840877ea8392_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-sysprep-rhel9@sha256:aed630a597a090179e1b0e0c117e536df06b67d0f793f91936aa7388c0c5d7eb_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-modify-vm-template-rhel9@sha256:31d959b80cf57462e1705684bb7e1b78af26bd2c62f1c9e4e51e1d02199b05a8_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-modify-vm-template-rhel9@sha256:66aea526bc10e4c0136ba86e394bbdfe4fbd7f757d6f391a561b51d2ba2f4d46_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-operator-rhel9@sha256:d0cf0e81589f0938de45961eaddfc5ec4782738fd11082de0439b200534259eb_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-operator-rhel9@sha256:f1b1f5044db6bb945584f9d4f31d020597725a286ef368ed0aca2116abb31beb_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-wait-for-vmi-status-rhel9@sha256:39a15d03f113735df03b1a7408227eb9604d942c1f3c1992bcdc7eaf07662711_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-wait-for-vmi-status-rhel9@sha256:afb68af076954fcd18c7a4a1464ea0c2a766e8282eae980051906ed07eaa1707_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-template-validator-rhel9@sha256:02b22c7e7014b5e72d47fed8b6a268cf307638c5510adf3916c51f7f40a52a08_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-template-validator-rhel9@sha256:c0264b9271e602f85b2040ef7f207cdfa46038dc4fa6e4738bf196ef88a71cf8_amd64",
"9Base-CNV-4.13:container-native-virtualization/libguestfs-tools-rhel9@sha256:29ae84575bbca24553cf649256759fd96ff286971d80bc2db129154a7df9b283_amd64",
"9Base-CNV-4.13:container-native-virtualization/libguestfs-tools-rhel9@sha256:6558f60343e068b032167e2340b2c549c5f0258acc5d2614b60966ce79408b01_arm64",
"9Base-CNV-4.13:container-native-virtualization/multus-dynamic-networks-rhel9@sha256:3ecb0162a4b01d1590bf209d717b32a4f0835910d9979823f18c24acba41b503_arm64",
"9Base-CNV-4.13:container-native-virtualization/multus-dynamic-networks-rhel9@sha256:b7f68b6420009e21380d32d6459193aae45e93be9533debe17cb3108571b36b8_amd64",
"9Base-CNV-4.13:container-native-virtualization/ovs-cni-plugin-rhel9@sha256:0f1d372f418744e0aff59ecb0a38f53178aac9c2e9eecfd38aa25ed83e0d1360_arm64",
"9Base-CNV-4.13:container-native-virtualization/ovs-cni-plugin-rhel9@sha256:e8e7a44edbf1713fe74de5c4b8f691cce78f4440c4a32a16ba9ad16694a55396_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-artifacts-server-rhel9@sha256:33d11c1832b49df39c1fca62bad40dbc5c30a452248339aaef449ac99509accb_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-artifacts-server-rhel9@sha256:81fc61b714baecb5a89fa6c0749c14566e0661b8e184ca602fc2e03b9cf431ee_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-apiserver-rhel9@sha256:f6128a63344ed2129f5bce648ddcfaa2869d31cde4b93328d3c22534b97ade10_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-apiserver-rhel9@sha256:feca273a691d09445c6cff6d36b5d590735e867656a9898ce0d89744d98e8006_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-cloner-rhel9@sha256:68e3b9b0291b4fb277ac430269ffce11d13b0a7688cf2ffcdb7f98759c36b4db_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-cloner-rhel9@sha256:6ac212767481bef64d8a7d0252bb8089c0f9751fad4a355aef71bd49dad2ad07_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-controller-rhel9@sha256:65f5263275d9f0a12b8fb057d82adf678778039ec873ca9bde182dea3413c9f1_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-controller-rhel9@sha256:d9e62b2019328be258489ac852eef25f8b1233f29abac6bcea5b406329f97fed_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-importer-rhel9@sha256:00a6d9d24ca1466d450b02269ec3144fc7550f0e5c696e869fbf7ce10cae6093_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-importer-rhel9@sha256:2df07fb21a3575e74aa16ded20129828f2300cd33e8ab369b0362062d49e62d0_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-operator-rhel9@sha256:20ec064750faedd97d11b797c8c1d9a1db5d60d7d76e82e65cfd05eb79d65e29_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-operator-rhel9@sha256:802ee8923d9d8e406b23911406f9748756c0ef4d6954e9e2fd5fb4bdf91dde9a_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-uploadproxy-rhel9@sha256:392d0f61f462c707adfdc21e4239c5c09d8520a80486b41d9d9ae479267d6124_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-uploadproxy-rhel9@sha256:6775f34353eec8f35bead9411dde155530d079bb8d51582fb1f2aacc27dbde1d_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-uploadserver-rhel9@sha256:4528c24672689cfb6505761b6b108fbcc04488192733f23d2bfe39cd42a1d743_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-uploadserver-rhel9@sha256:b22048390387380af94e267c8a9a66813c515997456d59d8ebac1486916b6585_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-controller-rhel9@sha256:3e7880149ee9a68286e390beb3d9779f7403c30fc5136e5370e0e4690a3fd243_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-controller-rhel9@sha256:970edc281d7a731e9f7e8c2d4440fe48a221e5e355d5235c5413b4c3adb28503_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-exportproxy-rhel9@sha256:1bda34d5bff734ad997202f29a5ff6f7362fd79fa90511a422442ef2e3681198_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-exportproxy-rhel9@sha256:de3c4afbf7669b98517cbef2490ec186f0553dd97b05bed80ec36dd883fe507b_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-exportserver-rhel9@sha256:3f7f98645176d42c63cca5c0fc3182a03121af87446ca421b6c72baf07dfca0d_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-exportserver-rhel9@sha256:8f12955cd777eb2409037a6968aa92f50c99d6e07e722951dbcfd0c8c9829b5e_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-handler-rhel9@sha256:5fc47110d866d8048aec50689090ce10705d19d3bb48d2b06727d6d569003af7_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-handler-rhel9@sha256:84ba79ae9658699147d2493df2582ab6df10adbff4d44a533c3fe6a9f45f9691_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-launcher-rhel9@sha256:4990d40d9987d5126d105dd45be2501eaded248cb61bdde5ea8d359bc1e7ebef_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-launcher-rhel9@sha256:95aeacb98209e0baef27ce0e02fbac38d693cea74808fc77107efda0f344bcb5_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-operator-rhel9@sha256:5c1a7e4ed2061938987b900a2394f07121d4037350c9bb6485213a2adfea787d_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-operator-rhel9@sha256:66b1b3b379121d6411ba22283e7d991617177330c93746d37753ab7812b9a00b_arm64",
"9Base-CNV-4.13:container-native-virtualization/virtio-win-rhel9@sha256:8735f51da918408a8826601c082d1b29accf26d59b9978da89b980cb509c1102_arm64",
"9Base-CNV-4.13:container-native-virtualization/virtio-win-rhel9@sha256:d147d2a6eb6f907d1e88f61aaca83596853bc72164583d6dda2b1154b490de25_amd64",
"9Base-CNV-4.13:container-native-virtualization/vm-console-proxy-rhel9@sha256:70a8d0cd66182c25e02679540bae1368b2a9cf687532b58dba41ef30c5ca00c1_arm64",
"9Base-CNV-4.13:container-native-virtualization/vm-console-proxy-rhel9@sha256:7ca921f98f6d81a126907127a611146fb53397869a628678faa1e289c01d22b2_amd64",
"9Base-CNV-4.13:container-native-virtualization/vm-network-latency-checkup-rhel9@sha256:503ea7ac914a9b54e9d665a0227ee0b5d5200cdb5d692aa94c07dd1518d91b70_arm64",
"9Base-CNV-4.13:container-native-virtualization/vm-network-latency-checkup-rhel9@sha256:59fd965975bccf641a0fa7aa01374d45057bd03cda7528248a84b60b1205bf57_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-32190"
},
{
"category": "external",
"summary": "RHBZ#2124668",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2124668"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-32190",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32190"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-32190",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-32190"
},
{
"category": "external",
"summary": "https://go.dev/issue/54385",
"url": "https://go.dev/issue/54385"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/x49AQzIVX-s/m/0tgO0pjiBQAJ",
"url": "https://groups.google.com/g/golang-announce/c/x49AQzIVX-s/m/0tgO0pjiBQAJ"
}
],
"release_date": "2022-09-06T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-05-18T02:55:08+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"9Base-CNV-4.13:container-native-virtualization/virt-api-rhel9@sha256:e68416321ca8c74a547b3d35897f54813c03481143e402e9bdc4daf315e35b5d_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-api-rhel9@sha256:fdb4ca1bb8b310d713d9c7e88f7d091f4460aa942dbeca5ebcf17281a06daffe_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:3205"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"9Base-CNV-4.13:container-native-virtualization/bridge-marker-rhel9@sha256:8eac196b30a648989cdca5cb153a3bc3d34e47339acba0e4f760bd366496c99d_amd64",
"9Base-CNV-4.13:container-native-virtualization/bridge-marker-rhel9@sha256:e8a55aee3d75a316bb0d7a554c737198823df04b3c05e481c17e45eb2153bced_arm64",
"9Base-CNV-4.13:container-native-virtualization/cluster-network-addons-operator-rhel9@sha256:3bff33e3f40cd1e2b519c2db56734d4bb8df883e155c2f20b1cb9d3d184daec1_amd64",
"9Base-CNV-4.13:container-native-virtualization/cluster-network-addons-operator-rhel9@sha256:f439d2f420bb59eb1d5af14ce2002648d0cfc155d1a1466c8aac9b661fe902b8_arm64",
"9Base-CNV-4.13:container-native-virtualization/cnv-containernetworking-plugins-rhel9@sha256:89f22e541f61a660c9aa9f38ef58e80b84a0517f74e84292107fc252c25465c9_arm64",
"9Base-CNV-4.13:container-native-virtualization/cnv-containernetworking-plugins-rhel9@sha256:bf471997e54e4a75b0d71f492ab295787fdbb14d8c85c4ea8c03f0552dbc3755_amd64",
"9Base-CNV-4.13:container-native-virtualization/cnv-must-gather-rhel9@sha256:9e8efd76924958eb605401abdac08eba97fb83a1ada383bc87a7fb7c87b3a455_arm64",
"9Base-CNV-4.13:container-native-virtualization/cnv-must-gather-rhel9@sha256:b9fc32b5fabedd65a4c3a471879c808af2087277de4278adaa115a732f0468da_amd64",
"9Base-CNV-4.13:container-native-virtualization/hco-bundle-registry-rhel9@sha256:60e89d7a99ff9f20e974430b802dd724a3bb6fa1e01e5a62daad98ac487b3063_amd64",
"9Base-CNV-4.13:container-native-virtualization/hco-bundle-registry-rhel9@sha256:dd20b138045ef1424d83a47e7abcfcbb2ac54577dcec5ed3c186390aaa4c9d84_arm64",
"9Base-CNV-4.13:container-native-virtualization/hostpath-csi-driver-rhel9@sha256:61e2824853d51347593ad909a5e546cd92e4216d6a1df5dffb50dd9cba277cce_amd64",
"9Base-CNV-4.13:container-native-virtualization/hostpath-csi-driver-rhel9@sha256:676d4c23a5f60dd331728af056b0a6b2d3358ac88da23299b1a98dfaca8f288e_arm64",
"9Base-CNV-4.13:container-native-virtualization/hostpath-provisioner-operator-rhel9@sha256:515be94be496c67f5b8fd5f4832fe4385e56476e6589897d6b9fbb9bb2b00f32_amd64",
"9Base-CNV-4.13:container-native-virtualization/hostpath-provisioner-operator-rhel9@sha256:571ae805641dea11646028c946039983c7fd82f138b915dcb8b80c39b465e63c_arm64",
"9Base-CNV-4.13:container-native-virtualization/hostpath-provisioner-rhel9@sha256:ac3fe350bedd6bc43596444ba0f279ccf8a144ab14ac5a9b80ea71c46390b7b4_amd64",
"9Base-CNV-4.13:container-native-virtualization/hostpath-provisioner-rhel9@sha256:d4ed87745b7ee2acca2d83e2c91c2f6dced1903c81495b50f2559b3ba2dde287_arm64",
"9Base-CNV-4.13:container-native-virtualization/hyperconverged-cluster-operator-rhel9@sha256:e5ab9f3be59d3568e3d672ab374efb16990ccf92192eac4e1244b10fcd7423e2_amd64",
"9Base-CNV-4.13:container-native-virtualization/hyperconverged-cluster-operator-rhel9@sha256:e681560b184189df03fc84c8a712f32289f42573dd348cda394b19565eb6eca8_arm64",
"9Base-CNV-4.13:container-native-virtualization/hyperconverged-cluster-webhook-rhel9@sha256:06d036d320b3027bb8370bb8e0f6fe8c9f0ec9bca7aac3b5c53698ba4a170042_arm64",
"9Base-CNV-4.13:container-native-virtualization/hyperconverged-cluster-webhook-rhel9@sha256:b5a01336180aad017df62cf8e652f2491b8263ba7e4dd07f858db1ef1924cf2f_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubemacpool-rhel9@sha256:4d190d81eeb3fbe9ed56cf3548dc83a3f81641bfdafa7b42dcfb0d2512566644_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubemacpool-rhel9@sha256:59862a59854f0d5b83dc25ba119f9586a8aff42b6e60d1922f8ae7b4567309ff_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubesecondarydns-rhel9@sha256:121d30d78cc57731ea2242ef2c32430890ac66c2723e65608d5e2f26c3f515cd_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubesecondarydns-rhel9@sha256:b1838f3c8ba3d8113bddea17b78c21e1c1490e2a4a07ea77014edee523d06347_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-console-plugin-rhel9@sha256:86a4b1e3d6ad1d56302c9c058f8bc5826dcfe6c46fb3e0ddaa06818645039020_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-console-plugin-rhel9@sha256:ffb2acd9ae09c1ef9ca756f5eaf6087d0a3957cfc824543949d25f556a97744d_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-dpdk-checkup-rhel9@sha256:525aceb9396010ebcdba14040f267889b807cd84db8e5b4030429b51f0fbf5fe_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-dpdk-checkup-rhel9@sha256:553c4686f56c66cc1e3c5ad9d4051f139d43f821eac3abb98ca5cdb8b5dfe202_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-ssp-operator-rhel9@sha256:901e6cad9534c7bd7c4018c60bccfe49d7280fba5a9901ab4c4d15e9345288c4_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-ssp-operator-rhel9@sha256:badeb0f65f543b209f6af761729d9778b7b73b97d55044016dfba3f38a1f6f18_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-cleanup-vm-rhel9@sha256:28e4975fa4dac22d9da32ed2a10aed039fd957b30140daa36bab2caa998be77a_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-cleanup-vm-rhel9@sha256:b0ff7e812a576ea848590655fc13a85832d5a39f68e7769ceab9da6949da88c7_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-copy-template-rhel9@sha256:4916a6c6b1f9b529187d3b4d5fc99b90157993767b3fe2ad36a9ec77fbb46b10_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-copy-template-rhel9@sha256:f71c36442f1b61cdde7ec58d2c3c78d2039f6d6108e6c35388ef7c1650971fa1_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-create-datavolume-rhel9@sha256:2ad49cf6e2242a9e5861929d9bcab1305a7fc4e34e708f99cff1d7253aa46167_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-create-datavolume-rhel9@sha256:7112400a4ecb23ee2110bf96372fcf9f96ad648a51aa944627b40eb59539a660_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-create-vm-from-template-rhel9@sha256:1411c65bbad7302710788327f6964a4bf5bc20ef70d5e46f4a5c6e7a0e7a0161_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-create-vm-from-template-rhel9@sha256:4d962618aa95600c60c9fc8b890186e510de91177d51949e12797a3558e31328_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-customize-rhel9@sha256:5c23d3f20ea9dcbe7109284d73078ecd516a070e964b844f8d80b1d92ebd55ee_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-customize-rhel9@sha256:a780244e48c6d4f87446d3754c3eb9ab79c0d54675c189da4a659f7a4d5668ea_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-sysprep-rhel9@sha256:84577d949a1bbcaa291c70729127bca4a8994df03068666baa23840877ea8392_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-sysprep-rhel9@sha256:aed630a597a090179e1b0e0c117e536df06b67d0f793f91936aa7388c0c5d7eb_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-modify-vm-template-rhel9@sha256:31d959b80cf57462e1705684bb7e1b78af26bd2c62f1c9e4e51e1d02199b05a8_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-modify-vm-template-rhel9@sha256:66aea526bc10e4c0136ba86e394bbdfe4fbd7f757d6f391a561b51d2ba2f4d46_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-operator-rhel9@sha256:d0cf0e81589f0938de45961eaddfc5ec4782738fd11082de0439b200534259eb_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-operator-rhel9@sha256:f1b1f5044db6bb945584f9d4f31d020597725a286ef368ed0aca2116abb31beb_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-wait-for-vmi-status-rhel9@sha256:39a15d03f113735df03b1a7408227eb9604d942c1f3c1992bcdc7eaf07662711_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-wait-for-vmi-status-rhel9@sha256:afb68af076954fcd18c7a4a1464ea0c2a766e8282eae980051906ed07eaa1707_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-template-validator-rhel9@sha256:02b22c7e7014b5e72d47fed8b6a268cf307638c5510adf3916c51f7f40a52a08_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-template-validator-rhel9@sha256:c0264b9271e602f85b2040ef7f207cdfa46038dc4fa6e4738bf196ef88a71cf8_amd64",
"9Base-CNV-4.13:container-native-virtualization/libguestfs-tools-rhel9@sha256:29ae84575bbca24553cf649256759fd96ff286971d80bc2db129154a7df9b283_amd64",
"9Base-CNV-4.13:container-native-virtualization/libguestfs-tools-rhel9@sha256:6558f60343e068b032167e2340b2c549c5f0258acc5d2614b60966ce79408b01_arm64",
"9Base-CNV-4.13:container-native-virtualization/multus-dynamic-networks-rhel9@sha256:3ecb0162a4b01d1590bf209d717b32a4f0835910d9979823f18c24acba41b503_arm64",
"9Base-CNV-4.13:container-native-virtualization/multus-dynamic-networks-rhel9@sha256:b7f68b6420009e21380d32d6459193aae45e93be9533debe17cb3108571b36b8_amd64",
"9Base-CNV-4.13:container-native-virtualization/ovs-cni-plugin-rhel9@sha256:0f1d372f418744e0aff59ecb0a38f53178aac9c2e9eecfd38aa25ed83e0d1360_arm64",
"9Base-CNV-4.13:container-native-virtualization/ovs-cni-plugin-rhel9@sha256:e8e7a44edbf1713fe74de5c4b8f691cce78f4440c4a32a16ba9ad16694a55396_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-api-rhel9@sha256:e68416321ca8c74a547b3d35897f54813c03481143e402e9bdc4daf315e35b5d_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-api-rhel9@sha256:fdb4ca1bb8b310d713d9c7e88f7d091f4460aa942dbeca5ebcf17281a06daffe_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-artifacts-server-rhel9@sha256:33d11c1832b49df39c1fca62bad40dbc5c30a452248339aaef449ac99509accb_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-artifacts-server-rhel9@sha256:81fc61b714baecb5a89fa6c0749c14566e0661b8e184ca602fc2e03b9cf431ee_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-apiserver-rhel9@sha256:f6128a63344ed2129f5bce648ddcfaa2869d31cde4b93328d3c22534b97ade10_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-apiserver-rhel9@sha256:feca273a691d09445c6cff6d36b5d590735e867656a9898ce0d89744d98e8006_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-cloner-rhel9@sha256:68e3b9b0291b4fb277ac430269ffce11d13b0a7688cf2ffcdb7f98759c36b4db_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-cloner-rhel9@sha256:6ac212767481bef64d8a7d0252bb8089c0f9751fad4a355aef71bd49dad2ad07_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-controller-rhel9@sha256:65f5263275d9f0a12b8fb057d82adf678778039ec873ca9bde182dea3413c9f1_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-controller-rhel9@sha256:d9e62b2019328be258489ac852eef25f8b1233f29abac6bcea5b406329f97fed_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-importer-rhel9@sha256:00a6d9d24ca1466d450b02269ec3144fc7550f0e5c696e869fbf7ce10cae6093_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-importer-rhel9@sha256:2df07fb21a3575e74aa16ded20129828f2300cd33e8ab369b0362062d49e62d0_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-operator-rhel9@sha256:20ec064750faedd97d11b797c8c1d9a1db5d60d7d76e82e65cfd05eb79d65e29_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-operator-rhel9@sha256:802ee8923d9d8e406b23911406f9748756c0ef4d6954e9e2fd5fb4bdf91dde9a_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-uploadproxy-rhel9@sha256:392d0f61f462c707adfdc21e4239c5c09d8520a80486b41d9d9ae479267d6124_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-uploadproxy-rhel9@sha256:6775f34353eec8f35bead9411dde155530d079bb8d51582fb1f2aacc27dbde1d_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-uploadserver-rhel9@sha256:4528c24672689cfb6505761b6b108fbcc04488192733f23d2bfe39cd42a1d743_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-uploadserver-rhel9@sha256:b22048390387380af94e267c8a9a66813c515997456d59d8ebac1486916b6585_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-controller-rhel9@sha256:3e7880149ee9a68286e390beb3d9779f7403c30fc5136e5370e0e4690a3fd243_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-controller-rhel9@sha256:970edc281d7a731e9f7e8c2d4440fe48a221e5e355d5235c5413b4c3adb28503_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-exportproxy-rhel9@sha256:1bda34d5bff734ad997202f29a5ff6f7362fd79fa90511a422442ef2e3681198_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-exportproxy-rhel9@sha256:de3c4afbf7669b98517cbef2490ec186f0553dd97b05bed80ec36dd883fe507b_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-exportserver-rhel9@sha256:3f7f98645176d42c63cca5c0fc3182a03121af87446ca421b6c72baf07dfca0d_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-exportserver-rhel9@sha256:8f12955cd777eb2409037a6968aa92f50c99d6e07e722951dbcfd0c8c9829b5e_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-handler-rhel9@sha256:5fc47110d866d8048aec50689090ce10705d19d3bb48d2b06727d6d569003af7_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-handler-rhel9@sha256:84ba79ae9658699147d2493df2582ab6df10adbff4d44a533c3fe6a9f45f9691_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-launcher-rhel9@sha256:4990d40d9987d5126d105dd45be2501eaded248cb61bdde5ea8d359bc1e7ebef_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-launcher-rhel9@sha256:95aeacb98209e0baef27ce0e02fbac38d693cea74808fc77107efda0f344bcb5_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-operator-rhel9@sha256:5c1a7e4ed2061938987b900a2394f07121d4037350c9bb6485213a2adfea787d_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-operator-rhel9@sha256:66b1b3b379121d6411ba22283e7d991617177330c93746d37753ab7812b9a00b_arm64",
"9Base-CNV-4.13:container-native-virtualization/virtio-win-rhel9@sha256:8735f51da918408a8826601c082d1b29accf26d59b9978da89b980cb509c1102_arm64",
"9Base-CNV-4.13:container-native-virtualization/virtio-win-rhel9@sha256:d147d2a6eb6f907d1e88f61aaca83596853bc72164583d6dda2b1154b490de25_amd64",
"9Base-CNV-4.13:container-native-virtualization/vm-console-proxy-rhel9@sha256:70a8d0cd66182c25e02679540bae1368b2a9cf687532b58dba41ef30c5ca00c1_arm64",
"9Base-CNV-4.13:container-native-virtualization/vm-console-proxy-rhel9@sha256:7ca921f98f6d81a126907127a611146fb53397869a628678faa1e289c01d22b2_amd64",
"9Base-CNV-4.13:container-native-virtualization/vm-network-latency-checkup-rhel9@sha256:503ea7ac914a9b54e9d665a0227ee0b5d5200cdb5d692aa94c07dd1518d91b70_arm64",
"9Base-CNV-4.13:container-native-virtualization/vm-network-latency-checkup-rhel9@sha256:59fd965975bccf641a0fa7aa01374d45057bd03cda7528248a84b60b1205bf57_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "golang: net/url: JoinPath does not strip relative path components in all circumstances"
},
{
"acknowledgments": [
{
"names": [
"Adam Korczynski"
],
"organization": "ADA Logics"
},
{
"names": [
"OSS-Fuzz"
]
}
],
"cve": "CVE-2022-41715",
"discovery_date": "2022-10-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2132872"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the golang package, where programs that compile regular expressions from untrusted sources are vulnerable to memory exhaustion or a denial of service. The parsed regexp representation is linear in the input size. Still, in some cases, the constant factor can be as high as 40,000, making a relatively small regexp consume larger amounts of memory. After the fix, each regexp being parsed is limited to a 256 MB memory footprint. Regular expressions whose representation would use more space than that are rejected. Routine use of regular expressions is unaffected.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: regexp/syntax: limit memory used by parsing regexps",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The opportunity for a Denial of Service is limited to the golang runtime. In the case of OpenShift Container Platform, this would be restricted within each individual container. There are multiple layers of guide rails (Golang\u2019s Garbage Collector; OpenShift\u2019s resource constraints imposed at the container and cluster levels) which would require a malicious user to continue submitting attacks for there to be any enduring impact. They would also need access to external server resources to be able to send a massive volume of requests to cause a significant impact on server operations.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"9Base-CNV-4.13:container-native-virtualization/bridge-marker-rhel9@sha256:8eac196b30a648989cdca5cb153a3bc3d34e47339acba0e4f760bd366496c99d_amd64",
"9Base-CNV-4.13:container-native-virtualization/bridge-marker-rhel9@sha256:e8a55aee3d75a316bb0d7a554c737198823df04b3c05e481c17e45eb2153bced_arm64",
"9Base-CNV-4.13:container-native-virtualization/cluster-network-addons-operator-rhel9@sha256:3bff33e3f40cd1e2b519c2db56734d4bb8df883e155c2f20b1cb9d3d184daec1_amd64",
"9Base-CNV-4.13:container-native-virtualization/cluster-network-addons-operator-rhel9@sha256:f439d2f420bb59eb1d5af14ce2002648d0cfc155d1a1466c8aac9b661fe902b8_arm64",
"9Base-CNV-4.13:container-native-virtualization/cnv-containernetworking-plugins-rhel9@sha256:89f22e541f61a660c9aa9f38ef58e80b84a0517f74e84292107fc252c25465c9_arm64",
"9Base-CNV-4.13:container-native-virtualization/cnv-containernetworking-plugins-rhel9@sha256:bf471997e54e4a75b0d71f492ab295787fdbb14d8c85c4ea8c03f0552dbc3755_amd64",
"9Base-CNV-4.13:container-native-virtualization/cnv-must-gather-rhel9@sha256:9e8efd76924958eb605401abdac08eba97fb83a1ada383bc87a7fb7c87b3a455_arm64",
"9Base-CNV-4.13:container-native-virtualization/cnv-must-gather-rhel9@sha256:b9fc32b5fabedd65a4c3a471879c808af2087277de4278adaa115a732f0468da_amd64",
"9Base-CNV-4.13:container-native-virtualization/hco-bundle-registry-rhel9@sha256:60e89d7a99ff9f20e974430b802dd724a3bb6fa1e01e5a62daad98ac487b3063_amd64",
"9Base-CNV-4.13:container-native-virtualization/hco-bundle-registry-rhel9@sha256:dd20b138045ef1424d83a47e7abcfcbb2ac54577dcec5ed3c186390aaa4c9d84_arm64",
"9Base-CNV-4.13:container-native-virtualization/hostpath-csi-driver-rhel9@sha256:61e2824853d51347593ad909a5e546cd92e4216d6a1df5dffb50dd9cba277cce_amd64",
"9Base-CNV-4.13:container-native-virtualization/hostpath-csi-driver-rhel9@sha256:676d4c23a5f60dd331728af056b0a6b2d3358ac88da23299b1a98dfaca8f288e_arm64",
"9Base-CNV-4.13:container-native-virtualization/hostpath-provisioner-operator-rhel9@sha256:515be94be496c67f5b8fd5f4832fe4385e56476e6589897d6b9fbb9bb2b00f32_amd64",
"9Base-CNV-4.13:container-native-virtualization/hostpath-provisioner-operator-rhel9@sha256:571ae805641dea11646028c946039983c7fd82f138b915dcb8b80c39b465e63c_arm64",
"9Base-CNV-4.13:container-native-virtualization/hostpath-provisioner-rhel9@sha256:ac3fe350bedd6bc43596444ba0f279ccf8a144ab14ac5a9b80ea71c46390b7b4_amd64",
"9Base-CNV-4.13:container-native-virtualization/hostpath-provisioner-rhel9@sha256:d4ed87745b7ee2acca2d83e2c91c2f6dced1903c81495b50f2559b3ba2dde287_arm64",
"9Base-CNV-4.13:container-native-virtualization/hyperconverged-cluster-operator-rhel9@sha256:e5ab9f3be59d3568e3d672ab374efb16990ccf92192eac4e1244b10fcd7423e2_amd64",
"9Base-CNV-4.13:container-native-virtualization/hyperconverged-cluster-operator-rhel9@sha256:e681560b184189df03fc84c8a712f32289f42573dd348cda394b19565eb6eca8_arm64",
"9Base-CNV-4.13:container-native-virtualization/hyperconverged-cluster-webhook-rhel9@sha256:06d036d320b3027bb8370bb8e0f6fe8c9f0ec9bca7aac3b5c53698ba4a170042_arm64",
"9Base-CNV-4.13:container-native-virtualization/hyperconverged-cluster-webhook-rhel9@sha256:b5a01336180aad017df62cf8e652f2491b8263ba7e4dd07f858db1ef1924cf2f_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubemacpool-rhel9@sha256:4d190d81eeb3fbe9ed56cf3548dc83a3f81641bfdafa7b42dcfb0d2512566644_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubemacpool-rhel9@sha256:59862a59854f0d5b83dc25ba119f9586a8aff42b6e60d1922f8ae7b4567309ff_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubesecondarydns-rhel9@sha256:121d30d78cc57731ea2242ef2c32430890ac66c2723e65608d5e2f26c3f515cd_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubesecondarydns-rhel9@sha256:b1838f3c8ba3d8113bddea17b78c21e1c1490e2a4a07ea77014edee523d06347_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-console-plugin-rhel9@sha256:86a4b1e3d6ad1d56302c9c058f8bc5826dcfe6c46fb3e0ddaa06818645039020_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-console-plugin-rhel9@sha256:ffb2acd9ae09c1ef9ca756f5eaf6087d0a3957cfc824543949d25f556a97744d_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-dpdk-checkup-rhel9@sha256:525aceb9396010ebcdba14040f267889b807cd84db8e5b4030429b51f0fbf5fe_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-dpdk-checkup-rhel9@sha256:553c4686f56c66cc1e3c5ad9d4051f139d43f821eac3abb98ca5cdb8b5dfe202_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-ssp-operator-rhel9@sha256:901e6cad9534c7bd7c4018c60bccfe49d7280fba5a9901ab4c4d15e9345288c4_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-ssp-operator-rhel9@sha256:badeb0f65f543b209f6af761729d9778b7b73b97d55044016dfba3f38a1f6f18_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-cleanup-vm-rhel9@sha256:28e4975fa4dac22d9da32ed2a10aed039fd957b30140daa36bab2caa998be77a_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-cleanup-vm-rhel9@sha256:b0ff7e812a576ea848590655fc13a85832d5a39f68e7769ceab9da6949da88c7_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-copy-template-rhel9@sha256:4916a6c6b1f9b529187d3b4d5fc99b90157993767b3fe2ad36a9ec77fbb46b10_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-copy-template-rhel9@sha256:f71c36442f1b61cdde7ec58d2c3c78d2039f6d6108e6c35388ef7c1650971fa1_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-create-datavolume-rhel9@sha256:2ad49cf6e2242a9e5861929d9bcab1305a7fc4e34e708f99cff1d7253aa46167_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-create-datavolume-rhel9@sha256:7112400a4ecb23ee2110bf96372fcf9f96ad648a51aa944627b40eb59539a660_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-create-vm-from-template-rhel9@sha256:1411c65bbad7302710788327f6964a4bf5bc20ef70d5e46f4a5c6e7a0e7a0161_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-create-vm-from-template-rhel9@sha256:4d962618aa95600c60c9fc8b890186e510de91177d51949e12797a3558e31328_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-customize-rhel9@sha256:5c23d3f20ea9dcbe7109284d73078ecd516a070e964b844f8d80b1d92ebd55ee_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-customize-rhel9@sha256:a780244e48c6d4f87446d3754c3eb9ab79c0d54675c189da4a659f7a4d5668ea_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-sysprep-rhel9@sha256:84577d949a1bbcaa291c70729127bca4a8994df03068666baa23840877ea8392_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-sysprep-rhel9@sha256:aed630a597a090179e1b0e0c117e536df06b67d0f793f91936aa7388c0c5d7eb_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-modify-vm-template-rhel9@sha256:31d959b80cf57462e1705684bb7e1b78af26bd2c62f1c9e4e51e1d02199b05a8_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-modify-vm-template-rhel9@sha256:66aea526bc10e4c0136ba86e394bbdfe4fbd7f757d6f391a561b51d2ba2f4d46_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-operator-rhel9@sha256:d0cf0e81589f0938de45961eaddfc5ec4782738fd11082de0439b200534259eb_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-operator-rhel9@sha256:f1b1f5044db6bb945584f9d4f31d020597725a286ef368ed0aca2116abb31beb_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-wait-for-vmi-status-rhel9@sha256:39a15d03f113735df03b1a7408227eb9604d942c1f3c1992bcdc7eaf07662711_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-wait-for-vmi-status-rhel9@sha256:afb68af076954fcd18c7a4a1464ea0c2a766e8282eae980051906ed07eaa1707_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-template-validator-rhel9@sha256:02b22c7e7014b5e72d47fed8b6a268cf307638c5510adf3916c51f7f40a52a08_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-template-validator-rhel9@sha256:c0264b9271e602f85b2040ef7f207cdfa46038dc4fa6e4738bf196ef88a71cf8_amd64",
"9Base-CNV-4.13:container-native-virtualization/libguestfs-tools-rhel9@sha256:29ae84575bbca24553cf649256759fd96ff286971d80bc2db129154a7df9b283_amd64",
"9Base-CNV-4.13:container-native-virtualization/libguestfs-tools-rhel9@sha256:6558f60343e068b032167e2340b2c549c5f0258acc5d2614b60966ce79408b01_arm64",
"9Base-CNV-4.13:container-native-virtualization/multus-dynamic-networks-rhel9@sha256:3ecb0162a4b01d1590bf209d717b32a4f0835910d9979823f18c24acba41b503_arm64",
"9Base-CNV-4.13:container-native-virtualization/multus-dynamic-networks-rhel9@sha256:b7f68b6420009e21380d32d6459193aae45e93be9533debe17cb3108571b36b8_amd64",
"9Base-CNV-4.13:container-native-virtualization/ovs-cni-plugin-rhel9@sha256:0f1d372f418744e0aff59ecb0a38f53178aac9c2e9eecfd38aa25ed83e0d1360_arm64",
"9Base-CNV-4.13:container-native-virtualization/ovs-cni-plugin-rhel9@sha256:e8e7a44edbf1713fe74de5c4b8f691cce78f4440c4a32a16ba9ad16694a55396_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-api-rhel9@sha256:e68416321ca8c74a547b3d35897f54813c03481143e402e9bdc4daf315e35b5d_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-api-rhel9@sha256:fdb4ca1bb8b310d713d9c7e88f7d091f4460aa942dbeca5ebcf17281a06daffe_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-artifacts-server-rhel9@sha256:33d11c1832b49df39c1fca62bad40dbc5c30a452248339aaef449ac99509accb_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-artifacts-server-rhel9@sha256:81fc61b714baecb5a89fa6c0749c14566e0661b8e184ca602fc2e03b9cf431ee_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-apiserver-rhel9@sha256:f6128a63344ed2129f5bce648ddcfaa2869d31cde4b93328d3c22534b97ade10_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-apiserver-rhel9@sha256:feca273a691d09445c6cff6d36b5d590735e867656a9898ce0d89744d98e8006_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-cloner-rhel9@sha256:68e3b9b0291b4fb277ac430269ffce11d13b0a7688cf2ffcdb7f98759c36b4db_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-cloner-rhel9@sha256:6ac212767481bef64d8a7d0252bb8089c0f9751fad4a355aef71bd49dad2ad07_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-controller-rhel9@sha256:65f5263275d9f0a12b8fb057d82adf678778039ec873ca9bde182dea3413c9f1_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-controller-rhel9@sha256:d9e62b2019328be258489ac852eef25f8b1233f29abac6bcea5b406329f97fed_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-importer-rhel9@sha256:00a6d9d24ca1466d450b02269ec3144fc7550f0e5c696e869fbf7ce10cae6093_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-importer-rhel9@sha256:2df07fb21a3575e74aa16ded20129828f2300cd33e8ab369b0362062d49e62d0_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-operator-rhel9@sha256:20ec064750faedd97d11b797c8c1d9a1db5d60d7d76e82e65cfd05eb79d65e29_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-operator-rhel9@sha256:802ee8923d9d8e406b23911406f9748756c0ef4d6954e9e2fd5fb4bdf91dde9a_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-uploadproxy-rhel9@sha256:392d0f61f462c707adfdc21e4239c5c09d8520a80486b41d9d9ae479267d6124_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-uploadproxy-rhel9@sha256:6775f34353eec8f35bead9411dde155530d079bb8d51582fb1f2aacc27dbde1d_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-uploadserver-rhel9@sha256:4528c24672689cfb6505761b6b108fbcc04488192733f23d2bfe39cd42a1d743_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-uploadserver-rhel9@sha256:b22048390387380af94e267c8a9a66813c515997456d59d8ebac1486916b6585_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-controller-rhel9@sha256:3e7880149ee9a68286e390beb3d9779f7403c30fc5136e5370e0e4690a3fd243_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-controller-rhel9@sha256:970edc281d7a731e9f7e8c2d4440fe48a221e5e355d5235c5413b4c3adb28503_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-exportproxy-rhel9@sha256:1bda34d5bff734ad997202f29a5ff6f7362fd79fa90511a422442ef2e3681198_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-exportproxy-rhel9@sha256:de3c4afbf7669b98517cbef2490ec186f0553dd97b05bed80ec36dd883fe507b_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-exportserver-rhel9@sha256:3f7f98645176d42c63cca5c0fc3182a03121af87446ca421b6c72baf07dfca0d_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-exportserver-rhel9@sha256:8f12955cd777eb2409037a6968aa92f50c99d6e07e722951dbcfd0c8c9829b5e_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-handler-rhel9@sha256:5fc47110d866d8048aec50689090ce10705d19d3bb48d2b06727d6d569003af7_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-handler-rhel9@sha256:84ba79ae9658699147d2493df2582ab6df10adbff4d44a533c3fe6a9f45f9691_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-launcher-rhel9@sha256:4990d40d9987d5126d105dd45be2501eaded248cb61bdde5ea8d359bc1e7ebef_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-launcher-rhel9@sha256:95aeacb98209e0baef27ce0e02fbac38d693cea74808fc77107efda0f344bcb5_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-operator-rhel9@sha256:5c1a7e4ed2061938987b900a2394f07121d4037350c9bb6485213a2adfea787d_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-operator-rhel9@sha256:66b1b3b379121d6411ba22283e7d991617177330c93746d37753ab7812b9a00b_arm64",
"9Base-CNV-4.13:container-native-virtualization/virtio-win-rhel9@sha256:8735f51da918408a8826601c082d1b29accf26d59b9978da89b980cb509c1102_arm64",
"9Base-CNV-4.13:container-native-virtualization/virtio-win-rhel9@sha256:d147d2a6eb6f907d1e88f61aaca83596853bc72164583d6dda2b1154b490de25_amd64",
"9Base-CNV-4.13:container-native-virtualization/vm-console-proxy-rhel9@sha256:70a8d0cd66182c25e02679540bae1368b2a9cf687532b58dba41ef30c5ca00c1_arm64",
"9Base-CNV-4.13:container-native-virtualization/vm-console-proxy-rhel9@sha256:7ca921f98f6d81a126907127a611146fb53397869a628678faa1e289c01d22b2_amd64",
"9Base-CNV-4.13:container-native-virtualization/vm-network-latency-checkup-rhel9@sha256:503ea7ac914a9b54e9d665a0227ee0b5d5200cdb5d692aa94c07dd1518d91b70_arm64",
"9Base-CNV-4.13:container-native-virtualization/vm-network-latency-checkup-rhel9@sha256:59fd965975bccf641a0fa7aa01374d45057bd03cda7528248a84b60b1205bf57_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-41715"
},
{
"category": "external",
"summary": "RHBZ#2132872",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2132872"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-41715",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41715"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-41715",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-41715"
},
{
"category": "external",
"summary": "https://github.com/golang/go/issues/55949",
"url": "https://github.com/golang/go/issues/55949"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/xtuG5faxtaU?pli=1",
"url": "https://groups.google.com/g/golang-announce/c/xtuG5faxtaU?pli=1"
}
],
"release_date": "2022-10-04T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-05-18T02:55:08+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"9Base-CNV-4.13:container-native-virtualization/bridge-marker-rhel9@sha256:8eac196b30a648989cdca5cb153a3bc3d34e47339acba0e4f760bd366496c99d_amd64",
"9Base-CNV-4.13:container-native-virtualization/bridge-marker-rhel9@sha256:e8a55aee3d75a316bb0d7a554c737198823df04b3c05e481c17e45eb2153bced_arm64",
"9Base-CNV-4.13:container-native-virtualization/cluster-network-addons-operator-rhel9@sha256:3bff33e3f40cd1e2b519c2db56734d4bb8df883e155c2f20b1cb9d3d184daec1_amd64",
"9Base-CNV-4.13:container-native-virtualization/cluster-network-addons-operator-rhel9@sha256:f439d2f420bb59eb1d5af14ce2002648d0cfc155d1a1466c8aac9b661fe902b8_arm64",
"9Base-CNV-4.13:container-native-virtualization/cnv-containernetworking-plugins-rhel9@sha256:89f22e541f61a660c9aa9f38ef58e80b84a0517f74e84292107fc252c25465c9_arm64",
"9Base-CNV-4.13:container-native-virtualization/cnv-containernetworking-plugins-rhel9@sha256:bf471997e54e4a75b0d71f492ab295787fdbb14d8c85c4ea8c03f0552dbc3755_amd64",
"9Base-CNV-4.13:container-native-virtualization/cnv-must-gather-rhel9@sha256:9e8efd76924958eb605401abdac08eba97fb83a1ada383bc87a7fb7c87b3a455_arm64",
"9Base-CNV-4.13:container-native-virtualization/cnv-must-gather-rhel9@sha256:b9fc32b5fabedd65a4c3a471879c808af2087277de4278adaa115a732f0468da_amd64",
"9Base-CNV-4.13:container-native-virtualization/hco-bundle-registry-rhel9@sha256:60e89d7a99ff9f20e974430b802dd724a3bb6fa1e01e5a62daad98ac487b3063_amd64",
"9Base-CNV-4.13:container-native-virtualization/hco-bundle-registry-rhel9@sha256:dd20b138045ef1424d83a47e7abcfcbb2ac54577dcec5ed3c186390aaa4c9d84_arm64",
"9Base-CNV-4.13:container-native-virtualization/hostpath-csi-driver-rhel9@sha256:61e2824853d51347593ad909a5e546cd92e4216d6a1df5dffb50dd9cba277cce_amd64",
"9Base-CNV-4.13:container-native-virtualization/hostpath-csi-driver-rhel9@sha256:676d4c23a5f60dd331728af056b0a6b2d3358ac88da23299b1a98dfaca8f288e_arm64",
"9Base-CNV-4.13:container-native-virtualization/hostpath-provisioner-operator-rhel9@sha256:515be94be496c67f5b8fd5f4832fe4385e56476e6589897d6b9fbb9bb2b00f32_amd64",
"9Base-CNV-4.13:container-native-virtualization/hostpath-provisioner-operator-rhel9@sha256:571ae805641dea11646028c946039983c7fd82f138b915dcb8b80c39b465e63c_arm64",
"9Base-CNV-4.13:container-native-virtualization/hostpath-provisioner-rhel9@sha256:ac3fe350bedd6bc43596444ba0f279ccf8a144ab14ac5a9b80ea71c46390b7b4_amd64",
"9Base-CNV-4.13:container-native-virtualization/hostpath-provisioner-rhel9@sha256:d4ed87745b7ee2acca2d83e2c91c2f6dced1903c81495b50f2559b3ba2dde287_arm64",
"9Base-CNV-4.13:container-native-virtualization/hyperconverged-cluster-operator-rhel9@sha256:e5ab9f3be59d3568e3d672ab374efb16990ccf92192eac4e1244b10fcd7423e2_amd64",
"9Base-CNV-4.13:container-native-virtualization/hyperconverged-cluster-operator-rhel9@sha256:e681560b184189df03fc84c8a712f32289f42573dd348cda394b19565eb6eca8_arm64",
"9Base-CNV-4.13:container-native-virtualization/hyperconverged-cluster-webhook-rhel9@sha256:06d036d320b3027bb8370bb8e0f6fe8c9f0ec9bca7aac3b5c53698ba4a170042_arm64",
"9Base-CNV-4.13:container-native-virtualization/hyperconverged-cluster-webhook-rhel9@sha256:b5a01336180aad017df62cf8e652f2491b8263ba7e4dd07f858db1ef1924cf2f_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubemacpool-rhel9@sha256:4d190d81eeb3fbe9ed56cf3548dc83a3f81641bfdafa7b42dcfb0d2512566644_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubemacpool-rhel9@sha256:59862a59854f0d5b83dc25ba119f9586a8aff42b6e60d1922f8ae7b4567309ff_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubesecondarydns-rhel9@sha256:121d30d78cc57731ea2242ef2c32430890ac66c2723e65608d5e2f26c3f515cd_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubesecondarydns-rhel9@sha256:b1838f3c8ba3d8113bddea17b78c21e1c1490e2a4a07ea77014edee523d06347_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-console-plugin-rhel9@sha256:86a4b1e3d6ad1d56302c9c058f8bc5826dcfe6c46fb3e0ddaa06818645039020_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-console-plugin-rhel9@sha256:ffb2acd9ae09c1ef9ca756f5eaf6087d0a3957cfc824543949d25f556a97744d_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-dpdk-checkup-rhel9@sha256:525aceb9396010ebcdba14040f267889b807cd84db8e5b4030429b51f0fbf5fe_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-dpdk-checkup-rhel9@sha256:553c4686f56c66cc1e3c5ad9d4051f139d43f821eac3abb98ca5cdb8b5dfe202_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-ssp-operator-rhel9@sha256:901e6cad9534c7bd7c4018c60bccfe49d7280fba5a9901ab4c4d15e9345288c4_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-ssp-operator-rhel9@sha256:badeb0f65f543b209f6af761729d9778b7b73b97d55044016dfba3f38a1f6f18_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-cleanup-vm-rhel9@sha256:28e4975fa4dac22d9da32ed2a10aed039fd957b30140daa36bab2caa998be77a_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-cleanup-vm-rhel9@sha256:b0ff7e812a576ea848590655fc13a85832d5a39f68e7769ceab9da6949da88c7_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-copy-template-rhel9@sha256:4916a6c6b1f9b529187d3b4d5fc99b90157993767b3fe2ad36a9ec77fbb46b10_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-copy-template-rhel9@sha256:f71c36442f1b61cdde7ec58d2c3c78d2039f6d6108e6c35388ef7c1650971fa1_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-create-datavolume-rhel9@sha256:2ad49cf6e2242a9e5861929d9bcab1305a7fc4e34e708f99cff1d7253aa46167_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-create-datavolume-rhel9@sha256:7112400a4ecb23ee2110bf96372fcf9f96ad648a51aa944627b40eb59539a660_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-create-vm-from-template-rhel9@sha256:1411c65bbad7302710788327f6964a4bf5bc20ef70d5e46f4a5c6e7a0e7a0161_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-create-vm-from-template-rhel9@sha256:4d962618aa95600c60c9fc8b890186e510de91177d51949e12797a3558e31328_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-customize-rhel9@sha256:5c23d3f20ea9dcbe7109284d73078ecd516a070e964b844f8d80b1d92ebd55ee_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-customize-rhel9@sha256:a780244e48c6d4f87446d3754c3eb9ab79c0d54675c189da4a659f7a4d5668ea_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-sysprep-rhel9@sha256:84577d949a1bbcaa291c70729127bca4a8994df03068666baa23840877ea8392_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-sysprep-rhel9@sha256:aed630a597a090179e1b0e0c117e536df06b67d0f793f91936aa7388c0c5d7eb_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-modify-vm-template-rhel9@sha256:31d959b80cf57462e1705684bb7e1b78af26bd2c62f1c9e4e51e1d02199b05a8_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-modify-vm-template-rhel9@sha256:66aea526bc10e4c0136ba86e394bbdfe4fbd7f757d6f391a561b51d2ba2f4d46_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-operator-rhel9@sha256:d0cf0e81589f0938de45961eaddfc5ec4782738fd11082de0439b200534259eb_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-operator-rhel9@sha256:f1b1f5044db6bb945584f9d4f31d020597725a286ef368ed0aca2116abb31beb_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-wait-for-vmi-status-rhel9@sha256:39a15d03f113735df03b1a7408227eb9604d942c1f3c1992bcdc7eaf07662711_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-wait-for-vmi-status-rhel9@sha256:afb68af076954fcd18c7a4a1464ea0c2a766e8282eae980051906ed07eaa1707_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-template-validator-rhel9@sha256:02b22c7e7014b5e72d47fed8b6a268cf307638c5510adf3916c51f7f40a52a08_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-template-validator-rhel9@sha256:c0264b9271e602f85b2040ef7f207cdfa46038dc4fa6e4738bf196ef88a71cf8_amd64",
"9Base-CNV-4.13:container-native-virtualization/libguestfs-tools-rhel9@sha256:29ae84575bbca24553cf649256759fd96ff286971d80bc2db129154a7df9b283_amd64",
"9Base-CNV-4.13:container-native-virtualization/libguestfs-tools-rhel9@sha256:6558f60343e068b032167e2340b2c549c5f0258acc5d2614b60966ce79408b01_arm64",
"9Base-CNV-4.13:container-native-virtualization/multus-dynamic-networks-rhel9@sha256:3ecb0162a4b01d1590bf209d717b32a4f0835910d9979823f18c24acba41b503_arm64",
"9Base-CNV-4.13:container-native-virtualization/multus-dynamic-networks-rhel9@sha256:b7f68b6420009e21380d32d6459193aae45e93be9533debe17cb3108571b36b8_amd64",
"9Base-CNV-4.13:container-native-virtualization/ovs-cni-plugin-rhel9@sha256:0f1d372f418744e0aff59ecb0a38f53178aac9c2e9eecfd38aa25ed83e0d1360_arm64",
"9Base-CNV-4.13:container-native-virtualization/ovs-cni-plugin-rhel9@sha256:e8e7a44edbf1713fe74de5c4b8f691cce78f4440c4a32a16ba9ad16694a55396_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-api-rhel9@sha256:e68416321ca8c74a547b3d35897f54813c03481143e402e9bdc4daf315e35b5d_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-api-rhel9@sha256:fdb4ca1bb8b310d713d9c7e88f7d091f4460aa942dbeca5ebcf17281a06daffe_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-artifacts-server-rhel9@sha256:33d11c1832b49df39c1fca62bad40dbc5c30a452248339aaef449ac99509accb_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-artifacts-server-rhel9@sha256:81fc61b714baecb5a89fa6c0749c14566e0661b8e184ca602fc2e03b9cf431ee_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-apiserver-rhel9@sha256:f6128a63344ed2129f5bce648ddcfaa2869d31cde4b93328d3c22534b97ade10_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-apiserver-rhel9@sha256:feca273a691d09445c6cff6d36b5d590735e867656a9898ce0d89744d98e8006_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-cloner-rhel9@sha256:68e3b9b0291b4fb277ac430269ffce11d13b0a7688cf2ffcdb7f98759c36b4db_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-cloner-rhel9@sha256:6ac212767481bef64d8a7d0252bb8089c0f9751fad4a355aef71bd49dad2ad07_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-controller-rhel9@sha256:65f5263275d9f0a12b8fb057d82adf678778039ec873ca9bde182dea3413c9f1_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-controller-rhel9@sha256:d9e62b2019328be258489ac852eef25f8b1233f29abac6bcea5b406329f97fed_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-importer-rhel9@sha256:00a6d9d24ca1466d450b02269ec3144fc7550f0e5c696e869fbf7ce10cae6093_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-importer-rhel9@sha256:2df07fb21a3575e74aa16ded20129828f2300cd33e8ab369b0362062d49e62d0_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-operator-rhel9@sha256:20ec064750faedd97d11b797c8c1d9a1db5d60d7d76e82e65cfd05eb79d65e29_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-operator-rhel9@sha256:802ee8923d9d8e406b23911406f9748756c0ef4d6954e9e2fd5fb4bdf91dde9a_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-uploadproxy-rhel9@sha256:392d0f61f462c707adfdc21e4239c5c09d8520a80486b41d9d9ae479267d6124_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-uploadproxy-rhel9@sha256:6775f34353eec8f35bead9411dde155530d079bb8d51582fb1f2aacc27dbde1d_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-uploadserver-rhel9@sha256:4528c24672689cfb6505761b6b108fbcc04488192733f23d2bfe39cd42a1d743_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-uploadserver-rhel9@sha256:b22048390387380af94e267c8a9a66813c515997456d59d8ebac1486916b6585_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-controller-rhel9@sha256:3e7880149ee9a68286e390beb3d9779f7403c30fc5136e5370e0e4690a3fd243_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-controller-rhel9@sha256:970edc281d7a731e9f7e8c2d4440fe48a221e5e355d5235c5413b4c3adb28503_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-exportproxy-rhel9@sha256:1bda34d5bff734ad997202f29a5ff6f7362fd79fa90511a422442ef2e3681198_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-exportproxy-rhel9@sha256:de3c4afbf7669b98517cbef2490ec186f0553dd97b05bed80ec36dd883fe507b_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-exportserver-rhel9@sha256:3f7f98645176d42c63cca5c0fc3182a03121af87446ca421b6c72baf07dfca0d_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-exportserver-rhel9@sha256:8f12955cd777eb2409037a6968aa92f50c99d6e07e722951dbcfd0c8c9829b5e_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-handler-rhel9@sha256:5fc47110d866d8048aec50689090ce10705d19d3bb48d2b06727d6d569003af7_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-handler-rhel9@sha256:84ba79ae9658699147d2493df2582ab6df10adbff4d44a533c3fe6a9f45f9691_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-launcher-rhel9@sha256:4990d40d9987d5126d105dd45be2501eaded248cb61bdde5ea8d359bc1e7ebef_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-launcher-rhel9@sha256:95aeacb98209e0baef27ce0e02fbac38d693cea74808fc77107efda0f344bcb5_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-operator-rhel9@sha256:5c1a7e4ed2061938987b900a2394f07121d4037350c9bb6485213a2adfea787d_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-operator-rhel9@sha256:66b1b3b379121d6411ba22283e7d991617177330c93746d37753ab7812b9a00b_arm64",
"9Base-CNV-4.13:container-native-virtualization/virtio-win-rhel9@sha256:8735f51da918408a8826601c082d1b29accf26d59b9978da89b980cb509c1102_arm64",
"9Base-CNV-4.13:container-native-virtualization/virtio-win-rhel9@sha256:d147d2a6eb6f907d1e88f61aaca83596853bc72164583d6dda2b1154b490de25_amd64",
"9Base-CNV-4.13:container-native-virtualization/vm-console-proxy-rhel9@sha256:70a8d0cd66182c25e02679540bae1368b2a9cf687532b58dba41ef30c5ca00c1_arm64",
"9Base-CNV-4.13:container-native-virtualization/vm-console-proxy-rhel9@sha256:7ca921f98f6d81a126907127a611146fb53397869a628678faa1e289c01d22b2_amd64",
"9Base-CNV-4.13:container-native-virtualization/vm-network-latency-checkup-rhel9@sha256:503ea7ac914a9b54e9d665a0227ee0b5d5200cdb5d692aa94c07dd1518d91b70_arm64",
"9Base-CNV-4.13:container-native-virtualization/vm-network-latency-checkup-rhel9@sha256:59fd965975bccf641a0fa7aa01374d45057bd03cda7528248a84b60b1205bf57_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:3205"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"9Base-CNV-4.13:container-native-virtualization/bridge-marker-rhel9@sha256:8eac196b30a648989cdca5cb153a3bc3d34e47339acba0e4f760bd366496c99d_amd64",
"9Base-CNV-4.13:container-native-virtualization/bridge-marker-rhel9@sha256:e8a55aee3d75a316bb0d7a554c737198823df04b3c05e481c17e45eb2153bced_arm64",
"9Base-CNV-4.13:container-native-virtualization/cluster-network-addons-operator-rhel9@sha256:3bff33e3f40cd1e2b519c2db56734d4bb8df883e155c2f20b1cb9d3d184daec1_amd64",
"9Base-CNV-4.13:container-native-virtualization/cluster-network-addons-operator-rhel9@sha256:f439d2f420bb59eb1d5af14ce2002648d0cfc155d1a1466c8aac9b661fe902b8_arm64",
"9Base-CNV-4.13:container-native-virtualization/cnv-containernetworking-plugins-rhel9@sha256:89f22e541f61a660c9aa9f38ef58e80b84a0517f74e84292107fc252c25465c9_arm64",
"9Base-CNV-4.13:container-native-virtualization/cnv-containernetworking-plugins-rhel9@sha256:bf471997e54e4a75b0d71f492ab295787fdbb14d8c85c4ea8c03f0552dbc3755_amd64",
"9Base-CNV-4.13:container-native-virtualization/cnv-must-gather-rhel9@sha256:9e8efd76924958eb605401abdac08eba97fb83a1ada383bc87a7fb7c87b3a455_arm64",
"9Base-CNV-4.13:container-native-virtualization/cnv-must-gather-rhel9@sha256:b9fc32b5fabedd65a4c3a471879c808af2087277de4278adaa115a732f0468da_amd64",
"9Base-CNV-4.13:container-native-virtualization/hco-bundle-registry-rhel9@sha256:60e89d7a99ff9f20e974430b802dd724a3bb6fa1e01e5a62daad98ac487b3063_amd64",
"9Base-CNV-4.13:container-native-virtualization/hco-bundle-registry-rhel9@sha256:dd20b138045ef1424d83a47e7abcfcbb2ac54577dcec5ed3c186390aaa4c9d84_arm64",
"9Base-CNV-4.13:container-native-virtualization/hostpath-csi-driver-rhel9@sha256:61e2824853d51347593ad909a5e546cd92e4216d6a1df5dffb50dd9cba277cce_amd64",
"9Base-CNV-4.13:container-native-virtualization/hostpath-csi-driver-rhel9@sha256:676d4c23a5f60dd331728af056b0a6b2d3358ac88da23299b1a98dfaca8f288e_arm64",
"9Base-CNV-4.13:container-native-virtualization/hostpath-provisioner-operator-rhel9@sha256:515be94be496c67f5b8fd5f4832fe4385e56476e6589897d6b9fbb9bb2b00f32_amd64",
"9Base-CNV-4.13:container-native-virtualization/hostpath-provisioner-operator-rhel9@sha256:571ae805641dea11646028c946039983c7fd82f138b915dcb8b80c39b465e63c_arm64",
"9Base-CNV-4.13:container-native-virtualization/hostpath-provisioner-rhel9@sha256:ac3fe350bedd6bc43596444ba0f279ccf8a144ab14ac5a9b80ea71c46390b7b4_amd64",
"9Base-CNV-4.13:container-native-virtualization/hostpath-provisioner-rhel9@sha256:d4ed87745b7ee2acca2d83e2c91c2f6dced1903c81495b50f2559b3ba2dde287_arm64",
"9Base-CNV-4.13:container-native-virtualization/hyperconverged-cluster-operator-rhel9@sha256:e5ab9f3be59d3568e3d672ab374efb16990ccf92192eac4e1244b10fcd7423e2_amd64",
"9Base-CNV-4.13:container-native-virtualization/hyperconverged-cluster-operator-rhel9@sha256:e681560b184189df03fc84c8a712f32289f42573dd348cda394b19565eb6eca8_arm64",
"9Base-CNV-4.13:container-native-virtualization/hyperconverged-cluster-webhook-rhel9@sha256:06d036d320b3027bb8370bb8e0f6fe8c9f0ec9bca7aac3b5c53698ba4a170042_arm64",
"9Base-CNV-4.13:container-native-virtualization/hyperconverged-cluster-webhook-rhel9@sha256:b5a01336180aad017df62cf8e652f2491b8263ba7e4dd07f858db1ef1924cf2f_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubemacpool-rhel9@sha256:4d190d81eeb3fbe9ed56cf3548dc83a3f81641bfdafa7b42dcfb0d2512566644_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubemacpool-rhel9@sha256:59862a59854f0d5b83dc25ba119f9586a8aff42b6e60d1922f8ae7b4567309ff_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubesecondarydns-rhel9@sha256:121d30d78cc57731ea2242ef2c32430890ac66c2723e65608d5e2f26c3f515cd_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubesecondarydns-rhel9@sha256:b1838f3c8ba3d8113bddea17b78c21e1c1490e2a4a07ea77014edee523d06347_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-console-plugin-rhel9@sha256:86a4b1e3d6ad1d56302c9c058f8bc5826dcfe6c46fb3e0ddaa06818645039020_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-console-plugin-rhel9@sha256:ffb2acd9ae09c1ef9ca756f5eaf6087d0a3957cfc824543949d25f556a97744d_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-dpdk-checkup-rhel9@sha256:525aceb9396010ebcdba14040f267889b807cd84db8e5b4030429b51f0fbf5fe_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-dpdk-checkup-rhel9@sha256:553c4686f56c66cc1e3c5ad9d4051f139d43f821eac3abb98ca5cdb8b5dfe202_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-ssp-operator-rhel9@sha256:901e6cad9534c7bd7c4018c60bccfe49d7280fba5a9901ab4c4d15e9345288c4_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-ssp-operator-rhel9@sha256:badeb0f65f543b209f6af761729d9778b7b73b97d55044016dfba3f38a1f6f18_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-cleanup-vm-rhel9@sha256:28e4975fa4dac22d9da32ed2a10aed039fd957b30140daa36bab2caa998be77a_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-cleanup-vm-rhel9@sha256:b0ff7e812a576ea848590655fc13a85832d5a39f68e7769ceab9da6949da88c7_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-copy-template-rhel9@sha256:4916a6c6b1f9b529187d3b4d5fc99b90157993767b3fe2ad36a9ec77fbb46b10_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-copy-template-rhel9@sha256:f71c36442f1b61cdde7ec58d2c3c78d2039f6d6108e6c35388ef7c1650971fa1_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-create-datavolume-rhel9@sha256:2ad49cf6e2242a9e5861929d9bcab1305a7fc4e34e708f99cff1d7253aa46167_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-create-datavolume-rhel9@sha256:7112400a4ecb23ee2110bf96372fcf9f96ad648a51aa944627b40eb59539a660_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-create-vm-from-template-rhel9@sha256:1411c65bbad7302710788327f6964a4bf5bc20ef70d5e46f4a5c6e7a0e7a0161_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-create-vm-from-template-rhel9@sha256:4d962618aa95600c60c9fc8b890186e510de91177d51949e12797a3558e31328_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-customize-rhel9@sha256:5c23d3f20ea9dcbe7109284d73078ecd516a070e964b844f8d80b1d92ebd55ee_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-customize-rhel9@sha256:a780244e48c6d4f87446d3754c3eb9ab79c0d54675c189da4a659f7a4d5668ea_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-sysprep-rhel9@sha256:84577d949a1bbcaa291c70729127bca4a8994df03068666baa23840877ea8392_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-sysprep-rhel9@sha256:aed630a597a090179e1b0e0c117e536df06b67d0f793f91936aa7388c0c5d7eb_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-modify-vm-template-rhel9@sha256:31d959b80cf57462e1705684bb7e1b78af26bd2c62f1c9e4e51e1d02199b05a8_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-modify-vm-template-rhel9@sha256:66aea526bc10e4c0136ba86e394bbdfe4fbd7f757d6f391a561b51d2ba2f4d46_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-operator-rhel9@sha256:d0cf0e81589f0938de45961eaddfc5ec4782738fd11082de0439b200534259eb_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-operator-rhel9@sha256:f1b1f5044db6bb945584f9d4f31d020597725a286ef368ed0aca2116abb31beb_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-wait-for-vmi-status-rhel9@sha256:39a15d03f113735df03b1a7408227eb9604d942c1f3c1992bcdc7eaf07662711_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-wait-for-vmi-status-rhel9@sha256:afb68af076954fcd18c7a4a1464ea0c2a766e8282eae980051906ed07eaa1707_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-template-validator-rhel9@sha256:02b22c7e7014b5e72d47fed8b6a268cf307638c5510adf3916c51f7f40a52a08_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-template-validator-rhel9@sha256:c0264b9271e602f85b2040ef7f207cdfa46038dc4fa6e4738bf196ef88a71cf8_amd64",
"9Base-CNV-4.13:container-native-virtualization/libguestfs-tools-rhel9@sha256:29ae84575bbca24553cf649256759fd96ff286971d80bc2db129154a7df9b283_amd64",
"9Base-CNV-4.13:container-native-virtualization/libguestfs-tools-rhel9@sha256:6558f60343e068b032167e2340b2c549c5f0258acc5d2614b60966ce79408b01_arm64",
"9Base-CNV-4.13:container-native-virtualization/multus-dynamic-networks-rhel9@sha256:3ecb0162a4b01d1590bf209d717b32a4f0835910d9979823f18c24acba41b503_arm64",
"9Base-CNV-4.13:container-native-virtualization/multus-dynamic-networks-rhel9@sha256:b7f68b6420009e21380d32d6459193aae45e93be9533debe17cb3108571b36b8_amd64",
"9Base-CNV-4.13:container-native-virtualization/ovs-cni-plugin-rhel9@sha256:0f1d372f418744e0aff59ecb0a38f53178aac9c2e9eecfd38aa25ed83e0d1360_arm64",
"9Base-CNV-4.13:container-native-virtualization/ovs-cni-plugin-rhel9@sha256:e8e7a44edbf1713fe74de5c4b8f691cce78f4440c4a32a16ba9ad16694a55396_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-api-rhel9@sha256:e68416321ca8c74a547b3d35897f54813c03481143e402e9bdc4daf315e35b5d_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-api-rhel9@sha256:fdb4ca1bb8b310d713d9c7e88f7d091f4460aa942dbeca5ebcf17281a06daffe_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-artifacts-server-rhel9@sha256:33d11c1832b49df39c1fca62bad40dbc5c30a452248339aaef449ac99509accb_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-artifacts-server-rhel9@sha256:81fc61b714baecb5a89fa6c0749c14566e0661b8e184ca602fc2e03b9cf431ee_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-apiserver-rhel9@sha256:f6128a63344ed2129f5bce648ddcfaa2869d31cde4b93328d3c22534b97ade10_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-apiserver-rhel9@sha256:feca273a691d09445c6cff6d36b5d590735e867656a9898ce0d89744d98e8006_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-cloner-rhel9@sha256:68e3b9b0291b4fb277ac430269ffce11d13b0a7688cf2ffcdb7f98759c36b4db_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-cloner-rhel9@sha256:6ac212767481bef64d8a7d0252bb8089c0f9751fad4a355aef71bd49dad2ad07_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-controller-rhel9@sha256:65f5263275d9f0a12b8fb057d82adf678778039ec873ca9bde182dea3413c9f1_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-controller-rhel9@sha256:d9e62b2019328be258489ac852eef25f8b1233f29abac6bcea5b406329f97fed_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-importer-rhel9@sha256:00a6d9d24ca1466d450b02269ec3144fc7550f0e5c696e869fbf7ce10cae6093_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-importer-rhel9@sha256:2df07fb21a3575e74aa16ded20129828f2300cd33e8ab369b0362062d49e62d0_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-operator-rhel9@sha256:20ec064750faedd97d11b797c8c1d9a1db5d60d7d76e82e65cfd05eb79d65e29_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-operator-rhel9@sha256:802ee8923d9d8e406b23911406f9748756c0ef4d6954e9e2fd5fb4bdf91dde9a_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-uploadproxy-rhel9@sha256:392d0f61f462c707adfdc21e4239c5c09d8520a80486b41d9d9ae479267d6124_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-uploadproxy-rhel9@sha256:6775f34353eec8f35bead9411dde155530d079bb8d51582fb1f2aacc27dbde1d_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-uploadserver-rhel9@sha256:4528c24672689cfb6505761b6b108fbcc04488192733f23d2bfe39cd42a1d743_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-uploadserver-rhel9@sha256:b22048390387380af94e267c8a9a66813c515997456d59d8ebac1486916b6585_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-controller-rhel9@sha256:3e7880149ee9a68286e390beb3d9779f7403c30fc5136e5370e0e4690a3fd243_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-controller-rhel9@sha256:970edc281d7a731e9f7e8c2d4440fe48a221e5e355d5235c5413b4c3adb28503_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-exportproxy-rhel9@sha256:1bda34d5bff734ad997202f29a5ff6f7362fd79fa90511a422442ef2e3681198_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-exportproxy-rhel9@sha256:de3c4afbf7669b98517cbef2490ec186f0553dd97b05bed80ec36dd883fe507b_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-exportserver-rhel9@sha256:3f7f98645176d42c63cca5c0fc3182a03121af87446ca421b6c72baf07dfca0d_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-exportserver-rhel9@sha256:8f12955cd777eb2409037a6968aa92f50c99d6e07e722951dbcfd0c8c9829b5e_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-handler-rhel9@sha256:5fc47110d866d8048aec50689090ce10705d19d3bb48d2b06727d6d569003af7_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-handler-rhel9@sha256:84ba79ae9658699147d2493df2582ab6df10adbff4d44a533c3fe6a9f45f9691_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-launcher-rhel9@sha256:4990d40d9987d5126d105dd45be2501eaded248cb61bdde5ea8d359bc1e7ebef_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-launcher-rhel9@sha256:95aeacb98209e0baef27ce0e02fbac38d693cea74808fc77107efda0f344bcb5_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-operator-rhel9@sha256:5c1a7e4ed2061938987b900a2394f07121d4037350c9bb6485213a2adfea787d_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-operator-rhel9@sha256:66b1b3b379121d6411ba22283e7d991617177330c93746d37753ab7812b9a00b_arm64",
"9Base-CNV-4.13:container-native-virtualization/virtio-win-rhel9@sha256:8735f51da918408a8826601c082d1b29accf26d59b9978da89b980cb509c1102_arm64",
"9Base-CNV-4.13:container-native-virtualization/virtio-win-rhel9@sha256:d147d2a6eb6f907d1e88f61aaca83596853bc72164583d6dda2b1154b490de25_amd64",
"9Base-CNV-4.13:container-native-virtualization/vm-console-proxy-rhel9@sha256:70a8d0cd66182c25e02679540bae1368b2a9cf687532b58dba41ef30c5ca00c1_arm64",
"9Base-CNV-4.13:container-native-virtualization/vm-console-proxy-rhel9@sha256:7ca921f98f6d81a126907127a611146fb53397869a628678faa1e289c01d22b2_amd64",
"9Base-CNV-4.13:container-native-virtualization/vm-network-latency-checkup-rhel9@sha256:503ea7ac914a9b54e9d665a0227ee0b5d5200cdb5d692aa94c07dd1518d91b70_arm64",
"9Base-CNV-4.13:container-native-virtualization/vm-network-latency-checkup-rhel9@sha256:59fd965975bccf641a0fa7aa01374d45057bd03cda7528248a84b60b1205bf57_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "golang: regexp/syntax: limit memory used by parsing regexps"
},
{
"cve": "CVE-2022-41717",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"discovery_date": "2023-01-16T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2161274"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the net/http library of the golang package. This flaw allows an attacker to cause excessive memory growth in a Go server accepting HTTP/2 requests. HTTP/2 server connections contain a cache of HTTP header keys sent by the client. While the total number of entries in this cache is capped, an attacker sending very large keys can cause the server to allocate approximately 64 MiB per open connection.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: net/http: excessive memory growth in a Go server accepting HTTP/2 requests",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Within Red Hat OpenShift Container Platform, the grafana container is listed as will not fix. Since OCP 4.10, Grafana itself is not shipped and the Grafana web server is protected behind an OAuth proxy server.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"9Base-CNV-4.13:container-native-virtualization/bridge-marker-rhel9@sha256:8eac196b30a648989cdca5cb153a3bc3d34e47339acba0e4f760bd366496c99d_amd64",
"9Base-CNV-4.13:container-native-virtualization/bridge-marker-rhel9@sha256:e8a55aee3d75a316bb0d7a554c737198823df04b3c05e481c17e45eb2153bced_arm64",
"9Base-CNV-4.13:container-native-virtualization/cluster-network-addons-operator-rhel9@sha256:3bff33e3f40cd1e2b519c2db56734d4bb8df883e155c2f20b1cb9d3d184daec1_amd64",
"9Base-CNV-4.13:container-native-virtualization/cluster-network-addons-operator-rhel9@sha256:f439d2f420bb59eb1d5af14ce2002648d0cfc155d1a1466c8aac9b661fe902b8_arm64",
"9Base-CNV-4.13:container-native-virtualization/cnv-containernetworking-plugins-rhel9@sha256:89f22e541f61a660c9aa9f38ef58e80b84a0517f74e84292107fc252c25465c9_arm64",
"9Base-CNV-4.13:container-native-virtualization/cnv-containernetworking-plugins-rhel9@sha256:bf471997e54e4a75b0d71f492ab295787fdbb14d8c85c4ea8c03f0552dbc3755_amd64",
"9Base-CNV-4.13:container-native-virtualization/cnv-must-gather-rhel9@sha256:9e8efd76924958eb605401abdac08eba97fb83a1ada383bc87a7fb7c87b3a455_arm64",
"9Base-CNV-4.13:container-native-virtualization/cnv-must-gather-rhel9@sha256:b9fc32b5fabedd65a4c3a471879c808af2087277de4278adaa115a732f0468da_amd64",
"9Base-CNV-4.13:container-native-virtualization/hco-bundle-registry-rhel9@sha256:60e89d7a99ff9f20e974430b802dd724a3bb6fa1e01e5a62daad98ac487b3063_amd64",
"9Base-CNV-4.13:container-native-virtualization/hco-bundle-registry-rhel9@sha256:dd20b138045ef1424d83a47e7abcfcbb2ac54577dcec5ed3c186390aaa4c9d84_arm64",
"9Base-CNV-4.13:container-native-virtualization/hostpath-csi-driver-rhel9@sha256:61e2824853d51347593ad909a5e546cd92e4216d6a1df5dffb50dd9cba277cce_amd64",
"9Base-CNV-4.13:container-native-virtualization/hostpath-csi-driver-rhel9@sha256:676d4c23a5f60dd331728af056b0a6b2d3358ac88da23299b1a98dfaca8f288e_arm64",
"9Base-CNV-4.13:container-native-virtualization/hostpath-provisioner-operator-rhel9@sha256:515be94be496c67f5b8fd5f4832fe4385e56476e6589897d6b9fbb9bb2b00f32_amd64",
"9Base-CNV-4.13:container-native-virtualization/hostpath-provisioner-operator-rhel9@sha256:571ae805641dea11646028c946039983c7fd82f138b915dcb8b80c39b465e63c_arm64",
"9Base-CNV-4.13:container-native-virtualization/hostpath-provisioner-rhel9@sha256:ac3fe350bedd6bc43596444ba0f279ccf8a144ab14ac5a9b80ea71c46390b7b4_amd64",
"9Base-CNV-4.13:container-native-virtualization/hostpath-provisioner-rhel9@sha256:d4ed87745b7ee2acca2d83e2c91c2f6dced1903c81495b50f2559b3ba2dde287_arm64",
"9Base-CNV-4.13:container-native-virtualization/hyperconverged-cluster-operator-rhel9@sha256:e5ab9f3be59d3568e3d672ab374efb16990ccf92192eac4e1244b10fcd7423e2_amd64",
"9Base-CNV-4.13:container-native-virtualization/hyperconverged-cluster-operator-rhel9@sha256:e681560b184189df03fc84c8a712f32289f42573dd348cda394b19565eb6eca8_arm64",
"9Base-CNV-4.13:container-native-virtualization/hyperconverged-cluster-webhook-rhel9@sha256:06d036d320b3027bb8370bb8e0f6fe8c9f0ec9bca7aac3b5c53698ba4a170042_arm64",
"9Base-CNV-4.13:container-native-virtualization/hyperconverged-cluster-webhook-rhel9@sha256:b5a01336180aad017df62cf8e652f2491b8263ba7e4dd07f858db1ef1924cf2f_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubemacpool-rhel9@sha256:4d190d81eeb3fbe9ed56cf3548dc83a3f81641bfdafa7b42dcfb0d2512566644_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubemacpool-rhel9@sha256:59862a59854f0d5b83dc25ba119f9586a8aff42b6e60d1922f8ae7b4567309ff_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubesecondarydns-rhel9@sha256:121d30d78cc57731ea2242ef2c32430890ac66c2723e65608d5e2f26c3f515cd_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubesecondarydns-rhel9@sha256:b1838f3c8ba3d8113bddea17b78c21e1c1490e2a4a07ea77014edee523d06347_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-console-plugin-rhel9@sha256:86a4b1e3d6ad1d56302c9c058f8bc5826dcfe6c46fb3e0ddaa06818645039020_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-console-plugin-rhel9@sha256:ffb2acd9ae09c1ef9ca756f5eaf6087d0a3957cfc824543949d25f556a97744d_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-dpdk-checkup-rhel9@sha256:525aceb9396010ebcdba14040f267889b807cd84db8e5b4030429b51f0fbf5fe_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-dpdk-checkup-rhel9@sha256:553c4686f56c66cc1e3c5ad9d4051f139d43f821eac3abb98ca5cdb8b5dfe202_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-ssp-operator-rhel9@sha256:901e6cad9534c7bd7c4018c60bccfe49d7280fba5a9901ab4c4d15e9345288c4_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-ssp-operator-rhel9@sha256:badeb0f65f543b209f6af761729d9778b7b73b97d55044016dfba3f38a1f6f18_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-cleanup-vm-rhel9@sha256:28e4975fa4dac22d9da32ed2a10aed039fd957b30140daa36bab2caa998be77a_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-cleanup-vm-rhel9@sha256:b0ff7e812a576ea848590655fc13a85832d5a39f68e7769ceab9da6949da88c7_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-copy-template-rhel9@sha256:4916a6c6b1f9b529187d3b4d5fc99b90157993767b3fe2ad36a9ec77fbb46b10_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-copy-template-rhel9@sha256:f71c36442f1b61cdde7ec58d2c3c78d2039f6d6108e6c35388ef7c1650971fa1_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-create-datavolume-rhel9@sha256:2ad49cf6e2242a9e5861929d9bcab1305a7fc4e34e708f99cff1d7253aa46167_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-create-datavolume-rhel9@sha256:7112400a4ecb23ee2110bf96372fcf9f96ad648a51aa944627b40eb59539a660_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-create-vm-from-template-rhel9@sha256:1411c65bbad7302710788327f6964a4bf5bc20ef70d5e46f4a5c6e7a0e7a0161_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-create-vm-from-template-rhel9@sha256:4d962618aa95600c60c9fc8b890186e510de91177d51949e12797a3558e31328_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-customize-rhel9@sha256:5c23d3f20ea9dcbe7109284d73078ecd516a070e964b844f8d80b1d92ebd55ee_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-customize-rhel9@sha256:a780244e48c6d4f87446d3754c3eb9ab79c0d54675c189da4a659f7a4d5668ea_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-sysprep-rhel9@sha256:84577d949a1bbcaa291c70729127bca4a8994df03068666baa23840877ea8392_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-sysprep-rhel9@sha256:aed630a597a090179e1b0e0c117e536df06b67d0f793f91936aa7388c0c5d7eb_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-modify-vm-template-rhel9@sha256:31d959b80cf57462e1705684bb7e1b78af26bd2c62f1c9e4e51e1d02199b05a8_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-modify-vm-template-rhel9@sha256:66aea526bc10e4c0136ba86e394bbdfe4fbd7f757d6f391a561b51d2ba2f4d46_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-operator-rhel9@sha256:d0cf0e81589f0938de45961eaddfc5ec4782738fd11082de0439b200534259eb_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-operator-rhel9@sha256:f1b1f5044db6bb945584f9d4f31d020597725a286ef368ed0aca2116abb31beb_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-wait-for-vmi-status-rhel9@sha256:39a15d03f113735df03b1a7408227eb9604d942c1f3c1992bcdc7eaf07662711_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-wait-for-vmi-status-rhel9@sha256:afb68af076954fcd18c7a4a1464ea0c2a766e8282eae980051906ed07eaa1707_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-template-validator-rhel9@sha256:02b22c7e7014b5e72d47fed8b6a268cf307638c5510adf3916c51f7f40a52a08_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-template-validator-rhel9@sha256:c0264b9271e602f85b2040ef7f207cdfa46038dc4fa6e4738bf196ef88a71cf8_amd64",
"9Base-CNV-4.13:container-native-virtualization/libguestfs-tools-rhel9@sha256:29ae84575bbca24553cf649256759fd96ff286971d80bc2db129154a7df9b283_amd64",
"9Base-CNV-4.13:container-native-virtualization/libguestfs-tools-rhel9@sha256:6558f60343e068b032167e2340b2c549c5f0258acc5d2614b60966ce79408b01_arm64",
"9Base-CNV-4.13:container-native-virtualization/multus-dynamic-networks-rhel9@sha256:3ecb0162a4b01d1590bf209d717b32a4f0835910d9979823f18c24acba41b503_arm64",
"9Base-CNV-4.13:container-native-virtualization/multus-dynamic-networks-rhel9@sha256:b7f68b6420009e21380d32d6459193aae45e93be9533debe17cb3108571b36b8_amd64",
"9Base-CNV-4.13:container-native-virtualization/ovs-cni-plugin-rhel9@sha256:0f1d372f418744e0aff59ecb0a38f53178aac9c2e9eecfd38aa25ed83e0d1360_arm64",
"9Base-CNV-4.13:container-native-virtualization/ovs-cni-plugin-rhel9@sha256:e8e7a44edbf1713fe74de5c4b8f691cce78f4440c4a32a16ba9ad16694a55396_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-api-rhel9@sha256:e68416321ca8c74a547b3d35897f54813c03481143e402e9bdc4daf315e35b5d_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-api-rhel9@sha256:fdb4ca1bb8b310d713d9c7e88f7d091f4460aa942dbeca5ebcf17281a06daffe_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-artifacts-server-rhel9@sha256:33d11c1832b49df39c1fca62bad40dbc5c30a452248339aaef449ac99509accb_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-artifacts-server-rhel9@sha256:81fc61b714baecb5a89fa6c0749c14566e0661b8e184ca602fc2e03b9cf431ee_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-apiserver-rhel9@sha256:f6128a63344ed2129f5bce648ddcfaa2869d31cde4b93328d3c22534b97ade10_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-apiserver-rhel9@sha256:feca273a691d09445c6cff6d36b5d590735e867656a9898ce0d89744d98e8006_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-cloner-rhel9@sha256:68e3b9b0291b4fb277ac430269ffce11d13b0a7688cf2ffcdb7f98759c36b4db_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-cloner-rhel9@sha256:6ac212767481bef64d8a7d0252bb8089c0f9751fad4a355aef71bd49dad2ad07_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-controller-rhel9@sha256:65f5263275d9f0a12b8fb057d82adf678778039ec873ca9bde182dea3413c9f1_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-controller-rhel9@sha256:d9e62b2019328be258489ac852eef25f8b1233f29abac6bcea5b406329f97fed_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-importer-rhel9@sha256:00a6d9d24ca1466d450b02269ec3144fc7550f0e5c696e869fbf7ce10cae6093_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-importer-rhel9@sha256:2df07fb21a3575e74aa16ded20129828f2300cd33e8ab369b0362062d49e62d0_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-operator-rhel9@sha256:20ec064750faedd97d11b797c8c1d9a1db5d60d7d76e82e65cfd05eb79d65e29_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-operator-rhel9@sha256:802ee8923d9d8e406b23911406f9748756c0ef4d6954e9e2fd5fb4bdf91dde9a_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-uploadproxy-rhel9@sha256:392d0f61f462c707adfdc21e4239c5c09d8520a80486b41d9d9ae479267d6124_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-uploadproxy-rhel9@sha256:6775f34353eec8f35bead9411dde155530d079bb8d51582fb1f2aacc27dbde1d_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-uploadserver-rhel9@sha256:4528c24672689cfb6505761b6b108fbcc04488192733f23d2bfe39cd42a1d743_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-uploadserver-rhel9@sha256:b22048390387380af94e267c8a9a66813c515997456d59d8ebac1486916b6585_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-controller-rhel9@sha256:3e7880149ee9a68286e390beb3d9779f7403c30fc5136e5370e0e4690a3fd243_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-controller-rhel9@sha256:970edc281d7a731e9f7e8c2d4440fe48a221e5e355d5235c5413b4c3adb28503_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-exportproxy-rhel9@sha256:1bda34d5bff734ad997202f29a5ff6f7362fd79fa90511a422442ef2e3681198_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-exportproxy-rhel9@sha256:de3c4afbf7669b98517cbef2490ec186f0553dd97b05bed80ec36dd883fe507b_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-exportserver-rhel9@sha256:3f7f98645176d42c63cca5c0fc3182a03121af87446ca421b6c72baf07dfca0d_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-exportserver-rhel9@sha256:8f12955cd777eb2409037a6968aa92f50c99d6e07e722951dbcfd0c8c9829b5e_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-handler-rhel9@sha256:5fc47110d866d8048aec50689090ce10705d19d3bb48d2b06727d6d569003af7_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-handler-rhel9@sha256:84ba79ae9658699147d2493df2582ab6df10adbff4d44a533c3fe6a9f45f9691_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-launcher-rhel9@sha256:4990d40d9987d5126d105dd45be2501eaded248cb61bdde5ea8d359bc1e7ebef_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-launcher-rhel9@sha256:95aeacb98209e0baef27ce0e02fbac38d693cea74808fc77107efda0f344bcb5_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-operator-rhel9@sha256:5c1a7e4ed2061938987b900a2394f07121d4037350c9bb6485213a2adfea787d_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-operator-rhel9@sha256:66b1b3b379121d6411ba22283e7d991617177330c93746d37753ab7812b9a00b_arm64",
"9Base-CNV-4.13:container-native-virtualization/virtio-win-rhel9@sha256:8735f51da918408a8826601c082d1b29accf26d59b9978da89b980cb509c1102_arm64",
"9Base-CNV-4.13:container-native-virtualization/virtio-win-rhel9@sha256:d147d2a6eb6f907d1e88f61aaca83596853bc72164583d6dda2b1154b490de25_amd64",
"9Base-CNV-4.13:container-native-virtualization/vm-console-proxy-rhel9@sha256:70a8d0cd66182c25e02679540bae1368b2a9cf687532b58dba41ef30c5ca00c1_arm64",
"9Base-CNV-4.13:container-native-virtualization/vm-console-proxy-rhel9@sha256:7ca921f98f6d81a126907127a611146fb53397869a628678faa1e289c01d22b2_amd64",
"9Base-CNV-4.13:container-native-virtualization/vm-network-latency-checkup-rhel9@sha256:503ea7ac914a9b54e9d665a0227ee0b5d5200cdb5d692aa94c07dd1518d91b70_arm64",
"9Base-CNV-4.13:container-native-virtualization/vm-network-latency-checkup-rhel9@sha256:59fd965975bccf641a0fa7aa01374d45057bd03cda7528248a84b60b1205bf57_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-41717"
},
{
"category": "external",
"summary": "RHBZ#2161274",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2161274"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-41717",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41717"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-41717",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-41717"
},
{
"category": "external",
"summary": "https://go.dev/cl/455635",
"url": "https://go.dev/cl/455635"
},
{
"category": "external",
"summary": "https://go.dev/cl/455717",
"url": "https://go.dev/cl/455717"
},
{
"category": "external",
"summary": "https://go.dev/issue/56350",
"url": "https://go.dev/issue/56350"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/L_3rmdT0BMU/m/yZDrXjIiBQAJ",
"url": "https://groups.google.com/g/golang-announce/c/L_3rmdT0BMU/m/yZDrXjIiBQAJ"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2022-1144",
"url": "https://pkg.go.dev/vuln/GO-2022-1144"
}
],
"release_date": "2022-11-30T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-05-18T02:55:08+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"9Base-CNV-4.13:container-native-virtualization/bridge-marker-rhel9@sha256:8eac196b30a648989cdca5cb153a3bc3d34e47339acba0e4f760bd366496c99d_amd64",
"9Base-CNV-4.13:container-native-virtualization/bridge-marker-rhel9@sha256:e8a55aee3d75a316bb0d7a554c737198823df04b3c05e481c17e45eb2153bced_arm64",
"9Base-CNV-4.13:container-native-virtualization/cluster-network-addons-operator-rhel9@sha256:3bff33e3f40cd1e2b519c2db56734d4bb8df883e155c2f20b1cb9d3d184daec1_amd64",
"9Base-CNV-4.13:container-native-virtualization/cluster-network-addons-operator-rhel9@sha256:f439d2f420bb59eb1d5af14ce2002648d0cfc155d1a1466c8aac9b661fe902b8_arm64",
"9Base-CNV-4.13:container-native-virtualization/cnv-containernetworking-plugins-rhel9@sha256:89f22e541f61a660c9aa9f38ef58e80b84a0517f74e84292107fc252c25465c9_arm64",
"9Base-CNV-4.13:container-native-virtualization/cnv-containernetworking-plugins-rhel9@sha256:bf471997e54e4a75b0d71f492ab295787fdbb14d8c85c4ea8c03f0552dbc3755_amd64",
"9Base-CNV-4.13:container-native-virtualization/cnv-must-gather-rhel9@sha256:9e8efd76924958eb605401abdac08eba97fb83a1ada383bc87a7fb7c87b3a455_arm64",
"9Base-CNV-4.13:container-native-virtualization/cnv-must-gather-rhel9@sha256:b9fc32b5fabedd65a4c3a471879c808af2087277de4278adaa115a732f0468da_amd64",
"9Base-CNV-4.13:container-native-virtualization/hco-bundle-registry-rhel9@sha256:60e89d7a99ff9f20e974430b802dd724a3bb6fa1e01e5a62daad98ac487b3063_amd64",
"9Base-CNV-4.13:container-native-virtualization/hco-bundle-registry-rhel9@sha256:dd20b138045ef1424d83a47e7abcfcbb2ac54577dcec5ed3c186390aaa4c9d84_arm64",
"9Base-CNV-4.13:container-native-virtualization/hostpath-csi-driver-rhel9@sha256:61e2824853d51347593ad909a5e546cd92e4216d6a1df5dffb50dd9cba277cce_amd64",
"9Base-CNV-4.13:container-native-virtualization/hostpath-csi-driver-rhel9@sha256:676d4c23a5f60dd331728af056b0a6b2d3358ac88da23299b1a98dfaca8f288e_arm64",
"9Base-CNV-4.13:container-native-virtualization/hostpath-provisioner-operator-rhel9@sha256:515be94be496c67f5b8fd5f4832fe4385e56476e6589897d6b9fbb9bb2b00f32_amd64",
"9Base-CNV-4.13:container-native-virtualization/hostpath-provisioner-operator-rhel9@sha256:571ae805641dea11646028c946039983c7fd82f138b915dcb8b80c39b465e63c_arm64",
"9Base-CNV-4.13:container-native-virtualization/hostpath-provisioner-rhel9@sha256:ac3fe350bedd6bc43596444ba0f279ccf8a144ab14ac5a9b80ea71c46390b7b4_amd64",
"9Base-CNV-4.13:container-native-virtualization/hostpath-provisioner-rhel9@sha256:d4ed87745b7ee2acca2d83e2c91c2f6dced1903c81495b50f2559b3ba2dde287_arm64",
"9Base-CNV-4.13:container-native-virtualization/hyperconverged-cluster-operator-rhel9@sha256:e5ab9f3be59d3568e3d672ab374efb16990ccf92192eac4e1244b10fcd7423e2_amd64",
"9Base-CNV-4.13:container-native-virtualization/hyperconverged-cluster-operator-rhel9@sha256:e681560b184189df03fc84c8a712f32289f42573dd348cda394b19565eb6eca8_arm64",
"9Base-CNV-4.13:container-native-virtualization/hyperconverged-cluster-webhook-rhel9@sha256:06d036d320b3027bb8370bb8e0f6fe8c9f0ec9bca7aac3b5c53698ba4a170042_arm64",
"9Base-CNV-4.13:container-native-virtualization/hyperconverged-cluster-webhook-rhel9@sha256:b5a01336180aad017df62cf8e652f2491b8263ba7e4dd07f858db1ef1924cf2f_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubemacpool-rhel9@sha256:4d190d81eeb3fbe9ed56cf3548dc83a3f81641bfdafa7b42dcfb0d2512566644_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubemacpool-rhel9@sha256:59862a59854f0d5b83dc25ba119f9586a8aff42b6e60d1922f8ae7b4567309ff_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubesecondarydns-rhel9@sha256:121d30d78cc57731ea2242ef2c32430890ac66c2723e65608d5e2f26c3f515cd_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubesecondarydns-rhel9@sha256:b1838f3c8ba3d8113bddea17b78c21e1c1490e2a4a07ea77014edee523d06347_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-console-plugin-rhel9@sha256:86a4b1e3d6ad1d56302c9c058f8bc5826dcfe6c46fb3e0ddaa06818645039020_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-console-plugin-rhel9@sha256:ffb2acd9ae09c1ef9ca756f5eaf6087d0a3957cfc824543949d25f556a97744d_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-dpdk-checkup-rhel9@sha256:525aceb9396010ebcdba14040f267889b807cd84db8e5b4030429b51f0fbf5fe_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-dpdk-checkup-rhel9@sha256:553c4686f56c66cc1e3c5ad9d4051f139d43f821eac3abb98ca5cdb8b5dfe202_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-ssp-operator-rhel9@sha256:901e6cad9534c7bd7c4018c60bccfe49d7280fba5a9901ab4c4d15e9345288c4_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-ssp-operator-rhel9@sha256:badeb0f65f543b209f6af761729d9778b7b73b97d55044016dfba3f38a1f6f18_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-cleanup-vm-rhel9@sha256:28e4975fa4dac22d9da32ed2a10aed039fd957b30140daa36bab2caa998be77a_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-cleanup-vm-rhel9@sha256:b0ff7e812a576ea848590655fc13a85832d5a39f68e7769ceab9da6949da88c7_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-copy-template-rhel9@sha256:4916a6c6b1f9b529187d3b4d5fc99b90157993767b3fe2ad36a9ec77fbb46b10_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-copy-template-rhel9@sha256:f71c36442f1b61cdde7ec58d2c3c78d2039f6d6108e6c35388ef7c1650971fa1_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-create-datavolume-rhel9@sha256:2ad49cf6e2242a9e5861929d9bcab1305a7fc4e34e708f99cff1d7253aa46167_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-create-datavolume-rhel9@sha256:7112400a4ecb23ee2110bf96372fcf9f96ad648a51aa944627b40eb59539a660_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-create-vm-from-template-rhel9@sha256:1411c65bbad7302710788327f6964a4bf5bc20ef70d5e46f4a5c6e7a0e7a0161_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-create-vm-from-template-rhel9@sha256:4d962618aa95600c60c9fc8b890186e510de91177d51949e12797a3558e31328_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-customize-rhel9@sha256:5c23d3f20ea9dcbe7109284d73078ecd516a070e964b844f8d80b1d92ebd55ee_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-customize-rhel9@sha256:a780244e48c6d4f87446d3754c3eb9ab79c0d54675c189da4a659f7a4d5668ea_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-sysprep-rhel9@sha256:84577d949a1bbcaa291c70729127bca4a8994df03068666baa23840877ea8392_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-sysprep-rhel9@sha256:aed630a597a090179e1b0e0c117e536df06b67d0f793f91936aa7388c0c5d7eb_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-modify-vm-template-rhel9@sha256:31d959b80cf57462e1705684bb7e1b78af26bd2c62f1c9e4e51e1d02199b05a8_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-modify-vm-template-rhel9@sha256:66aea526bc10e4c0136ba86e394bbdfe4fbd7f757d6f391a561b51d2ba2f4d46_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-operator-rhel9@sha256:d0cf0e81589f0938de45961eaddfc5ec4782738fd11082de0439b200534259eb_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-operator-rhel9@sha256:f1b1f5044db6bb945584f9d4f31d020597725a286ef368ed0aca2116abb31beb_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-wait-for-vmi-status-rhel9@sha256:39a15d03f113735df03b1a7408227eb9604d942c1f3c1992bcdc7eaf07662711_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-wait-for-vmi-status-rhel9@sha256:afb68af076954fcd18c7a4a1464ea0c2a766e8282eae980051906ed07eaa1707_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-template-validator-rhel9@sha256:02b22c7e7014b5e72d47fed8b6a268cf307638c5510adf3916c51f7f40a52a08_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-template-validator-rhel9@sha256:c0264b9271e602f85b2040ef7f207cdfa46038dc4fa6e4738bf196ef88a71cf8_amd64",
"9Base-CNV-4.13:container-native-virtualization/libguestfs-tools-rhel9@sha256:29ae84575bbca24553cf649256759fd96ff286971d80bc2db129154a7df9b283_amd64",
"9Base-CNV-4.13:container-native-virtualization/libguestfs-tools-rhel9@sha256:6558f60343e068b032167e2340b2c549c5f0258acc5d2614b60966ce79408b01_arm64",
"9Base-CNV-4.13:container-native-virtualization/multus-dynamic-networks-rhel9@sha256:3ecb0162a4b01d1590bf209d717b32a4f0835910d9979823f18c24acba41b503_arm64",
"9Base-CNV-4.13:container-native-virtualization/multus-dynamic-networks-rhel9@sha256:b7f68b6420009e21380d32d6459193aae45e93be9533debe17cb3108571b36b8_amd64",
"9Base-CNV-4.13:container-native-virtualization/ovs-cni-plugin-rhel9@sha256:0f1d372f418744e0aff59ecb0a38f53178aac9c2e9eecfd38aa25ed83e0d1360_arm64",
"9Base-CNV-4.13:container-native-virtualization/ovs-cni-plugin-rhel9@sha256:e8e7a44edbf1713fe74de5c4b8f691cce78f4440c4a32a16ba9ad16694a55396_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-api-rhel9@sha256:e68416321ca8c74a547b3d35897f54813c03481143e402e9bdc4daf315e35b5d_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-api-rhel9@sha256:fdb4ca1bb8b310d713d9c7e88f7d091f4460aa942dbeca5ebcf17281a06daffe_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-artifacts-server-rhel9@sha256:33d11c1832b49df39c1fca62bad40dbc5c30a452248339aaef449ac99509accb_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-artifacts-server-rhel9@sha256:81fc61b714baecb5a89fa6c0749c14566e0661b8e184ca602fc2e03b9cf431ee_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-apiserver-rhel9@sha256:f6128a63344ed2129f5bce648ddcfaa2869d31cde4b93328d3c22534b97ade10_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-apiserver-rhel9@sha256:feca273a691d09445c6cff6d36b5d590735e867656a9898ce0d89744d98e8006_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-cloner-rhel9@sha256:68e3b9b0291b4fb277ac430269ffce11d13b0a7688cf2ffcdb7f98759c36b4db_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-cloner-rhel9@sha256:6ac212767481bef64d8a7d0252bb8089c0f9751fad4a355aef71bd49dad2ad07_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-controller-rhel9@sha256:65f5263275d9f0a12b8fb057d82adf678778039ec873ca9bde182dea3413c9f1_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-controller-rhel9@sha256:d9e62b2019328be258489ac852eef25f8b1233f29abac6bcea5b406329f97fed_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-importer-rhel9@sha256:00a6d9d24ca1466d450b02269ec3144fc7550f0e5c696e869fbf7ce10cae6093_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-importer-rhel9@sha256:2df07fb21a3575e74aa16ded20129828f2300cd33e8ab369b0362062d49e62d0_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-operator-rhel9@sha256:20ec064750faedd97d11b797c8c1d9a1db5d60d7d76e82e65cfd05eb79d65e29_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-operator-rhel9@sha256:802ee8923d9d8e406b23911406f9748756c0ef4d6954e9e2fd5fb4bdf91dde9a_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-uploadproxy-rhel9@sha256:392d0f61f462c707adfdc21e4239c5c09d8520a80486b41d9d9ae479267d6124_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-uploadproxy-rhel9@sha256:6775f34353eec8f35bead9411dde155530d079bb8d51582fb1f2aacc27dbde1d_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-uploadserver-rhel9@sha256:4528c24672689cfb6505761b6b108fbcc04488192733f23d2bfe39cd42a1d743_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-uploadserver-rhel9@sha256:b22048390387380af94e267c8a9a66813c515997456d59d8ebac1486916b6585_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-controller-rhel9@sha256:3e7880149ee9a68286e390beb3d9779f7403c30fc5136e5370e0e4690a3fd243_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-controller-rhel9@sha256:970edc281d7a731e9f7e8c2d4440fe48a221e5e355d5235c5413b4c3adb28503_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-exportproxy-rhel9@sha256:1bda34d5bff734ad997202f29a5ff6f7362fd79fa90511a422442ef2e3681198_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-exportproxy-rhel9@sha256:de3c4afbf7669b98517cbef2490ec186f0553dd97b05bed80ec36dd883fe507b_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-exportserver-rhel9@sha256:3f7f98645176d42c63cca5c0fc3182a03121af87446ca421b6c72baf07dfca0d_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-exportserver-rhel9@sha256:8f12955cd777eb2409037a6968aa92f50c99d6e07e722951dbcfd0c8c9829b5e_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-handler-rhel9@sha256:5fc47110d866d8048aec50689090ce10705d19d3bb48d2b06727d6d569003af7_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-handler-rhel9@sha256:84ba79ae9658699147d2493df2582ab6df10adbff4d44a533c3fe6a9f45f9691_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-launcher-rhel9@sha256:4990d40d9987d5126d105dd45be2501eaded248cb61bdde5ea8d359bc1e7ebef_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-launcher-rhel9@sha256:95aeacb98209e0baef27ce0e02fbac38d693cea74808fc77107efda0f344bcb5_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-operator-rhel9@sha256:5c1a7e4ed2061938987b900a2394f07121d4037350c9bb6485213a2adfea787d_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-operator-rhel9@sha256:66b1b3b379121d6411ba22283e7d991617177330c93746d37753ab7812b9a00b_arm64",
"9Base-CNV-4.13:container-native-virtualization/virtio-win-rhel9@sha256:8735f51da918408a8826601c082d1b29accf26d59b9978da89b980cb509c1102_arm64",
"9Base-CNV-4.13:container-native-virtualization/virtio-win-rhel9@sha256:d147d2a6eb6f907d1e88f61aaca83596853bc72164583d6dda2b1154b490de25_amd64",
"9Base-CNV-4.13:container-native-virtualization/vm-console-proxy-rhel9@sha256:70a8d0cd66182c25e02679540bae1368b2a9cf687532b58dba41ef30c5ca00c1_arm64",
"9Base-CNV-4.13:container-native-virtualization/vm-console-proxy-rhel9@sha256:7ca921f98f6d81a126907127a611146fb53397869a628678faa1e289c01d22b2_amd64",
"9Base-CNV-4.13:container-native-virtualization/vm-network-latency-checkup-rhel9@sha256:503ea7ac914a9b54e9d665a0227ee0b5d5200cdb5d692aa94c07dd1518d91b70_arm64",
"9Base-CNV-4.13:container-native-virtualization/vm-network-latency-checkup-rhel9@sha256:59fd965975bccf641a0fa7aa01374d45057bd03cda7528248a84b60b1205bf57_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:3205"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"9Base-CNV-4.13:container-native-virtualization/bridge-marker-rhel9@sha256:8eac196b30a648989cdca5cb153a3bc3d34e47339acba0e4f760bd366496c99d_amd64",
"9Base-CNV-4.13:container-native-virtualization/bridge-marker-rhel9@sha256:e8a55aee3d75a316bb0d7a554c737198823df04b3c05e481c17e45eb2153bced_arm64",
"9Base-CNV-4.13:container-native-virtualization/cluster-network-addons-operator-rhel9@sha256:3bff33e3f40cd1e2b519c2db56734d4bb8df883e155c2f20b1cb9d3d184daec1_amd64",
"9Base-CNV-4.13:container-native-virtualization/cluster-network-addons-operator-rhel9@sha256:f439d2f420bb59eb1d5af14ce2002648d0cfc155d1a1466c8aac9b661fe902b8_arm64",
"9Base-CNV-4.13:container-native-virtualization/cnv-containernetworking-plugins-rhel9@sha256:89f22e541f61a660c9aa9f38ef58e80b84a0517f74e84292107fc252c25465c9_arm64",
"9Base-CNV-4.13:container-native-virtualization/cnv-containernetworking-plugins-rhel9@sha256:bf471997e54e4a75b0d71f492ab295787fdbb14d8c85c4ea8c03f0552dbc3755_amd64",
"9Base-CNV-4.13:container-native-virtualization/cnv-must-gather-rhel9@sha256:9e8efd76924958eb605401abdac08eba97fb83a1ada383bc87a7fb7c87b3a455_arm64",
"9Base-CNV-4.13:container-native-virtualization/cnv-must-gather-rhel9@sha256:b9fc32b5fabedd65a4c3a471879c808af2087277de4278adaa115a732f0468da_amd64",
"9Base-CNV-4.13:container-native-virtualization/hco-bundle-registry-rhel9@sha256:60e89d7a99ff9f20e974430b802dd724a3bb6fa1e01e5a62daad98ac487b3063_amd64",
"9Base-CNV-4.13:container-native-virtualization/hco-bundle-registry-rhel9@sha256:dd20b138045ef1424d83a47e7abcfcbb2ac54577dcec5ed3c186390aaa4c9d84_arm64",
"9Base-CNV-4.13:container-native-virtualization/hostpath-csi-driver-rhel9@sha256:61e2824853d51347593ad909a5e546cd92e4216d6a1df5dffb50dd9cba277cce_amd64",
"9Base-CNV-4.13:container-native-virtualization/hostpath-csi-driver-rhel9@sha256:676d4c23a5f60dd331728af056b0a6b2d3358ac88da23299b1a98dfaca8f288e_arm64",
"9Base-CNV-4.13:container-native-virtualization/hostpath-provisioner-operator-rhel9@sha256:515be94be496c67f5b8fd5f4832fe4385e56476e6589897d6b9fbb9bb2b00f32_amd64",
"9Base-CNV-4.13:container-native-virtualization/hostpath-provisioner-operator-rhel9@sha256:571ae805641dea11646028c946039983c7fd82f138b915dcb8b80c39b465e63c_arm64",
"9Base-CNV-4.13:container-native-virtualization/hostpath-provisioner-rhel9@sha256:ac3fe350bedd6bc43596444ba0f279ccf8a144ab14ac5a9b80ea71c46390b7b4_amd64",
"9Base-CNV-4.13:container-native-virtualization/hostpath-provisioner-rhel9@sha256:d4ed87745b7ee2acca2d83e2c91c2f6dced1903c81495b50f2559b3ba2dde287_arm64",
"9Base-CNV-4.13:container-native-virtualization/hyperconverged-cluster-operator-rhel9@sha256:e5ab9f3be59d3568e3d672ab374efb16990ccf92192eac4e1244b10fcd7423e2_amd64",
"9Base-CNV-4.13:container-native-virtualization/hyperconverged-cluster-operator-rhel9@sha256:e681560b184189df03fc84c8a712f32289f42573dd348cda394b19565eb6eca8_arm64",
"9Base-CNV-4.13:container-native-virtualization/hyperconverged-cluster-webhook-rhel9@sha256:06d036d320b3027bb8370bb8e0f6fe8c9f0ec9bca7aac3b5c53698ba4a170042_arm64",
"9Base-CNV-4.13:container-native-virtualization/hyperconverged-cluster-webhook-rhel9@sha256:b5a01336180aad017df62cf8e652f2491b8263ba7e4dd07f858db1ef1924cf2f_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubemacpool-rhel9@sha256:4d190d81eeb3fbe9ed56cf3548dc83a3f81641bfdafa7b42dcfb0d2512566644_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubemacpool-rhel9@sha256:59862a59854f0d5b83dc25ba119f9586a8aff42b6e60d1922f8ae7b4567309ff_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubesecondarydns-rhel9@sha256:121d30d78cc57731ea2242ef2c32430890ac66c2723e65608d5e2f26c3f515cd_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubesecondarydns-rhel9@sha256:b1838f3c8ba3d8113bddea17b78c21e1c1490e2a4a07ea77014edee523d06347_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-console-plugin-rhel9@sha256:86a4b1e3d6ad1d56302c9c058f8bc5826dcfe6c46fb3e0ddaa06818645039020_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-console-plugin-rhel9@sha256:ffb2acd9ae09c1ef9ca756f5eaf6087d0a3957cfc824543949d25f556a97744d_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-dpdk-checkup-rhel9@sha256:525aceb9396010ebcdba14040f267889b807cd84db8e5b4030429b51f0fbf5fe_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-dpdk-checkup-rhel9@sha256:553c4686f56c66cc1e3c5ad9d4051f139d43f821eac3abb98ca5cdb8b5dfe202_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-ssp-operator-rhel9@sha256:901e6cad9534c7bd7c4018c60bccfe49d7280fba5a9901ab4c4d15e9345288c4_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-ssp-operator-rhel9@sha256:badeb0f65f543b209f6af761729d9778b7b73b97d55044016dfba3f38a1f6f18_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-cleanup-vm-rhel9@sha256:28e4975fa4dac22d9da32ed2a10aed039fd957b30140daa36bab2caa998be77a_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-cleanup-vm-rhel9@sha256:b0ff7e812a576ea848590655fc13a85832d5a39f68e7769ceab9da6949da88c7_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-copy-template-rhel9@sha256:4916a6c6b1f9b529187d3b4d5fc99b90157993767b3fe2ad36a9ec77fbb46b10_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-copy-template-rhel9@sha256:f71c36442f1b61cdde7ec58d2c3c78d2039f6d6108e6c35388ef7c1650971fa1_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-create-datavolume-rhel9@sha256:2ad49cf6e2242a9e5861929d9bcab1305a7fc4e34e708f99cff1d7253aa46167_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-create-datavolume-rhel9@sha256:7112400a4ecb23ee2110bf96372fcf9f96ad648a51aa944627b40eb59539a660_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-create-vm-from-template-rhel9@sha256:1411c65bbad7302710788327f6964a4bf5bc20ef70d5e46f4a5c6e7a0e7a0161_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-create-vm-from-template-rhel9@sha256:4d962618aa95600c60c9fc8b890186e510de91177d51949e12797a3558e31328_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-customize-rhel9@sha256:5c23d3f20ea9dcbe7109284d73078ecd516a070e964b844f8d80b1d92ebd55ee_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-customize-rhel9@sha256:a780244e48c6d4f87446d3754c3eb9ab79c0d54675c189da4a659f7a4d5668ea_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-sysprep-rhel9@sha256:84577d949a1bbcaa291c70729127bca4a8994df03068666baa23840877ea8392_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-sysprep-rhel9@sha256:aed630a597a090179e1b0e0c117e536df06b67d0f793f91936aa7388c0c5d7eb_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-modify-vm-template-rhel9@sha256:31d959b80cf57462e1705684bb7e1b78af26bd2c62f1c9e4e51e1d02199b05a8_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-modify-vm-template-rhel9@sha256:66aea526bc10e4c0136ba86e394bbdfe4fbd7f757d6f391a561b51d2ba2f4d46_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-operator-rhel9@sha256:d0cf0e81589f0938de45961eaddfc5ec4782738fd11082de0439b200534259eb_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-operator-rhel9@sha256:f1b1f5044db6bb945584f9d4f31d020597725a286ef368ed0aca2116abb31beb_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-wait-for-vmi-status-rhel9@sha256:39a15d03f113735df03b1a7408227eb9604d942c1f3c1992bcdc7eaf07662711_amd64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-wait-for-vmi-status-rhel9@sha256:afb68af076954fcd18c7a4a1464ea0c2a766e8282eae980051906ed07eaa1707_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-template-validator-rhel9@sha256:02b22c7e7014b5e72d47fed8b6a268cf307638c5510adf3916c51f7f40a52a08_arm64",
"9Base-CNV-4.13:container-native-virtualization/kubevirt-template-validator-rhel9@sha256:c0264b9271e602f85b2040ef7f207cdfa46038dc4fa6e4738bf196ef88a71cf8_amd64",
"9Base-CNV-4.13:container-native-virtualization/libguestfs-tools-rhel9@sha256:29ae84575bbca24553cf649256759fd96ff286971d80bc2db129154a7df9b283_amd64",
"9Base-CNV-4.13:container-native-virtualization/libguestfs-tools-rhel9@sha256:6558f60343e068b032167e2340b2c549c5f0258acc5d2614b60966ce79408b01_arm64",
"9Base-CNV-4.13:container-native-virtualization/multus-dynamic-networks-rhel9@sha256:3ecb0162a4b01d1590bf209d717b32a4f0835910d9979823f18c24acba41b503_arm64",
"9Base-CNV-4.13:container-native-virtualization/multus-dynamic-networks-rhel9@sha256:b7f68b6420009e21380d32d6459193aae45e93be9533debe17cb3108571b36b8_amd64",
"9Base-CNV-4.13:container-native-virtualization/ovs-cni-plugin-rhel9@sha256:0f1d372f418744e0aff59ecb0a38f53178aac9c2e9eecfd38aa25ed83e0d1360_arm64",
"9Base-CNV-4.13:container-native-virtualization/ovs-cni-plugin-rhel9@sha256:e8e7a44edbf1713fe74de5c4b8f691cce78f4440c4a32a16ba9ad16694a55396_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-api-rhel9@sha256:e68416321ca8c74a547b3d35897f54813c03481143e402e9bdc4daf315e35b5d_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-api-rhel9@sha256:fdb4ca1bb8b310d713d9c7e88f7d091f4460aa942dbeca5ebcf17281a06daffe_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-artifacts-server-rhel9@sha256:33d11c1832b49df39c1fca62bad40dbc5c30a452248339aaef449ac99509accb_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-artifacts-server-rhel9@sha256:81fc61b714baecb5a89fa6c0749c14566e0661b8e184ca602fc2e03b9cf431ee_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-apiserver-rhel9@sha256:f6128a63344ed2129f5bce648ddcfaa2869d31cde4b93328d3c22534b97ade10_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-apiserver-rhel9@sha256:feca273a691d09445c6cff6d36b5d590735e867656a9898ce0d89744d98e8006_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-cloner-rhel9@sha256:68e3b9b0291b4fb277ac430269ffce11d13b0a7688cf2ffcdb7f98759c36b4db_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-cloner-rhel9@sha256:6ac212767481bef64d8a7d0252bb8089c0f9751fad4a355aef71bd49dad2ad07_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-controller-rhel9@sha256:65f5263275d9f0a12b8fb057d82adf678778039ec873ca9bde182dea3413c9f1_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-controller-rhel9@sha256:d9e62b2019328be258489ac852eef25f8b1233f29abac6bcea5b406329f97fed_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-importer-rhel9@sha256:00a6d9d24ca1466d450b02269ec3144fc7550f0e5c696e869fbf7ce10cae6093_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-importer-rhel9@sha256:2df07fb21a3575e74aa16ded20129828f2300cd33e8ab369b0362062d49e62d0_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-operator-rhel9@sha256:20ec064750faedd97d11b797c8c1d9a1db5d60d7d76e82e65cfd05eb79d65e29_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-operator-rhel9@sha256:802ee8923d9d8e406b23911406f9748756c0ef4d6954e9e2fd5fb4bdf91dde9a_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-uploadproxy-rhel9@sha256:392d0f61f462c707adfdc21e4239c5c09d8520a80486b41d9d9ae479267d6124_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-uploadproxy-rhel9@sha256:6775f34353eec8f35bead9411dde155530d079bb8d51582fb1f2aacc27dbde1d_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-uploadserver-rhel9@sha256:4528c24672689cfb6505761b6b108fbcc04488192733f23d2bfe39cd42a1d743_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-cdi-uploadserver-rhel9@sha256:b22048390387380af94e267c8a9a66813c515997456d59d8ebac1486916b6585_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-controller-rhel9@sha256:3e7880149ee9a68286e390beb3d9779f7403c30fc5136e5370e0e4690a3fd243_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-controller-rhel9@sha256:970edc281d7a731e9f7e8c2d4440fe48a221e5e355d5235c5413b4c3adb28503_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-exportproxy-rhel9@sha256:1bda34d5bff734ad997202f29a5ff6f7362fd79fa90511a422442ef2e3681198_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-exportproxy-rhel9@sha256:de3c4afbf7669b98517cbef2490ec186f0553dd97b05bed80ec36dd883fe507b_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-exportserver-rhel9@sha256:3f7f98645176d42c63cca5c0fc3182a03121af87446ca421b6c72baf07dfca0d_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-exportserver-rhel9@sha256:8f12955cd777eb2409037a6968aa92f50c99d6e07e722951dbcfd0c8c9829b5e_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-handler-rhel9@sha256:5fc47110d866d8048aec50689090ce10705d19d3bb48d2b06727d6d569003af7_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-handler-rhel9@sha256:84ba79ae9658699147d2493df2582ab6df10adbff4d44a533c3fe6a9f45f9691_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-launcher-rhel9@sha256:4990d40d9987d5126d105dd45be2501eaded248cb61bdde5ea8d359bc1e7ebef_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-launcher-rhel9@sha256:95aeacb98209e0baef27ce0e02fbac38d693cea74808fc77107efda0f344bcb5_arm64",
"9Base-CNV-4.13:container-native-virtualization/virt-operator-rhel9@sha256:5c1a7e4ed2061938987b900a2394f07121d4037350c9bb6485213a2adfea787d_amd64",
"9Base-CNV-4.13:container-native-virtualization/virt-operator-rhel9@sha256:66b1b3b379121d6411ba22283e7d991617177330c93746d37753ab7812b9a00b_arm64",
"9Base-CNV-4.13:container-native-virtualization/virtio-win-rhel9@sha256:8735f51da918408a8826601c082d1b29accf26d59b9978da89b980cb509c1102_arm64",
"9Base-CNV-4.13:container-native-virtualization/virtio-win-rhel9@sha256:d147d2a6eb6f907d1e88f61aaca83596853bc72164583d6dda2b1154b490de25_amd64",
"9Base-CNV-4.13:container-native-virtualization/vm-console-proxy-rhel9@sha256:70a8d0cd66182c25e02679540bae1368b2a9cf687532b58dba41ef30c5ca00c1_arm64",
"9Base-CNV-4.13:container-native-virtualization/vm-console-proxy-rhel9@sha256:7ca921f98f6d81a126907127a611146fb53397869a628678faa1e289c01d22b2_amd64",
"9Base-CNV-4.13:container-native-virtualization/vm-network-latency-checkup-rhel9@sha256:503ea7ac914a9b54e9d665a0227ee0b5d5200cdb5d692aa94c07dd1518d91b70_arm64",
"9Base-CNV-4.13:container-native-virtualization/vm-network-latency-checkup-rhel9@sha256:59fd965975bccf641a0fa7aa01374d45057bd03cda7528248a84b60b1205bf57_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "golang: net/http: excessive memory growth in a Go server accepting HTTP/2 requests"
}
]
}
RHSA-2023:1042
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Custom Metrics Autoscaler Operator for Red Hat OpenShift including security updates.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The Custom Metrics Autoscaler Operator for Red Hat OpenShift is an optional\noperator, based on the Kubernetes Event Driven Autoscaler (KEDA), that allows workloads to be scaled using additional metrics sources other than pod metrics.\nThis release builds upon updated compiler, runtime library, and base images for the purpose of resolving any potential security issues present in previous toolset versions.\n\nThis version makes use of newer tools and libraries to address the following issues:\ngolang: net/http: improper sanitization of Transfer-Encoding header (CVE-2022-1705)\ngolang: go/parser: stack exhaustion in all Parse* functions (CVE-2022-1962)\ngolang: archive/tar: unbounded memory consumption when reading headers (CVE-2022-2879)\ngolang: net/http/httputil: ReverseProxy should not forward unparseable query parameters (CVE-2022-2880)\ngolang: net/http: handle server errors after sending GOAWAY (CVE-2022-27664)\ngolang: encoding/xml: stack exhaustion in Decoder.Skip (CVE-2022-28131)\ngolang: crypto/elliptic: panic caused by oversized scalar (CVE-2022-28327)\ngolang: io/fs: stack exhaustion in Glob (CVE-2022-30630)\ngolang: compress/gzip: stack exhaustion in Reader.Read (CVE-2022-30631)\ngolang: path/filepath: stack exhaustion in Glob (CVE-2022-30632)\ngolang: encoding/xml: stack exhaustion in Unmarshal (CVE-2022-30633)\ngolang: encoding/gob: stack exhaustion in Decoder.Decode (CVE-2022-30635)\ngolang: net/http/httputil: NewSingleHostReverseProxy - omit X-Forwarded-For not working (CVE-2022-32148)\ngolang: golang.org/x/text/language: ParseAcceptLanguage takes a long time to parse complex tags (CVE-2022-32149)\ngolang: regexp/syntax: limit memory used by parsing regexps (CVE-2022-41715)",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2023:1042",
"url": "https://access.redhat.com/errata/RHSA-2023:1042"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#moderate",
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "2077689",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2077689"
},
{
"category": "external",
"summary": "2100763",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2100763"
},
{
"category": "external",
"summary": "2107342",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2107342"
},
{
"category": "external",
"summary": "2107371",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2107371"
},
{
"category": "external",
"summary": "2107374",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2107374"
},
{
"category": "external",
"summary": "2107376",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2107376"
},
{
"category": "external",
"summary": "2107383",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2107383"
},
{
"category": "external",
"summary": "2107386",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2107386"
},
{
"category": "external",
"summary": "2107388",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2107388"
},
{
"category": "external",
"summary": "2107390",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2107390"
},
{
"category": "external",
"summary": "2107392",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2107392"
},
{
"category": "external",
"summary": "2113945",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2113945"
},
{
"category": "external",
"summary": "2118404",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2118404"
},
{
"category": "external",
"summary": "2124669",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2124669"
},
{
"category": "external",
"summary": "2132867",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2132867"
},
{
"category": "external",
"summary": "2132868",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2132868"
},
{
"category": "external",
"summary": "2132872",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2132872"
},
{
"category": "external",
"summary": "2134010",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2134010"
},
{
"category": "external",
"summary": "OCPNODE-1260",
"url": "https://issues.redhat.com/browse/OCPNODE-1260"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2023/rhsa-2023_1042.json"
}
],
"title": "Red Hat Security Advisory: Custom Metrics Autoscaler Operator for Red Hat OpenShift (with security updates)",
"tracking": {
"current_release_date": "2025-10-23T23:57:09+00:00",
"generator": {
"date": "2025-10-23T23:57:09+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.9"
}
},
"id": "RHSA-2023:1042",
"initial_release_date": "2023-03-06T18:38:53+00:00",
"revision_history": [
{
"date": "2023-03-06T18:38:53+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2023-03-06T18:38:53+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-10-23T23:57:09+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "OpenShift Custom Metrics Autoscaler 2",
"product": {
"name": "OpenShift Custom Metrics Autoscaler 2",
"product_id": "8Base-OCMA-2",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:openshift_custom_metrics_autoscaler:2.0::el8"
}
}
}
],
"category": "product_family",
"name": "OpenShift Custom Metrics Autoscaler"
},
{
"branches": [
{
"category": "product_version",
"name": "custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-adapter-rhel8@sha256:c79cb3c68317a224277a8ee0dc78832fcd4b6da18b9b5b074cffaad14e2f1aa5_amd64",
"product": {
"name": "custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-adapter-rhel8@sha256:c79cb3c68317a224277a8ee0dc78832fcd4b6da18b9b5b074cffaad14e2f1aa5_amd64",
"product_id": "custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-adapter-rhel8@sha256:c79cb3c68317a224277a8ee0dc78832fcd4b6da18b9b5b074cffaad14e2f1aa5_amd64",
"product_identification_helper": {
"purl": "pkg:oci/custom-metrics-autoscaler-adapter-rhel8@sha256:c79cb3c68317a224277a8ee0dc78832fcd4b6da18b9b5b074cffaad14e2f1aa5?arch=amd64\u0026repository_url=registry.redhat.io/custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-adapter-rhel8\u0026tag=2.8.2-143"
}
}
},
{
"category": "product_version",
"name": "custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-rhel8@sha256:a403d057cd2ca820306207282007d4d117623e1a2ebb8bee67c19f5796f07f95_amd64",
"product": {
"name": "custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-rhel8@sha256:a403d057cd2ca820306207282007d4d117623e1a2ebb8bee67c19f5796f07f95_amd64",
"product_id": "custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-rhel8@sha256:a403d057cd2ca820306207282007d4d117623e1a2ebb8bee67c19f5796f07f95_amd64",
"product_identification_helper": {
"purl": "pkg:oci/custom-metrics-autoscaler-rhel8@sha256:a403d057cd2ca820306207282007d4d117623e1a2ebb8bee67c19f5796f07f95?arch=amd64\u0026repository_url=registry.redhat.io/custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-rhel8\u0026tag=2.8.2-143"
}
}
},
{
"category": "product_version",
"name": "custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-operator-bundle@sha256:44de4b736089166718956bebd456ad1a17e0e6f72c49f52804c6b6e60ef5a494_amd64",
"product": {
"name": "custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-operator-bundle@sha256:44de4b736089166718956bebd456ad1a17e0e6f72c49f52804c6b6e60ef5a494_amd64",
"product_id": "custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-operator-bundle@sha256:44de4b736089166718956bebd456ad1a17e0e6f72c49f52804c6b6e60ef5a494_amd64",
"product_identification_helper": {
"purl": "pkg:oci/custom-metrics-autoscaler-operator-bundle@sha256:44de4b736089166718956bebd456ad1a17e0e6f72c49f52804c6b6e60ef5a494?arch=amd64\u0026repository_url=registry.redhat.io/custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-operator-bundle\u0026tag=2.8.2-143"
}
}
},
{
"category": "product_version",
"name": "custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-rhel8-operator@sha256:5a149d0a0cdb6812acbef0c9b3031fb3cd84181e971198a6e17d8fd0bf5e6293_amd64",
"product": {
"name": "custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-rhel8-operator@sha256:5a149d0a0cdb6812acbef0c9b3031fb3cd84181e971198a6e17d8fd0bf5e6293_amd64",
"product_id": "custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-rhel8-operator@sha256:5a149d0a0cdb6812acbef0c9b3031fb3cd84181e971198a6e17d8fd0bf5e6293_amd64",
"product_identification_helper": {
"purl": "pkg:oci/custom-metrics-autoscaler-rhel8-operator@sha256:5a149d0a0cdb6812acbef0c9b3031fb3cd84181e971198a6e17d8fd0bf5e6293?arch=amd64\u0026repository_url=registry.redhat.io/custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-rhel8-operator\u0026tag=2.8.2-143"
}
}
}
],
"category": "architecture",
"name": "amd64"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-adapter-rhel8@sha256:c79cb3c68317a224277a8ee0dc78832fcd4b6da18b9b5b074cffaad14e2f1aa5_amd64 as a component of OpenShift Custom Metrics Autoscaler 2",
"product_id": "8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-adapter-rhel8@sha256:c79cb3c68317a224277a8ee0dc78832fcd4b6da18b9b5b074cffaad14e2f1aa5_amd64"
},
"product_reference": "custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-adapter-rhel8@sha256:c79cb3c68317a224277a8ee0dc78832fcd4b6da18b9b5b074cffaad14e2f1aa5_amd64",
"relates_to_product_reference": "8Base-OCMA-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-operator-bundle@sha256:44de4b736089166718956bebd456ad1a17e0e6f72c49f52804c6b6e60ef5a494_amd64 as a component of OpenShift Custom Metrics Autoscaler 2",
"product_id": "8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-operator-bundle@sha256:44de4b736089166718956bebd456ad1a17e0e6f72c49f52804c6b6e60ef5a494_amd64"
},
"product_reference": "custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-operator-bundle@sha256:44de4b736089166718956bebd456ad1a17e0e6f72c49f52804c6b6e60ef5a494_amd64",
"relates_to_product_reference": "8Base-OCMA-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-rhel8-operator@sha256:5a149d0a0cdb6812acbef0c9b3031fb3cd84181e971198a6e17d8fd0bf5e6293_amd64 as a component of OpenShift Custom Metrics Autoscaler 2",
"product_id": "8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-rhel8-operator@sha256:5a149d0a0cdb6812acbef0c9b3031fb3cd84181e971198a6e17d8fd0bf5e6293_amd64"
},
"product_reference": "custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-rhel8-operator@sha256:5a149d0a0cdb6812acbef0c9b3031fb3cd84181e971198a6e17d8fd0bf5e6293_amd64",
"relates_to_product_reference": "8Base-OCMA-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-rhel8@sha256:a403d057cd2ca820306207282007d4d117623e1a2ebb8bee67c19f5796f07f95_amd64 as a component of OpenShift Custom Metrics Autoscaler 2",
"product_id": "8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-rhel8@sha256:a403d057cd2ca820306207282007d4d117623e1a2ebb8bee67c19f5796f07f95_amd64"
},
"product_reference": "custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-rhel8@sha256:a403d057cd2ca820306207282007d4d117623e1a2ebb8bee67c19f5796f07f95_amd64",
"relates_to_product_reference": "8Base-OCMA-2"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2022-1705",
"cwe": {
"id": "CWE-444",
"name": "Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027)"
},
"discovery_date": "2022-07-14T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-operator-bundle@sha256:44de4b736089166718956bebd456ad1a17e0e6f72c49f52804c6b6e60ef5a494_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2107374"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in golang. The HTTP/1 client accepted invalid Transfer-Encoding headers indicating \"chunked\" encoding. This issue could allow request smuggling, but only if combined with an intermediate server that also improperly accepts the header as invalid.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: net/http: improper sanitization of Transfer-Encoding header",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Within regulated environments, a combination of the following controls acts as a significant barrier to successfully exploiting a CWE-444: Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027) vulnerability and therefore downgrades the severity of this particular CVE from Moderate to Low.\n\nThe platform uses secure, encrypted HTTPS connections over TLS 1.2 to reduce the risk of smuggling attacks by preventing the injection of ambiguous or malformed requests between components. The environment employs IPS/IDS and antimalware solutions to detect and block malicious code while ensuring consistent interpretation of HTTP requests across network layers, mitigating request/response inconsistencies. Event logs are collected and analyzed for centralization, correlation, monitoring, alerting, and retention, enabling the detection of malformed or suspicious HTTP traffic. Static code analysis and peer reviews enforce strong input validation and error handling to ensure all user inputs adhere to HTTP protocol specifications.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-adapter-rhel8@sha256:c79cb3c68317a224277a8ee0dc78832fcd4b6da18b9b5b074cffaad14e2f1aa5_amd64",
"8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-rhel8-operator@sha256:5a149d0a0cdb6812acbef0c9b3031fb3cd84181e971198a6e17d8fd0bf5e6293_amd64",
"8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-rhel8@sha256:a403d057cd2ca820306207282007d4d117623e1a2ebb8bee67c19f5796f07f95_amd64"
],
"known_not_affected": [
"8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-operator-bundle@sha256:44de4b736089166718956bebd456ad1a17e0e6f72c49f52804c6b6e60ef5a494_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-1705"
},
{
"category": "external",
"summary": "RHBZ#2107374",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2107374"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-1705",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1705"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-1705",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-1705"
},
{
"category": "external",
"summary": "https://go.dev/issue/53188",
"url": "https://go.dev/issue/53188"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/nqrv9fbR0zE",
"url": "https://groups.google.com/g/golang-announce/c/nqrv9fbR0zE"
}
],
"release_date": "2022-07-12T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-03-06T18:38:53+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-adapter-rhel8@sha256:c79cb3c68317a224277a8ee0dc78832fcd4b6da18b9b5b074cffaad14e2f1aa5_amd64",
"8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-rhel8-operator@sha256:5a149d0a0cdb6812acbef0c9b3031fb3cd84181e971198a6e17d8fd0bf5e6293_amd64",
"8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-rhel8@sha256:a403d057cd2ca820306207282007d4d117623e1a2ebb8bee67c19f5796f07f95_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:1042"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-adapter-rhel8@sha256:c79cb3c68317a224277a8ee0dc78832fcd4b6da18b9b5b074cffaad14e2f1aa5_amd64",
"8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-operator-bundle@sha256:44de4b736089166718956bebd456ad1a17e0e6f72c49f52804c6b6e60ef5a494_amd64",
"8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-rhel8-operator@sha256:5a149d0a0cdb6812acbef0c9b3031fb3cd84181e971198a6e17d8fd0bf5e6293_amd64",
"8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-rhel8@sha256:a403d057cd2ca820306207282007d4d117623e1a2ebb8bee67c19f5796f07f95_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "golang: net/http: improper sanitization of Transfer-Encoding header"
},
{
"cve": "CVE-2022-1962",
"cwe": {
"id": "CWE-1325",
"name": "Improperly Controlled Sequential Memory Allocation"
},
"discovery_date": "2022-07-14T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-adapter-rhel8@sha256:c79cb3c68317a224277a8ee0dc78832fcd4b6da18b9b5b074cffaad14e2f1aa5_amd64",
"8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-operator-bundle@sha256:44de4b736089166718956bebd456ad1a17e0e6f72c49f52804c6b6e60ef5a494_amd64",
"8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-rhel8-operator@sha256:5a149d0a0cdb6812acbef0c9b3031fb3cd84181e971198a6e17d8fd0bf5e6293_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2107376"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the golang standard library, go/parser. When calling any Parse functions on the Go source code, which contains deeply nested types or declarations, a panic can occur due to stack exhaustion. This issue allows an attacker to impact system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: go/parser: stack exhaustion in all Parse* functions",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-rhel8@sha256:a403d057cd2ca820306207282007d4d117623e1a2ebb8bee67c19f5796f07f95_amd64"
],
"known_not_affected": [
"8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-adapter-rhel8@sha256:c79cb3c68317a224277a8ee0dc78832fcd4b6da18b9b5b074cffaad14e2f1aa5_amd64",
"8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-operator-bundle@sha256:44de4b736089166718956bebd456ad1a17e0e6f72c49f52804c6b6e60ef5a494_amd64",
"8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-rhel8-operator@sha256:5a149d0a0cdb6812acbef0c9b3031fb3cd84181e971198a6e17d8fd0bf5e6293_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-1962"
},
{
"category": "external",
"summary": "RHBZ#2107376",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2107376"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-1962",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1962"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-1962",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-1962"
},
{
"category": "external",
"summary": "https://go.dev/issue/53616",
"url": "https://go.dev/issue/53616"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/nqrv9fbR0zE",
"url": "https://groups.google.com/g/golang-announce/c/nqrv9fbR0zE"
}
],
"release_date": "2022-07-12T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-03-06T18:38:53+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-rhel8@sha256:a403d057cd2ca820306207282007d4d117623e1a2ebb8bee67c19f5796f07f95_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:1042"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-adapter-rhel8@sha256:c79cb3c68317a224277a8ee0dc78832fcd4b6da18b9b5b074cffaad14e2f1aa5_amd64",
"8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-operator-bundle@sha256:44de4b736089166718956bebd456ad1a17e0e6f72c49f52804c6b6e60ef5a494_amd64",
"8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-rhel8-operator@sha256:5a149d0a0cdb6812acbef0c9b3031fb3cd84181e971198a6e17d8fd0bf5e6293_amd64",
"8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-rhel8@sha256:a403d057cd2ca820306207282007d4d117623e1a2ebb8bee67c19f5796f07f95_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "golang: go/parser: stack exhaustion in all Parse* functions"
},
{
"acknowledgments": [
{
"names": [
"Adam Korczynski"
],
"organization": "ADA Logics"
},
{
"names": [
"OSS-Fuzz"
]
}
],
"cve": "CVE-2022-2879",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"discovery_date": "2022-10-07T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-adapter-rhel8@sha256:c79cb3c68317a224277a8ee0dc78832fcd4b6da18b9b5b074cffaad14e2f1aa5_amd64",
"8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-operator-bundle@sha256:44de4b736089166718956bebd456ad1a17e0e6f72c49f52804c6b6e60ef5a494_amd64",
"8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-rhel8-operator@sha256:5a149d0a0cdb6812acbef0c9b3031fb3cd84181e971198a6e17d8fd0bf5e6293_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2132867"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the golang package, where Reader.Read does not set a limit on the maximum size of file headers. After fixing, Reader.Read limits the maximum size of header blocks to 1 MiB. This flaw allows a maliciously crafted archive to cause Read to allocate unbounded amounts of memory, potentially causing resource exhaustion or panic.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: archive/tar: github.com/vbatts/tar-split: unbounded memory consumption when reading headers",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The opportunity for a Denial of Service is limited to the golang runtime. In the case of OpenShift Container Platform, this would be restricted within each individual container. There are multiple layers of guide rails (Golang\u2019s Garbage Collector; OpenShift\u2019s resource constraints imposed at the container and cluster levels) which would require a malicious user to continue submitting attacks for there to be any enduring impact. They would also need access to external server resources to be able to send a massive volume of requests to cause a significant impact on server operations.\n\n\nThis flaw additionally affects the github.com/vbatts/tar-split library and was fixed in v0.12.1.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-rhel8@sha256:a403d057cd2ca820306207282007d4d117623e1a2ebb8bee67c19f5796f07f95_amd64"
],
"known_not_affected": [
"8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-adapter-rhel8@sha256:c79cb3c68317a224277a8ee0dc78832fcd4b6da18b9b5b074cffaad14e2f1aa5_amd64",
"8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-operator-bundle@sha256:44de4b736089166718956bebd456ad1a17e0e6f72c49f52804c6b6e60ef5a494_amd64",
"8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-rhel8-operator@sha256:5a149d0a0cdb6812acbef0c9b3031fb3cd84181e971198a6e17d8fd0bf5e6293_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-2879"
},
{
"category": "external",
"summary": "RHBZ#2132867",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2132867"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-2879",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2879"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-2879",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-2879"
},
{
"category": "external",
"summary": "https://github.com/golang/go/issues/54853",
"url": "https://github.com/golang/go/issues/54853"
},
{
"category": "external",
"summary": "https://github.com/vbatts/tar-split/releases/tag/v0.12.1",
"url": "https://github.com/vbatts/tar-split/releases/tag/v0.12.1"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/xtuG5faxtaU?pli=1",
"url": "https://groups.google.com/g/golang-announce/c/xtuG5faxtaU?pli=1"
}
],
"release_date": "2022-10-04T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-03-06T18:38:53+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-rhel8@sha256:a403d057cd2ca820306207282007d4d117623e1a2ebb8bee67c19f5796f07f95_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:1042"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-adapter-rhel8@sha256:c79cb3c68317a224277a8ee0dc78832fcd4b6da18b9b5b074cffaad14e2f1aa5_amd64",
"8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-operator-bundle@sha256:44de4b736089166718956bebd456ad1a17e0e6f72c49f52804c6b6e60ef5a494_amd64",
"8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-rhel8-operator@sha256:5a149d0a0cdb6812acbef0c9b3031fb3cd84181e971198a6e17d8fd0bf5e6293_amd64",
"8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-rhel8@sha256:a403d057cd2ca820306207282007d4d117623e1a2ebb8bee67c19f5796f07f95_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "golang: archive/tar: github.com/vbatts/tar-split: unbounded memory consumption when reading headers"
},
{
"acknowledgments": [
{
"names": [
"Daniel Abeles"
],
"organization": "Head of Research, Oxeye"
},
{
"names": [
"Gal Goldstein"
],
"organization": "Security Researcher, Oxeye"
}
],
"cve": "CVE-2022-2880",
"cwe": {
"id": "CWE-444",
"name": "Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027)"
},
"discovery_date": "2022-10-07T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-adapter-rhel8@sha256:c79cb3c68317a224277a8ee0dc78832fcd4b6da18b9b5b074cffaad14e2f1aa5_amd64",
"8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-operator-bundle@sha256:44de4b736089166718956bebd456ad1a17e0e6f72c49f52804c6b6e60ef5a494_amd64",
"8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-rhel8-operator@sha256:5a149d0a0cdb6812acbef0c9b3031fb3cd84181e971198a6e17d8fd0bf5e6293_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2132868"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the golang package, where requests forwarded by reverse proxy include the raw query parameters from the inbound request, including unparseable parameters rejected by net/http. This issue could permit query parameter smuggling when a Go proxy forwards a parameter with an unparseable value. After the fix, the reverse proxy sanitizes the query parameters in the forwarded query when the outbound request\u0027s form field is set after the reverse proxy. The director function returns, indicating that the proxy has parsed the query parameters. Proxies that do not parse query parameters continue to forward the original query parameters unchanged.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: net/http/httputil: ReverseProxy should not forward unparseable query parameters",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The opportunity to exploit this vulnerability is limited to the Golang runtime. In the case of the OpenShift Container Platform, this would be restricted within each individual container. There are multiple layers of guide rails (Golang\u2019s Garbage Collector; OpenShift\u2019s resource constraints imposed at the container and cluster levels) which would require a malicious user to continue submitting attacks for there to be any enduring impact.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-rhel8@sha256:a403d057cd2ca820306207282007d4d117623e1a2ebb8bee67c19f5796f07f95_amd64"
],
"known_not_affected": [
"8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-adapter-rhel8@sha256:c79cb3c68317a224277a8ee0dc78832fcd4b6da18b9b5b074cffaad14e2f1aa5_amd64",
"8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-operator-bundle@sha256:44de4b736089166718956bebd456ad1a17e0e6f72c49f52804c6b6e60ef5a494_amd64",
"8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-rhel8-operator@sha256:5a149d0a0cdb6812acbef0c9b3031fb3cd84181e971198a6e17d8fd0bf5e6293_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-2880"
},
{
"category": "external",
"summary": "RHBZ#2132868",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2132868"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-2880",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2880"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-2880",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-2880"
},
{
"category": "external",
"summary": "https://github.com/golang/go/issues/54663",
"url": "https://github.com/golang/go/issues/54663"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/xtuG5faxtaU?pli=1",
"url": "https://groups.google.com/g/golang-announce/c/xtuG5faxtaU?pli=1"
}
],
"release_date": "2022-10-04T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-03-06T18:38:53+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-rhel8@sha256:a403d057cd2ca820306207282007d4d117623e1a2ebb8bee67c19f5796f07f95_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:1042"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-adapter-rhel8@sha256:c79cb3c68317a224277a8ee0dc78832fcd4b6da18b9b5b074cffaad14e2f1aa5_amd64",
"8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-operator-bundle@sha256:44de4b736089166718956bebd456ad1a17e0e6f72c49f52804c6b6e60ef5a494_amd64",
"8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-rhel8-operator@sha256:5a149d0a0cdb6812acbef0c9b3031fb3cd84181e971198a6e17d8fd0bf5e6293_amd64",
"8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-rhel8@sha256:a403d057cd2ca820306207282007d4d117623e1a2ebb8bee67c19f5796f07f95_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "golang: net/http/httputil: ReverseProxy should not forward unparseable query parameters"
},
{
"cve": "CVE-2022-27664",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"discovery_date": "2022-09-06T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-adapter-rhel8@sha256:c79cb3c68317a224277a8ee0dc78832fcd4b6da18b9b5b074cffaad14e2f1aa5_amd64",
"8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-operator-bundle@sha256:44de4b736089166718956bebd456ad1a17e0e6f72c49f52804c6b6e60ef5a494_amd64",
"8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-rhel8-operator@sha256:5a149d0a0cdb6812acbef0c9b3031fb3cd84181e971198a6e17d8fd0bf5e6293_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2124669"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the golang package. In net/http in Go, attackers can cause a denial of service because an HTTP/2 connection can hang during closing if a fatal error preempts the shutdown.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: net/http: handle server errors after sending GOAWAY",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The opportunity for a Denial of Service is limited to the golang runtime. In the case of OpenShift Container Platform, this would be restricted within each individual container. There are multiple layers of guide rails (Golang\u2019s Garbage Collector; OpenShift\u2019s resource constraints imposed at the container and cluster levels) which would require a malicious user to continue submitting attacks for there to be any enduring impact. They would also need access to external server resources to be able to send a massive volume of requests to cause a significant impact on server operations.\n\nWithin regulated environments, a combination of the following controls acts as a significant barrier to successfully exploiting a CWE-400: Uncontrolled Resource Consumption vulnerability and therefore downgrades the severity of this particular CVE from Moderate to Low.\n\nRed Hat restricts access to all platform information by default, granting access only after successful hard token-based multi-factor authentication (MFA) and enforcing least privilege to ensure only authorized roles can execute or modify code. The environment employs malicious code protections, including IDS/IPS and antimalware tools to detect threats and monitor resource usage, helping prevent uncontrolled consumption that could lead to system failure. Additional safeguards, such as web application firewalls and load-balancing strategies, protect against resource exhaustion and performance degradation. Event logs are centrally collected, correlated, and analyzed to support monitoring, alerting, and retention, aiding in the detection of abnormal behavior and potential denial-of-service (DoS) conditions. Static code analysis and peer reviews enforce strong input validation and error handling, reducing the likelihood of input-based DoS attacks.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-rhel8@sha256:a403d057cd2ca820306207282007d4d117623e1a2ebb8bee67c19f5796f07f95_amd64"
],
"known_not_affected": [
"8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-adapter-rhel8@sha256:c79cb3c68317a224277a8ee0dc78832fcd4b6da18b9b5b074cffaad14e2f1aa5_amd64",
"8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-operator-bundle@sha256:44de4b736089166718956bebd456ad1a17e0e6f72c49f52804c6b6e60ef5a494_amd64",
"8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-rhel8-operator@sha256:5a149d0a0cdb6812acbef0c9b3031fb3cd84181e971198a6e17d8fd0bf5e6293_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-27664"
},
{
"category": "external",
"summary": "RHBZ#2124669",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2124669"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-27664",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27664"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-27664",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-27664"
},
{
"category": "external",
"summary": "https://go.dev/issue/54658",
"url": "https://go.dev/issue/54658"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/x49AQzIVX-s/m/0tgO0pjiBQAJ",
"url": "https://groups.google.com/g/golang-announce/c/x49AQzIVX-s/m/0tgO0pjiBQAJ"
}
],
"release_date": "2022-09-06T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-03-06T18:38:53+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-rhel8@sha256:a403d057cd2ca820306207282007d4d117623e1a2ebb8bee67c19f5796f07f95_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:1042"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-adapter-rhel8@sha256:c79cb3c68317a224277a8ee0dc78832fcd4b6da18b9b5b074cffaad14e2f1aa5_amd64",
"8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-operator-bundle@sha256:44de4b736089166718956bebd456ad1a17e0e6f72c49f52804c6b6e60ef5a494_amd64",
"8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-rhel8-operator@sha256:5a149d0a0cdb6812acbef0c9b3031fb3cd84181e971198a6e17d8fd0bf5e6293_amd64",
"8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-rhel8@sha256:a403d057cd2ca820306207282007d4d117623e1a2ebb8bee67c19f5796f07f95_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "golang: net/http: handle server errors after sending GOAWAY"
},
{
"cve": "CVE-2022-28131",
"cwe": {
"id": "CWE-1325",
"name": "Improperly Controlled Sequential Memory Allocation"
},
"discovery_date": "2022-07-14T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-adapter-rhel8@sha256:c79cb3c68317a224277a8ee0dc78832fcd4b6da18b9b5b074cffaad14e2f1aa5_amd64",
"8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-operator-bundle@sha256:44de4b736089166718956bebd456ad1a17e0e6f72c49f52804c6b6e60ef5a494_amd64",
"8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-rhel8-operator@sha256:5a149d0a0cdb6812acbef0c9b3031fb3cd84181e971198a6e17d8fd0bf5e6293_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2107390"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in golang encoding/xml. When calling Decoder, Skip while parsing a deeply nested XML document, a panic can occur due to stack exhaustion and allows an attacker to impact system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: encoding/xml: stack exhaustion in Decoder.Skip",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The vulnerability exists in the calling of the function decoder.skip to a deeply nested XML document. Although the vulnerability exists, it may require that the application accept deeply nested XML from untrusted sources and specifically calls Decoder.Skip on it. In many deployments, that code path might not even be reachable or exposed to external input. On top of that, a successful exploitation will only result in denial of service due to stack exhaustion, which is why this has been marked as moderate by Red Hat.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-rhel8@sha256:a403d057cd2ca820306207282007d4d117623e1a2ebb8bee67c19f5796f07f95_amd64"
],
"known_not_affected": [
"8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-adapter-rhel8@sha256:c79cb3c68317a224277a8ee0dc78832fcd4b6da18b9b5b074cffaad14e2f1aa5_amd64",
"8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-operator-bundle@sha256:44de4b736089166718956bebd456ad1a17e0e6f72c49f52804c6b6e60ef5a494_amd64",
"8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-rhel8-operator@sha256:5a149d0a0cdb6812acbef0c9b3031fb3cd84181e971198a6e17d8fd0bf5e6293_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-28131"
},
{
"category": "external",
"summary": "RHBZ#2107390",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2107390"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-28131",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28131"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-28131",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-28131"
},
{
"category": "external",
"summary": "https://go.dev/issue/53614",
"url": "https://go.dev/issue/53614"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/nqrv9fbR0zE",
"url": "https://groups.google.com/g/golang-announce/c/nqrv9fbR0zE"
}
],
"release_date": "2022-07-12T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-03-06T18:38:53+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-rhel8@sha256:a403d057cd2ca820306207282007d4d117623e1a2ebb8bee67c19f5796f07f95_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:1042"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.3,
"baseSeverity": "HIGH",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H",
"version": "3.1"
},
"products": [
"8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-adapter-rhel8@sha256:c79cb3c68317a224277a8ee0dc78832fcd4b6da18b9b5b074cffaad14e2f1aa5_amd64",
"8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-operator-bundle@sha256:44de4b736089166718956bebd456ad1a17e0e6f72c49f52804c6b6e60ef5a494_amd64",
"8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-rhel8-operator@sha256:5a149d0a0cdb6812acbef0c9b3031fb3cd84181e971198a6e17d8fd0bf5e6293_amd64",
"8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-rhel8@sha256:a403d057cd2ca820306207282007d4d117623e1a2ebb8bee67c19f5796f07f95_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "golang: encoding/xml: stack exhaustion in Decoder.Skip"
},
{
"cve": "CVE-2022-28327",
"cwe": {
"id": "CWE-190",
"name": "Integer Overflow or Wraparound"
},
"discovery_date": "2022-04-21T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-operator-bundle@sha256:44de4b736089166718956bebd456ad1a17e0e6f72c49f52804c6b6e60ef5a494_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2077689"
}
],
"notes": [
{
"category": "description",
"text": "An integer overflow flaw was found in Golang\u0027s crypto/elliptic library. This flaw allows an attacker to use a crafted scaler input longer than 32 bytes, causing P256().ScalarMult or P256().ScalarBaseMult to panic, leading to a loss of availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: crypto/elliptic: panic caused by oversized scalar",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "A moderate severity flaw was found in Go\u2019s crypto/elliptic package in the generic P-256 implementation. If a scalar input longer than 32 bytes is supplied, P256().ScalarMult or P256().ScalarBaseMult can panic, causing the application to crash. Indirect uses via crypto/ecdsa and crypto/tls are not affected. This issue impacts availability but does not affect confidentiality or integrity. Only certain platforms (non-amd64, non-arm64, non-ppc64le, non-s390x) may be affected.\n\nRed Hat Enterprise Linux 7, 8 and 9 are affected, because the code-base is affected by this vulnerability.\n\nRed Hat Product Security has rated this issue as having Moderate security impact, and the issue is not currently planned to be addressed in future updates for Red Hat Enterprise Linux 7, hence, marked as Out-of-Support-Scope. \n\nRed Hat Developer Tools - Compilers (go-toolset-1.16-golang \u0026 go-toolset-1.17-golang), ships the vulnerable code and affected by this vulnerability.\n\nFor additional information, refer to the Issue Severity Classification: https://access.redhat.com/security/updates/classification/ and Red Hat Enterprise Linux Life Cycle \u0026 Updates Policy: https://access.redhat.com/support/policy/updates/errata/.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-adapter-rhel8@sha256:c79cb3c68317a224277a8ee0dc78832fcd4b6da18b9b5b074cffaad14e2f1aa5_amd64",
"8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-rhel8-operator@sha256:5a149d0a0cdb6812acbef0c9b3031fb3cd84181e971198a6e17d8fd0bf5e6293_amd64",
"8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-rhel8@sha256:a403d057cd2ca820306207282007d4d117623e1a2ebb8bee67c19f5796f07f95_amd64"
],
"known_not_affected": [
"8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-operator-bundle@sha256:44de4b736089166718956bebd456ad1a17e0e6f72c49f52804c6b6e60ef5a494_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-28327"
},
{
"category": "external",
"summary": "RHBZ#2077689",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2077689"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-28327",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28327"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-28327",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-28327"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/oecdBNLOml8",
"url": "https://groups.google.com/g/golang-announce/c/oecdBNLOml8"
}
],
"release_date": "2022-04-12T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-03-06T18:38:53+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-adapter-rhel8@sha256:c79cb3c68317a224277a8ee0dc78832fcd4b6da18b9b5b074cffaad14e2f1aa5_amd64",
"8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-rhel8-operator@sha256:5a149d0a0cdb6812acbef0c9b3031fb3cd84181e971198a6e17d8fd0bf5e6293_amd64",
"8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-rhel8@sha256:a403d057cd2ca820306207282007d4d117623e1a2ebb8bee67c19f5796f07f95_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:1042"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-adapter-rhel8@sha256:c79cb3c68317a224277a8ee0dc78832fcd4b6da18b9b5b074cffaad14e2f1aa5_amd64",
"8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-operator-bundle@sha256:44de4b736089166718956bebd456ad1a17e0e6f72c49f52804c6b6e60ef5a494_amd64",
"8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-rhel8-operator@sha256:5a149d0a0cdb6812acbef0c9b3031fb3cd84181e971198a6e17d8fd0bf5e6293_amd64",
"8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-rhel8@sha256:a403d057cd2ca820306207282007d4d117623e1a2ebb8bee67c19f5796f07f95_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "golang: crypto/elliptic: panic caused by oversized scalar"
},
{
"cve": "CVE-2022-30630",
"cwe": {
"id": "CWE-1325",
"name": "Improperly Controlled Sequential Memory Allocation"
},
"discovery_date": "2022-07-14T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-adapter-rhel8@sha256:c79cb3c68317a224277a8ee0dc78832fcd4b6da18b9b5b074cffaad14e2f1aa5_amd64",
"8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-operator-bundle@sha256:44de4b736089166718956bebd456ad1a17e0e6f72c49f52804c6b6e60ef5a494_amd64",
"8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-rhel8-operator@sha256:5a149d0a0cdb6812acbef0c9b3031fb3cd84181e971198a6e17d8fd0bf5e6293_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2107371"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the golang standard library, io/fs. Calling Glob on a path that contains a large number of path separators can cause a panic issue due to stack exhaustion. This could allow an attacker to impact availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: io/fs: stack exhaustion in Glob",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "RH ProdSec has set the Impact of this vulnerability to Moderate as there is no known method to execute arbitary code. Successful exploitation of this bug can cause the application under attack to panic, merely causing a Denial of Service at the application level. As the kernel is unaffected by this bug, the user can merely relaunch the application to fix the problem. Also, if somehow the application keeps relaunching, the timer watchdogs in the default RHEL kernel will stop the attack in its tracks.\n\nWithin regulated environments, a combination of the following controls acts as a significant barrier to successfully exploiting a CWE-1325: Improperly Controlled Sequential Memory Allocation vulnerability and therefore downgrades the severity of this particular CVE from Moderate to Low.\n\nAccess to the platform is granted only after successful hard token-based multi-factor authentication (MFA) and is governed by least privilege to ensure only authorized users and roles can execute or modify code. Static code analysis and peer reviews enforce strong input validation and error handling, preventing improperly validated inputs from causing system instability, data exposure, or privilege escalation. In the event of successful exploitation, process isolation limits the impact of excessive sequential memory allocation by restricting memory use per process, preventing any single process from exhausting system resources. Finally, the platform uses memory protection mechanisms such as Data Execution Prevention (DEP) and Address Space Layout Randomization (ASLR) to reduce the risk of memory allocation-based attacks.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-rhel8@sha256:a403d057cd2ca820306207282007d4d117623e1a2ebb8bee67c19f5796f07f95_amd64"
],
"known_not_affected": [
"8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-adapter-rhel8@sha256:c79cb3c68317a224277a8ee0dc78832fcd4b6da18b9b5b074cffaad14e2f1aa5_amd64",
"8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-operator-bundle@sha256:44de4b736089166718956bebd456ad1a17e0e6f72c49f52804c6b6e60ef5a494_amd64",
"8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-rhel8-operator@sha256:5a149d0a0cdb6812acbef0c9b3031fb3cd84181e971198a6e17d8fd0bf5e6293_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-30630"
},
{
"category": "external",
"summary": "RHBZ#2107371",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2107371"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-30630",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30630"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-30630",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-30630"
},
{
"category": "external",
"summary": "https://go.dev/issue/53415",
"url": "https://go.dev/issue/53415"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/nqrv9fbR0zE",
"url": "https://groups.google.com/g/golang-announce/c/nqrv9fbR0zE"
}
],
"release_date": "2022-07-12T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-03-06T18:38:53+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-rhel8@sha256:a403d057cd2ca820306207282007d4d117623e1a2ebb8bee67c19f5796f07f95_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:1042"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-adapter-rhel8@sha256:c79cb3c68317a224277a8ee0dc78832fcd4b6da18b9b5b074cffaad14e2f1aa5_amd64",
"8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-operator-bundle@sha256:44de4b736089166718956bebd456ad1a17e0e6f72c49f52804c6b6e60ef5a494_amd64",
"8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-rhel8-operator@sha256:5a149d0a0cdb6812acbef0c9b3031fb3cd84181e971198a6e17d8fd0bf5e6293_amd64",
"8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-rhel8@sha256:a403d057cd2ca820306207282007d4d117623e1a2ebb8bee67c19f5796f07f95_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "golang: io/fs: stack exhaustion in Glob"
},
{
"cve": "CVE-2022-30631",
"cwe": {
"id": "CWE-1325",
"name": "Improperly Controlled Sequential Memory Allocation"
},
"discovery_date": "2022-07-14T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-adapter-rhel8@sha256:c79cb3c68317a224277a8ee0dc78832fcd4b6da18b9b5b074cffaad14e2f1aa5_amd64",
"8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-operator-bundle@sha256:44de4b736089166718956bebd456ad1a17e0e6f72c49f52804c6b6e60ef5a494_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2107342"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in golang. Calling the Reader, Read method on an archive that contains a large number of concatenated 0-length compressed files can cause a panic issue due to stack exhaustion.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: compress/gzip: stack exhaustion in Reader.Read",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "To exploit CVE-2022-30631, an attacker supplies a specially crafted gzip archive to a Go application that uses a vulnerable version of the compress/gzip package without adequate input validation. This can lead to uncontrolled recursion, resulting in stack exhaustion and causing the application to panic, thereby affecting its availability.\n\nAs this is merely a DoS and there is no known way to control the instruction pointer, RH ProdSec has set the impact of this vulnerabilty to \"Moderate\".\n\nWithin regulated environments, a combination of the following controls acts as a significant barrier to successfully exploiting a CWE-1325: Improperly Controlled Sequential Memory Allocation vulnerability and therefore downgrades the severity of this particular CVE from Moderate to Low.\n\nAccess to the platform is granted only after successful hard token-based multi-factor authentication (MFA) and is governed by least privilege to ensure only authorized users and roles can execute or modify code. Static code analysis and peer reviews enforce strong input validation and error handling, preventing improperly validated inputs from causing system instability, data exposure, or privilege escalation. In the event of successful exploitation, process isolation limits the impact of excessive sequential memory allocation by restricting memory use per process, preventing any single process from exhausting system resources. Finally, the platform uses memory protection mechanisms such as Data Execution Prevention (DEP) and Address Space Layout Randomization (ASLR) to reduce the risk of memory allocation-based attacks.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-rhel8-operator@sha256:5a149d0a0cdb6812acbef0c9b3031fb3cd84181e971198a6e17d8fd0bf5e6293_amd64",
"8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-rhel8@sha256:a403d057cd2ca820306207282007d4d117623e1a2ebb8bee67c19f5796f07f95_amd64"
],
"known_not_affected": [
"8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-adapter-rhel8@sha256:c79cb3c68317a224277a8ee0dc78832fcd4b6da18b9b5b074cffaad14e2f1aa5_amd64",
"8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-operator-bundle@sha256:44de4b736089166718956bebd456ad1a17e0e6f72c49f52804c6b6e60ef5a494_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-30631"
},
{
"category": "external",
"summary": "RHBZ#2107342",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2107342"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-30631",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30631"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-30631",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-30631"
},
{
"category": "external",
"summary": "https://go.dev/issue/53168",
"url": "https://go.dev/issue/53168"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/nqrv9fbR0zE",
"url": "https://groups.google.com/g/golang-announce/c/nqrv9fbR0zE"
}
],
"release_date": "2022-07-12T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-03-06T18:38:53+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-rhel8-operator@sha256:5a149d0a0cdb6812acbef0c9b3031fb3cd84181e971198a6e17d8fd0bf5e6293_amd64",
"8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-rhel8@sha256:a403d057cd2ca820306207282007d4d117623e1a2ebb8bee67c19f5796f07f95_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:1042"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-adapter-rhel8@sha256:c79cb3c68317a224277a8ee0dc78832fcd4b6da18b9b5b074cffaad14e2f1aa5_amd64",
"8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-operator-bundle@sha256:44de4b736089166718956bebd456ad1a17e0e6f72c49f52804c6b6e60ef5a494_amd64",
"8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-rhel8-operator@sha256:5a149d0a0cdb6812acbef0c9b3031fb3cd84181e971198a6e17d8fd0bf5e6293_amd64",
"8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-rhel8@sha256:a403d057cd2ca820306207282007d4d117623e1a2ebb8bee67c19f5796f07f95_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "golang: compress/gzip: stack exhaustion in Reader.Read"
},
{
"cve": "CVE-2022-30632",
"cwe": {
"id": "CWE-1325",
"name": "Improperly Controlled Sequential Memory Allocation"
},
"discovery_date": "2022-07-14T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-adapter-rhel8@sha256:c79cb3c68317a224277a8ee0dc78832fcd4b6da18b9b5b074cffaad14e2f1aa5_amd64",
"8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-operator-bundle@sha256:44de4b736089166718956bebd456ad1a17e0e6f72c49f52804c6b6e60ef5a494_amd64",
"8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-rhel8-operator@sha256:5a149d0a0cdb6812acbef0c9b3031fb3cd84181e971198a6e17d8fd0bf5e6293_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2107386"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in golang. Calling Glob on a path that contains a large number of path separators can cause a panic issue due to stack exhaustion. This can cause an attacker to impact availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: path/filepath: stack exhaustion in Glob",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The exploitation of this flaw will only result in a denial of service of the application via the application crashing which is why this has been rated as moderate.\n\nWithin regulated environments, a combination of the following controls acts as a significant barrier to successfully exploiting a CWE-1325: Improperly Controlled Sequential Memory Allocation vulnerability and therefore downgrades the severity of this particular CVE from Moderate to Low.\n\nAccess to the platform is granted only after successful hard token-based multi-factor authentication (MFA) and is governed by least privilege to ensure only authorized users and roles can execute or modify code. Static code analysis and peer reviews enforce strong input validation and error handling, preventing improperly validated inputs from causing system instability, data exposure, or privilege escalation. In the event of successful exploitation, process isolation limits the impact of excessive sequential memory allocation by restricting memory use per process, preventing any single process from exhausting system resources. Finally, the platform uses memory protection mechanisms such as Data Execution Prevention (DEP) and Address Space Layout Randomization (ASLR) to reduce the risk of memory allocation-based attacks.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-rhel8@sha256:a403d057cd2ca820306207282007d4d117623e1a2ebb8bee67c19f5796f07f95_amd64"
],
"known_not_affected": [
"8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-adapter-rhel8@sha256:c79cb3c68317a224277a8ee0dc78832fcd4b6da18b9b5b074cffaad14e2f1aa5_amd64",
"8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-operator-bundle@sha256:44de4b736089166718956bebd456ad1a17e0e6f72c49f52804c6b6e60ef5a494_amd64",
"8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-rhel8-operator@sha256:5a149d0a0cdb6812acbef0c9b3031fb3cd84181e971198a6e17d8fd0bf5e6293_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-30632"
},
{
"category": "external",
"summary": "RHBZ#2107386",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2107386"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-30632",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30632"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-30632",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-30632"
},
{
"category": "external",
"summary": "https://go.dev/issue/53416",
"url": "https://go.dev/issue/53416"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/nqrv9fbR0zE",
"url": "https://groups.google.com/g/golang-announce/c/nqrv9fbR0zE"
}
],
"release_date": "2022-07-12T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-03-06T18:38:53+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-rhel8@sha256:a403d057cd2ca820306207282007d4d117623e1a2ebb8bee67c19f5796f07f95_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:1042"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-adapter-rhel8@sha256:c79cb3c68317a224277a8ee0dc78832fcd4b6da18b9b5b074cffaad14e2f1aa5_amd64",
"8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-operator-bundle@sha256:44de4b736089166718956bebd456ad1a17e0e6f72c49f52804c6b6e60ef5a494_amd64",
"8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-rhel8-operator@sha256:5a149d0a0cdb6812acbef0c9b3031fb3cd84181e971198a6e17d8fd0bf5e6293_amd64",
"8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-rhel8@sha256:a403d057cd2ca820306207282007d4d117623e1a2ebb8bee67c19f5796f07f95_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "golang: path/filepath: stack exhaustion in Glob"
},
{
"cve": "CVE-2022-30633",
"cwe": {
"id": "CWE-1325",
"name": "Improperly Controlled Sequential Memory Allocation"
},
"discovery_date": "2022-07-14T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-adapter-rhel8@sha256:c79cb3c68317a224277a8ee0dc78832fcd4b6da18b9b5b074cffaad14e2f1aa5_amd64",
"8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-operator-bundle@sha256:44de4b736089166718956bebd456ad1a17e0e6f72c49f52804c6b6e60ef5a494_amd64",
"8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-rhel8-operator@sha256:5a149d0a0cdb6812acbef0c9b3031fb3cd84181e971198a6e17d8fd0bf5e6293_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2107392"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in golang. Calling Unmarshal on an XML document into a Go struct, which has a nested field that uses the \"any\" field tag, can cause a panic due to stack exhaustion.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: encoding/xml: stack exhaustion in Unmarshal",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat has marked this as moderate impact for two primary reasons\n1. Though the vulnerability exists, it is hard to exploit in real scenarios (e.g., the attacker must be able to feed crafted XML documents into specific code paths).\n2. The vulnerability is a denial of service (DoS) due to stack exhaustion rather than code execution or data breach. Since it doesn\u2019t compromise confidentiality or integrity.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-rhel8@sha256:a403d057cd2ca820306207282007d4d117623e1a2ebb8bee67c19f5796f07f95_amd64"
],
"known_not_affected": [
"8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-adapter-rhel8@sha256:c79cb3c68317a224277a8ee0dc78832fcd4b6da18b9b5b074cffaad14e2f1aa5_amd64",
"8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-operator-bundle@sha256:44de4b736089166718956bebd456ad1a17e0e6f72c49f52804c6b6e60ef5a494_amd64",
"8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-rhel8-operator@sha256:5a149d0a0cdb6812acbef0c9b3031fb3cd84181e971198a6e17d8fd0bf5e6293_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-30633"
},
{
"category": "external",
"summary": "RHBZ#2107392",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2107392"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-30633",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30633"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-30633",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-30633"
},
{
"category": "external",
"summary": "https://go.dev/issue/53611",
"url": "https://go.dev/issue/53611"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/nqrv9fbR0zE",
"url": "https://groups.google.com/g/golang-announce/c/nqrv9fbR0zE"
}
],
"release_date": "2022-07-12T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-03-06T18:38:53+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-rhel8@sha256:a403d057cd2ca820306207282007d4d117623e1a2ebb8bee67c19f5796f07f95_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:1042"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-adapter-rhel8@sha256:c79cb3c68317a224277a8ee0dc78832fcd4b6da18b9b5b074cffaad14e2f1aa5_amd64",
"8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-operator-bundle@sha256:44de4b736089166718956bebd456ad1a17e0e6f72c49f52804c6b6e60ef5a494_amd64",
"8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-rhel8-operator@sha256:5a149d0a0cdb6812acbef0c9b3031fb3cd84181e971198a6e17d8fd0bf5e6293_amd64",
"8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-rhel8@sha256:a403d057cd2ca820306207282007d4d117623e1a2ebb8bee67c19f5796f07f95_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "golang: encoding/xml: stack exhaustion in Unmarshal"
},
{
"cve": "CVE-2022-30635",
"cwe": {
"id": "CWE-1325",
"name": "Improperly Controlled Sequential Memory Allocation"
},
"discovery_date": "2022-07-14T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-adapter-rhel8@sha256:c79cb3c68317a224277a8ee0dc78832fcd4b6da18b9b5b074cffaad14e2f1aa5_amd64",
"8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-operator-bundle@sha256:44de4b736089166718956bebd456ad1a17e0e6f72c49f52804c6b6e60ef5a494_amd64",
"8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-rhel8-operator@sha256:5a149d0a0cdb6812acbef0c9b3031fb3cd84181e971198a6e17d8fd0bf5e6293_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2107388"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in golang. When calling Decoder, Decode on a message that contains deeply nested structures, a panic can occur due to stack exhaustion and allows an attacker to impact system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: encoding/gob: stack exhaustion in Decoder.Decode",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "OpenShift Container Platform (OCP) starting from 4.10 stream is already compiled in the patched version of Go, hence is not affected by this vulnerability.The vulnerability has been rated as moderate instead of high because the vulnerability can only result in a minor denial of service.\n\nWithin regulated environments, a combination of the following controls acts as a significant barrier to successfully exploiting a CWE-1325: Improperly Controlled Sequential Memory Allocation vulnerability and therefore downgrades the severity of this particular CVE from Moderate to Low.\n\nAccess to the platform is granted only after successful hard token-based multi-factor authentication (MFA) and is governed by least privilege to ensure only authorized users and roles can execute or modify code. Static code analysis and peer reviews enforce strong input validation and error handling, preventing improperly validated inputs from causing system instability, data exposure, or privilege escalation. In the event of successful exploitation, process isolation limits the impact of excessive sequential memory allocation by restricting memory use per process, preventing any single process from exhausting system resources. Finally, the platform uses memory protection mechanisms such as Data Execution Prevention (DEP) and Address Space Layout Randomization (ASLR) to reduce the risk of memory allocation-based attacks.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-rhel8@sha256:a403d057cd2ca820306207282007d4d117623e1a2ebb8bee67c19f5796f07f95_amd64"
],
"known_not_affected": [
"8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-adapter-rhel8@sha256:c79cb3c68317a224277a8ee0dc78832fcd4b6da18b9b5b074cffaad14e2f1aa5_amd64",
"8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-operator-bundle@sha256:44de4b736089166718956bebd456ad1a17e0e6f72c49f52804c6b6e60ef5a494_amd64",
"8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-rhel8-operator@sha256:5a149d0a0cdb6812acbef0c9b3031fb3cd84181e971198a6e17d8fd0bf5e6293_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-30635"
},
{
"category": "external",
"summary": "RHBZ#2107388",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2107388"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-30635",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30635"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-30635",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-30635"
},
{
"category": "external",
"summary": "https://go.dev/issue/53615",
"url": "https://go.dev/issue/53615"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/nqrv9fbR0zE",
"url": "https://groups.google.com/g/golang-announce/c/nqrv9fbR0zE"
}
],
"release_date": "2022-07-12T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-03-06T18:38:53+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-rhel8@sha256:a403d057cd2ca820306207282007d4d117623e1a2ebb8bee67c19f5796f07f95_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:1042"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-adapter-rhel8@sha256:c79cb3c68317a224277a8ee0dc78832fcd4b6da18b9b5b074cffaad14e2f1aa5_amd64",
"8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-operator-bundle@sha256:44de4b736089166718956bebd456ad1a17e0e6f72c49f52804c6b6e60ef5a494_amd64",
"8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-rhel8-operator@sha256:5a149d0a0cdb6812acbef0c9b3031fb3cd84181e971198a6e17d8fd0bf5e6293_amd64",
"8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-rhel8@sha256:a403d057cd2ca820306207282007d4d117623e1a2ebb8bee67c19f5796f07f95_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "golang: encoding/gob: stack exhaustion in Decoder.Decode"
},
{
"cve": "CVE-2022-32148",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2022-07-14T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-adapter-rhel8@sha256:c79cb3c68317a224277a8ee0dc78832fcd4b6da18b9b5b074cffaad14e2f1aa5_amd64",
"8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-operator-bundle@sha256:44de4b736089166718956bebd456ad1a17e0e6f72c49f52804c6b6e60ef5a494_amd64",
"8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-rhel8-operator@sha256:5a149d0a0cdb6812acbef0c9b3031fb3cd84181e971198a6e17d8fd0bf5e6293_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2107383"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in net/http/httputil golang package. When httputil.ReverseProxy.ServeHTTP is called with a Request.Header map containing a nil value for the X-Forwarded-For header, ReverseProxy could set the client IP incorrectly. This issue may affect confidentiality.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: net/http/httputil: NewSingleHostReverseProxy - omit X-Forwarded-For not working",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Within regulated environments, a combination of the following controls acts as a significant barrier to successfully exploiting a CWE-200: Exposure of Sensitive Information to an Unauthorized Actor vulnerability and therefore downgrades the severity of this particular CVE from Moderate to Low.\n\nAccess to the platform is granted only after successful hard token, multi-factor authentication (MFA), which is coupled with account management controls, including integration with single sign-on (SSO), to ensure that user permissions are restricted to only the functions necessary for their roles. Access to sensitive information is explicitly authorized and enforced based on predefined access policies. Event logs are collected and processed for centralization, correlation, analysis, monitoring, reporting, alerting, and retention. This process ensures that audit logs are generated for specific events involving sensitive information, which helps identify patterns of unauthorized access or data exposure. The platform enforces the use of validated cryptographic modules across compute resources to protect the confidentiality of information, even in the event of interception.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-rhel8@sha256:a403d057cd2ca820306207282007d4d117623e1a2ebb8bee67c19f5796f07f95_amd64"
],
"known_not_affected": [
"8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-adapter-rhel8@sha256:c79cb3c68317a224277a8ee0dc78832fcd4b6da18b9b5b074cffaad14e2f1aa5_amd64",
"8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-operator-bundle@sha256:44de4b736089166718956bebd456ad1a17e0e6f72c49f52804c6b6e60ef5a494_amd64",
"8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-rhel8-operator@sha256:5a149d0a0cdb6812acbef0c9b3031fb3cd84181e971198a6e17d8fd0bf5e6293_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-32148"
},
{
"category": "external",
"summary": "RHBZ#2107383",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2107383"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-32148",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32148"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-32148",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-32148"
},
{
"category": "external",
"summary": "https://go.dev/issue/53423",
"url": "https://go.dev/issue/53423"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/nqrv9fbR0zE",
"url": "https://groups.google.com/g/golang-announce/c/nqrv9fbR0zE"
}
],
"release_date": "2022-07-12T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-03-06T18:38:53+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-rhel8@sha256:a403d057cd2ca820306207282007d4d117623e1a2ebb8bee67c19f5796f07f95_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:1042"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-adapter-rhel8@sha256:c79cb3c68317a224277a8ee0dc78832fcd4b6da18b9b5b074cffaad14e2f1aa5_amd64",
"8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-operator-bundle@sha256:44de4b736089166718956bebd456ad1a17e0e6f72c49f52804c6b6e60ef5a494_amd64",
"8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-rhel8-operator@sha256:5a149d0a0cdb6812acbef0c9b3031fb3cd84181e971198a6e17d8fd0bf5e6293_amd64",
"8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-rhel8@sha256:a403d057cd2ca820306207282007d4d117623e1a2ebb8bee67c19f5796f07f95_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "golang: net/http/httputil: NewSingleHostReverseProxy - omit X-Forwarded-For not working"
},
{
"cve": "CVE-2022-32149",
"cwe": {
"id": "CWE-407",
"name": "Inefficient Algorithmic Complexity"
},
"discovery_date": "2022-10-12T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-adapter-rhel8@sha256:c79cb3c68317a224277a8ee0dc78832fcd4b6da18b9b5b074cffaad14e2f1aa5_amd64",
"8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-operator-bundle@sha256:44de4b736089166718956bebd456ad1a17e0e6f72c49f52804c6b6e60ef5a494_amd64",
"8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-rhel8-operator@sha256:5a149d0a0cdb6812acbef0c9b3031fb3cd84181e971198a6e17d8fd0bf5e6293_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2134010"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in the golang.org/x/text/language package. An attacker can craft an Accept-Language header which ParseAcceptLanguage will take significant time to parse. This issue leads to a denial of service, and can impact availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: golang.org/x/text/language: ParseAcceptLanguage takes a long time to parse complex tags",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "After careful analysis of the vulnerability Redhat is choosing to keep the vulnerability severity as moderate,the vulnerability exists in the ParseAcceptLanguage function of the golang text/language package,when an attacker could craft an unusually large accept header and due to the parser taking quadratic time complexity to finish, firstly the attacker would have to find a way smuggle an input to the parser and even then this would simply not result in a crash of any kind but more of resource hang which while can be unpleasant,does not equate to any real world damage.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-rhel8@sha256:a403d057cd2ca820306207282007d4d117623e1a2ebb8bee67c19f5796f07f95_amd64"
],
"known_not_affected": [
"8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-adapter-rhel8@sha256:c79cb3c68317a224277a8ee0dc78832fcd4b6da18b9b5b074cffaad14e2f1aa5_amd64",
"8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-operator-bundle@sha256:44de4b736089166718956bebd456ad1a17e0e6f72c49f52804c6b6e60ef5a494_amd64",
"8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-rhel8-operator@sha256:5a149d0a0cdb6812acbef0c9b3031fb3cd84181e971198a6e17d8fd0bf5e6293_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-32149"
},
{
"category": "external",
"summary": "RHBZ#2134010",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2134010"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-32149",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32149"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-32149",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-32149"
},
{
"category": "external",
"summary": "https://go.dev/issue/56152",
"url": "https://go.dev/issue/56152"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-dev/c/qfPIly0X7aU",
"url": "https://groups.google.com/g/golang-dev/c/qfPIly0X7aU"
}
],
"release_date": "2022-10-11T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-03-06T18:38:53+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-rhel8@sha256:a403d057cd2ca820306207282007d4d117623e1a2ebb8bee67c19f5796f07f95_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:1042"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-adapter-rhel8@sha256:c79cb3c68317a224277a8ee0dc78832fcd4b6da18b9b5b074cffaad14e2f1aa5_amd64",
"8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-operator-bundle@sha256:44de4b736089166718956bebd456ad1a17e0e6f72c49f52804c6b6e60ef5a494_amd64",
"8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-rhel8-operator@sha256:5a149d0a0cdb6812acbef0c9b3031fb3cd84181e971198a6e17d8fd0bf5e6293_amd64",
"8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-rhel8@sha256:a403d057cd2ca820306207282007d4d117623e1a2ebb8bee67c19f5796f07f95_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "golang: golang.org/x/text/language: ParseAcceptLanguage takes a long time to parse complex tags"
},
{
"acknowledgments": [
{
"names": [
"Adam Korczynski"
],
"organization": "ADA Logics"
},
{
"names": [
"OSS-Fuzz"
]
}
],
"cve": "CVE-2022-41715",
"discovery_date": "2022-10-07T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-adapter-rhel8@sha256:c79cb3c68317a224277a8ee0dc78832fcd4b6da18b9b5b074cffaad14e2f1aa5_amd64",
"8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-operator-bundle@sha256:44de4b736089166718956bebd456ad1a17e0e6f72c49f52804c6b6e60ef5a494_amd64",
"8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-rhel8-operator@sha256:5a149d0a0cdb6812acbef0c9b3031fb3cd84181e971198a6e17d8fd0bf5e6293_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2132872"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the golang package, where programs that compile regular expressions from untrusted sources are vulnerable to memory exhaustion or a denial of service. The parsed regexp representation is linear in the input size. Still, in some cases, the constant factor can be as high as 40,000, making a relatively small regexp consume larger amounts of memory. After the fix, each regexp being parsed is limited to a 256 MB memory footprint. Regular expressions whose representation would use more space than that are rejected. Routine use of regular expressions is unaffected.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: regexp/syntax: limit memory used by parsing regexps",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The opportunity for a Denial of Service is limited to the golang runtime. In the case of OpenShift Container Platform, this would be restricted within each individual container. There are multiple layers of guide rails (Golang\u2019s Garbage Collector; OpenShift\u2019s resource constraints imposed at the container and cluster levels) which would require a malicious user to continue submitting attacks for there to be any enduring impact. They would also need access to external server resources to be able to send a massive volume of requests to cause a significant impact on server operations.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-rhel8@sha256:a403d057cd2ca820306207282007d4d117623e1a2ebb8bee67c19f5796f07f95_amd64"
],
"known_not_affected": [
"8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-adapter-rhel8@sha256:c79cb3c68317a224277a8ee0dc78832fcd4b6da18b9b5b074cffaad14e2f1aa5_amd64",
"8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-operator-bundle@sha256:44de4b736089166718956bebd456ad1a17e0e6f72c49f52804c6b6e60ef5a494_amd64",
"8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-rhel8-operator@sha256:5a149d0a0cdb6812acbef0c9b3031fb3cd84181e971198a6e17d8fd0bf5e6293_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-41715"
},
{
"category": "external",
"summary": "RHBZ#2132872",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2132872"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-41715",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41715"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-41715",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-41715"
},
{
"category": "external",
"summary": "https://github.com/golang/go/issues/55949",
"url": "https://github.com/golang/go/issues/55949"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/xtuG5faxtaU?pli=1",
"url": "https://groups.google.com/g/golang-announce/c/xtuG5faxtaU?pli=1"
}
],
"release_date": "2022-10-04T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-03-06T18:38:53+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-rhel8@sha256:a403d057cd2ca820306207282007d4d117623e1a2ebb8bee67c19f5796f07f95_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:1042"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-adapter-rhel8@sha256:c79cb3c68317a224277a8ee0dc78832fcd4b6da18b9b5b074cffaad14e2f1aa5_amd64",
"8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-operator-bundle@sha256:44de4b736089166718956bebd456ad1a17e0e6f72c49f52804c6b6e60ef5a494_amd64",
"8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-rhel8-operator@sha256:5a149d0a0cdb6812acbef0c9b3031fb3cd84181e971198a6e17d8fd0bf5e6293_amd64",
"8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-rhel8@sha256:a403d057cd2ca820306207282007d4d117623e1a2ebb8bee67c19f5796f07f95_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "golang: regexp/syntax: limit memory used by parsing regexps"
}
]
}
RHSA-2023:3204
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Red Hat OpenShift Virtualization release 4.13.0 is now available with updates to packages and images that fix several bugs and add enhancements.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "OpenShift Virtualization is Red Hat\u0027s virtualization solution designed for Red Hat OpenShift Container Platform.\n\nThis advisory contains OpenShift Virtualization 4.13.0 RPMs.\n\nSecurity Fix(es):\n\n* golang: net/http: handle server errors after sending GOAWAY (CVE-2022-27664)\n\n* golang: golang.org/x/text/language: ParseAcceptLanguage takes a long time to parse complex tags (CVE-2022-32149)\n\n* golang: net/url: JoinPath does not strip relative path components in all circumstances (CVE-2022-32190)\n\n* golang: net/http: excessive memory growth in a Go server accepting HTTP/2 requests (CVE-2022-41717)\n\n* golang: math/big: decoding big.Float and big.Rat types can panic if the encoded message is too short, potentially allowing a denial of service (CVE-2022-32189)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nBug Fix(es):\n\n* 4.13.0 rpms (BZ#2124993)",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2023:3204",
"url": "https://access.redhat.com/errata/RHSA-2023:3204"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#moderate",
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "2113814",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2113814"
},
{
"category": "external",
"summary": "2124668",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2124668"
},
{
"category": "external",
"summary": "2124669",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2124669"
},
{
"category": "external",
"summary": "2124993",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2124993"
},
{
"category": "external",
"summary": "2134010",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2134010"
},
{
"category": "external",
"summary": "2161274",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2161274"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2023/rhsa-2023_3204.json"
}
],
"title": "Red Hat Security Advisory: OpenShift Virtualization 4.13.0 RPMs security and bug fix update",
"tracking": {
"current_release_date": "2025-10-24T13:32:21+00:00",
"generator": {
"date": "2025-10-24T13:32:21+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.10"
}
},
"id": "RHSA-2023:3204",
"initial_release_date": "2023-05-18T00:39:12+00:00",
"revision_history": [
{
"date": "2023-05-18T00:39:12+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2023-05-18T00:39:12+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-10-24T13:32:21+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "CNV 4.13 for RHEL 9",
"product": {
"name": "CNV 4.13 for RHEL 9",
"product_id": "9Base-CNV-4.13",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:container_native_virtualization:4.13::el9"
}
}
},
{
"category": "product_name",
"name": "CNV 4.13 for RHEL 7",
"product": {
"name": "CNV 4.13 for RHEL 7",
"product_id": "7Server-CNV-4.13",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:container_native_virtualization:4.13::el7"
}
}
},
{
"category": "product_name",
"name": "CNV 4.13 for RHEL 8",
"product": {
"name": "CNV 4.13 for RHEL 8",
"product_id": "8Base-CNV-4.13",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:container_native_virtualization:4.13::el8"
}
}
}
],
"category": "product_family",
"name": "OpenShift Virtualization"
},
{
"branches": [
{
"category": "product_version",
"name": "kubevirt-0:4.13.0-1469.el9.src",
"product": {
"name": "kubevirt-0:4.13.0-1469.el9.src",
"product_id": "kubevirt-0:4.13.0-1469.el9.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kubevirt@4.13.0-1469.el9?arch=src"
}
}
},
{
"category": "product_version",
"name": "kubevirt-0:4.13.0-1469.el7.src",
"product": {
"name": "kubevirt-0:4.13.0-1469.el7.src",
"product_id": "kubevirt-0:4.13.0-1469.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kubevirt@4.13.0-1469.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "kubevirt-0:4.13.0-1469.el8.src",
"product": {
"name": "kubevirt-0:4.13.0-1469.el8.src",
"product_id": "kubevirt-0:4.13.0-1469.el8.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kubevirt@4.13.0-1469.el8?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "kubevirt-virtctl-0:4.13.0-1469.el9.x86_64",
"product": {
"name": "kubevirt-virtctl-0:4.13.0-1469.el9.x86_64",
"product_id": "kubevirt-virtctl-0:4.13.0-1469.el9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kubevirt-virtctl@4.13.0-1469.el9?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kubevirt-virtctl-redistributable-0:4.13.0-1469.el9.x86_64",
"product": {
"name": "kubevirt-virtctl-redistributable-0:4.13.0-1469.el9.x86_64",
"product_id": "kubevirt-virtctl-redistributable-0:4.13.0-1469.el9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kubevirt-virtctl-redistributable@4.13.0-1469.el9?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kubevirt-virtctl-0:4.13.0-1469.el7.x86_64",
"product": {
"name": "kubevirt-virtctl-0:4.13.0-1469.el7.x86_64",
"product_id": "kubevirt-virtctl-0:4.13.0-1469.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kubevirt-virtctl@4.13.0-1469.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kubevirt-virtctl-redistributable-0:4.13.0-1469.el7.x86_64",
"product": {
"name": "kubevirt-virtctl-redistributable-0:4.13.0-1469.el7.x86_64",
"product_id": "kubevirt-virtctl-redistributable-0:4.13.0-1469.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kubevirt-virtctl-redistributable@4.13.0-1469.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kubevirt-virtctl-0:4.13.0-1469.el8.x86_64",
"product": {
"name": "kubevirt-virtctl-0:4.13.0-1469.el8.x86_64",
"product_id": "kubevirt-virtctl-0:4.13.0-1469.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kubevirt-virtctl@4.13.0-1469.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kubevirt-virtctl-redistributable-0:4.13.0-1469.el8.x86_64",
"product": {
"name": "kubevirt-virtctl-redistributable-0:4.13.0-1469.el8.x86_64",
"product_id": "kubevirt-virtctl-redistributable-0:4.13.0-1469.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kubevirt-virtctl-redistributable@4.13.0-1469.el8?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "kubevirt-virtctl-0:4.13.0-1469.el9.aarch64",
"product": {
"name": "kubevirt-virtctl-0:4.13.0-1469.el9.aarch64",
"product_id": "kubevirt-virtctl-0:4.13.0-1469.el9.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kubevirt-virtctl@4.13.0-1469.el9?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kubevirt-virtctl-redistributable-0:4.13.0-1469.el9.aarch64",
"product": {
"name": "kubevirt-virtctl-redistributable-0:4.13.0-1469.el9.aarch64",
"product_id": "kubevirt-virtctl-redistributable-0:4.13.0-1469.el9.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kubevirt-virtctl-redistributable@4.13.0-1469.el9?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kubevirt-virtctl-0:4.13.0-1469.el8.aarch64",
"product": {
"name": "kubevirt-virtctl-0:4.13.0-1469.el8.aarch64",
"product_id": "kubevirt-virtctl-0:4.13.0-1469.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kubevirt-virtctl@4.13.0-1469.el8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kubevirt-virtctl-redistributable-0:4.13.0-1469.el8.aarch64",
"product": {
"name": "kubevirt-virtctl-redistributable-0:4.13.0-1469.el8.aarch64",
"product_id": "kubevirt-virtctl-redistributable-0:4.13.0-1469.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kubevirt-virtctl-redistributable@4.13.0-1469.el8?arch=aarch64"
}
}
}
],
"category": "architecture",
"name": "aarch64"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kubevirt-0:4.13.0-1469.el7.src as a component of CNV 4.13 for RHEL 7",
"product_id": "7Server-CNV-4.13:kubevirt-0:4.13.0-1469.el7.src"
},
"product_reference": "kubevirt-0:4.13.0-1469.el7.src",
"relates_to_product_reference": "7Server-CNV-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kubevirt-virtctl-0:4.13.0-1469.el7.x86_64 as a component of CNV 4.13 for RHEL 7",
"product_id": "7Server-CNV-4.13:kubevirt-virtctl-0:4.13.0-1469.el7.x86_64"
},
"product_reference": "kubevirt-virtctl-0:4.13.0-1469.el7.x86_64",
"relates_to_product_reference": "7Server-CNV-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kubevirt-virtctl-redistributable-0:4.13.0-1469.el7.x86_64 as a component of CNV 4.13 for RHEL 7",
"product_id": "7Server-CNV-4.13:kubevirt-virtctl-redistributable-0:4.13.0-1469.el7.x86_64"
},
"product_reference": "kubevirt-virtctl-redistributable-0:4.13.0-1469.el7.x86_64",
"relates_to_product_reference": "7Server-CNV-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kubevirt-0:4.13.0-1469.el8.src as a component of CNV 4.13 for RHEL 8",
"product_id": "8Base-CNV-4.13:kubevirt-0:4.13.0-1469.el8.src"
},
"product_reference": "kubevirt-0:4.13.0-1469.el8.src",
"relates_to_product_reference": "8Base-CNV-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kubevirt-virtctl-0:4.13.0-1469.el8.aarch64 as a component of CNV 4.13 for RHEL 8",
"product_id": "8Base-CNV-4.13:kubevirt-virtctl-0:4.13.0-1469.el8.aarch64"
},
"product_reference": "kubevirt-virtctl-0:4.13.0-1469.el8.aarch64",
"relates_to_product_reference": "8Base-CNV-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kubevirt-virtctl-0:4.13.0-1469.el8.x86_64 as a component of CNV 4.13 for RHEL 8",
"product_id": "8Base-CNV-4.13:kubevirt-virtctl-0:4.13.0-1469.el8.x86_64"
},
"product_reference": "kubevirt-virtctl-0:4.13.0-1469.el8.x86_64",
"relates_to_product_reference": "8Base-CNV-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kubevirt-virtctl-redistributable-0:4.13.0-1469.el8.aarch64 as a component of CNV 4.13 for RHEL 8",
"product_id": "8Base-CNV-4.13:kubevirt-virtctl-redistributable-0:4.13.0-1469.el8.aarch64"
},
"product_reference": "kubevirt-virtctl-redistributable-0:4.13.0-1469.el8.aarch64",
"relates_to_product_reference": "8Base-CNV-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kubevirt-virtctl-redistributable-0:4.13.0-1469.el8.x86_64 as a component of CNV 4.13 for RHEL 8",
"product_id": "8Base-CNV-4.13:kubevirt-virtctl-redistributable-0:4.13.0-1469.el8.x86_64"
},
"product_reference": "kubevirt-virtctl-redistributable-0:4.13.0-1469.el8.x86_64",
"relates_to_product_reference": "8Base-CNV-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kubevirt-0:4.13.0-1469.el9.src as a component of CNV 4.13 for RHEL 9",
"product_id": "9Base-CNV-4.13:kubevirt-0:4.13.0-1469.el9.src"
},
"product_reference": "kubevirt-0:4.13.0-1469.el9.src",
"relates_to_product_reference": "9Base-CNV-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kubevirt-virtctl-0:4.13.0-1469.el9.aarch64 as a component of CNV 4.13 for RHEL 9",
"product_id": "9Base-CNV-4.13:kubevirt-virtctl-0:4.13.0-1469.el9.aarch64"
},
"product_reference": "kubevirt-virtctl-0:4.13.0-1469.el9.aarch64",
"relates_to_product_reference": "9Base-CNV-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kubevirt-virtctl-0:4.13.0-1469.el9.x86_64 as a component of CNV 4.13 for RHEL 9",
"product_id": "9Base-CNV-4.13:kubevirt-virtctl-0:4.13.0-1469.el9.x86_64"
},
"product_reference": "kubevirt-virtctl-0:4.13.0-1469.el9.x86_64",
"relates_to_product_reference": "9Base-CNV-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kubevirt-virtctl-redistributable-0:4.13.0-1469.el9.aarch64 as a component of CNV 4.13 for RHEL 9",
"product_id": "9Base-CNV-4.13:kubevirt-virtctl-redistributable-0:4.13.0-1469.el9.aarch64"
},
"product_reference": "kubevirt-virtctl-redistributable-0:4.13.0-1469.el9.aarch64",
"relates_to_product_reference": "9Base-CNV-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kubevirt-virtctl-redistributable-0:4.13.0-1469.el9.x86_64 as a component of CNV 4.13 for RHEL 9",
"product_id": "9Base-CNV-4.13:kubevirt-virtctl-redistributable-0:4.13.0-1469.el9.x86_64"
},
"product_reference": "kubevirt-virtctl-redistributable-0:4.13.0-1469.el9.x86_64",
"relates_to_product_reference": "9Base-CNV-4.13"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2022-27664",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"discovery_date": "2022-09-06T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2124669"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the golang package. In net/http in Go, attackers can cause a denial of service because an HTTP/2 connection can hang during closing if a fatal error preempts the shutdown.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: net/http: handle server errors after sending GOAWAY",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The opportunity for a Denial of Service is limited to the golang runtime. In the case of OpenShift Container Platform, this would be restricted within each individual container. There are multiple layers of guide rails (Golang\u2019s Garbage Collector; OpenShift\u2019s resource constraints imposed at the container and cluster levels) which would require a malicious user to continue submitting attacks for there to be any enduring impact. They would also need access to external server resources to be able to send a massive volume of requests to cause a significant impact on server operations.\n\nWithin regulated environments, a combination of the following controls acts as a significant barrier to successfully exploiting a CWE-400: Uncontrolled Resource Consumption vulnerability and therefore downgrades the severity of this particular CVE from Moderate to Low.\n\nRed Hat restricts access to all platform information by default, granting access only after successful hard token-based multi-factor authentication (MFA) and enforcing least privilege to ensure only authorized roles can execute or modify code. The environment employs malicious code protections, including IDS/IPS and antimalware tools to detect threats and monitor resource usage, helping prevent uncontrolled consumption that could lead to system failure. Additional safeguards, such as web application firewalls and load-balancing strategies, protect against resource exhaustion and performance degradation. Event logs are centrally collected, correlated, and analyzed to support monitoring, alerting, and retention, aiding in the detection of abnormal behavior and potential denial-of-service (DoS) conditions. Static code analysis and peer reviews enforce strong input validation and error handling, reducing the likelihood of input-based DoS attacks.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-CNV-4.13:kubevirt-0:4.13.0-1469.el7.src",
"7Server-CNV-4.13:kubevirt-virtctl-0:4.13.0-1469.el7.x86_64",
"7Server-CNV-4.13:kubevirt-virtctl-redistributable-0:4.13.0-1469.el7.x86_64",
"8Base-CNV-4.13:kubevirt-0:4.13.0-1469.el8.src",
"8Base-CNV-4.13:kubevirt-virtctl-0:4.13.0-1469.el8.aarch64",
"8Base-CNV-4.13:kubevirt-virtctl-0:4.13.0-1469.el8.x86_64",
"8Base-CNV-4.13:kubevirt-virtctl-redistributable-0:4.13.0-1469.el8.aarch64",
"8Base-CNV-4.13:kubevirt-virtctl-redistributable-0:4.13.0-1469.el8.x86_64",
"9Base-CNV-4.13:kubevirt-0:4.13.0-1469.el9.src",
"9Base-CNV-4.13:kubevirt-virtctl-0:4.13.0-1469.el9.aarch64",
"9Base-CNV-4.13:kubevirt-virtctl-0:4.13.0-1469.el9.x86_64",
"9Base-CNV-4.13:kubevirt-virtctl-redistributable-0:4.13.0-1469.el9.aarch64",
"9Base-CNV-4.13:kubevirt-virtctl-redistributable-0:4.13.0-1469.el9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-27664"
},
{
"category": "external",
"summary": "RHBZ#2124669",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2124669"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-27664",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27664"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-27664",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-27664"
},
{
"category": "external",
"summary": "https://go.dev/issue/54658",
"url": "https://go.dev/issue/54658"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/x49AQzIVX-s/m/0tgO0pjiBQAJ",
"url": "https://groups.google.com/g/golang-announce/c/x49AQzIVX-s/m/0tgO0pjiBQAJ"
}
],
"release_date": "2022-09-06T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-05-18T00:39:12+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-CNV-4.13:kubevirt-0:4.13.0-1469.el7.src",
"7Server-CNV-4.13:kubevirt-virtctl-0:4.13.0-1469.el7.x86_64",
"7Server-CNV-4.13:kubevirt-virtctl-redistributable-0:4.13.0-1469.el7.x86_64",
"8Base-CNV-4.13:kubevirt-0:4.13.0-1469.el8.src",
"8Base-CNV-4.13:kubevirt-virtctl-0:4.13.0-1469.el8.aarch64",
"8Base-CNV-4.13:kubevirt-virtctl-0:4.13.0-1469.el8.x86_64",
"8Base-CNV-4.13:kubevirt-virtctl-redistributable-0:4.13.0-1469.el8.aarch64",
"8Base-CNV-4.13:kubevirt-virtctl-redistributable-0:4.13.0-1469.el8.x86_64",
"9Base-CNV-4.13:kubevirt-0:4.13.0-1469.el9.src",
"9Base-CNV-4.13:kubevirt-virtctl-0:4.13.0-1469.el9.aarch64",
"9Base-CNV-4.13:kubevirt-virtctl-0:4.13.0-1469.el9.x86_64",
"9Base-CNV-4.13:kubevirt-virtctl-redistributable-0:4.13.0-1469.el9.aarch64",
"9Base-CNV-4.13:kubevirt-virtctl-redistributable-0:4.13.0-1469.el9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:3204"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"7Server-CNV-4.13:kubevirt-0:4.13.0-1469.el7.src",
"7Server-CNV-4.13:kubevirt-virtctl-0:4.13.0-1469.el7.x86_64",
"7Server-CNV-4.13:kubevirt-virtctl-redistributable-0:4.13.0-1469.el7.x86_64",
"8Base-CNV-4.13:kubevirt-0:4.13.0-1469.el8.src",
"8Base-CNV-4.13:kubevirt-virtctl-0:4.13.0-1469.el8.aarch64",
"8Base-CNV-4.13:kubevirt-virtctl-0:4.13.0-1469.el8.x86_64",
"8Base-CNV-4.13:kubevirt-virtctl-redistributable-0:4.13.0-1469.el8.aarch64",
"8Base-CNV-4.13:kubevirt-virtctl-redistributable-0:4.13.0-1469.el8.x86_64",
"9Base-CNV-4.13:kubevirt-0:4.13.0-1469.el9.src",
"9Base-CNV-4.13:kubevirt-virtctl-0:4.13.0-1469.el9.aarch64",
"9Base-CNV-4.13:kubevirt-virtctl-0:4.13.0-1469.el9.x86_64",
"9Base-CNV-4.13:kubevirt-virtctl-redistributable-0:4.13.0-1469.el9.aarch64",
"9Base-CNV-4.13:kubevirt-virtctl-redistributable-0:4.13.0-1469.el9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "golang: net/http: handle server errors after sending GOAWAY"
},
{
"cve": "CVE-2022-32149",
"cwe": {
"id": "CWE-407",
"name": "Inefficient Algorithmic Complexity"
},
"discovery_date": "2022-10-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2134010"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in the golang.org/x/text/language package. An attacker can craft an Accept-Language header which ParseAcceptLanguage will take significant time to parse. This issue leads to a denial of service, and can impact availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: golang.org/x/text/language: ParseAcceptLanguage takes a long time to parse complex tags",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "After careful analysis of the vulnerability Redhat is choosing to keep the vulnerability severity as moderate,the vulnerability exists in the ParseAcceptLanguage function of the golang text/language package,when an attacker could craft an unusually large accept header and due to the parser taking quadratic time complexity to finish, firstly the attacker would have to find a way smuggle an input to the parser and even then this would simply not result in a crash of any kind but more of resource hang which while can be unpleasant,does not equate to any real world damage.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-CNV-4.13:kubevirt-0:4.13.0-1469.el7.src",
"7Server-CNV-4.13:kubevirt-virtctl-0:4.13.0-1469.el7.x86_64",
"7Server-CNV-4.13:kubevirt-virtctl-redistributable-0:4.13.0-1469.el7.x86_64",
"8Base-CNV-4.13:kubevirt-0:4.13.0-1469.el8.src",
"8Base-CNV-4.13:kubevirt-virtctl-0:4.13.0-1469.el8.aarch64",
"8Base-CNV-4.13:kubevirt-virtctl-0:4.13.0-1469.el8.x86_64",
"8Base-CNV-4.13:kubevirt-virtctl-redistributable-0:4.13.0-1469.el8.aarch64",
"8Base-CNV-4.13:kubevirt-virtctl-redistributable-0:4.13.0-1469.el8.x86_64",
"9Base-CNV-4.13:kubevirt-0:4.13.0-1469.el9.src",
"9Base-CNV-4.13:kubevirt-virtctl-0:4.13.0-1469.el9.aarch64",
"9Base-CNV-4.13:kubevirt-virtctl-0:4.13.0-1469.el9.x86_64",
"9Base-CNV-4.13:kubevirt-virtctl-redistributable-0:4.13.0-1469.el9.aarch64",
"9Base-CNV-4.13:kubevirt-virtctl-redistributable-0:4.13.0-1469.el9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-32149"
},
{
"category": "external",
"summary": "RHBZ#2134010",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2134010"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-32149",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32149"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-32149",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-32149"
},
{
"category": "external",
"summary": "https://go.dev/issue/56152",
"url": "https://go.dev/issue/56152"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-dev/c/qfPIly0X7aU",
"url": "https://groups.google.com/g/golang-dev/c/qfPIly0X7aU"
}
],
"release_date": "2022-10-11T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-05-18T00:39:12+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-CNV-4.13:kubevirt-0:4.13.0-1469.el7.src",
"7Server-CNV-4.13:kubevirt-virtctl-0:4.13.0-1469.el7.x86_64",
"7Server-CNV-4.13:kubevirt-virtctl-redistributable-0:4.13.0-1469.el7.x86_64",
"8Base-CNV-4.13:kubevirt-0:4.13.0-1469.el8.src",
"8Base-CNV-4.13:kubevirt-virtctl-0:4.13.0-1469.el8.aarch64",
"8Base-CNV-4.13:kubevirt-virtctl-0:4.13.0-1469.el8.x86_64",
"8Base-CNV-4.13:kubevirt-virtctl-redistributable-0:4.13.0-1469.el8.aarch64",
"8Base-CNV-4.13:kubevirt-virtctl-redistributable-0:4.13.0-1469.el8.x86_64",
"9Base-CNV-4.13:kubevirt-0:4.13.0-1469.el9.src",
"9Base-CNV-4.13:kubevirt-virtctl-0:4.13.0-1469.el9.aarch64",
"9Base-CNV-4.13:kubevirt-virtctl-0:4.13.0-1469.el9.x86_64",
"9Base-CNV-4.13:kubevirt-virtctl-redistributable-0:4.13.0-1469.el9.aarch64",
"9Base-CNV-4.13:kubevirt-virtctl-redistributable-0:4.13.0-1469.el9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:3204"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"7Server-CNV-4.13:kubevirt-0:4.13.0-1469.el7.src",
"7Server-CNV-4.13:kubevirt-virtctl-0:4.13.0-1469.el7.x86_64",
"7Server-CNV-4.13:kubevirt-virtctl-redistributable-0:4.13.0-1469.el7.x86_64",
"8Base-CNV-4.13:kubevirt-0:4.13.0-1469.el8.src",
"8Base-CNV-4.13:kubevirt-virtctl-0:4.13.0-1469.el8.aarch64",
"8Base-CNV-4.13:kubevirt-virtctl-0:4.13.0-1469.el8.x86_64",
"8Base-CNV-4.13:kubevirt-virtctl-redistributable-0:4.13.0-1469.el8.aarch64",
"8Base-CNV-4.13:kubevirt-virtctl-redistributable-0:4.13.0-1469.el8.x86_64",
"9Base-CNV-4.13:kubevirt-0:4.13.0-1469.el9.src",
"9Base-CNV-4.13:kubevirt-virtctl-0:4.13.0-1469.el9.aarch64",
"9Base-CNV-4.13:kubevirt-virtctl-0:4.13.0-1469.el9.x86_64",
"9Base-CNV-4.13:kubevirt-virtctl-redistributable-0:4.13.0-1469.el9.aarch64",
"9Base-CNV-4.13:kubevirt-virtctl-redistributable-0:4.13.0-1469.el9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "golang: golang.org/x/text/language: ParseAcceptLanguage takes a long time to parse complex tags"
},
{
"cve": "CVE-2022-32189",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"discovery_date": "2022-08-02T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2113814"
}
],
"notes": [
{
"category": "description",
"text": "An uncontrolled resource consumption flaw was found in Golang math/big. A too-short encoded message can cause a panic in Float.GobDecode and Rat.GobDecode in math/big in Go, potentially allowing an attacker to create a denial of service, impacting availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: math/big: decoding big.Float and big.Rat types can panic if the encoded message is too short, potentially allowing a denial of service",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This flaw stems from a particular and specific method (GoBDecode) which isn\u0027t commonly used. There are few components within Red Hat offerings which call this function. In rare cases where this method is called, the component limits possible damage or it is not possible to be triggered by an attacker. For these combined reasons the impact has been downgraded to Low.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-CNV-4.13:kubevirt-0:4.13.0-1469.el7.src",
"7Server-CNV-4.13:kubevirt-virtctl-0:4.13.0-1469.el7.x86_64",
"7Server-CNV-4.13:kubevirt-virtctl-redistributable-0:4.13.0-1469.el7.x86_64",
"8Base-CNV-4.13:kubevirt-0:4.13.0-1469.el8.src",
"8Base-CNV-4.13:kubevirt-virtctl-0:4.13.0-1469.el8.aarch64",
"8Base-CNV-4.13:kubevirt-virtctl-0:4.13.0-1469.el8.x86_64",
"8Base-CNV-4.13:kubevirt-virtctl-redistributable-0:4.13.0-1469.el8.aarch64",
"8Base-CNV-4.13:kubevirt-virtctl-redistributable-0:4.13.0-1469.el8.x86_64",
"9Base-CNV-4.13:kubevirt-0:4.13.0-1469.el9.src",
"9Base-CNV-4.13:kubevirt-virtctl-0:4.13.0-1469.el9.aarch64",
"9Base-CNV-4.13:kubevirt-virtctl-0:4.13.0-1469.el9.x86_64",
"9Base-CNV-4.13:kubevirt-virtctl-redistributable-0:4.13.0-1469.el9.aarch64",
"9Base-CNV-4.13:kubevirt-virtctl-redistributable-0:4.13.0-1469.el9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-32189"
},
{
"category": "external",
"summary": "RHBZ#2113814",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2113814"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-32189",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32189"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-32189",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-32189"
},
{
"category": "external",
"summary": "https://go.dev/issue/53871",
"url": "https://go.dev/issue/53871"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-nuts/c/DCFSyTGM0wU",
"url": "https://groups.google.com/g/golang-nuts/c/DCFSyTGM0wU"
}
],
"release_date": "2022-08-01T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-05-18T00:39:12+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-CNV-4.13:kubevirt-0:4.13.0-1469.el7.src",
"7Server-CNV-4.13:kubevirt-virtctl-0:4.13.0-1469.el7.x86_64",
"7Server-CNV-4.13:kubevirt-virtctl-redistributable-0:4.13.0-1469.el7.x86_64",
"8Base-CNV-4.13:kubevirt-0:4.13.0-1469.el8.src",
"8Base-CNV-4.13:kubevirt-virtctl-0:4.13.0-1469.el8.aarch64",
"8Base-CNV-4.13:kubevirt-virtctl-0:4.13.0-1469.el8.x86_64",
"8Base-CNV-4.13:kubevirt-virtctl-redistributable-0:4.13.0-1469.el8.aarch64",
"8Base-CNV-4.13:kubevirt-virtctl-redistributable-0:4.13.0-1469.el8.x86_64",
"9Base-CNV-4.13:kubevirt-0:4.13.0-1469.el9.src",
"9Base-CNV-4.13:kubevirt-virtctl-0:4.13.0-1469.el9.aarch64",
"9Base-CNV-4.13:kubevirt-virtctl-0:4.13.0-1469.el9.x86_64",
"9Base-CNV-4.13:kubevirt-virtctl-redistributable-0:4.13.0-1469.el9.aarch64",
"9Base-CNV-4.13:kubevirt-virtctl-redistributable-0:4.13.0-1469.el9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:3204"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"7Server-CNV-4.13:kubevirt-0:4.13.0-1469.el7.src",
"7Server-CNV-4.13:kubevirt-virtctl-0:4.13.0-1469.el7.x86_64",
"7Server-CNV-4.13:kubevirt-virtctl-redistributable-0:4.13.0-1469.el7.x86_64",
"8Base-CNV-4.13:kubevirt-0:4.13.0-1469.el8.src",
"8Base-CNV-4.13:kubevirt-virtctl-0:4.13.0-1469.el8.aarch64",
"8Base-CNV-4.13:kubevirt-virtctl-0:4.13.0-1469.el8.x86_64",
"8Base-CNV-4.13:kubevirt-virtctl-redistributable-0:4.13.0-1469.el8.aarch64",
"8Base-CNV-4.13:kubevirt-virtctl-redistributable-0:4.13.0-1469.el8.x86_64",
"9Base-CNV-4.13:kubevirt-0:4.13.0-1469.el9.src",
"9Base-CNV-4.13:kubevirt-virtctl-0:4.13.0-1469.el9.aarch64",
"9Base-CNV-4.13:kubevirt-virtctl-0:4.13.0-1469.el9.x86_64",
"9Base-CNV-4.13:kubevirt-virtctl-redistributable-0:4.13.0-1469.el9.aarch64",
"9Base-CNV-4.13:kubevirt-virtctl-redistributable-0:4.13.0-1469.el9.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"7Server-CNV-4.13:kubevirt-0:4.13.0-1469.el7.src",
"7Server-CNV-4.13:kubevirt-virtctl-0:4.13.0-1469.el7.x86_64",
"7Server-CNV-4.13:kubevirt-virtctl-redistributable-0:4.13.0-1469.el7.x86_64",
"8Base-CNV-4.13:kubevirt-0:4.13.0-1469.el8.src",
"8Base-CNV-4.13:kubevirt-virtctl-0:4.13.0-1469.el8.aarch64",
"8Base-CNV-4.13:kubevirt-virtctl-0:4.13.0-1469.el8.x86_64",
"8Base-CNV-4.13:kubevirt-virtctl-redistributable-0:4.13.0-1469.el8.aarch64",
"8Base-CNV-4.13:kubevirt-virtctl-redistributable-0:4.13.0-1469.el8.x86_64",
"9Base-CNV-4.13:kubevirt-0:4.13.0-1469.el9.src",
"9Base-CNV-4.13:kubevirt-virtctl-0:4.13.0-1469.el9.aarch64",
"9Base-CNV-4.13:kubevirt-virtctl-0:4.13.0-1469.el9.x86_64",
"9Base-CNV-4.13:kubevirt-virtctl-redistributable-0:4.13.0-1469.el9.aarch64",
"9Base-CNV-4.13:kubevirt-virtctl-redistributable-0:4.13.0-1469.el9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "golang: math/big: decoding big.Float and big.Rat types can panic if the encoded message is too short, potentially allowing a denial of service"
},
{
"cve": "CVE-2022-32190",
"cwe": {
"id": "CWE-22",
"name": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)"
},
"discovery_date": "2022-09-06T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2124668"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the golang package. The JoinPath doesn\u0027t remove the ../ path components appended to a domain that is not terminated by a slash, possibly leading to a directory traversal attack.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: net/url: JoinPath does not strip relative path components in all circumstances",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The vulnerable functions, JoinPath and URL.JoinPath was introduced in upstream go1.19, whereas, RHEL ships go1.17 and go1.18 versions, which does not contain the vulnerable code. Hence, packages shipped with RHEL-8, RHEL-9 are not affected.\n\nAll Y stream releases of OpenShift Container Platform 4 run on RHEL-8 or RHEL-9, so OCP 4 is also not affected.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-CNV-4.13:kubevirt-0:4.13.0-1469.el7.src",
"7Server-CNV-4.13:kubevirt-virtctl-0:4.13.0-1469.el7.x86_64",
"7Server-CNV-4.13:kubevirt-virtctl-redistributable-0:4.13.0-1469.el7.x86_64",
"8Base-CNV-4.13:kubevirt-0:4.13.0-1469.el8.src",
"8Base-CNV-4.13:kubevirt-virtctl-0:4.13.0-1469.el8.aarch64",
"8Base-CNV-4.13:kubevirt-virtctl-0:4.13.0-1469.el8.x86_64",
"8Base-CNV-4.13:kubevirt-virtctl-redistributable-0:4.13.0-1469.el8.aarch64",
"8Base-CNV-4.13:kubevirt-virtctl-redistributable-0:4.13.0-1469.el8.x86_64",
"9Base-CNV-4.13:kubevirt-0:4.13.0-1469.el9.src",
"9Base-CNV-4.13:kubevirt-virtctl-0:4.13.0-1469.el9.aarch64",
"9Base-CNV-4.13:kubevirt-virtctl-0:4.13.0-1469.el9.x86_64",
"9Base-CNV-4.13:kubevirt-virtctl-redistributable-0:4.13.0-1469.el9.aarch64",
"9Base-CNV-4.13:kubevirt-virtctl-redistributable-0:4.13.0-1469.el9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-32190"
},
{
"category": "external",
"summary": "RHBZ#2124668",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2124668"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-32190",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32190"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-32190",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-32190"
},
{
"category": "external",
"summary": "https://go.dev/issue/54385",
"url": "https://go.dev/issue/54385"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/x49AQzIVX-s/m/0tgO0pjiBQAJ",
"url": "https://groups.google.com/g/golang-announce/c/x49AQzIVX-s/m/0tgO0pjiBQAJ"
}
],
"release_date": "2022-09-06T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-05-18T00:39:12+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-CNV-4.13:kubevirt-0:4.13.0-1469.el7.src",
"7Server-CNV-4.13:kubevirt-virtctl-0:4.13.0-1469.el7.x86_64",
"7Server-CNV-4.13:kubevirt-virtctl-redistributable-0:4.13.0-1469.el7.x86_64",
"8Base-CNV-4.13:kubevirt-0:4.13.0-1469.el8.src",
"8Base-CNV-4.13:kubevirt-virtctl-0:4.13.0-1469.el8.aarch64",
"8Base-CNV-4.13:kubevirt-virtctl-0:4.13.0-1469.el8.x86_64",
"8Base-CNV-4.13:kubevirt-virtctl-redistributable-0:4.13.0-1469.el8.aarch64",
"8Base-CNV-4.13:kubevirt-virtctl-redistributable-0:4.13.0-1469.el8.x86_64",
"9Base-CNV-4.13:kubevirt-0:4.13.0-1469.el9.src",
"9Base-CNV-4.13:kubevirt-virtctl-0:4.13.0-1469.el9.aarch64",
"9Base-CNV-4.13:kubevirt-virtctl-0:4.13.0-1469.el9.x86_64",
"9Base-CNV-4.13:kubevirt-virtctl-redistributable-0:4.13.0-1469.el9.aarch64",
"9Base-CNV-4.13:kubevirt-virtctl-redistributable-0:4.13.0-1469.el9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:3204"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"7Server-CNV-4.13:kubevirt-0:4.13.0-1469.el7.src",
"7Server-CNV-4.13:kubevirt-virtctl-0:4.13.0-1469.el7.x86_64",
"7Server-CNV-4.13:kubevirt-virtctl-redistributable-0:4.13.0-1469.el7.x86_64",
"8Base-CNV-4.13:kubevirt-0:4.13.0-1469.el8.src",
"8Base-CNV-4.13:kubevirt-virtctl-0:4.13.0-1469.el8.aarch64",
"8Base-CNV-4.13:kubevirt-virtctl-0:4.13.0-1469.el8.x86_64",
"8Base-CNV-4.13:kubevirt-virtctl-redistributable-0:4.13.0-1469.el8.aarch64",
"8Base-CNV-4.13:kubevirt-virtctl-redistributable-0:4.13.0-1469.el8.x86_64",
"9Base-CNV-4.13:kubevirt-0:4.13.0-1469.el9.src",
"9Base-CNV-4.13:kubevirt-virtctl-0:4.13.0-1469.el9.aarch64",
"9Base-CNV-4.13:kubevirt-virtctl-0:4.13.0-1469.el9.x86_64",
"9Base-CNV-4.13:kubevirt-virtctl-redistributable-0:4.13.0-1469.el9.aarch64",
"9Base-CNV-4.13:kubevirt-virtctl-redistributable-0:4.13.0-1469.el9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "golang: net/url: JoinPath does not strip relative path components in all circumstances"
},
{
"cve": "CVE-2022-41717",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"discovery_date": "2023-01-16T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2161274"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the net/http library of the golang package. This flaw allows an attacker to cause excessive memory growth in a Go server accepting HTTP/2 requests. HTTP/2 server connections contain a cache of HTTP header keys sent by the client. While the total number of entries in this cache is capped, an attacker sending very large keys can cause the server to allocate approximately 64 MiB per open connection.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: net/http: excessive memory growth in a Go server accepting HTTP/2 requests",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Within Red Hat OpenShift Container Platform, the grafana container is listed as will not fix. Since OCP 4.10, Grafana itself is not shipped and the Grafana web server is protected behind an OAuth proxy server.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-CNV-4.13:kubevirt-0:4.13.0-1469.el7.src",
"7Server-CNV-4.13:kubevirt-virtctl-0:4.13.0-1469.el7.x86_64",
"7Server-CNV-4.13:kubevirt-virtctl-redistributable-0:4.13.0-1469.el7.x86_64",
"8Base-CNV-4.13:kubevirt-0:4.13.0-1469.el8.src",
"8Base-CNV-4.13:kubevirt-virtctl-0:4.13.0-1469.el8.aarch64",
"8Base-CNV-4.13:kubevirt-virtctl-0:4.13.0-1469.el8.x86_64",
"8Base-CNV-4.13:kubevirt-virtctl-redistributable-0:4.13.0-1469.el8.aarch64",
"8Base-CNV-4.13:kubevirt-virtctl-redistributable-0:4.13.0-1469.el8.x86_64",
"9Base-CNV-4.13:kubevirt-0:4.13.0-1469.el9.src",
"9Base-CNV-4.13:kubevirt-virtctl-0:4.13.0-1469.el9.aarch64",
"9Base-CNV-4.13:kubevirt-virtctl-0:4.13.0-1469.el9.x86_64",
"9Base-CNV-4.13:kubevirt-virtctl-redistributable-0:4.13.0-1469.el9.aarch64",
"9Base-CNV-4.13:kubevirt-virtctl-redistributable-0:4.13.0-1469.el9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-41717"
},
{
"category": "external",
"summary": "RHBZ#2161274",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2161274"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-41717",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41717"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-41717",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-41717"
},
{
"category": "external",
"summary": "https://go.dev/cl/455635",
"url": "https://go.dev/cl/455635"
},
{
"category": "external",
"summary": "https://go.dev/cl/455717",
"url": "https://go.dev/cl/455717"
},
{
"category": "external",
"summary": "https://go.dev/issue/56350",
"url": "https://go.dev/issue/56350"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/L_3rmdT0BMU/m/yZDrXjIiBQAJ",
"url": "https://groups.google.com/g/golang-announce/c/L_3rmdT0BMU/m/yZDrXjIiBQAJ"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2022-1144",
"url": "https://pkg.go.dev/vuln/GO-2022-1144"
}
],
"release_date": "2022-11-30T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-05-18T00:39:12+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-CNV-4.13:kubevirt-0:4.13.0-1469.el7.src",
"7Server-CNV-4.13:kubevirt-virtctl-0:4.13.0-1469.el7.x86_64",
"7Server-CNV-4.13:kubevirt-virtctl-redistributable-0:4.13.0-1469.el7.x86_64",
"8Base-CNV-4.13:kubevirt-0:4.13.0-1469.el8.src",
"8Base-CNV-4.13:kubevirt-virtctl-0:4.13.0-1469.el8.aarch64",
"8Base-CNV-4.13:kubevirt-virtctl-0:4.13.0-1469.el8.x86_64",
"8Base-CNV-4.13:kubevirt-virtctl-redistributable-0:4.13.0-1469.el8.aarch64",
"8Base-CNV-4.13:kubevirt-virtctl-redistributable-0:4.13.0-1469.el8.x86_64",
"9Base-CNV-4.13:kubevirt-0:4.13.0-1469.el9.src",
"9Base-CNV-4.13:kubevirt-virtctl-0:4.13.0-1469.el9.aarch64",
"9Base-CNV-4.13:kubevirt-virtctl-0:4.13.0-1469.el9.x86_64",
"9Base-CNV-4.13:kubevirt-virtctl-redistributable-0:4.13.0-1469.el9.aarch64",
"9Base-CNV-4.13:kubevirt-virtctl-redistributable-0:4.13.0-1469.el9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:3204"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"7Server-CNV-4.13:kubevirt-0:4.13.0-1469.el7.src",
"7Server-CNV-4.13:kubevirt-virtctl-0:4.13.0-1469.el7.x86_64",
"7Server-CNV-4.13:kubevirt-virtctl-redistributable-0:4.13.0-1469.el7.x86_64",
"8Base-CNV-4.13:kubevirt-0:4.13.0-1469.el8.src",
"8Base-CNV-4.13:kubevirt-virtctl-0:4.13.0-1469.el8.aarch64",
"8Base-CNV-4.13:kubevirt-virtctl-0:4.13.0-1469.el8.x86_64",
"8Base-CNV-4.13:kubevirt-virtctl-redistributable-0:4.13.0-1469.el8.aarch64",
"8Base-CNV-4.13:kubevirt-virtctl-redistributable-0:4.13.0-1469.el8.x86_64",
"9Base-CNV-4.13:kubevirt-0:4.13.0-1469.el9.src",
"9Base-CNV-4.13:kubevirt-virtctl-0:4.13.0-1469.el9.aarch64",
"9Base-CNV-4.13:kubevirt-virtctl-0:4.13.0-1469.el9.x86_64",
"9Base-CNV-4.13:kubevirt-virtctl-redistributable-0:4.13.0-1469.el9.aarch64",
"9Base-CNV-4.13:kubevirt-virtctl-redistributable-0:4.13.0-1469.el9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "golang: net/http: excessive memory growth in a Go server accepting HTTP/2 requests"
}
]
}
RHSA-2022:6882
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update is now available for OpenShift Logging 5.3.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Openshift Logging 5.3.13 security and bug fix release\n\nSecurity Fix(es):\n\n* golang: golang.org/x/text/language: ParseAcceptLanguage takes a long time to parse complex tags (CVE-2022-32149)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2022:6882",
"url": "https://access.redhat.com/errata/RHSA-2022:6882"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#moderate",
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "2134010",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2134010"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2022/rhsa-2022_6882.json"
}
],
"title": "Red Hat Security Advisory: Openshift Logging 5.3.13 security and bug fix release",
"tracking": {
"current_release_date": "2025-10-10T01:53:18+00:00",
"generator": {
"date": "2025-10-10T01:53:18+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.9"
}
},
"id": "RHSA-2022:6882",
"initial_release_date": "2022-11-09T16:43:13+00:00",
"revision_history": [
{
"date": "2022-11-09T16:43:13+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2022-11-09T16:43:13+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-10-10T01:53:18+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "OpenShift Logging 5.3",
"product": {
"name": "OpenShift Logging 5.3",
"product_id": "8Base-OSE-LOGGING-5.3",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:logging:5.3::el8"
}
}
}
],
"category": "product_family",
"name": "Red Hat OpenShift Enterprise"
},
{
"branches": [
{
"category": "product_version",
"name": "openshift-logging/cluster-logging-rhel8-operator@sha256:e785074e66edd55f68d4971cb42bcc9612c9b2713593555162d82b9218368023_s390x",
"product": {
"name": "openshift-logging/cluster-logging-rhel8-operator@sha256:e785074e66edd55f68d4971cb42bcc9612c9b2713593555162d82b9218368023_s390x",
"product_id": "openshift-logging/cluster-logging-rhel8-operator@sha256:e785074e66edd55f68d4971cb42bcc9612c9b2713593555162d82b9218368023_s390x",
"product_identification_helper": {
"purl": "pkg:oci/cluster-logging-rhel8-operator@sha256:e785074e66edd55f68d4971cb42bcc9612c9b2713593555162d82b9218368023?arch=s390x\u0026repository_url=registry.redhat.io/openshift-logging/cluster-logging-rhel8-operator\u0026tag=v5.3.13-9"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/elasticsearch-rhel8-operator@sha256:34de2b2acd8ee51055a51659b5a9e8331ebdd1512be34969e60e412269b4d494_s390x",
"product": {
"name": "openshift-logging/elasticsearch-rhel8-operator@sha256:34de2b2acd8ee51055a51659b5a9e8331ebdd1512be34969e60e412269b4d494_s390x",
"product_id": "openshift-logging/elasticsearch-rhel8-operator@sha256:34de2b2acd8ee51055a51659b5a9e8331ebdd1512be34969e60e412269b4d494_s390x",
"product_identification_helper": {
"purl": "pkg:oci/elasticsearch-rhel8-operator@sha256:34de2b2acd8ee51055a51659b5a9e8331ebdd1512be34969e60e412269b4d494?arch=s390x\u0026repository_url=registry.redhat.io/openshift-logging/elasticsearch-rhel8-operator\u0026tag=v5.3.13-5"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/elasticsearch-proxy-rhel8@sha256:cea0810e580ab422b8f54ae0f095f1ef4346cfef81873b5999a66cdc2687165a_s390x",
"product": {
"name": "openshift-logging/elasticsearch-proxy-rhel8@sha256:cea0810e580ab422b8f54ae0f095f1ef4346cfef81873b5999a66cdc2687165a_s390x",
"product_id": "openshift-logging/elasticsearch-proxy-rhel8@sha256:cea0810e580ab422b8f54ae0f095f1ef4346cfef81873b5999a66cdc2687165a_s390x",
"product_identification_helper": {
"purl": "pkg:oci/elasticsearch-proxy-rhel8@sha256:cea0810e580ab422b8f54ae0f095f1ef4346cfef81873b5999a66cdc2687165a?arch=s390x\u0026repository_url=registry.redhat.io/openshift-logging/elasticsearch-proxy-rhel8\u0026tag=v1.0.0-302"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/log-file-metric-exporter-rhel8@sha256:db3841437512ac4716465336e1a520a6a702433b169e955ba04cdc41d6fa4eea_s390x",
"product": {
"name": "openshift-logging/log-file-metric-exporter-rhel8@sha256:db3841437512ac4716465336e1a520a6a702433b169e955ba04cdc41d6fa4eea_s390x",
"product_id": "openshift-logging/log-file-metric-exporter-rhel8@sha256:db3841437512ac4716465336e1a520a6a702433b169e955ba04cdc41d6fa4eea_s390x",
"product_identification_helper": {
"purl": "pkg:oci/log-file-metric-exporter-rhel8@sha256:db3841437512ac4716465336e1a520a6a702433b169e955ba04cdc41d6fa4eea?arch=s390x\u0026repository_url=registry.redhat.io/openshift-logging/log-file-metric-exporter-rhel8\u0026tag=v1.0.0-164"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/logging-curator5-rhel8@sha256:f7fa0d3ea11001123fa1f59b2ae1edb230fb96157b19ec230d876793b4ed1554_s390x",
"product": {
"name": "openshift-logging/logging-curator5-rhel8@sha256:f7fa0d3ea11001123fa1f59b2ae1edb230fb96157b19ec230d876793b4ed1554_s390x",
"product_id": "openshift-logging/logging-curator5-rhel8@sha256:f7fa0d3ea11001123fa1f59b2ae1edb230fb96157b19ec230d876793b4ed1554_s390x",
"product_identification_helper": {
"purl": "pkg:oci/logging-curator5-rhel8@sha256:f7fa0d3ea11001123fa1f59b2ae1edb230fb96157b19ec230d876793b4ed1554?arch=s390x\u0026repository_url=registry.redhat.io/openshift-logging/logging-curator5-rhel8\u0026tag=v5.8.1-242"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/elasticsearch6-rhel8@sha256:211271d2e88eaf7f0930dbf2badf78dbe051ae14b68e67073b1b1b992fa9ea6e_s390x",
"product": {
"name": "openshift-logging/elasticsearch6-rhel8@sha256:211271d2e88eaf7f0930dbf2badf78dbe051ae14b68e67073b1b1b992fa9ea6e_s390x",
"product_id": "openshift-logging/elasticsearch6-rhel8@sha256:211271d2e88eaf7f0930dbf2badf78dbe051ae14b68e67073b1b1b992fa9ea6e_s390x",
"product_identification_helper": {
"purl": "pkg:oci/elasticsearch6-rhel8@sha256:211271d2e88eaf7f0930dbf2badf78dbe051ae14b68e67073b1b1b992fa9ea6e?arch=s390x\u0026repository_url=registry.redhat.io/openshift-logging/elasticsearch6-rhel8\u0026tag=v6.8.1-261"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/fluentd-rhel8@sha256:b712b4568533eccc3e67894c69a27f024a710c0a0759cb04a799077bc21ad7b0_s390x",
"product": {
"name": "openshift-logging/fluentd-rhel8@sha256:b712b4568533eccc3e67894c69a27f024a710c0a0759cb04a799077bc21ad7b0_s390x",
"product_id": "openshift-logging/fluentd-rhel8@sha256:b712b4568533eccc3e67894c69a27f024a710c0a0759cb04a799077bc21ad7b0_s390x",
"product_identification_helper": {
"purl": "pkg:oci/fluentd-rhel8@sha256:b712b4568533eccc3e67894c69a27f024a710c0a0759cb04a799077bc21ad7b0?arch=s390x\u0026repository_url=registry.redhat.io/openshift-logging/fluentd-rhel8\u0026tag=v1.7.4-217"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/kibana6-rhel8@sha256:a3c5a69dba9fafdbbe21b7eaf0792a8d0d7dbc108977dde72bce3af4ba709a01_s390x",
"product": {
"name": "openshift-logging/kibana6-rhel8@sha256:a3c5a69dba9fafdbbe21b7eaf0792a8d0d7dbc108977dde72bce3af4ba709a01_s390x",
"product_id": "openshift-logging/kibana6-rhel8@sha256:a3c5a69dba9fafdbbe21b7eaf0792a8d0d7dbc108977dde72bce3af4ba709a01_s390x",
"product_identification_helper": {
"purl": "pkg:oci/kibana6-rhel8@sha256:a3c5a69dba9fafdbbe21b7eaf0792a8d0d7dbc108977dde72bce3af4ba709a01?arch=s390x\u0026repository_url=registry.redhat.io/openshift-logging/kibana6-rhel8\u0026tag=v6.8.1-298"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "openshift-logging/cluster-logging-rhel8-operator@sha256:d05f697c6da62036fcbba633a4cb6d253fdd6882c9205ad9a7cb9710878402a0_amd64",
"product": {
"name": "openshift-logging/cluster-logging-rhel8-operator@sha256:d05f697c6da62036fcbba633a4cb6d253fdd6882c9205ad9a7cb9710878402a0_amd64",
"product_id": "openshift-logging/cluster-logging-rhel8-operator@sha256:d05f697c6da62036fcbba633a4cb6d253fdd6882c9205ad9a7cb9710878402a0_amd64",
"product_identification_helper": {
"purl": "pkg:oci/cluster-logging-rhel8-operator@sha256:d05f697c6da62036fcbba633a4cb6d253fdd6882c9205ad9a7cb9710878402a0?arch=amd64\u0026repository_url=registry.redhat.io/openshift-logging/cluster-logging-rhel8-operator\u0026tag=v5.3.13-9"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/cluster-logging-operator-bundle@sha256:b78456120cab1aac6044a6953e4dfd899f3c7d6b58a0e5cd8f166e4bffb5d941_amd64",
"product": {
"name": "openshift-logging/cluster-logging-operator-bundle@sha256:b78456120cab1aac6044a6953e4dfd899f3c7d6b58a0e5cd8f166e4bffb5d941_amd64",
"product_id": "openshift-logging/cluster-logging-operator-bundle@sha256:b78456120cab1aac6044a6953e4dfd899f3c7d6b58a0e5cd8f166e4bffb5d941_amd64",
"product_identification_helper": {
"purl": "pkg:oci/cluster-logging-operator-bundle@sha256:b78456120cab1aac6044a6953e4dfd899f3c7d6b58a0e5cd8f166e4bffb5d941?arch=amd64\u0026repository_url=registry.redhat.io/openshift-logging/cluster-logging-operator-bundle\u0026tag=v5.3.13-10"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/elasticsearch-rhel8-operator@sha256:a57abda6ba1cde99d47f6ea7a63e17a258f1f9ea73ca8bceadad7541477e7b81_amd64",
"product": {
"name": "openshift-logging/elasticsearch-rhel8-operator@sha256:a57abda6ba1cde99d47f6ea7a63e17a258f1f9ea73ca8bceadad7541477e7b81_amd64",
"product_id": "openshift-logging/elasticsearch-rhel8-operator@sha256:a57abda6ba1cde99d47f6ea7a63e17a258f1f9ea73ca8bceadad7541477e7b81_amd64",
"product_identification_helper": {
"purl": "pkg:oci/elasticsearch-rhel8-operator@sha256:a57abda6ba1cde99d47f6ea7a63e17a258f1f9ea73ca8bceadad7541477e7b81?arch=amd64\u0026repository_url=registry.redhat.io/openshift-logging/elasticsearch-rhel8-operator\u0026tag=v5.3.13-5"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/elasticsearch-operator-bundle@sha256:c5218abf99c5401fbcec34c93f99805e109d889b27c28719f0ce75a952015f17_amd64",
"product": {
"name": "openshift-logging/elasticsearch-operator-bundle@sha256:c5218abf99c5401fbcec34c93f99805e109d889b27c28719f0ce75a952015f17_amd64",
"product_id": "openshift-logging/elasticsearch-operator-bundle@sha256:c5218abf99c5401fbcec34c93f99805e109d889b27c28719f0ce75a952015f17_amd64",
"product_identification_helper": {
"purl": "pkg:oci/elasticsearch-operator-bundle@sha256:c5218abf99c5401fbcec34c93f99805e109d889b27c28719f0ce75a952015f17?arch=amd64\u0026repository_url=registry.redhat.io/openshift-logging/elasticsearch-operator-bundle\u0026tag=v5.3.13-24"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/elasticsearch-proxy-rhel8@sha256:2eb93d134ac01322408a31538fa14f3d29b77568ad20f71e2bc2303eca957c05_amd64",
"product": {
"name": "openshift-logging/elasticsearch-proxy-rhel8@sha256:2eb93d134ac01322408a31538fa14f3d29b77568ad20f71e2bc2303eca957c05_amd64",
"product_id": "openshift-logging/elasticsearch-proxy-rhel8@sha256:2eb93d134ac01322408a31538fa14f3d29b77568ad20f71e2bc2303eca957c05_amd64",
"product_identification_helper": {
"purl": "pkg:oci/elasticsearch-proxy-rhel8@sha256:2eb93d134ac01322408a31538fa14f3d29b77568ad20f71e2bc2303eca957c05?arch=amd64\u0026repository_url=registry.redhat.io/openshift-logging/elasticsearch-proxy-rhel8\u0026tag=v1.0.0-302"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/log-file-metric-exporter-rhel8@sha256:45a595d11960d01f153dfe7ff6f8336aa1ccf09c044d7e26763ae348c8dc1181_amd64",
"product": {
"name": "openshift-logging/log-file-metric-exporter-rhel8@sha256:45a595d11960d01f153dfe7ff6f8336aa1ccf09c044d7e26763ae348c8dc1181_amd64",
"product_id": "openshift-logging/log-file-metric-exporter-rhel8@sha256:45a595d11960d01f153dfe7ff6f8336aa1ccf09c044d7e26763ae348c8dc1181_amd64",
"product_identification_helper": {
"purl": "pkg:oci/log-file-metric-exporter-rhel8@sha256:45a595d11960d01f153dfe7ff6f8336aa1ccf09c044d7e26763ae348c8dc1181?arch=amd64\u0026repository_url=registry.redhat.io/openshift-logging/log-file-metric-exporter-rhel8\u0026tag=v1.0.0-164"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/logging-curator5-rhel8@sha256:e8297522f54b2649a08e10dd5a2ff7d01e6012e87cc82de876be7a2ace292011_amd64",
"product": {
"name": "openshift-logging/logging-curator5-rhel8@sha256:e8297522f54b2649a08e10dd5a2ff7d01e6012e87cc82de876be7a2ace292011_amd64",
"product_id": "openshift-logging/logging-curator5-rhel8@sha256:e8297522f54b2649a08e10dd5a2ff7d01e6012e87cc82de876be7a2ace292011_amd64",
"product_identification_helper": {
"purl": "pkg:oci/logging-curator5-rhel8@sha256:e8297522f54b2649a08e10dd5a2ff7d01e6012e87cc82de876be7a2ace292011?arch=amd64\u0026repository_url=registry.redhat.io/openshift-logging/logging-curator5-rhel8\u0026tag=v5.8.1-242"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/elasticsearch6-rhel8@sha256:96fa422c95c3aa328015bfa158f22885653191eb418718fbc416b9de1fed0a0c_amd64",
"product": {
"name": "openshift-logging/elasticsearch6-rhel8@sha256:96fa422c95c3aa328015bfa158f22885653191eb418718fbc416b9de1fed0a0c_amd64",
"product_id": "openshift-logging/elasticsearch6-rhel8@sha256:96fa422c95c3aa328015bfa158f22885653191eb418718fbc416b9de1fed0a0c_amd64",
"product_identification_helper": {
"purl": "pkg:oci/elasticsearch6-rhel8@sha256:96fa422c95c3aa328015bfa158f22885653191eb418718fbc416b9de1fed0a0c?arch=amd64\u0026repository_url=registry.redhat.io/openshift-logging/elasticsearch6-rhel8\u0026tag=v6.8.1-261"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/fluentd-rhel8@sha256:e7fbe0c13c6fd405701b13af609008e8c954c489ab567aeae27f035835c327e8_amd64",
"product": {
"name": "openshift-logging/fluentd-rhel8@sha256:e7fbe0c13c6fd405701b13af609008e8c954c489ab567aeae27f035835c327e8_amd64",
"product_id": "openshift-logging/fluentd-rhel8@sha256:e7fbe0c13c6fd405701b13af609008e8c954c489ab567aeae27f035835c327e8_amd64",
"product_identification_helper": {
"purl": "pkg:oci/fluentd-rhel8@sha256:e7fbe0c13c6fd405701b13af609008e8c954c489ab567aeae27f035835c327e8?arch=amd64\u0026repository_url=registry.redhat.io/openshift-logging/fluentd-rhel8\u0026tag=v1.7.4-217"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/kibana6-rhel8@sha256:8b3b9895d498036e7fb7451f52757ce8f3832d711254ed6649e97fe06d16195a_amd64",
"product": {
"name": "openshift-logging/kibana6-rhel8@sha256:8b3b9895d498036e7fb7451f52757ce8f3832d711254ed6649e97fe06d16195a_amd64",
"product_id": "openshift-logging/kibana6-rhel8@sha256:8b3b9895d498036e7fb7451f52757ce8f3832d711254ed6649e97fe06d16195a_amd64",
"product_identification_helper": {
"purl": "pkg:oci/kibana6-rhel8@sha256:8b3b9895d498036e7fb7451f52757ce8f3832d711254ed6649e97fe06d16195a?arch=amd64\u0026repository_url=registry.redhat.io/openshift-logging/kibana6-rhel8\u0026tag=v6.8.1-298"
}
}
}
],
"category": "architecture",
"name": "amd64"
},
{
"branches": [
{
"category": "product_version",
"name": "openshift-logging/cluster-logging-rhel8-operator@sha256:29aab5ce5c349a6370de9dec73e1c27dba1f8ee7a82e7da7cd3957839743c1d8_ppc64le",
"product": {
"name": "openshift-logging/cluster-logging-rhel8-operator@sha256:29aab5ce5c349a6370de9dec73e1c27dba1f8ee7a82e7da7cd3957839743c1d8_ppc64le",
"product_id": "openshift-logging/cluster-logging-rhel8-operator@sha256:29aab5ce5c349a6370de9dec73e1c27dba1f8ee7a82e7da7cd3957839743c1d8_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/cluster-logging-rhel8-operator@sha256:29aab5ce5c349a6370de9dec73e1c27dba1f8ee7a82e7da7cd3957839743c1d8?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-logging/cluster-logging-rhel8-operator\u0026tag=v5.3.13-9"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/elasticsearch-rhel8-operator@sha256:819e2985a882f2ddb34a137b0886d13ed764dac5b976fc4b450ba23cbc09597a_ppc64le",
"product": {
"name": "openshift-logging/elasticsearch-rhel8-operator@sha256:819e2985a882f2ddb34a137b0886d13ed764dac5b976fc4b450ba23cbc09597a_ppc64le",
"product_id": "openshift-logging/elasticsearch-rhel8-operator@sha256:819e2985a882f2ddb34a137b0886d13ed764dac5b976fc4b450ba23cbc09597a_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/elasticsearch-rhel8-operator@sha256:819e2985a882f2ddb34a137b0886d13ed764dac5b976fc4b450ba23cbc09597a?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-logging/elasticsearch-rhel8-operator\u0026tag=v5.3.13-5"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/elasticsearch-proxy-rhel8@sha256:6a0c8026b1fbc39d1a012f963eed016f3df99745235a256898cc3f92b5c913f3_ppc64le",
"product": {
"name": "openshift-logging/elasticsearch-proxy-rhel8@sha256:6a0c8026b1fbc39d1a012f963eed016f3df99745235a256898cc3f92b5c913f3_ppc64le",
"product_id": "openshift-logging/elasticsearch-proxy-rhel8@sha256:6a0c8026b1fbc39d1a012f963eed016f3df99745235a256898cc3f92b5c913f3_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/elasticsearch-proxy-rhel8@sha256:6a0c8026b1fbc39d1a012f963eed016f3df99745235a256898cc3f92b5c913f3?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-logging/elasticsearch-proxy-rhel8\u0026tag=v1.0.0-302"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/log-file-metric-exporter-rhel8@sha256:3c36dfe54c3597a2c0ba0fcf6fbd991e479847f9b7f8957fb60eb7039e1e662e_ppc64le",
"product": {
"name": "openshift-logging/log-file-metric-exporter-rhel8@sha256:3c36dfe54c3597a2c0ba0fcf6fbd991e479847f9b7f8957fb60eb7039e1e662e_ppc64le",
"product_id": "openshift-logging/log-file-metric-exporter-rhel8@sha256:3c36dfe54c3597a2c0ba0fcf6fbd991e479847f9b7f8957fb60eb7039e1e662e_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/log-file-metric-exporter-rhel8@sha256:3c36dfe54c3597a2c0ba0fcf6fbd991e479847f9b7f8957fb60eb7039e1e662e?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-logging/log-file-metric-exporter-rhel8\u0026tag=v1.0.0-164"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/logging-curator5-rhel8@sha256:8fde863a056af0d59dfa63ffa9f65af94ce5a6d2713ee84d35ea19dc5357f583_ppc64le",
"product": {
"name": "openshift-logging/logging-curator5-rhel8@sha256:8fde863a056af0d59dfa63ffa9f65af94ce5a6d2713ee84d35ea19dc5357f583_ppc64le",
"product_id": "openshift-logging/logging-curator5-rhel8@sha256:8fde863a056af0d59dfa63ffa9f65af94ce5a6d2713ee84d35ea19dc5357f583_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/logging-curator5-rhel8@sha256:8fde863a056af0d59dfa63ffa9f65af94ce5a6d2713ee84d35ea19dc5357f583?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-logging/logging-curator5-rhel8\u0026tag=v5.8.1-242"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/elasticsearch6-rhel8@sha256:1cd6bbc32620099b0e2b6a31ec0d0a82a3d4819f3d3c4ce5312b24277e89e4bf_ppc64le",
"product": {
"name": "openshift-logging/elasticsearch6-rhel8@sha256:1cd6bbc32620099b0e2b6a31ec0d0a82a3d4819f3d3c4ce5312b24277e89e4bf_ppc64le",
"product_id": "openshift-logging/elasticsearch6-rhel8@sha256:1cd6bbc32620099b0e2b6a31ec0d0a82a3d4819f3d3c4ce5312b24277e89e4bf_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/elasticsearch6-rhel8@sha256:1cd6bbc32620099b0e2b6a31ec0d0a82a3d4819f3d3c4ce5312b24277e89e4bf?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-logging/elasticsearch6-rhel8\u0026tag=v6.8.1-261"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/fluentd-rhel8@sha256:85dbeff544f48c08d0351eca88b10b7b07cea181382472a8d6b766d4facbbb5f_ppc64le",
"product": {
"name": "openshift-logging/fluentd-rhel8@sha256:85dbeff544f48c08d0351eca88b10b7b07cea181382472a8d6b766d4facbbb5f_ppc64le",
"product_id": "openshift-logging/fluentd-rhel8@sha256:85dbeff544f48c08d0351eca88b10b7b07cea181382472a8d6b766d4facbbb5f_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/fluentd-rhel8@sha256:85dbeff544f48c08d0351eca88b10b7b07cea181382472a8d6b766d4facbbb5f?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-logging/fluentd-rhel8\u0026tag=v1.7.4-217"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/kibana6-rhel8@sha256:f7ac478a6b3a33ab3be1f64a8ecf389194f9c6a1c07d936b318d7918a5f782d3_ppc64le",
"product": {
"name": "openshift-logging/kibana6-rhel8@sha256:f7ac478a6b3a33ab3be1f64a8ecf389194f9c6a1c07d936b318d7918a5f782d3_ppc64le",
"product_id": "openshift-logging/kibana6-rhel8@sha256:f7ac478a6b3a33ab3be1f64a8ecf389194f9c6a1c07d936b318d7918a5f782d3_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/kibana6-rhel8@sha256:f7ac478a6b3a33ab3be1f64a8ecf389194f9c6a1c07d936b318d7918a5f782d3?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-logging/kibana6-rhel8\u0026tag=v6.8.1-298"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/cluster-logging-operator-bundle@sha256:b78456120cab1aac6044a6953e4dfd899f3c7d6b58a0e5cd8f166e4bffb5d941_amd64 as a component of OpenShift Logging 5.3",
"product_id": "8Base-OSE-LOGGING-5.3:openshift-logging/cluster-logging-operator-bundle@sha256:b78456120cab1aac6044a6953e4dfd899f3c7d6b58a0e5cd8f166e4bffb5d941_amd64"
},
"product_reference": "openshift-logging/cluster-logging-operator-bundle@sha256:b78456120cab1aac6044a6953e4dfd899f3c7d6b58a0e5cd8f166e4bffb5d941_amd64",
"relates_to_product_reference": "8Base-OSE-LOGGING-5.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/cluster-logging-rhel8-operator@sha256:29aab5ce5c349a6370de9dec73e1c27dba1f8ee7a82e7da7cd3957839743c1d8_ppc64le as a component of OpenShift Logging 5.3",
"product_id": "8Base-OSE-LOGGING-5.3:openshift-logging/cluster-logging-rhel8-operator@sha256:29aab5ce5c349a6370de9dec73e1c27dba1f8ee7a82e7da7cd3957839743c1d8_ppc64le"
},
"product_reference": "openshift-logging/cluster-logging-rhel8-operator@sha256:29aab5ce5c349a6370de9dec73e1c27dba1f8ee7a82e7da7cd3957839743c1d8_ppc64le",
"relates_to_product_reference": "8Base-OSE-LOGGING-5.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/cluster-logging-rhel8-operator@sha256:d05f697c6da62036fcbba633a4cb6d253fdd6882c9205ad9a7cb9710878402a0_amd64 as a component of OpenShift Logging 5.3",
"product_id": "8Base-OSE-LOGGING-5.3:openshift-logging/cluster-logging-rhel8-operator@sha256:d05f697c6da62036fcbba633a4cb6d253fdd6882c9205ad9a7cb9710878402a0_amd64"
},
"product_reference": "openshift-logging/cluster-logging-rhel8-operator@sha256:d05f697c6da62036fcbba633a4cb6d253fdd6882c9205ad9a7cb9710878402a0_amd64",
"relates_to_product_reference": "8Base-OSE-LOGGING-5.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/cluster-logging-rhel8-operator@sha256:e785074e66edd55f68d4971cb42bcc9612c9b2713593555162d82b9218368023_s390x as a component of OpenShift Logging 5.3",
"product_id": "8Base-OSE-LOGGING-5.3:openshift-logging/cluster-logging-rhel8-operator@sha256:e785074e66edd55f68d4971cb42bcc9612c9b2713593555162d82b9218368023_s390x"
},
"product_reference": "openshift-logging/cluster-logging-rhel8-operator@sha256:e785074e66edd55f68d4971cb42bcc9612c9b2713593555162d82b9218368023_s390x",
"relates_to_product_reference": "8Base-OSE-LOGGING-5.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/elasticsearch-operator-bundle@sha256:c5218abf99c5401fbcec34c93f99805e109d889b27c28719f0ce75a952015f17_amd64 as a component of OpenShift Logging 5.3",
"product_id": "8Base-OSE-LOGGING-5.3:openshift-logging/elasticsearch-operator-bundle@sha256:c5218abf99c5401fbcec34c93f99805e109d889b27c28719f0ce75a952015f17_amd64"
},
"product_reference": "openshift-logging/elasticsearch-operator-bundle@sha256:c5218abf99c5401fbcec34c93f99805e109d889b27c28719f0ce75a952015f17_amd64",
"relates_to_product_reference": "8Base-OSE-LOGGING-5.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/elasticsearch-proxy-rhel8@sha256:2eb93d134ac01322408a31538fa14f3d29b77568ad20f71e2bc2303eca957c05_amd64 as a component of OpenShift Logging 5.3",
"product_id": "8Base-OSE-LOGGING-5.3:openshift-logging/elasticsearch-proxy-rhel8@sha256:2eb93d134ac01322408a31538fa14f3d29b77568ad20f71e2bc2303eca957c05_amd64"
},
"product_reference": "openshift-logging/elasticsearch-proxy-rhel8@sha256:2eb93d134ac01322408a31538fa14f3d29b77568ad20f71e2bc2303eca957c05_amd64",
"relates_to_product_reference": "8Base-OSE-LOGGING-5.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/elasticsearch-proxy-rhel8@sha256:6a0c8026b1fbc39d1a012f963eed016f3df99745235a256898cc3f92b5c913f3_ppc64le as a component of OpenShift Logging 5.3",
"product_id": "8Base-OSE-LOGGING-5.3:openshift-logging/elasticsearch-proxy-rhel8@sha256:6a0c8026b1fbc39d1a012f963eed016f3df99745235a256898cc3f92b5c913f3_ppc64le"
},
"product_reference": "openshift-logging/elasticsearch-proxy-rhel8@sha256:6a0c8026b1fbc39d1a012f963eed016f3df99745235a256898cc3f92b5c913f3_ppc64le",
"relates_to_product_reference": "8Base-OSE-LOGGING-5.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/elasticsearch-proxy-rhel8@sha256:cea0810e580ab422b8f54ae0f095f1ef4346cfef81873b5999a66cdc2687165a_s390x as a component of OpenShift Logging 5.3",
"product_id": "8Base-OSE-LOGGING-5.3:openshift-logging/elasticsearch-proxy-rhel8@sha256:cea0810e580ab422b8f54ae0f095f1ef4346cfef81873b5999a66cdc2687165a_s390x"
},
"product_reference": "openshift-logging/elasticsearch-proxy-rhel8@sha256:cea0810e580ab422b8f54ae0f095f1ef4346cfef81873b5999a66cdc2687165a_s390x",
"relates_to_product_reference": "8Base-OSE-LOGGING-5.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/elasticsearch-rhel8-operator@sha256:34de2b2acd8ee51055a51659b5a9e8331ebdd1512be34969e60e412269b4d494_s390x as a component of OpenShift Logging 5.3",
"product_id": "8Base-OSE-LOGGING-5.3:openshift-logging/elasticsearch-rhel8-operator@sha256:34de2b2acd8ee51055a51659b5a9e8331ebdd1512be34969e60e412269b4d494_s390x"
},
"product_reference": "openshift-logging/elasticsearch-rhel8-operator@sha256:34de2b2acd8ee51055a51659b5a9e8331ebdd1512be34969e60e412269b4d494_s390x",
"relates_to_product_reference": "8Base-OSE-LOGGING-5.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/elasticsearch-rhel8-operator@sha256:819e2985a882f2ddb34a137b0886d13ed764dac5b976fc4b450ba23cbc09597a_ppc64le as a component of OpenShift Logging 5.3",
"product_id": "8Base-OSE-LOGGING-5.3:openshift-logging/elasticsearch-rhel8-operator@sha256:819e2985a882f2ddb34a137b0886d13ed764dac5b976fc4b450ba23cbc09597a_ppc64le"
},
"product_reference": "openshift-logging/elasticsearch-rhel8-operator@sha256:819e2985a882f2ddb34a137b0886d13ed764dac5b976fc4b450ba23cbc09597a_ppc64le",
"relates_to_product_reference": "8Base-OSE-LOGGING-5.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/elasticsearch-rhel8-operator@sha256:a57abda6ba1cde99d47f6ea7a63e17a258f1f9ea73ca8bceadad7541477e7b81_amd64 as a component of OpenShift Logging 5.3",
"product_id": "8Base-OSE-LOGGING-5.3:openshift-logging/elasticsearch-rhel8-operator@sha256:a57abda6ba1cde99d47f6ea7a63e17a258f1f9ea73ca8bceadad7541477e7b81_amd64"
},
"product_reference": "openshift-logging/elasticsearch-rhel8-operator@sha256:a57abda6ba1cde99d47f6ea7a63e17a258f1f9ea73ca8bceadad7541477e7b81_amd64",
"relates_to_product_reference": "8Base-OSE-LOGGING-5.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/elasticsearch6-rhel8@sha256:1cd6bbc32620099b0e2b6a31ec0d0a82a3d4819f3d3c4ce5312b24277e89e4bf_ppc64le as a component of OpenShift Logging 5.3",
"product_id": "8Base-OSE-LOGGING-5.3:openshift-logging/elasticsearch6-rhel8@sha256:1cd6bbc32620099b0e2b6a31ec0d0a82a3d4819f3d3c4ce5312b24277e89e4bf_ppc64le"
},
"product_reference": "openshift-logging/elasticsearch6-rhel8@sha256:1cd6bbc32620099b0e2b6a31ec0d0a82a3d4819f3d3c4ce5312b24277e89e4bf_ppc64le",
"relates_to_product_reference": "8Base-OSE-LOGGING-5.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/elasticsearch6-rhel8@sha256:211271d2e88eaf7f0930dbf2badf78dbe051ae14b68e67073b1b1b992fa9ea6e_s390x as a component of OpenShift Logging 5.3",
"product_id": "8Base-OSE-LOGGING-5.3:openshift-logging/elasticsearch6-rhel8@sha256:211271d2e88eaf7f0930dbf2badf78dbe051ae14b68e67073b1b1b992fa9ea6e_s390x"
},
"product_reference": "openshift-logging/elasticsearch6-rhel8@sha256:211271d2e88eaf7f0930dbf2badf78dbe051ae14b68e67073b1b1b992fa9ea6e_s390x",
"relates_to_product_reference": "8Base-OSE-LOGGING-5.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/elasticsearch6-rhel8@sha256:96fa422c95c3aa328015bfa158f22885653191eb418718fbc416b9de1fed0a0c_amd64 as a component of OpenShift Logging 5.3",
"product_id": "8Base-OSE-LOGGING-5.3:openshift-logging/elasticsearch6-rhel8@sha256:96fa422c95c3aa328015bfa158f22885653191eb418718fbc416b9de1fed0a0c_amd64"
},
"product_reference": "openshift-logging/elasticsearch6-rhel8@sha256:96fa422c95c3aa328015bfa158f22885653191eb418718fbc416b9de1fed0a0c_amd64",
"relates_to_product_reference": "8Base-OSE-LOGGING-5.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/fluentd-rhel8@sha256:85dbeff544f48c08d0351eca88b10b7b07cea181382472a8d6b766d4facbbb5f_ppc64le as a component of OpenShift Logging 5.3",
"product_id": "8Base-OSE-LOGGING-5.3:openshift-logging/fluentd-rhel8@sha256:85dbeff544f48c08d0351eca88b10b7b07cea181382472a8d6b766d4facbbb5f_ppc64le"
},
"product_reference": "openshift-logging/fluentd-rhel8@sha256:85dbeff544f48c08d0351eca88b10b7b07cea181382472a8d6b766d4facbbb5f_ppc64le",
"relates_to_product_reference": "8Base-OSE-LOGGING-5.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/fluentd-rhel8@sha256:b712b4568533eccc3e67894c69a27f024a710c0a0759cb04a799077bc21ad7b0_s390x as a component of OpenShift Logging 5.3",
"product_id": "8Base-OSE-LOGGING-5.3:openshift-logging/fluentd-rhel8@sha256:b712b4568533eccc3e67894c69a27f024a710c0a0759cb04a799077bc21ad7b0_s390x"
},
"product_reference": "openshift-logging/fluentd-rhel8@sha256:b712b4568533eccc3e67894c69a27f024a710c0a0759cb04a799077bc21ad7b0_s390x",
"relates_to_product_reference": "8Base-OSE-LOGGING-5.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/fluentd-rhel8@sha256:e7fbe0c13c6fd405701b13af609008e8c954c489ab567aeae27f035835c327e8_amd64 as a component of OpenShift Logging 5.3",
"product_id": "8Base-OSE-LOGGING-5.3:openshift-logging/fluentd-rhel8@sha256:e7fbe0c13c6fd405701b13af609008e8c954c489ab567aeae27f035835c327e8_amd64"
},
"product_reference": "openshift-logging/fluentd-rhel8@sha256:e7fbe0c13c6fd405701b13af609008e8c954c489ab567aeae27f035835c327e8_amd64",
"relates_to_product_reference": "8Base-OSE-LOGGING-5.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/kibana6-rhel8@sha256:8b3b9895d498036e7fb7451f52757ce8f3832d711254ed6649e97fe06d16195a_amd64 as a component of OpenShift Logging 5.3",
"product_id": "8Base-OSE-LOGGING-5.3:openshift-logging/kibana6-rhel8@sha256:8b3b9895d498036e7fb7451f52757ce8f3832d711254ed6649e97fe06d16195a_amd64"
},
"product_reference": "openshift-logging/kibana6-rhel8@sha256:8b3b9895d498036e7fb7451f52757ce8f3832d711254ed6649e97fe06d16195a_amd64",
"relates_to_product_reference": "8Base-OSE-LOGGING-5.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/kibana6-rhel8@sha256:a3c5a69dba9fafdbbe21b7eaf0792a8d0d7dbc108977dde72bce3af4ba709a01_s390x as a component of OpenShift Logging 5.3",
"product_id": "8Base-OSE-LOGGING-5.3:openshift-logging/kibana6-rhel8@sha256:a3c5a69dba9fafdbbe21b7eaf0792a8d0d7dbc108977dde72bce3af4ba709a01_s390x"
},
"product_reference": "openshift-logging/kibana6-rhel8@sha256:a3c5a69dba9fafdbbe21b7eaf0792a8d0d7dbc108977dde72bce3af4ba709a01_s390x",
"relates_to_product_reference": "8Base-OSE-LOGGING-5.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/kibana6-rhel8@sha256:f7ac478a6b3a33ab3be1f64a8ecf389194f9c6a1c07d936b318d7918a5f782d3_ppc64le as a component of OpenShift Logging 5.3",
"product_id": "8Base-OSE-LOGGING-5.3:openshift-logging/kibana6-rhel8@sha256:f7ac478a6b3a33ab3be1f64a8ecf389194f9c6a1c07d936b318d7918a5f782d3_ppc64le"
},
"product_reference": "openshift-logging/kibana6-rhel8@sha256:f7ac478a6b3a33ab3be1f64a8ecf389194f9c6a1c07d936b318d7918a5f782d3_ppc64le",
"relates_to_product_reference": "8Base-OSE-LOGGING-5.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/log-file-metric-exporter-rhel8@sha256:3c36dfe54c3597a2c0ba0fcf6fbd991e479847f9b7f8957fb60eb7039e1e662e_ppc64le as a component of OpenShift Logging 5.3",
"product_id": "8Base-OSE-LOGGING-5.3:openshift-logging/log-file-metric-exporter-rhel8@sha256:3c36dfe54c3597a2c0ba0fcf6fbd991e479847f9b7f8957fb60eb7039e1e662e_ppc64le"
},
"product_reference": "openshift-logging/log-file-metric-exporter-rhel8@sha256:3c36dfe54c3597a2c0ba0fcf6fbd991e479847f9b7f8957fb60eb7039e1e662e_ppc64le",
"relates_to_product_reference": "8Base-OSE-LOGGING-5.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/log-file-metric-exporter-rhel8@sha256:45a595d11960d01f153dfe7ff6f8336aa1ccf09c044d7e26763ae348c8dc1181_amd64 as a component of OpenShift Logging 5.3",
"product_id": "8Base-OSE-LOGGING-5.3:openshift-logging/log-file-metric-exporter-rhel8@sha256:45a595d11960d01f153dfe7ff6f8336aa1ccf09c044d7e26763ae348c8dc1181_amd64"
},
"product_reference": "openshift-logging/log-file-metric-exporter-rhel8@sha256:45a595d11960d01f153dfe7ff6f8336aa1ccf09c044d7e26763ae348c8dc1181_amd64",
"relates_to_product_reference": "8Base-OSE-LOGGING-5.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/log-file-metric-exporter-rhel8@sha256:db3841437512ac4716465336e1a520a6a702433b169e955ba04cdc41d6fa4eea_s390x as a component of OpenShift Logging 5.3",
"product_id": "8Base-OSE-LOGGING-5.3:openshift-logging/log-file-metric-exporter-rhel8@sha256:db3841437512ac4716465336e1a520a6a702433b169e955ba04cdc41d6fa4eea_s390x"
},
"product_reference": "openshift-logging/log-file-metric-exporter-rhel8@sha256:db3841437512ac4716465336e1a520a6a702433b169e955ba04cdc41d6fa4eea_s390x",
"relates_to_product_reference": "8Base-OSE-LOGGING-5.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/logging-curator5-rhel8@sha256:8fde863a056af0d59dfa63ffa9f65af94ce5a6d2713ee84d35ea19dc5357f583_ppc64le as a component of OpenShift Logging 5.3",
"product_id": "8Base-OSE-LOGGING-5.3:openshift-logging/logging-curator5-rhel8@sha256:8fde863a056af0d59dfa63ffa9f65af94ce5a6d2713ee84d35ea19dc5357f583_ppc64le"
},
"product_reference": "openshift-logging/logging-curator5-rhel8@sha256:8fde863a056af0d59dfa63ffa9f65af94ce5a6d2713ee84d35ea19dc5357f583_ppc64le",
"relates_to_product_reference": "8Base-OSE-LOGGING-5.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/logging-curator5-rhel8@sha256:e8297522f54b2649a08e10dd5a2ff7d01e6012e87cc82de876be7a2ace292011_amd64 as a component of OpenShift Logging 5.3",
"product_id": "8Base-OSE-LOGGING-5.3:openshift-logging/logging-curator5-rhel8@sha256:e8297522f54b2649a08e10dd5a2ff7d01e6012e87cc82de876be7a2ace292011_amd64"
},
"product_reference": "openshift-logging/logging-curator5-rhel8@sha256:e8297522f54b2649a08e10dd5a2ff7d01e6012e87cc82de876be7a2ace292011_amd64",
"relates_to_product_reference": "8Base-OSE-LOGGING-5.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/logging-curator5-rhel8@sha256:f7fa0d3ea11001123fa1f59b2ae1edb230fb96157b19ec230d876793b4ed1554_s390x as a component of OpenShift Logging 5.3",
"product_id": "8Base-OSE-LOGGING-5.3:openshift-logging/logging-curator5-rhel8@sha256:f7fa0d3ea11001123fa1f59b2ae1edb230fb96157b19ec230d876793b4ed1554_s390x"
},
"product_reference": "openshift-logging/logging-curator5-rhel8@sha256:f7fa0d3ea11001123fa1f59b2ae1edb230fb96157b19ec230d876793b4ed1554_s390x",
"relates_to_product_reference": "8Base-OSE-LOGGING-5.3"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2022-32149",
"cwe": {
"id": "CWE-407",
"name": "Inefficient Algorithmic Complexity"
},
"discovery_date": "2022-10-12T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-OSE-LOGGING-5.3:openshift-logging/cluster-logging-operator-bundle@sha256:b78456120cab1aac6044a6953e4dfd899f3c7d6b58a0e5cd8f166e4bffb5d941_amd64",
"8Base-OSE-LOGGING-5.3:openshift-logging/cluster-logging-rhel8-operator@sha256:29aab5ce5c349a6370de9dec73e1c27dba1f8ee7a82e7da7cd3957839743c1d8_ppc64le",
"8Base-OSE-LOGGING-5.3:openshift-logging/cluster-logging-rhel8-operator@sha256:d05f697c6da62036fcbba633a4cb6d253fdd6882c9205ad9a7cb9710878402a0_amd64",
"8Base-OSE-LOGGING-5.3:openshift-logging/cluster-logging-rhel8-operator@sha256:e785074e66edd55f68d4971cb42bcc9612c9b2713593555162d82b9218368023_s390x",
"8Base-OSE-LOGGING-5.3:openshift-logging/elasticsearch-operator-bundle@sha256:c5218abf99c5401fbcec34c93f99805e109d889b27c28719f0ce75a952015f17_amd64",
"8Base-OSE-LOGGING-5.3:openshift-logging/elasticsearch-rhel8-operator@sha256:34de2b2acd8ee51055a51659b5a9e8331ebdd1512be34969e60e412269b4d494_s390x",
"8Base-OSE-LOGGING-5.3:openshift-logging/elasticsearch-rhel8-operator@sha256:819e2985a882f2ddb34a137b0886d13ed764dac5b976fc4b450ba23cbc09597a_ppc64le",
"8Base-OSE-LOGGING-5.3:openshift-logging/elasticsearch-rhel8-operator@sha256:a57abda6ba1cde99d47f6ea7a63e17a258f1f9ea73ca8bceadad7541477e7b81_amd64",
"8Base-OSE-LOGGING-5.3:openshift-logging/elasticsearch6-rhel8@sha256:1cd6bbc32620099b0e2b6a31ec0d0a82a3d4819f3d3c4ce5312b24277e89e4bf_ppc64le",
"8Base-OSE-LOGGING-5.3:openshift-logging/elasticsearch6-rhel8@sha256:211271d2e88eaf7f0930dbf2badf78dbe051ae14b68e67073b1b1b992fa9ea6e_s390x",
"8Base-OSE-LOGGING-5.3:openshift-logging/elasticsearch6-rhel8@sha256:96fa422c95c3aa328015bfa158f22885653191eb418718fbc416b9de1fed0a0c_amd64",
"8Base-OSE-LOGGING-5.3:openshift-logging/fluentd-rhel8@sha256:85dbeff544f48c08d0351eca88b10b7b07cea181382472a8d6b766d4facbbb5f_ppc64le",
"8Base-OSE-LOGGING-5.3:openshift-logging/fluentd-rhel8@sha256:b712b4568533eccc3e67894c69a27f024a710c0a0759cb04a799077bc21ad7b0_s390x",
"8Base-OSE-LOGGING-5.3:openshift-logging/fluentd-rhel8@sha256:e7fbe0c13c6fd405701b13af609008e8c954c489ab567aeae27f035835c327e8_amd64",
"8Base-OSE-LOGGING-5.3:openshift-logging/kibana6-rhel8@sha256:8b3b9895d498036e7fb7451f52757ce8f3832d711254ed6649e97fe06d16195a_amd64",
"8Base-OSE-LOGGING-5.3:openshift-logging/kibana6-rhel8@sha256:a3c5a69dba9fafdbbe21b7eaf0792a8d0d7dbc108977dde72bce3af4ba709a01_s390x",
"8Base-OSE-LOGGING-5.3:openshift-logging/kibana6-rhel8@sha256:f7ac478a6b3a33ab3be1f64a8ecf389194f9c6a1c07d936b318d7918a5f782d3_ppc64le",
"8Base-OSE-LOGGING-5.3:openshift-logging/log-file-metric-exporter-rhel8@sha256:3c36dfe54c3597a2c0ba0fcf6fbd991e479847f9b7f8957fb60eb7039e1e662e_ppc64le",
"8Base-OSE-LOGGING-5.3:openshift-logging/log-file-metric-exporter-rhel8@sha256:45a595d11960d01f153dfe7ff6f8336aa1ccf09c044d7e26763ae348c8dc1181_amd64",
"8Base-OSE-LOGGING-5.3:openshift-logging/log-file-metric-exporter-rhel8@sha256:db3841437512ac4716465336e1a520a6a702433b169e955ba04cdc41d6fa4eea_s390x",
"8Base-OSE-LOGGING-5.3:openshift-logging/logging-curator5-rhel8@sha256:8fde863a056af0d59dfa63ffa9f65af94ce5a6d2713ee84d35ea19dc5357f583_ppc64le",
"8Base-OSE-LOGGING-5.3:openshift-logging/logging-curator5-rhel8@sha256:e8297522f54b2649a08e10dd5a2ff7d01e6012e87cc82de876be7a2ace292011_amd64",
"8Base-OSE-LOGGING-5.3:openshift-logging/logging-curator5-rhel8@sha256:f7fa0d3ea11001123fa1f59b2ae1edb230fb96157b19ec230d876793b4ed1554_s390x"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2134010"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in the golang.org/x/text/language package. An attacker can craft an Accept-Language header which ParseAcceptLanguage will take significant time to parse. This issue leads to a denial of service, and can impact availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: golang.org/x/text/language: ParseAcceptLanguage takes a long time to parse complex tags",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "After careful analysis of the vulnerability Redhat is choosing to keep the vulnerability severity as moderate,the vulnerability exists in the ParseAcceptLanguage function of the golang text/language package,when an attacker could craft an unusually large accept header and due to the parser taking quadratic time complexity to finish, firstly the attacker would have to find a way smuggle an input to the parser and even then this would simply not result in a crash of any kind but more of resource hang which while can be unpleasant,does not equate to any real world damage.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-OSE-LOGGING-5.3:openshift-logging/elasticsearch-proxy-rhel8@sha256:2eb93d134ac01322408a31538fa14f3d29b77568ad20f71e2bc2303eca957c05_amd64",
"8Base-OSE-LOGGING-5.3:openshift-logging/elasticsearch-proxy-rhel8@sha256:6a0c8026b1fbc39d1a012f963eed016f3df99745235a256898cc3f92b5c913f3_ppc64le",
"8Base-OSE-LOGGING-5.3:openshift-logging/elasticsearch-proxy-rhel8@sha256:cea0810e580ab422b8f54ae0f095f1ef4346cfef81873b5999a66cdc2687165a_s390x"
],
"known_not_affected": [
"8Base-OSE-LOGGING-5.3:openshift-logging/cluster-logging-operator-bundle@sha256:b78456120cab1aac6044a6953e4dfd899f3c7d6b58a0e5cd8f166e4bffb5d941_amd64",
"8Base-OSE-LOGGING-5.3:openshift-logging/cluster-logging-rhel8-operator@sha256:29aab5ce5c349a6370de9dec73e1c27dba1f8ee7a82e7da7cd3957839743c1d8_ppc64le",
"8Base-OSE-LOGGING-5.3:openshift-logging/cluster-logging-rhel8-operator@sha256:d05f697c6da62036fcbba633a4cb6d253fdd6882c9205ad9a7cb9710878402a0_amd64",
"8Base-OSE-LOGGING-5.3:openshift-logging/cluster-logging-rhel8-operator@sha256:e785074e66edd55f68d4971cb42bcc9612c9b2713593555162d82b9218368023_s390x",
"8Base-OSE-LOGGING-5.3:openshift-logging/elasticsearch-operator-bundle@sha256:c5218abf99c5401fbcec34c93f99805e109d889b27c28719f0ce75a952015f17_amd64",
"8Base-OSE-LOGGING-5.3:openshift-logging/elasticsearch-rhel8-operator@sha256:34de2b2acd8ee51055a51659b5a9e8331ebdd1512be34969e60e412269b4d494_s390x",
"8Base-OSE-LOGGING-5.3:openshift-logging/elasticsearch-rhel8-operator@sha256:819e2985a882f2ddb34a137b0886d13ed764dac5b976fc4b450ba23cbc09597a_ppc64le",
"8Base-OSE-LOGGING-5.3:openshift-logging/elasticsearch-rhel8-operator@sha256:a57abda6ba1cde99d47f6ea7a63e17a258f1f9ea73ca8bceadad7541477e7b81_amd64",
"8Base-OSE-LOGGING-5.3:openshift-logging/elasticsearch6-rhel8@sha256:1cd6bbc32620099b0e2b6a31ec0d0a82a3d4819f3d3c4ce5312b24277e89e4bf_ppc64le",
"8Base-OSE-LOGGING-5.3:openshift-logging/elasticsearch6-rhel8@sha256:211271d2e88eaf7f0930dbf2badf78dbe051ae14b68e67073b1b1b992fa9ea6e_s390x",
"8Base-OSE-LOGGING-5.3:openshift-logging/elasticsearch6-rhel8@sha256:96fa422c95c3aa328015bfa158f22885653191eb418718fbc416b9de1fed0a0c_amd64",
"8Base-OSE-LOGGING-5.3:openshift-logging/fluentd-rhel8@sha256:85dbeff544f48c08d0351eca88b10b7b07cea181382472a8d6b766d4facbbb5f_ppc64le",
"8Base-OSE-LOGGING-5.3:openshift-logging/fluentd-rhel8@sha256:b712b4568533eccc3e67894c69a27f024a710c0a0759cb04a799077bc21ad7b0_s390x",
"8Base-OSE-LOGGING-5.3:openshift-logging/fluentd-rhel8@sha256:e7fbe0c13c6fd405701b13af609008e8c954c489ab567aeae27f035835c327e8_amd64",
"8Base-OSE-LOGGING-5.3:openshift-logging/kibana6-rhel8@sha256:8b3b9895d498036e7fb7451f52757ce8f3832d711254ed6649e97fe06d16195a_amd64",
"8Base-OSE-LOGGING-5.3:openshift-logging/kibana6-rhel8@sha256:a3c5a69dba9fafdbbe21b7eaf0792a8d0d7dbc108977dde72bce3af4ba709a01_s390x",
"8Base-OSE-LOGGING-5.3:openshift-logging/kibana6-rhel8@sha256:f7ac478a6b3a33ab3be1f64a8ecf389194f9c6a1c07d936b318d7918a5f782d3_ppc64le",
"8Base-OSE-LOGGING-5.3:openshift-logging/log-file-metric-exporter-rhel8@sha256:3c36dfe54c3597a2c0ba0fcf6fbd991e479847f9b7f8957fb60eb7039e1e662e_ppc64le",
"8Base-OSE-LOGGING-5.3:openshift-logging/log-file-metric-exporter-rhel8@sha256:45a595d11960d01f153dfe7ff6f8336aa1ccf09c044d7e26763ae348c8dc1181_amd64",
"8Base-OSE-LOGGING-5.3:openshift-logging/log-file-metric-exporter-rhel8@sha256:db3841437512ac4716465336e1a520a6a702433b169e955ba04cdc41d6fa4eea_s390x",
"8Base-OSE-LOGGING-5.3:openshift-logging/logging-curator5-rhel8@sha256:8fde863a056af0d59dfa63ffa9f65af94ce5a6d2713ee84d35ea19dc5357f583_ppc64le",
"8Base-OSE-LOGGING-5.3:openshift-logging/logging-curator5-rhel8@sha256:e8297522f54b2649a08e10dd5a2ff7d01e6012e87cc82de876be7a2ace292011_amd64",
"8Base-OSE-LOGGING-5.3:openshift-logging/logging-curator5-rhel8@sha256:f7fa0d3ea11001123fa1f59b2ae1edb230fb96157b19ec230d876793b4ed1554_s390x"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-32149"
},
{
"category": "external",
"summary": "RHBZ#2134010",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2134010"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-32149",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32149"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-32149",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-32149"
},
{
"category": "external",
"summary": "https://go.dev/issue/56152",
"url": "https://go.dev/issue/56152"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-dev/c/qfPIly0X7aU",
"url": "https://groups.google.com/g/golang-dev/c/qfPIly0X7aU"
}
],
"release_date": "2022-10-11T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-11-09T16:43:13+00:00",
"details": "For OpenShift Container Platform 4.9 see the following documentation, which will be updated shortly, for detailed release notes:\n\nhttps://docs.openshift.com/container-platform/4.9/logging/cluster-logging-release-notes.html\n\nFor Red Hat OpenShift Logging 5.3, see the following instructions to apply this update:\n\nhttps://docs.openshift.com/container-platform/4.9/logging/cluster-logging-upgrading.html",
"product_ids": [
"8Base-OSE-LOGGING-5.3:openshift-logging/elasticsearch-proxy-rhel8@sha256:2eb93d134ac01322408a31538fa14f3d29b77568ad20f71e2bc2303eca957c05_amd64",
"8Base-OSE-LOGGING-5.3:openshift-logging/elasticsearch-proxy-rhel8@sha256:6a0c8026b1fbc39d1a012f963eed016f3df99745235a256898cc3f92b5c913f3_ppc64le",
"8Base-OSE-LOGGING-5.3:openshift-logging/elasticsearch-proxy-rhel8@sha256:cea0810e580ab422b8f54ae0f095f1ef4346cfef81873b5999a66cdc2687165a_s390x"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:6882"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"8Base-OSE-LOGGING-5.3:openshift-logging/cluster-logging-operator-bundle@sha256:b78456120cab1aac6044a6953e4dfd899f3c7d6b58a0e5cd8f166e4bffb5d941_amd64",
"8Base-OSE-LOGGING-5.3:openshift-logging/cluster-logging-rhel8-operator@sha256:29aab5ce5c349a6370de9dec73e1c27dba1f8ee7a82e7da7cd3957839743c1d8_ppc64le",
"8Base-OSE-LOGGING-5.3:openshift-logging/cluster-logging-rhel8-operator@sha256:d05f697c6da62036fcbba633a4cb6d253fdd6882c9205ad9a7cb9710878402a0_amd64",
"8Base-OSE-LOGGING-5.3:openshift-logging/cluster-logging-rhel8-operator@sha256:e785074e66edd55f68d4971cb42bcc9612c9b2713593555162d82b9218368023_s390x",
"8Base-OSE-LOGGING-5.3:openshift-logging/elasticsearch-operator-bundle@sha256:c5218abf99c5401fbcec34c93f99805e109d889b27c28719f0ce75a952015f17_amd64",
"8Base-OSE-LOGGING-5.3:openshift-logging/elasticsearch-proxy-rhel8@sha256:2eb93d134ac01322408a31538fa14f3d29b77568ad20f71e2bc2303eca957c05_amd64",
"8Base-OSE-LOGGING-5.3:openshift-logging/elasticsearch-proxy-rhel8@sha256:6a0c8026b1fbc39d1a012f963eed016f3df99745235a256898cc3f92b5c913f3_ppc64le",
"8Base-OSE-LOGGING-5.3:openshift-logging/elasticsearch-proxy-rhel8@sha256:cea0810e580ab422b8f54ae0f095f1ef4346cfef81873b5999a66cdc2687165a_s390x",
"8Base-OSE-LOGGING-5.3:openshift-logging/elasticsearch-rhel8-operator@sha256:34de2b2acd8ee51055a51659b5a9e8331ebdd1512be34969e60e412269b4d494_s390x",
"8Base-OSE-LOGGING-5.3:openshift-logging/elasticsearch-rhel8-operator@sha256:819e2985a882f2ddb34a137b0886d13ed764dac5b976fc4b450ba23cbc09597a_ppc64le",
"8Base-OSE-LOGGING-5.3:openshift-logging/elasticsearch-rhel8-operator@sha256:a57abda6ba1cde99d47f6ea7a63e17a258f1f9ea73ca8bceadad7541477e7b81_amd64",
"8Base-OSE-LOGGING-5.3:openshift-logging/elasticsearch6-rhel8@sha256:1cd6bbc32620099b0e2b6a31ec0d0a82a3d4819f3d3c4ce5312b24277e89e4bf_ppc64le",
"8Base-OSE-LOGGING-5.3:openshift-logging/elasticsearch6-rhel8@sha256:211271d2e88eaf7f0930dbf2badf78dbe051ae14b68e67073b1b1b992fa9ea6e_s390x",
"8Base-OSE-LOGGING-5.3:openshift-logging/elasticsearch6-rhel8@sha256:96fa422c95c3aa328015bfa158f22885653191eb418718fbc416b9de1fed0a0c_amd64",
"8Base-OSE-LOGGING-5.3:openshift-logging/fluentd-rhel8@sha256:85dbeff544f48c08d0351eca88b10b7b07cea181382472a8d6b766d4facbbb5f_ppc64le",
"8Base-OSE-LOGGING-5.3:openshift-logging/fluentd-rhel8@sha256:b712b4568533eccc3e67894c69a27f024a710c0a0759cb04a799077bc21ad7b0_s390x",
"8Base-OSE-LOGGING-5.3:openshift-logging/fluentd-rhel8@sha256:e7fbe0c13c6fd405701b13af609008e8c954c489ab567aeae27f035835c327e8_amd64",
"8Base-OSE-LOGGING-5.3:openshift-logging/kibana6-rhel8@sha256:8b3b9895d498036e7fb7451f52757ce8f3832d711254ed6649e97fe06d16195a_amd64",
"8Base-OSE-LOGGING-5.3:openshift-logging/kibana6-rhel8@sha256:a3c5a69dba9fafdbbe21b7eaf0792a8d0d7dbc108977dde72bce3af4ba709a01_s390x",
"8Base-OSE-LOGGING-5.3:openshift-logging/kibana6-rhel8@sha256:f7ac478a6b3a33ab3be1f64a8ecf389194f9c6a1c07d936b318d7918a5f782d3_ppc64le",
"8Base-OSE-LOGGING-5.3:openshift-logging/log-file-metric-exporter-rhel8@sha256:3c36dfe54c3597a2c0ba0fcf6fbd991e479847f9b7f8957fb60eb7039e1e662e_ppc64le",
"8Base-OSE-LOGGING-5.3:openshift-logging/log-file-metric-exporter-rhel8@sha256:45a595d11960d01f153dfe7ff6f8336aa1ccf09c044d7e26763ae348c8dc1181_amd64",
"8Base-OSE-LOGGING-5.3:openshift-logging/log-file-metric-exporter-rhel8@sha256:db3841437512ac4716465336e1a520a6a702433b169e955ba04cdc41d6fa4eea_s390x",
"8Base-OSE-LOGGING-5.3:openshift-logging/logging-curator5-rhel8@sha256:8fde863a056af0d59dfa63ffa9f65af94ce5a6d2713ee84d35ea19dc5357f583_ppc64le",
"8Base-OSE-LOGGING-5.3:openshift-logging/logging-curator5-rhel8@sha256:e8297522f54b2649a08e10dd5a2ff7d01e6012e87cc82de876be7a2ace292011_amd64",
"8Base-OSE-LOGGING-5.3:openshift-logging/logging-curator5-rhel8@sha256:f7fa0d3ea11001123fa1f59b2ae1edb230fb96157b19ec230d876793b4ed1554_s390x"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "golang: golang.org/x/text/language: ParseAcceptLanguage takes a long time to parse complex tags"
}
]
}
rhsa-2022_7434
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Logging Subsystem 5.5.4 - Red Hat OpenShift\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Logging Subsystem 5.5.4 - Red Hat OpenShift\n\nSecurity Fix(es):\n\n* golang: golang.org/x/text/language: ParseAcceptLanguage takes a long time to parse complex tags (CVE-2022-32149)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2022:7434",
"url": "https://access.redhat.com/errata/RHSA-2022:7434"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#moderate",
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "2134010",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2134010"
},
{
"category": "external",
"summary": "LOG-2674",
"url": "https://issues.redhat.com/browse/LOG-2674"
},
{
"category": "external",
"summary": "LOG-3042",
"url": "https://issues.redhat.com/browse/LOG-3042"
},
{
"category": "external",
"summary": "LOG-3049",
"url": "https://issues.redhat.com/browse/LOG-3049"
},
{
"category": "external",
"summary": "LOG-3127",
"url": "https://issues.redhat.com/browse/LOG-3127"
},
{
"category": "external",
"summary": "LOG-3138",
"url": "https://issues.redhat.com/browse/LOG-3138"
},
{
"category": "external",
"summary": "LOG-3175",
"url": "https://issues.redhat.com/browse/LOG-3175"
},
{
"category": "external",
"summary": "LOG-3213",
"url": "https://issues.redhat.com/browse/LOG-3213"
},
{
"category": "external",
"summary": "LOG-3234",
"url": "https://issues.redhat.com/browse/LOG-3234"
},
{
"category": "external",
"summary": "LOG-3251",
"url": "https://issues.redhat.com/browse/LOG-3251"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2022/rhsa-2022_7434.json"
}
],
"title": "Red Hat Security Advisory: Logging Subsystem 5.5.4 - Red Hat OpenShift security update",
"tracking": {
"current_release_date": "2025-01-06T19:21:49+00:00",
"generator": {
"date": "2025-01-06T19:21:49+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.5"
}
},
"id": "RHSA-2022:7434",
"initial_release_date": "2022-11-10T03:50:23+00:00",
"revision_history": [
{
"date": "2022-11-10T03:50:23+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2022-11-10T03:50:23+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-01-06T19:21:49+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "RHOL 5.5 for RHEL 8",
"product": {
"name": "RHOL 5.5 for RHEL 8",
"product_id": "8Base-RHOL-5.5",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:logging:5.5::el8"
}
}
}
],
"category": "product_family",
"name": "logging for Red Hat OpenShift"
},
{
"branches": [
{
"category": "product_version",
"name": "openshift-logging/cluster-logging-rhel8-operator@sha256:07ab076aa9b573d330ace59bf4de080ea64dbc7b3424357fc39c0c70ede27873_arm64",
"product": {
"name": "openshift-logging/cluster-logging-rhel8-operator@sha256:07ab076aa9b573d330ace59bf4de080ea64dbc7b3424357fc39c0c70ede27873_arm64",
"product_id": "openshift-logging/cluster-logging-rhel8-operator@sha256:07ab076aa9b573d330ace59bf4de080ea64dbc7b3424357fc39c0c70ede27873_arm64",
"product_identification_helper": {
"purl": "pkg:oci/cluster-logging-rhel8-operator@sha256:07ab076aa9b573d330ace59bf4de080ea64dbc7b3424357fc39c0c70ede27873?arch=arm64\u0026repository_url=registry.redhat.io/openshift-logging/cluster-logging-rhel8-operator\u0026tag=v5.5.4-7"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/elasticsearch-rhel8-operator@sha256:dce08ac53092fc51958b78df9b4b870926a079fe4cdc4fb2d46c8ba545a22e6a_arm64",
"product": {
"name": "openshift-logging/elasticsearch-rhel8-operator@sha256:dce08ac53092fc51958b78df9b4b870926a079fe4cdc4fb2d46c8ba545a22e6a_arm64",
"product_id": "openshift-logging/elasticsearch-rhel8-operator@sha256:dce08ac53092fc51958b78df9b4b870926a079fe4cdc4fb2d46c8ba545a22e6a_arm64",
"product_identification_helper": {
"purl": "pkg:oci/elasticsearch-rhel8-operator@sha256:dce08ac53092fc51958b78df9b4b870926a079fe4cdc4fb2d46c8ba545a22e6a?arch=arm64\u0026repository_url=registry.redhat.io/openshift-logging/elasticsearch-rhel8-operator\u0026tag=v5.5.4-3"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/elasticsearch-proxy-rhel8@sha256:a6c03fd0fe66206bff59ba019cc60085de4c65d4efae8a637f1ac48b91688371_arm64",
"product": {
"name": "openshift-logging/elasticsearch-proxy-rhel8@sha256:a6c03fd0fe66206bff59ba019cc60085de4c65d4efae8a637f1ac48b91688371_arm64",
"product_id": "openshift-logging/elasticsearch-proxy-rhel8@sha256:a6c03fd0fe66206bff59ba019cc60085de4c65d4efae8a637f1ac48b91688371_arm64",
"product_identification_helper": {
"purl": "pkg:oci/elasticsearch-proxy-rhel8@sha256:a6c03fd0fe66206bff59ba019cc60085de4c65d4efae8a637f1ac48b91688371?arch=arm64\u0026repository_url=registry.redhat.io/openshift-logging/elasticsearch-proxy-rhel8\u0026tag=v1.0.0-303"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/log-file-metric-exporter-rhel8@sha256:f0ca78341daa3d41ffe460f5aa504219c72ee673dd57a82f344d3239b69717be_arm64",
"product": {
"name": "openshift-logging/log-file-metric-exporter-rhel8@sha256:f0ca78341daa3d41ffe460f5aa504219c72ee673dd57a82f344d3239b69717be_arm64",
"product_id": "openshift-logging/log-file-metric-exporter-rhel8@sha256:f0ca78341daa3d41ffe460f5aa504219c72ee673dd57a82f344d3239b69717be_arm64",
"product_identification_helper": {
"purl": "pkg:oci/log-file-metric-exporter-rhel8@sha256:f0ca78341daa3d41ffe460f5aa504219c72ee673dd57a82f344d3239b69717be?arch=arm64\u0026repository_url=registry.redhat.io/openshift-logging/log-file-metric-exporter-rhel8\u0026tag=v1.1.0-71"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/logging-curator5-rhel8@sha256:c8ea484f5e15b7b53941f251db9b5be08c8cb6f3a14d99285277d9eadf969e98_arm64",
"product": {
"name": "openshift-logging/logging-curator5-rhel8@sha256:c8ea484f5e15b7b53941f251db9b5be08c8cb6f3a14d99285277d9eadf969e98_arm64",
"product_id": "openshift-logging/logging-curator5-rhel8@sha256:c8ea484f5e15b7b53941f251db9b5be08c8cb6f3a14d99285277d9eadf969e98_arm64",
"product_identification_helper": {
"purl": "pkg:oci/logging-curator5-rhel8@sha256:c8ea484f5e15b7b53941f251db9b5be08c8cb6f3a14d99285277d9eadf969e98?arch=arm64\u0026repository_url=registry.redhat.io/openshift-logging/logging-curator5-rhel8\u0026tag=v5.8.1-245"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/elasticsearch6-rhel8@sha256:6dfb5e18aa3dc6ce8e2535e13de1d53eea68b218854971e0eb594f677f6da7c7_arm64",
"product": {
"name": "openshift-logging/elasticsearch6-rhel8@sha256:6dfb5e18aa3dc6ce8e2535e13de1d53eea68b218854971e0eb594f677f6da7c7_arm64",
"product_id": "openshift-logging/elasticsearch6-rhel8@sha256:6dfb5e18aa3dc6ce8e2535e13de1d53eea68b218854971e0eb594f677f6da7c7_arm64",
"product_identification_helper": {
"purl": "pkg:oci/elasticsearch6-rhel8@sha256:6dfb5e18aa3dc6ce8e2535e13de1d53eea68b218854971e0eb594f677f6da7c7?arch=arm64\u0026repository_url=registry.redhat.io/openshift-logging/elasticsearch6-rhel8\u0026tag=v6.8.1-264"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/eventrouter-rhel8@sha256:0590711175be3b10f646256407cb7d72df63333589d527199260f738a91f2e3d_arm64",
"product": {
"name": "openshift-logging/eventrouter-rhel8@sha256:0590711175be3b10f646256407cb7d72df63333589d527199260f738a91f2e3d_arm64",
"product_id": "openshift-logging/eventrouter-rhel8@sha256:0590711175be3b10f646256407cb7d72df63333589d527199260f738a91f2e3d_arm64",
"product_identification_helper": {
"purl": "pkg:oci/eventrouter-rhel8@sha256:0590711175be3b10f646256407cb7d72df63333589d527199260f738a91f2e3d?arch=arm64\u0026repository_url=registry.redhat.io/openshift-logging/eventrouter-rhel8\u0026tag=v0.4.0-52"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/fluentd-rhel8@sha256:3d4b83f86b2d2f1c73ab184a3471d0d4da04bb6e76487c9f546da87998e480dc_arm64",
"product": {
"name": "openshift-logging/fluentd-rhel8@sha256:3d4b83f86b2d2f1c73ab184a3471d0d4da04bb6e76487c9f546da87998e480dc_arm64",
"product_id": "openshift-logging/fluentd-rhel8@sha256:3d4b83f86b2d2f1c73ab184a3471d0d4da04bb6e76487c9f546da87998e480dc_arm64",
"product_identification_helper": {
"purl": "pkg:oci/fluentd-rhel8@sha256:3d4b83f86b2d2f1c73ab184a3471d0d4da04bb6e76487c9f546da87998e480dc?arch=arm64\u0026repository_url=registry.redhat.io/openshift-logging/fluentd-rhel8\u0026tag=v1.14.6-61"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/kibana6-rhel8@sha256:ca4f273fb088980bfcc3607bd7ea2d40cc93298262cb3f5ce4054a6235152d1e_arm64",
"product": {
"name": "openshift-logging/kibana6-rhel8@sha256:ca4f273fb088980bfcc3607bd7ea2d40cc93298262cb3f5ce4054a6235152d1e_arm64",
"product_id": "openshift-logging/kibana6-rhel8@sha256:ca4f273fb088980bfcc3607bd7ea2d40cc93298262cb3f5ce4054a6235152d1e_arm64",
"product_identification_helper": {
"purl": "pkg:oci/kibana6-rhel8@sha256:ca4f273fb088980bfcc3607bd7ea2d40cc93298262cb3f5ce4054a6235152d1e?arch=arm64\u0026repository_url=registry.redhat.io/openshift-logging/kibana6-rhel8\u0026tag=v6.8.1-301"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/logging-loki-rhel8@sha256:dd5e5a043befc54eeb63ff51a01691778053c90de5c9b8946d6a1d808fbcf0df_arm64",
"product": {
"name": "openshift-logging/logging-loki-rhel8@sha256:dd5e5a043befc54eeb63ff51a01691778053c90de5c9b8946d6a1d808fbcf0df_arm64",
"product_id": "openshift-logging/logging-loki-rhel8@sha256:dd5e5a043befc54eeb63ff51a01691778053c90de5c9b8946d6a1d808fbcf0df_arm64",
"product_identification_helper": {
"purl": "pkg:oci/logging-loki-rhel8@sha256:dd5e5a043befc54eeb63ff51a01691778053c90de5c9b8946d6a1d808fbcf0df?arch=arm64\u0026repository_url=registry.redhat.io/openshift-logging/logging-loki-rhel8\u0026tag=v2.6.1-21"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/vector-rhel8@sha256:6c8b9e91e4d527bc0694879c7ce908e3d67877fd53191b71af95191cc0149afa_arm64",
"product": {
"name": "openshift-logging/vector-rhel8@sha256:6c8b9e91e4d527bc0694879c7ce908e3d67877fd53191b71af95191cc0149afa_arm64",
"product_id": "openshift-logging/vector-rhel8@sha256:6c8b9e91e4d527bc0694879c7ce908e3d67877fd53191b71af95191cc0149afa_arm64",
"product_identification_helper": {
"purl": "pkg:oci/vector-rhel8@sha256:6c8b9e91e4d527bc0694879c7ce908e3d67877fd53191b71af95191cc0149afa?arch=arm64\u0026repository_url=registry.redhat.io/openshift-logging/vector-rhel8\u0026tag=v0.21.0-34"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/logging-view-plugin-rhel8@sha256:147676e1a3c66757508be0046c28ccb7985f15af7f8f4a045fa5ca424c0c684d_arm64",
"product": {
"name": "openshift-logging/logging-view-plugin-rhel8@sha256:147676e1a3c66757508be0046c28ccb7985f15af7f8f4a045fa5ca424c0c684d_arm64",
"product_id": "openshift-logging/logging-view-plugin-rhel8@sha256:147676e1a3c66757508be0046c28ccb7985f15af7f8f4a045fa5ca424c0c684d_arm64",
"product_identification_helper": {
"purl": "pkg:oci/logging-view-plugin-rhel8@sha256:147676e1a3c66757508be0046c28ccb7985f15af7f8f4a045fa5ca424c0c684d?arch=arm64\u0026repository_url=registry.redhat.io/openshift-logging/logging-view-plugin-rhel8\u0026tag=v5.5.4-2"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/loki-rhel8-operator@sha256:dfa4ca06abb576fa071fb30c425bc6be631c0453939de562e1dc0b4e76de4f81_arm64",
"product": {
"name": "openshift-logging/loki-rhel8-operator@sha256:dfa4ca06abb576fa071fb30c425bc6be631c0453939de562e1dc0b4e76de4f81_arm64",
"product_id": "openshift-logging/loki-rhel8-operator@sha256:dfa4ca06abb576fa071fb30c425bc6be631c0453939de562e1dc0b4e76de4f81_arm64",
"product_identification_helper": {
"purl": "pkg:oci/loki-rhel8-operator@sha256:dfa4ca06abb576fa071fb30c425bc6be631c0453939de562e1dc0b4e76de4f81?arch=arm64\u0026repository_url=registry.redhat.io/openshift-logging/loki-rhel8-operator\u0026tag=v5.5.4-4"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/lokistack-gateway-rhel8@sha256:0a3eb7a1a50b75528be737eb2768e671a643eea324c967a0381296b61f8e399e_arm64",
"product": {
"name": "openshift-logging/lokistack-gateway-rhel8@sha256:0a3eb7a1a50b75528be737eb2768e671a643eea324c967a0381296b61f8e399e_arm64",
"product_id": "openshift-logging/lokistack-gateway-rhel8@sha256:0a3eb7a1a50b75528be737eb2768e671a643eea324c967a0381296b61f8e399e_arm64",
"product_identification_helper": {
"purl": "pkg:oci/lokistack-gateway-rhel8@sha256:0a3eb7a1a50b75528be737eb2768e671a643eea324c967a0381296b61f8e399e?arch=arm64\u0026repository_url=registry.redhat.io/openshift-logging/lokistack-gateway-rhel8\u0026tag=v0.1.0-57"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/opa-openshift-rhel8@sha256:c8458b60077d018eaa78f38fc0b85786d8108b88faea6e420cc01b720f23af48_arm64",
"product": {
"name": "openshift-logging/opa-openshift-rhel8@sha256:c8458b60077d018eaa78f38fc0b85786d8108b88faea6e420cc01b720f23af48_arm64",
"product_id": "openshift-logging/opa-openshift-rhel8@sha256:c8458b60077d018eaa78f38fc0b85786d8108b88faea6e420cc01b720f23af48_arm64",
"product_identification_helper": {
"purl": "pkg:oci/opa-openshift-rhel8@sha256:c8458b60077d018eaa78f38fc0b85786d8108b88faea6e420cc01b720f23af48?arch=arm64\u0026repository_url=registry.redhat.io/openshift-logging/opa-openshift-rhel8\u0026tag=v0.1.0-27"
}
}
}
],
"category": "architecture",
"name": "arm64"
},
{
"branches": [
{
"category": "product_version",
"name": "openshift-logging/cluster-logging-rhel8-operator@sha256:b4eeab42904e5a81e7adb8801bd901a53a5b81b2464b33816c203daf7587f89f_ppc64le",
"product": {
"name": "openshift-logging/cluster-logging-rhel8-operator@sha256:b4eeab42904e5a81e7adb8801bd901a53a5b81b2464b33816c203daf7587f89f_ppc64le",
"product_id": "openshift-logging/cluster-logging-rhel8-operator@sha256:b4eeab42904e5a81e7adb8801bd901a53a5b81b2464b33816c203daf7587f89f_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/cluster-logging-rhel8-operator@sha256:b4eeab42904e5a81e7adb8801bd901a53a5b81b2464b33816c203daf7587f89f?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-logging/cluster-logging-rhel8-operator\u0026tag=v5.5.4-7"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/elasticsearch-rhel8-operator@sha256:64954ce7d233d6c109e46645cd8d55d8a06068328ce3a22f646ede7c9fde78c8_ppc64le",
"product": {
"name": "openshift-logging/elasticsearch-rhel8-operator@sha256:64954ce7d233d6c109e46645cd8d55d8a06068328ce3a22f646ede7c9fde78c8_ppc64le",
"product_id": "openshift-logging/elasticsearch-rhel8-operator@sha256:64954ce7d233d6c109e46645cd8d55d8a06068328ce3a22f646ede7c9fde78c8_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/elasticsearch-rhel8-operator@sha256:64954ce7d233d6c109e46645cd8d55d8a06068328ce3a22f646ede7c9fde78c8?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-logging/elasticsearch-rhel8-operator\u0026tag=v5.5.4-3"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/elasticsearch-proxy-rhel8@sha256:89f980b63cbcf7956449d8cee41c884ea4ae7d76f02454f7e32058576fd92fa5_ppc64le",
"product": {
"name": "openshift-logging/elasticsearch-proxy-rhel8@sha256:89f980b63cbcf7956449d8cee41c884ea4ae7d76f02454f7e32058576fd92fa5_ppc64le",
"product_id": "openshift-logging/elasticsearch-proxy-rhel8@sha256:89f980b63cbcf7956449d8cee41c884ea4ae7d76f02454f7e32058576fd92fa5_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/elasticsearch-proxy-rhel8@sha256:89f980b63cbcf7956449d8cee41c884ea4ae7d76f02454f7e32058576fd92fa5?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-logging/elasticsearch-proxy-rhel8\u0026tag=v1.0.0-303"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/log-file-metric-exporter-rhel8@sha256:8b76243469011045e72b7a339288986e7561a3005aa94d580d5b1082580e9cec_ppc64le",
"product": {
"name": "openshift-logging/log-file-metric-exporter-rhel8@sha256:8b76243469011045e72b7a339288986e7561a3005aa94d580d5b1082580e9cec_ppc64le",
"product_id": "openshift-logging/log-file-metric-exporter-rhel8@sha256:8b76243469011045e72b7a339288986e7561a3005aa94d580d5b1082580e9cec_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/log-file-metric-exporter-rhel8@sha256:8b76243469011045e72b7a339288986e7561a3005aa94d580d5b1082580e9cec?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-logging/log-file-metric-exporter-rhel8\u0026tag=v1.1.0-71"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/logging-curator5-rhel8@sha256:e26efb87488b53ebd4e5233515906974675b3a759f4a1c00f447df8821d5f030_ppc64le",
"product": {
"name": "openshift-logging/logging-curator5-rhel8@sha256:e26efb87488b53ebd4e5233515906974675b3a759f4a1c00f447df8821d5f030_ppc64le",
"product_id": "openshift-logging/logging-curator5-rhel8@sha256:e26efb87488b53ebd4e5233515906974675b3a759f4a1c00f447df8821d5f030_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/logging-curator5-rhel8@sha256:e26efb87488b53ebd4e5233515906974675b3a759f4a1c00f447df8821d5f030?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-logging/logging-curator5-rhel8\u0026tag=v5.8.1-245"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/elasticsearch6-rhel8@sha256:1019e03ddff4726caae53e800403cbaa82ce057c7553552ad027a37d3be5824f_ppc64le",
"product": {
"name": "openshift-logging/elasticsearch6-rhel8@sha256:1019e03ddff4726caae53e800403cbaa82ce057c7553552ad027a37d3be5824f_ppc64le",
"product_id": "openshift-logging/elasticsearch6-rhel8@sha256:1019e03ddff4726caae53e800403cbaa82ce057c7553552ad027a37d3be5824f_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/elasticsearch6-rhel8@sha256:1019e03ddff4726caae53e800403cbaa82ce057c7553552ad027a37d3be5824f?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-logging/elasticsearch6-rhel8\u0026tag=v6.8.1-264"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/eventrouter-rhel8@sha256:ac91af413a363890bb01772488e371e4dc698ecfb77f047bb83bf638d497aa7c_ppc64le",
"product": {
"name": "openshift-logging/eventrouter-rhel8@sha256:ac91af413a363890bb01772488e371e4dc698ecfb77f047bb83bf638d497aa7c_ppc64le",
"product_id": "openshift-logging/eventrouter-rhel8@sha256:ac91af413a363890bb01772488e371e4dc698ecfb77f047bb83bf638d497aa7c_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/eventrouter-rhel8@sha256:ac91af413a363890bb01772488e371e4dc698ecfb77f047bb83bf638d497aa7c?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-logging/eventrouter-rhel8\u0026tag=v0.4.0-52"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/fluentd-rhel8@sha256:790fe2b90b51f8aff5d10b1525bcf7d35e5517674245993dac6696ebf2a24baf_ppc64le",
"product": {
"name": "openshift-logging/fluentd-rhel8@sha256:790fe2b90b51f8aff5d10b1525bcf7d35e5517674245993dac6696ebf2a24baf_ppc64le",
"product_id": "openshift-logging/fluentd-rhel8@sha256:790fe2b90b51f8aff5d10b1525bcf7d35e5517674245993dac6696ebf2a24baf_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/fluentd-rhel8@sha256:790fe2b90b51f8aff5d10b1525bcf7d35e5517674245993dac6696ebf2a24baf?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-logging/fluentd-rhel8\u0026tag=v1.14.6-61"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/kibana6-rhel8@sha256:93c33d6810eb6e71e7e543c1c26a29e163214df64121c814b4424322308b0a30_ppc64le",
"product": {
"name": "openshift-logging/kibana6-rhel8@sha256:93c33d6810eb6e71e7e543c1c26a29e163214df64121c814b4424322308b0a30_ppc64le",
"product_id": "openshift-logging/kibana6-rhel8@sha256:93c33d6810eb6e71e7e543c1c26a29e163214df64121c814b4424322308b0a30_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/kibana6-rhel8@sha256:93c33d6810eb6e71e7e543c1c26a29e163214df64121c814b4424322308b0a30?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-logging/kibana6-rhel8\u0026tag=v6.8.1-301"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/logging-loki-rhel8@sha256:969ce1d586fb7fbdd65d07c0b790f48fd6f81e659d1323514906bb03ae9fe79b_ppc64le",
"product": {
"name": "openshift-logging/logging-loki-rhel8@sha256:969ce1d586fb7fbdd65d07c0b790f48fd6f81e659d1323514906bb03ae9fe79b_ppc64le",
"product_id": "openshift-logging/logging-loki-rhel8@sha256:969ce1d586fb7fbdd65d07c0b790f48fd6f81e659d1323514906bb03ae9fe79b_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/logging-loki-rhel8@sha256:969ce1d586fb7fbdd65d07c0b790f48fd6f81e659d1323514906bb03ae9fe79b?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-logging/logging-loki-rhel8\u0026tag=v2.6.1-21"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/vector-rhel8@sha256:b22fe4e184b908986301fda4d2b57f4b9b91149168386a8d9c7ac9b0c4631c7c_ppc64le",
"product": {
"name": "openshift-logging/vector-rhel8@sha256:b22fe4e184b908986301fda4d2b57f4b9b91149168386a8d9c7ac9b0c4631c7c_ppc64le",
"product_id": "openshift-logging/vector-rhel8@sha256:b22fe4e184b908986301fda4d2b57f4b9b91149168386a8d9c7ac9b0c4631c7c_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/vector-rhel8@sha256:b22fe4e184b908986301fda4d2b57f4b9b91149168386a8d9c7ac9b0c4631c7c?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-logging/vector-rhel8\u0026tag=v0.21.0-34"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/logging-view-plugin-rhel8@sha256:da8c90c5b3b68e9b98a76828a450a9d7c579256b04aa9daf87ddfab9bad5548c_ppc64le",
"product": {
"name": "openshift-logging/logging-view-plugin-rhel8@sha256:da8c90c5b3b68e9b98a76828a450a9d7c579256b04aa9daf87ddfab9bad5548c_ppc64le",
"product_id": "openshift-logging/logging-view-plugin-rhel8@sha256:da8c90c5b3b68e9b98a76828a450a9d7c579256b04aa9daf87ddfab9bad5548c_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/logging-view-plugin-rhel8@sha256:da8c90c5b3b68e9b98a76828a450a9d7c579256b04aa9daf87ddfab9bad5548c?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-logging/logging-view-plugin-rhel8\u0026tag=v5.5.4-2"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/loki-rhel8-operator@sha256:4eba6362f8aaa0450d07b87824148d2c15232b871d0ba6bc34f1962d2970e753_ppc64le",
"product": {
"name": "openshift-logging/loki-rhel8-operator@sha256:4eba6362f8aaa0450d07b87824148d2c15232b871d0ba6bc34f1962d2970e753_ppc64le",
"product_id": "openshift-logging/loki-rhel8-operator@sha256:4eba6362f8aaa0450d07b87824148d2c15232b871d0ba6bc34f1962d2970e753_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/loki-rhel8-operator@sha256:4eba6362f8aaa0450d07b87824148d2c15232b871d0ba6bc34f1962d2970e753?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-logging/loki-rhel8-operator\u0026tag=v5.5.4-4"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/lokistack-gateway-rhel8@sha256:42ebf89821e0f8e4b7d03cc5a6d5a30d48f73a1ab2b7486c8a0bb1e5c2cfd4b4_ppc64le",
"product": {
"name": "openshift-logging/lokistack-gateway-rhel8@sha256:42ebf89821e0f8e4b7d03cc5a6d5a30d48f73a1ab2b7486c8a0bb1e5c2cfd4b4_ppc64le",
"product_id": "openshift-logging/lokistack-gateway-rhel8@sha256:42ebf89821e0f8e4b7d03cc5a6d5a30d48f73a1ab2b7486c8a0bb1e5c2cfd4b4_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/lokistack-gateway-rhel8@sha256:42ebf89821e0f8e4b7d03cc5a6d5a30d48f73a1ab2b7486c8a0bb1e5c2cfd4b4?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-logging/lokistack-gateway-rhel8\u0026tag=v0.1.0-57"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/opa-openshift-rhel8@sha256:847c70de5af59c9aec366612a74477de931977cf79d5f9ed117772e931589497_ppc64le",
"product": {
"name": "openshift-logging/opa-openshift-rhel8@sha256:847c70de5af59c9aec366612a74477de931977cf79d5f9ed117772e931589497_ppc64le",
"product_id": "openshift-logging/opa-openshift-rhel8@sha256:847c70de5af59c9aec366612a74477de931977cf79d5f9ed117772e931589497_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/opa-openshift-rhel8@sha256:847c70de5af59c9aec366612a74477de931977cf79d5f9ed117772e931589497?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-logging/opa-openshift-rhel8\u0026tag=v0.1.0-27"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "openshift-logging/cluster-logging-rhel8-operator@sha256:414649f77a20e04b3eb16d64acf81a4d261394016d4a890da309cbb8216c1d4a_amd64",
"product": {
"name": "openshift-logging/cluster-logging-rhel8-operator@sha256:414649f77a20e04b3eb16d64acf81a4d261394016d4a890da309cbb8216c1d4a_amd64",
"product_id": "openshift-logging/cluster-logging-rhel8-operator@sha256:414649f77a20e04b3eb16d64acf81a4d261394016d4a890da309cbb8216c1d4a_amd64",
"product_identification_helper": {
"purl": "pkg:oci/cluster-logging-rhel8-operator@sha256:414649f77a20e04b3eb16d64acf81a4d261394016d4a890da309cbb8216c1d4a?arch=amd64\u0026repository_url=registry.redhat.io/openshift-logging/cluster-logging-rhel8-operator\u0026tag=v5.5.4-7"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/cluster-logging-operator-bundle@sha256:a78fd59207ef6cc8ddaaa3f3ae7140b7678e96e0677517623d1537afc05e84dd_amd64",
"product": {
"name": "openshift-logging/cluster-logging-operator-bundle@sha256:a78fd59207ef6cc8ddaaa3f3ae7140b7678e96e0677517623d1537afc05e84dd_amd64",
"product_id": "openshift-logging/cluster-logging-operator-bundle@sha256:a78fd59207ef6cc8ddaaa3f3ae7140b7678e96e0677517623d1537afc05e84dd_amd64",
"product_identification_helper": {
"purl": "pkg:oci/cluster-logging-operator-bundle@sha256:a78fd59207ef6cc8ddaaa3f3ae7140b7678e96e0677517623d1537afc05e84dd?arch=amd64\u0026repository_url=registry.redhat.io/openshift-logging/cluster-logging-operator-bundle\u0026tag=v5.5.4-13"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/elasticsearch-rhel8-operator@sha256:c25b7b7c0f073fdfcf9fd90572790064cdff26d61a4e4db751d4197ff2c5b4c1_amd64",
"product": {
"name": "openshift-logging/elasticsearch-rhel8-operator@sha256:c25b7b7c0f073fdfcf9fd90572790064cdff26d61a4e4db751d4197ff2c5b4c1_amd64",
"product_id": "openshift-logging/elasticsearch-rhel8-operator@sha256:c25b7b7c0f073fdfcf9fd90572790064cdff26d61a4e4db751d4197ff2c5b4c1_amd64",
"product_identification_helper": {
"purl": "pkg:oci/elasticsearch-rhel8-operator@sha256:c25b7b7c0f073fdfcf9fd90572790064cdff26d61a4e4db751d4197ff2c5b4c1?arch=amd64\u0026repository_url=registry.redhat.io/openshift-logging/elasticsearch-rhel8-operator\u0026tag=v5.5.4-3"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/elasticsearch-operator-bundle@sha256:d09cafc7f6bbb446608051cebb1c943575e80f9987bb4cad8af53e0354a0e7cd_amd64",
"product": {
"name": "openshift-logging/elasticsearch-operator-bundle@sha256:d09cafc7f6bbb446608051cebb1c943575e80f9987bb4cad8af53e0354a0e7cd_amd64",
"product_id": "openshift-logging/elasticsearch-operator-bundle@sha256:d09cafc7f6bbb446608051cebb1c943575e80f9987bb4cad8af53e0354a0e7cd_amd64",
"product_identification_helper": {
"purl": "pkg:oci/elasticsearch-operator-bundle@sha256:d09cafc7f6bbb446608051cebb1c943575e80f9987bb4cad8af53e0354a0e7cd?arch=amd64\u0026repository_url=registry.redhat.io/openshift-logging/elasticsearch-operator-bundle\u0026tag=v5.5.4-17"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/elasticsearch-proxy-rhel8@sha256:e1755002225548182e17bd82b1c129b2ac61e623c3c37c4d51a535012088cacc_amd64",
"product": {
"name": "openshift-logging/elasticsearch-proxy-rhel8@sha256:e1755002225548182e17bd82b1c129b2ac61e623c3c37c4d51a535012088cacc_amd64",
"product_id": "openshift-logging/elasticsearch-proxy-rhel8@sha256:e1755002225548182e17bd82b1c129b2ac61e623c3c37c4d51a535012088cacc_amd64",
"product_identification_helper": {
"purl": "pkg:oci/elasticsearch-proxy-rhel8@sha256:e1755002225548182e17bd82b1c129b2ac61e623c3c37c4d51a535012088cacc?arch=amd64\u0026repository_url=registry.redhat.io/openshift-logging/elasticsearch-proxy-rhel8\u0026tag=v1.0.0-303"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/log-file-metric-exporter-rhel8@sha256:e91d4b026d38091cb707e0213f329d0781a3517f3eca4d209d09d6c1edb1a1d3_amd64",
"product": {
"name": "openshift-logging/log-file-metric-exporter-rhel8@sha256:e91d4b026d38091cb707e0213f329d0781a3517f3eca4d209d09d6c1edb1a1d3_amd64",
"product_id": "openshift-logging/log-file-metric-exporter-rhel8@sha256:e91d4b026d38091cb707e0213f329d0781a3517f3eca4d209d09d6c1edb1a1d3_amd64",
"product_identification_helper": {
"purl": "pkg:oci/log-file-metric-exporter-rhel8@sha256:e91d4b026d38091cb707e0213f329d0781a3517f3eca4d209d09d6c1edb1a1d3?arch=amd64\u0026repository_url=registry.redhat.io/openshift-logging/log-file-metric-exporter-rhel8\u0026tag=v1.1.0-71"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/logging-curator5-rhel8@sha256:e6ae5eef57de608fb1d4393fe824d0befffd8f5b696b5ce44e571fdcddb46f1f_amd64",
"product": {
"name": "openshift-logging/logging-curator5-rhel8@sha256:e6ae5eef57de608fb1d4393fe824d0befffd8f5b696b5ce44e571fdcddb46f1f_amd64",
"product_id": "openshift-logging/logging-curator5-rhel8@sha256:e6ae5eef57de608fb1d4393fe824d0befffd8f5b696b5ce44e571fdcddb46f1f_amd64",
"product_identification_helper": {
"purl": "pkg:oci/logging-curator5-rhel8@sha256:e6ae5eef57de608fb1d4393fe824d0befffd8f5b696b5ce44e571fdcddb46f1f?arch=amd64\u0026repository_url=registry.redhat.io/openshift-logging/logging-curator5-rhel8\u0026tag=v5.8.1-245"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/elasticsearch6-rhel8@sha256:bf574cff65baba457e3199aae7d1b0e605403a7968e9af746a6cfc5d9a4b29c5_amd64",
"product": {
"name": "openshift-logging/elasticsearch6-rhel8@sha256:bf574cff65baba457e3199aae7d1b0e605403a7968e9af746a6cfc5d9a4b29c5_amd64",
"product_id": "openshift-logging/elasticsearch6-rhel8@sha256:bf574cff65baba457e3199aae7d1b0e605403a7968e9af746a6cfc5d9a4b29c5_amd64",
"product_identification_helper": {
"purl": "pkg:oci/elasticsearch6-rhel8@sha256:bf574cff65baba457e3199aae7d1b0e605403a7968e9af746a6cfc5d9a4b29c5?arch=amd64\u0026repository_url=registry.redhat.io/openshift-logging/elasticsearch6-rhel8\u0026tag=v6.8.1-264"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/eventrouter-rhel8@sha256:646995416047cf48070c60b9ab064d454ff9ed772a92558f9627e3832f0ccd3c_amd64",
"product": {
"name": "openshift-logging/eventrouter-rhel8@sha256:646995416047cf48070c60b9ab064d454ff9ed772a92558f9627e3832f0ccd3c_amd64",
"product_id": "openshift-logging/eventrouter-rhel8@sha256:646995416047cf48070c60b9ab064d454ff9ed772a92558f9627e3832f0ccd3c_amd64",
"product_identification_helper": {
"purl": "pkg:oci/eventrouter-rhel8@sha256:646995416047cf48070c60b9ab064d454ff9ed772a92558f9627e3832f0ccd3c?arch=amd64\u0026repository_url=registry.redhat.io/openshift-logging/eventrouter-rhel8\u0026tag=v0.4.0-52"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/fluentd-rhel8@sha256:dc8fe0ca5a488c6738e6904871a620f9444f30475863a09846f8205569c25e54_amd64",
"product": {
"name": "openshift-logging/fluentd-rhel8@sha256:dc8fe0ca5a488c6738e6904871a620f9444f30475863a09846f8205569c25e54_amd64",
"product_id": "openshift-logging/fluentd-rhel8@sha256:dc8fe0ca5a488c6738e6904871a620f9444f30475863a09846f8205569c25e54_amd64",
"product_identification_helper": {
"purl": "pkg:oci/fluentd-rhel8@sha256:dc8fe0ca5a488c6738e6904871a620f9444f30475863a09846f8205569c25e54?arch=amd64\u0026repository_url=registry.redhat.io/openshift-logging/fluentd-rhel8\u0026tag=v1.14.6-61"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/kibana6-rhel8@sha256:44f3446b172b3ea7f0fd4de9f8039eba256a6bea56715748af00f361e49b1519_amd64",
"product": {
"name": "openshift-logging/kibana6-rhel8@sha256:44f3446b172b3ea7f0fd4de9f8039eba256a6bea56715748af00f361e49b1519_amd64",
"product_id": "openshift-logging/kibana6-rhel8@sha256:44f3446b172b3ea7f0fd4de9f8039eba256a6bea56715748af00f361e49b1519_amd64",
"product_identification_helper": {
"purl": "pkg:oci/kibana6-rhel8@sha256:44f3446b172b3ea7f0fd4de9f8039eba256a6bea56715748af00f361e49b1519?arch=amd64\u0026repository_url=registry.redhat.io/openshift-logging/kibana6-rhel8\u0026tag=v6.8.1-301"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/logging-loki-rhel8@sha256:947becc46b99656f9faa6067f2cf38dbef0d40e85b56d62aafcb243052920dfc_amd64",
"product": {
"name": "openshift-logging/logging-loki-rhel8@sha256:947becc46b99656f9faa6067f2cf38dbef0d40e85b56d62aafcb243052920dfc_amd64",
"product_id": "openshift-logging/logging-loki-rhel8@sha256:947becc46b99656f9faa6067f2cf38dbef0d40e85b56d62aafcb243052920dfc_amd64",
"product_identification_helper": {
"purl": "pkg:oci/logging-loki-rhel8@sha256:947becc46b99656f9faa6067f2cf38dbef0d40e85b56d62aafcb243052920dfc?arch=amd64\u0026repository_url=registry.redhat.io/openshift-logging/logging-loki-rhel8\u0026tag=v2.6.1-21"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/vector-rhel8@sha256:6c237605a0062e69e10a1fad47375f9c51dbccb110e1d11a02f2b7101d611e8f_amd64",
"product": {
"name": "openshift-logging/vector-rhel8@sha256:6c237605a0062e69e10a1fad47375f9c51dbccb110e1d11a02f2b7101d611e8f_amd64",
"product_id": "openshift-logging/vector-rhel8@sha256:6c237605a0062e69e10a1fad47375f9c51dbccb110e1d11a02f2b7101d611e8f_amd64",
"product_identification_helper": {
"purl": "pkg:oci/vector-rhel8@sha256:6c237605a0062e69e10a1fad47375f9c51dbccb110e1d11a02f2b7101d611e8f?arch=amd64\u0026repository_url=registry.redhat.io/openshift-logging/vector-rhel8\u0026tag=v0.21.0-34"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/logging-view-plugin-rhel8@sha256:bea8f3f31073874a77af55c8664cbf167cd8bad5296e1bf444b9490b06484b56_amd64",
"product": {
"name": "openshift-logging/logging-view-plugin-rhel8@sha256:bea8f3f31073874a77af55c8664cbf167cd8bad5296e1bf444b9490b06484b56_amd64",
"product_id": "openshift-logging/logging-view-plugin-rhel8@sha256:bea8f3f31073874a77af55c8664cbf167cd8bad5296e1bf444b9490b06484b56_amd64",
"product_identification_helper": {
"purl": "pkg:oci/logging-view-plugin-rhel8@sha256:bea8f3f31073874a77af55c8664cbf167cd8bad5296e1bf444b9490b06484b56?arch=amd64\u0026repository_url=registry.redhat.io/openshift-logging/logging-view-plugin-rhel8\u0026tag=v5.5.4-2"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/loki-operator-bundle@sha256:1d75006c9d03648857963a8772644d4228361d97fb07c8652326b61fd5d30f8c_amd64",
"product": {
"name": "openshift-logging/loki-operator-bundle@sha256:1d75006c9d03648857963a8772644d4228361d97fb07c8652326b61fd5d30f8c_amd64",
"product_id": "openshift-logging/loki-operator-bundle@sha256:1d75006c9d03648857963a8772644d4228361d97fb07c8652326b61fd5d30f8c_amd64",
"product_identification_helper": {
"purl": "pkg:oci/loki-operator-bundle@sha256:1d75006c9d03648857963a8772644d4228361d97fb07c8652326b61fd5d30f8c?arch=amd64\u0026repository_url=registry.redhat.io/openshift-logging/loki-operator-bundle\u0026tag=v5.5.4-18"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/loki-rhel8-operator@sha256:e5289e40532a01c605760b2f438acfb66257b730a89249269e46dc9c0058aec1_amd64",
"product": {
"name": "openshift-logging/loki-rhel8-operator@sha256:e5289e40532a01c605760b2f438acfb66257b730a89249269e46dc9c0058aec1_amd64",
"product_id": "openshift-logging/loki-rhel8-operator@sha256:e5289e40532a01c605760b2f438acfb66257b730a89249269e46dc9c0058aec1_amd64",
"product_identification_helper": {
"purl": "pkg:oci/loki-rhel8-operator@sha256:e5289e40532a01c605760b2f438acfb66257b730a89249269e46dc9c0058aec1?arch=amd64\u0026repository_url=registry.redhat.io/openshift-logging/loki-rhel8-operator\u0026tag=v5.5.4-4"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/lokistack-gateway-rhel8@sha256:449f4cf0b3d0c0d6724cc2346c2121df58ef43297c56cc540e05158ad5c8ffbc_amd64",
"product": {
"name": "openshift-logging/lokistack-gateway-rhel8@sha256:449f4cf0b3d0c0d6724cc2346c2121df58ef43297c56cc540e05158ad5c8ffbc_amd64",
"product_id": "openshift-logging/lokistack-gateway-rhel8@sha256:449f4cf0b3d0c0d6724cc2346c2121df58ef43297c56cc540e05158ad5c8ffbc_amd64",
"product_identification_helper": {
"purl": "pkg:oci/lokistack-gateway-rhel8@sha256:449f4cf0b3d0c0d6724cc2346c2121df58ef43297c56cc540e05158ad5c8ffbc?arch=amd64\u0026repository_url=registry.redhat.io/openshift-logging/lokistack-gateway-rhel8\u0026tag=v0.1.0-57"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/opa-openshift-rhel8@sha256:4c1b37da97e80aa76f2612f34745180a026214a415ed9a186ab81ec8fa96e17d_amd64",
"product": {
"name": "openshift-logging/opa-openshift-rhel8@sha256:4c1b37da97e80aa76f2612f34745180a026214a415ed9a186ab81ec8fa96e17d_amd64",
"product_id": "openshift-logging/opa-openshift-rhel8@sha256:4c1b37da97e80aa76f2612f34745180a026214a415ed9a186ab81ec8fa96e17d_amd64",
"product_identification_helper": {
"purl": "pkg:oci/opa-openshift-rhel8@sha256:4c1b37da97e80aa76f2612f34745180a026214a415ed9a186ab81ec8fa96e17d?arch=amd64\u0026repository_url=registry.redhat.io/openshift-logging/opa-openshift-rhel8\u0026tag=v0.1.0-27"
}
}
}
],
"category": "architecture",
"name": "amd64"
},
{
"branches": [
{
"category": "product_version",
"name": "openshift-logging/cluster-logging-rhel8-operator@sha256:11c10388503a708a962e3dfc5cdd9b6ad5c5d4d4a68b11f97f8fae2cc3884083_s390x",
"product": {
"name": "openshift-logging/cluster-logging-rhel8-operator@sha256:11c10388503a708a962e3dfc5cdd9b6ad5c5d4d4a68b11f97f8fae2cc3884083_s390x",
"product_id": "openshift-logging/cluster-logging-rhel8-operator@sha256:11c10388503a708a962e3dfc5cdd9b6ad5c5d4d4a68b11f97f8fae2cc3884083_s390x",
"product_identification_helper": {
"purl": "pkg:oci/cluster-logging-rhel8-operator@sha256:11c10388503a708a962e3dfc5cdd9b6ad5c5d4d4a68b11f97f8fae2cc3884083?arch=s390x\u0026repository_url=registry.redhat.io/openshift-logging/cluster-logging-rhel8-operator\u0026tag=v5.5.4-7"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/elasticsearch-rhel8-operator@sha256:5236634419119024d3f8779dbd78639a54c2323389f56fbf25dacdc499a072d3_s390x",
"product": {
"name": "openshift-logging/elasticsearch-rhel8-operator@sha256:5236634419119024d3f8779dbd78639a54c2323389f56fbf25dacdc499a072d3_s390x",
"product_id": "openshift-logging/elasticsearch-rhel8-operator@sha256:5236634419119024d3f8779dbd78639a54c2323389f56fbf25dacdc499a072d3_s390x",
"product_identification_helper": {
"purl": "pkg:oci/elasticsearch-rhel8-operator@sha256:5236634419119024d3f8779dbd78639a54c2323389f56fbf25dacdc499a072d3?arch=s390x\u0026repository_url=registry.redhat.io/openshift-logging/elasticsearch-rhel8-operator\u0026tag=v5.5.4-3"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/elasticsearch-proxy-rhel8@sha256:dcdd0c515b3b5a1a6e807929fb8e8d65c1ee2aba3bf696d2b9f852e8994e47b8_s390x",
"product": {
"name": "openshift-logging/elasticsearch-proxy-rhel8@sha256:dcdd0c515b3b5a1a6e807929fb8e8d65c1ee2aba3bf696d2b9f852e8994e47b8_s390x",
"product_id": "openshift-logging/elasticsearch-proxy-rhel8@sha256:dcdd0c515b3b5a1a6e807929fb8e8d65c1ee2aba3bf696d2b9f852e8994e47b8_s390x",
"product_identification_helper": {
"purl": "pkg:oci/elasticsearch-proxy-rhel8@sha256:dcdd0c515b3b5a1a6e807929fb8e8d65c1ee2aba3bf696d2b9f852e8994e47b8?arch=s390x\u0026repository_url=registry.redhat.io/openshift-logging/elasticsearch-proxy-rhel8\u0026tag=v1.0.0-303"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/log-file-metric-exporter-rhel8@sha256:44e17bbdb8c7ac0a7868b3be7e29d58401702384dab3a66efaa08d1176035672_s390x",
"product": {
"name": "openshift-logging/log-file-metric-exporter-rhel8@sha256:44e17bbdb8c7ac0a7868b3be7e29d58401702384dab3a66efaa08d1176035672_s390x",
"product_id": "openshift-logging/log-file-metric-exporter-rhel8@sha256:44e17bbdb8c7ac0a7868b3be7e29d58401702384dab3a66efaa08d1176035672_s390x",
"product_identification_helper": {
"purl": "pkg:oci/log-file-metric-exporter-rhel8@sha256:44e17bbdb8c7ac0a7868b3be7e29d58401702384dab3a66efaa08d1176035672?arch=s390x\u0026repository_url=registry.redhat.io/openshift-logging/log-file-metric-exporter-rhel8\u0026tag=v1.1.0-71"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/logging-curator5-rhel8@sha256:6f17fc02901a898b77c674cd4ba1764423e849c5faa888b2907ff7356accc66c_s390x",
"product": {
"name": "openshift-logging/logging-curator5-rhel8@sha256:6f17fc02901a898b77c674cd4ba1764423e849c5faa888b2907ff7356accc66c_s390x",
"product_id": "openshift-logging/logging-curator5-rhel8@sha256:6f17fc02901a898b77c674cd4ba1764423e849c5faa888b2907ff7356accc66c_s390x",
"product_identification_helper": {
"purl": "pkg:oci/logging-curator5-rhel8@sha256:6f17fc02901a898b77c674cd4ba1764423e849c5faa888b2907ff7356accc66c?arch=s390x\u0026repository_url=registry.redhat.io/openshift-logging/logging-curator5-rhel8\u0026tag=v5.8.1-245"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/elasticsearch6-rhel8@sha256:7c143b790fef75a04e8ed1be49576861651f66371355a3f5aa304a325faf6e5c_s390x",
"product": {
"name": "openshift-logging/elasticsearch6-rhel8@sha256:7c143b790fef75a04e8ed1be49576861651f66371355a3f5aa304a325faf6e5c_s390x",
"product_id": "openshift-logging/elasticsearch6-rhel8@sha256:7c143b790fef75a04e8ed1be49576861651f66371355a3f5aa304a325faf6e5c_s390x",
"product_identification_helper": {
"purl": "pkg:oci/elasticsearch6-rhel8@sha256:7c143b790fef75a04e8ed1be49576861651f66371355a3f5aa304a325faf6e5c?arch=s390x\u0026repository_url=registry.redhat.io/openshift-logging/elasticsearch6-rhel8\u0026tag=v6.8.1-264"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/eventrouter-rhel8@sha256:eaf322aeccc73ec9d8d5f5a9d6ee368ee3f68409031e18a60cc699e3ca5c144b_s390x",
"product": {
"name": "openshift-logging/eventrouter-rhel8@sha256:eaf322aeccc73ec9d8d5f5a9d6ee368ee3f68409031e18a60cc699e3ca5c144b_s390x",
"product_id": "openshift-logging/eventrouter-rhel8@sha256:eaf322aeccc73ec9d8d5f5a9d6ee368ee3f68409031e18a60cc699e3ca5c144b_s390x",
"product_identification_helper": {
"purl": "pkg:oci/eventrouter-rhel8@sha256:eaf322aeccc73ec9d8d5f5a9d6ee368ee3f68409031e18a60cc699e3ca5c144b?arch=s390x\u0026repository_url=registry.redhat.io/openshift-logging/eventrouter-rhel8\u0026tag=v0.4.0-52"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/fluentd-rhel8@sha256:490740ea41377e7d18ffba700a5022915edc13f6b38f86a6d9d475dfc61df935_s390x",
"product": {
"name": "openshift-logging/fluentd-rhel8@sha256:490740ea41377e7d18ffba700a5022915edc13f6b38f86a6d9d475dfc61df935_s390x",
"product_id": "openshift-logging/fluentd-rhel8@sha256:490740ea41377e7d18ffba700a5022915edc13f6b38f86a6d9d475dfc61df935_s390x",
"product_identification_helper": {
"purl": "pkg:oci/fluentd-rhel8@sha256:490740ea41377e7d18ffba700a5022915edc13f6b38f86a6d9d475dfc61df935?arch=s390x\u0026repository_url=registry.redhat.io/openshift-logging/fluentd-rhel8\u0026tag=v1.14.6-61"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/kibana6-rhel8@sha256:43e4da1a741543ac8cdf646901aff3185e5f30d6fad7e68a2233e2bd8d4ebe4b_s390x",
"product": {
"name": "openshift-logging/kibana6-rhel8@sha256:43e4da1a741543ac8cdf646901aff3185e5f30d6fad7e68a2233e2bd8d4ebe4b_s390x",
"product_id": "openshift-logging/kibana6-rhel8@sha256:43e4da1a741543ac8cdf646901aff3185e5f30d6fad7e68a2233e2bd8d4ebe4b_s390x",
"product_identification_helper": {
"purl": "pkg:oci/kibana6-rhel8@sha256:43e4da1a741543ac8cdf646901aff3185e5f30d6fad7e68a2233e2bd8d4ebe4b?arch=s390x\u0026repository_url=registry.redhat.io/openshift-logging/kibana6-rhel8\u0026tag=v6.8.1-301"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/logging-loki-rhel8@sha256:6242c3792c8c0469012be8b0140c2476e41f80b5271ba78ff42c63aa041be30f_s390x",
"product": {
"name": "openshift-logging/logging-loki-rhel8@sha256:6242c3792c8c0469012be8b0140c2476e41f80b5271ba78ff42c63aa041be30f_s390x",
"product_id": "openshift-logging/logging-loki-rhel8@sha256:6242c3792c8c0469012be8b0140c2476e41f80b5271ba78ff42c63aa041be30f_s390x",
"product_identification_helper": {
"purl": "pkg:oci/logging-loki-rhel8@sha256:6242c3792c8c0469012be8b0140c2476e41f80b5271ba78ff42c63aa041be30f?arch=s390x\u0026repository_url=registry.redhat.io/openshift-logging/logging-loki-rhel8\u0026tag=v2.6.1-21"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/vector-rhel8@sha256:c117a0024d06340a9a28686c144642d6591192738f263f4684a7d09af0b16c71_s390x",
"product": {
"name": "openshift-logging/vector-rhel8@sha256:c117a0024d06340a9a28686c144642d6591192738f263f4684a7d09af0b16c71_s390x",
"product_id": "openshift-logging/vector-rhel8@sha256:c117a0024d06340a9a28686c144642d6591192738f263f4684a7d09af0b16c71_s390x",
"product_identification_helper": {
"purl": "pkg:oci/vector-rhel8@sha256:c117a0024d06340a9a28686c144642d6591192738f263f4684a7d09af0b16c71?arch=s390x\u0026repository_url=registry.redhat.io/openshift-logging/vector-rhel8\u0026tag=v0.21.0-34"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/logging-view-plugin-rhel8@sha256:e3e5b570f9c819cb10ad38e928a301e8f0554e45052037b03f1ba81a3faa6a15_s390x",
"product": {
"name": "openshift-logging/logging-view-plugin-rhel8@sha256:e3e5b570f9c819cb10ad38e928a301e8f0554e45052037b03f1ba81a3faa6a15_s390x",
"product_id": "openshift-logging/logging-view-plugin-rhel8@sha256:e3e5b570f9c819cb10ad38e928a301e8f0554e45052037b03f1ba81a3faa6a15_s390x",
"product_identification_helper": {
"purl": "pkg:oci/logging-view-plugin-rhel8@sha256:e3e5b570f9c819cb10ad38e928a301e8f0554e45052037b03f1ba81a3faa6a15?arch=s390x\u0026repository_url=registry.redhat.io/openshift-logging/logging-view-plugin-rhel8\u0026tag=v5.5.4-2"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/loki-rhel8-operator@sha256:43fae2b6532712da7d0f83b5dda5797c9764fcac4b0e18580a19e54ee7dfcff6_s390x",
"product": {
"name": "openshift-logging/loki-rhel8-operator@sha256:43fae2b6532712da7d0f83b5dda5797c9764fcac4b0e18580a19e54ee7dfcff6_s390x",
"product_id": "openshift-logging/loki-rhel8-operator@sha256:43fae2b6532712da7d0f83b5dda5797c9764fcac4b0e18580a19e54ee7dfcff6_s390x",
"product_identification_helper": {
"purl": "pkg:oci/loki-rhel8-operator@sha256:43fae2b6532712da7d0f83b5dda5797c9764fcac4b0e18580a19e54ee7dfcff6?arch=s390x\u0026repository_url=registry.redhat.io/openshift-logging/loki-rhel8-operator\u0026tag=v5.5.4-4"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/lokistack-gateway-rhel8@sha256:5954a498e527ee59a3f655250a4f5535a26b49c6fd61889271affb08104839f8_s390x",
"product": {
"name": "openshift-logging/lokistack-gateway-rhel8@sha256:5954a498e527ee59a3f655250a4f5535a26b49c6fd61889271affb08104839f8_s390x",
"product_id": "openshift-logging/lokistack-gateway-rhel8@sha256:5954a498e527ee59a3f655250a4f5535a26b49c6fd61889271affb08104839f8_s390x",
"product_identification_helper": {
"purl": "pkg:oci/lokistack-gateway-rhel8@sha256:5954a498e527ee59a3f655250a4f5535a26b49c6fd61889271affb08104839f8?arch=s390x\u0026repository_url=registry.redhat.io/openshift-logging/lokistack-gateway-rhel8\u0026tag=v0.1.0-57"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/opa-openshift-rhel8@sha256:fc99739f4354e8b28613f50b441d3f7a93bea3e3b106d7c052b607c24b994b9e_s390x",
"product": {
"name": "openshift-logging/opa-openshift-rhel8@sha256:fc99739f4354e8b28613f50b441d3f7a93bea3e3b106d7c052b607c24b994b9e_s390x",
"product_id": "openshift-logging/opa-openshift-rhel8@sha256:fc99739f4354e8b28613f50b441d3f7a93bea3e3b106d7c052b607c24b994b9e_s390x",
"product_identification_helper": {
"purl": "pkg:oci/opa-openshift-rhel8@sha256:fc99739f4354e8b28613f50b441d3f7a93bea3e3b106d7c052b607c24b994b9e?arch=s390x\u0026repository_url=registry.redhat.io/openshift-logging/opa-openshift-rhel8\u0026tag=v0.1.0-27"
}
}
}
],
"category": "architecture",
"name": "s390x"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/cluster-logging-operator-bundle@sha256:a78fd59207ef6cc8ddaaa3f3ae7140b7678e96e0677517623d1537afc05e84dd_amd64 as a component of RHOL 5.5 for RHEL 8",
"product_id": "8Base-RHOL-5.5:openshift-logging/cluster-logging-operator-bundle@sha256:a78fd59207ef6cc8ddaaa3f3ae7140b7678e96e0677517623d1537afc05e84dd_amd64"
},
"product_reference": "openshift-logging/cluster-logging-operator-bundle@sha256:a78fd59207ef6cc8ddaaa3f3ae7140b7678e96e0677517623d1537afc05e84dd_amd64",
"relates_to_product_reference": "8Base-RHOL-5.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/cluster-logging-rhel8-operator@sha256:07ab076aa9b573d330ace59bf4de080ea64dbc7b3424357fc39c0c70ede27873_arm64 as a component of RHOL 5.5 for RHEL 8",
"product_id": "8Base-RHOL-5.5:openshift-logging/cluster-logging-rhel8-operator@sha256:07ab076aa9b573d330ace59bf4de080ea64dbc7b3424357fc39c0c70ede27873_arm64"
},
"product_reference": "openshift-logging/cluster-logging-rhel8-operator@sha256:07ab076aa9b573d330ace59bf4de080ea64dbc7b3424357fc39c0c70ede27873_arm64",
"relates_to_product_reference": "8Base-RHOL-5.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/cluster-logging-rhel8-operator@sha256:11c10388503a708a962e3dfc5cdd9b6ad5c5d4d4a68b11f97f8fae2cc3884083_s390x as a component of RHOL 5.5 for RHEL 8",
"product_id": "8Base-RHOL-5.5:openshift-logging/cluster-logging-rhel8-operator@sha256:11c10388503a708a962e3dfc5cdd9b6ad5c5d4d4a68b11f97f8fae2cc3884083_s390x"
},
"product_reference": "openshift-logging/cluster-logging-rhel8-operator@sha256:11c10388503a708a962e3dfc5cdd9b6ad5c5d4d4a68b11f97f8fae2cc3884083_s390x",
"relates_to_product_reference": "8Base-RHOL-5.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/cluster-logging-rhel8-operator@sha256:414649f77a20e04b3eb16d64acf81a4d261394016d4a890da309cbb8216c1d4a_amd64 as a component of RHOL 5.5 for RHEL 8",
"product_id": "8Base-RHOL-5.5:openshift-logging/cluster-logging-rhel8-operator@sha256:414649f77a20e04b3eb16d64acf81a4d261394016d4a890da309cbb8216c1d4a_amd64"
},
"product_reference": "openshift-logging/cluster-logging-rhel8-operator@sha256:414649f77a20e04b3eb16d64acf81a4d261394016d4a890da309cbb8216c1d4a_amd64",
"relates_to_product_reference": "8Base-RHOL-5.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/cluster-logging-rhel8-operator@sha256:b4eeab42904e5a81e7adb8801bd901a53a5b81b2464b33816c203daf7587f89f_ppc64le as a component of RHOL 5.5 for RHEL 8",
"product_id": "8Base-RHOL-5.5:openshift-logging/cluster-logging-rhel8-operator@sha256:b4eeab42904e5a81e7adb8801bd901a53a5b81b2464b33816c203daf7587f89f_ppc64le"
},
"product_reference": "openshift-logging/cluster-logging-rhel8-operator@sha256:b4eeab42904e5a81e7adb8801bd901a53a5b81b2464b33816c203daf7587f89f_ppc64le",
"relates_to_product_reference": "8Base-RHOL-5.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/elasticsearch-operator-bundle@sha256:d09cafc7f6bbb446608051cebb1c943575e80f9987bb4cad8af53e0354a0e7cd_amd64 as a component of RHOL 5.5 for RHEL 8",
"product_id": "8Base-RHOL-5.5:openshift-logging/elasticsearch-operator-bundle@sha256:d09cafc7f6bbb446608051cebb1c943575e80f9987bb4cad8af53e0354a0e7cd_amd64"
},
"product_reference": "openshift-logging/elasticsearch-operator-bundle@sha256:d09cafc7f6bbb446608051cebb1c943575e80f9987bb4cad8af53e0354a0e7cd_amd64",
"relates_to_product_reference": "8Base-RHOL-5.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/elasticsearch-proxy-rhel8@sha256:89f980b63cbcf7956449d8cee41c884ea4ae7d76f02454f7e32058576fd92fa5_ppc64le as a component of RHOL 5.5 for RHEL 8",
"product_id": "8Base-RHOL-5.5:openshift-logging/elasticsearch-proxy-rhel8@sha256:89f980b63cbcf7956449d8cee41c884ea4ae7d76f02454f7e32058576fd92fa5_ppc64le"
},
"product_reference": "openshift-logging/elasticsearch-proxy-rhel8@sha256:89f980b63cbcf7956449d8cee41c884ea4ae7d76f02454f7e32058576fd92fa5_ppc64le",
"relates_to_product_reference": "8Base-RHOL-5.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/elasticsearch-proxy-rhel8@sha256:a6c03fd0fe66206bff59ba019cc60085de4c65d4efae8a637f1ac48b91688371_arm64 as a component of RHOL 5.5 for RHEL 8",
"product_id": "8Base-RHOL-5.5:openshift-logging/elasticsearch-proxy-rhel8@sha256:a6c03fd0fe66206bff59ba019cc60085de4c65d4efae8a637f1ac48b91688371_arm64"
},
"product_reference": "openshift-logging/elasticsearch-proxy-rhel8@sha256:a6c03fd0fe66206bff59ba019cc60085de4c65d4efae8a637f1ac48b91688371_arm64",
"relates_to_product_reference": "8Base-RHOL-5.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/elasticsearch-proxy-rhel8@sha256:dcdd0c515b3b5a1a6e807929fb8e8d65c1ee2aba3bf696d2b9f852e8994e47b8_s390x as a component of RHOL 5.5 for RHEL 8",
"product_id": "8Base-RHOL-5.5:openshift-logging/elasticsearch-proxy-rhel8@sha256:dcdd0c515b3b5a1a6e807929fb8e8d65c1ee2aba3bf696d2b9f852e8994e47b8_s390x"
},
"product_reference": "openshift-logging/elasticsearch-proxy-rhel8@sha256:dcdd0c515b3b5a1a6e807929fb8e8d65c1ee2aba3bf696d2b9f852e8994e47b8_s390x",
"relates_to_product_reference": "8Base-RHOL-5.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/elasticsearch-proxy-rhel8@sha256:e1755002225548182e17bd82b1c129b2ac61e623c3c37c4d51a535012088cacc_amd64 as a component of RHOL 5.5 for RHEL 8",
"product_id": "8Base-RHOL-5.5:openshift-logging/elasticsearch-proxy-rhel8@sha256:e1755002225548182e17bd82b1c129b2ac61e623c3c37c4d51a535012088cacc_amd64"
},
"product_reference": "openshift-logging/elasticsearch-proxy-rhel8@sha256:e1755002225548182e17bd82b1c129b2ac61e623c3c37c4d51a535012088cacc_amd64",
"relates_to_product_reference": "8Base-RHOL-5.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/elasticsearch-rhel8-operator@sha256:5236634419119024d3f8779dbd78639a54c2323389f56fbf25dacdc499a072d3_s390x as a component of RHOL 5.5 for RHEL 8",
"product_id": "8Base-RHOL-5.5:openshift-logging/elasticsearch-rhel8-operator@sha256:5236634419119024d3f8779dbd78639a54c2323389f56fbf25dacdc499a072d3_s390x"
},
"product_reference": "openshift-logging/elasticsearch-rhel8-operator@sha256:5236634419119024d3f8779dbd78639a54c2323389f56fbf25dacdc499a072d3_s390x",
"relates_to_product_reference": "8Base-RHOL-5.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/elasticsearch-rhel8-operator@sha256:64954ce7d233d6c109e46645cd8d55d8a06068328ce3a22f646ede7c9fde78c8_ppc64le as a component of RHOL 5.5 for RHEL 8",
"product_id": "8Base-RHOL-5.5:openshift-logging/elasticsearch-rhel8-operator@sha256:64954ce7d233d6c109e46645cd8d55d8a06068328ce3a22f646ede7c9fde78c8_ppc64le"
},
"product_reference": "openshift-logging/elasticsearch-rhel8-operator@sha256:64954ce7d233d6c109e46645cd8d55d8a06068328ce3a22f646ede7c9fde78c8_ppc64le",
"relates_to_product_reference": "8Base-RHOL-5.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/elasticsearch-rhel8-operator@sha256:c25b7b7c0f073fdfcf9fd90572790064cdff26d61a4e4db751d4197ff2c5b4c1_amd64 as a component of RHOL 5.5 for RHEL 8",
"product_id": "8Base-RHOL-5.5:openshift-logging/elasticsearch-rhel8-operator@sha256:c25b7b7c0f073fdfcf9fd90572790064cdff26d61a4e4db751d4197ff2c5b4c1_amd64"
},
"product_reference": "openshift-logging/elasticsearch-rhel8-operator@sha256:c25b7b7c0f073fdfcf9fd90572790064cdff26d61a4e4db751d4197ff2c5b4c1_amd64",
"relates_to_product_reference": "8Base-RHOL-5.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/elasticsearch-rhel8-operator@sha256:dce08ac53092fc51958b78df9b4b870926a079fe4cdc4fb2d46c8ba545a22e6a_arm64 as a component of RHOL 5.5 for RHEL 8",
"product_id": "8Base-RHOL-5.5:openshift-logging/elasticsearch-rhel8-operator@sha256:dce08ac53092fc51958b78df9b4b870926a079fe4cdc4fb2d46c8ba545a22e6a_arm64"
},
"product_reference": "openshift-logging/elasticsearch-rhel8-operator@sha256:dce08ac53092fc51958b78df9b4b870926a079fe4cdc4fb2d46c8ba545a22e6a_arm64",
"relates_to_product_reference": "8Base-RHOL-5.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/elasticsearch6-rhel8@sha256:1019e03ddff4726caae53e800403cbaa82ce057c7553552ad027a37d3be5824f_ppc64le as a component of RHOL 5.5 for RHEL 8",
"product_id": "8Base-RHOL-5.5:openshift-logging/elasticsearch6-rhel8@sha256:1019e03ddff4726caae53e800403cbaa82ce057c7553552ad027a37d3be5824f_ppc64le"
},
"product_reference": "openshift-logging/elasticsearch6-rhel8@sha256:1019e03ddff4726caae53e800403cbaa82ce057c7553552ad027a37d3be5824f_ppc64le",
"relates_to_product_reference": "8Base-RHOL-5.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/elasticsearch6-rhel8@sha256:6dfb5e18aa3dc6ce8e2535e13de1d53eea68b218854971e0eb594f677f6da7c7_arm64 as a component of RHOL 5.5 for RHEL 8",
"product_id": "8Base-RHOL-5.5:openshift-logging/elasticsearch6-rhel8@sha256:6dfb5e18aa3dc6ce8e2535e13de1d53eea68b218854971e0eb594f677f6da7c7_arm64"
},
"product_reference": "openshift-logging/elasticsearch6-rhel8@sha256:6dfb5e18aa3dc6ce8e2535e13de1d53eea68b218854971e0eb594f677f6da7c7_arm64",
"relates_to_product_reference": "8Base-RHOL-5.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/elasticsearch6-rhel8@sha256:7c143b790fef75a04e8ed1be49576861651f66371355a3f5aa304a325faf6e5c_s390x as a component of RHOL 5.5 for RHEL 8",
"product_id": "8Base-RHOL-5.5:openshift-logging/elasticsearch6-rhel8@sha256:7c143b790fef75a04e8ed1be49576861651f66371355a3f5aa304a325faf6e5c_s390x"
},
"product_reference": "openshift-logging/elasticsearch6-rhel8@sha256:7c143b790fef75a04e8ed1be49576861651f66371355a3f5aa304a325faf6e5c_s390x",
"relates_to_product_reference": "8Base-RHOL-5.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/elasticsearch6-rhel8@sha256:bf574cff65baba457e3199aae7d1b0e605403a7968e9af746a6cfc5d9a4b29c5_amd64 as a component of RHOL 5.5 for RHEL 8",
"product_id": "8Base-RHOL-5.5:openshift-logging/elasticsearch6-rhel8@sha256:bf574cff65baba457e3199aae7d1b0e605403a7968e9af746a6cfc5d9a4b29c5_amd64"
},
"product_reference": "openshift-logging/elasticsearch6-rhel8@sha256:bf574cff65baba457e3199aae7d1b0e605403a7968e9af746a6cfc5d9a4b29c5_amd64",
"relates_to_product_reference": "8Base-RHOL-5.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/eventrouter-rhel8@sha256:0590711175be3b10f646256407cb7d72df63333589d527199260f738a91f2e3d_arm64 as a component of RHOL 5.5 for RHEL 8",
"product_id": "8Base-RHOL-5.5:openshift-logging/eventrouter-rhel8@sha256:0590711175be3b10f646256407cb7d72df63333589d527199260f738a91f2e3d_arm64"
},
"product_reference": "openshift-logging/eventrouter-rhel8@sha256:0590711175be3b10f646256407cb7d72df63333589d527199260f738a91f2e3d_arm64",
"relates_to_product_reference": "8Base-RHOL-5.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/eventrouter-rhel8@sha256:646995416047cf48070c60b9ab064d454ff9ed772a92558f9627e3832f0ccd3c_amd64 as a component of RHOL 5.5 for RHEL 8",
"product_id": "8Base-RHOL-5.5:openshift-logging/eventrouter-rhel8@sha256:646995416047cf48070c60b9ab064d454ff9ed772a92558f9627e3832f0ccd3c_amd64"
},
"product_reference": "openshift-logging/eventrouter-rhel8@sha256:646995416047cf48070c60b9ab064d454ff9ed772a92558f9627e3832f0ccd3c_amd64",
"relates_to_product_reference": "8Base-RHOL-5.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/eventrouter-rhel8@sha256:ac91af413a363890bb01772488e371e4dc698ecfb77f047bb83bf638d497aa7c_ppc64le as a component of RHOL 5.5 for RHEL 8",
"product_id": "8Base-RHOL-5.5:openshift-logging/eventrouter-rhel8@sha256:ac91af413a363890bb01772488e371e4dc698ecfb77f047bb83bf638d497aa7c_ppc64le"
},
"product_reference": "openshift-logging/eventrouter-rhel8@sha256:ac91af413a363890bb01772488e371e4dc698ecfb77f047bb83bf638d497aa7c_ppc64le",
"relates_to_product_reference": "8Base-RHOL-5.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/eventrouter-rhel8@sha256:eaf322aeccc73ec9d8d5f5a9d6ee368ee3f68409031e18a60cc699e3ca5c144b_s390x as a component of RHOL 5.5 for RHEL 8",
"product_id": "8Base-RHOL-5.5:openshift-logging/eventrouter-rhel8@sha256:eaf322aeccc73ec9d8d5f5a9d6ee368ee3f68409031e18a60cc699e3ca5c144b_s390x"
},
"product_reference": "openshift-logging/eventrouter-rhel8@sha256:eaf322aeccc73ec9d8d5f5a9d6ee368ee3f68409031e18a60cc699e3ca5c144b_s390x",
"relates_to_product_reference": "8Base-RHOL-5.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/fluentd-rhel8@sha256:3d4b83f86b2d2f1c73ab184a3471d0d4da04bb6e76487c9f546da87998e480dc_arm64 as a component of RHOL 5.5 for RHEL 8",
"product_id": "8Base-RHOL-5.5:openshift-logging/fluentd-rhel8@sha256:3d4b83f86b2d2f1c73ab184a3471d0d4da04bb6e76487c9f546da87998e480dc_arm64"
},
"product_reference": "openshift-logging/fluentd-rhel8@sha256:3d4b83f86b2d2f1c73ab184a3471d0d4da04bb6e76487c9f546da87998e480dc_arm64",
"relates_to_product_reference": "8Base-RHOL-5.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/fluentd-rhel8@sha256:490740ea41377e7d18ffba700a5022915edc13f6b38f86a6d9d475dfc61df935_s390x as a component of RHOL 5.5 for RHEL 8",
"product_id": "8Base-RHOL-5.5:openshift-logging/fluentd-rhel8@sha256:490740ea41377e7d18ffba700a5022915edc13f6b38f86a6d9d475dfc61df935_s390x"
},
"product_reference": "openshift-logging/fluentd-rhel8@sha256:490740ea41377e7d18ffba700a5022915edc13f6b38f86a6d9d475dfc61df935_s390x",
"relates_to_product_reference": "8Base-RHOL-5.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/fluentd-rhel8@sha256:790fe2b90b51f8aff5d10b1525bcf7d35e5517674245993dac6696ebf2a24baf_ppc64le as a component of RHOL 5.5 for RHEL 8",
"product_id": "8Base-RHOL-5.5:openshift-logging/fluentd-rhel8@sha256:790fe2b90b51f8aff5d10b1525bcf7d35e5517674245993dac6696ebf2a24baf_ppc64le"
},
"product_reference": "openshift-logging/fluentd-rhel8@sha256:790fe2b90b51f8aff5d10b1525bcf7d35e5517674245993dac6696ebf2a24baf_ppc64le",
"relates_to_product_reference": "8Base-RHOL-5.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/fluentd-rhel8@sha256:dc8fe0ca5a488c6738e6904871a620f9444f30475863a09846f8205569c25e54_amd64 as a component of RHOL 5.5 for RHEL 8",
"product_id": "8Base-RHOL-5.5:openshift-logging/fluentd-rhel8@sha256:dc8fe0ca5a488c6738e6904871a620f9444f30475863a09846f8205569c25e54_amd64"
},
"product_reference": "openshift-logging/fluentd-rhel8@sha256:dc8fe0ca5a488c6738e6904871a620f9444f30475863a09846f8205569c25e54_amd64",
"relates_to_product_reference": "8Base-RHOL-5.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/kibana6-rhel8@sha256:43e4da1a741543ac8cdf646901aff3185e5f30d6fad7e68a2233e2bd8d4ebe4b_s390x as a component of RHOL 5.5 for RHEL 8",
"product_id": "8Base-RHOL-5.5:openshift-logging/kibana6-rhel8@sha256:43e4da1a741543ac8cdf646901aff3185e5f30d6fad7e68a2233e2bd8d4ebe4b_s390x"
},
"product_reference": "openshift-logging/kibana6-rhel8@sha256:43e4da1a741543ac8cdf646901aff3185e5f30d6fad7e68a2233e2bd8d4ebe4b_s390x",
"relates_to_product_reference": "8Base-RHOL-5.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/kibana6-rhel8@sha256:44f3446b172b3ea7f0fd4de9f8039eba256a6bea56715748af00f361e49b1519_amd64 as a component of RHOL 5.5 for RHEL 8",
"product_id": "8Base-RHOL-5.5:openshift-logging/kibana6-rhel8@sha256:44f3446b172b3ea7f0fd4de9f8039eba256a6bea56715748af00f361e49b1519_amd64"
},
"product_reference": "openshift-logging/kibana6-rhel8@sha256:44f3446b172b3ea7f0fd4de9f8039eba256a6bea56715748af00f361e49b1519_amd64",
"relates_to_product_reference": "8Base-RHOL-5.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/kibana6-rhel8@sha256:93c33d6810eb6e71e7e543c1c26a29e163214df64121c814b4424322308b0a30_ppc64le as a component of RHOL 5.5 for RHEL 8",
"product_id": "8Base-RHOL-5.5:openshift-logging/kibana6-rhel8@sha256:93c33d6810eb6e71e7e543c1c26a29e163214df64121c814b4424322308b0a30_ppc64le"
},
"product_reference": "openshift-logging/kibana6-rhel8@sha256:93c33d6810eb6e71e7e543c1c26a29e163214df64121c814b4424322308b0a30_ppc64le",
"relates_to_product_reference": "8Base-RHOL-5.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/kibana6-rhel8@sha256:ca4f273fb088980bfcc3607bd7ea2d40cc93298262cb3f5ce4054a6235152d1e_arm64 as a component of RHOL 5.5 for RHEL 8",
"product_id": "8Base-RHOL-5.5:openshift-logging/kibana6-rhel8@sha256:ca4f273fb088980bfcc3607bd7ea2d40cc93298262cb3f5ce4054a6235152d1e_arm64"
},
"product_reference": "openshift-logging/kibana6-rhel8@sha256:ca4f273fb088980bfcc3607bd7ea2d40cc93298262cb3f5ce4054a6235152d1e_arm64",
"relates_to_product_reference": "8Base-RHOL-5.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/log-file-metric-exporter-rhel8@sha256:44e17bbdb8c7ac0a7868b3be7e29d58401702384dab3a66efaa08d1176035672_s390x as a component of RHOL 5.5 for RHEL 8",
"product_id": "8Base-RHOL-5.5:openshift-logging/log-file-metric-exporter-rhel8@sha256:44e17bbdb8c7ac0a7868b3be7e29d58401702384dab3a66efaa08d1176035672_s390x"
},
"product_reference": "openshift-logging/log-file-metric-exporter-rhel8@sha256:44e17bbdb8c7ac0a7868b3be7e29d58401702384dab3a66efaa08d1176035672_s390x",
"relates_to_product_reference": "8Base-RHOL-5.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/log-file-metric-exporter-rhel8@sha256:8b76243469011045e72b7a339288986e7561a3005aa94d580d5b1082580e9cec_ppc64le as a component of RHOL 5.5 for RHEL 8",
"product_id": "8Base-RHOL-5.5:openshift-logging/log-file-metric-exporter-rhel8@sha256:8b76243469011045e72b7a339288986e7561a3005aa94d580d5b1082580e9cec_ppc64le"
},
"product_reference": "openshift-logging/log-file-metric-exporter-rhel8@sha256:8b76243469011045e72b7a339288986e7561a3005aa94d580d5b1082580e9cec_ppc64le",
"relates_to_product_reference": "8Base-RHOL-5.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/log-file-metric-exporter-rhel8@sha256:e91d4b026d38091cb707e0213f329d0781a3517f3eca4d209d09d6c1edb1a1d3_amd64 as a component of RHOL 5.5 for RHEL 8",
"product_id": "8Base-RHOL-5.5:openshift-logging/log-file-metric-exporter-rhel8@sha256:e91d4b026d38091cb707e0213f329d0781a3517f3eca4d209d09d6c1edb1a1d3_amd64"
},
"product_reference": "openshift-logging/log-file-metric-exporter-rhel8@sha256:e91d4b026d38091cb707e0213f329d0781a3517f3eca4d209d09d6c1edb1a1d3_amd64",
"relates_to_product_reference": "8Base-RHOL-5.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/log-file-metric-exporter-rhel8@sha256:f0ca78341daa3d41ffe460f5aa504219c72ee673dd57a82f344d3239b69717be_arm64 as a component of RHOL 5.5 for RHEL 8",
"product_id": "8Base-RHOL-5.5:openshift-logging/log-file-metric-exporter-rhel8@sha256:f0ca78341daa3d41ffe460f5aa504219c72ee673dd57a82f344d3239b69717be_arm64"
},
"product_reference": "openshift-logging/log-file-metric-exporter-rhel8@sha256:f0ca78341daa3d41ffe460f5aa504219c72ee673dd57a82f344d3239b69717be_arm64",
"relates_to_product_reference": "8Base-RHOL-5.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/logging-curator5-rhel8@sha256:6f17fc02901a898b77c674cd4ba1764423e849c5faa888b2907ff7356accc66c_s390x as a component of RHOL 5.5 for RHEL 8",
"product_id": "8Base-RHOL-5.5:openshift-logging/logging-curator5-rhel8@sha256:6f17fc02901a898b77c674cd4ba1764423e849c5faa888b2907ff7356accc66c_s390x"
},
"product_reference": "openshift-logging/logging-curator5-rhel8@sha256:6f17fc02901a898b77c674cd4ba1764423e849c5faa888b2907ff7356accc66c_s390x",
"relates_to_product_reference": "8Base-RHOL-5.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/logging-curator5-rhel8@sha256:c8ea484f5e15b7b53941f251db9b5be08c8cb6f3a14d99285277d9eadf969e98_arm64 as a component of RHOL 5.5 for RHEL 8",
"product_id": "8Base-RHOL-5.5:openshift-logging/logging-curator5-rhel8@sha256:c8ea484f5e15b7b53941f251db9b5be08c8cb6f3a14d99285277d9eadf969e98_arm64"
},
"product_reference": "openshift-logging/logging-curator5-rhel8@sha256:c8ea484f5e15b7b53941f251db9b5be08c8cb6f3a14d99285277d9eadf969e98_arm64",
"relates_to_product_reference": "8Base-RHOL-5.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/logging-curator5-rhel8@sha256:e26efb87488b53ebd4e5233515906974675b3a759f4a1c00f447df8821d5f030_ppc64le as a component of RHOL 5.5 for RHEL 8",
"product_id": "8Base-RHOL-5.5:openshift-logging/logging-curator5-rhel8@sha256:e26efb87488b53ebd4e5233515906974675b3a759f4a1c00f447df8821d5f030_ppc64le"
},
"product_reference": "openshift-logging/logging-curator5-rhel8@sha256:e26efb87488b53ebd4e5233515906974675b3a759f4a1c00f447df8821d5f030_ppc64le",
"relates_to_product_reference": "8Base-RHOL-5.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/logging-curator5-rhel8@sha256:e6ae5eef57de608fb1d4393fe824d0befffd8f5b696b5ce44e571fdcddb46f1f_amd64 as a component of RHOL 5.5 for RHEL 8",
"product_id": "8Base-RHOL-5.5:openshift-logging/logging-curator5-rhel8@sha256:e6ae5eef57de608fb1d4393fe824d0befffd8f5b696b5ce44e571fdcddb46f1f_amd64"
},
"product_reference": "openshift-logging/logging-curator5-rhel8@sha256:e6ae5eef57de608fb1d4393fe824d0befffd8f5b696b5ce44e571fdcddb46f1f_amd64",
"relates_to_product_reference": "8Base-RHOL-5.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/logging-loki-rhel8@sha256:6242c3792c8c0469012be8b0140c2476e41f80b5271ba78ff42c63aa041be30f_s390x as a component of RHOL 5.5 for RHEL 8",
"product_id": "8Base-RHOL-5.5:openshift-logging/logging-loki-rhel8@sha256:6242c3792c8c0469012be8b0140c2476e41f80b5271ba78ff42c63aa041be30f_s390x"
},
"product_reference": "openshift-logging/logging-loki-rhel8@sha256:6242c3792c8c0469012be8b0140c2476e41f80b5271ba78ff42c63aa041be30f_s390x",
"relates_to_product_reference": "8Base-RHOL-5.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/logging-loki-rhel8@sha256:947becc46b99656f9faa6067f2cf38dbef0d40e85b56d62aafcb243052920dfc_amd64 as a component of RHOL 5.5 for RHEL 8",
"product_id": "8Base-RHOL-5.5:openshift-logging/logging-loki-rhel8@sha256:947becc46b99656f9faa6067f2cf38dbef0d40e85b56d62aafcb243052920dfc_amd64"
},
"product_reference": "openshift-logging/logging-loki-rhel8@sha256:947becc46b99656f9faa6067f2cf38dbef0d40e85b56d62aafcb243052920dfc_amd64",
"relates_to_product_reference": "8Base-RHOL-5.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/logging-loki-rhel8@sha256:969ce1d586fb7fbdd65d07c0b790f48fd6f81e659d1323514906bb03ae9fe79b_ppc64le as a component of RHOL 5.5 for RHEL 8",
"product_id": "8Base-RHOL-5.5:openshift-logging/logging-loki-rhel8@sha256:969ce1d586fb7fbdd65d07c0b790f48fd6f81e659d1323514906bb03ae9fe79b_ppc64le"
},
"product_reference": "openshift-logging/logging-loki-rhel8@sha256:969ce1d586fb7fbdd65d07c0b790f48fd6f81e659d1323514906bb03ae9fe79b_ppc64le",
"relates_to_product_reference": "8Base-RHOL-5.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/logging-loki-rhel8@sha256:dd5e5a043befc54eeb63ff51a01691778053c90de5c9b8946d6a1d808fbcf0df_arm64 as a component of RHOL 5.5 for RHEL 8",
"product_id": "8Base-RHOL-5.5:openshift-logging/logging-loki-rhel8@sha256:dd5e5a043befc54eeb63ff51a01691778053c90de5c9b8946d6a1d808fbcf0df_arm64"
},
"product_reference": "openshift-logging/logging-loki-rhel8@sha256:dd5e5a043befc54eeb63ff51a01691778053c90de5c9b8946d6a1d808fbcf0df_arm64",
"relates_to_product_reference": "8Base-RHOL-5.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/logging-view-plugin-rhel8@sha256:147676e1a3c66757508be0046c28ccb7985f15af7f8f4a045fa5ca424c0c684d_arm64 as a component of RHOL 5.5 for RHEL 8",
"product_id": "8Base-RHOL-5.5:openshift-logging/logging-view-plugin-rhel8@sha256:147676e1a3c66757508be0046c28ccb7985f15af7f8f4a045fa5ca424c0c684d_arm64"
},
"product_reference": "openshift-logging/logging-view-plugin-rhel8@sha256:147676e1a3c66757508be0046c28ccb7985f15af7f8f4a045fa5ca424c0c684d_arm64",
"relates_to_product_reference": "8Base-RHOL-5.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/logging-view-plugin-rhel8@sha256:bea8f3f31073874a77af55c8664cbf167cd8bad5296e1bf444b9490b06484b56_amd64 as a component of RHOL 5.5 for RHEL 8",
"product_id": "8Base-RHOL-5.5:openshift-logging/logging-view-plugin-rhel8@sha256:bea8f3f31073874a77af55c8664cbf167cd8bad5296e1bf444b9490b06484b56_amd64"
},
"product_reference": "openshift-logging/logging-view-plugin-rhel8@sha256:bea8f3f31073874a77af55c8664cbf167cd8bad5296e1bf444b9490b06484b56_amd64",
"relates_to_product_reference": "8Base-RHOL-5.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/logging-view-plugin-rhel8@sha256:da8c90c5b3b68e9b98a76828a450a9d7c579256b04aa9daf87ddfab9bad5548c_ppc64le as a component of RHOL 5.5 for RHEL 8",
"product_id": "8Base-RHOL-5.5:openshift-logging/logging-view-plugin-rhel8@sha256:da8c90c5b3b68e9b98a76828a450a9d7c579256b04aa9daf87ddfab9bad5548c_ppc64le"
},
"product_reference": "openshift-logging/logging-view-plugin-rhel8@sha256:da8c90c5b3b68e9b98a76828a450a9d7c579256b04aa9daf87ddfab9bad5548c_ppc64le",
"relates_to_product_reference": "8Base-RHOL-5.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/logging-view-plugin-rhel8@sha256:e3e5b570f9c819cb10ad38e928a301e8f0554e45052037b03f1ba81a3faa6a15_s390x as a component of RHOL 5.5 for RHEL 8",
"product_id": "8Base-RHOL-5.5:openshift-logging/logging-view-plugin-rhel8@sha256:e3e5b570f9c819cb10ad38e928a301e8f0554e45052037b03f1ba81a3faa6a15_s390x"
},
"product_reference": "openshift-logging/logging-view-plugin-rhel8@sha256:e3e5b570f9c819cb10ad38e928a301e8f0554e45052037b03f1ba81a3faa6a15_s390x",
"relates_to_product_reference": "8Base-RHOL-5.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/loki-operator-bundle@sha256:1d75006c9d03648857963a8772644d4228361d97fb07c8652326b61fd5d30f8c_amd64 as a component of RHOL 5.5 for RHEL 8",
"product_id": "8Base-RHOL-5.5:openshift-logging/loki-operator-bundle@sha256:1d75006c9d03648857963a8772644d4228361d97fb07c8652326b61fd5d30f8c_amd64"
},
"product_reference": "openshift-logging/loki-operator-bundle@sha256:1d75006c9d03648857963a8772644d4228361d97fb07c8652326b61fd5d30f8c_amd64",
"relates_to_product_reference": "8Base-RHOL-5.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/loki-rhel8-operator@sha256:43fae2b6532712da7d0f83b5dda5797c9764fcac4b0e18580a19e54ee7dfcff6_s390x as a component of RHOL 5.5 for RHEL 8",
"product_id": "8Base-RHOL-5.5:openshift-logging/loki-rhel8-operator@sha256:43fae2b6532712da7d0f83b5dda5797c9764fcac4b0e18580a19e54ee7dfcff6_s390x"
},
"product_reference": "openshift-logging/loki-rhel8-operator@sha256:43fae2b6532712da7d0f83b5dda5797c9764fcac4b0e18580a19e54ee7dfcff6_s390x",
"relates_to_product_reference": "8Base-RHOL-5.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/loki-rhel8-operator@sha256:4eba6362f8aaa0450d07b87824148d2c15232b871d0ba6bc34f1962d2970e753_ppc64le as a component of RHOL 5.5 for RHEL 8",
"product_id": "8Base-RHOL-5.5:openshift-logging/loki-rhel8-operator@sha256:4eba6362f8aaa0450d07b87824148d2c15232b871d0ba6bc34f1962d2970e753_ppc64le"
},
"product_reference": "openshift-logging/loki-rhel8-operator@sha256:4eba6362f8aaa0450d07b87824148d2c15232b871d0ba6bc34f1962d2970e753_ppc64le",
"relates_to_product_reference": "8Base-RHOL-5.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/loki-rhel8-operator@sha256:dfa4ca06abb576fa071fb30c425bc6be631c0453939de562e1dc0b4e76de4f81_arm64 as a component of RHOL 5.5 for RHEL 8",
"product_id": "8Base-RHOL-5.5:openshift-logging/loki-rhel8-operator@sha256:dfa4ca06abb576fa071fb30c425bc6be631c0453939de562e1dc0b4e76de4f81_arm64"
},
"product_reference": "openshift-logging/loki-rhel8-operator@sha256:dfa4ca06abb576fa071fb30c425bc6be631c0453939de562e1dc0b4e76de4f81_arm64",
"relates_to_product_reference": "8Base-RHOL-5.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/loki-rhel8-operator@sha256:e5289e40532a01c605760b2f438acfb66257b730a89249269e46dc9c0058aec1_amd64 as a component of RHOL 5.5 for RHEL 8",
"product_id": "8Base-RHOL-5.5:openshift-logging/loki-rhel8-operator@sha256:e5289e40532a01c605760b2f438acfb66257b730a89249269e46dc9c0058aec1_amd64"
},
"product_reference": "openshift-logging/loki-rhel8-operator@sha256:e5289e40532a01c605760b2f438acfb66257b730a89249269e46dc9c0058aec1_amd64",
"relates_to_product_reference": "8Base-RHOL-5.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/lokistack-gateway-rhel8@sha256:0a3eb7a1a50b75528be737eb2768e671a643eea324c967a0381296b61f8e399e_arm64 as a component of RHOL 5.5 for RHEL 8",
"product_id": "8Base-RHOL-5.5:openshift-logging/lokistack-gateway-rhel8@sha256:0a3eb7a1a50b75528be737eb2768e671a643eea324c967a0381296b61f8e399e_arm64"
},
"product_reference": "openshift-logging/lokistack-gateway-rhel8@sha256:0a3eb7a1a50b75528be737eb2768e671a643eea324c967a0381296b61f8e399e_arm64",
"relates_to_product_reference": "8Base-RHOL-5.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/lokistack-gateway-rhel8@sha256:42ebf89821e0f8e4b7d03cc5a6d5a30d48f73a1ab2b7486c8a0bb1e5c2cfd4b4_ppc64le as a component of RHOL 5.5 for RHEL 8",
"product_id": "8Base-RHOL-5.5:openshift-logging/lokistack-gateway-rhel8@sha256:42ebf89821e0f8e4b7d03cc5a6d5a30d48f73a1ab2b7486c8a0bb1e5c2cfd4b4_ppc64le"
},
"product_reference": "openshift-logging/lokistack-gateway-rhel8@sha256:42ebf89821e0f8e4b7d03cc5a6d5a30d48f73a1ab2b7486c8a0bb1e5c2cfd4b4_ppc64le",
"relates_to_product_reference": "8Base-RHOL-5.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/lokistack-gateway-rhel8@sha256:449f4cf0b3d0c0d6724cc2346c2121df58ef43297c56cc540e05158ad5c8ffbc_amd64 as a component of RHOL 5.5 for RHEL 8",
"product_id": "8Base-RHOL-5.5:openshift-logging/lokistack-gateway-rhel8@sha256:449f4cf0b3d0c0d6724cc2346c2121df58ef43297c56cc540e05158ad5c8ffbc_amd64"
},
"product_reference": "openshift-logging/lokistack-gateway-rhel8@sha256:449f4cf0b3d0c0d6724cc2346c2121df58ef43297c56cc540e05158ad5c8ffbc_amd64",
"relates_to_product_reference": "8Base-RHOL-5.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/lokistack-gateway-rhel8@sha256:5954a498e527ee59a3f655250a4f5535a26b49c6fd61889271affb08104839f8_s390x as a component of RHOL 5.5 for RHEL 8",
"product_id": "8Base-RHOL-5.5:openshift-logging/lokistack-gateway-rhel8@sha256:5954a498e527ee59a3f655250a4f5535a26b49c6fd61889271affb08104839f8_s390x"
},
"product_reference": "openshift-logging/lokistack-gateway-rhel8@sha256:5954a498e527ee59a3f655250a4f5535a26b49c6fd61889271affb08104839f8_s390x",
"relates_to_product_reference": "8Base-RHOL-5.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/opa-openshift-rhel8@sha256:4c1b37da97e80aa76f2612f34745180a026214a415ed9a186ab81ec8fa96e17d_amd64 as a component of RHOL 5.5 for RHEL 8",
"product_id": "8Base-RHOL-5.5:openshift-logging/opa-openshift-rhel8@sha256:4c1b37da97e80aa76f2612f34745180a026214a415ed9a186ab81ec8fa96e17d_amd64"
},
"product_reference": "openshift-logging/opa-openshift-rhel8@sha256:4c1b37da97e80aa76f2612f34745180a026214a415ed9a186ab81ec8fa96e17d_amd64",
"relates_to_product_reference": "8Base-RHOL-5.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/opa-openshift-rhel8@sha256:847c70de5af59c9aec366612a74477de931977cf79d5f9ed117772e931589497_ppc64le as a component of RHOL 5.5 for RHEL 8",
"product_id": "8Base-RHOL-5.5:openshift-logging/opa-openshift-rhel8@sha256:847c70de5af59c9aec366612a74477de931977cf79d5f9ed117772e931589497_ppc64le"
},
"product_reference": "openshift-logging/opa-openshift-rhel8@sha256:847c70de5af59c9aec366612a74477de931977cf79d5f9ed117772e931589497_ppc64le",
"relates_to_product_reference": "8Base-RHOL-5.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/opa-openshift-rhel8@sha256:c8458b60077d018eaa78f38fc0b85786d8108b88faea6e420cc01b720f23af48_arm64 as a component of RHOL 5.5 for RHEL 8",
"product_id": "8Base-RHOL-5.5:openshift-logging/opa-openshift-rhel8@sha256:c8458b60077d018eaa78f38fc0b85786d8108b88faea6e420cc01b720f23af48_arm64"
},
"product_reference": "openshift-logging/opa-openshift-rhel8@sha256:c8458b60077d018eaa78f38fc0b85786d8108b88faea6e420cc01b720f23af48_arm64",
"relates_to_product_reference": "8Base-RHOL-5.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/opa-openshift-rhel8@sha256:fc99739f4354e8b28613f50b441d3f7a93bea3e3b106d7c052b607c24b994b9e_s390x as a component of RHOL 5.5 for RHEL 8",
"product_id": "8Base-RHOL-5.5:openshift-logging/opa-openshift-rhel8@sha256:fc99739f4354e8b28613f50b441d3f7a93bea3e3b106d7c052b607c24b994b9e_s390x"
},
"product_reference": "openshift-logging/opa-openshift-rhel8@sha256:fc99739f4354e8b28613f50b441d3f7a93bea3e3b106d7c052b607c24b994b9e_s390x",
"relates_to_product_reference": "8Base-RHOL-5.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/vector-rhel8@sha256:6c237605a0062e69e10a1fad47375f9c51dbccb110e1d11a02f2b7101d611e8f_amd64 as a component of RHOL 5.5 for RHEL 8",
"product_id": "8Base-RHOL-5.5:openshift-logging/vector-rhel8@sha256:6c237605a0062e69e10a1fad47375f9c51dbccb110e1d11a02f2b7101d611e8f_amd64"
},
"product_reference": "openshift-logging/vector-rhel8@sha256:6c237605a0062e69e10a1fad47375f9c51dbccb110e1d11a02f2b7101d611e8f_amd64",
"relates_to_product_reference": "8Base-RHOL-5.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/vector-rhel8@sha256:6c8b9e91e4d527bc0694879c7ce908e3d67877fd53191b71af95191cc0149afa_arm64 as a component of RHOL 5.5 for RHEL 8",
"product_id": "8Base-RHOL-5.5:openshift-logging/vector-rhel8@sha256:6c8b9e91e4d527bc0694879c7ce908e3d67877fd53191b71af95191cc0149afa_arm64"
},
"product_reference": "openshift-logging/vector-rhel8@sha256:6c8b9e91e4d527bc0694879c7ce908e3d67877fd53191b71af95191cc0149afa_arm64",
"relates_to_product_reference": "8Base-RHOL-5.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/vector-rhel8@sha256:b22fe4e184b908986301fda4d2b57f4b9b91149168386a8d9c7ac9b0c4631c7c_ppc64le as a component of RHOL 5.5 for RHEL 8",
"product_id": "8Base-RHOL-5.5:openshift-logging/vector-rhel8@sha256:b22fe4e184b908986301fda4d2b57f4b9b91149168386a8d9c7ac9b0c4631c7c_ppc64le"
},
"product_reference": "openshift-logging/vector-rhel8@sha256:b22fe4e184b908986301fda4d2b57f4b9b91149168386a8d9c7ac9b0c4631c7c_ppc64le",
"relates_to_product_reference": "8Base-RHOL-5.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/vector-rhel8@sha256:c117a0024d06340a9a28686c144642d6591192738f263f4684a7d09af0b16c71_s390x as a component of RHOL 5.5 for RHEL 8",
"product_id": "8Base-RHOL-5.5:openshift-logging/vector-rhel8@sha256:c117a0024d06340a9a28686c144642d6591192738f263f4684a7d09af0b16c71_s390x"
},
"product_reference": "openshift-logging/vector-rhel8@sha256:c117a0024d06340a9a28686c144642d6591192738f263f4684a7d09af0b16c71_s390x",
"relates_to_product_reference": "8Base-RHOL-5.5"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2022-32149",
"cwe": {
"id": "CWE-407",
"name": "Inefficient Algorithmic Complexity"
},
"discovery_date": "2022-10-12T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-RHOL-5.5:openshift-logging/cluster-logging-operator-bundle@sha256:a78fd59207ef6cc8ddaaa3f3ae7140b7678e96e0677517623d1537afc05e84dd_amd64",
"8Base-RHOL-5.5:openshift-logging/cluster-logging-rhel8-operator@sha256:07ab076aa9b573d330ace59bf4de080ea64dbc7b3424357fc39c0c70ede27873_arm64",
"8Base-RHOL-5.5:openshift-logging/cluster-logging-rhel8-operator@sha256:11c10388503a708a962e3dfc5cdd9b6ad5c5d4d4a68b11f97f8fae2cc3884083_s390x",
"8Base-RHOL-5.5:openshift-logging/cluster-logging-rhel8-operator@sha256:414649f77a20e04b3eb16d64acf81a4d261394016d4a890da309cbb8216c1d4a_amd64",
"8Base-RHOL-5.5:openshift-logging/cluster-logging-rhel8-operator@sha256:b4eeab42904e5a81e7adb8801bd901a53a5b81b2464b33816c203daf7587f89f_ppc64le",
"8Base-RHOL-5.5:openshift-logging/elasticsearch-operator-bundle@sha256:d09cafc7f6bbb446608051cebb1c943575e80f9987bb4cad8af53e0354a0e7cd_amd64",
"8Base-RHOL-5.5:openshift-logging/elasticsearch-rhel8-operator@sha256:5236634419119024d3f8779dbd78639a54c2323389f56fbf25dacdc499a072d3_s390x",
"8Base-RHOL-5.5:openshift-logging/elasticsearch-rhel8-operator@sha256:64954ce7d233d6c109e46645cd8d55d8a06068328ce3a22f646ede7c9fde78c8_ppc64le",
"8Base-RHOL-5.5:openshift-logging/elasticsearch-rhel8-operator@sha256:c25b7b7c0f073fdfcf9fd90572790064cdff26d61a4e4db751d4197ff2c5b4c1_amd64",
"8Base-RHOL-5.5:openshift-logging/elasticsearch-rhel8-operator@sha256:dce08ac53092fc51958b78df9b4b870926a079fe4cdc4fb2d46c8ba545a22e6a_arm64",
"8Base-RHOL-5.5:openshift-logging/elasticsearch6-rhel8@sha256:1019e03ddff4726caae53e800403cbaa82ce057c7553552ad027a37d3be5824f_ppc64le",
"8Base-RHOL-5.5:openshift-logging/elasticsearch6-rhel8@sha256:6dfb5e18aa3dc6ce8e2535e13de1d53eea68b218854971e0eb594f677f6da7c7_arm64",
"8Base-RHOL-5.5:openshift-logging/elasticsearch6-rhel8@sha256:7c143b790fef75a04e8ed1be49576861651f66371355a3f5aa304a325faf6e5c_s390x",
"8Base-RHOL-5.5:openshift-logging/elasticsearch6-rhel8@sha256:bf574cff65baba457e3199aae7d1b0e605403a7968e9af746a6cfc5d9a4b29c5_amd64",
"8Base-RHOL-5.5:openshift-logging/eventrouter-rhel8@sha256:0590711175be3b10f646256407cb7d72df63333589d527199260f738a91f2e3d_arm64",
"8Base-RHOL-5.5:openshift-logging/eventrouter-rhel8@sha256:646995416047cf48070c60b9ab064d454ff9ed772a92558f9627e3832f0ccd3c_amd64",
"8Base-RHOL-5.5:openshift-logging/eventrouter-rhel8@sha256:ac91af413a363890bb01772488e371e4dc698ecfb77f047bb83bf638d497aa7c_ppc64le",
"8Base-RHOL-5.5:openshift-logging/eventrouter-rhel8@sha256:eaf322aeccc73ec9d8d5f5a9d6ee368ee3f68409031e18a60cc699e3ca5c144b_s390x",
"8Base-RHOL-5.5:openshift-logging/fluentd-rhel8@sha256:3d4b83f86b2d2f1c73ab184a3471d0d4da04bb6e76487c9f546da87998e480dc_arm64",
"8Base-RHOL-5.5:openshift-logging/fluentd-rhel8@sha256:490740ea41377e7d18ffba700a5022915edc13f6b38f86a6d9d475dfc61df935_s390x",
"8Base-RHOL-5.5:openshift-logging/fluentd-rhel8@sha256:790fe2b90b51f8aff5d10b1525bcf7d35e5517674245993dac6696ebf2a24baf_ppc64le",
"8Base-RHOL-5.5:openshift-logging/fluentd-rhel8@sha256:dc8fe0ca5a488c6738e6904871a620f9444f30475863a09846f8205569c25e54_amd64",
"8Base-RHOL-5.5:openshift-logging/kibana6-rhel8@sha256:43e4da1a741543ac8cdf646901aff3185e5f30d6fad7e68a2233e2bd8d4ebe4b_s390x",
"8Base-RHOL-5.5:openshift-logging/kibana6-rhel8@sha256:44f3446b172b3ea7f0fd4de9f8039eba256a6bea56715748af00f361e49b1519_amd64",
"8Base-RHOL-5.5:openshift-logging/kibana6-rhel8@sha256:93c33d6810eb6e71e7e543c1c26a29e163214df64121c814b4424322308b0a30_ppc64le",
"8Base-RHOL-5.5:openshift-logging/kibana6-rhel8@sha256:ca4f273fb088980bfcc3607bd7ea2d40cc93298262cb3f5ce4054a6235152d1e_arm64",
"8Base-RHOL-5.5:openshift-logging/log-file-metric-exporter-rhel8@sha256:44e17bbdb8c7ac0a7868b3be7e29d58401702384dab3a66efaa08d1176035672_s390x",
"8Base-RHOL-5.5:openshift-logging/log-file-metric-exporter-rhel8@sha256:8b76243469011045e72b7a339288986e7561a3005aa94d580d5b1082580e9cec_ppc64le",
"8Base-RHOL-5.5:openshift-logging/log-file-metric-exporter-rhel8@sha256:e91d4b026d38091cb707e0213f329d0781a3517f3eca4d209d09d6c1edb1a1d3_amd64",
"8Base-RHOL-5.5:openshift-logging/log-file-metric-exporter-rhel8@sha256:f0ca78341daa3d41ffe460f5aa504219c72ee673dd57a82f344d3239b69717be_arm64",
"8Base-RHOL-5.5:openshift-logging/logging-curator5-rhel8@sha256:6f17fc02901a898b77c674cd4ba1764423e849c5faa888b2907ff7356accc66c_s390x",
"8Base-RHOL-5.5:openshift-logging/logging-curator5-rhel8@sha256:c8ea484f5e15b7b53941f251db9b5be08c8cb6f3a14d99285277d9eadf969e98_arm64",
"8Base-RHOL-5.5:openshift-logging/logging-curator5-rhel8@sha256:e26efb87488b53ebd4e5233515906974675b3a759f4a1c00f447df8821d5f030_ppc64le",
"8Base-RHOL-5.5:openshift-logging/logging-curator5-rhel8@sha256:e6ae5eef57de608fb1d4393fe824d0befffd8f5b696b5ce44e571fdcddb46f1f_amd64",
"8Base-RHOL-5.5:openshift-logging/logging-loki-rhel8@sha256:6242c3792c8c0469012be8b0140c2476e41f80b5271ba78ff42c63aa041be30f_s390x",
"8Base-RHOL-5.5:openshift-logging/logging-loki-rhel8@sha256:947becc46b99656f9faa6067f2cf38dbef0d40e85b56d62aafcb243052920dfc_amd64",
"8Base-RHOL-5.5:openshift-logging/logging-loki-rhel8@sha256:969ce1d586fb7fbdd65d07c0b790f48fd6f81e659d1323514906bb03ae9fe79b_ppc64le",
"8Base-RHOL-5.5:openshift-logging/logging-loki-rhel8@sha256:dd5e5a043befc54eeb63ff51a01691778053c90de5c9b8946d6a1d808fbcf0df_arm64",
"8Base-RHOL-5.5:openshift-logging/logging-view-plugin-rhel8@sha256:147676e1a3c66757508be0046c28ccb7985f15af7f8f4a045fa5ca424c0c684d_arm64",
"8Base-RHOL-5.5:openshift-logging/logging-view-plugin-rhel8@sha256:bea8f3f31073874a77af55c8664cbf167cd8bad5296e1bf444b9490b06484b56_amd64",
"8Base-RHOL-5.5:openshift-logging/logging-view-plugin-rhel8@sha256:da8c90c5b3b68e9b98a76828a450a9d7c579256b04aa9daf87ddfab9bad5548c_ppc64le",
"8Base-RHOL-5.5:openshift-logging/logging-view-plugin-rhel8@sha256:e3e5b570f9c819cb10ad38e928a301e8f0554e45052037b03f1ba81a3faa6a15_s390x",
"8Base-RHOL-5.5:openshift-logging/loki-operator-bundle@sha256:1d75006c9d03648857963a8772644d4228361d97fb07c8652326b61fd5d30f8c_amd64",
"8Base-RHOL-5.5:openshift-logging/loki-rhel8-operator@sha256:43fae2b6532712da7d0f83b5dda5797c9764fcac4b0e18580a19e54ee7dfcff6_s390x",
"8Base-RHOL-5.5:openshift-logging/loki-rhel8-operator@sha256:4eba6362f8aaa0450d07b87824148d2c15232b871d0ba6bc34f1962d2970e753_ppc64le",
"8Base-RHOL-5.5:openshift-logging/loki-rhel8-operator@sha256:dfa4ca06abb576fa071fb30c425bc6be631c0453939de562e1dc0b4e76de4f81_arm64",
"8Base-RHOL-5.5:openshift-logging/loki-rhel8-operator@sha256:e5289e40532a01c605760b2f438acfb66257b730a89249269e46dc9c0058aec1_amd64",
"8Base-RHOL-5.5:openshift-logging/lokistack-gateway-rhel8@sha256:0a3eb7a1a50b75528be737eb2768e671a643eea324c967a0381296b61f8e399e_arm64",
"8Base-RHOL-5.5:openshift-logging/lokistack-gateway-rhel8@sha256:42ebf89821e0f8e4b7d03cc5a6d5a30d48f73a1ab2b7486c8a0bb1e5c2cfd4b4_ppc64le",
"8Base-RHOL-5.5:openshift-logging/lokistack-gateway-rhel8@sha256:449f4cf0b3d0c0d6724cc2346c2121df58ef43297c56cc540e05158ad5c8ffbc_amd64",
"8Base-RHOL-5.5:openshift-logging/lokistack-gateway-rhel8@sha256:5954a498e527ee59a3f655250a4f5535a26b49c6fd61889271affb08104839f8_s390x",
"8Base-RHOL-5.5:openshift-logging/opa-openshift-rhel8@sha256:4c1b37da97e80aa76f2612f34745180a026214a415ed9a186ab81ec8fa96e17d_amd64",
"8Base-RHOL-5.5:openshift-logging/opa-openshift-rhel8@sha256:847c70de5af59c9aec366612a74477de931977cf79d5f9ed117772e931589497_ppc64le",
"8Base-RHOL-5.5:openshift-logging/opa-openshift-rhel8@sha256:c8458b60077d018eaa78f38fc0b85786d8108b88faea6e420cc01b720f23af48_arm64",
"8Base-RHOL-5.5:openshift-logging/opa-openshift-rhel8@sha256:fc99739f4354e8b28613f50b441d3f7a93bea3e3b106d7c052b607c24b994b9e_s390x",
"8Base-RHOL-5.5:openshift-logging/vector-rhel8@sha256:6c237605a0062e69e10a1fad47375f9c51dbccb110e1d11a02f2b7101d611e8f_amd64",
"8Base-RHOL-5.5:openshift-logging/vector-rhel8@sha256:6c8b9e91e4d527bc0694879c7ce908e3d67877fd53191b71af95191cc0149afa_arm64",
"8Base-RHOL-5.5:openshift-logging/vector-rhel8@sha256:b22fe4e184b908986301fda4d2b57f4b9b91149168386a8d9c7ac9b0c4631c7c_ppc64le",
"8Base-RHOL-5.5:openshift-logging/vector-rhel8@sha256:c117a0024d06340a9a28686c144642d6591192738f263f4684a7d09af0b16c71_s390x"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2134010"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in the golang.org/x/text/language package. An attacker can craft an Accept-Language header which ParseAcceptLanguage will take significant time to parse. This issue leads to a denial of service, and can impact availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: golang.org/x/text/language: ParseAcceptLanguage takes a long time to parse complex tags",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-RHOL-5.5:openshift-logging/elasticsearch-proxy-rhel8@sha256:89f980b63cbcf7956449d8cee41c884ea4ae7d76f02454f7e32058576fd92fa5_ppc64le",
"8Base-RHOL-5.5:openshift-logging/elasticsearch-proxy-rhel8@sha256:a6c03fd0fe66206bff59ba019cc60085de4c65d4efae8a637f1ac48b91688371_arm64",
"8Base-RHOL-5.5:openshift-logging/elasticsearch-proxy-rhel8@sha256:dcdd0c515b3b5a1a6e807929fb8e8d65c1ee2aba3bf696d2b9f852e8994e47b8_s390x",
"8Base-RHOL-5.5:openshift-logging/elasticsearch-proxy-rhel8@sha256:e1755002225548182e17bd82b1c129b2ac61e623c3c37c4d51a535012088cacc_amd64"
],
"known_not_affected": [
"8Base-RHOL-5.5:openshift-logging/cluster-logging-operator-bundle@sha256:a78fd59207ef6cc8ddaaa3f3ae7140b7678e96e0677517623d1537afc05e84dd_amd64",
"8Base-RHOL-5.5:openshift-logging/cluster-logging-rhel8-operator@sha256:07ab076aa9b573d330ace59bf4de080ea64dbc7b3424357fc39c0c70ede27873_arm64",
"8Base-RHOL-5.5:openshift-logging/cluster-logging-rhel8-operator@sha256:11c10388503a708a962e3dfc5cdd9b6ad5c5d4d4a68b11f97f8fae2cc3884083_s390x",
"8Base-RHOL-5.5:openshift-logging/cluster-logging-rhel8-operator@sha256:414649f77a20e04b3eb16d64acf81a4d261394016d4a890da309cbb8216c1d4a_amd64",
"8Base-RHOL-5.5:openshift-logging/cluster-logging-rhel8-operator@sha256:b4eeab42904e5a81e7adb8801bd901a53a5b81b2464b33816c203daf7587f89f_ppc64le",
"8Base-RHOL-5.5:openshift-logging/elasticsearch-operator-bundle@sha256:d09cafc7f6bbb446608051cebb1c943575e80f9987bb4cad8af53e0354a0e7cd_amd64",
"8Base-RHOL-5.5:openshift-logging/elasticsearch-rhel8-operator@sha256:5236634419119024d3f8779dbd78639a54c2323389f56fbf25dacdc499a072d3_s390x",
"8Base-RHOL-5.5:openshift-logging/elasticsearch-rhel8-operator@sha256:64954ce7d233d6c109e46645cd8d55d8a06068328ce3a22f646ede7c9fde78c8_ppc64le",
"8Base-RHOL-5.5:openshift-logging/elasticsearch-rhel8-operator@sha256:c25b7b7c0f073fdfcf9fd90572790064cdff26d61a4e4db751d4197ff2c5b4c1_amd64",
"8Base-RHOL-5.5:openshift-logging/elasticsearch-rhel8-operator@sha256:dce08ac53092fc51958b78df9b4b870926a079fe4cdc4fb2d46c8ba545a22e6a_arm64",
"8Base-RHOL-5.5:openshift-logging/elasticsearch6-rhel8@sha256:1019e03ddff4726caae53e800403cbaa82ce057c7553552ad027a37d3be5824f_ppc64le",
"8Base-RHOL-5.5:openshift-logging/elasticsearch6-rhel8@sha256:6dfb5e18aa3dc6ce8e2535e13de1d53eea68b218854971e0eb594f677f6da7c7_arm64",
"8Base-RHOL-5.5:openshift-logging/elasticsearch6-rhel8@sha256:7c143b790fef75a04e8ed1be49576861651f66371355a3f5aa304a325faf6e5c_s390x",
"8Base-RHOL-5.5:openshift-logging/elasticsearch6-rhel8@sha256:bf574cff65baba457e3199aae7d1b0e605403a7968e9af746a6cfc5d9a4b29c5_amd64",
"8Base-RHOL-5.5:openshift-logging/eventrouter-rhel8@sha256:0590711175be3b10f646256407cb7d72df63333589d527199260f738a91f2e3d_arm64",
"8Base-RHOL-5.5:openshift-logging/eventrouter-rhel8@sha256:646995416047cf48070c60b9ab064d454ff9ed772a92558f9627e3832f0ccd3c_amd64",
"8Base-RHOL-5.5:openshift-logging/eventrouter-rhel8@sha256:ac91af413a363890bb01772488e371e4dc698ecfb77f047bb83bf638d497aa7c_ppc64le",
"8Base-RHOL-5.5:openshift-logging/eventrouter-rhel8@sha256:eaf322aeccc73ec9d8d5f5a9d6ee368ee3f68409031e18a60cc699e3ca5c144b_s390x",
"8Base-RHOL-5.5:openshift-logging/fluentd-rhel8@sha256:3d4b83f86b2d2f1c73ab184a3471d0d4da04bb6e76487c9f546da87998e480dc_arm64",
"8Base-RHOL-5.5:openshift-logging/fluentd-rhel8@sha256:490740ea41377e7d18ffba700a5022915edc13f6b38f86a6d9d475dfc61df935_s390x",
"8Base-RHOL-5.5:openshift-logging/fluentd-rhel8@sha256:790fe2b90b51f8aff5d10b1525bcf7d35e5517674245993dac6696ebf2a24baf_ppc64le",
"8Base-RHOL-5.5:openshift-logging/fluentd-rhel8@sha256:dc8fe0ca5a488c6738e6904871a620f9444f30475863a09846f8205569c25e54_amd64",
"8Base-RHOL-5.5:openshift-logging/kibana6-rhel8@sha256:43e4da1a741543ac8cdf646901aff3185e5f30d6fad7e68a2233e2bd8d4ebe4b_s390x",
"8Base-RHOL-5.5:openshift-logging/kibana6-rhel8@sha256:44f3446b172b3ea7f0fd4de9f8039eba256a6bea56715748af00f361e49b1519_amd64",
"8Base-RHOL-5.5:openshift-logging/kibana6-rhel8@sha256:93c33d6810eb6e71e7e543c1c26a29e163214df64121c814b4424322308b0a30_ppc64le",
"8Base-RHOL-5.5:openshift-logging/kibana6-rhel8@sha256:ca4f273fb088980bfcc3607bd7ea2d40cc93298262cb3f5ce4054a6235152d1e_arm64",
"8Base-RHOL-5.5:openshift-logging/log-file-metric-exporter-rhel8@sha256:44e17bbdb8c7ac0a7868b3be7e29d58401702384dab3a66efaa08d1176035672_s390x",
"8Base-RHOL-5.5:openshift-logging/log-file-metric-exporter-rhel8@sha256:8b76243469011045e72b7a339288986e7561a3005aa94d580d5b1082580e9cec_ppc64le",
"8Base-RHOL-5.5:openshift-logging/log-file-metric-exporter-rhel8@sha256:e91d4b026d38091cb707e0213f329d0781a3517f3eca4d209d09d6c1edb1a1d3_amd64",
"8Base-RHOL-5.5:openshift-logging/log-file-metric-exporter-rhel8@sha256:f0ca78341daa3d41ffe460f5aa504219c72ee673dd57a82f344d3239b69717be_arm64",
"8Base-RHOL-5.5:openshift-logging/logging-curator5-rhel8@sha256:6f17fc02901a898b77c674cd4ba1764423e849c5faa888b2907ff7356accc66c_s390x",
"8Base-RHOL-5.5:openshift-logging/logging-curator5-rhel8@sha256:c8ea484f5e15b7b53941f251db9b5be08c8cb6f3a14d99285277d9eadf969e98_arm64",
"8Base-RHOL-5.5:openshift-logging/logging-curator5-rhel8@sha256:e26efb87488b53ebd4e5233515906974675b3a759f4a1c00f447df8821d5f030_ppc64le",
"8Base-RHOL-5.5:openshift-logging/logging-curator5-rhel8@sha256:e6ae5eef57de608fb1d4393fe824d0befffd8f5b696b5ce44e571fdcddb46f1f_amd64",
"8Base-RHOL-5.5:openshift-logging/logging-loki-rhel8@sha256:6242c3792c8c0469012be8b0140c2476e41f80b5271ba78ff42c63aa041be30f_s390x",
"8Base-RHOL-5.5:openshift-logging/logging-loki-rhel8@sha256:947becc46b99656f9faa6067f2cf38dbef0d40e85b56d62aafcb243052920dfc_amd64",
"8Base-RHOL-5.5:openshift-logging/logging-loki-rhel8@sha256:969ce1d586fb7fbdd65d07c0b790f48fd6f81e659d1323514906bb03ae9fe79b_ppc64le",
"8Base-RHOL-5.5:openshift-logging/logging-loki-rhel8@sha256:dd5e5a043befc54eeb63ff51a01691778053c90de5c9b8946d6a1d808fbcf0df_arm64",
"8Base-RHOL-5.5:openshift-logging/logging-view-plugin-rhel8@sha256:147676e1a3c66757508be0046c28ccb7985f15af7f8f4a045fa5ca424c0c684d_arm64",
"8Base-RHOL-5.5:openshift-logging/logging-view-plugin-rhel8@sha256:bea8f3f31073874a77af55c8664cbf167cd8bad5296e1bf444b9490b06484b56_amd64",
"8Base-RHOL-5.5:openshift-logging/logging-view-plugin-rhel8@sha256:da8c90c5b3b68e9b98a76828a450a9d7c579256b04aa9daf87ddfab9bad5548c_ppc64le",
"8Base-RHOL-5.5:openshift-logging/logging-view-plugin-rhel8@sha256:e3e5b570f9c819cb10ad38e928a301e8f0554e45052037b03f1ba81a3faa6a15_s390x",
"8Base-RHOL-5.5:openshift-logging/loki-operator-bundle@sha256:1d75006c9d03648857963a8772644d4228361d97fb07c8652326b61fd5d30f8c_amd64",
"8Base-RHOL-5.5:openshift-logging/loki-rhel8-operator@sha256:43fae2b6532712da7d0f83b5dda5797c9764fcac4b0e18580a19e54ee7dfcff6_s390x",
"8Base-RHOL-5.5:openshift-logging/loki-rhel8-operator@sha256:4eba6362f8aaa0450d07b87824148d2c15232b871d0ba6bc34f1962d2970e753_ppc64le",
"8Base-RHOL-5.5:openshift-logging/loki-rhel8-operator@sha256:dfa4ca06abb576fa071fb30c425bc6be631c0453939de562e1dc0b4e76de4f81_arm64",
"8Base-RHOL-5.5:openshift-logging/loki-rhel8-operator@sha256:e5289e40532a01c605760b2f438acfb66257b730a89249269e46dc9c0058aec1_amd64",
"8Base-RHOL-5.5:openshift-logging/lokistack-gateway-rhel8@sha256:0a3eb7a1a50b75528be737eb2768e671a643eea324c967a0381296b61f8e399e_arm64",
"8Base-RHOL-5.5:openshift-logging/lokistack-gateway-rhel8@sha256:42ebf89821e0f8e4b7d03cc5a6d5a30d48f73a1ab2b7486c8a0bb1e5c2cfd4b4_ppc64le",
"8Base-RHOL-5.5:openshift-logging/lokistack-gateway-rhel8@sha256:449f4cf0b3d0c0d6724cc2346c2121df58ef43297c56cc540e05158ad5c8ffbc_amd64",
"8Base-RHOL-5.5:openshift-logging/lokistack-gateway-rhel8@sha256:5954a498e527ee59a3f655250a4f5535a26b49c6fd61889271affb08104839f8_s390x",
"8Base-RHOL-5.5:openshift-logging/opa-openshift-rhel8@sha256:4c1b37da97e80aa76f2612f34745180a026214a415ed9a186ab81ec8fa96e17d_amd64",
"8Base-RHOL-5.5:openshift-logging/opa-openshift-rhel8@sha256:847c70de5af59c9aec366612a74477de931977cf79d5f9ed117772e931589497_ppc64le",
"8Base-RHOL-5.5:openshift-logging/opa-openshift-rhel8@sha256:c8458b60077d018eaa78f38fc0b85786d8108b88faea6e420cc01b720f23af48_arm64",
"8Base-RHOL-5.5:openshift-logging/opa-openshift-rhel8@sha256:fc99739f4354e8b28613f50b441d3f7a93bea3e3b106d7c052b607c24b994b9e_s390x",
"8Base-RHOL-5.5:openshift-logging/vector-rhel8@sha256:6c237605a0062e69e10a1fad47375f9c51dbccb110e1d11a02f2b7101d611e8f_amd64",
"8Base-RHOL-5.5:openshift-logging/vector-rhel8@sha256:6c8b9e91e4d527bc0694879c7ce908e3d67877fd53191b71af95191cc0149afa_arm64",
"8Base-RHOL-5.5:openshift-logging/vector-rhel8@sha256:b22fe4e184b908986301fda4d2b57f4b9b91149168386a8d9c7ac9b0c4631c7c_ppc64le",
"8Base-RHOL-5.5:openshift-logging/vector-rhel8@sha256:c117a0024d06340a9a28686c144642d6591192738f263f4684a7d09af0b16c71_s390x"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-32149"
},
{
"category": "external",
"summary": "RHBZ#2134010",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2134010"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-32149",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32149"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-32149",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-32149"
},
{
"category": "external",
"summary": "https://go.dev/issue/56152",
"url": "https://go.dev/issue/56152"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-dev/c/qfPIly0X7aU",
"url": "https://groups.google.com/g/golang-dev/c/qfPIly0X7aU"
}
],
"release_date": "2022-10-11T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-11-10T03:50:23+00:00",
"details": "For OpenShift Container Platform 4.11 see the following documentation, which will be updated shortly for this release, for important instructions on how to upgrade your cluster and fully apply this errata update:\n\nhttps://docs.openshift.com/container-platform/4.11/release_notes/ocp-4-11-release-notes.html\n\nFor Red Hat OpenShift Logging 5.5, see the following instructions to apply this update:\n\nhttps://docs.openshift.com/container-platform/4.11/logging/cluster-logging-upgrading.html",
"product_ids": [
"8Base-RHOL-5.5:openshift-logging/elasticsearch-proxy-rhel8@sha256:89f980b63cbcf7956449d8cee41c884ea4ae7d76f02454f7e32058576fd92fa5_ppc64le",
"8Base-RHOL-5.5:openshift-logging/elasticsearch-proxy-rhel8@sha256:a6c03fd0fe66206bff59ba019cc60085de4c65d4efae8a637f1ac48b91688371_arm64",
"8Base-RHOL-5.5:openshift-logging/elasticsearch-proxy-rhel8@sha256:dcdd0c515b3b5a1a6e807929fb8e8d65c1ee2aba3bf696d2b9f852e8994e47b8_s390x",
"8Base-RHOL-5.5:openshift-logging/elasticsearch-proxy-rhel8@sha256:e1755002225548182e17bd82b1c129b2ac61e623c3c37c4d51a535012088cacc_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:7434"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"8Base-RHOL-5.5:openshift-logging/cluster-logging-operator-bundle@sha256:a78fd59207ef6cc8ddaaa3f3ae7140b7678e96e0677517623d1537afc05e84dd_amd64",
"8Base-RHOL-5.5:openshift-logging/cluster-logging-rhel8-operator@sha256:07ab076aa9b573d330ace59bf4de080ea64dbc7b3424357fc39c0c70ede27873_arm64",
"8Base-RHOL-5.5:openshift-logging/cluster-logging-rhel8-operator@sha256:11c10388503a708a962e3dfc5cdd9b6ad5c5d4d4a68b11f97f8fae2cc3884083_s390x",
"8Base-RHOL-5.5:openshift-logging/cluster-logging-rhel8-operator@sha256:414649f77a20e04b3eb16d64acf81a4d261394016d4a890da309cbb8216c1d4a_amd64",
"8Base-RHOL-5.5:openshift-logging/cluster-logging-rhel8-operator@sha256:b4eeab42904e5a81e7adb8801bd901a53a5b81b2464b33816c203daf7587f89f_ppc64le",
"8Base-RHOL-5.5:openshift-logging/elasticsearch-operator-bundle@sha256:d09cafc7f6bbb446608051cebb1c943575e80f9987bb4cad8af53e0354a0e7cd_amd64",
"8Base-RHOL-5.5:openshift-logging/elasticsearch-proxy-rhel8@sha256:89f980b63cbcf7956449d8cee41c884ea4ae7d76f02454f7e32058576fd92fa5_ppc64le",
"8Base-RHOL-5.5:openshift-logging/elasticsearch-proxy-rhel8@sha256:a6c03fd0fe66206bff59ba019cc60085de4c65d4efae8a637f1ac48b91688371_arm64",
"8Base-RHOL-5.5:openshift-logging/elasticsearch-proxy-rhel8@sha256:dcdd0c515b3b5a1a6e807929fb8e8d65c1ee2aba3bf696d2b9f852e8994e47b8_s390x",
"8Base-RHOL-5.5:openshift-logging/elasticsearch-proxy-rhel8@sha256:e1755002225548182e17bd82b1c129b2ac61e623c3c37c4d51a535012088cacc_amd64",
"8Base-RHOL-5.5:openshift-logging/elasticsearch-rhel8-operator@sha256:5236634419119024d3f8779dbd78639a54c2323389f56fbf25dacdc499a072d3_s390x",
"8Base-RHOL-5.5:openshift-logging/elasticsearch-rhel8-operator@sha256:64954ce7d233d6c109e46645cd8d55d8a06068328ce3a22f646ede7c9fde78c8_ppc64le",
"8Base-RHOL-5.5:openshift-logging/elasticsearch-rhel8-operator@sha256:c25b7b7c0f073fdfcf9fd90572790064cdff26d61a4e4db751d4197ff2c5b4c1_amd64",
"8Base-RHOL-5.5:openshift-logging/elasticsearch-rhel8-operator@sha256:dce08ac53092fc51958b78df9b4b870926a079fe4cdc4fb2d46c8ba545a22e6a_arm64",
"8Base-RHOL-5.5:openshift-logging/elasticsearch6-rhel8@sha256:1019e03ddff4726caae53e800403cbaa82ce057c7553552ad027a37d3be5824f_ppc64le",
"8Base-RHOL-5.5:openshift-logging/elasticsearch6-rhel8@sha256:6dfb5e18aa3dc6ce8e2535e13de1d53eea68b218854971e0eb594f677f6da7c7_arm64",
"8Base-RHOL-5.5:openshift-logging/elasticsearch6-rhel8@sha256:7c143b790fef75a04e8ed1be49576861651f66371355a3f5aa304a325faf6e5c_s390x",
"8Base-RHOL-5.5:openshift-logging/elasticsearch6-rhel8@sha256:bf574cff65baba457e3199aae7d1b0e605403a7968e9af746a6cfc5d9a4b29c5_amd64",
"8Base-RHOL-5.5:openshift-logging/eventrouter-rhel8@sha256:0590711175be3b10f646256407cb7d72df63333589d527199260f738a91f2e3d_arm64",
"8Base-RHOL-5.5:openshift-logging/eventrouter-rhel8@sha256:646995416047cf48070c60b9ab064d454ff9ed772a92558f9627e3832f0ccd3c_amd64",
"8Base-RHOL-5.5:openshift-logging/eventrouter-rhel8@sha256:ac91af413a363890bb01772488e371e4dc698ecfb77f047bb83bf638d497aa7c_ppc64le",
"8Base-RHOL-5.5:openshift-logging/eventrouter-rhel8@sha256:eaf322aeccc73ec9d8d5f5a9d6ee368ee3f68409031e18a60cc699e3ca5c144b_s390x",
"8Base-RHOL-5.5:openshift-logging/fluentd-rhel8@sha256:3d4b83f86b2d2f1c73ab184a3471d0d4da04bb6e76487c9f546da87998e480dc_arm64",
"8Base-RHOL-5.5:openshift-logging/fluentd-rhel8@sha256:490740ea41377e7d18ffba700a5022915edc13f6b38f86a6d9d475dfc61df935_s390x",
"8Base-RHOL-5.5:openshift-logging/fluentd-rhel8@sha256:790fe2b90b51f8aff5d10b1525bcf7d35e5517674245993dac6696ebf2a24baf_ppc64le",
"8Base-RHOL-5.5:openshift-logging/fluentd-rhel8@sha256:dc8fe0ca5a488c6738e6904871a620f9444f30475863a09846f8205569c25e54_amd64",
"8Base-RHOL-5.5:openshift-logging/kibana6-rhel8@sha256:43e4da1a741543ac8cdf646901aff3185e5f30d6fad7e68a2233e2bd8d4ebe4b_s390x",
"8Base-RHOL-5.5:openshift-logging/kibana6-rhel8@sha256:44f3446b172b3ea7f0fd4de9f8039eba256a6bea56715748af00f361e49b1519_amd64",
"8Base-RHOL-5.5:openshift-logging/kibana6-rhel8@sha256:93c33d6810eb6e71e7e543c1c26a29e163214df64121c814b4424322308b0a30_ppc64le",
"8Base-RHOL-5.5:openshift-logging/kibana6-rhel8@sha256:ca4f273fb088980bfcc3607bd7ea2d40cc93298262cb3f5ce4054a6235152d1e_arm64",
"8Base-RHOL-5.5:openshift-logging/log-file-metric-exporter-rhel8@sha256:44e17bbdb8c7ac0a7868b3be7e29d58401702384dab3a66efaa08d1176035672_s390x",
"8Base-RHOL-5.5:openshift-logging/log-file-metric-exporter-rhel8@sha256:8b76243469011045e72b7a339288986e7561a3005aa94d580d5b1082580e9cec_ppc64le",
"8Base-RHOL-5.5:openshift-logging/log-file-metric-exporter-rhel8@sha256:e91d4b026d38091cb707e0213f329d0781a3517f3eca4d209d09d6c1edb1a1d3_amd64",
"8Base-RHOL-5.5:openshift-logging/log-file-metric-exporter-rhel8@sha256:f0ca78341daa3d41ffe460f5aa504219c72ee673dd57a82f344d3239b69717be_arm64",
"8Base-RHOL-5.5:openshift-logging/logging-curator5-rhel8@sha256:6f17fc02901a898b77c674cd4ba1764423e849c5faa888b2907ff7356accc66c_s390x",
"8Base-RHOL-5.5:openshift-logging/logging-curator5-rhel8@sha256:c8ea484f5e15b7b53941f251db9b5be08c8cb6f3a14d99285277d9eadf969e98_arm64",
"8Base-RHOL-5.5:openshift-logging/logging-curator5-rhel8@sha256:e26efb87488b53ebd4e5233515906974675b3a759f4a1c00f447df8821d5f030_ppc64le",
"8Base-RHOL-5.5:openshift-logging/logging-curator5-rhel8@sha256:e6ae5eef57de608fb1d4393fe824d0befffd8f5b696b5ce44e571fdcddb46f1f_amd64",
"8Base-RHOL-5.5:openshift-logging/logging-loki-rhel8@sha256:6242c3792c8c0469012be8b0140c2476e41f80b5271ba78ff42c63aa041be30f_s390x",
"8Base-RHOL-5.5:openshift-logging/logging-loki-rhel8@sha256:947becc46b99656f9faa6067f2cf38dbef0d40e85b56d62aafcb243052920dfc_amd64",
"8Base-RHOL-5.5:openshift-logging/logging-loki-rhel8@sha256:969ce1d586fb7fbdd65d07c0b790f48fd6f81e659d1323514906bb03ae9fe79b_ppc64le",
"8Base-RHOL-5.5:openshift-logging/logging-loki-rhel8@sha256:dd5e5a043befc54eeb63ff51a01691778053c90de5c9b8946d6a1d808fbcf0df_arm64",
"8Base-RHOL-5.5:openshift-logging/logging-view-plugin-rhel8@sha256:147676e1a3c66757508be0046c28ccb7985f15af7f8f4a045fa5ca424c0c684d_arm64",
"8Base-RHOL-5.5:openshift-logging/logging-view-plugin-rhel8@sha256:bea8f3f31073874a77af55c8664cbf167cd8bad5296e1bf444b9490b06484b56_amd64",
"8Base-RHOL-5.5:openshift-logging/logging-view-plugin-rhel8@sha256:da8c90c5b3b68e9b98a76828a450a9d7c579256b04aa9daf87ddfab9bad5548c_ppc64le",
"8Base-RHOL-5.5:openshift-logging/logging-view-plugin-rhel8@sha256:e3e5b570f9c819cb10ad38e928a301e8f0554e45052037b03f1ba81a3faa6a15_s390x",
"8Base-RHOL-5.5:openshift-logging/loki-operator-bundle@sha256:1d75006c9d03648857963a8772644d4228361d97fb07c8652326b61fd5d30f8c_amd64",
"8Base-RHOL-5.5:openshift-logging/loki-rhel8-operator@sha256:43fae2b6532712da7d0f83b5dda5797c9764fcac4b0e18580a19e54ee7dfcff6_s390x",
"8Base-RHOL-5.5:openshift-logging/loki-rhel8-operator@sha256:4eba6362f8aaa0450d07b87824148d2c15232b871d0ba6bc34f1962d2970e753_ppc64le",
"8Base-RHOL-5.5:openshift-logging/loki-rhel8-operator@sha256:dfa4ca06abb576fa071fb30c425bc6be631c0453939de562e1dc0b4e76de4f81_arm64",
"8Base-RHOL-5.5:openshift-logging/loki-rhel8-operator@sha256:e5289e40532a01c605760b2f438acfb66257b730a89249269e46dc9c0058aec1_amd64",
"8Base-RHOL-5.5:openshift-logging/lokistack-gateway-rhel8@sha256:0a3eb7a1a50b75528be737eb2768e671a643eea324c967a0381296b61f8e399e_arm64",
"8Base-RHOL-5.5:openshift-logging/lokistack-gateway-rhel8@sha256:42ebf89821e0f8e4b7d03cc5a6d5a30d48f73a1ab2b7486c8a0bb1e5c2cfd4b4_ppc64le",
"8Base-RHOL-5.5:openshift-logging/lokistack-gateway-rhel8@sha256:449f4cf0b3d0c0d6724cc2346c2121df58ef43297c56cc540e05158ad5c8ffbc_amd64",
"8Base-RHOL-5.5:openshift-logging/lokistack-gateway-rhel8@sha256:5954a498e527ee59a3f655250a4f5535a26b49c6fd61889271affb08104839f8_s390x",
"8Base-RHOL-5.5:openshift-logging/opa-openshift-rhel8@sha256:4c1b37da97e80aa76f2612f34745180a026214a415ed9a186ab81ec8fa96e17d_amd64",
"8Base-RHOL-5.5:openshift-logging/opa-openshift-rhel8@sha256:847c70de5af59c9aec366612a74477de931977cf79d5f9ed117772e931589497_ppc64le",
"8Base-RHOL-5.5:openshift-logging/opa-openshift-rhel8@sha256:c8458b60077d018eaa78f38fc0b85786d8108b88faea6e420cc01b720f23af48_arm64",
"8Base-RHOL-5.5:openshift-logging/opa-openshift-rhel8@sha256:fc99739f4354e8b28613f50b441d3f7a93bea3e3b106d7c052b607c24b994b9e_s390x",
"8Base-RHOL-5.5:openshift-logging/vector-rhel8@sha256:6c237605a0062e69e10a1fad47375f9c51dbccb110e1d11a02f2b7101d611e8f_amd64",
"8Base-RHOL-5.5:openshift-logging/vector-rhel8@sha256:6c8b9e91e4d527bc0694879c7ce908e3d67877fd53191b71af95191cc0149afa_arm64",
"8Base-RHOL-5.5:openshift-logging/vector-rhel8@sha256:b22fe4e184b908986301fda4d2b57f4b9b91149168386a8d9c7ac9b0c4631c7c_ppc64le",
"8Base-RHOL-5.5:openshift-logging/vector-rhel8@sha256:c117a0024d06340a9a28686c144642d6591192738f263f4684a7d09af0b16c71_s390x"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "golang: golang.org/x/text/language: ParseAcceptLanguage takes a long time to parse complex tags"
}
]
}
RHSA-2022:7435
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update is now available for Logging subsystem for Red Hat OpenShift 5.4.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Logging Subsystem 5.4.8 - Red Hat OpenShift\n\nSecurity Fix(es):\n\n* jackson-databind: denial of service via a large depth of nested objects (CVE-2020-36518)\n\n* golang: golang.org/x/text/language: ParseAcceptLanguage takes a long time to parse complex tags (CVE-2022-32149)\n\n* jackson-databind: deep wrapper array nesting wrt UNWRAP_SINGLE_VALUE_ARRAYS (CVE-2022-42003)\n\n* jackson-databind: use of deeply nested arrays (CVE-2022-42004)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2022:7435",
"url": "https://access.redhat.com/errata/RHSA-2022:7435"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#moderate",
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "2064698",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2064698"
},
{
"category": "external",
"summary": "2134010",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2134010"
},
{
"category": "external",
"summary": "2135244",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2135244"
},
{
"category": "external",
"summary": "2135247",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2135247"
},
{
"category": "external",
"summary": "LOG-3250",
"url": "https://issues.redhat.com/browse/LOG-3250"
},
{
"category": "external",
"summary": "LOG-3252",
"url": "https://issues.redhat.com/browse/LOG-3252"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2022/rhsa-2022_7435.json"
}
],
"title": "Red Hat Security Advisory: Logging Subsystem 5.4.8 - Red Hat OpenShift security update",
"tracking": {
"current_release_date": "2025-10-24T11:19:52+00:00",
"generator": {
"date": "2025-10-24T11:19:52+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.10"
}
},
"id": "RHSA-2022:7435",
"initial_release_date": "2022-11-16T12:13:01+00:00",
"revision_history": [
{
"date": "2022-11-16T12:13:01+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2022-11-16T12:13:01+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-10-24T11:19:52+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "RHOL 5.4 for RHEL 8",
"product": {
"name": "RHOL 5.4 for RHEL 8",
"product_id": "8Base-RHOL-5.4",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:logging:5.4::el8"
}
}
}
],
"category": "product_family",
"name": "logging for Red Hat OpenShift"
},
{
"branches": [
{
"category": "product_version",
"name": "openshift-logging/cluster-logging-rhel8-operator@sha256:617cc8b0011110981674b75fe1e3041bfa434c952e4a0193818b971edbc7a480_s390x",
"product": {
"name": "openshift-logging/cluster-logging-rhel8-operator@sha256:617cc8b0011110981674b75fe1e3041bfa434c952e4a0193818b971edbc7a480_s390x",
"product_id": "openshift-logging/cluster-logging-rhel8-operator@sha256:617cc8b0011110981674b75fe1e3041bfa434c952e4a0193818b971edbc7a480_s390x",
"product_identification_helper": {
"purl": "pkg:oci/cluster-logging-rhel8-operator@sha256:617cc8b0011110981674b75fe1e3041bfa434c952e4a0193818b971edbc7a480?arch=s390x\u0026repository_url=registry.redhat.io/openshift-logging/cluster-logging-rhel8-operator\u0026tag=v5.4.8-6"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/elasticsearch-rhel8-operator@sha256:dd211d42eaad043d9bdb519e3ad6a86255b7280a2cdf47dd3fe0458a77cb110f_s390x",
"product": {
"name": "openshift-logging/elasticsearch-rhel8-operator@sha256:dd211d42eaad043d9bdb519e3ad6a86255b7280a2cdf47dd3fe0458a77cb110f_s390x",
"product_id": "openshift-logging/elasticsearch-rhel8-operator@sha256:dd211d42eaad043d9bdb519e3ad6a86255b7280a2cdf47dd3fe0458a77cb110f_s390x",
"product_identification_helper": {
"purl": "pkg:oci/elasticsearch-rhel8-operator@sha256:dd211d42eaad043d9bdb519e3ad6a86255b7280a2cdf47dd3fe0458a77cb110f?arch=s390x\u0026repository_url=registry.redhat.io/openshift-logging/elasticsearch-rhel8-operator\u0026tag=v5.4.8-3"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/elasticsearch-proxy-rhel8@sha256:b9c2e58b39dc3de97013f8806178f6327bf2e4590fe55db144527d64d468f64f_s390x",
"product": {
"name": "openshift-logging/elasticsearch-proxy-rhel8@sha256:b9c2e58b39dc3de97013f8806178f6327bf2e4590fe55db144527d64d468f64f_s390x",
"product_id": "openshift-logging/elasticsearch-proxy-rhel8@sha256:b9c2e58b39dc3de97013f8806178f6327bf2e4590fe55db144527d64d468f64f_s390x",
"product_identification_helper": {
"purl": "pkg:oci/elasticsearch-proxy-rhel8@sha256:b9c2e58b39dc3de97013f8806178f6327bf2e4590fe55db144527d64d468f64f?arch=s390x\u0026repository_url=registry.redhat.io/openshift-logging/elasticsearch-proxy-rhel8\u0026tag=v1.0.0-300"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/log-file-metric-exporter-rhel8@sha256:85827db708c0927027435b05732cc7e34b0675eaa86665c91efacc76aecd6227_s390x",
"product": {
"name": "openshift-logging/log-file-metric-exporter-rhel8@sha256:85827db708c0927027435b05732cc7e34b0675eaa86665c91efacc76aecd6227_s390x",
"product_id": "openshift-logging/log-file-metric-exporter-rhel8@sha256:85827db708c0927027435b05732cc7e34b0675eaa86665c91efacc76aecd6227_s390x",
"product_identification_helper": {
"purl": "pkg:oci/log-file-metric-exporter-rhel8@sha256:85827db708c0927027435b05732cc7e34b0675eaa86665c91efacc76aecd6227?arch=s390x\u0026repository_url=registry.redhat.io/openshift-logging/log-file-metric-exporter-rhel8\u0026tag=v1.1.0-74"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/logging-curator5-rhel8@sha256:7016e867ddfe970d6d2d54d5615e8f613786bcfbfe52ebf3139c07da3d5a53db_s390x",
"product": {
"name": "openshift-logging/logging-curator5-rhel8@sha256:7016e867ddfe970d6d2d54d5615e8f613786bcfbfe52ebf3139c07da3d5a53db_s390x",
"product_id": "openshift-logging/logging-curator5-rhel8@sha256:7016e867ddfe970d6d2d54d5615e8f613786bcfbfe52ebf3139c07da3d5a53db_s390x",
"product_identification_helper": {
"purl": "pkg:oci/logging-curator5-rhel8@sha256:7016e867ddfe970d6d2d54d5615e8f613786bcfbfe52ebf3139c07da3d5a53db?arch=s390x\u0026repository_url=registry.redhat.io/openshift-logging/logging-curator5-rhel8\u0026tag=v5.8.1-246"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/elasticsearch6-rhel8@sha256:5b1cfc2f9a96601439cf17d1fe49a6bc6cad3b7273af87b23528090aefbfd915_s390x",
"product": {
"name": "openshift-logging/elasticsearch6-rhel8@sha256:5b1cfc2f9a96601439cf17d1fe49a6bc6cad3b7273af87b23528090aefbfd915_s390x",
"product_id": "openshift-logging/elasticsearch6-rhel8@sha256:5b1cfc2f9a96601439cf17d1fe49a6bc6cad3b7273af87b23528090aefbfd915_s390x",
"product_identification_helper": {
"purl": "pkg:oci/elasticsearch6-rhel8@sha256:5b1cfc2f9a96601439cf17d1fe49a6bc6cad3b7273af87b23528090aefbfd915?arch=s390x\u0026repository_url=registry.redhat.io/openshift-logging/elasticsearch6-rhel8\u0026tag=v6.8.1-265"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/eventrouter-rhel8@sha256:f05aee8433dec1c9f6cf835038f9e5a47847d4095383bf3c22ca57c3fb69fa98_s390x",
"product": {
"name": "openshift-logging/eventrouter-rhel8@sha256:f05aee8433dec1c9f6cf835038f9e5a47847d4095383bf3c22ca57c3fb69fa98_s390x",
"product_id": "openshift-logging/eventrouter-rhel8@sha256:f05aee8433dec1c9f6cf835038f9e5a47847d4095383bf3c22ca57c3fb69fa98_s390x",
"product_identification_helper": {
"purl": "pkg:oci/eventrouter-rhel8@sha256:f05aee8433dec1c9f6cf835038f9e5a47847d4095383bf3c22ca57c3fb69fa98?arch=s390x\u0026repository_url=registry.redhat.io/openshift-logging/eventrouter-rhel8\u0026tag=v0.4.0-55"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/fluentd-rhel8@sha256:36aecf05ca3cdaf29982b3efa4a1c97087be29b0a58c9777e6b0c11a34861aa8_s390x",
"product": {
"name": "openshift-logging/fluentd-rhel8@sha256:36aecf05ca3cdaf29982b3efa4a1c97087be29b0a58c9777e6b0c11a34861aa8_s390x",
"product_id": "openshift-logging/fluentd-rhel8@sha256:36aecf05ca3cdaf29982b3efa4a1c97087be29b0a58c9777e6b0c11a34861aa8_s390x",
"product_identification_helper": {
"purl": "pkg:oci/fluentd-rhel8@sha256:36aecf05ca3cdaf29982b3efa4a1c97087be29b0a58c9777e6b0c11a34861aa8?arch=s390x\u0026repository_url=registry.redhat.io/openshift-logging/fluentd-rhel8\u0026tag=v1.14.5-36"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/kibana6-rhel8@sha256:4a029733337b10bb9fb8d98c91abc5451ca0b98713c8f2271a675251e025b6c0_s390x",
"product": {
"name": "openshift-logging/kibana6-rhel8@sha256:4a029733337b10bb9fb8d98c91abc5451ca0b98713c8f2271a675251e025b6c0_s390x",
"product_id": "openshift-logging/kibana6-rhel8@sha256:4a029733337b10bb9fb8d98c91abc5451ca0b98713c8f2271a675251e025b6c0_s390x",
"product_identification_helper": {
"purl": "pkg:oci/kibana6-rhel8@sha256:4a029733337b10bb9fb8d98c91abc5451ca0b98713c8f2271a675251e025b6c0?arch=s390x\u0026repository_url=registry.redhat.io/openshift-logging/kibana6-rhel8\u0026tag=v6.8.1-302"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/logging-loki-rhel8@sha256:cfe410d498940a95da631ea213866a96a119034d78d5d53f7f9c7e8da56e0f45_s390x",
"product": {
"name": "openshift-logging/logging-loki-rhel8@sha256:cfe410d498940a95da631ea213866a96a119034d78d5d53f7f9c7e8da56e0f45_s390x",
"product_id": "openshift-logging/logging-loki-rhel8@sha256:cfe410d498940a95da631ea213866a96a119034d78d5d53f7f9c7e8da56e0f45_s390x",
"product_identification_helper": {
"purl": "pkg:oci/logging-loki-rhel8@sha256:cfe410d498940a95da631ea213866a96a119034d78d5d53f7f9c7e8da56e0f45?arch=s390x\u0026repository_url=registry.redhat.io/openshift-logging/logging-loki-rhel8\u0026tag=v2.5.0-51"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/vector-rhel8@sha256:48bb136d11b44428c87489978873370848ac2b219b107ef7e81ab679db095234_s390x",
"product": {
"name": "openshift-logging/vector-rhel8@sha256:48bb136d11b44428c87489978873370848ac2b219b107ef7e81ab679db095234_s390x",
"product_id": "openshift-logging/vector-rhel8@sha256:48bb136d11b44428c87489978873370848ac2b219b107ef7e81ab679db095234_s390x",
"product_identification_helper": {
"purl": "pkg:oci/vector-rhel8@sha256:48bb136d11b44428c87489978873370848ac2b219b107ef7e81ab679db095234?arch=s390x\u0026repository_url=registry.redhat.io/openshift-logging/vector-rhel8\u0026tag=v0.14-67"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/loki-rhel8-operator@sha256:0f1be625b4012820f7ac439fed000808d7acb4e885ace16014461bf802be935a_s390x",
"product": {
"name": "openshift-logging/loki-rhel8-operator@sha256:0f1be625b4012820f7ac439fed000808d7acb4e885ace16014461bf802be935a_s390x",
"product_id": "openshift-logging/loki-rhel8-operator@sha256:0f1be625b4012820f7ac439fed000808d7acb4e885ace16014461bf802be935a_s390x",
"product_identification_helper": {
"purl": "pkg:oci/loki-rhel8-operator@sha256:0f1be625b4012820f7ac439fed000808d7acb4e885ace16014461bf802be935a?arch=s390x\u0026repository_url=registry.redhat.io/openshift-logging/loki-rhel8-operator\u0026tag=v5.4.8-4"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/lokistack-gateway-rhel8@sha256:9c4959525339b607a98889d56f4c26f2e4af25032466c439903a7f1cb593f721_s390x",
"product": {
"name": "openshift-logging/lokistack-gateway-rhel8@sha256:9c4959525339b607a98889d56f4c26f2e4af25032466c439903a7f1cb593f721_s390x",
"product_id": "openshift-logging/lokistack-gateway-rhel8@sha256:9c4959525339b607a98889d56f4c26f2e4af25032466c439903a7f1cb593f721_s390x",
"product_identification_helper": {
"purl": "pkg:oci/lokistack-gateway-rhel8@sha256:9c4959525339b607a98889d56f4c26f2e4af25032466c439903a7f1cb593f721?arch=s390x\u0026repository_url=registry.redhat.io/openshift-logging/lokistack-gateway-rhel8\u0026tag=v5.4.8-5"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/opa-openshift-rhel8@sha256:be8ba0e4c5f24c7b4549700a25c89b10d4b2fc0b0e3888163bb53827914e95c1_s390x",
"product": {
"name": "openshift-logging/opa-openshift-rhel8@sha256:be8ba0e4c5f24c7b4549700a25c89b10d4b2fc0b0e3888163bb53827914e95c1_s390x",
"product_id": "openshift-logging/opa-openshift-rhel8@sha256:be8ba0e4c5f24c7b4549700a25c89b10d4b2fc0b0e3888163bb53827914e95c1_s390x",
"product_identification_helper": {
"purl": "pkg:oci/opa-openshift-rhel8@sha256:be8ba0e4c5f24c7b4549700a25c89b10d4b2fc0b0e3888163bb53827914e95c1?arch=s390x\u0026repository_url=registry.redhat.io/openshift-logging/opa-openshift-rhel8\u0026tag=v5.4.8-4"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "openshift-logging/cluster-logging-rhel8-operator@sha256:aa1602fe2abe23bd8a4c791bc45d425686a6e6d1aab4face0fac28bfc7cebbe1_ppc64le",
"product": {
"name": "openshift-logging/cluster-logging-rhel8-operator@sha256:aa1602fe2abe23bd8a4c791bc45d425686a6e6d1aab4face0fac28bfc7cebbe1_ppc64le",
"product_id": "openshift-logging/cluster-logging-rhel8-operator@sha256:aa1602fe2abe23bd8a4c791bc45d425686a6e6d1aab4face0fac28bfc7cebbe1_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/cluster-logging-rhel8-operator@sha256:aa1602fe2abe23bd8a4c791bc45d425686a6e6d1aab4face0fac28bfc7cebbe1?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-logging/cluster-logging-rhel8-operator\u0026tag=v5.4.8-6"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/elasticsearch-rhel8-operator@sha256:6a55934cf7af0c03e06d4ec7a15a80acf53491fb7a183c16fdf8018fbf9b4174_ppc64le",
"product": {
"name": "openshift-logging/elasticsearch-rhel8-operator@sha256:6a55934cf7af0c03e06d4ec7a15a80acf53491fb7a183c16fdf8018fbf9b4174_ppc64le",
"product_id": "openshift-logging/elasticsearch-rhel8-operator@sha256:6a55934cf7af0c03e06d4ec7a15a80acf53491fb7a183c16fdf8018fbf9b4174_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/elasticsearch-rhel8-operator@sha256:6a55934cf7af0c03e06d4ec7a15a80acf53491fb7a183c16fdf8018fbf9b4174?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-logging/elasticsearch-rhel8-operator\u0026tag=v5.4.8-3"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/elasticsearch-proxy-rhel8@sha256:4f4e5bb267ad391bc0fc6a010ec9ecdf3bf48d5b6e9db0d2510960c13c97bd71_ppc64le",
"product": {
"name": "openshift-logging/elasticsearch-proxy-rhel8@sha256:4f4e5bb267ad391bc0fc6a010ec9ecdf3bf48d5b6e9db0d2510960c13c97bd71_ppc64le",
"product_id": "openshift-logging/elasticsearch-proxy-rhel8@sha256:4f4e5bb267ad391bc0fc6a010ec9ecdf3bf48d5b6e9db0d2510960c13c97bd71_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/elasticsearch-proxy-rhel8@sha256:4f4e5bb267ad391bc0fc6a010ec9ecdf3bf48d5b6e9db0d2510960c13c97bd71?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-logging/elasticsearch-proxy-rhel8\u0026tag=v1.0.0-300"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/log-file-metric-exporter-rhel8@sha256:4fe26adac10cf20b83812e4fa513231d7e1fd4b6cd4e09d4fd425c391885cfcc_ppc64le",
"product": {
"name": "openshift-logging/log-file-metric-exporter-rhel8@sha256:4fe26adac10cf20b83812e4fa513231d7e1fd4b6cd4e09d4fd425c391885cfcc_ppc64le",
"product_id": "openshift-logging/log-file-metric-exporter-rhel8@sha256:4fe26adac10cf20b83812e4fa513231d7e1fd4b6cd4e09d4fd425c391885cfcc_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/log-file-metric-exporter-rhel8@sha256:4fe26adac10cf20b83812e4fa513231d7e1fd4b6cd4e09d4fd425c391885cfcc?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-logging/log-file-metric-exporter-rhel8\u0026tag=v1.1.0-74"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/logging-curator5-rhel8@sha256:d24afbc9228ef7f3d0a6fd716a3a57abde88a1f65d149c7df4f959a775b670bd_ppc64le",
"product": {
"name": "openshift-logging/logging-curator5-rhel8@sha256:d24afbc9228ef7f3d0a6fd716a3a57abde88a1f65d149c7df4f959a775b670bd_ppc64le",
"product_id": "openshift-logging/logging-curator5-rhel8@sha256:d24afbc9228ef7f3d0a6fd716a3a57abde88a1f65d149c7df4f959a775b670bd_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/logging-curator5-rhel8@sha256:d24afbc9228ef7f3d0a6fd716a3a57abde88a1f65d149c7df4f959a775b670bd?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-logging/logging-curator5-rhel8\u0026tag=v5.8.1-246"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/elasticsearch6-rhel8@sha256:17a9f3ae042b92693a374e3d60a07f2ab2e52419f8df25d446dd0654f6a858f6_ppc64le",
"product": {
"name": "openshift-logging/elasticsearch6-rhel8@sha256:17a9f3ae042b92693a374e3d60a07f2ab2e52419f8df25d446dd0654f6a858f6_ppc64le",
"product_id": "openshift-logging/elasticsearch6-rhel8@sha256:17a9f3ae042b92693a374e3d60a07f2ab2e52419f8df25d446dd0654f6a858f6_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/elasticsearch6-rhel8@sha256:17a9f3ae042b92693a374e3d60a07f2ab2e52419f8df25d446dd0654f6a858f6?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-logging/elasticsearch6-rhel8\u0026tag=v6.8.1-265"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/eventrouter-rhel8@sha256:bc408fc4b0482c5eb1b0deb3a9090f3e3dd9b370001d54cd076254562c72fec9_ppc64le",
"product": {
"name": "openshift-logging/eventrouter-rhel8@sha256:bc408fc4b0482c5eb1b0deb3a9090f3e3dd9b370001d54cd076254562c72fec9_ppc64le",
"product_id": "openshift-logging/eventrouter-rhel8@sha256:bc408fc4b0482c5eb1b0deb3a9090f3e3dd9b370001d54cd076254562c72fec9_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/eventrouter-rhel8@sha256:bc408fc4b0482c5eb1b0deb3a9090f3e3dd9b370001d54cd076254562c72fec9?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-logging/eventrouter-rhel8\u0026tag=v0.4.0-55"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/fluentd-rhel8@sha256:ea07da04f06df6bf0d9dd981a3795dfdb51eca83f59a6291114650e3e98a9e71_ppc64le",
"product": {
"name": "openshift-logging/fluentd-rhel8@sha256:ea07da04f06df6bf0d9dd981a3795dfdb51eca83f59a6291114650e3e98a9e71_ppc64le",
"product_id": "openshift-logging/fluentd-rhel8@sha256:ea07da04f06df6bf0d9dd981a3795dfdb51eca83f59a6291114650e3e98a9e71_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/fluentd-rhel8@sha256:ea07da04f06df6bf0d9dd981a3795dfdb51eca83f59a6291114650e3e98a9e71?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-logging/fluentd-rhel8\u0026tag=v1.14.5-36"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/kibana6-rhel8@sha256:812f4380024dc3df42310ad14d173d390f2bdf4b3dbdb02550c00552534f79ce_ppc64le",
"product": {
"name": "openshift-logging/kibana6-rhel8@sha256:812f4380024dc3df42310ad14d173d390f2bdf4b3dbdb02550c00552534f79ce_ppc64le",
"product_id": "openshift-logging/kibana6-rhel8@sha256:812f4380024dc3df42310ad14d173d390f2bdf4b3dbdb02550c00552534f79ce_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/kibana6-rhel8@sha256:812f4380024dc3df42310ad14d173d390f2bdf4b3dbdb02550c00552534f79ce?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-logging/kibana6-rhel8\u0026tag=v6.8.1-302"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/logging-loki-rhel8@sha256:f7979c82140a0ab1a97c9f3151465bfbd9f79c4db9b0cc20f974cd7b890f074f_ppc64le",
"product": {
"name": "openshift-logging/logging-loki-rhel8@sha256:f7979c82140a0ab1a97c9f3151465bfbd9f79c4db9b0cc20f974cd7b890f074f_ppc64le",
"product_id": "openshift-logging/logging-loki-rhel8@sha256:f7979c82140a0ab1a97c9f3151465bfbd9f79c4db9b0cc20f974cd7b890f074f_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/logging-loki-rhel8@sha256:f7979c82140a0ab1a97c9f3151465bfbd9f79c4db9b0cc20f974cd7b890f074f?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-logging/logging-loki-rhel8\u0026tag=v2.5.0-51"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/vector-rhel8@sha256:48f0317d167710ff5b0787c73f6b7dd0249e7c8d2d001159132a97299c30b62d_ppc64le",
"product": {
"name": "openshift-logging/vector-rhel8@sha256:48f0317d167710ff5b0787c73f6b7dd0249e7c8d2d001159132a97299c30b62d_ppc64le",
"product_id": "openshift-logging/vector-rhel8@sha256:48f0317d167710ff5b0787c73f6b7dd0249e7c8d2d001159132a97299c30b62d_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/vector-rhel8@sha256:48f0317d167710ff5b0787c73f6b7dd0249e7c8d2d001159132a97299c30b62d?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-logging/vector-rhel8\u0026tag=v0.14-67"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/loki-rhel8-operator@sha256:28f45a80846c5e11638fb479be42cafcb2bdb3af94dff3629a820de295cbe31d_ppc64le",
"product": {
"name": "openshift-logging/loki-rhel8-operator@sha256:28f45a80846c5e11638fb479be42cafcb2bdb3af94dff3629a820de295cbe31d_ppc64le",
"product_id": "openshift-logging/loki-rhel8-operator@sha256:28f45a80846c5e11638fb479be42cafcb2bdb3af94dff3629a820de295cbe31d_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/loki-rhel8-operator@sha256:28f45a80846c5e11638fb479be42cafcb2bdb3af94dff3629a820de295cbe31d?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-logging/loki-rhel8-operator\u0026tag=v5.4.8-4"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/lokistack-gateway-rhel8@sha256:7b0c2c99cf0f710166b749dbfd7f544caf5fe35516c743fca251c7cec896e1d6_ppc64le",
"product": {
"name": "openshift-logging/lokistack-gateway-rhel8@sha256:7b0c2c99cf0f710166b749dbfd7f544caf5fe35516c743fca251c7cec896e1d6_ppc64le",
"product_id": "openshift-logging/lokistack-gateway-rhel8@sha256:7b0c2c99cf0f710166b749dbfd7f544caf5fe35516c743fca251c7cec896e1d6_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/lokistack-gateway-rhel8@sha256:7b0c2c99cf0f710166b749dbfd7f544caf5fe35516c743fca251c7cec896e1d6?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-logging/lokistack-gateway-rhel8\u0026tag=v5.4.8-5"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/opa-openshift-rhel8@sha256:92ddf24824c8f8ae93dec07184c446615b635389472d3a525df72da07c8d9b97_ppc64le",
"product": {
"name": "openshift-logging/opa-openshift-rhel8@sha256:92ddf24824c8f8ae93dec07184c446615b635389472d3a525df72da07c8d9b97_ppc64le",
"product_id": "openshift-logging/opa-openshift-rhel8@sha256:92ddf24824c8f8ae93dec07184c446615b635389472d3a525df72da07c8d9b97_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/opa-openshift-rhel8@sha256:92ddf24824c8f8ae93dec07184c446615b635389472d3a525df72da07c8d9b97?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-logging/opa-openshift-rhel8\u0026tag=v5.4.8-4"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "openshift-logging/cluster-logging-rhel8-operator@sha256:637df49756fe85e7b38b279ffa7672d72c658d3d47df7f9dada2dd70563af83b_arm64",
"product": {
"name": "openshift-logging/cluster-logging-rhel8-operator@sha256:637df49756fe85e7b38b279ffa7672d72c658d3d47df7f9dada2dd70563af83b_arm64",
"product_id": "openshift-logging/cluster-logging-rhel8-operator@sha256:637df49756fe85e7b38b279ffa7672d72c658d3d47df7f9dada2dd70563af83b_arm64",
"product_identification_helper": {
"purl": "pkg:oci/cluster-logging-rhel8-operator@sha256:637df49756fe85e7b38b279ffa7672d72c658d3d47df7f9dada2dd70563af83b?arch=arm64\u0026repository_url=registry.redhat.io/openshift-logging/cluster-logging-rhel8-operator\u0026tag=v5.4.8-6"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/elasticsearch-rhel8-operator@sha256:2005f41e59a130bb86c2ec47d1b060e3e2ed32f9a4cef3897e2c05fc94043dbb_arm64",
"product": {
"name": "openshift-logging/elasticsearch-rhel8-operator@sha256:2005f41e59a130bb86c2ec47d1b060e3e2ed32f9a4cef3897e2c05fc94043dbb_arm64",
"product_id": "openshift-logging/elasticsearch-rhel8-operator@sha256:2005f41e59a130bb86c2ec47d1b060e3e2ed32f9a4cef3897e2c05fc94043dbb_arm64",
"product_identification_helper": {
"purl": "pkg:oci/elasticsearch-rhel8-operator@sha256:2005f41e59a130bb86c2ec47d1b060e3e2ed32f9a4cef3897e2c05fc94043dbb?arch=arm64\u0026repository_url=registry.redhat.io/openshift-logging/elasticsearch-rhel8-operator\u0026tag=v5.4.8-3"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/elasticsearch-proxy-rhel8@sha256:c9a2b9e7cca14d9596ccbe0f64e2abe4452f91f029f42eefead43c9f526f6a58_arm64",
"product": {
"name": "openshift-logging/elasticsearch-proxy-rhel8@sha256:c9a2b9e7cca14d9596ccbe0f64e2abe4452f91f029f42eefead43c9f526f6a58_arm64",
"product_id": "openshift-logging/elasticsearch-proxy-rhel8@sha256:c9a2b9e7cca14d9596ccbe0f64e2abe4452f91f029f42eefead43c9f526f6a58_arm64",
"product_identification_helper": {
"purl": "pkg:oci/elasticsearch-proxy-rhel8@sha256:c9a2b9e7cca14d9596ccbe0f64e2abe4452f91f029f42eefead43c9f526f6a58?arch=arm64\u0026repository_url=registry.redhat.io/openshift-logging/elasticsearch-proxy-rhel8\u0026tag=v1.0.0-300"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/log-file-metric-exporter-rhel8@sha256:a5285db276a5545fdbaa9f0743a49ba72ce1c5da61b5cccc9422320a03e08bea_arm64",
"product": {
"name": "openshift-logging/log-file-metric-exporter-rhel8@sha256:a5285db276a5545fdbaa9f0743a49ba72ce1c5da61b5cccc9422320a03e08bea_arm64",
"product_id": "openshift-logging/log-file-metric-exporter-rhel8@sha256:a5285db276a5545fdbaa9f0743a49ba72ce1c5da61b5cccc9422320a03e08bea_arm64",
"product_identification_helper": {
"purl": "pkg:oci/log-file-metric-exporter-rhel8@sha256:a5285db276a5545fdbaa9f0743a49ba72ce1c5da61b5cccc9422320a03e08bea?arch=arm64\u0026repository_url=registry.redhat.io/openshift-logging/log-file-metric-exporter-rhel8\u0026tag=v1.1.0-74"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/logging-curator5-rhel8@sha256:0b28415b8115ff3216002faa5c9ecf3c46995085e3364c8028cb544cb4787ed2_arm64",
"product": {
"name": "openshift-logging/logging-curator5-rhel8@sha256:0b28415b8115ff3216002faa5c9ecf3c46995085e3364c8028cb544cb4787ed2_arm64",
"product_id": "openshift-logging/logging-curator5-rhel8@sha256:0b28415b8115ff3216002faa5c9ecf3c46995085e3364c8028cb544cb4787ed2_arm64",
"product_identification_helper": {
"purl": "pkg:oci/logging-curator5-rhel8@sha256:0b28415b8115ff3216002faa5c9ecf3c46995085e3364c8028cb544cb4787ed2?arch=arm64\u0026repository_url=registry.redhat.io/openshift-logging/logging-curator5-rhel8\u0026tag=v5.8.1-246"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/elasticsearch6-rhel8@sha256:8e0ba10f91db4cb8786d0501ec33a3d54f7c7c5337e0495cc2286a6ea20cca20_arm64",
"product": {
"name": "openshift-logging/elasticsearch6-rhel8@sha256:8e0ba10f91db4cb8786d0501ec33a3d54f7c7c5337e0495cc2286a6ea20cca20_arm64",
"product_id": "openshift-logging/elasticsearch6-rhel8@sha256:8e0ba10f91db4cb8786d0501ec33a3d54f7c7c5337e0495cc2286a6ea20cca20_arm64",
"product_identification_helper": {
"purl": "pkg:oci/elasticsearch6-rhel8@sha256:8e0ba10f91db4cb8786d0501ec33a3d54f7c7c5337e0495cc2286a6ea20cca20?arch=arm64\u0026repository_url=registry.redhat.io/openshift-logging/elasticsearch6-rhel8\u0026tag=v6.8.1-265"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/eventrouter-rhel8@sha256:4438a3bba34418a9dc566bf15f6b4764de4295ab8b05a7b1a86f9e8cd332b3f7_arm64",
"product": {
"name": "openshift-logging/eventrouter-rhel8@sha256:4438a3bba34418a9dc566bf15f6b4764de4295ab8b05a7b1a86f9e8cd332b3f7_arm64",
"product_id": "openshift-logging/eventrouter-rhel8@sha256:4438a3bba34418a9dc566bf15f6b4764de4295ab8b05a7b1a86f9e8cd332b3f7_arm64",
"product_identification_helper": {
"purl": "pkg:oci/eventrouter-rhel8@sha256:4438a3bba34418a9dc566bf15f6b4764de4295ab8b05a7b1a86f9e8cd332b3f7?arch=arm64\u0026repository_url=registry.redhat.io/openshift-logging/eventrouter-rhel8\u0026tag=v0.4.0-55"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/fluentd-rhel8@sha256:e3a51d2bdc632b8376e28c33e9d4fac3464e3a84a313a17246b1f1cf21cb5710_arm64",
"product": {
"name": "openshift-logging/fluentd-rhel8@sha256:e3a51d2bdc632b8376e28c33e9d4fac3464e3a84a313a17246b1f1cf21cb5710_arm64",
"product_id": "openshift-logging/fluentd-rhel8@sha256:e3a51d2bdc632b8376e28c33e9d4fac3464e3a84a313a17246b1f1cf21cb5710_arm64",
"product_identification_helper": {
"purl": "pkg:oci/fluentd-rhel8@sha256:e3a51d2bdc632b8376e28c33e9d4fac3464e3a84a313a17246b1f1cf21cb5710?arch=arm64\u0026repository_url=registry.redhat.io/openshift-logging/fluentd-rhel8\u0026tag=v1.14.5-36"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/kibana6-rhel8@sha256:958ba6856cc76fc77d34a9c78888eb37b9c39b83a2f044ef2337610560ba9323_arm64",
"product": {
"name": "openshift-logging/kibana6-rhel8@sha256:958ba6856cc76fc77d34a9c78888eb37b9c39b83a2f044ef2337610560ba9323_arm64",
"product_id": "openshift-logging/kibana6-rhel8@sha256:958ba6856cc76fc77d34a9c78888eb37b9c39b83a2f044ef2337610560ba9323_arm64",
"product_identification_helper": {
"purl": "pkg:oci/kibana6-rhel8@sha256:958ba6856cc76fc77d34a9c78888eb37b9c39b83a2f044ef2337610560ba9323?arch=arm64\u0026repository_url=registry.redhat.io/openshift-logging/kibana6-rhel8\u0026tag=v6.8.1-302"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/logging-loki-rhel8@sha256:40d4989b4733f54a01a73831fa00b12e49fff69c75138902eac0d894d432e4d9_arm64",
"product": {
"name": "openshift-logging/logging-loki-rhel8@sha256:40d4989b4733f54a01a73831fa00b12e49fff69c75138902eac0d894d432e4d9_arm64",
"product_id": "openshift-logging/logging-loki-rhel8@sha256:40d4989b4733f54a01a73831fa00b12e49fff69c75138902eac0d894d432e4d9_arm64",
"product_identification_helper": {
"purl": "pkg:oci/logging-loki-rhel8@sha256:40d4989b4733f54a01a73831fa00b12e49fff69c75138902eac0d894d432e4d9?arch=arm64\u0026repository_url=registry.redhat.io/openshift-logging/logging-loki-rhel8\u0026tag=v2.5.0-51"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/vector-rhel8@sha256:bde21c03fb831d01e85b28245881f7e3f2bb2ef6d2671eb92b2e0cc4bd3898e2_arm64",
"product": {
"name": "openshift-logging/vector-rhel8@sha256:bde21c03fb831d01e85b28245881f7e3f2bb2ef6d2671eb92b2e0cc4bd3898e2_arm64",
"product_id": "openshift-logging/vector-rhel8@sha256:bde21c03fb831d01e85b28245881f7e3f2bb2ef6d2671eb92b2e0cc4bd3898e2_arm64",
"product_identification_helper": {
"purl": "pkg:oci/vector-rhel8@sha256:bde21c03fb831d01e85b28245881f7e3f2bb2ef6d2671eb92b2e0cc4bd3898e2?arch=arm64\u0026repository_url=registry.redhat.io/openshift-logging/vector-rhel8\u0026tag=v0.14-67"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/loki-rhel8-operator@sha256:df7de1e9f5a4396df6f14b1c4b6bb2a9ae4bc50d82cbc954ec535c26e8df2cb1_arm64",
"product": {
"name": "openshift-logging/loki-rhel8-operator@sha256:df7de1e9f5a4396df6f14b1c4b6bb2a9ae4bc50d82cbc954ec535c26e8df2cb1_arm64",
"product_id": "openshift-logging/loki-rhel8-operator@sha256:df7de1e9f5a4396df6f14b1c4b6bb2a9ae4bc50d82cbc954ec535c26e8df2cb1_arm64",
"product_identification_helper": {
"purl": "pkg:oci/loki-rhel8-operator@sha256:df7de1e9f5a4396df6f14b1c4b6bb2a9ae4bc50d82cbc954ec535c26e8df2cb1?arch=arm64\u0026repository_url=registry.redhat.io/openshift-logging/loki-rhel8-operator\u0026tag=v5.4.8-4"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/lokistack-gateway-rhel8@sha256:178fcf44e6a1fa90d27a40565f69ae2880622b017bc8d9e33a441353eb45609d_arm64",
"product": {
"name": "openshift-logging/lokistack-gateway-rhel8@sha256:178fcf44e6a1fa90d27a40565f69ae2880622b017bc8d9e33a441353eb45609d_arm64",
"product_id": "openshift-logging/lokistack-gateway-rhel8@sha256:178fcf44e6a1fa90d27a40565f69ae2880622b017bc8d9e33a441353eb45609d_arm64",
"product_identification_helper": {
"purl": "pkg:oci/lokistack-gateway-rhel8@sha256:178fcf44e6a1fa90d27a40565f69ae2880622b017bc8d9e33a441353eb45609d?arch=arm64\u0026repository_url=registry.redhat.io/openshift-logging/lokistack-gateway-rhel8\u0026tag=v5.4.8-5"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/opa-openshift-rhel8@sha256:1b106af51bb50f1ce4db13ebbf6f6c67eae45611c0d5dc46476f1dfaa8aca166_arm64",
"product": {
"name": "openshift-logging/opa-openshift-rhel8@sha256:1b106af51bb50f1ce4db13ebbf6f6c67eae45611c0d5dc46476f1dfaa8aca166_arm64",
"product_id": "openshift-logging/opa-openshift-rhel8@sha256:1b106af51bb50f1ce4db13ebbf6f6c67eae45611c0d5dc46476f1dfaa8aca166_arm64",
"product_identification_helper": {
"purl": "pkg:oci/opa-openshift-rhel8@sha256:1b106af51bb50f1ce4db13ebbf6f6c67eae45611c0d5dc46476f1dfaa8aca166?arch=arm64\u0026repository_url=registry.redhat.io/openshift-logging/opa-openshift-rhel8\u0026tag=v5.4.8-4"
}
}
}
],
"category": "architecture",
"name": "arm64"
},
{
"branches": [
{
"category": "product_version",
"name": "openshift-logging/cluster-logging-rhel8-operator@sha256:c698b52c46d41007e5ac4f90b9540d430820bd20a93468fddd3a949c7ef5b332_amd64",
"product": {
"name": "openshift-logging/cluster-logging-rhel8-operator@sha256:c698b52c46d41007e5ac4f90b9540d430820bd20a93468fddd3a949c7ef5b332_amd64",
"product_id": "openshift-logging/cluster-logging-rhel8-operator@sha256:c698b52c46d41007e5ac4f90b9540d430820bd20a93468fddd3a949c7ef5b332_amd64",
"product_identification_helper": {
"purl": "pkg:oci/cluster-logging-rhel8-operator@sha256:c698b52c46d41007e5ac4f90b9540d430820bd20a93468fddd3a949c7ef5b332?arch=amd64\u0026repository_url=registry.redhat.io/openshift-logging/cluster-logging-rhel8-operator\u0026tag=v5.4.8-6"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/cluster-logging-operator-bundle@sha256:cb26d9e55f781dd535901a90f1ec2f8e02e8e1de72c0fde638c90fcc228ec4b2_amd64",
"product": {
"name": "openshift-logging/cluster-logging-operator-bundle@sha256:cb26d9e55f781dd535901a90f1ec2f8e02e8e1de72c0fde638c90fcc228ec4b2_amd64",
"product_id": "openshift-logging/cluster-logging-operator-bundle@sha256:cb26d9e55f781dd535901a90f1ec2f8e02e8e1de72c0fde638c90fcc228ec4b2_amd64",
"product_identification_helper": {
"purl": "pkg:oci/cluster-logging-operator-bundle@sha256:cb26d9e55f781dd535901a90f1ec2f8e02e8e1de72c0fde638c90fcc228ec4b2?arch=amd64\u0026repository_url=registry.redhat.io/openshift-logging/cluster-logging-operator-bundle\u0026tag=v5.4.8-7"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/elasticsearch-rhel8-operator@sha256:8ce04536772f31ad022b9c66cddc090d2962b44d66c06a1db56d1447be198326_amd64",
"product": {
"name": "openshift-logging/elasticsearch-rhel8-operator@sha256:8ce04536772f31ad022b9c66cddc090d2962b44d66c06a1db56d1447be198326_amd64",
"product_id": "openshift-logging/elasticsearch-rhel8-operator@sha256:8ce04536772f31ad022b9c66cddc090d2962b44d66c06a1db56d1447be198326_amd64",
"product_identification_helper": {
"purl": "pkg:oci/elasticsearch-rhel8-operator@sha256:8ce04536772f31ad022b9c66cddc090d2962b44d66c06a1db56d1447be198326?arch=amd64\u0026repository_url=registry.redhat.io/openshift-logging/elasticsearch-rhel8-operator\u0026tag=v5.4.8-3"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/elasticsearch-operator-bundle@sha256:7659606e0418a1920161b7ca67524ea6a7b1ed366b817f1a5cde0b346152243c_amd64",
"product": {
"name": "openshift-logging/elasticsearch-operator-bundle@sha256:7659606e0418a1920161b7ca67524ea6a7b1ed366b817f1a5cde0b346152243c_amd64",
"product_id": "openshift-logging/elasticsearch-operator-bundle@sha256:7659606e0418a1920161b7ca67524ea6a7b1ed366b817f1a5cde0b346152243c_amd64",
"product_identification_helper": {
"purl": "pkg:oci/elasticsearch-operator-bundle@sha256:7659606e0418a1920161b7ca67524ea6a7b1ed366b817f1a5cde0b346152243c?arch=amd64\u0026repository_url=registry.redhat.io/openshift-logging/elasticsearch-operator-bundle\u0026tag=v5.4.8-11"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/elasticsearch-proxy-rhel8@sha256:e38c55762c1eef39b401c46d44c899067b1566173e1ce239f17a95c52b30d8c7_amd64",
"product": {
"name": "openshift-logging/elasticsearch-proxy-rhel8@sha256:e38c55762c1eef39b401c46d44c899067b1566173e1ce239f17a95c52b30d8c7_amd64",
"product_id": "openshift-logging/elasticsearch-proxy-rhel8@sha256:e38c55762c1eef39b401c46d44c899067b1566173e1ce239f17a95c52b30d8c7_amd64",
"product_identification_helper": {
"purl": "pkg:oci/elasticsearch-proxy-rhel8@sha256:e38c55762c1eef39b401c46d44c899067b1566173e1ce239f17a95c52b30d8c7?arch=amd64\u0026repository_url=registry.redhat.io/openshift-logging/elasticsearch-proxy-rhel8\u0026tag=v1.0.0-300"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/log-file-metric-exporter-rhel8@sha256:043e4d3481fbfedf3115e18fade3a2f33b891b0d9a641bf973c2c7f492cb0489_amd64",
"product": {
"name": "openshift-logging/log-file-metric-exporter-rhel8@sha256:043e4d3481fbfedf3115e18fade3a2f33b891b0d9a641bf973c2c7f492cb0489_amd64",
"product_id": "openshift-logging/log-file-metric-exporter-rhel8@sha256:043e4d3481fbfedf3115e18fade3a2f33b891b0d9a641bf973c2c7f492cb0489_amd64",
"product_identification_helper": {
"purl": "pkg:oci/log-file-metric-exporter-rhel8@sha256:043e4d3481fbfedf3115e18fade3a2f33b891b0d9a641bf973c2c7f492cb0489?arch=amd64\u0026repository_url=registry.redhat.io/openshift-logging/log-file-metric-exporter-rhel8\u0026tag=v1.1.0-74"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/logging-curator5-rhel8@sha256:94c435f45e9dbd9fa633e137356cfb1d6ac2d4dd7574b359367665da42d6203d_amd64",
"product": {
"name": "openshift-logging/logging-curator5-rhel8@sha256:94c435f45e9dbd9fa633e137356cfb1d6ac2d4dd7574b359367665da42d6203d_amd64",
"product_id": "openshift-logging/logging-curator5-rhel8@sha256:94c435f45e9dbd9fa633e137356cfb1d6ac2d4dd7574b359367665da42d6203d_amd64",
"product_identification_helper": {
"purl": "pkg:oci/logging-curator5-rhel8@sha256:94c435f45e9dbd9fa633e137356cfb1d6ac2d4dd7574b359367665da42d6203d?arch=amd64\u0026repository_url=registry.redhat.io/openshift-logging/logging-curator5-rhel8\u0026tag=v5.8.1-246"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/elasticsearch6-rhel8@sha256:fa8182b69328077500f89becc7621b48efa8d99f34247c2e6855dcfec13980e3_amd64",
"product": {
"name": "openshift-logging/elasticsearch6-rhel8@sha256:fa8182b69328077500f89becc7621b48efa8d99f34247c2e6855dcfec13980e3_amd64",
"product_id": "openshift-logging/elasticsearch6-rhel8@sha256:fa8182b69328077500f89becc7621b48efa8d99f34247c2e6855dcfec13980e3_amd64",
"product_identification_helper": {
"purl": "pkg:oci/elasticsearch6-rhel8@sha256:fa8182b69328077500f89becc7621b48efa8d99f34247c2e6855dcfec13980e3?arch=amd64\u0026repository_url=registry.redhat.io/openshift-logging/elasticsearch6-rhel8\u0026tag=v6.8.1-265"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/eventrouter-rhel8@sha256:d50a2b89442d04b1163c01b3a3951857a95df76c57b14e7f51d835c3ac6d75b3_amd64",
"product": {
"name": "openshift-logging/eventrouter-rhel8@sha256:d50a2b89442d04b1163c01b3a3951857a95df76c57b14e7f51d835c3ac6d75b3_amd64",
"product_id": "openshift-logging/eventrouter-rhel8@sha256:d50a2b89442d04b1163c01b3a3951857a95df76c57b14e7f51d835c3ac6d75b3_amd64",
"product_identification_helper": {
"purl": "pkg:oci/eventrouter-rhel8@sha256:d50a2b89442d04b1163c01b3a3951857a95df76c57b14e7f51d835c3ac6d75b3?arch=amd64\u0026repository_url=registry.redhat.io/openshift-logging/eventrouter-rhel8\u0026tag=v0.4.0-55"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/fluentd-rhel8@sha256:150e17cb645cf2f4cb7ab592572dd3abd145d9a33e790778280e256666248022_amd64",
"product": {
"name": "openshift-logging/fluentd-rhel8@sha256:150e17cb645cf2f4cb7ab592572dd3abd145d9a33e790778280e256666248022_amd64",
"product_id": "openshift-logging/fluentd-rhel8@sha256:150e17cb645cf2f4cb7ab592572dd3abd145d9a33e790778280e256666248022_amd64",
"product_identification_helper": {
"purl": "pkg:oci/fluentd-rhel8@sha256:150e17cb645cf2f4cb7ab592572dd3abd145d9a33e790778280e256666248022?arch=amd64\u0026repository_url=registry.redhat.io/openshift-logging/fluentd-rhel8\u0026tag=v1.14.5-36"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/kibana6-rhel8@sha256:167ee6a645c7397bde3d12e9b9685279505c25ffb3bda11ae68bdf0b34229f2e_amd64",
"product": {
"name": "openshift-logging/kibana6-rhel8@sha256:167ee6a645c7397bde3d12e9b9685279505c25ffb3bda11ae68bdf0b34229f2e_amd64",
"product_id": "openshift-logging/kibana6-rhel8@sha256:167ee6a645c7397bde3d12e9b9685279505c25ffb3bda11ae68bdf0b34229f2e_amd64",
"product_identification_helper": {
"purl": "pkg:oci/kibana6-rhel8@sha256:167ee6a645c7397bde3d12e9b9685279505c25ffb3bda11ae68bdf0b34229f2e?arch=amd64\u0026repository_url=registry.redhat.io/openshift-logging/kibana6-rhel8\u0026tag=v6.8.1-302"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/logging-loki-rhel8@sha256:b444af35118c24bde0dfa2a8825ba427b3345451f6081133477254213a3460f0_amd64",
"product": {
"name": "openshift-logging/logging-loki-rhel8@sha256:b444af35118c24bde0dfa2a8825ba427b3345451f6081133477254213a3460f0_amd64",
"product_id": "openshift-logging/logging-loki-rhel8@sha256:b444af35118c24bde0dfa2a8825ba427b3345451f6081133477254213a3460f0_amd64",
"product_identification_helper": {
"purl": "pkg:oci/logging-loki-rhel8@sha256:b444af35118c24bde0dfa2a8825ba427b3345451f6081133477254213a3460f0?arch=amd64\u0026repository_url=registry.redhat.io/openshift-logging/logging-loki-rhel8\u0026tag=v2.5.0-51"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/vector-rhel8@sha256:cc6b9c6a344aac56c99c96b5120ffe2dad479000b34964ff89d030ae762bda43_amd64",
"product": {
"name": "openshift-logging/vector-rhel8@sha256:cc6b9c6a344aac56c99c96b5120ffe2dad479000b34964ff89d030ae762bda43_amd64",
"product_id": "openshift-logging/vector-rhel8@sha256:cc6b9c6a344aac56c99c96b5120ffe2dad479000b34964ff89d030ae762bda43_amd64",
"product_identification_helper": {
"purl": "pkg:oci/vector-rhel8@sha256:cc6b9c6a344aac56c99c96b5120ffe2dad479000b34964ff89d030ae762bda43?arch=amd64\u0026repository_url=registry.redhat.io/openshift-logging/vector-rhel8\u0026tag=v0.14-67"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/loki-operator-bundle@sha256:02cceda51028eb55a3b82aa5275f03dbaf8f8f9ab3fd27c650d1a07a93044e37_amd64",
"product": {
"name": "openshift-logging/loki-operator-bundle@sha256:02cceda51028eb55a3b82aa5275f03dbaf8f8f9ab3fd27c650d1a07a93044e37_amd64",
"product_id": "openshift-logging/loki-operator-bundle@sha256:02cceda51028eb55a3b82aa5275f03dbaf8f8f9ab3fd27c650d1a07a93044e37_amd64",
"product_identification_helper": {
"purl": "pkg:oci/loki-operator-bundle@sha256:02cceda51028eb55a3b82aa5275f03dbaf8f8f9ab3fd27c650d1a07a93044e37?arch=amd64\u0026repository_url=registry.redhat.io/openshift-logging/loki-operator-bundle\u0026tag=v5.4.8-20"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/loki-rhel8-operator@sha256:f8a35557c9eb27f703ffa9320a9d39a2361d93fdb0b8c874d97da458048e7eec_amd64",
"product": {
"name": "openshift-logging/loki-rhel8-operator@sha256:f8a35557c9eb27f703ffa9320a9d39a2361d93fdb0b8c874d97da458048e7eec_amd64",
"product_id": "openshift-logging/loki-rhel8-operator@sha256:f8a35557c9eb27f703ffa9320a9d39a2361d93fdb0b8c874d97da458048e7eec_amd64",
"product_identification_helper": {
"purl": "pkg:oci/loki-rhel8-operator@sha256:f8a35557c9eb27f703ffa9320a9d39a2361d93fdb0b8c874d97da458048e7eec?arch=amd64\u0026repository_url=registry.redhat.io/openshift-logging/loki-rhel8-operator\u0026tag=v5.4.8-4"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/lokistack-gateway-rhel8@sha256:a967d5be7d3a6fdd75965a5f9a7396a52cdcb37d6a8521c440b0b5c650c230f2_amd64",
"product": {
"name": "openshift-logging/lokistack-gateway-rhel8@sha256:a967d5be7d3a6fdd75965a5f9a7396a52cdcb37d6a8521c440b0b5c650c230f2_amd64",
"product_id": "openshift-logging/lokistack-gateway-rhel8@sha256:a967d5be7d3a6fdd75965a5f9a7396a52cdcb37d6a8521c440b0b5c650c230f2_amd64",
"product_identification_helper": {
"purl": "pkg:oci/lokistack-gateway-rhel8@sha256:a967d5be7d3a6fdd75965a5f9a7396a52cdcb37d6a8521c440b0b5c650c230f2?arch=amd64\u0026repository_url=registry.redhat.io/openshift-logging/lokistack-gateway-rhel8\u0026tag=v5.4.8-5"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/opa-openshift-rhel8@sha256:9fd0c5df785564b35392705a479d6fb9245e3329719438c76c0282f9ef2f2d55_amd64",
"product": {
"name": "openshift-logging/opa-openshift-rhel8@sha256:9fd0c5df785564b35392705a479d6fb9245e3329719438c76c0282f9ef2f2d55_amd64",
"product_id": "openshift-logging/opa-openshift-rhel8@sha256:9fd0c5df785564b35392705a479d6fb9245e3329719438c76c0282f9ef2f2d55_amd64",
"product_identification_helper": {
"purl": "pkg:oci/opa-openshift-rhel8@sha256:9fd0c5df785564b35392705a479d6fb9245e3329719438c76c0282f9ef2f2d55?arch=amd64\u0026repository_url=registry.redhat.io/openshift-logging/opa-openshift-rhel8\u0026tag=v5.4.8-4"
}
}
}
],
"category": "architecture",
"name": "amd64"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/cluster-logging-operator-bundle@sha256:cb26d9e55f781dd535901a90f1ec2f8e02e8e1de72c0fde638c90fcc228ec4b2_amd64 as a component of RHOL 5.4 for RHEL 8",
"product_id": "8Base-RHOL-5.4:openshift-logging/cluster-logging-operator-bundle@sha256:cb26d9e55f781dd535901a90f1ec2f8e02e8e1de72c0fde638c90fcc228ec4b2_amd64"
},
"product_reference": "openshift-logging/cluster-logging-operator-bundle@sha256:cb26d9e55f781dd535901a90f1ec2f8e02e8e1de72c0fde638c90fcc228ec4b2_amd64",
"relates_to_product_reference": "8Base-RHOL-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/cluster-logging-rhel8-operator@sha256:617cc8b0011110981674b75fe1e3041bfa434c952e4a0193818b971edbc7a480_s390x as a component of RHOL 5.4 for RHEL 8",
"product_id": "8Base-RHOL-5.4:openshift-logging/cluster-logging-rhel8-operator@sha256:617cc8b0011110981674b75fe1e3041bfa434c952e4a0193818b971edbc7a480_s390x"
},
"product_reference": "openshift-logging/cluster-logging-rhel8-operator@sha256:617cc8b0011110981674b75fe1e3041bfa434c952e4a0193818b971edbc7a480_s390x",
"relates_to_product_reference": "8Base-RHOL-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/cluster-logging-rhel8-operator@sha256:637df49756fe85e7b38b279ffa7672d72c658d3d47df7f9dada2dd70563af83b_arm64 as a component of RHOL 5.4 for RHEL 8",
"product_id": "8Base-RHOL-5.4:openshift-logging/cluster-logging-rhel8-operator@sha256:637df49756fe85e7b38b279ffa7672d72c658d3d47df7f9dada2dd70563af83b_arm64"
},
"product_reference": "openshift-logging/cluster-logging-rhel8-operator@sha256:637df49756fe85e7b38b279ffa7672d72c658d3d47df7f9dada2dd70563af83b_arm64",
"relates_to_product_reference": "8Base-RHOL-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/cluster-logging-rhel8-operator@sha256:aa1602fe2abe23bd8a4c791bc45d425686a6e6d1aab4face0fac28bfc7cebbe1_ppc64le as a component of RHOL 5.4 for RHEL 8",
"product_id": "8Base-RHOL-5.4:openshift-logging/cluster-logging-rhel8-operator@sha256:aa1602fe2abe23bd8a4c791bc45d425686a6e6d1aab4face0fac28bfc7cebbe1_ppc64le"
},
"product_reference": "openshift-logging/cluster-logging-rhel8-operator@sha256:aa1602fe2abe23bd8a4c791bc45d425686a6e6d1aab4face0fac28bfc7cebbe1_ppc64le",
"relates_to_product_reference": "8Base-RHOL-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/cluster-logging-rhel8-operator@sha256:c698b52c46d41007e5ac4f90b9540d430820bd20a93468fddd3a949c7ef5b332_amd64 as a component of RHOL 5.4 for RHEL 8",
"product_id": "8Base-RHOL-5.4:openshift-logging/cluster-logging-rhel8-operator@sha256:c698b52c46d41007e5ac4f90b9540d430820bd20a93468fddd3a949c7ef5b332_amd64"
},
"product_reference": "openshift-logging/cluster-logging-rhel8-operator@sha256:c698b52c46d41007e5ac4f90b9540d430820bd20a93468fddd3a949c7ef5b332_amd64",
"relates_to_product_reference": "8Base-RHOL-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/elasticsearch-operator-bundle@sha256:7659606e0418a1920161b7ca67524ea6a7b1ed366b817f1a5cde0b346152243c_amd64 as a component of RHOL 5.4 for RHEL 8",
"product_id": "8Base-RHOL-5.4:openshift-logging/elasticsearch-operator-bundle@sha256:7659606e0418a1920161b7ca67524ea6a7b1ed366b817f1a5cde0b346152243c_amd64"
},
"product_reference": "openshift-logging/elasticsearch-operator-bundle@sha256:7659606e0418a1920161b7ca67524ea6a7b1ed366b817f1a5cde0b346152243c_amd64",
"relates_to_product_reference": "8Base-RHOL-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/elasticsearch-proxy-rhel8@sha256:4f4e5bb267ad391bc0fc6a010ec9ecdf3bf48d5b6e9db0d2510960c13c97bd71_ppc64le as a component of RHOL 5.4 for RHEL 8",
"product_id": "8Base-RHOL-5.4:openshift-logging/elasticsearch-proxy-rhel8@sha256:4f4e5bb267ad391bc0fc6a010ec9ecdf3bf48d5b6e9db0d2510960c13c97bd71_ppc64le"
},
"product_reference": "openshift-logging/elasticsearch-proxy-rhel8@sha256:4f4e5bb267ad391bc0fc6a010ec9ecdf3bf48d5b6e9db0d2510960c13c97bd71_ppc64le",
"relates_to_product_reference": "8Base-RHOL-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/elasticsearch-proxy-rhel8@sha256:b9c2e58b39dc3de97013f8806178f6327bf2e4590fe55db144527d64d468f64f_s390x as a component of RHOL 5.4 for RHEL 8",
"product_id": "8Base-RHOL-5.4:openshift-logging/elasticsearch-proxy-rhel8@sha256:b9c2e58b39dc3de97013f8806178f6327bf2e4590fe55db144527d64d468f64f_s390x"
},
"product_reference": "openshift-logging/elasticsearch-proxy-rhel8@sha256:b9c2e58b39dc3de97013f8806178f6327bf2e4590fe55db144527d64d468f64f_s390x",
"relates_to_product_reference": "8Base-RHOL-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/elasticsearch-proxy-rhel8@sha256:c9a2b9e7cca14d9596ccbe0f64e2abe4452f91f029f42eefead43c9f526f6a58_arm64 as a component of RHOL 5.4 for RHEL 8",
"product_id": "8Base-RHOL-5.4:openshift-logging/elasticsearch-proxy-rhel8@sha256:c9a2b9e7cca14d9596ccbe0f64e2abe4452f91f029f42eefead43c9f526f6a58_arm64"
},
"product_reference": "openshift-logging/elasticsearch-proxy-rhel8@sha256:c9a2b9e7cca14d9596ccbe0f64e2abe4452f91f029f42eefead43c9f526f6a58_arm64",
"relates_to_product_reference": "8Base-RHOL-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/elasticsearch-proxy-rhel8@sha256:e38c55762c1eef39b401c46d44c899067b1566173e1ce239f17a95c52b30d8c7_amd64 as a component of RHOL 5.4 for RHEL 8",
"product_id": "8Base-RHOL-5.4:openshift-logging/elasticsearch-proxy-rhel8@sha256:e38c55762c1eef39b401c46d44c899067b1566173e1ce239f17a95c52b30d8c7_amd64"
},
"product_reference": "openshift-logging/elasticsearch-proxy-rhel8@sha256:e38c55762c1eef39b401c46d44c899067b1566173e1ce239f17a95c52b30d8c7_amd64",
"relates_to_product_reference": "8Base-RHOL-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/elasticsearch-rhel8-operator@sha256:2005f41e59a130bb86c2ec47d1b060e3e2ed32f9a4cef3897e2c05fc94043dbb_arm64 as a component of RHOL 5.4 for RHEL 8",
"product_id": "8Base-RHOL-5.4:openshift-logging/elasticsearch-rhel8-operator@sha256:2005f41e59a130bb86c2ec47d1b060e3e2ed32f9a4cef3897e2c05fc94043dbb_arm64"
},
"product_reference": "openshift-logging/elasticsearch-rhel8-operator@sha256:2005f41e59a130bb86c2ec47d1b060e3e2ed32f9a4cef3897e2c05fc94043dbb_arm64",
"relates_to_product_reference": "8Base-RHOL-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/elasticsearch-rhel8-operator@sha256:6a55934cf7af0c03e06d4ec7a15a80acf53491fb7a183c16fdf8018fbf9b4174_ppc64le as a component of RHOL 5.4 for RHEL 8",
"product_id": "8Base-RHOL-5.4:openshift-logging/elasticsearch-rhel8-operator@sha256:6a55934cf7af0c03e06d4ec7a15a80acf53491fb7a183c16fdf8018fbf9b4174_ppc64le"
},
"product_reference": "openshift-logging/elasticsearch-rhel8-operator@sha256:6a55934cf7af0c03e06d4ec7a15a80acf53491fb7a183c16fdf8018fbf9b4174_ppc64le",
"relates_to_product_reference": "8Base-RHOL-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/elasticsearch-rhel8-operator@sha256:8ce04536772f31ad022b9c66cddc090d2962b44d66c06a1db56d1447be198326_amd64 as a component of RHOL 5.4 for RHEL 8",
"product_id": "8Base-RHOL-5.4:openshift-logging/elasticsearch-rhel8-operator@sha256:8ce04536772f31ad022b9c66cddc090d2962b44d66c06a1db56d1447be198326_amd64"
},
"product_reference": "openshift-logging/elasticsearch-rhel8-operator@sha256:8ce04536772f31ad022b9c66cddc090d2962b44d66c06a1db56d1447be198326_amd64",
"relates_to_product_reference": "8Base-RHOL-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/elasticsearch-rhel8-operator@sha256:dd211d42eaad043d9bdb519e3ad6a86255b7280a2cdf47dd3fe0458a77cb110f_s390x as a component of RHOL 5.4 for RHEL 8",
"product_id": "8Base-RHOL-5.4:openshift-logging/elasticsearch-rhel8-operator@sha256:dd211d42eaad043d9bdb519e3ad6a86255b7280a2cdf47dd3fe0458a77cb110f_s390x"
},
"product_reference": "openshift-logging/elasticsearch-rhel8-operator@sha256:dd211d42eaad043d9bdb519e3ad6a86255b7280a2cdf47dd3fe0458a77cb110f_s390x",
"relates_to_product_reference": "8Base-RHOL-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/elasticsearch6-rhel8@sha256:17a9f3ae042b92693a374e3d60a07f2ab2e52419f8df25d446dd0654f6a858f6_ppc64le as a component of RHOL 5.4 for RHEL 8",
"product_id": "8Base-RHOL-5.4:openshift-logging/elasticsearch6-rhel8@sha256:17a9f3ae042b92693a374e3d60a07f2ab2e52419f8df25d446dd0654f6a858f6_ppc64le"
},
"product_reference": "openshift-logging/elasticsearch6-rhel8@sha256:17a9f3ae042b92693a374e3d60a07f2ab2e52419f8df25d446dd0654f6a858f6_ppc64le",
"relates_to_product_reference": "8Base-RHOL-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/elasticsearch6-rhel8@sha256:5b1cfc2f9a96601439cf17d1fe49a6bc6cad3b7273af87b23528090aefbfd915_s390x as a component of RHOL 5.4 for RHEL 8",
"product_id": "8Base-RHOL-5.4:openshift-logging/elasticsearch6-rhel8@sha256:5b1cfc2f9a96601439cf17d1fe49a6bc6cad3b7273af87b23528090aefbfd915_s390x"
},
"product_reference": "openshift-logging/elasticsearch6-rhel8@sha256:5b1cfc2f9a96601439cf17d1fe49a6bc6cad3b7273af87b23528090aefbfd915_s390x",
"relates_to_product_reference": "8Base-RHOL-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/elasticsearch6-rhel8@sha256:8e0ba10f91db4cb8786d0501ec33a3d54f7c7c5337e0495cc2286a6ea20cca20_arm64 as a component of RHOL 5.4 for RHEL 8",
"product_id": "8Base-RHOL-5.4:openshift-logging/elasticsearch6-rhel8@sha256:8e0ba10f91db4cb8786d0501ec33a3d54f7c7c5337e0495cc2286a6ea20cca20_arm64"
},
"product_reference": "openshift-logging/elasticsearch6-rhel8@sha256:8e0ba10f91db4cb8786d0501ec33a3d54f7c7c5337e0495cc2286a6ea20cca20_arm64",
"relates_to_product_reference": "8Base-RHOL-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/elasticsearch6-rhel8@sha256:fa8182b69328077500f89becc7621b48efa8d99f34247c2e6855dcfec13980e3_amd64 as a component of RHOL 5.4 for RHEL 8",
"product_id": "8Base-RHOL-5.4:openshift-logging/elasticsearch6-rhel8@sha256:fa8182b69328077500f89becc7621b48efa8d99f34247c2e6855dcfec13980e3_amd64"
},
"product_reference": "openshift-logging/elasticsearch6-rhel8@sha256:fa8182b69328077500f89becc7621b48efa8d99f34247c2e6855dcfec13980e3_amd64",
"relates_to_product_reference": "8Base-RHOL-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/eventrouter-rhel8@sha256:4438a3bba34418a9dc566bf15f6b4764de4295ab8b05a7b1a86f9e8cd332b3f7_arm64 as a component of RHOL 5.4 for RHEL 8",
"product_id": "8Base-RHOL-5.4:openshift-logging/eventrouter-rhel8@sha256:4438a3bba34418a9dc566bf15f6b4764de4295ab8b05a7b1a86f9e8cd332b3f7_arm64"
},
"product_reference": "openshift-logging/eventrouter-rhel8@sha256:4438a3bba34418a9dc566bf15f6b4764de4295ab8b05a7b1a86f9e8cd332b3f7_arm64",
"relates_to_product_reference": "8Base-RHOL-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/eventrouter-rhel8@sha256:bc408fc4b0482c5eb1b0deb3a9090f3e3dd9b370001d54cd076254562c72fec9_ppc64le as a component of RHOL 5.4 for RHEL 8",
"product_id": "8Base-RHOL-5.4:openshift-logging/eventrouter-rhel8@sha256:bc408fc4b0482c5eb1b0deb3a9090f3e3dd9b370001d54cd076254562c72fec9_ppc64le"
},
"product_reference": "openshift-logging/eventrouter-rhel8@sha256:bc408fc4b0482c5eb1b0deb3a9090f3e3dd9b370001d54cd076254562c72fec9_ppc64le",
"relates_to_product_reference": "8Base-RHOL-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/eventrouter-rhel8@sha256:d50a2b89442d04b1163c01b3a3951857a95df76c57b14e7f51d835c3ac6d75b3_amd64 as a component of RHOL 5.4 for RHEL 8",
"product_id": "8Base-RHOL-5.4:openshift-logging/eventrouter-rhel8@sha256:d50a2b89442d04b1163c01b3a3951857a95df76c57b14e7f51d835c3ac6d75b3_amd64"
},
"product_reference": "openshift-logging/eventrouter-rhel8@sha256:d50a2b89442d04b1163c01b3a3951857a95df76c57b14e7f51d835c3ac6d75b3_amd64",
"relates_to_product_reference": "8Base-RHOL-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/eventrouter-rhel8@sha256:f05aee8433dec1c9f6cf835038f9e5a47847d4095383bf3c22ca57c3fb69fa98_s390x as a component of RHOL 5.4 for RHEL 8",
"product_id": "8Base-RHOL-5.4:openshift-logging/eventrouter-rhel8@sha256:f05aee8433dec1c9f6cf835038f9e5a47847d4095383bf3c22ca57c3fb69fa98_s390x"
},
"product_reference": "openshift-logging/eventrouter-rhel8@sha256:f05aee8433dec1c9f6cf835038f9e5a47847d4095383bf3c22ca57c3fb69fa98_s390x",
"relates_to_product_reference": "8Base-RHOL-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/fluentd-rhel8@sha256:150e17cb645cf2f4cb7ab592572dd3abd145d9a33e790778280e256666248022_amd64 as a component of RHOL 5.4 for RHEL 8",
"product_id": "8Base-RHOL-5.4:openshift-logging/fluentd-rhel8@sha256:150e17cb645cf2f4cb7ab592572dd3abd145d9a33e790778280e256666248022_amd64"
},
"product_reference": "openshift-logging/fluentd-rhel8@sha256:150e17cb645cf2f4cb7ab592572dd3abd145d9a33e790778280e256666248022_amd64",
"relates_to_product_reference": "8Base-RHOL-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/fluentd-rhel8@sha256:36aecf05ca3cdaf29982b3efa4a1c97087be29b0a58c9777e6b0c11a34861aa8_s390x as a component of RHOL 5.4 for RHEL 8",
"product_id": "8Base-RHOL-5.4:openshift-logging/fluentd-rhel8@sha256:36aecf05ca3cdaf29982b3efa4a1c97087be29b0a58c9777e6b0c11a34861aa8_s390x"
},
"product_reference": "openshift-logging/fluentd-rhel8@sha256:36aecf05ca3cdaf29982b3efa4a1c97087be29b0a58c9777e6b0c11a34861aa8_s390x",
"relates_to_product_reference": "8Base-RHOL-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/fluentd-rhel8@sha256:e3a51d2bdc632b8376e28c33e9d4fac3464e3a84a313a17246b1f1cf21cb5710_arm64 as a component of RHOL 5.4 for RHEL 8",
"product_id": "8Base-RHOL-5.4:openshift-logging/fluentd-rhel8@sha256:e3a51d2bdc632b8376e28c33e9d4fac3464e3a84a313a17246b1f1cf21cb5710_arm64"
},
"product_reference": "openshift-logging/fluentd-rhel8@sha256:e3a51d2bdc632b8376e28c33e9d4fac3464e3a84a313a17246b1f1cf21cb5710_arm64",
"relates_to_product_reference": "8Base-RHOL-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/fluentd-rhel8@sha256:ea07da04f06df6bf0d9dd981a3795dfdb51eca83f59a6291114650e3e98a9e71_ppc64le as a component of RHOL 5.4 for RHEL 8",
"product_id": "8Base-RHOL-5.4:openshift-logging/fluentd-rhel8@sha256:ea07da04f06df6bf0d9dd981a3795dfdb51eca83f59a6291114650e3e98a9e71_ppc64le"
},
"product_reference": "openshift-logging/fluentd-rhel8@sha256:ea07da04f06df6bf0d9dd981a3795dfdb51eca83f59a6291114650e3e98a9e71_ppc64le",
"relates_to_product_reference": "8Base-RHOL-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/kibana6-rhel8@sha256:167ee6a645c7397bde3d12e9b9685279505c25ffb3bda11ae68bdf0b34229f2e_amd64 as a component of RHOL 5.4 for RHEL 8",
"product_id": "8Base-RHOL-5.4:openshift-logging/kibana6-rhel8@sha256:167ee6a645c7397bde3d12e9b9685279505c25ffb3bda11ae68bdf0b34229f2e_amd64"
},
"product_reference": "openshift-logging/kibana6-rhel8@sha256:167ee6a645c7397bde3d12e9b9685279505c25ffb3bda11ae68bdf0b34229f2e_amd64",
"relates_to_product_reference": "8Base-RHOL-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/kibana6-rhel8@sha256:4a029733337b10bb9fb8d98c91abc5451ca0b98713c8f2271a675251e025b6c0_s390x as a component of RHOL 5.4 for RHEL 8",
"product_id": "8Base-RHOL-5.4:openshift-logging/kibana6-rhel8@sha256:4a029733337b10bb9fb8d98c91abc5451ca0b98713c8f2271a675251e025b6c0_s390x"
},
"product_reference": "openshift-logging/kibana6-rhel8@sha256:4a029733337b10bb9fb8d98c91abc5451ca0b98713c8f2271a675251e025b6c0_s390x",
"relates_to_product_reference": "8Base-RHOL-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/kibana6-rhel8@sha256:812f4380024dc3df42310ad14d173d390f2bdf4b3dbdb02550c00552534f79ce_ppc64le as a component of RHOL 5.4 for RHEL 8",
"product_id": "8Base-RHOL-5.4:openshift-logging/kibana6-rhel8@sha256:812f4380024dc3df42310ad14d173d390f2bdf4b3dbdb02550c00552534f79ce_ppc64le"
},
"product_reference": "openshift-logging/kibana6-rhel8@sha256:812f4380024dc3df42310ad14d173d390f2bdf4b3dbdb02550c00552534f79ce_ppc64le",
"relates_to_product_reference": "8Base-RHOL-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/kibana6-rhel8@sha256:958ba6856cc76fc77d34a9c78888eb37b9c39b83a2f044ef2337610560ba9323_arm64 as a component of RHOL 5.4 for RHEL 8",
"product_id": "8Base-RHOL-5.4:openshift-logging/kibana6-rhel8@sha256:958ba6856cc76fc77d34a9c78888eb37b9c39b83a2f044ef2337610560ba9323_arm64"
},
"product_reference": "openshift-logging/kibana6-rhel8@sha256:958ba6856cc76fc77d34a9c78888eb37b9c39b83a2f044ef2337610560ba9323_arm64",
"relates_to_product_reference": "8Base-RHOL-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/log-file-metric-exporter-rhel8@sha256:043e4d3481fbfedf3115e18fade3a2f33b891b0d9a641bf973c2c7f492cb0489_amd64 as a component of RHOL 5.4 for RHEL 8",
"product_id": "8Base-RHOL-5.4:openshift-logging/log-file-metric-exporter-rhel8@sha256:043e4d3481fbfedf3115e18fade3a2f33b891b0d9a641bf973c2c7f492cb0489_amd64"
},
"product_reference": "openshift-logging/log-file-metric-exporter-rhel8@sha256:043e4d3481fbfedf3115e18fade3a2f33b891b0d9a641bf973c2c7f492cb0489_amd64",
"relates_to_product_reference": "8Base-RHOL-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/log-file-metric-exporter-rhel8@sha256:4fe26adac10cf20b83812e4fa513231d7e1fd4b6cd4e09d4fd425c391885cfcc_ppc64le as a component of RHOL 5.4 for RHEL 8",
"product_id": "8Base-RHOL-5.4:openshift-logging/log-file-metric-exporter-rhel8@sha256:4fe26adac10cf20b83812e4fa513231d7e1fd4b6cd4e09d4fd425c391885cfcc_ppc64le"
},
"product_reference": "openshift-logging/log-file-metric-exporter-rhel8@sha256:4fe26adac10cf20b83812e4fa513231d7e1fd4b6cd4e09d4fd425c391885cfcc_ppc64le",
"relates_to_product_reference": "8Base-RHOL-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/log-file-metric-exporter-rhel8@sha256:85827db708c0927027435b05732cc7e34b0675eaa86665c91efacc76aecd6227_s390x as a component of RHOL 5.4 for RHEL 8",
"product_id": "8Base-RHOL-5.4:openshift-logging/log-file-metric-exporter-rhel8@sha256:85827db708c0927027435b05732cc7e34b0675eaa86665c91efacc76aecd6227_s390x"
},
"product_reference": "openshift-logging/log-file-metric-exporter-rhel8@sha256:85827db708c0927027435b05732cc7e34b0675eaa86665c91efacc76aecd6227_s390x",
"relates_to_product_reference": "8Base-RHOL-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/log-file-metric-exporter-rhel8@sha256:a5285db276a5545fdbaa9f0743a49ba72ce1c5da61b5cccc9422320a03e08bea_arm64 as a component of RHOL 5.4 for RHEL 8",
"product_id": "8Base-RHOL-5.4:openshift-logging/log-file-metric-exporter-rhel8@sha256:a5285db276a5545fdbaa9f0743a49ba72ce1c5da61b5cccc9422320a03e08bea_arm64"
},
"product_reference": "openshift-logging/log-file-metric-exporter-rhel8@sha256:a5285db276a5545fdbaa9f0743a49ba72ce1c5da61b5cccc9422320a03e08bea_arm64",
"relates_to_product_reference": "8Base-RHOL-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/logging-curator5-rhel8@sha256:0b28415b8115ff3216002faa5c9ecf3c46995085e3364c8028cb544cb4787ed2_arm64 as a component of RHOL 5.4 for RHEL 8",
"product_id": "8Base-RHOL-5.4:openshift-logging/logging-curator5-rhel8@sha256:0b28415b8115ff3216002faa5c9ecf3c46995085e3364c8028cb544cb4787ed2_arm64"
},
"product_reference": "openshift-logging/logging-curator5-rhel8@sha256:0b28415b8115ff3216002faa5c9ecf3c46995085e3364c8028cb544cb4787ed2_arm64",
"relates_to_product_reference": "8Base-RHOL-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/logging-curator5-rhel8@sha256:7016e867ddfe970d6d2d54d5615e8f613786bcfbfe52ebf3139c07da3d5a53db_s390x as a component of RHOL 5.4 for RHEL 8",
"product_id": "8Base-RHOL-5.4:openshift-logging/logging-curator5-rhel8@sha256:7016e867ddfe970d6d2d54d5615e8f613786bcfbfe52ebf3139c07da3d5a53db_s390x"
},
"product_reference": "openshift-logging/logging-curator5-rhel8@sha256:7016e867ddfe970d6d2d54d5615e8f613786bcfbfe52ebf3139c07da3d5a53db_s390x",
"relates_to_product_reference": "8Base-RHOL-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/logging-curator5-rhel8@sha256:94c435f45e9dbd9fa633e137356cfb1d6ac2d4dd7574b359367665da42d6203d_amd64 as a component of RHOL 5.4 for RHEL 8",
"product_id": "8Base-RHOL-5.4:openshift-logging/logging-curator5-rhel8@sha256:94c435f45e9dbd9fa633e137356cfb1d6ac2d4dd7574b359367665da42d6203d_amd64"
},
"product_reference": "openshift-logging/logging-curator5-rhel8@sha256:94c435f45e9dbd9fa633e137356cfb1d6ac2d4dd7574b359367665da42d6203d_amd64",
"relates_to_product_reference": "8Base-RHOL-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/logging-curator5-rhel8@sha256:d24afbc9228ef7f3d0a6fd716a3a57abde88a1f65d149c7df4f959a775b670bd_ppc64le as a component of RHOL 5.4 for RHEL 8",
"product_id": "8Base-RHOL-5.4:openshift-logging/logging-curator5-rhel8@sha256:d24afbc9228ef7f3d0a6fd716a3a57abde88a1f65d149c7df4f959a775b670bd_ppc64le"
},
"product_reference": "openshift-logging/logging-curator5-rhel8@sha256:d24afbc9228ef7f3d0a6fd716a3a57abde88a1f65d149c7df4f959a775b670bd_ppc64le",
"relates_to_product_reference": "8Base-RHOL-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/logging-loki-rhel8@sha256:40d4989b4733f54a01a73831fa00b12e49fff69c75138902eac0d894d432e4d9_arm64 as a component of RHOL 5.4 for RHEL 8",
"product_id": "8Base-RHOL-5.4:openshift-logging/logging-loki-rhel8@sha256:40d4989b4733f54a01a73831fa00b12e49fff69c75138902eac0d894d432e4d9_arm64"
},
"product_reference": "openshift-logging/logging-loki-rhel8@sha256:40d4989b4733f54a01a73831fa00b12e49fff69c75138902eac0d894d432e4d9_arm64",
"relates_to_product_reference": "8Base-RHOL-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/logging-loki-rhel8@sha256:b444af35118c24bde0dfa2a8825ba427b3345451f6081133477254213a3460f0_amd64 as a component of RHOL 5.4 for RHEL 8",
"product_id": "8Base-RHOL-5.4:openshift-logging/logging-loki-rhel8@sha256:b444af35118c24bde0dfa2a8825ba427b3345451f6081133477254213a3460f0_amd64"
},
"product_reference": "openshift-logging/logging-loki-rhel8@sha256:b444af35118c24bde0dfa2a8825ba427b3345451f6081133477254213a3460f0_amd64",
"relates_to_product_reference": "8Base-RHOL-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/logging-loki-rhel8@sha256:cfe410d498940a95da631ea213866a96a119034d78d5d53f7f9c7e8da56e0f45_s390x as a component of RHOL 5.4 for RHEL 8",
"product_id": "8Base-RHOL-5.4:openshift-logging/logging-loki-rhel8@sha256:cfe410d498940a95da631ea213866a96a119034d78d5d53f7f9c7e8da56e0f45_s390x"
},
"product_reference": "openshift-logging/logging-loki-rhel8@sha256:cfe410d498940a95da631ea213866a96a119034d78d5d53f7f9c7e8da56e0f45_s390x",
"relates_to_product_reference": "8Base-RHOL-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/logging-loki-rhel8@sha256:f7979c82140a0ab1a97c9f3151465bfbd9f79c4db9b0cc20f974cd7b890f074f_ppc64le as a component of RHOL 5.4 for RHEL 8",
"product_id": "8Base-RHOL-5.4:openshift-logging/logging-loki-rhel8@sha256:f7979c82140a0ab1a97c9f3151465bfbd9f79c4db9b0cc20f974cd7b890f074f_ppc64le"
},
"product_reference": "openshift-logging/logging-loki-rhel8@sha256:f7979c82140a0ab1a97c9f3151465bfbd9f79c4db9b0cc20f974cd7b890f074f_ppc64le",
"relates_to_product_reference": "8Base-RHOL-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/loki-operator-bundle@sha256:02cceda51028eb55a3b82aa5275f03dbaf8f8f9ab3fd27c650d1a07a93044e37_amd64 as a component of RHOL 5.4 for RHEL 8",
"product_id": "8Base-RHOL-5.4:openshift-logging/loki-operator-bundle@sha256:02cceda51028eb55a3b82aa5275f03dbaf8f8f9ab3fd27c650d1a07a93044e37_amd64"
},
"product_reference": "openshift-logging/loki-operator-bundle@sha256:02cceda51028eb55a3b82aa5275f03dbaf8f8f9ab3fd27c650d1a07a93044e37_amd64",
"relates_to_product_reference": "8Base-RHOL-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/loki-rhel8-operator@sha256:0f1be625b4012820f7ac439fed000808d7acb4e885ace16014461bf802be935a_s390x as a component of RHOL 5.4 for RHEL 8",
"product_id": "8Base-RHOL-5.4:openshift-logging/loki-rhel8-operator@sha256:0f1be625b4012820f7ac439fed000808d7acb4e885ace16014461bf802be935a_s390x"
},
"product_reference": "openshift-logging/loki-rhel8-operator@sha256:0f1be625b4012820f7ac439fed000808d7acb4e885ace16014461bf802be935a_s390x",
"relates_to_product_reference": "8Base-RHOL-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/loki-rhel8-operator@sha256:28f45a80846c5e11638fb479be42cafcb2bdb3af94dff3629a820de295cbe31d_ppc64le as a component of RHOL 5.4 for RHEL 8",
"product_id": "8Base-RHOL-5.4:openshift-logging/loki-rhel8-operator@sha256:28f45a80846c5e11638fb479be42cafcb2bdb3af94dff3629a820de295cbe31d_ppc64le"
},
"product_reference": "openshift-logging/loki-rhel8-operator@sha256:28f45a80846c5e11638fb479be42cafcb2bdb3af94dff3629a820de295cbe31d_ppc64le",
"relates_to_product_reference": "8Base-RHOL-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/loki-rhel8-operator@sha256:df7de1e9f5a4396df6f14b1c4b6bb2a9ae4bc50d82cbc954ec535c26e8df2cb1_arm64 as a component of RHOL 5.4 for RHEL 8",
"product_id": "8Base-RHOL-5.4:openshift-logging/loki-rhel8-operator@sha256:df7de1e9f5a4396df6f14b1c4b6bb2a9ae4bc50d82cbc954ec535c26e8df2cb1_arm64"
},
"product_reference": "openshift-logging/loki-rhel8-operator@sha256:df7de1e9f5a4396df6f14b1c4b6bb2a9ae4bc50d82cbc954ec535c26e8df2cb1_arm64",
"relates_to_product_reference": "8Base-RHOL-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/loki-rhel8-operator@sha256:f8a35557c9eb27f703ffa9320a9d39a2361d93fdb0b8c874d97da458048e7eec_amd64 as a component of RHOL 5.4 for RHEL 8",
"product_id": "8Base-RHOL-5.4:openshift-logging/loki-rhel8-operator@sha256:f8a35557c9eb27f703ffa9320a9d39a2361d93fdb0b8c874d97da458048e7eec_amd64"
},
"product_reference": "openshift-logging/loki-rhel8-operator@sha256:f8a35557c9eb27f703ffa9320a9d39a2361d93fdb0b8c874d97da458048e7eec_amd64",
"relates_to_product_reference": "8Base-RHOL-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/lokistack-gateway-rhel8@sha256:178fcf44e6a1fa90d27a40565f69ae2880622b017bc8d9e33a441353eb45609d_arm64 as a component of RHOL 5.4 for RHEL 8",
"product_id": "8Base-RHOL-5.4:openshift-logging/lokistack-gateway-rhel8@sha256:178fcf44e6a1fa90d27a40565f69ae2880622b017bc8d9e33a441353eb45609d_arm64"
},
"product_reference": "openshift-logging/lokistack-gateway-rhel8@sha256:178fcf44e6a1fa90d27a40565f69ae2880622b017bc8d9e33a441353eb45609d_arm64",
"relates_to_product_reference": "8Base-RHOL-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/lokistack-gateway-rhel8@sha256:7b0c2c99cf0f710166b749dbfd7f544caf5fe35516c743fca251c7cec896e1d6_ppc64le as a component of RHOL 5.4 for RHEL 8",
"product_id": "8Base-RHOL-5.4:openshift-logging/lokistack-gateway-rhel8@sha256:7b0c2c99cf0f710166b749dbfd7f544caf5fe35516c743fca251c7cec896e1d6_ppc64le"
},
"product_reference": "openshift-logging/lokistack-gateway-rhel8@sha256:7b0c2c99cf0f710166b749dbfd7f544caf5fe35516c743fca251c7cec896e1d6_ppc64le",
"relates_to_product_reference": "8Base-RHOL-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/lokistack-gateway-rhel8@sha256:9c4959525339b607a98889d56f4c26f2e4af25032466c439903a7f1cb593f721_s390x as a component of RHOL 5.4 for RHEL 8",
"product_id": "8Base-RHOL-5.4:openshift-logging/lokistack-gateway-rhel8@sha256:9c4959525339b607a98889d56f4c26f2e4af25032466c439903a7f1cb593f721_s390x"
},
"product_reference": "openshift-logging/lokistack-gateway-rhel8@sha256:9c4959525339b607a98889d56f4c26f2e4af25032466c439903a7f1cb593f721_s390x",
"relates_to_product_reference": "8Base-RHOL-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/lokistack-gateway-rhel8@sha256:a967d5be7d3a6fdd75965a5f9a7396a52cdcb37d6a8521c440b0b5c650c230f2_amd64 as a component of RHOL 5.4 for RHEL 8",
"product_id": "8Base-RHOL-5.4:openshift-logging/lokistack-gateway-rhel8@sha256:a967d5be7d3a6fdd75965a5f9a7396a52cdcb37d6a8521c440b0b5c650c230f2_amd64"
},
"product_reference": "openshift-logging/lokistack-gateway-rhel8@sha256:a967d5be7d3a6fdd75965a5f9a7396a52cdcb37d6a8521c440b0b5c650c230f2_amd64",
"relates_to_product_reference": "8Base-RHOL-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/opa-openshift-rhel8@sha256:1b106af51bb50f1ce4db13ebbf6f6c67eae45611c0d5dc46476f1dfaa8aca166_arm64 as a component of RHOL 5.4 for RHEL 8",
"product_id": "8Base-RHOL-5.4:openshift-logging/opa-openshift-rhel8@sha256:1b106af51bb50f1ce4db13ebbf6f6c67eae45611c0d5dc46476f1dfaa8aca166_arm64"
},
"product_reference": "openshift-logging/opa-openshift-rhel8@sha256:1b106af51bb50f1ce4db13ebbf6f6c67eae45611c0d5dc46476f1dfaa8aca166_arm64",
"relates_to_product_reference": "8Base-RHOL-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/opa-openshift-rhel8@sha256:92ddf24824c8f8ae93dec07184c446615b635389472d3a525df72da07c8d9b97_ppc64le as a component of RHOL 5.4 for RHEL 8",
"product_id": "8Base-RHOL-5.4:openshift-logging/opa-openshift-rhel8@sha256:92ddf24824c8f8ae93dec07184c446615b635389472d3a525df72da07c8d9b97_ppc64le"
},
"product_reference": "openshift-logging/opa-openshift-rhel8@sha256:92ddf24824c8f8ae93dec07184c446615b635389472d3a525df72da07c8d9b97_ppc64le",
"relates_to_product_reference": "8Base-RHOL-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/opa-openshift-rhel8@sha256:9fd0c5df785564b35392705a479d6fb9245e3329719438c76c0282f9ef2f2d55_amd64 as a component of RHOL 5.4 for RHEL 8",
"product_id": "8Base-RHOL-5.4:openshift-logging/opa-openshift-rhel8@sha256:9fd0c5df785564b35392705a479d6fb9245e3329719438c76c0282f9ef2f2d55_amd64"
},
"product_reference": "openshift-logging/opa-openshift-rhel8@sha256:9fd0c5df785564b35392705a479d6fb9245e3329719438c76c0282f9ef2f2d55_amd64",
"relates_to_product_reference": "8Base-RHOL-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/opa-openshift-rhel8@sha256:be8ba0e4c5f24c7b4549700a25c89b10d4b2fc0b0e3888163bb53827914e95c1_s390x as a component of RHOL 5.4 for RHEL 8",
"product_id": "8Base-RHOL-5.4:openshift-logging/opa-openshift-rhel8@sha256:be8ba0e4c5f24c7b4549700a25c89b10d4b2fc0b0e3888163bb53827914e95c1_s390x"
},
"product_reference": "openshift-logging/opa-openshift-rhel8@sha256:be8ba0e4c5f24c7b4549700a25c89b10d4b2fc0b0e3888163bb53827914e95c1_s390x",
"relates_to_product_reference": "8Base-RHOL-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/vector-rhel8@sha256:48bb136d11b44428c87489978873370848ac2b219b107ef7e81ab679db095234_s390x as a component of RHOL 5.4 for RHEL 8",
"product_id": "8Base-RHOL-5.4:openshift-logging/vector-rhel8@sha256:48bb136d11b44428c87489978873370848ac2b219b107ef7e81ab679db095234_s390x"
},
"product_reference": "openshift-logging/vector-rhel8@sha256:48bb136d11b44428c87489978873370848ac2b219b107ef7e81ab679db095234_s390x",
"relates_to_product_reference": "8Base-RHOL-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/vector-rhel8@sha256:48f0317d167710ff5b0787c73f6b7dd0249e7c8d2d001159132a97299c30b62d_ppc64le as a component of RHOL 5.4 for RHEL 8",
"product_id": "8Base-RHOL-5.4:openshift-logging/vector-rhel8@sha256:48f0317d167710ff5b0787c73f6b7dd0249e7c8d2d001159132a97299c30b62d_ppc64le"
},
"product_reference": "openshift-logging/vector-rhel8@sha256:48f0317d167710ff5b0787c73f6b7dd0249e7c8d2d001159132a97299c30b62d_ppc64le",
"relates_to_product_reference": "8Base-RHOL-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/vector-rhel8@sha256:bde21c03fb831d01e85b28245881f7e3f2bb2ef6d2671eb92b2e0cc4bd3898e2_arm64 as a component of RHOL 5.4 for RHEL 8",
"product_id": "8Base-RHOL-5.4:openshift-logging/vector-rhel8@sha256:bde21c03fb831d01e85b28245881f7e3f2bb2ef6d2671eb92b2e0cc4bd3898e2_arm64"
},
"product_reference": "openshift-logging/vector-rhel8@sha256:bde21c03fb831d01e85b28245881f7e3f2bb2ef6d2671eb92b2e0cc4bd3898e2_arm64",
"relates_to_product_reference": "8Base-RHOL-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/vector-rhel8@sha256:cc6b9c6a344aac56c99c96b5120ffe2dad479000b34964ff89d030ae762bda43_amd64 as a component of RHOL 5.4 for RHEL 8",
"product_id": "8Base-RHOL-5.4:openshift-logging/vector-rhel8@sha256:cc6b9c6a344aac56c99c96b5120ffe2dad479000b34964ff89d030ae762bda43_amd64"
},
"product_reference": "openshift-logging/vector-rhel8@sha256:cc6b9c6a344aac56c99c96b5120ffe2dad479000b34964ff89d030ae762bda43_amd64",
"relates_to_product_reference": "8Base-RHOL-5.4"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2020-36518",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"discovery_date": "2022-03-16T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-RHOL-5.4:openshift-logging/cluster-logging-operator-bundle@sha256:cb26d9e55f781dd535901a90f1ec2f8e02e8e1de72c0fde638c90fcc228ec4b2_amd64",
"8Base-RHOL-5.4:openshift-logging/cluster-logging-rhel8-operator@sha256:617cc8b0011110981674b75fe1e3041bfa434c952e4a0193818b971edbc7a480_s390x",
"8Base-RHOL-5.4:openshift-logging/cluster-logging-rhel8-operator@sha256:637df49756fe85e7b38b279ffa7672d72c658d3d47df7f9dada2dd70563af83b_arm64",
"8Base-RHOL-5.4:openshift-logging/cluster-logging-rhel8-operator@sha256:aa1602fe2abe23bd8a4c791bc45d425686a6e6d1aab4face0fac28bfc7cebbe1_ppc64le",
"8Base-RHOL-5.4:openshift-logging/cluster-logging-rhel8-operator@sha256:c698b52c46d41007e5ac4f90b9540d430820bd20a93468fddd3a949c7ef5b332_amd64",
"8Base-RHOL-5.4:openshift-logging/elasticsearch-operator-bundle@sha256:7659606e0418a1920161b7ca67524ea6a7b1ed366b817f1a5cde0b346152243c_amd64",
"8Base-RHOL-5.4:openshift-logging/elasticsearch-proxy-rhel8@sha256:4f4e5bb267ad391bc0fc6a010ec9ecdf3bf48d5b6e9db0d2510960c13c97bd71_ppc64le",
"8Base-RHOL-5.4:openshift-logging/elasticsearch-proxy-rhel8@sha256:b9c2e58b39dc3de97013f8806178f6327bf2e4590fe55db144527d64d468f64f_s390x",
"8Base-RHOL-5.4:openshift-logging/elasticsearch-proxy-rhel8@sha256:c9a2b9e7cca14d9596ccbe0f64e2abe4452f91f029f42eefead43c9f526f6a58_arm64",
"8Base-RHOL-5.4:openshift-logging/elasticsearch-proxy-rhel8@sha256:e38c55762c1eef39b401c46d44c899067b1566173e1ce239f17a95c52b30d8c7_amd64",
"8Base-RHOL-5.4:openshift-logging/elasticsearch-rhel8-operator@sha256:2005f41e59a130bb86c2ec47d1b060e3e2ed32f9a4cef3897e2c05fc94043dbb_arm64",
"8Base-RHOL-5.4:openshift-logging/elasticsearch-rhel8-operator@sha256:6a55934cf7af0c03e06d4ec7a15a80acf53491fb7a183c16fdf8018fbf9b4174_ppc64le",
"8Base-RHOL-5.4:openshift-logging/elasticsearch-rhel8-operator@sha256:8ce04536772f31ad022b9c66cddc090d2962b44d66c06a1db56d1447be198326_amd64",
"8Base-RHOL-5.4:openshift-logging/elasticsearch-rhel8-operator@sha256:dd211d42eaad043d9bdb519e3ad6a86255b7280a2cdf47dd3fe0458a77cb110f_s390x",
"8Base-RHOL-5.4:openshift-logging/eventrouter-rhel8@sha256:4438a3bba34418a9dc566bf15f6b4764de4295ab8b05a7b1a86f9e8cd332b3f7_arm64",
"8Base-RHOL-5.4:openshift-logging/eventrouter-rhel8@sha256:bc408fc4b0482c5eb1b0deb3a9090f3e3dd9b370001d54cd076254562c72fec9_ppc64le",
"8Base-RHOL-5.4:openshift-logging/eventrouter-rhel8@sha256:d50a2b89442d04b1163c01b3a3951857a95df76c57b14e7f51d835c3ac6d75b3_amd64",
"8Base-RHOL-5.4:openshift-logging/eventrouter-rhel8@sha256:f05aee8433dec1c9f6cf835038f9e5a47847d4095383bf3c22ca57c3fb69fa98_s390x",
"8Base-RHOL-5.4:openshift-logging/fluentd-rhel8@sha256:150e17cb645cf2f4cb7ab592572dd3abd145d9a33e790778280e256666248022_amd64",
"8Base-RHOL-5.4:openshift-logging/fluentd-rhel8@sha256:36aecf05ca3cdaf29982b3efa4a1c97087be29b0a58c9777e6b0c11a34861aa8_s390x",
"8Base-RHOL-5.4:openshift-logging/fluentd-rhel8@sha256:e3a51d2bdc632b8376e28c33e9d4fac3464e3a84a313a17246b1f1cf21cb5710_arm64",
"8Base-RHOL-5.4:openshift-logging/fluentd-rhel8@sha256:ea07da04f06df6bf0d9dd981a3795dfdb51eca83f59a6291114650e3e98a9e71_ppc64le",
"8Base-RHOL-5.4:openshift-logging/kibana6-rhel8@sha256:167ee6a645c7397bde3d12e9b9685279505c25ffb3bda11ae68bdf0b34229f2e_amd64",
"8Base-RHOL-5.4:openshift-logging/kibana6-rhel8@sha256:4a029733337b10bb9fb8d98c91abc5451ca0b98713c8f2271a675251e025b6c0_s390x",
"8Base-RHOL-5.4:openshift-logging/kibana6-rhel8@sha256:812f4380024dc3df42310ad14d173d390f2bdf4b3dbdb02550c00552534f79ce_ppc64le",
"8Base-RHOL-5.4:openshift-logging/kibana6-rhel8@sha256:958ba6856cc76fc77d34a9c78888eb37b9c39b83a2f044ef2337610560ba9323_arm64",
"8Base-RHOL-5.4:openshift-logging/log-file-metric-exporter-rhel8@sha256:043e4d3481fbfedf3115e18fade3a2f33b891b0d9a641bf973c2c7f492cb0489_amd64",
"8Base-RHOL-5.4:openshift-logging/log-file-metric-exporter-rhel8@sha256:4fe26adac10cf20b83812e4fa513231d7e1fd4b6cd4e09d4fd425c391885cfcc_ppc64le",
"8Base-RHOL-5.4:openshift-logging/log-file-metric-exporter-rhel8@sha256:85827db708c0927027435b05732cc7e34b0675eaa86665c91efacc76aecd6227_s390x",
"8Base-RHOL-5.4:openshift-logging/log-file-metric-exporter-rhel8@sha256:a5285db276a5545fdbaa9f0743a49ba72ce1c5da61b5cccc9422320a03e08bea_arm64",
"8Base-RHOL-5.4:openshift-logging/logging-curator5-rhel8@sha256:0b28415b8115ff3216002faa5c9ecf3c46995085e3364c8028cb544cb4787ed2_arm64",
"8Base-RHOL-5.4:openshift-logging/logging-curator5-rhel8@sha256:7016e867ddfe970d6d2d54d5615e8f613786bcfbfe52ebf3139c07da3d5a53db_s390x",
"8Base-RHOL-5.4:openshift-logging/logging-curator5-rhel8@sha256:94c435f45e9dbd9fa633e137356cfb1d6ac2d4dd7574b359367665da42d6203d_amd64",
"8Base-RHOL-5.4:openshift-logging/logging-curator5-rhel8@sha256:d24afbc9228ef7f3d0a6fd716a3a57abde88a1f65d149c7df4f959a775b670bd_ppc64le",
"8Base-RHOL-5.4:openshift-logging/logging-loki-rhel8@sha256:40d4989b4733f54a01a73831fa00b12e49fff69c75138902eac0d894d432e4d9_arm64",
"8Base-RHOL-5.4:openshift-logging/logging-loki-rhel8@sha256:b444af35118c24bde0dfa2a8825ba427b3345451f6081133477254213a3460f0_amd64",
"8Base-RHOL-5.4:openshift-logging/logging-loki-rhel8@sha256:cfe410d498940a95da631ea213866a96a119034d78d5d53f7f9c7e8da56e0f45_s390x",
"8Base-RHOL-5.4:openshift-logging/logging-loki-rhel8@sha256:f7979c82140a0ab1a97c9f3151465bfbd9f79c4db9b0cc20f974cd7b890f074f_ppc64le",
"8Base-RHOL-5.4:openshift-logging/loki-operator-bundle@sha256:02cceda51028eb55a3b82aa5275f03dbaf8f8f9ab3fd27c650d1a07a93044e37_amd64",
"8Base-RHOL-5.4:openshift-logging/loki-rhel8-operator@sha256:0f1be625b4012820f7ac439fed000808d7acb4e885ace16014461bf802be935a_s390x",
"8Base-RHOL-5.4:openshift-logging/loki-rhel8-operator@sha256:28f45a80846c5e11638fb479be42cafcb2bdb3af94dff3629a820de295cbe31d_ppc64le",
"8Base-RHOL-5.4:openshift-logging/loki-rhel8-operator@sha256:df7de1e9f5a4396df6f14b1c4b6bb2a9ae4bc50d82cbc954ec535c26e8df2cb1_arm64",
"8Base-RHOL-5.4:openshift-logging/loki-rhel8-operator@sha256:f8a35557c9eb27f703ffa9320a9d39a2361d93fdb0b8c874d97da458048e7eec_amd64",
"8Base-RHOL-5.4:openshift-logging/lokistack-gateway-rhel8@sha256:178fcf44e6a1fa90d27a40565f69ae2880622b017bc8d9e33a441353eb45609d_arm64",
"8Base-RHOL-5.4:openshift-logging/lokistack-gateway-rhel8@sha256:7b0c2c99cf0f710166b749dbfd7f544caf5fe35516c743fca251c7cec896e1d6_ppc64le",
"8Base-RHOL-5.4:openshift-logging/lokistack-gateway-rhel8@sha256:9c4959525339b607a98889d56f4c26f2e4af25032466c439903a7f1cb593f721_s390x",
"8Base-RHOL-5.4:openshift-logging/lokistack-gateway-rhel8@sha256:a967d5be7d3a6fdd75965a5f9a7396a52cdcb37d6a8521c440b0b5c650c230f2_amd64",
"8Base-RHOL-5.4:openshift-logging/opa-openshift-rhel8@sha256:1b106af51bb50f1ce4db13ebbf6f6c67eae45611c0d5dc46476f1dfaa8aca166_arm64",
"8Base-RHOL-5.4:openshift-logging/opa-openshift-rhel8@sha256:92ddf24824c8f8ae93dec07184c446615b635389472d3a525df72da07c8d9b97_ppc64le",
"8Base-RHOL-5.4:openshift-logging/opa-openshift-rhel8@sha256:9fd0c5df785564b35392705a479d6fb9245e3329719438c76c0282f9ef2f2d55_amd64",
"8Base-RHOL-5.4:openshift-logging/opa-openshift-rhel8@sha256:be8ba0e4c5f24c7b4549700a25c89b10d4b2fc0b0e3888163bb53827914e95c1_s390x",
"8Base-RHOL-5.4:openshift-logging/vector-rhel8@sha256:48bb136d11b44428c87489978873370848ac2b219b107ef7e81ab679db095234_s390x",
"8Base-RHOL-5.4:openshift-logging/vector-rhel8@sha256:48f0317d167710ff5b0787c73f6b7dd0249e7c8d2d001159132a97299c30b62d_ppc64le",
"8Base-RHOL-5.4:openshift-logging/vector-rhel8@sha256:bde21c03fb831d01e85b28245881f7e3f2bb2ef6d2671eb92b2e0cc4bd3898e2_arm64",
"8Base-RHOL-5.4:openshift-logging/vector-rhel8@sha256:cc6b9c6a344aac56c99c96b5120ffe2dad479000b34964ff89d030ae762bda43_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2064698"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Jackson Databind package. This cause of the issue is due to a Java StackOverflow exception and a denial of service via a significant depth of nested objects.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "jackson-databind: denial of service via a large depth of nested objects",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "CodeReady Studio is no longer supported and therefore this flaw will not be addressed in CodeReady Studio.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-RHOL-5.4:openshift-logging/elasticsearch6-rhel8@sha256:17a9f3ae042b92693a374e3d60a07f2ab2e52419f8df25d446dd0654f6a858f6_ppc64le",
"8Base-RHOL-5.4:openshift-logging/elasticsearch6-rhel8@sha256:5b1cfc2f9a96601439cf17d1fe49a6bc6cad3b7273af87b23528090aefbfd915_s390x",
"8Base-RHOL-5.4:openshift-logging/elasticsearch6-rhel8@sha256:8e0ba10f91db4cb8786d0501ec33a3d54f7c7c5337e0495cc2286a6ea20cca20_arm64",
"8Base-RHOL-5.4:openshift-logging/elasticsearch6-rhel8@sha256:fa8182b69328077500f89becc7621b48efa8d99f34247c2e6855dcfec13980e3_amd64"
],
"known_not_affected": [
"8Base-RHOL-5.4:openshift-logging/cluster-logging-operator-bundle@sha256:cb26d9e55f781dd535901a90f1ec2f8e02e8e1de72c0fde638c90fcc228ec4b2_amd64",
"8Base-RHOL-5.4:openshift-logging/cluster-logging-rhel8-operator@sha256:617cc8b0011110981674b75fe1e3041bfa434c952e4a0193818b971edbc7a480_s390x",
"8Base-RHOL-5.4:openshift-logging/cluster-logging-rhel8-operator@sha256:637df49756fe85e7b38b279ffa7672d72c658d3d47df7f9dada2dd70563af83b_arm64",
"8Base-RHOL-5.4:openshift-logging/cluster-logging-rhel8-operator@sha256:aa1602fe2abe23bd8a4c791bc45d425686a6e6d1aab4face0fac28bfc7cebbe1_ppc64le",
"8Base-RHOL-5.4:openshift-logging/cluster-logging-rhel8-operator@sha256:c698b52c46d41007e5ac4f90b9540d430820bd20a93468fddd3a949c7ef5b332_amd64",
"8Base-RHOL-5.4:openshift-logging/elasticsearch-operator-bundle@sha256:7659606e0418a1920161b7ca67524ea6a7b1ed366b817f1a5cde0b346152243c_amd64",
"8Base-RHOL-5.4:openshift-logging/elasticsearch-proxy-rhel8@sha256:4f4e5bb267ad391bc0fc6a010ec9ecdf3bf48d5b6e9db0d2510960c13c97bd71_ppc64le",
"8Base-RHOL-5.4:openshift-logging/elasticsearch-proxy-rhel8@sha256:b9c2e58b39dc3de97013f8806178f6327bf2e4590fe55db144527d64d468f64f_s390x",
"8Base-RHOL-5.4:openshift-logging/elasticsearch-proxy-rhel8@sha256:c9a2b9e7cca14d9596ccbe0f64e2abe4452f91f029f42eefead43c9f526f6a58_arm64",
"8Base-RHOL-5.4:openshift-logging/elasticsearch-proxy-rhel8@sha256:e38c55762c1eef39b401c46d44c899067b1566173e1ce239f17a95c52b30d8c7_amd64",
"8Base-RHOL-5.4:openshift-logging/elasticsearch-rhel8-operator@sha256:2005f41e59a130bb86c2ec47d1b060e3e2ed32f9a4cef3897e2c05fc94043dbb_arm64",
"8Base-RHOL-5.4:openshift-logging/elasticsearch-rhel8-operator@sha256:6a55934cf7af0c03e06d4ec7a15a80acf53491fb7a183c16fdf8018fbf9b4174_ppc64le",
"8Base-RHOL-5.4:openshift-logging/elasticsearch-rhel8-operator@sha256:8ce04536772f31ad022b9c66cddc090d2962b44d66c06a1db56d1447be198326_amd64",
"8Base-RHOL-5.4:openshift-logging/elasticsearch-rhel8-operator@sha256:dd211d42eaad043d9bdb519e3ad6a86255b7280a2cdf47dd3fe0458a77cb110f_s390x",
"8Base-RHOL-5.4:openshift-logging/eventrouter-rhel8@sha256:4438a3bba34418a9dc566bf15f6b4764de4295ab8b05a7b1a86f9e8cd332b3f7_arm64",
"8Base-RHOL-5.4:openshift-logging/eventrouter-rhel8@sha256:bc408fc4b0482c5eb1b0deb3a9090f3e3dd9b370001d54cd076254562c72fec9_ppc64le",
"8Base-RHOL-5.4:openshift-logging/eventrouter-rhel8@sha256:d50a2b89442d04b1163c01b3a3951857a95df76c57b14e7f51d835c3ac6d75b3_amd64",
"8Base-RHOL-5.4:openshift-logging/eventrouter-rhel8@sha256:f05aee8433dec1c9f6cf835038f9e5a47847d4095383bf3c22ca57c3fb69fa98_s390x",
"8Base-RHOL-5.4:openshift-logging/fluentd-rhel8@sha256:150e17cb645cf2f4cb7ab592572dd3abd145d9a33e790778280e256666248022_amd64",
"8Base-RHOL-5.4:openshift-logging/fluentd-rhel8@sha256:36aecf05ca3cdaf29982b3efa4a1c97087be29b0a58c9777e6b0c11a34861aa8_s390x",
"8Base-RHOL-5.4:openshift-logging/fluentd-rhel8@sha256:e3a51d2bdc632b8376e28c33e9d4fac3464e3a84a313a17246b1f1cf21cb5710_arm64",
"8Base-RHOL-5.4:openshift-logging/fluentd-rhel8@sha256:ea07da04f06df6bf0d9dd981a3795dfdb51eca83f59a6291114650e3e98a9e71_ppc64le",
"8Base-RHOL-5.4:openshift-logging/kibana6-rhel8@sha256:167ee6a645c7397bde3d12e9b9685279505c25ffb3bda11ae68bdf0b34229f2e_amd64",
"8Base-RHOL-5.4:openshift-logging/kibana6-rhel8@sha256:4a029733337b10bb9fb8d98c91abc5451ca0b98713c8f2271a675251e025b6c0_s390x",
"8Base-RHOL-5.4:openshift-logging/kibana6-rhel8@sha256:812f4380024dc3df42310ad14d173d390f2bdf4b3dbdb02550c00552534f79ce_ppc64le",
"8Base-RHOL-5.4:openshift-logging/kibana6-rhel8@sha256:958ba6856cc76fc77d34a9c78888eb37b9c39b83a2f044ef2337610560ba9323_arm64",
"8Base-RHOL-5.4:openshift-logging/log-file-metric-exporter-rhel8@sha256:043e4d3481fbfedf3115e18fade3a2f33b891b0d9a641bf973c2c7f492cb0489_amd64",
"8Base-RHOL-5.4:openshift-logging/log-file-metric-exporter-rhel8@sha256:4fe26adac10cf20b83812e4fa513231d7e1fd4b6cd4e09d4fd425c391885cfcc_ppc64le",
"8Base-RHOL-5.4:openshift-logging/log-file-metric-exporter-rhel8@sha256:85827db708c0927027435b05732cc7e34b0675eaa86665c91efacc76aecd6227_s390x",
"8Base-RHOL-5.4:openshift-logging/log-file-metric-exporter-rhel8@sha256:a5285db276a5545fdbaa9f0743a49ba72ce1c5da61b5cccc9422320a03e08bea_arm64",
"8Base-RHOL-5.4:openshift-logging/logging-curator5-rhel8@sha256:0b28415b8115ff3216002faa5c9ecf3c46995085e3364c8028cb544cb4787ed2_arm64",
"8Base-RHOL-5.4:openshift-logging/logging-curator5-rhel8@sha256:7016e867ddfe970d6d2d54d5615e8f613786bcfbfe52ebf3139c07da3d5a53db_s390x",
"8Base-RHOL-5.4:openshift-logging/logging-curator5-rhel8@sha256:94c435f45e9dbd9fa633e137356cfb1d6ac2d4dd7574b359367665da42d6203d_amd64",
"8Base-RHOL-5.4:openshift-logging/logging-curator5-rhel8@sha256:d24afbc9228ef7f3d0a6fd716a3a57abde88a1f65d149c7df4f959a775b670bd_ppc64le",
"8Base-RHOL-5.4:openshift-logging/logging-loki-rhel8@sha256:40d4989b4733f54a01a73831fa00b12e49fff69c75138902eac0d894d432e4d9_arm64",
"8Base-RHOL-5.4:openshift-logging/logging-loki-rhel8@sha256:b444af35118c24bde0dfa2a8825ba427b3345451f6081133477254213a3460f0_amd64",
"8Base-RHOL-5.4:openshift-logging/logging-loki-rhel8@sha256:cfe410d498940a95da631ea213866a96a119034d78d5d53f7f9c7e8da56e0f45_s390x",
"8Base-RHOL-5.4:openshift-logging/logging-loki-rhel8@sha256:f7979c82140a0ab1a97c9f3151465bfbd9f79c4db9b0cc20f974cd7b890f074f_ppc64le",
"8Base-RHOL-5.4:openshift-logging/loki-operator-bundle@sha256:02cceda51028eb55a3b82aa5275f03dbaf8f8f9ab3fd27c650d1a07a93044e37_amd64",
"8Base-RHOL-5.4:openshift-logging/loki-rhel8-operator@sha256:0f1be625b4012820f7ac439fed000808d7acb4e885ace16014461bf802be935a_s390x",
"8Base-RHOL-5.4:openshift-logging/loki-rhel8-operator@sha256:28f45a80846c5e11638fb479be42cafcb2bdb3af94dff3629a820de295cbe31d_ppc64le",
"8Base-RHOL-5.4:openshift-logging/loki-rhel8-operator@sha256:df7de1e9f5a4396df6f14b1c4b6bb2a9ae4bc50d82cbc954ec535c26e8df2cb1_arm64",
"8Base-RHOL-5.4:openshift-logging/loki-rhel8-operator@sha256:f8a35557c9eb27f703ffa9320a9d39a2361d93fdb0b8c874d97da458048e7eec_amd64",
"8Base-RHOL-5.4:openshift-logging/lokistack-gateway-rhel8@sha256:178fcf44e6a1fa90d27a40565f69ae2880622b017bc8d9e33a441353eb45609d_arm64",
"8Base-RHOL-5.4:openshift-logging/lokistack-gateway-rhel8@sha256:7b0c2c99cf0f710166b749dbfd7f544caf5fe35516c743fca251c7cec896e1d6_ppc64le",
"8Base-RHOL-5.4:openshift-logging/lokistack-gateway-rhel8@sha256:9c4959525339b607a98889d56f4c26f2e4af25032466c439903a7f1cb593f721_s390x",
"8Base-RHOL-5.4:openshift-logging/lokistack-gateway-rhel8@sha256:a967d5be7d3a6fdd75965a5f9a7396a52cdcb37d6a8521c440b0b5c650c230f2_amd64",
"8Base-RHOL-5.4:openshift-logging/opa-openshift-rhel8@sha256:1b106af51bb50f1ce4db13ebbf6f6c67eae45611c0d5dc46476f1dfaa8aca166_arm64",
"8Base-RHOL-5.4:openshift-logging/opa-openshift-rhel8@sha256:92ddf24824c8f8ae93dec07184c446615b635389472d3a525df72da07c8d9b97_ppc64le",
"8Base-RHOL-5.4:openshift-logging/opa-openshift-rhel8@sha256:9fd0c5df785564b35392705a479d6fb9245e3329719438c76c0282f9ef2f2d55_amd64",
"8Base-RHOL-5.4:openshift-logging/opa-openshift-rhel8@sha256:be8ba0e4c5f24c7b4549700a25c89b10d4b2fc0b0e3888163bb53827914e95c1_s390x",
"8Base-RHOL-5.4:openshift-logging/vector-rhel8@sha256:48bb136d11b44428c87489978873370848ac2b219b107ef7e81ab679db095234_s390x",
"8Base-RHOL-5.4:openshift-logging/vector-rhel8@sha256:48f0317d167710ff5b0787c73f6b7dd0249e7c8d2d001159132a97299c30b62d_ppc64le",
"8Base-RHOL-5.4:openshift-logging/vector-rhel8@sha256:bde21c03fb831d01e85b28245881f7e3f2bb2ef6d2671eb92b2e0cc4bd3898e2_arm64",
"8Base-RHOL-5.4:openshift-logging/vector-rhel8@sha256:cc6b9c6a344aac56c99c96b5120ffe2dad479000b34964ff89d030ae762bda43_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-36518"
},
{
"category": "external",
"summary": "RHBZ#2064698",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2064698"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-36518",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-36518"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-36518",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-36518"
},
{
"category": "external",
"summary": "https://github.com/advisories/GHSA-57j2-w4cx-62h2",
"url": "https://github.com/advisories/GHSA-57j2-w4cx-62h2"
}
],
"release_date": "2020-08-13T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-11-16T12:13:01+00:00",
"details": "For OpenShift Container Platform 4.10 see the following documentation, which will be updated shortly, for detailed release notes:\n\nhttps://docs.openshift.com/container-platform/4.10/logging/cluster-logging-release-notes.html\n\nFor Red Hat OpenShift Logging 5.4, see the following instructions to apply this update:\n\nhttps://docs.openshift.com/container-platform/4.10/logging/cluster-logging-upgrading.html",
"product_ids": [
"8Base-RHOL-5.4:openshift-logging/elasticsearch6-rhel8@sha256:17a9f3ae042b92693a374e3d60a07f2ab2e52419f8df25d446dd0654f6a858f6_ppc64le",
"8Base-RHOL-5.4:openshift-logging/elasticsearch6-rhel8@sha256:5b1cfc2f9a96601439cf17d1fe49a6bc6cad3b7273af87b23528090aefbfd915_s390x",
"8Base-RHOL-5.4:openshift-logging/elasticsearch6-rhel8@sha256:8e0ba10f91db4cb8786d0501ec33a3d54f7c7c5337e0495cc2286a6ea20cca20_arm64",
"8Base-RHOL-5.4:openshift-logging/elasticsearch6-rhel8@sha256:fa8182b69328077500f89becc7621b48efa8d99f34247c2e6855dcfec13980e3_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:7435"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"8Base-RHOL-5.4:openshift-logging/cluster-logging-operator-bundle@sha256:cb26d9e55f781dd535901a90f1ec2f8e02e8e1de72c0fde638c90fcc228ec4b2_amd64",
"8Base-RHOL-5.4:openshift-logging/cluster-logging-rhel8-operator@sha256:617cc8b0011110981674b75fe1e3041bfa434c952e4a0193818b971edbc7a480_s390x",
"8Base-RHOL-5.4:openshift-logging/cluster-logging-rhel8-operator@sha256:637df49756fe85e7b38b279ffa7672d72c658d3d47df7f9dada2dd70563af83b_arm64",
"8Base-RHOL-5.4:openshift-logging/cluster-logging-rhel8-operator@sha256:aa1602fe2abe23bd8a4c791bc45d425686a6e6d1aab4face0fac28bfc7cebbe1_ppc64le",
"8Base-RHOL-5.4:openshift-logging/cluster-logging-rhel8-operator@sha256:c698b52c46d41007e5ac4f90b9540d430820bd20a93468fddd3a949c7ef5b332_amd64",
"8Base-RHOL-5.4:openshift-logging/elasticsearch-operator-bundle@sha256:7659606e0418a1920161b7ca67524ea6a7b1ed366b817f1a5cde0b346152243c_amd64",
"8Base-RHOL-5.4:openshift-logging/elasticsearch-proxy-rhel8@sha256:4f4e5bb267ad391bc0fc6a010ec9ecdf3bf48d5b6e9db0d2510960c13c97bd71_ppc64le",
"8Base-RHOL-5.4:openshift-logging/elasticsearch-proxy-rhel8@sha256:b9c2e58b39dc3de97013f8806178f6327bf2e4590fe55db144527d64d468f64f_s390x",
"8Base-RHOL-5.4:openshift-logging/elasticsearch-proxy-rhel8@sha256:c9a2b9e7cca14d9596ccbe0f64e2abe4452f91f029f42eefead43c9f526f6a58_arm64",
"8Base-RHOL-5.4:openshift-logging/elasticsearch-proxy-rhel8@sha256:e38c55762c1eef39b401c46d44c899067b1566173e1ce239f17a95c52b30d8c7_amd64",
"8Base-RHOL-5.4:openshift-logging/elasticsearch-rhel8-operator@sha256:2005f41e59a130bb86c2ec47d1b060e3e2ed32f9a4cef3897e2c05fc94043dbb_arm64",
"8Base-RHOL-5.4:openshift-logging/elasticsearch-rhel8-operator@sha256:6a55934cf7af0c03e06d4ec7a15a80acf53491fb7a183c16fdf8018fbf9b4174_ppc64le",
"8Base-RHOL-5.4:openshift-logging/elasticsearch-rhel8-operator@sha256:8ce04536772f31ad022b9c66cddc090d2962b44d66c06a1db56d1447be198326_amd64",
"8Base-RHOL-5.4:openshift-logging/elasticsearch-rhel8-operator@sha256:dd211d42eaad043d9bdb519e3ad6a86255b7280a2cdf47dd3fe0458a77cb110f_s390x",
"8Base-RHOL-5.4:openshift-logging/elasticsearch6-rhel8@sha256:17a9f3ae042b92693a374e3d60a07f2ab2e52419f8df25d446dd0654f6a858f6_ppc64le",
"8Base-RHOL-5.4:openshift-logging/elasticsearch6-rhel8@sha256:5b1cfc2f9a96601439cf17d1fe49a6bc6cad3b7273af87b23528090aefbfd915_s390x",
"8Base-RHOL-5.4:openshift-logging/elasticsearch6-rhel8@sha256:8e0ba10f91db4cb8786d0501ec33a3d54f7c7c5337e0495cc2286a6ea20cca20_arm64",
"8Base-RHOL-5.4:openshift-logging/elasticsearch6-rhel8@sha256:fa8182b69328077500f89becc7621b48efa8d99f34247c2e6855dcfec13980e3_amd64",
"8Base-RHOL-5.4:openshift-logging/eventrouter-rhel8@sha256:4438a3bba34418a9dc566bf15f6b4764de4295ab8b05a7b1a86f9e8cd332b3f7_arm64",
"8Base-RHOL-5.4:openshift-logging/eventrouter-rhel8@sha256:bc408fc4b0482c5eb1b0deb3a9090f3e3dd9b370001d54cd076254562c72fec9_ppc64le",
"8Base-RHOL-5.4:openshift-logging/eventrouter-rhel8@sha256:d50a2b89442d04b1163c01b3a3951857a95df76c57b14e7f51d835c3ac6d75b3_amd64",
"8Base-RHOL-5.4:openshift-logging/eventrouter-rhel8@sha256:f05aee8433dec1c9f6cf835038f9e5a47847d4095383bf3c22ca57c3fb69fa98_s390x",
"8Base-RHOL-5.4:openshift-logging/fluentd-rhel8@sha256:150e17cb645cf2f4cb7ab592572dd3abd145d9a33e790778280e256666248022_amd64",
"8Base-RHOL-5.4:openshift-logging/fluentd-rhel8@sha256:36aecf05ca3cdaf29982b3efa4a1c97087be29b0a58c9777e6b0c11a34861aa8_s390x",
"8Base-RHOL-5.4:openshift-logging/fluentd-rhel8@sha256:e3a51d2bdc632b8376e28c33e9d4fac3464e3a84a313a17246b1f1cf21cb5710_arm64",
"8Base-RHOL-5.4:openshift-logging/fluentd-rhel8@sha256:ea07da04f06df6bf0d9dd981a3795dfdb51eca83f59a6291114650e3e98a9e71_ppc64le",
"8Base-RHOL-5.4:openshift-logging/kibana6-rhel8@sha256:167ee6a645c7397bde3d12e9b9685279505c25ffb3bda11ae68bdf0b34229f2e_amd64",
"8Base-RHOL-5.4:openshift-logging/kibana6-rhel8@sha256:4a029733337b10bb9fb8d98c91abc5451ca0b98713c8f2271a675251e025b6c0_s390x",
"8Base-RHOL-5.4:openshift-logging/kibana6-rhel8@sha256:812f4380024dc3df42310ad14d173d390f2bdf4b3dbdb02550c00552534f79ce_ppc64le",
"8Base-RHOL-5.4:openshift-logging/kibana6-rhel8@sha256:958ba6856cc76fc77d34a9c78888eb37b9c39b83a2f044ef2337610560ba9323_arm64",
"8Base-RHOL-5.4:openshift-logging/log-file-metric-exporter-rhel8@sha256:043e4d3481fbfedf3115e18fade3a2f33b891b0d9a641bf973c2c7f492cb0489_amd64",
"8Base-RHOL-5.4:openshift-logging/log-file-metric-exporter-rhel8@sha256:4fe26adac10cf20b83812e4fa513231d7e1fd4b6cd4e09d4fd425c391885cfcc_ppc64le",
"8Base-RHOL-5.4:openshift-logging/log-file-metric-exporter-rhel8@sha256:85827db708c0927027435b05732cc7e34b0675eaa86665c91efacc76aecd6227_s390x",
"8Base-RHOL-5.4:openshift-logging/log-file-metric-exporter-rhel8@sha256:a5285db276a5545fdbaa9f0743a49ba72ce1c5da61b5cccc9422320a03e08bea_arm64",
"8Base-RHOL-5.4:openshift-logging/logging-curator5-rhel8@sha256:0b28415b8115ff3216002faa5c9ecf3c46995085e3364c8028cb544cb4787ed2_arm64",
"8Base-RHOL-5.4:openshift-logging/logging-curator5-rhel8@sha256:7016e867ddfe970d6d2d54d5615e8f613786bcfbfe52ebf3139c07da3d5a53db_s390x",
"8Base-RHOL-5.4:openshift-logging/logging-curator5-rhel8@sha256:94c435f45e9dbd9fa633e137356cfb1d6ac2d4dd7574b359367665da42d6203d_amd64",
"8Base-RHOL-5.4:openshift-logging/logging-curator5-rhel8@sha256:d24afbc9228ef7f3d0a6fd716a3a57abde88a1f65d149c7df4f959a775b670bd_ppc64le",
"8Base-RHOL-5.4:openshift-logging/logging-loki-rhel8@sha256:40d4989b4733f54a01a73831fa00b12e49fff69c75138902eac0d894d432e4d9_arm64",
"8Base-RHOL-5.4:openshift-logging/logging-loki-rhel8@sha256:b444af35118c24bde0dfa2a8825ba427b3345451f6081133477254213a3460f0_amd64",
"8Base-RHOL-5.4:openshift-logging/logging-loki-rhel8@sha256:cfe410d498940a95da631ea213866a96a119034d78d5d53f7f9c7e8da56e0f45_s390x",
"8Base-RHOL-5.4:openshift-logging/logging-loki-rhel8@sha256:f7979c82140a0ab1a97c9f3151465bfbd9f79c4db9b0cc20f974cd7b890f074f_ppc64le",
"8Base-RHOL-5.4:openshift-logging/loki-operator-bundle@sha256:02cceda51028eb55a3b82aa5275f03dbaf8f8f9ab3fd27c650d1a07a93044e37_amd64",
"8Base-RHOL-5.4:openshift-logging/loki-rhel8-operator@sha256:0f1be625b4012820f7ac439fed000808d7acb4e885ace16014461bf802be935a_s390x",
"8Base-RHOL-5.4:openshift-logging/loki-rhel8-operator@sha256:28f45a80846c5e11638fb479be42cafcb2bdb3af94dff3629a820de295cbe31d_ppc64le",
"8Base-RHOL-5.4:openshift-logging/loki-rhel8-operator@sha256:df7de1e9f5a4396df6f14b1c4b6bb2a9ae4bc50d82cbc954ec535c26e8df2cb1_arm64",
"8Base-RHOL-5.4:openshift-logging/loki-rhel8-operator@sha256:f8a35557c9eb27f703ffa9320a9d39a2361d93fdb0b8c874d97da458048e7eec_amd64",
"8Base-RHOL-5.4:openshift-logging/lokistack-gateway-rhel8@sha256:178fcf44e6a1fa90d27a40565f69ae2880622b017bc8d9e33a441353eb45609d_arm64",
"8Base-RHOL-5.4:openshift-logging/lokistack-gateway-rhel8@sha256:7b0c2c99cf0f710166b749dbfd7f544caf5fe35516c743fca251c7cec896e1d6_ppc64le",
"8Base-RHOL-5.4:openshift-logging/lokistack-gateway-rhel8@sha256:9c4959525339b607a98889d56f4c26f2e4af25032466c439903a7f1cb593f721_s390x",
"8Base-RHOL-5.4:openshift-logging/lokistack-gateway-rhel8@sha256:a967d5be7d3a6fdd75965a5f9a7396a52cdcb37d6a8521c440b0b5c650c230f2_amd64",
"8Base-RHOL-5.4:openshift-logging/opa-openshift-rhel8@sha256:1b106af51bb50f1ce4db13ebbf6f6c67eae45611c0d5dc46476f1dfaa8aca166_arm64",
"8Base-RHOL-5.4:openshift-logging/opa-openshift-rhel8@sha256:92ddf24824c8f8ae93dec07184c446615b635389472d3a525df72da07c8d9b97_ppc64le",
"8Base-RHOL-5.4:openshift-logging/opa-openshift-rhel8@sha256:9fd0c5df785564b35392705a479d6fb9245e3329719438c76c0282f9ef2f2d55_amd64",
"8Base-RHOL-5.4:openshift-logging/opa-openshift-rhel8@sha256:be8ba0e4c5f24c7b4549700a25c89b10d4b2fc0b0e3888163bb53827914e95c1_s390x",
"8Base-RHOL-5.4:openshift-logging/vector-rhel8@sha256:48bb136d11b44428c87489978873370848ac2b219b107ef7e81ab679db095234_s390x",
"8Base-RHOL-5.4:openshift-logging/vector-rhel8@sha256:48f0317d167710ff5b0787c73f6b7dd0249e7c8d2d001159132a97299c30b62d_ppc64le",
"8Base-RHOL-5.4:openshift-logging/vector-rhel8@sha256:bde21c03fb831d01e85b28245881f7e3f2bb2ef6d2671eb92b2e0cc4bd3898e2_arm64",
"8Base-RHOL-5.4:openshift-logging/vector-rhel8@sha256:cc6b9c6a344aac56c99c96b5120ffe2dad479000b34964ff89d030ae762bda43_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "jackson-databind: denial of service via a large depth of nested objects"
},
{
"cve": "CVE-2022-32149",
"cwe": {
"id": "CWE-407",
"name": "Inefficient Algorithmic Complexity"
},
"discovery_date": "2022-10-12T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-RHOL-5.4:openshift-logging/cluster-logging-operator-bundle@sha256:cb26d9e55f781dd535901a90f1ec2f8e02e8e1de72c0fde638c90fcc228ec4b2_amd64",
"8Base-RHOL-5.4:openshift-logging/cluster-logging-rhel8-operator@sha256:617cc8b0011110981674b75fe1e3041bfa434c952e4a0193818b971edbc7a480_s390x",
"8Base-RHOL-5.4:openshift-logging/cluster-logging-rhel8-operator@sha256:637df49756fe85e7b38b279ffa7672d72c658d3d47df7f9dada2dd70563af83b_arm64",
"8Base-RHOL-5.4:openshift-logging/cluster-logging-rhel8-operator@sha256:aa1602fe2abe23bd8a4c791bc45d425686a6e6d1aab4face0fac28bfc7cebbe1_ppc64le",
"8Base-RHOL-5.4:openshift-logging/cluster-logging-rhel8-operator@sha256:c698b52c46d41007e5ac4f90b9540d430820bd20a93468fddd3a949c7ef5b332_amd64",
"8Base-RHOL-5.4:openshift-logging/elasticsearch-operator-bundle@sha256:7659606e0418a1920161b7ca67524ea6a7b1ed366b817f1a5cde0b346152243c_amd64",
"8Base-RHOL-5.4:openshift-logging/elasticsearch-rhel8-operator@sha256:2005f41e59a130bb86c2ec47d1b060e3e2ed32f9a4cef3897e2c05fc94043dbb_arm64",
"8Base-RHOL-5.4:openshift-logging/elasticsearch-rhel8-operator@sha256:6a55934cf7af0c03e06d4ec7a15a80acf53491fb7a183c16fdf8018fbf9b4174_ppc64le",
"8Base-RHOL-5.4:openshift-logging/elasticsearch-rhel8-operator@sha256:8ce04536772f31ad022b9c66cddc090d2962b44d66c06a1db56d1447be198326_amd64",
"8Base-RHOL-5.4:openshift-logging/elasticsearch-rhel8-operator@sha256:dd211d42eaad043d9bdb519e3ad6a86255b7280a2cdf47dd3fe0458a77cb110f_s390x",
"8Base-RHOL-5.4:openshift-logging/elasticsearch6-rhel8@sha256:17a9f3ae042b92693a374e3d60a07f2ab2e52419f8df25d446dd0654f6a858f6_ppc64le",
"8Base-RHOL-5.4:openshift-logging/elasticsearch6-rhel8@sha256:5b1cfc2f9a96601439cf17d1fe49a6bc6cad3b7273af87b23528090aefbfd915_s390x",
"8Base-RHOL-5.4:openshift-logging/elasticsearch6-rhel8@sha256:8e0ba10f91db4cb8786d0501ec33a3d54f7c7c5337e0495cc2286a6ea20cca20_arm64",
"8Base-RHOL-5.4:openshift-logging/elasticsearch6-rhel8@sha256:fa8182b69328077500f89becc7621b48efa8d99f34247c2e6855dcfec13980e3_amd64",
"8Base-RHOL-5.4:openshift-logging/eventrouter-rhel8@sha256:4438a3bba34418a9dc566bf15f6b4764de4295ab8b05a7b1a86f9e8cd332b3f7_arm64",
"8Base-RHOL-5.4:openshift-logging/eventrouter-rhel8@sha256:bc408fc4b0482c5eb1b0deb3a9090f3e3dd9b370001d54cd076254562c72fec9_ppc64le",
"8Base-RHOL-5.4:openshift-logging/eventrouter-rhel8@sha256:d50a2b89442d04b1163c01b3a3951857a95df76c57b14e7f51d835c3ac6d75b3_amd64",
"8Base-RHOL-5.4:openshift-logging/eventrouter-rhel8@sha256:f05aee8433dec1c9f6cf835038f9e5a47847d4095383bf3c22ca57c3fb69fa98_s390x",
"8Base-RHOL-5.4:openshift-logging/fluentd-rhel8@sha256:150e17cb645cf2f4cb7ab592572dd3abd145d9a33e790778280e256666248022_amd64",
"8Base-RHOL-5.4:openshift-logging/fluentd-rhel8@sha256:36aecf05ca3cdaf29982b3efa4a1c97087be29b0a58c9777e6b0c11a34861aa8_s390x",
"8Base-RHOL-5.4:openshift-logging/fluentd-rhel8@sha256:e3a51d2bdc632b8376e28c33e9d4fac3464e3a84a313a17246b1f1cf21cb5710_arm64",
"8Base-RHOL-5.4:openshift-logging/fluentd-rhel8@sha256:ea07da04f06df6bf0d9dd981a3795dfdb51eca83f59a6291114650e3e98a9e71_ppc64le",
"8Base-RHOL-5.4:openshift-logging/kibana6-rhel8@sha256:167ee6a645c7397bde3d12e9b9685279505c25ffb3bda11ae68bdf0b34229f2e_amd64",
"8Base-RHOL-5.4:openshift-logging/kibana6-rhel8@sha256:4a029733337b10bb9fb8d98c91abc5451ca0b98713c8f2271a675251e025b6c0_s390x",
"8Base-RHOL-5.4:openshift-logging/kibana6-rhel8@sha256:812f4380024dc3df42310ad14d173d390f2bdf4b3dbdb02550c00552534f79ce_ppc64le",
"8Base-RHOL-5.4:openshift-logging/kibana6-rhel8@sha256:958ba6856cc76fc77d34a9c78888eb37b9c39b83a2f044ef2337610560ba9323_arm64",
"8Base-RHOL-5.4:openshift-logging/log-file-metric-exporter-rhel8@sha256:043e4d3481fbfedf3115e18fade3a2f33b891b0d9a641bf973c2c7f492cb0489_amd64",
"8Base-RHOL-5.4:openshift-logging/log-file-metric-exporter-rhel8@sha256:4fe26adac10cf20b83812e4fa513231d7e1fd4b6cd4e09d4fd425c391885cfcc_ppc64le",
"8Base-RHOL-5.4:openshift-logging/log-file-metric-exporter-rhel8@sha256:85827db708c0927027435b05732cc7e34b0675eaa86665c91efacc76aecd6227_s390x",
"8Base-RHOL-5.4:openshift-logging/log-file-metric-exporter-rhel8@sha256:a5285db276a5545fdbaa9f0743a49ba72ce1c5da61b5cccc9422320a03e08bea_arm64",
"8Base-RHOL-5.4:openshift-logging/logging-curator5-rhel8@sha256:0b28415b8115ff3216002faa5c9ecf3c46995085e3364c8028cb544cb4787ed2_arm64",
"8Base-RHOL-5.4:openshift-logging/logging-curator5-rhel8@sha256:7016e867ddfe970d6d2d54d5615e8f613786bcfbfe52ebf3139c07da3d5a53db_s390x",
"8Base-RHOL-5.4:openshift-logging/logging-curator5-rhel8@sha256:94c435f45e9dbd9fa633e137356cfb1d6ac2d4dd7574b359367665da42d6203d_amd64",
"8Base-RHOL-5.4:openshift-logging/logging-curator5-rhel8@sha256:d24afbc9228ef7f3d0a6fd716a3a57abde88a1f65d149c7df4f959a775b670bd_ppc64le",
"8Base-RHOL-5.4:openshift-logging/logging-loki-rhel8@sha256:40d4989b4733f54a01a73831fa00b12e49fff69c75138902eac0d894d432e4d9_arm64",
"8Base-RHOL-5.4:openshift-logging/logging-loki-rhel8@sha256:b444af35118c24bde0dfa2a8825ba427b3345451f6081133477254213a3460f0_amd64",
"8Base-RHOL-5.4:openshift-logging/logging-loki-rhel8@sha256:cfe410d498940a95da631ea213866a96a119034d78d5d53f7f9c7e8da56e0f45_s390x",
"8Base-RHOL-5.4:openshift-logging/logging-loki-rhel8@sha256:f7979c82140a0ab1a97c9f3151465bfbd9f79c4db9b0cc20f974cd7b890f074f_ppc64le",
"8Base-RHOL-5.4:openshift-logging/loki-operator-bundle@sha256:02cceda51028eb55a3b82aa5275f03dbaf8f8f9ab3fd27c650d1a07a93044e37_amd64",
"8Base-RHOL-5.4:openshift-logging/loki-rhel8-operator@sha256:0f1be625b4012820f7ac439fed000808d7acb4e885ace16014461bf802be935a_s390x",
"8Base-RHOL-5.4:openshift-logging/loki-rhel8-operator@sha256:28f45a80846c5e11638fb479be42cafcb2bdb3af94dff3629a820de295cbe31d_ppc64le",
"8Base-RHOL-5.4:openshift-logging/loki-rhel8-operator@sha256:df7de1e9f5a4396df6f14b1c4b6bb2a9ae4bc50d82cbc954ec535c26e8df2cb1_arm64",
"8Base-RHOL-5.4:openshift-logging/loki-rhel8-operator@sha256:f8a35557c9eb27f703ffa9320a9d39a2361d93fdb0b8c874d97da458048e7eec_amd64",
"8Base-RHOL-5.4:openshift-logging/lokistack-gateway-rhel8@sha256:178fcf44e6a1fa90d27a40565f69ae2880622b017bc8d9e33a441353eb45609d_arm64",
"8Base-RHOL-5.4:openshift-logging/lokistack-gateway-rhel8@sha256:7b0c2c99cf0f710166b749dbfd7f544caf5fe35516c743fca251c7cec896e1d6_ppc64le",
"8Base-RHOL-5.4:openshift-logging/lokistack-gateway-rhel8@sha256:9c4959525339b607a98889d56f4c26f2e4af25032466c439903a7f1cb593f721_s390x",
"8Base-RHOL-5.4:openshift-logging/lokistack-gateway-rhel8@sha256:a967d5be7d3a6fdd75965a5f9a7396a52cdcb37d6a8521c440b0b5c650c230f2_amd64",
"8Base-RHOL-5.4:openshift-logging/opa-openshift-rhel8@sha256:1b106af51bb50f1ce4db13ebbf6f6c67eae45611c0d5dc46476f1dfaa8aca166_arm64",
"8Base-RHOL-5.4:openshift-logging/opa-openshift-rhel8@sha256:92ddf24824c8f8ae93dec07184c446615b635389472d3a525df72da07c8d9b97_ppc64le",
"8Base-RHOL-5.4:openshift-logging/opa-openshift-rhel8@sha256:9fd0c5df785564b35392705a479d6fb9245e3329719438c76c0282f9ef2f2d55_amd64",
"8Base-RHOL-5.4:openshift-logging/opa-openshift-rhel8@sha256:be8ba0e4c5f24c7b4549700a25c89b10d4b2fc0b0e3888163bb53827914e95c1_s390x",
"8Base-RHOL-5.4:openshift-logging/vector-rhel8@sha256:48bb136d11b44428c87489978873370848ac2b219b107ef7e81ab679db095234_s390x",
"8Base-RHOL-5.4:openshift-logging/vector-rhel8@sha256:48f0317d167710ff5b0787c73f6b7dd0249e7c8d2d001159132a97299c30b62d_ppc64le",
"8Base-RHOL-5.4:openshift-logging/vector-rhel8@sha256:bde21c03fb831d01e85b28245881f7e3f2bb2ef6d2671eb92b2e0cc4bd3898e2_arm64",
"8Base-RHOL-5.4:openshift-logging/vector-rhel8@sha256:cc6b9c6a344aac56c99c96b5120ffe2dad479000b34964ff89d030ae762bda43_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2134010"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in the golang.org/x/text/language package. An attacker can craft an Accept-Language header which ParseAcceptLanguage will take significant time to parse. This issue leads to a denial of service, and can impact availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: golang.org/x/text/language: ParseAcceptLanguage takes a long time to parse complex tags",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "After careful analysis of the vulnerability Redhat is choosing to keep the vulnerability severity as moderate,the vulnerability exists in the ParseAcceptLanguage function of the golang text/language package,when an attacker could craft an unusually large accept header and due to the parser taking quadratic time complexity to finish, firstly the attacker would have to find a way smuggle an input to the parser and even then this would simply not result in a crash of any kind but more of resource hang which while can be unpleasant,does not equate to any real world damage.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-RHOL-5.4:openshift-logging/elasticsearch-proxy-rhel8@sha256:4f4e5bb267ad391bc0fc6a010ec9ecdf3bf48d5b6e9db0d2510960c13c97bd71_ppc64le",
"8Base-RHOL-5.4:openshift-logging/elasticsearch-proxy-rhel8@sha256:b9c2e58b39dc3de97013f8806178f6327bf2e4590fe55db144527d64d468f64f_s390x",
"8Base-RHOL-5.4:openshift-logging/elasticsearch-proxy-rhel8@sha256:c9a2b9e7cca14d9596ccbe0f64e2abe4452f91f029f42eefead43c9f526f6a58_arm64",
"8Base-RHOL-5.4:openshift-logging/elasticsearch-proxy-rhel8@sha256:e38c55762c1eef39b401c46d44c899067b1566173e1ce239f17a95c52b30d8c7_amd64"
],
"known_not_affected": [
"8Base-RHOL-5.4:openshift-logging/cluster-logging-operator-bundle@sha256:cb26d9e55f781dd535901a90f1ec2f8e02e8e1de72c0fde638c90fcc228ec4b2_amd64",
"8Base-RHOL-5.4:openshift-logging/cluster-logging-rhel8-operator@sha256:617cc8b0011110981674b75fe1e3041bfa434c952e4a0193818b971edbc7a480_s390x",
"8Base-RHOL-5.4:openshift-logging/cluster-logging-rhel8-operator@sha256:637df49756fe85e7b38b279ffa7672d72c658d3d47df7f9dada2dd70563af83b_arm64",
"8Base-RHOL-5.4:openshift-logging/cluster-logging-rhel8-operator@sha256:aa1602fe2abe23bd8a4c791bc45d425686a6e6d1aab4face0fac28bfc7cebbe1_ppc64le",
"8Base-RHOL-5.4:openshift-logging/cluster-logging-rhel8-operator@sha256:c698b52c46d41007e5ac4f90b9540d430820bd20a93468fddd3a949c7ef5b332_amd64",
"8Base-RHOL-5.4:openshift-logging/elasticsearch-operator-bundle@sha256:7659606e0418a1920161b7ca67524ea6a7b1ed366b817f1a5cde0b346152243c_amd64",
"8Base-RHOL-5.4:openshift-logging/elasticsearch-rhel8-operator@sha256:2005f41e59a130bb86c2ec47d1b060e3e2ed32f9a4cef3897e2c05fc94043dbb_arm64",
"8Base-RHOL-5.4:openshift-logging/elasticsearch-rhel8-operator@sha256:6a55934cf7af0c03e06d4ec7a15a80acf53491fb7a183c16fdf8018fbf9b4174_ppc64le",
"8Base-RHOL-5.4:openshift-logging/elasticsearch-rhel8-operator@sha256:8ce04536772f31ad022b9c66cddc090d2962b44d66c06a1db56d1447be198326_amd64",
"8Base-RHOL-5.4:openshift-logging/elasticsearch-rhel8-operator@sha256:dd211d42eaad043d9bdb519e3ad6a86255b7280a2cdf47dd3fe0458a77cb110f_s390x",
"8Base-RHOL-5.4:openshift-logging/elasticsearch6-rhel8@sha256:17a9f3ae042b92693a374e3d60a07f2ab2e52419f8df25d446dd0654f6a858f6_ppc64le",
"8Base-RHOL-5.4:openshift-logging/elasticsearch6-rhel8@sha256:5b1cfc2f9a96601439cf17d1fe49a6bc6cad3b7273af87b23528090aefbfd915_s390x",
"8Base-RHOL-5.4:openshift-logging/elasticsearch6-rhel8@sha256:8e0ba10f91db4cb8786d0501ec33a3d54f7c7c5337e0495cc2286a6ea20cca20_arm64",
"8Base-RHOL-5.4:openshift-logging/elasticsearch6-rhel8@sha256:fa8182b69328077500f89becc7621b48efa8d99f34247c2e6855dcfec13980e3_amd64",
"8Base-RHOL-5.4:openshift-logging/eventrouter-rhel8@sha256:4438a3bba34418a9dc566bf15f6b4764de4295ab8b05a7b1a86f9e8cd332b3f7_arm64",
"8Base-RHOL-5.4:openshift-logging/eventrouter-rhel8@sha256:bc408fc4b0482c5eb1b0deb3a9090f3e3dd9b370001d54cd076254562c72fec9_ppc64le",
"8Base-RHOL-5.4:openshift-logging/eventrouter-rhel8@sha256:d50a2b89442d04b1163c01b3a3951857a95df76c57b14e7f51d835c3ac6d75b3_amd64",
"8Base-RHOL-5.4:openshift-logging/eventrouter-rhel8@sha256:f05aee8433dec1c9f6cf835038f9e5a47847d4095383bf3c22ca57c3fb69fa98_s390x",
"8Base-RHOL-5.4:openshift-logging/fluentd-rhel8@sha256:150e17cb645cf2f4cb7ab592572dd3abd145d9a33e790778280e256666248022_amd64",
"8Base-RHOL-5.4:openshift-logging/fluentd-rhel8@sha256:36aecf05ca3cdaf29982b3efa4a1c97087be29b0a58c9777e6b0c11a34861aa8_s390x",
"8Base-RHOL-5.4:openshift-logging/fluentd-rhel8@sha256:e3a51d2bdc632b8376e28c33e9d4fac3464e3a84a313a17246b1f1cf21cb5710_arm64",
"8Base-RHOL-5.4:openshift-logging/fluentd-rhel8@sha256:ea07da04f06df6bf0d9dd981a3795dfdb51eca83f59a6291114650e3e98a9e71_ppc64le",
"8Base-RHOL-5.4:openshift-logging/kibana6-rhel8@sha256:167ee6a645c7397bde3d12e9b9685279505c25ffb3bda11ae68bdf0b34229f2e_amd64",
"8Base-RHOL-5.4:openshift-logging/kibana6-rhel8@sha256:4a029733337b10bb9fb8d98c91abc5451ca0b98713c8f2271a675251e025b6c0_s390x",
"8Base-RHOL-5.4:openshift-logging/kibana6-rhel8@sha256:812f4380024dc3df42310ad14d173d390f2bdf4b3dbdb02550c00552534f79ce_ppc64le",
"8Base-RHOL-5.4:openshift-logging/kibana6-rhel8@sha256:958ba6856cc76fc77d34a9c78888eb37b9c39b83a2f044ef2337610560ba9323_arm64",
"8Base-RHOL-5.4:openshift-logging/log-file-metric-exporter-rhel8@sha256:043e4d3481fbfedf3115e18fade3a2f33b891b0d9a641bf973c2c7f492cb0489_amd64",
"8Base-RHOL-5.4:openshift-logging/log-file-metric-exporter-rhel8@sha256:4fe26adac10cf20b83812e4fa513231d7e1fd4b6cd4e09d4fd425c391885cfcc_ppc64le",
"8Base-RHOL-5.4:openshift-logging/log-file-metric-exporter-rhel8@sha256:85827db708c0927027435b05732cc7e34b0675eaa86665c91efacc76aecd6227_s390x",
"8Base-RHOL-5.4:openshift-logging/log-file-metric-exporter-rhel8@sha256:a5285db276a5545fdbaa9f0743a49ba72ce1c5da61b5cccc9422320a03e08bea_arm64",
"8Base-RHOL-5.4:openshift-logging/logging-curator5-rhel8@sha256:0b28415b8115ff3216002faa5c9ecf3c46995085e3364c8028cb544cb4787ed2_arm64",
"8Base-RHOL-5.4:openshift-logging/logging-curator5-rhel8@sha256:7016e867ddfe970d6d2d54d5615e8f613786bcfbfe52ebf3139c07da3d5a53db_s390x",
"8Base-RHOL-5.4:openshift-logging/logging-curator5-rhel8@sha256:94c435f45e9dbd9fa633e137356cfb1d6ac2d4dd7574b359367665da42d6203d_amd64",
"8Base-RHOL-5.4:openshift-logging/logging-curator5-rhel8@sha256:d24afbc9228ef7f3d0a6fd716a3a57abde88a1f65d149c7df4f959a775b670bd_ppc64le",
"8Base-RHOL-5.4:openshift-logging/logging-loki-rhel8@sha256:40d4989b4733f54a01a73831fa00b12e49fff69c75138902eac0d894d432e4d9_arm64",
"8Base-RHOL-5.4:openshift-logging/logging-loki-rhel8@sha256:b444af35118c24bde0dfa2a8825ba427b3345451f6081133477254213a3460f0_amd64",
"8Base-RHOL-5.4:openshift-logging/logging-loki-rhel8@sha256:cfe410d498940a95da631ea213866a96a119034d78d5d53f7f9c7e8da56e0f45_s390x",
"8Base-RHOL-5.4:openshift-logging/logging-loki-rhel8@sha256:f7979c82140a0ab1a97c9f3151465bfbd9f79c4db9b0cc20f974cd7b890f074f_ppc64le",
"8Base-RHOL-5.4:openshift-logging/loki-operator-bundle@sha256:02cceda51028eb55a3b82aa5275f03dbaf8f8f9ab3fd27c650d1a07a93044e37_amd64",
"8Base-RHOL-5.4:openshift-logging/loki-rhel8-operator@sha256:0f1be625b4012820f7ac439fed000808d7acb4e885ace16014461bf802be935a_s390x",
"8Base-RHOL-5.4:openshift-logging/loki-rhel8-operator@sha256:28f45a80846c5e11638fb479be42cafcb2bdb3af94dff3629a820de295cbe31d_ppc64le",
"8Base-RHOL-5.4:openshift-logging/loki-rhel8-operator@sha256:df7de1e9f5a4396df6f14b1c4b6bb2a9ae4bc50d82cbc954ec535c26e8df2cb1_arm64",
"8Base-RHOL-5.4:openshift-logging/loki-rhel8-operator@sha256:f8a35557c9eb27f703ffa9320a9d39a2361d93fdb0b8c874d97da458048e7eec_amd64",
"8Base-RHOL-5.4:openshift-logging/lokistack-gateway-rhel8@sha256:178fcf44e6a1fa90d27a40565f69ae2880622b017bc8d9e33a441353eb45609d_arm64",
"8Base-RHOL-5.4:openshift-logging/lokistack-gateway-rhel8@sha256:7b0c2c99cf0f710166b749dbfd7f544caf5fe35516c743fca251c7cec896e1d6_ppc64le",
"8Base-RHOL-5.4:openshift-logging/lokistack-gateway-rhel8@sha256:9c4959525339b607a98889d56f4c26f2e4af25032466c439903a7f1cb593f721_s390x",
"8Base-RHOL-5.4:openshift-logging/lokistack-gateway-rhel8@sha256:a967d5be7d3a6fdd75965a5f9a7396a52cdcb37d6a8521c440b0b5c650c230f2_amd64",
"8Base-RHOL-5.4:openshift-logging/opa-openshift-rhel8@sha256:1b106af51bb50f1ce4db13ebbf6f6c67eae45611c0d5dc46476f1dfaa8aca166_arm64",
"8Base-RHOL-5.4:openshift-logging/opa-openshift-rhel8@sha256:92ddf24824c8f8ae93dec07184c446615b635389472d3a525df72da07c8d9b97_ppc64le",
"8Base-RHOL-5.4:openshift-logging/opa-openshift-rhel8@sha256:9fd0c5df785564b35392705a479d6fb9245e3329719438c76c0282f9ef2f2d55_amd64",
"8Base-RHOL-5.4:openshift-logging/opa-openshift-rhel8@sha256:be8ba0e4c5f24c7b4549700a25c89b10d4b2fc0b0e3888163bb53827914e95c1_s390x",
"8Base-RHOL-5.4:openshift-logging/vector-rhel8@sha256:48bb136d11b44428c87489978873370848ac2b219b107ef7e81ab679db095234_s390x",
"8Base-RHOL-5.4:openshift-logging/vector-rhel8@sha256:48f0317d167710ff5b0787c73f6b7dd0249e7c8d2d001159132a97299c30b62d_ppc64le",
"8Base-RHOL-5.4:openshift-logging/vector-rhel8@sha256:bde21c03fb831d01e85b28245881f7e3f2bb2ef6d2671eb92b2e0cc4bd3898e2_arm64",
"8Base-RHOL-5.4:openshift-logging/vector-rhel8@sha256:cc6b9c6a344aac56c99c96b5120ffe2dad479000b34964ff89d030ae762bda43_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-32149"
},
{
"category": "external",
"summary": "RHBZ#2134010",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2134010"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-32149",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32149"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-32149",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-32149"
},
{
"category": "external",
"summary": "https://go.dev/issue/56152",
"url": "https://go.dev/issue/56152"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-dev/c/qfPIly0X7aU",
"url": "https://groups.google.com/g/golang-dev/c/qfPIly0X7aU"
}
],
"release_date": "2022-10-11T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-11-16T12:13:01+00:00",
"details": "For OpenShift Container Platform 4.10 see the following documentation, which will be updated shortly, for detailed release notes:\n\nhttps://docs.openshift.com/container-platform/4.10/logging/cluster-logging-release-notes.html\n\nFor Red Hat OpenShift Logging 5.4, see the following instructions to apply this update:\n\nhttps://docs.openshift.com/container-platform/4.10/logging/cluster-logging-upgrading.html",
"product_ids": [
"8Base-RHOL-5.4:openshift-logging/elasticsearch-proxy-rhel8@sha256:4f4e5bb267ad391bc0fc6a010ec9ecdf3bf48d5b6e9db0d2510960c13c97bd71_ppc64le",
"8Base-RHOL-5.4:openshift-logging/elasticsearch-proxy-rhel8@sha256:b9c2e58b39dc3de97013f8806178f6327bf2e4590fe55db144527d64d468f64f_s390x",
"8Base-RHOL-5.4:openshift-logging/elasticsearch-proxy-rhel8@sha256:c9a2b9e7cca14d9596ccbe0f64e2abe4452f91f029f42eefead43c9f526f6a58_arm64",
"8Base-RHOL-5.4:openshift-logging/elasticsearch-proxy-rhel8@sha256:e38c55762c1eef39b401c46d44c899067b1566173e1ce239f17a95c52b30d8c7_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:7435"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"8Base-RHOL-5.4:openshift-logging/cluster-logging-operator-bundle@sha256:cb26d9e55f781dd535901a90f1ec2f8e02e8e1de72c0fde638c90fcc228ec4b2_amd64",
"8Base-RHOL-5.4:openshift-logging/cluster-logging-rhel8-operator@sha256:617cc8b0011110981674b75fe1e3041bfa434c952e4a0193818b971edbc7a480_s390x",
"8Base-RHOL-5.4:openshift-logging/cluster-logging-rhel8-operator@sha256:637df49756fe85e7b38b279ffa7672d72c658d3d47df7f9dada2dd70563af83b_arm64",
"8Base-RHOL-5.4:openshift-logging/cluster-logging-rhel8-operator@sha256:aa1602fe2abe23bd8a4c791bc45d425686a6e6d1aab4face0fac28bfc7cebbe1_ppc64le",
"8Base-RHOL-5.4:openshift-logging/cluster-logging-rhel8-operator@sha256:c698b52c46d41007e5ac4f90b9540d430820bd20a93468fddd3a949c7ef5b332_amd64",
"8Base-RHOL-5.4:openshift-logging/elasticsearch-operator-bundle@sha256:7659606e0418a1920161b7ca67524ea6a7b1ed366b817f1a5cde0b346152243c_amd64",
"8Base-RHOL-5.4:openshift-logging/elasticsearch-proxy-rhel8@sha256:4f4e5bb267ad391bc0fc6a010ec9ecdf3bf48d5b6e9db0d2510960c13c97bd71_ppc64le",
"8Base-RHOL-5.4:openshift-logging/elasticsearch-proxy-rhel8@sha256:b9c2e58b39dc3de97013f8806178f6327bf2e4590fe55db144527d64d468f64f_s390x",
"8Base-RHOL-5.4:openshift-logging/elasticsearch-proxy-rhel8@sha256:c9a2b9e7cca14d9596ccbe0f64e2abe4452f91f029f42eefead43c9f526f6a58_arm64",
"8Base-RHOL-5.4:openshift-logging/elasticsearch-proxy-rhel8@sha256:e38c55762c1eef39b401c46d44c899067b1566173e1ce239f17a95c52b30d8c7_amd64",
"8Base-RHOL-5.4:openshift-logging/elasticsearch-rhel8-operator@sha256:2005f41e59a130bb86c2ec47d1b060e3e2ed32f9a4cef3897e2c05fc94043dbb_arm64",
"8Base-RHOL-5.4:openshift-logging/elasticsearch-rhel8-operator@sha256:6a55934cf7af0c03e06d4ec7a15a80acf53491fb7a183c16fdf8018fbf9b4174_ppc64le",
"8Base-RHOL-5.4:openshift-logging/elasticsearch-rhel8-operator@sha256:8ce04536772f31ad022b9c66cddc090d2962b44d66c06a1db56d1447be198326_amd64",
"8Base-RHOL-5.4:openshift-logging/elasticsearch-rhel8-operator@sha256:dd211d42eaad043d9bdb519e3ad6a86255b7280a2cdf47dd3fe0458a77cb110f_s390x",
"8Base-RHOL-5.4:openshift-logging/elasticsearch6-rhel8@sha256:17a9f3ae042b92693a374e3d60a07f2ab2e52419f8df25d446dd0654f6a858f6_ppc64le",
"8Base-RHOL-5.4:openshift-logging/elasticsearch6-rhel8@sha256:5b1cfc2f9a96601439cf17d1fe49a6bc6cad3b7273af87b23528090aefbfd915_s390x",
"8Base-RHOL-5.4:openshift-logging/elasticsearch6-rhel8@sha256:8e0ba10f91db4cb8786d0501ec33a3d54f7c7c5337e0495cc2286a6ea20cca20_arm64",
"8Base-RHOL-5.4:openshift-logging/elasticsearch6-rhel8@sha256:fa8182b69328077500f89becc7621b48efa8d99f34247c2e6855dcfec13980e3_amd64",
"8Base-RHOL-5.4:openshift-logging/eventrouter-rhel8@sha256:4438a3bba34418a9dc566bf15f6b4764de4295ab8b05a7b1a86f9e8cd332b3f7_arm64",
"8Base-RHOL-5.4:openshift-logging/eventrouter-rhel8@sha256:bc408fc4b0482c5eb1b0deb3a9090f3e3dd9b370001d54cd076254562c72fec9_ppc64le",
"8Base-RHOL-5.4:openshift-logging/eventrouter-rhel8@sha256:d50a2b89442d04b1163c01b3a3951857a95df76c57b14e7f51d835c3ac6d75b3_amd64",
"8Base-RHOL-5.4:openshift-logging/eventrouter-rhel8@sha256:f05aee8433dec1c9f6cf835038f9e5a47847d4095383bf3c22ca57c3fb69fa98_s390x",
"8Base-RHOL-5.4:openshift-logging/fluentd-rhel8@sha256:150e17cb645cf2f4cb7ab592572dd3abd145d9a33e790778280e256666248022_amd64",
"8Base-RHOL-5.4:openshift-logging/fluentd-rhel8@sha256:36aecf05ca3cdaf29982b3efa4a1c97087be29b0a58c9777e6b0c11a34861aa8_s390x",
"8Base-RHOL-5.4:openshift-logging/fluentd-rhel8@sha256:e3a51d2bdc632b8376e28c33e9d4fac3464e3a84a313a17246b1f1cf21cb5710_arm64",
"8Base-RHOL-5.4:openshift-logging/fluentd-rhel8@sha256:ea07da04f06df6bf0d9dd981a3795dfdb51eca83f59a6291114650e3e98a9e71_ppc64le",
"8Base-RHOL-5.4:openshift-logging/kibana6-rhel8@sha256:167ee6a645c7397bde3d12e9b9685279505c25ffb3bda11ae68bdf0b34229f2e_amd64",
"8Base-RHOL-5.4:openshift-logging/kibana6-rhel8@sha256:4a029733337b10bb9fb8d98c91abc5451ca0b98713c8f2271a675251e025b6c0_s390x",
"8Base-RHOL-5.4:openshift-logging/kibana6-rhel8@sha256:812f4380024dc3df42310ad14d173d390f2bdf4b3dbdb02550c00552534f79ce_ppc64le",
"8Base-RHOL-5.4:openshift-logging/kibana6-rhel8@sha256:958ba6856cc76fc77d34a9c78888eb37b9c39b83a2f044ef2337610560ba9323_arm64",
"8Base-RHOL-5.4:openshift-logging/log-file-metric-exporter-rhel8@sha256:043e4d3481fbfedf3115e18fade3a2f33b891b0d9a641bf973c2c7f492cb0489_amd64",
"8Base-RHOL-5.4:openshift-logging/log-file-metric-exporter-rhel8@sha256:4fe26adac10cf20b83812e4fa513231d7e1fd4b6cd4e09d4fd425c391885cfcc_ppc64le",
"8Base-RHOL-5.4:openshift-logging/log-file-metric-exporter-rhel8@sha256:85827db708c0927027435b05732cc7e34b0675eaa86665c91efacc76aecd6227_s390x",
"8Base-RHOL-5.4:openshift-logging/log-file-metric-exporter-rhel8@sha256:a5285db276a5545fdbaa9f0743a49ba72ce1c5da61b5cccc9422320a03e08bea_arm64",
"8Base-RHOL-5.4:openshift-logging/logging-curator5-rhel8@sha256:0b28415b8115ff3216002faa5c9ecf3c46995085e3364c8028cb544cb4787ed2_arm64",
"8Base-RHOL-5.4:openshift-logging/logging-curator5-rhel8@sha256:7016e867ddfe970d6d2d54d5615e8f613786bcfbfe52ebf3139c07da3d5a53db_s390x",
"8Base-RHOL-5.4:openshift-logging/logging-curator5-rhel8@sha256:94c435f45e9dbd9fa633e137356cfb1d6ac2d4dd7574b359367665da42d6203d_amd64",
"8Base-RHOL-5.4:openshift-logging/logging-curator5-rhel8@sha256:d24afbc9228ef7f3d0a6fd716a3a57abde88a1f65d149c7df4f959a775b670bd_ppc64le",
"8Base-RHOL-5.4:openshift-logging/logging-loki-rhel8@sha256:40d4989b4733f54a01a73831fa00b12e49fff69c75138902eac0d894d432e4d9_arm64",
"8Base-RHOL-5.4:openshift-logging/logging-loki-rhel8@sha256:b444af35118c24bde0dfa2a8825ba427b3345451f6081133477254213a3460f0_amd64",
"8Base-RHOL-5.4:openshift-logging/logging-loki-rhel8@sha256:cfe410d498940a95da631ea213866a96a119034d78d5d53f7f9c7e8da56e0f45_s390x",
"8Base-RHOL-5.4:openshift-logging/logging-loki-rhel8@sha256:f7979c82140a0ab1a97c9f3151465bfbd9f79c4db9b0cc20f974cd7b890f074f_ppc64le",
"8Base-RHOL-5.4:openshift-logging/loki-operator-bundle@sha256:02cceda51028eb55a3b82aa5275f03dbaf8f8f9ab3fd27c650d1a07a93044e37_amd64",
"8Base-RHOL-5.4:openshift-logging/loki-rhel8-operator@sha256:0f1be625b4012820f7ac439fed000808d7acb4e885ace16014461bf802be935a_s390x",
"8Base-RHOL-5.4:openshift-logging/loki-rhel8-operator@sha256:28f45a80846c5e11638fb479be42cafcb2bdb3af94dff3629a820de295cbe31d_ppc64le",
"8Base-RHOL-5.4:openshift-logging/loki-rhel8-operator@sha256:df7de1e9f5a4396df6f14b1c4b6bb2a9ae4bc50d82cbc954ec535c26e8df2cb1_arm64",
"8Base-RHOL-5.4:openshift-logging/loki-rhel8-operator@sha256:f8a35557c9eb27f703ffa9320a9d39a2361d93fdb0b8c874d97da458048e7eec_amd64",
"8Base-RHOL-5.4:openshift-logging/lokistack-gateway-rhel8@sha256:178fcf44e6a1fa90d27a40565f69ae2880622b017bc8d9e33a441353eb45609d_arm64",
"8Base-RHOL-5.4:openshift-logging/lokistack-gateway-rhel8@sha256:7b0c2c99cf0f710166b749dbfd7f544caf5fe35516c743fca251c7cec896e1d6_ppc64le",
"8Base-RHOL-5.4:openshift-logging/lokistack-gateway-rhel8@sha256:9c4959525339b607a98889d56f4c26f2e4af25032466c439903a7f1cb593f721_s390x",
"8Base-RHOL-5.4:openshift-logging/lokistack-gateway-rhel8@sha256:a967d5be7d3a6fdd75965a5f9a7396a52cdcb37d6a8521c440b0b5c650c230f2_amd64",
"8Base-RHOL-5.4:openshift-logging/opa-openshift-rhel8@sha256:1b106af51bb50f1ce4db13ebbf6f6c67eae45611c0d5dc46476f1dfaa8aca166_arm64",
"8Base-RHOL-5.4:openshift-logging/opa-openshift-rhel8@sha256:92ddf24824c8f8ae93dec07184c446615b635389472d3a525df72da07c8d9b97_ppc64le",
"8Base-RHOL-5.4:openshift-logging/opa-openshift-rhel8@sha256:9fd0c5df785564b35392705a479d6fb9245e3329719438c76c0282f9ef2f2d55_amd64",
"8Base-RHOL-5.4:openshift-logging/opa-openshift-rhel8@sha256:be8ba0e4c5f24c7b4549700a25c89b10d4b2fc0b0e3888163bb53827914e95c1_s390x",
"8Base-RHOL-5.4:openshift-logging/vector-rhel8@sha256:48bb136d11b44428c87489978873370848ac2b219b107ef7e81ab679db095234_s390x",
"8Base-RHOL-5.4:openshift-logging/vector-rhel8@sha256:48f0317d167710ff5b0787c73f6b7dd0249e7c8d2d001159132a97299c30b62d_ppc64le",
"8Base-RHOL-5.4:openshift-logging/vector-rhel8@sha256:bde21c03fb831d01e85b28245881f7e3f2bb2ef6d2671eb92b2e0cc4bd3898e2_arm64",
"8Base-RHOL-5.4:openshift-logging/vector-rhel8@sha256:cc6b9c6a344aac56c99c96b5120ffe2dad479000b34964ff89d030ae762bda43_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "golang: golang.org/x/text/language: ParseAcceptLanguage takes a long time to parse complex tags"
},
{
"cve": "CVE-2022-42003",
"cwe": {
"id": "CWE-502",
"name": "Deserialization of Untrusted Data"
},
"discovery_date": "2022-10-17T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-RHOL-5.4:openshift-logging/cluster-logging-operator-bundle@sha256:cb26d9e55f781dd535901a90f1ec2f8e02e8e1de72c0fde638c90fcc228ec4b2_amd64",
"8Base-RHOL-5.4:openshift-logging/cluster-logging-rhel8-operator@sha256:617cc8b0011110981674b75fe1e3041bfa434c952e4a0193818b971edbc7a480_s390x",
"8Base-RHOL-5.4:openshift-logging/cluster-logging-rhel8-operator@sha256:637df49756fe85e7b38b279ffa7672d72c658d3d47df7f9dada2dd70563af83b_arm64",
"8Base-RHOL-5.4:openshift-logging/cluster-logging-rhel8-operator@sha256:aa1602fe2abe23bd8a4c791bc45d425686a6e6d1aab4face0fac28bfc7cebbe1_ppc64le",
"8Base-RHOL-5.4:openshift-logging/cluster-logging-rhel8-operator@sha256:c698b52c46d41007e5ac4f90b9540d430820bd20a93468fddd3a949c7ef5b332_amd64",
"8Base-RHOL-5.4:openshift-logging/eventrouter-rhel8@sha256:4438a3bba34418a9dc566bf15f6b4764de4295ab8b05a7b1a86f9e8cd332b3f7_arm64",
"8Base-RHOL-5.4:openshift-logging/eventrouter-rhel8@sha256:bc408fc4b0482c5eb1b0deb3a9090f3e3dd9b370001d54cd076254562c72fec9_ppc64le",
"8Base-RHOL-5.4:openshift-logging/eventrouter-rhel8@sha256:d50a2b89442d04b1163c01b3a3951857a95df76c57b14e7f51d835c3ac6d75b3_amd64",
"8Base-RHOL-5.4:openshift-logging/eventrouter-rhel8@sha256:f05aee8433dec1c9f6cf835038f9e5a47847d4095383bf3c22ca57c3fb69fa98_s390x",
"8Base-RHOL-5.4:openshift-logging/fluentd-rhel8@sha256:150e17cb645cf2f4cb7ab592572dd3abd145d9a33e790778280e256666248022_amd64",
"8Base-RHOL-5.4:openshift-logging/fluentd-rhel8@sha256:36aecf05ca3cdaf29982b3efa4a1c97087be29b0a58c9777e6b0c11a34861aa8_s390x",
"8Base-RHOL-5.4:openshift-logging/fluentd-rhel8@sha256:e3a51d2bdc632b8376e28c33e9d4fac3464e3a84a313a17246b1f1cf21cb5710_arm64",
"8Base-RHOL-5.4:openshift-logging/fluentd-rhel8@sha256:ea07da04f06df6bf0d9dd981a3795dfdb51eca83f59a6291114650e3e98a9e71_ppc64le",
"8Base-RHOL-5.4:openshift-logging/kibana6-rhel8@sha256:167ee6a645c7397bde3d12e9b9685279505c25ffb3bda11ae68bdf0b34229f2e_amd64",
"8Base-RHOL-5.4:openshift-logging/kibana6-rhel8@sha256:4a029733337b10bb9fb8d98c91abc5451ca0b98713c8f2271a675251e025b6c0_s390x",
"8Base-RHOL-5.4:openshift-logging/kibana6-rhel8@sha256:812f4380024dc3df42310ad14d173d390f2bdf4b3dbdb02550c00552534f79ce_ppc64le",
"8Base-RHOL-5.4:openshift-logging/kibana6-rhel8@sha256:958ba6856cc76fc77d34a9c78888eb37b9c39b83a2f044ef2337610560ba9323_arm64",
"8Base-RHOL-5.4:openshift-logging/log-file-metric-exporter-rhel8@sha256:043e4d3481fbfedf3115e18fade3a2f33b891b0d9a641bf973c2c7f492cb0489_amd64",
"8Base-RHOL-5.4:openshift-logging/log-file-metric-exporter-rhel8@sha256:4fe26adac10cf20b83812e4fa513231d7e1fd4b6cd4e09d4fd425c391885cfcc_ppc64le",
"8Base-RHOL-5.4:openshift-logging/log-file-metric-exporter-rhel8@sha256:85827db708c0927027435b05732cc7e34b0675eaa86665c91efacc76aecd6227_s390x",
"8Base-RHOL-5.4:openshift-logging/log-file-metric-exporter-rhel8@sha256:a5285db276a5545fdbaa9f0743a49ba72ce1c5da61b5cccc9422320a03e08bea_arm64",
"8Base-RHOL-5.4:openshift-logging/logging-curator5-rhel8@sha256:0b28415b8115ff3216002faa5c9ecf3c46995085e3364c8028cb544cb4787ed2_arm64",
"8Base-RHOL-5.4:openshift-logging/logging-curator5-rhel8@sha256:7016e867ddfe970d6d2d54d5615e8f613786bcfbfe52ebf3139c07da3d5a53db_s390x",
"8Base-RHOL-5.4:openshift-logging/logging-curator5-rhel8@sha256:94c435f45e9dbd9fa633e137356cfb1d6ac2d4dd7574b359367665da42d6203d_amd64",
"8Base-RHOL-5.4:openshift-logging/logging-curator5-rhel8@sha256:d24afbc9228ef7f3d0a6fd716a3a57abde88a1f65d149c7df4f959a775b670bd_ppc64le",
"8Base-RHOL-5.4:openshift-logging/logging-loki-rhel8@sha256:40d4989b4733f54a01a73831fa00b12e49fff69c75138902eac0d894d432e4d9_arm64",
"8Base-RHOL-5.4:openshift-logging/logging-loki-rhel8@sha256:b444af35118c24bde0dfa2a8825ba427b3345451f6081133477254213a3460f0_amd64",
"8Base-RHOL-5.4:openshift-logging/logging-loki-rhel8@sha256:cfe410d498940a95da631ea213866a96a119034d78d5d53f7f9c7e8da56e0f45_s390x",
"8Base-RHOL-5.4:openshift-logging/logging-loki-rhel8@sha256:f7979c82140a0ab1a97c9f3151465bfbd9f79c4db9b0cc20f974cd7b890f074f_ppc64le",
"8Base-RHOL-5.4:openshift-logging/loki-operator-bundle@sha256:02cceda51028eb55a3b82aa5275f03dbaf8f8f9ab3fd27c650d1a07a93044e37_amd64",
"8Base-RHOL-5.4:openshift-logging/loki-rhel8-operator@sha256:0f1be625b4012820f7ac439fed000808d7acb4e885ace16014461bf802be935a_s390x",
"8Base-RHOL-5.4:openshift-logging/loki-rhel8-operator@sha256:28f45a80846c5e11638fb479be42cafcb2bdb3af94dff3629a820de295cbe31d_ppc64le",
"8Base-RHOL-5.4:openshift-logging/loki-rhel8-operator@sha256:df7de1e9f5a4396df6f14b1c4b6bb2a9ae4bc50d82cbc954ec535c26e8df2cb1_arm64",
"8Base-RHOL-5.4:openshift-logging/loki-rhel8-operator@sha256:f8a35557c9eb27f703ffa9320a9d39a2361d93fdb0b8c874d97da458048e7eec_amd64",
"8Base-RHOL-5.4:openshift-logging/lokistack-gateway-rhel8@sha256:178fcf44e6a1fa90d27a40565f69ae2880622b017bc8d9e33a441353eb45609d_arm64",
"8Base-RHOL-5.4:openshift-logging/lokistack-gateway-rhel8@sha256:7b0c2c99cf0f710166b749dbfd7f544caf5fe35516c743fca251c7cec896e1d6_ppc64le",
"8Base-RHOL-5.4:openshift-logging/lokistack-gateway-rhel8@sha256:9c4959525339b607a98889d56f4c26f2e4af25032466c439903a7f1cb593f721_s390x",
"8Base-RHOL-5.4:openshift-logging/lokistack-gateway-rhel8@sha256:a967d5be7d3a6fdd75965a5f9a7396a52cdcb37d6a8521c440b0b5c650c230f2_amd64",
"8Base-RHOL-5.4:openshift-logging/opa-openshift-rhel8@sha256:1b106af51bb50f1ce4db13ebbf6f6c67eae45611c0d5dc46476f1dfaa8aca166_arm64",
"8Base-RHOL-5.4:openshift-logging/opa-openshift-rhel8@sha256:92ddf24824c8f8ae93dec07184c446615b635389472d3a525df72da07c8d9b97_ppc64le",
"8Base-RHOL-5.4:openshift-logging/opa-openshift-rhel8@sha256:9fd0c5df785564b35392705a479d6fb9245e3329719438c76c0282f9ef2f2d55_amd64",
"8Base-RHOL-5.4:openshift-logging/opa-openshift-rhel8@sha256:be8ba0e4c5f24c7b4549700a25c89b10d4b2fc0b0e3888163bb53827914e95c1_s390x",
"8Base-RHOL-5.4:openshift-logging/vector-rhel8@sha256:48bb136d11b44428c87489978873370848ac2b219b107ef7e81ab679db095234_s390x",
"8Base-RHOL-5.4:openshift-logging/vector-rhel8@sha256:48f0317d167710ff5b0787c73f6b7dd0249e7c8d2d001159132a97299c30b62d_ppc64le",
"8Base-RHOL-5.4:openshift-logging/vector-rhel8@sha256:bde21c03fb831d01e85b28245881f7e3f2bb2ef6d2671eb92b2e0cc4bd3898e2_arm64",
"8Base-RHOL-5.4:openshift-logging/vector-rhel8@sha256:cc6b9c6a344aac56c99c96b5120ffe2dad479000b34964ff89d030ae762bda43_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2135244"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in FasterXML jackson-databind. This issue could allow an attacker to benefit from resource exhaustion when the UNWRAP_SINGLE_VALUE_ARRAYS feature is enabled due to unchecked primitive value deserializers to avoid deep wrapper array nesting.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "jackson-databind: deep wrapper array nesting wrt UNWRAP_SINGLE_VALUE_ARRAYS",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-RHOL-5.4:openshift-logging/elasticsearch-operator-bundle@sha256:7659606e0418a1920161b7ca67524ea6a7b1ed366b817f1a5cde0b346152243c_amd64",
"8Base-RHOL-5.4:openshift-logging/elasticsearch-proxy-rhel8@sha256:4f4e5bb267ad391bc0fc6a010ec9ecdf3bf48d5b6e9db0d2510960c13c97bd71_ppc64le",
"8Base-RHOL-5.4:openshift-logging/elasticsearch-proxy-rhel8@sha256:b9c2e58b39dc3de97013f8806178f6327bf2e4590fe55db144527d64d468f64f_s390x",
"8Base-RHOL-5.4:openshift-logging/elasticsearch-proxy-rhel8@sha256:c9a2b9e7cca14d9596ccbe0f64e2abe4452f91f029f42eefead43c9f526f6a58_arm64",
"8Base-RHOL-5.4:openshift-logging/elasticsearch-proxy-rhel8@sha256:e38c55762c1eef39b401c46d44c899067b1566173e1ce239f17a95c52b30d8c7_amd64",
"8Base-RHOL-5.4:openshift-logging/elasticsearch-rhel8-operator@sha256:2005f41e59a130bb86c2ec47d1b060e3e2ed32f9a4cef3897e2c05fc94043dbb_arm64",
"8Base-RHOL-5.4:openshift-logging/elasticsearch-rhel8-operator@sha256:6a55934cf7af0c03e06d4ec7a15a80acf53491fb7a183c16fdf8018fbf9b4174_ppc64le",
"8Base-RHOL-5.4:openshift-logging/elasticsearch-rhel8-operator@sha256:8ce04536772f31ad022b9c66cddc090d2962b44d66c06a1db56d1447be198326_amd64",
"8Base-RHOL-5.4:openshift-logging/elasticsearch-rhel8-operator@sha256:dd211d42eaad043d9bdb519e3ad6a86255b7280a2cdf47dd3fe0458a77cb110f_s390x",
"8Base-RHOL-5.4:openshift-logging/elasticsearch6-rhel8@sha256:17a9f3ae042b92693a374e3d60a07f2ab2e52419f8df25d446dd0654f6a858f6_ppc64le",
"8Base-RHOL-5.4:openshift-logging/elasticsearch6-rhel8@sha256:5b1cfc2f9a96601439cf17d1fe49a6bc6cad3b7273af87b23528090aefbfd915_s390x",
"8Base-RHOL-5.4:openshift-logging/elasticsearch6-rhel8@sha256:8e0ba10f91db4cb8786d0501ec33a3d54f7c7c5337e0495cc2286a6ea20cca20_arm64",
"8Base-RHOL-5.4:openshift-logging/elasticsearch6-rhel8@sha256:fa8182b69328077500f89becc7621b48efa8d99f34247c2e6855dcfec13980e3_amd64"
],
"known_not_affected": [
"8Base-RHOL-5.4:openshift-logging/cluster-logging-operator-bundle@sha256:cb26d9e55f781dd535901a90f1ec2f8e02e8e1de72c0fde638c90fcc228ec4b2_amd64",
"8Base-RHOL-5.4:openshift-logging/cluster-logging-rhel8-operator@sha256:617cc8b0011110981674b75fe1e3041bfa434c952e4a0193818b971edbc7a480_s390x",
"8Base-RHOL-5.4:openshift-logging/cluster-logging-rhel8-operator@sha256:637df49756fe85e7b38b279ffa7672d72c658d3d47df7f9dada2dd70563af83b_arm64",
"8Base-RHOL-5.4:openshift-logging/cluster-logging-rhel8-operator@sha256:aa1602fe2abe23bd8a4c791bc45d425686a6e6d1aab4face0fac28bfc7cebbe1_ppc64le",
"8Base-RHOL-5.4:openshift-logging/cluster-logging-rhel8-operator@sha256:c698b52c46d41007e5ac4f90b9540d430820bd20a93468fddd3a949c7ef5b332_amd64",
"8Base-RHOL-5.4:openshift-logging/eventrouter-rhel8@sha256:4438a3bba34418a9dc566bf15f6b4764de4295ab8b05a7b1a86f9e8cd332b3f7_arm64",
"8Base-RHOL-5.4:openshift-logging/eventrouter-rhel8@sha256:bc408fc4b0482c5eb1b0deb3a9090f3e3dd9b370001d54cd076254562c72fec9_ppc64le",
"8Base-RHOL-5.4:openshift-logging/eventrouter-rhel8@sha256:d50a2b89442d04b1163c01b3a3951857a95df76c57b14e7f51d835c3ac6d75b3_amd64",
"8Base-RHOL-5.4:openshift-logging/eventrouter-rhel8@sha256:f05aee8433dec1c9f6cf835038f9e5a47847d4095383bf3c22ca57c3fb69fa98_s390x",
"8Base-RHOL-5.4:openshift-logging/fluentd-rhel8@sha256:150e17cb645cf2f4cb7ab592572dd3abd145d9a33e790778280e256666248022_amd64",
"8Base-RHOL-5.4:openshift-logging/fluentd-rhel8@sha256:36aecf05ca3cdaf29982b3efa4a1c97087be29b0a58c9777e6b0c11a34861aa8_s390x",
"8Base-RHOL-5.4:openshift-logging/fluentd-rhel8@sha256:e3a51d2bdc632b8376e28c33e9d4fac3464e3a84a313a17246b1f1cf21cb5710_arm64",
"8Base-RHOL-5.4:openshift-logging/fluentd-rhel8@sha256:ea07da04f06df6bf0d9dd981a3795dfdb51eca83f59a6291114650e3e98a9e71_ppc64le",
"8Base-RHOL-5.4:openshift-logging/kibana6-rhel8@sha256:167ee6a645c7397bde3d12e9b9685279505c25ffb3bda11ae68bdf0b34229f2e_amd64",
"8Base-RHOL-5.4:openshift-logging/kibana6-rhel8@sha256:4a029733337b10bb9fb8d98c91abc5451ca0b98713c8f2271a675251e025b6c0_s390x",
"8Base-RHOL-5.4:openshift-logging/kibana6-rhel8@sha256:812f4380024dc3df42310ad14d173d390f2bdf4b3dbdb02550c00552534f79ce_ppc64le",
"8Base-RHOL-5.4:openshift-logging/kibana6-rhel8@sha256:958ba6856cc76fc77d34a9c78888eb37b9c39b83a2f044ef2337610560ba9323_arm64",
"8Base-RHOL-5.4:openshift-logging/log-file-metric-exporter-rhel8@sha256:043e4d3481fbfedf3115e18fade3a2f33b891b0d9a641bf973c2c7f492cb0489_amd64",
"8Base-RHOL-5.4:openshift-logging/log-file-metric-exporter-rhel8@sha256:4fe26adac10cf20b83812e4fa513231d7e1fd4b6cd4e09d4fd425c391885cfcc_ppc64le",
"8Base-RHOL-5.4:openshift-logging/log-file-metric-exporter-rhel8@sha256:85827db708c0927027435b05732cc7e34b0675eaa86665c91efacc76aecd6227_s390x",
"8Base-RHOL-5.4:openshift-logging/log-file-metric-exporter-rhel8@sha256:a5285db276a5545fdbaa9f0743a49ba72ce1c5da61b5cccc9422320a03e08bea_arm64",
"8Base-RHOL-5.4:openshift-logging/logging-curator5-rhel8@sha256:0b28415b8115ff3216002faa5c9ecf3c46995085e3364c8028cb544cb4787ed2_arm64",
"8Base-RHOL-5.4:openshift-logging/logging-curator5-rhel8@sha256:7016e867ddfe970d6d2d54d5615e8f613786bcfbfe52ebf3139c07da3d5a53db_s390x",
"8Base-RHOL-5.4:openshift-logging/logging-curator5-rhel8@sha256:94c435f45e9dbd9fa633e137356cfb1d6ac2d4dd7574b359367665da42d6203d_amd64",
"8Base-RHOL-5.4:openshift-logging/logging-curator5-rhel8@sha256:d24afbc9228ef7f3d0a6fd716a3a57abde88a1f65d149c7df4f959a775b670bd_ppc64le",
"8Base-RHOL-5.4:openshift-logging/logging-loki-rhel8@sha256:40d4989b4733f54a01a73831fa00b12e49fff69c75138902eac0d894d432e4d9_arm64",
"8Base-RHOL-5.4:openshift-logging/logging-loki-rhel8@sha256:b444af35118c24bde0dfa2a8825ba427b3345451f6081133477254213a3460f0_amd64",
"8Base-RHOL-5.4:openshift-logging/logging-loki-rhel8@sha256:cfe410d498940a95da631ea213866a96a119034d78d5d53f7f9c7e8da56e0f45_s390x",
"8Base-RHOL-5.4:openshift-logging/logging-loki-rhel8@sha256:f7979c82140a0ab1a97c9f3151465bfbd9f79c4db9b0cc20f974cd7b890f074f_ppc64le",
"8Base-RHOL-5.4:openshift-logging/loki-operator-bundle@sha256:02cceda51028eb55a3b82aa5275f03dbaf8f8f9ab3fd27c650d1a07a93044e37_amd64",
"8Base-RHOL-5.4:openshift-logging/loki-rhel8-operator@sha256:0f1be625b4012820f7ac439fed000808d7acb4e885ace16014461bf802be935a_s390x",
"8Base-RHOL-5.4:openshift-logging/loki-rhel8-operator@sha256:28f45a80846c5e11638fb479be42cafcb2bdb3af94dff3629a820de295cbe31d_ppc64le",
"8Base-RHOL-5.4:openshift-logging/loki-rhel8-operator@sha256:df7de1e9f5a4396df6f14b1c4b6bb2a9ae4bc50d82cbc954ec535c26e8df2cb1_arm64",
"8Base-RHOL-5.4:openshift-logging/loki-rhel8-operator@sha256:f8a35557c9eb27f703ffa9320a9d39a2361d93fdb0b8c874d97da458048e7eec_amd64",
"8Base-RHOL-5.4:openshift-logging/lokistack-gateway-rhel8@sha256:178fcf44e6a1fa90d27a40565f69ae2880622b017bc8d9e33a441353eb45609d_arm64",
"8Base-RHOL-5.4:openshift-logging/lokistack-gateway-rhel8@sha256:7b0c2c99cf0f710166b749dbfd7f544caf5fe35516c743fca251c7cec896e1d6_ppc64le",
"8Base-RHOL-5.4:openshift-logging/lokistack-gateway-rhel8@sha256:9c4959525339b607a98889d56f4c26f2e4af25032466c439903a7f1cb593f721_s390x",
"8Base-RHOL-5.4:openshift-logging/lokistack-gateway-rhel8@sha256:a967d5be7d3a6fdd75965a5f9a7396a52cdcb37d6a8521c440b0b5c650c230f2_amd64",
"8Base-RHOL-5.4:openshift-logging/opa-openshift-rhel8@sha256:1b106af51bb50f1ce4db13ebbf6f6c67eae45611c0d5dc46476f1dfaa8aca166_arm64",
"8Base-RHOL-5.4:openshift-logging/opa-openshift-rhel8@sha256:92ddf24824c8f8ae93dec07184c446615b635389472d3a525df72da07c8d9b97_ppc64le",
"8Base-RHOL-5.4:openshift-logging/opa-openshift-rhel8@sha256:9fd0c5df785564b35392705a479d6fb9245e3329719438c76c0282f9ef2f2d55_amd64",
"8Base-RHOL-5.4:openshift-logging/opa-openshift-rhel8@sha256:be8ba0e4c5f24c7b4549700a25c89b10d4b2fc0b0e3888163bb53827914e95c1_s390x",
"8Base-RHOL-5.4:openshift-logging/vector-rhel8@sha256:48bb136d11b44428c87489978873370848ac2b219b107ef7e81ab679db095234_s390x",
"8Base-RHOL-5.4:openshift-logging/vector-rhel8@sha256:48f0317d167710ff5b0787c73f6b7dd0249e7c8d2d001159132a97299c30b62d_ppc64le",
"8Base-RHOL-5.4:openshift-logging/vector-rhel8@sha256:bde21c03fb831d01e85b28245881f7e3f2bb2ef6d2671eb92b2e0cc4bd3898e2_arm64",
"8Base-RHOL-5.4:openshift-logging/vector-rhel8@sha256:cc6b9c6a344aac56c99c96b5120ffe2dad479000b34964ff89d030ae762bda43_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-42003"
},
{
"category": "external",
"summary": "RHBZ#2135244",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2135244"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-42003",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42003"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-42003",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-42003"
}
],
"release_date": "2022-10-02T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-11-16T12:13:01+00:00",
"details": "For OpenShift Container Platform 4.10 see the following documentation, which will be updated shortly, for detailed release notes:\n\nhttps://docs.openshift.com/container-platform/4.10/logging/cluster-logging-release-notes.html\n\nFor Red Hat OpenShift Logging 5.4, see the following instructions to apply this update:\n\nhttps://docs.openshift.com/container-platform/4.10/logging/cluster-logging-upgrading.html",
"product_ids": [
"8Base-RHOL-5.4:openshift-logging/elasticsearch-operator-bundle@sha256:7659606e0418a1920161b7ca67524ea6a7b1ed366b817f1a5cde0b346152243c_amd64",
"8Base-RHOL-5.4:openshift-logging/elasticsearch-proxy-rhel8@sha256:4f4e5bb267ad391bc0fc6a010ec9ecdf3bf48d5b6e9db0d2510960c13c97bd71_ppc64le",
"8Base-RHOL-5.4:openshift-logging/elasticsearch-proxy-rhel8@sha256:b9c2e58b39dc3de97013f8806178f6327bf2e4590fe55db144527d64d468f64f_s390x",
"8Base-RHOL-5.4:openshift-logging/elasticsearch-proxy-rhel8@sha256:c9a2b9e7cca14d9596ccbe0f64e2abe4452f91f029f42eefead43c9f526f6a58_arm64",
"8Base-RHOL-5.4:openshift-logging/elasticsearch-proxy-rhel8@sha256:e38c55762c1eef39b401c46d44c899067b1566173e1ce239f17a95c52b30d8c7_amd64",
"8Base-RHOL-5.4:openshift-logging/elasticsearch-rhel8-operator@sha256:2005f41e59a130bb86c2ec47d1b060e3e2ed32f9a4cef3897e2c05fc94043dbb_arm64",
"8Base-RHOL-5.4:openshift-logging/elasticsearch-rhel8-operator@sha256:6a55934cf7af0c03e06d4ec7a15a80acf53491fb7a183c16fdf8018fbf9b4174_ppc64le",
"8Base-RHOL-5.4:openshift-logging/elasticsearch-rhel8-operator@sha256:8ce04536772f31ad022b9c66cddc090d2962b44d66c06a1db56d1447be198326_amd64",
"8Base-RHOL-5.4:openshift-logging/elasticsearch-rhel8-operator@sha256:dd211d42eaad043d9bdb519e3ad6a86255b7280a2cdf47dd3fe0458a77cb110f_s390x",
"8Base-RHOL-5.4:openshift-logging/elasticsearch6-rhel8@sha256:17a9f3ae042b92693a374e3d60a07f2ab2e52419f8df25d446dd0654f6a858f6_ppc64le",
"8Base-RHOL-5.4:openshift-logging/elasticsearch6-rhel8@sha256:5b1cfc2f9a96601439cf17d1fe49a6bc6cad3b7273af87b23528090aefbfd915_s390x",
"8Base-RHOL-5.4:openshift-logging/elasticsearch6-rhel8@sha256:8e0ba10f91db4cb8786d0501ec33a3d54f7c7c5337e0495cc2286a6ea20cca20_arm64",
"8Base-RHOL-5.4:openshift-logging/elasticsearch6-rhel8@sha256:fa8182b69328077500f89becc7621b48efa8d99f34247c2e6855dcfec13980e3_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:7435"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"8Base-RHOL-5.4:openshift-logging/cluster-logging-operator-bundle@sha256:cb26d9e55f781dd535901a90f1ec2f8e02e8e1de72c0fde638c90fcc228ec4b2_amd64",
"8Base-RHOL-5.4:openshift-logging/cluster-logging-rhel8-operator@sha256:617cc8b0011110981674b75fe1e3041bfa434c952e4a0193818b971edbc7a480_s390x",
"8Base-RHOL-5.4:openshift-logging/cluster-logging-rhel8-operator@sha256:637df49756fe85e7b38b279ffa7672d72c658d3d47df7f9dada2dd70563af83b_arm64",
"8Base-RHOL-5.4:openshift-logging/cluster-logging-rhel8-operator@sha256:aa1602fe2abe23bd8a4c791bc45d425686a6e6d1aab4face0fac28bfc7cebbe1_ppc64le",
"8Base-RHOL-5.4:openshift-logging/cluster-logging-rhel8-operator@sha256:c698b52c46d41007e5ac4f90b9540d430820bd20a93468fddd3a949c7ef5b332_amd64",
"8Base-RHOL-5.4:openshift-logging/elasticsearch-operator-bundle@sha256:7659606e0418a1920161b7ca67524ea6a7b1ed366b817f1a5cde0b346152243c_amd64",
"8Base-RHOL-5.4:openshift-logging/elasticsearch-proxy-rhel8@sha256:4f4e5bb267ad391bc0fc6a010ec9ecdf3bf48d5b6e9db0d2510960c13c97bd71_ppc64le",
"8Base-RHOL-5.4:openshift-logging/elasticsearch-proxy-rhel8@sha256:b9c2e58b39dc3de97013f8806178f6327bf2e4590fe55db144527d64d468f64f_s390x",
"8Base-RHOL-5.4:openshift-logging/elasticsearch-proxy-rhel8@sha256:c9a2b9e7cca14d9596ccbe0f64e2abe4452f91f029f42eefead43c9f526f6a58_arm64",
"8Base-RHOL-5.4:openshift-logging/elasticsearch-proxy-rhel8@sha256:e38c55762c1eef39b401c46d44c899067b1566173e1ce239f17a95c52b30d8c7_amd64",
"8Base-RHOL-5.4:openshift-logging/elasticsearch-rhel8-operator@sha256:2005f41e59a130bb86c2ec47d1b060e3e2ed32f9a4cef3897e2c05fc94043dbb_arm64",
"8Base-RHOL-5.4:openshift-logging/elasticsearch-rhel8-operator@sha256:6a55934cf7af0c03e06d4ec7a15a80acf53491fb7a183c16fdf8018fbf9b4174_ppc64le",
"8Base-RHOL-5.4:openshift-logging/elasticsearch-rhel8-operator@sha256:8ce04536772f31ad022b9c66cddc090d2962b44d66c06a1db56d1447be198326_amd64",
"8Base-RHOL-5.4:openshift-logging/elasticsearch-rhel8-operator@sha256:dd211d42eaad043d9bdb519e3ad6a86255b7280a2cdf47dd3fe0458a77cb110f_s390x",
"8Base-RHOL-5.4:openshift-logging/elasticsearch6-rhel8@sha256:17a9f3ae042b92693a374e3d60a07f2ab2e52419f8df25d446dd0654f6a858f6_ppc64le",
"8Base-RHOL-5.4:openshift-logging/elasticsearch6-rhel8@sha256:5b1cfc2f9a96601439cf17d1fe49a6bc6cad3b7273af87b23528090aefbfd915_s390x",
"8Base-RHOL-5.4:openshift-logging/elasticsearch6-rhel8@sha256:8e0ba10f91db4cb8786d0501ec33a3d54f7c7c5337e0495cc2286a6ea20cca20_arm64",
"8Base-RHOL-5.4:openshift-logging/elasticsearch6-rhel8@sha256:fa8182b69328077500f89becc7621b48efa8d99f34247c2e6855dcfec13980e3_amd64",
"8Base-RHOL-5.4:openshift-logging/eventrouter-rhel8@sha256:4438a3bba34418a9dc566bf15f6b4764de4295ab8b05a7b1a86f9e8cd332b3f7_arm64",
"8Base-RHOL-5.4:openshift-logging/eventrouter-rhel8@sha256:bc408fc4b0482c5eb1b0deb3a9090f3e3dd9b370001d54cd076254562c72fec9_ppc64le",
"8Base-RHOL-5.4:openshift-logging/eventrouter-rhel8@sha256:d50a2b89442d04b1163c01b3a3951857a95df76c57b14e7f51d835c3ac6d75b3_amd64",
"8Base-RHOL-5.4:openshift-logging/eventrouter-rhel8@sha256:f05aee8433dec1c9f6cf835038f9e5a47847d4095383bf3c22ca57c3fb69fa98_s390x",
"8Base-RHOL-5.4:openshift-logging/fluentd-rhel8@sha256:150e17cb645cf2f4cb7ab592572dd3abd145d9a33e790778280e256666248022_amd64",
"8Base-RHOL-5.4:openshift-logging/fluentd-rhel8@sha256:36aecf05ca3cdaf29982b3efa4a1c97087be29b0a58c9777e6b0c11a34861aa8_s390x",
"8Base-RHOL-5.4:openshift-logging/fluentd-rhel8@sha256:e3a51d2bdc632b8376e28c33e9d4fac3464e3a84a313a17246b1f1cf21cb5710_arm64",
"8Base-RHOL-5.4:openshift-logging/fluentd-rhel8@sha256:ea07da04f06df6bf0d9dd981a3795dfdb51eca83f59a6291114650e3e98a9e71_ppc64le",
"8Base-RHOL-5.4:openshift-logging/kibana6-rhel8@sha256:167ee6a645c7397bde3d12e9b9685279505c25ffb3bda11ae68bdf0b34229f2e_amd64",
"8Base-RHOL-5.4:openshift-logging/kibana6-rhel8@sha256:4a029733337b10bb9fb8d98c91abc5451ca0b98713c8f2271a675251e025b6c0_s390x",
"8Base-RHOL-5.4:openshift-logging/kibana6-rhel8@sha256:812f4380024dc3df42310ad14d173d390f2bdf4b3dbdb02550c00552534f79ce_ppc64le",
"8Base-RHOL-5.4:openshift-logging/kibana6-rhel8@sha256:958ba6856cc76fc77d34a9c78888eb37b9c39b83a2f044ef2337610560ba9323_arm64",
"8Base-RHOL-5.4:openshift-logging/log-file-metric-exporter-rhel8@sha256:043e4d3481fbfedf3115e18fade3a2f33b891b0d9a641bf973c2c7f492cb0489_amd64",
"8Base-RHOL-5.4:openshift-logging/log-file-metric-exporter-rhel8@sha256:4fe26adac10cf20b83812e4fa513231d7e1fd4b6cd4e09d4fd425c391885cfcc_ppc64le",
"8Base-RHOL-5.4:openshift-logging/log-file-metric-exporter-rhel8@sha256:85827db708c0927027435b05732cc7e34b0675eaa86665c91efacc76aecd6227_s390x",
"8Base-RHOL-5.4:openshift-logging/log-file-metric-exporter-rhel8@sha256:a5285db276a5545fdbaa9f0743a49ba72ce1c5da61b5cccc9422320a03e08bea_arm64",
"8Base-RHOL-5.4:openshift-logging/logging-curator5-rhel8@sha256:0b28415b8115ff3216002faa5c9ecf3c46995085e3364c8028cb544cb4787ed2_arm64",
"8Base-RHOL-5.4:openshift-logging/logging-curator5-rhel8@sha256:7016e867ddfe970d6d2d54d5615e8f613786bcfbfe52ebf3139c07da3d5a53db_s390x",
"8Base-RHOL-5.4:openshift-logging/logging-curator5-rhel8@sha256:94c435f45e9dbd9fa633e137356cfb1d6ac2d4dd7574b359367665da42d6203d_amd64",
"8Base-RHOL-5.4:openshift-logging/logging-curator5-rhel8@sha256:d24afbc9228ef7f3d0a6fd716a3a57abde88a1f65d149c7df4f959a775b670bd_ppc64le",
"8Base-RHOL-5.4:openshift-logging/logging-loki-rhel8@sha256:40d4989b4733f54a01a73831fa00b12e49fff69c75138902eac0d894d432e4d9_arm64",
"8Base-RHOL-5.4:openshift-logging/logging-loki-rhel8@sha256:b444af35118c24bde0dfa2a8825ba427b3345451f6081133477254213a3460f0_amd64",
"8Base-RHOL-5.4:openshift-logging/logging-loki-rhel8@sha256:cfe410d498940a95da631ea213866a96a119034d78d5d53f7f9c7e8da56e0f45_s390x",
"8Base-RHOL-5.4:openshift-logging/logging-loki-rhel8@sha256:f7979c82140a0ab1a97c9f3151465bfbd9f79c4db9b0cc20f974cd7b890f074f_ppc64le",
"8Base-RHOL-5.4:openshift-logging/loki-operator-bundle@sha256:02cceda51028eb55a3b82aa5275f03dbaf8f8f9ab3fd27c650d1a07a93044e37_amd64",
"8Base-RHOL-5.4:openshift-logging/loki-rhel8-operator@sha256:0f1be625b4012820f7ac439fed000808d7acb4e885ace16014461bf802be935a_s390x",
"8Base-RHOL-5.4:openshift-logging/loki-rhel8-operator@sha256:28f45a80846c5e11638fb479be42cafcb2bdb3af94dff3629a820de295cbe31d_ppc64le",
"8Base-RHOL-5.4:openshift-logging/loki-rhel8-operator@sha256:df7de1e9f5a4396df6f14b1c4b6bb2a9ae4bc50d82cbc954ec535c26e8df2cb1_arm64",
"8Base-RHOL-5.4:openshift-logging/loki-rhel8-operator@sha256:f8a35557c9eb27f703ffa9320a9d39a2361d93fdb0b8c874d97da458048e7eec_amd64",
"8Base-RHOL-5.4:openshift-logging/lokistack-gateway-rhel8@sha256:178fcf44e6a1fa90d27a40565f69ae2880622b017bc8d9e33a441353eb45609d_arm64",
"8Base-RHOL-5.4:openshift-logging/lokistack-gateway-rhel8@sha256:7b0c2c99cf0f710166b749dbfd7f544caf5fe35516c743fca251c7cec896e1d6_ppc64le",
"8Base-RHOL-5.4:openshift-logging/lokistack-gateway-rhel8@sha256:9c4959525339b607a98889d56f4c26f2e4af25032466c439903a7f1cb593f721_s390x",
"8Base-RHOL-5.4:openshift-logging/lokistack-gateway-rhel8@sha256:a967d5be7d3a6fdd75965a5f9a7396a52cdcb37d6a8521c440b0b5c650c230f2_amd64",
"8Base-RHOL-5.4:openshift-logging/opa-openshift-rhel8@sha256:1b106af51bb50f1ce4db13ebbf6f6c67eae45611c0d5dc46476f1dfaa8aca166_arm64",
"8Base-RHOL-5.4:openshift-logging/opa-openshift-rhel8@sha256:92ddf24824c8f8ae93dec07184c446615b635389472d3a525df72da07c8d9b97_ppc64le",
"8Base-RHOL-5.4:openshift-logging/opa-openshift-rhel8@sha256:9fd0c5df785564b35392705a479d6fb9245e3329719438c76c0282f9ef2f2d55_amd64",
"8Base-RHOL-5.4:openshift-logging/opa-openshift-rhel8@sha256:be8ba0e4c5f24c7b4549700a25c89b10d4b2fc0b0e3888163bb53827914e95c1_s390x",
"8Base-RHOL-5.4:openshift-logging/vector-rhel8@sha256:48bb136d11b44428c87489978873370848ac2b219b107ef7e81ab679db095234_s390x",
"8Base-RHOL-5.4:openshift-logging/vector-rhel8@sha256:48f0317d167710ff5b0787c73f6b7dd0249e7c8d2d001159132a97299c30b62d_ppc64le",
"8Base-RHOL-5.4:openshift-logging/vector-rhel8@sha256:bde21c03fb831d01e85b28245881f7e3f2bb2ef6d2671eb92b2e0cc4bd3898e2_arm64",
"8Base-RHOL-5.4:openshift-logging/vector-rhel8@sha256:cc6b9c6a344aac56c99c96b5120ffe2dad479000b34964ff89d030ae762bda43_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "jackson-databind: deep wrapper array nesting wrt UNWRAP_SINGLE_VALUE_ARRAYS"
},
{
"cve": "CVE-2022-42004",
"cwe": {
"id": "CWE-502",
"name": "Deserialization of Untrusted Data"
},
"discovery_date": "2022-10-17T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-RHOL-5.4:openshift-logging/cluster-logging-operator-bundle@sha256:cb26d9e55f781dd535901a90f1ec2f8e02e8e1de72c0fde638c90fcc228ec4b2_amd64",
"8Base-RHOL-5.4:openshift-logging/cluster-logging-rhel8-operator@sha256:617cc8b0011110981674b75fe1e3041bfa434c952e4a0193818b971edbc7a480_s390x",
"8Base-RHOL-5.4:openshift-logging/cluster-logging-rhel8-operator@sha256:637df49756fe85e7b38b279ffa7672d72c658d3d47df7f9dada2dd70563af83b_arm64",
"8Base-RHOL-5.4:openshift-logging/cluster-logging-rhel8-operator@sha256:aa1602fe2abe23bd8a4c791bc45d425686a6e6d1aab4face0fac28bfc7cebbe1_ppc64le",
"8Base-RHOL-5.4:openshift-logging/cluster-logging-rhel8-operator@sha256:c698b52c46d41007e5ac4f90b9540d430820bd20a93468fddd3a949c7ef5b332_amd64",
"8Base-RHOL-5.4:openshift-logging/eventrouter-rhel8@sha256:4438a3bba34418a9dc566bf15f6b4764de4295ab8b05a7b1a86f9e8cd332b3f7_arm64",
"8Base-RHOL-5.4:openshift-logging/eventrouter-rhel8@sha256:bc408fc4b0482c5eb1b0deb3a9090f3e3dd9b370001d54cd076254562c72fec9_ppc64le",
"8Base-RHOL-5.4:openshift-logging/eventrouter-rhel8@sha256:d50a2b89442d04b1163c01b3a3951857a95df76c57b14e7f51d835c3ac6d75b3_amd64",
"8Base-RHOL-5.4:openshift-logging/eventrouter-rhel8@sha256:f05aee8433dec1c9f6cf835038f9e5a47847d4095383bf3c22ca57c3fb69fa98_s390x",
"8Base-RHOL-5.4:openshift-logging/fluentd-rhel8@sha256:150e17cb645cf2f4cb7ab592572dd3abd145d9a33e790778280e256666248022_amd64",
"8Base-RHOL-5.4:openshift-logging/fluentd-rhel8@sha256:36aecf05ca3cdaf29982b3efa4a1c97087be29b0a58c9777e6b0c11a34861aa8_s390x",
"8Base-RHOL-5.4:openshift-logging/fluentd-rhel8@sha256:e3a51d2bdc632b8376e28c33e9d4fac3464e3a84a313a17246b1f1cf21cb5710_arm64",
"8Base-RHOL-5.4:openshift-logging/fluentd-rhel8@sha256:ea07da04f06df6bf0d9dd981a3795dfdb51eca83f59a6291114650e3e98a9e71_ppc64le",
"8Base-RHOL-5.4:openshift-logging/kibana6-rhel8@sha256:167ee6a645c7397bde3d12e9b9685279505c25ffb3bda11ae68bdf0b34229f2e_amd64",
"8Base-RHOL-5.4:openshift-logging/kibana6-rhel8@sha256:4a029733337b10bb9fb8d98c91abc5451ca0b98713c8f2271a675251e025b6c0_s390x",
"8Base-RHOL-5.4:openshift-logging/kibana6-rhel8@sha256:812f4380024dc3df42310ad14d173d390f2bdf4b3dbdb02550c00552534f79ce_ppc64le",
"8Base-RHOL-5.4:openshift-logging/kibana6-rhel8@sha256:958ba6856cc76fc77d34a9c78888eb37b9c39b83a2f044ef2337610560ba9323_arm64",
"8Base-RHOL-5.4:openshift-logging/log-file-metric-exporter-rhel8@sha256:043e4d3481fbfedf3115e18fade3a2f33b891b0d9a641bf973c2c7f492cb0489_amd64",
"8Base-RHOL-5.4:openshift-logging/log-file-metric-exporter-rhel8@sha256:4fe26adac10cf20b83812e4fa513231d7e1fd4b6cd4e09d4fd425c391885cfcc_ppc64le",
"8Base-RHOL-5.4:openshift-logging/log-file-metric-exporter-rhel8@sha256:85827db708c0927027435b05732cc7e34b0675eaa86665c91efacc76aecd6227_s390x",
"8Base-RHOL-5.4:openshift-logging/log-file-metric-exporter-rhel8@sha256:a5285db276a5545fdbaa9f0743a49ba72ce1c5da61b5cccc9422320a03e08bea_arm64",
"8Base-RHOL-5.4:openshift-logging/logging-curator5-rhel8@sha256:0b28415b8115ff3216002faa5c9ecf3c46995085e3364c8028cb544cb4787ed2_arm64",
"8Base-RHOL-5.4:openshift-logging/logging-curator5-rhel8@sha256:7016e867ddfe970d6d2d54d5615e8f613786bcfbfe52ebf3139c07da3d5a53db_s390x",
"8Base-RHOL-5.4:openshift-logging/logging-curator5-rhel8@sha256:94c435f45e9dbd9fa633e137356cfb1d6ac2d4dd7574b359367665da42d6203d_amd64",
"8Base-RHOL-5.4:openshift-logging/logging-curator5-rhel8@sha256:d24afbc9228ef7f3d0a6fd716a3a57abde88a1f65d149c7df4f959a775b670bd_ppc64le",
"8Base-RHOL-5.4:openshift-logging/logging-loki-rhel8@sha256:40d4989b4733f54a01a73831fa00b12e49fff69c75138902eac0d894d432e4d9_arm64",
"8Base-RHOL-5.4:openshift-logging/logging-loki-rhel8@sha256:b444af35118c24bde0dfa2a8825ba427b3345451f6081133477254213a3460f0_amd64",
"8Base-RHOL-5.4:openshift-logging/logging-loki-rhel8@sha256:cfe410d498940a95da631ea213866a96a119034d78d5d53f7f9c7e8da56e0f45_s390x",
"8Base-RHOL-5.4:openshift-logging/logging-loki-rhel8@sha256:f7979c82140a0ab1a97c9f3151465bfbd9f79c4db9b0cc20f974cd7b890f074f_ppc64le",
"8Base-RHOL-5.4:openshift-logging/loki-operator-bundle@sha256:02cceda51028eb55a3b82aa5275f03dbaf8f8f9ab3fd27c650d1a07a93044e37_amd64",
"8Base-RHOL-5.4:openshift-logging/loki-rhel8-operator@sha256:0f1be625b4012820f7ac439fed000808d7acb4e885ace16014461bf802be935a_s390x",
"8Base-RHOL-5.4:openshift-logging/loki-rhel8-operator@sha256:28f45a80846c5e11638fb479be42cafcb2bdb3af94dff3629a820de295cbe31d_ppc64le",
"8Base-RHOL-5.4:openshift-logging/loki-rhel8-operator@sha256:df7de1e9f5a4396df6f14b1c4b6bb2a9ae4bc50d82cbc954ec535c26e8df2cb1_arm64",
"8Base-RHOL-5.4:openshift-logging/loki-rhel8-operator@sha256:f8a35557c9eb27f703ffa9320a9d39a2361d93fdb0b8c874d97da458048e7eec_amd64",
"8Base-RHOL-5.4:openshift-logging/lokistack-gateway-rhel8@sha256:178fcf44e6a1fa90d27a40565f69ae2880622b017bc8d9e33a441353eb45609d_arm64",
"8Base-RHOL-5.4:openshift-logging/lokistack-gateway-rhel8@sha256:7b0c2c99cf0f710166b749dbfd7f544caf5fe35516c743fca251c7cec896e1d6_ppc64le",
"8Base-RHOL-5.4:openshift-logging/lokistack-gateway-rhel8@sha256:9c4959525339b607a98889d56f4c26f2e4af25032466c439903a7f1cb593f721_s390x",
"8Base-RHOL-5.4:openshift-logging/lokistack-gateway-rhel8@sha256:a967d5be7d3a6fdd75965a5f9a7396a52cdcb37d6a8521c440b0b5c650c230f2_amd64",
"8Base-RHOL-5.4:openshift-logging/opa-openshift-rhel8@sha256:1b106af51bb50f1ce4db13ebbf6f6c67eae45611c0d5dc46476f1dfaa8aca166_arm64",
"8Base-RHOL-5.4:openshift-logging/opa-openshift-rhel8@sha256:92ddf24824c8f8ae93dec07184c446615b635389472d3a525df72da07c8d9b97_ppc64le",
"8Base-RHOL-5.4:openshift-logging/opa-openshift-rhel8@sha256:9fd0c5df785564b35392705a479d6fb9245e3329719438c76c0282f9ef2f2d55_amd64",
"8Base-RHOL-5.4:openshift-logging/opa-openshift-rhel8@sha256:be8ba0e4c5f24c7b4549700a25c89b10d4b2fc0b0e3888163bb53827914e95c1_s390x",
"8Base-RHOL-5.4:openshift-logging/vector-rhel8@sha256:48bb136d11b44428c87489978873370848ac2b219b107ef7e81ab679db095234_s390x",
"8Base-RHOL-5.4:openshift-logging/vector-rhel8@sha256:48f0317d167710ff5b0787c73f6b7dd0249e7c8d2d001159132a97299c30b62d_ppc64le",
"8Base-RHOL-5.4:openshift-logging/vector-rhel8@sha256:bde21c03fb831d01e85b28245881f7e3f2bb2ef6d2671eb92b2e0cc4bd3898e2_arm64",
"8Base-RHOL-5.4:openshift-logging/vector-rhel8@sha256:cc6b9c6a344aac56c99c96b5120ffe2dad479000b34964ff89d030ae762bda43_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2135247"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found In FasterXML jackson-databind. This issue could allow an attacker to benefit from resource exhaustion due to the lack of a check in BeanDeserializer._deserializeFromArray to prevent the use of deeply nested arrays. An application is only vulnerable with certain customized choices for deserialization.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "jackson-databind: use of deeply nested arrays",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-RHOL-5.4:openshift-logging/elasticsearch-operator-bundle@sha256:7659606e0418a1920161b7ca67524ea6a7b1ed366b817f1a5cde0b346152243c_amd64",
"8Base-RHOL-5.4:openshift-logging/elasticsearch-proxy-rhel8@sha256:4f4e5bb267ad391bc0fc6a010ec9ecdf3bf48d5b6e9db0d2510960c13c97bd71_ppc64le",
"8Base-RHOL-5.4:openshift-logging/elasticsearch-proxy-rhel8@sha256:b9c2e58b39dc3de97013f8806178f6327bf2e4590fe55db144527d64d468f64f_s390x",
"8Base-RHOL-5.4:openshift-logging/elasticsearch-proxy-rhel8@sha256:c9a2b9e7cca14d9596ccbe0f64e2abe4452f91f029f42eefead43c9f526f6a58_arm64",
"8Base-RHOL-5.4:openshift-logging/elasticsearch-proxy-rhel8@sha256:e38c55762c1eef39b401c46d44c899067b1566173e1ce239f17a95c52b30d8c7_amd64",
"8Base-RHOL-5.4:openshift-logging/elasticsearch-rhel8-operator@sha256:2005f41e59a130bb86c2ec47d1b060e3e2ed32f9a4cef3897e2c05fc94043dbb_arm64",
"8Base-RHOL-5.4:openshift-logging/elasticsearch-rhel8-operator@sha256:6a55934cf7af0c03e06d4ec7a15a80acf53491fb7a183c16fdf8018fbf9b4174_ppc64le",
"8Base-RHOL-5.4:openshift-logging/elasticsearch-rhel8-operator@sha256:8ce04536772f31ad022b9c66cddc090d2962b44d66c06a1db56d1447be198326_amd64",
"8Base-RHOL-5.4:openshift-logging/elasticsearch-rhel8-operator@sha256:dd211d42eaad043d9bdb519e3ad6a86255b7280a2cdf47dd3fe0458a77cb110f_s390x",
"8Base-RHOL-5.4:openshift-logging/elasticsearch6-rhel8@sha256:17a9f3ae042b92693a374e3d60a07f2ab2e52419f8df25d446dd0654f6a858f6_ppc64le",
"8Base-RHOL-5.4:openshift-logging/elasticsearch6-rhel8@sha256:5b1cfc2f9a96601439cf17d1fe49a6bc6cad3b7273af87b23528090aefbfd915_s390x",
"8Base-RHOL-5.4:openshift-logging/elasticsearch6-rhel8@sha256:8e0ba10f91db4cb8786d0501ec33a3d54f7c7c5337e0495cc2286a6ea20cca20_arm64",
"8Base-RHOL-5.4:openshift-logging/elasticsearch6-rhel8@sha256:fa8182b69328077500f89becc7621b48efa8d99f34247c2e6855dcfec13980e3_amd64"
],
"known_not_affected": [
"8Base-RHOL-5.4:openshift-logging/cluster-logging-operator-bundle@sha256:cb26d9e55f781dd535901a90f1ec2f8e02e8e1de72c0fde638c90fcc228ec4b2_amd64",
"8Base-RHOL-5.4:openshift-logging/cluster-logging-rhel8-operator@sha256:617cc8b0011110981674b75fe1e3041bfa434c952e4a0193818b971edbc7a480_s390x",
"8Base-RHOL-5.4:openshift-logging/cluster-logging-rhel8-operator@sha256:637df49756fe85e7b38b279ffa7672d72c658d3d47df7f9dada2dd70563af83b_arm64",
"8Base-RHOL-5.4:openshift-logging/cluster-logging-rhel8-operator@sha256:aa1602fe2abe23bd8a4c791bc45d425686a6e6d1aab4face0fac28bfc7cebbe1_ppc64le",
"8Base-RHOL-5.4:openshift-logging/cluster-logging-rhel8-operator@sha256:c698b52c46d41007e5ac4f90b9540d430820bd20a93468fddd3a949c7ef5b332_amd64",
"8Base-RHOL-5.4:openshift-logging/eventrouter-rhel8@sha256:4438a3bba34418a9dc566bf15f6b4764de4295ab8b05a7b1a86f9e8cd332b3f7_arm64",
"8Base-RHOL-5.4:openshift-logging/eventrouter-rhel8@sha256:bc408fc4b0482c5eb1b0deb3a9090f3e3dd9b370001d54cd076254562c72fec9_ppc64le",
"8Base-RHOL-5.4:openshift-logging/eventrouter-rhel8@sha256:d50a2b89442d04b1163c01b3a3951857a95df76c57b14e7f51d835c3ac6d75b3_amd64",
"8Base-RHOL-5.4:openshift-logging/eventrouter-rhel8@sha256:f05aee8433dec1c9f6cf835038f9e5a47847d4095383bf3c22ca57c3fb69fa98_s390x",
"8Base-RHOL-5.4:openshift-logging/fluentd-rhel8@sha256:150e17cb645cf2f4cb7ab592572dd3abd145d9a33e790778280e256666248022_amd64",
"8Base-RHOL-5.4:openshift-logging/fluentd-rhel8@sha256:36aecf05ca3cdaf29982b3efa4a1c97087be29b0a58c9777e6b0c11a34861aa8_s390x",
"8Base-RHOL-5.4:openshift-logging/fluentd-rhel8@sha256:e3a51d2bdc632b8376e28c33e9d4fac3464e3a84a313a17246b1f1cf21cb5710_arm64",
"8Base-RHOL-5.4:openshift-logging/fluentd-rhel8@sha256:ea07da04f06df6bf0d9dd981a3795dfdb51eca83f59a6291114650e3e98a9e71_ppc64le",
"8Base-RHOL-5.4:openshift-logging/kibana6-rhel8@sha256:167ee6a645c7397bde3d12e9b9685279505c25ffb3bda11ae68bdf0b34229f2e_amd64",
"8Base-RHOL-5.4:openshift-logging/kibana6-rhel8@sha256:4a029733337b10bb9fb8d98c91abc5451ca0b98713c8f2271a675251e025b6c0_s390x",
"8Base-RHOL-5.4:openshift-logging/kibana6-rhel8@sha256:812f4380024dc3df42310ad14d173d390f2bdf4b3dbdb02550c00552534f79ce_ppc64le",
"8Base-RHOL-5.4:openshift-logging/kibana6-rhel8@sha256:958ba6856cc76fc77d34a9c78888eb37b9c39b83a2f044ef2337610560ba9323_arm64",
"8Base-RHOL-5.4:openshift-logging/log-file-metric-exporter-rhel8@sha256:043e4d3481fbfedf3115e18fade3a2f33b891b0d9a641bf973c2c7f492cb0489_amd64",
"8Base-RHOL-5.4:openshift-logging/log-file-metric-exporter-rhel8@sha256:4fe26adac10cf20b83812e4fa513231d7e1fd4b6cd4e09d4fd425c391885cfcc_ppc64le",
"8Base-RHOL-5.4:openshift-logging/log-file-metric-exporter-rhel8@sha256:85827db708c0927027435b05732cc7e34b0675eaa86665c91efacc76aecd6227_s390x",
"8Base-RHOL-5.4:openshift-logging/log-file-metric-exporter-rhel8@sha256:a5285db276a5545fdbaa9f0743a49ba72ce1c5da61b5cccc9422320a03e08bea_arm64",
"8Base-RHOL-5.4:openshift-logging/logging-curator5-rhel8@sha256:0b28415b8115ff3216002faa5c9ecf3c46995085e3364c8028cb544cb4787ed2_arm64",
"8Base-RHOL-5.4:openshift-logging/logging-curator5-rhel8@sha256:7016e867ddfe970d6d2d54d5615e8f613786bcfbfe52ebf3139c07da3d5a53db_s390x",
"8Base-RHOL-5.4:openshift-logging/logging-curator5-rhel8@sha256:94c435f45e9dbd9fa633e137356cfb1d6ac2d4dd7574b359367665da42d6203d_amd64",
"8Base-RHOL-5.4:openshift-logging/logging-curator5-rhel8@sha256:d24afbc9228ef7f3d0a6fd716a3a57abde88a1f65d149c7df4f959a775b670bd_ppc64le",
"8Base-RHOL-5.4:openshift-logging/logging-loki-rhel8@sha256:40d4989b4733f54a01a73831fa00b12e49fff69c75138902eac0d894d432e4d9_arm64",
"8Base-RHOL-5.4:openshift-logging/logging-loki-rhel8@sha256:b444af35118c24bde0dfa2a8825ba427b3345451f6081133477254213a3460f0_amd64",
"8Base-RHOL-5.4:openshift-logging/logging-loki-rhel8@sha256:cfe410d498940a95da631ea213866a96a119034d78d5d53f7f9c7e8da56e0f45_s390x",
"8Base-RHOL-5.4:openshift-logging/logging-loki-rhel8@sha256:f7979c82140a0ab1a97c9f3151465bfbd9f79c4db9b0cc20f974cd7b890f074f_ppc64le",
"8Base-RHOL-5.4:openshift-logging/loki-operator-bundle@sha256:02cceda51028eb55a3b82aa5275f03dbaf8f8f9ab3fd27c650d1a07a93044e37_amd64",
"8Base-RHOL-5.4:openshift-logging/loki-rhel8-operator@sha256:0f1be625b4012820f7ac439fed000808d7acb4e885ace16014461bf802be935a_s390x",
"8Base-RHOL-5.4:openshift-logging/loki-rhel8-operator@sha256:28f45a80846c5e11638fb479be42cafcb2bdb3af94dff3629a820de295cbe31d_ppc64le",
"8Base-RHOL-5.4:openshift-logging/loki-rhel8-operator@sha256:df7de1e9f5a4396df6f14b1c4b6bb2a9ae4bc50d82cbc954ec535c26e8df2cb1_arm64",
"8Base-RHOL-5.4:openshift-logging/loki-rhel8-operator@sha256:f8a35557c9eb27f703ffa9320a9d39a2361d93fdb0b8c874d97da458048e7eec_amd64",
"8Base-RHOL-5.4:openshift-logging/lokistack-gateway-rhel8@sha256:178fcf44e6a1fa90d27a40565f69ae2880622b017bc8d9e33a441353eb45609d_arm64",
"8Base-RHOL-5.4:openshift-logging/lokistack-gateway-rhel8@sha256:7b0c2c99cf0f710166b749dbfd7f544caf5fe35516c743fca251c7cec896e1d6_ppc64le",
"8Base-RHOL-5.4:openshift-logging/lokistack-gateway-rhel8@sha256:9c4959525339b607a98889d56f4c26f2e4af25032466c439903a7f1cb593f721_s390x",
"8Base-RHOL-5.4:openshift-logging/lokistack-gateway-rhel8@sha256:a967d5be7d3a6fdd75965a5f9a7396a52cdcb37d6a8521c440b0b5c650c230f2_amd64",
"8Base-RHOL-5.4:openshift-logging/opa-openshift-rhel8@sha256:1b106af51bb50f1ce4db13ebbf6f6c67eae45611c0d5dc46476f1dfaa8aca166_arm64",
"8Base-RHOL-5.4:openshift-logging/opa-openshift-rhel8@sha256:92ddf24824c8f8ae93dec07184c446615b635389472d3a525df72da07c8d9b97_ppc64le",
"8Base-RHOL-5.4:openshift-logging/opa-openshift-rhel8@sha256:9fd0c5df785564b35392705a479d6fb9245e3329719438c76c0282f9ef2f2d55_amd64",
"8Base-RHOL-5.4:openshift-logging/opa-openshift-rhel8@sha256:be8ba0e4c5f24c7b4549700a25c89b10d4b2fc0b0e3888163bb53827914e95c1_s390x",
"8Base-RHOL-5.4:openshift-logging/vector-rhel8@sha256:48bb136d11b44428c87489978873370848ac2b219b107ef7e81ab679db095234_s390x",
"8Base-RHOL-5.4:openshift-logging/vector-rhel8@sha256:48f0317d167710ff5b0787c73f6b7dd0249e7c8d2d001159132a97299c30b62d_ppc64le",
"8Base-RHOL-5.4:openshift-logging/vector-rhel8@sha256:bde21c03fb831d01e85b28245881f7e3f2bb2ef6d2671eb92b2e0cc4bd3898e2_arm64",
"8Base-RHOL-5.4:openshift-logging/vector-rhel8@sha256:cc6b9c6a344aac56c99c96b5120ffe2dad479000b34964ff89d030ae762bda43_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-42004"
},
{
"category": "external",
"summary": "RHBZ#2135247",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2135247"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-42004",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42004"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-42004",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-42004"
}
],
"release_date": "2022-10-02T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-11-16T12:13:01+00:00",
"details": "For OpenShift Container Platform 4.10 see the following documentation, which will be updated shortly, for detailed release notes:\n\nhttps://docs.openshift.com/container-platform/4.10/logging/cluster-logging-release-notes.html\n\nFor Red Hat OpenShift Logging 5.4, see the following instructions to apply this update:\n\nhttps://docs.openshift.com/container-platform/4.10/logging/cluster-logging-upgrading.html",
"product_ids": [
"8Base-RHOL-5.4:openshift-logging/elasticsearch-operator-bundle@sha256:7659606e0418a1920161b7ca67524ea6a7b1ed366b817f1a5cde0b346152243c_amd64",
"8Base-RHOL-5.4:openshift-logging/elasticsearch-proxy-rhel8@sha256:4f4e5bb267ad391bc0fc6a010ec9ecdf3bf48d5b6e9db0d2510960c13c97bd71_ppc64le",
"8Base-RHOL-5.4:openshift-logging/elasticsearch-proxy-rhel8@sha256:b9c2e58b39dc3de97013f8806178f6327bf2e4590fe55db144527d64d468f64f_s390x",
"8Base-RHOL-5.4:openshift-logging/elasticsearch-proxy-rhel8@sha256:c9a2b9e7cca14d9596ccbe0f64e2abe4452f91f029f42eefead43c9f526f6a58_arm64",
"8Base-RHOL-5.4:openshift-logging/elasticsearch-proxy-rhel8@sha256:e38c55762c1eef39b401c46d44c899067b1566173e1ce239f17a95c52b30d8c7_amd64",
"8Base-RHOL-5.4:openshift-logging/elasticsearch-rhel8-operator@sha256:2005f41e59a130bb86c2ec47d1b060e3e2ed32f9a4cef3897e2c05fc94043dbb_arm64",
"8Base-RHOL-5.4:openshift-logging/elasticsearch-rhel8-operator@sha256:6a55934cf7af0c03e06d4ec7a15a80acf53491fb7a183c16fdf8018fbf9b4174_ppc64le",
"8Base-RHOL-5.4:openshift-logging/elasticsearch-rhel8-operator@sha256:8ce04536772f31ad022b9c66cddc090d2962b44d66c06a1db56d1447be198326_amd64",
"8Base-RHOL-5.4:openshift-logging/elasticsearch-rhel8-operator@sha256:dd211d42eaad043d9bdb519e3ad6a86255b7280a2cdf47dd3fe0458a77cb110f_s390x",
"8Base-RHOL-5.4:openshift-logging/elasticsearch6-rhel8@sha256:17a9f3ae042b92693a374e3d60a07f2ab2e52419f8df25d446dd0654f6a858f6_ppc64le",
"8Base-RHOL-5.4:openshift-logging/elasticsearch6-rhel8@sha256:5b1cfc2f9a96601439cf17d1fe49a6bc6cad3b7273af87b23528090aefbfd915_s390x",
"8Base-RHOL-5.4:openshift-logging/elasticsearch6-rhel8@sha256:8e0ba10f91db4cb8786d0501ec33a3d54f7c7c5337e0495cc2286a6ea20cca20_arm64",
"8Base-RHOL-5.4:openshift-logging/elasticsearch6-rhel8@sha256:fa8182b69328077500f89becc7621b48efa8d99f34247c2e6855dcfec13980e3_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:7435"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"8Base-RHOL-5.4:openshift-logging/cluster-logging-operator-bundle@sha256:cb26d9e55f781dd535901a90f1ec2f8e02e8e1de72c0fde638c90fcc228ec4b2_amd64",
"8Base-RHOL-5.4:openshift-logging/cluster-logging-rhel8-operator@sha256:617cc8b0011110981674b75fe1e3041bfa434c952e4a0193818b971edbc7a480_s390x",
"8Base-RHOL-5.4:openshift-logging/cluster-logging-rhel8-operator@sha256:637df49756fe85e7b38b279ffa7672d72c658d3d47df7f9dada2dd70563af83b_arm64",
"8Base-RHOL-5.4:openshift-logging/cluster-logging-rhel8-operator@sha256:aa1602fe2abe23bd8a4c791bc45d425686a6e6d1aab4face0fac28bfc7cebbe1_ppc64le",
"8Base-RHOL-5.4:openshift-logging/cluster-logging-rhel8-operator@sha256:c698b52c46d41007e5ac4f90b9540d430820bd20a93468fddd3a949c7ef5b332_amd64",
"8Base-RHOL-5.4:openshift-logging/elasticsearch-operator-bundle@sha256:7659606e0418a1920161b7ca67524ea6a7b1ed366b817f1a5cde0b346152243c_amd64",
"8Base-RHOL-5.4:openshift-logging/elasticsearch-proxy-rhel8@sha256:4f4e5bb267ad391bc0fc6a010ec9ecdf3bf48d5b6e9db0d2510960c13c97bd71_ppc64le",
"8Base-RHOL-5.4:openshift-logging/elasticsearch-proxy-rhel8@sha256:b9c2e58b39dc3de97013f8806178f6327bf2e4590fe55db144527d64d468f64f_s390x",
"8Base-RHOL-5.4:openshift-logging/elasticsearch-proxy-rhel8@sha256:c9a2b9e7cca14d9596ccbe0f64e2abe4452f91f029f42eefead43c9f526f6a58_arm64",
"8Base-RHOL-5.4:openshift-logging/elasticsearch-proxy-rhel8@sha256:e38c55762c1eef39b401c46d44c899067b1566173e1ce239f17a95c52b30d8c7_amd64",
"8Base-RHOL-5.4:openshift-logging/elasticsearch-rhel8-operator@sha256:2005f41e59a130bb86c2ec47d1b060e3e2ed32f9a4cef3897e2c05fc94043dbb_arm64",
"8Base-RHOL-5.4:openshift-logging/elasticsearch-rhel8-operator@sha256:6a55934cf7af0c03e06d4ec7a15a80acf53491fb7a183c16fdf8018fbf9b4174_ppc64le",
"8Base-RHOL-5.4:openshift-logging/elasticsearch-rhel8-operator@sha256:8ce04536772f31ad022b9c66cddc090d2962b44d66c06a1db56d1447be198326_amd64",
"8Base-RHOL-5.4:openshift-logging/elasticsearch-rhel8-operator@sha256:dd211d42eaad043d9bdb519e3ad6a86255b7280a2cdf47dd3fe0458a77cb110f_s390x",
"8Base-RHOL-5.4:openshift-logging/elasticsearch6-rhel8@sha256:17a9f3ae042b92693a374e3d60a07f2ab2e52419f8df25d446dd0654f6a858f6_ppc64le",
"8Base-RHOL-5.4:openshift-logging/elasticsearch6-rhel8@sha256:5b1cfc2f9a96601439cf17d1fe49a6bc6cad3b7273af87b23528090aefbfd915_s390x",
"8Base-RHOL-5.4:openshift-logging/elasticsearch6-rhel8@sha256:8e0ba10f91db4cb8786d0501ec33a3d54f7c7c5337e0495cc2286a6ea20cca20_arm64",
"8Base-RHOL-5.4:openshift-logging/elasticsearch6-rhel8@sha256:fa8182b69328077500f89becc7621b48efa8d99f34247c2e6855dcfec13980e3_amd64",
"8Base-RHOL-5.4:openshift-logging/eventrouter-rhel8@sha256:4438a3bba34418a9dc566bf15f6b4764de4295ab8b05a7b1a86f9e8cd332b3f7_arm64",
"8Base-RHOL-5.4:openshift-logging/eventrouter-rhel8@sha256:bc408fc4b0482c5eb1b0deb3a9090f3e3dd9b370001d54cd076254562c72fec9_ppc64le",
"8Base-RHOL-5.4:openshift-logging/eventrouter-rhel8@sha256:d50a2b89442d04b1163c01b3a3951857a95df76c57b14e7f51d835c3ac6d75b3_amd64",
"8Base-RHOL-5.4:openshift-logging/eventrouter-rhel8@sha256:f05aee8433dec1c9f6cf835038f9e5a47847d4095383bf3c22ca57c3fb69fa98_s390x",
"8Base-RHOL-5.4:openshift-logging/fluentd-rhel8@sha256:150e17cb645cf2f4cb7ab592572dd3abd145d9a33e790778280e256666248022_amd64",
"8Base-RHOL-5.4:openshift-logging/fluentd-rhel8@sha256:36aecf05ca3cdaf29982b3efa4a1c97087be29b0a58c9777e6b0c11a34861aa8_s390x",
"8Base-RHOL-5.4:openshift-logging/fluentd-rhel8@sha256:e3a51d2bdc632b8376e28c33e9d4fac3464e3a84a313a17246b1f1cf21cb5710_arm64",
"8Base-RHOL-5.4:openshift-logging/fluentd-rhel8@sha256:ea07da04f06df6bf0d9dd981a3795dfdb51eca83f59a6291114650e3e98a9e71_ppc64le",
"8Base-RHOL-5.4:openshift-logging/kibana6-rhel8@sha256:167ee6a645c7397bde3d12e9b9685279505c25ffb3bda11ae68bdf0b34229f2e_amd64",
"8Base-RHOL-5.4:openshift-logging/kibana6-rhel8@sha256:4a029733337b10bb9fb8d98c91abc5451ca0b98713c8f2271a675251e025b6c0_s390x",
"8Base-RHOL-5.4:openshift-logging/kibana6-rhel8@sha256:812f4380024dc3df42310ad14d173d390f2bdf4b3dbdb02550c00552534f79ce_ppc64le",
"8Base-RHOL-5.4:openshift-logging/kibana6-rhel8@sha256:958ba6856cc76fc77d34a9c78888eb37b9c39b83a2f044ef2337610560ba9323_arm64",
"8Base-RHOL-5.4:openshift-logging/log-file-metric-exporter-rhel8@sha256:043e4d3481fbfedf3115e18fade3a2f33b891b0d9a641bf973c2c7f492cb0489_amd64",
"8Base-RHOL-5.4:openshift-logging/log-file-metric-exporter-rhel8@sha256:4fe26adac10cf20b83812e4fa513231d7e1fd4b6cd4e09d4fd425c391885cfcc_ppc64le",
"8Base-RHOL-5.4:openshift-logging/log-file-metric-exporter-rhel8@sha256:85827db708c0927027435b05732cc7e34b0675eaa86665c91efacc76aecd6227_s390x",
"8Base-RHOL-5.4:openshift-logging/log-file-metric-exporter-rhel8@sha256:a5285db276a5545fdbaa9f0743a49ba72ce1c5da61b5cccc9422320a03e08bea_arm64",
"8Base-RHOL-5.4:openshift-logging/logging-curator5-rhel8@sha256:0b28415b8115ff3216002faa5c9ecf3c46995085e3364c8028cb544cb4787ed2_arm64",
"8Base-RHOL-5.4:openshift-logging/logging-curator5-rhel8@sha256:7016e867ddfe970d6d2d54d5615e8f613786bcfbfe52ebf3139c07da3d5a53db_s390x",
"8Base-RHOL-5.4:openshift-logging/logging-curator5-rhel8@sha256:94c435f45e9dbd9fa633e137356cfb1d6ac2d4dd7574b359367665da42d6203d_amd64",
"8Base-RHOL-5.4:openshift-logging/logging-curator5-rhel8@sha256:d24afbc9228ef7f3d0a6fd716a3a57abde88a1f65d149c7df4f959a775b670bd_ppc64le",
"8Base-RHOL-5.4:openshift-logging/logging-loki-rhel8@sha256:40d4989b4733f54a01a73831fa00b12e49fff69c75138902eac0d894d432e4d9_arm64",
"8Base-RHOL-5.4:openshift-logging/logging-loki-rhel8@sha256:b444af35118c24bde0dfa2a8825ba427b3345451f6081133477254213a3460f0_amd64",
"8Base-RHOL-5.4:openshift-logging/logging-loki-rhel8@sha256:cfe410d498940a95da631ea213866a96a119034d78d5d53f7f9c7e8da56e0f45_s390x",
"8Base-RHOL-5.4:openshift-logging/logging-loki-rhel8@sha256:f7979c82140a0ab1a97c9f3151465bfbd9f79c4db9b0cc20f974cd7b890f074f_ppc64le",
"8Base-RHOL-5.4:openshift-logging/loki-operator-bundle@sha256:02cceda51028eb55a3b82aa5275f03dbaf8f8f9ab3fd27c650d1a07a93044e37_amd64",
"8Base-RHOL-5.4:openshift-logging/loki-rhel8-operator@sha256:0f1be625b4012820f7ac439fed000808d7acb4e885ace16014461bf802be935a_s390x",
"8Base-RHOL-5.4:openshift-logging/loki-rhel8-operator@sha256:28f45a80846c5e11638fb479be42cafcb2bdb3af94dff3629a820de295cbe31d_ppc64le",
"8Base-RHOL-5.4:openshift-logging/loki-rhel8-operator@sha256:df7de1e9f5a4396df6f14b1c4b6bb2a9ae4bc50d82cbc954ec535c26e8df2cb1_arm64",
"8Base-RHOL-5.4:openshift-logging/loki-rhel8-operator@sha256:f8a35557c9eb27f703ffa9320a9d39a2361d93fdb0b8c874d97da458048e7eec_amd64",
"8Base-RHOL-5.4:openshift-logging/lokistack-gateway-rhel8@sha256:178fcf44e6a1fa90d27a40565f69ae2880622b017bc8d9e33a441353eb45609d_arm64",
"8Base-RHOL-5.4:openshift-logging/lokistack-gateway-rhel8@sha256:7b0c2c99cf0f710166b749dbfd7f544caf5fe35516c743fca251c7cec896e1d6_ppc64le",
"8Base-RHOL-5.4:openshift-logging/lokistack-gateway-rhel8@sha256:9c4959525339b607a98889d56f4c26f2e4af25032466c439903a7f1cb593f721_s390x",
"8Base-RHOL-5.4:openshift-logging/lokistack-gateway-rhel8@sha256:a967d5be7d3a6fdd75965a5f9a7396a52cdcb37d6a8521c440b0b5c650c230f2_amd64",
"8Base-RHOL-5.4:openshift-logging/opa-openshift-rhel8@sha256:1b106af51bb50f1ce4db13ebbf6f6c67eae45611c0d5dc46476f1dfaa8aca166_arm64",
"8Base-RHOL-5.4:openshift-logging/opa-openshift-rhel8@sha256:92ddf24824c8f8ae93dec07184c446615b635389472d3a525df72da07c8d9b97_ppc64le",
"8Base-RHOL-5.4:openshift-logging/opa-openshift-rhel8@sha256:9fd0c5df785564b35392705a479d6fb9245e3329719438c76c0282f9ef2f2d55_amd64",
"8Base-RHOL-5.4:openshift-logging/opa-openshift-rhel8@sha256:be8ba0e4c5f24c7b4549700a25c89b10d4b2fc0b0e3888163bb53827914e95c1_s390x",
"8Base-RHOL-5.4:openshift-logging/vector-rhel8@sha256:48bb136d11b44428c87489978873370848ac2b219b107ef7e81ab679db095234_s390x",
"8Base-RHOL-5.4:openshift-logging/vector-rhel8@sha256:48f0317d167710ff5b0787c73f6b7dd0249e7c8d2d001159132a97299c30b62d_ppc64le",
"8Base-RHOL-5.4:openshift-logging/vector-rhel8@sha256:bde21c03fb831d01e85b28245881f7e3f2bb2ef6d2671eb92b2e0cc4bd3898e2_arm64",
"8Base-RHOL-5.4:openshift-logging/vector-rhel8@sha256:cc6b9c6a344aac56c99c96b5120ffe2dad479000b34964ff89d030ae762bda43_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "jackson-databind: use of deeply nested arrays"
}
]
}
rhsa-2023_0692
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "OpenShift API for Data Protection (OADP) 1.0.7 is now available.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "OpenShift API for Data Protection (OADP) enables you to back up and restore application resources, persistent volume data, and internal container images to external backup storage. OADP enables both file system-based and snapshot-based backups for persistent volumes.\n\nSecurity Fix(es) from Bugzilla:\n\n* golang: golang.org/x/text/language: ParseAcceptLanguage takes a long time to parse complex tags (CVE-2022-32149)\n\n* golang: net/http: An attacker can cause excessive memory growth in a Go server accepting HTTP/2 requests (CVE-2022-41717)\n\nFor more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2023:0692",
"url": "https://access.redhat.com/errata/RHSA-2023:0692"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#moderate",
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "2134010",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2134010"
},
{
"category": "external",
"summary": "2161274",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2161274"
},
{
"category": "external",
"summary": "MIG-1050",
"url": "https://issues.redhat.com/browse/MIG-1050"
},
{
"category": "external",
"summary": "OADP-1180",
"url": "https://issues.redhat.com/browse/OADP-1180"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2023/rhsa-2023_0692.json"
}
],
"title": "Red Hat Security Advisory: OpenShift API for Data Protection (OADP) 1.0.7 security and bug fix update",
"tracking": {
"current_release_date": "2025-01-06T19:23:05+00:00",
"generator": {
"date": "2025-01-06T19:23:05+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.5"
}
},
"id": "RHSA-2023:0692",
"initial_release_date": "2023-02-09T01:07:26+00:00",
"revision_history": [
{
"date": "2023-02-09T01:07:26+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2023-02-09T01:07:26+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-01-06T19:23:05+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "8Base-OADP-1.0",
"product": {
"name": "8Base-OADP-1.0",
"product_id": "8Base-OADP-1.0",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:openshift_api_data_protection:1.0::el8"
}
}
}
],
"category": "product_family",
"name": "OpenShift API for Data Protection"
},
{
"branches": [
{
"category": "product_version",
"name": "oadp/oadp-kubevirt-velero-plugin-rhel8@sha256:3749d7386635cf598147d5021584672ab26761b9dca52ca05b179d47557ac549_amd64",
"product": {
"name": "oadp/oadp-kubevirt-velero-plugin-rhel8@sha256:3749d7386635cf598147d5021584672ab26761b9dca52ca05b179d47557ac549_amd64",
"product_id": "oadp/oadp-kubevirt-velero-plugin-rhel8@sha256:3749d7386635cf598147d5021584672ab26761b9dca52ca05b179d47557ac549_amd64",
"product_identification_helper": {
"purl": "pkg:oci/oadp-kubevirt-velero-plugin-rhel8@sha256:3749d7386635cf598147d5021584672ab26761b9dca52ca05b179d47557ac549?arch=amd64\u0026repository_url=registry.redhat.io/oadp/oadp-kubevirt-velero-plugin-rhel8\u0026tag=1.0.7-4"
}
}
},
{
"category": "product_version",
"name": "oadp/oadp-mustgather-rhel8@sha256:f269ee31bf0eb544ccabb2d72d807dc5d6587186d76bb020a00fac20221c7b0f_amd64",
"product": {
"name": "oadp/oadp-mustgather-rhel8@sha256:f269ee31bf0eb544ccabb2d72d807dc5d6587186d76bb020a00fac20221c7b0f_amd64",
"product_id": "oadp/oadp-mustgather-rhel8@sha256:f269ee31bf0eb544ccabb2d72d807dc5d6587186d76bb020a00fac20221c7b0f_amd64",
"product_identification_helper": {
"purl": "pkg:oci/oadp-mustgather-rhel8@sha256:f269ee31bf0eb544ccabb2d72d807dc5d6587186d76bb020a00fac20221c7b0f?arch=amd64\u0026repository_url=registry.redhat.io/oadp/oadp-mustgather-rhel8\u0026tag=1.0.7-4"
}
}
},
{
"category": "product_version",
"name": "oadp/oadp-operator-bundle@sha256:d0927b9f279ad60a073773ec624dc66db000b3d0b727254fbadb6af3a3c7b646_amd64",
"product": {
"name": "oadp/oadp-operator-bundle@sha256:d0927b9f279ad60a073773ec624dc66db000b3d0b727254fbadb6af3a3c7b646_amd64",
"product_id": "oadp/oadp-operator-bundle@sha256:d0927b9f279ad60a073773ec624dc66db000b3d0b727254fbadb6af3a3c7b646_amd64",
"product_identification_helper": {
"purl": "pkg:oci/oadp-operator-bundle@sha256:d0927b9f279ad60a073773ec624dc66db000b3d0b727254fbadb6af3a3c7b646?arch=amd64\u0026repository_url=registry.redhat.io/oadp/oadp-operator-bundle\u0026tag=1.0.7-8"
}
}
},
{
"category": "product_version",
"name": "oadp/oadp-rhel8-operator@sha256:4d983585501df88bd5f602010cb72ea460982b25fa91c05a83f0b711a457661a_amd64",
"product": {
"name": "oadp/oadp-rhel8-operator@sha256:4d983585501df88bd5f602010cb72ea460982b25fa91c05a83f0b711a457661a_amd64",
"product_id": "oadp/oadp-rhel8-operator@sha256:4d983585501df88bd5f602010cb72ea460982b25fa91c05a83f0b711a457661a_amd64",
"product_identification_helper": {
"purl": "pkg:oci/oadp-rhel8-operator@sha256:4d983585501df88bd5f602010cb72ea460982b25fa91c05a83f0b711a457661a?arch=amd64\u0026repository_url=registry.redhat.io/oadp/oadp-rhel8-operator\u0026tag=1.0.7-2"
}
}
},
{
"category": "product_version",
"name": "oadp/oadp-registry-rhel8@sha256:ea215cbf22a37c2f2b77c9901dc5c7493f1f3a694276f42d11fcefbf045a8b38_amd64",
"product": {
"name": "oadp/oadp-registry-rhel8@sha256:ea215cbf22a37c2f2b77c9901dc5c7493f1f3a694276f42d11fcefbf045a8b38_amd64",
"product_id": "oadp/oadp-registry-rhel8@sha256:ea215cbf22a37c2f2b77c9901dc5c7493f1f3a694276f42d11fcefbf045a8b38_amd64",
"product_identification_helper": {
"purl": "pkg:oci/oadp-registry-rhel8@sha256:ea215cbf22a37c2f2b77c9901dc5c7493f1f3a694276f42d11fcefbf045a8b38?arch=amd64\u0026repository_url=registry.redhat.io/oadp/oadp-registry-rhel8\u0026tag=1.0.7-3"
}
}
},
{
"category": "product_version",
"name": "oadp/oadp-velero-rhel8@sha256:a5973be01956a09f75bcd65481d484c12fd7bcefad5b852fd0567f6d8b51f0be_amd64",
"product": {
"name": "oadp/oadp-velero-rhel8@sha256:a5973be01956a09f75bcd65481d484c12fd7bcefad5b852fd0567f6d8b51f0be_amd64",
"product_id": "oadp/oadp-velero-rhel8@sha256:a5973be01956a09f75bcd65481d484c12fd7bcefad5b852fd0567f6d8b51f0be_amd64",
"product_identification_helper": {
"purl": "pkg:oci/oadp-velero-rhel8@sha256:a5973be01956a09f75bcd65481d484c12fd7bcefad5b852fd0567f6d8b51f0be?arch=amd64\u0026repository_url=registry.redhat.io/oadp/oadp-velero-rhel8\u0026tag=1.0.7-5"
}
}
},
{
"category": "product_version",
"name": "oadp/oadp-velero-plugin-rhel8@sha256:d9a46e3da52db4880cde8faa6f5e406039e6f38585dd14dc97db4b5846b4f7e5_amd64",
"product": {
"name": "oadp/oadp-velero-plugin-rhel8@sha256:d9a46e3da52db4880cde8faa6f5e406039e6f38585dd14dc97db4b5846b4f7e5_amd64",
"product_id": "oadp/oadp-velero-plugin-rhel8@sha256:d9a46e3da52db4880cde8faa6f5e406039e6f38585dd14dc97db4b5846b4f7e5_amd64",
"product_identification_helper": {
"purl": "pkg:oci/oadp-velero-plugin-rhel8@sha256:d9a46e3da52db4880cde8faa6f5e406039e6f38585dd14dc97db4b5846b4f7e5?arch=amd64\u0026repository_url=registry.redhat.io/oadp/oadp-velero-plugin-rhel8\u0026tag=1.0.7-2"
}
}
},
{
"category": "product_version",
"name": "oadp/oadp-velero-plugin-for-aws-rhel8@sha256:1792552893fe7f146f04033f342e9095f0068dd60e1f3a1e2dad9c5111dd28e6_amd64",
"product": {
"name": "oadp/oadp-velero-plugin-for-aws-rhel8@sha256:1792552893fe7f146f04033f342e9095f0068dd60e1f3a1e2dad9c5111dd28e6_amd64",
"product_id": "oadp/oadp-velero-plugin-for-aws-rhel8@sha256:1792552893fe7f146f04033f342e9095f0068dd60e1f3a1e2dad9c5111dd28e6_amd64",
"product_identification_helper": {
"purl": "pkg:oci/oadp-velero-plugin-for-aws-rhel8@sha256:1792552893fe7f146f04033f342e9095f0068dd60e1f3a1e2dad9c5111dd28e6?arch=amd64\u0026repository_url=registry.redhat.io/oadp/oadp-velero-plugin-for-aws-rhel8\u0026tag=1.0.7-2"
}
}
},
{
"category": "product_version",
"name": "oadp/oadp-velero-plugin-for-csi-rhel8@sha256:aed05c3b1e7eee9054ee45b499e2eb31a534979468ba22be46f83459d0dab4ae_amd64",
"product": {
"name": "oadp/oadp-velero-plugin-for-csi-rhel8@sha256:aed05c3b1e7eee9054ee45b499e2eb31a534979468ba22be46f83459d0dab4ae_amd64",
"product_id": "oadp/oadp-velero-plugin-for-csi-rhel8@sha256:aed05c3b1e7eee9054ee45b499e2eb31a534979468ba22be46f83459d0dab4ae_amd64",
"product_identification_helper": {
"purl": "pkg:oci/oadp-velero-plugin-for-csi-rhel8@sha256:aed05c3b1e7eee9054ee45b499e2eb31a534979468ba22be46f83459d0dab4ae?arch=amd64\u0026repository_url=registry.redhat.io/oadp/oadp-velero-plugin-for-csi-rhel8\u0026tag=1.0.7-2"
}
}
},
{
"category": "product_version",
"name": "oadp/oadp-velero-plugin-for-gcp-rhel8@sha256:82ebe14f59b19d628ecbe63a212ecaf4623a98a432b8b4525b118c6b24c87d90_amd64",
"product": {
"name": "oadp/oadp-velero-plugin-for-gcp-rhel8@sha256:82ebe14f59b19d628ecbe63a212ecaf4623a98a432b8b4525b118c6b24c87d90_amd64",
"product_id": "oadp/oadp-velero-plugin-for-gcp-rhel8@sha256:82ebe14f59b19d628ecbe63a212ecaf4623a98a432b8b4525b118c6b24c87d90_amd64",
"product_identification_helper": {
"purl": "pkg:oci/oadp-velero-plugin-for-gcp-rhel8@sha256:82ebe14f59b19d628ecbe63a212ecaf4623a98a432b8b4525b118c6b24c87d90?arch=amd64\u0026repository_url=registry.redhat.io/oadp/oadp-velero-plugin-for-gcp-rhel8\u0026tag=1.0.7-2"
}
}
},
{
"category": "product_version",
"name": "oadp/oadp-velero-plugin-for-microsoft-azure-rhel8@sha256:1200ba024b3301c4ea18817c81e06133a52bcc7565302ebf9aa4677080b64e56_amd64",
"product": {
"name": "oadp/oadp-velero-plugin-for-microsoft-azure-rhel8@sha256:1200ba024b3301c4ea18817c81e06133a52bcc7565302ebf9aa4677080b64e56_amd64",
"product_id": "oadp/oadp-velero-plugin-for-microsoft-azure-rhel8@sha256:1200ba024b3301c4ea18817c81e06133a52bcc7565302ebf9aa4677080b64e56_amd64",
"product_identification_helper": {
"purl": "pkg:oci/oadp-velero-plugin-for-microsoft-azure-rhel8@sha256:1200ba024b3301c4ea18817c81e06133a52bcc7565302ebf9aa4677080b64e56?arch=amd64\u0026repository_url=registry.redhat.io/oadp/oadp-velero-plugin-for-microsoft-azure-rhel8\u0026tag=1.0.7-2"
}
}
},
{
"category": "product_version",
"name": "oadp/oadp-velero-restic-restore-helper-rhel8@sha256:9fda0732f74519e71a4f10f10b32a451f01c3bf9eae37f7bd1ff90ad8baf3a9f_amd64",
"product": {
"name": "oadp/oadp-velero-restic-restore-helper-rhel8@sha256:9fda0732f74519e71a4f10f10b32a451f01c3bf9eae37f7bd1ff90ad8baf3a9f_amd64",
"product_id": "oadp/oadp-velero-restic-restore-helper-rhel8@sha256:9fda0732f74519e71a4f10f10b32a451f01c3bf9eae37f7bd1ff90ad8baf3a9f_amd64",
"product_identification_helper": {
"purl": "pkg:oci/oadp-velero-restic-restore-helper-rhel8@sha256:9fda0732f74519e71a4f10f10b32a451f01c3bf9eae37f7bd1ff90ad8baf3a9f?arch=amd64\u0026repository_url=registry.redhat.io/oadp/oadp-velero-restic-restore-helper-rhel8\u0026tag=1.0.7-5"
}
}
}
],
"category": "architecture",
"name": "amd64"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "oadp/oadp-kubevirt-velero-plugin-rhel8@sha256:3749d7386635cf598147d5021584672ab26761b9dca52ca05b179d47557ac549_amd64 as a component of 8Base-OADP-1.0",
"product_id": "8Base-OADP-1.0:oadp/oadp-kubevirt-velero-plugin-rhel8@sha256:3749d7386635cf598147d5021584672ab26761b9dca52ca05b179d47557ac549_amd64"
},
"product_reference": "oadp/oadp-kubevirt-velero-plugin-rhel8@sha256:3749d7386635cf598147d5021584672ab26761b9dca52ca05b179d47557ac549_amd64",
"relates_to_product_reference": "8Base-OADP-1.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "oadp/oadp-mustgather-rhel8@sha256:f269ee31bf0eb544ccabb2d72d807dc5d6587186d76bb020a00fac20221c7b0f_amd64 as a component of 8Base-OADP-1.0",
"product_id": "8Base-OADP-1.0:oadp/oadp-mustgather-rhel8@sha256:f269ee31bf0eb544ccabb2d72d807dc5d6587186d76bb020a00fac20221c7b0f_amd64"
},
"product_reference": "oadp/oadp-mustgather-rhel8@sha256:f269ee31bf0eb544ccabb2d72d807dc5d6587186d76bb020a00fac20221c7b0f_amd64",
"relates_to_product_reference": "8Base-OADP-1.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "oadp/oadp-operator-bundle@sha256:d0927b9f279ad60a073773ec624dc66db000b3d0b727254fbadb6af3a3c7b646_amd64 as a component of 8Base-OADP-1.0",
"product_id": "8Base-OADP-1.0:oadp/oadp-operator-bundle@sha256:d0927b9f279ad60a073773ec624dc66db000b3d0b727254fbadb6af3a3c7b646_amd64"
},
"product_reference": "oadp/oadp-operator-bundle@sha256:d0927b9f279ad60a073773ec624dc66db000b3d0b727254fbadb6af3a3c7b646_amd64",
"relates_to_product_reference": "8Base-OADP-1.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "oadp/oadp-registry-rhel8@sha256:ea215cbf22a37c2f2b77c9901dc5c7493f1f3a694276f42d11fcefbf045a8b38_amd64 as a component of 8Base-OADP-1.0",
"product_id": "8Base-OADP-1.0:oadp/oadp-registry-rhel8@sha256:ea215cbf22a37c2f2b77c9901dc5c7493f1f3a694276f42d11fcefbf045a8b38_amd64"
},
"product_reference": "oadp/oadp-registry-rhel8@sha256:ea215cbf22a37c2f2b77c9901dc5c7493f1f3a694276f42d11fcefbf045a8b38_amd64",
"relates_to_product_reference": "8Base-OADP-1.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "oadp/oadp-rhel8-operator@sha256:4d983585501df88bd5f602010cb72ea460982b25fa91c05a83f0b711a457661a_amd64 as a component of 8Base-OADP-1.0",
"product_id": "8Base-OADP-1.0:oadp/oadp-rhel8-operator@sha256:4d983585501df88bd5f602010cb72ea460982b25fa91c05a83f0b711a457661a_amd64"
},
"product_reference": "oadp/oadp-rhel8-operator@sha256:4d983585501df88bd5f602010cb72ea460982b25fa91c05a83f0b711a457661a_amd64",
"relates_to_product_reference": "8Base-OADP-1.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "oadp/oadp-velero-plugin-for-aws-rhel8@sha256:1792552893fe7f146f04033f342e9095f0068dd60e1f3a1e2dad9c5111dd28e6_amd64 as a component of 8Base-OADP-1.0",
"product_id": "8Base-OADP-1.0:oadp/oadp-velero-plugin-for-aws-rhel8@sha256:1792552893fe7f146f04033f342e9095f0068dd60e1f3a1e2dad9c5111dd28e6_amd64"
},
"product_reference": "oadp/oadp-velero-plugin-for-aws-rhel8@sha256:1792552893fe7f146f04033f342e9095f0068dd60e1f3a1e2dad9c5111dd28e6_amd64",
"relates_to_product_reference": "8Base-OADP-1.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "oadp/oadp-velero-plugin-for-csi-rhel8@sha256:aed05c3b1e7eee9054ee45b499e2eb31a534979468ba22be46f83459d0dab4ae_amd64 as a component of 8Base-OADP-1.0",
"product_id": "8Base-OADP-1.0:oadp/oadp-velero-plugin-for-csi-rhel8@sha256:aed05c3b1e7eee9054ee45b499e2eb31a534979468ba22be46f83459d0dab4ae_amd64"
},
"product_reference": "oadp/oadp-velero-plugin-for-csi-rhel8@sha256:aed05c3b1e7eee9054ee45b499e2eb31a534979468ba22be46f83459d0dab4ae_amd64",
"relates_to_product_reference": "8Base-OADP-1.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "oadp/oadp-velero-plugin-for-gcp-rhel8@sha256:82ebe14f59b19d628ecbe63a212ecaf4623a98a432b8b4525b118c6b24c87d90_amd64 as a component of 8Base-OADP-1.0",
"product_id": "8Base-OADP-1.0:oadp/oadp-velero-plugin-for-gcp-rhel8@sha256:82ebe14f59b19d628ecbe63a212ecaf4623a98a432b8b4525b118c6b24c87d90_amd64"
},
"product_reference": "oadp/oadp-velero-plugin-for-gcp-rhel8@sha256:82ebe14f59b19d628ecbe63a212ecaf4623a98a432b8b4525b118c6b24c87d90_amd64",
"relates_to_product_reference": "8Base-OADP-1.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "oadp/oadp-velero-plugin-for-microsoft-azure-rhel8@sha256:1200ba024b3301c4ea18817c81e06133a52bcc7565302ebf9aa4677080b64e56_amd64 as a component of 8Base-OADP-1.0",
"product_id": "8Base-OADP-1.0:oadp/oadp-velero-plugin-for-microsoft-azure-rhel8@sha256:1200ba024b3301c4ea18817c81e06133a52bcc7565302ebf9aa4677080b64e56_amd64"
},
"product_reference": "oadp/oadp-velero-plugin-for-microsoft-azure-rhel8@sha256:1200ba024b3301c4ea18817c81e06133a52bcc7565302ebf9aa4677080b64e56_amd64",
"relates_to_product_reference": "8Base-OADP-1.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "oadp/oadp-velero-plugin-rhel8@sha256:d9a46e3da52db4880cde8faa6f5e406039e6f38585dd14dc97db4b5846b4f7e5_amd64 as a component of 8Base-OADP-1.0",
"product_id": "8Base-OADP-1.0:oadp/oadp-velero-plugin-rhel8@sha256:d9a46e3da52db4880cde8faa6f5e406039e6f38585dd14dc97db4b5846b4f7e5_amd64"
},
"product_reference": "oadp/oadp-velero-plugin-rhel8@sha256:d9a46e3da52db4880cde8faa6f5e406039e6f38585dd14dc97db4b5846b4f7e5_amd64",
"relates_to_product_reference": "8Base-OADP-1.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "oadp/oadp-velero-restic-restore-helper-rhel8@sha256:9fda0732f74519e71a4f10f10b32a451f01c3bf9eae37f7bd1ff90ad8baf3a9f_amd64 as a component of 8Base-OADP-1.0",
"product_id": "8Base-OADP-1.0:oadp/oadp-velero-restic-restore-helper-rhel8@sha256:9fda0732f74519e71a4f10f10b32a451f01c3bf9eae37f7bd1ff90ad8baf3a9f_amd64"
},
"product_reference": "oadp/oadp-velero-restic-restore-helper-rhel8@sha256:9fda0732f74519e71a4f10f10b32a451f01c3bf9eae37f7bd1ff90ad8baf3a9f_amd64",
"relates_to_product_reference": "8Base-OADP-1.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "oadp/oadp-velero-rhel8@sha256:a5973be01956a09f75bcd65481d484c12fd7bcefad5b852fd0567f6d8b51f0be_amd64 as a component of 8Base-OADP-1.0",
"product_id": "8Base-OADP-1.0:oadp/oadp-velero-rhel8@sha256:a5973be01956a09f75bcd65481d484c12fd7bcefad5b852fd0567f6d8b51f0be_amd64"
},
"product_reference": "oadp/oadp-velero-rhel8@sha256:a5973be01956a09f75bcd65481d484c12fd7bcefad5b852fd0567f6d8b51f0be_amd64",
"relates_to_product_reference": "8Base-OADP-1.0"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2022-32149",
"cwe": {
"id": "CWE-407",
"name": "Inefficient Algorithmic Complexity"
},
"discovery_date": "2022-10-12T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-OADP-1.0:oadp/oadp-kubevirt-velero-plugin-rhel8@sha256:3749d7386635cf598147d5021584672ab26761b9dca52ca05b179d47557ac549_amd64",
"8Base-OADP-1.0:oadp/oadp-mustgather-rhel8@sha256:f269ee31bf0eb544ccabb2d72d807dc5d6587186d76bb020a00fac20221c7b0f_amd64",
"8Base-OADP-1.0:oadp/oadp-operator-bundle@sha256:d0927b9f279ad60a073773ec624dc66db000b3d0b727254fbadb6af3a3c7b646_amd64",
"8Base-OADP-1.0:oadp/oadp-registry-rhel8@sha256:ea215cbf22a37c2f2b77c9901dc5c7493f1f3a694276f42d11fcefbf045a8b38_amd64",
"8Base-OADP-1.0:oadp/oadp-rhel8-operator@sha256:4d983585501df88bd5f602010cb72ea460982b25fa91c05a83f0b711a457661a_amd64",
"8Base-OADP-1.0:oadp/oadp-velero-plugin-for-aws-rhel8@sha256:1792552893fe7f146f04033f342e9095f0068dd60e1f3a1e2dad9c5111dd28e6_amd64",
"8Base-OADP-1.0:oadp/oadp-velero-plugin-for-csi-rhel8@sha256:aed05c3b1e7eee9054ee45b499e2eb31a534979468ba22be46f83459d0dab4ae_amd64",
"8Base-OADP-1.0:oadp/oadp-velero-plugin-for-gcp-rhel8@sha256:82ebe14f59b19d628ecbe63a212ecaf4623a98a432b8b4525b118c6b24c87d90_amd64",
"8Base-OADP-1.0:oadp/oadp-velero-plugin-for-microsoft-azure-rhel8@sha256:1200ba024b3301c4ea18817c81e06133a52bcc7565302ebf9aa4677080b64e56_amd64",
"8Base-OADP-1.0:oadp/oadp-velero-plugin-rhel8@sha256:d9a46e3da52db4880cde8faa6f5e406039e6f38585dd14dc97db4b5846b4f7e5_amd64",
"8Base-OADP-1.0:oadp/oadp-velero-restic-restore-helper-rhel8@sha256:9fda0732f74519e71a4f10f10b32a451f01c3bf9eae37f7bd1ff90ad8baf3a9f_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2134010"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in the golang.org/x/text/language package. An attacker can craft an Accept-Language header which ParseAcceptLanguage will take significant time to parse. This issue leads to a denial of service, and can impact availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: golang.org/x/text/language: ParseAcceptLanguage takes a long time to parse complex tags",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-OADP-1.0:oadp/oadp-velero-rhel8@sha256:a5973be01956a09f75bcd65481d484c12fd7bcefad5b852fd0567f6d8b51f0be_amd64"
],
"known_not_affected": [
"8Base-OADP-1.0:oadp/oadp-kubevirt-velero-plugin-rhel8@sha256:3749d7386635cf598147d5021584672ab26761b9dca52ca05b179d47557ac549_amd64",
"8Base-OADP-1.0:oadp/oadp-mustgather-rhel8@sha256:f269ee31bf0eb544ccabb2d72d807dc5d6587186d76bb020a00fac20221c7b0f_amd64",
"8Base-OADP-1.0:oadp/oadp-operator-bundle@sha256:d0927b9f279ad60a073773ec624dc66db000b3d0b727254fbadb6af3a3c7b646_amd64",
"8Base-OADP-1.0:oadp/oadp-registry-rhel8@sha256:ea215cbf22a37c2f2b77c9901dc5c7493f1f3a694276f42d11fcefbf045a8b38_amd64",
"8Base-OADP-1.0:oadp/oadp-rhel8-operator@sha256:4d983585501df88bd5f602010cb72ea460982b25fa91c05a83f0b711a457661a_amd64",
"8Base-OADP-1.0:oadp/oadp-velero-plugin-for-aws-rhel8@sha256:1792552893fe7f146f04033f342e9095f0068dd60e1f3a1e2dad9c5111dd28e6_amd64",
"8Base-OADP-1.0:oadp/oadp-velero-plugin-for-csi-rhel8@sha256:aed05c3b1e7eee9054ee45b499e2eb31a534979468ba22be46f83459d0dab4ae_amd64",
"8Base-OADP-1.0:oadp/oadp-velero-plugin-for-gcp-rhel8@sha256:82ebe14f59b19d628ecbe63a212ecaf4623a98a432b8b4525b118c6b24c87d90_amd64",
"8Base-OADP-1.0:oadp/oadp-velero-plugin-for-microsoft-azure-rhel8@sha256:1200ba024b3301c4ea18817c81e06133a52bcc7565302ebf9aa4677080b64e56_amd64",
"8Base-OADP-1.0:oadp/oadp-velero-plugin-rhel8@sha256:d9a46e3da52db4880cde8faa6f5e406039e6f38585dd14dc97db4b5846b4f7e5_amd64",
"8Base-OADP-1.0:oadp/oadp-velero-restic-restore-helper-rhel8@sha256:9fda0732f74519e71a4f10f10b32a451f01c3bf9eae37f7bd1ff90ad8baf3a9f_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-32149"
},
{
"category": "external",
"summary": "RHBZ#2134010",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2134010"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-32149",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32149"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-32149",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-32149"
},
{
"category": "external",
"summary": "https://go.dev/issue/56152",
"url": "https://go.dev/issue/56152"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-dev/c/qfPIly0X7aU",
"url": "https://groups.google.com/g/golang-dev/c/qfPIly0X7aU"
}
],
"release_date": "2022-10-11T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-02-09T01:07:26+00:00",
"details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"8Base-OADP-1.0:oadp/oadp-velero-rhel8@sha256:a5973be01956a09f75bcd65481d484c12fd7bcefad5b852fd0567f6d8b51f0be_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:0692"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"8Base-OADP-1.0:oadp/oadp-kubevirt-velero-plugin-rhel8@sha256:3749d7386635cf598147d5021584672ab26761b9dca52ca05b179d47557ac549_amd64",
"8Base-OADP-1.0:oadp/oadp-mustgather-rhel8@sha256:f269ee31bf0eb544ccabb2d72d807dc5d6587186d76bb020a00fac20221c7b0f_amd64",
"8Base-OADP-1.0:oadp/oadp-operator-bundle@sha256:d0927b9f279ad60a073773ec624dc66db000b3d0b727254fbadb6af3a3c7b646_amd64",
"8Base-OADP-1.0:oadp/oadp-registry-rhel8@sha256:ea215cbf22a37c2f2b77c9901dc5c7493f1f3a694276f42d11fcefbf045a8b38_amd64",
"8Base-OADP-1.0:oadp/oadp-rhel8-operator@sha256:4d983585501df88bd5f602010cb72ea460982b25fa91c05a83f0b711a457661a_amd64",
"8Base-OADP-1.0:oadp/oadp-velero-plugin-for-aws-rhel8@sha256:1792552893fe7f146f04033f342e9095f0068dd60e1f3a1e2dad9c5111dd28e6_amd64",
"8Base-OADP-1.0:oadp/oadp-velero-plugin-for-csi-rhel8@sha256:aed05c3b1e7eee9054ee45b499e2eb31a534979468ba22be46f83459d0dab4ae_amd64",
"8Base-OADP-1.0:oadp/oadp-velero-plugin-for-gcp-rhel8@sha256:82ebe14f59b19d628ecbe63a212ecaf4623a98a432b8b4525b118c6b24c87d90_amd64",
"8Base-OADP-1.0:oadp/oadp-velero-plugin-for-microsoft-azure-rhel8@sha256:1200ba024b3301c4ea18817c81e06133a52bcc7565302ebf9aa4677080b64e56_amd64",
"8Base-OADP-1.0:oadp/oadp-velero-plugin-rhel8@sha256:d9a46e3da52db4880cde8faa6f5e406039e6f38585dd14dc97db4b5846b4f7e5_amd64",
"8Base-OADP-1.0:oadp/oadp-velero-restic-restore-helper-rhel8@sha256:9fda0732f74519e71a4f10f10b32a451f01c3bf9eae37f7bd1ff90ad8baf3a9f_amd64",
"8Base-OADP-1.0:oadp/oadp-velero-rhel8@sha256:a5973be01956a09f75bcd65481d484c12fd7bcefad5b852fd0567f6d8b51f0be_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "golang: golang.org/x/text/language: ParseAcceptLanguage takes a long time to parse complex tags"
},
{
"cve": "CVE-2022-41717",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"discovery_date": "2023-01-16T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-OADP-1.0:oadp/oadp-kubevirt-velero-plugin-rhel8@sha256:3749d7386635cf598147d5021584672ab26761b9dca52ca05b179d47557ac549_amd64",
"8Base-OADP-1.0:oadp/oadp-mustgather-rhel8@sha256:f269ee31bf0eb544ccabb2d72d807dc5d6587186d76bb020a00fac20221c7b0f_amd64",
"8Base-OADP-1.0:oadp/oadp-operator-bundle@sha256:d0927b9f279ad60a073773ec624dc66db000b3d0b727254fbadb6af3a3c7b646_amd64",
"8Base-OADP-1.0:oadp/oadp-rhel8-operator@sha256:4d983585501df88bd5f602010cb72ea460982b25fa91c05a83f0b711a457661a_amd64",
"8Base-OADP-1.0:oadp/oadp-velero-plugin-for-aws-rhel8@sha256:1792552893fe7f146f04033f342e9095f0068dd60e1f3a1e2dad9c5111dd28e6_amd64",
"8Base-OADP-1.0:oadp/oadp-velero-plugin-for-csi-rhel8@sha256:aed05c3b1e7eee9054ee45b499e2eb31a534979468ba22be46f83459d0dab4ae_amd64",
"8Base-OADP-1.0:oadp/oadp-velero-plugin-for-gcp-rhel8@sha256:82ebe14f59b19d628ecbe63a212ecaf4623a98a432b8b4525b118c6b24c87d90_amd64",
"8Base-OADP-1.0:oadp/oadp-velero-plugin-for-microsoft-azure-rhel8@sha256:1200ba024b3301c4ea18817c81e06133a52bcc7565302ebf9aa4677080b64e56_amd64",
"8Base-OADP-1.0:oadp/oadp-velero-plugin-rhel8@sha256:d9a46e3da52db4880cde8faa6f5e406039e6f38585dd14dc97db4b5846b4f7e5_amd64",
"8Base-OADP-1.0:oadp/oadp-velero-restic-restore-helper-rhel8@sha256:9fda0732f74519e71a4f10f10b32a451f01c3bf9eae37f7bd1ff90ad8baf3a9f_amd64",
"8Base-OADP-1.0:oadp/oadp-velero-rhel8@sha256:a5973be01956a09f75bcd65481d484c12fd7bcefad5b852fd0567f6d8b51f0be_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2161274"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the net/http library of the golang package. This flaw allows an attacker to cause excessive memory growth in a Go server accepting HTTP/2 requests. HTTP/2 server connections contain a cache of HTTP header keys sent by the client. While the total number of entries in this cache is capped, an attacker sending very large keys can cause the server to allocate approximately 64 MiB per open connection.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: net/http: excessive memory growth in a Go server accepting HTTP/2 requests",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Within Red Hat OpenShift Container Platform, the grafana container is listed as will not fix. Since OCP 4.10, Grafana itself is not shipped and the Grafana web server is protected behind an OAuth proxy server.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-OADP-1.0:oadp/oadp-registry-rhel8@sha256:ea215cbf22a37c2f2b77c9901dc5c7493f1f3a694276f42d11fcefbf045a8b38_amd64"
],
"known_not_affected": [
"8Base-OADP-1.0:oadp/oadp-kubevirt-velero-plugin-rhel8@sha256:3749d7386635cf598147d5021584672ab26761b9dca52ca05b179d47557ac549_amd64",
"8Base-OADP-1.0:oadp/oadp-mustgather-rhel8@sha256:f269ee31bf0eb544ccabb2d72d807dc5d6587186d76bb020a00fac20221c7b0f_amd64",
"8Base-OADP-1.0:oadp/oadp-operator-bundle@sha256:d0927b9f279ad60a073773ec624dc66db000b3d0b727254fbadb6af3a3c7b646_amd64",
"8Base-OADP-1.0:oadp/oadp-rhel8-operator@sha256:4d983585501df88bd5f602010cb72ea460982b25fa91c05a83f0b711a457661a_amd64",
"8Base-OADP-1.0:oadp/oadp-velero-plugin-for-aws-rhel8@sha256:1792552893fe7f146f04033f342e9095f0068dd60e1f3a1e2dad9c5111dd28e6_amd64",
"8Base-OADP-1.0:oadp/oadp-velero-plugin-for-csi-rhel8@sha256:aed05c3b1e7eee9054ee45b499e2eb31a534979468ba22be46f83459d0dab4ae_amd64",
"8Base-OADP-1.0:oadp/oadp-velero-plugin-for-gcp-rhel8@sha256:82ebe14f59b19d628ecbe63a212ecaf4623a98a432b8b4525b118c6b24c87d90_amd64",
"8Base-OADP-1.0:oadp/oadp-velero-plugin-for-microsoft-azure-rhel8@sha256:1200ba024b3301c4ea18817c81e06133a52bcc7565302ebf9aa4677080b64e56_amd64",
"8Base-OADP-1.0:oadp/oadp-velero-plugin-rhel8@sha256:d9a46e3da52db4880cde8faa6f5e406039e6f38585dd14dc97db4b5846b4f7e5_amd64",
"8Base-OADP-1.0:oadp/oadp-velero-restic-restore-helper-rhel8@sha256:9fda0732f74519e71a4f10f10b32a451f01c3bf9eae37f7bd1ff90ad8baf3a9f_amd64",
"8Base-OADP-1.0:oadp/oadp-velero-rhel8@sha256:a5973be01956a09f75bcd65481d484c12fd7bcefad5b852fd0567f6d8b51f0be_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-41717"
},
{
"category": "external",
"summary": "RHBZ#2161274",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2161274"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-41717",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41717"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-41717",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-41717"
},
{
"category": "external",
"summary": "https://go.dev/cl/455635",
"url": "https://go.dev/cl/455635"
},
{
"category": "external",
"summary": "https://go.dev/cl/455717",
"url": "https://go.dev/cl/455717"
},
{
"category": "external",
"summary": "https://go.dev/issue/56350",
"url": "https://go.dev/issue/56350"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/L_3rmdT0BMU/m/yZDrXjIiBQAJ",
"url": "https://groups.google.com/g/golang-announce/c/L_3rmdT0BMU/m/yZDrXjIiBQAJ"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2022-1144",
"url": "https://pkg.go.dev/vuln/GO-2022-1144"
}
],
"release_date": "2022-11-30T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-02-09T01:07:26+00:00",
"details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"8Base-OADP-1.0:oadp/oadp-registry-rhel8@sha256:ea215cbf22a37c2f2b77c9901dc5c7493f1f3a694276f42d11fcefbf045a8b38_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:0692"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"8Base-OADP-1.0:oadp/oadp-kubevirt-velero-plugin-rhel8@sha256:3749d7386635cf598147d5021584672ab26761b9dca52ca05b179d47557ac549_amd64",
"8Base-OADP-1.0:oadp/oadp-mustgather-rhel8@sha256:f269ee31bf0eb544ccabb2d72d807dc5d6587186d76bb020a00fac20221c7b0f_amd64",
"8Base-OADP-1.0:oadp/oadp-operator-bundle@sha256:d0927b9f279ad60a073773ec624dc66db000b3d0b727254fbadb6af3a3c7b646_amd64",
"8Base-OADP-1.0:oadp/oadp-registry-rhel8@sha256:ea215cbf22a37c2f2b77c9901dc5c7493f1f3a694276f42d11fcefbf045a8b38_amd64",
"8Base-OADP-1.0:oadp/oadp-rhel8-operator@sha256:4d983585501df88bd5f602010cb72ea460982b25fa91c05a83f0b711a457661a_amd64",
"8Base-OADP-1.0:oadp/oadp-velero-plugin-for-aws-rhel8@sha256:1792552893fe7f146f04033f342e9095f0068dd60e1f3a1e2dad9c5111dd28e6_amd64",
"8Base-OADP-1.0:oadp/oadp-velero-plugin-for-csi-rhel8@sha256:aed05c3b1e7eee9054ee45b499e2eb31a534979468ba22be46f83459d0dab4ae_amd64",
"8Base-OADP-1.0:oadp/oadp-velero-plugin-for-gcp-rhel8@sha256:82ebe14f59b19d628ecbe63a212ecaf4623a98a432b8b4525b118c6b24c87d90_amd64",
"8Base-OADP-1.0:oadp/oadp-velero-plugin-for-microsoft-azure-rhel8@sha256:1200ba024b3301c4ea18817c81e06133a52bcc7565302ebf9aa4677080b64e56_amd64",
"8Base-OADP-1.0:oadp/oadp-velero-plugin-rhel8@sha256:d9a46e3da52db4880cde8faa6f5e406039e6f38585dd14dc97db4b5846b4f7e5_amd64",
"8Base-OADP-1.0:oadp/oadp-velero-restic-restore-helper-rhel8@sha256:9fda0732f74519e71a4f10f10b32a451f01c3bf9eae37f7bd1ff90ad8baf3a9f_amd64",
"8Base-OADP-1.0:oadp/oadp-velero-rhel8@sha256:a5973be01956a09f75bcd65481d484c12fd7bcefad5b852fd0567f6d8b51f0be_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "golang: net/http: excessive memory growth in a Go server accepting HTTP/2 requests"
}
]
}
RHSA-2022:7434
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Logging Subsystem 5.5.4 - Red Hat OpenShift\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Logging Subsystem 5.5.4 - Red Hat OpenShift\n\nSecurity Fix(es):\n\n* golang: golang.org/x/text/language: ParseAcceptLanguage takes a long time to parse complex tags (CVE-2022-32149)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2022:7434",
"url": "https://access.redhat.com/errata/RHSA-2022:7434"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#moderate",
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "2134010",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2134010"
},
{
"category": "external",
"summary": "LOG-2674",
"url": "https://issues.redhat.com/browse/LOG-2674"
},
{
"category": "external",
"summary": "LOG-3042",
"url": "https://issues.redhat.com/browse/LOG-3042"
},
{
"category": "external",
"summary": "LOG-3049",
"url": "https://issues.redhat.com/browse/LOG-3049"
},
{
"category": "external",
"summary": "LOG-3127",
"url": "https://issues.redhat.com/browse/LOG-3127"
},
{
"category": "external",
"summary": "LOG-3138",
"url": "https://issues.redhat.com/browse/LOG-3138"
},
{
"category": "external",
"summary": "LOG-3175",
"url": "https://issues.redhat.com/browse/LOG-3175"
},
{
"category": "external",
"summary": "LOG-3213",
"url": "https://issues.redhat.com/browse/LOG-3213"
},
{
"category": "external",
"summary": "LOG-3234",
"url": "https://issues.redhat.com/browse/LOG-3234"
},
{
"category": "external",
"summary": "LOG-3251",
"url": "https://issues.redhat.com/browse/LOG-3251"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2022/rhsa-2022_7434.json"
}
],
"title": "Red Hat Security Advisory: Logging Subsystem 5.5.4 - Red Hat OpenShift security update",
"tracking": {
"current_release_date": "2025-10-10T01:53:21+00:00",
"generator": {
"date": "2025-10-10T01:53:21+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.9"
}
},
"id": "RHSA-2022:7434",
"initial_release_date": "2022-11-10T03:50:23+00:00",
"revision_history": [
{
"date": "2022-11-10T03:50:23+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2022-11-10T03:50:23+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-10-10T01:53:21+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "RHOL 5.5 for RHEL 8",
"product": {
"name": "RHOL 5.5 for RHEL 8",
"product_id": "8Base-RHOL-5.5",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:logging:5.5::el8"
}
}
}
],
"category": "product_family",
"name": "logging for Red Hat OpenShift"
},
{
"branches": [
{
"category": "product_version",
"name": "openshift-logging/cluster-logging-rhel8-operator@sha256:07ab076aa9b573d330ace59bf4de080ea64dbc7b3424357fc39c0c70ede27873_arm64",
"product": {
"name": "openshift-logging/cluster-logging-rhel8-operator@sha256:07ab076aa9b573d330ace59bf4de080ea64dbc7b3424357fc39c0c70ede27873_arm64",
"product_id": "openshift-logging/cluster-logging-rhel8-operator@sha256:07ab076aa9b573d330ace59bf4de080ea64dbc7b3424357fc39c0c70ede27873_arm64",
"product_identification_helper": {
"purl": "pkg:oci/cluster-logging-rhel8-operator@sha256:07ab076aa9b573d330ace59bf4de080ea64dbc7b3424357fc39c0c70ede27873?arch=arm64\u0026repository_url=registry.redhat.io/openshift-logging/cluster-logging-rhel8-operator\u0026tag=v5.5.4-7"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/elasticsearch-rhel8-operator@sha256:dce08ac53092fc51958b78df9b4b870926a079fe4cdc4fb2d46c8ba545a22e6a_arm64",
"product": {
"name": "openshift-logging/elasticsearch-rhel8-operator@sha256:dce08ac53092fc51958b78df9b4b870926a079fe4cdc4fb2d46c8ba545a22e6a_arm64",
"product_id": "openshift-logging/elasticsearch-rhel8-operator@sha256:dce08ac53092fc51958b78df9b4b870926a079fe4cdc4fb2d46c8ba545a22e6a_arm64",
"product_identification_helper": {
"purl": "pkg:oci/elasticsearch-rhel8-operator@sha256:dce08ac53092fc51958b78df9b4b870926a079fe4cdc4fb2d46c8ba545a22e6a?arch=arm64\u0026repository_url=registry.redhat.io/openshift-logging/elasticsearch-rhel8-operator\u0026tag=v5.5.4-3"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/elasticsearch-proxy-rhel8@sha256:a6c03fd0fe66206bff59ba019cc60085de4c65d4efae8a637f1ac48b91688371_arm64",
"product": {
"name": "openshift-logging/elasticsearch-proxy-rhel8@sha256:a6c03fd0fe66206bff59ba019cc60085de4c65d4efae8a637f1ac48b91688371_arm64",
"product_id": "openshift-logging/elasticsearch-proxy-rhel8@sha256:a6c03fd0fe66206bff59ba019cc60085de4c65d4efae8a637f1ac48b91688371_arm64",
"product_identification_helper": {
"purl": "pkg:oci/elasticsearch-proxy-rhel8@sha256:a6c03fd0fe66206bff59ba019cc60085de4c65d4efae8a637f1ac48b91688371?arch=arm64\u0026repository_url=registry.redhat.io/openshift-logging/elasticsearch-proxy-rhel8\u0026tag=v1.0.0-303"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/log-file-metric-exporter-rhel8@sha256:f0ca78341daa3d41ffe460f5aa504219c72ee673dd57a82f344d3239b69717be_arm64",
"product": {
"name": "openshift-logging/log-file-metric-exporter-rhel8@sha256:f0ca78341daa3d41ffe460f5aa504219c72ee673dd57a82f344d3239b69717be_arm64",
"product_id": "openshift-logging/log-file-metric-exporter-rhel8@sha256:f0ca78341daa3d41ffe460f5aa504219c72ee673dd57a82f344d3239b69717be_arm64",
"product_identification_helper": {
"purl": "pkg:oci/log-file-metric-exporter-rhel8@sha256:f0ca78341daa3d41ffe460f5aa504219c72ee673dd57a82f344d3239b69717be?arch=arm64\u0026repository_url=registry.redhat.io/openshift-logging/log-file-metric-exporter-rhel8\u0026tag=v1.1.0-71"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/logging-curator5-rhel8@sha256:c8ea484f5e15b7b53941f251db9b5be08c8cb6f3a14d99285277d9eadf969e98_arm64",
"product": {
"name": "openshift-logging/logging-curator5-rhel8@sha256:c8ea484f5e15b7b53941f251db9b5be08c8cb6f3a14d99285277d9eadf969e98_arm64",
"product_id": "openshift-logging/logging-curator5-rhel8@sha256:c8ea484f5e15b7b53941f251db9b5be08c8cb6f3a14d99285277d9eadf969e98_arm64",
"product_identification_helper": {
"purl": "pkg:oci/logging-curator5-rhel8@sha256:c8ea484f5e15b7b53941f251db9b5be08c8cb6f3a14d99285277d9eadf969e98?arch=arm64\u0026repository_url=registry.redhat.io/openshift-logging/logging-curator5-rhel8\u0026tag=v5.8.1-245"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/elasticsearch6-rhel8@sha256:6dfb5e18aa3dc6ce8e2535e13de1d53eea68b218854971e0eb594f677f6da7c7_arm64",
"product": {
"name": "openshift-logging/elasticsearch6-rhel8@sha256:6dfb5e18aa3dc6ce8e2535e13de1d53eea68b218854971e0eb594f677f6da7c7_arm64",
"product_id": "openshift-logging/elasticsearch6-rhel8@sha256:6dfb5e18aa3dc6ce8e2535e13de1d53eea68b218854971e0eb594f677f6da7c7_arm64",
"product_identification_helper": {
"purl": "pkg:oci/elasticsearch6-rhel8@sha256:6dfb5e18aa3dc6ce8e2535e13de1d53eea68b218854971e0eb594f677f6da7c7?arch=arm64\u0026repository_url=registry.redhat.io/openshift-logging/elasticsearch6-rhel8\u0026tag=v6.8.1-264"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/eventrouter-rhel8@sha256:0590711175be3b10f646256407cb7d72df63333589d527199260f738a91f2e3d_arm64",
"product": {
"name": "openshift-logging/eventrouter-rhel8@sha256:0590711175be3b10f646256407cb7d72df63333589d527199260f738a91f2e3d_arm64",
"product_id": "openshift-logging/eventrouter-rhel8@sha256:0590711175be3b10f646256407cb7d72df63333589d527199260f738a91f2e3d_arm64",
"product_identification_helper": {
"purl": "pkg:oci/eventrouter-rhel8@sha256:0590711175be3b10f646256407cb7d72df63333589d527199260f738a91f2e3d?arch=arm64\u0026repository_url=registry.redhat.io/openshift-logging/eventrouter-rhel8\u0026tag=v0.4.0-52"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/fluentd-rhel8@sha256:3d4b83f86b2d2f1c73ab184a3471d0d4da04bb6e76487c9f546da87998e480dc_arm64",
"product": {
"name": "openshift-logging/fluentd-rhel8@sha256:3d4b83f86b2d2f1c73ab184a3471d0d4da04bb6e76487c9f546da87998e480dc_arm64",
"product_id": "openshift-logging/fluentd-rhel8@sha256:3d4b83f86b2d2f1c73ab184a3471d0d4da04bb6e76487c9f546da87998e480dc_arm64",
"product_identification_helper": {
"purl": "pkg:oci/fluentd-rhel8@sha256:3d4b83f86b2d2f1c73ab184a3471d0d4da04bb6e76487c9f546da87998e480dc?arch=arm64\u0026repository_url=registry.redhat.io/openshift-logging/fluentd-rhel8\u0026tag=v1.14.6-61"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/kibana6-rhel8@sha256:ca4f273fb088980bfcc3607bd7ea2d40cc93298262cb3f5ce4054a6235152d1e_arm64",
"product": {
"name": "openshift-logging/kibana6-rhel8@sha256:ca4f273fb088980bfcc3607bd7ea2d40cc93298262cb3f5ce4054a6235152d1e_arm64",
"product_id": "openshift-logging/kibana6-rhel8@sha256:ca4f273fb088980bfcc3607bd7ea2d40cc93298262cb3f5ce4054a6235152d1e_arm64",
"product_identification_helper": {
"purl": "pkg:oci/kibana6-rhel8@sha256:ca4f273fb088980bfcc3607bd7ea2d40cc93298262cb3f5ce4054a6235152d1e?arch=arm64\u0026repository_url=registry.redhat.io/openshift-logging/kibana6-rhel8\u0026tag=v6.8.1-301"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/logging-loki-rhel8@sha256:dd5e5a043befc54eeb63ff51a01691778053c90de5c9b8946d6a1d808fbcf0df_arm64",
"product": {
"name": "openshift-logging/logging-loki-rhel8@sha256:dd5e5a043befc54eeb63ff51a01691778053c90de5c9b8946d6a1d808fbcf0df_arm64",
"product_id": "openshift-logging/logging-loki-rhel8@sha256:dd5e5a043befc54eeb63ff51a01691778053c90de5c9b8946d6a1d808fbcf0df_arm64",
"product_identification_helper": {
"purl": "pkg:oci/logging-loki-rhel8@sha256:dd5e5a043befc54eeb63ff51a01691778053c90de5c9b8946d6a1d808fbcf0df?arch=arm64\u0026repository_url=registry.redhat.io/openshift-logging/logging-loki-rhel8\u0026tag=v2.6.1-21"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/vector-rhel8@sha256:6c8b9e91e4d527bc0694879c7ce908e3d67877fd53191b71af95191cc0149afa_arm64",
"product": {
"name": "openshift-logging/vector-rhel8@sha256:6c8b9e91e4d527bc0694879c7ce908e3d67877fd53191b71af95191cc0149afa_arm64",
"product_id": "openshift-logging/vector-rhel8@sha256:6c8b9e91e4d527bc0694879c7ce908e3d67877fd53191b71af95191cc0149afa_arm64",
"product_identification_helper": {
"purl": "pkg:oci/vector-rhel8@sha256:6c8b9e91e4d527bc0694879c7ce908e3d67877fd53191b71af95191cc0149afa?arch=arm64\u0026repository_url=registry.redhat.io/openshift-logging/vector-rhel8\u0026tag=v0.21.0-34"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/logging-view-plugin-rhel8@sha256:147676e1a3c66757508be0046c28ccb7985f15af7f8f4a045fa5ca424c0c684d_arm64",
"product": {
"name": "openshift-logging/logging-view-plugin-rhel8@sha256:147676e1a3c66757508be0046c28ccb7985f15af7f8f4a045fa5ca424c0c684d_arm64",
"product_id": "openshift-logging/logging-view-plugin-rhel8@sha256:147676e1a3c66757508be0046c28ccb7985f15af7f8f4a045fa5ca424c0c684d_arm64",
"product_identification_helper": {
"purl": "pkg:oci/logging-view-plugin-rhel8@sha256:147676e1a3c66757508be0046c28ccb7985f15af7f8f4a045fa5ca424c0c684d?arch=arm64\u0026repository_url=registry.redhat.io/openshift-logging/logging-view-plugin-rhel8\u0026tag=v5.5.4-2"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/loki-rhel8-operator@sha256:dfa4ca06abb576fa071fb30c425bc6be631c0453939de562e1dc0b4e76de4f81_arm64",
"product": {
"name": "openshift-logging/loki-rhel8-operator@sha256:dfa4ca06abb576fa071fb30c425bc6be631c0453939de562e1dc0b4e76de4f81_arm64",
"product_id": "openshift-logging/loki-rhel8-operator@sha256:dfa4ca06abb576fa071fb30c425bc6be631c0453939de562e1dc0b4e76de4f81_arm64",
"product_identification_helper": {
"purl": "pkg:oci/loki-rhel8-operator@sha256:dfa4ca06abb576fa071fb30c425bc6be631c0453939de562e1dc0b4e76de4f81?arch=arm64\u0026repository_url=registry.redhat.io/openshift-logging/loki-rhel8-operator\u0026tag=v5.5.4-4"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/lokistack-gateway-rhel8@sha256:0a3eb7a1a50b75528be737eb2768e671a643eea324c967a0381296b61f8e399e_arm64",
"product": {
"name": "openshift-logging/lokistack-gateway-rhel8@sha256:0a3eb7a1a50b75528be737eb2768e671a643eea324c967a0381296b61f8e399e_arm64",
"product_id": "openshift-logging/lokistack-gateway-rhel8@sha256:0a3eb7a1a50b75528be737eb2768e671a643eea324c967a0381296b61f8e399e_arm64",
"product_identification_helper": {
"purl": "pkg:oci/lokistack-gateway-rhel8@sha256:0a3eb7a1a50b75528be737eb2768e671a643eea324c967a0381296b61f8e399e?arch=arm64\u0026repository_url=registry.redhat.io/openshift-logging/lokistack-gateway-rhel8\u0026tag=v0.1.0-57"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/opa-openshift-rhel8@sha256:c8458b60077d018eaa78f38fc0b85786d8108b88faea6e420cc01b720f23af48_arm64",
"product": {
"name": "openshift-logging/opa-openshift-rhel8@sha256:c8458b60077d018eaa78f38fc0b85786d8108b88faea6e420cc01b720f23af48_arm64",
"product_id": "openshift-logging/opa-openshift-rhel8@sha256:c8458b60077d018eaa78f38fc0b85786d8108b88faea6e420cc01b720f23af48_arm64",
"product_identification_helper": {
"purl": "pkg:oci/opa-openshift-rhel8@sha256:c8458b60077d018eaa78f38fc0b85786d8108b88faea6e420cc01b720f23af48?arch=arm64\u0026repository_url=registry.redhat.io/openshift-logging/opa-openshift-rhel8\u0026tag=v0.1.0-27"
}
}
}
],
"category": "architecture",
"name": "arm64"
},
{
"branches": [
{
"category": "product_version",
"name": "openshift-logging/cluster-logging-rhel8-operator@sha256:b4eeab42904e5a81e7adb8801bd901a53a5b81b2464b33816c203daf7587f89f_ppc64le",
"product": {
"name": "openshift-logging/cluster-logging-rhel8-operator@sha256:b4eeab42904e5a81e7adb8801bd901a53a5b81b2464b33816c203daf7587f89f_ppc64le",
"product_id": "openshift-logging/cluster-logging-rhel8-operator@sha256:b4eeab42904e5a81e7adb8801bd901a53a5b81b2464b33816c203daf7587f89f_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/cluster-logging-rhel8-operator@sha256:b4eeab42904e5a81e7adb8801bd901a53a5b81b2464b33816c203daf7587f89f?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-logging/cluster-logging-rhel8-operator\u0026tag=v5.5.4-7"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/elasticsearch-rhel8-operator@sha256:64954ce7d233d6c109e46645cd8d55d8a06068328ce3a22f646ede7c9fde78c8_ppc64le",
"product": {
"name": "openshift-logging/elasticsearch-rhel8-operator@sha256:64954ce7d233d6c109e46645cd8d55d8a06068328ce3a22f646ede7c9fde78c8_ppc64le",
"product_id": "openshift-logging/elasticsearch-rhel8-operator@sha256:64954ce7d233d6c109e46645cd8d55d8a06068328ce3a22f646ede7c9fde78c8_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/elasticsearch-rhel8-operator@sha256:64954ce7d233d6c109e46645cd8d55d8a06068328ce3a22f646ede7c9fde78c8?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-logging/elasticsearch-rhel8-operator\u0026tag=v5.5.4-3"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/elasticsearch-proxy-rhel8@sha256:89f980b63cbcf7956449d8cee41c884ea4ae7d76f02454f7e32058576fd92fa5_ppc64le",
"product": {
"name": "openshift-logging/elasticsearch-proxy-rhel8@sha256:89f980b63cbcf7956449d8cee41c884ea4ae7d76f02454f7e32058576fd92fa5_ppc64le",
"product_id": "openshift-logging/elasticsearch-proxy-rhel8@sha256:89f980b63cbcf7956449d8cee41c884ea4ae7d76f02454f7e32058576fd92fa5_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/elasticsearch-proxy-rhel8@sha256:89f980b63cbcf7956449d8cee41c884ea4ae7d76f02454f7e32058576fd92fa5?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-logging/elasticsearch-proxy-rhel8\u0026tag=v1.0.0-303"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/log-file-metric-exporter-rhel8@sha256:8b76243469011045e72b7a339288986e7561a3005aa94d580d5b1082580e9cec_ppc64le",
"product": {
"name": "openshift-logging/log-file-metric-exporter-rhel8@sha256:8b76243469011045e72b7a339288986e7561a3005aa94d580d5b1082580e9cec_ppc64le",
"product_id": "openshift-logging/log-file-metric-exporter-rhel8@sha256:8b76243469011045e72b7a339288986e7561a3005aa94d580d5b1082580e9cec_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/log-file-metric-exporter-rhel8@sha256:8b76243469011045e72b7a339288986e7561a3005aa94d580d5b1082580e9cec?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-logging/log-file-metric-exporter-rhel8\u0026tag=v1.1.0-71"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/logging-curator5-rhel8@sha256:e26efb87488b53ebd4e5233515906974675b3a759f4a1c00f447df8821d5f030_ppc64le",
"product": {
"name": "openshift-logging/logging-curator5-rhel8@sha256:e26efb87488b53ebd4e5233515906974675b3a759f4a1c00f447df8821d5f030_ppc64le",
"product_id": "openshift-logging/logging-curator5-rhel8@sha256:e26efb87488b53ebd4e5233515906974675b3a759f4a1c00f447df8821d5f030_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/logging-curator5-rhel8@sha256:e26efb87488b53ebd4e5233515906974675b3a759f4a1c00f447df8821d5f030?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-logging/logging-curator5-rhel8\u0026tag=v5.8.1-245"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/elasticsearch6-rhel8@sha256:1019e03ddff4726caae53e800403cbaa82ce057c7553552ad027a37d3be5824f_ppc64le",
"product": {
"name": "openshift-logging/elasticsearch6-rhel8@sha256:1019e03ddff4726caae53e800403cbaa82ce057c7553552ad027a37d3be5824f_ppc64le",
"product_id": "openshift-logging/elasticsearch6-rhel8@sha256:1019e03ddff4726caae53e800403cbaa82ce057c7553552ad027a37d3be5824f_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/elasticsearch6-rhel8@sha256:1019e03ddff4726caae53e800403cbaa82ce057c7553552ad027a37d3be5824f?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-logging/elasticsearch6-rhel8\u0026tag=v6.8.1-264"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/eventrouter-rhel8@sha256:ac91af413a363890bb01772488e371e4dc698ecfb77f047bb83bf638d497aa7c_ppc64le",
"product": {
"name": "openshift-logging/eventrouter-rhel8@sha256:ac91af413a363890bb01772488e371e4dc698ecfb77f047bb83bf638d497aa7c_ppc64le",
"product_id": "openshift-logging/eventrouter-rhel8@sha256:ac91af413a363890bb01772488e371e4dc698ecfb77f047bb83bf638d497aa7c_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/eventrouter-rhel8@sha256:ac91af413a363890bb01772488e371e4dc698ecfb77f047bb83bf638d497aa7c?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-logging/eventrouter-rhel8\u0026tag=v0.4.0-52"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/fluentd-rhel8@sha256:790fe2b90b51f8aff5d10b1525bcf7d35e5517674245993dac6696ebf2a24baf_ppc64le",
"product": {
"name": "openshift-logging/fluentd-rhel8@sha256:790fe2b90b51f8aff5d10b1525bcf7d35e5517674245993dac6696ebf2a24baf_ppc64le",
"product_id": "openshift-logging/fluentd-rhel8@sha256:790fe2b90b51f8aff5d10b1525bcf7d35e5517674245993dac6696ebf2a24baf_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/fluentd-rhel8@sha256:790fe2b90b51f8aff5d10b1525bcf7d35e5517674245993dac6696ebf2a24baf?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-logging/fluentd-rhel8\u0026tag=v1.14.6-61"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/kibana6-rhel8@sha256:93c33d6810eb6e71e7e543c1c26a29e163214df64121c814b4424322308b0a30_ppc64le",
"product": {
"name": "openshift-logging/kibana6-rhel8@sha256:93c33d6810eb6e71e7e543c1c26a29e163214df64121c814b4424322308b0a30_ppc64le",
"product_id": "openshift-logging/kibana6-rhel8@sha256:93c33d6810eb6e71e7e543c1c26a29e163214df64121c814b4424322308b0a30_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/kibana6-rhel8@sha256:93c33d6810eb6e71e7e543c1c26a29e163214df64121c814b4424322308b0a30?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-logging/kibana6-rhel8\u0026tag=v6.8.1-301"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/logging-loki-rhel8@sha256:969ce1d586fb7fbdd65d07c0b790f48fd6f81e659d1323514906bb03ae9fe79b_ppc64le",
"product": {
"name": "openshift-logging/logging-loki-rhel8@sha256:969ce1d586fb7fbdd65d07c0b790f48fd6f81e659d1323514906bb03ae9fe79b_ppc64le",
"product_id": "openshift-logging/logging-loki-rhel8@sha256:969ce1d586fb7fbdd65d07c0b790f48fd6f81e659d1323514906bb03ae9fe79b_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/logging-loki-rhel8@sha256:969ce1d586fb7fbdd65d07c0b790f48fd6f81e659d1323514906bb03ae9fe79b?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-logging/logging-loki-rhel8\u0026tag=v2.6.1-21"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/vector-rhel8@sha256:b22fe4e184b908986301fda4d2b57f4b9b91149168386a8d9c7ac9b0c4631c7c_ppc64le",
"product": {
"name": "openshift-logging/vector-rhel8@sha256:b22fe4e184b908986301fda4d2b57f4b9b91149168386a8d9c7ac9b0c4631c7c_ppc64le",
"product_id": "openshift-logging/vector-rhel8@sha256:b22fe4e184b908986301fda4d2b57f4b9b91149168386a8d9c7ac9b0c4631c7c_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/vector-rhel8@sha256:b22fe4e184b908986301fda4d2b57f4b9b91149168386a8d9c7ac9b0c4631c7c?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-logging/vector-rhel8\u0026tag=v0.21.0-34"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/logging-view-plugin-rhel8@sha256:da8c90c5b3b68e9b98a76828a450a9d7c579256b04aa9daf87ddfab9bad5548c_ppc64le",
"product": {
"name": "openshift-logging/logging-view-plugin-rhel8@sha256:da8c90c5b3b68e9b98a76828a450a9d7c579256b04aa9daf87ddfab9bad5548c_ppc64le",
"product_id": "openshift-logging/logging-view-plugin-rhel8@sha256:da8c90c5b3b68e9b98a76828a450a9d7c579256b04aa9daf87ddfab9bad5548c_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/logging-view-plugin-rhel8@sha256:da8c90c5b3b68e9b98a76828a450a9d7c579256b04aa9daf87ddfab9bad5548c?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-logging/logging-view-plugin-rhel8\u0026tag=v5.5.4-2"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/loki-rhel8-operator@sha256:4eba6362f8aaa0450d07b87824148d2c15232b871d0ba6bc34f1962d2970e753_ppc64le",
"product": {
"name": "openshift-logging/loki-rhel8-operator@sha256:4eba6362f8aaa0450d07b87824148d2c15232b871d0ba6bc34f1962d2970e753_ppc64le",
"product_id": "openshift-logging/loki-rhel8-operator@sha256:4eba6362f8aaa0450d07b87824148d2c15232b871d0ba6bc34f1962d2970e753_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/loki-rhel8-operator@sha256:4eba6362f8aaa0450d07b87824148d2c15232b871d0ba6bc34f1962d2970e753?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-logging/loki-rhel8-operator\u0026tag=v5.5.4-4"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/lokistack-gateway-rhel8@sha256:42ebf89821e0f8e4b7d03cc5a6d5a30d48f73a1ab2b7486c8a0bb1e5c2cfd4b4_ppc64le",
"product": {
"name": "openshift-logging/lokistack-gateway-rhel8@sha256:42ebf89821e0f8e4b7d03cc5a6d5a30d48f73a1ab2b7486c8a0bb1e5c2cfd4b4_ppc64le",
"product_id": "openshift-logging/lokistack-gateway-rhel8@sha256:42ebf89821e0f8e4b7d03cc5a6d5a30d48f73a1ab2b7486c8a0bb1e5c2cfd4b4_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/lokistack-gateway-rhel8@sha256:42ebf89821e0f8e4b7d03cc5a6d5a30d48f73a1ab2b7486c8a0bb1e5c2cfd4b4?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-logging/lokistack-gateway-rhel8\u0026tag=v0.1.0-57"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/opa-openshift-rhel8@sha256:847c70de5af59c9aec366612a74477de931977cf79d5f9ed117772e931589497_ppc64le",
"product": {
"name": "openshift-logging/opa-openshift-rhel8@sha256:847c70de5af59c9aec366612a74477de931977cf79d5f9ed117772e931589497_ppc64le",
"product_id": "openshift-logging/opa-openshift-rhel8@sha256:847c70de5af59c9aec366612a74477de931977cf79d5f9ed117772e931589497_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/opa-openshift-rhel8@sha256:847c70de5af59c9aec366612a74477de931977cf79d5f9ed117772e931589497?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-logging/opa-openshift-rhel8\u0026tag=v0.1.0-27"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "openshift-logging/cluster-logging-rhel8-operator@sha256:414649f77a20e04b3eb16d64acf81a4d261394016d4a890da309cbb8216c1d4a_amd64",
"product": {
"name": "openshift-logging/cluster-logging-rhel8-operator@sha256:414649f77a20e04b3eb16d64acf81a4d261394016d4a890da309cbb8216c1d4a_amd64",
"product_id": "openshift-logging/cluster-logging-rhel8-operator@sha256:414649f77a20e04b3eb16d64acf81a4d261394016d4a890da309cbb8216c1d4a_amd64",
"product_identification_helper": {
"purl": "pkg:oci/cluster-logging-rhel8-operator@sha256:414649f77a20e04b3eb16d64acf81a4d261394016d4a890da309cbb8216c1d4a?arch=amd64\u0026repository_url=registry.redhat.io/openshift-logging/cluster-logging-rhel8-operator\u0026tag=v5.5.4-7"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/cluster-logging-operator-bundle@sha256:a78fd59207ef6cc8ddaaa3f3ae7140b7678e96e0677517623d1537afc05e84dd_amd64",
"product": {
"name": "openshift-logging/cluster-logging-operator-bundle@sha256:a78fd59207ef6cc8ddaaa3f3ae7140b7678e96e0677517623d1537afc05e84dd_amd64",
"product_id": "openshift-logging/cluster-logging-operator-bundle@sha256:a78fd59207ef6cc8ddaaa3f3ae7140b7678e96e0677517623d1537afc05e84dd_amd64",
"product_identification_helper": {
"purl": "pkg:oci/cluster-logging-operator-bundle@sha256:a78fd59207ef6cc8ddaaa3f3ae7140b7678e96e0677517623d1537afc05e84dd?arch=amd64\u0026repository_url=registry.redhat.io/openshift-logging/cluster-logging-operator-bundle\u0026tag=v5.5.4-13"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/elasticsearch-rhel8-operator@sha256:c25b7b7c0f073fdfcf9fd90572790064cdff26d61a4e4db751d4197ff2c5b4c1_amd64",
"product": {
"name": "openshift-logging/elasticsearch-rhel8-operator@sha256:c25b7b7c0f073fdfcf9fd90572790064cdff26d61a4e4db751d4197ff2c5b4c1_amd64",
"product_id": "openshift-logging/elasticsearch-rhel8-operator@sha256:c25b7b7c0f073fdfcf9fd90572790064cdff26d61a4e4db751d4197ff2c5b4c1_amd64",
"product_identification_helper": {
"purl": "pkg:oci/elasticsearch-rhel8-operator@sha256:c25b7b7c0f073fdfcf9fd90572790064cdff26d61a4e4db751d4197ff2c5b4c1?arch=amd64\u0026repository_url=registry.redhat.io/openshift-logging/elasticsearch-rhel8-operator\u0026tag=v5.5.4-3"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/elasticsearch-operator-bundle@sha256:d09cafc7f6bbb446608051cebb1c943575e80f9987bb4cad8af53e0354a0e7cd_amd64",
"product": {
"name": "openshift-logging/elasticsearch-operator-bundle@sha256:d09cafc7f6bbb446608051cebb1c943575e80f9987bb4cad8af53e0354a0e7cd_amd64",
"product_id": "openshift-logging/elasticsearch-operator-bundle@sha256:d09cafc7f6bbb446608051cebb1c943575e80f9987bb4cad8af53e0354a0e7cd_amd64",
"product_identification_helper": {
"purl": "pkg:oci/elasticsearch-operator-bundle@sha256:d09cafc7f6bbb446608051cebb1c943575e80f9987bb4cad8af53e0354a0e7cd?arch=amd64\u0026repository_url=registry.redhat.io/openshift-logging/elasticsearch-operator-bundle\u0026tag=v5.5.4-17"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/elasticsearch-proxy-rhel8@sha256:e1755002225548182e17bd82b1c129b2ac61e623c3c37c4d51a535012088cacc_amd64",
"product": {
"name": "openshift-logging/elasticsearch-proxy-rhel8@sha256:e1755002225548182e17bd82b1c129b2ac61e623c3c37c4d51a535012088cacc_amd64",
"product_id": "openshift-logging/elasticsearch-proxy-rhel8@sha256:e1755002225548182e17bd82b1c129b2ac61e623c3c37c4d51a535012088cacc_amd64",
"product_identification_helper": {
"purl": "pkg:oci/elasticsearch-proxy-rhel8@sha256:e1755002225548182e17bd82b1c129b2ac61e623c3c37c4d51a535012088cacc?arch=amd64\u0026repository_url=registry.redhat.io/openshift-logging/elasticsearch-proxy-rhel8\u0026tag=v1.0.0-303"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/log-file-metric-exporter-rhel8@sha256:e91d4b026d38091cb707e0213f329d0781a3517f3eca4d209d09d6c1edb1a1d3_amd64",
"product": {
"name": "openshift-logging/log-file-metric-exporter-rhel8@sha256:e91d4b026d38091cb707e0213f329d0781a3517f3eca4d209d09d6c1edb1a1d3_amd64",
"product_id": "openshift-logging/log-file-metric-exporter-rhel8@sha256:e91d4b026d38091cb707e0213f329d0781a3517f3eca4d209d09d6c1edb1a1d3_amd64",
"product_identification_helper": {
"purl": "pkg:oci/log-file-metric-exporter-rhel8@sha256:e91d4b026d38091cb707e0213f329d0781a3517f3eca4d209d09d6c1edb1a1d3?arch=amd64\u0026repository_url=registry.redhat.io/openshift-logging/log-file-metric-exporter-rhel8\u0026tag=v1.1.0-71"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/logging-curator5-rhel8@sha256:e6ae5eef57de608fb1d4393fe824d0befffd8f5b696b5ce44e571fdcddb46f1f_amd64",
"product": {
"name": "openshift-logging/logging-curator5-rhel8@sha256:e6ae5eef57de608fb1d4393fe824d0befffd8f5b696b5ce44e571fdcddb46f1f_amd64",
"product_id": "openshift-logging/logging-curator5-rhel8@sha256:e6ae5eef57de608fb1d4393fe824d0befffd8f5b696b5ce44e571fdcddb46f1f_amd64",
"product_identification_helper": {
"purl": "pkg:oci/logging-curator5-rhel8@sha256:e6ae5eef57de608fb1d4393fe824d0befffd8f5b696b5ce44e571fdcddb46f1f?arch=amd64\u0026repository_url=registry.redhat.io/openshift-logging/logging-curator5-rhel8\u0026tag=v5.8.1-245"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/elasticsearch6-rhel8@sha256:bf574cff65baba457e3199aae7d1b0e605403a7968e9af746a6cfc5d9a4b29c5_amd64",
"product": {
"name": "openshift-logging/elasticsearch6-rhel8@sha256:bf574cff65baba457e3199aae7d1b0e605403a7968e9af746a6cfc5d9a4b29c5_amd64",
"product_id": "openshift-logging/elasticsearch6-rhel8@sha256:bf574cff65baba457e3199aae7d1b0e605403a7968e9af746a6cfc5d9a4b29c5_amd64",
"product_identification_helper": {
"purl": "pkg:oci/elasticsearch6-rhel8@sha256:bf574cff65baba457e3199aae7d1b0e605403a7968e9af746a6cfc5d9a4b29c5?arch=amd64\u0026repository_url=registry.redhat.io/openshift-logging/elasticsearch6-rhel8\u0026tag=v6.8.1-264"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/eventrouter-rhel8@sha256:646995416047cf48070c60b9ab064d454ff9ed772a92558f9627e3832f0ccd3c_amd64",
"product": {
"name": "openshift-logging/eventrouter-rhel8@sha256:646995416047cf48070c60b9ab064d454ff9ed772a92558f9627e3832f0ccd3c_amd64",
"product_id": "openshift-logging/eventrouter-rhel8@sha256:646995416047cf48070c60b9ab064d454ff9ed772a92558f9627e3832f0ccd3c_amd64",
"product_identification_helper": {
"purl": "pkg:oci/eventrouter-rhel8@sha256:646995416047cf48070c60b9ab064d454ff9ed772a92558f9627e3832f0ccd3c?arch=amd64\u0026repository_url=registry.redhat.io/openshift-logging/eventrouter-rhel8\u0026tag=v0.4.0-52"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/fluentd-rhel8@sha256:dc8fe0ca5a488c6738e6904871a620f9444f30475863a09846f8205569c25e54_amd64",
"product": {
"name": "openshift-logging/fluentd-rhel8@sha256:dc8fe0ca5a488c6738e6904871a620f9444f30475863a09846f8205569c25e54_amd64",
"product_id": "openshift-logging/fluentd-rhel8@sha256:dc8fe0ca5a488c6738e6904871a620f9444f30475863a09846f8205569c25e54_amd64",
"product_identification_helper": {
"purl": "pkg:oci/fluentd-rhel8@sha256:dc8fe0ca5a488c6738e6904871a620f9444f30475863a09846f8205569c25e54?arch=amd64\u0026repository_url=registry.redhat.io/openshift-logging/fluentd-rhel8\u0026tag=v1.14.6-61"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/kibana6-rhel8@sha256:44f3446b172b3ea7f0fd4de9f8039eba256a6bea56715748af00f361e49b1519_amd64",
"product": {
"name": "openshift-logging/kibana6-rhel8@sha256:44f3446b172b3ea7f0fd4de9f8039eba256a6bea56715748af00f361e49b1519_amd64",
"product_id": "openshift-logging/kibana6-rhel8@sha256:44f3446b172b3ea7f0fd4de9f8039eba256a6bea56715748af00f361e49b1519_amd64",
"product_identification_helper": {
"purl": "pkg:oci/kibana6-rhel8@sha256:44f3446b172b3ea7f0fd4de9f8039eba256a6bea56715748af00f361e49b1519?arch=amd64\u0026repository_url=registry.redhat.io/openshift-logging/kibana6-rhel8\u0026tag=v6.8.1-301"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/logging-loki-rhel8@sha256:947becc46b99656f9faa6067f2cf38dbef0d40e85b56d62aafcb243052920dfc_amd64",
"product": {
"name": "openshift-logging/logging-loki-rhel8@sha256:947becc46b99656f9faa6067f2cf38dbef0d40e85b56d62aafcb243052920dfc_amd64",
"product_id": "openshift-logging/logging-loki-rhel8@sha256:947becc46b99656f9faa6067f2cf38dbef0d40e85b56d62aafcb243052920dfc_amd64",
"product_identification_helper": {
"purl": "pkg:oci/logging-loki-rhel8@sha256:947becc46b99656f9faa6067f2cf38dbef0d40e85b56d62aafcb243052920dfc?arch=amd64\u0026repository_url=registry.redhat.io/openshift-logging/logging-loki-rhel8\u0026tag=v2.6.1-21"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/vector-rhel8@sha256:6c237605a0062e69e10a1fad47375f9c51dbccb110e1d11a02f2b7101d611e8f_amd64",
"product": {
"name": "openshift-logging/vector-rhel8@sha256:6c237605a0062e69e10a1fad47375f9c51dbccb110e1d11a02f2b7101d611e8f_amd64",
"product_id": "openshift-logging/vector-rhel8@sha256:6c237605a0062e69e10a1fad47375f9c51dbccb110e1d11a02f2b7101d611e8f_amd64",
"product_identification_helper": {
"purl": "pkg:oci/vector-rhel8@sha256:6c237605a0062e69e10a1fad47375f9c51dbccb110e1d11a02f2b7101d611e8f?arch=amd64\u0026repository_url=registry.redhat.io/openshift-logging/vector-rhel8\u0026tag=v0.21.0-34"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/logging-view-plugin-rhel8@sha256:bea8f3f31073874a77af55c8664cbf167cd8bad5296e1bf444b9490b06484b56_amd64",
"product": {
"name": "openshift-logging/logging-view-plugin-rhel8@sha256:bea8f3f31073874a77af55c8664cbf167cd8bad5296e1bf444b9490b06484b56_amd64",
"product_id": "openshift-logging/logging-view-plugin-rhel8@sha256:bea8f3f31073874a77af55c8664cbf167cd8bad5296e1bf444b9490b06484b56_amd64",
"product_identification_helper": {
"purl": "pkg:oci/logging-view-plugin-rhel8@sha256:bea8f3f31073874a77af55c8664cbf167cd8bad5296e1bf444b9490b06484b56?arch=amd64\u0026repository_url=registry.redhat.io/openshift-logging/logging-view-plugin-rhel8\u0026tag=v5.5.4-2"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/loki-operator-bundle@sha256:1d75006c9d03648857963a8772644d4228361d97fb07c8652326b61fd5d30f8c_amd64",
"product": {
"name": "openshift-logging/loki-operator-bundle@sha256:1d75006c9d03648857963a8772644d4228361d97fb07c8652326b61fd5d30f8c_amd64",
"product_id": "openshift-logging/loki-operator-bundle@sha256:1d75006c9d03648857963a8772644d4228361d97fb07c8652326b61fd5d30f8c_amd64",
"product_identification_helper": {
"purl": "pkg:oci/loki-operator-bundle@sha256:1d75006c9d03648857963a8772644d4228361d97fb07c8652326b61fd5d30f8c?arch=amd64\u0026repository_url=registry.redhat.io/openshift-logging/loki-operator-bundle\u0026tag=v5.5.4-18"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/loki-rhel8-operator@sha256:e5289e40532a01c605760b2f438acfb66257b730a89249269e46dc9c0058aec1_amd64",
"product": {
"name": "openshift-logging/loki-rhel8-operator@sha256:e5289e40532a01c605760b2f438acfb66257b730a89249269e46dc9c0058aec1_amd64",
"product_id": "openshift-logging/loki-rhel8-operator@sha256:e5289e40532a01c605760b2f438acfb66257b730a89249269e46dc9c0058aec1_amd64",
"product_identification_helper": {
"purl": "pkg:oci/loki-rhel8-operator@sha256:e5289e40532a01c605760b2f438acfb66257b730a89249269e46dc9c0058aec1?arch=amd64\u0026repository_url=registry.redhat.io/openshift-logging/loki-rhel8-operator\u0026tag=v5.5.4-4"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/lokistack-gateway-rhel8@sha256:449f4cf0b3d0c0d6724cc2346c2121df58ef43297c56cc540e05158ad5c8ffbc_amd64",
"product": {
"name": "openshift-logging/lokistack-gateway-rhel8@sha256:449f4cf0b3d0c0d6724cc2346c2121df58ef43297c56cc540e05158ad5c8ffbc_amd64",
"product_id": "openshift-logging/lokistack-gateway-rhel8@sha256:449f4cf0b3d0c0d6724cc2346c2121df58ef43297c56cc540e05158ad5c8ffbc_amd64",
"product_identification_helper": {
"purl": "pkg:oci/lokistack-gateway-rhel8@sha256:449f4cf0b3d0c0d6724cc2346c2121df58ef43297c56cc540e05158ad5c8ffbc?arch=amd64\u0026repository_url=registry.redhat.io/openshift-logging/lokistack-gateway-rhel8\u0026tag=v0.1.0-57"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/opa-openshift-rhel8@sha256:4c1b37da97e80aa76f2612f34745180a026214a415ed9a186ab81ec8fa96e17d_amd64",
"product": {
"name": "openshift-logging/opa-openshift-rhel8@sha256:4c1b37da97e80aa76f2612f34745180a026214a415ed9a186ab81ec8fa96e17d_amd64",
"product_id": "openshift-logging/opa-openshift-rhel8@sha256:4c1b37da97e80aa76f2612f34745180a026214a415ed9a186ab81ec8fa96e17d_amd64",
"product_identification_helper": {
"purl": "pkg:oci/opa-openshift-rhel8@sha256:4c1b37da97e80aa76f2612f34745180a026214a415ed9a186ab81ec8fa96e17d?arch=amd64\u0026repository_url=registry.redhat.io/openshift-logging/opa-openshift-rhel8\u0026tag=v0.1.0-27"
}
}
}
],
"category": "architecture",
"name": "amd64"
},
{
"branches": [
{
"category": "product_version",
"name": "openshift-logging/cluster-logging-rhel8-operator@sha256:11c10388503a708a962e3dfc5cdd9b6ad5c5d4d4a68b11f97f8fae2cc3884083_s390x",
"product": {
"name": "openshift-logging/cluster-logging-rhel8-operator@sha256:11c10388503a708a962e3dfc5cdd9b6ad5c5d4d4a68b11f97f8fae2cc3884083_s390x",
"product_id": "openshift-logging/cluster-logging-rhel8-operator@sha256:11c10388503a708a962e3dfc5cdd9b6ad5c5d4d4a68b11f97f8fae2cc3884083_s390x",
"product_identification_helper": {
"purl": "pkg:oci/cluster-logging-rhel8-operator@sha256:11c10388503a708a962e3dfc5cdd9b6ad5c5d4d4a68b11f97f8fae2cc3884083?arch=s390x\u0026repository_url=registry.redhat.io/openshift-logging/cluster-logging-rhel8-operator\u0026tag=v5.5.4-7"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/elasticsearch-rhel8-operator@sha256:5236634419119024d3f8779dbd78639a54c2323389f56fbf25dacdc499a072d3_s390x",
"product": {
"name": "openshift-logging/elasticsearch-rhel8-operator@sha256:5236634419119024d3f8779dbd78639a54c2323389f56fbf25dacdc499a072d3_s390x",
"product_id": "openshift-logging/elasticsearch-rhel8-operator@sha256:5236634419119024d3f8779dbd78639a54c2323389f56fbf25dacdc499a072d3_s390x",
"product_identification_helper": {
"purl": "pkg:oci/elasticsearch-rhel8-operator@sha256:5236634419119024d3f8779dbd78639a54c2323389f56fbf25dacdc499a072d3?arch=s390x\u0026repository_url=registry.redhat.io/openshift-logging/elasticsearch-rhel8-operator\u0026tag=v5.5.4-3"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/elasticsearch-proxy-rhel8@sha256:dcdd0c515b3b5a1a6e807929fb8e8d65c1ee2aba3bf696d2b9f852e8994e47b8_s390x",
"product": {
"name": "openshift-logging/elasticsearch-proxy-rhel8@sha256:dcdd0c515b3b5a1a6e807929fb8e8d65c1ee2aba3bf696d2b9f852e8994e47b8_s390x",
"product_id": "openshift-logging/elasticsearch-proxy-rhel8@sha256:dcdd0c515b3b5a1a6e807929fb8e8d65c1ee2aba3bf696d2b9f852e8994e47b8_s390x",
"product_identification_helper": {
"purl": "pkg:oci/elasticsearch-proxy-rhel8@sha256:dcdd0c515b3b5a1a6e807929fb8e8d65c1ee2aba3bf696d2b9f852e8994e47b8?arch=s390x\u0026repository_url=registry.redhat.io/openshift-logging/elasticsearch-proxy-rhel8\u0026tag=v1.0.0-303"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/log-file-metric-exporter-rhel8@sha256:44e17bbdb8c7ac0a7868b3be7e29d58401702384dab3a66efaa08d1176035672_s390x",
"product": {
"name": "openshift-logging/log-file-metric-exporter-rhel8@sha256:44e17bbdb8c7ac0a7868b3be7e29d58401702384dab3a66efaa08d1176035672_s390x",
"product_id": "openshift-logging/log-file-metric-exporter-rhel8@sha256:44e17bbdb8c7ac0a7868b3be7e29d58401702384dab3a66efaa08d1176035672_s390x",
"product_identification_helper": {
"purl": "pkg:oci/log-file-metric-exporter-rhel8@sha256:44e17bbdb8c7ac0a7868b3be7e29d58401702384dab3a66efaa08d1176035672?arch=s390x\u0026repository_url=registry.redhat.io/openshift-logging/log-file-metric-exporter-rhel8\u0026tag=v1.1.0-71"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/logging-curator5-rhel8@sha256:6f17fc02901a898b77c674cd4ba1764423e849c5faa888b2907ff7356accc66c_s390x",
"product": {
"name": "openshift-logging/logging-curator5-rhel8@sha256:6f17fc02901a898b77c674cd4ba1764423e849c5faa888b2907ff7356accc66c_s390x",
"product_id": "openshift-logging/logging-curator5-rhel8@sha256:6f17fc02901a898b77c674cd4ba1764423e849c5faa888b2907ff7356accc66c_s390x",
"product_identification_helper": {
"purl": "pkg:oci/logging-curator5-rhel8@sha256:6f17fc02901a898b77c674cd4ba1764423e849c5faa888b2907ff7356accc66c?arch=s390x\u0026repository_url=registry.redhat.io/openshift-logging/logging-curator5-rhel8\u0026tag=v5.8.1-245"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/elasticsearch6-rhel8@sha256:7c143b790fef75a04e8ed1be49576861651f66371355a3f5aa304a325faf6e5c_s390x",
"product": {
"name": "openshift-logging/elasticsearch6-rhel8@sha256:7c143b790fef75a04e8ed1be49576861651f66371355a3f5aa304a325faf6e5c_s390x",
"product_id": "openshift-logging/elasticsearch6-rhel8@sha256:7c143b790fef75a04e8ed1be49576861651f66371355a3f5aa304a325faf6e5c_s390x",
"product_identification_helper": {
"purl": "pkg:oci/elasticsearch6-rhel8@sha256:7c143b790fef75a04e8ed1be49576861651f66371355a3f5aa304a325faf6e5c?arch=s390x\u0026repository_url=registry.redhat.io/openshift-logging/elasticsearch6-rhel8\u0026tag=v6.8.1-264"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/eventrouter-rhel8@sha256:eaf322aeccc73ec9d8d5f5a9d6ee368ee3f68409031e18a60cc699e3ca5c144b_s390x",
"product": {
"name": "openshift-logging/eventrouter-rhel8@sha256:eaf322aeccc73ec9d8d5f5a9d6ee368ee3f68409031e18a60cc699e3ca5c144b_s390x",
"product_id": "openshift-logging/eventrouter-rhel8@sha256:eaf322aeccc73ec9d8d5f5a9d6ee368ee3f68409031e18a60cc699e3ca5c144b_s390x",
"product_identification_helper": {
"purl": "pkg:oci/eventrouter-rhel8@sha256:eaf322aeccc73ec9d8d5f5a9d6ee368ee3f68409031e18a60cc699e3ca5c144b?arch=s390x\u0026repository_url=registry.redhat.io/openshift-logging/eventrouter-rhel8\u0026tag=v0.4.0-52"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/fluentd-rhel8@sha256:490740ea41377e7d18ffba700a5022915edc13f6b38f86a6d9d475dfc61df935_s390x",
"product": {
"name": "openshift-logging/fluentd-rhel8@sha256:490740ea41377e7d18ffba700a5022915edc13f6b38f86a6d9d475dfc61df935_s390x",
"product_id": "openshift-logging/fluentd-rhel8@sha256:490740ea41377e7d18ffba700a5022915edc13f6b38f86a6d9d475dfc61df935_s390x",
"product_identification_helper": {
"purl": "pkg:oci/fluentd-rhel8@sha256:490740ea41377e7d18ffba700a5022915edc13f6b38f86a6d9d475dfc61df935?arch=s390x\u0026repository_url=registry.redhat.io/openshift-logging/fluentd-rhel8\u0026tag=v1.14.6-61"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/kibana6-rhel8@sha256:43e4da1a741543ac8cdf646901aff3185e5f30d6fad7e68a2233e2bd8d4ebe4b_s390x",
"product": {
"name": "openshift-logging/kibana6-rhel8@sha256:43e4da1a741543ac8cdf646901aff3185e5f30d6fad7e68a2233e2bd8d4ebe4b_s390x",
"product_id": "openshift-logging/kibana6-rhel8@sha256:43e4da1a741543ac8cdf646901aff3185e5f30d6fad7e68a2233e2bd8d4ebe4b_s390x",
"product_identification_helper": {
"purl": "pkg:oci/kibana6-rhel8@sha256:43e4da1a741543ac8cdf646901aff3185e5f30d6fad7e68a2233e2bd8d4ebe4b?arch=s390x\u0026repository_url=registry.redhat.io/openshift-logging/kibana6-rhel8\u0026tag=v6.8.1-301"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/logging-loki-rhel8@sha256:6242c3792c8c0469012be8b0140c2476e41f80b5271ba78ff42c63aa041be30f_s390x",
"product": {
"name": "openshift-logging/logging-loki-rhel8@sha256:6242c3792c8c0469012be8b0140c2476e41f80b5271ba78ff42c63aa041be30f_s390x",
"product_id": "openshift-logging/logging-loki-rhel8@sha256:6242c3792c8c0469012be8b0140c2476e41f80b5271ba78ff42c63aa041be30f_s390x",
"product_identification_helper": {
"purl": "pkg:oci/logging-loki-rhel8@sha256:6242c3792c8c0469012be8b0140c2476e41f80b5271ba78ff42c63aa041be30f?arch=s390x\u0026repository_url=registry.redhat.io/openshift-logging/logging-loki-rhel8\u0026tag=v2.6.1-21"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/vector-rhel8@sha256:c117a0024d06340a9a28686c144642d6591192738f263f4684a7d09af0b16c71_s390x",
"product": {
"name": "openshift-logging/vector-rhel8@sha256:c117a0024d06340a9a28686c144642d6591192738f263f4684a7d09af0b16c71_s390x",
"product_id": "openshift-logging/vector-rhel8@sha256:c117a0024d06340a9a28686c144642d6591192738f263f4684a7d09af0b16c71_s390x",
"product_identification_helper": {
"purl": "pkg:oci/vector-rhel8@sha256:c117a0024d06340a9a28686c144642d6591192738f263f4684a7d09af0b16c71?arch=s390x\u0026repository_url=registry.redhat.io/openshift-logging/vector-rhel8\u0026tag=v0.21.0-34"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/logging-view-plugin-rhel8@sha256:e3e5b570f9c819cb10ad38e928a301e8f0554e45052037b03f1ba81a3faa6a15_s390x",
"product": {
"name": "openshift-logging/logging-view-plugin-rhel8@sha256:e3e5b570f9c819cb10ad38e928a301e8f0554e45052037b03f1ba81a3faa6a15_s390x",
"product_id": "openshift-logging/logging-view-plugin-rhel8@sha256:e3e5b570f9c819cb10ad38e928a301e8f0554e45052037b03f1ba81a3faa6a15_s390x",
"product_identification_helper": {
"purl": "pkg:oci/logging-view-plugin-rhel8@sha256:e3e5b570f9c819cb10ad38e928a301e8f0554e45052037b03f1ba81a3faa6a15?arch=s390x\u0026repository_url=registry.redhat.io/openshift-logging/logging-view-plugin-rhel8\u0026tag=v5.5.4-2"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/loki-rhel8-operator@sha256:43fae2b6532712da7d0f83b5dda5797c9764fcac4b0e18580a19e54ee7dfcff6_s390x",
"product": {
"name": "openshift-logging/loki-rhel8-operator@sha256:43fae2b6532712da7d0f83b5dda5797c9764fcac4b0e18580a19e54ee7dfcff6_s390x",
"product_id": "openshift-logging/loki-rhel8-operator@sha256:43fae2b6532712da7d0f83b5dda5797c9764fcac4b0e18580a19e54ee7dfcff6_s390x",
"product_identification_helper": {
"purl": "pkg:oci/loki-rhel8-operator@sha256:43fae2b6532712da7d0f83b5dda5797c9764fcac4b0e18580a19e54ee7dfcff6?arch=s390x\u0026repository_url=registry.redhat.io/openshift-logging/loki-rhel8-operator\u0026tag=v5.5.4-4"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/lokistack-gateway-rhel8@sha256:5954a498e527ee59a3f655250a4f5535a26b49c6fd61889271affb08104839f8_s390x",
"product": {
"name": "openshift-logging/lokistack-gateway-rhel8@sha256:5954a498e527ee59a3f655250a4f5535a26b49c6fd61889271affb08104839f8_s390x",
"product_id": "openshift-logging/lokistack-gateway-rhel8@sha256:5954a498e527ee59a3f655250a4f5535a26b49c6fd61889271affb08104839f8_s390x",
"product_identification_helper": {
"purl": "pkg:oci/lokistack-gateway-rhel8@sha256:5954a498e527ee59a3f655250a4f5535a26b49c6fd61889271affb08104839f8?arch=s390x\u0026repository_url=registry.redhat.io/openshift-logging/lokistack-gateway-rhel8\u0026tag=v0.1.0-57"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/opa-openshift-rhel8@sha256:fc99739f4354e8b28613f50b441d3f7a93bea3e3b106d7c052b607c24b994b9e_s390x",
"product": {
"name": "openshift-logging/opa-openshift-rhel8@sha256:fc99739f4354e8b28613f50b441d3f7a93bea3e3b106d7c052b607c24b994b9e_s390x",
"product_id": "openshift-logging/opa-openshift-rhel8@sha256:fc99739f4354e8b28613f50b441d3f7a93bea3e3b106d7c052b607c24b994b9e_s390x",
"product_identification_helper": {
"purl": "pkg:oci/opa-openshift-rhel8@sha256:fc99739f4354e8b28613f50b441d3f7a93bea3e3b106d7c052b607c24b994b9e?arch=s390x\u0026repository_url=registry.redhat.io/openshift-logging/opa-openshift-rhel8\u0026tag=v0.1.0-27"
}
}
}
],
"category": "architecture",
"name": "s390x"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/cluster-logging-operator-bundle@sha256:a78fd59207ef6cc8ddaaa3f3ae7140b7678e96e0677517623d1537afc05e84dd_amd64 as a component of RHOL 5.5 for RHEL 8",
"product_id": "8Base-RHOL-5.5:openshift-logging/cluster-logging-operator-bundle@sha256:a78fd59207ef6cc8ddaaa3f3ae7140b7678e96e0677517623d1537afc05e84dd_amd64"
},
"product_reference": "openshift-logging/cluster-logging-operator-bundle@sha256:a78fd59207ef6cc8ddaaa3f3ae7140b7678e96e0677517623d1537afc05e84dd_amd64",
"relates_to_product_reference": "8Base-RHOL-5.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/cluster-logging-rhel8-operator@sha256:07ab076aa9b573d330ace59bf4de080ea64dbc7b3424357fc39c0c70ede27873_arm64 as a component of RHOL 5.5 for RHEL 8",
"product_id": "8Base-RHOL-5.5:openshift-logging/cluster-logging-rhel8-operator@sha256:07ab076aa9b573d330ace59bf4de080ea64dbc7b3424357fc39c0c70ede27873_arm64"
},
"product_reference": "openshift-logging/cluster-logging-rhel8-operator@sha256:07ab076aa9b573d330ace59bf4de080ea64dbc7b3424357fc39c0c70ede27873_arm64",
"relates_to_product_reference": "8Base-RHOL-5.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/cluster-logging-rhel8-operator@sha256:11c10388503a708a962e3dfc5cdd9b6ad5c5d4d4a68b11f97f8fae2cc3884083_s390x as a component of RHOL 5.5 for RHEL 8",
"product_id": "8Base-RHOL-5.5:openshift-logging/cluster-logging-rhel8-operator@sha256:11c10388503a708a962e3dfc5cdd9b6ad5c5d4d4a68b11f97f8fae2cc3884083_s390x"
},
"product_reference": "openshift-logging/cluster-logging-rhel8-operator@sha256:11c10388503a708a962e3dfc5cdd9b6ad5c5d4d4a68b11f97f8fae2cc3884083_s390x",
"relates_to_product_reference": "8Base-RHOL-5.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/cluster-logging-rhel8-operator@sha256:414649f77a20e04b3eb16d64acf81a4d261394016d4a890da309cbb8216c1d4a_amd64 as a component of RHOL 5.5 for RHEL 8",
"product_id": "8Base-RHOL-5.5:openshift-logging/cluster-logging-rhel8-operator@sha256:414649f77a20e04b3eb16d64acf81a4d261394016d4a890da309cbb8216c1d4a_amd64"
},
"product_reference": "openshift-logging/cluster-logging-rhel8-operator@sha256:414649f77a20e04b3eb16d64acf81a4d261394016d4a890da309cbb8216c1d4a_amd64",
"relates_to_product_reference": "8Base-RHOL-5.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/cluster-logging-rhel8-operator@sha256:b4eeab42904e5a81e7adb8801bd901a53a5b81b2464b33816c203daf7587f89f_ppc64le as a component of RHOL 5.5 for RHEL 8",
"product_id": "8Base-RHOL-5.5:openshift-logging/cluster-logging-rhel8-operator@sha256:b4eeab42904e5a81e7adb8801bd901a53a5b81b2464b33816c203daf7587f89f_ppc64le"
},
"product_reference": "openshift-logging/cluster-logging-rhel8-operator@sha256:b4eeab42904e5a81e7adb8801bd901a53a5b81b2464b33816c203daf7587f89f_ppc64le",
"relates_to_product_reference": "8Base-RHOL-5.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/elasticsearch-operator-bundle@sha256:d09cafc7f6bbb446608051cebb1c943575e80f9987bb4cad8af53e0354a0e7cd_amd64 as a component of RHOL 5.5 for RHEL 8",
"product_id": "8Base-RHOL-5.5:openshift-logging/elasticsearch-operator-bundle@sha256:d09cafc7f6bbb446608051cebb1c943575e80f9987bb4cad8af53e0354a0e7cd_amd64"
},
"product_reference": "openshift-logging/elasticsearch-operator-bundle@sha256:d09cafc7f6bbb446608051cebb1c943575e80f9987bb4cad8af53e0354a0e7cd_amd64",
"relates_to_product_reference": "8Base-RHOL-5.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/elasticsearch-proxy-rhel8@sha256:89f980b63cbcf7956449d8cee41c884ea4ae7d76f02454f7e32058576fd92fa5_ppc64le as a component of RHOL 5.5 for RHEL 8",
"product_id": "8Base-RHOL-5.5:openshift-logging/elasticsearch-proxy-rhel8@sha256:89f980b63cbcf7956449d8cee41c884ea4ae7d76f02454f7e32058576fd92fa5_ppc64le"
},
"product_reference": "openshift-logging/elasticsearch-proxy-rhel8@sha256:89f980b63cbcf7956449d8cee41c884ea4ae7d76f02454f7e32058576fd92fa5_ppc64le",
"relates_to_product_reference": "8Base-RHOL-5.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/elasticsearch-proxy-rhel8@sha256:a6c03fd0fe66206bff59ba019cc60085de4c65d4efae8a637f1ac48b91688371_arm64 as a component of RHOL 5.5 for RHEL 8",
"product_id": "8Base-RHOL-5.5:openshift-logging/elasticsearch-proxy-rhel8@sha256:a6c03fd0fe66206bff59ba019cc60085de4c65d4efae8a637f1ac48b91688371_arm64"
},
"product_reference": "openshift-logging/elasticsearch-proxy-rhel8@sha256:a6c03fd0fe66206bff59ba019cc60085de4c65d4efae8a637f1ac48b91688371_arm64",
"relates_to_product_reference": "8Base-RHOL-5.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/elasticsearch-proxy-rhel8@sha256:dcdd0c515b3b5a1a6e807929fb8e8d65c1ee2aba3bf696d2b9f852e8994e47b8_s390x as a component of RHOL 5.5 for RHEL 8",
"product_id": "8Base-RHOL-5.5:openshift-logging/elasticsearch-proxy-rhel8@sha256:dcdd0c515b3b5a1a6e807929fb8e8d65c1ee2aba3bf696d2b9f852e8994e47b8_s390x"
},
"product_reference": "openshift-logging/elasticsearch-proxy-rhel8@sha256:dcdd0c515b3b5a1a6e807929fb8e8d65c1ee2aba3bf696d2b9f852e8994e47b8_s390x",
"relates_to_product_reference": "8Base-RHOL-5.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/elasticsearch-proxy-rhel8@sha256:e1755002225548182e17bd82b1c129b2ac61e623c3c37c4d51a535012088cacc_amd64 as a component of RHOL 5.5 for RHEL 8",
"product_id": "8Base-RHOL-5.5:openshift-logging/elasticsearch-proxy-rhel8@sha256:e1755002225548182e17bd82b1c129b2ac61e623c3c37c4d51a535012088cacc_amd64"
},
"product_reference": "openshift-logging/elasticsearch-proxy-rhel8@sha256:e1755002225548182e17bd82b1c129b2ac61e623c3c37c4d51a535012088cacc_amd64",
"relates_to_product_reference": "8Base-RHOL-5.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/elasticsearch-rhel8-operator@sha256:5236634419119024d3f8779dbd78639a54c2323389f56fbf25dacdc499a072d3_s390x as a component of RHOL 5.5 for RHEL 8",
"product_id": "8Base-RHOL-5.5:openshift-logging/elasticsearch-rhel8-operator@sha256:5236634419119024d3f8779dbd78639a54c2323389f56fbf25dacdc499a072d3_s390x"
},
"product_reference": "openshift-logging/elasticsearch-rhel8-operator@sha256:5236634419119024d3f8779dbd78639a54c2323389f56fbf25dacdc499a072d3_s390x",
"relates_to_product_reference": "8Base-RHOL-5.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/elasticsearch-rhel8-operator@sha256:64954ce7d233d6c109e46645cd8d55d8a06068328ce3a22f646ede7c9fde78c8_ppc64le as a component of RHOL 5.5 for RHEL 8",
"product_id": "8Base-RHOL-5.5:openshift-logging/elasticsearch-rhel8-operator@sha256:64954ce7d233d6c109e46645cd8d55d8a06068328ce3a22f646ede7c9fde78c8_ppc64le"
},
"product_reference": "openshift-logging/elasticsearch-rhel8-operator@sha256:64954ce7d233d6c109e46645cd8d55d8a06068328ce3a22f646ede7c9fde78c8_ppc64le",
"relates_to_product_reference": "8Base-RHOL-5.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/elasticsearch-rhel8-operator@sha256:c25b7b7c0f073fdfcf9fd90572790064cdff26d61a4e4db751d4197ff2c5b4c1_amd64 as a component of RHOL 5.5 for RHEL 8",
"product_id": "8Base-RHOL-5.5:openshift-logging/elasticsearch-rhel8-operator@sha256:c25b7b7c0f073fdfcf9fd90572790064cdff26d61a4e4db751d4197ff2c5b4c1_amd64"
},
"product_reference": "openshift-logging/elasticsearch-rhel8-operator@sha256:c25b7b7c0f073fdfcf9fd90572790064cdff26d61a4e4db751d4197ff2c5b4c1_amd64",
"relates_to_product_reference": "8Base-RHOL-5.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/elasticsearch-rhel8-operator@sha256:dce08ac53092fc51958b78df9b4b870926a079fe4cdc4fb2d46c8ba545a22e6a_arm64 as a component of RHOL 5.5 for RHEL 8",
"product_id": "8Base-RHOL-5.5:openshift-logging/elasticsearch-rhel8-operator@sha256:dce08ac53092fc51958b78df9b4b870926a079fe4cdc4fb2d46c8ba545a22e6a_arm64"
},
"product_reference": "openshift-logging/elasticsearch-rhel8-operator@sha256:dce08ac53092fc51958b78df9b4b870926a079fe4cdc4fb2d46c8ba545a22e6a_arm64",
"relates_to_product_reference": "8Base-RHOL-5.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/elasticsearch6-rhel8@sha256:1019e03ddff4726caae53e800403cbaa82ce057c7553552ad027a37d3be5824f_ppc64le as a component of RHOL 5.5 for RHEL 8",
"product_id": "8Base-RHOL-5.5:openshift-logging/elasticsearch6-rhel8@sha256:1019e03ddff4726caae53e800403cbaa82ce057c7553552ad027a37d3be5824f_ppc64le"
},
"product_reference": "openshift-logging/elasticsearch6-rhel8@sha256:1019e03ddff4726caae53e800403cbaa82ce057c7553552ad027a37d3be5824f_ppc64le",
"relates_to_product_reference": "8Base-RHOL-5.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/elasticsearch6-rhel8@sha256:6dfb5e18aa3dc6ce8e2535e13de1d53eea68b218854971e0eb594f677f6da7c7_arm64 as a component of RHOL 5.5 for RHEL 8",
"product_id": "8Base-RHOL-5.5:openshift-logging/elasticsearch6-rhel8@sha256:6dfb5e18aa3dc6ce8e2535e13de1d53eea68b218854971e0eb594f677f6da7c7_arm64"
},
"product_reference": "openshift-logging/elasticsearch6-rhel8@sha256:6dfb5e18aa3dc6ce8e2535e13de1d53eea68b218854971e0eb594f677f6da7c7_arm64",
"relates_to_product_reference": "8Base-RHOL-5.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/elasticsearch6-rhel8@sha256:7c143b790fef75a04e8ed1be49576861651f66371355a3f5aa304a325faf6e5c_s390x as a component of RHOL 5.5 for RHEL 8",
"product_id": "8Base-RHOL-5.5:openshift-logging/elasticsearch6-rhel8@sha256:7c143b790fef75a04e8ed1be49576861651f66371355a3f5aa304a325faf6e5c_s390x"
},
"product_reference": "openshift-logging/elasticsearch6-rhel8@sha256:7c143b790fef75a04e8ed1be49576861651f66371355a3f5aa304a325faf6e5c_s390x",
"relates_to_product_reference": "8Base-RHOL-5.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/elasticsearch6-rhel8@sha256:bf574cff65baba457e3199aae7d1b0e605403a7968e9af746a6cfc5d9a4b29c5_amd64 as a component of RHOL 5.5 for RHEL 8",
"product_id": "8Base-RHOL-5.5:openshift-logging/elasticsearch6-rhel8@sha256:bf574cff65baba457e3199aae7d1b0e605403a7968e9af746a6cfc5d9a4b29c5_amd64"
},
"product_reference": "openshift-logging/elasticsearch6-rhel8@sha256:bf574cff65baba457e3199aae7d1b0e605403a7968e9af746a6cfc5d9a4b29c5_amd64",
"relates_to_product_reference": "8Base-RHOL-5.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/eventrouter-rhel8@sha256:0590711175be3b10f646256407cb7d72df63333589d527199260f738a91f2e3d_arm64 as a component of RHOL 5.5 for RHEL 8",
"product_id": "8Base-RHOL-5.5:openshift-logging/eventrouter-rhel8@sha256:0590711175be3b10f646256407cb7d72df63333589d527199260f738a91f2e3d_arm64"
},
"product_reference": "openshift-logging/eventrouter-rhel8@sha256:0590711175be3b10f646256407cb7d72df63333589d527199260f738a91f2e3d_arm64",
"relates_to_product_reference": "8Base-RHOL-5.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/eventrouter-rhel8@sha256:646995416047cf48070c60b9ab064d454ff9ed772a92558f9627e3832f0ccd3c_amd64 as a component of RHOL 5.5 for RHEL 8",
"product_id": "8Base-RHOL-5.5:openshift-logging/eventrouter-rhel8@sha256:646995416047cf48070c60b9ab064d454ff9ed772a92558f9627e3832f0ccd3c_amd64"
},
"product_reference": "openshift-logging/eventrouter-rhel8@sha256:646995416047cf48070c60b9ab064d454ff9ed772a92558f9627e3832f0ccd3c_amd64",
"relates_to_product_reference": "8Base-RHOL-5.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/eventrouter-rhel8@sha256:ac91af413a363890bb01772488e371e4dc698ecfb77f047bb83bf638d497aa7c_ppc64le as a component of RHOL 5.5 for RHEL 8",
"product_id": "8Base-RHOL-5.5:openshift-logging/eventrouter-rhel8@sha256:ac91af413a363890bb01772488e371e4dc698ecfb77f047bb83bf638d497aa7c_ppc64le"
},
"product_reference": "openshift-logging/eventrouter-rhel8@sha256:ac91af413a363890bb01772488e371e4dc698ecfb77f047bb83bf638d497aa7c_ppc64le",
"relates_to_product_reference": "8Base-RHOL-5.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/eventrouter-rhel8@sha256:eaf322aeccc73ec9d8d5f5a9d6ee368ee3f68409031e18a60cc699e3ca5c144b_s390x as a component of RHOL 5.5 for RHEL 8",
"product_id": "8Base-RHOL-5.5:openshift-logging/eventrouter-rhel8@sha256:eaf322aeccc73ec9d8d5f5a9d6ee368ee3f68409031e18a60cc699e3ca5c144b_s390x"
},
"product_reference": "openshift-logging/eventrouter-rhel8@sha256:eaf322aeccc73ec9d8d5f5a9d6ee368ee3f68409031e18a60cc699e3ca5c144b_s390x",
"relates_to_product_reference": "8Base-RHOL-5.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/fluentd-rhel8@sha256:3d4b83f86b2d2f1c73ab184a3471d0d4da04bb6e76487c9f546da87998e480dc_arm64 as a component of RHOL 5.5 for RHEL 8",
"product_id": "8Base-RHOL-5.5:openshift-logging/fluentd-rhel8@sha256:3d4b83f86b2d2f1c73ab184a3471d0d4da04bb6e76487c9f546da87998e480dc_arm64"
},
"product_reference": "openshift-logging/fluentd-rhel8@sha256:3d4b83f86b2d2f1c73ab184a3471d0d4da04bb6e76487c9f546da87998e480dc_arm64",
"relates_to_product_reference": "8Base-RHOL-5.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/fluentd-rhel8@sha256:490740ea41377e7d18ffba700a5022915edc13f6b38f86a6d9d475dfc61df935_s390x as a component of RHOL 5.5 for RHEL 8",
"product_id": "8Base-RHOL-5.5:openshift-logging/fluentd-rhel8@sha256:490740ea41377e7d18ffba700a5022915edc13f6b38f86a6d9d475dfc61df935_s390x"
},
"product_reference": "openshift-logging/fluentd-rhel8@sha256:490740ea41377e7d18ffba700a5022915edc13f6b38f86a6d9d475dfc61df935_s390x",
"relates_to_product_reference": "8Base-RHOL-5.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/fluentd-rhel8@sha256:790fe2b90b51f8aff5d10b1525bcf7d35e5517674245993dac6696ebf2a24baf_ppc64le as a component of RHOL 5.5 for RHEL 8",
"product_id": "8Base-RHOL-5.5:openshift-logging/fluentd-rhel8@sha256:790fe2b90b51f8aff5d10b1525bcf7d35e5517674245993dac6696ebf2a24baf_ppc64le"
},
"product_reference": "openshift-logging/fluentd-rhel8@sha256:790fe2b90b51f8aff5d10b1525bcf7d35e5517674245993dac6696ebf2a24baf_ppc64le",
"relates_to_product_reference": "8Base-RHOL-5.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/fluentd-rhel8@sha256:dc8fe0ca5a488c6738e6904871a620f9444f30475863a09846f8205569c25e54_amd64 as a component of RHOL 5.5 for RHEL 8",
"product_id": "8Base-RHOL-5.5:openshift-logging/fluentd-rhel8@sha256:dc8fe0ca5a488c6738e6904871a620f9444f30475863a09846f8205569c25e54_amd64"
},
"product_reference": "openshift-logging/fluentd-rhel8@sha256:dc8fe0ca5a488c6738e6904871a620f9444f30475863a09846f8205569c25e54_amd64",
"relates_to_product_reference": "8Base-RHOL-5.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/kibana6-rhel8@sha256:43e4da1a741543ac8cdf646901aff3185e5f30d6fad7e68a2233e2bd8d4ebe4b_s390x as a component of RHOL 5.5 for RHEL 8",
"product_id": "8Base-RHOL-5.5:openshift-logging/kibana6-rhel8@sha256:43e4da1a741543ac8cdf646901aff3185e5f30d6fad7e68a2233e2bd8d4ebe4b_s390x"
},
"product_reference": "openshift-logging/kibana6-rhel8@sha256:43e4da1a741543ac8cdf646901aff3185e5f30d6fad7e68a2233e2bd8d4ebe4b_s390x",
"relates_to_product_reference": "8Base-RHOL-5.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/kibana6-rhel8@sha256:44f3446b172b3ea7f0fd4de9f8039eba256a6bea56715748af00f361e49b1519_amd64 as a component of RHOL 5.5 for RHEL 8",
"product_id": "8Base-RHOL-5.5:openshift-logging/kibana6-rhel8@sha256:44f3446b172b3ea7f0fd4de9f8039eba256a6bea56715748af00f361e49b1519_amd64"
},
"product_reference": "openshift-logging/kibana6-rhel8@sha256:44f3446b172b3ea7f0fd4de9f8039eba256a6bea56715748af00f361e49b1519_amd64",
"relates_to_product_reference": "8Base-RHOL-5.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/kibana6-rhel8@sha256:93c33d6810eb6e71e7e543c1c26a29e163214df64121c814b4424322308b0a30_ppc64le as a component of RHOL 5.5 for RHEL 8",
"product_id": "8Base-RHOL-5.5:openshift-logging/kibana6-rhel8@sha256:93c33d6810eb6e71e7e543c1c26a29e163214df64121c814b4424322308b0a30_ppc64le"
},
"product_reference": "openshift-logging/kibana6-rhel8@sha256:93c33d6810eb6e71e7e543c1c26a29e163214df64121c814b4424322308b0a30_ppc64le",
"relates_to_product_reference": "8Base-RHOL-5.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/kibana6-rhel8@sha256:ca4f273fb088980bfcc3607bd7ea2d40cc93298262cb3f5ce4054a6235152d1e_arm64 as a component of RHOL 5.5 for RHEL 8",
"product_id": "8Base-RHOL-5.5:openshift-logging/kibana6-rhel8@sha256:ca4f273fb088980bfcc3607bd7ea2d40cc93298262cb3f5ce4054a6235152d1e_arm64"
},
"product_reference": "openshift-logging/kibana6-rhel8@sha256:ca4f273fb088980bfcc3607bd7ea2d40cc93298262cb3f5ce4054a6235152d1e_arm64",
"relates_to_product_reference": "8Base-RHOL-5.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/log-file-metric-exporter-rhel8@sha256:44e17bbdb8c7ac0a7868b3be7e29d58401702384dab3a66efaa08d1176035672_s390x as a component of RHOL 5.5 for RHEL 8",
"product_id": "8Base-RHOL-5.5:openshift-logging/log-file-metric-exporter-rhel8@sha256:44e17bbdb8c7ac0a7868b3be7e29d58401702384dab3a66efaa08d1176035672_s390x"
},
"product_reference": "openshift-logging/log-file-metric-exporter-rhel8@sha256:44e17bbdb8c7ac0a7868b3be7e29d58401702384dab3a66efaa08d1176035672_s390x",
"relates_to_product_reference": "8Base-RHOL-5.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/log-file-metric-exporter-rhel8@sha256:8b76243469011045e72b7a339288986e7561a3005aa94d580d5b1082580e9cec_ppc64le as a component of RHOL 5.5 for RHEL 8",
"product_id": "8Base-RHOL-5.5:openshift-logging/log-file-metric-exporter-rhel8@sha256:8b76243469011045e72b7a339288986e7561a3005aa94d580d5b1082580e9cec_ppc64le"
},
"product_reference": "openshift-logging/log-file-metric-exporter-rhel8@sha256:8b76243469011045e72b7a339288986e7561a3005aa94d580d5b1082580e9cec_ppc64le",
"relates_to_product_reference": "8Base-RHOL-5.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/log-file-metric-exporter-rhel8@sha256:e91d4b026d38091cb707e0213f329d0781a3517f3eca4d209d09d6c1edb1a1d3_amd64 as a component of RHOL 5.5 for RHEL 8",
"product_id": "8Base-RHOL-5.5:openshift-logging/log-file-metric-exporter-rhel8@sha256:e91d4b026d38091cb707e0213f329d0781a3517f3eca4d209d09d6c1edb1a1d3_amd64"
},
"product_reference": "openshift-logging/log-file-metric-exporter-rhel8@sha256:e91d4b026d38091cb707e0213f329d0781a3517f3eca4d209d09d6c1edb1a1d3_amd64",
"relates_to_product_reference": "8Base-RHOL-5.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/log-file-metric-exporter-rhel8@sha256:f0ca78341daa3d41ffe460f5aa504219c72ee673dd57a82f344d3239b69717be_arm64 as a component of RHOL 5.5 for RHEL 8",
"product_id": "8Base-RHOL-5.5:openshift-logging/log-file-metric-exporter-rhel8@sha256:f0ca78341daa3d41ffe460f5aa504219c72ee673dd57a82f344d3239b69717be_arm64"
},
"product_reference": "openshift-logging/log-file-metric-exporter-rhel8@sha256:f0ca78341daa3d41ffe460f5aa504219c72ee673dd57a82f344d3239b69717be_arm64",
"relates_to_product_reference": "8Base-RHOL-5.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/logging-curator5-rhel8@sha256:6f17fc02901a898b77c674cd4ba1764423e849c5faa888b2907ff7356accc66c_s390x as a component of RHOL 5.5 for RHEL 8",
"product_id": "8Base-RHOL-5.5:openshift-logging/logging-curator5-rhel8@sha256:6f17fc02901a898b77c674cd4ba1764423e849c5faa888b2907ff7356accc66c_s390x"
},
"product_reference": "openshift-logging/logging-curator5-rhel8@sha256:6f17fc02901a898b77c674cd4ba1764423e849c5faa888b2907ff7356accc66c_s390x",
"relates_to_product_reference": "8Base-RHOL-5.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/logging-curator5-rhel8@sha256:c8ea484f5e15b7b53941f251db9b5be08c8cb6f3a14d99285277d9eadf969e98_arm64 as a component of RHOL 5.5 for RHEL 8",
"product_id": "8Base-RHOL-5.5:openshift-logging/logging-curator5-rhel8@sha256:c8ea484f5e15b7b53941f251db9b5be08c8cb6f3a14d99285277d9eadf969e98_arm64"
},
"product_reference": "openshift-logging/logging-curator5-rhel8@sha256:c8ea484f5e15b7b53941f251db9b5be08c8cb6f3a14d99285277d9eadf969e98_arm64",
"relates_to_product_reference": "8Base-RHOL-5.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/logging-curator5-rhel8@sha256:e26efb87488b53ebd4e5233515906974675b3a759f4a1c00f447df8821d5f030_ppc64le as a component of RHOL 5.5 for RHEL 8",
"product_id": "8Base-RHOL-5.5:openshift-logging/logging-curator5-rhel8@sha256:e26efb87488b53ebd4e5233515906974675b3a759f4a1c00f447df8821d5f030_ppc64le"
},
"product_reference": "openshift-logging/logging-curator5-rhel8@sha256:e26efb87488b53ebd4e5233515906974675b3a759f4a1c00f447df8821d5f030_ppc64le",
"relates_to_product_reference": "8Base-RHOL-5.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/logging-curator5-rhel8@sha256:e6ae5eef57de608fb1d4393fe824d0befffd8f5b696b5ce44e571fdcddb46f1f_amd64 as a component of RHOL 5.5 for RHEL 8",
"product_id": "8Base-RHOL-5.5:openshift-logging/logging-curator5-rhel8@sha256:e6ae5eef57de608fb1d4393fe824d0befffd8f5b696b5ce44e571fdcddb46f1f_amd64"
},
"product_reference": "openshift-logging/logging-curator5-rhel8@sha256:e6ae5eef57de608fb1d4393fe824d0befffd8f5b696b5ce44e571fdcddb46f1f_amd64",
"relates_to_product_reference": "8Base-RHOL-5.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/logging-loki-rhel8@sha256:6242c3792c8c0469012be8b0140c2476e41f80b5271ba78ff42c63aa041be30f_s390x as a component of RHOL 5.5 for RHEL 8",
"product_id": "8Base-RHOL-5.5:openshift-logging/logging-loki-rhel8@sha256:6242c3792c8c0469012be8b0140c2476e41f80b5271ba78ff42c63aa041be30f_s390x"
},
"product_reference": "openshift-logging/logging-loki-rhel8@sha256:6242c3792c8c0469012be8b0140c2476e41f80b5271ba78ff42c63aa041be30f_s390x",
"relates_to_product_reference": "8Base-RHOL-5.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/logging-loki-rhel8@sha256:947becc46b99656f9faa6067f2cf38dbef0d40e85b56d62aafcb243052920dfc_amd64 as a component of RHOL 5.5 for RHEL 8",
"product_id": "8Base-RHOL-5.5:openshift-logging/logging-loki-rhel8@sha256:947becc46b99656f9faa6067f2cf38dbef0d40e85b56d62aafcb243052920dfc_amd64"
},
"product_reference": "openshift-logging/logging-loki-rhel8@sha256:947becc46b99656f9faa6067f2cf38dbef0d40e85b56d62aafcb243052920dfc_amd64",
"relates_to_product_reference": "8Base-RHOL-5.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/logging-loki-rhel8@sha256:969ce1d586fb7fbdd65d07c0b790f48fd6f81e659d1323514906bb03ae9fe79b_ppc64le as a component of RHOL 5.5 for RHEL 8",
"product_id": "8Base-RHOL-5.5:openshift-logging/logging-loki-rhel8@sha256:969ce1d586fb7fbdd65d07c0b790f48fd6f81e659d1323514906bb03ae9fe79b_ppc64le"
},
"product_reference": "openshift-logging/logging-loki-rhel8@sha256:969ce1d586fb7fbdd65d07c0b790f48fd6f81e659d1323514906bb03ae9fe79b_ppc64le",
"relates_to_product_reference": "8Base-RHOL-5.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/logging-loki-rhel8@sha256:dd5e5a043befc54eeb63ff51a01691778053c90de5c9b8946d6a1d808fbcf0df_arm64 as a component of RHOL 5.5 for RHEL 8",
"product_id": "8Base-RHOL-5.5:openshift-logging/logging-loki-rhel8@sha256:dd5e5a043befc54eeb63ff51a01691778053c90de5c9b8946d6a1d808fbcf0df_arm64"
},
"product_reference": "openshift-logging/logging-loki-rhel8@sha256:dd5e5a043befc54eeb63ff51a01691778053c90de5c9b8946d6a1d808fbcf0df_arm64",
"relates_to_product_reference": "8Base-RHOL-5.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/logging-view-plugin-rhel8@sha256:147676e1a3c66757508be0046c28ccb7985f15af7f8f4a045fa5ca424c0c684d_arm64 as a component of RHOL 5.5 for RHEL 8",
"product_id": "8Base-RHOL-5.5:openshift-logging/logging-view-plugin-rhel8@sha256:147676e1a3c66757508be0046c28ccb7985f15af7f8f4a045fa5ca424c0c684d_arm64"
},
"product_reference": "openshift-logging/logging-view-plugin-rhel8@sha256:147676e1a3c66757508be0046c28ccb7985f15af7f8f4a045fa5ca424c0c684d_arm64",
"relates_to_product_reference": "8Base-RHOL-5.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/logging-view-plugin-rhel8@sha256:bea8f3f31073874a77af55c8664cbf167cd8bad5296e1bf444b9490b06484b56_amd64 as a component of RHOL 5.5 for RHEL 8",
"product_id": "8Base-RHOL-5.5:openshift-logging/logging-view-plugin-rhel8@sha256:bea8f3f31073874a77af55c8664cbf167cd8bad5296e1bf444b9490b06484b56_amd64"
},
"product_reference": "openshift-logging/logging-view-plugin-rhel8@sha256:bea8f3f31073874a77af55c8664cbf167cd8bad5296e1bf444b9490b06484b56_amd64",
"relates_to_product_reference": "8Base-RHOL-5.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/logging-view-plugin-rhel8@sha256:da8c90c5b3b68e9b98a76828a450a9d7c579256b04aa9daf87ddfab9bad5548c_ppc64le as a component of RHOL 5.5 for RHEL 8",
"product_id": "8Base-RHOL-5.5:openshift-logging/logging-view-plugin-rhel8@sha256:da8c90c5b3b68e9b98a76828a450a9d7c579256b04aa9daf87ddfab9bad5548c_ppc64le"
},
"product_reference": "openshift-logging/logging-view-plugin-rhel8@sha256:da8c90c5b3b68e9b98a76828a450a9d7c579256b04aa9daf87ddfab9bad5548c_ppc64le",
"relates_to_product_reference": "8Base-RHOL-5.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/logging-view-plugin-rhel8@sha256:e3e5b570f9c819cb10ad38e928a301e8f0554e45052037b03f1ba81a3faa6a15_s390x as a component of RHOL 5.5 for RHEL 8",
"product_id": "8Base-RHOL-5.5:openshift-logging/logging-view-plugin-rhel8@sha256:e3e5b570f9c819cb10ad38e928a301e8f0554e45052037b03f1ba81a3faa6a15_s390x"
},
"product_reference": "openshift-logging/logging-view-plugin-rhel8@sha256:e3e5b570f9c819cb10ad38e928a301e8f0554e45052037b03f1ba81a3faa6a15_s390x",
"relates_to_product_reference": "8Base-RHOL-5.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/loki-operator-bundle@sha256:1d75006c9d03648857963a8772644d4228361d97fb07c8652326b61fd5d30f8c_amd64 as a component of RHOL 5.5 for RHEL 8",
"product_id": "8Base-RHOL-5.5:openshift-logging/loki-operator-bundle@sha256:1d75006c9d03648857963a8772644d4228361d97fb07c8652326b61fd5d30f8c_amd64"
},
"product_reference": "openshift-logging/loki-operator-bundle@sha256:1d75006c9d03648857963a8772644d4228361d97fb07c8652326b61fd5d30f8c_amd64",
"relates_to_product_reference": "8Base-RHOL-5.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/loki-rhel8-operator@sha256:43fae2b6532712da7d0f83b5dda5797c9764fcac4b0e18580a19e54ee7dfcff6_s390x as a component of RHOL 5.5 for RHEL 8",
"product_id": "8Base-RHOL-5.5:openshift-logging/loki-rhel8-operator@sha256:43fae2b6532712da7d0f83b5dda5797c9764fcac4b0e18580a19e54ee7dfcff6_s390x"
},
"product_reference": "openshift-logging/loki-rhel8-operator@sha256:43fae2b6532712da7d0f83b5dda5797c9764fcac4b0e18580a19e54ee7dfcff6_s390x",
"relates_to_product_reference": "8Base-RHOL-5.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/loki-rhel8-operator@sha256:4eba6362f8aaa0450d07b87824148d2c15232b871d0ba6bc34f1962d2970e753_ppc64le as a component of RHOL 5.5 for RHEL 8",
"product_id": "8Base-RHOL-5.5:openshift-logging/loki-rhel8-operator@sha256:4eba6362f8aaa0450d07b87824148d2c15232b871d0ba6bc34f1962d2970e753_ppc64le"
},
"product_reference": "openshift-logging/loki-rhel8-operator@sha256:4eba6362f8aaa0450d07b87824148d2c15232b871d0ba6bc34f1962d2970e753_ppc64le",
"relates_to_product_reference": "8Base-RHOL-5.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/loki-rhel8-operator@sha256:dfa4ca06abb576fa071fb30c425bc6be631c0453939de562e1dc0b4e76de4f81_arm64 as a component of RHOL 5.5 for RHEL 8",
"product_id": "8Base-RHOL-5.5:openshift-logging/loki-rhel8-operator@sha256:dfa4ca06abb576fa071fb30c425bc6be631c0453939de562e1dc0b4e76de4f81_arm64"
},
"product_reference": "openshift-logging/loki-rhel8-operator@sha256:dfa4ca06abb576fa071fb30c425bc6be631c0453939de562e1dc0b4e76de4f81_arm64",
"relates_to_product_reference": "8Base-RHOL-5.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/loki-rhel8-operator@sha256:e5289e40532a01c605760b2f438acfb66257b730a89249269e46dc9c0058aec1_amd64 as a component of RHOL 5.5 for RHEL 8",
"product_id": "8Base-RHOL-5.5:openshift-logging/loki-rhel8-operator@sha256:e5289e40532a01c605760b2f438acfb66257b730a89249269e46dc9c0058aec1_amd64"
},
"product_reference": "openshift-logging/loki-rhel8-operator@sha256:e5289e40532a01c605760b2f438acfb66257b730a89249269e46dc9c0058aec1_amd64",
"relates_to_product_reference": "8Base-RHOL-5.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/lokistack-gateway-rhel8@sha256:0a3eb7a1a50b75528be737eb2768e671a643eea324c967a0381296b61f8e399e_arm64 as a component of RHOL 5.5 for RHEL 8",
"product_id": "8Base-RHOL-5.5:openshift-logging/lokistack-gateway-rhel8@sha256:0a3eb7a1a50b75528be737eb2768e671a643eea324c967a0381296b61f8e399e_arm64"
},
"product_reference": "openshift-logging/lokistack-gateway-rhel8@sha256:0a3eb7a1a50b75528be737eb2768e671a643eea324c967a0381296b61f8e399e_arm64",
"relates_to_product_reference": "8Base-RHOL-5.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/lokistack-gateway-rhel8@sha256:42ebf89821e0f8e4b7d03cc5a6d5a30d48f73a1ab2b7486c8a0bb1e5c2cfd4b4_ppc64le as a component of RHOL 5.5 for RHEL 8",
"product_id": "8Base-RHOL-5.5:openshift-logging/lokistack-gateway-rhel8@sha256:42ebf89821e0f8e4b7d03cc5a6d5a30d48f73a1ab2b7486c8a0bb1e5c2cfd4b4_ppc64le"
},
"product_reference": "openshift-logging/lokistack-gateway-rhel8@sha256:42ebf89821e0f8e4b7d03cc5a6d5a30d48f73a1ab2b7486c8a0bb1e5c2cfd4b4_ppc64le",
"relates_to_product_reference": "8Base-RHOL-5.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/lokistack-gateway-rhel8@sha256:449f4cf0b3d0c0d6724cc2346c2121df58ef43297c56cc540e05158ad5c8ffbc_amd64 as a component of RHOL 5.5 for RHEL 8",
"product_id": "8Base-RHOL-5.5:openshift-logging/lokistack-gateway-rhel8@sha256:449f4cf0b3d0c0d6724cc2346c2121df58ef43297c56cc540e05158ad5c8ffbc_amd64"
},
"product_reference": "openshift-logging/lokistack-gateway-rhel8@sha256:449f4cf0b3d0c0d6724cc2346c2121df58ef43297c56cc540e05158ad5c8ffbc_amd64",
"relates_to_product_reference": "8Base-RHOL-5.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/lokistack-gateway-rhel8@sha256:5954a498e527ee59a3f655250a4f5535a26b49c6fd61889271affb08104839f8_s390x as a component of RHOL 5.5 for RHEL 8",
"product_id": "8Base-RHOL-5.5:openshift-logging/lokistack-gateway-rhel8@sha256:5954a498e527ee59a3f655250a4f5535a26b49c6fd61889271affb08104839f8_s390x"
},
"product_reference": "openshift-logging/lokistack-gateway-rhel8@sha256:5954a498e527ee59a3f655250a4f5535a26b49c6fd61889271affb08104839f8_s390x",
"relates_to_product_reference": "8Base-RHOL-5.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/opa-openshift-rhel8@sha256:4c1b37da97e80aa76f2612f34745180a026214a415ed9a186ab81ec8fa96e17d_amd64 as a component of RHOL 5.5 for RHEL 8",
"product_id": "8Base-RHOL-5.5:openshift-logging/opa-openshift-rhel8@sha256:4c1b37da97e80aa76f2612f34745180a026214a415ed9a186ab81ec8fa96e17d_amd64"
},
"product_reference": "openshift-logging/opa-openshift-rhel8@sha256:4c1b37da97e80aa76f2612f34745180a026214a415ed9a186ab81ec8fa96e17d_amd64",
"relates_to_product_reference": "8Base-RHOL-5.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/opa-openshift-rhel8@sha256:847c70de5af59c9aec366612a74477de931977cf79d5f9ed117772e931589497_ppc64le as a component of RHOL 5.5 for RHEL 8",
"product_id": "8Base-RHOL-5.5:openshift-logging/opa-openshift-rhel8@sha256:847c70de5af59c9aec366612a74477de931977cf79d5f9ed117772e931589497_ppc64le"
},
"product_reference": "openshift-logging/opa-openshift-rhel8@sha256:847c70de5af59c9aec366612a74477de931977cf79d5f9ed117772e931589497_ppc64le",
"relates_to_product_reference": "8Base-RHOL-5.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/opa-openshift-rhel8@sha256:c8458b60077d018eaa78f38fc0b85786d8108b88faea6e420cc01b720f23af48_arm64 as a component of RHOL 5.5 for RHEL 8",
"product_id": "8Base-RHOL-5.5:openshift-logging/opa-openshift-rhel8@sha256:c8458b60077d018eaa78f38fc0b85786d8108b88faea6e420cc01b720f23af48_arm64"
},
"product_reference": "openshift-logging/opa-openshift-rhel8@sha256:c8458b60077d018eaa78f38fc0b85786d8108b88faea6e420cc01b720f23af48_arm64",
"relates_to_product_reference": "8Base-RHOL-5.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/opa-openshift-rhel8@sha256:fc99739f4354e8b28613f50b441d3f7a93bea3e3b106d7c052b607c24b994b9e_s390x as a component of RHOL 5.5 for RHEL 8",
"product_id": "8Base-RHOL-5.5:openshift-logging/opa-openshift-rhel8@sha256:fc99739f4354e8b28613f50b441d3f7a93bea3e3b106d7c052b607c24b994b9e_s390x"
},
"product_reference": "openshift-logging/opa-openshift-rhel8@sha256:fc99739f4354e8b28613f50b441d3f7a93bea3e3b106d7c052b607c24b994b9e_s390x",
"relates_to_product_reference": "8Base-RHOL-5.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/vector-rhel8@sha256:6c237605a0062e69e10a1fad47375f9c51dbccb110e1d11a02f2b7101d611e8f_amd64 as a component of RHOL 5.5 for RHEL 8",
"product_id": "8Base-RHOL-5.5:openshift-logging/vector-rhel8@sha256:6c237605a0062e69e10a1fad47375f9c51dbccb110e1d11a02f2b7101d611e8f_amd64"
},
"product_reference": "openshift-logging/vector-rhel8@sha256:6c237605a0062e69e10a1fad47375f9c51dbccb110e1d11a02f2b7101d611e8f_amd64",
"relates_to_product_reference": "8Base-RHOL-5.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/vector-rhel8@sha256:6c8b9e91e4d527bc0694879c7ce908e3d67877fd53191b71af95191cc0149afa_arm64 as a component of RHOL 5.5 for RHEL 8",
"product_id": "8Base-RHOL-5.5:openshift-logging/vector-rhel8@sha256:6c8b9e91e4d527bc0694879c7ce908e3d67877fd53191b71af95191cc0149afa_arm64"
},
"product_reference": "openshift-logging/vector-rhel8@sha256:6c8b9e91e4d527bc0694879c7ce908e3d67877fd53191b71af95191cc0149afa_arm64",
"relates_to_product_reference": "8Base-RHOL-5.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/vector-rhel8@sha256:b22fe4e184b908986301fda4d2b57f4b9b91149168386a8d9c7ac9b0c4631c7c_ppc64le as a component of RHOL 5.5 for RHEL 8",
"product_id": "8Base-RHOL-5.5:openshift-logging/vector-rhel8@sha256:b22fe4e184b908986301fda4d2b57f4b9b91149168386a8d9c7ac9b0c4631c7c_ppc64le"
},
"product_reference": "openshift-logging/vector-rhel8@sha256:b22fe4e184b908986301fda4d2b57f4b9b91149168386a8d9c7ac9b0c4631c7c_ppc64le",
"relates_to_product_reference": "8Base-RHOL-5.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/vector-rhel8@sha256:c117a0024d06340a9a28686c144642d6591192738f263f4684a7d09af0b16c71_s390x as a component of RHOL 5.5 for RHEL 8",
"product_id": "8Base-RHOL-5.5:openshift-logging/vector-rhel8@sha256:c117a0024d06340a9a28686c144642d6591192738f263f4684a7d09af0b16c71_s390x"
},
"product_reference": "openshift-logging/vector-rhel8@sha256:c117a0024d06340a9a28686c144642d6591192738f263f4684a7d09af0b16c71_s390x",
"relates_to_product_reference": "8Base-RHOL-5.5"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2022-32149",
"cwe": {
"id": "CWE-407",
"name": "Inefficient Algorithmic Complexity"
},
"discovery_date": "2022-10-12T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-RHOL-5.5:openshift-logging/cluster-logging-operator-bundle@sha256:a78fd59207ef6cc8ddaaa3f3ae7140b7678e96e0677517623d1537afc05e84dd_amd64",
"8Base-RHOL-5.5:openshift-logging/cluster-logging-rhel8-operator@sha256:07ab076aa9b573d330ace59bf4de080ea64dbc7b3424357fc39c0c70ede27873_arm64",
"8Base-RHOL-5.5:openshift-logging/cluster-logging-rhel8-operator@sha256:11c10388503a708a962e3dfc5cdd9b6ad5c5d4d4a68b11f97f8fae2cc3884083_s390x",
"8Base-RHOL-5.5:openshift-logging/cluster-logging-rhel8-operator@sha256:414649f77a20e04b3eb16d64acf81a4d261394016d4a890da309cbb8216c1d4a_amd64",
"8Base-RHOL-5.5:openshift-logging/cluster-logging-rhel8-operator@sha256:b4eeab42904e5a81e7adb8801bd901a53a5b81b2464b33816c203daf7587f89f_ppc64le",
"8Base-RHOL-5.5:openshift-logging/elasticsearch-operator-bundle@sha256:d09cafc7f6bbb446608051cebb1c943575e80f9987bb4cad8af53e0354a0e7cd_amd64",
"8Base-RHOL-5.5:openshift-logging/elasticsearch-rhel8-operator@sha256:5236634419119024d3f8779dbd78639a54c2323389f56fbf25dacdc499a072d3_s390x",
"8Base-RHOL-5.5:openshift-logging/elasticsearch-rhel8-operator@sha256:64954ce7d233d6c109e46645cd8d55d8a06068328ce3a22f646ede7c9fde78c8_ppc64le",
"8Base-RHOL-5.5:openshift-logging/elasticsearch-rhel8-operator@sha256:c25b7b7c0f073fdfcf9fd90572790064cdff26d61a4e4db751d4197ff2c5b4c1_amd64",
"8Base-RHOL-5.5:openshift-logging/elasticsearch-rhel8-operator@sha256:dce08ac53092fc51958b78df9b4b870926a079fe4cdc4fb2d46c8ba545a22e6a_arm64",
"8Base-RHOL-5.5:openshift-logging/elasticsearch6-rhel8@sha256:1019e03ddff4726caae53e800403cbaa82ce057c7553552ad027a37d3be5824f_ppc64le",
"8Base-RHOL-5.5:openshift-logging/elasticsearch6-rhel8@sha256:6dfb5e18aa3dc6ce8e2535e13de1d53eea68b218854971e0eb594f677f6da7c7_arm64",
"8Base-RHOL-5.5:openshift-logging/elasticsearch6-rhel8@sha256:7c143b790fef75a04e8ed1be49576861651f66371355a3f5aa304a325faf6e5c_s390x",
"8Base-RHOL-5.5:openshift-logging/elasticsearch6-rhel8@sha256:bf574cff65baba457e3199aae7d1b0e605403a7968e9af746a6cfc5d9a4b29c5_amd64",
"8Base-RHOL-5.5:openshift-logging/eventrouter-rhel8@sha256:0590711175be3b10f646256407cb7d72df63333589d527199260f738a91f2e3d_arm64",
"8Base-RHOL-5.5:openshift-logging/eventrouter-rhel8@sha256:646995416047cf48070c60b9ab064d454ff9ed772a92558f9627e3832f0ccd3c_amd64",
"8Base-RHOL-5.5:openshift-logging/eventrouter-rhel8@sha256:ac91af413a363890bb01772488e371e4dc698ecfb77f047bb83bf638d497aa7c_ppc64le",
"8Base-RHOL-5.5:openshift-logging/eventrouter-rhel8@sha256:eaf322aeccc73ec9d8d5f5a9d6ee368ee3f68409031e18a60cc699e3ca5c144b_s390x",
"8Base-RHOL-5.5:openshift-logging/fluentd-rhel8@sha256:3d4b83f86b2d2f1c73ab184a3471d0d4da04bb6e76487c9f546da87998e480dc_arm64",
"8Base-RHOL-5.5:openshift-logging/fluentd-rhel8@sha256:490740ea41377e7d18ffba700a5022915edc13f6b38f86a6d9d475dfc61df935_s390x",
"8Base-RHOL-5.5:openshift-logging/fluentd-rhel8@sha256:790fe2b90b51f8aff5d10b1525bcf7d35e5517674245993dac6696ebf2a24baf_ppc64le",
"8Base-RHOL-5.5:openshift-logging/fluentd-rhel8@sha256:dc8fe0ca5a488c6738e6904871a620f9444f30475863a09846f8205569c25e54_amd64",
"8Base-RHOL-5.5:openshift-logging/kibana6-rhel8@sha256:43e4da1a741543ac8cdf646901aff3185e5f30d6fad7e68a2233e2bd8d4ebe4b_s390x",
"8Base-RHOL-5.5:openshift-logging/kibana6-rhel8@sha256:44f3446b172b3ea7f0fd4de9f8039eba256a6bea56715748af00f361e49b1519_amd64",
"8Base-RHOL-5.5:openshift-logging/kibana6-rhel8@sha256:93c33d6810eb6e71e7e543c1c26a29e163214df64121c814b4424322308b0a30_ppc64le",
"8Base-RHOL-5.5:openshift-logging/kibana6-rhel8@sha256:ca4f273fb088980bfcc3607bd7ea2d40cc93298262cb3f5ce4054a6235152d1e_arm64",
"8Base-RHOL-5.5:openshift-logging/log-file-metric-exporter-rhel8@sha256:44e17bbdb8c7ac0a7868b3be7e29d58401702384dab3a66efaa08d1176035672_s390x",
"8Base-RHOL-5.5:openshift-logging/log-file-metric-exporter-rhel8@sha256:8b76243469011045e72b7a339288986e7561a3005aa94d580d5b1082580e9cec_ppc64le",
"8Base-RHOL-5.5:openshift-logging/log-file-metric-exporter-rhel8@sha256:e91d4b026d38091cb707e0213f329d0781a3517f3eca4d209d09d6c1edb1a1d3_amd64",
"8Base-RHOL-5.5:openshift-logging/log-file-metric-exporter-rhel8@sha256:f0ca78341daa3d41ffe460f5aa504219c72ee673dd57a82f344d3239b69717be_arm64",
"8Base-RHOL-5.5:openshift-logging/logging-curator5-rhel8@sha256:6f17fc02901a898b77c674cd4ba1764423e849c5faa888b2907ff7356accc66c_s390x",
"8Base-RHOL-5.5:openshift-logging/logging-curator5-rhel8@sha256:c8ea484f5e15b7b53941f251db9b5be08c8cb6f3a14d99285277d9eadf969e98_arm64",
"8Base-RHOL-5.5:openshift-logging/logging-curator5-rhel8@sha256:e26efb87488b53ebd4e5233515906974675b3a759f4a1c00f447df8821d5f030_ppc64le",
"8Base-RHOL-5.5:openshift-logging/logging-curator5-rhel8@sha256:e6ae5eef57de608fb1d4393fe824d0befffd8f5b696b5ce44e571fdcddb46f1f_amd64",
"8Base-RHOL-5.5:openshift-logging/logging-loki-rhel8@sha256:6242c3792c8c0469012be8b0140c2476e41f80b5271ba78ff42c63aa041be30f_s390x",
"8Base-RHOL-5.5:openshift-logging/logging-loki-rhel8@sha256:947becc46b99656f9faa6067f2cf38dbef0d40e85b56d62aafcb243052920dfc_amd64",
"8Base-RHOL-5.5:openshift-logging/logging-loki-rhel8@sha256:969ce1d586fb7fbdd65d07c0b790f48fd6f81e659d1323514906bb03ae9fe79b_ppc64le",
"8Base-RHOL-5.5:openshift-logging/logging-loki-rhel8@sha256:dd5e5a043befc54eeb63ff51a01691778053c90de5c9b8946d6a1d808fbcf0df_arm64",
"8Base-RHOL-5.5:openshift-logging/logging-view-plugin-rhel8@sha256:147676e1a3c66757508be0046c28ccb7985f15af7f8f4a045fa5ca424c0c684d_arm64",
"8Base-RHOL-5.5:openshift-logging/logging-view-plugin-rhel8@sha256:bea8f3f31073874a77af55c8664cbf167cd8bad5296e1bf444b9490b06484b56_amd64",
"8Base-RHOL-5.5:openshift-logging/logging-view-plugin-rhel8@sha256:da8c90c5b3b68e9b98a76828a450a9d7c579256b04aa9daf87ddfab9bad5548c_ppc64le",
"8Base-RHOL-5.5:openshift-logging/logging-view-plugin-rhel8@sha256:e3e5b570f9c819cb10ad38e928a301e8f0554e45052037b03f1ba81a3faa6a15_s390x",
"8Base-RHOL-5.5:openshift-logging/loki-operator-bundle@sha256:1d75006c9d03648857963a8772644d4228361d97fb07c8652326b61fd5d30f8c_amd64",
"8Base-RHOL-5.5:openshift-logging/loki-rhel8-operator@sha256:43fae2b6532712da7d0f83b5dda5797c9764fcac4b0e18580a19e54ee7dfcff6_s390x",
"8Base-RHOL-5.5:openshift-logging/loki-rhel8-operator@sha256:4eba6362f8aaa0450d07b87824148d2c15232b871d0ba6bc34f1962d2970e753_ppc64le",
"8Base-RHOL-5.5:openshift-logging/loki-rhel8-operator@sha256:dfa4ca06abb576fa071fb30c425bc6be631c0453939de562e1dc0b4e76de4f81_arm64",
"8Base-RHOL-5.5:openshift-logging/loki-rhel8-operator@sha256:e5289e40532a01c605760b2f438acfb66257b730a89249269e46dc9c0058aec1_amd64",
"8Base-RHOL-5.5:openshift-logging/lokistack-gateway-rhel8@sha256:0a3eb7a1a50b75528be737eb2768e671a643eea324c967a0381296b61f8e399e_arm64",
"8Base-RHOL-5.5:openshift-logging/lokistack-gateway-rhel8@sha256:42ebf89821e0f8e4b7d03cc5a6d5a30d48f73a1ab2b7486c8a0bb1e5c2cfd4b4_ppc64le",
"8Base-RHOL-5.5:openshift-logging/lokistack-gateway-rhel8@sha256:449f4cf0b3d0c0d6724cc2346c2121df58ef43297c56cc540e05158ad5c8ffbc_amd64",
"8Base-RHOL-5.5:openshift-logging/lokistack-gateway-rhel8@sha256:5954a498e527ee59a3f655250a4f5535a26b49c6fd61889271affb08104839f8_s390x",
"8Base-RHOL-5.5:openshift-logging/opa-openshift-rhel8@sha256:4c1b37da97e80aa76f2612f34745180a026214a415ed9a186ab81ec8fa96e17d_amd64",
"8Base-RHOL-5.5:openshift-logging/opa-openshift-rhel8@sha256:847c70de5af59c9aec366612a74477de931977cf79d5f9ed117772e931589497_ppc64le",
"8Base-RHOL-5.5:openshift-logging/opa-openshift-rhel8@sha256:c8458b60077d018eaa78f38fc0b85786d8108b88faea6e420cc01b720f23af48_arm64",
"8Base-RHOL-5.5:openshift-logging/opa-openshift-rhel8@sha256:fc99739f4354e8b28613f50b441d3f7a93bea3e3b106d7c052b607c24b994b9e_s390x",
"8Base-RHOL-5.5:openshift-logging/vector-rhel8@sha256:6c237605a0062e69e10a1fad47375f9c51dbccb110e1d11a02f2b7101d611e8f_amd64",
"8Base-RHOL-5.5:openshift-logging/vector-rhel8@sha256:6c8b9e91e4d527bc0694879c7ce908e3d67877fd53191b71af95191cc0149afa_arm64",
"8Base-RHOL-5.5:openshift-logging/vector-rhel8@sha256:b22fe4e184b908986301fda4d2b57f4b9b91149168386a8d9c7ac9b0c4631c7c_ppc64le",
"8Base-RHOL-5.5:openshift-logging/vector-rhel8@sha256:c117a0024d06340a9a28686c144642d6591192738f263f4684a7d09af0b16c71_s390x"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2134010"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in the golang.org/x/text/language package. An attacker can craft an Accept-Language header which ParseAcceptLanguage will take significant time to parse. This issue leads to a denial of service, and can impact availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: golang.org/x/text/language: ParseAcceptLanguage takes a long time to parse complex tags",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "After careful analysis of the vulnerability Redhat is choosing to keep the vulnerability severity as moderate,the vulnerability exists in the ParseAcceptLanguage function of the golang text/language package,when an attacker could craft an unusually large accept header and due to the parser taking quadratic time complexity to finish, firstly the attacker would have to find a way smuggle an input to the parser and even then this would simply not result in a crash of any kind but more of resource hang which while can be unpleasant,does not equate to any real world damage.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-RHOL-5.5:openshift-logging/elasticsearch-proxy-rhel8@sha256:89f980b63cbcf7956449d8cee41c884ea4ae7d76f02454f7e32058576fd92fa5_ppc64le",
"8Base-RHOL-5.5:openshift-logging/elasticsearch-proxy-rhel8@sha256:a6c03fd0fe66206bff59ba019cc60085de4c65d4efae8a637f1ac48b91688371_arm64",
"8Base-RHOL-5.5:openshift-logging/elasticsearch-proxy-rhel8@sha256:dcdd0c515b3b5a1a6e807929fb8e8d65c1ee2aba3bf696d2b9f852e8994e47b8_s390x",
"8Base-RHOL-5.5:openshift-logging/elasticsearch-proxy-rhel8@sha256:e1755002225548182e17bd82b1c129b2ac61e623c3c37c4d51a535012088cacc_amd64"
],
"known_not_affected": [
"8Base-RHOL-5.5:openshift-logging/cluster-logging-operator-bundle@sha256:a78fd59207ef6cc8ddaaa3f3ae7140b7678e96e0677517623d1537afc05e84dd_amd64",
"8Base-RHOL-5.5:openshift-logging/cluster-logging-rhel8-operator@sha256:07ab076aa9b573d330ace59bf4de080ea64dbc7b3424357fc39c0c70ede27873_arm64",
"8Base-RHOL-5.5:openshift-logging/cluster-logging-rhel8-operator@sha256:11c10388503a708a962e3dfc5cdd9b6ad5c5d4d4a68b11f97f8fae2cc3884083_s390x",
"8Base-RHOL-5.5:openshift-logging/cluster-logging-rhel8-operator@sha256:414649f77a20e04b3eb16d64acf81a4d261394016d4a890da309cbb8216c1d4a_amd64",
"8Base-RHOL-5.5:openshift-logging/cluster-logging-rhel8-operator@sha256:b4eeab42904e5a81e7adb8801bd901a53a5b81b2464b33816c203daf7587f89f_ppc64le",
"8Base-RHOL-5.5:openshift-logging/elasticsearch-operator-bundle@sha256:d09cafc7f6bbb446608051cebb1c943575e80f9987bb4cad8af53e0354a0e7cd_amd64",
"8Base-RHOL-5.5:openshift-logging/elasticsearch-rhel8-operator@sha256:5236634419119024d3f8779dbd78639a54c2323389f56fbf25dacdc499a072d3_s390x",
"8Base-RHOL-5.5:openshift-logging/elasticsearch-rhel8-operator@sha256:64954ce7d233d6c109e46645cd8d55d8a06068328ce3a22f646ede7c9fde78c8_ppc64le",
"8Base-RHOL-5.5:openshift-logging/elasticsearch-rhel8-operator@sha256:c25b7b7c0f073fdfcf9fd90572790064cdff26d61a4e4db751d4197ff2c5b4c1_amd64",
"8Base-RHOL-5.5:openshift-logging/elasticsearch-rhel8-operator@sha256:dce08ac53092fc51958b78df9b4b870926a079fe4cdc4fb2d46c8ba545a22e6a_arm64",
"8Base-RHOL-5.5:openshift-logging/elasticsearch6-rhel8@sha256:1019e03ddff4726caae53e800403cbaa82ce057c7553552ad027a37d3be5824f_ppc64le",
"8Base-RHOL-5.5:openshift-logging/elasticsearch6-rhel8@sha256:6dfb5e18aa3dc6ce8e2535e13de1d53eea68b218854971e0eb594f677f6da7c7_arm64",
"8Base-RHOL-5.5:openshift-logging/elasticsearch6-rhel8@sha256:7c143b790fef75a04e8ed1be49576861651f66371355a3f5aa304a325faf6e5c_s390x",
"8Base-RHOL-5.5:openshift-logging/elasticsearch6-rhel8@sha256:bf574cff65baba457e3199aae7d1b0e605403a7968e9af746a6cfc5d9a4b29c5_amd64",
"8Base-RHOL-5.5:openshift-logging/eventrouter-rhel8@sha256:0590711175be3b10f646256407cb7d72df63333589d527199260f738a91f2e3d_arm64",
"8Base-RHOL-5.5:openshift-logging/eventrouter-rhel8@sha256:646995416047cf48070c60b9ab064d454ff9ed772a92558f9627e3832f0ccd3c_amd64",
"8Base-RHOL-5.5:openshift-logging/eventrouter-rhel8@sha256:ac91af413a363890bb01772488e371e4dc698ecfb77f047bb83bf638d497aa7c_ppc64le",
"8Base-RHOL-5.5:openshift-logging/eventrouter-rhel8@sha256:eaf322aeccc73ec9d8d5f5a9d6ee368ee3f68409031e18a60cc699e3ca5c144b_s390x",
"8Base-RHOL-5.5:openshift-logging/fluentd-rhel8@sha256:3d4b83f86b2d2f1c73ab184a3471d0d4da04bb6e76487c9f546da87998e480dc_arm64",
"8Base-RHOL-5.5:openshift-logging/fluentd-rhel8@sha256:490740ea41377e7d18ffba700a5022915edc13f6b38f86a6d9d475dfc61df935_s390x",
"8Base-RHOL-5.5:openshift-logging/fluentd-rhel8@sha256:790fe2b90b51f8aff5d10b1525bcf7d35e5517674245993dac6696ebf2a24baf_ppc64le",
"8Base-RHOL-5.5:openshift-logging/fluentd-rhel8@sha256:dc8fe0ca5a488c6738e6904871a620f9444f30475863a09846f8205569c25e54_amd64",
"8Base-RHOL-5.5:openshift-logging/kibana6-rhel8@sha256:43e4da1a741543ac8cdf646901aff3185e5f30d6fad7e68a2233e2bd8d4ebe4b_s390x",
"8Base-RHOL-5.5:openshift-logging/kibana6-rhel8@sha256:44f3446b172b3ea7f0fd4de9f8039eba256a6bea56715748af00f361e49b1519_amd64",
"8Base-RHOL-5.5:openshift-logging/kibana6-rhel8@sha256:93c33d6810eb6e71e7e543c1c26a29e163214df64121c814b4424322308b0a30_ppc64le",
"8Base-RHOL-5.5:openshift-logging/kibana6-rhel8@sha256:ca4f273fb088980bfcc3607bd7ea2d40cc93298262cb3f5ce4054a6235152d1e_arm64",
"8Base-RHOL-5.5:openshift-logging/log-file-metric-exporter-rhel8@sha256:44e17bbdb8c7ac0a7868b3be7e29d58401702384dab3a66efaa08d1176035672_s390x",
"8Base-RHOL-5.5:openshift-logging/log-file-metric-exporter-rhel8@sha256:8b76243469011045e72b7a339288986e7561a3005aa94d580d5b1082580e9cec_ppc64le",
"8Base-RHOL-5.5:openshift-logging/log-file-metric-exporter-rhel8@sha256:e91d4b026d38091cb707e0213f329d0781a3517f3eca4d209d09d6c1edb1a1d3_amd64",
"8Base-RHOL-5.5:openshift-logging/log-file-metric-exporter-rhel8@sha256:f0ca78341daa3d41ffe460f5aa504219c72ee673dd57a82f344d3239b69717be_arm64",
"8Base-RHOL-5.5:openshift-logging/logging-curator5-rhel8@sha256:6f17fc02901a898b77c674cd4ba1764423e849c5faa888b2907ff7356accc66c_s390x",
"8Base-RHOL-5.5:openshift-logging/logging-curator5-rhel8@sha256:c8ea484f5e15b7b53941f251db9b5be08c8cb6f3a14d99285277d9eadf969e98_arm64",
"8Base-RHOL-5.5:openshift-logging/logging-curator5-rhel8@sha256:e26efb87488b53ebd4e5233515906974675b3a759f4a1c00f447df8821d5f030_ppc64le",
"8Base-RHOL-5.5:openshift-logging/logging-curator5-rhel8@sha256:e6ae5eef57de608fb1d4393fe824d0befffd8f5b696b5ce44e571fdcddb46f1f_amd64",
"8Base-RHOL-5.5:openshift-logging/logging-loki-rhel8@sha256:6242c3792c8c0469012be8b0140c2476e41f80b5271ba78ff42c63aa041be30f_s390x",
"8Base-RHOL-5.5:openshift-logging/logging-loki-rhel8@sha256:947becc46b99656f9faa6067f2cf38dbef0d40e85b56d62aafcb243052920dfc_amd64",
"8Base-RHOL-5.5:openshift-logging/logging-loki-rhel8@sha256:969ce1d586fb7fbdd65d07c0b790f48fd6f81e659d1323514906bb03ae9fe79b_ppc64le",
"8Base-RHOL-5.5:openshift-logging/logging-loki-rhel8@sha256:dd5e5a043befc54eeb63ff51a01691778053c90de5c9b8946d6a1d808fbcf0df_arm64",
"8Base-RHOL-5.5:openshift-logging/logging-view-plugin-rhel8@sha256:147676e1a3c66757508be0046c28ccb7985f15af7f8f4a045fa5ca424c0c684d_arm64",
"8Base-RHOL-5.5:openshift-logging/logging-view-plugin-rhel8@sha256:bea8f3f31073874a77af55c8664cbf167cd8bad5296e1bf444b9490b06484b56_amd64",
"8Base-RHOL-5.5:openshift-logging/logging-view-plugin-rhel8@sha256:da8c90c5b3b68e9b98a76828a450a9d7c579256b04aa9daf87ddfab9bad5548c_ppc64le",
"8Base-RHOL-5.5:openshift-logging/logging-view-plugin-rhel8@sha256:e3e5b570f9c819cb10ad38e928a301e8f0554e45052037b03f1ba81a3faa6a15_s390x",
"8Base-RHOL-5.5:openshift-logging/loki-operator-bundle@sha256:1d75006c9d03648857963a8772644d4228361d97fb07c8652326b61fd5d30f8c_amd64",
"8Base-RHOL-5.5:openshift-logging/loki-rhel8-operator@sha256:43fae2b6532712da7d0f83b5dda5797c9764fcac4b0e18580a19e54ee7dfcff6_s390x",
"8Base-RHOL-5.5:openshift-logging/loki-rhel8-operator@sha256:4eba6362f8aaa0450d07b87824148d2c15232b871d0ba6bc34f1962d2970e753_ppc64le",
"8Base-RHOL-5.5:openshift-logging/loki-rhel8-operator@sha256:dfa4ca06abb576fa071fb30c425bc6be631c0453939de562e1dc0b4e76de4f81_arm64",
"8Base-RHOL-5.5:openshift-logging/loki-rhel8-operator@sha256:e5289e40532a01c605760b2f438acfb66257b730a89249269e46dc9c0058aec1_amd64",
"8Base-RHOL-5.5:openshift-logging/lokistack-gateway-rhel8@sha256:0a3eb7a1a50b75528be737eb2768e671a643eea324c967a0381296b61f8e399e_arm64",
"8Base-RHOL-5.5:openshift-logging/lokistack-gateway-rhel8@sha256:42ebf89821e0f8e4b7d03cc5a6d5a30d48f73a1ab2b7486c8a0bb1e5c2cfd4b4_ppc64le",
"8Base-RHOL-5.5:openshift-logging/lokistack-gateway-rhel8@sha256:449f4cf0b3d0c0d6724cc2346c2121df58ef43297c56cc540e05158ad5c8ffbc_amd64",
"8Base-RHOL-5.5:openshift-logging/lokistack-gateway-rhel8@sha256:5954a498e527ee59a3f655250a4f5535a26b49c6fd61889271affb08104839f8_s390x",
"8Base-RHOL-5.5:openshift-logging/opa-openshift-rhel8@sha256:4c1b37da97e80aa76f2612f34745180a026214a415ed9a186ab81ec8fa96e17d_amd64",
"8Base-RHOL-5.5:openshift-logging/opa-openshift-rhel8@sha256:847c70de5af59c9aec366612a74477de931977cf79d5f9ed117772e931589497_ppc64le",
"8Base-RHOL-5.5:openshift-logging/opa-openshift-rhel8@sha256:c8458b60077d018eaa78f38fc0b85786d8108b88faea6e420cc01b720f23af48_arm64",
"8Base-RHOL-5.5:openshift-logging/opa-openshift-rhel8@sha256:fc99739f4354e8b28613f50b441d3f7a93bea3e3b106d7c052b607c24b994b9e_s390x",
"8Base-RHOL-5.5:openshift-logging/vector-rhel8@sha256:6c237605a0062e69e10a1fad47375f9c51dbccb110e1d11a02f2b7101d611e8f_amd64",
"8Base-RHOL-5.5:openshift-logging/vector-rhel8@sha256:6c8b9e91e4d527bc0694879c7ce908e3d67877fd53191b71af95191cc0149afa_arm64",
"8Base-RHOL-5.5:openshift-logging/vector-rhel8@sha256:b22fe4e184b908986301fda4d2b57f4b9b91149168386a8d9c7ac9b0c4631c7c_ppc64le",
"8Base-RHOL-5.5:openshift-logging/vector-rhel8@sha256:c117a0024d06340a9a28686c144642d6591192738f263f4684a7d09af0b16c71_s390x"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-32149"
},
{
"category": "external",
"summary": "RHBZ#2134010",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2134010"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-32149",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32149"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-32149",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-32149"
},
{
"category": "external",
"summary": "https://go.dev/issue/56152",
"url": "https://go.dev/issue/56152"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-dev/c/qfPIly0X7aU",
"url": "https://groups.google.com/g/golang-dev/c/qfPIly0X7aU"
}
],
"release_date": "2022-10-11T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-11-10T03:50:23+00:00",
"details": "For OpenShift Container Platform 4.11 see the following documentation, which will be updated shortly for this release, for important instructions on how to upgrade your cluster and fully apply this errata update:\n\nhttps://docs.openshift.com/container-platform/4.11/release_notes/ocp-4-11-release-notes.html\n\nFor Red Hat OpenShift Logging 5.5, see the following instructions to apply this update:\n\nhttps://docs.openshift.com/container-platform/4.11/logging/cluster-logging-upgrading.html",
"product_ids": [
"8Base-RHOL-5.5:openshift-logging/elasticsearch-proxy-rhel8@sha256:89f980b63cbcf7956449d8cee41c884ea4ae7d76f02454f7e32058576fd92fa5_ppc64le",
"8Base-RHOL-5.5:openshift-logging/elasticsearch-proxy-rhel8@sha256:a6c03fd0fe66206bff59ba019cc60085de4c65d4efae8a637f1ac48b91688371_arm64",
"8Base-RHOL-5.5:openshift-logging/elasticsearch-proxy-rhel8@sha256:dcdd0c515b3b5a1a6e807929fb8e8d65c1ee2aba3bf696d2b9f852e8994e47b8_s390x",
"8Base-RHOL-5.5:openshift-logging/elasticsearch-proxy-rhel8@sha256:e1755002225548182e17bd82b1c129b2ac61e623c3c37c4d51a535012088cacc_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:7434"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"8Base-RHOL-5.5:openshift-logging/cluster-logging-operator-bundle@sha256:a78fd59207ef6cc8ddaaa3f3ae7140b7678e96e0677517623d1537afc05e84dd_amd64",
"8Base-RHOL-5.5:openshift-logging/cluster-logging-rhel8-operator@sha256:07ab076aa9b573d330ace59bf4de080ea64dbc7b3424357fc39c0c70ede27873_arm64",
"8Base-RHOL-5.5:openshift-logging/cluster-logging-rhel8-operator@sha256:11c10388503a708a962e3dfc5cdd9b6ad5c5d4d4a68b11f97f8fae2cc3884083_s390x",
"8Base-RHOL-5.5:openshift-logging/cluster-logging-rhel8-operator@sha256:414649f77a20e04b3eb16d64acf81a4d261394016d4a890da309cbb8216c1d4a_amd64",
"8Base-RHOL-5.5:openshift-logging/cluster-logging-rhel8-operator@sha256:b4eeab42904e5a81e7adb8801bd901a53a5b81b2464b33816c203daf7587f89f_ppc64le",
"8Base-RHOL-5.5:openshift-logging/elasticsearch-operator-bundle@sha256:d09cafc7f6bbb446608051cebb1c943575e80f9987bb4cad8af53e0354a0e7cd_amd64",
"8Base-RHOL-5.5:openshift-logging/elasticsearch-proxy-rhel8@sha256:89f980b63cbcf7956449d8cee41c884ea4ae7d76f02454f7e32058576fd92fa5_ppc64le",
"8Base-RHOL-5.5:openshift-logging/elasticsearch-proxy-rhel8@sha256:a6c03fd0fe66206bff59ba019cc60085de4c65d4efae8a637f1ac48b91688371_arm64",
"8Base-RHOL-5.5:openshift-logging/elasticsearch-proxy-rhel8@sha256:dcdd0c515b3b5a1a6e807929fb8e8d65c1ee2aba3bf696d2b9f852e8994e47b8_s390x",
"8Base-RHOL-5.5:openshift-logging/elasticsearch-proxy-rhel8@sha256:e1755002225548182e17bd82b1c129b2ac61e623c3c37c4d51a535012088cacc_amd64",
"8Base-RHOL-5.5:openshift-logging/elasticsearch-rhel8-operator@sha256:5236634419119024d3f8779dbd78639a54c2323389f56fbf25dacdc499a072d3_s390x",
"8Base-RHOL-5.5:openshift-logging/elasticsearch-rhel8-operator@sha256:64954ce7d233d6c109e46645cd8d55d8a06068328ce3a22f646ede7c9fde78c8_ppc64le",
"8Base-RHOL-5.5:openshift-logging/elasticsearch-rhel8-operator@sha256:c25b7b7c0f073fdfcf9fd90572790064cdff26d61a4e4db751d4197ff2c5b4c1_amd64",
"8Base-RHOL-5.5:openshift-logging/elasticsearch-rhel8-operator@sha256:dce08ac53092fc51958b78df9b4b870926a079fe4cdc4fb2d46c8ba545a22e6a_arm64",
"8Base-RHOL-5.5:openshift-logging/elasticsearch6-rhel8@sha256:1019e03ddff4726caae53e800403cbaa82ce057c7553552ad027a37d3be5824f_ppc64le",
"8Base-RHOL-5.5:openshift-logging/elasticsearch6-rhel8@sha256:6dfb5e18aa3dc6ce8e2535e13de1d53eea68b218854971e0eb594f677f6da7c7_arm64",
"8Base-RHOL-5.5:openshift-logging/elasticsearch6-rhel8@sha256:7c143b790fef75a04e8ed1be49576861651f66371355a3f5aa304a325faf6e5c_s390x",
"8Base-RHOL-5.5:openshift-logging/elasticsearch6-rhel8@sha256:bf574cff65baba457e3199aae7d1b0e605403a7968e9af746a6cfc5d9a4b29c5_amd64",
"8Base-RHOL-5.5:openshift-logging/eventrouter-rhel8@sha256:0590711175be3b10f646256407cb7d72df63333589d527199260f738a91f2e3d_arm64",
"8Base-RHOL-5.5:openshift-logging/eventrouter-rhel8@sha256:646995416047cf48070c60b9ab064d454ff9ed772a92558f9627e3832f0ccd3c_amd64",
"8Base-RHOL-5.5:openshift-logging/eventrouter-rhel8@sha256:ac91af413a363890bb01772488e371e4dc698ecfb77f047bb83bf638d497aa7c_ppc64le",
"8Base-RHOL-5.5:openshift-logging/eventrouter-rhel8@sha256:eaf322aeccc73ec9d8d5f5a9d6ee368ee3f68409031e18a60cc699e3ca5c144b_s390x",
"8Base-RHOL-5.5:openshift-logging/fluentd-rhel8@sha256:3d4b83f86b2d2f1c73ab184a3471d0d4da04bb6e76487c9f546da87998e480dc_arm64",
"8Base-RHOL-5.5:openshift-logging/fluentd-rhel8@sha256:490740ea41377e7d18ffba700a5022915edc13f6b38f86a6d9d475dfc61df935_s390x",
"8Base-RHOL-5.5:openshift-logging/fluentd-rhel8@sha256:790fe2b90b51f8aff5d10b1525bcf7d35e5517674245993dac6696ebf2a24baf_ppc64le",
"8Base-RHOL-5.5:openshift-logging/fluentd-rhel8@sha256:dc8fe0ca5a488c6738e6904871a620f9444f30475863a09846f8205569c25e54_amd64",
"8Base-RHOL-5.5:openshift-logging/kibana6-rhel8@sha256:43e4da1a741543ac8cdf646901aff3185e5f30d6fad7e68a2233e2bd8d4ebe4b_s390x",
"8Base-RHOL-5.5:openshift-logging/kibana6-rhel8@sha256:44f3446b172b3ea7f0fd4de9f8039eba256a6bea56715748af00f361e49b1519_amd64",
"8Base-RHOL-5.5:openshift-logging/kibana6-rhel8@sha256:93c33d6810eb6e71e7e543c1c26a29e163214df64121c814b4424322308b0a30_ppc64le",
"8Base-RHOL-5.5:openshift-logging/kibana6-rhel8@sha256:ca4f273fb088980bfcc3607bd7ea2d40cc93298262cb3f5ce4054a6235152d1e_arm64",
"8Base-RHOL-5.5:openshift-logging/log-file-metric-exporter-rhel8@sha256:44e17bbdb8c7ac0a7868b3be7e29d58401702384dab3a66efaa08d1176035672_s390x",
"8Base-RHOL-5.5:openshift-logging/log-file-metric-exporter-rhel8@sha256:8b76243469011045e72b7a339288986e7561a3005aa94d580d5b1082580e9cec_ppc64le",
"8Base-RHOL-5.5:openshift-logging/log-file-metric-exporter-rhel8@sha256:e91d4b026d38091cb707e0213f329d0781a3517f3eca4d209d09d6c1edb1a1d3_amd64",
"8Base-RHOL-5.5:openshift-logging/log-file-metric-exporter-rhel8@sha256:f0ca78341daa3d41ffe460f5aa504219c72ee673dd57a82f344d3239b69717be_arm64",
"8Base-RHOL-5.5:openshift-logging/logging-curator5-rhel8@sha256:6f17fc02901a898b77c674cd4ba1764423e849c5faa888b2907ff7356accc66c_s390x",
"8Base-RHOL-5.5:openshift-logging/logging-curator5-rhel8@sha256:c8ea484f5e15b7b53941f251db9b5be08c8cb6f3a14d99285277d9eadf969e98_arm64",
"8Base-RHOL-5.5:openshift-logging/logging-curator5-rhel8@sha256:e26efb87488b53ebd4e5233515906974675b3a759f4a1c00f447df8821d5f030_ppc64le",
"8Base-RHOL-5.5:openshift-logging/logging-curator5-rhel8@sha256:e6ae5eef57de608fb1d4393fe824d0befffd8f5b696b5ce44e571fdcddb46f1f_amd64",
"8Base-RHOL-5.5:openshift-logging/logging-loki-rhel8@sha256:6242c3792c8c0469012be8b0140c2476e41f80b5271ba78ff42c63aa041be30f_s390x",
"8Base-RHOL-5.5:openshift-logging/logging-loki-rhel8@sha256:947becc46b99656f9faa6067f2cf38dbef0d40e85b56d62aafcb243052920dfc_amd64",
"8Base-RHOL-5.5:openshift-logging/logging-loki-rhel8@sha256:969ce1d586fb7fbdd65d07c0b790f48fd6f81e659d1323514906bb03ae9fe79b_ppc64le",
"8Base-RHOL-5.5:openshift-logging/logging-loki-rhel8@sha256:dd5e5a043befc54eeb63ff51a01691778053c90de5c9b8946d6a1d808fbcf0df_arm64",
"8Base-RHOL-5.5:openshift-logging/logging-view-plugin-rhel8@sha256:147676e1a3c66757508be0046c28ccb7985f15af7f8f4a045fa5ca424c0c684d_arm64",
"8Base-RHOL-5.5:openshift-logging/logging-view-plugin-rhel8@sha256:bea8f3f31073874a77af55c8664cbf167cd8bad5296e1bf444b9490b06484b56_amd64",
"8Base-RHOL-5.5:openshift-logging/logging-view-plugin-rhel8@sha256:da8c90c5b3b68e9b98a76828a450a9d7c579256b04aa9daf87ddfab9bad5548c_ppc64le",
"8Base-RHOL-5.5:openshift-logging/logging-view-plugin-rhel8@sha256:e3e5b570f9c819cb10ad38e928a301e8f0554e45052037b03f1ba81a3faa6a15_s390x",
"8Base-RHOL-5.5:openshift-logging/loki-operator-bundle@sha256:1d75006c9d03648857963a8772644d4228361d97fb07c8652326b61fd5d30f8c_amd64",
"8Base-RHOL-5.5:openshift-logging/loki-rhel8-operator@sha256:43fae2b6532712da7d0f83b5dda5797c9764fcac4b0e18580a19e54ee7dfcff6_s390x",
"8Base-RHOL-5.5:openshift-logging/loki-rhel8-operator@sha256:4eba6362f8aaa0450d07b87824148d2c15232b871d0ba6bc34f1962d2970e753_ppc64le",
"8Base-RHOL-5.5:openshift-logging/loki-rhel8-operator@sha256:dfa4ca06abb576fa071fb30c425bc6be631c0453939de562e1dc0b4e76de4f81_arm64",
"8Base-RHOL-5.5:openshift-logging/loki-rhel8-operator@sha256:e5289e40532a01c605760b2f438acfb66257b730a89249269e46dc9c0058aec1_amd64",
"8Base-RHOL-5.5:openshift-logging/lokistack-gateway-rhel8@sha256:0a3eb7a1a50b75528be737eb2768e671a643eea324c967a0381296b61f8e399e_arm64",
"8Base-RHOL-5.5:openshift-logging/lokistack-gateway-rhel8@sha256:42ebf89821e0f8e4b7d03cc5a6d5a30d48f73a1ab2b7486c8a0bb1e5c2cfd4b4_ppc64le",
"8Base-RHOL-5.5:openshift-logging/lokistack-gateway-rhel8@sha256:449f4cf0b3d0c0d6724cc2346c2121df58ef43297c56cc540e05158ad5c8ffbc_amd64",
"8Base-RHOL-5.5:openshift-logging/lokistack-gateway-rhel8@sha256:5954a498e527ee59a3f655250a4f5535a26b49c6fd61889271affb08104839f8_s390x",
"8Base-RHOL-5.5:openshift-logging/opa-openshift-rhel8@sha256:4c1b37da97e80aa76f2612f34745180a026214a415ed9a186ab81ec8fa96e17d_amd64",
"8Base-RHOL-5.5:openshift-logging/opa-openshift-rhel8@sha256:847c70de5af59c9aec366612a74477de931977cf79d5f9ed117772e931589497_ppc64le",
"8Base-RHOL-5.5:openshift-logging/opa-openshift-rhel8@sha256:c8458b60077d018eaa78f38fc0b85786d8108b88faea6e420cc01b720f23af48_arm64",
"8Base-RHOL-5.5:openshift-logging/opa-openshift-rhel8@sha256:fc99739f4354e8b28613f50b441d3f7a93bea3e3b106d7c052b607c24b994b9e_s390x",
"8Base-RHOL-5.5:openshift-logging/vector-rhel8@sha256:6c237605a0062e69e10a1fad47375f9c51dbccb110e1d11a02f2b7101d611e8f_amd64",
"8Base-RHOL-5.5:openshift-logging/vector-rhel8@sha256:6c8b9e91e4d527bc0694879c7ce908e3d67877fd53191b71af95191cc0149afa_arm64",
"8Base-RHOL-5.5:openshift-logging/vector-rhel8@sha256:b22fe4e184b908986301fda4d2b57f4b9b91149168386a8d9c7ac9b0c4631c7c_ppc64le",
"8Base-RHOL-5.5:openshift-logging/vector-rhel8@sha256:c117a0024d06340a9a28686c144642d6591192738f263f4684a7d09af0b16c71_s390x"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "golang: golang.org/x/text/language: ParseAcceptLanguage takes a long time to parse complex tags"
}
]
}
rhsa-2023:1042
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Custom Metrics Autoscaler Operator for Red Hat OpenShift including security updates.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The Custom Metrics Autoscaler Operator for Red Hat OpenShift is an optional\noperator, based on the Kubernetes Event Driven Autoscaler (KEDA), that allows workloads to be scaled using additional metrics sources other than pod metrics.\nThis release builds upon updated compiler, runtime library, and base images for the purpose of resolving any potential security issues present in previous toolset versions.\n\nThis version makes use of newer tools and libraries to address the following issues:\ngolang: net/http: improper sanitization of Transfer-Encoding header (CVE-2022-1705)\ngolang: go/parser: stack exhaustion in all Parse* functions (CVE-2022-1962)\ngolang: archive/tar: unbounded memory consumption when reading headers (CVE-2022-2879)\ngolang: net/http/httputil: ReverseProxy should not forward unparseable query parameters (CVE-2022-2880)\ngolang: net/http: handle server errors after sending GOAWAY (CVE-2022-27664)\ngolang: encoding/xml: stack exhaustion in Decoder.Skip (CVE-2022-28131)\ngolang: crypto/elliptic: panic caused by oversized scalar (CVE-2022-28327)\ngolang: io/fs: stack exhaustion in Glob (CVE-2022-30630)\ngolang: compress/gzip: stack exhaustion in Reader.Read (CVE-2022-30631)\ngolang: path/filepath: stack exhaustion in Glob (CVE-2022-30632)\ngolang: encoding/xml: stack exhaustion in Unmarshal (CVE-2022-30633)\ngolang: encoding/gob: stack exhaustion in Decoder.Decode (CVE-2022-30635)\ngolang: net/http/httputil: NewSingleHostReverseProxy - omit X-Forwarded-For not working (CVE-2022-32148)\ngolang: golang.org/x/text/language: ParseAcceptLanguage takes a long time to parse complex tags (CVE-2022-32149)\ngolang: regexp/syntax: limit memory used by parsing regexps (CVE-2022-41715)",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2023:1042",
"url": "https://access.redhat.com/errata/RHSA-2023:1042"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#moderate",
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "2077689",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2077689"
},
{
"category": "external",
"summary": "2100763",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2100763"
},
{
"category": "external",
"summary": "2107342",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2107342"
},
{
"category": "external",
"summary": "2107371",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2107371"
},
{
"category": "external",
"summary": "2107374",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2107374"
},
{
"category": "external",
"summary": "2107376",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2107376"
},
{
"category": "external",
"summary": "2107383",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2107383"
},
{
"category": "external",
"summary": "2107386",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2107386"
},
{
"category": "external",
"summary": "2107388",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2107388"
},
{
"category": "external",
"summary": "2107390",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2107390"
},
{
"category": "external",
"summary": "2107392",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2107392"
},
{
"category": "external",
"summary": "2113945",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2113945"
},
{
"category": "external",
"summary": "2118404",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2118404"
},
{
"category": "external",
"summary": "2124669",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2124669"
},
{
"category": "external",
"summary": "2132867",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2132867"
},
{
"category": "external",
"summary": "2132868",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2132868"
},
{
"category": "external",
"summary": "2132872",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2132872"
},
{
"category": "external",
"summary": "2134010",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2134010"
},
{
"category": "external",
"summary": "OCPNODE-1260",
"url": "https://issues.redhat.com/browse/OCPNODE-1260"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2023/rhsa-2023_1042.json"
}
],
"title": "Red Hat Security Advisory: Custom Metrics Autoscaler Operator for Red Hat OpenShift (with security updates)",
"tracking": {
"current_release_date": "2025-10-23T23:57:09+00:00",
"generator": {
"date": "2025-10-23T23:57:09+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.9"
}
},
"id": "RHSA-2023:1042",
"initial_release_date": "2023-03-06T18:38:53+00:00",
"revision_history": [
{
"date": "2023-03-06T18:38:53+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2023-03-06T18:38:53+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-10-23T23:57:09+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "OpenShift Custom Metrics Autoscaler 2",
"product": {
"name": "OpenShift Custom Metrics Autoscaler 2",
"product_id": "8Base-OCMA-2",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:openshift_custom_metrics_autoscaler:2.0::el8"
}
}
}
],
"category": "product_family",
"name": "OpenShift Custom Metrics Autoscaler"
},
{
"branches": [
{
"category": "product_version",
"name": "custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-adapter-rhel8@sha256:c79cb3c68317a224277a8ee0dc78832fcd4b6da18b9b5b074cffaad14e2f1aa5_amd64",
"product": {
"name": "custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-adapter-rhel8@sha256:c79cb3c68317a224277a8ee0dc78832fcd4b6da18b9b5b074cffaad14e2f1aa5_amd64",
"product_id": "custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-adapter-rhel8@sha256:c79cb3c68317a224277a8ee0dc78832fcd4b6da18b9b5b074cffaad14e2f1aa5_amd64",
"product_identification_helper": {
"purl": "pkg:oci/custom-metrics-autoscaler-adapter-rhel8@sha256:c79cb3c68317a224277a8ee0dc78832fcd4b6da18b9b5b074cffaad14e2f1aa5?arch=amd64\u0026repository_url=registry.redhat.io/custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-adapter-rhel8\u0026tag=2.8.2-143"
}
}
},
{
"category": "product_version",
"name": "custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-rhel8@sha256:a403d057cd2ca820306207282007d4d117623e1a2ebb8bee67c19f5796f07f95_amd64",
"product": {
"name": "custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-rhel8@sha256:a403d057cd2ca820306207282007d4d117623e1a2ebb8bee67c19f5796f07f95_amd64",
"product_id": "custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-rhel8@sha256:a403d057cd2ca820306207282007d4d117623e1a2ebb8bee67c19f5796f07f95_amd64",
"product_identification_helper": {
"purl": "pkg:oci/custom-metrics-autoscaler-rhel8@sha256:a403d057cd2ca820306207282007d4d117623e1a2ebb8bee67c19f5796f07f95?arch=amd64\u0026repository_url=registry.redhat.io/custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-rhel8\u0026tag=2.8.2-143"
}
}
},
{
"category": "product_version",
"name": "custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-operator-bundle@sha256:44de4b736089166718956bebd456ad1a17e0e6f72c49f52804c6b6e60ef5a494_amd64",
"product": {
"name": "custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-operator-bundle@sha256:44de4b736089166718956bebd456ad1a17e0e6f72c49f52804c6b6e60ef5a494_amd64",
"product_id": "custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-operator-bundle@sha256:44de4b736089166718956bebd456ad1a17e0e6f72c49f52804c6b6e60ef5a494_amd64",
"product_identification_helper": {
"purl": "pkg:oci/custom-metrics-autoscaler-operator-bundle@sha256:44de4b736089166718956bebd456ad1a17e0e6f72c49f52804c6b6e60ef5a494?arch=amd64\u0026repository_url=registry.redhat.io/custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-operator-bundle\u0026tag=2.8.2-143"
}
}
},
{
"category": "product_version",
"name": "custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-rhel8-operator@sha256:5a149d0a0cdb6812acbef0c9b3031fb3cd84181e971198a6e17d8fd0bf5e6293_amd64",
"product": {
"name": "custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-rhel8-operator@sha256:5a149d0a0cdb6812acbef0c9b3031fb3cd84181e971198a6e17d8fd0bf5e6293_amd64",
"product_id": "custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-rhel8-operator@sha256:5a149d0a0cdb6812acbef0c9b3031fb3cd84181e971198a6e17d8fd0bf5e6293_amd64",
"product_identification_helper": {
"purl": "pkg:oci/custom-metrics-autoscaler-rhel8-operator@sha256:5a149d0a0cdb6812acbef0c9b3031fb3cd84181e971198a6e17d8fd0bf5e6293?arch=amd64\u0026repository_url=registry.redhat.io/custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-rhel8-operator\u0026tag=2.8.2-143"
}
}
}
],
"category": "architecture",
"name": "amd64"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-adapter-rhel8@sha256:c79cb3c68317a224277a8ee0dc78832fcd4b6da18b9b5b074cffaad14e2f1aa5_amd64 as a component of OpenShift Custom Metrics Autoscaler 2",
"product_id": "8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-adapter-rhel8@sha256:c79cb3c68317a224277a8ee0dc78832fcd4b6da18b9b5b074cffaad14e2f1aa5_amd64"
},
"product_reference": "custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-adapter-rhel8@sha256:c79cb3c68317a224277a8ee0dc78832fcd4b6da18b9b5b074cffaad14e2f1aa5_amd64",
"relates_to_product_reference": "8Base-OCMA-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-operator-bundle@sha256:44de4b736089166718956bebd456ad1a17e0e6f72c49f52804c6b6e60ef5a494_amd64 as a component of OpenShift Custom Metrics Autoscaler 2",
"product_id": "8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-operator-bundle@sha256:44de4b736089166718956bebd456ad1a17e0e6f72c49f52804c6b6e60ef5a494_amd64"
},
"product_reference": "custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-operator-bundle@sha256:44de4b736089166718956bebd456ad1a17e0e6f72c49f52804c6b6e60ef5a494_amd64",
"relates_to_product_reference": "8Base-OCMA-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-rhel8-operator@sha256:5a149d0a0cdb6812acbef0c9b3031fb3cd84181e971198a6e17d8fd0bf5e6293_amd64 as a component of OpenShift Custom Metrics Autoscaler 2",
"product_id": "8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-rhel8-operator@sha256:5a149d0a0cdb6812acbef0c9b3031fb3cd84181e971198a6e17d8fd0bf5e6293_amd64"
},
"product_reference": "custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-rhel8-operator@sha256:5a149d0a0cdb6812acbef0c9b3031fb3cd84181e971198a6e17d8fd0bf5e6293_amd64",
"relates_to_product_reference": "8Base-OCMA-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-rhel8@sha256:a403d057cd2ca820306207282007d4d117623e1a2ebb8bee67c19f5796f07f95_amd64 as a component of OpenShift Custom Metrics Autoscaler 2",
"product_id": "8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-rhel8@sha256:a403d057cd2ca820306207282007d4d117623e1a2ebb8bee67c19f5796f07f95_amd64"
},
"product_reference": "custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-rhel8@sha256:a403d057cd2ca820306207282007d4d117623e1a2ebb8bee67c19f5796f07f95_amd64",
"relates_to_product_reference": "8Base-OCMA-2"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2022-1705",
"cwe": {
"id": "CWE-444",
"name": "Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027)"
},
"discovery_date": "2022-07-14T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-operator-bundle@sha256:44de4b736089166718956bebd456ad1a17e0e6f72c49f52804c6b6e60ef5a494_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2107374"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in golang. The HTTP/1 client accepted invalid Transfer-Encoding headers indicating \"chunked\" encoding. This issue could allow request smuggling, but only if combined with an intermediate server that also improperly accepts the header as invalid.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: net/http: improper sanitization of Transfer-Encoding header",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Within regulated environments, a combination of the following controls acts as a significant barrier to successfully exploiting a CWE-444: Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027) vulnerability and therefore downgrades the severity of this particular CVE from Moderate to Low.\n\nThe platform uses secure, encrypted HTTPS connections over TLS 1.2 to reduce the risk of smuggling attacks by preventing the injection of ambiguous or malformed requests between components. The environment employs IPS/IDS and antimalware solutions to detect and block malicious code while ensuring consistent interpretation of HTTP requests across network layers, mitigating request/response inconsistencies. Event logs are collected and analyzed for centralization, correlation, monitoring, alerting, and retention, enabling the detection of malformed or suspicious HTTP traffic. Static code analysis and peer reviews enforce strong input validation and error handling to ensure all user inputs adhere to HTTP protocol specifications.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-adapter-rhel8@sha256:c79cb3c68317a224277a8ee0dc78832fcd4b6da18b9b5b074cffaad14e2f1aa5_amd64",
"8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-rhel8-operator@sha256:5a149d0a0cdb6812acbef0c9b3031fb3cd84181e971198a6e17d8fd0bf5e6293_amd64",
"8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-rhel8@sha256:a403d057cd2ca820306207282007d4d117623e1a2ebb8bee67c19f5796f07f95_amd64"
],
"known_not_affected": [
"8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-operator-bundle@sha256:44de4b736089166718956bebd456ad1a17e0e6f72c49f52804c6b6e60ef5a494_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-1705"
},
{
"category": "external",
"summary": "RHBZ#2107374",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2107374"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-1705",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1705"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-1705",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-1705"
},
{
"category": "external",
"summary": "https://go.dev/issue/53188",
"url": "https://go.dev/issue/53188"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/nqrv9fbR0zE",
"url": "https://groups.google.com/g/golang-announce/c/nqrv9fbR0zE"
}
],
"release_date": "2022-07-12T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-03-06T18:38:53+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-adapter-rhel8@sha256:c79cb3c68317a224277a8ee0dc78832fcd4b6da18b9b5b074cffaad14e2f1aa5_amd64",
"8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-rhel8-operator@sha256:5a149d0a0cdb6812acbef0c9b3031fb3cd84181e971198a6e17d8fd0bf5e6293_amd64",
"8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-rhel8@sha256:a403d057cd2ca820306207282007d4d117623e1a2ebb8bee67c19f5796f07f95_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:1042"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-adapter-rhel8@sha256:c79cb3c68317a224277a8ee0dc78832fcd4b6da18b9b5b074cffaad14e2f1aa5_amd64",
"8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-operator-bundle@sha256:44de4b736089166718956bebd456ad1a17e0e6f72c49f52804c6b6e60ef5a494_amd64",
"8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-rhel8-operator@sha256:5a149d0a0cdb6812acbef0c9b3031fb3cd84181e971198a6e17d8fd0bf5e6293_amd64",
"8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-rhel8@sha256:a403d057cd2ca820306207282007d4d117623e1a2ebb8bee67c19f5796f07f95_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "golang: net/http: improper sanitization of Transfer-Encoding header"
},
{
"cve": "CVE-2022-1962",
"cwe": {
"id": "CWE-1325",
"name": "Improperly Controlled Sequential Memory Allocation"
},
"discovery_date": "2022-07-14T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-adapter-rhel8@sha256:c79cb3c68317a224277a8ee0dc78832fcd4b6da18b9b5b074cffaad14e2f1aa5_amd64",
"8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-operator-bundle@sha256:44de4b736089166718956bebd456ad1a17e0e6f72c49f52804c6b6e60ef5a494_amd64",
"8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-rhel8-operator@sha256:5a149d0a0cdb6812acbef0c9b3031fb3cd84181e971198a6e17d8fd0bf5e6293_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2107376"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the golang standard library, go/parser. When calling any Parse functions on the Go source code, which contains deeply nested types or declarations, a panic can occur due to stack exhaustion. This issue allows an attacker to impact system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: go/parser: stack exhaustion in all Parse* functions",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-rhel8@sha256:a403d057cd2ca820306207282007d4d117623e1a2ebb8bee67c19f5796f07f95_amd64"
],
"known_not_affected": [
"8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-adapter-rhel8@sha256:c79cb3c68317a224277a8ee0dc78832fcd4b6da18b9b5b074cffaad14e2f1aa5_amd64",
"8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-operator-bundle@sha256:44de4b736089166718956bebd456ad1a17e0e6f72c49f52804c6b6e60ef5a494_amd64",
"8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-rhel8-operator@sha256:5a149d0a0cdb6812acbef0c9b3031fb3cd84181e971198a6e17d8fd0bf5e6293_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-1962"
},
{
"category": "external",
"summary": "RHBZ#2107376",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2107376"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-1962",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1962"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-1962",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-1962"
},
{
"category": "external",
"summary": "https://go.dev/issue/53616",
"url": "https://go.dev/issue/53616"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/nqrv9fbR0zE",
"url": "https://groups.google.com/g/golang-announce/c/nqrv9fbR0zE"
}
],
"release_date": "2022-07-12T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-03-06T18:38:53+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-rhel8@sha256:a403d057cd2ca820306207282007d4d117623e1a2ebb8bee67c19f5796f07f95_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:1042"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-adapter-rhel8@sha256:c79cb3c68317a224277a8ee0dc78832fcd4b6da18b9b5b074cffaad14e2f1aa5_amd64",
"8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-operator-bundle@sha256:44de4b736089166718956bebd456ad1a17e0e6f72c49f52804c6b6e60ef5a494_amd64",
"8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-rhel8-operator@sha256:5a149d0a0cdb6812acbef0c9b3031fb3cd84181e971198a6e17d8fd0bf5e6293_amd64",
"8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-rhel8@sha256:a403d057cd2ca820306207282007d4d117623e1a2ebb8bee67c19f5796f07f95_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "golang: go/parser: stack exhaustion in all Parse* functions"
},
{
"acknowledgments": [
{
"names": [
"Adam Korczynski"
],
"organization": "ADA Logics"
},
{
"names": [
"OSS-Fuzz"
]
}
],
"cve": "CVE-2022-2879",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"discovery_date": "2022-10-07T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-adapter-rhel8@sha256:c79cb3c68317a224277a8ee0dc78832fcd4b6da18b9b5b074cffaad14e2f1aa5_amd64",
"8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-operator-bundle@sha256:44de4b736089166718956bebd456ad1a17e0e6f72c49f52804c6b6e60ef5a494_amd64",
"8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-rhel8-operator@sha256:5a149d0a0cdb6812acbef0c9b3031fb3cd84181e971198a6e17d8fd0bf5e6293_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2132867"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the golang package, where Reader.Read does not set a limit on the maximum size of file headers. After fixing, Reader.Read limits the maximum size of header blocks to 1 MiB. This flaw allows a maliciously crafted archive to cause Read to allocate unbounded amounts of memory, potentially causing resource exhaustion or panic.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: archive/tar: github.com/vbatts/tar-split: unbounded memory consumption when reading headers",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The opportunity for a Denial of Service is limited to the golang runtime. In the case of OpenShift Container Platform, this would be restricted within each individual container. There are multiple layers of guide rails (Golang\u2019s Garbage Collector; OpenShift\u2019s resource constraints imposed at the container and cluster levels) which would require a malicious user to continue submitting attacks for there to be any enduring impact. They would also need access to external server resources to be able to send a massive volume of requests to cause a significant impact on server operations.\n\n\nThis flaw additionally affects the github.com/vbatts/tar-split library and was fixed in v0.12.1.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-rhel8@sha256:a403d057cd2ca820306207282007d4d117623e1a2ebb8bee67c19f5796f07f95_amd64"
],
"known_not_affected": [
"8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-adapter-rhel8@sha256:c79cb3c68317a224277a8ee0dc78832fcd4b6da18b9b5b074cffaad14e2f1aa5_amd64",
"8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-operator-bundle@sha256:44de4b736089166718956bebd456ad1a17e0e6f72c49f52804c6b6e60ef5a494_amd64",
"8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-rhel8-operator@sha256:5a149d0a0cdb6812acbef0c9b3031fb3cd84181e971198a6e17d8fd0bf5e6293_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-2879"
},
{
"category": "external",
"summary": "RHBZ#2132867",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2132867"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-2879",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2879"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-2879",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-2879"
},
{
"category": "external",
"summary": "https://github.com/golang/go/issues/54853",
"url": "https://github.com/golang/go/issues/54853"
},
{
"category": "external",
"summary": "https://github.com/vbatts/tar-split/releases/tag/v0.12.1",
"url": "https://github.com/vbatts/tar-split/releases/tag/v0.12.1"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/xtuG5faxtaU?pli=1",
"url": "https://groups.google.com/g/golang-announce/c/xtuG5faxtaU?pli=1"
}
],
"release_date": "2022-10-04T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-03-06T18:38:53+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-rhel8@sha256:a403d057cd2ca820306207282007d4d117623e1a2ebb8bee67c19f5796f07f95_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:1042"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-adapter-rhel8@sha256:c79cb3c68317a224277a8ee0dc78832fcd4b6da18b9b5b074cffaad14e2f1aa5_amd64",
"8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-operator-bundle@sha256:44de4b736089166718956bebd456ad1a17e0e6f72c49f52804c6b6e60ef5a494_amd64",
"8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-rhel8-operator@sha256:5a149d0a0cdb6812acbef0c9b3031fb3cd84181e971198a6e17d8fd0bf5e6293_amd64",
"8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-rhel8@sha256:a403d057cd2ca820306207282007d4d117623e1a2ebb8bee67c19f5796f07f95_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "golang: archive/tar: github.com/vbatts/tar-split: unbounded memory consumption when reading headers"
},
{
"acknowledgments": [
{
"names": [
"Daniel Abeles"
],
"organization": "Head of Research, Oxeye"
},
{
"names": [
"Gal Goldstein"
],
"organization": "Security Researcher, Oxeye"
}
],
"cve": "CVE-2022-2880",
"cwe": {
"id": "CWE-444",
"name": "Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027)"
},
"discovery_date": "2022-10-07T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-adapter-rhel8@sha256:c79cb3c68317a224277a8ee0dc78832fcd4b6da18b9b5b074cffaad14e2f1aa5_amd64",
"8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-operator-bundle@sha256:44de4b736089166718956bebd456ad1a17e0e6f72c49f52804c6b6e60ef5a494_amd64",
"8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-rhel8-operator@sha256:5a149d0a0cdb6812acbef0c9b3031fb3cd84181e971198a6e17d8fd0bf5e6293_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2132868"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the golang package, where requests forwarded by reverse proxy include the raw query parameters from the inbound request, including unparseable parameters rejected by net/http. This issue could permit query parameter smuggling when a Go proxy forwards a parameter with an unparseable value. After the fix, the reverse proxy sanitizes the query parameters in the forwarded query when the outbound request\u0027s form field is set after the reverse proxy. The director function returns, indicating that the proxy has parsed the query parameters. Proxies that do not parse query parameters continue to forward the original query parameters unchanged.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: net/http/httputil: ReverseProxy should not forward unparseable query parameters",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The opportunity to exploit this vulnerability is limited to the Golang runtime. In the case of the OpenShift Container Platform, this would be restricted within each individual container. There are multiple layers of guide rails (Golang\u2019s Garbage Collector; OpenShift\u2019s resource constraints imposed at the container and cluster levels) which would require a malicious user to continue submitting attacks for there to be any enduring impact.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-rhel8@sha256:a403d057cd2ca820306207282007d4d117623e1a2ebb8bee67c19f5796f07f95_amd64"
],
"known_not_affected": [
"8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-adapter-rhel8@sha256:c79cb3c68317a224277a8ee0dc78832fcd4b6da18b9b5b074cffaad14e2f1aa5_amd64",
"8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-operator-bundle@sha256:44de4b736089166718956bebd456ad1a17e0e6f72c49f52804c6b6e60ef5a494_amd64",
"8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-rhel8-operator@sha256:5a149d0a0cdb6812acbef0c9b3031fb3cd84181e971198a6e17d8fd0bf5e6293_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-2880"
},
{
"category": "external",
"summary": "RHBZ#2132868",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2132868"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-2880",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2880"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-2880",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-2880"
},
{
"category": "external",
"summary": "https://github.com/golang/go/issues/54663",
"url": "https://github.com/golang/go/issues/54663"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/xtuG5faxtaU?pli=1",
"url": "https://groups.google.com/g/golang-announce/c/xtuG5faxtaU?pli=1"
}
],
"release_date": "2022-10-04T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-03-06T18:38:53+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-rhel8@sha256:a403d057cd2ca820306207282007d4d117623e1a2ebb8bee67c19f5796f07f95_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:1042"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-adapter-rhel8@sha256:c79cb3c68317a224277a8ee0dc78832fcd4b6da18b9b5b074cffaad14e2f1aa5_amd64",
"8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-operator-bundle@sha256:44de4b736089166718956bebd456ad1a17e0e6f72c49f52804c6b6e60ef5a494_amd64",
"8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-rhel8-operator@sha256:5a149d0a0cdb6812acbef0c9b3031fb3cd84181e971198a6e17d8fd0bf5e6293_amd64",
"8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-rhel8@sha256:a403d057cd2ca820306207282007d4d117623e1a2ebb8bee67c19f5796f07f95_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "golang: net/http/httputil: ReverseProxy should not forward unparseable query parameters"
},
{
"cve": "CVE-2022-27664",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"discovery_date": "2022-09-06T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-adapter-rhel8@sha256:c79cb3c68317a224277a8ee0dc78832fcd4b6da18b9b5b074cffaad14e2f1aa5_amd64",
"8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-operator-bundle@sha256:44de4b736089166718956bebd456ad1a17e0e6f72c49f52804c6b6e60ef5a494_amd64",
"8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-rhel8-operator@sha256:5a149d0a0cdb6812acbef0c9b3031fb3cd84181e971198a6e17d8fd0bf5e6293_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2124669"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the golang package. In net/http in Go, attackers can cause a denial of service because an HTTP/2 connection can hang during closing if a fatal error preempts the shutdown.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: net/http: handle server errors after sending GOAWAY",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The opportunity for a Denial of Service is limited to the golang runtime. In the case of OpenShift Container Platform, this would be restricted within each individual container. There are multiple layers of guide rails (Golang\u2019s Garbage Collector; OpenShift\u2019s resource constraints imposed at the container and cluster levels) which would require a malicious user to continue submitting attacks for there to be any enduring impact. They would also need access to external server resources to be able to send a massive volume of requests to cause a significant impact on server operations.\n\nWithin regulated environments, a combination of the following controls acts as a significant barrier to successfully exploiting a CWE-400: Uncontrolled Resource Consumption vulnerability and therefore downgrades the severity of this particular CVE from Moderate to Low.\n\nRed Hat restricts access to all platform information by default, granting access only after successful hard token-based multi-factor authentication (MFA) and enforcing least privilege to ensure only authorized roles can execute or modify code. The environment employs malicious code protections, including IDS/IPS and antimalware tools to detect threats and monitor resource usage, helping prevent uncontrolled consumption that could lead to system failure. Additional safeguards, such as web application firewalls and load-balancing strategies, protect against resource exhaustion and performance degradation. Event logs are centrally collected, correlated, and analyzed to support monitoring, alerting, and retention, aiding in the detection of abnormal behavior and potential denial-of-service (DoS) conditions. Static code analysis and peer reviews enforce strong input validation and error handling, reducing the likelihood of input-based DoS attacks.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-rhel8@sha256:a403d057cd2ca820306207282007d4d117623e1a2ebb8bee67c19f5796f07f95_amd64"
],
"known_not_affected": [
"8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-adapter-rhel8@sha256:c79cb3c68317a224277a8ee0dc78832fcd4b6da18b9b5b074cffaad14e2f1aa5_amd64",
"8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-operator-bundle@sha256:44de4b736089166718956bebd456ad1a17e0e6f72c49f52804c6b6e60ef5a494_amd64",
"8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-rhel8-operator@sha256:5a149d0a0cdb6812acbef0c9b3031fb3cd84181e971198a6e17d8fd0bf5e6293_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-27664"
},
{
"category": "external",
"summary": "RHBZ#2124669",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2124669"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-27664",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27664"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-27664",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-27664"
},
{
"category": "external",
"summary": "https://go.dev/issue/54658",
"url": "https://go.dev/issue/54658"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/x49AQzIVX-s/m/0tgO0pjiBQAJ",
"url": "https://groups.google.com/g/golang-announce/c/x49AQzIVX-s/m/0tgO0pjiBQAJ"
}
],
"release_date": "2022-09-06T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-03-06T18:38:53+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-rhel8@sha256:a403d057cd2ca820306207282007d4d117623e1a2ebb8bee67c19f5796f07f95_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:1042"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-adapter-rhel8@sha256:c79cb3c68317a224277a8ee0dc78832fcd4b6da18b9b5b074cffaad14e2f1aa5_amd64",
"8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-operator-bundle@sha256:44de4b736089166718956bebd456ad1a17e0e6f72c49f52804c6b6e60ef5a494_amd64",
"8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-rhel8-operator@sha256:5a149d0a0cdb6812acbef0c9b3031fb3cd84181e971198a6e17d8fd0bf5e6293_amd64",
"8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-rhel8@sha256:a403d057cd2ca820306207282007d4d117623e1a2ebb8bee67c19f5796f07f95_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "golang: net/http: handle server errors after sending GOAWAY"
},
{
"cve": "CVE-2022-28131",
"cwe": {
"id": "CWE-1325",
"name": "Improperly Controlled Sequential Memory Allocation"
},
"discovery_date": "2022-07-14T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-adapter-rhel8@sha256:c79cb3c68317a224277a8ee0dc78832fcd4b6da18b9b5b074cffaad14e2f1aa5_amd64",
"8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-operator-bundle@sha256:44de4b736089166718956bebd456ad1a17e0e6f72c49f52804c6b6e60ef5a494_amd64",
"8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-rhel8-operator@sha256:5a149d0a0cdb6812acbef0c9b3031fb3cd84181e971198a6e17d8fd0bf5e6293_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2107390"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in golang encoding/xml. When calling Decoder, Skip while parsing a deeply nested XML document, a panic can occur due to stack exhaustion and allows an attacker to impact system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: encoding/xml: stack exhaustion in Decoder.Skip",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The vulnerability exists in the calling of the function decoder.skip to a deeply nested XML document. Although the vulnerability exists, it may require that the application accept deeply nested XML from untrusted sources and specifically calls Decoder.Skip on it. In many deployments, that code path might not even be reachable or exposed to external input. On top of that, a successful exploitation will only result in denial of service due to stack exhaustion, which is why this has been marked as moderate by Red Hat.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-rhel8@sha256:a403d057cd2ca820306207282007d4d117623e1a2ebb8bee67c19f5796f07f95_amd64"
],
"known_not_affected": [
"8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-adapter-rhel8@sha256:c79cb3c68317a224277a8ee0dc78832fcd4b6da18b9b5b074cffaad14e2f1aa5_amd64",
"8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-operator-bundle@sha256:44de4b736089166718956bebd456ad1a17e0e6f72c49f52804c6b6e60ef5a494_amd64",
"8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-rhel8-operator@sha256:5a149d0a0cdb6812acbef0c9b3031fb3cd84181e971198a6e17d8fd0bf5e6293_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-28131"
},
{
"category": "external",
"summary": "RHBZ#2107390",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2107390"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-28131",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28131"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-28131",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-28131"
},
{
"category": "external",
"summary": "https://go.dev/issue/53614",
"url": "https://go.dev/issue/53614"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/nqrv9fbR0zE",
"url": "https://groups.google.com/g/golang-announce/c/nqrv9fbR0zE"
}
],
"release_date": "2022-07-12T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-03-06T18:38:53+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-rhel8@sha256:a403d057cd2ca820306207282007d4d117623e1a2ebb8bee67c19f5796f07f95_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:1042"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.3,
"baseSeverity": "HIGH",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H",
"version": "3.1"
},
"products": [
"8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-adapter-rhel8@sha256:c79cb3c68317a224277a8ee0dc78832fcd4b6da18b9b5b074cffaad14e2f1aa5_amd64",
"8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-operator-bundle@sha256:44de4b736089166718956bebd456ad1a17e0e6f72c49f52804c6b6e60ef5a494_amd64",
"8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-rhel8-operator@sha256:5a149d0a0cdb6812acbef0c9b3031fb3cd84181e971198a6e17d8fd0bf5e6293_amd64",
"8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-rhel8@sha256:a403d057cd2ca820306207282007d4d117623e1a2ebb8bee67c19f5796f07f95_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "golang: encoding/xml: stack exhaustion in Decoder.Skip"
},
{
"cve": "CVE-2022-28327",
"cwe": {
"id": "CWE-190",
"name": "Integer Overflow or Wraparound"
},
"discovery_date": "2022-04-21T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-operator-bundle@sha256:44de4b736089166718956bebd456ad1a17e0e6f72c49f52804c6b6e60ef5a494_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2077689"
}
],
"notes": [
{
"category": "description",
"text": "An integer overflow flaw was found in Golang\u0027s crypto/elliptic library. This flaw allows an attacker to use a crafted scaler input longer than 32 bytes, causing P256().ScalarMult or P256().ScalarBaseMult to panic, leading to a loss of availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: crypto/elliptic: panic caused by oversized scalar",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "A moderate severity flaw was found in Go\u2019s crypto/elliptic package in the generic P-256 implementation. If a scalar input longer than 32 bytes is supplied, P256().ScalarMult or P256().ScalarBaseMult can panic, causing the application to crash. Indirect uses via crypto/ecdsa and crypto/tls are not affected. This issue impacts availability but does not affect confidentiality or integrity. Only certain platforms (non-amd64, non-arm64, non-ppc64le, non-s390x) may be affected.\n\nRed Hat Enterprise Linux 7, 8 and 9 are affected, because the code-base is affected by this vulnerability.\n\nRed Hat Product Security has rated this issue as having Moderate security impact, and the issue is not currently planned to be addressed in future updates for Red Hat Enterprise Linux 7, hence, marked as Out-of-Support-Scope. \n\nRed Hat Developer Tools - Compilers (go-toolset-1.16-golang \u0026 go-toolset-1.17-golang), ships the vulnerable code and affected by this vulnerability.\n\nFor additional information, refer to the Issue Severity Classification: https://access.redhat.com/security/updates/classification/ and Red Hat Enterprise Linux Life Cycle \u0026 Updates Policy: https://access.redhat.com/support/policy/updates/errata/.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-adapter-rhel8@sha256:c79cb3c68317a224277a8ee0dc78832fcd4b6da18b9b5b074cffaad14e2f1aa5_amd64",
"8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-rhel8-operator@sha256:5a149d0a0cdb6812acbef0c9b3031fb3cd84181e971198a6e17d8fd0bf5e6293_amd64",
"8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-rhel8@sha256:a403d057cd2ca820306207282007d4d117623e1a2ebb8bee67c19f5796f07f95_amd64"
],
"known_not_affected": [
"8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-operator-bundle@sha256:44de4b736089166718956bebd456ad1a17e0e6f72c49f52804c6b6e60ef5a494_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-28327"
},
{
"category": "external",
"summary": "RHBZ#2077689",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2077689"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-28327",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28327"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-28327",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-28327"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/oecdBNLOml8",
"url": "https://groups.google.com/g/golang-announce/c/oecdBNLOml8"
}
],
"release_date": "2022-04-12T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-03-06T18:38:53+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-adapter-rhel8@sha256:c79cb3c68317a224277a8ee0dc78832fcd4b6da18b9b5b074cffaad14e2f1aa5_amd64",
"8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-rhel8-operator@sha256:5a149d0a0cdb6812acbef0c9b3031fb3cd84181e971198a6e17d8fd0bf5e6293_amd64",
"8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-rhel8@sha256:a403d057cd2ca820306207282007d4d117623e1a2ebb8bee67c19f5796f07f95_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:1042"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-adapter-rhel8@sha256:c79cb3c68317a224277a8ee0dc78832fcd4b6da18b9b5b074cffaad14e2f1aa5_amd64",
"8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-operator-bundle@sha256:44de4b736089166718956bebd456ad1a17e0e6f72c49f52804c6b6e60ef5a494_amd64",
"8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-rhel8-operator@sha256:5a149d0a0cdb6812acbef0c9b3031fb3cd84181e971198a6e17d8fd0bf5e6293_amd64",
"8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-rhel8@sha256:a403d057cd2ca820306207282007d4d117623e1a2ebb8bee67c19f5796f07f95_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "golang: crypto/elliptic: panic caused by oversized scalar"
},
{
"cve": "CVE-2022-30630",
"cwe": {
"id": "CWE-1325",
"name": "Improperly Controlled Sequential Memory Allocation"
},
"discovery_date": "2022-07-14T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-adapter-rhel8@sha256:c79cb3c68317a224277a8ee0dc78832fcd4b6da18b9b5b074cffaad14e2f1aa5_amd64",
"8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-operator-bundle@sha256:44de4b736089166718956bebd456ad1a17e0e6f72c49f52804c6b6e60ef5a494_amd64",
"8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-rhel8-operator@sha256:5a149d0a0cdb6812acbef0c9b3031fb3cd84181e971198a6e17d8fd0bf5e6293_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2107371"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the golang standard library, io/fs. Calling Glob on a path that contains a large number of path separators can cause a panic issue due to stack exhaustion. This could allow an attacker to impact availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: io/fs: stack exhaustion in Glob",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "RH ProdSec has set the Impact of this vulnerability to Moderate as there is no known method to execute arbitary code. Successful exploitation of this bug can cause the application under attack to panic, merely causing a Denial of Service at the application level. As the kernel is unaffected by this bug, the user can merely relaunch the application to fix the problem. Also, if somehow the application keeps relaunching, the timer watchdogs in the default RHEL kernel will stop the attack in its tracks.\n\nWithin regulated environments, a combination of the following controls acts as a significant barrier to successfully exploiting a CWE-1325: Improperly Controlled Sequential Memory Allocation vulnerability and therefore downgrades the severity of this particular CVE from Moderate to Low.\n\nAccess to the platform is granted only after successful hard token-based multi-factor authentication (MFA) and is governed by least privilege to ensure only authorized users and roles can execute or modify code. Static code analysis and peer reviews enforce strong input validation and error handling, preventing improperly validated inputs from causing system instability, data exposure, or privilege escalation. In the event of successful exploitation, process isolation limits the impact of excessive sequential memory allocation by restricting memory use per process, preventing any single process from exhausting system resources. Finally, the platform uses memory protection mechanisms such as Data Execution Prevention (DEP) and Address Space Layout Randomization (ASLR) to reduce the risk of memory allocation-based attacks.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-rhel8@sha256:a403d057cd2ca820306207282007d4d117623e1a2ebb8bee67c19f5796f07f95_amd64"
],
"known_not_affected": [
"8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-adapter-rhel8@sha256:c79cb3c68317a224277a8ee0dc78832fcd4b6da18b9b5b074cffaad14e2f1aa5_amd64",
"8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-operator-bundle@sha256:44de4b736089166718956bebd456ad1a17e0e6f72c49f52804c6b6e60ef5a494_amd64",
"8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-rhel8-operator@sha256:5a149d0a0cdb6812acbef0c9b3031fb3cd84181e971198a6e17d8fd0bf5e6293_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-30630"
},
{
"category": "external",
"summary": "RHBZ#2107371",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2107371"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-30630",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30630"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-30630",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-30630"
},
{
"category": "external",
"summary": "https://go.dev/issue/53415",
"url": "https://go.dev/issue/53415"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/nqrv9fbR0zE",
"url": "https://groups.google.com/g/golang-announce/c/nqrv9fbR0zE"
}
],
"release_date": "2022-07-12T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-03-06T18:38:53+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-rhel8@sha256:a403d057cd2ca820306207282007d4d117623e1a2ebb8bee67c19f5796f07f95_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:1042"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-adapter-rhel8@sha256:c79cb3c68317a224277a8ee0dc78832fcd4b6da18b9b5b074cffaad14e2f1aa5_amd64",
"8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-operator-bundle@sha256:44de4b736089166718956bebd456ad1a17e0e6f72c49f52804c6b6e60ef5a494_amd64",
"8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-rhel8-operator@sha256:5a149d0a0cdb6812acbef0c9b3031fb3cd84181e971198a6e17d8fd0bf5e6293_amd64",
"8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-rhel8@sha256:a403d057cd2ca820306207282007d4d117623e1a2ebb8bee67c19f5796f07f95_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "golang: io/fs: stack exhaustion in Glob"
},
{
"cve": "CVE-2022-30631",
"cwe": {
"id": "CWE-1325",
"name": "Improperly Controlled Sequential Memory Allocation"
},
"discovery_date": "2022-07-14T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-adapter-rhel8@sha256:c79cb3c68317a224277a8ee0dc78832fcd4b6da18b9b5b074cffaad14e2f1aa5_amd64",
"8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-operator-bundle@sha256:44de4b736089166718956bebd456ad1a17e0e6f72c49f52804c6b6e60ef5a494_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2107342"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in golang. Calling the Reader, Read method on an archive that contains a large number of concatenated 0-length compressed files can cause a panic issue due to stack exhaustion.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: compress/gzip: stack exhaustion in Reader.Read",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "To exploit CVE-2022-30631, an attacker supplies a specially crafted gzip archive to a Go application that uses a vulnerable version of the compress/gzip package without adequate input validation. This can lead to uncontrolled recursion, resulting in stack exhaustion and causing the application to panic, thereby affecting its availability.\n\nAs this is merely a DoS and there is no known way to control the instruction pointer, RH ProdSec has set the impact of this vulnerabilty to \"Moderate\".\n\nWithin regulated environments, a combination of the following controls acts as a significant barrier to successfully exploiting a CWE-1325: Improperly Controlled Sequential Memory Allocation vulnerability and therefore downgrades the severity of this particular CVE from Moderate to Low.\n\nAccess to the platform is granted only after successful hard token-based multi-factor authentication (MFA) and is governed by least privilege to ensure only authorized users and roles can execute or modify code. Static code analysis and peer reviews enforce strong input validation and error handling, preventing improperly validated inputs from causing system instability, data exposure, or privilege escalation. In the event of successful exploitation, process isolation limits the impact of excessive sequential memory allocation by restricting memory use per process, preventing any single process from exhausting system resources. Finally, the platform uses memory protection mechanisms such as Data Execution Prevention (DEP) and Address Space Layout Randomization (ASLR) to reduce the risk of memory allocation-based attacks.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-rhel8-operator@sha256:5a149d0a0cdb6812acbef0c9b3031fb3cd84181e971198a6e17d8fd0bf5e6293_amd64",
"8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-rhel8@sha256:a403d057cd2ca820306207282007d4d117623e1a2ebb8bee67c19f5796f07f95_amd64"
],
"known_not_affected": [
"8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-adapter-rhel8@sha256:c79cb3c68317a224277a8ee0dc78832fcd4b6da18b9b5b074cffaad14e2f1aa5_amd64",
"8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-operator-bundle@sha256:44de4b736089166718956bebd456ad1a17e0e6f72c49f52804c6b6e60ef5a494_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-30631"
},
{
"category": "external",
"summary": "RHBZ#2107342",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2107342"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-30631",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30631"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-30631",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-30631"
},
{
"category": "external",
"summary": "https://go.dev/issue/53168",
"url": "https://go.dev/issue/53168"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/nqrv9fbR0zE",
"url": "https://groups.google.com/g/golang-announce/c/nqrv9fbR0zE"
}
],
"release_date": "2022-07-12T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-03-06T18:38:53+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-rhel8-operator@sha256:5a149d0a0cdb6812acbef0c9b3031fb3cd84181e971198a6e17d8fd0bf5e6293_amd64",
"8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-rhel8@sha256:a403d057cd2ca820306207282007d4d117623e1a2ebb8bee67c19f5796f07f95_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:1042"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-adapter-rhel8@sha256:c79cb3c68317a224277a8ee0dc78832fcd4b6da18b9b5b074cffaad14e2f1aa5_amd64",
"8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-operator-bundle@sha256:44de4b736089166718956bebd456ad1a17e0e6f72c49f52804c6b6e60ef5a494_amd64",
"8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-rhel8-operator@sha256:5a149d0a0cdb6812acbef0c9b3031fb3cd84181e971198a6e17d8fd0bf5e6293_amd64",
"8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-rhel8@sha256:a403d057cd2ca820306207282007d4d117623e1a2ebb8bee67c19f5796f07f95_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "golang: compress/gzip: stack exhaustion in Reader.Read"
},
{
"cve": "CVE-2022-30632",
"cwe": {
"id": "CWE-1325",
"name": "Improperly Controlled Sequential Memory Allocation"
},
"discovery_date": "2022-07-14T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-adapter-rhel8@sha256:c79cb3c68317a224277a8ee0dc78832fcd4b6da18b9b5b074cffaad14e2f1aa5_amd64",
"8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-operator-bundle@sha256:44de4b736089166718956bebd456ad1a17e0e6f72c49f52804c6b6e60ef5a494_amd64",
"8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-rhel8-operator@sha256:5a149d0a0cdb6812acbef0c9b3031fb3cd84181e971198a6e17d8fd0bf5e6293_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2107386"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in golang. Calling Glob on a path that contains a large number of path separators can cause a panic issue due to stack exhaustion. This can cause an attacker to impact availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: path/filepath: stack exhaustion in Glob",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The exploitation of this flaw will only result in a denial of service of the application via the application crashing which is why this has been rated as moderate.\n\nWithin regulated environments, a combination of the following controls acts as a significant barrier to successfully exploiting a CWE-1325: Improperly Controlled Sequential Memory Allocation vulnerability and therefore downgrades the severity of this particular CVE from Moderate to Low.\n\nAccess to the platform is granted only after successful hard token-based multi-factor authentication (MFA) and is governed by least privilege to ensure only authorized users and roles can execute or modify code. Static code analysis and peer reviews enforce strong input validation and error handling, preventing improperly validated inputs from causing system instability, data exposure, or privilege escalation. In the event of successful exploitation, process isolation limits the impact of excessive sequential memory allocation by restricting memory use per process, preventing any single process from exhausting system resources. Finally, the platform uses memory protection mechanisms such as Data Execution Prevention (DEP) and Address Space Layout Randomization (ASLR) to reduce the risk of memory allocation-based attacks.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-rhel8@sha256:a403d057cd2ca820306207282007d4d117623e1a2ebb8bee67c19f5796f07f95_amd64"
],
"known_not_affected": [
"8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-adapter-rhel8@sha256:c79cb3c68317a224277a8ee0dc78832fcd4b6da18b9b5b074cffaad14e2f1aa5_amd64",
"8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-operator-bundle@sha256:44de4b736089166718956bebd456ad1a17e0e6f72c49f52804c6b6e60ef5a494_amd64",
"8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-rhel8-operator@sha256:5a149d0a0cdb6812acbef0c9b3031fb3cd84181e971198a6e17d8fd0bf5e6293_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-30632"
},
{
"category": "external",
"summary": "RHBZ#2107386",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2107386"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-30632",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30632"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-30632",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-30632"
},
{
"category": "external",
"summary": "https://go.dev/issue/53416",
"url": "https://go.dev/issue/53416"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/nqrv9fbR0zE",
"url": "https://groups.google.com/g/golang-announce/c/nqrv9fbR0zE"
}
],
"release_date": "2022-07-12T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-03-06T18:38:53+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-rhel8@sha256:a403d057cd2ca820306207282007d4d117623e1a2ebb8bee67c19f5796f07f95_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:1042"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-adapter-rhel8@sha256:c79cb3c68317a224277a8ee0dc78832fcd4b6da18b9b5b074cffaad14e2f1aa5_amd64",
"8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-operator-bundle@sha256:44de4b736089166718956bebd456ad1a17e0e6f72c49f52804c6b6e60ef5a494_amd64",
"8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-rhel8-operator@sha256:5a149d0a0cdb6812acbef0c9b3031fb3cd84181e971198a6e17d8fd0bf5e6293_amd64",
"8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-rhel8@sha256:a403d057cd2ca820306207282007d4d117623e1a2ebb8bee67c19f5796f07f95_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "golang: path/filepath: stack exhaustion in Glob"
},
{
"cve": "CVE-2022-30633",
"cwe": {
"id": "CWE-1325",
"name": "Improperly Controlled Sequential Memory Allocation"
},
"discovery_date": "2022-07-14T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-adapter-rhel8@sha256:c79cb3c68317a224277a8ee0dc78832fcd4b6da18b9b5b074cffaad14e2f1aa5_amd64",
"8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-operator-bundle@sha256:44de4b736089166718956bebd456ad1a17e0e6f72c49f52804c6b6e60ef5a494_amd64",
"8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-rhel8-operator@sha256:5a149d0a0cdb6812acbef0c9b3031fb3cd84181e971198a6e17d8fd0bf5e6293_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2107392"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in golang. Calling Unmarshal on an XML document into a Go struct, which has a nested field that uses the \"any\" field tag, can cause a panic due to stack exhaustion.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: encoding/xml: stack exhaustion in Unmarshal",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat has marked this as moderate impact for two primary reasons\n1. Though the vulnerability exists, it is hard to exploit in real scenarios (e.g., the attacker must be able to feed crafted XML documents into specific code paths).\n2. The vulnerability is a denial of service (DoS) due to stack exhaustion rather than code execution or data breach. Since it doesn\u2019t compromise confidentiality or integrity.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-rhel8@sha256:a403d057cd2ca820306207282007d4d117623e1a2ebb8bee67c19f5796f07f95_amd64"
],
"known_not_affected": [
"8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-adapter-rhel8@sha256:c79cb3c68317a224277a8ee0dc78832fcd4b6da18b9b5b074cffaad14e2f1aa5_amd64",
"8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-operator-bundle@sha256:44de4b736089166718956bebd456ad1a17e0e6f72c49f52804c6b6e60ef5a494_amd64",
"8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-rhel8-operator@sha256:5a149d0a0cdb6812acbef0c9b3031fb3cd84181e971198a6e17d8fd0bf5e6293_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-30633"
},
{
"category": "external",
"summary": "RHBZ#2107392",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2107392"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-30633",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30633"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-30633",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-30633"
},
{
"category": "external",
"summary": "https://go.dev/issue/53611",
"url": "https://go.dev/issue/53611"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/nqrv9fbR0zE",
"url": "https://groups.google.com/g/golang-announce/c/nqrv9fbR0zE"
}
],
"release_date": "2022-07-12T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-03-06T18:38:53+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-rhel8@sha256:a403d057cd2ca820306207282007d4d117623e1a2ebb8bee67c19f5796f07f95_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:1042"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-adapter-rhel8@sha256:c79cb3c68317a224277a8ee0dc78832fcd4b6da18b9b5b074cffaad14e2f1aa5_amd64",
"8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-operator-bundle@sha256:44de4b736089166718956bebd456ad1a17e0e6f72c49f52804c6b6e60ef5a494_amd64",
"8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-rhel8-operator@sha256:5a149d0a0cdb6812acbef0c9b3031fb3cd84181e971198a6e17d8fd0bf5e6293_amd64",
"8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-rhel8@sha256:a403d057cd2ca820306207282007d4d117623e1a2ebb8bee67c19f5796f07f95_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "golang: encoding/xml: stack exhaustion in Unmarshal"
},
{
"cve": "CVE-2022-30635",
"cwe": {
"id": "CWE-1325",
"name": "Improperly Controlled Sequential Memory Allocation"
},
"discovery_date": "2022-07-14T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-adapter-rhel8@sha256:c79cb3c68317a224277a8ee0dc78832fcd4b6da18b9b5b074cffaad14e2f1aa5_amd64",
"8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-operator-bundle@sha256:44de4b736089166718956bebd456ad1a17e0e6f72c49f52804c6b6e60ef5a494_amd64",
"8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-rhel8-operator@sha256:5a149d0a0cdb6812acbef0c9b3031fb3cd84181e971198a6e17d8fd0bf5e6293_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2107388"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in golang. When calling Decoder, Decode on a message that contains deeply nested structures, a panic can occur due to stack exhaustion and allows an attacker to impact system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: encoding/gob: stack exhaustion in Decoder.Decode",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "OpenShift Container Platform (OCP) starting from 4.10 stream is already compiled in the patched version of Go, hence is not affected by this vulnerability.The vulnerability has been rated as moderate instead of high because the vulnerability can only result in a minor denial of service.\n\nWithin regulated environments, a combination of the following controls acts as a significant barrier to successfully exploiting a CWE-1325: Improperly Controlled Sequential Memory Allocation vulnerability and therefore downgrades the severity of this particular CVE from Moderate to Low.\n\nAccess to the platform is granted only after successful hard token-based multi-factor authentication (MFA) and is governed by least privilege to ensure only authorized users and roles can execute or modify code. Static code analysis and peer reviews enforce strong input validation and error handling, preventing improperly validated inputs from causing system instability, data exposure, or privilege escalation. In the event of successful exploitation, process isolation limits the impact of excessive sequential memory allocation by restricting memory use per process, preventing any single process from exhausting system resources. Finally, the platform uses memory protection mechanisms such as Data Execution Prevention (DEP) and Address Space Layout Randomization (ASLR) to reduce the risk of memory allocation-based attacks.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-rhel8@sha256:a403d057cd2ca820306207282007d4d117623e1a2ebb8bee67c19f5796f07f95_amd64"
],
"known_not_affected": [
"8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-adapter-rhel8@sha256:c79cb3c68317a224277a8ee0dc78832fcd4b6da18b9b5b074cffaad14e2f1aa5_amd64",
"8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-operator-bundle@sha256:44de4b736089166718956bebd456ad1a17e0e6f72c49f52804c6b6e60ef5a494_amd64",
"8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-rhel8-operator@sha256:5a149d0a0cdb6812acbef0c9b3031fb3cd84181e971198a6e17d8fd0bf5e6293_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-30635"
},
{
"category": "external",
"summary": "RHBZ#2107388",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2107388"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-30635",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30635"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-30635",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-30635"
},
{
"category": "external",
"summary": "https://go.dev/issue/53615",
"url": "https://go.dev/issue/53615"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/nqrv9fbR0zE",
"url": "https://groups.google.com/g/golang-announce/c/nqrv9fbR0zE"
}
],
"release_date": "2022-07-12T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-03-06T18:38:53+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-rhel8@sha256:a403d057cd2ca820306207282007d4d117623e1a2ebb8bee67c19f5796f07f95_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:1042"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-adapter-rhel8@sha256:c79cb3c68317a224277a8ee0dc78832fcd4b6da18b9b5b074cffaad14e2f1aa5_amd64",
"8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-operator-bundle@sha256:44de4b736089166718956bebd456ad1a17e0e6f72c49f52804c6b6e60ef5a494_amd64",
"8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-rhel8-operator@sha256:5a149d0a0cdb6812acbef0c9b3031fb3cd84181e971198a6e17d8fd0bf5e6293_amd64",
"8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-rhel8@sha256:a403d057cd2ca820306207282007d4d117623e1a2ebb8bee67c19f5796f07f95_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "golang: encoding/gob: stack exhaustion in Decoder.Decode"
},
{
"cve": "CVE-2022-32148",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2022-07-14T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-adapter-rhel8@sha256:c79cb3c68317a224277a8ee0dc78832fcd4b6da18b9b5b074cffaad14e2f1aa5_amd64",
"8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-operator-bundle@sha256:44de4b736089166718956bebd456ad1a17e0e6f72c49f52804c6b6e60ef5a494_amd64",
"8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-rhel8-operator@sha256:5a149d0a0cdb6812acbef0c9b3031fb3cd84181e971198a6e17d8fd0bf5e6293_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2107383"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in net/http/httputil golang package. When httputil.ReverseProxy.ServeHTTP is called with a Request.Header map containing a nil value for the X-Forwarded-For header, ReverseProxy could set the client IP incorrectly. This issue may affect confidentiality.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: net/http/httputil: NewSingleHostReverseProxy - omit X-Forwarded-For not working",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Within regulated environments, a combination of the following controls acts as a significant barrier to successfully exploiting a CWE-200: Exposure of Sensitive Information to an Unauthorized Actor vulnerability and therefore downgrades the severity of this particular CVE from Moderate to Low.\n\nAccess to the platform is granted only after successful hard token, multi-factor authentication (MFA), which is coupled with account management controls, including integration with single sign-on (SSO), to ensure that user permissions are restricted to only the functions necessary for their roles. Access to sensitive information is explicitly authorized and enforced based on predefined access policies. Event logs are collected and processed for centralization, correlation, analysis, monitoring, reporting, alerting, and retention. This process ensures that audit logs are generated for specific events involving sensitive information, which helps identify patterns of unauthorized access or data exposure. The platform enforces the use of validated cryptographic modules across compute resources to protect the confidentiality of information, even in the event of interception.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-rhel8@sha256:a403d057cd2ca820306207282007d4d117623e1a2ebb8bee67c19f5796f07f95_amd64"
],
"known_not_affected": [
"8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-adapter-rhel8@sha256:c79cb3c68317a224277a8ee0dc78832fcd4b6da18b9b5b074cffaad14e2f1aa5_amd64",
"8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-operator-bundle@sha256:44de4b736089166718956bebd456ad1a17e0e6f72c49f52804c6b6e60ef5a494_amd64",
"8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-rhel8-operator@sha256:5a149d0a0cdb6812acbef0c9b3031fb3cd84181e971198a6e17d8fd0bf5e6293_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-32148"
},
{
"category": "external",
"summary": "RHBZ#2107383",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2107383"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-32148",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32148"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-32148",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-32148"
},
{
"category": "external",
"summary": "https://go.dev/issue/53423",
"url": "https://go.dev/issue/53423"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/nqrv9fbR0zE",
"url": "https://groups.google.com/g/golang-announce/c/nqrv9fbR0zE"
}
],
"release_date": "2022-07-12T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-03-06T18:38:53+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-rhel8@sha256:a403d057cd2ca820306207282007d4d117623e1a2ebb8bee67c19f5796f07f95_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:1042"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-adapter-rhel8@sha256:c79cb3c68317a224277a8ee0dc78832fcd4b6da18b9b5b074cffaad14e2f1aa5_amd64",
"8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-operator-bundle@sha256:44de4b736089166718956bebd456ad1a17e0e6f72c49f52804c6b6e60ef5a494_amd64",
"8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-rhel8-operator@sha256:5a149d0a0cdb6812acbef0c9b3031fb3cd84181e971198a6e17d8fd0bf5e6293_amd64",
"8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-rhel8@sha256:a403d057cd2ca820306207282007d4d117623e1a2ebb8bee67c19f5796f07f95_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "golang: net/http/httputil: NewSingleHostReverseProxy - omit X-Forwarded-For not working"
},
{
"cve": "CVE-2022-32149",
"cwe": {
"id": "CWE-407",
"name": "Inefficient Algorithmic Complexity"
},
"discovery_date": "2022-10-12T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-adapter-rhel8@sha256:c79cb3c68317a224277a8ee0dc78832fcd4b6da18b9b5b074cffaad14e2f1aa5_amd64",
"8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-operator-bundle@sha256:44de4b736089166718956bebd456ad1a17e0e6f72c49f52804c6b6e60ef5a494_amd64",
"8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-rhel8-operator@sha256:5a149d0a0cdb6812acbef0c9b3031fb3cd84181e971198a6e17d8fd0bf5e6293_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2134010"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in the golang.org/x/text/language package. An attacker can craft an Accept-Language header which ParseAcceptLanguage will take significant time to parse. This issue leads to a denial of service, and can impact availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: golang.org/x/text/language: ParseAcceptLanguage takes a long time to parse complex tags",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "After careful analysis of the vulnerability Redhat is choosing to keep the vulnerability severity as moderate,the vulnerability exists in the ParseAcceptLanguage function of the golang text/language package,when an attacker could craft an unusually large accept header and due to the parser taking quadratic time complexity to finish, firstly the attacker would have to find a way smuggle an input to the parser and even then this would simply not result in a crash of any kind but more of resource hang which while can be unpleasant,does not equate to any real world damage.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-rhel8@sha256:a403d057cd2ca820306207282007d4d117623e1a2ebb8bee67c19f5796f07f95_amd64"
],
"known_not_affected": [
"8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-adapter-rhel8@sha256:c79cb3c68317a224277a8ee0dc78832fcd4b6da18b9b5b074cffaad14e2f1aa5_amd64",
"8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-operator-bundle@sha256:44de4b736089166718956bebd456ad1a17e0e6f72c49f52804c6b6e60ef5a494_amd64",
"8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-rhel8-operator@sha256:5a149d0a0cdb6812acbef0c9b3031fb3cd84181e971198a6e17d8fd0bf5e6293_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-32149"
},
{
"category": "external",
"summary": "RHBZ#2134010",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2134010"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-32149",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32149"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-32149",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-32149"
},
{
"category": "external",
"summary": "https://go.dev/issue/56152",
"url": "https://go.dev/issue/56152"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-dev/c/qfPIly0X7aU",
"url": "https://groups.google.com/g/golang-dev/c/qfPIly0X7aU"
}
],
"release_date": "2022-10-11T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-03-06T18:38:53+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-rhel8@sha256:a403d057cd2ca820306207282007d4d117623e1a2ebb8bee67c19f5796f07f95_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:1042"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-adapter-rhel8@sha256:c79cb3c68317a224277a8ee0dc78832fcd4b6da18b9b5b074cffaad14e2f1aa5_amd64",
"8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-operator-bundle@sha256:44de4b736089166718956bebd456ad1a17e0e6f72c49f52804c6b6e60ef5a494_amd64",
"8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-rhel8-operator@sha256:5a149d0a0cdb6812acbef0c9b3031fb3cd84181e971198a6e17d8fd0bf5e6293_amd64",
"8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-rhel8@sha256:a403d057cd2ca820306207282007d4d117623e1a2ebb8bee67c19f5796f07f95_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "golang: golang.org/x/text/language: ParseAcceptLanguage takes a long time to parse complex tags"
},
{
"acknowledgments": [
{
"names": [
"Adam Korczynski"
],
"organization": "ADA Logics"
},
{
"names": [
"OSS-Fuzz"
]
}
],
"cve": "CVE-2022-41715",
"discovery_date": "2022-10-07T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-adapter-rhel8@sha256:c79cb3c68317a224277a8ee0dc78832fcd4b6da18b9b5b074cffaad14e2f1aa5_amd64",
"8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-operator-bundle@sha256:44de4b736089166718956bebd456ad1a17e0e6f72c49f52804c6b6e60ef5a494_amd64",
"8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-rhel8-operator@sha256:5a149d0a0cdb6812acbef0c9b3031fb3cd84181e971198a6e17d8fd0bf5e6293_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2132872"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the golang package, where programs that compile regular expressions from untrusted sources are vulnerable to memory exhaustion or a denial of service. The parsed regexp representation is linear in the input size. Still, in some cases, the constant factor can be as high as 40,000, making a relatively small regexp consume larger amounts of memory. After the fix, each regexp being parsed is limited to a 256 MB memory footprint. Regular expressions whose representation would use more space than that are rejected. Routine use of regular expressions is unaffected.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: regexp/syntax: limit memory used by parsing regexps",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The opportunity for a Denial of Service is limited to the golang runtime. In the case of OpenShift Container Platform, this would be restricted within each individual container. There are multiple layers of guide rails (Golang\u2019s Garbage Collector; OpenShift\u2019s resource constraints imposed at the container and cluster levels) which would require a malicious user to continue submitting attacks for there to be any enduring impact. They would also need access to external server resources to be able to send a massive volume of requests to cause a significant impact on server operations.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-rhel8@sha256:a403d057cd2ca820306207282007d4d117623e1a2ebb8bee67c19f5796f07f95_amd64"
],
"known_not_affected": [
"8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-adapter-rhel8@sha256:c79cb3c68317a224277a8ee0dc78832fcd4b6da18b9b5b074cffaad14e2f1aa5_amd64",
"8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-operator-bundle@sha256:44de4b736089166718956bebd456ad1a17e0e6f72c49f52804c6b6e60ef5a494_amd64",
"8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-rhel8-operator@sha256:5a149d0a0cdb6812acbef0c9b3031fb3cd84181e971198a6e17d8fd0bf5e6293_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-41715"
},
{
"category": "external",
"summary": "RHBZ#2132872",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2132872"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-41715",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41715"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-41715",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-41715"
},
{
"category": "external",
"summary": "https://github.com/golang/go/issues/55949",
"url": "https://github.com/golang/go/issues/55949"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/xtuG5faxtaU?pli=1",
"url": "https://groups.google.com/g/golang-announce/c/xtuG5faxtaU?pli=1"
}
],
"release_date": "2022-10-04T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-03-06T18:38:53+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-rhel8@sha256:a403d057cd2ca820306207282007d4d117623e1a2ebb8bee67c19f5796f07f95_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:1042"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-adapter-rhel8@sha256:c79cb3c68317a224277a8ee0dc78832fcd4b6da18b9b5b074cffaad14e2f1aa5_amd64",
"8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-operator-bundle@sha256:44de4b736089166718956bebd456ad1a17e0e6f72c49f52804c6b6e60ef5a494_amd64",
"8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-rhel8-operator@sha256:5a149d0a0cdb6812acbef0c9b3031fb3cd84181e971198a6e17d8fd0bf5e6293_amd64",
"8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-rhel8@sha256:a403d057cd2ca820306207282007d4d117623e1a2ebb8bee67c19f5796f07f95_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "golang: regexp/syntax: limit memory used by parsing regexps"
}
]
}
fkie_cve-2022-32149
Vulnerability from fkie_nvd
7.5 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
| URL | Tags | ||
|---|---|---|---|
| security@golang.org | https://go.dev/cl/442235 | Vendor Advisory | |
| security@golang.org | https://go.dev/issue/56152 | Issue Tracking, Third Party Advisory | |
| security@golang.org | https://groups.google.com/g/golang-announce/c/-hjNw559_tE/m/KlGTfid5CAAJ | Mailing List, Third Party Advisory | |
| security@golang.org | https://pkg.go.dev/vuln/GO-2022-1059 | Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://go.dev/cl/442235 | Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://go.dev/issue/56152 | Issue Tracking, Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://groups.google.com/g/golang-announce/c/-hjNw559_tE/m/KlGTfid5CAAJ | Mailing List, Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://pkg.go.dev/vuln/GO-2022-1059 | Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://security.netapp.com/advisory/ntap-20230203-0006/ |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:golang:text:*:*:*:*:*:*:*:*",
"matchCriteriaId": "B60E2667-B233-430C-8BD7-28CDFFB1469F",
"versionEndExcluding": "0.3.8",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An attacker may cause a denial of service by crafting an Accept-Language header which ParseAcceptLanguage will take significant time to parse."
},
{
"lang": "es",
"value": "Un atacante podr\u00eda causar una denegaci\u00f3n de servicio al dise\u00f1ar un encabezado Accept-Language que ParseAcceptLanguage tardar\u00eda mucho tiempo en analizar"
}
],
"id": "CVE-2022-32149",
"lastModified": "2025-05-15T21:15:47.820",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6,
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary"
}
]
},
"published": "2022-10-14T15:15:34.543",
"references": [
{
"source": "security@golang.org",
"tags": [
"Vendor Advisory"
],
"url": "https://go.dev/cl/442235"
},
{
"source": "security@golang.org",
"tags": [
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://go.dev/issue/56152"
},
{
"source": "security@golang.org",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "https://groups.google.com/g/golang-announce/c/-hjNw559_tE/m/KlGTfid5CAAJ"
},
{
"source": "security@golang.org",
"tags": [
"Vendor Advisory"
],
"url": "https://pkg.go.dev/vuln/GO-2022-1059"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "https://go.dev/cl/442235"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://go.dev/issue/56152"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "https://groups.google.com/g/golang-announce/c/-hjNw559_tE/m/KlGTfid5CAAJ"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "https://pkg.go.dev/vuln/GO-2022-1059"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://security.netapp.com/advisory/ntap-20230203-0006/"
}
],
"sourceIdentifier": "security@golang.org",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-772"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
CERTFR-2023-AVI-0331
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans IBM Db2 REST. Elles permettent à un attaquant de provoquer un déni de service à distance et un contournement de la politique de sécurité.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "IBM Db2 REST versions ant\u00e9rieures \u00e0 latest-amd64",
"product": {
"name": "Db2",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "IBM Db2 REST versions ant\u00e9rieures \u00e0 1.0.0.258-amd64",
"product": {
"name": "Db2",
"vendor": {
"name": "IBM",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2022-32149",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32149"
},
{
"name": "CVE-2022-41723",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41723"
},
{
"name": "CVE-2022-27664",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27664"
}
],
"initial_release_date": "2023-04-20T00:00:00",
"last_revision_date": "2023-04-20T00:00:00",
"links": [],
"reference": "CERTFR-2023-AVI-0331",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2023-04-20T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans \u003cspan\nclass=\"textit\"\u003eIBM Db2 REST\u003c/span\u003e. Elles permettent \u00e0 un attaquant de\nprovoquer un d\u00e9ni de service \u00e0 distance et un contournement de la\npolitique de s\u00e9curit\u00e9.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans IBM Db2 REST",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 6984413 du 18 avril 2023",
"url": "https://www.ibm.com/support/pages/node/6984413"
}
]
}
CERTFR-2022-AVI-1040
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans IBM Spectrum Protect. Certaines d'entre elles permettent à un attaquant de provoquer un déni de service à distance, un contournement de la politique de sécurité et une atteinte à la confidentialité des données.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "IBM Spectrum Protect Plus Container Backup and Restore for Kubernetes versions 10.1.5 \u00e0 10.1.12.1 ant\u00e9rieures \u00e0 10.1.12.2",
"product": {
"name": "Spectrum",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "IBM Spectrum Protect Plus Container Backup and Restore for OpenShift versions 10.1.7 \u00e0 10.1.12.1 ant\u00e9rieures \u00e0 10.1.12.2",
"product": {
"name": "Spectrum",
"vendor": {
"name": "IBM",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2022-32189",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32189"
},
{
"name": "CVE-2022-30631",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30631"
},
{
"name": "CVE-2022-32190",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32190"
},
{
"name": "CVE-2022-30635",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30635"
},
{
"name": "CVE-2022-32149",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32149"
},
{
"name": "CVE-2022-32148",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32148"
},
{
"name": "CVE-2022-30630",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30630"
},
{
"name": "CVE-2022-1705",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1705"
},
{
"name": "CVE-2022-30633",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30633"
},
{
"name": "CVE-2022-30632",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30632"
},
{
"name": "CVE-2022-1962",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1962"
},
{
"name": "CVE-2022-28131",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28131"
},
{
"name": "CVE-2022-27664",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27664"
}
],
"initial_release_date": "2022-11-21T00:00:00",
"last_revision_date": "2022-11-21T00:00:00",
"links": [],
"reference": "CERTFR-2022-AVI-1040",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2022-11-21T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Injection de code indirecte \u00e0 distance (XSS)"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans IBM Spectrum\nProtect. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer\nun d\u00e9ni de service \u00e0 distance, un contournement de la politique de\ns\u00e9curit\u00e9 et une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans IBM Spectrum Protect",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 6838883 du 17 novembre 2022",
"url": "https://www.ibm.com/support/pages/node/6838883"
}
]
}
CERTFR-2025-AVI-0622
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans les produits VMware. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, une élévation de privilèges et un déni de service à distance.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| VMware | Tanzu Platform | Tanzu Platform versions 4.0.x antérieures à 4.0.38+LTS-T pour Cloud Foundry Windows | ||
| VMware | Tanzu Platform | Tanzu Platform versions 10.0.x antérieures à 10.0.8 pour Cloud Foundry Windows | ||
| VMware | N/A | Stemcells sans le dernier correctif de sécurité | ||
| VMware | Tanzu Platform | Tanzu Platform versions 4.0.x antérieures à 4.0.38+LTS-T pour Cloud Foundry | ||
| VMware | Tanzu Platform | Tanzu Platform versions 6.0.x antérieures à 6.0.18+LTS-T pour Cloud Foundry Windows | ||
| VMware | Tanzu | Anti-Virus sans le dernier correctif de sécurité pour Tanzu version 2.4.0 | ||
| VMware | Tanzu | Scheduler sans le dernier correctif de sécurité pour Tanzu version 2.0.19 | ||
| VMware | Tanzu Platform | Tanzu Platform versions 6.0.x antérieures à 6.0.18+LTS-T pour Cloud Foundry | ||
| VMware | Tanzu Platform | GenAI sans le dernier correctif de sécurité pour Tanzu Platform pour Cloud Foundry version 10.2.1 | ||
| VMware | Tanzu Application Service | Tanzu Application Service versions antérieures à 1.16.11 | ||
| VMware | Tanzu Platform | Tanzu Platform versions 10.2.x antérieures à 10.2.1+LTS-T pour Cloud Foundry isolation segment | ||
| VMware | Tanzu Platform | Tanzu Platform versions 10.0.x antérieures à 10.0.8 pour Cloud Foundry isolation segment | ||
| VMware | Tanzu | Spring Cloud Services sans le dernier correctif de sécurité pour Tanzu version 3.3.8 | ||
| VMware | Tanzu Platform | Tanzu Platform versions 10.0.x antérieures à 10.0.8 pour Cloud Foundry | ||
| VMware | Tanzu Platform | Tanzu Platform versions 4.0.x antérieures à 4.0.38+LTS-T pour Cloud Foundry isolation segment | ||
| VMware | Tanzu | Spring Cloud Data Flow sans le dernier correctif de sécurité pour Tanzu version 1.14.7 | ||
| VMware | Tanzu Platform | Tanzu Platform versions 6.0.x antérieures à 6.0.18+LTS-T pour Cloud Foundry isolation segment | ||
| VMware | Tanzu Platform | Tanzu Platform versions 10.2.x antérieures à 10.2.1+LTS-T pour Cloud Foundry | ||
| VMware | Tanzu Application Service | Single Sign-On sans le dernier correctif de sécurité pour Tanzu Application Service version 1.16.11 | ||
| VMware | Tanzu | File Integrity Monitoring sans le dernier correctif de sécurité pour Tanzu version 2.1.47 |
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Tanzu Platform versions 4.0.x ant\u00e9rieures \u00e0 4.0.38+LTS-T pour Cloud Foundry Windows",
"product": {
"name": "Tanzu Platform",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Platform versions 10.0.x ant\u00e9rieures \u00e0 10.0.8 pour Cloud Foundry Windows",
"product": {
"name": "Tanzu Platform",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Stemcells sans le dernier correctif de s\u00e9curit\u00e9",
"product": {
"name": "N/A",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Platform versions 4.0.x ant\u00e9rieures \u00e0 4.0.38+LTS-T pour Cloud Foundry",
"product": {
"name": "Tanzu Platform",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Platform versions 6.0.x ant\u00e9rieures \u00e0 6.0.18+LTS-T pour Cloud Foundry Windows",
"product": {
"name": "Tanzu Platform",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Anti-Virus sans le dernier correctif de s\u00e9curit\u00e9 pour Tanzu version 2.4.0",
"product": {
"name": "Tanzu",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Scheduler sans le dernier correctif de s\u00e9curit\u00e9 pour Tanzu version 2.0.19",
"product": {
"name": "Tanzu",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Platform versions 6.0.x ant\u00e9rieures \u00e0 6.0.18+LTS-T pour Cloud Foundry",
"product": {
"name": "Tanzu Platform",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "GenAI sans le dernier correctif de s\u00e9curit\u00e9 pour Tanzu Platform pour Cloud Foundry version 10.2.1",
"product": {
"name": "Tanzu Platform",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Application Service versions ant\u00e9rieures \u00e0 1.16.11",
"product": {
"name": "Tanzu Application Service",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Platform versions 10.2.x ant\u00e9rieures \u00e0 10.2.1+LTS-T pour Cloud Foundry isolation segment",
"product": {
"name": "Tanzu Platform",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Platform versions 10.0.x ant\u00e9rieures \u00e0 10.0.8 pour Cloud Foundry isolation segment",
"product": {
"name": "Tanzu Platform",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Spring Cloud Services sans le dernier correctif de s\u00e9curit\u00e9 pour Tanzu version 3.3.8",
"product": {
"name": "Tanzu",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Platform versions 10.0.x ant\u00e9rieures \u00e0 10.0.8 pour Cloud Foundry",
"product": {
"name": "Tanzu Platform",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Platform versions 4.0.x ant\u00e9rieures \u00e0 4.0.38+LTS-T pour Cloud Foundry isolation segment",
"product": {
"name": "Tanzu Platform",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Spring Cloud Data Flow sans le dernier correctif de s\u00e9curit\u00e9 pour Tanzu version 1.14.7",
"product": {
"name": "Tanzu",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Platform versions 6.0.x ant\u00e9rieures \u00e0 6.0.18+LTS-T pour Cloud Foundry isolation segment",
"product": {
"name": "Tanzu Platform",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Platform versions 10.2.x ant\u00e9rieures \u00e0 10.2.1+LTS-T pour Cloud Foundry",
"product": {
"name": "Tanzu Platform",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Single Sign-On sans le dernier correctif de s\u00e9curit\u00e9 pour Tanzu Application Service version 1.16.11",
"product": {
"name": "Tanzu Application Service",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "File Integrity Monitoring sans le dernier correctif de s\u00e9curit\u00e9 pour Tanzu version 2.1.47",
"product": {
"name": "Tanzu",
"vendor": {
"name": "VMware",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2020-8908",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8908"
},
{
"name": "CVE-2022-3602",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3602"
},
{
"name": "CVE-2022-30633",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30633"
},
{
"name": "CVE-2022-1705",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1705"
},
{
"name": "CVE-2022-27664",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27664"
},
{
"name": "CVE-2022-28131",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28131"
},
{
"name": "CVE-2022-32148",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32148"
},
{
"name": "CVE-2022-32189",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32189"
},
{
"name": "CVE-2022-1962",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1962"
},
{
"name": "CVE-2022-30635",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30635"
},
{
"name": "CVE-2022-32149",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32149"
},
{
"name": "CVE-2022-30631",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30631"
},
{
"name": "CVE-2022-30632",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30632"
},
{
"name": "CVE-2022-30630",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30630"
},
{
"name": "CVE-2022-3786",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3786"
},
{
"name": "CVE-2022-29526",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29526"
},
{
"name": "CVE-2022-32205",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32205"
},
{
"name": "CVE-2022-32206",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32206"
},
{
"name": "CVE-2022-3996",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3996"
},
{
"name": "CVE-2022-24921",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-24921"
},
{
"name": "CVE-2022-1434",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1434"
},
{
"name": "CVE-2022-1292",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1292"
},
{
"name": "CVE-2022-1343",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1343"
},
{
"name": "CVE-2022-1473",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1473"
},
{
"name": "CVE-2022-27774",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27774"
},
{
"name": "CVE-2022-27775",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27775"
},
{
"name": "CVE-2022-22576",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22576"
},
{
"name": "CVE-2022-27776",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27776"
},
{
"name": "CVE-2022-2068",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2068"
},
{
"name": "CVE-2022-27191",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27191"
},
{
"name": "CVE-2022-2097",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2097"
},
{
"name": "CVE-2022-25647",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-25647"
},
{
"name": "CVE-2022-28327",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28327"
},
{
"name": "CVE-2022-24675",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-24675"
},
{
"name": "CVE-2022-27782",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27782"
},
{
"name": "CVE-2022-32208",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32208"
},
{
"name": "CVE-2022-27781",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27781"
},
{
"name": "CVE-2022-32207",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32207"
},
{
"name": "CVE-2022-3358",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3358"
},
{
"name": "CVE-2022-1271",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1271"
},
{
"name": "CVE-2022-32221",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32221"
},
{
"name": "CVE-2022-42916",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42916"
},
{
"name": "CVE-2022-35252",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-35252"
},
{
"name": "CVE-2022-42915",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42915"
},
{
"name": "CVE-2022-43551",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43551"
},
{
"name": "CVE-2022-43552",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43552"
},
{
"name": "CVE-2022-4304",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4304"
},
{
"name": "CVE-2022-4203",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4203"
},
{
"name": "CVE-2023-0286",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0286"
},
{
"name": "CVE-2023-0401",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0401"
},
{
"name": "CVE-2023-0215",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0215"
},
{
"name": "CVE-2023-0217",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0217"
},
{
"name": "CVE-2023-0216",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0216"
},
{
"name": "CVE-2022-4450",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4450"
},
{
"name": "CVE-2023-23915",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23915"
},
{
"name": "CVE-2023-23914",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23914"
},
{
"name": "CVE-2023-23916",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23916"
},
{
"name": "CVE-2022-41717",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41717"
},
{
"name": "CVE-2023-0464",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0464"
},
{
"name": "CVE-2022-2879",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2879"
},
{
"name": "CVE-2022-41715",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41715"
},
{
"name": "CVE-2022-2880",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2880"
},
{
"name": "CVE-2022-41716",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41716"
},
{
"name": "CVE-2023-0466",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0466"
},
{
"name": "CVE-2023-0465",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0465"
},
{
"name": "CVE-2022-30629",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30629"
},
{
"name": "CVE-2022-41723",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41723"
},
{
"name": "CVE-2022-41722",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41722"
},
{
"name": "CVE-2022-30580",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30580"
},
{
"name": "CVE-2022-41720",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41720"
},
{
"name": "CVE-2022-41725",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41725"
},
{
"name": "CVE-2022-41724",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41724"
},
{
"name": "CVE-2023-24532",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24532"
},
{
"name": "CVE-2023-24537",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24537"
},
{
"name": "CVE-2023-2650",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2650"
},
{
"name": "CVE-2022-30634",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30634"
},
{
"name": "CVE-2023-27533",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27533"
},
{
"name": "CVE-2023-27534",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27534"
},
{
"name": "CVE-2022-27780",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27780"
},
{
"name": "CVE-2022-29804",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29804"
},
{
"name": "CVE-2023-24536",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24536"
},
{
"name": "CVE-2023-24538",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24538"
},
{
"name": "CVE-2023-1255",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1255"
},
{
"name": "CVE-2023-28322",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28322"
},
{
"name": "CVE-2023-28320",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28320"
},
{
"name": "CVE-2023-28321",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28321"
},
{
"name": "CVE-2023-24540",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24540"
},
{
"name": "CVE-2023-29400",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29400"
},
{
"name": "CVE-2023-24539",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24539"
},
{
"name": "CVE-2023-2975",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2975"
},
{
"name": "CVE-2023-3446",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3446"
},
{
"name": "CVE-2023-28319",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28319"
},
{
"name": "CVE-2023-3817",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3817"
},
{
"name": "CVE-2023-29404",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29404"
},
{
"name": "CVE-2023-29402",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29402"
},
{
"name": "CVE-2023-29403",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29403"
},
{
"name": "CVE-2023-29405",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29405"
},
{
"name": "CVE-2023-2976",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2976"
},
{
"name": "CVE-2023-29409",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29409"
},
{
"name": "CVE-2023-29406",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29406"
},
{
"name": "CVE-2023-40403",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40403"
},
{
"name": "CVE-2023-44487",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-44487"
},
{
"name": "CVE-2023-33201",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-33201"
},
{
"name": "CVE-2016-1000027",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1000027"
},
{
"name": "CVE-2023-5363",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5363"
},
{
"name": "CVE-2023-4807",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4807"
},
{
"name": "CVE-2023-5678",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5678"
},
{
"name": "CVE-2023-40217",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40217"
},
{
"name": "CVE-2022-0563",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0563"
},
{
"name": "CVE-2023-48795",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-48795"
},
{
"name": "CVE-2023-6237",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6237"
},
{
"name": "CVE-2023-39323",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39323"
},
{
"name": "CVE-2023-36617",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-36617"
},
{
"name": "CVE-2022-23471",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23471"
},
{
"name": "CVE-2023-25153",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-25153"
},
{
"name": "CVE-2023-24534",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24534"
},
{
"name": "CVE-2023-6129",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6129"
},
{
"name": "CVE-2023-46218",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-46218"
},
{
"name": "CVE-2023-39318",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39318"
},
{
"name": "CVE-2023-39319",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39319"
},
{
"name": "CVE-2024-0727",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0727"
},
{
"name": "CVE-2023-39325",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39325"
},
{
"name": "CVE-2023-25173",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-25173"
},
{
"name": "CVE-2022-31030",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-31030"
},
{
"name": "CVE-2023-27043",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27043"
},
{
"name": "CVE-2023-36632",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-36632"
},
{
"name": "CVE-2024-28085",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28085"
},
{
"name": "CVE-2024-2511",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2511"
},
{
"name": "CVE-2020-22916",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-22916"
},
{
"name": "CVE-2023-3978",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3978"
},
{
"name": "CVE-2023-2253",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2253"
},
{
"name": "CVE-2024-25710",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-25710"
},
{
"name": "CVE-2024-26308",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26308"
},
{
"name": "CVE-2023-6597",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6597"
},
{
"name": "CVE-2024-21011",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21011"
},
{
"name": "CVE-2024-21094",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21094"
},
{
"name": "CVE-2024-21068",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21068"
},
{
"name": "CVE-2024-21085",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21085"
},
{
"name": "CVE-2024-21012",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21012"
},
{
"name": "CVE-2023-28841",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28841"
},
{
"name": "CVE-2023-28842",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28842"
},
{
"name": "CVE-2023-39326",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39326"
},
{
"name": "CVE-2023-45283",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45283"
},
{
"name": "CVE-2023-28840",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28840"
},
{
"name": "CVE-2023-45285",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45285"
},
{
"name": "CVE-2023-45284",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45284"
},
{
"name": "CVE-2023-45288",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45288"
},
{
"name": "CVE-2024-4603",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4603"
},
{
"name": "CVE-2023-6378",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6378"
},
{
"name": "CVE-2023-45289",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45289"
},
{
"name": "CVE-2023-45290",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45290"
},
{
"name": "CVE-2024-24783",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24783"
},
{
"name": "CVE-2024-24784",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24784"
},
{
"name": "CVE-2024-24785",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24785"
},
{
"name": "CVE-2024-4741",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4741"
},
{
"name": "CVE-2024-35255",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35255"
},
{
"name": "CVE-2024-24557",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24557"
},
{
"name": "CVE-2024-24786",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24786"
},
{
"name": "CVE-2024-28180",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28180"
},
{
"name": "CVE-2024-29857",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-29857"
},
{
"name": "CVE-2024-30171",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-30171"
},
{
"name": "CVE-2024-30172",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-30172"
},
{
"name": "CVE-2024-5535",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-5535"
},
{
"name": "CVE-2024-2398",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2398"
},
{
"name": "CVE-2024-0397",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0397"
},
{
"name": "CVE-2024-4030",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4030"
},
{
"name": "CVE-2024-4032",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4032"
},
{
"name": "CVE-2024-0450",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0450"
},
{
"name": "CVE-2024-36945",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36945"
},
{
"name": "CVE-2024-21131",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21131"
},
{
"name": "CVE-2024-21138",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21138"
},
{
"name": "CVE-2024-21140",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21140"
},
{
"name": "CVE-2024-21144",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21144"
},
{
"name": "CVE-2024-21145",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21145"
},
{
"name": "CVE-2024-21147",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21147"
},
{
"name": "CVE-2023-28756",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28756"
},
{
"name": "CVE-2024-6923",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6923"
},
{
"name": "CVE-2024-3219",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-3219"
},
{
"name": "CVE-2023-45287",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45287"
},
{
"name": "CVE-2024-24787",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24787"
},
{
"name": "CVE-2024-42230",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42230"
},
{
"name": "CVE-2024-6232",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6232"
},
{
"name": "CVE-2024-6119",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6119"
},
{
"name": "CVE-2022-24769",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-24769"
},
{
"name": "CVE-2024-41110",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41110"
},
{
"name": "CVE-2024-38816",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38816"
},
{
"name": "CVE-2024-7264",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-7264"
},
{
"name": "CVE-2024-8096",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-8096"
},
{
"name": "CVE-2024-46812",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46812"
},
{
"name": "CVE-2024-46821",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46821"
},
{
"name": "CVE-2024-24789",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24789"
},
{
"name": "CVE-2024-34155",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34155"
},
{
"name": "CVE-2024-34156",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34156"
},
{
"name": "CVE-2024-34158",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34158"
},
{
"name": "CVE-2024-46753",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46753"
},
{
"name": "CVE-2024-46787",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46787"
},
{
"name": "CVE-2024-24790",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24790"
},
{
"name": "CVE-2024-21208",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21208"
},
{
"name": "CVE-2024-21210",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21210"
},
{
"name": "CVE-2024-21217",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21217"
},
{
"name": "CVE-2024-21235",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21235"
},
{
"name": "CVE-2024-9143",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-9143"
},
{
"name": "CVE-2024-38819",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38819"
},
{
"name": "CVE-2024-38820",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38820"
},
{
"name": "CVE-2024-34447",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34447"
},
{
"name": "CVE-2024-7592",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-7592"
},
{
"name": "CVE-2024-8088",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-8088"
},
{
"name": "CVE-2024-9681",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-9681"
},
{
"name": "CVE-2024-11168",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11168"
},
{
"name": "CVE-2024-38828",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38828"
},
{
"name": "CVE-2024-50047",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50047"
},
{
"name": "CVE-2024-11053",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11053"
},
{
"name": "CVE-2024-47554",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47554"
},
{
"name": "CVE-2024-53051",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53051"
},
{
"name": "CVE-2024-0406",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0406"
},
{
"name": "CVE-2024-53144",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53144"
},
{
"name": "CVE-2024-8805",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-8805"
},
{
"name": "CVE-2025-21502",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21502"
},
{
"name": "CVE-2024-27282",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27282"
},
{
"name": "CVE-2025-0938",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0938"
},
{
"name": "CVE-2024-56664",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56664"
},
{
"name": "CVE-2025-0167",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0167"
},
{
"name": "CVE-2025-0725",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0725"
},
{
"name": "CVE-2024-50602",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50602"
},
{
"name": "CVE-2024-13176",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-13176"
},
{
"name": "CVE-2025-1795",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1795"
},
{
"name": "CVE-2024-51744",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-51744"
},
{
"name": "CVE-2024-24791",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24791"
},
{
"name": "CVE-2025-22228",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22228"
},
{
"name": "CVE-2023-24531",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24531"
},
{
"name": "CVE-2024-45336",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45336"
},
{
"name": "CVE-2024-45337",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45337"
},
{
"name": "CVE-2024-45341",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45341"
},
{
"name": "CVE-2025-22866",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22866"
},
{
"name": "CVE-2025-22870",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22870"
},
{
"name": "CVE-2024-56171",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56171"
},
{
"name": "CVE-2025-27113",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27113"
},
{
"name": "CVE-2020-36843",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-36843"
},
{
"name": "CVE-2025-21587",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21587"
},
{
"name": "CVE-2025-30691",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30691"
},
{
"name": "CVE-2025-30698",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30698"
},
{
"name": "CVE-2025-24928",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24928"
},
{
"name": "CVE-2025-21941",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21941"
},
{
"name": "CVE-2025-21956",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21956"
},
{
"name": "CVE-2025-21957",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21957"
},
{
"name": "CVE-2025-21959",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21959"
},
{
"name": "CVE-2025-21962",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21962"
},
{
"name": "CVE-2025-21963",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21963"
},
{
"name": "CVE-2025-21964",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21964"
},
{
"name": "CVE-2025-21968",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21968"
},
{
"name": "CVE-2025-21970",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21970"
},
{
"name": "CVE-2025-21975",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21975"
},
{
"name": "CVE-2025-21981",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21981"
},
{
"name": "CVE-2025-21991",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21991"
},
{
"name": "CVE-2025-21992",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21992"
},
{
"name": "CVE-2025-21994",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21994"
},
{
"name": "CVE-2025-21996",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21996"
},
{
"name": "CVE-2025-21999",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21999"
},
{
"name": "CVE-2025-22004",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22004"
},
{
"name": "CVE-2025-22005",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22005"
},
{
"name": "CVE-2025-22007",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22007"
},
{
"name": "CVE-2025-22008",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22008"
},
{
"name": "CVE-2025-22010",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22010"
},
{
"name": "CVE-2025-22014",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22014"
},
{
"name": "CVE-2020-15250",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-15250"
},
{
"name": "CVE-2024-12798",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12798"
},
{
"name": "CVE-2024-12801",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12801"
},
{
"name": "CVE-2024-29018",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-29018"
},
{
"name": "CVE-2025-21613",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21613"
},
{
"name": "CVE-2025-21614",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21614"
},
{
"name": "CVE-2025-22868",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22868"
},
{
"name": "CVE-2025-22871",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22871"
},
{
"name": "CVE-2025-22235",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22235"
},
{
"name": "CVE-2025-2312",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-2312"
},
{
"name": "CVE-2025-31650",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-31650"
},
{
"name": "CVE-2025-31651",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-31651"
},
{
"name": "CVE-2025-30204",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30204"
},
{
"name": "CVE-2023-53034",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53034"
},
{
"name": "CVE-2025-22025",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22025"
},
{
"name": "CVE-2025-22035",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22035"
},
{
"name": "CVE-2025-22044",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22044"
},
{
"name": "CVE-2025-22045",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22045"
},
{
"name": "CVE-2025-22050",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22050"
},
{
"name": "CVE-2025-22054",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22054"
},
{
"name": "CVE-2025-22055",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22055"
},
{
"name": "CVE-2025-22056",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22056"
},
{
"name": "CVE-2025-22060",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22060"
},
{
"name": "CVE-2025-22063",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22063"
},
{
"name": "CVE-2025-22066",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22066"
},
{
"name": "CVE-2025-22071",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22071"
},
{
"name": "CVE-2025-22073",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22073"
},
{
"name": "CVE-2025-22075",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22075"
},
{
"name": "CVE-2025-22079",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22079"
},
{
"name": "CVE-2025-22081",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22081"
},
{
"name": "CVE-2025-22086",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22086"
},
{
"name": "CVE-2025-22089",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22089"
},
{
"name": "CVE-2025-22097",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22097"
},
{
"name": "CVE-2025-23136",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23136"
},
{
"name": "CVE-2025-23138",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23138"
},
{
"name": "CVE-2025-37785",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37785"
},
{
"name": "CVE-2025-38152",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38152"
},
{
"name": "CVE-2025-38575",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38575"
},
{
"name": "CVE-2025-38637",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38637"
},
{
"name": "CVE-2025-39728",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39728"
},
{
"name": "CVE-2025-39735",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39735"
},
{
"name": "CVE-2025-4516",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4516"
},
{
"name": "CVE-2025-22233",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22233"
},
{
"name": "CVE-2024-9287",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-9287"
},
{
"name": "CVE-2025-4575",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4575"
},
{
"name": "CVE-2022-49728",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49728"
},
{
"name": "CVE-2024-58093",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58093"
},
{
"name": "CVE-2025-22018",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22018"
},
{
"name": "CVE-2025-22020",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22020"
},
{
"name": "CVE-2025-37798",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37798"
},
{
"name": "CVE-2025-22869",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22869"
},
{
"name": "CVE-2025-46701",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-46701"
},
{
"name": "CVE-2025-22021",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22021"
},
{
"name": "CVE-2025-37889",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37889"
},
{
"name": "CVE-2025-37937",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37937"
},
{
"name": "CVE-2025-37890",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37890"
},
{
"name": "CVE-2025-37932",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37932"
},
{
"name": "CVE-2025-4517",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4517"
},
{
"name": "CVE-2025-4330",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4330"
},
{
"name": "CVE-2025-4138",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4138"
},
{
"name": "CVE-2024-12718",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12718"
},
{
"name": "CVE-2025-4435",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4435"
},
{
"name": "CVE-2025-41234",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-41234"
},
{
"name": "CVE-2025-49146",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49146"
},
{
"name": "CVE-2025-27219",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27219"
},
{
"name": "CVE-2025-27220",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27220"
},
{
"name": "CVE-2025-48976",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48976"
},
{
"name": "CVE-2025-48988",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48988"
},
{
"name": "CVE-2025-49124",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49124"
},
{
"name": "CVE-2025-49125",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49125"
},
{
"name": "CVE-2024-53427",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53427"
},
{
"name": "CVE-2025-22872",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22872"
},
{
"name": "CVE-2025-6020",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6020"
},
{
"name": "CVE-2022-49636",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49636"
},
{
"name": "CVE-2025-37997",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37997"
},
{
"name": "CVE-2025-38000",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38000"
},
{
"name": "CVE-2025-38001",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38001"
},
{
"name": "CVE-2022-21698",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21698"
},
{
"name": "CVE-2025-32462",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32462"
},
{
"name": "CVE-2025-52434",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52434"
},
{
"name": "CVE-2025-53506",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53506"
},
{
"name": "CVE-2024-47081",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47081"
},
{
"name": "CVE-2025-30749",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30749"
},
{
"name": "CVE-2025-30754",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30754"
},
{
"name": "CVE-2025-30761",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30761"
},
{
"name": "CVE-2025-50059",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50059"
},
{
"name": "CVE-2025-50106",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50106"
},
{
"name": "CVE-2025-48734",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48734"
},
{
"name": "CVE-2021-3995",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3995"
},
{
"name": "CVE-2021-3996",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3996"
},
{
"name": "CVE-2022-28948",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28948"
},
{
"name": "CVE-2022-29173",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29173"
},
{
"name": "CVE-2022-35929",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-35929"
},
{
"name": "CVE-2022-36056",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-36056"
},
{
"name": "CVE-2022-36109",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-36109"
},
{
"name": "CVE-2023-28755",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28755"
},
{
"name": "CVE-2023-30551",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-30551"
},
{
"name": "CVE-2023-33199",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-33199"
},
{
"name": "CVE-2023-33202",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-33202"
},
{
"name": "CVE-2023-46737",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-46737"
},
{
"name": "CVE-2024-23337",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-23337"
},
{
"name": "CVE-2024-24579",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24579"
},
{
"name": "CVE-2024-29902",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-29902"
},
{
"name": "CVE-2024-29903",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-29903"
},
{
"name": "CVE-2024-40635",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40635"
},
{
"name": "CVE-2024-41909",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41909"
},
{
"name": "CVE-2024-45339",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45339"
},
{
"name": "CVE-2024-47611",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47611"
},
{
"name": "CVE-2024-52587",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-52587"
},
{
"name": "CVE-2024-6104",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6104"
},
{
"name": "CVE-2025-0913",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0913"
},
{
"name": "CVE-2025-22874",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22874"
},
{
"name": "CVE-2025-25186",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-25186"
},
{
"name": "CVE-2025-27221",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27221"
},
{
"name": "CVE-2025-29786",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-29786"
},
{
"name": "CVE-2025-32441",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32441"
},
{
"name": "CVE-2025-32955",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32955"
},
{
"name": "CVE-2025-32988",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32988"
},
{
"name": "CVE-2025-32989",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32989"
},
{
"name": "CVE-2025-32990",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32990"
},
{
"name": "CVE-2025-3445",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3445"
},
{
"name": "CVE-2025-38177",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38177"
},
{
"name": "CVE-2025-46727",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-46727"
},
{
"name": "CVE-2025-4673",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4673"
},
{
"name": "CVE-2025-47290",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47290"
},
{
"name": "CVE-2025-48060",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48060"
},
{
"name": "CVE-2025-4877",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4877"
},
{
"name": "CVE-2025-4878",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4878"
},
{
"name": "CVE-2025-48924",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48924"
},
{
"name": "CVE-2025-49014",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49014"
},
{
"name": "CVE-2025-4949",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4949"
},
{
"name": "CVE-2025-50181",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50181"
},
{
"name": "CVE-2025-5318",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5318"
},
{
"name": "CVE-2025-5372",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5372"
},
{
"name": "CVE-2025-5914",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5914"
},
{
"name": "CVE-2025-5915",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5915"
},
{
"name": "CVE-2025-5916",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5916"
},
{
"name": "CVE-2025-5917",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5917"
},
{
"name": "CVE-2025-6069",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6069"
},
{
"name": "CVE-2025-6395",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6395"
}
],
"initial_release_date": "2025-07-25T00:00:00",
"last_revision_date": "2025-07-25T00:00:00",
"links": [],
"reference": "CERTFR-2025-AVI-0622",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2025-07-25T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Injection de code indirecte \u00e0 distance (XSS)"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Falsification de requ\u00eates c\u00f4t\u00e9 serveur (SSRF)"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits VMware. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire \u00e0 distance, une \u00e9l\u00e9vation de privil\u00e8ges et un d\u00e9ni de service \u00e0 distance.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits VMware",
"vendor_advisories": [
{
"published_at": "2025-07-24",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 35981",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/35981"
},
{
"published_at": "2025-07-24",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 35967",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/35967"
},
{
"published_at": "2025-07-24",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 35980",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/35980"
},
{
"published_at": "2025-07-24",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 35974",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/35974"
},
{
"published_at": "2025-07-24",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 35979",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/35979"
},
{
"published_at": "2025-07-24",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 35984",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/35984"
},
{
"published_at": "2025-07-24",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 35970",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/35970"
},
{
"published_at": "2025-07-24",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 35983",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/35983"
},
{
"published_at": "2025-07-24",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 35978",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/35978"
},
{
"published_at": "2025-07-24",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 35968",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/35968"
},
{
"published_at": "2025-07-24",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 35973",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/35973"
},
{
"published_at": "2025-07-24",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 35976",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/35976"
},
{
"published_at": "2025-07-24",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 35969",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/35969"
},
{
"published_at": "2025-07-24",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 35966",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/35966"
},
{
"published_at": "2025-07-24",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 35972",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/35972"
},
{
"published_at": "2025-07-24",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 35977",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/35977"
},
{
"published_at": "2025-07-24",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 35982",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/35982"
},
{
"published_at": "2025-07-24",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 35971",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/35971"
},
{
"published_at": "2025-07-24",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 35975",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/35975"
}
]
}
CERTFR-2023-AVI-0701
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans Splunk. Certaines d'entre elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur, une exécution de code arbitraire à distance et un déni de service à distance.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| Splunk | Universal Forwarder | Universal Forwarder versions 9.0.x antérieures à 9.0.6 | ||
| Splunk | N/A | Splunk ITSI versions 4.15.x antérieures à 4.15.3 | ||
| Splunk | Universal Forwarder | Universal Forwarder versions 8.2.x antérieures à 8.2.12 | ||
| Splunk | N/A | Splunk Cloud versions antérieures à 9.0.2305.200 | ||
| Splunk | Universal Forwarder | Universal Forwarder versions 9.1.x antérieures à 9.1.1 | ||
| Splunk | Splunk Enterprise | Splunk Enterprise versions 8.2.x antérieures à 8.2.12 | ||
| Splunk | N/A | Splunk ITSI versions 4.13.x antérieures à 4.13.3 | ||
| Splunk | Splunk Enterprise | Splunk Enterprise versions 9.1.x antérieures à 9.1.1 | ||
| Splunk | Splunk Enterprise | Splunk Enterprise versions 9.0.x antérieures à 9.0.6 |
| Title | Publication Time | Tags | |||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Universal Forwarder versions 9.0.x ant\u00e9rieures \u00e0 9.0.6",
"product": {
"name": "Universal Forwarder",
"vendor": {
"name": "Splunk",
"scada": false
}
}
},
{
"description": "Splunk ITSI versions 4.15.x ant\u00e9rieures \u00e0 4.15.3",
"product": {
"name": "N/A",
"vendor": {
"name": "Splunk",
"scada": false
}
}
},
{
"description": "Universal Forwarder versions 8.2.x ant\u00e9rieures \u00e0 8.2.12",
"product": {
"name": "Universal Forwarder",
"vendor": {
"name": "Splunk",
"scada": false
}
}
},
{
"description": "Splunk Cloud versions ant\u00e9rieures \u00e0 9.0.2305.200",
"product": {
"name": "N/A",
"vendor": {
"name": "Splunk",
"scada": false
}
}
},
{
"description": "Universal Forwarder versions 9.1.x ant\u00e9rieures \u00e0 9.1.1",
"product": {
"name": "Universal Forwarder",
"vendor": {
"name": "Splunk",
"scada": false
}
}
},
{
"description": "Splunk Enterprise versions 8.2.x ant\u00e9rieures \u00e0 8.2.12",
"product": {
"name": "Splunk Enterprise",
"vendor": {
"name": "Splunk",
"scada": false
}
}
},
{
"description": "Splunk ITSI versions 4.13.x ant\u00e9rieures \u00e0 4.13.3",
"product": {
"name": "N/A",
"vendor": {
"name": "Splunk",
"scada": false
}
}
},
{
"description": "Splunk Enterprise versions 9.1.x ant\u00e9rieures \u00e0 9.1.1",
"product": {
"name": "Splunk Enterprise",
"vendor": {
"name": "Splunk",
"scada": false
}
}
},
{
"description": "Splunk Enterprise versions 9.0.x ant\u00e9rieures \u00e0 9.0.6",
"product": {
"name": "Splunk Enterprise",
"vendor": {
"name": "Splunk",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2021-22898",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22898"
},
{
"name": "CVE-2022-40899",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40899"
},
{
"name": "CVE-2022-35252",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-35252"
},
{
"name": "CVE-2022-31129",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-31129"
},
{
"name": "CVE-2022-32189",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32189"
},
{
"name": "CVE-2021-27919",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-27919"
},
{
"name": "CVE-2019-20454",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-20454"
},
{
"name": "CVE-2021-29425",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-29425"
},
{
"name": "CVE-2022-30631",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30631"
},
{
"name": "CVE-2022-27191",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27191"
},
{
"name": "CVE-2022-46175",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-46175"
},
{
"name": "CVE-2020-8169",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8169"
},
{
"name": "CVE-2022-27781",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27781"
},
{
"name": "CVE-2021-22925",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22925"
},
{
"name": "CVE-2021-3572",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3572"
},
{
"name": "CVE-2023-4571",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4571"
},
{
"name": "CVE-2022-35260",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-35260"
},
{
"name": "CVE-2023-29404",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29404"
},
{
"name": "CVE-2022-27536",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27536"
},
{
"name": "CVE-2022-24921",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-24921"
},
{
"name": "CVE-2022-32208",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32208"
},
{
"name": "CVE-2022-28327",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28327"
},
{
"name": "CVE-2020-28851",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-28851"
},
{
"name": "CVE-2021-33196",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33196"
},
{
"name": "CVE-2021-31525",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-31525"
},
{
"name": "CVE-2020-8285",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8285"
},
{
"name": "CVE-2021-22901",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22901"
},
{
"name": "CVE-2022-27778",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27778"
},
{
"name": "CVE-2021-33198",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33198"
},
{
"name": "CVE-2022-30635",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30635"
},
{
"name": "CVE-2019-20838",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-20838"
},
{
"name": "CVE-2022-41715",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41715"
},
{
"name": "CVE-2022-32207",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32207"
},
{
"name": "CVE-2022-37603",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-37603"
},
{
"name": "CVE-2022-41722",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41722"
},
{
"name": "CVE-2021-41182",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-41182"
},
{
"name": "CVE-2023-40592",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40592"
},
{
"name": "CVE-2023-29403",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29403"
},
{
"name": "CVE-2022-27776",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27776"
},
{
"name": "CVE-2022-42916",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42916"
},
{
"name": "CVE-2020-8286",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8286"
},
{
"name": "CVE-2023-29405",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29405"
},
{
"name": "CVE-2021-38297",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-38297"
},
{
"name": "CVE-2022-30629",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30629"
},
{
"name": "CVE-2022-40897",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40897"
},
{
"name": "CVE-2022-27782",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27782"
},
{
"name": "CVE-2022-32149",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32149"
},
{
"name": "CVE-2022-32148",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32148"
},
{
"name": "CVE-2020-8177",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8177"
},
{
"name": "CVE-2021-41771",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-41771"
},
{
"name": "CVE-2021-33197",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33197"
},
{
"name": "CVE-2021-27918",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-27918"
},
{
"name": "CVE-2022-30630",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30630"
},
{
"name": "CVE-2021-22924",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22924"
},
{
"name": "CVE-2022-33987",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-33987"
},
{
"name": "CVE-2022-43552",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43552"
},
{
"name": "CVE-2023-40596",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40596"
},
{
"name": "CVE-2023-40594",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40594"
},
{
"name": "CVE-2021-22947",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22947"
},
{
"name": "CVE-2021-22922",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22922"
},
{
"name": "CVE-2023-40595",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40595"
},
{
"name": "CVE-2022-22576",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22576"
},
{
"name": "CVE-2021-38561",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-38561"
},
{
"name": "CVE-2021-39293",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-39293"
},
{
"name": "CVE-2022-1705",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1705"
},
{
"name": "CVE-2022-3510",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3510"
},
{
"name": "CVE-2022-3509",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3509"
},
{
"name": "CVE-2021-22946",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22946"
},
{
"name": "CVE-2020-8284",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8284"
},
{
"name": "CVE-2023-23915",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23915"
},
{
"name": "CVE-2022-41720",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41720"
},
{
"name": "CVE-2022-41716",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41716"
},
{
"name": "CVE-2022-24999",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-24999"
},
{
"name": "CVE-2022-29526",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29526"
},
{
"name": "CVE-2022-30633",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30633"
},
{
"name": "CVE-2022-1941",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1941"
},
{
"name": "CVE-2021-3520",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3520"
},
{
"name": "CVE-2022-36227",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-36227"
},
{
"name": "CVE-2021-41184",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-41184"
},
{
"name": "CVE-2021-41183",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-41183"
},
{
"name": "CVE-2021-36976",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-36976"
},
{
"name": "CVE-2023-27535",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27535"
},
{
"name": "CVE-2022-27775",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27775"
},
{
"name": "CVE-2023-23914",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23914"
},
{
"name": "CVE-2022-30632",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30632"
},
{
"name": "CVE-2022-27774",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27774"
},
{
"name": "CVE-2022-37601",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-37601"
},
{
"name": "CVE-2022-1962",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1962"
},
{
"name": "CVE-2021-23382",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-23382"
},
{
"name": "CVE-2023-40597",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40597"
},
{
"name": "CVE-2022-2309",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2309"
},
{
"name": "CVE-2022-42915",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42915"
},
{
"name": "CVE-2022-32221",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32221"
},
{
"name": "CVE-2022-28131",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28131"
},
{
"name": "CVE-2022-3517",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3517"
},
{
"name": "CVE-2021-22897",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22897"
},
{
"name": "CVE-2022-24675",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-24675"
},
{
"name": "CVE-2022-23806",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23806"
},
{
"name": "CVE-2021-36221",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-36221"
},
{
"name": "CVE-2022-2880",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2880"
},
{
"name": "CVE-2022-23773",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23773"
},
{
"name": "CVE-2023-24539",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24539"
},
{
"name": "CVE-2018-10237",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-10237"
},
{
"name": "CVE-2021-34558",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-34558"
},
{
"name": "CVE-2021-3803",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3803"
},
{
"name": "CVE-2022-2879",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2879"
},
{
"name": "CVE-2022-32205",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32205"
},
{
"name": "CVE-2023-27534",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27534"
},
{
"name": "CVE-2023-27536",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27536"
},
{
"name": "CVE-2022-23772",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23772"
},
{
"name": "CVE-2020-29652",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-29652"
},
{
"name": "CVE-2022-43551",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43551"
},
{
"name": "CVE-2022-42004",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42004"
},
{
"name": "CVE-2022-40023",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40023"
},
{
"name": "CVE-2021-22569",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22569"
},
{
"name": "CVE-2023-27533",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27533"
},
{
"name": "CVE-2021-41772",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-41772"
},
{
"name": "CVE-2020-8231",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8231"
},
{
"name": "CVE-2022-27779",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27779"
},
{
"name": "CVE-2023-29400",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29400"
},
{
"name": "CVE-2022-25881",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-25881"
},
{
"name": "CVE-2021-31566",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-31566"
},
{
"name": "CVE-2021-29923",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-29923"
},
{
"name": "CVE-2023-27538",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27538"
},
{
"name": "CVE-2020-8908",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8908"
},
{
"name": "CVE-2022-30634",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30634"
},
{
"name": "CVE-2021-44716",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-44716"
},
{
"name": "CVE-2021-23343",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-23343"
},
{
"name": "CVE-2022-35737",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-35737"
},
{
"name": "CVE-2021-33194",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33194"
},
{
"name": "CVE-2023-24540",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24540"
},
{
"name": "CVE-2022-32206",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32206"
},
{
"name": "CVE-2022-38900",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-38900"
},
{
"name": "CVE-2023-40598",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40598"
},
{
"name": "CVE-2013-7489",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-7489"
},
{
"name": "CVE-2021-22926",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22926"
},
{
"name": "CVE-2021-30560",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30560"
},
{
"name": "CVE-2023-40593",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40593"
},
{
"name": "CVE-2022-30580",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30580"
},
{
"name": "CVE-2018-20225",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-20225"
},
{
"name": "CVE-2021-22890",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22890"
},
{
"name": "CVE-2022-42003",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42003"
},
{
"name": "CVE-2021-44717",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-44717"
},
{
"name": "CVE-2020-14155",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14155"
},
{
"name": "CVE-2022-29804",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29804"
},
{
"name": "CVE-2023-2976",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2976"
},
{
"name": "CVE-2021-22923",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22923"
},
{
"name": "CVE-2022-37599",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-37599"
},
{
"name": "CVE-2023-29402",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29402"
},
{
"name": "CVE-2021-29060",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-29060"
},
{
"name": "CVE-2021-43565",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-43565"
},
{
"name": "CVE-2022-30115",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30115"
},
{
"name": "CVE-2022-3171",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3171"
},
{
"name": "CVE-2021-20066",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20066"
},
{
"name": "CVE-2021-22876",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22876"
},
{
"name": "CVE-2023-27537",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27537"
},
{
"name": "CVE-2022-23491",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23491"
},
{
"name": "CVE-2022-27780",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27780"
},
{
"name": "CVE-2020-28469",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-28469"
},
{
"name": "CVE-2021-22945",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22945"
},
{
"name": "CVE-2021-33195",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33195"
},
{
"name": "CVE-2022-27664",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27664"
},
{
"name": "CVE-2023-23916",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23916"
}
],
"initial_release_date": "2023-08-31T00:00:00",
"last_revision_date": "2023-08-31T00:00:00",
"links": [],
"reference": "CERTFR-2023-AVI-0701",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2023-08-31T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Injection de code indirecte \u00e0 distance (XSS)"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans Splunk. Certaines\nd\u0027entre elles permettent \u00e0 un attaquant de provoquer un probl\u00e8me de\ns\u00e9curit\u00e9 non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur, une ex\u00e9cution de code arbitraire \u00e0\ndistance et un d\u00e9ni de service \u00e0 distance.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans Splunk",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2023-0802 du 30 ao\u00fbt 2023",
"url": "https://advisory.splunk.com/advisories/SVD-2023-0802"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2023-0804 du 30 ao\u00fbt 2023",
"url": "https://advisory.splunk.com/advisories/SVD-2023-0804"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2023-0806 du 30 ao\u00fbt 2023",
"url": "https://advisory.splunk.com/advisories/SVD-2023-0806"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2023-0810 du 30 ao\u00fbt 2023",
"url": "https://advisory.splunk.com/advisories/SVD-2023-0810"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2023-0807 du 30 ao\u00fbt 2023",
"url": "https://advisory.splunk.com/advisories/SVD-2023-0807"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2023-0808 du 30 ao\u00fbt 2023",
"url": "https://advisory.splunk.com/advisories/SVD-2023-0808"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2023-0803 du 30 ao\u00fbt 2023",
"url": "https://advisory.splunk.com/advisories/SVD-2023-0803"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2023-0801 du 30 ao\u00fbt 2023",
"url": "https://advisory.splunk.com/advisories/SVD-2023-0801"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2023-0805 du 30 ao\u00fbt 2023",
"url": "https://advisory.splunk.com/advisories/SVD-2023-0805"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2023-0809 du 30 ao\u00fbt 2023",
"url": "https://advisory.splunk.com/advisories/SVD-2023-0809"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2023-0811 du 30 ao\u00fbt 2023",
"url": "https://advisory.splunk.com/advisories/SVD-2023-0811"
}
]
}
CERTFR-2025-AVI-0562
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans les produits IBM. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un déni de service à distance et une atteinte à la confidentialité des données.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| IBM | Db2 | DB2 Data Management Console versions 3.1.x postérieures à 3.1.11 et antérieures à 3.1.13.1 | ||
| IBM | Cognos Analytics | Cognos Analytics versions 11.2.x antérieures à 11.2.4 FP6 | ||
| IBM | Sterling | Sterling Transformation Extender version 10.1.1.1 sans le correctif de sécurité APAR PH67014 | ||
| IBM | Sterling | Sterling Transformation Extender version 11.0.0.0 sans le correctif de sécurité APAR PH67014 | ||
| IBM | Sterling | Sterling Transformation Extender version 10.1.0.2 sans le correctif de sécurité APAR PH67014 | ||
| IBM | Cognos Analytics | Cognos Analytics versions 12.0.x antérieures à 12.0.4 FP1 | ||
| IBM | Sterling | Sterling Transformation Extender version 10.1.2.1 sans le correctif de sécurité APAR PH67014 | ||
| IBM | Informix Dynamic Server | Informix Dynamic Server versions 14.10.x antérieures à 14.10.xC11W2 | ||
| IBM | Sterling Connect:Direct | Sterling Connect:Direct File Agent versions 1.4.0.x antérieures à 1.4.0.4 | ||
| IBM | Sterling | Sterling Transformation Extender versions 11.0.1.x antérieures à 11.0.1.1 sans le correctif de sécurité APAR PH67016 | ||
| IBM | Db2 | DB2 Data Management Console pour CPD versions antérieures à 5.1.2 | ||
| IBM | Informix Dynamic Server | Informix Dynamic Server versions 12.10.x antérieures à 12.10.xC16W2 |
| Title | Publication Time | Tags | |||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "DB2 Data Management Console versions 3.1.x post\u00e9rieures \u00e0 3.1.11 et ant\u00e9rieures \u00e0 3.1.13.1",
"product": {
"name": "Db2",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "Cognos Analytics versions 11.2.x ant\u00e9rieures \u00e0 11.2.4 FP6",
"product": {
"name": "Cognos Analytics",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "Sterling Transformation Extender version 10.1.1.1 sans le correctif de s\u00e9curit\u00e9 \n APAR PH67014",
"product": {
"name": "Sterling",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "Sterling Transformation Extender version 11.0.0.0 sans le correctif de s\u00e9curit\u00e9 \n APAR PH67014",
"product": {
"name": "Sterling",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "Sterling Transformation Extender version 10.1.0.2 sans le correctif de s\u00e9curit\u00e9 \n APAR PH67014",
"product": {
"name": "Sterling",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "Cognos Analytics versions 12.0.x ant\u00e9rieures \u00e0 12.0.4 FP1",
"product": {
"name": "Cognos Analytics",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "Sterling Transformation Extender version 10.1.2.1 sans le correctif de s\u00e9curit\u00e9 \n APAR PH67014",
"product": {
"name": "Sterling",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "Informix Dynamic Server versions 14.10.x ant\u00e9rieures \u00e0 14.10.xC11W2",
"product": {
"name": "Informix Dynamic Server",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "Sterling Connect:Direct File Agent versions 1.4.0.x ant\u00e9rieures \u00e0 1.4.0.4",
"product": {
"name": "Sterling Connect:Direct",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "Sterling Transformation Extender versions 11.0.1.x ant\u00e9rieures \u00e0 11.0.1.1 sans le correctif de s\u00e9curit\u00e9 \n APAR PH67016",
"product": {
"name": "Sterling",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "DB2 Data Management Console pour CPD versions ant\u00e9rieures \u00e0 5.1.2",
"product": {
"name": "Db2",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "Informix Dynamic Server versions 12.10.x ant\u00e9rieures \u00e0 12.10.xC16W2",
"product": {
"name": "Informix Dynamic Server",
"vendor": {
"name": "IBM",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2024-21235",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21235"
},
{
"name": "CVE-2025-4447",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4447"
},
{
"name": "CVE-2024-21144",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21144"
},
{
"name": "CVE-2021-43816",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-43816"
},
{
"name": "CVE-2024-21534",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21534"
},
{
"name": "CVE-2025-24970",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24970"
},
{
"name": "CVE-2022-32149",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32149"
},
{
"name": "CVE-2024-10917",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-10917"
},
{
"name": "CVE-2025-1302",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1302"
},
{
"name": "CVE-2025-27152",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27152"
},
{
"name": "CVE-2025-21587",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21587"
},
{
"name": "CVE-2024-7254",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-7254"
},
{
"name": "CVE-2024-52900",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-52900"
},
{
"name": "CVE-2024-47535",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47535"
},
{
"name": "CVE-2025-30698",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30698"
},
{
"name": "CVE-2024-27289",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27289"
},
{
"name": "CVE-2022-41721",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41721"
},
{
"name": "CVE-2025-25193",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-25193"
},
{
"name": "CVE-2024-21145",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21145"
},
{
"name": "CVE-2024-4741",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4741"
},
{
"name": "CVE-2025-2900",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-2900"
},
{
"name": "CVE-2025-1991",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1991"
},
{
"name": "CVE-2022-23648",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23648"
},
{
"name": "CVE-2023-39325",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39325"
},
{
"name": "CVE-2024-21131",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21131"
},
{
"name": "CVE-2024-21210",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21210"
},
{
"name": "CVE-2024-2511",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2511"
},
{
"name": "CVE-2022-21698",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21698"
},
{
"name": "CVE-2024-21217",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21217"
},
{
"name": "CVE-2024-27267",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27267"
},
{
"name": "CVE-2022-27664",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27664"
},
{
"name": "CVE-2024-21208",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21208"
}
],
"initial_release_date": "2025-07-04T00:00:00",
"last_revision_date": "2025-07-04T00:00:00",
"links": [],
"reference": "CERTFR-2025-AVI-0562",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2025-07-04T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Injection de code indirecte \u00e0 distance (XSS)"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Injection SQL (SQLi)"
},
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
},
{
"description": "Falsification de requ\u00eates c\u00f4t\u00e9 serveur (SSRF)"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits IBM. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire \u00e0 distance, un d\u00e9ni de service \u00e0 distance et une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits IBM",
"vendor_advisories": [
{
"published_at": "2025-06-28",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7238455",
"url": "https://www.ibm.com/support/pages/node/7238455"
},
{
"published_at": "2025-07-02",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7238755",
"url": "https://www.ibm.com/support/pages/node/7238755"
},
{
"published_at": "2025-07-03",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7238833",
"url": "https://www.ibm.com/support/pages/node/7238833"
},
{
"published_at": "2025-07-03",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7238824",
"url": "https://www.ibm.com/support/pages/node/7238824"
},
{
"published_at": "2025-07-03",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7238831",
"url": "https://www.ibm.com/support/pages/node/7238831"
},
{
"published_at": "2025-07-03",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7238826",
"url": "https://www.ibm.com/support/pages/node/7238826"
},
{
"published_at": "2025-07-03",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7238830",
"url": "https://www.ibm.com/support/pages/node/7238830"
},
{
"published_at": "2025-07-02",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7238753",
"url": "https://www.ibm.com/support/pages/node/7238753"
},
{
"published_at": "2025-06-27",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7238163",
"url": "https://www.ibm.com/support/pages/node/7238163"
}
]
}
CERTFR-2025-AVI-0590
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans les produits IBM. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, une élévation de privilèges et un déni de service à distance.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| IBM | Sterling | Sterling Connect:Direct Web Services versions 6.3.0.x antérieures à 6.3.0.14 | ||
| IBM | Tivoli | Tivoli Composite Application Manager for Applications WebSphere MQ Monitoring Agent version 7.3.0 Fix Pack 4 sans le dernier correctif de sécurité | ||
| IBM | Sterling | Sterling External Authentication Server versions 6.1.0.x antérieures à 6.1.0.2 iFix 03 | ||
| IBM | Db2 | DB2 Data Management Console on CPD versions 4.7.1 antérieures à 4.7.2 | ||
| IBM | Db2 | DB2 Data Management Console versions 3.1.11 à 3.1.13.x antérieures à 3.1.13.1 | ||
| IBM | QRadar | QRadar SIEM versions 7.5.0 sans le dernier correctif de sécurité | ||
| IBM | Tivoli | Tivoli Composite Application Manager for Application Diagnostics version 7.1.0 sans le dernier correctif de sécurité | ||
| IBM | Sterling | Sterling Connect:Direct Web Services versions 6.4.0.x antérieures à 6.4.0.3 | ||
| IBM | WebSphere | WebSphere Hybrid Edition versions 5.1 sans le correctif de sécurité PH66674 | ||
| IBM | Sterling | Sterling Connect:Direct Web Services versions 6.2.0.x antérieures à 6.2.0.28 |
| Title | Publication Time | Tags | ||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Sterling Connect:Direct Web Services versions 6.3.0.x ant\u00e9rieures \u00e0 6.3.0.14",
"product": {
"name": "Sterling",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "Tivoli Composite Application Manager for Applications WebSphere MQ Monitoring Agent version 7.3.0 Fix Pack 4 sans le dernier correctif de s\u00e9curit\u00e9",
"product": {
"name": "Tivoli",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "Sterling External Authentication Server versions 6.1.0.x ant\u00e9rieures \u00e0 6.1.0.2 iFix 03",
"product": {
"name": "Sterling",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "DB2 Data Management Console on CPD versions 4.7.1 ant\u00e9rieures \u00e0 4.7.2",
"product": {
"name": "Db2",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "DB2 Data Management Console versions 3.1.11 \u00e0 3.1.13.x ant\u00e9rieures \u00e0 3.1.13.1",
"product": {
"name": "Db2",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "QRadar SIEM versions 7.5.0 sans le dernier correctif de s\u00e9curit\u00e9",
"product": {
"name": "QRadar",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "Tivoli Composite Application Manager for Application Diagnostics version 7.1.0 sans le dernier correctif de s\u00e9curit\u00e9",
"product": {
"name": "Tivoli",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "Sterling Connect:Direct Web Services versions 6.4.0.x ant\u00e9rieures \u00e0 6.4.0.3",
"product": {
"name": "Sterling",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "WebSphere Hybrid Edition versions 5.1 sans le correctif de s\u00e9curit\u00e9 PH66674",
"product": {
"name": "WebSphere",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "Sterling Connect:Direct Web Services versions 6.2.0.x ant\u00e9rieures \u00e0 6.2.0.28",
"product": {
"name": "Sterling",
"vendor": {
"name": "IBM",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2025-4447",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4447"
},
{
"name": "CVE-2022-29162",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29162"
},
{
"name": "CVE-2020-13956",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-13956"
},
{
"name": "CVE-2021-43816",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-43816"
},
{
"name": "CVE-2023-21830",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21830"
},
{
"name": "CVE-2023-27561",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27561"
},
{
"name": "CVE-2022-31030",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-31030"
},
{
"name": "CVE-2021-35516",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35516"
},
{
"name": "CVE-2022-32149",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32149"
},
{
"name": "CVE-2019-19921",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19921"
},
{
"name": "CVE-2021-35517",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35517"
},
{
"name": "CVE-2021-36090",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-36090"
},
{
"name": "CVE-2021-43784",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-43784"
},
{
"name": "CVE-2021-32760",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32760"
},
{
"name": "CVE-2023-25173",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-25173"
},
{
"name": "CVE-2024-45296",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45296"
},
{
"name": "CVE-2025-21587",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21587"
},
{
"name": "CVE-2023-25809",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-25809"
},
{
"name": "CVE-2024-25710",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-25710"
},
{
"name": "CVE-2023-25153",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-25153"
},
{
"name": "CVE-2023-33850",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-33850"
},
{
"name": "CVE-2025-30698",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30698"
},
{
"name": "CVE-2022-41721",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41721"
},
{
"name": "CVE-2023-28642",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28642"
},
{
"name": "CVE-2022-23471",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23471"
},
{
"name": "CVE-2025-2900",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-2900"
},
{
"name": "CVE-2022-41723",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41723"
},
{
"name": "CVE-2021-35515",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35515"
},
{
"name": "CVE-2022-23648",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23648"
},
{
"name": "CVE-2021-41103",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-41103"
},
{
"name": "CVE-2025-36038",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-36038"
},
{
"name": "CVE-2022-27664",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27664"
},
{
"name": "CVE-2016-1000027",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1000027"
}
],
"initial_release_date": "2025-07-11T00:00:00",
"last_revision_date": "2025-07-11T00:00:00",
"links": [],
"reference": "CERTFR-2025-AVI-0590",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2025-07-11T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits IBM. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire \u00e0 distance, une \u00e9l\u00e9vation de privil\u00e8ges et un d\u00e9ni de service \u00e0 distance.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits IBM",
"vendor_advisories": [
{
"published_at": "2025-07-08",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7239103",
"url": "https://www.ibm.com/support/pages/node/7239103"
},
{
"published_at": "2025-07-07",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7239009",
"url": "https://www.ibm.com/support/pages/node/7239009"
},
{
"published_at": "2025-07-08",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7239143",
"url": "https://www.ibm.com/support/pages/node/7239143"
},
{
"published_at": "2025-07-09",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7239362",
"url": "https://www.ibm.com/support/pages/node/7239362"
},
{
"published_at": "2025-07-11",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7239476",
"url": "https://www.ibm.com/support/pages/node/7239476"
},
{
"published_at": "2025-07-09",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7239247",
"url": "https://www.ibm.com/support/pages/node/7239247"
},
{
"published_at": "2025-07-08",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7239178",
"url": "https://www.ibm.com/support/pages/node/7239178"
},
{
"published_at": "2025-07-11",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7239475",
"url": "https://www.ibm.com/support/pages/node/7239475"
}
]
}
CERTFR-2024-AVI-0145
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans les produits IBM. Certaines d'entre elles permettent à un attaquant de provoquer une atteinte à la confidentialité des données, une exécution de code arbitraire à distance et une élévation de privilèges.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| IBM | Db2 | IBM Cloud APM, Advanced Private versions 8.1.4 sans le dernier correctif de sécurité Fixpack cumulatif Db2 | ||
| IBM | QRadar Suite Software | QRadar Suite Software versions 1.10.x.x antérieures à 1.10.18.0 | ||
| IBM | N/A | IBM Db2 sur Cloud Pak pour Data et Db2 Warehouse sur Cloud Pak for Data versions antérieures à v4.8.2 | ||
| IBM | QRadar SIEM | IBM QRadar SIEM versions 7.5.x antérieures à 7.5.0 UP7 IF05 | ||
| IBM | QRadar | IBM QRadar Use Case Manager App versions antérieures à 3.9.0 | ||
| IBM | WebSphere | IBM WebSphere Application Server versions 8.5.x.x sans le SDK version 8 Service Refresh 8 FP20 | ||
| IBM | WebSphere | IBM WebSphere Application Server Liberty sans le SDK version 8 Service Refresh 8 FP20 | ||
| IBM | Sterling Connect:Direct | IBM Sterling Connect:Direct Web Services versions 6.1.x.x antérieures à 6.1.0.23 | ||
| IBM | Sterling Connect:Direct | IBM Sterling Connect:Direct Web Services versions 6.3.x.x antérieures à 6.3.0.6 | ||
| IBM | Sterling Connect:Direct | IBM Sterling Connect:Direct Web Services versions 6.2.x.x antérieures à 6.2.0.22 | ||
| IBM | Db2 | IBM Cloud APM, Base Private versions 8.1.4 sans le dernier correctif de sécurité Fixpack cumulatif Db2 | ||
| IBM | Cloud Pak | IBM Cloud Pak for Security versions 1.10.x.x antérieures à 1.10.18.0 | ||
| IBM | Spectrum | IBM Spectrum Scale versions 5.1.x.x antérieures à 5.1.2.15 | ||
| IBM | WebSphere | IBM WebSphere Application Server versions 9.x sans le SDK version 8 Service Refresh 8 FP20 | ||
| IBM | QRadar WinCollect Agent | IBM QRadar WinCollect Agent versions 10.0.x antérieures à 10.1.9 | ||
| IBM | Spectrum | IBM Spectrum Scale versions 5.1.3.x antérieures à 5.1.9.2 |
| Title | Publication Time | Tags | |||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "IBM Cloud APM, Advanced Private versions 8.1.4 sans le dernier correctif de s\u00e9curit\u00e9 Fixpack cumulatif Db2",
"product": {
"name": "Db2",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "QRadar Suite Software versions 1.10.x.x ant\u00e9rieures \u00e0 1.10.18.0",
"product": {
"name": "QRadar Suite Software",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "IBM Db2 sur Cloud Pak pour Data et Db2 Warehouse sur Cloud Pak for Data versions ant\u00e9rieures \u00e0 v4.8.2",
"product": {
"name": "N/A",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "IBM QRadar SIEM versions 7.5.x ant\u00e9rieures \u00e0 7.5.0 UP7 IF05",
"product": {
"name": "QRadar SIEM",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "IBM QRadar Use Case Manager App versions ant\u00e9rieures \u00e0 3.9.0",
"product": {
"name": "QRadar",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "IBM WebSphere Application Server versions 8.5.x.x sans le SDK version 8 Service Refresh 8 FP20",
"product": {
"name": "WebSphere",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "IBM WebSphere Application Server Liberty sans le SDK version 8 Service Refresh 8 FP20",
"product": {
"name": "WebSphere",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "IBM Sterling Connect:Direct Web Services versions 6.1.x.x ant\u00e9rieures \u00e0 6.1.0.23",
"product": {
"name": "Sterling Connect:Direct",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "IBM Sterling Connect:Direct Web Services versions 6.3.x.x ant\u00e9rieures \u00e0 6.3.0.6",
"product": {
"name": "Sterling Connect:Direct",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "IBM Sterling Connect:Direct Web Services versions 6.2.x.x ant\u00e9rieures \u00e0 6.2.0.22",
"product": {
"name": "Sterling Connect:Direct",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "IBM Cloud APM, Base Private versions 8.1.4 sans le dernier correctif de s\u00e9curit\u00e9 Fixpack cumulatif Db2",
"product": {
"name": "Db2",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "IBM Cloud Pak for Security versions 1.10.x.x ant\u00e9rieures \u00e0 1.10.18.0",
"product": {
"name": "Cloud Pak",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "IBM Spectrum Scale versions 5.1.x.x ant\u00e9rieures \u00e0 5.1.2.15",
"product": {
"name": "Spectrum",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "IBM WebSphere Application Server versions 9.x sans le SDK version 8 Service Refresh 8 FP20",
"product": {
"name": "WebSphere",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "IBM QRadar WinCollect Agent versions 10.0.x ant\u00e9rieures \u00e0 10.1.9",
"product": {
"name": "QRadar WinCollect Agent",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "IBM Spectrum Scale versions 5.1.3.x ant\u00e9rieures \u00e0 5.1.9.2",
"product": {
"name": "Spectrum",
"vendor": {
"name": "IBM",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2015-8385",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-8385"
},
{
"name": "CVE-2015-8388",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-8388"
},
{
"name": "CVE-2015-8392",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-8392"
},
{
"name": "CVE-2015-2327",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-2327"
},
{
"name": "CVE-2015-8394",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-8394"
},
{
"name": "CVE-2015-8395",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-8395"
},
{
"name": "CVE-2015-8387",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-8387"
},
{
"name": "CVE-2015-8391",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-8391"
},
{
"name": "CVE-2015-8383",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-8383"
},
{
"name": "CVE-2015-8390",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-8390"
},
{
"name": "CVE-2015-8381",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-8381"
},
{
"name": "CVE-2015-8386",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-8386"
},
{
"name": "CVE-2015-2328",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-2328"
},
{
"name": "CVE-2020-14155",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14155"
},
{
"name": "CVE-2021-31525",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-31525"
},
{
"name": "CVE-2021-3712",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3712"
},
{
"name": "CVE-2021-3711",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3711"
},
{
"name": "CVE-2021-22926",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22926"
},
{
"name": "CVE-2021-22947",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22947"
},
{
"name": "CVE-2021-22946",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22946"
},
{
"name": "CVE-2021-36221",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-36221"
},
{
"name": "CVE-2021-29923",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-29923"
},
{
"name": "CVE-2021-33197",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33197"
},
{
"name": "CVE-2021-34558",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-34558"
},
{
"name": "CVE-2021-33195",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33195"
},
{
"name": "CVE-2021-4160",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4160"
},
{
"name": "CVE-2021-44716",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-44716"
},
{
"name": "CVE-2021-41772",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-41772"
},
{
"name": "CVE-2021-41771",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-41771"
},
{
"name": "CVE-2022-3602",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3602"
},
{
"name": "CVE-2022-37434",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-37434"
},
{
"name": "CVE-2022-30633",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30633"
},
{
"name": "CVE-2022-1705",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1705"
},
{
"name": "CVE-2022-27664",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27664"
},
{
"name": "CVE-2022-28131",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28131"
},
{
"name": "CVE-2022-32148",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32148"
},
{
"name": "CVE-2022-32189",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32189"
},
{
"name": "CVE-2022-1962",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1962"
},
{
"name": "CVE-2022-30635",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30635"
},
{
"name": "CVE-2022-32149",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32149"
},
{
"name": "CVE-2022-30631",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30631"
},
{
"name": "CVE-2022-30632",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30632"
},
{
"name": "CVE-2022-30630",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30630"
},
{
"name": "CVE-2022-3786",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3786"
},
{
"name": "CVE-2022-3515",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3515"
},
{
"name": "CVE-2022-32206",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32206"
},
{
"name": "CVE-2018-25032",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-25032"
},
{
"name": "CVE-2021-22925",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22925"
},
{
"name": "CVE-2021-22923",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22923"
},
{
"name": "CVE-2021-22922",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22922"
},
{
"name": "CVE-2022-23773",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23773"
},
{
"name": "CVE-2022-23772",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23772"
},
{
"name": "CVE-2022-23806",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23806"
},
{
"name": "CVE-2022-0778",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0778"
},
{
"name": "CVE-2022-24921",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-24921"
},
{
"name": "CVE-2022-1292",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1292"
},
{
"name": "CVE-2021-39293",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-39293"
},
{
"name": "CVE-2021-33196",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33196"
},
{
"name": "CVE-2022-22576",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22576"
},
{
"name": "CVE-2022-27776",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27776"
},
{
"name": "CVE-2022-2068",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2068"
},
{
"name": "CVE-2021-27918",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-27918"
},
{
"name": "CVE-2021-41190",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-41190"
},
{
"name": "CVE-2021-33194",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33194"
},
{
"name": "CVE-2022-2097",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2097"
},
{
"name": "CVE-2022-28327",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28327"
},
{
"name": "CVE-2022-24675",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-24675"
},
{
"name": "CVE-2022-27782",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27782"
},
{
"name": "CVE-2022-32208",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32208"
},
{
"name": "CVE-2022-27781",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27781"
},
{
"name": "CVE-2022-3171",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3171"
},
{
"name": "CVE-2022-43548",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43548"
},
{
"name": "CVE-2022-32221",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32221"
},
{
"name": "CVE-2022-35252",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-35252"
},
{
"name": "CVE-2022-43552",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43552"
},
{
"name": "CVE-2022-4304",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4304"
},
{
"name": "CVE-2023-0286",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0286"
},
{
"name": "CVE-2023-0215",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0215"
},
{
"name": "CVE-2022-4450",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4450"
},
{
"name": "CVE-2022-25881",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-25881"
},
{
"name": "CVE-2023-23916",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23916"
},
{
"name": "CVE-2022-29244",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29244"
},
{
"name": "CVE-2022-41717",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41717"
},
{
"name": "CVE-2022-3509",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3509"
},
{
"name": "CVE-2023-0464",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0464"
},
{
"name": "CVE-2022-2879",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2879"
},
{
"name": "CVE-2022-41715",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41715"
},
{
"name": "CVE-2022-2880",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2880"
},
{
"name": "CVE-2022-41716",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41716"
},
{
"name": "CVE-2023-0466",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0466"
},
{
"name": "CVE-2023-0465",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0465"
},
{
"name": "CVE-2022-30629",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30629"
},
{
"name": "CVE-2022-41723",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41723"
},
{
"name": "CVE-2022-30580",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30580"
},
{
"name": "CVE-2022-41725",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41725"
},
{
"name": "CVE-2022-41724",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41724"
},
{
"name": "CVE-2022-24999",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-24999"
},
{
"name": "CVE-2023-21937",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21937"
},
{
"name": "CVE-2023-21939",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21939"
},
{
"name": "CVE-2023-21967",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21967"
},
{
"name": "CVE-2023-21930",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21930"
},
{
"name": "CVE-2023-23918",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23918"
},
{
"name": "CVE-2023-21968",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21968"
},
{
"name": "CVE-2023-21938",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21938"
},
{
"name": "CVE-2023-21954",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21954"
},
{
"name": "CVE-2020-8244",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8244"
},
{
"name": "CVE-2023-23920",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23920"
},
{
"name": "CVE-2023-23919",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23919"
},
{
"name": "CVE-2023-23936",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23936"
},
{
"name": "CVE-2023-24532",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24532"
},
{
"name": "CVE-2023-24537",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24537"
},
{
"name": "CVE-2023-32360",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32360"
},
{
"name": "CVE-2023-2650",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2650"
},
{
"name": "CVE-2023-1370",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1370"
},
{
"name": "CVE-2023-2597",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2597"
},
{
"name": "CVE-2023-24536",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24536"
},
{
"name": "CVE-2023-24538",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24538"
},
{
"name": "CVE-2023-28322",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28322"
},
{
"name": "CVE-2023-28320",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28320"
},
{
"name": "CVE-2023-28321",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28321"
},
{
"name": "CVE-2023-24540",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24540"
},
{
"name": "CVE-2023-29400",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29400"
},
{
"name": "CVE-2023-24539",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24539"
},
{
"name": "CVE-2023-3446",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3446"
},
{
"name": "CVE-2023-28319",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28319"
},
{
"name": "CVE-2023-20593",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-20593"
},
{
"name": "CVE-2023-3611",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3611"
},
{
"name": "CVE-2022-40982",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40982"
},
{
"name": "CVE-2023-20569",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-20569"
},
{
"name": "CVE-2023-29404",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29404"
},
{
"name": "CVE-2023-29402",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29402"
},
{
"name": "CVE-2023-29403",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29403"
},
{
"name": "CVE-2023-29405",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29405"
},
{
"name": "CVE-2023-3776",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3776"
},
{
"name": "CVE-2023-4128",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4128"
},
{
"name": "CVE-2021-33198",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33198"
},
{
"name": "CVE-2022-3510",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3510"
},
{
"name": "CVE-2023-2976",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2976"
},
{
"name": "CVE-2021-38297",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-38297"
},
{
"name": "CVE-2022-25883",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-25883"
},
{
"name": "CVE-2023-37920",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-37920"
},
{
"name": "CVE-2023-26048",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-26048"
},
{
"name": "CVE-2023-26049",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-26049"
},
{
"name": "CVE-2023-4206",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4206"
},
{
"name": "CVE-2023-4208",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4208"
},
{
"name": "CVE-2023-4207",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4207"
},
{
"name": "CVE-2023-29409",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29409"
},
{
"name": "CVE-2023-29406",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29406"
},
{
"name": "CVE-2023-32681",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32681"
},
{
"name": "CVE-2023-44487",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-44487"
},
{
"name": "CVE-2023-45648",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45648"
},
{
"name": "CVE-2023-42795",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-42795"
},
{
"name": "CVE-2023-30991",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-30991"
},
{
"name": "CVE-2022-48339",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48339"
},
{
"name": "CVE-2023-33850",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-33850"
},
{
"name": "CVE-2023-39976",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39976"
},
{
"name": "CVE-2023-38325",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38325"
},
{
"name": "CVE-2023-22081",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22081"
},
{
"name": "CVE-2023-38546",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38546"
},
{
"name": "CVE-2023-38545",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38545"
},
{
"name": "CVE-2023-34462",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34462"
},
{
"name": "CVE-2023-5363",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5363"
},
{
"name": "CVE-2023-32002",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32002"
},
{
"name": "CVE-2023-4807",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4807"
},
{
"name": "CVE-2023-5678",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5678"
},
{
"name": "CVE-2023-45803",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45803"
},
{
"name": "CVE-2023-44270",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-44270"
},
{
"name": "CVE-2020-15586",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-15586"
},
{
"name": "CVE-2020-28362",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-28362"
},
{
"name": "CVE-2020-14039",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14039"
},
{
"name": "CVE-2020-16845",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-16845"
},
{
"name": "CVE-2021-3114",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3114"
},
{
"name": "CVE-2020-24553",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-24553"
},
{
"name": "CVE-2020-28366",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-28366"
},
{
"name": "CVE-2020-28367",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-28367"
},
{
"name": "CVE-2023-34054",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34054"
},
{
"name": "CVE-2023-34053",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34053"
},
{
"name": "CVE-2023-34055",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34055"
},
{
"name": "CVE-2023-46589",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-46589"
},
{
"name": "CVE-2023-43642",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-43642"
},
{
"name": "CVE-2002-0059",
"url": "https://www.cve.org/CVERecord?id=CVE-2002-0059"
},
{
"name": "CVE-2023-38003",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38003"
},
{
"name": "CVE-2023-32731",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32731"
},
{
"name": "CVE-2023-45133",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45133"
},
{
"name": "CVE-2015-8393",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-8393"
},
{
"name": "CVE-2020-19909",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-19909"
},
{
"name": "CVE-2023-30987",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-30987"
},
{
"name": "CVE-2023-38719",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38719"
},
{
"name": "CVE-2023-40374",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40374"
},
{
"name": "CVE-2023-38728",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38728"
},
{
"name": "CVE-2023-38720",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38720"
},
{
"name": "CVE-2023-38740",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38740"
},
{
"name": "CVE-2023-40372",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40372"
},
{
"name": "CVE-2023-40373",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40373"
},
{
"name": "CVE-2023-47145",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-47145"
},
{
"name": "CVE-2024-20918",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20918"
},
{
"name": "CVE-2024-20945",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20945"
},
{
"name": "CVE-2024-20952",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20952"
},
{
"name": "CVE-2024-20921",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20921"
},
{
"name": "CVE-2023-39323",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39323"
},
{
"name": "CVE-2023-45857",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45857"
},
{
"name": "CVE-2023-5676",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5676"
},
{
"name": "CVE-2023-46308",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-46308"
},
{
"name": "CVE-2023-32006",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32006"
},
{
"name": "CVE-2023-32559",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32559"
},
{
"name": "CVE-2023-24534",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24534"
},
{
"name": "CVE-2023-6129",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6129"
},
{
"name": "CVE-2022-23541",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23541"
},
{
"name": "CVE-2022-36046",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-36046"
},
{
"name": "CVE-2023-40692",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40692"
},
{
"name": "CVE-2023-44981",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-44981"
},
{
"name": "CVE-2023-38727",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38727"
},
{
"name": "CVE-2023-45142",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45142"
},
{
"name": "CVE-2022-48337",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48337"
},
{
"name": "CVE-2023-47627",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-47627"
},
{
"name": "CVE-2023-47701",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-47701"
},
{
"name": "CVE-2023-49081",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-49081"
},
{
"name": "CVE-2023-26159",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-26159"
},
{
"name": "CVE-2023-29258",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29258"
},
{
"name": "CVE-2023-39332",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39332"
},
{
"name": "CVE-2023-46218",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-46218"
},
{
"name": "CVE-2024-22190",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-22190"
},
{
"name": "CVE-2023-4586",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4586"
},
{
"name": "CVE-2023-43020",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-43020"
},
{
"name": "CVE-2023-37276",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-37276"
},
{
"name": "CVE-2023-47152",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-47152"
},
{
"name": "CVE-2023-49082",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-49082"
},
{
"name": "CVE-2023-46219",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-46219"
},
{
"name": "CVE-2023-47141",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-47141"
},
{
"name": "CVE-2023-39318",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39318"
},
{
"name": "CVE-2023-38552",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38552"
},
{
"name": "CVE-2023-46167",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-46167"
},
{
"name": "CVE-2023-27859",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27859"
},
{
"name": "CVE-2023-47158",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-47158"
},
{
"name": "CVE-2023-36665",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-36665"
},
{
"name": "CVE-2022-23529",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23529"
},
{
"name": "CVE-2023-40687",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40687"
},
{
"name": "CVE-2022-23539",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23539"
},
{
"name": "CVE-2023-6681",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6681"
},
{
"name": "CVE-2022-23540",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23540"
},
{
"name": "CVE-2023-46234",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-46234"
},
{
"name": "CVE-2023-50308",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-50308"
},
{
"name": "CVE-2023-39331",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39331"
},
{
"name": "CVE-2023-45178",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45178"
},
{
"name": "CVE-2023-45193",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45193"
},
{
"name": "CVE-2023-39319",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39319"
},
{
"name": "CVE-2020-29510",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-29510"
},
{
"name": "CVE-2023-47746",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-47746"
},
{
"name": "CVE-2023-34062",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34062"
},
{
"name": "CVE-2023-47747",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-47747"
},
{
"name": "CVE-2024-0727",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0727"
},
{
"name": "CVE-2023-46158",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-46158"
},
{
"name": "CVE-2023-26115",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-26115"
}
],
"initial_release_date": "2024-02-16T00:00:00",
"last_revision_date": "2024-02-16T00:00:00",
"links": [],
"reference": "CERTFR-2024-AVI-0145",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2024-02-16T00:00:00.000000"
}
],
"risks": [
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "D\u00e9ni de service"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Injection de requ\u00eates ill\u00e9gitimes par rebond (CSRF)"
},
{
"description": "Injection de code indirecte \u00e0 distance (XSS)"
},
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans \u003cspan\nclass=\"textit\"\u003eles produits IBM\u003c/span\u003e. Certaines d\u0027entre elles\npermettent \u00e0 un attaquant de provoquer une atteinte \u00e0 la confidentialit\u00e9\ndes donn\u00e9es, une ex\u00e9cution de code arbitraire \u00e0 distance et une\n\u00e9l\u00e9vation de privil\u00e8ges.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits IBM",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7117872 du 14 f\u00e9vrier 2024",
"url": "https://www.ibm.com/support/pages/node/7117872"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7118592 du 16 f\u00e9vrier 2024",
"url": "https://www.ibm.com/support/pages/node/7118592"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7117873 du 14 f\u00e9vrier 2024",
"url": "https://www.ibm.com/support/pages/node/7117873"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7118289 du 15 f\u00e9vrier 2024",
"url": "https://www.ibm.com/support/pages/node/7118289"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7118351 du 15 f\u00e9vrier 2024",
"url": "https://www.ibm.com/support/pages/node/7118351"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7117821 du 14 f\u00e9vrier 2024",
"url": "https://www.ibm.com/support/pages/node/7117821"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7117883 du 14 f\u00e9vrier 2024",
"url": "https://www.ibm.com/support/pages/node/7117883"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7117881 du 14 f\u00e9vrier 2024",
"url": "https://www.ibm.com/support/pages/node/7117881"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7117884 du 14 f\u00e9vrier 2024",
"url": "https://www.ibm.com/support/pages/node/7117884"
}
]
}
wid-sec-w-2024-0794
Vulnerability from csaf_certbund
Notes
{
"document": {
"aggregate_severity": {
"text": "hoch"
},
"category": "csaf_base",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "de-DE",
"notes": [
{
"category": "legal_disclaimer",
"text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
},
{
"category": "description",
"text": "Dell ECS ist ein Objektspeichersystem.",
"title": "Produktbeschreibung"
},
{
"category": "summary",
"text": "Ein Angreifer kann mehrere Schwachstellen in Dell ECS ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren.",
"title": "Angriff"
},
{
"category": "general",
"text": "- Linux\n- UNIX\n- Windows",
"title": "Betroffene Betriebssysteme"
}
],
"publisher": {
"category": "other",
"contact_details": "csaf-provider@cert-bund.de",
"name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"namespace": "https://www.bsi.bund.de"
},
"references": [
{
"category": "self",
"summary": "WID-SEC-W-2024-0794 - CSAF Version",
"url": "https://wid.cert-bund.de/.well-known/csaf/white/2024/wid-sec-w-2024-0794.json"
},
{
"category": "self",
"summary": "WID-SEC-2024-0794 - Portal Version",
"url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2024-0794"
},
{
"category": "external",
"summary": "Dell Security Advisory DSA-2024-141 vom 2024-04-04",
"url": "https://www.dell.com/support/kbdoc/000223839/dsa-2024-="
}
],
"source_lang": "en-US",
"title": "Dell ECS: Mehrere Schwachstellen",
"tracking": {
"current_release_date": "2024-11-27T23:00:00.000+00:00",
"generator": {
"date": "2024-11-28T11:39:04.623+00:00",
"engine": {
"name": "BSI-WID",
"version": "1.3.8"
}
},
"id": "WID-SEC-W-2024-0794",
"initial_release_date": "2024-04-04T22:00:00.000+00:00",
"revision_history": [
{
"date": "2024-04-04T22:00:00.000+00:00",
"number": "1",
"summary": "Initiale Fassung"
},
{
"date": "2024-11-27T23:00:00.000+00:00",
"number": "2",
"summary": "Produktzuordnung \u00fcberpr\u00fcft"
}
],
"status": "final",
"version": "2"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c3.8.1.0",
"product": {
"name": "Dell ECS \u003c3.8.1.0",
"product_id": "T033919"
}
},
{
"category": "product_version",
"name": "3.8.1.0",
"product": {
"name": "Dell ECS 3.8.1.0",
"product_id": "T033919-fixed",
"product_identification_helper": {
"cpe": "cpe:/h:dell:ecs:3.8.1.0"
}
}
}
],
"category": "product_name",
"name": "ECS"
}
],
"category": "vendor",
"name": "Dell"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2018-18074",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2018-18074"
},
{
"cve": "CVE-2020-10663",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2020-10663"
},
{
"cve": "CVE-2020-10672",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2020-10672"
},
{
"cve": "CVE-2020-10673",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2020-10673"
},
{
"cve": "CVE-2020-10735",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2020-10735"
},
{
"cve": "CVE-2020-10968",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2020-10968"
},
{
"cve": "CVE-2020-10969",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2020-10969"
},
{
"cve": "CVE-2020-11111",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2020-11111"
},
{
"cve": "CVE-2020-11112",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2020-11112"
},
{
"cve": "CVE-2020-11113",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2020-11113"
},
{
"cve": "CVE-2020-11612",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2020-11612"
},
{
"cve": "CVE-2020-11619",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2020-11619"
},
{
"cve": "CVE-2020-11620",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2020-11620"
},
{
"cve": "CVE-2020-11979",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2020-11979"
},
{
"cve": "CVE-2020-12762",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2020-12762"
},
{
"cve": "CVE-2020-12825",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2020-12825"
},
{
"cve": "CVE-2020-13956",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2020-13956"
},
{
"cve": "CVE-2020-14060",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2020-14060"
},
{
"cve": "CVE-2020-14061",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2020-14061"
},
{
"cve": "CVE-2020-14062",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2020-14062"
},
{
"cve": "CVE-2020-14195",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2020-14195"
},
{
"cve": "CVE-2020-15250",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2020-15250"
},
{
"cve": "CVE-2020-1945",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2020-1945"
},
{
"cve": "CVE-2020-1967",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2020-1967"
},
{
"cve": "CVE-2020-1971",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2020-1971"
},
{
"cve": "CVE-2020-24616",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2020-24616"
},
{
"cve": "CVE-2020-24750",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2020-24750"
},
{
"cve": "CVE-2020-25649",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2020-25649"
},
{
"cve": "CVE-2020-25658",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2020-25658"
},
{
"cve": "CVE-2020-26116",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2020-26116"
},
{
"cve": "CVE-2020-26137",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2020-26137"
},
{
"cve": "CVE-2020-26541",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2020-26541"
},
{
"cve": "CVE-2020-27216",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2020-27216"
},
{
"cve": "CVE-2020-27218",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2020-27218"
},
{
"cve": "CVE-2020-27223",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2020-27223"
},
{
"cve": "CVE-2020-28366",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2020-28366"
},
{
"cve": "CVE-2020-28493",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2020-28493"
},
{
"cve": "CVE-2020-29509",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2020-29509"
},
{
"cve": "CVE-2020-29511",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2020-29511"
},
{
"cve": "CVE-2020-29582",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2020-29582"
},
{
"cve": "CVE-2020-29651",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2020-29651"
},
{
"cve": "CVE-2020-35490",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2020-35490"
},
{
"cve": "CVE-2020-35491",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2020-35491"
},
{
"cve": "CVE-2020-35728",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2020-35728"
},
{
"cve": "CVE-2020-36179",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2020-36179"
},
{
"cve": "CVE-2020-36180",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2020-36180"
},
{
"cve": "CVE-2020-36181",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2020-36181"
},
{
"cve": "CVE-2020-36182",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2020-36182"
},
{
"cve": "CVE-2020-36183",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2020-36183"
},
{
"cve": "CVE-2020-36184",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2020-36184"
},
{
"cve": "CVE-2020-36185",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2020-36185"
},
{
"cve": "CVE-2020-36186",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2020-36186"
},
{
"cve": "CVE-2020-36187",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2020-36187"
},
{
"cve": "CVE-2020-36188",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2020-36188"
},
{
"cve": "CVE-2020-36189",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2020-36189"
},
{
"cve": "CVE-2020-36516",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2020-36516"
},
{
"cve": "CVE-2020-36518",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2020-36518"
},
{
"cve": "CVE-2020-36557",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2020-36557"
},
{
"cve": "CVE-2020-36558",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2020-36558"
},
{
"cve": "CVE-2020-36691",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2020-36691"
},
{
"cve": "CVE-2020-7238",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2020-7238"
},
{
"cve": "CVE-2020-8840",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2020-8840"
},
{
"cve": "CVE-2020-8908",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2020-8908"
},
{
"cve": "CVE-2020-8911",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2020-8911"
},
{
"cve": "CVE-2020-8912",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2020-8912"
},
{
"cve": "CVE-2020-9488",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2020-9488"
},
{
"cve": "CVE-2020-9493",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2020-9493"
},
{
"cve": "CVE-2020-9546",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2020-9546"
},
{
"cve": "CVE-2020-9547",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2020-9547"
},
{
"cve": "CVE-2020-9548",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2020-9548"
},
{
"cve": "CVE-2021-20190",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-20190"
},
{
"cve": "CVE-2021-20323",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-20323"
},
{
"cve": "CVE-2021-21290",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-21290"
},
{
"cve": "CVE-2021-21295",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-21295"
},
{
"cve": "CVE-2021-21409",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-21409"
},
{
"cve": "CVE-2021-23840",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-23840"
},
{
"cve": "CVE-2021-23841",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-23841"
},
{
"cve": "CVE-2021-2471",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-2471"
},
{
"cve": "CVE-2021-25642",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-25642"
},
{
"cve": "CVE-2021-26341",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-26341"
},
{
"cve": "CVE-2021-27918",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-27918"
},
{
"cve": "CVE-2021-28153",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-28153"
},
{
"cve": "CVE-2021-28165",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-28165"
},
{
"cve": "CVE-2021-28169",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-28169"
},
{
"cve": "CVE-2021-28861",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-28861"
},
{
"cve": "CVE-2021-29425",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-29425"
},
{
"cve": "CVE-2021-30560",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-30560"
},
{
"cve": "CVE-2021-3114",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-3114"
},
{
"cve": "CVE-2021-33036",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-33036"
},
{
"cve": "CVE-2021-33194",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-33194"
},
{
"cve": "CVE-2021-33195",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-33195"
},
{
"cve": "CVE-2021-33196",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-33196"
},
{
"cve": "CVE-2021-33197",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-33197"
},
{
"cve": "CVE-2021-33503",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-33503"
},
{
"cve": "CVE-2021-33655",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-33655"
},
{
"cve": "CVE-2021-33656",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-33656"
},
{
"cve": "CVE-2021-3424",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-3424"
},
{
"cve": "CVE-2021-34428",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-34428"
},
{
"cve": "CVE-2021-3449",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-3449"
},
{
"cve": "CVE-2021-3450",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-3450"
},
{
"cve": "CVE-2021-3530",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-3530"
},
{
"cve": "CVE-2021-36221",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-36221"
},
{
"cve": "CVE-2021-36373",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-36373"
},
{
"cve": "CVE-2021-36374",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-36374"
},
{
"cve": "CVE-2021-3648",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-3648"
},
{
"cve": "CVE-2021-36690",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-36690"
},
{
"cve": "CVE-2021-3711",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-3711"
},
{
"cve": "CVE-2021-3712",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-3712"
},
{
"cve": "CVE-2021-37136",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-37136"
},
{
"cve": "CVE-2021-37137",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-37137"
},
{
"cve": "CVE-2021-37404",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-37404"
},
{
"cve": "CVE-2021-37533",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-37533"
},
{
"cve": "CVE-2021-3754",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-3754"
},
{
"cve": "CVE-2021-3778",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-3778"
},
{
"cve": "CVE-2021-3796",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-3796"
},
{
"cve": "CVE-2021-3826",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-3826"
},
{
"cve": "CVE-2021-3827",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-3827"
},
{
"cve": "CVE-2021-38297",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-38297"
},
{
"cve": "CVE-2021-3872",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-3872"
},
{
"cve": "CVE-2021-3875",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-3875"
},
{
"cve": "CVE-2021-3903",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-3903"
},
{
"cve": "CVE-2021-3923",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-3923"
},
{
"cve": "CVE-2021-3927",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-3927"
},
{
"cve": "CVE-2021-3928",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-3928"
},
{
"cve": "CVE-2021-3968",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-3968"
},
{
"cve": "CVE-2021-3973",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-3973"
},
{
"cve": "CVE-2021-3974",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-3974"
},
{
"cve": "CVE-2021-3984",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-3984"
},
{
"cve": "CVE-2021-4019",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-4019"
},
{
"cve": "CVE-2021-4037",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-4037"
},
{
"cve": "CVE-2021-4069",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-4069"
},
{
"cve": "CVE-2021-4104",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-4104"
},
{
"cve": "CVE-2021-4136",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-4136"
},
{
"cve": "CVE-2021-4157",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-4157"
},
{
"cve": "CVE-2021-4166",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-4166"
},
{
"cve": "CVE-2021-41771",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-41771"
},
{
"cve": "CVE-2021-4192",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-4192"
},
{
"cve": "CVE-2021-4193",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-4193"
},
{
"cve": "CVE-2021-4203",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-4203"
},
{
"cve": "CVE-2021-42567",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-42567"
},
{
"cve": "CVE-2021-43797",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-43797"
},
{
"cve": "CVE-2021-44531",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-44531"
},
{
"cve": "CVE-2021-44532",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-44532"
},
{
"cve": "CVE-2021-44533",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-44533"
},
{
"cve": "CVE-2021-44716",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-44716"
},
{
"cve": "CVE-2021-44878",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-44878"
},
{
"cve": "CVE-2021-45078",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-45078"
},
{
"cve": "CVE-2021-46195",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-46195"
},
{
"cve": "CVE-2021-46828",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-46828"
},
{
"cve": "CVE-2021-46848",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-46848"
},
{
"cve": "CVE-2022-0128",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-0128"
},
{
"cve": "CVE-2022-0213",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-0213"
},
{
"cve": "CVE-2022-0225",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-0225"
},
{
"cve": "CVE-2022-0261",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-0261"
},
{
"cve": "CVE-2022-0318",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-0318"
},
{
"cve": "CVE-2022-0319",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-0319"
},
{
"cve": "CVE-2022-0351",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-0351"
},
{
"cve": "CVE-2022-0359",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-0359"
},
{
"cve": "CVE-2022-0361",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-0361"
},
{
"cve": "CVE-2022-0392",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-0392"
},
{
"cve": "CVE-2022-0407",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-0407"
},
{
"cve": "CVE-2022-0413",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-0413"
},
{
"cve": "CVE-2022-0561",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-0561"
},
{
"cve": "CVE-2022-0696",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-0696"
},
{
"cve": "CVE-2022-0778",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-0778"
},
{
"cve": "CVE-2022-1184",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-1184"
},
{
"cve": "CVE-2022-1245",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-1245"
},
{
"cve": "CVE-2022-1271",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-1271"
},
{
"cve": "CVE-2022-1292",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-1292"
},
{
"cve": "CVE-2022-1381",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-1381"
},
{
"cve": "CVE-2022-1420",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-1420"
},
{
"cve": "CVE-2022-1462",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-1462"
},
{
"cve": "CVE-2022-1466",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-1466"
},
{
"cve": "CVE-2022-1471",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-1471"
},
{
"cve": "CVE-2022-1586",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-1586"
},
{
"cve": "CVE-2022-1587",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-1587"
},
{
"cve": "CVE-2022-1616",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-1616"
},
{
"cve": "CVE-2022-1619",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-1619"
},
{
"cve": "CVE-2022-1620",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-1620"
},
{
"cve": "CVE-2022-1679",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-1679"
},
{
"cve": "CVE-2022-1705",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-1705"
},
{
"cve": "CVE-2022-1720",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-1720"
},
{
"cve": "CVE-2022-1729",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-1729"
},
{
"cve": "CVE-2022-1733",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-1733"
},
{
"cve": "CVE-2022-1735",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-1735"
},
{
"cve": "CVE-2022-1771",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-1771"
},
{
"cve": "CVE-2022-1785",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-1785"
},
{
"cve": "CVE-2022-1796",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-1796"
},
{
"cve": "CVE-2022-1851",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-1851"
},
{
"cve": "CVE-2022-1897",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-1897"
},
{
"cve": "CVE-2022-1898",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-1898"
},
{
"cve": "CVE-2022-1927",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-1927"
},
{
"cve": "CVE-2022-1962",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-1962"
},
{
"cve": "CVE-2022-1968",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-1968"
},
{
"cve": "CVE-2022-1974",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-1974"
},
{
"cve": "CVE-2022-1975",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-1975"
},
{
"cve": "CVE-2022-20132",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-20132"
},
{
"cve": "CVE-2022-20141",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-20141"
},
{
"cve": "CVE-2022-20154",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-20154"
},
{
"cve": "CVE-2022-20166",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-20166"
},
{
"cve": "CVE-2022-20368",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-20368"
},
{
"cve": "CVE-2022-20369",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-20369"
},
{
"cve": "CVE-2022-2047",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-2047"
},
{
"cve": "CVE-2022-2048",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-2048"
},
{
"cve": "CVE-2022-20567",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-20567"
},
{
"cve": "CVE-2022-2068",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-2068"
},
{
"cve": "CVE-2022-2097",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-2097"
},
{
"cve": "CVE-2022-21216",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-21216"
},
{
"cve": "CVE-2022-21233",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-21233"
},
{
"cve": "CVE-2022-2124",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-2124"
},
{
"cve": "CVE-2022-2125",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-2125"
},
{
"cve": "CVE-2022-2126",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-2126"
},
{
"cve": "CVE-2022-2129",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-2129"
},
{
"cve": "CVE-2022-21363",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-21363"
},
{
"cve": "CVE-2022-21385",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-21385"
},
{
"cve": "CVE-2022-21499",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-21499"
},
{
"cve": "CVE-2022-2153",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-2153"
},
{
"cve": "CVE-2022-21540",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-21540"
},
{
"cve": "CVE-2022-21541",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-21541"
},
{
"cve": "CVE-2022-21549",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-21549"
},
{
"cve": "CVE-2022-21618",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-21618"
},
{
"cve": "CVE-2022-21619",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-21619"
},
{
"cve": "CVE-2022-21624",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-21624"
},
{
"cve": "CVE-2022-21626",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-21626"
},
{
"cve": "CVE-2022-21628",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-21628"
},
{
"cve": "CVE-2022-21702",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-21702"
},
{
"cve": "CVE-2022-2175",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-2175"
},
{
"cve": "CVE-2022-2182",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-2182"
},
{
"cve": "CVE-2022-2183",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-2183"
},
{
"cve": "CVE-2022-2206",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-2206"
},
{
"cve": "CVE-2022-2207",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-2207"
},
{
"cve": "CVE-2022-2208",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-2208"
},
{
"cve": "CVE-2022-2210",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-2210"
},
{
"cve": "CVE-2022-2231",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-2231"
},
{
"cve": "CVE-2022-2256",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-2256"
},
{
"cve": "CVE-2022-2257",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-2257"
},
{
"cve": "CVE-2022-2264",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-2264"
},
{
"cve": "CVE-2022-2284",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-2284"
},
{
"cve": "CVE-2022-2285",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-2285"
},
{
"cve": "CVE-2022-2286",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-2286"
},
{
"cve": "CVE-2022-2287",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-2287"
},
{
"cve": "CVE-2022-22976",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-22976"
},
{
"cve": "CVE-2022-22978",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-22978"
},
{
"cve": "CVE-2022-2304",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-2304"
},
{
"cve": "CVE-2022-2318",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-2318"
},
{
"cve": "CVE-2022-23302",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-23302"
},
{
"cve": "CVE-2022-23305",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-23305"
},
{
"cve": "CVE-2022-23307",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-23307"
},
{
"cve": "CVE-2022-2343",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-2343"
},
{
"cve": "CVE-2022-2344",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-2344"
},
{
"cve": "CVE-2022-2345",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-2345"
},
{
"cve": "CVE-2022-23471",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-23471"
},
{
"cve": "CVE-2022-23521",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-23521"
},
{
"cve": "CVE-2022-23772",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-23772"
},
{
"cve": "CVE-2022-23773",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-23773"
},
{
"cve": "CVE-2022-24302",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-24302"
},
{
"cve": "CVE-2022-24329",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-24329"
},
{
"cve": "CVE-2022-24823",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-24823"
},
{
"cve": "CVE-2022-24903",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-24903"
},
{
"cve": "CVE-2022-2503",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-2503"
},
{
"cve": "CVE-2022-25147",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-25147"
},
{
"cve": "CVE-2022-25168",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-25168"
},
{
"cve": "CVE-2022-2519",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-2519"
},
{
"cve": "CVE-2022-2520",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-2520"
},
{
"cve": "CVE-2022-2521",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-2521"
},
{
"cve": "CVE-2022-2522",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-2522"
},
{
"cve": "CVE-2022-25647",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-25647"
},
{
"cve": "CVE-2022-2571",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-2571"
},
{
"cve": "CVE-2022-2580",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-2580"
},
{
"cve": "CVE-2022-2581",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-2581"
},
{
"cve": "CVE-2022-25857",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-25857"
},
{
"cve": "CVE-2022-2588",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-2588"
},
{
"cve": "CVE-2022-2598",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-2598"
},
{
"cve": "CVE-2022-26148",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-26148"
},
{
"cve": "CVE-2022-26365",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-26365"
},
{
"cve": "CVE-2022-26373",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-26373"
},
{
"cve": "CVE-2022-2639",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-2639"
},
{
"cve": "CVE-2022-26612",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-26612"
},
{
"cve": "CVE-2022-2663",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-2663"
},
{
"cve": "CVE-2022-27781",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-27781"
},
{
"cve": "CVE-2022-27782",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-27782"
},
{
"cve": "CVE-2022-27943",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-27943"
},
{
"cve": "CVE-2022-2795",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-2795"
},
{
"cve": "CVE-2022-28131",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-28131"
},
{
"cve": "CVE-2022-2816",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-2816"
},
{
"cve": "CVE-2022-2817",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-2817"
},
{
"cve": "CVE-2022-2819",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-2819"
},
{
"cve": "CVE-2022-28327",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-28327"
},
{
"cve": "CVE-2022-2845",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-2845"
},
{
"cve": "CVE-2022-2849",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-2849"
},
{
"cve": "CVE-2022-2862",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-2862"
},
{
"cve": "CVE-2022-2867",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-2867"
},
{
"cve": "CVE-2022-2868",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-2868"
},
{
"cve": "CVE-2022-2869",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-2869"
},
{
"cve": "CVE-2022-28693",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-28693"
},
{
"cve": "CVE-2022-2874",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-2874"
},
{
"cve": "CVE-2022-28748",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-28748"
},
{
"cve": "CVE-2022-2880",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-2880"
},
{
"cve": "CVE-2022-2889",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-2889"
},
{
"cve": "CVE-2022-29162",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-29162"
},
{
"cve": "CVE-2022-29187",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-29187"
},
{
"cve": "CVE-2022-2923",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-2923"
},
{
"cve": "CVE-2022-2946",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-2946"
},
{
"cve": "CVE-2022-29526",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-29526"
},
{
"cve": "CVE-2022-29583",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-29583"
},
{
"cve": "CVE-2022-2964",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-2964"
},
{
"cve": "CVE-2022-2977",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-2977"
},
{
"cve": "CVE-2022-2980",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-2980"
},
{
"cve": "CVE-2022-2982",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-2982"
},
{
"cve": "CVE-2022-29900",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-29900"
},
{
"cve": "CVE-2022-29901",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-29901"
},
{
"cve": "CVE-2022-2991",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-2991"
},
{
"cve": "CVE-2022-3016",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-3016"
},
{
"cve": "CVE-2022-3028",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-3028"
},
{
"cve": "CVE-2022-3037",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-3037"
},
{
"cve": "CVE-2022-30580",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-30580"
},
{
"cve": "CVE-2022-30630",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-30630"
},
{
"cve": "CVE-2022-30631",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-30631"
},
{
"cve": "CVE-2022-30632",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-30632"
},
{
"cve": "CVE-2022-30633",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-30633"
},
{
"cve": "CVE-2022-3099",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-3099"
},
{
"cve": "CVE-2022-31030",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-31030"
},
{
"cve": "CVE-2022-31159",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-31159"
},
{
"cve": "CVE-2022-3134",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-3134"
},
{
"cve": "CVE-2022-3153",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-3153"
},
{
"cve": "CVE-2022-3169",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-3169"
},
{
"cve": "CVE-2022-31690",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-31690"
},
{
"cve": "CVE-2022-32148",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-32148"
},
{
"cve": "CVE-2022-32149",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-32149"
},
{
"cve": "CVE-2022-32206",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-32206"
},
{
"cve": "CVE-2022-32208",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-32208"
},
{
"cve": "CVE-2022-32221",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-32221"
},
{
"cve": "CVE-2022-3234",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-3234"
},
{
"cve": "CVE-2022-3235",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-3235"
},
{
"cve": "CVE-2022-3239",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-3239"
},
{
"cve": "CVE-2022-3278",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-3278"
},
{
"cve": "CVE-2022-3296",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-3296"
},
{
"cve": "CVE-2022-3297",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-3297"
},
{
"cve": "CVE-2022-33196",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-33196"
},
{
"cve": "CVE-2022-3324",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-3324"
},
{
"cve": "CVE-2022-3352",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-3352"
},
{
"cve": "CVE-2022-33740",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-33740"
},
{
"cve": "CVE-2022-33741",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-33741"
},
{
"cve": "CVE-2022-33742",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-33742"
},
{
"cve": "CVE-2022-33972",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-33972"
},
{
"cve": "CVE-2022-33981",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-33981"
},
{
"cve": "CVE-2022-34169",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-34169"
},
{
"cve": "CVE-2022-3424",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-3424"
},
{
"cve": "CVE-2022-34266",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-34266"
},
{
"cve": "CVE-2022-34526",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-34526"
},
{
"cve": "CVE-2022-34903",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-34903"
},
{
"cve": "CVE-2022-3491",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-3491"
},
{
"cve": "CVE-2022-3515",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-3515"
},
{
"cve": "CVE-2022-3520",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-3520"
},
{
"cve": "CVE-2022-3521",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-3521"
},
{
"cve": "CVE-2022-3524",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-3524"
},
{
"cve": "CVE-2022-35252",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-35252"
},
{
"cve": "CVE-2022-3542",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-3542"
},
{
"cve": "CVE-2022-3545",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-3545"
},
{
"cve": "CVE-2022-3564",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-3564"
},
{
"cve": "CVE-2022-3565",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-3565"
},
{
"cve": "CVE-2022-3566",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-3566"
},
{
"cve": "CVE-2022-3567",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-3567"
},
{
"cve": "CVE-2022-35737",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-35737"
},
{
"cve": "CVE-2022-3586",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-3586"
},
{
"cve": "CVE-2022-3591",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-3591"
},
{
"cve": "CVE-2022-3594",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-3594"
},
{
"cve": "CVE-2022-3597",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-3597"
},
{
"cve": "CVE-2022-3599",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-3599"
},
{
"cve": "CVE-2022-36109",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-36109"
},
{
"cve": "CVE-2022-3621",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-3621"
},
{
"cve": "CVE-2022-3626",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-3626"
},
{
"cve": "CVE-2022-3627",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-3627"
},
{
"cve": "CVE-2022-3628",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-3628"
},
{
"cve": "CVE-2022-36280",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-36280"
},
{
"cve": "CVE-2022-3629",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-3629"
},
{
"cve": "CVE-2022-3635",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-3635"
},
{
"cve": "CVE-2022-3643",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-3643"
},
{
"cve": "CVE-2022-36437",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-36437"
},
{
"cve": "CVE-2022-3646",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-3646"
},
{
"cve": "CVE-2022-3649",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-3649"
},
{
"cve": "CVE-2022-36760",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-36760"
},
{
"cve": "CVE-2022-36879",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-36879"
},
{
"cve": "CVE-2022-36946",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-36946"
},
{
"cve": "CVE-2022-3705",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-3705"
},
{
"cve": "CVE-2022-37434",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-37434"
},
{
"cve": "CVE-2022-37436",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-37436"
},
{
"cve": "CVE-2022-37865",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-37865"
},
{
"cve": "CVE-2022-37866",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-37866"
},
{
"cve": "CVE-2022-38090",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-38090"
},
{
"cve": "CVE-2022-38096",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-38096"
},
{
"cve": "CVE-2022-38126",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-38126"
},
{
"cve": "CVE-2022-38127",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-38127"
},
{
"cve": "CVE-2022-38177",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-38177"
},
{
"cve": "CVE-2022-38178",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-38178"
},
{
"cve": "CVE-2022-3821",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-3821"
},
{
"cve": "CVE-2022-38533",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-38533"
},
{
"cve": "CVE-2022-38749",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-38749"
},
{
"cve": "CVE-2022-38750",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-38750"
},
{
"cve": "CVE-2022-38751",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-38751"
},
{
"cve": "CVE-2022-38752",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-38752"
},
{
"cve": "CVE-2022-39028",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-39028"
},
{
"cve": "CVE-2022-3903",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-3903"
},
{
"cve": "CVE-2022-39188",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-39188"
},
{
"cve": "CVE-2022-39399",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-39399"
},
{
"cve": "CVE-2022-3970",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-3970"
},
{
"cve": "CVE-2022-40149",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-40149"
},
{
"cve": "CVE-2022-40150",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-40150"
},
{
"cve": "CVE-2022-40151",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-40151"
},
{
"cve": "CVE-2022-40152",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-40152"
},
{
"cve": "CVE-2022-40153",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-40153"
},
{
"cve": "CVE-2022-40303",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-40303"
},
{
"cve": "CVE-2022-40304",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-40304"
},
{
"cve": "CVE-2022-40307",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-40307"
},
{
"cve": "CVE-2022-40674",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-40674"
},
{
"cve": "CVE-2022-40768",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-40768"
},
{
"cve": "CVE-2022-40899",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-40899"
},
{
"cve": "CVE-2022-4095",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-4095"
},
{
"cve": "CVE-2022-41218",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-41218"
},
{
"cve": "CVE-2022-4129",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-4129"
},
{
"cve": "CVE-2022-4141",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-4141"
},
{
"cve": "CVE-2022-41717",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-41717"
},
{
"cve": "CVE-2022-41721",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-41721"
},
{
"cve": "CVE-2022-41848",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-41848"
},
{
"cve": "CVE-2022-41850",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-41850"
},
{
"cve": "CVE-2022-41854",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-41854"
},
{
"cve": "CVE-2022-41858",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-41858"
},
{
"cve": "CVE-2022-41881",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-41881"
},
{
"cve": "CVE-2022-41903",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-41903"
},
{
"cve": "CVE-2022-41915",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-41915"
},
{
"cve": "CVE-2022-41966",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-41966"
},
{
"cve": "CVE-2022-41974",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-41974"
},
{
"cve": "CVE-2022-42003",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-42003"
},
{
"cve": "CVE-2022-42004",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-42004"
},
{
"cve": "CVE-2022-42010",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-42010"
},
{
"cve": "CVE-2022-42011",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-42011"
},
{
"cve": "CVE-2022-42012",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-42012"
},
{
"cve": "CVE-2022-42328",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-42328"
},
{
"cve": "CVE-2022-42329",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-42329"
},
{
"cve": "CVE-2022-42703",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-42703"
},
{
"cve": "CVE-2022-42889",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-42889"
},
{
"cve": "CVE-2022-42895",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-42895"
},
{
"cve": "CVE-2022-42896",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-42896"
},
{
"cve": "CVE-2022-42898",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-42898"
},
{
"cve": "CVE-2022-4292",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-4292"
},
{
"cve": "CVE-2022-4293",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-4293"
},
{
"cve": "CVE-2022-42969",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-42969"
},
{
"cve": "CVE-2022-4304",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-4304"
},
{
"cve": "CVE-2022-43552",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-43552"
},
{
"cve": "CVE-2022-43680",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-43680"
},
{
"cve": "CVE-2022-43750",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-43750"
},
{
"cve": "CVE-2022-4378",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-4378"
},
{
"cve": "CVE-2022-43945",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-43945"
},
{
"cve": "CVE-2022-43995",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-43995"
},
{
"cve": "CVE-2022-4415",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-4415"
},
{
"cve": "CVE-2022-4450",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-4450"
},
{
"cve": "CVE-2022-44638",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-44638"
},
{
"cve": "CVE-2022-45061",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-45061"
},
{
"cve": "CVE-2022-45688",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-45688"
},
{
"cve": "CVE-2022-45884",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-45884"
},
{
"cve": "CVE-2022-45885",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-45885"
},
{
"cve": "CVE-2022-45886",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-45886"
},
{
"cve": "CVE-2022-45887",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-45887"
},
{
"cve": "CVE-2022-45919",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-45919"
},
{
"cve": "CVE-2022-45934",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-45934"
},
{
"cve": "CVE-2022-45939",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-45939"
},
{
"cve": "CVE-2022-4662",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-4662"
},
{
"cve": "CVE-2022-46751",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-46751"
},
{
"cve": "CVE-2022-46908",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-46908"
},
{
"cve": "CVE-2022-47629",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-47629"
},
{
"cve": "CVE-2022-47929",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-47929"
},
{
"cve": "CVE-2022-48281",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-48281"
},
{
"cve": "CVE-2022-48337",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-48337"
},
{
"cve": "CVE-2022-48339",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-48339"
},
{
"cve": "CVE-2023-0045",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-0045"
},
{
"cve": "CVE-2023-0049",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-0049"
},
{
"cve": "CVE-2023-0051",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-0051"
},
{
"cve": "CVE-2023-0054",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-0054"
},
{
"cve": "CVE-2023-0215",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-0215"
},
{
"cve": "CVE-2023-0286",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-0286"
},
{
"cve": "CVE-2023-0288",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-0288"
},
{
"cve": "CVE-2023-0433",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-0433"
},
{
"cve": "CVE-2023-0464",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-0464"
},
{
"cve": "CVE-2023-0465",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-0465"
},
{
"cve": "CVE-2023-0466",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-0466"
},
{
"cve": "CVE-2023-0512",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-0512"
},
{
"cve": "CVE-2023-0590",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-0590"
},
{
"cve": "CVE-2023-0597",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-0597"
},
{
"cve": "CVE-2023-0833",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-0833"
},
{
"cve": "CVE-2023-1076",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-1076"
},
{
"cve": "CVE-2023-1095",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-1095"
},
{
"cve": "CVE-2023-1118",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-1118"
},
{
"cve": "CVE-2023-1127",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-1127"
},
{
"cve": "CVE-2023-1170",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-1170"
},
{
"cve": "CVE-2023-1175",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-1175"
},
{
"cve": "CVE-2023-1370",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-1370"
},
{
"cve": "CVE-2023-1380",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-1380"
},
{
"cve": "CVE-2023-1390",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-1390"
},
{
"cve": "CVE-2023-1436",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-1436"
},
{
"cve": "CVE-2023-1513",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-1513"
},
{
"cve": "CVE-2023-1611",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-1611"
},
{
"cve": "CVE-2023-1670",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-1670"
},
{
"cve": "CVE-2023-1855",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-1855"
},
{
"cve": "CVE-2023-1989",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-1989"
},
{
"cve": "CVE-2023-1990",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-1990"
},
{
"cve": "CVE-2023-1998",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-1998"
},
{
"cve": "CVE-2023-20862",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-20862"
},
{
"cve": "CVE-2023-2124",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-2124"
},
{
"cve": "CVE-2023-2162",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-2162"
},
{
"cve": "CVE-2023-2176",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-2176"
},
{
"cve": "CVE-2023-21830",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-21830"
},
{
"cve": "CVE-2023-21835",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-21835"
},
{
"cve": "CVE-2023-21843",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-21843"
},
{
"cve": "CVE-2023-21930",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-21930"
},
{
"cve": "CVE-2023-21937",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-21937"
},
{
"cve": "CVE-2023-21938",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-21938"
},
{
"cve": "CVE-2023-21939",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-21939"
},
{
"cve": "CVE-2023-2194",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-2194"
},
{
"cve": "CVE-2023-21954",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-21954"
},
{
"cve": "CVE-2023-21967",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-21967"
},
{
"cve": "CVE-2023-21968",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-21968"
},
{
"cve": "CVE-2023-22490",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-22490"
},
{
"cve": "CVE-2023-2253",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-2253"
},
{
"cve": "CVE-2023-22809",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-22809"
},
{
"cve": "CVE-2023-23454",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-23454"
},
{
"cve": "CVE-2023-23455",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-23455"
},
{
"cve": "CVE-2023-23559",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-23559"
},
{
"cve": "CVE-2023-23916",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-23916"
},
{
"cve": "CVE-2023-23946",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-23946"
},
{
"cve": "CVE-2023-24329",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-24329"
},
{
"cve": "CVE-2023-24532",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-24532"
},
{
"cve": "CVE-2023-24534",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-24534"
},
{
"cve": "CVE-2023-2483",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-2483"
},
{
"cve": "CVE-2023-24998",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-24998"
},
{
"cve": "CVE-2023-2513",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-2513"
},
{
"cve": "CVE-2023-25193",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-25193"
},
{
"cve": "CVE-2023-25652",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-25652"
},
{
"cve": "CVE-2023-25690",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-25690"
},
{
"cve": "CVE-2023-25809",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-25809"
},
{
"cve": "CVE-2023-25815",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-25815"
},
{
"cve": "CVE-2023-26048",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-26048"
},
{
"cve": "CVE-2023-26049",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-26049"
},
{
"cve": "CVE-2023-2650",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-2650"
},
{
"cve": "CVE-2023-26545",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-26545"
},
{
"cve": "CVE-2023-26604",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-26604"
},
{
"cve": "CVE-2023-27533",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-27533"
},
{
"cve": "CVE-2023-27534",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-27534"
},
{
"cve": "CVE-2023-27535",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-27535"
},
{
"cve": "CVE-2023-27536",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-27536"
},
{
"cve": "CVE-2023-27538",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-27538"
},
{
"cve": "CVE-2023-27561",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-27561"
},
{
"cve": "CVE-2023-2828",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-2828"
},
{
"cve": "CVE-2023-28320",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-28320"
},
{
"cve": "CVE-2023-28321",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-28321"
},
{
"cve": "CVE-2023-28322",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-28322"
},
{
"cve": "CVE-2023-28328",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-28328"
},
{
"cve": "CVE-2023-28464",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-28464"
},
{
"cve": "CVE-2023-28486",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-28486"
},
{
"cve": "CVE-2023-28487",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-28487"
},
{
"cve": "CVE-2023-28642",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-28642"
},
{
"cve": "CVE-2023-28772",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-28772"
},
{
"cve": "CVE-2023-28840",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-28840"
},
{
"cve": "CVE-2023-28841",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-28841"
},
{
"cve": "CVE-2023-28842",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-28842"
},
{
"cve": "CVE-2023-29007",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-29007"
},
{
"cve": "CVE-2023-29383",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-29383"
},
{
"cve": "CVE-2023-29402",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-29402"
},
{
"cve": "CVE-2023-29406",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-29406"
},
{
"cve": "CVE-2023-29409",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-29409"
},
{
"cve": "CVE-2023-2976",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-2976"
},
{
"cve": "CVE-2023-30630",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-30630"
},
{
"cve": "CVE-2023-30772",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-30772"
},
{
"cve": "CVE-2023-31084",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-31084"
},
{
"cve": "CVE-2023-3138",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-3138"
},
{
"cve": "CVE-2023-31436",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-31436"
},
{
"cve": "CVE-2023-31484",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-31484"
},
{
"cve": "CVE-2023-32269",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-32269"
},
{
"cve": "CVE-2023-32697",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-32697"
},
{
"cve": "CVE-2023-33264",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-33264"
},
{
"cve": "CVE-2023-34034",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-34034"
},
{
"cve": "CVE-2023-34035",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-34035"
},
{
"cve": "CVE-2023-34453",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-34453"
},
{
"cve": "CVE-2023-34454",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-34454"
},
{
"cve": "CVE-2023-34455",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-34455"
},
{
"cve": "CVE-2023-34462",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-34462"
},
{
"cve": "CVE-2023-35116",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-35116"
},
{
"cve": "CVE-2023-3635",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-3635"
},
{
"cve": "CVE-2023-36479",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-36479"
},
{
"cve": "CVE-2023-39533",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-39533"
},
{
"cve": "CVE-2023-40167",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-40167"
},
{
"cve": "CVE-2023-40217",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-40217"
},
{
"cve": "CVE-2023-41105",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-41105"
},
{
"cve": "CVE-2023-41900",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-41900"
},
{
"cve": "CVE-2023-43642",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-43642"
},
{
"cve": "CVE-2023-43804",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-43804"
},
{
"cve": "CVE-2023-44487",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-44487"
},
{
"cve": "CVE-2023-45803",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-45803"
},
{
"cve": "CVE-2024-21626",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2024-21626"
}
]
}
WID-SEC-W-2022-2134
Vulnerability from csaf_certbund
Notes
{
"document": {
"aggregate_severity": {
"text": "hoch"
},
"category": "csaf_base",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "de-DE",
"notes": [
{
"category": "legal_disclaimer",
"text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
},
{
"category": "description",
"text": "IBM Spectrum Protect ist eine zentralisierte Backupl\u00f6sung f\u00fcr Systeme im Netzwerk.",
"title": "Produktbeschreibung"
},
{
"category": "summary",
"text": "Ein entfernter, anonymer Angreifer kann mehrere Schwachstellen in IBM Spectrum Protect Plus Container Backup and Restore for Kubernetes and Red Hat OpenShift ausnutzen, um einen Cross site Scripting Angriff durchzuf\u00fchren, Informationen offenzulegen oder einen Denial of Service zu verursachen.",
"title": "Angriff"
},
{
"category": "general",
"text": "- Linux",
"title": "Betroffene Betriebssysteme"
}
],
"publisher": {
"category": "other",
"contact_details": "csaf-provider@cert-bund.de",
"name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"namespace": "https://www.bsi.bund.de"
},
"references": [
{
"category": "self",
"summary": "WID-SEC-W-2022-2134 - CSAF Version",
"url": "https://wid.cert-bund.de/.well-known/csaf/white/2022/wid-sec-w-2022-2134.json"
},
{
"category": "self",
"summary": "WID-SEC-2022-2134 - Portal Version",
"url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2022-2134"
},
{
"category": "external",
"summary": "IBM Security Bulletin 7005589 vom 2023-06-21",
"url": "https://www.ibm.com/support/pages/node/7005589"
},
{
"category": "external",
"summary": "IBM Security Bulletin vom 2022-11-20",
"url": "https://www.ibm.com/support/pages/node/6838883"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2022:8626 vom 2022-11-29",
"url": "https://access.redhat.com/errata/RHSA-2022:8626"
},
{
"category": "external",
"summary": "IBM Security Bulletin 6847653 vom 2022-12-20",
"url": "https://www.ibm.com/support/pages/node/6847653"
},
{
"category": "external",
"summary": "IBM Security Bulletin 6847643 vom 2022-12-20",
"url": "https://www.ibm.com/support/pages/node/6847643"
}
],
"source_lang": "en-US",
"title": "IBM Spectrum Protect: Mehrere Schwachstellen",
"tracking": {
"current_release_date": "2023-06-20T22:00:00.000+00:00",
"generator": {
"date": "2024-08-15T17:38:41.956+00:00",
"engine": {
"name": "BSI-WID",
"version": "1.3.5"
}
},
"id": "WID-SEC-W-2022-2134",
"initial_release_date": "2022-11-20T23:00:00.000+00:00",
"revision_history": [
{
"date": "2022-11-20T23:00:00.000+00:00",
"number": "1",
"summary": "Initiale Fassung"
},
{
"date": "2022-11-28T23:00:00.000+00:00",
"number": "2",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2022-12-20T23:00:00.000+00:00",
"number": "3",
"summary": "Neue Updates von IBM aufgenommen"
},
{
"date": "2023-06-20T22:00:00.000+00:00",
"number": "4",
"summary": "Neue Updates von IBM aufgenommen"
}
],
"status": "final",
"version": "4"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "IBM Spectrum Protect plus 10.1",
"product": {
"name": "IBM Spectrum Protect plus 10.1",
"product_id": "T015895",
"product_identification_helper": {
"cpe": "cpe:/a:ibm:spectrum_protect:plus_10.1"
}
}
},
{
"category": "product_name",
"name": "IBM Spectrum Protect 10.1",
"product": {
"name": "IBM Spectrum Protect 10.1",
"product_id": "T023657",
"product_identification_helper": {
"cpe": "cpe:/a:ibm:spectrum_protect:10.1"
}
}
},
{
"category": "product_name",
"name": "IBM Spectrum Protect \u003c plus 10.1.12.2",
"product": {
"name": "IBM Spectrum Protect \u003c plus 10.1.12.2",
"product_id": "T025369",
"product_identification_helper": {
"cpe": "cpe:/a:ibm:spectrum_protect:plus_10.1.12.2"
}
}
},
{
"category": "product_name",
"name": "IBM Spectrum Protect 8.1.17",
"product": {
"name": "IBM Spectrum Protect 8.1.17",
"product_id": "T025663",
"product_identification_helper": {
"cpe": "cpe:/a:ibm:spectrum_protect:8.1.17"
}
}
}
],
"category": "product_name",
"name": "Spectrum Protect"
}
],
"category": "vendor",
"name": "IBM"
},
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux",
"product": {
"name": "Red Hat Enterprise Linux",
"product_id": "67646",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:-"
}
}
}
],
"category": "vendor",
"name": "Red Hat"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2022-1705",
"notes": [
{
"category": "description",
"text": "In IBM Spectrum Protect Plus Container Backup and Restore for Kubernetes and Red Hat OpenShift existieren mehrere Schwachstellen. Diese bestehen in der Golang Go Komponente und erm\u00f6glichen es einem entfernten anonymen Angreifer einen Cross site Scripting Angriff durchzuf\u00fchren, Informationen offenzulegen oder einen Denial of Service zu verursachen."
}
],
"product_status": {
"known_affected": [
"67646",
"T023657",
"T025663",
"T015895"
]
},
"release_date": "2022-11-20T23:00:00.000+00:00",
"title": "CVE-2022-1705"
},
{
"cve": "CVE-2022-1962",
"notes": [
{
"category": "description",
"text": "In IBM Spectrum Protect Plus Container Backup and Restore for Kubernetes and Red Hat OpenShift existieren mehrere Schwachstellen. Diese bestehen in der Golang Go Komponente und erm\u00f6glichen es einem entfernten anonymen Angreifer einen Cross site Scripting Angriff durchzuf\u00fchren, Informationen offenzulegen oder einen Denial of Service zu verursachen."
}
],
"product_status": {
"known_affected": [
"67646",
"T023657",
"T025663",
"T015895"
]
},
"release_date": "2022-11-20T23:00:00.000+00:00",
"title": "CVE-2022-1962"
},
{
"cve": "CVE-2022-27664",
"notes": [
{
"category": "description",
"text": "In IBM Spectrum Protect Plus Container Backup and Restore for Kubernetes and Red Hat OpenShift existieren mehrere Schwachstellen. Diese bestehen in der Golang Go Komponente und erm\u00f6glichen es einem entfernten anonymen Angreifer einen Cross site Scripting Angriff durchzuf\u00fchren, Informationen offenzulegen oder einen Denial of Service zu verursachen."
}
],
"product_status": {
"known_affected": [
"67646",
"T023657",
"T025663",
"T015895"
]
},
"release_date": "2022-11-20T23:00:00.000+00:00",
"title": "CVE-2022-27664"
},
{
"cve": "CVE-2022-28131",
"notes": [
{
"category": "description",
"text": "In IBM Spectrum Protect Plus Container Backup and Restore for Kubernetes and Red Hat OpenShift existieren mehrere Schwachstellen. Diese bestehen in der Golang Go Komponente und erm\u00f6glichen es einem entfernten anonymen Angreifer einen Cross site Scripting Angriff durchzuf\u00fchren, Informationen offenzulegen oder einen Denial of Service zu verursachen."
}
],
"product_status": {
"known_affected": [
"67646",
"T023657",
"T025663",
"T015895"
]
},
"release_date": "2022-11-20T23:00:00.000+00:00",
"title": "CVE-2022-28131"
},
{
"cve": "CVE-2022-30630",
"notes": [
{
"category": "description",
"text": "In IBM Spectrum Protect Plus Container Backup and Restore for Kubernetes and Red Hat OpenShift existieren mehrere Schwachstellen. Diese bestehen in der Golang Go Komponente und erm\u00f6glichen es einem entfernten anonymen Angreifer einen Cross site Scripting Angriff durchzuf\u00fchren, Informationen offenzulegen oder einen Denial of Service zu verursachen."
}
],
"product_status": {
"known_affected": [
"67646",
"T023657",
"T025663",
"T015895"
]
},
"release_date": "2022-11-20T23:00:00.000+00:00",
"title": "CVE-2022-30630"
},
{
"cve": "CVE-2022-30631",
"notes": [
{
"category": "description",
"text": "In IBM Spectrum Protect Plus Container Backup and Restore for Kubernetes and Red Hat OpenShift existieren mehrere Schwachstellen. Diese bestehen in der Golang Go Komponente und erm\u00f6glichen es einem entfernten anonymen Angreifer einen Cross site Scripting Angriff durchzuf\u00fchren, Informationen offenzulegen oder einen Denial of Service zu verursachen."
}
],
"product_status": {
"known_affected": [
"67646",
"T023657",
"T025663",
"T015895"
]
},
"release_date": "2022-11-20T23:00:00.000+00:00",
"title": "CVE-2022-30631"
},
{
"cve": "CVE-2022-30632",
"notes": [
{
"category": "description",
"text": "In IBM Spectrum Protect Plus Container Backup and Restore for Kubernetes and Red Hat OpenShift existieren mehrere Schwachstellen. Diese bestehen in der Golang Go Komponente und erm\u00f6glichen es einem entfernten anonymen Angreifer einen Cross site Scripting Angriff durchzuf\u00fchren, Informationen offenzulegen oder einen Denial of Service zu verursachen."
}
],
"product_status": {
"known_affected": [
"67646",
"T023657",
"T025663",
"T015895"
]
},
"release_date": "2022-11-20T23:00:00.000+00:00",
"title": "CVE-2022-30632"
},
{
"cve": "CVE-2022-30633",
"notes": [
{
"category": "description",
"text": "In IBM Spectrum Protect Plus Container Backup and Restore for Kubernetes and Red Hat OpenShift existieren mehrere Schwachstellen. Diese bestehen in der Golang Go Komponente und erm\u00f6glichen es einem entfernten anonymen Angreifer einen Cross site Scripting Angriff durchzuf\u00fchren, Informationen offenzulegen oder einen Denial of Service zu verursachen."
}
],
"product_status": {
"known_affected": [
"67646",
"T023657",
"T025663",
"T015895"
]
},
"release_date": "2022-11-20T23:00:00.000+00:00",
"title": "CVE-2022-30633"
},
{
"cve": "CVE-2022-30635",
"notes": [
{
"category": "description",
"text": "In IBM Spectrum Protect Plus Container Backup and Restore for Kubernetes and Red Hat OpenShift existieren mehrere Schwachstellen. Diese bestehen in der Golang Go Komponente und erm\u00f6glichen es einem entfernten anonymen Angreifer einen Cross site Scripting Angriff durchzuf\u00fchren, Informationen offenzulegen oder einen Denial of Service zu verursachen."
}
],
"product_status": {
"known_affected": [
"67646",
"T023657",
"T025663",
"T015895"
]
},
"release_date": "2022-11-20T23:00:00.000+00:00",
"title": "CVE-2022-30635"
},
{
"cve": "CVE-2022-32148",
"notes": [
{
"category": "description",
"text": "In IBM Spectrum Protect Plus Container Backup and Restore for Kubernetes and Red Hat OpenShift existieren mehrere Schwachstellen. Diese bestehen in der Golang Go Komponente und erm\u00f6glichen es einem entfernten anonymen Angreifer einen Cross site Scripting Angriff durchzuf\u00fchren, Informationen offenzulegen oder einen Denial of Service zu verursachen."
}
],
"product_status": {
"known_affected": [
"67646",
"T023657",
"T025663",
"T015895"
]
},
"release_date": "2022-11-20T23:00:00.000+00:00",
"title": "CVE-2022-32148"
},
{
"cve": "CVE-2022-32149",
"notes": [
{
"category": "description",
"text": "In IBM Spectrum Protect Plus Container Backup and Restore for Kubernetes and Red Hat OpenShift existieren mehrere Schwachstellen. Diese bestehen in der Golang Go Komponente und erm\u00f6glichen es einem entfernten anonymen Angreifer einen Cross site Scripting Angriff durchzuf\u00fchren, Informationen offenzulegen oder einen Denial of Service zu verursachen."
}
],
"product_status": {
"known_affected": [
"67646",
"T023657",
"T025663",
"T015895"
]
},
"release_date": "2022-11-20T23:00:00.000+00:00",
"title": "CVE-2022-32149"
},
{
"cve": "CVE-2022-32189",
"notes": [
{
"category": "description",
"text": "In IBM Spectrum Protect Plus Container Backup and Restore for Kubernetes and Red Hat OpenShift existieren mehrere Schwachstellen. Diese bestehen in der Golang Go Komponente und erm\u00f6glichen es einem entfernten anonymen Angreifer einen Cross site Scripting Angriff durchzuf\u00fchren, Informationen offenzulegen oder einen Denial of Service zu verursachen."
}
],
"product_status": {
"known_affected": [
"67646",
"T023657",
"T025663",
"T015895"
]
},
"release_date": "2022-11-20T23:00:00.000+00:00",
"title": "CVE-2022-32189"
},
{
"cve": "CVE-2022-32190",
"notes": [
{
"category": "description",
"text": "In IBM Spectrum Protect Plus Container Backup and Restore for Kubernetes and Red Hat OpenShift existieren mehrere Schwachstellen. Diese bestehen in der Golang Go Komponente und erm\u00f6glichen es einem entfernten anonymen Angreifer einen Cross site Scripting Angriff durchzuf\u00fchren, Informationen offenzulegen oder einen Denial of Service zu verursachen."
}
],
"product_status": {
"known_affected": [
"67646",
"T023657",
"T025663",
"T015895"
]
},
"release_date": "2022-11-20T23:00:00.000+00:00",
"title": "CVE-2022-32190"
}
]
}
WID-SEC-W-2023-0318
Vulnerability from csaf_certbund
Notes
{
"document": {
"aggregate_severity": {
"text": "mittel"
},
"category": "csaf_base",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "de-DE",
"notes": [
{
"category": "legal_disclaimer",
"text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
},
{
"category": "description",
"text": "Red Hat OpenShift ist eine \"Platform as a Service\" (PaaS) L\u00f6sung zur Bereitstellung von Applikationen in der Cloud.",
"title": "Produktbeschreibung"
},
{
"category": "summary",
"text": "Ein entfernter, anonymer oder angemeldeter Angreifer kann mehrere Schwachstellen in Red Hat Migration Toolkit for Containers ausnutzen, um seine Rechte zu erweitern, einen Denial of Service zu verursachen, Sicherheitsvorkehrungen zu umgehen und Informationen offenzulegen.",
"title": "Angriff"
},
{
"category": "general",
"text": "- Linux",
"title": "Betroffene Betriebssysteme"
}
],
"publisher": {
"category": "other",
"contact_details": "csaf-provider@cert-bund.de",
"name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"namespace": "https://www.bsi.bund.de"
},
"references": [
{
"category": "self",
"summary": "WID-SEC-W-2023-0318 - CSAF Version",
"url": "https://wid.cert-bund.de/.well-known/csaf/white/2023/wid-sec-w-2023-0318.json"
},
{
"category": "self",
"summary": "WID-SEC-2023-0318 - Portal Version",
"url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2023-0318"
},
{
"category": "external",
"summary": "RedHat Security Advisory vom 2023-02-08",
"url": "https://access.redhat.com/errata/RHSA-2023:0693"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2023:0632 vom 2023-02-15",
"url": "https://access.redhat.com/errata/RHSA-2023:0632"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2023:0728 vom 2023-02-17",
"url": "https://access.redhat.com/errata/RHSA-2023:0728"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2023:0769 vom 2023-02-21",
"url": "https://access.redhat.com/errata/RHSA-2023:0769"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2023:0774 vom 2023-02-22",
"url": "https://access.redhat.com/errata/RHSA-2023:0774"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2023:2041 vom 2023-04-27",
"url": "https://access.redhat.com/errata/RHSA-2023:2041"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2023:3645 vom 2023-06-16",
"url": "https://access.redhat.com/errata/RHSA-2023:3645"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2024-0121 vom 2024-01-13",
"url": "https://linux.oracle.com/errata/ELSA-2024-0121.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2023:5006 vom 2023-12-30",
"url": "https://access.redhat.com/errata/RHSA-2023:5006"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:2988 vom 2024-05-22",
"url": "https://access.redhat.com/errata/RHSA-2024:2988"
}
],
"source_lang": "en-US",
"title": "Red Hat Migration Toolkit for Containers: Mehrere Schwachstellen",
"tracking": {
"current_release_date": "2024-05-21T22:00:00.000+00:00",
"generator": {
"date": "2024-08-15T17:43:17.931+00:00",
"engine": {
"name": "BSI-WID",
"version": "1.3.5"
}
},
"id": "WID-SEC-W-2023-0318",
"initial_release_date": "2023-02-08T23:00:00.000+00:00",
"revision_history": [
{
"date": "2023-02-08T23:00:00.000+00:00",
"number": "1",
"summary": "Initiale Fassung"
},
{
"date": "2023-02-15T23:00:00.000+00:00",
"number": "2",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2023-02-16T23:00:00.000+00:00",
"number": "3",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2023-02-20T23:00:00.000+00:00",
"number": "4",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2023-02-21T23:00:00.000+00:00",
"number": "5",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2023-04-26T22:00:00.000+00:00",
"number": "6",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2023-06-15T22:00:00.000+00:00",
"number": "7",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2024-01-01T23:00:00.000+00:00",
"number": "8",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2024-01-14T23:00:00.000+00:00",
"number": "9",
"summary": "Neue Updates von Oracle Linux aufgenommen"
},
{
"date": "2024-05-21T22:00:00.000+00:00",
"number": "10",
"summary": "Neue Updates von Red Hat aufgenommen"
}
],
"status": "final",
"version": "10"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Oracle Linux",
"product": {
"name": "Oracle Linux",
"product_id": "T004914",
"product_identification_helper": {
"cpe": "cpe:/o:oracle:linux:-"
}
}
}
],
"category": "vendor",
"name": "Oracle"
},
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux",
"product": {
"name": "Red Hat Enterprise Linux",
"product_id": "67646",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:-"
}
}
},
{
"branches": [
{
"category": "product_name",
"name": "Red Hat OpenShift",
"product": {
"name": "Red Hat OpenShift",
"product_id": "T008027",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:openshift:-"
}
}
},
{
"category": "product_version",
"name": "Container Platform 4.11",
"product": {
"name": "Red Hat OpenShift Container Platform 4.11",
"product_id": "T025990",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:openshift:container_platform_4.11"
}
}
},
{
"category": "product_version_range",
"name": "Migration Toolkit for Containers \u003c1.7.7",
"product": {
"name": "Red Hat OpenShift Migration Toolkit for Containers \u003c1.7.7",
"product_id": "T026206"
}
},
{
"category": "product_version",
"name": "Container Platform 4.12",
"product": {
"name": "Red Hat OpenShift Container Platform 4.12",
"product_id": "T026435",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:openshift:container_platform_4.12"
}
}
},
{
"category": "product_version_range",
"name": "Container Platform \u003c4.14.0",
"product": {
"name": "Red Hat OpenShift Container Platform \u003c4.14.0",
"product_id": "T031839"
}
}
],
"category": "product_name",
"name": "OpenShift"
}
],
"category": "vendor",
"name": "Red Hat"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2021-43138",
"notes": [
{
"category": "description",
"text": "In Red Hat Migration Toolkit for Containers existieren mehrere Schwachstellen in den Komponenten \"async\" und \"golang\". Ein Angreifer kann dies ausnutzen, um seine Rechte zu erweitern, einen Denial of Service zu verursachen, Sicherheitsvorkehrungen zu umgehen und Informationen offenzulegen. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzeraktion oder eine Anmeldung erforderlich."
}
],
"product_status": {
"known_affected": [
"T008027",
"67646",
"T026206",
"T026435",
"T004914",
"T025990",
"T031839"
]
},
"release_date": "2023-02-08T23:00:00.000+00:00",
"title": "CVE-2021-43138"
},
{
"cve": "CVE-2022-27664",
"notes": [
{
"category": "description",
"text": "In Red Hat Migration Toolkit for Containers existieren mehrere Schwachstellen in den Komponenten \"async\" und \"golang\". Ein Angreifer kann dies ausnutzen, um seine Rechte zu erweitern, einen Denial of Service zu verursachen, Sicherheitsvorkehrungen zu umgehen und Informationen offenzulegen. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzeraktion oder eine Anmeldung erforderlich."
}
],
"product_status": {
"known_affected": [
"T008027",
"67646",
"T026206",
"T026435",
"T004914",
"T025990",
"T031839"
]
},
"release_date": "2023-02-08T23:00:00.000+00:00",
"title": "CVE-2022-27664"
},
{
"cve": "CVE-2022-2879",
"notes": [
{
"category": "description",
"text": "In Red Hat Migration Toolkit for Containers existieren mehrere Schwachstellen in den Komponenten \"async\" und \"golang\". Ein Angreifer kann dies ausnutzen, um seine Rechte zu erweitern, einen Denial of Service zu verursachen, Sicherheitsvorkehrungen zu umgehen und Informationen offenzulegen. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzeraktion oder eine Anmeldung erforderlich."
}
],
"product_status": {
"known_affected": [
"T008027",
"67646",
"T026206",
"T026435",
"T004914",
"T025990",
"T031839"
]
},
"release_date": "2023-02-08T23:00:00.000+00:00",
"title": "CVE-2022-2879"
},
{
"cve": "CVE-2022-2880",
"notes": [
{
"category": "description",
"text": "In Red Hat Migration Toolkit for Containers existieren mehrere Schwachstellen in den Komponenten \"async\" und \"golang\". Ein Angreifer kann dies ausnutzen, um seine Rechte zu erweitern, einen Denial of Service zu verursachen, Sicherheitsvorkehrungen zu umgehen und Informationen offenzulegen. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzeraktion oder eine Anmeldung erforderlich."
}
],
"product_status": {
"known_affected": [
"T008027",
"67646",
"T026206",
"T026435",
"T004914",
"T025990",
"T031839"
]
},
"release_date": "2023-02-08T23:00:00.000+00:00",
"title": "CVE-2022-2880"
},
{
"cve": "CVE-2022-32149",
"notes": [
{
"category": "description",
"text": "In Red Hat Migration Toolkit for Containers existieren mehrere Schwachstellen in den Komponenten \"async\" und \"golang\". Ein Angreifer kann dies ausnutzen, um seine Rechte zu erweitern, einen Denial of Service zu verursachen, Sicherheitsvorkehrungen zu umgehen und Informationen offenzulegen. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzeraktion oder eine Anmeldung erforderlich."
}
],
"product_status": {
"known_affected": [
"T008027",
"67646",
"T026206",
"T026435",
"T004914",
"T025990",
"T031839"
]
},
"release_date": "2023-02-08T23:00:00.000+00:00",
"title": "CVE-2022-32149"
},
{
"cve": "CVE-2022-32189",
"notes": [
{
"category": "description",
"text": "In Red Hat Migration Toolkit for Containers existieren mehrere Schwachstellen in den Komponenten \"async\" und \"golang\". Ein Angreifer kann dies ausnutzen, um seine Rechte zu erweitern, einen Denial of Service zu verursachen, Sicherheitsvorkehrungen zu umgehen und Informationen offenzulegen. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzeraktion oder eine Anmeldung erforderlich."
}
],
"product_status": {
"known_affected": [
"T008027",
"67646",
"T026206",
"T026435",
"T004914",
"T025990",
"T031839"
]
},
"release_date": "2023-02-08T23:00:00.000+00:00",
"title": "CVE-2022-32189"
},
{
"cve": "CVE-2022-32190",
"notes": [
{
"category": "description",
"text": "In Red Hat Migration Toolkit for Containers existieren mehrere Schwachstellen in den Komponenten \"async\" und \"golang\". Ein Angreifer kann dies ausnutzen, um seine Rechte zu erweitern, einen Denial of Service zu verursachen, Sicherheitsvorkehrungen zu umgehen und Informationen offenzulegen. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzeraktion oder eine Anmeldung erforderlich."
}
],
"product_status": {
"known_affected": [
"T008027",
"67646",
"T026206",
"T026435",
"T004914",
"T025990",
"T031839"
]
},
"release_date": "2023-02-08T23:00:00.000+00:00",
"title": "CVE-2022-32190"
},
{
"cve": "CVE-2022-41715",
"notes": [
{
"category": "description",
"text": "In Red Hat Migration Toolkit for Containers existieren mehrere Schwachstellen in den Komponenten \"async\" und \"golang\". Ein Angreifer kann dies ausnutzen, um seine Rechte zu erweitern, einen Denial of Service zu verursachen, Sicherheitsvorkehrungen zu umgehen und Informationen offenzulegen. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzeraktion oder eine Anmeldung erforderlich."
}
],
"product_status": {
"known_affected": [
"T008027",
"67646",
"T026206",
"T026435",
"T004914",
"T025990",
"T031839"
]
},
"release_date": "2023-02-08T23:00:00.000+00:00",
"title": "CVE-2022-41715"
},
{
"cve": "CVE-2022-41717",
"notes": [
{
"category": "description",
"text": "In Red Hat Migration Toolkit for Containers existieren mehrere Schwachstellen in den Komponenten \"async\" und \"golang\". Ein Angreifer kann dies ausnutzen, um seine Rechte zu erweitern, einen Denial of Service zu verursachen, Sicherheitsvorkehrungen zu umgehen und Informationen offenzulegen. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzeraktion oder eine Anmeldung erforderlich."
}
],
"product_status": {
"known_affected": [
"T008027",
"67646",
"T026206",
"T026435",
"T004914",
"T025990",
"T031839"
]
},
"release_date": "2023-02-08T23:00:00.000+00:00",
"title": "CVE-2022-41717"
}
]
}
wid-sec-w-2022-2134
Vulnerability from csaf_certbund
Notes
{
"document": {
"aggregate_severity": {
"text": "hoch"
},
"category": "csaf_base",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "de-DE",
"notes": [
{
"category": "legal_disclaimer",
"text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
},
{
"category": "description",
"text": "IBM Spectrum Protect ist eine zentralisierte Backupl\u00f6sung f\u00fcr Systeme im Netzwerk.",
"title": "Produktbeschreibung"
},
{
"category": "summary",
"text": "Ein entfernter, anonymer Angreifer kann mehrere Schwachstellen in IBM Spectrum Protect Plus Container Backup and Restore for Kubernetes and Red Hat OpenShift ausnutzen, um einen Cross site Scripting Angriff durchzuf\u00fchren, Informationen offenzulegen oder einen Denial of Service zu verursachen.",
"title": "Angriff"
},
{
"category": "general",
"text": "- Linux",
"title": "Betroffene Betriebssysteme"
}
],
"publisher": {
"category": "other",
"contact_details": "csaf-provider@cert-bund.de",
"name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"namespace": "https://www.bsi.bund.de"
},
"references": [
{
"category": "self",
"summary": "WID-SEC-W-2022-2134 - CSAF Version",
"url": "https://wid.cert-bund.de/.well-known/csaf/white/2022/wid-sec-w-2022-2134.json"
},
{
"category": "self",
"summary": "WID-SEC-2022-2134 - Portal Version",
"url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2022-2134"
},
{
"category": "external",
"summary": "IBM Security Bulletin 7005589 vom 2023-06-21",
"url": "https://www.ibm.com/support/pages/node/7005589"
},
{
"category": "external",
"summary": "IBM Security Bulletin vom 2022-11-20",
"url": "https://www.ibm.com/support/pages/node/6838883"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2022:8626 vom 2022-11-29",
"url": "https://access.redhat.com/errata/RHSA-2022:8626"
},
{
"category": "external",
"summary": "IBM Security Bulletin 6847653 vom 2022-12-20",
"url": "https://www.ibm.com/support/pages/node/6847653"
},
{
"category": "external",
"summary": "IBM Security Bulletin 6847643 vom 2022-12-20",
"url": "https://www.ibm.com/support/pages/node/6847643"
}
],
"source_lang": "en-US",
"title": "IBM Spectrum Protect: Mehrere Schwachstellen",
"tracking": {
"current_release_date": "2023-06-20T22:00:00.000+00:00",
"generator": {
"date": "2024-08-15T17:38:41.956+00:00",
"engine": {
"name": "BSI-WID",
"version": "1.3.5"
}
},
"id": "WID-SEC-W-2022-2134",
"initial_release_date": "2022-11-20T23:00:00.000+00:00",
"revision_history": [
{
"date": "2022-11-20T23:00:00.000+00:00",
"number": "1",
"summary": "Initiale Fassung"
},
{
"date": "2022-11-28T23:00:00.000+00:00",
"number": "2",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2022-12-20T23:00:00.000+00:00",
"number": "3",
"summary": "Neue Updates von IBM aufgenommen"
},
{
"date": "2023-06-20T22:00:00.000+00:00",
"number": "4",
"summary": "Neue Updates von IBM aufgenommen"
}
],
"status": "final",
"version": "4"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "IBM Spectrum Protect plus 10.1",
"product": {
"name": "IBM Spectrum Protect plus 10.1",
"product_id": "T015895",
"product_identification_helper": {
"cpe": "cpe:/a:ibm:spectrum_protect:plus_10.1"
}
}
},
{
"category": "product_name",
"name": "IBM Spectrum Protect 10.1",
"product": {
"name": "IBM Spectrum Protect 10.1",
"product_id": "T023657",
"product_identification_helper": {
"cpe": "cpe:/a:ibm:spectrum_protect:10.1"
}
}
},
{
"category": "product_name",
"name": "IBM Spectrum Protect \u003c plus 10.1.12.2",
"product": {
"name": "IBM Spectrum Protect \u003c plus 10.1.12.2",
"product_id": "T025369",
"product_identification_helper": {
"cpe": "cpe:/a:ibm:spectrum_protect:plus_10.1.12.2"
}
}
},
{
"category": "product_name",
"name": "IBM Spectrum Protect 8.1.17",
"product": {
"name": "IBM Spectrum Protect 8.1.17",
"product_id": "T025663",
"product_identification_helper": {
"cpe": "cpe:/a:ibm:spectrum_protect:8.1.17"
}
}
}
],
"category": "product_name",
"name": "Spectrum Protect"
}
],
"category": "vendor",
"name": "IBM"
},
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux",
"product": {
"name": "Red Hat Enterprise Linux",
"product_id": "67646",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:-"
}
}
}
],
"category": "vendor",
"name": "Red Hat"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2022-1705",
"notes": [
{
"category": "description",
"text": "In IBM Spectrum Protect Plus Container Backup and Restore for Kubernetes and Red Hat OpenShift existieren mehrere Schwachstellen. Diese bestehen in der Golang Go Komponente und erm\u00f6glichen es einem entfernten anonymen Angreifer einen Cross site Scripting Angriff durchzuf\u00fchren, Informationen offenzulegen oder einen Denial of Service zu verursachen."
}
],
"product_status": {
"known_affected": [
"67646",
"T023657",
"T025663",
"T015895"
]
},
"release_date": "2022-11-20T23:00:00.000+00:00",
"title": "CVE-2022-1705"
},
{
"cve": "CVE-2022-1962",
"notes": [
{
"category": "description",
"text": "In IBM Spectrum Protect Plus Container Backup and Restore for Kubernetes and Red Hat OpenShift existieren mehrere Schwachstellen. Diese bestehen in der Golang Go Komponente und erm\u00f6glichen es einem entfernten anonymen Angreifer einen Cross site Scripting Angriff durchzuf\u00fchren, Informationen offenzulegen oder einen Denial of Service zu verursachen."
}
],
"product_status": {
"known_affected": [
"67646",
"T023657",
"T025663",
"T015895"
]
},
"release_date": "2022-11-20T23:00:00.000+00:00",
"title": "CVE-2022-1962"
},
{
"cve": "CVE-2022-27664",
"notes": [
{
"category": "description",
"text": "In IBM Spectrum Protect Plus Container Backup and Restore for Kubernetes and Red Hat OpenShift existieren mehrere Schwachstellen. Diese bestehen in der Golang Go Komponente und erm\u00f6glichen es einem entfernten anonymen Angreifer einen Cross site Scripting Angriff durchzuf\u00fchren, Informationen offenzulegen oder einen Denial of Service zu verursachen."
}
],
"product_status": {
"known_affected": [
"67646",
"T023657",
"T025663",
"T015895"
]
},
"release_date": "2022-11-20T23:00:00.000+00:00",
"title": "CVE-2022-27664"
},
{
"cve": "CVE-2022-28131",
"notes": [
{
"category": "description",
"text": "In IBM Spectrum Protect Plus Container Backup and Restore for Kubernetes and Red Hat OpenShift existieren mehrere Schwachstellen. Diese bestehen in der Golang Go Komponente und erm\u00f6glichen es einem entfernten anonymen Angreifer einen Cross site Scripting Angriff durchzuf\u00fchren, Informationen offenzulegen oder einen Denial of Service zu verursachen."
}
],
"product_status": {
"known_affected": [
"67646",
"T023657",
"T025663",
"T015895"
]
},
"release_date": "2022-11-20T23:00:00.000+00:00",
"title": "CVE-2022-28131"
},
{
"cve": "CVE-2022-30630",
"notes": [
{
"category": "description",
"text": "In IBM Spectrum Protect Plus Container Backup and Restore for Kubernetes and Red Hat OpenShift existieren mehrere Schwachstellen. Diese bestehen in der Golang Go Komponente und erm\u00f6glichen es einem entfernten anonymen Angreifer einen Cross site Scripting Angriff durchzuf\u00fchren, Informationen offenzulegen oder einen Denial of Service zu verursachen."
}
],
"product_status": {
"known_affected": [
"67646",
"T023657",
"T025663",
"T015895"
]
},
"release_date": "2022-11-20T23:00:00.000+00:00",
"title": "CVE-2022-30630"
},
{
"cve": "CVE-2022-30631",
"notes": [
{
"category": "description",
"text": "In IBM Spectrum Protect Plus Container Backup and Restore for Kubernetes and Red Hat OpenShift existieren mehrere Schwachstellen. Diese bestehen in der Golang Go Komponente und erm\u00f6glichen es einem entfernten anonymen Angreifer einen Cross site Scripting Angriff durchzuf\u00fchren, Informationen offenzulegen oder einen Denial of Service zu verursachen."
}
],
"product_status": {
"known_affected": [
"67646",
"T023657",
"T025663",
"T015895"
]
},
"release_date": "2022-11-20T23:00:00.000+00:00",
"title": "CVE-2022-30631"
},
{
"cve": "CVE-2022-30632",
"notes": [
{
"category": "description",
"text": "In IBM Spectrum Protect Plus Container Backup and Restore for Kubernetes and Red Hat OpenShift existieren mehrere Schwachstellen. Diese bestehen in der Golang Go Komponente und erm\u00f6glichen es einem entfernten anonymen Angreifer einen Cross site Scripting Angriff durchzuf\u00fchren, Informationen offenzulegen oder einen Denial of Service zu verursachen."
}
],
"product_status": {
"known_affected": [
"67646",
"T023657",
"T025663",
"T015895"
]
},
"release_date": "2022-11-20T23:00:00.000+00:00",
"title": "CVE-2022-30632"
},
{
"cve": "CVE-2022-30633",
"notes": [
{
"category": "description",
"text": "In IBM Spectrum Protect Plus Container Backup and Restore for Kubernetes and Red Hat OpenShift existieren mehrere Schwachstellen. Diese bestehen in der Golang Go Komponente und erm\u00f6glichen es einem entfernten anonymen Angreifer einen Cross site Scripting Angriff durchzuf\u00fchren, Informationen offenzulegen oder einen Denial of Service zu verursachen."
}
],
"product_status": {
"known_affected": [
"67646",
"T023657",
"T025663",
"T015895"
]
},
"release_date": "2022-11-20T23:00:00.000+00:00",
"title": "CVE-2022-30633"
},
{
"cve": "CVE-2022-30635",
"notes": [
{
"category": "description",
"text": "In IBM Spectrum Protect Plus Container Backup and Restore for Kubernetes and Red Hat OpenShift existieren mehrere Schwachstellen. Diese bestehen in der Golang Go Komponente und erm\u00f6glichen es einem entfernten anonymen Angreifer einen Cross site Scripting Angriff durchzuf\u00fchren, Informationen offenzulegen oder einen Denial of Service zu verursachen."
}
],
"product_status": {
"known_affected": [
"67646",
"T023657",
"T025663",
"T015895"
]
},
"release_date": "2022-11-20T23:00:00.000+00:00",
"title": "CVE-2022-30635"
},
{
"cve": "CVE-2022-32148",
"notes": [
{
"category": "description",
"text": "In IBM Spectrum Protect Plus Container Backup and Restore for Kubernetes and Red Hat OpenShift existieren mehrere Schwachstellen. Diese bestehen in der Golang Go Komponente und erm\u00f6glichen es einem entfernten anonymen Angreifer einen Cross site Scripting Angriff durchzuf\u00fchren, Informationen offenzulegen oder einen Denial of Service zu verursachen."
}
],
"product_status": {
"known_affected": [
"67646",
"T023657",
"T025663",
"T015895"
]
},
"release_date": "2022-11-20T23:00:00.000+00:00",
"title": "CVE-2022-32148"
},
{
"cve": "CVE-2022-32149",
"notes": [
{
"category": "description",
"text": "In IBM Spectrum Protect Plus Container Backup and Restore for Kubernetes and Red Hat OpenShift existieren mehrere Schwachstellen. Diese bestehen in der Golang Go Komponente und erm\u00f6glichen es einem entfernten anonymen Angreifer einen Cross site Scripting Angriff durchzuf\u00fchren, Informationen offenzulegen oder einen Denial of Service zu verursachen."
}
],
"product_status": {
"known_affected": [
"67646",
"T023657",
"T025663",
"T015895"
]
},
"release_date": "2022-11-20T23:00:00.000+00:00",
"title": "CVE-2022-32149"
},
{
"cve": "CVE-2022-32189",
"notes": [
{
"category": "description",
"text": "In IBM Spectrum Protect Plus Container Backup and Restore for Kubernetes and Red Hat OpenShift existieren mehrere Schwachstellen. Diese bestehen in der Golang Go Komponente und erm\u00f6glichen es einem entfernten anonymen Angreifer einen Cross site Scripting Angriff durchzuf\u00fchren, Informationen offenzulegen oder einen Denial of Service zu verursachen."
}
],
"product_status": {
"known_affected": [
"67646",
"T023657",
"T025663",
"T015895"
]
},
"release_date": "2022-11-20T23:00:00.000+00:00",
"title": "CVE-2022-32189"
},
{
"cve": "CVE-2022-32190",
"notes": [
{
"category": "description",
"text": "In IBM Spectrum Protect Plus Container Backup and Restore for Kubernetes and Red Hat OpenShift existieren mehrere Schwachstellen. Diese bestehen in der Golang Go Komponente und erm\u00f6glichen es einem entfernten anonymen Angreifer einen Cross site Scripting Angriff durchzuf\u00fchren, Informationen offenzulegen oder einen Denial of Service zu verursachen."
}
],
"product_status": {
"known_affected": [
"67646",
"T023657",
"T025663",
"T015895"
]
},
"release_date": "2022-11-20T23:00:00.000+00:00",
"title": "CVE-2022-32190"
}
]
}
wid-sec-w-2023-0210
Vulnerability from csaf_certbund
Notes
{
"document": {
"aggregate_severity": {
"text": "mittel"
},
"category": "csaf_base",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "de-DE",
"notes": [
{
"category": "legal_disclaimer",
"text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
},
{
"category": "description",
"text": "Red Hat Enterprise Linux (RHEL) ist eine popul\u00e4re Linux-Distribution.",
"title": "Produktbeschreibung"
},
{
"category": "summary",
"text": "Ein entfernter, anonymer Angreifer kann eine Schwachstelle in Red Hat Enterprise Linux in der Komponente Submariner ausnutzen, um einen Denial of Service Angriff durchzuf\u00fchren.",
"title": "Angriff"
},
{
"category": "general",
"text": "- Linux",
"title": "Betroffene Betriebssysteme"
}
],
"publisher": {
"category": "other",
"contact_details": "csaf-provider@cert-bund.de",
"name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"namespace": "https://www.bsi.bund.de"
},
"references": [
{
"category": "self",
"summary": "WID-SEC-W-2023-0210 - CSAF Version",
"url": "https://wid.cert-bund.de/.well-known/csaf/white/2023/wid-sec-w-2023-0210.json"
},
{
"category": "self",
"summary": "WID-SEC-2023-0210 - Portal Version",
"url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2023-0210"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2023:0481 vom 2023-01-26",
"url": "https://access.redhat.com/errata/RHSA-2023:0481"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2023:0692 vom 2023-02-09",
"url": "https://access.redhat.com/errata/RHSA-2023:0692"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2023:0795 vom 2023-02-16",
"url": "https://access.redhat.com/errata/RHSA-2023:0795"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALASDOCKER-2024-035 vom 2024-01-24",
"url": "https://alas.aws.amazon.com/AL2/ALASDOCKER-2024-035.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2023:3613 vom 2023-06-27",
"url": "https://access.redhat.com/errata/RHSA-2023:3613"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:2077 vom 2024-04-29",
"url": "https://access.redhat.com/errata/RHSA-2024:2077"
}
],
"source_lang": "en-US",
"title": "Red Hat Enterprise Linux (Submariner): Schwachstelle erm\u00f6glicht Denial of Service",
"tracking": {
"current_release_date": "2024-04-28T22:00:00.000+00:00",
"generator": {
"date": "2024-08-15T17:42:38.391+00:00",
"engine": {
"name": "BSI-WID",
"version": "1.3.5"
}
},
"id": "WID-SEC-W-2023-0210",
"initial_release_date": "2023-01-26T23:00:00.000+00:00",
"revision_history": [
{
"date": "2023-01-26T23:00:00.000+00:00",
"number": "1",
"summary": "Initiale Fassung"
},
{
"date": "2023-02-08T23:00:00.000+00:00",
"number": "2",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2023-02-15T23:00:00.000+00:00",
"number": "3",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2023-06-26T22:00:00.000+00:00",
"number": "4",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2024-01-24T23:00:00.000+00:00",
"number": "5",
"summary": "Neue Updates von Amazon aufgenommen"
},
{
"date": "2024-04-28T22:00:00.000+00:00",
"number": "6",
"summary": "Neue Updates von Red Hat aufgenommen"
}
],
"status": "final",
"version": "6"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Amazon Linux 2",
"product": {
"name": "Amazon Linux 2",
"product_id": "398363",
"product_identification_helper": {
"cpe": "cpe:/o:amazon:linux_2:-"
}
}
}
],
"category": "vendor",
"name": "Amazon"
},
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux",
"product": {
"name": "Red Hat Enterprise Linux",
"product_id": "67646",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:-"
}
}
},
{
"category": "product_version",
"name": "8",
"product": {
"name": "Red Hat Enterprise Linux 8",
"product_id": "T014111",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:8"
}
}
}
],
"category": "product_name",
"name": "Enterprise Linux"
},
{
"branches": [
{
"category": "product_version_range",
"name": "Container Platform \u003c4.12.22",
"product": {
"name": "Red Hat OpenShift Container Platform \u003c4.12.22",
"product_id": "T028307"
}
}
],
"category": "product_name",
"name": "OpenShift"
}
],
"category": "vendor",
"name": "Red Hat"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2022-32149",
"notes": [
{
"category": "description",
"text": "Es existiert eine Schwachstelle in Red Hat Enterprise Linux. Diese besteht in der Komponente \"Submariner\" bzw. in dessen Modul \"Golang\" und ist auf einen Fehler beim Verarbeiten von bestimmten Headern zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstelle ausnutzen, um einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"67646",
"T028307",
"398363",
"T014111"
]
},
"release_date": "2023-01-26T23:00:00.000+00:00",
"title": "CVE-2022-32149"
}
]
}
WID-SEC-W-2023-2229
Vulnerability from csaf_certbund
Notes
{
"document": {
"aggregate_severity": {
"text": "hoch"
},
"category": "csaf_base",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "de-DE",
"notes": [
{
"category": "legal_disclaimer",
"text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
},
{
"category": "description",
"text": "Splunk Enterprise erm\u00f6glicht Monitoring und Analyse von Clickstream-Daten und Kundentransaktionen.",
"title": "Produktbeschreibung"
},
{
"category": "summary",
"text": "Ein entfernter, authentifizierter Angreifer kann mehrere Schwachstellen in Splunk Splunk Enterprise ausnutzen, um beliebigen Code auszuf\u00fchren, einen \u0027Denial of Service\u0027-Zustand zu verursachen, seine Privilegien zu erweitern und weitere, nicht spezifizierte Auswirkungen zu verursachen.",
"title": "Angriff"
},
{
"category": "general",
"text": "- Linux\n- MacOS X\n- Windows",
"title": "Betroffene Betriebssysteme"
}
],
"publisher": {
"category": "other",
"contact_details": "csaf-provider@cert-bund.de",
"name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"namespace": "https://www.bsi.bund.de"
},
"references": [
{
"category": "self",
"summary": "WID-SEC-W-2023-2229 - CSAF Version",
"url": "https://wid.cert-bund.de/.well-known/csaf/white/2023/wid-sec-w-2023-2229.json"
},
{
"category": "self",
"summary": "WID-SEC-2023-2229 - Portal Version",
"url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2023-2229"
},
{
"category": "external",
"summary": "Splunk Security Advisory vom 2023-08-30",
"url": "https://advisory.splunk.com//advisories/SVD-2023-0801"
},
{
"category": "external",
"summary": "Splunk Security Advisory vom 2023-08-30",
"url": "https://advisory.splunk.com//advisories/SVD-2023-0802"
},
{
"category": "external",
"summary": "Splunk Security Advisory vom 2023-08-30",
"url": "https://advisory.splunk.com//advisories/SVD-2023-0803"
},
{
"category": "external",
"summary": "Splunk Security Advisory vom 2023-08-30",
"url": "https://advisory.splunk.com//advisories/SVD-2023-0804"
},
{
"category": "external",
"summary": "Splunk Security Advisory vom 2023-08-30",
"url": "https://advisory.splunk.com//advisories/SVD-2023-0805"
},
{
"category": "external",
"summary": "Splunk Security Advisory vom 2023-08-30",
"url": "https://advisory.splunk.com//advisories/SVD-2023-0806"
},
{
"category": "external",
"summary": "Splunk Security Advisory vom 2023-08-30",
"url": "https://advisory.splunk.com//advisories/SVD-2023-0807"
},
{
"category": "external",
"summary": "Splunk Security Advisory vom 2023-08-30",
"url": "https://advisory.splunk.com//advisories/SVD-2023-0808"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:0196-1 vom 2024-01-23",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-January/017743.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2024-2988 vom 2024-05-28",
"url": "https://linux.oracle.com/errata/ELSA-2024-2988.html"
},
{
"category": "external",
"summary": "Splunk Security Advisory SVD-2024-0718 vom 2024-07-02",
"url": "https://advisory.splunk.com/advisories/SVD-2024-0718"
},
{
"category": "external",
"summary": "Splunk Security Advisory SVD-2024-0801 vom 2024-08-12",
"url": "https://advisory.splunk.com//advisories/SVD-2024-0801"
}
],
"source_lang": "en-US",
"title": "Splunk Splunk Enterprise: Mehrere Schwachstellen",
"tracking": {
"current_release_date": "2024-08-12T22:00:00.000+00:00",
"generator": {
"date": "2024-08-15T17:57:53.670+00:00",
"engine": {
"name": "BSI-WID",
"version": "1.3.5"
}
},
"id": "WID-SEC-W-2023-2229",
"initial_release_date": "2023-08-30T22:00:00.000+00:00",
"revision_history": [
{
"date": "2023-08-30T22:00:00.000+00:00",
"number": "1",
"summary": "Initiale Fassung"
},
{
"date": "2024-01-23T23:00:00.000+00:00",
"number": "2",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2024-05-28T22:00:00.000+00:00",
"number": "3",
"summary": "Neue Updates von Oracle Linux aufgenommen"
},
{
"date": "2024-07-01T22:00:00.000+00:00",
"number": "4",
"summary": "Neue Updates von Splunk-SVD aufgenommen"
},
{
"date": "2024-08-12T22:00:00.000+00:00",
"number": "5",
"summary": "Neue Updates von Splunk-SVD aufgenommen"
}
],
"status": "final",
"version": "5"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Oracle Linux",
"product": {
"name": "Oracle Linux",
"product_id": "T004914",
"product_identification_helper": {
"cpe": "cpe:/o:oracle:linux:-"
}
}
}
],
"category": "vendor",
"name": "Oracle"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux",
"product": {
"name": "SUSE Linux",
"product_id": "T002207",
"product_identification_helper": {
"cpe": "cpe:/o:suse:suse_linux:-"
}
}
}
],
"category": "vendor",
"name": "SUSE"
},
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Splunk Splunk Enterprise",
"product": {
"name": "Splunk Splunk Enterprise",
"product_id": "T008911",
"product_identification_helper": {
"cpe": "cpe:/a:splunk:splunk:-"
}
}
},
{
"category": "product_version_range",
"name": "\u003c9.1.1",
"product": {
"name": "Splunk Splunk Enterprise \u003c9.1.1",
"product_id": "T029634"
}
},
{
"category": "product_version_range",
"name": "\u003c9.0.6",
"product": {
"name": "Splunk Splunk Enterprise \u003c9.0.6",
"product_id": "T029635"
}
},
{
"category": "product_version_range",
"name": "\u003c8.2.12",
"product": {
"name": "Splunk Splunk Enterprise \u003c8.2.12",
"product_id": "T029636"
}
},
{
"category": "product_version_range",
"name": "\u003c9.2.1",
"product": {
"name": "Splunk Splunk Enterprise \u003c9.2.1",
"product_id": "T033705"
}
},
{
"category": "product_version_range",
"name": "\u003c9.1.4",
"product": {
"name": "Splunk Splunk Enterprise \u003c9.1.4",
"product_id": "T033718"
}
},
{
"category": "product_version_range",
"name": "\u003c9.0.9",
"product": {
"name": "Splunk Splunk Enterprise \u003c9.0.9",
"product_id": "T033720"
}
}
],
"category": "product_name",
"name": "Splunk Enterprise"
}
],
"category": "vendor",
"name": "Splunk"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2013-7489",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033720",
"T002207",
"T008911",
"T033718",
"T033705",
"T004914"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2013-7489"
},
{
"cve": "CVE-2018-10237",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033720",
"T002207",
"T008911",
"T033718",
"T033705",
"T004914"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2018-10237"
},
{
"cve": "CVE-2018-20225",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033720",
"T002207",
"T008911",
"T033718",
"T033705",
"T004914"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2018-20225"
},
{
"cve": "CVE-2019-20454",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033720",
"T002207",
"T008911",
"T033718",
"T033705",
"T004914"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2019-20454"
},
{
"cve": "CVE-2019-20838",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033720",
"T002207",
"T008911",
"T033718",
"T033705",
"T004914"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2019-20838"
},
{
"cve": "CVE-2020-14155",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033720",
"T002207",
"T008911",
"T033718",
"T033705",
"T004914"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2020-14155"
},
{
"cve": "CVE-2020-28469",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033720",
"T002207",
"T008911",
"T033718",
"T033705",
"T004914"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2020-28469"
},
{
"cve": "CVE-2020-28851",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033720",
"T002207",
"T008911",
"T033718",
"T033705",
"T004914"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2020-28851"
},
{
"cve": "CVE-2020-29652",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033720",
"T002207",
"T008911",
"T033718",
"T033705",
"T004914"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2020-29652"
},
{
"cve": "CVE-2020-8169",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033720",
"T002207",
"T008911",
"T033718",
"T033705",
"T004914"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2020-8169"
},
{
"cve": "CVE-2020-8177",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033720",
"T002207",
"T008911",
"T033718",
"T033705",
"T004914"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2020-8177"
},
{
"cve": "CVE-2020-8231",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033720",
"T002207",
"T008911",
"T033718",
"T033705",
"T004914"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2020-8231"
},
{
"cve": "CVE-2020-8284",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033720",
"T002207",
"T008911",
"T033718",
"T033705",
"T004914"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2020-8284"
},
{
"cve": "CVE-2020-8285",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033720",
"T002207",
"T008911",
"T033718",
"T033705",
"T004914"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2020-8285"
},
{
"cve": "CVE-2020-8286",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033720",
"T002207",
"T008911",
"T033718",
"T033705",
"T004914"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2020-8286"
},
{
"cve": "CVE-2020-8908",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033720",
"T002207",
"T008911",
"T033718",
"T033705",
"T004914"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2020-8908"
},
{
"cve": "CVE-2021-20066",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033720",
"T002207",
"T008911",
"T033718",
"T033705",
"T004914"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2021-20066"
},
{
"cve": "CVE-2021-22569",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033720",
"T002207",
"T008911",
"T033718",
"T033705",
"T004914"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2021-22569"
},
{
"cve": "CVE-2021-22876",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033720",
"T002207",
"T008911",
"T033718",
"T033705",
"T004914"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2021-22876"
},
{
"cve": "CVE-2021-22890",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033720",
"T002207",
"T008911",
"T033718",
"T033705",
"T004914"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2021-22890"
},
{
"cve": "CVE-2021-22897",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033720",
"T002207",
"T008911",
"T033718",
"T033705",
"T004914"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2021-22897"
},
{
"cve": "CVE-2021-22898",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033720",
"T002207",
"T008911",
"T033718",
"T033705",
"T004914"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2021-22898"
},
{
"cve": "CVE-2021-22901",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033720",
"T002207",
"T008911",
"T033718",
"T033705",
"T004914"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2021-22901"
},
{
"cve": "CVE-2021-22922",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033720",
"T002207",
"T008911",
"T033718",
"T033705",
"T004914"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2021-22922"
},
{
"cve": "CVE-2021-22923",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033720",
"T002207",
"T008911",
"T033718",
"T033705",
"T004914"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2021-22923"
},
{
"cve": "CVE-2021-22924",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033720",
"T002207",
"T008911",
"T033718",
"T033705",
"T004914"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2021-22924"
},
{
"cve": "CVE-2021-22925",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033720",
"T002207",
"T008911",
"T033718",
"T033705",
"T004914"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2021-22925"
},
{
"cve": "CVE-2021-22926",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033720",
"T002207",
"T008911",
"T033718",
"T033705",
"T004914"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2021-22926"
},
{
"cve": "CVE-2021-22945",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033720",
"T002207",
"T008911",
"T033718",
"T033705",
"T004914"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2021-22945"
},
{
"cve": "CVE-2021-22946",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033720",
"T002207",
"T008911",
"T033718",
"T033705",
"T004914"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2021-22946"
},
{
"cve": "CVE-2021-22947",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033720",
"T002207",
"T008911",
"T033718",
"T033705",
"T004914"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2021-22947"
},
{
"cve": "CVE-2021-23343",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033720",
"T002207",
"T008911",
"T033718",
"T033705",
"T004914"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2021-23343"
},
{
"cve": "CVE-2021-23382",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033720",
"T002207",
"T008911",
"T033718",
"T033705",
"T004914"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2021-23382"
},
{
"cve": "CVE-2021-27918",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033720",
"T002207",
"T008911",
"T033718",
"T033705",
"T004914"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2021-27918"
},
{
"cve": "CVE-2021-27919",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033720",
"T002207",
"T008911",
"T033718",
"T033705",
"T004914"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2021-27919"
},
{
"cve": "CVE-2021-29060",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033720",
"T002207",
"T008911",
"T033718",
"T033705",
"T004914"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2021-29060"
},
{
"cve": "CVE-2021-29425",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033720",
"T002207",
"T008911",
"T033718",
"T033705",
"T004914"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2021-29425"
},
{
"cve": "CVE-2021-29923",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033720",
"T002207",
"T008911",
"T033718",
"T033705",
"T004914"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2021-29923"
},
{
"cve": "CVE-2021-31525",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033720",
"T002207",
"T008911",
"T033718",
"T033705",
"T004914"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2021-31525"
},
{
"cve": "CVE-2021-31566",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033720",
"T002207",
"T008911",
"T033718",
"T033705",
"T004914"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2021-31566"
},
{
"cve": "CVE-2021-33194",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033720",
"T002207",
"T008911",
"T033718",
"T033705",
"T004914"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2021-33194"
},
{
"cve": "CVE-2021-33195",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033720",
"T002207",
"T008911",
"T033718",
"T033705",
"T004914"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2021-33195"
},
{
"cve": "CVE-2021-33196",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033720",
"T002207",
"T008911",
"T033718",
"T033705",
"T004914"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2021-33196"
},
{
"cve": "CVE-2021-33197",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033720",
"T002207",
"T008911",
"T033718",
"T033705",
"T004914"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2021-33197"
},
{
"cve": "CVE-2021-33198",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033720",
"T002207",
"T008911",
"T033718",
"T033705",
"T004914"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2021-33198"
},
{
"cve": "CVE-2021-34558",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033720",
"T002207",
"T008911",
"T033718",
"T033705",
"T004914"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2021-34558"
},
{
"cve": "CVE-2021-3520",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033720",
"T002207",
"T008911",
"T033718",
"T033705",
"T004914"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2021-3520"
},
{
"cve": "CVE-2021-3572",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033720",
"T002207",
"T008911",
"T033718",
"T033705",
"T004914"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2021-3572"
},
{
"cve": "CVE-2021-36221",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033720",
"T002207",
"T008911",
"T033718",
"T033705",
"T004914"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2021-36221"
},
{
"cve": "CVE-2021-36976",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033720",
"T002207",
"T008911",
"T033718",
"T033705",
"T004914"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2021-36976"
},
{
"cve": "CVE-2021-3803",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033720",
"T002207",
"T008911",
"T033718",
"T033705",
"T004914"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2021-3803"
},
{
"cve": "CVE-2021-38297",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033720",
"T002207",
"T008911",
"T033718",
"T033705",
"T004914"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2021-38297"
},
{
"cve": "CVE-2021-38561",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033720",
"T002207",
"T008911",
"T033718",
"T033705",
"T004914"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2021-38561"
},
{
"cve": "CVE-2021-39293",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033720",
"T002207",
"T008911",
"T033718",
"T033705",
"T004914"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2021-39293"
},
{
"cve": "CVE-2021-41182",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033720",
"T002207",
"T008911",
"T033718",
"T033705",
"T004914"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2021-41182"
},
{
"cve": "CVE-2021-41183",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033720",
"T002207",
"T008911",
"T033718",
"T033705",
"T004914"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2021-41183"
},
{
"cve": "CVE-2021-41184",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033720",
"T002207",
"T008911",
"T033718",
"T033705",
"T004914"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2021-41184"
},
{
"cve": "CVE-2021-41771",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033720",
"T002207",
"T008911",
"T033718",
"T033705",
"T004914"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2021-41771"
},
{
"cve": "CVE-2021-41772",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033720",
"T002207",
"T008911",
"T033718",
"T033705",
"T004914"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2021-41772"
},
{
"cve": "CVE-2021-43565",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033720",
"T002207",
"T008911",
"T033718",
"T033705",
"T004914"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2021-43565"
},
{
"cve": "CVE-2021-44716",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033720",
"T002207",
"T008911",
"T033718",
"T033705",
"T004914"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2021-44716"
},
{
"cve": "CVE-2021-44717",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033720",
"T002207",
"T008911",
"T033718",
"T033705",
"T004914"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2021-44717"
},
{
"cve": "CVE-2022-1705",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033720",
"T002207",
"T008911",
"T033718",
"T033705",
"T004914"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2022-1705"
},
{
"cve": "CVE-2022-1941",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033720",
"T002207",
"T008911",
"T033718",
"T033705",
"T004914"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2022-1941"
},
{
"cve": "CVE-2022-1962",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033720",
"T002207",
"T008911",
"T033718",
"T033705",
"T004914"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2022-1962"
},
{
"cve": "CVE-2022-22576",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033720",
"T002207",
"T008911",
"T033718",
"T033705",
"T004914"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2022-22576"
},
{
"cve": "CVE-2022-2309",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033720",
"T002207",
"T008911",
"T033718",
"T033705",
"T004914"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2022-2309"
},
{
"cve": "CVE-2022-23491",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033720",
"T002207",
"T008911",
"T033718",
"T033705",
"T004914"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2022-23491"
},
{
"cve": "CVE-2022-23772",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033720",
"T002207",
"T008911",
"T033718",
"T033705",
"T004914"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2022-23772"
},
{
"cve": "CVE-2022-23773",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033720",
"T002207",
"T008911",
"T033718",
"T033705",
"T004914"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2022-23773"
},
{
"cve": "CVE-2022-23806",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033720",
"T002207",
"T008911",
"T033718",
"T033705",
"T004914"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2022-23806"
},
{
"cve": "CVE-2022-24675",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033720",
"T002207",
"T008911",
"T033718",
"T033705",
"T004914"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2022-24675"
},
{
"cve": "CVE-2022-24921",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033720",
"T002207",
"T008911",
"T033718",
"T033705",
"T004914"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2022-24921"
},
{
"cve": "CVE-2022-24999",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033720",
"T002207",
"T008911",
"T033718",
"T033705",
"T004914"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2022-24999"
},
{
"cve": "CVE-2022-25881",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033720",
"T002207",
"T008911",
"T033718",
"T033705",
"T004914"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2022-25881"
},
{
"cve": "CVE-2022-27191",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033720",
"T002207",
"T008911",
"T033718",
"T033705",
"T004914"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2022-27191"
},
{
"cve": "CVE-2022-27536",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033720",
"T002207",
"T008911",
"T033718",
"T033705",
"T004914"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2022-27536"
},
{
"cve": "CVE-2022-27664",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033720",
"T002207",
"T008911",
"T033718",
"T033705",
"T004914"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2022-27664"
},
{
"cve": "CVE-2022-27774",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033720",
"T002207",
"T008911",
"T033718",
"T033705",
"T004914"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2022-27774"
},
{
"cve": "CVE-2022-27775",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033720",
"T002207",
"T008911",
"T033718",
"T033705",
"T004914"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2022-27775"
},
{
"cve": "CVE-2022-27776",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033720",
"T002207",
"T008911",
"T033718",
"T033705",
"T004914"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2022-27776"
},
{
"cve": "CVE-2022-27778",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033720",
"T002207",
"T008911",
"T033718",
"T033705",
"T004914"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2022-27778"
},
{
"cve": "CVE-2022-27779",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033720",
"T002207",
"T008911",
"T033718",
"T033705",
"T004914"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2022-27779"
},
{
"cve": "CVE-2022-27780",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033720",
"T002207",
"T008911",
"T033718",
"T033705",
"T004914"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2022-27780"
},
{
"cve": "CVE-2022-27781",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033720",
"T002207",
"T008911",
"T033718",
"T033705",
"T004914"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2022-27781"
},
{
"cve": "CVE-2022-27782",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033720",
"T002207",
"T008911",
"T033718",
"T033705",
"T004914"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2022-27782"
},
{
"cve": "CVE-2022-28131",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033720",
"T002207",
"T008911",
"T033718",
"T033705",
"T004914"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2022-28131"
},
{
"cve": "CVE-2022-28327",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033720",
"T002207",
"T008911",
"T033718",
"T033705",
"T004914"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2022-28327"
},
{
"cve": "CVE-2022-2879",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033720",
"T002207",
"T008911",
"T033718",
"T033705",
"T004914"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2022-2879"
},
{
"cve": "CVE-2022-2880",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033720",
"T002207",
"T008911",
"T033718",
"T033705",
"T004914"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2022-2880"
},
{
"cve": "CVE-2022-29526",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033720",
"T002207",
"T008911",
"T033718",
"T033705",
"T004914"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2022-29526"
},
{
"cve": "CVE-2022-29804",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033720",
"T002207",
"T008911",
"T033718",
"T033705",
"T004914"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2022-29804"
},
{
"cve": "CVE-2022-30115",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033720",
"T002207",
"T008911",
"T033718",
"T033705",
"T004914"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2022-30115"
},
{
"cve": "CVE-2022-30580",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033720",
"T002207",
"T008911",
"T033718",
"T033705",
"T004914"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2022-30580"
},
{
"cve": "CVE-2022-30629",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033720",
"T002207",
"T008911",
"T033718",
"T033705",
"T004914"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2022-30629"
},
{
"cve": "CVE-2022-30630",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033720",
"T002207",
"T008911",
"T033718",
"T033705",
"T004914"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2022-30630"
},
{
"cve": "CVE-2022-30631",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033720",
"T002207",
"T008911",
"T033718",
"T033705",
"T004914"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2022-30631"
},
{
"cve": "CVE-2022-30632",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033720",
"T002207",
"T008911",
"T033718",
"T033705",
"T004914"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2022-30632"
},
{
"cve": "CVE-2022-30633",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033720",
"T002207",
"T008911",
"T033718",
"T033705",
"T004914"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2022-30633"
},
{
"cve": "CVE-2022-30634",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033720",
"T002207",
"T008911",
"T033718",
"T033705",
"T004914"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2022-30634"
},
{
"cve": "CVE-2022-30635",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033720",
"T002207",
"T008911",
"T033718",
"T033705",
"T004914"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2022-30635"
},
{
"cve": "CVE-2022-31129",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033720",
"T002207",
"T008911",
"T033718",
"T033705",
"T004914"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2022-31129"
},
{
"cve": "CVE-2022-3171",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033720",
"T002207",
"T008911",
"T033718",
"T033705",
"T004914"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2022-3171"
},
{
"cve": "CVE-2022-32148",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033720",
"T002207",
"T008911",
"T033718",
"T033705",
"T004914"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2022-32148"
},
{
"cve": "CVE-2022-32149",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033720",
"T002207",
"T008911",
"T033718",
"T033705",
"T004914"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2022-32149"
},
{
"cve": "CVE-2022-32189",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033720",
"T002207",
"T008911",
"T033718",
"T033705",
"T004914"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2022-32189"
},
{
"cve": "CVE-2022-32205",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033720",
"T002207",
"T008911",
"T033718",
"T033705",
"T004914"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2022-32205"
},
{
"cve": "CVE-2022-32206",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033720",
"T002207",
"T008911",
"T033718",
"T033705",
"T004914"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2022-32206"
},
{
"cve": "CVE-2022-32207",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033720",
"T002207",
"T008911",
"T033718",
"T033705",
"T004914"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2022-32207"
},
{
"cve": "CVE-2022-32208",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033720",
"T002207",
"T008911",
"T033718",
"T033705",
"T004914"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2022-32208"
},
{
"cve": "CVE-2022-32221",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033720",
"T002207",
"T008911",
"T033718",
"T033705",
"T004914"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2022-32221"
},
{
"cve": "CVE-2022-33987",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033720",
"T002207",
"T008911",
"T033718",
"T033705",
"T004914"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2022-33987"
},
{
"cve": "CVE-2022-3509",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033720",
"T002207",
"T008911",
"T033718",
"T033705",
"T004914"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2022-3509"
},
{
"cve": "CVE-2022-3510",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033720",
"T002207",
"T008911",
"T033718",
"T033705",
"T004914"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2022-3510"
},
{
"cve": "CVE-2022-3517",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033720",
"T002207",
"T008911",
"T033718",
"T033705",
"T004914"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2022-3517"
},
{
"cve": "CVE-2022-35252",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033720",
"T002207",
"T008911",
"T033718",
"T033705",
"T004914"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2022-35252"
},
{
"cve": "CVE-2022-35260",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033720",
"T002207",
"T008911",
"T033718",
"T033705",
"T004914"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2022-35260"
},
{
"cve": "CVE-2022-35737",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033720",
"T002207",
"T008911",
"T033718",
"T033705",
"T004914"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2022-35737"
},
{
"cve": "CVE-2022-36227",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033720",
"T002207",
"T008911",
"T033718",
"T033705",
"T004914"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2022-36227"
},
{
"cve": "CVE-2022-37599",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033720",
"T002207",
"T008911",
"T033718",
"T033705",
"T004914"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2022-37599"
},
{
"cve": "CVE-2022-37601",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033720",
"T002207",
"T008911",
"T033718",
"T033705",
"T004914"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2022-37601"
},
{
"cve": "CVE-2022-37603",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033720",
"T002207",
"T008911",
"T033718",
"T033705",
"T004914"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2022-37603"
},
{
"cve": "CVE-2022-38900",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033720",
"T002207",
"T008911",
"T033718",
"T033705",
"T004914"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2022-38900"
},
{
"cve": "CVE-2022-40023",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033720",
"T002207",
"T008911",
"T033718",
"T033705",
"T004914"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2022-40023"
},
{
"cve": "CVE-2022-40897",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033720",
"T002207",
"T008911",
"T033718",
"T033705",
"T004914"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2022-40897"
},
{
"cve": "CVE-2022-40899",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033720",
"T002207",
"T008911",
"T033718",
"T033705",
"T004914"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2022-40899"
},
{
"cve": "CVE-2022-41715",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033720",
"T002207",
"T008911",
"T033718",
"T033705",
"T004914"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2022-41715"
},
{
"cve": "CVE-2022-41716",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033720",
"T002207",
"T008911",
"T033718",
"T033705",
"T004914"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2022-41716"
},
{
"cve": "CVE-2022-41720",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033720",
"T002207",
"T008911",
"T033718",
"T033705",
"T004914"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2022-41720"
},
{
"cve": "CVE-2022-41722",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033720",
"T002207",
"T008911",
"T033718",
"T033705",
"T004914"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2022-41722"
},
{
"cve": "CVE-2022-42003",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033720",
"T002207",
"T008911",
"T033718",
"T033705",
"T004914"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2022-42003"
},
{
"cve": "CVE-2022-42004",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033720",
"T002207",
"T008911",
"T033718",
"T033705",
"T004914"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2022-42004"
},
{
"cve": "CVE-2022-42915",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033720",
"T002207",
"T008911",
"T033718",
"T033705",
"T004914"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2022-42915"
},
{
"cve": "CVE-2022-42916",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033720",
"T002207",
"T008911",
"T033718",
"T033705",
"T004914"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2022-42916"
},
{
"cve": "CVE-2022-43551",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033720",
"T002207",
"T008911",
"T033718",
"T033705",
"T004914"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2022-43551"
},
{
"cve": "CVE-2022-43552",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033720",
"T002207",
"T008911",
"T033718",
"T033705",
"T004914"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2022-43552"
},
{
"cve": "CVE-2022-46175",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033720",
"T002207",
"T008911",
"T033718",
"T033705",
"T004914"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2022-46175"
},
{
"cve": "CVE-2023-23914",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033720",
"T002207",
"T008911",
"T033718",
"T033705",
"T004914"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2023-23914"
},
{
"cve": "CVE-2023-23915",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033720",
"T002207",
"T008911",
"T033718",
"T033705",
"T004914"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2023-23915"
},
{
"cve": "CVE-2023-23916",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033720",
"T002207",
"T008911",
"T033718",
"T033705",
"T004914"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2023-23916"
},
{
"cve": "CVE-2023-24539",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033720",
"T002207",
"T008911",
"T033718",
"T033705",
"T004914"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2023-24539"
},
{
"cve": "CVE-2023-24540",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033720",
"T002207",
"T008911",
"T033718",
"T033705",
"T004914"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2023-24540"
},
{
"cve": "CVE-2023-27533",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033720",
"T002207",
"T008911",
"T033718",
"T033705",
"T004914"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2023-27533"
},
{
"cve": "CVE-2023-27534",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033720",
"T002207",
"T008911",
"T033718",
"T033705",
"T004914"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2023-27534"
},
{
"cve": "CVE-2023-27535",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033720",
"T002207",
"T008911",
"T033718",
"T033705",
"T004914"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2023-27535"
},
{
"cve": "CVE-2023-27536",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033720",
"T002207",
"T008911",
"T033718",
"T033705",
"T004914"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2023-27536"
},
{
"cve": "CVE-2023-27537",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033720",
"T002207",
"T008911",
"T033718",
"T033705",
"T004914"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2023-27537"
},
{
"cve": "CVE-2023-27538",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033720",
"T002207",
"T008911",
"T033718",
"T033705",
"T004914"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2023-27538"
},
{
"cve": "CVE-2023-29400",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033720",
"T002207",
"T008911",
"T033718",
"T033705",
"T004914"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2023-29400"
},
{
"cve": "CVE-2023-29402",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033720",
"T002207",
"T008911",
"T033718",
"T033705",
"T004914"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2023-29402"
},
{
"cve": "CVE-2023-29403",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033720",
"T002207",
"T008911",
"T033718",
"T033705",
"T004914"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2023-29403"
},
{
"cve": "CVE-2023-29404",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033720",
"T002207",
"T008911",
"T033718",
"T033705",
"T004914"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2023-29404"
},
{
"cve": "CVE-2023-29405",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033720",
"T002207",
"T008911",
"T033718",
"T033705",
"T004914"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2023-29405"
},
{
"cve": "CVE-2023-40592",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in Splunk Splunk Enterprise. Diese Fehler bestehen in den REST-Endpunkten /app/search/table, /saml/acs, Serialized Session Payload, Dynamic Link Library, runshellscript.py und in den runshellscript-Komponenten sowie in der SPL-Funktion \u0027printf\u0027, u. a. aufgrund eines reflektierten Cross-Site-Scripting (XSS), einer unsachgem\u00e4\u00dfen Signaturvalidierung, einer unsachgem\u00e4\u00dfen Ausdrucksvalidierung und eines Path Traversal. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, einen \u0027Denial of Service\u0027-Zustand zu verursachen und seine Privilegien zu erweitern."
}
],
"product_status": {
"known_affected": [
"T033720",
"T002207",
"T008911",
"T033718",
"T033705",
"T004914"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2023-40592"
},
{
"cve": "CVE-2023-40593",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in Splunk Splunk Enterprise. Diese Fehler bestehen in den REST-Endpunkten /app/search/table, /saml/acs, Serialized Session Payload, Dynamic Link Library, runshellscript.py und in den runshellscript-Komponenten sowie in der SPL-Funktion \u0027printf\u0027, u. a. aufgrund eines reflektierten Cross-Site-Scripting (XSS), einer unsachgem\u00e4\u00dfen Signaturvalidierung, einer unsachgem\u00e4\u00dfen Ausdrucksvalidierung und eines Path Traversal. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, einen \u0027Denial of Service\u0027-Zustand zu verursachen und seine Privilegien zu erweitern."
}
],
"product_status": {
"known_affected": [
"T033720",
"T002207",
"T008911",
"T033718",
"T033705",
"T004914"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2023-40593"
},
{
"cve": "CVE-2023-40594",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in Splunk Splunk Enterprise. Diese Fehler bestehen in den REST-Endpunkten /app/search/table, /saml/acs, Serialized Session Payload, Dynamic Link Library, runshellscript.py und in den runshellscript-Komponenten sowie in der SPL-Funktion \u0027printf\u0027, u. a. aufgrund eines reflektierten Cross-Site-Scripting (XSS), einer unsachgem\u00e4\u00dfen Signaturvalidierung, einer unsachgem\u00e4\u00dfen Ausdrucksvalidierung und eines Path Traversal. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, einen \u0027Denial of Service\u0027-Zustand zu verursachen und seine Privilegien zu erweitern."
}
],
"product_status": {
"known_affected": [
"T033720",
"T002207",
"T008911",
"T033718",
"T033705",
"T004914"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2023-40594"
},
{
"cve": "CVE-2023-40595",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in Splunk Splunk Enterprise. Diese Fehler bestehen in den REST-Endpunkten /app/search/table, /saml/acs, Serialized Session Payload, Dynamic Link Library, runshellscript.py und in den runshellscript-Komponenten sowie in der SPL-Funktion \u0027printf\u0027, u. a. aufgrund eines reflektierten Cross-Site-Scripting (XSS), einer unsachgem\u00e4\u00dfen Signaturvalidierung, einer unsachgem\u00e4\u00dfen Ausdrucksvalidierung und eines Path Traversal. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, einen \u0027Denial of Service\u0027-Zustand zu verursachen und seine Privilegien zu erweitern."
}
],
"product_status": {
"known_affected": [
"T033720",
"T002207",
"T008911",
"T033718",
"T033705",
"T004914"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2023-40595"
},
{
"cve": "CVE-2023-40596",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in Splunk Splunk Enterprise. Diese Fehler bestehen in den REST-Endpunkten /app/search/table, /saml/acs, Serialized Session Payload, Dynamic Link Library, runshellscript.py und in den runshellscript-Komponenten sowie in der SPL-Funktion \u0027printf\u0027, u. a. aufgrund eines reflektierten Cross-Site-Scripting (XSS), einer unsachgem\u00e4\u00dfen Signaturvalidierung, einer unsachgem\u00e4\u00dfen Ausdrucksvalidierung und eines Path Traversal. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, einen \u0027Denial of Service\u0027-Zustand zu verursachen und seine Privilegien zu erweitern."
}
],
"product_status": {
"known_affected": [
"T033720",
"T002207",
"T008911",
"T033718",
"T033705",
"T004914"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2023-40596"
},
{
"cve": "CVE-2023-40597",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in Splunk Splunk Enterprise. Diese Fehler bestehen in den REST-Endpunkten /app/search/table, /saml/acs, Serialized Session Payload, Dynamic Link Library, runshellscript.py und in den runshellscript-Komponenten sowie in der SPL-Funktion \u0027printf\u0027, u. a. aufgrund eines reflektierten Cross-Site-Scripting (XSS), einer unsachgem\u00e4\u00dfen Signaturvalidierung, einer unsachgem\u00e4\u00dfen Ausdrucksvalidierung und eines Path Traversal. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, einen \u0027Denial of Service\u0027-Zustand zu verursachen und seine Privilegien zu erweitern."
}
],
"product_status": {
"known_affected": [
"T033720",
"T002207",
"T008911",
"T033718",
"T033705",
"T004914"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2023-40597"
},
{
"cve": "CVE-2023-40598",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in Splunk Splunk Enterprise. Diese Fehler bestehen in den REST-Endpunkten /app/search/table, /saml/acs, Serialized Session Payload, Dynamic Link Library, runshellscript.py und in den runshellscript-Komponenten sowie in der SPL-Funktion \u0027printf\u0027, u. a. aufgrund eines reflektierten Cross-Site-Scripting (XSS), einer unsachgem\u00e4\u00dfen Signaturvalidierung, einer unsachgem\u00e4\u00dfen Ausdrucksvalidierung und eines Path Traversal. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, einen \u0027Denial of Service\u0027-Zustand zu verursachen und seine Privilegien zu erweitern."
}
],
"product_status": {
"known_affected": [
"T033720",
"T002207",
"T008911",
"T033718",
"T033705",
"T004914"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2023-40598"
}
]
}
wid-sec-w-2023-0318
Vulnerability from csaf_certbund
Notes
{
"document": {
"aggregate_severity": {
"text": "mittel"
},
"category": "csaf_base",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "de-DE",
"notes": [
{
"category": "legal_disclaimer",
"text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
},
{
"category": "description",
"text": "Red Hat OpenShift ist eine \"Platform as a Service\" (PaaS) L\u00f6sung zur Bereitstellung von Applikationen in der Cloud.",
"title": "Produktbeschreibung"
},
{
"category": "summary",
"text": "Ein entfernter, anonymer oder angemeldeter Angreifer kann mehrere Schwachstellen in Red Hat Migration Toolkit for Containers ausnutzen, um seine Rechte zu erweitern, einen Denial of Service zu verursachen, Sicherheitsvorkehrungen zu umgehen und Informationen offenzulegen.",
"title": "Angriff"
},
{
"category": "general",
"text": "- Linux",
"title": "Betroffene Betriebssysteme"
}
],
"publisher": {
"category": "other",
"contact_details": "csaf-provider@cert-bund.de",
"name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"namespace": "https://www.bsi.bund.de"
},
"references": [
{
"category": "self",
"summary": "WID-SEC-W-2023-0318 - CSAF Version",
"url": "https://wid.cert-bund.de/.well-known/csaf/white/2023/wid-sec-w-2023-0318.json"
},
{
"category": "self",
"summary": "WID-SEC-2023-0318 - Portal Version",
"url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2023-0318"
},
{
"category": "external",
"summary": "RedHat Security Advisory vom 2023-02-08",
"url": "https://access.redhat.com/errata/RHSA-2023:0693"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2023:0632 vom 2023-02-15",
"url": "https://access.redhat.com/errata/RHSA-2023:0632"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2023:0728 vom 2023-02-17",
"url": "https://access.redhat.com/errata/RHSA-2023:0728"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2023:0769 vom 2023-02-21",
"url": "https://access.redhat.com/errata/RHSA-2023:0769"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2023:0774 vom 2023-02-22",
"url": "https://access.redhat.com/errata/RHSA-2023:0774"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2023:2041 vom 2023-04-27",
"url": "https://access.redhat.com/errata/RHSA-2023:2041"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2023:3645 vom 2023-06-16",
"url": "https://access.redhat.com/errata/RHSA-2023:3645"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2024-0121 vom 2024-01-13",
"url": "https://linux.oracle.com/errata/ELSA-2024-0121.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2023:5006 vom 2023-12-30",
"url": "https://access.redhat.com/errata/RHSA-2023:5006"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:2988 vom 2024-05-22",
"url": "https://access.redhat.com/errata/RHSA-2024:2988"
}
],
"source_lang": "en-US",
"title": "Red Hat Migration Toolkit for Containers: Mehrere Schwachstellen",
"tracking": {
"current_release_date": "2024-05-21T22:00:00.000+00:00",
"generator": {
"date": "2024-08-15T17:43:17.931+00:00",
"engine": {
"name": "BSI-WID",
"version": "1.3.5"
}
},
"id": "WID-SEC-W-2023-0318",
"initial_release_date": "2023-02-08T23:00:00.000+00:00",
"revision_history": [
{
"date": "2023-02-08T23:00:00.000+00:00",
"number": "1",
"summary": "Initiale Fassung"
},
{
"date": "2023-02-15T23:00:00.000+00:00",
"number": "2",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2023-02-16T23:00:00.000+00:00",
"number": "3",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2023-02-20T23:00:00.000+00:00",
"number": "4",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2023-02-21T23:00:00.000+00:00",
"number": "5",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2023-04-26T22:00:00.000+00:00",
"number": "6",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2023-06-15T22:00:00.000+00:00",
"number": "7",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2024-01-01T23:00:00.000+00:00",
"number": "8",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2024-01-14T23:00:00.000+00:00",
"number": "9",
"summary": "Neue Updates von Oracle Linux aufgenommen"
},
{
"date": "2024-05-21T22:00:00.000+00:00",
"number": "10",
"summary": "Neue Updates von Red Hat aufgenommen"
}
],
"status": "final",
"version": "10"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Oracle Linux",
"product": {
"name": "Oracle Linux",
"product_id": "T004914",
"product_identification_helper": {
"cpe": "cpe:/o:oracle:linux:-"
}
}
}
],
"category": "vendor",
"name": "Oracle"
},
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux",
"product": {
"name": "Red Hat Enterprise Linux",
"product_id": "67646",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:-"
}
}
},
{
"branches": [
{
"category": "product_name",
"name": "Red Hat OpenShift",
"product": {
"name": "Red Hat OpenShift",
"product_id": "T008027",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:openshift:-"
}
}
},
{
"category": "product_version",
"name": "Container Platform 4.11",
"product": {
"name": "Red Hat OpenShift Container Platform 4.11",
"product_id": "T025990",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:openshift:container_platform_4.11"
}
}
},
{
"category": "product_version_range",
"name": "Migration Toolkit for Containers \u003c1.7.7",
"product": {
"name": "Red Hat OpenShift Migration Toolkit for Containers \u003c1.7.7",
"product_id": "T026206"
}
},
{
"category": "product_version",
"name": "Container Platform 4.12",
"product": {
"name": "Red Hat OpenShift Container Platform 4.12",
"product_id": "T026435",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:openshift:container_platform_4.12"
}
}
},
{
"category": "product_version_range",
"name": "Container Platform \u003c4.14.0",
"product": {
"name": "Red Hat OpenShift Container Platform \u003c4.14.0",
"product_id": "T031839"
}
}
],
"category": "product_name",
"name": "OpenShift"
}
],
"category": "vendor",
"name": "Red Hat"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2021-43138",
"notes": [
{
"category": "description",
"text": "In Red Hat Migration Toolkit for Containers existieren mehrere Schwachstellen in den Komponenten \"async\" und \"golang\". Ein Angreifer kann dies ausnutzen, um seine Rechte zu erweitern, einen Denial of Service zu verursachen, Sicherheitsvorkehrungen zu umgehen und Informationen offenzulegen. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzeraktion oder eine Anmeldung erforderlich."
}
],
"product_status": {
"known_affected": [
"T008027",
"67646",
"T026206",
"T026435",
"T004914",
"T025990",
"T031839"
]
},
"release_date": "2023-02-08T23:00:00.000+00:00",
"title": "CVE-2021-43138"
},
{
"cve": "CVE-2022-27664",
"notes": [
{
"category": "description",
"text": "In Red Hat Migration Toolkit for Containers existieren mehrere Schwachstellen in den Komponenten \"async\" und \"golang\". Ein Angreifer kann dies ausnutzen, um seine Rechte zu erweitern, einen Denial of Service zu verursachen, Sicherheitsvorkehrungen zu umgehen und Informationen offenzulegen. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzeraktion oder eine Anmeldung erforderlich."
}
],
"product_status": {
"known_affected": [
"T008027",
"67646",
"T026206",
"T026435",
"T004914",
"T025990",
"T031839"
]
},
"release_date": "2023-02-08T23:00:00.000+00:00",
"title": "CVE-2022-27664"
},
{
"cve": "CVE-2022-2879",
"notes": [
{
"category": "description",
"text": "In Red Hat Migration Toolkit for Containers existieren mehrere Schwachstellen in den Komponenten \"async\" und \"golang\". Ein Angreifer kann dies ausnutzen, um seine Rechte zu erweitern, einen Denial of Service zu verursachen, Sicherheitsvorkehrungen zu umgehen und Informationen offenzulegen. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzeraktion oder eine Anmeldung erforderlich."
}
],
"product_status": {
"known_affected": [
"T008027",
"67646",
"T026206",
"T026435",
"T004914",
"T025990",
"T031839"
]
},
"release_date": "2023-02-08T23:00:00.000+00:00",
"title": "CVE-2022-2879"
},
{
"cve": "CVE-2022-2880",
"notes": [
{
"category": "description",
"text": "In Red Hat Migration Toolkit for Containers existieren mehrere Schwachstellen in den Komponenten \"async\" und \"golang\". Ein Angreifer kann dies ausnutzen, um seine Rechte zu erweitern, einen Denial of Service zu verursachen, Sicherheitsvorkehrungen zu umgehen und Informationen offenzulegen. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzeraktion oder eine Anmeldung erforderlich."
}
],
"product_status": {
"known_affected": [
"T008027",
"67646",
"T026206",
"T026435",
"T004914",
"T025990",
"T031839"
]
},
"release_date": "2023-02-08T23:00:00.000+00:00",
"title": "CVE-2022-2880"
},
{
"cve": "CVE-2022-32149",
"notes": [
{
"category": "description",
"text": "In Red Hat Migration Toolkit for Containers existieren mehrere Schwachstellen in den Komponenten \"async\" und \"golang\". Ein Angreifer kann dies ausnutzen, um seine Rechte zu erweitern, einen Denial of Service zu verursachen, Sicherheitsvorkehrungen zu umgehen und Informationen offenzulegen. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzeraktion oder eine Anmeldung erforderlich."
}
],
"product_status": {
"known_affected": [
"T008027",
"67646",
"T026206",
"T026435",
"T004914",
"T025990",
"T031839"
]
},
"release_date": "2023-02-08T23:00:00.000+00:00",
"title": "CVE-2022-32149"
},
{
"cve": "CVE-2022-32189",
"notes": [
{
"category": "description",
"text": "In Red Hat Migration Toolkit for Containers existieren mehrere Schwachstellen in den Komponenten \"async\" und \"golang\". Ein Angreifer kann dies ausnutzen, um seine Rechte zu erweitern, einen Denial of Service zu verursachen, Sicherheitsvorkehrungen zu umgehen und Informationen offenzulegen. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzeraktion oder eine Anmeldung erforderlich."
}
],
"product_status": {
"known_affected": [
"T008027",
"67646",
"T026206",
"T026435",
"T004914",
"T025990",
"T031839"
]
},
"release_date": "2023-02-08T23:00:00.000+00:00",
"title": "CVE-2022-32189"
},
{
"cve": "CVE-2022-32190",
"notes": [
{
"category": "description",
"text": "In Red Hat Migration Toolkit for Containers existieren mehrere Schwachstellen in den Komponenten \"async\" und \"golang\". Ein Angreifer kann dies ausnutzen, um seine Rechte zu erweitern, einen Denial of Service zu verursachen, Sicherheitsvorkehrungen zu umgehen und Informationen offenzulegen. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzeraktion oder eine Anmeldung erforderlich."
}
],
"product_status": {
"known_affected": [
"T008027",
"67646",
"T026206",
"T026435",
"T004914",
"T025990",
"T031839"
]
},
"release_date": "2023-02-08T23:00:00.000+00:00",
"title": "CVE-2022-32190"
},
{
"cve": "CVE-2022-41715",
"notes": [
{
"category": "description",
"text": "In Red Hat Migration Toolkit for Containers existieren mehrere Schwachstellen in den Komponenten \"async\" und \"golang\". Ein Angreifer kann dies ausnutzen, um seine Rechte zu erweitern, einen Denial of Service zu verursachen, Sicherheitsvorkehrungen zu umgehen und Informationen offenzulegen. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzeraktion oder eine Anmeldung erforderlich."
}
],
"product_status": {
"known_affected": [
"T008027",
"67646",
"T026206",
"T026435",
"T004914",
"T025990",
"T031839"
]
},
"release_date": "2023-02-08T23:00:00.000+00:00",
"title": "CVE-2022-41715"
},
{
"cve": "CVE-2022-41717",
"notes": [
{
"category": "description",
"text": "In Red Hat Migration Toolkit for Containers existieren mehrere Schwachstellen in den Komponenten \"async\" und \"golang\". Ein Angreifer kann dies ausnutzen, um seine Rechte zu erweitern, einen Denial of Service zu verursachen, Sicherheitsvorkehrungen zu umgehen und Informationen offenzulegen. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzeraktion oder eine Anmeldung erforderlich."
}
],
"product_status": {
"known_affected": [
"T008027",
"67646",
"T026206",
"T026435",
"T004914",
"T025990",
"T031839"
]
},
"release_date": "2023-02-08T23:00:00.000+00:00",
"title": "CVE-2022-41717"
}
]
}
wid-sec-w-2023-2229
Vulnerability from csaf_certbund
Notes
{
"document": {
"aggregate_severity": {
"text": "hoch"
},
"category": "csaf_base",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "de-DE",
"notes": [
{
"category": "legal_disclaimer",
"text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
},
{
"category": "description",
"text": "Splunk Enterprise erm\u00f6glicht Monitoring und Analyse von Clickstream-Daten und Kundentransaktionen.",
"title": "Produktbeschreibung"
},
{
"category": "summary",
"text": "Ein entfernter, authentifizierter Angreifer kann mehrere Schwachstellen in Splunk Splunk Enterprise ausnutzen, um beliebigen Code auszuf\u00fchren, einen \u0027Denial of Service\u0027-Zustand zu verursachen, seine Privilegien zu erweitern und weitere, nicht spezifizierte Auswirkungen zu verursachen.",
"title": "Angriff"
},
{
"category": "general",
"text": "- Linux\n- MacOS X\n- Windows",
"title": "Betroffene Betriebssysteme"
}
],
"publisher": {
"category": "other",
"contact_details": "csaf-provider@cert-bund.de",
"name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"namespace": "https://www.bsi.bund.de"
},
"references": [
{
"category": "self",
"summary": "WID-SEC-W-2023-2229 - CSAF Version",
"url": "https://wid.cert-bund.de/.well-known/csaf/white/2023/wid-sec-w-2023-2229.json"
},
{
"category": "self",
"summary": "WID-SEC-2023-2229 - Portal Version",
"url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2023-2229"
},
{
"category": "external",
"summary": "Splunk Security Advisory vom 2023-08-30",
"url": "https://advisory.splunk.com//advisories/SVD-2023-0801"
},
{
"category": "external",
"summary": "Splunk Security Advisory vom 2023-08-30",
"url": "https://advisory.splunk.com//advisories/SVD-2023-0802"
},
{
"category": "external",
"summary": "Splunk Security Advisory vom 2023-08-30",
"url": "https://advisory.splunk.com//advisories/SVD-2023-0803"
},
{
"category": "external",
"summary": "Splunk Security Advisory vom 2023-08-30",
"url": "https://advisory.splunk.com//advisories/SVD-2023-0804"
},
{
"category": "external",
"summary": "Splunk Security Advisory vom 2023-08-30",
"url": "https://advisory.splunk.com//advisories/SVD-2023-0805"
},
{
"category": "external",
"summary": "Splunk Security Advisory vom 2023-08-30",
"url": "https://advisory.splunk.com//advisories/SVD-2023-0806"
},
{
"category": "external",
"summary": "Splunk Security Advisory vom 2023-08-30",
"url": "https://advisory.splunk.com//advisories/SVD-2023-0807"
},
{
"category": "external",
"summary": "Splunk Security Advisory vom 2023-08-30",
"url": "https://advisory.splunk.com//advisories/SVD-2023-0808"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:0196-1 vom 2024-01-23",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-January/017743.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2024-2988 vom 2024-05-28",
"url": "https://linux.oracle.com/errata/ELSA-2024-2988.html"
},
{
"category": "external",
"summary": "Splunk Security Advisory SVD-2024-0718 vom 2024-07-02",
"url": "https://advisory.splunk.com/advisories/SVD-2024-0718"
},
{
"category": "external",
"summary": "Splunk Security Advisory SVD-2024-0801 vom 2024-08-12",
"url": "https://advisory.splunk.com//advisories/SVD-2024-0801"
}
],
"source_lang": "en-US",
"title": "Splunk Splunk Enterprise: Mehrere Schwachstellen",
"tracking": {
"current_release_date": "2024-08-12T22:00:00.000+00:00",
"generator": {
"date": "2024-08-15T17:57:53.670+00:00",
"engine": {
"name": "BSI-WID",
"version": "1.3.5"
}
},
"id": "WID-SEC-W-2023-2229",
"initial_release_date": "2023-08-30T22:00:00.000+00:00",
"revision_history": [
{
"date": "2023-08-30T22:00:00.000+00:00",
"number": "1",
"summary": "Initiale Fassung"
},
{
"date": "2024-01-23T23:00:00.000+00:00",
"number": "2",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2024-05-28T22:00:00.000+00:00",
"number": "3",
"summary": "Neue Updates von Oracle Linux aufgenommen"
},
{
"date": "2024-07-01T22:00:00.000+00:00",
"number": "4",
"summary": "Neue Updates von Splunk-SVD aufgenommen"
},
{
"date": "2024-08-12T22:00:00.000+00:00",
"number": "5",
"summary": "Neue Updates von Splunk-SVD aufgenommen"
}
],
"status": "final",
"version": "5"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Oracle Linux",
"product": {
"name": "Oracle Linux",
"product_id": "T004914",
"product_identification_helper": {
"cpe": "cpe:/o:oracle:linux:-"
}
}
}
],
"category": "vendor",
"name": "Oracle"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux",
"product": {
"name": "SUSE Linux",
"product_id": "T002207",
"product_identification_helper": {
"cpe": "cpe:/o:suse:suse_linux:-"
}
}
}
],
"category": "vendor",
"name": "SUSE"
},
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Splunk Splunk Enterprise",
"product": {
"name": "Splunk Splunk Enterprise",
"product_id": "T008911",
"product_identification_helper": {
"cpe": "cpe:/a:splunk:splunk:-"
}
}
},
{
"category": "product_version_range",
"name": "\u003c9.1.1",
"product": {
"name": "Splunk Splunk Enterprise \u003c9.1.1",
"product_id": "T029634"
}
},
{
"category": "product_version_range",
"name": "\u003c9.0.6",
"product": {
"name": "Splunk Splunk Enterprise \u003c9.0.6",
"product_id": "T029635"
}
},
{
"category": "product_version_range",
"name": "\u003c8.2.12",
"product": {
"name": "Splunk Splunk Enterprise \u003c8.2.12",
"product_id": "T029636"
}
},
{
"category": "product_version_range",
"name": "\u003c9.2.1",
"product": {
"name": "Splunk Splunk Enterprise \u003c9.2.1",
"product_id": "T033705"
}
},
{
"category": "product_version_range",
"name": "\u003c9.1.4",
"product": {
"name": "Splunk Splunk Enterprise \u003c9.1.4",
"product_id": "T033718"
}
},
{
"category": "product_version_range",
"name": "\u003c9.0.9",
"product": {
"name": "Splunk Splunk Enterprise \u003c9.0.9",
"product_id": "T033720"
}
}
],
"category": "product_name",
"name": "Splunk Enterprise"
}
],
"category": "vendor",
"name": "Splunk"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2013-7489",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033720",
"T002207",
"T008911",
"T033718",
"T033705",
"T004914"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2013-7489"
},
{
"cve": "CVE-2018-10237",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033720",
"T002207",
"T008911",
"T033718",
"T033705",
"T004914"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2018-10237"
},
{
"cve": "CVE-2018-20225",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033720",
"T002207",
"T008911",
"T033718",
"T033705",
"T004914"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2018-20225"
},
{
"cve": "CVE-2019-20454",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033720",
"T002207",
"T008911",
"T033718",
"T033705",
"T004914"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2019-20454"
},
{
"cve": "CVE-2019-20838",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033720",
"T002207",
"T008911",
"T033718",
"T033705",
"T004914"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2019-20838"
},
{
"cve": "CVE-2020-14155",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033720",
"T002207",
"T008911",
"T033718",
"T033705",
"T004914"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2020-14155"
},
{
"cve": "CVE-2020-28469",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033720",
"T002207",
"T008911",
"T033718",
"T033705",
"T004914"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2020-28469"
},
{
"cve": "CVE-2020-28851",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033720",
"T002207",
"T008911",
"T033718",
"T033705",
"T004914"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2020-28851"
},
{
"cve": "CVE-2020-29652",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033720",
"T002207",
"T008911",
"T033718",
"T033705",
"T004914"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2020-29652"
},
{
"cve": "CVE-2020-8169",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033720",
"T002207",
"T008911",
"T033718",
"T033705",
"T004914"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2020-8169"
},
{
"cve": "CVE-2020-8177",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033720",
"T002207",
"T008911",
"T033718",
"T033705",
"T004914"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2020-8177"
},
{
"cve": "CVE-2020-8231",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033720",
"T002207",
"T008911",
"T033718",
"T033705",
"T004914"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2020-8231"
},
{
"cve": "CVE-2020-8284",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033720",
"T002207",
"T008911",
"T033718",
"T033705",
"T004914"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2020-8284"
},
{
"cve": "CVE-2020-8285",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033720",
"T002207",
"T008911",
"T033718",
"T033705",
"T004914"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2020-8285"
},
{
"cve": "CVE-2020-8286",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033720",
"T002207",
"T008911",
"T033718",
"T033705",
"T004914"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2020-8286"
},
{
"cve": "CVE-2020-8908",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033720",
"T002207",
"T008911",
"T033718",
"T033705",
"T004914"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2020-8908"
},
{
"cve": "CVE-2021-20066",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033720",
"T002207",
"T008911",
"T033718",
"T033705",
"T004914"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2021-20066"
},
{
"cve": "CVE-2021-22569",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033720",
"T002207",
"T008911",
"T033718",
"T033705",
"T004914"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2021-22569"
},
{
"cve": "CVE-2021-22876",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033720",
"T002207",
"T008911",
"T033718",
"T033705",
"T004914"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2021-22876"
},
{
"cve": "CVE-2021-22890",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033720",
"T002207",
"T008911",
"T033718",
"T033705",
"T004914"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2021-22890"
},
{
"cve": "CVE-2021-22897",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033720",
"T002207",
"T008911",
"T033718",
"T033705",
"T004914"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2021-22897"
},
{
"cve": "CVE-2021-22898",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033720",
"T002207",
"T008911",
"T033718",
"T033705",
"T004914"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2021-22898"
},
{
"cve": "CVE-2021-22901",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033720",
"T002207",
"T008911",
"T033718",
"T033705",
"T004914"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2021-22901"
},
{
"cve": "CVE-2021-22922",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033720",
"T002207",
"T008911",
"T033718",
"T033705",
"T004914"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2021-22922"
},
{
"cve": "CVE-2021-22923",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033720",
"T002207",
"T008911",
"T033718",
"T033705",
"T004914"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2021-22923"
},
{
"cve": "CVE-2021-22924",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033720",
"T002207",
"T008911",
"T033718",
"T033705",
"T004914"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2021-22924"
},
{
"cve": "CVE-2021-22925",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033720",
"T002207",
"T008911",
"T033718",
"T033705",
"T004914"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2021-22925"
},
{
"cve": "CVE-2021-22926",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033720",
"T002207",
"T008911",
"T033718",
"T033705",
"T004914"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2021-22926"
},
{
"cve": "CVE-2021-22945",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033720",
"T002207",
"T008911",
"T033718",
"T033705",
"T004914"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2021-22945"
},
{
"cve": "CVE-2021-22946",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033720",
"T002207",
"T008911",
"T033718",
"T033705",
"T004914"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2021-22946"
},
{
"cve": "CVE-2021-22947",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033720",
"T002207",
"T008911",
"T033718",
"T033705",
"T004914"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2021-22947"
},
{
"cve": "CVE-2021-23343",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033720",
"T002207",
"T008911",
"T033718",
"T033705",
"T004914"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2021-23343"
},
{
"cve": "CVE-2021-23382",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033720",
"T002207",
"T008911",
"T033718",
"T033705",
"T004914"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2021-23382"
},
{
"cve": "CVE-2021-27918",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033720",
"T002207",
"T008911",
"T033718",
"T033705",
"T004914"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2021-27918"
},
{
"cve": "CVE-2021-27919",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033720",
"T002207",
"T008911",
"T033718",
"T033705",
"T004914"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2021-27919"
},
{
"cve": "CVE-2021-29060",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033720",
"T002207",
"T008911",
"T033718",
"T033705",
"T004914"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2021-29060"
},
{
"cve": "CVE-2021-29425",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033720",
"T002207",
"T008911",
"T033718",
"T033705",
"T004914"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2021-29425"
},
{
"cve": "CVE-2021-29923",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033720",
"T002207",
"T008911",
"T033718",
"T033705",
"T004914"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2021-29923"
},
{
"cve": "CVE-2021-31525",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033720",
"T002207",
"T008911",
"T033718",
"T033705",
"T004914"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2021-31525"
},
{
"cve": "CVE-2021-31566",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033720",
"T002207",
"T008911",
"T033718",
"T033705",
"T004914"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2021-31566"
},
{
"cve": "CVE-2021-33194",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033720",
"T002207",
"T008911",
"T033718",
"T033705",
"T004914"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2021-33194"
},
{
"cve": "CVE-2021-33195",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033720",
"T002207",
"T008911",
"T033718",
"T033705",
"T004914"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2021-33195"
},
{
"cve": "CVE-2021-33196",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033720",
"T002207",
"T008911",
"T033718",
"T033705",
"T004914"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2021-33196"
},
{
"cve": "CVE-2021-33197",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033720",
"T002207",
"T008911",
"T033718",
"T033705",
"T004914"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2021-33197"
},
{
"cve": "CVE-2021-33198",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033720",
"T002207",
"T008911",
"T033718",
"T033705",
"T004914"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2021-33198"
},
{
"cve": "CVE-2021-34558",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033720",
"T002207",
"T008911",
"T033718",
"T033705",
"T004914"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2021-34558"
},
{
"cve": "CVE-2021-3520",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033720",
"T002207",
"T008911",
"T033718",
"T033705",
"T004914"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2021-3520"
},
{
"cve": "CVE-2021-3572",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033720",
"T002207",
"T008911",
"T033718",
"T033705",
"T004914"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2021-3572"
},
{
"cve": "CVE-2021-36221",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033720",
"T002207",
"T008911",
"T033718",
"T033705",
"T004914"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2021-36221"
},
{
"cve": "CVE-2021-36976",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033720",
"T002207",
"T008911",
"T033718",
"T033705",
"T004914"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2021-36976"
},
{
"cve": "CVE-2021-3803",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033720",
"T002207",
"T008911",
"T033718",
"T033705",
"T004914"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2021-3803"
},
{
"cve": "CVE-2021-38297",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033720",
"T002207",
"T008911",
"T033718",
"T033705",
"T004914"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2021-38297"
},
{
"cve": "CVE-2021-38561",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033720",
"T002207",
"T008911",
"T033718",
"T033705",
"T004914"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2021-38561"
},
{
"cve": "CVE-2021-39293",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033720",
"T002207",
"T008911",
"T033718",
"T033705",
"T004914"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2021-39293"
},
{
"cve": "CVE-2021-41182",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033720",
"T002207",
"T008911",
"T033718",
"T033705",
"T004914"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2021-41182"
},
{
"cve": "CVE-2021-41183",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033720",
"T002207",
"T008911",
"T033718",
"T033705",
"T004914"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2021-41183"
},
{
"cve": "CVE-2021-41184",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033720",
"T002207",
"T008911",
"T033718",
"T033705",
"T004914"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2021-41184"
},
{
"cve": "CVE-2021-41771",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033720",
"T002207",
"T008911",
"T033718",
"T033705",
"T004914"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2021-41771"
},
{
"cve": "CVE-2021-41772",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033720",
"T002207",
"T008911",
"T033718",
"T033705",
"T004914"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2021-41772"
},
{
"cve": "CVE-2021-43565",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033720",
"T002207",
"T008911",
"T033718",
"T033705",
"T004914"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2021-43565"
},
{
"cve": "CVE-2021-44716",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033720",
"T002207",
"T008911",
"T033718",
"T033705",
"T004914"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2021-44716"
},
{
"cve": "CVE-2021-44717",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033720",
"T002207",
"T008911",
"T033718",
"T033705",
"T004914"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2021-44717"
},
{
"cve": "CVE-2022-1705",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033720",
"T002207",
"T008911",
"T033718",
"T033705",
"T004914"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2022-1705"
},
{
"cve": "CVE-2022-1941",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033720",
"T002207",
"T008911",
"T033718",
"T033705",
"T004914"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2022-1941"
},
{
"cve": "CVE-2022-1962",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033720",
"T002207",
"T008911",
"T033718",
"T033705",
"T004914"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2022-1962"
},
{
"cve": "CVE-2022-22576",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033720",
"T002207",
"T008911",
"T033718",
"T033705",
"T004914"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2022-22576"
},
{
"cve": "CVE-2022-2309",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033720",
"T002207",
"T008911",
"T033718",
"T033705",
"T004914"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2022-2309"
},
{
"cve": "CVE-2022-23491",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033720",
"T002207",
"T008911",
"T033718",
"T033705",
"T004914"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2022-23491"
},
{
"cve": "CVE-2022-23772",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033720",
"T002207",
"T008911",
"T033718",
"T033705",
"T004914"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2022-23772"
},
{
"cve": "CVE-2022-23773",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033720",
"T002207",
"T008911",
"T033718",
"T033705",
"T004914"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2022-23773"
},
{
"cve": "CVE-2022-23806",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033720",
"T002207",
"T008911",
"T033718",
"T033705",
"T004914"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2022-23806"
},
{
"cve": "CVE-2022-24675",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033720",
"T002207",
"T008911",
"T033718",
"T033705",
"T004914"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2022-24675"
},
{
"cve": "CVE-2022-24921",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033720",
"T002207",
"T008911",
"T033718",
"T033705",
"T004914"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2022-24921"
},
{
"cve": "CVE-2022-24999",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033720",
"T002207",
"T008911",
"T033718",
"T033705",
"T004914"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2022-24999"
},
{
"cve": "CVE-2022-25881",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033720",
"T002207",
"T008911",
"T033718",
"T033705",
"T004914"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2022-25881"
},
{
"cve": "CVE-2022-27191",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033720",
"T002207",
"T008911",
"T033718",
"T033705",
"T004914"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2022-27191"
},
{
"cve": "CVE-2022-27536",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033720",
"T002207",
"T008911",
"T033718",
"T033705",
"T004914"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2022-27536"
},
{
"cve": "CVE-2022-27664",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033720",
"T002207",
"T008911",
"T033718",
"T033705",
"T004914"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2022-27664"
},
{
"cve": "CVE-2022-27774",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033720",
"T002207",
"T008911",
"T033718",
"T033705",
"T004914"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2022-27774"
},
{
"cve": "CVE-2022-27775",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033720",
"T002207",
"T008911",
"T033718",
"T033705",
"T004914"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2022-27775"
},
{
"cve": "CVE-2022-27776",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033720",
"T002207",
"T008911",
"T033718",
"T033705",
"T004914"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2022-27776"
},
{
"cve": "CVE-2022-27778",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033720",
"T002207",
"T008911",
"T033718",
"T033705",
"T004914"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2022-27778"
},
{
"cve": "CVE-2022-27779",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033720",
"T002207",
"T008911",
"T033718",
"T033705",
"T004914"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2022-27779"
},
{
"cve": "CVE-2022-27780",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033720",
"T002207",
"T008911",
"T033718",
"T033705",
"T004914"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2022-27780"
},
{
"cve": "CVE-2022-27781",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033720",
"T002207",
"T008911",
"T033718",
"T033705",
"T004914"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2022-27781"
},
{
"cve": "CVE-2022-27782",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033720",
"T002207",
"T008911",
"T033718",
"T033705",
"T004914"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2022-27782"
},
{
"cve": "CVE-2022-28131",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033720",
"T002207",
"T008911",
"T033718",
"T033705",
"T004914"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2022-28131"
},
{
"cve": "CVE-2022-28327",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033720",
"T002207",
"T008911",
"T033718",
"T033705",
"T004914"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2022-28327"
},
{
"cve": "CVE-2022-2879",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033720",
"T002207",
"T008911",
"T033718",
"T033705",
"T004914"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2022-2879"
},
{
"cve": "CVE-2022-2880",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033720",
"T002207",
"T008911",
"T033718",
"T033705",
"T004914"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2022-2880"
},
{
"cve": "CVE-2022-29526",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033720",
"T002207",
"T008911",
"T033718",
"T033705",
"T004914"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2022-29526"
},
{
"cve": "CVE-2022-29804",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033720",
"T002207",
"T008911",
"T033718",
"T033705",
"T004914"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2022-29804"
},
{
"cve": "CVE-2022-30115",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033720",
"T002207",
"T008911",
"T033718",
"T033705",
"T004914"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2022-30115"
},
{
"cve": "CVE-2022-30580",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033720",
"T002207",
"T008911",
"T033718",
"T033705",
"T004914"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2022-30580"
},
{
"cve": "CVE-2022-30629",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033720",
"T002207",
"T008911",
"T033718",
"T033705",
"T004914"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2022-30629"
},
{
"cve": "CVE-2022-30630",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033720",
"T002207",
"T008911",
"T033718",
"T033705",
"T004914"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2022-30630"
},
{
"cve": "CVE-2022-30631",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033720",
"T002207",
"T008911",
"T033718",
"T033705",
"T004914"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2022-30631"
},
{
"cve": "CVE-2022-30632",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033720",
"T002207",
"T008911",
"T033718",
"T033705",
"T004914"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2022-30632"
},
{
"cve": "CVE-2022-30633",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033720",
"T002207",
"T008911",
"T033718",
"T033705",
"T004914"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2022-30633"
},
{
"cve": "CVE-2022-30634",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033720",
"T002207",
"T008911",
"T033718",
"T033705",
"T004914"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2022-30634"
},
{
"cve": "CVE-2022-30635",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033720",
"T002207",
"T008911",
"T033718",
"T033705",
"T004914"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2022-30635"
},
{
"cve": "CVE-2022-31129",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033720",
"T002207",
"T008911",
"T033718",
"T033705",
"T004914"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2022-31129"
},
{
"cve": "CVE-2022-3171",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033720",
"T002207",
"T008911",
"T033718",
"T033705",
"T004914"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2022-3171"
},
{
"cve": "CVE-2022-32148",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033720",
"T002207",
"T008911",
"T033718",
"T033705",
"T004914"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2022-32148"
},
{
"cve": "CVE-2022-32149",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033720",
"T002207",
"T008911",
"T033718",
"T033705",
"T004914"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2022-32149"
},
{
"cve": "CVE-2022-32189",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033720",
"T002207",
"T008911",
"T033718",
"T033705",
"T004914"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2022-32189"
},
{
"cve": "CVE-2022-32205",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033720",
"T002207",
"T008911",
"T033718",
"T033705",
"T004914"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2022-32205"
},
{
"cve": "CVE-2022-32206",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033720",
"T002207",
"T008911",
"T033718",
"T033705",
"T004914"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2022-32206"
},
{
"cve": "CVE-2022-32207",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033720",
"T002207",
"T008911",
"T033718",
"T033705",
"T004914"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2022-32207"
},
{
"cve": "CVE-2022-32208",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033720",
"T002207",
"T008911",
"T033718",
"T033705",
"T004914"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2022-32208"
},
{
"cve": "CVE-2022-32221",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033720",
"T002207",
"T008911",
"T033718",
"T033705",
"T004914"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2022-32221"
},
{
"cve": "CVE-2022-33987",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033720",
"T002207",
"T008911",
"T033718",
"T033705",
"T004914"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2022-33987"
},
{
"cve": "CVE-2022-3509",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033720",
"T002207",
"T008911",
"T033718",
"T033705",
"T004914"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2022-3509"
},
{
"cve": "CVE-2022-3510",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033720",
"T002207",
"T008911",
"T033718",
"T033705",
"T004914"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2022-3510"
},
{
"cve": "CVE-2022-3517",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033720",
"T002207",
"T008911",
"T033718",
"T033705",
"T004914"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2022-3517"
},
{
"cve": "CVE-2022-35252",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033720",
"T002207",
"T008911",
"T033718",
"T033705",
"T004914"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2022-35252"
},
{
"cve": "CVE-2022-35260",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033720",
"T002207",
"T008911",
"T033718",
"T033705",
"T004914"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2022-35260"
},
{
"cve": "CVE-2022-35737",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033720",
"T002207",
"T008911",
"T033718",
"T033705",
"T004914"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2022-35737"
},
{
"cve": "CVE-2022-36227",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033720",
"T002207",
"T008911",
"T033718",
"T033705",
"T004914"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2022-36227"
},
{
"cve": "CVE-2022-37599",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033720",
"T002207",
"T008911",
"T033718",
"T033705",
"T004914"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2022-37599"
},
{
"cve": "CVE-2022-37601",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033720",
"T002207",
"T008911",
"T033718",
"T033705",
"T004914"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2022-37601"
},
{
"cve": "CVE-2022-37603",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033720",
"T002207",
"T008911",
"T033718",
"T033705",
"T004914"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2022-37603"
},
{
"cve": "CVE-2022-38900",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033720",
"T002207",
"T008911",
"T033718",
"T033705",
"T004914"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2022-38900"
},
{
"cve": "CVE-2022-40023",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033720",
"T002207",
"T008911",
"T033718",
"T033705",
"T004914"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2022-40023"
},
{
"cve": "CVE-2022-40897",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033720",
"T002207",
"T008911",
"T033718",
"T033705",
"T004914"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2022-40897"
},
{
"cve": "CVE-2022-40899",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033720",
"T002207",
"T008911",
"T033718",
"T033705",
"T004914"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2022-40899"
},
{
"cve": "CVE-2022-41715",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033720",
"T002207",
"T008911",
"T033718",
"T033705",
"T004914"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2022-41715"
},
{
"cve": "CVE-2022-41716",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033720",
"T002207",
"T008911",
"T033718",
"T033705",
"T004914"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2022-41716"
},
{
"cve": "CVE-2022-41720",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033720",
"T002207",
"T008911",
"T033718",
"T033705",
"T004914"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2022-41720"
},
{
"cve": "CVE-2022-41722",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033720",
"T002207",
"T008911",
"T033718",
"T033705",
"T004914"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2022-41722"
},
{
"cve": "CVE-2022-42003",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033720",
"T002207",
"T008911",
"T033718",
"T033705",
"T004914"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2022-42003"
},
{
"cve": "CVE-2022-42004",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033720",
"T002207",
"T008911",
"T033718",
"T033705",
"T004914"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2022-42004"
},
{
"cve": "CVE-2022-42915",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033720",
"T002207",
"T008911",
"T033718",
"T033705",
"T004914"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2022-42915"
},
{
"cve": "CVE-2022-42916",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033720",
"T002207",
"T008911",
"T033718",
"T033705",
"T004914"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2022-42916"
},
{
"cve": "CVE-2022-43551",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033720",
"T002207",
"T008911",
"T033718",
"T033705",
"T004914"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2022-43551"
},
{
"cve": "CVE-2022-43552",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033720",
"T002207",
"T008911",
"T033718",
"T033705",
"T004914"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2022-43552"
},
{
"cve": "CVE-2022-46175",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033720",
"T002207",
"T008911",
"T033718",
"T033705",
"T004914"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2022-46175"
},
{
"cve": "CVE-2023-23914",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033720",
"T002207",
"T008911",
"T033718",
"T033705",
"T004914"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2023-23914"
},
{
"cve": "CVE-2023-23915",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033720",
"T002207",
"T008911",
"T033718",
"T033705",
"T004914"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2023-23915"
},
{
"cve": "CVE-2023-23916",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033720",
"T002207",
"T008911",
"T033718",
"T033705",
"T004914"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2023-23916"
},
{
"cve": "CVE-2023-24539",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033720",
"T002207",
"T008911",
"T033718",
"T033705",
"T004914"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2023-24539"
},
{
"cve": "CVE-2023-24540",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033720",
"T002207",
"T008911",
"T033718",
"T033705",
"T004914"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2023-24540"
},
{
"cve": "CVE-2023-27533",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033720",
"T002207",
"T008911",
"T033718",
"T033705",
"T004914"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2023-27533"
},
{
"cve": "CVE-2023-27534",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033720",
"T002207",
"T008911",
"T033718",
"T033705",
"T004914"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2023-27534"
},
{
"cve": "CVE-2023-27535",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033720",
"T002207",
"T008911",
"T033718",
"T033705",
"T004914"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2023-27535"
},
{
"cve": "CVE-2023-27536",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033720",
"T002207",
"T008911",
"T033718",
"T033705",
"T004914"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2023-27536"
},
{
"cve": "CVE-2023-27537",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033720",
"T002207",
"T008911",
"T033718",
"T033705",
"T004914"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2023-27537"
},
{
"cve": "CVE-2023-27538",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033720",
"T002207",
"T008911",
"T033718",
"T033705",
"T004914"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2023-27538"
},
{
"cve": "CVE-2023-29400",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033720",
"T002207",
"T008911",
"T033718",
"T033705",
"T004914"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2023-29400"
},
{
"cve": "CVE-2023-29402",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033720",
"T002207",
"T008911",
"T033718",
"T033705",
"T004914"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2023-29402"
},
{
"cve": "CVE-2023-29403",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033720",
"T002207",
"T008911",
"T033718",
"T033705",
"T004914"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2023-29403"
},
{
"cve": "CVE-2023-29404",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033720",
"T002207",
"T008911",
"T033718",
"T033705",
"T004914"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2023-29404"
},
{
"cve": "CVE-2023-29405",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033720",
"T002207",
"T008911",
"T033718",
"T033705",
"T004914"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2023-29405"
},
{
"cve": "CVE-2023-40592",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in Splunk Splunk Enterprise. Diese Fehler bestehen in den REST-Endpunkten /app/search/table, /saml/acs, Serialized Session Payload, Dynamic Link Library, runshellscript.py und in den runshellscript-Komponenten sowie in der SPL-Funktion \u0027printf\u0027, u. a. aufgrund eines reflektierten Cross-Site-Scripting (XSS), einer unsachgem\u00e4\u00dfen Signaturvalidierung, einer unsachgem\u00e4\u00dfen Ausdrucksvalidierung und eines Path Traversal. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, einen \u0027Denial of Service\u0027-Zustand zu verursachen und seine Privilegien zu erweitern."
}
],
"product_status": {
"known_affected": [
"T033720",
"T002207",
"T008911",
"T033718",
"T033705",
"T004914"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2023-40592"
},
{
"cve": "CVE-2023-40593",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in Splunk Splunk Enterprise. Diese Fehler bestehen in den REST-Endpunkten /app/search/table, /saml/acs, Serialized Session Payload, Dynamic Link Library, runshellscript.py und in den runshellscript-Komponenten sowie in der SPL-Funktion \u0027printf\u0027, u. a. aufgrund eines reflektierten Cross-Site-Scripting (XSS), einer unsachgem\u00e4\u00dfen Signaturvalidierung, einer unsachgem\u00e4\u00dfen Ausdrucksvalidierung und eines Path Traversal. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, einen \u0027Denial of Service\u0027-Zustand zu verursachen und seine Privilegien zu erweitern."
}
],
"product_status": {
"known_affected": [
"T033720",
"T002207",
"T008911",
"T033718",
"T033705",
"T004914"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2023-40593"
},
{
"cve": "CVE-2023-40594",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in Splunk Splunk Enterprise. Diese Fehler bestehen in den REST-Endpunkten /app/search/table, /saml/acs, Serialized Session Payload, Dynamic Link Library, runshellscript.py und in den runshellscript-Komponenten sowie in der SPL-Funktion \u0027printf\u0027, u. a. aufgrund eines reflektierten Cross-Site-Scripting (XSS), einer unsachgem\u00e4\u00dfen Signaturvalidierung, einer unsachgem\u00e4\u00dfen Ausdrucksvalidierung und eines Path Traversal. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, einen \u0027Denial of Service\u0027-Zustand zu verursachen und seine Privilegien zu erweitern."
}
],
"product_status": {
"known_affected": [
"T033720",
"T002207",
"T008911",
"T033718",
"T033705",
"T004914"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2023-40594"
},
{
"cve": "CVE-2023-40595",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in Splunk Splunk Enterprise. Diese Fehler bestehen in den REST-Endpunkten /app/search/table, /saml/acs, Serialized Session Payload, Dynamic Link Library, runshellscript.py und in den runshellscript-Komponenten sowie in der SPL-Funktion \u0027printf\u0027, u. a. aufgrund eines reflektierten Cross-Site-Scripting (XSS), einer unsachgem\u00e4\u00dfen Signaturvalidierung, einer unsachgem\u00e4\u00dfen Ausdrucksvalidierung und eines Path Traversal. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, einen \u0027Denial of Service\u0027-Zustand zu verursachen und seine Privilegien zu erweitern."
}
],
"product_status": {
"known_affected": [
"T033720",
"T002207",
"T008911",
"T033718",
"T033705",
"T004914"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2023-40595"
},
{
"cve": "CVE-2023-40596",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in Splunk Splunk Enterprise. Diese Fehler bestehen in den REST-Endpunkten /app/search/table, /saml/acs, Serialized Session Payload, Dynamic Link Library, runshellscript.py und in den runshellscript-Komponenten sowie in der SPL-Funktion \u0027printf\u0027, u. a. aufgrund eines reflektierten Cross-Site-Scripting (XSS), einer unsachgem\u00e4\u00dfen Signaturvalidierung, einer unsachgem\u00e4\u00dfen Ausdrucksvalidierung und eines Path Traversal. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, einen \u0027Denial of Service\u0027-Zustand zu verursachen und seine Privilegien zu erweitern."
}
],
"product_status": {
"known_affected": [
"T033720",
"T002207",
"T008911",
"T033718",
"T033705",
"T004914"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2023-40596"
},
{
"cve": "CVE-2023-40597",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in Splunk Splunk Enterprise. Diese Fehler bestehen in den REST-Endpunkten /app/search/table, /saml/acs, Serialized Session Payload, Dynamic Link Library, runshellscript.py und in den runshellscript-Komponenten sowie in der SPL-Funktion \u0027printf\u0027, u. a. aufgrund eines reflektierten Cross-Site-Scripting (XSS), einer unsachgem\u00e4\u00dfen Signaturvalidierung, einer unsachgem\u00e4\u00dfen Ausdrucksvalidierung und eines Path Traversal. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, einen \u0027Denial of Service\u0027-Zustand zu verursachen und seine Privilegien zu erweitern."
}
],
"product_status": {
"known_affected": [
"T033720",
"T002207",
"T008911",
"T033718",
"T033705",
"T004914"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2023-40597"
},
{
"cve": "CVE-2023-40598",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in Splunk Splunk Enterprise. Diese Fehler bestehen in den REST-Endpunkten /app/search/table, /saml/acs, Serialized Session Payload, Dynamic Link Library, runshellscript.py und in den runshellscript-Komponenten sowie in der SPL-Funktion \u0027printf\u0027, u. a. aufgrund eines reflektierten Cross-Site-Scripting (XSS), einer unsachgem\u00e4\u00dfen Signaturvalidierung, einer unsachgem\u00e4\u00dfen Ausdrucksvalidierung und eines Path Traversal. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, einen \u0027Denial of Service\u0027-Zustand zu verursachen und seine Privilegien zu erweitern."
}
],
"product_status": {
"known_affected": [
"T033720",
"T002207",
"T008911",
"T033718",
"T033705",
"T004914"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2023-40598"
}
]
}
WID-SEC-W-2024-0794
Vulnerability from csaf_certbund
Notes
{
"document": {
"aggregate_severity": {
"text": "hoch"
},
"category": "csaf_base",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "de-DE",
"notes": [
{
"category": "legal_disclaimer",
"text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
},
{
"category": "description",
"text": "Dell ECS ist ein Objektspeichersystem.",
"title": "Produktbeschreibung"
},
{
"category": "summary",
"text": "Ein Angreifer kann mehrere Schwachstellen in Dell ECS ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren.",
"title": "Angriff"
},
{
"category": "general",
"text": "- Linux\n- UNIX\n- Windows",
"title": "Betroffene Betriebssysteme"
}
],
"publisher": {
"category": "other",
"contact_details": "csaf-provider@cert-bund.de",
"name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"namespace": "https://www.bsi.bund.de"
},
"references": [
{
"category": "self",
"summary": "WID-SEC-W-2024-0794 - CSAF Version",
"url": "https://wid.cert-bund.de/.well-known/csaf/white/2024/wid-sec-w-2024-0794.json"
},
{
"category": "self",
"summary": "WID-SEC-2024-0794 - Portal Version",
"url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2024-0794"
},
{
"category": "external",
"summary": "Dell Security Advisory DSA-2024-141 vom 2024-04-04",
"url": "https://www.dell.com/support/kbdoc/000223839/dsa-2024-="
}
],
"source_lang": "en-US",
"title": "Dell ECS: Mehrere Schwachstellen",
"tracking": {
"current_release_date": "2024-11-27T23:00:00.000+00:00",
"generator": {
"date": "2024-11-28T11:39:04.623+00:00",
"engine": {
"name": "BSI-WID",
"version": "1.3.8"
}
},
"id": "WID-SEC-W-2024-0794",
"initial_release_date": "2024-04-04T22:00:00.000+00:00",
"revision_history": [
{
"date": "2024-04-04T22:00:00.000+00:00",
"number": "1",
"summary": "Initiale Fassung"
},
{
"date": "2024-11-27T23:00:00.000+00:00",
"number": "2",
"summary": "Produktzuordnung \u00fcberpr\u00fcft"
}
],
"status": "final",
"version": "2"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c3.8.1.0",
"product": {
"name": "Dell ECS \u003c3.8.1.0",
"product_id": "T033919"
}
},
{
"category": "product_version",
"name": "3.8.1.0",
"product": {
"name": "Dell ECS 3.8.1.0",
"product_id": "T033919-fixed",
"product_identification_helper": {
"cpe": "cpe:/h:dell:ecs:3.8.1.0"
}
}
}
],
"category": "product_name",
"name": "ECS"
}
],
"category": "vendor",
"name": "Dell"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2018-18074",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2018-18074"
},
{
"cve": "CVE-2020-10663",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2020-10663"
},
{
"cve": "CVE-2020-10672",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2020-10672"
},
{
"cve": "CVE-2020-10673",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2020-10673"
},
{
"cve": "CVE-2020-10735",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2020-10735"
},
{
"cve": "CVE-2020-10968",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2020-10968"
},
{
"cve": "CVE-2020-10969",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2020-10969"
},
{
"cve": "CVE-2020-11111",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2020-11111"
},
{
"cve": "CVE-2020-11112",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2020-11112"
},
{
"cve": "CVE-2020-11113",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2020-11113"
},
{
"cve": "CVE-2020-11612",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2020-11612"
},
{
"cve": "CVE-2020-11619",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2020-11619"
},
{
"cve": "CVE-2020-11620",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2020-11620"
},
{
"cve": "CVE-2020-11979",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2020-11979"
},
{
"cve": "CVE-2020-12762",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2020-12762"
},
{
"cve": "CVE-2020-12825",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2020-12825"
},
{
"cve": "CVE-2020-13956",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2020-13956"
},
{
"cve": "CVE-2020-14060",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2020-14060"
},
{
"cve": "CVE-2020-14061",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2020-14061"
},
{
"cve": "CVE-2020-14062",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2020-14062"
},
{
"cve": "CVE-2020-14195",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2020-14195"
},
{
"cve": "CVE-2020-15250",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2020-15250"
},
{
"cve": "CVE-2020-1945",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2020-1945"
},
{
"cve": "CVE-2020-1967",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2020-1967"
},
{
"cve": "CVE-2020-1971",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2020-1971"
},
{
"cve": "CVE-2020-24616",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2020-24616"
},
{
"cve": "CVE-2020-24750",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2020-24750"
},
{
"cve": "CVE-2020-25649",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2020-25649"
},
{
"cve": "CVE-2020-25658",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2020-25658"
},
{
"cve": "CVE-2020-26116",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2020-26116"
},
{
"cve": "CVE-2020-26137",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2020-26137"
},
{
"cve": "CVE-2020-26541",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2020-26541"
},
{
"cve": "CVE-2020-27216",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2020-27216"
},
{
"cve": "CVE-2020-27218",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2020-27218"
},
{
"cve": "CVE-2020-27223",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2020-27223"
},
{
"cve": "CVE-2020-28366",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2020-28366"
},
{
"cve": "CVE-2020-28493",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2020-28493"
},
{
"cve": "CVE-2020-29509",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2020-29509"
},
{
"cve": "CVE-2020-29511",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2020-29511"
},
{
"cve": "CVE-2020-29582",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2020-29582"
},
{
"cve": "CVE-2020-29651",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2020-29651"
},
{
"cve": "CVE-2020-35490",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2020-35490"
},
{
"cve": "CVE-2020-35491",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2020-35491"
},
{
"cve": "CVE-2020-35728",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2020-35728"
},
{
"cve": "CVE-2020-36179",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2020-36179"
},
{
"cve": "CVE-2020-36180",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2020-36180"
},
{
"cve": "CVE-2020-36181",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2020-36181"
},
{
"cve": "CVE-2020-36182",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2020-36182"
},
{
"cve": "CVE-2020-36183",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2020-36183"
},
{
"cve": "CVE-2020-36184",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2020-36184"
},
{
"cve": "CVE-2020-36185",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2020-36185"
},
{
"cve": "CVE-2020-36186",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2020-36186"
},
{
"cve": "CVE-2020-36187",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2020-36187"
},
{
"cve": "CVE-2020-36188",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2020-36188"
},
{
"cve": "CVE-2020-36189",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2020-36189"
},
{
"cve": "CVE-2020-36516",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2020-36516"
},
{
"cve": "CVE-2020-36518",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2020-36518"
},
{
"cve": "CVE-2020-36557",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2020-36557"
},
{
"cve": "CVE-2020-36558",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2020-36558"
},
{
"cve": "CVE-2020-36691",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2020-36691"
},
{
"cve": "CVE-2020-7238",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2020-7238"
},
{
"cve": "CVE-2020-8840",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2020-8840"
},
{
"cve": "CVE-2020-8908",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2020-8908"
},
{
"cve": "CVE-2020-8911",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2020-8911"
},
{
"cve": "CVE-2020-8912",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2020-8912"
},
{
"cve": "CVE-2020-9488",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2020-9488"
},
{
"cve": "CVE-2020-9493",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2020-9493"
},
{
"cve": "CVE-2020-9546",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2020-9546"
},
{
"cve": "CVE-2020-9547",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2020-9547"
},
{
"cve": "CVE-2020-9548",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2020-9548"
},
{
"cve": "CVE-2021-20190",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-20190"
},
{
"cve": "CVE-2021-20323",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-20323"
},
{
"cve": "CVE-2021-21290",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-21290"
},
{
"cve": "CVE-2021-21295",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-21295"
},
{
"cve": "CVE-2021-21409",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-21409"
},
{
"cve": "CVE-2021-23840",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-23840"
},
{
"cve": "CVE-2021-23841",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-23841"
},
{
"cve": "CVE-2021-2471",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-2471"
},
{
"cve": "CVE-2021-25642",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-25642"
},
{
"cve": "CVE-2021-26341",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-26341"
},
{
"cve": "CVE-2021-27918",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-27918"
},
{
"cve": "CVE-2021-28153",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-28153"
},
{
"cve": "CVE-2021-28165",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-28165"
},
{
"cve": "CVE-2021-28169",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-28169"
},
{
"cve": "CVE-2021-28861",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-28861"
},
{
"cve": "CVE-2021-29425",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-29425"
},
{
"cve": "CVE-2021-30560",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-30560"
},
{
"cve": "CVE-2021-3114",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-3114"
},
{
"cve": "CVE-2021-33036",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-33036"
},
{
"cve": "CVE-2021-33194",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-33194"
},
{
"cve": "CVE-2021-33195",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-33195"
},
{
"cve": "CVE-2021-33196",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-33196"
},
{
"cve": "CVE-2021-33197",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-33197"
},
{
"cve": "CVE-2021-33503",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-33503"
},
{
"cve": "CVE-2021-33655",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-33655"
},
{
"cve": "CVE-2021-33656",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-33656"
},
{
"cve": "CVE-2021-3424",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-3424"
},
{
"cve": "CVE-2021-34428",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-34428"
},
{
"cve": "CVE-2021-3449",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-3449"
},
{
"cve": "CVE-2021-3450",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-3450"
},
{
"cve": "CVE-2021-3530",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-3530"
},
{
"cve": "CVE-2021-36221",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-36221"
},
{
"cve": "CVE-2021-36373",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-36373"
},
{
"cve": "CVE-2021-36374",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-36374"
},
{
"cve": "CVE-2021-3648",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-3648"
},
{
"cve": "CVE-2021-36690",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-36690"
},
{
"cve": "CVE-2021-3711",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-3711"
},
{
"cve": "CVE-2021-3712",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-3712"
},
{
"cve": "CVE-2021-37136",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-37136"
},
{
"cve": "CVE-2021-37137",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-37137"
},
{
"cve": "CVE-2021-37404",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-37404"
},
{
"cve": "CVE-2021-37533",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-37533"
},
{
"cve": "CVE-2021-3754",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-3754"
},
{
"cve": "CVE-2021-3778",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-3778"
},
{
"cve": "CVE-2021-3796",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-3796"
},
{
"cve": "CVE-2021-3826",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-3826"
},
{
"cve": "CVE-2021-3827",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-3827"
},
{
"cve": "CVE-2021-38297",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-38297"
},
{
"cve": "CVE-2021-3872",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-3872"
},
{
"cve": "CVE-2021-3875",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-3875"
},
{
"cve": "CVE-2021-3903",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-3903"
},
{
"cve": "CVE-2021-3923",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-3923"
},
{
"cve": "CVE-2021-3927",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-3927"
},
{
"cve": "CVE-2021-3928",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-3928"
},
{
"cve": "CVE-2021-3968",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-3968"
},
{
"cve": "CVE-2021-3973",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-3973"
},
{
"cve": "CVE-2021-3974",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-3974"
},
{
"cve": "CVE-2021-3984",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-3984"
},
{
"cve": "CVE-2021-4019",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-4019"
},
{
"cve": "CVE-2021-4037",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-4037"
},
{
"cve": "CVE-2021-4069",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-4069"
},
{
"cve": "CVE-2021-4104",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-4104"
},
{
"cve": "CVE-2021-4136",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-4136"
},
{
"cve": "CVE-2021-4157",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-4157"
},
{
"cve": "CVE-2021-4166",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-4166"
},
{
"cve": "CVE-2021-41771",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-41771"
},
{
"cve": "CVE-2021-4192",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-4192"
},
{
"cve": "CVE-2021-4193",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-4193"
},
{
"cve": "CVE-2021-4203",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-4203"
},
{
"cve": "CVE-2021-42567",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-42567"
},
{
"cve": "CVE-2021-43797",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-43797"
},
{
"cve": "CVE-2021-44531",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-44531"
},
{
"cve": "CVE-2021-44532",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-44532"
},
{
"cve": "CVE-2021-44533",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-44533"
},
{
"cve": "CVE-2021-44716",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-44716"
},
{
"cve": "CVE-2021-44878",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-44878"
},
{
"cve": "CVE-2021-45078",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-45078"
},
{
"cve": "CVE-2021-46195",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-46195"
},
{
"cve": "CVE-2021-46828",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-46828"
},
{
"cve": "CVE-2021-46848",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-46848"
},
{
"cve": "CVE-2022-0128",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-0128"
},
{
"cve": "CVE-2022-0213",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-0213"
},
{
"cve": "CVE-2022-0225",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-0225"
},
{
"cve": "CVE-2022-0261",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-0261"
},
{
"cve": "CVE-2022-0318",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-0318"
},
{
"cve": "CVE-2022-0319",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-0319"
},
{
"cve": "CVE-2022-0351",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-0351"
},
{
"cve": "CVE-2022-0359",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-0359"
},
{
"cve": "CVE-2022-0361",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-0361"
},
{
"cve": "CVE-2022-0392",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-0392"
},
{
"cve": "CVE-2022-0407",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-0407"
},
{
"cve": "CVE-2022-0413",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-0413"
},
{
"cve": "CVE-2022-0561",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-0561"
},
{
"cve": "CVE-2022-0696",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-0696"
},
{
"cve": "CVE-2022-0778",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-0778"
},
{
"cve": "CVE-2022-1184",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-1184"
},
{
"cve": "CVE-2022-1245",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-1245"
},
{
"cve": "CVE-2022-1271",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-1271"
},
{
"cve": "CVE-2022-1292",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-1292"
},
{
"cve": "CVE-2022-1381",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-1381"
},
{
"cve": "CVE-2022-1420",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-1420"
},
{
"cve": "CVE-2022-1462",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-1462"
},
{
"cve": "CVE-2022-1466",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-1466"
},
{
"cve": "CVE-2022-1471",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-1471"
},
{
"cve": "CVE-2022-1586",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-1586"
},
{
"cve": "CVE-2022-1587",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-1587"
},
{
"cve": "CVE-2022-1616",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-1616"
},
{
"cve": "CVE-2022-1619",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-1619"
},
{
"cve": "CVE-2022-1620",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-1620"
},
{
"cve": "CVE-2022-1679",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-1679"
},
{
"cve": "CVE-2022-1705",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-1705"
},
{
"cve": "CVE-2022-1720",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-1720"
},
{
"cve": "CVE-2022-1729",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-1729"
},
{
"cve": "CVE-2022-1733",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-1733"
},
{
"cve": "CVE-2022-1735",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-1735"
},
{
"cve": "CVE-2022-1771",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-1771"
},
{
"cve": "CVE-2022-1785",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-1785"
},
{
"cve": "CVE-2022-1796",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-1796"
},
{
"cve": "CVE-2022-1851",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-1851"
},
{
"cve": "CVE-2022-1897",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-1897"
},
{
"cve": "CVE-2022-1898",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-1898"
},
{
"cve": "CVE-2022-1927",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-1927"
},
{
"cve": "CVE-2022-1962",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-1962"
},
{
"cve": "CVE-2022-1968",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-1968"
},
{
"cve": "CVE-2022-1974",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-1974"
},
{
"cve": "CVE-2022-1975",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-1975"
},
{
"cve": "CVE-2022-20132",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-20132"
},
{
"cve": "CVE-2022-20141",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-20141"
},
{
"cve": "CVE-2022-20154",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-20154"
},
{
"cve": "CVE-2022-20166",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-20166"
},
{
"cve": "CVE-2022-20368",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-20368"
},
{
"cve": "CVE-2022-20369",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-20369"
},
{
"cve": "CVE-2022-2047",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-2047"
},
{
"cve": "CVE-2022-2048",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-2048"
},
{
"cve": "CVE-2022-20567",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-20567"
},
{
"cve": "CVE-2022-2068",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-2068"
},
{
"cve": "CVE-2022-2097",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-2097"
},
{
"cve": "CVE-2022-21216",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-21216"
},
{
"cve": "CVE-2022-21233",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-21233"
},
{
"cve": "CVE-2022-2124",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-2124"
},
{
"cve": "CVE-2022-2125",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-2125"
},
{
"cve": "CVE-2022-2126",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-2126"
},
{
"cve": "CVE-2022-2129",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-2129"
},
{
"cve": "CVE-2022-21363",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-21363"
},
{
"cve": "CVE-2022-21385",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-21385"
},
{
"cve": "CVE-2022-21499",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-21499"
},
{
"cve": "CVE-2022-2153",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-2153"
},
{
"cve": "CVE-2022-21540",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-21540"
},
{
"cve": "CVE-2022-21541",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-21541"
},
{
"cve": "CVE-2022-21549",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-21549"
},
{
"cve": "CVE-2022-21618",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-21618"
},
{
"cve": "CVE-2022-21619",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-21619"
},
{
"cve": "CVE-2022-21624",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-21624"
},
{
"cve": "CVE-2022-21626",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-21626"
},
{
"cve": "CVE-2022-21628",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-21628"
},
{
"cve": "CVE-2022-21702",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-21702"
},
{
"cve": "CVE-2022-2175",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-2175"
},
{
"cve": "CVE-2022-2182",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-2182"
},
{
"cve": "CVE-2022-2183",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-2183"
},
{
"cve": "CVE-2022-2206",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-2206"
},
{
"cve": "CVE-2022-2207",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-2207"
},
{
"cve": "CVE-2022-2208",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-2208"
},
{
"cve": "CVE-2022-2210",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-2210"
},
{
"cve": "CVE-2022-2231",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-2231"
},
{
"cve": "CVE-2022-2256",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-2256"
},
{
"cve": "CVE-2022-2257",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-2257"
},
{
"cve": "CVE-2022-2264",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-2264"
},
{
"cve": "CVE-2022-2284",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-2284"
},
{
"cve": "CVE-2022-2285",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-2285"
},
{
"cve": "CVE-2022-2286",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-2286"
},
{
"cve": "CVE-2022-2287",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-2287"
},
{
"cve": "CVE-2022-22976",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-22976"
},
{
"cve": "CVE-2022-22978",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-22978"
},
{
"cve": "CVE-2022-2304",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-2304"
},
{
"cve": "CVE-2022-2318",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-2318"
},
{
"cve": "CVE-2022-23302",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-23302"
},
{
"cve": "CVE-2022-23305",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-23305"
},
{
"cve": "CVE-2022-23307",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-23307"
},
{
"cve": "CVE-2022-2343",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-2343"
},
{
"cve": "CVE-2022-2344",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-2344"
},
{
"cve": "CVE-2022-2345",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-2345"
},
{
"cve": "CVE-2022-23471",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-23471"
},
{
"cve": "CVE-2022-23521",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-23521"
},
{
"cve": "CVE-2022-23772",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-23772"
},
{
"cve": "CVE-2022-23773",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-23773"
},
{
"cve": "CVE-2022-24302",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-24302"
},
{
"cve": "CVE-2022-24329",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-24329"
},
{
"cve": "CVE-2022-24823",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-24823"
},
{
"cve": "CVE-2022-24903",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-24903"
},
{
"cve": "CVE-2022-2503",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-2503"
},
{
"cve": "CVE-2022-25147",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-25147"
},
{
"cve": "CVE-2022-25168",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-25168"
},
{
"cve": "CVE-2022-2519",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-2519"
},
{
"cve": "CVE-2022-2520",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-2520"
},
{
"cve": "CVE-2022-2521",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-2521"
},
{
"cve": "CVE-2022-2522",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-2522"
},
{
"cve": "CVE-2022-25647",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-25647"
},
{
"cve": "CVE-2022-2571",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-2571"
},
{
"cve": "CVE-2022-2580",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-2580"
},
{
"cve": "CVE-2022-2581",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-2581"
},
{
"cve": "CVE-2022-25857",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-25857"
},
{
"cve": "CVE-2022-2588",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-2588"
},
{
"cve": "CVE-2022-2598",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-2598"
},
{
"cve": "CVE-2022-26148",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-26148"
},
{
"cve": "CVE-2022-26365",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-26365"
},
{
"cve": "CVE-2022-26373",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-26373"
},
{
"cve": "CVE-2022-2639",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-2639"
},
{
"cve": "CVE-2022-26612",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-26612"
},
{
"cve": "CVE-2022-2663",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-2663"
},
{
"cve": "CVE-2022-27781",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-27781"
},
{
"cve": "CVE-2022-27782",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-27782"
},
{
"cve": "CVE-2022-27943",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-27943"
},
{
"cve": "CVE-2022-2795",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-2795"
},
{
"cve": "CVE-2022-28131",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-28131"
},
{
"cve": "CVE-2022-2816",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-2816"
},
{
"cve": "CVE-2022-2817",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-2817"
},
{
"cve": "CVE-2022-2819",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-2819"
},
{
"cve": "CVE-2022-28327",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-28327"
},
{
"cve": "CVE-2022-2845",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-2845"
},
{
"cve": "CVE-2022-2849",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-2849"
},
{
"cve": "CVE-2022-2862",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-2862"
},
{
"cve": "CVE-2022-2867",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-2867"
},
{
"cve": "CVE-2022-2868",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-2868"
},
{
"cve": "CVE-2022-2869",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-2869"
},
{
"cve": "CVE-2022-28693",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-28693"
},
{
"cve": "CVE-2022-2874",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-2874"
},
{
"cve": "CVE-2022-28748",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-28748"
},
{
"cve": "CVE-2022-2880",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-2880"
},
{
"cve": "CVE-2022-2889",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-2889"
},
{
"cve": "CVE-2022-29162",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-29162"
},
{
"cve": "CVE-2022-29187",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-29187"
},
{
"cve": "CVE-2022-2923",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-2923"
},
{
"cve": "CVE-2022-2946",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-2946"
},
{
"cve": "CVE-2022-29526",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-29526"
},
{
"cve": "CVE-2022-29583",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-29583"
},
{
"cve": "CVE-2022-2964",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-2964"
},
{
"cve": "CVE-2022-2977",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-2977"
},
{
"cve": "CVE-2022-2980",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-2980"
},
{
"cve": "CVE-2022-2982",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-2982"
},
{
"cve": "CVE-2022-29900",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-29900"
},
{
"cve": "CVE-2022-29901",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-29901"
},
{
"cve": "CVE-2022-2991",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-2991"
},
{
"cve": "CVE-2022-3016",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-3016"
},
{
"cve": "CVE-2022-3028",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-3028"
},
{
"cve": "CVE-2022-3037",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-3037"
},
{
"cve": "CVE-2022-30580",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-30580"
},
{
"cve": "CVE-2022-30630",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-30630"
},
{
"cve": "CVE-2022-30631",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-30631"
},
{
"cve": "CVE-2022-30632",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-30632"
},
{
"cve": "CVE-2022-30633",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-30633"
},
{
"cve": "CVE-2022-3099",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-3099"
},
{
"cve": "CVE-2022-31030",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-31030"
},
{
"cve": "CVE-2022-31159",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-31159"
},
{
"cve": "CVE-2022-3134",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-3134"
},
{
"cve": "CVE-2022-3153",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-3153"
},
{
"cve": "CVE-2022-3169",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-3169"
},
{
"cve": "CVE-2022-31690",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-31690"
},
{
"cve": "CVE-2022-32148",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-32148"
},
{
"cve": "CVE-2022-32149",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-32149"
},
{
"cve": "CVE-2022-32206",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-32206"
},
{
"cve": "CVE-2022-32208",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-32208"
},
{
"cve": "CVE-2022-32221",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-32221"
},
{
"cve": "CVE-2022-3234",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-3234"
},
{
"cve": "CVE-2022-3235",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-3235"
},
{
"cve": "CVE-2022-3239",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-3239"
},
{
"cve": "CVE-2022-3278",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-3278"
},
{
"cve": "CVE-2022-3296",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-3296"
},
{
"cve": "CVE-2022-3297",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-3297"
},
{
"cve": "CVE-2022-33196",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-33196"
},
{
"cve": "CVE-2022-3324",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-3324"
},
{
"cve": "CVE-2022-3352",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-3352"
},
{
"cve": "CVE-2022-33740",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-33740"
},
{
"cve": "CVE-2022-33741",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-33741"
},
{
"cve": "CVE-2022-33742",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-33742"
},
{
"cve": "CVE-2022-33972",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-33972"
},
{
"cve": "CVE-2022-33981",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-33981"
},
{
"cve": "CVE-2022-34169",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-34169"
},
{
"cve": "CVE-2022-3424",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-3424"
},
{
"cve": "CVE-2022-34266",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-34266"
},
{
"cve": "CVE-2022-34526",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-34526"
},
{
"cve": "CVE-2022-34903",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-34903"
},
{
"cve": "CVE-2022-3491",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-3491"
},
{
"cve": "CVE-2022-3515",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-3515"
},
{
"cve": "CVE-2022-3520",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-3520"
},
{
"cve": "CVE-2022-3521",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-3521"
},
{
"cve": "CVE-2022-3524",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-3524"
},
{
"cve": "CVE-2022-35252",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-35252"
},
{
"cve": "CVE-2022-3542",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-3542"
},
{
"cve": "CVE-2022-3545",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-3545"
},
{
"cve": "CVE-2022-3564",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-3564"
},
{
"cve": "CVE-2022-3565",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-3565"
},
{
"cve": "CVE-2022-3566",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-3566"
},
{
"cve": "CVE-2022-3567",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-3567"
},
{
"cve": "CVE-2022-35737",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-35737"
},
{
"cve": "CVE-2022-3586",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-3586"
},
{
"cve": "CVE-2022-3591",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-3591"
},
{
"cve": "CVE-2022-3594",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-3594"
},
{
"cve": "CVE-2022-3597",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-3597"
},
{
"cve": "CVE-2022-3599",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-3599"
},
{
"cve": "CVE-2022-36109",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-36109"
},
{
"cve": "CVE-2022-3621",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-3621"
},
{
"cve": "CVE-2022-3626",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-3626"
},
{
"cve": "CVE-2022-3627",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-3627"
},
{
"cve": "CVE-2022-3628",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-3628"
},
{
"cve": "CVE-2022-36280",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-36280"
},
{
"cve": "CVE-2022-3629",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-3629"
},
{
"cve": "CVE-2022-3635",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-3635"
},
{
"cve": "CVE-2022-3643",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-3643"
},
{
"cve": "CVE-2022-36437",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-36437"
},
{
"cve": "CVE-2022-3646",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-3646"
},
{
"cve": "CVE-2022-3649",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-3649"
},
{
"cve": "CVE-2022-36760",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-36760"
},
{
"cve": "CVE-2022-36879",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-36879"
},
{
"cve": "CVE-2022-36946",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-36946"
},
{
"cve": "CVE-2022-3705",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-3705"
},
{
"cve": "CVE-2022-37434",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-37434"
},
{
"cve": "CVE-2022-37436",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-37436"
},
{
"cve": "CVE-2022-37865",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-37865"
},
{
"cve": "CVE-2022-37866",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-37866"
},
{
"cve": "CVE-2022-38090",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-38090"
},
{
"cve": "CVE-2022-38096",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-38096"
},
{
"cve": "CVE-2022-38126",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-38126"
},
{
"cve": "CVE-2022-38127",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-38127"
},
{
"cve": "CVE-2022-38177",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-38177"
},
{
"cve": "CVE-2022-38178",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-38178"
},
{
"cve": "CVE-2022-3821",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-3821"
},
{
"cve": "CVE-2022-38533",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-38533"
},
{
"cve": "CVE-2022-38749",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-38749"
},
{
"cve": "CVE-2022-38750",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-38750"
},
{
"cve": "CVE-2022-38751",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-38751"
},
{
"cve": "CVE-2022-38752",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-38752"
},
{
"cve": "CVE-2022-39028",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-39028"
},
{
"cve": "CVE-2022-3903",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-3903"
},
{
"cve": "CVE-2022-39188",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-39188"
},
{
"cve": "CVE-2022-39399",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-39399"
},
{
"cve": "CVE-2022-3970",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-3970"
},
{
"cve": "CVE-2022-40149",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-40149"
},
{
"cve": "CVE-2022-40150",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-40150"
},
{
"cve": "CVE-2022-40151",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-40151"
},
{
"cve": "CVE-2022-40152",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-40152"
},
{
"cve": "CVE-2022-40153",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-40153"
},
{
"cve": "CVE-2022-40303",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-40303"
},
{
"cve": "CVE-2022-40304",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-40304"
},
{
"cve": "CVE-2022-40307",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-40307"
},
{
"cve": "CVE-2022-40674",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-40674"
},
{
"cve": "CVE-2022-40768",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-40768"
},
{
"cve": "CVE-2022-40899",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-40899"
},
{
"cve": "CVE-2022-4095",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-4095"
},
{
"cve": "CVE-2022-41218",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-41218"
},
{
"cve": "CVE-2022-4129",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-4129"
},
{
"cve": "CVE-2022-4141",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-4141"
},
{
"cve": "CVE-2022-41717",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-41717"
},
{
"cve": "CVE-2022-41721",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-41721"
},
{
"cve": "CVE-2022-41848",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-41848"
},
{
"cve": "CVE-2022-41850",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-41850"
},
{
"cve": "CVE-2022-41854",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-41854"
},
{
"cve": "CVE-2022-41858",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-41858"
},
{
"cve": "CVE-2022-41881",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-41881"
},
{
"cve": "CVE-2022-41903",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-41903"
},
{
"cve": "CVE-2022-41915",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-41915"
},
{
"cve": "CVE-2022-41966",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-41966"
},
{
"cve": "CVE-2022-41974",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-41974"
},
{
"cve": "CVE-2022-42003",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-42003"
},
{
"cve": "CVE-2022-42004",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-42004"
},
{
"cve": "CVE-2022-42010",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-42010"
},
{
"cve": "CVE-2022-42011",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-42011"
},
{
"cve": "CVE-2022-42012",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-42012"
},
{
"cve": "CVE-2022-42328",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-42328"
},
{
"cve": "CVE-2022-42329",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-42329"
},
{
"cve": "CVE-2022-42703",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-42703"
},
{
"cve": "CVE-2022-42889",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-42889"
},
{
"cve": "CVE-2022-42895",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-42895"
},
{
"cve": "CVE-2022-42896",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-42896"
},
{
"cve": "CVE-2022-42898",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-42898"
},
{
"cve": "CVE-2022-4292",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-4292"
},
{
"cve": "CVE-2022-4293",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-4293"
},
{
"cve": "CVE-2022-42969",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-42969"
},
{
"cve": "CVE-2022-4304",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-4304"
},
{
"cve": "CVE-2022-43552",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-43552"
},
{
"cve": "CVE-2022-43680",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-43680"
},
{
"cve": "CVE-2022-43750",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-43750"
},
{
"cve": "CVE-2022-4378",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-4378"
},
{
"cve": "CVE-2022-43945",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-43945"
},
{
"cve": "CVE-2022-43995",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-43995"
},
{
"cve": "CVE-2022-4415",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-4415"
},
{
"cve": "CVE-2022-4450",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-4450"
},
{
"cve": "CVE-2022-44638",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-44638"
},
{
"cve": "CVE-2022-45061",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-45061"
},
{
"cve": "CVE-2022-45688",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-45688"
},
{
"cve": "CVE-2022-45884",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-45884"
},
{
"cve": "CVE-2022-45885",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-45885"
},
{
"cve": "CVE-2022-45886",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-45886"
},
{
"cve": "CVE-2022-45887",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-45887"
},
{
"cve": "CVE-2022-45919",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-45919"
},
{
"cve": "CVE-2022-45934",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-45934"
},
{
"cve": "CVE-2022-45939",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-45939"
},
{
"cve": "CVE-2022-4662",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-4662"
},
{
"cve": "CVE-2022-46751",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-46751"
},
{
"cve": "CVE-2022-46908",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-46908"
},
{
"cve": "CVE-2022-47629",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-47629"
},
{
"cve": "CVE-2022-47929",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-47929"
},
{
"cve": "CVE-2022-48281",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-48281"
},
{
"cve": "CVE-2022-48337",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-48337"
},
{
"cve": "CVE-2022-48339",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-48339"
},
{
"cve": "CVE-2023-0045",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-0045"
},
{
"cve": "CVE-2023-0049",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-0049"
},
{
"cve": "CVE-2023-0051",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-0051"
},
{
"cve": "CVE-2023-0054",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-0054"
},
{
"cve": "CVE-2023-0215",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-0215"
},
{
"cve": "CVE-2023-0286",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-0286"
},
{
"cve": "CVE-2023-0288",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-0288"
},
{
"cve": "CVE-2023-0433",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-0433"
},
{
"cve": "CVE-2023-0464",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-0464"
},
{
"cve": "CVE-2023-0465",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-0465"
},
{
"cve": "CVE-2023-0466",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-0466"
},
{
"cve": "CVE-2023-0512",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-0512"
},
{
"cve": "CVE-2023-0590",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-0590"
},
{
"cve": "CVE-2023-0597",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-0597"
},
{
"cve": "CVE-2023-0833",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-0833"
},
{
"cve": "CVE-2023-1076",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-1076"
},
{
"cve": "CVE-2023-1095",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-1095"
},
{
"cve": "CVE-2023-1118",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-1118"
},
{
"cve": "CVE-2023-1127",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-1127"
},
{
"cve": "CVE-2023-1170",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-1170"
},
{
"cve": "CVE-2023-1175",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-1175"
},
{
"cve": "CVE-2023-1370",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-1370"
},
{
"cve": "CVE-2023-1380",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-1380"
},
{
"cve": "CVE-2023-1390",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-1390"
},
{
"cve": "CVE-2023-1436",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-1436"
},
{
"cve": "CVE-2023-1513",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-1513"
},
{
"cve": "CVE-2023-1611",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-1611"
},
{
"cve": "CVE-2023-1670",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-1670"
},
{
"cve": "CVE-2023-1855",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-1855"
},
{
"cve": "CVE-2023-1989",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-1989"
},
{
"cve": "CVE-2023-1990",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-1990"
},
{
"cve": "CVE-2023-1998",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-1998"
},
{
"cve": "CVE-2023-20862",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-20862"
},
{
"cve": "CVE-2023-2124",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-2124"
},
{
"cve": "CVE-2023-2162",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-2162"
},
{
"cve": "CVE-2023-2176",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-2176"
},
{
"cve": "CVE-2023-21830",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-21830"
},
{
"cve": "CVE-2023-21835",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-21835"
},
{
"cve": "CVE-2023-21843",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-21843"
},
{
"cve": "CVE-2023-21930",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-21930"
},
{
"cve": "CVE-2023-21937",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-21937"
},
{
"cve": "CVE-2023-21938",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-21938"
},
{
"cve": "CVE-2023-21939",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-21939"
},
{
"cve": "CVE-2023-2194",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-2194"
},
{
"cve": "CVE-2023-21954",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-21954"
},
{
"cve": "CVE-2023-21967",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-21967"
},
{
"cve": "CVE-2023-21968",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-21968"
},
{
"cve": "CVE-2023-22490",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-22490"
},
{
"cve": "CVE-2023-2253",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-2253"
},
{
"cve": "CVE-2023-22809",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-22809"
},
{
"cve": "CVE-2023-23454",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-23454"
},
{
"cve": "CVE-2023-23455",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-23455"
},
{
"cve": "CVE-2023-23559",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-23559"
},
{
"cve": "CVE-2023-23916",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-23916"
},
{
"cve": "CVE-2023-23946",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-23946"
},
{
"cve": "CVE-2023-24329",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-24329"
},
{
"cve": "CVE-2023-24532",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-24532"
},
{
"cve": "CVE-2023-24534",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-24534"
},
{
"cve": "CVE-2023-2483",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-2483"
},
{
"cve": "CVE-2023-24998",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-24998"
},
{
"cve": "CVE-2023-2513",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-2513"
},
{
"cve": "CVE-2023-25193",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-25193"
},
{
"cve": "CVE-2023-25652",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-25652"
},
{
"cve": "CVE-2023-25690",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-25690"
},
{
"cve": "CVE-2023-25809",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-25809"
},
{
"cve": "CVE-2023-25815",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-25815"
},
{
"cve": "CVE-2023-26048",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-26048"
},
{
"cve": "CVE-2023-26049",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-26049"
},
{
"cve": "CVE-2023-2650",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-2650"
},
{
"cve": "CVE-2023-26545",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-26545"
},
{
"cve": "CVE-2023-26604",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-26604"
},
{
"cve": "CVE-2023-27533",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-27533"
},
{
"cve": "CVE-2023-27534",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-27534"
},
{
"cve": "CVE-2023-27535",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-27535"
},
{
"cve": "CVE-2023-27536",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-27536"
},
{
"cve": "CVE-2023-27538",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-27538"
},
{
"cve": "CVE-2023-27561",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-27561"
},
{
"cve": "CVE-2023-2828",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-2828"
},
{
"cve": "CVE-2023-28320",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-28320"
},
{
"cve": "CVE-2023-28321",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-28321"
},
{
"cve": "CVE-2023-28322",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-28322"
},
{
"cve": "CVE-2023-28328",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-28328"
},
{
"cve": "CVE-2023-28464",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-28464"
},
{
"cve": "CVE-2023-28486",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-28486"
},
{
"cve": "CVE-2023-28487",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-28487"
},
{
"cve": "CVE-2023-28642",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-28642"
},
{
"cve": "CVE-2023-28772",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-28772"
},
{
"cve": "CVE-2023-28840",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-28840"
},
{
"cve": "CVE-2023-28841",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-28841"
},
{
"cve": "CVE-2023-28842",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-28842"
},
{
"cve": "CVE-2023-29007",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-29007"
},
{
"cve": "CVE-2023-29383",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-29383"
},
{
"cve": "CVE-2023-29402",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-29402"
},
{
"cve": "CVE-2023-29406",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-29406"
},
{
"cve": "CVE-2023-29409",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-29409"
},
{
"cve": "CVE-2023-2976",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-2976"
},
{
"cve": "CVE-2023-30630",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-30630"
},
{
"cve": "CVE-2023-30772",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-30772"
},
{
"cve": "CVE-2023-31084",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-31084"
},
{
"cve": "CVE-2023-3138",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-3138"
},
{
"cve": "CVE-2023-31436",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-31436"
},
{
"cve": "CVE-2023-31484",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-31484"
},
{
"cve": "CVE-2023-32269",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-32269"
},
{
"cve": "CVE-2023-32697",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-32697"
},
{
"cve": "CVE-2023-33264",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-33264"
},
{
"cve": "CVE-2023-34034",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-34034"
},
{
"cve": "CVE-2023-34035",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-34035"
},
{
"cve": "CVE-2023-34453",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-34453"
},
{
"cve": "CVE-2023-34454",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-34454"
},
{
"cve": "CVE-2023-34455",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-34455"
},
{
"cve": "CVE-2023-34462",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-34462"
},
{
"cve": "CVE-2023-35116",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-35116"
},
{
"cve": "CVE-2023-3635",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-3635"
},
{
"cve": "CVE-2023-36479",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-36479"
},
{
"cve": "CVE-2023-39533",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-39533"
},
{
"cve": "CVE-2023-40167",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-40167"
},
{
"cve": "CVE-2023-40217",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-40217"
},
{
"cve": "CVE-2023-41105",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-41105"
},
{
"cve": "CVE-2023-41900",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-41900"
},
{
"cve": "CVE-2023-43642",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-43642"
},
{
"cve": "CVE-2023-43804",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-43804"
},
{
"cve": "CVE-2023-44487",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-44487"
},
{
"cve": "CVE-2023-45803",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-45803"
},
{
"cve": "CVE-2024-21626",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2024-21626"
}
]
}
WID-SEC-W-2023-0210
Vulnerability from csaf_certbund
Notes
{
"document": {
"aggregate_severity": {
"text": "mittel"
},
"category": "csaf_base",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "de-DE",
"notes": [
{
"category": "legal_disclaimer",
"text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
},
{
"category": "description",
"text": "Red Hat Enterprise Linux (RHEL) ist eine popul\u00e4re Linux-Distribution.",
"title": "Produktbeschreibung"
},
{
"category": "summary",
"text": "Ein entfernter, anonymer Angreifer kann eine Schwachstelle in Red Hat Enterprise Linux in der Komponente Submariner ausnutzen, um einen Denial of Service Angriff durchzuf\u00fchren.",
"title": "Angriff"
},
{
"category": "general",
"text": "- Linux",
"title": "Betroffene Betriebssysteme"
}
],
"publisher": {
"category": "other",
"contact_details": "csaf-provider@cert-bund.de",
"name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"namespace": "https://www.bsi.bund.de"
},
"references": [
{
"category": "self",
"summary": "WID-SEC-W-2023-0210 - CSAF Version",
"url": "https://wid.cert-bund.de/.well-known/csaf/white/2023/wid-sec-w-2023-0210.json"
},
{
"category": "self",
"summary": "WID-SEC-2023-0210 - Portal Version",
"url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2023-0210"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2023:0481 vom 2023-01-26",
"url": "https://access.redhat.com/errata/RHSA-2023:0481"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2023:0692 vom 2023-02-09",
"url": "https://access.redhat.com/errata/RHSA-2023:0692"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2023:0795 vom 2023-02-16",
"url": "https://access.redhat.com/errata/RHSA-2023:0795"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALASDOCKER-2024-035 vom 2024-01-24",
"url": "https://alas.aws.amazon.com/AL2/ALASDOCKER-2024-035.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2023:3613 vom 2023-06-27",
"url": "https://access.redhat.com/errata/RHSA-2023:3613"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:2077 vom 2024-04-29",
"url": "https://access.redhat.com/errata/RHSA-2024:2077"
}
],
"source_lang": "en-US",
"title": "Red Hat Enterprise Linux (Submariner): Schwachstelle erm\u00f6glicht Denial of Service",
"tracking": {
"current_release_date": "2024-04-28T22:00:00.000+00:00",
"generator": {
"date": "2024-08-15T17:42:38.391+00:00",
"engine": {
"name": "BSI-WID",
"version": "1.3.5"
}
},
"id": "WID-SEC-W-2023-0210",
"initial_release_date": "2023-01-26T23:00:00.000+00:00",
"revision_history": [
{
"date": "2023-01-26T23:00:00.000+00:00",
"number": "1",
"summary": "Initiale Fassung"
},
{
"date": "2023-02-08T23:00:00.000+00:00",
"number": "2",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2023-02-15T23:00:00.000+00:00",
"number": "3",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2023-06-26T22:00:00.000+00:00",
"number": "4",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2024-01-24T23:00:00.000+00:00",
"number": "5",
"summary": "Neue Updates von Amazon aufgenommen"
},
{
"date": "2024-04-28T22:00:00.000+00:00",
"number": "6",
"summary": "Neue Updates von Red Hat aufgenommen"
}
],
"status": "final",
"version": "6"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Amazon Linux 2",
"product": {
"name": "Amazon Linux 2",
"product_id": "398363",
"product_identification_helper": {
"cpe": "cpe:/o:amazon:linux_2:-"
}
}
}
],
"category": "vendor",
"name": "Amazon"
},
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux",
"product": {
"name": "Red Hat Enterprise Linux",
"product_id": "67646",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:-"
}
}
},
{
"category": "product_version",
"name": "8",
"product": {
"name": "Red Hat Enterprise Linux 8",
"product_id": "T014111",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:8"
}
}
}
],
"category": "product_name",
"name": "Enterprise Linux"
},
{
"branches": [
{
"category": "product_version_range",
"name": "Container Platform \u003c4.12.22",
"product": {
"name": "Red Hat OpenShift Container Platform \u003c4.12.22",
"product_id": "T028307"
}
}
],
"category": "product_name",
"name": "OpenShift"
}
],
"category": "vendor",
"name": "Red Hat"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2022-32149",
"notes": [
{
"category": "description",
"text": "Es existiert eine Schwachstelle in Red Hat Enterprise Linux. Diese besteht in der Komponente \"Submariner\" bzw. in dessen Modul \"Golang\" und ist auf einen Fehler beim Verarbeiten von bestimmten Headern zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstelle ausnutzen, um einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"67646",
"T028307",
"398363",
"T014111"
]
},
"release_date": "2023-01-26T23:00:00.000+00:00",
"title": "CVE-2022-32149"
}
]
}
msrc_cve-2022-32149
Vulnerability from csaf_microsoft
Notes
{
"document": {
"category": "csaf_vex",
"csaf_version": "2.0",
"distribution": {
"text": "Public",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en-US",
"notes": [
{
"category": "general",
"text": "To determine the support lifecycle for your software, see the Microsoft Support Lifecycle: https://support.microsoft.com/lifecycle",
"title": "Additional Resources"
},
{
"category": "legal_disclaimer",
"text": "The information provided in the Microsoft Knowledge Base is provided \\\"as is\\\" without warranty of any kind. Microsoft disclaims all warranties, either express or implied, including the warranties of merchantability and fitness for a particular purpose. In no event shall Microsoft Corporation or its suppliers be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages, even if Microsoft Corporation or its suppliers have been advised of the possibility of such damages. Some states do not allow the exclusion or limitation of liability for consequential or incidental damages so the foregoing limitation may not apply.",
"title": "Disclaimer"
}
],
"publisher": {
"category": "vendor",
"contact_details": "secure@microsoft.com",
"name": "Microsoft Security Response Center",
"namespace": "https://msrc.microsoft.com"
},
"references": [
{
"category": "self",
"summary": "CVE-2022-32149 Denial of service via crafted Accept-Language header in golang.org/x/text/language - VEX",
"url": "https://msrc.microsoft.com/csaf/vex/2022/msrc_cve-2022-32149.json"
},
{
"category": "external",
"summary": "Microsoft Support Lifecycle",
"url": "https://support.microsoft.com/lifecycle"
},
{
"category": "external",
"summary": "Common Vulnerability Scoring System",
"url": "https://www.first.org/cvss"
}
],
"title": "Denial of service via crafted Accept-Language header in golang.org/x/text/language",
"tracking": {
"current_release_date": "2025-05-27T00:00:00.000Z",
"generator": {
"date": "2025-10-24T03:05:14.178Z",
"engine": {
"name": "MSRC Generator",
"version": "1.0"
}
},
"id": "msrc_CVE-2022-32149",
"initial_release_date": "2022-10-02T00:00:00.000Z",
"revision_history": [
{
"date": "2023-11-08T00:00:00.000Z",
"legacy_version": "1",
"number": "1",
"summary": "Information published."
},
{
"date": "2024-01-24T00:00:00.000Z",
"legacy_version": "1.1",
"number": "2",
"summary": "Added sriov-network-device-plugin to CBL-Mariner 2.0"
},
{
"date": "2024-06-30T07:00:00.000Z",
"legacy_version": "1.2",
"number": "3",
"summary": "Information published."
},
{
"date": "2024-08-29T00:00:00.000Z",
"legacy_version": "1.3",
"number": "4",
"summary": "Information published."
},
{
"date": "2024-08-30T00:00:00.000Z",
"legacy_version": "1.4",
"number": "5",
"summary": "Information published."
},
{
"date": "2024-08-31T00:00:00.000Z",
"legacy_version": "1.5",
"number": "6",
"summary": "Information published."
},
{
"date": "2024-09-01T00:00:00.000Z",
"legacy_version": "1.6",
"number": "7",
"summary": "Information published."
},
{
"date": "2024-09-02T00:00:00.000Z",
"legacy_version": "1.7",
"number": "8",
"summary": "Information published."
},
{
"date": "2024-09-03T00:00:00.000Z",
"legacy_version": "1.8",
"number": "9",
"summary": "Information published."
},
{
"date": "2024-09-05T00:00:00.000Z",
"legacy_version": "1.9",
"number": "10",
"summary": "Information published."
},
{
"date": "2024-09-06T00:00:00.000Z",
"legacy_version": "2",
"number": "11",
"summary": "Information published."
},
{
"date": "2024-09-07T00:00:00.000Z",
"legacy_version": "2.1",
"number": "12",
"summary": "Information published."
},
{
"date": "2024-09-08T00:00:00.000Z",
"legacy_version": "2.2",
"number": "13",
"summary": "Information published."
},
{
"date": "2024-09-11T00:00:00.000Z",
"legacy_version": "2.3",
"number": "14",
"summary": "Information published."
},
{
"date": "2024-09-13T00:00:00.000Z",
"legacy_version": "2.4",
"number": "15",
"summary": "Information published."
},
{
"date": "2024-09-19T00:00:00.000Z",
"legacy_version": "2.5",
"number": "16",
"summary": "Information published."
},
{
"date": "2024-09-20T00:00:00.000Z",
"legacy_version": "2.6",
"number": "17",
"summary": "Information published."
},
{
"date": "2024-09-21T00:00:00.000Z",
"legacy_version": "2.7",
"number": "18",
"summary": "Information published."
},
{
"date": "2024-09-22T00:00:00.000Z",
"legacy_version": "2.8",
"number": "19",
"summary": "Information published."
},
{
"date": "2024-09-23T00:00:00.000Z",
"legacy_version": "2.9",
"number": "20",
"summary": "Information published."
},
{
"date": "2024-09-24T00:00:00.000Z",
"legacy_version": "3",
"number": "21",
"summary": "Information published."
},
{
"date": "2024-09-25T00:00:00.000Z",
"legacy_version": "3.1",
"number": "22",
"summary": "Information published."
},
{
"date": "2024-09-26T00:00:00.000Z",
"legacy_version": "3.2",
"number": "23",
"summary": "Information published."
},
{
"date": "2024-09-27T00:00:00.000Z",
"legacy_version": "3.3",
"number": "24",
"summary": "Information published."
},
{
"date": "2024-09-28T00:00:00.000Z",
"legacy_version": "3.4",
"number": "25",
"summary": "Information published."
},
{
"date": "2024-09-29T00:00:00.000Z",
"legacy_version": "3.5",
"number": "26",
"summary": "Information published."
},
{
"date": "2024-09-30T00:00:00.000Z",
"legacy_version": "3.6",
"number": "27",
"summary": "Information published."
},
{
"date": "2024-10-01T00:00:00.000Z",
"legacy_version": "3.7",
"number": "28",
"summary": "Information published."
},
{
"date": "2024-10-02T00:00:00.000Z",
"legacy_version": "3.8",
"number": "29",
"summary": "Information published."
},
{
"date": "2024-10-03T00:00:00.000Z",
"legacy_version": "3.9",
"number": "30",
"summary": "Information published."
},
{
"date": "2024-10-04T00:00:00.000Z",
"legacy_version": "4",
"number": "31",
"summary": "Information published."
},
{
"date": "2024-10-05T00:00:00.000Z",
"legacy_version": "4.1",
"number": "32",
"summary": "Information published."
},
{
"date": "2024-10-06T00:00:00.000Z",
"legacy_version": "4.2",
"number": "33",
"summary": "Information published."
},
{
"date": "2024-10-07T00:00:00.000Z",
"legacy_version": "4.3",
"number": "34",
"summary": "Information published."
},
{
"date": "2024-10-08T00:00:00.000Z",
"legacy_version": "4.4",
"number": "35",
"summary": "Information published."
},
{
"date": "2024-10-09T00:00:00.000Z",
"legacy_version": "4.5",
"number": "36",
"summary": "Information published."
},
{
"date": "2024-10-11T00:00:00.000Z",
"legacy_version": "4.6",
"number": "37",
"summary": "Information published."
},
{
"date": "2024-10-12T00:00:00.000Z",
"legacy_version": "4.7",
"number": "38",
"summary": "Information published."
},
{
"date": "2024-10-13T00:00:00.000Z",
"legacy_version": "4.8",
"number": "39",
"summary": "Information published."
},
{
"date": "2024-10-14T00:00:00.000Z",
"legacy_version": "4.9",
"number": "40",
"summary": "Information published."
},
{
"date": "2024-10-15T00:00:00.000Z",
"legacy_version": "5",
"number": "41",
"summary": "Added kubevirt to CBL-Mariner 2.0\nAdded application-gateway-kubernetes-ingress to CBL-Mariner 2.0\nAdded containerized-data-importer to CBL-Mariner 2.0\nAdded keda to CBL-Mariner 2.0\nAdded prometheus-adapter to CBL-Mariner 2.0\nAdded cf-cli to CBL-Mariner 2.0\nAdded influxdb to CBL-Mariner 2.0\nAdded libcontainers-common to CBL-Mariner 2.0\nAdded git-lfs to CBL-Mariner 2.0\nAdded node-problem-detector to CBL-Mariner 2.0\nAdded sriov-network-device-plugin to CBL-Mariner 2.0\nAdded kured to CBL-Mariner 2.0\nAdded cni to Azure Linux 3.0\nAdded multus to Azure Linux 3.0\nAdded keda to Azure Linux 3.0\nAdded kubevirt to Azure Linux 3.0\nAdded sriov-network-device-plugin to Azure Linux 3.0\nAdded node-problem-detector to Azure Linux 3.0"
},
{
"date": "2024-10-16T00:00:00.000Z",
"legacy_version": "5.1",
"number": "42",
"summary": "Added kubevirt to CBL-Mariner 2.0\nAdded application-gateway-kubernetes-ingress to CBL-Mariner 2.0\nAdded containerized-data-importer to CBL-Mariner 2.0\nAdded keda to CBL-Mariner 2.0\nAdded prometheus-adapter to CBL-Mariner 2.0\nAdded cf-cli to CBL-Mariner 2.0\nAdded influxdb to CBL-Mariner 2.0\nAdded libcontainers-common to CBL-Mariner 2.0\nAdded git-lfs to CBL-Mariner 2.0\nAdded node-problem-detector to CBL-Mariner 2.0\nAdded sriov-network-device-plugin to CBL-Mariner 2.0\nAdded kured to CBL-Mariner 2.0\nAdded cni to Azure Linux 3.0\nAdded multus to Azure Linux 3.0\nAdded keda to Azure Linux 3.0\nAdded kubevirt to Azure Linux 3.0\nAdded sriov-network-device-plugin to Azure Linux 3.0\nAdded node-problem-detector to Azure Linux 3.0"
},
{
"date": "2024-10-17T00:00:00.000Z",
"legacy_version": "5.2",
"number": "43",
"summary": "Added terraform to CBL-Mariner 2.0\nAdded kubevirt to CBL-Mariner 2.0\nAdded application-gateway-kubernetes-ingress to CBL-Mariner 2.0\nAdded containerized-data-importer to CBL-Mariner 2.0\nAdded keda to CBL-Mariner 2.0\nAdded prometheus-adapter to CBL-Mariner 2.0\nAdded cf-cli to CBL-Mariner 2.0\nAdded influxdb to CBL-Mariner 2.0\nAdded libcontainers-common to CBL-Mariner 2.0\nAdded git-lfs to CBL-Mariner 2.0\nAdded node-problem-detector to CBL-Mariner 2.0\nAdded sriov-network-device-plugin to CBL-Mariner 2.0\nAdded kured to CBL-Mariner 2.0\nAdded cni to Azure Linux 3.0\nAdded multus to Azure Linux 3.0\nAdded keda to Azure Linux 3.0\nAdded kubevirt to Azure Linux 3.0\nAdded sriov-network-device-plugin to Azure Linux 3.0\nAdded node-problem-detector to Azure Linux 3.0"
},
{
"date": "2024-10-18T00:00:00.000Z",
"legacy_version": "5.3",
"number": "44",
"summary": "Added terraform to CBL-Mariner 2.0\nAdded kubevirt to CBL-Mariner 2.0\nAdded application-gateway-kubernetes-ingress to CBL-Mariner 2.0\nAdded containerized-data-importer to CBL-Mariner 2.0\nAdded keda to CBL-Mariner 2.0\nAdded prometheus-adapter to CBL-Mariner 2.0\nAdded cf-cli to CBL-Mariner 2.0\nAdded influxdb to CBL-Mariner 2.0\nAdded libcontainers-common to CBL-Mariner 2.0\nAdded git-lfs to CBL-Mariner 2.0\nAdded node-problem-detector to CBL-Mariner 2.0\nAdded sriov-network-device-plugin to CBL-Mariner 2.0\nAdded kured to CBL-Mariner 2.0\nAdded cni to Azure Linux 3.0\nAdded multus to Azure Linux 3.0\nAdded keda to Azure Linux 3.0\nAdded kubevirt to Azure Linux 3.0\nAdded sriov-network-device-plugin to Azure Linux 3.0\nAdded node-problem-detector to Azure Linux 3.0"
},
{
"date": "2024-10-19T00:00:00.000Z",
"legacy_version": "5.4",
"number": "45",
"summary": "Added terraform to CBL-Mariner 2.0\nAdded kubevirt to CBL-Mariner 2.0\nAdded application-gateway-kubernetes-ingress to CBL-Mariner 2.0\nAdded containerized-data-importer to CBL-Mariner 2.0\nAdded keda to CBL-Mariner 2.0\nAdded prometheus-adapter to CBL-Mariner 2.0\nAdded cf-cli to CBL-Mariner 2.0\nAdded influxdb to CBL-Mariner 2.0\nAdded libcontainers-common to CBL-Mariner 2.0\nAdded git-lfs to CBL-Mariner 2.0\nAdded node-problem-detector to CBL-Mariner 2.0\nAdded sriov-network-device-plugin to CBL-Mariner 2.0\nAdded kured to CBL-Mariner 2.0\nAdded cni to Azure Linux 3.0\nAdded multus to Azure Linux 3.0\nAdded keda to Azure Linux 3.0\nAdded kubevirt to Azure Linux 3.0\nAdded sriov-network-device-plugin to Azure Linux 3.0\nAdded node-problem-detector to Azure Linux 3.0"
},
{
"date": "2024-10-20T00:00:00.000Z",
"legacy_version": "5.5",
"number": "46",
"summary": "Added terraform to CBL-Mariner 2.0\nAdded kubevirt to CBL-Mariner 2.0\nAdded application-gateway-kubernetes-ingress to CBL-Mariner 2.0\nAdded containerized-data-importer to CBL-Mariner 2.0\nAdded keda to CBL-Mariner 2.0\nAdded prometheus-adapter to CBL-Mariner 2.0\nAdded cf-cli to CBL-Mariner 2.0\nAdded influxdb to CBL-Mariner 2.0\nAdded libcontainers-common to CBL-Mariner 2.0\nAdded git-lfs to CBL-Mariner 2.0\nAdded node-problem-detector to CBL-Mariner 2.0\nAdded sriov-network-device-plugin to CBL-Mariner 2.0\nAdded kured to CBL-Mariner 2.0\nAdded cni to Azure Linux 3.0\nAdded multus to Azure Linux 3.0\nAdded keda to Azure Linux 3.0\nAdded kubevirt to Azure Linux 3.0\nAdded sriov-network-device-plugin to Azure Linux 3.0\nAdded node-problem-detector to Azure Linux 3.0"
},
{
"date": "2024-10-21T00:00:00.000Z",
"legacy_version": "5.6",
"number": "47",
"summary": "Added terraform to CBL-Mariner 2.0\nAdded kubevirt to CBL-Mariner 2.0\nAdded application-gateway-kubernetes-ingress to CBL-Mariner 2.0\nAdded containerized-data-importer to CBL-Mariner 2.0\nAdded keda to CBL-Mariner 2.0\nAdded prometheus-adapter to CBL-Mariner 2.0\nAdded cf-cli to CBL-Mariner 2.0\nAdded influxdb to CBL-Mariner 2.0\nAdded libcontainers-common to CBL-Mariner 2.0\nAdded git-lfs to CBL-Mariner 2.0\nAdded node-problem-detector to CBL-Mariner 2.0\nAdded sriov-network-device-plugin to CBL-Mariner 2.0\nAdded kured to CBL-Mariner 2.0\nAdded cni to Azure Linux 3.0\nAdded multus to Azure Linux 3.0\nAdded keda to Azure Linux 3.0\nAdded kubevirt to Azure Linux 3.0\nAdded sriov-network-device-plugin to Azure Linux 3.0\nAdded node-problem-detector to Azure Linux 3.0"
},
{
"date": "2024-10-22T00:00:00.000Z",
"legacy_version": "5.7",
"number": "48",
"summary": "Added terraform to CBL-Mariner 2.0\nAdded kubevirt to CBL-Mariner 2.0\nAdded application-gateway-kubernetes-ingress to CBL-Mariner 2.0\nAdded containerized-data-importer to CBL-Mariner 2.0\nAdded keda to CBL-Mariner 2.0\nAdded prometheus-adapter to CBL-Mariner 2.0\nAdded cf-cli to CBL-Mariner 2.0\nAdded influxdb to CBL-Mariner 2.0\nAdded libcontainers-common to CBL-Mariner 2.0\nAdded git-lfs to CBL-Mariner 2.0\nAdded node-problem-detector to CBL-Mariner 2.0\nAdded sriov-network-device-plugin to CBL-Mariner 2.0\nAdded kured to CBL-Mariner 2.0\nAdded cni to Azure Linux 3.0\nAdded multus to Azure Linux 3.0\nAdded keda to Azure Linux 3.0\nAdded kubevirt to Azure Linux 3.0\nAdded sriov-network-device-plugin to Azure Linux 3.0\nAdded node-problem-detector to Azure Linux 3.0"
},
{
"date": "2024-10-23T00:00:00.000Z",
"legacy_version": "5.8",
"number": "49",
"summary": "Added terraform to CBL-Mariner 2.0\nAdded kubevirt to CBL-Mariner 2.0\nAdded application-gateway-kubernetes-ingress to CBL-Mariner 2.0\nAdded containerized-data-importer to CBL-Mariner 2.0\nAdded keda to CBL-Mariner 2.0\nAdded prometheus-adapter to CBL-Mariner 2.0\nAdded cf-cli to CBL-Mariner 2.0\nAdded influxdb to CBL-Mariner 2.0\nAdded libcontainers-common to CBL-Mariner 2.0\nAdded git-lfs to CBL-Mariner 2.0\nAdded node-problem-detector to CBL-Mariner 2.0\nAdded sriov-network-device-plugin to CBL-Mariner 2.0\nAdded kured to CBL-Mariner 2.0\nAdded cni to Azure Linux 3.0\nAdded multus to Azure Linux 3.0\nAdded keda to Azure Linux 3.0\nAdded kubevirt to Azure Linux 3.0\nAdded sriov-network-device-plugin to Azure Linux 3.0\nAdded node-problem-detector to Azure Linux 3.0"
},
{
"date": "2024-10-24T00:00:00.000Z",
"legacy_version": "5.9",
"number": "50",
"summary": "Added terraform to CBL-Mariner 2.0\nAdded kubevirt to CBL-Mariner 2.0\nAdded application-gateway-kubernetes-ingress to CBL-Mariner 2.0\nAdded containerized-data-importer to CBL-Mariner 2.0\nAdded keda to CBL-Mariner 2.0\nAdded prometheus-adapter to CBL-Mariner 2.0\nAdded cf-cli to CBL-Mariner 2.0\nAdded influxdb to CBL-Mariner 2.0\nAdded libcontainers-common to CBL-Mariner 2.0\nAdded git-lfs to CBL-Mariner 2.0\nAdded node-problem-detector to CBL-Mariner 2.0\nAdded sriov-network-device-plugin to CBL-Mariner 2.0\nAdded kured to CBL-Mariner 2.0\nAdded cni to Azure Linux 3.0\nAdded multus to Azure Linux 3.0\nAdded keda to Azure Linux 3.0\nAdded kubevirt to Azure Linux 3.0\nAdded sriov-network-device-plugin to Azure Linux 3.0\nAdded node-problem-detector to Azure Linux 3.0"
},
{
"date": "2024-10-25T00:00:00.000Z",
"legacy_version": "6",
"number": "51",
"summary": "Added terraform to CBL-Mariner 2.0\nAdded kubevirt to CBL-Mariner 2.0\nAdded application-gateway-kubernetes-ingress to CBL-Mariner 2.0\nAdded containerized-data-importer to CBL-Mariner 2.0\nAdded keda to CBL-Mariner 2.0\nAdded prometheus-adapter to CBL-Mariner 2.0\nAdded cf-cli to CBL-Mariner 2.0\nAdded influxdb to CBL-Mariner 2.0\nAdded libcontainers-common to CBL-Mariner 2.0\nAdded git-lfs to CBL-Mariner 2.0\nAdded node-problem-detector to CBL-Mariner 2.0\nAdded sriov-network-device-plugin to CBL-Mariner 2.0\nAdded kured to CBL-Mariner 2.0\nAdded cni to Azure Linux 3.0\nAdded multus to Azure Linux 3.0\nAdded keda to Azure Linux 3.0\nAdded kubevirt to Azure Linux 3.0\nAdded sriov-network-device-plugin to Azure Linux 3.0\nAdded node-problem-detector to Azure Linux 3.0"
},
{
"date": "2024-10-26T00:00:00.000Z",
"legacy_version": "6.1",
"number": "52",
"summary": "Added terraform to CBL-Mariner 2.0\nAdded kubevirt to CBL-Mariner 2.0\nAdded application-gateway-kubernetes-ingress to CBL-Mariner 2.0\nAdded containerized-data-importer to CBL-Mariner 2.0\nAdded keda to CBL-Mariner 2.0\nAdded prometheus-adapter to CBL-Mariner 2.0\nAdded cf-cli to CBL-Mariner 2.0\nAdded influxdb to CBL-Mariner 2.0\nAdded libcontainers-common to CBL-Mariner 2.0\nAdded git-lfs to CBL-Mariner 2.0\nAdded node-problem-detector to CBL-Mariner 2.0\nAdded sriov-network-device-plugin to CBL-Mariner 2.0\nAdded kured to CBL-Mariner 2.0\nAdded cni to Azure Linux 3.0\nAdded multus to Azure Linux 3.0\nAdded keda to Azure Linux 3.0\nAdded kubevirt to Azure Linux 3.0\nAdded sriov-network-device-plugin to Azure Linux 3.0\nAdded node-problem-detector to Azure Linux 3.0"
},
{
"date": "2024-10-27T00:00:00.000Z",
"legacy_version": "6.2",
"number": "53",
"summary": "Added terraform to CBL-Mariner 2.0\nAdded kubevirt to CBL-Mariner 2.0\nAdded application-gateway-kubernetes-ingress to CBL-Mariner 2.0\nAdded containerized-data-importer to CBL-Mariner 2.0\nAdded keda to CBL-Mariner 2.0\nAdded prometheus-adapter to CBL-Mariner 2.0\nAdded cf-cli to CBL-Mariner 2.0\nAdded influxdb to CBL-Mariner 2.0\nAdded libcontainers-common to CBL-Mariner 2.0\nAdded git-lfs to CBL-Mariner 2.0\nAdded node-problem-detector to CBL-Mariner 2.0\nAdded sriov-network-device-plugin to CBL-Mariner 2.0\nAdded kured to CBL-Mariner 2.0\nAdded cni to Azure Linux 3.0\nAdded multus to Azure Linux 3.0\nAdded keda to Azure Linux 3.0\nAdded kubevirt to Azure Linux 3.0\nAdded sriov-network-device-plugin to Azure Linux 3.0\nAdded node-problem-detector to Azure Linux 3.0"
},
{
"date": "2024-10-28T00:00:00.000Z",
"legacy_version": "6.3",
"number": "54",
"summary": "Added terraform to CBL-Mariner 2.0\nAdded kubevirt to CBL-Mariner 2.0\nAdded application-gateway-kubernetes-ingress to CBL-Mariner 2.0\nAdded containerized-data-importer to CBL-Mariner 2.0\nAdded keda to CBL-Mariner 2.0\nAdded prometheus-adapter to CBL-Mariner 2.0\nAdded cf-cli to CBL-Mariner 2.0\nAdded influxdb to CBL-Mariner 2.0\nAdded libcontainers-common to CBL-Mariner 2.0\nAdded git-lfs to CBL-Mariner 2.0\nAdded node-problem-detector to CBL-Mariner 2.0\nAdded sriov-network-device-plugin to CBL-Mariner 2.0\nAdded kured to CBL-Mariner 2.0\nAdded cni to Azure Linux 3.0\nAdded multus to Azure Linux 3.0\nAdded keda to Azure Linux 3.0\nAdded kubevirt to Azure Linux 3.0\nAdded sriov-network-device-plugin to Azure Linux 3.0\nAdded node-problem-detector to Azure Linux 3.0"
},
{
"date": "2024-10-29T00:00:00.000Z",
"legacy_version": "6.4",
"number": "55",
"summary": "Added terraform to CBL-Mariner 2.0\nAdded kubevirt to CBL-Mariner 2.0\nAdded application-gateway-kubernetes-ingress to CBL-Mariner 2.0\nAdded containerized-data-importer to CBL-Mariner 2.0\nAdded keda to CBL-Mariner 2.0\nAdded prometheus-adapter to CBL-Mariner 2.0\nAdded cf-cli to CBL-Mariner 2.0\nAdded influxdb to CBL-Mariner 2.0\nAdded libcontainers-common to CBL-Mariner 2.0\nAdded git-lfs to CBL-Mariner 2.0\nAdded node-problem-detector to CBL-Mariner 2.0\nAdded sriov-network-device-plugin to CBL-Mariner 2.0\nAdded kured to CBL-Mariner 2.0\nAdded cni to Azure Linux 3.0\nAdded multus to Azure Linux 3.0\nAdded keda to Azure Linux 3.0\nAdded kubevirt to Azure Linux 3.0\nAdded sriov-network-device-plugin to Azure Linux 3.0\nAdded node-problem-detector to Azure Linux 3.0"
},
{
"date": "2024-10-30T00:00:00.000Z",
"legacy_version": "6.5",
"number": "56",
"summary": "Added terraform to CBL-Mariner 2.0\nAdded kubevirt to CBL-Mariner 2.0\nAdded application-gateway-kubernetes-ingress to CBL-Mariner 2.0\nAdded containerized-data-importer to CBL-Mariner 2.0\nAdded keda to CBL-Mariner 2.0\nAdded prometheus-adapter to CBL-Mariner 2.0\nAdded cf-cli to CBL-Mariner 2.0\nAdded influxdb to CBL-Mariner 2.0\nAdded libcontainers-common to CBL-Mariner 2.0\nAdded git-lfs to CBL-Mariner 2.0\nAdded node-problem-detector to CBL-Mariner 2.0\nAdded sriov-network-device-plugin to CBL-Mariner 2.0\nAdded kured to CBL-Mariner 2.0\nAdded cni to Azure Linux 3.0\nAdded multus to Azure Linux 3.0\nAdded keda to Azure Linux 3.0\nAdded kubevirt to Azure Linux 3.0\nAdded sriov-network-device-plugin to Azure Linux 3.0\nAdded node-problem-detector to Azure Linux 3.0"
},
{
"date": "2024-10-31T00:00:00.000Z",
"legacy_version": "6.6",
"number": "57",
"summary": "Added terraform to CBL-Mariner 2.0\nAdded kubevirt to CBL-Mariner 2.0\nAdded application-gateway-kubernetes-ingress to CBL-Mariner 2.0\nAdded containerized-data-importer to CBL-Mariner 2.0\nAdded keda to CBL-Mariner 2.0\nAdded prometheus-adapter to CBL-Mariner 2.0\nAdded cf-cli to CBL-Mariner 2.0\nAdded influxdb to CBL-Mariner 2.0\nAdded libcontainers-common to CBL-Mariner 2.0\nAdded git-lfs to CBL-Mariner 2.0\nAdded node-problem-detector to CBL-Mariner 2.0\nAdded sriov-network-device-plugin to CBL-Mariner 2.0\nAdded kured to CBL-Mariner 2.0\nAdded cni to Azure Linux 3.0\nAdded multus to Azure Linux 3.0\nAdded keda to Azure Linux 3.0\nAdded kubevirt to Azure Linux 3.0\nAdded sriov-network-device-plugin to Azure Linux 3.0\nAdded node-problem-detector to Azure Linux 3.0"
},
{
"date": "2024-11-01T00:00:00.000Z",
"legacy_version": "6.7",
"number": "58",
"summary": "Added gh to CBL-Mariner 2.0\nAdded terraform to CBL-Mariner 2.0\nAdded kubevirt to CBL-Mariner 2.0\nAdded application-gateway-kubernetes-ingress to CBL-Mariner 2.0\nAdded containerized-data-importer to CBL-Mariner 2.0\nAdded keda to CBL-Mariner 2.0\nAdded prometheus-adapter to CBL-Mariner 2.0\nAdded cf-cli to CBL-Mariner 2.0\nAdded influxdb to CBL-Mariner 2.0\nAdded libcontainers-common to CBL-Mariner 2.0\nAdded git-lfs to CBL-Mariner 2.0\nAdded node-problem-detector to CBL-Mariner 2.0\nAdded sriov-network-device-plugin to CBL-Mariner 2.0\nAdded kured to CBL-Mariner 2.0\nAdded cni to Azure Linux 3.0\nAdded multus to Azure Linux 3.0\nAdded keda to Azure Linux 3.0\nAdded kubevirt to Azure Linux 3.0\nAdded sriov-network-device-plugin to Azure Linux 3.0\nAdded node-problem-detector to Azure Linux 3.0"
},
{
"date": "2024-11-02T00:00:00.000Z",
"legacy_version": "6.8",
"number": "59",
"summary": "Added gh to CBL-Mariner 2.0\nAdded terraform to CBL-Mariner 2.0\nAdded kubevirt to CBL-Mariner 2.0\nAdded application-gateway-kubernetes-ingress to CBL-Mariner 2.0\nAdded containerized-data-importer to CBL-Mariner 2.0\nAdded keda to CBL-Mariner 2.0\nAdded prometheus-adapter to CBL-Mariner 2.0\nAdded cf-cli to CBL-Mariner 2.0\nAdded influxdb to CBL-Mariner 2.0\nAdded libcontainers-common to CBL-Mariner 2.0\nAdded git-lfs to CBL-Mariner 2.0\nAdded node-problem-detector to CBL-Mariner 2.0\nAdded sriov-network-device-plugin to CBL-Mariner 2.0\nAdded kured to CBL-Mariner 2.0\nAdded cni to Azure Linux 3.0\nAdded multus to Azure Linux 3.0\nAdded keda to Azure Linux 3.0\nAdded kubevirt to Azure Linux 3.0\nAdded sriov-network-device-plugin to Azure Linux 3.0\nAdded node-problem-detector to Azure Linux 3.0"
},
{
"date": "2024-11-04T00:00:00.000Z",
"legacy_version": "6.9",
"number": "60",
"summary": "Added gh to CBL-Mariner 2.0\nAdded terraform to CBL-Mariner 2.0\nAdded kubevirt to CBL-Mariner 2.0\nAdded application-gateway-kubernetes-ingress to CBL-Mariner 2.0\nAdded containerized-data-importer to CBL-Mariner 2.0\nAdded keda to CBL-Mariner 2.0\nAdded prometheus-adapter to CBL-Mariner 2.0\nAdded cf-cli to CBL-Mariner 2.0\nAdded influxdb to CBL-Mariner 2.0\nAdded libcontainers-common to CBL-Mariner 2.0\nAdded git-lfs to CBL-Mariner 2.0\nAdded node-problem-detector to CBL-Mariner 2.0\nAdded sriov-network-device-plugin to CBL-Mariner 2.0\nAdded kured to CBL-Mariner 2.0\nAdded cni to Azure Linux 3.0\nAdded multus to Azure Linux 3.0\nAdded keda to Azure Linux 3.0\nAdded kubevirt to Azure Linux 3.0\nAdded sriov-network-device-plugin to Azure Linux 3.0\nAdded node-problem-detector to Azure Linux 3.0"
},
{
"date": "2024-11-05T00:00:00.000Z",
"legacy_version": "7",
"number": "61",
"summary": "Added gh to CBL-Mariner 2.0\nAdded terraform to CBL-Mariner 2.0\nAdded kubevirt to CBL-Mariner 2.0\nAdded application-gateway-kubernetes-ingress to CBL-Mariner 2.0\nAdded containerized-data-importer to CBL-Mariner 2.0\nAdded keda to CBL-Mariner 2.0\nAdded prometheus-adapter to CBL-Mariner 2.0\nAdded cf-cli to CBL-Mariner 2.0\nAdded influxdb to CBL-Mariner 2.0\nAdded libcontainers-common to CBL-Mariner 2.0\nAdded git-lfs to CBL-Mariner 2.0\nAdded node-problem-detector to CBL-Mariner 2.0\nAdded sriov-network-device-plugin to CBL-Mariner 2.0\nAdded kured to CBL-Mariner 2.0\nAdded cni to Azure Linux 3.0\nAdded multus to Azure Linux 3.0\nAdded keda to Azure Linux 3.0\nAdded kubevirt to Azure Linux 3.0\nAdded sriov-network-device-plugin to Azure Linux 3.0\nAdded node-problem-detector to Azure Linux 3.0"
},
{
"date": "2024-11-06T00:00:00.000Z",
"legacy_version": "7.1",
"number": "62",
"summary": "Added gh to CBL-Mariner 2.0\nAdded terraform to CBL-Mariner 2.0\nAdded kubevirt to CBL-Mariner 2.0\nAdded application-gateway-kubernetes-ingress to CBL-Mariner 2.0\nAdded containerized-data-importer to CBL-Mariner 2.0\nAdded keda to CBL-Mariner 2.0\nAdded prometheus-adapter to CBL-Mariner 2.0\nAdded cf-cli to CBL-Mariner 2.0\nAdded influxdb to CBL-Mariner 2.0\nAdded libcontainers-common to CBL-Mariner 2.0\nAdded git-lfs to CBL-Mariner 2.0\nAdded node-problem-detector to CBL-Mariner 2.0\nAdded sriov-network-device-plugin to CBL-Mariner 2.0\nAdded kured to CBL-Mariner 2.0\nAdded cni to Azure Linux 3.0\nAdded multus to Azure Linux 3.0\nAdded keda to Azure Linux 3.0\nAdded kubevirt to Azure Linux 3.0\nAdded sriov-network-device-plugin to Azure Linux 3.0\nAdded node-problem-detector to Azure Linux 3.0"
},
{
"date": "2024-11-07T00:00:00.000Z",
"legacy_version": "7.2",
"number": "63",
"summary": "Added gh to CBL-Mariner 2.0\nAdded terraform to CBL-Mariner 2.0\nAdded kubevirt to CBL-Mariner 2.0\nAdded application-gateway-kubernetes-ingress to CBL-Mariner 2.0\nAdded containerized-data-importer to CBL-Mariner 2.0\nAdded keda to CBL-Mariner 2.0\nAdded prometheus-adapter to CBL-Mariner 2.0\nAdded cf-cli to CBL-Mariner 2.0\nAdded influxdb to CBL-Mariner 2.0\nAdded libcontainers-common to CBL-Mariner 2.0\nAdded git-lfs to CBL-Mariner 2.0\nAdded node-problem-detector to CBL-Mariner 2.0\nAdded sriov-network-device-plugin to CBL-Mariner 2.0\nAdded kured to CBL-Mariner 2.0\nAdded cni to Azure Linux 3.0\nAdded multus to Azure Linux 3.0\nAdded keda to Azure Linux 3.0\nAdded kubevirt to Azure Linux 3.0\nAdded sriov-network-device-plugin to Azure Linux 3.0\nAdded node-problem-detector to Azure Linux 3.0"
},
{
"date": "2024-11-08T00:00:00.000Z",
"legacy_version": "7.3",
"number": "64",
"summary": "Added gh to CBL-Mariner 2.0\nAdded terraform to CBL-Mariner 2.0\nAdded kubevirt to CBL-Mariner 2.0\nAdded application-gateway-kubernetes-ingress to CBL-Mariner 2.0\nAdded containerized-data-importer to CBL-Mariner 2.0\nAdded keda to CBL-Mariner 2.0\nAdded prometheus-adapter to CBL-Mariner 2.0\nAdded cf-cli to CBL-Mariner 2.0\nAdded influxdb to CBL-Mariner 2.0\nAdded libcontainers-common to CBL-Mariner 2.0\nAdded git-lfs to CBL-Mariner 2.0\nAdded node-problem-detector to CBL-Mariner 2.0\nAdded sriov-network-device-plugin to CBL-Mariner 2.0\nAdded kured to CBL-Mariner 2.0\nAdded cni to Azure Linux 3.0\nAdded multus to Azure Linux 3.0\nAdded keda to Azure Linux 3.0\nAdded kubevirt to Azure Linux 3.0\nAdded sriov-network-device-plugin to Azure Linux 3.0\nAdded node-problem-detector to Azure Linux 3.0"
},
{
"date": "2024-11-09T00:00:00.000Z",
"legacy_version": "7.4",
"number": "65",
"summary": "Added gh to CBL-Mariner 2.0\nAdded terraform to CBL-Mariner 2.0\nAdded kubevirt to CBL-Mariner 2.0\nAdded application-gateway-kubernetes-ingress to CBL-Mariner 2.0\nAdded containerized-data-importer to CBL-Mariner 2.0\nAdded keda to CBL-Mariner 2.0\nAdded prometheus-adapter to CBL-Mariner 2.0\nAdded cf-cli to CBL-Mariner 2.0\nAdded influxdb to CBL-Mariner 2.0\nAdded libcontainers-common to CBL-Mariner 2.0\nAdded git-lfs to CBL-Mariner 2.0\nAdded node-problem-detector to CBL-Mariner 2.0\nAdded sriov-network-device-plugin to CBL-Mariner 2.0\nAdded kured to CBL-Mariner 2.0\nAdded cni to Azure Linux 3.0\nAdded multus to Azure Linux 3.0\nAdded keda to Azure Linux 3.0\nAdded kubevirt to Azure Linux 3.0\nAdded sriov-network-device-plugin to Azure Linux 3.0\nAdded node-problem-detector to Azure Linux 3.0"
},
{
"date": "2024-11-10T00:00:00.000Z",
"legacy_version": "7.5",
"number": "66",
"summary": "Added gh to CBL-Mariner 2.0\nAdded terraform to CBL-Mariner 2.0\nAdded kubevirt to CBL-Mariner 2.0\nAdded application-gateway-kubernetes-ingress to CBL-Mariner 2.0\nAdded containerized-data-importer to CBL-Mariner 2.0\nAdded keda to CBL-Mariner 2.0\nAdded prometheus-adapter to CBL-Mariner 2.0\nAdded cf-cli to CBL-Mariner 2.0\nAdded influxdb to CBL-Mariner 2.0\nAdded libcontainers-common to CBL-Mariner 2.0\nAdded git-lfs to CBL-Mariner 2.0\nAdded node-problem-detector to CBL-Mariner 2.0\nAdded sriov-network-device-plugin to CBL-Mariner 2.0\nAdded kured to CBL-Mariner 2.0\nAdded cni to Azure Linux 3.0\nAdded multus to Azure Linux 3.0\nAdded keda to Azure Linux 3.0\nAdded kubevirt to Azure Linux 3.0\nAdded sriov-network-device-plugin to Azure Linux 3.0\nAdded node-problem-detector to Azure Linux 3.0"
},
{
"date": "2024-11-11T00:00:00.000Z",
"legacy_version": "7.6",
"number": "67",
"summary": "Added gh to CBL-Mariner 2.0\nAdded terraform to CBL-Mariner 2.0\nAdded kubevirt to CBL-Mariner 2.0\nAdded application-gateway-kubernetes-ingress to CBL-Mariner 2.0\nAdded containerized-data-importer to CBL-Mariner 2.0\nAdded keda to CBL-Mariner 2.0\nAdded prometheus-adapter to CBL-Mariner 2.0\nAdded cf-cli to CBL-Mariner 2.0\nAdded influxdb to CBL-Mariner 2.0\nAdded libcontainers-common to CBL-Mariner 2.0\nAdded git-lfs to CBL-Mariner 2.0\nAdded node-problem-detector to CBL-Mariner 2.0\nAdded sriov-network-device-plugin to CBL-Mariner 2.0\nAdded kured to CBL-Mariner 2.0\nAdded cni to Azure Linux 3.0\nAdded multus to Azure Linux 3.0\nAdded keda to Azure Linux 3.0\nAdded kubevirt to Azure Linux 3.0\nAdded sriov-network-device-plugin to Azure Linux 3.0\nAdded node-problem-detector to Azure Linux 3.0"
},
{
"date": "2024-11-12T00:00:00.000Z",
"legacy_version": "7.7",
"number": "68",
"summary": "Added gh to CBL-Mariner 2.0\nAdded terraform to CBL-Mariner 2.0\nAdded kubevirt to CBL-Mariner 2.0\nAdded application-gateway-kubernetes-ingress to CBL-Mariner 2.0\nAdded containerized-data-importer to CBL-Mariner 2.0\nAdded keda to CBL-Mariner 2.0\nAdded prometheus-adapter to CBL-Mariner 2.0\nAdded cf-cli to CBL-Mariner 2.0\nAdded influxdb to CBL-Mariner 2.0\nAdded libcontainers-common to CBL-Mariner 2.0\nAdded git-lfs to CBL-Mariner 2.0\nAdded node-problem-detector to CBL-Mariner 2.0\nAdded sriov-network-device-plugin to CBL-Mariner 2.0\nAdded kured to CBL-Mariner 2.0\nAdded cni to Azure Linux 3.0\nAdded multus to Azure Linux 3.0\nAdded keda to Azure Linux 3.0\nAdded kubevirt to Azure Linux 3.0\nAdded sriov-network-device-plugin to Azure Linux 3.0\nAdded node-problem-detector to Azure Linux 3.0"
},
{
"date": "2024-11-13T00:00:00.000Z",
"legacy_version": "7.8",
"number": "69",
"summary": "Added gh to CBL-Mariner 2.0\nAdded terraform to CBL-Mariner 2.0\nAdded kubevirt to CBL-Mariner 2.0\nAdded application-gateway-kubernetes-ingress to CBL-Mariner 2.0\nAdded containerized-data-importer to CBL-Mariner 2.0\nAdded keda to CBL-Mariner 2.0\nAdded prometheus-adapter to CBL-Mariner 2.0\nAdded cf-cli to CBL-Mariner 2.0\nAdded influxdb to CBL-Mariner 2.0\nAdded libcontainers-common to CBL-Mariner 2.0\nAdded git-lfs to CBL-Mariner 2.0\nAdded node-problem-detector to CBL-Mariner 2.0\nAdded sriov-network-device-plugin to CBL-Mariner 2.0\nAdded kured to CBL-Mariner 2.0\nAdded cni to Azure Linux 3.0\nAdded multus to Azure Linux 3.0\nAdded keda to Azure Linux 3.0\nAdded kubevirt to Azure Linux 3.0\nAdded sriov-network-device-plugin to Azure Linux 3.0\nAdded node-problem-detector to Azure Linux 3.0"
},
{
"date": "2024-11-14T00:00:00.000Z",
"legacy_version": "7.9",
"number": "70",
"summary": "Added gh to CBL-Mariner 2.0\nAdded terraform to CBL-Mariner 2.0\nAdded kubevirt to CBL-Mariner 2.0\nAdded application-gateway-kubernetes-ingress to CBL-Mariner 2.0\nAdded containerized-data-importer to CBL-Mariner 2.0\nAdded keda to CBL-Mariner 2.0\nAdded prometheus-adapter to CBL-Mariner 2.0\nAdded cf-cli to CBL-Mariner 2.0\nAdded influxdb to CBL-Mariner 2.0\nAdded libcontainers-common to CBL-Mariner 2.0\nAdded git-lfs to CBL-Mariner 2.0\nAdded node-problem-detector to CBL-Mariner 2.0\nAdded sriov-network-device-plugin to CBL-Mariner 2.0\nAdded kured to CBL-Mariner 2.0\nAdded cni to Azure Linux 3.0\nAdded multus to Azure Linux 3.0\nAdded keda to Azure Linux 3.0\nAdded kubevirt to Azure Linux 3.0\nAdded sriov-network-device-plugin to Azure Linux 3.0\nAdded node-problem-detector to Azure Linux 3.0"
},
{
"date": "2024-11-15T00:00:00.000Z",
"legacy_version": "8",
"number": "71",
"summary": "Added gh to CBL-Mariner 2.0\nAdded terraform to CBL-Mariner 2.0\nAdded kubevirt to CBL-Mariner 2.0\nAdded application-gateway-kubernetes-ingress to CBL-Mariner 2.0\nAdded containerized-data-importer to CBL-Mariner 2.0\nAdded keda to CBL-Mariner 2.0\nAdded prometheus-adapter to CBL-Mariner 2.0\nAdded cf-cli to CBL-Mariner 2.0\nAdded influxdb to CBL-Mariner 2.0\nAdded libcontainers-common to CBL-Mariner 2.0\nAdded git-lfs to CBL-Mariner 2.0\nAdded node-problem-detector to CBL-Mariner 2.0\nAdded sriov-network-device-plugin to CBL-Mariner 2.0\nAdded kured to CBL-Mariner 2.0\nAdded cni to Azure Linux 3.0\nAdded multus to Azure Linux 3.0\nAdded keda to Azure Linux 3.0\nAdded kubevirt to Azure Linux 3.0\nAdded sriov-network-device-plugin to Azure Linux 3.0\nAdded node-problem-detector to Azure Linux 3.0"
},
{
"date": "2024-11-16T00:00:00.000Z",
"legacy_version": "8.1",
"number": "72",
"summary": "Added gh to CBL-Mariner 2.0\nAdded terraform to CBL-Mariner 2.0\nAdded kubevirt to CBL-Mariner 2.0\nAdded application-gateway-kubernetes-ingress to CBL-Mariner 2.0\nAdded containerized-data-importer to CBL-Mariner 2.0\nAdded keda to CBL-Mariner 2.0\nAdded prometheus-adapter to CBL-Mariner 2.0\nAdded cf-cli to CBL-Mariner 2.0\nAdded influxdb to CBL-Mariner 2.0\nAdded libcontainers-common to CBL-Mariner 2.0\nAdded git-lfs to CBL-Mariner 2.0\nAdded node-problem-detector to CBL-Mariner 2.0\nAdded sriov-network-device-plugin to CBL-Mariner 2.0\nAdded kured to CBL-Mariner 2.0\nAdded cni to Azure Linux 3.0\nAdded multus to Azure Linux 3.0\nAdded keda to Azure Linux 3.0\nAdded kubevirt to Azure Linux 3.0\nAdded sriov-network-device-plugin to Azure Linux 3.0\nAdded node-problem-detector to Azure Linux 3.0"
},
{
"date": "2024-11-17T00:00:00.000Z",
"legacy_version": "8.2",
"number": "73",
"summary": "Added gh to CBL-Mariner 2.0\nAdded terraform to CBL-Mariner 2.0\nAdded kubevirt to CBL-Mariner 2.0\nAdded application-gateway-kubernetes-ingress to CBL-Mariner 2.0\nAdded containerized-data-importer to CBL-Mariner 2.0\nAdded keda to CBL-Mariner 2.0\nAdded prometheus-adapter to CBL-Mariner 2.0\nAdded cf-cli to CBL-Mariner 2.0\nAdded influxdb to CBL-Mariner 2.0\nAdded libcontainers-common to CBL-Mariner 2.0\nAdded git-lfs to CBL-Mariner 2.0\nAdded node-problem-detector to CBL-Mariner 2.0\nAdded sriov-network-device-plugin to CBL-Mariner 2.0\nAdded kured to CBL-Mariner 2.0\nAdded cni to Azure Linux 3.0\nAdded multus to Azure Linux 3.0\nAdded keda to Azure Linux 3.0\nAdded kubevirt to Azure Linux 3.0\nAdded sriov-network-device-plugin to Azure Linux 3.0\nAdded node-problem-detector to Azure Linux 3.0"
},
{
"date": "2024-11-18T00:00:00.000Z",
"legacy_version": "8.3",
"number": "74",
"summary": "Added gh to CBL-Mariner 2.0\nAdded terraform to CBL-Mariner 2.0\nAdded kubevirt to CBL-Mariner 2.0\nAdded application-gateway-kubernetes-ingress to CBL-Mariner 2.0\nAdded containerized-data-importer to CBL-Mariner 2.0\nAdded keda to CBL-Mariner 2.0\nAdded prometheus-adapter to CBL-Mariner 2.0\nAdded cf-cli to CBL-Mariner 2.0\nAdded influxdb to CBL-Mariner 2.0\nAdded libcontainers-common to CBL-Mariner 2.0\nAdded git-lfs to CBL-Mariner 2.0\nAdded node-problem-detector to CBL-Mariner 2.0\nAdded sriov-network-device-plugin to CBL-Mariner 2.0\nAdded kured to CBL-Mariner 2.0\nAdded cni to Azure Linux 3.0\nAdded multus to Azure Linux 3.0\nAdded keda to Azure Linux 3.0\nAdded kubevirt to Azure Linux 3.0\nAdded sriov-network-device-plugin to Azure Linux 3.0\nAdded node-problem-detector to Azure Linux 3.0"
},
{
"date": "2024-11-19T00:00:00.000Z",
"legacy_version": "8.4",
"number": "75",
"summary": "Added gh to CBL-Mariner 2.0\nAdded terraform to CBL-Mariner 2.0\nAdded kubevirt to CBL-Mariner 2.0\nAdded application-gateway-kubernetes-ingress to CBL-Mariner 2.0\nAdded containerized-data-importer to CBL-Mariner 2.0\nAdded keda to CBL-Mariner 2.0\nAdded prometheus-adapter to CBL-Mariner 2.0\nAdded cf-cli to CBL-Mariner 2.0\nAdded influxdb to CBL-Mariner 2.0\nAdded libcontainers-common to CBL-Mariner 2.0\nAdded git-lfs to CBL-Mariner 2.0\nAdded node-problem-detector to CBL-Mariner 2.0\nAdded sriov-network-device-plugin to CBL-Mariner 2.0\nAdded kured to CBL-Mariner 2.0\nAdded cni to Azure Linux 3.0\nAdded multus to Azure Linux 3.0\nAdded keda to Azure Linux 3.0\nAdded kubevirt to Azure Linux 3.0\nAdded sriov-network-device-plugin to Azure Linux 3.0\nAdded node-problem-detector to Azure Linux 3.0"
},
{
"date": "2024-11-20T00:00:00.000Z",
"legacy_version": "8.5",
"number": "76",
"summary": "Added gh to CBL-Mariner 2.0\nAdded terraform to CBL-Mariner 2.0\nAdded kubevirt to CBL-Mariner 2.0\nAdded application-gateway-kubernetes-ingress to CBL-Mariner 2.0\nAdded containerized-data-importer to CBL-Mariner 2.0\nAdded keda to CBL-Mariner 2.0\nAdded prometheus-adapter to CBL-Mariner 2.0\nAdded cf-cli to CBL-Mariner 2.0\nAdded influxdb to CBL-Mariner 2.0\nAdded libcontainers-common to CBL-Mariner 2.0\nAdded git-lfs to CBL-Mariner 2.0\nAdded node-problem-detector to CBL-Mariner 2.0\nAdded sriov-network-device-plugin to CBL-Mariner 2.0\nAdded kured to CBL-Mariner 2.0\nAdded cni to Azure Linux 3.0\nAdded multus to Azure Linux 3.0\nAdded keda to Azure Linux 3.0\nAdded kubevirt to Azure Linux 3.0\nAdded sriov-network-device-plugin to Azure Linux 3.0\nAdded node-problem-detector to Azure Linux 3.0"
},
{
"date": "2024-11-21T00:00:00.000Z",
"legacy_version": "8.6",
"number": "77",
"summary": "Added gh to CBL-Mariner 2.0\nAdded terraform to CBL-Mariner 2.0\nAdded kubevirt to CBL-Mariner 2.0\nAdded application-gateway-kubernetes-ingress to CBL-Mariner 2.0\nAdded containerized-data-importer to CBL-Mariner 2.0\nAdded keda to CBL-Mariner 2.0\nAdded prometheus-adapter to CBL-Mariner 2.0\nAdded cf-cli to CBL-Mariner 2.0\nAdded influxdb to CBL-Mariner 2.0\nAdded libcontainers-common to CBL-Mariner 2.0\nAdded git-lfs to CBL-Mariner 2.0\nAdded node-problem-detector to CBL-Mariner 2.0\nAdded sriov-network-device-plugin to CBL-Mariner 2.0\nAdded kured to CBL-Mariner 2.0\nAdded cni to Azure Linux 3.0\nAdded multus to Azure Linux 3.0\nAdded keda to Azure Linux 3.0\nAdded kubevirt to Azure Linux 3.0\nAdded sriov-network-device-plugin to Azure Linux 3.0\nAdded node-problem-detector to Azure Linux 3.0"
},
{
"date": "2024-11-23T00:00:00.000Z",
"legacy_version": "8.7",
"number": "78",
"summary": "Added gh to CBL-Mariner 2.0\nAdded terraform to CBL-Mariner 2.0\nAdded kubevirt to CBL-Mariner 2.0\nAdded application-gateway-kubernetes-ingress to CBL-Mariner 2.0\nAdded containerized-data-importer to CBL-Mariner 2.0\nAdded keda to CBL-Mariner 2.0\nAdded prometheus-adapter to CBL-Mariner 2.0\nAdded cf-cli to CBL-Mariner 2.0\nAdded influxdb to CBL-Mariner 2.0\nAdded libcontainers-common to CBL-Mariner 2.0\nAdded git-lfs to CBL-Mariner 2.0\nAdded node-problem-detector to CBL-Mariner 2.0\nAdded sriov-network-device-plugin to CBL-Mariner 2.0\nAdded kured to CBL-Mariner 2.0\nAdded cni to Azure Linux 3.0\nAdded multus to Azure Linux 3.0\nAdded keda to Azure Linux 3.0\nAdded kubevirt to Azure Linux 3.0\nAdded sriov-network-device-plugin to Azure Linux 3.0\nAdded node-problem-detector to Azure Linux 3.0"
},
{
"date": "2024-11-24T00:00:00.000Z",
"legacy_version": "8.8",
"number": "79",
"summary": "Added gh to CBL-Mariner 2.0\nAdded terraform to CBL-Mariner 2.0\nAdded kubevirt to CBL-Mariner 2.0\nAdded application-gateway-kubernetes-ingress to CBL-Mariner 2.0\nAdded containerized-data-importer to CBL-Mariner 2.0\nAdded keda to CBL-Mariner 2.0\nAdded prometheus-adapter to CBL-Mariner 2.0\nAdded cf-cli to CBL-Mariner 2.0\nAdded influxdb to CBL-Mariner 2.0\nAdded libcontainers-common to CBL-Mariner 2.0\nAdded git-lfs to CBL-Mariner 2.0\nAdded node-problem-detector to CBL-Mariner 2.0\nAdded sriov-network-device-plugin to CBL-Mariner 2.0\nAdded kured to CBL-Mariner 2.0\nAdded cni to Azure Linux 3.0\nAdded multus to Azure Linux 3.0\nAdded keda to Azure Linux 3.0\nAdded kubevirt to Azure Linux 3.0\nAdded sriov-network-device-plugin to Azure Linux 3.0\nAdded node-problem-detector to Azure Linux 3.0"
},
{
"date": "2024-11-25T00:00:00.000Z",
"legacy_version": "8.9",
"number": "80",
"summary": "Added gh to CBL-Mariner 2.0\nAdded terraform to CBL-Mariner 2.0\nAdded kubevirt to CBL-Mariner 2.0\nAdded application-gateway-kubernetes-ingress to CBL-Mariner 2.0\nAdded containerized-data-importer to CBL-Mariner 2.0\nAdded keda to CBL-Mariner 2.0\nAdded prometheus-adapter to CBL-Mariner 2.0\nAdded cf-cli to CBL-Mariner 2.0\nAdded influxdb to CBL-Mariner 2.0\nAdded libcontainers-common to CBL-Mariner 2.0\nAdded git-lfs to CBL-Mariner 2.0\nAdded node-problem-detector to CBL-Mariner 2.0\nAdded sriov-network-device-plugin to CBL-Mariner 2.0\nAdded kured to CBL-Mariner 2.0\nAdded cni to Azure Linux 3.0\nAdded multus to Azure Linux 3.0\nAdded keda to Azure Linux 3.0\nAdded kubevirt to Azure Linux 3.0\nAdded sriov-network-device-plugin to Azure Linux 3.0\nAdded node-problem-detector to Azure Linux 3.0"
},
{
"date": "2024-11-26T00:00:00.000Z",
"legacy_version": "9",
"number": "81",
"summary": "Added gh to CBL-Mariner 2.0\nAdded terraform to CBL-Mariner 2.0\nAdded kubevirt to CBL-Mariner 2.0\nAdded application-gateway-kubernetes-ingress to CBL-Mariner 2.0\nAdded containerized-data-importer to CBL-Mariner 2.0\nAdded keda to CBL-Mariner 2.0\nAdded prometheus-adapter to CBL-Mariner 2.0\nAdded cf-cli to CBL-Mariner 2.0\nAdded influxdb to CBL-Mariner 2.0\nAdded libcontainers-common to CBL-Mariner 2.0\nAdded git-lfs to CBL-Mariner 2.0\nAdded node-problem-detector to CBL-Mariner 2.0\nAdded sriov-network-device-plugin to CBL-Mariner 2.0\nAdded kured to CBL-Mariner 2.0\nAdded cni to Azure Linux 3.0\nAdded multus to Azure Linux 3.0\nAdded keda to Azure Linux 3.0\nAdded kubevirt to Azure Linux 3.0\nAdded sriov-network-device-plugin to Azure Linux 3.0\nAdded node-problem-detector to Azure Linux 3.0"
},
{
"date": "2024-11-27T00:00:00.000Z",
"legacy_version": "9.1",
"number": "82",
"summary": "Added gh to CBL-Mariner 2.0\nAdded terraform to CBL-Mariner 2.0\nAdded kubevirt to CBL-Mariner 2.0\nAdded application-gateway-kubernetes-ingress to CBL-Mariner 2.0\nAdded containerized-data-importer to CBL-Mariner 2.0\nAdded keda to CBL-Mariner 2.0\nAdded prometheus-adapter to CBL-Mariner 2.0\nAdded cf-cli to CBL-Mariner 2.0\nAdded influxdb to CBL-Mariner 2.0\nAdded libcontainers-common to CBL-Mariner 2.0\nAdded git-lfs to CBL-Mariner 2.0\nAdded node-problem-detector to CBL-Mariner 2.0\nAdded sriov-network-device-plugin to CBL-Mariner 2.0\nAdded kured to CBL-Mariner 2.0\nAdded cni to Azure Linux 3.0\nAdded multus to Azure Linux 3.0\nAdded keda to Azure Linux 3.0\nAdded kubevirt to Azure Linux 3.0\nAdded sriov-network-device-plugin to Azure Linux 3.0\nAdded node-problem-detector to Azure Linux 3.0"
},
{
"date": "2024-11-28T00:00:00.000Z",
"legacy_version": "9.2",
"number": "83",
"summary": "Added gh to CBL-Mariner 2.0\nAdded terraform to CBL-Mariner 2.0\nAdded kubevirt to CBL-Mariner 2.0\nAdded application-gateway-kubernetes-ingress to CBL-Mariner 2.0\nAdded containerized-data-importer to CBL-Mariner 2.0\nAdded keda to CBL-Mariner 2.0\nAdded prometheus-adapter to CBL-Mariner 2.0\nAdded cf-cli to CBL-Mariner 2.0\nAdded influxdb to CBL-Mariner 2.0\nAdded libcontainers-common to CBL-Mariner 2.0\nAdded git-lfs to CBL-Mariner 2.0\nAdded node-problem-detector to CBL-Mariner 2.0\nAdded sriov-network-device-plugin to CBL-Mariner 2.0\nAdded kured to CBL-Mariner 2.0\nAdded cni to Azure Linux 3.0\nAdded multus to Azure Linux 3.0\nAdded keda to Azure Linux 3.0\nAdded kubevirt to Azure Linux 3.0\nAdded sriov-network-device-plugin to Azure Linux 3.0\nAdded node-problem-detector to Azure Linux 3.0"
},
{
"date": "2024-11-29T00:00:00.000Z",
"legacy_version": "9.3",
"number": "84",
"summary": "Added gh to CBL-Mariner 2.0\nAdded terraform to CBL-Mariner 2.0\nAdded kubevirt to CBL-Mariner 2.0\nAdded application-gateway-kubernetes-ingress to CBL-Mariner 2.0\nAdded containerized-data-importer to CBL-Mariner 2.0\nAdded keda to CBL-Mariner 2.0\nAdded prometheus-adapter to CBL-Mariner 2.0\nAdded cf-cli to CBL-Mariner 2.0\nAdded influxdb to CBL-Mariner 2.0\nAdded libcontainers-common to CBL-Mariner 2.0\nAdded git-lfs to CBL-Mariner 2.0\nAdded node-problem-detector to CBL-Mariner 2.0\nAdded sriov-network-device-plugin to CBL-Mariner 2.0\nAdded kured to CBL-Mariner 2.0\nAdded cni to Azure Linux 3.0\nAdded multus to Azure Linux 3.0\nAdded keda to Azure Linux 3.0\nAdded kubevirt to Azure Linux 3.0\nAdded sriov-network-device-plugin to Azure Linux 3.0\nAdded node-problem-detector to Azure Linux 3.0"
},
{
"date": "2024-11-30T00:00:00.000Z",
"legacy_version": "9.4",
"number": "85",
"summary": "Added gh to CBL-Mariner 2.0\nAdded terraform to CBL-Mariner 2.0\nAdded kubevirt to CBL-Mariner 2.0\nAdded application-gateway-kubernetes-ingress to CBL-Mariner 2.0\nAdded containerized-data-importer to CBL-Mariner 2.0\nAdded keda to CBL-Mariner 2.0\nAdded prometheus-adapter to CBL-Mariner 2.0\nAdded cf-cli to CBL-Mariner 2.0\nAdded influxdb to CBL-Mariner 2.0\nAdded libcontainers-common to CBL-Mariner 2.0\nAdded git-lfs to CBL-Mariner 2.0\nAdded node-problem-detector to CBL-Mariner 2.0\nAdded sriov-network-device-plugin to CBL-Mariner 2.0\nAdded kured to CBL-Mariner 2.0\nAdded cni to Azure Linux 3.0\nAdded multus to Azure Linux 3.0\nAdded keda to Azure Linux 3.0\nAdded kubevirt to Azure Linux 3.0\nAdded sriov-network-device-plugin to Azure Linux 3.0\nAdded node-problem-detector to Azure Linux 3.0"
},
{
"date": "2024-12-01T00:00:00.000Z",
"legacy_version": "9.5",
"number": "86",
"summary": "Added gh to CBL-Mariner 2.0\nAdded terraform to CBL-Mariner 2.0\nAdded kubevirt to CBL-Mariner 2.0\nAdded application-gateway-kubernetes-ingress to CBL-Mariner 2.0\nAdded containerized-data-importer to CBL-Mariner 2.0\nAdded keda to CBL-Mariner 2.0\nAdded prometheus-adapter to CBL-Mariner 2.0\nAdded cf-cli to CBL-Mariner 2.0\nAdded influxdb to CBL-Mariner 2.0\nAdded libcontainers-common to CBL-Mariner 2.0\nAdded git-lfs to CBL-Mariner 2.0\nAdded node-problem-detector to CBL-Mariner 2.0\nAdded sriov-network-device-plugin to CBL-Mariner 2.0\nAdded kured to CBL-Mariner 2.0\nAdded cni to Azure Linux 3.0\nAdded multus to Azure Linux 3.0\nAdded keda to Azure Linux 3.0\nAdded kubevirt to Azure Linux 3.0\nAdded sriov-network-device-plugin to Azure Linux 3.0\nAdded node-problem-detector to Azure Linux 3.0"
},
{
"date": "2024-12-02T00:00:00.000Z",
"legacy_version": "9.6",
"number": "87",
"summary": "Added gh to CBL-Mariner 2.0\nAdded terraform to CBL-Mariner 2.0\nAdded kubevirt to CBL-Mariner 2.0\nAdded application-gateway-kubernetes-ingress to CBL-Mariner 2.0\nAdded containerized-data-importer to CBL-Mariner 2.0\nAdded keda to CBL-Mariner 2.0\nAdded prometheus-adapter to CBL-Mariner 2.0\nAdded cf-cli to CBL-Mariner 2.0\nAdded influxdb to CBL-Mariner 2.0\nAdded libcontainers-common to CBL-Mariner 2.0\nAdded git-lfs to CBL-Mariner 2.0\nAdded node-problem-detector to CBL-Mariner 2.0\nAdded sriov-network-device-plugin to CBL-Mariner 2.0\nAdded kured to CBL-Mariner 2.0\nAdded cni to Azure Linux 3.0\nAdded multus to Azure Linux 3.0\nAdded keda to Azure Linux 3.0\nAdded kubevirt to Azure Linux 3.0\nAdded sriov-network-device-plugin to Azure Linux 3.0\nAdded node-problem-detector to Azure Linux 3.0"
},
{
"date": "2024-12-03T00:00:00.000Z",
"legacy_version": "9.7",
"number": "88",
"summary": "Added application-gateway-kubernetes-ingress to CBL-Mariner 2.0\nAdded containerized-data-importer to CBL-Mariner 2.0\nAdded keda to CBL-Mariner 2.0\nAdded kubevirt to CBL-Mariner 2.0\nAdded libcontainers-common to CBL-Mariner 2.0\nAdded prometheus-adapter to CBL-Mariner 2.0\nAdded gh to CBL-Mariner 2.0\nAdded terraform to CBL-Mariner 2.0\nAdded cf-cli to CBL-Mariner 2.0\nAdded influxdb to CBL-Mariner 2.0\nAdded git-lfs to CBL-Mariner 2.0\nAdded node-problem-detector to CBL-Mariner 2.0\nAdded sriov-network-device-plugin to CBL-Mariner 2.0\nAdded kured to CBL-Mariner 2.0\nAdded cni to Azure Linux 3.0\nAdded multus to Azure Linux 3.0\nAdded keda to Azure Linux 3.0\nAdded kubevirt to Azure Linux 3.0\nAdded sriov-network-device-plugin to Azure Linux 3.0\nAdded node-problem-detector to Azure Linux 3.0"
},
{
"date": "2024-12-04T00:00:00.000Z",
"legacy_version": "9.8",
"number": "89",
"summary": "Added application-gateway-kubernetes-ingress to CBL-Mariner 2.0\nAdded containerized-data-importer to CBL-Mariner 2.0\nAdded keda to CBL-Mariner 2.0\nAdded kubevirt to CBL-Mariner 2.0\nAdded libcontainers-common to CBL-Mariner 2.0\nAdded prometheus-adapter to CBL-Mariner 2.0\nAdded gh to CBL-Mariner 2.0\nAdded terraform to CBL-Mariner 2.0\nAdded cf-cli to CBL-Mariner 2.0\nAdded influxdb to CBL-Mariner 2.0\nAdded git-lfs to CBL-Mariner 2.0\nAdded node-problem-detector to CBL-Mariner 2.0\nAdded sriov-network-device-plugin to CBL-Mariner 2.0\nAdded kured to CBL-Mariner 2.0\nAdded cni to Azure Linux 3.0\nAdded multus to Azure Linux 3.0\nAdded keda to Azure Linux 3.0\nAdded kubevirt to Azure Linux 3.0\nAdded sriov-network-device-plugin to Azure Linux 3.0\nAdded node-problem-detector to Azure Linux 3.0"
},
{
"date": "2024-12-05T00:00:00.000Z",
"legacy_version": "9.9",
"number": "90",
"summary": "Added application-gateway-kubernetes-ingress to CBL-Mariner 2.0\nAdded containerized-data-importer to CBL-Mariner 2.0\nAdded keda to CBL-Mariner 2.0\nAdded kubevirt to CBL-Mariner 2.0\nAdded libcontainers-common to CBL-Mariner 2.0\nAdded prometheus-adapter to CBL-Mariner 2.0\nAdded gh to CBL-Mariner 2.0\nAdded terraform to CBL-Mariner 2.0\nAdded cf-cli to CBL-Mariner 2.0\nAdded influxdb to CBL-Mariner 2.0\nAdded git-lfs to CBL-Mariner 2.0\nAdded node-problem-detector to CBL-Mariner 2.0\nAdded sriov-network-device-plugin to CBL-Mariner 2.0\nAdded kured to CBL-Mariner 2.0\nAdded cni to Azure Linux 3.0\nAdded multus to Azure Linux 3.0\nAdded keda to Azure Linux 3.0\nAdded kubevirt to Azure Linux 3.0\nAdded sriov-network-device-plugin to Azure Linux 3.0\nAdded node-problem-detector to Azure Linux 3.0"
},
{
"date": "2024-12-07T00:00:00.000Z",
"legacy_version": "1",
"number": "91",
"summary": "Added application-gateway-kubernetes-ingress to CBL-Mariner 2.0\nAdded containerized-data-importer to CBL-Mariner 2.0\nAdded keda to CBL-Mariner 2.0\nAdded kubevirt to CBL-Mariner 2.0\nAdded libcontainers-common to CBL-Mariner 2.0\nAdded prometheus-adapter to CBL-Mariner 2.0\nAdded gh to CBL-Mariner 2.0\nAdded terraform to CBL-Mariner 2.0\nAdded cf-cli to CBL-Mariner 2.0\nAdded influxdb to CBL-Mariner 2.0\nAdded git-lfs to CBL-Mariner 2.0\nAdded node-problem-detector to CBL-Mariner 2.0\nAdded sriov-network-device-plugin to CBL-Mariner 2.0\nAdded kured to CBL-Mariner 2.0\nAdded cni to Azure Linux 3.0\nAdded multus to Azure Linux 3.0\nAdded keda to Azure Linux 3.0\nAdded kubevirt to Azure Linux 3.0\nAdded sriov-network-device-plugin to Azure Linux 3.0\nAdded node-problem-detector to Azure Linux 3.0"
},
{
"date": "2024-12-08T00:00:00.000Z",
"legacy_version": "10.1",
"number": "92",
"summary": "Added application-gateway-kubernetes-ingress to CBL-Mariner 2.0\nAdded containerized-data-importer to CBL-Mariner 2.0\nAdded keda to CBL-Mariner 2.0\nAdded kubevirt to CBL-Mariner 2.0\nAdded libcontainers-common to CBL-Mariner 2.0\nAdded prometheus-adapter to CBL-Mariner 2.0\nAdded gh to CBL-Mariner 2.0\nAdded terraform to CBL-Mariner 2.0\nAdded cf-cli to CBL-Mariner 2.0\nAdded influxdb to CBL-Mariner 2.0\nAdded git-lfs to CBL-Mariner 2.0\nAdded node-problem-detector to CBL-Mariner 2.0\nAdded sriov-network-device-plugin to CBL-Mariner 2.0\nAdded kured to CBL-Mariner 2.0\nAdded cni to Azure Linux 3.0\nAdded multus to Azure Linux 3.0\nAdded keda to Azure Linux 3.0\nAdded kubevirt to Azure Linux 3.0\nAdded sriov-network-device-plugin to Azure Linux 3.0\nAdded node-problem-detector to Azure Linux 3.0"
},
{
"date": "2024-12-09T00:00:00.000Z",
"legacy_version": "10.2",
"number": "93",
"summary": "Added application-gateway-kubernetes-ingress to CBL-Mariner 2.0\nAdded containerized-data-importer to CBL-Mariner 2.0\nAdded keda to CBL-Mariner 2.0\nAdded kubevirt to CBL-Mariner 2.0\nAdded libcontainers-common to CBL-Mariner 2.0\nAdded prometheus-adapter to CBL-Mariner 2.0\nAdded gh to CBL-Mariner 2.0\nAdded terraform to CBL-Mariner 2.0\nAdded cf-cli to CBL-Mariner 2.0\nAdded influxdb to CBL-Mariner 2.0\nAdded git-lfs to CBL-Mariner 2.0\nAdded node-problem-detector to CBL-Mariner 2.0\nAdded sriov-network-device-plugin to CBL-Mariner 2.0\nAdded kured to CBL-Mariner 2.0\nAdded cni to Azure Linux 3.0\nAdded multus to Azure Linux 3.0\nAdded keda to Azure Linux 3.0\nAdded kubevirt to Azure Linux 3.0\nAdded sriov-network-device-plugin to Azure Linux 3.0\nAdded node-problem-detector to Azure Linux 3.0"
},
{
"date": "2024-12-10T00:00:00.000Z",
"legacy_version": "10.3",
"number": "94",
"summary": "Added application-gateway-kubernetes-ingress to CBL-Mariner 2.0\nAdded containerized-data-importer to CBL-Mariner 2.0\nAdded keda to CBL-Mariner 2.0\nAdded kubevirt to CBL-Mariner 2.0\nAdded libcontainers-common to CBL-Mariner 2.0\nAdded prometheus-adapter to CBL-Mariner 2.0\nAdded gh to CBL-Mariner 2.0\nAdded terraform to CBL-Mariner 2.0\nAdded cf-cli to CBL-Mariner 2.0\nAdded influxdb to CBL-Mariner 2.0\nAdded git-lfs to CBL-Mariner 2.0\nAdded node-problem-detector to CBL-Mariner 2.0\nAdded sriov-network-device-plugin to CBL-Mariner 2.0\nAdded kured to CBL-Mariner 2.0\nAdded cni to Azure Linux 3.0\nAdded multus to Azure Linux 3.0\nAdded keda to Azure Linux 3.0\nAdded kubevirt to Azure Linux 3.0\nAdded sriov-network-device-plugin to Azure Linux 3.0\nAdded node-problem-detector to Azure Linux 3.0"
},
{
"date": "2024-12-11T00:00:00.000Z",
"legacy_version": "10.4",
"number": "95",
"summary": "Added application-gateway-kubernetes-ingress to CBL-Mariner 2.0\nAdded containerized-data-importer to CBL-Mariner 2.0\nAdded keda to CBL-Mariner 2.0\nAdded kubevirt to CBL-Mariner 2.0\nAdded libcontainers-common to CBL-Mariner 2.0\nAdded prometheus-adapter to CBL-Mariner 2.0\nAdded gh to CBL-Mariner 2.0\nAdded terraform to CBL-Mariner 2.0\nAdded cf-cli to CBL-Mariner 2.0\nAdded influxdb to CBL-Mariner 2.0\nAdded git-lfs to CBL-Mariner 2.0\nAdded node-problem-detector to CBL-Mariner 2.0\nAdded sriov-network-device-plugin to CBL-Mariner 2.0\nAdded kured to CBL-Mariner 2.0\nAdded cni to Azure Linux 3.0\nAdded multus to Azure Linux 3.0\nAdded keda to Azure Linux 3.0\nAdded kubevirt to Azure Linux 3.0\nAdded sriov-network-device-plugin to Azure Linux 3.0\nAdded node-problem-detector to Azure Linux 3.0"
},
{
"date": "2024-12-12T00:00:00.000Z",
"legacy_version": "10.5",
"number": "96",
"summary": "Added application-gateway-kubernetes-ingress to CBL-Mariner 2.0\nAdded containerized-data-importer to CBL-Mariner 2.0\nAdded keda to CBL-Mariner 2.0\nAdded kubevirt to CBL-Mariner 2.0\nAdded libcontainers-common to CBL-Mariner 2.0\nAdded prometheus-adapter to CBL-Mariner 2.0\nAdded gh to CBL-Mariner 2.0\nAdded terraform to CBL-Mariner 2.0\nAdded cf-cli to CBL-Mariner 2.0\nAdded influxdb to CBL-Mariner 2.0\nAdded git-lfs to CBL-Mariner 2.0\nAdded node-problem-detector to CBL-Mariner 2.0\nAdded sriov-network-device-plugin to CBL-Mariner 2.0\nAdded kured to CBL-Mariner 2.0\nAdded cni to Azure Linux 3.0\nAdded multus to Azure Linux 3.0\nAdded keda to Azure Linux 3.0\nAdded kubevirt to Azure Linux 3.0\nAdded sriov-network-device-plugin to Azure Linux 3.0\nAdded node-problem-detector to Azure Linux 3.0"
},
{
"date": "2024-12-13T00:00:00.000Z",
"legacy_version": "10.6",
"number": "97",
"summary": "Added application-gateway-kubernetes-ingress to CBL-Mariner 2.0\nAdded containerized-data-importer to CBL-Mariner 2.0\nAdded keda to CBL-Mariner 2.0\nAdded kubevirt to CBL-Mariner 2.0\nAdded libcontainers-common to CBL-Mariner 2.0\nAdded prometheus-adapter to CBL-Mariner 2.0\nAdded gh to CBL-Mariner 2.0\nAdded terraform to CBL-Mariner 2.0\nAdded cf-cli to CBL-Mariner 2.0\nAdded influxdb to CBL-Mariner 2.0\nAdded git-lfs to CBL-Mariner 2.0\nAdded node-problem-detector to CBL-Mariner 2.0\nAdded sriov-network-device-plugin to CBL-Mariner 2.0\nAdded kured to CBL-Mariner 2.0\nAdded cni to Azure Linux 3.0\nAdded multus to Azure Linux 3.0\nAdded keda to Azure Linux 3.0\nAdded kubevirt to Azure Linux 3.0\nAdded sriov-network-device-plugin to Azure Linux 3.0\nAdded node-problem-detector to Azure Linux 3.0"
},
{
"date": "2024-12-14T00:00:00.000Z",
"legacy_version": "10.7",
"number": "98",
"summary": "Added application-gateway-kubernetes-ingress to CBL-Mariner 2.0\nAdded containerized-data-importer to CBL-Mariner 2.0\nAdded keda to CBL-Mariner 2.0\nAdded kubevirt to CBL-Mariner 2.0\nAdded libcontainers-common to CBL-Mariner 2.0\nAdded prometheus-adapter to CBL-Mariner 2.0\nAdded gh to CBL-Mariner 2.0\nAdded terraform to CBL-Mariner 2.0\nAdded cf-cli to CBL-Mariner 2.0\nAdded influxdb to CBL-Mariner 2.0\nAdded git-lfs to CBL-Mariner 2.0\nAdded node-problem-detector to CBL-Mariner 2.0\nAdded sriov-network-device-plugin to CBL-Mariner 2.0\nAdded kured to CBL-Mariner 2.0\nAdded cni to Azure Linux 3.0\nAdded multus to Azure Linux 3.0\nAdded keda to Azure Linux 3.0\nAdded kubevirt to Azure Linux 3.0\nAdded sriov-network-device-plugin to Azure Linux 3.0\nAdded node-problem-detector to Azure Linux 3.0"
},
{
"date": "2024-12-15T00:00:00.000Z",
"legacy_version": "10.8",
"number": "99",
"summary": "Added application-gateway-kubernetes-ingress to CBL-Mariner 2.0\nAdded containerized-data-importer to CBL-Mariner 2.0\nAdded keda to CBL-Mariner 2.0\nAdded kubevirt to CBL-Mariner 2.0\nAdded libcontainers-common to CBL-Mariner 2.0\nAdded prometheus-adapter to CBL-Mariner 2.0\nAdded gh to CBL-Mariner 2.0\nAdded terraform to CBL-Mariner 2.0\nAdded cf-cli to CBL-Mariner 2.0\nAdded influxdb to CBL-Mariner 2.0\nAdded git-lfs to CBL-Mariner 2.0\nAdded node-problem-detector to CBL-Mariner 2.0\nAdded sriov-network-device-plugin to CBL-Mariner 2.0\nAdded kured to CBL-Mariner 2.0\nAdded cni to Azure Linux 3.0\nAdded multus to Azure Linux 3.0\nAdded keda to Azure Linux 3.0\nAdded kubevirt to Azure Linux 3.0\nAdded sriov-network-device-plugin to Azure Linux 3.0\nAdded node-problem-detector to Azure Linux 3.0"
},
{
"date": "2024-12-16T00:00:00.000Z",
"legacy_version": "10.9",
"number": "100",
"summary": "Added application-gateway-kubernetes-ingress to CBL-Mariner 2.0\nAdded containerized-data-importer to CBL-Mariner 2.0\nAdded keda to CBL-Mariner 2.0\nAdded kubevirt to CBL-Mariner 2.0\nAdded libcontainers-common to CBL-Mariner 2.0\nAdded prometheus-adapter to CBL-Mariner 2.0\nAdded gh to CBL-Mariner 2.0\nAdded terraform to CBL-Mariner 2.0\nAdded cf-cli to CBL-Mariner 2.0\nAdded influxdb to CBL-Mariner 2.0\nAdded git-lfs to CBL-Mariner 2.0\nAdded node-problem-detector to CBL-Mariner 2.0\nAdded sriov-network-device-plugin to CBL-Mariner 2.0\nAdded kured to CBL-Mariner 2.0\nAdded cni to Azure Linux 3.0\nAdded multus to Azure Linux 3.0\nAdded keda to Azure Linux 3.0\nAdded kubevirt to Azure Linux 3.0\nAdded sriov-network-device-plugin to Azure Linux 3.0\nAdded node-problem-detector to Azure Linux 3.0"
},
{
"date": "2024-12-17T00:00:00.000Z",
"legacy_version": "11",
"number": "101",
"summary": "Added application-gateway-kubernetes-ingress to CBL-Mariner 2.0\nAdded containerized-data-importer to CBL-Mariner 2.0\nAdded keda to CBL-Mariner 2.0\nAdded kubevirt to CBL-Mariner 2.0\nAdded libcontainers-common to CBL-Mariner 2.0\nAdded prometheus-adapter to CBL-Mariner 2.0\nAdded gh to CBL-Mariner 2.0\nAdded terraform to CBL-Mariner 2.0\nAdded cf-cli to CBL-Mariner 2.0\nAdded influxdb to CBL-Mariner 2.0\nAdded git-lfs to CBL-Mariner 2.0\nAdded node-problem-detector to CBL-Mariner 2.0\nAdded sriov-network-device-plugin to CBL-Mariner 2.0\nAdded kured to CBL-Mariner 2.0\nAdded cni to Azure Linux 3.0\nAdded multus to Azure Linux 3.0\nAdded keda to Azure Linux 3.0\nAdded kubevirt to Azure Linux 3.0\nAdded sriov-network-device-plugin to Azure Linux 3.0\nAdded node-problem-detector to Azure Linux 3.0"
},
{
"date": "2024-12-18T00:00:00.000Z",
"legacy_version": "11.1",
"number": "102",
"summary": "Added application-gateway-kubernetes-ingress to CBL-Mariner 2.0\nAdded containerized-data-importer to CBL-Mariner 2.0\nAdded keda to CBL-Mariner 2.0\nAdded kubevirt to CBL-Mariner 2.0\nAdded libcontainers-common to CBL-Mariner 2.0\nAdded prometheus-adapter to CBL-Mariner 2.0\nAdded gh to CBL-Mariner 2.0\nAdded terraform to CBL-Mariner 2.0\nAdded cf-cli to CBL-Mariner 2.0\nAdded influxdb to CBL-Mariner 2.0\nAdded git-lfs to CBL-Mariner 2.0\nAdded node-problem-detector to CBL-Mariner 2.0\nAdded sriov-network-device-plugin to CBL-Mariner 2.0\nAdded kured to CBL-Mariner 2.0\nAdded cni to Azure Linux 3.0\nAdded multus to Azure Linux 3.0\nAdded keda to Azure Linux 3.0\nAdded kubevirt to Azure Linux 3.0\nAdded sriov-network-device-plugin to Azure Linux 3.0\nAdded node-problem-detector to Azure Linux 3.0"
},
{
"date": "2024-12-19T00:00:00.000Z",
"legacy_version": "11.2",
"number": "103",
"summary": "Added application-gateway-kubernetes-ingress to CBL-Mariner 2.0\nAdded containerized-data-importer to CBL-Mariner 2.0\nAdded keda to CBL-Mariner 2.0\nAdded kubevirt to CBL-Mariner 2.0\nAdded libcontainers-common to CBL-Mariner 2.0\nAdded prometheus-adapter to CBL-Mariner 2.0\nAdded gh to CBL-Mariner 2.0\nAdded terraform to CBL-Mariner 2.0\nAdded cf-cli to CBL-Mariner 2.0\nAdded influxdb to CBL-Mariner 2.0\nAdded git-lfs to CBL-Mariner 2.0\nAdded node-problem-detector to CBL-Mariner 2.0\nAdded sriov-network-device-plugin to CBL-Mariner 2.0\nAdded kured to CBL-Mariner 2.0\nAdded cni to Azure Linux 3.0\nAdded multus to Azure Linux 3.0\nAdded keda to Azure Linux 3.0\nAdded kubevirt to Azure Linux 3.0\nAdded sriov-network-device-plugin to Azure Linux 3.0\nAdded node-problem-detector to Azure Linux 3.0"
},
{
"date": "2024-12-20T00:00:00.000Z",
"legacy_version": "11.3",
"number": "104",
"summary": "Added application-gateway-kubernetes-ingress to CBL-Mariner 2.0\nAdded containerized-data-importer to CBL-Mariner 2.0\nAdded keda to CBL-Mariner 2.0\nAdded kubevirt to CBL-Mariner 2.0\nAdded libcontainers-common to CBL-Mariner 2.0\nAdded prometheus-adapter to CBL-Mariner 2.0\nAdded gh to CBL-Mariner 2.0\nAdded terraform to CBL-Mariner 2.0\nAdded cf-cli to CBL-Mariner 2.0\nAdded influxdb to CBL-Mariner 2.0\nAdded git-lfs to CBL-Mariner 2.0\nAdded node-problem-detector to CBL-Mariner 2.0\nAdded sriov-network-device-plugin to CBL-Mariner 2.0\nAdded kured to CBL-Mariner 2.0\nAdded cni to Azure Linux 3.0\nAdded multus to Azure Linux 3.0\nAdded keda to Azure Linux 3.0\nAdded kubevirt to Azure Linux 3.0\nAdded sriov-network-device-plugin to Azure Linux 3.0\nAdded node-problem-detector to Azure Linux 3.0"
},
{
"date": "2024-12-21T00:00:00.000Z",
"legacy_version": "11.4",
"number": "105",
"summary": "Added application-gateway-kubernetes-ingress to CBL-Mariner 2.0\nAdded containerized-data-importer to CBL-Mariner 2.0\nAdded keda to CBL-Mariner 2.0\nAdded kubevirt to CBL-Mariner 2.0\nAdded libcontainers-common to CBL-Mariner 2.0\nAdded prometheus-adapter to CBL-Mariner 2.0\nAdded gh to CBL-Mariner 2.0\nAdded terraform to CBL-Mariner 2.0\nAdded cf-cli to CBL-Mariner 2.0\nAdded influxdb to CBL-Mariner 2.0\nAdded git-lfs to CBL-Mariner 2.0\nAdded node-problem-detector to CBL-Mariner 2.0\nAdded sriov-network-device-plugin to CBL-Mariner 2.0\nAdded kured to CBL-Mariner 2.0\nAdded cni to Azure Linux 3.0\nAdded multus to Azure Linux 3.0\nAdded keda to Azure Linux 3.0\nAdded kubevirt to Azure Linux 3.0\nAdded sriov-network-device-plugin to Azure Linux 3.0\nAdded node-problem-detector to Azure Linux 3.0"
},
{
"date": "2024-12-22T00:00:00.000Z",
"legacy_version": "11.5",
"number": "106",
"summary": "Added application-gateway-kubernetes-ingress to CBL-Mariner 2.0\nAdded containerized-data-importer to CBL-Mariner 2.0\nAdded keda to CBL-Mariner 2.0\nAdded kubevirt to CBL-Mariner 2.0\nAdded libcontainers-common to CBL-Mariner 2.0\nAdded prometheus-adapter to CBL-Mariner 2.0\nAdded gh to CBL-Mariner 2.0\nAdded terraform to CBL-Mariner 2.0\nAdded cf-cli to CBL-Mariner 2.0\nAdded influxdb to CBL-Mariner 2.0\nAdded git-lfs to CBL-Mariner 2.0\nAdded node-problem-detector to CBL-Mariner 2.0\nAdded sriov-network-device-plugin to CBL-Mariner 2.0\nAdded kured to CBL-Mariner 2.0\nAdded cni to Azure Linux 3.0\nAdded multus to Azure Linux 3.0\nAdded keda to Azure Linux 3.0\nAdded kubevirt to Azure Linux 3.0\nAdded sriov-network-device-plugin to Azure Linux 3.0\nAdded node-problem-detector to Azure Linux 3.0"
},
{
"date": "2024-12-23T00:00:00.000Z",
"legacy_version": "11.6",
"number": "107",
"summary": "Added application-gateway-kubernetes-ingress to CBL-Mariner 2.0\nAdded containerized-data-importer to CBL-Mariner 2.0\nAdded keda to CBL-Mariner 2.0\nAdded kubevirt to CBL-Mariner 2.0\nAdded libcontainers-common to CBL-Mariner 2.0\nAdded prometheus-adapter to CBL-Mariner 2.0\nAdded gh to CBL-Mariner 2.0\nAdded terraform to CBL-Mariner 2.0\nAdded cf-cli to CBL-Mariner 2.0\nAdded influxdb to CBL-Mariner 2.0\nAdded git-lfs to CBL-Mariner 2.0\nAdded node-problem-detector to CBL-Mariner 2.0\nAdded sriov-network-device-plugin to CBL-Mariner 2.0\nAdded kured to CBL-Mariner 2.0\nAdded cni to Azure Linux 3.0\nAdded multus to Azure Linux 3.0\nAdded keda to Azure Linux 3.0\nAdded kubevirt to Azure Linux 3.0\nAdded sriov-network-device-plugin to Azure Linux 3.0\nAdded node-problem-detector to Azure Linux 3.0"
},
{
"date": "2024-12-24T00:00:00.000Z",
"legacy_version": "11.7",
"number": "108",
"summary": "Added application-gateway-kubernetes-ingress to CBL-Mariner 2.0\nAdded containerized-data-importer to CBL-Mariner 2.0\nAdded keda to CBL-Mariner 2.0\nAdded kubevirt to CBL-Mariner 2.0\nAdded libcontainers-common to CBL-Mariner 2.0\nAdded prometheus-adapter to CBL-Mariner 2.0\nAdded gh to CBL-Mariner 2.0\nAdded terraform to CBL-Mariner 2.0\nAdded cf-cli to CBL-Mariner 2.0\nAdded influxdb to CBL-Mariner 2.0\nAdded git-lfs to CBL-Mariner 2.0\nAdded node-problem-detector to CBL-Mariner 2.0\nAdded sriov-network-device-plugin to CBL-Mariner 2.0\nAdded kured to CBL-Mariner 2.0\nAdded cni to Azure Linux 3.0\nAdded multus to Azure Linux 3.0\nAdded keda to Azure Linux 3.0\nAdded kubevirt to Azure Linux 3.0\nAdded sriov-network-device-plugin to Azure Linux 3.0\nAdded node-problem-detector to Azure Linux 3.0"
},
{
"date": "2024-12-25T00:00:00.000Z",
"legacy_version": "11.8",
"number": "109",
"summary": "Added application-gateway-kubernetes-ingress to CBL-Mariner 2.0\nAdded containerized-data-importer to CBL-Mariner 2.0\nAdded keda to CBL-Mariner 2.0\nAdded kubevirt to CBL-Mariner 2.0\nAdded libcontainers-common to CBL-Mariner 2.0\nAdded prometheus-adapter to CBL-Mariner 2.0\nAdded gh to CBL-Mariner 2.0\nAdded terraform to CBL-Mariner 2.0\nAdded cf-cli to CBL-Mariner 2.0\nAdded influxdb to CBL-Mariner 2.0\nAdded git-lfs to CBL-Mariner 2.0\nAdded node-problem-detector to CBL-Mariner 2.0\nAdded sriov-network-device-plugin to CBL-Mariner 2.0\nAdded kured to CBL-Mariner 2.0\nAdded cni to Azure Linux 3.0\nAdded multus to Azure Linux 3.0\nAdded keda to Azure Linux 3.0\nAdded kubevirt to Azure Linux 3.0\nAdded sriov-network-device-plugin to Azure Linux 3.0\nAdded node-problem-detector to Azure Linux 3.0"
},
{
"date": "2024-12-26T00:00:00.000Z",
"legacy_version": "11.9",
"number": "110",
"summary": "Added application-gateway-kubernetes-ingress to CBL-Mariner 2.0\nAdded containerized-data-importer to CBL-Mariner 2.0\nAdded keda to CBL-Mariner 2.0\nAdded kubevirt to CBL-Mariner 2.0\nAdded libcontainers-common to CBL-Mariner 2.0\nAdded prometheus-adapter to CBL-Mariner 2.0\nAdded gh to CBL-Mariner 2.0\nAdded terraform to CBL-Mariner 2.0\nAdded cf-cli to CBL-Mariner 2.0\nAdded influxdb to CBL-Mariner 2.0\nAdded git-lfs to CBL-Mariner 2.0\nAdded node-problem-detector to CBL-Mariner 2.0\nAdded sriov-network-device-plugin to CBL-Mariner 2.0\nAdded kured to CBL-Mariner 2.0\nAdded cni to Azure Linux 3.0\nAdded multus to Azure Linux 3.0\nAdded keda to Azure Linux 3.0\nAdded kubevirt to Azure Linux 3.0\nAdded sriov-network-device-plugin to Azure Linux 3.0\nAdded node-problem-detector to Azure Linux 3.0"
},
{
"date": "2024-12-27T00:00:00.000Z",
"legacy_version": "12",
"number": "111",
"summary": "Added application-gateway-kubernetes-ingress to CBL-Mariner 2.0\nAdded containerized-data-importer to CBL-Mariner 2.0\nAdded keda to CBL-Mariner 2.0\nAdded kubevirt to CBL-Mariner 2.0\nAdded libcontainers-common to CBL-Mariner 2.0\nAdded prometheus-adapter to CBL-Mariner 2.0\nAdded gh to CBL-Mariner 2.0\nAdded terraform to CBL-Mariner 2.0\nAdded cf-cli to CBL-Mariner 2.0\nAdded influxdb to CBL-Mariner 2.0\nAdded git-lfs to CBL-Mariner 2.0\nAdded node-problem-detector to CBL-Mariner 2.0\nAdded sriov-network-device-plugin to CBL-Mariner 2.0\nAdded kured to CBL-Mariner 2.0\nAdded cni to Azure Linux 3.0\nAdded multus to Azure Linux 3.0\nAdded keda to Azure Linux 3.0\nAdded kubevirt to Azure Linux 3.0\nAdded sriov-network-device-plugin to Azure Linux 3.0\nAdded node-problem-detector to Azure Linux 3.0"
},
{
"date": "2024-12-28T00:00:00.000Z",
"legacy_version": "12.1",
"number": "112",
"summary": "Added application-gateway-kubernetes-ingress to CBL-Mariner 2.0\nAdded containerized-data-importer to CBL-Mariner 2.0\nAdded keda to CBL-Mariner 2.0\nAdded kubevirt to CBL-Mariner 2.0\nAdded libcontainers-common to CBL-Mariner 2.0\nAdded prometheus-adapter to CBL-Mariner 2.0\nAdded gh to CBL-Mariner 2.0\nAdded terraform to CBL-Mariner 2.0\nAdded cf-cli to CBL-Mariner 2.0\nAdded influxdb to CBL-Mariner 2.0\nAdded git-lfs to CBL-Mariner 2.0\nAdded node-problem-detector to CBL-Mariner 2.0\nAdded sriov-network-device-plugin to CBL-Mariner 2.0\nAdded kured to CBL-Mariner 2.0\nAdded cni to Azure Linux 3.0\nAdded multus to Azure Linux 3.0\nAdded keda to Azure Linux 3.0\nAdded kubevirt to Azure Linux 3.0\nAdded sriov-network-device-plugin to Azure Linux 3.0\nAdded node-problem-detector to Azure Linux 3.0"
},
{
"date": "2024-12-29T00:00:00.000Z",
"legacy_version": "12.2",
"number": "113",
"summary": "Added application-gateway-kubernetes-ingress to CBL-Mariner 2.0\nAdded containerized-data-importer to CBL-Mariner 2.0\nAdded keda to CBL-Mariner 2.0\nAdded kubevirt to CBL-Mariner 2.0\nAdded libcontainers-common to CBL-Mariner 2.0\nAdded prometheus-adapter to CBL-Mariner 2.0\nAdded gh to CBL-Mariner 2.0\nAdded terraform to CBL-Mariner 2.0\nAdded cf-cli to CBL-Mariner 2.0\nAdded influxdb to CBL-Mariner 2.0\nAdded git-lfs to CBL-Mariner 2.0\nAdded node-problem-detector to CBL-Mariner 2.0\nAdded sriov-network-device-plugin to CBL-Mariner 2.0\nAdded kured to CBL-Mariner 2.0\nAdded cni to Azure Linux 3.0\nAdded multus to Azure Linux 3.0\nAdded keda to Azure Linux 3.0\nAdded kubevirt to Azure Linux 3.0\nAdded sriov-network-device-plugin to Azure Linux 3.0\nAdded node-problem-detector to Azure Linux 3.0"
},
{
"date": "2024-12-30T00:00:00.000Z",
"legacy_version": "12.3",
"number": "114",
"summary": "Added application-gateway-kubernetes-ingress to CBL-Mariner 2.0\nAdded containerized-data-importer to CBL-Mariner 2.0\nAdded keda to CBL-Mariner 2.0\nAdded kubevirt to CBL-Mariner 2.0\nAdded libcontainers-common to CBL-Mariner 2.0\nAdded prometheus-adapter to CBL-Mariner 2.0\nAdded gh to CBL-Mariner 2.0\nAdded terraform to CBL-Mariner 2.0\nAdded cf-cli to CBL-Mariner 2.0\nAdded influxdb to CBL-Mariner 2.0\nAdded git-lfs to CBL-Mariner 2.0\nAdded node-problem-detector to CBL-Mariner 2.0\nAdded sriov-network-device-plugin to CBL-Mariner 2.0\nAdded kured to CBL-Mariner 2.0\nAdded cni to Azure Linux 3.0\nAdded multus to Azure Linux 3.0\nAdded keda to Azure Linux 3.0\nAdded kubevirt to Azure Linux 3.0\nAdded sriov-network-device-plugin to Azure Linux 3.0\nAdded node-problem-detector to Azure Linux 3.0"
},
{
"date": "2024-12-31T00:00:00.000Z",
"legacy_version": "12.4",
"number": "115",
"summary": "Added application-gateway-kubernetes-ingress to CBL-Mariner 2.0\nAdded containerized-data-importer to CBL-Mariner 2.0\nAdded keda to CBL-Mariner 2.0\nAdded kubevirt to CBL-Mariner 2.0\nAdded libcontainers-common to CBL-Mariner 2.0\nAdded prometheus-adapter to CBL-Mariner 2.0\nAdded gh to CBL-Mariner 2.0\nAdded terraform to CBL-Mariner 2.0\nAdded cf-cli to CBL-Mariner 2.0\nAdded influxdb to CBL-Mariner 2.0\nAdded git-lfs to CBL-Mariner 2.0\nAdded node-problem-detector to CBL-Mariner 2.0\nAdded sriov-network-device-plugin to CBL-Mariner 2.0\nAdded kured to CBL-Mariner 2.0\nAdded cni to Azure Linux 3.0\nAdded multus to Azure Linux 3.0\nAdded keda to Azure Linux 3.0\nAdded kubevirt to Azure Linux 3.0\nAdded sriov-network-device-plugin to Azure Linux 3.0\nAdded node-problem-detector to Azure Linux 3.0"
},
{
"date": "2025-01-01T00:00:00.000Z",
"legacy_version": "12.5",
"number": "116",
"summary": "Added application-gateway-kubernetes-ingress to CBL-Mariner 2.0\nAdded containerized-data-importer to CBL-Mariner 2.0\nAdded keda to CBL-Mariner 2.0\nAdded kubevirt to CBL-Mariner 2.0\nAdded libcontainers-common to CBL-Mariner 2.0\nAdded prometheus-adapter to CBL-Mariner 2.0\nAdded gh to CBL-Mariner 2.0\nAdded terraform to CBL-Mariner 2.0\nAdded cf-cli to CBL-Mariner 2.0\nAdded influxdb to CBL-Mariner 2.0\nAdded git-lfs to CBL-Mariner 2.0\nAdded node-problem-detector to CBL-Mariner 2.0\nAdded sriov-network-device-plugin to CBL-Mariner 2.0\nAdded kured to CBL-Mariner 2.0\nAdded cni to Azure Linux 3.0\nAdded multus to Azure Linux 3.0\nAdded keda to Azure Linux 3.0\nAdded kubevirt to Azure Linux 3.0\nAdded sriov-network-device-plugin to Azure Linux 3.0\nAdded node-problem-detector to Azure Linux 3.0"
},
{
"date": "2025-01-02T00:00:00.000Z",
"legacy_version": "12.6",
"number": "117",
"summary": "Added application-gateway-kubernetes-ingress to CBL-Mariner 2.0\nAdded containerized-data-importer to CBL-Mariner 2.0\nAdded keda to CBL-Mariner 2.0\nAdded kubevirt to CBL-Mariner 2.0\nAdded libcontainers-common to CBL-Mariner 2.0\nAdded prometheus-adapter to CBL-Mariner 2.0\nAdded gh to CBL-Mariner 2.0\nAdded terraform to CBL-Mariner 2.0\nAdded cf-cli to CBL-Mariner 2.0\nAdded influxdb to CBL-Mariner 2.0\nAdded git-lfs to CBL-Mariner 2.0\nAdded node-problem-detector to CBL-Mariner 2.0\nAdded sriov-network-device-plugin to CBL-Mariner 2.0\nAdded kured to CBL-Mariner 2.0\nAdded cni to Azure Linux 3.0\nAdded multus to Azure Linux 3.0\nAdded keda to Azure Linux 3.0\nAdded kubevirt to Azure Linux 3.0\nAdded sriov-network-device-plugin to Azure Linux 3.0\nAdded node-problem-detector to Azure Linux 3.0"
},
{
"date": "2025-01-03T00:00:00.000Z",
"legacy_version": "12.7",
"number": "118",
"summary": "Added application-gateway-kubernetes-ingress to CBL-Mariner 2.0\nAdded containerized-data-importer to CBL-Mariner 2.0\nAdded keda to CBL-Mariner 2.0\nAdded kubevirt to CBL-Mariner 2.0\nAdded libcontainers-common to CBL-Mariner 2.0\nAdded prometheus-adapter to CBL-Mariner 2.0\nAdded gh to CBL-Mariner 2.0\nAdded terraform to CBL-Mariner 2.0\nAdded cf-cli to CBL-Mariner 2.0\nAdded influxdb to CBL-Mariner 2.0\nAdded git-lfs to CBL-Mariner 2.0\nAdded node-problem-detector to CBL-Mariner 2.0\nAdded sriov-network-device-plugin to CBL-Mariner 2.0\nAdded kured to CBL-Mariner 2.0\nAdded cni to Azure Linux 3.0\nAdded multus to Azure Linux 3.0\nAdded keda to Azure Linux 3.0\nAdded kubevirt to Azure Linux 3.0\nAdded sriov-network-device-plugin to Azure Linux 3.0\nAdded node-problem-detector to Azure Linux 3.0"
},
{
"date": "2025-01-04T00:00:00.000Z",
"legacy_version": "12.8",
"number": "119",
"summary": "Added application-gateway-kubernetes-ingress to CBL-Mariner 2.0\nAdded containerized-data-importer to CBL-Mariner 2.0\nAdded keda to CBL-Mariner 2.0\nAdded kubevirt to CBL-Mariner 2.0\nAdded libcontainers-common to CBL-Mariner 2.0\nAdded prometheus-adapter to CBL-Mariner 2.0\nAdded gh to CBL-Mariner 2.0\nAdded terraform to CBL-Mariner 2.0\nAdded cf-cli to CBL-Mariner 2.0\nAdded influxdb to CBL-Mariner 2.0\nAdded git-lfs to CBL-Mariner 2.0\nAdded node-problem-detector to CBL-Mariner 2.0\nAdded sriov-network-device-plugin to CBL-Mariner 2.0\nAdded kured to CBL-Mariner 2.0\nAdded cni to Azure Linux 3.0\nAdded multus to Azure Linux 3.0\nAdded keda to Azure Linux 3.0\nAdded kubevirt to Azure Linux 3.0\nAdded sriov-network-device-plugin to Azure Linux 3.0\nAdded node-problem-detector to Azure Linux 3.0"
},
{
"date": "2025-01-05T00:00:00.000Z",
"legacy_version": "12.9",
"number": "120",
"summary": "Added application-gateway-kubernetes-ingress to CBL-Mariner 2.0\nAdded containerized-data-importer to CBL-Mariner 2.0\nAdded keda to CBL-Mariner 2.0\nAdded kubevirt to CBL-Mariner 2.0\nAdded libcontainers-common to CBL-Mariner 2.0\nAdded prometheus-adapter to CBL-Mariner 2.0\nAdded gh to CBL-Mariner 2.0\nAdded terraform to CBL-Mariner 2.0\nAdded cf-cli to CBL-Mariner 2.0\nAdded influxdb to CBL-Mariner 2.0\nAdded git-lfs to CBL-Mariner 2.0\nAdded node-problem-detector to CBL-Mariner 2.0\nAdded sriov-network-device-plugin to CBL-Mariner 2.0\nAdded kured to CBL-Mariner 2.0\nAdded cni to Azure Linux 3.0\nAdded multus to Azure Linux 3.0\nAdded keda to Azure Linux 3.0\nAdded kubevirt to Azure Linux 3.0\nAdded sriov-network-device-plugin to Azure Linux 3.0\nAdded node-problem-detector to Azure Linux 3.0"
},
{
"date": "2025-01-06T00:00:00.000Z",
"legacy_version": "13",
"number": "121",
"summary": "Added application-gateway-kubernetes-ingress to CBL-Mariner 2.0\nAdded containerized-data-importer to CBL-Mariner 2.0\nAdded keda to CBL-Mariner 2.0\nAdded kubevirt to CBL-Mariner 2.0\nAdded libcontainers-common to CBL-Mariner 2.0\nAdded prometheus-adapter to CBL-Mariner 2.0\nAdded gh to CBL-Mariner 2.0\nAdded terraform to CBL-Mariner 2.0\nAdded cf-cli to CBL-Mariner 2.0\nAdded influxdb to CBL-Mariner 2.0\nAdded git-lfs to CBL-Mariner 2.0\nAdded node-problem-detector to CBL-Mariner 2.0\nAdded sriov-network-device-plugin to CBL-Mariner 2.0\nAdded kured to CBL-Mariner 2.0\nAdded cni to Azure Linux 3.0\nAdded multus to Azure Linux 3.0\nAdded keda to Azure Linux 3.0\nAdded kubevirt to Azure Linux 3.0\nAdded sriov-network-device-plugin to Azure Linux 3.0\nAdded node-problem-detector to Azure Linux 3.0"
},
{
"date": "2025-01-07T00:00:00.000Z",
"legacy_version": "13.1",
"number": "122",
"summary": "Added application-gateway-kubernetes-ingress to CBL-Mariner 2.0\nAdded containerized-data-importer to CBL-Mariner 2.0\nAdded keda to CBL-Mariner 2.0\nAdded kubevirt to CBL-Mariner 2.0\nAdded libcontainers-common to CBL-Mariner 2.0\nAdded prometheus-adapter to CBL-Mariner 2.0\nAdded gh to CBL-Mariner 2.0\nAdded terraform to CBL-Mariner 2.0\nAdded cf-cli to CBL-Mariner 2.0\nAdded influxdb to CBL-Mariner 2.0\nAdded git-lfs to CBL-Mariner 2.0\nAdded node-problem-detector to CBL-Mariner 2.0\nAdded sriov-network-device-plugin to CBL-Mariner 2.0\nAdded kured to CBL-Mariner 2.0\nAdded cni to Azure Linux 3.0\nAdded multus to Azure Linux 3.0\nAdded keda to Azure Linux 3.0\nAdded kubevirt to Azure Linux 3.0\nAdded sriov-network-device-plugin to Azure Linux 3.0\nAdded node-problem-detector to Azure Linux 3.0"
},
{
"date": "2025-01-08T00:00:00.000Z",
"legacy_version": "13.2",
"number": "123",
"summary": "Added application-gateway-kubernetes-ingress to CBL-Mariner 2.0\nAdded containerized-data-importer to CBL-Mariner 2.0\nAdded keda to CBL-Mariner 2.0\nAdded kubevirt to CBL-Mariner 2.0\nAdded libcontainers-common to CBL-Mariner 2.0\nAdded prometheus-adapter to CBL-Mariner 2.0\nAdded gh to CBL-Mariner 2.0\nAdded terraform to CBL-Mariner 2.0\nAdded cf-cli to CBL-Mariner 2.0\nAdded influxdb to CBL-Mariner 2.0\nAdded git-lfs to CBL-Mariner 2.0\nAdded node-problem-detector to CBL-Mariner 2.0\nAdded sriov-network-device-plugin to CBL-Mariner 2.0\nAdded kured to CBL-Mariner 2.0\nAdded cni to Azure Linux 3.0\nAdded multus to Azure Linux 3.0\nAdded keda to Azure Linux 3.0\nAdded kubevirt to Azure Linux 3.0\nAdded sriov-network-device-plugin to Azure Linux 3.0\nAdded node-problem-detector to Azure Linux 3.0"
},
{
"date": "2025-01-09T00:00:00.000Z",
"legacy_version": "13.3",
"number": "124",
"summary": "Added application-gateway-kubernetes-ingress to CBL-Mariner 2.0\nAdded containerized-data-importer to CBL-Mariner 2.0\nAdded keda to CBL-Mariner 2.0\nAdded kubevirt to CBL-Mariner 2.0\nAdded libcontainers-common to CBL-Mariner 2.0\nAdded prometheus-adapter to CBL-Mariner 2.0\nAdded gh to CBL-Mariner 2.0\nAdded terraform to CBL-Mariner 2.0\nAdded cf-cli to CBL-Mariner 2.0\nAdded influxdb to CBL-Mariner 2.0\nAdded git-lfs to CBL-Mariner 2.0\nAdded node-problem-detector to CBL-Mariner 2.0\nAdded sriov-network-device-plugin to CBL-Mariner 2.0\nAdded kured to CBL-Mariner 2.0\nAdded cni to Azure Linux 3.0\nAdded multus to Azure Linux 3.0\nAdded keda to Azure Linux 3.0\nAdded kubevirt to Azure Linux 3.0\nAdded sriov-network-device-plugin to Azure Linux 3.0\nAdded node-problem-detector to Azure Linux 3.0"
},
{
"date": "2025-01-10T00:00:00.000Z",
"legacy_version": "13.4",
"number": "125",
"summary": "Added application-gateway-kubernetes-ingress to CBL-Mariner 2.0\nAdded containerized-data-importer to CBL-Mariner 2.0\nAdded keda to CBL-Mariner 2.0\nAdded kubevirt to CBL-Mariner 2.0\nAdded libcontainers-common to CBL-Mariner 2.0\nAdded prometheus-adapter to CBL-Mariner 2.0\nAdded gh to CBL-Mariner 2.0\nAdded terraform to CBL-Mariner 2.0\nAdded cf-cli to CBL-Mariner 2.0\nAdded influxdb to CBL-Mariner 2.0\nAdded git-lfs to CBL-Mariner 2.0\nAdded node-problem-detector to CBL-Mariner 2.0\nAdded sriov-network-device-plugin to CBL-Mariner 2.0\nAdded kured to CBL-Mariner 2.0\nAdded cni to Azure Linux 3.0\nAdded multus to Azure Linux 3.0\nAdded keda to Azure Linux 3.0\nAdded kubevirt to Azure Linux 3.0\nAdded sriov-network-device-plugin to Azure Linux 3.0\nAdded node-problem-detector to Azure Linux 3.0"
},
{
"date": "2025-01-11T00:00:00.000Z",
"legacy_version": "13.5",
"number": "126",
"summary": "Added application-gateway-kubernetes-ingress to CBL-Mariner 2.0\nAdded containerized-data-importer to CBL-Mariner 2.0\nAdded keda to CBL-Mariner 2.0\nAdded kubevirt to CBL-Mariner 2.0\nAdded libcontainers-common to CBL-Mariner 2.0\nAdded prometheus-adapter to CBL-Mariner 2.0\nAdded gh to CBL-Mariner 2.0\nAdded terraform to CBL-Mariner 2.0\nAdded cf-cli to CBL-Mariner 2.0\nAdded influxdb to CBL-Mariner 2.0\nAdded git-lfs to CBL-Mariner 2.0\nAdded node-problem-detector to CBL-Mariner 2.0\nAdded sriov-network-device-plugin to CBL-Mariner 2.0\nAdded kured to CBL-Mariner 2.0\nAdded cni to Azure Linux 3.0\nAdded multus to Azure Linux 3.0\nAdded keda to Azure Linux 3.0\nAdded kubevirt to Azure Linux 3.0\nAdded sriov-network-device-plugin to Azure Linux 3.0\nAdded node-problem-detector to Azure Linux 3.0"
},
{
"date": "2025-01-12T00:00:00.000Z",
"legacy_version": "13.6",
"number": "127",
"summary": "Added application-gateway-kubernetes-ingress to CBL-Mariner 2.0\nAdded containerized-data-importer to CBL-Mariner 2.0\nAdded keda to CBL-Mariner 2.0\nAdded kubevirt to CBL-Mariner 2.0\nAdded libcontainers-common to CBL-Mariner 2.0\nAdded prometheus-adapter to CBL-Mariner 2.0\nAdded gh to CBL-Mariner 2.0\nAdded terraform to CBL-Mariner 2.0\nAdded cf-cli to CBL-Mariner 2.0\nAdded influxdb to CBL-Mariner 2.0\nAdded git-lfs to CBL-Mariner 2.0\nAdded node-problem-detector to CBL-Mariner 2.0\nAdded sriov-network-device-plugin to CBL-Mariner 2.0\nAdded kured to CBL-Mariner 2.0\nAdded cni to Azure Linux 3.0\nAdded multus to Azure Linux 3.0\nAdded keda to Azure Linux 3.0\nAdded kubevirt to Azure Linux 3.0\nAdded sriov-network-device-plugin to Azure Linux 3.0\nAdded node-problem-detector to Azure Linux 3.0"
},
{
"date": "2025-01-13T00:00:00.000Z",
"legacy_version": "13.7",
"number": "128",
"summary": "Added application-gateway-kubernetes-ingress to CBL-Mariner 2.0\nAdded containerized-data-importer to CBL-Mariner 2.0\nAdded keda to CBL-Mariner 2.0\nAdded kubevirt to CBL-Mariner 2.0\nAdded libcontainers-common to CBL-Mariner 2.0\nAdded prometheus-adapter to CBL-Mariner 2.0\nAdded gh to CBL-Mariner 2.0\nAdded terraform to CBL-Mariner 2.0\nAdded cf-cli to CBL-Mariner 2.0\nAdded influxdb to CBL-Mariner 2.0\nAdded git-lfs to CBL-Mariner 2.0\nAdded node-problem-detector to CBL-Mariner 2.0\nAdded sriov-network-device-plugin to CBL-Mariner 2.0\nAdded kured to CBL-Mariner 2.0\nAdded cni to Azure Linux 3.0\nAdded multus to Azure Linux 3.0\nAdded keda to Azure Linux 3.0\nAdded kubevirt to Azure Linux 3.0\nAdded sriov-network-device-plugin to Azure Linux 3.0\nAdded node-problem-detector to Azure Linux 3.0"
},
{
"date": "2025-01-15T00:00:00.000Z",
"legacy_version": "13.8",
"number": "129",
"summary": "Added application-gateway-kubernetes-ingress to CBL-Mariner 2.0\nAdded containerized-data-importer to CBL-Mariner 2.0\nAdded keda to CBL-Mariner 2.0\nAdded kubevirt to CBL-Mariner 2.0\nAdded libcontainers-common to CBL-Mariner 2.0\nAdded prometheus-adapter to CBL-Mariner 2.0\nAdded gh to CBL-Mariner 2.0\nAdded terraform to CBL-Mariner 2.0\nAdded cf-cli to CBL-Mariner 2.0\nAdded influxdb to CBL-Mariner 2.0\nAdded git-lfs to CBL-Mariner 2.0\nAdded node-problem-detector to CBL-Mariner 2.0\nAdded sriov-network-device-plugin to CBL-Mariner 2.0\nAdded kured to CBL-Mariner 2.0\nAdded cni to Azure Linux 3.0\nAdded multus to Azure Linux 3.0\nAdded keda to Azure Linux 3.0\nAdded kubevirt to Azure Linux 3.0\nAdded sriov-network-device-plugin to Azure Linux 3.0\nAdded node-problem-detector to Azure Linux 3.0"
},
{
"date": "2025-01-16T00:00:00.000Z",
"legacy_version": "13.9",
"number": "130",
"summary": "Added application-gateway-kubernetes-ingress to CBL-Mariner 2.0\nAdded containerized-data-importer to CBL-Mariner 2.0\nAdded keda to CBL-Mariner 2.0\nAdded kubevirt to CBL-Mariner 2.0\nAdded libcontainers-common to CBL-Mariner 2.0\nAdded prometheus-adapter to CBL-Mariner 2.0\nAdded gh to CBL-Mariner 2.0\nAdded terraform to CBL-Mariner 2.0\nAdded cf-cli to CBL-Mariner 2.0\nAdded influxdb to CBL-Mariner 2.0\nAdded git-lfs to CBL-Mariner 2.0\nAdded node-problem-detector to CBL-Mariner 2.0\nAdded sriov-network-device-plugin to CBL-Mariner 2.0\nAdded kured to CBL-Mariner 2.0\nAdded cni to Azure Linux 3.0\nAdded multus to Azure Linux 3.0\nAdded keda to Azure Linux 3.0\nAdded kubevirt to Azure Linux 3.0\nAdded sriov-network-device-plugin to Azure Linux 3.0\nAdded node-problem-detector to Azure Linux 3.0"
},
{
"date": "2025-01-17T00:00:00.000Z",
"legacy_version": "14",
"number": "131",
"summary": "Added application-gateway-kubernetes-ingress to CBL-Mariner 2.0\nAdded containerized-data-importer to CBL-Mariner 2.0\nAdded keda to CBL-Mariner 2.0\nAdded kubevirt to CBL-Mariner 2.0\nAdded libcontainers-common to CBL-Mariner 2.0\nAdded prometheus-adapter to CBL-Mariner 2.0\nAdded gh to CBL-Mariner 2.0\nAdded terraform to CBL-Mariner 2.0\nAdded cf-cli to CBL-Mariner 2.0\nAdded influxdb to CBL-Mariner 2.0\nAdded git-lfs to CBL-Mariner 2.0\nAdded node-problem-detector to CBL-Mariner 2.0\nAdded sriov-network-device-plugin to CBL-Mariner 2.0\nAdded kured to CBL-Mariner 2.0\nAdded cni to Azure Linux 3.0\nAdded multus to Azure Linux 3.0\nAdded keda to Azure Linux 3.0\nAdded kubevirt to Azure Linux 3.0\nAdded sriov-network-device-plugin to Azure Linux 3.0\nAdded node-problem-detector to Azure Linux 3.0"
},
{
"date": "2025-01-18T00:00:00.000Z",
"legacy_version": "14.1",
"number": "132",
"summary": "Added application-gateway-kubernetes-ingress to CBL-Mariner 2.0\nAdded containerized-data-importer to CBL-Mariner 2.0\nAdded keda to CBL-Mariner 2.0\nAdded kubevirt to CBL-Mariner 2.0\nAdded libcontainers-common to CBL-Mariner 2.0\nAdded prometheus-adapter to CBL-Mariner 2.0\nAdded gh to CBL-Mariner 2.0\nAdded terraform to CBL-Mariner 2.0\nAdded cf-cli to CBL-Mariner 2.0\nAdded influxdb to CBL-Mariner 2.0\nAdded git-lfs to CBL-Mariner 2.0\nAdded node-problem-detector to CBL-Mariner 2.0\nAdded sriov-network-device-plugin to CBL-Mariner 2.0\nAdded kured to CBL-Mariner 2.0\nAdded cni to Azure Linux 3.0\nAdded multus to Azure Linux 3.0\nAdded keda to Azure Linux 3.0\nAdded kubevirt to Azure Linux 3.0\nAdded sriov-network-device-plugin to Azure Linux 3.0\nAdded node-problem-detector to Azure Linux 3.0"
},
{
"date": "2025-01-19T00:00:00.000Z",
"legacy_version": "14.2",
"number": "133",
"summary": "Added application-gateway-kubernetes-ingress to CBL-Mariner 2.0\nAdded containerized-data-importer to CBL-Mariner 2.0\nAdded keda to CBL-Mariner 2.0\nAdded kubevirt to CBL-Mariner 2.0\nAdded libcontainers-common to CBL-Mariner 2.0\nAdded prometheus-adapter to CBL-Mariner 2.0\nAdded gh to CBL-Mariner 2.0\nAdded terraform to CBL-Mariner 2.0\nAdded cf-cli to CBL-Mariner 2.0\nAdded influxdb to CBL-Mariner 2.0\nAdded git-lfs to CBL-Mariner 2.0\nAdded node-problem-detector to CBL-Mariner 2.0\nAdded sriov-network-device-plugin to CBL-Mariner 2.0\nAdded kured to CBL-Mariner 2.0\nAdded cni to Azure Linux 3.0\nAdded multus to Azure Linux 3.0\nAdded keda to Azure Linux 3.0\nAdded kubevirt to Azure Linux 3.0\nAdded sriov-network-device-plugin to Azure Linux 3.0\nAdded node-problem-detector to Azure Linux 3.0"
},
{
"date": "2025-01-20T00:00:00.000Z",
"legacy_version": "14.3",
"number": "134",
"summary": "Added application-gateway-kubernetes-ingress to CBL-Mariner 2.0\nAdded containerized-data-importer to CBL-Mariner 2.0\nAdded keda to CBL-Mariner 2.0\nAdded kubevirt to CBL-Mariner 2.0\nAdded libcontainers-common to CBL-Mariner 2.0\nAdded prometheus-adapter to CBL-Mariner 2.0\nAdded gh to CBL-Mariner 2.0\nAdded terraform to CBL-Mariner 2.0\nAdded cf-cli to CBL-Mariner 2.0\nAdded influxdb to CBL-Mariner 2.0\nAdded git-lfs to CBL-Mariner 2.0\nAdded node-problem-detector to CBL-Mariner 2.0\nAdded sriov-network-device-plugin to CBL-Mariner 2.0\nAdded kured to CBL-Mariner 2.0\nAdded cni to Azure Linux 3.0\nAdded multus to Azure Linux 3.0\nAdded keda to Azure Linux 3.0\nAdded kubevirt to Azure Linux 3.0\nAdded sriov-network-device-plugin to Azure Linux 3.0\nAdded node-problem-detector to Azure Linux 3.0"
},
{
"date": "2025-01-21T00:00:00.000Z",
"legacy_version": "14.4",
"number": "135",
"summary": "Added application-gateway-kubernetes-ingress to CBL-Mariner 2.0\nAdded containerized-data-importer to CBL-Mariner 2.0\nAdded keda to CBL-Mariner 2.0\nAdded kubevirt to CBL-Mariner 2.0\nAdded libcontainers-common to CBL-Mariner 2.0\nAdded prometheus-adapter to CBL-Mariner 2.0\nAdded gh to CBL-Mariner 2.0\nAdded terraform to CBL-Mariner 2.0\nAdded cf-cli to CBL-Mariner 2.0\nAdded influxdb to CBL-Mariner 2.0\nAdded git-lfs to CBL-Mariner 2.0\nAdded node-problem-detector to CBL-Mariner 2.0\nAdded sriov-network-device-plugin to CBL-Mariner 2.0\nAdded kured to CBL-Mariner 2.0\nAdded cni to Azure Linux 3.0\nAdded multus to Azure Linux 3.0\nAdded keda to Azure Linux 3.0\nAdded kubevirt to Azure Linux 3.0\nAdded sriov-network-device-plugin to Azure Linux 3.0\nAdded node-problem-detector to Azure Linux 3.0"
},
{
"date": "2025-01-22T00:00:00.000Z",
"legacy_version": "14.5",
"number": "136",
"summary": "Added application-gateway-kubernetes-ingress to CBL-Mariner 2.0\nAdded containerized-data-importer to CBL-Mariner 2.0\nAdded keda to CBL-Mariner 2.0\nAdded kubevirt to CBL-Mariner 2.0\nAdded libcontainers-common to CBL-Mariner 2.0\nAdded prometheus-adapter to CBL-Mariner 2.0\nAdded gh to CBL-Mariner 2.0\nAdded terraform to CBL-Mariner 2.0\nAdded cf-cli to CBL-Mariner 2.0\nAdded influxdb to CBL-Mariner 2.0\nAdded git-lfs to CBL-Mariner 2.0\nAdded node-problem-detector to CBL-Mariner 2.0\nAdded sriov-network-device-plugin to CBL-Mariner 2.0\nAdded kured to CBL-Mariner 2.0\nAdded cni to Azure Linux 3.0\nAdded multus to Azure Linux 3.0\nAdded keda to Azure Linux 3.0\nAdded kubevirt to Azure Linux 3.0\nAdded sriov-network-device-plugin to Azure Linux 3.0\nAdded node-problem-detector to Azure Linux 3.0"
},
{
"date": "2025-01-23T00:00:00.000Z",
"legacy_version": "14.6",
"number": "137",
"summary": "Added application-gateway-kubernetes-ingress to CBL-Mariner 2.0\nAdded containerized-data-importer to CBL-Mariner 2.0\nAdded keda to CBL-Mariner 2.0\nAdded kubevirt to CBL-Mariner 2.0\nAdded libcontainers-common to CBL-Mariner 2.0\nAdded prometheus-adapter to CBL-Mariner 2.0\nAdded gh to CBL-Mariner 2.0\nAdded terraform to CBL-Mariner 2.0\nAdded cf-cli to CBL-Mariner 2.0\nAdded influxdb to CBL-Mariner 2.0\nAdded git-lfs to CBL-Mariner 2.0\nAdded node-problem-detector to CBL-Mariner 2.0\nAdded sriov-network-device-plugin to CBL-Mariner 2.0\nAdded kured to CBL-Mariner 2.0\nAdded cni to Azure Linux 3.0\nAdded multus to Azure Linux 3.0\nAdded keda to Azure Linux 3.0\nAdded kubevirt to Azure Linux 3.0\nAdded sriov-network-device-plugin to Azure Linux 3.0\nAdded node-problem-detector to Azure Linux 3.0"
},
{
"date": "2025-01-24T00:00:00.000Z",
"legacy_version": "14.7",
"number": "138",
"summary": "Added application-gateway-kubernetes-ingress to CBL-Mariner 2.0\nAdded containerized-data-importer to CBL-Mariner 2.0\nAdded keda to CBL-Mariner 2.0\nAdded kubevirt to CBL-Mariner 2.0\nAdded libcontainers-common to CBL-Mariner 2.0\nAdded prometheus-adapter to CBL-Mariner 2.0\nAdded gh to CBL-Mariner 2.0\nAdded terraform to CBL-Mariner 2.0\nAdded cf-cli to CBL-Mariner 2.0\nAdded influxdb to CBL-Mariner 2.0\nAdded git-lfs to CBL-Mariner 2.0\nAdded node-problem-detector to CBL-Mariner 2.0\nAdded sriov-network-device-plugin to CBL-Mariner 2.0\nAdded kured to CBL-Mariner 2.0\nAdded cni to Azure Linux 3.0\nAdded multus to Azure Linux 3.0\nAdded keda to Azure Linux 3.0\nAdded kubevirt to Azure Linux 3.0\nAdded sriov-network-device-plugin to Azure Linux 3.0\nAdded node-problem-detector to Azure Linux 3.0"
},
{
"date": "2025-01-25T00:00:00.000Z",
"legacy_version": "14.8",
"number": "139",
"summary": "Added application-gateway-kubernetes-ingress to CBL-Mariner 2.0\nAdded containerized-data-importer to CBL-Mariner 2.0\nAdded keda to CBL-Mariner 2.0\nAdded kubevirt to CBL-Mariner 2.0\nAdded libcontainers-common to CBL-Mariner 2.0\nAdded prometheus-adapter to CBL-Mariner 2.0\nAdded gh to CBL-Mariner 2.0\nAdded terraform to CBL-Mariner 2.0\nAdded cf-cli to CBL-Mariner 2.0\nAdded influxdb to CBL-Mariner 2.0\nAdded git-lfs to CBL-Mariner 2.0\nAdded node-problem-detector to CBL-Mariner 2.0\nAdded sriov-network-device-plugin to CBL-Mariner 2.0\nAdded kured to CBL-Mariner 2.0\nAdded cni to Azure Linux 3.0\nAdded multus to Azure Linux 3.0\nAdded keda to Azure Linux 3.0\nAdded kubevirt to Azure Linux 3.0\nAdded sriov-network-device-plugin to Azure Linux 3.0\nAdded node-problem-detector to Azure Linux 3.0"
},
{
"date": "2025-01-27T00:00:00.000Z",
"legacy_version": "14.9",
"number": "140",
"summary": "Added application-gateway-kubernetes-ingress to CBL-Mariner 2.0\nAdded containerized-data-importer to CBL-Mariner 2.0\nAdded keda to CBL-Mariner 2.0\nAdded kubevirt to CBL-Mariner 2.0\nAdded libcontainers-common to CBL-Mariner 2.0\nAdded prometheus-adapter to CBL-Mariner 2.0\nAdded gh to CBL-Mariner 2.0\nAdded terraform to CBL-Mariner 2.0\nAdded cf-cli to CBL-Mariner 2.0\nAdded influxdb to CBL-Mariner 2.0\nAdded git-lfs to CBL-Mariner 2.0\nAdded node-problem-detector to CBL-Mariner 2.0\nAdded sriov-network-device-plugin to CBL-Mariner 2.0\nAdded kured to CBL-Mariner 2.0\nAdded cni to Azure Linux 3.0\nAdded multus to Azure Linux 3.0\nAdded keda to Azure Linux 3.0\nAdded kubevirt to Azure Linux 3.0\nAdded sriov-network-device-plugin to Azure Linux 3.0\nAdded node-problem-detector to Azure Linux 3.0"
},
{
"date": "2025-01-28T00:00:00.000Z",
"legacy_version": "15",
"number": "141",
"summary": "Added application-gateway-kubernetes-ingress to CBL-Mariner 2.0\nAdded containerized-data-importer to CBL-Mariner 2.0\nAdded keda to CBL-Mariner 2.0\nAdded kubevirt to CBL-Mariner 2.0\nAdded libcontainers-common to CBL-Mariner 2.0\nAdded prometheus-adapter to CBL-Mariner 2.0\nAdded gh to CBL-Mariner 2.0\nAdded terraform to CBL-Mariner 2.0\nAdded cf-cli to CBL-Mariner 2.0\nAdded influxdb to CBL-Mariner 2.0\nAdded git-lfs to CBL-Mariner 2.0\nAdded node-problem-detector to CBL-Mariner 2.0\nAdded sriov-network-device-plugin to CBL-Mariner 2.0\nAdded kured to CBL-Mariner 2.0\nAdded cni to Azure Linux 3.0\nAdded multus to Azure Linux 3.0\nAdded keda to Azure Linux 3.0\nAdded kubevirt to Azure Linux 3.0\nAdded sriov-network-device-plugin to Azure Linux 3.0\nAdded node-problem-detector to Azure Linux 3.0"
},
{
"date": "2025-01-29T00:00:00.000Z",
"legacy_version": "15.1",
"number": "142",
"summary": "Added application-gateway-kubernetes-ingress to CBL-Mariner 2.0\nAdded containerized-data-importer to CBL-Mariner 2.0\nAdded keda to CBL-Mariner 2.0\nAdded kubevirt to CBL-Mariner 2.0\nAdded libcontainers-common to CBL-Mariner 2.0\nAdded prometheus-adapter to CBL-Mariner 2.0\nAdded gh to CBL-Mariner 2.0\nAdded terraform to CBL-Mariner 2.0\nAdded cf-cli to CBL-Mariner 2.0\nAdded influxdb to CBL-Mariner 2.0\nAdded git-lfs to CBL-Mariner 2.0\nAdded node-problem-detector to CBL-Mariner 2.0\nAdded sriov-network-device-plugin to CBL-Mariner 2.0\nAdded kured to CBL-Mariner 2.0\nAdded cni to Azure Linux 3.0\nAdded multus to Azure Linux 3.0\nAdded keda to Azure Linux 3.0\nAdded kubevirt to Azure Linux 3.0\nAdded sriov-network-device-plugin to Azure Linux 3.0\nAdded node-problem-detector to Azure Linux 3.0"
},
{
"date": "2025-01-30T00:00:00.000Z",
"legacy_version": "15.2",
"number": "143",
"summary": "Added application-gateway-kubernetes-ingress to CBL-Mariner 2.0\nAdded containerized-data-importer to CBL-Mariner 2.0\nAdded keda to CBL-Mariner 2.0\nAdded kubevirt to CBL-Mariner 2.0\nAdded libcontainers-common to CBL-Mariner 2.0\nAdded prometheus-adapter to CBL-Mariner 2.0\nAdded gh to CBL-Mariner 2.0\nAdded terraform to CBL-Mariner 2.0\nAdded cf-cli to CBL-Mariner 2.0\nAdded influxdb to CBL-Mariner 2.0\nAdded git-lfs to CBL-Mariner 2.0\nAdded node-problem-detector to CBL-Mariner 2.0\nAdded sriov-network-device-plugin to CBL-Mariner 2.0\nAdded kured to CBL-Mariner 2.0\nAdded cni to Azure Linux 3.0\nAdded multus to Azure Linux 3.0\nAdded keda to Azure Linux 3.0\nAdded kubevirt to Azure Linux 3.0\nAdded sriov-network-device-plugin to Azure Linux 3.0\nAdded node-problem-detector to Azure Linux 3.0"
},
{
"date": "2025-02-01T00:00:00.000Z",
"legacy_version": "15.3",
"number": "144",
"summary": "Added application-gateway-kubernetes-ingress to CBL-Mariner 2.0\nAdded containerized-data-importer to CBL-Mariner 2.0\nAdded keda to CBL-Mariner 2.0\nAdded kubevirt to CBL-Mariner 2.0\nAdded libcontainers-common to CBL-Mariner 2.0\nAdded prometheus-adapter to CBL-Mariner 2.0\nAdded gh to CBL-Mariner 2.0\nAdded terraform to CBL-Mariner 2.0\nAdded cf-cli to CBL-Mariner 2.0\nAdded influxdb to CBL-Mariner 2.0\nAdded git-lfs to CBL-Mariner 2.0\nAdded node-problem-detector to CBL-Mariner 2.0\nAdded sriov-network-device-plugin to CBL-Mariner 2.0\nAdded kured to CBL-Mariner 2.0\nAdded cni to Azure Linux 3.0\nAdded multus to Azure Linux 3.0\nAdded keda to Azure Linux 3.0\nAdded kubevirt to Azure Linux 3.0\nAdded sriov-network-device-plugin to Azure Linux 3.0\nAdded node-problem-detector to Azure Linux 3.0"
},
{
"date": "2025-02-02T00:00:00.000Z",
"legacy_version": "15.4",
"number": "145",
"summary": "Added application-gateway-kubernetes-ingress to CBL-Mariner 2.0\nAdded containerized-data-importer to CBL-Mariner 2.0\nAdded keda to CBL-Mariner 2.0\nAdded kubevirt to CBL-Mariner 2.0\nAdded libcontainers-common to CBL-Mariner 2.0\nAdded prometheus-adapter to CBL-Mariner 2.0\nAdded gh to CBL-Mariner 2.0\nAdded terraform to CBL-Mariner 2.0\nAdded cf-cli to CBL-Mariner 2.0\nAdded influxdb to CBL-Mariner 2.0\nAdded git-lfs to CBL-Mariner 2.0\nAdded node-problem-detector to CBL-Mariner 2.0\nAdded sriov-network-device-plugin to CBL-Mariner 2.0\nAdded kured to CBL-Mariner 2.0\nAdded cni to Azure Linux 3.0\nAdded multus to Azure Linux 3.0\nAdded keda to Azure Linux 3.0\nAdded kubevirt to Azure Linux 3.0\nAdded sriov-network-device-plugin to Azure Linux 3.0\nAdded node-problem-detector to Azure Linux 3.0"
},
{
"date": "2025-02-03T00:00:00.000Z",
"legacy_version": "15.5",
"number": "146",
"summary": "Added application-gateway-kubernetes-ingress to CBL-Mariner 2.0\nAdded containerized-data-importer to CBL-Mariner 2.0\nAdded keda to CBL-Mariner 2.0\nAdded kubevirt to CBL-Mariner 2.0\nAdded libcontainers-common to CBL-Mariner 2.0\nAdded prometheus-adapter to CBL-Mariner 2.0\nAdded gh to CBL-Mariner 2.0\nAdded terraform to CBL-Mariner 2.0\nAdded cf-cli to CBL-Mariner 2.0\nAdded influxdb to CBL-Mariner 2.0\nAdded git-lfs to CBL-Mariner 2.0\nAdded node-problem-detector to CBL-Mariner 2.0\nAdded sriov-network-device-plugin to CBL-Mariner 2.0\nAdded kured to CBL-Mariner 2.0\nAdded cni to Azure Linux 3.0\nAdded multus to Azure Linux 3.0\nAdded keda to Azure Linux 3.0\nAdded kubevirt to Azure Linux 3.0\nAdded sriov-network-device-plugin to Azure Linux 3.0\nAdded node-problem-detector to Azure Linux 3.0"
},
{
"date": "2025-02-04T00:00:00.000Z",
"legacy_version": "15.6",
"number": "147",
"summary": "Added application-gateway-kubernetes-ingress to CBL-Mariner 2.0\nAdded containerized-data-importer to CBL-Mariner 2.0\nAdded keda to CBL-Mariner 2.0\nAdded kubevirt to CBL-Mariner 2.0\nAdded libcontainers-common to CBL-Mariner 2.0\nAdded prometheus-adapter to CBL-Mariner 2.0\nAdded gh to CBL-Mariner 2.0\nAdded terraform to CBL-Mariner 2.0\nAdded cf-cli to CBL-Mariner 2.0\nAdded influxdb to CBL-Mariner 2.0\nAdded git-lfs to CBL-Mariner 2.0\nAdded node-problem-detector to CBL-Mariner 2.0\nAdded sriov-network-device-plugin to CBL-Mariner 2.0\nAdded kured to CBL-Mariner 2.0\nAdded cni to Azure Linux 3.0\nAdded multus to Azure Linux 3.0\nAdded keda to Azure Linux 3.0\nAdded kubevirt to Azure Linux 3.0\nAdded sriov-network-device-plugin to Azure Linux 3.0\nAdded node-problem-detector to Azure Linux 3.0"
},
{
"date": "2025-02-05T00:00:00.000Z",
"legacy_version": "15.7",
"number": "148",
"summary": "Added application-gateway-kubernetes-ingress to CBL-Mariner 2.0\nAdded containerized-data-importer to CBL-Mariner 2.0\nAdded keda to CBL-Mariner 2.0\nAdded kubevirt to CBL-Mariner 2.0\nAdded libcontainers-common to CBL-Mariner 2.0\nAdded prometheus-adapter to CBL-Mariner 2.0\nAdded gh to CBL-Mariner 2.0\nAdded terraform to CBL-Mariner 2.0\nAdded cf-cli to CBL-Mariner 2.0\nAdded influxdb to CBL-Mariner 2.0\nAdded git-lfs to CBL-Mariner 2.0\nAdded node-problem-detector to CBL-Mariner 2.0\nAdded sriov-network-device-plugin to CBL-Mariner 2.0\nAdded kured to CBL-Mariner 2.0\nAdded cni to Azure Linux 3.0\nAdded multus to Azure Linux 3.0\nAdded keda to Azure Linux 3.0\nAdded kubevirt to Azure Linux 3.0\nAdded sriov-network-device-plugin to Azure Linux 3.0\nAdded node-problem-detector to Azure Linux 3.0"
},
{
"date": "2025-02-07T00:00:00.000Z",
"legacy_version": "15.8",
"number": "149",
"summary": "Added application-gateway-kubernetes-ingress to CBL-Mariner 2.0\nAdded containerized-data-importer to CBL-Mariner 2.0\nAdded keda to CBL-Mariner 2.0\nAdded kubevirt to CBL-Mariner 2.0\nAdded libcontainers-common to CBL-Mariner 2.0\nAdded prometheus-adapter to CBL-Mariner 2.0\nAdded gh to CBL-Mariner 2.0\nAdded terraform to CBL-Mariner 2.0\nAdded cf-cli to CBL-Mariner 2.0\nAdded influxdb to CBL-Mariner 2.0\nAdded git-lfs to CBL-Mariner 2.0\nAdded node-problem-detector to CBL-Mariner 2.0\nAdded sriov-network-device-plugin to CBL-Mariner 2.0\nAdded kured to CBL-Mariner 2.0\nAdded cni to Azure Linux 3.0\nAdded multus to Azure Linux 3.0\nAdded keda to Azure Linux 3.0\nAdded kubevirt to Azure Linux 3.0\nAdded sriov-network-device-plugin to Azure Linux 3.0\nAdded node-problem-detector to Azure Linux 3.0"
},
{
"date": "2025-02-08T00:00:00.000Z",
"legacy_version": "15.9",
"number": "150",
"summary": "Added application-gateway-kubernetes-ingress to CBL-Mariner 2.0\nAdded containerized-data-importer to CBL-Mariner 2.0\nAdded keda to CBL-Mariner 2.0\nAdded kubevirt to CBL-Mariner 2.0\nAdded libcontainers-common to CBL-Mariner 2.0\nAdded prometheus-adapter to CBL-Mariner 2.0\nAdded gh to CBL-Mariner 2.0\nAdded terraform to CBL-Mariner 2.0\nAdded cf-cli to CBL-Mariner 2.0\nAdded influxdb to CBL-Mariner 2.0\nAdded git-lfs to CBL-Mariner 2.0\nAdded node-problem-detector to CBL-Mariner 2.0\nAdded sriov-network-device-plugin to CBL-Mariner 2.0\nAdded kured to CBL-Mariner 2.0\nAdded cni to Azure Linux 3.0\nAdded multus to Azure Linux 3.0\nAdded keda to Azure Linux 3.0\nAdded kubevirt to Azure Linux 3.0\nAdded sriov-network-device-plugin to Azure Linux 3.0\nAdded node-problem-detector to Azure Linux 3.0"
},
{
"date": "2025-02-09T00:00:00.000Z",
"legacy_version": "16",
"number": "151",
"summary": "Added application-gateway-kubernetes-ingress to CBL-Mariner 2.0\nAdded containerized-data-importer to CBL-Mariner 2.0\nAdded keda to CBL-Mariner 2.0\nAdded kubevirt to CBL-Mariner 2.0\nAdded libcontainers-common to CBL-Mariner 2.0\nAdded prometheus-adapter to CBL-Mariner 2.0\nAdded gh to CBL-Mariner 2.0\nAdded terraform to CBL-Mariner 2.0\nAdded cf-cli to CBL-Mariner 2.0\nAdded influxdb to CBL-Mariner 2.0\nAdded git-lfs to CBL-Mariner 2.0\nAdded node-problem-detector to CBL-Mariner 2.0\nAdded sriov-network-device-plugin to CBL-Mariner 2.0\nAdded kured to CBL-Mariner 2.0\nAdded cni to Azure Linux 3.0\nAdded multus to Azure Linux 3.0\nAdded keda to Azure Linux 3.0\nAdded kubevirt to Azure Linux 3.0\nAdded sriov-network-device-plugin to Azure Linux 3.0\nAdded node-problem-detector to Azure Linux 3.0"
},
{
"date": "2025-02-10T00:00:00.000Z",
"legacy_version": "16.1",
"number": "152",
"summary": "Added application-gateway-kubernetes-ingress to CBL-Mariner 2.0\nAdded containerized-data-importer to CBL-Mariner 2.0\nAdded keda to CBL-Mariner 2.0\nAdded kubevirt to CBL-Mariner 2.0\nAdded libcontainers-common to CBL-Mariner 2.0\nAdded prometheus-adapter to CBL-Mariner 2.0\nAdded gh to CBL-Mariner 2.0\nAdded terraform to CBL-Mariner 2.0\nAdded cf-cli to CBL-Mariner 2.0\nAdded influxdb to CBL-Mariner 2.0\nAdded git-lfs to CBL-Mariner 2.0\nAdded node-problem-detector to CBL-Mariner 2.0\nAdded sriov-network-device-plugin to CBL-Mariner 2.0\nAdded kured to CBL-Mariner 2.0\nAdded cni to Azure Linux 3.0\nAdded multus to Azure Linux 3.0\nAdded keda to Azure Linux 3.0\nAdded kubevirt to Azure Linux 3.0\nAdded sriov-network-device-plugin to Azure Linux 3.0\nAdded node-problem-detector to Azure Linux 3.0"
},
{
"date": "2025-02-11T00:00:00.000Z",
"legacy_version": "16.2",
"number": "153",
"summary": "Added application-gateway-kubernetes-ingress to CBL-Mariner 2.0\nAdded containerized-data-importer to CBL-Mariner 2.0\nAdded keda to CBL-Mariner 2.0\nAdded kubevirt to CBL-Mariner 2.0\nAdded libcontainers-common to CBL-Mariner 2.0\nAdded prometheus-adapter to CBL-Mariner 2.0\nAdded gh to CBL-Mariner 2.0\nAdded terraform to CBL-Mariner 2.0\nAdded cf-cli to CBL-Mariner 2.0\nAdded influxdb to CBL-Mariner 2.0\nAdded git-lfs to CBL-Mariner 2.0\nAdded node-problem-detector to CBL-Mariner 2.0\nAdded sriov-network-device-plugin to CBL-Mariner 2.0\nAdded kured to CBL-Mariner 2.0\nAdded cni to Azure Linux 3.0\nAdded multus to Azure Linux 3.0\nAdded keda to Azure Linux 3.0\nAdded kubevirt to Azure Linux 3.0\nAdded sriov-network-device-plugin to Azure Linux 3.0\nAdded node-problem-detector to Azure Linux 3.0"
},
{
"date": "2025-02-12T00:00:00.000Z",
"legacy_version": "16.3",
"number": "154",
"summary": "Added application-gateway-kubernetes-ingress to CBL-Mariner 2.0\nAdded containerized-data-importer to CBL-Mariner 2.0\nAdded keda to CBL-Mariner 2.0\nAdded kubevirt to CBL-Mariner 2.0\nAdded libcontainers-common to CBL-Mariner 2.0\nAdded prometheus-adapter to CBL-Mariner 2.0\nAdded gh to CBL-Mariner 2.0\nAdded terraform to CBL-Mariner 2.0\nAdded cf-cli to CBL-Mariner 2.0\nAdded influxdb to CBL-Mariner 2.0\nAdded git-lfs to CBL-Mariner 2.0\nAdded node-problem-detector to CBL-Mariner 2.0\nAdded sriov-network-device-plugin to CBL-Mariner 2.0\nAdded kured to CBL-Mariner 2.0\nAdded cni to Azure Linux 3.0\nAdded multus to Azure Linux 3.0\nAdded keda to Azure Linux 3.0\nAdded kubevirt to Azure Linux 3.0\nAdded sriov-network-device-plugin to Azure Linux 3.0\nAdded node-problem-detector to Azure Linux 3.0"
},
{
"date": "2025-02-13T00:00:00.000Z",
"legacy_version": "16.4",
"number": "155",
"summary": "Added application-gateway-kubernetes-ingress to CBL-Mariner 2.0\nAdded containerized-data-importer to CBL-Mariner 2.0\nAdded keda to CBL-Mariner 2.0\nAdded kubevirt to CBL-Mariner 2.0\nAdded libcontainers-common to CBL-Mariner 2.0\nAdded prometheus-adapter to CBL-Mariner 2.0\nAdded gh to CBL-Mariner 2.0\nAdded terraform to CBL-Mariner 2.0\nAdded cf-cli to CBL-Mariner 2.0\nAdded influxdb to CBL-Mariner 2.0\nAdded git-lfs to CBL-Mariner 2.0\nAdded node-problem-detector to CBL-Mariner 2.0\nAdded sriov-network-device-plugin to CBL-Mariner 2.0\nAdded kured to CBL-Mariner 2.0\nAdded cni to Azure Linux 3.0\nAdded multus to Azure Linux 3.0\nAdded keda to Azure Linux 3.0\nAdded kubevirt to Azure Linux 3.0\nAdded sriov-network-device-plugin to Azure Linux 3.0\nAdded node-problem-detector to Azure Linux 3.0"
},
{
"date": "2025-02-14T00:00:00.000Z",
"legacy_version": "16.5",
"number": "156",
"summary": "Added application-gateway-kubernetes-ingress to CBL-Mariner 2.0\nAdded containerized-data-importer to CBL-Mariner 2.0\nAdded keda to CBL-Mariner 2.0\nAdded kubevirt to CBL-Mariner 2.0\nAdded libcontainers-common to CBL-Mariner 2.0\nAdded prometheus-adapter to CBL-Mariner 2.0\nAdded gh to CBL-Mariner 2.0\nAdded terraform to CBL-Mariner 2.0\nAdded cf-cli to CBL-Mariner 2.0\nAdded influxdb to CBL-Mariner 2.0\nAdded git-lfs to CBL-Mariner 2.0\nAdded node-problem-detector to CBL-Mariner 2.0\nAdded sriov-network-device-plugin to CBL-Mariner 2.0\nAdded kured to CBL-Mariner 2.0\nAdded cni to Azure Linux 3.0\nAdded multus to Azure Linux 3.0\nAdded keda to Azure Linux 3.0\nAdded kubevirt to Azure Linux 3.0\nAdded sriov-network-device-plugin to Azure Linux 3.0\nAdded node-problem-detector to Azure Linux 3.0"
},
{
"date": "2025-02-15T00:00:00.000Z",
"legacy_version": "16.6",
"number": "157",
"summary": "Added application-gateway-kubernetes-ingress to CBL-Mariner 2.0\nAdded containerized-data-importer to CBL-Mariner 2.0\nAdded keda to CBL-Mariner 2.0\nAdded kubevirt to CBL-Mariner 2.0\nAdded libcontainers-common to CBL-Mariner 2.0\nAdded prometheus-adapter to CBL-Mariner 2.0\nAdded gh to CBL-Mariner 2.0\nAdded terraform to CBL-Mariner 2.0\nAdded cf-cli to CBL-Mariner 2.0\nAdded influxdb to CBL-Mariner 2.0\nAdded git-lfs to CBL-Mariner 2.0\nAdded node-problem-detector to CBL-Mariner 2.0\nAdded sriov-network-device-plugin to CBL-Mariner 2.0\nAdded kured to CBL-Mariner 2.0\nAdded cni to Azure Linux 3.0\nAdded multus to Azure Linux 3.0\nAdded keda to Azure Linux 3.0\nAdded kubevirt to Azure Linux 3.0\nAdded sriov-network-device-plugin to Azure Linux 3.0\nAdded node-problem-detector to Azure Linux 3.0"
},
{
"date": "2025-02-16T00:00:00.000Z",
"legacy_version": "16.7",
"number": "158",
"summary": "Added application-gateway-kubernetes-ingress to CBL-Mariner 2.0\nAdded containerized-data-importer to CBL-Mariner 2.0\nAdded keda to CBL-Mariner 2.0\nAdded kubevirt to CBL-Mariner 2.0\nAdded libcontainers-common to CBL-Mariner 2.0\nAdded prometheus-adapter to CBL-Mariner 2.0\nAdded gh to CBL-Mariner 2.0\nAdded terraform to CBL-Mariner 2.0\nAdded cf-cli to CBL-Mariner 2.0\nAdded influxdb to CBL-Mariner 2.0\nAdded git-lfs to CBL-Mariner 2.0\nAdded node-problem-detector to CBL-Mariner 2.0\nAdded sriov-network-device-plugin to CBL-Mariner 2.0\nAdded kured to CBL-Mariner 2.0\nAdded cni to Azure Linux 3.0\nAdded multus to Azure Linux 3.0\nAdded keda to Azure Linux 3.0\nAdded kubevirt to Azure Linux 3.0\nAdded sriov-network-device-plugin to Azure Linux 3.0\nAdded node-problem-detector to Azure Linux 3.0"
},
{
"date": "2025-02-17T00:00:00.000Z",
"legacy_version": "16.8",
"number": "159",
"summary": "Added application-gateway-kubernetes-ingress to CBL-Mariner 2.0\nAdded containerized-data-importer to CBL-Mariner 2.0\nAdded keda to CBL-Mariner 2.0\nAdded kubevirt to CBL-Mariner 2.0\nAdded libcontainers-common to CBL-Mariner 2.0\nAdded prometheus-adapter to CBL-Mariner 2.0\nAdded gh to CBL-Mariner 2.0\nAdded terraform to CBL-Mariner 2.0\nAdded cf-cli to CBL-Mariner 2.0\nAdded influxdb to CBL-Mariner 2.0\nAdded git-lfs to CBL-Mariner 2.0\nAdded node-problem-detector to CBL-Mariner 2.0\nAdded sriov-network-device-plugin to CBL-Mariner 2.0\nAdded kured to CBL-Mariner 2.0\nAdded cni to Azure Linux 3.0\nAdded multus to Azure Linux 3.0\nAdded keda to Azure Linux 3.0\nAdded kubevirt to Azure Linux 3.0\nAdded sriov-network-device-plugin to Azure Linux 3.0\nAdded node-problem-detector to Azure Linux 3.0"
},
{
"date": "2025-02-18T00:00:00.000Z",
"legacy_version": "16.9",
"number": "160",
"summary": "Added application-gateway-kubernetes-ingress to CBL-Mariner 2.0\nAdded containerized-data-importer to CBL-Mariner 2.0\nAdded keda to CBL-Mariner 2.0\nAdded kubevirt to CBL-Mariner 2.0\nAdded libcontainers-common to CBL-Mariner 2.0\nAdded prometheus-adapter to CBL-Mariner 2.0\nAdded gh to CBL-Mariner 2.0\nAdded terraform to CBL-Mariner 2.0\nAdded cf-cli to CBL-Mariner 2.0\nAdded influxdb to CBL-Mariner 2.0\nAdded git-lfs to CBL-Mariner 2.0\nAdded node-problem-detector to CBL-Mariner 2.0\nAdded sriov-network-device-plugin to CBL-Mariner 2.0\nAdded kured to CBL-Mariner 2.0\nAdded cni to Azure Linux 3.0\nAdded multus to Azure Linux 3.0\nAdded keda to Azure Linux 3.0\nAdded kubevirt to Azure Linux 3.0\nAdded sriov-network-device-plugin to Azure Linux 3.0\nAdded node-problem-detector to Azure Linux 3.0"
},
{
"date": "2025-02-19T00:00:00.000Z",
"legacy_version": "17",
"number": "161",
"summary": "Added application-gateway-kubernetes-ingress to CBL-Mariner 2.0\nAdded containerized-data-importer to CBL-Mariner 2.0\nAdded keda to CBL-Mariner 2.0\nAdded kubevirt to CBL-Mariner 2.0\nAdded libcontainers-common to CBL-Mariner 2.0\nAdded prometheus-adapter to CBL-Mariner 2.0\nAdded gh to CBL-Mariner 2.0\nAdded terraform to CBL-Mariner 2.0\nAdded cf-cli to CBL-Mariner 2.0\nAdded influxdb to CBL-Mariner 2.0\nAdded git-lfs to CBL-Mariner 2.0\nAdded node-problem-detector to CBL-Mariner 2.0\nAdded sriov-network-device-plugin to CBL-Mariner 2.0\nAdded kured to CBL-Mariner 2.0\nAdded cni to Azure Linux 3.0\nAdded multus to Azure Linux 3.0\nAdded keda to Azure Linux 3.0\nAdded kubevirt to Azure Linux 3.0\nAdded sriov-network-device-plugin to Azure Linux 3.0\nAdded node-problem-detector to Azure Linux 3.0"
},
{
"date": "2025-02-20T00:00:00.000Z",
"legacy_version": "17.1",
"number": "162",
"summary": "Added application-gateway-kubernetes-ingress to CBL-Mariner 2.0\nAdded containerized-data-importer to CBL-Mariner 2.0\nAdded keda to CBL-Mariner 2.0\nAdded kubevirt to CBL-Mariner 2.0\nAdded libcontainers-common to CBL-Mariner 2.0\nAdded prometheus-adapter to CBL-Mariner 2.0\nAdded gh to CBL-Mariner 2.0\nAdded terraform to CBL-Mariner 2.0\nAdded cf-cli to CBL-Mariner 2.0\nAdded influxdb to CBL-Mariner 2.0\nAdded git-lfs to CBL-Mariner 2.0\nAdded node-problem-detector to CBL-Mariner 2.0\nAdded sriov-network-device-plugin to CBL-Mariner 2.0\nAdded kured to CBL-Mariner 2.0\nAdded cni to Azure Linux 3.0\nAdded multus to Azure Linux 3.0\nAdded keda to Azure Linux 3.0\nAdded kubevirt to Azure Linux 3.0\nAdded sriov-network-device-plugin to Azure Linux 3.0\nAdded node-problem-detector to Azure Linux 3.0"
},
{
"date": "2025-02-21T00:00:00.000Z",
"legacy_version": "17.2",
"number": "163",
"summary": "Added application-gateway-kubernetes-ingress to CBL-Mariner 2.0\nAdded containerized-data-importer to CBL-Mariner 2.0\nAdded keda to CBL-Mariner 2.0\nAdded kubevirt to CBL-Mariner 2.0\nAdded libcontainers-common to CBL-Mariner 2.0\nAdded prometheus-adapter to CBL-Mariner 2.0\nAdded gh to CBL-Mariner 2.0\nAdded terraform to CBL-Mariner 2.0\nAdded cf-cli to CBL-Mariner 2.0\nAdded influxdb to CBL-Mariner 2.0\nAdded git-lfs to CBL-Mariner 2.0\nAdded node-problem-detector to CBL-Mariner 2.0\nAdded sriov-network-device-plugin to CBL-Mariner 2.0\nAdded kured to CBL-Mariner 2.0\nAdded cni to Azure Linux 3.0\nAdded multus to Azure Linux 3.0\nAdded keda to Azure Linux 3.0\nAdded kubevirt to Azure Linux 3.0\nAdded sriov-network-device-plugin to Azure Linux 3.0\nAdded node-problem-detector to Azure Linux 3.0"
},
{
"date": "2025-02-22T00:00:00.000Z",
"legacy_version": "17.3",
"number": "164",
"summary": "Added application-gateway-kubernetes-ingress to CBL-Mariner 2.0\nAdded containerized-data-importer to CBL-Mariner 2.0\nAdded keda to CBL-Mariner 2.0\nAdded kubevirt to CBL-Mariner 2.0\nAdded libcontainers-common to CBL-Mariner 2.0\nAdded prometheus-adapter to CBL-Mariner 2.0\nAdded gh to CBL-Mariner 2.0\nAdded terraform to CBL-Mariner 2.0\nAdded cf-cli to CBL-Mariner 2.0\nAdded influxdb to CBL-Mariner 2.0\nAdded git-lfs to CBL-Mariner 2.0\nAdded node-problem-detector to CBL-Mariner 2.0\nAdded sriov-network-device-plugin to CBL-Mariner 2.0\nAdded kured to CBL-Mariner 2.0\nAdded cni to Azure Linux 3.0\nAdded multus to Azure Linux 3.0\nAdded keda to Azure Linux 3.0\nAdded kubevirt to Azure Linux 3.0\nAdded sriov-network-device-plugin to Azure Linux 3.0\nAdded node-problem-detector to Azure Linux 3.0"
},
{
"date": "2025-02-23T00:00:00.000Z",
"legacy_version": "17.4",
"number": "165",
"summary": "Added application-gateway-kubernetes-ingress to CBL-Mariner 2.0\nAdded containerized-data-importer to CBL-Mariner 2.0\nAdded keda to CBL-Mariner 2.0\nAdded kubevirt to CBL-Mariner 2.0\nAdded libcontainers-common to CBL-Mariner 2.0\nAdded prometheus-adapter to CBL-Mariner 2.0\nAdded gh to CBL-Mariner 2.0\nAdded terraform to CBL-Mariner 2.0\nAdded cf-cli to CBL-Mariner 2.0\nAdded influxdb to CBL-Mariner 2.0\nAdded git-lfs to CBL-Mariner 2.0\nAdded node-problem-detector to CBL-Mariner 2.0\nAdded sriov-network-device-plugin to CBL-Mariner 2.0\nAdded kured to CBL-Mariner 2.0\nAdded cni to Azure Linux 3.0\nAdded multus to Azure Linux 3.0\nAdded keda to Azure Linux 3.0\nAdded kubevirt to Azure Linux 3.0\nAdded sriov-network-device-plugin to Azure Linux 3.0\nAdded node-problem-detector to Azure Linux 3.0"
},
{
"date": "2025-02-24T00:00:00.000Z",
"legacy_version": "17.5",
"number": "166",
"summary": "Added application-gateway-kubernetes-ingress to CBL-Mariner 2.0\nAdded containerized-data-importer to CBL-Mariner 2.0\nAdded keda to CBL-Mariner 2.0\nAdded kubevirt to CBL-Mariner 2.0\nAdded libcontainers-common to CBL-Mariner 2.0\nAdded prometheus-adapter to CBL-Mariner 2.0\nAdded gh to CBL-Mariner 2.0\nAdded terraform to CBL-Mariner 2.0\nAdded cf-cli to CBL-Mariner 2.0\nAdded influxdb to CBL-Mariner 2.0\nAdded git-lfs to CBL-Mariner 2.0\nAdded node-problem-detector to CBL-Mariner 2.0\nAdded sriov-network-device-plugin to CBL-Mariner 2.0\nAdded kured to CBL-Mariner 2.0\nAdded cni to Azure Linux 3.0\nAdded multus to Azure Linux 3.0\nAdded keda to Azure Linux 3.0\nAdded kubevirt to Azure Linux 3.0\nAdded sriov-network-device-plugin to Azure Linux 3.0\nAdded node-problem-detector to Azure Linux 3.0"
},
{
"date": "2025-02-25T00:00:00.000Z",
"legacy_version": "17.6",
"number": "167",
"summary": "Added application-gateway-kubernetes-ingress to CBL-Mariner 2.0\nAdded containerized-data-importer to CBL-Mariner 2.0\nAdded keda to CBL-Mariner 2.0\nAdded kubevirt to CBL-Mariner 2.0\nAdded libcontainers-common to CBL-Mariner 2.0\nAdded prometheus-adapter to CBL-Mariner 2.0\nAdded gh to CBL-Mariner 2.0\nAdded terraform to CBL-Mariner 2.0\nAdded cf-cli to CBL-Mariner 2.0\nAdded influxdb to CBL-Mariner 2.0\nAdded git-lfs to CBL-Mariner 2.0\nAdded node-problem-detector to CBL-Mariner 2.0\nAdded sriov-network-device-plugin to CBL-Mariner 2.0\nAdded kured to CBL-Mariner 2.0\nAdded cni to Azure Linux 3.0\nAdded multus to Azure Linux 3.0\nAdded keda to Azure Linux 3.0\nAdded kubevirt to Azure Linux 3.0\nAdded sriov-network-device-plugin to Azure Linux 3.0\nAdded node-problem-detector to Azure Linux 3.0"
},
{
"date": "2025-02-26T00:00:00.000Z",
"legacy_version": "17.7",
"number": "168",
"summary": "Added application-gateway-kubernetes-ingress to CBL-Mariner 2.0\nAdded containerized-data-importer to CBL-Mariner 2.0\nAdded keda to CBL-Mariner 2.0\nAdded kubevirt to CBL-Mariner 2.0\nAdded libcontainers-common to CBL-Mariner 2.0\nAdded prometheus-adapter to CBL-Mariner 2.0\nAdded gh to CBL-Mariner 2.0\nAdded terraform to CBL-Mariner 2.0\nAdded cf-cli to CBL-Mariner 2.0\nAdded influxdb to CBL-Mariner 2.0\nAdded git-lfs to CBL-Mariner 2.0\nAdded node-problem-detector to CBL-Mariner 2.0\nAdded sriov-network-device-plugin to CBL-Mariner 2.0\nAdded kured to CBL-Mariner 2.0\nAdded cni to Azure Linux 3.0\nAdded multus to Azure Linux 3.0\nAdded keda to Azure Linux 3.0\nAdded kubevirt to Azure Linux 3.0\nAdded sriov-network-device-plugin to Azure Linux 3.0\nAdded node-problem-detector to Azure Linux 3.0"
},
{
"date": "2025-02-27T00:00:00.000Z",
"legacy_version": "17.8",
"number": "169",
"summary": "Added application-gateway-kubernetes-ingress to CBL-Mariner 2.0\nAdded containerized-data-importer to CBL-Mariner 2.0\nAdded keda to CBL-Mariner 2.0\nAdded kubevirt to CBL-Mariner 2.0\nAdded libcontainers-common to CBL-Mariner 2.0\nAdded prometheus-adapter to CBL-Mariner 2.0\nAdded gh to CBL-Mariner 2.0\nAdded terraform to CBL-Mariner 2.0\nAdded cf-cli to CBL-Mariner 2.0\nAdded influxdb to CBL-Mariner 2.0\nAdded git-lfs to CBL-Mariner 2.0\nAdded node-problem-detector to CBL-Mariner 2.0\nAdded sriov-network-device-plugin to CBL-Mariner 2.0\nAdded kured to CBL-Mariner 2.0\nAdded cni to Azure Linux 3.0\nAdded multus to Azure Linux 3.0\nAdded keda to Azure Linux 3.0\nAdded kubevirt to Azure Linux 3.0\nAdded sriov-network-device-plugin to Azure Linux 3.0\nAdded node-problem-detector to Azure Linux 3.0"
},
{
"date": "2025-02-28T00:00:00.000Z",
"legacy_version": "17.9",
"number": "170",
"summary": "Added application-gateway-kubernetes-ingress to CBL-Mariner 2.0\nAdded containerized-data-importer to CBL-Mariner 2.0\nAdded keda to CBL-Mariner 2.0\nAdded kubevirt to CBL-Mariner 2.0\nAdded libcontainers-common to CBL-Mariner 2.0\nAdded prometheus-adapter to CBL-Mariner 2.0\nAdded gh to CBL-Mariner 2.0\nAdded terraform to CBL-Mariner 2.0\nAdded cf-cli to CBL-Mariner 2.0\nAdded influxdb to CBL-Mariner 2.0\nAdded git-lfs to CBL-Mariner 2.0\nAdded node-problem-detector to CBL-Mariner 2.0\nAdded sriov-network-device-plugin to CBL-Mariner 2.0\nAdded kured to CBL-Mariner 2.0\nAdded cni to Azure Linux 3.0\nAdded multus to Azure Linux 3.0\nAdded keda to Azure Linux 3.0\nAdded kubevirt to Azure Linux 3.0\nAdded sriov-network-device-plugin to Azure Linux 3.0\nAdded node-problem-detector to Azure Linux 3.0"
},
{
"date": "2025-03-01T00:00:00.000Z",
"legacy_version": "18",
"number": "171",
"summary": "Added application-gateway-kubernetes-ingress to CBL-Mariner 2.0\nAdded containerized-data-importer to CBL-Mariner 2.0\nAdded keda to CBL-Mariner 2.0\nAdded kubevirt to CBL-Mariner 2.0\nAdded libcontainers-common to CBL-Mariner 2.0\nAdded prometheus-adapter to CBL-Mariner 2.0\nAdded gh to CBL-Mariner 2.0\nAdded terraform to CBL-Mariner 2.0\nAdded cf-cli to CBL-Mariner 2.0\nAdded influxdb to CBL-Mariner 2.0\nAdded git-lfs to CBL-Mariner 2.0\nAdded node-problem-detector to CBL-Mariner 2.0\nAdded sriov-network-device-plugin to CBL-Mariner 2.0\nAdded kured to CBL-Mariner 2.0\nAdded cni to Azure Linux 3.0\nAdded multus to Azure Linux 3.0\nAdded keda to Azure Linux 3.0\nAdded kubevirt to Azure Linux 3.0\nAdded sriov-network-device-plugin to Azure Linux 3.0\nAdded node-problem-detector to Azure Linux 3.0"
},
{
"date": "2025-03-02T00:00:00.000Z",
"legacy_version": "18.1",
"number": "172",
"summary": "Added application-gateway-kubernetes-ingress to CBL-Mariner 2.0\nAdded containerized-data-importer to CBL-Mariner 2.0\nAdded keda to CBL-Mariner 2.0\nAdded kubevirt to CBL-Mariner 2.0\nAdded libcontainers-common to CBL-Mariner 2.0\nAdded prometheus-adapter to CBL-Mariner 2.0\nAdded gh to CBL-Mariner 2.0\nAdded terraform to CBL-Mariner 2.0\nAdded cf-cli to CBL-Mariner 2.0\nAdded influxdb to CBL-Mariner 2.0\nAdded git-lfs to CBL-Mariner 2.0\nAdded node-problem-detector to CBL-Mariner 2.0\nAdded sriov-network-device-plugin to CBL-Mariner 2.0\nAdded kured to CBL-Mariner 2.0\nAdded cni to Azure Linux 3.0\nAdded multus to Azure Linux 3.0\nAdded keda to Azure Linux 3.0\nAdded kubevirt to Azure Linux 3.0\nAdded sriov-network-device-plugin to Azure Linux 3.0\nAdded node-problem-detector to Azure Linux 3.0"
},
{
"date": "2025-03-03T00:00:00.000Z",
"legacy_version": "18.2",
"number": "173",
"summary": "Added application-gateway-kubernetes-ingress to CBL-Mariner 2.0\nAdded containerized-data-importer to CBL-Mariner 2.0\nAdded keda to CBL-Mariner 2.0\nAdded kubevirt to CBL-Mariner 2.0\nAdded libcontainers-common to CBL-Mariner 2.0\nAdded prometheus-adapter to CBL-Mariner 2.0\nAdded gh to CBL-Mariner 2.0\nAdded terraform to CBL-Mariner 2.0\nAdded cf-cli to CBL-Mariner 2.0\nAdded influxdb to CBL-Mariner 2.0\nAdded git-lfs to CBL-Mariner 2.0\nAdded node-problem-detector to CBL-Mariner 2.0\nAdded sriov-network-device-plugin to CBL-Mariner 2.0\nAdded kured to CBL-Mariner 2.0\nAdded cni to Azure Linux 3.0\nAdded multus to Azure Linux 3.0\nAdded keda to Azure Linux 3.0\nAdded kubevirt to Azure Linux 3.0\nAdded sriov-network-device-plugin to Azure Linux 3.0\nAdded node-problem-detector to Azure Linux 3.0"
},
{
"date": "2025-03-04T00:00:00.000Z",
"legacy_version": "18.3",
"number": "174",
"summary": "Added application-gateway-kubernetes-ingress to CBL-Mariner 2.0\nAdded containerized-data-importer to CBL-Mariner 2.0\nAdded keda to CBL-Mariner 2.0\nAdded kubevirt to CBL-Mariner 2.0\nAdded libcontainers-common to CBL-Mariner 2.0\nAdded prometheus-adapter to CBL-Mariner 2.0\nAdded gh to CBL-Mariner 2.0\nAdded terraform to CBL-Mariner 2.0\nAdded cf-cli to CBL-Mariner 2.0\nAdded influxdb to CBL-Mariner 2.0\nAdded git-lfs to CBL-Mariner 2.0\nAdded node-problem-detector to CBL-Mariner 2.0\nAdded sriov-network-device-plugin to CBL-Mariner 2.0\nAdded kured to CBL-Mariner 2.0\nAdded cni to Azure Linux 3.0\nAdded multus to Azure Linux 3.0\nAdded keda to Azure Linux 3.0\nAdded kubevirt to Azure Linux 3.0\nAdded sriov-network-device-plugin to Azure Linux 3.0\nAdded node-problem-detector to Azure Linux 3.0"
},
{
"date": "2025-03-05T00:00:00.000Z",
"legacy_version": "18.4",
"number": "175",
"summary": "Added application-gateway-kubernetes-ingress to CBL-Mariner 2.0\nAdded containerized-data-importer to CBL-Mariner 2.0\nAdded keda to CBL-Mariner 2.0\nAdded kubevirt to CBL-Mariner 2.0\nAdded libcontainers-common to CBL-Mariner 2.0\nAdded prometheus-adapter to CBL-Mariner 2.0\nAdded gh to CBL-Mariner 2.0\nAdded terraform to CBL-Mariner 2.0\nAdded cf-cli to CBL-Mariner 2.0\nAdded influxdb to CBL-Mariner 2.0\nAdded git-lfs to CBL-Mariner 2.0\nAdded node-problem-detector to CBL-Mariner 2.0\nAdded sriov-network-device-plugin to CBL-Mariner 2.0\nAdded kured to CBL-Mariner 2.0\nAdded cni to Azure Linux 3.0\nAdded multus to Azure Linux 3.0\nAdded keda to Azure Linux 3.0\nAdded kubevirt to Azure Linux 3.0\nAdded sriov-network-device-plugin to Azure Linux 3.0\nAdded node-problem-detector to Azure Linux 3.0"
},
{
"date": "2025-03-06T00:00:00.000Z",
"legacy_version": "18.5",
"number": "176",
"summary": "Added application-gateway-kubernetes-ingress to CBL-Mariner 2.0\nAdded containerized-data-importer to CBL-Mariner 2.0\nAdded keda to CBL-Mariner 2.0\nAdded kubevirt to CBL-Mariner 2.0\nAdded libcontainers-common to CBL-Mariner 2.0\nAdded prometheus-adapter to CBL-Mariner 2.0\nAdded gh to CBL-Mariner 2.0\nAdded terraform to CBL-Mariner 2.0\nAdded cf-cli to CBL-Mariner 2.0\nAdded influxdb to CBL-Mariner 2.0\nAdded git-lfs to CBL-Mariner 2.0\nAdded node-problem-detector to CBL-Mariner 2.0\nAdded sriov-network-device-plugin to CBL-Mariner 2.0\nAdded kured to CBL-Mariner 2.0\nAdded cni to Azure Linux 3.0\nAdded multus to Azure Linux 3.0\nAdded keda to Azure Linux 3.0\nAdded kubevirt to Azure Linux 3.0\nAdded sriov-network-device-plugin to Azure Linux 3.0\nAdded node-problem-detector to Azure Linux 3.0"
},
{
"date": "2025-03-08T00:00:00.000Z",
"legacy_version": "18.6",
"number": "177",
"summary": "Added application-gateway-kubernetes-ingress to CBL-Mariner 2.0\nAdded containerized-data-importer to CBL-Mariner 2.0\nAdded keda to CBL-Mariner 2.0\nAdded kubevirt to CBL-Mariner 2.0\nAdded libcontainers-common to CBL-Mariner 2.0\nAdded prometheus-adapter to CBL-Mariner 2.0\nAdded gh to CBL-Mariner 2.0\nAdded terraform to CBL-Mariner 2.0\nAdded cf-cli to CBL-Mariner 2.0\nAdded influxdb to CBL-Mariner 2.0\nAdded git-lfs to CBL-Mariner 2.0\nAdded node-problem-detector to CBL-Mariner 2.0\nAdded sriov-network-device-plugin to CBL-Mariner 2.0\nAdded kured to CBL-Mariner 2.0\nAdded cni to Azure Linux 3.0\nAdded multus to Azure Linux 3.0\nAdded keda to Azure Linux 3.0\nAdded kubevirt to Azure Linux 3.0\nAdded sriov-network-device-plugin to Azure Linux 3.0\nAdded node-problem-detector to Azure Linux 3.0"
},
{
"date": "2025-03-09T00:00:00.000Z",
"legacy_version": "18.7",
"number": "178",
"summary": "Added application-gateway-kubernetes-ingress to CBL-Mariner 2.0\nAdded containerized-data-importer to CBL-Mariner 2.0\nAdded keda to CBL-Mariner 2.0\nAdded kubevirt to CBL-Mariner 2.0\nAdded libcontainers-common to CBL-Mariner 2.0\nAdded prometheus-adapter to CBL-Mariner 2.0\nAdded gh to CBL-Mariner 2.0\nAdded terraform to CBL-Mariner 2.0\nAdded cf-cli to CBL-Mariner 2.0\nAdded influxdb to CBL-Mariner 2.0\nAdded git-lfs to CBL-Mariner 2.0\nAdded node-problem-detector to CBL-Mariner 2.0\nAdded sriov-network-device-plugin to CBL-Mariner 2.0\nAdded kured to CBL-Mariner 2.0\nAdded cni to Azure Linux 3.0\nAdded multus to Azure Linux 3.0\nAdded keda to Azure Linux 3.0\nAdded kubevirt to Azure Linux 3.0\nAdded sriov-network-device-plugin to Azure Linux 3.0\nAdded node-problem-detector to Azure Linux 3.0"
},
{
"date": "2025-03-10T00:00:00.000Z",
"legacy_version": "18.8",
"number": "179",
"summary": "Added application-gateway-kubernetes-ingress to CBL-Mariner 2.0\nAdded containerized-data-importer to CBL-Mariner 2.0\nAdded keda to CBL-Mariner 2.0\nAdded kubevirt to CBL-Mariner 2.0\nAdded libcontainers-common to CBL-Mariner 2.0\nAdded prometheus-adapter to CBL-Mariner 2.0\nAdded gh to CBL-Mariner 2.0\nAdded terraform to CBL-Mariner 2.0\nAdded cf-cli to CBL-Mariner 2.0\nAdded influxdb to CBL-Mariner 2.0\nAdded git-lfs to CBL-Mariner 2.0\nAdded node-problem-detector to CBL-Mariner 2.0\nAdded sriov-network-device-plugin to CBL-Mariner 2.0\nAdded kured to CBL-Mariner 2.0\nAdded cni to Azure Linux 3.0\nAdded multus to Azure Linux 3.0\nAdded keda to Azure Linux 3.0\nAdded kubevirt to Azure Linux 3.0\nAdded sriov-network-device-plugin to Azure Linux 3.0\nAdded node-problem-detector to Azure Linux 3.0"
},
{
"date": "2025-03-11T00:00:00.000Z",
"legacy_version": "18.9",
"number": "180",
"summary": "Added application-gateway-kubernetes-ingress to CBL-Mariner 2.0\nAdded containerized-data-importer to CBL-Mariner 2.0\nAdded keda to CBL-Mariner 2.0\nAdded kubevirt to CBL-Mariner 2.0\nAdded libcontainers-common to CBL-Mariner 2.0\nAdded prometheus-adapter to CBL-Mariner 2.0\nAdded gh to CBL-Mariner 2.0\nAdded terraform to CBL-Mariner 2.0\nAdded cf-cli to CBL-Mariner 2.0\nAdded influxdb to CBL-Mariner 2.0\nAdded git-lfs to CBL-Mariner 2.0\nAdded node-problem-detector to CBL-Mariner 2.0\nAdded sriov-network-device-plugin to CBL-Mariner 2.0\nAdded kured to CBL-Mariner 2.0\nAdded cni to Azure Linux 3.0\nAdded multus to Azure Linux 3.0\nAdded keda to Azure Linux 3.0\nAdded kubevirt to Azure Linux 3.0\nAdded sriov-network-device-plugin to Azure Linux 3.0\nAdded node-problem-detector to Azure Linux 3.0"
},
{
"date": "2025-03-12T00:00:00.000Z",
"legacy_version": "19",
"number": "181",
"summary": "Added application-gateway-kubernetes-ingress to CBL-Mariner 2.0\nAdded containerized-data-importer to CBL-Mariner 2.0\nAdded keda to CBL-Mariner 2.0\nAdded kubevirt to CBL-Mariner 2.0\nAdded libcontainers-common to CBL-Mariner 2.0\nAdded prometheus-adapter to CBL-Mariner 2.0\nAdded gh to CBL-Mariner 2.0\nAdded terraform to CBL-Mariner 2.0\nAdded cf-cli to CBL-Mariner 2.0\nAdded influxdb to CBL-Mariner 2.0\nAdded git-lfs to CBL-Mariner 2.0\nAdded node-problem-detector to CBL-Mariner 2.0\nAdded sriov-network-device-plugin to CBL-Mariner 2.0\nAdded kured to CBL-Mariner 2.0\nAdded cni to Azure Linux 3.0\nAdded multus to Azure Linux 3.0\nAdded keda to Azure Linux 3.0\nAdded kubevirt to Azure Linux 3.0\nAdded sriov-network-device-plugin to Azure Linux 3.0\nAdded node-problem-detector to Azure Linux 3.0"
},
{
"date": "2025-03-13T00:00:00.000Z",
"legacy_version": "19.1",
"number": "182",
"summary": "Added application-gateway-kubernetes-ingress to CBL-Mariner 2.0\nAdded containerized-data-importer to CBL-Mariner 2.0\nAdded keda to CBL-Mariner 2.0\nAdded kubevirt to CBL-Mariner 2.0\nAdded libcontainers-common to CBL-Mariner 2.0\nAdded prometheus-adapter to CBL-Mariner 2.0\nAdded gh to CBL-Mariner 2.0\nAdded terraform to CBL-Mariner 2.0\nAdded cf-cli to CBL-Mariner 2.0\nAdded influxdb to CBL-Mariner 2.0\nAdded git-lfs to CBL-Mariner 2.0\nAdded node-problem-detector to CBL-Mariner 2.0\nAdded sriov-network-device-plugin to CBL-Mariner 2.0\nAdded kured to CBL-Mariner 2.0\nAdded cni to Azure Linux 3.0\nAdded multus to Azure Linux 3.0\nAdded keda to Azure Linux 3.0\nAdded kubevirt to Azure Linux 3.0\nAdded sriov-network-device-plugin to Azure Linux 3.0\nAdded node-problem-detector to Azure Linux 3.0"
},
{
"date": "2025-03-14T00:00:00.000Z",
"legacy_version": "19.2",
"number": "183",
"summary": "Added application-gateway-kubernetes-ingress to CBL-Mariner 2.0\nAdded containerized-data-importer to CBL-Mariner 2.0\nAdded keda to CBL-Mariner 2.0\nAdded kubevirt to CBL-Mariner 2.0\nAdded libcontainers-common to CBL-Mariner 2.0\nAdded prometheus-adapter to CBL-Mariner 2.0\nAdded gh to CBL-Mariner 2.0\nAdded terraform to CBL-Mariner 2.0\nAdded cf-cli to CBL-Mariner 2.0\nAdded influxdb to CBL-Mariner 2.0\nAdded git-lfs to CBL-Mariner 2.0\nAdded node-problem-detector to CBL-Mariner 2.0\nAdded sriov-network-device-plugin to CBL-Mariner 2.0\nAdded kured to CBL-Mariner 2.0\nAdded cni to Azure Linux 3.0\nAdded multus to Azure Linux 3.0\nAdded keda to Azure Linux 3.0\nAdded kubevirt to Azure Linux 3.0\nAdded sriov-network-device-plugin to Azure Linux 3.0\nAdded node-problem-detector to Azure Linux 3.0"
},
{
"date": "2025-03-15T00:00:00.000Z",
"legacy_version": "19.3",
"number": "184",
"summary": "Added application-gateway-kubernetes-ingress to CBL-Mariner 2.0\nAdded containerized-data-importer to CBL-Mariner 2.0\nAdded keda to CBL-Mariner 2.0\nAdded kubevirt to CBL-Mariner 2.0\nAdded libcontainers-common to CBL-Mariner 2.0\nAdded prometheus-adapter to CBL-Mariner 2.0\nAdded gh to CBL-Mariner 2.0\nAdded terraform to CBL-Mariner 2.0\nAdded cf-cli to CBL-Mariner 2.0\nAdded influxdb to CBL-Mariner 2.0\nAdded git-lfs to CBL-Mariner 2.0\nAdded node-problem-detector to CBL-Mariner 2.0\nAdded sriov-network-device-plugin to CBL-Mariner 2.0\nAdded kured to CBL-Mariner 2.0\nAdded cni to Azure Linux 3.0\nAdded multus to Azure Linux 3.0\nAdded keda to Azure Linux 3.0\nAdded kubevirt to Azure Linux 3.0\nAdded sriov-network-device-plugin to Azure Linux 3.0\nAdded node-problem-detector to Azure Linux 3.0"
},
{
"date": "2025-03-16T00:00:00.000Z",
"legacy_version": "19.4",
"number": "185",
"summary": "Added application-gateway-kubernetes-ingress to CBL-Mariner 2.0\nAdded containerized-data-importer to CBL-Mariner 2.0\nAdded keda to CBL-Mariner 2.0\nAdded kubevirt to CBL-Mariner 2.0\nAdded libcontainers-common to CBL-Mariner 2.0\nAdded prometheus-adapter to CBL-Mariner 2.0\nAdded gh to CBL-Mariner 2.0\nAdded terraform to CBL-Mariner 2.0\nAdded cf-cli to CBL-Mariner 2.0\nAdded influxdb to CBL-Mariner 2.0\nAdded git-lfs to CBL-Mariner 2.0\nAdded node-problem-detector to CBL-Mariner 2.0\nAdded sriov-network-device-plugin to CBL-Mariner 2.0\nAdded kured to CBL-Mariner 2.0\nAdded cni to Azure Linux 3.0\nAdded multus to Azure Linux 3.0\nAdded keda to Azure Linux 3.0\nAdded kubevirt to Azure Linux 3.0\nAdded sriov-network-device-plugin to Azure Linux 3.0\nAdded node-problem-detector to Azure Linux 3.0"
},
{
"date": "2025-03-17T00:00:00.000Z",
"legacy_version": "19.5",
"number": "186",
"summary": "Added application-gateway-kubernetes-ingress to CBL-Mariner 2.0\nAdded containerized-data-importer to CBL-Mariner 2.0\nAdded keda to CBL-Mariner 2.0\nAdded kubevirt to CBL-Mariner 2.0\nAdded libcontainers-common to CBL-Mariner 2.0\nAdded prometheus-adapter to CBL-Mariner 2.0\nAdded gh to CBL-Mariner 2.0\nAdded terraform to CBL-Mariner 2.0\nAdded cf-cli to CBL-Mariner 2.0\nAdded influxdb to CBL-Mariner 2.0\nAdded git-lfs to CBL-Mariner 2.0\nAdded node-problem-detector to CBL-Mariner 2.0\nAdded sriov-network-device-plugin to CBL-Mariner 2.0\nAdded kured to CBL-Mariner 2.0\nAdded cni to Azure Linux 3.0\nAdded multus to Azure Linux 3.0\nAdded keda to Azure Linux 3.0\nAdded kubevirt to Azure Linux 3.0\nAdded sriov-network-device-plugin to Azure Linux 3.0\nAdded node-problem-detector to Azure Linux 3.0"
},
{
"date": "2025-03-18T00:00:00.000Z",
"legacy_version": "19.6",
"number": "187",
"summary": "Added application-gateway-kubernetes-ingress to CBL-Mariner 2.0\nAdded containerized-data-importer to CBL-Mariner 2.0\nAdded keda to CBL-Mariner 2.0\nAdded kubevirt to CBL-Mariner 2.0\nAdded libcontainers-common to CBL-Mariner 2.0\nAdded prometheus-adapter to CBL-Mariner 2.0\nAdded gh to CBL-Mariner 2.0\nAdded terraform to CBL-Mariner 2.0\nAdded cf-cli to CBL-Mariner 2.0\nAdded influxdb to CBL-Mariner 2.0\nAdded git-lfs to CBL-Mariner 2.0\nAdded node-problem-detector to CBL-Mariner 2.0\nAdded sriov-network-device-plugin to CBL-Mariner 2.0\nAdded kured to CBL-Mariner 2.0\nAdded cni to Azure Linux 3.0\nAdded multus to Azure Linux 3.0\nAdded keda to Azure Linux 3.0\nAdded kubevirt to Azure Linux 3.0\nAdded sriov-network-device-plugin to Azure Linux 3.0\nAdded node-problem-detector to Azure Linux 3.0"
},
{
"date": "2025-03-19T00:00:00.000Z",
"legacy_version": "19.7",
"number": "188",
"summary": "Added application-gateway-kubernetes-ingress to CBL-Mariner 2.0\nAdded containerized-data-importer to CBL-Mariner 2.0\nAdded keda to CBL-Mariner 2.0\nAdded kubevirt to CBL-Mariner 2.0\nAdded libcontainers-common to CBL-Mariner 2.0\nAdded prometheus-adapter to CBL-Mariner 2.0\nAdded gh to CBL-Mariner 2.0\nAdded terraform to CBL-Mariner 2.0\nAdded cf-cli to CBL-Mariner 2.0\nAdded influxdb to CBL-Mariner 2.0\nAdded git-lfs to CBL-Mariner 2.0\nAdded node-problem-detector to CBL-Mariner 2.0\nAdded sriov-network-device-plugin to CBL-Mariner 2.0\nAdded kured to CBL-Mariner 2.0\nAdded cni to Azure Linux 3.0\nAdded multus to Azure Linux 3.0\nAdded keda to Azure Linux 3.0\nAdded kubevirt to Azure Linux 3.0\nAdded sriov-network-device-plugin to Azure Linux 3.0\nAdded node-problem-detector to Azure Linux 3.0"
},
{
"date": "2025-03-20T00:00:00.000Z",
"legacy_version": "19.8",
"number": "189",
"summary": "Added application-gateway-kubernetes-ingress to CBL-Mariner 2.0\nAdded containerized-data-importer to CBL-Mariner 2.0\nAdded keda to CBL-Mariner 2.0\nAdded kubevirt to CBL-Mariner 2.0\nAdded libcontainers-common to CBL-Mariner 2.0\nAdded prometheus-adapter to CBL-Mariner 2.0\nAdded gh to CBL-Mariner 2.0\nAdded terraform to CBL-Mariner 2.0\nAdded cf-cli to CBL-Mariner 2.0\nAdded influxdb to CBL-Mariner 2.0\nAdded git-lfs to CBL-Mariner 2.0\nAdded node-problem-detector to CBL-Mariner 2.0\nAdded sriov-network-device-plugin to CBL-Mariner 2.0\nAdded kured to CBL-Mariner 2.0\nAdded cni to Azure Linux 3.0\nAdded multus to Azure Linux 3.0\nAdded keda to Azure Linux 3.0\nAdded kubevirt to Azure Linux 3.0\nAdded sriov-network-device-plugin to Azure Linux 3.0\nAdded node-problem-detector to Azure Linux 3.0"
},
{
"date": "2025-03-21T00:00:00.000Z",
"legacy_version": "19.9",
"number": "190",
"summary": "Added application-gateway-kubernetes-ingress to CBL-Mariner 2.0\nAdded containerized-data-importer to CBL-Mariner 2.0\nAdded keda to CBL-Mariner 2.0\nAdded kubevirt to CBL-Mariner 2.0\nAdded libcontainers-common to CBL-Mariner 2.0\nAdded prometheus-adapter to CBL-Mariner 2.0\nAdded gh to CBL-Mariner 2.0\nAdded terraform to CBL-Mariner 2.0\nAdded cf-cli to CBL-Mariner 2.0\nAdded influxdb to CBL-Mariner 2.0\nAdded git-lfs to CBL-Mariner 2.0\nAdded node-problem-detector to CBL-Mariner 2.0\nAdded sriov-network-device-plugin to CBL-Mariner 2.0\nAdded kured to CBL-Mariner 2.0\nAdded cni to Azure Linux 3.0\nAdded multus to Azure Linux 3.0\nAdded keda to Azure Linux 3.0\nAdded kubevirt to Azure Linux 3.0\nAdded sriov-network-device-plugin to Azure Linux 3.0\nAdded node-problem-detector to Azure Linux 3.0"
},
{
"date": "2025-03-22T00:00:00.000Z",
"legacy_version": "2",
"number": "191",
"summary": "Added application-gateway-kubernetes-ingress to CBL-Mariner 2.0\nAdded containerized-data-importer to CBL-Mariner 2.0\nAdded keda to CBL-Mariner 2.0\nAdded kubevirt to CBL-Mariner 2.0\nAdded libcontainers-common to CBL-Mariner 2.0\nAdded prometheus-adapter to CBL-Mariner 2.0\nAdded gh to CBL-Mariner 2.0\nAdded terraform to CBL-Mariner 2.0\nAdded cf-cli to CBL-Mariner 2.0\nAdded influxdb to CBL-Mariner 2.0\nAdded git-lfs to CBL-Mariner 2.0\nAdded node-problem-detector to CBL-Mariner 2.0\nAdded sriov-network-device-plugin to CBL-Mariner 2.0\nAdded kured to CBL-Mariner 2.0\nAdded cni to Azure Linux 3.0\nAdded multus to Azure Linux 3.0\nAdded keda to Azure Linux 3.0\nAdded kubevirt to Azure Linux 3.0\nAdded sriov-network-device-plugin to Azure Linux 3.0\nAdded node-problem-detector to Azure Linux 3.0"
},
{
"date": "2025-03-23T00:00:00.000Z",
"legacy_version": "20.1",
"number": "192",
"summary": "Added application-gateway-kubernetes-ingress to CBL-Mariner 2.0\nAdded containerized-data-importer to CBL-Mariner 2.0\nAdded keda to CBL-Mariner 2.0\nAdded kubevirt to CBL-Mariner 2.0\nAdded libcontainers-common to CBL-Mariner 2.0\nAdded prometheus-adapter to CBL-Mariner 2.0\nAdded gh to CBL-Mariner 2.0\nAdded terraform to CBL-Mariner 2.0\nAdded cf-cli to CBL-Mariner 2.0\nAdded influxdb to CBL-Mariner 2.0\nAdded git-lfs to CBL-Mariner 2.0\nAdded node-problem-detector to CBL-Mariner 2.0\nAdded sriov-network-device-plugin to CBL-Mariner 2.0\nAdded kured to CBL-Mariner 2.0\nAdded cni to Azure Linux 3.0\nAdded multus to Azure Linux 3.0\nAdded keda to Azure Linux 3.0\nAdded kubevirt to Azure Linux 3.0\nAdded sriov-network-device-plugin to Azure Linux 3.0\nAdded node-problem-detector to Azure Linux 3.0"
},
{
"date": "2025-03-24T00:00:00.000Z",
"legacy_version": "20.2",
"number": "193",
"summary": "Added application-gateway-kubernetes-ingress to CBL-Mariner 2.0\nAdded containerized-data-importer to CBL-Mariner 2.0\nAdded keda to CBL-Mariner 2.0\nAdded kubevirt to CBL-Mariner 2.0\nAdded libcontainers-common to CBL-Mariner 2.0\nAdded prometheus-adapter to CBL-Mariner 2.0\nAdded gh to CBL-Mariner 2.0\nAdded terraform to CBL-Mariner 2.0\nAdded cf-cli to CBL-Mariner 2.0\nAdded influxdb to CBL-Mariner 2.0\nAdded git-lfs to CBL-Mariner 2.0\nAdded node-problem-detector to CBL-Mariner 2.0\nAdded sriov-network-device-plugin to CBL-Mariner 2.0\nAdded kured to CBL-Mariner 2.0\nAdded cni to Azure Linux 3.0\nAdded multus to Azure Linux 3.0\nAdded keda to Azure Linux 3.0\nAdded kubevirt to Azure Linux 3.0\nAdded sriov-network-device-plugin to Azure Linux 3.0\nAdded node-problem-detector to Azure Linux 3.0"
},
{
"date": "2025-03-25T00:00:00.000Z",
"legacy_version": "20.3",
"number": "194",
"summary": "Added application-gateway-kubernetes-ingress to CBL-Mariner 2.0\nAdded containerized-data-importer to CBL-Mariner 2.0\nAdded keda to CBL-Mariner 2.0\nAdded kubevirt to CBL-Mariner 2.0\nAdded libcontainers-common to CBL-Mariner 2.0\nAdded prometheus-adapter to CBL-Mariner 2.0\nAdded gh to CBL-Mariner 2.0\nAdded terraform to CBL-Mariner 2.0\nAdded cf-cli to CBL-Mariner 2.0\nAdded influxdb to CBL-Mariner 2.0\nAdded git-lfs to CBL-Mariner 2.0\nAdded node-problem-detector to CBL-Mariner 2.0\nAdded sriov-network-device-plugin to CBL-Mariner 2.0\nAdded kured to CBL-Mariner 2.0\nAdded cni to Azure Linux 3.0\nAdded multus to Azure Linux 3.0\nAdded keda to Azure Linux 3.0\nAdded kubevirt to Azure Linux 3.0\nAdded sriov-network-device-plugin to Azure Linux 3.0\nAdded node-problem-detector to Azure Linux 3.0"
},
{
"date": "2025-03-26T00:00:00.000Z",
"legacy_version": "20.4",
"number": "195",
"summary": "Added application-gateway-kubernetes-ingress to CBL-Mariner 2.0\nAdded containerized-data-importer to CBL-Mariner 2.0\nAdded keda to CBL-Mariner 2.0\nAdded kubevirt to CBL-Mariner 2.0\nAdded libcontainers-common to CBL-Mariner 2.0\nAdded prometheus-adapter to CBL-Mariner 2.0\nAdded gh to CBL-Mariner 2.0\nAdded terraform to CBL-Mariner 2.0\nAdded cf-cli to CBL-Mariner 2.0\nAdded influxdb to CBL-Mariner 2.0\nAdded git-lfs to CBL-Mariner 2.0\nAdded node-problem-detector to CBL-Mariner 2.0\nAdded sriov-network-device-plugin to CBL-Mariner 2.0\nAdded kured to CBL-Mariner 2.0\nAdded cni to Azure Linux 3.0\nAdded multus to Azure Linux 3.0\nAdded keda to Azure Linux 3.0\nAdded kubevirt to Azure Linux 3.0\nAdded sriov-network-device-plugin to Azure Linux 3.0\nAdded node-problem-detector to Azure Linux 3.0"
},
{
"date": "2025-03-27T00:00:00.000Z",
"legacy_version": "20.5",
"number": "196",
"summary": "Added application-gateway-kubernetes-ingress to CBL-Mariner 2.0\nAdded containerized-data-importer to CBL-Mariner 2.0\nAdded keda to CBL-Mariner 2.0\nAdded kubevirt to CBL-Mariner 2.0\nAdded libcontainers-common to CBL-Mariner 2.0\nAdded prometheus-adapter to CBL-Mariner 2.0\nAdded gh to CBL-Mariner 2.0\nAdded terraform to CBL-Mariner 2.0\nAdded cf-cli to CBL-Mariner 2.0\nAdded influxdb to CBL-Mariner 2.0\nAdded git-lfs to CBL-Mariner 2.0\nAdded node-problem-detector to CBL-Mariner 2.0\nAdded sriov-network-device-plugin to CBL-Mariner 2.0\nAdded kured to CBL-Mariner 2.0\nAdded cni to Azure Linux 3.0\nAdded multus to Azure Linux 3.0\nAdded keda to Azure Linux 3.0\nAdded kubevirt to Azure Linux 3.0\nAdded sriov-network-device-plugin to Azure Linux 3.0\nAdded node-problem-detector to Azure Linux 3.0"
},
{
"date": "2025-03-28T00:00:00.000Z",
"legacy_version": "20.6",
"number": "197",
"summary": "Added application-gateway-kubernetes-ingress to CBL-Mariner 2.0\nAdded containerized-data-importer to CBL-Mariner 2.0\nAdded keda to CBL-Mariner 2.0\nAdded kubevirt to CBL-Mariner 2.0\nAdded libcontainers-common to CBL-Mariner 2.0\nAdded prometheus-adapter to CBL-Mariner 2.0\nAdded gh to CBL-Mariner 2.0\nAdded terraform to CBL-Mariner 2.0\nAdded cf-cli to CBL-Mariner 2.0\nAdded influxdb to CBL-Mariner 2.0\nAdded git-lfs to CBL-Mariner 2.0\nAdded node-problem-detector to CBL-Mariner 2.0\nAdded sriov-network-device-plugin to CBL-Mariner 2.0\nAdded kured to CBL-Mariner 2.0\nAdded cni to Azure Linux 3.0\nAdded multus to Azure Linux 3.0\nAdded keda to Azure Linux 3.0\nAdded kubevirt to Azure Linux 3.0\nAdded sriov-network-device-plugin to Azure Linux 3.0\nAdded node-problem-detector to Azure Linux 3.0"
},
{
"date": "2025-03-29T00:00:00.000Z",
"legacy_version": "20.7",
"number": "198",
"summary": "Added application-gateway-kubernetes-ingress to CBL-Mariner 2.0\nAdded containerized-data-importer to CBL-Mariner 2.0\nAdded keda to CBL-Mariner 2.0\nAdded kubevirt to CBL-Mariner 2.0\nAdded libcontainers-common to CBL-Mariner 2.0\nAdded prometheus-adapter to CBL-Mariner 2.0\nAdded gh to CBL-Mariner 2.0\nAdded terraform to CBL-Mariner 2.0\nAdded cf-cli to CBL-Mariner 2.0\nAdded influxdb to CBL-Mariner 2.0\nAdded git-lfs to CBL-Mariner 2.0\nAdded node-problem-detector to CBL-Mariner 2.0\nAdded sriov-network-device-plugin to CBL-Mariner 2.0\nAdded kured to CBL-Mariner 2.0\nAdded cni to Azure Linux 3.0\nAdded multus to Azure Linux 3.0\nAdded keda to Azure Linux 3.0\nAdded kubevirt to Azure Linux 3.0\nAdded sriov-network-device-plugin to Azure Linux 3.0\nAdded node-problem-detector to Azure Linux 3.0"
},
{
"date": "2025-03-30T00:00:00.000Z",
"legacy_version": "20.8",
"number": "199",
"summary": "Added application-gateway-kubernetes-ingress to CBL-Mariner 2.0\nAdded containerized-data-importer to CBL-Mariner 2.0\nAdded keda to CBL-Mariner 2.0\nAdded kubevirt to CBL-Mariner 2.0\nAdded libcontainers-common to CBL-Mariner 2.0\nAdded prometheus-adapter to CBL-Mariner 2.0\nAdded gh to CBL-Mariner 2.0\nAdded terraform to CBL-Mariner 2.0\nAdded cf-cli to CBL-Mariner 2.0\nAdded influxdb to CBL-Mariner 2.0\nAdded git-lfs to CBL-Mariner 2.0\nAdded node-problem-detector to CBL-Mariner 2.0\nAdded sriov-network-device-plugin to CBL-Mariner 2.0\nAdded kured to CBL-Mariner 2.0\nAdded cni to Azure Linux 3.0\nAdded multus to Azure Linux 3.0\nAdded keda to Azure Linux 3.0\nAdded kubevirt to Azure Linux 3.0\nAdded sriov-network-device-plugin to Azure Linux 3.0\nAdded node-problem-detector to Azure Linux 3.0"
},
{
"date": "2025-03-31T00:00:00.000Z",
"legacy_version": "20.9",
"number": "200",
"summary": "Added application-gateway-kubernetes-ingress to CBL-Mariner 2.0\nAdded containerized-data-importer to CBL-Mariner 2.0\nAdded keda to CBL-Mariner 2.0\nAdded kubevirt to CBL-Mariner 2.0\nAdded libcontainers-common to CBL-Mariner 2.0\nAdded prometheus-adapter to CBL-Mariner 2.0\nAdded gh to CBL-Mariner 2.0\nAdded terraform to CBL-Mariner 2.0\nAdded cf-cli to CBL-Mariner 2.0\nAdded influxdb to CBL-Mariner 2.0\nAdded git-lfs to CBL-Mariner 2.0\nAdded node-problem-detector to CBL-Mariner 2.0\nAdded sriov-network-device-plugin to CBL-Mariner 2.0\nAdded kured to CBL-Mariner 2.0\nAdded cni to Azure Linux 3.0\nAdded multus to Azure Linux 3.0\nAdded keda to Azure Linux 3.0\nAdded kubevirt to Azure Linux 3.0\nAdded sriov-network-device-plugin to Azure Linux 3.0\nAdded node-problem-detector to Azure Linux 3.0"
},
{
"date": "2025-04-01T00:00:00.000Z",
"legacy_version": "21",
"number": "201",
"summary": "Added application-gateway-kubernetes-ingress to CBL-Mariner 2.0\nAdded containerized-data-importer to CBL-Mariner 2.0\nAdded keda to CBL-Mariner 2.0\nAdded kubevirt to CBL-Mariner 2.0\nAdded libcontainers-common to CBL-Mariner 2.0\nAdded prometheus-adapter to CBL-Mariner 2.0\nAdded gh to CBL-Mariner 2.0\nAdded terraform to CBL-Mariner 2.0\nAdded cf-cli to CBL-Mariner 2.0\nAdded influxdb to CBL-Mariner 2.0\nAdded git-lfs to CBL-Mariner 2.0\nAdded node-problem-detector to CBL-Mariner 2.0\nAdded sriov-network-device-plugin to CBL-Mariner 2.0\nAdded kured to CBL-Mariner 2.0\nAdded cni to Azure Linux 3.0\nAdded multus to Azure Linux 3.0\nAdded keda to Azure Linux 3.0\nAdded kubevirt to Azure Linux 3.0\nAdded sriov-network-device-plugin to Azure Linux 3.0\nAdded node-problem-detector to Azure Linux 3.0"
},
{
"date": "2025-04-03T00:00:00.000Z",
"legacy_version": "21.1",
"number": "202",
"summary": "Added application-gateway-kubernetes-ingress to CBL-Mariner 2.0\nAdded containerized-data-importer to CBL-Mariner 2.0\nAdded keda to CBL-Mariner 2.0\nAdded kubevirt to CBL-Mariner 2.0\nAdded libcontainers-common to CBL-Mariner 2.0\nAdded prometheus-adapter to CBL-Mariner 2.0\nAdded gh to CBL-Mariner 2.0\nAdded terraform to CBL-Mariner 2.0\nAdded cf-cli to CBL-Mariner 2.0\nAdded influxdb to CBL-Mariner 2.0\nAdded git-lfs to CBL-Mariner 2.0\nAdded node-problem-detector to CBL-Mariner 2.0\nAdded sriov-network-device-plugin to CBL-Mariner 2.0\nAdded kured to CBL-Mariner 2.0\nAdded cni to Azure Linux 3.0\nAdded multus to Azure Linux 3.0\nAdded keda to Azure Linux 3.0\nAdded kubevirt to Azure Linux 3.0\nAdded sriov-network-device-plugin to Azure Linux 3.0\nAdded node-problem-detector to Azure Linux 3.0"
},
{
"date": "2025-04-04T00:00:00.000Z",
"legacy_version": "21.2",
"number": "203",
"summary": "Added application-gateway-kubernetes-ingress to CBL-Mariner 2.0\nAdded containerized-data-importer to CBL-Mariner 2.0\nAdded keda to CBL-Mariner 2.0\nAdded kubevirt to CBL-Mariner 2.0\nAdded libcontainers-common to CBL-Mariner 2.0\nAdded prometheus-adapter to CBL-Mariner 2.0\nAdded gh to CBL-Mariner 2.0\nAdded terraform to CBL-Mariner 2.0\nAdded cf-cli to CBL-Mariner 2.0\nAdded influxdb to CBL-Mariner 2.0\nAdded git-lfs to CBL-Mariner 2.0\nAdded node-problem-detector to CBL-Mariner 2.0\nAdded sriov-network-device-plugin to CBL-Mariner 2.0\nAdded kured to CBL-Mariner 2.0\nAdded cni to Azure Linux 3.0\nAdded multus to Azure Linux 3.0\nAdded keda to Azure Linux 3.0\nAdded kubevirt to Azure Linux 3.0\nAdded sriov-network-device-plugin to Azure Linux 3.0\nAdded node-problem-detector to Azure Linux 3.0"
},
{
"date": "2025-04-05T00:00:00.000Z",
"legacy_version": "21.3",
"number": "204",
"summary": "Added application-gateway-kubernetes-ingress to CBL-Mariner 2.0\nAdded containerized-data-importer to CBL-Mariner 2.0\nAdded keda to CBL-Mariner 2.0\nAdded kubevirt to CBL-Mariner 2.0\nAdded libcontainers-common to CBL-Mariner 2.0\nAdded prometheus-adapter to CBL-Mariner 2.0\nAdded gh to CBL-Mariner 2.0\nAdded terraform to CBL-Mariner 2.0\nAdded cf-cli to CBL-Mariner 2.0\nAdded influxdb to CBL-Mariner 2.0\nAdded git-lfs to CBL-Mariner 2.0\nAdded node-problem-detector to CBL-Mariner 2.0\nAdded sriov-network-device-plugin to CBL-Mariner 2.0\nAdded kured to CBL-Mariner 2.0\nAdded cni to Azure Linux 3.0\nAdded multus to Azure Linux 3.0\nAdded keda to Azure Linux 3.0\nAdded kubevirt to Azure Linux 3.0\nAdded sriov-network-device-plugin to Azure Linux 3.0\nAdded node-problem-detector to Azure Linux 3.0"
},
{
"date": "2025-04-06T00:00:00.000Z",
"legacy_version": "21.4",
"number": "205",
"summary": "Added application-gateway-kubernetes-ingress to CBL-Mariner 2.0\nAdded containerized-data-importer to CBL-Mariner 2.0\nAdded keda to CBL-Mariner 2.0\nAdded kubevirt to CBL-Mariner 2.0\nAdded libcontainers-common to CBL-Mariner 2.0\nAdded prometheus-adapter to CBL-Mariner 2.0\nAdded gh to CBL-Mariner 2.0\nAdded terraform to CBL-Mariner 2.0\nAdded cf-cli to CBL-Mariner 2.0\nAdded influxdb to CBL-Mariner 2.0\nAdded git-lfs to CBL-Mariner 2.0\nAdded node-problem-detector to CBL-Mariner 2.0\nAdded sriov-network-device-plugin to CBL-Mariner 2.0\nAdded kured to CBL-Mariner 2.0\nAdded cni to Azure Linux 3.0\nAdded multus to Azure Linux 3.0\nAdded keda to Azure Linux 3.0\nAdded kubevirt to Azure Linux 3.0\nAdded sriov-network-device-plugin to Azure Linux 3.0\nAdded node-problem-detector to Azure Linux 3.0"
},
{
"date": "2025-04-07T00:00:00.000Z",
"legacy_version": "21.5",
"number": "206",
"summary": "Added application-gateway-kubernetes-ingress to CBL-Mariner 2.0\nAdded containerized-data-importer to CBL-Mariner 2.0\nAdded keda to CBL-Mariner 2.0\nAdded kubevirt to CBL-Mariner 2.0\nAdded libcontainers-common to CBL-Mariner 2.0\nAdded prometheus-adapter to CBL-Mariner 2.0\nAdded gh to CBL-Mariner 2.0\nAdded terraform to CBL-Mariner 2.0\nAdded cf-cli to CBL-Mariner 2.0\nAdded influxdb to CBL-Mariner 2.0\nAdded git-lfs to CBL-Mariner 2.0\nAdded node-problem-detector to CBL-Mariner 2.0\nAdded sriov-network-device-plugin to CBL-Mariner 2.0\nAdded kured to CBL-Mariner 2.0\nAdded cni to Azure Linux 3.0\nAdded multus to Azure Linux 3.0\nAdded keda to Azure Linux 3.0\nAdded kubevirt to Azure Linux 3.0\nAdded sriov-network-device-plugin to Azure Linux 3.0\nAdded node-problem-detector to Azure Linux 3.0"
},
{
"date": "2025-04-08T00:00:00.000Z",
"legacy_version": "21.6",
"number": "207",
"summary": "Added application-gateway-kubernetes-ingress to CBL-Mariner 2.0\nAdded containerized-data-importer to CBL-Mariner 2.0\nAdded keda to CBL-Mariner 2.0\nAdded kubevirt to CBL-Mariner 2.0\nAdded libcontainers-common to CBL-Mariner 2.0\nAdded prometheus-adapter to CBL-Mariner 2.0\nAdded gh to CBL-Mariner 2.0\nAdded terraform to CBL-Mariner 2.0\nAdded cf-cli to CBL-Mariner 2.0\nAdded influxdb to CBL-Mariner 2.0\nAdded git-lfs to CBL-Mariner 2.0\nAdded node-problem-detector to CBL-Mariner 2.0\nAdded sriov-network-device-plugin to CBL-Mariner 2.0\nAdded kured to CBL-Mariner 2.0\nAdded cni to Azure Linux 3.0\nAdded multus to Azure Linux 3.0\nAdded keda to Azure Linux 3.0\nAdded kubevirt to Azure Linux 3.0\nAdded sriov-network-device-plugin to Azure Linux 3.0\nAdded node-problem-detector to Azure Linux 3.0"
},
{
"date": "2025-04-09T00:00:00.000Z",
"legacy_version": "21.7",
"number": "208",
"summary": "Added application-gateway-kubernetes-ingress to CBL-Mariner 2.0\nAdded containerized-data-importer to CBL-Mariner 2.0\nAdded keda to CBL-Mariner 2.0\nAdded kubevirt to CBL-Mariner 2.0\nAdded libcontainers-common to CBL-Mariner 2.0\nAdded prometheus-adapter to CBL-Mariner 2.0\nAdded gh to CBL-Mariner 2.0\nAdded terraform to CBL-Mariner 2.0\nAdded cf-cli to CBL-Mariner 2.0\nAdded influxdb to CBL-Mariner 2.0\nAdded git-lfs to CBL-Mariner 2.0\nAdded node-problem-detector to CBL-Mariner 2.0\nAdded sriov-network-device-plugin to CBL-Mariner 2.0\nAdded kured to CBL-Mariner 2.0\nAdded cni to Azure Linux 3.0\nAdded multus to Azure Linux 3.0\nAdded keda to Azure Linux 3.0\nAdded kubevirt to Azure Linux 3.0\nAdded sriov-network-device-plugin to Azure Linux 3.0\nAdded node-problem-detector to Azure Linux 3.0"
},
{
"date": "2025-04-10T00:00:00.000Z",
"legacy_version": "21.8",
"number": "209",
"summary": "Added application-gateway-kubernetes-ingress to CBL-Mariner 2.0\nAdded containerized-data-importer to CBL-Mariner 2.0\nAdded keda to CBL-Mariner 2.0\nAdded kubevirt to CBL-Mariner 2.0\nAdded libcontainers-common to CBL-Mariner 2.0\nAdded prometheus-adapter to CBL-Mariner 2.0\nAdded gh to CBL-Mariner 2.0\nAdded terraform to CBL-Mariner 2.0\nAdded cf-cli to CBL-Mariner 2.0\nAdded influxdb to CBL-Mariner 2.0\nAdded git-lfs to CBL-Mariner 2.0\nAdded node-problem-detector to CBL-Mariner 2.0\nAdded sriov-network-device-plugin to CBL-Mariner 2.0\nAdded kured to CBL-Mariner 2.0\nAdded cni to Azure Linux 3.0\nAdded multus to Azure Linux 3.0\nAdded keda to Azure Linux 3.0\nAdded kubevirt to Azure Linux 3.0\nAdded sriov-network-device-plugin to Azure Linux 3.0\nAdded node-problem-detector to Azure Linux 3.0"
},
{
"date": "2025-04-11T00:00:00.000Z",
"legacy_version": "21.9",
"number": "210",
"summary": "Added application-gateway-kubernetes-ingress to CBL-Mariner 2.0\nAdded containerized-data-importer to CBL-Mariner 2.0\nAdded keda to CBL-Mariner 2.0\nAdded kubevirt to CBL-Mariner 2.0\nAdded libcontainers-common to CBL-Mariner 2.0\nAdded prometheus-adapter to CBL-Mariner 2.0\nAdded gh to CBL-Mariner 2.0\nAdded terraform to CBL-Mariner 2.0\nAdded cf-cli to CBL-Mariner 2.0\nAdded influxdb to CBL-Mariner 2.0\nAdded git-lfs to CBL-Mariner 2.0\nAdded node-problem-detector to CBL-Mariner 2.0\nAdded sriov-network-device-plugin to CBL-Mariner 2.0\nAdded kured to CBL-Mariner 2.0\nAdded cni to Azure Linux 3.0\nAdded multus to Azure Linux 3.0\nAdded keda to Azure Linux 3.0\nAdded kubevirt to Azure Linux 3.0\nAdded sriov-network-device-plugin to Azure Linux 3.0\nAdded node-problem-detector to Azure Linux 3.0"
},
{
"date": "2025-04-12T00:00:00.000Z",
"legacy_version": "22",
"number": "211",
"summary": "Added application-gateway-kubernetes-ingress to CBL-Mariner 2.0\nAdded containerized-data-importer to CBL-Mariner 2.0\nAdded keda to CBL-Mariner 2.0\nAdded kubevirt to CBL-Mariner 2.0\nAdded libcontainers-common to CBL-Mariner 2.0\nAdded prometheus-adapter to CBL-Mariner 2.0\nAdded gh to CBL-Mariner 2.0\nAdded terraform to CBL-Mariner 2.0\nAdded cf-cli to CBL-Mariner 2.0\nAdded influxdb to CBL-Mariner 2.0\nAdded git-lfs to CBL-Mariner 2.0\nAdded node-problem-detector to CBL-Mariner 2.0\nAdded sriov-network-device-plugin to CBL-Mariner 2.0\nAdded kured to CBL-Mariner 2.0\nAdded cni to Azure Linux 3.0\nAdded multus to Azure Linux 3.0\nAdded keda to Azure Linux 3.0\nAdded kubevirt to Azure Linux 3.0\nAdded sriov-network-device-plugin to Azure Linux 3.0\nAdded node-problem-detector to Azure Linux 3.0"
},
{
"date": "2025-04-13T00:00:00.000Z",
"legacy_version": "22.1",
"number": "212",
"summary": "Added application-gateway-kubernetes-ingress to CBL-Mariner 2.0\nAdded containerized-data-importer to CBL-Mariner 2.0\nAdded keda to CBL-Mariner 2.0\nAdded kubevirt to CBL-Mariner 2.0\nAdded libcontainers-common to CBL-Mariner 2.0\nAdded prometheus-adapter to CBL-Mariner 2.0\nAdded gh to CBL-Mariner 2.0\nAdded terraform to CBL-Mariner 2.0\nAdded cf-cli to CBL-Mariner 2.0\nAdded influxdb to CBL-Mariner 2.0\nAdded git-lfs to CBL-Mariner 2.0\nAdded node-problem-detector to CBL-Mariner 2.0\nAdded sriov-network-device-plugin to CBL-Mariner 2.0\nAdded kured to CBL-Mariner 2.0\nAdded cni to Azure Linux 3.0\nAdded multus to Azure Linux 3.0\nAdded keda to Azure Linux 3.0\nAdded kubevirt to Azure Linux 3.0\nAdded sriov-network-device-plugin to Azure Linux 3.0\nAdded node-problem-detector to Azure Linux 3.0"
},
{
"date": "2025-04-14T00:00:00.000Z",
"legacy_version": "22.2",
"number": "213",
"summary": "Added application-gateway-kubernetes-ingress to CBL-Mariner 2.0\nAdded containerized-data-importer to CBL-Mariner 2.0\nAdded keda to CBL-Mariner 2.0\nAdded kubevirt to CBL-Mariner 2.0\nAdded libcontainers-common to CBL-Mariner 2.0\nAdded prometheus-adapter to CBL-Mariner 2.0\nAdded gh to CBL-Mariner 2.0\nAdded terraform to CBL-Mariner 2.0\nAdded cf-cli to CBL-Mariner 2.0\nAdded influxdb to CBL-Mariner 2.0\nAdded git-lfs to CBL-Mariner 2.0\nAdded node-problem-detector to CBL-Mariner 2.0\nAdded sriov-network-device-plugin to CBL-Mariner 2.0\nAdded kured to CBL-Mariner 2.0\nAdded cni to Azure Linux 3.0\nAdded multus to Azure Linux 3.0\nAdded keda to Azure Linux 3.0\nAdded kubevirt to Azure Linux 3.0\nAdded sriov-network-device-plugin to Azure Linux 3.0\nAdded node-problem-detector to Azure Linux 3.0"
},
{
"date": "2025-04-15T00:00:00.000Z",
"legacy_version": "22.3",
"number": "214",
"summary": "Added application-gateway-kubernetes-ingress to CBL-Mariner 2.0\nAdded containerized-data-importer to CBL-Mariner 2.0\nAdded keda to CBL-Mariner 2.0\nAdded kubevirt to CBL-Mariner 2.0\nAdded libcontainers-common to CBL-Mariner 2.0\nAdded prometheus-adapter to CBL-Mariner 2.0\nAdded gh to CBL-Mariner 2.0\nAdded terraform to CBL-Mariner 2.0\nAdded cf-cli to CBL-Mariner 2.0\nAdded influxdb to CBL-Mariner 2.0\nAdded git-lfs to CBL-Mariner 2.0\nAdded node-problem-detector to CBL-Mariner 2.0\nAdded sriov-network-device-plugin to CBL-Mariner 2.0\nAdded kured to CBL-Mariner 2.0\nAdded cni to Azure Linux 3.0\nAdded multus to Azure Linux 3.0\nAdded keda to Azure Linux 3.0\nAdded kubevirt to Azure Linux 3.0\nAdded sriov-network-device-plugin to Azure Linux 3.0\nAdded node-problem-detector to Azure Linux 3.0"
},
{
"date": "2025-04-16T00:00:00.000Z",
"legacy_version": "22.4",
"number": "215",
"summary": "Added application-gateway-kubernetes-ingress to CBL-Mariner 2.0\nAdded containerized-data-importer to CBL-Mariner 2.0\nAdded keda to CBL-Mariner 2.0\nAdded kubevirt to CBL-Mariner 2.0\nAdded libcontainers-common to CBL-Mariner 2.0\nAdded prometheus-adapter to CBL-Mariner 2.0\nAdded gh to CBL-Mariner 2.0\nAdded terraform to CBL-Mariner 2.0\nAdded cf-cli to CBL-Mariner 2.0\nAdded influxdb to CBL-Mariner 2.0\nAdded git-lfs to CBL-Mariner 2.0\nAdded node-problem-detector to CBL-Mariner 2.0\nAdded sriov-network-device-plugin to CBL-Mariner 2.0\nAdded kured to CBL-Mariner 2.0\nAdded cni to Azure Linux 3.0\nAdded multus to Azure Linux 3.0\nAdded keda to Azure Linux 3.0\nAdded kubevirt to Azure Linux 3.0\nAdded sriov-network-device-plugin to Azure Linux 3.0\nAdded node-problem-detector to Azure Linux 3.0"
},
{
"date": "2025-04-18T00:00:00.000Z",
"legacy_version": "22.5",
"number": "216",
"summary": "Added application-gateway-kubernetes-ingress to CBL-Mariner 2.0\nAdded containerized-data-importer to CBL-Mariner 2.0\nAdded keda to CBL-Mariner 2.0\nAdded kubevirt to CBL-Mariner 2.0\nAdded libcontainers-common to CBL-Mariner 2.0\nAdded prometheus-adapter to CBL-Mariner 2.0\nAdded gh to CBL-Mariner 2.0\nAdded terraform to CBL-Mariner 2.0\nAdded cf-cli to CBL-Mariner 2.0\nAdded influxdb to CBL-Mariner 2.0\nAdded git-lfs to CBL-Mariner 2.0\nAdded node-problem-detector to CBL-Mariner 2.0\nAdded sriov-network-device-plugin to CBL-Mariner 2.0\nAdded kured to CBL-Mariner 2.0\nAdded cni to Azure Linux 3.0\nAdded multus to Azure Linux 3.0\nAdded keda to Azure Linux 3.0\nAdded kubevirt to Azure Linux 3.0\nAdded sriov-network-device-plugin to Azure Linux 3.0\nAdded node-problem-detector to Azure Linux 3.0"
},
{
"date": "2025-04-19T00:00:00.000Z",
"legacy_version": "22.6",
"number": "217",
"summary": "Added application-gateway-kubernetes-ingress to CBL-Mariner 2.0\nAdded containerized-data-importer to CBL-Mariner 2.0\nAdded keda to CBL-Mariner 2.0\nAdded kubevirt to CBL-Mariner 2.0\nAdded libcontainers-common to CBL-Mariner 2.0\nAdded prometheus-adapter to CBL-Mariner 2.0\nAdded gh to CBL-Mariner 2.0\nAdded terraform to CBL-Mariner 2.0\nAdded cf-cli to CBL-Mariner 2.0\nAdded influxdb to CBL-Mariner 2.0\nAdded git-lfs to CBL-Mariner 2.0\nAdded node-problem-detector to CBL-Mariner 2.0\nAdded sriov-network-device-plugin to CBL-Mariner 2.0\nAdded kured to CBL-Mariner 2.0\nAdded cni to Azure Linux 3.0\nAdded multus to Azure Linux 3.0\nAdded keda to Azure Linux 3.0\nAdded kubevirt to Azure Linux 3.0\nAdded sriov-network-device-plugin to Azure Linux 3.0\nAdded node-problem-detector to Azure Linux 3.0"
},
{
"date": "2025-04-20T00:00:00.000Z",
"legacy_version": "22.7",
"number": "218",
"summary": "Added application-gateway-kubernetes-ingress to CBL-Mariner 2.0\nAdded containerized-data-importer to CBL-Mariner 2.0\nAdded keda to CBL-Mariner 2.0\nAdded kubevirt to CBL-Mariner 2.0\nAdded libcontainers-common to CBL-Mariner 2.0\nAdded prometheus-adapter to CBL-Mariner 2.0\nAdded gh to CBL-Mariner 2.0\nAdded terraform to CBL-Mariner 2.0\nAdded cf-cli to CBL-Mariner 2.0\nAdded influxdb to CBL-Mariner 2.0\nAdded git-lfs to CBL-Mariner 2.0\nAdded node-problem-detector to CBL-Mariner 2.0\nAdded sriov-network-device-plugin to CBL-Mariner 2.0\nAdded kured to CBL-Mariner 2.0\nAdded cni to Azure Linux 3.0\nAdded multus to Azure Linux 3.0\nAdded keda to Azure Linux 3.0\nAdded kubevirt to Azure Linux 3.0\nAdded sriov-network-device-plugin to Azure Linux 3.0\nAdded node-problem-detector to Azure Linux 3.0"
},
{
"date": "2025-04-21T00:00:00.000Z",
"legacy_version": "22.8",
"number": "219",
"summary": "Added application-gateway-kubernetes-ingress to CBL-Mariner 2.0\nAdded containerized-data-importer to CBL-Mariner 2.0\nAdded keda to CBL-Mariner 2.0\nAdded kubevirt to CBL-Mariner 2.0\nAdded libcontainers-common to CBL-Mariner 2.0\nAdded prometheus-adapter to CBL-Mariner 2.0\nAdded gh to CBL-Mariner 2.0\nAdded terraform to CBL-Mariner 2.0\nAdded cf-cli to CBL-Mariner 2.0\nAdded influxdb to CBL-Mariner 2.0\nAdded git-lfs to CBL-Mariner 2.0\nAdded node-problem-detector to CBL-Mariner 2.0\nAdded sriov-network-device-plugin to CBL-Mariner 2.0\nAdded kured to CBL-Mariner 2.0\nAdded cni to Azure Linux 3.0\nAdded multus to Azure Linux 3.0\nAdded keda to Azure Linux 3.0\nAdded kubevirt to Azure Linux 3.0\nAdded sriov-network-device-plugin to Azure Linux 3.0\nAdded node-problem-detector to Azure Linux 3.0"
},
{
"date": "2025-04-22T00:00:00.000Z",
"legacy_version": "22.9",
"number": "220",
"summary": "Added application-gateway-kubernetes-ingress to CBL-Mariner 2.0\nAdded containerized-data-importer to CBL-Mariner 2.0\nAdded keda to CBL-Mariner 2.0\nAdded kubevirt to CBL-Mariner 2.0\nAdded libcontainers-common to CBL-Mariner 2.0\nAdded prometheus-adapter to CBL-Mariner 2.0\nAdded gh to CBL-Mariner 2.0\nAdded terraform to CBL-Mariner 2.0\nAdded cf-cli to CBL-Mariner 2.0\nAdded influxdb to CBL-Mariner 2.0\nAdded git-lfs to CBL-Mariner 2.0\nAdded node-problem-detector to CBL-Mariner 2.0\nAdded sriov-network-device-plugin to CBL-Mariner 2.0\nAdded kured to CBL-Mariner 2.0\nAdded cni to Azure Linux 3.0\nAdded multus to Azure Linux 3.0\nAdded keda to Azure Linux 3.0\nAdded kubevirt to Azure Linux 3.0\nAdded sriov-network-device-plugin to Azure Linux 3.0\nAdded node-problem-detector to Azure Linux 3.0"
},
{
"date": "2025-04-23T00:00:00.000Z",
"legacy_version": "23",
"number": "221",
"summary": "Added application-gateway-kubernetes-ingress to CBL-Mariner 2.0\nAdded containerized-data-importer to CBL-Mariner 2.0\nAdded keda to CBL-Mariner 2.0\nAdded kubevirt to CBL-Mariner 2.0\nAdded libcontainers-common to CBL-Mariner 2.0\nAdded prometheus-adapter to CBL-Mariner 2.0\nAdded gh to CBL-Mariner 2.0\nAdded terraform to CBL-Mariner 2.0\nAdded cf-cli to CBL-Mariner 2.0\nAdded influxdb to CBL-Mariner 2.0\nAdded git-lfs to CBL-Mariner 2.0\nAdded node-problem-detector to CBL-Mariner 2.0\nAdded sriov-network-device-plugin to CBL-Mariner 2.0\nAdded kured to CBL-Mariner 2.0\nAdded cni to Azure Linux 3.0\nAdded multus to Azure Linux 3.0\nAdded keda to Azure Linux 3.0\nAdded kubevirt to Azure Linux 3.0\nAdded sriov-network-device-plugin to Azure Linux 3.0\nAdded node-problem-detector to Azure Linux 3.0"
},
{
"date": "2025-04-24T00:00:00.000Z",
"legacy_version": "23.1",
"number": "222",
"summary": "Added application-gateway-kubernetes-ingress to CBL-Mariner 2.0\nAdded containerized-data-importer to CBL-Mariner 2.0\nAdded keda to CBL-Mariner 2.0\nAdded kubevirt to CBL-Mariner 2.0\nAdded libcontainers-common to CBL-Mariner 2.0\nAdded prometheus-adapter to CBL-Mariner 2.0\nAdded gh to CBL-Mariner 2.0\nAdded terraform to CBL-Mariner 2.0\nAdded cf-cli to CBL-Mariner 2.0\nAdded influxdb to CBL-Mariner 2.0\nAdded git-lfs to CBL-Mariner 2.0\nAdded node-problem-detector to CBL-Mariner 2.0\nAdded sriov-network-device-plugin to CBL-Mariner 2.0\nAdded kured to CBL-Mariner 2.0\nAdded cni to Azure Linux 3.0\nAdded multus to Azure Linux 3.0\nAdded keda to Azure Linux 3.0\nAdded kubevirt to Azure Linux 3.0\nAdded sriov-network-device-plugin to Azure Linux 3.0\nAdded node-problem-detector to Azure Linux 3.0"
},
{
"date": "2025-04-25T00:00:00.000Z",
"legacy_version": "23.2",
"number": "223",
"summary": "Added application-gateway-kubernetes-ingress to CBL-Mariner 2.0\nAdded containerized-data-importer to CBL-Mariner 2.0\nAdded keda to CBL-Mariner 2.0\nAdded kubevirt to CBL-Mariner 2.0\nAdded libcontainers-common to CBL-Mariner 2.0\nAdded prometheus-adapter to CBL-Mariner 2.0\nAdded gh to CBL-Mariner 2.0\nAdded terraform to CBL-Mariner 2.0\nAdded cf-cli to CBL-Mariner 2.0\nAdded influxdb to CBL-Mariner 2.0\nAdded git-lfs to CBL-Mariner 2.0\nAdded node-problem-detector to CBL-Mariner 2.0\nAdded sriov-network-device-plugin to CBL-Mariner 2.0\nAdded kured to CBL-Mariner 2.0\nAdded cni to Azure Linux 3.0\nAdded multus to Azure Linux 3.0\nAdded keda to Azure Linux 3.0\nAdded kubevirt to Azure Linux 3.0\nAdded sriov-network-device-plugin to Azure Linux 3.0\nAdded node-problem-detector to Azure Linux 3.0"
},
{
"date": "2025-04-26T00:00:00.000Z",
"legacy_version": "23.3",
"number": "224",
"summary": "Added application-gateway-kubernetes-ingress to CBL-Mariner 2.0\nAdded containerized-data-importer to CBL-Mariner 2.0\nAdded keda to CBL-Mariner 2.0\nAdded kubevirt to CBL-Mariner 2.0\nAdded libcontainers-common to CBL-Mariner 2.0\nAdded prometheus-adapter to CBL-Mariner 2.0\nAdded gh to CBL-Mariner 2.0\nAdded terraform to CBL-Mariner 2.0\nAdded cf-cli to CBL-Mariner 2.0\nAdded influxdb to CBL-Mariner 2.0\nAdded git-lfs to CBL-Mariner 2.0\nAdded node-problem-detector to CBL-Mariner 2.0\nAdded sriov-network-device-plugin to CBL-Mariner 2.0\nAdded kured to CBL-Mariner 2.0\nAdded cni to Azure Linux 3.0\nAdded multus to Azure Linux 3.0\nAdded keda to Azure Linux 3.0\nAdded kubevirt to Azure Linux 3.0\nAdded sriov-network-device-plugin to Azure Linux 3.0\nAdded node-problem-detector to Azure Linux 3.0"
},
{
"date": "2025-04-28T00:00:00.000Z",
"legacy_version": "23.4",
"number": "225",
"summary": "Added application-gateway-kubernetes-ingress to CBL-Mariner 2.0\nAdded containerized-data-importer to CBL-Mariner 2.0\nAdded keda to CBL-Mariner 2.0\nAdded kubevirt to CBL-Mariner 2.0\nAdded libcontainers-common to CBL-Mariner 2.0\nAdded prometheus-adapter to CBL-Mariner 2.0\nAdded gh to CBL-Mariner 2.0\nAdded terraform to CBL-Mariner 2.0\nAdded cf-cli to CBL-Mariner 2.0\nAdded influxdb to CBL-Mariner 2.0\nAdded git-lfs to CBL-Mariner 2.0\nAdded node-problem-detector to CBL-Mariner 2.0\nAdded sriov-network-device-plugin to CBL-Mariner 2.0\nAdded kured to CBL-Mariner 2.0\nAdded cni to Azure Linux 3.0\nAdded multus to Azure Linux 3.0\nAdded keda to Azure Linux 3.0\nAdded kubevirt to Azure Linux 3.0\nAdded sriov-network-device-plugin to Azure Linux 3.0\nAdded node-problem-detector to Azure Linux 3.0"
},
{
"date": "2025-04-29T00:00:00.000Z",
"legacy_version": "23.5",
"number": "226",
"summary": "Added application-gateway-kubernetes-ingress to CBL-Mariner 2.0\nAdded containerized-data-importer to CBL-Mariner 2.0\nAdded keda to CBL-Mariner 2.0\nAdded kubevirt to CBL-Mariner 2.0\nAdded libcontainers-common to CBL-Mariner 2.0\nAdded prometheus-adapter to CBL-Mariner 2.0\nAdded gh to CBL-Mariner 2.0\nAdded terraform to CBL-Mariner 2.0\nAdded cf-cli to CBL-Mariner 2.0\nAdded influxdb to CBL-Mariner 2.0\nAdded git-lfs to CBL-Mariner 2.0\nAdded node-problem-detector to CBL-Mariner 2.0\nAdded sriov-network-device-plugin to CBL-Mariner 2.0\nAdded kured to CBL-Mariner 2.0\nAdded cni to Azure Linux 3.0\nAdded multus to Azure Linux 3.0\nAdded keda to Azure Linux 3.0\nAdded kubevirt to Azure Linux 3.0\nAdded sriov-network-device-plugin to Azure Linux 3.0\nAdded node-problem-detector to Azure Linux 3.0"
},
{
"date": "2025-04-30T00:00:00.000Z",
"legacy_version": "23.6",
"number": "227",
"summary": "Added application-gateway-kubernetes-ingress to CBL-Mariner 2.0\nAdded containerized-data-importer to CBL-Mariner 2.0\nAdded keda to CBL-Mariner 2.0\nAdded kubevirt to CBL-Mariner 2.0\nAdded libcontainers-common to CBL-Mariner 2.0\nAdded prometheus-adapter to CBL-Mariner 2.0\nAdded gh to CBL-Mariner 2.0\nAdded terraform to CBL-Mariner 2.0\nAdded cf-cli to CBL-Mariner 2.0\nAdded influxdb to CBL-Mariner 2.0\nAdded git-lfs to CBL-Mariner 2.0\nAdded node-problem-detector to CBL-Mariner 2.0\nAdded sriov-network-device-plugin to CBL-Mariner 2.0\nAdded kured to CBL-Mariner 2.0\nAdded cni to Azure Linux 3.0\nAdded multus to Azure Linux 3.0\nAdded keda to Azure Linux 3.0\nAdded kubevirt to Azure Linux 3.0\nAdded sriov-network-device-plugin to Azure Linux 3.0\nAdded node-problem-detector to Azure Linux 3.0"
},
{
"date": "2025-05-02T00:00:00.000Z",
"legacy_version": "23.7",
"number": "228",
"summary": "Added application-gateway-kubernetes-ingress to CBL-Mariner 2.0\nAdded containerized-data-importer to CBL-Mariner 2.0\nAdded keda to CBL-Mariner 2.0\nAdded kubevirt to CBL-Mariner 2.0\nAdded libcontainers-common to CBL-Mariner 2.0\nAdded prometheus-adapter to CBL-Mariner 2.0\nAdded gh to CBL-Mariner 2.0\nAdded terraform to CBL-Mariner 2.0\nAdded cf-cli to CBL-Mariner 2.0\nAdded influxdb to CBL-Mariner 2.0\nAdded git-lfs to CBL-Mariner 2.0\nAdded node-problem-detector to CBL-Mariner 2.0\nAdded sriov-network-device-plugin to CBL-Mariner 2.0\nAdded kured to CBL-Mariner 2.0\nAdded cni to Azure Linux 3.0\nAdded multus to Azure Linux 3.0\nAdded keda to Azure Linux 3.0\nAdded kubevirt to Azure Linux 3.0\nAdded sriov-network-device-plugin to Azure Linux 3.0\nAdded node-problem-detector to Azure Linux 3.0"
},
{
"date": "2025-05-03T00:00:00.000Z",
"legacy_version": "23.8",
"number": "229",
"summary": "Added application-gateway-kubernetes-ingress to CBL-Mariner 2.0\nAdded containerized-data-importer to CBL-Mariner 2.0\nAdded keda to CBL-Mariner 2.0\nAdded kubevirt to CBL-Mariner 2.0\nAdded libcontainers-common to CBL-Mariner 2.0\nAdded prometheus-adapter to CBL-Mariner 2.0\nAdded gh to CBL-Mariner 2.0\nAdded terraform to CBL-Mariner 2.0\nAdded cf-cli to CBL-Mariner 2.0\nAdded influxdb to CBL-Mariner 2.0\nAdded git-lfs to CBL-Mariner 2.0\nAdded node-problem-detector to CBL-Mariner 2.0\nAdded sriov-network-device-plugin to CBL-Mariner 2.0\nAdded kured to CBL-Mariner 2.0\nAdded cni to Azure Linux 3.0\nAdded multus to Azure Linux 3.0\nAdded keda to Azure Linux 3.0\nAdded kubevirt to Azure Linux 3.0\nAdded sriov-network-device-plugin to Azure Linux 3.0\nAdded node-problem-detector to Azure Linux 3.0"
},
{
"date": "2025-05-04T00:00:00.000Z",
"legacy_version": "23.9",
"number": "230",
"summary": "Added application-gateway-kubernetes-ingress to CBL-Mariner 2.0\nAdded containerized-data-importer to CBL-Mariner 2.0\nAdded keda to CBL-Mariner 2.0\nAdded kubevirt to CBL-Mariner 2.0\nAdded libcontainers-common to CBL-Mariner 2.0\nAdded prometheus-adapter to CBL-Mariner 2.0\nAdded gh to CBL-Mariner 2.0\nAdded terraform to CBL-Mariner 2.0\nAdded cf-cli to CBL-Mariner 2.0\nAdded influxdb to CBL-Mariner 2.0\nAdded git-lfs to CBL-Mariner 2.0\nAdded node-problem-detector to CBL-Mariner 2.0\nAdded sriov-network-device-plugin to CBL-Mariner 2.0\nAdded kured to CBL-Mariner 2.0\nAdded cni to Azure Linux 3.0\nAdded multus to Azure Linux 3.0\nAdded keda to Azure Linux 3.0\nAdded kubevirt to Azure Linux 3.0\nAdded sriov-network-device-plugin to Azure Linux 3.0\nAdded node-problem-detector to Azure Linux 3.0"
},
{
"date": "2025-05-05T00:00:00.000Z",
"legacy_version": "24",
"number": "231",
"summary": "Added application-gateway-kubernetes-ingress to CBL-Mariner 2.0\nAdded containerized-data-importer to CBL-Mariner 2.0\nAdded keda to CBL-Mariner 2.0\nAdded kubevirt to CBL-Mariner 2.0\nAdded libcontainers-common to CBL-Mariner 2.0\nAdded prometheus-adapter to CBL-Mariner 2.0\nAdded gh to CBL-Mariner 2.0\nAdded terraform to CBL-Mariner 2.0\nAdded cf-cli to CBL-Mariner 2.0\nAdded influxdb to CBL-Mariner 2.0\nAdded git-lfs to CBL-Mariner 2.0\nAdded node-problem-detector to CBL-Mariner 2.0\nAdded sriov-network-device-plugin to CBL-Mariner 2.0\nAdded kured to CBL-Mariner 2.0\nAdded cni to Azure Linux 3.0\nAdded multus to Azure Linux 3.0\nAdded keda to Azure Linux 3.0\nAdded kubevirt to Azure Linux 3.0\nAdded sriov-network-device-plugin to Azure Linux 3.0\nAdded node-problem-detector to Azure Linux 3.0"
},
{
"date": "2025-05-06T00:00:00.000Z",
"legacy_version": "24.1",
"number": "232",
"summary": "Added application-gateway-kubernetes-ingress to CBL-Mariner 2.0\nAdded containerized-data-importer to CBL-Mariner 2.0\nAdded keda to CBL-Mariner 2.0\nAdded kubevirt to CBL-Mariner 2.0\nAdded libcontainers-common to CBL-Mariner 2.0\nAdded prometheus-adapter to CBL-Mariner 2.0\nAdded gh to CBL-Mariner 2.0\nAdded terraform to CBL-Mariner 2.0\nAdded cf-cli to CBL-Mariner 2.0\nAdded influxdb to CBL-Mariner 2.0\nAdded git-lfs to CBL-Mariner 2.0\nAdded node-problem-detector to CBL-Mariner 2.0\nAdded sriov-network-device-plugin to CBL-Mariner 2.0\nAdded kured to CBL-Mariner 2.0\nAdded cni to Azure Linux 3.0\nAdded multus to Azure Linux 3.0\nAdded keda to Azure Linux 3.0\nAdded kubevirt to Azure Linux 3.0\nAdded sriov-network-device-plugin to Azure Linux 3.0\nAdded node-problem-detector to Azure Linux 3.0"
},
{
"date": "2025-05-07T00:00:00.000Z",
"legacy_version": "24.2",
"number": "233",
"summary": "Added application-gateway-kubernetes-ingress to CBL-Mariner 2.0\nAdded containerized-data-importer to CBL-Mariner 2.0\nAdded keda to CBL-Mariner 2.0\nAdded kubevirt to CBL-Mariner 2.0\nAdded libcontainers-common to CBL-Mariner 2.0\nAdded prometheus-adapter to CBL-Mariner 2.0\nAdded gh to CBL-Mariner 2.0\nAdded terraform to CBL-Mariner 2.0\nAdded cf-cli to CBL-Mariner 2.0\nAdded influxdb to CBL-Mariner 2.0\nAdded git-lfs to CBL-Mariner 2.0\nAdded node-problem-detector to CBL-Mariner 2.0\nAdded sriov-network-device-plugin to CBL-Mariner 2.0\nAdded kured to CBL-Mariner 2.0\nAdded cni to Azure Linux 3.0\nAdded multus to Azure Linux 3.0\nAdded keda to Azure Linux 3.0\nAdded kubevirt to Azure Linux 3.0\nAdded sriov-network-device-plugin to Azure Linux 3.0\nAdded node-problem-detector to Azure Linux 3.0"
},
{
"date": "2025-05-08T00:00:00.000Z",
"legacy_version": "24.3",
"number": "234",
"summary": "Added application-gateway-kubernetes-ingress to CBL-Mariner 2.0\nAdded containerized-data-importer to CBL-Mariner 2.0\nAdded keda to CBL-Mariner 2.0\nAdded kubevirt to CBL-Mariner 2.0\nAdded libcontainers-common to CBL-Mariner 2.0\nAdded prometheus-adapter to CBL-Mariner 2.0\nAdded gh to CBL-Mariner 2.0\nAdded terraform to CBL-Mariner 2.0\nAdded cf-cli to CBL-Mariner 2.0\nAdded influxdb to CBL-Mariner 2.0\nAdded git-lfs to CBL-Mariner 2.0\nAdded node-problem-detector to CBL-Mariner 2.0\nAdded sriov-network-device-plugin to CBL-Mariner 2.0\nAdded kured to CBL-Mariner 2.0\nAdded cni to Azure Linux 3.0\nAdded multus to Azure Linux 3.0\nAdded keda to Azure Linux 3.0\nAdded kubevirt to Azure Linux 3.0\nAdded sriov-network-device-plugin to Azure Linux 3.0\nAdded node-problem-detector to Azure Linux 3.0"
},
{
"date": "2025-05-09T00:00:00.000Z",
"legacy_version": "24.4",
"number": "235",
"summary": "Added application-gateway-kubernetes-ingress to CBL-Mariner 2.0\nAdded containerized-data-importer to CBL-Mariner 2.0\nAdded keda to CBL-Mariner 2.0\nAdded kubevirt to CBL-Mariner 2.0\nAdded libcontainers-common to CBL-Mariner 2.0\nAdded prometheus-adapter to CBL-Mariner 2.0\nAdded gh to CBL-Mariner 2.0\nAdded terraform to CBL-Mariner 2.0\nAdded cf-cli to CBL-Mariner 2.0\nAdded influxdb to CBL-Mariner 2.0\nAdded git-lfs to CBL-Mariner 2.0\nAdded node-problem-detector to CBL-Mariner 2.0\nAdded sriov-network-device-plugin to CBL-Mariner 2.0\nAdded kured to CBL-Mariner 2.0\nAdded cni to Azure Linux 3.0\nAdded multus to Azure Linux 3.0\nAdded keda to Azure Linux 3.0\nAdded kubevirt to Azure Linux 3.0\nAdded sriov-network-device-plugin to Azure Linux 3.0\nAdded node-problem-detector to Azure Linux 3.0"
},
{
"date": "2025-05-10T00:00:00.000Z",
"legacy_version": "24.5",
"number": "236",
"summary": "Added application-gateway-kubernetes-ingress to CBL-Mariner 2.0\nAdded containerized-data-importer to CBL-Mariner 2.0\nAdded keda to CBL-Mariner 2.0\nAdded kubevirt to CBL-Mariner 2.0\nAdded libcontainers-common to CBL-Mariner 2.0\nAdded prometheus-adapter to CBL-Mariner 2.0\nAdded gh to CBL-Mariner 2.0\nAdded terraform to CBL-Mariner 2.0\nAdded cf-cli to CBL-Mariner 2.0\nAdded influxdb to CBL-Mariner 2.0\nAdded git-lfs to CBL-Mariner 2.0\nAdded node-problem-detector to CBL-Mariner 2.0\nAdded sriov-network-device-plugin to CBL-Mariner 2.0\nAdded kured to CBL-Mariner 2.0\nAdded cni to Azure Linux 3.0\nAdded multus to Azure Linux 3.0\nAdded keda to Azure Linux 3.0\nAdded kubevirt to Azure Linux 3.0\nAdded sriov-network-device-plugin to Azure Linux 3.0\nAdded node-problem-detector to Azure Linux 3.0"
},
{
"date": "2025-05-11T00:00:00.000Z",
"legacy_version": "24.6",
"number": "237",
"summary": "Added application-gateway-kubernetes-ingress to CBL-Mariner 2.0\nAdded containerized-data-importer to CBL-Mariner 2.0\nAdded keda to CBL-Mariner 2.0\nAdded kubevirt to CBL-Mariner 2.0\nAdded libcontainers-common to CBL-Mariner 2.0\nAdded prometheus-adapter to CBL-Mariner 2.0\nAdded gh to CBL-Mariner 2.0\nAdded terraform to CBL-Mariner 2.0\nAdded cf-cli to CBL-Mariner 2.0\nAdded influxdb to CBL-Mariner 2.0\nAdded git-lfs to CBL-Mariner 2.0\nAdded node-problem-detector to CBL-Mariner 2.0\nAdded sriov-network-device-plugin to CBL-Mariner 2.0\nAdded kured to CBL-Mariner 2.0\nAdded cni to Azure Linux 3.0\nAdded multus to Azure Linux 3.0\nAdded keda to Azure Linux 3.0\nAdded kubevirt to Azure Linux 3.0\nAdded sriov-network-device-plugin to Azure Linux 3.0\nAdded node-problem-detector to Azure Linux 3.0"
},
{
"date": "2025-05-12T00:00:00.000Z",
"legacy_version": "24.7",
"number": "238",
"summary": "Added application-gateway-kubernetes-ingress to CBL-Mariner 2.0\nAdded containerized-data-importer to CBL-Mariner 2.0\nAdded keda to CBL-Mariner 2.0\nAdded kubevirt to CBL-Mariner 2.0\nAdded libcontainers-common to CBL-Mariner 2.0\nAdded prometheus-adapter to CBL-Mariner 2.0\nAdded gh to CBL-Mariner 2.0\nAdded terraform to CBL-Mariner 2.0\nAdded cf-cli to CBL-Mariner 2.0\nAdded influxdb to CBL-Mariner 2.0\nAdded git-lfs to CBL-Mariner 2.0\nAdded node-problem-detector to CBL-Mariner 2.0\nAdded sriov-network-device-plugin to CBL-Mariner 2.0\nAdded kured to CBL-Mariner 2.0\nAdded cni to Azure Linux 3.0\nAdded multus to Azure Linux 3.0\nAdded keda to Azure Linux 3.0\nAdded kubevirt to Azure Linux 3.0\nAdded sriov-network-device-plugin to Azure Linux 3.0\nAdded node-problem-detector to Azure Linux 3.0"
},
{
"date": "2025-05-13T00:00:00.000Z",
"legacy_version": "24.8",
"number": "239",
"summary": "Added application-gateway-kubernetes-ingress to CBL-Mariner 2.0\nAdded containerized-data-importer to CBL-Mariner 2.0\nAdded keda to CBL-Mariner 2.0\nAdded kubevirt to CBL-Mariner 2.0\nAdded libcontainers-common to CBL-Mariner 2.0\nAdded prometheus-adapter to CBL-Mariner 2.0\nAdded gh to CBL-Mariner 2.0\nAdded terraform to CBL-Mariner 2.0\nAdded cf-cli to CBL-Mariner 2.0\nAdded influxdb to CBL-Mariner 2.0\nAdded git-lfs to CBL-Mariner 2.0\nAdded node-problem-detector to CBL-Mariner 2.0\nAdded sriov-network-device-plugin to CBL-Mariner 2.0\nAdded kured to CBL-Mariner 2.0\nAdded cni to Azure Linux 3.0\nAdded multus to Azure Linux 3.0\nAdded keda to Azure Linux 3.0\nAdded kubevirt to Azure Linux 3.0\nAdded sriov-network-device-plugin to Azure Linux 3.0\nAdded node-problem-detector to Azure Linux 3.0"
},
{
"date": "2025-05-14T00:00:00.000Z",
"legacy_version": "24.9",
"number": "240",
"summary": "Added application-gateway-kubernetes-ingress to CBL-Mariner 2.0\nAdded containerized-data-importer to CBL-Mariner 2.0\nAdded keda to CBL-Mariner 2.0\nAdded kubevirt to CBL-Mariner 2.0\nAdded libcontainers-common to CBL-Mariner 2.0\nAdded prometheus-adapter to CBL-Mariner 2.0\nAdded gh to CBL-Mariner 2.0\nAdded terraform to CBL-Mariner 2.0\nAdded cf-cli to CBL-Mariner 2.0\nAdded influxdb to CBL-Mariner 2.0\nAdded git-lfs to CBL-Mariner 2.0\nAdded node-problem-detector to CBL-Mariner 2.0\nAdded sriov-network-device-plugin to CBL-Mariner 2.0\nAdded kured to CBL-Mariner 2.0\nAdded cni to Azure Linux 3.0\nAdded multus to Azure Linux 3.0\nAdded keda to Azure Linux 3.0\nAdded kubevirt to Azure Linux 3.0\nAdded sriov-network-device-plugin to Azure Linux 3.0\nAdded node-problem-detector to Azure Linux 3.0"
},
{
"date": "2025-05-15T00:00:00.000Z",
"legacy_version": "25",
"number": "241",
"summary": "Added application-gateway-kubernetes-ingress to CBL-Mariner 2.0\nAdded containerized-data-importer to CBL-Mariner 2.0\nAdded keda to CBL-Mariner 2.0\nAdded kubevirt to CBL-Mariner 2.0\nAdded libcontainers-common to CBL-Mariner 2.0\nAdded prometheus-adapter to CBL-Mariner 2.0\nAdded gh to CBL-Mariner 2.0\nAdded terraform to CBL-Mariner 2.0\nAdded cf-cli to CBL-Mariner 2.0\nAdded influxdb to CBL-Mariner 2.0\nAdded git-lfs to CBL-Mariner 2.0\nAdded node-problem-detector to CBL-Mariner 2.0\nAdded sriov-network-device-plugin to CBL-Mariner 2.0\nAdded kured to CBL-Mariner 2.0\nAdded containernetworking-plugins to Azure Linux 3.0\nAdded cni to Azure Linux 3.0\nAdded multus to Azure Linux 3.0\nAdded keda to Azure Linux 3.0\nAdded kubevirt to Azure Linux 3.0\nAdded sriov-network-device-plugin to Azure Linux 3.0\nAdded node-problem-detector to Azure Linux 3.0"
},
{
"date": "2025-05-16T00:00:00.000Z",
"legacy_version": "25.1",
"number": "242",
"summary": "Added application-gateway-kubernetes-ingress to CBL-Mariner 2.0\nAdded containerized-data-importer to CBL-Mariner 2.0\nAdded keda to CBL-Mariner 2.0\nAdded kubevirt to CBL-Mariner 2.0\nAdded libcontainers-common to CBL-Mariner 2.0\nAdded prometheus-adapter to CBL-Mariner 2.0\nAdded gh to CBL-Mariner 2.0\nAdded terraform to CBL-Mariner 2.0\nAdded cf-cli to CBL-Mariner 2.0\nAdded influxdb to CBL-Mariner 2.0\nAdded git-lfs to CBL-Mariner 2.0\nAdded node-problem-detector to CBL-Mariner 2.0\nAdded sriov-network-device-plugin to CBL-Mariner 2.0\nAdded kured to CBL-Mariner 2.0\nAdded containernetworking-plugins to Azure Linux 3.0\nAdded cni to Azure Linux 3.0\nAdded multus to Azure Linux 3.0\nAdded keda to Azure Linux 3.0\nAdded kubevirt to Azure Linux 3.0\nAdded sriov-network-device-plugin to Azure Linux 3.0\nAdded node-problem-detector to Azure Linux 3.0"
},
{
"date": "2025-05-17T00:00:00.000Z",
"legacy_version": "25.2",
"number": "243",
"summary": "Added application-gateway-kubernetes-ingress to CBL-Mariner 2.0\nAdded containerized-data-importer to CBL-Mariner 2.0\nAdded keda to CBL-Mariner 2.0\nAdded kubevirt to CBL-Mariner 2.0\nAdded libcontainers-common to CBL-Mariner 2.0\nAdded prometheus-adapter to CBL-Mariner 2.0\nAdded gh to CBL-Mariner 2.0\nAdded terraform to CBL-Mariner 2.0\nAdded cf-cli to CBL-Mariner 2.0\nAdded influxdb to CBL-Mariner 2.0\nAdded git-lfs to CBL-Mariner 2.0\nAdded node-problem-detector to CBL-Mariner 2.0\nAdded sriov-network-device-plugin to CBL-Mariner 2.0\nAdded kured to CBL-Mariner 2.0\nAdded containernetworking-plugins to Azure Linux 3.0\nAdded cni to Azure Linux 3.0\nAdded multus to Azure Linux 3.0\nAdded keda to Azure Linux 3.0\nAdded kubevirt to Azure Linux 3.0\nAdded sriov-network-device-plugin to Azure Linux 3.0\nAdded node-problem-detector to Azure Linux 3.0"
},
{
"date": "2025-05-18T00:00:00.000Z",
"legacy_version": "25.3",
"number": "244",
"summary": "Added application-gateway-kubernetes-ingress to CBL-Mariner 2.0\nAdded containerized-data-importer to CBL-Mariner 2.0\nAdded keda to CBL-Mariner 2.0\nAdded kubevirt to CBL-Mariner 2.0\nAdded libcontainers-common to CBL-Mariner 2.0\nAdded prometheus-adapter to CBL-Mariner 2.0\nAdded gh to CBL-Mariner 2.0\nAdded terraform to CBL-Mariner 2.0\nAdded cf-cli to CBL-Mariner 2.0\nAdded influxdb to CBL-Mariner 2.0\nAdded git-lfs to CBL-Mariner 2.0\nAdded node-problem-detector to CBL-Mariner 2.0\nAdded sriov-network-device-plugin to CBL-Mariner 2.0\nAdded kured to CBL-Mariner 2.0\nAdded containernetworking-plugins to Azure Linux 3.0\nAdded cni to Azure Linux 3.0\nAdded multus to Azure Linux 3.0\nAdded keda to Azure Linux 3.0\nAdded kubevirt to Azure Linux 3.0\nAdded sriov-network-device-plugin to Azure Linux 3.0\nAdded node-problem-detector to Azure Linux 3.0"
},
{
"date": "2025-05-19T00:00:00.000Z",
"legacy_version": "25.4",
"number": "245",
"summary": "Added application-gateway-kubernetes-ingress to CBL-Mariner 2.0\nAdded containerized-data-importer to CBL-Mariner 2.0\nAdded keda to CBL-Mariner 2.0\nAdded kubevirt to CBL-Mariner 2.0\nAdded libcontainers-common to CBL-Mariner 2.0\nAdded prometheus-adapter to CBL-Mariner 2.0\nAdded gh to CBL-Mariner 2.0\nAdded terraform to CBL-Mariner 2.0\nAdded cf-cli to CBL-Mariner 2.0\nAdded influxdb to CBL-Mariner 2.0\nAdded git-lfs to CBL-Mariner 2.0\nAdded node-problem-detector to CBL-Mariner 2.0\nAdded sriov-network-device-plugin to CBL-Mariner 2.0\nAdded kured to CBL-Mariner 2.0\nAdded containernetworking-plugins to Azure Linux 3.0\nAdded cni to Azure Linux 3.0\nAdded multus to Azure Linux 3.0\nAdded keda to Azure Linux 3.0\nAdded kubevirt to Azure Linux 3.0\nAdded sriov-network-device-plugin to Azure Linux 3.0\nAdded node-problem-detector to Azure Linux 3.0"
},
{
"date": "2025-05-20T00:00:00.000Z",
"legacy_version": "25.5",
"number": "246",
"summary": "Added application-gateway-kubernetes-ingress to CBL-Mariner 2.0\nAdded containerized-data-importer to CBL-Mariner 2.0\nAdded keda to CBL-Mariner 2.0\nAdded kubevirt to CBL-Mariner 2.0\nAdded libcontainers-common to CBL-Mariner 2.0\nAdded prometheus-adapter to CBL-Mariner 2.0\nAdded gh to CBL-Mariner 2.0\nAdded terraform to CBL-Mariner 2.0\nAdded cf-cli to CBL-Mariner 2.0\nAdded influxdb to CBL-Mariner 2.0\nAdded git-lfs to CBL-Mariner 2.0\nAdded node-problem-detector to CBL-Mariner 2.0\nAdded sriov-network-device-plugin to CBL-Mariner 2.0\nAdded kured to CBL-Mariner 2.0\nAdded containernetworking-plugins to Azure Linux 3.0\nAdded cni to Azure Linux 3.0\nAdded multus to Azure Linux 3.0\nAdded keda to Azure Linux 3.0\nAdded kubevirt to Azure Linux 3.0\nAdded sriov-network-device-plugin to Azure Linux 3.0\nAdded node-problem-detector to Azure Linux 3.0"
},
{
"date": "2025-05-21T00:00:00.000Z",
"legacy_version": "25.6",
"number": "247",
"summary": "Added application-gateway-kubernetes-ingress to CBL-Mariner 2.0\nAdded containerized-data-importer to CBL-Mariner 2.0\nAdded keda to CBL-Mariner 2.0\nAdded kubevirt to CBL-Mariner 2.0\nAdded libcontainers-common to CBL-Mariner 2.0\nAdded prometheus-adapter to CBL-Mariner 2.0\nAdded gh to CBL-Mariner 2.0\nAdded terraform to CBL-Mariner 2.0\nAdded cf-cli to CBL-Mariner 2.0\nAdded influxdb to CBL-Mariner 2.0\nAdded git-lfs to CBL-Mariner 2.0\nAdded node-problem-detector to CBL-Mariner 2.0\nAdded sriov-network-device-plugin to CBL-Mariner 2.0\nAdded kured to CBL-Mariner 2.0\nAdded containernetworking-plugins to Azure Linux 3.0\nAdded cni to Azure Linux 3.0\nAdded multus to Azure Linux 3.0\nAdded keda to Azure Linux 3.0\nAdded kubevirt to Azure Linux 3.0\nAdded sriov-network-device-plugin to Azure Linux 3.0\nAdded node-problem-detector to Azure Linux 3.0"
},
{
"date": "2025-05-22T00:00:00.000Z",
"legacy_version": "25.7",
"number": "248",
"summary": "Added application-gateway-kubernetes-ingress to CBL-Mariner 2.0\nAdded containerized-data-importer to CBL-Mariner 2.0\nAdded keda to CBL-Mariner 2.0\nAdded kubevirt to CBL-Mariner 2.0\nAdded libcontainers-common to CBL-Mariner 2.0\nAdded prometheus-adapter to CBL-Mariner 2.0\nAdded gh to CBL-Mariner 2.0\nAdded terraform to CBL-Mariner 2.0\nAdded cf-cli to CBL-Mariner 2.0\nAdded influxdb to CBL-Mariner 2.0\nAdded git-lfs to CBL-Mariner 2.0\nAdded node-problem-detector to CBL-Mariner 2.0\nAdded sriov-network-device-plugin to CBL-Mariner 2.0\nAdded kured to CBL-Mariner 2.0\nAdded containernetworking-plugins to Azure Linux 3.0\nAdded cni to Azure Linux 3.0\nAdded multus to Azure Linux 3.0\nAdded keda to Azure Linux 3.0\nAdded kubevirt to Azure Linux 3.0\nAdded sriov-network-device-plugin to Azure Linux 3.0\nAdded node-problem-detector to Azure Linux 3.0"
},
{
"date": "2025-05-23T00:00:00.000Z",
"legacy_version": "25.8",
"number": "249",
"summary": "Added application-gateway-kubernetes-ingress to CBL-Mariner 2.0\nAdded containerized-data-importer to CBL-Mariner 2.0\nAdded keda to CBL-Mariner 2.0\nAdded kubevirt to CBL-Mariner 2.0\nAdded libcontainers-common to CBL-Mariner 2.0\nAdded prometheus-adapter to CBL-Mariner 2.0\nAdded gh to CBL-Mariner 2.0\nAdded terraform to CBL-Mariner 2.0\nAdded cf-cli to CBL-Mariner 2.0\nAdded influxdb to CBL-Mariner 2.0\nAdded git-lfs to CBL-Mariner 2.0\nAdded node-problem-detector to CBL-Mariner 2.0\nAdded sriov-network-device-plugin to CBL-Mariner 2.0\nAdded kured to CBL-Mariner 2.0\nAdded containernetworking-plugins to Azure Linux 3.0\nAdded cni to Azure Linux 3.0\nAdded multus to Azure Linux 3.0\nAdded keda to Azure Linux 3.0\nAdded kubevirt to Azure Linux 3.0\nAdded sriov-network-device-plugin to Azure Linux 3.0\nAdded node-problem-detector to Azure Linux 3.0"
},
{
"date": "2025-05-24T00:00:00.000Z",
"legacy_version": "25.9",
"number": "250",
"summary": "Added application-gateway-kubernetes-ingress to CBL-Mariner 2.0\nAdded containerized-data-importer to CBL-Mariner 2.0\nAdded keda to CBL-Mariner 2.0\nAdded kubevirt to CBL-Mariner 2.0\nAdded libcontainers-common to CBL-Mariner 2.0\nAdded prometheus-adapter to CBL-Mariner 2.0\nAdded gh to CBL-Mariner 2.0\nAdded terraform to CBL-Mariner 2.0\nAdded cf-cli to CBL-Mariner 2.0\nAdded influxdb to CBL-Mariner 2.0\nAdded git-lfs to CBL-Mariner 2.0\nAdded node-problem-detector to CBL-Mariner 2.0\nAdded sriov-network-device-plugin to CBL-Mariner 2.0\nAdded kured to CBL-Mariner 2.0\nAdded containernetworking-plugins to Azure Linux 3.0\nAdded cni to Azure Linux 3.0\nAdded multus to Azure Linux 3.0\nAdded keda to Azure Linux 3.0\nAdded kubevirt to Azure Linux 3.0\nAdded sriov-network-device-plugin to Azure Linux 3.0\nAdded node-problem-detector to Azure Linux 3.0"
},
{
"date": "2025-05-25T00:00:00.000Z",
"legacy_version": "26",
"number": "251",
"summary": "Added application-gateway-kubernetes-ingress to CBL-Mariner 2.0\nAdded containerized-data-importer to CBL-Mariner 2.0\nAdded keda to CBL-Mariner 2.0\nAdded kubevirt to CBL-Mariner 2.0\nAdded libcontainers-common to CBL-Mariner 2.0\nAdded prometheus-adapter to CBL-Mariner 2.0\nAdded gh to CBL-Mariner 2.0\nAdded terraform to CBL-Mariner 2.0\nAdded cf-cli to CBL-Mariner 2.0\nAdded influxdb to CBL-Mariner 2.0\nAdded git-lfs to CBL-Mariner 2.0\nAdded node-problem-detector to CBL-Mariner 2.0\nAdded sriov-network-device-plugin to CBL-Mariner 2.0\nAdded kured to CBL-Mariner 2.0\nAdded containernetworking-plugins to Azure Linux 3.0\nAdded cni to Azure Linux 3.0\nAdded multus to Azure Linux 3.0\nAdded keda to Azure Linux 3.0\nAdded kubevirt to Azure Linux 3.0\nAdded sriov-network-device-plugin to Azure Linux 3.0\nAdded node-problem-detector to Azure Linux 3.0"
},
{
"date": "2025-05-26T00:00:00.000Z",
"legacy_version": "26.1",
"number": "252",
"summary": "Added application-gateway-kubernetes-ingress to CBL-Mariner 2.0\nAdded containerized-data-importer to CBL-Mariner 2.0\nAdded keda to CBL-Mariner 2.0\nAdded kubevirt to CBL-Mariner 2.0\nAdded libcontainers-common to CBL-Mariner 2.0\nAdded prometheus-adapter to CBL-Mariner 2.0\nAdded gh to CBL-Mariner 2.0\nAdded terraform to CBL-Mariner 2.0\nAdded cf-cli to CBL-Mariner 2.0\nAdded influxdb to CBL-Mariner 2.0\nAdded git-lfs to CBL-Mariner 2.0\nAdded node-problem-detector to CBL-Mariner 2.0\nAdded sriov-network-device-plugin to CBL-Mariner 2.0\nAdded kured to CBL-Mariner 2.0\nAdded containernetworking-plugins to Azure Linux 3.0\nAdded cni to Azure Linux 3.0\nAdded multus to Azure Linux 3.0\nAdded keda to Azure Linux 3.0\nAdded kubevirt to Azure Linux 3.0\nAdded sriov-network-device-plugin to Azure Linux 3.0\nAdded node-problem-detector to Azure Linux 3.0"
},
{
"date": "2025-05-27T00:00:00.000Z",
"legacy_version": "26.2",
"number": "253",
"summary": "Added application-gateway-kubernetes-ingress to CBL-Mariner 2.0\nAdded containerized-data-importer to CBL-Mariner 2.0\nAdded keda to CBL-Mariner 2.0\nAdded kubevirt to CBL-Mariner 2.0\nAdded libcontainers-common to CBL-Mariner 2.0\nAdded prometheus-adapter to CBL-Mariner 2.0\nAdded gh to CBL-Mariner 2.0\nAdded terraform to CBL-Mariner 2.0\nAdded cf-cli to CBL-Mariner 2.0\nAdded influxdb to CBL-Mariner 2.0\nAdded git-lfs to CBL-Mariner 2.0\nAdded node-problem-detector to CBL-Mariner 2.0\nAdded sriov-network-device-plugin to CBL-Mariner 2.0\nAdded kured to CBL-Mariner 2.0\nAdded containernetworking-plugins to Azure Linux 3.0\nAdded cni to Azure Linux 3.0\nAdded multus to Azure Linux 3.0\nAdded keda to Azure Linux 3.0\nAdded kubevirt to Azure Linux 3.0\nAdded sriov-network-device-plugin to Azure Linux 3.0\nAdded node-problem-detector to Azure Linux 3.0"
}
],
"status": "final",
"version": "253"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "2.0",
"product": {
"name": "CBL Mariner 2.0",
"product_id": "17086"
}
},
{
"category": "product_version",
"name": "3.0",
"product": {
"name": "Azure Linux 3.0",
"product_id": "17084"
}
}
],
"category": "product_name",
"name": "Azure Linux"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003ccbl2 application-gateway-kubernetes-ingress 1.4.0-25",
"product": {
"name": "\u003ccbl2 application-gateway-kubernetes-ingress 1.4.0-25",
"product_id": "21"
}
},
{
"category": "product_version",
"name": "cbl2 application-gateway-kubernetes-ingress 1.4.0-25",
"product": {
"name": "cbl2 application-gateway-kubernetes-ingress 1.4.0-25",
"product_id": "19713"
}
}
],
"category": "product_name",
"name": "application-gateway-kubernetes-ingress"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003ccbl2 cf-cli 8.4.0-24",
"product": {
"name": "\u003ccbl2 cf-cli 8.4.0-24",
"product_id": "9"
}
},
{
"category": "product_version",
"name": "cbl2 cf-cli 8.4.0-24",
"product": {
"name": "cbl2 cf-cli 8.4.0-24",
"product_id": "19977"
}
}
],
"category": "product_name",
"name": "cf-cli"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003ccbl2 containerized-data-importer 1.55.0-23",
"product": {
"name": "\u003ccbl2 containerized-data-importer 1.55.0-23",
"product_id": "17"
}
},
{
"category": "product_version",
"name": "cbl2 containerized-data-importer 1.55.0-23",
"product": {
"name": "cbl2 containerized-data-importer 1.55.0-23",
"product_id": "19821"
}
}
],
"category": "product_name",
"name": "containerized-data-importer"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003ccbl2 gh 2.13.0-24",
"product": {
"name": "\u003ccbl2 gh 2.13.0-24",
"product_id": "10"
}
},
{
"category": "product_version",
"name": "cbl2 gh 2.13.0-24",
"product": {
"name": "cbl2 gh 2.13.0-24",
"product_id": "19967"
}
}
],
"category": "product_name",
"name": "gh"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003ccbl2 git-lfs 3.1.4-17",
"product": {
"name": "\u003ccbl2 git-lfs 3.1.4-17",
"product_id": "6"
}
},
{
"category": "product_version",
"name": "cbl2 git-lfs 3.1.4-17",
"product": {
"name": "cbl2 git-lfs 3.1.4-17",
"product_id": "20290"
}
}
],
"category": "product_name",
"name": "git-lfs"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003ccbl2 influxdb 2.6.1-22",
"product": {
"name": "\u003ccbl2 influxdb 2.6.1-22",
"product_id": "16"
}
},
{
"category": "product_version",
"name": "cbl2 influxdb 2.6.1-22",
"product": {
"name": "cbl2 influxdb 2.6.1-22",
"product_id": "19833"
}
}
],
"category": "product_name",
"name": "influxdb"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003ccbl2 kubevirt 0.59.0-28",
"product": {
"name": "\u003ccbl2 kubevirt 0.59.0-28",
"product_id": "19"
}
},
{
"category": "product_version",
"name": "cbl2 kubevirt 0.59.0-28",
"product": {
"name": "cbl2 kubevirt 0.59.0-28",
"product_id": "19782"
}
},
{
"category": "product_version_range",
"name": "\u003cazl3 kubevirt 0.59.0-14",
"product": {
"name": "\u003cazl3 kubevirt 0.59.0-14",
"product_id": "11"
}
},
{
"category": "product_version",
"name": "azl3 kubevirt 0.59.0-14",
"product": {
"name": "azl3 kubevirt 0.59.0-14",
"product_id": "19959"
}
},
{
"category": "product_version_range",
"name": "\u003cazl3 kubevirt 1.2.0-1",
"product": {
"name": "\u003cazl3 kubevirt 1.2.0-1",
"product_id": "27"
}
},
{
"category": "product_version",
"name": "azl3 kubevirt 1.2.0-1",
"product": {
"name": "azl3 kubevirt 1.2.0-1",
"product_id": "18189"
}
}
],
"category": "product_name",
"name": "kubevirt"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003ccbl2 node-problem-detector 0.8.10-20",
"product": {
"name": "\u003ccbl2 node-problem-detector 0.8.10-20",
"product_id": "5"
}
},
{
"category": "product_version",
"name": "cbl2 node-problem-detector 0.8.10-20",
"product": {
"name": "cbl2 node-problem-detector 0.8.10-20",
"product_id": "20299"
}
},
{
"category": "product_version_range",
"name": "\u003cazl3 node-problem-detector 0.8.10-18",
"product": {
"name": "\u003cazl3 node-problem-detector 0.8.10-18",
"product_id": "4"
}
},
{
"category": "product_version",
"name": "azl3 node-problem-detector 0.8.10-18",
"product": {
"name": "azl3 node-problem-detector 0.8.10-18",
"product_id": "20307"
}
},
{
"category": "product_version_range",
"name": "\u003cazl3 node-problem-detector 0.8.15-1",
"product": {
"name": "\u003cazl3 node-problem-detector 0.8.15-1",
"product_id": "24"
}
},
{
"category": "product_version",
"name": "azl3 node-problem-detector 0.8.15-1",
"product": {
"name": "azl3 node-problem-detector 0.8.15-1",
"product_id": "18822"
}
}
],
"category": "product_name",
"name": "node-problem-detector"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003ccbl2 terraform 1.3.2-25",
"product": {
"name": "\u003ccbl2 terraform 1.3.2-25",
"product_id": "13"
}
},
{
"category": "product_version",
"name": "cbl2 terraform 1.3.2-25",
"product": {
"name": "cbl2 terraform 1.3.2-25",
"product_id": "19912"
}
}
],
"category": "product_name",
"name": "terraform"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003cazl3 multus 3.8-13",
"product": {
"name": "\u003cazl3 multus 3.8-13",
"product_id": "8"
}
},
{
"category": "product_version",
"name": "azl3 multus 3.8-13",
"product": {
"name": "azl3 multus 3.8-13",
"product_id": "20086"
}
},
{
"category": "product_version_range",
"name": "\u003cazl3 multus 4.0.2-1",
"product": {
"name": "\u003cazl3 multus 4.0.2-1",
"product_id": "23"
}
},
{
"category": "product_version",
"name": "azl3 multus 4.0.2-1",
"product": {
"name": "azl3 multus 4.0.2-1",
"product_id": "18823"
}
}
],
"category": "product_name",
"name": "multus"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003cazl3 sriov-network-device-plugin 3.5.1-3",
"product": {
"name": "\u003cazl3 sriov-network-device-plugin 3.5.1-3",
"product_id": "7"
}
},
{
"category": "product_version",
"name": "azl3 sriov-network-device-plugin 3.5.1-3",
"product": {
"name": "azl3 sriov-network-device-plugin 3.5.1-3",
"product_id": "20235"
}
},
{
"category": "product_version_range",
"name": "\u003cazl3 sriov-network-device-plugin 3.7.0-1",
"product": {
"name": "\u003cazl3 sriov-network-device-plugin 3.7.0-1",
"product_id": "26"
}
},
{
"category": "product_version",
"name": "azl3 sriov-network-device-plugin 3.7.0-1",
"product": {
"name": "azl3 sriov-network-device-plugin 3.7.0-1",
"product_id": "18528"
}
},
{
"category": "product_version_range",
"name": "\u003ccbl2 sriov-network-device-plugin 3.5.1-3",
"product": {
"name": "\u003ccbl2 sriov-network-device-plugin 3.5.1-3",
"product_id": "3"
}
},
{
"category": "product_version",
"name": "cbl2 sriov-network-device-plugin 3.5.1-3",
"product": {
"name": "cbl2 sriov-network-device-plugin 3.5.1-3",
"product_id": "20308"
}
}
],
"category": "product_name",
"name": "sriov-network-device-plugin"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003ccbl2 cri-o 1.22.3-14",
"product": {
"name": "\u003ccbl2 cri-o 1.22.3-14",
"product_id": "20"
}
},
{
"category": "product_version",
"name": "cbl2 cri-o 1.22.3-14",
"product": {
"name": "cbl2 cri-o 1.22.3-14",
"product_id": "19777"
}
}
],
"category": "product_name",
"name": "cri-o"
},
{
"branches": [
{
"category": "product_version_range",
"name": "cbl2 cni 1.0.1-18",
"product": {
"name": "cbl2 cni 1.0.1-18",
"product_id": "2"
}
},
{
"category": "product_version_range",
"name": "\u003cazl3 cni 1.1.2-3",
"product": {
"name": "\u003cazl3 cni 1.1.2-3",
"product_id": "22"
}
},
{
"category": "product_version",
"name": "azl3 cni 1.1.2-3",
"product": {
"name": "azl3 cni 1.1.2-3",
"product_id": "18825"
}
},
{
"category": "product_version_range",
"name": "\u003cazl3 cni 1.1.2-4",
"product": {
"name": "\u003cazl3 cni 1.1.2-4",
"product_id": "29"
}
},
{
"category": "product_version",
"name": "azl3 cni 1.1.2-4",
"product": {
"name": "azl3 cni 1.1.2-4",
"product_id": "17505"
}
},
{
"category": "product_version_range",
"name": "\u003ccbl2 cni 1.0.1-19",
"product": {
"name": "\u003ccbl2 cni 1.0.1-19",
"product_id": "1"
}
},
{
"category": "product_version",
"name": "cbl2 cni 1.0.1-19",
"product": {
"name": "cbl2 cni 1.0.1-19",
"product_id": "20408"
}
}
],
"category": "product_name",
"name": "cni"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003cazl3 containernetworking-plugins 1.6.1-4",
"product": {
"name": "\u003cazl3 containernetworking-plugins 1.6.1-4",
"product_id": "25"
}
},
{
"category": "product_version",
"name": "azl3 containernetworking-plugins 1.6.1-4",
"product": {
"name": "azl3 containernetworking-plugins 1.6.1-4",
"product_id": "18820"
}
}
],
"category": "product_name",
"name": "containernetworking-plugins"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003cazl3 keda 2.14.0-1",
"product": {
"name": "\u003cazl3 keda 2.14.0-1",
"product_id": "28"
}
},
{
"category": "product_version",
"name": "azl3 keda 2.14.0-1",
"product": {
"name": "azl3 keda 2.14.0-1",
"product_id": "17761"
}
},
{
"category": "product_version_range",
"name": "\u003ccbl2 keda 2.4.0-29",
"product": {
"name": "\u003ccbl2 keda 2.4.0-29",
"product_id": "15"
}
},
{
"category": "product_version",
"name": "cbl2 keda 2.4.0-29",
"product": {
"name": "cbl2 keda 2.4.0-29",
"product_id": "19836"
}
},
{
"category": "product_version_range",
"name": "\u003cazl3 keda 2.4.0-15",
"product": {
"name": "\u003cazl3 keda 2.4.0-15",
"product_id": "14"
}
},
{
"category": "product_version",
"name": "azl3 keda 2.4.0-15",
"product": {
"name": "azl3 keda 2.4.0-15",
"product_id": "19877"
}
}
],
"category": "product_name",
"name": "keda"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003ccbl2 libcontainers-common 20210626-7",
"product": {
"name": "\u003ccbl2 libcontainers-common 20210626-7",
"product_id": "18"
}
},
{
"category": "product_version",
"name": "cbl2 libcontainers-common 20210626-7",
"product": {
"name": "cbl2 libcontainers-common 20210626-7",
"product_id": "19792"
}
}
],
"category": "product_name",
"name": "libcontainers-common"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003ccbl2 prometheus-adapter 0.10.0-17",
"product": {
"name": "\u003ccbl2 prometheus-adapter 0.10.0-17",
"product_id": "12"
}
},
{
"category": "product_version",
"name": "cbl2 prometheus-adapter 0.10.0-17",
"product": {
"name": "cbl2 prometheus-adapter 0.10.0-17",
"product_id": "19957"
}
}
],
"category": "product_name",
"name": "prometheus-adapter"
}
],
"category": "vendor",
"name": "Microsoft"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "\u003ccbl2 application-gateway-kubernetes-ingress 1.4.0-25 as a component of CBL Mariner 2.0",
"product_id": "17086-21"
},
"product_reference": "21",
"relates_to_product_reference": "17086"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cbl2 application-gateway-kubernetes-ingress 1.4.0-25 as a component of CBL Mariner 2.0",
"product_id": "19713-17086"
},
"product_reference": "19713",
"relates_to_product_reference": "17086"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "\u003ccbl2 cf-cli 8.4.0-24 as a component of CBL Mariner 2.0",
"product_id": "17086-9"
},
"product_reference": "9",
"relates_to_product_reference": "17086"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cbl2 cf-cli 8.4.0-24 as a component of CBL Mariner 2.0",
"product_id": "19977-17086"
},
"product_reference": "19977",
"relates_to_product_reference": "17086"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "\u003ccbl2 containerized-data-importer 1.55.0-23 as a component of CBL Mariner 2.0",
"product_id": "17086-17"
},
"product_reference": "17",
"relates_to_product_reference": "17086"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cbl2 containerized-data-importer 1.55.0-23 as a component of CBL Mariner 2.0",
"product_id": "19821-17086"
},
"product_reference": "19821",
"relates_to_product_reference": "17086"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "\u003ccbl2 gh 2.13.0-24 as a component of CBL Mariner 2.0",
"product_id": "17086-10"
},
"product_reference": "10",
"relates_to_product_reference": "17086"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cbl2 gh 2.13.0-24 as a component of CBL Mariner 2.0",
"product_id": "19967-17086"
},
"product_reference": "19967",
"relates_to_product_reference": "17086"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "\u003ccbl2 git-lfs 3.1.4-17 as a component of CBL Mariner 2.0",
"product_id": "17086-6"
},
"product_reference": "6",
"relates_to_product_reference": "17086"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cbl2 git-lfs 3.1.4-17 as a component of CBL Mariner 2.0",
"product_id": "20290-17086"
},
"product_reference": "20290",
"relates_to_product_reference": "17086"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "\u003ccbl2 influxdb 2.6.1-22 as a component of CBL Mariner 2.0",
"product_id": "17086-16"
},
"product_reference": "16",
"relates_to_product_reference": "17086"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cbl2 influxdb 2.6.1-22 as a component of CBL Mariner 2.0",
"product_id": "19833-17086"
},
"product_reference": "19833",
"relates_to_product_reference": "17086"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "\u003ccbl2 kubevirt 0.59.0-28 as a component of CBL Mariner 2.0",
"product_id": "17086-19"
},
"product_reference": "19",
"relates_to_product_reference": "17086"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cbl2 kubevirt 0.59.0-28 as a component of CBL Mariner 2.0",
"product_id": "19782-17086"
},
"product_reference": "19782",
"relates_to_product_reference": "17086"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "\u003ccbl2 node-problem-detector 0.8.10-20 as a component of CBL Mariner 2.0",
"product_id": "17086-5"
},
"product_reference": "5",
"relates_to_product_reference": "17086"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cbl2 node-problem-detector 0.8.10-20 as a component of CBL Mariner 2.0",
"product_id": "20299-17086"
},
"product_reference": "20299",
"relates_to_product_reference": "17086"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "\u003ccbl2 terraform 1.3.2-25 as a component of CBL Mariner 2.0",
"product_id": "17086-13"
},
"product_reference": "13",
"relates_to_product_reference": "17086"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cbl2 terraform 1.3.2-25 as a component of CBL Mariner 2.0",
"product_id": "19912-17086"
},
"product_reference": "19912",
"relates_to_product_reference": "17086"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "\u003cazl3 kubevirt 0.59.0-14 as a component of Azure Linux 3.0",
"product_id": "17084-11"
},
"product_reference": "11",
"relates_to_product_reference": "17084"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "azl3 kubevirt 0.59.0-14 as a component of Azure Linux 3.0",
"product_id": "19959-17084"
},
"product_reference": "19959",
"relates_to_product_reference": "17084"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "\u003cazl3 multus 3.8-13 as a component of Azure Linux 3.0",
"product_id": "17084-8"
},
"product_reference": "8",
"relates_to_product_reference": "17084"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "azl3 multus 3.8-13 as a component of Azure Linux 3.0",
"product_id": "20086-17084"
},
"product_reference": "20086",
"relates_to_product_reference": "17084"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "\u003cazl3 node-problem-detector 0.8.10-18 as a component of Azure Linux 3.0",
"product_id": "17084-4"
},
"product_reference": "4",
"relates_to_product_reference": "17084"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "azl3 node-problem-detector 0.8.10-18 as a component of Azure Linux 3.0",
"product_id": "20307-17084"
},
"product_reference": "20307",
"relates_to_product_reference": "17084"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "\u003cazl3 sriov-network-device-plugin 3.5.1-3 as a component of Azure Linux 3.0",
"product_id": "17084-7"
},
"product_reference": "7",
"relates_to_product_reference": "17084"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "azl3 sriov-network-device-plugin 3.5.1-3 as a component of Azure Linux 3.0",
"product_id": "20235-17084"
},
"product_reference": "20235",
"relates_to_product_reference": "17084"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "\u003ccbl2 cri-o 1.22.3-14 as a component of CBL Mariner 2.0",
"product_id": "17086-20"
},
"product_reference": "20",
"relates_to_product_reference": "17086"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cbl2 cri-o 1.22.3-14 as a component of CBL Mariner 2.0",
"product_id": "19777-17086"
},
"product_reference": "19777",
"relates_to_product_reference": "17086"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cbl2 cni 1.0.1-18 as a component of CBL Mariner 2.0",
"product_id": "17086-2"
},
"product_reference": "2",
"relates_to_product_reference": "17086"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "\u003cazl3 containernetworking-plugins 1.6.1-4 as a component of Azure Linux 3.0",
"product_id": "17084-25"
},
"product_reference": "25",
"relates_to_product_reference": "17084"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "azl3 containernetworking-plugins 1.6.1-4 as a component of Azure Linux 3.0",
"product_id": "18820-17084"
},
"product_reference": "18820",
"relates_to_product_reference": "17084"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "\u003cazl3 cni 1.1.2-3 as a component of Azure Linux 3.0",
"product_id": "17084-22"
},
"product_reference": "22",
"relates_to_product_reference": "17084"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "azl3 cni 1.1.2-3 as a component of Azure Linux 3.0",
"product_id": "18825-17084"
},
"product_reference": "18825",
"relates_to_product_reference": "17084"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "\u003cazl3 sriov-network-device-plugin 3.7.0-1 as a component of Azure Linux 3.0",
"product_id": "17084-26"
},
"product_reference": "26",
"relates_to_product_reference": "17084"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "azl3 sriov-network-device-plugin 3.7.0-1 as a component of Azure Linux 3.0",
"product_id": "18528-17084"
},
"product_reference": "18528",
"relates_to_product_reference": "17084"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "\u003cazl3 node-problem-detector 0.8.15-1 as a component of Azure Linux 3.0",
"product_id": "17084-24"
},
"product_reference": "24",
"relates_to_product_reference": "17084"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "azl3 node-problem-detector 0.8.15-1 as a component of Azure Linux 3.0",
"product_id": "18822-17084"
},
"product_reference": "18822",
"relates_to_product_reference": "17084"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "\u003cazl3 multus 4.0.2-1 as a component of Azure Linux 3.0",
"product_id": "17084-23"
},
"product_reference": "23",
"relates_to_product_reference": "17084"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "azl3 multus 4.0.2-1 as a component of Azure Linux 3.0",
"product_id": "18823-17084"
},
"product_reference": "18823",
"relates_to_product_reference": "17084"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "\u003cazl3 kubevirt 1.2.0-1 as a component of Azure Linux 3.0",
"product_id": "17084-27"
},
"product_reference": "27",
"relates_to_product_reference": "17084"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "azl3 kubevirt 1.2.0-1 as a component of Azure Linux 3.0",
"product_id": "18189-17084"
},
"product_reference": "18189",
"relates_to_product_reference": "17084"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "\u003cazl3 keda 2.14.0-1 as a component of Azure Linux 3.0",
"product_id": "17084-28"
},
"product_reference": "28",
"relates_to_product_reference": "17084"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "azl3 keda 2.14.0-1 as a component of Azure Linux 3.0",
"product_id": "17761-17084"
},
"product_reference": "17761",
"relates_to_product_reference": "17084"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "\u003ccbl2 keda 2.4.0-29 as a component of CBL Mariner 2.0",
"product_id": "17086-15"
},
"product_reference": "15",
"relates_to_product_reference": "17086"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cbl2 keda 2.4.0-29 as a component of CBL Mariner 2.0",
"product_id": "19836-17086"
},
"product_reference": "19836",
"relates_to_product_reference": "17086"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "\u003ccbl2 libcontainers-common 20210626-7 as a component of CBL Mariner 2.0",
"product_id": "17086-18"
},
"product_reference": "18",
"relates_to_product_reference": "17086"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cbl2 libcontainers-common 20210626-7 as a component of CBL Mariner 2.0",
"product_id": "19792-17086"
},
"product_reference": "19792",
"relates_to_product_reference": "17086"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "\u003ccbl2 prometheus-adapter 0.10.0-17 as a component of CBL Mariner 2.0",
"product_id": "17086-12"
},
"product_reference": "12",
"relates_to_product_reference": "17086"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cbl2 prometheus-adapter 0.10.0-17 as a component of CBL Mariner 2.0",
"product_id": "19957-17086"
},
"product_reference": "19957",
"relates_to_product_reference": "17086"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "\u003ccbl2 sriov-network-device-plugin 3.5.1-3 as a component of CBL Mariner 2.0",
"product_id": "17086-3"
},
"product_reference": "3",
"relates_to_product_reference": "17086"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cbl2 sriov-network-device-plugin 3.5.1-3 as a component of CBL Mariner 2.0",
"product_id": "20308-17086"
},
"product_reference": "20308",
"relates_to_product_reference": "17086"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "\u003cazl3 keda 2.4.0-15 as a component of Azure Linux 3.0",
"product_id": "17084-14"
},
"product_reference": "14",
"relates_to_product_reference": "17084"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "azl3 keda 2.4.0-15 as a component of Azure Linux 3.0",
"product_id": "19877-17084"
},
"product_reference": "19877",
"relates_to_product_reference": "17084"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "\u003cazl3 cni 1.1.2-4 as a component of Azure Linux 3.0",
"product_id": "17084-29"
},
"product_reference": "29",
"relates_to_product_reference": "17084"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "azl3 cni 1.1.2-4 as a component of Azure Linux 3.0",
"product_id": "17505-17084"
},
"product_reference": "17505",
"relates_to_product_reference": "17084"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "\u003ccbl2 cni 1.0.1-19 as a component of CBL Mariner 2.0",
"product_id": "17086-1"
},
"product_reference": "1",
"relates_to_product_reference": "17086"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cbl2 cni 1.0.1-19 as a component of CBL Mariner 2.0",
"product_id": "20408-17086"
},
"product_reference": "20408",
"relates_to_product_reference": "17086"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2022-32149",
"cwe": {
"id": "CWE-772",
"name": "Missing Release of Resource after Effective Lifetime"
},
"notes": [
{
"category": "general",
"text": "Go",
"title": "Assigning CNA"
}
],
"product_status": {
"fixed": [
"19713-17086",
"19977-17086",
"19821-17086",
"19967-17086",
"20290-17086",
"19833-17086",
"19782-17086",
"20299-17086",
"19912-17086",
"19959-17084",
"20086-17084",
"20307-17084",
"20235-17084",
"19777-17086",
"18820-17084",
"18825-17084",
"18528-17084",
"18822-17084",
"18823-17084",
"18189-17084",
"17761-17084",
"19836-17086",
"19792-17086",
"19957-17086",
"20308-17086",
"19877-17084",
"17505-17084",
"20408-17086"
],
"known_affected": [
"17086-21",
"17086-9",
"17086-17",
"17086-10",
"17086-6",
"17086-16",
"17086-19",
"17086-5",
"17086-13",
"17084-11",
"17084-8",
"17084-4",
"17084-7",
"17086-20",
"17086-2",
"17084-25",
"17084-22",
"17084-26",
"17084-24",
"17084-23",
"17084-27",
"17084-28",
"17086-15",
"17086-18",
"17086-12",
"17086-3",
"17084-14",
"17084-29",
"17086-1"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2022-32149 Denial of service via crafted Accept-Language header in golang.org/x/text/language - VEX",
"url": "https://msrc.microsoft.com/csaf/vex/2022/msrc_cve-2022-32149.json"
}
],
"remediations": [
{
"category": "none_available",
"date": "2023-11-08T00:00:00.000Z",
"details": "There is no fix available for this vulnerability as of now",
"product_ids": [
"17086-2"
]
},
{
"category": "vendor_fix",
"date": "2023-11-08T00:00:00.000Z",
"details": "1.4.0-22:Security Update:https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade",
"product_ids": [
"17086-21"
],
"url": "https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade"
},
{
"category": "vendor_fix",
"date": "2023-11-08T00:00:00.000Z",
"details": "8.4.0-21:Security Update:https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade",
"product_ids": [
"17086-9"
],
"url": "https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade"
},
{
"category": "vendor_fix",
"date": "2023-11-08T00:00:00.000Z",
"details": "1.55.0-20:Security Update:https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade",
"product_ids": [
"17086-17"
],
"url": "https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade"
},
{
"category": "vendor_fix",
"date": "2023-11-08T00:00:00.000Z",
"details": "2.13.0-22:Security Update:https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade",
"product_ids": [
"17086-10"
],
"url": "https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade"
},
{
"category": "vendor_fix",
"date": "2023-11-08T00:00:00.000Z",
"details": "3.4.1-1:Security Update:https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade",
"product_ids": [
"17086-6"
],
"url": "https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade"
},
{
"category": "vendor_fix",
"date": "2023-11-08T00:00:00.000Z",
"details": "2.6.1-17:Security Update:https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade",
"product_ids": [
"17086-16"
],
"url": "https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade"
},
{
"category": "vendor_fix",
"date": "2023-11-08T00:00:00.000Z",
"details": "0.59.0-20:Security Update:https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade",
"product_ids": [
"17086-19"
],
"url": "https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade"
},
{
"category": "vendor_fix",
"date": "2023-11-08T00:00:00.000Z",
"details": "0.8.17-2:Security Update:https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade",
"product_ids": [
"17086-5"
],
"url": "https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade"
},
{
"category": "vendor_fix",
"date": "2023-11-08T00:00:00.000Z",
"details": "1.3.2-19:Security Update:https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade",
"product_ids": [
"17086-13"
],
"url": "https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade"
},
{
"category": "vendor_fix",
"date": "2023-11-08T00:00:00.000Z",
"details": "1.2.0-1:Security Update:https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade",
"product_ids": [
"17084-11",
"17084-27"
],
"url": "https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade"
},
{
"category": "vendor_fix",
"date": "2023-11-08T00:00:00.000Z",
"details": "4.0.2-1:Security Update:https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade",
"product_ids": [
"17084-8",
"17084-23"
],
"url": "https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade"
},
{
"category": "vendor_fix",
"date": "2023-11-08T00:00:00.000Z",
"details": "0.8.15-1:Security Update:https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade",
"product_ids": [
"17084-4",
"17084-24"
],
"url": "https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade"
},
{
"category": "vendor_fix",
"date": "2023-11-08T00:00:00.000Z",
"details": "3.7.0-1:Security Update:https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade",
"product_ids": [
"17084-7",
"17084-26"
],
"url": "https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade"
},
{
"category": "vendor_fix",
"date": "2023-11-08T00:00:00.000Z",
"details": "1.22.3-8:Security Update:https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade",
"product_ids": [
"17086-20"
],
"url": "https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade"
},
{
"category": "vendor_fix",
"date": "2023-11-08T00:00:00.000Z",
"details": "1.6.1-4:Security Update:https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade",
"product_ids": [
"17084-25"
],
"url": "https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade"
},
{
"category": "vendor_fix",
"date": "2023-11-08T00:00:00.000Z",
"details": "1.1.2-3:Security Update:https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade",
"product_ids": [
"17084-22",
"17084-29"
],
"url": "https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade"
},
{
"category": "vendor_fix",
"date": "2023-11-08T00:00:00.000Z",
"details": "2.14.0-1:Security Update:https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade",
"product_ids": [
"17084-28",
"17084-14"
],
"url": "https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade"
},
{
"category": "vendor_fix",
"date": "2023-11-08T00:00:00.000Z",
"details": "2.4.0-23:Security Update:https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade",
"product_ids": [
"17086-15"
],
"url": "https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade"
},
{
"category": "vendor_fix",
"date": "2023-11-08T00:00:00.000Z",
"details": "20210626-6:Security Update:https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade",
"product_ids": [
"17086-18"
],
"url": "https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade"
},
{
"category": "vendor_fix",
"date": "2023-11-08T00:00:00.000Z",
"details": "0.10.0-14:Security Update:https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade",
"product_ids": [
"17086-12"
],
"url": "https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade"
},
{
"category": "vendor_fix",
"date": "2023-11-08T00:00:00.000Z",
"details": "3.6.2-2:Security Update:https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade",
"product_ids": [
"17086-3"
],
"url": "https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade"
},
{
"category": "vendor_fix",
"date": "2023-11-08T00:00:00.000Z",
"details": "1.0.1-20:Security Update:https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade",
"product_ids": [
"17086-1"
],
"url": "https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"environmentalsScore": 0.0,
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"temporalScore": 7.5,
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"17086-21",
"17086-9",
"17086-17",
"17086-10",
"17086-6",
"17086-16",
"17086-19",
"17086-5",
"17086-13",
"17084-11",
"17084-8",
"17084-4",
"17084-7",
"17086-20",
"17086-2",
"17084-25",
"17084-22",
"17084-26",
"17084-24",
"17084-23",
"17084-27",
"17084-28",
"17086-15",
"17086-18",
"17086-12",
"17086-3",
"17084-14",
"17084-29",
"17086-1"
]
}
],
"title": "Denial of service via crafted Accept-Language header in golang.org/x/text/language"
}
]
}
suse-su-2023:2579-1
Vulnerability from csaf_suse
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for SUSE Manager Client Tools",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update fixes the following issues:\n\ngrafana:\n\n- Version update from 8.5.22 to 9.5.1 (jsc#PED-3694):\n * Security fixes:\n - CVE-2023-1410: grafana: Stored XSS in Graphite FunctionDescription tooltip (bsc#1209645)\n - CVE-2023-1387: grafana: JWT URL-login flow leaks token to data sources through request parameter in proxy requests\n (bnc#1210907)\n - CVE-2022-36062: grafana: Fix RBAC folders/dashboards privilege escalation (bsc#1203596)\n - CVE-2022-35957: grafana: Escalation from admin to server admin when auth proxy is used (bsc#1203597)\n - CVE-2022-32149: Upgrade x/text to version unaffected by CVE-2022-32149 (bsc#1204501)\n - CVE-2022-31107: grafana: OAuth account takeover (bsc#1201539)\n - CVE-2022-31097: grafana: stored XSS vulnerability (bsc#1201535)\n - CVE-2022-27664: go1.18,go1.19: net/http: handle server errors after sending GOAWAY (bsc#1203185)\n - CVE-2022-0155: follow-redirects: Exposure of Private Personal Information to an Unauthorized Actor\n - CVE-2021-43138: spacewalk-web: a malicious user can obtain privileges via the mapValues() method(bsc#1200480)\n - CVE-2021-3918: json-schema is vulnerable to Improperly Controlled Modification of Object Prototype Attributes\n (\u0027Prototype Pollution\u0027) (bsc#1192696)\n - CVE-2021-3807: node-ansi-regex: Inefficient Regular Expression Complexity in chalk/ansi-regex (bsc#1192154)\n - CVE-2020-7753: nodejs-trim: Regular Expression Denial of Service (ReDoS) in trim function \n * Important changes:\n - Default named retention policies won\u0027t be used to query.\n Users who have a default named retention policy in their influxdb database, have to rename it to something else.\n To change the hardcoded retention policy in the dashboard.json, users must then select the right retention policy\n from dropdown and save the panel/dashboard.\n - Grafana Alerting rules with NoDataState configuration set to Alerting will now respect \u0027For\u0027 duration.\n - Users who use LDAP role sync to only sync Viewer, Editor and Admin roles, but grant Grafana Server Admin role\n manually will not be able to do that anymore. After this change, LDAP role sync will override any manual changes\n to Grafana Server Admin role assignments. If grafana_admin is left unset in LDAP role mapping configuration, it\n will default to false.\n - The InfluxDB backend migration feature toggle (influxdbBackendMigration) has been reintroduced in this version\n as issues were discovered with backend processing of InfluxDB data. Unless this feature toggle is enabled, all\n InfluxDB data will be parsed in the frontend. This frontend processing is the default behavior. \n In Grafana 9.4.4, InfluxDB data parsing started to be handled in the backend. If you have upgraded to 9.4.4\n and then added new transformations on InfluxDB data, those panels will fail to render. To resolve this either:\n Remove the affected panel and re-create it or edit the `time` field as `Time` in `panel.json` \n or `dashboard.json`\n - The `@grafana/ui` package helper function `selectOptionInTest` used in frontend tests has been removed as it\n caused testing libraries to be bundled in the production code of Grafana. If you were using this helper function\n in your tests please update your code accordingly.\n - Removed deprecated `checkHealth` prop from the `@grafana/e2e` `addDataSource` configuration. Previously this\n value defaulted to `false`, and has not been used in end-to-end tests since Grafana 8.0.3.\n - Removed the deprecated `LegacyBaseMap`, `LegacyValueMapping`, `LegacyValueMap`, and `LegacyRangeMap` types, and\n `getMappedValue` function from grafana-data. See the documentation for the migration.\n This change fixes a bug in Grafana where intermittent failure of database, network between Grafana and the\n database, or error in querying the database would cause all alert rules to be unscheduled in Grafana. \n Following this change scheduled alert rules are not updated unless the query is successful.\n - The `get_alert_rules_duration_seconds` metric has been renamed to `schedule_query_alert_rules_duration_seconds`\n - Any secret (data sources credential, alert manager credential, etc, etc) created or modified with Grafana v9.0\n won\u0027t be decryptable from any previous version (by default) because the way encrypted secrets are stored into the\n database has changed. Although secrets created or modified with previous versions will still be decryptable by\n Grafana v9.0.\n - If required, although generally discouraged, the `disableEnvelopeEncryption` feature toggle can be enabled to\n keep envelope encryption disabled once updating to Grafana\n - In case of need to rollback to an earlier version of Grafana (i.e. Grafana v8.x) for any reason, after being\n created or modified any secret with Grafana v9.0, the `envelopeEncryption` feature toggle will need to be enabled\n to keep backwards compatibility (only from `v8.3.x` a bit unstable, from `8.5.x` stable).\n - As a final attempt to deal with issues related with the aforementioned situations, the \n `grafana-cli admin secrets-migration rollback` command has been designed to move back all the Grafana secrets\n encrypted with envelope encryption to legacy encryption. So, after running that command it should be safe to\n disable envelope encryption and/or roll back to a previous version of Grafana.\n Alternatively or complementarily to all the points above, backing up the Grafana database before updating could\n be a good idea to prevent disasters (although the risk of getting some secrets corrupted only applies to those \n updates/created with after updating to Grafana v9.0).\n - In Elasticsearch, browser access mode was deprecated in grafana 7.4.0 and removed in 9.0.0. If you used this mode\n please switch to server access mode on the datasource configuration page.\n - Environment variables passed from Grafana to external Azure plugins have been renamed:\n `AZURE_CLOUD` renamed to `GFAZPL_AZURE_CLOUD`,\n `AZURE_MANAGED_IDENTITY_ENABLED` renamed to `GFAZPL_MANAGED_IDENTITY_ENABLED`,\n `AZURE_MANAGED_IDENTITY_CLIENT_ID` renamed to `GFAZPL_MANAGED_IDENTITY_CLIENT_ID`.\n There are no known plugins which were relying on these variables. Moving forward plugins should read Azure\n settings only via Grafana Azure SDK which properly handles old and new environment variables.\n - Removes support for for ElasticSearch versions after their end-of-life, currently versions \u003c 7.10.0.\n To continue to use ElasticSearch data source, upgrade ElasticSearch to version 7.10.0+.\n - Application Insights and Insight Analytics queries in Azure Monitor were deprecated in Grafana 8.0 and finally\n removed in 9.0. Deprecated queries will no longer be executed.\n - grafana/ui: Button now specifies a default type=\u0027button\u0027.\n The `Button` component provided by @grafana/ui now specifies a default `type=\u0027button\u0027` when no type is provided.\n In previous versions, if the attribute was not specified for buttons associated with a `\u003cform\u003e` the\n default value was `submit` per the specification. You can preserve the old behavior by explicitly setting the\n type attribute: `\u003cButton type=\u0027submit\u0027 /\u003e`\n - The `Rename by regex` transformation has been improved to allow global patterns of the form \n `/\u003cstringToReplace\u003e/g`.\n Depending on the regex match used, this may cause some transformations to behave slightly differently. You can\n guarantee the same behaviour as before by wrapping the `match` string in forward slashes (`/`), e.g. `(.*)` would\n become `/(.*)/`\n - `\u003cSelect /\u003e` menus will now portal to the document body by default. This is to give more consistent\n behaviour when positioning and overlaying. If you were setting`menuShouldPortal={true}` before you can safely \n remove that prop and behaviour will be the same. If you weren\u0027t explicitly setting that prop, there should be no\n visible changes in behaviour but your tests may need updating. If you were setting `menuShouldPortal={false}`\n this will continue to prevent the menu from portalling.\n - Grafana alerting endpoint prefixed with `api/v1/rule/test` that tests a rule against a Corte/Loki data source now\n expects the data source UID as a path parameter instead of the data source numeric identifier.\n - Grafana alerting endpoints prefixed with `api/prometheus/` that proxy requests to a Cortex/Loki data source now\n expect the data source UID as a path parameter instead of the data source numeric identifier.\n - Grafana alerting endpoints prefixed with `api/ruler/` that proxy requests to a Cortex/Loki data source now expect\n the data source UID as a path parameter instead of the data\n - Grafana alerting endpoints prefixed with `api/alertmanager/` that proxy requests to an Alertmanager now expect\n the data source UID as a path parameter instead of the data source numeric identifier.\n - The format of log messages have been updated, `lvl` is now `level` and `eror`and `dbug` has been replaced with\n `error` and `debug`. The precision of timestamps has been increased.\n To smooth the transition, it is possible to opt-out of the new log format by enabling the feature toggle\n `oldlog`.\n This option will be removed in a future minor release.\n - In the Loki data source, the dataframe format used to represent Loki logs-data has been changed to a more\n efficient format. The query-result is represented by a single dataframe with a \u0027labels\u0027 column, instead of the\n separate dataframes for every labels-value. When displaying such data in explore, or in a logs-panel in the\n dashboard will continue to work without changes, but if the data was loaded into a different dashboard-panel, or\n Transforms were used, adjustments may be necessary. For example, if you used the \u0027labels to fields\u0027 \n transformation with the logs data, please switch to the \u0027extract fields\u0027 transformation.\n * Deprecations:\n - The `grafana_database_conn_*` metrics are deprecated, and will be removed in a future version of Grafana. Use \n the `go_sql_stats_*` metrics instead.\n - Support for compact Explore URLs is deprecated and will be removed in a future release. Until then, when\n navigating to Explore using the deprecated format the URLs are automatically converted. If you have\n existing links pointing to Explore update them using the format generated by Explore upon navigation.\n You can identify a compact URL by its format. Compact URLs have the left (and optionally right) url parameter as\n an array of strings, for example `\u0026left=[\u0027now-1h\u0027,\u0027now\u0027...]`. The standard explore URLs follow a key/value\n pattern, for example `\u0026left={\u0027datasource\u0027:\u0027test\u0027...}`. Please be sure to check your dashboards for any\n hardcoded links to Explore and update them to the standard URL pattern.\n - Chore: Remove deprecated DataSourceAPI methods.\n - Data: Remove deprecated types and functions from valueMappings.\n - Elasticsearch: Remove browser access mode.\n - Elasticsearch: Remove support for versions after their end of the life (\u003c7.10.0).\n - Explore: Remove support for legacy, compact format URLs.\n - Graph: Deprecate Graph (old) and make it no longer a visualization option for new panels.\n - `setExploreQueryField`, `setExploreMetricsQueryField` and `setExploreLogsQueryField` are now deprecated and will\n be removed in a future release. If you need to set a different query editor for Explore, conditionally render\n based on `props.app` in your regular query editor.\n * Changes:\n - User: Fix externalUserId not being populated.\n If you used any of these components please use them from grafana/experimental from now on:\n - AccessoryButton\n - EditorFieldGroup\n - EditorHeader\n - EditorField\n - EditorRow\n - EditorList\n - EditorRows\n - EditorSwitch\n - FlexItem\n - Stack\n - InlineSelect\n - InputGroup\n - Space\n - Starting with 9.1.0, existing heatmap panels will start using a new implementation. This can be disabled by\n setting the `useLegacyHeatmapPanel` feature flag to true. It can be tested on a single dashbobard by adding\n `?__feature.useLegacyHeatmapPanel=true` to any dashboard URL.\n - Logger: Enable new logging format by default.\n - Loki: Enable new visual query builder by default.\n - Plugins: Remove plugin list panel.\n - Install wrapper scripts under /usr/sbin\n - Install actual binaries under /usr/libexec/grafana (or /usr/lib under older distributions) and create a simlink \n for wrapper scripts and the service (which expect the binary to be under /usr/share/grafana/bin)\n - Chore: Upgrade typescript to 4.6.4.\n\nmgr-daemon:\n\n- Version 4.3.7-1\n * Update translation strings\n\nspacecmd:\n\n- Version 4.3.21-1\n * fix argument parsing of distribution_update (bsc#1210458)\n- Version 4.3.20-1\n * Display activation key details after executing the corresponding command (bsc#1208719)\n * Show targetted packages before actually removing them (bsc#1207830)\n\nuyuni-common-libs:\n\n- Version 4.3.8-1\n * Allow default component for context manager\n\nzypp-plugin-spacewalk:\n\n- 1.0.14\n * SPEC file cleanup\n\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2023-2579,SUSE-SLE-Manager-Tools-12-2023-2579",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2023_2579-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2023:2579-1",
"url": "https://www.suse.com/support/update/announcement/2023/suse-su-20232579-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2023:2579-1",
"url": "https://lists.suse.com/pipermail/sle-updates/2023-June/029950.html"
},
{
"category": "self",
"summary": "SUSE Bug 1047218",
"url": "https://bugzilla.suse.com/1047218"
},
{
"category": "self",
"summary": "SUSE Bug 1192154",
"url": "https://bugzilla.suse.com/1192154"
},
{
"category": "self",
"summary": "SUSE Bug 1192696",
"url": "https://bugzilla.suse.com/1192696"
},
{
"category": "self",
"summary": "SUSE Bug 1200480",
"url": "https://bugzilla.suse.com/1200480"
},
{
"category": "self",
"summary": "SUSE Bug 1201535",
"url": "https://bugzilla.suse.com/1201535"
},
{
"category": "self",
"summary": "SUSE Bug 1201539",
"url": "https://bugzilla.suse.com/1201539"
},
{
"category": "self",
"summary": "SUSE Bug 1203185",
"url": "https://bugzilla.suse.com/1203185"
},
{
"category": "self",
"summary": "SUSE Bug 1203596",
"url": "https://bugzilla.suse.com/1203596"
},
{
"category": "self",
"summary": "SUSE Bug 1203597",
"url": "https://bugzilla.suse.com/1203597"
},
{
"category": "self",
"summary": "SUSE Bug 1203599",
"url": "https://bugzilla.suse.com/1203599"
},
{
"category": "self",
"summary": "SUSE Bug 1204501",
"url": "https://bugzilla.suse.com/1204501"
},
{
"category": "self",
"summary": "SUSE Bug 1207830",
"url": "https://bugzilla.suse.com/1207830"
},
{
"category": "self",
"summary": "SUSE Bug 1208719",
"url": "https://bugzilla.suse.com/1208719"
},
{
"category": "self",
"summary": "SUSE Bug 1208965",
"url": "https://bugzilla.suse.com/1208965"
},
{
"category": "self",
"summary": "SUSE Bug 1209645",
"url": "https://bugzilla.suse.com/1209645"
},
{
"category": "self",
"summary": "SUSE Bug 1210458",
"url": "https://bugzilla.suse.com/1210458"
},
{
"category": "self",
"summary": "SUSE Bug 1210907",
"url": "https://bugzilla.suse.com/1210907"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-7753 page",
"url": "https://www.suse.com/security/cve/CVE-2020-7753/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-3807 page",
"url": "https://www.suse.com/security/cve/CVE-2021-3807/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-3918 page",
"url": "https://www.suse.com/security/cve/CVE-2021-3918/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-43138 page",
"url": "https://www.suse.com/security/cve/CVE-2021-43138/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-0155 page",
"url": "https://www.suse.com/security/cve/CVE-2022-0155/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-27191 page",
"url": "https://www.suse.com/security/cve/CVE-2022-27191/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-27664 page",
"url": "https://www.suse.com/security/cve/CVE-2022-27664/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-31097 page",
"url": "https://www.suse.com/security/cve/CVE-2022-31097/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-31107 page",
"url": "https://www.suse.com/security/cve/CVE-2022-31107/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-32149 page",
"url": "https://www.suse.com/security/cve/CVE-2022-32149/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-35957 page",
"url": "https://www.suse.com/security/cve/CVE-2022-35957/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-36062 page",
"url": "https://www.suse.com/security/cve/CVE-2022-36062/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-41715 page",
"url": "https://www.suse.com/security/cve/CVE-2022-41715/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-46146 page",
"url": "https://www.suse.com/security/cve/CVE-2022-46146/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-1387 page",
"url": "https://www.suse.com/security/cve/CVE-2023-1387/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-1410 page",
"url": "https://www.suse.com/security/cve/CVE-2023-1410/"
}
],
"title": "Security update for SUSE Manager Client Tools",
"tracking": {
"current_release_date": "2023-06-21T11:52:13Z",
"generator": {
"date": "2023-06-21T11:52:13Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2023:2579-1",
"initial_release_date": "2023-06-21T11:52:13Z",
"revision_history": [
{
"date": "2023-06-21T11:52:13Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "grafana-9.5.1-1.48.1.aarch64",
"product": {
"name": "grafana-9.5.1-1.48.1.aarch64",
"product_id": "grafana-9.5.1-1.48.1.aarch64"
}
},
{
"category": "product_version",
"name": "python2-uyuni-common-libs-4.3.8-1.33.1.aarch64",
"product": {
"name": "python2-uyuni-common-libs-4.3.8-1.33.1.aarch64",
"product_id": "python2-uyuni-common-libs-4.3.8-1.33.1.aarch64"
}
},
{
"category": "product_version",
"name": "wire-0.5.0-1.12.1.aarch64",
"product": {
"name": "wire-0.5.0-1.12.1.aarch64",
"product_id": "wire-0.5.0-1.12.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "grafana-9.5.1-1.48.1.i586",
"product": {
"name": "grafana-9.5.1-1.48.1.i586",
"product_id": "grafana-9.5.1-1.48.1.i586"
}
},
{
"category": "product_version",
"name": "python2-uyuni-common-libs-4.3.8-1.33.1.i586",
"product": {
"name": "python2-uyuni-common-libs-4.3.8-1.33.1.i586",
"product_id": "python2-uyuni-common-libs-4.3.8-1.33.1.i586"
}
},
{
"category": "product_version",
"name": "wire-0.5.0-1.12.1.i586",
"product": {
"name": "wire-0.5.0-1.12.1.i586",
"product_id": "wire-0.5.0-1.12.1.i586"
}
}
],
"category": "architecture",
"name": "i586"
},
{
"branches": [
{
"category": "product_version",
"name": "mgr-daemon-4.3.7-1.41.1.noarch",
"product": {
"name": "mgr-daemon-4.3.7-1.41.1.noarch",
"product_id": "mgr-daemon-4.3.7-1.41.1.noarch"
}
},
{
"category": "product_version",
"name": "python2-zypp-plugin-spacewalk-1.0.14-30.42.1.noarch",
"product": {
"name": "python2-zypp-plugin-spacewalk-1.0.14-30.42.1.noarch",
"product_id": "python2-zypp-plugin-spacewalk-1.0.14-30.42.1.noarch"
}
},
{
"category": "product_version",
"name": "spacecmd-4.3.21-38.121.1.noarch",
"product": {
"name": "spacecmd-4.3.21-38.121.1.noarch",
"product_id": "spacecmd-4.3.21-38.121.1.noarch"
}
},
{
"category": "product_version",
"name": "zypp-plugin-spacewalk-1.0.14-30.42.1.noarch",
"product": {
"name": "zypp-plugin-spacewalk-1.0.14-30.42.1.noarch",
"product_id": "zypp-plugin-spacewalk-1.0.14-30.42.1.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "grafana-9.5.1-1.48.1.ppc64le",
"product": {
"name": "grafana-9.5.1-1.48.1.ppc64le",
"product_id": "grafana-9.5.1-1.48.1.ppc64le"
}
},
{
"category": "product_version",
"name": "python2-uyuni-common-libs-4.3.8-1.33.1.ppc64le",
"product": {
"name": "python2-uyuni-common-libs-4.3.8-1.33.1.ppc64le",
"product_id": "python2-uyuni-common-libs-4.3.8-1.33.1.ppc64le"
}
},
{
"category": "product_version",
"name": "wire-0.5.0-1.12.1.ppc64le",
"product": {
"name": "wire-0.5.0-1.12.1.ppc64le",
"product_id": "wire-0.5.0-1.12.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "python2-uyuni-common-libs-4.3.8-1.33.1.s390",
"product": {
"name": "python2-uyuni-common-libs-4.3.8-1.33.1.s390",
"product_id": "python2-uyuni-common-libs-4.3.8-1.33.1.s390"
}
}
],
"category": "architecture",
"name": "s390"
},
{
"branches": [
{
"category": "product_version",
"name": "grafana-9.5.1-1.48.1.s390x",
"product": {
"name": "grafana-9.5.1-1.48.1.s390x",
"product_id": "grafana-9.5.1-1.48.1.s390x"
}
},
{
"category": "product_version",
"name": "python2-uyuni-common-libs-4.3.8-1.33.1.s390x",
"product": {
"name": "python2-uyuni-common-libs-4.3.8-1.33.1.s390x",
"product_id": "python2-uyuni-common-libs-4.3.8-1.33.1.s390x"
}
},
{
"category": "product_version",
"name": "wire-0.5.0-1.12.1.s390x",
"product": {
"name": "wire-0.5.0-1.12.1.s390x",
"product_id": "wire-0.5.0-1.12.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "grafana-9.5.1-1.48.1.x86_64",
"product": {
"name": "grafana-9.5.1-1.48.1.x86_64",
"product_id": "grafana-9.5.1-1.48.1.x86_64"
}
},
{
"category": "product_version",
"name": "python2-uyuni-common-libs-4.3.8-1.33.1.x86_64",
"product": {
"name": "python2-uyuni-common-libs-4.3.8-1.33.1.x86_64",
"product_id": "python2-uyuni-common-libs-4.3.8-1.33.1.x86_64"
}
},
{
"category": "product_version",
"name": "wire-0.5.0-1.12.1.x86_64",
"product": {
"name": "wire-0.5.0-1.12.1.x86_64",
"product_id": "wire-0.5.0-1.12.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Manager Client Tools 12",
"product": {
"name": "SUSE Manager Client Tools 12",
"product_id": "SUSE Manager Client Tools 12"
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "grafana-9.5.1-1.48.1.aarch64 as component of SUSE Manager Client Tools 12",
"product_id": "SUSE Manager Client Tools 12:grafana-9.5.1-1.48.1.aarch64"
},
"product_reference": "grafana-9.5.1-1.48.1.aarch64",
"relates_to_product_reference": "SUSE Manager Client Tools 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "grafana-9.5.1-1.48.1.ppc64le as component of SUSE Manager Client Tools 12",
"product_id": "SUSE Manager Client Tools 12:grafana-9.5.1-1.48.1.ppc64le"
},
"product_reference": "grafana-9.5.1-1.48.1.ppc64le",
"relates_to_product_reference": "SUSE Manager Client Tools 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "grafana-9.5.1-1.48.1.s390x as component of SUSE Manager Client Tools 12",
"product_id": "SUSE Manager Client Tools 12:grafana-9.5.1-1.48.1.s390x"
},
"product_reference": "grafana-9.5.1-1.48.1.s390x",
"relates_to_product_reference": "SUSE Manager Client Tools 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "grafana-9.5.1-1.48.1.x86_64 as component of SUSE Manager Client Tools 12",
"product_id": "SUSE Manager Client Tools 12:grafana-9.5.1-1.48.1.x86_64"
},
"product_reference": "grafana-9.5.1-1.48.1.x86_64",
"relates_to_product_reference": "SUSE Manager Client Tools 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mgr-daemon-4.3.7-1.41.1.noarch as component of SUSE Manager Client Tools 12",
"product_id": "SUSE Manager Client Tools 12:mgr-daemon-4.3.7-1.41.1.noarch"
},
"product_reference": "mgr-daemon-4.3.7-1.41.1.noarch",
"relates_to_product_reference": "SUSE Manager Client Tools 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python2-uyuni-common-libs-4.3.8-1.33.1.aarch64 as component of SUSE Manager Client Tools 12",
"product_id": "SUSE Manager Client Tools 12:python2-uyuni-common-libs-4.3.8-1.33.1.aarch64"
},
"product_reference": "python2-uyuni-common-libs-4.3.8-1.33.1.aarch64",
"relates_to_product_reference": "SUSE Manager Client Tools 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python2-uyuni-common-libs-4.3.8-1.33.1.ppc64le as component of SUSE Manager Client Tools 12",
"product_id": "SUSE Manager Client Tools 12:python2-uyuni-common-libs-4.3.8-1.33.1.ppc64le"
},
"product_reference": "python2-uyuni-common-libs-4.3.8-1.33.1.ppc64le",
"relates_to_product_reference": "SUSE Manager Client Tools 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python2-uyuni-common-libs-4.3.8-1.33.1.s390x as component of SUSE Manager Client Tools 12",
"product_id": "SUSE Manager Client Tools 12:python2-uyuni-common-libs-4.3.8-1.33.1.s390x"
},
"product_reference": "python2-uyuni-common-libs-4.3.8-1.33.1.s390x",
"relates_to_product_reference": "SUSE Manager Client Tools 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python2-uyuni-common-libs-4.3.8-1.33.1.x86_64 as component of SUSE Manager Client Tools 12",
"product_id": "SUSE Manager Client Tools 12:python2-uyuni-common-libs-4.3.8-1.33.1.x86_64"
},
"product_reference": "python2-uyuni-common-libs-4.3.8-1.33.1.x86_64",
"relates_to_product_reference": "SUSE Manager Client Tools 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python2-zypp-plugin-spacewalk-1.0.14-30.42.1.noarch as component of SUSE Manager Client Tools 12",
"product_id": "SUSE Manager Client Tools 12:python2-zypp-plugin-spacewalk-1.0.14-30.42.1.noarch"
},
"product_reference": "python2-zypp-plugin-spacewalk-1.0.14-30.42.1.noarch",
"relates_to_product_reference": "SUSE Manager Client Tools 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "spacecmd-4.3.21-38.121.1.noarch as component of SUSE Manager Client Tools 12",
"product_id": "SUSE Manager Client Tools 12:spacecmd-4.3.21-38.121.1.noarch"
},
"product_reference": "spacecmd-4.3.21-38.121.1.noarch",
"relates_to_product_reference": "SUSE Manager Client Tools 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "zypp-plugin-spacewalk-1.0.14-30.42.1.noarch as component of SUSE Manager Client Tools 12",
"product_id": "SUSE Manager Client Tools 12:zypp-plugin-spacewalk-1.0.14-30.42.1.noarch"
},
"product_reference": "zypp-plugin-spacewalk-1.0.14-30.42.1.noarch",
"relates_to_product_reference": "SUSE Manager Client Tools 12"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2020-7753",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-7753"
}
],
"notes": [
{
"category": "general",
"text": "All versions of package trim are vulnerable to Regular Expression Denial of Service (ReDoS) via trim().",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Manager Client Tools 12:grafana-9.5.1-1.48.1.aarch64",
"SUSE Manager Client Tools 12:grafana-9.5.1-1.48.1.ppc64le",
"SUSE Manager Client Tools 12:grafana-9.5.1-1.48.1.s390x",
"SUSE Manager Client Tools 12:grafana-9.5.1-1.48.1.x86_64",
"SUSE Manager Client Tools 12:mgr-daemon-4.3.7-1.41.1.noarch",
"SUSE Manager Client Tools 12:python2-uyuni-common-libs-4.3.8-1.33.1.aarch64",
"SUSE Manager Client Tools 12:python2-uyuni-common-libs-4.3.8-1.33.1.ppc64le",
"SUSE Manager Client Tools 12:python2-uyuni-common-libs-4.3.8-1.33.1.s390x",
"SUSE Manager Client Tools 12:python2-uyuni-common-libs-4.3.8-1.33.1.x86_64",
"SUSE Manager Client Tools 12:python2-zypp-plugin-spacewalk-1.0.14-30.42.1.noarch",
"SUSE Manager Client Tools 12:spacecmd-4.3.21-38.121.1.noarch",
"SUSE Manager Client Tools 12:zypp-plugin-spacewalk-1.0.14-30.42.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-7753",
"url": "https://www.suse.com/security/cve/CVE-2020-7753"
},
{
"category": "external",
"summary": "SUSE Bug 1218843 for CVE-2020-7753",
"url": "https://bugzilla.suse.com/1218843"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Manager Client Tools 12:grafana-9.5.1-1.48.1.aarch64",
"SUSE Manager Client Tools 12:grafana-9.5.1-1.48.1.ppc64le",
"SUSE Manager Client Tools 12:grafana-9.5.1-1.48.1.s390x",
"SUSE Manager Client Tools 12:grafana-9.5.1-1.48.1.x86_64",
"SUSE Manager Client Tools 12:mgr-daemon-4.3.7-1.41.1.noarch",
"SUSE Manager Client Tools 12:python2-uyuni-common-libs-4.3.8-1.33.1.aarch64",
"SUSE Manager Client Tools 12:python2-uyuni-common-libs-4.3.8-1.33.1.ppc64le",
"SUSE Manager Client Tools 12:python2-uyuni-common-libs-4.3.8-1.33.1.s390x",
"SUSE Manager Client Tools 12:python2-uyuni-common-libs-4.3.8-1.33.1.x86_64",
"SUSE Manager Client Tools 12:python2-zypp-plugin-spacewalk-1.0.14-30.42.1.noarch",
"SUSE Manager Client Tools 12:spacecmd-4.3.21-38.121.1.noarch",
"SUSE Manager Client Tools 12:zypp-plugin-spacewalk-1.0.14-30.42.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Manager Client Tools 12:grafana-9.5.1-1.48.1.aarch64",
"SUSE Manager Client Tools 12:grafana-9.5.1-1.48.1.ppc64le",
"SUSE Manager Client Tools 12:grafana-9.5.1-1.48.1.s390x",
"SUSE Manager Client Tools 12:grafana-9.5.1-1.48.1.x86_64",
"SUSE Manager Client Tools 12:mgr-daemon-4.3.7-1.41.1.noarch",
"SUSE Manager Client Tools 12:python2-uyuni-common-libs-4.3.8-1.33.1.aarch64",
"SUSE Manager Client Tools 12:python2-uyuni-common-libs-4.3.8-1.33.1.ppc64le",
"SUSE Manager Client Tools 12:python2-uyuni-common-libs-4.3.8-1.33.1.s390x",
"SUSE Manager Client Tools 12:python2-uyuni-common-libs-4.3.8-1.33.1.x86_64",
"SUSE Manager Client Tools 12:python2-zypp-plugin-spacewalk-1.0.14-30.42.1.noarch",
"SUSE Manager Client Tools 12:spacecmd-4.3.21-38.121.1.noarch",
"SUSE Manager Client Tools 12:zypp-plugin-spacewalk-1.0.14-30.42.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2023-06-21T11:52:13Z",
"details": "important"
}
],
"title": "CVE-2020-7753"
},
{
"cve": "CVE-2021-3807",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-3807"
}
],
"notes": [
{
"category": "general",
"text": "ansi-regex is vulnerable to Inefficient Regular Expression Complexity",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Manager Client Tools 12:grafana-9.5.1-1.48.1.aarch64",
"SUSE Manager Client Tools 12:grafana-9.5.1-1.48.1.ppc64le",
"SUSE Manager Client Tools 12:grafana-9.5.1-1.48.1.s390x",
"SUSE Manager Client Tools 12:grafana-9.5.1-1.48.1.x86_64",
"SUSE Manager Client Tools 12:mgr-daemon-4.3.7-1.41.1.noarch",
"SUSE Manager Client Tools 12:python2-uyuni-common-libs-4.3.8-1.33.1.aarch64",
"SUSE Manager Client Tools 12:python2-uyuni-common-libs-4.3.8-1.33.1.ppc64le",
"SUSE Manager Client Tools 12:python2-uyuni-common-libs-4.3.8-1.33.1.s390x",
"SUSE Manager Client Tools 12:python2-uyuni-common-libs-4.3.8-1.33.1.x86_64",
"SUSE Manager Client Tools 12:python2-zypp-plugin-spacewalk-1.0.14-30.42.1.noarch",
"SUSE Manager Client Tools 12:spacecmd-4.3.21-38.121.1.noarch",
"SUSE Manager Client Tools 12:zypp-plugin-spacewalk-1.0.14-30.42.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-3807",
"url": "https://www.suse.com/security/cve/CVE-2021-3807"
},
{
"category": "external",
"summary": "SUSE Bug 1192154 for CVE-2021-3807",
"url": "https://bugzilla.suse.com/1192154"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Manager Client Tools 12:grafana-9.5.1-1.48.1.aarch64",
"SUSE Manager Client Tools 12:grafana-9.5.1-1.48.1.ppc64le",
"SUSE Manager Client Tools 12:grafana-9.5.1-1.48.1.s390x",
"SUSE Manager Client Tools 12:grafana-9.5.1-1.48.1.x86_64",
"SUSE Manager Client Tools 12:mgr-daemon-4.3.7-1.41.1.noarch",
"SUSE Manager Client Tools 12:python2-uyuni-common-libs-4.3.8-1.33.1.aarch64",
"SUSE Manager Client Tools 12:python2-uyuni-common-libs-4.3.8-1.33.1.ppc64le",
"SUSE Manager Client Tools 12:python2-uyuni-common-libs-4.3.8-1.33.1.s390x",
"SUSE Manager Client Tools 12:python2-uyuni-common-libs-4.3.8-1.33.1.x86_64",
"SUSE Manager Client Tools 12:python2-zypp-plugin-spacewalk-1.0.14-30.42.1.noarch",
"SUSE Manager Client Tools 12:spacecmd-4.3.21-38.121.1.noarch",
"SUSE Manager Client Tools 12:zypp-plugin-spacewalk-1.0.14-30.42.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Manager Client Tools 12:grafana-9.5.1-1.48.1.aarch64",
"SUSE Manager Client Tools 12:grafana-9.5.1-1.48.1.ppc64le",
"SUSE Manager Client Tools 12:grafana-9.5.1-1.48.1.s390x",
"SUSE Manager Client Tools 12:grafana-9.5.1-1.48.1.x86_64",
"SUSE Manager Client Tools 12:mgr-daemon-4.3.7-1.41.1.noarch",
"SUSE Manager Client Tools 12:python2-uyuni-common-libs-4.3.8-1.33.1.aarch64",
"SUSE Manager Client Tools 12:python2-uyuni-common-libs-4.3.8-1.33.1.ppc64le",
"SUSE Manager Client Tools 12:python2-uyuni-common-libs-4.3.8-1.33.1.s390x",
"SUSE Manager Client Tools 12:python2-uyuni-common-libs-4.3.8-1.33.1.x86_64",
"SUSE Manager Client Tools 12:python2-zypp-plugin-spacewalk-1.0.14-30.42.1.noarch",
"SUSE Manager Client Tools 12:spacecmd-4.3.21-38.121.1.noarch",
"SUSE Manager Client Tools 12:zypp-plugin-spacewalk-1.0.14-30.42.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2023-06-21T11:52:13Z",
"details": "important"
}
],
"title": "CVE-2021-3807"
},
{
"cve": "CVE-2021-3918",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-3918"
}
],
"notes": [
{
"category": "general",
"text": "json-schema is vulnerable to Improperly Controlled Modification of Object Prototype Attributes (\u0027Prototype Pollution\u0027)",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Manager Client Tools 12:grafana-9.5.1-1.48.1.aarch64",
"SUSE Manager Client Tools 12:grafana-9.5.1-1.48.1.ppc64le",
"SUSE Manager Client Tools 12:grafana-9.5.1-1.48.1.s390x",
"SUSE Manager Client Tools 12:grafana-9.5.1-1.48.1.x86_64",
"SUSE Manager Client Tools 12:mgr-daemon-4.3.7-1.41.1.noarch",
"SUSE Manager Client Tools 12:python2-uyuni-common-libs-4.3.8-1.33.1.aarch64",
"SUSE Manager Client Tools 12:python2-uyuni-common-libs-4.3.8-1.33.1.ppc64le",
"SUSE Manager Client Tools 12:python2-uyuni-common-libs-4.3.8-1.33.1.s390x",
"SUSE Manager Client Tools 12:python2-uyuni-common-libs-4.3.8-1.33.1.x86_64",
"SUSE Manager Client Tools 12:python2-zypp-plugin-spacewalk-1.0.14-30.42.1.noarch",
"SUSE Manager Client Tools 12:spacecmd-4.3.21-38.121.1.noarch",
"SUSE Manager Client Tools 12:zypp-plugin-spacewalk-1.0.14-30.42.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-3918",
"url": "https://www.suse.com/security/cve/CVE-2021-3918"
},
{
"category": "external",
"summary": "SUSE Bug 1192696 for CVE-2021-3918",
"url": "https://bugzilla.suse.com/1192696"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Manager Client Tools 12:grafana-9.5.1-1.48.1.aarch64",
"SUSE Manager Client Tools 12:grafana-9.5.1-1.48.1.ppc64le",
"SUSE Manager Client Tools 12:grafana-9.5.1-1.48.1.s390x",
"SUSE Manager Client Tools 12:grafana-9.5.1-1.48.1.x86_64",
"SUSE Manager Client Tools 12:mgr-daemon-4.3.7-1.41.1.noarch",
"SUSE Manager Client Tools 12:python2-uyuni-common-libs-4.3.8-1.33.1.aarch64",
"SUSE Manager Client Tools 12:python2-uyuni-common-libs-4.3.8-1.33.1.ppc64le",
"SUSE Manager Client Tools 12:python2-uyuni-common-libs-4.3.8-1.33.1.s390x",
"SUSE Manager Client Tools 12:python2-uyuni-common-libs-4.3.8-1.33.1.x86_64",
"SUSE Manager Client Tools 12:python2-zypp-plugin-spacewalk-1.0.14-30.42.1.noarch",
"SUSE Manager Client Tools 12:spacecmd-4.3.21-38.121.1.noarch",
"SUSE Manager Client Tools 12:zypp-plugin-spacewalk-1.0.14-30.42.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Manager Client Tools 12:grafana-9.5.1-1.48.1.aarch64",
"SUSE Manager Client Tools 12:grafana-9.5.1-1.48.1.ppc64le",
"SUSE Manager Client Tools 12:grafana-9.5.1-1.48.1.s390x",
"SUSE Manager Client Tools 12:grafana-9.5.1-1.48.1.x86_64",
"SUSE Manager Client Tools 12:mgr-daemon-4.3.7-1.41.1.noarch",
"SUSE Manager Client Tools 12:python2-uyuni-common-libs-4.3.8-1.33.1.aarch64",
"SUSE Manager Client Tools 12:python2-uyuni-common-libs-4.3.8-1.33.1.ppc64le",
"SUSE Manager Client Tools 12:python2-uyuni-common-libs-4.3.8-1.33.1.s390x",
"SUSE Manager Client Tools 12:python2-uyuni-common-libs-4.3.8-1.33.1.x86_64",
"SUSE Manager Client Tools 12:python2-zypp-plugin-spacewalk-1.0.14-30.42.1.noarch",
"SUSE Manager Client Tools 12:spacecmd-4.3.21-38.121.1.noarch",
"SUSE Manager Client Tools 12:zypp-plugin-spacewalk-1.0.14-30.42.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2023-06-21T11:52:13Z",
"details": "important"
}
],
"title": "CVE-2021-3918"
},
{
"cve": "CVE-2021-43138",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-43138"
}
],
"notes": [
{
"category": "general",
"text": "In Async before 2.6.4 and 3.x before 3.2.2, a malicious user can obtain privileges via the mapValues() method, aka lib/internal/iterator.js createObjectIterator prototype pollution.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Manager Client Tools 12:grafana-9.5.1-1.48.1.aarch64",
"SUSE Manager Client Tools 12:grafana-9.5.1-1.48.1.ppc64le",
"SUSE Manager Client Tools 12:grafana-9.5.1-1.48.1.s390x",
"SUSE Manager Client Tools 12:grafana-9.5.1-1.48.1.x86_64",
"SUSE Manager Client Tools 12:mgr-daemon-4.3.7-1.41.1.noarch",
"SUSE Manager Client Tools 12:python2-uyuni-common-libs-4.3.8-1.33.1.aarch64",
"SUSE Manager Client Tools 12:python2-uyuni-common-libs-4.3.8-1.33.1.ppc64le",
"SUSE Manager Client Tools 12:python2-uyuni-common-libs-4.3.8-1.33.1.s390x",
"SUSE Manager Client Tools 12:python2-uyuni-common-libs-4.3.8-1.33.1.x86_64",
"SUSE Manager Client Tools 12:python2-zypp-plugin-spacewalk-1.0.14-30.42.1.noarch",
"SUSE Manager Client Tools 12:spacecmd-4.3.21-38.121.1.noarch",
"SUSE Manager Client Tools 12:zypp-plugin-spacewalk-1.0.14-30.42.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-43138",
"url": "https://www.suse.com/security/cve/CVE-2021-43138"
},
{
"category": "external",
"summary": "SUSE Bug 1200480 for CVE-2021-43138",
"url": "https://bugzilla.suse.com/1200480"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Manager Client Tools 12:grafana-9.5.1-1.48.1.aarch64",
"SUSE Manager Client Tools 12:grafana-9.5.1-1.48.1.ppc64le",
"SUSE Manager Client Tools 12:grafana-9.5.1-1.48.1.s390x",
"SUSE Manager Client Tools 12:grafana-9.5.1-1.48.1.x86_64",
"SUSE Manager Client Tools 12:mgr-daemon-4.3.7-1.41.1.noarch",
"SUSE Manager Client Tools 12:python2-uyuni-common-libs-4.3.8-1.33.1.aarch64",
"SUSE Manager Client Tools 12:python2-uyuni-common-libs-4.3.8-1.33.1.ppc64le",
"SUSE Manager Client Tools 12:python2-uyuni-common-libs-4.3.8-1.33.1.s390x",
"SUSE Manager Client Tools 12:python2-uyuni-common-libs-4.3.8-1.33.1.x86_64",
"SUSE Manager Client Tools 12:python2-zypp-plugin-spacewalk-1.0.14-30.42.1.noarch",
"SUSE Manager Client Tools 12:spacecmd-4.3.21-38.121.1.noarch",
"SUSE Manager Client Tools 12:zypp-plugin-spacewalk-1.0.14-30.42.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Manager Client Tools 12:grafana-9.5.1-1.48.1.aarch64",
"SUSE Manager Client Tools 12:grafana-9.5.1-1.48.1.ppc64le",
"SUSE Manager Client Tools 12:grafana-9.5.1-1.48.1.s390x",
"SUSE Manager Client Tools 12:grafana-9.5.1-1.48.1.x86_64",
"SUSE Manager Client Tools 12:mgr-daemon-4.3.7-1.41.1.noarch",
"SUSE Manager Client Tools 12:python2-uyuni-common-libs-4.3.8-1.33.1.aarch64",
"SUSE Manager Client Tools 12:python2-uyuni-common-libs-4.3.8-1.33.1.ppc64le",
"SUSE Manager Client Tools 12:python2-uyuni-common-libs-4.3.8-1.33.1.s390x",
"SUSE Manager Client Tools 12:python2-uyuni-common-libs-4.3.8-1.33.1.x86_64",
"SUSE Manager Client Tools 12:python2-zypp-plugin-spacewalk-1.0.14-30.42.1.noarch",
"SUSE Manager Client Tools 12:spacecmd-4.3.21-38.121.1.noarch",
"SUSE Manager Client Tools 12:zypp-plugin-spacewalk-1.0.14-30.42.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2023-06-21T11:52:13Z",
"details": "important"
}
],
"title": "CVE-2021-43138"
},
{
"cve": "CVE-2022-0155",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-0155"
}
],
"notes": [
{
"category": "general",
"text": "follow-redirects is vulnerable to Exposure of Private Personal Information to an Unauthorized Actor",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Manager Client Tools 12:grafana-9.5.1-1.48.1.aarch64",
"SUSE Manager Client Tools 12:grafana-9.5.1-1.48.1.ppc64le",
"SUSE Manager Client Tools 12:grafana-9.5.1-1.48.1.s390x",
"SUSE Manager Client Tools 12:grafana-9.5.1-1.48.1.x86_64",
"SUSE Manager Client Tools 12:mgr-daemon-4.3.7-1.41.1.noarch",
"SUSE Manager Client Tools 12:python2-uyuni-common-libs-4.3.8-1.33.1.aarch64",
"SUSE Manager Client Tools 12:python2-uyuni-common-libs-4.3.8-1.33.1.ppc64le",
"SUSE Manager Client Tools 12:python2-uyuni-common-libs-4.3.8-1.33.1.s390x",
"SUSE Manager Client Tools 12:python2-uyuni-common-libs-4.3.8-1.33.1.x86_64",
"SUSE Manager Client Tools 12:python2-zypp-plugin-spacewalk-1.0.14-30.42.1.noarch",
"SUSE Manager Client Tools 12:spacecmd-4.3.21-38.121.1.noarch",
"SUSE Manager Client Tools 12:zypp-plugin-spacewalk-1.0.14-30.42.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-0155",
"url": "https://www.suse.com/security/cve/CVE-2022-0155"
},
{
"category": "external",
"summary": "SUSE Bug 1218844 for CVE-2022-0155",
"url": "https://bugzilla.suse.com/1218844"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Manager Client Tools 12:grafana-9.5.1-1.48.1.aarch64",
"SUSE Manager Client Tools 12:grafana-9.5.1-1.48.1.ppc64le",
"SUSE Manager Client Tools 12:grafana-9.5.1-1.48.1.s390x",
"SUSE Manager Client Tools 12:grafana-9.5.1-1.48.1.x86_64",
"SUSE Manager Client Tools 12:mgr-daemon-4.3.7-1.41.1.noarch",
"SUSE Manager Client Tools 12:python2-uyuni-common-libs-4.3.8-1.33.1.aarch64",
"SUSE Manager Client Tools 12:python2-uyuni-common-libs-4.3.8-1.33.1.ppc64le",
"SUSE Manager Client Tools 12:python2-uyuni-common-libs-4.3.8-1.33.1.s390x",
"SUSE Manager Client Tools 12:python2-uyuni-common-libs-4.3.8-1.33.1.x86_64",
"SUSE Manager Client Tools 12:python2-zypp-plugin-spacewalk-1.0.14-30.42.1.noarch",
"SUSE Manager Client Tools 12:spacecmd-4.3.21-38.121.1.noarch",
"SUSE Manager Client Tools 12:zypp-plugin-spacewalk-1.0.14-30.42.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Manager Client Tools 12:grafana-9.5.1-1.48.1.aarch64",
"SUSE Manager Client Tools 12:grafana-9.5.1-1.48.1.ppc64le",
"SUSE Manager Client Tools 12:grafana-9.5.1-1.48.1.s390x",
"SUSE Manager Client Tools 12:grafana-9.5.1-1.48.1.x86_64",
"SUSE Manager Client Tools 12:mgr-daemon-4.3.7-1.41.1.noarch",
"SUSE Manager Client Tools 12:python2-uyuni-common-libs-4.3.8-1.33.1.aarch64",
"SUSE Manager Client Tools 12:python2-uyuni-common-libs-4.3.8-1.33.1.ppc64le",
"SUSE Manager Client Tools 12:python2-uyuni-common-libs-4.3.8-1.33.1.s390x",
"SUSE Manager Client Tools 12:python2-uyuni-common-libs-4.3.8-1.33.1.x86_64",
"SUSE Manager Client Tools 12:python2-zypp-plugin-spacewalk-1.0.14-30.42.1.noarch",
"SUSE Manager Client Tools 12:spacecmd-4.3.21-38.121.1.noarch",
"SUSE Manager Client Tools 12:zypp-plugin-spacewalk-1.0.14-30.42.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2023-06-21T11:52:13Z",
"details": "moderate"
}
],
"title": "CVE-2022-0155"
},
{
"cve": "CVE-2022-27191",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-27191"
}
],
"notes": [
{
"category": "general",
"text": "The golang.org/x/crypto/ssh package before 0.0.0-20220314234659-1baeb1ce4c0b for Go allows an attacker to crash a server in certain circumstances involving AddHostKey.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Manager Client Tools 12:grafana-9.5.1-1.48.1.aarch64",
"SUSE Manager Client Tools 12:grafana-9.5.1-1.48.1.ppc64le",
"SUSE Manager Client Tools 12:grafana-9.5.1-1.48.1.s390x",
"SUSE Manager Client Tools 12:grafana-9.5.1-1.48.1.x86_64",
"SUSE Manager Client Tools 12:mgr-daemon-4.3.7-1.41.1.noarch",
"SUSE Manager Client Tools 12:python2-uyuni-common-libs-4.3.8-1.33.1.aarch64",
"SUSE Manager Client Tools 12:python2-uyuni-common-libs-4.3.8-1.33.1.ppc64le",
"SUSE Manager Client Tools 12:python2-uyuni-common-libs-4.3.8-1.33.1.s390x",
"SUSE Manager Client Tools 12:python2-uyuni-common-libs-4.3.8-1.33.1.x86_64",
"SUSE Manager Client Tools 12:python2-zypp-plugin-spacewalk-1.0.14-30.42.1.noarch",
"SUSE Manager Client Tools 12:spacecmd-4.3.21-38.121.1.noarch",
"SUSE Manager Client Tools 12:zypp-plugin-spacewalk-1.0.14-30.42.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-27191",
"url": "https://www.suse.com/security/cve/CVE-2022-27191"
},
{
"category": "external",
"summary": "SUSE Bug 1197284 for CVE-2022-27191",
"url": "https://bugzilla.suse.com/1197284"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Manager Client Tools 12:grafana-9.5.1-1.48.1.aarch64",
"SUSE Manager Client Tools 12:grafana-9.5.1-1.48.1.ppc64le",
"SUSE Manager Client Tools 12:grafana-9.5.1-1.48.1.s390x",
"SUSE Manager Client Tools 12:grafana-9.5.1-1.48.1.x86_64",
"SUSE Manager Client Tools 12:mgr-daemon-4.3.7-1.41.1.noarch",
"SUSE Manager Client Tools 12:python2-uyuni-common-libs-4.3.8-1.33.1.aarch64",
"SUSE Manager Client Tools 12:python2-uyuni-common-libs-4.3.8-1.33.1.ppc64le",
"SUSE Manager Client Tools 12:python2-uyuni-common-libs-4.3.8-1.33.1.s390x",
"SUSE Manager Client Tools 12:python2-uyuni-common-libs-4.3.8-1.33.1.x86_64",
"SUSE Manager Client Tools 12:python2-zypp-plugin-spacewalk-1.0.14-30.42.1.noarch",
"SUSE Manager Client Tools 12:spacecmd-4.3.21-38.121.1.noarch",
"SUSE Manager Client Tools 12:zypp-plugin-spacewalk-1.0.14-30.42.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Manager Client Tools 12:grafana-9.5.1-1.48.1.aarch64",
"SUSE Manager Client Tools 12:grafana-9.5.1-1.48.1.ppc64le",
"SUSE Manager Client Tools 12:grafana-9.5.1-1.48.1.s390x",
"SUSE Manager Client Tools 12:grafana-9.5.1-1.48.1.x86_64",
"SUSE Manager Client Tools 12:mgr-daemon-4.3.7-1.41.1.noarch",
"SUSE Manager Client Tools 12:python2-uyuni-common-libs-4.3.8-1.33.1.aarch64",
"SUSE Manager Client Tools 12:python2-uyuni-common-libs-4.3.8-1.33.1.ppc64le",
"SUSE Manager Client Tools 12:python2-uyuni-common-libs-4.3.8-1.33.1.s390x",
"SUSE Manager Client Tools 12:python2-uyuni-common-libs-4.3.8-1.33.1.x86_64",
"SUSE Manager Client Tools 12:python2-zypp-plugin-spacewalk-1.0.14-30.42.1.noarch",
"SUSE Manager Client Tools 12:spacecmd-4.3.21-38.121.1.noarch",
"SUSE Manager Client Tools 12:zypp-plugin-spacewalk-1.0.14-30.42.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2023-06-21T11:52:13Z",
"details": "important"
}
],
"title": "CVE-2022-27191"
},
{
"cve": "CVE-2022-27664",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-27664"
}
],
"notes": [
{
"category": "general",
"text": "In net/http in Go before 1.18.6 and 1.19.x before 1.19.1, attackers can cause a denial of service because an HTTP/2 connection can hang during closing if shutdown were preempted by a fatal error.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Manager Client Tools 12:grafana-9.5.1-1.48.1.aarch64",
"SUSE Manager Client Tools 12:grafana-9.5.1-1.48.1.ppc64le",
"SUSE Manager Client Tools 12:grafana-9.5.1-1.48.1.s390x",
"SUSE Manager Client Tools 12:grafana-9.5.1-1.48.1.x86_64",
"SUSE Manager Client Tools 12:mgr-daemon-4.3.7-1.41.1.noarch",
"SUSE Manager Client Tools 12:python2-uyuni-common-libs-4.3.8-1.33.1.aarch64",
"SUSE Manager Client Tools 12:python2-uyuni-common-libs-4.3.8-1.33.1.ppc64le",
"SUSE Manager Client Tools 12:python2-uyuni-common-libs-4.3.8-1.33.1.s390x",
"SUSE Manager Client Tools 12:python2-uyuni-common-libs-4.3.8-1.33.1.x86_64",
"SUSE Manager Client Tools 12:python2-zypp-plugin-spacewalk-1.0.14-30.42.1.noarch",
"SUSE Manager Client Tools 12:spacecmd-4.3.21-38.121.1.noarch",
"SUSE Manager Client Tools 12:zypp-plugin-spacewalk-1.0.14-30.42.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-27664",
"url": "https://www.suse.com/security/cve/CVE-2022-27664"
},
{
"category": "external",
"summary": "SUSE Bug 1203185 for CVE-2022-27664",
"url": "https://bugzilla.suse.com/1203185"
},
{
"category": "external",
"summary": "SUSE Bug 1203293 for CVE-2022-27664",
"url": "https://bugzilla.suse.com/1203293"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Manager Client Tools 12:grafana-9.5.1-1.48.1.aarch64",
"SUSE Manager Client Tools 12:grafana-9.5.1-1.48.1.ppc64le",
"SUSE Manager Client Tools 12:grafana-9.5.1-1.48.1.s390x",
"SUSE Manager Client Tools 12:grafana-9.5.1-1.48.1.x86_64",
"SUSE Manager Client Tools 12:mgr-daemon-4.3.7-1.41.1.noarch",
"SUSE Manager Client Tools 12:python2-uyuni-common-libs-4.3.8-1.33.1.aarch64",
"SUSE Manager Client Tools 12:python2-uyuni-common-libs-4.3.8-1.33.1.ppc64le",
"SUSE Manager Client Tools 12:python2-uyuni-common-libs-4.3.8-1.33.1.s390x",
"SUSE Manager Client Tools 12:python2-uyuni-common-libs-4.3.8-1.33.1.x86_64",
"SUSE Manager Client Tools 12:python2-zypp-plugin-spacewalk-1.0.14-30.42.1.noarch",
"SUSE Manager Client Tools 12:spacecmd-4.3.21-38.121.1.noarch",
"SUSE Manager Client Tools 12:zypp-plugin-spacewalk-1.0.14-30.42.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Manager Client Tools 12:grafana-9.5.1-1.48.1.aarch64",
"SUSE Manager Client Tools 12:grafana-9.5.1-1.48.1.ppc64le",
"SUSE Manager Client Tools 12:grafana-9.5.1-1.48.1.s390x",
"SUSE Manager Client Tools 12:grafana-9.5.1-1.48.1.x86_64",
"SUSE Manager Client Tools 12:mgr-daemon-4.3.7-1.41.1.noarch",
"SUSE Manager Client Tools 12:python2-uyuni-common-libs-4.3.8-1.33.1.aarch64",
"SUSE Manager Client Tools 12:python2-uyuni-common-libs-4.3.8-1.33.1.ppc64le",
"SUSE Manager Client Tools 12:python2-uyuni-common-libs-4.3.8-1.33.1.s390x",
"SUSE Manager Client Tools 12:python2-uyuni-common-libs-4.3.8-1.33.1.x86_64",
"SUSE Manager Client Tools 12:python2-zypp-plugin-spacewalk-1.0.14-30.42.1.noarch",
"SUSE Manager Client Tools 12:spacecmd-4.3.21-38.121.1.noarch",
"SUSE Manager Client Tools 12:zypp-plugin-spacewalk-1.0.14-30.42.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2023-06-21T11:52:13Z",
"details": "important"
}
],
"title": "CVE-2022-27664"
},
{
"cve": "CVE-2022-31097",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-31097"
}
],
"notes": [
{
"category": "general",
"text": "Grafana is an open-source platform for monitoring and observability. Versions on the 8.x and 9.x branch prior to 9.0.3, 8.5.9, 8.4.10, and 8.3.10 are vulnerable to stored cross-site scripting via the Unified Alerting feature of Grafana. An attacker can exploit this vulnerability to escalate privilege from editor to admin by tricking an authenticated admin to click on a link. Versions 9.0.3, 8.5.9, 8.4.10, and 8.3.10 contain a patch. As a workaround, it is possible to disable alerting or use legacy alerting.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Manager Client Tools 12:grafana-9.5.1-1.48.1.aarch64",
"SUSE Manager Client Tools 12:grafana-9.5.1-1.48.1.ppc64le",
"SUSE Manager Client Tools 12:grafana-9.5.1-1.48.1.s390x",
"SUSE Manager Client Tools 12:grafana-9.5.1-1.48.1.x86_64",
"SUSE Manager Client Tools 12:mgr-daemon-4.3.7-1.41.1.noarch",
"SUSE Manager Client Tools 12:python2-uyuni-common-libs-4.3.8-1.33.1.aarch64",
"SUSE Manager Client Tools 12:python2-uyuni-common-libs-4.3.8-1.33.1.ppc64le",
"SUSE Manager Client Tools 12:python2-uyuni-common-libs-4.3.8-1.33.1.s390x",
"SUSE Manager Client Tools 12:python2-uyuni-common-libs-4.3.8-1.33.1.x86_64",
"SUSE Manager Client Tools 12:python2-zypp-plugin-spacewalk-1.0.14-30.42.1.noarch",
"SUSE Manager Client Tools 12:spacecmd-4.3.21-38.121.1.noarch",
"SUSE Manager Client Tools 12:zypp-plugin-spacewalk-1.0.14-30.42.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-31097",
"url": "https://www.suse.com/security/cve/CVE-2022-31097"
},
{
"category": "external",
"summary": "SUSE Bug 1201535 for CVE-2022-31097",
"url": "https://bugzilla.suse.com/1201535"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Manager Client Tools 12:grafana-9.5.1-1.48.1.aarch64",
"SUSE Manager Client Tools 12:grafana-9.5.1-1.48.1.ppc64le",
"SUSE Manager Client Tools 12:grafana-9.5.1-1.48.1.s390x",
"SUSE Manager Client Tools 12:grafana-9.5.1-1.48.1.x86_64",
"SUSE Manager Client Tools 12:mgr-daemon-4.3.7-1.41.1.noarch",
"SUSE Manager Client Tools 12:python2-uyuni-common-libs-4.3.8-1.33.1.aarch64",
"SUSE Manager Client Tools 12:python2-uyuni-common-libs-4.3.8-1.33.1.ppc64le",
"SUSE Manager Client Tools 12:python2-uyuni-common-libs-4.3.8-1.33.1.s390x",
"SUSE Manager Client Tools 12:python2-uyuni-common-libs-4.3.8-1.33.1.x86_64",
"SUSE Manager Client Tools 12:python2-zypp-plugin-spacewalk-1.0.14-30.42.1.noarch",
"SUSE Manager Client Tools 12:spacecmd-4.3.21-38.121.1.noarch",
"SUSE Manager Client Tools 12:zypp-plugin-spacewalk-1.0.14-30.42.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.3,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"SUSE Manager Client Tools 12:grafana-9.5.1-1.48.1.aarch64",
"SUSE Manager Client Tools 12:grafana-9.5.1-1.48.1.ppc64le",
"SUSE Manager Client Tools 12:grafana-9.5.1-1.48.1.s390x",
"SUSE Manager Client Tools 12:grafana-9.5.1-1.48.1.x86_64",
"SUSE Manager Client Tools 12:mgr-daemon-4.3.7-1.41.1.noarch",
"SUSE Manager Client Tools 12:python2-uyuni-common-libs-4.3.8-1.33.1.aarch64",
"SUSE Manager Client Tools 12:python2-uyuni-common-libs-4.3.8-1.33.1.ppc64le",
"SUSE Manager Client Tools 12:python2-uyuni-common-libs-4.3.8-1.33.1.s390x",
"SUSE Manager Client Tools 12:python2-uyuni-common-libs-4.3.8-1.33.1.x86_64",
"SUSE Manager Client Tools 12:python2-zypp-plugin-spacewalk-1.0.14-30.42.1.noarch",
"SUSE Manager Client Tools 12:spacecmd-4.3.21-38.121.1.noarch",
"SUSE Manager Client Tools 12:zypp-plugin-spacewalk-1.0.14-30.42.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2023-06-21T11:52:13Z",
"details": "important"
}
],
"title": "CVE-2022-31097"
},
{
"cve": "CVE-2022-31107",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-31107"
}
],
"notes": [
{
"category": "general",
"text": "Grafana is an open-source platform for monitoring and observability. In versions 5.3 until 9.0.3, 8.5.9, 8.4.10, and 8.3.10, it is possible for a malicious user who has authorization to log into a Grafana instance via a configured OAuth IdP which provides a login name to take over the account of another user in that Grafana instance. This can occur when the malicious user is authorized to log in to Grafana via OAuth, the malicious user\u0027s external user id is not already associated with an account in Grafana, the malicious user\u0027s email address is not already associated with an account in Grafana, and the malicious user knows the Grafana username of the target user. If these conditions are met, the malicious user can set their username in the OAuth provider to that of the target user, then go through the OAuth flow to log in to Grafana. Due to the way that external and internal user accounts are linked together during login, if the conditions above are all met then the malicious user will be able to log in to the target user\u0027s Grafana account. Versions 9.0.3, 8.5.9, 8.4.10, and 8.3.10 contain a patch for this issue. As a workaround, concerned users can disable OAuth login to their Grafana instance, or ensure that all users authorized to log in via OAuth have a corresponding user account in Grafana linked to their email address.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Manager Client Tools 12:grafana-9.5.1-1.48.1.aarch64",
"SUSE Manager Client Tools 12:grafana-9.5.1-1.48.1.ppc64le",
"SUSE Manager Client Tools 12:grafana-9.5.1-1.48.1.s390x",
"SUSE Manager Client Tools 12:grafana-9.5.1-1.48.1.x86_64",
"SUSE Manager Client Tools 12:mgr-daemon-4.3.7-1.41.1.noarch",
"SUSE Manager Client Tools 12:python2-uyuni-common-libs-4.3.8-1.33.1.aarch64",
"SUSE Manager Client Tools 12:python2-uyuni-common-libs-4.3.8-1.33.1.ppc64le",
"SUSE Manager Client Tools 12:python2-uyuni-common-libs-4.3.8-1.33.1.s390x",
"SUSE Manager Client Tools 12:python2-uyuni-common-libs-4.3.8-1.33.1.x86_64",
"SUSE Manager Client Tools 12:python2-zypp-plugin-spacewalk-1.0.14-30.42.1.noarch",
"SUSE Manager Client Tools 12:spacecmd-4.3.21-38.121.1.noarch",
"SUSE Manager Client Tools 12:zypp-plugin-spacewalk-1.0.14-30.42.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-31107",
"url": "https://www.suse.com/security/cve/CVE-2022-31107"
},
{
"category": "external",
"summary": "SUSE Bug 1201539 for CVE-2022-31107",
"url": "https://bugzilla.suse.com/1201539"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Manager Client Tools 12:grafana-9.5.1-1.48.1.aarch64",
"SUSE Manager Client Tools 12:grafana-9.5.1-1.48.1.ppc64le",
"SUSE Manager Client Tools 12:grafana-9.5.1-1.48.1.s390x",
"SUSE Manager Client Tools 12:grafana-9.5.1-1.48.1.x86_64",
"SUSE Manager Client Tools 12:mgr-daemon-4.3.7-1.41.1.noarch",
"SUSE Manager Client Tools 12:python2-uyuni-common-libs-4.3.8-1.33.1.aarch64",
"SUSE Manager Client Tools 12:python2-uyuni-common-libs-4.3.8-1.33.1.ppc64le",
"SUSE Manager Client Tools 12:python2-uyuni-common-libs-4.3.8-1.33.1.s390x",
"SUSE Manager Client Tools 12:python2-uyuni-common-libs-4.3.8-1.33.1.x86_64",
"SUSE Manager Client Tools 12:python2-zypp-plugin-spacewalk-1.0.14-30.42.1.noarch",
"SUSE Manager Client Tools 12:spacecmd-4.3.21-38.121.1.noarch",
"SUSE Manager Client Tools 12:zypp-plugin-spacewalk-1.0.14-30.42.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:L",
"version": "3.1"
},
"products": [
"SUSE Manager Client Tools 12:grafana-9.5.1-1.48.1.aarch64",
"SUSE Manager Client Tools 12:grafana-9.5.1-1.48.1.ppc64le",
"SUSE Manager Client Tools 12:grafana-9.5.1-1.48.1.s390x",
"SUSE Manager Client Tools 12:grafana-9.5.1-1.48.1.x86_64",
"SUSE Manager Client Tools 12:mgr-daemon-4.3.7-1.41.1.noarch",
"SUSE Manager Client Tools 12:python2-uyuni-common-libs-4.3.8-1.33.1.aarch64",
"SUSE Manager Client Tools 12:python2-uyuni-common-libs-4.3.8-1.33.1.ppc64le",
"SUSE Manager Client Tools 12:python2-uyuni-common-libs-4.3.8-1.33.1.s390x",
"SUSE Manager Client Tools 12:python2-uyuni-common-libs-4.3.8-1.33.1.x86_64",
"SUSE Manager Client Tools 12:python2-zypp-plugin-spacewalk-1.0.14-30.42.1.noarch",
"SUSE Manager Client Tools 12:spacecmd-4.3.21-38.121.1.noarch",
"SUSE Manager Client Tools 12:zypp-plugin-spacewalk-1.0.14-30.42.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2023-06-21T11:52:13Z",
"details": "important"
}
],
"title": "CVE-2022-31107"
},
{
"cve": "CVE-2022-32149",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-32149"
}
],
"notes": [
{
"category": "general",
"text": "An attacker may cause a denial of service by crafting an Accept-Language header which ParseAcceptLanguage will take significant time to parse.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Manager Client Tools 12:grafana-9.5.1-1.48.1.aarch64",
"SUSE Manager Client Tools 12:grafana-9.5.1-1.48.1.ppc64le",
"SUSE Manager Client Tools 12:grafana-9.5.1-1.48.1.s390x",
"SUSE Manager Client Tools 12:grafana-9.5.1-1.48.1.x86_64",
"SUSE Manager Client Tools 12:mgr-daemon-4.3.7-1.41.1.noarch",
"SUSE Manager Client Tools 12:python2-uyuni-common-libs-4.3.8-1.33.1.aarch64",
"SUSE Manager Client Tools 12:python2-uyuni-common-libs-4.3.8-1.33.1.ppc64le",
"SUSE Manager Client Tools 12:python2-uyuni-common-libs-4.3.8-1.33.1.s390x",
"SUSE Manager Client Tools 12:python2-uyuni-common-libs-4.3.8-1.33.1.x86_64",
"SUSE Manager Client Tools 12:python2-zypp-plugin-spacewalk-1.0.14-30.42.1.noarch",
"SUSE Manager Client Tools 12:spacecmd-4.3.21-38.121.1.noarch",
"SUSE Manager Client Tools 12:zypp-plugin-spacewalk-1.0.14-30.42.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-32149",
"url": "https://www.suse.com/security/cve/CVE-2022-32149"
},
{
"category": "external",
"summary": "SUSE Bug 1204501 for CVE-2022-32149",
"url": "https://bugzilla.suse.com/1204501"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Manager Client Tools 12:grafana-9.5.1-1.48.1.aarch64",
"SUSE Manager Client Tools 12:grafana-9.5.1-1.48.1.ppc64le",
"SUSE Manager Client Tools 12:grafana-9.5.1-1.48.1.s390x",
"SUSE Manager Client Tools 12:grafana-9.5.1-1.48.1.x86_64",
"SUSE Manager Client Tools 12:mgr-daemon-4.3.7-1.41.1.noarch",
"SUSE Manager Client Tools 12:python2-uyuni-common-libs-4.3.8-1.33.1.aarch64",
"SUSE Manager Client Tools 12:python2-uyuni-common-libs-4.3.8-1.33.1.ppc64le",
"SUSE Manager Client Tools 12:python2-uyuni-common-libs-4.3.8-1.33.1.s390x",
"SUSE Manager Client Tools 12:python2-uyuni-common-libs-4.3.8-1.33.1.x86_64",
"SUSE Manager Client Tools 12:python2-zypp-plugin-spacewalk-1.0.14-30.42.1.noarch",
"SUSE Manager Client Tools 12:spacecmd-4.3.21-38.121.1.noarch",
"SUSE Manager Client Tools 12:zypp-plugin-spacewalk-1.0.14-30.42.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Manager Client Tools 12:grafana-9.5.1-1.48.1.aarch64",
"SUSE Manager Client Tools 12:grafana-9.5.1-1.48.1.ppc64le",
"SUSE Manager Client Tools 12:grafana-9.5.1-1.48.1.s390x",
"SUSE Manager Client Tools 12:grafana-9.5.1-1.48.1.x86_64",
"SUSE Manager Client Tools 12:mgr-daemon-4.3.7-1.41.1.noarch",
"SUSE Manager Client Tools 12:python2-uyuni-common-libs-4.3.8-1.33.1.aarch64",
"SUSE Manager Client Tools 12:python2-uyuni-common-libs-4.3.8-1.33.1.ppc64le",
"SUSE Manager Client Tools 12:python2-uyuni-common-libs-4.3.8-1.33.1.s390x",
"SUSE Manager Client Tools 12:python2-uyuni-common-libs-4.3.8-1.33.1.x86_64",
"SUSE Manager Client Tools 12:python2-zypp-plugin-spacewalk-1.0.14-30.42.1.noarch",
"SUSE Manager Client Tools 12:spacecmd-4.3.21-38.121.1.noarch",
"SUSE Manager Client Tools 12:zypp-plugin-spacewalk-1.0.14-30.42.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2023-06-21T11:52:13Z",
"details": "important"
}
],
"title": "CVE-2022-32149"
},
{
"cve": "CVE-2022-35957",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-35957"
}
],
"notes": [
{
"category": "general",
"text": "Grafana is an open-source platform for monitoring and observability. Versions prior to 9.1.6 and 8.5.13 are vulnerable to an escalation from admin to server admin when auth proxy is used, allowing an admin to take over the server admin account and gain full control of the grafana instance. All installations should be upgraded as soon as possible. As a workaround deactivate auth proxy following the instructions at: https://grafana.com/docs/grafana/latest/setup-grafana/configure-security/configure-authentication/auth-proxy/",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Manager Client Tools 12:grafana-9.5.1-1.48.1.aarch64",
"SUSE Manager Client Tools 12:grafana-9.5.1-1.48.1.ppc64le",
"SUSE Manager Client Tools 12:grafana-9.5.1-1.48.1.s390x",
"SUSE Manager Client Tools 12:grafana-9.5.1-1.48.1.x86_64",
"SUSE Manager Client Tools 12:mgr-daemon-4.3.7-1.41.1.noarch",
"SUSE Manager Client Tools 12:python2-uyuni-common-libs-4.3.8-1.33.1.aarch64",
"SUSE Manager Client Tools 12:python2-uyuni-common-libs-4.3.8-1.33.1.ppc64le",
"SUSE Manager Client Tools 12:python2-uyuni-common-libs-4.3.8-1.33.1.s390x",
"SUSE Manager Client Tools 12:python2-uyuni-common-libs-4.3.8-1.33.1.x86_64",
"SUSE Manager Client Tools 12:python2-zypp-plugin-spacewalk-1.0.14-30.42.1.noarch",
"SUSE Manager Client Tools 12:spacecmd-4.3.21-38.121.1.noarch",
"SUSE Manager Client Tools 12:zypp-plugin-spacewalk-1.0.14-30.42.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-35957",
"url": "https://www.suse.com/security/cve/CVE-2022-35957"
},
{
"category": "external",
"summary": "SUSE Bug 1203597 for CVE-2022-35957",
"url": "https://bugzilla.suse.com/1203597"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Manager Client Tools 12:grafana-9.5.1-1.48.1.aarch64",
"SUSE Manager Client Tools 12:grafana-9.5.1-1.48.1.ppc64le",
"SUSE Manager Client Tools 12:grafana-9.5.1-1.48.1.s390x",
"SUSE Manager Client Tools 12:grafana-9.5.1-1.48.1.x86_64",
"SUSE Manager Client Tools 12:mgr-daemon-4.3.7-1.41.1.noarch",
"SUSE Manager Client Tools 12:python2-uyuni-common-libs-4.3.8-1.33.1.aarch64",
"SUSE Manager Client Tools 12:python2-uyuni-common-libs-4.3.8-1.33.1.ppc64le",
"SUSE Manager Client Tools 12:python2-uyuni-common-libs-4.3.8-1.33.1.s390x",
"SUSE Manager Client Tools 12:python2-uyuni-common-libs-4.3.8-1.33.1.x86_64",
"SUSE Manager Client Tools 12:python2-zypp-plugin-spacewalk-1.0.14-30.42.1.noarch",
"SUSE Manager Client Tools 12:spacecmd-4.3.21-38.121.1.noarch",
"SUSE Manager Client Tools 12:zypp-plugin-spacewalk-1.0.14-30.42.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Manager Client Tools 12:grafana-9.5.1-1.48.1.aarch64",
"SUSE Manager Client Tools 12:grafana-9.5.1-1.48.1.ppc64le",
"SUSE Manager Client Tools 12:grafana-9.5.1-1.48.1.s390x",
"SUSE Manager Client Tools 12:grafana-9.5.1-1.48.1.x86_64",
"SUSE Manager Client Tools 12:mgr-daemon-4.3.7-1.41.1.noarch",
"SUSE Manager Client Tools 12:python2-uyuni-common-libs-4.3.8-1.33.1.aarch64",
"SUSE Manager Client Tools 12:python2-uyuni-common-libs-4.3.8-1.33.1.ppc64le",
"SUSE Manager Client Tools 12:python2-uyuni-common-libs-4.3.8-1.33.1.s390x",
"SUSE Manager Client Tools 12:python2-uyuni-common-libs-4.3.8-1.33.1.x86_64",
"SUSE Manager Client Tools 12:python2-zypp-plugin-spacewalk-1.0.14-30.42.1.noarch",
"SUSE Manager Client Tools 12:spacecmd-4.3.21-38.121.1.noarch",
"SUSE Manager Client Tools 12:zypp-plugin-spacewalk-1.0.14-30.42.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2023-06-21T11:52:13Z",
"details": "moderate"
}
],
"title": "CVE-2022-35957"
},
{
"cve": "CVE-2022-36062",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-36062"
}
],
"notes": [
{
"category": "general",
"text": "Grafana is an open-source platform for monitoring and observability. In versions prior to 8.5.13, 9.0.9, and 9.1.6, Grafana is subject to Improper Preservation of Permissions resulting in privilege escalation on some folders where Admin is the only used permission. The vulnerability impacts Grafana instances where RBAC was disabled and enabled afterwards, as the migrations which are translating legacy folder permissions to RBAC permissions do not account for the scenario where the only user permission in the folder is Admin, as a result RBAC adds permissions for Editors and Viewers which allow them to edit and view folders accordingly. This issue has been patched in versions 8.5.13, 9.0.9, and 9.1.6. A workaround when the impacted folder/dashboard is known is to remove the additional permissions manually.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Manager Client Tools 12:grafana-9.5.1-1.48.1.aarch64",
"SUSE Manager Client Tools 12:grafana-9.5.1-1.48.1.ppc64le",
"SUSE Manager Client Tools 12:grafana-9.5.1-1.48.1.s390x",
"SUSE Manager Client Tools 12:grafana-9.5.1-1.48.1.x86_64",
"SUSE Manager Client Tools 12:mgr-daemon-4.3.7-1.41.1.noarch",
"SUSE Manager Client Tools 12:python2-uyuni-common-libs-4.3.8-1.33.1.aarch64",
"SUSE Manager Client Tools 12:python2-uyuni-common-libs-4.3.8-1.33.1.ppc64le",
"SUSE Manager Client Tools 12:python2-uyuni-common-libs-4.3.8-1.33.1.s390x",
"SUSE Manager Client Tools 12:python2-uyuni-common-libs-4.3.8-1.33.1.x86_64",
"SUSE Manager Client Tools 12:python2-zypp-plugin-spacewalk-1.0.14-30.42.1.noarch",
"SUSE Manager Client Tools 12:spacecmd-4.3.21-38.121.1.noarch",
"SUSE Manager Client Tools 12:zypp-plugin-spacewalk-1.0.14-30.42.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-36062",
"url": "https://www.suse.com/security/cve/CVE-2022-36062"
},
{
"category": "external",
"summary": "SUSE Bug 1203596 for CVE-2022-36062",
"url": "https://bugzilla.suse.com/1203596"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Manager Client Tools 12:grafana-9.5.1-1.48.1.aarch64",
"SUSE Manager Client Tools 12:grafana-9.5.1-1.48.1.ppc64le",
"SUSE Manager Client Tools 12:grafana-9.5.1-1.48.1.s390x",
"SUSE Manager Client Tools 12:grafana-9.5.1-1.48.1.x86_64",
"SUSE Manager Client Tools 12:mgr-daemon-4.3.7-1.41.1.noarch",
"SUSE Manager Client Tools 12:python2-uyuni-common-libs-4.3.8-1.33.1.aarch64",
"SUSE Manager Client Tools 12:python2-uyuni-common-libs-4.3.8-1.33.1.ppc64le",
"SUSE Manager Client Tools 12:python2-uyuni-common-libs-4.3.8-1.33.1.s390x",
"SUSE Manager Client Tools 12:python2-uyuni-common-libs-4.3.8-1.33.1.x86_64",
"SUSE Manager Client Tools 12:python2-zypp-plugin-spacewalk-1.0.14-30.42.1.noarch",
"SUSE Manager Client Tools 12:spacecmd-4.3.21-38.121.1.noarch",
"SUSE Manager Client Tools 12:zypp-plugin-spacewalk-1.0.14-30.42.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:L/A:L",
"version": "3.1"
},
"products": [
"SUSE Manager Client Tools 12:grafana-9.5.1-1.48.1.aarch64",
"SUSE Manager Client Tools 12:grafana-9.5.1-1.48.1.ppc64le",
"SUSE Manager Client Tools 12:grafana-9.5.1-1.48.1.s390x",
"SUSE Manager Client Tools 12:grafana-9.5.1-1.48.1.x86_64",
"SUSE Manager Client Tools 12:mgr-daemon-4.3.7-1.41.1.noarch",
"SUSE Manager Client Tools 12:python2-uyuni-common-libs-4.3.8-1.33.1.aarch64",
"SUSE Manager Client Tools 12:python2-uyuni-common-libs-4.3.8-1.33.1.ppc64le",
"SUSE Manager Client Tools 12:python2-uyuni-common-libs-4.3.8-1.33.1.s390x",
"SUSE Manager Client Tools 12:python2-uyuni-common-libs-4.3.8-1.33.1.x86_64",
"SUSE Manager Client Tools 12:python2-zypp-plugin-spacewalk-1.0.14-30.42.1.noarch",
"SUSE Manager Client Tools 12:spacecmd-4.3.21-38.121.1.noarch",
"SUSE Manager Client Tools 12:zypp-plugin-spacewalk-1.0.14-30.42.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2023-06-21T11:52:13Z",
"details": "moderate"
}
],
"title": "CVE-2022-36062"
},
{
"cve": "CVE-2022-41715",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-41715"
}
],
"notes": [
{
"category": "general",
"text": "Programs which compile regular expressions from untrusted sources may be vulnerable to memory exhaustion or denial of service. The parsed regexp representation is linear in the size of the input, but in some cases the constant factor can be as high as 40,000, making relatively small regexps consume much larger amounts of memory. After fix, each regexp being parsed is limited to a 256 MB memory footprint. Regular expressions whose representation would use more space than that are rejected. Normal use of regular expressions is unaffected.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Manager Client Tools 12:grafana-9.5.1-1.48.1.aarch64",
"SUSE Manager Client Tools 12:grafana-9.5.1-1.48.1.ppc64le",
"SUSE Manager Client Tools 12:grafana-9.5.1-1.48.1.s390x",
"SUSE Manager Client Tools 12:grafana-9.5.1-1.48.1.x86_64",
"SUSE Manager Client Tools 12:mgr-daemon-4.3.7-1.41.1.noarch",
"SUSE Manager Client Tools 12:python2-uyuni-common-libs-4.3.8-1.33.1.aarch64",
"SUSE Manager Client Tools 12:python2-uyuni-common-libs-4.3.8-1.33.1.ppc64le",
"SUSE Manager Client Tools 12:python2-uyuni-common-libs-4.3.8-1.33.1.s390x",
"SUSE Manager Client Tools 12:python2-uyuni-common-libs-4.3.8-1.33.1.x86_64",
"SUSE Manager Client Tools 12:python2-zypp-plugin-spacewalk-1.0.14-30.42.1.noarch",
"SUSE Manager Client Tools 12:spacecmd-4.3.21-38.121.1.noarch",
"SUSE Manager Client Tools 12:zypp-plugin-spacewalk-1.0.14-30.42.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-41715",
"url": "https://www.suse.com/security/cve/CVE-2022-41715"
},
{
"category": "external",
"summary": "SUSE Bug 1204023 for CVE-2022-41715",
"url": "https://bugzilla.suse.com/1204023"
},
{
"category": "external",
"summary": "SUSE Bug 1208441 for CVE-2022-41715",
"url": "https://bugzilla.suse.com/1208441"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Manager Client Tools 12:grafana-9.5.1-1.48.1.aarch64",
"SUSE Manager Client Tools 12:grafana-9.5.1-1.48.1.ppc64le",
"SUSE Manager Client Tools 12:grafana-9.5.1-1.48.1.s390x",
"SUSE Manager Client Tools 12:grafana-9.5.1-1.48.1.x86_64",
"SUSE Manager Client Tools 12:mgr-daemon-4.3.7-1.41.1.noarch",
"SUSE Manager Client Tools 12:python2-uyuni-common-libs-4.3.8-1.33.1.aarch64",
"SUSE Manager Client Tools 12:python2-uyuni-common-libs-4.3.8-1.33.1.ppc64le",
"SUSE Manager Client Tools 12:python2-uyuni-common-libs-4.3.8-1.33.1.s390x",
"SUSE Manager Client Tools 12:python2-uyuni-common-libs-4.3.8-1.33.1.x86_64",
"SUSE Manager Client Tools 12:python2-zypp-plugin-spacewalk-1.0.14-30.42.1.noarch",
"SUSE Manager Client Tools 12:spacecmd-4.3.21-38.121.1.noarch",
"SUSE Manager Client Tools 12:zypp-plugin-spacewalk-1.0.14-30.42.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Manager Client Tools 12:grafana-9.5.1-1.48.1.aarch64",
"SUSE Manager Client Tools 12:grafana-9.5.1-1.48.1.ppc64le",
"SUSE Manager Client Tools 12:grafana-9.5.1-1.48.1.s390x",
"SUSE Manager Client Tools 12:grafana-9.5.1-1.48.1.x86_64",
"SUSE Manager Client Tools 12:mgr-daemon-4.3.7-1.41.1.noarch",
"SUSE Manager Client Tools 12:python2-uyuni-common-libs-4.3.8-1.33.1.aarch64",
"SUSE Manager Client Tools 12:python2-uyuni-common-libs-4.3.8-1.33.1.ppc64le",
"SUSE Manager Client Tools 12:python2-uyuni-common-libs-4.3.8-1.33.1.s390x",
"SUSE Manager Client Tools 12:python2-uyuni-common-libs-4.3.8-1.33.1.x86_64",
"SUSE Manager Client Tools 12:python2-zypp-plugin-spacewalk-1.0.14-30.42.1.noarch",
"SUSE Manager Client Tools 12:spacecmd-4.3.21-38.121.1.noarch",
"SUSE Manager Client Tools 12:zypp-plugin-spacewalk-1.0.14-30.42.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2023-06-21T11:52:13Z",
"details": "moderate"
}
],
"title": "CVE-2022-41715"
},
{
"cve": "CVE-2022-46146",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-46146"
}
],
"notes": [
{
"category": "general",
"text": "Prometheus Exporter Toolkit is a utility package to build exporters. Prior to versions 0.7.2 and 0.8.2, if someone has access to a Prometheus web.yml file and users\u0027 bcrypted passwords, they can bypass security by poisoning the built-in authentication cache. Versions 0.7.2 and 0.8.2 contain a fix for the issue. There is no workaround, but attacker must have access to the hashed password to use this functionality.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Manager Client Tools 12:grafana-9.5.1-1.48.1.aarch64",
"SUSE Manager Client Tools 12:grafana-9.5.1-1.48.1.ppc64le",
"SUSE Manager Client Tools 12:grafana-9.5.1-1.48.1.s390x",
"SUSE Manager Client Tools 12:grafana-9.5.1-1.48.1.x86_64",
"SUSE Manager Client Tools 12:mgr-daemon-4.3.7-1.41.1.noarch",
"SUSE Manager Client Tools 12:python2-uyuni-common-libs-4.3.8-1.33.1.aarch64",
"SUSE Manager Client Tools 12:python2-uyuni-common-libs-4.3.8-1.33.1.ppc64le",
"SUSE Manager Client Tools 12:python2-uyuni-common-libs-4.3.8-1.33.1.s390x",
"SUSE Manager Client Tools 12:python2-uyuni-common-libs-4.3.8-1.33.1.x86_64",
"SUSE Manager Client Tools 12:python2-zypp-plugin-spacewalk-1.0.14-30.42.1.noarch",
"SUSE Manager Client Tools 12:spacecmd-4.3.21-38.121.1.noarch",
"SUSE Manager Client Tools 12:zypp-plugin-spacewalk-1.0.14-30.42.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-46146",
"url": "https://www.suse.com/security/cve/CVE-2022-46146"
},
{
"category": "external",
"summary": "SUSE Bug 1208046 for CVE-2022-46146",
"url": "https://bugzilla.suse.com/1208046"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Manager Client Tools 12:grafana-9.5.1-1.48.1.aarch64",
"SUSE Manager Client Tools 12:grafana-9.5.1-1.48.1.ppc64le",
"SUSE Manager Client Tools 12:grafana-9.5.1-1.48.1.s390x",
"SUSE Manager Client Tools 12:grafana-9.5.1-1.48.1.x86_64",
"SUSE Manager Client Tools 12:mgr-daemon-4.3.7-1.41.1.noarch",
"SUSE Manager Client Tools 12:python2-uyuni-common-libs-4.3.8-1.33.1.aarch64",
"SUSE Manager Client Tools 12:python2-uyuni-common-libs-4.3.8-1.33.1.ppc64le",
"SUSE Manager Client Tools 12:python2-uyuni-common-libs-4.3.8-1.33.1.s390x",
"SUSE Manager Client Tools 12:python2-uyuni-common-libs-4.3.8-1.33.1.x86_64",
"SUSE Manager Client Tools 12:python2-zypp-plugin-spacewalk-1.0.14-30.42.1.noarch",
"SUSE Manager Client Tools 12:spacecmd-4.3.21-38.121.1.noarch",
"SUSE Manager Client Tools 12:zypp-plugin-spacewalk-1.0.14-30.42.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Manager Client Tools 12:grafana-9.5.1-1.48.1.aarch64",
"SUSE Manager Client Tools 12:grafana-9.5.1-1.48.1.ppc64le",
"SUSE Manager Client Tools 12:grafana-9.5.1-1.48.1.s390x",
"SUSE Manager Client Tools 12:grafana-9.5.1-1.48.1.x86_64",
"SUSE Manager Client Tools 12:mgr-daemon-4.3.7-1.41.1.noarch",
"SUSE Manager Client Tools 12:python2-uyuni-common-libs-4.3.8-1.33.1.aarch64",
"SUSE Manager Client Tools 12:python2-uyuni-common-libs-4.3.8-1.33.1.ppc64le",
"SUSE Manager Client Tools 12:python2-uyuni-common-libs-4.3.8-1.33.1.s390x",
"SUSE Manager Client Tools 12:python2-uyuni-common-libs-4.3.8-1.33.1.x86_64",
"SUSE Manager Client Tools 12:python2-zypp-plugin-spacewalk-1.0.14-30.42.1.noarch",
"SUSE Manager Client Tools 12:spacecmd-4.3.21-38.121.1.noarch",
"SUSE Manager Client Tools 12:zypp-plugin-spacewalk-1.0.14-30.42.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2023-06-21T11:52:13Z",
"details": "important"
}
],
"title": "CVE-2022-46146"
},
{
"cve": "CVE-2023-1387",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-1387"
}
],
"notes": [
{
"category": "general",
"text": "Grafana is an open-source platform for monitoring and observability. \n\nStarting with the 9.1 branch, Grafana introduced the ability to search for a JWT in the URL query parameter auth_token and use it as the authentication token. \n\nBy enabling the \"url_login\" configuration option (disabled by default), a JWT might be sent to data sources. If an attacker has access to the data source, the leaked token could be used to authenticate to Grafana.\n\n",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Manager Client Tools 12:grafana-9.5.1-1.48.1.aarch64",
"SUSE Manager Client Tools 12:grafana-9.5.1-1.48.1.ppc64le",
"SUSE Manager Client Tools 12:grafana-9.5.1-1.48.1.s390x",
"SUSE Manager Client Tools 12:grafana-9.5.1-1.48.1.x86_64",
"SUSE Manager Client Tools 12:mgr-daemon-4.3.7-1.41.1.noarch",
"SUSE Manager Client Tools 12:python2-uyuni-common-libs-4.3.8-1.33.1.aarch64",
"SUSE Manager Client Tools 12:python2-uyuni-common-libs-4.3.8-1.33.1.ppc64le",
"SUSE Manager Client Tools 12:python2-uyuni-common-libs-4.3.8-1.33.1.s390x",
"SUSE Manager Client Tools 12:python2-uyuni-common-libs-4.3.8-1.33.1.x86_64",
"SUSE Manager Client Tools 12:python2-zypp-plugin-spacewalk-1.0.14-30.42.1.noarch",
"SUSE Manager Client Tools 12:spacecmd-4.3.21-38.121.1.noarch",
"SUSE Manager Client Tools 12:zypp-plugin-spacewalk-1.0.14-30.42.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-1387",
"url": "https://www.suse.com/security/cve/CVE-2023-1387"
},
{
"category": "external",
"summary": "SUSE Bug 1210907 for CVE-2023-1387",
"url": "https://bugzilla.suse.com/1210907"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Manager Client Tools 12:grafana-9.5.1-1.48.1.aarch64",
"SUSE Manager Client Tools 12:grafana-9.5.1-1.48.1.ppc64le",
"SUSE Manager Client Tools 12:grafana-9.5.1-1.48.1.s390x",
"SUSE Manager Client Tools 12:grafana-9.5.1-1.48.1.x86_64",
"SUSE Manager Client Tools 12:mgr-daemon-4.3.7-1.41.1.noarch",
"SUSE Manager Client Tools 12:python2-uyuni-common-libs-4.3.8-1.33.1.aarch64",
"SUSE Manager Client Tools 12:python2-uyuni-common-libs-4.3.8-1.33.1.ppc64le",
"SUSE Manager Client Tools 12:python2-uyuni-common-libs-4.3.8-1.33.1.s390x",
"SUSE Manager Client Tools 12:python2-uyuni-common-libs-4.3.8-1.33.1.x86_64",
"SUSE Manager Client Tools 12:python2-zypp-plugin-spacewalk-1.0.14-30.42.1.noarch",
"SUSE Manager Client Tools 12:spacecmd-4.3.21-38.121.1.noarch",
"SUSE Manager Client Tools 12:zypp-plugin-spacewalk-1.0.14-30.42.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Manager Client Tools 12:grafana-9.5.1-1.48.1.aarch64",
"SUSE Manager Client Tools 12:grafana-9.5.1-1.48.1.ppc64le",
"SUSE Manager Client Tools 12:grafana-9.5.1-1.48.1.s390x",
"SUSE Manager Client Tools 12:grafana-9.5.1-1.48.1.x86_64",
"SUSE Manager Client Tools 12:mgr-daemon-4.3.7-1.41.1.noarch",
"SUSE Manager Client Tools 12:python2-uyuni-common-libs-4.3.8-1.33.1.aarch64",
"SUSE Manager Client Tools 12:python2-uyuni-common-libs-4.3.8-1.33.1.ppc64le",
"SUSE Manager Client Tools 12:python2-uyuni-common-libs-4.3.8-1.33.1.s390x",
"SUSE Manager Client Tools 12:python2-uyuni-common-libs-4.3.8-1.33.1.x86_64",
"SUSE Manager Client Tools 12:python2-zypp-plugin-spacewalk-1.0.14-30.42.1.noarch",
"SUSE Manager Client Tools 12:spacecmd-4.3.21-38.121.1.noarch",
"SUSE Manager Client Tools 12:zypp-plugin-spacewalk-1.0.14-30.42.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2023-06-21T11:52:13Z",
"details": "moderate"
}
],
"title": "CVE-2023-1387"
},
{
"cve": "CVE-2023-1410",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-1410"
}
],
"notes": [
{
"category": "general",
"text": "Grafana is an open-source platform for monitoring and observability. \n\nGrafana had a stored XSS vulnerability in the Graphite FunctionDescription tooltip. \n\nThe stored XSS vulnerability was possible due the value of the Function Description was not properly sanitized.\n\nAn attacker needs to have control over the Graphite data source in order to manipulate a function description and a Grafana admin needs to configure the data source, later a Grafana user needs to select a tampered function and hover over the description. \n\n Users may upgrade to version 8.5.22, 9.2.15 and 9.3.11 to receive a fix. \n\n\n\n\n\n\n\n\n\n\n",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Manager Client Tools 12:grafana-9.5.1-1.48.1.aarch64",
"SUSE Manager Client Tools 12:grafana-9.5.1-1.48.1.ppc64le",
"SUSE Manager Client Tools 12:grafana-9.5.1-1.48.1.s390x",
"SUSE Manager Client Tools 12:grafana-9.5.1-1.48.1.x86_64",
"SUSE Manager Client Tools 12:mgr-daemon-4.3.7-1.41.1.noarch",
"SUSE Manager Client Tools 12:python2-uyuni-common-libs-4.3.8-1.33.1.aarch64",
"SUSE Manager Client Tools 12:python2-uyuni-common-libs-4.3.8-1.33.1.ppc64le",
"SUSE Manager Client Tools 12:python2-uyuni-common-libs-4.3.8-1.33.1.s390x",
"SUSE Manager Client Tools 12:python2-uyuni-common-libs-4.3.8-1.33.1.x86_64",
"SUSE Manager Client Tools 12:python2-zypp-plugin-spacewalk-1.0.14-30.42.1.noarch",
"SUSE Manager Client Tools 12:spacecmd-4.3.21-38.121.1.noarch",
"SUSE Manager Client Tools 12:zypp-plugin-spacewalk-1.0.14-30.42.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-1410",
"url": "https://www.suse.com/security/cve/CVE-2023-1410"
},
{
"category": "external",
"summary": "SUSE Bug 1209645 for CVE-2023-1410",
"url": "https://bugzilla.suse.com/1209645"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Manager Client Tools 12:grafana-9.5.1-1.48.1.aarch64",
"SUSE Manager Client Tools 12:grafana-9.5.1-1.48.1.ppc64le",
"SUSE Manager Client Tools 12:grafana-9.5.1-1.48.1.s390x",
"SUSE Manager Client Tools 12:grafana-9.5.1-1.48.1.x86_64",
"SUSE Manager Client Tools 12:mgr-daemon-4.3.7-1.41.1.noarch",
"SUSE Manager Client Tools 12:python2-uyuni-common-libs-4.3.8-1.33.1.aarch64",
"SUSE Manager Client Tools 12:python2-uyuni-common-libs-4.3.8-1.33.1.ppc64le",
"SUSE Manager Client Tools 12:python2-uyuni-common-libs-4.3.8-1.33.1.s390x",
"SUSE Manager Client Tools 12:python2-uyuni-common-libs-4.3.8-1.33.1.x86_64",
"SUSE Manager Client Tools 12:python2-zypp-plugin-spacewalk-1.0.14-30.42.1.noarch",
"SUSE Manager Client Tools 12:spacecmd-4.3.21-38.121.1.noarch",
"SUSE Manager Client Tools 12:zypp-plugin-spacewalk-1.0.14-30.42.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"SUSE Manager Client Tools 12:grafana-9.5.1-1.48.1.aarch64",
"SUSE Manager Client Tools 12:grafana-9.5.1-1.48.1.ppc64le",
"SUSE Manager Client Tools 12:grafana-9.5.1-1.48.1.s390x",
"SUSE Manager Client Tools 12:grafana-9.5.1-1.48.1.x86_64",
"SUSE Manager Client Tools 12:mgr-daemon-4.3.7-1.41.1.noarch",
"SUSE Manager Client Tools 12:python2-uyuni-common-libs-4.3.8-1.33.1.aarch64",
"SUSE Manager Client Tools 12:python2-uyuni-common-libs-4.3.8-1.33.1.ppc64le",
"SUSE Manager Client Tools 12:python2-uyuni-common-libs-4.3.8-1.33.1.s390x",
"SUSE Manager Client Tools 12:python2-uyuni-common-libs-4.3.8-1.33.1.x86_64",
"SUSE Manager Client Tools 12:python2-zypp-plugin-spacewalk-1.0.14-30.42.1.noarch",
"SUSE Manager Client Tools 12:spacecmd-4.3.21-38.121.1.noarch",
"SUSE Manager Client Tools 12:zypp-plugin-spacewalk-1.0.14-30.42.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2023-06-21T11:52:13Z",
"details": "moderate"
}
],
"title": "CVE-2023-1410"
}
]
}
suse-su-2023:3867-1
Vulnerability from csaf_suse
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for SUSE Manager Client Tools",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update fixes the following issues:\n\ngolang-github-lusitaniae-apache_exporter:\n\n- Security issues fixed:\n * CVE-2022-32149: Fix denial of service vulnerability (bsc#1204501)\n * CVE-2022-41723: Fix uncontrolled resource consumption (bsc#1208270)\n * CVE-2022-46146: Fix authentication bypass vulnarability (bsc#1208046)\n- Changes and bugs fixed:\n * Updated to 1.0.0 (jsc#PED-5405)\n + Improved flag parsing\n + Added support for custom headers\n * Changes from 0.13.1\n + Fix panic caused by missing flagConfig options\n * Added AppArmor profile\n * Added sandboxing options to systemd service unit\n * Build using promu\n * Build with Go 1.19\n * Exclude s390 architecture\n\ngolang-github-prometheus-alertmanager:\n\n- CVE-2023-29409: Restrict RSA keys in certificates to less than or equal to 8192 bits to avoid DoSing client/server\n while validating signatures for extremely large RSA keys. (bsc#1213880)\n There are no direct source changes. The CVE is fixed rebuilding the sources with the patched Go version.\n\ngolang-github-prometheus-node_exporter:\n\n- CVE-2023-29409: Restrict RSA keys in certificates to less than or equal to 8192 bits to avoid DoSing client/server\n while validating signatures for extremely large RSA keys. (bsc#1213880)\n There are no direct source changes. The CVE is fixed rebuilding the sources with the patched Go version.\n\ngolang-github-prometheus-prometheus:\n\n- This update introduces breaking changes. Please, read carefully the provided informations.\n- Security issues fixed:\n * CVE-2022-41723: Fix uncontrolled resource consumption by updating Go to version 1.20.1 (bsc#1208298)\n- Updated to 2.45.0 (jsc#PED-5406):\n * [FEATURE] API: New limit parameter to limit the number of items returned by `/api/v1/status/tsdb` endpoint\n * [FEATURE] Config: Add limits to global config\n * [FEATURE] Consul SD: Added support for `path_prefix`\n * [FEATURE] Native histograms: Add option to scrape both classic and native histograms.\n * [FEATURE] Native histograms: Added support for two more arithmetic operators `avg_over_time` and `sum_over_time`\n * [FEATURE] Promtool: When providing the block id, only one block will be loaded and analyzed\n * [FEATURE] Remote-write: New Azure ad configuration to support remote writing directly to Azure Monitor workspace\n * [FEATURE] TSDB: Samples per chunk are now configurable with flag `storage.tsdb.samples-per-chunk`. By default set\n to its former value 120\n * [ENHANCEMENT] Native histograms: bucket size can now be limited to avoid scrape fails\n * [ENHANCEMENT] TSDB: Dropped series are now deleted from the WAL sooner\n * [BUGFIX] Native histograms: ChunkSeries iterator now checks if a new sample can be appended to the open chunk\n * [BUGFIX] Native histograms: Fix Histogram Appender `Appendable()` segfault\n * [BUGFIX] Native histograms: Fix setting reset header to gauge histograms in seriesToChunkEncoder\n * [BUGFIX] TSDB: Tombstone intervals are not modified after Get() call\n * [BUGFIX] TSDB: Use path/filepath to set the WAL directory.\n- Changes from 2.44.0:\n * [FEATURE] Remote-read: Handle native histograms\n * [FEATURE] Promtool: Health and readiness check of prometheus server in CLI\n * [FEATURE] PromQL: Add `query_samples_total` metric, the total number of samples loaded by all queries\n * [ENHANCEMENT] Storage: Optimise buffer used to iterate through samples\n * [ENHANCEMENT] Scrape: Reduce memory allocations on target labels\n * [ENHANCEMENT] PromQL: Use faster heap method for `topk()` / `bottomk()`\n * [ENHANCEMENT] Rules API: Allow filtering by rule name\n * [ENHANCEMENT] Native Histograms: Various fixes and improvements\n * [ENHANCEMENT] UI: Search of scraping pools is now case-insensitive\n * [ENHANCEMENT] TSDB: Add an affirmative log message for successful WAL repair\n * [BUGFIX] TSDB: Block compaction failed when shutting down\n * [BUGFIX] TSDB: Out-of-order chunks could be ignored if the write-behind log was deleted\n- Changes from 2.43.1\n * [BUGFIX] Labels: Set() after Del() would be ignored, which broke some relabeling rules\n- Changes from 2.43.0:\n * [FEATURE] Promtool: Add HTTP client configuration to query commands\n * [FEATURE] Scrape: Add `include_scrape_configs` to include scrape configs from different files\n * [FEATURE] HTTP client: Add `no_proxy` to exclude URLs from proxied requests\n * [FEATURE] HTTP client: Add `proxy_from_enviroment` to read proxies from env variables\n * [ENHANCEMENT] API: Add support for setting lookback delta per query via the API\n * [ENHANCEMENT] API: Change HTTP status code from 503/422 to 499 if a request is canceled\n * [ENHANCEMENT] Scrape: Allow exemplars for all metric types\n * [ENHANCEMENT] TSDB: Add metrics for head chunks and WAL folders size\n * [ENHANCEMENT] TSDB: Automatically remove incorrect snapshot with index that is ahead of WAL\n * [ENHANCEMENT] TSDB: Improve Prometheus parser error outputs to be more comprehensible\n * [ENHANCEMENT] UI: Scope `group by` labels to metric in autocompletion\n * [BUGFIX] Scrape: Fix `prometheus_target_scrape_pool_target_limit` metric not set before reloading\n * [BUGFIX] TSDB: Correctly update `prometheus_tsdb_head_chunks_removed_total` and `prometheus_tsdb_head_chunks`\n metrics when reading WAL\n * [BUGFIX] TSDB: Use the correct unit (seconds) when recording out-of-order append deltas in the\n `prometheus_tsdb_sample_ooo_delta` metric\n- Changes from 2.42.0:\n This release comes with a new feature coverage for native histograms and breaking changes.\n If you are trying native histograms already, we recommend you remove the `wal` directory when upgrading. Because the\n old WAL record for native histograms is not backward compatible in v2.42.0, this will lead to some data loss for the\n latest data. Additionally, if you scrape \u0027float histograms\u0027 or use recording rules on native histograms in v2.42.0\n (which writes float histograms), it is a one-way street since older versions do not support float histograms.\n * [CHANGE] **breaking** TSDB: Changed WAL record format for the experimental native histograms\n * [FEATURE] Add \u0027keep_firing_for\u0027 field to alerting rules\n * [FEATURE] Promtool: Add support of selecting timeseries for TSDB dump\n * [ENHANCEMENT] Agent: Native histogram support.\n * [ENHANCEMENT] Rules: Support native histograms in recording rules\n * [ENHANCEMENT] SD: Add container ID as a meta label for pod targets for Kubernetes\n * [ENHANCEMENT] SD: Add VM size label to azure service discovery\n * [ENHANCEMENT] Support native histograms in federation\n * [ENHANCEMENT] TSDB: Add gauge histogram support\n * [ENHANCEMENT] TSDB/Scrape: Support FloatHistogram that represents buckets as float64 values\n * [ENHANCEMENT] UI: Show individual scrape pools on /targets page\n- Changes from 2.41.0:\n * [FEATURE] Relabeling: Add keepequal and dropequal relabel actions\n * [FEATURE] Add support for HTTP proxy headers\n * [ENHANCEMENT] Reload private certificates when changed on disk\n * [ENHANCEMENT] Add max_version to specify maximum TLS version in tls_config\n * [ENHANCEMENT] Add goos and goarch labels to prometheus_build_info\n * [ENHANCEMENT] SD: Add proxy support for EC2 and LightSail SDs\n * [ENHANCEMENT] SD: Add new metric prometheus_sd_file_watcher_errors_total\n * [ENHANCEMENT] Remote Read: Use a pool to speed up marshalling\n * [ENHANCEMENT] TSDB: Improve handling of tombstoned chunks in iterators\n * [ENHANCEMENT] TSDB: Optimize postings offset table reading\n * [BUGFIX] Scrape: Validate the metric name, label names, and label values after relabeling\n * [BUGFIX] Remote Write receiver and rule manager: Fix error handling\n- Changes from 2.40.7:\n * [BUGFIX] TSDB: Fix queries involving negative buckets of native histograms\n- Changes from 2.40.5:\n * [BUGFIX] TSDB: Fix queries involving native histograms due to improper reset of iterators\n- Changes from 2.40.3:\n * [BUGFIX] TSDB: Fix compaction after a deletion is called\n- Changes from 2.40.2:\n * [BUGFIX] UI: Fix black-on-black metric name color in dark mode\n- Changes from 2.40.1:\n * [BUGFIX] TSDB: Fix alignment for atomic int64 for 32 bit architecture\n * [BUGFIX] Scrape: Fix accept headers\n- Changes from 2.40.0:\n * [FEATURE] Add experimental support for native histograms.\n Enable with the flag --enable-feature=native-histograms.\n * [FEATURE] SD: Add service discovery for OVHcloud\n * [ENHANCEMENT] Kubernetes SD: Use protobuf encoding\n * [ENHANCEMENT] TSDB: Use golang.org/x/exp/slices for improved sorting speed\n * [ENHANCEMENT] Consul SD: Add enterprise admin partitions. Adds __meta_consul_partition label. Adds partition\n config in consul_sd_config\n * [BUGFIX] API: Fix API error codes for /api/v1/labels and /api/v1/series\n- Changes from 2.39.1:\n * [BUGFIX] Rules: Fix notifier relabel changing the labels on active alerts\n- Changes from 2.39.0:\n * [FEATURE] experimental TSDB: Add support for ingesting out-of-order samples. This is configured via\n out_of_order_time_window field in the config file; check config file docs for more info\n * [ENHANCEMENT] API: /-/healthy and /-/ready API calls now also respond to a HEAD request on top of existing\n GET support.\n * [ENHANCEMENT] PuppetDB SD: Add __meta_puppetdb_query label.\n * [ENHANCEMENT] AWS EC2 SD: Add __meta_ec2_region label.\n * [ENHANCEMENT] AWS Lightsail SD: Add __meta_lightsail_region label.\n * [ENHANCEMENT] Scrape: Optimise relabeling by re-using memory.\n * [ENHANCEMENT] TSDB: Improve WAL replay timings.\n * [ENHANCEMENT] TSDB: Optimise memory by not storing unnecessary data in the memory.\n * [ENHANCEMENT] TSDB: Allow overlapping blocks by default.\n --storage.tsdb.allow-overlapping-blocks now has no effect.\n * [ENHANCEMENT] UI: Click to copy label-value pair from query result to clipboard.\n * [BUGFIX] TSDB: Turn off isolation for Head compaction to fix a memory leak.\n * [BUGFIX] TSDB: Fix \u0027invalid magic number 0\u0027 error on Prometheus startup.\n * [BUGFIX] PromQL: Properly close file descriptor when logging unfinished queries.\n * [BUGFIX] Agent: Fix validation of flag options and prevent WAL from growing more than desired.\n- Changes from 2.38.0:\n * [FEATURE]: Web: Add a /api/v1/format_query HTTP API endpoint that allows pretty-formatting PromQL expressions.\n * [FEATURE]: UI: Add support for formatting PromQL expressions in the UI.\n * [FEATURE]: DNS SD: Support MX records for discovering targets.\n * [FEATURE]: Templates: Add toTime() template function that allows converting sample timestamps to\n Go time.Time values\n * [ENHANCEMENT]: Kubernetes SD: Add\n __meta_kubernetes_service_port_number meta label indicating the service port number.\n __meta_kubernetes_pod_container_image meta label indicating the container image.\n * [ENHANCEMENT]: PromQL: When a query panics, also log the query itself alongside the panic message.\n * [ENHANCEMENT]: UI: Tweak colors in the dark theme to improve the contrast ratio.\n * [ENHANCEMENT]: Web: Speed up calls to /api/v1/rules by avoiding locks and using atomic types instead.\n * [ENHANCEMENT]: Scrape: Add a no-default-scrape-port feature flag, which omits or removes any default HTTP (:80)\n or HTTPS (:443) ports in the target\u0027s scrape address.\n * [BUGFIX]: TSDB: In the WAL watcher metrics, expose the\n type=\u0027exemplar\u0027 label instead of type=\u0027unknown\u0027 for exemplar records.\n * [BUGFIX]: TSDB: Fix race condition around allocating series IDs during chunk snapshot loading.\n\ngolang-github-QubitProducts-exporter_exporter:\n\n- CVE-2023-29409: Restrict RSA keys in certificates to less than or equal to 8192 bits to avoid DoSing client/server\n while validating signatures for extremely large RSA keys. (bsc#1213880)\n There are no direct source changes. The CVE is fixed rebuilding the sources with the patched Go version.\n\ngrafana:\n\n- CVE-2023-29409: Restrict RSA keys in certificates to less than or equal to 8192 bits to avoid DoSing client/server\n while validating signatures for extremely large RSA keys. (bsc#1213880)\n There are no direct source changes. The CVE is fixed rebuilding the sources with the patched Go version.\n\nprometheus-blackbox_exporter:\n\n- CVE-2023-29409: Restrict RSA keys in certificates to less than or equal to 8192 bits to avoid DoSing client/server\n while validating signatures for extremely large RSA keys. (bsc#1213880)\n There are no direct source changes. The CVE is fixed rebuilding the sources with the patched Go version.\n\nprometheus-postgres_exporter:\n\n- CVE-2023-29409: Restrict RSA keys in certificates to less than or equal to 8192 bits to avoid DoSing client/server\n while validating signatures for extremely large RSA keys. (bsc#1213880)\n There are no direct source changes. The CVE is fixed rebuilding the sources with the patched Go version.\n\nspacecmd:\n\n- Updated to 4.3.23-1\n * Update translation strings\n\nsupportutils-plugin-susemanager-client:\n\n- Updated to 4.3.3-1\n * Write configured crypto-policy in supportconfig\n * Add cloud and Pay-as-you-go checks\n\nuyuni-common-libs:\n\n- Updated to 4.3.9-1\n * Workaround for python3-debian bug about collecting control file (bsc#1211525, bsc#1208692)\n\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2023-3867,SUSE-SLE-Manager-Tools-12-2023-3867,SUSE-SLE-SERVER-12-SP5-2023-3867",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2023_3867-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2023:3867-1",
"url": "https://www.suse.com/support/update/announcement/2023/suse-su-20233867-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2023:3867-1",
"url": "https://lists.suse.com/pipermail/sle-updates/2023-September/031790.html"
},
{
"category": "self",
"summary": "SUSE Bug 1204501",
"url": "https://bugzilla.suse.com/1204501"
},
{
"category": "self",
"summary": "SUSE Bug 1208046",
"url": "https://bugzilla.suse.com/1208046"
},
{
"category": "self",
"summary": "SUSE Bug 1208270",
"url": "https://bugzilla.suse.com/1208270"
},
{
"category": "self",
"summary": "SUSE Bug 1208298",
"url": "https://bugzilla.suse.com/1208298"
},
{
"category": "self",
"summary": "SUSE Bug 1208692",
"url": "https://bugzilla.suse.com/1208692"
},
{
"category": "self",
"summary": "SUSE Bug 1211525",
"url": "https://bugzilla.suse.com/1211525"
},
{
"category": "self",
"summary": "SUSE Bug 1213880",
"url": "https://bugzilla.suse.com/1213880"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-32149 page",
"url": "https://www.suse.com/security/cve/CVE-2022-32149/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-41723 page",
"url": "https://www.suse.com/security/cve/CVE-2022-41723/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-46146 page",
"url": "https://www.suse.com/security/cve/CVE-2022-46146/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-29409 page",
"url": "https://www.suse.com/security/cve/CVE-2023-29409/"
}
],
"title": "Security update for SUSE Manager Client Tools",
"tracking": {
"current_release_date": "2023-09-28T11:42:18Z",
"generator": {
"date": "2023-09-28T11:42:18Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2023:3867-1",
"initial_release_date": "2023-09-28T11:42:18Z",
"revision_history": [
{
"date": "2023-09-28T11:42:18Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "golang-github-QubitProducts-exporter_exporter-0.4.0-1.12.2.aarch64",
"product": {
"name": "golang-github-QubitProducts-exporter_exporter-0.4.0-1.12.2.aarch64",
"product_id": "golang-github-QubitProducts-exporter_exporter-0.4.0-1.12.2.aarch64"
}
},
{
"category": "product_version",
"name": "golang-github-lusitaniae-apache_exporter-1.0.0-1.18.2.aarch64",
"product": {
"name": "golang-github-lusitaniae-apache_exporter-1.0.0-1.18.2.aarch64",
"product_id": "golang-github-lusitaniae-apache_exporter-1.0.0-1.18.2.aarch64"
}
},
{
"category": "product_version",
"name": "golang-github-prometheus-alertmanager-0.23.0-1.21.2.aarch64",
"product": {
"name": "golang-github-prometheus-alertmanager-0.23.0-1.21.2.aarch64",
"product_id": "golang-github-prometheus-alertmanager-0.23.0-1.21.2.aarch64"
}
},
{
"category": "product_version",
"name": "golang-github-prometheus-node_exporter-1.5.0-1.27.2.aarch64",
"product": {
"name": "golang-github-prometheus-node_exporter-1.5.0-1.27.2.aarch64",
"product_id": "golang-github-prometheus-node_exporter-1.5.0-1.27.2.aarch64"
}
},
{
"category": "product_version",
"name": "golang-github-prometheus-prometheus-2.45.0-1.47.3.aarch64",
"product": {
"name": "golang-github-prometheus-prometheus-2.45.0-1.47.3.aarch64",
"product_id": "golang-github-prometheus-prometheus-2.45.0-1.47.3.aarch64"
}
},
{
"category": "product_version",
"name": "grafana-9.5.5-1.54.3.aarch64",
"product": {
"name": "grafana-9.5.5-1.54.3.aarch64",
"product_id": "grafana-9.5.5-1.54.3.aarch64"
}
},
{
"category": "product_version",
"name": "prometheus-blackbox_exporter-0.24.0-1.23.2.aarch64",
"product": {
"name": "prometheus-blackbox_exporter-0.24.0-1.23.2.aarch64",
"product_id": "prometheus-blackbox_exporter-0.24.0-1.23.2.aarch64"
}
},
{
"category": "product_version",
"name": "prometheus-postgres_exporter-0.10.1-1.14.3.aarch64",
"product": {
"name": "prometheus-postgres_exporter-0.10.1-1.14.3.aarch64",
"product_id": "prometheus-postgres_exporter-0.10.1-1.14.3.aarch64"
}
},
{
"category": "product_version",
"name": "python2-uyuni-common-libs-4.3.9-1.36.3.aarch64",
"product": {
"name": "python2-uyuni-common-libs-4.3.9-1.36.3.aarch64",
"product_id": "python2-uyuni-common-libs-4.3.9-1.36.3.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "golang-github-QubitProducts-exporter_exporter-0.4.0-1.12.2.i586",
"product": {
"name": "golang-github-QubitProducts-exporter_exporter-0.4.0-1.12.2.i586",
"product_id": "golang-github-QubitProducts-exporter_exporter-0.4.0-1.12.2.i586"
}
},
{
"category": "product_version",
"name": "golang-github-lusitaniae-apache_exporter-1.0.0-1.18.2.i586",
"product": {
"name": "golang-github-lusitaniae-apache_exporter-1.0.0-1.18.2.i586",
"product_id": "golang-github-lusitaniae-apache_exporter-1.0.0-1.18.2.i586"
}
},
{
"category": "product_version",
"name": "golang-github-prometheus-alertmanager-0.23.0-1.21.2.i586",
"product": {
"name": "golang-github-prometheus-alertmanager-0.23.0-1.21.2.i586",
"product_id": "golang-github-prometheus-alertmanager-0.23.0-1.21.2.i586"
}
},
{
"category": "product_version",
"name": "golang-github-prometheus-node_exporter-1.5.0-1.27.2.i586",
"product": {
"name": "golang-github-prometheus-node_exporter-1.5.0-1.27.2.i586",
"product_id": "golang-github-prometheus-node_exporter-1.5.0-1.27.2.i586"
}
},
{
"category": "product_version",
"name": "golang-github-prometheus-prometheus-2.45.0-1.47.3.i586",
"product": {
"name": "golang-github-prometheus-prometheus-2.45.0-1.47.3.i586",
"product_id": "golang-github-prometheus-prometheus-2.45.0-1.47.3.i586"
}
},
{
"category": "product_version",
"name": "grafana-9.5.5-1.54.3.i586",
"product": {
"name": "grafana-9.5.5-1.54.3.i586",
"product_id": "grafana-9.5.5-1.54.3.i586"
}
},
{
"category": "product_version",
"name": "prometheus-blackbox_exporter-0.24.0-1.23.2.i586",
"product": {
"name": "prometheus-blackbox_exporter-0.24.0-1.23.2.i586",
"product_id": "prometheus-blackbox_exporter-0.24.0-1.23.2.i586"
}
},
{
"category": "product_version",
"name": "prometheus-postgres_exporter-0.10.1-1.14.3.i586",
"product": {
"name": "prometheus-postgres_exporter-0.10.1-1.14.3.i586",
"product_id": "prometheus-postgres_exporter-0.10.1-1.14.3.i586"
}
},
{
"category": "product_version",
"name": "python2-uyuni-common-libs-4.3.9-1.36.3.i586",
"product": {
"name": "python2-uyuni-common-libs-4.3.9-1.36.3.i586",
"product_id": "python2-uyuni-common-libs-4.3.9-1.36.3.i586"
}
}
],
"category": "architecture",
"name": "i586"
},
{
"branches": [
{
"category": "product_version",
"name": "spacecmd-4.3.23-38.127.3.noarch",
"product": {
"name": "spacecmd-4.3.23-38.127.3.noarch",
"product_id": "spacecmd-4.3.23-38.127.3.noarch"
}
},
{
"category": "product_version",
"name": "supportutils-plugin-susemanager-client-4.3.3-6.27.2.noarch",
"product": {
"name": "supportutils-plugin-susemanager-client-4.3.3-6.27.2.noarch",
"product_id": "supportutils-plugin-susemanager-client-4.3.3-6.27.2.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "golang-github-QubitProducts-exporter_exporter-0.4.0-1.12.2.ppc64le",
"product": {
"name": "golang-github-QubitProducts-exporter_exporter-0.4.0-1.12.2.ppc64le",
"product_id": "golang-github-QubitProducts-exporter_exporter-0.4.0-1.12.2.ppc64le"
}
},
{
"category": "product_version",
"name": "golang-github-lusitaniae-apache_exporter-1.0.0-1.18.2.ppc64le",
"product": {
"name": "golang-github-lusitaniae-apache_exporter-1.0.0-1.18.2.ppc64le",
"product_id": "golang-github-lusitaniae-apache_exporter-1.0.0-1.18.2.ppc64le"
}
},
{
"category": "product_version",
"name": "golang-github-prometheus-alertmanager-0.23.0-1.21.2.ppc64le",
"product": {
"name": "golang-github-prometheus-alertmanager-0.23.0-1.21.2.ppc64le",
"product_id": "golang-github-prometheus-alertmanager-0.23.0-1.21.2.ppc64le"
}
},
{
"category": "product_version",
"name": "golang-github-prometheus-node_exporter-1.5.0-1.27.2.ppc64le",
"product": {
"name": "golang-github-prometheus-node_exporter-1.5.0-1.27.2.ppc64le",
"product_id": "golang-github-prometheus-node_exporter-1.5.0-1.27.2.ppc64le"
}
},
{
"category": "product_version",
"name": "golang-github-prometheus-prometheus-2.45.0-1.47.3.ppc64le",
"product": {
"name": "golang-github-prometheus-prometheus-2.45.0-1.47.3.ppc64le",
"product_id": "golang-github-prometheus-prometheus-2.45.0-1.47.3.ppc64le"
}
},
{
"category": "product_version",
"name": "grafana-9.5.5-1.54.3.ppc64le",
"product": {
"name": "grafana-9.5.5-1.54.3.ppc64le",
"product_id": "grafana-9.5.5-1.54.3.ppc64le"
}
},
{
"category": "product_version",
"name": "prometheus-blackbox_exporter-0.24.0-1.23.2.ppc64le",
"product": {
"name": "prometheus-blackbox_exporter-0.24.0-1.23.2.ppc64le",
"product_id": "prometheus-blackbox_exporter-0.24.0-1.23.2.ppc64le"
}
},
{
"category": "product_version",
"name": "prometheus-postgres_exporter-0.10.1-1.14.3.ppc64le",
"product": {
"name": "prometheus-postgres_exporter-0.10.1-1.14.3.ppc64le",
"product_id": "prometheus-postgres_exporter-0.10.1-1.14.3.ppc64le"
}
},
{
"category": "product_version",
"name": "python2-uyuni-common-libs-4.3.9-1.36.3.ppc64le",
"product": {
"name": "python2-uyuni-common-libs-4.3.9-1.36.3.ppc64le",
"product_id": "python2-uyuni-common-libs-4.3.9-1.36.3.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "python2-uyuni-common-libs-4.3.9-1.36.3.s390",
"product": {
"name": "python2-uyuni-common-libs-4.3.9-1.36.3.s390",
"product_id": "python2-uyuni-common-libs-4.3.9-1.36.3.s390"
}
}
],
"category": "architecture",
"name": "s390"
},
{
"branches": [
{
"category": "product_version",
"name": "golang-github-QubitProducts-exporter_exporter-0.4.0-1.12.2.s390x",
"product": {
"name": "golang-github-QubitProducts-exporter_exporter-0.4.0-1.12.2.s390x",
"product_id": "golang-github-QubitProducts-exporter_exporter-0.4.0-1.12.2.s390x"
}
},
{
"category": "product_version",
"name": "golang-github-lusitaniae-apache_exporter-1.0.0-1.18.2.s390x",
"product": {
"name": "golang-github-lusitaniae-apache_exporter-1.0.0-1.18.2.s390x",
"product_id": "golang-github-lusitaniae-apache_exporter-1.0.0-1.18.2.s390x"
}
},
{
"category": "product_version",
"name": "golang-github-prometheus-alertmanager-0.23.0-1.21.2.s390x",
"product": {
"name": "golang-github-prometheus-alertmanager-0.23.0-1.21.2.s390x",
"product_id": "golang-github-prometheus-alertmanager-0.23.0-1.21.2.s390x"
}
},
{
"category": "product_version",
"name": "golang-github-prometheus-node_exporter-1.5.0-1.27.2.s390x",
"product": {
"name": "golang-github-prometheus-node_exporter-1.5.0-1.27.2.s390x",
"product_id": "golang-github-prometheus-node_exporter-1.5.0-1.27.2.s390x"
}
},
{
"category": "product_version",
"name": "golang-github-prometheus-prometheus-2.45.0-1.47.3.s390x",
"product": {
"name": "golang-github-prometheus-prometheus-2.45.0-1.47.3.s390x",
"product_id": "golang-github-prometheus-prometheus-2.45.0-1.47.3.s390x"
}
},
{
"category": "product_version",
"name": "grafana-9.5.5-1.54.3.s390x",
"product": {
"name": "grafana-9.5.5-1.54.3.s390x",
"product_id": "grafana-9.5.5-1.54.3.s390x"
}
},
{
"category": "product_version",
"name": "prometheus-blackbox_exporter-0.24.0-1.23.2.s390x",
"product": {
"name": "prometheus-blackbox_exporter-0.24.0-1.23.2.s390x",
"product_id": "prometheus-blackbox_exporter-0.24.0-1.23.2.s390x"
}
},
{
"category": "product_version",
"name": "prometheus-postgres_exporter-0.10.1-1.14.3.s390x",
"product": {
"name": "prometheus-postgres_exporter-0.10.1-1.14.3.s390x",
"product_id": "prometheus-postgres_exporter-0.10.1-1.14.3.s390x"
}
},
{
"category": "product_version",
"name": "python2-uyuni-common-libs-4.3.9-1.36.3.s390x",
"product": {
"name": "python2-uyuni-common-libs-4.3.9-1.36.3.s390x",
"product_id": "python2-uyuni-common-libs-4.3.9-1.36.3.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "golang-github-QubitProducts-exporter_exporter-0.4.0-1.12.2.x86_64",
"product": {
"name": "golang-github-QubitProducts-exporter_exporter-0.4.0-1.12.2.x86_64",
"product_id": "golang-github-QubitProducts-exporter_exporter-0.4.0-1.12.2.x86_64"
}
},
{
"category": "product_version",
"name": "golang-github-lusitaniae-apache_exporter-1.0.0-1.18.2.x86_64",
"product": {
"name": "golang-github-lusitaniae-apache_exporter-1.0.0-1.18.2.x86_64",
"product_id": "golang-github-lusitaniae-apache_exporter-1.0.0-1.18.2.x86_64"
}
},
{
"category": "product_version",
"name": "golang-github-prometheus-alertmanager-0.23.0-1.21.2.x86_64",
"product": {
"name": "golang-github-prometheus-alertmanager-0.23.0-1.21.2.x86_64",
"product_id": "golang-github-prometheus-alertmanager-0.23.0-1.21.2.x86_64"
}
},
{
"category": "product_version",
"name": "golang-github-prometheus-node_exporter-1.5.0-1.27.2.x86_64",
"product": {
"name": "golang-github-prometheus-node_exporter-1.5.0-1.27.2.x86_64",
"product_id": "golang-github-prometheus-node_exporter-1.5.0-1.27.2.x86_64"
}
},
{
"category": "product_version",
"name": "golang-github-prometheus-prometheus-2.45.0-1.47.3.x86_64",
"product": {
"name": "golang-github-prometheus-prometheus-2.45.0-1.47.3.x86_64",
"product_id": "golang-github-prometheus-prometheus-2.45.0-1.47.3.x86_64"
}
},
{
"category": "product_version",
"name": "grafana-9.5.5-1.54.3.x86_64",
"product": {
"name": "grafana-9.5.5-1.54.3.x86_64",
"product_id": "grafana-9.5.5-1.54.3.x86_64"
}
},
{
"category": "product_version",
"name": "prometheus-blackbox_exporter-0.24.0-1.23.2.x86_64",
"product": {
"name": "prometheus-blackbox_exporter-0.24.0-1.23.2.x86_64",
"product_id": "prometheus-blackbox_exporter-0.24.0-1.23.2.x86_64"
}
},
{
"category": "product_version",
"name": "prometheus-postgres_exporter-0.10.1-1.14.3.x86_64",
"product": {
"name": "prometheus-postgres_exporter-0.10.1-1.14.3.x86_64",
"product_id": "prometheus-postgres_exporter-0.10.1-1.14.3.x86_64"
}
},
{
"category": "product_version",
"name": "python2-uyuni-common-libs-4.3.9-1.36.3.x86_64",
"product": {
"name": "python2-uyuni-common-libs-4.3.9-1.36.3.x86_64",
"product_id": "python2-uyuni-common-libs-4.3.9-1.36.3.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Manager Client Tools 12",
"product": {
"name": "SUSE Manager Client Tools 12",
"product_id": "SUSE Manager Client Tools 12"
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 12 SP5",
"product": {
"name": "SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles:12:sp5"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product": {
"name": "SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles_sap:12:sp5"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-github-QubitProducts-exporter_exporter-0.4.0-1.12.2.aarch64 as component of SUSE Manager Client Tools 12",
"product_id": "SUSE Manager Client Tools 12:golang-github-QubitProducts-exporter_exporter-0.4.0-1.12.2.aarch64"
},
"product_reference": "golang-github-QubitProducts-exporter_exporter-0.4.0-1.12.2.aarch64",
"relates_to_product_reference": "SUSE Manager Client Tools 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-github-QubitProducts-exporter_exporter-0.4.0-1.12.2.ppc64le as component of SUSE Manager Client Tools 12",
"product_id": "SUSE Manager Client Tools 12:golang-github-QubitProducts-exporter_exporter-0.4.0-1.12.2.ppc64le"
},
"product_reference": "golang-github-QubitProducts-exporter_exporter-0.4.0-1.12.2.ppc64le",
"relates_to_product_reference": "SUSE Manager Client Tools 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-github-QubitProducts-exporter_exporter-0.4.0-1.12.2.s390x as component of SUSE Manager Client Tools 12",
"product_id": "SUSE Manager Client Tools 12:golang-github-QubitProducts-exporter_exporter-0.4.0-1.12.2.s390x"
},
"product_reference": "golang-github-QubitProducts-exporter_exporter-0.4.0-1.12.2.s390x",
"relates_to_product_reference": "SUSE Manager Client Tools 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-github-QubitProducts-exporter_exporter-0.4.0-1.12.2.x86_64 as component of SUSE Manager Client Tools 12",
"product_id": "SUSE Manager Client Tools 12:golang-github-QubitProducts-exporter_exporter-0.4.0-1.12.2.x86_64"
},
"product_reference": "golang-github-QubitProducts-exporter_exporter-0.4.0-1.12.2.x86_64",
"relates_to_product_reference": "SUSE Manager Client Tools 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-github-lusitaniae-apache_exporter-1.0.0-1.18.2.aarch64 as component of SUSE Manager Client Tools 12",
"product_id": "SUSE Manager Client Tools 12:golang-github-lusitaniae-apache_exporter-1.0.0-1.18.2.aarch64"
},
"product_reference": "golang-github-lusitaniae-apache_exporter-1.0.0-1.18.2.aarch64",
"relates_to_product_reference": "SUSE Manager Client Tools 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-github-lusitaniae-apache_exporter-1.0.0-1.18.2.ppc64le as component of SUSE Manager Client Tools 12",
"product_id": "SUSE Manager Client Tools 12:golang-github-lusitaniae-apache_exporter-1.0.0-1.18.2.ppc64le"
},
"product_reference": "golang-github-lusitaniae-apache_exporter-1.0.0-1.18.2.ppc64le",
"relates_to_product_reference": "SUSE Manager Client Tools 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-github-lusitaniae-apache_exporter-1.0.0-1.18.2.s390x as component of SUSE Manager Client Tools 12",
"product_id": "SUSE Manager Client Tools 12:golang-github-lusitaniae-apache_exporter-1.0.0-1.18.2.s390x"
},
"product_reference": "golang-github-lusitaniae-apache_exporter-1.0.0-1.18.2.s390x",
"relates_to_product_reference": "SUSE Manager Client Tools 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-github-lusitaniae-apache_exporter-1.0.0-1.18.2.x86_64 as component of SUSE Manager Client Tools 12",
"product_id": "SUSE Manager Client Tools 12:golang-github-lusitaniae-apache_exporter-1.0.0-1.18.2.x86_64"
},
"product_reference": "golang-github-lusitaniae-apache_exporter-1.0.0-1.18.2.x86_64",
"relates_to_product_reference": "SUSE Manager Client Tools 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-github-prometheus-alertmanager-0.23.0-1.21.2.aarch64 as component of SUSE Manager Client Tools 12",
"product_id": "SUSE Manager Client Tools 12:golang-github-prometheus-alertmanager-0.23.0-1.21.2.aarch64"
},
"product_reference": "golang-github-prometheus-alertmanager-0.23.0-1.21.2.aarch64",
"relates_to_product_reference": "SUSE Manager Client Tools 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-github-prometheus-alertmanager-0.23.0-1.21.2.ppc64le as component of SUSE Manager Client Tools 12",
"product_id": "SUSE Manager Client Tools 12:golang-github-prometheus-alertmanager-0.23.0-1.21.2.ppc64le"
},
"product_reference": "golang-github-prometheus-alertmanager-0.23.0-1.21.2.ppc64le",
"relates_to_product_reference": "SUSE Manager Client Tools 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-github-prometheus-alertmanager-0.23.0-1.21.2.s390x as component of SUSE Manager Client Tools 12",
"product_id": "SUSE Manager Client Tools 12:golang-github-prometheus-alertmanager-0.23.0-1.21.2.s390x"
},
"product_reference": "golang-github-prometheus-alertmanager-0.23.0-1.21.2.s390x",
"relates_to_product_reference": "SUSE Manager Client Tools 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-github-prometheus-alertmanager-0.23.0-1.21.2.x86_64 as component of SUSE Manager Client Tools 12",
"product_id": "SUSE Manager Client Tools 12:golang-github-prometheus-alertmanager-0.23.0-1.21.2.x86_64"
},
"product_reference": "golang-github-prometheus-alertmanager-0.23.0-1.21.2.x86_64",
"relates_to_product_reference": "SUSE Manager Client Tools 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-github-prometheus-node_exporter-1.5.0-1.27.2.aarch64 as component of SUSE Manager Client Tools 12",
"product_id": "SUSE Manager Client Tools 12:golang-github-prometheus-node_exporter-1.5.0-1.27.2.aarch64"
},
"product_reference": "golang-github-prometheus-node_exporter-1.5.0-1.27.2.aarch64",
"relates_to_product_reference": "SUSE Manager Client Tools 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-github-prometheus-node_exporter-1.5.0-1.27.2.ppc64le as component of SUSE Manager Client Tools 12",
"product_id": "SUSE Manager Client Tools 12:golang-github-prometheus-node_exporter-1.5.0-1.27.2.ppc64le"
},
"product_reference": "golang-github-prometheus-node_exporter-1.5.0-1.27.2.ppc64le",
"relates_to_product_reference": "SUSE Manager Client Tools 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-github-prometheus-node_exporter-1.5.0-1.27.2.s390x as component of SUSE Manager Client Tools 12",
"product_id": "SUSE Manager Client Tools 12:golang-github-prometheus-node_exporter-1.5.0-1.27.2.s390x"
},
"product_reference": "golang-github-prometheus-node_exporter-1.5.0-1.27.2.s390x",
"relates_to_product_reference": "SUSE Manager Client Tools 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-github-prometheus-node_exporter-1.5.0-1.27.2.x86_64 as component of SUSE Manager Client Tools 12",
"product_id": "SUSE Manager Client Tools 12:golang-github-prometheus-node_exporter-1.5.0-1.27.2.x86_64"
},
"product_reference": "golang-github-prometheus-node_exporter-1.5.0-1.27.2.x86_64",
"relates_to_product_reference": "SUSE Manager Client Tools 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-github-prometheus-prometheus-2.45.0-1.47.3.aarch64 as component of SUSE Manager Client Tools 12",
"product_id": "SUSE Manager Client Tools 12:golang-github-prometheus-prometheus-2.45.0-1.47.3.aarch64"
},
"product_reference": "golang-github-prometheus-prometheus-2.45.0-1.47.3.aarch64",
"relates_to_product_reference": "SUSE Manager Client Tools 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-github-prometheus-prometheus-2.45.0-1.47.3.ppc64le as component of SUSE Manager Client Tools 12",
"product_id": "SUSE Manager Client Tools 12:golang-github-prometheus-prometheus-2.45.0-1.47.3.ppc64le"
},
"product_reference": "golang-github-prometheus-prometheus-2.45.0-1.47.3.ppc64le",
"relates_to_product_reference": "SUSE Manager Client Tools 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-github-prometheus-prometheus-2.45.0-1.47.3.s390x as component of SUSE Manager Client Tools 12",
"product_id": "SUSE Manager Client Tools 12:golang-github-prometheus-prometheus-2.45.0-1.47.3.s390x"
},
"product_reference": "golang-github-prometheus-prometheus-2.45.0-1.47.3.s390x",
"relates_to_product_reference": "SUSE Manager Client Tools 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-github-prometheus-prometheus-2.45.0-1.47.3.x86_64 as component of SUSE Manager Client Tools 12",
"product_id": "SUSE Manager Client Tools 12:golang-github-prometheus-prometheus-2.45.0-1.47.3.x86_64"
},
"product_reference": "golang-github-prometheus-prometheus-2.45.0-1.47.3.x86_64",
"relates_to_product_reference": "SUSE Manager Client Tools 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "grafana-9.5.5-1.54.3.aarch64 as component of SUSE Manager Client Tools 12",
"product_id": "SUSE Manager Client Tools 12:grafana-9.5.5-1.54.3.aarch64"
},
"product_reference": "grafana-9.5.5-1.54.3.aarch64",
"relates_to_product_reference": "SUSE Manager Client Tools 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "grafana-9.5.5-1.54.3.ppc64le as component of SUSE Manager Client Tools 12",
"product_id": "SUSE Manager Client Tools 12:grafana-9.5.5-1.54.3.ppc64le"
},
"product_reference": "grafana-9.5.5-1.54.3.ppc64le",
"relates_to_product_reference": "SUSE Manager Client Tools 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "grafana-9.5.5-1.54.3.s390x as component of SUSE Manager Client Tools 12",
"product_id": "SUSE Manager Client Tools 12:grafana-9.5.5-1.54.3.s390x"
},
"product_reference": "grafana-9.5.5-1.54.3.s390x",
"relates_to_product_reference": "SUSE Manager Client Tools 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "grafana-9.5.5-1.54.3.x86_64 as component of SUSE Manager Client Tools 12",
"product_id": "SUSE Manager Client Tools 12:grafana-9.5.5-1.54.3.x86_64"
},
"product_reference": "grafana-9.5.5-1.54.3.x86_64",
"relates_to_product_reference": "SUSE Manager Client Tools 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "prometheus-blackbox_exporter-0.24.0-1.23.2.aarch64 as component of SUSE Manager Client Tools 12",
"product_id": "SUSE Manager Client Tools 12:prometheus-blackbox_exporter-0.24.0-1.23.2.aarch64"
},
"product_reference": "prometheus-blackbox_exporter-0.24.0-1.23.2.aarch64",
"relates_to_product_reference": "SUSE Manager Client Tools 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "prometheus-blackbox_exporter-0.24.0-1.23.2.ppc64le as component of SUSE Manager Client Tools 12",
"product_id": "SUSE Manager Client Tools 12:prometheus-blackbox_exporter-0.24.0-1.23.2.ppc64le"
},
"product_reference": "prometheus-blackbox_exporter-0.24.0-1.23.2.ppc64le",
"relates_to_product_reference": "SUSE Manager Client Tools 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "prometheus-blackbox_exporter-0.24.0-1.23.2.s390x as component of SUSE Manager Client Tools 12",
"product_id": "SUSE Manager Client Tools 12:prometheus-blackbox_exporter-0.24.0-1.23.2.s390x"
},
"product_reference": "prometheus-blackbox_exporter-0.24.0-1.23.2.s390x",
"relates_to_product_reference": "SUSE Manager Client Tools 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "prometheus-blackbox_exporter-0.24.0-1.23.2.x86_64 as component of SUSE Manager Client Tools 12",
"product_id": "SUSE Manager Client Tools 12:prometheus-blackbox_exporter-0.24.0-1.23.2.x86_64"
},
"product_reference": "prometheus-blackbox_exporter-0.24.0-1.23.2.x86_64",
"relates_to_product_reference": "SUSE Manager Client Tools 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "prometheus-postgres_exporter-0.10.1-1.14.3.aarch64 as component of SUSE Manager Client Tools 12",
"product_id": "SUSE Manager Client Tools 12:prometheus-postgres_exporter-0.10.1-1.14.3.aarch64"
},
"product_reference": "prometheus-postgres_exporter-0.10.1-1.14.3.aarch64",
"relates_to_product_reference": "SUSE Manager Client Tools 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "prometheus-postgres_exporter-0.10.1-1.14.3.ppc64le as component of SUSE Manager Client Tools 12",
"product_id": "SUSE Manager Client Tools 12:prometheus-postgres_exporter-0.10.1-1.14.3.ppc64le"
},
"product_reference": "prometheus-postgres_exporter-0.10.1-1.14.3.ppc64le",
"relates_to_product_reference": "SUSE Manager Client Tools 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "prometheus-postgres_exporter-0.10.1-1.14.3.s390x as component of SUSE Manager Client Tools 12",
"product_id": "SUSE Manager Client Tools 12:prometheus-postgres_exporter-0.10.1-1.14.3.s390x"
},
"product_reference": "prometheus-postgres_exporter-0.10.1-1.14.3.s390x",
"relates_to_product_reference": "SUSE Manager Client Tools 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "prometheus-postgres_exporter-0.10.1-1.14.3.x86_64 as component of SUSE Manager Client Tools 12",
"product_id": "SUSE Manager Client Tools 12:prometheus-postgres_exporter-0.10.1-1.14.3.x86_64"
},
"product_reference": "prometheus-postgres_exporter-0.10.1-1.14.3.x86_64",
"relates_to_product_reference": "SUSE Manager Client Tools 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python2-uyuni-common-libs-4.3.9-1.36.3.aarch64 as component of SUSE Manager Client Tools 12",
"product_id": "SUSE Manager Client Tools 12:python2-uyuni-common-libs-4.3.9-1.36.3.aarch64"
},
"product_reference": "python2-uyuni-common-libs-4.3.9-1.36.3.aarch64",
"relates_to_product_reference": "SUSE Manager Client Tools 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python2-uyuni-common-libs-4.3.9-1.36.3.ppc64le as component of SUSE Manager Client Tools 12",
"product_id": "SUSE Manager Client Tools 12:python2-uyuni-common-libs-4.3.9-1.36.3.ppc64le"
},
"product_reference": "python2-uyuni-common-libs-4.3.9-1.36.3.ppc64le",
"relates_to_product_reference": "SUSE Manager Client Tools 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python2-uyuni-common-libs-4.3.9-1.36.3.s390x as component of SUSE Manager Client Tools 12",
"product_id": "SUSE Manager Client Tools 12:python2-uyuni-common-libs-4.3.9-1.36.3.s390x"
},
"product_reference": "python2-uyuni-common-libs-4.3.9-1.36.3.s390x",
"relates_to_product_reference": "SUSE Manager Client Tools 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python2-uyuni-common-libs-4.3.9-1.36.3.x86_64 as component of SUSE Manager Client Tools 12",
"product_id": "SUSE Manager Client Tools 12:python2-uyuni-common-libs-4.3.9-1.36.3.x86_64"
},
"product_reference": "python2-uyuni-common-libs-4.3.9-1.36.3.x86_64",
"relates_to_product_reference": "SUSE Manager Client Tools 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "spacecmd-4.3.23-38.127.3.noarch as component of SUSE Manager Client Tools 12",
"product_id": "SUSE Manager Client Tools 12:spacecmd-4.3.23-38.127.3.noarch"
},
"product_reference": "spacecmd-4.3.23-38.127.3.noarch",
"relates_to_product_reference": "SUSE Manager Client Tools 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "supportutils-plugin-susemanager-client-4.3.3-6.27.2.noarch as component of SUSE Manager Client Tools 12",
"product_id": "SUSE Manager Client Tools 12:supportutils-plugin-susemanager-client-4.3.3-6.27.2.noarch"
},
"product_reference": "supportutils-plugin-susemanager-client-4.3.3-6.27.2.noarch",
"relates_to_product_reference": "SUSE Manager Client Tools 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-github-prometheus-node_exporter-1.5.0-1.27.2.aarch64 as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:golang-github-prometheus-node_exporter-1.5.0-1.27.2.aarch64"
},
"product_reference": "golang-github-prometheus-node_exporter-1.5.0-1.27.2.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-github-prometheus-node_exporter-1.5.0-1.27.2.ppc64le as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:golang-github-prometheus-node_exporter-1.5.0-1.27.2.ppc64le"
},
"product_reference": "golang-github-prometheus-node_exporter-1.5.0-1.27.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-github-prometheus-node_exporter-1.5.0-1.27.2.s390x as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:golang-github-prometheus-node_exporter-1.5.0-1.27.2.s390x"
},
"product_reference": "golang-github-prometheus-node_exporter-1.5.0-1.27.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-github-prometheus-node_exporter-1.5.0-1.27.2.x86_64 as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:golang-github-prometheus-node_exporter-1.5.0-1.27.2.x86_64"
},
"product_reference": "golang-github-prometheus-node_exporter-1.5.0-1.27.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-github-prometheus-node_exporter-1.5.0-1.27.2.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:golang-github-prometheus-node_exporter-1.5.0-1.27.2.aarch64"
},
"product_reference": "golang-github-prometheus-node_exporter-1.5.0-1.27.2.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-github-prometheus-node_exporter-1.5.0-1.27.2.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:golang-github-prometheus-node_exporter-1.5.0-1.27.2.ppc64le"
},
"product_reference": "golang-github-prometheus-node_exporter-1.5.0-1.27.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-github-prometheus-node_exporter-1.5.0-1.27.2.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:golang-github-prometheus-node_exporter-1.5.0-1.27.2.s390x"
},
"product_reference": "golang-github-prometheus-node_exporter-1.5.0-1.27.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-github-prometheus-node_exporter-1.5.0-1.27.2.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:golang-github-prometheus-node_exporter-1.5.0-1.27.2.x86_64"
},
"product_reference": "golang-github-prometheus-node_exporter-1.5.0-1.27.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2022-32149",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-32149"
}
],
"notes": [
{
"category": "general",
"text": "An attacker may cause a denial of service by crafting an Accept-Language header which ParseAcceptLanguage will take significant time to parse.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:golang-github-prometheus-node_exporter-1.5.0-1.27.2.aarch64",
"SUSE Linux Enterprise Server 12 SP5:golang-github-prometheus-node_exporter-1.5.0-1.27.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:golang-github-prometheus-node_exporter-1.5.0-1.27.2.s390x",
"SUSE Linux Enterprise Server 12 SP5:golang-github-prometheus-node_exporter-1.5.0-1.27.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:golang-github-prometheus-node_exporter-1.5.0-1.27.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:golang-github-prometheus-node_exporter-1.5.0-1.27.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:golang-github-prometheus-node_exporter-1.5.0-1.27.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:golang-github-prometheus-node_exporter-1.5.0-1.27.2.x86_64",
"SUSE Manager Client Tools 12:golang-github-QubitProducts-exporter_exporter-0.4.0-1.12.2.aarch64",
"SUSE Manager Client Tools 12:golang-github-QubitProducts-exporter_exporter-0.4.0-1.12.2.ppc64le",
"SUSE Manager Client Tools 12:golang-github-QubitProducts-exporter_exporter-0.4.0-1.12.2.s390x",
"SUSE Manager Client Tools 12:golang-github-QubitProducts-exporter_exporter-0.4.0-1.12.2.x86_64",
"SUSE Manager Client Tools 12:golang-github-lusitaniae-apache_exporter-1.0.0-1.18.2.aarch64",
"SUSE Manager Client Tools 12:golang-github-lusitaniae-apache_exporter-1.0.0-1.18.2.ppc64le",
"SUSE Manager Client Tools 12:golang-github-lusitaniae-apache_exporter-1.0.0-1.18.2.s390x",
"SUSE Manager Client Tools 12:golang-github-lusitaniae-apache_exporter-1.0.0-1.18.2.x86_64",
"SUSE Manager Client Tools 12:golang-github-prometheus-alertmanager-0.23.0-1.21.2.aarch64",
"SUSE Manager Client Tools 12:golang-github-prometheus-alertmanager-0.23.0-1.21.2.ppc64le",
"SUSE Manager Client Tools 12:golang-github-prometheus-alertmanager-0.23.0-1.21.2.s390x",
"SUSE Manager Client Tools 12:golang-github-prometheus-alertmanager-0.23.0-1.21.2.x86_64",
"SUSE Manager Client Tools 12:golang-github-prometheus-node_exporter-1.5.0-1.27.2.aarch64",
"SUSE Manager Client Tools 12:golang-github-prometheus-node_exporter-1.5.0-1.27.2.ppc64le",
"SUSE Manager Client Tools 12:golang-github-prometheus-node_exporter-1.5.0-1.27.2.s390x",
"SUSE Manager Client Tools 12:golang-github-prometheus-node_exporter-1.5.0-1.27.2.x86_64",
"SUSE Manager Client Tools 12:golang-github-prometheus-prometheus-2.45.0-1.47.3.aarch64",
"SUSE Manager Client Tools 12:golang-github-prometheus-prometheus-2.45.0-1.47.3.ppc64le",
"SUSE Manager Client Tools 12:golang-github-prometheus-prometheus-2.45.0-1.47.3.s390x",
"SUSE Manager Client Tools 12:golang-github-prometheus-prometheus-2.45.0-1.47.3.x86_64",
"SUSE Manager Client Tools 12:grafana-9.5.5-1.54.3.aarch64",
"SUSE Manager Client Tools 12:grafana-9.5.5-1.54.3.ppc64le",
"SUSE Manager Client Tools 12:grafana-9.5.5-1.54.3.s390x",
"SUSE Manager Client Tools 12:grafana-9.5.5-1.54.3.x86_64",
"SUSE Manager Client Tools 12:prometheus-blackbox_exporter-0.24.0-1.23.2.aarch64",
"SUSE Manager Client Tools 12:prometheus-blackbox_exporter-0.24.0-1.23.2.ppc64le",
"SUSE Manager Client Tools 12:prometheus-blackbox_exporter-0.24.0-1.23.2.s390x",
"SUSE Manager Client Tools 12:prometheus-blackbox_exporter-0.24.0-1.23.2.x86_64",
"SUSE Manager Client Tools 12:prometheus-postgres_exporter-0.10.1-1.14.3.aarch64",
"SUSE Manager Client Tools 12:prometheus-postgres_exporter-0.10.1-1.14.3.ppc64le",
"SUSE Manager Client Tools 12:prometheus-postgres_exporter-0.10.1-1.14.3.s390x",
"SUSE Manager Client Tools 12:prometheus-postgres_exporter-0.10.1-1.14.3.x86_64",
"SUSE Manager Client Tools 12:python2-uyuni-common-libs-4.3.9-1.36.3.aarch64",
"SUSE Manager Client Tools 12:python2-uyuni-common-libs-4.3.9-1.36.3.ppc64le",
"SUSE Manager Client Tools 12:python2-uyuni-common-libs-4.3.9-1.36.3.s390x",
"SUSE Manager Client Tools 12:python2-uyuni-common-libs-4.3.9-1.36.3.x86_64",
"SUSE Manager Client Tools 12:spacecmd-4.3.23-38.127.3.noarch",
"SUSE Manager Client Tools 12:supportutils-plugin-susemanager-client-4.3.3-6.27.2.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-32149",
"url": "https://www.suse.com/security/cve/CVE-2022-32149"
},
{
"category": "external",
"summary": "SUSE Bug 1204501 for CVE-2022-32149",
"url": "https://bugzilla.suse.com/1204501"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:golang-github-prometheus-node_exporter-1.5.0-1.27.2.aarch64",
"SUSE Linux Enterprise Server 12 SP5:golang-github-prometheus-node_exporter-1.5.0-1.27.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:golang-github-prometheus-node_exporter-1.5.0-1.27.2.s390x",
"SUSE Linux Enterprise Server 12 SP5:golang-github-prometheus-node_exporter-1.5.0-1.27.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:golang-github-prometheus-node_exporter-1.5.0-1.27.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:golang-github-prometheus-node_exporter-1.5.0-1.27.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:golang-github-prometheus-node_exporter-1.5.0-1.27.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:golang-github-prometheus-node_exporter-1.5.0-1.27.2.x86_64",
"SUSE Manager Client Tools 12:golang-github-QubitProducts-exporter_exporter-0.4.0-1.12.2.aarch64",
"SUSE Manager Client Tools 12:golang-github-QubitProducts-exporter_exporter-0.4.0-1.12.2.ppc64le",
"SUSE Manager Client Tools 12:golang-github-QubitProducts-exporter_exporter-0.4.0-1.12.2.s390x",
"SUSE Manager Client Tools 12:golang-github-QubitProducts-exporter_exporter-0.4.0-1.12.2.x86_64",
"SUSE Manager Client Tools 12:golang-github-lusitaniae-apache_exporter-1.0.0-1.18.2.aarch64",
"SUSE Manager Client Tools 12:golang-github-lusitaniae-apache_exporter-1.0.0-1.18.2.ppc64le",
"SUSE Manager Client Tools 12:golang-github-lusitaniae-apache_exporter-1.0.0-1.18.2.s390x",
"SUSE Manager Client Tools 12:golang-github-lusitaniae-apache_exporter-1.0.0-1.18.2.x86_64",
"SUSE Manager Client Tools 12:golang-github-prometheus-alertmanager-0.23.0-1.21.2.aarch64",
"SUSE Manager Client Tools 12:golang-github-prometheus-alertmanager-0.23.0-1.21.2.ppc64le",
"SUSE Manager Client Tools 12:golang-github-prometheus-alertmanager-0.23.0-1.21.2.s390x",
"SUSE Manager Client Tools 12:golang-github-prometheus-alertmanager-0.23.0-1.21.2.x86_64",
"SUSE Manager Client Tools 12:golang-github-prometheus-node_exporter-1.5.0-1.27.2.aarch64",
"SUSE Manager Client Tools 12:golang-github-prometheus-node_exporter-1.5.0-1.27.2.ppc64le",
"SUSE Manager Client Tools 12:golang-github-prometheus-node_exporter-1.5.0-1.27.2.s390x",
"SUSE Manager Client Tools 12:golang-github-prometheus-node_exporter-1.5.0-1.27.2.x86_64",
"SUSE Manager Client Tools 12:golang-github-prometheus-prometheus-2.45.0-1.47.3.aarch64",
"SUSE Manager Client Tools 12:golang-github-prometheus-prometheus-2.45.0-1.47.3.ppc64le",
"SUSE Manager Client Tools 12:golang-github-prometheus-prometheus-2.45.0-1.47.3.s390x",
"SUSE Manager Client Tools 12:golang-github-prometheus-prometheus-2.45.0-1.47.3.x86_64",
"SUSE Manager Client Tools 12:grafana-9.5.5-1.54.3.aarch64",
"SUSE Manager Client Tools 12:grafana-9.5.5-1.54.3.ppc64le",
"SUSE Manager Client Tools 12:grafana-9.5.5-1.54.3.s390x",
"SUSE Manager Client Tools 12:grafana-9.5.5-1.54.3.x86_64",
"SUSE Manager Client Tools 12:prometheus-blackbox_exporter-0.24.0-1.23.2.aarch64",
"SUSE Manager Client Tools 12:prometheus-blackbox_exporter-0.24.0-1.23.2.ppc64le",
"SUSE Manager Client Tools 12:prometheus-blackbox_exporter-0.24.0-1.23.2.s390x",
"SUSE Manager Client Tools 12:prometheus-blackbox_exporter-0.24.0-1.23.2.x86_64",
"SUSE Manager Client Tools 12:prometheus-postgres_exporter-0.10.1-1.14.3.aarch64",
"SUSE Manager Client Tools 12:prometheus-postgres_exporter-0.10.1-1.14.3.ppc64le",
"SUSE Manager Client Tools 12:prometheus-postgres_exporter-0.10.1-1.14.3.s390x",
"SUSE Manager Client Tools 12:prometheus-postgres_exporter-0.10.1-1.14.3.x86_64",
"SUSE Manager Client Tools 12:python2-uyuni-common-libs-4.3.9-1.36.3.aarch64",
"SUSE Manager Client Tools 12:python2-uyuni-common-libs-4.3.9-1.36.3.ppc64le",
"SUSE Manager Client Tools 12:python2-uyuni-common-libs-4.3.9-1.36.3.s390x",
"SUSE Manager Client Tools 12:python2-uyuni-common-libs-4.3.9-1.36.3.x86_64",
"SUSE Manager Client Tools 12:spacecmd-4.3.23-38.127.3.noarch",
"SUSE Manager Client Tools 12:supportutils-plugin-susemanager-client-4.3.3-6.27.2.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:golang-github-prometheus-node_exporter-1.5.0-1.27.2.aarch64",
"SUSE Linux Enterprise Server 12 SP5:golang-github-prometheus-node_exporter-1.5.0-1.27.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:golang-github-prometheus-node_exporter-1.5.0-1.27.2.s390x",
"SUSE Linux Enterprise Server 12 SP5:golang-github-prometheus-node_exporter-1.5.0-1.27.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:golang-github-prometheus-node_exporter-1.5.0-1.27.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:golang-github-prometheus-node_exporter-1.5.0-1.27.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:golang-github-prometheus-node_exporter-1.5.0-1.27.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:golang-github-prometheus-node_exporter-1.5.0-1.27.2.x86_64",
"SUSE Manager Client Tools 12:golang-github-QubitProducts-exporter_exporter-0.4.0-1.12.2.aarch64",
"SUSE Manager Client Tools 12:golang-github-QubitProducts-exporter_exporter-0.4.0-1.12.2.ppc64le",
"SUSE Manager Client Tools 12:golang-github-QubitProducts-exporter_exporter-0.4.0-1.12.2.s390x",
"SUSE Manager Client Tools 12:golang-github-QubitProducts-exporter_exporter-0.4.0-1.12.2.x86_64",
"SUSE Manager Client Tools 12:golang-github-lusitaniae-apache_exporter-1.0.0-1.18.2.aarch64",
"SUSE Manager Client Tools 12:golang-github-lusitaniae-apache_exporter-1.0.0-1.18.2.ppc64le",
"SUSE Manager Client Tools 12:golang-github-lusitaniae-apache_exporter-1.0.0-1.18.2.s390x",
"SUSE Manager Client Tools 12:golang-github-lusitaniae-apache_exporter-1.0.0-1.18.2.x86_64",
"SUSE Manager Client Tools 12:golang-github-prometheus-alertmanager-0.23.0-1.21.2.aarch64",
"SUSE Manager Client Tools 12:golang-github-prometheus-alertmanager-0.23.0-1.21.2.ppc64le",
"SUSE Manager Client Tools 12:golang-github-prometheus-alertmanager-0.23.0-1.21.2.s390x",
"SUSE Manager Client Tools 12:golang-github-prometheus-alertmanager-0.23.0-1.21.2.x86_64",
"SUSE Manager Client Tools 12:golang-github-prometheus-node_exporter-1.5.0-1.27.2.aarch64",
"SUSE Manager Client Tools 12:golang-github-prometheus-node_exporter-1.5.0-1.27.2.ppc64le",
"SUSE Manager Client Tools 12:golang-github-prometheus-node_exporter-1.5.0-1.27.2.s390x",
"SUSE Manager Client Tools 12:golang-github-prometheus-node_exporter-1.5.0-1.27.2.x86_64",
"SUSE Manager Client Tools 12:golang-github-prometheus-prometheus-2.45.0-1.47.3.aarch64",
"SUSE Manager Client Tools 12:golang-github-prometheus-prometheus-2.45.0-1.47.3.ppc64le",
"SUSE Manager Client Tools 12:golang-github-prometheus-prometheus-2.45.0-1.47.3.s390x",
"SUSE Manager Client Tools 12:golang-github-prometheus-prometheus-2.45.0-1.47.3.x86_64",
"SUSE Manager Client Tools 12:grafana-9.5.5-1.54.3.aarch64",
"SUSE Manager Client Tools 12:grafana-9.5.5-1.54.3.ppc64le",
"SUSE Manager Client Tools 12:grafana-9.5.5-1.54.3.s390x",
"SUSE Manager Client Tools 12:grafana-9.5.5-1.54.3.x86_64",
"SUSE Manager Client Tools 12:prometheus-blackbox_exporter-0.24.0-1.23.2.aarch64",
"SUSE Manager Client Tools 12:prometheus-blackbox_exporter-0.24.0-1.23.2.ppc64le",
"SUSE Manager Client Tools 12:prometheus-blackbox_exporter-0.24.0-1.23.2.s390x",
"SUSE Manager Client Tools 12:prometheus-blackbox_exporter-0.24.0-1.23.2.x86_64",
"SUSE Manager Client Tools 12:prometheus-postgres_exporter-0.10.1-1.14.3.aarch64",
"SUSE Manager Client Tools 12:prometheus-postgres_exporter-0.10.1-1.14.3.ppc64le",
"SUSE Manager Client Tools 12:prometheus-postgres_exporter-0.10.1-1.14.3.s390x",
"SUSE Manager Client Tools 12:prometheus-postgres_exporter-0.10.1-1.14.3.x86_64",
"SUSE Manager Client Tools 12:python2-uyuni-common-libs-4.3.9-1.36.3.aarch64",
"SUSE Manager Client Tools 12:python2-uyuni-common-libs-4.3.9-1.36.3.ppc64le",
"SUSE Manager Client Tools 12:python2-uyuni-common-libs-4.3.9-1.36.3.s390x",
"SUSE Manager Client Tools 12:python2-uyuni-common-libs-4.3.9-1.36.3.x86_64",
"SUSE Manager Client Tools 12:spacecmd-4.3.23-38.127.3.noarch",
"SUSE Manager Client Tools 12:supportutils-plugin-susemanager-client-4.3.3-6.27.2.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2023-09-28T11:42:18Z",
"details": "important"
}
],
"title": "CVE-2022-32149"
},
{
"cve": "CVE-2022-41723",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-41723"
}
],
"notes": [
{
"category": "general",
"text": "A maliciously crafted HTTP/2 stream could cause excessive CPU consumption in the HPACK decoder, sufficient to cause a denial of service from a small number of small requests.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:golang-github-prometheus-node_exporter-1.5.0-1.27.2.aarch64",
"SUSE Linux Enterprise Server 12 SP5:golang-github-prometheus-node_exporter-1.5.0-1.27.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:golang-github-prometheus-node_exporter-1.5.0-1.27.2.s390x",
"SUSE Linux Enterprise Server 12 SP5:golang-github-prometheus-node_exporter-1.5.0-1.27.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:golang-github-prometheus-node_exporter-1.5.0-1.27.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:golang-github-prometheus-node_exporter-1.5.0-1.27.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:golang-github-prometheus-node_exporter-1.5.0-1.27.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:golang-github-prometheus-node_exporter-1.5.0-1.27.2.x86_64",
"SUSE Manager Client Tools 12:golang-github-QubitProducts-exporter_exporter-0.4.0-1.12.2.aarch64",
"SUSE Manager Client Tools 12:golang-github-QubitProducts-exporter_exporter-0.4.0-1.12.2.ppc64le",
"SUSE Manager Client Tools 12:golang-github-QubitProducts-exporter_exporter-0.4.0-1.12.2.s390x",
"SUSE Manager Client Tools 12:golang-github-QubitProducts-exporter_exporter-0.4.0-1.12.2.x86_64",
"SUSE Manager Client Tools 12:golang-github-lusitaniae-apache_exporter-1.0.0-1.18.2.aarch64",
"SUSE Manager Client Tools 12:golang-github-lusitaniae-apache_exporter-1.0.0-1.18.2.ppc64le",
"SUSE Manager Client Tools 12:golang-github-lusitaniae-apache_exporter-1.0.0-1.18.2.s390x",
"SUSE Manager Client Tools 12:golang-github-lusitaniae-apache_exporter-1.0.0-1.18.2.x86_64",
"SUSE Manager Client Tools 12:golang-github-prometheus-alertmanager-0.23.0-1.21.2.aarch64",
"SUSE Manager Client Tools 12:golang-github-prometheus-alertmanager-0.23.0-1.21.2.ppc64le",
"SUSE Manager Client Tools 12:golang-github-prometheus-alertmanager-0.23.0-1.21.2.s390x",
"SUSE Manager Client Tools 12:golang-github-prometheus-alertmanager-0.23.0-1.21.2.x86_64",
"SUSE Manager Client Tools 12:golang-github-prometheus-node_exporter-1.5.0-1.27.2.aarch64",
"SUSE Manager Client Tools 12:golang-github-prometheus-node_exporter-1.5.0-1.27.2.ppc64le",
"SUSE Manager Client Tools 12:golang-github-prometheus-node_exporter-1.5.0-1.27.2.s390x",
"SUSE Manager Client Tools 12:golang-github-prometheus-node_exporter-1.5.0-1.27.2.x86_64",
"SUSE Manager Client Tools 12:golang-github-prometheus-prometheus-2.45.0-1.47.3.aarch64",
"SUSE Manager Client Tools 12:golang-github-prometheus-prometheus-2.45.0-1.47.3.ppc64le",
"SUSE Manager Client Tools 12:golang-github-prometheus-prometheus-2.45.0-1.47.3.s390x",
"SUSE Manager Client Tools 12:golang-github-prometheus-prometheus-2.45.0-1.47.3.x86_64",
"SUSE Manager Client Tools 12:grafana-9.5.5-1.54.3.aarch64",
"SUSE Manager Client Tools 12:grafana-9.5.5-1.54.3.ppc64le",
"SUSE Manager Client Tools 12:grafana-9.5.5-1.54.3.s390x",
"SUSE Manager Client Tools 12:grafana-9.5.5-1.54.3.x86_64",
"SUSE Manager Client Tools 12:prometheus-blackbox_exporter-0.24.0-1.23.2.aarch64",
"SUSE Manager Client Tools 12:prometheus-blackbox_exporter-0.24.0-1.23.2.ppc64le",
"SUSE Manager Client Tools 12:prometheus-blackbox_exporter-0.24.0-1.23.2.s390x",
"SUSE Manager Client Tools 12:prometheus-blackbox_exporter-0.24.0-1.23.2.x86_64",
"SUSE Manager Client Tools 12:prometheus-postgres_exporter-0.10.1-1.14.3.aarch64",
"SUSE Manager Client Tools 12:prometheus-postgres_exporter-0.10.1-1.14.3.ppc64le",
"SUSE Manager Client Tools 12:prometheus-postgres_exporter-0.10.1-1.14.3.s390x",
"SUSE Manager Client Tools 12:prometheus-postgres_exporter-0.10.1-1.14.3.x86_64",
"SUSE Manager Client Tools 12:python2-uyuni-common-libs-4.3.9-1.36.3.aarch64",
"SUSE Manager Client Tools 12:python2-uyuni-common-libs-4.3.9-1.36.3.ppc64le",
"SUSE Manager Client Tools 12:python2-uyuni-common-libs-4.3.9-1.36.3.s390x",
"SUSE Manager Client Tools 12:python2-uyuni-common-libs-4.3.9-1.36.3.x86_64",
"SUSE Manager Client Tools 12:spacecmd-4.3.23-38.127.3.noarch",
"SUSE Manager Client Tools 12:supportutils-plugin-susemanager-client-4.3.3-6.27.2.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-41723",
"url": "https://www.suse.com/security/cve/CVE-2022-41723"
},
{
"category": "external",
"summary": "SUSE Bug 1208270 for CVE-2022-41723",
"url": "https://bugzilla.suse.com/1208270"
},
{
"category": "external",
"summary": "SUSE Bug 1215588 for CVE-2022-41723",
"url": "https://bugzilla.suse.com/1215588"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:golang-github-prometheus-node_exporter-1.5.0-1.27.2.aarch64",
"SUSE Linux Enterprise Server 12 SP5:golang-github-prometheus-node_exporter-1.5.0-1.27.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:golang-github-prometheus-node_exporter-1.5.0-1.27.2.s390x",
"SUSE Linux Enterprise Server 12 SP5:golang-github-prometheus-node_exporter-1.5.0-1.27.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:golang-github-prometheus-node_exporter-1.5.0-1.27.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:golang-github-prometheus-node_exporter-1.5.0-1.27.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:golang-github-prometheus-node_exporter-1.5.0-1.27.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:golang-github-prometheus-node_exporter-1.5.0-1.27.2.x86_64",
"SUSE Manager Client Tools 12:golang-github-QubitProducts-exporter_exporter-0.4.0-1.12.2.aarch64",
"SUSE Manager Client Tools 12:golang-github-QubitProducts-exporter_exporter-0.4.0-1.12.2.ppc64le",
"SUSE Manager Client Tools 12:golang-github-QubitProducts-exporter_exporter-0.4.0-1.12.2.s390x",
"SUSE Manager Client Tools 12:golang-github-QubitProducts-exporter_exporter-0.4.0-1.12.2.x86_64",
"SUSE Manager Client Tools 12:golang-github-lusitaniae-apache_exporter-1.0.0-1.18.2.aarch64",
"SUSE Manager Client Tools 12:golang-github-lusitaniae-apache_exporter-1.0.0-1.18.2.ppc64le",
"SUSE Manager Client Tools 12:golang-github-lusitaniae-apache_exporter-1.0.0-1.18.2.s390x",
"SUSE Manager Client Tools 12:golang-github-lusitaniae-apache_exporter-1.0.0-1.18.2.x86_64",
"SUSE Manager Client Tools 12:golang-github-prometheus-alertmanager-0.23.0-1.21.2.aarch64",
"SUSE Manager Client Tools 12:golang-github-prometheus-alertmanager-0.23.0-1.21.2.ppc64le",
"SUSE Manager Client Tools 12:golang-github-prometheus-alertmanager-0.23.0-1.21.2.s390x",
"SUSE Manager Client Tools 12:golang-github-prometheus-alertmanager-0.23.0-1.21.2.x86_64",
"SUSE Manager Client Tools 12:golang-github-prometheus-node_exporter-1.5.0-1.27.2.aarch64",
"SUSE Manager Client Tools 12:golang-github-prometheus-node_exporter-1.5.0-1.27.2.ppc64le",
"SUSE Manager Client Tools 12:golang-github-prometheus-node_exporter-1.5.0-1.27.2.s390x",
"SUSE Manager Client Tools 12:golang-github-prometheus-node_exporter-1.5.0-1.27.2.x86_64",
"SUSE Manager Client Tools 12:golang-github-prometheus-prometheus-2.45.0-1.47.3.aarch64",
"SUSE Manager Client Tools 12:golang-github-prometheus-prometheus-2.45.0-1.47.3.ppc64le",
"SUSE Manager Client Tools 12:golang-github-prometheus-prometheus-2.45.0-1.47.3.s390x",
"SUSE Manager Client Tools 12:golang-github-prometheus-prometheus-2.45.0-1.47.3.x86_64",
"SUSE Manager Client Tools 12:grafana-9.5.5-1.54.3.aarch64",
"SUSE Manager Client Tools 12:grafana-9.5.5-1.54.3.ppc64le",
"SUSE Manager Client Tools 12:grafana-9.5.5-1.54.3.s390x",
"SUSE Manager Client Tools 12:grafana-9.5.5-1.54.3.x86_64",
"SUSE Manager Client Tools 12:prometheus-blackbox_exporter-0.24.0-1.23.2.aarch64",
"SUSE Manager Client Tools 12:prometheus-blackbox_exporter-0.24.0-1.23.2.ppc64le",
"SUSE Manager Client Tools 12:prometheus-blackbox_exporter-0.24.0-1.23.2.s390x",
"SUSE Manager Client Tools 12:prometheus-blackbox_exporter-0.24.0-1.23.2.x86_64",
"SUSE Manager Client Tools 12:prometheus-postgres_exporter-0.10.1-1.14.3.aarch64",
"SUSE Manager Client Tools 12:prometheus-postgres_exporter-0.10.1-1.14.3.ppc64le",
"SUSE Manager Client Tools 12:prometheus-postgres_exporter-0.10.1-1.14.3.s390x",
"SUSE Manager Client Tools 12:prometheus-postgres_exporter-0.10.1-1.14.3.x86_64",
"SUSE Manager Client Tools 12:python2-uyuni-common-libs-4.3.9-1.36.3.aarch64",
"SUSE Manager Client Tools 12:python2-uyuni-common-libs-4.3.9-1.36.3.ppc64le",
"SUSE Manager Client Tools 12:python2-uyuni-common-libs-4.3.9-1.36.3.s390x",
"SUSE Manager Client Tools 12:python2-uyuni-common-libs-4.3.9-1.36.3.x86_64",
"SUSE Manager Client Tools 12:spacecmd-4.3.23-38.127.3.noarch",
"SUSE Manager Client Tools 12:supportutils-plugin-susemanager-client-4.3.3-6.27.2.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:golang-github-prometheus-node_exporter-1.5.0-1.27.2.aarch64",
"SUSE Linux Enterprise Server 12 SP5:golang-github-prometheus-node_exporter-1.5.0-1.27.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:golang-github-prometheus-node_exporter-1.5.0-1.27.2.s390x",
"SUSE Linux Enterprise Server 12 SP5:golang-github-prometheus-node_exporter-1.5.0-1.27.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:golang-github-prometheus-node_exporter-1.5.0-1.27.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:golang-github-prometheus-node_exporter-1.5.0-1.27.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:golang-github-prometheus-node_exporter-1.5.0-1.27.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:golang-github-prometheus-node_exporter-1.5.0-1.27.2.x86_64",
"SUSE Manager Client Tools 12:golang-github-QubitProducts-exporter_exporter-0.4.0-1.12.2.aarch64",
"SUSE Manager Client Tools 12:golang-github-QubitProducts-exporter_exporter-0.4.0-1.12.2.ppc64le",
"SUSE Manager Client Tools 12:golang-github-QubitProducts-exporter_exporter-0.4.0-1.12.2.s390x",
"SUSE Manager Client Tools 12:golang-github-QubitProducts-exporter_exporter-0.4.0-1.12.2.x86_64",
"SUSE Manager Client Tools 12:golang-github-lusitaniae-apache_exporter-1.0.0-1.18.2.aarch64",
"SUSE Manager Client Tools 12:golang-github-lusitaniae-apache_exporter-1.0.0-1.18.2.ppc64le",
"SUSE Manager Client Tools 12:golang-github-lusitaniae-apache_exporter-1.0.0-1.18.2.s390x",
"SUSE Manager Client Tools 12:golang-github-lusitaniae-apache_exporter-1.0.0-1.18.2.x86_64",
"SUSE Manager Client Tools 12:golang-github-prometheus-alertmanager-0.23.0-1.21.2.aarch64",
"SUSE Manager Client Tools 12:golang-github-prometheus-alertmanager-0.23.0-1.21.2.ppc64le",
"SUSE Manager Client Tools 12:golang-github-prometheus-alertmanager-0.23.0-1.21.2.s390x",
"SUSE Manager Client Tools 12:golang-github-prometheus-alertmanager-0.23.0-1.21.2.x86_64",
"SUSE Manager Client Tools 12:golang-github-prometheus-node_exporter-1.5.0-1.27.2.aarch64",
"SUSE Manager Client Tools 12:golang-github-prometheus-node_exporter-1.5.0-1.27.2.ppc64le",
"SUSE Manager Client Tools 12:golang-github-prometheus-node_exporter-1.5.0-1.27.2.s390x",
"SUSE Manager Client Tools 12:golang-github-prometheus-node_exporter-1.5.0-1.27.2.x86_64",
"SUSE Manager Client Tools 12:golang-github-prometheus-prometheus-2.45.0-1.47.3.aarch64",
"SUSE Manager Client Tools 12:golang-github-prometheus-prometheus-2.45.0-1.47.3.ppc64le",
"SUSE Manager Client Tools 12:golang-github-prometheus-prometheus-2.45.0-1.47.3.s390x",
"SUSE Manager Client Tools 12:golang-github-prometheus-prometheus-2.45.0-1.47.3.x86_64",
"SUSE Manager Client Tools 12:grafana-9.5.5-1.54.3.aarch64",
"SUSE Manager Client Tools 12:grafana-9.5.5-1.54.3.ppc64le",
"SUSE Manager Client Tools 12:grafana-9.5.5-1.54.3.s390x",
"SUSE Manager Client Tools 12:grafana-9.5.5-1.54.3.x86_64",
"SUSE Manager Client Tools 12:prometheus-blackbox_exporter-0.24.0-1.23.2.aarch64",
"SUSE Manager Client Tools 12:prometheus-blackbox_exporter-0.24.0-1.23.2.ppc64le",
"SUSE Manager Client Tools 12:prometheus-blackbox_exporter-0.24.0-1.23.2.s390x",
"SUSE Manager Client Tools 12:prometheus-blackbox_exporter-0.24.0-1.23.2.x86_64",
"SUSE Manager Client Tools 12:prometheus-postgres_exporter-0.10.1-1.14.3.aarch64",
"SUSE Manager Client Tools 12:prometheus-postgres_exporter-0.10.1-1.14.3.ppc64le",
"SUSE Manager Client Tools 12:prometheus-postgres_exporter-0.10.1-1.14.3.s390x",
"SUSE Manager Client Tools 12:prometheus-postgres_exporter-0.10.1-1.14.3.x86_64",
"SUSE Manager Client Tools 12:python2-uyuni-common-libs-4.3.9-1.36.3.aarch64",
"SUSE Manager Client Tools 12:python2-uyuni-common-libs-4.3.9-1.36.3.ppc64le",
"SUSE Manager Client Tools 12:python2-uyuni-common-libs-4.3.9-1.36.3.s390x",
"SUSE Manager Client Tools 12:python2-uyuni-common-libs-4.3.9-1.36.3.x86_64",
"SUSE Manager Client Tools 12:spacecmd-4.3.23-38.127.3.noarch",
"SUSE Manager Client Tools 12:supportutils-plugin-susemanager-client-4.3.3-6.27.2.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2023-09-28T11:42:18Z",
"details": "important"
}
],
"title": "CVE-2022-41723"
},
{
"cve": "CVE-2022-46146",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-46146"
}
],
"notes": [
{
"category": "general",
"text": "Prometheus Exporter Toolkit is a utility package to build exporters. Prior to versions 0.7.2 and 0.8.2, if someone has access to a Prometheus web.yml file and users\u0027 bcrypted passwords, they can bypass security by poisoning the built-in authentication cache. Versions 0.7.2 and 0.8.2 contain a fix for the issue. There is no workaround, but attacker must have access to the hashed password to use this functionality.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:golang-github-prometheus-node_exporter-1.5.0-1.27.2.aarch64",
"SUSE Linux Enterprise Server 12 SP5:golang-github-prometheus-node_exporter-1.5.0-1.27.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:golang-github-prometheus-node_exporter-1.5.0-1.27.2.s390x",
"SUSE Linux Enterprise Server 12 SP5:golang-github-prometheus-node_exporter-1.5.0-1.27.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:golang-github-prometheus-node_exporter-1.5.0-1.27.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:golang-github-prometheus-node_exporter-1.5.0-1.27.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:golang-github-prometheus-node_exporter-1.5.0-1.27.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:golang-github-prometheus-node_exporter-1.5.0-1.27.2.x86_64",
"SUSE Manager Client Tools 12:golang-github-QubitProducts-exporter_exporter-0.4.0-1.12.2.aarch64",
"SUSE Manager Client Tools 12:golang-github-QubitProducts-exporter_exporter-0.4.0-1.12.2.ppc64le",
"SUSE Manager Client Tools 12:golang-github-QubitProducts-exporter_exporter-0.4.0-1.12.2.s390x",
"SUSE Manager Client Tools 12:golang-github-QubitProducts-exporter_exporter-0.4.0-1.12.2.x86_64",
"SUSE Manager Client Tools 12:golang-github-lusitaniae-apache_exporter-1.0.0-1.18.2.aarch64",
"SUSE Manager Client Tools 12:golang-github-lusitaniae-apache_exporter-1.0.0-1.18.2.ppc64le",
"SUSE Manager Client Tools 12:golang-github-lusitaniae-apache_exporter-1.0.0-1.18.2.s390x",
"SUSE Manager Client Tools 12:golang-github-lusitaniae-apache_exporter-1.0.0-1.18.2.x86_64",
"SUSE Manager Client Tools 12:golang-github-prometheus-alertmanager-0.23.0-1.21.2.aarch64",
"SUSE Manager Client Tools 12:golang-github-prometheus-alertmanager-0.23.0-1.21.2.ppc64le",
"SUSE Manager Client Tools 12:golang-github-prometheus-alertmanager-0.23.0-1.21.2.s390x",
"SUSE Manager Client Tools 12:golang-github-prometheus-alertmanager-0.23.0-1.21.2.x86_64",
"SUSE Manager Client Tools 12:golang-github-prometheus-node_exporter-1.5.0-1.27.2.aarch64",
"SUSE Manager Client Tools 12:golang-github-prometheus-node_exporter-1.5.0-1.27.2.ppc64le",
"SUSE Manager Client Tools 12:golang-github-prometheus-node_exporter-1.5.0-1.27.2.s390x",
"SUSE Manager Client Tools 12:golang-github-prometheus-node_exporter-1.5.0-1.27.2.x86_64",
"SUSE Manager Client Tools 12:golang-github-prometheus-prometheus-2.45.0-1.47.3.aarch64",
"SUSE Manager Client Tools 12:golang-github-prometheus-prometheus-2.45.0-1.47.3.ppc64le",
"SUSE Manager Client Tools 12:golang-github-prometheus-prometheus-2.45.0-1.47.3.s390x",
"SUSE Manager Client Tools 12:golang-github-prometheus-prometheus-2.45.0-1.47.3.x86_64",
"SUSE Manager Client Tools 12:grafana-9.5.5-1.54.3.aarch64",
"SUSE Manager Client Tools 12:grafana-9.5.5-1.54.3.ppc64le",
"SUSE Manager Client Tools 12:grafana-9.5.5-1.54.3.s390x",
"SUSE Manager Client Tools 12:grafana-9.5.5-1.54.3.x86_64",
"SUSE Manager Client Tools 12:prometheus-blackbox_exporter-0.24.0-1.23.2.aarch64",
"SUSE Manager Client Tools 12:prometheus-blackbox_exporter-0.24.0-1.23.2.ppc64le",
"SUSE Manager Client Tools 12:prometheus-blackbox_exporter-0.24.0-1.23.2.s390x",
"SUSE Manager Client Tools 12:prometheus-blackbox_exporter-0.24.0-1.23.2.x86_64",
"SUSE Manager Client Tools 12:prometheus-postgres_exporter-0.10.1-1.14.3.aarch64",
"SUSE Manager Client Tools 12:prometheus-postgres_exporter-0.10.1-1.14.3.ppc64le",
"SUSE Manager Client Tools 12:prometheus-postgres_exporter-0.10.1-1.14.3.s390x",
"SUSE Manager Client Tools 12:prometheus-postgres_exporter-0.10.1-1.14.3.x86_64",
"SUSE Manager Client Tools 12:python2-uyuni-common-libs-4.3.9-1.36.3.aarch64",
"SUSE Manager Client Tools 12:python2-uyuni-common-libs-4.3.9-1.36.3.ppc64le",
"SUSE Manager Client Tools 12:python2-uyuni-common-libs-4.3.9-1.36.3.s390x",
"SUSE Manager Client Tools 12:python2-uyuni-common-libs-4.3.9-1.36.3.x86_64",
"SUSE Manager Client Tools 12:spacecmd-4.3.23-38.127.3.noarch",
"SUSE Manager Client Tools 12:supportutils-plugin-susemanager-client-4.3.3-6.27.2.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-46146",
"url": "https://www.suse.com/security/cve/CVE-2022-46146"
},
{
"category": "external",
"summary": "SUSE Bug 1208046 for CVE-2022-46146",
"url": "https://bugzilla.suse.com/1208046"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:golang-github-prometheus-node_exporter-1.5.0-1.27.2.aarch64",
"SUSE Linux Enterprise Server 12 SP5:golang-github-prometheus-node_exporter-1.5.0-1.27.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:golang-github-prometheus-node_exporter-1.5.0-1.27.2.s390x",
"SUSE Linux Enterprise Server 12 SP5:golang-github-prometheus-node_exporter-1.5.0-1.27.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:golang-github-prometheus-node_exporter-1.5.0-1.27.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:golang-github-prometheus-node_exporter-1.5.0-1.27.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:golang-github-prometheus-node_exporter-1.5.0-1.27.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:golang-github-prometheus-node_exporter-1.5.0-1.27.2.x86_64",
"SUSE Manager Client Tools 12:golang-github-QubitProducts-exporter_exporter-0.4.0-1.12.2.aarch64",
"SUSE Manager Client Tools 12:golang-github-QubitProducts-exporter_exporter-0.4.0-1.12.2.ppc64le",
"SUSE Manager Client Tools 12:golang-github-QubitProducts-exporter_exporter-0.4.0-1.12.2.s390x",
"SUSE Manager Client Tools 12:golang-github-QubitProducts-exporter_exporter-0.4.0-1.12.2.x86_64",
"SUSE Manager Client Tools 12:golang-github-lusitaniae-apache_exporter-1.0.0-1.18.2.aarch64",
"SUSE Manager Client Tools 12:golang-github-lusitaniae-apache_exporter-1.0.0-1.18.2.ppc64le",
"SUSE Manager Client Tools 12:golang-github-lusitaniae-apache_exporter-1.0.0-1.18.2.s390x",
"SUSE Manager Client Tools 12:golang-github-lusitaniae-apache_exporter-1.0.0-1.18.2.x86_64",
"SUSE Manager Client Tools 12:golang-github-prometheus-alertmanager-0.23.0-1.21.2.aarch64",
"SUSE Manager Client Tools 12:golang-github-prometheus-alertmanager-0.23.0-1.21.2.ppc64le",
"SUSE Manager Client Tools 12:golang-github-prometheus-alertmanager-0.23.0-1.21.2.s390x",
"SUSE Manager Client Tools 12:golang-github-prometheus-alertmanager-0.23.0-1.21.2.x86_64",
"SUSE Manager Client Tools 12:golang-github-prometheus-node_exporter-1.5.0-1.27.2.aarch64",
"SUSE Manager Client Tools 12:golang-github-prometheus-node_exporter-1.5.0-1.27.2.ppc64le",
"SUSE Manager Client Tools 12:golang-github-prometheus-node_exporter-1.5.0-1.27.2.s390x",
"SUSE Manager Client Tools 12:golang-github-prometheus-node_exporter-1.5.0-1.27.2.x86_64",
"SUSE Manager Client Tools 12:golang-github-prometheus-prometheus-2.45.0-1.47.3.aarch64",
"SUSE Manager Client Tools 12:golang-github-prometheus-prometheus-2.45.0-1.47.3.ppc64le",
"SUSE Manager Client Tools 12:golang-github-prometheus-prometheus-2.45.0-1.47.3.s390x",
"SUSE Manager Client Tools 12:golang-github-prometheus-prometheus-2.45.0-1.47.3.x86_64",
"SUSE Manager Client Tools 12:grafana-9.5.5-1.54.3.aarch64",
"SUSE Manager Client Tools 12:grafana-9.5.5-1.54.3.ppc64le",
"SUSE Manager Client Tools 12:grafana-9.5.5-1.54.3.s390x",
"SUSE Manager Client Tools 12:grafana-9.5.5-1.54.3.x86_64",
"SUSE Manager Client Tools 12:prometheus-blackbox_exporter-0.24.0-1.23.2.aarch64",
"SUSE Manager Client Tools 12:prometheus-blackbox_exporter-0.24.0-1.23.2.ppc64le",
"SUSE Manager Client Tools 12:prometheus-blackbox_exporter-0.24.0-1.23.2.s390x",
"SUSE Manager Client Tools 12:prometheus-blackbox_exporter-0.24.0-1.23.2.x86_64",
"SUSE Manager Client Tools 12:prometheus-postgres_exporter-0.10.1-1.14.3.aarch64",
"SUSE Manager Client Tools 12:prometheus-postgres_exporter-0.10.1-1.14.3.ppc64le",
"SUSE Manager Client Tools 12:prometheus-postgres_exporter-0.10.1-1.14.3.s390x",
"SUSE Manager Client Tools 12:prometheus-postgres_exporter-0.10.1-1.14.3.x86_64",
"SUSE Manager Client Tools 12:python2-uyuni-common-libs-4.3.9-1.36.3.aarch64",
"SUSE Manager Client Tools 12:python2-uyuni-common-libs-4.3.9-1.36.3.ppc64le",
"SUSE Manager Client Tools 12:python2-uyuni-common-libs-4.3.9-1.36.3.s390x",
"SUSE Manager Client Tools 12:python2-uyuni-common-libs-4.3.9-1.36.3.x86_64",
"SUSE Manager Client Tools 12:spacecmd-4.3.23-38.127.3.noarch",
"SUSE Manager Client Tools 12:supportutils-plugin-susemanager-client-4.3.3-6.27.2.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:golang-github-prometheus-node_exporter-1.5.0-1.27.2.aarch64",
"SUSE Linux Enterprise Server 12 SP5:golang-github-prometheus-node_exporter-1.5.0-1.27.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:golang-github-prometheus-node_exporter-1.5.0-1.27.2.s390x",
"SUSE Linux Enterprise Server 12 SP5:golang-github-prometheus-node_exporter-1.5.0-1.27.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:golang-github-prometheus-node_exporter-1.5.0-1.27.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:golang-github-prometheus-node_exporter-1.5.0-1.27.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:golang-github-prometheus-node_exporter-1.5.0-1.27.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:golang-github-prometheus-node_exporter-1.5.0-1.27.2.x86_64",
"SUSE Manager Client Tools 12:golang-github-QubitProducts-exporter_exporter-0.4.0-1.12.2.aarch64",
"SUSE Manager Client Tools 12:golang-github-QubitProducts-exporter_exporter-0.4.0-1.12.2.ppc64le",
"SUSE Manager Client Tools 12:golang-github-QubitProducts-exporter_exporter-0.4.0-1.12.2.s390x",
"SUSE Manager Client Tools 12:golang-github-QubitProducts-exporter_exporter-0.4.0-1.12.2.x86_64",
"SUSE Manager Client Tools 12:golang-github-lusitaniae-apache_exporter-1.0.0-1.18.2.aarch64",
"SUSE Manager Client Tools 12:golang-github-lusitaniae-apache_exporter-1.0.0-1.18.2.ppc64le",
"SUSE Manager Client Tools 12:golang-github-lusitaniae-apache_exporter-1.0.0-1.18.2.s390x",
"SUSE Manager Client Tools 12:golang-github-lusitaniae-apache_exporter-1.0.0-1.18.2.x86_64",
"SUSE Manager Client Tools 12:golang-github-prometheus-alertmanager-0.23.0-1.21.2.aarch64",
"SUSE Manager Client Tools 12:golang-github-prometheus-alertmanager-0.23.0-1.21.2.ppc64le",
"SUSE Manager Client Tools 12:golang-github-prometheus-alertmanager-0.23.0-1.21.2.s390x",
"SUSE Manager Client Tools 12:golang-github-prometheus-alertmanager-0.23.0-1.21.2.x86_64",
"SUSE Manager Client Tools 12:golang-github-prometheus-node_exporter-1.5.0-1.27.2.aarch64",
"SUSE Manager Client Tools 12:golang-github-prometheus-node_exporter-1.5.0-1.27.2.ppc64le",
"SUSE Manager Client Tools 12:golang-github-prometheus-node_exporter-1.5.0-1.27.2.s390x",
"SUSE Manager Client Tools 12:golang-github-prometheus-node_exporter-1.5.0-1.27.2.x86_64",
"SUSE Manager Client Tools 12:golang-github-prometheus-prometheus-2.45.0-1.47.3.aarch64",
"SUSE Manager Client Tools 12:golang-github-prometheus-prometheus-2.45.0-1.47.3.ppc64le",
"SUSE Manager Client Tools 12:golang-github-prometheus-prometheus-2.45.0-1.47.3.s390x",
"SUSE Manager Client Tools 12:golang-github-prometheus-prometheus-2.45.0-1.47.3.x86_64",
"SUSE Manager Client Tools 12:grafana-9.5.5-1.54.3.aarch64",
"SUSE Manager Client Tools 12:grafana-9.5.5-1.54.3.ppc64le",
"SUSE Manager Client Tools 12:grafana-9.5.5-1.54.3.s390x",
"SUSE Manager Client Tools 12:grafana-9.5.5-1.54.3.x86_64",
"SUSE Manager Client Tools 12:prometheus-blackbox_exporter-0.24.0-1.23.2.aarch64",
"SUSE Manager Client Tools 12:prometheus-blackbox_exporter-0.24.0-1.23.2.ppc64le",
"SUSE Manager Client Tools 12:prometheus-blackbox_exporter-0.24.0-1.23.2.s390x",
"SUSE Manager Client Tools 12:prometheus-blackbox_exporter-0.24.0-1.23.2.x86_64",
"SUSE Manager Client Tools 12:prometheus-postgres_exporter-0.10.1-1.14.3.aarch64",
"SUSE Manager Client Tools 12:prometheus-postgres_exporter-0.10.1-1.14.3.ppc64le",
"SUSE Manager Client Tools 12:prometheus-postgres_exporter-0.10.1-1.14.3.s390x",
"SUSE Manager Client Tools 12:prometheus-postgres_exporter-0.10.1-1.14.3.x86_64",
"SUSE Manager Client Tools 12:python2-uyuni-common-libs-4.3.9-1.36.3.aarch64",
"SUSE Manager Client Tools 12:python2-uyuni-common-libs-4.3.9-1.36.3.ppc64le",
"SUSE Manager Client Tools 12:python2-uyuni-common-libs-4.3.9-1.36.3.s390x",
"SUSE Manager Client Tools 12:python2-uyuni-common-libs-4.3.9-1.36.3.x86_64",
"SUSE Manager Client Tools 12:spacecmd-4.3.23-38.127.3.noarch",
"SUSE Manager Client Tools 12:supportutils-plugin-susemanager-client-4.3.3-6.27.2.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2023-09-28T11:42:18Z",
"details": "important"
}
],
"title": "CVE-2022-46146"
},
{
"cve": "CVE-2023-29409",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-29409"
}
],
"notes": [
{
"category": "general",
"text": "Extremely large RSA keys in certificate chains can cause a client/server to expend significant CPU time verifying signatures. With fix, the size of RSA keys transmitted during handshakes is restricted to \u003c= 8192 bits. Based on a survey of publicly trusted RSA keys, there are currently only three certificates in circulation with keys larger than this, and all three appear to be test certificates that are not actively deployed. It is possible there are larger keys in use in private PKIs, but we target the web PKI, so causing breakage here in the interests of increasing the default safety of users of crypto/tls seems reasonable.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:golang-github-prometheus-node_exporter-1.5.0-1.27.2.aarch64",
"SUSE Linux Enterprise Server 12 SP5:golang-github-prometheus-node_exporter-1.5.0-1.27.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:golang-github-prometheus-node_exporter-1.5.0-1.27.2.s390x",
"SUSE Linux Enterprise Server 12 SP5:golang-github-prometheus-node_exporter-1.5.0-1.27.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:golang-github-prometheus-node_exporter-1.5.0-1.27.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:golang-github-prometheus-node_exporter-1.5.0-1.27.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:golang-github-prometheus-node_exporter-1.5.0-1.27.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:golang-github-prometheus-node_exporter-1.5.0-1.27.2.x86_64",
"SUSE Manager Client Tools 12:golang-github-QubitProducts-exporter_exporter-0.4.0-1.12.2.aarch64",
"SUSE Manager Client Tools 12:golang-github-QubitProducts-exporter_exporter-0.4.0-1.12.2.ppc64le",
"SUSE Manager Client Tools 12:golang-github-QubitProducts-exporter_exporter-0.4.0-1.12.2.s390x",
"SUSE Manager Client Tools 12:golang-github-QubitProducts-exporter_exporter-0.4.0-1.12.2.x86_64",
"SUSE Manager Client Tools 12:golang-github-lusitaniae-apache_exporter-1.0.0-1.18.2.aarch64",
"SUSE Manager Client Tools 12:golang-github-lusitaniae-apache_exporter-1.0.0-1.18.2.ppc64le",
"SUSE Manager Client Tools 12:golang-github-lusitaniae-apache_exporter-1.0.0-1.18.2.s390x",
"SUSE Manager Client Tools 12:golang-github-lusitaniae-apache_exporter-1.0.0-1.18.2.x86_64",
"SUSE Manager Client Tools 12:golang-github-prometheus-alertmanager-0.23.0-1.21.2.aarch64",
"SUSE Manager Client Tools 12:golang-github-prometheus-alertmanager-0.23.0-1.21.2.ppc64le",
"SUSE Manager Client Tools 12:golang-github-prometheus-alertmanager-0.23.0-1.21.2.s390x",
"SUSE Manager Client Tools 12:golang-github-prometheus-alertmanager-0.23.0-1.21.2.x86_64",
"SUSE Manager Client Tools 12:golang-github-prometheus-node_exporter-1.5.0-1.27.2.aarch64",
"SUSE Manager Client Tools 12:golang-github-prometheus-node_exporter-1.5.0-1.27.2.ppc64le",
"SUSE Manager Client Tools 12:golang-github-prometheus-node_exporter-1.5.0-1.27.2.s390x",
"SUSE Manager Client Tools 12:golang-github-prometheus-node_exporter-1.5.0-1.27.2.x86_64",
"SUSE Manager Client Tools 12:golang-github-prometheus-prometheus-2.45.0-1.47.3.aarch64",
"SUSE Manager Client Tools 12:golang-github-prometheus-prometheus-2.45.0-1.47.3.ppc64le",
"SUSE Manager Client Tools 12:golang-github-prometheus-prometheus-2.45.0-1.47.3.s390x",
"SUSE Manager Client Tools 12:golang-github-prometheus-prometheus-2.45.0-1.47.3.x86_64",
"SUSE Manager Client Tools 12:grafana-9.5.5-1.54.3.aarch64",
"SUSE Manager Client Tools 12:grafana-9.5.5-1.54.3.ppc64le",
"SUSE Manager Client Tools 12:grafana-9.5.5-1.54.3.s390x",
"SUSE Manager Client Tools 12:grafana-9.5.5-1.54.3.x86_64",
"SUSE Manager Client Tools 12:prometheus-blackbox_exporter-0.24.0-1.23.2.aarch64",
"SUSE Manager Client Tools 12:prometheus-blackbox_exporter-0.24.0-1.23.2.ppc64le",
"SUSE Manager Client Tools 12:prometheus-blackbox_exporter-0.24.0-1.23.2.s390x",
"SUSE Manager Client Tools 12:prometheus-blackbox_exporter-0.24.0-1.23.2.x86_64",
"SUSE Manager Client Tools 12:prometheus-postgres_exporter-0.10.1-1.14.3.aarch64",
"SUSE Manager Client Tools 12:prometheus-postgres_exporter-0.10.1-1.14.3.ppc64le",
"SUSE Manager Client Tools 12:prometheus-postgres_exporter-0.10.1-1.14.3.s390x",
"SUSE Manager Client Tools 12:prometheus-postgres_exporter-0.10.1-1.14.3.x86_64",
"SUSE Manager Client Tools 12:python2-uyuni-common-libs-4.3.9-1.36.3.aarch64",
"SUSE Manager Client Tools 12:python2-uyuni-common-libs-4.3.9-1.36.3.ppc64le",
"SUSE Manager Client Tools 12:python2-uyuni-common-libs-4.3.9-1.36.3.s390x",
"SUSE Manager Client Tools 12:python2-uyuni-common-libs-4.3.9-1.36.3.x86_64",
"SUSE Manager Client Tools 12:spacecmd-4.3.23-38.127.3.noarch",
"SUSE Manager Client Tools 12:supportutils-plugin-susemanager-client-4.3.3-6.27.2.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-29409",
"url": "https://www.suse.com/security/cve/CVE-2023-29409"
},
{
"category": "external",
"summary": "SUSE Bug 1213880 for CVE-2023-29409",
"url": "https://bugzilla.suse.com/1213880"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:golang-github-prometheus-node_exporter-1.5.0-1.27.2.aarch64",
"SUSE Linux Enterprise Server 12 SP5:golang-github-prometheus-node_exporter-1.5.0-1.27.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:golang-github-prometheus-node_exporter-1.5.0-1.27.2.s390x",
"SUSE Linux Enterprise Server 12 SP5:golang-github-prometheus-node_exporter-1.5.0-1.27.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:golang-github-prometheus-node_exporter-1.5.0-1.27.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:golang-github-prometheus-node_exporter-1.5.0-1.27.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:golang-github-prometheus-node_exporter-1.5.0-1.27.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:golang-github-prometheus-node_exporter-1.5.0-1.27.2.x86_64",
"SUSE Manager Client Tools 12:golang-github-QubitProducts-exporter_exporter-0.4.0-1.12.2.aarch64",
"SUSE Manager Client Tools 12:golang-github-QubitProducts-exporter_exporter-0.4.0-1.12.2.ppc64le",
"SUSE Manager Client Tools 12:golang-github-QubitProducts-exporter_exporter-0.4.0-1.12.2.s390x",
"SUSE Manager Client Tools 12:golang-github-QubitProducts-exporter_exporter-0.4.0-1.12.2.x86_64",
"SUSE Manager Client Tools 12:golang-github-lusitaniae-apache_exporter-1.0.0-1.18.2.aarch64",
"SUSE Manager Client Tools 12:golang-github-lusitaniae-apache_exporter-1.0.0-1.18.2.ppc64le",
"SUSE Manager Client Tools 12:golang-github-lusitaniae-apache_exporter-1.0.0-1.18.2.s390x",
"SUSE Manager Client Tools 12:golang-github-lusitaniae-apache_exporter-1.0.0-1.18.2.x86_64",
"SUSE Manager Client Tools 12:golang-github-prometheus-alertmanager-0.23.0-1.21.2.aarch64",
"SUSE Manager Client Tools 12:golang-github-prometheus-alertmanager-0.23.0-1.21.2.ppc64le",
"SUSE Manager Client Tools 12:golang-github-prometheus-alertmanager-0.23.0-1.21.2.s390x",
"SUSE Manager Client Tools 12:golang-github-prometheus-alertmanager-0.23.0-1.21.2.x86_64",
"SUSE Manager Client Tools 12:golang-github-prometheus-node_exporter-1.5.0-1.27.2.aarch64",
"SUSE Manager Client Tools 12:golang-github-prometheus-node_exporter-1.5.0-1.27.2.ppc64le",
"SUSE Manager Client Tools 12:golang-github-prometheus-node_exporter-1.5.0-1.27.2.s390x",
"SUSE Manager Client Tools 12:golang-github-prometheus-node_exporter-1.5.0-1.27.2.x86_64",
"SUSE Manager Client Tools 12:golang-github-prometheus-prometheus-2.45.0-1.47.3.aarch64",
"SUSE Manager Client Tools 12:golang-github-prometheus-prometheus-2.45.0-1.47.3.ppc64le",
"SUSE Manager Client Tools 12:golang-github-prometheus-prometheus-2.45.0-1.47.3.s390x",
"SUSE Manager Client Tools 12:golang-github-prometheus-prometheus-2.45.0-1.47.3.x86_64",
"SUSE Manager Client Tools 12:grafana-9.5.5-1.54.3.aarch64",
"SUSE Manager Client Tools 12:grafana-9.5.5-1.54.3.ppc64le",
"SUSE Manager Client Tools 12:grafana-9.5.5-1.54.3.s390x",
"SUSE Manager Client Tools 12:grafana-9.5.5-1.54.3.x86_64",
"SUSE Manager Client Tools 12:prometheus-blackbox_exporter-0.24.0-1.23.2.aarch64",
"SUSE Manager Client Tools 12:prometheus-blackbox_exporter-0.24.0-1.23.2.ppc64le",
"SUSE Manager Client Tools 12:prometheus-blackbox_exporter-0.24.0-1.23.2.s390x",
"SUSE Manager Client Tools 12:prometheus-blackbox_exporter-0.24.0-1.23.2.x86_64",
"SUSE Manager Client Tools 12:prometheus-postgres_exporter-0.10.1-1.14.3.aarch64",
"SUSE Manager Client Tools 12:prometheus-postgres_exporter-0.10.1-1.14.3.ppc64le",
"SUSE Manager Client Tools 12:prometheus-postgres_exporter-0.10.1-1.14.3.s390x",
"SUSE Manager Client Tools 12:prometheus-postgres_exporter-0.10.1-1.14.3.x86_64",
"SUSE Manager Client Tools 12:python2-uyuni-common-libs-4.3.9-1.36.3.aarch64",
"SUSE Manager Client Tools 12:python2-uyuni-common-libs-4.3.9-1.36.3.ppc64le",
"SUSE Manager Client Tools 12:python2-uyuni-common-libs-4.3.9-1.36.3.s390x",
"SUSE Manager Client Tools 12:python2-uyuni-common-libs-4.3.9-1.36.3.x86_64",
"SUSE Manager Client Tools 12:spacecmd-4.3.23-38.127.3.noarch",
"SUSE Manager Client Tools 12:supportutils-plugin-susemanager-client-4.3.3-6.27.2.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:golang-github-prometheus-node_exporter-1.5.0-1.27.2.aarch64",
"SUSE Linux Enterprise Server 12 SP5:golang-github-prometheus-node_exporter-1.5.0-1.27.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:golang-github-prometheus-node_exporter-1.5.0-1.27.2.s390x",
"SUSE Linux Enterprise Server 12 SP5:golang-github-prometheus-node_exporter-1.5.0-1.27.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:golang-github-prometheus-node_exporter-1.5.0-1.27.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:golang-github-prometheus-node_exporter-1.5.0-1.27.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:golang-github-prometheus-node_exporter-1.5.0-1.27.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:golang-github-prometheus-node_exporter-1.5.0-1.27.2.x86_64",
"SUSE Manager Client Tools 12:golang-github-QubitProducts-exporter_exporter-0.4.0-1.12.2.aarch64",
"SUSE Manager Client Tools 12:golang-github-QubitProducts-exporter_exporter-0.4.0-1.12.2.ppc64le",
"SUSE Manager Client Tools 12:golang-github-QubitProducts-exporter_exporter-0.4.0-1.12.2.s390x",
"SUSE Manager Client Tools 12:golang-github-QubitProducts-exporter_exporter-0.4.0-1.12.2.x86_64",
"SUSE Manager Client Tools 12:golang-github-lusitaniae-apache_exporter-1.0.0-1.18.2.aarch64",
"SUSE Manager Client Tools 12:golang-github-lusitaniae-apache_exporter-1.0.0-1.18.2.ppc64le",
"SUSE Manager Client Tools 12:golang-github-lusitaniae-apache_exporter-1.0.0-1.18.2.s390x",
"SUSE Manager Client Tools 12:golang-github-lusitaniae-apache_exporter-1.0.0-1.18.2.x86_64",
"SUSE Manager Client Tools 12:golang-github-prometheus-alertmanager-0.23.0-1.21.2.aarch64",
"SUSE Manager Client Tools 12:golang-github-prometheus-alertmanager-0.23.0-1.21.2.ppc64le",
"SUSE Manager Client Tools 12:golang-github-prometheus-alertmanager-0.23.0-1.21.2.s390x",
"SUSE Manager Client Tools 12:golang-github-prometheus-alertmanager-0.23.0-1.21.2.x86_64",
"SUSE Manager Client Tools 12:golang-github-prometheus-node_exporter-1.5.0-1.27.2.aarch64",
"SUSE Manager Client Tools 12:golang-github-prometheus-node_exporter-1.5.0-1.27.2.ppc64le",
"SUSE Manager Client Tools 12:golang-github-prometheus-node_exporter-1.5.0-1.27.2.s390x",
"SUSE Manager Client Tools 12:golang-github-prometheus-node_exporter-1.5.0-1.27.2.x86_64",
"SUSE Manager Client Tools 12:golang-github-prometheus-prometheus-2.45.0-1.47.3.aarch64",
"SUSE Manager Client Tools 12:golang-github-prometheus-prometheus-2.45.0-1.47.3.ppc64le",
"SUSE Manager Client Tools 12:golang-github-prometheus-prometheus-2.45.0-1.47.3.s390x",
"SUSE Manager Client Tools 12:golang-github-prometheus-prometheus-2.45.0-1.47.3.x86_64",
"SUSE Manager Client Tools 12:grafana-9.5.5-1.54.3.aarch64",
"SUSE Manager Client Tools 12:grafana-9.5.5-1.54.3.ppc64le",
"SUSE Manager Client Tools 12:grafana-9.5.5-1.54.3.s390x",
"SUSE Manager Client Tools 12:grafana-9.5.5-1.54.3.x86_64",
"SUSE Manager Client Tools 12:prometheus-blackbox_exporter-0.24.0-1.23.2.aarch64",
"SUSE Manager Client Tools 12:prometheus-blackbox_exporter-0.24.0-1.23.2.ppc64le",
"SUSE Manager Client Tools 12:prometheus-blackbox_exporter-0.24.0-1.23.2.s390x",
"SUSE Manager Client Tools 12:prometheus-blackbox_exporter-0.24.0-1.23.2.x86_64",
"SUSE Manager Client Tools 12:prometheus-postgres_exporter-0.10.1-1.14.3.aarch64",
"SUSE Manager Client Tools 12:prometheus-postgres_exporter-0.10.1-1.14.3.ppc64le",
"SUSE Manager Client Tools 12:prometheus-postgres_exporter-0.10.1-1.14.3.s390x",
"SUSE Manager Client Tools 12:prometheus-postgres_exporter-0.10.1-1.14.3.x86_64",
"SUSE Manager Client Tools 12:python2-uyuni-common-libs-4.3.9-1.36.3.aarch64",
"SUSE Manager Client Tools 12:python2-uyuni-common-libs-4.3.9-1.36.3.ppc64le",
"SUSE Manager Client Tools 12:python2-uyuni-common-libs-4.3.9-1.36.3.s390x",
"SUSE Manager Client Tools 12:python2-uyuni-common-libs-4.3.9-1.36.3.x86_64",
"SUSE Manager Client Tools 12:spacecmd-4.3.23-38.127.3.noarch",
"SUSE Manager Client Tools 12:supportutils-plugin-susemanager-client-4.3.3-6.27.2.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2023-09-28T11:42:18Z",
"details": "important"
}
],
"title": "CVE-2023-29409"
}
]
}
suse-su-2023:2578-1
Vulnerability from csaf_suse
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for SUSE Manager Client Tools",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update fixes the following issues:\n\nbind:\n\n- Provide bind dependencies and solve installation issues on SUSE Linux Enterprise Micro\n- There are no source changes \n \ndracut-saltboot:\n\n- Update to version 0.1.1681904360.84ef141 \n * Load network configuration even when missing protocol version (bsc#1210640)\n\ngrafana:\n \n- Version update from 8.5.22 to 9.5.1 (jsc#PED-3694):\n * Security fixes:\n - CVE-2023-1410: grafana: Stored XSS in Graphite FunctionDescription tooltip (bsc#1209645)\n - CVE-2023-1387: grafana: JWT URL-login flow leaks token to data sources through request parameter in proxy requests\n (bnc#1210907)\n - CVE-2022-36062: grafana: Fix RBAC folders/dashboards privilege escalation (bsc#1203596)\n - CVE-2022-35957: grafana: Escalation from admin to server admin when auth proxy is used (bsc#1203597)\n - CVE-2022-32149: Upgrade x/text to version unaffected by CVE-2022-32149 (bsc#1204501)\n - CVE-2022-31107: grafana: OAuth account takeover (bsc#1201539)\n - CVE-2022-31097: grafana: stored XSS vulnerability (bsc#1201535)\n - CVE-2022-27664: go1.18,go1.19: net/http: handle server errors after sending GOAWAY (bsc#1203185)\n - CVE-2022-0155: follow-redirects: Exposure of Private Personal Information to an Unauthorized Actor\n - CVE-2021-43138: spacewalk-web: a malicious user can obtain privileges via the mapValues() method(bsc#1200480)\n - CVE-2021-3918: json-schema is vulnerable to Improperly Controlled Modification of Object Prototype Attributes\n (\u0027Prototype Pollution\u0027) (bsc#1192696)\n - CVE-2021-3807: node-ansi-regex: Inefficient Regular Expression Complexity in chalk/ansi-regex (bsc#1192154)\n - CVE-2020-7753: nodejs-trim: Regular Expression Denial of Service (ReDoS) in trim function \n * Important changes:\n - Default named retention policies won\u0027t be used to query.\n Users who have a default named retention policy in their influxdb database, have to rename it to something else.\n To change the hardcoded retention policy in the dashboard.json, users must then select the right retention policy\n from dropdown and save the panel/dashboard.\n - Grafana Alerting rules with NoDataState configuration set to Alerting will now respect \u0027For\u0027 duration.\n - Users who use LDAP role sync to only sync Viewer, Editor and Admin roles, but grant Grafana Server Admin role\n manually will not be able to do that anymore. After this change, LDAP role sync will override any manual changes\n to Grafana Server Admin role assignments. If grafana_admin is left unset in LDAP role mapping configuration, it\n will default to false.\n - The InfluxDB backend migration feature toggle (influxdbBackendMigration) has been reintroduced in this version\n as issues were discovered with backend processing of InfluxDB data. Unless this feature toggle is enabled, all\n InfluxDB data will be parsed in the frontend. This frontend processing is the default behavior. \n In Grafana 9.4.4, InfluxDB data parsing started to be handled in the backend. If you have upgraded to 9.4.4\n and then added new transformations on InfluxDB data, those panels will fail to render. To resolve this either:\n Remove the affected panel and re-create it or edit the `time` field as `Time` in `panel.json` \n or `dashboard.json`\n - The `@grafana/ui` package helper function `selectOptionInTest` used in frontend tests has been removed as it\n caused testing libraries to be bundled in the production code of Grafana. If you were using this helper function\n in your tests please update your code accordingly.\n - Removed deprecated `checkHealth` prop from the `@grafana/e2e` `addDataSource` configuration. Previously this\n value defaulted to `false`, and has not been used in end-to-end tests since Grafana 8.0.3.\n - Removed the deprecated `LegacyBaseMap`, `LegacyValueMapping`, `LegacyValueMap`, and `LegacyRangeMap` types, and\n `getMappedValue` function from grafana-data. See the documentation for the migration.\n This change fixes a bug in Grafana where intermittent failure of database, network between Grafana and the\n database, or error in querying the database would cause all alert rules to be unscheduled in Grafana. \n Following this change scheduled alert rules are not updated unless the query is successful.\n - The `get_alert_rules_duration_seconds` metric has been renamed to `schedule_query_alert_rules_duration_seconds`\n - Any secret (data sources credential, alert manager credential, etc, etc) created or modified with Grafana v9.0\n won\u0027t be decryptable from any previous version (by default) because the way encrypted secrets are stored into the\n database has changed. Although secrets created or modified with previous versions will still be decryptable by\n Grafana v9.0.\n - If required, although generally discouraged, the `disableEnvelopeEncryption` feature toggle can be enabled to\n keep envelope encryption disabled once updating to Grafana\n - In case of need to rollback to an earlier version of Grafana (i.e. Grafana v8.x) for any reason, after being\n created or modified any secret with Grafana v9.0, the `envelopeEncryption` feature toggle will need to be enabled\n to keep backwards compatibility (only from `v8.3.x` a bit unstable, from `8.5.x` stable).\n - As a final attempt to deal with issues related with the aforementioned situations, the \n `grafana-cli admin secrets-migration rollback` command has been designed to move back all the Grafana secrets\n encrypted with envelope encryption to legacy encryption. So, after running that command it should be safe to\n disable envelope encryption and/or roll back to a previous version of Grafana.\n Alternatively or complementarily to all the points above, backing up the Grafana database before updating could\n be a good idea to prevent disasters (although the risk of getting some secrets corrupted only applies to those \n updates/created with after updating to Grafana v9.0).\n - In Elasticsearch, browser access mode was deprecated in grafana 7.4.0 and removed in 9.0.0. If you used this mode\n please switch to server access mode on the datasource configuration page.\n - Environment variables passed from Grafana to external Azure plugins have been renamed:\n `AZURE_CLOUD` renamed to `GFAZPL_AZURE_CLOUD`,\n `AZURE_MANAGED_IDENTITY_ENABLED` renamed to `GFAZPL_MANAGED_IDENTITY_ENABLED`,\n `AZURE_MANAGED_IDENTITY_CLIENT_ID` renamed to `GFAZPL_MANAGED_IDENTITY_CLIENT_ID`.\n There are no known plugins which were relying on these variables. Moving forward plugins should read Azure\n settings only via Grafana Azure SDK which properly handles old and new environment variables.\n - Removes support for for ElasticSearch versions after their end-of-life, currently versions \u003c 7.10.0.\n To continue to use ElasticSearch data source, upgrade ElasticSearch to version 7.10.0+.\n - Application Insights and Insight Analytics queries in Azure Monitor were deprecated in Grafana 8.0 and finally\n removed in 9.0. Deprecated queries will no longer be executed.\n - grafana/ui: Button now specifies a default type=\u0027button\u0027.\n The `Button` component provided by @grafana/ui now specifies a default `type=\u0027button\u0027` when no type is provided.\n In previous versions, if the attribute was not specified for buttons associated with a `\u003cform\u003e` the\n default value was `submit` per the specification. You can preserve the old behavior by explicitly setting the\n type attribute: `\u003cButton type=\u0027submit\u0027 /\u003e`\n - The `Rename by regex` transformation has been improved to allow global patterns of the form \n `/\u003cstringToReplace\u003e/g`.\n Depending on the regex match used, this may cause some transformations to behave slightly differently. You can\n guarantee the same behaviour as before by wrapping the `match` string in forward slashes (`/`), e.g. `(.*)` would\n become `/(.*)/`\n - `\u003cSelect /\u003e` menus will now portal to the document body by default. This is to give more consistent\n behaviour when positioning and overlaying. If you were setting`menuShouldPortal={true}` before you can safely \n remove that prop and behaviour will be the same. If you weren\u0027t explicitly setting that prop, there should be no\n visible changes in behaviour but your tests may need updating. If you were setting `menuShouldPortal={false}`\n this will continue to prevent the menu from portalling.\n - Grafana alerting endpoint prefixed with `api/v1/rule/test` that tests a rule against a Corte/Loki data source now\n expects the data source UID as a path parameter instead of the data source numeric identifier.\n - Grafana alerting endpoints prefixed with `api/prometheus/` that proxy requests to a Cortex/Loki data source now\n expect the data source UID as a path parameter instead of the data source numeric identifier.\n - Grafana alerting endpoints prefixed with `api/ruler/` that proxy requests to a Cortex/Loki data source now expect\n the data source UID as a path parameter instead of the data\n - Grafana alerting endpoints prefixed with `api/alertmanager/` that proxy requests to an Alertmanager now expect\n the data source UID as a path parameter instead of the data source numeric identifier.\n - The format of log messages have been updated, `lvl` is now `level` and `eror`and `dbug` has been replaced with\n `error` and `debug`. The precision of timestamps has been increased.\n To smooth the transition, it is possible to opt-out of the new log format by enabling the feature toggle\n `oldlog`.\n This option will be removed in a future minor release.\n - In the Loki data source, the dataframe format used to represent Loki logs-data has been changed to a more\n efficient format. The query-result is represented by a single dataframe with a \u0027labels\u0027 column, instead of the\n separate dataframes for every labels-value. When displaying such data in explore, or in a logs-panel in the\n dashboard will continue to work without changes, but if the data was loaded into a different dashboard-panel, or\n Transforms were used, adjustments may be necessary. For example, if you used the \u0027labels to fields\u0027 \n transformation with the logs data, please switch to the \u0027extract fields\u0027 transformation.\n * Deprecations:\n - The `grafana_database_conn_*` metrics are deprecated, and will be removed in a future version of Grafana. Use \n the `go_sql_stats_*` metrics instead.\n - Support for compact Explore URLs is deprecated and will be removed in a future release. Until then, when\n navigating to Explore using the deprecated format the URLs are automatically converted. If you have\n existing links pointing to Explore update them using the format generated by Explore upon navigation.\n You can identify a compact URL by its format. Compact URLs have the left (and optionally right) url parameter as\n an array of strings, for example `\u0026left=[\u0027now-1h\u0027,\u0027now\u0027...]`. The standard explore URLs follow a key/value\n pattern, for example `\u0026left={\u0027datasource\u0027:\u0027test\u0027...}`. Please be sure to check your dashboards for any\n hardcoded links to Explore and update them to the standard URL pattern.\n - Chore: Remove deprecated DataSourceAPI methods.\n - Data: Remove deprecated types and functions from valueMappings.\n - Elasticsearch: Remove browser access mode.\n - Elasticsearch: Remove support for versions after their end of the life (\u003c7.10.0).\n - Explore: Remove support for legacy, compact format URLs.\n - Graph: Deprecate Graph (old) and make it no longer a visualization option for new panels.\n - `setExploreQueryField`, `setExploreMetricsQueryField` and `setExploreLogsQueryField` are now deprecated and will\n be removed in a future release. If you need to set a different query editor for Explore, conditionally render\n based on `props.app` in your regular query editor.\n * Changes:\n - User: Fix externalUserId not being populated.\n If you used any of these components please use them from grafana/experimental from now on:\n - AccessoryButton\n - EditorFieldGroup\n - EditorHeader\n - EditorField\n - EditorRow\n - EditorList\n - EditorRows\n - EditorSwitch\n - FlexItem\n - Stack\n - InlineSelect\n - InputGroup\n - Space\n - Starting with 9.1.0, existing heatmap panels will start using a new implementation. This can be disabled by\n setting the `useLegacyHeatmapPanel` feature flag to true. It can be tested on a single dashbobard by adding\n `?__feature.useLegacyHeatmapPanel=true` to any dashboard URL.\n - Logger: Enable new logging format by default.\n - Loki: Enable new visual query builder by default.\n - Plugins: Remove plugin list panel.\n - Install wrapper scripts under /usr/sbin\n - Install actual binaries under /usr/libexec/grafana (or /usr/lib under older distributions) and create a simlink \n for wrapper scripts and the service (which expect the binary to be under /usr/share/grafana/bin)\n - Chore: Upgrade typescript to 4.6.4.\n\nmgr-daemon:\n\n- Version 4.3.7-1\n * Update translation strings\n\nspacecmd:\n\n- Version 4.3.21-1\n * fix argument parsing of distribution_update (bsc#1210458)\n- Version 4.3.20-1\n * Display activation key details after executing the corresponding command (bsc#1208719)\n * Show targetted packages before actually removing them (bsc#1207830)\n\nuyuni-common-libs:\n\n- Version 4.3.8-1\n * Allow default component for context manager\n\nzypp-plugin-spacewalk:\n\n- 1.0.14\n * SPEC cleanup\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2023-2578,SUSE-SLE-Manager-Tools-15-2023-2578,SUSE-SLE-Manager-Tools-For-Micro-5-2023-2578,SUSE-SLE-Module-SUSE-Manager-Proxy-4.2-2023-2578,SUSE-SLE-Module-SUSE-Manager-Proxy-4.3-2023-2578,SUSE-SLE-Product-HPC-15-SP1-LTSS-2023-2578,SUSE-SLE-Product-HPC-15-SP2-LTSS-2023-2578,SUSE-SLE-Product-SLES-15-SP1-LTSS-2023-2578,SUSE-SLE-Product-SLES-15-SP2-LTSS-2023-2578,SUSE-SLE-Product-SLES_SAP-15-SP1-2023-2578,SUSE-SLE-Product-SLES_SAP-15-SP2-2023-2578,SUSE-Storage-7-2023-2578,openSUSE-SLE-15.4-2023-2578,openSUSE-SLE-15.5-2023-2578",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2023_2578-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2023:2578-1",
"url": "https://www.suse.com/support/update/announcement/2023/suse-su-20232578-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2023:2578-1",
"url": "https://lists.suse.com/pipermail/sle-updates/2023-June/029951.html"
},
{
"category": "self",
"summary": "SUSE Bug 1192154",
"url": "https://bugzilla.suse.com/1192154"
},
{
"category": "self",
"summary": "SUSE Bug 1192696",
"url": "https://bugzilla.suse.com/1192696"
},
{
"category": "self",
"summary": "SUSE Bug 1200480",
"url": "https://bugzilla.suse.com/1200480"
},
{
"category": "self",
"summary": "SUSE Bug 1201535",
"url": "https://bugzilla.suse.com/1201535"
},
{
"category": "self",
"summary": "SUSE Bug 1201539",
"url": "https://bugzilla.suse.com/1201539"
},
{
"category": "self",
"summary": "SUSE Bug 1203185",
"url": "https://bugzilla.suse.com/1203185"
},
{
"category": "self",
"summary": "SUSE Bug 1203596",
"url": "https://bugzilla.suse.com/1203596"
},
{
"category": "self",
"summary": "SUSE Bug 1203597",
"url": "https://bugzilla.suse.com/1203597"
},
{
"category": "self",
"summary": "SUSE Bug 1203599",
"url": "https://bugzilla.suse.com/1203599"
},
{
"category": "self",
"summary": "SUSE Bug 1204501",
"url": "https://bugzilla.suse.com/1204501"
},
{
"category": "self",
"summary": "SUSE Bug 1207830",
"url": "https://bugzilla.suse.com/1207830"
},
{
"category": "self",
"summary": "SUSE Bug 1208719",
"url": "https://bugzilla.suse.com/1208719"
},
{
"category": "self",
"summary": "SUSE Bug 1209645",
"url": "https://bugzilla.suse.com/1209645"
},
{
"category": "self",
"summary": "SUSE Bug 1210458",
"url": "https://bugzilla.suse.com/1210458"
},
{
"category": "self",
"summary": "SUSE Bug 1210640",
"url": "https://bugzilla.suse.com/1210640"
},
{
"category": "self",
"summary": "SUSE Bug 1210907",
"url": "https://bugzilla.suse.com/1210907"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-7753 page",
"url": "https://www.suse.com/security/cve/CVE-2020-7753/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-3807 page",
"url": "https://www.suse.com/security/cve/CVE-2021-3807/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-3918 page",
"url": "https://www.suse.com/security/cve/CVE-2021-3918/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-43138 page",
"url": "https://www.suse.com/security/cve/CVE-2021-43138/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-0155 page",
"url": "https://www.suse.com/security/cve/CVE-2022-0155/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-27664 page",
"url": "https://www.suse.com/security/cve/CVE-2022-27664/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-31097 page",
"url": "https://www.suse.com/security/cve/CVE-2022-31097/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-31107 page",
"url": "https://www.suse.com/security/cve/CVE-2022-31107/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-32149 page",
"url": "https://www.suse.com/security/cve/CVE-2022-32149/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-35957 page",
"url": "https://www.suse.com/security/cve/CVE-2022-35957/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-36062 page",
"url": "https://www.suse.com/security/cve/CVE-2022-36062/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-41715 page",
"url": "https://www.suse.com/security/cve/CVE-2022-41715/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-46146 page",
"url": "https://www.suse.com/security/cve/CVE-2022-46146/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-1387 page",
"url": "https://www.suse.com/security/cve/CVE-2023-1387/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-1410 page",
"url": "https://www.suse.com/security/cve/CVE-2023-1410/"
}
],
"title": "Security update for SUSE Manager Client Tools",
"tracking": {
"current_release_date": "2023-06-21T11:49:43Z",
"generator": {
"date": "2023-06-21T11:49:43Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2023:2578-1",
"initial_release_date": "2023-06-21T11:49:43Z",
"revision_history": [
{
"date": "2023-06-21T11:49:43Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "bind-9.16.6-150000.12.65.1.aarch64",
"product": {
"name": "bind-9.16.6-150000.12.65.1.aarch64",
"product_id": "bind-9.16.6-150000.12.65.1.aarch64"
}
},
{
"category": "product_version",
"name": "bind-chrootenv-9.16.6-150000.12.65.1.aarch64",
"product": {
"name": "bind-chrootenv-9.16.6-150000.12.65.1.aarch64",
"product_id": "bind-chrootenv-9.16.6-150000.12.65.1.aarch64"
}
},
{
"category": "product_version",
"name": "bind-devel-9.16.6-150000.12.65.1.aarch64",
"product": {
"name": "bind-devel-9.16.6-150000.12.65.1.aarch64",
"product_id": "bind-devel-9.16.6-150000.12.65.1.aarch64"
}
},
{
"category": "product_version",
"name": "bind-utils-9.16.6-150000.12.65.1.aarch64",
"product": {
"name": "bind-utils-9.16.6-150000.12.65.1.aarch64",
"product_id": "bind-utils-9.16.6-150000.12.65.1.aarch64"
}
},
{
"category": "product_version",
"name": "grafana-9.5.1-150000.1.48.5.aarch64",
"product": {
"name": "grafana-9.5.1-150000.1.48.5.aarch64",
"product_id": "grafana-9.5.1-150000.1.48.5.aarch64"
}
},
{
"category": "product_version",
"name": "libbind9-1600-9.16.6-150000.12.65.1.aarch64",
"product": {
"name": "libbind9-1600-9.16.6-150000.12.65.1.aarch64",
"product_id": "libbind9-1600-9.16.6-150000.12.65.1.aarch64"
}
},
{
"category": "product_version",
"name": "libdns1605-9.16.6-150000.12.65.1.aarch64",
"product": {
"name": "libdns1605-9.16.6-150000.12.65.1.aarch64",
"product_id": "libdns1605-9.16.6-150000.12.65.1.aarch64"
}
},
{
"category": "product_version",
"name": "libirs-devel-9.16.6-150000.12.65.1.aarch64",
"product": {
"name": "libirs-devel-9.16.6-150000.12.65.1.aarch64",
"product_id": "libirs-devel-9.16.6-150000.12.65.1.aarch64"
}
},
{
"category": "product_version",
"name": "libirs1601-9.16.6-150000.12.65.1.aarch64",
"product": {
"name": "libirs1601-9.16.6-150000.12.65.1.aarch64",
"product_id": "libirs1601-9.16.6-150000.12.65.1.aarch64"
}
},
{
"category": "product_version",
"name": "libisc1606-9.16.6-150000.12.65.1.aarch64",
"product": {
"name": "libisc1606-9.16.6-150000.12.65.1.aarch64",
"product_id": "libisc1606-9.16.6-150000.12.65.1.aarch64"
}
},
{
"category": "product_version",
"name": "libisccc1600-9.16.6-150000.12.65.1.aarch64",
"product": {
"name": "libisccc1600-9.16.6-150000.12.65.1.aarch64",
"product_id": "libisccc1600-9.16.6-150000.12.65.1.aarch64"
}
},
{
"category": "product_version",
"name": "libisccfg1600-9.16.6-150000.12.65.1.aarch64",
"product": {
"name": "libisccfg1600-9.16.6-150000.12.65.1.aarch64",
"product_id": "libisccfg1600-9.16.6-150000.12.65.1.aarch64"
}
},
{
"category": "product_version",
"name": "libns1604-9.16.6-150000.12.65.1.aarch64",
"product": {
"name": "libns1604-9.16.6-150000.12.65.1.aarch64",
"product_id": "libns1604-9.16.6-150000.12.65.1.aarch64"
}
},
{
"category": "product_version",
"name": "python2-uyuni-common-libs-4.3.8-150000.1.33.1.aarch64",
"product": {
"name": "python2-uyuni-common-libs-4.3.8-150000.1.33.1.aarch64",
"product_id": "python2-uyuni-common-libs-4.3.8-150000.1.33.1.aarch64"
}
},
{
"category": "product_version",
"name": "python3-uyuni-common-libs-4.3.8-150000.1.33.1.aarch64",
"product": {
"name": "python3-uyuni-common-libs-4.3.8-150000.1.33.1.aarch64",
"product_id": "python3-uyuni-common-libs-4.3.8-150000.1.33.1.aarch64"
}
},
{
"category": "product_version",
"name": "python3-yarl-1.3.0-150000.1.6.1.aarch64",
"product": {
"name": "python3-yarl-1.3.0-150000.1.6.1.aarch64",
"product_id": "python3-yarl-1.3.0-150000.1.6.1.aarch64"
}
},
{
"category": "product_version",
"name": "wire-0.5.0-150000.1.12.3.aarch64",
"product": {
"name": "wire-0.5.0-150000.1.12.3.aarch64",
"product_id": "wire-0.5.0-150000.1.12.3.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "bind-devel-64bit-9.16.6-150000.12.65.1.aarch64_ilp32",
"product": {
"name": "bind-devel-64bit-9.16.6-150000.12.65.1.aarch64_ilp32",
"product_id": "bind-devel-64bit-9.16.6-150000.12.65.1.aarch64_ilp32"
}
},
{
"category": "product_version",
"name": "libbind9-1600-64bit-9.16.6-150000.12.65.1.aarch64_ilp32",
"product": {
"name": "libbind9-1600-64bit-9.16.6-150000.12.65.1.aarch64_ilp32",
"product_id": "libbind9-1600-64bit-9.16.6-150000.12.65.1.aarch64_ilp32"
}
},
{
"category": "product_version",
"name": "libdns1605-64bit-9.16.6-150000.12.65.1.aarch64_ilp32",
"product": {
"name": "libdns1605-64bit-9.16.6-150000.12.65.1.aarch64_ilp32",
"product_id": "libdns1605-64bit-9.16.6-150000.12.65.1.aarch64_ilp32"
}
},
{
"category": "product_version",
"name": "libirs1601-64bit-9.16.6-150000.12.65.1.aarch64_ilp32",
"product": {
"name": "libirs1601-64bit-9.16.6-150000.12.65.1.aarch64_ilp32",
"product_id": "libirs1601-64bit-9.16.6-150000.12.65.1.aarch64_ilp32"
}
},
{
"category": "product_version",
"name": "libisc1606-64bit-9.16.6-150000.12.65.1.aarch64_ilp32",
"product": {
"name": "libisc1606-64bit-9.16.6-150000.12.65.1.aarch64_ilp32",
"product_id": "libisc1606-64bit-9.16.6-150000.12.65.1.aarch64_ilp32"
}
},
{
"category": "product_version",
"name": "libisccc1600-64bit-9.16.6-150000.12.65.1.aarch64_ilp32",
"product": {
"name": "libisccc1600-64bit-9.16.6-150000.12.65.1.aarch64_ilp32",
"product_id": "libisccc1600-64bit-9.16.6-150000.12.65.1.aarch64_ilp32"
}
},
{
"category": "product_version",
"name": "libisccfg1600-64bit-9.16.6-150000.12.65.1.aarch64_ilp32",
"product": {
"name": "libisccfg1600-64bit-9.16.6-150000.12.65.1.aarch64_ilp32",
"product_id": "libisccfg1600-64bit-9.16.6-150000.12.65.1.aarch64_ilp32"
}
},
{
"category": "product_version",
"name": "libns1604-64bit-9.16.6-150000.12.65.1.aarch64_ilp32",
"product": {
"name": "libns1604-64bit-9.16.6-150000.12.65.1.aarch64_ilp32",
"product_id": "libns1604-64bit-9.16.6-150000.12.65.1.aarch64_ilp32"
}
}
],
"category": "architecture",
"name": "aarch64_ilp32"
},
{
"branches": [
{
"category": "product_version",
"name": "bind-9.16.6-150000.12.65.1.i586",
"product": {
"name": "bind-9.16.6-150000.12.65.1.i586",
"product_id": "bind-9.16.6-150000.12.65.1.i586"
}
},
{
"category": "product_version",
"name": "bind-chrootenv-9.16.6-150000.12.65.1.i586",
"product": {
"name": "bind-chrootenv-9.16.6-150000.12.65.1.i586",
"product_id": "bind-chrootenv-9.16.6-150000.12.65.1.i586"
}
},
{
"category": "product_version",
"name": "bind-devel-9.16.6-150000.12.65.1.i586",
"product": {
"name": "bind-devel-9.16.6-150000.12.65.1.i586",
"product_id": "bind-devel-9.16.6-150000.12.65.1.i586"
}
},
{
"category": "product_version",
"name": "bind-utils-9.16.6-150000.12.65.1.i586",
"product": {
"name": "bind-utils-9.16.6-150000.12.65.1.i586",
"product_id": "bind-utils-9.16.6-150000.12.65.1.i586"
}
},
{
"category": "product_version",
"name": "grafana-9.5.1-150000.1.48.5.i586",
"product": {
"name": "grafana-9.5.1-150000.1.48.5.i586",
"product_id": "grafana-9.5.1-150000.1.48.5.i586"
}
},
{
"category": "product_version",
"name": "libbind9-1600-9.16.6-150000.12.65.1.i586",
"product": {
"name": "libbind9-1600-9.16.6-150000.12.65.1.i586",
"product_id": "libbind9-1600-9.16.6-150000.12.65.1.i586"
}
},
{
"category": "product_version",
"name": "libdns1605-9.16.6-150000.12.65.1.i586",
"product": {
"name": "libdns1605-9.16.6-150000.12.65.1.i586",
"product_id": "libdns1605-9.16.6-150000.12.65.1.i586"
}
},
{
"category": "product_version",
"name": "libirs-devel-9.16.6-150000.12.65.1.i586",
"product": {
"name": "libirs-devel-9.16.6-150000.12.65.1.i586",
"product_id": "libirs-devel-9.16.6-150000.12.65.1.i586"
}
},
{
"category": "product_version",
"name": "libirs1601-9.16.6-150000.12.65.1.i586",
"product": {
"name": "libirs1601-9.16.6-150000.12.65.1.i586",
"product_id": "libirs1601-9.16.6-150000.12.65.1.i586"
}
},
{
"category": "product_version",
"name": "libisc1606-9.16.6-150000.12.65.1.i586",
"product": {
"name": "libisc1606-9.16.6-150000.12.65.1.i586",
"product_id": "libisc1606-9.16.6-150000.12.65.1.i586"
}
},
{
"category": "product_version",
"name": "libisccc1600-9.16.6-150000.12.65.1.i586",
"product": {
"name": "libisccc1600-9.16.6-150000.12.65.1.i586",
"product_id": "libisccc1600-9.16.6-150000.12.65.1.i586"
}
},
{
"category": "product_version",
"name": "libisccfg1600-9.16.6-150000.12.65.1.i586",
"product": {
"name": "libisccfg1600-9.16.6-150000.12.65.1.i586",
"product_id": "libisccfg1600-9.16.6-150000.12.65.1.i586"
}
},
{
"category": "product_version",
"name": "libns1604-9.16.6-150000.12.65.1.i586",
"product": {
"name": "libns1604-9.16.6-150000.12.65.1.i586",
"product_id": "libns1604-9.16.6-150000.12.65.1.i586"
}
},
{
"category": "product_version",
"name": "python2-uyuni-common-libs-4.3.8-150000.1.33.1.i586",
"product": {
"name": "python2-uyuni-common-libs-4.3.8-150000.1.33.1.i586",
"product_id": "python2-uyuni-common-libs-4.3.8-150000.1.33.1.i586"
}
},
{
"category": "product_version",
"name": "python3-uyuni-common-libs-4.3.8-150000.1.33.1.i586",
"product": {
"name": "python3-uyuni-common-libs-4.3.8-150000.1.33.1.i586",
"product_id": "python3-uyuni-common-libs-4.3.8-150000.1.33.1.i586"
}
},
{
"category": "product_version",
"name": "python3-yarl-1.3.0-150000.1.6.1.i586",
"product": {
"name": "python3-yarl-1.3.0-150000.1.6.1.i586",
"product_id": "python3-yarl-1.3.0-150000.1.6.1.i586"
}
},
{
"category": "product_version",
"name": "wire-0.5.0-150000.1.12.3.i586",
"product": {
"name": "wire-0.5.0-150000.1.12.3.i586",
"product_id": "wire-0.5.0-150000.1.12.3.i586"
}
}
],
"category": "architecture",
"name": "i586"
},
{
"branches": [
{
"category": "product_version",
"name": "bind-doc-9.16.6-150000.12.65.1.noarch",
"product": {
"name": "bind-doc-9.16.6-150000.12.65.1.noarch",
"product_id": "bind-doc-9.16.6-150000.12.65.1.noarch"
}
},
{
"category": "product_version",
"name": "dracut-saltboot-0.1.1681904360.84ef141-150000.1.50.1.noarch",
"product": {
"name": "dracut-saltboot-0.1.1681904360.84ef141-150000.1.50.1.noarch",
"product_id": "dracut-saltboot-0.1.1681904360.84ef141-150000.1.50.1.noarch"
}
},
{
"category": "product_version",
"name": "mgr-daemon-4.3.7-150000.1.41.1.noarch",
"product": {
"name": "mgr-daemon-4.3.7-150000.1.41.1.noarch",
"product_id": "mgr-daemon-4.3.7-150000.1.41.1.noarch"
}
},
{
"category": "product_version",
"name": "python2-zypp-plugin-spacewalk-1.0.14-150000.3.35.1.noarch",
"product": {
"name": "python2-zypp-plugin-spacewalk-1.0.14-150000.3.35.1.noarch",
"product_id": "python2-zypp-plugin-spacewalk-1.0.14-150000.3.35.1.noarch"
}
},
{
"category": "product_version",
"name": "python3-bind-9.16.6-150000.12.65.1.noarch",
"product": {
"name": "python3-bind-9.16.6-150000.12.65.1.noarch",
"product_id": "python3-bind-9.16.6-150000.12.65.1.noarch"
}
},
{
"category": "product_version",
"name": "python3-zypp-plugin-spacewalk-1.0.14-150000.3.35.1.noarch",
"product": {
"name": "python3-zypp-plugin-spacewalk-1.0.14-150000.3.35.1.noarch",
"product_id": "python3-zypp-plugin-spacewalk-1.0.14-150000.3.35.1.noarch"
}
},
{
"category": "product_version",
"name": "spacecmd-4.3.21-150000.3.98.1.noarch",
"product": {
"name": "spacecmd-4.3.21-150000.3.98.1.noarch",
"product_id": "spacecmd-4.3.21-150000.3.98.1.noarch"
}
},
{
"category": "product_version",
"name": "zypp-plugin-spacewalk-1.0.14-150000.3.35.1.noarch",
"product": {
"name": "zypp-plugin-spacewalk-1.0.14-150000.3.35.1.noarch",
"product_id": "zypp-plugin-spacewalk-1.0.14-150000.3.35.1.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "bind-9.16.6-150000.12.65.1.ppc64le",
"product": {
"name": "bind-9.16.6-150000.12.65.1.ppc64le",
"product_id": "bind-9.16.6-150000.12.65.1.ppc64le"
}
},
{
"category": "product_version",
"name": "bind-chrootenv-9.16.6-150000.12.65.1.ppc64le",
"product": {
"name": "bind-chrootenv-9.16.6-150000.12.65.1.ppc64le",
"product_id": "bind-chrootenv-9.16.6-150000.12.65.1.ppc64le"
}
},
{
"category": "product_version",
"name": "bind-devel-9.16.6-150000.12.65.1.ppc64le",
"product": {
"name": "bind-devel-9.16.6-150000.12.65.1.ppc64le",
"product_id": "bind-devel-9.16.6-150000.12.65.1.ppc64le"
}
},
{
"category": "product_version",
"name": "bind-utils-9.16.6-150000.12.65.1.ppc64le",
"product": {
"name": "bind-utils-9.16.6-150000.12.65.1.ppc64le",
"product_id": "bind-utils-9.16.6-150000.12.65.1.ppc64le"
}
},
{
"category": "product_version",
"name": "grafana-9.5.1-150000.1.48.5.ppc64le",
"product": {
"name": "grafana-9.5.1-150000.1.48.5.ppc64le",
"product_id": "grafana-9.5.1-150000.1.48.5.ppc64le"
}
},
{
"category": "product_version",
"name": "libbind9-1600-9.16.6-150000.12.65.1.ppc64le",
"product": {
"name": "libbind9-1600-9.16.6-150000.12.65.1.ppc64le",
"product_id": "libbind9-1600-9.16.6-150000.12.65.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libdns1605-9.16.6-150000.12.65.1.ppc64le",
"product": {
"name": "libdns1605-9.16.6-150000.12.65.1.ppc64le",
"product_id": "libdns1605-9.16.6-150000.12.65.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libirs-devel-9.16.6-150000.12.65.1.ppc64le",
"product": {
"name": "libirs-devel-9.16.6-150000.12.65.1.ppc64le",
"product_id": "libirs-devel-9.16.6-150000.12.65.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libirs1601-9.16.6-150000.12.65.1.ppc64le",
"product": {
"name": "libirs1601-9.16.6-150000.12.65.1.ppc64le",
"product_id": "libirs1601-9.16.6-150000.12.65.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libisc1606-9.16.6-150000.12.65.1.ppc64le",
"product": {
"name": "libisc1606-9.16.6-150000.12.65.1.ppc64le",
"product_id": "libisc1606-9.16.6-150000.12.65.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libisccc1600-9.16.6-150000.12.65.1.ppc64le",
"product": {
"name": "libisccc1600-9.16.6-150000.12.65.1.ppc64le",
"product_id": "libisccc1600-9.16.6-150000.12.65.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libisccfg1600-9.16.6-150000.12.65.1.ppc64le",
"product": {
"name": "libisccfg1600-9.16.6-150000.12.65.1.ppc64le",
"product_id": "libisccfg1600-9.16.6-150000.12.65.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libns1604-9.16.6-150000.12.65.1.ppc64le",
"product": {
"name": "libns1604-9.16.6-150000.12.65.1.ppc64le",
"product_id": "libns1604-9.16.6-150000.12.65.1.ppc64le"
}
},
{
"category": "product_version",
"name": "python2-uyuni-common-libs-4.3.8-150000.1.33.1.ppc64le",
"product": {
"name": "python2-uyuni-common-libs-4.3.8-150000.1.33.1.ppc64le",
"product_id": "python2-uyuni-common-libs-4.3.8-150000.1.33.1.ppc64le"
}
},
{
"category": "product_version",
"name": "python3-uyuni-common-libs-4.3.8-150000.1.33.1.ppc64le",
"product": {
"name": "python3-uyuni-common-libs-4.3.8-150000.1.33.1.ppc64le",
"product_id": "python3-uyuni-common-libs-4.3.8-150000.1.33.1.ppc64le"
}
},
{
"category": "product_version",
"name": "python3-yarl-1.3.0-150000.1.6.1.ppc64le",
"product": {
"name": "python3-yarl-1.3.0-150000.1.6.1.ppc64le",
"product_id": "python3-yarl-1.3.0-150000.1.6.1.ppc64le"
}
},
{
"category": "product_version",
"name": "wire-0.5.0-150000.1.12.3.ppc64le",
"product": {
"name": "wire-0.5.0-150000.1.12.3.ppc64le",
"product_id": "wire-0.5.0-150000.1.12.3.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "bind-9.16.6-150000.12.65.1.s390x",
"product": {
"name": "bind-9.16.6-150000.12.65.1.s390x",
"product_id": "bind-9.16.6-150000.12.65.1.s390x"
}
},
{
"category": "product_version",
"name": "bind-chrootenv-9.16.6-150000.12.65.1.s390x",
"product": {
"name": "bind-chrootenv-9.16.6-150000.12.65.1.s390x",
"product_id": "bind-chrootenv-9.16.6-150000.12.65.1.s390x"
}
},
{
"category": "product_version",
"name": "bind-devel-9.16.6-150000.12.65.1.s390x",
"product": {
"name": "bind-devel-9.16.6-150000.12.65.1.s390x",
"product_id": "bind-devel-9.16.6-150000.12.65.1.s390x"
}
},
{
"category": "product_version",
"name": "bind-utils-9.16.6-150000.12.65.1.s390x",
"product": {
"name": "bind-utils-9.16.6-150000.12.65.1.s390x",
"product_id": "bind-utils-9.16.6-150000.12.65.1.s390x"
}
},
{
"category": "product_version",
"name": "grafana-9.5.1-150000.1.48.5.s390x",
"product": {
"name": "grafana-9.5.1-150000.1.48.5.s390x",
"product_id": "grafana-9.5.1-150000.1.48.5.s390x"
}
},
{
"category": "product_version",
"name": "libbind9-1600-9.16.6-150000.12.65.1.s390x",
"product": {
"name": "libbind9-1600-9.16.6-150000.12.65.1.s390x",
"product_id": "libbind9-1600-9.16.6-150000.12.65.1.s390x"
}
},
{
"category": "product_version",
"name": "libdns1605-9.16.6-150000.12.65.1.s390x",
"product": {
"name": "libdns1605-9.16.6-150000.12.65.1.s390x",
"product_id": "libdns1605-9.16.6-150000.12.65.1.s390x"
}
},
{
"category": "product_version",
"name": "libirs-devel-9.16.6-150000.12.65.1.s390x",
"product": {
"name": "libirs-devel-9.16.6-150000.12.65.1.s390x",
"product_id": "libirs-devel-9.16.6-150000.12.65.1.s390x"
}
},
{
"category": "product_version",
"name": "libirs1601-9.16.6-150000.12.65.1.s390x",
"product": {
"name": "libirs1601-9.16.6-150000.12.65.1.s390x",
"product_id": "libirs1601-9.16.6-150000.12.65.1.s390x"
}
},
{
"category": "product_version",
"name": "libisc1606-9.16.6-150000.12.65.1.s390x",
"product": {
"name": "libisc1606-9.16.6-150000.12.65.1.s390x",
"product_id": "libisc1606-9.16.6-150000.12.65.1.s390x"
}
},
{
"category": "product_version",
"name": "libisccc1600-9.16.6-150000.12.65.1.s390x",
"product": {
"name": "libisccc1600-9.16.6-150000.12.65.1.s390x",
"product_id": "libisccc1600-9.16.6-150000.12.65.1.s390x"
}
},
{
"category": "product_version",
"name": "libisccfg1600-9.16.6-150000.12.65.1.s390x",
"product": {
"name": "libisccfg1600-9.16.6-150000.12.65.1.s390x",
"product_id": "libisccfg1600-9.16.6-150000.12.65.1.s390x"
}
},
{
"category": "product_version",
"name": "libns1604-9.16.6-150000.12.65.1.s390x",
"product": {
"name": "libns1604-9.16.6-150000.12.65.1.s390x",
"product_id": "libns1604-9.16.6-150000.12.65.1.s390x"
}
},
{
"category": "product_version",
"name": "python2-uyuni-common-libs-4.3.8-150000.1.33.1.s390x",
"product": {
"name": "python2-uyuni-common-libs-4.3.8-150000.1.33.1.s390x",
"product_id": "python2-uyuni-common-libs-4.3.8-150000.1.33.1.s390x"
}
},
{
"category": "product_version",
"name": "python3-uyuni-common-libs-4.3.8-150000.1.33.1.s390x",
"product": {
"name": "python3-uyuni-common-libs-4.3.8-150000.1.33.1.s390x",
"product_id": "python3-uyuni-common-libs-4.3.8-150000.1.33.1.s390x"
}
},
{
"category": "product_version",
"name": "python3-yarl-1.3.0-150000.1.6.1.s390x",
"product": {
"name": "python3-yarl-1.3.0-150000.1.6.1.s390x",
"product_id": "python3-yarl-1.3.0-150000.1.6.1.s390x"
}
},
{
"category": "product_version",
"name": "wire-0.5.0-150000.1.12.3.s390x",
"product": {
"name": "wire-0.5.0-150000.1.12.3.s390x",
"product_id": "wire-0.5.0-150000.1.12.3.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "bind-9.16.6-150000.12.65.1.x86_64",
"product": {
"name": "bind-9.16.6-150000.12.65.1.x86_64",
"product_id": "bind-9.16.6-150000.12.65.1.x86_64"
}
},
{
"category": "product_version",
"name": "bind-chrootenv-9.16.6-150000.12.65.1.x86_64",
"product": {
"name": "bind-chrootenv-9.16.6-150000.12.65.1.x86_64",
"product_id": "bind-chrootenv-9.16.6-150000.12.65.1.x86_64"
}
},
{
"category": "product_version",
"name": "bind-devel-9.16.6-150000.12.65.1.x86_64",
"product": {
"name": "bind-devel-9.16.6-150000.12.65.1.x86_64",
"product_id": "bind-devel-9.16.6-150000.12.65.1.x86_64"
}
},
{
"category": "product_version",
"name": "bind-devel-32bit-9.16.6-150000.12.65.1.x86_64",
"product": {
"name": "bind-devel-32bit-9.16.6-150000.12.65.1.x86_64",
"product_id": "bind-devel-32bit-9.16.6-150000.12.65.1.x86_64"
}
},
{
"category": "product_version",
"name": "bind-utils-9.16.6-150000.12.65.1.x86_64",
"product": {
"name": "bind-utils-9.16.6-150000.12.65.1.x86_64",
"product_id": "bind-utils-9.16.6-150000.12.65.1.x86_64"
}
},
{
"category": "product_version",
"name": "grafana-9.5.1-150000.1.48.5.x86_64",
"product": {
"name": "grafana-9.5.1-150000.1.48.5.x86_64",
"product_id": "grafana-9.5.1-150000.1.48.5.x86_64"
}
},
{
"category": "product_version",
"name": "libbind9-1600-9.16.6-150000.12.65.1.x86_64",
"product": {
"name": "libbind9-1600-9.16.6-150000.12.65.1.x86_64",
"product_id": "libbind9-1600-9.16.6-150000.12.65.1.x86_64"
}
},
{
"category": "product_version",
"name": "libbind9-1600-32bit-9.16.6-150000.12.65.1.x86_64",
"product": {
"name": "libbind9-1600-32bit-9.16.6-150000.12.65.1.x86_64",
"product_id": "libbind9-1600-32bit-9.16.6-150000.12.65.1.x86_64"
}
},
{
"category": "product_version",
"name": "libdns1605-9.16.6-150000.12.65.1.x86_64",
"product": {
"name": "libdns1605-9.16.6-150000.12.65.1.x86_64",
"product_id": "libdns1605-9.16.6-150000.12.65.1.x86_64"
}
},
{
"category": "product_version",
"name": "libdns1605-32bit-9.16.6-150000.12.65.1.x86_64",
"product": {
"name": "libdns1605-32bit-9.16.6-150000.12.65.1.x86_64",
"product_id": "libdns1605-32bit-9.16.6-150000.12.65.1.x86_64"
}
},
{
"category": "product_version",
"name": "libirs-devel-9.16.6-150000.12.65.1.x86_64",
"product": {
"name": "libirs-devel-9.16.6-150000.12.65.1.x86_64",
"product_id": "libirs-devel-9.16.6-150000.12.65.1.x86_64"
}
},
{
"category": "product_version",
"name": "libirs1601-9.16.6-150000.12.65.1.x86_64",
"product": {
"name": "libirs1601-9.16.6-150000.12.65.1.x86_64",
"product_id": "libirs1601-9.16.6-150000.12.65.1.x86_64"
}
},
{
"category": "product_version",
"name": "libirs1601-32bit-9.16.6-150000.12.65.1.x86_64",
"product": {
"name": "libirs1601-32bit-9.16.6-150000.12.65.1.x86_64",
"product_id": "libirs1601-32bit-9.16.6-150000.12.65.1.x86_64"
}
},
{
"category": "product_version",
"name": "libisc1606-9.16.6-150000.12.65.1.x86_64",
"product": {
"name": "libisc1606-9.16.6-150000.12.65.1.x86_64",
"product_id": "libisc1606-9.16.6-150000.12.65.1.x86_64"
}
},
{
"category": "product_version",
"name": "libisc1606-32bit-9.16.6-150000.12.65.1.x86_64",
"product": {
"name": "libisc1606-32bit-9.16.6-150000.12.65.1.x86_64",
"product_id": "libisc1606-32bit-9.16.6-150000.12.65.1.x86_64"
}
},
{
"category": "product_version",
"name": "libisccc1600-9.16.6-150000.12.65.1.x86_64",
"product": {
"name": "libisccc1600-9.16.6-150000.12.65.1.x86_64",
"product_id": "libisccc1600-9.16.6-150000.12.65.1.x86_64"
}
},
{
"category": "product_version",
"name": "libisccc1600-32bit-9.16.6-150000.12.65.1.x86_64",
"product": {
"name": "libisccc1600-32bit-9.16.6-150000.12.65.1.x86_64",
"product_id": "libisccc1600-32bit-9.16.6-150000.12.65.1.x86_64"
}
},
{
"category": "product_version",
"name": "libisccfg1600-9.16.6-150000.12.65.1.x86_64",
"product": {
"name": "libisccfg1600-9.16.6-150000.12.65.1.x86_64",
"product_id": "libisccfg1600-9.16.6-150000.12.65.1.x86_64"
}
},
{
"category": "product_version",
"name": "libisccfg1600-32bit-9.16.6-150000.12.65.1.x86_64",
"product": {
"name": "libisccfg1600-32bit-9.16.6-150000.12.65.1.x86_64",
"product_id": "libisccfg1600-32bit-9.16.6-150000.12.65.1.x86_64"
}
},
{
"category": "product_version",
"name": "libns1604-9.16.6-150000.12.65.1.x86_64",
"product": {
"name": "libns1604-9.16.6-150000.12.65.1.x86_64",
"product_id": "libns1604-9.16.6-150000.12.65.1.x86_64"
}
},
{
"category": "product_version",
"name": "libns1604-32bit-9.16.6-150000.12.65.1.x86_64",
"product": {
"name": "libns1604-32bit-9.16.6-150000.12.65.1.x86_64",
"product_id": "libns1604-32bit-9.16.6-150000.12.65.1.x86_64"
}
},
{
"category": "product_version",
"name": "python2-uyuni-common-libs-4.3.8-150000.1.33.1.x86_64",
"product": {
"name": "python2-uyuni-common-libs-4.3.8-150000.1.33.1.x86_64",
"product_id": "python2-uyuni-common-libs-4.3.8-150000.1.33.1.x86_64"
}
},
{
"category": "product_version",
"name": "python3-uyuni-common-libs-4.3.8-150000.1.33.1.x86_64",
"product": {
"name": "python3-uyuni-common-libs-4.3.8-150000.1.33.1.x86_64",
"product_id": "python3-uyuni-common-libs-4.3.8-150000.1.33.1.x86_64"
}
},
{
"category": "product_version",
"name": "python3-yarl-1.3.0-150000.1.6.1.x86_64",
"product": {
"name": "python3-yarl-1.3.0-150000.1.6.1.x86_64",
"product_id": "python3-yarl-1.3.0-150000.1.6.1.x86_64"
}
},
{
"category": "product_version",
"name": "wire-0.5.0-150000.1.12.3.x86_64",
"product": {
"name": "wire-0.5.0-150000.1.12.3.x86_64",
"product_id": "wire-0.5.0-150000.1.12.3.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Manager Client Tools 15",
"product": {
"name": "SUSE Manager Client Tools 15",
"product_id": "SUSE Manager Client Tools 15"
}
},
{
"category": "product_name",
"name": "SUSE Manager Client Tools for SLE Micro 5",
"product": {
"name": "SUSE Manager Client Tools for SLE Micro 5",
"product_id": "SUSE Manager Client Tools for SLE Micro 5",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-manager-tools-micro:5"
}
}
},
{
"category": "product_name",
"name": "SUSE Manager Proxy Module 4.2",
"product": {
"name": "SUSE Manager Proxy Module 4.2",
"product_id": "SUSE Manager Proxy Module 4.2",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-suse-manager-proxy:4.2"
}
}
},
{
"category": "product_name",
"name": "SUSE Manager Proxy Module 4.3",
"product": {
"name": "SUSE Manager Proxy Module 4.3",
"product_id": "SUSE Manager Proxy Module 4.3",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-suse-manager-proxy:4.3"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle_hpc-ltss:15:sp1"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle_hpc-ltss:15:sp2"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 15 SP1-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles-ltss:15:sp1"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 15 SP2-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles-ltss:15:sp2"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP Applications 15 SP1",
"product": {
"name": "SUSE Linux Enterprise Server for SAP Applications 15 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP1",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles_sap:15:sp1"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP Applications 15 SP2",
"product": {
"name": "SUSE Linux Enterprise Server for SAP Applications 15 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles_sap:15:sp2"
}
}
},
{
"category": "product_name",
"name": "SUSE Enterprise Storage 7",
"product": {
"name": "SUSE Enterprise Storage 7",
"product_id": "SUSE Enterprise Storage 7",
"product_identification_helper": {
"cpe": "cpe:/o:suse:ses:7"
}
}
},
{
"category": "product_name",
"name": "openSUSE Leap 15.4",
"product": {
"name": "openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:leap:15.4"
}
}
},
{
"category": "product_name",
"name": "openSUSE Leap 15.5",
"product": {
"name": "openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:leap:15.5"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-saltboot-0.1.1681904360.84ef141-150000.1.50.1.noarch as component of SUSE Manager Client Tools 15",
"product_id": "SUSE Manager Client Tools 15:dracut-saltboot-0.1.1681904360.84ef141-150000.1.50.1.noarch"
},
"product_reference": "dracut-saltboot-0.1.1681904360.84ef141-150000.1.50.1.noarch",
"relates_to_product_reference": "SUSE Manager Client Tools 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "grafana-9.5.1-150000.1.48.5.aarch64 as component of SUSE Manager Client Tools 15",
"product_id": "SUSE Manager Client Tools 15:grafana-9.5.1-150000.1.48.5.aarch64"
},
"product_reference": "grafana-9.5.1-150000.1.48.5.aarch64",
"relates_to_product_reference": "SUSE Manager Client Tools 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "grafana-9.5.1-150000.1.48.5.ppc64le as component of SUSE Manager Client Tools 15",
"product_id": "SUSE Manager Client Tools 15:grafana-9.5.1-150000.1.48.5.ppc64le"
},
"product_reference": "grafana-9.5.1-150000.1.48.5.ppc64le",
"relates_to_product_reference": "SUSE Manager Client Tools 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "grafana-9.5.1-150000.1.48.5.s390x as component of SUSE Manager Client Tools 15",
"product_id": "SUSE Manager Client Tools 15:grafana-9.5.1-150000.1.48.5.s390x"
},
"product_reference": "grafana-9.5.1-150000.1.48.5.s390x",
"relates_to_product_reference": "SUSE Manager Client Tools 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "grafana-9.5.1-150000.1.48.5.x86_64 as component of SUSE Manager Client Tools 15",
"product_id": "SUSE Manager Client Tools 15:grafana-9.5.1-150000.1.48.5.x86_64"
},
"product_reference": "grafana-9.5.1-150000.1.48.5.x86_64",
"relates_to_product_reference": "SUSE Manager Client Tools 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mgr-daemon-4.3.7-150000.1.41.1.noarch as component of SUSE Manager Client Tools 15",
"product_id": "SUSE Manager Client Tools 15:mgr-daemon-4.3.7-150000.1.41.1.noarch"
},
"product_reference": "mgr-daemon-4.3.7-150000.1.41.1.noarch",
"relates_to_product_reference": "SUSE Manager Client Tools 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-uyuni-common-libs-4.3.8-150000.1.33.1.aarch64 as component of SUSE Manager Client Tools 15",
"product_id": "SUSE Manager Client Tools 15:python3-uyuni-common-libs-4.3.8-150000.1.33.1.aarch64"
},
"product_reference": "python3-uyuni-common-libs-4.3.8-150000.1.33.1.aarch64",
"relates_to_product_reference": "SUSE Manager Client Tools 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-uyuni-common-libs-4.3.8-150000.1.33.1.ppc64le as component of SUSE Manager Client Tools 15",
"product_id": "SUSE Manager Client Tools 15:python3-uyuni-common-libs-4.3.8-150000.1.33.1.ppc64le"
},
"product_reference": "python3-uyuni-common-libs-4.3.8-150000.1.33.1.ppc64le",
"relates_to_product_reference": "SUSE Manager Client Tools 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-uyuni-common-libs-4.3.8-150000.1.33.1.s390x as component of SUSE Manager Client Tools 15",
"product_id": "SUSE Manager Client Tools 15:python3-uyuni-common-libs-4.3.8-150000.1.33.1.s390x"
},
"product_reference": "python3-uyuni-common-libs-4.3.8-150000.1.33.1.s390x",
"relates_to_product_reference": "SUSE Manager Client Tools 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-uyuni-common-libs-4.3.8-150000.1.33.1.x86_64 as component of SUSE Manager Client Tools 15",
"product_id": "SUSE Manager Client Tools 15:python3-uyuni-common-libs-4.3.8-150000.1.33.1.x86_64"
},
"product_reference": "python3-uyuni-common-libs-4.3.8-150000.1.33.1.x86_64",
"relates_to_product_reference": "SUSE Manager Client Tools 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-zypp-plugin-spacewalk-1.0.14-150000.3.35.1.noarch as component of SUSE Manager Client Tools 15",
"product_id": "SUSE Manager Client Tools 15:python3-zypp-plugin-spacewalk-1.0.14-150000.3.35.1.noarch"
},
"product_reference": "python3-zypp-plugin-spacewalk-1.0.14-150000.3.35.1.noarch",
"relates_to_product_reference": "SUSE Manager Client Tools 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "spacecmd-4.3.21-150000.3.98.1.noarch as component of SUSE Manager Client Tools 15",
"product_id": "SUSE Manager Client Tools 15:spacecmd-4.3.21-150000.3.98.1.noarch"
},
"product_reference": "spacecmd-4.3.21-150000.3.98.1.noarch",
"relates_to_product_reference": "SUSE Manager Client Tools 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "zypp-plugin-spacewalk-1.0.14-150000.3.35.1.noarch as component of SUSE Manager Client Tools 15",
"product_id": "SUSE Manager Client Tools 15:zypp-plugin-spacewalk-1.0.14-150000.3.35.1.noarch"
},
"product_reference": "zypp-plugin-spacewalk-1.0.14-150000.3.35.1.noarch",
"relates_to_product_reference": "SUSE Manager Client Tools 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-utils-9.16.6-150000.12.65.1.aarch64 as component of SUSE Manager Client Tools for SLE Micro 5",
"product_id": "SUSE Manager Client Tools for SLE Micro 5:bind-utils-9.16.6-150000.12.65.1.aarch64"
},
"product_reference": "bind-utils-9.16.6-150000.12.65.1.aarch64",
"relates_to_product_reference": "SUSE Manager Client Tools for SLE Micro 5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-utils-9.16.6-150000.12.65.1.s390x as component of SUSE Manager Client Tools for SLE Micro 5",
"product_id": "SUSE Manager Client Tools for SLE Micro 5:bind-utils-9.16.6-150000.12.65.1.s390x"
},
"product_reference": "bind-utils-9.16.6-150000.12.65.1.s390x",
"relates_to_product_reference": "SUSE Manager Client Tools for SLE Micro 5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-utils-9.16.6-150000.12.65.1.x86_64 as component of SUSE Manager Client Tools for SLE Micro 5",
"product_id": "SUSE Manager Client Tools for SLE Micro 5:bind-utils-9.16.6-150000.12.65.1.x86_64"
},
"product_reference": "bind-utils-9.16.6-150000.12.65.1.x86_64",
"relates_to_product_reference": "SUSE Manager Client Tools for SLE Micro 5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-saltboot-0.1.1681904360.84ef141-150000.1.50.1.noarch as component of SUSE Manager Client Tools for SLE Micro 5",
"product_id": "SUSE Manager Client Tools for SLE Micro 5:dracut-saltboot-0.1.1681904360.84ef141-150000.1.50.1.noarch"
},
"product_reference": "dracut-saltboot-0.1.1681904360.84ef141-150000.1.50.1.noarch",
"relates_to_product_reference": "SUSE Manager Client Tools for SLE Micro 5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libbind9-1600-9.16.6-150000.12.65.1.aarch64 as component of SUSE Manager Client Tools for SLE Micro 5",
"product_id": "SUSE Manager Client Tools for SLE Micro 5:libbind9-1600-9.16.6-150000.12.65.1.aarch64"
},
"product_reference": "libbind9-1600-9.16.6-150000.12.65.1.aarch64",
"relates_to_product_reference": "SUSE Manager Client Tools for SLE Micro 5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libbind9-1600-9.16.6-150000.12.65.1.s390x as component of SUSE Manager Client Tools for SLE Micro 5",
"product_id": "SUSE Manager Client Tools for SLE Micro 5:libbind9-1600-9.16.6-150000.12.65.1.s390x"
},
"product_reference": "libbind9-1600-9.16.6-150000.12.65.1.s390x",
"relates_to_product_reference": "SUSE Manager Client Tools for SLE Micro 5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libbind9-1600-9.16.6-150000.12.65.1.x86_64 as component of SUSE Manager Client Tools for SLE Micro 5",
"product_id": "SUSE Manager Client Tools for SLE Micro 5:libbind9-1600-9.16.6-150000.12.65.1.x86_64"
},
"product_reference": "libbind9-1600-9.16.6-150000.12.65.1.x86_64",
"relates_to_product_reference": "SUSE Manager Client Tools for SLE Micro 5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libbind9-1600-64bit-9.16.6-150000.12.65.1.aarch64_ilp32 as component of SUSE Manager Client Tools for SLE Micro 5",
"product_id": "SUSE Manager Client Tools for SLE Micro 5:libbind9-1600-64bit-9.16.6-150000.12.65.1.aarch64_ilp32"
},
"product_reference": "libbind9-1600-64bit-9.16.6-150000.12.65.1.aarch64_ilp32",
"relates_to_product_reference": "SUSE Manager Client Tools for SLE Micro 5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libdns1605-9.16.6-150000.12.65.1.aarch64 as component of SUSE Manager Client Tools for SLE Micro 5",
"product_id": "SUSE Manager Client Tools for SLE Micro 5:libdns1605-9.16.6-150000.12.65.1.aarch64"
},
"product_reference": "libdns1605-9.16.6-150000.12.65.1.aarch64",
"relates_to_product_reference": "SUSE Manager Client Tools for SLE Micro 5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libdns1605-9.16.6-150000.12.65.1.s390x as component of SUSE Manager Client Tools for SLE Micro 5",
"product_id": "SUSE Manager Client Tools for SLE Micro 5:libdns1605-9.16.6-150000.12.65.1.s390x"
},
"product_reference": "libdns1605-9.16.6-150000.12.65.1.s390x",
"relates_to_product_reference": "SUSE Manager Client Tools for SLE Micro 5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libdns1605-9.16.6-150000.12.65.1.x86_64 as component of SUSE Manager Client Tools for SLE Micro 5",
"product_id": "SUSE Manager Client Tools for SLE Micro 5:libdns1605-9.16.6-150000.12.65.1.x86_64"
},
"product_reference": "libdns1605-9.16.6-150000.12.65.1.x86_64",
"relates_to_product_reference": "SUSE Manager Client Tools for SLE Micro 5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libdns1605-64bit-9.16.6-150000.12.65.1.aarch64_ilp32 as component of SUSE Manager Client Tools for SLE Micro 5",
"product_id": "SUSE Manager Client Tools for SLE Micro 5:libdns1605-64bit-9.16.6-150000.12.65.1.aarch64_ilp32"
},
"product_reference": "libdns1605-64bit-9.16.6-150000.12.65.1.aarch64_ilp32",
"relates_to_product_reference": "SUSE Manager Client Tools for SLE Micro 5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libirs1601-9.16.6-150000.12.65.1.aarch64 as component of SUSE Manager Client Tools for SLE Micro 5",
"product_id": "SUSE Manager Client Tools for SLE Micro 5:libirs1601-9.16.6-150000.12.65.1.aarch64"
},
"product_reference": "libirs1601-9.16.6-150000.12.65.1.aarch64",
"relates_to_product_reference": "SUSE Manager Client Tools for SLE Micro 5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libirs1601-9.16.6-150000.12.65.1.s390x as component of SUSE Manager Client Tools for SLE Micro 5",
"product_id": "SUSE Manager Client Tools for SLE Micro 5:libirs1601-9.16.6-150000.12.65.1.s390x"
},
"product_reference": "libirs1601-9.16.6-150000.12.65.1.s390x",
"relates_to_product_reference": "SUSE Manager Client Tools for SLE Micro 5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libirs1601-9.16.6-150000.12.65.1.x86_64 as component of SUSE Manager Client Tools for SLE Micro 5",
"product_id": "SUSE Manager Client Tools for SLE Micro 5:libirs1601-9.16.6-150000.12.65.1.x86_64"
},
"product_reference": "libirs1601-9.16.6-150000.12.65.1.x86_64",
"relates_to_product_reference": "SUSE Manager Client Tools for SLE Micro 5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libirs1601-64bit-9.16.6-150000.12.65.1.aarch64_ilp32 as component of SUSE Manager Client Tools for SLE Micro 5",
"product_id": "SUSE Manager Client Tools for SLE Micro 5:libirs1601-64bit-9.16.6-150000.12.65.1.aarch64_ilp32"
},
"product_reference": "libirs1601-64bit-9.16.6-150000.12.65.1.aarch64_ilp32",
"relates_to_product_reference": "SUSE Manager Client Tools for SLE Micro 5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libisc1606-9.16.6-150000.12.65.1.aarch64 as component of SUSE Manager Client Tools for SLE Micro 5",
"product_id": "SUSE Manager Client Tools for SLE Micro 5:libisc1606-9.16.6-150000.12.65.1.aarch64"
},
"product_reference": "libisc1606-9.16.6-150000.12.65.1.aarch64",
"relates_to_product_reference": "SUSE Manager Client Tools for SLE Micro 5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libisc1606-9.16.6-150000.12.65.1.s390x as component of SUSE Manager Client Tools for SLE Micro 5",
"product_id": "SUSE Manager Client Tools for SLE Micro 5:libisc1606-9.16.6-150000.12.65.1.s390x"
},
"product_reference": "libisc1606-9.16.6-150000.12.65.1.s390x",
"relates_to_product_reference": "SUSE Manager Client Tools for SLE Micro 5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libisc1606-9.16.6-150000.12.65.1.x86_64 as component of SUSE Manager Client Tools for SLE Micro 5",
"product_id": "SUSE Manager Client Tools for SLE Micro 5:libisc1606-9.16.6-150000.12.65.1.x86_64"
},
"product_reference": "libisc1606-9.16.6-150000.12.65.1.x86_64",
"relates_to_product_reference": "SUSE Manager Client Tools for SLE Micro 5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libisc1606-64bit-9.16.6-150000.12.65.1.aarch64_ilp32 as component of SUSE Manager Client Tools for SLE Micro 5",
"product_id": "SUSE Manager Client Tools for SLE Micro 5:libisc1606-64bit-9.16.6-150000.12.65.1.aarch64_ilp32"
},
"product_reference": "libisc1606-64bit-9.16.6-150000.12.65.1.aarch64_ilp32",
"relates_to_product_reference": "SUSE Manager Client Tools for SLE Micro 5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libisccc1600-9.16.6-150000.12.65.1.aarch64 as component of SUSE Manager Client Tools for SLE Micro 5",
"product_id": "SUSE Manager Client Tools for SLE Micro 5:libisccc1600-9.16.6-150000.12.65.1.aarch64"
},
"product_reference": "libisccc1600-9.16.6-150000.12.65.1.aarch64",
"relates_to_product_reference": "SUSE Manager Client Tools for SLE Micro 5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libisccc1600-9.16.6-150000.12.65.1.s390x as component of SUSE Manager Client Tools for SLE Micro 5",
"product_id": "SUSE Manager Client Tools for SLE Micro 5:libisccc1600-9.16.6-150000.12.65.1.s390x"
},
"product_reference": "libisccc1600-9.16.6-150000.12.65.1.s390x",
"relates_to_product_reference": "SUSE Manager Client Tools for SLE Micro 5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libisccc1600-9.16.6-150000.12.65.1.x86_64 as component of SUSE Manager Client Tools for SLE Micro 5",
"product_id": "SUSE Manager Client Tools for SLE Micro 5:libisccc1600-9.16.6-150000.12.65.1.x86_64"
},
"product_reference": "libisccc1600-9.16.6-150000.12.65.1.x86_64",
"relates_to_product_reference": "SUSE Manager Client Tools for SLE Micro 5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libisccc1600-64bit-9.16.6-150000.12.65.1.aarch64_ilp32 as component of SUSE Manager Client Tools for SLE Micro 5",
"product_id": "SUSE Manager Client Tools for SLE Micro 5:libisccc1600-64bit-9.16.6-150000.12.65.1.aarch64_ilp32"
},
"product_reference": "libisccc1600-64bit-9.16.6-150000.12.65.1.aarch64_ilp32",
"relates_to_product_reference": "SUSE Manager Client Tools for SLE Micro 5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libisccfg1600-9.16.6-150000.12.65.1.aarch64 as component of SUSE Manager Client Tools for SLE Micro 5",
"product_id": "SUSE Manager Client Tools for SLE Micro 5:libisccfg1600-9.16.6-150000.12.65.1.aarch64"
},
"product_reference": "libisccfg1600-9.16.6-150000.12.65.1.aarch64",
"relates_to_product_reference": "SUSE Manager Client Tools for SLE Micro 5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libisccfg1600-9.16.6-150000.12.65.1.s390x as component of SUSE Manager Client Tools for SLE Micro 5",
"product_id": "SUSE Manager Client Tools for SLE Micro 5:libisccfg1600-9.16.6-150000.12.65.1.s390x"
},
"product_reference": "libisccfg1600-9.16.6-150000.12.65.1.s390x",
"relates_to_product_reference": "SUSE Manager Client Tools for SLE Micro 5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libisccfg1600-9.16.6-150000.12.65.1.x86_64 as component of SUSE Manager Client Tools for SLE Micro 5",
"product_id": "SUSE Manager Client Tools for SLE Micro 5:libisccfg1600-9.16.6-150000.12.65.1.x86_64"
},
"product_reference": "libisccfg1600-9.16.6-150000.12.65.1.x86_64",
"relates_to_product_reference": "SUSE Manager Client Tools for SLE Micro 5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libisccfg1600-64bit-9.16.6-150000.12.65.1.aarch64_ilp32 as component of SUSE Manager Client Tools for SLE Micro 5",
"product_id": "SUSE Manager Client Tools for SLE Micro 5:libisccfg1600-64bit-9.16.6-150000.12.65.1.aarch64_ilp32"
},
"product_reference": "libisccfg1600-64bit-9.16.6-150000.12.65.1.aarch64_ilp32",
"relates_to_product_reference": "SUSE Manager Client Tools for SLE Micro 5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libns1604-9.16.6-150000.12.65.1.s390x as component of SUSE Manager Client Tools for SLE Micro 5",
"product_id": "SUSE Manager Client Tools for SLE Micro 5:libns1604-9.16.6-150000.12.65.1.s390x"
},
"product_reference": "libns1604-9.16.6-150000.12.65.1.s390x",
"relates_to_product_reference": "SUSE Manager Client Tools for SLE Micro 5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libns1604-9.16.6-150000.12.65.1.x86_64 as component of SUSE Manager Client Tools for SLE Micro 5",
"product_id": "SUSE Manager Client Tools for SLE Micro 5:libns1604-9.16.6-150000.12.65.1.x86_64"
},
"product_reference": "libns1604-9.16.6-150000.12.65.1.x86_64",
"relates_to_product_reference": "SUSE Manager Client Tools for SLE Micro 5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-bind-9.16.6-150000.12.65.1.noarch as component of SUSE Manager Client Tools for SLE Micro 5",
"product_id": "SUSE Manager Client Tools for SLE Micro 5:python3-bind-9.16.6-150000.12.65.1.noarch"
},
"product_reference": "python3-bind-9.16.6-150000.12.65.1.noarch",
"relates_to_product_reference": "SUSE Manager Client Tools for SLE Micro 5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-zypp-plugin-spacewalk-1.0.14-150000.3.35.1.noarch as component of SUSE Manager Proxy Module 4.2",
"product_id": "SUSE Manager Proxy Module 4.2:python3-zypp-plugin-spacewalk-1.0.14-150000.3.35.1.noarch"
},
"product_reference": "python3-zypp-plugin-spacewalk-1.0.14-150000.3.35.1.noarch",
"relates_to_product_reference": "SUSE Manager Proxy Module 4.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "zypp-plugin-spacewalk-1.0.14-150000.3.35.1.noarch as component of SUSE Manager Proxy Module 4.2",
"product_id": "SUSE Manager Proxy Module 4.2:zypp-plugin-spacewalk-1.0.14-150000.3.35.1.noarch"
},
"product_reference": "zypp-plugin-spacewalk-1.0.14-150000.3.35.1.noarch",
"relates_to_product_reference": "SUSE Manager Proxy Module 4.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-zypp-plugin-spacewalk-1.0.14-150000.3.35.1.noarch as component of SUSE Manager Proxy Module 4.3",
"product_id": "SUSE Manager Proxy Module 4.3:python3-zypp-plugin-spacewalk-1.0.14-150000.3.35.1.noarch"
},
"product_reference": "python3-zypp-plugin-spacewalk-1.0.14-150000.3.35.1.noarch",
"relates_to_product_reference": "SUSE Manager Proxy Module 4.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "zypp-plugin-spacewalk-1.0.14-150000.3.35.1.noarch as component of SUSE Manager Proxy Module 4.3",
"product_id": "SUSE Manager Proxy Module 4.3:zypp-plugin-spacewalk-1.0.14-150000.3.35.1.noarch"
},
"product_reference": "zypp-plugin-spacewalk-1.0.14-150000.3.35.1.noarch",
"relates_to_product_reference": "SUSE Manager Proxy Module 4.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-9.16.6-150000.12.65.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:bind-9.16.6-150000.12.65.1.aarch64"
},
"product_reference": "bind-9.16.6-150000.12.65.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-9.16.6-150000.12.65.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:bind-9.16.6-150000.12.65.1.x86_64"
},
"product_reference": "bind-9.16.6-150000.12.65.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-chrootenv-9.16.6-150000.12.65.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:bind-chrootenv-9.16.6-150000.12.65.1.aarch64"
},
"product_reference": "bind-chrootenv-9.16.6-150000.12.65.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-chrootenv-9.16.6-150000.12.65.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:bind-chrootenv-9.16.6-150000.12.65.1.x86_64"
},
"product_reference": "bind-chrootenv-9.16.6-150000.12.65.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-devel-9.16.6-150000.12.65.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:bind-devel-9.16.6-150000.12.65.1.aarch64"
},
"product_reference": "bind-devel-9.16.6-150000.12.65.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-devel-9.16.6-150000.12.65.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:bind-devel-9.16.6-150000.12.65.1.x86_64"
},
"product_reference": "bind-devel-9.16.6-150000.12.65.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-doc-9.16.6-150000.12.65.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:bind-doc-9.16.6-150000.12.65.1.noarch"
},
"product_reference": "bind-doc-9.16.6-150000.12.65.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-utils-9.16.6-150000.12.65.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:bind-utils-9.16.6-150000.12.65.1.aarch64"
},
"product_reference": "bind-utils-9.16.6-150000.12.65.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-utils-9.16.6-150000.12.65.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:bind-utils-9.16.6-150000.12.65.1.x86_64"
},
"product_reference": "bind-utils-9.16.6-150000.12.65.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libbind9-1600-9.16.6-150000.12.65.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libbind9-1600-9.16.6-150000.12.65.1.aarch64"
},
"product_reference": "libbind9-1600-9.16.6-150000.12.65.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libbind9-1600-9.16.6-150000.12.65.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libbind9-1600-9.16.6-150000.12.65.1.x86_64"
},
"product_reference": "libbind9-1600-9.16.6-150000.12.65.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libdns1605-9.16.6-150000.12.65.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libdns1605-9.16.6-150000.12.65.1.aarch64"
},
"product_reference": "libdns1605-9.16.6-150000.12.65.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libdns1605-9.16.6-150000.12.65.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libdns1605-9.16.6-150000.12.65.1.x86_64"
},
"product_reference": "libdns1605-9.16.6-150000.12.65.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libirs-devel-9.16.6-150000.12.65.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libirs-devel-9.16.6-150000.12.65.1.aarch64"
},
"product_reference": "libirs-devel-9.16.6-150000.12.65.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libirs-devel-9.16.6-150000.12.65.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libirs-devel-9.16.6-150000.12.65.1.x86_64"
},
"product_reference": "libirs-devel-9.16.6-150000.12.65.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libirs1601-9.16.6-150000.12.65.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libirs1601-9.16.6-150000.12.65.1.aarch64"
},
"product_reference": "libirs1601-9.16.6-150000.12.65.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libirs1601-9.16.6-150000.12.65.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libirs1601-9.16.6-150000.12.65.1.x86_64"
},
"product_reference": "libirs1601-9.16.6-150000.12.65.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libisc1606-9.16.6-150000.12.65.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libisc1606-9.16.6-150000.12.65.1.aarch64"
},
"product_reference": "libisc1606-9.16.6-150000.12.65.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libisc1606-9.16.6-150000.12.65.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libisc1606-9.16.6-150000.12.65.1.x86_64"
},
"product_reference": "libisc1606-9.16.6-150000.12.65.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libisccc1600-9.16.6-150000.12.65.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libisccc1600-9.16.6-150000.12.65.1.aarch64"
},
"product_reference": "libisccc1600-9.16.6-150000.12.65.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libisccc1600-9.16.6-150000.12.65.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libisccc1600-9.16.6-150000.12.65.1.x86_64"
},
"product_reference": "libisccc1600-9.16.6-150000.12.65.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libisccfg1600-9.16.6-150000.12.65.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libisccfg1600-9.16.6-150000.12.65.1.aarch64"
},
"product_reference": "libisccfg1600-9.16.6-150000.12.65.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libisccfg1600-9.16.6-150000.12.65.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libisccfg1600-9.16.6-150000.12.65.1.x86_64"
},
"product_reference": "libisccfg1600-9.16.6-150000.12.65.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libns1604-9.16.6-150000.12.65.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libns1604-9.16.6-150000.12.65.1.aarch64"
},
"product_reference": "libns1604-9.16.6-150000.12.65.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libns1604-9.16.6-150000.12.65.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libns1604-9.16.6-150000.12.65.1.x86_64"
},
"product_reference": "libns1604-9.16.6-150000.12.65.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-bind-9.16.6-150000.12.65.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:python3-bind-9.16.6-150000.12.65.1.noarch"
},
"product_reference": "python3-bind-9.16.6-150000.12.65.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-9.16.6-150000.12.65.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:bind-9.16.6-150000.12.65.1.aarch64"
},
"product_reference": "bind-9.16.6-150000.12.65.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-9.16.6-150000.12.65.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:bind-9.16.6-150000.12.65.1.x86_64"
},
"product_reference": "bind-9.16.6-150000.12.65.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-chrootenv-9.16.6-150000.12.65.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:bind-chrootenv-9.16.6-150000.12.65.1.aarch64"
},
"product_reference": "bind-chrootenv-9.16.6-150000.12.65.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-chrootenv-9.16.6-150000.12.65.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:bind-chrootenv-9.16.6-150000.12.65.1.x86_64"
},
"product_reference": "bind-chrootenv-9.16.6-150000.12.65.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-devel-9.16.6-150000.12.65.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:bind-devel-9.16.6-150000.12.65.1.aarch64"
},
"product_reference": "bind-devel-9.16.6-150000.12.65.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-devel-9.16.6-150000.12.65.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:bind-devel-9.16.6-150000.12.65.1.x86_64"
},
"product_reference": "bind-devel-9.16.6-150000.12.65.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-doc-9.16.6-150000.12.65.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:bind-doc-9.16.6-150000.12.65.1.noarch"
},
"product_reference": "bind-doc-9.16.6-150000.12.65.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-utils-9.16.6-150000.12.65.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:bind-utils-9.16.6-150000.12.65.1.aarch64"
},
"product_reference": "bind-utils-9.16.6-150000.12.65.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-utils-9.16.6-150000.12.65.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:bind-utils-9.16.6-150000.12.65.1.x86_64"
},
"product_reference": "bind-utils-9.16.6-150000.12.65.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libbind9-1600-9.16.6-150000.12.65.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libbind9-1600-9.16.6-150000.12.65.1.aarch64"
},
"product_reference": "libbind9-1600-9.16.6-150000.12.65.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libbind9-1600-9.16.6-150000.12.65.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libbind9-1600-9.16.6-150000.12.65.1.x86_64"
},
"product_reference": "libbind9-1600-9.16.6-150000.12.65.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libdns1605-9.16.6-150000.12.65.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libdns1605-9.16.6-150000.12.65.1.aarch64"
},
"product_reference": "libdns1605-9.16.6-150000.12.65.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libdns1605-9.16.6-150000.12.65.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libdns1605-9.16.6-150000.12.65.1.x86_64"
},
"product_reference": "libdns1605-9.16.6-150000.12.65.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libirs-devel-9.16.6-150000.12.65.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libirs-devel-9.16.6-150000.12.65.1.aarch64"
},
"product_reference": "libirs-devel-9.16.6-150000.12.65.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libirs-devel-9.16.6-150000.12.65.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libirs-devel-9.16.6-150000.12.65.1.x86_64"
},
"product_reference": "libirs-devel-9.16.6-150000.12.65.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libirs1601-9.16.6-150000.12.65.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libirs1601-9.16.6-150000.12.65.1.aarch64"
},
"product_reference": "libirs1601-9.16.6-150000.12.65.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libirs1601-9.16.6-150000.12.65.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libirs1601-9.16.6-150000.12.65.1.x86_64"
},
"product_reference": "libirs1601-9.16.6-150000.12.65.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libisc1606-9.16.6-150000.12.65.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libisc1606-9.16.6-150000.12.65.1.aarch64"
},
"product_reference": "libisc1606-9.16.6-150000.12.65.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libisc1606-9.16.6-150000.12.65.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libisc1606-9.16.6-150000.12.65.1.x86_64"
},
"product_reference": "libisc1606-9.16.6-150000.12.65.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libisccc1600-9.16.6-150000.12.65.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libisccc1600-9.16.6-150000.12.65.1.aarch64"
},
"product_reference": "libisccc1600-9.16.6-150000.12.65.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libisccc1600-9.16.6-150000.12.65.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libisccc1600-9.16.6-150000.12.65.1.x86_64"
},
"product_reference": "libisccc1600-9.16.6-150000.12.65.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libisccfg1600-9.16.6-150000.12.65.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libisccfg1600-9.16.6-150000.12.65.1.aarch64"
},
"product_reference": "libisccfg1600-9.16.6-150000.12.65.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libisccfg1600-9.16.6-150000.12.65.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libisccfg1600-9.16.6-150000.12.65.1.x86_64"
},
"product_reference": "libisccfg1600-9.16.6-150000.12.65.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libns1604-9.16.6-150000.12.65.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libns1604-9.16.6-150000.12.65.1.aarch64"
},
"product_reference": "libns1604-9.16.6-150000.12.65.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libns1604-9.16.6-150000.12.65.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libns1604-9.16.6-150000.12.65.1.x86_64"
},
"product_reference": "libns1604-9.16.6-150000.12.65.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-bind-9.16.6-150000.12.65.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:python3-bind-9.16.6-150000.12.65.1.noarch"
},
"product_reference": "python3-bind-9.16.6-150000.12.65.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-9.16.6-150000.12.65.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:bind-9.16.6-150000.12.65.1.aarch64"
},
"product_reference": "bind-9.16.6-150000.12.65.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-9.16.6-150000.12.65.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:bind-9.16.6-150000.12.65.1.ppc64le"
},
"product_reference": "bind-9.16.6-150000.12.65.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-9.16.6-150000.12.65.1.s390x as component of SUSE Linux Enterprise Server 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:bind-9.16.6-150000.12.65.1.s390x"
},
"product_reference": "bind-9.16.6-150000.12.65.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-9.16.6-150000.12.65.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:bind-9.16.6-150000.12.65.1.x86_64"
},
"product_reference": "bind-9.16.6-150000.12.65.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-chrootenv-9.16.6-150000.12.65.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:bind-chrootenv-9.16.6-150000.12.65.1.aarch64"
},
"product_reference": "bind-chrootenv-9.16.6-150000.12.65.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-chrootenv-9.16.6-150000.12.65.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:bind-chrootenv-9.16.6-150000.12.65.1.ppc64le"
},
"product_reference": "bind-chrootenv-9.16.6-150000.12.65.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-chrootenv-9.16.6-150000.12.65.1.s390x as component of SUSE Linux Enterprise Server 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:bind-chrootenv-9.16.6-150000.12.65.1.s390x"
},
"product_reference": "bind-chrootenv-9.16.6-150000.12.65.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-chrootenv-9.16.6-150000.12.65.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:bind-chrootenv-9.16.6-150000.12.65.1.x86_64"
},
"product_reference": "bind-chrootenv-9.16.6-150000.12.65.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-devel-9.16.6-150000.12.65.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:bind-devel-9.16.6-150000.12.65.1.aarch64"
},
"product_reference": "bind-devel-9.16.6-150000.12.65.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-devel-9.16.6-150000.12.65.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:bind-devel-9.16.6-150000.12.65.1.ppc64le"
},
"product_reference": "bind-devel-9.16.6-150000.12.65.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-devel-9.16.6-150000.12.65.1.s390x as component of SUSE Linux Enterprise Server 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:bind-devel-9.16.6-150000.12.65.1.s390x"
},
"product_reference": "bind-devel-9.16.6-150000.12.65.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-devel-9.16.6-150000.12.65.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:bind-devel-9.16.6-150000.12.65.1.x86_64"
},
"product_reference": "bind-devel-9.16.6-150000.12.65.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-doc-9.16.6-150000.12.65.1.noarch as component of SUSE Linux Enterprise Server 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:bind-doc-9.16.6-150000.12.65.1.noarch"
},
"product_reference": "bind-doc-9.16.6-150000.12.65.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-utils-9.16.6-150000.12.65.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:bind-utils-9.16.6-150000.12.65.1.aarch64"
},
"product_reference": "bind-utils-9.16.6-150000.12.65.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-utils-9.16.6-150000.12.65.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:bind-utils-9.16.6-150000.12.65.1.ppc64le"
},
"product_reference": "bind-utils-9.16.6-150000.12.65.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-utils-9.16.6-150000.12.65.1.s390x as component of SUSE Linux Enterprise Server 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:bind-utils-9.16.6-150000.12.65.1.s390x"
},
"product_reference": "bind-utils-9.16.6-150000.12.65.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-utils-9.16.6-150000.12.65.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:bind-utils-9.16.6-150000.12.65.1.x86_64"
},
"product_reference": "bind-utils-9.16.6-150000.12.65.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libbind9-1600-9.16.6-150000.12.65.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:libbind9-1600-9.16.6-150000.12.65.1.aarch64"
},
"product_reference": "libbind9-1600-9.16.6-150000.12.65.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libbind9-1600-9.16.6-150000.12.65.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:libbind9-1600-9.16.6-150000.12.65.1.ppc64le"
},
"product_reference": "libbind9-1600-9.16.6-150000.12.65.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libbind9-1600-9.16.6-150000.12.65.1.s390x as component of SUSE Linux Enterprise Server 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:libbind9-1600-9.16.6-150000.12.65.1.s390x"
},
"product_reference": "libbind9-1600-9.16.6-150000.12.65.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libbind9-1600-9.16.6-150000.12.65.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:libbind9-1600-9.16.6-150000.12.65.1.x86_64"
},
"product_reference": "libbind9-1600-9.16.6-150000.12.65.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libdns1605-9.16.6-150000.12.65.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:libdns1605-9.16.6-150000.12.65.1.aarch64"
},
"product_reference": "libdns1605-9.16.6-150000.12.65.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libdns1605-9.16.6-150000.12.65.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:libdns1605-9.16.6-150000.12.65.1.ppc64le"
},
"product_reference": "libdns1605-9.16.6-150000.12.65.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libdns1605-9.16.6-150000.12.65.1.s390x as component of SUSE Linux Enterprise Server 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:libdns1605-9.16.6-150000.12.65.1.s390x"
},
"product_reference": "libdns1605-9.16.6-150000.12.65.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libdns1605-9.16.6-150000.12.65.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:libdns1605-9.16.6-150000.12.65.1.x86_64"
},
"product_reference": "libdns1605-9.16.6-150000.12.65.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libirs-devel-9.16.6-150000.12.65.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:libirs-devel-9.16.6-150000.12.65.1.aarch64"
},
"product_reference": "libirs-devel-9.16.6-150000.12.65.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libirs-devel-9.16.6-150000.12.65.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:libirs-devel-9.16.6-150000.12.65.1.ppc64le"
},
"product_reference": "libirs-devel-9.16.6-150000.12.65.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libirs-devel-9.16.6-150000.12.65.1.s390x as component of SUSE Linux Enterprise Server 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:libirs-devel-9.16.6-150000.12.65.1.s390x"
},
"product_reference": "libirs-devel-9.16.6-150000.12.65.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libirs-devel-9.16.6-150000.12.65.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:libirs-devel-9.16.6-150000.12.65.1.x86_64"
},
"product_reference": "libirs-devel-9.16.6-150000.12.65.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libirs1601-9.16.6-150000.12.65.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:libirs1601-9.16.6-150000.12.65.1.aarch64"
},
"product_reference": "libirs1601-9.16.6-150000.12.65.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libirs1601-9.16.6-150000.12.65.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:libirs1601-9.16.6-150000.12.65.1.ppc64le"
},
"product_reference": "libirs1601-9.16.6-150000.12.65.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libirs1601-9.16.6-150000.12.65.1.s390x as component of SUSE Linux Enterprise Server 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:libirs1601-9.16.6-150000.12.65.1.s390x"
},
"product_reference": "libirs1601-9.16.6-150000.12.65.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libirs1601-9.16.6-150000.12.65.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:libirs1601-9.16.6-150000.12.65.1.x86_64"
},
"product_reference": "libirs1601-9.16.6-150000.12.65.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libisc1606-9.16.6-150000.12.65.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:libisc1606-9.16.6-150000.12.65.1.aarch64"
},
"product_reference": "libisc1606-9.16.6-150000.12.65.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libisc1606-9.16.6-150000.12.65.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:libisc1606-9.16.6-150000.12.65.1.ppc64le"
},
"product_reference": "libisc1606-9.16.6-150000.12.65.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libisc1606-9.16.6-150000.12.65.1.s390x as component of SUSE Linux Enterprise Server 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:libisc1606-9.16.6-150000.12.65.1.s390x"
},
"product_reference": "libisc1606-9.16.6-150000.12.65.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libisc1606-9.16.6-150000.12.65.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:libisc1606-9.16.6-150000.12.65.1.x86_64"
},
"product_reference": "libisc1606-9.16.6-150000.12.65.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libisccc1600-9.16.6-150000.12.65.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:libisccc1600-9.16.6-150000.12.65.1.aarch64"
},
"product_reference": "libisccc1600-9.16.6-150000.12.65.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libisccc1600-9.16.6-150000.12.65.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:libisccc1600-9.16.6-150000.12.65.1.ppc64le"
},
"product_reference": "libisccc1600-9.16.6-150000.12.65.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libisccc1600-9.16.6-150000.12.65.1.s390x as component of SUSE Linux Enterprise Server 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:libisccc1600-9.16.6-150000.12.65.1.s390x"
},
"product_reference": "libisccc1600-9.16.6-150000.12.65.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libisccc1600-9.16.6-150000.12.65.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:libisccc1600-9.16.6-150000.12.65.1.x86_64"
},
"product_reference": "libisccc1600-9.16.6-150000.12.65.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libisccfg1600-9.16.6-150000.12.65.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:libisccfg1600-9.16.6-150000.12.65.1.aarch64"
},
"product_reference": "libisccfg1600-9.16.6-150000.12.65.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libisccfg1600-9.16.6-150000.12.65.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:libisccfg1600-9.16.6-150000.12.65.1.ppc64le"
},
"product_reference": "libisccfg1600-9.16.6-150000.12.65.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libisccfg1600-9.16.6-150000.12.65.1.s390x as component of SUSE Linux Enterprise Server 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:libisccfg1600-9.16.6-150000.12.65.1.s390x"
},
"product_reference": "libisccfg1600-9.16.6-150000.12.65.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libisccfg1600-9.16.6-150000.12.65.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:libisccfg1600-9.16.6-150000.12.65.1.x86_64"
},
"product_reference": "libisccfg1600-9.16.6-150000.12.65.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libns1604-9.16.6-150000.12.65.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:libns1604-9.16.6-150000.12.65.1.aarch64"
},
"product_reference": "libns1604-9.16.6-150000.12.65.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libns1604-9.16.6-150000.12.65.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:libns1604-9.16.6-150000.12.65.1.ppc64le"
},
"product_reference": "libns1604-9.16.6-150000.12.65.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libns1604-9.16.6-150000.12.65.1.s390x as component of SUSE Linux Enterprise Server 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:libns1604-9.16.6-150000.12.65.1.s390x"
},
"product_reference": "libns1604-9.16.6-150000.12.65.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libns1604-9.16.6-150000.12.65.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:libns1604-9.16.6-150000.12.65.1.x86_64"
},
"product_reference": "libns1604-9.16.6-150000.12.65.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-bind-9.16.6-150000.12.65.1.noarch as component of SUSE Linux Enterprise Server 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:python3-bind-9.16.6-150000.12.65.1.noarch"
},
"product_reference": "python3-bind-9.16.6-150000.12.65.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-9.16.6-150000.12.65.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:bind-9.16.6-150000.12.65.1.aarch64"
},
"product_reference": "bind-9.16.6-150000.12.65.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-9.16.6-150000.12.65.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:bind-9.16.6-150000.12.65.1.ppc64le"
},
"product_reference": "bind-9.16.6-150000.12.65.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-9.16.6-150000.12.65.1.s390x as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:bind-9.16.6-150000.12.65.1.s390x"
},
"product_reference": "bind-9.16.6-150000.12.65.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-9.16.6-150000.12.65.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:bind-9.16.6-150000.12.65.1.x86_64"
},
"product_reference": "bind-9.16.6-150000.12.65.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-chrootenv-9.16.6-150000.12.65.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:bind-chrootenv-9.16.6-150000.12.65.1.aarch64"
},
"product_reference": "bind-chrootenv-9.16.6-150000.12.65.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-chrootenv-9.16.6-150000.12.65.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:bind-chrootenv-9.16.6-150000.12.65.1.ppc64le"
},
"product_reference": "bind-chrootenv-9.16.6-150000.12.65.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-chrootenv-9.16.6-150000.12.65.1.s390x as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:bind-chrootenv-9.16.6-150000.12.65.1.s390x"
},
"product_reference": "bind-chrootenv-9.16.6-150000.12.65.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-chrootenv-9.16.6-150000.12.65.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:bind-chrootenv-9.16.6-150000.12.65.1.x86_64"
},
"product_reference": "bind-chrootenv-9.16.6-150000.12.65.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-devel-9.16.6-150000.12.65.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:bind-devel-9.16.6-150000.12.65.1.aarch64"
},
"product_reference": "bind-devel-9.16.6-150000.12.65.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-devel-9.16.6-150000.12.65.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:bind-devel-9.16.6-150000.12.65.1.ppc64le"
},
"product_reference": "bind-devel-9.16.6-150000.12.65.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-devel-9.16.6-150000.12.65.1.s390x as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:bind-devel-9.16.6-150000.12.65.1.s390x"
},
"product_reference": "bind-devel-9.16.6-150000.12.65.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-devel-9.16.6-150000.12.65.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:bind-devel-9.16.6-150000.12.65.1.x86_64"
},
"product_reference": "bind-devel-9.16.6-150000.12.65.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-doc-9.16.6-150000.12.65.1.noarch as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:bind-doc-9.16.6-150000.12.65.1.noarch"
},
"product_reference": "bind-doc-9.16.6-150000.12.65.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-utils-9.16.6-150000.12.65.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:bind-utils-9.16.6-150000.12.65.1.aarch64"
},
"product_reference": "bind-utils-9.16.6-150000.12.65.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-utils-9.16.6-150000.12.65.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:bind-utils-9.16.6-150000.12.65.1.ppc64le"
},
"product_reference": "bind-utils-9.16.6-150000.12.65.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-utils-9.16.6-150000.12.65.1.s390x as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:bind-utils-9.16.6-150000.12.65.1.s390x"
},
"product_reference": "bind-utils-9.16.6-150000.12.65.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-utils-9.16.6-150000.12.65.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:bind-utils-9.16.6-150000.12.65.1.x86_64"
},
"product_reference": "bind-utils-9.16.6-150000.12.65.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libbind9-1600-9.16.6-150000.12.65.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:libbind9-1600-9.16.6-150000.12.65.1.aarch64"
},
"product_reference": "libbind9-1600-9.16.6-150000.12.65.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libbind9-1600-9.16.6-150000.12.65.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:libbind9-1600-9.16.6-150000.12.65.1.ppc64le"
},
"product_reference": "libbind9-1600-9.16.6-150000.12.65.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libbind9-1600-9.16.6-150000.12.65.1.s390x as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:libbind9-1600-9.16.6-150000.12.65.1.s390x"
},
"product_reference": "libbind9-1600-9.16.6-150000.12.65.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libbind9-1600-9.16.6-150000.12.65.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:libbind9-1600-9.16.6-150000.12.65.1.x86_64"
},
"product_reference": "libbind9-1600-9.16.6-150000.12.65.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libdns1605-9.16.6-150000.12.65.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:libdns1605-9.16.6-150000.12.65.1.aarch64"
},
"product_reference": "libdns1605-9.16.6-150000.12.65.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libdns1605-9.16.6-150000.12.65.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:libdns1605-9.16.6-150000.12.65.1.ppc64le"
},
"product_reference": "libdns1605-9.16.6-150000.12.65.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libdns1605-9.16.6-150000.12.65.1.s390x as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:libdns1605-9.16.6-150000.12.65.1.s390x"
},
"product_reference": "libdns1605-9.16.6-150000.12.65.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libdns1605-9.16.6-150000.12.65.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:libdns1605-9.16.6-150000.12.65.1.x86_64"
},
"product_reference": "libdns1605-9.16.6-150000.12.65.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libirs-devel-9.16.6-150000.12.65.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:libirs-devel-9.16.6-150000.12.65.1.aarch64"
},
"product_reference": "libirs-devel-9.16.6-150000.12.65.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libirs-devel-9.16.6-150000.12.65.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:libirs-devel-9.16.6-150000.12.65.1.ppc64le"
},
"product_reference": "libirs-devel-9.16.6-150000.12.65.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libirs-devel-9.16.6-150000.12.65.1.s390x as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:libirs-devel-9.16.6-150000.12.65.1.s390x"
},
"product_reference": "libirs-devel-9.16.6-150000.12.65.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libirs-devel-9.16.6-150000.12.65.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:libirs-devel-9.16.6-150000.12.65.1.x86_64"
},
"product_reference": "libirs-devel-9.16.6-150000.12.65.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libirs1601-9.16.6-150000.12.65.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:libirs1601-9.16.6-150000.12.65.1.aarch64"
},
"product_reference": "libirs1601-9.16.6-150000.12.65.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libirs1601-9.16.6-150000.12.65.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:libirs1601-9.16.6-150000.12.65.1.ppc64le"
},
"product_reference": "libirs1601-9.16.6-150000.12.65.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libirs1601-9.16.6-150000.12.65.1.s390x as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:libirs1601-9.16.6-150000.12.65.1.s390x"
},
"product_reference": "libirs1601-9.16.6-150000.12.65.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libirs1601-9.16.6-150000.12.65.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:libirs1601-9.16.6-150000.12.65.1.x86_64"
},
"product_reference": "libirs1601-9.16.6-150000.12.65.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libisc1606-9.16.6-150000.12.65.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:libisc1606-9.16.6-150000.12.65.1.aarch64"
},
"product_reference": "libisc1606-9.16.6-150000.12.65.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libisc1606-9.16.6-150000.12.65.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:libisc1606-9.16.6-150000.12.65.1.ppc64le"
},
"product_reference": "libisc1606-9.16.6-150000.12.65.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libisc1606-9.16.6-150000.12.65.1.s390x as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:libisc1606-9.16.6-150000.12.65.1.s390x"
},
"product_reference": "libisc1606-9.16.6-150000.12.65.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libisc1606-9.16.6-150000.12.65.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:libisc1606-9.16.6-150000.12.65.1.x86_64"
},
"product_reference": "libisc1606-9.16.6-150000.12.65.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libisccc1600-9.16.6-150000.12.65.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:libisccc1600-9.16.6-150000.12.65.1.aarch64"
},
"product_reference": "libisccc1600-9.16.6-150000.12.65.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libisccc1600-9.16.6-150000.12.65.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:libisccc1600-9.16.6-150000.12.65.1.ppc64le"
},
"product_reference": "libisccc1600-9.16.6-150000.12.65.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libisccc1600-9.16.6-150000.12.65.1.s390x as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:libisccc1600-9.16.6-150000.12.65.1.s390x"
},
"product_reference": "libisccc1600-9.16.6-150000.12.65.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libisccc1600-9.16.6-150000.12.65.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:libisccc1600-9.16.6-150000.12.65.1.x86_64"
},
"product_reference": "libisccc1600-9.16.6-150000.12.65.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libisccfg1600-9.16.6-150000.12.65.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:libisccfg1600-9.16.6-150000.12.65.1.aarch64"
},
"product_reference": "libisccfg1600-9.16.6-150000.12.65.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libisccfg1600-9.16.6-150000.12.65.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:libisccfg1600-9.16.6-150000.12.65.1.ppc64le"
},
"product_reference": "libisccfg1600-9.16.6-150000.12.65.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libisccfg1600-9.16.6-150000.12.65.1.s390x as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:libisccfg1600-9.16.6-150000.12.65.1.s390x"
},
"product_reference": "libisccfg1600-9.16.6-150000.12.65.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libisccfg1600-9.16.6-150000.12.65.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:libisccfg1600-9.16.6-150000.12.65.1.x86_64"
},
"product_reference": "libisccfg1600-9.16.6-150000.12.65.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libns1604-9.16.6-150000.12.65.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:libns1604-9.16.6-150000.12.65.1.aarch64"
},
"product_reference": "libns1604-9.16.6-150000.12.65.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libns1604-9.16.6-150000.12.65.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:libns1604-9.16.6-150000.12.65.1.ppc64le"
},
"product_reference": "libns1604-9.16.6-150000.12.65.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libns1604-9.16.6-150000.12.65.1.s390x as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:libns1604-9.16.6-150000.12.65.1.s390x"
},
"product_reference": "libns1604-9.16.6-150000.12.65.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libns1604-9.16.6-150000.12.65.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:libns1604-9.16.6-150000.12.65.1.x86_64"
},
"product_reference": "libns1604-9.16.6-150000.12.65.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-bind-9.16.6-150000.12.65.1.noarch as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:python3-bind-9.16.6-150000.12.65.1.noarch"
},
"product_reference": "python3-bind-9.16.6-150000.12.65.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-9.16.6-150000.12.65.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP1:bind-9.16.6-150000.12.65.1.ppc64le"
},
"product_reference": "bind-9.16.6-150000.12.65.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-9.16.6-150000.12.65.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP1:bind-9.16.6-150000.12.65.1.x86_64"
},
"product_reference": "bind-9.16.6-150000.12.65.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-chrootenv-9.16.6-150000.12.65.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP1:bind-chrootenv-9.16.6-150000.12.65.1.ppc64le"
},
"product_reference": "bind-chrootenv-9.16.6-150000.12.65.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-chrootenv-9.16.6-150000.12.65.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP1:bind-chrootenv-9.16.6-150000.12.65.1.x86_64"
},
"product_reference": "bind-chrootenv-9.16.6-150000.12.65.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-devel-9.16.6-150000.12.65.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP1:bind-devel-9.16.6-150000.12.65.1.ppc64le"
},
"product_reference": "bind-devel-9.16.6-150000.12.65.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-devel-9.16.6-150000.12.65.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP1:bind-devel-9.16.6-150000.12.65.1.x86_64"
},
"product_reference": "bind-devel-9.16.6-150000.12.65.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-doc-9.16.6-150000.12.65.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP1:bind-doc-9.16.6-150000.12.65.1.noarch"
},
"product_reference": "bind-doc-9.16.6-150000.12.65.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-utils-9.16.6-150000.12.65.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP1:bind-utils-9.16.6-150000.12.65.1.ppc64le"
},
"product_reference": "bind-utils-9.16.6-150000.12.65.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-utils-9.16.6-150000.12.65.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP1:bind-utils-9.16.6-150000.12.65.1.x86_64"
},
"product_reference": "bind-utils-9.16.6-150000.12.65.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libbind9-1600-9.16.6-150000.12.65.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP1:libbind9-1600-9.16.6-150000.12.65.1.ppc64le"
},
"product_reference": "libbind9-1600-9.16.6-150000.12.65.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libbind9-1600-9.16.6-150000.12.65.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP1:libbind9-1600-9.16.6-150000.12.65.1.x86_64"
},
"product_reference": "libbind9-1600-9.16.6-150000.12.65.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libdns1605-9.16.6-150000.12.65.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP1:libdns1605-9.16.6-150000.12.65.1.ppc64le"
},
"product_reference": "libdns1605-9.16.6-150000.12.65.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libdns1605-9.16.6-150000.12.65.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP1:libdns1605-9.16.6-150000.12.65.1.x86_64"
},
"product_reference": "libdns1605-9.16.6-150000.12.65.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libirs-devel-9.16.6-150000.12.65.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP1:libirs-devel-9.16.6-150000.12.65.1.ppc64le"
},
"product_reference": "libirs-devel-9.16.6-150000.12.65.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libirs-devel-9.16.6-150000.12.65.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP1:libirs-devel-9.16.6-150000.12.65.1.x86_64"
},
"product_reference": "libirs-devel-9.16.6-150000.12.65.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libirs1601-9.16.6-150000.12.65.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP1:libirs1601-9.16.6-150000.12.65.1.ppc64le"
},
"product_reference": "libirs1601-9.16.6-150000.12.65.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libirs1601-9.16.6-150000.12.65.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP1:libirs1601-9.16.6-150000.12.65.1.x86_64"
},
"product_reference": "libirs1601-9.16.6-150000.12.65.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libisc1606-9.16.6-150000.12.65.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP1:libisc1606-9.16.6-150000.12.65.1.ppc64le"
},
"product_reference": "libisc1606-9.16.6-150000.12.65.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libisc1606-9.16.6-150000.12.65.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP1:libisc1606-9.16.6-150000.12.65.1.x86_64"
},
"product_reference": "libisc1606-9.16.6-150000.12.65.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libisccc1600-9.16.6-150000.12.65.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP1:libisccc1600-9.16.6-150000.12.65.1.ppc64le"
},
"product_reference": "libisccc1600-9.16.6-150000.12.65.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libisccc1600-9.16.6-150000.12.65.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP1:libisccc1600-9.16.6-150000.12.65.1.x86_64"
},
"product_reference": "libisccc1600-9.16.6-150000.12.65.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libisccfg1600-9.16.6-150000.12.65.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP1:libisccfg1600-9.16.6-150000.12.65.1.ppc64le"
},
"product_reference": "libisccfg1600-9.16.6-150000.12.65.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libisccfg1600-9.16.6-150000.12.65.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP1:libisccfg1600-9.16.6-150000.12.65.1.x86_64"
},
"product_reference": "libisccfg1600-9.16.6-150000.12.65.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libns1604-9.16.6-150000.12.65.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP1:libns1604-9.16.6-150000.12.65.1.ppc64le"
},
"product_reference": "libns1604-9.16.6-150000.12.65.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libns1604-9.16.6-150000.12.65.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP1:libns1604-9.16.6-150000.12.65.1.x86_64"
},
"product_reference": "libns1604-9.16.6-150000.12.65.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-bind-9.16.6-150000.12.65.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP1:python3-bind-9.16.6-150000.12.65.1.noarch"
},
"product_reference": "python3-bind-9.16.6-150000.12.65.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-9.16.6-150000.12.65.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2:bind-9.16.6-150000.12.65.1.ppc64le"
},
"product_reference": "bind-9.16.6-150000.12.65.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-9.16.6-150000.12.65.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2:bind-9.16.6-150000.12.65.1.x86_64"
},
"product_reference": "bind-9.16.6-150000.12.65.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-chrootenv-9.16.6-150000.12.65.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2:bind-chrootenv-9.16.6-150000.12.65.1.ppc64le"
},
"product_reference": "bind-chrootenv-9.16.6-150000.12.65.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-chrootenv-9.16.6-150000.12.65.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2:bind-chrootenv-9.16.6-150000.12.65.1.x86_64"
},
"product_reference": "bind-chrootenv-9.16.6-150000.12.65.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-devel-9.16.6-150000.12.65.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2:bind-devel-9.16.6-150000.12.65.1.ppc64le"
},
"product_reference": "bind-devel-9.16.6-150000.12.65.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-devel-9.16.6-150000.12.65.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2:bind-devel-9.16.6-150000.12.65.1.x86_64"
},
"product_reference": "bind-devel-9.16.6-150000.12.65.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-doc-9.16.6-150000.12.65.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2:bind-doc-9.16.6-150000.12.65.1.noarch"
},
"product_reference": "bind-doc-9.16.6-150000.12.65.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-utils-9.16.6-150000.12.65.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2:bind-utils-9.16.6-150000.12.65.1.ppc64le"
},
"product_reference": "bind-utils-9.16.6-150000.12.65.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-utils-9.16.6-150000.12.65.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2:bind-utils-9.16.6-150000.12.65.1.x86_64"
},
"product_reference": "bind-utils-9.16.6-150000.12.65.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libbind9-1600-9.16.6-150000.12.65.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libbind9-1600-9.16.6-150000.12.65.1.ppc64le"
},
"product_reference": "libbind9-1600-9.16.6-150000.12.65.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libbind9-1600-9.16.6-150000.12.65.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libbind9-1600-9.16.6-150000.12.65.1.x86_64"
},
"product_reference": "libbind9-1600-9.16.6-150000.12.65.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libdns1605-9.16.6-150000.12.65.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libdns1605-9.16.6-150000.12.65.1.ppc64le"
},
"product_reference": "libdns1605-9.16.6-150000.12.65.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libdns1605-9.16.6-150000.12.65.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libdns1605-9.16.6-150000.12.65.1.x86_64"
},
"product_reference": "libdns1605-9.16.6-150000.12.65.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libirs-devel-9.16.6-150000.12.65.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libirs-devel-9.16.6-150000.12.65.1.ppc64le"
},
"product_reference": "libirs-devel-9.16.6-150000.12.65.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libirs-devel-9.16.6-150000.12.65.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libirs-devel-9.16.6-150000.12.65.1.x86_64"
},
"product_reference": "libirs-devel-9.16.6-150000.12.65.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libirs1601-9.16.6-150000.12.65.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libirs1601-9.16.6-150000.12.65.1.ppc64le"
},
"product_reference": "libirs1601-9.16.6-150000.12.65.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libirs1601-9.16.6-150000.12.65.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libirs1601-9.16.6-150000.12.65.1.x86_64"
},
"product_reference": "libirs1601-9.16.6-150000.12.65.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libisc1606-9.16.6-150000.12.65.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libisc1606-9.16.6-150000.12.65.1.ppc64le"
},
"product_reference": "libisc1606-9.16.6-150000.12.65.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libisc1606-9.16.6-150000.12.65.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libisc1606-9.16.6-150000.12.65.1.x86_64"
},
"product_reference": "libisc1606-9.16.6-150000.12.65.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libisccc1600-9.16.6-150000.12.65.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libisccc1600-9.16.6-150000.12.65.1.ppc64le"
},
"product_reference": "libisccc1600-9.16.6-150000.12.65.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libisccc1600-9.16.6-150000.12.65.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libisccc1600-9.16.6-150000.12.65.1.x86_64"
},
"product_reference": "libisccc1600-9.16.6-150000.12.65.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libisccfg1600-9.16.6-150000.12.65.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libisccfg1600-9.16.6-150000.12.65.1.ppc64le"
},
"product_reference": "libisccfg1600-9.16.6-150000.12.65.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libisccfg1600-9.16.6-150000.12.65.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libisccfg1600-9.16.6-150000.12.65.1.x86_64"
},
"product_reference": "libisccfg1600-9.16.6-150000.12.65.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libns1604-9.16.6-150000.12.65.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libns1604-9.16.6-150000.12.65.1.ppc64le"
},
"product_reference": "libns1604-9.16.6-150000.12.65.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libns1604-9.16.6-150000.12.65.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libns1604-9.16.6-150000.12.65.1.x86_64"
},
"product_reference": "libns1604-9.16.6-150000.12.65.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-bind-9.16.6-150000.12.65.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2:python3-bind-9.16.6-150000.12.65.1.noarch"
},
"product_reference": "python3-bind-9.16.6-150000.12.65.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-9.16.6-150000.12.65.1.aarch64 as component of SUSE Enterprise Storage 7",
"product_id": "SUSE Enterprise Storage 7:bind-9.16.6-150000.12.65.1.aarch64"
},
"product_reference": "bind-9.16.6-150000.12.65.1.aarch64",
"relates_to_product_reference": "SUSE Enterprise Storage 7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-9.16.6-150000.12.65.1.x86_64 as component of SUSE Enterprise Storage 7",
"product_id": "SUSE Enterprise Storage 7:bind-9.16.6-150000.12.65.1.x86_64"
},
"product_reference": "bind-9.16.6-150000.12.65.1.x86_64",
"relates_to_product_reference": "SUSE Enterprise Storage 7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-chrootenv-9.16.6-150000.12.65.1.aarch64 as component of SUSE Enterprise Storage 7",
"product_id": "SUSE Enterprise Storage 7:bind-chrootenv-9.16.6-150000.12.65.1.aarch64"
},
"product_reference": "bind-chrootenv-9.16.6-150000.12.65.1.aarch64",
"relates_to_product_reference": "SUSE Enterprise Storage 7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-chrootenv-9.16.6-150000.12.65.1.x86_64 as component of SUSE Enterprise Storage 7",
"product_id": "SUSE Enterprise Storage 7:bind-chrootenv-9.16.6-150000.12.65.1.x86_64"
},
"product_reference": "bind-chrootenv-9.16.6-150000.12.65.1.x86_64",
"relates_to_product_reference": "SUSE Enterprise Storage 7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-devel-9.16.6-150000.12.65.1.aarch64 as component of SUSE Enterprise Storage 7",
"product_id": "SUSE Enterprise Storage 7:bind-devel-9.16.6-150000.12.65.1.aarch64"
},
"product_reference": "bind-devel-9.16.6-150000.12.65.1.aarch64",
"relates_to_product_reference": "SUSE Enterprise Storage 7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-devel-9.16.6-150000.12.65.1.x86_64 as component of SUSE Enterprise Storage 7",
"product_id": "SUSE Enterprise Storage 7:bind-devel-9.16.6-150000.12.65.1.x86_64"
},
"product_reference": "bind-devel-9.16.6-150000.12.65.1.x86_64",
"relates_to_product_reference": "SUSE Enterprise Storage 7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-doc-9.16.6-150000.12.65.1.noarch as component of SUSE Enterprise Storage 7",
"product_id": "SUSE Enterprise Storage 7:bind-doc-9.16.6-150000.12.65.1.noarch"
},
"product_reference": "bind-doc-9.16.6-150000.12.65.1.noarch",
"relates_to_product_reference": "SUSE Enterprise Storage 7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-utils-9.16.6-150000.12.65.1.aarch64 as component of SUSE Enterprise Storage 7",
"product_id": "SUSE Enterprise Storage 7:bind-utils-9.16.6-150000.12.65.1.aarch64"
},
"product_reference": "bind-utils-9.16.6-150000.12.65.1.aarch64",
"relates_to_product_reference": "SUSE Enterprise Storage 7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-utils-9.16.6-150000.12.65.1.x86_64 as component of SUSE Enterprise Storage 7",
"product_id": "SUSE Enterprise Storage 7:bind-utils-9.16.6-150000.12.65.1.x86_64"
},
"product_reference": "bind-utils-9.16.6-150000.12.65.1.x86_64",
"relates_to_product_reference": "SUSE Enterprise Storage 7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libbind9-1600-9.16.6-150000.12.65.1.aarch64 as component of SUSE Enterprise Storage 7",
"product_id": "SUSE Enterprise Storage 7:libbind9-1600-9.16.6-150000.12.65.1.aarch64"
},
"product_reference": "libbind9-1600-9.16.6-150000.12.65.1.aarch64",
"relates_to_product_reference": "SUSE Enterprise Storage 7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libbind9-1600-9.16.6-150000.12.65.1.x86_64 as component of SUSE Enterprise Storage 7",
"product_id": "SUSE Enterprise Storage 7:libbind9-1600-9.16.6-150000.12.65.1.x86_64"
},
"product_reference": "libbind9-1600-9.16.6-150000.12.65.1.x86_64",
"relates_to_product_reference": "SUSE Enterprise Storage 7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libdns1605-9.16.6-150000.12.65.1.aarch64 as component of SUSE Enterprise Storage 7",
"product_id": "SUSE Enterprise Storage 7:libdns1605-9.16.6-150000.12.65.1.aarch64"
},
"product_reference": "libdns1605-9.16.6-150000.12.65.1.aarch64",
"relates_to_product_reference": "SUSE Enterprise Storage 7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libdns1605-9.16.6-150000.12.65.1.x86_64 as component of SUSE Enterprise Storage 7",
"product_id": "SUSE Enterprise Storage 7:libdns1605-9.16.6-150000.12.65.1.x86_64"
},
"product_reference": "libdns1605-9.16.6-150000.12.65.1.x86_64",
"relates_to_product_reference": "SUSE Enterprise Storage 7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libirs-devel-9.16.6-150000.12.65.1.aarch64 as component of SUSE Enterprise Storage 7",
"product_id": "SUSE Enterprise Storage 7:libirs-devel-9.16.6-150000.12.65.1.aarch64"
},
"product_reference": "libirs-devel-9.16.6-150000.12.65.1.aarch64",
"relates_to_product_reference": "SUSE Enterprise Storage 7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libirs-devel-9.16.6-150000.12.65.1.x86_64 as component of SUSE Enterprise Storage 7",
"product_id": "SUSE Enterprise Storage 7:libirs-devel-9.16.6-150000.12.65.1.x86_64"
},
"product_reference": "libirs-devel-9.16.6-150000.12.65.1.x86_64",
"relates_to_product_reference": "SUSE Enterprise Storage 7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libirs1601-9.16.6-150000.12.65.1.aarch64 as component of SUSE Enterprise Storage 7",
"product_id": "SUSE Enterprise Storage 7:libirs1601-9.16.6-150000.12.65.1.aarch64"
},
"product_reference": "libirs1601-9.16.6-150000.12.65.1.aarch64",
"relates_to_product_reference": "SUSE Enterprise Storage 7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libirs1601-9.16.6-150000.12.65.1.x86_64 as component of SUSE Enterprise Storage 7",
"product_id": "SUSE Enterprise Storage 7:libirs1601-9.16.6-150000.12.65.1.x86_64"
},
"product_reference": "libirs1601-9.16.6-150000.12.65.1.x86_64",
"relates_to_product_reference": "SUSE Enterprise Storage 7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libisc1606-9.16.6-150000.12.65.1.aarch64 as component of SUSE Enterprise Storage 7",
"product_id": "SUSE Enterprise Storage 7:libisc1606-9.16.6-150000.12.65.1.aarch64"
},
"product_reference": "libisc1606-9.16.6-150000.12.65.1.aarch64",
"relates_to_product_reference": "SUSE Enterprise Storage 7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libisc1606-9.16.6-150000.12.65.1.x86_64 as component of SUSE Enterprise Storage 7",
"product_id": "SUSE Enterprise Storage 7:libisc1606-9.16.6-150000.12.65.1.x86_64"
},
"product_reference": "libisc1606-9.16.6-150000.12.65.1.x86_64",
"relates_to_product_reference": "SUSE Enterprise Storage 7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libisccc1600-9.16.6-150000.12.65.1.aarch64 as component of SUSE Enterprise Storage 7",
"product_id": "SUSE Enterprise Storage 7:libisccc1600-9.16.6-150000.12.65.1.aarch64"
},
"product_reference": "libisccc1600-9.16.6-150000.12.65.1.aarch64",
"relates_to_product_reference": "SUSE Enterprise Storage 7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libisccc1600-9.16.6-150000.12.65.1.x86_64 as component of SUSE Enterprise Storage 7",
"product_id": "SUSE Enterprise Storage 7:libisccc1600-9.16.6-150000.12.65.1.x86_64"
},
"product_reference": "libisccc1600-9.16.6-150000.12.65.1.x86_64",
"relates_to_product_reference": "SUSE Enterprise Storage 7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libisccfg1600-9.16.6-150000.12.65.1.aarch64 as component of SUSE Enterprise Storage 7",
"product_id": "SUSE Enterprise Storage 7:libisccfg1600-9.16.6-150000.12.65.1.aarch64"
},
"product_reference": "libisccfg1600-9.16.6-150000.12.65.1.aarch64",
"relates_to_product_reference": "SUSE Enterprise Storage 7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libisccfg1600-9.16.6-150000.12.65.1.x86_64 as component of SUSE Enterprise Storage 7",
"product_id": "SUSE Enterprise Storage 7:libisccfg1600-9.16.6-150000.12.65.1.x86_64"
},
"product_reference": "libisccfg1600-9.16.6-150000.12.65.1.x86_64",
"relates_to_product_reference": "SUSE Enterprise Storage 7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libns1604-9.16.6-150000.12.65.1.aarch64 as component of SUSE Enterprise Storage 7",
"product_id": "SUSE Enterprise Storage 7:libns1604-9.16.6-150000.12.65.1.aarch64"
},
"product_reference": "libns1604-9.16.6-150000.12.65.1.aarch64",
"relates_to_product_reference": "SUSE Enterprise Storage 7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libns1604-9.16.6-150000.12.65.1.x86_64 as component of SUSE Enterprise Storage 7",
"product_id": "SUSE Enterprise Storage 7:libns1604-9.16.6-150000.12.65.1.x86_64"
},
"product_reference": "libns1604-9.16.6-150000.12.65.1.x86_64",
"relates_to_product_reference": "SUSE Enterprise Storage 7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-bind-9.16.6-150000.12.65.1.noarch as component of SUSE Enterprise Storage 7",
"product_id": "SUSE Enterprise Storage 7:python3-bind-9.16.6-150000.12.65.1.noarch"
},
"product_reference": "python3-bind-9.16.6-150000.12.65.1.noarch",
"relates_to_product_reference": "SUSE Enterprise Storage 7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-devel-32bit-9.16.6-150000.12.65.1.x86_64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:bind-devel-32bit-9.16.6-150000.12.65.1.x86_64"
},
"product_reference": "bind-devel-32bit-9.16.6-150000.12.65.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-saltboot-0.1.1681904360.84ef141-150000.1.50.1.noarch as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:dracut-saltboot-0.1.1681904360.84ef141-150000.1.50.1.noarch"
},
"product_reference": "dracut-saltboot-0.1.1681904360.84ef141-150000.1.50.1.noarch",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libbind9-1600-32bit-9.16.6-150000.12.65.1.x86_64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:libbind9-1600-32bit-9.16.6-150000.12.65.1.x86_64"
},
"product_reference": "libbind9-1600-32bit-9.16.6-150000.12.65.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libdns1605-32bit-9.16.6-150000.12.65.1.x86_64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:libdns1605-32bit-9.16.6-150000.12.65.1.x86_64"
},
"product_reference": "libdns1605-32bit-9.16.6-150000.12.65.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libirs1601-32bit-9.16.6-150000.12.65.1.x86_64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:libirs1601-32bit-9.16.6-150000.12.65.1.x86_64"
},
"product_reference": "libirs1601-32bit-9.16.6-150000.12.65.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libisc1606-32bit-9.16.6-150000.12.65.1.x86_64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:libisc1606-32bit-9.16.6-150000.12.65.1.x86_64"
},
"product_reference": "libisc1606-32bit-9.16.6-150000.12.65.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libisccc1600-32bit-9.16.6-150000.12.65.1.x86_64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:libisccc1600-32bit-9.16.6-150000.12.65.1.x86_64"
},
"product_reference": "libisccc1600-32bit-9.16.6-150000.12.65.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libisccfg1600-32bit-9.16.6-150000.12.65.1.x86_64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:libisccfg1600-32bit-9.16.6-150000.12.65.1.x86_64"
},
"product_reference": "libisccfg1600-32bit-9.16.6-150000.12.65.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libns1604-32bit-9.16.6-150000.12.65.1.x86_64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:libns1604-32bit-9.16.6-150000.12.65.1.x86_64"
},
"product_reference": "libns1604-32bit-9.16.6-150000.12.65.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "spacecmd-4.3.21-150000.3.98.1.noarch as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:spacecmd-4.3.21-150000.3.98.1.noarch"
},
"product_reference": "spacecmd-4.3.21-150000.3.98.1.noarch",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "wire-0.5.0-150000.1.12.3.aarch64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:wire-0.5.0-150000.1.12.3.aarch64"
},
"product_reference": "wire-0.5.0-150000.1.12.3.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "wire-0.5.0-150000.1.12.3.ppc64le as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:wire-0.5.0-150000.1.12.3.ppc64le"
},
"product_reference": "wire-0.5.0-150000.1.12.3.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "wire-0.5.0-150000.1.12.3.s390x as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:wire-0.5.0-150000.1.12.3.s390x"
},
"product_reference": "wire-0.5.0-150000.1.12.3.s390x",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "wire-0.5.0-150000.1.12.3.x86_64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:wire-0.5.0-150000.1.12.3.x86_64"
},
"product_reference": "wire-0.5.0-150000.1.12.3.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-saltboot-0.1.1681904360.84ef141-150000.1.50.1.noarch as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:dracut-saltboot-0.1.1681904360.84ef141-150000.1.50.1.noarch"
},
"product_reference": "dracut-saltboot-0.1.1681904360.84ef141-150000.1.50.1.noarch",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "spacecmd-4.3.21-150000.3.98.1.noarch as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:spacecmd-4.3.21-150000.3.98.1.noarch"
},
"product_reference": "spacecmd-4.3.21-150000.3.98.1.noarch",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "wire-0.5.0-150000.1.12.3.aarch64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:wire-0.5.0-150000.1.12.3.aarch64"
},
"product_reference": "wire-0.5.0-150000.1.12.3.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "wire-0.5.0-150000.1.12.3.ppc64le as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:wire-0.5.0-150000.1.12.3.ppc64le"
},
"product_reference": "wire-0.5.0-150000.1.12.3.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "wire-0.5.0-150000.1.12.3.s390x as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:wire-0.5.0-150000.1.12.3.s390x"
},
"product_reference": "wire-0.5.0-150000.1.12.3.s390x",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "wire-0.5.0-150000.1.12.3.x86_64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:wire-0.5.0-150000.1.12.3.x86_64"
},
"product_reference": "wire-0.5.0-150000.1.12.3.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.5"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2020-7753",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-7753"
}
],
"notes": [
{
"category": "general",
"text": "All versions of package trim are vulnerable to Regular Expression Denial of Service (ReDoS) via trim().",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 7:bind-9.16.6-150000.12.65.1.aarch64",
"SUSE Enterprise Storage 7:bind-9.16.6-150000.12.65.1.x86_64",
"SUSE Enterprise Storage 7:bind-chrootenv-9.16.6-150000.12.65.1.aarch64",
"SUSE Enterprise Storage 7:bind-chrootenv-9.16.6-150000.12.65.1.x86_64",
"SUSE Enterprise Storage 7:bind-devel-9.16.6-150000.12.65.1.aarch64",
"SUSE Enterprise Storage 7:bind-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Enterprise Storage 7:bind-doc-9.16.6-150000.12.65.1.noarch",
"SUSE Enterprise Storage 7:bind-utils-9.16.6-150000.12.65.1.aarch64",
"SUSE Enterprise Storage 7:bind-utils-9.16.6-150000.12.65.1.x86_64",
"SUSE Enterprise Storage 7:libbind9-1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Enterprise Storage 7:libbind9-1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Enterprise Storage 7:libdns1605-9.16.6-150000.12.65.1.aarch64",
"SUSE Enterprise Storage 7:libdns1605-9.16.6-150000.12.65.1.x86_64",
"SUSE Enterprise Storage 7:libirs-devel-9.16.6-150000.12.65.1.aarch64",
"SUSE Enterprise Storage 7:libirs-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Enterprise Storage 7:libirs1601-9.16.6-150000.12.65.1.aarch64",
"SUSE Enterprise Storage 7:libirs1601-9.16.6-150000.12.65.1.x86_64",
"SUSE Enterprise Storage 7:libisc1606-9.16.6-150000.12.65.1.aarch64",
"SUSE Enterprise Storage 7:libisc1606-9.16.6-150000.12.65.1.x86_64",
"SUSE Enterprise Storage 7:libisccc1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Enterprise Storage 7:libisccc1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Enterprise Storage 7:libisccfg1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Enterprise Storage 7:libisccfg1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Enterprise Storage 7:libns1604-9.16.6-150000.12.65.1.aarch64",
"SUSE Enterprise Storage 7:libns1604-9.16.6-150000.12.65.1.x86_64",
"SUSE Enterprise Storage 7:python3-bind-9.16.6-150000.12.65.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:bind-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:bind-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:bind-chrootenv-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:bind-chrootenv-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:bind-devel-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:bind-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:bind-doc-9.16.6-150000.12.65.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:bind-utils-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:bind-utils-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libbind9-1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libbind9-1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libdns1605-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libdns1605-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libirs-devel-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libirs-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libirs1601-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libirs1601-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libisc1606-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libisc1606-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libisccc1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libisccc1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libisccfg1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libisccfg1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libns1604-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libns1604-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:python3-bind-9.16.6-150000.12.65.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:bind-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:bind-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:bind-chrootenv-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:bind-chrootenv-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:bind-devel-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:bind-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:bind-doc-9.16.6-150000.12.65.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:bind-utils-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:bind-utils-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libbind9-1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libbind9-1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libdns1605-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libdns1605-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libirs-devel-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libirs-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libirs1601-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libirs1601-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libisc1606-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libisc1606-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libisccc1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libisccc1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libisccfg1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libisccfg1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libns1604-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libns1604-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:python3-bind-9.16.6-150000.12.65.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-chrootenv-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-chrootenv-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-chrootenv-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-chrootenv-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-devel-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-devel-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-devel-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-doc-9.16.6-150000.12.65.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-utils-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-utils-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-utils-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-utils-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libbind9-1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libbind9-1600-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libbind9-1600-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libbind9-1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libdns1605-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libdns1605-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libdns1605-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libdns1605-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libirs-devel-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libirs-devel-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libirs-devel-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libirs-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libirs1601-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libirs1601-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libirs1601-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libirs1601-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libisc1606-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libisc1606-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libisc1606-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libisc1606-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libisccc1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libisccc1600-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libisccc1600-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libisccc1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libisccfg1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libisccfg1600-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libisccfg1600-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libisccfg1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libns1604-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libns1604-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libns1604-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libns1604-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:python3-bind-9.16.6-150000.12.65.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-chrootenv-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-chrootenv-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-chrootenv-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-chrootenv-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-devel-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-devel-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-devel-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-doc-9.16.6-150000.12.65.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-utils-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-utils-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-utils-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-utils-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libbind9-1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libbind9-1600-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libbind9-1600-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libbind9-1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libdns1605-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libdns1605-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libdns1605-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libdns1605-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libirs-devel-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libirs-devel-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libirs-devel-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libirs-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libirs1601-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libirs1601-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libirs1601-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libirs1601-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libisc1606-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libisc1606-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libisc1606-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libisc1606-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libisccc1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libisccc1600-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libisccc1600-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libisccc1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libisccfg1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libisccfg1600-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libisccfg1600-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libisccfg1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libns1604-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libns1604-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libns1604-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libns1604-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:python3-bind-9.16.6-150000.12.65.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:bind-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:bind-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:bind-chrootenv-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:bind-chrootenv-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:bind-devel-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:bind-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:bind-doc-9.16.6-150000.12.65.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:bind-utils-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:bind-utils-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libbind9-1600-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libbind9-1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libdns1605-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libdns1605-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libirs-devel-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libirs-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libirs1601-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libirs1601-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libisc1606-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libisc1606-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libisccc1600-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libisccc1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libisccfg1600-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libisccfg1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libns1604-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libns1604-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:python3-bind-9.16.6-150000.12.65.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:bind-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:bind-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:bind-chrootenv-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:bind-chrootenv-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:bind-devel-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:bind-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:bind-doc-9.16.6-150000.12.65.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:bind-utils-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:bind-utils-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libbind9-1600-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libbind9-1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libdns1605-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libdns1605-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libirs-devel-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libirs-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libirs1601-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libirs1601-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libisc1606-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libisc1606-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libisccc1600-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libisccc1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libisccfg1600-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libisccfg1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libns1604-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libns1604-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:python3-bind-9.16.6-150000.12.65.1.noarch",
"SUSE Manager Client Tools 15:dracut-saltboot-0.1.1681904360.84ef141-150000.1.50.1.noarch",
"SUSE Manager Client Tools 15:grafana-9.5.1-150000.1.48.5.aarch64",
"SUSE Manager Client Tools 15:grafana-9.5.1-150000.1.48.5.ppc64le",
"SUSE Manager Client Tools 15:grafana-9.5.1-150000.1.48.5.s390x",
"SUSE Manager Client Tools 15:grafana-9.5.1-150000.1.48.5.x86_64",
"SUSE Manager Client Tools 15:mgr-daemon-4.3.7-150000.1.41.1.noarch",
"SUSE Manager Client Tools 15:python3-uyuni-common-libs-4.3.8-150000.1.33.1.aarch64",
"SUSE Manager Client Tools 15:python3-uyuni-common-libs-4.3.8-150000.1.33.1.ppc64le",
"SUSE Manager Client Tools 15:python3-uyuni-common-libs-4.3.8-150000.1.33.1.s390x",
"SUSE Manager Client Tools 15:python3-uyuni-common-libs-4.3.8-150000.1.33.1.x86_64",
"SUSE Manager Client Tools 15:python3-zypp-plugin-spacewalk-1.0.14-150000.3.35.1.noarch",
"SUSE Manager Client Tools 15:spacecmd-4.3.21-150000.3.98.1.noarch",
"SUSE Manager Client Tools 15:zypp-plugin-spacewalk-1.0.14-150000.3.35.1.noarch",
"SUSE Manager Client Tools for SLE Micro 5:bind-utils-9.16.6-150000.12.65.1.aarch64",
"SUSE Manager Client Tools for SLE Micro 5:bind-utils-9.16.6-150000.12.65.1.s390x",
"SUSE Manager Client Tools for SLE Micro 5:bind-utils-9.16.6-150000.12.65.1.x86_64",
"SUSE Manager Client Tools for SLE Micro 5:dracut-saltboot-0.1.1681904360.84ef141-150000.1.50.1.noarch",
"SUSE Manager Client Tools for SLE Micro 5:libbind9-1600-64bit-9.16.6-150000.12.65.1.aarch64_ilp32",
"SUSE Manager Client Tools for SLE Micro 5:libbind9-1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Manager Client Tools for SLE Micro 5:libbind9-1600-9.16.6-150000.12.65.1.s390x",
"SUSE Manager Client Tools for SLE Micro 5:libbind9-1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Manager Client Tools for SLE Micro 5:libdns1605-64bit-9.16.6-150000.12.65.1.aarch64_ilp32",
"SUSE Manager Client Tools for SLE Micro 5:libdns1605-9.16.6-150000.12.65.1.aarch64",
"SUSE Manager Client Tools for SLE Micro 5:libdns1605-9.16.6-150000.12.65.1.s390x",
"SUSE Manager Client Tools for SLE Micro 5:libdns1605-9.16.6-150000.12.65.1.x86_64",
"SUSE Manager Client Tools for SLE Micro 5:libirs1601-64bit-9.16.6-150000.12.65.1.aarch64_ilp32",
"SUSE Manager Client Tools for SLE Micro 5:libirs1601-9.16.6-150000.12.65.1.aarch64",
"SUSE Manager Client Tools for SLE Micro 5:libirs1601-9.16.6-150000.12.65.1.s390x",
"SUSE Manager Client Tools for SLE Micro 5:libirs1601-9.16.6-150000.12.65.1.x86_64",
"SUSE Manager Client Tools for SLE Micro 5:libisc1606-64bit-9.16.6-150000.12.65.1.aarch64_ilp32",
"SUSE Manager Client Tools for SLE Micro 5:libisc1606-9.16.6-150000.12.65.1.aarch64",
"SUSE Manager Client Tools for SLE Micro 5:libisc1606-9.16.6-150000.12.65.1.s390x",
"SUSE Manager Client Tools for SLE Micro 5:libisc1606-9.16.6-150000.12.65.1.x86_64",
"SUSE Manager Client Tools for SLE Micro 5:libisccc1600-64bit-9.16.6-150000.12.65.1.aarch64_ilp32",
"SUSE Manager Client Tools for SLE Micro 5:libisccc1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Manager Client Tools for SLE Micro 5:libisccc1600-9.16.6-150000.12.65.1.s390x",
"SUSE Manager Client Tools for SLE Micro 5:libisccc1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Manager Client Tools for SLE Micro 5:libisccfg1600-64bit-9.16.6-150000.12.65.1.aarch64_ilp32",
"SUSE Manager Client Tools for SLE Micro 5:libisccfg1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Manager Client Tools for SLE Micro 5:libisccfg1600-9.16.6-150000.12.65.1.s390x",
"SUSE Manager Client Tools for SLE Micro 5:libisccfg1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Manager Client Tools for SLE Micro 5:libns1604-9.16.6-150000.12.65.1.s390x",
"SUSE Manager Client Tools for SLE Micro 5:libns1604-9.16.6-150000.12.65.1.x86_64",
"SUSE Manager Client Tools for SLE Micro 5:python3-bind-9.16.6-150000.12.65.1.noarch",
"SUSE Manager Proxy Module 4.2:python3-zypp-plugin-spacewalk-1.0.14-150000.3.35.1.noarch",
"SUSE Manager Proxy Module 4.2:zypp-plugin-spacewalk-1.0.14-150000.3.35.1.noarch",
"SUSE Manager Proxy Module 4.3:python3-zypp-plugin-spacewalk-1.0.14-150000.3.35.1.noarch",
"SUSE Manager Proxy Module 4.3:zypp-plugin-spacewalk-1.0.14-150000.3.35.1.noarch",
"openSUSE Leap 15.4:bind-devel-32bit-9.16.6-150000.12.65.1.x86_64",
"openSUSE Leap 15.4:dracut-saltboot-0.1.1681904360.84ef141-150000.1.50.1.noarch",
"openSUSE Leap 15.4:libbind9-1600-32bit-9.16.6-150000.12.65.1.x86_64",
"openSUSE Leap 15.4:libdns1605-32bit-9.16.6-150000.12.65.1.x86_64",
"openSUSE Leap 15.4:libirs1601-32bit-9.16.6-150000.12.65.1.x86_64",
"openSUSE Leap 15.4:libisc1606-32bit-9.16.6-150000.12.65.1.x86_64",
"openSUSE Leap 15.4:libisccc1600-32bit-9.16.6-150000.12.65.1.x86_64",
"openSUSE Leap 15.4:libisccfg1600-32bit-9.16.6-150000.12.65.1.x86_64",
"openSUSE Leap 15.4:libns1604-32bit-9.16.6-150000.12.65.1.x86_64",
"openSUSE Leap 15.4:spacecmd-4.3.21-150000.3.98.1.noarch",
"openSUSE Leap 15.4:wire-0.5.0-150000.1.12.3.aarch64",
"openSUSE Leap 15.4:wire-0.5.0-150000.1.12.3.ppc64le",
"openSUSE Leap 15.4:wire-0.5.0-150000.1.12.3.s390x",
"openSUSE Leap 15.4:wire-0.5.0-150000.1.12.3.x86_64",
"openSUSE Leap 15.5:dracut-saltboot-0.1.1681904360.84ef141-150000.1.50.1.noarch",
"openSUSE Leap 15.5:spacecmd-4.3.21-150000.3.98.1.noarch",
"openSUSE Leap 15.5:wire-0.5.0-150000.1.12.3.aarch64",
"openSUSE Leap 15.5:wire-0.5.0-150000.1.12.3.ppc64le",
"openSUSE Leap 15.5:wire-0.5.0-150000.1.12.3.s390x",
"openSUSE Leap 15.5:wire-0.5.0-150000.1.12.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-7753",
"url": "https://www.suse.com/security/cve/CVE-2020-7753"
},
{
"category": "external",
"summary": "SUSE Bug 1218843 for CVE-2020-7753",
"url": "https://bugzilla.suse.com/1218843"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 7:bind-9.16.6-150000.12.65.1.aarch64",
"SUSE Enterprise Storage 7:bind-9.16.6-150000.12.65.1.x86_64",
"SUSE Enterprise Storage 7:bind-chrootenv-9.16.6-150000.12.65.1.aarch64",
"SUSE Enterprise Storage 7:bind-chrootenv-9.16.6-150000.12.65.1.x86_64",
"SUSE Enterprise Storage 7:bind-devel-9.16.6-150000.12.65.1.aarch64",
"SUSE Enterprise Storage 7:bind-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Enterprise Storage 7:bind-doc-9.16.6-150000.12.65.1.noarch",
"SUSE Enterprise Storage 7:bind-utils-9.16.6-150000.12.65.1.aarch64",
"SUSE Enterprise Storage 7:bind-utils-9.16.6-150000.12.65.1.x86_64",
"SUSE Enterprise Storage 7:libbind9-1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Enterprise Storage 7:libbind9-1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Enterprise Storage 7:libdns1605-9.16.6-150000.12.65.1.aarch64",
"SUSE Enterprise Storage 7:libdns1605-9.16.6-150000.12.65.1.x86_64",
"SUSE Enterprise Storage 7:libirs-devel-9.16.6-150000.12.65.1.aarch64",
"SUSE Enterprise Storage 7:libirs-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Enterprise Storage 7:libirs1601-9.16.6-150000.12.65.1.aarch64",
"SUSE Enterprise Storage 7:libirs1601-9.16.6-150000.12.65.1.x86_64",
"SUSE Enterprise Storage 7:libisc1606-9.16.6-150000.12.65.1.aarch64",
"SUSE Enterprise Storage 7:libisc1606-9.16.6-150000.12.65.1.x86_64",
"SUSE Enterprise Storage 7:libisccc1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Enterprise Storage 7:libisccc1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Enterprise Storage 7:libisccfg1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Enterprise Storage 7:libisccfg1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Enterprise Storage 7:libns1604-9.16.6-150000.12.65.1.aarch64",
"SUSE Enterprise Storage 7:libns1604-9.16.6-150000.12.65.1.x86_64",
"SUSE Enterprise Storage 7:python3-bind-9.16.6-150000.12.65.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:bind-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:bind-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:bind-chrootenv-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:bind-chrootenv-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:bind-devel-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:bind-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:bind-doc-9.16.6-150000.12.65.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:bind-utils-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:bind-utils-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libbind9-1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libbind9-1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libdns1605-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libdns1605-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libirs-devel-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libirs-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libirs1601-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libirs1601-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libisc1606-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libisc1606-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libisccc1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libisccc1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libisccfg1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libisccfg1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libns1604-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libns1604-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:python3-bind-9.16.6-150000.12.65.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:bind-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:bind-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:bind-chrootenv-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:bind-chrootenv-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:bind-devel-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:bind-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:bind-doc-9.16.6-150000.12.65.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:bind-utils-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:bind-utils-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libbind9-1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libbind9-1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libdns1605-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libdns1605-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libirs-devel-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libirs-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libirs1601-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libirs1601-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libisc1606-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libisc1606-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libisccc1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libisccc1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libisccfg1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libisccfg1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libns1604-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libns1604-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:python3-bind-9.16.6-150000.12.65.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-chrootenv-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-chrootenv-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-chrootenv-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-chrootenv-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-devel-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-devel-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-devel-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-doc-9.16.6-150000.12.65.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-utils-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-utils-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-utils-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-utils-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libbind9-1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libbind9-1600-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libbind9-1600-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libbind9-1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libdns1605-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libdns1605-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libdns1605-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libdns1605-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libirs-devel-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libirs-devel-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libirs-devel-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libirs-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libirs1601-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libirs1601-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libirs1601-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libirs1601-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libisc1606-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libisc1606-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libisc1606-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libisc1606-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libisccc1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libisccc1600-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libisccc1600-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libisccc1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libisccfg1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libisccfg1600-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libisccfg1600-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libisccfg1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libns1604-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libns1604-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libns1604-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libns1604-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:python3-bind-9.16.6-150000.12.65.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-chrootenv-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-chrootenv-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-chrootenv-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-chrootenv-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-devel-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-devel-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-devel-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-doc-9.16.6-150000.12.65.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-utils-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-utils-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-utils-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-utils-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libbind9-1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libbind9-1600-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libbind9-1600-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libbind9-1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libdns1605-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libdns1605-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libdns1605-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libdns1605-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libirs-devel-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libirs-devel-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libirs-devel-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libirs-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libirs1601-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libirs1601-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libirs1601-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libirs1601-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libisc1606-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libisc1606-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libisc1606-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libisc1606-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libisccc1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libisccc1600-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libisccc1600-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libisccc1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libisccfg1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libisccfg1600-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libisccfg1600-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libisccfg1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libns1604-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libns1604-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libns1604-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libns1604-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:python3-bind-9.16.6-150000.12.65.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:bind-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:bind-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:bind-chrootenv-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:bind-chrootenv-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:bind-devel-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:bind-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:bind-doc-9.16.6-150000.12.65.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:bind-utils-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:bind-utils-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libbind9-1600-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libbind9-1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libdns1605-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libdns1605-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libirs-devel-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libirs-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libirs1601-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libirs1601-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libisc1606-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libisc1606-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libisccc1600-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libisccc1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libisccfg1600-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libisccfg1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libns1604-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libns1604-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:python3-bind-9.16.6-150000.12.65.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:bind-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:bind-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:bind-chrootenv-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:bind-chrootenv-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:bind-devel-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:bind-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:bind-doc-9.16.6-150000.12.65.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:bind-utils-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:bind-utils-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libbind9-1600-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libbind9-1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libdns1605-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libdns1605-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libirs-devel-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libirs-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libirs1601-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libirs1601-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libisc1606-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libisc1606-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libisccc1600-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libisccc1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libisccfg1600-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libisccfg1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libns1604-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libns1604-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:python3-bind-9.16.6-150000.12.65.1.noarch",
"SUSE Manager Client Tools 15:dracut-saltboot-0.1.1681904360.84ef141-150000.1.50.1.noarch",
"SUSE Manager Client Tools 15:grafana-9.5.1-150000.1.48.5.aarch64",
"SUSE Manager Client Tools 15:grafana-9.5.1-150000.1.48.5.ppc64le",
"SUSE Manager Client Tools 15:grafana-9.5.1-150000.1.48.5.s390x",
"SUSE Manager Client Tools 15:grafana-9.5.1-150000.1.48.5.x86_64",
"SUSE Manager Client Tools 15:mgr-daemon-4.3.7-150000.1.41.1.noarch",
"SUSE Manager Client Tools 15:python3-uyuni-common-libs-4.3.8-150000.1.33.1.aarch64",
"SUSE Manager Client Tools 15:python3-uyuni-common-libs-4.3.8-150000.1.33.1.ppc64le",
"SUSE Manager Client Tools 15:python3-uyuni-common-libs-4.3.8-150000.1.33.1.s390x",
"SUSE Manager Client Tools 15:python3-uyuni-common-libs-4.3.8-150000.1.33.1.x86_64",
"SUSE Manager Client Tools 15:python3-zypp-plugin-spacewalk-1.0.14-150000.3.35.1.noarch",
"SUSE Manager Client Tools 15:spacecmd-4.3.21-150000.3.98.1.noarch",
"SUSE Manager Client Tools 15:zypp-plugin-spacewalk-1.0.14-150000.3.35.1.noarch",
"SUSE Manager Client Tools for SLE Micro 5:bind-utils-9.16.6-150000.12.65.1.aarch64",
"SUSE Manager Client Tools for SLE Micro 5:bind-utils-9.16.6-150000.12.65.1.s390x",
"SUSE Manager Client Tools for SLE Micro 5:bind-utils-9.16.6-150000.12.65.1.x86_64",
"SUSE Manager Client Tools for SLE Micro 5:dracut-saltboot-0.1.1681904360.84ef141-150000.1.50.1.noarch",
"SUSE Manager Client Tools for SLE Micro 5:libbind9-1600-64bit-9.16.6-150000.12.65.1.aarch64_ilp32",
"SUSE Manager Client Tools for SLE Micro 5:libbind9-1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Manager Client Tools for SLE Micro 5:libbind9-1600-9.16.6-150000.12.65.1.s390x",
"SUSE Manager Client Tools for SLE Micro 5:libbind9-1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Manager Client Tools for SLE Micro 5:libdns1605-64bit-9.16.6-150000.12.65.1.aarch64_ilp32",
"SUSE Manager Client Tools for SLE Micro 5:libdns1605-9.16.6-150000.12.65.1.aarch64",
"SUSE Manager Client Tools for SLE Micro 5:libdns1605-9.16.6-150000.12.65.1.s390x",
"SUSE Manager Client Tools for SLE Micro 5:libdns1605-9.16.6-150000.12.65.1.x86_64",
"SUSE Manager Client Tools for SLE Micro 5:libirs1601-64bit-9.16.6-150000.12.65.1.aarch64_ilp32",
"SUSE Manager Client Tools for SLE Micro 5:libirs1601-9.16.6-150000.12.65.1.aarch64",
"SUSE Manager Client Tools for SLE Micro 5:libirs1601-9.16.6-150000.12.65.1.s390x",
"SUSE Manager Client Tools for SLE Micro 5:libirs1601-9.16.6-150000.12.65.1.x86_64",
"SUSE Manager Client Tools for SLE Micro 5:libisc1606-64bit-9.16.6-150000.12.65.1.aarch64_ilp32",
"SUSE Manager Client Tools for SLE Micro 5:libisc1606-9.16.6-150000.12.65.1.aarch64",
"SUSE Manager Client Tools for SLE Micro 5:libisc1606-9.16.6-150000.12.65.1.s390x",
"SUSE Manager Client Tools for SLE Micro 5:libisc1606-9.16.6-150000.12.65.1.x86_64",
"SUSE Manager Client Tools for SLE Micro 5:libisccc1600-64bit-9.16.6-150000.12.65.1.aarch64_ilp32",
"SUSE Manager Client Tools for SLE Micro 5:libisccc1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Manager Client Tools for SLE Micro 5:libisccc1600-9.16.6-150000.12.65.1.s390x",
"SUSE Manager Client Tools for SLE Micro 5:libisccc1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Manager Client Tools for SLE Micro 5:libisccfg1600-64bit-9.16.6-150000.12.65.1.aarch64_ilp32",
"SUSE Manager Client Tools for SLE Micro 5:libisccfg1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Manager Client Tools for SLE Micro 5:libisccfg1600-9.16.6-150000.12.65.1.s390x",
"SUSE Manager Client Tools for SLE Micro 5:libisccfg1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Manager Client Tools for SLE Micro 5:libns1604-9.16.6-150000.12.65.1.s390x",
"SUSE Manager Client Tools for SLE Micro 5:libns1604-9.16.6-150000.12.65.1.x86_64",
"SUSE Manager Client Tools for SLE Micro 5:python3-bind-9.16.6-150000.12.65.1.noarch",
"SUSE Manager Proxy Module 4.2:python3-zypp-plugin-spacewalk-1.0.14-150000.3.35.1.noarch",
"SUSE Manager Proxy Module 4.2:zypp-plugin-spacewalk-1.0.14-150000.3.35.1.noarch",
"SUSE Manager Proxy Module 4.3:python3-zypp-plugin-spacewalk-1.0.14-150000.3.35.1.noarch",
"SUSE Manager Proxy Module 4.3:zypp-plugin-spacewalk-1.0.14-150000.3.35.1.noarch",
"openSUSE Leap 15.4:bind-devel-32bit-9.16.6-150000.12.65.1.x86_64",
"openSUSE Leap 15.4:dracut-saltboot-0.1.1681904360.84ef141-150000.1.50.1.noarch",
"openSUSE Leap 15.4:libbind9-1600-32bit-9.16.6-150000.12.65.1.x86_64",
"openSUSE Leap 15.4:libdns1605-32bit-9.16.6-150000.12.65.1.x86_64",
"openSUSE Leap 15.4:libirs1601-32bit-9.16.6-150000.12.65.1.x86_64",
"openSUSE Leap 15.4:libisc1606-32bit-9.16.6-150000.12.65.1.x86_64",
"openSUSE Leap 15.4:libisccc1600-32bit-9.16.6-150000.12.65.1.x86_64",
"openSUSE Leap 15.4:libisccfg1600-32bit-9.16.6-150000.12.65.1.x86_64",
"openSUSE Leap 15.4:libns1604-32bit-9.16.6-150000.12.65.1.x86_64",
"openSUSE Leap 15.4:spacecmd-4.3.21-150000.3.98.1.noarch",
"openSUSE Leap 15.4:wire-0.5.0-150000.1.12.3.aarch64",
"openSUSE Leap 15.4:wire-0.5.0-150000.1.12.3.ppc64le",
"openSUSE Leap 15.4:wire-0.5.0-150000.1.12.3.s390x",
"openSUSE Leap 15.4:wire-0.5.0-150000.1.12.3.x86_64",
"openSUSE Leap 15.5:dracut-saltboot-0.1.1681904360.84ef141-150000.1.50.1.noarch",
"openSUSE Leap 15.5:spacecmd-4.3.21-150000.3.98.1.noarch",
"openSUSE Leap 15.5:wire-0.5.0-150000.1.12.3.aarch64",
"openSUSE Leap 15.5:wire-0.5.0-150000.1.12.3.ppc64le",
"openSUSE Leap 15.5:wire-0.5.0-150000.1.12.3.s390x",
"openSUSE Leap 15.5:wire-0.5.0-150000.1.12.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 7:bind-9.16.6-150000.12.65.1.aarch64",
"SUSE Enterprise Storage 7:bind-9.16.6-150000.12.65.1.x86_64",
"SUSE Enterprise Storage 7:bind-chrootenv-9.16.6-150000.12.65.1.aarch64",
"SUSE Enterprise Storage 7:bind-chrootenv-9.16.6-150000.12.65.1.x86_64",
"SUSE Enterprise Storage 7:bind-devel-9.16.6-150000.12.65.1.aarch64",
"SUSE Enterprise Storage 7:bind-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Enterprise Storage 7:bind-doc-9.16.6-150000.12.65.1.noarch",
"SUSE Enterprise Storage 7:bind-utils-9.16.6-150000.12.65.1.aarch64",
"SUSE Enterprise Storage 7:bind-utils-9.16.6-150000.12.65.1.x86_64",
"SUSE Enterprise Storage 7:libbind9-1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Enterprise Storage 7:libbind9-1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Enterprise Storage 7:libdns1605-9.16.6-150000.12.65.1.aarch64",
"SUSE Enterprise Storage 7:libdns1605-9.16.6-150000.12.65.1.x86_64",
"SUSE Enterprise Storage 7:libirs-devel-9.16.6-150000.12.65.1.aarch64",
"SUSE Enterprise Storage 7:libirs-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Enterprise Storage 7:libirs1601-9.16.6-150000.12.65.1.aarch64",
"SUSE Enterprise Storage 7:libirs1601-9.16.6-150000.12.65.1.x86_64",
"SUSE Enterprise Storage 7:libisc1606-9.16.6-150000.12.65.1.aarch64",
"SUSE Enterprise Storage 7:libisc1606-9.16.6-150000.12.65.1.x86_64",
"SUSE Enterprise Storage 7:libisccc1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Enterprise Storage 7:libisccc1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Enterprise Storage 7:libisccfg1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Enterprise Storage 7:libisccfg1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Enterprise Storage 7:libns1604-9.16.6-150000.12.65.1.aarch64",
"SUSE Enterprise Storage 7:libns1604-9.16.6-150000.12.65.1.x86_64",
"SUSE Enterprise Storage 7:python3-bind-9.16.6-150000.12.65.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:bind-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:bind-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:bind-chrootenv-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:bind-chrootenv-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:bind-devel-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:bind-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:bind-doc-9.16.6-150000.12.65.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:bind-utils-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:bind-utils-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libbind9-1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libbind9-1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libdns1605-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libdns1605-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libirs-devel-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libirs-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libirs1601-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libirs1601-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libisc1606-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libisc1606-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libisccc1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libisccc1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libisccfg1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libisccfg1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libns1604-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libns1604-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:python3-bind-9.16.6-150000.12.65.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:bind-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:bind-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:bind-chrootenv-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:bind-chrootenv-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:bind-devel-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:bind-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:bind-doc-9.16.6-150000.12.65.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:bind-utils-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:bind-utils-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libbind9-1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libbind9-1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libdns1605-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libdns1605-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libirs-devel-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libirs-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libirs1601-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libirs1601-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libisc1606-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libisc1606-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libisccc1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libisccc1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libisccfg1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libisccfg1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libns1604-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libns1604-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:python3-bind-9.16.6-150000.12.65.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-chrootenv-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-chrootenv-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-chrootenv-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-chrootenv-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-devel-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-devel-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-devel-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-doc-9.16.6-150000.12.65.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-utils-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-utils-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-utils-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-utils-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libbind9-1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libbind9-1600-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libbind9-1600-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libbind9-1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libdns1605-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libdns1605-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libdns1605-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libdns1605-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libirs-devel-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libirs-devel-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libirs-devel-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libirs-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libirs1601-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libirs1601-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libirs1601-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libirs1601-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libisc1606-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libisc1606-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libisc1606-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libisc1606-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libisccc1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libisccc1600-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libisccc1600-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libisccc1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libisccfg1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libisccfg1600-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libisccfg1600-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libisccfg1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libns1604-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libns1604-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libns1604-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libns1604-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:python3-bind-9.16.6-150000.12.65.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-chrootenv-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-chrootenv-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-chrootenv-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-chrootenv-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-devel-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-devel-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-devel-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-doc-9.16.6-150000.12.65.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-utils-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-utils-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-utils-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-utils-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libbind9-1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libbind9-1600-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libbind9-1600-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libbind9-1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libdns1605-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libdns1605-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libdns1605-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libdns1605-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libirs-devel-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libirs-devel-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libirs-devel-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libirs-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libirs1601-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libirs1601-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libirs1601-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libirs1601-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libisc1606-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libisc1606-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libisc1606-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libisc1606-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libisccc1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libisccc1600-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libisccc1600-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libisccc1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libisccfg1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libisccfg1600-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libisccfg1600-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libisccfg1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libns1604-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libns1604-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libns1604-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libns1604-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:python3-bind-9.16.6-150000.12.65.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:bind-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:bind-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:bind-chrootenv-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:bind-chrootenv-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:bind-devel-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:bind-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:bind-doc-9.16.6-150000.12.65.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:bind-utils-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:bind-utils-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libbind9-1600-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libbind9-1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libdns1605-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libdns1605-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libirs-devel-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libirs-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libirs1601-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libirs1601-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libisc1606-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libisc1606-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libisccc1600-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libisccc1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libisccfg1600-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libisccfg1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libns1604-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libns1604-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:python3-bind-9.16.6-150000.12.65.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:bind-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:bind-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:bind-chrootenv-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:bind-chrootenv-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:bind-devel-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:bind-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:bind-doc-9.16.6-150000.12.65.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:bind-utils-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:bind-utils-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libbind9-1600-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libbind9-1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libdns1605-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libdns1605-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libirs-devel-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libirs-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libirs1601-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libirs1601-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libisc1606-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libisc1606-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libisccc1600-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libisccc1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libisccfg1600-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libisccfg1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libns1604-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libns1604-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:python3-bind-9.16.6-150000.12.65.1.noarch",
"SUSE Manager Client Tools 15:dracut-saltboot-0.1.1681904360.84ef141-150000.1.50.1.noarch",
"SUSE Manager Client Tools 15:grafana-9.5.1-150000.1.48.5.aarch64",
"SUSE Manager Client Tools 15:grafana-9.5.1-150000.1.48.5.ppc64le",
"SUSE Manager Client Tools 15:grafana-9.5.1-150000.1.48.5.s390x",
"SUSE Manager Client Tools 15:grafana-9.5.1-150000.1.48.5.x86_64",
"SUSE Manager Client Tools 15:mgr-daemon-4.3.7-150000.1.41.1.noarch",
"SUSE Manager Client Tools 15:python3-uyuni-common-libs-4.3.8-150000.1.33.1.aarch64",
"SUSE Manager Client Tools 15:python3-uyuni-common-libs-4.3.8-150000.1.33.1.ppc64le",
"SUSE Manager Client Tools 15:python3-uyuni-common-libs-4.3.8-150000.1.33.1.s390x",
"SUSE Manager Client Tools 15:python3-uyuni-common-libs-4.3.8-150000.1.33.1.x86_64",
"SUSE Manager Client Tools 15:python3-zypp-plugin-spacewalk-1.0.14-150000.3.35.1.noarch",
"SUSE Manager Client Tools 15:spacecmd-4.3.21-150000.3.98.1.noarch",
"SUSE Manager Client Tools 15:zypp-plugin-spacewalk-1.0.14-150000.3.35.1.noarch",
"SUSE Manager Client Tools for SLE Micro 5:bind-utils-9.16.6-150000.12.65.1.aarch64",
"SUSE Manager Client Tools for SLE Micro 5:bind-utils-9.16.6-150000.12.65.1.s390x",
"SUSE Manager Client Tools for SLE Micro 5:bind-utils-9.16.6-150000.12.65.1.x86_64",
"SUSE Manager Client Tools for SLE Micro 5:dracut-saltboot-0.1.1681904360.84ef141-150000.1.50.1.noarch",
"SUSE Manager Client Tools for SLE Micro 5:libbind9-1600-64bit-9.16.6-150000.12.65.1.aarch64_ilp32",
"SUSE Manager Client Tools for SLE Micro 5:libbind9-1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Manager Client Tools for SLE Micro 5:libbind9-1600-9.16.6-150000.12.65.1.s390x",
"SUSE Manager Client Tools for SLE Micro 5:libbind9-1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Manager Client Tools for SLE Micro 5:libdns1605-64bit-9.16.6-150000.12.65.1.aarch64_ilp32",
"SUSE Manager Client Tools for SLE Micro 5:libdns1605-9.16.6-150000.12.65.1.aarch64",
"SUSE Manager Client Tools for SLE Micro 5:libdns1605-9.16.6-150000.12.65.1.s390x",
"SUSE Manager Client Tools for SLE Micro 5:libdns1605-9.16.6-150000.12.65.1.x86_64",
"SUSE Manager Client Tools for SLE Micro 5:libirs1601-64bit-9.16.6-150000.12.65.1.aarch64_ilp32",
"SUSE Manager Client Tools for SLE Micro 5:libirs1601-9.16.6-150000.12.65.1.aarch64",
"SUSE Manager Client Tools for SLE Micro 5:libirs1601-9.16.6-150000.12.65.1.s390x",
"SUSE Manager Client Tools for SLE Micro 5:libirs1601-9.16.6-150000.12.65.1.x86_64",
"SUSE Manager Client Tools for SLE Micro 5:libisc1606-64bit-9.16.6-150000.12.65.1.aarch64_ilp32",
"SUSE Manager Client Tools for SLE Micro 5:libisc1606-9.16.6-150000.12.65.1.aarch64",
"SUSE Manager Client Tools for SLE Micro 5:libisc1606-9.16.6-150000.12.65.1.s390x",
"SUSE Manager Client Tools for SLE Micro 5:libisc1606-9.16.6-150000.12.65.1.x86_64",
"SUSE Manager Client Tools for SLE Micro 5:libisccc1600-64bit-9.16.6-150000.12.65.1.aarch64_ilp32",
"SUSE Manager Client Tools for SLE Micro 5:libisccc1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Manager Client Tools for SLE Micro 5:libisccc1600-9.16.6-150000.12.65.1.s390x",
"SUSE Manager Client Tools for SLE Micro 5:libisccc1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Manager Client Tools for SLE Micro 5:libisccfg1600-64bit-9.16.6-150000.12.65.1.aarch64_ilp32",
"SUSE Manager Client Tools for SLE Micro 5:libisccfg1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Manager Client Tools for SLE Micro 5:libisccfg1600-9.16.6-150000.12.65.1.s390x",
"SUSE Manager Client Tools for SLE Micro 5:libisccfg1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Manager Client Tools for SLE Micro 5:libns1604-9.16.6-150000.12.65.1.s390x",
"SUSE Manager Client Tools for SLE Micro 5:libns1604-9.16.6-150000.12.65.1.x86_64",
"SUSE Manager Client Tools for SLE Micro 5:python3-bind-9.16.6-150000.12.65.1.noarch",
"SUSE Manager Proxy Module 4.2:python3-zypp-plugin-spacewalk-1.0.14-150000.3.35.1.noarch",
"SUSE Manager Proxy Module 4.2:zypp-plugin-spacewalk-1.0.14-150000.3.35.1.noarch",
"SUSE Manager Proxy Module 4.3:python3-zypp-plugin-spacewalk-1.0.14-150000.3.35.1.noarch",
"SUSE Manager Proxy Module 4.3:zypp-plugin-spacewalk-1.0.14-150000.3.35.1.noarch",
"openSUSE Leap 15.4:bind-devel-32bit-9.16.6-150000.12.65.1.x86_64",
"openSUSE Leap 15.4:dracut-saltboot-0.1.1681904360.84ef141-150000.1.50.1.noarch",
"openSUSE Leap 15.4:libbind9-1600-32bit-9.16.6-150000.12.65.1.x86_64",
"openSUSE Leap 15.4:libdns1605-32bit-9.16.6-150000.12.65.1.x86_64",
"openSUSE Leap 15.4:libirs1601-32bit-9.16.6-150000.12.65.1.x86_64",
"openSUSE Leap 15.4:libisc1606-32bit-9.16.6-150000.12.65.1.x86_64",
"openSUSE Leap 15.4:libisccc1600-32bit-9.16.6-150000.12.65.1.x86_64",
"openSUSE Leap 15.4:libisccfg1600-32bit-9.16.6-150000.12.65.1.x86_64",
"openSUSE Leap 15.4:libns1604-32bit-9.16.6-150000.12.65.1.x86_64",
"openSUSE Leap 15.4:spacecmd-4.3.21-150000.3.98.1.noarch",
"openSUSE Leap 15.4:wire-0.5.0-150000.1.12.3.aarch64",
"openSUSE Leap 15.4:wire-0.5.0-150000.1.12.3.ppc64le",
"openSUSE Leap 15.4:wire-0.5.0-150000.1.12.3.s390x",
"openSUSE Leap 15.4:wire-0.5.0-150000.1.12.3.x86_64",
"openSUSE Leap 15.5:dracut-saltboot-0.1.1681904360.84ef141-150000.1.50.1.noarch",
"openSUSE Leap 15.5:spacecmd-4.3.21-150000.3.98.1.noarch",
"openSUSE Leap 15.5:wire-0.5.0-150000.1.12.3.aarch64",
"openSUSE Leap 15.5:wire-0.5.0-150000.1.12.3.ppc64le",
"openSUSE Leap 15.5:wire-0.5.0-150000.1.12.3.s390x",
"openSUSE Leap 15.5:wire-0.5.0-150000.1.12.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2023-06-21T11:49:43Z",
"details": "important"
}
],
"title": "CVE-2020-7753"
},
{
"cve": "CVE-2021-3807",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-3807"
}
],
"notes": [
{
"category": "general",
"text": "ansi-regex is vulnerable to Inefficient Regular Expression Complexity",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 7:bind-9.16.6-150000.12.65.1.aarch64",
"SUSE Enterprise Storage 7:bind-9.16.6-150000.12.65.1.x86_64",
"SUSE Enterprise Storage 7:bind-chrootenv-9.16.6-150000.12.65.1.aarch64",
"SUSE Enterprise Storage 7:bind-chrootenv-9.16.6-150000.12.65.1.x86_64",
"SUSE Enterprise Storage 7:bind-devel-9.16.6-150000.12.65.1.aarch64",
"SUSE Enterprise Storage 7:bind-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Enterprise Storage 7:bind-doc-9.16.6-150000.12.65.1.noarch",
"SUSE Enterprise Storage 7:bind-utils-9.16.6-150000.12.65.1.aarch64",
"SUSE Enterprise Storage 7:bind-utils-9.16.6-150000.12.65.1.x86_64",
"SUSE Enterprise Storage 7:libbind9-1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Enterprise Storage 7:libbind9-1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Enterprise Storage 7:libdns1605-9.16.6-150000.12.65.1.aarch64",
"SUSE Enterprise Storage 7:libdns1605-9.16.6-150000.12.65.1.x86_64",
"SUSE Enterprise Storage 7:libirs-devel-9.16.6-150000.12.65.1.aarch64",
"SUSE Enterprise Storage 7:libirs-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Enterprise Storage 7:libirs1601-9.16.6-150000.12.65.1.aarch64",
"SUSE Enterprise Storage 7:libirs1601-9.16.6-150000.12.65.1.x86_64",
"SUSE Enterprise Storage 7:libisc1606-9.16.6-150000.12.65.1.aarch64",
"SUSE Enterprise Storage 7:libisc1606-9.16.6-150000.12.65.1.x86_64",
"SUSE Enterprise Storage 7:libisccc1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Enterprise Storage 7:libisccc1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Enterprise Storage 7:libisccfg1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Enterprise Storage 7:libisccfg1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Enterprise Storage 7:libns1604-9.16.6-150000.12.65.1.aarch64",
"SUSE Enterprise Storage 7:libns1604-9.16.6-150000.12.65.1.x86_64",
"SUSE Enterprise Storage 7:python3-bind-9.16.6-150000.12.65.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:bind-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:bind-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:bind-chrootenv-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:bind-chrootenv-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:bind-devel-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:bind-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:bind-doc-9.16.6-150000.12.65.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:bind-utils-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:bind-utils-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libbind9-1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libbind9-1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libdns1605-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libdns1605-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libirs-devel-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libirs-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libirs1601-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libirs1601-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libisc1606-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libisc1606-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libisccc1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libisccc1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libisccfg1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libisccfg1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libns1604-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libns1604-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:python3-bind-9.16.6-150000.12.65.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:bind-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:bind-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:bind-chrootenv-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:bind-chrootenv-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:bind-devel-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:bind-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:bind-doc-9.16.6-150000.12.65.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:bind-utils-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:bind-utils-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libbind9-1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libbind9-1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libdns1605-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libdns1605-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libirs-devel-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libirs-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libirs1601-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libirs1601-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libisc1606-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libisc1606-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libisccc1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libisccc1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libisccfg1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libisccfg1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libns1604-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libns1604-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:python3-bind-9.16.6-150000.12.65.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-chrootenv-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-chrootenv-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-chrootenv-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-chrootenv-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-devel-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-devel-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-devel-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-doc-9.16.6-150000.12.65.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-utils-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-utils-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-utils-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-utils-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libbind9-1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libbind9-1600-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libbind9-1600-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libbind9-1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libdns1605-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libdns1605-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libdns1605-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libdns1605-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libirs-devel-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libirs-devel-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libirs-devel-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libirs-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libirs1601-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libirs1601-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libirs1601-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libirs1601-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libisc1606-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libisc1606-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libisc1606-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libisc1606-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libisccc1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libisccc1600-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libisccc1600-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libisccc1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libisccfg1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libisccfg1600-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libisccfg1600-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libisccfg1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libns1604-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libns1604-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libns1604-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libns1604-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:python3-bind-9.16.6-150000.12.65.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-chrootenv-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-chrootenv-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-chrootenv-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-chrootenv-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-devel-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-devel-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-devel-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-doc-9.16.6-150000.12.65.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-utils-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-utils-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-utils-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-utils-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libbind9-1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libbind9-1600-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libbind9-1600-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libbind9-1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libdns1605-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libdns1605-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libdns1605-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libdns1605-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libirs-devel-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libirs-devel-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libirs-devel-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libirs-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libirs1601-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libirs1601-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libirs1601-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libirs1601-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libisc1606-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libisc1606-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libisc1606-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libisc1606-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libisccc1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libisccc1600-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libisccc1600-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libisccc1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libisccfg1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libisccfg1600-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libisccfg1600-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libisccfg1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libns1604-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libns1604-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libns1604-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libns1604-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:python3-bind-9.16.6-150000.12.65.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:bind-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:bind-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:bind-chrootenv-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:bind-chrootenv-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:bind-devel-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:bind-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:bind-doc-9.16.6-150000.12.65.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:bind-utils-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:bind-utils-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libbind9-1600-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libbind9-1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libdns1605-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libdns1605-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libirs-devel-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libirs-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libirs1601-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libirs1601-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libisc1606-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libisc1606-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libisccc1600-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libisccc1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libisccfg1600-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libisccfg1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libns1604-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libns1604-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:python3-bind-9.16.6-150000.12.65.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:bind-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:bind-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:bind-chrootenv-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:bind-chrootenv-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:bind-devel-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:bind-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:bind-doc-9.16.6-150000.12.65.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:bind-utils-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:bind-utils-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libbind9-1600-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libbind9-1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libdns1605-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libdns1605-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libirs-devel-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libirs-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libirs1601-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libirs1601-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libisc1606-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libisc1606-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libisccc1600-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libisccc1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libisccfg1600-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libisccfg1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libns1604-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libns1604-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:python3-bind-9.16.6-150000.12.65.1.noarch",
"SUSE Manager Client Tools 15:dracut-saltboot-0.1.1681904360.84ef141-150000.1.50.1.noarch",
"SUSE Manager Client Tools 15:grafana-9.5.1-150000.1.48.5.aarch64",
"SUSE Manager Client Tools 15:grafana-9.5.1-150000.1.48.5.ppc64le",
"SUSE Manager Client Tools 15:grafana-9.5.1-150000.1.48.5.s390x",
"SUSE Manager Client Tools 15:grafana-9.5.1-150000.1.48.5.x86_64",
"SUSE Manager Client Tools 15:mgr-daemon-4.3.7-150000.1.41.1.noarch",
"SUSE Manager Client Tools 15:python3-uyuni-common-libs-4.3.8-150000.1.33.1.aarch64",
"SUSE Manager Client Tools 15:python3-uyuni-common-libs-4.3.8-150000.1.33.1.ppc64le",
"SUSE Manager Client Tools 15:python3-uyuni-common-libs-4.3.8-150000.1.33.1.s390x",
"SUSE Manager Client Tools 15:python3-uyuni-common-libs-4.3.8-150000.1.33.1.x86_64",
"SUSE Manager Client Tools 15:python3-zypp-plugin-spacewalk-1.0.14-150000.3.35.1.noarch",
"SUSE Manager Client Tools 15:spacecmd-4.3.21-150000.3.98.1.noarch",
"SUSE Manager Client Tools 15:zypp-plugin-spacewalk-1.0.14-150000.3.35.1.noarch",
"SUSE Manager Client Tools for SLE Micro 5:bind-utils-9.16.6-150000.12.65.1.aarch64",
"SUSE Manager Client Tools for SLE Micro 5:bind-utils-9.16.6-150000.12.65.1.s390x",
"SUSE Manager Client Tools for SLE Micro 5:bind-utils-9.16.6-150000.12.65.1.x86_64",
"SUSE Manager Client Tools for SLE Micro 5:dracut-saltboot-0.1.1681904360.84ef141-150000.1.50.1.noarch",
"SUSE Manager Client Tools for SLE Micro 5:libbind9-1600-64bit-9.16.6-150000.12.65.1.aarch64_ilp32",
"SUSE Manager Client Tools for SLE Micro 5:libbind9-1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Manager Client Tools for SLE Micro 5:libbind9-1600-9.16.6-150000.12.65.1.s390x",
"SUSE Manager Client Tools for SLE Micro 5:libbind9-1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Manager Client Tools for SLE Micro 5:libdns1605-64bit-9.16.6-150000.12.65.1.aarch64_ilp32",
"SUSE Manager Client Tools for SLE Micro 5:libdns1605-9.16.6-150000.12.65.1.aarch64",
"SUSE Manager Client Tools for SLE Micro 5:libdns1605-9.16.6-150000.12.65.1.s390x",
"SUSE Manager Client Tools for SLE Micro 5:libdns1605-9.16.6-150000.12.65.1.x86_64",
"SUSE Manager Client Tools for SLE Micro 5:libirs1601-64bit-9.16.6-150000.12.65.1.aarch64_ilp32",
"SUSE Manager Client Tools for SLE Micro 5:libirs1601-9.16.6-150000.12.65.1.aarch64",
"SUSE Manager Client Tools for SLE Micro 5:libirs1601-9.16.6-150000.12.65.1.s390x",
"SUSE Manager Client Tools for SLE Micro 5:libirs1601-9.16.6-150000.12.65.1.x86_64",
"SUSE Manager Client Tools for SLE Micro 5:libisc1606-64bit-9.16.6-150000.12.65.1.aarch64_ilp32",
"SUSE Manager Client Tools for SLE Micro 5:libisc1606-9.16.6-150000.12.65.1.aarch64",
"SUSE Manager Client Tools for SLE Micro 5:libisc1606-9.16.6-150000.12.65.1.s390x",
"SUSE Manager Client Tools for SLE Micro 5:libisc1606-9.16.6-150000.12.65.1.x86_64",
"SUSE Manager Client Tools for SLE Micro 5:libisccc1600-64bit-9.16.6-150000.12.65.1.aarch64_ilp32",
"SUSE Manager Client Tools for SLE Micro 5:libisccc1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Manager Client Tools for SLE Micro 5:libisccc1600-9.16.6-150000.12.65.1.s390x",
"SUSE Manager Client Tools for SLE Micro 5:libisccc1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Manager Client Tools for SLE Micro 5:libisccfg1600-64bit-9.16.6-150000.12.65.1.aarch64_ilp32",
"SUSE Manager Client Tools for SLE Micro 5:libisccfg1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Manager Client Tools for SLE Micro 5:libisccfg1600-9.16.6-150000.12.65.1.s390x",
"SUSE Manager Client Tools for SLE Micro 5:libisccfg1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Manager Client Tools for SLE Micro 5:libns1604-9.16.6-150000.12.65.1.s390x",
"SUSE Manager Client Tools for SLE Micro 5:libns1604-9.16.6-150000.12.65.1.x86_64",
"SUSE Manager Client Tools for SLE Micro 5:python3-bind-9.16.6-150000.12.65.1.noarch",
"SUSE Manager Proxy Module 4.2:python3-zypp-plugin-spacewalk-1.0.14-150000.3.35.1.noarch",
"SUSE Manager Proxy Module 4.2:zypp-plugin-spacewalk-1.0.14-150000.3.35.1.noarch",
"SUSE Manager Proxy Module 4.3:python3-zypp-plugin-spacewalk-1.0.14-150000.3.35.1.noarch",
"SUSE Manager Proxy Module 4.3:zypp-plugin-spacewalk-1.0.14-150000.3.35.1.noarch",
"openSUSE Leap 15.4:bind-devel-32bit-9.16.6-150000.12.65.1.x86_64",
"openSUSE Leap 15.4:dracut-saltboot-0.1.1681904360.84ef141-150000.1.50.1.noarch",
"openSUSE Leap 15.4:libbind9-1600-32bit-9.16.6-150000.12.65.1.x86_64",
"openSUSE Leap 15.4:libdns1605-32bit-9.16.6-150000.12.65.1.x86_64",
"openSUSE Leap 15.4:libirs1601-32bit-9.16.6-150000.12.65.1.x86_64",
"openSUSE Leap 15.4:libisc1606-32bit-9.16.6-150000.12.65.1.x86_64",
"openSUSE Leap 15.4:libisccc1600-32bit-9.16.6-150000.12.65.1.x86_64",
"openSUSE Leap 15.4:libisccfg1600-32bit-9.16.6-150000.12.65.1.x86_64",
"openSUSE Leap 15.4:libns1604-32bit-9.16.6-150000.12.65.1.x86_64",
"openSUSE Leap 15.4:spacecmd-4.3.21-150000.3.98.1.noarch",
"openSUSE Leap 15.4:wire-0.5.0-150000.1.12.3.aarch64",
"openSUSE Leap 15.4:wire-0.5.0-150000.1.12.3.ppc64le",
"openSUSE Leap 15.4:wire-0.5.0-150000.1.12.3.s390x",
"openSUSE Leap 15.4:wire-0.5.0-150000.1.12.3.x86_64",
"openSUSE Leap 15.5:dracut-saltboot-0.1.1681904360.84ef141-150000.1.50.1.noarch",
"openSUSE Leap 15.5:spacecmd-4.3.21-150000.3.98.1.noarch",
"openSUSE Leap 15.5:wire-0.5.0-150000.1.12.3.aarch64",
"openSUSE Leap 15.5:wire-0.5.0-150000.1.12.3.ppc64le",
"openSUSE Leap 15.5:wire-0.5.0-150000.1.12.3.s390x",
"openSUSE Leap 15.5:wire-0.5.0-150000.1.12.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-3807",
"url": "https://www.suse.com/security/cve/CVE-2021-3807"
},
{
"category": "external",
"summary": "SUSE Bug 1192154 for CVE-2021-3807",
"url": "https://bugzilla.suse.com/1192154"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 7:bind-9.16.6-150000.12.65.1.aarch64",
"SUSE Enterprise Storage 7:bind-9.16.6-150000.12.65.1.x86_64",
"SUSE Enterprise Storage 7:bind-chrootenv-9.16.6-150000.12.65.1.aarch64",
"SUSE Enterprise Storage 7:bind-chrootenv-9.16.6-150000.12.65.1.x86_64",
"SUSE Enterprise Storage 7:bind-devel-9.16.6-150000.12.65.1.aarch64",
"SUSE Enterprise Storage 7:bind-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Enterprise Storage 7:bind-doc-9.16.6-150000.12.65.1.noarch",
"SUSE Enterprise Storage 7:bind-utils-9.16.6-150000.12.65.1.aarch64",
"SUSE Enterprise Storage 7:bind-utils-9.16.6-150000.12.65.1.x86_64",
"SUSE Enterprise Storage 7:libbind9-1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Enterprise Storage 7:libbind9-1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Enterprise Storage 7:libdns1605-9.16.6-150000.12.65.1.aarch64",
"SUSE Enterprise Storage 7:libdns1605-9.16.6-150000.12.65.1.x86_64",
"SUSE Enterprise Storage 7:libirs-devel-9.16.6-150000.12.65.1.aarch64",
"SUSE Enterprise Storage 7:libirs-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Enterprise Storage 7:libirs1601-9.16.6-150000.12.65.1.aarch64",
"SUSE Enterprise Storage 7:libirs1601-9.16.6-150000.12.65.1.x86_64",
"SUSE Enterprise Storage 7:libisc1606-9.16.6-150000.12.65.1.aarch64",
"SUSE Enterprise Storage 7:libisc1606-9.16.6-150000.12.65.1.x86_64",
"SUSE Enterprise Storage 7:libisccc1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Enterprise Storage 7:libisccc1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Enterprise Storage 7:libisccfg1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Enterprise Storage 7:libisccfg1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Enterprise Storage 7:libns1604-9.16.6-150000.12.65.1.aarch64",
"SUSE Enterprise Storage 7:libns1604-9.16.6-150000.12.65.1.x86_64",
"SUSE Enterprise Storage 7:python3-bind-9.16.6-150000.12.65.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:bind-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:bind-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:bind-chrootenv-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:bind-chrootenv-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:bind-devel-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:bind-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:bind-doc-9.16.6-150000.12.65.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:bind-utils-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:bind-utils-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libbind9-1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libbind9-1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libdns1605-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libdns1605-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libirs-devel-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libirs-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libirs1601-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libirs1601-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libisc1606-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libisc1606-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libisccc1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libisccc1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libisccfg1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libisccfg1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libns1604-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libns1604-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:python3-bind-9.16.6-150000.12.65.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:bind-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:bind-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:bind-chrootenv-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:bind-chrootenv-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:bind-devel-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:bind-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:bind-doc-9.16.6-150000.12.65.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:bind-utils-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:bind-utils-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libbind9-1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libbind9-1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libdns1605-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libdns1605-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libirs-devel-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libirs-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libirs1601-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libirs1601-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libisc1606-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libisc1606-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libisccc1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libisccc1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libisccfg1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libisccfg1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libns1604-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libns1604-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:python3-bind-9.16.6-150000.12.65.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-chrootenv-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-chrootenv-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-chrootenv-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-chrootenv-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-devel-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-devel-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-devel-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-doc-9.16.6-150000.12.65.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-utils-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-utils-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-utils-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-utils-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libbind9-1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libbind9-1600-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libbind9-1600-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libbind9-1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libdns1605-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libdns1605-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libdns1605-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libdns1605-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libirs-devel-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libirs-devel-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libirs-devel-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libirs-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libirs1601-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libirs1601-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libirs1601-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libirs1601-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libisc1606-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libisc1606-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libisc1606-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libisc1606-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libisccc1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libisccc1600-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libisccc1600-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libisccc1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libisccfg1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libisccfg1600-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libisccfg1600-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libisccfg1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libns1604-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libns1604-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libns1604-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libns1604-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:python3-bind-9.16.6-150000.12.65.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-chrootenv-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-chrootenv-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-chrootenv-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-chrootenv-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-devel-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-devel-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-devel-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-doc-9.16.6-150000.12.65.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-utils-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-utils-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-utils-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-utils-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libbind9-1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libbind9-1600-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libbind9-1600-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libbind9-1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libdns1605-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libdns1605-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libdns1605-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libdns1605-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libirs-devel-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libirs-devel-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libirs-devel-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libirs-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libirs1601-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libirs1601-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libirs1601-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libirs1601-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libisc1606-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libisc1606-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libisc1606-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libisc1606-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libisccc1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libisccc1600-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libisccc1600-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libisccc1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libisccfg1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libisccfg1600-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libisccfg1600-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libisccfg1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libns1604-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libns1604-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libns1604-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libns1604-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:python3-bind-9.16.6-150000.12.65.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:bind-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:bind-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:bind-chrootenv-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:bind-chrootenv-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:bind-devel-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:bind-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:bind-doc-9.16.6-150000.12.65.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:bind-utils-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:bind-utils-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libbind9-1600-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libbind9-1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libdns1605-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libdns1605-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libirs-devel-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libirs-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libirs1601-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libirs1601-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libisc1606-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libisc1606-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libisccc1600-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libisccc1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libisccfg1600-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libisccfg1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libns1604-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libns1604-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:python3-bind-9.16.6-150000.12.65.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:bind-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:bind-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:bind-chrootenv-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:bind-chrootenv-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:bind-devel-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:bind-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:bind-doc-9.16.6-150000.12.65.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:bind-utils-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:bind-utils-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libbind9-1600-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libbind9-1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libdns1605-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libdns1605-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libirs-devel-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libirs-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libirs1601-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libirs1601-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libisc1606-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libisc1606-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libisccc1600-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libisccc1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libisccfg1600-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libisccfg1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libns1604-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libns1604-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:python3-bind-9.16.6-150000.12.65.1.noarch",
"SUSE Manager Client Tools 15:dracut-saltboot-0.1.1681904360.84ef141-150000.1.50.1.noarch",
"SUSE Manager Client Tools 15:grafana-9.5.1-150000.1.48.5.aarch64",
"SUSE Manager Client Tools 15:grafana-9.5.1-150000.1.48.5.ppc64le",
"SUSE Manager Client Tools 15:grafana-9.5.1-150000.1.48.5.s390x",
"SUSE Manager Client Tools 15:grafana-9.5.1-150000.1.48.5.x86_64",
"SUSE Manager Client Tools 15:mgr-daemon-4.3.7-150000.1.41.1.noarch",
"SUSE Manager Client Tools 15:python3-uyuni-common-libs-4.3.8-150000.1.33.1.aarch64",
"SUSE Manager Client Tools 15:python3-uyuni-common-libs-4.3.8-150000.1.33.1.ppc64le",
"SUSE Manager Client Tools 15:python3-uyuni-common-libs-4.3.8-150000.1.33.1.s390x",
"SUSE Manager Client Tools 15:python3-uyuni-common-libs-4.3.8-150000.1.33.1.x86_64",
"SUSE Manager Client Tools 15:python3-zypp-plugin-spacewalk-1.0.14-150000.3.35.1.noarch",
"SUSE Manager Client Tools 15:spacecmd-4.3.21-150000.3.98.1.noarch",
"SUSE Manager Client Tools 15:zypp-plugin-spacewalk-1.0.14-150000.3.35.1.noarch",
"SUSE Manager Client Tools for SLE Micro 5:bind-utils-9.16.6-150000.12.65.1.aarch64",
"SUSE Manager Client Tools for SLE Micro 5:bind-utils-9.16.6-150000.12.65.1.s390x",
"SUSE Manager Client Tools for SLE Micro 5:bind-utils-9.16.6-150000.12.65.1.x86_64",
"SUSE Manager Client Tools for SLE Micro 5:dracut-saltboot-0.1.1681904360.84ef141-150000.1.50.1.noarch",
"SUSE Manager Client Tools for SLE Micro 5:libbind9-1600-64bit-9.16.6-150000.12.65.1.aarch64_ilp32",
"SUSE Manager Client Tools for SLE Micro 5:libbind9-1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Manager Client Tools for SLE Micro 5:libbind9-1600-9.16.6-150000.12.65.1.s390x",
"SUSE Manager Client Tools for SLE Micro 5:libbind9-1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Manager Client Tools for SLE Micro 5:libdns1605-64bit-9.16.6-150000.12.65.1.aarch64_ilp32",
"SUSE Manager Client Tools for SLE Micro 5:libdns1605-9.16.6-150000.12.65.1.aarch64",
"SUSE Manager Client Tools for SLE Micro 5:libdns1605-9.16.6-150000.12.65.1.s390x",
"SUSE Manager Client Tools for SLE Micro 5:libdns1605-9.16.6-150000.12.65.1.x86_64",
"SUSE Manager Client Tools for SLE Micro 5:libirs1601-64bit-9.16.6-150000.12.65.1.aarch64_ilp32",
"SUSE Manager Client Tools for SLE Micro 5:libirs1601-9.16.6-150000.12.65.1.aarch64",
"SUSE Manager Client Tools for SLE Micro 5:libirs1601-9.16.6-150000.12.65.1.s390x",
"SUSE Manager Client Tools for SLE Micro 5:libirs1601-9.16.6-150000.12.65.1.x86_64",
"SUSE Manager Client Tools for SLE Micro 5:libisc1606-64bit-9.16.6-150000.12.65.1.aarch64_ilp32",
"SUSE Manager Client Tools for SLE Micro 5:libisc1606-9.16.6-150000.12.65.1.aarch64",
"SUSE Manager Client Tools for SLE Micro 5:libisc1606-9.16.6-150000.12.65.1.s390x",
"SUSE Manager Client Tools for SLE Micro 5:libisc1606-9.16.6-150000.12.65.1.x86_64",
"SUSE Manager Client Tools for SLE Micro 5:libisccc1600-64bit-9.16.6-150000.12.65.1.aarch64_ilp32",
"SUSE Manager Client Tools for SLE Micro 5:libisccc1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Manager Client Tools for SLE Micro 5:libisccc1600-9.16.6-150000.12.65.1.s390x",
"SUSE Manager Client Tools for SLE Micro 5:libisccc1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Manager Client Tools for SLE Micro 5:libisccfg1600-64bit-9.16.6-150000.12.65.1.aarch64_ilp32",
"SUSE Manager Client Tools for SLE Micro 5:libisccfg1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Manager Client Tools for SLE Micro 5:libisccfg1600-9.16.6-150000.12.65.1.s390x",
"SUSE Manager Client Tools for SLE Micro 5:libisccfg1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Manager Client Tools for SLE Micro 5:libns1604-9.16.6-150000.12.65.1.s390x",
"SUSE Manager Client Tools for SLE Micro 5:libns1604-9.16.6-150000.12.65.1.x86_64",
"SUSE Manager Client Tools for SLE Micro 5:python3-bind-9.16.6-150000.12.65.1.noarch",
"SUSE Manager Proxy Module 4.2:python3-zypp-plugin-spacewalk-1.0.14-150000.3.35.1.noarch",
"SUSE Manager Proxy Module 4.2:zypp-plugin-spacewalk-1.0.14-150000.3.35.1.noarch",
"SUSE Manager Proxy Module 4.3:python3-zypp-plugin-spacewalk-1.0.14-150000.3.35.1.noarch",
"SUSE Manager Proxy Module 4.3:zypp-plugin-spacewalk-1.0.14-150000.3.35.1.noarch",
"openSUSE Leap 15.4:bind-devel-32bit-9.16.6-150000.12.65.1.x86_64",
"openSUSE Leap 15.4:dracut-saltboot-0.1.1681904360.84ef141-150000.1.50.1.noarch",
"openSUSE Leap 15.4:libbind9-1600-32bit-9.16.6-150000.12.65.1.x86_64",
"openSUSE Leap 15.4:libdns1605-32bit-9.16.6-150000.12.65.1.x86_64",
"openSUSE Leap 15.4:libirs1601-32bit-9.16.6-150000.12.65.1.x86_64",
"openSUSE Leap 15.4:libisc1606-32bit-9.16.6-150000.12.65.1.x86_64",
"openSUSE Leap 15.4:libisccc1600-32bit-9.16.6-150000.12.65.1.x86_64",
"openSUSE Leap 15.4:libisccfg1600-32bit-9.16.6-150000.12.65.1.x86_64",
"openSUSE Leap 15.4:libns1604-32bit-9.16.6-150000.12.65.1.x86_64",
"openSUSE Leap 15.4:spacecmd-4.3.21-150000.3.98.1.noarch",
"openSUSE Leap 15.4:wire-0.5.0-150000.1.12.3.aarch64",
"openSUSE Leap 15.4:wire-0.5.0-150000.1.12.3.ppc64le",
"openSUSE Leap 15.4:wire-0.5.0-150000.1.12.3.s390x",
"openSUSE Leap 15.4:wire-0.5.0-150000.1.12.3.x86_64",
"openSUSE Leap 15.5:dracut-saltboot-0.1.1681904360.84ef141-150000.1.50.1.noarch",
"openSUSE Leap 15.5:spacecmd-4.3.21-150000.3.98.1.noarch",
"openSUSE Leap 15.5:wire-0.5.0-150000.1.12.3.aarch64",
"openSUSE Leap 15.5:wire-0.5.0-150000.1.12.3.ppc64le",
"openSUSE Leap 15.5:wire-0.5.0-150000.1.12.3.s390x",
"openSUSE Leap 15.5:wire-0.5.0-150000.1.12.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 7:bind-9.16.6-150000.12.65.1.aarch64",
"SUSE Enterprise Storage 7:bind-9.16.6-150000.12.65.1.x86_64",
"SUSE Enterprise Storage 7:bind-chrootenv-9.16.6-150000.12.65.1.aarch64",
"SUSE Enterprise Storage 7:bind-chrootenv-9.16.6-150000.12.65.1.x86_64",
"SUSE Enterprise Storage 7:bind-devel-9.16.6-150000.12.65.1.aarch64",
"SUSE Enterprise Storage 7:bind-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Enterprise Storage 7:bind-doc-9.16.6-150000.12.65.1.noarch",
"SUSE Enterprise Storage 7:bind-utils-9.16.6-150000.12.65.1.aarch64",
"SUSE Enterprise Storage 7:bind-utils-9.16.6-150000.12.65.1.x86_64",
"SUSE Enterprise Storage 7:libbind9-1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Enterprise Storage 7:libbind9-1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Enterprise Storage 7:libdns1605-9.16.6-150000.12.65.1.aarch64",
"SUSE Enterprise Storage 7:libdns1605-9.16.6-150000.12.65.1.x86_64",
"SUSE Enterprise Storage 7:libirs-devel-9.16.6-150000.12.65.1.aarch64",
"SUSE Enterprise Storage 7:libirs-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Enterprise Storage 7:libirs1601-9.16.6-150000.12.65.1.aarch64",
"SUSE Enterprise Storage 7:libirs1601-9.16.6-150000.12.65.1.x86_64",
"SUSE Enterprise Storage 7:libisc1606-9.16.6-150000.12.65.1.aarch64",
"SUSE Enterprise Storage 7:libisc1606-9.16.6-150000.12.65.1.x86_64",
"SUSE Enterprise Storage 7:libisccc1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Enterprise Storage 7:libisccc1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Enterprise Storage 7:libisccfg1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Enterprise Storage 7:libisccfg1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Enterprise Storage 7:libns1604-9.16.6-150000.12.65.1.aarch64",
"SUSE Enterprise Storage 7:libns1604-9.16.6-150000.12.65.1.x86_64",
"SUSE Enterprise Storage 7:python3-bind-9.16.6-150000.12.65.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:bind-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:bind-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:bind-chrootenv-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:bind-chrootenv-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:bind-devel-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:bind-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:bind-doc-9.16.6-150000.12.65.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:bind-utils-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:bind-utils-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libbind9-1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libbind9-1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libdns1605-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libdns1605-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libirs-devel-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libirs-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libirs1601-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libirs1601-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libisc1606-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libisc1606-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libisccc1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libisccc1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libisccfg1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libisccfg1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libns1604-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libns1604-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:python3-bind-9.16.6-150000.12.65.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:bind-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:bind-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:bind-chrootenv-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:bind-chrootenv-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:bind-devel-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:bind-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:bind-doc-9.16.6-150000.12.65.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:bind-utils-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:bind-utils-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libbind9-1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libbind9-1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libdns1605-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libdns1605-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libirs-devel-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libirs-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libirs1601-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libirs1601-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libisc1606-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libisc1606-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libisccc1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libisccc1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libisccfg1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libisccfg1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libns1604-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libns1604-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:python3-bind-9.16.6-150000.12.65.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-chrootenv-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-chrootenv-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-chrootenv-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-chrootenv-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-devel-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-devel-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-devel-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-doc-9.16.6-150000.12.65.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-utils-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-utils-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-utils-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-utils-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libbind9-1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libbind9-1600-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libbind9-1600-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libbind9-1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libdns1605-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libdns1605-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libdns1605-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libdns1605-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libirs-devel-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libirs-devel-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libirs-devel-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libirs-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libirs1601-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libirs1601-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libirs1601-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libirs1601-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libisc1606-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libisc1606-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libisc1606-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libisc1606-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libisccc1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libisccc1600-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libisccc1600-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libisccc1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libisccfg1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libisccfg1600-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libisccfg1600-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libisccfg1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libns1604-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libns1604-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libns1604-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libns1604-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:python3-bind-9.16.6-150000.12.65.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-chrootenv-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-chrootenv-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-chrootenv-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-chrootenv-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-devel-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-devel-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-devel-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-doc-9.16.6-150000.12.65.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-utils-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-utils-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-utils-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-utils-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libbind9-1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libbind9-1600-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libbind9-1600-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libbind9-1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libdns1605-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libdns1605-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libdns1605-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libdns1605-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libirs-devel-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libirs-devel-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libirs-devel-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libirs-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libirs1601-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libirs1601-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libirs1601-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libirs1601-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libisc1606-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libisc1606-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libisc1606-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libisc1606-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libisccc1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libisccc1600-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libisccc1600-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libisccc1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libisccfg1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libisccfg1600-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libisccfg1600-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libisccfg1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libns1604-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libns1604-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libns1604-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libns1604-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:python3-bind-9.16.6-150000.12.65.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:bind-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:bind-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:bind-chrootenv-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:bind-chrootenv-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:bind-devel-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:bind-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:bind-doc-9.16.6-150000.12.65.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:bind-utils-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:bind-utils-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libbind9-1600-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libbind9-1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libdns1605-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libdns1605-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libirs-devel-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libirs-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libirs1601-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libirs1601-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libisc1606-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libisc1606-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libisccc1600-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libisccc1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libisccfg1600-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libisccfg1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libns1604-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libns1604-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:python3-bind-9.16.6-150000.12.65.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:bind-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:bind-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:bind-chrootenv-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:bind-chrootenv-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:bind-devel-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:bind-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:bind-doc-9.16.6-150000.12.65.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:bind-utils-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:bind-utils-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libbind9-1600-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libbind9-1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libdns1605-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libdns1605-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libirs-devel-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libirs-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libirs1601-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libirs1601-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libisc1606-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libisc1606-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libisccc1600-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libisccc1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libisccfg1600-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libisccfg1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libns1604-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libns1604-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:python3-bind-9.16.6-150000.12.65.1.noarch",
"SUSE Manager Client Tools 15:dracut-saltboot-0.1.1681904360.84ef141-150000.1.50.1.noarch",
"SUSE Manager Client Tools 15:grafana-9.5.1-150000.1.48.5.aarch64",
"SUSE Manager Client Tools 15:grafana-9.5.1-150000.1.48.5.ppc64le",
"SUSE Manager Client Tools 15:grafana-9.5.1-150000.1.48.5.s390x",
"SUSE Manager Client Tools 15:grafana-9.5.1-150000.1.48.5.x86_64",
"SUSE Manager Client Tools 15:mgr-daemon-4.3.7-150000.1.41.1.noarch",
"SUSE Manager Client Tools 15:python3-uyuni-common-libs-4.3.8-150000.1.33.1.aarch64",
"SUSE Manager Client Tools 15:python3-uyuni-common-libs-4.3.8-150000.1.33.1.ppc64le",
"SUSE Manager Client Tools 15:python3-uyuni-common-libs-4.3.8-150000.1.33.1.s390x",
"SUSE Manager Client Tools 15:python3-uyuni-common-libs-4.3.8-150000.1.33.1.x86_64",
"SUSE Manager Client Tools 15:python3-zypp-plugin-spacewalk-1.0.14-150000.3.35.1.noarch",
"SUSE Manager Client Tools 15:spacecmd-4.3.21-150000.3.98.1.noarch",
"SUSE Manager Client Tools 15:zypp-plugin-spacewalk-1.0.14-150000.3.35.1.noarch",
"SUSE Manager Client Tools for SLE Micro 5:bind-utils-9.16.6-150000.12.65.1.aarch64",
"SUSE Manager Client Tools for SLE Micro 5:bind-utils-9.16.6-150000.12.65.1.s390x",
"SUSE Manager Client Tools for SLE Micro 5:bind-utils-9.16.6-150000.12.65.1.x86_64",
"SUSE Manager Client Tools for SLE Micro 5:dracut-saltboot-0.1.1681904360.84ef141-150000.1.50.1.noarch",
"SUSE Manager Client Tools for SLE Micro 5:libbind9-1600-64bit-9.16.6-150000.12.65.1.aarch64_ilp32",
"SUSE Manager Client Tools for SLE Micro 5:libbind9-1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Manager Client Tools for SLE Micro 5:libbind9-1600-9.16.6-150000.12.65.1.s390x",
"SUSE Manager Client Tools for SLE Micro 5:libbind9-1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Manager Client Tools for SLE Micro 5:libdns1605-64bit-9.16.6-150000.12.65.1.aarch64_ilp32",
"SUSE Manager Client Tools for SLE Micro 5:libdns1605-9.16.6-150000.12.65.1.aarch64",
"SUSE Manager Client Tools for SLE Micro 5:libdns1605-9.16.6-150000.12.65.1.s390x",
"SUSE Manager Client Tools for SLE Micro 5:libdns1605-9.16.6-150000.12.65.1.x86_64",
"SUSE Manager Client Tools for SLE Micro 5:libirs1601-64bit-9.16.6-150000.12.65.1.aarch64_ilp32",
"SUSE Manager Client Tools for SLE Micro 5:libirs1601-9.16.6-150000.12.65.1.aarch64",
"SUSE Manager Client Tools for SLE Micro 5:libirs1601-9.16.6-150000.12.65.1.s390x",
"SUSE Manager Client Tools for SLE Micro 5:libirs1601-9.16.6-150000.12.65.1.x86_64",
"SUSE Manager Client Tools for SLE Micro 5:libisc1606-64bit-9.16.6-150000.12.65.1.aarch64_ilp32",
"SUSE Manager Client Tools for SLE Micro 5:libisc1606-9.16.6-150000.12.65.1.aarch64",
"SUSE Manager Client Tools for SLE Micro 5:libisc1606-9.16.6-150000.12.65.1.s390x",
"SUSE Manager Client Tools for SLE Micro 5:libisc1606-9.16.6-150000.12.65.1.x86_64",
"SUSE Manager Client Tools for SLE Micro 5:libisccc1600-64bit-9.16.6-150000.12.65.1.aarch64_ilp32",
"SUSE Manager Client Tools for SLE Micro 5:libisccc1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Manager Client Tools for SLE Micro 5:libisccc1600-9.16.6-150000.12.65.1.s390x",
"SUSE Manager Client Tools for SLE Micro 5:libisccc1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Manager Client Tools for SLE Micro 5:libisccfg1600-64bit-9.16.6-150000.12.65.1.aarch64_ilp32",
"SUSE Manager Client Tools for SLE Micro 5:libisccfg1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Manager Client Tools for SLE Micro 5:libisccfg1600-9.16.6-150000.12.65.1.s390x",
"SUSE Manager Client Tools for SLE Micro 5:libisccfg1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Manager Client Tools for SLE Micro 5:libns1604-9.16.6-150000.12.65.1.s390x",
"SUSE Manager Client Tools for SLE Micro 5:libns1604-9.16.6-150000.12.65.1.x86_64",
"SUSE Manager Client Tools for SLE Micro 5:python3-bind-9.16.6-150000.12.65.1.noarch",
"SUSE Manager Proxy Module 4.2:python3-zypp-plugin-spacewalk-1.0.14-150000.3.35.1.noarch",
"SUSE Manager Proxy Module 4.2:zypp-plugin-spacewalk-1.0.14-150000.3.35.1.noarch",
"SUSE Manager Proxy Module 4.3:python3-zypp-plugin-spacewalk-1.0.14-150000.3.35.1.noarch",
"SUSE Manager Proxy Module 4.3:zypp-plugin-spacewalk-1.0.14-150000.3.35.1.noarch",
"openSUSE Leap 15.4:bind-devel-32bit-9.16.6-150000.12.65.1.x86_64",
"openSUSE Leap 15.4:dracut-saltboot-0.1.1681904360.84ef141-150000.1.50.1.noarch",
"openSUSE Leap 15.4:libbind9-1600-32bit-9.16.6-150000.12.65.1.x86_64",
"openSUSE Leap 15.4:libdns1605-32bit-9.16.6-150000.12.65.1.x86_64",
"openSUSE Leap 15.4:libirs1601-32bit-9.16.6-150000.12.65.1.x86_64",
"openSUSE Leap 15.4:libisc1606-32bit-9.16.6-150000.12.65.1.x86_64",
"openSUSE Leap 15.4:libisccc1600-32bit-9.16.6-150000.12.65.1.x86_64",
"openSUSE Leap 15.4:libisccfg1600-32bit-9.16.6-150000.12.65.1.x86_64",
"openSUSE Leap 15.4:libns1604-32bit-9.16.6-150000.12.65.1.x86_64",
"openSUSE Leap 15.4:spacecmd-4.3.21-150000.3.98.1.noarch",
"openSUSE Leap 15.4:wire-0.5.0-150000.1.12.3.aarch64",
"openSUSE Leap 15.4:wire-0.5.0-150000.1.12.3.ppc64le",
"openSUSE Leap 15.4:wire-0.5.0-150000.1.12.3.s390x",
"openSUSE Leap 15.4:wire-0.5.0-150000.1.12.3.x86_64",
"openSUSE Leap 15.5:dracut-saltboot-0.1.1681904360.84ef141-150000.1.50.1.noarch",
"openSUSE Leap 15.5:spacecmd-4.3.21-150000.3.98.1.noarch",
"openSUSE Leap 15.5:wire-0.5.0-150000.1.12.3.aarch64",
"openSUSE Leap 15.5:wire-0.5.0-150000.1.12.3.ppc64le",
"openSUSE Leap 15.5:wire-0.5.0-150000.1.12.3.s390x",
"openSUSE Leap 15.5:wire-0.5.0-150000.1.12.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2023-06-21T11:49:43Z",
"details": "important"
}
],
"title": "CVE-2021-3807"
},
{
"cve": "CVE-2021-3918",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-3918"
}
],
"notes": [
{
"category": "general",
"text": "json-schema is vulnerable to Improperly Controlled Modification of Object Prototype Attributes (\u0027Prototype Pollution\u0027)",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 7:bind-9.16.6-150000.12.65.1.aarch64",
"SUSE Enterprise Storage 7:bind-9.16.6-150000.12.65.1.x86_64",
"SUSE Enterprise Storage 7:bind-chrootenv-9.16.6-150000.12.65.1.aarch64",
"SUSE Enterprise Storage 7:bind-chrootenv-9.16.6-150000.12.65.1.x86_64",
"SUSE Enterprise Storage 7:bind-devel-9.16.6-150000.12.65.1.aarch64",
"SUSE Enterprise Storage 7:bind-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Enterprise Storage 7:bind-doc-9.16.6-150000.12.65.1.noarch",
"SUSE Enterprise Storage 7:bind-utils-9.16.6-150000.12.65.1.aarch64",
"SUSE Enterprise Storage 7:bind-utils-9.16.6-150000.12.65.1.x86_64",
"SUSE Enterprise Storage 7:libbind9-1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Enterprise Storage 7:libbind9-1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Enterprise Storage 7:libdns1605-9.16.6-150000.12.65.1.aarch64",
"SUSE Enterprise Storage 7:libdns1605-9.16.6-150000.12.65.1.x86_64",
"SUSE Enterprise Storage 7:libirs-devel-9.16.6-150000.12.65.1.aarch64",
"SUSE Enterprise Storage 7:libirs-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Enterprise Storage 7:libirs1601-9.16.6-150000.12.65.1.aarch64",
"SUSE Enterprise Storage 7:libirs1601-9.16.6-150000.12.65.1.x86_64",
"SUSE Enterprise Storage 7:libisc1606-9.16.6-150000.12.65.1.aarch64",
"SUSE Enterprise Storage 7:libisc1606-9.16.6-150000.12.65.1.x86_64",
"SUSE Enterprise Storage 7:libisccc1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Enterprise Storage 7:libisccc1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Enterprise Storage 7:libisccfg1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Enterprise Storage 7:libisccfg1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Enterprise Storage 7:libns1604-9.16.6-150000.12.65.1.aarch64",
"SUSE Enterprise Storage 7:libns1604-9.16.6-150000.12.65.1.x86_64",
"SUSE Enterprise Storage 7:python3-bind-9.16.6-150000.12.65.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:bind-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:bind-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:bind-chrootenv-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:bind-chrootenv-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:bind-devel-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:bind-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:bind-doc-9.16.6-150000.12.65.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:bind-utils-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:bind-utils-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libbind9-1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libbind9-1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libdns1605-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libdns1605-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libirs-devel-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libirs-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libirs1601-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libirs1601-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libisc1606-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libisc1606-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libisccc1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libisccc1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libisccfg1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libisccfg1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libns1604-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libns1604-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:python3-bind-9.16.6-150000.12.65.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:bind-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:bind-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:bind-chrootenv-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:bind-chrootenv-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:bind-devel-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:bind-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:bind-doc-9.16.6-150000.12.65.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:bind-utils-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:bind-utils-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libbind9-1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libbind9-1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libdns1605-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libdns1605-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libirs-devel-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libirs-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libirs1601-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libirs1601-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libisc1606-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libisc1606-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libisccc1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libisccc1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libisccfg1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libisccfg1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libns1604-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libns1604-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:python3-bind-9.16.6-150000.12.65.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-chrootenv-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-chrootenv-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-chrootenv-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-chrootenv-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-devel-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-devel-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-devel-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-doc-9.16.6-150000.12.65.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-utils-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-utils-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-utils-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-utils-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libbind9-1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libbind9-1600-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libbind9-1600-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libbind9-1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libdns1605-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libdns1605-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libdns1605-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libdns1605-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libirs-devel-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libirs-devel-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libirs-devel-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libirs-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libirs1601-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libirs1601-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libirs1601-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libirs1601-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libisc1606-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libisc1606-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libisc1606-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libisc1606-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libisccc1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libisccc1600-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libisccc1600-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libisccc1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libisccfg1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libisccfg1600-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libisccfg1600-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libisccfg1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libns1604-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libns1604-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libns1604-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libns1604-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:python3-bind-9.16.6-150000.12.65.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-chrootenv-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-chrootenv-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-chrootenv-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-chrootenv-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-devel-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-devel-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-devel-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-doc-9.16.6-150000.12.65.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-utils-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-utils-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-utils-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-utils-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libbind9-1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libbind9-1600-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libbind9-1600-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libbind9-1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libdns1605-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libdns1605-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libdns1605-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libdns1605-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libirs-devel-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libirs-devel-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libirs-devel-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libirs-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libirs1601-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libirs1601-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libirs1601-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libirs1601-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libisc1606-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libisc1606-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libisc1606-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libisc1606-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libisccc1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libisccc1600-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libisccc1600-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libisccc1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libisccfg1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libisccfg1600-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libisccfg1600-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libisccfg1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libns1604-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libns1604-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libns1604-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libns1604-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:python3-bind-9.16.6-150000.12.65.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:bind-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:bind-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:bind-chrootenv-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:bind-chrootenv-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:bind-devel-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:bind-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:bind-doc-9.16.6-150000.12.65.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:bind-utils-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:bind-utils-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libbind9-1600-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libbind9-1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libdns1605-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libdns1605-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libirs-devel-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libirs-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libirs1601-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libirs1601-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libisc1606-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libisc1606-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libisccc1600-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libisccc1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libisccfg1600-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libisccfg1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libns1604-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libns1604-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:python3-bind-9.16.6-150000.12.65.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:bind-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:bind-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:bind-chrootenv-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:bind-chrootenv-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:bind-devel-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:bind-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:bind-doc-9.16.6-150000.12.65.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:bind-utils-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:bind-utils-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libbind9-1600-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libbind9-1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libdns1605-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libdns1605-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libirs-devel-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libirs-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libirs1601-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libirs1601-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libisc1606-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libisc1606-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libisccc1600-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libisccc1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libisccfg1600-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libisccfg1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libns1604-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libns1604-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:python3-bind-9.16.6-150000.12.65.1.noarch",
"SUSE Manager Client Tools 15:dracut-saltboot-0.1.1681904360.84ef141-150000.1.50.1.noarch",
"SUSE Manager Client Tools 15:grafana-9.5.1-150000.1.48.5.aarch64",
"SUSE Manager Client Tools 15:grafana-9.5.1-150000.1.48.5.ppc64le",
"SUSE Manager Client Tools 15:grafana-9.5.1-150000.1.48.5.s390x",
"SUSE Manager Client Tools 15:grafana-9.5.1-150000.1.48.5.x86_64",
"SUSE Manager Client Tools 15:mgr-daemon-4.3.7-150000.1.41.1.noarch",
"SUSE Manager Client Tools 15:python3-uyuni-common-libs-4.3.8-150000.1.33.1.aarch64",
"SUSE Manager Client Tools 15:python3-uyuni-common-libs-4.3.8-150000.1.33.1.ppc64le",
"SUSE Manager Client Tools 15:python3-uyuni-common-libs-4.3.8-150000.1.33.1.s390x",
"SUSE Manager Client Tools 15:python3-uyuni-common-libs-4.3.8-150000.1.33.1.x86_64",
"SUSE Manager Client Tools 15:python3-zypp-plugin-spacewalk-1.0.14-150000.3.35.1.noarch",
"SUSE Manager Client Tools 15:spacecmd-4.3.21-150000.3.98.1.noarch",
"SUSE Manager Client Tools 15:zypp-plugin-spacewalk-1.0.14-150000.3.35.1.noarch",
"SUSE Manager Client Tools for SLE Micro 5:bind-utils-9.16.6-150000.12.65.1.aarch64",
"SUSE Manager Client Tools for SLE Micro 5:bind-utils-9.16.6-150000.12.65.1.s390x",
"SUSE Manager Client Tools for SLE Micro 5:bind-utils-9.16.6-150000.12.65.1.x86_64",
"SUSE Manager Client Tools for SLE Micro 5:dracut-saltboot-0.1.1681904360.84ef141-150000.1.50.1.noarch",
"SUSE Manager Client Tools for SLE Micro 5:libbind9-1600-64bit-9.16.6-150000.12.65.1.aarch64_ilp32",
"SUSE Manager Client Tools for SLE Micro 5:libbind9-1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Manager Client Tools for SLE Micro 5:libbind9-1600-9.16.6-150000.12.65.1.s390x",
"SUSE Manager Client Tools for SLE Micro 5:libbind9-1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Manager Client Tools for SLE Micro 5:libdns1605-64bit-9.16.6-150000.12.65.1.aarch64_ilp32",
"SUSE Manager Client Tools for SLE Micro 5:libdns1605-9.16.6-150000.12.65.1.aarch64",
"SUSE Manager Client Tools for SLE Micro 5:libdns1605-9.16.6-150000.12.65.1.s390x",
"SUSE Manager Client Tools for SLE Micro 5:libdns1605-9.16.6-150000.12.65.1.x86_64",
"SUSE Manager Client Tools for SLE Micro 5:libirs1601-64bit-9.16.6-150000.12.65.1.aarch64_ilp32",
"SUSE Manager Client Tools for SLE Micro 5:libirs1601-9.16.6-150000.12.65.1.aarch64",
"SUSE Manager Client Tools for SLE Micro 5:libirs1601-9.16.6-150000.12.65.1.s390x",
"SUSE Manager Client Tools for SLE Micro 5:libirs1601-9.16.6-150000.12.65.1.x86_64",
"SUSE Manager Client Tools for SLE Micro 5:libisc1606-64bit-9.16.6-150000.12.65.1.aarch64_ilp32",
"SUSE Manager Client Tools for SLE Micro 5:libisc1606-9.16.6-150000.12.65.1.aarch64",
"SUSE Manager Client Tools for SLE Micro 5:libisc1606-9.16.6-150000.12.65.1.s390x",
"SUSE Manager Client Tools for SLE Micro 5:libisc1606-9.16.6-150000.12.65.1.x86_64",
"SUSE Manager Client Tools for SLE Micro 5:libisccc1600-64bit-9.16.6-150000.12.65.1.aarch64_ilp32",
"SUSE Manager Client Tools for SLE Micro 5:libisccc1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Manager Client Tools for SLE Micro 5:libisccc1600-9.16.6-150000.12.65.1.s390x",
"SUSE Manager Client Tools for SLE Micro 5:libisccc1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Manager Client Tools for SLE Micro 5:libisccfg1600-64bit-9.16.6-150000.12.65.1.aarch64_ilp32",
"SUSE Manager Client Tools for SLE Micro 5:libisccfg1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Manager Client Tools for SLE Micro 5:libisccfg1600-9.16.6-150000.12.65.1.s390x",
"SUSE Manager Client Tools for SLE Micro 5:libisccfg1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Manager Client Tools for SLE Micro 5:libns1604-9.16.6-150000.12.65.1.s390x",
"SUSE Manager Client Tools for SLE Micro 5:libns1604-9.16.6-150000.12.65.1.x86_64",
"SUSE Manager Client Tools for SLE Micro 5:python3-bind-9.16.6-150000.12.65.1.noarch",
"SUSE Manager Proxy Module 4.2:python3-zypp-plugin-spacewalk-1.0.14-150000.3.35.1.noarch",
"SUSE Manager Proxy Module 4.2:zypp-plugin-spacewalk-1.0.14-150000.3.35.1.noarch",
"SUSE Manager Proxy Module 4.3:python3-zypp-plugin-spacewalk-1.0.14-150000.3.35.1.noarch",
"SUSE Manager Proxy Module 4.3:zypp-plugin-spacewalk-1.0.14-150000.3.35.1.noarch",
"openSUSE Leap 15.4:bind-devel-32bit-9.16.6-150000.12.65.1.x86_64",
"openSUSE Leap 15.4:dracut-saltboot-0.1.1681904360.84ef141-150000.1.50.1.noarch",
"openSUSE Leap 15.4:libbind9-1600-32bit-9.16.6-150000.12.65.1.x86_64",
"openSUSE Leap 15.4:libdns1605-32bit-9.16.6-150000.12.65.1.x86_64",
"openSUSE Leap 15.4:libirs1601-32bit-9.16.6-150000.12.65.1.x86_64",
"openSUSE Leap 15.4:libisc1606-32bit-9.16.6-150000.12.65.1.x86_64",
"openSUSE Leap 15.4:libisccc1600-32bit-9.16.6-150000.12.65.1.x86_64",
"openSUSE Leap 15.4:libisccfg1600-32bit-9.16.6-150000.12.65.1.x86_64",
"openSUSE Leap 15.4:libns1604-32bit-9.16.6-150000.12.65.1.x86_64",
"openSUSE Leap 15.4:spacecmd-4.3.21-150000.3.98.1.noarch",
"openSUSE Leap 15.4:wire-0.5.0-150000.1.12.3.aarch64",
"openSUSE Leap 15.4:wire-0.5.0-150000.1.12.3.ppc64le",
"openSUSE Leap 15.4:wire-0.5.0-150000.1.12.3.s390x",
"openSUSE Leap 15.4:wire-0.5.0-150000.1.12.3.x86_64",
"openSUSE Leap 15.5:dracut-saltboot-0.1.1681904360.84ef141-150000.1.50.1.noarch",
"openSUSE Leap 15.5:spacecmd-4.3.21-150000.3.98.1.noarch",
"openSUSE Leap 15.5:wire-0.5.0-150000.1.12.3.aarch64",
"openSUSE Leap 15.5:wire-0.5.0-150000.1.12.3.ppc64le",
"openSUSE Leap 15.5:wire-0.5.0-150000.1.12.3.s390x",
"openSUSE Leap 15.5:wire-0.5.0-150000.1.12.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-3918",
"url": "https://www.suse.com/security/cve/CVE-2021-3918"
},
{
"category": "external",
"summary": "SUSE Bug 1192696 for CVE-2021-3918",
"url": "https://bugzilla.suse.com/1192696"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 7:bind-9.16.6-150000.12.65.1.aarch64",
"SUSE Enterprise Storage 7:bind-9.16.6-150000.12.65.1.x86_64",
"SUSE Enterprise Storage 7:bind-chrootenv-9.16.6-150000.12.65.1.aarch64",
"SUSE Enterprise Storage 7:bind-chrootenv-9.16.6-150000.12.65.1.x86_64",
"SUSE Enterprise Storage 7:bind-devel-9.16.6-150000.12.65.1.aarch64",
"SUSE Enterprise Storage 7:bind-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Enterprise Storage 7:bind-doc-9.16.6-150000.12.65.1.noarch",
"SUSE Enterprise Storage 7:bind-utils-9.16.6-150000.12.65.1.aarch64",
"SUSE Enterprise Storage 7:bind-utils-9.16.6-150000.12.65.1.x86_64",
"SUSE Enterprise Storage 7:libbind9-1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Enterprise Storage 7:libbind9-1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Enterprise Storage 7:libdns1605-9.16.6-150000.12.65.1.aarch64",
"SUSE Enterprise Storage 7:libdns1605-9.16.6-150000.12.65.1.x86_64",
"SUSE Enterprise Storage 7:libirs-devel-9.16.6-150000.12.65.1.aarch64",
"SUSE Enterprise Storage 7:libirs-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Enterprise Storage 7:libirs1601-9.16.6-150000.12.65.1.aarch64",
"SUSE Enterprise Storage 7:libirs1601-9.16.6-150000.12.65.1.x86_64",
"SUSE Enterprise Storage 7:libisc1606-9.16.6-150000.12.65.1.aarch64",
"SUSE Enterprise Storage 7:libisc1606-9.16.6-150000.12.65.1.x86_64",
"SUSE Enterprise Storage 7:libisccc1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Enterprise Storage 7:libisccc1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Enterprise Storage 7:libisccfg1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Enterprise Storage 7:libisccfg1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Enterprise Storage 7:libns1604-9.16.6-150000.12.65.1.aarch64",
"SUSE Enterprise Storage 7:libns1604-9.16.6-150000.12.65.1.x86_64",
"SUSE Enterprise Storage 7:python3-bind-9.16.6-150000.12.65.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:bind-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:bind-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:bind-chrootenv-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:bind-chrootenv-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:bind-devel-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:bind-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:bind-doc-9.16.6-150000.12.65.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:bind-utils-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:bind-utils-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libbind9-1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libbind9-1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libdns1605-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libdns1605-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libirs-devel-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libirs-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libirs1601-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libirs1601-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libisc1606-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libisc1606-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libisccc1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libisccc1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libisccfg1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libisccfg1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libns1604-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libns1604-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:python3-bind-9.16.6-150000.12.65.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:bind-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:bind-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:bind-chrootenv-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:bind-chrootenv-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:bind-devel-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:bind-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:bind-doc-9.16.6-150000.12.65.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:bind-utils-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:bind-utils-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libbind9-1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libbind9-1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libdns1605-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libdns1605-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libirs-devel-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libirs-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libirs1601-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libirs1601-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libisc1606-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libisc1606-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libisccc1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libisccc1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libisccfg1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libisccfg1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libns1604-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libns1604-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:python3-bind-9.16.6-150000.12.65.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-chrootenv-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-chrootenv-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-chrootenv-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-chrootenv-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-devel-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-devel-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-devel-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-doc-9.16.6-150000.12.65.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-utils-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-utils-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-utils-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-utils-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libbind9-1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libbind9-1600-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libbind9-1600-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libbind9-1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libdns1605-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libdns1605-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libdns1605-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libdns1605-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libirs-devel-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libirs-devel-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libirs-devel-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libirs-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libirs1601-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libirs1601-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libirs1601-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libirs1601-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libisc1606-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libisc1606-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libisc1606-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libisc1606-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libisccc1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libisccc1600-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libisccc1600-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libisccc1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libisccfg1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libisccfg1600-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libisccfg1600-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libisccfg1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libns1604-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libns1604-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libns1604-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libns1604-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:python3-bind-9.16.6-150000.12.65.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-chrootenv-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-chrootenv-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-chrootenv-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-chrootenv-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-devel-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-devel-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-devel-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-doc-9.16.6-150000.12.65.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-utils-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-utils-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-utils-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-utils-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libbind9-1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libbind9-1600-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libbind9-1600-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libbind9-1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libdns1605-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libdns1605-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libdns1605-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libdns1605-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libirs-devel-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libirs-devel-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libirs-devel-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libirs-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libirs1601-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libirs1601-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libirs1601-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libirs1601-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libisc1606-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libisc1606-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libisc1606-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libisc1606-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libisccc1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libisccc1600-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libisccc1600-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libisccc1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libisccfg1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libisccfg1600-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libisccfg1600-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libisccfg1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libns1604-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libns1604-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libns1604-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libns1604-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:python3-bind-9.16.6-150000.12.65.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:bind-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:bind-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:bind-chrootenv-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:bind-chrootenv-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:bind-devel-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:bind-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:bind-doc-9.16.6-150000.12.65.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:bind-utils-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:bind-utils-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libbind9-1600-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libbind9-1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libdns1605-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libdns1605-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libirs-devel-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libirs-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libirs1601-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libirs1601-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libisc1606-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libisc1606-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libisccc1600-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libisccc1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libisccfg1600-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libisccfg1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libns1604-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libns1604-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:python3-bind-9.16.6-150000.12.65.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:bind-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:bind-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:bind-chrootenv-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:bind-chrootenv-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:bind-devel-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:bind-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:bind-doc-9.16.6-150000.12.65.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:bind-utils-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:bind-utils-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libbind9-1600-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libbind9-1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libdns1605-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libdns1605-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libirs-devel-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libirs-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libirs1601-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libirs1601-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libisc1606-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libisc1606-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libisccc1600-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libisccc1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libisccfg1600-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libisccfg1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libns1604-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libns1604-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:python3-bind-9.16.6-150000.12.65.1.noarch",
"SUSE Manager Client Tools 15:dracut-saltboot-0.1.1681904360.84ef141-150000.1.50.1.noarch",
"SUSE Manager Client Tools 15:grafana-9.5.1-150000.1.48.5.aarch64",
"SUSE Manager Client Tools 15:grafana-9.5.1-150000.1.48.5.ppc64le",
"SUSE Manager Client Tools 15:grafana-9.5.1-150000.1.48.5.s390x",
"SUSE Manager Client Tools 15:grafana-9.5.1-150000.1.48.5.x86_64",
"SUSE Manager Client Tools 15:mgr-daemon-4.3.7-150000.1.41.1.noarch",
"SUSE Manager Client Tools 15:python3-uyuni-common-libs-4.3.8-150000.1.33.1.aarch64",
"SUSE Manager Client Tools 15:python3-uyuni-common-libs-4.3.8-150000.1.33.1.ppc64le",
"SUSE Manager Client Tools 15:python3-uyuni-common-libs-4.3.8-150000.1.33.1.s390x",
"SUSE Manager Client Tools 15:python3-uyuni-common-libs-4.3.8-150000.1.33.1.x86_64",
"SUSE Manager Client Tools 15:python3-zypp-plugin-spacewalk-1.0.14-150000.3.35.1.noarch",
"SUSE Manager Client Tools 15:spacecmd-4.3.21-150000.3.98.1.noarch",
"SUSE Manager Client Tools 15:zypp-plugin-spacewalk-1.0.14-150000.3.35.1.noarch",
"SUSE Manager Client Tools for SLE Micro 5:bind-utils-9.16.6-150000.12.65.1.aarch64",
"SUSE Manager Client Tools for SLE Micro 5:bind-utils-9.16.6-150000.12.65.1.s390x",
"SUSE Manager Client Tools for SLE Micro 5:bind-utils-9.16.6-150000.12.65.1.x86_64",
"SUSE Manager Client Tools for SLE Micro 5:dracut-saltboot-0.1.1681904360.84ef141-150000.1.50.1.noarch",
"SUSE Manager Client Tools for SLE Micro 5:libbind9-1600-64bit-9.16.6-150000.12.65.1.aarch64_ilp32",
"SUSE Manager Client Tools for SLE Micro 5:libbind9-1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Manager Client Tools for SLE Micro 5:libbind9-1600-9.16.6-150000.12.65.1.s390x",
"SUSE Manager Client Tools for SLE Micro 5:libbind9-1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Manager Client Tools for SLE Micro 5:libdns1605-64bit-9.16.6-150000.12.65.1.aarch64_ilp32",
"SUSE Manager Client Tools for SLE Micro 5:libdns1605-9.16.6-150000.12.65.1.aarch64",
"SUSE Manager Client Tools for SLE Micro 5:libdns1605-9.16.6-150000.12.65.1.s390x",
"SUSE Manager Client Tools for SLE Micro 5:libdns1605-9.16.6-150000.12.65.1.x86_64",
"SUSE Manager Client Tools for SLE Micro 5:libirs1601-64bit-9.16.6-150000.12.65.1.aarch64_ilp32",
"SUSE Manager Client Tools for SLE Micro 5:libirs1601-9.16.6-150000.12.65.1.aarch64",
"SUSE Manager Client Tools for SLE Micro 5:libirs1601-9.16.6-150000.12.65.1.s390x",
"SUSE Manager Client Tools for SLE Micro 5:libirs1601-9.16.6-150000.12.65.1.x86_64",
"SUSE Manager Client Tools for SLE Micro 5:libisc1606-64bit-9.16.6-150000.12.65.1.aarch64_ilp32",
"SUSE Manager Client Tools for SLE Micro 5:libisc1606-9.16.6-150000.12.65.1.aarch64",
"SUSE Manager Client Tools for SLE Micro 5:libisc1606-9.16.6-150000.12.65.1.s390x",
"SUSE Manager Client Tools for SLE Micro 5:libisc1606-9.16.6-150000.12.65.1.x86_64",
"SUSE Manager Client Tools for SLE Micro 5:libisccc1600-64bit-9.16.6-150000.12.65.1.aarch64_ilp32",
"SUSE Manager Client Tools for SLE Micro 5:libisccc1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Manager Client Tools for SLE Micro 5:libisccc1600-9.16.6-150000.12.65.1.s390x",
"SUSE Manager Client Tools for SLE Micro 5:libisccc1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Manager Client Tools for SLE Micro 5:libisccfg1600-64bit-9.16.6-150000.12.65.1.aarch64_ilp32",
"SUSE Manager Client Tools for SLE Micro 5:libisccfg1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Manager Client Tools for SLE Micro 5:libisccfg1600-9.16.6-150000.12.65.1.s390x",
"SUSE Manager Client Tools for SLE Micro 5:libisccfg1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Manager Client Tools for SLE Micro 5:libns1604-9.16.6-150000.12.65.1.s390x",
"SUSE Manager Client Tools for SLE Micro 5:libns1604-9.16.6-150000.12.65.1.x86_64",
"SUSE Manager Client Tools for SLE Micro 5:python3-bind-9.16.6-150000.12.65.1.noarch",
"SUSE Manager Proxy Module 4.2:python3-zypp-plugin-spacewalk-1.0.14-150000.3.35.1.noarch",
"SUSE Manager Proxy Module 4.2:zypp-plugin-spacewalk-1.0.14-150000.3.35.1.noarch",
"SUSE Manager Proxy Module 4.3:python3-zypp-plugin-spacewalk-1.0.14-150000.3.35.1.noarch",
"SUSE Manager Proxy Module 4.3:zypp-plugin-spacewalk-1.0.14-150000.3.35.1.noarch",
"openSUSE Leap 15.4:bind-devel-32bit-9.16.6-150000.12.65.1.x86_64",
"openSUSE Leap 15.4:dracut-saltboot-0.1.1681904360.84ef141-150000.1.50.1.noarch",
"openSUSE Leap 15.4:libbind9-1600-32bit-9.16.6-150000.12.65.1.x86_64",
"openSUSE Leap 15.4:libdns1605-32bit-9.16.6-150000.12.65.1.x86_64",
"openSUSE Leap 15.4:libirs1601-32bit-9.16.6-150000.12.65.1.x86_64",
"openSUSE Leap 15.4:libisc1606-32bit-9.16.6-150000.12.65.1.x86_64",
"openSUSE Leap 15.4:libisccc1600-32bit-9.16.6-150000.12.65.1.x86_64",
"openSUSE Leap 15.4:libisccfg1600-32bit-9.16.6-150000.12.65.1.x86_64",
"openSUSE Leap 15.4:libns1604-32bit-9.16.6-150000.12.65.1.x86_64",
"openSUSE Leap 15.4:spacecmd-4.3.21-150000.3.98.1.noarch",
"openSUSE Leap 15.4:wire-0.5.0-150000.1.12.3.aarch64",
"openSUSE Leap 15.4:wire-0.5.0-150000.1.12.3.ppc64le",
"openSUSE Leap 15.4:wire-0.5.0-150000.1.12.3.s390x",
"openSUSE Leap 15.4:wire-0.5.0-150000.1.12.3.x86_64",
"openSUSE Leap 15.5:dracut-saltboot-0.1.1681904360.84ef141-150000.1.50.1.noarch",
"openSUSE Leap 15.5:spacecmd-4.3.21-150000.3.98.1.noarch",
"openSUSE Leap 15.5:wire-0.5.0-150000.1.12.3.aarch64",
"openSUSE Leap 15.5:wire-0.5.0-150000.1.12.3.ppc64le",
"openSUSE Leap 15.5:wire-0.5.0-150000.1.12.3.s390x",
"openSUSE Leap 15.5:wire-0.5.0-150000.1.12.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 7:bind-9.16.6-150000.12.65.1.aarch64",
"SUSE Enterprise Storage 7:bind-9.16.6-150000.12.65.1.x86_64",
"SUSE Enterprise Storage 7:bind-chrootenv-9.16.6-150000.12.65.1.aarch64",
"SUSE Enterprise Storage 7:bind-chrootenv-9.16.6-150000.12.65.1.x86_64",
"SUSE Enterprise Storage 7:bind-devel-9.16.6-150000.12.65.1.aarch64",
"SUSE Enterprise Storage 7:bind-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Enterprise Storage 7:bind-doc-9.16.6-150000.12.65.1.noarch",
"SUSE Enterprise Storage 7:bind-utils-9.16.6-150000.12.65.1.aarch64",
"SUSE Enterprise Storage 7:bind-utils-9.16.6-150000.12.65.1.x86_64",
"SUSE Enterprise Storage 7:libbind9-1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Enterprise Storage 7:libbind9-1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Enterprise Storage 7:libdns1605-9.16.6-150000.12.65.1.aarch64",
"SUSE Enterprise Storage 7:libdns1605-9.16.6-150000.12.65.1.x86_64",
"SUSE Enterprise Storage 7:libirs-devel-9.16.6-150000.12.65.1.aarch64",
"SUSE Enterprise Storage 7:libirs-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Enterprise Storage 7:libirs1601-9.16.6-150000.12.65.1.aarch64",
"SUSE Enterprise Storage 7:libirs1601-9.16.6-150000.12.65.1.x86_64",
"SUSE Enterprise Storage 7:libisc1606-9.16.6-150000.12.65.1.aarch64",
"SUSE Enterprise Storage 7:libisc1606-9.16.6-150000.12.65.1.x86_64",
"SUSE Enterprise Storage 7:libisccc1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Enterprise Storage 7:libisccc1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Enterprise Storage 7:libisccfg1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Enterprise Storage 7:libisccfg1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Enterprise Storage 7:libns1604-9.16.6-150000.12.65.1.aarch64",
"SUSE Enterprise Storage 7:libns1604-9.16.6-150000.12.65.1.x86_64",
"SUSE Enterprise Storage 7:python3-bind-9.16.6-150000.12.65.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:bind-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:bind-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:bind-chrootenv-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:bind-chrootenv-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:bind-devel-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:bind-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:bind-doc-9.16.6-150000.12.65.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:bind-utils-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:bind-utils-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libbind9-1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libbind9-1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libdns1605-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libdns1605-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libirs-devel-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libirs-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libirs1601-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libirs1601-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libisc1606-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libisc1606-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libisccc1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libisccc1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libisccfg1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libisccfg1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libns1604-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libns1604-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:python3-bind-9.16.6-150000.12.65.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:bind-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:bind-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:bind-chrootenv-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:bind-chrootenv-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:bind-devel-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:bind-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:bind-doc-9.16.6-150000.12.65.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:bind-utils-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:bind-utils-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libbind9-1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libbind9-1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libdns1605-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libdns1605-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libirs-devel-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libirs-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libirs1601-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libirs1601-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libisc1606-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libisc1606-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libisccc1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libisccc1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libisccfg1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libisccfg1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libns1604-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libns1604-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:python3-bind-9.16.6-150000.12.65.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-chrootenv-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-chrootenv-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-chrootenv-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-chrootenv-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-devel-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-devel-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-devel-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-doc-9.16.6-150000.12.65.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-utils-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-utils-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-utils-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-utils-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libbind9-1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libbind9-1600-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libbind9-1600-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libbind9-1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libdns1605-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libdns1605-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libdns1605-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libdns1605-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libirs-devel-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libirs-devel-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libirs-devel-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libirs-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libirs1601-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libirs1601-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libirs1601-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libirs1601-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libisc1606-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libisc1606-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libisc1606-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libisc1606-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libisccc1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libisccc1600-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libisccc1600-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libisccc1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libisccfg1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libisccfg1600-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libisccfg1600-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libisccfg1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libns1604-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libns1604-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libns1604-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libns1604-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:python3-bind-9.16.6-150000.12.65.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-chrootenv-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-chrootenv-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-chrootenv-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-chrootenv-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-devel-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-devel-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-devel-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-doc-9.16.6-150000.12.65.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-utils-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-utils-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-utils-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-utils-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libbind9-1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libbind9-1600-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libbind9-1600-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libbind9-1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libdns1605-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libdns1605-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libdns1605-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libdns1605-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libirs-devel-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libirs-devel-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libirs-devel-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libirs-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libirs1601-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libirs1601-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libirs1601-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libirs1601-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libisc1606-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libisc1606-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libisc1606-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libisc1606-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libisccc1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libisccc1600-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libisccc1600-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libisccc1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libisccfg1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libisccfg1600-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libisccfg1600-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libisccfg1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libns1604-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libns1604-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libns1604-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libns1604-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:python3-bind-9.16.6-150000.12.65.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:bind-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:bind-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:bind-chrootenv-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:bind-chrootenv-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:bind-devel-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:bind-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:bind-doc-9.16.6-150000.12.65.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:bind-utils-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:bind-utils-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libbind9-1600-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libbind9-1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libdns1605-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libdns1605-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libirs-devel-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libirs-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libirs1601-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libirs1601-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libisc1606-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libisc1606-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libisccc1600-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libisccc1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libisccfg1600-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libisccfg1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libns1604-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libns1604-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:python3-bind-9.16.6-150000.12.65.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:bind-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:bind-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:bind-chrootenv-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:bind-chrootenv-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:bind-devel-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:bind-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:bind-doc-9.16.6-150000.12.65.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:bind-utils-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:bind-utils-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libbind9-1600-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libbind9-1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libdns1605-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libdns1605-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libirs-devel-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libirs-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libirs1601-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libirs1601-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libisc1606-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libisc1606-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libisccc1600-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libisccc1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libisccfg1600-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libisccfg1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libns1604-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libns1604-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:python3-bind-9.16.6-150000.12.65.1.noarch",
"SUSE Manager Client Tools 15:dracut-saltboot-0.1.1681904360.84ef141-150000.1.50.1.noarch",
"SUSE Manager Client Tools 15:grafana-9.5.1-150000.1.48.5.aarch64",
"SUSE Manager Client Tools 15:grafana-9.5.1-150000.1.48.5.ppc64le",
"SUSE Manager Client Tools 15:grafana-9.5.1-150000.1.48.5.s390x",
"SUSE Manager Client Tools 15:grafana-9.5.1-150000.1.48.5.x86_64",
"SUSE Manager Client Tools 15:mgr-daemon-4.3.7-150000.1.41.1.noarch",
"SUSE Manager Client Tools 15:python3-uyuni-common-libs-4.3.8-150000.1.33.1.aarch64",
"SUSE Manager Client Tools 15:python3-uyuni-common-libs-4.3.8-150000.1.33.1.ppc64le",
"SUSE Manager Client Tools 15:python3-uyuni-common-libs-4.3.8-150000.1.33.1.s390x",
"SUSE Manager Client Tools 15:python3-uyuni-common-libs-4.3.8-150000.1.33.1.x86_64",
"SUSE Manager Client Tools 15:python3-zypp-plugin-spacewalk-1.0.14-150000.3.35.1.noarch",
"SUSE Manager Client Tools 15:spacecmd-4.3.21-150000.3.98.1.noarch",
"SUSE Manager Client Tools 15:zypp-plugin-spacewalk-1.0.14-150000.3.35.1.noarch",
"SUSE Manager Client Tools for SLE Micro 5:bind-utils-9.16.6-150000.12.65.1.aarch64",
"SUSE Manager Client Tools for SLE Micro 5:bind-utils-9.16.6-150000.12.65.1.s390x",
"SUSE Manager Client Tools for SLE Micro 5:bind-utils-9.16.6-150000.12.65.1.x86_64",
"SUSE Manager Client Tools for SLE Micro 5:dracut-saltboot-0.1.1681904360.84ef141-150000.1.50.1.noarch",
"SUSE Manager Client Tools for SLE Micro 5:libbind9-1600-64bit-9.16.6-150000.12.65.1.aarch64_ilp32",
"SUSE Manager Client Tools for SLE Micro 5:libbind9-1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Manager Client Tools for SLE Micro 5:libbind9-1600-9.16.6-150000.12.65.1.s390x",
"SUSE Manager Client Tools for SLE Micro 5:libbind9-1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Manager Client Tools for SLE Micro 5:libdns1605-64bit-9.16.6-150000.12.65.1.aarch64_ilp32",
"SUSE Manager Client Tools for SLE Micro 5:libdns1605-9.16.6-150000.12.65.1.aarch64",
"SUSE Manager Client Tools for SLE Micro 5:libdns1605-9.16.6-150000.12.65.1.s390x",
"SUSE Manager Client Tools for SLE Micro 5:libdns1605-9.16.6-150000.12.65.1.x86_64",
"SUSE Manager Client Tools for SLE Micro 5:libirs1601-64bit-9.16.6-150000.12.65.1.aarch64_ilp32",
"SUSE Manager Client Tools for SLE Micro 5:libirs1601-9.16.6-150000.12.65.1.aarch64",
"SUSE Manager Client Tools for SLE Micro 5:libirs1601-9.16.6-150000.12.65.1.s390x",
"SUSE Manager Client Tools for SLE Micro 5:libirs1601-9.16.6-150000.12.65.1.x86_64",
"SUSE Manager Client Tools for SLE Micro 5:libisc1606-64bit-9.16.6-150000.12.65.1.aarch64_ilp32",
"SUSE Manager Client Tools for SLE Micro 5:libisc1606-9.16.6-150000.12.65.1.aarch64",
"SUSE Manager Client Tools for SLE Micro 5:libisc1606-9.16.6-150000.12.65.1.s390x",
"SUSE Manager Client Tools for SLE Micro 5:libisc1606-9.16.6-150000.12.65.1.x86_64",
"SUSE Manager Client Tools for SLE Micro 5:libisccc1600-64bit-9.16.6-150000.12.65.1.aarch64_ilp32",
"SUSE Manager Client Tools for SLE Micro 5:libisccc1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Manager Client Tools for SLE Micro 5:libisccc1600-9.16.6-150000.12.65.1.s390x",
"SUSE Manager Client Tools for SLE Micro 5:libisccc1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Manager Client Tools for SLE Micro 5:libisccfg1600-64bit-9.16.6-150000.12.65.1.aarch64_ilp32",
"SUSE Manager Client Tools for SLE Micro 5:libisccfg1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Manager Client Tools for SLE Micro 5:libisccfg1600-9.16.6-150000.12.65.1.s390x",
"SUSE Manager Client Tools for SLE Micro 5:libisccfg1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Manager Client Tools for SLE Micro 5:libns1604-9.16.6-150000.12.65.1.s390x",
"SUSE Manager Client Tools for SLE Micro 5:libns1604-9.16.6-150000.12.65.1.x86_64",
"SUSE Manager Client Tools for SLE Micro 5:python3-bind-9.16.6-150000.12.65.1.noarch",
"SUSE Manager Proxy Module 4.2:python3-zypp-plugin-spacewalk-1.0.14-150000.3.35.1.noarch",
"SUSE Manager Proxy Module 4.2:zypp-plugin-spacewalk-1.0.14-150000.3.35.1.noarch",
"SUSE Manager Proxy Module 4.3:python3-zypp-plugin-spacewalk-1.0.14-150000.3.35.1.noarch",
"SUSE Manager Proxy Module 4.3:zypp-plugin-spacewalk-1.0.14-150000.3.35.1.noarch",
"openSUSE Leap 15.4:bind-devel-32bit-9.16.6-150000.12.65.1.x86_64",
"openSUSE Leap 15.4:dracut-saltboot-0.1.1681904360.84ef141-150000.1.50.1.noarch",
"openSUSE Leap 15.4:libbind9-1600-32bit-9.16.6-150000.12.65.1.x86_64",
"openSUSE Leap 15.4:libdns1605-32bit-9.16.6-150000.12.65.1.x86_64",
"openSUSE Leap 15.4:libirs1601-32bit-9.16.6-150000.12.65.1.x86_64",
"openSUSE Leap 15.4:libisc1606-32bit-9.16.6-150000.12.65.1.x86_64",
"openSUSE Leap 15.4:libisccc1600-32bit-9.16.6-150000.12.65.1.x86_64",
"openSUSE Leap 15.4:libisccfg1600-32bit-9.16.6-150000.12.65.1.x86_64",
"openSUSE Leap 15.4:libns1604-32bit-9.16.6-150000.12.65.1.x86_64",
"openSUSE Leap 15.4:spacecmd-4.3.21-150000.3.98.1.noarch",
"openSUSE Leap 15.4:wire-0.5.0-150000.1.12.3.aarch64",
"openSUSE Leap 15.4:wire-0.5.0-150000.1.12.3.ppc64le",
"openSUSE Leap 15.4:wire-0.5.0-150000.1.12.3.s390x",
"openSUSE Leap 15.4:wire-0.5.0-150000.1.12.3.x86_64",
"openSUSE Leap 15.5:dracut-saltboot-0.1.1681904360.84ef141-150000.1.50.1.noarch",
"openSUSE Leap 15.5:spacecmd-4.3.21-150000.3.98.1.noarch",
"openSUSE Leap 15.5:wire-0.5.0-150000.1.12.3.aarch64",
"openSUSE Leap 15.5:wire-0.5.0-150000.1.12.3.ppc64le",
"openSUSE Leap 15.5:wire-0.5.0-150000.1.12.3.s390x",
"openSUSE Leap 15.5:wire-0.5.0-150000.1.12.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2023-06-21T11:49:43Z",
"details": "important"
}
],
"title": "CVE-2021-3918"
},
{
"cve": "CVE-2021-43138",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-43138"
}
],
"notes": [
{
"category": "general",
"text": "In Async before 2.6.4 and 3.x before 3.2.2, a malicious user can obtain privileges via the mapValues() method, aka lib/internal/iterator.js createObjectIterator prototype pollution.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 7:bind-9.16.6-150000.12.65.1.aarch64",
"SUSE Enterprise Storage 7:bind-9.16.6-150000.12.65.1.x86_64",
"SUSE Enterprise Storage 7:bind-chrootenv-9.16.6-150000.12.65.1.aarch64",
"SUSE Enterprise Storage 7:bind-chrootenv-9.16.6-150000.12.65.1.x86_64",
"SUSE Enterprise Storage 7:bind-devel-9.16.6-150000.12.65.1.aarch64",
"SUSE Enterprise Storage 7:bind-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Enterprise Storage 7:bind-doc-9.16.6-150000.12.65.1.noarch",
"SUSE Enterprise Storage 7:bind-utils-9.16.6-150000.12.65.1.aarch64",
"SUSE Enterprise Storage 7:bind-utils-9.16.6-150000.12.65.1.x86_64",
"SUSE Enterprise Storage 7:libbind9-1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Enterprise Storage 7:libbind9-1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Enterprise Storage 7:libdns1605-9.16.6-150000.12.65.1.aarch64",
"SUSE Enterprise Storage 7:libdns1605-9.16.6-150000.12.65.1.x86_64",
"SUSE Enterprise Storage 7:libirs-devel-9.16.6-150000.12.65.1.aarch64",
"SUSE Enterprise Storage 7:libirs-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Enterprise Storage 7:libirs1601-9.16.6-150000.12.65.1.aarch64",
"SUSE Enterprise Storage 7:libirs1601-9.16.6-150000.12.65.1.x86_64",
"SUSE Enterprise Storage 7:libisc1606-9.16.6-150000.12.65.1.aarch64",
"SUSE Enterprise Storage 7:libisc1606-9.16.6-150000.12.65.1.x86_64",
"SUSE Enterprise Storage 7:libisccc1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Enterprise Storage 7:libisccc1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Enterprise Storage 7:libisccfg1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Enterprise Storage 7:libisccfg1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Enterprise Storage 7:libns1604-9.16.6-150000.12.65.1.aarch64",
"SUSE Enterprise Storage 7:libns1604-9.16.6-150000.12.65.1.x86_64",
"SUSE Enterprise Storage 7:python3-bind-9.16.6-150000.12.65.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:bind-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:bind-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:bind-chrootenv-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:bind-chrootenv-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:bind-devel-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:bind-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:bind-doc-9.16.6-150000.12.65.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:bind-utils-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:bind-utils-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libbind9-1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libbind9-1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libdns1605-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libdns1605-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libirs-devel-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libirs-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libirs1601-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libirs1601-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libisc1606-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libisc1606-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libisccc1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libisccc1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libisccfg1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libisccfg1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libns1604-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libns1604-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:python3-bind-9.16.6-150000.12.65.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:bind-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:bind-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:bind-chrootenv-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:bind-chrootenv-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:bind-devel-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:bind-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:bind-doc-9.16.6-150000.12.65.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:bind-utils-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:bind-utils-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libbind9-1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libbind9-1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libdns1605-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libdns1605-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libirs-devel-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libirs-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libirs1601-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libirs1601-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libisc1606-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libisc1606-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libisccc1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libisccc1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libisccfg1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libisccfg1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libns1604-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libns1604-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:python3-bind-9.16.6-150000.12.65.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-chrootenv-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-chrootenv-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-chrootenv-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-chrootenv-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-devel-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-devel-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-devel-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-doc-9.16.6-150000.12.65.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-utils-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-utils-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-utils-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-utils-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libbind9-1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libbind9-1600-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libbind9-1600-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libbind9-1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libdns1605-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libdns1605-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libdns1605-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libdns1605-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libirs-devel-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libirs-devel-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libirs-devel-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libirs-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libirs1601-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libirs1601-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libirs1601-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libirs1601-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libisc1606-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libisc1606-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libisc1606-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libisc1606-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libisccc1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libisccc1600-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libisccc1600-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libisccc1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libisccfg1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libisccfg1600-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libisccfg1600-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libisccfg1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libns1604-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libns1604-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libns1604-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libns1604-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:python3-bind-9.16.6-150000.12.65.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-chrootenv-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-chrootenv-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-chrootenv-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-chrootenv-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-devel-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-devel-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-devel-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-doc-9.16.6-150000.12.65.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-utils-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-utils-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-utils-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-utils-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libbind9-1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libbind9-1600-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libbind9-1600-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libbind9-1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libdns1605-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libdns1605-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libdns1605-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libdns1605-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libirs-devel-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libirs-devel-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libirs-devel-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libirs-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libirs1601-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libirs1601-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libirs1601-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libirs1601-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libisc1606-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libisc1606-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libisc1606-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libisc1606-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libisccc1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libisccc1600-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libisccc1600-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libisccc1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libisccfg1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libisccfg1600-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libisccfg1600-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libisccfg1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libns1604-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libns1604-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libns1604-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libns1604-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:python3-bind-9.16.6-150000.12.65.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:bind-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:bind-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:bind-chrootenv-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:bind-chrootenv-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:bind-devel-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:bind-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:bind-doc-9.16.6-150000.12.65.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:bind-utils-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:bind-utils-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libbind9-1600-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libbind9-1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libdns1605-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libdns1605-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libirs-devel-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libirs-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libirs1601-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libirs1601-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libisc1606-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libisc1606-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libisccc1600-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libisccc1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libisccfg1600-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libisccfg1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libns1604-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libns1604-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:python3-bind-9.16.6-150000.12.65.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:bind-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:bind-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:bind-chrootenv-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:bind-chrootenv-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:bind-devel-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:bind-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:bind-doc-9.16.6-150000.12.65.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:bind-utils-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:bind-utils-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libbind9-1600-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libbind9-1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libdns1605-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libdns1605-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libirs-devel-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libirs-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libirs1601-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libirs1601-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libisc1606-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libisc1606-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libisccc1600-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libisccc1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libisccfg1600-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libisccfg1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libns1604-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libns1604-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:python3-bind-9.16.6-150000.12.65.1.noarch",
"SUSE Manager Client Tools 15:dracut-saltboot-0.1.1681904360.84ef141-150000.1.50.1.noarch",
"SUSE Manager Client Tools 15:grafana-9.5.1-150000.1.48.5.aarch64",
"SUSE Manager Client Tools 15:grafana-9.5.1-150000.1.48.5.ppc64le",
"SUSE Manager Client Tools 15:grafana-9.5.1-150000.1.48.5.s390x",
"SUSE Manager Client Tools 15:grafana-9.5.1-150000.1.48.5.x86_64",
"SUSE Manager Client Tools 15:mgr-daemon-4.3.7-150000.1.41.1.noarch",
"SUSE Manager Client Tools 15:python3-uyuni-common-libs-4.3.8-150000.1.33.1.aarch64",
"SUSE Manager Client Tools 15:python3-uyuni-common-libs-4.3.8-150000.1.33.1.ppc64le",
"SUSE Manager Client Tools 15:python3-uyuni-common-libs-4.3.8-150000.1.33.1.s390x",
"SUSE Manager Client Tools 15:python3-uyuni-common-libs-4.3.8-150000.1.33.1.x86_64",
"SUSE Manager Client Tools 15:python3-zypp-plugin-spacewalk-1.0.14-150000.3.35.1.noarch",
"SUSE Manager Client Tools 15:spacecmd-4.3.21-150000.3.98.1.noarch",
"SUSE Manager Client Tools 15:zypp-plugin-spacewalk-1.0.14-150000.3.35.1.noarch",
"SUSE Manager Client Tools for SLE Micro 5:bind-utils-9.16.6-150000.12.65.1.aarch64",
"SUSE Manager Client Tools for SLE Micro 5:bind-utils-9.16.6-150000.12.65.1.s390x",
"SUSE Manager Client Tools for SLE Micro 5:bind-utils-9.16.6-150000.12.65.1.x86_64",
"SUSE Manager Client Tools for SLE Micro 5:dracut-saltboot-0.1.1681904360.84ef141-150000.1.50.1.noarch",
"SUSE Manager Client Tools for SLE Micro 5:libbind9-1600-64bit-9.16.6-150000.12.65.1.aarch64_ilp32",
"SUSE Manager Client Tools for SLE Micro 5:libbind9-1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Manager Client Tools for SLE Micro 5:libbind9-1600-9.16.6-150000.12.65.1.s390x",
"SUSE Manager Client Tools for SLE Micro 5:libbind9-1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Manager Client Tools for SLE Micro 5:libdns1605-64bit-9.16.6-150000.12.65.1.aarch64_ilp32",
"SUSE Manager Client Tools for SLE Micro 5:libdns1605-9.16.6-150000.12.65.1.aarch64",
"SUSE Manager Client Tools for SLE Micro 5:libdns1605-9.16.6-150000.12.65.1.s390x",
"SUSE Manager Client Tools for SLE Micro 5:libdns1605-9.16.6-150000.12.65.1.x86_64",
"SUSE Manager Client Tools for SLE Micro 5:libirs1601-64bit-9.16.6-150000.12.65.1.aarch64_ilp32",
"SUSE Manager Client Tools for SLE Micro 5:libirs1601-9.16.6-150000.12.65.1.aarch64",
"SUSE Manager Client Tools for SLE Micro 5:libirs1601-9.16.6-150000.12.65.1.s390x",
"SUSE Manager Client Tools for SLE Micro 5:libirs1601-9.16.6-150000.12.65.1.x86_64",
"SUSE Manager Client Tools for SLE Micro 5:libisc1606-64bit-9.16.6-150000.12.65.1.aarch64_ilp32",
"SUSE Manager Client Tools for SLE Micro 5:libisc1606-9.16.6-150000.12.65.1.aarch64",
"SUSE Manager Client Tools for SLE Micro 5:libisc1606-9.16.6-150000.12.65.1.s390x",
"SUSE Manager Client Tools for SLE Micro 5:libisc1606-9.16.6-150000.12.65.1.x86_64",
"SUSE Manager Client Tools for SLE Micro 5:libisccc1600-64bit-9.16.6-150000.12.65.1.aarch64_ilp32",
"SUSE Manager Client Tools for SLE Micro 5:libisccc1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Manager Client Tools for SLE Micro 5:libisccc1600-9.16.6-150000.12.65.1.s390x",
"SUSE Manager Client Tools for SLE Micro 5:libisccc1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Manager Client Tools for SLE Micro 5:libisccfg1600-64bit-9.16.6-150000.12.65.1.aarch64_ilp32",
"SUSE Manager Client Tools for SLE Micro 5:libisccfg1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Manager Client Tools for SLE Micro 5:libisccfg1600-9.16.6-150000.12.65.1.s390x",
"SUSE Manager Client Tools for SLE Micro 5:libisccfg1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Manager Client Tools for SLE Micro 5:libns1604-9.16.6-150000.12.65.1.s390x",
"SUSE Manager Client Tools for SLE Micro 5:libns1604-9.16.6-150000.12.65.1.x86_64",
"SUSE Manager Client Tools for SLE Micro 5:python3-bind-9.16.6-150000.12.65.1.noarch",
"SUSE Manager Proxy Module 4.2:python3-zypp-plugin-spacewalk-1.0.14-150000.3.35.1.noarch",
"SUSE Manager Proxy Module 4.2:zypp-plugin-spacewalk-1.0.14-150000.3.35.1.noarch",
"SUSE Manager Proxy Module 4.3:python3-zypp-plugin-spacewalk-1.0.14-150000.3.35.1.noarch",
"SUSE Manager Proxy Module 4.3:zypp-plugin-spacewalk-1.0.14-150000.3.35.1.noarch",
"openSUSE Leap 15.4:bind-devel-32bit-9.16.6-150000.12.65.1.x86_64",
"openSUSE Leap 15.4:dracut-saltboot-0.1.1681904360.84ef141-150000.1.50.1.noarch",
"openSUSE Leap 15.4:libbind9-1600-32bit-9.16.6-150000.12.65.1.x86_64",
"openSUSE Leap 15.4:libdns1605-32bit-9.16.6-150000.12.65.1.x86_64",
"openSUSE Leap 15.4:libirs1601-32bit-9.16.6-150000.12.65.1.x86_64",
"openSUSE Leap 15.4:libisc1606-32bit-9.16.6-150000.12.65.1.x86_64",
"openSUSE Leap 15.4:libisccc1600-32bit-9.16.6-150000.12.65.1.x86_64",
"openSUSE Leap 15.4:libisccfg1600-32bit-9.16.6-150000.12.65.1.x86_64",
"openSUSE Leap 15.4:libns1604-32bit-9.16.6-150000.12.65.1.x86_64",
"openSUSE Leap 15.4:spacecmd-4.3.21-150000.3.98.1.noarch",
"openSUSE Leap 15.4:wire-0.5.0-150000.1.12.3.aarch64",
"openSUSE Leap 15.4:wire-0.5.0-150000.1.12.3.ppc64le",
"openSUSE Leap 15.4:wire-0.5.0-150000.1.12.3.s390x",
"openSUSE Leap 15.4:wire-0.5.0-150000.1.12.3.x86_64",
"openSUSE Leap 15.5:dracut-saltboot-0.1.1681904360.84ef141-150000.1.50.1.noarch",
"openSUSE Leap 15.5:spacecmd-4.3.21-150000.3.98.1.noarch",
"openSUSE Leap 15.5:wire-0.5.0-150000.1.12.3.aarch64",
"openSUSE Leap 15.5:wire-0.5.0-150000.1.12.3.ppc64le",
"openSUSE Leap 15.5:wire-0.5.0-150000.1.12.3.s390x",
"openSUSE Leap 15.5:wire-0.5.0-150000.1.12.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-43138",
"url": "https://www.suse.com/security/cve/CVE-2021-43138"
},
{
"category": "external",
"summary": "SUSE Bug 1200480 for CVE-2021-43138",
"url": "https://bugzilla.suse.com/1200480"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 7:bind-9.16.6-150000.12.65.1.aarch64",
"SUSE Enterprise Storage 7:bind-9.16.6-150000.12.65.1.x86_64",
"SUSE Enterprise Storage 7:bind-chrootenv-9.16.6-150000.12.65.1.aarch64",
"SUSE Enterprise Storage 7:bind-chrootenv-9.16.6-150000.12.65.1.x86_64",
"SUSE Enterprise Storage 7:bind-devel-9.16.6-150000.12.65.1.aarch64",
"SUSE Enterprise Storage 7:bind-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Enterprise Storage 7:bind-doc-9.16.6-150000.12.65.1.noarch",
"SUSE Enterprise Storage 7:bind-utils-9.16.6-150000.12.65.1.aarch64",
"SUSE Enterprise Storage 7:bind-utils-9.16.6-150000.12.65.1.x86_64",
"SUSE Enterprise Storage 7:libbind9-1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Enterprise Storage 7:libbind9-1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Enterprise Storage 7:libdns1605-9.16.6-150000.12.65.1.aarch64",
"SUSE Enterprise Storage 7:libdns1605-9.16.6-150000.12.65.1.x86_64",
"SUSE Enterprise Storage 7:libirs-devel-9.16.6-150000.12.65.1.aarch64",
"SUSE Enterprise Storage 7:libirs-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Enterprise Storage 7:libirs1601-9.16.6-150000.12.65.1.aarch64",
"SUSE Enterprise Storage 7:libirs1601-9.16.6-150000.12.65.1.x86_64",
"SUSE Enterprise Storage 7:libisc1606-9.16.6-150000.12.65.1.aarch64",
"SUSE Enterprise Storage 7:libisc1606-9.16.6-150000.12.65.1.x86_64",
"SUSE Enterprise Storage 7:libisccc1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Enterprise Storage 7:libisccc1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Enterprise Storage 7:libisccfg1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Enterprise Storage 7:libisccfg1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Enterprise Storage 7:libns1604-9.16.6-150000.12.65.1.aarch64",
"SUSE Enterprise Storage 7:libns1604-9.16.6-150000.12.65.1.x86_64",
"SUSE Enterprise Storage 7:python3-bind-9.16.6-150000.12.65.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:bind-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:bind-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:bind-chrootenv-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:bind-chrootenv-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:bind-devel-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:bind-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:bind-doc-9.16.6-150000.12.65.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:bind-utils-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:bind-utils-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libbind9-1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libbind9-1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libdns1605-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libdns1605-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libirs-devel-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libirs-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libirs1601-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libirs1601-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libisc1606-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libisc1606-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libisccc1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libisccc1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libisccfg1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libisccfg1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libns1604-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libns1604-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:python3-bind-9.16.6-150000.12.65.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:bind-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:bind-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:bind-chrootenv-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:bind-chrootenv-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:bind-devel-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:bind-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:bind-doc-9.16.6-150000.12.65.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:bind-utils-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:bind-utils-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libbind9-1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libbind9-1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libdns1605-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libdns1605-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libirs-devel-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libirs-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libirs1601-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libirs1601-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libisc1606-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libisc1606-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libisccc1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libisccc1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libisccfg1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libisccfg1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libns1604-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libns1604-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:python3-bind-9.16.6-150000.12.65.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-chrootenv-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-chrootenv-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-chrootenv-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-chrootenv-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-devel-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-devel-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-devel-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-doc-9.16.6-150000.12.65.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-utils-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-utils-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-utils-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-utils-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libbind9-1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libbind9-1600-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libbind9-1600-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libbind9-1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libdns1605-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libdns1605-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libdns1605-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libdns1605-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libirs-devel-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libirs-devel-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libirs-devel-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libirs-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libirs1601-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libirs1601-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libirs1601-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libirs1601-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libisc1606-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libisc1606-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libisc1606-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libisc1606-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libisccc1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libisccc1600-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libisccc1600-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libisccc1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libisccfg1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libisccfg1600-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libisccfg1600-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libisccfg1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libns1604-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libns1604-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libns1604-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libns1604-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:python3-bind-9.16.6-150000.12.65.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-chrootenv-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-chrootenv-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-chrootenv-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-chrootenv-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-devel-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-devel-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-devel-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-doc-9.16.6-150000.12.65.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-utils-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-utils-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-utils-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-utils-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libbind9-1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libbind9-1600-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libbind9-1600-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libbind9-1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libdns1605-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libdns1605-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libdns1605-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libdns1605-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libirs-devel-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libirs-devel-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libirs-devel-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libirs-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libirs1601-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libirs1601-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libirs1601-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libirs1601-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libisc1606-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libisc1606-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libisc1606-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libisc1606-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libisccc1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libisccc1600-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libisccc1600-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libisccc1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libisccfg1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libisccfg1600-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libisccfg1600-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libisccfg1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libns1604-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libns1604-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libns1604-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libns1604-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:python3-bind-9.16.6-150000.12.65.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:bind-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:bind-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:bind-chrootenv-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:bind-chrootenv-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:bind-devel-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:bind-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:bind-doc-9.16.6-150000.12.65.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:bind-utils-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:bind-utils-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libbind9-1600-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libbind9-1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libdns1605-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libdns1605-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libirs-devel-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libirs-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libirs1601-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libirs1601-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libisc1606-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libisc1606-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libisccc1600-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libisccc1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libisccfg1600-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libisccfg1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libns1604-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libns1604-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:python3-bind-9.16.6-150000.12.65.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:bind-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:bind-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:bind-chrootenv-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:bind-chrootenv-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:bind-devel-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:bind-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:bind-doc-9.16.6-150000.12.65.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:bind-utils-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:bind-utils-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libbind9-1600-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libbind9-1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libdns1605-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libdns1605-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libirs-devel-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libirs-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libirs1601-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libirs1601-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libisc1606-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libisc1606-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libisccc1600-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libisccc1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libisccfg1600-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libisccfg1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libns1604-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libns1604-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:python3-bind-9.16.6-150000.12.65.1.noarch",
"SUSE Manager Client Tools 15:dracut-saltboot-0.1.1681904360.84ef141-150000.1.50.1.noarch",
"SUSE Manager Client Tools 15:grafana-9.5.1-150000.1.48.5.aarch64",
"SUSE Manager Client Tools 15:grafana-9.5.1-150000.1.48.5.ppc64le",
"SUSE Manager Client Tools 15:grafana-9.5.1-150000.1.48.5.s390x",
"SUSE Manager Client Tools 15:grafana-9.5.1-150000.1.48.5.x86_64",
"SUSE Manager Client Tools 15:mgr-daemon-4.3.7-150000.1.41.1.noarch",
"SUSE Manager Client Tools 15:python3-uyuni-common-libs-4.3.8-150000.1.33.1.aarch64",
"SUSE Manager Client Tools 15:python3-uyuni-common-libs-4.3.8-150000.1.33.1.ppc64le",
"SUSE Manager Client Tools 15:python3-uyuni-common-libs-4.3.8-150000.1.33.1.s390x",
"SUSE Manager Client Tools 15:python3-uyuni-common-libs-4.3.8-150000.1.33.1.x86_64",
"SUSE Manager Client Tools 15:python3-zypp-plugin-spacewalk-1.0.14-150000.3.35.1.noarch",
"SUSE Manager Client Tools 15:spacecmd-4.3.21-150000.3.98.1.noarch",
"SUSE Manager Client Tools 15:zypp-plugin-spacewalk-1.0.14-150000.3.35.1.noarch",
"SUSE Manager Client Tools for SLE Micro 5:bind-utils-9.16.6-150000.12.65.1.aarch64",
"SUSE Manager Client Tools for SLE Micro 5:bind-utils-9.16.6-150000.12.65.1.s390x",
"SUSE Manager Client Tools for SLE Micro 5:bind-utils-9.16.6-150000.12.65.1.x86_64",
"SUSE Manager Client Tools for SLE Micro 5:dracut-saltboot-0.1.1681904360.84ef141-150000.1.50.1.noarch",
"SUSE Manager Client Tools for SLE Micro 5:libbind9-1600-64bit-9.16.6-150000.12.65.1.aarch64_ilp32",
"SUSE Manager Client Tools for SLE Micro 5:libbind9-1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Manager Client Tools for SLE Micro 5:libbind9-1600-9.16.6-150000.12.65.1.s390x",
"SUSE Manager Client Tools for SLE Micro 5:libbind9-1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Manager Client Tools for SLE Micro 5:libdns1605-64bit-9.16.6-150000.12.65.1.aarch64_ilp32",
"SUSE Manager Client Tools for SLE Micro 5:libdns1605-9.16.6-150000.12.65.1.aarch64",
"SUSE Manager Client Tools for SLE Micro 5:libdns1605-9.16.6-150000.12.65.1.s390x",
"SUSE Manager Client Tools for SLE Micro 5:libdns1605-9.16.6-150000.12.65.1.x86_64",
"SUSE Manager Client Tools for SLE Micro 5:libirs1601-64bit-9.16.6-150000.12.65.1.aarch64_ilp32",
"SUSE Manager Client Tools for SLE Micro 5:libirs1601-9.16.6-150000.12.65.1.aarch64",
"SUSE Manager Client Tools for SLE Micro 5:libirs1601-9.16.6-150000.12.65.1.s390x",
"SUSE Manager Client Tools for SLE Micro 5:libirs1601-9.16.6-150000.12.65.1.x86_64",
"SUSE Manager Client Tools for SLE Micro 5:libisc1606-64bit-9.16.6-150000.12.65.1.aarch64_ilp32",
"SUSE Manager Client Tools for SLE Micro 5:libisc1606-9.16.6-150000.12.65.1.aarch64",
"SUSE Manager Client Tools for SLE Micro 5:libisc1606-9.16.6-150000.12.65.1.s390x",
"SUSE Manager Client Tools for SLE Micro 5:libisc1606-9.16.6-150000.12.65.1.x86_64",
"SUSE Manager Client Tools for SLE Micro 5:libisccc1600-64bit-9.16.6-150000.12.65.1.aarch64_ilp32",
"SUSE Manager Client Tools for SLE Micro 5:libisccc1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Manager Client Tools for SLE Micro 5:libisccc1600-9.16.6-150000.12.65.1.s390x",
"SUSE Manager Client Tools for SLE Micro 5:libisccc1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Manager Client Tools for SLE Micro 5:libisccfg1600-64bit-9.16.6-150000.12.65.1.aarch64_ilp32",
"SUSE Manager Client Tools for SLE Micro 5:libisccfg1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Manager Client Tools for SLE Micro 5:libisccfg1600-9.16.6-150000.12.65.1.s390x",
"SUSE Manager Client Tools for SLE Micro 5:libisccfg1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Manager Client Tools for SLE Micro 5:libns1604-9.16.6-150000.12.65.1.s390x",
"SUSE Manager Client Tools for SLE Micro 5:libns1604-9.16.6-150000.12.65.1.x86_64",
"SUSE Manager Client Tools for SLE Micro 5:python3-bind-9.16.6-150000.12.65.1.noarch",
"SUSE Manager Proxy Module 4.2:python3-zypp-plugin-spacewalk-1.0.14-150000.3.35.1.noarch",
"SUSE Manager Proxy Module 4.2:zypp-plugin-spacewalk-1.0.14-150000.3.35.1.noarch",
"SUSE Manager Proxy Module 4.3:python3-zypp-plugin-spacewalk-1.0.14-150000.3.35.1.noarch",
"SUSE Manager Proxy Module 4.3:zypp-plugin-spacewalk-1.0.14-150000.3.35.1.noarch",
"openSUSE Leap 15.4:bind-devel-32bit-9.16.6-150000.12.65.1.x86_64",
"openSUSE Leap 15.4:dracut-saltboot-0.1.1681904360.84ef141-150000.1.50.1.noarch",
"openSUSE Leap 15.4:libbind9-1600-32bit-9.16.6-150000.12.65.1.x86_64",
"openSUSE Leap 15.4:libdns1605-32bit-9.16.6-150000.12.65.1.x86_64",
"openSUSE Leap 15.4:libirs1601-32bit-9.16.6-150000.12.65.1.x86_64",
"openSUSE Leap 15.4:libisc1606-32bit-9.16.6-150000.12.65.1.x86_64",
"openSUSE Leap 15.4:libisccc1600-32bit-9.16.6-150000.12.65.1.x86_64",
"openSUSE Leap 15.4:libisccfg1600-32bit-9.16.6-150000.12.65.1.x86_64",
"openSUSE Leap 15.4:libns1604-32bit-9.16.6-150000.12.65.1.x86_64",
"openSUSE Leap 15.4:spacecmd-4.3.21-150000.3.98.1.noarch",
"openSUSE Leap 15.4:wire-0.5.0-150000.1.12.3.aarch64",
"openSUSE Leap 15.4:wire-0.5.0-150000.1.12.3.ppc64le",
"openSUSE Leap 15.4:wire-0.5.0-150000.1.12.3.s390x",
"openSUSE Leap 15.4:wire-0.5.0-150000.1.12.3.x86_64",
"openSUSE Leap 15.5:dracut-saltboot-0.1.1681904360.84ef141-150000.1.50.1.noarch",
"openSUSE Leap 15.5:spacecmd-4.3.21-150000.3.98.1.noarch",
"openSUSE Leap 15.5:wire-0.5.0-150000.1.12.3.aarch64",
"openSUSE Leap 15.5:wire-0.5.0-150000.1.12.3.ppc64le",
"openSUSE Leap 15.5:wire-0.5.0-150000.1.12.3.s390x",
"openSUSE Leap 15.5:wire-0.5.0-150000.1.12.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 7:bind-9.16.6-150000.12.65.1.aarch64",
"SUSE Enterprise Storage 7:bind-9.16.6-150000.12.65.1.x86_64",
"SUSE Enterprise Storage 7:bind-chrootenv-9.16.6-150000.12.65.1.aarch64",
"SUSE Enterprise Storage 7:bind-chrootenv-9.16.6-150000.12.65.1.x86_64",
"SUSE Enterprise Storage 7:bind-devel-9.16.6-150000.12.65.1.aarch64",
"SUSE Enterprise Storage 7:bind-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Enterprise Storage 7:bind-doc-9.16.6-150000.12.65.1.noarch",
"SUSE Enterprise Storage 7:bind-utils-9.16.6-150000.12.65.1.aarch64",
"SUSE Enterprise Storage 7:bind-utils-9.16.6-150000.12.65.1.x86_64",
"SUSE Enterprise Storage 7:libbind9-1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Enterprise Storage 7:libbind9-1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Enterprise Storage 7:libdns1605-9.16.6-150000.12.65.1.aarch64",
"SUSE Enterprise Storage 7:libdns1605-9.16.6-150000.12.65.1.x86_64",
"SUSE Enterprise Storage 7:libirs-devel-9.16.6-150000.12.65.1.aarch64",
"SUSE Enterprise Storage 7:libirs-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Enterprise Storage 7:libirs1601-9.16.6-150000.12.65.1.aarch64",
"SUSE Enterprise Storage 7:libirs1601-9.16.6-150000.12.65.1.x86_64",
"SUSE Enterprise Storage 7:libisc1606-9.16.6-150000.12.65.1.aarch64",
"SUSE Enterprise Storage 7:libisc1606-9.16.6-150000.12.65.1.x86_64",
"SUSE Enterprise Storage 7:libisccc1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Enterprise Storage 7:libisccc1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Enterprise Storage 7:libisccfg1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Enterprise Storage 7:libisccfg1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Enterprise Storage 7:libns1604-9.16.6-150000.12.65.1.aarch64",
"SUSE Enterprise Storage 7:libns1604-9.16.6-150000.12.65.1.x86_64",
"SUSE Enterprise Storage 7:python3-bind-9.16.6-150000.12.65.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:bind-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:bind-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:bind-chrootenv-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:bind-chrootenv-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:bind-devel-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:bind-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:bind-doc-9.16.6-150000.12.65.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:bind-utils-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:bind-utils-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libbind9-1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libbind9-1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libdns1605-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libdns1605-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libirs-devel-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libirs-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libirs1601-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libirs1601-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libisc1606-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libisc1606-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libisccc1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libisccc1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libisccfg1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libisccfg1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libns1604-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libns1604-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:python3-bind-9.16.6-150000.12.65.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:bind-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:bind-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:bind-chrootenv-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:bind-chrootenv-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:bind-devel-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:bind-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:bind-doc-9.16.6-150000.12.65.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:bind-utils-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:bind-utils-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libbind9-1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libbind9-1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libdns1605-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libdns1605-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libirs-devel-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libirs-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libirs1601-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libirs1601-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libisc1606-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libisc1606-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libisccc1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libisccc1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libisccfg1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libisccfg1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libns1604-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libns1604-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:python3-bind-9.16.6-150000.12.65.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-chrootenv-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-chrootenv-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-chrootenv-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-chrootenv-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-devel-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-devel-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-devel-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-doc-9.16.6-150000.12.65.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-utils-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-utils-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-utils-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-utils-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libbind9-1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libbind9-1600-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libbind9-1600-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libbind9-1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libdns1605-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libdns1605-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libdns1605-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libdns1605-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libirs-devel-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libirs-devel-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libirs-devel-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libirs-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libirs1601-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libirs1601-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libirs1601-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libirs1601-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libisc1606-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libisc1606-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libisc1606-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libisc1606-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libisccc1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libisccc1600-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libisccc1600-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libisccc1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libisccfg1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libisccfg1600-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libisccfg1600-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libisccfg1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libns1604-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libns1604-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libns1604-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libns1604-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:python3-bind-9.16.6-150000.12.65.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-chrootenv-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-chrootenv-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-chrootenv-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-chrootenv-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-devel-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-devel-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-devel-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-doc-9.16.6-150000.12.65.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-utils-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-utils-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-utils-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-utils-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libbind9-1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libbind9-1600-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libbind9-1600-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libbind9-1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libdns1605-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libdns1605-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libdns1605-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libdns1605-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libirs-devel-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libirs-devel-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libirs-devel-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libirs-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libirs1601-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libirs1601-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libirs1601-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libirs1601-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libisc1606-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libisc1606-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libisc1606-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libisc1606-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libisccc1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libisccc1600-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libisccc1600-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libisccc1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libisccfg1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libisccfg1600-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libisccfg1600-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libisccfg1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libns1604-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libns1604-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libns1604-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libns1604-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:python3-bind-9.16.6-150000.12.65.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:bind-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:bind-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:bind-chrootenv-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:bind-chrootenv-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:bind-devel-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:bind-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:bind-doc-9.16.6-150000.12.65.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:bind-utils-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:bind-utils-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libbind9-1600-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libbind9-1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libdns1605-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libdns1605-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libirs-devel-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libirs-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libirs1601-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libirs1601-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libisc1606-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libisc1606-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libisccc1600-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libisccc1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libisccfg1600-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libisccfg1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libns1604-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libns1604-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:python3-bind-9.16.6-150000.12.65.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:bind-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:bind-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:bind-chrootenv-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:bind-chrootenv-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:bind-devel-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:bind-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:bind-doc-9.16.6-150000.12.65.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:bind-utils-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:bind-utils-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libbind9-1600-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libbind9-1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libdns1605-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libdns1605-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libirs-devel-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libirs-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libirs1601-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libirs1601-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libisc1606-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libisc1606-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libisccc1600-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libisccc1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libisccfg1600-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libisccfg1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libns1604-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libns1604-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:python3-bind-9.16.6-150000.12.65.1.noarch",
"SUSE Manager Client Tools 15:dracut-saltboot-0.1.1681904360.84ef141-150000.1.50.1.noarch",
"SUSE Manager Client Tools 15:grafana-9.5.1-150000.1.48.5.aarch64",
"SUSE Manager Client Tools 15:grafana-9.5.1-150000.1.48.5.ppc64le",
"SUSE Manager Client Tools 15:grafana-9.5.1-150000.1.48.5.s390x",
"SUSE Manager Client Tools 15:grafana-9.5.1-150000.1.48.5.x86_64",
"SUSE Manager Client Tools 15:mgr-daemon-4.3.7-150000.1.41.1.noarch",
"SUSE Manager Client Tools 15:python3-uyuni-common-libs-4.3.8-150000.1.33.1.aarch64",
"SUSE Manager Client Tools 15:python3-uyuni-common-libs-4.3.8-150000.1.33.1.ppc64le",
"SUSE Manager Client Tools 15:python3-uyuni-common-libs-4.3.8-150000.1.33.1.s390x",
"SUSE Manager Client Tools 15:python3-uyuni-common-libs-4.3.8-150000.1.33.1.x86_64",
"SUSE Manager Client Tools 15:python3-zypp-plugin-spacewalk-1.0.14-150000.3.35.1.noarch",
"SUSE Manager Client Tools 15:spacecmd-4.3.21-150000.3.98.1.noarch",
"SUSE Manager Client Tools 15:zypp-plugin-spacewalk-1.0.14-150000.3.35.1.noarch",
"SUSE Manager Client Tools for SLE Micro 5:bind-utils-9.16.6-150000.12.65.1.aarch64",
"SUSE Manager Client Tools for SLE Micro 5:bind-utils-9.16.6-150000.12.65.1.s390x",
"SUSE Manager Client Tools for SLE Micro 5:bind-utils-9.16.6-150000.12.65.1.x86_64",
"SUSE Manager Client Tools for SLE Micro 5:dracut-saltboot-0.1.1681904360.84ef141-150000.1.50.1.noarch",
"SUSE Manager Client Tools for SLE Micro 5:libbind9-1600-64bit-9.16.6-150000.12.65.1.aarch64_ilp32",
"SUSE Manager Client Tools for SLE Micro 5:libbind9-1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Manager Client Tools for SLE Micro 5:libbind9-1600-9.16.6-150000.12.65.1.s390x",
"SUSE Manager Client Tools for SLE Micro 5:libbind9-1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Manager Client Tools for SLE Micro 5:libdns1605-64bit-9.16.6-150000.12.65.1.aarch64_ilp32",
"SUSE Manager Client Tools for SLE Micro 5:libdns1605-9.16.6-150000.12.65.1.aarch64",
"SUSE Manager Client Tools for SLE Micro 5:libdns1605-9.16.6-150000.12.65.1.s390x",
"SUSE Manager Client Tools for SLE Micro 5:libdns1605-9.16.6-150000.12.65.1.x86_64",
"SUSE Manager Client Tools for SLE Micro 5:libirs1601-64bit-9.16.6-150000.12.65.1.aarch64_ilp32",
"SUSE Manager Client Tools for SLE Micro 5:libirs1601-9.16.6-150000.12.65.1.aarch64",
"SUSE Manager Client Tools for SLE Micro 5:libirs1601-9.16.6-150000.12.65.1.s390x",
"SUSE Manager Client Tools for SLE Micro 5:libirs1601-9.16.6-150000.12.65.1.x86_64",
"SUSE Manager Client Tools for SLE Micro 5:libisc1606-64bit-9.16.6-150000.12.65.1.aarch64_ilp32",
"SUSE Manager Client Tools for SLE Micro 5:libisc1606-9.16.6-150000.12.65.1.aarch64",
"SUSE Manager Client Tools for SLE Micro 5:libisc1606-9.16.6-150000.12.65.1.s390x",
"SUSE Manager Client Tools for SLE Micro 5:libisc1606-9.16.6-150000.12.65.1.x86_64",
"SUSE Manager Client Tools for SLE Micro 5:libisccc1600-64bit-9.16.6-150000.12.65.1.aarch64_ilp32",
"SUSE Manager Client Tools for SLE Micro 5:libisccc1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Manager Client Tools for SLE Micro 5:libisccc1600-9.16.6-150000.12.65.1.s390x",
"SUSE Manager Client Tools for SLE Micro 5:libisccc1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Manager Client Tools for SLE Micro 5:libisccfg1600-64bit-9.16.6-150000.12.65.1.aarch64_ilp32",
"SUSE Manager Client Tools for SLE Micro 5:libisccfg1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Manager Client Tools for SLE Micro 5:libisccfg1600-9.16.6-150000.12.65.1.s390x",
"SUSE Manager Client Tools for SLE Micro 5:libisccfg1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Manager Client Tools for SLE Micro 5:libns1604-9.16.6-150000.12.65.1.s390x",
"SUSE Manager Client Tools for SLE Micro 5:libns1604-9.16.6-150000.12.65.1.x86_64",
"SUSE Manager Client Tools for SLE Micro 5:python3-bind-9.16.6-150000.12.65.1.noarch",
"SUSE Manager Proxy Module 4.2:python3-zypp-plugin-spacewalk-1.0.14-150000.3.35.1.noarch",
"SUSE Manager Proxy Module 4.2:zypp-plugin-spacewalk-1.0.14-150000.3.35.1.noarch",
"SUSE Manager Proxy Module 4.3:python3-zypp-plugin-spacewalk-1.0.14-150000.3.35.1.noarch",
"SUSE Manager Proxy Module 4.3:zypp-plugin-spacewalk-1.0.14-150000.3.35.1.noarch",
"openSUSE Leap 15.4:bind-devel-32bit-9.16.6-150000.12.65.1.x86_64",
"openSUSE Leap 15.4:dracut-saltboot-0.1.1681904360.84ef141-150000.1.50.1.noarch",
"openSUSE Leap 15.4:libbind9-1600-32bit-9.16.6-150000.12.65.1.x86_64",
"openSUSE Leap 15.4:libdns1605-32bit-9.16.6-150000.12.65.1.x86_64",
"openSUSE Leap 15.4:libirs1601-32bit-9.16.6-150000.12.65.1.x86_64",
"openSUSE Leap 15.4:libisc1606-32bit-9.16.6-150000.12.65.1.x86_64",
"openSUSE Leap 15.4:libisccc1600-32bit-9.16.6-150000.12.65.1.x86_64",
"openSUSE Leap 15.4:libisccfg1600-32bit-9.16.6-150000.12.65.1.x86_64",
"openSUSE Leap 15.4:libns1604-32bit-9.16.6-150000.12.65.1.x86_64",
"openSUSE Leap 15.4:spacecmd-4.3.21-150000.3.98.1.noarch",
"openSUSE Leap 15.4:wire-0.5.0-150000.1.12.3.aarch64",
"openSUSE Leap 15.4:wire-0.5.0-150000.1.12.3.ppc64le",
"openSUSE Leap 15.4:wire-0.5.0-150000.1.12.3.s390x",
"openSUSE Leap 15.4:wire-0.5.0-150000.1.12.3.x86_64",
"openSUSE Leap 15.5:dracut-saltboot-0.1.1681904360.84ef141-150000.1.50.1.noarch",
"openSUSE Leap 15.5:spacecmd-4.3.21-150000.3.98.1.noarch",
"openSUSE Leap 15.5:wire-0.5.0-150000.1.12.3.aarch64",
"openSUSE Leap 15.5:wire-0.5.0-150000.1.12.3.ppc64le",
"openSUSE Leap 15.5:wire-0.5.0-150000.1.12.3.s390x",
"openSUSE Leap 15.5:wire-0.5.0-150000.1.12.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2023-06-21T11:49:43Z",
"details": "important"
}
],
"title": "CVE-2021-43138"
},
{
"cve": "CVE-2022-0155",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-0155"
}
],
"notes": [
{
"category": "general",
"text": "follow-redirects is vulnerable to Exposure of Private Personal Information to an Unauthorized Actor",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 7:bind-9.16.6-150000.12.65.1.aarch64",
"SUSE Enterprise Storage 7:bind-9.16.6-150000.12.65.1.x86_64",
"SUSE Enterprise Storage 7:bind-chrootenv-9.16.6-150000.12.65.1.aarch64",
"SUSE Enterprise Storage 7:bind-chrootenv-9.16.6-150000.12.65.1.x86_64",
"SUSE Enterprise Storage 7:bind-devel-9.16.6-150000.12.65.1.aarch64",
"SUSE Enterprise Storage 7:bind-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Enterprise Storage 7:bind-doc-9.16.6-150000.12.65.1.noarch",
"SUSE Enterprise Storage 7:bind-utils-9.16.6-150000.12.65.1.aarch64",
"SUSE Enterprise Storage 7:bind-utils-9.16.6-150000.12.65.1.x86_64",
"SUSE Enterprise Storage 7:libbind9-1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Enterprise Storage 7:libbind9-1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Enterprise Storage 7:libdns1605-9.16.6-150000.12.65.1.aarch64",
"SUSE Enterprise Storage 7:libdns1605-9.16.6-150000.12.65.1.x86_64",
"SUSE Enterprise Storage 7:libirs-devel-9.16.6-150000.12.65.1.aarch64",
"SUSE Enterprise Storage 7:libirs-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Enterprise Storage 7:libirs1601-9.16.6-150000.12.65.1.aarch64",
"SUSE Enterprise Storage 7:libirs1601-9.16.6-150000.12.65.1.x86_64",
"SUSE Enterprise Storage 7:libisc1606-9.16.6-150000.12.65.1.aarch64",
"SUSE Enterprise Storage 7:libisc1606-9.16.6-150000.12.65.1.x86_64",
"SUSE Enterprise Storage 7:libisccc1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Enterprise Storage 7:libisccc1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Enterprise Storage 7:libisccfg1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Enterprise Storage 7:libisccfg1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Enterprise Storage 7:libns1604-9.16.6-150000.12.65.1.aarch64",
"SUSE Enterprise Storage 7:libns1604-9.16.6-150000.12.65.1.x86_64",
"SUSE Enterprise Storage 7:python3-bind-9.16.6-150000.12.65.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:bind-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:bind-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:bind-chrootenv-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:bind-chrootenv-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:bind-devel-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:bind-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:bind-doc-9.16.6-150000.12.65.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:bind-utils-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:bind-utils-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libbind9-1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libbind9-1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libdns1605-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libdns1605-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libirs-devel-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libirs-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libirs1601-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libirs1601-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libisc1606-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libisc1606-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libisccc1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libisccc1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libisccfg1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libisccfg1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libns1604-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libns1604-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:python3-bind-9.16.6-150000.12.65.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:bind-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:bind-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:bind-chrootenv-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:bind-chrootenv-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:bind-devel-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:bind-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:bind-doc-9.16.6-150000.12.65.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:bind-utils-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:bind-utils-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libbind9-1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libbind9-1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libdns1605-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libdns1605-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libirs-devel-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libirs-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libirs1601-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libirs1601-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libisc1606-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libisc1606-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libisccc1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libisccc1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libisccfg1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libisccfg1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libns1604-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libns1604-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:python3-bind-9.16.6-150000.12.65.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-chrootenv-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-chrootenv-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-chrootenv-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-chrootenv-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-devel-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-devel-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-devel-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-doc-9.16.6-150000.12.65.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-utils-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-utils-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-utils-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-utils-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libbind9-1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libbind9-1600-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libbind9-1600-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libbind9-1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libdns1605-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libdns1605-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libdns1605-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libdns1605-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libirs-devel-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libirs-devel-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libirs-devel-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libirs-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libirs1601-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libirs1601-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libirs1601-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libirs1601-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libisc1606-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libisc1606-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libisc1606-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libisc1606-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libisccc1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libisccc1600-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libisccc1600-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libisccc1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libisccfg1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libisccfg1600-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libisccfg1600-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libisccfg1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libns1604-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libns1604-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libns1604-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libns1604-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:python3-bind-9.16.6-150000.12.65.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-chrootenv-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-chrootenv-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-chrootenv-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-chrootenv-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-devel-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-devel-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-devel-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-doc-9.16.6-150000.12.65.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-utils-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-utils-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-utils-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-utils-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libbind9-1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libbind9-1600-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libbind9-1600-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libbind9-1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libdns1605-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libdns1605-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libdns1605-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libdns1605-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libirs-devel-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libirs-devel-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libirs-devel-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libirs-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libirs1601-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libirs1601-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libirs1601-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libirs1601-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libisc1606-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libisc1606-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libisc1606-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libisc1606-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libisccc1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libisccc1600-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libisccc1600-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libisccc1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libisccfg1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libisccfg1600-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libisccfg1600-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libisccfg1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libns1604-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libns1604-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libns1604-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libns1604-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:python3-bind-9.16.6-150000.12.65.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:bind-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:bind-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:bind-chrootenv-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:bind-chrootenv-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:bind-devel-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:bind-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:bind-doc-9.16.6-150000.12.65.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:bind-utils-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:bind-utils-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libbind9-1600-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libbind9-1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libdns1605-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libdns1605-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libirs-devel-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libirs-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libirs1601-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libirs1601-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libisc1606-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libisc1606-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libisccc1600-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libisccc1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libisccfg1600-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libisccfg1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libns1604-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libns1604-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:python3-bind-9.16.6-150000.12.65.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:bind-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:bind-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:bind-chrootenv-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:bind-chrootenv-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:bind-devel-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:bind-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:bind-doc-9.16.6-150000.12.65.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:bind-utils-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:bind-utils-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libbind9-1600-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libbind9-1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libdns1605-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libdns1605-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libirs-devel-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libirs-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libirs1601-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libirs1601-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libisc1606-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libisc1606-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libisccc1600-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libisccc1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libisccfg1600-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libisccfg1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libns1604-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libns1604-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:python3-bind-9.16.6-150000.12.65.1.noarch",
"SUSE Manager Client Tools 15:dracut-saltboot-0.1.1681904360.84ef141-150000.1.50.1.noarch",
"SUSE Manager Client Tools 15:grafana-9.5.1-150000.1.48.5.aarch64",
"SUSE Manager Client Tools 15:grafana-9.5.1-150000.1.48.5.ppc64le",
"SUSE Manager Client Tools 15:grafana-9.5.1-150000.1.48.5.s390x",
"SUSE Manager Client Tools 15:grafana-9.5.1-150000.1.48.5.x86_64",
"SUSE Manager Client Tools 15:mgr-daemon-4.3.7-150000.1.41.1.noarch",
"SUSE Manager Client Tools 15:python3-uyuni-common-libs-4.3.8-150000.1.33.1.aarch64",
"SUSE Manager Client Tools 15:python3-uyuni-common-libs-4.3.8-150000.1.33.1.ppc64le",
"SUSE Manager Client Tools 15:python3-uyuni-common-libs-4.3.8-150000.1.33.1.s390x",
"SUSE Manager Client Tools 15:python3-uyuni-common-libs-4.3.8-150000.1.33.1.x86_64",
"SUSE Manager Client Tools 15:python3-zypp-plugin-spacewalk-1.0.14-150000.3.35.1.noarch",
"SUSE Manager Client Tools 15:spacecmd-4.3.21-150000.3.98.1.noarch",
"SUSE Manager Client Tools 15:zypp-plugin-spacewalk-1.0.14-150000.3.35.1.noarch",
"SUSE Manager Client Tools for SLE Micro 5:bind-utils-9.16.6-150000.12.65.1.aarch64",
"SUSE Manager Client Tools for SLE Micro 5:bind-utils-9.16.6-150000.12.65.1.s390x",
"SUSE Manager Client Tools for SLE Micro 5:bind-utils-9.16.6-150000.12.65.1.x86_64",
"SUSE Manager Client Tools for SLE Micro 5:dracut-saltboot-0.1.1681904360.84ef141-150000.1.50.1.noarch",
"SUSE Manager Client Tools for SLE Micro 5:libbind9-1600-64bit-9.16.6-150000.12.65.1.aarch64_ilp32",
"SUSE Manager Client Tools for SLE Micro 5:libbind9-1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Manager Client Tools for SLE Micro 5:libbind9-1600-9.16.6-150000.12.65.1.s390x",
"SUSE Manager Client Tools for SLE Micro 5:libbind9-1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Manager Client Tools for SLE Micro 5:libdns1605-64bit-9.16.6-150000.12.65.1.aarch64_ilp32",
"SUSE Manager Client Tools for SLE Micro 5:libdns1605-9.16.6-150000.12.65.1.aarch64",
"SUSE Manager Client Tools for SLE Micro 5:libdns1605-9.16.6-150000.12.65.1.s390x",
"SUSE Manager Client Tools for SLE Micro 5:libdns1605-9.16.6-150000.12.65.1.x86_64",
"SUSE Manager Client Tools for SLE Micro 5:libirs1601-64bit-9.16.6-150000.12.65.1.aarch64_ilp32",
"SUSE Manager Client Tools for SLE Micro 5:libirs1601-9.16.6-150000.12.65.1.aarch64",
"SUSE Manager Client Tools for SLE Micro 5:libirs1601-9.16.6-150000.12.65.1.s390x",
"SUSE Manager Client Tools for SLE Micro 5:libirs1601-9.16.6-150000.12.65.1.x86_64",
"SUSE Manager Client Tools for SLE Micro 5:libisc1606-64bit-9.16.6-150000.12.65.1.aarch64_ilp32",
"SUSE Manager Client Tools for SLE Micro 5:libisc1606-9.16.6-150000.12.65.1.aarch64",
"SUSE Manager Client Tools for SLE Micro 5:libisc1606-9.16.6-150000.12.65.1.s390x",
"SUSE Manager Client Tools for SLE Micro 5:libisc1606-9.16.6-150000.12.65.1.x86_64",
"SUSE Manager Client Tools for SLE Micro 5:libisccc1600-64bit-9.16.6-150000.12.65.1.aarch64_ilp32",
"SUSE Manager Client Tools for SLE Micro 5:libisccc1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Manager Client Tools for SLE Micro 5:libisccc1600-9.16.6-150000.12.65.1.s390x",
"SUSE Manager Client Tools for SLE Micro 5:libisccc1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Manager Client Tools for SLE Micro 5:libisccfg1600-64bit-9.16.6-150000.12.65.1.aarch64_ilp32",
"SUSE Manager Client Tools for SLE Micro 5:libisccfg1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Manager Client Tools for SLE Micro 5:libisccfg1600-9.16.6-150000.12.65.1.s390x",
"SUSE Manager Client Tools for SLE Micro 5:libisccfg1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Manager Client Tools for SLE Micro 5:libns1604-9.16.6-150000.12.65.1.s390x",
"SUSE Manager Client Tools for SLE Micro 5:libns1604-9.16.6-150000.12.65.1.x86_64",
"SUSE Manager Client Tools for SLE Micro 5:python3-bind-9.16.6-150000.12.65.1.noarch",
"SUSE Manager Proxy Module 4.2:python3-zypp-plugin-spacewalk-1.0.14-150000.3.35.1.noarch",
"SUSE Manager Proxy Module 4.2:zypp-plugin-spacewalk-1.0.14-150000.3.35.1.noarch",
"SUSE Manager Proxy Module 4.3:python3-zypp-plugin-spacewalk-1.0.14-150000.3.35.1.noarch",
"SUSE Manager Proxy Module 4.3:zypp-plugin-spacewalk-1.0.14-150000.3.35.1.noarch",
"openSUSE Leap 15.4:bind-devel-32bit-9.16.6-150000.12.65.1.x86_64",
"openSUSE Leap 15.4:dracut-saltboot-0.1.1681904360.84ef141-150000.1.50.1.noarch",
"openSUSE Leap 15.4:libbind9-1600-32bit-9.16.6-150000.12.65.1.x86_64",
"openSUSE Leap 15.4:libdns1605-32bit-9.16.6-150000.12.65.1.x86_64",
"openSUSE Leap 15.4:libirs1601-32bit-9.16.6-150000.12.65.1.x86_64",
"openSUSE Leap 15.4:libisc1606-32bit-9.16.6-150000.12.65.1.x86_64",
"openSUSE Leap 15.4:libisccc1600-32bit-9.16.6-150000.12.65.1.x86_64",
"openSUSE Leap 15.4:libisccfg1600-32bit-9.16.6-150000.12.65.1.x86_64",
"openSUSE Leap 15.4:libns1604-32bit-9.16.6-150000.12.65.1.x86_64",
"openSUSE Leap 15.4:spacecmd-4.3.21-150000.3.98.1.noarch",
"openSUSE Leap 15.4:wire-0.5.0-150000.1.12.3.aarch64",
"openSUSE Leap 15.4:wire-0.5.0-150000.1.12.3.ppc64le",
"openSUSE Leap 15.4:wire-0.5.0-150000.1.12.3.s390x",
"openSUSE Leap 15.4:wire-0.5.0-150000.1.12.3.x86_64",
"openSUSE Leap 15.5:dracut-saltboot-0.1.1681904360.84ef141-150000.1.50.1.noarch",
"openSUSE Leap 15.5:spacecmd-4.3.21-150000.3.98.1.noarch",
"openSUSE Leap 15.5:wire-0.5.0-150000.1.12.3.aarch64",
"openSUSE Leap 15.5:wire-0.5.0-150000.1.12.3.ppc64le",
"openSUSE Leap 15.5:wire-0.5.0-150000.1.12.3.s390x",
"openSUSE Leap 15.5:wire-0.5.0-150000.1.12.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-0155",
"url": "https://www.suse.com/security/cve/CVE-2022-0155"
},
{
"category": "external",
"summary": "SUSE Bug 1218844 for CVE-2022-0155",
"url": "https://bugzilla.suse.com/1218844"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 7:bind-9.16.6-150000.12.65.1.aarch64",
"SUSE Enterprise Storage 7:bind-9.16.6-150000.12.65.1.x86_64",
"SUSE Enterprise Storage 7:bind-chrootenv-9.16.6-150000.12.65.1.aarch64",
"SUSE Enterprise Storage 7:bind-chrootenv-9.16.6-150000.12.65.1.x86_64",
"SUSE Enterprise Storage 7:bind-devel-9.16.6-150000.12.65.1.aarch64",
"SUSE Enterprise Storage 7:bind-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Enterprise Storage 7:bind-doc-9.16.6-150000.12.65.1.noarch",
"SUSE Enterprise Storage 7:bind-utils-9.16.6-150000.12.65.1.aarch64",
"SUSE Enterprise Storage 7:bind-utils-9.16.6-150000.12.65.1.x86_64",
"SUSE Enterprise Storage 7:libbind9-1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Enterprise Storage 7:libbind9-1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Enterprise Storage 7:libdns1605-9.16.6-150000.12.65.1.aarch64",
"SUSE Enterprise Storage 7:libdns1605-9.16.6-150000.12.65.1.x86_64",
"SUSE Enterprise Storage 7:libirs-devel-9.16.6-150000.12.65.1.aarch64",
"SUSE Enterprise Storage 7:libirs-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Enterprise Storage 7:libirs1601-9.16.6-150000.12.65.1.aarch64",
"SUSE Enterprise Storage 7:libirs1601-9.16.6-150000.12.65.1.x86_64",
"SUSE Enterprise Storage 7:libisc1606-9.16.6-150000.12.65.1.aarch64",
"SUSE Enterprise Storage 7:libisc1606-9.16.6-150000.12.65.1.x86_64",
"SUSE Enterprise Storage 7:libisccc1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Enterprise Storage 7:libisccc1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Enterprise Storage 7:libisccfg1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Enterprise Storage 7:libisccfg1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Enterprise Storage 7:libns1604-9.16.6-150000.12.65.1.aarch64",
"SUSE Enterprise Storage 7:libns1604-9.16.6-150000.12.65.1.x86_64",
"SUSE Enterprise Storage 7:python3-bind-9.16.6-150000.12.65.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:bind-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:bind-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:bind-chrootenv-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:bind-chrootenv-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:bind-devel-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:bind-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:bind-doc-9.16.6-150000.12.65.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:bind-utils-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:bind-utils-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libbind9-1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libbind9-1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libdns1605-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libdns1605-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libirs-devel-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libirs-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libirs1601-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libirs1601-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libisc1606-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libisc1606-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libisccc1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libisccc1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libisccfg1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libisccfg1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libns1604-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libns1604-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:python3-bind-9.16.6-150000.12.65.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:bind-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:bind-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:bind-chrootenv-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:bind-chrootenv-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:bind-devel-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:bind-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:bind-doc-9.16.6-150000.12.65.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:bind-utils-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:bind-utils-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libbind9-1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libbind9-1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libdns1605-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libdns1605-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libirs-devel-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libirs-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libirs1601-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libirs1601-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libisc1606-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libisc1606-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libisccc1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libisccc1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libisccfg1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libisccfg1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libns1604-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libns1604-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:python3-bind-9.16.6-150000.12.65.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-chrootenv-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-chrootenv-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-chrootenv-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-chrootenv-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-devel-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-devel-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-devel-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-doc-9.16.6-150000.12.65.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-utils-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-utils-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-utils-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-utils-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libbind9-1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libbind9-1600-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libbind9-1600-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libbind9-1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libdns1605-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libdns1605-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libdns1605-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libdns1605-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libirs-devel-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libirs-devel-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libirs-devel-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libirs-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libirs1601-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libirs1601-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libirs1601-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libirs1601-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libisc1606-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libisc1606-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libisc1606-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libisc1606-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libisccc1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libisccc1600-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libisccc1600-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libisccc1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libisccfg1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libisccfg1600-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libisccfg1600-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libisccfg1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libns1604-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libns1604-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libns1604-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libns1604-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:python3-bind-9.16.6-150000.12.65.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-chrootenv-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-chrootenv-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-chrootenv-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-chrootenv-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-devel-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-devel-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-devel-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-doc-9.16.6-150000.12.65.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-utils-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-utils-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-utils-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-utils-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libbind9-1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libbind9-1600-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libbind9-1600-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libbind9-1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libdns1605-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libdns1605-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libdns1605-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libdns1605-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libirs-devel-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libirs-devel-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libirs-devel-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libirs-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libirs1601-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libirs1601-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libirs1601-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libirs1601-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libisc1606-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libisc1606-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libisc1606-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libisc1606-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libisccc1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libisccc1600-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libisccc1600-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libisccc1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libisccfg1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libisccfg1600-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libisccfg1600-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libisccfg1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libns1604-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libns1604-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libns1604-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libns1604-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:python3-bind-9.16.6-150000.12.65.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:bind-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:bind-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:bind-chrootenv-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:bind-chrootenv-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:bind-devel-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:bind-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:bind-doc-9.16.6-150000.12.65.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:bind-utils-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:bind-utils-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libbind9-1600-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libbind9-1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libdns1605-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libdns1605-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libirs-devel-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libirs-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libirs1601-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libirs1601-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libisc1606-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libisc1606-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libisccc1600-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libisccc1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libisccfg1600-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libisccfg1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libns1604-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libns1604-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:python3-bind-9.16.6-150000.12.65.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:bind-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:bind-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:bind-chrootenv-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:bind-chrootenv-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:bind-devel-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:bind-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:bind-doc-9.16.6-150000.12.65.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:bind-utils-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:bind-utils-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libbind9-1600-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libbind9-1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libdns1605-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libdns1605-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libirs-devel-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libirs-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libirs1601-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libirs1601-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libisc1606-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libisc1606-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libisccc1600-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libisccc1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libisccfg1600-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libisccfg1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libns1604-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libns1604-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:python3-bind-9.16.6-150000.12.65.1.noarch",
"SUSE Manager Client Tools 15:dracut-saltboot-0.1.1681904360.84ef141-150000.1.50.1.noarch",
"SUSE Manager Client Tools 15:grafana-9.5.1-150000.1.48.5.aarch64",
"SUSE Manager Client Tools 15:grafana-9.5.1-150000.1.48.5.ppc64le",
"SUSE Manager Client Tools 15:grafana-9.5.1-150000.1.48.5.s390x",
"SUSE Manager Client Tools 15:grafana-9.5.1-150000.1.48.5.x86_64",
"SUSE Manager Client Tools 15:mgr-daemon-4.3.7-150000.1.41.1.noarch",
"SUSE Manager Client Tools 15:python3-uyuni-common-libs-4.3.8-150000.1.33.1.aarch64",
"SUSE Manager Client Tools 15:python3-uyuni-common-libs-4.3.8-150000.1.33.1.ppc64le",
"SUSE Manager Client Tools 15:python3-uyuni-common-libs-4.3.8-150000.1.33.1.s390x",
"SUSE Manager Client Tools 15:python3-uyuni-common-libs-4.3.8-150000.1.33.1.x86_64",
"SUSE Manager Client Tools 15:python3-zypp-plugin-spacewalk-1.0.14-150000.3.35.1.noarch",
"SUSE Manager Client Tools 15:spacecmd-4.3.21-150000.3.98.1.noarch",
"SUSE Manager Client Tools 15:zypp-plugin-spacewalk-1.0.14-150000.3.35.1.noarch",
"SUSE Manager Client Tools for SLE Micro 5:bind-utils-9.16.6-150000.12.65.1.aarch64",
"SUSE Manager Client Tools for SLE Micro 5:bind-utils-9.16.6-150000.12.65.1.s390x",
"SUSE Manager Client Tools for SLE Micro 5:bind-utils-9.16.6-150000.12.65.1.x86_64",
"SUSE Manager Client Tools for SLE Micro 5:dracut-saltboot-0.1.1681904360.84ef141-150000.1.50.1.noarch",
"SUSE Manager Client Tools for SLE Micro 5:libbind9-1600-64bit-9.16.6-150000.12.65.1.aarch64_ilp32",
"SUSE Manager Client Tools for SLE Micro 5:libbind9-1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Manager Client Tools for SLE Micro 5:libbind9-1600-9.16.6-150000.12.65.1.s390x",
"SUSE Manager Client Tools for SLE Micro 5:libbind9-1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Manager Client Tools for SLE Micro 5:libdns1605-64bit-9.16.6-150000.12.65.1.aarch64_ilp32",
"SUSE Manager Client Tools for SLE Micro 5:libdns1605-9.16.6-150000.12.65.1.aarch64",
"SUSE Manager Client Tools for SLE Micro 5:libdns1605-9.16.6-150000.12.65.1.s390x",
"SUSE Manager Client Tools for SLE Micro 5:libdns1605-9.16.6-150000.12.65.1.x86_64",
"SUSE Manager Client Tools for SLE Micro 5:libirs1601-64bit-9.16.6-150000.12.65.1.aarch64_ilp32",
"SUSE Manager Client Tools for SLE Micro 5:libirs1601-9.16.6-150000.12.65.1.aarch64",
"SUSE Manager Client Tools for SLE Micro 5:libirs1601-9.16.6-150000.12.65.1.s390x",
"SUSE Manager Client Tools for SLE Micro 5:libirs1601-9.16.6-150000.12.65.1.x86_64",
"SUSE Manager Client Tools for SLE Micro 5:libisc1606-64bit-9.16.6-150000.12.65.1.aarch64_ilp32",
"SUSE Manager Client Tools for SLE Micro 5:libisc1606-9.16.6-150000.12.65.1.aarch64",
"SUSE Manager Client Tools for SLE Micro 5:libisc1606-9.16.6-150000.12.65.1.s390x",
"SUSE Manager Client Tools for SLE Micro 5:libisc1606-9.16.6-150000.12.65.1.x86_64",
"SUSE Manager Client Tools for SLE Micro 5:libisccc1600-64bit-9.16.6-150000.12.65.1.aarch64_ilp32",
"SUSE Manager Client Tools for SLE Micro 5:libisccc1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Manager Client Tools for SLE Micro 5:libisccc1600-9.16.6-150000.12.65.1.s390x",
"SUSE Manager Client Tools for SLE Micro 5:libisccc1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Manager Client Tools for SLE Micro 5:libisccfg1600-64bit-9.16.6-150000.12.65.1.aarch64_ilp32",
"SUSE Manager Client Tools for SLE Micro 5:libisccfg1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Manager Client Tools for SLE Micro 5:libisccfg1600-9.16.6-150000.12.65.1.s390x",
"SUSE Manager Client Tools for SLE Micro 5:libisccfg1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Manager Client Tools for SLE Micro 5:libns1604-9.16.6-150000.12.65.1.s390x",
"SUSE Manager Client Tools for SLE Micro 5:libns1604-9.16.6-150000.12.65.1.x86_64",
"SUSE Manager Client Tools for SLE Micro 5:python3-bind-9.16.6-150000.12.65.1.noarch",
"SUSE Manager Proxy Module 4.2:python3-zypp-plugin-spacewalk-1.0.14-150000.3.35.1.noarch",
"SUSE Manager Proxy Module 4.2:zypp-plugin-spacewalk-1.0.14-150000.3.35.1.noarch",
"SUSE Manager Proxy Module 4.3:python3-zypp-plugin-spacewalk-1.0.14-150000.3.35.1.noarch",
"SUSE Manager Proxy Module 4.3:zypp-plugin-spacewalk-1.0.14-150000.3.35.1.noarch",
"openSUSE Leap 15.4:bind-devel-32bit-9.16.6-150000.12.65.1.x86_64",
"openSUSE Leap 15.4:dracut-saltboot-0.1.1681904360.84ef141-150000.1.50.1.noarch",
"openSUSE Leap 15.4:libbind9-1600-32bit-9.16.6-150000.12.65.1.x86_64",
"openSUSE Leap 15.4:libdns1605-32bit-9.16.6-150000.12.65.1.x86_64",
"openSUSE Leap 15.4:libirs1601-32bit-9.16.6-150000.12.65.1.x86_64",
"openSUSE Leap 15.4:libisc1606-32bit-9.16.6-150000.12.65.1.x86_64",
"openSUSE Leap 15.4:libisccc1600-32bit-9.16.6-150000.12.65.1.x86_64",
"openSUSE Leap 15.4:libisccfg1600-32bit-9.16.6-150000.12.65.1.x86_64",
"openSUSE Leap 15.4:libns1604-32bit-9.16.6-150000.12.65.1.x86_64",
"openSUSE Leap 15.4:spacecmd-4.3.21-150000.3.98.1.noarch",
"openSUSE Leap 15.4:wire-0.5.0-150000.1.12.3.aarch64",
"openSUSE Leap 15.4:wire-0.5.0-150000.1.12.3.ppc64le",
"openSUSE Leap 15.4:wire-0.5.0-150000.1.12.3.s390x",
"openSUSE Leap 15.4:wire-0.5.0-150000.1.12.3.x86_64",
"openSUSE Leap 15.5:dracut-saltboot-0.1.1681904360.84ef141-150000.1.50.1.noarch",
"openSUSE Leap 15.5:spacecmd-4.3.21-150000.3.98.1.noarch",
"openSUSE Leap 15.5:wire-0.5.0-150000.1.12.3.aarch64",
"openSUSE Leap 15.5:wire-0.5.0-150000.1.12.3.ppc64le",
"openSUSE Leap 15.5:wire-0.5.0-150000.1.12.3.s390x",
"openSUSE Leap 15.5:wire-0.5.0-150000.1.12.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 7:bind-9.16.6-150000.12.65.1.aarch64",
"SUSE Enterprise Storage 7:bind-9.16.6-150000.12.65.1.x86_64",
"SUSE Enterprise Storage 7:bind-chrootenv-9.16.6-150000.12.65.1.aarch64",
"SUSE Enterprise Storage 7:bind-chrootenv-9.16.6-150000.12.65.1.x86_64",
"SUSE Enterprise Storage 7:bind-devel-9.16.6-150000.12.65.1.aarch64",
"SUSE Enterprise Storage 7:bind-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Enterprise Storage 7:bind-doc-9.16.6-150000.12.65.1.noarch",
"SUSE Enterprise Storage 7:bind-utils-9.16.6-150000.12.65.1.aarch64",
"SUSE Enterprise Storage 7:bind-utils-9.16.6-150000.12.65.1.x86_64",
"SUSE Enterprise Storage 7:libbind9-1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Enterprise Storage 7:libbind9-1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Enterprise Storage 7:libdns1605-9.16.6-150000.12.65.1.aarch64",
"SUSE Enterprise Storage 7:libdns1605-9.16.6-150000.12.65.1.x86_64",
"SUSE Enterprise Storage 7:libirs-devel-9.16.6-150000.12.65.1.aarch64",
"SUSE Enterprise Storage 7:libirs-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Enterprise Storage 7:libirs1601-9.16.6-150000.12.65.1.aarch64",
"SUSE Enterprise Storage 7:libirs1601-9.16.6-150000.12.65.1.x86_64",
"SUSE Enterprise Storage 7:libisc1606-9.16.6-150000.12.65.1.aarch64",
"SUSE Enterprise Storage 7:libisc1606-9.16.6-150000.12.65.1.x86_64",
"SUSE Enterprise Storage 7:libisccc1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Enterprise Storage 7:libisccc1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Enterprise Storage 7:libisccfg1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Enterprise Storage 7:libisccfg1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Enterprise Storage 7:libns1604-9.16.6-150000.12.65.1.aarch64",
"SUSE Enterprise Storage 7:libns1604-9.16.6-150000.12.65.1.x86_64",
"SUSE Enterprise Storage 7:python3-bind-9.16.6-150000.12.65.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:bind-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:bind-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:bind-chrootenv-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:bind-chrootenv-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:bind-devel-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:bind-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:bind-doc-9.16.6-150000.12.65.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:bind-utils-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:bind-utils-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libbind9-1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libbind9-1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libdns1605-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libdns1605-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libirs-devel-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libirs-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libirs1601-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libirs1601-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libisc1606-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libisc1606-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libisccc1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libisccc1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libisccfg1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libisccfg1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libns1604-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libns1604-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:python3-bind-9.16.6-150000.12.65.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:bind-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:bind-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:bind-chrootenv-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:bind-chrootenv-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:bind-devel-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:bind-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:bind-doc-9.16.6-150000.12.65.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:bind-utils-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:bind-utils-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libbind9-1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libbind9-1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libdns1605-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libdns1605-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libirs-devel-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libirs-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libirs1601-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libirs1601-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libisc1606-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libisc1606-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libisccc1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libisccc1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libisccfg1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libisccfg1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libns1604-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libns1604-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:python3-bind-9.16.6-150000.12.65.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-chrootenv-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-chrootenv-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-chrootenv-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-chrootenv-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-devel-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-devel-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-devel-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-doc-9.16.6-150000.12.65.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-utils-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-utils-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-utils-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-utils-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libbind9-1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libbind9-1600-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libbind9-1600-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libbind9-1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libdns1605-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libdns1605-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libdns1605-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libdns1605-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libirs-devel-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libirs-devel-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libirs-devel-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libirs-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libirs1601-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libirs1601-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libirs1601-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libirs1601-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libisc1606-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libisc1606-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libisc1606-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libisc1606-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libisccc1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libisccc1600-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libisccc1600-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libisccc1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libisccfg1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libisccfg1600-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libisccfg1600-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libisccfg1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libns1604-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libns1604-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libns1604-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libns1604-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:python3-bind-9.16.6-150000.12.65.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-chrootenv-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-chrootenv-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-chrootenv-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-chrootenv-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-devel-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-devel-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-devel-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-doc-9.16.6-150000.12.65.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-utils-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-utils-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-utils-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-utils-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libbind9-1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libbind9-1600-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libbind9-1600-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libbind9-1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libdns1605-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libdns1605-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libdns1605-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libdns1605-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libirs-devel-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libirs-devel-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libirs-devel-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libirs-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libirs1601-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libirs1601-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libirs1601-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libirs1601-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libisc1606-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libisc1606-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libisc1606-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libisc1606-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libisccc1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libisccc1600-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libisccc1600-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libisccc1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libisccfg1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libisccfg1600-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libisccfg1600-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libisccfg1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libns1604-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libns1604-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libns1604-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libns1604-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:python3-bind-9.16.6-150000.12.65.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:bind-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:bind-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:bind-chrootenv-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:bind-chrootenv-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:bind-devel-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:bind-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:bind-doc-9.16.6-150000.12.65.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:bind-utils-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:bind-utils-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libbind9-1600-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libbind9-1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libdns1605-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libdns1605-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libirs-devel-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libirs-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libirs1601-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libirs1601-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libisc1606-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libisc1606-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libisccc1600-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libisccc1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libisccfg1600-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libisccfg1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libns1604-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libns1604-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:python3-bind-9.16.6-150000.12.65.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:bind-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:bind-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:bind-chrootenv-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:bind-chrootenv-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:bind-devel-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:bind-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:bind-doc-9.16.6-150000.12.65.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:bind-utils-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:bind-utils-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libbind9-1600-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libbind9-1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libdns1605-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libdns1605-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libirs-devel-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libirs-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libirs1601-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libirs1601-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libisc1606-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libisc1606-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libisccc1600-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libisccc1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libisccfg1600-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libisccfg1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libns1604-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libns1604-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:python3-bind-9.16.6-150000.12.65.1.noarch",
"SUSE Manager Client Tools 15:dracut-saltboot-0.1.1681904360.84ef141-150000.1.50.1.noarch",
"SUSE Manager Client Tools 15:grafana-9.5.1-150000.1.48.5.aarch64",
"SUSE Manager Client Tools 15:grafana-9.5.1-150000.1.48.5.ppc64le",
"SUSE Manager Client Tools 15:grafana-9.5.1-150000.1.48.5.s390x",
"SUSE Manager Client Tools 15:grafana-9.5.1-150000.1.48.5.x86_64",
"SUSE Manager Client Tools 15:mgr-daemon-4.3.7-150000.1.41.1.noarch",
"SUSE Manager Client Tools 15:python3-uyuni-common-libs-4.3.8-150000.1.33.1.aarch64",
"SUSE Manager Client Tools 15:python3-uyuni-common-libs-4.3.8-150000.1.33.1.ppc64le",
"SUSE Manager Client Tools 15:python3-uyuni-common-libs-4.3.8-150000.1.33.1.s390x",
"SUSE Manager Client Tools 15:python3-uyuni-common-libs-4.3.8-150000.1.33.1.x86_64",
"SUSE Manager Client Tools 15:python3-zypp-plugin-spacewalk-1.0.14-150000.3.35.1.noarch",
"SUSE Manager Client Tools 15:spacecmd-4.3.21-150000.3.98.1.noarch",
"SUSE Manager Client Tools 15:zypp-plugin-spacewalk-1.0.14-150000.3.35.1.noarch",
"SUSE Manager Client Tools for SLE Micro 5:bind-utils-9.16.6-150000.12.65.1.aarch64",
"SUSE Manager Client Tools for SLE Micro 5:bind-utils-9.16.6-150000.12.65.1.s390x",
"SUSE Manager Client Tools for SLE Micro 5:bind-utils-9.16.6-150000.12.65.1.x86_64",
"SUSE Manager Client Tools for SLE Micro 5:dracut-saltboot-0.1.1681904360.84ef141-150000.1.50.1.noarch",
"SUSE Manager Client Tools for SLE Micro 5:libbind9-1600-64bit-9.16.6-150000.12.65.1.aarch64_ilp32",
"SUSE Manager Client Tools for SLE Micro 5:libbind9-1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Manager Client Tools for SLE Micro 5:libbind9-1600-9.16.6-150000.12.65.1.s390x",
"SUSE Manager Client Tools for SLE Micro 5:libbind9-1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Manager Client Tools for SLE Micro 5:libdns1605-64bit-9.16.6-150000.12.65.1.aarch64_ilp32",
"SUSE Manager Client Tools for SLE Micro 5:libdns1605-9.16.6-150000.12.65.1.aarch64",
"SUSE Manager Client Tools for SLE Micro 5:libdns1605-9.16.6-150000.12.65.1.s390x",
"SUSE Manager Client Tools for SLE Micro 5:libdns1605-9.16.6-150000.12.65.1.x86_64",
"SUSE Manager Client Tools for SLE Micro 5:libirs1601-64bit-9.16.6-150000.12.65.1.aarch64_ilp32",
"SUSE Manager Client Tools for SLE Micro 5:libirs1601-9.16.6-150000.12.65.1.aarch64",
"SUSE Manager Client Tools for SLE Micro 5:libirs1601-9.16.6-150000.12.65.1.s390x",
"SUSE Manager Client Tools for SLE Micro 5:libirs1601-9.16.6-150000.12.65.1.x86_64",
"SUSE Manager Client Tools for SLE Micro 5:libisc1606-64bit-9.16.6-150000.12.65.1.aarch64_ilp32",
"SUSE Manager Client Tools for SLE Micro 5:libisc1606-9.16.6-150000.12.65.1.aarch64",
"SUSE Manager Client Tools for SLE Micro 5:libisc1606-9.16.6-150000.12.65.1.s390x",
"SUSE Manager Client Tools for SLE Micro 5:libisc1606-9.16.6-150000.12.65.1.x86_64",
"SUSE Manager Client Tools for SLE Micro 5:libisccc1600-64bit-9.16.6-150000.12.65.1.aarch64_ilp32",
"SUSE Manager Client Tools for SLE Micro 5:libisccc1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Manager Client Tools for SLE Micro 5:libisccc1600-9.16.6-150000.12.65.1.s390x",
"SUSE Manager Client Tools for SLE Micro 5:libisccc1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Manager Client Tools for SLE Micro 5:libisccfg1600-64bit-9.16.6-150000.12.65.1.aarch64_ilp32",
"SUSE Manager Client Tools for SLE Micro 5:libisccfg1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Manager Client Tools for SLE Micro 5:libisccfg1600-9.16.6-150000.12.65.1.s390x",
"SUSE Manager Client Tools for SLE Micro 5:libisccfg1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Manager Client Tools for SLE Micro 5:libns1604-9.16.6-150000.12.65.1.s390x",
"SUSE Manager Client Tools for SLE Micro 5:libns1604-9.16.6-150000.12.65.1.x86_64",
"SUSE Manager Client Tools for SLE Micro 5:python3-bind-9.16.6-150000.12.65.1.noarch",
"SUSE Manager Proxy Module 4.2:python3-zypp-plugin-spacewalk-1.0.14-150000.3.35.1.noarch",
"SUSE Manager Proxy Module 4.2:zypp-plugin-spacewalk-1.0.14-150000.3.35.1.noarch",
"SUSE Manager Proxy Module 4.3:python3-zypp-plugin-spacewalk-1.0.14-150000.3.35.1.noarch",
"SUSE Manager Proxy Module 4.3:zypp-plugin-spacewalk-1.0.14-150000.3.35.1.noarch",
"openSUSE Leap 15.4:bind-devel-32bit-9.16.6-150000.12.65.1.x86_64",
"openSUSE Leap 15.4:dracut-saltboot-0.1.1681904360.84ef141-150000.1.50.1.noarch",
"openSUSE Leap 15.4:libbind9-1600-32bit-9.16.6-150000.12.65.1.x86_64",
"openSUSE Leap 15.4:libdns1605-32bit-9.16.6-150000.12.65.1.x86_64",
"openSUSE Leap 15.4:libirs1601-32bit-9.16.6-150000.12.65.1.x86_64",
"openSUSE Leap 15.4:libisc1606-32bit-9.16.6-150000.12.65.1.x86_64",
"openSUSE Leap 15.4:libisccc1600-32bit-9.16.6-150000.12.65.1.x86_64",
"openSUSE Leap 15.4:libisccfg1600-32bit-9.16.6-150000.12.65.1.x86_64",
"openSUSE Leap 15.4:libns1604-32bit-9.16.6-150000.12.65.1.x86_64",
"openSUSE Leap 15.4:spacecmd-4.3.21-150000.3.98.1.noarch",
"openSUSE Leap 15.4:wire-0.5.0-150000.1.12.3.aarch64",
"openSUSE Leap 15.4:wire-0.5.0-150000.1.12.3.ppc64le",
"openSUSE Leap 15.4:wire-0.5.0-150000.1.12.3.s390x",
"openSUSE Leap 15.4:wire-0.5.0-150000.1.12.3.x86_64",
"openSUSE Leap 15.5:dracut-saltboot-0.1.1681904360.84ef141-150000.1.50.1.noarch",
"openSUSE Leap 15.5:spacecmd-4.3.21-150000.3.98.1.noarch",
"openSUSE Leap 15.5:wire-0.5.0-150000.1.12.3.aarch64",
"openSUSE Leap 15.5:wire-0.5.0-150000.1.12.3.ppc64le",
"openSUSE Leap 15.5:wire-0.5.0-150000.1.12.3.s390x",
"openSUSE Leap 15.5:wire-0.5.0-150000.1.12.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2023-06-21T11:49:43Z",
"details": "moderate"
}
],
"title": "CVE-2022-0155"
},
{
"cve": "CVE-2022-27664",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-27664"
}
],
"notes": [
{
"category": "general",
"text": "In net/http in Go before 1.18.6 and 1.19.x before 1.19.1, attackers can cause a denial of service because an HTTP/2 connection can hang during closing if shutdown were preempted by a fatal error.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 7:bind-9.16.6-150000.12.65.1.aarch64",
"SUSE Enterprise Storage 7:bind-9.16.6-150000.12.65.1.x86_64",
"SUSE Enterprise Storage 7:bind-chrootenv-9.16.6-150000.12.65.1.aarch64",
"SUSE Enterprise Storage 7:bind-chrootenv-9.16.6-150000.12.65.1.x86_64",
"SUSE Enterprise Storage 7:bind-devel-9.16.6-150000.12.65.1.aarch64",
"SUSE Enterprise Storage 7:bind-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Enterprise Storage 7:bind-doc-9.16.6-150000.12.65.1.noarch",
"SUSE Enterprise Storage 7:bind-utils-9.16.6-150000.12.65.1.aarch64",
"SUSE Enterprise Storage 7:bind-utils-9.16.6-150000.12.65.1.x86_64",
"SUSE Enterprise Storage 7:libbind9-1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Enterprise Storage 7:libbind9-1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Enterprise Storage 7:libdns1605-9.16.6-150000.12.65.1.aarch64",
"SUSE Enterprise Storage 7:libdns1605-9.16.6-150000.12.65.1.x86_64",
"SUSE Enterprise Storage 7:libirs-devel-9.16.6-150000.12.65.1.aarch64",
"SUSE Enterprise Storage 7:libirs-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Enterprise Storage 7:libirs1601-9.16.6-150000.12.65.1.aarch64",
"SUSE Enterprise Storage 7:libirs1601-9.16.6-150000.12.65.1.x86_64",
"SUSE Enterprise Storage 7:libisc1606-9.16.6-150000.12.65.1.aarch64",
"SUSE Enterprise Storage 7:libisc1606-9.16.6-150000.12.65.1.x86_64",
"SUSE Enterprise Storage 7:libisccc1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Enterprise Storage 7:libisccc1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Enterprise Storage 7:libisccfg1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Enterprise Storage 7:libisccfg1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Enterprise Storage 7:libns1604-9.16.6-150000.12.65.1.aarch64",
"SUSE Enterprise Storage 7:libns1604-9.16.6-150000.12.65.1.x86_64",
"SUSE Enterprise Storage 7:python3-bind-9.16.6-150000.12.65.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:bind-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:bind-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:bind-chrootenv-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:bind-chrootenv-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:bind-devel-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:bind-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:bind-doc-9.16.6-150000.12.65.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:bind-utils-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:bind-utils-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libbind9-1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libbind9-1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libdns1605-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libdns1605-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libirs-devel-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libirs-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libirs1601-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libirs1601-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libisc1606-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libisc1606-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libisccc1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libisccc1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libisccfg1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libisccfg1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libns1604-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libns1604-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:python3-bind-9.16.6-150000.12.65.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:bind-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:bind-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:bind-chrootenv-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:bind-chrootenv-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:bind-devel-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:bind-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:bind-doc-9.16.6-150000.12.65.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:bind-utils-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:bind-utils-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libbind9-1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libbind9-1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libdns1605-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libdns1605-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libirs-devel-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libirs-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libirs1601-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libirs1601-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libisc1606-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libisc1606-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libisccc1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libisccc1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libisccfg1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libisccfg1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libns1604-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libns1604-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:python3-bind-9.16.6-150000.12.65.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-chrootenv-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-chrootenv-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-chrootenv-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-chrootenv-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-devel-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-devel-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-devel-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-doc-9.16.6-150000.12.65.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-utils-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-utils-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-utils-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-utils-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libbind9-1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libbind9-1600-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libbind9-1600-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libbind9-1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libdns1605-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libdns1605-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libdns1605-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libdns1605-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libirs-devel-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libirs-devel-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libirs-devel-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libirs-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libirs1601-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libirs1601-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libirs1601-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libirs1601-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libisc1606-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libisc1606-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libisc1606-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libisc1606-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libisccc1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libisccc1600-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libisccc1600-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libisccc1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libisccfg1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libisccfg1600-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libisccfg1600-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libisccfg1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libns1604-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libns1604-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libns1604-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libns1604-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:python3-bind-9.16.6-150000.12.65.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-chrootenv-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-chrootenv-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-chrootenv-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-chrootenv-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-devel-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-devel-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-devel-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-doc-9.16.6-150000.12.65.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-utils-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-utils-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-utils-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-utils-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libbind9-1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libbind9-1600-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libbind9-1600-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libbind9-1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libdns1605-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libdns1605-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libdns1605-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libdns1605-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libirs-devel-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libirs-devel-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libirs-devel-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libirs-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libirs1601-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libirs1601-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libirs1601-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libirs1601-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libisc1606-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libisc1606-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libisc1606-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libisc1606-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libisccc1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libisccc1600-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libisccc1600-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libisccc1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libisccfg1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libisccfg1600-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libisccfg1600-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libisccfg1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libns1604-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libns1604-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libns1604-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libns1604-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:python3-bind-9.16.6-150000.12.65.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:bind-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:bind-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:bind-chrootenv-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:bind-chrootenv-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:bind-devel-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:bind-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:bind-doc-9.16.6-150000.12.65.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:bind-utils-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:bind-utils-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libbind9-1600-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libbind9-1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libdns1605-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libdns1605-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libirs-devel-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libirs-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libirs1601-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libirs1601-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libisc1606-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libisc1606-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libisccc1600-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libisccc1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libisccfg1600-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libisccfg1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libns1604-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libns1604-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:python3-bind-9.16.6-150000.12.65.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:bind-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:bind-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:bind-chrootenv-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:bind-chrootenv-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:bind-devel-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:bind-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:bind-doc-9.16.6-150000.12.65.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:bind-utils-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:bind-utils-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libbind9-1600-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libbind9-1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libdns1605-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libdns1605-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libirs-devel-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libirs-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libirs1601-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libirs1601-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libisc1606-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libisc1606-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libisccc1600-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libisccc1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libisccfg1600-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libisccfg1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libns1604-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libns1604-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:python3-bind-9.16.6-150000.12.65.1.noarch",
"SUSE Manager Client Tools 15:dracut-saltboot-0.1.1681904360.84ef141-150000.1.50.1.noarch",
"SUSE Manager Client Tools 15:grafana-9.5.1-150000.1.48.5.aarch64",
"SUSE Manager Client Tools 15:grafana-9.5.1-150000.1.48.5.ppc64le",
"SUSE Manager Client Tools 15:grafana-9.5.1-150000.1.48.5.s390x",
"SUSE Manager Client Tools 15:grafana-9.5.1-150000.1.48.5.x86_64",
"SUSE Manager Client Tools 15:mgr-daemon-4.3.7-150000.1.41.1.noarch",
"SUSE Manager Client Tools 15:python3-uyuni-common-libs-4.3.8-150000.1.33.1.aarch64",
"SUSE Manager Client Tools 15:python3-uyuni-common-libs-4.3.8-150000.1.33.1.ppc64le",
"SUSE Manager Client Tools 15:python3-uyuni-common-libs-4.3.8-150000.1.33.1.s390x",
"SUSE Manager Client Tools 15:python3-uyuni-common-libs-4.3.8-150000.1.33.1.x86_64",
"SUSE Manager Client Tools 15:python3-zypp-plugin-spacewalk-1.0.14-150000.3.35.1.noarch",
"SUSE Manager Client Tools 15:spacecmd-4.3.21-150000.3.98.1.noarch",
"SUSE Manager Client Tools 15:zypp-plugin-spacewalk-1.0.14-150000.3.35.1.noarch",
"SUSE Manager Client Tools for SLE Micro 5:bind-utils-9.16.6-150000.12.65.1.aarch64",
"SUSE Manager Client Tools for SLE Micro 5:bind-utils-9.16.6-150000.12.65.1.s390x",
"SUSE Manager Client Tools for SLE Micro 5:bind-utils-9.16.6-150000.12.65.1.x86_64",
"SUSE Manager Client Tools for SLE Micro 5:dracut-saltboot-0.1.1681904360.84ef141-150000.1.50.1.noarch",
"SUSE Manager Client Tools for SLE Micro 5:libbind9-1600-64bit-9.16.6-150000.12.65.1.aarch64_ilp32",
"SUSE Manager Client Tools for SLE Micro 5:libbind9-1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Manager Client Tools for SLE Micro 5:libbind9-1600-9.16.6-150000.12.65.1.s390x",
"SUSE Manager Client Tools for SLE Micro 5:libbind9-1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Manager Client Tools for SLE Micro 5:libdns1605-64bit-9.16.6-150000.12.65.1.aarch64_ilp32",
"SUSE Manager Client Tools for SLE Micro 5:libdns1605-9.16.6-150000.12.65.1.aarch64",
"SUSE Manager Client Tools for SLE Micro 5:libdns1605-9.16.6-150000.12.65.1.s390x",
"SUSE Manager Client Tools for SLE Micro 5:libdns1605-9.16.6-150000.12.65.1.x86_64",
"SUSE Manager Client Tools for SLE Micro 5:libirs1601-64bit-9.16.6-150000.12.65.1.aarch64_ilp32",
"SUSE Manager Client Tools for SLE Micro 5:libirs1601-9.16.6-150000.12.65.1.aarch64",
"SUSE Manager Client Tools for SLE Micro 5:libirs1601-9.16.6-150000.12.65.1.s390x",
"SUSE Manager Client Tools for SLE Micro 5:libirs1601-9.16.6-150000.12.65.1.x86_64",
"SUSE Manager Client Tools for SLE Micro 5:libisc1606-64bit-9.16.6-150000.12.65.1.aarch64_ilp32",
"SUSE Manager Client Tools for SLE Micro 5:libisc1606-9.16.6-150000.12.65.1.aarch64",
"SUSE Manager Client Tools for SLE Micro 5:libisc1606-9.16.6-150000.12.65.1.s390x",
"SUSE Manager Client Tools for SLE Micro 5:libisc1606-9.16.6-150000.12.65.1.x86_64",
"SUSE Manager Client Tools for SLE Micro 5:libisccc1600-64bit-9.16.6-150000.12.65.1.aarch64_ilp32",
"SUSE Manager Client Tools for SLE Micro 5:libisccc1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Manager Client Tools for SLE Micro 5:libisccc1600-9.16.6-150000.12.65.1.s390x",
"SUSE Manager Client Tools for SLE Micro 5:libisccc1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Manager Client Tools for SLE Micro 5:libisccfg1600-64bit-9.16.6-150000.12.65.1.aarch64_ilp32",
"SUSE Manager Client Tools for SLE Micro 5:libisccfg1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Manager Client Tools for SLE Micro 5:libisccfg1600-9.16.6-150000.12.65.1.s390x",
"SUSE Manager Client Tools for SLE Micro 5:libisccfg1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Manager Client Tools for SLE Micro 5:libns1604-9.16.6-150000.12.65.1.s390x",
"SUSE Manager Client Tools for SLE Micro 5:libns1604-9.16.6-150000.12.65.1.x86_64",
"SUSE Manager Client Tools for SLE Micro 5:python3-bind-9.16.6-150000.12.65.1.noarch",
"SUSE Manager Proxy Module 4.2:python3-zypp-plugin-spacewalk-1.0.14-150000.3.35.1.noarch",
"SUSE Manager Proxy Module 4.2:zypp-plugin-spacewalk-1.0.14-150000.3.35.1.noarch",
"SUSE Manager Proxy Module 4.3:python3-zypp-plugin-spacewalk-1.0.14-150000.3.35.1.noarch",
"SUSE Manager Proxy Module 4.3:zypp-plugin-spacewalk-1.0.14-150000.3.35.1.noarch",
"openSUSE Leap 15.4:bind-devel-32bit-9.16.6-150000.12.65.1.x86_64",
"openSUSE Leap 15.4:dracut-saltboot-0.1.1681904360.84ef141-150000.1.50.1.noarch",
"openSUSE Leap 15.4:libbind9-1600-32bit-9.16.6-150000.12.65.1.x86_64",
"openSUSE Leap 15.4:libdns1605-32bit-9.16.6-150000.12.65.1.x86_64",
"openSUSE Leap 15.4:libirs1601-32bit-9.16.6-150000.12.65.1.x86_64",
"openSUSE Leap 15.4:libisc1606-32bit-9.16.6-150000.12.65.1.x86_64",
"openSUSE Leap 15.4:libisccc1600-32bit-9.16.6-150000.12.65.1.x86_64",
"openSUSE Leap 15.4:libisccfg1600-32bit-9.16.6-150000.12.65.1.x86_64",
"openSUSE Leap 15.4:libns1604-32bit-9.16.6-150000.12.65.1.x86_64",
"openSUSE Leap 15.4:spacecmd-4.3.21-150000.3.98.1.noarch",
"openSUSE Leap 15.4:wire-0.5.0-150000.1.12.3.aarch64",
"openSUSE Leap 15.4:wire-0.5.0-150000.1.12.3.ppc64le",
"openSUSE Leap 15.4:wire-0.5.0-150000.1.12.3.s390x",
"openSUSE Leap 15.4:wire-0.5.0-150000.1.12.3.x86_64",
"openSUSE Leap 15.5:dracut-saltboot-0.1.1681904360.84ef141-150000.1.50.1.noarch",
"openSUSE Leap 15.5:spacecmd-4.3.21-150000.3.98.1.noarch",
"openSUSE Leap 15.5:wire-0.5.0-150000.1.12.3.aarch64",
"openSUSE Leap 15.5:wire-0.5.0-150000.1.12.3.ppc64le",
"openSUSE Leap 15.5:wire-0.5.0-150000.1.12.3.s390x",
"openSUSE Leap 15.5:wire-0.5.0-150000.1.12.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-27664",
"url": "https://www.suse.com/security/cve/CVE-2022-27664"
},
{
"category": "external",
"summary": "SUSE Bug 1203185 for CVE-2022-27664",
"url": "https://bugzilla.suse.com/1203185"
},
{
"category": "external",
"summary": "SUSE Bug 1203293 for CVE-2022-27664",
"url": "https://bugzilla.suse.com/1203293"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 7:bind-9.16.6-150000.12.65.1.aarch64",
"SUSE Enterprise Storage 7:bind-9.16.6-150000.12.65.1.x86_64",
"SUSE Enterprise Storage 7:bind-chrootenv-9.16.6-150000.12.65.1.aarch64",
"SUSE Enterprise Storage 7:bind-chrootenv-9.16.6-150000.12.65.1.x86_64",
"SUSE Enterprise Storage 7:bind-devel-9.16.6-150000.12.65.1.aarch64",
"SUSE Enterprise Storage 7:bind-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Enterprise Storage 7:bind-doc-9.16.6-150000.12.65.1.noarch",
"SUSE Enterprise Storage 7:bind-utils-9.16.6-150000.12.65.1.aarch64",
"SUSE Enterprise Storage 7:bind-utils-9.16.6-150000.12.65.1.x86_64",
"SUSE Enterprise Storage 7:libbind9-1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Enterprise Storage 7:libbind9-1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Enterprise Storage 7:libdns1605-9.16.6-150000.12.65.1.aarch64",
"SUSE Enterprise Storage 7:libdns1605-9.16.6-150000.12.65.1.x86_64",
"SUSE Enterprise Storage 7:libirs-devel-9.16.6-150000.12.65.1.aarch64",
"SUSE Enterprise Storage 7:libirs-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Enterprise Storage 7:libirs1601-9.16.6-150000.12.65.1.aarch64",
"SUSE Enterprise Storage 7:libirs1601-9.16.6-150000.12.65.1.x86_64",
"SUSE Enterprise Storage 7:libisc1606-9.16.6-150000.12.65.1.aarch64",
"SUSE Enterprise Storage 7:libisc1606-9.16.6-150000.12.65.1.x86_64",
"SUSE Enterprise Storage 7:libisccc1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Enterprise Storage 7:libisccc1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Enterprise Storage 7:libisccfg1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Enterprise Storage 7:libisccfg1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Enterprise Storage 7:libns1604-9.16.6-150000.12.65.1.aarch64",
"SUSE Enterprise Storage 7:libns1604-9.16.6-150000.12.65.1.x86_64",
"SUSE Enterprise Storage 7:python3-bind-9.16.6-150000.12.65.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:bind-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:bind-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:bind-chrootenv-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:bind-chrootenv-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:bind-devel-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:bind-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:bind-doc-9.16.6-150000.12.65.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:bind-utils-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:bind-utils-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libbind9-1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libbind9-1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libdns1605-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libdns1605-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libirs-devel-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libirs-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libirs1601-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libirs1601-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libisc1606-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libisc1606-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libisccc1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libisccc1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libisccfg1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libisccfg1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libns1604-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libns1604-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:python3-bind-9.16.6-150000.12.65.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:bind-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:bind-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:bind-chrootenv-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:bind-chrootenv-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:bind-devel-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:bind-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:bind-doc-9.16.6-150000.12.65.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:bind-utils-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:bind-utils-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libbind9-1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libbind9-1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libdns1605-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libdns1605-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libirs-devel-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libirs-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libirs1601-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libirs1601-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libisc1606-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libisc1606-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libisccc1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libisccc1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libisccfg1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libisccfg1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libns1604-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libns1604-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:python3-bind-9.16.6-150000.12.65.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-chrootenv-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-chrootenv-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-chrootenv-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-chrootenv-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-devel-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-devel-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-devel-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-doc-9.16.6-150000.12.65.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-utils-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-utils-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-utils-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-utils-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libbind9-1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libbind9-1600-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libbind9-1600-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libbind9-1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libdns1605-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libdns1605-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libdns1605-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libdns1605-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libirs-devel-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libirs-devel-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libirs-devel-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libirs-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libirs1601-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libirs1601-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libirs1601-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libirs1601-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libisc1606-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libisc1606-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libisc1606-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libisc1606-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libisccc1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libisccc1600-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libisccc1600-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libisccc1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libisccfg1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libisccfg1600-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libisccfg1600-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libisccfg1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libns1604-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libns1604-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libns1604-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libns1604-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:python3-bind-9.16.6-150000.12.65.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-chrootenv-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-chrootenv-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-chrootenv-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-chrootenv-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-devel-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-devel-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-devel-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-doc-9.16.6-150000.12.65.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-utils-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-utils-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-utils-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-utils-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libbind9-1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libbind9-1600-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libbind9-1600-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libbind9-1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libdns1605-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libdns1605-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libdns1605-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libdns1605-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libirs-devel-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libirs-devel-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libirs-devel-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libirs-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libirs1601-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libirs1601-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libirs1601-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libirs1601-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libisc1606-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libisc1606-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libisc1606-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libisc1606-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libisccc1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libisccc1600-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libisccc1600-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libisccc1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libisccfg1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libisccfg1600-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libisccfg1600-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libisccfg1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libns1604-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libns1604-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libns1604-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libns1604-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:python3-bind-9.16.6-150000.12.65.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:bind-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:bind-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:bind-chrootenv-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:bind-chrootenv-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:bind-devel-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:bind-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:bind-doc-9.16.6-150000.12.65.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:bind-utils-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:bind-utils-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libbind9-1600-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libbind9-1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libdns1605-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libdns1605-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libirs-devel-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libirs-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libirs1601-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libirs1601-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libisc1606-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libisc1606-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libisccc1600-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libisccc1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libisccfg1600-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libisccfg1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libns1604-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libns1604-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:python3-bind-9.16.6-150000.12.65.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:bind-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:bind-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:bind-chrootenv-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:bind-chrootenv-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:bind-devel-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:bind-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:bind-doc-9.16.6-150000.12.65.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:bind-utils-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:bind-utils-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libbind9-1600-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libbind9-1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libdns1605-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libdns1605-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libirs-devel-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libirs-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libirs1601-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libirs1601-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libisc1606-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libisc1606-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libisccc1600-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libisccc1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libisccfg1600-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libisccfg1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libns1604-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libns1604-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:python3-bind-9.16.6-150000.12.65.1.noarch",
"SUSE Manager Client Tools 15:dracut-saltboot-0.1.1681904360.84ef141-150000.1.50.1.noarch",
"SUSE Manager Client Tools 15:grafana-9.5.1-150000.1.48.5.aarch64",
"SUSE Manager Client Tools 15:grafana-9.5.1-150000.1.48.5.ppc64le",
"SUSE Manager Client Tools 15:grafana-9.5.1-150000.1.48.5.s390x",
"SUSE Manager Client Tools 15:grafana-9.5.1-150000.1.48.5.x86_64",
"SUSE Manager Client Tools 15:mgr-daemon-4.3.7-150000.1.41.1.noarch",
"SUSE Manager Client Tools 15:python3-uyuni-common-libs-4.3.8-150000.1.33.1.aarch64",
"SUSE Manager Client Tools 15:python3-uyuni-common-libs-4.3.8-150000.1.33.1.ppc64le",
"SUSE Manager Client Tools 15:python3-uyuni-common-libs-4.3.8-150000.1.33.1.s390x",
"SUSE Manager Client Tools 15:python3-uyuni-common-libs-4.3.8-150000.1.33.1.x86_64",
"SUSE Manager Client Tools 15:python3-zypp-plugin-spacewalk-1.0.14-150000.3.35.1.noarch",
"SUSE Manager Client Tools 15:spacecmd-4.3.21-150000.3.98.1.noarch",
"SUSE Manager Client Tools 15:zypp-plugin-spacewalk-1.0.14-150000.3.35.1.noarch",
"SUSE Manager Client Tools for SLE Micro 5:bind-utils-9.16.6-150000.12.65.1.aarch64",
"SUSE Manager Client Tools for SLE Micro 5:bind-utils-9.16.6-150000.12.65.1.s390x",
"SUSE Manager Client Tools for SLE Micro 5:bind-utils-9.16.6-150000.12.65.1.x86_64",
"SUSE Manager Client Tools for SLE Micro 5:dracut-saltboot-0.1.1681904360.84ef141-150000.1.50.1.noarch",
"SUSE Manager Client Tools for SLE Micro 5:libbind9-1600-64bit-9.16.6-150000.12.65.1.aarch64_ilp32",
"SUSE Manager Client Tools for SLE Micro 5:libbind9-1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Manager Client Tools for SLE Micro 5:libbind9-1600-9.16.6-150000.12.65.1.s390x",
"SUSE Manager Client Tools for SLE Micro 5:libbind9-1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Manager Client Tools for SLE Micro 5:libdns1605-64bit-9.16.6-150000.12.65.1.aarch64_ilp32",
"SUSE Manager Client Tools for SLE Micro 5:libdns1605-9.16.6-150000.12.65.1.aarch64",
"SUSE Manager Client Tools for SLE Micro 5:libdns1605-9.16.6-150000.12.65.1.s390x",
"SUSE Manager Client Tools for SLE Micro 5:libdns1605-9.16.6-150000.12.65.1.x86_64",
"SUSE Manager Client Tools for SLE Micro 5:libirs1601-64bit-9.16.6-150000.12.65.1.aarch64_ilp32",
"SUSE Manager Client Tools for SLE Micro 5:libirs1601-9.16.6-150000.12.65.1.aarch64",
"SUSE Manager Client Tools for SLE Micro 5:libirs1601-9.16.6-150000.12.65.1.s390x",
"SUSE Manager Client Tools for SLE Micro 5:libirs1601-9.16.6-150000.12.65.1.x86_64",
"SUSE Manager Client Tools for SLE Micro 5:libisc1606-64bit-9.16.6-150000.12.65.1.aarch64_ilp32",
"SUSE Manager Client Tools for SLE Micro 5:libisc1606-9.16.6-150000.12.65.1.aarch64",
"SUSE Manager Client Tools for SLE Micro 5:libisc1606-9.16.6-150000.12.65.1.s390x",
"SUSE Manager Client Tools for SLE Micro 5:libisc1606-9.16.6-150000.12.65.1.x86_64",
"SUSE Manager Client Tools for SLE Micro 5:libisccc1600-64bit-9.16.6-150000.12.65.1.aarch64_ilp32",
"SUSE Manager Client Tools for SLE Micro 5:libisccc1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Manager Client Tools for SLE Micro 5:libisccc1600-9.16.6-150000.12.65.1.s390x",
"SUSE Manager Client Tools for SLE Micro 5:libisccc1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Manager Client Tools for SLE Micro 5:libisccfg1600-64bit-9.16.6-150000.12.65.1.aarch64_ilp32",
"SUSE Manager Client Tools for SLE Micro 5:libisccfg1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Manager Client Tools for SLE Micro 5:libisccfg1600-9.16.6-150000.12.65.1.s390x",
"SUSE Manager Client Tools for SLE Micro 5:libisccfg1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Manager Client Tools for SLE Micro 5:libns1604-9.16.6-150000.12.65.1.s390x",
"SUSE Manager Client Tools for SLE Micro 5:libns1604-9.16.6-150000.12.65.1.x86_64",
"SUSE Manager Client Tools for SLE Micro 5:python3-bind-9.16.6-150000.12.65.1.noarch",
"SUSE Manager Proxy Module 4.2:python3-zypp-plugin-spacewalk-1.0.14-150000.3.35.1.noarch",
"SUSE Manager Proxy Module 4.2:zypp-plugin-spacewalk-1.0.14-150000.3.35.1.noarch",
"SUSE Manager Proxy Module 4.3:python3-zypp-plugin-spacewalk-1.0.14-150000.3.35.1.noarch",
"SUSE Manager Proxy Module 4.3:zypp-plugin-spacewalk-1.0.14-150000.3.35.1.noarch",
"openSUSE Leap 15.4:bind-devel-32bit-9.16.6-150000.12.65.1.x86_64",
"openSUSE Leap 15.4:dracut-saltboot-0.1.1681904360.84ef141-150000.1.50.1.noarch",
"openSUSE Leap 15.4:libbind9-1600-32bit-9.16.6-150000.12.65.1.x86_64",
"openSUSE Leap 15.4:libdns1605-32bit-9.16.6-150000.12.65.1.x86_64",
"openSUSE Leap 15.4:libirs1601-32bit-9.16.6-150000.12.65.1.x86_64",
"openSUSE Leap 15.4:libisc1606-32bit-9.16.6-150000.12.65.1.x86_64",
"openSUSE Leap 15.4:libisccc1600-32bit-9.16.6-150000.12.65.1.x86_64",
"openSUSE Leap 15.4:libisccfg1600-32bit-9.16.6-150000.12.65.1.x86_64",
"openSUSE Leap 15.4:libns1604-32bit-9.16.6-150000.12.65.1.x86_64",
"openSUSE Leap 15.4:spacecmd-4.3.21-150000.3.98.1.noarch",
"openSUSE Leap 15.4:wire-0.5.0-150000.1.12.3.aarch64",
"openSUSE Leap 15.4:wire-0.5.0-150000.1.12.3.ppc64le",
"openSUSE Leap 15.4:wire-0.5.0-150000.1.12.3.s390x",
"openSUSE Leap 15.4:wire-0.5.0-150000.1.12.3.x86_64",
"openSUSE Leap 15.5:dracut-saltboot-0.1.1681904360.84ef141-150000.1.50.1.noarch",
"openSUSE Leap 15.5:spacecmd-4.3.21-150000.3.98.1.noarch",
"openSUSE Leap 15.5:wire-0.5.0-150000.1.12.3.aarch64",
"openSUSE Leap 15.5:wire-0.5.0-150000.1.12.3.ppc64le",
"openSUSE Leap 15.5:wire-0.5.0-150000.1.12.3.s390x",
"openSUSE Leap 15.5:wire-0.5.0-150000.1.12.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 7:bind-9.16.6-150000.12.65.1.aarch64",
"SUSE Enterprise Storage 7:bind-9.16.6-150000.12.65.1.x86_64",
"SUSE Enterprise Storage 7:bind-chrootenv-9.16.6-150000.12.65.1.aarch64",
"SUSE Enterprise Storage 7:bind-chrootenv-9.16.6-150000.12.65.1.x86_64",
"SUSE Enterprise Storage 7:bind-devel-9.16.6-150000.12.65.1.aarch64",
"SUSE Enterprise Storage 7:bind-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Enterprise Storage 7:bind-doc-9.16.6-150000.12.65.1.noarch",
"SUSE Enterprise Storage 7:bind-utils-9.16.6-150000.12.65.1.aarch64",
"SUSE Enterprise Storage 7:bind-utils-9.16.6-150000.12.65.1.x86_64",
"SUSE Enterprise Storage 7:libbind9-1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Enterprise Storage 7:libbind9-1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Enterprise Storage 7:libdns1605-9.16.6-150000.12.65.1.aarch64",
"SUSE Enterprise Storage 7:libdns1605-9.16.6-150000.12.65.1.x86_64",
"SUSE Enterprise Storage 7:libirs-devel-9.16.6-150000.12.65.1.aarch64",
"SUSE Enterprise Storage 7:libirs-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Enterprise Storage 7:libirs1601-9.16.6-150000.12.65.1.aarch64",
"SUSE Enterprise Storage 7:libirs1601-9.16.6-150000.12.65.1.x86_64",
"SUSE Enterprise Storage 7:libisc1606-9.16.6-150000.12.65.1.aarch64",
"SUSE Enterprise Storage 7:libisc1606-9.16.6-150000.12.65.1.x86_64",
"SUSE Enterprise Storage 7:libisccc1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Enterprise Storage 7:libisccc1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Enterprise Storage 7:libisccfg1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Enterprise Storage 7:libisccfg1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Enterprise Storage 7:libns1604-9.16.6-150000.12.65.1.aarch64",
"SUSE Enterprise Storage 7:libns1604-9.16.6-150000.12.65.1.x86_64",
"SUSE Enterprise Storage 7:python3-bind-9.16.6-150000.12.65.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:bind-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:bind-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:bind-chrootenv-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:bind-chrootenv-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:bind-devel-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:bind-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:bind-doc-9.16.6-150000.12.65.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:bind-utils-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:bind-utils-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libbind9-1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libbind9-1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libdns1605-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libdns1605-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libirs-devel-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libirs-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libirs1601-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libirs1601-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libisc1606-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libisc1606-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libisccc1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libisccc1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libisccfg1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libisccfg1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libns1604-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libns1604-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:python3-bind-9.16.6-150000.12.65.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:bind-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:bind-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:bind-chrootenv-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:bind-chrootenv-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:bind-devel-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:bind-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:bind-doc-9.16.6-150000.12.65.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:bind-utils-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:bind-utils-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libbind9-1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libbind9-1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libdns1605-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libdns1605-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libirs-devel-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libirs-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libirs1601-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libirs1601-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libisc1606-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libisc1606-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libisccc1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libisccc1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libisccfg1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libisccfg1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libns1604-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libns1604-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:python3-bind-9.16.6-150000.12.65.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-chrootenv-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-chrootenv-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-chrootenv-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-chrootenv-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-devel-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-devel-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-devel-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-doc-9.16.6-150000.12.65.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-utils-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-utils-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-utils-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-utils-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libbind9-1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libbind9-1600-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libbind9-1600-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libbind9-1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libdns1605-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libdns1605-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libdns1605-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libdns1605-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libirs-devel-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libirs-devel-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libirs-devel-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libirs-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libirs1601-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libirs1601-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libirs1601-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libirs1601-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libisc1606-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libisc1606-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libisc1606-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libisc1606-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libisccc1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libisccc1600-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libisccc1600-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libisccc1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libisccfg1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libisccfg1600-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libisccfg1600-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libisccfg1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libns1604-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libns1604-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libns1604-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libns1604-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:python3-bind-9.16.6-150000.12.65.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-chrootenv-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-chrootenv-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-chrootenv-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-chrootenv-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-devel-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-devel-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-devel-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-doc-9.16.6-150000.12.65.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-utils-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-utils-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-utils-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-utils-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libbind9-1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libbind9-1600-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libbind9-1600-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libbind9-1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libdns1605-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libdns1605-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libdns1605-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libdns1605-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libirs-devel-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libirs-devel-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libirs-devel-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libirs-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libirs1601-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libirs1601-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libirs1601-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libirs1601-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libisc1606-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libisc1606-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libisc1606-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libisc1606-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libisccc1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libisccc1600-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libisccc1600-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libisccc1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libisccfg1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libisccfg1600-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libisccfg1600-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libisccfg1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libns1604-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libns1604-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libns1604-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libns1604-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:python3-bind-9.16.6-150000.12.65.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:bind-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:bind-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:bind-chrootenv-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:bind-chrootenv-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:bind-devel-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:bind-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:bind-doc-9.16.6-150000.12.65.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:bind-utils-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:bind-utils-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libbind9-1600-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libbind9-1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libdns1605-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libdns1605-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libirs-devel-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libirs-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libirs1601-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libirs1601-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libisc1606-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libisc1606-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libisccc1600-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libisccc1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libisccfg1600-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libisccfg1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libns1604-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libns1604-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:python3-bind-9.16.6-150000.12.65.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:bind-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:bind-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:bind-chrootenv-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:bind-chrootenv-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:bind-devel-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:bind-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:bind-doc-9.16.6-150000.12.65.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:bind-utils-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:bind-utils-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libbind9-1600-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libbind9-1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libdns1605-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libdns1605-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libirs-devel-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libirs-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libirs1601-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libirs1601-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libisc1606-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libisc1606-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libisccc1600-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libisccc1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libisccfg1600-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libisccfg1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libns1604-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libns1604-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:python3-bind-9.16.6-150000.12.65.1.noarch",
"SUSE Manager Client Tools 15:dracut-saltboot-0.1.1681904360.84ef141-150000.1.50.1.noarch",
"SUSE Manager Client Tools 15:grafana-9.5.1-150000.1.48.5.aarch64",
"SUSE Manager Client Tools 15:grafana-9.5.1-150000.1.48.5.ppc64le",
"SUSE Manager Client Tools 15:grafana-9.5.1-150000.1.48.5.s390x",
"SUSE Manager Client Tools 15:grafana-9.5.1-150000.1.48.5.x86_64",
"SUSE Manager Client Tools 15:mgr-daemon-4.3.7-150000.1.41.1.noarch",
"SUSE Manager Client Tools 15:python3-uyuni-common-libs-4.3.8-150000.1.33.1.aarch64",
"SUSE Manager Client Tools 15:python3-uyuni-common-libs-4.3.8-150000.1.33.1.ppc64le",
"SUSE Manager Client Tools 15:python3-uyuni-common-libs-4.3.8-150000.1.33.1.s390x",
"SUSE Manager Client Tools 15:python3-uyuni-common-libs-4.3.8-150000.1.33.1.x86_64",
"SUSE Manager Client Tools 15:python3-zypp-plugin-spacewalk-1.0.14-150000.3.35.1.noarch",
"SUSE Manager Client Tools 15:spacecmd-4.3.21-150000.3.98.1.noarch",
"SUSE Manager Client Tools 15:zypp-plugin-spacewalk-1.0.14-150000.3.35.1.noarch",
"SUSE Manager Client Tools for SLE Micro 5:bind-utils-9.16.6-150000.12.65.1.aarch64",
"SUSE Manager Client Tools for SLE Micro 5:bind-utils-9.16.6-150000.12.65.1.s390x",
"SUSE Manager Client Tools for SLE Micro 5:bind-utils-9.16.6-150000.12.65.1.x86_64",
"SUSE Manager Client Tools for SLE Micro 5:dracut-saltboot-0.1.1681904360.84ef141-150000.1.50.1.noarch",
"SUSE Manager Client Tools for SLE Micro 5:libbind9-1600-64bit-9.16.6-150000.12.65.1.aarch64_ilp32",
"SUSE Manager Client Tools for SLE Micro 5:libbind9-1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Manager Client Tools for SLE Micro 5:libbind9-1600-9.16.6-150000.12.65.1.s390x",
"SUSE Manager Client Tools for SLE Micro 5:libbind9-1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Manager Client Tools for SLE Micro 5:libdns1605-64bit-9.16.6-150000.12.65.1.aarch64_ilp32",
"SUSE Manager Client Tools for SLE Micro 5:libdns1605-9.16.6-150000.12.65.1.aarch64",
"SUSE Manager Client Tools for SLE Micro 5:libdns1605-9.16.6-150000.12.65.1.s390x",
"SUSE Manager Client Tools for SLE Micro 5:libdns1605-9.16.6-150000.12.65.1.x86_64",
"SUSE Manager Client Tools for SLE Micro 5:libirs1601-64bit-9.16.6-150000.12.65.1.aarch64_ilp32",
"SUSE Manager Client Tools for SLE Micro 5:libirs1601-9.16.6-150000.12.65.1.aarch64",
"SUSE Manager Client Tools for SLE Micro 5:libirs1601-9.16.6-150000.12.65.1.s390x",
"SUSE Manager Client Tools for SLE Micro 5:libirs1601-9.16.6-150000.12.65.1.x86_64",
"SUSE Manager Client Tools for SLE Micro 5:libisc1606-64bit-9.16.6-150000.12.65.1.aarch64_ilp32",
"SUSE Manager Client Tools for SLE Micro 5:libisc1606-9.16.6-150000.12.65.1.aarch64",
"SUSE Manager Client Tools for SLE Micro 5:libisc1606-9.16.6-150000.12.65.1.s390x",
"SUSE Manager Client Tools for SLE Micro 5:libisc1606-9.16.6-150000.12.65.1.x86_64",
"SUSE Manager Client Tools for SLE Micro 5:libisccc1600-64bit-9.16.6-150000.12.65.1.aarch64_ilp32",
"SUSE Manager Client Tools for SLE Micro 5:libisccc1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Manager Client Tools for SLE Micro 5:libisccc1600-9.16.6-150000.12.65.1.s390x",
"SUSE Manager Client Tools for SLE Micro 5:libisccc1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Manager Client Tools for SLE Micro 5:libisccfg1600-64bit-9.16.6-150000.12.65.1.aarch64_ilp32",
"SUSE Manager Client Tools for SLE Micro 5:libisccfg1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Manager Client Tools for SLE Micro 5:libisccfg1600-9.16.6-150000.12.65.1.s390x",
"SUSE Manager Client Tools for SLE Micro 5:libisccfg1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Manager Client Tools for SLE Micro 5:libns1604-9.16.6-150000.12.65.1.s390x",
"SUSE Manager Client Tools for SLE Micro 5:libns1604-9.16.6-150000.12.65.1.x86_64",
"SUSE Manager Client Tools for SLE Micro 5:python3-bind-9.16.6-150000.12.65.1.noarch",
"SUSE Manager Proxy Module 4.2:python3-zypp-plugin-spacewalk-1.0.14-150000.3.35.1.noarch",
"SUSE Manager Proxy Module 4.2:zypp-plugin-spacewalk-1.0.14-150000.3.35.1.noarch",
"SUSE Manager Proxy Module 4.3:python3-zypp-plugin-spacewalk-1.0.14-150000.3.35.1.noarch",
"SUSE Manager Proxy Module 4.3:zypp-plugin-spacewalk-1.0.14-150000.3.35.1.noarch",
"openSUSE Leap 15.4:bind-devel-32bit-9.16.6-150000.12.65.1.x86_64",
"openSUSE Leap 15.4:dracut-saltboot-0.1.1681904360.84ef141-150000.1.50.1.noarch",
"openSUSE Leap 15.4:libbind9-1600-32bit-9.16.6-150000.12.65.1.x86_64",
"openSUSE Leap 15.4:libdns1605-32bit-9.16.6-150000.12.65.1.x86_64",
"openSUSE Leap 15.4:libirs1601-32bit-9.16.6-150000.12.65.1.x86_64",
"openSUSE Leap 15.4:libisc1606-32bit-9.16.6-150000.12.65.1.x86_64",
"openSUSE Leap 15.4:libisccc1600-32bit-9.16.6-150000.12.65.1.x86_64",
"openSUSE Leap 15.4:libisccfg1600-32bit-9.16.6-150000.12.65.1.x86_64",
"openSUSE Leap 15.4:libns1604-32bit-9.16.6-150000.12.65.1.x86_64",
"openSUSE Leap 15.4:spacecmd-4.3.21-150000.3.98.1.noarch",
"openSUSE Leap 15.4:wire-0.5.0-150000.1.12.3.aarch64",
"openSUSE Leap 15.4:wire-0.5.0-150000.1.12.3.ppc64le",
"openSUSE Leap 15.4:wire-0.5.0-150000.1.12.3.s390x",
"openSUSE Leap 15.4:wire-0.5.0-150000.1.12.3.x86_64",
"openSUSE Leap 15.5:dracut-saltboot-0.1.1681904360.84ef141-150000.1.50.1.noarch",
"openSUSE Leap 15.5:spacecmd-4.3.21-150000.3.98.1.noarch",
"openSUSE Leap 15.5:wire-0.5.0-150000.1.12.3.aarch64",
"openSUSE Leap 15.5:wire-0.5.0-150000.1.12.3.ppc64le",
"openSUSE Leap 15.5:wire-0.5.0-150000.1.12.3.s390x",
"openSUSE Leap 15.5:wire-0.5.0-150000.1.12.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2023-06-21T11:49:43Z",
"details": "important"
}
],
"title": "CVE-2022-27664"
},
{
"cve": "CVE-2022-31097",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-31097"
}
],
"notes": [
{
"category": "general",
"text": "Grafana is an open-source platform for monitoring and observability. Versions on the 8.x and 9.x branch prior to 9.0.3, 8.5.9, 8.4.10, and 8.3.10 are vulnerable to stored cross-site scripting via the Unified Alerting feature of Grafana. An attacker can exploit this vulnerability to escalate privilege from editor to admin by tricking an authenticated admin to click on a link. Versions 9.0.3, 8.5.9, 8.4.10, and 8.3.10 contain a patch. As a workaround, it is possible to disable alerting or use legacy alerting.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 7:bind-9.16.6-150000.12.65.1.aarch64",
"SUSE Enterprise Storage 7:bind-9.16.6-150000.12.65.1.x86_64",
"SUSE Enterprise Storage 7:bind-chrootenv-9.16.6-150000.12.65.1.aarch64",
"SUSE Enterprise Storage 7:bind-chrootenv-9.16.6-150000.12.65.1.x86_64",
"SUSE Enterprise Storage 7:bind-devel-9.16.6-150000.12.65.1.aarch64",
"SUSE Enterprise Storage 7:bind-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Enterprise Storage 7:bind-doc-9.16.6-150000.12.65.1.noarch",
"SUSE Enterprise Storage 7:bind-utils-9.16.6-150000.12.65.1.aarch64",
"SUSE Enterprise Storage 7:bind-utils-9.16.6-150000.12.65.1.x86_64",
"SUSE Enterprise Storage 7:libbind9-1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Enterprise Storage 7:libbind9-1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Enterprise Storage 7:libdns1605-9.16.6-150000.12.65.1.aarch64",
"SUSE Enterprise Storage 7:libdns1605-9.16.6-150000.12.65.1.x86_64",
"SUSE Enterprise Storage 7:libirs-devel-9.16.6-150000.12.65.1.aarch64",
"SUSE Enterprise Storage 7:libirs-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Enterprise Storage 7:libirs1601-9.16.6-150000.12.65.1.aarch64",
"SUSE Enterprise Storage 7:libirs1601-9.16.6-150000.12.65.1.x86_64",
"SUSE Enterprise Storage 7:libisc1606-9.16.6-150000.12.65.1.aarch64",
"SUSE Enterprise Storage 7:libisc1606-9.16.6-150000.12.65.1.x86_64",
"SUSE Enterprise Storage 7:libisccc1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Enterprise Storage 7:libisccc1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Enterprise Storage 7:libisccfg1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Enterprise Storage 7:libisccfg1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Enterprise Storage 7:libns1604-9.16.6-150000.12.65.1.aarch64",
"SUSE Enterprise Storage 7:libns1604-9.16.6-150000.12.65.1.x86_64",
"SUSE Enterprise Storage 7:python3-bind-9.16.6-150000.12.65.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:bind-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:bind-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:bind-chrootenv-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:bind-chrootenv-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:bind-devel-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:bind-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:bind-doc-9.16.6-150000.12.65.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:bind-utils-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:bind-utils-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libbind9-1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libbind9-1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libdns1605-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libdns1605-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libirs-devel-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libirs-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libirs1601-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libirs1601-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libisc1606-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libisc1606-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libisccc1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libisccc1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libisccfg1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libisccfg1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libns1604-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libns1604-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:python3-bind-9.16.6-150000.12.65.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:bind-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:bind-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:bind-chrootenv-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:bind-chrootenv-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:bind-devel-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:bind-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:bind-doc-9.16.6-150000.12.65.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:bind-utils-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:bind-utils-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libbind9-1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libbind9-1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libdns1605-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libdns1605-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libirs-devel-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libirs-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libirs1601-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libirs1601-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libisc1606-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libisc1606-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libisccc1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libisccc1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libisccfg1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libisccfg1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libns1604-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libns1604-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:python3-bind-9.16.6-150000.12.65.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-chrootenv-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-chrootenv-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-chrootenv-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-chrootenv-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-devel-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-devel-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-devel-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-doc-9.16.6-150000.12.65.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-utils-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-utils-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-utils-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-utils-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libbind9-1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libbind9-1600-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libbind9-1600-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libbind9-1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libdns1605-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libdns1605-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libdns1605-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libdns1605-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libirs-devel-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libirs-devel-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libirs-devel-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libirs-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libirs1601-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libirs1601-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libirs1601-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libirs1601-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libisc1606-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libisc1606-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libisc1606-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libisc1606-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libisccc1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libisccc1600-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libisccc1600-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libisccc1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libisccfg1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libisccfg1600-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libisccfg1600-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libisccfg1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libns1604-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libns1604-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libns1604-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libns1604-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:python3-bind-9.16.6-150000.12.65.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-chrootenv-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-chrootenv-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-chrootenv-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-chrootenv-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-devel-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-devel-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-devel-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-doc-9.16.6-150000.12.65.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-utils-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-utils-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-utils-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-utils-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libbind9-1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libbind9-1600-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libbind9-1600-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libbind9-1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libdns1605-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libdns1605-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libdns1605-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libdns1605-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libirs-devel-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libirs-devel-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libirs-devel-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libirs-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libirs1601-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libirs1601-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libirs1601-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libirs1601-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libisc1606-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libisc1606-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libisc1606-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libisc1606-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libisccc1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libisccc1600-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libisccc1600-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libisccc1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libisccfg1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libisccfg1600-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libisccfg1600-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libisccfg1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libns1604-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libns1604-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libns1604-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libns1604-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:python3-bind-9.16.6-150000.12.65.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:bind-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:bind-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:bind-chrootenv-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:bind-chrootenv-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:bind-devel-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:bind-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:bind-doc-9.16.6-150000.12.65.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:bind-utils-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:bind-utils-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libbind9-1600-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libbind9-1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libdns1605-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libdns1605-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libirs-devel-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libirs-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libirs1601-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libirs1601-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libisc1606-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libisc1606-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libisccc1600-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libisccc1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libisccfg1600-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libisccfg1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libns1604-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libns1604-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:python3-bind-9.16.6-150000.12.65.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:bind-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:bind-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:bind-chrootenv-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:bind-chrootenv-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:bind-devel-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:bind-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:bind-doc-9.16.6-150000.12.65.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:bind-utils-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:bind-utils-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libbind9-1600-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libbind9-1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libdns1605-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libdns1605-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libirs-devel-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libirs-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libirs1601-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libirs1601-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libisc1606-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libisc1606-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libisccc1600-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libisccc1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libisccfg1600-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libisccfg1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libns1604-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libns1604-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:python3-bind-9.16.6-150000.12.65.1.noarch",
"SUSE Manager Client Tools 15:dracut-saltboot-0.1.1681904360.84ef141-150000.1.50.1.noarch",
"SUSE Manager Client Tools 15:grafana-9.5.1-150000.1.48.5.aarch64",
"SUSE Manager Client Tools 15:grafana-9.5.1-150000.1.48.5.ppc64le",
"SUSE Manager Client Tools 15:grafana-9.5.1-150000.1.48.5.s390x",
"SUSE Manager Client Tools 15:grafana-9.5.1-150000.1.48.5.x86_64",
"SUSE Manager Client Tools 15:mgr-daemon-4.3.7-150000.1.41.1.noarch",
"SUSE Manager Client Tools 15:python3-uyuni-common-libs-4.3.8-150000.1.33.1.aarch64",
"SUSE Manager Client Tools 15:python3-uyuni-common-libs-4.3.8-150000.1.33.1.ppc64le",
"SUSE Manager Client Tools 15:python3-uyuni-common-libs-4.3.8-150000.1.33.1.s390x",
"SUSE Manager Client Tools 15:python3-uyuni-common-libs-4.3.8-150000.1.33.1.x86_64",
"SUSE Manager Client Tools 15:python3-zypp-plugin-spacewalk-1.0.14-150000.3.35.1.noarch",
"SUSE Manager Client Tools 15:spacecmd-4.3.21-150000.3.98.1.noarch",
"SUSE Manager Client Tools 15:zypp-plugin-spacewalk-1.0.14-150000.3.35.1.noarch",
"SUSE Manager Client Tools for SLE Micro 5:bind-utils-9.16.6-150000.12.65.1.aarch64",
"SUSE Manager Client Tools for SLE Micro 5:bind-utils-9.16.6-150000.12.65.1.s390x",
"SUSE Manager Client Tools for SLE Micro 5:bind-utils-9.16.6-150000.12.65.1.x86_64",
"SUSE Manager Client Tools for SLE Micro 5:dracut-saltboot-0.1.1681904360.84ef141-150000.1.50.1.noarch",
"SUSE Manager Client Tools for SLE Micro 5:libbind9-1600-64bit-9.16.6-150000.12.65.1.aarch64_ilp32",
"SUSE Manager Client Tools for SLE Micro 5:libbind9-1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Manager Client Tools for SLE Micro 5:libbind9-1600-9.16.6-150000.12.65.1.s390x",
"SUSE Manager Client Tools for SLE Micro 5:libbind9-1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Manager Client Tools for SLE Micro 5:libdns1605-64bit-9.16.6-150000.12.65.1.aarch64_ilp32",
"SUSE Manager Client Tools for SLE Micro 5:libdns1605-9.16.6-150000.12.65.1.aarch64",
"SUSE Manager Client Tools for SLE Micro 5:libdns1605-9.16.6-150000.12.65.1.s390x",
"SUSE Manager Client Tools for SLE Micro 5:libdns1605-9.16.6-150000.12.65.1.x86_64",
"SUSE Manager Client Tools for SLE Micro 5:libirs1601-64bit-9.16.6-150000.12.65.1.aarch64_ilp32",
"SUSE Manager Client Tools for SLE Micro 5:libirs1601-9.16.6-150000.12.65.1.aarch64",
"SUSE Manager Client Tools for SLE Micro 5:libirs1601-9.16.6-150000.12.65.1.s390x",
"SUSE Manager Client Tools for SLE Micro 5:libirs1601-9.16.6-150000.12.65.1.x86_64",
"SUSE Manager Client Tools for SLE Micro 5:libisc1606-64bit-9.16.6-150000.12.65.1.aarch64_ilp32",
"SUSE Manager Client Tools for SLE Micro 5:libisc1606-9.16.6-150000.12.65.1.aarch64",
"SUSE Manager Client Tools for SLE Micro 5:libisc1606-9.16.6-150000.12.65.1.s390x",
"SUSE Manager Client Tools for SLE Micro 5:libisc1606-9.16.6-150000.12.65.1.x86_64",
"SUSE Manager Client Tools for SLE Micro 5:libisccc1600-64bit-9.16.6-150000.12.65.1.aarch64_ilp32",
"SUSE Manager Client Tools for SLE Micro 5:libisccc1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Manager Client Tools for SLE Micro 5:libisccc1600-9.16.6-150000.12.65.1.s390x",
"SUSE Manager Client Tools for SLE Micro 5:libisccc1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Manager Client Tools for SLE Micro 5:libisccfg1600-64bit-9.16.6-150000.12.65.1.aarch64_ilp32",
"SUSE Manager Client Tools for SLE Micro 5:libisccfg1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Manager Client Tools for SLE Micro 5:libisccfg1600-9.16.6-150000.12.65.1.s390x",
"SUSE Manager Client Tools for SLE Micro 5:libisccfg1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Manager Client Tools for SLE Micro 5:libns1604-9.16.6-150000.12.65.1.s390x",
"SUSE Manager Client Tools for SLE Micro 5:libns1604-9.16.6-150000.12.65.1.x86_64",
"SUSE Manager Client Tools for SLE Micro 5:python3-bind-9.16.6-150000.12.65.1.noarch",
"SUSE Manager Proxy Module 4.2:python3-zypp-plugin-spacewalk-1.0.14-150000.3.35.1.noarch",
"SUSE Manager Proxy Module 4.2:zypp-plugin-spacewalk-1.0.14-150000.3.35.1.noarch",
"SUSE Manager Proxy Module 4.3:python3-zypp-plugin-spacewalk-1.0.14-150000.3.35.1.noarch",
"SUSE Manager Proxy Module 4.3:zypp-plugin-spacewalk-1.0.14-150000.3.35.1.noarch",
"openSUSE Leap 15.4:bind-devel-32bit-9.16.6-150000.12.65.1.x86_64",
"openSUSE Leap 15.4:dracut-saltboot-0.1.1681904360.84ef141-150000.1.50.1.noarch",
"openSUSE Leap 15.4:libbind9-1600-32bit-9.16.6-150000.12.65.1.x86_64",
"openSUSE Leap 15.4:libdns1605-32bit-9.16.6-150000.12.65.1.x86_64",
"openSUSE Leap 15.4:libirs1601-32bit-9.16.6-150000.12.65.1.x86_64",
"openSUSE Leap 15.4:libisc1606-32bit-9.16.6-150000.12.65.1.x86_64",
"openSUSE Leap 15.4:libisccc1600-32bit-9.16.6-150000.12.65.1.x86_64",
"openSUSE Leap 15.4:libisccfg1600-32bit-9.16.6-150000.12.65.1.x86_64",
"openSUSE Leap 15.4:libns1604-32bit-9.16.6-150000.12.65.1.x86_64",
"openSUSE Leap 15.4:spacecmd-4.3.21-150000.3.98.1.noarch",
"openSUSE Leap 15.4:wire-0.5.0-150000.1.12.3.aarch64",
"openSUSE Leap 15.4:wire-0.5.0-150000.1.12.3.ppc64le",
"openSUSE Leap 15.4:wire-0.5.0-150000.1.12.3.s390x",
"openSUSE Leap 15.4:wire-0.5.0-150000.1.12.3.x86_64",
"openSUSE Leap 15.5:dracut-saltboot-0.1.1681904360.84ef141-150000.1.50.1.noarch",
"openSUSE Leap 15.5:spacecmd-4.3.21-150000.3.98.1.noarch",
"openSUSE Leap 15.5:wire-0.5.0-150000.1.12.3.aarch64",
"openSUSE Leap 15.5:wire-0.5.0-150000.1.12.3.ppc64le",
"openSUSE Leap 15.5:wire-0.5.0-150000.1.12.3.s390x",
"openSUSE Leap 15.5:wire-0.5.0-150000.1.12.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-31097",
"url": "https://www.suse.com/security/cve/CVE-2022-31097"
},
{
"category": "external",
"summary": "SUSE Bug 1201535 for CVE-2022-31097",
"url": "https://bugzilla.suse.com/1201535"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 7:bind-9.16.6-150000.12.65.1.aarch64",
"SUSE Enterprise Storage 7:bind-9.16.6-150000.12.65.1.x86_64",
"SUSE Enterprise Storage 7:bind-chrootenv-9.16.6-150000.12.65.1.aarch64",
"SUSE Enterprise Storage 7:bind-chrootenv-9.16.6-150000.12.65.1.x86_64",
"SUSE Enterprise Storage 7:bind-devel-9.16.6-150000.12.65.1.aarch64",
"SUSE Enterprise Storage 7:bind-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Enterprise Storage 7:bind-doc-9.16.6-150000.12.65.1.noarch",
"SUSE Enterprise Storage 7:bind-utils-9.16.6-150000.12.65.1.aarch64",
"SUSE Enterprise Storage 7:bind-utils-9.16.6-150000.12.65.1.x86_64",
"SUSE Enterprise Storage 7:libbind9-1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Enterprise Storage 7:libbind9-1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Enterprise Storage 7:libdns1605-9.16.6-150000.12.65.1.aarch64",
"SUSE Enterprise Storage 7:libdns1605-9.16.6-150000.12.65.1.x86_64",
"SUSE Enterprise Storage 7:libirs-devel-9.16.6-150000.12.65.1.aarch64",
"SUSE Enterprise Storage 7:libirs-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Enterprise Storage 7:libirs1601-9.16.6-150000.12.65.1.aarch64",
"SUSE Enterprise Storage 7:libirs1601-9.16.6-150000.12.65.1.x86_64",
"SUSE Enterprise Storage 7:libisc1606-9.16.6-150000.12.65.1.aarch64",
"SUSE Enterprise Storage 7:libisc1606-9.16.6-150000.12.65.1.x86_64",
"SUSE Enterprise Storage 7:libisccc1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Enterprise Storage 7:libisccc1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Enterprise Storage 7:libisccfg1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Enterprise Storage 7:libisccfg1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Enterprise Storage 7:libns1604-9.16.6-150000.12.65.1.aarch64",
"SUSE Enterprise Storage 7:libns1604-9.16.6-150000.12.65.1.x86_64",
"SUSE Enterprise Storage 7:python3-bind-9.16.6-150000.12.65.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:bind-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:bind-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:bind-chrootenv-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:bind-chrootenv-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:bind-devel-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:bind-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:bind-doc-9.16.6-150000.12.65.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:bind-utils-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:bind-utils-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libbind9-1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libbind9-1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libdns1605-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libdns1605-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libirs-devel-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libirs-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libirs1601-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libirs1601-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libisc1606-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libisc1606-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libisccc1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libisccc1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libisccfg1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libisccfg1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libns1604-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libns1604-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:python3-bind-9.16.6-150000.12.65.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:bind-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:bind-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:bind-chrootenv-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:bind-chrootenv-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:bind-devel-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:bind-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:bind-doc-9.16.6-150000.12.65.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:bind-utils-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:bind-utils-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libbind9-1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libbind9-1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libdns1605-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libdns1605-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libirs-devel-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libirs-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libirs1601-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libirs1601-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libisc1606-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libisc1606-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libisccc1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libisccc1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libisccfg1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libisccfg1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libns1604-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libns1604-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:python3-bind-9.16.6-150000.12.65.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-chrootenv-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-chrootenv-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-chrootenv-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-chrootenv-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-devel-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-devel-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-devel-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-doc-9.16.6-150000.12.65.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-utils-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-utils-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-utils-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-utils-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libbind9-1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libbind9-1600-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libbind9-1600-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libbind9-1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libdns1605-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libdns1605-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libdns1605-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libdns1605-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libirs-devel-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libirs-devel-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libirs-devel-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libirs-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libirs1601-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libirs1601-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libirs1601-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libirs1601-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libisc1606-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libisc1606-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libisc1606-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libisc1606-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libisccc1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libisccc1600-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libisccc1600-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libisccc1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libisccfg1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libisccfg1600-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libisccfg1600-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libisccfg1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libns1604-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libns1604-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libns1604-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libns1604-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:python3-bind-9.16.6-150000.12.65.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-chrootenv-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-chrootenv-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-chrootenv-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-chrootenv-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-devel-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-devel-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-devel-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-doc-9.16.6-150000.12.65.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-utils-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-utils-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-utils-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-utils-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libbind9-1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libbind9-1600-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libbind9-1600-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libbind9-1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libdns1605-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libdns1605-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libdns1605-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libdns1605-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libirs-devel-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libirs-devel-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libirs-devel-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libirs-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libirs1601-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libirs1601-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libirs1601-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libirs1601-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libisc1606-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libisc1606-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libisc1606-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libisc1606-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libisccc1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libisccc1600-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libisccc1600-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libisccc1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libisccfg1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libisccfg1600-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libisccfg1600-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libisccfg1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libns1604-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libns1604-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libns1604-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libns1604-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:python3-bind-9.16.6-150000.12.65.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:bind-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:bind-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:bind-chrootenv-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:bind-chrootenv-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:bind-devel-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:bind-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:bind-doc-9.16.6-150000.12.65.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:bind-utils-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:bind-utils-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libbind9-1600-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libbind9-1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libdns1605-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libdns1605-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libirs-devel-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libirs-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libirs1601-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libirs1601-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libisc1606-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libisc1606-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libisccc1600-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libisccc1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libisccfg1600-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libisccfg1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libns1604-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libns1604-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:python3-bind-9.16.6-150000.12.65.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:bind-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:bind-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:bind-chrootenv-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:bind-chrootenv-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:bind-devel-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:bind-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:bind-doc-9.16.6-150000.12.65.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:bind-utils-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:bind-utils-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libbind9-1600-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libbind9-1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libdns1605-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libdns1605-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libirs-devel-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libirs-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libirs1601-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libirs1601-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libisc1606-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libisc1606-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libisccc1600-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libisccc1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libisccfg1600-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libisccfg1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libns1604-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libns1604-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:python3-bind-9.16.6-150000.12.65.1.noarch",
"SUSE Manager Client Tools 15:dracut-saltboot-0.1.1681904360.84ef141-150000.1.50.1.noarch",
"SUSE Manager Client Tools 15:grafana-9.5.1-150000.1.48.5.aarch64",
"SUSE Manager Client Tools 15:grafana-9.5.1-150000.1.48.5.ppc64le",
"SUSE Manager Client Tools 15:grafana-9.5.1-150000.1.48.5.s390x",
"SUSE Manager Client Tools 15:grafana-9.5.1-150000.1.48.5.x86_64",
"SUSE Manager Client Tools 15:mgr-daemon-4.3.7-150000.1.41.1.noarch",
"SUSE Manager Client Tools 15:python3-uyuni-common-libs-4.3.8-150000.1.33.1.aarch64",
"SUSE Manager Client Tools 15:python3-uyuni-common-libs-4.3.8-150000.1.33.1.ppc64le",
"SUSE Manager Client Tools 15:python3-uyuni-common-libs-4.3.8-150000.1.33.1.s390x",
"SUSE Manager Client Tools 15:python3-uyuni-common-libs-4.3.8-150000.1.33.1.x86_64",
"SUSE Manager Client Tools 15:python3-zypp-plugin-spacewalk-1.0.14-150000.3.35.1.noarch",
"SUSE Manager Client Tools 15:spacecmd-4.3.21-150000.3.98.1.noarch",
"SUSE Manager Client Tools 15:zypp-plugin-spacewalk-1.0.14-150000.3.35.1.noarch",
"SUSE Manager Client Tools for SLE Micro 5:bind-utils-9.16.6-150000.12.65.1.aarch64",
"SUSE Manager Client Tools for SLE Micro 5:bind-utils-9.16.6-150000.12.65.1.s390x",
"SUSE Manager Client Tools for SLE Micro 5:bind-utils-9.16.6-150000.12.65.1.x86_64",
"SUSE Manager Client Tools for SLE Micro 5:dracut-saltboot-0.1.1681904360.84ef141-150000.1.50.1.noarch",
"SUSE Manager Client Tools for SLE Micro 5:libbind9-1600-64bit-9.16.6-150000.12.65.1.aarch64_ilp32",
"SUSE Manager Client Tools for SLE Micro 5:libbind9-1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Manager Client Tools for SLE Micro 5:libbind9-1600-9.16.6-150000.12.65.1.s390x",
"SUSE Manager Client Tools for SLE Micro 5:libbind9-1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Manager Client Tools for SLE Micro 5:libdns1605-64bit-9.16.6-150000.12.65.1.aarch64_ilp32",
"SUSE Manager Client Tools for SLE Micro 5:libdns1605-9.16.6-150000.12.65.1.aarch64",
"SUSE Manager Client Tools for SLE Micro 5:libdns1605-9.16.6-150000.12.65.1.s390x",
"SUSE Manager Client Tools for SLE Micro 5:libdns1605-9.16.6-150000.12.65.1.x86_64",
"SUSE Manager Client Tools for SLE Micro 5:libirs1601-64bit-9.16.6-150000.12.65.1.aarch64_ilp32",
"SUSE Manager Client Tools for SLE Micro 5:libirs1601-9.16.6-150000.12.65.1.aarch64",
"SUSE Manager Client Tools for SLE Micro 5:libirs1601-9.16.6-150000.12.65.1.s390x",
"SUSE Manager Client Tools for SLE Micro 5:libirs1601-9.16.6-150000.12.65.1.x86_64",
"SUSE Manager Client Tools for SLE Micro 5:libisc1606-64bit-9.16.6-150000.12.65.1.aarch64_ilp32",
"SUSE Manager Client Tools for SLE Micro 5:libisc1606-9.16.6-150000.12.65.1.aarch64",
"SUSE Manager Client Tools for SLE Micro 5:libisc1606-9.16.6-150000.12.65.1.s390x",
"SUSE Manager Client Tools for SLE Micro 5:libisc1606-9.16.6-150000.12.65.1.x86_64",
"SUSE Manager Client Tools for SLE Micro 5:libisccc1600-64bit-9.16.6-150000.12.65.1.aarch64_ilp32",
"SUSE Manager Client Tools for SLE Micro 5:libisccc1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Manager Client Tools for SLE Micro 5:libisccc1600-9.16.6-150000.12.65.1.s390x",
"SUSE Manager Client Tools for SLE Micro 5:libisccc1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Manager Client Tools for SLE Micro 5:libisccfg1600-64bit-9.16.6-150000.12.65.1.aarch64_ilp32",
"SUSE Manager Client Tools for SLE Micro 5:libisccfg1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Manager Client Tools for SLE Micro 5:libisccfg1600-9.16.6-150000.12.65.1.s390x",
"SUSE Manager Client Tools for SLE Micro 5:libisccfg1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Manager Client Tools for SLE Micro 5:libns1604-9.16.6-150000.12.65.1.s390x",
"SUSE Manager Client Tools for SLE Micro 5:libns1604-9.16.6-150000.12.65.1.x86_64",
"SUSE Manager Client Tools for SLE Micro 5:python3-bind-9.16.6-150000.12.65.1.noarch",
"SUSE Manager Proxy Module 4.2:python3-zypp-plugin-spacewalk-1.0.14-150000.3.35.1.noarch",
"SUSE Manager Proxy Module 4.2:zypp-plugin-spacewalk-1.0.14-150000.3.35.1.noarch",
"SUSE Manager Proxy Module 4.3:python3-zypp-plugin-spacewalk-1.0.14-150000.3.35.1.noarch",
"SUSE Manager Proxy Module 4.3:zypp-plugin-spacewalk-1.0.14-150000.3.35.1.noarch",
"openSUSE Leap 15.4:bind-devel-32bit-9.16.6-150000.12.65.1.x86_64",
"openSUSE Leap 15.4:dracut-saltboot-0.1.1681904360.84ef141-150000.1.50.1.noarch",
"openSUSE Leap 15.4:libbind9-1600-32bit-9.16.6-150000.12.65.1.x86_64",
"openSUSE Leap 15.4:libdns1605-32bit-9.16.6-150000.12.65.1.x86_64",
"openSUSE Leap 15.4:libirs1601-32bit-9.16.6-150000.12.65.1.x86_64",
"openSUSE Leap 15.4:libisc1606-32bit-9.16.6-150000.12.65.1.x86_64",
"openSUSE Leap 15.4:libisccc1600-32bit-9.16.6-150000.12.65.1.x86_64",
"openSUSE Leap 15.4:libisccfg1600-32bit-9.16.6-150000.12.65.1.x86_64",
"openSUSE Leap 15.4:libns1604-32bit-9.16.6-150000.12.65.1.x86_64",
"openSUSE Leap 15.4:spacecmd-4.3.21-150000.3.98.1.noarch",
"openSUSE Leap 15.4:wire-0.5.0-150000.1.12.3.aarch64",
"openSUSE Leap 15.4:wire-0.5.0-150000.1.12.3.ppc64le",
"openSUSE Leap 15.4:wire-0.5.0-150000.1.12.3.s390x",
"openSUSE Leap 15.4:wire-0.5.0-150000.1.12.3.x86_64",
"openSUSE Leap 15.5:dracut-saltboot-0.1.1681904360.84ef141-150000.1.50.1.noarch",
"openSUSE Leap 15.5:spacecmd-4.3.21-150000.3.98.1.noarch",
"openSUSE Leap 15.5:wire-0.5.0-150000.1.12.3.aarch64",
"openSUSE Leap 15.5:wire-0.5.0-150000.1.12.3.ppc64le",
"openSUSE Leap 15.5:wire-0.5.0-150000.1.12.3.s390x",
"openSUSE Leap 15.5:wire-0.5.0-150000.1.12.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.3,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 7:bind-9.16.6-150000.12.65.1.aarch64",
"SUSE Enterprise Storage 7:bind-9.16.6-150000.12.65.1.x86_64",
"SUSE Enterprise Storage 7:bind-chrootenv-9.16.6-150000.12.65.1.aarch64",
"SUSE Enterprise Storage 7:bind-chrootenv-9.16.6-150000.12.65.1.x86_64",
"SUSE Enterprise Storage 7:bind-devel-9.16.6-150000.12.65.1.aarch64",
"SUSE Enterprise Storage 7:bind-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Enterprise Storage 7:bind-doc-9.16.6-150000.12.65.1.noarch",
"SUSE Enterprise Storage 7:bind-utils-9.16.6-150000.12.65.1.aarch64",
"SUSE Enterprise Storage 7:bind-utils-9.16.6-150000.12.65.1.x86_64",
"SUSE Enterprise Storage 7:libbind9-1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Enterprise Storage 7:libbind9-1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Enterprise Storage 7:libdns1605-9.16.6-150000.12.65.1.aarch64",
"SUSE Enterprise Storage 7:libdns1605-9.16.6-150000.12.65.1.x86_64",
"SUSE Enterprise Storage 7:libirs-devel-9.16.6-150000.12.65.1.aarch64",
"SUSE Enterprise Storage 7:libirs-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Enterprise Storage 7:libirs1601-9.16.6-150000.12.65.1.aarch64",
"SUSE Enterprise Storage 7:libirs1601-9.16.6-150000.12.65.1.x86_64",
"SUSE Enterprise Storage 7:libisc1606-9.16.6-150000.12.65.1.aarch64",
"SUSE Enterprise Storage 7:libisc1606-9.16.6-150000.12.65.1.x86_64",
"SUSE Enterprise Storage 7:libisccc1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Enterprise Storage 7:libisccc1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Enterprise Storage 7:libisccfg1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Enterprise Storage 7:libisccfg1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Enterprise Storage 7:libns1604-9.16.6-150000.12.65.1.aarch64",
"SUSE Enterprise Storage 7:libns1604-9.16.6-150000.12.65.1.x86_64",
"SUSE Enterprise Storage 7:python3-bind-9.16.6-150000.12.65.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:bind-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:bind-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:bind-chrootenv-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:bind-chrootenv-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:bind-devel-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:bind-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:bind-doc-9.16.6-150000.12.65.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:bind-utils-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:bind-utils-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libbind9-1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libbind9-1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libdns1605-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libdns1605-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libirs-devel-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libirs-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libirs1601-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libirs1601-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libisc1606-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libisc1606-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libisccc1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libisccc1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libisccfg1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libisccfg1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libns1604-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libns1604-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:python3-bind-9.16.6-150000.12.65.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:bind-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:bind-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:bind-chrootenv-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:bind-chrootenv-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:bind-devel-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:bind-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:bind-doc-9.16.6-150000.12.65.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:bind-utils-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:bind-utils-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libbind9-1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libbind9-1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libdns1605-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libdns1605-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libirs-devel-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libirs-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libirs1601-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libirs1601-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libisc1606-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libisc1606-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libisccc1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libisccc1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libisccfg1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libisccfg1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libns1604-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libns1604-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:python3-bind-9.16.6-150000.12.65.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-chrootenv-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-chrootenv-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-chrootenv-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-chrootenv-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-devel-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-devel-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-devel-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-doc-9.16.6-150000.12.65.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-utils-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-utils-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-utils-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-utils-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libbind9-1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libbind9-1600-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libbind9-1600-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libbind9-1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libdns1605-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libdns1605-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libdns1605-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libdns1605-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libirs-devel-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libirs-devel-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libirs-devel-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libirs-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libirs1601-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libirs1601-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libirs1601-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libirs1601-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libisc1606-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libisc1606-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libisc1606-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libisc1606-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libisccc1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libisccc1600-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libisccc1600-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libisccc1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libisccfg1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libisccfg1600-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libisccfg1600-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libisccfg1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libns1604-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libns1604-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libns1604-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libns1604-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:python3-bind-9.16.6-150000.12.65.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-chrootenv-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-chrootenv-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-chrootenv-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-chrootenv-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-devel-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-devel-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-devel-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-doc-9.16.6-150000.12.65.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-utils-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-utils-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-utils-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-utils-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libbind9-1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libbind9-1600-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libbind9-1600-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libbind9-1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libdns1605-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libdns1605-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libdns1605-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libdns1605-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libirs-devel-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libirs-devel-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libirs-devel-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libirs-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libirs1601-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libirs1601-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libirs1601-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libirs1601-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libisc1606-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libisc1606-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libisc1606-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libisc1606-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libisccc1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libisccc1600-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libisccc1600-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libisccc1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libisccfg1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libisccfg1600-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libisccfg1600-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libisccfg1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libns1604-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libns1604-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libns1604-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libns1604-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:python3-bind-9.16.6-150000.12.65.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:bind-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:bind-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:bind-chrootenv-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:bind-chrootenv-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:bind-devel-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:bind-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:bind-doc-9.16.6-150000.12.65.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:bind-utils-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:bind-utils-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libbind9-1600-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libbind9-1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libdns1605-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libdns1605-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libirs-devel-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libirs-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libirs1601-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libirs1601-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libisc1606-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libisc1606-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libisccc1600-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libisccc1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libisccfg1600-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libisccfg1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libns1604-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libns1604-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:python3-bind-9.16.6-150000.12.65.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:bind-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:bind-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:bind-chrootenv-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:bind-chrootenv-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:bind-devel-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:bind-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:bind-doc-9.16.6-150000.12.65.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:bind-utils-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:bind-utils-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libbind9-1600-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libbind9-1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libdns1605-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libdns1605-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libirs-devel-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libirs-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libirs1601-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libirs1601-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libisc1606-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libisc1606-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libisccc1600-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libisccc1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libisccfg1600-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libisccfg1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libns1604-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libns1604-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:python3-bind-9.16.6-150000.12.65.1.noarch",
"SUSE Manager Client Tools 15:dracut-saltboot-0.1.1681904360.84ef141-150000.1.50.1.noarch",
"SUSE Manager Client Tools 15:grafana-9.5.1-150000.1.48.5.aarch64",
"SUSE Manager Client Tools 15:grafana-9.5.1-150000.1.48.5.ppc64le",
"SUSE Manager Client Tools 15:grafana-9.5.1-150000.1.48.5.s390x",
"SUSE Manager Client Tools 15:grafana-9.5.1-150000.1.48.5.x86_64",
"SUSE Manager Client Tools 15:mgr-daemon-4.3.7-150000.1.41.1.noarch",
"SUSE Manager Client Tools 15:python3-uyuni-common-libs-4.3.8-150000.1.33.1.aarch64",
"SUSE Manager Client Tools 15:python3-uyuni-common-libs-4.3.8-150000.1.33.1.ppc64le",
"SUSE Manager Client Tools 15:python3-uyuni-common-libs-4.3.8-150000.1.33.1.s390x",
"SUSE Manager Client Tools 15:python3-uyuni-common-libs-4.3.8-150000.1.33.1.x86_64",
"SUSE Manager Client Tools 15:python3-zypp-plugin-spacewalk-1.0.14-150000.3.35.1.noarch",
"SUSE Manager Client Tools 15:spacecmd-4.3.21-150000.3.98.1.noarch",
"SUSE Manager Client Tools 15:zypp-plugin-spacewalk-1.0.14-150000.3.35.1.noarch",
"SUSE Manager Client Tools for SLE Micro 5:bind-utils-9.16.6-150000.12.65.1.aarch64",
"SUSE Manager Client Tools for SLE Micro 5:bind-utils-9.16.6-150000.12.65.1.s390x",
"SUSE Manager Client Tools for SLE Micro 5:bind-utils-9.16.6-150000.12.65.1.x86_64",
"SUSE Manager Client Tools for SLE Micro 5:dracut-saltboot-0.1.1681904360.84ef141-150000.1.50.1.noarch",
"SUSE Manager Client Tools for SLE Micro 5:libbind9-1600-64bit-9.16.6-150000.12.65.1.aarch64_ilp32",
"SUSE Manager Client Tools for SLE Micro 5:libbind9-1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Manager Client Tools for SLE Micro 5:libbind9-1600-9.16.6-150000.12.65.1.s390x",
"SUSE Manager Client Tools for SLE Micro 5:libbind9-1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Manager Client Tools for SLE Micro 5:libdns1605-64bit-9.16.6-150000.12.65.1.aarch64_ilp32",
"SUSE Manager Client Tools for SLE Micro 5:libdns1605-9.16.6-150000.12.65.1.aarch64",
"SUSE Manager Client Tools for SLE Micro 5:libdns1605-9.16.6-150000.12.65.1.s390x",
"SUSE Manager Client Tools for SLE Micro 5:libdns1605-9.16.6-150000.12.65.1.x86_64",
"SUSE Manager Client Tools for SLE Micro 5:libirs1601-64bit-9.16.6-150000.12.65.1.aarch64_ilp32",
"SUSE Manager Client Tools for SLE Micro 5:libirs1601-9.16.6-150000.12.65.1.aarch64",
"SUSE Manager Client Tools for SLE Micro 5:libirs1601-9.16.6-150000.12.65.1.s390x",
"SUSE Manager Client Tools for SLE Micro 5:libirs1601-9.16.6-150000.12.65.1.x86_64",
"SUSE Manager Client Tools for SLE Micro 5:libisc1606-64bit-9.16.6-150000.12.65.1.aarch64_ilp32",
"SUSE Manager Client Tools for SLE Micro 5:libisc1606-9.16.6-150000.12.65.1.aarch64",
"SUSE Manager Client Tools for SLE Micro 5:libisc1606-9.16.6-150000.12.65.1.s390x",
"SUSE Manager Client Tools for SLE Micro 5:libisc1606-9.16.6-150000.12.65.1.x86_64",
"SUSE Manager Client Tools for SLE Micro 5:libisccc1600-64bit-9.16.6-150000.12.65.1.aarch64_ilp32",
"SUSE Manager Client Tools for SLE Micro 5:libisccc1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Manager Client Tools for SLE Micro 5:libisccc1600-9.16.6-150000.12.65.1.s390x",
"SUSE Manager Client Tools for SLE Micro 5:libisccc1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Manager Client Tools for SLE Micro 5:libisccfg1600-64bit-9.16.6-150000.12.65.1.aarch64_ilp32",
"SUSE Manager Client Tools for SLE Micro 5:libisccfg1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Manager Client Tools for SLE Micro 5:libisccfg1600-9.16.6-150000.12.65.1.s390x",
"SUSE Manager Client Tools for SLE Micro 5:libisccfg1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Manager Client Tools for SLE Micro 5:libns1604-9.16.6-150000.12.65.1.s390x",
"SUSE Manager Client Tools for SLE Micro 5:libns1604-9.16.6-150000.12.65.1.x86_64",
"SUSE Manager Client Tools for SLE Micro 5:python3-bind-9.16.6-150000.12.65.1.noarch",
"SUSE Manager Proxy Module 4.2:python3-zypp-plugin-spacewalk-1.0.14-150000.3.35.1.noarch",
"SUSE Manager Proxy Module 4.2:zypp-plugin-spacewalk-1.0.14-150000.3.35.1.noarch",
"SUSE Manager Proxy Module 4.3:python3-zypp-plugin-spacewalk-1.0.14-150000.3.35.1.noarch",
"SUSE Manager Proxy Module 4.3:zypp-plugin-spacewalk-1.0.14-150000.3.35.1.noarch",
"openSUSE Leap 15.4:bind-devel-32bit-9.16.6-150000.12.65.1.x86_64",
"openSUSE Leap 15.4:dracut-saltboot-0.1.1681904360.84ef141-150000.1.50.1.noarch",
"openSUSE Leap 15.4:libbind9-1600-32bit-9.16.6-150000.12.65.1.x86_64",
"openSUSE Leap 15.4:libdns1605-32bit-9.16.6-150000.12.65.1.x86_64",
"openSUSE Leap 15.4:libirs1601-32bit-9.16.6-150000.12.65.1.x86_64",
"openSUSE Leap 15.4:libisc1606-32bit-9.16.6-150000.12.65.1.x86_64",
"openSUSE Leap 15.4:libisccc1600-32bit-9.16.6-150000.12.65.1.x86_64",
"openSUSE Leap 15.4:libisccfg1600-32bit-9.16.6-150000.12.65.1.x86_64",
"openSUSE Leap 15.4:libns1604-32bit-9.16.6-150000.12.65.1.x86_64",
"openSUSE Leap 15.4:spacecmd-4.3.21-150000.3.98.1.noarch",
"openSUSE Leap 15.4:wire-0.5.0-150000.1.12.3.aarch64",
"openSUSE Leap 15.4:wire-0.5.0-150000.1.12.3.ppc64le",
"openSUSE Leap 15.4:wire-0.5.0-150000.1.12.3.s390x",
"openSUSE Leap 15.4:wire-0.5.0-150000.1.12.3.x86_64",
"openSUSE Leap 15.5:dracut-saltboot-0.1.1681904360.84ef141-150000.1.50.1.noarch",
"openSUSE Leap 15.5:spacecmd-4.3.21-150000.3.98.1.noarch",
"openSUSE Leap 15.5:wire-0.5.0-150000.1.12.3.aarch64",
"openSUSE Leap 15.5:wire-0.5.0-150000.1.12.3.ppc64le",
"openSUSE Leap 15.5:wire-0.5.0-150000.1.12.3.s390x",
"openSUSE Leap 15.5:wire-0.5.0-150000.1.12.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2023-06-21T11:49:43Z",
"details": "important"
}
],
"title": "CVE-2022-31097"
},
{
"cve": "CVE-2022-31107",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-31107"
}
],
"notes": [
{
"category": "general",
"text": "Grafana is an open-source platform for monitoring and observability. In versions 5.3 until 9.0.3, 8.5.9, 8.4.10, and 8.3.10, it is possible for a malicious user who has authorization to log into a Grafana instance via a configured OAuth IdP which provides a login name to take over the account of another user in that Grafana instance. This can occur when the malicious user is authorized to log in to Grafana via OAuth, the malicious user\u0027s external user id is not already associated with an account in Grafana, the malicious user\u0027s email address is not already associated with an account in Grafana, and the malicious user knows the Grafana username of the target user. If these conditions are met, the malicious user can set their username in the OAuth provider to that of the target user, then go through the OAuth flow to log in to Grafana. Due to the way that external and internal user accounts are linked together during login, if the conditions above are all met then the malicious user will be able to log in to the target user\u0027s Grafana account. Versions 9.0.3, 8.5.9, 8.4.10, and 8.3.10 contain a patch for this issue. As a workaround, concerned users can disable OAuth login to their Grafana instance, or ensure that all users authorized to log in via OAuth have a corresponding user account in Grafana linked to their email address.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 7:bind-9.16.6-150000.12.65.1.aarch64",
"SUSE Enterprise Storage 7:bind-9.16.6-150000.12.65.1.x86_64",
"SUSE Enterprise Storage 7:bind-chrootenv-9.16.6-150000.12.65.1.aarch64",
"SUSE Enterprise Storage 7:bind-chrootenv-9.16.6-150000.12.65.1.x86_64",
"SUSE Enterprise Storage 7:bind-devel-9.16.6-150000.12.65.1.aarch64",
"SUSE Enterprise Storage 7:bind-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Enterprise Storage 7:bind-doc-9.16.6-150000.12.65.1.noarch",
"SUSE Enterprise Storage 7:bind-utils-9.16.6-150000.12.65.1.aarch64",
"SUSE Enterprise Storage 7:bind-utils-9.16.6-150000.12.65.1.x86_64",
"SUSE Enterprise Storage 7:libbind9-1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Enterprise Storage 7:libbind9-1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Enterprise Storage 7:libdns1605-9.16.6-150000.12.65.1.aarch64",
"SUSE Enterprise Storage 7:libdns1605-9.16.6-150000.12.65.1.x86_64",
"SUSE Enterprise Storage 7:libirs-devel-9.16.6-150000.12.65.1.aarch64",
"SUSE Enterprise Storage 7:libirs-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Enterprise Storage 7:libirs1601-9.16.6-150000.12.65.1.aarch64",
"SUSE Enterprise Storage 7:libirs1601-9.16.6-150000.12.65.1.x86_64",
"SUSE Enterprise Storage 7:libisc1606-9.16.6-150000.12.65.1.aarch64",
"SUSE Enterprise Storage 7:libisc1606-9.16.6-150000.12.65.1.x86_64",
"SUSE Enterprise Storage 7:libisccc1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Enterprise Storage 7:libisccc1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Enterprise Storage 7:libisccfg1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Enterprise Storage 7:libisccfg1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Enterprise Storage 7:libns1604-9.16.6-150000.12.65.1.aarch64",
"SUSE Enterprise Storage 7:libns1604-9.16.6-150000.12.65.1.x86_64",
"SUSE Enterprise Storage 7:python3-bind-9.16.6-150000.12.65.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:bind-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:bind-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:bind-chrootenv-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:bind-chrootenv-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:bind-devel-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:bind-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:bind-doc-9.16.6-150000.12.65.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:bind-utils-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:bind-utils-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libbind9-1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libbind9-1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libdns1605-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libdns1605-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libirs-devel-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libirs-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libirs1601-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libirs1601-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libisc1606-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libisc1606-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libisccc1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libisccc1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libisccfg1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libisccfg1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libns1604-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libns1604-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:python3-bind-9.16.6-150000.12.65.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:bind-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:bind-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:bind-chrootenv-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:bind-chrootenv-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:bind-devel-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:bind-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:bind-doc-9.16.6-150000.12.65.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:bind-utils-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:bind-utils-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libbind9-1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libbind9-1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libdns1605-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libdns1605-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libirs-devel-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libirs-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libirs1601-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libirs1601-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libisc1606-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libisc1606-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libisccc1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libisccc1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libisccfg1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libisccfg1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libns1604-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libns1604-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:python3-bind-9.16.6-150000.12.65.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-chrootenv-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-chrootenv-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-chrootenv-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-chrootenv-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-devel-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-devel-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-devel-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-doc-9.16.6-150000.12.65.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-utils-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-utils-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-utils-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-utils-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libbind9-1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libbind9-1600-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libbind9-1600-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libbind9-1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libdns1605-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libdns1605-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libdns1605-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libdns1605-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libirs-devel-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libirs-devel-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libirs-devel-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libirs-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libirs1601-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libirs1601-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libirs1601-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libirs1601-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libisc1606-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libisc1606-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libisc1606-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libisc1606-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libisccc1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libisccc1600-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libisccc1600-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libisccc1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libisccfg1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libisccfg1600-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libisccfg1600-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libisccfg1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libns1604-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libns1604-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libns1604-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libns1604-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:python3-bind-9.16.6-150000.12.65.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-chrootenv-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-chrootenv-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-chrootenv-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-chrootenv-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-devel-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-devel-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-devel-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-doc-9.16.6-150000.12.65.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-utils-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-utils-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-utils-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-utils-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libbind9-1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libbind9-1600-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libbind9-1600-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libbind9-1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libdns1605-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libdns1605-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libdns1605-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libdns1605-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libirs-devel-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libirs-devel-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libirs-devel-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libirs-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libirs1601-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libirs1601-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libirs1601-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libirs1601-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libisc1606-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libisc1606-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libisc1606-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libisc1606-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libisccc1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libisccc1600-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libisccc1600-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libisccc1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libisccfg1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libisccfg1600-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libisccfg1600-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libisccfg1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libns1604-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libns1604-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libns1604-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libns1604-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:python3-bind-9.16.6-150000.12.65.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:bind-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:bind-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:bind-chrootenv-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:bind-chrootenv-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:bind-devel-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:bind-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:bind-doc-9.16.6-150000.12.65.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:bind-utils-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:bind-utils-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libbind9-1600-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libbind9-1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libdns1605-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libdns1605-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libirs-devel-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libirs-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libirs1601-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libirs1601-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libisc1606-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libisc1606-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libisccc1600-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libisccc1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libisccfg1600-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libisccfg1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libns1604-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libns1604-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:python3-bind-9.16.6-150000.12.65.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:bind-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:bind-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:bind-chrootenv-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:bind-chrootenv-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:bind-devel-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:bind-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:bind-doc-9.16.6-150000.12.65.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:bind-utils-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:bind-utils-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libbind9-1600-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libbind9-1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libdns1605-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libdns1605-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libirs-devel-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libirs-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libirs1601-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libirs1601-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libisc1606-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libisc1606-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libisccc1600-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libisccc1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libisccfg1600-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libisccfg1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libns1604-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libns1604-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:python3-bind-9.16.6-150000.12.65.1.noarch",
"SUSE Manager Client Tools 15:dracut-saltboot-0.1.1681904360.84ef141-150000.1.50.1.noarch",
"SUSE Manager Client Tools 15:grafana-9.5.1-150000.1.48.5.aarch64",
"SUSE Manager Client Tools 15:grafana-9.5.1-150000.1.48.5.ppc64le",
"SUSE Manager Client Tools 15:grafana-9.5.1-150000.1.48.5.s390x",
"SUSE Manager Client Tools 15:grafana-9.5.1-150000.1.48.5.x86_64",
"SUSE Manager Client Tools 15:mgr-daemon-4.3.7-150000.1.41.1.noarch",
"SUSE Manager Client Tools 15:python3-uyuni-common-libs-4.3.8-150000.1.33.1.aarch64",
"SUSE Manager Client Tools 15:python3-uyuni-common-libs-4.3.8-150000.1.33.1.ppc64le",
"SUSE Manager Client Tools 15:python3-uyuni-common-libs-4.3.8-150000.1.33.1.s390x",
"SUSE Manager Client Tools 15:python3-uyuni-common-libs-4.3.8-150000.1.33.1.x86_64",
"SUSE Manager Client Tools 15:python3-zypp-plugin-spacewalk-1.0.14-150000.3.35.1.noarch",
"SUSE Manager Client Tools 15:spacecmd-4.3.21-150000.3.98.1.noarch",
"SUSE Manager Client Tools 15:zypp-plugin-spacewalk-1.0.14-150000.3.35.1.noarch",
"SUSE Manager Client Tools for SLE Micro 5:bind-utils-9.16.6-150000.12.65.1.aarch64",
"SUSE Manager Client Tools for SLE Micro 5:bind-utils-9.16.6-150000.12.65.1.s390x",
"SUSE Manager Client Tools for SLE Micro 5:bind-utils-9.16.6-150000.12.65.1.x86_64",
"SUSE Manager Client Tools for SLE Micro 5:dracut-saltboot-0.1.1681904360.84ef141-150000.1.50.1.noarch",
"SUSE Manager Client Tools for SLE Micro 5:libbind9-1600-64bit-9.16.6-150000.12.65.1.aarch64_ilp32",
"SUSE Manager Client Tools for SLE Micro 5:libbind9-1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Manager Client Tools for SLE Micro 5:libbind9-1600-9.16.6-150000.12.65.1.s390x",
"SUSE Manager Client Tools for SLE Micro 5:libbind9-1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Manager Client Tools for SLE Micro 5:libdns1605-64bit-9.16.6-150000.12.65.1.aarch64_ilp32",
"SUSE Manager Client Tools for SLE Micro 5:libdns1605-9.16.6-150000.12.65.1.aarch64",
"SUSE Manager Client Tools for SLE Micro 5:libdns1605-9.16.6-150000.12.65.1.s390x",
"SUSE Manager Client Tools for SLE Micro 5:libdns1605-9.16.6-150000.12.65.1.x86_64",
"SUSE Manager Client Tools for SLE Micro 5:libirs1601-64bit-9.16.6-150000.12.65.1.aarch64_ilp32",
"SUSE Manager Client Tools for SLE Micro 5:libirs1601-9.16.6-150000.12.65.1.aarch64",
"SUSE Manager Client Tools for SLE Micro 5:libirs1601-9.16.6-150000.12.65.1.s390x",
"SUSE Manager Client Tools for SLE Micro 5:libirs1601-9.16.6-150000.12.65.1.x86_64",
"SUSE Manager Client Tools for SLE Micro 5:libisc1606-64bit-9.16.6-150000.12.65.1.aarch64_ilp32",
"SUSE Manager Client Tools for SLE Micro 5:libisc1606-9.16.6-150000.12.65.1.aarch64",
"SUSE Manager Client Tools for SLE Micro 5:libisc1606-9.16.6-150000.12.65.1.s390x",
"SUSE Manager Client Tools for SLE Micro 5:libisc1606-9.16.6-150000.12.65.1.x86_64",
"SUSE Manager Client Tools for SLE Micro 5:libisccc1600-64bit-9.16.6-150000.12.65.1.aarch64_ilp32",
"SUSE Manager Client Tools for SLE Micro 5:libisccc1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Manager Client Tools for SLE Micro 5:libisccc1600-9.16.6-150000.12.65.1.s390x",
"SUSE Manager Client Tools for SLE Micro 5:libisccc1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Manager Client Tools for SLE Micro 5:libisccfg1600-64bit-9.16.6-150000.12.65.1.aarch64_ilp32",
"SUSE Manager Client Tools for SLE Micro 5:libisccfg1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Manager Client Tools for SLE Micro 5:libisccfg1600-9.16.6-150000.12.65.1.s390x",
"SUSE Manager Client Tools for SLE Micro 5:libisccfg1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Manager Client Tools for SLE Micro 5:libns1604-9.16.6-150000.12.65.1.s390x",
"SUSE Manager Client Tools for SLE Micro 5:libns1604-9.16.6-150000.12.65.1.x86_64",
"SUSE Manager Client Tools for SLE Micro 5:python3-bind-9.16.6-150000.12.65.1.noarch",
"SUSE Manager Proxy Module 4.2:python3-zypp-plugin-spacewalk-1.0.14-150000.3.35.1.noarch",
"SUSE Manager Proxy Module 4.2:zypp-plugin-spacewalk-1.0.14-150000.3.35.1.noarch",
"SUSE Manager Proxy Module 4.3:python3-zypp-plugin-spacewalk-1.0.14-150000.3.35.1.noarch",
"SUSE Manager Proxy Module 4.3:zypp-plugin-spacewalk-1.0.14-150000.3.35.1.noarch",
"openSUSE Leap 15.4:bind-devel-32bit-9.16.6-150000.12.65.1.x86_64",
"openSUSE Leap 15.4:dracut-saltboot-0.1.1681904360.84ef141-150000.1.50.1.noarch",
"openSUSE Leap 15.4:libbind9-1600-32bit-9.16.6-150000.12.65.1.x86_64",
"openSUSE Leap 15.4:libdns1605-32bit-9.16.6-150000.12.65.1.x86_64",
"openSUSE Leap 15.4:libirs1601-32bit-9.16.6-150000.12.65.1.x86_64",
"openSUSE Leap 15.4:libisc1606-32bit-9.16.6-150000.12.65.1.x86_64",
"openSUSE Leap 15.4:libisccc1600-32bit-9.16.6-150000.12.65.1.x86_64",
"openSUSE Leap 15.4:libisccfg1600-32bit-9.16.6-150000.12.65.1.x86_64",
"openSUSE Leap 15.4:libns1604-32bit-9.16.6-150000.12.65.1.x86_64",
"openSUSE Leap 15.4:spacecmd-4.3.21-150000.3.98.1.noarch",
"openSUSE Leap 15.4:wire-0.5.0-150000.1.12.3.aarch64",
"openSUSE Leap 15.4:wire-0.5.0-150000.1.12.3.ppc64le",
"openSUSE Leap 15.4:wire-0.5.0-150000.1.12.3.s390x",
"openSUSE Leap 15.4:wire-0.5.0-150000.1.12.3.x86_64",
"openSUSE Leap 15.5:dracut-saltboot-0.1.1681904360.84ef141-150000.1.50.1.noarch",
"openSUSE Leap 15.5:spacecmd-4.3.21-150000.3.98.1.noarch",
"openSUSE Leap 15.5:wire-0.5.0-150000.1.12.3.aarch64",
"openSUSE Leap 15.5:wire-0.5.0-150000.1.12.3.ppc64le",
"openSUSE Leap 15.5:wire-0.5.0-150000.1.12.3.s390x",
"openSUSE Leap 15.5:wire-0.5.0-150000.1.12.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-31107",
"url": "https://www.suse.com/security/cve/CVE-2022-31107"
},
{
"category": "external",
"summary": "SUSE Bug 1201539 for CVE-2022-31107",
"url": "https://bugzilla.suse.com/1201539"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 7:bind-9.16.6-150000.12.65.1.aarch64",
"SUSE Enterprise Storage 7:bind-9.16.6-150000.12.65.1.x86_64",
"SUSE Enterprise Storage 7:bind-chrootenv-9.16.6-150000.12.65.1.aarch64",
"SUSE Enterprise Storage 7:bind-chrootenv-9.16.6-150000.12.65.1.x86_64",
"SUSE Enterprise Storage 7:bind-devel-9.16.6-150000.12.65.1.aarch64",
"SUSE Enterprise Storage 7:bind-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Enterprise Storage 7:bind-doc-9.16.6-150000.12.65.1.noarch",
"SUSE Enterprise Storage 7:bind-utils-9.16.6-150000.12.65.1.aarch64",
"SUSE Enterprise Storage 7:bind-utils-9.16.6-150000.12.65.1.x86_64",
"SUSE Enterprise Storage 7:libbind9-1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Enterprise Storage 7:libbind9-1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Enterprise Storage 7:libdns1605-9.16.6-150000.12.65.1.aarch64",
"SUSE Enterprise Storage 7:libdns1605-9.16.6-150000.12.65.1.x86_64",
"SUSE Enterprise Storage 7:libirs-devel-9.16.6-150000.12.65.1.aarch64",
"SUSE Enterprise Storage 7:libirs-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Enterprise Storage 7:libirs1601-9.16.6-150000.12.65.1.aarch64",
"SUSE Enterprise Storage 7:libirs1601-9.16.6-150000.12.65.1.x86_64",
"SUSE Enterprise Storage 7:libisc1606-9.16.6-150000.12.65.1.aarch64",
"SUSE Enterprise Storage 7:libisc1606-9.16.6-150000.12.65.1.x86_64",
"SUSE Enterprise Storage 7:libisccc1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Enterprise Storage 7:libisccc1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Enterprise Storage 7:libisccfg1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Enterprise Storage 7:libisccfg1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Enterprise Storage 7:libns1604-9.16.6-150000.12.65.1.aarch64",
"SUSE Enterprise Storage 7:libns1604-9.16.6-150000.12.65.1.x86_64",
"SUSE Enterprise Storage 7:python3-bind-9.16.6-150000.12.65.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:bind-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:bind-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:bind-chrootenv-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:bind-chrootenv-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:bind-devel-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:bind-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:bind-doc-9.16.6-150000.12.65.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:bind-utils-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:bind-utils-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libbind9-1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libbind9-1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libdns1605-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libdns1605-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libirs-devel-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libirs-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libirs1601-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libirs1601-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libisc1606-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libisc1606-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libisccc1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libisccc1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libisccfg1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libisccfg1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libns1604-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libns1604-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:python3-bind-9.16.6-150000.12.65.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:bind-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:bind-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:bind-chrootenv-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:bind-chrootenv-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:bind-devel-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:bind-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:bind-doc-9.16.6-150000.12.65.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:bind-utils-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:bind-utils-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libbind9-1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libbind9-1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libdns1605-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libdns1605-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libirs-devel-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libirs-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libirs1601-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libirs1601-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libisc1606-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libisc1606-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libisccc1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libisccc1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libisccfg1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libisccfg1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libns1604-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libns1604-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:python3-bind-9.16.6-150000.12.65.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-chrootenv-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-chrootenv-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-chrootenv-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-chrootenv-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-devel-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-devel-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-devel-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-doc-9.16.6-150000.12.65.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-utils-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-utils-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-utils-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-utils-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libbind9-1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libbind9-1600-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libbind9-1600-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libbind9-1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libdns1605-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libdns1605-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libdns1605-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libdns1605-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libirs-devel-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libirs-devel-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libirs-devel-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libirs-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libirs1601-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libirs1601-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libirs1601-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libirs1601-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libisc1606-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libisc1606-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libisc1606-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libisc1606-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libisccc1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libisccc1600-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libisccc1600-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libisccc1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libisccfg1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libisccfg1600-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libisccfg1600-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libisccfg1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libns1604-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libns1604-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libns1604-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libns1604-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:python3-bind-9.16.6-150000.12.65.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-chrootenv-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-chrootenv-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-chrootenv-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-chrootenv-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-devel-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-devel-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-devel-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-doc-9.16.6-150000.12.65.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-utils-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-utils-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-utils-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-utils-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libbind9-1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libbind9-1600-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libbind9-1600-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libbind9-1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libdns1605-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libdns1605-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libdns1605-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libdns1605-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libirs-devel-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libirs-devel-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libirs-devel-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libirs-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libirs1601-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libirs1601-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libirs1601-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libirs1601-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libisc1606-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libisc1606-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libisc1606-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libisc1606-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libisccc1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libisccc1600-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libisccc1600-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libisccc1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libisccfg1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libisccfg1600-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libisccfg1600-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libisccfg1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libns1604-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libns1604-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libns1604-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libns1604-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:python3-bind-9.16.6-150000.12.65.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:bind-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:bind-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:bind-chrootenv-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:bind-chrootenv-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:bind-devel-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:bind-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:bind-doc-9.16.6-150000.12.65.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:bind-utils-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:bind-utils-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libbind9-1600-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libbind9-1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libdns1605-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libdns1605-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libirs-devel-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libirs-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libirs1601-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libirs1601-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libisc1606-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libisc1606-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libisccc1600-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libisccc1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libisccfg1600-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libisccfg1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libns1604-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libns1604-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:python3-bind-9.16.6-150000.12.65.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:bind-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:bind-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:bind-chrootenv-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:bind-chrootenv-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:bind-devel-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:bind-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:bind-doc-9.16.6-150000.12.65.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:bind-utils-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:bind-utils-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libbind9-1600-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libbind9-1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libdns1605-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libdns1605-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libirs-devel-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libirs-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libirs1601-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libirs1601-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libisc1606-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libisc1606-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libisccc1600-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libisccc1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libisccfg1600-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libisccfg1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libns1604-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libns1604-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:python3-bind-9.16.6-150000.12.65.1.noarch",
"SUSE Manager Client Tools 15:dracut-saltboot-0.1.1681904360.84ef141-150000.1.50.1.noarch",
"SUSE Manager Client Tools 15:grafana-9.5.1-150000.1.48.5.aarch64",
"SUSE Manager Client Tools 15:grafana-9.5.1-150000.1.48.5.ppc64le",
"SUSE Manager Client Tools 15:grafana-9.5.1-150000.1.48.5.s390x",
"SUSE Manager Client Tools 15:grafana-9.5.1-150000.1.48.5.x86_64",
"SUSE Manager Client Tools 15:mgr-daemon-4.3.7-150000.1.41.1.noarch",
"SUSE Manager Client Tools 15:python3-uyuni-common-libs-4.3.8-150000.1.33.1.aarch64",
"SUSE Manager Client Tools 15:python3-uyuni-common-libs-4.3.8-150000.1.33.1.ppc64le",
"SUSE Manager Client Tools 15:python3-uyuni-common-libs-4.3.8-150000.1.33.1.s390x",
"SUSE Manager Client Tools 15:python3-uyuni-common-libs-4.3.8-150000.1.33.1.x86_64",
"SUSE Manager Client Tools 15:python3-zypp-plugin-spacewalk-1.0.14-150000.3.35.1.noarch",
"SUSE Manager Client Tools 15:spacecmd-4.3.21-150000.3.98.1.noarch",
"SUSE Manager Client Tools 15:zypp-plugin-spacewalk-1.0.14-150000.3.35.1.noarch",
"SUSE Manager Client Tools for SLE Micro 5:bind-utils-9.16.6-150000.12.65.1.aarch64",
"SUSE Manager Client Tools for SLE Micro 5:bind-utils-9.16.6-150000.12.65.1.s390x",
"SUSE Manager Client Tools for SLE Micro 5:bind-utils-9.16.6-150000.12.65.1.x86_64",
"SUSE Manager Client Tools for SLE Micro 5:dracut-saltboot-0.1.1681904360.84ef141-150000.1.50.1.noarch",
"SUSE Manager Client Tools for SLE Micro 5:libbind9-1600-64bit-9.16.6-150000.12.65.1.aarch64_ilp32",
"SUSE Manager Client Tools for SLE Micro 5:libbind9-1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Manager Client Tools for SLE Micro 5:libbind9-1600-9.16.6-150000.12.65.1.s390x",
"SUSE Manager Client Tools for SLE Micro 5:libbind9-1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Manager Client Tools for SLE Micro 5:libdns1605-64bit-9.16.6-150000.12.65.1.aarch64_ilp32",
"SUSE Manager Client Tools for SLE Micro 5:libdns1605-9.16.6-150000.12.65.1.aarch64",
"SUSE Manager Client Tools for SLE Micro 5:libdns1605-9.16.6-150000.12.65.1.s390x",
"SUSE Manager Client Tools for SLE Micro 5:libdns1605-9.16.6-150000.12.65.1.x86_64",
"SUSE Manager Client Tools for SLE Micro 5:libirs1601-64bit-9.16.6-150000.12.65.1.aarch64_ilp32",
"SUSE Manager Client Tools for SLE Micro 5:libirs1601-9.16.6-150000.12.65.1.aarch64",
"SUSE Manager Client Tools for SLE Micro 5:libirs1601-9.16.6-150000.12.65.1.s390x",
"SUSE Manager Client Tools for SLE Micro 5:libirs1601-9.16.6-150000.12.65.1.x86_64",
"SUSE Manager Client Tools for SLE Micro 5:libisc1606-64bit-9.16.6-150000.12.65.1.aarch64_ilp32",
"SUSE Manager Client Tools for SLE Micro 5:libisc1606-9.16.6-150000.12.65.1.aarch64",
"SUSE Manager Client Tools for SLE Micro 5:libisc1606-9.16.6-150000.12.65.1.s390x",
"SUSE Manager Client Tools for SLE Micro 5:libisc1606-9.16.6-150000.12.65.1.x86_64",
"SUSE Manager Client Tools for SLE Micro 5:libisccc1600-64bit-9.16.6-150000.12.65.1.aarch64_ilp32",
"SUSE Manager Client Tools for SLE Micro 5:libisccc1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Manager Client Tools for SLE Micro 5:libisccc1600-9.16.6-150000.12.65.1.s390x",
"SUSE Manager Client Tools for SLE Micro 5:libisccc1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Manager Client Tools for SLE Micro 5:libisccfg1600-64bit-9.16.6-150000.12.65.1.aarch64_ilp32",
"SUSE Manager Client Tools for SLE Micro 5:libisccfg1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Manager Client Tools for SLE Micro 5:libisccfg1600-9.16.6-150000.12.65.1.s390x",
"SUSE Manager Client Tools for SLE Micro 5:libisccfg1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Manager Client Tools for SLE Micro 5:libns1604-9.16.6-150000.12.65.1.s390x",
"SUSE Manager Client Tools for SLE Micro 5:libns1604-9.16.6-150000.12.65.1.x86_64",
"SUSE Manager Client Tools for SLE Micro 5:python3-bind-9.16.6-150000.12.65.1.noarch",
"SUSE Manager Proxy Module 4.2:python3-zypp-plugin-spacewalk-1.0.14-150000.3.35.1.noarch",
"SUSE Manager Proxy Module 4.2:zypp-plugin-spacewalk-1.0.14-150000.3.35.1.noarch",
"SUSE Manager Proxy Module 4.3:python3-zypp-plugin-spacewalk-1.0.14-150000.3.35.1.noarch",
"SUSE Manager Proxy Module 4.3:zypp-plugin-spacewalk-1.0.14-150000.3.35.1.noarch",
"openSUSE Leap 15.4:bind-devel-32bit-9.16.6-150000.12.65.1.x86_64",
"openSUSE Leap 15.4:dracut-saltboot-0.1.1681904360.84ef141-150000.1.50.1.noarch",
"openSUSE Leap 15.4:libbind9-1600-32bit-9.16.6-150000.12.65.1.x86_64",
"openSUSE Leap 15.4:libdns1605-32bit-9.16.6-150000.12.65.1.x86_64",
"openSUSE Leap 15.4:libirs1601-32bit-9.16.6-150000.12.65.1.x86_64",
"openSUSE Leap 15.4:libisc1606-32bit-9.16.6-150000.12.65.1.x86_64",
"openSUSE Leap 15.4:libisccc1600-32bit-9.16.6-150000.12.65.1.x86_64",
"openSUSE Leap 15.4:libisccfg1600-32bit-9.16.6-150000.12.65.1.x86_64",
"openSUSE Leap 15.4:libns1604-32bit-9.16.6-150000.12.65.1.x86_64",
"openSUSE Leap 15.4:spacecmd-4.3.21-150000.3.98.1.noarch",
"openSUSE Leap 15.4:wire-0.5.0-150000.1.12.3.aarch64",
"openSUSE Leap 15.4:wire-0.5.0-150000.1.12.3.ppc64le",
"openSUSE Leap 15.4:wire-0.5.0-150000.1.12.3.s390x",
"openSUSE Leap 15.4:wire-0.5.0-150000.1.12.3.x86_64",
"openSUSE Leap 15.5:dracut-saltboot-0.1.1681904360.84ef141-150000.1.50.1.noarch",
"openSUSE Leap 15.5:spacecmd-4.3.21-150000.3.98.1.noarch",
"openSUSE Leap 15.5:wire-0.5.0-150000.1.12.3.aarch64",
"openSUSE Leap 15.5:wire-0.5.0-150000.1.12.3.ppc64le",
"openSUSE Leap 15.5:wire-0.5.0-150000.1.12.3.s390x",
"openSUSE Leap 15.5:wire-0.5.0-150000.1.12.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:L",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 7:bind-9.16.6-150000.12.65.1.aarch64",
"SUSE Enterprise Storage 7:bind-9.16.6-150000.12.65.1.x86_64",
"SUSE Enterprise Storage 7:bind-chrootenv-9.16.6-150000.12.65.1.aarch64",
"SUSE Enterprise Storage 7:bind-chrootenv-9.16.6-150000.12.65.1.x86_64",
"SUSE Enterprise Storage 7:bind-devel-9.16.6-150000.12.65.1.aarch64",
"SUSE Enterprise Storage 7:bind-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Enterprise Storage 7:bind-doc-9.16.6-150000.12.65.1.noarch",
"SUSE Enterprise Storage 7:bind-utils-9.16.6-150000.12.65.1.aarch64",
"SUSE Enterprise Storage 7:bind-utils-9.16.6-150000.12.65.1.x86_64",
"SUSE Enterprise Storage 7:libbind9-1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Enterprise Storage 7:libbind9-1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Enterprise Storage 7:libdns1605-9.16.6-150000.12.65.1.aarch64",
"SUSE Enterprise Storage 7:libdns1605-9.16.6-150000.12.65.1.x86_64",
"SUSE Enterprise Storage 7:libirs-devel-9.16.6-150000.12.65.1.aarch64",
"SUSE Enterprise Storage 7:libirs-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Enterprise Storage 7:libirs1601-9.16.6-150000.12.65.1.aarch64",
"SUSE Enterprise Storage 7:libirs1601-9.16.6-150000.12.65.1.x86_64",
"SUSE Enterprise Storage 7:libisc1606-9.16.6-150000.12.65.1.aarch64",
"SUSE Enterprise Storage 7:libisc1606-9.16.6-150000.12.65.1.x86_64",
"SUSE Enterprise Storage 7:libisccc1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Enterprise Storage 7:libisccc1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Enterprise Storage 7:libisccfg1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Enterprise Storage 7:libisccfg1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Enterprise Storage 7:libns1604-9.16.6-150000.12.65.1.aarch64",
"SUSE Enterprise Storage 7:libns1604-9.16.6-150000.12.65.1.x86_64",
"SUSE Enterprise Storage 7:python3-bind-9.16.6-150000.12.65.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:bind-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:bind-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:bind-chrootenv-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:bind-chrootenv-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:bind-devel-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:bind-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:bind-doc-9.16.6-150000.12.65.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:bind-utils-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:bind-utils-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libbind9-1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libbind9-1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libdns1605-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libdns1605-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libirs-devel-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libirs-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libirs1601-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libirs1601-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libisc1606-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libisc1606-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libisccc1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libisccc1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libisccfg1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libisccfg1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libns1604-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libns1604-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:python3-bind-9.16.6-150000.12.65.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:bind-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:bind-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:bind-chrootenv-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:bind-chrootenv-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:bind-devel-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:bind-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:bind-doc-9.16.6-150000.12.65.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:bind-utils-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:bind-utils-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libbind9-1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libbind9-1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libdns1605-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libdns1605-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libirs-devel-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libirs-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libirs1601-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libirs1601-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libisc1606-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libisc1606-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libisccc1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libisccc1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libisccfg1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libisccfg1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libns1604-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libns1604-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:python3-bind-9.16.6-150000.12.65.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-chrootenv-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-chrootenv-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-chrootenv-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-chrootenv-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-devel-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-devel-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-devel-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-doc-9.16.6-150000.12.65.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-utils-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-utils-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-utils-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-utils-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libbind9-1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libbind9-1600-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libbind9-1600-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libbind9-1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libdns1605-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libdns1605-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libdns1605-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libdns1605-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libirs-devel-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libirs-devel-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libirs-devel-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libirs-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libirs1601-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libirs1601-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libirs1601-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libirs1601-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libisc1606-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libisc1606-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libisc1606-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libisc1606-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libisccc1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libisccc1600-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libisccc1600-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libisccc1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libisccfg1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libisccfg1600-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libisccfg1600-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libisccfg1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libns1604-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libns1604-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libns1604-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libns1604-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:python3-bind-9.16.6-150000.12.65.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-chrootenv-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-chrootenv-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-chrootenv-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-chrootenv-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-devel-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-devel-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-devel-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-doc-9.16.6-150000.12.65.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-utils-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-utils-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-utils-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-utils-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libbind9-1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libbind9-1600-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libbind9-1600-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libbind9-1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libdns1605-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libdns1605-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libdns1605-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libdns1605-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libirs-devel-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libirs-devel-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libirs-devel-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libirs-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libirs1601-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libirs1601-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libirs1601-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libirs1601-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libisc1606-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libisc1606-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libisc1606-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libisc1606-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libisccc1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libisccc1600-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libisccc1600-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libisccc1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libisccfg1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libisccfg1600-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libisccfg1600-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libisccfg1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libns1604-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libns1604-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libns1604-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libns1604-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:python3-bind-9.16.6-150000.12.65.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:bind-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:bind-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:bind-chrootenv-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:bind-chrootenv-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:bind-devel-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:bind-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:bind-doc-9.16.6-150000.12.65.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:bind-utils-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:bind-utils-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libbind9-1600-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libbind9-1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libdns1605-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libdns1605-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libirs-devel-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libirs-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libirs1601-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libirs1601-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libisc1606-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libisc1606-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libisccc1600-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libisccc1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libisccfg1600-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libisccfg1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libns1604-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libns1604-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:python3-bind-9.16.6-150000.12.65.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:bind-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:bind-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:bind-chrootenv-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:bind-chrootenv-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:bind-devel-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:bind-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:bind-doc-9.16.6-150000.12.65.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:bind-utils-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:bind-utils-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libbind9-1600-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libbind9-1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libdns1605-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libdns1605-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libirs-devel-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libirs-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libirs1601-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libirs1601-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libisc1606-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libisc1606-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libisccc1600-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libisccc1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libisccfg1600-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libisccfg1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libns1604-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libns1604-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:python3-bind-9.16.6-150000.12.65.1.noarch",
"SUSE Manager Client Tools 15:dracut-saltboot-0.1.1681904360.84ef141-150000.1.50.1.noarch",
"SUSE Manager Client Tools 15:grafana-9.5.1-150000.1.48.5.aarch64",
"SUSE Manager Client Tools 15:grafana-9.5.1-150000.1.48.5.ppc64le",
"SUSE Manager Client Tools 15:grafana-9.5.1-150000.1.48.5.s390x",
"SUSE Manager Client Tools 15:grafana-9.5.1-150000.1.48.5.x86_64",
"SUSE Manager Client Tools 15:mgr-daemon-4.3.7-150000.1.41.1.noarch",
"SUSE Manager Client Tools 15:python3-uyuni-common-libs-4.3.8-150000.1.33.1.aarch64",
"SUSE Manager Client Tools 15:python3-uyuni-common-libs-4.3.8-150000.1.33.1.ppc64le",
"SUSE Manager Client Tools 15:python3-uyuni-common-libs-4.3.8-150000.1.33.1.s390x",
"SUSE Manager Client Tools 15:python3-uyuni-common-libs-4.3.8-150000.1.33.1.x86_64",
"SUSE Manager Client Tools 15:python3-zypp-plugin-spacewalk-1.0.14-150000.3.35.1.noarch",
"SUSE Manager Client Tools 15:spacecmd-4.3.21-150000.3.98.1.noarch",
"SUSE Manager Client Tools 15:zypp-plugin-spacewalk-1.0.14-150000.3.35.1.noarch",
"SUSE Manager Client Tools for SLE Micro 5:bind-utils-9.16.6-150000.12.65.1.aarch64",
"SUSE Manager Client Tools for SLE Micro 5:bind-utils-9.16.6-150000.12.65.1.s390x",
"SUSE Manager Client Tools for SLE Micro 5:bind-utils-9.16.6-150000.12.65.1.x86_64",
"SUSE Manager Client Tools for SLE Micro 5:dracut-saltboot-0.1.1681904360.84ef141-150000.1.50.1.noarch",
"SUSE Manager Client Tools for SLE Micro 5:libbind9-1600-64bit-9.16.6-150000.12.65.1.aarch64_ilp32",
"SUSE Manager Client Tools for SLE Micro 5:libbind9-1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Manager Client Tools for SLE Micro 5:libbind9-1600-9.16.6-150000.12.65.1.s390x",
"SUSE Manager Client Tools for SLE Micro 5:libbind9-1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Manager Client Tools for SLE Micro 5:libdns1605-64bit-9.16.6-150000.12.65.1.aarch64_ilp32",
"SUSE Manager Client Tools for SLE Micro 5:libdns1605-9.16.6-150000.12.65.1.aarch64",
"SUSE Manager Client Tools for SLE Micro 5:libdns1605-9.16.6-150000.12.65.1.s390x",
"SUSE Manager Client Tools for SLE Micro 5:libdns1605-9.16.6-150000.12.65.1.x86_64",
"SUSE Manager Client Tools for SLE Micro 5:libirs1601-64bit-9.16.6-150000.12.65.1.aarch64_ilp32",
"SUSE Manager Client Tools for SLE Micro 5:libirs1601-9.16.6-150000.12.65.1.aarch64",
"SUSE Manager Client Tools for SLE Micro 5:libirs1601-9.16.6-150000.12.65.1.s390x",
"SUSE Manager Client Tools for SLE Micro 5:libirs1601-9.16.6-150000.12.65.1.x86_64",
"SUSE Manager Client Tools for SLE Micro 5:libisc1606-64bit-9.16.6-150000.12.65.1.aarch64_ilp32",
"SUSE Manager Client Tools for SLE Micro 5:libisc1606-9.16.6-150000.12.65.1.aarch64",
"SUSE Manager Client Tools for SLE Micro 5:libisc1606-9.16.6-150000.12.65.1.s390x",
"SUSE Manager Client Tools for SLE Micro 5:libisc1606-9.16.6-150000.12.65.1.x86_64",
"SUSE Manager Client Tools for SLE Micro 5:libisccc1600-64bit-9.16.6-150000.12.65.1.aarch64_ilp32",
"SUSE Manager Client Tools for SLE Micro 5:libisccc1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Manager Client Tools for SLE Micro 5:libisccc1600-9.16.6-150000.12.65.1.s390x",
"SUSE Manager Client Tools for SLE Micro 5:libisccc1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Manager Client Tools for SLE Micro 5:libisccfg1600-64bit-9.16.6-150000.12.65.1.aarch64_ilp32",
"SUSE Manager Client Tools for SLE Micro 5:libisccfg1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Manager Client Tools for SLE Micro 5:libisccfg1600-9.16.6-150000.12.65.1.s390x",
"SUSE Manager Client Tools for SLE Micro 5:libisccfg1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Manager Client Tools for SLE Micro 5:libns1604-9.16.6-150000.12.65.1.s390x",
"SUSE Manager Client Tools for SLE Micro 5:libns1604-9.16.6-150000.12.65.1.x86_64",
"SUSE Manager Client Tools for SLE Micro 5:python3-bind-9.16.6-150000.12.65.1.noarch",
"SUSE Manager Proxy Module 4.2:python3-zypp-plugin-spacewalk-1.0.14-150000.3.35.1.noarch",
"SUSE Manager Proxy Module 4.2:zypp-plugin-spacewalk-1.0.14-150000.3.35.1.noarch",
"SUSE Manager Proxy Module 4.3:python3-zypp-plugin-spacewalk-1.0.14-150000.3.35.1.noarch",
"SUSE Manager Proxy Module 4.3:zypp-plugin-spacewalk-1.0.14-150000.3.35.1.noarch",
"openSUSE Leap 15.4:bind-devel-32bit-9.16.6-150000.12.65.1.x86_64",
"openSUSE Leap 15.4:dracut-saltboot-0.1.1681904360.84ef141-150000.1.50.1.noarch",
"openSUSE Leap 15.4:libbind9-1600-32bit-9.16.6-150000.12.65.1.x86_64",
"openSUSE Leap 15.4:libdns1605-32bit-9.16.6-150000.12.65.1.x86_64",
"openSUSE Leap 15.4:libirs1601-32bit-9.16.6-150000.12.65.1.x86_64",
"openSUSE Leap 15.4:libisc1606-32bit-9.16.6-150000.12.65.1.x86_64",
"openSUSE Leap 15.4:libisccc1600-32bit-9.16.6-150000.12.65.1.x86_64",
"openSUSE Leap 15.4:libisccfg1600-32bit-9.16.6-150000.12.65.1.x86_64",
"openSUSE Leap 15.4:libns1604-32bit-9.16.6-150000.12.65.1.x86_64",
"openSUSE Leap 15.4:spacecmd-4.3.21-150000.3.98.1.noarch",
"openSUSE Leap 15.4:wire-0.5.0-150000.1.12.3.aarch64",
"openSUSE Leap 15.4:wire-0.5.0-150000.1.12.3.ppc64le",
"openSUSE Leap 15.4:wire-0.5.0-150000.1.12.3.s390x",
"openSUSE Leap 15.4:wire-0.5.0-150000.1.12.3.x86_64",
"openSUSE Leap 15.5:dracut-saltboot-0.1.1681904360.84ef141-150000.1.50.1.noarch",
"openSUSE Leap 15.5:spacecmd-4.3.21-150000.3.98.1.noarch",
"openSUSE Leap 15.5:wire-0.5.0-150000.1.12.3.aarch64",
"openSUSE Leap 15.5:wire-0.5.0-150000.1.12.3.ppc64le",
"openSUSE Leap 15.5:wire-0.5.0-150000.1.12.3.s390x",
"openSUSE Leap 15.5:wire-0.5.0-150000.1.12.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2023-06-21T11:49:43Z",
"details": "important"
}
],
"title": "CVE-2022-31107"
},
{
"cve": "CVE-2022-32149",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-32149"
}
],
"notes": [
{
"category": "general",
"text": "An attacker may cause a denial of service by crafting an Accept-Language header which ParseAcceptLanguage will take significant time to parse.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 7:bind-9.16.6-150000.12.65.1.aarch64",
"SUSE Enterprise Storage 7:bind-9.16.6-150000.12.65.1.x86_64",
"SUSE Enterprise Storage 7:bind-chrootenv-9.16.6-150000.12.65.1.aarch64",
"SUSE Enterprise Storage 7:bind-chrootenv-9.16.6-150000.12.65.1.x86_64",
"SUSE Enterprise Storage 7:bind-devel-9.16.6-150000.12.65.1.aarch64",
"SUSE Enterprise Storage 7:bind-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Enterprise Storage 7:bind-doc-9.16.6-150000.12.65.1.noarch",
"SUSE Enterprise Storage 7:bind-utils-9.16.6-150000.12.65.1.aarch64",
"SUSE Enterprise Storage 7:bind-utils-9.16.6-150000.12.65.1.x86_64",
"SUSE Enterprise Storage 7:libbind9-1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Enterprise Storage 7:libbind9-1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Enterprise Storage 7:libdns1605-9.16.6-150000.12.65.1.aarch64",
"SUSE Enterprise Storage 7:libdns1605-9.16.6-150000.12.65.1.x86_64",
"SUSE Enterprise Storage 7:libirs-devel-9.16.6-150000.12.65.1.aarch64",
"SUSE Enterprise Storage 7:libirs-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Enterprise Storage 7:libirs1601-9.16.6-150000.12.65.1.aarch64",
"SUSE Enterprise Storage 7:libirs1601-9.16.6-150000.12.65.1.x86_64",
"SUSE Enterprise Storage 7:libisc1606-9.16.6-150000.12.65.1.aarch64",
"SUSE Enterprise Storage 7:libisc1606-9.16.6-150000.12.65.1.x86_64",
"SUSE Enterprise Storage 7:libisccc1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Enterprise Storage 7:libisccc1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Enterprise Storage 7:libisccfg1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Enterprise Storage 7:libisccfg1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Enterprise Storage 7:libns1604-9.16.6-150000.12.65.1.aarch64",
"SUSE Enterprise Storage 7:libns1604-9.16.6-150000.12.65.1.x86_64",
"SUSE Enterprise Storage 7:python3-bind-9.16.6-150000.12.65.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:bind-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:bind-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:bind-chrootenv-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:bind-chrootenv-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:bind-devel-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:bind-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:bind-doc-9.16.6-150000.12.65.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:bind-utils-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:bind-utils-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libbind9-1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libbind9-1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libdns1605-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libdns1605-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libirs-devel-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libirs-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libirs1601-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libirs1601-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libisc1606-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libisc1606-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libisccc1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libisccc1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libisccfg1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libisccfg1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libns1604-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libns1604-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:python3-bind-9.16.6-150000.12.65.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:bind-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:bind-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:bind-chrootenv-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:bind-chrootenv-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:bind-devel-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:bind-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:bind-doc-9.16.6-150000.12.65.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:bind-utils-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:bind-utils-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libbind9-1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libbind9-1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libdns1605-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libdns1605-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libirs-devel-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libirs-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libirs1601-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libirs1601-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libisc1606-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libisc1606-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libisccc1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libisccc1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libisccfg1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libisccfg1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libns1604-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libns1604-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:python3-bind-9.16.6-150000.12.65.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-chrootenv-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-chrootenv-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-chrootenv-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-chrootenv-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-devel-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-devel-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-devel-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-doc-9.16.6-150000.12.65.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-utils-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-utils-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-utils-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-utils-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libbind9-1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libbind9-1600-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libbind9-1600-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libbind9-1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libdns1605-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libdns1605-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libdns1605-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libdns1605-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libirs-devel-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libirs-devel-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libirs-devel-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libirs-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libirs1601-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libirs1601-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libirs1601-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libirs1601-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libisc1606-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libisc1606-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libisc1606-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libisc1606-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libisccc1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libisccc1600-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libisccc1600-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libisccc1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libisccfg1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libisccfg1600-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libisccfg1600-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libisccfg1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libns1604-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libns1604-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libns1604-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libns1604-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:python3-bind-9.16.6-150000.12.65.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-chrootenv-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-chrootenv-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-chrootenv-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-chrootenv-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-devel-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-devel-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-devel-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-doc-9.16.6-150000.12.65.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-utils-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-utils-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-utils-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-utils-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libbind9-1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libbind9-1600-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libbind9-1600-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libbind9-1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libdns1605-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libdns1605-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libdns1605-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libdns1605-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libirs-devel-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libirs-devel-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libirs-devel-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libirs-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libirs1601-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libirs1601-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libirs1601-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libirs1601-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libisc1606-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libisc1606-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libisc1606-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libisc1606-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libisccc1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libisccc1600-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libisccc1600-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libisccc1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libisccfg1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libisccfg1600-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libisccfg1600-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libisccfg1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libns1604-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libns1604-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libns1604-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libns1604-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:python3-bind-9.16.6-150000.12.65.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:bind-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:bind-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:bind-chrootenv-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:bind-chrootenv-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:bind-devel-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:bind-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:bind-doc-9.16.6-150000.12.65.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:bind-utils-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:bind-utils-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libbind9-1600-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libbind9-1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libdns1605-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libdns1605-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libirs-devel-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libirs-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libirs1601-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libirs1601-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libisc1606-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libisc1606-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libisccc1600-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libisccc1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libisccfg1600-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libisccfg1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libns1604-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libns1604-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:python3-bind-9.16.6-150000.12.65.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:bind-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:bind-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:bind-chrootenv-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:bind-chrootenv-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:bind-devel-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:bind-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:bind-doc-9.16.6-150000.12.65.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:bind-utils-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:bind-utils-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libbind9-1600-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libbind9-1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libdns1605-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libdns1605-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libirs-devel-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libirs-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libirs1601-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libirs1601-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libisc1606-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libisc1606-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libisccc1600-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libisccc1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libisccfg1600-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libisccfg1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libns1604-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libns1604-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:python3-bind-9.16.6-150000.12.65.1.noarch",
"SUSE Manager Client Tools 15:dracut-saltboot-0.1.1681904360.84ef141-150000.1.50.1.noarch",
"SUSE Manager Client Tools 15:grafana-9.5.1-150000.1.48.5.aarch64",
"SUSE Manager Client Tools 15:grafana-9.5.1-150000.1.48.5.ppc64le",
"SUSE Manager Client Tools 15:grafana-9.5.1-150000.1.48.5.s390x",
"SUSE Manager Client Tools 15:grafana-9.5.1-150000.1.48.5.x86_64",
"SUSE Manager Client Tools 15:mgr-daemon-4.3.7-150000.1.41.1.noarch",
"SUSE Manager Client Tools 15:python3-uyuni-common-libs-4.3.8-150000.1.33.1.aarch64",
"SUSE Manager Client Tools 15:python3-uyuni-common-libs-4.3.8-150000.1.33.1.ppc64le",
"SUSE Manager Client Tools 15:python3-uyuni-common-libs-4.3.8-150000.1.33.1.s390x",
"SUSE Manager Client Tools 15:python3-uyuni-common-libs-4.3.8-150000.1.33.1.x86_64",
"SUSE Manager Client Tools 15:python3-zypp-plugin-spacewalk-1.0.14-150000.3.35.1.noarch",
"SUSE Manager Client Tools 15:spacecmd-4.3.21-150000.3.98.1.noarch",
"SUSE Manager Client Tools 15:zypp-plugin-spacewalk-1.0.14-150000.3.35.1.noarch",
"SUSE Manager Client Tools for SLE Micro 5:bind-utils-9.16.6-150000.12.65.1.aarch64",
"SUSE Manager Client Tools for SLE Micro 5:bind-utils-9.16.6-150000.12.65.1.s390x",
"SUSE Manager Client Tools for SLE Micro 5:bind-utils-9.16.6-150000.12.65.1.x86_64",
"SUSE Manager Client Tools for SLE Micro 5:dracut-saltboot-0.1.1681904360.84ef141-150000.1.50.1.noarch",
"SUSE Manager Client Tools for SLE Micro 5:libbind9-1600-64bit-9.16.6-150000.12.65.1.aarch64_ilp32",
"SUSE Manager Client Tools for SLE Micro 5:libbind9-1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Manager Client Tools for SLE Micro 5:libbind9-1600-9.16.6-150000.12.65.1.s390x",
"SUSE Manager Client Tools for SLE Micro 5:libbind9-1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Manager Client Tools for SLE Micro 5:libdns1605-64bit-9.16.6-150000.12.65.1.aarch64_ilp32",
"SUSE Manager Client Tools for SLE Micro 5:libdns1605-9.16.6-150000.12.65.1.aarch64",
"SUSE Manager Client Tools for SLE Micro 5:libdns1605-9.16.6-150000.12.65.1.s390x",
"SUSE Manager Client Tools for SLE Micro 5:libdns1605-9.16.6-150000.12.65.1.x86_64",
"SUSE Manager Client Tools for SLE Micro 5:libirs1601-64bit-9.16.6-150000.12.65.1.aarch64_ilp32",
"SUSE Manager Client Tools for SLE Micro 5:libirs1601-9.16.6-150000.12.65.1.aarch64",
"SUSE Manager Client Tools for SLE Micro 5:libirs1601-9.16.6-150000.12.65.1.s390x",
"SUSE Manager Client Tools for SLE Micro 5:libirs1601-9.16.6-150000.12.65.1.x86_64",
"SUSE Manager Client Tools for SLE Micro 5:libisc1606-64bit-9.16.6-150000.12.65.1.aarch64_ilp32",
"SUSE Manager Client Tools for SLE Micro 5:libisc1606-9.16.6-150000.12.65.1.aarch64",
"SUSE Manager Client Tools for SLE Micro 5:libisc1606-9.16.6-150000.12.65.1.s390x",
"SUSE Manager Client Tools for SLE Micro 5:libisc1606-9.16.6-150000.12.65.1.x86_64",
"SUSE Manager Client Tools for SLE Micro 5:libisccc1600-64bit-9.16.6-150000.12.65.1.aarch64_ilp32",
"SUSE Manager Client Tools for SLE Micro 5:libisccc1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Manager Client Tools for SLE Micro 5:libisccc1600-9.16.6-150000.12.65.1.s390x",
"SUSE Manager Client Tools for SLE Micro 5:libisccc1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Manager Client Tools for SLE Micro 5:libisccfg1600-64bit-9.16.6-150000.12.65.1.aarch64_ilp32",
"SUSE Manager Client Tools for SLE Micro 5:libisccfg1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Manager Client Tools for SLE Micro 5:libisccfg1600-9.16.6-150000.12.65.1.s390x",
"SUSE Manager Client Tools for SLE Micro 5:libisccfg1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Manager Client Tools for SLE Micro 5:libns1604-9.16.6-150000.12.65.1.s390x",
"SUSE Manager Client Tools for SLE Micro 5:libns1604-9.16.6-150000.12.65.1.x86_64",
"SUSE Manager Client Tools for SLE Micro 5:python3-bind-9.16.6-150000.12.65.1.noarch",
"SUSE Manager Proxy Module 4.2:python3-zypp-plugin-spacewalk-1.0.14-150000.3.35.1.noarch",
"SUSE Manager Proxy Module 4.2:zypp-plugin-spacewalk-1.0.14-150000.3.35.1.noarch",
"SUSE Manager Proxy Module 4.3:python3-zypp-plugin-spacewalk-1.0.14-150000.3.35.1.noarch",
"SUSE Manager Proxy Module 4.3:zypp-plugin-spacewalk-1.0.14-150000.3.35.1.noarch",
"openSUSE Leap 15.4:bind-devel-32bit-9.16.6-150000.12.65.1.x86_64",
"openSUSE Leap 15.4:dracut-saltboot-0.1.1681904360.84ef141-150000.1.50.1.noarch",
"openSUSE Leap 15.4:libbind9-1600-32bit-9.16.6-150000.12.65.1.x86_64",
"openSUSE Leap 15.4:libdns1605-32bit-9.16.6-150000.12.65.1.x86_64",
"openSUSE Leap 15.4:libirs1601-32bit-9.16.6-150000.12.65.1.x86_64",
"openSUSE Leap 15.4:libisc1606-32bit-9.16.6-150000.12.65.1.x86_64",
"openSUSE Leap 15.4:libisccc1600-32bit-9.16.6-150000.12.65.1.x86_64",
"openSUSE Leap 15.4:libisccfg1600-32bit-9.16.6-150000.12.65.1.x86_64",
"openSUSE Leap 15.4:libns1604-32bit-9.16.6-150000.12.65.1.x86_64",
"openSUSE Leap 15.4:spacecmd-4.3.21-150000.3.98.1.noarch",
"openSUSE Leap 15.4:wire-0.5.0-150000.1.12.3.aarch64",
"openSUSE Leap 15.4:wire-0.5.0-150000.1.12.3.ppc64le",
"openSUSE Leap 15.4:wire-0.5.0-150000.1.12.3.s390x",
"openSUSE Leap 15.4:wire-0.5.0-150000.1.12.3.x86_64",
"openSUSE Leap 15.5:dracut-saltboot-0.1.1681904360.84ef141-150000.1.50.1.noarch",
"openSUSE Leap 15.5:spacecmd-4.3.21-150000.3.98.1.noarch",
"openSUSE Leap 15.5:wire-0.5.0-150000.1.12.3.aarch64",
"openSUSE Leap 15.5:wire-0.5.0-150000.1.12.3.ppc64le",
"openSUSE Leap 15.5:wire-0.5.0-150000.1.12.3.s390x",
"openSUSE Leap 15.5:wire-0.5.0-150000.1.12.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-32149",
"url": "https://www.suse.com/security/cve/CVE-2022-32149"
},
{
"category": "external",
"summary": "SUSE Bug 1204501 for CVE-2022-32149",
"url": "https://bugzilla.suse.com/1204501"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 7:bind-9.16.6-150000.12.65.1.aarch64",
"SUSE Enterprise Storage 7:bind-9.16.6-150000.12.65.1.x86_64",
"SUSE Enterprise Storage 7:bind-chrootenv-9.16.6-150000.12.65.1.aarch64",
"SUSE Enterprise Storage 7:bind-chrootenv-9.16.6-150000.12.65.1.x86_64",
"SUSE Enterprise Storage 7:bind-devel-9.16.6-150000.12.65.1.aarch64",
"SUSE Enterprise Storage 7:bind-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Enterprise Storage 7:bind-doc-9.16.6-150000.12.65.1.noarch",
"SUSE Enterprise Storage 7:bind-utils-9.16.6-150000.12.65.1.aarch64",
"SUSE Enterprise Storage 7:bind-utils-9.16.6-150000.12.65.1.x86_64",
"SUSE Enterprise Storage 7:libbind9-1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Enterprise Storage 7:libbind9-1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Enterprise Storage 7:libdns1605-9.16.6-150000.12.65.1.aarch64",
"SUSE Enterprise Storage 7:libdns1605-9.16.6-150000.12.65.1.x86_64",
"SUSE Enterprise Storage 7:libirs-devel-9.16.6-150000.12.65.1.aarch64",
"SUSE Enterprise Storage 7:libirs-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Enterprise Storage 7:libirs1601-9.16.6-150000.12.65.1.aarch64",
"SUSE Enterprise Storage 7:libirs1601-9.16.6-150000.12.65.1.x86_64",
"SUSE Enterprise Storage 7:libisc1606-9.16.6-150000.12.65.1.aarch64",
"SUSE Enterprise Storage 7:libisc1606-9.16.6-150000.12.65.1.x86_64",
"SUSE Enterprise Storage 7:libisccc1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Enterprise Storage 7:libisccc1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Enterprise Storage 7:libisccfg1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Enterprise Storage 7:libisccfg1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Enterprise Storage 7:libns1604-9.16.6-150000.12.65.1.aarch64",
"SUSE Enterprise Storage 7:libns1604-9.16.6-150000.12.65.1.x86_64",
"SUSE Enterprise Storage 7:python3-bind-9.16.6-150000.12.65.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:bind-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:bind-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:bind-chrootenv-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:bind-chrootenv-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:bind-devel-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:bind-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:bind-doc-9.16.6-150000.12.65.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:bind-utils-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:bind-utils-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libbind9-1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libbind9-1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libdns1605-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libdns1605-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libirs-devel-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libirs-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libirs1601-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libirs1601-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libisc1606-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libisc1606-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libisccc1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libisccc1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libisccfg1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libisccfg1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libns1604-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libns1604-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:python3-bind-9.16.6-150000.12.65.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:bind-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:bind-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:bind-chrootenv-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:bind-chrootenv-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:bind-devel-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:bind-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:bind-doc-9.16.6-150000.12.65.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:bind-utils-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:bind-utils-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libbind9-1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libbind9-1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libdns1605-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libdns1605-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libirs-devel-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libirs-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libirs1601-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libirs1601-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libisc1606-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libisc1606-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libisccc1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libisccc1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libisccfg1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libisccfg1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libns1604-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libns1604-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:python3-bind-9.16.6-150000.12.65.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-chrootenv-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-chrootenv-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-chrootenv-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-chrootenv-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-devel-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-devel-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-devel-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-doc-9.16.6-150000.12.65.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-utils-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-utils-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-utils-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-utils-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libbind9-1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libbind9-1600-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libbind9-1600-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libbind9-1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libdns1605-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libdns1605-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libdns1605-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libdns1605-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libirs-devel-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libirs-devel-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libirs-devel-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libirs-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libirs1601-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libirs1601-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libirs1601-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libirs1601-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libisc1606-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libisc1606-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libisc1606-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libisc1606-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libisccc1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libisccc1600-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libisccc1600-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libisccc1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libisccfg1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libisccfg1600-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libisccfg1600-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libisccfg1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libns1604-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libns1604-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libns1604-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libns1604-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:python3-bind-9.16.6-150000.12.65.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-chrootenv-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-chrootenv-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-chrootenv-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-chrootenv-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-devel-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-devel-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-devel-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-doc-9.16.6-150000.12.65.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-utils-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-utils-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-utils-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-utils-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libbind9-1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libbind9-1600-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libbind9-1600-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libbind9-1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libdns1605-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libdns1605-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libdns1605-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libdns1605-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libirs-devel-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libirs-devel-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libirs-devel-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libirs-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libirs1601-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libirs1601-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libirs1601-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libirs1601-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libisc1606-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libisc1606-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libisc1606-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libisc1606-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libisccc1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libisccc1600-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libisccc1600-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libisccc1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libisccfg1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libisccfg1600-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libisccfg1600-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libisccfg1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libns1604-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libns1604-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libns1604-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libns1604-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:python3-bind-9.16.6-150000.12.65.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:bind-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:bind-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:bind-chrootenv-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:bind-chrootenv-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:bind-devel-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:bind-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:bind-doc-9.16.6-150000.12.65.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:bind-utils-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:bind-utils-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libbind9-1600-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libbind9-1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libdns1605-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libdns1605-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libirs-devel-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libirs-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libirs1601-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libirs1601-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libisc1606-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libisc1606-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libisccc1600-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libisccc1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libisccfg1600-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libisccfg1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libns1604-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libns1604-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:python3-bind-9.16.6-150000.12.65.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:bind-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:bind-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:bind-chrootenv-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:bind-chrootenv-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:bind-devel-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:bind-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:bind-doc-9.16.6-150000.12.65.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:bind-utils-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:bind-utils-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libbind9-1600-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libbind9-1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libdns1605-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libdns1605-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libirs-devel-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libirs-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libirs1601-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libirs1601-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libisc1606-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libisc1606-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libisccc1600-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libisccc1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libisccfg1600-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libisccfg1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libns1604-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libns1604-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:python3-bind-9.16.6-150000.12.65.1.noarch",
"SUSE Manager Client Tools 15:dracut-saltboot-0.1.1681904360.84ef141-150000.1.50.1.noarch",
"SUSE Manager Client Tools 15:grafana-9.5.1-150000.1.48.5.aarch64",
"SUSE Manager Client Tools 15:grafana-9.5.1-150000.1.48.5.ppc64le",
"SUSE Manager Client Tools 15:grafana-9.5.1-150000.1.48.5.s390x",
"SUSE Manager Client Tools 15:grafana-9.5.1-150000.1.48.5.x86_64",
"SUSE Manager Client Tools 15:mgr-daemon-4.3.7-150000.1.41.1.noarch",
"SUSE Manager Client Tools 15:python3-uyuni-common-libs-4.3.8-150000.1.33.1.aarch64",
"SUSE Manager Client Tools 15:python3-uyuni-common-libs-4.3.8-150000.1.33.1.ppc64le",
"SUSE Manager Client Tools 15:python3-uyuni-common-libs-4.3.8-150000.1.33.1.s390x",
"SUSE Manager Client Tools 15:python3-uyuni-common-libs-4.3.8-150000.1.33.1.x86_64",
"SUSE Manager Client Tools 15:python3-zypp-plugin-spacewalk-1.0.14-150000.3.35.1.noarch",
"SUSE Manager Client Tools 15:spacecmd-4.3.21-150000.3.98.1.noarch",
"SUSE Manager Client Tools 15:zypp-plugin-spacewalk-1.0.14-150000.3.35.1.noarch",
"SUSE Manager Client Tools for SLE Micro 5:bind-utils-9.16.6-150000.12.65.1.aarch64",
"SUSE Manager Client Tools for SLE Micro 5:bind-utils-9.16.6-150000.12.65.1.s390x",
"SUSE Manager Client Tools for SLE Micro 5:bind-utils-9.16.6-150000.12.65.1.x86_64",
"SUSE Manager Client Tools for SLE Micro 5:dracut-saltboot-0.1.1681904360.84ef141-150000.1.50.1.noarch",
"SUSE Manager Client Tools for SLE Micro 5:libbind9-1600-64bit-9.16.6-150000.12.65.1.aarch64_ilp32",
"SUSE Manager Client Tools for SLE Micro 5:libbind9-1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Manager Client Tools for SLE Micro 5:libbind9-1600-9.16.6-150000.12.65.1.s390x",
"SUSE Manager Client Tools for SLE Micro 5:libbind9-1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Manager Client Tools for SLE Micro 5:libdns1605-64bit-9.16.6-150000.12.65.1.aarch64_ilp32",
"SUSE Manager Client Tools for SLE Micro 5:libdns1605-9.16.6-150000.12.65.1.aarch64",
"SUSE Manager Client Tools for SLE Micro 5:libdns1605-9.16.6-150000.12.65.1.s390x",
"SUSE Manager Client Tools for SLE Micro 5:libdns1605-9.16.6-150000.12.65.1.x86_64",
"SUSE Manager Client Tools for SLE Micro 5:libirs1601-64bit-9.16.6-150000.12.65.1.aarch64_ilp32",
"SUSE Manager Client Tools for SLE Micro 5:libirs1601-9.16.6-150000.12.65.1.aarch64",
"SUSE Manager Client Tools for SLE Micro 5:libirs1601-9.16.6-150000.12.65.1.s390x",
"SUSE Manager Client Tools for SLE Micro 5:libirs1601-9.16.6-150000.12.65.1.x86_64",
"SUSE Manager Client Tools for SLE Micro 5:libisc1606-64bit-9.16.6-150000.12.65.1.aarch64_ilp32",
"SUSE Manager Client Tools for SLE Micro 5:libisc1606-9.16.6-150000.12.65.1.aarch64",
"SUSE Manager Client Tools for SLE Micro 5:libisc1606-9.16.6-150000.12.65.1.s390x",
"SUSE Manager Client Tools for SLE Micro 5:libisc1606-9.16.6-150000.12.65.1.x86_64",
"SUSE Manager Client Tools for SLE Micro 5:libisccc1600-64bit-9.16.6-150000.12.65.1.aarch64_ilp32",
"SUSE Manager Client Tools for SLE Micro 5:libisccc1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Manager Client Tools for SLE Micro 5:libisccc1600-9.16.6-150000.12.65.1.s390x",
"SUSE Manager Client Tools for SLE Micro 5:libisccc1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Manager Client Tools for SLE Micro 5:libisccfg1600-64bit-9.16.6-150000.12.65.1.aarch64_ilp32",
"SUSE Manager Client Tools for SLE Micro 5:libisccfg1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Manager Client Tools for SLE Micro 5:libisccfg1600-9.16.6-150000.12.65.1.s390x",
"SUSE Manager Client Tools for SLE Micro 5:libisccfg1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Manager Client Tools for SLE Micro 5:libns1604-9.16.6-150000.12.65.1.s390x",
"SUSE Manager Client Tools for SLE Micro 5:libns1604-9.16.6-150000.12.65.1.x86_64",
"SUSE Manager Client Tools for SLE Micro 5:python3-bind-9.16.6-150000.12.65.1.noarch",
"SUSE Manager Proxy Module 4.2:python3-zypp-plugin-spacewalk-1.0.14-150000.3.35.1.noarch",
"SUSE Manager Proxy Module 4.2:zypp-plugin-spacewalk-1.0.14-150000.3.35.1.noarch",
"SUSE Manager Proxy Module 4.3:python3-zypp-plugin-spacewalk-1.0.14-150000.3.35.1.noarch",
"SUSE Manager Proxy Module 4.3:zypp-plugin-spacewalk-1.0.14-150000.3.35.1.noarch",
"openSUSE Leap 15.4:bind-devel-32bit-9.16.6-150000.12.65.1.x86_64",
"openSUSE Leap 15.4:dracut-saltboot-0.1.1681904360.84ef141-150000.1.50.1.noarch",
"openSUSE Leap 15.4:libbind9-1600-32bit-9.16.6-150000.12.65.1.x86_64",
"openSUSE Leap 15.4:libdns1605-32bit-9.16.6-150000.12.65.1.x86_64",
"openSUSE Leap 15.4:libirs1601-32bit-9.16.6-150000.12.65.1.x86_64",
"openSUSE Leap 15.4:libisc1606-32bit-9.16.6-150000.12.65.1.x86_64",
"openSUSE Leap 15.4:libisccc1600-32bit-9.16.6-150000.12.65.1.x86_64",
"openSUSE Leap 15.4:libisccfg1600-32bit-9.16.6-150000.12.65.1.x86_64",
"openSUSE Leap 15.4:libns1604-32bit-9.16.6-150000.12.65.1.x86_64",
"openSUSE Leap 15.4:spacecmd-4.3.21-150000.3.98.1.noarch",
"openSUSE Leap 15.4:wire-0.5.0-150000.1.12.3.aarch64",
"openSUSE Leap 15.4:wire-0.5.0-150000.1.12.3.ppc64le",
"openSUSE Leap 15.4:wire-0.5.0-150000.1.12.3.s390x",
"openSUSE Leap 15.4:wire-0.5.0-150000.1.12.3.x86_64",
"openSUSE Leap 15.5:dracut-saltboot-0.1.1681904360.84ef141-150000.1.50.1.noarch",
"openSUSE Leap 15.5:spacecmd-4.3.21-150000.3.98.1.noarch",
"openSUSE Leap 15.5:wire-0.5.0-150000.1.12.3.aarch64",
"openSUSE Leap 15.5:wire-0.5.0-150000.1.12.3.ppc64le",
"openSUSE Leap 15.5:wire-0.5.0-150000.1.12.3.s390x",
"openSUSE Leap 15.5:wire-0.5.0-150000.1.12.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 7:bind-9.16.6-150000.12.65.1.aarch64",
"SUSE Enterprise Storage 7:bind-9.16.6-150000.12.65.1.x86_64",
"SUSE Enterprise Storage 7:bind-chrootenv-9.16.6-150000.12.65.1.aarch64",
"SUSE Enterprise Storage 7:bind-chrootenv-9.16.6-150000.12.65.1.x86_64",
"SUSE Enterprise Storage 7:bind-devel-9.16.6-150000.12.65.1.aarch64",
"SUSE Enterprise Storage 7:bind-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Enterprise Storage 7:bind-doc-9.16.6-150000.12.65.1.noarch",
"SUSE Enterprise Storage 7:bind-utils-9.16.6-150000.12.65.1.aarch64",
"SUSE Enterprise Storage 7:bind-utils-9.16.6-150000.12.65.1.x86_64",
"SUSE Enterprise Storage 7:libbind9-1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Enterprise Storage 7:libbind9-1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Enterprise Storage 7:libdns1605-9.16.6-150000.12.65.1.aarch64",
"SUSE Enterprise Storage 7:libdns1605-9.16.6-150000.12.65.1.x86_64",
"SUSE Enterprise Storage 7:libirs-devel-9.16.6-150000.12.65.1.aarch64",
"SUSE Enterprise Storage 7:libirs-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Enterprise Storage 7:libirs1601-9.16.6-150000.12.65.1.aarch64",
"SUSE Enterprise Storage 7:libirs1601-9.16.6-150000.12.65.1.x86_64",
"SUSE Enterprise Storage 7:libisc1606-9.16.6-150000.12.65.1.aarch64",
"SUSE Enterprise Storage 7:libisc1606-9.16.6-150000.12.65.1.x86_64",
"SUSE Enterprise Storage 7:libisccc1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Enterprise Storage 7:libisccc1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Enterprise Storage 7:libisccfg1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Enterprise Storage 7:libisccfg1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Enterprise Storage 7:libns1604-9.16.6-150000.12.65.1.aarch64",
"SUSE Enterprise Storage 7:libns1604-9.16.6-150000.12.65.1.x86_64",
"SUSE Enterprise Storage 7:python3-bind-9.16.6-150000.12.65.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:bind-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:bind-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:bind-chrootenv-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:bind-chrootenv-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:bind-devel-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:bind-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:bind-doc-9.16.6-150000.12.65.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:bind-utils-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:bind-utils-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libbind9-1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libbind9-1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libdns1605-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libdns1605-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libirs-devel-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libirs-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libirs1601-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libirs1601-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libisc1606-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libisc1606-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libisccc1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libisccc1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libisccfg1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libisccfg1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libns1604-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libns1604-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:python3-bind-9.16.6-150000.12.65.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:bind-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:bind-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:bind-chrootenv-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:bind-chrootenv-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:bind-devel-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:bind-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:bind-doc-9.16.6-150000.12.65.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:bind-utils-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:bind-utils-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libbind9-1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libbind9-1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libdns1605-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libdns1605-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libirs-devel-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libirs-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libirs1601-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libirs1601-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libisc1606-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libisc1606-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libisccc1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libisccc1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libisccfg1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libisccfg1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libns1604-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libns1604-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:python3-bind-9.16.6-150000.12.65.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-chrootenv-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-chrootenv-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-chrootenv-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-chrootenv-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-devel-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-devel-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-devel-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-doc-9.16.6-150000.12.65.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-utils-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-utils-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-utils-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-utils-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libbind9-1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libbind9-1600-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libbind9-1600-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libbind9-1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libdns1605-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libdns1605-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libdns1605-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libdns1605-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libirs-devel-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libirs-devel-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libirs-devel-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libirs-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libirs1601-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libirs1601-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libirs1601-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libirs1601-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libisc1606-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libisc1606-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libisc1606-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libisc1606-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libisccc1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libisccc1600-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libisccc1600-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libisccc1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libisccfg1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libisccfg1600-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libisccfg1600-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libisccfg1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libns1604-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libns1604-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libns1604-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libns1604-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:python3-bind-9.16.6-150000.12.65.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-chrootenv-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-chrootenv-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-chrootenv-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-chrootenv-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-devel-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-devel-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-devel-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-doc-9.16.6-150000.12.65.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-utils-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-utils-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-utils-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-utils-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libbind9-1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libbind9-1600-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libbind9-1600-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libbind9-1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libdns1605-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libdns1605-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libdns1605-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libdns1605-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libirs-devel-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libirs-devel-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libirs-devel-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libirs-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libirs1601-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libirs1601-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libirs1601-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libirs1601-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libisc1606-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libisc1606-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libisc1606-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libisc1606-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libisccc1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libisccc1600-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libisccc1600-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libisccc1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libisccfg1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libisccfg1600-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libisccfg1600-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libisccfg1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libns1604-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libns1604-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libns1604-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libns1604-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:python3-bind-9.16.6-150000.12.65.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:bind-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:bind-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:bind-chrootenv-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:bind-chrootenv-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:bind-devel-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:bind-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:bind-doc-9.16.6-150000.12.65.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:bind-utils-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:bind-utils-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libbind9-1600-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libbind9-1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libdns1605-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libdns1605-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libirs-devel-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libirs-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libirs1601-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libirs1601-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libisc1606-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libisc1606-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libisccc1600-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libisccc1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libisccfg1600-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libisccfg1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libns1604-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libns1604-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:python3-bind-9.16.6-150000.12.65.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:bind-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:bind-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:bind-chrootenv-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:bind-chrootenv-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:bind-devel-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:bind-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:bind-doc-9.16.6-150000.12.65.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:bind-utils-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:bind-utils-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libbind9-1600-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libbind9-1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libdns1605-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libdns1605-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libirs-devel-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libirs-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libirs1601-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libirs1601-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libisc1606-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libisc1606-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libisccc1600-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libisccc1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libisccfg1600-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libisccfg1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libns1604-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libns1604-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:python3-bind-9.16.6-150000.12.65.1.noarch",
"SUSE Manager Client Tools 15:dracut-saltboot-0.1.1681904360.84ef141-150000.1.50.1.noarch",
"SUSE Manager Client Tools 15:grafana-9.5.1-150000.1.48.5.aarch64",
"SUSE Manager Client Tools 15:grafana-9.5.1-150000.1.48.5.ppc64le",
"SUSE Manager Client Tools 15:grafana-9.5.1-150000.1.48.5.s390x",
"SUSE Manager Client Tools 15:grafana-9.5.1-150000.1.48.5.x86_64",
"SUSE Manager Client Tools 15:mgr-daemon-4.3.7-150000.1.41.1.noarch",
"SUSE Manager Client Tools 15:python3-uyuni-common-libs-4.3.8-150000.1.33.1.aarch64",
"SUSE Manager Client Tools 15:python3-uyuni-common-libs-4.3.8-150000.1.33.1.ppc64le",
"SUSE Manager Client Tools 15:python3-uyuni-common-libs-4.3.8-150000.1.33.1.s390x",
"SUSE Manager Client Tools 15:python3-uyuni-common-libs-4.3.8-150000.1.33.1.x86_64",
"SUSE Manager Client Tools 15:python3-zypp-plugin-spacewalk-1.0.14-150000.3.35.1.noarch",
"SUSE Manager Client Tools 15:spacecmd-4.3.21-150000.3.98.1.noarch",
"SUSE Manager Client Tools 15:zypp-plugin-spacewalk-1.0.14-150000.3.35.1.noarch",
"SUSE Manager Client Tools for SLE Micro 5:bind-utils-9.16.6-150000.12.65.1.aarch64",
"SUSE Manager Client Tools for SLE Micro 5:bind-utils-9.16.6-150000.12.65.1.s390x",
"SUSE Manager Client Tools for SLE Micro 5:bind-utils-9.16.6-150000.12.65.1.x86_64",
"SUSE Manager Client Tools for SLE Micro 5:dracut-saltboot-0.1.1681904360.84ef141-150000.1.50.1.noarch",
"SUSE Manager Client Tools for SLE Micro 5:libbind9-1600-64bit-9.16.6-150000.12.65.1.aarch64_ilp32",
"SUSE Manager Client Tools for SLE Micro 5:libbind9-1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Manager Client Tools for SLE Micro 5:libbind9-1600-9.16.6-150000.12.65.1.s390x",
"SUSE Manager Client Tools for SLE Micro 5:libbind9-1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Manager Client Tools for SLE Micro 5:libdns1605-64bit-9.16.6-150000.12.65.1.aarch64_ilp32",
"SUSE Manager Client Tools for SLE Micro 5:libdns1605-9.16.6-150000.12.65.1.aarch64",
"SUSE Manager Client Tools for SLE Micro 5:libdns1605-9.16.6-150000.12.65.1.s390x",
"SUSE Manager Client Tools for SLE Micro 5:libdns1605-9.16.6-150000.12.65.1.x86_64",
"SUSE Manager Client Tools for SLE Micro 5:libirs1601-64bit-9.16.6-150000.12.65.1.aarch64_ilp32",
"SUSE Manager Client Tools for SLE Micro 5:libirs1601-9.16.6-150000.12.65.1.aarch64",
"SUSE Manager Client Tools for SLE Micro 5:libirs1601-9.16.6-150000.12.65.1.s390x",
"SUSE Manager Client Tools for SLE Micro 5:libirs1601-9.16.6-150000.12.65.1.x86_64",
"SUSE Manager Client Tools for SLE Micro 5:libisc1606-64bit-9.16.6-150000.12.65.1.aarch64_ilp32",
"SUSE Manager Client Tools for SLE Micro 5:libisc1606-9.16.6-150000.12.65.1.aarch64",
"SUSE Manager Client Tools for SLE Micro 5:libisc1606-9.16.6-150000.12.65.1.s390x",
"SUSE Manager Client Tools for SLE Micro 5:libisc1606-9.16.6-150000.12.65.1.x86_64",
"SUSE Manager Client Tools for SLE Micro 5:libisccc1600-64bit-9.16.6-150000.12.65.1.aarch64_ilp32",
"SUSE Manager Client Tools for SLE Micro 5:libisccc1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Manager Client Tools for SLE Micro 5:libisccc1600-9.16.6-150000.12.65.1.s390x",
"SUSE Manager Client Tools for SLE Micro 5:libisccc1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Manager Client Tools for SLE Micro 5:libisccfg1600-64bit-9.16.6-150000.12.65.1.aarch64_ilp32",
"SUSE Manager Client Tools for SLE Micro 5:libisccfg1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Manager Client Tools for SLE Micro 5:libisccfg1600-9.16.6-150000.12.65.1.s390x",
"SUSE Manager Client Tools for SLE Micro 5:libisccfg1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Manager Client Tools for SLE Micro 5:libns1604-9.16.6-150000.12.65.1.s390x",
"SUSE Manager Client Tools for SLE Micro 5:libns1604-9.16.6-150000.12.65.1.x86_64",
"SUSE Manager Client Tools for SLE Micro 5:python3-bind-9.16.6-150000.12.65.1.noarch",
"SUSE Manager Proxy Module 4.2:python3-zypp-plugin-spacewalk-1.0.14-150000.3.35.1.noarch",
"SUSE Manager Proxy Module 4.2:zypp-plugin-spacewalk-1.0.14-150000.3.35.1.noarch",
"SUSE Manager Proxy Module 4.3:python3-zypp-plugin-spacewalk-1.0.14-150000.3.35.1.noarch",
"SUSE Manager Proxy Module 4.3:zypp-plugin-spacewalk-1.0.14-150000.3.35.1.noarch",
"openSUSE Leap 15.4:bind-devel-32bit-9.16.6-150000.12.65.1.x86_64",
"openSUSE Leap 15.4:dracut-saltboot-0.1.1681904360.84ef141-150000.1.50.1.noarch",
"openSUSE Leap 15.4:libbind9-1600-32bit-9.16.6-150000.12.65.1.x86_64",
"openSUSE Leap 15.4:libdns1605-32bit-9.16.6-150000.12.65.1.x86_64",
"openSUSE Leap 15.4:libirs1601-32bit-9.16.6-150000.12.65.1.x86_64",
"openSUSE Leap 15.4:libisc1606-32bit-9.16.6-150000.12.65.1.x86_64",
"openSUSE Leap 15.4:libisccc1600-32bit-9.16.6-150000.12.65.1.x86_64",
"openSUSE Leap 15.4:libisccfg1600-32bit-9.16.6-150000.12.65.1.x86_64",
"openSUSE Leap 15.4:libns1604-32bit-9.16.6-150000.12.65.1.x86_64",
"openSUSE Leap 15.4:spacecmd-4.3.21-150000.3.98.1.noarch",
"openSUSE Leap 15.4:wire-0.5.0-150000.1.12.3.aarch64",
"openSUSE Leap 15.4:wire-0.5.0-150000.1.12.3.ppc64le",
"openSUSE Leap 15.4:wire-0.5.0-150000.1.12.3.s390x",
"openSUSE Leap 15.4:wire-0.5.0-150000.1.12.3.x86_64",
"openSUSE Leap 15.5:dracut-saltboot-0.1.1681904360.84ef141-150000.1.50.1.noarch",
"openSUSE Leap 15.5:spacecmd-4.3.21-150000.3.98.1.noarch",
"openSUSE Leap 15.5:wire-0.5.0-150000.1.12.3.aarch64",
"openSUSE Leap 15.5:wire-0.5.0-150000.1.12.3.ppc64le",
"openSUSE Leap 15.5:wire-0.5.0-150000.1.12.3.s390x",
"openSUSE Leap 15.5:wire-0.5.0-150000.1.12.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2023-06-21T11:49:43Z",
"details": "important"
}
],
"title": "CVE-2022-32149"
},
{
"cve": "CVE-2022-35957",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-35957"
}
],
"notes": [
{
"category": "general",
"text": "Grafana is an open-source platform for monitoring and observability. Versions prior to 9.1.6 and 8.5.13 are vulnerable to an escalation from admin to server admin when auth proxy is used, allowing an admin to take over the server admin account and gain full control of the grafana instance. All installations should be upgraded as soon as possible. As a workaround deactivate auth proxy following the instructions at: https://grafana.com/docs/grafana/latest/setup-grafana/configure-security/configure-authentication/auth-proxy/",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 7:bind-9.16.6-150000.12.65.1.aarch64",
"SUSE Enterprise Storage 7:bind-9.16.6-150000.12.65.1.x86_64",
"SUSE Enterprise Storage 7:bind-chrootenv-9.16.6-150000.12.65.1.aarch64",
"SUSE Enterprise Storage 7:bind-chrootenv-9.16.6-150000.12.65.1.x86_64",
"SUSE Enterprise Storage 7:bind-devel-9.16.6-150000.12.65.1.aarch64",
"SUSE Enterprise Storage 7:bind-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Enterprise Storage 7:bind-doc-9.16.6-150000.12.65.1.noarch",
"SUSE Enterprise Storage 7:bind-utils-9.16.6-150000.12.65.1.aarch64",
"SUSE Enterprise Storage 7:bind-utils-9.16.6-150000.12.65.1.x86_64",
"SUSE Enterprise Storage 7:libbind9-1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Enterprise Storage 7:libbind9-1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Enterprise Storage 7:libdns1605-9.16.6-150000.12.65.1.aarch64",
"SUSE Enterprise Storage 7:libdns1605-9.16.6-150000.12.65.1.x86_64",
"SUSE Enterprise Storage 7:libirs-devel-9.16.6-150000.12.65.1.aarch64",
"SUSE Enterprise Storage 7:libirs-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Enterprise Storage 7:libirs1601-9.16.6-150000.12.65.1.aarch64",
"SUSE Enterprise Storage 7:libirs1601-9.16.6-150000.12.65.1.x86_64",
"SUSE Enterprise Storage 7:libisc1606-9.16.6-150000.12.65.1.aarch64",
"SUSE Enterprise Storage 7:libisc1606-9.16.6-150000.12.65.1.x86_64",
"SUSE Enterprise Storage 7:libisccc1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Enterprise Storage 7:libisccc1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Enterprise Storage 7:libisccfg1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Enterprise Storage 7:libisccfg1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Enterprise Storage 7:libns1604-9.16.6-150000.12.65.1.aarch64",
"SUSE Enterprise Storage 7:libns1604-9.16.6-150000.12.65.1.x86_64",
"SUSE Enterprise Storage 7:python3-bind-9.16.6-150000.12.65.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:bind-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:bind-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:bind-chrootenv-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:bind-chrootenv-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:bind-devel-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:bind-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:bind-doc-9.16.6-150000.12.65.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:bind-utils-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:bind-utils-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libbind9-1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libbind9-1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libdns1605-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libdns1605-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libirs-devel-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libirs-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libirs1601-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libirs1601-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libisc1606-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libisc1606-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libisccc1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libisccc1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libisccfg1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libisccfg1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libns1604-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libns1604-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:python3-bind-9.16.6-150000.12.65.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:bind-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:bind-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:bind-chrootenv-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:bind-chrootenv-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:bind-devel-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:bind-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:bind-doc-9.16.6-150000.12.65.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:bind-utils-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:bind-utils-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libbind9-1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libbind9-1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libdns1605-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libdns1605-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libirs-devel-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libirs-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libirs1601-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libirs1601-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libisc1606-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libisc1606-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libisccc1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libisccc1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libisccfg1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libisccfg1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libns1604-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libns1604-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:python3-bind-9.16.6-150000.12.65.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-chrootenv-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-chrootenv-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-chrootenv-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-chrootenv-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-devel-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-devel-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-devel-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-doc-9.16.6-150000.12.65.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-utils-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-utils-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-utils-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-utils-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libbind9-1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libbind9-1600-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libbind9-1600-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libbind9-1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libdns1605-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libdns1605-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libdns1605-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libdns1605-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libirs-devel-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libirs-devel-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libirs-devel-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libirs-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libirs1601-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libirs1601-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libirs1601-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libirs1601-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libisc1606-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libisc1606-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libisc1606-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libisc1606-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libisccc1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libisccc1600-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libisccc1600-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libisccc1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libisccfg1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libisccfg1600-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libisccfg1600-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libisccfg1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libns1604-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libns1604-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libns1604-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libns1604-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:python3-bind-9.16.6-150000.12.65.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-chrootenv-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-chrootenv-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-chrootenv-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-chrootenv-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-devel-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-devel-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-devel-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-doc-9.16.6-150000.12.65.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-utils-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-utils-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-utils-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-utils-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libbind9-1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libbind9-1600-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libbind9-1600-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libbind9-1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libdns1605-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libdns1605-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libdns1605-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libdns1605-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libirs-devel-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libirs-devel-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libirs-devel-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libirs-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libirs1601-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libirs1601-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libirs1601-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libirs1601-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libisc1606-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libisc1606-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libisc1606-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libisc1606-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libisccc1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libisccc1600-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libisccc1600-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libisccc1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libisccfg1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libisccfg1600-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libisccfg1600-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libisccfg1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libns1604-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libns1604-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libns1604-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libns1604-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:python3-bind-9.16.6-150000.12.65.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:bind-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:bind-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:bind-chrootenv-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:bind-chrootenv-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:bind-devel-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:bind-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:bind-doc-9.16.6-150000.12.65.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:bind-utils-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:bind-utils-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libbind9-1600-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libbind9-1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libdns1605-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libdns1605-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libirs-devel-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libirs-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libirs1601-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libirs1601-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libisc1606-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libisc1606-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libisccc1600-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libisccc1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libisccfg1600-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libisccfg1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libns1604-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libns1604-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:python3-bind-9.16.6-150000.12.65.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:bind-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:bind-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:bind-chrootenv-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:bind-chrootenv-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:bind-devel-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:bind-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:bind-doc-9.16.6-150000.12.65.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:bind-utils-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:bind-utils-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libbind9-1600-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libbind9-1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libdns1605-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libdns1605-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libirs-devel-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libirs-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libirs1601-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libirs1601-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libisc1606-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libisc1606-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libisccc1600-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libisccc1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libisccfg1600-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libisccfg1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libns1604-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libns1604-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:python3-bind-9.16.6-150000.12.65.1.noarch",
"SUSE Manager Client Tools 15:dracut-saltboot-0.1.1681904360.84ef141-150000.1.50.1.noarch",
"SUSE Manager Client Tools 15:grafana-9.5.1-150000.1.48.5.aarch64",
"SUSE Manager Client Tools 15:grafana-9.5.1-150000.1.48.5.ppc64le",
"SUSE Manager Client Tools 15:grafana-9.5.1-150000.1.48.5.s390x",
"SUSE Manager Client Tools 15:grafana-9.5.1-150000.1.48.5.x86_64",
"SUSE Manager Client Tools 15:mgr-daemon-4.3.7-150000.1.41.1.noarch",
"SUSE Manager Client Tools 15:python3-uyuni-common-libs-4.3.8-150000.1.33.1.aarch64",
"SUSE Manager Client Tools 15:python3-uyuni-common-libs-4.3.8-150000.1.33.1.ppc64le",
"SUSE Manager Client Tools 15:python3-uyuni-common-libs-4.3.8-150000.1.33.1.s390x",
"SUSE Manager Client Tools 15:python3-uyuni-common-libs-4.3.8-150000.1.33.1.x86_64",
"SUSE Manager Client Tools 15:python3-zypp-plugin-spacewalk-1.0.14-150000.3.35.1.noarch",
"SUSE Manager Client Tools 15:spacecmd-4.3.21-150000.3.98.1.noarch",
"SUSE Manager Client Tools 15:zypp-plugin-spacewalk-1.0.14-150000.3.35.1.noarch",
"SUSE Manager Client Tools for SLE Micro 5:bind-utils-9.16.6-150000.12.65.1.aarch64",
"SUSE Manager Client Tools for SLE Micro 5:bind-utils-9.16.6-150000.12.65.1.s390x",
"SUSE Manager Client Tools for SLE Micro 5:bind-utils-9.16.6-150000.12.65.1.x86_64",
"SUSE Manager Client Tools for SLE Micro 5:dracut-saltboot-0.1.1681904360.84ef141-150000.1.50.1.noarch",
"SUSE Manager Client Tools for SLE Micro 5:libbind9-1600-64bit-9.16.6-150000.12.65.1.aarch64_ilp32",
"SUSE Manager Client Tools for SLE Micro 5:libbind9-1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Manager Client Tools for SLE Micro 5:libbind9-1600-9.16.6-150000.12.65.1.s390x",
"SUSE Manager Client Tools for SLE Micro 5:libbind9-1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Manager Client Tools for SLE Micro 5:libdns1605-64bit-9.16.6-150000.12.65.1.aarch64_ilp32",
"SUSE Manager Client Tools for SLE Micro 5:libdns1605-9.16.6-150000.12.65.1.aarch64",
"SUSE Manager Client Tools for SLE Micro 5:libdns1605-9.16.6-150000.12.65.1.s390x",
"SUSE Manager Client Tools for SLE Micro 5:libdns1605-9.16.6-150000.12.65.1.x86_64",
"SUSE Manager Client Tools for SLE Micro 5:libirs1601-64bit-9.16.6-150000.12.65.1.aarch64_ilp32",
"SUSE Manager Client Tools for SLE Micro 5:libirs1601-9.16.6-150000.12.65.1.aarch64",
"SUSE Manager Client Tools for SLE Micro 5:libirs1601-9.16.6-150000.12.65.1.s390x",
"SUSE Manager Client Tools for SLE Micro 5:libirs1601-9.16.6-150000.12.65.1.x86_64",
"SUSE Manager Client Tools for SLE Micro 5:libisc1606-64bit-9.16.6-150000.12.65.1.aarch64_ilp32",
"SUSE Manager Client Tools for SLE Micro 5:libisc1606-9.16.6-150000.12.65.1.aarch64",
"SUSE Manager Client Tools for SLE Micro 5:libisc1606-9.16.6-150000.12.65.1.s390x",
"SUSE Manager Client Tools for SLE Micro 5:libisc1606-9.16.6-150000.12.65.1.x86_64",
"SUSE Manager Client Tools for SLE Micro 5:libisccc1600-64bit-9.16.6-150000.12.65.1.aarch64_ilp32",
"SUSE Manager Client Tools for SLE Micro 5:libisccc1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Manager Client Tools for SLE Micro 5:libisccc1600-9.16.6-150000.12.65.1.s390x",
"SUSE Manager Client Tools for SLE Micro 5:libisccc1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Manager Client Tools for SLE Micro 5:libisccfg1600-64bit-9.16.6-150000.12.65.1.aarch64_ilp32",
"SUSE Manager Client Tools for SLE Micro 5:libisccfg1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Manager Client Tools for SLE Micro 5:libisccfg1600-9.16.6-150000.12.65.1.s390x",
"SUSE Manager Client Tools for SLE Micro 5:libisccfg1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Manager Client Tools for SLE Micro 5:libns1604-9.16.6-150000.12.65.1.s390x",
"SUSE Manager Client Tools for SLE Micro 5:libns1604-9.16.6-150000.12.65.1.x86_64",
"SUSE Manager Client Tools for SLE Micro 5:python3-bind-9.16.6-150000.12.65.1.noarch",
"SUSE Manager Proxy Module 4.2:python3-zypp-plugin-spacewalk-1.0.14-150000.3.35.1.noarch",
"SUSE Manager Proxy Module 4.2:zypp-plugin-spacewalk-1.0.14-150000.3.35.1.noarch",
"SUSE Manager Proxy Module 4.3:python3-zypp-plugin-spacewalk-1.0.14-150000.3.35.1.noarch",
"SUSE Manager Proxy Module 4.3:zypp-plugin-spacewalk-1.0.14-150000.3.35.1.noarch",
"openSUSE Leap 15.4:bind-devel-32bit-9.16.6-150000.12.65.1.x86_64",
"openSUSE Leap 15.4:dracut-saltboot-0.1.1681904360.84ef141-150000.1.50.1.noarch",
"openSUSE Leap 15.4:libbind9-1600-32bit-9.16.6-150000.12.65.1.x86_64",
"openSUSE Leap 15.4:libdns1605-32bit-9.16.6-150000.12.65.1.x86_64",
"openSUSE Leap 15.4:libirs1601-32bit-9.16.6-150000.12.65.1.x86_64",
"openSUSE Leap 15.4:libisc1606-32bit-9.16.6-150000.12.65.1.x86_64",
"openSUSE Leap 15.4:libisccc1600-32bit-9.16.6-150000.12.65.1.x86_64",
"openSUSE Leap 15.4:libisccfg1600-32bit-9.16.6-150000.12.65.1.x86_64",
"openSUSE Leap 15.4:libns1604-32bit-9.16.6-150000.12.65.1.x86_64",
"openSUSE Leap 15.4:spacecmd-4.3.21-150000.3.98.1.noarch",
"openSUSE Leap 15.4:wire-0.5.0-150000.1.12.3.aarch64",
"openSUSE Leap 15.4:wire-0.5.0-150000.1.12.3.ppc64le",
"openSUSE Leap 15.4:wire-0.5.0-150000.1.12.3.s390x",
"openSUSE Leap 15.4:wire-0.5.0-150000.1.12.3.x86_64",
"openSUSE Leap 15.5:dracut-saltboot-0.1.1681904360.84ef141-150000.1.50.1.noarch",
"openSUSE Leap 15.5:spacecmd-4.3.21-150000.3.98.1.noarch",
"openSUSE Leap 15.5:wire-0.5.0-150000.1.12.3.aarch64",
"openSUSE Leap 15.5:wire-0.5.0-150000.1.12.3.ppc64le",
"openSUSE Leap 15.5:wire-0.5.0-150000.1.12.3.s390x",
"openSUSE Leap 15.5:wire-0.5.0-150000.1.12.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-35957",
"url": "https://www.suse.com/security/cve/CVE-2022-35957"
},
{
"category": "external",
"summary": "SUSE Bug 1203597 for CVE-2022-35957",
"url": "https://bugzilla.suse.com/1203597"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 7:bind-9.16.6-150000.12.65.1.aarch64",
"SUSE Enterprise Storage 7:bind-9.16.6-150000.12.65.1.x86_64",
"SUSE Enterprise Storage 7:bind-chrootenv-9.16.6-150000.12.65.1.aarch64",
"SUSE Enterprise Storage 7:bind-chrootenv-9.16.6-150000.12.65.1.x86_64",
"SUSE Enterprise Storage 7:bind-devel-9.16.6-150000.12.65.1.aarch64",
"SUSE Enterprise Storage 7:bind-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Enterprise Storage 7:bind-doc-9.16.6-150000.12.65.1.noarch",
"SUSE Enterprise Storage 7:bind-utils-9.16.6-150000.12.65.1.aarch64",
"SUSE Enterprise Storage 7:bind-utils-9.16.6-150000.12.65.1.x86_64",
"SUSE Enterprise Storage 7:libbind9-1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Enterprise Storage 7:libbind9-1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Enterprise Storage 7:libdns1605-9.16.6-150000.12.65.1.aarch64",
"SUSE Enterprise Storage 7:libdns1605-9.16.6-150000.12.65.1.x86_64",
"SUSE Enterprise Storage 7:libirs-devel-9.16.6-150000.12.65.1.aarch64",
"SUSE Enterprise Storage 7:libirs-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Enterprise Storage 7:libirs1601-9.16.6-150000.12.65.1.aarch64",
"SUSE Enterprise Storage 7:libirs1601-9.16.6-150000.12.65.1.x86_64",
"SUSE Enterprise Storage 7:libisc1606-9.16.6-150000.12.65.1.aarch64",
"SUSE Enterprise Storage 7:libisc1606-9.16.6-150000.12.65.1.x86_64",
"SUSE Enterprise Storage 7:libisccc1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Enterprise Storage 7:libisccc1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Enterprise Storage 7:libisccfg1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Enterprise Storage 7:libisccfg1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Enterprise Storage 7:libns1604-9.16.6-150000.12.65.1.aarch64",
"SUSE Enterprise Storage 7:libns1604-9.16.6-150000.12.65.1.x86_64",
"SUSE Enterprise Storage 7:python3-bind-9.16.6-150000.12.65.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:bind-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:bind-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:bind-chrootenv-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:bind-chrootenv-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:bind-devel-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:bind-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:bind-doc-9.16.6-150000.12.65.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:bind-utils-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:bind-utils-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libbind9-1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libbind9-1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libdns1605-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libdns1605-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libirs-devel-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libirs-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libirs1601-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libirs1601-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libisc1606-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libisc1606-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libisccc1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libisccc1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libisccfg1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libisccfg1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libns1604-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libns1604-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:python3-bind-9.16.6-150000.12.65.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:bind-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:bind-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:bind-chrootenv-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:bind-chrootenv-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:bind-devel-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:bind-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:bind-doc-9.16.6-150000.12.65.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:bind-utils-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:bind-utils-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libbind9-1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libbind9-1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libdns1605-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libdns1605-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libirs-devel-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libirs-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libirs1601-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libirs1601-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libisc1606-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libisc1606-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libisccc1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libisccc1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libisccfg1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libisccfg1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libns1604-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libns1604-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:python3-bind-9.16.6-150000.12.65.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-chrootenv-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-chrootenv-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-chrootenv-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-chrootenv-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-devel-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-devel-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-devel-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-doc-9.16.6-150000.12.65.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-utils-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-utils-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-utils-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-utils-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libbind9-1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libbind9-1600-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libbind9-1600-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libbind9-1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libdns1605-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libdns1605-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libdns1605-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libdns1605-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libirs-devel-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libirs-devel-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libirs-devel-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libirs-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libirs1601-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libirs1601-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libirs1601-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libirs1601-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libisc1606-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libisc1606-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libisc1606-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libisc1606-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libisccc1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libisccc1600-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libisccc1600-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libisccc1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libisccfg1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libisccfg1600-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libisccfg1600-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libisccfg1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libns1604-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libns1604-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libns1604-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libns1604-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:python3-bind-9.16.6-150000.12.65.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-chrootenv-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-chrootenv-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-chrootenv-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-chrootenv-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-devel-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-devel-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-devel-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-doc-9.16.6-150000.12.65.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-utils-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-utils-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-utils-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-utils-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libbind9-1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libbind9-1600-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libbind9-1600-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libbind9-1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libdns1605-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libdns1605-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libdns1605-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libdns1605-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libirs-devel-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libirs-devel-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libirs-devel-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libirs-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libirs1601-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libirs1601-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libirs1601-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libirs1601-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libisc1606-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libisc1606-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libisc1606-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libisc1606-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libisccc1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libisccc1600-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libisccc1600-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libisccc1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libisccfg1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libisccfg1600-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libisccfg1600-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libisccfg1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libns1604-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libns1604-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libns1604-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libns1604-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:python3-bind-9.16.6-150000.12.65.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:bind-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:bind-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:bind-chrootenv-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:bind-chrootenv-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:bind-devel-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:bind-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:bind-doc-9.16.6-150000.12.65.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:bind-utils-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:bind-utils-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libbind9-1600-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libbind9-1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libdns1605-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libdns1605-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libirs-devel-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libirs-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libirs1601-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libirs1601-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libisc1606-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libisc1606-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libisccc1600-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libisccc1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libisccfg1600-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libisccfg1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libns1604-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libns1604-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:python3-bind-9.16.6-150000.12.65.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:bind-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:bind-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:bind-chrootenv-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:bind-chrootenv-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:bind-devel-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:bind-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:bind-doc-9.16.6-150000.12.65.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:bind-utils-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:bind-utils-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libbind9-1600-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libbind9-1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libdns1605-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libdns1605-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libirs-devel-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libirs-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libirs1601-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libirs1601-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libisc1606-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libisc1606-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libisccc1600-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libisccc1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libisccfg1600-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libisccfg1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libns1604-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libns1604-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:python3-bind-9.16.6-150000.12.65.1.noarch",
"SUSE Manager Client Tools 15:dracut-saltboot-0.1.1681904360.84ef141-150000.1.50.1.noarch",
"SUSE Manager Client Tools 15:grafana-9.5.1-150000.1.48.5.aarch64",
"SUSE Manager Client Tools 15:grafana-9.5.1-150000.1.48.5.ppc64le",
"SUSE Manager Client Tools 15:grafana-9.5.1-150000.1.48.5.s390x",
"SUSE Manager Client Tools 15:grafana-9.5.1-150000.1.48.5.x86_64",
"SUSE Manager Client Tools 15:mgr-daemon-4.3.7-150000.1.41.1.noarch",
"SUSE Manager Client Tools 15:python3-uyuni-common-libs-4.3.8-150000.1.33.1.aarch64",
"SUSE Manager Client Tools 15:python3-uyuni-common-libs-4.3.8-150000.1.33.1.ppc64le",
"SUSE Manager Client Tools 15:python3-uyuni-common-libs-4.3.8-150000.1.33.1.s390x",
"SUSE Manager Client Tools 15:python3-uyuni-common-libs-4.3.8-150000.1.33.1.x86_64",
"SUSE Manager Client Tools 15:python3-zypp-plugin-spacewalk-1.0.14-150000.3.35.1.noarch",
"SUSE Manager Client Tools 15:spacecmd-4.3.21-150000.3.98.1.noarch",
"SUSE Manager Client Tools 15:zypp-plugin-spacewalk-1.0.14-150000.3.35.1.noarch",
"SUSE Manager Client Tools for SLE Micro 5:bind-utils-9.16.6-150000.12.65.1.aarch64",
"SUSE Manager Client Tools for SLE Micro 5:bind-utils-9.16.6-150000.12.65.1.s390x",
"SUSE Manager Client Tools for SLE Micro 5:bind-utils-9.16.6-150000.12.65.1.x86_64",
"SUSE Manager Client Tools for SLE Micro 5:dracut-saltboot-0.1.1681904360.84ef141-150000.1.50.1.noarch",
"SUSE Manager Client Tools for SLE Micro 5:libbind9-1600-64bit-9.16.6-150000.12.65.1.aarch64_ilp32",
"SUSE Manager Client Tools for SLE Micro 5:libbind9-1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Manager Client Tools for SLE Micro 5:libbind9-1600-9.16.6-150000.12.65.1.s390x",
"SUSE Manager Client Tools for SLE Micro 5:libbind9-1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Manager Client Tools for SLE Micro 5:libdns1605-64bit-9.16.6-150000.12.65.1.aarch64_ilp32",
"SUSE Manager Client Tools for SLE Micro 5:libdns1605-9.16.6-150000.12.65.1.aarch64",
"SUSE Manager Client Tools for SLE Micro 5:libdns1605-9.16.6-150000.12.65.1.s390x",
"SUSE Manager Client Tools for SLE Micro 5:libdns1605-9.16.6-150000.12.65.1.x86_64",
"SUSE Manager Client Tools for SLE Micro 5:libirs1601-64bit-9.16.6-150000.12.65.1.aarch64_ilp32",
"SUSE Manager Client Tools for SLE Micro 5:libirs1601-9.16.6-150000.12.65.1.aarch64",
"SUSE Manager Client Tools for SLE Micro 5:libirs1601-9.16.6-150000.12.65.1.s390x",
"SUSE Manager Client Tools for SLE Micro 5:libirs1601-9.16.6-150000.12.65.1.x86_64",
"SUSE Manager Client Tools for SLE Micro 5:libisc1606-64bit-9.16.6-150000.12.65.1.aarch64_ilp32",
"SUSE Manager Client Tools for SLE Micro 5:libisc1606-9.16.6-150000.12.65.1.aarch64",
"SUSE Manager Client Tools for SLE Micro 5:libisc1606-9.16.6-150000.12.65.1.s390x",
"SUSE Manager Client Tools for SLE Micro 5:libisc1606-9.16.6-150000.12.65.1.x86_64",
"SUSE Manager Client Tools for SLE Micro 5:libisccc1600-64bit-9.16.6-150000.12.65.1.aarch64_ilp32",
"SUSE Manager Client Tools for SLE Micro 5:libisccc1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Manager Client Tools for SLE Micro 5:libisccc1600-9.16.6-150000.12.65.1.s390x",
"SUSE Manager Client Tools for SLE Micro 5:libisccc1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Manager Client Tools for SLE Micro 5:libisccfg1600-64bit-9.16.6-150000.12.65.1.aarch64_ilp32",
"SUSE Manager Client Tools for SLE Micro 5:libisccfg1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Manager Client Tools for SLE Micro 5:libisccfg1600-9.16.6-150000.12.65.1.s390x",
"SUSE Manager Client Tools for SLE Micro 5:libisccfg1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Manager Client Tools for SLE Micro 5:libns1604-9.16.6-150000.12.65.1.s390x",
"SUSE Manager Client Tools for SLE Micro 5:libns1604-9.16.6-150000.12.65.1.x86_64",
"SUSE Manager Client Tools for SLE Micro 5:python3-bind-9.16.6-150000.12.65.1.noarch",
"SUSE Manager Proxy Module 4.2:python3-zypp-plugin-spacewalk-1.0.14-150000.3.35.1.noarch",
"SUSE Manager Proxy Module 4.2:zypp-plugin-spacewalk-1.0.14-150000.3.35.1.noarch",
"SUSE Manager Proxy Module 4.3:python3-zypp-plugin-spacewalk-1.0.14-150000.3.35.1.noarch",
"SUSE Manager Proxy Module 4.3:zypp-plugin-spacewalk-1.0.14-150000.3.35.1.noarch",
"openSUSE Leap 15.4:bind-devel-32bit-9.16.6-150000.12.65.1.x86_64",
"openSUSE Leap 15.4:dracut-saltboot-0.1.1681904360.84ef141-150000.1.50.1.noarch",
"openSUSE Leap 15.4:libbind9-1600-32bit-9.16.6-150000.12.65.1.x86_64",
"openSUSE Leap 15.4:libdns1605-32bit-9.16.6-150000.12.65.1.x86_64",
"openSUSE Leap 15.4:libirs1601-32bit-9.16.6-150000.12.65.1.x86_64",
"openSUSE Leap 15.4:libisc1606-32bit-9.16.6-150000.12.65.1.x86_64",
"openSUSE Leap 15.4:libisccc1600-32bit-9.16.6-150000.12.65.1.x86_64",
"openSUSE Leap 15.4:libisccfg1600-32bit-9.16.6-150000.12.65.1.x86_64",
"openSUSE Leap 15.4:libns1604-32bit-9.16.6-150000.12.65.1.x86_64",
"openSUSE Leap 15.4:spacecmd-4.3.21-150000.3.98.1.noarch",
"openSUSE Leap 15.4:wire-0.5.0-150000.1.12.3.aarch64",
"openSUSE Leap 15.4:wire-0.5.0-150000.1.12.3.ppc64le",
"openSUSE Leap 15.4:wire-0.5.0-150000.1.12.3.s390x",
"openSUSE Leap 15.4:wire-0.5.0-150000.1.12.3.x86_64",
"openSUSE Leap 15.5:dracut-saltboot-0.1.1681904360.84ef141-150000.1.50.1.noarch",
"openSUSE Leap 15.5:spacecmd-4.3.21-150000.3.98.1.noarch",
"openSUSE Leap 15.5:wire-0.5.0-150000.1.12.3.aarch64",
"openSUSE Leap 15.5:wire-0.5.0-150000.1.12.3.ppc64le",
"openSUSE Leap 15.5:wire-0.5.0-150000.1.12.3.s390x",
"openSUSE Leap 15.5:wire-0.5.0-150000.1.12.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 7:bind-9.16.6-150000.12.65.1.aarch64",
"SUSE Enterprise Storage 7:bind-9.16.6-150000.12.65.1.x86_64",
"SUSE Enterprise Storage 7:bind-chrootenv-9.16.6-150000.12.65.1.aarch64",
"SUSE Enterprise Storage 7:bind-chrootenv-9.16.6-150000.12.65.1.x86_64",
"SUSE Enterprise Storage 7:bind-devel-9.16.6-150000.12.65.1.aarch64",
"SUSE Enterprise Storage 7:bind-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Enterprise Storage 7:bind-doc-9.16.6-150000.12.65.1.noarch",
"SUSE Enterprise Storage 7:bind-utils-9.16.6-150000.12.65.1.aarch64",
"SUSE Enterprise Storage 7:bind-utils-9.16.6-150000.12.65.1.x86_64",
"SUSE Enterprise Storage 7:libbind9-1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Enterprise Storage 7:libbind9-1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Enterprise Storage 7:libdns1605-9.16.6-150000.12.65.1.aarch64",
"SUSE Enterprise Storage 7:libdns1605-9.16.6-150000.12.65.1.x86_64",
"SUSE Enterprise Storage 7:libirs-devel-9.16.6-150000.12.65.1.aarch64",
"SUSE Enterprise Storage 7:libirs-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Enterprise Storage 7:libirs1601-9.16.6-150000.12.65.1.aarch64",
"SUSE Enterprise Storage 7:libirs1601-9.16.6-150000.12.65.1.x86_64",
"SUSE Enterprise Storage 7:libisc1606-9.16.6-150000.12.65.1.aarch64",
"SUSE Enterprise Storage 7:libisc1606-9.16.6-150000.12.65.1.x86_64",
"SUSE Enterprise Storage 7:libisccc1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Enterprise Storage 7:libisccc1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Enterprise Storage 7:libisccfg1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Enterprise Storage 7:libisccfg1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Enterprise Storage 7:libns1604-9.16.6-150000.12.65.1.aarch64",
"SUSE Enterprise Storage 7:libns1604-9.16.6-150000.12.65.1.x86_64",
"SUSE Enterprise Storage 7:python3-bind-9.16.6-150000.12.65.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:bind-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:bind-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:bind-chrootenv-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:bind-chrootenv-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:bind-devel-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:bind-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:bind-doc-9.16.6-150000.12.65.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:bind-utils-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:bind-utils-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libbind9-1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libbind9-1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libdns1605-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libdns1605-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libirs-devel-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libirs-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libirs1601-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libirs1601-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libisc1606-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libisc1606-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libisccc1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libisccc1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libisccfg1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libisccfg1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libns1604-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libns1604-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:python3-bind-9.16.6-150000.12.65.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:bind-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:bind-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:bind-chrootenv-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:bind-chrootenv-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:bind-devel-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:bind-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:bind-doc-9.16.6-150000.12.65.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:bind-utils-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:bind-utils-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libbind9-1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libbind9-1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libdns1605-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libdns1605-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libirs-devel-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libirs-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libirs1601-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libirs1601-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libisc1606-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libisc1606-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libisccc1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libisccc1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libisccfg1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libisccfg1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libns1604-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libns1604-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:python3-bind-9.16.6-150000.12.65.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-chrootenv-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-chrootenv-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-chrootenv-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-chrootenv-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-devel-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-devel-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-devel-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-doc-9.16.6-150000.12.65.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-utils-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-utils-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-utils-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-utils-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libbind9-1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libbind9-1600-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libbind9-1600-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libbind9-1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libdns1605-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libdns1605-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libdns1605-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libdns1605-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libirs-devel-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libirs-devel-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libirs-devel-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libirs-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libirs1601-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libirs1601-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libirs1601-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libirs1601-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libisc1606-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libisc1606-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libisc1606-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libisc1606-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libisccc1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libisccc1600-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libisccc1600-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libisccc1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libisccfg1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libisccfg1600-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libisccfg1600-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libisccfg1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libns1604-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libns1604-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libns1604-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libns1604-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:python3-bind-9.16.6-150000.12.65.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-chrootenv-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-chrootenv-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-chrootenv-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-chrootenv-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-devel-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-devel-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-devel-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-doc-9.16.6-150000.12.65.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-utils-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-utils-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-utils-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-utils-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libbind9-1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libbind9-1600-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libbind9-1600-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libbind9-1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libdns1605-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libdns1605-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libdns1605-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libdns1605-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libirs-devel-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libirs-devel-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libirs-devel-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libirs-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libirs1601-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libirs1601-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libirs1601-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libirs1601-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libisc1606-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libisc1606-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libisc1606-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libisc1606-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libisccc1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libisccc1600-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libisccc1600-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libisccc1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libisccfg1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libisccfg1600-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libisccfg1600-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libisccfg1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libns1604-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libns1604-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libns1604-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libns1604-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:python3-bind-9.16.6-150000.12.65.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:bind-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:bind-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:bind-chrootenv-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:bind-chrootenv-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:bind-devel-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:bind-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:bind-doc-9.16.6-150000.12.65.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:bind-utils-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:bind-utils-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libbind9-1600-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libbind9-1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libdns1605-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libdns1605-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libirs-devel-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libirs-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libirs1601-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libirs1601-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libisc1606-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libisc1606-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libisccc1600-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libisccc1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libisccfg1600-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libisccfg1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libns1604-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libns1604-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:python3-bind-9.16.6-150000.12.65.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:bind-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:bind-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:bind-chrootenv-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:bind-chrootenv-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:bind-devel-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:bind-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:bind-doc-9.16.6-150000.12.65.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:bind-utils-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:bind-utils-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libbind9-1600-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libbind9-1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libdns1605-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libdns1605-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libirs-devel-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libirs-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libirs1601-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libirs1601-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libisc1606-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libisc1606-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libisccc1600-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libisccc1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libisccfg1600-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libisccfg1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libns1604-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libns1604-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:python3-bind-9.16.6-150000.12.65.1.noarch",
"SUSE Manager Client Tools 15:dracut-saltboot-0.1.1681904360.84ef141-150000.1.50.1.noarch",
"SUSE Manager Client Tools 15:grafana-9.5.1-150000.1.48.5.aarch64",
"SUSE Manager Client Tools 15:grafana-9.5.1-150000.1.48.5.ppc64le",
"SUSE Manager Client Tools 15:grafana-9.5.1-150000.1.48.5.s390x",
"SUSE Manager Client Tools 15:grafana-9.5.1-150000.1.48.5.x86_64",
"SUSE Manager Client Tools 15:mgr-daemon-4.3.7-150000.1.41.1.noarch",
"SUSE Manager Client Tools 15:python3-uyuni-common-libs-4.3.8-150000.1.33.1.aarch64",
"SUSE Manager Client Tools 15:python3-uyuni-common-libs-4.3.8-150000.1.33.1.ppc64le",
"SUSE Manager Client Tools 15:python3-uyuni-common-libs-4.3.8-150000.1.33.1.s390x",
"SUSE Manager Client Tools 15:python3-uyuni-common-libs-4.3.8-150000.1.33.1.x86_64",
"SUSE Manager Client Tools 15:python3-zypp-plugin-spacewalk-1.0.14-150000.3.35.1.noarch",
"SUSE Manager Client Tools 15:spacecmd-4.3.21-150000.3.98.1.noarch",
"SUSE Manager Client Tools 15:zypp-plugin-spacewalk-1.0.14-150000.3.35.1.noarch",
"SUSE Manager Client Tools for SLE Micro 5:bind-utils-9.16.6-150000.12.65.1.aarch64",
"SUSE Manager Client Tools for SLE Micro 5:bind-utils-9.16.6-150000.12.65.1.s390x",
"SUSE Manager Client Tools for SLE Micro 5:bind-utils-9.16.6-150000.12.65.1.x86_64",
"SUSE Manager Client Tools for SLE Micro 5:dracut-saltboot-0.1.1681904360.84ef141-150000.1.50.1.noarch",
"SUSE Manager Client Tools for SLE Micro 5:libbind9-1600-64bit-9.16.6-150000.12.65.1.aarch64_ilp32",
"SUSE Manager Client Tools for SLE Micro 5:libbind9-1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Manager Client Tools for SLE Micro 5:libbind9-1600-9.16.6-150000.12.65.1.s390x",
"SUSE Manager Client Tools for SLE Micro 5:libbind9-1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Manager Client Tools for SLE Micro 5:libdns1605-64bit-9.16.6-150000.12.65.1.aarch64_ilp32",
"SUSE Manager Client Tools for SLE Micro 5:libdns1605-9.16.6-150000.12.65.1.aarch64",
"SUSE Manager Client Tools for SLE Micro 5:libdns1605-9.16.6-150000.12.65.1.s390x",
"SUSE Manager Client Tools for SLE Micro 5:libdns1605-9.16.6-150000.12.65.1.x86_64",
"SUSE Manager Client Tools for SLE Micro 5:libirs1601-64bit-9.16.6-150000.12.65.1.aarch64_ilp32",
"SUSE Manager Client Tools for SLE Micro 5:libirs1601-9.16.6-150000.12.65.1.aarch64",
"SUSE Manager Client Tools for SLE Micro 5:libirs1601-9.16.6-150000.12.65.1.s390x",
"SUSE Manager Client Tools for SLE Micro 5:libirs1601-9.16.6-150000.12.65.1.x86_64",
"SUSE Manager Client Tools for SLE Micro 5:libisc1606-64bit-9.16.6-150000.12.65.1.aarch64_ilp32",
"SUSE Manager Client Tools for SLE Micro 5:libisc1606-9.16.6-150000.12.65.1.aarch64",
"SUSE Manager Client Tools for SLE Micro 5:libisc1606-9.16.6-150000.12.65.1.s390x",
"SUSE Manager Client Tools for SLE Micro 5:libisc1606-9.16.6-150000.12.65.1.x86_64",
"SUSE Manager Client Tools for SLE Micro 5:libisccc1600-64bit-9.16.6-150000.12.65.1.aarch64_ilp32",
"SUSE Manager Client Tools for SLE Micro 5:libisccc1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Manager Client Tools for SLE Micro 5:libisccc1600-9.16.6-150000.12.65.1.s390x",
"SUSE Manager Client Tools for SLE Micro 5:libisccc1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Manager Client Tools for SLE Micro 5:libisccfg1600-64bit-9.16.6-150000.12.65.1.aarch64_ilp32",
"SUSE Manager Client Tools for SLE Micro 5:libisccfg1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Manager Client Tools for SLE Micro 5:libisccfg1600-9.16.6-150000.12.65.1.s390x",
"SUSE Manager Client Tools for SLE Micro 5:libisccfg1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Manager Client Tools for SLE Micro 5:libns1604-9.16.6-150000.12.65.1.s390x",
"SUSE Manager Client Tools for SLE Micro 5:libns1604-9.16.6-150000.12.65.1.x86_64",
"SUSE Manager Client Tools for SLE Micro 5:python3-bind-9.16.6-150000.12.65.1.noarch",
"SUSE Manager Proxy Module 4.2:python3-zypp-plugin-spacewalk-1.0.14-150000.3.35.1.noarch",
"SUSE Manager Proxy Module 4.2:zypp-plugin-spacewalk-1.0.14-150000.3.35.1.noarch",
"SUSE Manager Proxy Module 4.3:python3-zypp-plugin-spacewalk-1.0.14-150000.3.35.1.noarch",
"SUSE Manager Proxy Module 4.3:zypp-plugin-spacewalk-1.0.14-150000.3.35.1.noarch",
"openSUSE Leap 15.4:bind-devel-32bit-9.16.6-150000.12.65.1.x86_64",
"openSUSE Leap 15.4:dracut-saltboot-0.1.1681904360.84ef141-150000.1.50.1.noarch",
"openSUSE Leap 15.4:libbind9-1600-32bit-9.16.6-150000.12.65.1.x86_64",
"openSUSE Leap 15.4:libdns1605-32bit-9.16.6-150000.12.65.1.x86_64",
"openSUSE Leap 15.4:libirs1601-32bit-9.16.6-150000.12.65.1.x86_64",
"openSUSE Leap 15.4:libisc1606-32bit-9.16.6-150000.12.65.1.x86_64",
"openSUSE Leap 15.4:libisccc1600-32bit-9.16.6-150000.12.65.1.x86_64",
"openSUSE Leap 15.4:libisccfg1600-32bit-9.16.6-150000.12.65.1.x86_64",
"openSUSE Leap 15.4:libns1604-32bit-9.16.6-150000.12.65.1.x86_64",
"openSUSE Leap 15.4:spacecmd-4.3.21-150000.3.98.1.noarch",
"openSUSE Leap 15.4:wire-0.5.0-150000.1.12.3.aarch64",
"openSUSE Leap 15.4:wire-0.5.0-150000.1.12.3.ppc64le",
"openSUSE Leap 15.4:wire-0.5.0-150000.1.12.3.s390x",
"openSUSE Leap 15.4:wire-0.5.0-150000.1.12.3.x86_64",
"openSUSE Leap 15.5:dracut-saltboot-0.1.1681904360.84ef141-150000.1.50.1.noarch",
"openSUSE Leap 15.5:spacecmd-4.3.21-150000.3.98.1.noarch",
"openSUSE Leap 15.5:wire-0.5.0-150000.1.12.3.aarch64",
"openSUSE Leap 15.5:wire-0.5.0-150000.1.12.3.ppc64le",
"openSUSE Leap 15.5:wire-0.5.0-150000.1.12.3.s390x",
"openSUSE Leap 15.5:wire-0.5.0-150000.1.12.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2023-06-21T11:49:43Z",
"details": "moderate"
}
],
"title": "CVE-2022-35957"
},
{
"cve": "CVE-2022-36062",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-36062"
}
],
"notes": [
{
"category": "general",
"text": "Grafana is an open-source platform for monitoring and observability. In versions prior to 8.5.13, 9.0.9, and 9.1.6, Grafana is subject to Improper Preservation of Permissions resulting in privilege escalation on some folders where Admin is the only used permission. The vulnerability impacts Grafana instances where RBAC was disabled and enabled afterwards, as the migrations which are translating legacy folder permissions to RBAC permissions do not account for the scenario where the only user permission in the folder is Admin, as a result RBAC adds permissions for Editors and Viewers which allow them to edit and view folders accordingly. This issue has been patched in versions 8.5.13, 9.0.9, and 9.1.6. A workaround when the impacted folder/dashboard is known is to remove the additional permissions manually.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 7:bind-9.16.6-150000.12.65.1.aarch64",
"SUSE Enterprise Storage 7:bind-9.16.6-150000.12.65.1.x86_64",
"SUSE Enterprise Storage 7:bind-chrootenv-9.16.6-150000.12.65.1.aarch64",
"SUSE Enterprise Storage 7:bind-chrootenv-9.16.6-150000.12.65.1.x86_64",
"SUSE Enterprise Storage 7:bind-devel-9.16.6-150000.12.65.1.aarch64",
"SUSE Enterprise Storage 7:bind-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Enterprise Storage 7:bind-doc-9.16.6-150000.12.65.1.noarch",
"SUSE Enterprise Storage 7:bind-utils-9.16.6-150000.12.65.1.aarch64",
"SUSE Enterprise Storage 7:bind-utils-9.16.6-150000.12.65.1.x86_64",
"SUSE Enterprise Storage 7:libbind9-1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Enterprise Storage 7:libbind9-1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Enterprise Storage 7:libdns1605-9.16.6-150000.12.65.1.aarch64",
"SUSE Enterprise Storage 7:libdns1605-9.16.6-150000.12.65.1.x86_64",
"SUSE Enterprise Storage 7:libirs-devel-9.16.6-150000.12.65.1.aarch64",
"SUSE Enterprise Storage 7:libirs-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Enterprise Storage 7:libirs1601-9.16.6-150000.12.65.1.aarch64",
"SUSE Enterprise Storage 7:libirs1601-9.16.6-150000.12.65.1.x86_64",
"SUSE Enterprise Storage 7:libisc1606-9.16.6-150000.12.65.1.aarch64",
"SUSE Enterprise Storage 7:libisc1606-9.16.6-150000.12.65.1.x86_64",
"SUSE Enterprise Storage 7:libisccc1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Enterprise Storage 7:libisccc1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Enterprise Storage 7:libisccfg1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Enterprise Storage 7:libisccfg1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Enterprise Storage 7:libns1604-9.16.6-150000.12.65.1.aarch64",
"SUSE Enterprise Storage 7:libns1604-9.16.6-150000.12.65.1.x86_64",
"SUSE Enterprise Storage 7:python3-bind-9.16.6-150000.12.65.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:bind-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:bind-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:bind-chrootenv-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:bind-chrootenv-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:bind-devel-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:bind-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:bind-doc-9.16.6-150000.12.65.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:bind-utils-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:bind-utils-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libbind9-1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libbind9-1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libdns1605-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libdns1605-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libirs-devel-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libirs-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libirs1601-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libirs1601-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libisc1606-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libisc1606-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libisccc1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libisccc1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libisccfg1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libisccfg1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libns1604-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libns1604-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:python3-bind-9.16.6-150000.12.65.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:bind-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:bind-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:bind-chrootenv-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:bind-chrootenv-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:bind-devel-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:bind-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:bind-doc-9.16.6-150000.12.65.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:bind-utils-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:bind-utils-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libbind9-1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libbind9-1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libdns1605-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libdns1605-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libirs-devel-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libirs-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libirs1601-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libirs1601-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libisc1606-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libisc1606-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libisccc1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libisccc1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libisccfg1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libisccfg1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libns1604-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libns1604-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:python3-bind-9.16.6-150000.12.65.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-chrootenv-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-chrootenv-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-chrootenv-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-chrootenv-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-devel-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-devel-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-devel-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-doc-9.16.6-150000.12.65.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-utils-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-utils-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-utils-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-utils-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libbind9-1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libbind9-1600-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libbind9-1600-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libbind9-1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libdns1605-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libdns1605-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libdns1605-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libdns1605-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libirs-devel-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libirs-devel-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libirs-devel-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libirs-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libirs1601-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libirs1601-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libirs1601-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libirs1601-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libisc1606-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libisc1606-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libisc1606-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libisc1606-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libisccc1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libisccc1600-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libisccc1600-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libisccc1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libisccfg1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libisccfg1600-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libisccfg1600-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libisccfg1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libns1604-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libns1604-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libns1604-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libns1604-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:python3-bind-9.16.6-150000.12.65.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-chrootenv-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-chrootenv-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-chrootenv-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-chrootenv-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-devel-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-devel-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-devel-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-doc-9.16.6-150000.12.65.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-utils-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-utils-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-utils-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-utils-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libbind9-1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libbind9-1600-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libbind9-1600-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libbind9-1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libdns1605-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libdns1605-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libdns1605-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libdns1605-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libirs-devel-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libirs-devel-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libirs-devel-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libirs-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libirs1601-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libirs1601-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libirs1601-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libirs1601-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libisc1606-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libisc1606-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libisc1606-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libisc1606-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libisccc1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libisccc1600-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libisccc1600-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libisccc1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libisccfg1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libisccfg1600-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libisccfg1600-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libisccfg1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libns1604-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libns1604-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libns1604-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libns1604-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:python3-bind-9.16.6-150000.12.65.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:bind-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:bind-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:bind-chrootenv-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:bind-chrootenv-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:bind-devel-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:bind-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:bind-doc-9.16.6-150000.12.65.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:bind-utils-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:bind-utils-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libbind9-1600-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libbind9-1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libdns1605-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libdns1605-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libirs-devel-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libirs-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libirs1601-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libirs1601-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libisc1606-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libisc1606-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libisccc1600-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libisccc1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libisccfg1600-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libisccfg1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libns1604-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libns1604-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:python3-bind-9.16.6-150000.12.65.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:bind-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:bind-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:bind-chrootenv-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:bind-chrootenv-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:bind-devel-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:bind-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:bind-doc-9.16.6-150000.12.65.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:bind-utils-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:bind-utils-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libbind9-1600-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libbind9-1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libdns1605-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libdns1605-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libirs-devel-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libirs-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libirs1601-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libirs1601-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libisc1606-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libisc1606-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libisccc1600-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libisccc1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libisccfg1600-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libisccfg1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libns1604-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libns1604-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:python3-bind-9.16.6-150000.12.65.1.noarch",
"SUSE Manager Client Tools 15:dracut-saltboot-0.1.1681904360.84ef141-150000.1.50.1.noarch",
"SUSE Manager Client Tools 15:grafana-9.5.1-150000.1.48.5.aarch64",
"SUSE Manager Client Tools 15:grafana-9.5.1-150000.1.48.5.ppc64le",
"SUSE Manager Client Tools 15:grafana-9.5.1-150000.1.48.5.s390x",
"SUSE Manager Client Tools 15:grafana-9.5.1-150000.1.48.5.x86_64",
"SUSE Manager Client Tools 15:mgr-daemon-4.3.7-150000.1.41.1.noarch",
"SUSE Manager Client Tools 15:python3-uyuni-common-libs-4.3.8-150000.1.33.1.aarch64",
"SUSE Manager Client Tools 15:python3-uyuni-common-libs-4.3.8-150000.1.33.1.ppc64le",
"SUSE Manager Client Tools 15:python3-uyuni-common-libs-4.3.8-150000.1.33.1.s390x",
"SUSE Manager Client Tools 15:python3-uyuni-common-libs-4.3.8-150000.1.33.1.x86_64",
"SUSE Manager Client Tools 15:python3-zypp-plugin-spacewalk-1.0.14-150000.3.35.1.noarch",
"SUSE Manager Client Tools 15:spacecmd-4.3.21-150000.3.98.1.noarch",
"SUSE Manager Client Tools 15:zypp-plugin-spacewalk-1.0.14-150000.3.35.1.noarch",
"SUSE Manager Client Tools for SLE Micro 5:bind-utils-9.16.6-150000.12.65.1.aarch64",
"SUSE Manager Client Tools for SLE Micro 5:bind-utils-9.16.6-150000.12.65.1.s390x",
"SUSE Manager Client Tools for SLE Micro 5:bind-utils-9.16.6-150000.12.65.1.x86_64",
"SUSE Manager Client Tools for SLE Micro 5:dracut-saltboot-0.1.1681904360.84ef141-150000.1.50.1.noarch",
"SUSE Manager Client Tools for SLE Micro 5:libbind9-1600-64bit-9.16.6-150000.12.65.1.aarch64_ilp32",
"SUSE Manager Client Tools for SLE Micro 5:libbind9-1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Manager Client Tools for SLE Micro 5:libbind9-1600-9.16.6-150000.12.65.1.s390x",
"SUSE Manager Client Tools for SLE Micro 5:libbind9-1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Manager Client Tools for SLE Micro 5:libdns1605-64bit-9.16.6-150000.12.65.1.aarch64_ilp32",
"SUSE Manager Client Tools for SLE Micro 5:libdns1605-9.16.6-150000.12.65.1.aarch64",
"SUSE Manager Client Tools for SLE Micro 5:libdns1605-9.16.6-150000.12.65.1.s390x",
"SUSE Manager Client Tools for SLE Micro 5:libdns1605-9.16.6-150000.12.65.1.x86_64",
"SUSE Manager Client Tools for SLE Micro 5:libirs1601-64bit-9.16.6-150000.12.65.1.aarch64_ilp32",
"SUSE Manager Client Tools for SLE Micro 5:libirs1601-9.16.6-150000.12.65.1.aarch64",
"SUSE Manager Client Tools for SLE Micro 5:libirs1601-9.16.6-150000.12.65.1.s390x",
"SUSE Manager Client Tools for SLE Micro 5:libirs1601-9.16.6-150000.12.65.1.x86_64",
"SUSE Manager Client Tools for SLE Micro 5:libisc1606-64bit-9.16.6-150000.12.65.1.aarch64_ilp32",
"SUSE Manager Client Tools for SLE Micro 5:libisc1606-9.16.6-150000.12.65.1.aarch64",
"SUSE Manager Client Tools for SLE Micro 5:libisc1606-9.16.6-150000.12.65.1.s390x",
"SUSE Manager Client Tools for SLE Micro 5:libisc1606-9.16.6-150000.12.65.1.x86_64",
"SUSE Manager Client Tools for SLE Micro 5:libisccc1600-64bit-9.16.6-150000.12.65.1.aarch64_ilp32",
"SUSE Manager Client Tools for SLE Micro 5:libisccc1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Manager Client Tools for SLE Micro 5:libisccc1600-9.16.6-150000.12.65.1.s390x",
"SUSE Manager Client Tools for SLE Micro 5:libisccc1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Manager Client Tools for SLE Micro 5:libisccfg1600-64bit-9.16.6-150000.12.65.1.aarch64_ilp32",
"SUSE Manager Client Tools for SLE Micro 5:libisccfg1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Manager Client Tools for SLE Micro 5:libisccfg1600-9.16.6-150000.12.65.1.s390x",
"SUSE Manager Client Tools for SLE Micro 5:libisccfg1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Manager Client Tools for SLE Micro 5:libns1604-9.16.6-150000.12.65.1.s390x",
"SUSE Manager Client Tools for SLE Micro 5:libns1604-9.16.6-150000.12.65.1.x86_64",
"SUSE Manager Client Tools for SLE Micro 5:python3-bind-9.16.6-150000.12.65.1.noarch",
"SUSE Manager Proxy Module 4.2:python3-zypp-plugin-spacewalk-1.0.14-150000.3.35.1.noarch",
"SUSE Manager Proxy Module 4.2:zypp-plugin-spacewalk-1.0.14-150000.3.35.1.noarch",
"SUSE Manager Proxy Module 4.3:python3-zypp-plugin-spacewalk-1.0.14-150000.3.35.1.noarch",
"SUSE Manager Proxy Module 4.3:zypp-plugin-spacewalk-1.0.14-150000.3.35.1.noarch",
"openSUSE Leap 15.4:bind-devel-32bit-9.16.6-150000.12.65.1.x86_64",
"openSUSE Leap 15.4:dracut-saltboot-0.1.1681904360.84ef141-150000.1.50.1.noarch",
"openSUSE Leap 15.4:libbind9-1600-32bit-9.16.6-150000.12.65.1.x86_64",
"openSUSE Leap 15.4:libdns1605-32bit-9.16.6-150000.12.65.1.x86_64",
"openSUSE Leap 15.4:libirs1601-32bit-9.16.6-150000.12.65.1.x86_64",
"openSUSE Leap 15.4:libisc1606-32bit-9.16.6-150000.12.65.1.x86_64",
"openSUSE Leap 15.4:libisccc1600-32bit-9.16.6-150000.12.65.1.x86_64",
"openSUSE Leap 15.4:libisccfg1600-32bit-9.16.6-150000.12.65.1.x86_64",
"openSUSE Leap 15.4:libns1604-32bit-9.16.6-150000.12.65.1.x86_64",
"openSUSE Leap 15.4:spacecmd-4.3.21-150000.3.98.1.noarch",
"openSUSE Leap 15.4:wire-0.5.0-150000.1.12.3.aarch64",
"openSUSE Leap 15.4:wire-0.5.0-150000.1.12.3.ppc64le",
"openSUSE Leap 15.4:wire-0.5.0-150000.1.12.3.s390x",
"openSUSE Leap 15.4:wire-0.5.0-150000.1.12.3.x86_64",
"openSUSE Leap 15.5:dracut-saltboot-0.1.1681904360.84ef141-150000.1.50.1.noarch",
"openSUSE Leap 15.5:spacecmd-4.3.21-150000.3.98.1.noarch",
"openSUSE Leap 15.5:wire-0.5.0-150000.1.12.3.aarch64",
"openSUSE Leap 15.5:wire-0.5.0-150000.1.12.3.ppc64le",
"openSUSE Leap 15.5:wire-0.5.0-150000.1.12.3.s390x",
"openSUSE Leap 15.5:wire-0.5.0-150000.1.12.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-36062",
"url": "https://www.suse.com/security/cve/CVE-2022-36062"
},
{
"category": "external",
"summary": "SUSE Bug 1203596 for CVE-2022-36062",
"url": "https://bugzilla.suse.com/1203596"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 7:bind-9.16.6-150000.12.65.1.aarch64",
"SUSE Enterprise Storage 7:bind-9.16.6-150000.12.65.1.x86_64",
"SUSE Enterprise Storage 7:bind-chrootenv-9.16.6-150000.12.65.1.aarch64",
"SUSE Enterprise Storage 7:bind-chrootenv-9.16.6-150000.12.65.1.x86_64",
"SUSE Enterprise Storage 7:bind-devel-9.16.6-150000.12.65.1.aarch64",
"SUSE Enterprise Storage 7:bind-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Enterprise Storage 7:bind-doc-9.16.6-150000.12.65.1.noarch",
"SUSE Enterprise Storage 7:bind-utils-9.16.6-150000.12.65.1.aarch64",
"SUSE Enterprise Storage 7:bind-utils-9.16.6-150000.12.65.1.x86_64",
"SUSE Enterprise Storage 7:libbind9-1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Enterprise Storage 7:libbind9-1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Enterprise Storage 7:libdns1605-9.16.6-150000.12.65.1.aarch64",
"SUSE Enterprise Storage 7:libdns1605-9.16.6-150000.12.65.1.x86_64",
"SUSE Enterprise Storage 7:libirs-devel-9.16.6-150000.12.65.1.aarch64",
"SUSE Enterprise Storage 7:libirs-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Enterprise Storage 7:libirs1601-9.16.6-150000.12.65.1.aarch64",
"SUSE Enterprise Storage 7:libirs1601-9.16.6-150000.12.65.1.x86_64",
"SUSE Enterprise Storage 7:libisc1606-9.16.6-150000.12.65.1.aarch64",
"SUSE Enterprise Storage 7:libisc1606-9.16.6-150000.12.65.1.x86_64",
"SUSE Enterprise Storage 7:libisccc1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Enterprise Storage 7:libisccc1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Enterprise Storage 7:libisccfg1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Enterprise Storage 7:libisccfg1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Enterprise Storage 7:libns1604-9.16.6-150000.12.65.1.aarch64",
"SUSE Enterprise Storage 7:libns1604-9.16.6-150000.12.65.1.x86_64",
"SUSE Enterprise Storage 7:python3-bind-9.16.6-150000.12.65.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:bind-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:bind-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:bind-chrootenv-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:bind-chrootenv-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:bind-devel-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:bind-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:bind-doc-9.16.6-150000.12.65.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:bind-utils-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:bind-utils-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libbind9-1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libbind9-1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libdns1605-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libdns1605-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libirs-devel-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libirs-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libirs1601-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libirs1601-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libisc1606-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libisc1606-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libisccc1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libisccc1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libisccfg1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libisccfg1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libns1604-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libns1604-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:python3-bind-9.16.6-150000.12.65.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:bind-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:bind-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:bind-chrootenv-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:bind-chrootenv-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:bind-devel-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:bind-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:bind-doc-9.16.6-150000.12.65.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:bind-utils-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:bind-utils-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libbind9-1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libbind9-1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libdns1605-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libdns1605-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libirs-devel-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libirs-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libirs1601-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libirs1601-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libisc1606-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libisc1606-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libisccc1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libisccc1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libisccfg1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libisccfg1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libns1604-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libns1604-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:python3-bind-9.16.6-150000.12.65.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-chrootenv-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-chrootenv-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-chrootenv-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-chrootenv-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-devel-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-devel-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-devel-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-doc-9.16.6-150000.12.65.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-utils-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-utils-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-utils-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-utils-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libbind9-1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libbind9-1600-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libbind9-1600-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libbind9-1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libdns1605-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libdns1605-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libdns1605-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libdns1605-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libirs-devel-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libirs-devel-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libirs-devel-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libirs-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libirs1601-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libirs1601-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libirs1601-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libirs1601-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libisc1606-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libisc1606-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libisc1606-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libisc1606-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libisccc1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libisccc1600-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libisccc1600-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libisccc1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libisccfg1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libisccfg1600-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libisccfg1600-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libisccfg1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libns1604-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libns1604-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libns1604-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libns1604-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:python3-bind-9.16.6-150000.12.65.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-chrootenv-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-chrootenv-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-chrootenv-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-chrootenv-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-devel-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-devel-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-devel-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-doc-9.16.6-150000.12.65.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-utils-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-utils-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-utils-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-utils-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libbind9-1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libbind9-1600-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libbind9-1600-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libbind9-1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libdns1605-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libdns1605-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libdns1605-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libdns1605-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libirs-devel-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libirs-devel-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libirs-devel-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libirs-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libirs1601-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libirs1601-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libirs1601-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libirs1601-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libisc1606-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libisc1606-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libisc1606-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libisc1606-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libisccc1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libisccc1600-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libisccc1600-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libisccc1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libisccfg1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libisccfg1600-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libisccfg1600-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libisccfg1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libns1604-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libns1604-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libns1604-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libns1604-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:python3-bind-9.16.6-150000.12.65.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:bind-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:bind-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:bind-chrootenv-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:bind-chrootenv-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:bind-devel-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:bind-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:bind-doc-9.16.6-150000.12.65.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:bind-utils-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:bind-utils-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libbind9-1600-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libbind9-1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libdns1605-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libdns1605-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libirs-devel-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libirs-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libirs1601-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libirs1601-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libisc1606-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libisc1606-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libisccc1600-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libisccc1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libisccfg1600-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libisccfg1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libns1604-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libns1604-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:python3-bind-9.16.6-150000.12.65.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:bind-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:bind-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:bind-chrootenv-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:bind-chrootenv-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:bind-devel-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:bind-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:bind-doc-9.16.6-150000.12.65.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:bind-utils-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:bind-utils-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libbind9-1600-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libbind9-1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libdns1605-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libdns1605-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libirs-devel-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libirs-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libirs1601-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libirs1601-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libisc1606-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libisc1606-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libisccc1600-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libisccc1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libisccfg1600-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libisccfg1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libns1604-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libns1604-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:python3-bind-9.16.6-150000.12.65.1.noarch",
"SUSE Manager Client Tools 15:dracut-saltboot-0.1.1681904360.84ef141-150000.1.50.1.noarch",
"SUSE Manager Client Tools 15:grafana-9.5.1-150000.1.48.5.aarch64",
"SUSE Manager Client Tools 15:grafana-9.5.1-150000.1.48.5.ppc64le",
"SUSE Manager Client Tools 15:grafana-9.5.1-150000.1.48.5.s390x",
"SUSE Manager Client Tools 15:grafana-9.5.1-150000.1.48.5.x86_64",
"SUSE Manager Client Tools 15:mgr-daemon-4.3.7-150000.1.41.1.noarch",
"SUSE Manager Client Tools 15:python3-uyuni-common-libs-4.3.8-150000.1.33.1.aarch64",
"SUSE Manager Client Tools 15:python3-uyuni-common-libs-4.3.8-150000.1.33.1.ppc64le",
"SUSE Manager Client Tools 15:python3-uyuni-common-libs-4.3.8-150000.1.33.1.s390x",
"SUSE Manager Client Tools 15:python3-uyuni-common-libs-4.3.8-150000.1.33.1.x86_64",
"SUSE Manager Client Tools 15:python3-zypp-plugin-spacewalk-1.0.14-150000.3.35.1.noarch",
"SUSE Manager Client Tools 15:spacecmd-4.3.21-150000.3.98.1.noarch",
"SUSE Manager Client Tools 15:zypp-plugin-spacewalk-1.0.14-150000.3.35.1.noarch",
"SUSE Manager Client Tools for SLE Micro 5:bind-utils-9.16.6-150000.12.65.1.aarch64",
"SUSE Manager Client Tools for SLE Micro 5:bind-utils-9.16.6-150000.12.65.1.s390x",
"SUSE Manager Client Tools for SLE Micro 5:bind-utils-9.16.6-150000.12.65.1.x86_64",
"SUSE Manager Client Tools for SLE Micro 5:dracut-saltboot-0.1.1681904360.84ef141-150000.1.50.1.noarch",
"SUSE Manager Client Tools for SLE Micro 5:libbind9-1600-64bit-9.16.6-150000.12.65.1.aarch64_ilp32",
"SUSE Manager Client Tools for SLE Micro 5:libbind9-1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Manager Client Tools for SLE Micro 5:libbind9-1600-9.16.6-150000.12.65.1.s390x",
"SUSE Manager Client Tools for SLE Micro 5:libbind9-1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Manager Client Tools for SLE Micro 5:libdns1605-64bit-9.16.6-150000.12.65.1.aarch64_ilp32",
"SUSE Manager Client Tools for SLE Micro 5:libdns1605-9.16.6-150000.12.65.1.aarch64",
"SUSE Manager Client Tools for SLE Micro 5:libdns1605-9.16.6-150000.12.65.1.s390x",
"SUSE Manager Client Tools for SLE Micro 5:libdns1605-9.16.6-150000.12.65.1.x86_64",
"SUSE Manager Client Tools for SLE Micro 5:libirs1601-64bit-9.16.6-150000.12.65.1.aarch64_ilp32",
"SUSE Manager Client Tools for SLE Micro 5:libirs1601-9.16.6-150000.12.65.1.aarch64",
"SUSE Manager Client Tools for SLE Micro 5:libirs1601-9.16.6-150000.12.65.1.s390x",
"SUSE Manager Client Tools for SLE Micro 5:libirs1601-9.16.6-150000.12.65.1.x86_64",
"SUSE Manager Client Tools for SLE Micro 5:libisc1606-64bit-9.16.6-150000.12.65.1.aarch64_ilp32",
"SUSE Manager Client Tools for SLE Micro 5:libisc1606-9.16.6-150000.12.65.1.aarch64",
"SUSE Manager Client Tools for SLE Micro 5:libisc1606-9.16.6-150000.12.65.1.s390x",
"SUSE Manager Client Tools for SLE Micro 5:libisc1606-9.16.6-150000.12.65.1.x86_64",
"SUSE Manager Client Tools for SLE Micro 5:libisccc1600-64bit-9.16.6-150000.12.65.1.aarch64_ilp32",
"SUSE Manager Client Tools for SLE Micro 5:libisccc1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Manager Client Tools for SLE Micro 5:libisccc1600-9.16.6-150000.12.65.1.s390x",
"SUSE Manager Client Tools for SLE Micro 5:libisccc1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Manager Client Tools for SLE Micro 5:libisccfg1600-64bit-9.16.6-150000.12.65.1.aarch64_ilp32",
"SUSE Manager Client Tools for SLE Micro 5:libisccfg1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Manager Client Tools for SLE Micro 5:libisccfg1600-9.16.6-150000.12.65.1.s390x",
"SUSE Manager Client Tools for SLE Micro 5:libisccfg1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Manager Client Tools for SLE Micro 5:libns1604-9.16.6-150000.12.65.1.s390x",
"SUSE Manager Client Tools for SLE Micro 5:libns1604-9.16.6-150000.12.65.1.x86_64",
"SUSE Manager Client Tools for SLE Micro 5:python3-bind-9.16.6-150000.12.65.1.noarch",
"SUSE Manager Proxy Module 4.2:python3-zypp-plugin-spacewalk-1.0.14-150000.3.35.1.noarch",
"SUSE Manager Proxy Module 4.2:zypp-plugin-spacewalk-1.0.14-150000.3.35.1.noarch",
"SUSE Manager Proxy Module 4.3:python3-zypp-plugin-spacewalk-1.0.14-150000.3.35.1.noarch",
"SUSE Manager Proxy Module 4.3:zypp-plugin-spacewalk-1.0.14-150000.3.35.1.noarch",
"openSUSE Leap 15.4:bind-devel-32bit-9.16.6-150000.12.65.1.x86_64",
"openSUSE Leap 15.4:dracut-saltboot-0.1.1681904360.84ef141-150000.1.50.1.noarch",
"openSUSE Leap 15.4:libbind9-1600-32bit-9.16.6-150000.12.65.1.x86_64",
"openSUSE Leap 15.4:libdns1605-32bit-9.16.6-150000.12.65.1.x86_64",
"openSUSE Leap 15.4:libirs1601-32bit-9.16.6-150000.12.65.1.x86_64",
"openSUSE Leap 15.4:libisc1606-32bit-9.16.6-150000.12.65.1.x86_64",
"openSUSE Leap 15.4:libisccc1600-32bit-9.16.6-150000.12.65.1.x86_64",
"openSUSE Leap 15.4:libisccfg1600-32bit-9.16.6-150000.12.65.1.x86_64",
"openSUSE Leap 15.4:libns1604-32bit-9.16.6-150000.12.65.1.x86_64",
"openSUSE Leap 15.4:spacecmd-4.3.21-150000.3.98.1.noarch",
"openSUSE Leap 15.4:wire-0.5.0-150000.1.12.3.aarch64",
"openSUSE Leap 15.4:wire-0.5.0-150000.1.12.3.ppc64le",
"openSUSE Leap 15.4:wire-0.5.0-150000.1.12.3.s390x",
"openSUSE Leap 15.4:wire-0.5.0-150000.1.12.3.x86_64",
"openSUSE Leap 15.5:dracut-saltboot-0.1.1681904360.84ef141-150000.1.50.1.noarch",
"openSUSE Leap 15.5:spacecmd-4.3.21-150000.3.98.1.noarch",
"openSUSE Leap 15.5:wire-0.5.0-150000.1.12.3.aarch64",
"openSUSE Leap 15.5:wire-0.5.0-150000.1.12.3.ppc64le",
"openSUSE Leap 15.5:wire-0.5.0-150000.1.12.3.s390x",
"openSUSE Leap 15.5:wire-0.5.0-150000.1.12.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:L/A:L",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 7:bind-9.16.6-150000.12.65.1.aarch64",
"SUSE Enterprise Storage 7:bind-9.16.6-150000.12.65.1.x86_64",
"SUSE Enterprise Storage 7:bind-chrootenv-9.16.6-150000.12.65.1.aarch64",
"SUSE Enterprise Storage 7:bind-chrootenv-9.16.6-150000.12.65.1.x86_64",
"SUSE Enterprise Storage 7:bind-devel-9.16.6-150000.12.65.1.aarch64",
"SUSE Enterprise Storage 7:bind-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Enterprise Storage 7:bind-doc-9.16.6-150000.12.65.1.noarch",
"SUSE Enterprise Storage 7:bind-utils-9.16.6-150000.12.65.1.aarch64",
"SUSE Enterprise Storage 7:bind-utils-9.16.6-150000.12.65.1.x86_64",
"SUSE Enterprise Storage 7:libbind9-1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Enterprise Storage 7:libbind9-1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Enterprise Storage 7:libdns1605-9.16.6-150000.12.65.1.aarch64",
"SUSE Enterprise Storage 7:libdns1605-9.16.6-150000.12.65.1.x86_64",
"SUSE Enterprise Storage 7:libirs-devel-9.16.6-150000.12.65.1.aarch64",
"SUSE Enterprise Storage 7:libirs-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Enterprise Storage 7:libirs1601-9.16.6-150000.12.65.1.aarch64",
"SUSE Enterprise Storage 7:libirs1601-9.16.6-150000.12.65.1.x86_64",
"SUSE Enterprise Storage 7:libisc1606-9.16.6-150000.12.65.1.aarch64",
"SUSE Enterprise Storage 7:libisc1606-9.16.6-150000.12.65.1.x86_64",
"SUSE Enterprise Storage 7:libisccc1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Enterprise Storage 7:libisccc1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Enterprise Storage 7:libisccfg1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Enterprise Storage 7:libisccfg1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Enterprise Storage 7:libns1604-9.16.6-150000.12.65.1.aarch64",
"SUSE Enterprise Storage 7:libns1604-9.16.6-150000.12.65.1.x86_64",
"SUSE Enterprise Storage 7:python3-bind-9.16.6-150000.12.65.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:bind-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:bind-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:bind-chrootenv-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:bind-chrootenv-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:bind-devel-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:bind-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:bind-doc-9.16.6-150000.12.65.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:bind-utils-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:bind-utils-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libbind9-1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libbind9-1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libdns1605-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libdns1605-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libirs-devel-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libirs-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libirs1601-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libirs1601-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libisc1606-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libisc1606-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libisccc1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libisccc1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libisccfg1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libisccfg1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libns1604-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libns1604-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:python3-bind-9.16.6-150000.12.65.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:bind-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:bind-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:bind-chrootenv-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:bind-chrootenv-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:bind-devel-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:bind-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:bind-doc-9.16.6-150000.12.65.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:bind-utils-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:bind-utils-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libbind9-1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libbind9-1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libdns1605-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libdns1605-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libirs-devel-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libirs-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libirs1601-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libirs1601-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libisc1606-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libisc1606-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libisccc1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libisccc1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libisccfg1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libisccfg1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libns1604-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libns1604-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:python3-bind-9.16.6-150000.12.65.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-chrootenv-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-chrootenv-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-chrootenv-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-chrootenv-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-devel-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-devel-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-devel-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-doc-9.16.6-150000.12.65.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-utils-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-utils-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-utils-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-utils-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libbind9-1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libbind9-1600-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libbind9-1600-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libbind9-1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libdns1605-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libdns1605-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libdns1605-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libdns1605-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libirs-devel-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libirs-devel-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libirs-devel-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libirs-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libirs1601-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libirs1601-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libirs1601-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libirs1601-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libisc1606-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libisc1606-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libisc1606-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libisc1606-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libisccc1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libisccc1600-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libisccc1600-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libisccc1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libisccfg1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libisccfg1600-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libisccfg1600-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libisccfg1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libns1604-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libns1604-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libns1604-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libns1604-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:python3-bind-9.16.6-150000.12.65.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-chrootenv-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-chrootenv-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-chrootenv-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-chrootenv-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-devel-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-devel-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-devel-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-doc-9.16.6-150000.12.65.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-utils-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-utils-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-utils-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-utils-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libbind9-1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libbind9-1600-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libbind9-1600-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libbind9-1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libdns1605-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libdns1605-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libdns1605-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libdns1605-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libirs-devel-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libirs-devel-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libirs-devel-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libirs-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libirs1601-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libirs1601-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libirs1601-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libirs1601-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libisc1606-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libisc1606-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libisc1606-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libisc1606-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libisccc1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libisccc1600-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libisccc1600-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libisccc1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libisccfg1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libisccfg1600-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libisccfg1600-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libisccfg1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libns1604-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libns1604-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libns1604-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libns1604-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:python3-bind-9.16.6-150000.12.65.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:bind-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:bind-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:bind-chrootenv-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:bind-chrootenv-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:bind-devel-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:bind-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:bind-doc-9.16.6-150000.12.65.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:bind-utils-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:bind-utils-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libbind9-1600-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libbind9-1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libdns1605-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libdns1605-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libirs-devel-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libirs-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libirs1601-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libirs1601-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libisc1606-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libisc1606-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libisccc1600-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libisccc1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libisccfg1600-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libisccfg1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libns1604-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libns1604-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:python3-bind-9.16.6-150000.12.65.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:bind-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:bind-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:bind-chrootenv-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:bind-chrootenv-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:bind-devel-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:bind-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:bind-doc-9.16.6-150000.12.65.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:bind-utils-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:bind-utils-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libbind9-1600-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libbind9-1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libdns1605-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libdns1605-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libirs-devel-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libirs-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libirs1601-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libirs1601-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libisc1606-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libisc1606-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libisccc1600-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libisccc1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libisccfg1600-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libisccfg1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libns1604-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libns1604-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:python3-bind-9.16.6-150000.12.65.1.noarch",
"SUSE Manager Client Tools 15:dracut-saltboot-0.1.1681904360.84ef141-150000.1.50.1.noarch",
"SUSE Manager Client Tools 15:grafana-9.5.1-150000.1.48.5.aarch64",
"SUSE Manager Client Tools 15:grafana-9.5.1-150000.1.48.5.ppc64le",
"SUSE Manager Client Tools 15:grafana-9.5.1-150000.1.48.5.s390x",
"SUSE Manager Client Tools 15:grafana-9.5.1-150000.1.48.5.x86_64",
"SUSE Manager Client Tools 15:mgr-daemon-4.3.7-150000.1.41.1.noarch",
"SUSE Manager Client Tools 15:python3-uyuni-common-libs-4.3.8-150000.1.33.1.aarch64",
"SUSE Manager Client Tools 15:python3-uyuni-common-libs-4.3.8-150000.1.33.1.ppc64le",
"SUSE Manager Client Tools 15:python3-uyuni-common-libs-4.3.8-150000.1.33.1.s390x",
"SUSE Manager Client Tools 15:python3-uyuni-common-libs-4.3.8-150000.1.33.1.x86_64",
"SUSE Manager Client Tools 15:python3-zypp-plugin-spacewalk-1.0.14-150000.3.35.1.noarch",
"SUSE Manager Client Tools 15:spacecmd-4.3.21-150000.3.98.1.noarch",
"SUSE Manager Client Tools 15:zypp-plugin-spacewalk-1.0.14-150000.3.35.1.noarch",
"SUSE Manager Client Tools for SLE Micro 5:bind-utils-9.16.6-150000.12.65.1.aarch64",
"SUSE Manager Client Tools for SLE Micro 5:bind-utils-9.16.6-150000.12.65.1.s390x",
"SUSE Manager Client Tools for SLE Micro 5:bind-utils-9.16.6-150000.12.65.1.x86_64",
"SUSE Manager Client Tools for SLE Micro 5:dracut-saltboot-0.1.1681904360.84ef141-150000.1.50.1.noarch",
"SUSE Manager Client Tools for SLE Micro 5:libbind9-1600-64bit-9.16.6-150000.12.65.1.aarch64_ilp32",
"SUSE Manager Client Tools for SLE Micro 5:libbind9-1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Manager Client Tools for SLE Micro 5:libbind9-1600-9.16.6-150000.12.65.1.s390x",
"SUSE Manager Client Tools for SLE Micro 5:libbind9-1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Manager Client Tools for SLE Micro 5:libdns1605-64bit-9.16.6-150000.12.65.1.aarch64_ilp32",
"SUSE Manager Client Tools for SLE Micro 5:libdns1605-9.16.6-150000.12.65.1.aarch64",
"SUSE Manager Client Tools for SLE Micro 5:libdns1605-9.16.6-150000.12.65.1.s390x",
"SUSE Manager Client Tools for SLE Micro 5:libdns1605-9.16.6-150000.12.65.1.x86_64",
"SUSE Manager Client Tools for SLE Micro 5:libirs1601-64bit-9.16.6-150000.12.65.1.aarch64_ilp32",
"SUSE Manager Client Tools for SLE Micro 5:libirs1601-9.16.6-150000.12.65.1.aarch64",
"SUSE Manager Client Tools for SLE Micro 5:libirs1601-9.16.6-150000.12.65.1.s390x",
"SUSE Manager Client Tools for SLE Micro 5:libirs1601-9.16.6-150000.12.65.1.x86_64",
"SUSE Manager Client Tools for SLE Micro 5:libisc1606-64bit-9.16.6-150000.12.65.1.aarch64_ilp32",
"SUSE Manager Client Tools for SLE Micro 5:libisc1606-9.16.6-150000.12.65.1.aarch64",
"SUSE Manager Client Tools for SLE Micro 5:libisc1606-9.16.6-150000.12.65.1.s390x",
"SUSE Manager Client Tools for SLE Micro 5:libisc1606-9.16.6-150000.12.65.1.x86_64",
"SUSE Manager Client Tools for SLE Micro 5:libisccc1600-64bit-9.16.6-150000.12.65.1.aarch64_ilp32",
"SUSE Manager Client Tools for SLE Micro 5:libisccc1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Manager Client Tools for SLE Micro 5:libisccc1600-9.16.6-150000.12.65.1.s390x",
"SUSE Manager Client Tools for SLE Micro 5:libisccc1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Manager Client Tools for SLE Micro 5:libisccfg1600-64bit-9.16.6-150000.12.65.1.aarch64_ilp32",
"SUSE Manager Client Tools for SLE Micro 5:libisccfg1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Manager Client Tools for SLE Micro 5:libisccfg1600-9.16.6-150000.12.65.1.s390x",
"SUSE Manager Client Tools for SLE Micro 5:libisccfg1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Manager Client Tools for SLE Micro 5:libns1604-9.16.6-150000.12.65.1.s390x",
"SUSE Manager Client Tools for SLE Micro 5:libns1604-9.16.6-150000.12.65.1.x86_64",
"SUSE Manager Client Tools for SLE Micro 5:python3-bind-9.16.6-150000.12.65.1.noarch",
"SUSE Manager Proxy Module 4.2:python3-zypp-plugin-spacewalk-1.0.14-150000.3.35.1.noarch",
"SUSE Manager Proxy Module 4.2:zypp-plugin-spacewalk-1.0.14-150000.3.35.1.noarch",
"SUSE Manager Proxy Module 4.3:python3-zypp-plugin-spacewalk-1.0.14-150000.3.35.1.noarch",
"SUSE Manager Proxy Module 4.3:zypp-plugin-spacewalk-1.0.14-150000.3.35.1.noarch",
"openSUSE Leap 15.4:bind-devel-32bit-9.16.6-150000.12.65.1.x86_64",
"openSUSE Leap 15.4:dracut-saltboot-0.1.1681904360.84ef141-150000.1.50.1.noarch",
"openSUSE Leap 15.4:libbind9-1600-32bit-9.16.6-150000.12.65.1.x86_64",
"openSUSE Leap 15.4:libdns1605-32bit-9.16.6-150000.12.65.1.x86_64",
"openSUSE Leap 15.4:libirs1601-32bit-9.16.6-150000.12.65.1.x86_64",
"openSUSE Leap 15.4:libisc1606-32bit-9.16.6-150000.12.65.1.x86_64",
"openSUSE Leap 15.4:libisccc1600-32bit-9.16.6-150000.12.65.1.x86_64",
"openSUSE Leap 15.4:libisccfg1600-32bit-9.16.6-150000.12.65.1.x86_64",
"openSUSE Leap 15.4:libns1604-32bit-9.16.6-150000.12.65.1.x86_64",
"openSUSE Leap 15.4:spacecmd-4.3.21-150000.3.98.1.noarch",
"openSUSE Leap 15.4:wire-0.5.0-150000.1.12.3.aarch64",
"openSUSE Leap 15.4:wire-0.5.0-150000.1.12.3.ppc64le",
"openSUSE Leap 15.4:wire-0.5.0-150000.1.12.3.s390x",
"openSUSE Leap 15.4:wire-0.5.0-150000.1.12.3.x86_64",
"openSUSE Leap 15.5:dracut-saltboot-0.1.1681904360.84ef141-150000.1.50.1.noarch",
"openSUSE Leap 15.5:spacecmd-4.3.21-150000.3.98.1.noarch",
"openSUSE Leap 15.5:wire-0.5.0-150000.1.12.3.aarch64",
"openSUSE Leap 15.5:wire-0.5.0-150000.1.12.3.ppc64le",
"openSUSE Leap 15.5:wire-0.5.0-150000.1.12.3.s390x",
"openSUSE Leap 15.5:wire-0.5.0-150000.1.12.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2023-06-21T11:49:43Z",
"details": "moderate"
}
],
"title": "CVE-2022-36062"
},
{
"cve": "CVE-2022-41715",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-41715"
}
],
"notes": [
{
"category": "general",
"text": "Programs which compile regular expressions from untrusted sources may be vulnerable to memory exhaustion or denial of service. The parsed regexp representation is linear in the size of the input, but in some cases the constant factor can be as high as 40,000, making relatively small regexps consume much larger amounts of memory. After fix, each regexp being parsed is limited to a 256 MB memory footprint. Regular expressions whose representation would use more space than that are rejected. Normal use of regular expressions is unaffected.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 7:bind-9.16.6-150000.12.65.1.aarch64",
"SUSE Enterprise Storage 7:bind-9.16.6-150000.12.65.1.x86_64",
"SUSE Enterprise Storage 7:bind-chrootenv-9.16.6-150000.12.65.1.aarch64",
"SUSE Enterprise Storage 7:bind-chrootenv-9.16.6-150000.12.65.1.x86_64",
"SUSE Enterprise Storage 7:bind-devel-9.16.6-150000.12.65.1.aarch64",
"SUSE Enterprise Storage 7:bind-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Enterprise Storage 7:bind-doc-9.16.6-150000.12.65.1.noarch",
"SUSE Enterprise Storage 7:bind-utils-9.16.6-150000.12.65.1.aarch64",
"SUSE Enterprise Storage 7:bind-utils-9.16.6-150000.12.65.1.x86_64",
"SUSE Enterprise Storage 7:libbind9-1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Enterprise Storage 7:libbind9-1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Enterprise Storage 7:libdns1605-9.16.6-150000.12.65.1.aarch64",
"SUSE Enterprise Storage 7:libdns1605-9.16.6-150000.12.65.1.x86_64",
"SUSE Enterprise Storage 7:libirs-devel-9.16.6-150000.12.65.1.aarch64",
"SUSE Enterprise Storage 7:libirs-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Enterprise Storage 7:libirs1601-9.16.6-150000.12.65.1.aarch64",
"SUSE Enterprise Storage 7:libirs1601-9.16.6-150000.12.65.1.x86_64",
"SUSE Enterprise Storage 7:libisc1606-9.16.6-150000.12.65.1.aarch64",
"SUSE Enterprise Storage 7:libisc1606-9.16.6-150000.12.65.1.x86_64",
"SUSE Enterprise Storage 7:libisccc1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Enterprise Storage 7:libisccc1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Enterprise Storage 7:libisccfg1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Enterprise Storage 7:libisccfg1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Enterprise Storage 7:libns1604-9.16.6-150000.12.65.1.aarch64",
"SUSE Enterprise Storage 7:libns1604-9.16.6-150000.12.65.1.x86_64",
"SUSE Enterprise Storage 7:python3-bind-9.16.6-150000.12.65.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:bind-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:bind-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:bind-chrootenv-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:bind-chrootenv-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:bind-devel-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:bind-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:bind-doc-9.16.6-150000.12.65.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:bind-utils-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:bind-utils-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libbind9-1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libbind9-1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libdns1605-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libdns1605-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libirs-devel-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libirs-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libirs1601-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libirs1601-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libisc1606-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libisc1606-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libisccc1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libisccc1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libisccfg1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libisccfg1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libns1604-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libns1604-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:python3-bind-9.16.6-150000.12.65.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:bind-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:bind-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:bind-chrootenv-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:bind-chrootenv-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:bind-devel-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:bind-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:bind-doc-9.16.6-150000.12.65.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:bind-utils-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:bind-utils-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libbind9-1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libbind9-1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libdns1605-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libdns1605-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libirs-devel-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libirs-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libirs1601-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libirs1601-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libisc1606-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libisc1606-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libisccc1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libisccc1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libisccfg1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libisccfg1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libns1604-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libns1604-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:python3-bind-9.16.6-150000.12.65.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-chrootenv-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-chrootenv-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-chrootenv-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-chrootenv-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-devel-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-devel-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-devel-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-doc-9.16.6-150000.12.65.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-utils-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-utils-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-utils-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-utils-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libbind9-1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libbind9-1600-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libbind9-1600-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libbind9-1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libdns1605-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libdns1605-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libdns1605-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libdns1605-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libirs-devel-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libirs-devel-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libirs-devel-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libirs-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libirs1601-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libirs1601-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libirs1601-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libirs1601-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libisc1606-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libisc1606-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libisc1606-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libisc1606-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libisccc1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libisccc1600-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libisccc1600-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libisccc1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libisccfg1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libisccfg1600-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libisccfg1600-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libisccfg1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libns1604-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libns1604-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libns1604-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libns1604-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:python3-bind-9.16.6-150000.12.65.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-chrootenv-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-chrootenv-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-chrootenv-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-chrootenv-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-devel-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-devel-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-devel-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-doc-9.16.6-150000.12.65.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-utils-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-utils-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-utils-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-utils-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libbind9-1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libbind9-1600-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libbind9-1600-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libbind9-1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libdns1605-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libdns1605-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libdns1605-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libdns1605-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libirs-devel-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libirs-devel-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libirs-devel-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libirs-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libirs1601-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libirs1601-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libirs1601-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libirs1601-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libisc1606-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libisc1606-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libisc1606-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libisc1606-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libisccc1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libisccc1600-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libisccc1600-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libisccc1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libisccfg1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libisccfg1600-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libisccfg1600-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libisccfg1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libns1604-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libns1604-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libns1604-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libns1604-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:python3-bind-9.16.6-150000.12.65.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:bind-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:bind-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:bind-chrootenv-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:bind-chrootenv-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:bind-devel-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:bind-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:bind-doc-9.16.6-150000.12.65.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:bind-utils-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:bind-utils-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libbind9-1600-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libbind9-1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libdns1605-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libdns1605-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libirs-devel-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libirs-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libirs1601-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libirs1601-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libisc1606-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libisc1606-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libisccc1600-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libisccc1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libisccfg1600-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libisccfg1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libns1604-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libns1604-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:python3-bind-9.16.6-150000.12.65.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:bind-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:bind-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:bind-chrootenv-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:bind-chrootenv-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:bind-devel-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:bind-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:bind-doc-9.16.6-150000.12.65.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:bind-utils-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:bind-utils-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libbind9-1600-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libbind9-1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libdns1605-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libdns1605-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libirs-devel-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libirs-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libirs1601-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libirs1601-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libisc1606-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libisc1606-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libisccc1600-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libisccc1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libisccfg1600-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libisccfg1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libns1604-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libns1604-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:python3-bind-9.16.6-150000.12.65.1.noarch",
"SUSE Manager Client Tools 15:dracut-saltboot-0.1.1681904360.84ef141-150000.1.50.1.noarch",
"SUSE Manager Client Tools 15:grafana-9.5.1-150000.1.48.5.aarch64",
"SUSE Manager Client Tools 15:grafana-9.5.1-150000.1.48.5.ppc64le",
"SUSE Manager Client Tools 15:grafana-9.5.1-150000.1.48.5.s390x",
"SUSE Manager Client Tools 15:grafana-9.5.1-150000.1.48.5.x86_64",
"SUSE Manager Client Tools 15:mgr-daemon-4.3.7-150000.1.41.1.noarch",
"SUSE Manager Client Tools 15:python3-uyuni-common-libs-4.3.8-150000.1.33.1.aarch64",
"SUSE Manager Client Tools 15:python3-uyuni-common-libs-4.3.8-150000.1.33.1.ppc64le",
"SUSE Manager Client Tools 15:python3-uyuni-common-libs-4.3.8-150000.1.33.1.s390x",
"SUSE Manager Client Tools 15:python3-uyuni-common-libs-4.3.8-150000.1.33.1.x86_64",
"SUSE Manager Client Tools 15:python3-zypp-plugin-spacewalk-1.0.14-150000.3.35.1.noarch",
"SUSE Manager Client Tools 15:spacecmd-4.3.21-150000.3.98.1.noarch",
"SUSE Manager Client Tools 15:zypp-plugin-spacewalk-1.0.14-150000.3.35.1.noarch",
"SUSE Manager Client Tools for SLE Micro 5:bind-utils-9.16.6-150000.12.65.1.aarch64",
"SUSE Manager Client Tools for SLE Micro 5:bind-utils-9.16.6-150000.12.65.1.s390x",
"SUSE Manager Client Tools for SLE Micro 5:bind-utils-9.16.6-150000.12.65.1.x86_64",
"SUSE Manager Client Tools for SLE Micro 5:dracut-saltboot-0.1.1681904360.84ef141-150000.1.50.1.noarch",
"SUSE Manager Client Tools for SLE Micro 5:libbind9-1600-64bit-9.16.6-150000.12.65.1.aarch64_ilp32",
"SUSE Manager Client Tools for SLE Micro 5:libbind9-1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Manager Client Tools for SLE Micro 5:libbind9-1600-9.16.6-150000.12.65.1.s390x",
"SUSE Manager Client Tools for SLE Micro 5:libbind9-1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Manager Client Tools for SLE Micro 5:libdns1605-64bit-9.16.6-150000.12.65.1.aarch64_ilp32",
"SUSE Manager Client Tools for SLE Micro 5:libdns1605-9.16.6-150000.12.65.1.aarch64",
"SUSE Manager Client Tools for SLE Micro 5:libdns1605-9.16.6-150000.12.65.1.s390x",
"SUSE Manager Client Tools for SLE Micro 5:libdns1605-9.16.6-150000.12.65.1.x86_64",
"SUSE Manager Client Tools for SLE Micro 5:libirs1601-64bit-9.16.6-150000.12.65.1.aarch64_ilp32",
"SUSE Manager Client Tools for SLE Micro 5:libirs1601-9.16.6-150000.12.65.1.aarch64",
"SUSE Manager Client Tools for SLE Micro 5:libirs1601-9.16.6-150000.12.65.1.s390x",
"SUSE Manager Client Tools for SLE Micro 5:libirs1601-9.16.6-150000.12.65.1.x86_64",
"SUSE Manager Client Tools for SLE Micro 5:libisc1606-64bit-9.16.6-150000.12.65.1.aarch64_ilp32",
"SUSE Manager Client Tools for SLE Micro 5:libisc1606-9.16.6-150000.12.65.1.aarch64",
"SUSE Manager Client Tools for SLE Micro 5:libisc1606-9.16.6-150000.12.65.1.s390x",
"SUSE Manager Client Tools for SLE Micro 5:libisc1606-9.16.6-150000.12.65.1.x86_64",
"SUSE Manager Client Tools for SLE Micro 5:libisccc1600-64bit-9.16.6-150000.12.65.1.aarch64_ilp32",
"SUSE Manager Client Tools for SLE Micro 5:libisccc1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Manager Client Tools for SLE Micro 5:libisccc1600-9.16.6-150000.12.65.1.s390x",
"SUSE Manager Client Tools for SLE Micro 5:libisccc1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Manager Client Tools for SLE Micro 5:libisccfg1600-64bit-9.16.6-150000.12.65.1.aarch64_ilp32",
"SUSE Manager Client Tools for SLE Micro 5:libisccfg1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Manager Client Tools for SLE Micro 5:libisccfg1600-9.16.6-150000.12.65.1.s390x",
"SUSE Manager Client Tools for SLE Micro 5:libisccfg1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Manager Client Tools for SLE Micro 5:libns1604-9.16.6-150000.12.65.1.s390x",
"SUSE Manager Client Tools for SLE Micro 5:libns1604-9.16.6-150000.12.65.1.x86_64",
"SUSE Manager Client Tools for SLE Micro 5:python3-bind-9.16.6-150000.12.65.1.noarch",
"SUSE Manager Proxy Module 4.2:python3-zypp-plugin-spacewalk-1.0.14-150000.3.35.1.noarch",
"SUSE Manager Proxy Module 4.2:zypp-plugin-spacewalk-1.0.14-150000.3.35.1.noarch",
"SUSE Manager Proxy Module 4.3:python3-zypp-plugin-spacewalk-1.0.14-150000.3.35.1.noarch",
"SUSE Manager Proxy Module 4.3:zypp-plugin-spacewalk-1.0.14-150000.3.35.1.noarch",
"openSUSE Leap 15.4:bind-devel-32bit-9.16.6-150000.12.65.1.x86_64",
"openSUSE Leap 15.4:dracut-saltboot-0.1.1681904360.84ef141-150000.1.50.1.noarch",
"openSUSE Leap 15.4:libbind9-1600-32bit-9.16.6-150000.12.65.1.x86_64",
"openSUSE Leap 15.4:libdns1605-32bit-9.16.6-150000.12.65.1.x86_64",
"openSUSE Leap 15.4:libirs1601-32bit-9.16.6-150000.12.65.1.x86_64",
"openSUSE Leap 15.4:libisc1606-32bit-9.16.6-150000.12.65.1.x86_64",
"openSUSE Leap 15.4:libisccc1600-32bit-9.16.6-150000.12.65.1.x86_64",
"openSUSE Leap 15.4:libisccfg1600-32bit-9.16.6-150000.12.65.1.x86_64",
"openSUSE Leap 15.4:libns1604-32bit-9.16.6-150000.12.65.1.x86_64",
"openSUSE Leap 15.4:spacecmd-4.3.21-150000.3.98.1.noarch",
"openSUSE Leap 15.4:wire-0.5.0-150000.1.12.3.aarch64",
"openSUSE Leap 15.4:wire-0.5.0-150000.1.12.3.ppc64le",
"openSUSE Leap 15.4:wire-0.5.0-150000.1.12.3.s390x",
"openSUSE Leap 15.4:wire-0.5.0-150000.1.12.3.x86_64",
"openSUSE Leap 15.5:dracut-saltboot-0.1.1681904360.84ef141-150000.1.50.1.noarch",
"openSUSE Leap 15.5:spacecmd-4.3.21-150000.3.98.1.noarch",
"openSUSE Leap 15.5:wire-0.5.0-150000.1.12.3.aarch64",
"openSUSE Leap 15.5:wire-0.5.0-150000.1.12.3.ppc64le",
"openSUSE Leap 15.5:wire-0.5.0-150000.1.12.3.s390x",
"openSUSE Leap 15.5:wire-0.5.0-150000.1.12.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-41715",
"url": "https://www.suse.com/security/cve/CVE-2022-41715"
},
{
"category": "external",
"summary": "SUSE Bug 1204023 for CVE-2022-41715",
"url": "https://bugzilla.suse.com/1204023"
},
{
"category": "external",
"summary": "SUSE Bug 1208441 for CVE-2022-41715",
"url": "https://bugzilla.suse.com/1208441"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 7:bind-9.16.6-150000.12.65.1.aarch64",
"SUSE Enterprise Storage 7:bind-9.16.6-150000.12.65.1.x86_64",
"SUSE Enterprise Storage 7:bind-chrootenv-9.16.6-150000.12.65.1.aarch64",
"SUSE Enterprise Storage 7:bind-chrootenv-9.16.6-150000.12.65.1.x86_64",
"SUSE Enterprise Storage 7:bind-devel-9.16.6-150000.12.65.1.aarch64",
"SUSE Enterprise Storage 7:bind-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Enterprise Storage 7:bind-doc-9.16.6-150000.12.65.1.noarch",
"SUSE Enterprise Storage 7:bind-utils-9.16.6-150000.12.65.1.aarch64",
"SUSE Enterprise Storage 7:bind-utils-9.16.6-150000.12.65.1.x86_64",
"SUSE Enterprise Storage 7:libbind9-1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Enterprise Storage 7:libbind9-1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Enterprise Storage 7:libdns1605-9.16.6-150000.12.65.1.aarch64",
"SUSE Enterprise Storage 7:libdns1605-9.16.6-150000.12.65.1.x86_64",
"SUSE Enterprise Storage 7:libirs-devel-9.16.6-150000.12.65.1.aarch64",
"SUSE Enterprise Storage 7:libirs-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Enterprise Storage 7:libirs1601-9.16.6-150000.12.65.1.aarch64",
"SUSE Enterprise Storage 7:libirs1601-9.16.6-150000.12.65.1.x86_64",
"SUSE Enterprise Storage 7:libisc1606-9.16.6-150000.12.65.1.aarch64",
"SUSE Enterprise Storage 7:libisc1606-9.16.6-150000.12.65.1.x86_64",
"SUSE Enterprise Storage 7:libisccc1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Enterprise Storage 7:libisccc1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Enterprise Storage 7:libisccfg1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Enterprise Storage 7:libisccfg1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Enterprise Storage 7:libns1604-9.16.6-150000.12.65.1.aarch64",
"SUSE Enterprise Storage 7:libns1604-9.16.6-150000.12.65.1.x86_64",
"SUSE Enterprise Storage 7:python3-bind-9.16.6-150000.12.65.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:bind-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:bind-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:bind-chrootenv-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:bind-chrootenv-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:bind-devel-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:bind-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:bind-doc-9.16.6-150000.12.65.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:bind-utils-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:bind-utils-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libbind9-1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libbind9-1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libdns1605-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libdns1605-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libirs-devel-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libirs-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libirs1601-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libirs1601-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libisc1606-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libisc1606-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libisccc1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libisccc1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libisccfg1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libisccfg1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libns1604-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libns1604-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:python3-bind-9.16.6-150000.12.65.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:bind-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:bind-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:bind-chrootenv-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:bind-chrootenv-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:bind-devel-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:bind-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:bind-doc-9.16.6-150000.12.65.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:bind-utils-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:bind-utils-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libbind9-1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libbind9-1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libdns1605-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libdns1605-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libirs-devel-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libirs-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libirs1601-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libirs1601-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libisc1606-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libisc1606-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libisccc1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libisccc1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libisccfg1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libisccfg1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libns1604-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libns1604-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:python3-bind-9.16.6-150000.12.65.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-chrootenv-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-chrootenv-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-chrootenv-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-chrootenv-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-devel-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-devel-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-devel-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-doc-9.16.6-150000.12.65.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-utils-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-utils-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-utils-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-utils-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libbind9-1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libbind9-1600-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libbind9-1600-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libbind9-1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libdns1605-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libdns1605-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libdns1605-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libdns1605-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libirs-devel-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libirs-devel-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libirs-devel-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libirs-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libirs1601-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libirs1601-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libirs1601-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libirs1601-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libisc1606-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libisc1606-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libisc1606-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libisc1606-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libisccc1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libisccc1600-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libisccc1600-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libisccc1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libisccfg1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libisccfg1600-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libisccfg1600-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libisccfg1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libns1604-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libns1604-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libns1604-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libns1604-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:python3-bind-9.16.6-150000.12.65.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-chrootenv-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-chrootenv-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-chrootenv-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-chrootenv-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-devel-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-devel-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-devel-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-doc-9.16.6-150000.12.65.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-utils-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-utils-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-utils-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-utils-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libbind9-1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libbind9-1600-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libbind9-1600-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libbind9-1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libdns1605-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libdns1605-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libdns1605-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libdns1605-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libirs-devel-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libirs-devel-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libirs-devel-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libirs-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libirs1601-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libirs1601-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libirs1601-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libirs1601-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libisc1606-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libisc1606-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libisc1606-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libisc1606-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libisccc1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libisccc1600-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libisccc1600-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libisccc1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libisccfg1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libisccfg1600-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libisccfg1600-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libisccfg1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libns1604-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libns1604-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libns1604-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libns1604-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:python3-bind-9.16.6-150000.12.65.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:bind-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:bind-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:bind-chrootenv-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:bind-chrootenv-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:bind-devel-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:bind-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:bind-doc-9.16.6-150000.12.65.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:bind-utils-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:bind-utils-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libbind9-1600-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libbind9-1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libdns1605-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libdns1605-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libirs-devel-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libirs-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libirs1601-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libirs1601-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libisc1606-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libisc1606-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libisccc1600-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libisccc1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libisccfg1600-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libisccfg1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libns1604-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libns1604-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:python3-bind-9.16.6-150000.12.65.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:bind-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:bind-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:bind-chrootenv-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:bind-chrootenv-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:bind-devel-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:bind-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:bind-doc-9.16.6-150000.12.65.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:bind-utils-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:bind-utils-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libbind9-1600-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libbind9-1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libdns1605-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libdns1605-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libirs-devel-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libirs-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libirs1601-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libirs1601-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libisc1606-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libisc1606-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libisccc1600-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libisccc1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libisccfg1600-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libisccfg1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libns1604-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libns1604-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:python3-bind-9.16.6-150000.12.65.1.noarch",
"SUSE Manager Client Tools 15:dracut-saltboot-0.1.1681904360.84ef141-150000.1.50.1.noarch",
"SUSE Manager Client Tools 15:grafana-9.5.1-150000.1.48.5.aarch64",
"SUSE Manager Client Tools 15:grafana-9.5.1-150000.1.48.5.ppc64le",
"SUSE Manager Client Tools 15:grafana-9.5.1-150000.1.48.5.s390x",
"SUSE Manager Client Tools 15:grafana-9.5.1-150000.1.48.5.x86_64",
"SUSE Manager Client Tools 15:mgr-daemon-4.3.7-150000.1.41.1.noarch",
"SUSE Manager Client Tools 15:python3-uyuni-common-libs-4.3.8-150000.1.33.1.aarch64",
"SUSE Manager Client Tools 15:python3-uyuni-common-libs-4.3.8-150000.1.33.1.ppc64le",
"SUSE Manager Client Tools 15:python3-uyuni-common-libs-4.3.8-150000.1.33.1.s390x",
"SUSE Manager Client Tools 15:python3-uyuni-common-libs-4.3.8-150000.1.33.1.x86_64",
"SUSE Manager Client Tools 15:python3-zypp-plugin-spacewalk-1.0.14-150000.3.35.1.noarch",
"SUSE Manager Client Tools 15:spacecmd-4.3.21-150000.3.98.1.noarch",
"SUSE Manager Client Tools 15:zypp-plugin-spacewalk-1.0.14-150000.3.35.1.noarch",
"SUSE Manager Client Tools for SLE Micro 5:bind-utils-9.16.6-150000.12.65.1.aarch64",
"SUSE Manager Client Tools for SLE Micro 5:bind-utils-9.16.6-150000.12.65.1.s390x",
"SUSE Manager Client Tools for SLE Micro 5:bind-utils-9.16.6-150000.12.65.1.x86_64",
"SUSE Manager Client Tools for SLE Micro 5:dracut-saltboot-0.1.1681904360.84ef141-150000.1.50.1.noarch",
"SUSE Manager Client Tools for SLE Micro 5:libbind9-1600-64bit-9.16.6-150000.12.65.1.aarch64_ilp32",
"SUSE Manager Client Tools for SLE Micro 5:libbind9-1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Manager Client Tools for SLE Micro 5:libbind9-1600-9.16.6-150000.12.65.1.s390x",
"SUSE Manager Client Tools for SLE Micro 5:libbind9-1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Manager Client Tools for SLE Micro 5:libdns1605-64bit-9.16.6-150000.12.65.1.aarch64_ilp32",
"SUSE Manager Client Tools for SLE Micro 5:libdns1605-9.16.6-150000.12.65.1.aarch64",
"SUSE Manager Client Tools for SLE Micro 5:libdns1605-9.16.6-150000.12.65.1.s390x",
"SUSE Manager Client Tools for SLE Micro 5:libdns1605-9.16.6-150000.12.65.1.x86_64",
"SUSE Manager Client Tools for SLE Micro 5:libirs1601-64bit-9.16.6-150000.12.65.1.aarch64_ilp32",
"SUSE Manager Client Tools for SLE Micro 5:libirs1601-9.16.6-150000.12.65.1.aarch64",
"SUSE Manager Client Tools for SLE Micro 5:libirs1601-9.16.6-150000.12.65.1.s390x",
"SUSE Manager Client Tools for SLE Micro 5:libirs1601-9.16.6-150000.12.65.1.x86_64",
"SUSE Manager Client Tools for SLE Micro 5:libisc1606-64bit-9.16.6-150000.12.65.1.aarch64_ilp32",
"SUSE Manager Client Tools for SLE Micro 5:libisc1606-9.16.6-150000.12.65.1.aarch64",
"SUSE Manager Client Tools for SLE Micro 5:libisc1606-9.16.6-150000.12.65.1.s390x",
"SUSE Manager Client Tools for SLE Micro 5:libisc1606-9.16.6-150000.12.65.1.x86_64",
"SUSE Manager Client Tools for SLE Micro 5:libisccc1600-64bit-9.16.6-150000.12.65.1.aarch64_ilp32",
"SUSE Manager Client Tools for SLE Micro 5:libisccc1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Manager Client Tools for SLE Micro 5:libisccc1600-9.16.6-150000.12.65.1.s390x",
"SUSE Manager Client Tools for SLE Micro 5:libisccc1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Manager Client Tools for SLE Micro 5:libisccfg1600-64bit-9.16.6-150000.12.65.1.aarch64_ilp32",
"SUSE Manager Client Tools for SLE Micro 5:libisccfg1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Manager Client Tools for SLE Micro 5:libisccfg1600-9.16.6-150000.12.65.1.s390x",
"SUSE Manager Client Tools for SLE Micro 5:libisccfg1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Manager Client Tools for SLE Micro 5:libns1604-9.16.6-150000.12.65.1.s390x",
"SUSE Manager Client Tools for SLE Micro 5:libns1604-9.16.6-150000.12.65.1.x86_64",
"SUSE Manager Client Tools for SLE Micro 5:python3-bind-9.16.6-150000.12.65.1.noarch",
"SUSE Manager Proxy Module 4.2:python3-zypp-plugin-spacewalk-1.0.14-150000.3.35.1.noarch",
"SUSE Manager Proxy Module 4.2:zypp-plugin-spacewalk-1.0.14-150000.3.35.1.noarch",
"SUSE Manager Proxy Module 4.3:python3-zypp-plugin-spacewalk-1.0.14-150000.3.35.1.noarch",
"SUSE Manager Proxy Module 4.3:zypp-plugin-spacewalk-1.0.14-150000.3.35.1.noarch",
"openSUSE Leap 15.4:bind-devel-32bit-9.16.6-150000.12.65.1.x86_64",
"openSUSE Leap 15.4:dracut-saltboot-0.1.1681904360.84ef141-150000.1.50.1.noarch",
"openSUSE Leap 15.4:libbind9-1600-32bit-9.16.6-150000.12.65.1.x86_64",
"openSUSE Leap 15.4:libdns1605-32bit-9.16.6-150000.12.65.1.x86_64",
"openSUSE Leap 15.4:libirs1601-32bit-9.16.6-150000.12.65.1.x86_64",
"openSUSE Leap 15.4:libisc1606-32bit-9.16.6-150000.12.65.1.x86_64",
"openSUSE Leap 15.4:libisccc1600-32bit-9.16.6-150000.12.65.1.x86_64",
"openSUSE Leap 15.4:libisccfg1600-32bit-9.16.6-150000.12.65.1.x86_64",
"openSUSE Leap 15.4:libns1604-32bit-9.16.6-150000.12.65.1.x86_64",
"openSUSE Leap 15.4:spacecmd-4.3.21-150000.3.98.1.noarch",
"openSUSE Leap 15.4:wire-0.5.0-150000.1.12.3.aarch64",
"openSUSE Leap 15.4:wire-0.5.0-150000.1.12.3.ppc64le",
"openSUSE Leap 15.4:wire-0.5.0-150000.1.12.3.s390x",
"openSUSE Leap 15.4:wire-0.5.0-150000.1.12.3.x86_64",
"openSUSE Leap 15.5:dracut-saltboot-0.1.1681904360.84ef141-150000.1.50.1.noarch",
"openSUSE Leap 15.5:spacecmd-4.3.21-150000.3.98.1.noarch",
"openSUSE Leap 15.5:wire-0.5.0-150000.1.12.3.aarch64",
"openSUSE Leap 15.5:wire-0.5.0-150000.1.12.3.ppc64le",
"openSUSE Leap 15.5:wire-0.5.0-150000.1.12.3.s390x",
"openSUSE Leap 15.5:wire-0.5.0-150000.1.12.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 7:bind-9.16.6-150000.12.65.1.aarch64",
"SUSE Enterprise Storage 7:bind-9.16.6-150000.12.65.1.x86_64",
"SUSE Enterprise Storage 7:bind-chrootenv-9.16.6-150000.12.65.1.aarch64",
"SUSE Enterprise Storage 7:bind-chrootenv-9.16.6-150000.12.65.1.x86_64",
"SUSE Enterprise Storage 7:bind-devel-9.16.6-150000.12.65.1.aarch64",
"SUSE Enterprise Storage 7:bind-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Enterprise Storage 7:bind-doc-9.16.6-150000.12.65.1.noarch",
"SUSE Enterprise Storage 7:bind-utils-9.16.6-150000.12.65.1.aarch64",
"SUSE Enterprise Storage 7:bind-utils-9.16.6-150000.12.65.1.x86_64",
"SUSE Enterprise Storage 7:libbind9-1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Enterprise Storage 7:libbind9-1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Enterprise Storage 7:libdns1605-9.16.6-150000.12.65.1.aarch64",
"SUSE Enterprise Storage 7:libdns1605-9.16.6-150000.12.65.1.x86_64",
"SUSE Enterprise Storage 7:libirs-devel-9.16.6-150000.12.65.1.aarch64",
"SUSE Enterprise Storage 7:libirs-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Enterprise Storage 7:libirs1601-9.16.6-150000.12.65.1.aarch64",
"SUSE Enterprise Storage 7:libirs1601-9.16.6-150000.12.65.1.x86_64",
"SUSE Enterprise Storage 7:libisc1606-9.16.6-150000.12.65.1.aarch64",
"SUSE Enterprise Storage 7:libisc1606-9.16.6-150000.12.65.1.x86_64",
"SUSE Enterprise Storage 7:libisccc1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Enterprise Storage 7:libisccc1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Enterprise Storage 7:libisccfg1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Enterprise Storage 7:libisccfg1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Enterprise Storage 7:libns1604-9.16.6-150000.12.65.1.aarch64",
"SUSE Enterprise Storage 7:libns1604-9.16.6-150000.12.65.1.x86_64",
"SUSE Enterprise Storage 7:python3-bind-9.16.6-150000.12.65.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:bind-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:bind-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:bind-chrootenv-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:bind-chrootenv-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:bind-devel-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:bind-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:bind-doc-9.16.6-150000.12.65.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:bind-utils-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:bind-utils-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libbind9-1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libbind9-1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libdns1605-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libdns1605-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libirs-devel-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libirs-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libirs1601-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libirs1601-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libisc1606-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libisc1606-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libisccc1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libisccc1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libisccfg1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libisccfg1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libns1604-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libns1604-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:python3-bind-9.16.6-150000.12.65.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:bind-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:bind-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:bind-chrootenv-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:bind-chrootenv-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:bind-devel-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:bind-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:bind-doc-9.16.6-150000.12.65.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:bind-utils-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:bind-utils-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libbind9-1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libbind9-1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libdns1605-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libdns1605-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libirs-devel-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libirs-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libirs1601-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libirs1601-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libisc1606-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libisc1606-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libisccc1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libisccc1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libisccfg1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libisccfg1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libns1604-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libns1604-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:python3-bind-9.16.6-150000.12.65.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-chrootenv-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-chrootenv-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-chrootenv-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-chrootenv-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-devel-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-devel-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-devel-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-doc-9.16.6-150000.12.65.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-utils-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-utils-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-utils-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-utils-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libbind9-1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libbind9-1600-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libbind9-1600-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libbind9-1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libdns1605-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libdns1605-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libdns1605-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libdns1605-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libirs-devel-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libirs-devel-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libirs-devel-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libirs-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libirs1601-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libirs1601-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libirs1601-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libirs1601-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libisc1606-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libisc1606-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libisc1606-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libisc1606-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libisccc1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libisccc1600-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libisccc1600-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libisccc1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libisccfg1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libisccfg1600-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libisccfg1600-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libisccfg1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libns1604-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libns1604-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libns1604-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libns1604-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:python3-bind-9.16.6-150000.12.65.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-chrootenv-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-chrootenv-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-chrootenv-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-chrootenv-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-devel-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-devel-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-devel-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-doc-9.16.6-150000.12.65.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-utils-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-utils-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-utils-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-utils-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libbind9-1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libbind9-1600-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libbind9-1600-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libbind9-1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libdns1605-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libdns1605-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libdns1605-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libdns1605-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libirs-devel-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libirs-devel-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libirs-devel-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libirs-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libirs1601-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libirs1601-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libirs1601-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libirs1601-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libisc1606-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libisc1606-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libisc1606-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libisc1606-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libisccc1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libisccc1600-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libisccc1600-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libisccc1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libisccfg1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libisccfg1600-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libisccfg1600-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libisccfg1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libns1604-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libns1604-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libns1604-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libns1604-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:python3-bind-9.16.6-150000.12.65.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:bind-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:bind-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:bind-chrootenv-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:bind-chrootenv-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:bind-devel-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:bind-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:bind-doc-9.16.6-150000.12.65.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:bind-utils-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:bind-utils-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libbind9-1600-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libbind9-1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libdns1605-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libdns1605-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libirs-devel-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libirs-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libirs1601-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libirs1601-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libisc1606-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libisc1606-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libisccc1600-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libisccc1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libisccfg1600-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libisccfg1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libns1604-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libns1604-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:python3-bind-9.16.6-150000.12.65.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:bind-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:bind-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:bind-chrootenv-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:bind-chrootenv-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:bind-devel-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:bind-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:bind-doc-9.16.6-150000.12.65.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:bind-utils-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:bind-utils-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libbind9-1600-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libbind9-1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libdns1605-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libdns1605-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libirs-devel-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libirs-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libirs1601-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libirs1601-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libisc1606-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libisc1606-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libisccc1600-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libisccc1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libisccfg1600-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libisccfg1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libns1604-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libns1604-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:python3-bind-9.16.6-150000.12.65.1.noarch",
"SUSE Manager Client Tools 15:dracut-saltboot-0.1.1681904360.84ef141-150000.1.50.1.noarch",
"SUSE Manager Client Tools 15:grafana-9.5.1-150000.1.48.5.aarch64",
"SUSE Manager Client Tools 15:grafana-9.5.1-150000.1.48.5.ppc64le",
"SUSE Manager Client Tools 15:grafana-9.5.1-150000.1.48.5.s390x",
"SUSE Manager Client Tools 15:grafana-9.5.1-150000.1.48.5.x86_64",
"SUSE Manager Client Tools 15:mgr-daemon-4.3.7-150000.1.41.1.noarch",
"SUSE Manager Client Tools 15:python3-uyuni-common-libs-4.3.8-150000.1.33.1.aarch64",
"SUSE Manager Client Tools 15:python3-uyuni-common-libs-4.3.8-150000.1.33.1.ppc64le",
"SUSE Manager Client Tools 15:python3-uyuni-common-libs-4.3.8-150000.1.33.1.s390x",
"SUSE Manager Client Tools 15:python3-uyuni-common-libs-4.3.8-150000.1.33.1.x86_64",
"SUSE Manager Client Tools 15:python3-zypp-plugin-spacewalk-1.0.14-150000.3.35.1.noarch",
"SUSE Manager Client Tools 15:spacecmd-4.3.21-150000.3.98.1.noarch",
"SUSE Manager Client Tools 15:zypp-plugin-spacewalk-1.0.14-150000.3.35.1.noarch",
"SUSE Manager Client Tools for SLE Micro 5:bind-utils-9.16.6-150000.12.65.1.aarch64",
"SUSE Manager Client Tools for SLE Micro 5:bind-utils-9.16.6-150000.12.65.1.s390x",
"SUSE Manager Client Tools for SLE Micro 5:bind-utils-9.16.6-150000.12.65.1.x86_64",
"SUSE Manager Client Tools for SLE Micro 5:dracut-saltboot-0.1.1681904360.84ef141-150000.1.50.1.noarch",
"SUSE Manager Client Tools for SLE Micro 5:libbind9-1600-64bit-9.16.6-150000.12.65.1.aarch64_ilp32",
"SUSE Manager Client Tools for SLE Micro 5:libbind9-1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Manager Client Tools for SLE Micro 5:libbind9-1600-9.16.6-150000.12.65.1.s390x",
"SUSE Manager Client Tools for SLE Micro 5:libbind9-1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Manager Client Tools for SLE Micro 5:libdns1605-64bit-9.16.6-150000.12.65.1.aarch64_ilp32",
"SUSE Manager Client Tools for SLE Micro 5:libdns1605-9.16.6-150000.12.65.1.aarch64",
"SUSE Manager Client Tools for SLE Micro 5:libdns1605-9.16.6-150000.12.65.1.s390x",
"SUSE Manager Client Tools for SLE Micro 5:libdns1605-9.16.6-150000.12.65.1.x86_64",
"SUSE Manager Client Tools for SLE Micro 5:libirs1601-64bit-9.16.6-150000.12.65.1.aarch64_ilp32",
"SUSE Manager Client Tools for SLE Micro 5:libirs1601-9.16.6-150000.12.65.1.aarch64",
"SUSE Manager Client Tools for SLE Micro 5:libirs1601-9.16.6-150000.12.65.1.s390x",
"SUSE Manager Client Tools for SLE Micro 5:libirs1601-9.16.6-150000.12.65.1.x86_64",
"SUSE Manager Client Tools for SLE Micro 5:libisc1606-64bit-9.16.6-150000.12.65.1.aarch64_ilp32",
"SUSE Manager Client Tools for SLE Micro 5:libisc1606-9.16.6-150000.12.65.1.aarch64",
"SUSE Manager Client Tools for SLE Micro 5:libisc1606-9.16.6-150000.12.65.1.s390x",
"SUSE Manager Client Tools for SLE Micro 5:libisc1606-9.16.6-150000.12.65.1.x86_64",
"SUSE Manager Client Tools for SLE Micro 5:libisccc1600-64bit-9.16.6-150000.12.65.1.aarch64_ilp32",
"SUSE Manager Client Tools for SLE Micro 5:libisccc1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Manager Client Tools for SLE Micro 5:libisccc1600-9.16.6-150000.12.65.1.s390x",
"SUSE Manager Client Tools for SLE Micro 5:libisccc1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Manager Client Tools for SLE Micro 5:libisccfg1600-64bit-9.16.6-150000.12.65.1.aarch64_ilp32",
"SUSE Manager Client Tools for SLE Micro 5:libisccfg1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Manager Client Tools for SLE Micro 5:libisccfg1600-9.16.6-150000.12.65.1.s390x",
"SUSE Manager Client Tools for SLE Micro 5:libisccfg1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Manager Client Tools for SLE Micro 5:libns1604-9.16.6-150000.12.65.1.s390x",
"SUSE Manager Client Tools for SLE Micro 5:libns1604-9.16.6-150000.12.65.1.x86_64",
"SUSE Manager Client Tools for SLE Micro 5:python3-bind-9.16.6-150000.12.65.1.noarch",
"SUSE Manager Proxy Module 4.2:python3-zypp-plugin-spacewalk-1.0.14-150000.3.35.1.noarch",
"SUSE Manager Proxy Module 4.2:zypp-plugin-spacewalk-1.0.14-150000.3.35.1.noarch",
"SUSE Manager Proxy Module 4.3:python3-zypp-plugin-spacewalk-1.0.14-150000.3.35.1.noarch",
"SUSE Manager Proxy Module 4.3:zypp-plugin-spacewalk-1.0.14-150000.3.35.1.noarch",
"openSUSE Leap 15.4:bind-devel-32bit-9.16.6-150000.12.65.1.x86_64",
"openSUSE Leap 15.4:dracut-saltboot-0.1.1681904360.84ef141-150000.1.50.1.noarch",
"openSUSE Leap 15.4:libbind9-1600-32bit-9.16.6-150000.12.65.1.x86_64",
"openSUSE Leap 15.4:libdns1605-32bit-9.16.6-150000.12.65.1.x86_64",
"openSUSE Leap 15.4:libirs1601-32bit-9.16.6-150000.12.65.1.x86_64",
"openSUSE Leap 15.4:libisc1606-32bit-9.16.6-150000.12.65.1.x86_64",
"openSUSE Leap 15.4:libisccc1600-32bit-9.16.6-150000.12.65.1.x86_64",
"openSUSE Leap 15.4:libisccfg1600-32bit-9.16.6-150000.12.65.1.x86_64",
"openSUSE Leap 15.4:libns1604-32bit-9.16.6-150000.12.65.1.x86_64",
"openSUSE Leap 15.4:spacecmd-4.3.21-150000.3.98.1.noarch",
"openSUSE Leap 15.4:wire-0.5.0-150000.1.12.3.aarch64",
"openSUSE Leap 15.4:wire-0.5.0-150000.1.12.3.ppc64le",
"openSUSE Leap 15.4:wire-0.5.0-150000.1.12.3.s390x",
"openSUSE Leap 15.4:wire-0.5.0-150000.1.12.3.x86_64",
"openSUSE Leap 15.5:dracut-saltboot-0.1.1681904360.84ef141-150000.1.50.1.noarch",
"openSUSE Leap 15.5:spacecmd-4.3.21-150000.3.98.1.noarch",
"openSUSE Leap 15.5:wire-0.5.0-150000.1.12.3.aarch64",
"openSUSE Leap 15.5:wire-0.5.0-150000.1.12.3.ppc64le",
"openSUSE Leap 15.5:wire-0.5.0-150000.1.12.3.s390x",
"openSUSE Leap 15.5:wire-0.5.0-150000.1.12.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2023-06-21T11:49:43Z",
"details": "moderate"
}
],
"title": "CVE-2022-41715"
},
{
"cve": "CVE-2022-46146",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-46146"
}
],
"notes": [
{
"category": "general",
"text": "Prometheus Exporter Toolkit is a utility package to build exporters. Prior to versions 0.7.2 and 0.8.2, if someone has access to a Prometheus web.yml file and users\u0027 bcrypted passwords, they can bypass security by poisoning the built-in authentication cache. Versions 0.7.2 and 0.8.2 contain a fix for the issue. There is no workaround, but attacker must have access to the hashed password to use this functionality.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 7:bind-9.16.6-150000.12.65.1.aarch64",
"SUSE Enterprise Storage 7:bind-9.16.6-150000.12.65.1.x86_64",
"SUSE Enterprise Storage 7:bind-chrootenv-9.16.6-150000.12.65.1.aarch64",
"SUSE Enterprise Storage 7:bind-chrootenv-9.16.6-150000.12.65.1.x86_64",
"SUSE Enterprise Storage 7:bind-devel-9.16.6-150000.12.65.1.aarch64",
"SUSE Enterprise Storage 7:bind-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Enterprise Storage 7:bind-doc-9.16.6-150000.12.65.1.noarch",
"SUSE Enterprise Storage 7:bind-utils-9.16.6-150000.12.65.1.aarch64",
"SUSE Enterprise Storage 7:bind-utils-9.16.6-150000.12.65.1.x86_64",
"SUSE Enterprise Storage 7:libbind9-1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Enterprise Storage 7:libbind9-1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Enterprise Storage 7:libdns1605-9.16.6-150000.12.65.1.aarch64",
"SUSE Enterprise Storage 7:libdns1605-9.16.6-150000.12.65.1.x86_64",
"SUSE Enterprise Storage 7:libirs-devel-9.16.6-150000.12.65.1.aarch64",
"SUSE Enterprise Storage 7:libirs-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Enterprise Storage 7:libirs1601-9.16.6-150000.12.65.1.aarch64",
"SUSE Enterprise Storage 7:libirs1601-9.16.6-150000.12.65.1.x86_64",
"SUSE Enterprise Storage 7:libisc1606-9.16.6-150000.12.65.1.aarch64",
"SUSE Enterprise Storage 7:libisc1606-9.16.6-150000.12.65.1.x86_64",
"SUSE Enterprise Storage 7:libisccc1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Enterprise Storage 7:libisccc1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Enterprise Storage 7:libisccfg1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Enterprise Storage 7:libisccfg1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Enterprise Storage 7:libns1604-9.16.6-150000.12.65.1.aarch64",
"SUSE Enterprise Storage 7:libns1604-9.16.6-150000.12.65.1.x86_64",
"SUSE Enterprise Storage 7:python3-bind-9.16.6-150000.12.65.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:bind-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:bind-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:bind-chrootenv-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:bind-chrootenv-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:bind-devel-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:bind-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:bind-doc-9.16.6-150000.12.65.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:bind-utils-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:bind-utils-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libbind9-1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libbind9-1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libdns1605-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libdns1605-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libirs-devel-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libirs-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libirs1601-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libirs1601-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libisc1606-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libisc1606-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libisccc1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libisccc1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libisccfg1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libisccfg1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libns1604-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libns1604-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:python3-bind-9.16.6-150000.12.65.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:bind-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:bind-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:bind-chrootenv-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:bind-chrootenv-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:bind-devel-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:bind-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:bind-doc-9.16.6-150000.12.65.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:bind-utils-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:bind-utils-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libbind9-1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libbind9-1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libdns1605-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libdns1605-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libirs-devel-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libirs-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libirs1601-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libirs1601-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libisc1606-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libisc1606-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libisccc1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libisccc1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libisccfg1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libisccfg1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libns1604-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libns1604-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:python3-bind-9.16.6-150000.12.65.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-chrootenv-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-chrootenv-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-chrootenv-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-chrootenv-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-devel-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-devel-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-devel-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-doc-9.16.6-150000.12.65.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-utils-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-utils-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-utils-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-utils-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libbind9-1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libbind9-1600-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libbind9-1600-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libbind9-1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libdns1605-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libdns1605-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libdns1605-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libdns1605-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libirs-devel-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libirs-devel-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libirs-devel-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libirs-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libirs1601-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libirs1601-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libirs1601-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libirs1601-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libisc1606-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libisc1606-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libisc1606-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libisc1606-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libisccc1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libisccc1600-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libisccc1600-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libisccc1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libisccfg1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libisccfg1600-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libisccfg1600-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libisccfg1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libns1604-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libns1604-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libns1604-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libns1604-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:python3-bind-9.16.6-150000.12.65.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-chrootenv-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-chrootenv-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-chrootenv-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-chrootenv-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-devel-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-devel-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-devel-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-doc-9.16.6-150000.12.65.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-utils-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-utils-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-utils-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-utils-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libbind9-1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libbind9-1600-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libbind9-1600-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libbind9-1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libdns1605-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libdns1605-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libdns1605-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libdns1605-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libirs-devel-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libirs-devel-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libirs-devel-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libirs-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libirs1601-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libirs1601-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libirs1601-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libirs1601-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libisc1606-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libisc1606-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libisc1606-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libisc1606-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libisccc1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libisccc1600-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libisccc1600-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libisccc1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libisccfg1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libisccfg1600-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libisccfg1600-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libisccfg1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libns1604-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libns1604-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libns1604-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libns1604-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:python3-bind-9.16.6-150000.12.65.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:bind-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:bind-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:bind-chrootenv-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:bind-chrootenv-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:bind-devel-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:bind-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:bind-doc-9.16.6-150000.12.65.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:bind-utils-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:bind-utils-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libbind9-1600-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libbind9-1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libdns1605-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libdns1605-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libirs-devel-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libirs-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libirs1601-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libirs1601-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libisc1606-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libisc1606-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libisccc1600-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libisccc1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libisccfg1600-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libisccfg1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libns1604-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libns1604-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:python3-bind-9.16.6-150000.12.65.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:bind-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:bind-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:bind-chrootenv-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:bind-chrootenv-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:bind-devel-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:bind-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:bind-doc-9.16.6-150000.12.65.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:bind-utils-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:bind-utils-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libbind9-1600-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libbind9-1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libdns1605-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libdns1605-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libirs-devel-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libirs-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libirs1601-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libirs1601-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libisc1606-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libisc1606-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libisccc1600-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libisccc1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libisccfg1600-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libisccfg1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libns1604-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libns1604-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:python3-bind-9.16.6-150000.12.65.1.noarch",
"SUSE Manager Client Tools 15:dracut-saltboot-0.1.1681904360.84ef141-150000.1.50.1.noarch",
"SUSE Manager Client Tools 15:grafana-9.5.1-150000.1.48.5.aarch64",
"SUSE Manager Client Tools 15:grafana-9.5.1-150000.1.48.5.ppc64le",
"SUSE Manager Client Tools 15:grafana-9.5.1-150000.1.48.5.s390x",
"SUSE Manager Client Tools 15:grafana-9.5.1-150000.1.48.5.x86_64",
"SUSE Manager Client Tools 15:mgr-daemon-4.3.7-150000.1.41.1.noarch",
"SUSE Manager Client Tools 15:python3-uyuni-common-libs-4.3.8-150000.1.33.1.aarch64",
"SUSE Manager Client Tools 15:python3-uyuni-common-libs-4.3.8-150000.1.33.1.ppc64le",
"SUSE Manager Client Tools 15:python3-uyuni-common-libs-4.3.8-150000.1.33.1.s390x",
"SUSE Manager Client Tools 15:python3-uyuni-common-libs-4.3.8-150000.1.33.1.x86_64",
"SUSE Manager Client Tools 15:python3-zypp-plugin-spacewalk-1.0.14-150000.3.35.1.noarch",
"SUSE Manager Client Tools 15:spacecmd-4.3.21-150000.3.98.1.noarch",
"SUSE Manager Client Tools 15:zypp-plugin-spacewalk-1.0.14-150000.3.35.1.noarch",
"SUSE Manager Client Tools for SLE Micro 5:bind-utils-9.16.6-150000.12.65.1.aarch64",
"SUSE Manager Client Tools for SLE Micro 5:bind-utils-9.16.6-150000.12.65.1.s390x",
"SUSE Manager Client Tools for SLE Micro 5:bind-utils-9.16.6-150000.12.65.1.x86_64",
"SUSE Manager Client Tools for SLE Micro 5:dracut-saltboot-0.1.1681904360.84ef141-150000.1.50.1.noarch",
"SUSE Manager Client Tools for SLE Micro 5:libbind9-1600-64bit-9.16.6-150000.12.65.1.aarch64_ilp32",
"SUSE Manager Client Tools for SLE Micro 5:libbind9-1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Manager Client Tools for SLE Micro 5:libbind9-1600-9.16.6-150000.12.65.1.s390x",
"SUSE Manager Client Tools for SLE Micro 5:libbind9-1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Manager Client Tools for SLE Micro 5:libdns1605-64bit-9.16.6-150000.12.65.1.aarch64_ilp32",
"SUSE Manager Client Tools for SLE Micro 5:libdns1605-9.16.6-150000.12.65.1.aarch64",
"SUSE Manager Client Tools for SLE Micro 5:libdns1605-9.16.6-150000.12.65.1.s390x",
"SUSE Manager Client Tools for SLE Micro 5:libdns1605-9.16.6-150000.12.65.1.x86_64",
"SUSE Manager Client Tools for SLE Micro 5:libirs1601-64bit-9.16.6-150000.12.65.1.aarch64_ilp32",
"SUSE Manager Client Tools for SLE Micro 5:libirs1601-9.16.6-150000.12.65.1.aarch64",
"SUSE Manager Client Tools for SLE Micro 5:libirs1601-9.16.6-150000.12.65.1.s390x",
"SUSE Manager Client Tools for SLE Micro 5:libirs1601-9.16.6-150000.12.65.1.x86_64",
"SUSE Manager Client Tools for SLE Micro 5:libisc1606-64bit-9.16.6-150000.12.65.1.aarch64_ilp32",
"SUSE Manager Client Tools for SLE Micro 5:libisc1606-9.16.6-150000.12.65.1.aarch64",
"SUSE Manager Client Tools for SLE Micro 5:libisc1606-9.16.6-150000.12.65.1.s390x",
"SUSE Manager Client Tools for SLE Micro 5:libisc1606-9.16.6-150000.12.65.1.x86_64",
"SUSE Manager Client Tools for SLE Micro 5:libisccc1600-64bit-9.16.6-150000.12.65.1.aarch64_ilp32",
"SUSE Manager Client Tools for SLE Micro 5:libisccc1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Manager Client Tools for SLE Micro 5:libisccc1600-9.16.6-150000.12.65.1.s390x",
"SUSE Manager Client Tools for SLE Micro 5:libisccc1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Manager Client Tools for SLE Micro 5:libisccfg1600-64bit-9.16.6-150000.12.65.1.aarch64_ilp32",
"SUSE Manager Client Tools for SLE Micro 5:libisccfg1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Manager Client Tools for SLE Micro 5:libisccfg1600-9.16.6-150000.12.65.1.s390x",
"SUSE Manager Client Tools for SLE Micro 5:libisccfg1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Manager Client Tools for SLE Micro 5:libns1604-9.16.6-150000.12.65.1.s390x",
"SUSE Manager Client Tools for SLE Micro 5:libns1604-9.16.6-150000.12.65.1.x86_64",
"SUSE Manager Client Tools for SLE Micro 5:python3-bind-9.16.6-150000.12.65.1.noarch",
"SUSE Manager Proxy Module 4.2:python3-zypp-plugin-spacewalk-1.0.14-150000.3.35.1.noarch",
"SUSE Manager Proxy Module 4.2:zypp-plugin-spacewalk-1.0.14-150000.3.35.1.noarch",
"SUSE Manager Proxy Module 4.3:python3-zypp-plugin-spacewalk-1.0.14-150000.3.35.1.noarch",
"SUSE Manager Proxy Module 4.3:zypp-plugin-spacewalk-1.0.14-150000.3.35.1.noarch",
"openSUSE Leap 15.4:bind-devel-32bit-9.16.6-150000.12.65.1.x86_64",
"openSUSE Leap 15.4:dracut-saltboot-0.1.1681904360.84ef141-150000.1.50.1.noarch",
"openSUSE Leap 15.4:libbind9-1600-32bit-9.16.6-150000.12.65.1.x86_64",
"openSUSE Leap 15.4:libdns1605-32bit-9.16.6-150000.12.65.1.x86_64",
"openSUSE Leap 15.4:libirs1601-32bit-9.16.6-150000.12.65.1.x86_64",
"openSUSE Leap 15.4:libisc1606-32bit-9.16.6-150000.12.65.1.x86_64",
"openSUSE Leap 15.4:libisccc1600-32bit-9.16.6-150000.12.65.1.x86_64",
"openSUSE Leap 15.4:libisccfg1600-32bit-9.16.6-150000.12.65.1.x86_64",
"openSUSE Leap 15.4:libns1604-32bit-9.16.6-150000.12.65.1.x86_64",
"openSUSE Leap 15.4:spacecmd-4.3.21-150000.3.98.1.noarch",
"openSUSE Leap 15.4:wire-0.5.0-150000.1.12.3.aarch64",
"openSUSE Leap 15.4:wire-0.5.0-150000.1.12.3.ppc64le",
"openSUSE Leap 15.4:wire-0.5.0-150000.1.12.3.s390x",
"openSUSE Leap 15.4:wire-0.5.0-150000.1.12.3.x86_64",
"openSUSE Leap 15.5:dracut-saltboot-0.1.1681904360.84ef141-150000.1.50.1.noarch",
"openSUSE Leap 15.5:spacecmd-4.3.21-150000.3.98.1.noarch",
"openSUSE Leap 15.5:wire-0.5.0-150000.1.12.3.aarch64",
"openSUSE Leap 15.5:wire-0.5.0-150000.1.12.3.ppc64le",
"openSUSE Leap 15.5:wire-0.5.0-150000.1.12.3.s390x",
"openSUSE Leap 15.5:wire-0.5.0-150000.1.12.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-46146",
"url": "https://www.suse.com/security/cve/CVE-2022-46146"
},
{
"category": "external",
"summary": "SUSE Bug 1208046 for CVE-2022-46146",
"url": "https://bugzilla.suse.com/1208046"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 7:bind-9.16.6-150000.12.65.1.aarch64",
"SUSE Enterprise Storage 7:bind-9.16.6-150000.12.65.1.x86_64",
"SUSE Enterprise Storage 7:bind-chrootenv-9.16.6-150000.12.65.1.aarch64",
"SUSE Enterprise Storage 7:bind-chrootenv-9.16.6-150000.12.65.1.x86_64",
"SUSE Enterprise Storage 7:bind-devel-9.16.6-150000.12.65.1.aarch64",
"SUSE Enterprise Storage 7:bind-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Enterprise Storage 7:bind-doc-9.16.6-150000.12.65.1.noarch",
"SUSE Enterprise Storage 7:bind-utils-9.16.6-150000.12.65.1.aarch64",
"SUSE Enterprise Storage 7:bind-utils-9.16.6-150000.12.65.1.x86_64",
"SUSE Enterprise Storage 7:libbind9-1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Enterprise Storage 7:libbind9-1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Enterprise Storage 7:libdns1605-9.16.6-150000.12.65.1.aarch64",
"SUSE Enterprise Storage 7:libdns1605-9.16.6-150000.12.65.1.x86_64",
"SUSE Enterprise Storage 7:libirs-devel-9.16.6-150000.12.65.1.aarch64",
"SUSE Enterprise Storage 7:libirs-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Enterprise Storage 7:libirs1601-9.16.6-150000.12.65.1.aarch64",
"SUSE Enterprise Storage 7:libirs1601-9.16.6-150000.12.65.1.x86_64",
"SUSE Enterprise Storage 7:libisc1606-9.16.6-150000.12.65.1.aarch64",
"SUSE Enterprise Storage 7:libisc1606-9.16.6-150000.12.65.1.x86_64",
"SUSE Enterprise Storage 7:libisccc1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Enterprise Storage 7:libisccc1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Enterprise Storage 7:libisccfg1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Enterprise Storage 7:libisccfg1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Enterprise Storage 7:libns1604-9.16.6-150000.12.65.1.aarch64",
"SUSE Enterprise Storage 7:libns1604-9.16.6-150000.12.65.1.x86_64",
"SUSE Enterprise Storage 7:python3-bind-9.16.6-150000.12.65.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:bind-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:bind-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:bind-chrootenv-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:bind-chrootenv-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:bind-devel-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:bind-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:bind-doc-9.16.6-150000.12.65.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:bind-utils-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:bind-utils-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libbind9-1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libbind9-1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libdns1605-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libdns1605-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libirs-devel-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libirs-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libirs1601-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libirs1601-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libisc1606-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libisc1606-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libisccc1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libisccc1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libisccfg1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libisccfg1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libns1604-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libns1604-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:python3-bind-9.16.6-150000.12.65.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:bind-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:bind-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:bind-chrootenv-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:bind-chrootenv-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:bind-devel-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:bind-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:bind-doc-9.16.6-150000.12.65.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:bind-utils-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:bind-utils-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libbind9-1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libbind9-1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libdns1605-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libdns1605-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libirs-devel-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libirs-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libirs1601-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libirs1601-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libisc1606-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libisc1606-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libisccc1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libisccc1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libisccfg1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libisccfg1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libns1604-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libns1604-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:python3-bind-9.16.6-150000.12.65.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-chrootenv-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-chrootenv-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-chrootenv-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-chrootenv-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-devel-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-devel-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-devel-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-doc-9.16.6-150000.12.65.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-utils-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-utils-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-utils-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-utils-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libbind9-1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libbind9-1600-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libbind9-1600-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libbind9-1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libdns1605-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libdns1605-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libdns1605-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libdns1605-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libirs-devel-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libirs-devel-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libirs-devel-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libirs-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libirs1601-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libirs1601-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libirs1601-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libirs1601-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libisc1606-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libisc1606-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libisc1606-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libisc1606-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libisccc1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libisccc1600-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libisccc1600-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libisccc1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libisccfg1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libisccfg1600-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libisccfg1600-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libisccfg1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libns1604-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libns1604-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libns1604-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libns1604-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:python3-bind-9.16.6-150000.12.65.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-chrootenv-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-chrootenv-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-chrootenv-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-chrootenv-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-devel-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-devel-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-devel-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-doc-9.16.6-150000.12.65.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-utils-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-utils-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-utils-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-utils-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libbind9-1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libbind9-1600-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libbind9-1600-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libbind9-1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libdns1605-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libdns1605-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libdns1605-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libdns1605-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libirs-devel-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libirs-devel-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libirs-devel-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libirs-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libirs1601-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libirs1601-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libirs1601-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libirs1601-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libisc1606-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libisc1606-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libisc1606-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libisc1606-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libisccc1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libisccc1600-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libisccc1600-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libisccc1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libisccfg1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libisccfg1600-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libisccfg1600-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libisccfg1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libns1604-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libns1604-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libns1604-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libns1604-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:python3-bind-9.16.6-150000.12.65.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:bind-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:bind-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:bind-chrootenv-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:bind-chrootenv-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:bind-devel-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:bind-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:bind-doc-9.16.6-150000.12.65.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:bind-utils-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:bind-utils-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libbind9-1600-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libbind9-1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libdns1605-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libdns1605-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libirs-devel-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libirs-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libirs1601-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libirs1601-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libisc1606-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libisc1606-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libisccc1600-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libisccc1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libisccfg1600-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libisccfg1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libns1604-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libns1604-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:python3-bind-9.16.6-150000.12.65.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:bind-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:bind-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:bind-chrootenv-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:bind-chrootenv-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:bind-devel-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:bind-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:bind-doc-9.16.6-150000.12.65.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:bind-utils-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:bind-utils-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libbind9-1600-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libbind9-1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libdns1605-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libdns1605-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libirs-devel-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libirs-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libirs1601-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libirs1601-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libisc1606-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libisc1606-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libisccc1600-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libisccc1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libisccfg1600-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libisccfg1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libns1604-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libns1604-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:python3-bind-9.16.6-150000.12.65.1.noarch",
"SUSE Manager Client Tools 15:dracut-saltboot-0.1.1681904360.84ef141-150000.1.50.1.noarch",
"SUSE Manager Client Tools 15:grafana-9.5.1-150000.1.48.5.aarch64",
"SUSE Manager Client Tools 15:grafana-9.5.1-150000.1.48.5.ppc64le",
"SUSE Manager Client Tools 15:grafana-9.5.1-150000.1.48.5.s390x",
"SUSE Manager Client Tools 15:grafana-9.5.1-150000.1.48.5.x86_64",
"SUSE Manager Client Tools 15:mgr-daemon-4.3.7-150000.1.41.1.noarch",
"SUSE Manager Client Tools 15:python3-uyuni-common-libs-4.3.8-150000.1.33.1.aarch64",
"SUSE Manager Client Tools 15:python3-uyuni-common-libs-4.3.8-150000.1.33.1.ppc64le",
"SUSE Manager Client Tools 15:python3-uyuni-common-libs-4.3.8-150000.1.33.1.s390x",
"SUSE Manager Client Tools 15:python3-uyuni-common-libs-4.3.8-150000.1.33.1.x86_64",
"SUSE Manager Client Tools 15:python3-zypp-plugin-spacewalk-1.0.14-150000.3.35.1.noarch",
"SUSE Manager Client Tools 15:spacecmd-4.3.21-150000.3.98.1.noarch",
"SUSE Manager Client Tools 15:zypp-plugin-spacewalk-1.0.14-150000.3.35.1.noarch",
"SUSE Manager Client Tools for SLE Micro 5:bind-utils-9.16.6-150000.12.65.1.aarch64",
"SUSE Manager Client Tools for SLE Micro 5:bind-utils-9.16.6-150000.12.65.1.s390x",
"SUSE Manager Client Tools for SLE Micro 5:bind-utils-9.16.6-150000.12.65.1.x86_64",
"SUSE Manager Client Tools for SLE Micro 5:dracut-saltboot-0.1.1681904360.84ef141-150000.1.50.1.noarch",
"SUSE Manager Client Tools for SLE Micro 5:libbind9-1600-64bit-9.16.6-150000.12.65.1.aarch64_ilp32",
"SUSE Manager Client Tools for SLE Micro 5:libbind9-1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Manager Client Tools for SLE Micro 5:libbind9-1600-9.16.6-150000.12.65.1.s390x",
"SUSE Manager Client Tools for SLE Micro 5:libbind9-1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Manager Client Tools for SLE Micro 5:libdns1605-64bit-9.16.6-150000.12.65.1.aarch64_ilp32",
"SUSE Manager Client Tools for SLE Micro 5:libdns1605-9.16.6-150000.12.65.1.aarch64",
"SUSE Manager Client Tools for SLE Micro 5:libdns1605-9.16.6-150000.12.65.1.s390x",
"SUSE Manager Client Tools for SLE Micro 5:libdns1605-9.16.6-150000.12.65.1.x86_64",
"SUSE Manager Client Tools for SLE Micro 5:libirs1601-64bit-9.16.6-150000.12.65.1.aarch64_ilp32",
"SUSE Manager Client Tools for SLE Micro 5:libirs1601-9.16.6-150000.12.65.1.aarch64",
"SUSE Manager Client Tools for SLE Micro 5:libirs1601-9.16.6-150000.12.65.1.s390x",
"SUSE Manager Client Tools for SLE Micro 5:libirs1601-9.16.6-150000.12.65.1.x86_64",
"SUSE Manager Client Tools for SLE Micro 5:libisc1606-64bit-9.16.6-150000.12.65.1.aarch64_ilp32",
"SUSE Manager Client Tools for SLE Micro 5:libisc1606-9.16.6-150000.12.65.1.aarch64",
"SUSE Manager Client Tools for SLE Micro 5:libisc1606-9.16.6-150000.12.65.1.s390x",
"SUSE Manager Client Tools for SLE Micro 5:libisc1606-9.16.6-150000.12.65.1.x86_64",
"SUSE Manager Client Tools for SLE Micro 5:libisccc1600-64bit-9.16.6-150000.12.65.1.aarch64_ilp32",
"SUSE Manager Client Tools for SLE Micro 5:libisccc1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Manager Client Tools for SLE Micro 5:libisccc1600-9.16.6-150000.12.65.1.s390x",
"SUSE Manager Client Tools for SLE Micro 5:libisccc1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Manager Client Tools for SLE Micro 5:libisccfg1600-64bit-9.16.6-150000.12.65.1.aarch64_ilp32",
"SUSE Manager Client Tools for SLE Micro 5:libisccfg1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Manager Client Tools for SLE Micro 5:libisccfg1600-9.16.6-150000.12.65.1.s390x",
"SUSE Manager Client Tools for SLE Micro 5:libisccfg1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Manager Client Tools for SLE Micro 5:libns1604-9.16.6-150000.12.65.1.s390x",
"SUSE Manager Client Tools for SLE Micro 5:libns1604-9.16.6-150000.12.65.1.x86_64",
"SUSE Manager Client Tools for SLE Micro 5:python3-bind-9.16.6-150000.12.65.1.noarch",
"SUSE Manager Proxy Module 4.2:python3-zypp-plugin-spacewalk-1.0.14-150000.3.35.1.noarch",
"SUSE Manager Proxy Module 4.2:zypp-plugin-spacewalk-1.0.14-150000.3.35.1.noarch",
"SUSE Manager Proxy Module 4.3:python3-zypp-plugin-spacewalk-1.0.14-150000.3.35.1.noarch",
"SUSE Manager Proxy Module 4.3:zypp-plugin-spacewalk-1.0.14-150000.3.35.1.noarch",
"openSUSE Leap 15.4:bind-devel-32bit-9.16.6-150000.12.65.1.x86_64",
"openSUSE Leap 15.4:dracut-saltboot-0.1.1681904360.84ef141-150000.1.50.1.noarch",
"openSUSE Leap 15.4:libbind9-1600-32bit-9.16.6-150000.12.65.1.x86_64",
"openSUSE Leap 15.4:libdns1605-32bit-9.16.6-150000.12.65.1.x86_64",
"openSUSE Leap 15.4:libirs1601-32bit-9.16.6-150000.12.65.1.x86_64",
"openSUSE Leap 15.4:libisc1606-32bit-9.16.6-150000.12.65.1.x86_64",
"openSUSE Leap 15.4:libisccc1600-32bit-9.16.6-150000.12.65.1.x86_64",
"openSUSE Leap 15.4:libisccfg1600-32bit-9.16.6-150000.12.65.1.x86_64",
"openSUSE Leap 15.4:libns1604-32bit-9.16.6-150000.12.65.1.x86_64",
"openSUSE Leap 15.4:spacecmd-4.3.21-150000.3.98.1.noarch",
"openSUSE Leap 15.4:wire-0.5.0-150000.1.12.3.aarch64",
"openSUSE Leap 15.4:wire-0.5.0-150000.1.12.3.ppc64le",
"openSUSE Leap 15.4:wire-0.5.0-150000.1.12.3.s390x",
"openSUSE Leap 15.4:wire-0.5.0-150000.1.12.3.x86_64",
"openSUSE Leap 15.5:dracut-saltboot-0.1.1681904360.84ef141-150000.1.50.1.noarch",
"openSUSE Leap 15.5:spacecmd-4.3.21-150000.3.98.1.noarch",
"openSUSE Leap 15.5:wire-0.5.0-150000.1.12.3.aarch64",
"openSUSE Leap 15.5:wire-0.5.0-150000.1.12.3.ppc64le",
"openSUSE Leap 15.5:wire-0.5.0-150000.1.12.3.s390x",
"openSUSE Leap 15.5:wire-0.5.0-150000.1.12.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 7:bind-9.16.6-150000.12.65.1.aarch64",
"SUSE Enterprise Storage 7:bind-9.16.6-150000.12.65.1.x86_64",
"SUSE Enterprise Storage 7:bind-chrootenv-9.16.6-150000.12.65.1.aarch64",
"SUSE Enterprise Storage 7:bind-chrootenv-9.16.6-150000.12.65.1.x86_64",
"SUSE Enterprise Storage 7:bind-devel-9.16.6-150000.12.65.1.aarch64",
"SUSE Enterprise Storage 7:bind-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Enterprise Storage 7:bind-doc-9.16.6-150000.12.65.1.noarch",
"SUSE Enterprise Storage 7:bind-utils-9.16.6-150000.12.65.1.aarch64",
"SUSE Enterprise Storage 7:bind-utils-9.16.6-150000.12.65.1.x86_64",
"SUSE Enterprise Storage 7:libbind9-1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Enterprise Storage 7:libbind9-1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Enterprise Storage 7:libdns1605-9.16.6-150000.12.65.1.aarch64",
"SUSE Enterprise Storage 7:libdns1605-9.16.6-150000.12.65.1.x86_64",
"SUSE Enterprise Storage 7:libirs-devel-9.16.6-150000.12.65.1.aarch64",
"SUSE Enterprise Storage 7:libirs-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Enterprise Storage 7:libirs1601-9.16.6-150000.12.65.1.aarch64",
"SUSE Enterprise Storage 7:libirs1601-9.16.6-150000.12.65.1.x86_64",
"SUSE Enterprise Storage 7:libisc1606-9.16.6-150000.12.65.1.aarch64",
"SUSE Enterprise Storage 7:libisc1606-9.16.6-150000.12.65.1.x86_64",
"SUSE Enterprise Storage 7:libisccc1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Enterprise Storage 7:libisccc1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Enterprise Storage 7:libisccfg1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Enterprise Storage 7:libisccfg1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Enterprise Storage 7:libns1604-9.16.6-150000.12.65.1.aarch64",
"SUSE Enterprise Storage 7:libns1604-9.16.6-150000.12.65.1.x86_64",
"SUSE Enterprise Storage 7:python3-bind-9.16.6-150000.12.65.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:bind-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:bind-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:bind-chrootenv-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:bind-chrootenv-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:bind-devel-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:bind-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:bind-doc-9.16.6-150000.12.65.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:bind-utils-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:bind-utils-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libbind9-1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libbind9-1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libdns1605-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libdns1605-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libirs-devel-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libirs-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libirs1601-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libirs1601-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libisc1606-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libisc1606-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libisccc1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libisccc1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libisccfg1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libisccfg1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libns1604-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libns1604-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:python3-bind-9.16.6-150000.12.65.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:bind-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:bind-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:bind-chrootenv-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:bind-chrootenv-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:bind-devel-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:bind-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:bind-doc-9.16.6-150000.12.65.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:bind-utils-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:bind-utils-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libbind9-1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libbind9-1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libdns1605-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libdns1605-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libirs-devel-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libirs-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libirs1601-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libirs1601-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libisc1606-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libisc1606-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libisccc1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libisccc1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libisccfg1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libisccfg1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libns1604-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libns1604-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:python3-bind-9.16.6-150000.12.65.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-chrootenv-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-chrootenv-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-chrootenv-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-chrootenv-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-devel-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-devel-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-devel-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-doc-9.16.6-150000.12.65.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-utils-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-utils-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-utils-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-utils-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libbind9-1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libbind9-1600-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libbind9-1600-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libbind9-1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libdns1605-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libdns1605-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libdns1605-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libdns1605-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libirs-devel-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libirs-devel-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libirs-devel-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libirs-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libirs1601-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libirs1601-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libirs1601-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libirs1601-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libisc1606-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libisc1606-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libisc1606-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libisc1606-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libisccc1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libisccc1600-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libisccc1600-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libisccc1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libisccfg1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libisccfg1600-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libisccfg1600-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libisccfg1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libns1604-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libns1604-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libns1604-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libns1604-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:python3-bind-9.16.6-150000.12.65.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-chrootenv-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-chrootenv-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-chrootenv-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-chrootenv-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-devel-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-devel-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-devel-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-doc-9.16.6-150000.12.65.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-utils-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-utils-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-utils-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-utils-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libbind9-1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libbind9-1600-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libbind9-1600-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libbind9-1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libdns1605-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libdns1605-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libdns1605-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libdns1605-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libirs-devel-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libirs-devel-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libirs-devel-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libirs-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libirs1601-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libirs1601-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libirs1601-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libirs1601-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libisc1606-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libisc1606-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libisc1606-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libisc1606-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libisccc1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libisccc1600-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libisccc1600-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libisccc1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libisccfg1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libisccfg1600-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libisccfg1600-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libisccfg1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libns1604-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libns1604-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libns1604-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libns1604-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:python3-bind-9.16.6-150000.12.65.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:bind-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:bind-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:bind-chrootenv-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:bind-chrootenv-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:bind-devel-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:bind-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:bind-doc-9.16.6-150000.12.65.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:bind-utils-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:bind-utils-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libbind9-1600-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libbind9-1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libdns1605-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libdns1605-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libirs-devel-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libirs-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libirs1601-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libirs1601-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libisc1606-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libisc1606-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libisccc1600-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libisccc1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libisccfg1600-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libisccfg1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libns1604-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libns1604-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:python3-bind-9.16.6-150000.12.65.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:bind-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:bind-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:bind-chrootenv-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:bind-chrootenv-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:bind-devel-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:bind-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:bind-doc-9.16.6-150000.12.65.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:bind-utils-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:bind-utils-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libbind9-1600-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libbind9-1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libdns1605-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libdns1605-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libirs-devel-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libirs-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libirs1601-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libirs1601-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libisc1606-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libisc1606-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libisccc1600-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libisccc1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libisccfg1600-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libisccfg1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libns1604-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libns1604-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:python3-bind-9.16.6-150000.12.65.1.noarch",
"SUSE Manager Client Tools 15:dracut-saltboot-0.1.1681904360.84ef141-150000.1.50.1.noarch",
"SUSE Manager Client Tools 15:grafana-9.5.1-150000.1.48.5.aarch64",
"SUSE Manager Client Tools 15:grafana-9.5.1-150000.1.48.5.ppc64le",
"SUSE Manager Client Tools 15:grafana-9.5.1-150000.1.48.5.s390x",
"SUSE Manager Client Tools 15:grafana-9.5.1-150000.1.48.5.x86_64",
"SUSE Manager Client Tools 15:mgr-daemon-4.3.7-150000.1.41.1.noarch",
"SUSE Manager Client Tools 15:python3-uyuni-common-libs-4.3.8-150000.1.33.1.aarch64",
"SUSE Manager Client Tools 15:python3-uyuni-common-libs-4.3.8-150000.1.33.1.ppc64le",
"SUSE Manager Client Tools 15:python3-uyuni-common-libs-4.3.8-150000.1.33.1.s390x",
"SUSE Manager Client Tools 15:python3-uyuni-common-libs-4.3.8-150000.1.33.1.x86_64",
"SUSE Manager Client Tools 15:python3-zypp-plugin-spacewalk-1.0.14-150000.3.35.1.noarch",
"SUSE Manager Client Tools 15:spacecmd-4.3.21-150000.3.98.1.noarch",
"SUSE Manager Client Tools 15:zypp-plugin-spacewalk-1.0.14-150000.3.35.1.noarch",
"SUSE Manager Client Tools for SLE Micro 5:bind-utils-9.16.6-150000.12.65.1.aarch64",
"SUSE Manager Client Tools for SLE Micro 5:bind-utils-9.16.6-150000.12.65.1.s390x",
"SUSE Manager Client Tools for SLE Micro 5:bind-utils-9.16.6-150000.12.65.1.x86_64",
"SUSE Manager Client Tools for SLE Micro 5:dracut-saltboot-0.1.1681904360.84ef141-150000.1.50.1.noarch",
"SUSE Manager Client Tools for SLE Micro 5:libbind9-1600-64bit-9.16.6-150000.12.65.1.aarch64_ilp32",
"SUSE Manager Client Tools for SLE Micro 5:libbind9-1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Manager Client Tools for SLE Micro 5:libbind9-1600-9.16.6-150000.12.65.1.s390x",
"SUSE Manager Client Tools for SLE Micro 5:libbind9-1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Manager Client Tools for SLE Micro 5:libdns1605-64bit-9.16.6-150000.12.65.1.aarch64_ilp32",
"SUSE Manager Client Tools for SLE Micro 5:libdns1605-9.16.6-150000.12.65.1.aarch64",
"SUSE Manager Client Tools for SLE Micro 5:libdns1605-9.16.6-150000.12.65.1.s390x",
"SUSE Manager Client Tools for SLE Micro 5:libdns1605-9.16.6-150000.12.65.1.x86_64",
"SUSE Manager Client Tools for SLE Micro 5:libirs1601-64bit-9.16.6-150000.12.65.1.aarch64_ilp32",
"SUSE Manager Client Tools for SLE Micro 5:libirs1601-9.16.6-150000.12.65.1.aarch64",
"SUSE Manager Client Tools for SLE Micro 5:libirs1601-9.16.6-150000.12.65.1.s390x",
"SUSE Manager Client Tools for SLE Micro 5:libirs1601-9.16.6-150000.12.65.1.x86_64",
"SUSE Manager Client Tools for SLE Micro 5:libisc1606-64bit-9.16.6-150000.12.65.1.aarch64_ilp32",
"SUSE Manager Client Tools for SLE Micro 5:libisc1606-9.16.6-150000.12.65.1.aarch64",
"SUSE Manager Client Tools for SLE Micro 5:libisc1606-9.16.6-150000.12.65.1.s390x",
"SUSE Manager Client Tools for SLE Micro 5:libisc1606-9.16.6-150000.12.65.1.x86_64",
"SUSE Manager Client Tools for SLE Micro 5:libisccc1600-64bit-9.16.6-150000.12.65.1.aarch64_ilp32",
"SUSE Manager Client Tools for SLE Micro 5:libisccc1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Manager Client Tools for SLE Micro 5:libisccc1600-9.16.6-150000.12.65.1.s390x",
"SUSE Manager Client Tools for SLE Micro 5:libisccc1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Manager Client Tools for SLE Micro 5:libisccfg1600-64bit-9.16.6-150000.12.65.1.aarch64_ilp32",
"SUSE Manager Client Tools for SLE Micro 5:libisccfg1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Manager Client Tools for SLE Micro 5:libisccfg1600-9.16.6-150000.12.65.1.s390x",
"SUSE Manager Client Tools for SLE Micro 5:libisccfg1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Manager Client Tools for SLE Micro 5:libns1604-9.16.6-150000.12.65.1.s390x",
"SUSE Manager Client Tools for SLE Micro 5:libns1604-9.16.6-150000.12.65.1.x86_64",
"SUSE Manager Client Tools for SLE Micro 5:python3-bind-9.16.6-150000.12.65.1.noarch",
"SUSE Manager Proxy Module 4.2:python3-zypp-plugin-spacewalk-1.0.14-150000.3.35.1.noarch",
"SUSE Manager Proxy Module 4.2:zypp-plugin-spacewalk-1.0.14-150000.3.35.1.noarch",
"SUSE Manager Proxy Module 4.3:python3-zypp-plugin-spacewalk-1.0.14-150000.3.35.1.noarch",
"SUSE Manager Proxy Module 4.3:zypp-plugin-spacewalk-1.0.14-150000.3.35.1.noarch",
"openSUSE Leap 15.4:bind-devel-32bit-9.16.6-150000.12.65.1.x86_64",
"openSUSE Leap 15.4:dracut-saltboot-0.1.1681904360.84ef141-150000.1.50.1.noarch",
"openSUSE Leap 15.4:libbind9-1600-32bit-9.16.6-150000.12.65.1.x86_64",
"openSUSE Leap 15.4:libdns1605-32bit-9.16.6-150000.12.65.1.x86_64",
"openSUSE Leap 15.4:libirs1601-32bit-9.16.6-150000.12.65.1.x86_64",
"openSUSE Leap 15.4:libisc1606-32bit-9.16.6-150000.12.65.1.x86_64",
"openSUSE Leap 15.4:libisccc1600-32bit-9.16.6-150000.12.65.1.x86_64",
"openSUSE Leap 15.4:libisccfg1600-32bit-9.16.6-150000.12.65.1.x86_64",
"openSUSE Leap 15.4:libns1604-32bit-9.16.6-150000.12.65.1.x86_64",
"openSUSE Leap 15.4:spacecmd-4.3.21-150000.3.98.1.noarch",
"openSUSE Leap 15.4:wire-0.5.0-150000.1.12.3.aarch64",
"openSUSE Leap 15.4:wire-0.5.0-150000.1.12.3.ppc64le",
"openSUSE Leap 15.4:wire-0.5.0-150000.1.12.3.s390x",
"openSUSE Leap 15.4:wire-0.5.0-150000.1.12.3.x86_64",
"openSUSE Leap 15.5:dracut-saltboot-0.1.1681904360.84ef141-150000.1.50.1.noarch",
"openSUSE Leap 15.5:spacecmd-4.3.21-150000.3.98.1.noarch",
"openSUSE Leap 15.5:wire-0.5.0-150000.1.12.3.aarch64",
"openSUSE Leap 15.5:wire-0.5.0-150000.1.12.3.ppc64le",
"openSUSE Leap 15.5:wire-0.5.0-150000.1.12.3.s390x",
"openSUSE Leap 15.5:wire-0.5.0-150000.1.12.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2023-06-21T11:49:43Z",
"details": "important"
}
],
"title": "CVE-2022-46146"
},
{
"cve": "CVE-2023-1387",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-1387"
}
],
"notes": [
{
"category": "general",
"text": "Grafana is an open-source platform for monitoring and observability. \n\nStarting with the 9.1 branch, Grafana introduced the ability to search for a JWT in the URL query parameter auth_token and use it as the authentication token. \n\nBy enabling the \"url_login\" configuration option (disabled by default), a JWT might be sent to data sources. If an attacker has access to the data source, the leaked token could be used to authenticate to Grafana.\n\n",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 7:bind-9.16.6-150000.12.65.1.aarch64",
"SUSE Enterprise Storage 7:bind-9.16.6-150000.12.65.1.x86_64",
"SUSE Enterprise Storage 7:bind-chrootenv-9.16.6-150000.12.65.1.aarch64",
"SUSE Enterprise Storage 7:bind-chrootenv-9.16.6-150000.12.65.1.x86_64",
"SUSE Enterprise Storage 7:bind-devel-9.16.6-150000.12.65.1.aarch64",
"SUSE Enterprise Storage 7:bind-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Enterprise Storage 7:bind-doc-9.16.6-150000.12.65.1.noarch",
"SUSE Enterprise Storage 7:bind-utils-9.16.6-150000.12.65.1.aarch64",
"SUSE Enterprise Storage 7:bind-utils-9.16.6-150000.12.65.1.x86_64",
"SUSE Enterprise Storage 7:libbind9-1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Enterprise Storage 7:libbind9-1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Enterprise Storage 7:libdns1605-9.16.6-150000.12.65.1.aarch64",
"SUSE Enterprise Storage 7:libdns1605-9.16.6-150000.12.65.1.x86_64",
"SUSE Enterprise Storage 7:libirs-devel-9.16.6-150000.12.65.1.aarch64",
"SUSE Enterprise Storage 7:libirs-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Enterprise Storage 7:libirs1601-9.16.6-150000.12.65.1.aarch64",
"SUSE Enterprise Storage 7:libirs1601-9.16.6-150000.12.65.1.x86_64",
"SUSE Enterprise Storage 7:libisc1606-9.16.6-150000.12.65.1.aarch64",
"SUSE Enterprise Storage 7:libisc1606-9.16.6-150000.12.65.1.x86_64",
"SUSE Enterprise Storage 7:libisccc1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Enterprise Storage 7:libisccc1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Enterprise Storage 7:libisccfg1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Enterprise Storage 7:libisccfg1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Enterprise Storage 7:libns1604-9.16.6-150000.12.65.1.aarch64",
"SUSE Enterprise Storage 7:libns1604-9.16.6-150000.12.65.1.x86_64",
"SUSE Enterprise Storage 7:python3-bind-9.16.6-150000.12.65.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:bind-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:bind-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:bind-chrootenv-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:bind-chrootenv-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:bind-devel-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:bind-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:bind-doc-9.16.6-150000.12.65.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:bind-utils-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:bind-utils-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libbind9-1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libbind9-1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libdns1605-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libdns1605-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libirs-devel-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libirs-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libirs1601-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libirs1601-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libisc1606-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libisc1606-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libisccc1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libisccc1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libisccfg1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libisccfg1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libns1604-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libns1604-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:python3-bind-9.16.6-150000.12.65.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:bind-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:bind-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:bind-chrootenv-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:bind-chrootenv-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:bind-devel-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:bind-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:bind-doc-9.16.6-150000.12.65.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:bind-utils-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:bind-utils-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libbind9-1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libbind9-1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libdns1605-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libdns1605-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libirs-devel-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libirs-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libirs1601-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libirs1601-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libisc1606-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libisc1606-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libisccc1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libisccc1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libisccfg1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libisccfg1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libns1604-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libns1604-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:python3-bind-9.16.6-150000.12.65.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-chrootenv-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-chrootenv-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-chrootenv-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-chrootenv-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-devel-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-devel-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-devel-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-doc-9.16.6-150000.12.65.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-utils-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-utils-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-utils-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-utils-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libbind9-1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libbind9-1600-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libbind9-1600-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libbind9-1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libdns1605-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libdns1605-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libdns1605-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libdns1605-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libirs-devel-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libirs-devel-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libirs-devel-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libirs-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libirs1601-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libirs1601-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libirs1601-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libirs1601-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libisc1606-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libisc1606-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libisc1606-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libisc1606-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libisccc1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libisccc1600-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libisccc1600-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libisccc1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libisccfg1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libisccfg1600-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libisccfg1600-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libisccfg1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libns1604-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libns1604-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libns1604-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libns1604-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:python3-bind-9.16.6-150000.12.65.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-chrootenv-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-chrootenv-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-chrootenv-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-chrootenv-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-devel-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-devel-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-devel-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-doc-9.16.6-150000.12.65.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-utils-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-utils-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-utils-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-utils-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libbind9-1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libbind9-1600-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libbind9-1600-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libbind9-1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libdns1605-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libdns1605-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libdns1605-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libdns1605-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libirs-devel-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libirs-devel-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libirs-devel-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libirs-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libirs1601-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libirs1601-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libirs1601-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libirs1601-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libisc1606-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libisc1606-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libisc1606-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libisc1606-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libisccc1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libisccc1600-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libisccc1600-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libisccc1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libisccfg1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libisccfg1600-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libisccfg1600-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libisccfg1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libns1604-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libns1604-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libns1604-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libns1604-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:python3-bind-9.16.6-150000.12.65.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:bind-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:bind-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:bind-chrootenv-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:bind-chrootenv-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:bind-devel-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:bind-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:bind-doc-9.16.6-150000.12.65.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:bind-utils-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:bind-utils-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libbind9-1600-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libbind9-1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libdns1605-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libdns1605-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libirs-devel-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libirs-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libirs1601-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libirs1601-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libisc1606-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libisc1606-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libisccc1600-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libisccc1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libisccfg1600-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libisccfg1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libns1604-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libns1604-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:python3-bind-9.16.6-150000.12.65.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:bind-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:bind-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:bind-chrootenv-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:bind-chrootenv-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:bind-devel-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:bind-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:bind-doc-9.16.6-150000.12.65.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:bind-utils-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:bind-utils-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libbind9-1600-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libbind9-1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libdns1605-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libdns1605-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libirs-devel-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libirs-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libirs1601-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libirs1601-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libisc1606-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libisc1606-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libisccc1600-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libisccc1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libisccfg1600-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libisccfg1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libns1604-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libns1604-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:python3-bind-9.16.6-150000.12.65.1.noarch",
"SUSE Manager Client Tools 15:dracut-saltboot-0.1.1681904360.84ef141-150000.1.50.1.noarch",
"SUSE Manager Client Tools 15:grafana-9.5.1-150000.1.48.5.aarch64",
"SUSE Manager Client Tools 15:grafana-9.5.1-150000.1.48.5.ppc64le",
"SUSE Manager Client Tools 15:grafana-9.5.1-150000.1.48.5.s390x",
"SUSE Manager Client Tools 15:grafana-9.5.1-150000.1.48.5.x86_64",
"SUSE Manager Client Tools 15:mgr-daemon-4.3.7-150000.1.41.1.noarch",
"SUSE Manager Client Tools 15:python3-uyuni-common-libs-4.3.8-150000.1.33.1.aarch64",
"SUSE Manager Client Tools 15:python3-uyuni-common-libs-4.3.8-150000.1.33.1.ppc64le",
"SUSE Manager Client Tools 15:python3-uyuni-common-libs-4.3.8-150000.1.33.1.s390x",
"SUSE Manager Client Tools 15:python3-uyuni-common-libs-4.3.8-150000.1.33.1.x86_64",
"SUSE Manager Client Tools 15:python3-zypp-plugin-spacewalk-1.0.14-150000.3.35.1.noarch",
"SUSE Manager Client Tools 15:spacecmd-4.3.21-150000.3.98.1.noarch",
"SUSE Manager Client Tools 15:zypp-plugin-spacewalk-1.0.14-150000.3.35.1.noarch",
"SUSE Manager Client Tools for SLE Micro 5:bind-utils-9.16.6-150000.12.65.1.aarch64",
"SUSE Manager Client Tools for SLE Micro 5:bind-utils-9.16.6-150000.12.65.1.s390x",
"SUSE Manager Client Tools for SLE Micro 5:bind-utils-9.16.6-150000.12.65.1.x86_64",
"SUSE Manager Client Tools for SLE Micro 5:dracut-saltboot-0.1.1681904360.84ef141-150000.1.50.1.noarch",
"SUSE Manager Client Tools for SLE Micro 5:libbind9-1600-64bit-9.16.6-150000.12.65.1.aarch64_ilp32",
"SUSE Manager Client Tools for SLE Micro 5:libbind9-1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Manager Client Tools for SLE Micro 5:libbind9-1600-9.16.6-150000.12.65.1.s390x",
"SUSE Manager Client Tools for SLE Micro 5:libbind9-1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Manager Client Tools for SLE Micro 5:libdns1605-64bit-9.16.6-150000.12.65.1.aarch64_ilp32",
"SUSE Manager Client Tools for SLE Micro 5:libdns1605-9.16.6-150000.12.65.1.aarch64",
"SUSE Manager Client Tools for SLE Micro 5:libdns1605-9.16.6-150000.12.65.1.s390x",
"SUSE Manager Client Tools for SLE Micro 5:libdns1605-9.16.6-150000.12.65.1.x86_64",
"SUSE Manager Client Tools for SLE Micro 5:libirs1601-64bit-9.16.6-150000.12.65.1.aarch64_ilp32",
"SUSE Manager Client Tools for SLE Micro 5:libirs1601-9.16.6-150000.12.65.1.aarch64",
"SUSE Manager Client Tools for SLE Micro 5:libirs1601-9.16.6-150000.12.65.1.s390x",
"SUSE Manager Client Tools for SLE Micro 5:libirs1601-9.16.6-150000.12.65.1.x86_64",
"SUSE Manager Client Tools for SLE Micro 5:libisc1606-64bit-9.16.6-150000.12.65.1.aarch64_ilp32",
"SUSE Manager Client Tools for SLE Micro 5:libisc1606-9.16.6-150000.12.65.1.aarch64",
"SUSE Manager Client Tools for SLE Micro 5:libisc1606-9.16.6-150000.12.65.1.s390x",
"SUSE Manager Client Tools for SLE Micro 5:libisc1606-9.16.6-150000.12.65.1.x86_64",
"SUSE Manager Client Tools for SLE Micro 5:libisccc1600-64bit-9.16.6-150000.12.65.1.aarch64_ilp32",
"SUSE Manager Client Tools for SLE Micro 5:libisccc1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Manager Client Tools for SLE Micro 5:libisccc1600-9.16.6-150000.12.65.1.s390x",
"SUSE Manager Client Tools for SLE Micro 5:libisccc1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Manager Client Tools for SLE Micro 5:libisccfg1600-64bit-9.16.6-150000.12.65.1.aarch64_ilp32",
"SUSE Manager Client Tools for SLE Micro 5:libisccfg1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Manager Client Tools for SLE Micro 5:libisccfg1600-9.16.6-150000.12.65.1.s390x",
"SUSE Manager Client Tools for SLE Micro 5:libisccfg1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Manager Client Tools for SLE Micro 5:libns1604-9.16.6-150000.12.65.1.s390x",
"SUSE Manager Client Tools for SLE Micro 5:libns1604-9.16.6-150000.12.65.1.x86_64",
"SUSE Manager Client Tools for SLE Micro 5:python3-bind-9.16.6-150000.12.65.1.noarch",
"SUSE Manager Proxy Module 4.2:python3-zypp-plugin-spacewalk-1.0.14-150000.3.35.1.noarch",
"SUSE Manager Proxy Module 4.2:zypp-plugin-spacewalk-1.0.14-150000.3.35.1.noarch",
"SUSE Manager Proxy Module 4.3:python3-zypp-plugin-spacewalk-1.0.14-150000.3.35.1.noarch",
"SUSE Manager Proxy Module 4.3:zypp-plugin-spacewalk-1.0.14-150000.3.35.1.noarch",
"openSUSE Leap 15.4:bind-devel-32bit-9.16.6-150000.12.65.1.x86_64",
"openSUSE Leap 15.4:dracut-saltboot-0.1.1681904360.84ef141-150000.1.50.1.noarch",
"openSUSE Leap 15.4:libbind9-1600-32bit-9.16.6-150000.12.65.1.x86_64",
"openSUSE Leap 15.4:libdns1605-32bit-9.16.6-150000.12.65.1.x86_64",
"openSUSE Leap 15.4:libirs1601-32bit-9.16.6-150000.12.65.1.x86_64",
"openSUSE Leap 15.4:libisc1606-32bit-9.16.6-150000.12.65.1.x86_64",
"openSUSE Leap 15.4:libisccc1600-32bit-9.16.6-150000.12.65.1.x86_64",
"openSUSE Leap 15.4:libisccfg1600-32bit-9.16.6-150000.12.65.1.x86_64",
"openSUSE Leap 15.4:libns1604-32bit-9.16.6-150000.12.65.1.x86_64",
"openSUSE Leap 15.4:spacecmd-4.3.21-150000.3.98.1.noarch",
"openSUSE Leap 15.4:wire-0.5.0-150000.1.12.3.aarch64",
"openSUSE Leap 15.4:wire-0.5.0-150000.1.12.3.ppc64le",
"openSUSE Leap 15.4:wire-0.5.0-150000.1.12.3.s390x",
"openSUSE Leap 15.4:wire-0.5.0-150000.1.12.3.x86_64",
"openSUSE Leap 15.5:dracut-saltboot-0.1.1681904360.84ef141-150000.1.50.1.noarch",
"openSUSE Leap 15.5:spacecmd-4.3.21-150000.3.98.1.noarch",
"openSUSE Leap 15.5:wire-0.5.0-150000.1.12.3.aarch64",
"openSUSE Leap 15.5:wire-0.5.0-150000.1.12.3.ppc64le",
"openSUSE Leap 15.5:wire-0.5.0-150000.1.12.3.s390x",
"openSUSE Leap 15.5:wire-0.5.0-150000.1.12.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-1387",
"url": "https://www.suse.com/security/cve/CVE-2023-1387"
},
{
"category": "external",
"summary": "SUSE Bug 1210907 for CVE-2023-1387",
"url": "https://bugzilla.suse.com/1210907"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 7:bind-9.16.6-150000.12.65.1.aarch64",
"SUSE Enterprise Storage 7:bind-9.16.6-150000.12.65.1.x86_64",
"SUSE Enterprise Storage 7:bind-chrootenv-9.16.6-150000.12.65.1.aarch64",
"SUSE Enterprise Storage 7:bind-chrootenv-9.16.6-150000.12.65.1.x86_64",
"SUSE Enterprise Storage 7:bind-devel-9.16.6-150000.12.65.1.aarch64",
"SUSE Enterprise Storage 7:bind-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Enterprise Storage 7:bind-doc-9.16.6-150000.12.65.1.noarch",
"SUSE Enterprise Storage 7:bind-utils-9.16.6-150000.12.65.1.aarch64",
"SUSE Enterprise Storage 7:bind-utils-9.16.6-150000.12.65.1.x86_64",
"SUSE Enterprise Storage 7:libbind9-1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Enterprise Storage 7:libbind9-1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Enterprise Storage 7:libdns1605-9.16.6-150000.12.65.1.aarch64",
"SUSE Enterprise Storage 7:libdns1605-9.16.6-150000.12.65.1.x86_64",
"SUSE Enterprise Storage 7:libirs-devel-9.16.6-150000.12.65.1.aarch64",
"SUSE Enterprise Storage 7:libirs-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Enterprise Storage 7:libirs1601-9.16.6-150000.12.65.1.aarch64",
"SUSE Enterprise Storage 7:libirs1601-9.16.6-150000.12.65.1.x86_64",
"SUSE Enterprise Storage 7:libisc1606-9.16.6-150000.12.65.1.aarch64",
"SUSE Enterprise Storage 7:libisc1606-9.16.6-150000.12.65.1.x86_64",
"SUSE Enterprise Storage 7:libisccc1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Enterprise Storage 7:libisccc1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Enterprise Storage 7:libisccfg1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Enterprise Storage 7:libisccfg1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Enterprise Storage 7:libns1604-9.16.6-150000.12.65.1.aarch64",
"SUSE Enterprise Storage 7:libns1604-9.16.6-150000.12.65.1.x86_64",
"SUSE Enterprise Storage 7:python3-bind-9.16.6-150000.12.65.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:bind-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:bind-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:bind-chrootenv-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:bind-chrootenv-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:bind-devel-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:bind-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:bind-doc-9.16.6-150000.12.65.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:bind-utils-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:bind-utils-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libbind9-1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libbind9-1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libdns1605-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libdns1605-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libirs-devel-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libirs-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libirs1601-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libirs1601-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libisc1606-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libisc1606-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libisccc1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libisccc1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libisccfg1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libisccfg1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libns1604-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libns1604-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:python3-bind-9.16.6-150000.12.65.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:bind-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:bind-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:bind-chrootenv-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:bind-chrootenv-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:bind-devel-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:bind-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:bind-doc-9.16.6-150000.12.65.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:bind-utils-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:bind-utils-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libbind9-1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libbind9-1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libdns1605-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libdns1605-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libirs-devel-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libirs-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libirs1601-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libirs1601-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libisc1606-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libisc1606-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libisccc1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libisccc1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libisccfg1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libisccfg1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libns1604-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libns1604-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:python3-bind-9.16.6-150000.12.65.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-chrootenv-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-chrootenv-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-chrootenv-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-chrootenv-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-devel-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-devel-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-devel-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-doc-9.16.6-150000.12.65.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-utils-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-utils-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-utils-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-utils-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libbind9-1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libbind9-1600-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libbind9-1600-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libbind9-1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libdns1605-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libdns1605-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libdns1605-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libdns1605-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libirs-devel-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libirs-devel-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libirs-devel-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libirs-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libirs1601-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libirs1601-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libirs1601-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libirs1601-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libisc1606-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libisc1606-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libisc1606-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libisc1606-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libisccc1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libisccc1600-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libisccc1600-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libisccc1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libisccfg1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libisccfg1600-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libisccfg1600-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libisccfg1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libns1604-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libns1604-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libns1604-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libns1604-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:python3-bind-9.16.6-150000.12.65.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-chrootenv-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-chrootenv-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-chrootenv-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-chrootenv-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-devel-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-devel-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-devel-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-doc-9.16.6-150000.12.65.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-utils-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-utils-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-utils-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-utils-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libbind9-1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libbind9-1600-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libbind9-1600-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libbind9-1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libdns1605-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libdns1605-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libdns1605-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libdns1605-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libirs-devel-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libirs-devel-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libirs-devel-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libirs-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libirs1601-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libirs1601-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libirs1601-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libirs1601-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libisc1606-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libisc1606-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libisc1606-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libisc1606-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libisccc1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libisccc1600-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libisccc1600-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libisccc1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libisccfg1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libisccfg1600-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libisccfg1600-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libisccfg1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libns1604-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libns1604-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libns1604-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libns1604-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:python3-bind-9.16.6-150000.12.65.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:bind-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:bind-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:bind-chrootenv-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:bind-chrootenv-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:bind-devel-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:bind-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:bind-doc-9.16.6-150000.12.65.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:bind-utils-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:bind-utils-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libbind9-1600-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libbind9-1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libdns1605-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libdns1605-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libirs-devel-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libirs-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libirs1601-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libirs1601-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libisc1606-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libisc1606-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libisccc1600-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libisccc1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libisccfg1600-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libisccfg1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libns1604-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libns1604-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:python3-bind-9.16.6-150000.12.65.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:bind-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:bind-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:bind-chrootenv-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:bind-chrootenv-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:bind-devel-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:bind-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:bind-doc-9.16.6-150000.12.65.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:bind-utils-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:bind-utils-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libbind9-1600-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libbind9-1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libdns1605-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libdns1605-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libirs-devel-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libirs-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libirs1601-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libirs1601-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libisc1606-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libisc1606-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libisccc1600-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libisccc1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libisccfg1600-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libisccfg1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libns1604-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libns1604-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:python3-bind-9.16.6-150000.12.65.1.noarch",
"SUSE Manager Client Tools 15:dracut-saltboot-0.1.1681904360.84ef141-150000.1.50.1.noarch",
"SUSE Manager Client Tools 15:grafana-9.5.1-150000.1.48.5.aarch64",
"SUSE Manager Client Tools 15:grafana-9.5.1-150000.1.48.5.ppc64le",
"SUSE Manager Client Tools 15:grafana-9.5.1-150000.1.48.5.s390x",
"SUSE Manager Client Tools 15:grafana-9.5.1-150000.1.48.5.x86_64",
"SUSE Manager Client Tools 15:mgr-daemon-4.3.7-150000.1.41.1.noarch",
"SUSE Manager Client Tools 15:python3-uyuni-common-libs-4.3.8-150000.1.33.1.aarch64",
"SUSE Manager Client Tools 15:python3-uyuni-common-libs-4.3.8-150000.1.33.1.ppc64le",
"SUSE Manager Client Tools 15:python3-uyuni-common-libs-4.3.8-150000.1.33.1.s390x",
"SUSE Manager Client Tools 15:python3-uyuni-common-libs-4.3.8-150000.1.33.1.x86_64",
"SUSE Manager Client Tools 15:python3-zypp-plugin-spacewalk-1.0.14-150000.3.35.1.noarch",
"SUSE Manager Client Tools 15:spacecmd-4.3.21-150000.3.98.1.noarch",
"SUSE Manager Client Tools 15:zypp-plugin-spacewalk-1.0.14-150000.3.35.1.noarch",
"SUSE Manager Client Tools for SLE Micro 5:bind-utils-9.16.6-150000.12.65.1.aarch64",
"SUSE Manager Client Tools for SLE Micro 5:bind-utils-9.16.6-150000.12.65.1.s390x",
"SUSE Manager Client Tools for SLE Micro 5:bind-utils-9.16.6-150000.12.65.1.x86_64",
"SUSE Manager Client Tools for SLE Micro 5:dracut-saltboot-0.1.1681904360.84ef141-150000.1.50.1.noarch",
"SUSE Manager Client Tools for SLE Micro 5:libbind9-1600-64bit-9.16.6-150000.12.65.1.aarch64_ilp32",
"SUSE Manager Client Tools for SLE Micro 5:libbind9-1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Manager Client Tools for SLE Micro 5:libbind9-1600-9.16.6-150000.12.65.1.s390x",
"SUSE Manager Client Tools for SLE Micro 5:libbind9-1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Manager Client Tools for SLE Micro 5:libdns1605-64bit-9.16.6-150000.12.65.1.aarch64_ilp32",
"SUSE Manager Client Tools for SLE Micro 5:libdns1605-9.16.6-150000.12.65.1.aarch64",
"SUSE Manager Client Tools for SLE Micro 5:libdns1605-9.16.6-150000.12.65.1.s390x",
"SUSE Manager Client Tools for SLE Micro 5:libdns1605-9.16.6-150000.12.65.1.x86_64",
"SUSE Manager Client Tools for SLE Micro 5:libirs1601-64bit-9.16.6-150000.12.65.1.aarch64_ilp32",
"SUSE Manager Client Tools for SLE Micro 5:libirs1601-9.16.6-150000.12.65.1.aarch64",
"SUSE Manager Client Tools for SLE Micro 5:libirs1601-9.16.6-150000.12.65.1.s390x",
"SUSE Manager Client Tools for SLE Micro 5:libirs1601-9.16.6-150000.12.65.1.x86_64",
"SUSE Manager Client Tools for SLE Micro 5:libisc1606-64bit-9.16.6-150000.12.65.1.aarch64_ilp32",
"SUSE Manager Client Tools for SLE Micro 5:libisc1606-9.16.6-150000.12.65.1.aarch64",
"SUSE Manager Client Tools for SLE Micro 5:libisc1606-9.16.6-150000.12.65.1.s390x",
"SUSE Manager Client Tools for SLE Micro 5:libisc1606-9.16.6-150000.12.65.1.x86_64",
"SUSE Manager Client Tools for SLE Micro 5:libisccc1600-64bit-9.16.6-150000.12.65.1.aarch64_ilp32",
"SUSE Manager Client Tools for SLE Micro 5:libisccc1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Manager Client Tools for SLE Micro 5:libisccc1600-9.16.6-150000.12.65.1.s390x",
"SUSE Manager Client Tools for SLE Micro 5:libisccc1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Manager Client Tools for SLE Micro 5:libisccfg1600-64bit-9.16.6-150000.12.65.1.aarch64_ilp32",
"SUSE Manager Client Tools for SLE Micro 5:libisccfg1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Manager Client Tools for SLE Micro 5:libisccfg1600-9.16.6-150000.12.65.1.s390x",
"SUSE Manager Client Tools for SLE Micro 5:libisccfg1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Manager Client Tools for SLE Micro 5:libns1604-9.16.6-150000.12.65.1.s390x",
"SUSE Manager Client Tools for SLE Micro 5:libns1604-9.16.6-150000.12.65.1.x86_64",
"SUSE Manager Client Tools for SLE Micro 5:python3-bind-9.16.6-150000.12.65.1.noarch",
"SUSE Manager Proxy Module 4.2:python3-zypp-plugin-spacewalk-1.0.14-150000.3.35.1.noarch",
"SUSE Manager Proxy Module 4.2:zypp-plugin-spacewalk-1.0.14-150000.3.35.1.noarch",
"SUSE Manager Proxy Module 4.3:python3-zypp-plugin-spacewalk-1.0.14-150000.3.35.1.noarch",
"SUSE Manager Proxy Module 4.3:zypp-plugin-spacewalk-1.0.14-150000.3.35.1.noarch",
"openSUSE Leap 15.4:bind-devel-32bit-9.16.6-150000.12.65.1.x86_64",
"openSUSE Leap 15.4:dracut-saltboot-0.1.1681904360.84ef141-150000.1.50.1.noarch",
"openSUSE Leap 15.4:libbind9-1600-32bit-9.16.6-150000.12.65.1.x86_64",
"openSUSE Leap 15.4:libdns1605-32bit-9.16.6-150000.12.65.1.x86_64",
"openSUSE Leap 15.4:libirs1601-32bit-9.16.6-150000.12.65.1.x86_64",
"openSUSE Leap 15.4:libisc1606-32bit-9.16.6-150000.12.65.1.x86_64",
"openSUSE Leap 15.4:libisccc1600-32bit-9.16.6-150000.12.65.1.x86_64",
"openSUSE Leap 15.4:libisccfg1600-32bit-9.16.6-150000.12.65.1.x86_64",
"openSUSE Leap 15.4:libns1604-32bit-9.16.6-150000.12.65.1.x86_64",
"openSUSE Leap 15.4:spacecmd-4.3.21-150000.3.98.1.noarch",
"openSUSE Leap 15.4:wire-0.5.0-150000.1.12.3.aarch64",
"openSUSE Leap 15.4:wire-0.5.0-150000.1.12.3.ppc64le",
"openSUSE Leap 15.4:wire-0.5.0-150000.1.12.3.s390x",
"openSUSE Leap 15.4:wire-0.5.0-150000.1.12.3.x86_64",
"openSUSE Leap 15.5:dracut-saltboot-0.1.1681904360.84ef141-150000.1.50.1.noarch",
"openSUSE Leap 15.5:spacecmd-4.3.21-150000.3.98.1.noarch",
"openSUSE Leap 15.5:wire-0.5.0-150000.1.12.3.aarch64",
"openSUSE Leap 15.5:wire-0.5.0-150000.1.12.3.ppc64le",
"openSUSE Leap 15.5:wire-0.5.0-150000.1.12.3.s390x",
"openSUSE Leap 15.5:wire-0.5.0-150000.1.12.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 7:bind-9.16.6-150000.12.65.1.aarch64",
"SUSE Enterprise Storage 7:bind-9.16.6-150000.12.65.1.x86_64",
"SUSE Enterprise Storage 7:bind-chrootenv-9.16.6-150000.12.65.1.aarch64",
"SUSE Enterprise Storage 7:bind-chrootenv-9.16.6-150000.12.65.1.x86_64",
"SUSE Enterprise Storage 7:bind-devel-9.16.6-150000.12.65.1.aarch64",
"SUSE Enterprise Storage 7:bind-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Enterprise Storage 7:bind-doc-9.16.6-150000.12.65.1.noarch",
"SUSE Enterprise Storage 7:bind-utils-9.16.6-150000.12.65.1.aarch64",
"SUSE Enterprise Storage 7:bind-utils-9.16.6-150000.12.65.1.x86_64",
"SUSE Enterprise Storage 7:libbind9-1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Enterprise Storage 7:libbind9-1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Enterprise Storage 7:libdns1605-9.16.6-150000.12.65.1.aarch64",
"SUSE Enterprise Storage 7:libdns1605-9.16.6-150000.12.65.1.x86_64",
"SUSE Enterprise Storage 7:libirs-devel-9.16.6-150000.12.65.1.aarch64",
"SUSE Enterprise Storage 7:libirs-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Enterprise Storage 7:libirs1601-9.16.6-150000.12.65.1.aarch64",
"SUSE Enterprise Storage 7:libirs1601-9.16.6-150000.12.65.1.x86_64",
"SUSE Enterprise Storage 7:libisc1606-9.16.6-150000.12.65.1.aarch64",
"SUSE Enterprise Storage 7:libisc1606-9.16.6-150000.12.65.1.x86_64",
"SUSE Enterprise Storage 7:libisccc1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Enterprise Storage 7:libisccc1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Enterprise Storage 7:libisccfg1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Enterprise Storage 7:libisccfg1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Enterprise Storage 7:libns1604-9.16.6-150000.12.65.1.aarch64",
"SUSE Enterprise Storage 7:libns1604-9.16.6-150000.12.65.1.x86_64",
"SUSE Enterprise Storage 7:python3-bind-9.16.6-150000.12.65.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:bind-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:bind-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:bind-chrootenv-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:bind-chrootenv-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:bind-devel-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:bind-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:bind-doc-9.16.6-150000.12.65.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:bind-utils-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:bind-utils-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libbind9-1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libbind9-1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libdns1605-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libdns1605-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libirs-devel-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libirs-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libirs1601-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libirs1601-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libisc1606-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libisc1606-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libisccc1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libisccc1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libisccfg1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libisccfg1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libns1604-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libns1604-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:python3-bind-9.16.6-150000.12.65.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:bind-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:bind-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:bind-chrootenv-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:bind-chrootenv-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:bind-devel-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:bind-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:bind-doc-9.16.6-150000.12.65.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:bind-utils-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:bind-utils-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libbind9-1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libbind9-1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libdns1605-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libdns1605-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libirs-devel-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libirs-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libirs1601-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libirs1601-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libisc1606-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libisc1606-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libisccc1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libisccc1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libisccfg1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libisccfg1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libns1604-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libns1604-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:python3-bind-9.16.6-150000.12.65.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-chrootenv-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-chrootenv-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-chrootenv-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-chrootenv-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-devel-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-devel-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-devel-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-doc-9.16.6-150000.12.65.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-utils-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-utils-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-utils-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-utils-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libbind9-1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libbind9-1600-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libbind9-1600-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libbind9-1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libdns1605-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libdns1605-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libdns1605-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libdns1605-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libirs-devel-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libirs-devel-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libirs-devel-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libirs-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libirs1601-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libirs1601-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libirs1601-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libirs1601-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libisc1606-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libisc1606-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libisc1606-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libisc1606-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libisccc1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libisccc1600-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libisccc1600-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libisccc1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libisccfg1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libisccfg1600-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libisccfg1600-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libisccfg1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libns1604-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libns1604-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libns1604-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libns1604-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:python3-bind-9.16.6-150000.12.65.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-chrootenv-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-chrootenv-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-chrootenv-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-chrootenv-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-devel-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-devel-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-devel-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-doc-9.16.6-150000.12.65.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-utils-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-utils-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-utils-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-utils-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libbind9-1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libbind9-1600-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libbind9-1600-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libbind9-1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libdns1605-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libdns1605-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libdns1605-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libdns1605-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libirs-devel-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libirs-devel-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libirs-devel-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libirs-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libirs1601-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libirs1601-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libirs1601-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libirs1601-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libisc1606-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libisc1606-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libisc1606-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libisc1606-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libisccc1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libisccc1600-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libisccc1600-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libisccc1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libisccfg1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libisccfg1600-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libisccfg1600-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libisccfg1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libns1604-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libns1604-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libns1604-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libns1604-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:python3-bind-9.16.6-150000.12.65.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:bind-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:bind-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:bind-chrootenv-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:bind-chrootenv-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:bind-devel-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:bind-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:bind-doc-9.16.6-150000.12.65.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:bind-utils-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:bind-utils-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libbind9-1600-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libbind9-1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libdns1605-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libdns1605-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libirs-devel-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libirs-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libirs1601-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libirs1601-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libisc1606-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libisc1606-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libisccc1600-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libisccc1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libisccfg1600-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libisccfg1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libns1604-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libns1604-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:python3-bind-9.16.6-150000.12.65.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:bind-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:bind-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:bind-chrootenv-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:bind-chrootenv-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:bind-devel-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:bind-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:bind-doc-9.16.6-150000.12.65.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:bind-utils-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:bind-utils-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libbind9-1600-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libbind9-1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libdns1605-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libdns1605-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libirs-devel-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libirs-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libirs1601-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libirs1601-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libisc1606-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libisc1606-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libisccc1600-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libisccc1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libisccfg1600-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libisccfg1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libns1604-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libns1604-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:python3-bind-9.16.6-150000.12.65.1.noarch",
"SUSE Manager Client Tools 15:dracut-saltboot-0.1.1681904360.84ef141-150000.1.50.1.noarch",
"SUSE Manager Client Tools 15:grafana-9.5.1-150000.1.48.5.aarch64",
"SUSE Manager Client Tools 15:grafana-9.5.1-150000.1.48.5.ppc64le",
"SUSE Manager Client Tools 15:grafana-9.5.1-150000.1.48.5.s390x",
"SUSE Manager Client Tools 15:grafana-9.5.1-150000.1.48.5.x86_64",
"SUSE Manager Client Tools 15:mgr-daemon-4.3.7-150000.1.41.1.noarch",
"SUSE Manager Client Tools 15:python3-uyuni-common-libs-4.3.8-150000.1.33.1.aarch64",
"SUSE Manager Client Tools 15:python3-uyuni-common-libs-4.3.8-150000.1.33.1.ppc64le",
"SUSE Manager Client Tools 15:python3-uyuni-common-libs-4.3.8-150000.1.33.1.s390x",
"SUSE Manager Client Tools 15:python3-uyuni-common-libs-4.3.8-150000.1.33.1.x86_64",
"SUSE Manager Client Tools 15:python3-zypp-plugin-spacewalk-1.0.14-150000.3.35.1.noarch",
"SUSE Manager Client Tools 15:spacecmd-4.3.21-150000.3.98.1.noarch",
"SUSE Manager Client Tools 15:zypp-plugin-spacewalk-1.0.14-150000.3.35.1.noarch",
"SUSE Manager Client Tools for SLE Micro 5:bind-utils-9.16.6-150000.12.65.1.aarch64",
"SUSE Manager Client Tools for SLE Micro 5:bind-utils-9.16.6-150000.12.65.1.s390x",
"SUSE Manager Client Tools for SLE Micro 5:bind-utils-9.16.6-150000.12.65.1.x86_64",
"SUSE Manager Client Tools for SLE Micro 5:dracut-saltboot-0.1.1681904360.84ef141-150000.1.50.1.noarch",
"SUSE Manager Client Tools for SLE Micro 5:libbind9-1600-64bit-9.16.6-150000.12.65.1.aarch64_ilp32",
"SUSE Manager Client Tools for SLE Micro 5:libbind9-1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Manager Client Tools for SLE Micro 5:libbind9-1600-9.16.6-150000.12.65.1.s390x",
"SUSE Manager Client Tools for SLE Micro 5:libbind9-1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Manager Client Tools for SLE Micro 5:libdns1605-64bit-9.16.6-150000.12.65.1.aarch64_ilp32",
"SUSE Manager Client Tools for SLE Micro 5:libdns1605-9.16.6-150000.12.65.1.aarch64",
"SUSE Manager Client Tools for SLE Micro 5:libdns1605-9.16.6-150000.12.65.1.s390x",
"SUSE Manager Client Tools for SLE Micro 5:libdns1605-9.16.6-150000.12.65.1.x86_64",
"SUSE Manager Client Tools for SLE Micro 5:libirs1601-64bit-9.16.6-150000.12.65.1.aarch64_ilp32",
"SUSE Manager Client Tools for SLE Micro 5:libirs1601-9.16.6-150000.12.65.1.aarch64",
"SUSE Manager Client Tools for SLE Micro 5:libirs1601-9.16.6-150000.12.65.1.s390x",
"SUSE Manager Client Tools for SLE Micro 5:libirs1601-9.16.6-150000.12.65.1.x86_64",
"SUSE Manager Client Tools for SLE Micro 5:libisc1606-64bit-9.16.6-150000.12.65.1.aarch64_ilp32",
"SUSE Manager Client Tools for SLE Micro 5:libisc1606-9.16.6-150000.12.65.1.aarch64",
"SUSE Manager Client Tools for SLE Micro 5:libisc1606-9.16.6-150000.12.65.1.s390x",
"SUSE Manager Client Tools for SLE Micro 5:libisc1606-9.16.6-150000.12.65.1.x86_64",
"SUSE Manager Client Tools for SLE Micro 5:libisccc1600-64bit-9.16.6-150000.12.65.1.aarch64_ilp32",
"SUSE Manager Client Tools for SLE Micro 5:libisccc1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Manager Client Tools for SLE Micro 5:libisccc1600-9.16.6-150000.12.65.1.s390x",
"SUSE Manager Client Tools for SLE Micro 5:libisccc1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Manager Client Tools for SLE Micro 5:libisccfg1600-64bit-9.16.6-150000.12.65.1.aarch64_ilp32",
"SUSE Manager Client Tools for SLE Micro 5:libisccfg1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Manager Client Tools for SLE Micro 5:libisccfg1600-9.16.6-150000.12.65.1.s390x",
"SUSE Manager Client Tools for SLE Micro 5:libisccfg1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Manager Client Tools for SLE Micro 5:libns1604-9.16.6-150000.12.65.1.s390x",
"SUSE Manager Client Tools for SLE Micro 5:libns1604-9.16.6-150000.12.65.1.x86_64",
"SUSE Manager Client Tools for SLE Micro 5:python3-bind-9.16.6-150000.12.65.1.noarch",
"SUSE Manager Proxy Module 4.2:python3-zypp-plugin-spacewalk-1.0.14-150000.3.35.1.noarch",
"SUSE Manager Proxy Module 4.2:zypp-plugin-spacewalk-1.0.14-150000.3.35.1.noarch",
"SUSE Manager Proxy Module 4.3:python3-zypp-plugin-spacewalk-1.0.14-150000.3.35.1.noarch",
"SUSE Manager Proxy Module 4.3:zypp-plugin-spacewalk-1.0.14-150000.3.35.1.noarch",
"openSUSE Leap 15.4:bind-devel-32bit-9.16.6-150000.12.65.1.x86_64",
"openSUSE Leap 15.4:dracut-saltboot-0.1.1681904360.84ef141-150000.1.50.1.noarch",
"openSUSE Leap 15.4:libbind9-1600-32bit-9.16.6-150000.12.65.1.x86_64",
"openSUSE Leap 15.4:libdns1605-32bit-9.16.6-150000.12.65.1.x86_64",
"openSUSE Leap 15.4:libirs1601-32bit-9.16.6-150000.12.65.1.x86_64",
"openSUSE Leap 15.4:libisc1606-32bit-9.16.6-150000.12.65.1.x86_64",
"openSUSE Leap 15.4:libisccc1600-32bit-9.16.6-150000.12.65.1.x86_64",
"openSUSE Leap 15.4:libisccfg1600-32bit-9.16.6-150000.12.65.1.x86_64",
"openSUSE Leap 15.4:libns1604-32bit-9.16.6-150000.12.65.1.x86_64",
"openSUSE Leap 15.4:spacecmd-4.3.21-150000.3.98.1.noarch",
"openSUSE Leap 15.4:wire-0.5.0-150000.1.12.3.aarch64",
"openSUSE Leap 15.4:wire-0.5.0-150000.1.12.3.ppc64le",
"openSUSE Leap 15.4:wire-0.5.0-150000.1.12.3.s390x",
"openSUSE Leap 15.4:wire-0.5.0-150000.1.12.3.x86_64",
"openSUSE Leap 15.5:dracut-saltboot-0.1.1681904360.84ef141-150000.1.50.1.noarch",
"openSUSE Leap 15.5:spacecmd-4.3.21-150000.3.98.1.noarch",
"openSUSE Leap 15.5:wire-0.5.0-150000.1.12.3.aarch64",
"openSUSE Leap 15.5:wire-0.5.0-150000.1.12.3.ppc64le",
"openSUSE Leap 15.5:wire-0.5.0-150000.1.12.3.s390x",
"openSUSE Leap 15.5:wire-0.5.0-150000.1.12.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2023-06-21T11:49:43Z",
"details": "moderate"
}
],
"title": "CVE-2023-1387"
},
{
"cve": "CVE-2023-1410",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-1410"
}
],
"notes": [
{
"category": "general",
"text": "Grafana is an open-source platform for monitoring and observability. \n\nGrafana had a stored XSS vulnerability in the Graphite FunctionDescription tooltip. \n\nThe stored XSS vulnerability was possible due the value of the Function Description was not properly sanitized.\n\nAn attacker needs to have control over the Graphite data source in order to manipulate a function description and a Grafana admin needs to configure the data source, later a Grafana user needs to select a tampered function and hover over the description. \n\n Users may upgrade to version 8.5.22, 9.2.15 and 9.3.11 to receive a fix. \n\n\n\n\n\n\n\n\n\n\n",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 7:bind-9.16.6-150000.12.65.1.aarch64",
"SUSE Enterprise Storage 7:bind-9.16.6-150000.12.65.1.x86_64",
"SUSE Enterprise Storage 7:bind-chrootenv-9.16.6-150000.12.65.1.aarch64",
"SUSE Enterprise Storage 7:bind-chrootenv-9.16.6-150000.12.65.1.x86_64",
"SUSE Enterprise Storage 7:bind-devel-9.16.6-150000.12.65.1.aarch64",
"SUSE Enterprise Storage 7:bind-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Enterprise Storage 7:bind-doc-9.16.6-150000.12.65.1.noarch",
"SUSE Enterprise Storage 7:bind-utils-9.16.6-150000.12.65.1.aarch64",
"SUSE Enterprise Storage 7:bind-utils-9.16.6-150000.12.65.1.x86_64",
"SUSE Enterprise Storage 7:libbind9-1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Enterprise Storage 7:libbind9-1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Enterprise Storage 7:libdns1605-9.16.6-150000.12.65.1.aarch64",
"SUSE Enterprise Storage 7:libdns1605-9.16.6-150000.12.65.1.x86_64",
"SUSE Enterprise Storage 7:libirs-devel-9.16.6-150000.12.65.1.aarch64",
"SUSE Enterprise Storage 7:libirs-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Enterprise Storage 7:libirs1601-9.16.6-150000.12.65.1.aarch64",
"SUSE Enterprise Storage 7:libirs1601-9.16.6-150000.12.65.1.x86_64",
"SUSE Enterprise Storage 7:libisc1606-9.16.6-150000.12.65.1.aarch64",
"SUSE Enterprise Storage 7:libisc1606-9.16.6-150000.12.65.1.x86_64",
"SUSE Enterprise Storage 7:libisccc1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Enterprise Storage 7:libisccc1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Enterprise Storage 7:libisccfg1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Enterprise Storage 7:libisccfg1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Enterprise Storage 7:libns1604-9.16.6-150000.12.65.1.aarch64",
"SUSE Enterprise Storage 7:libns1604-9.16.6-150000.12.65.1.x86_64",
"SUSE Enterprise Storage 7:python3-bind-9.16.6-150000.12.65.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:bind-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:bind-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:bind-chrootenv-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:bind-chrootenv-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:bind-devel-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:bind-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:bind-doc-9.16.6-150000.12.65.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:bind-utils-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:bind-utils-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libbind9-1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libbind9-1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libdns1605-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libdns1605-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libirs-devel-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libirs-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libirs1601-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libirs1601-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libisc1606-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libisc1606-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libisccc1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libisccc1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libisccfg1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libisccfg1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libns1604-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libns1604-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:python3-bind-9.16.6-150000.12.65.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:bind-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:bind-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:bind-chrootenv-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:bind-chrootenv-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:bind-devel-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:bind-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:bind-doc-9.16.6-150000.12.65.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:bind-utils-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:bind-utils-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libbind9-1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libbind9-1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libdns1605-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libdns1605-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libirs-devel-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libirs-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libirs1601-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libirs1601-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libisc1606-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libisc1606-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libisccc1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libisccc1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libisccfg1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libisccfg1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libns1604-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libns1604-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:python3-bind-9.16.6-150000.12.65.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-chrootenv-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-chrootenv-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-chrootenv-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-chrootenv-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-devel-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-devel-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-devel-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-doc-9.16.6-150000.12.65.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-utils-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-utils-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-utils-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-utils-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libbind9-1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libbind9-1600-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libbind9-1600-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libbind9-1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libdns1605-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libdns1605-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libdns1605-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libdns1605-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libirs-devel-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libirs-devel-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libirs-devel-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libirs-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libirs1601-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libirs1601-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libirs1601-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libirs1601-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libisc1606-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libisc1606-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libisc1606-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libisc1606-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libisccc1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libisccc1600-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libisccc1600-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libisccc1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libisccfg1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libisccfg1600-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libisccfg1600-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libisccfg1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libns1604-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libns1604-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libns1604-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libns1604-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:python3-bind-9.16.6-150000.12.65.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-chrootenv-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-chrootenv-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-chrootenv-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-chrootenv-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-devel-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-devel-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-devel-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-doc-9.16.6-150000.12.65.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-utils-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-utils-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-utils-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-utils-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libbind9-1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libbind9-1600-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libbind9-1600-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libbind9-1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libdns1605-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libdns1605-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libdns1605-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libdns1605-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libirs-devel-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libirs-devel-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libirs-devel-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libirs-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libirs1601-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libirs1601-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libirs1601-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libirs1601-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libisc1606-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libisc1606-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libisc1606-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libisc1606-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libisccc1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libisccc1600-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libisccc1600-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libisccc1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libisccfg1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libisccfg1600-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libisccfg1600-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libisccfg1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libns1604-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libns1604-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libns1604-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libns1604-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:python3-bind-9.16.6-150000.12.65.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:bind-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:bind-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:bind-chrootenv-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:bind-chrootenv-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:bind-devel-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:bind-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:bind-doc-9.16.6-150000.12.65.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:bind-utils-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:bind-utils-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libbind9-1600-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libbind9-1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libdns1605-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libdns1605-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libirs-devel-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libirs-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libirs1601-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libirs1601-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libisc1606-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libisc1606-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libisccc1600-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libisccc1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libisccfg1600-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libisccfg1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libns1604-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libns1604-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:python3-bind-9.16.6-150000.12.65.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:bind-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:bind-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:bind-chrootenv-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:bind-chrootenv-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:bind-devel-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:bind-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:bind-doc-9.16.6-150000.12.65.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:bind-utils-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:bind-utils-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libbind9-1600-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libbind9-1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libdns1605-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libdns1605-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libirs-devel-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libirs-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libirs1601-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libirs1601-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libisc1606-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libisc1606-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libisccc1600-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libisccc1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libisccfg1600-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libisccfg1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libns1604-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libns1604-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:python3-bind-9.16.6-150000.12.65.1.noarch",
"SUSE Manager Client Tools 15:dracut-saltboot-0.1.1681904360.84ef141-150000.1.50.1.noarch",
"SUSE Manager Client Tools 15:grafana-9.5.1-150000.1.48.5.aarch64",
"SUSE Manager Client Tools 15:grafana-9.5.1-150000.1.48.5.ppc64le",
"SUSE Manager Client Tools 15:grafana-9.5.1-150000.1.48.5.s390x",
"SUSE Manager Client Tools 15:grafana-9.5.1-150000.1.48.5.x86_64",
"SUSE Manager Client Tools 15:mgr-daemon-4.3.7-150000.1.41.1.noarch",
"SUSE Manager Client Tools 15:python3-uyuni-common-libs-4.3.8-150000.1.33.1.aarch64",
"SUSE Manager Client Tools 15:python3-uyuni-common-libs-4.3.8-150000.1.33.1.ppc64le",
"SUSE Manager Client Tools 15:python3-uyuni-common-libs-4.3.8-150000.1.33.1.s390x",
"SUSE Manager Client Tools 15:python3-uyuni-common-libs-4.3.8-150000.1.33.1.x86_64",
"SUSE Manager Client Tools 15:python3-zypp-plugin-spacewalk-1.0.14-150000.3.35.1.noarch",
"SUSE Manager Client Tools 15:spacecmd-4.3.21-150000.3.98.1.noarch",
"SUSE Manager Client Tools 15:zypp-plugin-spacewalk-1.0.14-150000.3.35.1.noarch",
"SUSE Manager Client Tools for SLE Micro 5:bind-utils-9.16.6-150000.12.65.1.aarch64",
"SUSE Manager Client Tools for SLE Micro 5:bind-utils-9.16.6-150000.12.65.1.s390x",
"SUSE Manager Client Tools for SLE Micro 5:bind-utils-9.16.6-150000.12.65.1.x86_64",
"SUSE Manager Client Tools for SLE Micro 5:dracut-saltboot-0.1.1681904360.84ef141-150000.1.50.1.noarch",
"SUSE Manager Client Tools for SLE Micro 5:libbind9-1600-64bit-9.16.6-150000.12.65.1.aarch64_ilp32",
"SUSE Manager Client Tools for SLE Micro 5:libbind9-1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Manager Client Tools for SLE Micro 5:libbind9-1600-9.16.6-150000.12.65.1.s390x",
"SUSE Manager Client Tools for SLE Micro 5:libbind9-1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Manager Client Tools for SLE Micro 5:libdns1605-64bit-9.16.6-150000.12.65.1.aarch64_ilp32",
"SUSE Manager Client Tools for SLE Micro 5:libdns1605-9.16.6-150000.12.65.1.aarch64",
"SUSE Manager Client Tools for SLE Micro 5:libdns1605-9.16.6-150000.12.65.1.s390x",
"SUSE Manager Client Tools for SLE Micro 5:libdns1605-9.16.6-150000.12.65.1.x86_64",
"SUSE Manager Client Tools for SLE Micro 5:libirs1601-64bit-9.16.6-150000.12.65.1.aarch64_ilp32",
"SUSE Manager Client Tools for SLE Micro 5:libirs1601-9.16.6-150000.12.65.1.aarch64",
"SUSE Manager Client Tools for SLE Micro 5:libirs1601-9.16.6-150000.12.65.1.s390x",
"SUSE Manager Client Tools for SLE Micro 5:libirs1601-9.16.6-150000.12.65.1.x86_64",
"SUSE Manager Client Tools for SLE Micro 5:libisc1606-64bit-9.16.6-150000.12.65.1.aarch64_ilp32",
"SUSE Manager Client Tools for SLE Micro 5:libisc1606-9.16.6-150000.12.65.1.aarch64",
"SUSE Manager Client Tools for SLE Micro 5:libisc1606-9.16.6-150000.12.65.1.s390x",
"SUSE Manager Client Tools for SLE Micro 5:libisc1606-9.16.6-150000.12.65.1.x86_64",
"SUSE Manager Client Tools for SLE Micro 5:libisccc1600-64bit-9.16.6-150000.12.65.1.aarch64_ilp32",
"SUSE Manager Client Tools for SLE Micro 5:libisccc1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Manager Client Tools for SLE Micro 5:libisccc1600-9.16.6-150000.12.65.1.s390x",
"SUSE Manager Client Tools for SLE Micro 5:libisccc1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Manager Client Tools for SLE Micro 5:libisccfg1600-64bit-9.16.6-150000.12.65.1.aarch64_ilp32",
"SUSE Manager Client Tools for SLE Micro 5:libisccfg1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Manager Client Tools for SLE Micro 5:libisccfg1600-9.16.6-150000.12.65.1.s390x",
"SUSE Manager Client Tools for SLE Micro 5:libisccfg1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Manager Client Tools for SLE Micro 5:libns1604-9.16.6-150000.12.65.1.s390x",
"SUSE Manager Client Tools for SLE Micro 5:libns1604-9.16.6-150000.12.65.1.x86_64",
"SUSE Manager Client Tools for SLE Micro 5:python3-bind-9.16.6-150000.12.65.1.noarch",
"SUSE Manager Proxy Module 4.2:python3-zypp-plugin-spacewalk-1.0.14-150000.3.35.1.noarch",
"SUSE Manager Proxy Module 4.2:zypp-plugin-spacewalk-1.0.14-150000.3.35.1.noarch",
"SUSE Manager Proxy Module 4.3:python3-zypp-plugin-spacewalk-1.0.14-150000.3.35.1.noarch",
"SUSE Manager Proxy Module 4.3:zypp-plugin-spacewalk-1.0.14-150000.3.35.1.noarch",
"openSUSE Leap 15.4:bind-devel-32bit-9.16.6-150000.12.65.1.x86_64",
"openSUSE Leap 15.4:dracut-saltboot-0.1.1681904360.84ef141-150000.1.50.1.noarch",
"openSUSE Leap 15.4:libbind9-1600-32bit-9.16.6-150000.12.65.1.x86_64",
"openSUSE Leap 15.4:libdns1605-32bit-9.16.6-150000.12.65.1.x86_64",
"openSUSE Leap 15.4:libirs1601-32bit-9.16.6-150000.12.65.1.x86_64",
"openSUSE Leap 15.4:libisc1606-32bit-9.16.6-150000.12.65.1.x86_64",
"openSUSE Leap 15.4:libisccc1600-32bit-9.16.6-150000.12.65.1.x86_64",
"openSUSE Leap 15.4:libisccfg1600-32bit-9.16.6-150000.12.65.1.x86_64",
"openSUSE Leap 15.4:libns1604-32bit-9.16.6-150000.12.65.1.x86_64",
"openSUSE Leap 15.4:spacecmd-4.3.21-150000.3.98.1.noarch",
"openSUSE Leap 15.4:wire-0.5.0-150000.1.12.3.aarch64",
"openSUSE Leap 15.4:wire-0.5.0-150000.1.12.3.ppc64le",
"openSUSE Leap 15.4:wire-0.5.0-150000.1.12.3.s390x",
"openSUSE Leap 15.4:wire-0.5.0-150000.1.12.3.x86_64",
"openSUSE Leap 15.5:dracut-saltboot-0.1.1681904360.84ef141-150000.1.50.1.noarch",
"openSUSE Leap 15.5:spacecmd-4.3.21-150000.3.98.1.noarch",
"openSUSE Leap 15.5:wire-0.5.0-150000.1.12.3.aarch64",
"openSUSE Leap 15.5:wire-0.5.0-150000.1.12.3.ppc64le",
"openSUSE Leap 15.5:wire-0.5.0-150000.1.12.3.s390x",
"openSUSE Leap 15.5:wire-0.5.0-150000.1.12.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-1410",
"url": "https://www.suse.com/security/cve/CVE-2023-1410"
},
{
"category": "external",
"summary": "SUSE Bug 1209645 for CVE-2023-1410",
"url": "https://bugzilla.suse.com/1209645"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 7:bind-9.16.6-150000.12.65.1.aarch64",
"SUSE Enterprise Storage 7:bind-9.16.6-150000.12.65.1.x86_64",
"SUSE Enterprise Storage 7:bind-chrootenv-9.16.6-150000.12.65.1.aarch64",
"SUSE Enterprise Storage 7:bind-chrootenv-9.16.6-150000.12.65.1.x86_64",
"SUSE Enterprise Storage 7:bind-devel-9.16.6-150000.12.65.1.aarch64",
"SUSE Enterprise Storage 7:bind-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Enterprise Storage 7:bind-doc-9.16.6-150000.12.65.1.noarch",
"SUSE Enterprise Storage 7:bind-utils-9.16.6-150000.12.65.1.aarch64",
"SUSE Enterprise Storage 7:bind-utils-9.16.6-150000.12.65.1.x86_64",
"SUSE Enterprise Storage 7:libbind9-1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Enterprise Storage 7:libbind9-1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Enterprise Storage 7:libdns1605-9.16.6-150000.12.65.1.aarch64",
"SUSE Enterprise Storage 7:libdns1605-9.16.6-150000.12.65.1.x86_64",
"SUSE Enterprise Storage 7:libirs-devel-9.16.6-150000.12.65.1.aarch64",
"SUSE Enterprise Storage 7:libirs-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Enterprise Storage 7:libirs1601-9.16.6-150000.12.65.1.aarch64",
"SUSE Enterprise Storage 7:libirs1601-9.16.6-150000.12.65.1.x86_64",
"SUSE Enterprise Storage 7:libisc1606-9.16.6-150000.12.65.1.aarch64",
"SUSE Enterprise Storage 7:libisc1606-9.16.6-150000.12.65.1.x86_64",
"SUSE Enterprise Storage 7:libisccc1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Enterprise Storage 7:libisccc1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Enterprise Storage 7:libisccfg1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Enterprise Storage 7:libisccfg1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Enterprise Storage 7:libns1604-9.16.6-150000.12.65.1.aarch64",
"SUSE Enterprise Storage 7:libns1604-9.16.6-150000.12.65.1.x86_64",
"SUSE Enterprise Storage 7:python3-bind-9.16.6-150000.12.65.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:bind-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:bind-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:bind-chrootenv-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:bind-chrootenv-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:bind-devel-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:bind-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:bind-doc-9.16.6-150000.12.65.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:bind-utils-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:bind-utils-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libbind9-1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libbind9-1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libdns1605-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libdns1605-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libirs-devel-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libirs-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libirs1601-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libirs1601-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libisc1606-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libisc1606-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libisccc1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libisccc1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libisccfg1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libisccfg1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libns1604-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libns1604-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:python3-bind-9.16.6-150000.12.65.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:bind-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:bind-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:bind-chrootenv-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:bind-chrootenv-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:bind-devel-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:bind-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:bind-doc-9.16.6-150000.12.65.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:bind-utils-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:bind-utils-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libbind9-1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libbind9-1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libdns1605-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libdns1605-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libirs-devel-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libirs-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libirs1601-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libirs1601-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libisc1606-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libisc1606-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libisccc1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libisccc1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libisccfg1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libisccfg1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libns1604-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libns1604-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:python3-bind-9.16.6-150000.12.65.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-chrootenv-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-chrootenv-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-chrootenv-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-chrootenv-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-devel-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-devel-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-devel-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-doc-9.16.6-150000.12.65.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-utils-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-utils-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-utils-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-utils-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libbind9-1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libbind9-1600-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libbind9-1600-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libbind9-1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libdns1605-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libdns1605-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libdns1605-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libdns1605-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libirs-devel-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libirs-devel-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libirs-devel-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libirs-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libirs1601-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libirs1601-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libirs1601-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libirs1601-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libisc1606-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libisc1606-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libisc1606-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libisc1606-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libisccc1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libisccc1600-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libisccc1600-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libisccc1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libisccfg1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libisccfg1600-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libisccfg1600-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libisccfg1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libns1604-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libns1604-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libns1604-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libns1604-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:python3-bind-9.16.6-150000.12.65.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-chrootenv-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-chrootenv-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-chrootenv-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-chrootenv-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-devel-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-devel-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-devel-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-doc-9.16.6-150000.12.65.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-utils-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-utils-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-utils-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-utils-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libbind9-1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libbind9-1600-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libbind9-1600-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libbind9-1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libdns1605-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libdns1605-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libdns1605-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libdns1605-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libirs-devel-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libirs-devel-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libirs-devel-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libirs-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libirs1601-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libirs1601-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libirs1601-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libirs1601-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libisc1606-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libisc1606-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libisc1606-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libisc1606-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libisccc1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libisccc1600-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libisccc1600-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libisccc1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libisccfg1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libisccfg1600-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libisccfg1600-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libisccfg1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libns1604-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libns1604-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libns1604-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libns1604-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:python3-bind-9.16.6-150000.12.65.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:bind-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:bind-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:bind-chrootenv-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:bind-chrootenv-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:bind-devel-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:bind-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:bind-doc-9.16.6-150000.12.65.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:bind-utils-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:bind-utils-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libbind9-1600-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libbind9-1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libdns1605-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libdns1605-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libirs-devel-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libirs-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libirs1601-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libirs1601-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libisc1606-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libisc1606-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libisccc1600-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libisccc1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libisccfg1600-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libisccfg1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libns1604-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libns1604-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:python3-bind-9.16.6-150000.12.65.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:bind-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:bind-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:bind-chrootenv-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:bind-chrootenv-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:bind-devel-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:bind-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:bind-doc-9.16.6-150000.12.65.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:bind-utils-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:bind-utils-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libbind9-1600-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libbind9-1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libdns1605-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libdns1605-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libirs-devel-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libirs-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libirs1601-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libirs1601-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libisc1606-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libisc1606-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libisccc1600-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libisccc1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libisccfg1600-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libisccfg1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libns1604-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libns1604-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:python3-bind-9.16.6-150000.12.65.1.noarch",
"SUSE Manager Client Tools 15:dracut-saltboot-0.1.1681904360.84ef141-150000.1.50.1.noarch",
"SUSE Manager Client Tools 15:grafana-9.5.1-150000.1.48.5.aarch64",
"SUSE Manager Client Tools 15:grafana-9.5.1-150000.1.48.5.ppc64le",
"SUSE Manager Client Tools 15:grafana-9.5.1-150000.1.48.5.s390x",
"SUSE Manager Client Tools 15:grafana-9.5.1-150000.1.48.5.x86_64",
"SUSE Manager Client Tools 15:mgr-daemon-4.3.7-150000.1.41.1.noarch",
"SUSE Manager Client Tools 15:python3-uyuni-common-libs-4.3.8-150000.1.33.1.aarch64",
"SUSE Manager Client Tools 15:python3-uyuni-common-libs-4.3.8-150000.1.33.1.ppc64le",
"SUSE Manager Client Tools 15:python3-uyuni-common-libs-4.3.8-150000.1.33.1.s390x",
"SUSE Manager Client Tools 15:python3-uyuni-common-libs-4.3.8-150000.1.33.1.x86_64",
"SUSE Manager Client Tools 15:python3-zypp-plugin-spacewalk-1.0.14-150000.3.35.1.noarch",
"SUSE Manager Client Tools 15:spacecmd-4.3.21-150000.3.98.1.noarch",
"SUSE Manager Client Tools 15:zypp-plugin-spacewalk-1.0.14-150000.3.35.1.noarch",
"SUSE Manager Client Tools for SLE Micro 5:bind-utils-9.16.6-150000.12.65.1.aarch64",
"SUSE Manager Client Tools for SLE Micro 5:bind-utils-9.16.6-150000.12.65.1.s390x",
"SUSE Manager Client Tools for SLE Micro 5:bind-utils-9.16.6-150000.12.65.1.x86_64",
"SUSE Manager Client Tools for SLE Micro 5:dracut-saltboot-0.1.1681904360.84ef141-150000.1.50.1.noarch",
"SUSE Manager Client Tools for SLE Micro 5:libbind9-1600-64bit-9.16.6-150000.12.65.1.aarch64_ilp32",
"SUSE Manager Client Tools for SLE Micro 5:libbind9-1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Manager Client Tools for SLE Micro 5:libbind9-1600-9.16.6-150000.12.65.1.s390x",
"SUSE Manager Client Tools for SLE Micro 5:libbind9-1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Manager Client Tools for SLE Micro 5:libdns1605-64bit-9.16.6-150000.12.65.1.aarch64_ilp32",
"SUSE Manager Client Tools for SLE Micro 5:libdns1605-9.16.6-150000.12.65.1.aarch64",
"SUSE Manager Client Tools for SLE Micro 5:libdns1605-9.16.6-150000.12.65.1.s390x",
"SUSE Manager Client Tools for SLE Micro 5:libdns1605-9.16.6-150000.12.65.1.x86_64",
"SUSE Manager Client Tools for SLE Micro 5:libirs1601-64bit-9.16.6-150000.12.65.1.aarch64_ilp32",
"SUSE Manager Client Tools for SLE Micro 5:libirs1601-9.16.6-150000.12.65.1.aarch64",
"SUSE Manager Client Tools for SLE Micro 5:libirs1601-9.16.6-150000.12.65.1.s390x",
"SUSE Manager Client Tools for SLE Micro 5:libirs1601-9.16.6-150000.12.65.1.x86_64",
"SUSE Manager Client Tools for SLE Micro 5:libisc1606-64bit-9.16.6-150000.12.65.1.aarch64_ilp32",
"SUSE Manager Client Tools for SLE Micro 5:libisc1606-9.16.6-150000.12.65.1.aarch64",
"SUSE Manager Client Tools for SLE Micro 5:libisc1606-9.16.6-150000.12.65.1.s390x",
"SUSE Manager Client Tools for SLE Micro 5:libisc1606-9.16.6-150000.12.65.1.x86_64",
"SUSE Manager Client Tools for SLE Micro 5:libisccc1600-64bit-9.16.6-150000.12.65.1.aarch64_ilp32",
"SUSE Manager Client Tools for SLE Micro 5:libisccc1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Manager Client Tools for SLE Micro 5:libisccc1600-9.16.6-150000.12.65.1.s390x",
"SUSE Manager Client Tools for SLE Micro 5:libisccc1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Manager Client Tools for SLE Micro 5:libisccfg1600-64bit-9.16.6-150000.12.65.1.aarch64_ilp32",
"SUSE Manager Client Tools for SLE Micro 5:libisccfg1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Manager Client Tools for SLE Micro 5:libisccfg1600-9.16.6-150000.12.65.1.s390x",
"SUSE Manager Client Tools for SLE Micro 5:libisccfg1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Manager Client Tools for SLE Micro 5:libns1604-9.16.6-150000.12.65.1.s390x",
"SUSE Manager Client Tools for SLE Micro 5:libns1604-9.16.6-150000.12.65.1.x86_64",
"SUSE Manager Client Tools for SLE Micro 5:python3-bind-9.16.6-150000.12.65.1.noarch",
"SUSE Manager Proxy Module 4.2:python3-zypp-plugin-spacewalk-1.0.14-150000.3.35.1.noarch",
"SUSE Manager Proxy Module 4.2:zypp-plugin-spacewalk-1.0.14-150000.3.35.1.noarch",
"SUSE Manager Proxy Module 4.3:python3-zypp-plugin-spacewalk-1.0.14-150000.3.35.1.noarch",
"SUSE Manager Proxy Module 4.3:zypp-plugin-spacewalk-1.0.14-150000.3.35.1.noarch",
"openSUSE Leap 15.4:bind-devel-32bit-9.16.6-150000.12.65.1.x86_64",
"openSUSE Leap 15.4:dracut-saltboot-0.1.1681904360.84ef141-150000.1.50.1.noarch",
"openSUSE Leap 15.4:libbind9-1600-32bit-9.16.6-150000.12.65.1.x86_64",
"openSUSE Leap 15.4:libdns1605-32bit-9.16.6-150000.12.65.1.x86_64",
"openSUSE Leap 15.4:libirs1601-32bit-9.16.6-150000.12.65.1.x86_64",
"openSUSE Leap 15.4:libisc1606-32bit-9.16.6-150000.12.65.1.x86_64",
"openSUSE Leap 15.4:libisccc1600-32bit-9.16.6-150000.12.65.1.x86_64",
"openSUSE Leap 15.4:libisccfg1600-32bit-9.16.6-150000.12.65.1.x86_64",
"openSUSE Leap 15.4:libns1604-32bit-9.16.6-150000.12.65.1.x86_64",
"openSUSE Leap 15.4:spacecmd-4.3.21-150000.3.98.1.noarch",
"openSUSE Leap 15.4:wire-0.5.0-150000.1.12.3.aarch64",
"openSUSE Leap 15.4:wire-0.5.0-150000.1.12.3.ppc64le",
"openSUSE Leap 15.4:wire-0.5.0-150000.1.12.3.s390x",
"openSUSE Leap 15.4:wire-0.5.0-150000.1.12.3.x86_64",
"openSUSE Leap 15.5:dracut-saltboot-0.1.1681904360.84ef141-150000.1.50.1.noarch",
"openSUSE Leap 15.5:spacecmd-4.3.21-150000.3.98.1.noarch",
"openSUSE Leap 15.5:wire-0.5.0-150000.1.12.3.aarch64",
"openSUSE Leap 15.5:wire-0.5.0-150000.1.12.3.ppc64le",
"openSUSE Leap 15.5:wire-0.5.0-150000.1.12.3.s390x",
"openSUSE Leap 15.5:wire-0.5.0-150000.1.12.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 7:bind-9.16.6-150000.12.65.1.aarch64",
"SUSE Enterprise Storage 7:bind-9.16.6-150000.12.65.1.x86_64",
"SUSE Enterprise Storage 7:bind-chrootenv-9.16.6-150000.12.65.1.aarch64",
"SUSE Enterprise Storage 7:bind-chrootenv-9.16.6-150000.12.65.1.x86_64",
"SUSE Enterprise Storage 7:bind-devel-9.16.6-150000.12.65.1.aarch64",
"SUSE Enterprise Storage 7:bind-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Enterprise Storage 7:bind-doc-9.16.6-150000.12.65.1.noarch",
"SUSE Enterprise Storage 7:bind-utils-9.16.6-150000.12.65.1.aarch64",
"SUSE Enterprise Storage 7:bind-utils-9.16.6-150000.12.65.1.x86_64",
"SUSE Enterprise Storage 7:libbind9-1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Enterprise Storage 7:libbind9-1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Enterprise Storage 7:libdns1605-9.16.6-150000.12.65.1.aarch64",
"SUSE Enterprise Storage 7:libdns1605-9.16.6-150000.12.65.1.x86_64",
"SUSE Enterprise Storage 7:libirs-devel-9.16.6-150000.12.65.1.aarch64",
"SUSE Enterprise Storage 7:libirs-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Enterprise Storage 7:libirs1601-9.16.6-150000.12.65.1.aarch64",
"SUSE Enterprise Storage 7:libirs1601-9.16.6-150000.12.65.1.x86_64",
"SUSE Enterprise Storage 7:libisc1606-9.16.6-150000.12.65.1.aarch64",
"SUSE Enterprise Storage 7:libisc1606-9.16.6-150000.12.65.1.x86_64",
"SUSE Enterprise Storage 7:libisccc1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Enterprise Storage 7:libisccc1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Enterprise Storage 7:libisccfg1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Enterprise Storage 7:libisccfg1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Enterprise Storage 7:libns1604-9.16.6-150000.12.65.1.aarch64",
"SUSE Enterprise Storage 7:libns1604-9.16.6-150000.12.65.1.x86_64",
"SUSE Enterprise Storage 7:python3-bind-9.16.6-150000.12.65.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:bind-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:bind-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:bind-chrootenv-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:bind-chrootenv-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:bind-devel-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:bind-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:bind-doc-9.16.6-150000.12.65.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:bind-utils-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:bind-utils-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libbind9-1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libbind9-1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libdns1605-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libdns1605-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libirs-devel-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libirs-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libirs1601-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libirs1601-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libisc1606-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libisc1606-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libisccc1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libisccc1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libisccfg1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libisccfg1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libns1604-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libns1604-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:python3-bind-9.16.6-150000.12.65.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:bind-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:bind-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:bind-chrootenv-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:bind-chrootenv-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:bind-devel-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:bind-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:bind-doc-9.16.6-150000.12.65.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:bind-utils-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:bind-utils-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libbind9-1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libbind9-1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libdns1605-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libdns1605-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libirs-devel-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libirs-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libirs1601-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libirs1601-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libisc1606-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libisc1606-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libisccc1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libisccc1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libisccfg1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libisccfg1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libns1604-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libns1604-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:python3-bind-9.16.6-150000.12.65.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-chrootenv-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-chrootenv-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-chrootenv-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-chrootenv-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-devel-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-devel-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-devel-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-doc-9.16.6-150000.12.65.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-utils-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-utils-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-utils-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bind-utils-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libbind9-1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libbind9-1600-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libbind9-1600-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libbind9-1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libdns1605-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libdns1605-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libdns1605-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libdns1605-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libirs-devel-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libirs-devel-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libirs-devel-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libirs-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libirs1601-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libirs1601-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libirs1601-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libirs1601-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libisc1606-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libisc1606-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libisc1606-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libisc1606-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libisccc1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libisccc1600-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libisccc1600-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libisccc1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libisccfg1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libisccfg1600-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libisccfg1600-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libisccfg1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libns1604-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libns1604-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libns1604-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libns1604-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:python3-bind-9.16.6-150000.12.65.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-chrootenv-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-chrootenv-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-chrootenv-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-chrootenv-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-devel-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-devel-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-devel-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-doc-9.16.6-150000.12.65.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-utils-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-utils-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-utils-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bind-utils-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libbind9-1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libbind9-1600-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libbind9-1600-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libbind9-1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libdns1605-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libdns1605-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libdns1605-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libdns1605-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libirs-devel-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libirs-devel-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libirs-devel-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libirs-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libirs1601-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libirs1601-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libirs1601-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libirs1601-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libisc1606-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libisc1606-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libisc1606-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libisc1606-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libisccc1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libisccc1600-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libisccc1600-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libisccc1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libisccfg1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libisccfg1600-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libisccfg1600-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libisccfg1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libns1604-9.16.6-150000.12.65.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libns1604-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libns1604-9.16.6-150000.12.65.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libns1604-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:python3-bind-9.16.6-150000.12.65.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:bind-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:bind-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:bind-chrootenv-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:bind-chrootenv-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:bind-devel-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:bind-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:bind-doc-9.16.6-150000.12.65.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:bind-utils-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:bind-utils-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libbind9-1600-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libbind9-1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libdns1605-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libdns1605-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libirs-devel-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libirs-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libirs1601-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libirs1601-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libisc1606-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libisc1606-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libisccc1600-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libisccc1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libisccfg1600-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libisccfg1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libns1604-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libns1604-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:python3-bind-9.16.6-150000.12.65.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:bind-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:bind-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:bind-chrootenv-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:bind-chrootenv-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:bind-devel-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:bind-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:bind-doc-9.16.6-150000.12.65.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:bind-utils-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:bind-utils-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libbind9-1600-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libbind9-1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libdns1605-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libdns1605-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libirs-devel-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libirs-devel-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libirs1601-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libirs1601-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libisc1606-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libisc1606-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libisccc1600-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libisccc1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libisccfg1600-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libisccfg1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libns1604-9.16.6-150000.12.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libns1604-9.16.6-150000.12.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:python3-bind-9.16.6-150000.12.65.1.noarch",
"SUSE Manager Client Tools 15:dracut-saltboot-0.1.1681904360.84ef141-150000.1.50.1.noarch",
"SUSE Manager Client Tools 15:grafana-9.5.1-150000.1.48.5.aarch64",
"SUSE Manager Client Tools 15:grafana-9.5.1-150000.1.48.5.ppc64le",
"SUSE Manager Client Tools 15:grafana-9.5.1-150000.1.48.5.s390x",
"SUSE Manager Client Tools 15:grafana-9.5.1-150000.1.48.5.x86_64",
"SUSE Manager Client Tools 15:mgr-daemon-4.3.7-150000.1.41.1.noarch",
"SUSE Manager Client Tools 15:python3-uyuni-common-libs-4.3.8-150000.1.33.1.aarch64",
"SUSE Manager Client Tools 15:python3-uyuni-common-libs-4.3.8-150000.1.33.1.ppc64le",
"SUSE Manager Client Tools 15:python3-uyuni-common-libs-4.3.8-150000.1.33.1.s390x",
"SUSE Manager Client Tools 15:python3-uyuni-common-libs-4.3.8-150000.1.33.1.x86_64",
"SUSE Manager Client Tools 15:python3-zypp-plugin-spacewalk-1.0.14-150000.3.35.1.noarch",
"SUSE Manager Client Tools 15:spacecmd-4.3.21-150000.3.98.1.noarch",
"SUSE Manager Client Tools 15:zypp-plugin-spacewalk-1.0.14-150000.3.35.1.noarch",
"SUSE Manager Client Tools for SLE Micro 5:bind-utils-9.16.6-150000.12.65.1.aarch64",
"SUSE Manager Client Tools for SLE Micro 5:bind-utils-9.16.6-150000.12.65.1.s390x",
"SUSE Manager Client Tools for SLE Micro 5:bind-utils-9.16.6-150000.12.65.1.x86_64",
"SUSE Manager Client Tools for SLE Micro 5:dracut-saltboot-0.1.1681904360.84ef141-150000.1.50.1.noarch",
"SUSE Manager Client Tools for SLE Micro 5:libbind9-1600-64bit-9.16.6-150000.12.65.1.aarch64_ilp32",
"SUSE Manager Client Tools for SLE Micro 5:libbind9-1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Manager Client Tools for SLE Micro 5:libbind9-1600-9.16.6-150000.12.65.1.s390x",
"SUSE Manager Client Tools for SLE Micro 5:libbind9-1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Manager Client Tools for SLE Micro 5:libdns1605-64bit-9.16.6-150000.12.65.1.aarch64_ilp32",
"SUSE Manager Client Tools for SLE Micro 5:libdns1605-9.16.6-150000.12.65.1.aarch64",
"SUSE Manager Client Tools for SLE Micro 5:libdns1605-9.16.6-150000.12.65.1.s390x",
"SUSE Manager Client Tools for SLE Micro 5:libdns1605-9.16.6-150000.12.65.1.x86_64",
"SUSE Manager Client Tools for SLE Micro 5:libirs1601-64bit-9.16.6-150000.12.65.1.aarch64_ilp32",
"SUSE Manager Client Tools for SLE Micro 5:libirs1601-9.16.6-150000.12.65.1.aarch64",
"SUSE Manager Client Tools for SLE Micro 5:libirs1601-9.16.6-150000.12.65.1.s390x",
"SUSE Manager Client Tools for SLE Micro 5:libirs1601-9.16.6-150000.12.65.1.x86_64",
"SUSE Manager Client Tools for SLE Micro 5:libisc1606-64bit-9.16.6-150000.12.65.1.aarch64_ilp32",
"SUSE Manager Client Tools for SLE Micro 5:libisc1606-9.16.6-150000.12.65.1.aarch64",
"SUSE Manager Client Tools for SLE Micro 5:libisc1606-9.16.6-150000.12.65.1.s390x",
"SUSE Manager Client Tools for SLE Micro 5:libisc1606-9.16.6-150000.12.65.1.x86_64",
"SUSE Manager Client Tools for SLE Micro 5:libisccc1600-64bit-9.16.6-150000.12.65.1.aarch64_ilp32",
"SUSE Manager Client Tools for SLE Micro 5:libisccc1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Manager Client Tools for SLE Micro 5:libisccc1600-9.16.6-150000.12.65.1.s390x",
"SUSE Manager Client Tools for SLE Micro 5:libisccc1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Manager Client Tools for SLE Micro 5:libisccfg1600-64bit-9.16.6-150000.12.65.1.aarch64_ilp32",
"SUSE Manager Client Tools for SLE Micro 5:libisccfg1600-9.16.6-150000.12.65.1.aarch64",
"SUSE Manager Client Tools for SLE Micro 5:libisccfg1600-9.16.6-150000.12.65.1.s390x",
"SUSE Manager Client Tools for SLE Micro 5:libisccfg1600-9.16.6-150000.12.65.1.x86_64",
"SUSE Manager Client Tools for SLE Micro 5:libns1604-9.16.6-150000.12.65.1.s390x",
"SUSE Manager Client Tools for SLE Micro 5:libns1604-9.16.6-150000.12.65.1.x86_64",
"SUSE Manager Client Tools for SLE Micro 5:python3-bind-9.16.6-150000.12.65.1.noarch",
"SUSE Manager Proxy Module 4.2:python3-zypp-plugin-spacewalk-1.0.14-150000.3.35.1.noarch",
"SUSE Manager Proxy Module 4.2:zypp-plugin-spacewalk-1.0.14-150000.3.35.1.noarch",
"SUSE Manager Proxy Module 4.3:python3-zypp-plugin-spacewalk-1.0.14-150000.3.35.1.noarch",
"SUSE Manager Proxy Module 4.3:zypp-plugin-spacewalk-1.0.14-150000.3.35.1.noarch",
"openSUSE Leap 15.4:bind-devel-32bit-9.16.6-150000.12.65.1.x86_64",
"openSUSE Leap 15.4:dracut-saltboot-0.1.1681904360.84ef141-150000.1.50.1.noarch",
"openSUSE Leap 15.4:libbind9-1600-32bit-9.16.6-150000.12.65.1.x86_64",
"openSUSE Leap 15.4:libdns1605-32bit-9.16.6-150000.12.65.1.x86_64",
"openSUSE Leap 15.4:libirs1601-32bit-9.16.6-150000.12.65.1.x86_64",
"openSUSE Leap 15.4:libisc1606-32bit-9.16.6-150000.12.65.1.x86_64",
"openSUSE Leap 15.4:libisccc1600-32bit-9.16.6-150000.12.65.1.x86_64",
"openSUSE Leap 15.4:libisccfg1600-32bit-9.16.6-150000.12.65.1.x86_64",
"openSUSE Leap 15.4:libns1604-32bit-9.16.6-150000.12.65.1.x86_64",
"openSUSE Leap 15.4:spacecmd-4.3.21-150000.3.98.1.noarch",
"openSUSE Leap 15.4:wire-0.5.0-150000.1.12.3.aarch64",
"openSUSE Leap 15.4:wire-0.5.0-150000.1.12.3.ppc64le",
"openSUSE Leap 15.4:wire-0.5.0-150000.1.12.3.s390x",
"openSUSE Leap 15.4:wire-0.5.0-150000.1.12.3.x86_64",
"openSUSE Leap 15.5:dracut-saltboot-0.1.1681904360.84ef141-150000.1.50.1.noarch",
"openSUSE Leap 15.5:spacecmd-4.3.21-150000.3.98.1.noarch",
"openSUSE Leap 15.5:wire-0.5.0-150000.1.12.3.aarch64",
"openSUSE Leap 15.5:wire-0.5.0-150000.1.12.3.ppc64le",
"openSUSE Leap 15.5:wire-0.5.0-150000.1.12.3.s390x",
"openSUSE Leap 15.5:wire-0.5.0-150000.1.12.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2023-06-21T11:49:43Z",
"details": "moderate"
}
],
"title": "CVE-2023-1410"
}
]
}
suse-su-2023:3868-1
Vulnerability from csaf_suse
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for SUSE Manager Client Tools",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update fixes the following issues:\n\ngolang-github-lusitaniae-apache_exporter:\n\n- Security issues fixed:\n * CVE-2022-32149: Fix denial of service vulnerability (bsc#1204501)\n * CVE-2022-41723: Fix uncontrolled resource consumption (bsc#1208270)\n * CVE-2022-46146: Fix authentication bypass vulnarability (bsc#1208046)\n- Changes and bugs fixed:\n * Updated to 1.0.0 (jsc#PED-5405)\n + Improved flag parsing\n + Added support for custom headers\n * Changes from 0.13.1\n + Fix panic caused by missing flagConfig options\n * Added AppArmor profile\n * Added sandboxing options to systemd service unit\n * Build using promu\n * Build with Go 1.19\n * Exclude s390 architecture\n\ngolang-github-prometheus-prometheus:\n\n- This update introduces breaking changes. Please, read carefully the provided informations.\n- Security issues fixed:\n * CVE-2022-41723: Fix uncontrolled resource consumption by updating Go to version 1.20.1 (bsc#1208298)\n- Updated to 2.45.0 (jsc#PED-5406):\n * [FEATURE] API: New limit parameter to limit the number of items returned by `/api/v1/status/tsdb` endpoint\n * [FEATURE] Config: Add limits to global config\n * [FEATURE] Consul SD: Added support for `path_prefix`\n * [FEATURE] Native histograms: Add option to scrape both classic and native histograms.\n * [FEATURE] Native histograms: Added support for two more arithmetic operators `avg_over_time` and `sum_over_time`\n * [FEATURE] Promtool: When providing the block id, only one block will be loaded and analyzed\n * [FEATURE] Remote-write: New Azure ad configuration to support remote writing directly to Azure Monitor workspace\n * [FEATURE] TSDB: Samples per chunk are now configurable with flag `storage.tsdb.samples-per-chunk`. By default set\n to its former value 120\n * [ENHANCEMENT] Native histograms: bucket size can now be limited to avoid scrape fails\n * [ENHANCEMENT] TSDB: Dropped series are now deleted from the WAL sooner\n * [BUGFIX] Native histograms: ChunkSeries iterator now checks if a new sample can be appended to the open chunk\n * [BUGFIX] Native histograms: Fix Histogram Appender `Appendable()` segfault\n * [BUGFIX] Native histograms: Fix setting reset header to gauge histograms in seriesToChunkEncoder\n * [BUGFIX] TSDB: Tombstone intervals are not modified after Get() call\n * [BUGFIX] TSDB: Use path/filepath to set the WAL directory.\n- Changes from 2.44.0:\n * [FEATURE] Remote-read: Handle native histograms\n * [FEATURE] Promtool: Health and readiness check of prometheus server in CLI\n * [FEATURE] PromQL: Add `query_samples_total` metric, the total number of samples loaded by all queries\n * [ENHANCEMENT] Storage: Optimise buffer used to iterate through samples\n * [ENHANCEMENT] Scrape: Reduce memory allocations on target labels\n * [ENHANCEMENT] PromQL: Use faster heap method for `topk()` / `bottomk()`\n * [ENHANCEMENT] Rules API: Allow filtering by rule name\n * [ENHANCEMENT] Native Histograms: Various fixes and improvements\n * [ENHANCEMENT] UI: Search of scraping pools is now case-insensitive\n * [ENHANCEMENT] TSDB: Add an affirmative log message for successful WAL repair\n * [BUGFIX] TSDB: Block compaction failed when shutting down\n * [BUGFIX] TSDB: Out-of-order chunks could be ignored if the write-behind log was deleted\n- Changes from 2.43.1\n * [BUGFIX] Labels: Set() after Del() would be ignored, which broke some relabeling rules\n- Changes from 2.43.0:\n * [FEATURE] Promtool: Add HTTP client configuration to query commands\n * [FEATURE] Scrape: Add `include_scrape_configs` to include scrape configs from different files\n * [FEATURE] HTTP client: Add `no_proxy` to exclude URLs from proxied requests\n * [FEATURE] HTTP client: Add `proxy_from_enviroment` to read proxies from env variables\n * [ENHANCEMENT] API: Add support for setting lookback delta per query via the API\n * [ENHANCEMENT] API: Change HTTP status code from 503/422 to 499 if a request is canceled\n * [ENHANCEMENT] Scrape: Allow exemplars for all metric types\n * [ENHANCEMENT] TSDB: Add metrics for head chunks and WAL folders size\n * [ENHANCEMENT] TSDB: Automatically remove incorrect snapshot with index that is ahead of WAL\n * [ENHANCEMENT] TSDB: Improve Prometheus parser error outputs to be more comprehensible\n * [ENHANCEMENT] UI: Scope `group by` labels to metric in autocompletion\n * [BUGFIX] Scrape: Fix `prometheus_target_scrape_pool_target_limit` metric not set before reloading\n * [BUGFIX] TSDB: Correctly update `prometheus_tsdb_head_chunks_removed_total` and `prometheus_tsdb_head_chunks`\n metrics when reading WAL\n * [BUGFIX] TSDB: Use the correct unit (seconds) when recording out-of-order append deltas in the\n `prometheus_tsdb_sample_ooo_delta` metric\n- Changes from 2.42.0:\n This release comes with a new feature coverage for native histograms and breaking changes.\n If you are trying native histograms already, we recommend you remove the `wal` directory when upgrading. Because the\n old WAL record for native histograms is not backward compatible in v2.42.0, this will lead to some data loss for the\n latest data. Additionally, if you scrape \u0027float histograms\u0027 or use recording rules on native histograms in v2.42.0\n (which writes float histograms), it is a one-way street since older versions do not support float histograms.\n * [CHANGE] **breaking** TSDB: Changed WAL record format for the experimental native histograms\n * [FEATURE] Add \u0027keep_firing_for\u0027 field to alerting rules\n * [FEATURE] Promtool: Add support of selecting timeseries for TSDB dump\n * [ENHANCEMENT] Agent: Native histogram support.\n * [ENHANCEMENT] Rules: Support native histograms in recording rules\n * [ENHANCEMENT] SD: Add container ID as a meta label for pod targets for Kubernetes\n * [ENHANCEMENT] SD: Add VM size label to azure service discovery\n * [ENHANCEMENT] Support native histograms in federation\n * [ENHANCEMENT] TSDB: Add gauge histogram support\n * [ENHANCEMENT] TSDB/Scrape: Support FloatHistogram that represents buckets as float64 values\n * [ENHANCEMENT] UI: Show individual scrape pools on /targets page\n- Changes from 2.41.0:\n * [FEATURE] Relabeling: Add keepequal and dropequal relabel actions\n * [FEATURE] Add support for HTTP proxy headers\n * [ENHANCEMENT] Reload private certificates when changed on disk\n * [ENHANCEMENT] Add max_version to specify maximum TLS version in tls_config\n * [ENHANCEMENT] Add goos and goarch labels to prometheus_build_info\n * [ENHANCEMENT] SD: Add proxy support for EC2 and LightSail SDs\n * [ENHANCEMENT] SD: Add new metric prometheus_sd_file_watcher_errors_total\n * [ENHANCEMENT] Remote Read: Use a pool to speed up marshalling\n * [ENHANCEMENT] TSDB: Improve handling of tombstoned chunks in iterators\n * [ENHANCEMENT] TSDB: Optimize postings offset table reading\n * [BUGFIX] Scrape: Validate the metric name, label names, and label values after relabeling\n * [BUGFIX] Remote Write receiver and rule manager: Fix error handling\n- Changes from 2.40.7:\n * [BUGFIX] TSDB: Fix queries involving negative buckets of native histograms\n- Changes from 2.40.5:\n * [BUGFIX] TSDB: Fix queries involving native histograms due to improper reset of iterators\n- Changes from 2.40.3:\n * [BUGFIX] TSDB: Fix compaction after a deletion is called\n- Changes from 2.40.2:\n * [BUGFIX] UI: Fix black-on-black metric name color in dark mode\n- Changes from 2.40.1:\n * [BUGFIX] TSDB: Fix alignment for atomic int64 for 32 bit architecture\n * [BUGFIX] Scrape: Fix accept headers\n- Changes from 2.40.0:\n * [FEATURE] Add experimental support for native histograms.\n Enable with the flag --enable-feature=native-histograms.\n * [FEATURE] SD: Add service discovery for OVHcloud\n * [ENHANCEMENT] Kubernetes SD: Use protobuf encoding\n * [ENHANCEMENT] TSDB: Use golang.org/x/exp/slices for improved sorting speed\n * [ENHANCEMENT] Consul SD: Add enterprise admin partitions. Adds __meta_consul_partition label. Adds partition\n config in consul_sd_config\n * [BUGFIX] API: Fix API error codes for /api/v1/labels and /api/v1/series\n- Changes from 2.39.1:\n * [BUGFIX] Rules: Fix notifier relabel changing the labels on active alerts\n- Changes from 2.39.0:\n * [FEATURE] experimental TSDB: Add support for ingesting out-of-order samples. This is configured via\n out_of_order_time_window field in the config file; check config file docs for more info\n * [ENHANCEMENT] API: /-/healthy and /-/ready API calls now also respond to a HEAD request on top of existing\n GET support.\n * [ENHANCEMENT] PuppetDB SD: Add __meta_puppetdb_query label.\n * [ENHANCEMENT] AWS EC2 SD: Add __meta_ec2_region label.\n * [ENHANCEMENT] AWS Lightsail SD: Add __meta_lightsail_region label.\n * [ENHANCEMENT] Scrape: Optimise relabeling by re-using memory.\n * [ENHANCEMENT] TSDB: Improve WAL replay timings.\n * [ENHANCEMENT] TSDB: Optimise memory by not storing unnecessary data in the memory.\n * [ENHANCEMENT] TSDB: Allow overlapping blocks by default.\n --storage.tsdb.allow-overlapping-blocks now has no effect.\n * [ENHANCEMENT] UI: Click to copy label-value pair from query result to clipboard.\n * [BUGFIX] TSDB: Turn off isolation for Head compaction to fix a memory leak.\n * [BUGFIX] TSDB: Fix \u0027invalid magic number 0\u0027 error on Prometheus startup.\n * [BUGFIX] PromQL: Properly close file descriptor when logging unfinished queries.\n * [BUGFIX] Agent: Fix validation of flag options and prevent WAL from growing more than desired.\n- Changes from 2.38.0:\n * [FEATURE]: Web: Add a /api/v1/format_query HTTP API endpoint that allows pretty-formatting PromQL expressions.\n * [FEATURE]: UI: Add support for formatting PromQL expressions in the UI.\n * [FEATURE]: DNS SD: Support MX records for discovering targets.\n * [FEATURE]: Templates: Add toTime() template function that allows converting sample timestamps to\n Go time.Time values\n * [ENHANCEMENT]: Kubernetes SD: Add\n __meta_kubernetes_service_port_number meta label indicating the service port number.\n __meta_kubernetes_pod_container_image meta label indicating the container image.\n * [ENHANCEMENT]: PromQL: When a query panics, also log the query itself alongside the panic message.\n * [ENHANCEMENT]: UI: Tweak colors in the dark theme to improve the contrast ratio.\n * [ENHANCEMENT]: Web: Speed up calls to /api/v1/rules by avoiding locks and using atomic types instead.\n * [ENHANCEMENT]: Scrape: Add a no-default-scrape-port feature flag, which omits or removes any default HTTP (:80)\n or HTTPS (:443) ports in the target\u0027s scrape address.\n * [BUGFIX]: TSDB: In the WAL watcher metrics, expose the\n type=\u0027exemplar\u0027 label instead of type=\u0027unknown\u0027 for exemplar records.\n * [BUGFIX]: TSDB: Fix race condition around allocating series IDs during chunk snapshot loading.\n\ngolang-github-QubitProducts-exporter_exporter:\n\n- CVE-2023-29409: Restrict RSA keys in certificates to less than or equal to 8192 bits to avoid DoSing client/server\n while validating signatures for extremely large RSA keys. (bsc#1213880)\n There are no direct source changes. The CVE is fixed rebuilding the sources with the patched Go version.\n\ngrafana:\n\n- CVE-2023-29409: Restrict RSA keys in certificates to less than or equal to 8192 bits to avoid DoSing client/server\n while validating signatures for extremely large RSA keys. (bsc#1213880)\n There are no direct source changes. The CVE is fixed rebuilding the sources with the patched Go version.\n\nprometheus-blackbox_exporter:\n\n- CVE-2023-29409: Restrict RSA keys in certificates to less than or equal to 8192 bits to avoid DoSing client/server\n while validating signatures for extremely large RSA keys. (bsc#1213880)\n There are no direct source changes. The CVE is fixed rebuilding the sources with the patched Go version.\n\nprometheus-postgres_exporter:\n\n- CVE-2023-29409: Restrict RSA keys in certificates to less than or equal to 8192 bits to avoid DoSing client/server\n while validating signatures for extremely large RSA keys. (bsc#1213880)\n There are no direct source changes. The CVE is fixed rebuilding the sources with the patched Go version.\n\npython-pyvmomi:\n\n- Preparing submission to SUSE:SLE-15-SP3:Update as part of ECO PED-3623.\n\nspacecmd:\n\n- Updated to 4.3.23-1\n * Update translation strings\n\nsupportutils-plugin-susemanager-client:\n\n- Updated to 4.3.3-1\n * Write configured crypto-policy in supportconfig\n * Add cloud and Pay-as-you-go checks\n\nuyuni-common-libs:\n\n- Updated to 4.3.9-1\n * Workaround for python3-debian bug about collecting control file (bsc#1211525, bsc#1208692)\n\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2023-3868,SUSE-SLE-Manager-Tools-15-2023-3868,SUSE-SLE-Manager-Tools-For-Micro-5-2023-3868,SUSE-SLE-Module-SUSE-Manager-Proxy-4.2-2023-3868,SUSE-SLE-Module-SUSE-Manager-Proxy-4.3-2023-3868,SUSE-SLE-Module-SUSE-Manager-Server-4.2-2023-3868,SUSE-SLE-Module-SUSE-Manager-Server-4.3-2023-3868,openSUSE-SLE-15.4-2023-3868,openSUSE-SLE-15.5-2023-3868",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2023_3868-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2023:3868-1",
"url": "https://www.suse.com/support/update/announcement/2023/suse-su-20233868-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2023:3868-1",
"url": "https://lists.suse.com/pipermail/sle-updates/2023-September/031789.html"
},
{
"category": "self",
"summary": "SUSE Bug 1204501",
"url": "https://bugzilla.suse.com/1204501"
},
{
"category": "self",
"summary": "SUSE Bug 1208046",
"url": "https://bugzilla.suse.com/1208046"
},
{
"category": "self",
"summary": "SUSE Bug 1208270",
"url": "https://bugzilla.suse.com/1208270"
},
{
"category": "self",
"summary": "SUSE Bug 1208298",
"url": "https://bugzilla.suse.com/1208298"
},
{
"category": "self",
"summary": "SUSE Bug 1208692",
"url": "https://bugzilla.suse.com/1208692"
},
{
"category": "self",
"summary": "SUSE Bug 1211525",
"url": "https://bugzilla.suse.com/1211525"
},
{
"category": "self",
"summary": "SUSE Bug 1213880",
"url": "https://bugzilla.suse.com/1213880"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-32149 page",
"url": "https://www.suse.com/security/cve/CVE-2022-32149/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-41723 page",
"url": "https://www.suse.com/security/cve/CVE-2022-41723/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-46146 page",
"url": "https://www.suse.com/security/cve/CVE-2022-46146/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-29409 page",
"url": "https://www.suse.com/security/cve/CVE-2023-29409/"
}
],
"title": "Security update for SUSE Manager Client Tools",
"tracking": {
"current_release_date": "2023-09-28T11:43:24Z",
"generator": {
"date": "2023-09-28T11:43:24Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2023:3868-1",
"initial_release_date": "2023-09-28T11:43:24Z",
"revision_history": [
{
"date": "2023-09-28T11:43:24Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "firewalld-prometheus-config-0.1-150000.3.50.3.aarch64",
"product": {
"name": "firewalld-prometheus-config-0.1-150000.3.50.3.aarch64",
"product_id": "firewalld-prometheus-config-0.1-150000.3.50.3.aarch64"
}
},
{
"category": "product_version",
"name": "golang-github-QubitProducts-exporter_exporter-0.4.0-150000.1.18.3.aarch64",
"product": {
"name": "golang-github-QubitProducts-exporter_exporter-0.4.0-150000.1.18.3.aarch64",
"product_id": "golang-github-QubitProducts-exporter_exporter-0.4.0-150000.1.18.3.aarch64"
}
},
{
"category": "product_version",
"name": "golang-github-lusitaniae-apache_exporter-1.0.0-150000.1.17.2.aarch64",
"product": {
"name": "golang-github-lusitaniae-apache_exporter-1.0.0-150000.1.17.2.aarch64",
"product_id": "golang-github-lusitaniae-apache_exporter-1.0.0-150000.1.17.2.aarch64"
}
},
{
"category": "product_version",
"name": "golang-github-prometheus-prometheus-2.45.0-150000.3.50.3.aarch64",
"product": {
"name": "golang-github-prometheus-prometheus-2.45.0-150000.3.50.3.aarch64",
"product_id": "golang-github-prometheus-prometheus-2.45.0-150000.3.50.3.aarch64"
}
},
{
"category": "product_version",
"name": "grafana-9.5.5-150000.1.54.3.aarch64",
"product": {
"name": "grafana-9.5.5-150000.1.54.3.aarch64",
"product_id": "grafana-9.5.5-150000.1.54.3.aarch64"
}
},
{
"category": "product_version",
"name": "prometheus-blackbox_exporter-0.24.0-150000.1.23.3.aarch64",
"product": {
"name": "prometheus-blackbox_exporter-0.24.0-150000.1.23.3.aarch64",
"product_id": "prometheus-blackbox_exporter-0.24.0-150000.1.23.3.aarch64"
}
},
{
"category": "product_version",
"name": "prometheus-postgres_exporter-0.10.1-150000.1.14.3.aarch64",
"product": {
"name": "prometheus-postgres_exporter-0.10.1-150000.1.14.3.aarch64",
"product_id": "prometheus-postgres_exporter-0.10.1-150000.1.14.3.aarch64"
}
},
{
"category": "product_version",
"name": "python2-uyuni-common-libs-4.3.9-150000.1.36.2.aarch64",
"product": {
"name": "python2-uyuni-common-libs-4.3.9-150000.1.36.2.aarch64",
"product_id": "python2-uyuni-common-libs-4.3.9-150000.1.36.2.aarch64"
}
},
{
"category": "product_version",
"name": "python3-uyuni-common-libs-4.3.9-150000.1.36.2.aarch64",
"product": {
"name": "python3-uyuni-common-libs-4.3.9-150000.1.36.2.aarch64",
"product_id": "python3-uyuni-common-libs-4.3.9-150000.1.36.2.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "firewalld-prometheus-config-0.1-150000.3.50.3.i586",
"product": {
"name": "firewalld-prometheus-config-0.1-150000.3.50.3.i586",
"product_id": "firewalld-prometheus-config-0.1-150000.3.50.3.i586"
}
},
{
"category": "product_version",
"name": "golang-github-QubitProducts-exporter_exporter-0.4.0-150000.1.18.3.i586",
"product": {
"name": "golang-github-QubitProducts-exporter_exporter-0.4.0-150000.1.18.3.i586",
"product_id": "golang-github-QubitProducts-exporter_exporter-0.4.0-150000.1.18.3.i586"
}
},
{
"category": "product_version",
"name": "golang-github-lusitaniae-apache_exporter-1.0.0-150000.1.17.2.i586",
"product": {
"name": "golang-github-lusitaniae-apache_exporter-1.0.0-150000.1.17.2.i586",
"product_id": "golang-github-lusitaniae-apache_exporter-1.0.0-150000.1.17.2.i586"
}
},
{
"category": "product_version",
"name": "golang-github-prometheus-prometheus-2.45.0-150000.3.50.3.i586",
"product": {
"name": "golang-github-prometheus-prometheus-2.45.0-150000.3.50.3.i586",
"product_id": "golang-github-prometheus-prometheus-2.45.0-150000.3.50.3.i586"
}
},
{
"category": "product_version",
"name": "grafana-9.5.5-150000.1.54.3.i586",
"product": {
"name": "grafana-9.5.5-150000.1.54.3.i586",
"product_id": "grafana-9.5.5-150000.1.54.3.i586"
}
},
{
"category": "product_version",
"name": "prometheus-blackbox_exporter-0.24.0-150000.1.23.3.i586",
"product": {
"name": "prometheus-blackbox_exporter-0.24.0-150000.1.23.3.i586",
"product_id": "prometheus-blackbox_exporter-0.24.0-150000.1.23.3.i586"
}
},
{
"category": "product_version",
"name": "prometheus-postgres_exporter-0.10.1-150000.1.14.3.i586",
"product": {
"name": "prometheus-postgres_exporter-0.10.1-150000.1.14.3.i586",
"product_id": "prometheus-postgres_exporter-0.10.1-150000.1.14.3.i586"
}
},
{
"category": "product_version",
"name": "python2-uyuni-common-libs-4.3.9-150000.1.36.2.i586",
"product": {
"name": "python2-uyuni-common-libs-4.3.9-150000.1.36.2.i586",
"product_id": "python2-uyuni-common-libs-4.3.9-150000.1.36.2.i586"
}
},
{
"category": "product_version",
"name": "python3-uyuni-common-libs-4.3.9-150000.1.36.2.i586",
"product": {
"name": "python3-uyuni-common-libs-4.3.9-150000.1.36.2.i586",
"product_id": "python3-uyuni-common-libs-4.3.9-150000.1.36.2.i586"
}
}
],
"category": "architecture",
"name": "i586"
},
{
"branches": [
{
"category": "product_version",
"name": "python2-pyvmomi-6.7.3-150000.1.6.2.noarch",
"product": {
"name": "python2-pyvmomi-6.7.3-150000.1.6.2.noarch",
"product_id": "python2-pyvmomi-6.7.3-150000.1.6.2.noarch"
}
},
{
"category": "product_version",
"name": "python3-pyvmomi-6.7.3-150000.1.6.2.noarch",
"product": {
"name": "python3-pyvmomi-6.7.3-150000.1.6.2.noarch",
"product_id": "python3-pyvmomi-6.7.3-150000.1.6.2.noarch"
}
},
{
"category": "product_version",
"name": "spacecmd-4.3.23-150000.3.104.2.noarch",
"product": {
"name": "spacecmd-4.3.23-150000.3.104.2.noarch",
"product_id": "spacecmd-4.3.23-150000.3.104.2.noarch"
}
},
{
"category": "product_version",
"name": "supportutils-plugin-susemanager-client-4.3.3-150000.3.21.2.noarch",
"product": {
"name": "supportutils-plugin-susemanager-client-4.3.3-150000.3.21.2.noarch",
"product_id": "supportutils-plugin-susemanager-client-4.3.3-150000.3.21.2.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "firewalld-prometheus-config-0.1-150000.3.50.3.ppc64le",
"product": {
"name": "firewalld-prometheus-config-0.1-150000.3.50.3.ppc64le",
"product_id": "firewalld-prometheus-config-0.1-150000.3.50.3.ppc64le"
}
},
{
"category": "product_version",
"name": "golang-github-QubitProducts-exporter_exporter-0.4.0-150000.1.18.3.ppc64le",
"product": {
"name": "golang-github-QubitProducts-exporter_exporter-0.4.0-150000.1.18.3.ppc64le",
"product_id": "golang-github-QubitProducts-exporter_exporter-0.4.0-150000.1.18.3.ppc64le"
}
},
{
"category": "product_version",
"name": "golang-github-lusitaniae-apache_exporter-1.0.0-150000.1.17.2.ppc64le",
"product": {
"name": "golang-github-lusitaniae-apache_exporter-1.0.0-150000.1.17.2.ppc64le",
"product_id": "golang-github-lusitaniae-apache_exporter-1.0.0-150000.1.17.2.ppc64le"
}
},
{
"category": "product_version",
"name": "golang-github-prometheus-prometheus-2.45.0-150000.3.50.3.ppc64le",
"product": {
"name": "golang-github-prometheus-prometheus-2.45.0-150000.3.50.3.ppc64le",
"product_id": "golang-github-prometheus-prometheus-2.45.0-150000.3.50.3.ppc64le"
}
},
{
"category": "product_version",
"name": "grafana-9.5.5-150000.1.54.3.ppc64le",
"product": {
"name": "grafana-9.5.5-150000.1.54.3.ppc64le",
"product_id": "grafana-9.5.5-150000.1.54.3.ppc64le"
}
},
{
"category": "product_version",
"name": "prometheus-blackbox_exporter-0.24.0-150000.1.23.3.ppc64le",
"product": {
"name": "prometheus-blackbox_exporter-0.24.0-150000.1.23.3.ppc64le",
"product_id": "prometheus-blackbox_exporter-0.24.0-150000.1.23.3.ppc64le"
}
},
{
"category": "product_version",
"name": "prometheus-postgres_exporter-0.10.1-150000.1.14.3.ppc64le",
"product": {
"name": "prometheus-postgres_exporter-0.10.1-150000.1.14.3.ppc64le",
"product_id": "prometheus-postgres_exporter-0.10.1-150000.1.14.3.ppc64le"
}
},
{
"category": "product_version",
"name": "python2-uyuni-common-libs-4.3.9-150000.1.36.2.ppc64le",
"product": {
"name": "python2-uyuni-common-libs-4.3.9-150000.1.36.2.ppc64le",
"product_id": "python2-uyuni-common-libs-4.3.9-150000.1.36.2.ppc64le"
}
},
{
"category": "product_version",
"name": "python3-uyuni-common-libs-4.3.9-150000.1.36.2.ppc64le",
"product": {
"name": "python3-uyuni-common-libs-4.3.9-150000.1.36.2.ppc64le",
"product_id": "python3-uyuni-common-libs-4.3.9-150000.1.36.2.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "firewalld-prometheus-config-0.1-150000.3.50.3.s390x",
"product": {
"name": "firewalld-prometheus-config-0.1-150000.3.50.3.s390x",
"product_id": "firewalld-prometheus-config-0.1-150000.3.50.3.s390x"
}
},
{
"category": "product_version",
"name": "golang-github-QubitProducts-exporter_exporter-0.4.0-150000.1.18.3.s390x",
"product": {
"name": "golang-github-QubitProducts-exporter_exporter-0.4.0-150000.1.18.3.s390x",
"product_id": "golang-github-QubitProducts-exporter_exporter-0.4.0-150000.1.18.3.s390x"
}
},
{
"category": "product_version",
"name": "golang-github-lusitaniae-apache_exporter-1.0.0-150000.1.17.2.s390x",
"product": {
"name": "golang-github-lusitaniae-apache_exporter-1.0.0-150000.1.17.2.s390x",
"product_id": "golang-github-lusitaniae-apache_exporter-1.0.0-150000.1.17.2.s390x"
}
},
{
"category": "product_version",
"name": "golang-github-prometheus-prometheus-2.45.0-150000.3.50.3.s390x",
"product": {
"name": "golang-github-prometheus-prometheus-2.45.0-150000.3.50.3.s390x",
"product_id": "golang-github-prometheus-prometheus-2.45.0-150000.3.50.3.s390x"
}
},
{
"category": "product_version",
"name": "grafana-9.5.5-150000.1.54.3.s390x",
"product": {
"name": "grafana-9.5.5-150000.1.54.3.s390x",
"product_id": "grafana-9.5.5-150000.1.54.3.s390x"
}
},
{
"category": "product_version",
"name": "prometheus-blackbox_exporter-0.24.0-150000.1.23.3.s390x",
"product": {
"name": "prometheus-blackbox_exporter-0.24.0-150000.1.23.3.s390x",
"product_id": "prometheus-blackbox_exporter-0.24.0-150000.1.23.3.s390x"
}
},
{
"category": "product_version",
"name": "prometheus-postgres_exporter-0.10.1-150000.1.14.3.s390x",
"product": {
"name": "prometheus-postgres_exporter-0.10.1-150000.1.14.3.s390x",
"product_id": "prometheus-postgres_exporter-0.10.1-150000.1.14.3.s390x"
}
},
{
"category": "product_version",
"name": "python2-uyuni-common-libs-4.3.9-150000.1.36.2.s390x",
"product": {
"name": "python2-uyuni-common-libs-4.3.9-150000.1.36.2.s390x",
"product_id": "python2-uyuni-common-libs-4.3.9-150000.1.36.2.s390x"
}
},
{
"category": "product_version",
"name": "python3-uyuni-common-libs-4.3.9-150000.1.36.2.s390x",
"product": {
"name": "python3-uyuni-common-libs-4.3.9-150000.1.36.2.s390x",
"product_id": "python3-uyuni-common-libs-4.3.9-150000.1.36.2.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "firewalld-prometheus-config-0.1-150000.3.50.3.x86_64",
"product": {
"name": "firewalld-prometheus-config-0.1-150000.3.50.3.x86_64",
"product_id": "firewalld-prometheus-config-0.1-150000.3.50.3.x86_64"
}
},
{
"category": "product_version",
"name": "golang-github-QubitProducts-exporter_exporter-0.4.0-150000.1.18.3.x86_64",
"product": {
"name": "golang-github-QubitProducts-exporter_exporter-0.4.0-150000.1.18.3.x86_64",
"product_id": "golang-github-QubitProducts-exporter_exporter-0.4.0-150000.1.18.3.x86_64"
}
},
{
"category": "product_version",
"name": "golang-github-lusitaniae-apache_exporter-1.0.0-150000.1.17.2.x86_64",
"product": {
"name": "golang-github-lusitaniae-apache_exporter-1.0.0-150000.1.17.2.x86_64",
"product_id": "golang-github-lusitaniae-apache_exporter-1.0.0-150000.1.17.2.x86_64"
}
},
{
"category": "product_version",
"name": "golang-github-prometheus-prometheus-2.45.0-150000.3.50.3.x86_64",
"product": {
"name": "golang-github-prometheus-prometheus-2.45.0-150000.3.50.3.x86_64",
"product_id": "golang-github-prometheus-prometheus-2.45.0-150000.3.50.3.x86_64"
}
},
{
"category": "product_version",
"name": "grafana-9.5.5-150000.1.54.3.x86_64",
"product": {
"name": "grafana-9.5.5-150000.1.54.3.x86_64",
"product_id": "grafana-9.5.5-150000.1.54.3.x86_64"
}
},
{
"category": "product_version",
"name": "prometheus-blackbox_exporter-0.24.0-150000.1.23.3.x86_64",
"product": {
"name": "prometheus-blackbox_exporter-0.24.0-150000.1.23.3.x86_64",
"product_id": "prometheus-blackbox_exporter-0.24.0-150000.1.23.3.x86_64"
}
},
{
"category": "product_version",
"name": "prometheus-postgres_exporter-0.10.1-150000.1.14.3.x86_64",
"product": {
"name": "prometheus-postgres_exporter-0.10.1-150000.1.14.3.x86_64",
"product_id": "prometheus-postgres_exporter-0.10.1-150000.1.14.3.x86_64"
}
},
{
"category": "product_version",
"name": "python2-uyuni-common-libs-4.3.9-150000.1.36.2.x86_64",
"product": {
"name": "python2-uyuni-common-libs-4.3.9-150000.1.36.2.x86_64",
"product_id": "python2-uyuni-common-libs-4.3.9-150000.1.36.2.x86_64"
}
},
{
"category": "product_version",
"name": "python3-uyuni-common-libs-4.3.9-150000.1.36.2.x86_64",
"product": {
"name": "python3-uyuni-common-libs-4.3.9-150000.1.36.2.x86_64",
"product_id": "python3-uyuni-common-libs-4.3.9-150000.1.36.2.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Manager Client Tools 15",
"product": {
"name": "SUSE Manager Client Tools 15",
"product_id": "SUSE Manager Client Tools 15"
}
},
{
"category": "product_name",
"name": "SUSE Manager Client Tools for SLE Micro 5",
"product": {
"name": "SUSE Manager Client Tools for SLE Micro 5",
"product_id": "SUSE Manager Client Tools for SLE Micro 5",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-manager-tools-micro:5"
}
}
},
{
"category": "product_name",
"name": "SUSE Manager Proxy Module 4.2",
"product": {
"name": "SUSE Manager Proxy Module 4.2",
"product_id": "SUSE Manager Proxy Module 4.2",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-suse-manager-proxy:4.2"
}
}
},
{
"category": "product_name",
"name": "SUSE Manager Proxy Module 4.3",
"product": {
"name": "SUSE Manager Proxy Module 4.3",
"product_id": "SUSE Manager Proxy Module 4.3",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-suse-manager-proxy:4.3"
}
}
},
{
"category": "product_name",
"name": "SUSE Manager Server Module 4.2",
"product": {
"name": "SUSE Manager Server Module 4.2",
"product_id": "SUSE Manager Server Module 4.2",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-suse-manager-server:4.2"
}
}
},
{
"category": "product_name",
"name": "SUSE Manager Server Module 4.3",
"product": {
"name": "SUSE Manager Server Module 4.3",
"product_id": "SUSE Manager Server Module 4.3",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-suse-manager-server:4.3"
}
}
},
{
"category": "product_name",
"name": "openSUSE Leap 15.4",
"product": {
"name": "openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:leap:15.4"
}
}
},
{
"category": "product_name",
"name": "openSUSE Leap 15.5",
"product": {
"name": "openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:leap:15.5"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "firewalld-prometheus-config-0.1-150000.3.50.3.aarch64 as component of SUSE Manager Client Tools 15",
"product_id": "SUSE Manager Client Tools 15:firewalld-prometheus-config-0.1-150000.3.50.3.aarch64"
},
"product_reference": "firewalld-prometheus-config-0.1-150000.3.50.3.aarch64",
"relates_to_product_reference": "SUSE Manager Client Tools 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "firewalld-prometheus-config-0.1-150000.3.50.3.ppc64le as component of SUSE Manager Client Tools 15",
"product_id": "SUSE Manager Client Tools 15:firewalld-prometheus-config-0.1-150000.3.50.3.ppc64le"
},
"product_reference": "firewalld-prometheus-config-0.1-150000.3.50.3.ppc64le",
"relates_to_product_reference": "SUSE Manager Client Tools 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "firewalld-prometheus-config-0.1-150000.3.50.3.s390x as component of SUSE Manager Client Tools 15",
"product_id": "SUSE Manager Client Tools 15:firewalld-prometheus-config-0.1-150000.3.50.3.s390x"
},
"product_reference": "firewalld-prometheus-config-0.1-150000.3.50.3.s390x",
"relates_to_product_reference": "SUSE Manager Client Tools 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "firewalld-prometheus-config-0.1-150000.3.50.3.x86_64 as component of SUSE Manager Client Tools 15",
"product_id": "SUSE Manager Client Tools 15:firewalld-prometheus-config-0.1-150000.3.50.3.x86_64"
},
"product_reference": "firewalld-prometheus-config-0.1-150000.3.50.3.x86_64",
"relates_to_product_reference": "SUSE Manager Client Tools 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-github-QubitProducts-exporter_exporter-0.4.0-150000.1.18.3.aarch64 as component of SUSE Manager Client Tools 15",
"product_id": "SUSE Manager Client Tools 15:golang-github-QubitProducts-exporter_exporter-0.4.0-150000.1.18.3.aarch64"
},
"product_reference": "golang-github-QubitProducts-exporter_exporter-0.4.0-150000.1.18.3.aarch64",
"relates_to_product_reference": "SUSE Manager Client Tools 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-github-QubitProducts-exporter_exporter-0.4.0-150000.1.18.3.ppc64le as component of SUSE Manager Client Tools 15",
"product_id": "SUSE Manager Client Tools 15:golang-github-QubitProducts-exporter_exporter-0.4.0-150000.1.18.3.ppc64le"
},
"product_reference": "golang-github-QubitProducts-exporter_exporter-0.4.0-150000.1.18.3.ppc64le",
"relates_to_product_reference": "SUSE Manager Client Tools 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-github-QubitProducts-exporter_exporter-0.4.0-150000.1.18.3.s390x as component of SUSE Manager Client Tools 15",
"product_id": "SUSE Manager Client Tools 15:golang-github-QubitProducts-exporter_exporter-0.4.0-150000.1.18.3.s390x"
},
"product_reference": "golang-github-QubitProducts-exporter_exporter-0.4.0-150000.1.18.3.s390x",
"relates_to_product_reference": "SUSE Manager Client Tools 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-github-QubitProducts-exporter_exporter-0.4.0-150000.1.18.3.x86_64 as component of SUSE Manager Client Tools 15",
"product_id": "SUSE Manager Client Tools 15:golang-github-QubitProducts-exporter_exporter-0.4.0-150000.1.18.3.x86_64"
},
"product_reference": "golang-github-QubitProducts-exporter_exporter-0.4.0-150000.1.18.3.x86_64",
"relates_to_product_reference": "SUSE Manager Client Tools 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-github-lusitaniae-apache_exporter-1.0.0-150000.1.17.2.aarch64 as component of SUSE Manager Client Tools 15",
"product_id": "SUSE Manager Client Tools 15:golang-github-lusitaniae-apache_exporter-1.0.0-150000.1.17.2.aarch64"
},
"product_reference": "golang-github-lusitaniae-apache_exporter-1.0.0-150000.1.17.2.aarch64",
"relates_to_product_reference": "SUSE Manager Client Tools 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-github-lusitaniae-apache_exporter-1.0.0-150000.1.17.2.ppc64le as component of SUSE Manager Client Tools 15",
"product_id": "SUSE Manager Client Tools 15:golang-github-lusitaniae-apache_exporter-1.0.0-150000.1.17.2.ppc64le"
},
"product_reference": "golang-github-lusitaniae-apache_exporter-1.0.0-150000.1.17.2.ppc64le",
"relates_to_product_reference": "SUSE Manager Client Tools 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-github-lusitaniae-apache_exporter-1.0.0-150000.1.17.2.s390x as component of SUSE Manager Client Tools 15",
"product_id": "SUSE Manager Client Tools 15:golang-github-lusitaniae-apache_exporter-1.0.0-150000.1.17.2.s390x"
},
"product_reference": "golang-github-lusitaniae-apache_exporter-1.0.0-150000.1.17.2.s390x",
"relates_to_product_reference": "SUSE Manager Client Tools 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-github-lusitaniae-apache_exporter-1.0.0-150000.1.17.2.x86_64 as component of SUSE Manager Client Tools 15",
"product_id": "SUSE Manager Client Tools 15:golang-github-lusitaniae-apache_exporter-1.0.0-150000.1.17.2.x86_64"
},
"product_reference": "golang-github-lusitaniae-apache_exporter-1.0.0-150000.1.17.2.x86_64",
"relates_to_product_reference": "SUSE Manager Client Tools 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-github-prometheus-prometheus-2.45.0-150000.3.50.3.aarch64 as component of SUSE Manager Client Tools 15",
"product_id": "SUSE Manager Client Tools 15:golang-github-prometheus-prometheus-2.45.0-150000.3.50.3.aarch64"
},
"product_reference": "golang-github-prometheus-prometheus-2.45.0-150000.3.50.3.aarch64",
"relates_to_product_reference": "SUSE Manager Client Tools 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-github-prometheus-prometheus-2.45.0-150000.3.50.3.ppc64le as component of SUSE Manager Client Tools 15",
"product_id": "SUSE Manager Client Tools 15:golang-github-prometheus-prometheus-2.45.0-150000.3.50.3.ppc64le"
},
"product_reference": "golang-github-prometheus-prometheus-2.45.0-150000.3.50.3.ppc64le",
"relates_to_product_reference": "SUSE Manager Client Tools 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-github-prometheus-prometheus-2.45.0-150000.3.50.3.s390x as component of SUSE Manager Client Tools 15",
"product_id": "SUSE Manager Client Tools 15:golang-github-prometheus-prometheus-2.45.0-150000.3.50.3.s390x"
},
"product_reference": "golang-github-prometheus-prometheus-2.45.0-150000.3.50.3.s390x",
"relates_to_product_reference": "SUSE Manager Client Tools 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-github-prometheus-prometheus-2.45.0-150000.3.50.3.x86_64 as component of SUSE Manager Client Tools 15",
"product_id": "SUSE Manager Client Tools 15:golang-github-prometheus-prometheus-2.45.0-150000.3.50.3.x86_64"
},
"product_reference": "golang-github-prometheus-prometheus-2.45.0-150000.3.50.3.x86_64",
"relates_to_product_reference": "SUSE Manager Client Tools 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "grafana-9.5.5-150000.1.54.3.aarch64 as component of SUSE Manager Client Tools 15",
"product_id": "SUSE Manager Client Tools 15:grafana-9.5.5-150000.1.54.3.aarch64"
},
"product_reference": "grafana-9.5.5-150000.1.54.3.aarch64",
"relates_to_product_reference": "SUSE Manager Client Tools 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "grafana-9.5.5-150000.1.54.3.ppc64le as component of SUSE Manager Client Tools 15",
"product_id": "SUSE Manager Client Tools 15:grafana-9.5.5-150000.1.54.3.ppc64le"
},
"product_reference": "grafana-9.5.5-150000.1.54.3.ppc64le",
"relates_to_product_reference": "SUSE Manager Client Tools 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "grafana-9.5.5-150000.1.54.3.s390x as component of SUSE Manager Client Tools 15",
"product_id": "SUSE Manager Client Tools 15:grafana-9.5.5-150000.1.54.3.s390x"
},
"product_reference": "grafana-9.5.5-150000.1.54.3.s390x",
"relates_to_product_reference": "SUSE Manager Client Tools 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "grafana-9.5.5-150000.1.54.3.x86_64 as component of SUSE Manager Client Tools 15",
"product_id": "SUSE Manager Client Tools 15:grafana-9.5.5-150000.1.54.3.x86_64"
},
"product_reference": "grafana-9.5.5-150000.1.54.3.x86_64",
"relates_to_product_reference": "SUSE Manager Client Tools 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "prometheus-blackbox_exporter-0.24.0-150000.1.23.3.aarch64 as component of SUSE Manager Client Tools 15",
"product_id": "SUSE Manager Client Tools 15:prometheus-blackbox_exporter-0.24.0-150000.1.23.3.aarch64"
},
"product_reference": "prometheus-blackbox_exporter-0.24.0-150000.1.23.3.aarch64",
"relates_to_product_reference": "SUSE Manager Client Tools 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "prometheus-blackbox_exporter-0.24.0-150000.1.23.3.ppc64le as component of SUSE Manager Client Tools 15",
"product_id": "SUSE Manager Client Tools 15:prometheus-blackbox_exporter-0.24.0-150000.1.23.3.ppc64le"
},
"product_reference": "prometheus-blackbox_exporter-0.24.0-150000.1.23.3.ppc64le",
"relates_to_product_reference": "SUSE Manager Client Tools 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "prometheus-blackbox_exporter-0.24.0-150000.1.23.3.s390x as component of SUSE Manager Client Tools 15",
"product_id": "SUSE Manager Client Tools 15:prometheus-blackbox_exporter-0.24.0-150000.1.23.3.s390x"
},
"product_reference": "prometheus-blackbox_exporter-0.24.0-150000.1.23.3.s390x",
"relates_to_product_reference": "SUSE Manager Client Tools 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "prometheus-blackbox_exporter-0.24.0-150000.1.23.3.x86_64 as component of SUSE Manager Client Tools 15",
"product_id": "SUSE Manager Client Tools 15:prometheus-blackbox_exporter-0.24.0-150000.1.23.3.x86_64"
},
"product_reference": "prometheus-blackbox_exporter-0.24.0-150000.1.23.3.x86_64",
"relates_to_product_reference": "SUSE Manager Client Tools 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "prometheus-postgres_exporter-0.10.1-150000.1.14.3.aarch64 as component of SUSE Manager Client Tools 15",
"product_id": "SUSE Manager Client Tools 15:prometheus-postgres_exporter-0.10.1-150000.1.14.3.aarch64"
},
"product_reference": "prometheus-postgres_exporter-0.10.1-150000.1.14.3.aarch64",
"relates_to_product_reference": "SUSE Manager Client Tools 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "prometheus-postgres_exporter-0.10.1-150000.1.14.3.ppc64le as component of SUSE Manager Client Tools 15",
"product_id": "SUSE Manager Client Tools 15:prometheus-postgres_exporter-0.10.1-150000.1.14.3.ppc64le"
},
"product_reference": "prometheus-postgres_exporter-0.10.1-150000.1.14.3.ppc64le",
"relates_to_product_reference": "SUSE Manager Client Tools 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "prometheus-postgres_exporter-0.10.1-150000.1.14.3.s390x as component of SUSE Manager Client Tools 15",
"product_id": "SUSE Manager Client Tools 15:prometheus-postgres_exporter-0.10.1-150000.1.14.3.s390x"
},
"product_reference": "prometheus-postgres_exporter-0.10.1-150000.1.14.3.s390x",
"relates_to_product_reference": "SUSE Manager Client Tools 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "prometheus-postgres_exporter-0.10.1-150000.1.14.3.x86_64 as component of SUSE Manager Client Tools 15",
"product_id": "SUSE Manager Client Tools 15:prometheus-postgres_exporter-0.10.1-150000.1.14.3.x86_64"
},
"product_reference": "prometheus-postgres_exporter-0.10.1-150000.1.14.3.x86_64",
"relates_to_product_reference": "SUSE Manager Client Tools 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-pyvmomi-6.7.3-150000.1.6.2.noarch as component of SUSE Manager Client Tools 15",
"product_id": "SUSE Manager Client Tools 15:python3-pyvmomi-6.7.3-150000.1.6.2.noarch"
},
"product_reference": "python3-pyvmomi-6.7.3-150000.1.6.2.noarch",
"relates_to_product_reference": "SUSE Manager Client Tools 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-uyuni-common-libs-4.3.9-150000.1.36.2.aarch64 as component of SUSE Manager Client Tools 15",
"product_id": "SUSE Manager Client Tools 15:python3-uyuni-common-libs-4.3.9-150000.1.36.2.aarch64"
},
"product_reference": "python3-uyuni-common-libs-4.3.9-150000.1.36.2.aarch64",
"relates_to_product_reference": "SUSE Manager Client Tools 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-uyuni-common-libs-4.3.9-150000.1.36.2.ppc64le as component of SUSE Manager Client Tools 15",
"product_id": "SUSE Manager Client Tools 15:python3-uyuni-common-libs-4.3.9-150000.1.36.2.ppc64le"
},
"product_reference": "python3-uyuni-common-libs-4.3.9-150000.1.36.2.ppc64le",
"relates_to_product_reference": "SUSE Manager Client Tools 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-uyuni-common-libs-4.3.9-150000.1.36.2.s390x as component of SUSE Manager Client Tools 15",
"product_id": "SUSE Manager Client Tools 15:python3-uyuni-common-libs-4.3.9-150000.1.36.2.s390x"
},
"product_reference": "python3-uyuni-common-libs-4.3.9-150000.1.36.2.s390x",
"relates_to_product_reference": "SUSE Manager Client Tools 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-uyuni-common-libs-4.3.9-150000.1.36.2.x86_64 as component of SUSE Manager Client Tools 15",
"product_id": "SUSE Manager Client Tools 15:python3-uyuni-common-libs-4.3.9-150000.1.36.2.x86_64"
},
"product_reference": "python3-uyuni-common-libs-4.3.9-150000.1.36.2.x86_64",
"relates_to_product_reference": "SUSE Manager Client Tools 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "spacecmd-4.3.23-150000.3.104.2.noarch as component of SUSE Manager Client Tools 15",
"product_id": "SUSE Manager Client Tools 15:spacecmd-4.3.23-150000.3.104.2.noarch"
},
"product_reference": "spacecmd-4.3.23-150000.3.104.2.noarch",
"relates_to_product_reference": "SUSE Manager Client Tools 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "supportutils-plugin-susemanager-client-4.3.3-150000.3.21.2.noarch as component of SUSE Manager Client Tools 15",
"product_id": "SUSE Manager Client Tools 15:supportutils-plugin-susemanager-client-4.3.3-150000.3.21.2.noarch"
},
"product_reference": "supportutils-plugin-susemanager-client-4.3.3-150000.3.21.2.noarch",
"relates_to_product_reference": "SUSE Manager Client Tools 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-github-QubitProducts-exporter_exporter-0.4.0-150000.1.18.3.aarch64 as component of SUSE Manager Client Tools for SLE Micro 5",
"product_id": "SUSE Manager Client Tools for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-150000.1.18.3.aarch64"
},
"product_reference": "golang-github-QubitProducts-exporter_exporter-0.4.0-150000.1.18.3.aarch64",
"relates_to_product_reference": "SUSE Manager Client Tools for SLE Micro 5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-github-QubitProducts-exporter_exporter-0.4.0-150000.1.18.3.s390x as component of SUSE Manager Client Tools for SLE Micro 5",
"product_id": "SUSE Manager Client Tools for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-150000.1.18.3.s390x"
},
"product_reference": "golang-github-QubitProducts-exporter_exporter-0.4.0-150000.1.18.3.s390x",
"relates_to_product_reference": "SUSE Manager Client Tools for SLE Micro 5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-github-QubitProducts-exporter_exporter-0.4.0-150000.1.18.3.x86_64 as component of SUSE Manager Client Tools for SLE Micro 5",
"product_id": "SUSE Manager Client Tools for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-150000.1.18.3.x86_64"
},
"product_reference": "golang-github-QubitProducts-exporter_exporter-0.4.0-150000.1.18.3.x86_64",
"relates_to_product_reference": "SUSE Manager Client Tools for SLE Micro 5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "prometheus-blackbox_exporter-0.24.0-150000.1.23.3.aarch64 as component of SUSE Manager Client Tools for SLE Micro 5",
"product_id": "SUSE Manager Client Tools for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-150000.1.23.3.aarch64"
},
"product_reference": "prometheus-blackbox_exporter-0.24.0-150000.1.23.3.aarch64",
"relates_to_product_reference": "SUSE Manager Client Tools for SLE Micro 5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "prometheus-blackbox_exporter-0.24.0-150000.1.23.3.s390x as component of SUSE Manager Client Tools for SLE Micro 5",
"product_id": "SUSE Manager Client Tools for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-150000.1.23.3.s390x"
},
"product_reference": "prometheus-blackbox_exporter-0.24.0-150000.1.23.3.s390x",
"relates_to_product_reference": "SUSE Manager Client Tools for SLE Micro 5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "prometheus-blackbox_exporter-0.24.0-150000.1.23.3.x86_64 as component of SUSE Manager Client Tools for SLE Micro 5",
"product_id": "SUSE Manager Client Tools for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-150000.1.23.3.x86_64"
},
"product_reference": "prometheus-blackbox_exporter-0.24.0-150000.1.23.3.x86_64",
"relates_to_product_reference": "SUSE Manager Client Tools for SLE Micro 5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-github-QubitProducts-exporter_exporter-0.4.0-150000.1.18.3.aarch64 as component of SUSE Manager Proxy Module 4.2",
"product_id": "SUSE Manager Proxy Module 4.2:golang-github-QubitProducts-exporter_exporter-0.4.0-150000.1.18.3.aarch64"
},
"product_reference": "golang-github-QubitProducts-exporter_exporter-0.4.0-150000.1.18.3.aarch64",
"relates_to_product_reference": "SUSE Manager Proxy Module 4.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-github-QubitProducts-exporter_exporter-0.4.0-150000.1.18.3.ppc64le as component of SUSE Manager Proxy Module 4.2",
"product_id": "SUSE Manager Proxy Module 4.2:golang-github-QubitProducts-exporter_exporter-0.4.0-150000.1.18.3.ppc64le"
},
"product_reference": "golang-github-QubitProducts-exporter_exporter-0.4.0-150000.1.18.3.ppc64le",
"relates_to_product_reference": "SUSE Manager Proxy Module 4.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-github-QubitProducts-exporter_exporter-0.4.0-150000.1.18.3.s390x as component of SUSE Manager Proxy Module 4.2",
"product_id": "SUSE Manager Proxy Module 4.2:golang-github-QubitProducts-exporter_exporter-0.4.0-150000.1.18.3.s390x"
},
"product_reference": "golang-github-QubitProducts-exporter_exporter-0.4.0-150000.1.18.3.s390x",
"relates_to_product_reference": "SUSE Manager Proxy Module 4.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-github-QubitProducts-exporter_exporter-0.4.0-150000.1.18.3.x86_64 as component of SUSE Manager Proxy Module 4.2",
"product_id": "SUSE Manager Proxy Module 4.2:golang-github-QubitProducts-exporter_exporter-0.4.0-150000.1.18.3.x86_64"
},
"product_reference": "golang-github-QubitProducts-exporter_exporter-0.4.0-150000.1.18.3.x86_64",
"relates_to_product_reference": "SUSE Manager Proxy Module 4.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-github-lusitaniae-apache_exporter-1.0.0-150000.1.17.2.aarch64 as component of SUSE Manager Proxy Module 4.2",
"product_id": "SUSE Manager Proxy Module 4.2:golang-github-lusitaniae-apache_exporter-1.0.0-150000.1.17.2.aarch64"
},
"product_reference": "golang-github-lusitaniae-apache_exporter-1.0.0-150000.1.17.2.aarch64",
"relates_to_product_reference": "SUSE Manager Proxy Module 4.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-github-lusitaniae-apache_exporter-1.0.0-150000.1.17.2.ppc64le as component of SUSE Manager Proxy Module 4.2",
"product_id": "SUSE Manager Proxy Module 4.2:golang-github-lusitaniae-apache_exporter-1.0.0-150000.1.17.2.ppc64le"
},
"product_reference": "golang-github-lusitaniae-apache_exporter-1.0.0-150000.1.17.2.ppc64le",
"relates_to_product_reference": "SUSE Manager Proxy Module 4.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-github-lusitaniae-apache_exporter-1.0.0-150000.1.17.2.s390x as component of SUSE Manager Proxy Module 4.2",
"product_id": "SUSE Manager Proxy Module 4.2:golang-github-lusitaniae-apache_exporter-1.0.0-150000.1.17.2.s390x"
},
"product_reference": "golang-github-lusitaniae-apache_exporter-1.0.0-150000.1.17.2.s390x",
"relates_to_product_reference": "SUSE Manager Proxy Module 4.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-github-lusitaniae-apache_exporter-1.0.0-150000.1.17.2.x86_64 as component of SUSE Manager Proxy Module 4.2",
"product_id": "SUSE Manager Proxy Module 4.2:golang-github-lusitaniae-apache_exporter-1.0.0-150000.1.17.2.x86_64"
},
"product_reference": "golang-github-lusitaniae-apache_exporter-1.0.0-150000.1.17.2.x86_64",
"relates_to_product_reference": "SUSE Manager Proxy Module 4.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "prometheus-blackbox_exporter-0.24.0-150000.1.23.3.aarch64 as component of SUSE Manager Proxy Module 4.2",
"product_id": "SUSE Manager Proxy Module 4.2:prometheus-blackbox_exporter-0.24.0-150000.1.23.3.aarch64"
},
"product_reference": "prometheus-blackbox_exporter-0.24.0-150000.1.23.3.aarch64",
"relates_to_product_reference": "SUSE Manager Proxy Module 4.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "prometheus-blackbox_exporter-0.24.0-150000.1.23.3.ppc64le as component of SUSE Manager Proxy Module 4.2",
"product_id": "SUSE Manager Proxy Module 4.2:prometheus-blackbox_exporter-0.24.0-150000.1.23.3.ppc64le"
},
"product_reference": "prometheus-blackbox_exporter-0.24.0-150000.1.23.3.ppc64le",
"relates_to_product_reference": "SUSE Manager Proxy Module 4.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "prometheus-blackbox_exporter-0.24.0-150000.1.23.3.s390x as component of SUSE Manager Proxy Module 4.2",
"product_id": "SUSE Manager Proxy Module 4.2:prometheus-blackbox_exporter-0.24.0-150000.1.23.3.s390x"
},
"product_reference": "prometheus-blackbox_exporter-0.24.0-150000.1.23.3.s390x",
"relates_to_product_reference": "SUSE Manager Proxy Module 4.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "prometheus-blackbox_exporter-0.24.0-150000.1.23.3.x86_64 as component of SUSE Manager Proxy Module 4.2",
"product_id": "SUSE Manager Proxy Module 4.2:prometheus-blackbox_exporter-0.24.0-150000.1.23.3.x86_64"
},
"product_reference": "prometheus-blackbox_exporter-0.24.0-150000.1.23.3.x86_64",
"relates_to_product_reference": "SUSE Manager Proxy Module 4.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-github-QubitProducts-exporter_exporter-0.4.0-150000.1.18.3.aarch64 as component of SUSE Manager Proxy Module 4.3",
"product_id": "SUSE Manager Proxy Module 4.3:golang-github-QubitProducts-exporter_exporter-0.4.0-150000.1.18.3.aarch64"
},
"product_reference": "golang-github-QubitProducts-exporter_exporter-0.4.0-150000.1.18.3.aarch64",
"relates_to_product_reference": "SUSE Manager Proxy Module 4.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-github-QubitProducts-exporter_exporter-0.4.0-150000.1.18.3.ppc64le as component of SUSE Manager Proxy Module 4.3",
"product_id": "SUSE Manager Proxy Module 4.3:golang-github-QubitProducts-exporter_exporter-0.4.0-150000.1.18.3.ppc64le"
},
"product_reference": "golang-github-QubitProducts-exporter_exporter-0.4.0-150000.1.18.3.ppc64le",
"relates_to_product_reference": "SUSE Manager Proxy Module 4.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-github-QubitProducts-exporter_exporter-0.4.0-150000.1.18.3.s390x as component of SUSE Manager Proxy Module 4.3",
"product_id": "SUSE Manager Proxy Module 4.3:golang-github-QubitProducts-exporter_exporter-0.4.0-150000.1.18.3.s390x"
},
"product_reference": "golang-github-QubitProducts-exporter_exporter-0.4.0-150000.1.18.3.s390x",
"relates_to_product_reference": "SUSE Manager Proxy Module 4.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-github-QubitProducts-exporter_exporter-0.4.0-150000.1.18.3.x86_64 as component of SUSE Manager Proxy Module 4.3",
"product_id": "SUSE Manager Proxy Module 4.3:golang-github-QubitProducts-exporter_exporter-0.4.0-150000.1.18.3.x86_64"
},
"product_reference": "golang-github-QubitProducts-exporter_exporter-0.4.0-150000.1.18.3.x86_64",
"relates_to_product_reference": "SUSE Manager Proxy Module 4.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-github-lusitaniae-apache_exporter-1.0.0-150000.1.17.2.aarch64 as component of SUSE Manager Proxy Module 4.3",
"product_id": "SUSE Manager Proxy Module 4.3:golang-github-lusitaniae-apache_exporter-1.0.0-150000.1.17.2.aarch64"
},
"product_reference": "golang-github-lusitaniae-apache_exporter-1.0.0-150000.1.17.2.aarch64",
"relates_to_product_reference": "SUSE Manager Proxy Module 4.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-github-lusitaniae-apache_exporter-1.0.0-150000.1.17.2.ppc64le as component of SUSE Manager Proxy Module 4.3",
"product_id": "SUSE Manager Proxy Module 4.3:golang-github-lusitaniae-apache_exporter-1.0.0-150000.1.17.2.ppc64le"
},
"product_reference": "golang-github-lusitaniae-apache_exporter-1.0.0-150000.1.17.2.ppc64le",
"relates_to_product_reference": "SUSE Manager Proxy Module 4.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-github-lusitaniae-apache_exporter-1.0.0-150000.1.17.2.s390x as component of SUSE Manager Proxy Module 4.3",
"product_id": "SUSE Manager Proxy Module 4.3:golang-github-lusitaniae-apache_exporter-1.0.0-150000.1.17.2.s390x"
},
"product_reference": "golang-github-lusitaniae-apache_exporter-1.0.0-150000.1.17.2.s390x",
"relates_to_product_reference": "SUSE Manager Proxy Module 4.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-github-lusitaniae-apache_exporter-1.0.0-150000.1.17.2.x86_64 as component of SUSE Manager Proxy Module 4.3",
"product_id": "SUSE Manager Proxy Module 4.3:golang-github-lusitaniae-apache_exporter-1.0.0-150000.1.17.2.x86_64"
},
"product_reference": "golang-github-lusitaniae-apache_exporter-1.0.0-150000.1.17.2.x86_64",
"relates_to_product_reference": "SUSE Manager Proxy Module 4.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "prometheus-blackbox_exporter-0.24.0-150000.1.23.3.aarch64 as component of SUSE Manager Proxy Module 4.3",
"product_id": "SUSE Manager Proxy Module 4.3:prometheus-blackbox_exporter-0.24.0-150000.1.23.3.aarch64"
},
"product_reference": "prometheus-blackbox_exporter-0.24.0-150000.1.23.3.aarch64",
"relates_to_product_reference": "SUSE Manager Proxy Module 4.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "prometheus-blackbox_exporter-0.24.0-150000.1.23.3.ppc64le as component of SUSE Manager Proxy Module 4.3",
"product_id": "SUSE Manager Proxy Module 4.3:prometheus-blackbox_exporter-0.24.0-150000.1.23.3.ppc64le"
},
"product_reference": "prometheus-blackbox_exporter-0.24.0-150000.1.23.3.ppc64le",
"relates_to_product_reference": "SUSE Manager Proxy Module 4.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "prometheus-blackbox_exporter-0.24.0-150000.1.23.3.s390x as component of SUSE Manager Proxy Module 4.3",
"product_id": "SUSE Manager Proxy Module 4.3:prometheus-blackbox_exporter-0.24.0-150000.1.23.3.s390x"
},
"product_reference": "prometheus-blackbox_exporter-0.24.0-150000.1.23.3.s390x",
"relates_to_product_reference": "SUSE Manager Proxy Module 4.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "prometheus-blackbox_exporter-0.24.0-150000.1.23.3.x86_64 as component of SUSE Manager Proxy Module 4.3",
"product_id": "SUSE Manager Proxy Module 4.3:prometheus-blackbox_exporter-0.24.0-150000.1.23.3.x86_64"
},
"product_reference": "prometheus-blackbox_exporter-0.24.0-150000.1.23.3.x86_64",
"relates_to_product_reference": "SUSE Manager Proxy Module 4.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-github-QubitProducts-exporter_exporter-0.4.0-150000.1.18.3.aarch64 as component of SUSE Manager Server Module 4.2",
"product_id": "SUSE Manager Server Module 4.2:golang-github-QubitProducts-exporter_exporter-0.4.0-150000.1.18.3.aarch64"
},
"product_reference": "golang-github-QubitProducts-exporter_exporter-0.4.0-150000.1.18.3.aarch64",
"relates_to_product_reference": "SUSE Manager Server Module 4.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-github-QubitProducts-exporter_exporter-0.4.0-150000.1.18.3.ppc64le as component of SUSE Manager Server Module 4.2",
"product_id": "SUSE Manager Server Module 4.2:golang-github-QubitProducts-exporter_exporter-0.4.0-150000.1.18.3.ppc64le"
},
"product_reference": "golang-github-QubitProducts-exporter_exporter-0.4.0-150000.1.18.3.ppc64le",
"relates_to_product_reference": "SUSE Manager Server Module 4.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-github-QubitProducts-exporter_exporter-0.4.0-150000.1.18.3.s390x as component of SUSE Manager Server Module 4.2",
"product_id": "SUSE Manager Server Module 4.2:golang-github-QubitProducts-exporter_exporter-0.4.0-150000.1.18.3.s390x"
},
"product_reference": "golang-github-QubitProducts-exporter_exporter-0.4.0-150000.1.18.3.s390x",
"relates_to_product_reference": "SUSE Manager Server Module 4.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-github-QubitProducts-exporter_exporter-0.4.0-150000.1.18.3.x86_64 as component of SUSE Manager Server Module 4.2",
"product_id": "SUSE Manager Server Module 4.2:golang-github-QubitProducts-exporter_exporter-0.4.0-150000.1.18.3.x86_64"
},
"product_reference": "golang-github-QubitProducts-exporter_exporter-0.4.0-150000.1.18.3.x86_64",
"relates_to_product_reference": "SUSE Manager Server Module 4.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-github-lusitaniae-apache_exporter-1.0.0-150000.1.17.2.aarch64 as component of SUSE Manager Server Module 4.2",
"product_id": "SUSE Manager Server Module 4.2:golang-github-lusitaniae-apache_exporter-1.0.0-150000.1.17.2.aarch64"
},
"product_reference": "golang-github-lusitaniae-apache_exporter-1.0.0-150000.1.17.2.aarch64",
"relates_to_product_reference": "SUSE Manager Server Module 4.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-github-lusitaniae-apache_exporter-1.0.0-150000.1.17.2.ppc64le as component of SUSE Manager Server Module 4.2",
"product_id": "SUSE Manager Server Module 4.2:golang-github-lusitaniae-apache_exporter-1.0.0-150000.1.17.2.ppc64le"
},
"product_reference": "golang-github-lusitaniae-apache_exporter-1.0.0-150000.1.17.2.ppc64le",
"relates_to_product_reference": "SUSE Manager Server Module 4.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-github-lusitaniae-apache_exporter-1.0.0-150000.1.17.2.s390x as component of SUSE Manager Server Module 4.2",
"product_id": "SUSE Manager Server Module 4.2:golang-github-lusitaniae-apache_exporter-1.0.0-150000.1.17.2.s390x"
},
"product_reference": "golang-github-lusitaniae-apache_exporter-1.0.0-150000.1.17.2.s390x",
"relates_to_product_reference": "SUSE Manager Server Module 4.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-github-lusitaniae-apache_exporter-1.0.0-150000.1.17.2.x86_64 as component of SUSE Manager Server Module 4.2",
"product_id": "SUSE Manager Server Module 4.2:golang-github-lusitaniae-apache_exporter-1.0.0-150000.1.17.2.x86_64"
},
"product_reference": "golang-github-lusitaniae-apache_exporter-1.0.0-150000.1.17.2.x86_64",
"relates_to_product_reference": "SUSE Manager Server Module 4.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "prometheus-postgres_exporter-0.10.1-150000.1.14.3.aarch64 as component of SUSE Manager Server Module 4.2",
"product_id": "SUSE Manager Server Module 4.2:prometheus-postgres_exporter-0.10.1-150000.1.14.3.aarch64"
},
"product_reference": "prometheus-postgres_exporter-0.10.1-150000.1.14.3.aarch64",
"relates_to_product_reference": "SUSE Manager Server Module 4.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "prometheus-postgres_exporter-0.10.1-150000.1.14.3.ppc64le as component of SUSE Manager Server Module 4.2",
"product_id": "SUSE Manager Server Module 4.2:prometheus-postgres_exporter-0.10.1-150000.1.14.3.ppc64le"
},
"product_reference": "prometheus-postgres_exporter-0.10.1-150000.1.14.3.ppc64le",
"relates_to_product_reference": "SUSE Manager Server Module 4.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "prometheus-postgres_exporter-0.10.1-150000.1.14.3.s390x as component of SUSE Manager Server Module 4.2",
"product_id": "SUSE Manager Server Module 4.2:prometheus-postgres_exporter-0.10.1-150000.1.14.3.s390x"
},
"product_reference": "prometheus-postgres_exporter-0.10.1-150000.1.14.3.s390x",
"relates_to_product_reference": "SUSE Manager Server Module 4.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "prometheus-postgres_exporter-0.10.1-150000.1.14.3.x86_64 as component of SUSE Manager Server Module 4.2",
"product_id": "SUSE Manager Server Module 4.2:prometheus-postgres_exporter-0.10.1-150000.1.14.3.x86_64"
},
"product_reference": "prometheus-postgres_exporter-0.10.1-150000.1.14.3.x86_64",
"relates_to_product_reference": "SUSE Manager Server Module 4.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-github-QubitProducts-exporter_exporter-0.4.0-150000.1.18.3.aarch64 as component of SUSE Manager Server Module 4.3",
"product_id": "SUSE Manager Server Module 4.3:golang-github-QubitProducts-exporter_exporter-0.4.0-150000.1.18.3.aarch64"
},
"product_reference": "golang-github-QubitProducts-exporter_exporter-0.4.0-150000.1.18.3.aarch64",
"relates_to_product_reference": "SUSE Manager Server Module 4.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-github-QubitProducts-exporter_exporter-0.4.0-150000.1.18.3.ppc64le as component of SUSE Manager Server Module 4.3",
"product_id": "SUSE Manager Server Module 4.3:golang-github-QubitProducts-exporter_exporter-0.4.0-150000.1.18.3.ppc64le"
},
"product_reference": "golang-github-QubitProducts-exporter_exporter-0.4.0-150000.1.18.3.ppc64le",
"relates_to_product_reference": "SUSE Manager Server Module 4.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-github-QubitProducts-exporter_exporter-0.4.0-150000.1.18.3.s390x as component of SUSE Manager Server Module 4.3",
"product_id": "SUSE Manager Server Module 4.3:golang-github-QubitProducts-exporter_exporter-0.4.0-150000.1.18.3.s390x"
},
"product_reference": "golang-github-QubitProducts-exporter_exporter-0.4.0-150000.1.18.3.s390x",
"relates_to_product_reference": "SUSE Manager Server Module 4.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-github-QubitProducts-exporter_exporter-0.4.0-150000.1.18.3.x86_64 as component of SUSE Manager Server Module 4.3",
"product_id": "SUSE Manager Server Module 4.3:golang-github-QubitProducts-exporter_exporter-0.4.0-150000.1.18.3.x86_64"
},
"product_reference": "golang-github-QubitProducts-exporter_exporter-0.4.0-150000.1.18.3.x86_64",
"relates_to_product_reference": "SUSE Manager Server Module 4.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-github-lusitaniae-apache_exporter-1.0.0-150000.1.17.2.aarch64 as component of SUSE Manager Server Module 4.3",
"product_id": "SUSE Manager Server Module 4.3:golang-github-lusitaniae-apache_exporter-1.0.0-150000.1.17.2.aarch64"
},
"product_reference": "golang-github-lusitaniae-apache_exporter-1.0.0-150000.1.17.2.aarch64",
"relates_to_product_reference": "SUSE Manager Server Module 4.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-github-lusitaniae-apache_exporter-1.0.0-150000.1.17.2.ppc64le as component of SUSE Manager Server Module 4.3",
"product_id": "SUSE Manager Server Module 4.3:golang-github-lusitaniae-apache_exporter-1.0.0-150000.1.17.2.ppc64le"
},
"product_reference": "golang-github-lusitaniae-apache_exporter-1.0.0-150000.1.17.2.ppc64le",
"relates_to_product_reference": "SUSE Manager Server Module 4.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-github-lusitaniae-apache_exporter-1.0.0-150000.1.17.2.s390x as component of SUSE Manager Server Module 4.3",
"product_id": "SUSE Manager Server Module 4.3:golang-github-lusitaniae-apache_exporter-1.0.0-150000.1.17.2.s390x"
},
"product_reference": "golang-github-lusitaniae-apache_exporter-1.0.0-150000.1.17.2.s390x",
"relates_to_product_reference": "SUSE Manager Server Module 4.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-github-lusitaniae-apache_exporter-1.0.0-150000.1.17.2.x86_64 as component of SUSE Manager Server Module 4.3",
"product_id": "SUSE Manager Server Module 4.3:golang-github-lusitaniae-apache_exporter-1.0.0-150000.1.17.2.x86_64"
},
"product_reference": "golang-github-lusitaniae-apache_exporter-1.0.0-150000.1.17.2.x86_64",
"relates_to_product_reference": "SUSE Manager Server Module 4.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-github-QubitProducts-exporter_exporter-0.4.0-150000.1.18.3.aarch64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:golang-github-QubitProducts-exporter_exporter-0.4.0-150000.1.18.3.aarch64"
},
"product_reference": "golang-github-QubitProducts-exporter_exporter-0.4.0-150000.1.18.3.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-github-QubitProducts-exporter_exporter-0.4.0-150000.1.18.3.ppc64le as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:golang-github-QubitProducts-exporter_exporter-0.4.0-150000.1.18.3.ppc64le"
},
"product_reference": "golang-github-QubitProducts-exporter_exporter-0.4.0-150000.1.18.3.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-github-QubitProducts-exporter_exporter-0.4.0-150000.1.18.3.s390x as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:golang-github-QubitProducts-exporter_exporter-0.4.0-150000.1.18.3.s390x"
},
"product_reference": "golang-github-QubitProducts-exporter_exporter-0.4.0-150000.1.18.3.s390x",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-github-QubitProducts-exporter_exporter-0.4.0-150000.1.18.3.x86_64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:golang-github-QubitProducts-exporter_exporter-0.4.0-150000.1.18.3.x86_64"
},
"product_reference": "golang-github-QubitProducts-exporter_exporter-0.4.0-150000.1.18.3.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-github-lusitaniae-apache_exporter-1.0.0-150000.1.17.2.aarch64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:golang-github-lusitaniae-apache_exporter-1.0.0-150000.1.17.2.aarch64"
},
"product_reference": "golang-github-lusitaniae-apache_exporter-1.0.0-150000.1.17.2.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-github-lusitaniae-apache_exporter-1.0.0-150000.1.17.2.ppc64le as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:golang-github-lusitaniae-apache_exporter-1.0.0-150000.1.17.2.ppc64le"
},
"product_reference": "golang-github-lusitaniae-apache_exporter-1.0.0-150000.1.17.2.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-github-lusitaniae-apache_exporter-1.0.0-150000.1.17.2.s390x as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:golang-github-lusitaniae-apache_exporter-1.0.0-150000.1.17.2.s390x"
},
"product_reference": "golang-github-lusitaniae-apache_exporter-1.0.0-150000.1.17.2.s390x",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-github-lusitaniae-apache_exporter-1.0.0-150000.1.17.2.x86_64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:golang-github-lusitaniae-apache_exporter-1.0.0-150000.1.17.2.x86_64"
},
"product_reference": "golang-github-lusitaniae-apache_exporter-1.0.0-150000.1.17.2.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "prometheus-blackbox_exporter-0.24.0-150000.1.23.3.aarch64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:prometheus-blackbox_exporter-0.24.0-150000.1.23.3.aarch64"
},
"product_reference": "prometheus-blackbox_exporter-0.24.0-150000.1.23.3.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "prometheus-blackbox_exporter-0.24.0-150000.1.23.3.ppc64le as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:prometheus-blackbox_exporter-0.24.0-150000.1.23.3.ppc64le"
},
"product_reference": "prometheus-blackbox_exporter-0.24.0-150000.1.23.3.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "prometheus-blackbox_exporter-0.24.0-150000.1.23.3.s390x as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:prometheus-blackbox_exporter-0.24.0-150000.1.23.3.s390x"
},
"product_reference": "prometheus-blackbox_exporter-0.24.0-150000.1.23.3.s390x",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "prometheus-blackbox_exporter-0.24.0-150000.1.23.3.x86_64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:prometheus-blackbox_exporter-0.24.0-150000.1.23.3.x86_64"
},
"product_reference": "prometheus-blackbox_exporter-0.24.0-150000.1.23.3.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "prometheus-postgres_exporter-0.10.1-150000.1.14.3.aarch64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:prometheus-postgres_exporter-0.10.1-150000.1.14.3.aarch64"
},
"product_reference": "prometheus-postgres_exporter-0.10.1-150000.1.14.3.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "prometheus-postgres_exporter-0.10.1-150000.1.14.3.ppc64le as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:prometheus-postgres_exporter-0.10.1-150000.1.14.3.ppc64le"
},
"product_reference": "prometheus-postgres_exporter-0.10.1-150000.1.14.3.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "prometheus-postgres_exporter-0.10.1-150000.1.14.3.s390x as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:prometheus-postgres_exporter-0.10.1-150000.1.14.3.s390x"
},
"product_reference": "prometheus-postgres_exporter-0.10.1-150000.1.14.3.s390x",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "prometheus-postgres_exporter-0.10.1-150000.1.14.3.x86_64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:prometheus-postgres_exporter-0.10.1-150000.1.14.3.x86_64"
},
"product_reference": "prometheus-postgres_exporter-0.10.1-150000.1.14.3.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "spacecmd-4.3.23-150000.3.104.2.noarch as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:spacecmd-4.3.23-150000.3.104.2.noarch"
},
"product_reference": "spacecmd-4.3.23-150000.3.104.2.noarch",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "supportutils-plugin-susemanager-client-4.3.3-150000.3.21.2.noarch as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:supportutils-plugin-susemanager-client-4.3.3-150000.3.21.2.noarch"
},
"product_reference": "supportutils-plugin-susemanager-client-4.3.3-150000.3.21.2.noarch",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-github-QubitProducts-exporter_exporter-0.4.0-150000.1.18.3.aarch64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:golang-github-QubitProducts-exporter_exporter-0.4.0-150000.1.18.3.aarch64"
},
"product_reference": "golang-github-QubitProducts-exporter_exporter-0.4.0-150000.1.18.3.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-github-QubitProducts-exporter_exporter-0.4.0-150000.1.18.3.ppc64le as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:golang-github-QubitProducts-exporter_exporter-0.4.0-150000.1.18.3.ppc64le"
},
"product_reference": "golang-github-QubitProducts-exporter_exporter-0.4.0-150000.1.18.3.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-github-QubitProducts-exporter_exporter-0.4.0-150000.1.18.3.s390x as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:golang-github-QubitProducts-exporter_exporter-0.4.0-150000.1.18.3.s390x"
},
"product_reference": "golang-github-QubitProducts-exporter_exporter-0.4.0-150000.1.18.3.s390x",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-github-QubitProducts-exporter_exporter-0.4.0-150000.1.18.3.x86_64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:golang-github-QubitProducts-exporter_exporter-0.4.0-150000.1.18.3.x86_64"
},
"product_reference": "golang-github-QubitProducts-exporter_exporter-0.4.0-150000.1.18.3.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-github-lusitaniae-apache_exporter-1.0.0-150000.1.17.2.aarch64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:golang-github-lusitaniae-apache_exporter-1.0.0-150000.1.17.2.aarch64"
},
"product_reference": "golang-github-lusitaniae-apache_exporter-1.0.0-150000.1.17.2.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-github-lusitaniae-apache_exporter-1.0.0-150000.1.17.2.ppc64le as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:golang-github-lusitaniae-apache_exporter-1.0.0-150000.1.17.2.ppc64le"
},
"product_reference": "golang-github-lusitaniae-apache_exporter-1.0.0-150000.1.17.2.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-github-lusitaniae-apache_exporter-1.0.0-150000.1.17.2.s390x as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:golang-github-lusitaniae-apache_exporter-1.0.0-150000.1.17.2.s390x"
},
"product_reference": "golang-github-lusitaniae-apache_exporter-1.0.0-150000.1.17.2.s390x",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-github-lusitaniae-apache_exporter-1.0.0-150000.1.17.2.x86_64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:golang-github-lusitaniae-apache_exporter-1.0.0-150000.1.17.2.x86_64"
},
"product_reference": "golang-github-lusitaniae-apache_exporter-1.0.0-150000.1.17.2.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "prometheus-blackbox_exporter-0.24.0-150000.1.23.3.aarch64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:prometheus-blackbox_exporter-0.24.0-150000.1.23.3.aarch64"
},
"product_reference": "prometheus-blackbox_exporter-0.24.0-150000.1.23.3.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "prometheus-blackbox_exporter-0.24.0-150000.1.23.3.ppc64le as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:prometheus-blackbox_exporter-0.24.0-150000.1.23.3.ppc64le"
},
"product_reference": "prometheus-blackbox_exporter-0.24.0-150000.1.23.3.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "prometheus-blackbox_exporter-0.24.0-150000.1.23.3.s390x as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:prometheus-blackbox_exporter-0.24.0-150000.1.23.3.s390x"
},
"product_reference": "prometheus-blackbox_exporter-0.24.0-150000.1.23.3.s390x",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "prometheus-blackbox_exporter-0.24.0-150000.1.23.3.x86_64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:prometheus-blackbox_exporter-0.24.0-150000.1.23.3.x86_64"
},
"product_reference": "prometheus-blackbox_exporter-0.24.0-150000.1.23.3.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "prometheus-postgres_exporter-0.10.1-150000.1.14.3.aarch64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:prometheus-postgres_exporter-0.10.1-150000.1.14.3.aarch64"
},
"product_reference": "prometheus-postgres_exporter-0.10.1-150000.1.14.3.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "prometheus-postgres_exporter-0.10.1-150000.1.14.3.ppc64le as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:prometheus-postgres_exporter-0.10.1-150000.1.14.3.ppc64le"
},
"product_reference": "prometheus-postgres_exporter-0.10.1-150000.1.14.3.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "prometheus-postgres_exporter-0.10.1-150000.1.14.3.s390x as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:prometheus-postgres_exporter-0.10.1-150000.1.14.3.s390x"
},
"product_reference": "prometheus-postgres_exporter-0.10.1-150000.1.14.3.s390x",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "prometheus-postgres_exporter-0.10.1-150000.1.14.3.x86_64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:prometheus-postgres_exporter-0.10.1-150000.1.14.3.x86_64"
},
"product_reference": "prometheus-postgres_exporter-0.10.1-150000.1.14.3.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "spacecmd-4.3.23-150000.3.104.2.noarch as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:spacecmd-4.3.23-150000.3.104.2.noarch"
},
"product_reference": "spacecmd-4.3.23-150000.3.104.2.noarch",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "supportutils-plugin-susemanager-client-4.3.3-150000.3.21.2.noarch as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:supportutils-plugin-susemanager-client-4.3.3-150000.3.21.2.noarch"
},
"product_reference": "supportutils-plugin-susemanager-client-4.3.3-150000.3.21.2.noarch",
"relates_to_product_reference": "openSUSE Leap 15.5"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2022-32149",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-32149"
}
],
"notes": [
{
"category": "general",
"text": "An attacker may cause a denial of service by crafting an Accept-Language header which ParseAcceptLanguage will take significant time to parse.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Manager Client Tools 15:firewalld-prometheus-config-0.1-150000.3.50.3.aarch64",
"SUSE Manager Client Tools 15:firewalld-prometheus-config-0.1-150000.3.50.3.ppc64le",
"SUSE Manager Client Tools 15:firewalld-prometheus-config-0.1-150000.3.50.3.s390x",
"SUSE Manager Client Tools 15:firewalld-prometheus-config-0.1-150000.3.50.3.x86_64",
"SUSE Manager Client Tools 15:golang-github-QubitProducts-exporter_exporter-0.4.0-150000.1.18.3.aarch64",
"SUSE Manager Client Tools 15:golang-github-QubitProducts-exporter_exporter-0.4.0-150000.1.18.3.ppc64le",
"SUSE Manager Client Tools 15:golang-github-QubitProducts-exporter_exporter-0.4.0-150000.1.18.3.s390x",
"SUSE Manager Client Tools 15:golang-github-QubitProducts-exporter_exporter-0.4.0-150000.1.18.3.x86_64",
"SUSE Manager Client Tools 15:golang-github-lusitaniae-apache_exporter-1.0.0-150000.1.17.2.aarch64",
"SUSE Manager Client Tools 15:golang-github-lusitaniae-apache_exporter-1.0.0-150000.1.17.2.ppc64le",
"SUSE Manager Client Tools 15:golang-github-lusitaniae-apache_exporter-1.0.0-150000.1.17.2.s390x",
"SUSE Manager Client Tools 15:golang-github-lusitaniae-apache_exporter-1.0.0-150000.1.17.2.x86_64",
"SUSE Manager Client Tools 15:golang-github-prometheus-prometheus-2.45.0-150000.3.50.3.aarch64",
"SUSE Manager Client Tools 15:golang-github-prometheus-prometheus-2.45.0-150000.3.50.3.ppc64le",
"SUSE Manager Client Tools 15:golang-github-prometheus-prometheus-2.45.0-150000.3.50.3.s390x",
"SUSE Manager Client Tools 15:golang-github-prometheus-prometheus-2.45.0-150000.3.50.3.x86_64",
"SUSE Manager Client Tools 15:grafana-9.5.5-150000.1.54.3.aarch64",
"SUSE Manager Client Tools 15:grafana-9.5.5-150000.1.54.3.ppc64le",
"SUSE Manager Client Tools 15:grafana-9.5.5-150000.1.54.3.s390x",
"SUSE Manager Client Tools 15:grafana-9.5.5-150000.1.54.3.x86_64",
"SUSE Manager Client Tools 15:prometheus-blackbox_exporter-0.24.0-150000.1.23.3.aarch64",
"SUSE Manager Client Tools 15:prometheus-blackbox_exporter-0.24.0-150000.1.23.3.ppc64le",
"SUSE Manager Client Tools 15:prometheus-blackbox_exporter-0.24.0-150000.1.23.3.s390x",
"SUSE Manager Client Tools 15:prometheus-blackbox_exporter-0.24.0-150000.1.23.3.x86_64",
"SUSE Manager Client Tools 15:prometheus-postgres_exporter-0.10.1-150000.1.14.3.aarch64",
"SUSE Manager Client Tools 15:prometheus-postgres_exporter-0.10.1-150000.1.14.3.ppc64le",
"SUSE Manager Client Tools 15:prometheus-postgres_exporter-0.10.1-150000.1.14.3.s390x",
"SUSE Manager Client Tools 15:prometheus-postgres_exporter-0.10.1-150000.1.14.3.x86_64",
"SUSE Manager Client Tools 15:python3-pyvmomi-6.7.3-150000.1.6.2.noarch",
"SUSE Manager Client Tools 15:python3-uyuni-common-libs-4.3.9-150000.1.36.2.aarch64",
"SUSE Manager Client Tools 15:python3-uyuni-common-libs-4.3.9-150000.1.36.2.ppc64le",
"SUSE Manager Client Tools 15:python3-uyuni-common-libs-4.3.9-150000.1.36.2.s390x",
"SUSE Manager Client Tools 15:python3-uyuni-common-libs-4.3.9-150000.1.36.2.x86_64",
"SUSE Manager Client Tools 15:spacecmd-4.3.23-150000.3.104.2.noarch",
"SUSE Manager Client Tools 15:supportutils-plugin-susemanager-client-4.3.3-150000.3.21.2.noarch",
"SUSE Manager Client Tools for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-150000.1.18.3.aarch64",
"SUSE Manager Client Tools for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-150000.1.18.3.s390x",
"SUSE Manager Client Tools for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-150000.1.18.3.x86_64",
"SUSE Manager Client Tools for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-150000.1.23.3.aarch64",
"SUSE Manager Client Tools for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-150000.1.23.3.s390x",
"SUSE Manager Client Tools for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-150000.1.23.3.x86_64",
"SUSE Manager Proxy Module 4.2:golang-github-QubitProducts-exporter_exporter-0.4.0-150000.1.18.3.aarch64",
"SUSE Manager Proxy Module 4.2:golang-github-QubitProducts-exporter_exporter-0.4.0-150000.1.18.3.ppc64le",
"SUSE Manager Proxy Module 4.2:golang-github-QubitProducts-exporter_exporter-0.4.0-150000.1.18.3.s390x",
"SUSE Manager Proxy Module 4.2:golang-github-QubitProducts-exporter_exporter-0.4.0-150000.1.18.3.x86_64",
"SUSE Manager Proxy Module 4.2:golang-github-lusitaniae-apache_exporter-1.0.0-150000.1.17.2.aarch64",
"SUSE Manager Proxy Module 4.2:golang-github-lusitaniae-apache_exporter-1.0.0-150000.1.17.2.ppc64le",
"SUSE Manager Proxy Module 4.2:golang-github-lusitaniae-apache_exporter-1.0.0-150000.1.17.2.s390x",
"SUSE Manager Proxy Module 4.2:golang-github-lusitaniae-apache_exporter-1.0.0-150000.1.17.2.x86_64",
"SUSE Manager Proxy Module 4.2:prometheus-blackbox_exporter-0.24.0-150000.1.23.3.aarch64",
"SUSE Manager Proxy Module 4.2:prometheus-blackbox_exporter-0.24.0-150000.1.23.3.ppc64le",
"SUSE Manager Proxy Module 4.2:prometheus-blackbox_exporter-0.24.0-150000.1.23.3.s390x",
"SUSE Manager Proxy Module 4.2:prometheus-blackbox_exporter-0.24.0-150000.1.23.3.x86_64",
"SUSE Manager Proxy Module 4.3:golang-github-QubitProducts-exporter_exporter-0.4.0-150000.1.18.3.aarch64",
"SUSE Manager Proxy Module 4.3:golang-github-QubitProducts-exporter_exporter-0.4.0-150000.1.18.3.ppc64le",
"SUSE Manager Proxy Module 4.3:golang-github-QubitProducts-exporter_exporter-0.4.0-150000.1.18.3.s390x",
"SUSE Manager Proxy Module 4.3:golang-github-QubitProducts-exporter_exporter-0.4.0-150000.1.18.3.x86_64",
"SUSE Manager Proxy Module 4.3:golang-github-lusitaniae-apache_exporter-1.0.0-150000.1.17.2.aarch64",
"SUSE Manager Proxy Module 4.3:golang-github-lusitaniae-apache_exporter-1.0.0-150000.1.17.2.ppc64le",
"SUSE Manager Proxy Module 4.3:golang-github-lusitaniae-apache_exporter-1.0.0-150000.1.17.2.s390x",
"SUSE Manager Proxy Module 4.3:golang-github-lusitaniae-apache_exporter-1.0.0-150000.1.17.2.x86_64",
"SUSE Manager Proxy Module 4.3:prometheus-blackbox_exporter-0.24.0-150000.1.23.3.aarch64",
"SUSE Manager Proxy Module 4.3:prometheus-blackbox_exporter-0.24.0-150000.1.23.3.ppc64le",
"SUSE Manager Proxy Module 4.3:prometheus-blackbox_exporter-0.24.0-150000.1.23.3.s390x",
"SUSE Manager Proxy Module 4.3:prometheus-blackbox_exporter-0.24.0-150000.1.23.3.x86_64",
"SUSE Manager Server Module 4.2:golang-github-QubitProducts-exporter_exporter-0.4.0-150000.1.18.3.aarch64",
"SUSE Manager Server Module 4.2:golang-github-QubitProducts-exporter_exporter-0.4.0-150000.1.18.3.ppc64le",
"SUSE Manager Server Module 4.2:golang-github-QubitProducts-exporter_exporter-0.4.0-150000.1.18.3.s390x",
"SUSE Manager Server Module 4.2:golang-github-QubitProducts-exporter_exporter-0.4.0-150000.1.18.3.x86_64",
"SUSE Manager Server Module 4.2:golang-github-lusitaniae-apache_exporter-1.0.0-150000.1.17.2.aarch64",
"SUSE Manager Server Module 4.2:golang-github-lusitaniae-apache_exporter-1.0.0-150000.1.17.2.ppc64le",
"SUSE Manager Server Module 4.2:golang-github-lusitaniae-apache_exporter-1.0.0-150000.1.17.2.s390x",
"SUSE Manager Server Module 4.2:golang-github-lusitaniae-apache_exporter-1.0.0-150000.1.17.2.x86_64",
"SUSE Manager Server Module 4.2:prometheus-postgres_exporter-0.10.1-150000.1.14.3.aarch64",
"SUSE Manager Server Module 4.2:prometheus-postgres_exporter-0.10.1-150000.1.14.3.ppc64le",
"SUSE Manager Server Module 4.2:prometheus-postgres_exporter-0.10.1-150000.1.14.3.s390x",
"SUSE Manager Server Module 4.2:prometheus-postgres_exporter-0.10.1-150000.1.14.3.x86_64",
"SUSE Manager Server Module 4.3:golang-github-QubitProducts-exporter_exporter-0.4.0-150000.1.18.3.aarch64",
"SUSE Manager Server Module 4.3:golang-github-QubitProducts-exporter_exporter-0.4.0-150000.1.18.3.ppc64le",
"SUSE Manager Server Module 4.3:golang-github-QubitProducts-exporter_exporter-0.4.0-150000.1.18.3.s390x",
"SUSE Manager Server Module 4.3:golang-github-QubitProducts-exporter_exporter-0.4.0-150000.1.18.3.x86_64",
"SUSE Manager Server Module 4.3:golang-github-lusitaniae-apache_exporter-1.0.0-150000.1.17.2.aarch64",
"SUSE Manager Server Module 4.3:golang-github-lusitaniae-apache_exporter-1.0.0-150000.1.17.2.ppc64le",
"SUSE Manager Server Module 4.3:golang-github-lusitaniae-apache_exporter-1.0.0-150000.1.17.2.s390x",
"SUSE Manager Server Module 4.3:golang-github-lusitaniae-apache_exporter-1.0.0-150000.1.17.2.x86_64",
"openSUSE Leap 15.4:golang-github-QubitProducts-exporter_exporter-0.4.0-150000.1.18.3.aarch64",
"openSUSE Leap 15.4:golang-github-QubitProducts-exporter_exporter-0.4.0-150000.1.18.3.ppc64le",
"openSUSE Leap 15.4:golang-github-QubitProducts-exporter_exporter-0.4.0-150000.1.18.3.s390x",
"openSUSE Leap 15.4:golang-github-QubitProducts-exporter_exporter-0.4.0-150000.1.18.3.x86_64",
"openSUSE Leap 15.4:golang-github-lusitaniae-apache_exporter-1.0.0-150000.1.17.2.aarch64",
"openSUSE Leap 15.4:golang-github-lusitaniae-apache_exporter-1.0.0-150000.1.17.2.ppc64le",
"openSUSE Leap 15.4:golang-github-lusitaniae-apache_exporter-1.0.0-150000.1.17.2.s390x",
"openSUSE Leap 15.4:golang-github-lusitaniae-apache_exporter-1.0.0-150000.1.17.2.x86_64",
"openSUSE Leap 15.4:prometheus-blackbox_exporter-0.24.0-150000.1.23.3.aarch64",
"openSUSE Leap 15.4:prometheus-blackbox_exporter-0.24.0-150000.1.23.3.ppc64le",
"openSUSE Leap 15.4:prometheus-blackbox_exporter-0.24.0-150000.1.23.3.s390x",
"openSUSE Leap 15.4:prometheus-blackbox_exporter-0.24.0-150000.1.23.3.x86_64",
"openSUSE Leap 15.4:prometheus-postgres_exporter-0.10.1-150000.1.14.3.aarch64",
"openSUSE Leap 15.4:prometheus-postgres_exporter-0.10.1-150000.1.14.3.ppc64le",
"openSUSE Leap 15.4:prometheus-postgres_exporter-0.10.1-150000.1.14.3.s390x",
"openSUSE Leap 15.4:prometheus-postgres_exporter-0.10.1-150000.1.14.3.x86_64",
"openSUSE Leap 15.4:spacecmd-4.3.23-150000.3.104.2.noarch",
"openSUSE Leap 15.4:supportutils-plugin-susemanager-client-4.3.3-150000.3.21.2.noarch",
"openSUSE Leap 15.5:golang-github-QubitProducts-exporter_exporter-0.4.0-150000.1.18.3.aarch64",
"openSUSE Leap 15.5:golang-github-QubitProducts-exporter_exporter-0.4.0-150000.1.18.3.ppc64le",
"openSUSE Leap 15.5:golang-github-QubitProducts-exporter_exporter-0.4.0-150000.1.18.3.s390x",
"openSUSE Leap 15.5:golang-github-QubitProducts-exporter_exporter-0.4.0-150000.1.18.3.x86_64",
"openSUSE Leap 15.5:golang-github-lusitaniae-apache_exporter-1.0.0-150000.1.17.2.aarch64",
"openSUSE Leap 15.5:golang-github-lusitaniae-apache_exporter-1.0.0-150000.1.17.2.ppc64le",
"openSUSE Leap 15.5:golang-github-lusitaniae-apache_exporter-1.0.0-150000.1.17.2.s390x",
"openSUSE Leap 15.5:golang-github-lusitaniae-apache_exporter-1.0.0-150000.1.17.2.x86_64",
"openSUSE Leap 15.5:prometheus-blackbox_exporter-0.24.0-150000.1.23.3.aarch64",
"openSUSE Leap 15.5:prometheus-blackbox_exporter-0.24.0-150000.1.23.3.ppc64le",
"openSUSE Leap 15.5:prometheus-blackbox_exporter-0.24.0-150000.1.23.3.s390x",
"openSUSE Leap 15.5:prometheus-blackbox_exporter-0.24.0-150000.1.23.3.x86_64",
"openSUSE Leap 15.5:prometheus-postgres_exporter-0.10.1-150000.1.14.3.aarch64",
"openSUSE Leap 15.5:prometheus-postgres_exporter-0.10.1-150000.1.14.3.ppc64le",
"openSUSE Leap 15.5:prometheus-postgres_exporter-0.10.1-150000.1.14.3.s390x",
"openSUSE Leap 15.5:prometheus-postgres_exporter-0.10.1-150000.1.14.3.x86_64",
"openSUSE Leap 15.5:spacecmd-4.3.23-150000.3.104.2.noarch",
"openSUSE Leap 15.5:supportutils-plugin-susemanager-client-4.3.3-150000.3.21.2.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-32149",
"url": "https://www.suse.com/security/cve/CVE-2022-32149"
},
{
"category": "external",
"summary": "SUSE Bug 1204501 for CVE-2022-32149",
"url": "https://bugzilla.suse.com/1204501"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Manager Client Tools 15:firewalld-prometheus-config-0.1-150000.3.50.3.aarch64",
"SUSE Manager Client Tools 15:firewalld-prometheus-config-0.1-150000.3.50.3.ppc64le",
"SUSE Manager Client Tools 15:firewalld-prometheus-config-0.1-150000.3.50.3.s390x",
"SUSE Manager Client Tools 15:firewalld-prometheus-config-0.1-150000.3.50.3.x86_64",
"SUSE Manager Client Tools 15:golang-github-QubitProducts-exporter_exporter-0.4.0-150000.1.18.3.aarch64",
"SUSE Manager Client Tools 15:golang-github-QubitProducts-exporter_exporter-0.4.0-150000.1.18.3.ppc64le",
"SUSE Manager Client Tools 15:golang-github-QubitProducts-exporter_exporter-0.4.0-150000.1.18.3.s390x",
"SUSE Manager Client Tools 15:golang-github-QubitProducts-exporter_exporter-0.4.0-150000.1.18.3.x86_64",
"SUSE Manager Client Tools 15:golang-github-lusitaniae-apache_exporter-1.0.0-150000.1.17.2.aarch64",
"SUSE Manager Client Tools 15:golang-github-lusitaniae-apache_exporter-1.0.0-150000.1.17.2.ppc64le",
"SUSE Manager Client Tools 15:golang-github-lusitaniae-apache_exporter-1.0.0-150000.1.17.2.s390x",
"SUSE Manager Client Tools 15:golang-github-lusitaniae-apache_exporter-1.0.0-150000.1.17.2.x86_64",
"SUSE Manager Client Tools 15:golang-github-prometheus-prometheus-2.45.0-150000.3.50.3.aarch64",
"SUSE Manager Client Tools 15:golang-github-prometheus-prometheus-2.45.0-150000.3.50.3.ppc64le",
"SUSE Manager Client Tools 15:golang-github-prometheus-prometheus-2.45.0-150000.3.50.3.s390x",
"SUSE Manager Client Tools 15:golang-github-prometheus-prometheus-2.45.0-150000.3.50.3.x86_64",
"SUSE Manager Client Tools 15:grafana-9.5.5-150000.1.54.3.aarch64",
"SUSE Manager Client Tools 15:grafana-9.5.5-150000.1.54.3.ppc64le",
"SUSE Manager Client Tools 15:grafana-9.5.5-150000.1.54.3.s390x",
"SUSE Manager Client Tools 15:grafana-9.5.5-150000.1.54.3.x86_64",
"SUSE Manager Client Tools 15:prometheus-blackbox_exporter-0.24.0-150000.1.23.3.aarch64",
"SUSE Manager Client Tools 15:prometheus-blackbox_exporter-0.24.0-150000.1.23.3.ppc64le",
"SUSE Manager Client Tools 15:prometheus-blackbox_exporter-0.24.0-150000.1.23.3.s390x",
"SUSE Manager Client Tools 15:prometheus-blackbox_exporter-0.24.0-150000.1.23.3.x86_64",
"SUSE Manager Client Tools 15:prometheus-postgres_exporter-0.10.1-150000.1.14.3.aarch64",
"SUSE Manager Client Tools 15:prometheus-postgres_exporter-0.10.1-150000.1.14.3.ppc64le",
"SUSE Manager Client Tools 15:prometheus-postgres_exporter-0.10.1-150000.1.14.3.s390x",
"SUSE Manager Client Tools 15:prometheus-postgres_exporter-0.10.1-150000.1.14.3.x86_64",
"SUSE Manager Client Tools 15:python3-pyvmomi-6.7.3-150000.1.6.2.noarch",
"SUSE Manager Client Tools 15:python3-uyuni-common-libs-4.3.9-150000.1.36.2.aarch64",
"SUSE Manager Client Tools 15:python3-uyuni-common-libs-4.3.9-150000.1.36.2.ppc64le",
"SUSE Manager Client Tools 15:python3-uyuni-common-libs-4.3.9-150000.1.36.2.s390x",
"SUSE Manager Client Tools 15:python3-uyuni-common-libs-4.3.9-150000.1.36.2.x86_64",
"SUSE Manager Client Tools 15:spacecmd-4.3.23-150000.3.104.2.noarch",
"SUSE Manager Client Tools 15:supportutils-plugin-susemanager-client-4.3.3-150000.3.21.2.noarch",
"SUSE Manager Client Tools for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-150000.1.18.3.aarch64",
"SUSE Manager Client Tools for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-150000.1.18.3.s390x",
"SUSE Manager Client Tools for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-150000.1.18.3.x86_64",
"SUSE Manager Client Tools for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-150000.1.23.3.aarch64",
"SUSE Manager Client Tools for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-150000.1.23.3.s390x",
"SUSE Manager Client Tools for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-150000.1.23.3.x86_64",
"SUSE Manager Proxy Module 4.2:golang-github-QubitProducts-exporter_exporter-0.4.0-150000.1.18.3.aarch64",
"SUSE Manager Proxy Module 4.2:golang-github-QubitProducts-exporter_exporter-0.4.0-150000.1.18.3.ppc64le",
"SUSE Manager Proxy Module 4.2:golang-github-QubitProducts-exporter_exporter-0.4.0-150000.1.18.3.s390x",
"SUSE Manager Proxy Module 4.2:golang-github-QubitProducts-exporter_exporter-0.4.0-150000.1.18.3.x86_64",
"SUSE Manager Proxy Module 4.2:golang-github-lusitaniae-apache_exporter-1.0.0-150000.1.17.2.aarch64",
"SUSE Manager Proxy Module 4.2:golang-github-lusitaniae-apache_exporter-1.0.0-150000.1.17.2.ppc64le",
"SUSE Manager Proxy Module 4.2:golang-github-lusitaniae-apache_exporter-1.0.0-150000.1.17.2.s390x",
"SUSE Manager Proxy Module 4.2:golang-github-lusitaniae-apache_exporter-1.0.0-150000.1.17.2.x86_64",
"SUSE Manager Proxy Module 4.2:prometheus-blackbox_exporter-0.24.0-150000.1.23.3.aarch64",
"SUSE Manager Proxy Module 4.2:prometheus-blackbox_exporter-0.24.0-150000.1.23.3.ppc64le",
"SUSE Manager Proxy Module 4.2:prometheus-blackbox_exporter-0.24.0-150000.1.23.3.s390x",
"SUSE Manager Proxy Module 4.2:prometheus-blackbox_exporter-0.24.0-150000.1.23.3.x86_64",
"SUSE Manager Proxy Module 4.3:golang-github-QubitProducts-exporter_exporter-0.4.0-150000.1.18.3.aarch64",
"SUSE Manager Proxy Module 4.3:golang-github-QubitProducts-exporter_exporter-0.4.0-150000.1.18.3.ppc64le",
"SUSE Manager Proxy Module 4.3:golang-github-QubitProducts-exporter_exporter-0.4.0-150000.1.18.3.s390x",
"SUSE Manager Proxy Module 4.3:golang-github-QubitProducts-exporter_exporter-0.4.0-150000.1.18.3.x86_64",
"SUSE Manager Proxy Module 4.3:golang-github-lusitaniae-apache_exporter-1.0.0-150000.1.17.2.aarch64",
"SUSE Manager Proxy Module 4.3:golang-github-lusitaniae-apache_exporter-1.0.0-150000.1.17.2.ppc64le",
"SUSE Manager Proxy Module 4.3:golang-github-lusitaniae-apache_exporter-1.0.0-150000.1.17.2.s390x",
"SUSE Manager Proxy Module 4.3:golang-github-lusitaniae-apache_exporter-1.0.0-150000.1.17.2.x86_64",
"SUSE Manager Proxy Module 4.3:prometheus-blackbox_exporter-0.24.0-150000.1.23.3.aarch64",
"SUSE Manager Proxy Module 4.3:prometheus-blackbox_exporter-0.24.0-150000.1.23.3.ppc64le",
"SUSE Manager Proxy Module 4.3:prometheus-blackbox_exporter-0.24.0-150000.1.23.3.s390x",
"SUSE Manager Proxy Module 4.3:prometheus-blackbox_exporter-0.24.0-150000.1.23.3.x86_64",
"SUSE Manager Server Module 4.2:golang-github-QubitProducts-exporter_exporter-0.4.0-150000.1.18.3.aarch64",
"SUSE Manager Server Module 4.2:golang-github-QubitProducts-exporter_exporter-0.4.0-150000.1.18.3.ppc64le",
"SUSE Manager Server Module 4.2:golang-github-QubitProducts-exporter_exporter-0.4.0-150000.1.18.3.s390x",
"SUSE Manager Server Module 4.2:golang-github-QubitProducts-exporter_exporter-0.4.0-150000.1.18.3.x86_64",
"SUSE Manager Server Module 4.2:golang-github-lusitaniae-apache_exporter-1.0.0-150000.1.17.2.aarch64",
"SUSE Manager Server Module 4.2:golang-github-lusitaniae-apache_exporter-1.0.0-150000.1.17.2.ppc64le",
"SUSE Manager Server Module 4.2:golang-github-lusitaniae-apache_exporter-1.0.0-150000.1.17.2.s390x",
"SUSE Manager Server Module 4.2:golang-github-lusitaniae-apache_exporter-1.0.0-150000.1.17.2.x86_64",
"SUSE Manager Server Module 4.2:prometheus-postgres_exporter-0.10.1-150000.1.14.3.aarch64",
"SUSE Manager Server Module 4.2:prometheus-postgres_exporter-0.10.1-150000.1.14.3.ppc64le",
"SUSE Manager Server Module 4.2:prometheus-postgres_exporter-0.10.1-150000.1.14.3.s390x",
"SUSE Manager Server Module 4.2:prometheus-postgres_exporter-0.10.1-150000.1.14.3.x86_64",
"SUSE Manager Server Module 4.3:golang-github-QubitProducts-exporter_exporter-0.4.0-150000.1.18.3.aarch64",
"SUSE Manager Server Module 4.3:golang-github-QubitProducts-exporter_exporter-0.4.0-150000.1.18.3.ppc64le",
"SUSE Manager Server Module 4.3:golang-github-QubitProducts-exporter_exporter-0.4.0-150000.1.18.3.s390x",
"SUSE Manager Server Module 4.3:golang-github-QubitProducts-exporter_exporter-0.4.0-150000.1.18.3.x86_64",
"SUSE Manager Server Module 4.3:golang-github-lusitaniae-apache_exporter-1.0.0-150000.1.17.2.aarch64",
"SUSE Manager Server Module 4.3:golang-github-lusitaniae-apache_exporter-1.0.0-150000.1.17.2.ppc64le",
"SUSE Manager Server Module 4.3:golang-github-lusitaniae-apache_exporter-1.0.0-150000.1.17.2.s390x",
"SUSE Manager Server Module 4.3:golang-github-lusitaniae-apache_exporter-1.0.0-150000.1.17.2.x86_64",
"openSUSE Leap 15.4:golang-github-QubitProducts-exporter_exporter-0.4.0-150000.1.18.3.aarch64",
"openSUSE Leap 15.4:golang-github-QubitProducts-exporter_exporter-0.4.0-150000.1.18.3.ppc64le",
"openSUSE Leap 15.4:golang-github-QubitProducts-exporter_exporter-0.4.0-150000.1.18.3.s390x",
"openSUSE Leap 15.4:golang-github-QubitProducts-exporter_exporter-0.4.0-150000.1.18.3.x86_64",
"openSUSE Leap 15.4:golang-github-lusitaniae-apache_exporter-1.0.0-150000.1.17.2.aarch64",
"openSUSE Leap 15.4:golang-github-lusitaniae-apache_exporter-1.0.0-150000.1.17.2.ppc64le",
"openSUSE Leap 15.4:golang-github-lusitaniae-apache_exporter-1.0.0-150000.1.17.2.s390x",
"openSUSE Leap 15.4:golang-github-lusitaniae-apache_exporter-1.0.0-150000.1.17.2.x86_64",
"openSUSE Leap 15.4:prometheus-blackbox_exporter-0.24.0-150000.1.23.3.aarch64",
"openSUSE Leap 15.4:prometheus-blackbox_exporter-0.24.0-150000.1.23.3.ppc64le",
"openSUSE Leap 15.4:prometheus-blackbox_exporter-0.24.0-150000.1.23.3.s390x",
"openSUSE Leap 15.4:prometheus-blackbox_exporter-0.24.0-150000.1.23.3.x86_64",
"openSUSE Leap 15.4:prometheus-postgres_exporter-0.10.1-150000.1.14.3.aarch64",
"openSUSE Leap 15.4:prometheus-postgres_exporter-0.10.1-150000.1.14.3.ppc64le",
"openSUSE Leap 15.4:prometheus-postgres_exporter-0.10.1-150000.1.14.3.s390x",
"openSUSE Leap 15.4:prometheus-postgres_exporter-0.10.1-150000.1.14.3.x86_64",
"openSUSE Leap 15.4:spacecmd-4.3.23-150000.3.104.2.noarch",
"openSUSE Leap 15.4:supportutils-plugin-susemanager-client-4.3.3-150000.3.21.2.noarch",
"openSUSE Leap 15.5:golang-github-QubitProducts-exporter_exporter-0.4.0-150000.1.18.3.aarch64",
"openSUSE Leap 15.5:golang-github-QubitProducts-exporter_exporter-0.4.0-150000.1.18.3.ppc64le",
"openSUSE Leap 15.5:golang-github-QubitProducts-exporter_exporter-0.4.0-150000.1.18.3.s390x",
"openSUSE Leap 15.5:golang-github-QubitProducts-exporter_exporter-0.4.0-150000.1.18.3.x86_64",
"openSUSE Leap 15.5:golang-github-lusitaniae-apache_exporter-1.0.0-150000.1.17.2.aarch64",
"openSUSE Leap 15.5:golang-github-lusitaniae-apache_exporter-1.0.0-150000.1.17.2.ppc64le",
"openSUSE Leap 15.5:golang-github-lusitaniae-apache_exporter-1.0.0-150000.1.17.2.s390x",
"openSUSE Leap 15.5:golang-github-lusitaniae-apache_exporter-1.0.0-150000.1.17.2.x86_64",
"openSUSE Leap 15.5:prometheus-blackbox_exporter-0.24.0-150000.1.23.3.aarch64",
"openSUSE Leap 15.5:prometheus-blackbox_exporter-0.24.0-150000.1.23.3.ppc64le",
"openSUSE Leap 15.5:prometheus-blackbox_exporter-0.24.0-150000.1.23.3.s390x",
"openSUSE Leap 15.5:prometheus-blackbox_exporter-0.24.0-150000.1.23.3.x86_64",
"openSUSE Leap 15.5:prometheus-postgres_exporter-0.10.1-150000.1.14.3.aarch64",
"openSUSE Leap 15.5:prometheus-postgres_exporter-0.10.1-150000.1.14.3.ppc64le",
"openSUSE Leap 15.5:prometheus-postgres_exporter-0.10.1-150000.1.14.3.s390x",
"openSUSE Leap 15.5:prometheus-postgres_exporter-0.10.1-150000.1.14.3.x86_64",
"openSUSE Leap 15.5:spacecmd-4.3.23-150000.3.104.2.noarch",
"openSUSE Leap 15.5:supportutils-plugin-susemanager-client-4.3.3-150000.3.21.2.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Manager Client Tools 15:firewalld-prometheus-config-0.1-150000.3.50.3.aarch64",
"SUSE Manager Client Tools 15:firewalld-prometheus-config-0.1-150000.3.50.3.ppc64le",
"SUSE Manager Client Tools 15:firewalld-prometheus-config-0.1-150000.3.50.3.s390x",
"SUSE Manager Client Tools 15:firewalld-prometheus-config-0.1-150000.3.50.3.x86_64",
"SUSE Manager Client Tools 15:golang-github-QubitProducts-exporter_exporter-0.4.0-150000.1.18.3.aarch64",
"SUSE Manager Client Tools 15:golang-github-QubitProducts-exporter_exporter-0.4.0-150000.1.18.3.ppc64le",
"SUSE Manager Client Tools 15:golang-github-QubitProducts-exporter_exporter-0.4.0-150000.1.18.3.s390x",
"SUSE Manager Client Tools 15:golang-github-QubitProducts-exporter_exporter-0.4.0-150000.1.18.3.x86_64",
"SUSE Manager Client Tools 15:golang-github-lusitaniae-apache_exporter-1.0.0-150000.1.17.2.aarch64",
"SUSE Manager Client Tools 15:golang-github-lusitaniae-apache_exporter-1.0.0-150000.1.17.2.ppc64le",
"SUSE Manager Client Tools 15:golang-github-lusitaniae-apache_exporter-1.0.0-150000.1.17.2.s390x",
"SUSE Manager Client Tools 15:golang-github-lusitaniae-apache_exporter-1.0.0-150000.1.17.2.x86_64",
"SUSE Manager Client Tools 15:golang-github-prometheus-prometheus-2.45.0-150000.3.50.3.aarch64",
"SUSE Manager Client Tools 15:golang-github-prometheus-prometheus-2.45.0-150000.3.50.3.ppc64le",
"SUSE Manager Client Tools 15:golang-github-prometheus-prometheus-2.45.0-150000.3.50.3.s390x",
"SUSE Manager Client Tools 15:golang-github-prometheus-prometheus-2.45.0-150000.3.50.3.x86_64",
"SUSE Manager Client Tools 15:grafana-9.5.5-150000.1.54.3.aarch64",
"SUSE Manager Client Tools 15:grafana-9.5.5-150000.1.54.3.ppc64le",
"SUSE Manager Client Tools 15:grafana-9.5.5-150000.1.54.3.s390x",
"SUSE Manager Client Tools 15:grafana-9.5.5-150000.1.54.3.x86_64",
"SUSE Manager Client Tools 15:prometheus-blackbox_exporter-0.24.0-150000.1.23.3.aarch64",
"SUSE Manager Client Tools 15:prometheus-blackbox_exporter-0.24.0-150000.1.23.3.ppc64le",
"SUSE Manager Client Tools 15:prometheus-blackbox_exporter-0.24.0-150000.1.23.3.s390x",
"SUSE Manager Client Tools 15:prometheus-blackbox_exporter-0.24.0-150000.1.23.3.x86_64",
"SUSE Manager Client Tools 15:prometheus-postgres_exporter-0.10.1-150000.1.14.3.aarch64",
"SUSE Manager Client Tools 15:prometheus-postgres_exporter-0.10.1-150000.1.14.3.ppc64le",
"SUSE Manager Client Tools 15:prometheus-postgres_exporter-0.10.1-150000.1.14.3.s390x",
"SUSE Manager Client Tools 15:prometheus-postgres_exporter-0.10.1-150000.1.14.3.x86_64",
"SUSE Manager Client Tools 15:python3-pyvmomi-6.7.3-150000.1.6.2.noarch",
"SUSE Manager Client Tools 15:python3-uyuni-common-libs-4.3.9-150000.1.36.2.aarch64",
"SUSE Manager Client Tools 15:python3-uyuni-common-libs-4.3.9-150000.1.36.2.ppc64le",
"SUSE Manager Client Tools 15:python3-uyuni-common-libs-4.3.9-150000.1.36.2.s390x",
"SUSE Manager Client Tools 15:python3-uyuni-common-libs-4.3.9-150000.1.36.2.x86_64",
"SUSE Manager Client Tools 15:spacecmd-4.3.23-150000.3.104.2.noarch",
"SUSE Manager Client Tools 15:supportutils-plugin-susemanager-client-4.3.3-150000.3.21.2.noarch",
"SUSE Manager Client Tools for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-150000.1.18.3.aarch64",
"SUSE Manager Client Tools for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-150000.1.18.3.s390x",
"SUSE Manager Client Tools for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-150000.1.18.3.x86_64",
"SUSE Manager Client Tools for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-150000.1.23.3.aarch64",
"SUSE Manager Client Tools for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-150000.1.23.3.s390x",
"SUSE Manager Client Tools for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-150000.1.23.3.x86_64",
"SUSE Manager Proxy Module 4.2:golang-github-QubitProducts-exporter_exporter-0.4.0-150000.1.18.3.aarch64",
"SUSE Manager Proxy Module 4.2:golang-github-QubitProducts-exporter_exporter-0.4.0-150000.1.18.3.ppc64le",
"SUSE Manager Proxy Module 4.2:golang-github-QubitProducts-exporter_exporter-0.4.0-150000.1.18.3.s390x",
"SUSE Manager Proxy Module 4.2:golang-github-QubitProducts-exporter_exporter-0.4.0-150000.1.18.3.x86_64",
"SUSE Manager Proxy Module 4.2:golang-github-lusitaniae-apache_exporter-1.0.0-150000.1.17.2.aarch64",
"SUSE Manager Proxy Module 4.2:golang-github-lusitaniae-apache_exporter-1.0.0-150000.1.17.2.ppc64le",
"SUSE Manager Proxy Module 4.2:golang-github-lusitaniae-apache_exporter-1.0.0-150000.1.17.2.s390x",
"SUSE Manager Proxy Module 4.2:golang-github-lusitaniae-apache_exporter-1.0.0-150000.1.17.2.x86_64",
"SUSE Manager Proxy Module 4.2:prometheus-blackbox_exporter-0.24.0-150000.1.23.3.aarch64",
"SUSE Manager Proxy Module 4.2:prometheus-blackbox_exporter-0.24.0-150000.1.23.3.ppc64le",
"SUSE Manager Proxy Module 4.2:prometheus-blackbox_exporter-0.24.0-150000.1.23.3.s390x",
"SUSE Manager Proxy Module 4.2:prometheus-blackbox_exporter-0.24.0-150000.1.23.3.x86_64",
"SUSE Manager Proxy Module 4.3:golang-github-QubitProducts-exporter_exporter-0.4.0-150000.1.18.3.aarch64",
"SUSE Manager Proxy Module 4.3:golang-github-QubitProducts-exporter_exporter-0.4.0-150000.1.18.3.ppc64le",
"SUSE Manager Proxy Module 4.3:golang-github-QubitProducts-exporter_exporter-0.4.0-150000.1.18.3.s390x",
"SUSE Manager Proxy Module 4.3:golang-github-QubitProducts-exporter_exporter-0.4.0-150000.1.18.3.x86_64",
"SUSE Manager Proxy Module 4.3:golang-github-lusitaniae-apache_exporter-1.0.0-150000.1.17.2.aarch64",
"SUSE Manager Proxy Module 4.3:golang-github-lusitaniae-apache_exporter-1.0.0-150000.1.17.2.ppc64le",
"SUSE Manager Proxy Module 4.3:golang-github-lusitaniae-apache_exporter-1.0.0-150000.1.17.2.s390x",
"SUSE Manager Proxy Module 4.3:golang-github-lusitaniae-apache_exporter-1.0.0-150000.1.17.2.x86_64",
"SUSE Manager Proxy Module 4.3:prometheus-blackbox_exporter-0.24.0-150000.1.23.3.aarch64",
"SUSE Manager Proxy Module 4.3:prometheus-blackbox_exporter-0.24.0-150000.1.23.3.ppc64le",
"SUSE Manager Proxy Module 4.3:prometheus-blackbox_exporter-0.24.0-150000.1.23.3.s390x",
"SUSE Manager Proxy Module 4.3:prometheus-blackbox_exporter-0.24.0-150000.1.23.3.x86_64",
"SUSE Manager Server Module 4.2:golang-github-QubitProducts-exporter_exporter-0.4.0-150000.1.18.3.aarch64",
"SUSE Manager Server Module 4.2:golang-github-QubitProducts-exporter_exporter-0.4.0-150000.1.18.3.ppc64le",
"SUSE Manager Server Module 4.2:golang-github-QubitProducts-exporter_exporter-0.4.0-150000.1.18.3.s390x",
"SUSE Manager Server Module 4.2:golang-github-QubitProducts-exporter_exporter-0.4.0-150000.1.18.3.x86_64",
"SUSE Manager Server Module 4.2:golang-github-lusitaniae-apache_exporter-1.0.0-150000.1.17.2.aarch64",
"SUSE Manager Server Module 4.2:golang-github-lusitaniae-apache_exporter-1.0.0-150000.1.17.2.ppc64le",
"SUSE Manager Server Module 4.2:golang-github-lusitaniae-apache_exporter-1.0.0-150000.1.17.2.s390x",
"SUSE Manager Server Module 4.2:golang-github-lusitaniae-apache_exporter-1.0.0-150000.1.17.2.x86_64",
"SUSE Manager Server Module 4.2:prometheus-postgres_exporter-0.10.1-150000.1.14.3.aarch64",
"SUSE Manager Server Module 4.2:prometheus-postgres_exporter-0.10.1-150000.1.14.3.ppc64le",
"SUSE Manager Server Module 4.2:prometheus-postgres_exporter-0.10.1-150000.1.14.3.s390x",
"SUSE Manager Server Module 4.2:prometheus-postgres_exporter-0.10.1-150000.1.14.3.x86_64",
"SUSE Manager Server Module 4.3:golang-github-QubitProducts-exporter_exporter-0.4.0-150000.1.18.3.aarch64",
"SUSE Manager Server Module 4.3:golang-github-QubitProducts-exporter_exporter-0.4.0-150000.1.18.3.ppc64le",
"SUSE Manager Server Module 4.3:golang-github-QubitProducts-exporter_exporter-0.4.0-150000.1.18.3.s390x",
"SUSE Manager Server Module 4.3:golang-github-QubitProducts-exporter_exporter-0.4.0-150000.1.18.3.x86_64",
"SUSE Manager Server Module 4.3:golang-github-lusitaniae-apache_exporter-1.0.0-150000.1.17.2.aarch64",
"SUSE Manager Server Module 4.3:golang-github-lusitaniae-apache_exporter-1.0.0-150000.1.17.2.ppc64le",
"SUSE Manager Server Module 4.3:golang-github-lusitaniae-apache_exporter-1.0.0-150000.1.17.2.s390x",
"SUSE Manager Server Module 4.3:golang-github-lusitaniae-apache_exporter-1.0.0-150000.1.17.2.x86_64",
"openSUSE Leap 15.4:golang-github-QubitProducts-exporter_exporter-0.4.0-150000.1.18.3.aarch64",
"openSUSE Leap 15.4:golang-github-QubitProducts-exporter_exporter-0.4.0-150000.1.18.3.ppc64le",
"openSUSE Leap 15.4:golang-github-QubitProducts-exporter_exporter-0.4.0-150000.1.18.3.s390x",
"openSUSE Leap 15.4:golang-github-QubitProducts-exporter_exporter-0.4.0-150000.1.18.3.x86_64",
"openSUSE Leap 15.4:golang-github-lusitaniae-apache_exporter-1.0.0-150000.1.17.2.aarch64",
"openSUSE Leap 15.4:golang-github-lusitaniae-apache_exporter-1.0.0-150000.1.17.2.ppc64le",
"openSUSE Leap 15.4:golang-github-lusitaniae-apache_exporter-1.0.0-150000.1.17.2.s390x",
"openSUSE Leap 15.4:golang-github-lusitaniae-apache_exporter-1.0.0-150000.1.17.2.x86_64",
"openSUSE Leap 15.4:prometheus-blackbox_exporter-0.24.0-150000.1.23.3.aarch64",
"openSUSE Leap 15.4:prometheus-blackbox_exporter-0.24.0-150000.1.23.3.ppc64le",
"openSUSE Leap 15.4:prometheus-blackbox_exporter-0.24.0-150000.1.23.3.s390x",
"openSUSE Leap 15.4:prometheus-blackbox_exporter-0.24.0-150000.1.23.3.x86_64",
"openSUSE Leap 15.4:prometheus-postgres_exporter-0.10.1-150000.1.14.3.aarch64",
"openSUSE Leap 15.4:prometheus-postgres_exporter-0.10.1-150000.1.14.3.ppc64le",
"openSUSE Leap 15.4:prometheus-postgres_exporter-0.10.1-150000.1.14.3.s390x",
"openSUSE Leap 15.4:prometheus-postgres_exporter-0.10.1-150000.1.14.3.x86_64",
"openSUSE Leap 15.4:spacecmd-4.3.23-150000.3.104.2.noarch",
"openSUSE Leap 15.4:supportutils-plugin-susemanager-client-4.3.3-150000.3.21.2.noarch",
"openSUSE Leap 15.5:golang-github-QubitProducts-exporter_exporter-0.4.0-150000.1.18.3.aarch64",
"openSUSE Leap 15.5:golang-github-QubitProducts-exporter_exporter-0.4.0-150000.1.18.3.ppc64le",
"openSUSE Leap 15.5:golang-github-QubitProducts-exporter_exporter-0.4.0-150000.1.18.3.s390x",
"openSUSE Leap 15.5:golang-github-QubitProducts-exporter_exporter-0.4.0-150000.1.18.3.x86_64",
"openSUSE Leap 15.5:golang-github-lusitaniae-apache_exporter-1.0.0-150000.1.17.2.aarch64",
"openSUSE Leap 15.5:golang-github-lusitaniae-apache_exporter-1.0.0-150000.1.17.2.ppc64le",
"openSUSE Leap 15.5:golang-github-lusitaniae-apache_exporter-1.0.0-150000.1.17.2.s390x",
"openSUSE Leap 15.5:golang-github-lusitaniae-apache_exporter-1.0.0-150000.1.17.2.x86_64",
"openSUSE Leap 15.5:prometheus-blackbox_exporter-0.24.0-150000.1.23.3.aarch64",
"openSUSE Leap 15.5:prometheus-blackbox_exporter-0.24.0-150000.1.23.3.ppc64le",
"openSUSE Leap 15.5:prometheus-blackbox_exporter-0.24.0-150000.1.23.3.s390x",
"openSUSE Leap 15.5:prometheus-blackbox_exporter-0.24.0-150000.1.23.3.x86_64",
"openSUSE Leap 15.5:prometheus-postgres_exporter-0.10.1-150000.1.14.3.aarch64",
"openSUSE Leap 15.5:prometheus-postgres_exporter-0.10.1-150000.1.14.3.ppc64le",
"openSUSE Leap 15.5:prometheus-postgres_exporter-0.10.1-150000.1.14.3.s390x",
"openSUSE Leap 15.5:prometheus-postgres_exporter-0.10.1-150000.1.14.3.x86_64",
"openSUSE Leap 15.5:spacecmd-4.3.23-150000.3.104.2.noarch",
"openSUSE Leap 15.5:supportutils-plugin-susemanager-client-4.3.3-150000.3.21.2.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2023-09-28T11:43:24Z",
"details": "important"
}
],
"title": "CVE-2022-32149"
},
{
"cve": "CVE-2022-41723",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-41723"
}
],
"notes": [
{
"category": "general",
"text": "A maliciously crafted HTTP/2 stream could cause excessive CPU consumption in the HPACK decoder, sufficient to cause a denial of service from a small number of small requests.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Manager Client Tools 15:firewalld-prometheus-config-0.1-150000.3.50.3.aarch64",
"SUSE Manager Client Tools 15:firewalld-prometheus-config-0.1-150000.3.50.3.ppc64le",
"SUSE Manager Client Tools 15:firewalld-prometheus-config-0.1-150000.3.50.3.s390x",
"SUSE Manager Client Tools 15:firewalld-prometheus-config-0.1-150000.3.50.3.x86_64",
"SUSE Manager Client Tools 15:golang-github-QubitProducts-exporter_exporter-0.4.0-150000.1.18.3.aarch64",
"SUSE Manager Client Tools 15:golang-github-QubitProducts-exporter_exporter-0.4.0-150000.1.18.3.ppc64le",
"SUSE Manager Client Tools 15:golang-github-QubitProducts-exporter_exporter-0.4.0-150000.1.18.3.s390x",
"SUSE Manager Client Tools 15:golang-github-QubitProducts-exporter_exporter-0.4.0-150000.1.18.3.x86_64",
"SUSE Manager Client Tools 15:golang-github-lusitaniae-apache_exporter-1.0.0-150000.1.17.2.aarch64",
"SUSE Manager Client Tools 15:golang-github-lusitaniae-apache_exporter-1.0.0-150000.1.17.2.ppc64le",
"SUSE Manager Client Tools 15:golang-github-lusitaniae-apache_exporter-1.0.0-150000.1.17.2.s390x",
"SUSE Manager Client Tools 15:golang-github-lusitaniae-apache_exporter-1.0.0-150000.1.17.2.x86_64",
"SUSE Manager Client Tools 15:golang-github-prometheus-prometheus-2.45.0-150000.3.50.3.aarch64",
"SUSE Manager Client Tools 15:golang-github-prometheus-prometheus-2.45.0-150000.3.50.3.ppc64le",
"SUSE Manager Client Tools 15:golang-github-prometheus-prometheus-2.45.0-150000.3.50.3.s390x",
"SUSE Manager Client Tools 15:golang-github-prometheus-prometheus-2.45.0-150000.3.50.3.x86_64",
"SUSE Manager Client Tools 15:grafana-9.5.5-150000.1.54.3.aarch64",
"SUSE Manager Client Tools 15:grafana-9.5.5-150000.1.54.3.ppc64le",
"SUSE Manager Client Tools 15:grafana-9.5.5-150000.1.54.3.s390x",
"SUSE Manager Client Tools 15:grafana-9.5.5-150000.1.54.3.x86_64",
"SUSE Manager Client Tools 15:prometheus-blackbox_exporter-0.24.0-150000.1.23.3.aarch64",
"SUSE Manager Client Tools 15:prometheus-blackbox_exporter-0.24.0-150000.1.23.3.ppc64le",
"SUSE Manager Client Tools 15:prometheus-blackbox_exporter-0.24.0-150000.1.23.3.s390x",
"SUSE Manager Client Tools 15:prometheus-blackbox_exporter-0.24.0-150000.1.23.3.x86_64",
"SUSE Manager Client Tools 15:prometheus-postgres_exporter-0.10.1-150000.1.14.3.aarch64",
"SUSE Manager Client Tools 15:prometheus-postgres_exporter-0.10.1-150000.1.14.3.ppc64le",
"SUSE Manager Client Tools 15:prometheus-postgres_exporter-0.10.1-150000.1.14.3.s390x",
"SUSE Manager Client Tools 15:prometheus-postgres_exporter-0.10.1-150000.1.14.3.x86_64",
"SUSE Manager Client Tools 15:python3-pyvmomi-6.7.3-150000.1.6.2.noarch",
"SUSE Manager Client Tools 15:python3-uyuni-common-libs-4.3.9-150000.1.36.2.aarch64",
"SUSE Manager Client Tools 15:python3-uyuni-common-libs-4.3.9-150000.1.36.2.ppc64le",
"SUSE Manager Client Tools 15:python3-uyuni-common-libs-4.3.9-150000.1.36.2.s390x",
"SUSE Manager Client Tools 15:python3-uyuni-common-libs-4.3.9-150000.1.36.2.x86_64",
"SUSE Manager Client Tools 15:spacecmd-4.3.23-150000.3.104.2.noarch",
"SUSE Manager Client Tools 15:supportutils-plugin-susemanager-client-4.3.3-150000.3.21.2.noarch",
"SUSE Manager Client Tools for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-150000.1.18.3.aarch64",
"SUSE Manager Client Tools for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-150000.1.18.3.s390x",
"SUSE Manager Client Tools for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-150000.1.18.3.x86_64",
"SUSE Manager Client Tools for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-150000.1.23.3.aarch64",
"SUSE Manager Client Tools for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-150000.1.23.3.s390x",
"SUSE Manager Client Tools for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-150000.1.23.3.x86_64",
"SUSE Manager Proxy Module 4.2:golang-github-QubitProducts-exporter_exporter-0.4.0-150000.1.18.3.aarch64",
"SUSE Manager Proxy Module 4.2:golang-github-QubitProducts-exporter_exporter-0.4.0-150000.1.18.3.ppc64le",
"SUSE Manager Proxy Module 4.2:golang-github-QubitProducts-exporter_exporter-0.4.0-150000.1.18.3.s390x",
"SUSE Manager Proxy Module 4.2:golang-github-QubitProducts-exporter_exporter-0.4.0-150000.1.18.3.x86_64",
"SUSE Manager Proxy Module 4.2:golang-github-lusitaniae-apache_exporter-1.0.0-150000.1.17.2.aarch64",
"SUSE Manager Proxy Module 4.2:golang-github-lusitaniae-apache_exporter-1.0.0-150000.1.17.2.ppc64le",
"SUSE Manager Proxy Module 4.2:golang-github-lusitaniae-apache_exporter-1.0.0-150000.1.17.2.s390x",
"SUSE Manager Proxy Module 4.2:golang-github-lusitaniae-apache_exporter-1.0.0-150000.1.17.2.x86_64",
"SUSE Manager Proxy Module 4.2:prometheus-blackbox_exporter-0.24.0-150000.1.23.3.aarch64",
"SUSE Manager Proxy Module 4.2:prometheus-blackbox_exporter-0.24.0-150000.1.23.3.ppc64le",
"SUSE Manager Proxy Module 4.2:prometheus-blackbox_exporter-0.24.0-150000.1.23.3.s390x",
"SUSE Manager Proxy Module 4.2:prometheus-blackbox_exporter-0.24.0-150000.1.23.3.x86_64",
"SUSE Manager Proxy Module 4.3:golang-github-QubitProducts-exporter_exporter-0.4.0-150000.1.18.3.aarch64",
"SUSE Manager Proxy Module 4.3:golang-github-QubitProducts-exporter_exporter-0.4.0-150000.1.18.3.ppc64le",
"SUSE Manager Proxy Module 4.3:golang-github-QubitProducts-exporter_exporter-0.4.0-150000.1.18.3.s390x",
"SUSE Manager Proxy Module 4.3:golang-github-QubitProducts-exporter_exporter-0.4.0-150000.1.18.3.x86_64",
"SUSE Manager Proxy Module 4.3:golang-github-lusitaniae-apache_exporter-1.0.0-150000.1.17.2.aarch64",
"SUSE Manager Proxy Module 4.3:golang-github-lusitaniae-apache_exporter-1.0.0-150000.1.17.2.ppc64le",
"SUSE Manager Proxy Module 4.3:golang-github-lusitaniae-apache_exporter-1.0.0-150000.1.17.2.s390x",
"SUSE Manager Proxy Module 4.3:golang-github-lusitaniae-apache_exporter-1.0.0-150000.1.17.2.x86_64",
"SUSE Manager Proxy Module 4.3:prometheus-blackbox_exporter-0.24.0-150000.1.23.3.aarch64",
"SUSE Manager Proxy Module 4.3:prometheus-blackbox_exporter-0.24.0-150000.1.23.3.ppc64le",
"SUSE Manager Proxy Module 4.3:prometheus-blackbox_exporter-0.24.0-150000.1.23.3.s390x",
"SUSE Manager Proxy Module 4.3:prometheus-blackbox_exporter-0.24.0-150000.1.23.3.x86_64",
"SUSE Manager Server Module 4.2:golang-github-QubitProducts-exporter_exporter-0.4.0-150000.1.18.3.aarch64",
"SUSE Manager Server Module 4.2:golang-github-QubitProducts-exporter_exporter-0.4.0-150000.1.18.3.ppc64le",
"SUSE Manager Server Module 4.2:golang-github-QubitProducts-exporter_exporter-0.4.0-150000.1.18.3.s390x",
"SUSE Manager Server Module 4.2:golang-github-QubitProducts-exporter_exporter-0.4.0-150000.1.18.3.x86_64",
"SUSE Manager Server Module 4.2:golang-github-lusitaniae-apache_exporter-1.0.0-150000.1.17.2.aarch64",
"SUSE Manager Server Module 4.2:golang-github-lusitaniae-apache_exporter-1.0.0-150000.1.17.2.ppc64le",
"SUSE Manager Server Module 4.2:golang-github-lusitaniae-apache_exporter-1.0.0-150000.1.17.2.s390x",
"SUSE Manager Server Module 4.2:golang-github-lusitaniae-apache_exporter-1.0.0-150000.1.17.2.x86_64",
"SUSE Manager Server Module 4.2:prometheus-postgres_exporter-0.10.1-150000.1.14.3.aarch64",
"SUSE Manager Server Module 4.2:prometheus-postgres_exporter-0.10.1-150000.1.14.3.ppc64le",
"SUSE Manager Server Module 4.2:prometheus-postgres_exporter-0.10.1-150000.1.14.3.s390x",
"SUSE Manager Server Module 4.2:prometheus-postgres_exporter-0.10.1-150000.1.14.3.x86_64",
"SUSE Manager Server Module 4.3:golang-github-QubitProducts-exporter_exporter-0.4.0-150000.1.18.3.aarch64",
"SUSE Manager Server Module 4.3:golang-github-QubitProducts-exporter_exporter-0.4.0-150000.1.18.3.ppc64le",
"SUSE Manager Server Module 4.3:golang-github-QubitProducts-exporter_exporter-0.4.0-150000.1.18.3.s390x",
"SUSE Manager Server Module 4.3:golang-github-QubitProducts-exporter_exporter-0.4.0-150000.1.18.3.x86_64",
"SUSE Manager Server Module 4.3:golang-github-lusitaniae-apache_exporter-1.0.0-150000.1.17.2.aarch64",
"SUSE Manager Server Module 4.3:golang-github-lusitaniae-apache_exporter-1.0.0-150000.1.17.2.ppc64le",
"SUSE Manager Server Module 4.3:golang-github-lusitaniae-apache_exporter-1.0.0-150000.1.17.2.s390x",
"SUSE Manager Server Module 4.3:golang-github-lusitaniae-apache_exporter-1.0.0-150000.1.17.2.x86_64",
"openSUSE Leap 15.4:golang-github-QubitProducts-exporter_exporter-0.4.0-150000.1.18.3.aarch64",
"openSUSE Leap 15.4:golang-github-QubitProducts-exporter_exporter-0.4.0-150000.1.18.3.ppc64le",
"openSUSE Leap 15.4:golang-github-QubitProducts-exporter_exporter-0.4.0-150000.1.18.3.s390x",
"openSUSE Leap 15.4:golang-github-QubitProducts-exporter_exporter-0.4.0-150000.1.18.3.x86_64",
"openSUSE Leap 15.4:golang-github-lusitaniae-apache_exporter-1.0.0-150000.1.17.2.aarch64",
"openSUSE Leap 15.4:golang-github-lusitaniae-apache_exporter-1.0.0-150000.1.17.2.ppc64le",
"openSUSE Leap 15.4:golang-github-lusitaniae-apache_exporter-1.0.0-150000.1.17.2.s390x",
"openSUSE Leap 15.4:golang-github-lusitaniae-apache_exporter-1.0.0-150000.1.17.2.x86_64",
"openSUSE Leap 15.4:prometheus-blackbox_exporter-0.24.0-150000.1.23.3.aarch64",
"openSUSE Leap 15.4:prometheus-blackbox_exporter-0.24.0-150000.1.23.3.ppc64le",
"openSUSE Leap 15.4:prometheus-blackbox_exporter-0.24.0-150000.1.23.3.s390x",
"openSUSE Leap 15.4:prometheus-blackbox_exporter-0.24.0-150000.1.23.3.x86_64",
"openSUSE Leap 15.4:prometheus-postgres_exporter-0.10.1-150000.1.14.3.aarch64",
"openSUSE Leap 15.4:prometheus-postgres_exporter-0.10.1-150000.1.14.3.ppc64le",
"openSUSE Leap 15.4:prometheus-postgres_exporter-0.10.1-150000.1.14.3.s390x",
"openSUSE Leap 15.4:prometheus-postgres_exporter-0.10.1-150000.1.14.3.x86_64",
"openSUSE Leap 15.4:spacecmd-4.3.23-150000.3.104.2.noarch",
"openSUSE Leap 15.4:supportutils-plugin-susemanager-client-4.3.3-150000.3.21.2.noarch",
"openSUSE Leap 15.5:golang-github-QubitProducts-exporter_exporter-0.4.0-150000.1.18.3.aarch64",
"openSUSE Leap 15.5:golang-github-QubitProducts-exporter_exporter-0.4.0-150000.1.18.3.ppc64le",
"openSUSE Leap 15.5:golang-github-QubitProducts-exporter_exporter-0.4.0-150000.1.18.3.s390x",
"openSUSE Leap 15.5:golang-github-QubitProducts-exporter_exporter-0.4.0-150000.1.18.3.x86_64",
"openSUSE Leap 15.5:golang-github-lusitaniae-apache_exporter-1.0.0-150000.1.17.2.aarch64",
"openSUSE Leap 15.5:golang-github-lusitaniae-apache_exporter-1.0.0-150000.1.17.2.ppc64le",
"openSUSE Leap 15.5:golang-github-lusitaniae-apache_exporter-1.0.0-150000.1.17.2.s390x",
"openSUSE Leap 15.5:golang-github-lusitaniae-apache_exporter-1.0.0-150000.1.17.2.x86_64",
"openSUSE Leap 15.5:prometheus-blackbox_exporter-0.24.0-150000.1.23.3.aarch64",
"openSUSE Leap 15.5:prometheus-blackbox_exporter-0.24.0-150000.1.23.3.ppc64le",
"openSUSE Leap 15.5:prometheus-blackbox_exporter-0.24.0-150000.1.23.3.s390x",
"openSUSE Leap 15.5:prometheus-blackbox_exporter-0.24.0-150000.1.23.3.x86_64",
"openSUSE Leap 15.5:prometheus-postgres_exporter-0.10.1-150000.1.14.3.aarch64",
"openSUSE Leap 15.5:prometheus-postgres_exporter-0.10.1-150000.1.14.3.ppc64le",
"openSUSE Leap 15.5:prometheus-postgres_exporter-0.10.1-150000.1.14.3.s390x",
"openSUSE Leap 15.5:prometheus-postgres_exporter-0.10.1-150000.1.14.3.x86_64",
"openSUSE Leap 15.5:spacecmd-4.3.23-150000.3.104.2.noarch",
"openSUSE Leap 15.5:supportutils-plugin-susemanager-client-4.3.3-150000.3.21.2.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-41723",
"url": "https://www.suse.com/security/cve/CVE-2022-41723"
},
{
"category": "external",
"summary": "SUSE Bug 1208270 for CVE-2022-41723",
"url": "https://bugzilla.suse.com/1208270"
},
{
"category": "external",
"summary": "SUSE Bug 1215588 for CVE-2022-41723",
"url": "https://bugzilla.suse.com/1215588"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Manager Client Tools 15:firewalld-prometheus-config-0.1-150000.3.50.3.aarch64",
"SUSE Manager Client Tools 15:firewalld-prometheus-config-0.1-150000.3.50.3.ppc64le",
"SUSE Manager Client Tools 15:firewalld-prometheus-config-0.1-150000.3.50.3.s390x",
"SUSE Manager Client Tools 15:firewalld-prometheus-config-0.1-150000.3.50.3.x86_64",
"SUSE Manager Client Tools 15:golang-github-QubitProducts-exporter_exporter-0.4.0-150000.1.18.3.aarch64",
"SUSE Manager Client Tools 15:golang-github-QubitProducts-exporter_exporter-0.4.0-150000.1.18.3.ppc64le",
"SUSE Manager Client Tools 15:golang-github-QubitProducts-exporter_exporter-0.4.0-150000.1.18.3.s390x",
"SUSE Manager Client Tools 15:golang-github-QubitProducts-exporter_exporter-0.4.0-150000.1.18.3.x86_64",
"SUSE Manager Client Tools 15:golang-github-lusitaniae-apache_exporter-1.0.0-150000.1.17.2.aarch64",
"SUSE Manager Client Tools 15:golang-github-lusitaniae-apache_exporter-1.0.0-150000.1.17.2.ppc64le",
"SUSE Manager Client Tools 15:golang-github-lusitaniae-apache_exporter-1.0.0-150000.1.17.2.s390x",
"SUSE Manager Client Tools 15:golang-github-lusitaniae-apache_exporter-1.0.0-150000.1.17.2.x86_64",
"SUSE Manager Client Tools 15:golang-github-prometheus-prometheus-2.45.0-150000.3.50.3.aarch64",
"SUSE Manager Client Tools 15:golang-github-prometheus-prometheus-2.45.0-150000.3.50.3.ppc64le",
"SUSE Manager Client Tools 15:golang-github-prometheus-prometheus-2.45.0-150000.3.50.3.s390x",
"SUSE Manager Client Tools 15:golang-github-prometheus-prometheus-2.45.0-150000.3.50.3.x86_64",
"SUSE Manager Client Tools 15:grafana-9.5.5-150000.1.54.3.aarch64",
"SUSE Manager Client Tools 15:grafana-9.5.5-150000.1.54.3.ppc64le",
"SUSE Manager Client Tools 15:grafana-9.5.5-150000.1.54.3.s390x",
"SUSE Manager Client Tools 15:grafana-9.5.5-150000.1.54.3.x86_64",
"SUSE Manager Client Tools 15:prometheus-blackbox_exporter-0.24.0-150000.1.23.3.aarch64",
"SUSE Manager Client Tools 15:prometheus-blackbox_exporter-0.24.0-150000.1.23.3.ppc64le",
"SUSE Manager Client Tools 15:prometheus-blackbox_exporter-0.24.0-150000.1.23.3.s390x",
"SUSE Manager Client Tools 15:prometheus-blackbox_exporter-0.24.0-150000.1.23.3.x86_64",
"SUSE Manager Client Tools 15:prometheus-postgres_exporter-0.10.1-150000.1.14.3.aarch64",
"SUSE Manager Client Tools 15:prometheus-postgres_exporter-0.10.1-150000.1.14.3.ppc64le",
"SUSE Manager Client Tools 15:prometheus-postgres_exporter-0.10.1-150000.1.14.3.s390x",
"SUSE Manager Client Tools 15:prometheus-postgres_exporter-0.10.1-150000.1.14.3.x86_64",
"SUSE Manager Client Tools 15:python3-pyvmomi-6.7.3-150000.1.6.2.noarch",
"SUSE Manager Client Tools 15:python3-uyuni-common-libs-4.3.9-150000.1.36.2.aarch64",
"SUSE Manager Client Tools 15:python3-uyuni-common-libs-4.3.9-150000.1.36.2.ppc64le",
"SUSE Manager Client Tools 15:python3-uyuni-common-libs-4.3.9-150000.1.36.2.s390x",
"SUSE Manager Client Tools 15:python3-uyuni-common-libs-4.3.9-150000.1.36.2.x86_64",
"SUSE Manager Client Tools 15:spacecmd-4.3.23-150000.3.104.2.noarch",
"SUSE Manager Client Tools 15:supportutils-plugin-susemanager-client-4.3.3-150000.3.21.2.noarch",
"SUSE Manager Client Tools for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-150000.1.18.3.aarch64",
"SUSE Manager Client Tools for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-150000.1.18.3.s390x",
"SUSE Manager Client Tools for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-150000.1.18.3.x86_64",
"SUSE Manager Client Tools for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-150000.1.23.3.aarch64",
"SUSE Manager Client Tools for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-150000.1.23.3.s390x",
"SUSE Manager Client Tools for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-150000.1.23.3.x86_64",
"SUSE Manager Proxy Module 4.2:golang-github-QubitProducts-exporter_exporter-0.4.0-150000.1.18.3.aarch64",
"SUSE Manager Proxy Module 4.2:golang-github-QubitProducts-exporter_exporter-0.4.0-150000.1.18.3.ppc64le",
"SUSE Manager Proxy Module 4.2:golang-github-QubitProducts-exporter_exporter-0.4.0-150000.1.18.3.s390x",
"SUSE Manager Proxy Module 4.2:golang-github-QubitProducts-exporter_exporter-0.4.0-150000.1.18.3.x86_64",
"SUSE Manager Proxy Module 4.2:golang-github-lusitaniae-apache_exporter-1.0.0-150000.1.17.2.aarch64",
"SUSE Manager Proxy Module 4.2:golang-github-lusitaniae-apache_exporter-1.0.0-150000.1.17.2.ppc64le",
"SUSE Manager Proxy Module 4.2:golang-github-lusitaniae-apache_exporter-1.0.0-150000.1.17.2.s390x",
"SUSE Manager Proxy Module 4.2:golang-github-lusitaniae-apache_exporter-1.0.0-150000.1.17.2.x86_64",
"SUSE Manager Proxy Module 4.2:prometheus-blackbox_exporter-0.24.0-150000.1.23.3.aarch64",
"SUSE Manager Proxy Module 4.2:prometheus-blackbox_exporter-0.24.0-150000.1.23.3.ppc64le",
"SUSE Manager Proxy Module 4.2:prometheus-blackbox_exporter-0.24.0-150000.1.23.3.s390x",
"SUSE Manager Proxy Module 4.2:prometheus-blackbox_exporter-0.24.0-150000.1.23.3.x86_64",
"SUSE Manager Proxy Module 4.3:golang-github-QubitProducts-exporter_exporter-0.4.0-150000.1.18.3.aarch64",
"SUSE Manager Proxy Module 4.3:golang-github-QubitProducts-exporter_exporter-0.4.0-150000.1.18.3.ppc64le",
"SUSE Manager Proxy Module 4.3:golang-github-QubitProducts-exporter_exporter-0.4.0-150000.1.18.3.s390x",
"SUSE Manager Proxy Module 4.3:golang-github-QubitProducts-exporter_exporter-0.4.0-150000.1.18.3.x86_64",
"SUSE Manager Proxy Module 4.3:golang-github-lusitaniae-apache_exporter-1.0.0-150000.1.17.2.aarch64",
"SUSE Manager Proxy Module 4.3:golang-github-lusitaniae-apache_exporter-1.0.0-150000.1.17.2.ppc64le",
"SUSE Manager Proxy Module 4.3:golang-github-lusitaniae-apache_exporter-1.0.0-150000.1.17.2.s390x",
"SUSE Manager Proxy Module 4.3:golang-github-lusitaniae-apache_exporter-1.0.0-150000.1.17.2.x86_64",
"SUSE Manager Proxy Module 4.3:prometheus-blackbox_exporter-0.24.0-150000.1.23.3.aarch64",
"SUSE Manager Proxy Module 4.3:prometheus-blackbox_exporter-0.24.0-150000.1.23.3.ppc64le",
"SUSE Manager Proxy Module 4.3:prometheus-blackbox_exporter-0.24.0-150000.1.23.3.s390x",
"SUSE Manager Proxy Module 4.3:prometheus-blackbox_exporter-0.24.0-150000.1.23.3.x86_64",
"SUSE Manager Server Module 4.2:golang-github-QubitProducts-exporter_exporter-0.4.0-150000.1.18.3.aarch64",
"SUSE Manager Server Module 4.2:golang-github-QubitProducts-exporter_exporter-0.4.0-150000.1.18.3.ppc64le",
"SUSE Manager Server Module 4.2:golang-github-QubitProducts-exporter_exporter-0.4.0-150000.1.18.3.s390x",
"SUSE Manager Server Module 4.2:golang-github-QubitProducts-exporter_exporter-0.4.0-150000.1.18.3.x86_64",
"SUSE Manager Server Module 4.2:golang-github-lusitaniae-apache_exporter-1.0.0-150000.1.17.2.aarch64",
"SUSE Manager Server Module 4.2:golang-github-lusitaniae-apache_exporter-1.0.0-150000.1.17.2.ppc64le",
"SUSE Manager Server Module 4.2:golang-github-lusitaniae-apache_exporter-1.0.0-150000.1.17.2.s390x",
"SUSE Manager Server Module 4.2:golang-github-lusitaniae-apache_exporter-1.0.0-150000.1.17.2.x86_64",
"SUSE Manager Server Module 4.2:prometheus-postgres_exporter-0.10.1-150000.1.14.3.aarch64",
"SUSE Manager Server Module 4.2:prometheus-postgres_exporter-0.10.1-150000.1.14.3.ppc64le",
"SUSE Manager Server Module 4.2:prometheus-postgres_exporter-0.10.1-150000.1.14.3.s390x",
"SUSE Manager Server Module 4.2:prometheus-postgres_exporter-0.10.1-150000.1.14.3.x86_64",
"SUSE Manager Server Module 4.3:golang-github-QubitProducts-exporter_exporter-0.4.0-150000.1.18.3.aarch64",
"SUSE Manager Server Module 4.3:golang-github-QubitProducts-exporter_exporter-0.4.0-150000.1.18.3.ppc64le",
"SUSE Manager Server Module 4.3:golang-github-QubitProducts-exporter_exporter-0.4.0-150000.1.18.3.s390x",
"SUSE Manager Server Module 4.3:golang-github-QubitProducts-exporter_exporter-0.4.0-150000.1.18.3.x86_64",
"SUSE Manager Server Module 4.3:golang-github-lusitaniae-apache_exporter-1.0.0-150000.1.17.2.aarch64",
"SUSE Manager Server Module 4.3:golang-github-lusitaniae-apache_exporter-1.0.0-150000.1.17.2.ppc64le",
"SUSE Manager Server Module 4.3:golang-github-lusitaniae-apache_exporter-1.0.0-150000.1.17.2.s390x",
"SUSE Manager Server Module 4.3:golang-github-lusitaniae-apache_exporter-1.0.0-150000.1.17.2.x86_64",
"openSUSE Leap 15.4:golang-github-QubitProducts-exporter_exporter-0.4.0-150000.1.18.3.aarch64",
"openSUSE Leap 15.4:golang-github-QubitProducts-exporter_exporter-0.4.0-150000.1.18.3.ppc64le",
"openSUSE Leap 15.4:golang-github-QubitProducts-exporter_exporter-0.4.0-150000.1.18.3.s390x",
"openSUSE Leap 15.4:golang-github-QubitProducts-exporter_exporter-0.4.0-150000.1.18.3.x86_64",
"openSUSE Leap 15.4:golang-github-lusitaniae-apache_exporter-1.0.0-150000.1.17.2.aarch64",
"openSUSE Leap 15.4:golang-github-lusitaniae-apache_exporter-1.0.0-150000.1.17.2.ppc64le",
"openSUSE Leap 15.4:golang-github-lusitaniae-apache_exporter-1.0.0-150000.1.17.2.s390x",
"openSUSE Leap 15.4:golang-github-lusitaniae-apache_exporter-1.0.0-150000.1.17.2.x86_64",
"openSUSE Leap 15.4:prometheus-blackbox_exporter-0.24.0-150000.1.23.3.aarch64",
"openSUSE Leap 15.4:prometheus-blackbox_exporter-0.24.0-150000.1.23.3.ppc64le",
"openSUSE Leap 15.4:prometheus-blackbox_exporter-0.24.0-150000.1.23.3.s390x",
"openSUSE Leap 15.4:prometheus-blackbox_exporter-0.24.0-150000.1.23.3.x86_64",
"openSUSE Leap 15.4:prometheus-postgres_exporter-0.10.1-150000.1.14.3.aarch64",
"openSUSE Leap 15.4:prometheus-postgres_exporter-0.10.1-150000.1.14.3.ppc64le",
"openSUSE Leap 15.4:prometheus-postgres_exporter-0.10.1-150000.1.14.3.s390x",
"openSUSE Leap 15.4:prometheus-postgres_exporter-0.10.1-150000.1.14.3.x86_64",
"openSUSE Leap 15.4:spacecmd-4.3.23-150000.3.104.2.noarch",
"openSUSE Leap 15.4:supportutils-plugin-susemanager-client-4.3.3-150000.3.21.2.noarch",
"openSUSE Leap 15.5:golang-github-QubitProducts-exporter_exporter-0.4.0-150000.1.18.3.aarch64",
"openSUSE Leap 15.5:golang-github-QubitProducts-exporter_exporter-0.4.0-150000.1.18.3.ppc64le",
"openSUSE Leap 15.5:golang-github-QubitProducts-exporter_exporter-0.4.0-150000.1.18.3.s390x",
"openSUSE Leap 15.5:golang-github-QubitProducts-exporter_exporter-0.4.0-150000.1.18.3.x86_64",
"openSUSE Leap 15.5:golang-github-lusitaniae-apache_exporter-1.0.0-150000.1.17.2.aarch64",
"openSUSE Leap 15.5:golang-github-lusitaniae-apache_exporter-1.0.0-150000.1.17.2.ppc64le",
"openSUSE Leap 15.5:golang-github-lusitaniae-apache_exporter-1.0.0-150000.1.17.2.s390x",
"openSUSE Leap 15.5:golang-github-lusitaniae-apache_exporter-1.0.0-150000.1.17.2.x86_64",
"openSUSE Leap 15.5:prometheus-blackbox_exporter-0.24.0-150000.1.23.3.aarch64",
"openSUSE Leap 15.5:prometheus-blackbox_exporter-0.24.0-150000.1.23.3.ppc64le",
"openSUSE Leap 15.5:prometheus-blackbox_exporter-0.24.0-150000.1.23.3.s390x",
"openSUSE Leap 15.5:prometheus-blackbox_exporter-0.24.0-150000.1.23.3.x86_64",
"openSUSE Leap 15.5:prometheus-postgres_exporter-0.10.1-150000.1.14.3.aarch64",
"openSUSE Leap 15.5:prometheus-postgres_exporter-0.10.1-150000.1.14.3.ppc64le",
"openSUSE Leap 15.5:prometheus-postgres_exporter-0.10.1-150000.1.14.3.s390x",
"openSUSE Leap 15.5:prometheus-postgres_exporter-0.10.1-150000.1.14.3.x86_64",
"openSUSE Leap 15.5:spacecmd-4.3.23-150000.3.104.2.noarch",
"openSUSE Leap 15.5:supportutils-plugin-susemanager-client-4.3.3-150000.3.21.2.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Manager Client Tools 15:firewalld-prometheus-config-0.1-150000.3.50.3.aarch64",
"SUSE Manager Client Tools 15:firewalld-prometheus-config-0.1-150000.3.50.3.ppc64le",
"SUSE Manager Client Tools 15:firewalld-prometheus-config-0.1-150000.3.50.3.s390x",
"SUSE Manager Client Tools 15:firewalld-prometheus-config-0.1-150000.3.50.3.x86_64",
"SUSE Manager Client Tools 15:golang-github-QubitProducts-exporter_exporter-0.4.0-150000.1.18.3.aarch64",
"SUSE Manager Client Tools 15:golang-github-QubitProducts-exporter_exporter-0.4.0-150000.1.18.3.ppc64le",
"SUSE Manager Client Tools 15:golang-github-QubitProducts-exporter_exporter-0.4.0-150000.1.18.3.s390x",
"SUSE Manager Client Tools 15:golang-github-QubitProducts-exporter_exporter-0.4.0-150000.1.18.3.x86_64",
"SUSE Manager Client Tools 15:golang-github-lusitaniae-apache_exporter-1.0.0-150000.1.17.2.aarch64",
"SUSE Manager Client Tools 15:golang-github-lusitaniae-apache_exporter-1.0.0-150000.1.17.2.ppc64le",
"SUSE Manager Client Tools 15:golang-github-lusitaniae-apache_exporter-1.0.0-150000.1.17.2.s390x",
"SUSE Manager Client Tools 15:golang-github-lusitaniae-apache_exporter-1.0.0-150000.1.17.2.x86_64",
"SUSE Manager Client Tools 15:golang-github-prometheus-prometheus-2.45.0-150000.3.50.3.aarch64",
"SUSE Manager Client Tools 15:golang-github-prometheus-prometheus-2.45.0-150000.3.50.3.ppc64le",
"SUSE Manager Client Tools 15:golang-github-prometheus-prometheus-2.45.0-150000.3.50.3.s390x",
"SUSE Manager Client Tools 15:golang-github-prometheus-prometheus-2.45.0-150000.3.50.3.x86_64",
"SUSE Manager Client Tools 15:grafana-9.5.5-150000.1.54.3.aarch64",
"SUSE Manager Client Tools 15:grafana-9.5.5-150000.1.54.3.ppc64le",
"SUSE Manager Client Tools 15:grafana-9.5.5-150000.1.54.3.s390x",
"SUSE Manager Client Tools 15:grafana-9.5.5-150000.1.54.3.x86_64",
"SUSE Manager Client Tools 15:prometheus-blackbox_exporter-0.24.0-150000.1.23.3.aarch64",
"SUSE Manager Client Tools 15:prometheus-blackbox_exporter-0.24.0-150000.1.23.3.ppc64le",
"SUSE Manager Client Tools 15:prometheus-blackbox_exporter-0.24.0-150000.1.23.3.s390x",
"SUSE Manager Client Tools 15:prometheus-blackbox_exporter-0.24.0-150000.1.23.3.x86_64",
"SUSE Manager Client Tools 15:prometheus-postgres_exporter-0.10.1-150000.1.14.3.aarch64",
"SUSE Manager Client Tools 15:prometheus-postgres_exporter-0.10.1-150000.1.14.3.ppc64le",
"SUSE Manager Client Tools 15:prometheus-postgres_exporter-0.10.1-150000.1.14.3.s390x",
"SUSE Manager Client Tools 15:prometheus-postgres_exporter-0.10.1-150000.1.14.3.x86_64",
"SUSE Manager Client Tools 15:python3-pyvmomi-6.7.3-150000.1.6.2.noarch",
"SUSE Manager Client Tools 15:python3-uyuni-common-libs-4.3.9-150000.1.36.2.aarch64",
"SUSE Manager Client Tools 15:python3-uyuni-common-libs-4.3.9-150000.1.36.2.ppc64le",
"SUSE Manager Client Tools 15:python3-uyuni-common-libs-4.3.9-150000.1.36.2.s390x",
"SUSE Manager Client Tools 15:python3-uyuni-common-libs-4.3.9-150000.1.36.2.x86_64",
"SUSE Manager Client Tools 15:spacecmd-4.3.23-150000.3.104.2.noarch",
"SUSE Manager Client Tools 15:supportutils-plugin-susemanager-client-4.3.3-150000.3.21.2.noarch",
"SUSE Manager Client Tools for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-150000.1.18.3.aarch64",
"SUSE Manager Client Tools for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-150000.1.18.3.s390x",
"SUSE Manager Client Tools for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-150000.1.18.3.x86_64",
"SUSE Manager Client Tools for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-150000.1.23.3.aarch64",
"SUSE Manager Client Tools for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-150000.1.23.3.s390x",
"SUSE Manager Client Tools for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-150000.1.23.3.x86_64",
"SUSE Manager Proxy Module 4.2:golang-github-QubitProducts-exporter_exporter-0.4.0-150000.1.18.3.aarch64",
"SUSE Manager Proxy Module 4.2:golang-github-QubitProducts-exporter_exporter-0.4.0-150000.1.18.3.ppc64le",
"SUSE Manager Proxy Module 4.2:golang-github-QubitProducts-exporter_exporter-0.4.0-150000.1.18.3.s390x",
"SUSE Manager Proxy Module 4.2:golang-github-QubitProducts-exporter_exporter-0.4.0-150000.1.18.3.x86_64",
"SUSE Manager Proxy Module 4.2:golang-github-lusitaniae-apache_exporter-1.0.0-150000.1.17.2.aarch64",
"SUSE Manager Proxy Module 4.2:golang-github-lusitaniae-apache_exporter-1.0.0-150000.1.17.2.ppc64le",
"SUSE Manager Proxy Module 4.2:golang-github-lusitaniae-apache_exporter-1.0.0-150000.1.17.2.s390x",
"SUSE Manager Proxy Module 4.2:golang-github-lusitaniae-apache_exporter-1.0.0-150000.1.17.2.x86_64",
"SUSE Manager Proxy Module 4.2:prometheus-blackbox_exporter-0.24.0-150000.1.23.3.aarch64",
"SUSE Manager Proxy Module 4.2:prometheus-blackbox_exporter-0.24.0-150000.1.23.3.ppc64le",
"SUSE Manager Proxy Module 4.2:prometheus-blackbox_exporter-0.24.0-150000.1.23.3.s390x",
"SUSE Manager Proxy Module 4.2:prometheus-blackbox_exporter-0.24.0-150000.1.23.3.x86_64",
"SUSE Manager Proxy Module 4.3:golang-github-QubitProducts-exporter_exporter-0.4.0-150000.1.18.3.aarch64",
"SUSE Manager Proxy Module 4.3:golang-github-QubitProducts-exporter_exporter-0.4.0-150000.1.18.3.ppc64le",
"SUSE Manager Proxy Module 4.3:golang-github-QubitProducts-exporter_exporter-0.4.0-150000.1.18.3.s390x",
"SUSE Manager Proxy Module 4.3:golang-github-QubitProducts-exporter_exporter-0.4.0-150000.1.18.3.x86_64",
"SUSE Manager Proxy Module 4.3:golang-github-lusitaniae-apache_exporter-1.0.0-150000.1.17.2.aarch64",
"SUSE Manager Proxy Module 4.3:golang-github-lusitaniae-apache_exporter-1.0.0-150000.1.17.2.ppc64le",
"SUSE Manager Proxy Module 4.3:golang-github-lusitaniae-apache_exporter-1.0.0-150000.1.17.2.s390x",
"SUSE Manager Proxy Module 4.3:golang-github-lusitaniae-apache_exporter-1.0.0-150000.1.17.2.x86_64",
"SUSE Manager Proxy Module 4.3:prometheus-blackbox_exporter-0.24.0-150000.1.23.3.aarch64",
"SUSE Manager Proxy Module 4.3:prometheus-blackbox_exporter-0.24.0-150000.1.23.3.ppc64le",
"SUSE Manager Proxy Module 4.3:prometheus-blackbox_exporter-0.24.0-150000.1.23.3.s390x",
"SUSE Manager Proxy Module 4.3:prometheus-blackbox_exporter-0.24.0-150000.1.23.3.x86_64",
"SUSE Manager Server Module 4.2:golang-github-QubitProducts-exporter_exporter-0.4.0-150000.1.18.3.aarch64",
"SUSE Manager Server Module 4.2:golang-github-QubitProducts-exporter_exporter-0.4.0-150000.1.18.3.ppc64le",
"SUSE Manager Server Module 4.2:golang-github-QubitProducts-exporter_exporter-0.4.0-150000.1.18.3.s390x",
"SUSE Manager Server Module 4.2:golang-github-QubitProducts-exporter_exporter-0.4.0-150000.1.18.3.x86_64",
"SUSE Manager Server Module 4.2:golang-github-lusitaniae-apache_exporter-1.0.0-150000.1.17.2.aarch64",
"SUSE Manager Server Module 4.2:golang-github-lusitaniae-apache_exporter-1.0.0-150000.1.17.2.ppc64le",
"SUSE Manager Server Module 4.2:golang-github-lusitaniae-apache_exporter-1.0.0-150000.1.17.2.s390x",
"SUSE Manager Server Module 4.2:golang-github-lusitaniae-apache_exporter-1.0.0-150000.1.17.2.x86_64",
"SUSE Manager Server Module 4.2:prometheus-postgres_exporter-0.10.1-150000.1.14.3.aarch64",
"SUSE Manager Server Module 4.2:prometheus-postgres_exporter-0.10.1-150000.1.14.3.ppc64le",
"SUSE Manager Server Module 4.2:prometheus-postgres_exporter-0.10.1-150000.1.14.3.s390x",
"SUSE Manager Server Module 4.2:prometheus-postgres_exporter-0.10.1-150000.1.14.3.x86_64",
"SUSE Manager Server Module 4.3:golang-github-QubitProducts-exporter_exporter-0.4.0-150000.1.18.3.aarch64",
"SUSE Manager Server Module 4.3:golang-github-QubitProducts-exporter_exporter-0.4.0-150000.1.18.3.ppc64le",
"SUSE Manager Server Module 4.3:golang-github-QubitProducts-exporter_exporter-0.4.0-150000.1.18.3.s390x",
"SUSE Manager Server Module 4.3:golang-github-QubitProducts-exporter_exporter-0.4.0-150000.1.18.3.x86_64",
"SUSE Manager Server Module 4.3:golang-github-lusitaniae-apache_exporter-1.0.0-150000.1.17.2.aarch64",
"SUSE Manager Server Module 4.3:golang-github-lusitaniae-apache_exporter-1.0.0-150000.1.17.2.ppc64le",
"SUSE Manager Server Module 4.3:golang-github-lusitaniae-apache_exporter-1.0.0-150000.1.17.2.s390x",
"SUSE Manager Server Module 4.3:golang-github-lusitaniae-apache_exporter-1.0.0-150000.1.17.2.x86_64",
"openSUSE Leap 15.4:golang-github-QubitProducts-exporter_exporter-0.4.0-150000.1.18.3.aarch64",
"openSUSE Leap 15.4:golang-github-QubitProducts-exporter_exporter-0.4.0-150000.1.18.3.ppc64le",
"openSUSE Leap 15.4:golang-github-QubitProducts-exporter_exporter-0.4.0-150000.1.18.3.s390x",
"openSUSE Leap 15.4:golang-github-QubitProducts-exporter_exporter-0.4.0-150000.1.18.3.x86_64",
"openSUSE Leap 15.4:golang-github-lusitaniae-apache_exporter-1.0.0-150000.1.17.2.aarch64",
"openSUSE Leap 15.4:golang-github-lusitaniae-apache_exporter-1.0.0-150000.1.17.2.ppc64le",
"openSUSE Leap 15.4:golang-github-lusitaniae-apache_exporter-1.0.0-150000.1.17.2.s390x",
"openSUSE Leap 15.4:golang-github-lusitaniae-apache_exporter-1.0.0-150000.1.17.2.x86_64",
"openSUSE Leap 15.4:prometheus-blackbox_exporter-0.24.0-150000.1.23.3.aarch64",
"openSUSE Leap 15.4:prometheus-blackbox_exporter-0.24.0-150000.1.23.3.ppc64le",
"openSUSE Leap 15.4:prometheus-blackbox_exporter-0.24.0-150000.1.23.3.s390x",
"openSUSE Leap 15.4:prometheus-blackbox_exporter-0.24.0-150000.1.23.3.x86_64",
"openSUSE Leap 15.4:prometheus-postgres_exporter-0.10.1-150000.1.14.3.aarch64",
"openSUSE Leap 15.4:prometheus-postgres_exporter-0.10.1-150000.1.14.3.ppc64le",
"openSUSE Leap 15.4:prometheus-postgres_exporter-0.10.1-150000.1.14.3.s390x",
"openSUSE Leap 15.4:prometheus-postgres_exporter-0.10.1-150000.1.14.3.x86_64",
"openSUSE Leap 15.4:spacecmd-4.3.23-150000.3.104.2.noarch",
"openSUSE Leap 15.4:supportutils-plugin-susemanager-client-4.3.3-150000.3.21.2.noarch",
"openSUSE Leap 15.5:golang-github-QubitProducts-exporter_exporter-0.4.0-150000.1.18.3.aarch64",
"openSUSE Leap 15.5:golang-github-QubitProducts-exporter_exporter-0.4.0-150000.1.18.3.ppc64le",
"openSUSE Leap 15.5:golang-github-QubitProducts-exporter_exporter-0.4.0-150000.1.18.3.s390x",
"openSUSE Leap 15.5:golang-github-QubitProducts-exporter_exporter-0.4.0-150000.1.18.3.x86_64",
"openSUSE Leap 15.5:golang-github-lusitaniae-apache_exporter-1.0.0-150000.1.17.2.aarch64",
"openSUSE Leap 15.5:golang-github-lusitaniae-apache_exporter-1.0.0-150000.1.17.2.ppc64le",
"openSUSE Leap 15.5:golang-github-lusitaniae-apache_exporter-1.0.0-150000.1.17.2.s390x",
"openSUSE Leap 15.5:golang-github-lusitaniae-apache_exporter-1.0.0-150000.1.17.2.x86_64",
"openSUSE Leap 15.5:prometheus-blackbox_exporter-0.24.0-150000.1.23.3.aarch64",
"openSUSE Leap 15.5:prometheus-blackbox_exporter-0.24.0-150000.1.23.3.ppc64le",
"openSUSE Leap 15.5:prometheus-blackbox_exporter-0.24.0-150000.1.23.3.s390x",
"openSUSE Leap 15.5:prometheus-blackbox_exporter-0.24.0-150000.1.23.3.x86_64",
"openSUSE Leap 15.5:prometheus-postgres_exporter-0.10.1-150000.1.14.3.aarch64",
"openSUSE Leap 15.5:prometheus-postgres_exporter-0.10.1-150000.1.14.3.ppc64le",
"openSUSE Leap 15.5:prometheus-postgres_exporter-0.10.1-150000.1.14.3.s390x",
"openSUSE Leap 15.5:prometheus-postgres_exporter-0.10.1-150000.1.14.3.x86_64",
"openSUSE Leap 15.5:spacecmd-4.3.23-150000.3.104.2.noarch",
"openSUSE Leap 15.5:supportutils-plugin-susemanager-client-4.3.3-150000.3.21.2.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2023-09-28T11:43:24Z",
"details": "important"
}
],
"title": "CVE-2022-41723"
},
{
"cve": "CVE-2022-46146",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-46146"
}
],
"notes": [
{
"category": "general",
"text": "Prometheus Exporter Toolkit is a utility package to build exporters. Prior to versions 0.7.2 and 0.8.2, if someone has access to a Prometheus web.yml file and users\u0027 bcrypted passwords, they can bypass security by poisoning the built-in authentication cache. Versions 0.7.2 and 0.8.2 contain a fix for the issue. There is no workaround, but attacker must have access to the hashed password to use this functionality.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Manager Client Tools 15:firewalld-prometheus-config-0.1-150000.3.50.3.aarch64",
"SUSE Manager Client Tools 15:firewalld-prometheus-config-0.1-150000.3.50.3.ppc64le",
"SUSE Manager Client Tools 15:firewalld-prometheus-config-0.1-150000.3.50.3.s390x",
"SUSE Manager Client Tools 15:firewalld-prometheus-config-0.1-150000.3.50.3.x86_64",
"SUSE Manager Client Tools 15:golang-github-QubitProducts-exporter_exporter-0.4.0-150000.1.18.3.aarch64",
"SUSE Manager Client Tools 15:golang-github-QubitProducts-exporter_exporter-0.4.0-150000.1.18.3.ppc64le",
"SUSE Manager Client Tools 15:golang-github-QubitProducts-exporter_exporter-0.4.0-150000.1.18.3.s390x",
"SUSE Manager Client Tools 15:golang-github-QubitProducts-exporter_exporter-0.4.0-150000.1.18.3.x86_64",
"SUSE Manager Client Tools 15:golang-github-lusitaniae-apache_exporter-1.0.0-150000.1.17.2.aarch64",
"SUSE Manager Client Tools 15:golang-github-lusitaniae-apache_exporter-1.0.0-150000.1.17.2.ppc64le",
"SUSE Manager Client Tools 15:golang-github-lusitaniae-apache_exporter-1.0.0-150000.1.17.2.s390x",
"SUSE Manager Client Tools 15:golang-github-lusitaniae-apache_exporter-1.0.0-150000.1.17.2.x86_64",
"SUSE Manager Client Tools 15:golang-github-prometheus-prometheus-2.45.0-150000.3.50.3.aarch64",
"SUSE Manager Client Tools 15:golang-github-prometheus-prometheus-2.45.0-150000.3.50.3.ppc64le",
"SUSE Manager Client Tools 15:golang-github-prometheus-prometheus-2.45.0-150000.3.50.3.s390x",
"SUSE Manager Client Tools 15:golang-github-prometheus-prometheus-2.45.0-150000.3.50.3.x86_64",
"SUSE Manager Client Tools 15:grafana-9.5.5-150000.1.54.3.aarch64",
"SUSE Manager Client Tools 15:grafana-9.5.5-150000.1.54.3.ppc64le",
"SUSE Manager Client Tools 15:grafana-9.5.5-150000.1.54.3.s390x",
"SUSE Manager Client Tools 15:grafana-9.5.5-150000.1.54.3.x86_64",
"SUSE Manager Client Tools 15:prometheus-blackbox_exporter-0.24.0-150000.1.23.3.aarch64",
"SUSE Manager Client Tools 15:prometheus-blackbox_exporter-0.24.0-150000.1.23.3.ppc64le",
"SUSE Manager Client Tools 15:prometheus-blackbox_exporter-0.24.0-150000.1.23.3.s390x",
"SUSE Manager Client Tools 15:prometheus-blackbox_exporter-0.24.0-150000.1.23.3.x86_64",
"SUSE Manager Client Tools 15:prometheus-postgres_exporter-0.10.1-150000.1.14.3.aarch64",
"SUSE Manager Client Tools 15:prometheus-postgres_exporter-0.10.1-150000.1.14.3.ppc64le",
"SUSE Manager Client Tools 15:prometheus-postgres_exporter-0.10.1-150000.1.14.3.s390x",
"SUSE Manager Client Tools 15:prometheus-postgres_exporter-0.10.1-150000.1.14.3.x86_64",
"SUSE Manager Client Tools 15:python3-pyvmomi-6.7.3-150000.1.6.2.noarch",
"SUSE Manager Client Tools 15:python3-uyuni-common-libs-4.3.9-150000.1.36.2.aarch64",
"SUSE Manager Client Tools 15:python3-uyuni-common-libs-4.3.9-150000.1.36.2.ppc64le",
"SUSE Manager Client Tools 15:python3-uyuni-common-libs-4.3.9-150000.1.36.2.s390x",
"SUSE Manager Client Tools 15:python3-uyuni-common-libs-4.3.9-150000.1.36.2.x86_64",
"SUSE Manager Client Tools 15:spacecmd-4.3.23-150000.3.104.2.noarch",
"SUSE Manager Client Tools 15:supportutils-plugin-susemanager-client-4.3.3-150000.3.21.2.noarch",
"SUSE Manager Client Tools for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-150000.1.18.3.aarch64",
"SUSE Manager Client Tools for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-150000.1.18.3.s390x",
"SUSE Manager Client Tools for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-150000.1.18.3.x86_64",
"SUSE Manager Client Tools for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-150000.1.23.3.aarch64",
"SUSE Manager Client Tools for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-150000.1.23.3.s390x",
"SUSE Manager Client Tools for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-150000.1.23.3.x86_64",
"SUSE Manager Proxy Module 4.2:golang-github-QubitProducts-exporter_exporter-0.4.0-150000.1.18.3.aarch64",
"SUSE Manager Proxy Module 4.2:golang-github-QubitProducts-exporter_exporter-0.4.0-150000.1.18.3.ppc64le",
"SUSE Manager Proxy Module 4.2:golang-github-QubitProducts-exporter_exporter-0.4.0-150000.1.18.3.s390x",
"SUSE Manager Proxy Module 4.2:golang-github-QubitProducts-exporter_exporter-0.4.0-150000.1.18.3.x86_64",
"SUSE Manager Proxy Module 4.2:golang-github-lusitaniae-apache_exporter-1.0.0-150000.1.17.2.aarch64",
"SUSE Manager Proxy Module 4.2:golang-github-lusitaniae-apache_exporter-1.0.0-150000.1.17.2.ppc64le",
"SUSE Manager Proxy Module 4.2:golang-github-lusitaniae-apache_exporter-1.0.0-150000.1.17.2.s390x",
"SUSE Manager Proxy Module 4.2:golang-github-lusitaniae-apache_exporter-1.0.0-150000.1.17.2.x86_64",
"SUSE Manager Proxy Module 4.2:prometheus-blackbox_exporter-0.24.0-150000.1.23.3.aarch64",
"SUSE Manager Proxy Module 4.2:prometheus-blackbox_exporter-0.24.0-150000.1.23.3.ppc64le",
"SUSE Manager Proxy Module 4.2:prometheus-blackbox_exporter-0.24.0-150000.1.23.3.s390x",
"SUSE Manager Proxy Module 4.2:prometheus-blackbox_exporter-0.24.0-150000.1.23.3.x86_64",
"SUSE Manager Proxy Module 4.3:golang-github-QubitProducts-exporter_exporter-0.4.0-150000.1.18.3.aarch64",
"SUSE Manager Proxy Module 4.3:golang-github-QubitProducts-exporter_exporter-0.4.0-150000.1.18.3.ppc64le",
"SUSE Manager Proxy Module 4.3:golang-github-QubitProducts-exporter_exporter-0.4.0-150000.1.18.3.s390x",
"SUSE Manager Proxy Module 4.3:golang-github-QubitProducts-exporter_exporter-0.4.0-150000.1.18.3.x86_64",
"SUSE Manager Proxy Module 4.3:golang-github-lusitaniae-apache_exporter-1.0.0-150000.1.17.2.aarch64",
"SUSE Manager Proxy Module 4.3:golang-github-lusitaniae-apache_exporter-1.0.0-150000.1.17.2.ppc64le",
"SUSE Manager Proxy Module 4.3:golang-github-lusitaniae-apache_exporter-1.0.0-150000.1.17.2.s390x",
"SUSE Manager Proxy Module 4.3:golang-github-lusitaniae-apache_exporter-1.0.0-150000.1.17.2.x86_64",
"SUSE Manager Proxy Module 4.3:prometheus-blackbox_exporter-0.24.0-150000.1.23.3.aarch64",
"SUSE Manager Proxy Module 4.3:prometheus-blackbox_exporter-0.24.0-150000.1.23.3.ppc64le",
"SUSE Manager Proxy Module 4.3:prometheus-blackbox_exporter-0.24.0-150000.1.23.3.s390x",
"SUSE Manager Proxy Module 4.3:prometheus-blackbox_exporter-0.24.0-150000.1.23.3.x86_64",
"SUSE Manager Server Module 4.2:golang-github-QubitProducts-exporter_exporter-0.4.0-150000.1.18.3.aarch64",
"SUSE Manager Server Module 4.2:golang-github-QubitProducts-exporter_exporter-0.4.0-150000.1.18.3.ppc64le",
"SUSE Manager Server Module 4.2:golang-github-QubitProducts-exporter_exporter-0.4.0-150000.1.18.3.s390x",
"SUSE Manager Server Module 4.2:golang-github-QubitProducts-exporter_exporter-0.4.0-150000.1.18.3.x86_64",
"SUSE Manager Server Module 4.2:golang-github-lusitaniae-apache_exporter-1.0.0-150000.1.17.2.aarch64",
"SUSE Manager Server Module 4.2:golang-github-lusitaniae-apache_exporter-1.0.0-150000.1.17.2.ppc64le",
"SUSE Manager Server Module 4.2:golang-github-lusitaniae-apache_exporter-1.0.0-150000.1.17.2.s390x",
"SUSE Manager Server Module 4.2:golang-github-lusitaniae-apache_exporter-1.0.0-150000.1.17.2.x86_64",
"SUSE Manager Server Module 4.2:prometheus-postgres_exporter-0.10.1-150000.1.14.3.aarch64",
"SUSE Manager Server Module 4.2:prometheus-postgres_exporter-0.10.1-150000.1.14.3.ppc64le",
"SUSE Manager Server Module 4.2:prometheus-postgres_exporter-0.10.1-150000.1.14.3.s390x",
"SUSE Manager Server Module 4.2:prometheus-postgres_exporter-0.10.1-150000.1.14.3.x86_64",
"SUSE Manager Server Module 4.3:golang-github-QubitProducts-exporter_exporter-0.4.0-150000.1.18.3.aarch64",
"SUSE Manager Server Module 4.3:golang-github-QubitProducts-exporter_exporter-0.4.0-150000.1.18.3.ppc64le",
"SUSE Manager Server Module 4.3:golang-github-QubitProducts-exporter_exporter-0.4.0-150000.1.18.3.s390x",
"SUSE Manager Server Module 4.3:golang-github-QubitProducts-exporter_exporter-0.4.0-150000.1.18.3.x86_64",
"SUSE Manager Server Module 4.3:golang-github-lusitaniae-apache_exporter-1.0.0-150000.1.17.2.aarch64",
"SUSE Manager Server Module 4.3:golang-github-lusitaniae-apache_exporter-1.0.0-150000.1.17.2.ppc64le",
"SUSE Manager Server Module 4.3:golang-github-lusitaniae-apache_exporter-1.0.0-150000.1.17.2.s390x",
"SUSE Manager Server Module 4.3:golang-github-lusitaniae-apache_exporter-1.0.0-150000.1.17.2.x86_64",
"openSUSE Leap 15.4:golang-github-QubitProducts-exporter_exporter-0.4.0-150000.1.18.3.aarch64",
"openSUSE Leap 15.4:golang-github-QubitProducts-exporter_exporter-0.4.0-150000.1.18.3.ppc64le",
"openSUSE Leap 15.4:golang-github-QubitProducts-exporter_exporter-0.4.0-150000.1.18.3.s390x",
"openSUSE Leap 15.4:golang-github-QubitProducts-exporter_exporter-0.4.0-150000.1.18.3.x86_64",
"openSUSE Leap 15.4:golang-github-lusitaniae-apache_exporter-1.0.0-150000.1.17.2.aarch64",
"openSUSE Leap 15.4:golang-github-lusitaniae-apache_exporter-1.0.0-150000.1.17.2.ppc64le",
"openSUSE Leap 15.4:golang-github-lusitaniae-apache_exporter-1.0.0-150000.1.17.2.s390x",
"openSUSE Leap 15.4:golang-github-lusitaniae-apache_exporter-1.0.0-150000.1.17.2.x86_64",
"openSUSE Leap 15.4:prometheus-blackbox_exporter-0.24.0-150000.1.23.3.aarch64",
"openSUSE Leap 15.4:prometheus-blackbox_exporter-0.24.0-150000.1.23.3.ppc64le",
"openSUSE Leap 15.4:prometheus-blackbox_exporter-0.24.0-150000.1.23.3.s390x",
"openSUSE Leap 15.4:prometheus-blackbox_exporter-0.24.0-150000.1.23.3.x86_64",
"openSUSE Leap 15.4:prometheus-postgres_exporter-0.10.1-150000.1.14.3.aarch64",
"openSUSE Leap 15.4:prometheus-postgres_exporter-0.10.1-150000.1.14.3.ppc64le",
"openSUSE Leap 15.4:prometheus-postgres_exporter-0.10.1-150000.1.14.3.s390x",
"openSUSE Leap 15.4:prometheus-postgres_exporter-0.10.1-150000.1.14.3.x86_64",
"openSUSE Leap 15.4:spacecmd-4.3.23-150000.3.104.2.noarch",
"openSUSE Leap 15.4:supportutils-plugin-susemanager-client-4.3.3-150000.3.21.2.noarch",
"openSUSE Leap 15.5:golang-github-QubitProducts-exporter_exporter-0.4.0-150000.1.18.3.aarch64",
"openSUSE Leap 15.5:golang-github-QubitProducts-exporter_exporter-0.4.0-150000.1.18.3.ppc64le",
"openSUSE Leap 15.5:golang-github-QubitProducts-exporter_exporter-0.4.0-150000.1.18.3.s390x",
"openSUSE Leap 15.5:golang-github-QubitProducts-exporter_exporter-0.4.0-150000.1.18.3.x86_64",
"openSUSE Leap 15.5:golang-github-lusitaniae-apache_exporter-1.0.0-150000.1.17.2.aarch64",
"openSUSE Leap 15.5:golang-github-lusitaniae-apache_exporter-1.0.0-150000.1.17.2.ppc64le",
"openSUSE Leap 15.5:golang-github-lusitaniae-apache_exporter-1.0.0-150000.1.17.2.s390x",
"openSUSE Leap 15.5:golang-github-lusitaniae-apache_exporter-1.0.0-150000.1.17.2.x86_64",
"openSUSE Leap 15.5:prometheus-blackbox_exporter-0.24.0-150000.1.23.3.aarch64",
"openSUSE Leap 15.5:prometheus-blackbox_exporter-0.24.0-150000.1.23.3.ppc64le",
"openSUSE Leap 15.5:prometheus-blackbox_exporter-0.24.0-150000.1.23.3.s390x",
"openSUSE Leap 15.5:prometheus-blackbox_exporter-0.24.0-150000.1.23.3.x86_64",
"openSUSE Leap 15.5:prometheus-postgres_exporter-0.10.1-150000.1.14.3.aarch64",
"openSUSE Leap 15.5:prometheus-postgres_exporter-0.10.1-150000.1.14.3.ppc64le",
"openSUSE Leap 15.5:prometheus-postgres_exporter-0.10.1-150000.1.14.3.s390x",
"openSUSE Leap 15.5:prometheus-postgres_exporter-0.10.1-150000.1.14.3.x86_64",
"openSUSE Leap 15.5:spacecmd-4.3.23-150000.3.104.2.noarch",
"openSUSE Leap 15.5:supportutils-plugin-susemanager-client-4.3.3-150000.3.21.2.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-46146",
"url": "https://www.suse.com/security/cve/CVE-2022-46146"
},
{
"category": "external",
"summary": "SUSE Bug 1208046 for CVE-2022-46146",
"url": "https://bugzilla.suse.com/1208046"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Manager Client Tools 15:firewalld-prometheus-config-0.1-150000.3.50.3.aarch64",
"SUSE Manager Client Tools 15:firewalld-prometheus-config-0.1-150000.3.50.3.ppc64le",
"SUSE Manager Client Tools 15:firewalld-prometheus-config-0.1-150000.3.50.3.s390x",
"SUSE Manager Client Tools 15:firewalld-prometheus-config-0.1-150000.3.50.3.x86_64",
"SUSE Manager Client Tools 15:golang-github-QubitProducts-exporter_exporter-0.4.0-150000.1.18.3.aarch64",
"SUSE Manager Client Tools 15:golang-github-QubitProducts-exporter_exporter-0.4.0-150000.1.18.3.ppc64le",
"SUSE Manager Client Tools 15:golang-github-QubitProducts-exporter_exporter-0.4.0-150000.1.18.3.s390x",
"SUSE Manager Client Tools 15:golang-github-QubitProducts-exporter_exporter-0.4.0-150000.1.18.3.x86_64",
"SUSE Manager Client Tools 15:golang-github-lusitaniae-apache_exporter-1.0.0-150000.1.17.2.aarch64",
"SUSE Manager Client Tools 15:golang-github-lusitaniae-apache_exporter-1.0.0-150000.1.17.2.ppc64le",
"SUSE Manager Client Tools 15:golang-github-lusitaniae-apache_exporter-1.0.0-150000.1.17.2.s390x",
"SUSE Manager Client Tools 15:golang-github-lusitaniae-apache_exporter-1.0.0-150000.1.17.2.x86_64",
"SUSE Manager Client Tools 15:golang-github-prometheus-prometheus-2.45.0-150000.3.50.3.aarch64",
"SUSE Manager Client Tools 15:golang-github-prometheus-prometheus-2.45.0-150000.3.50.3.ppc64le",
"SUSE Manager Client Tools 15:golang-github-prometheus-prometheus-2.45.0-150000.3.50.3.s390x",
"SUSE Manager Client Tools 15:golang-github-prometheus-prometheus-2.45.0-150000.3.50.3.x86_64",
"SUSE Manager Client Tools 15:grafana-9.5.5-150000.1.54.3.aarch64",
"SUSE Manager Client Tools 15:grafana-9.5.5-150000.1.54.3.ppc64le",
"SUSE Manager Client Tools 15:grafana-9.5.5-150000.1.54.3.s390x",
"SUSE Manager Client Tools 15:grafana-9.5.5-150000.1.54.3.x86_64",
"SUSE Manager Client Tools 15:prometheus-blackbox_exporter-0.24.0-150000.1.23.3.aarch64",
"SUSE Manager Client Tools 15:prometheus-blackbox_exporter-0.24.0-150000.1.23.3.ppc64le",
"SUSE Manager Client Tools 15:prometheus-blackbox_exporter-0.24.0-150000.1.23.3.s390x",
"SUSE Manager Client Tools 15:prometheus-blackbox_exporter-0.24.0-150000.1.23.3.x86_64",
"SUSE Manager Client Tools 15:prometheus-postgres_exporter-0.10.1-150000.1.14.3.aarch64",
"SUSE Manager Client Tools 15:prometheus-postgres_exporter-0.10.1-150000.1.14.3.ppc64le",
"SUSE Manager Client Tools 15:prometheus-postgres_exporter-0.10.1-150000.1.14.3.s390x",
"SUSE Manager Client Tools 15:prometheus-postgres_exporter-0.10.1-150000.1.14.3.x86_64",
"SUSE Manager Client Tools 15:python3-pyvmomi-6.7.3-150000.1.6.2.noarch",
"SUSE Manager Client Tools 15:python3-uyuni-common-libs-4.3.9-150000.1.36.2.aarch64",
"SUSE Manager Client Tools 15:python3-uyuni-common-libs-4.3.9-150000.1.36.2.ppc64le",
"SUSE Manager Client Tools 15:python3-uyuni-common-libs-4.3.9-150000.1.36.2.s390x",
"SUSE Manager Client Tools 15:python3-uyuni-common-libs-4.3.9-150000.1.36.2.x86_64",
"SUSE Manager Client Tools 15:spacecmd-4.3.23-150000.3.104.2.noarch",
"SUSE Manager Client Tools 15:supportutils-plugin-susemanager-client-4.3.3-150000.3.21.2.noarch",
"SUSE Manager Client Tools for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-150000.1.18.3.aarch64",
"SUSE Manager Client Tools for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-150000.1.18.3.s390x",
"SUSE Manager Client Tools for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-150000.1.18.3.x86_64",
"SUSE Manager Client Tools for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-150000.1.23.3.aarch64",
"SUSE Manager Client Tools for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-150000.1.23.3.s390x",
"SUSE Manager Client Tools for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-150000.1.23.3.x86_64",
"SUSE Manager Proxy Module 4.2:golang-github-QubitProducts-exporter_exporter-0.4.0-150000.1.18.3.aarch64",
"SUSE Manager Proxy Module 4.2:golang-github-QubitProducts-exporter_exporter-0.4.0-150000.1.18.3.ppc64le",
"SUSE Manager Proxy Module 4.2:golang-github-QubitProducts-exporter_exporter-0.4.0-150000.1.18.3.s390x",
"SUSE Manager Proxy Module 4.2:golang-github-QubitProducts-exporter_exporter-0.4.0-150000.1.18.3.x86_64",
"SUSE Manager Proxy Module 4.2:golang-github-lusitaniae-apache_exporter-1.0.0-150000.1.17.2.aarch64",
"SUSE Manager Proxy Module 4.2:golang-github-lusitaniae-apache_exporter-1.0.0-150000.1.17.2.ppc64le",
"SUSE Manager Proxy Module 4.2:golang-github-lusitaniae-apache_exporter-1.0.0-150000.1.17.2.s390x",
"SUSE Manager Proxy Module 4.2:golang-github-lusitaniae-apache_exporter-1.0.0-150000.1.17.2.x86_64",
"SUSE Manager Proxy Module 4.2:prometheus-blackbox_exporter-0.24.0-150000.1.23.3.aarch64",
"SUSE Manager Proxy Module 4.2:prometheus-blackbox_exporter-0.24.0-150000.1.23.3.ppc64le",
"SUSE Manager Proxy Module 4.2:prometheus-blackbox_exporter-0.24.0-150000.1.23.3.s390x",
"SUSE Manager Proxy Module 4.2:prometheus-blackbox_exporter-0.24.0-150000.1.23.3.x86_64",
"SUSE Manager Proxy Module 4.3:golang-github-QubitProducts-exporter_exporter-0.4.0-150000.1.18.3.aarch64",
"SUSE Manager Proxy Module 4.3:golang-github-QubitProducts-exporter_exporter-0.4.0-150000.1.18.3.ppc64le",
"SUSE Manager Proxy Module 4.3:golang-github-QubitProducts-exporter_exporter-0.4.0-150000.1.18.3.s390x",
"SUSE Manager Proxy Module 4.3:golang-github-QubitProducts-exporter_exporter-0.4.0-150000.1.18.3.x86_64",
"SUSE Manager Proxy Module 4.3:golang-github-lusitaniae-apache_exporter-1.0.0-150000.1.17.2.aarch64",
"SUSE Manager Proxy Module 4.3:golang-github-lusitaniae-apache_exporter-1.0.0-150000.1.17.2.ppc64le",
"SUSE Manager Proxy Module 4.3:golang-github-lusitaniae-apache_exporter-1.0.0-150000.1.17.2.s390x",
"SUSE Manager Proxy Module 4.3:golang-github-lusitaniae-apache_exporter-1.0.0-150000.1.17.2.x86_64",
"SUSE Manager Proxy Module 4.3:prometheus-blackbox_exporter-0.24.0-150000.1.23.3.aarch64",
"SUSE Manager Proxy Module 4.3:prometheus-blackbox_exporter-0.24.0-150000.1.23.3.ppc64le",
"SUSE Manager Proxy Module 4.3:prometheus-blackbox_exporter-0.24.0-150000.1.23.3.s390x",
"SUSE Manager Proxy Module 4.3:prometheus-blackbox_exporter-0.24.0-150000.1.23.3.x86_64",
"SUSE Manager Server Module 4.2:golang-github-QubitProducts-exporter_exporter-0.4.0-150000.1.18.3.aarch64",
"SUSE Manager Server Module 4.2:golang-github-QubitProducts-exporter_exporter-0.4.0-150000.1.18.3.ppc64le",
"SUSE Manager Server Module 4.2:golang-github-QubitProducts-exporter_exporter-0.4.0-150000.1.18.3.s390x",
"SUSE Manager Server Module 4.2:golang-github-QubitProducts-exporter_exporter-0.4.0-150000.1.18.3.x86_64",
"SUSE Manager Server Module 4.2:golang-github-lusitaniae-apache_exporter-1.0.0-150000.1.17.2.aarch64",
"SUSE Manager Server Module 4.2:golang-github-lusitaniae-apache_exporter-1.0.0-150000.1.17.2.ppc64le",
"SUSE Manager Server Module 4.2:golang-github-lusitaniae-apache_exporter-1.0.0-150000.1.17.2.s390x",
"SUSE Manager Server Module 4.2:golang-github-lusitaniae-apache_exporter-1.0.0-150000.1.17.2.x86_64",
"SUSE Manager Server Module 4.2:prometheus-postgres_exporter-0.10.1-150000.1.14.3.aarch64",
"SUSE Manager Server Module 4.2:prometheus-postgres_exporter-0.10.1-150000.1.14.3.ppc64le",
"SUSE Manager Server Module 4.2:prometheus-postgres_exporter-0.10.1-150000.1.14.3.s390x",
"SUSE Manager Server Module 4.2:prometheus-postgres_exporter-0.10.1-150000.1.14.3.x86_64",
"SUSE Manager Server Module 4.3:golang-github-QubitProducts-exporter_exporter-0.4.0-150000.1.18.3.aarch64",
"SUSE Manager Server Module 4.3:golang-github-QubitProducts-exporter_exporter-0.4.0-150000.1.18.3.ppc64le",
"SUSE Manager Server Module 4.3:golang-github-QubitProducts-exporter_exporter-0.4.0-150000.1.18.3.s390x",
"SUSE Manager Server Module 4.3:golang-github-QubitProducts-exporter_exporter-0.4.0-150000.1.18.3.x86_64",
"SUSE Manager Server Module 4.3:golang-github-lusitaniae-apache_exporter-1.0.0-150000.1.17.2.aarch64",
"SUSE Manager Server Module 4.3:golang-github-lusitaniae-apache_exporter-1.0.0-150000.1.17.2.ppc64le",
"SUSE Manager Server Module 4.3:golang-github-lusitaniae-apache_exporter-1.0.0-150000.1.17.2.s390x",
"SUSE Manager Server Module 4.3:golang-github-lusitaniae-apache_exporter-1.0.0-150000.1.17.2.x86_64",
"openSUSE Leap 15.4:golang-github-QubitProducts-exporter_exporter-0.4.0-150000.1.18.3.aarch64",
"openSUSE Leap 15.4:golang-github-QubitProducts-exporter_exporter-0.4.0-150000.1.18.3.ppc64le",
"openSUSE Leap 15.4:golang-github-QubitProducts-exporter_exporter-0.4.0-150000.1.18.3.s390x",
"openSUSE Leap 15.4:golang-github-QubitProducts-exporter_exporter-0.4.0-150000.1.18.3.x86_64",
"openSUSE Leap 15.4:golang-github-lusitaniae-apache_exporter-1.0.0-150000.1.17.2.aarch64",
"openSUSE Leap 15.4:golang-github-lusitaniae-apache_exporter-1.0.0-150000.1.17.2.ppc64le",
"openSUSE Leap 15.4:golang-github-lusitaniae-apache_exporter-1.0.0-150000.1.17.2.s390x",
"openSUSE Leap 15.4:golang-github-lusitaniae-apache_exporter-1.0.0-150000.1.17.2.x86_64",
"openSUSE Leap 15.4:prometheus-blackbox_exporter-0.24.0-150000.1.23.3.aarch64",
"openSUSE Leap 15.4:prometheus-blackbox_exporter-0.24.0-150000.1.23.3.ppc64le",
"openSUSE Leap 15.4:prometheus-blackbox_exporter-0.24.0-150000.1.23.3.s390x",
"openSUSE Leap 15.4:prometheus-blackbox_exporter-0.24.0-150000.1.23.3.x86_64",
"openSUSE Leap 15.4:prometheus-postgres_exporter-0.10.1-150000.1.14.3.aarch64",
"openSUSE Leap 15.4:prometheus-postgres_exporter-0.10.1-150000.1.14.3.ppc64le",
"openSUSE Leap 15.4:prometheus-postgres_exporter-0.10.1-150000.1.14.3.s390x",
"openSUSE Leap 15.4:prometheus-postgres_exporter-0.10.1-150000.1.14.3.x86_64",
"openSUSE Leap 15.4:spacecmd-4.3.23-150000.3.104.2.noarch",
"openSUSE Leap 15.4:supportutils-plugin-susemanager-client-4.3.3-150000.3.21.2.noarch",
"openSUSE Leap 15.5:golang-github-QubitProducts-exporter_exporter-0.4.0-150000.1.18.3.aarch64",
"openSUSE Leap 15.5:golang-github-QubitProducts-exporter_exporter-0.4.0-150000.1.18.3.ppc64le",
"openSUSE Leap 15.5:golang-github-QubitProducts-exporter_exporter-0.4.0-150000.1.18.3.s390x",
"openSUSE Leap 15.5:golang-github-QubitProducts-exporter_exporter-0.4.0-150000.1.18.3.x86_64",
"openSUSE Leap 15.5:golang-github-lusitaniae-apache_exporter-1.0.0-150000.1.17.2.aarch64",
"openSUSE Leap 15.5:golang-github-lusitaniae-apache_exporter-1.0.0-150000.1.17.2.ppc64le",
"openSUSE Leap 15.5:golang-github-lusitaniae-apache_exporter-1.0.0-150000.1.17.2.s390x",
"openSUSE Leap 15.5:golang-github-lusitaniae-apache_exporter-1.0.0-150000.1.17.2.x86_64",
"openSUSE Leap 15.5:prometheus-blackbox_exporter-0.24.0-150000.1.23.3.aarch64",
"openSUSE Leap 15.5:prometheus-blackbox_exporter-0.24.0-150000.1.23.3.ppc64le",
"openSUSE Leap 15.5:prometheus-blackbox_exporter-0.24.0-150000.1.23.3.s390x",
"openSUSE Leap 15.5:prometheus-blackbox_exporter-0.24.0-150000.1.23.3.x86_64",
"openSUSE Leap 15.5:prometheus-postgres_exporter-0.10.1-150000.1.14.3.aarch64",
"openSUSE Leap 15.5:prometheus-postgres_exporter-0.10.1-150000.1.14.3.ppc64le",
"openSUSE Leap 15.5:prometheus-postgres_exporter-0.10.1-150000.1.14.3.s390x",
"openSUSE Leap 15.5:prometheus-postgres_exporter-0.10.1-150000.1.14.3.x86_64",
"openSUSE Leap 15.5:spacecmd-4.3.23-150000.3.104.2.noarch",
"openSUSE Leap 15.5:supportutils-plugin-susemanager-client-4.3.3-150000.3.21.2.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Manager Client Tools 15:firewalld-prometheus-config-0.1-150000.3.50.3.aarch64",
"SUSE Manager Client Tools 15:firewalld-prometheus-config-0.1-150000.3.50.3.ppc64le",
"SUSE Manager Client Tools 15:firewalld-prometheus-config-0.1-150000.3.50.3.s390x",
"SUSE Manager Client Tools 15:firewalld-prometheus-config-0.1-150000.3.50.3.x86_64",
"SUSE Manager Client Tools 15:golang-github-QubitProducts-exporter_exporter-0.4.0-150000.1.18.3.aarch64",
"SUSE Manager Client Tools 15:golang-github-QubitProducts-exporter_exporter-0.4.0-150000.1.18.3.ppc64le",
"SUSE Manager Client Tools 15:golang-github-QubitProducts-exporter_exporter-0.4.0-150000.1.18.3.s390x",
"SUSE Manager Client Tools 15:golang-github-QubitProducts-exporter_exporter-0.4.0-150000.1.18.3.x86_64",
"SUSE Manager Client Tools 15:golang-github-lusitaniae-apache_exporter-1.0.0-150000.1.17.2.aarch64",
"SUSE Manager Client Tools 15:golang-github-lusitaniae-apache_exporter-1.0.0-150000.1.17.2.ppc64le",
"SUSE Manager Client Tools 15:golang-github-lusitaniae-apache_exporter-1.0.0-150000.1.17.2.s390x",
"SUSE Manager Client Tools 15:golang-github-lusitaniae-apache_exporter-1.0.0-150000.1.17.2.x86_64",
"SUSE Manager Client Tools 15:golang-github-prometheus-prometheus-2.45.0-150000.3.50.3.aarch64",
"SUSE Manager Client Tools 15:golang-github-prometheus-prometheus-2.45.0-150000.3.50.3.ppc64le",
"SUSE Manager Client Tools 15:golang-github-prometheus-prometheus-2.45.0-150000.3.50.3.s390x",
"SUSE Manager Client Tools 15:golang-github-prometheus-prometheus-2.45.0-150000.3.50.3.x86_64",
"SUSE Manager Client Tools 15:grafana-9.5.5-150000.1.54.3.aarch64",
"SUSE Manager Client Tools 15:grafana-9.5.5-150000.1.54.3.ppc64le",
"SUSE Manager Client Tools 15:grafana-9.5.5-150000.1.54.3.s390x",
"SUSE Manager Client Tools 15:grafana-9.5.5-150000.1.54.3.x86_64",
"SUSE Manager Client Tools 15:prometheus-blackbox_exporter-0.24.0-150000.1.23.3.aarch64",
"SUSE Manager Client Tools 15:prometheus-blackbox_exporter-0.24.0-150000.1.23.3.ppc64le",
"SUSE Manager Client Tools 15:prometheus-blackbox_exporter-0.24.0-150000.1.23.3.s390x",
"SUSE Manager Client Tools 15:prometheus-blackbox_exporter-0.24.0-150000.1.23.3.x86_64",
"SUSE Manager Client Tools 15:prometheus-postgres_exporter-0.10.1-150000.1.14.3.aarch64",
"SUSE Manager Client Tools 15:prometheus-postgres_exporter-0.10.1-150000.1.14.3.ppc64le",
"SUSE Manager Client Tools 15:prometheus-postgres_exporter-0.10.1-150000.1.14.3.s390x",
"SUSE Manager Client Tools 15:prometheus-postgres_exporter-0.10.1-150000.1.14.3.x86_64",
"SUSE Manager Client Tools 15:python3-pyvmomi-6.7.3-150000.1.6.2.noarch",
"SUSE Manager Client Tools 15:python3-uyuni-common-libs-4.3.9-150000.1.36.2.aarch64",
"SUSE Manager Client Tools 15:python3-uyuni-common-libs-4.3.9-150000.1.36.2.ppc64le",
"SUSE Manager Client Tools 15:python3-uyuni-common-libs-4.3.9-150000.1.36.2.s390x",
"SUSE Manager Client Tools 15:python3-uyuni-common-libs-4.3.9-150000.1.36.2.x86_64",
"SUSE Manager Client Tools 15:spacecmd-4.3.23-150000.3.104.2.noarch",
"SUSE Manager Client Tools 15:supportutils-plugin-susemanager-client-4.3.3-150000.3.21.2.noarch",
"SUSE Manager Client Tools for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-150000.1.18.3.aarch64",
"SUSE Manager Client Tools for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-150000.1.18.3.s390x",
"SUSE Manager Client Tools for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-150000.1.18.3.x86_64",
"SUSE Manager Client Tools for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-150000.1.23.3.aarch64",
"SUSE Manager Client Tools for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-150000.1.23.3.s390x",
"SUSE Manager Client Tools for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-150000.1.23.3.x86_64",
"SUSE Manager Proxy Module 4.2:golang-github-QubitProducts-exporter_exporter-0.4.0-150000.1.18.3.aarch64",
"SUSE Manager Proxy Module 4.2:golang-github-QubitProducts-exporter_exporter-0.4.0-150000.1.18.3.ppc64le",
"SUSE Manager Proxy Module 4.2:golang-github-QubitProducts-exporter_exporter-0.4.0-150000.1.18.3.s390x",
"SUSE Manager Proxy Module 4.2:golang-github-QubitProducts-exporter_exporter-0.4.0-150000.1.18.3.x86_64",
"SUSE Manager Proxy Module 4.2:golang-github-lusitaniae-apache_exporter-1.0.0-150000.1.17.2.aarch64",
"SUSE Manager Proxy Module 4.2:golang-github-lusitaniae-apache_exporter-1.0.0-150000.1.17.2.ppc64le",
"SUSE Manager Proxy Module 4.2:golang-github-lusitaniae-apache_exporter-1.0.0-150000.1.17.2.s390x",
"SUSE Manager Proxy Module 4.2:golang-github-lusitaniae-apache_exporter-1.0.0-150000.1.17.2.x86_64",
"SUSE Manager Proxy Module 4.2:prometheus-blackbox_exporter-0.24.0-150000.1.23.3.aarch64",
"SUSE Manager Proxy Module 4.2:prometheus-blackbox_exporter-0.24.0-150000.1.23.3.ppc64le",
"SUSE Manager Proxy Module 4.2:prometheus-blackbox_exporter-0.24.0-150000.1.23.3.s390x",
"SUSE Manager Proxy Module 4.2:prometheus-blackbox_exporter-0.24.0-150000.1.23.3.x86_64",
"SUSE Manager Proxy Module 4.3:golang-github-QubitProducts-exporter_exporter-0.4.0-150000.1.18.3.aarch64",
"SUSE Manager Proxy Module 4.3:golang-github-QubitProducts-exporter_exporter-0.4.0-150000.1.18.3.ppc64le",
"SUSE Manager Proxy Module 4.3:golang-github-QubitProducts-exporter_exporter-0.4.0-150000.1.18.3.s390x",
"SUSE Manager Proxy Module 4.3:golang-github-QubitProducts-exporter_exporter-0.4.0-150000.1.18.3.x86_64",
"SUSE Manager Proxy Module 4.3:golang-github-lusitaniae-apache_exporter-1.0.0-150000.1.17.2.aarch64",
"SUSE Manager Proxy Module 4.3:golang-github-lusitaniae-apache_exporter-1.0.0-150000.1.17.2.ppc64le",
"SUSE Manager Proxy Module 4.3:golang-github-lusitaniae-apache_exporter-1.0.0-150000.1.17.2.s390x",
"SUSE Manager Proxy Module 4.3:golang-github-lusitaniae-apache_exporter-1.0.0-150000.1.17.2.x86_64",
"SUSE Manager Proxy Module 4.3:prometheus-blackbox_exporter-0.24.0-150000.1.23.3.aarch64",
"SUSE Manager Proxy Module 4.3:prometheus-blackbox_exporter-0.24.0-150000.1.23.3.ppc64le",
"SUSE Manager Proxy Module 4.3:prometheus-blackbox_exporter-0.24.0-150000.1.23.3.s390x",
"SUSE Manager Proxy Module 4.3:prometheus-blackbox_exporter-0.24.0-150000.1.23.3.x86_64",
"SUSE Manager Server Module 4.2:golang-github-QubitProducts-exporter_exporter-0.4.0-150000.1.18.3.aarch64",
"SUSE Manager Server Module 4.2:golang-github-QubitProducts-exporter_exporter-0.4.0-150000.1.18.3.ppc64le",
"SUSE Manager Server Module 4.2:golang-github-QubitProducts-exporter_exporter-0.4.0-150000.1.18.3.s390x",
"SUSE Manager Server Module 4.2:golang-github-QubitProducts-exporter_exporter-0.4.0-150000.1.18.3.x86_64",
"SUSE Manager Server Module 4.2:golang-github-lusitaniae-apache_exporter-1.0.0-150000.1.17.2.aarch64",
"SUSE Manager Server Module 4.2:golang-github-lusitaniae-apache_exporter-1.0.0-150000.1.17.2.ppc64le",
"SUSE Manager Server Module 4.2:golang-github-lusitaniae-apache_exporter-1.0.0-150000.1.17.2.s390x",
"SUSE Manager Server Module 4.2:golang-github-lusitaniae-apache_exporter-1.0.0-150000.1.17.2.x86_64",
"SUSE Manager Server Module 4.2:prometheus-postgres_exporter-0.10.1-150000.1.14.3.aarch64",
"SUSE Manager Server Module 4.2:prometheus-postgres_exporter-0.10.1-150000.1.14.3.ppc64le",
"SUSE Manager Server Module 4.2:prometheus-postgres_exporter-0.10.1-150000.1.14.3.s390x",
"SUSE Manager Server Module 4.2:prometheus-postgres_exporter-0.10.1-150000.1.14.3.x86_64",
"SUSE Manager Server Module 4.3:golang-github-QubitProducts-exporter_exporter-0.4.0-150000.1.18.3.aarch64",
"SUSE Manager Server Module 4.3:golang-github-QubitProducts-exporter_exporter-0.4.0-150000.1.18.3.ppc64le",
"SUSE Manager Server Module 4.3:golang-github-QubitProducts-exporter_exporter-0.4.0-150000.1.18.3.s390x",
"SUSE Manager Server Module 4.3:golang-github-QubitProducts-exporter_exporter-0.4.0-150000.1.18.3.x86_64",
"SUSE Manager Server Module 4.3:golang-github-lusitaniae-apache_exporter-1.0.0-150000.1.17.2.aarch64",
"SUSE Manager Server Module 4.3:golang-github-lusitaniae-apache_exporter-1.0.0-150000.1.17.2.ppc64le",
"SUSE Manager Server Module 4.3:golang-github-lusitaniae-apache_exporter-1.0.0-150000.1.17.2.s390x",
"SUSE Manager Server Module 4.3:golang-github-lusitaniae-apache_exporter-1.0.0-150000.1.17.2.x86_64",
"openSUSE Leap 15.4:golang-github-QubitProducts-exporter_exporter-0.4.0-150000.1.18.3.aarch64",
"openSUSE Leap 15.4:golang-github-QubitProducts-exporter_exporter-0.4.0-150000.1.18.3.ppc64le",
"openSUSE Leap 15.4:golang-github-QubitProducts-exporter_exporter-0.4.0-150000.1.18.3.s390x",
"openSUSE Leap 15.4:golang-github-QubitProducts-exporter_exporter-0.4.0-150000.1.18.3.x86_64",
"openSUSE Leap 15.4:golang-github-lusitaniae-apache_exporter-1.0.0-150000.1.17.2.aarch64",
"openSUSE Leap 15.4:golang-github-lusitaniae-apache_exporter-1.0.0-150000.1.17.2.ppc64le",
"openSUSE Leap 15.4:golang-github-lusitaniae-apache_exporter-1.0.0-150000.1.17.2.s390x",
"openSUSE Leap 15.4:golang-github-lusitaniae-apache_exporter-1.0.0-150000.1.17.2.x86_64",
"openSUSE Leap 15.4:prometheus-blackbox_exporter-0.24.0-150000.1.23.3.aarch64",
"openSUSE Leap 15.4:prometheus-blackbox_exporter-0.24.0-150000.1.23.3.ppc64le",
"openSUSE Leap 15.4:prometheus-blackbox_exporter-0.24.0-150000.1.23.3.s390x",
"openSUSE Leap 15.4:prometheus-blackbox_exporter-0.24.0-150000.1.23.3.x86_64",
"openSUSE Leap 15.4:prometheus-postgres_exporter-0.10.1-150000.1.14.3.aarch64",
"openSUSE Leap 15.4:prometheus-postgres_exporter-0.10.1-150000.1.14.3.ppc64le",
"openSUSE Leap 15.4:prometheus-postgres_exporter-0.10.1-150000.1.14.3.s390x",
"openSUSE Leap 15.4:prometheus-postgres_exporter-0.10.1-150000.1.14.3.x86_64",
"openSUSE Leap 15.4:spacecmd-4.3.23-150000.3.104.2.noarch",
"openSUSE Leap 15.4:supportutils-plugin-susemanager-client-4.3.3-150000.3.21.2.noarch",
"openSUSE Leap 15.5:golang-github-QubitProducts-exporter_exporter-0.4.0-150000.1.18.3.aarch64",
"openSUSE Leap 15.5:golang-github-QubitProducts-exporter_exporter-0.4.0-150000.1.18.3.ppc64le",
"openSUSE Leap 15.5:golang-github-QubitProducts-exporter_exporter-0.4.0-150000.1.18.3.s390x",
"openSUSE Leap 15.5:golang-github-QubitProducts-exporter_exporter-0.4.0-150000.1.18.3.x86_64",
"openSUSE Leap 15.5:golang-github-lusitaniae-apache_exporter-1.0.0-150000.1.17.2.aarch64",
"openSUSE Leap 15.5:golang-github-lusitaniae-apache_exporter-1.0.0-150000.1.17.2.ppc64le",
"openSUSE Leap 15.5:golang-github-lusitaniae-apache_exporter-1.0.0-150000.1.17.2.s390x",
"openSUSE Leap 15.5:golang-github-lusitaniae-apache_exporter-1.0.0-150000.1.17.2.x86_64",
"openSUSE Leap 15.5:prometheus-blackbox_exporter-0.24.0-150000.1.23.3.aarch64",
"openSUSE Leap 15.5:prometheus-blackbox_exporter-0.24.0-150000.1.23.3.ppc64le",
"openSUSE Leap 15.5:prometheus-blackbox_exporter-0.24.0-150000.1.23.3.s390x",
"openSUSE Leap 15.5:prometheus-blackbox_exporter-0.24.0-150000.1.23.3.x86_64",
"openSUSE Leap 15.5:prometheus-postgres_exporter-0.10.1-150000.1.14.3.aarch64",
"openSUSE Leap 15.5:prometheus-postgres_exporter-0.10.1-150000.1.14.3.ppc64le",
"openSUSE Leap 15.5:prometheus-postgres_exporter-0.10.1-150000.1.14.3.s390x",
"openSUSE Leap 15.5:prometheus-postgres_exporter-0.10.1-150000.1.14.3.x86_64",
"openSUSE Leap 15.5:spacecmd-4.3.23-150000.3.104.2.noarch",
"openSUSE Leap 15.5:supportutils-plugin-susemanager-client-4.3.3-150000.3.21.2.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2023-09-28T11:43:24Z",
"details": "important"
}
],
"title": "CVE-2022-46146"
},
{
"cve": "CVE-2023-29409",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-29409"
}
],
"notes": [
{
"category": "general",
"text": "Extremely large RSA keys in certificate chains can cause a client/server to expend significant CPU time verifying signatures. With fix, the size of RSA keys transmitted during handshakes is restricted to \u003c= 8192 bits. Based on a survey of publicly trusted RSA keys, there are currently only three certificates in circulation with keys larger than this, and all three appear to be test certificates that are not actively deployed. It is possible there are larger keys in use in private PKIs, but we target the web PKI, so causing breakage here in the interests of increasing the default safety of users of crypto/tls seems reasonable.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Manager Client Tools 15:firewalld-prometheus-config-0.1-150000.3.50.3.aarch64",
"SUSE Manager Client Tools 15:firewalld-prometheus-config-0.1-150000.3.50.3.ppc64le",
"SUSE Manager Client Tools 15:firewalld-prometheus-config-0.1-150000.3.50.3.s390x",
"SUSE Manager Client Tools 15:firewalld-prometheus-config-0.1-150000.3.50.3.x86_64",
"SUSE Manager Client Tools 15:golang-github-QubitProducts-exporter_exporter-0.4.0-150000.1.18.3.aarch64",
"SUSE Manager Client Tools 15:golang-github-QubitProducts-exporter_exporter-0.4.0-150000.1.18.3.ppc64le",
"SUSE Manager Client Tools 15:golang-github-QubitProducts-exporter_exporter-0.4.0-150000.1.18.3.s390x",
"SUSE Manager Client Tools 15:golang-github-QubitProducts-exporter_exporter-0.4.0-150000.1.18.3.x86_64",
"SUSE Manager Client Tools 15:golang-github-lusitaniae-apache_exporter-1.0.0-150000.1.17.2.aarch64",
"SUSE Manager Client Tools 15:golang-github-lusitaniae-apache_exporter-1.0.0-150000.1.17.2.ppc64le",
"SUSE Manager Client Tools 15:golang-github-lusitaniae-apache_exporter-1.0.0-150000.1.17.2.s390x",
"SUSE Manager Client Tools 15:golang-github-lusitaniae-apache_exporter-1.0.0-150000.1.17.2.x86_64",
"SUSE Manager Client Tools 15:golang-github-prometheus-prometheus-2.45.0-150000.3.50.3.aarch64",
"SUSE Manager Client Tools 15:golang-github-prometheus-prometheus-2.45.0-150000.3.50.3.ppc64le",
"SUSE Manager Client Tools 15:golang-github-prometheus-prometheus-2.45.0-150000.3.50.3.s390x",
"SUSE Manager Client Tools 15:golang-github-prometheus-prometheus-2.45.0-150000.3.50.3.x86_64",
"SUSE Manager Client Tools 15:grafana-9.5.5-150000.1.54.3.aarch64",
"SUSE Manager Client Tools 15:grafana-9.5.5-150000.1.54.3.ppc64le",
"SUSE Manager Client Tools 15:grafana-9.5.5-150000.1.54.3.s390x",
"SUSE Manager Client Tools 15:grafana-9.5.5-150000.1.54.3.x86_64",
"SUSE Manager Client Tools 15:prometheus-blackbox_exporter-0.24.0-150000.1.23.3.aarch64",
"SUSE Manager Client Tools 15:prometheus-blackbox_exporter-0.24.0-150000.1.23.3.ppc64le",
"SUSE Manager Client Tools 15:prometheus-blackbox_exporter-0.24.0-150000.1.23.3.s390x",
"SUSE Manager Client Tools 15:prometheus-blackbox_exporter-0.24.0-150000.1.23.3.x86_64",
"SUSE Manager Client Tools 15:prometheus-postgres_exporter-0.10.1-150000.1.14.3.aarch64",
"SUSE Manager Client Tools 15:prometheus-postgres_exporter-0.10.1-150000.1.14.3.ppc64le",
"SUSE Manager Client Tools 15:prometheus-postgres_exporter-0.10.1-150000.1.14.3.s390x",
"SUSE Manager Client Tools 15:prometheus-postgres_exporter-0.10.1-150000.1.14.3.x86_64",
"SUSE Manager Client Tools 15:python3-pyvmomi-6.7.3-150000.1.6.2.noarch",
"SUSE Manager Client Tools 15:python3-uyuni-common-libs-4.3.9-150000.1.36.2.aarch64",
"SUSE Manager Client Tools 15:python3-uyuni-common-libs-4.3.9-150000.1.36.2.ppc64le",
"SUSE Manager Client Tools 15:python3-uyuni-common-libs-4.3.9-150000.1.36.2.s390x",
"SUSE Manager Client Tools 15:python3-uyuni-common-libs-4.3.9-150000.1.36.2.x86_64",
"SUSE Manager Client Tools 15:spacecmd-4.3.23-150000.3.104.2.noarch",
"SUSE Manager Client Tools 15:supportutils-plugin-susemanager-client-4.3.3-150000.3.21.2.noarch",
"SUSE Manager Client Tools for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-150000.1.18.3.aarch64",
"SUSE Manager Client Tools for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-150000.1.18.3.s390x",
"SUSE Manager Client Tools for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-150000.1.18.3.x86_64",
"SUSE Manager Client Tools for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-150000.1.23.3.aarch64",
"SUSE Manager Client Tools for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-150000.1.23.3.s390x",
"SUSE Manager Client Tools for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-150000.1.23.3.x86_64",
"SUSE Manager Proxy Module 4.2:golang-github-QubitProducts-exporter_exporter-0.4.0-150000.1.18.3.aarch64",
"SUSE Manager Proxy Module 4.2:golang-github-QubitProducts-exporter_exporter-0.4.0-150000.1.18.3.ppc64le",
"SUSE Manager Proxy Module 4.2:golang-github-QubitProducts-exporter_exporter-0.4.0-150000.1.18.3.s390x",
"SUSE Manager Proxy Module 4.2:golang-github-QubitProducts-exporter_exporter-0.4.0-150000.1.18.3.x86_64",
"SUSE Manager Proxy Module 4.2:golang-github-lusitaniae-apache_exporter-1.0.0-150000.1.17.2.aarch64",
"SUSE Manager Proxy Module 4.2:golang-github-lusitaniae-apache_exporter-1.0.0-150000.1.17.2.ppc64le",
"SUSE Manager Proxy Module 4.2:golang-github-lusitaniae-apache_exporter-1.0.0-150000.1.17.2.s390x",
"SUSE Manager Proxy Module 4.2:golang-github-lusitaniae-apache_exporter-1.0.0-150000.1.17.2.x86_64",
"SUSE Manager Proxy Module 4.2:prometheus-blackbox_exporter-0.24.0-150000.1.23.3.aarch64",
"SUSE Manager Proxy Module 4.2:prometheus-blackbox_exporter-0.24.0-150000.1.23.3.ppc64le",
"SUSE Manager Proxy Module 4.2:prometheus-blackbox_exporter-0.24.0-150000.1.23.3.s390x",
"SUSE Manager Proxy Module 4.2:prometheus-blackbox_exporter-0.24.0-150000.1.23.3.x86_64",
"SUSE Manager Proxy Module 4.3:golang-github-QubitProducts-exporter_exporter-0.4.0-150000.1.18.3.aarch64",
"SUSE Manager Proxy Module 4.3:golang-github-QubitProducts-exporter_exporter-0.4.0-150000.1.18.3.ppc64le",
"SUSE Manager Proxy Module 4.3:golang-github-QubitProducts-exporter_exporter-0.4.0-150000.1.18.3.s390x",
"SUSE Manager Proxy Module 4.3:golang-github-QubitProducts-exporter_exporter-0.4.0-150000.1.18.3.x86_64",
"SUSE Manager Proxy Module 4.3:golang-github-lusitaniae-apache_exporter-1.0.0-150000.1.17.2.aarch64",
"SUSE Manager Proxy Module 4.3:golang-github-lusitaniae-apache_exporter-1.0.0-150000.1.17.2.ppc64le",
"SUSE Manager Proxy Module 4.3:golang-github-lusitaniae-apache_exporter-1.0.0-150000.1.17.2.s390x",
"SUSE Manager Proxy Module 4.3:golang-github-lusitaniae-apache_exporter-1.0.0-150000.1.17.2.x86_64",
"SUSE Manager Proxy Module 4.3:prometheus-blackbox_exporter-0.24.0-150000.1.23.3.aarch64",
"SUSE Manager Proxy Module 4.3:prometheus-blackbox_exporter-0.24.0-150000.1.23.3.ppc64le",
"SUSE Manager Proxy Module 4.3:prometheus-blackbox_exporter-0.24.0-150000.1.23.3.s390x",
"SUSE Manager Proxy Module 4.3:prometheus-blackbox_exporter-0.24.0-150000.1.23.3.x86_64",
"SUSE Manager Server Module 4.2:golang-github-QubitProducts-exporter_exporter-0.4.0-150000.1.18.3.aarch64",
"SUSE Manager Server Module 4.2:golang-github-QubitProducts-exporter_exporter-0.4.0-150000.1.18.3.ppc64le",
"SUSE Manager Server Module 4.2:golang-github-QubitProducts-exporter_exporter-0.4.0-150000.1.18.3.s390x",
"SUSE Manager Server Module 4.2:golang-github-QubitProducts-exporter_exporter-0.4.0-150000.1.18.3.x86_64",
"SUSE Manager Server Module 4.2:golang-github-lusitaniae-apache_exporter-1.0.0-150000.1.17.2.aarch64",
"SUSE Manager Server Module 4.2:golang-github-lusitaniae-apache_exporter-1.0.0-150000.1.17.2.ppc64le",
"SUSE Manager Server Module 4.2:golang-github-lusitaniae-apache_exporter-1.0.0-150000.1.17.2.s390x",
"SUSE Manager Server Module 4.2:golang-github-lusitaniae-apache_exporter-1.0.0-150000.1.17.2.x86_64",
"SUSE Manager Server Module 4.2:prometheus-postgres_exporter-0.10.1-150000.1.14.3.aarch64",
"SUSE Manager Server Module 4.2:prometheus-postgres_exporter-0.10.1-150000.1.14.3.ppc64le",
"SUSE Manager Server Module 4.2:prometheus-postgres_exporter-0.10.1-150000.1.14.3.s390x",
"SUSE Manager Server Module 4.2:prometheus-postgres_exporter-0.10.1-150000.1.14.3.x86_64",
"SUSE Manager Server Module 4.3:golang-github-QubitProducts-exporter_exporter-0.4.0-150000.1.18.3.aarch64",
"SUSE Manager Server Module 4.3:golang-github-QubitProducts-exporter_exporter-0.4.0-150000.1.18.3.ppc64le",
"SUSE Manager Server Module 4.3:golang-github-QubitProducts-exporter_exporter-0.4.0-150000.1.18.3.s390x",
"SUSE Manager Server Module 4.3:golang-github-QubitProducts-exporter_exporter-0.4.0-150000.1.18.3.x86_64",
"SUSE Manager Server Module 4.3:golang-github-lusitaniae-apache_exporter-1.0.0-150000.1.17.2.aarch64",
"SUSE Manager Server Module 4.3:golang-github-lusitaniae-apache_exporter-1.0.0-150000.1.17.2.ppc64le",
"SUSE Manager Server Module 4.3:golang-github-lusitaniae-apache_exporter-1.0.0-150000.1.17.2.s390x",
"SUSE Manager Server Module 4.3:golang-github-lusitaniae-apache_exporter-1.0.0-150000.1.17.2.x86_64",
"openSUSE Leap 15.4:golang-github-QubitProducts-exporter_exporter-0.4.0-150000.1.18.3.aarch64",
"openSUSE Leap 15.4:golang-github-QubitProducts-exporter_exporter-0.4.0-150000.1.18.3.ppc64le",
"openSUSE Leap 15.4:golang-github-QubitProducts-exporter_exporter-0.4.0-150000.1.18.3.s390x",
"openSUSE Leap 15.4:golang-github-QubitProducts-exporter_exporter-0.4.0-150000.1.18.3.x86_64",
"openSUSE Leap 15.4:golang-github-lusitaniae-apache_exporter-1.0.0-150000.1.17.2.aarch64",
"openSUSE Leap 15.4:golang-github-lusitaniae-apache_exporter-1.0.0-150000.1.17.2.ppc64le",
"openSUSE Leap 15.4:golang-github-lusitaniae-apache_exporter-1.0.0-150000.1.17.2.s390x",
"openSUSE Leap 15.4:golang-github-lusitaniae-apache_exporter-1.0.0-150000.1.17.2.x86_64",
"openSUSE Leap 15.4:prometheus-blackbox_exporter-0.24.0-150000.1.23.3.aarch64",
"openSUSE Leap 15.4:prometheus-blackbox_exporter-0.24.0-150000.1.23.3.ppc64le",
"openSUSE Leap 15.4:prometheus-blackbox_exporter-0.24.0-150000.1.23.3.s390x",
"openSUSE Leap 15.4:prometheus-blackbox_exporter-0.24.0-150000.1.23.3.x86_64",
"openSUSE Leap 15.4:prometheus-postgres_exporter-0.10.1-150000.1.14.3.aarch64",
"openSUSE Leap 15.4:prometheus-postgres_exporter-0.10.1-150000.1.14.3.ppc64le",
"openSUSE Leap 15.4:prometheus-postgres_exporter-0.10.1-150000.1.14.3.s390x",
"openSUSE Leap 15.4:prometheus-postgres_exporter-0.10.1-150000.1.14.3.x86_64",
"openSUSE Leap 15.4:spacecmd-4.3.23-150000.3.104.2.noarch",
"openSUSE Leap 15.4:supportutils-plugin-susemanager-client-4.3.3-150000.3.21.2.noarch",
"openSUSE Leap 15.5:golang-github-QubitProducts-exporter_exporter-0.4.0-150000.1.18.3.aarch64",
"openSUSE Leap 15.5:golang-github-QubitProducts-exporter_exporter-0.4.0-150000.1.18.3.ppc64le",
"openSUSE Leap 15.5:golang-github-QubitProducts-exporter_exporter-0.4.0-150000.1.18.3.s390x",
"openSUSE Leap 15.5:golang-github-QubitProducts-exporter_exporter-0.4.0-150000.1.18.3.x86_64",
"openSUSE Leap 15.5:golang-github-lusitaniae-apache_exporter-1.0.0-150000.1.17.2.aarch64",
"openSUSE Leap 15.5:golang-github-lusitaniae-apache_exporter-1.0.0-150000.1.17.2.ppc64le",
"openSUSE Leap 15.5:golang-github-lusitaniae-apache_exporter-1.0.0-150000.1.17.2.s390x",
"openSUSE Leap 15.5:golang-github-lusitaniae-apache_exporter-1.0.0-150000.1.17.2.x86_64",
"openSUSE Leap 15.5:prometheus-blackbox_exporter-0.24.0-150000.1.23.3.aarch64",
"openSUSE Leap 15.5:prometheus-blackbox_exporter-0.24.0-150000.1.23.3.ppc64le",
"openSUSE Leap 15.5:prometheus-blackbox_exporter-0.24.0-150000.1.23.3.s390x",
"openSUSE Leap 15.5:prometheus-blackbox_exporter-0.24.0-150000.1.23.3.x86_64",
"openSUSE Leap 15.5:prometheus-postgres_exporter-0.10.1-150000.1.14.3.aarch64",
"openSUSE Leap 15.5:prometheus-postgres_exporter-0.10.1-150000.1.14.3.ppc64le",
"openSUSE Leap 15.5:prometheus-postgres_exporter-0.10.1-150000.1.14.3.s390x",
"openSUSE Leap 15.5:prometheus-postgres_exporter-0.10.1-150000.1.14.3.x86_64",
"openSUSE Leap 15.5:spacecmd-4.3.23-150000.3.104.2.noarch",
"openSUSE Leap 15.5:supportutils-plugin-susemanager-client-4.3.3-150000.3.21.2.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-29409",
"url": "https://www.suse.com/security/cve/CVE-2023-29409"
},
{
"category": "external",
"summary": "SUSE Bug 1213880 for CVE-2023-29409",
"url": "https://bugzilla.suse.com/1213880"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Manager Client Tools 15:firewalld-prometheus-config-0.1-150000.3.50.3.aarch64",
"SUSE Manager Client Tools 15:firewalld-prometheus-config-0.1-150000.3.50.3.ppc64le",
"SUSE Manager Client Tools 15:firewalld-prometheus-config-0.1-150000.3.50.3.s390x",
"SUSE Manager Client Tools 15:firewalld-prometheus-config-0.1-150000.3.50.3.x86_64",
"SUSE Manager Client Tools 15:golang-github-QubitProducts-exporter_exporter-0.4.0-150000.1.18.3.aarch64",
"SUSE Manager Client Tools 15:golang-github-QubitProducts-exporter_exporter-0.4.0-150000.1.18.3.ppc64le",
"SUSE Manager Client Tools 15:golang-github-QubitProducts-exporter_exporter-0.4.0-150000.1.18.3.s390x",
"SUSE Manager Client Tools 15:golang-github-QubitProducts-exporter_exporter-0.4.0-150000.1.18.3.x86_64",
"SUSE Manager Client Tools 15:golang-github-lusitaniae-apache_exporter-1.0.0-150000.1.17.2.aarch64",
"SUSE Manager Client Tools 15:golang-github-lusitaniae-apache_exporter-1.0.0-150000.1.17.2.ppc64le",
"SUSE Manager Client Tools 15:golang-github-lusitaniae-apache_exporter-1.0.0-150000.1.17.2.s390x",
"SUSE Manager Client Tools 15:golang-github-lusitaniae-apache_exporter-1.0.0-150000.1.17.2.x86_64",
"SUSE Manager Client Tools 15:golang-github-prometheus-prometheus-2.45.0-150000.3.50.3.aarch64",
"SUSE Manager Client Tools 15:golang-github-prometheus-prometheus-2.45.0-150000.3.50.3.ppc64le",
"SUSE Manager Client Tools 15:golang-github-prometheus-prometheus-2.45.0-150000.3.50.3.s390x",
"SUSE Manager Client Tools 15:golang-github-prometheus-prometheus-2.45.0-150000.3.50.3.x86_64",
"SUSE Manager Client Tools 15:grafana-9.5.5-150000.1.54.3.aarch64",
"SUSE Manager Client Tools 15:grafana-9.5.5-150000.1.54.3.ppc64le",
"SUSE Manager Client Tools 15:grafana-9.5.5-150000.1.54.3.s390x",
"SUSE Manager Client Tools 15:grafana-9.5.5-150000.1.54.3.x86_64",
"SUSE Manager Client Tools 15:prometheus-blackbox_exporter-0.24.0-150000.1.23.3.aarch64",
"SUSE Manager Client Tools 15:prometheus-blackbox_exporter-0.24.0-150000.1.23.3.ppc64le",
"SUSE Manager Client Tools 15:prometheus-blackbox_exporter-0.24.0-150000.1.23.3.s390x",
"SUSE Manager Client Tools 15:prometheus-blackbox_exporter-0.24.0-150000.1.23.3.x86_64",
"SUSE Manager Client Tools 15:prometheus-postgres_exporter-0.10.1-150000.1.14.3.aarch64",
"SUSE Manager Client Tools 15:prometheus-postgres_exporter-0.10.1-150000.1.14.3.ppc64le",
"SUSE Manager Client Tools 15:prometheus-postgres_exporter-0.10.1-150000.1.14.3.s390x",
"SUSE Manager Client Tools 15:prometheus-postgres_exporter-0.10.1-150000.1.14.3.x86_64",
"SUSE Manager Client Tools 15:python3-pyvmomi-6.7.3-150000.1.6.2.noarch",
"SUSE Manager Client Tools 15:python3-uyuni-common-libs-4.3.9-150000.1.36.2.aarch64",
"SUSE Manager Client Tools 15:python3-uyuni-common-libs-4.3.9-150000.1.36.2.ppc64le",
"SUSE Manager Client Tools 15:python3-uyuni-common-libs-4.3.9-150000.1.36.2.s390x",
"SUSE Manager Client Tools 15:python3-uyuni-common-libs-4.3.9-150000.1.36.2.x86_64",
"SUSE Manager Client Tools 15:spacecmd-4.3.23-150000.3.104.2.noarch",
"SUSE Manager Client Tools 15:supportutils-plugin-susemanager-client-4.3.3-150000.3.21.2.noarch",
"SUSE Manager Client Tools for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-150000.1.18.3.aarch64",
"SUSE Manager Client Tools for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-150000.1.18.3.s390x",
"SUSE Manager Client Tools for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-150000.1.18.3.x86_64",
"SUSE Manager Client Tools for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-150000.1.23.3.aarch64",
"SUSE Manager Client Tools for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-150000.1.23.3.s390x",
"SUSE Manager Client Tools for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-150000.1.23.3.x86_64",
"SUSE Manager Proxy Module 4.2:golang-github-QubitProducts-exporter_exporter-0.4.0-150000.1.18.3.aarch64",
"SUSE Manager Proxy Module 4.2:golang-github-QubitProducts-exporter_exporter-0.4.0-150000.1.18.3.ppc64le",
"SUSE Manager Proxy Module 4.2:golang-github-QubitProducts-exporter_exporter-0.4.0-150000.1.18.3.s390x",
"SUSE Manager Proxy Module 4.2:golang-github-QubitProducts-exporter_exporter-0.4.0-150000.1.18.3.x86_64",
"SUSE Manager Proxy Module 4.2:golang-github-lusitaniae-apache_exporter-1.0.0-150000.1.17.2.aarch64",
"SUSE Manager Proxy Module 4.2:golang-github-lusitaniae-apache_exporter-1.0.0-150000.1.17.2.ppc64le",
"SUSE Manager Proxy Module 4.2:golang-github-lusitaniae-apache_exporter-1.0.0-150000.1.17.2.s390x",
"SUSE Manager Proxy Module 4.2:golang-github-lusitaniae-apache_exporter-1.0.0-150000.1.17.2.x86_64",
"SUSE Manager Proxy Module 4.2:prometheus-blackbox_exporter-0.24.0-150000.1.23.3.aarch64",
"SUSE Manager Proxy Module 4.2:prometheus-blackbox_exporter-0.24.0-150000.1.23.3.ppc64le",
"SUSE Manager Proxy Module 4.2:prometheus-blackbox_exporter-0.24.0-150000.1.23.3.s390x",
"SUSE Manager Proxy Module 4.2:prometheus-blackbox_exporter-0.24.0-150000.1.23.3.x86_64",
"SUSE Manager Proxy Module 4.3:golang-github-QubitProducts-exporter_exporter-0.4.0-150000.1.18.3.aarch64",
"SUSE Manager Proxy Module 4.3:golang-github-QubitProducts-exporter_exporter-0.4.0-150000.1.18.3.ppc64le",
"SUSE Manager Proxy Module 4.3:golang-github-QubitProducts-exporter_exporter-0.4.0-150000.1.18.3.s390x",
"SUSE Manager Proxy Module 4.3:golang-github-QubitProducts-exporter_exporter-0.4.0-150000.1.18.3.x86_64",
"SUSE Manager Proxy Module 4.3:golang-github-lusitaniae-apache_exporter-1.0.0-150000.1.17.2.aarch64",
"SUSE Manager Proxy Module 4.3:golang-github-lusitaniae-apache_exporter-1.0.0-150000.1.17.2.ppc64le",
"SUSE Manager Proxy Module 4.3:golang-github-lusitaniae-apache_exporter-1.0.0-150000.1.17.2.s390x",
"SUSE Manager Proxy Module 4.3:golang-github-lusitaniae-apache_exporter-1.0.0-150000.1.17.2.x86_64",
"SUSE Manager Proxy Module 4.3:prometheus-blackbox_exporter-0.24.0-150000.1.23.3.aarch64",
"SUSE Manager Proxy Module 4.3:prometheus-blackbox_exporter-0.24.0-150000.1.23.3.ppc64le",
"SUSE Manager Proxy Module 4.3:prometheus-blackbox_exporter-0.24.0-150000.1.23.3.s390x",
"SUSE Manager Proxy Module 4.3:prometheus-blackbox_exporter-0.24.0-150000.1.23.3.x86_64",
"SUSE Manager Server Module 4.2:golang-github-QubitProducts-exporter_exporter-0.4.0-150000.1.18.3.aarch64",
"SUSE Manager Server Module 4.2:golang-github-QubitProducts-exporter_exporter-0.4.0-150000.1.18.3.ppc64le",
"SUSE Manager Server Module 4.2:golang-github-QubitProducts-exporter_exporter-0.4.0-150000.1.18.3.s390x",
"SUSE Manager Server Module 4.2:golang-github-QubitProducts-exporter_exporter-0.4.0-150000.1.18.3.x86_64",
"SUSE Manager Server Module 4.2:golang-github-lusitaniae-apache_exporter-1.0.0-150000.1.17.2.aarch64",
"SUSE Manager Server Module 4.2:golang-github-lusitaniae-apache_exporter-1.0.0-150000.1.17.2.ppc64le",
"SUSE Manager Server Module 4.2:golang-github-lusitaniae-apache_exporter-1.0.0-150000.1.17.2.s390x",
"SUSE Manager Server Module 4.2:golang-github-lusitaniae-apache_exporter-1.0.0-150000.1.17.2.x86_64",
"SUSE Manager Server Module 4.2:prometheus-postgres_exporter-0.10.1-150000.1.14.3.aarch64",
"SUSE Manager Server Module 4.2:prometheus-postgres_exporter-0.10.1-150000.1.14.3.ppc64le",
"SUSE Manager Server Module 4.2:prometheus-postgres_exporter-0.10.1-150000.1.14.3.s390x",
"SUSE Manager Server Module 4.2:prometheus-postgres_exporter-0.10.1-150000.1.14.3.x86_64",
"SUSE Manager Server Module 4.3:golang-github-QubitProducts-exporter_exporter-0.4.0-150000.1.18.3.aarch64",
"SUSE Manager Server Module 4.3:golang-github-QubitProducts-exporter_exporter-0.4.0-150000.1.18.3.ppc64le",
"SUSE Manager Server Module 4.3:golang-github-QubitProducts-exporter_exporter-0.4.0-150000.1.18.3.s390x",
"SUSE Manager Server Module 4.3:golang-github-QubitProducts-exporter_exporter-0.4.0-150000.1.18.3.x86_64",
"SUSE Manager Server Module 4.3:golang-github-lusitaniae-apache_exporter-1.0.0-150000.1.17.2.aarch64",
"SUSE Manager Server Module 4.3:golang-github-lusitaniae-apache_exporter-1.0.0-150000.1.17.2.ppc64le",
"SUSE Manager Server Module 4.3:golang-github-lusitaniae-apache_exporter-1.0.0-150000.1.17.2.s390x",
"SUSE Manager Server Module 4.3:golang-github-lusitaniae-apache_exporter-1.0.0-150000.1.17.2.x86_64",
"openSUSE Leap 15.4:golang-github-QubitProducts-exporter_exporter-0.4.0-150000.1.18.3.aarch64",
"openSUSE Leap 15.4:golang-github-QubitProducts-exporter_exporter-0.4.0-150000.1.18.3.ppc64le",
"openSUSE Leap 15.4:golang-github-QubitProducts-exporter_exporter-0.4.0-150000.1.18.3.s390x",
"openSUSE Leap 15.4:golang-github-QubitProducts-exporter_exporter-0.4.0-150000.1.18.3.x86_64",
"openSUSE Leap 15.4:golang-github-lusitaniae-apache_exporter-1.0.0-150000.1.17.2.aarch64",
"openSUSE Leap 15.4:golang-github-lusitaniae-apache_exporter-1.0.0-150000.1.17.2.ppc64le",
"openSUSE Leap 15.4:golang-github-lusitaniae-apache_exporter-1.0.0-150000.1.17.2.s390x",
"openSUSE Leap 15.4:golang-github-lusitaniae-apache_exporter-1.0.0-150000.1.17.2.x86_64",
"openSUSE Leap 15.4:prometheus-blackbox_exporter-0.24.0-150000.1.23.3.aarch64",
"openSUSE Leap 15.4:prometheus-blackbox_exporter-0.24.0-150000.1.23.3.ppc64le",
"openSUSE Leap 15.4:prometheus-blackbox_exporter-0.24.0-150000.1.23.3.s390x",
"openSUSE Leap 15.4:prometheus-blackbox_exporter-0.24.0-150000.1.23.3.x86_64",
"openSUSE Leap 15.4:prometheus-postgres_exporter-0.10.1-150000.1.14.3.aarch64",
"openSUSE Leap 15.4:prometheus-postgres_exporter-0.10.1-150000.1.14.3.ppc64le",
"openSUSE Leap 15.4:prometheus-postgres_exporter-0.10.1-150000.1.14.3.s390x",
"openSUSE Leap 15.4:prometheus-postgres_exporter-0.10.1-150000.1.14.3.x86_64",
"openSUSE Leap 15.4:spacecmd-4.3.23-150000.3.104.2.noarch",
"openSUSE Leap 15.4:supportutils-plugin-susemanager-client-4.3.3-150000.3.21.2.noarch",
"openSUSE Leap 15.5:golang-github-QubitProducts-exporter_exporter-0.4.0-150000.1.18.3.aarch64",
"openSUSE Leap 15.5:golang-github-QubitProducts-exporter_exporter-0.4.0-150000.1.18.3.ppc64le",
"openSUSE Leap 15.5:golang-github-QubitProducts-exporter_exporter-0.4.0-150000.1.18.3.s390x",
"openSUSE Leap 15.5:golang-github-QubitProducts-exporter_exporter-0.4.0-150000.1.18.3.x86_64",
"openSUSE Leap 15.5:golang-github-lusitaniae-apache_exporter-1.0.0-150000.1.17.2.aarch64",
"openSUSE Leap 15.5:golang-github-lusitaniae-apache_exporter-1.0.0-150000.1.17.2.ppc64le",
"openSUSE Leap 15.5:golang-github-lusitaniae-apache_exporter-1.0.0-150000.1.17.2.s390x",
"openSUSE Leap 15.5:golang-github-lusitaniae-apache_exporter-1.0.0-150000.1.17.2.x86_64",
"openSUSE Leap 15.5:prometheus-blackbox_exporter-0.24.0-150000.1.23.3.aarch64",
"openSUSE Leap 15.5:prometheus-blackbox_exporter-0.24.0-150000.1.23.3.ppc64le",
"openSUSE Leap 15.5:prometheus-blackbox_exporter-0.24.0-150000.1.23.3.s390x",
"openSUSE Leap 15.5:prometheus-blackbox_exporter-0.24.0-150000.1.23.3.x86_64",
"openSUSE Leap 15.5:prometheus-postgres_exporter-0.10.1-150000.1.14.3.aarch64",
"openSUSE Leap 15.5:prometheus-postgres_exporter-0.10.1-150000.1.14.3.ppc64le",
"openSUSE Leap 15.5:prometheus-postgres_exporter-0.10.1-150000.1.14.3.s390x",
"openSUSE Leap 15.5:prometheus-postgres_exporter-0.10.1-150000.1.14.3.x86_64",
"openSUSE Leap 15.5:spacecmd-4.3.23-150000.3.104.2.noarch",
"openSUSE Leap 15.5:supportutils-plugin-susemanager-client-4.3.3-150000.3.21.2.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Manager Client Tools 15:firewalld-prometheus-config-0.1-150000.3.50.3.aarch64",
"SUSE Manager Client Tools 15:firewalld-prometheus-config-0.1-150000.3.50.3.ppc64le",
"SUSE Manager Client Tools 15:firewalld-prometheus-config-0.1-150000.3.50.3.s390x",
"SUSE Manager Client Tools 15:firewalld-prometheus-config-0.1-150000.3.50.3.x86_64",
"SUSE Manager Client Tools 15:golang-github-QubitProducts-exporter_exporter-0.4.0-150000.1.18.3.aarch64",
"SUSE Manager Client Tools 15:golang-github-QubitProducts-exporter_exporter-0.4.0-150000.1.18.3.ppc64le",
"SUSE Manager Client Tools 15:golang-github-QubitProducts-exporter_exporter-0.4.0-150000.1.18.3.s390x",
"SUSE Manager Client Tools 15:golang-github-QubitProducts-exporter_exporter-0.4.0-150000.1.18.3.x86_64",
"SUSE Manager Client Tools 15:golang-github-lusitaniae-apache_exporter-1.0.0-150000.1.17.2.aarch64",
"SUSE Manager Client Tools 15:golang-github-lusitaniae-apache_exporter-1.0.0-150000.1.17.2.ppc64le",
"SUSE Manager Client Tools 15:golang-github-lusitaniae-apache_exporter-1.0.0-150000.1.17.2.s390x",
"SUSE Manager Client Tools 15:golang-github-lusitaniae-apache_exporter-1.0.0-150000.1.17.2.x86_64",
"SUSE Manager Client Tools 15:golang-github-prometheus-prometheus-2.45.0-150000.3.50.3.aarch64",
"SUSE Manager Client Tools 15:golang-github-prometheus-prometheus-2.45.0-150000.3.50.3.ppc64le",
"SUSE Manager Client Tools 15:golang-github-prometheus-prometheus-2.45.0-150000.3.50.3.s390x",
"SUSE Manager Client Tools 15:golang-github-prometheus-prometheus-2.45.0-150000.3.50.3.x86_64",
"SUSE Manager Client Tools 15:grafana-9.5.5-150000.1.54.3.aarch64",
"SUSE Manager Client Tools 15:grafana-9.5.5-150000.1.54.3.ppc64le",
"SUSE Manager Client Tools 15:grafana-9.5.5-150000.1.54.3.s390x",
"SUSE Manager Client Tools 15:grafana-9.5.5-150000.1.54.3.x86_64",
"SUSE Manager Client Tools 15:prometheus-blackbox_exporter-0.24.0-150000.1.23.3.aarch64",
"SUSE Manager Client Tools 15:prometheus-blackbox_exporter-0.24.0-150000.1.23.3.ppc64le",
"SUSE Manager Client Tools 15:prometheus-blackbox_exporter-0.24.0-150000.1.23.3.s390x",
"SUSE Manager Client Tools 15:prometheus-blackbox_exporter-0.24.0-150000.1.23.3.x86_64",
"SUSE Manager Client Tools 15:prometheus-postgres_exporter-0.10.1-150000.1.14.3.aarch64",
"SUSE Manager Client Tools 15:prometheus-postgres_exporter-0.10.1-150000.1.14.3.ppc64le",
"SUSE Manager Client Tools 15:prometheus-postgres_exporter-0.10.1-150000.1.14.3.s390x",
"SUSE Manager Client Tools 15:prometheus-postgres_exporter-0.10.1-150000.1.14.3.x86_64",
"SUSE Manager Client Tools 15:python3-pyvmomi-6.7.3-150000.1.6.2.noarch",
"SUSE Manager Client Tools 15:python3-uyuni-common-libs-4.3.9-150000.1.36.2.aarch64",
"SUSE Manager Client Tools 15:python3-uyuni-common-libs-4.3.9-150000.1.36.2.ppc64le",
"SUSE Manager Client Tools 15:python3-uyuni-common-libs-4.3.9-150000.1.36.2.s390x",
"SUSE Manager Client Tools 15:python3-uyuni-common-libs-4.3.9-150000.1.36.2.x86_64",
"SUSE Manager Client Tools 15:spacecmd-4.3.23-150000.3.104.2.noarch",
"SUSE Manager Client Tools 15:supportutils-plugin-susemanager-client-4.3.3-150000.3.21.2.noarch",
"SUSE Manager Client Tools for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-150000.1.18.3.aarch64",
"SUSE Manager Client Tools for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-150000.1.18.3.s390x",
"SUSE Manager Client Tools for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-150000.1.18.3.x86_64",
"SUSE Manager Client Tools for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-150000.1.23.3.aarch64",
"SUSE Manager Client Tools for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-150000.1.23.3.s390x",
"SUSE Manager Client Tools for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-150000.1.23.3.x86_64",
"SUSE Manager Proxy Module 4.2:golang-github-QubitProducts-exporter_exporter-0.4.0-150000.1.18.3.aarch64",
"SUSE Manager Proxy Module 4.2:golang-github-QubitProducts-exporter_exporter-0.4.0-150000.1.18.3.ppc64le",
"SUSE Manager Proxy Module 4.2:golang-github-QubitProducts-exporter_exporter-0.4.0-150000.1.18.3.s390x",
"SUSE Manager Proxy Module 4.2:golang-github-QubitProducts-exporter_exporter-0.4.0-150000.1.18.3.x86_64",
"SUSE Manager Proxy Module 4.2:golang-github-lusitaniae-apache_exporter-1.0.0-150000.1.17.2.aarch64",
"SUSE Manager Proxy Module 4.2:golang-github-lusitaniae-apache_exporter-1.0.0-150000.1.17.2.ppc64le",
"SUSE Manager Proxy Module 4.2:golang-github-lusitaniae-apache_exporter-1.0.0-150000.1.17.2.s390x",
"SUSE Manager Proxy Module 4.2:golang-github-lusitaniae-apache_exporter-1.0.0-150000.1.17.2.x86_64",
"SUSE Manager Proxy Module 4.2:prometheus-blackbox_exporter-0.24.0-150000.1.23.3.aarch64",
"SUSE Manager Proxy Module 4.2:prometheus-blackbox_exporter-0.24.0-150000.1.23.3.ppc64le",
"SUSE Manager Proxy Module 4.2:prometheus-blackbox_exporter-0.24.0-150000.1.23.3.s390x",
"SUSE Manager Proxy Module 4.2:prometheus-blackbox_exporter-0.24.0-150000.1.23.3.x86_64",
"SUSE Manager Proxy Module 4.3:golang-github-QubitProducts-exporter_exporter-0.4.0-150000.1.18.3.aarch64",
"SUSE Manager Proxy Module 4.3:golang-github-QubitProducts-exporter_exporter-0.4.0-150000.1.18.3.ppc64le",
"SUSE Manager Proxy Module 4.3:golang-github-QubitProducts-exporter_exporter-0.4.0-150000.1.18.3.s390x",
"SUSE Manager Proxy Module 4.3:golang-github-QubitProducts-exporter_exporter-0.4.0-150000.1.18.3.x86_64",
"SUSE Manager Proxy Module 4.3:golang-github-lusitaniae-apache_exporter-1.0.0-150000.1.17.2.aarch64",
"SUSE Manager Proxy Module 4.3:golang-github-lusitaniae-apache_exporter-1.0.0-150000.1.17.2.ppc64le",
"SUSE Manager Proxy Module 4.3:golang-github-lusitaniae-apache_exporter-1.0.0-150000.1.17.2.s390x",
"SUSE Manager Proxy Module 4.3:golang-github-lusitaniae-apache_exporter-1.0.0-150000.1.17.2.x86_64",
"SUSE Manager Proxy Module 4.3:prometheus-blackbox_exporter-0.24.0-150000.1.23.3.aarch64",
"SUSE Manager Proxy Module 4.3:prometheus-blackbox_exporter-0.24.0-150000.1.23.3.ppc64le",
"SUSE Manager Proxy Module 4.3:prometheus-blackbox_exporter-0.24.0-150000.1.23.3.s390x",
"SUSE Manager Proxy Module 4.3:prometheus-blackbox_exporter-0.24.0-150000.1.23.3.x86_64",
"SUSE Manager Server Module 4.2:golang-github-QubitProducts-exporter_exporter-0.4.0-150000.1.18.3.aarch64",
"SUSE Manager Server Module 4.2:golang-github-QubitProducts-exporter_exporter-0.4.0-150000.1.18.3.ppc64le",
"SUSE Manager Server Module 4.2:golang-github-QubitProducts-exporter_exporter-0.4.0-150000.1.18.3.s390x",
"SUSE Manager Server Module 4.2:golang-github-QubitProducts-exporter_exporter-0.4.0-150000.1.18.3.x86_64",
"SUSE Manager Server Module 4.2:golang-github-lusitaniae-apache_exporter-1.0.0-150000.1.17.2.aarch64",
"SUSE Manager Server Module 4.2:golang-github-lusitaniae-apache_exporter-1.0.0-150000.1.17.2.ppc64le",
"SUSE Manager Server Module 4.2:golang-github-lusitaniae-apache_exporter-1.0.0-150000.1.17.2.s390x",
"SUSE Manager Server Module 4.2:golang-github-lusitaniae-apache_exporter-1.0.0-150000.1.17.2.x86_64",
"SUSE Manager Server Module 4.2:prometheus-postgres_exporter-0.10.1-150000.1.14.3.aarch64",
"SUSE Manager Server Module 4.2:prometheus-postgres_exporter-0.10.1-150000.1.14.3.ppc64le",
"SUSE Manager Server Module 4.2:prometheus-postgres_exporter-0.10.1-150000.1.14.3.s390x",
"SUSE Manager Server Module 4.2:prometheus-postgres_exporter-0.10.1-150000.1.14.3.x86_64",
"SUSE Manager Server Module 4.3:golang-github-QubitProducts-exporter_exporter-0.4.0-150000.1.18.3.aarch64",
"SUSE Manager Server Module 4.3:golang-github-QubitProducts-exporter_exporter-0.4.0-150000.1.18.3.ppc64le",
"SUSE Manager Server Module 4.3:golang-github-QubitProducts-exporter_exporter-0.4.0-150000.1.18.3.s390x",
"SUSE Manager Server Module 4.3:golang-github-QubitProducts-exporter_exporter-0.4.0-150000.1.18.3.x86_64",
"SUSE Manager Server Module 4.3:golang-github-lusitaniae-apache_exporter-1.0.0-150000.1.17.2.aarch64",
"SUSE Manager Server Module 4.3:golang-github-lusitaniae-apache_exporter-1.0.0-150000.1.17.2.ppc64le",
"SUSE Manager Server Module 4.3:golang-github-lusitaniae-apache_exporter-1.0.0-150000.1.17.2.s390x",
"SUSE Manager Server Module 4.3:golang-github-lusitaniae-apache_exporter-1.0.0-150000.1.17.2.x86_64",
"openSUSE Leap 15.4:golang-github-QubitProducts-exporter_exporter-0.4.0-150000.1.18.3.aarch64",
"openSUSE Leap 15.4:golang-github-QubitProducts-exporter_exporter-0.4.0-150000.1.18.3.ppc64le",
"openSUSE Leap 15.4:golang-github-QubitProducts-exporter_exporter-0.4.0-150000.1.18.3.s390x",
"openSUSE Leap 15.4:golang-github-QubitProducts-exporter_exporter-0.4.0-150000.1.18.3.x86_64",
"openSUSE Leap 15.4:golang-github-lusitaniae-apache_exporter-1.0.0-150000.1.17.2.aarch64",
"openSUSE Leap 15.4:golang-github-lusitaniae-apache_exporter-1.0.0-150000.1.17.2.ppc64le",
"openSUSE Leap 15.4:golang-github-lusitaniae-apache_exporter-1.0.0-150000.1.17.2.s390x",
"openSUSE Leap 15.4:golang-github-lusitaniae-apache_exporter-1.0.0-150000.1.17.2.x86_64",
"openSUSE Leap 15.4:prometheus-blackbox_exporter-0.24.0-150000.1.23.3.aarch64",
"openSUSE Leap 15.4:prometheus-blackbox_exporter-0.24.0-150000.1.23.3.ppc64le",
"openSUSE Leap 15.4:prometheus-blackbox_exporter-0.24.0-150000.1.23.3.s390x",
"openSUSE Leap 15.4:prometheus-blackbox_exporter-0.24.0-150000.1.23.3.x86_64",
"openSUSE Leap 15.4:prometheus-postgres_exporter-0.10.1-150000.1.14.3.aarch64",
"openSUSE Leap 15.4:prometheus-postgres_exporter-0.10.1-150000.1.14.3.ppc64le",
"openSUSE Leap 15.4:prometheus-postgres_exporter-0.10.1-150000.1.14.3.s390x",
"openSUSE Leap 15.4:prometheus-postgres_exporter-0.10.1-150000.1.14.3.x86_64",
"openSUSE Leap 15.4:spacecmd-4.3.23-150000.3.104.2.noarch",
"openSUSE Leap 15.4:supportutils-plugin-susemanager-client-4.3.3-150000.3.21.2.noarch",
"openSUSE Leap 15.5:golang-github-QubitProducts-exporter_exporter-0.4.0-150000.1.18.3.aarch64",
"openSUSE Leap 15.5:golang-github-QubitProducts-exporter_exporter-0.4.0-150000.1.18.3.ppc64le",
"openSUSE Leap 15.5:golang-github-QubitProducts-exporter_exporter-0.4.0-150000.1.18.3.s390x",
"openSUSE Leap 15.5:golang-github-QubitProducts-exporter_exporter-0.4.0-150000.1.18.3.x86_64",
"openSUSE Leap 15.5:golang-github-lusitaniae-apache_exporter-1.0.0-150000.1.17.2.aarch64",
"openSUSE Leap 15.5:golang-github-lusitaniae-apache_exporter-1.0.0-150000.1.17.2.ppc64le",
"openSUSE Leap 15.5:golang-github-lusitaniae-apache_exporter-1.0.0-150000.1.17.2.s390x",
"openSUSE Leap 15.5:golang-github-lusitaniae-apache_exporter-1.0.0-150000.1.17.2.x86_64",
"openSUSE Leap 15.5:prometheus-blackbox_exporter-0.24.0-150000.1.23.3.aarch64",
"openSUSE Leap 15.5:prometheus-blackbox_exporter-0.24.0-150000.1.23.3.ppc64le",
"openSUSE Leap 15.5:prometheus-blackbox_exporter-0.24.0-150000.1.23.3.s390x",
"openSUSE Leap 15.5:prometheus-blackbox_exporter-0.24.0-150000.1.23.3.x86_64",
"openSUSE Leap 15.5:prometheus-postgres_exporter-0.10.1-150000.1.14.3.aarch64",
"openSUSE Leap 15.5:prometheus-postgres_exporter-0.10.1-150000.1.14.3.ppc64le",
"openSUSE Leap 15.5:prometheus-postgres_exporter-0.10.1-150000.1.14.3.s390x",
"openSUSE Leap 15.5:prometheus-postgres_exporter-0.10.1-150000.1.14.3.x86_64",
"openSUSE Leap 15.5:spacecmd-4.3.23-150000.3.104.2.noarch",
"openSUSE Leap 15.5:supportutils-plugin-susemanager-client-4.3.3-150000.3.21.2.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2023-09-28T11:43:24Z",
"details": "important"
}
],
"title": "CVE-2023-29409"
}
]
}
suse-su-2023:2575-1
Vulnerability from csaf_suse
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for SUSE Manager Client Tools",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update fixes the following issues:\n\ngrafana:\n\n- Version update from 8.5.22 to 9.5.1 (jsc#PED-3694):\n * Security fixes:\n - CVE-2023-1410: grafana: Stored XSS in Graphite FunctionDescription tooltip (bsc#1209645)\n - CVE-2023-1387: grafana: JWT URL-login flow leaks token to data sources through request parameter in proxy requests\n (bnc#1210907)\n - CVE-2022-36062: grafana: Fix RBAC folders/dashboards privilege escalation (bsc#1203596)\n - CVE-2022-35957: grafana: Escalation from admin to server admin when auth proxy is used (bsc#1203597)\n - CVE-2022-32149: Upgrade x/text to version unaffected by CVE-2022-32149 (bsc#1204501)\n - CVE-2022-31107: grafana: OAuth account takeover (bsc#1201539)\n - CVE-2022-31097: grafana: stored XSS vulnerability (bsc#1201535)\n - CVE-2022-27664: go1.18,go1.19: net/http: handle server errors after sending GOAWAY (bsc#1203185)\n - CVE-2022-0155: follow-redirects: Exposure of Private Personal Information to an Unauthorized Actor\n - CVE-2021-43138: spacewalk-web: a malicious user can obtain privileges via the mapValues() method(bsc#1200480)\n - CVE-2021-3918: json-schema is vulnerable to Improperly Controlled Modification of Object Prototype Attributes\n (\u0027Prototype Pollution\u0027) (bsc#1192696)\n - CVE-2021-3807: node-ansi-regex: Inefficient Regular Expression Complexity in chalk/ansi-regex (bsc#1192154)\n - CVE-2020-7753: nodejs-trim: Regular Expression Denial of Service (ReDoS) in trim function \n * Important changes:\n - Default named retention policies won\u0027t be used to query.\n Users who have a default named retention policy in their influxdb database, have to rename it to something else.\n To change the hardcoded retention policy in the dashboard.json, users must then select the right retention policy\n from dropdown and save the panel/dashboard.\n - Grafana Alerting rules with NoDataState configuration set to Alerting will now respect \u0027For\u0027 duration.\n - Users who use LDAP role sync to only sync Viewer, Editor and Admin roles, but grant Grafana Server Admin role\n manually will not be able to do that anymore. After this change, LDAP role sync will override any manual changes\n to Grafana Server Admin role assignments. If grafana_admin is left unset in LDAP role mapping configuration, it\n will default to false.\n - The InfluxDB backend migration feature toggle (influxdbBackendMigration) has been reintroduced in this version\n as issues were discovered with backend processing of InfluxDB data. Unless this feature toggle is enabled, all\n InfluxDB data will be parsed in the frontend. This frontend processing is the default behavior. \n In Grafana 9.4.4, InfluxDB data parsing started to be handled in the backend. If you have upgraded to 9.4.4\n and then added new transformations on InfluxDB data, those panels will fail to render. To resolve this either:\n Remove the affected panel and re-create it or edit the `time` field as `Time` in `panel.json` \n or `dashboard.json`\n - The `@grafana/ui` package helper function `selectOptionInTest` used in frontend tests has been removed as it\n caused testing libraries to be bundled in the production code of Grafana. If you were using this helper function\n in your tests please update your code accordingly.\n - Removed deprecated `checkHealth` prop from the `@grafana/e2e` `addDataSource` configuration. Previously this\n value defaulted to `false`, and has not been used in end-to-end tests since Grafana 8.0.3.\n - Removed the deprecated `LegacyBaseMap`, `LegacyValueMapping`, `LegacyValueMap`, and `LegacyRangeMap` types, and\n `getMappedValue` function from grafana-data. See the documentation for the migration.\n This change fixes a bug in Grafana where intermittent failure of database, network between Grafana and the\n database, or error in querying the database would cause all alert rules to be unscheduled in Grafana. \n Following this change scheduled alert rules are not updated unless the query is successful.\n - The `get_alert_rules_duration_seconds` metric has been renamed to `schedule_query_alert_rules_duration_seconds`\n - Any secret (data sources credential, alert manager credential, etc, etc) created or modified with Grafana v9.0\n won\u0027t be decryptable from any previous version (by default) because the way encrypted secrets are stored into the\n database has changed. Although secrets created or modified with previous versions will still be decryptable by\n Grafana v9.0.\n - If required, although generally discouraged, the `disableEnvelopeEncryption` feature toggle can be enabled to\n keep envelope encryption disabled once updating to Grafana\n - In case of need to rollback to an earlier version of Grafana (i.e. Grafana v8.x) for any reason, after being\n created or modified any secret with Grafana v9.0, the `envelopeEncryption` feature toggle will need to be enabled\n to keep backwards compatibility (only from `v8.3.x` a bit unstable, from `8.5.x` stable).\n - As a final attempt to deal with issues related with the aforementioned situations, the \n `grafana-cli admin secrets-migration rollback` command has been designed to move back all the Grafana secrets\n encrypted with envelope encryption to legacy encryption. So, after running that command it should be safe to\n disable envelope encryption and/or roll back to a previous version of Grafana.\n Alternatively or complementarily to all the points above, backing up the Grafana database before updating could\n be a good idea to prevent disasters (although the risk of getting some secrets corrupted only applies to those \n updates/created with after updating to Grafana v9.0).\n - In Elasticsearch, browser access mode was deprecated in grafana 7.4.0 and removed in 9.0.0. If you used this mode\n please switch to server access mode on the datasource configuration page.\n - Environment variables passed from Grafana to external Azure plugins have been renamed:\n `AZURE_CLOUD` renamed to `GFAZPL_AZURE_CLOUD`,\n `AZURE_MANAGED_IDENTITY_ENABLED` renamed to `GFAZPL_MANAGED_IDENTITY_ENABLED`,\n `AZURE_MANAGED_IDENTITY_CLIENT_ID` renamed to `GFAZPL_MANAGED_IDENTITY_CLIENT_ID`.\n There are no known plugins which were relying on these variables. Moving forward plugins should read Azure\n settings only via Grafana Azure SDK which properly handles old and new environment variables.\n - Removes support for for ElasticSearch versions after their end-of-life, currently versions \u003c 7.10.0.\n To continue to use ElasticSearch data source, upgrade ElasticSearch to version 7.10.0+.\n - Application Insights and Insight Analytics queries in Azure Monitor were deprecated in Grafana 8.0 and finally\n removed in 9.0. Deprecated queries will no longer be executed.\n - grafana/ui: Button now specifies a default type=\u0027button\u0027.\n The `Button` component provided by @grafana/ui now specifies a default `type=\u0027button\u0027` when no type is provided.\n In previous versions, if the attribute was not specified for buttons associated with a `\u003cform\u003e` the\n default value was `submit` per the specification. You can preserve the old behavior by explicitly setting the\n type attribute: `\u003cButton type=\u0027submit\u0027 /\u003e`\n - The `Rename by regex` transformation has been improved to allow global patterns of the form \n `/\u003cstringToReplace\u003e/g`.\n Depending on the regex match used, this may cause some transformations to behave slightly differently. You can\n guarantee the same behaviour as before by wrapping the `match` string in forward slashes (`/`), e.g. `(.*)` would\n become `/(.*)/`\n - `\u003cSelect /\u003e` menus will now portal to the document body by default. This is to give more consistent\n behaviour when positioning and overlaying. If you were setting`menuShouldPortal={true}` before you can safely \n remove that prop and behaviour will be the same. If you weren\u0027t explicitly setting that prop, there should be no\n visible changes in behaviour but your tests may need updating. If you were setting `menuShouldPortal={false}`\n this will continue to prevent the menu from portalling.\n - Grafana alerting endpoint prefixed with `api/v1/rule/test` that tests a rule against a Corte/Loki data source now\n expects the data source UID as a path parameter instead of the data source numeric identifier.\n - Grafana alerting endpoints prefixed with `api/prometheus/` that proxy requests to a Cortex/Loki data source now\n expect the data source UID as a path parameter instead of the data source numeric identifier.\n - Grafana alerting endpoints prefixed with `api/ruler/` that proxy requests to a Cortex/Loki data source now expect\n the data source UID as a path parameter instead of the data\n - Grafana alerting endpoints prefixed with `api/alertmanager/` that proxy requests to an Alertmanager now expect\n the data source UID as a path parameter instead of the data source numeric identifier.\n - The format of log messages have been updated, `lvl` is now `level` and `eror`and `dbug` has been replaced with\n `error` and `debug`. The precision of timestamps has been increased.\n To smooth the transition, it is possible to opt-out of the new log format by enabling the feature toggle\n `oldlog`.\n This option will be removed in a future minor release.\n - In the Loki data source, the dataframe format used to represent Loki logs-data has been changed to a more\n efficient format. The query-result is represented by a single dataframe with a \u0027labels\u0027 column, instead of the\n separate dataframes for every labels-value. When displaying such data in explore, or in a logs-panel in the\n dashboard will continue to work without changes, but if the data was loaded into a different dashboard-panel, or\n Transforms were used, adjustments may be necessary. For example, if you used the \u0027labels to fields\u0027 \n transformation with the logs data, please switch to the \u0027extract fields\u0027 transformation.\n * Deprecations:\n - The `grafana_database_conn_*` metrics are deprecated, and will be removed in a future version of Grafana. Use \n the `go_sql_stats_*` metrics instead.\n - Support for compact Explore URLs is deprecated and will be removed in a future release. Until then, when\n navigating to Explore using the deprecated format the URLs are automatically converted. If you have\n existing links pointing to Explore update them using the format generated by Explore upon navigation.\n You can identify a compact URL by its format. Compact URLs have the left (and optionally right) url parameter as\n an array of strings, for example `\u0026left=[\u0027now-1h\u0027,\u0027now\u0027...]`. The standard explore URLs follow a key/value\n pattern, for example `\u0026left={\u0027datasource\u0027:\u0027test\u0027...}`. Please be sure to check your dashboards for any\n hardcoded links to Explore and update them to the standard URL pattern.\n - Chore: Remove deprecated DataSourceAPI methods.\n - Data: Remove deprecated types and functions from valueMappings.\n - Elasticsearch: Remove browser access mode.\n - Elasticsearch: Remove support for versions after their end of the life (\u003c7.10.0).\n - Explore: Remove support for legacy, compact format URLs.\n - Graph: Deprecate Graph (old) and make it no longer a visualization option for new panels.\n - `setExploreQueryField`, `setExploreMetricsQueryField` and `setExploreLogsQueryField` are now deprecated and will\n be removed in a future release. If you need to set a different query editor for Explore, conditionally render\n based on `props.app` in your regular query editor.\n * Changes:\n - User: Fix externalUserId not being populated.\n If you used any of these components please use them from grafana/experimental from now on:\n - AccessoryButton\n - EditorFieldGroup\n - EditorHeader\n - EditorField\n - EditorRow\n - EditorList\n - EditorRows\n - EditorSwitch\n - FlexItem\n - Stack\n - InlineSelect\n - InputGroup\n - Space\n - Starting with 9.1.0, existing heatmap panels will start using a new implementation. This can be disabled by\n setting the `useLegacyHeatmapPanel` feature flag to true. It can be tested on a single dashbobard by adding\n `?__feature.useLegacyHeatmapPanel=true` to any dashboard URL.\n - Logger: Enable new logging format by default.\n - Loki: Enable new visual query builder by default.\n - Plugins: Remove plugin list panel.\n - Install wrapper scripts under /usr/sbin\n - Install actual binaries under /usr/libexec/grafana (or /usr/lib under older distributions) and create a simlink \n for wrapper scripts and the service (which expect the binary to be under /usr/share/grafana/bin)\n - Chore: Upgrade typescript to 4.6.4.\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2023-2575,SUSE-SLE-Module-Packagehub-Subpackages-15-SP4-2023-2575,SUSE-SLE-Module-Packagehub-Subpackages-15-SP5-2023-2575,openSUSE-SLE-15.4-2023-2575,openSUSE-SLE-15.5-2023-2575",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2023_2575-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2023:2575-1",
"url": "https://www.suse.com/support/update/announcement/2023/suse-su-20232575-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2023:2575-1",
"url": "https://lists.suse.com/pipermail/sle-updates/2023-June/029953.html"
},
{
"category": "self",
"summary": "SUSE Bug 1192154",
"url": "https://bugzilla.suse.com/1192154"
},
{
"category": "self",
"summary": "SUSE Bug 1192696",
"url": "https://bugzilla.suse.com/1192696"
},
{
"category": "self",
"summary": "SUSE Bug 1200480",
"url": "https://bugzilla.suse.com/1200480"
},
{
"category": "self",
"summary": "SUSE Bug 1201535",
"url": "https://bugzilla.suse.com/1201535"
},
{
"category": "self",
"summary": "SUSE Bug 1201539",
"url": "https://bugzilla.suse.com/1201539"
},
{
"category": "self",
"summary": "SUSE Bug 1203185",
"url": "https://bugzilla.suse.com/1203185"
},
{
"category": "self",
"summary": "SUSE Bug 1203596",
"url": "https://bugzilla.suse.com/1203596"
},
{
"category": "self",
"summary": "SUSE Bug 1203597",
"url": "https://bugzilla.suse.com/1203597"
},
{
"category": "self",
"summary": "SUSE Bug 1204501",
"url": "https://bugzilla.suse.com/1204501"
},
{
"category": "self",
"summary": "SUSE Bug 1209645",
"url": "https://bugzilla.suse.com/1209645"
},
{
"category": "self",
"summary": "SUSE Bug 1210907",
"url": "https://bugzilla.suse.com/1210907"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-7753 page",
"url": "https://www.suse.com/security/cve/CVE-2020-7753/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-3807 page",
"url": "https://www.suse.com/security/cve/CVE-2021-3807/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-3918 page",
"url": "https://www.suse.com/security/cve/CVE-2021-3918/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-43138 page",
"url": "https://www.suse.com/security/cve/CVE-2021-43138/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-0155 page",
"url": "https://www.suse.com/security/cve/CVE-2022-0155/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-27664 page",
"url": "https://www.suse.com/security/cve/CVE-2022-27664/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-31097 page",
"url": "https://www.suse.com/security/cve/CVE-2022-31097/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-31107 page",
"url": "https://www.suse.com/security/cve/CVE-2022-31107/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-32149 page",
"url": "https://www.suse.com/security/cve/CVE-2022-32149/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-35957 page",
"url": "https://www.suse.com/security/cve/CVE-2022-35957/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-36062 page",
"url": "https://www.suse.com/security/cve/CVE-2022-36062/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-1387 page",
"url": "https://www.suse.com/security/cve/CVE-2023-1387/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-1410 page",
"url": "https://www.suse.com/security/cve/CVE-2023-1410/"
}
],
"title": "Security update for SUSE Manager Client Tools",
"tracking": {
"current_release_date": "2023-06-21T11:42:33Z",
"generator": {
"date": "2023-06-21T11:42:33Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2023:2575-1",
"initial_release_date": "2023-06-21T11:42:33Z",
"revision_history": [
{
"date": "2023-06-21T11:42:33Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "grafana-9.5.1-150200.3.41.3.aarch64",
"product": {
"name": "grafana-9.5.1-150200.3.41.3.aarch64",
"product_id": "grafana-9.5.1-150200.3.41.3.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "grafana-9.5.1-150200.3.41.3.i586",
"product": {
"name": "grafana-9.5.1-150200.3.41.3.i586",
"product_id": "grafana-9.5.1-150200.3.41.3.i586"
}
}
],
"category": "architecture",
"name": "i586"
},
{
"branches": [
{
"category": "product_version",
"name": "grafana-9.5.1-150200.3.41.3.ppc64le",
"product": {
"name": "grafana-9.5.1-150200.3.41.3.ppc64le",
"product_id": "grafana-9.5.1-150200.3.41.3.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "grafana-9.5.1-150200.3.41.3.s390x",
"product": {
"name": "grafana-9.5.1-150200.3.41.3.s390x",
"product_id": "grafana-9.5.1-150200.3.41.3.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "grafana-9.5.1-150200.3.41.3.x86_64",
"product": {
"name": "grafana-9.5.1-150200.3.41.3.x86_64",
"product_id": "grafana-9.5.1-150200.3.41.3.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Module for Package Hub 15 SP4",
"product": {
"name": "SUSE Linux Enterprise Module for Package Hub 15 SP4",
"product_id": "SUSE Linux Enterprise Module for Package Hub 15 SP4",
"product_identification_helper": {
"cpe": "cpe:/o:suse:packagehub:15:sp4"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Module for Package Hub 15 SP5",
"product": {
"name": "SUSE Linux Enterprise Module for Package Hub 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Package Hub 15 SP5",
"product_identification_helper": {
"cpe": "cpe:/o:suse:packagehub:15:sp5"
}
}
},
{
"category": "product_name",
"name": "openSUSE Leap 15.4",
"product": {
"name": "openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:leap:15.4"
}
}
},
{
"category": "product_name",
"name": "openSUSE Leap 15.5",
"product": {
"name": "openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:leap:15.5"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "grafana-9.5.1-150200.3.41.3.aarch64 as component of SUSE Linux Enterprise Module for Package Hub 15 SP4",
"product_id": "SUSE Linux Enterprise Module for Package Hub 15 SP4:grafana-9.5.1-150200.3.41.3.aarch64"
},
"product_reference": "grafana-9.5.1-150200.3.41.3.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Package Hub 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "grafana-9.5.1-150200.3.41.3.ppc64le as component of SUSE Linux Enterprise Module for Package Hub 15 SP4",
"product_id": "SUSE Linux Enterprise Module for Package Hub 15 SP4:grafana-9.5.1-150200.3.41.3.ppc64le"
},
"product_reference": "grafana-9.5.1-150200.3.41.3.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Package Hub 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "grafana-9.5.1-150200.3.41.3.s390x as component of SUSE Linux Enterprise Module for Package Hub 15 SP4",
"product_id": "SUSE Linux Enterprise Module for Package Hub 15 SP4:grafana-9.5.1-150200.3.41.3.s390x"
},
"product_reference": "grafana-9.5.1-150200.3.41.3.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Package Hub 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "grafana-9.5.1-150200.3.41.3.x86_64 as component of SUSE Linux Enterprise Module for Package Hub 15 SP4",
"product_id": "SUSE Linux Enterprise Module for Package Hub 15 SP4:grafana-9.5.1-150200.3.41.3.x86_64"
},
"product_reference": "grafana-9.5.1-150200.3.41.3.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Package Hub 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "grafana-9.5.1-150200.3.41.3.aarch64 as component of SUSE Linux Enterprise Module for Package Hub 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Package Hub 15 SP5:grafana-9.5.1-150200.3.41.3.aarch64"
},
"product_reference": "grafana-9.5.1-150200.3.41.3.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Package Hub 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "grafana-9.5.1-150200.3.41.3.ppc64le as component of SUSE Linux Enterprise Module for Package Hub 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Package Hub 15 SP5:grafana-9.5.1-150200.3.41.3.ppc64le"
},
"product_reference": "grafana-9.5.1-150200.3.41.3.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Package Hub 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "grafana-9.5.1-150200.3.41.3.s390x as component of SUSE Linux Enterprise Module for Package Hub 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Package Hub 15 SP5:grafana-9.5.1-150200.3.41.3.s390x"
},
"product_reference": "grafana-9.5.1-150200.3.41.3.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Package Hub 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "grafana-9.5.1-150200.3.41.3.x86_64 as component of SUSE Linux Enterprise Module for Package Hub 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Package Hub 15 SP5:grafana-9.5.1-150200.3.41.3.x86_64"
},
"product_reference": "grafana-9.5.1-150200.3.41.3.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Package Hub 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "grafana-9.5.1-150200.3.41.3.aarch64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:grafana-9.5.1-150200.3.41.3.aarch64"
},
"product_reference": "grafana-9.5.1-150200.3.41.3.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "grafana-9.5.1-150200.3.41.3.ppc64le as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:grafana-9.5.1-150200.3.41.3.ppc64le"
},
"product_reference": "grafana-9.5.1-150200.3.41.3.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "grafana-9.5.1-150200.3.41.3.s390x as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:grafana-9.5.1-150200.3.41.3.s390x"
},
"product_reference": "grafana-9.5.1-150200.3.41.3.s390x",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "grafana-9.5.1-150200.3.41.3.x86_64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:grafana-9.5.1-150200.3.41.3.x86_64"
},
"product_reference": "grafana-9.5.1-150200.3.41.3.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "grafana-9.5.1-150200.3.41.3.aarch64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:grafana-9.5.1-150200.3.41.3.aarch64"
},
"product_reference": "grafana-9.5.1-150200.3.41.3.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "grafana-9.5.1-150200.3.41.3.ppc64le as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:grafana-9.5.1-150200.3.41.3.ppc64le"
},
"product_reference": "grafana-9.5.1-150200.3.41.3.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "grafana-9.5.1-150200.3.41.3.s390x as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:grafana-9.5.1-150200.3.41.3.s390x"
},
"product_reference": "grafana-9.5.1-150200.3.41.3.s390x",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "grafana-9.5.1-150200.3.41.3.x86_64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:grafana-9.5.1-150200.3.41.3.x86_64"
},
"product_reference": "grafana-9.5.1-150200.3.41.3.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.5"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2020-7753",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-7753"
}
],
"notes": [
{
"category": "general",
"text": "All versions of package trim are vulnerable to Regular Expression Denial of Service (ReDoS) via trim().",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Package Hub 15 SP4:grafana-9.5.1-150200.3.41.3.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP4:grafana-9.5.1-150200.3.41.3.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP4:grafana-9.5.1-150200.3.41.3.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP4:grafana-9.5.1-150200.3.41.3.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:grafana-9.5.1-150200.3.41.3.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:grafana-9.5.1-150200.3.41.3.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:grafana-9.5.1-150200.3.41.3.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:grafana-9.5.1-150200.3.41.3.x86_64",
"openSUSE Leap 15.4:grafana-9.5.1-150200.3.41.3.aarch64",
"openSUSE Leap 15.4:grafana-9.5.1-150200.3.41.3.ppc64le",
"openSUSE Leap 15.4:grafana-9.5.1-150200.3.41.3.s390x",
"openSUSE Leap 15.4:grafana-9.5.1-150200.3.41.3.x86_64",
"openSUSE Leap 15.5:grafana-9.5.1-150200.3.41.3.aarch64",
"openSUSE Leap 15.5:grafana-9.5.1-150200.3.41.3.ppc64le",
"openSUSE Leap 15.5:grafana-9.5.1-150200.3.41.3.s390x",
"openSUSE Leap 15.5:grafana-9.5.1-150200.3.41.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-7753",
"url": "https://www.suse.com/security/cve/CVE-2020-7753"
},
{
"category": "external",
"summary": "SUSE Bug 1218843 for CVE-2020-7753",
"url": "https://bugzilla.suse.com/1218843"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Package Hub 15 SP4:grafana-9.5.1-150200.3.41.3.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP4:grafana-9.5.1-150200.3.41.3.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP4:grafana-9.5.1-150200.3.41.3.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP4:grafana-9.5.1-150200.3.41.3.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:grafana-9.5.1-150200.3.41.3.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:grafana-9.5.1-150200.3.41.3.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:grafana-9.5.1-150200.3.41.3.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:grafana-9.5.1-150200.3.41.3.x86_64",
"openSUSE Leap 15.4:grafana-9.5.1-150200.3.41.3.aarch64",
"openSUSE Leap 15.4:grafana-9.5.1-150200.3.41.3.ppc64le",
"openSUSE Leap 15.4:grafana-9.5.1-150200.3.41.3.s390x",
"openSUSE Leap 15.4:grafana-9.5.1-150200.3.41.3.x86_64",
"openSUSE Leap 15.5:grafana-9.5.1-150200.3.41.3.aarch64",
"openSUSE Leap 15.5:grafana-9.5.1-150200.3.41.3.ppc64le",
"openSUSE Leap 15.5:grafana-9.5.1-150200.3.41.3.s390x",
"openSUSE Leap 15.5:grafana-9.5.1-150200.3.41.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Package Hub 15 SP4:grafana-9.5.1-150200.3.41.3.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP4:grafana-9.5.1-150200.3.41.3.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP4:grafana-9.5.1-150200.3.41.3.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP4:grafana-9.5.1-150200.3.41.3.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:grafana-9.5.1-150200.3.41.3.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:grafana-9.5.1-150200.3.41.3.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:grafana-9.5.1-150200.3.41.3.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:grafana-9.5.1-150200.3.41.3.x86_64",
"openSUSE Leap 15.4:grafana-9.5.1-150200.3.41.3.aarch64",
"openSUSE Leap 15.4:grafana-9.5.1-150200.3.41.3.ppc64le",
"openSUSE Leap 15.4:grafana-9.5.1-150200.3.41.3.s390x",
"openSUSE Leap 15.4:grafana-9.5.1-150200.3.41.3.x86_64",
"openSUSE Leap 15.5:grafana-9.5.1-150200.3.41.3.aarch64",
"openSUSE Leap 15.5:grafana-9.5.1-150200.3.41.3.ppc64le",
"openSUSE Leap 15.5:grafana-9.5.1-150200.3.41.3.s390x",
"openSUSE Leap 15.5:grafana-9.5.1-150200.3.41.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2023-06-21T11:42:33Z",
"details": "important"
}
],
"title": "CVE-2020-7753"
},
{
"cve": "CVE-2021-3807",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-3807"
}
],
"notes": [
{
"category": "general",
"text": "ansi-regex is vulnerable to Inefficient Regular Expression Complexity",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Package Hub 15 SP4:grafana-9.5.1-150200.3.41.3.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP4:grafana-9.5.1-150200.3.41.3.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP4:grafana-9.5.1-150200.3.41.3.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP4:grafana-9.5.1-150200.3.41.3.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:grafana-9.5.1-150200.3.41.3.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:grafana-9.5.1-150200.3.41.3.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:grafana-9.5.1-150200.3.41.3.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:grafana-9.5.1-150200.3.41.3.x86_64",
"openSUSE Leap 15.4:grafana-9.5.1-150200.3.41.3.aarch64",
"openSUSE Leap 15.4:grafana-9.5.1-150200.3.41.3.ppc64le",
"openSUSE Leap 15.4:grafana-9.5.1-150200.3.41.3.s390x",
"openSUSE Leap 15.4:grafana-9.5.1-150200.3.41.3.x86_64",
"openSUSE Leap 15.5:grafana-9.5.1-150200.3.41.3.aarch64",
"openSUSE Leap 15.5:grafana-9.5.1-150200.3.41.3.ppc64le",
"openSUSE Leap 15.5:grafana-9.5.1-150200.3.41.3.s390x",
"openSUSE Leap 15.5:grafana-9.5.1-150200.3.41.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-3807",
"url": "https://www.suse.com/security/cve/CVE-2021-3807"
},
{
"category": "external",
"summary": "SUSE Bug 1192154 for CVE-2021-3807",
"url": "https://bugzilla.suse.com/1192154"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Package Hub 15 SP4:grafana-9.5.1-150200.3.41.3.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP4:grafana-9.5.1-150200.3.41.3.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP4:grafana-9.5.1-150200.3.41.3.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP4:grafana-9.5.1-150200.3.41.3.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:grafana-9.5.1-150200.3.41.3.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:grafana-9.5.1-150200.3.41.3.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:grafana-9.5.1-150200.3.41.3.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:grafana-9.5.1-150200.3.41.3.x86_64",
"openSUSE Leap 15.4:grafana-9.5.1-150200.3.41.3.aarch64",
"openSUSE Leap 15.4:grafana-9.5.1-150200.3.41.3.ppc64le",
"openSUSE Leap 15.4:grafana-9.5.1-150200.3.41.3.s390x",
"openSUSE Leap 15.4:grafana-9.5.1-150200.3.41.3.x86_64",
"openSUSE Leap 15.5:grafana-9.5.1-150200.3.41.3.aarch64",
"openSUSE Leap 15.5:grafana-9.5.1-150200.3.41.3.ppc64le",
"openSUSE Leap 15.5:grafana-9.5.1-150200.3.41.3.s390x",
"openSUSE Leap 15.5:grafana-9.5.1-150200.3.41.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Package Hub 15 SP4:grafana-9.5.1-150200.3.41.3.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP4:grafana-9.5.1-150200.3.41.3.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP4:grafana-9.5.1-150200.3.41.3.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP4:grafana-9.5.1-150200.3.41.3.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:grafana-9.5.1-150200.3.41.3.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:grafana-9.5.1-150200.3.41.3.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:grafana-9.5.1-150200.3.41.3.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:grafana-9.5.1-150200.3.41.3.x86_64",
"openSUSE Leap 15.4:grafana-9.5.1-150200.3.41.3.aarch64",
"openSUSE Leap 15.4:grafana-9.5.1-150200.3.41.3.ppc64le",
"openSUSE Leap 15.4:grafana-9.5.1-150200.3.41.3.s390x",
"openSUSE Leap 15.4:grafana-9.5.1-150200.3.41.3.x86_64",
"openSUSE Leap 15.5:grafana-9.5.1-150200.3.41.3.aarch64",
"openSUSE Leap 15.5:grafana-9.5.1-150200.3.41.3.ppc64le",
"openSUSE Leap 15.5:grafana-9.5.1-150200.3.41.3.s390x",
"openSUSE Leap 15.5:grafana-9.5.1-150200.3.41.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2023-06-21T11:42:33Z",
"details": "important"
}
],
"title": "CVE-2021-3807"
},
{
"cve": "CVE-2021-3918",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-3918"
}
],
"notes": [
{
"category": "general",
"text": "json-schema is vulnerable to Improperly Controlled Modification of Object Prototype Attributes (\u0027Prototype Pollution\u0027)",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Package Hub 15 SP4:grafana-9.5.1-150200.3.41.3.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP4:grafana-9.5.1-150200.3.41.3.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP4:grafana-9.5.1-150200.3.41.3.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP4:grafana-9.5.1-150200.3.41.3.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:grafana-9.5.1-150200.3.41.3.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:grafana-9.5.1-150200.3.41.3.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:grafana-9.5.1-150200.3.41.3.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:grafana-9.5.1-150200.3.41.3.x86_64",
"openSUSE Leap 15.4:grafana-9.5.1-150200.3.41.3.aarch64",
"openSUSE Leap 15.4:grafana-9.5.1-150200.3.41.3.ppc64le",
"openSUSE Leap 15.4:grafana-9.5.1-150200.3.41.3.s390x",
"openSUSE Leap 15.4:grafana-9.5.1-150200.3.41.3.x86_64",
"openSUSE Leap 15.5:grafana-9.5.1-150200.3.41.3.aarch64",
"openSUSE Leap 15.5:grafana-9.5.1-150200.3.41.3.ppc64le",
"openSUSE Leap 15.5:grafana-9.5.1-150200.3.41.3.s390x",
"openSUSE Leap 15.5:grafana-9.5.1-150200.3.41.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-3918",
"url": "https://www.suse.com/security/cve/CVE-2021-3918"
},
{
"category": "external",
"summary": "SUSE Bug 1192696 for CVE-2021-3918",
"url": "https://bugzilla.suse.com/1192696"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Package Hub 15 SP4:grafana-9.5.1-150200.3.41.3.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP4:grafana-9.5.1-150200.3.41.3.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP4:grafana-9.5.1-150200.3.41.3.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP4:grafana-9.5.1-150200.3.41.3.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:grafana-9.5.1-150200.3.41.3.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:grafana-9.5.1-150200.3.41.3.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:grafana-9.5.1-150200.3.41.3.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:grafana-9.5.1-150200.3.41.3.x86_64",
"openSUSE Leap 15.4:grafana-9.5.1-150200.3.41.3.aarch64",
"openSUSE Leap 15.4:grafana-9.5.1-150200.3.41.3.ppc64le",
"openSUSE Leap 15.4:grafana-9.5.1-150200.3.41.3.s390x",
"openSUSE Leap 15.4:grafana-9.5.1-150200.3.41.3.x86_64",
"openSUSE Leap 15.5:grafana-9.5.1-150200.3.41.3.aarch64",
"openSUSE Leap 15.5:grafana-9.5.1-150200.3.41.3.ppc64le",
"openSUSE Leap 15.5:grafana-9.5.1-150200.3.41.3.s390x",
"openSUSE Leap 15.5:grafana-9.5.1-150200.3.41.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Package Hub 15 SP4:grafana-9.5.1-150200.3.41.3.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP4:grafana-9.5.1-150200.3.41.3.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP4:grafana-9.5.1-150200.3.41.3.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP4:grafana-9.5.1-150200.3.41.3.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:grafana-9.5.1-150200.3.41.3.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:grafana-9.5.1-150200.3.41.3.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:grafana-9.5.1-150200.3.41.3.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:grafana-9.5.1-150200.3.41.3.x86_64",
"openSUSE Leap 15.4:grafana-9.5.1-150200.3.41.3.aarch64",
"openSUSE Leap 15.4:grafana-9.5.1-150200.3.41.3.ppc64le",
"openSUSE Leap 15.4:grafana-9.5.1-150200.3.41.3.s390x",
"openSUSE Leap 15.4:grafana-9.5.1-150200.3.41.3.x86_64",
"openSUSE Leap 15.5:grafana-9.5.1-150200.3.41.3.aarch64",
"openSUSE Leap 15.5:grafana-9.5.1-150200.3.41.3.ppc64le",
"openSUSE Leap 15.5:grafana-9.5.1-150200.3.41.3.s390x",
"openSUSE Leap 15.5:grafana-9.5.1-150200.3.41.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2023-06-21T11:42:33Z",
"details": "important"
}
],
"title": "CVE-2021-3918"
},
{
"cve": "CVE-2021-43138",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-43138"
}
],
"notes": [
{
"category": "general",
"text": "In Async before 2.6.4 and 3.x before 3.2.2, a malicious user can obtain privileges via the mapValues() method, aka lib/internal/iterator.js createObjectIterator prototype pollution.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Package Hub 15 SP4:grafana-9.5.1-150200.3.41.3.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP4:grafana-9.5.1-150200.3.41.3.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP4:grafana-9.5.1-150200.3.41.3.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP4:grafana-9.5.1-150200.3.41.3.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:grafana-9.5.1-150200.3.41.3.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:grafana-9.5.1-150200.3.41.3.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:grafana-9.5.1-150200.3.41.3.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:grafana-9.5.1-150200.3.41.3.x86_64",
"openSUSE Leap 15.4:grafana-9.5.1-150200.3.41.3.aarch64",
"openSUSE Leap 15.4:grafana-9.5.1-150200.3.41.3.ppc64le",
"openSUSE Leap 15.4:grafana-9.5.1-150200.3.41.3.s390x",
"openSUSE Leap 15.4:grafana-9.5.1-150200.3.41.3.x86_64",
"openSUSE Leap 15.5:grafana-9.5.1-150200.3.41.3.aarch64",
"openSUSE Leap 15.5:grafana-9.5.1-150200.3.41.3.ppc64le",
"openSUSE Leap 15.5:grafana-9.5.1-150200.3.41.3.s390x",
"openSUSE Leap 15.5:grafana-9.5.1-150200.3.41.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-43138",
"url": "https://www.suse.com/security/cve/CVE-2021-43138"
},
{
"category": "external",
"summary": "SUSE Bug 1200480 for CVE-2021-43138",
"url": "https://bugzilla.suse.com/1200480"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Package Hub 15 SP4:grafana-9.5.1-150200.3.41.3.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP4:grafana-9.5.1-150200.3.41.3.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP4:grafana-9.5.1-150200.3.41.3.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP4:grafana-9.5.1-150200.3.41.3.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:grafana-9.5.1-150200.3.41.3.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:grafana-9.5.1-150200.3.41.3.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:grafana-9.5.1-150200.3.41.3.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:grafana-9.5.1-150200.3.41.3.x86_64",
"openSUSE Leap 15.4:grafana-9.5.1-150200.3.41.3.aarch64",
"openSUSE Leap 15.4:grafana-9.5.1-150200.3.41.3.ppc64le",
"openSUSE Leap 15.4:grafana-9.5.1-150200.3.41.3.s390x",
"openSUSE Leap 15.4:grafana-9.5.1-150200.3.41.3.x86_64",
"openSUSE Leap 15.5:grafana-9.5.1-150200.3.41.3.aarch64",
"openSUSE Leap 15.5:grafana-9.5.1-150200.3.41.3.ppc64le",
"openSUSE Leap 15.5:grafana-9.5.1-150200.3.41.3.s390x",
"openSUSE Leap 15.5:grafana-9.5.1-150200.3.41.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Package Hub 15 SP4:grafana-9.5.1-150200.3.41.3.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP4:grafana-9.5.1-150200.3.41.3.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP4:grafana-9.5.1-150200.3.41.3.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP4:grafana-9.5.1-150200.3.41.3.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:grafana-9.5.1-150200.3.41.3.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:grafana-9.5.1-150200.3.41.3.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:grafana-9.5.1-150200.3.41.3.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:grafana-9.5.1-150200.3.41.3.x86_64",
"openSUSE Leap 15.4:grafana-9.5.1-150200.3.41.3.aarch64",
"openSUSE Leap 15.4:grafana-9.5.1-150200.3.41.3.ppc64le",
"openSUSE Leap 15.4:grafana-9.5.1-150200.3.41.3.s390x",
"openSUSE Leap 15.4:grafana-9.5.1-150200.3.41.3.x86_64",
"openSUSE Leap 15.5:grafana-9.5.1-150200.3.41.3.aarch64",
"openSUSE Leap 15.5:grafana-9.5.1-150200.3.41.3.ppc64le",
"openSUSE Leap 15.5:grafana-9.5.1-150200.3.41.3.s390x",
"openSUSE Leap 15.5:grafana-9.5.1-150200.3.41.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2023-06-21T11:42:33Z",
"details": "important"
}
],
"title": "CVE-2021-43138"
},
{
"cve": "CVE-2022-0155",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-0155"
}
],
"notes": [
{
"category": "general",
"text": "follow-redirects is vulnerable to Exposure of Private Personal Information to an Unauthorized Actor",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Package Hub 15 SP4:grafana-9.5.1-150200.3.41.3.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP4:grafana-9.5.1-150200.3.41.3.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP4:grafana-9.5.1-150200.3.41.3.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP4:grafana-9.5.1-150200.3.41.3.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:grafana-9.5.1-150200.3.41.3.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:grafana-9.5.1-150200.3.41.3.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:grafana-9.5.1-150200.3.41.3.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:grafana-9.5.1-150200.3.41.3.x86_64",
"openSUSE Leap 15.4:grafana-9.5.1-150200.3.41.3.aarch64",
"openSUSE Leap 15.4:grafana-9.5.1-150200.3.41.3.ppc64le",
"openSUSE Leap 15.4:grafana-9.5.1-150200.3.41.3.s390x",
"openSUSE Leap 15.4:grafana-9.5.1-150200.3.41.3.x86_64",
"openSUSE Leap 15.5:grafana-9.5.1-150200.3.41.3.aarch64",
"openSUSE Leap 15.5:grafana-9.5.1-150200.3.41.3.ppc64le",
"openSUSE Leap 15.5:grafana-9.5.1-150200.3.41.3.s390x",
"openSUSE Leap 15.5:grafana-9.5.1-150200.3.41.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-0155",
"url": "https://www.suse.com/security/cve/CVE-2022-0155"
},
{
"category": "external",
"summary": "SUSE Bug 1218844 for CVE-2022-0155",
"url": "https://bugzilla.suse.com/1218844"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Package Hub 15 SP4:grafana-9.5.1-150200.3.41.3.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP4:grafana-9.5.1-150200.3.41.3.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP4:grafana-9.5.1-150200.3.41.3.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP4:grafana-9.5.1-150200.3.41.3.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:grafana-9.5.1-150200.3.41.3.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:grafana-9.5.1-150200.3.41.3.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:grafana-9.5.1-150200.3.41.3.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:grafana-9.5.1-150200.3.41.3.x86_64",
"openSUSE Leap 15.4:grafana-9.5.1-150200.3.41.3.aarch64",
"openSUSE Leap 15.4:grafana-9.5.1-150200.3.41.3.ppc64le",
"openSUSE Leap 15.4:grafana-9.5.1-150200.3.41.3.s390x",
"openSUSE Leap 15.4:grafana-9.5.1-150200.3.41.3.x86_64",
"openSUSE Leap 15.5:grafana-9.5.1-150200.3.41.3.aarch64",
"openSUSE Leap 15.5:grafana-9.5.1-150200.3.41.3.ppc64le",
"openSUSE Leap 15.5:grafana-9.5.1-150200.3.41.3.s390x",
"openSUSE Leap 15.5:grafana-9.5.1-150200.3.41.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Package Hub 15 SP4:grafana-9.5.1-150200.3.41.3.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP4:grafana-9.5.1-150200.3.41.3.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP4:grafana-9.5.1-150200.3.41.3.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP4:grafana-9.5.1-150200.3.41.3.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:grafana-9.5.1-150200.3.41.3.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:grafana-9.5.1-150200.3.41.3.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:grafana-9.5.1-150200.3.41.3.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:grafana-9.5.1-150200.3.41.3.x86_64",
"openSUSE Leap 15.4:grafana-9.5.1-150200.3.41.3.aarch64",
"openSUSE Leap 15.4:grafana-9.5.1-150200.3.41.3.ppc64le",
"openSUSE Leap 15.4:grafana-9.5.1-150200.3.41.3.s390x",
"openSUSE Leap 15.4:grafana-9.5.1-150200.3.41.3.x86_64",
"openSUSE Leap 15.5:grafana-9.5.1-150200.3.41.3.aarch64",
"openSUSE Leap 15.5:grafana-9.5.1-150200.3.41.3.ppc64le",
"openSUSE Leap 15.5:grafana-9.5.1-150200.3.41.3.s390x",
"openSUSE Leap 15.5:grafana-9.5.1-150200.3.41.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2023-06-21T11:42:33Z",
"details": "moderate"
}
],
"title": "CVE-2022-0155"
},
{
"cve": "CVE-2022-27664",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-27664"
}
],
"notes": [
{
"category": "general",
"text": "In net/http in Go before 1.18.6 and 1.19.x before 1.19.1, attackers can cause a denial of service because an HTTP/2 connection can hang during closing if shutdown were preempted by a fatal error.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Package Hub 15 SP4:grafana-9.5.1-150200.3.41.3.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP4:grafana-9.5.1-150200.3.41.3.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP4:grafana-9.5.1-150200.3.41.3.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP4:grafana-9.5.1-150200.3.41.3.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:grafana-9.5.1-150200.3.41.3.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:grafana-9.5.1-150200.3.41.3.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:grafana-9.5.1-150200.3.41.3.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:grafana-9.5.1-150200.3.41.3.x86_64",
"openSUSE Leap 15.4:grafana-9.5.1-150200.3.41.3.aarch64",
"openSUSE Leap 15.4:grafana-9.5.1-150200.3.41.3.ppc64le",
"openSUSE Leap 15.4:grafana-9.5.1-150200.3.41.3.s390x",
"openSUSE Leap 15.4:grafana-9.5.1-150200.3.41.3.x86_64",
"openSUSE Leap 15.5:grafana-9.5.1-150200.3.41.3.aarch64",
"openSUSE Leap 15.5:grafana-9.5.1-150200.3.41.3.ppc64le",
"openSUSE Leap 15.5:grafana-9.5.1-150200.3.41.3.s390x",
"openSUSE Leap 15.5:grafana-9.5.1-150200.3.41.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-27664",
"url": "https://www.suse.com/security/cve/CVE-2022-27664"
},
{
"category": "external",
"summary": "SUSE Bug 1203185 for CVE-2022-27664",
"url": "https://bugzilla.suse.com/1203185"
},
{
"category": "external",
"summary": "SUSE Bug 1203293 for CVE-2022-27664",
"url": "https://bugzilla.suse.com/1203293"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Package Hub 15 SP4:grafana-9.5.1-150200.3.41.3.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP4:grafana-9.5.1-150200.3.41.3.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP4:grafana-9.5.1-150200.3.41.3.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP4:grafana-9.5.1-150200.3.41.3.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:grafana-9.5.1-150200.3.41.3.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:grafana-9.5.1-150200.3.41.3.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:grafana-9.5.1-150200.3.41.3.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:grafana-9.5.1-150200.3.41.3.x86_64",
"openSUSE Leap 15.4:grafana-9.5.1-150200.3.41.3.aarch64",
"openSUSE Leap 15.4:grafana-9.5.1-150200.3.41.3.ppc64le",
"openSUSE Leap 15.4:grafana-9.5.1-150200.3.41.3.s390x",
"openSUSE Leap 15.4:grafana-9.5.1-150200.3.41.3.x86_64",
"openSUSE Leap 15.5:grafana-9.5.1-150200.3.41.3.aarch64",
"openSUSE Leap 15.5:grafana-9.5.1-150200.3.41.3.ppc64le",
"openSUSE Leap 15.5:grafana-9.5.1-150200.3.41.3.s390x",
"openSUSE Leap 15.5:grafana-9.5.1-150200.3.41.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Package Hub 15 SP4:grafana-9.5.1-150200.3.41.3.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP4:grafana-9.5.1-150200.3.41.3.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP4:grafana-9.5.1-150200.3.41.3.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP4:grafana-9.5.1-150200.3.41.3.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:grafana-9.5.1-150200.3.41.3.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:grafana-9.5.1-150200.3.41.3.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:grafana-9.5.1-150200.3.41.3.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:grafana-9.5.1-150200.3.41.3.x86_64",
"openSUSE Leap 15.4:grafana-9.5.1-150200.3.41.3.aarch64",
"openSUSE Leap 15.4:grafana-9.5.1-150200.3.41.3.ppc64le",
"openSUSE Leap 15.4:grafana-9.5.1-150200.3.41.3.s390x",
"openSUSE Leap 15.4:grafana-9.5.1-150200.3.41.3.x86_64",
"openSUSE Leap 15.5:grafana-9.5.1-150200.3.41.3.aarch64",
"openSUSE Leap 15.5:grafana-9.5.1-150200.3.41.3.ppc64le",
"openSUSE Leap 15.5:grafana-9.5.1-150200.3.41.3.s390x",
"openSUSE Leap 15.5:grafana-9.5.1-150200.3.41.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2023-06-21T11:42:33Z",
"details": "important"
}
],
"title": "CVE-2022-27664"
},
{
"cve": "CVE-2022-31097",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-31097"
}
],
"notes": [
{
"category": "general",
"text": "Grafana is an open-source platform for monitoring and observability. Versions on the 8.x and 9.x branch prior to 9.0.3, 8.5.9, 8.4.10, and 8.3.10 are vulnerable to stored cross-site scripting via the Unified Alerting feature of Grafana. An attacker can exploit this vulnerability to escalate privilege from editor to admin by tricking an authenticated admin to click on a link. Versions 9.0.3, 8.5.9, 8.4.10, and 8.3.10 contain a patch. As a workaround, it is possible to disable alerting or use legacy alerting.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Package Hub 15 SP4:grafana-9.5.1-150200.3.41.3.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP4:grafana-9.5.1-150200.3.41.3.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP4:grafana-9.5.1-150200.3.41.3.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP4:grafana-9.5.1-150200.3.41.3.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:grafana-9.5.1-150200.3.41.3.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:grafana-9.5.1-150200.3.41.3.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:grafana-9.5.1-150200.3.41.3.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:grafana-9.5.1-150200.3.41.3.x86_64",
"openSUSE Leap 15.4:grafana-9.5.1-150200.3.41.3.aarch64",
"openSUSE Leap 15.4:grafana-9.5.1-150200.3.41.3.ppc64le",
"openSUSE Leap 15.4:grafana-9.5.1-150200.3.41.3.s390x",
"openSUSE Leap 15.4:grafana-9.5.1-150200.3.41.3.x86_64",
"openSUSE Leap 15.5:grafana-9.5.1-150200.3.41.3.aarch64",
"openSUSE Leap 15.5:grafana-9.5.1-150200.3.41.3.ppc64le",
"openSUSE Leap 15.5:grafana-9.5.1-150200.3.41.3.s390x",
"openSUSE Leap 15.5:grafana-9.5.1-150200.3.41.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-31097",
"url": "https://www.suse.com/security/cve/CVE-2022-31097"
},
{
"category": "external",
"summary": "SUSE Bug 1201535 for CVE-2022-31097",
"url": "https://bugzilla.suse.com/1201535"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Package Hub 15 SP4:grafana-9.5.1-150200.3.41.3.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP4:grafana-9.5.1-150200.3.41.3.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP4:grafana-9.5.1-150200.3.41.3.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP4:grafana-9.5.1-150200.3.41.3.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:grafana-9.5.1-150200.3.41.3.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:grafana-9.5.1-150200.3.41.3.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:grafana-9.5.1-150200.3.41.3.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:grafana-9.5.1-150200.3.41.3.x86_64",
"openSUSE Leap 15.4:grafana-9.5.1-150200.3.41.3.aarch64",
"openSUSE Leap 15.4:grafana-9.5.1-150200.3.41.3.ppc64le",
"openSUSE Leap 15.4:grafana-9.5.1-150200.3.41.3.s390x",
"openSUSE Leap 15.4:grafana-9.5.1-150200.3.41.3.x86_64",
"openSUSE Leap 15.5:grafana-9.5.1-150200.3.41.3.aarch64",
"openSUSE Leap 15.5:grafana-9.5.1-150200.3.41.3.ppc64le",
"openSUSE Leap 15.5:grafana-9.5.1-150200.3.41.3.s390x",
"openSUSE Leap 15.5:grafana-9.5.1-150200.3.41.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.3,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Package Hub 15 SP4:grafana-9.5.1-150200.3.41.3.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP4:grafana-9.5.1-150200.3.41.3.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP4:grafana-9.5.1-150200.3.41.3.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP4:grafana-9.5.1-150200.3.41.3.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:grafana-9.5.1-150200.3.41.3.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:grafana-9.5.1-150200.3.41.3.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:grafana-9.5.1-150200.3.41.3.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:grafana-9.5.1-150200.3.41.3.x86_64",
"openSUSE Leap 15.4:grafana-9.5.1-150200.3.41.3.aarch64",
"openSUSE Leap 15.4:grafana-9.5.1-150200.3.41.3.ppc64le",
"openSUSE Leap 15.4:grafana-9.5.1-150200.3.41.3.s390x",
"openSUSE Leap 15.4:grafana-9.5.1-150200.3.41.3.x86_64",
"openSUSE Leap 15.5:grafana-9.5.1-150200.3.41.3.aarch64",
"openSUSE Leap 15.5:grafana-9.5.1-150200.3.41.3.ppc64le",
"openSUSE Leap 15.5:grafana-9.5.1-150200.3.41.3.s390x",
"openSUSE Leap 15.5:grafana-9.5.1-150200.3.41.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2023-06-21T11:42:33Z",
"details": "important"
}
],
"title": "CVE-2022-31097"
},
{
"cve": "CVE-2022-31107",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-31107"
}
],
"notes": [
{
"category": "general",
"text": "Grafana is an open-source platform for monitoring and observability. In versions 5.3 until 9.0.3, 8.5.9, 8.4.10, and 8.3.10, it is possible for a malicious user who has authorization to log into a Grafana instance via a configured OAuth IdP which provides a login name to take over the account of another user in that Grafana instance. This can occur when the malicious user is authorized to log in to Grafana via OAuth, the malicious user\u0027s external user id is not already associated with an account in Grafana, the malicious user\u0027s email address is not already associated with an account in Grafana, and the malicious user knows the Grafana username of the target user. If these conditions are met, the malicious user can set their username in the OAuth provider to that of the target user, then go through the OAuth flow to log in to Grafana. Due to the way that external and internal user accounts are linked together during login, if the conditions above are all met then the malicious user will be able to log in to the target user\u0027s Grafana account. Versions 9.0.3, 8.5.9, 8.4.10, and 8.3.10 contain a patch for this issue. As a workaround, concerned users can disable OAuth login to their Grafana instance, or ensure that all users authorized to log in via OAuth have a corresponding user account in Grafana linked to their email address.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Package Hub 15 SP4:grafana-9.5.1-150200.3.41.3.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP4:grafana-9.5.1-150200.3.41.3.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP4:grafana-9.5.1-150200.3.41.3.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP4:grafana-9.5.1-150200.3.41.3.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:grafana-9.5.1-150200.3.41.3.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:grafana-9.5.1-150200.3.41.3.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:grafana-9.5.1-150200.3.41.3.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:grafana-9.5.1-150200.3.41.3.x86_64",
"openSUSE Leap 15.4:grafana-9.5.1-150200.3.41.3.aarch64",
"openSUSE Leap 15.4:grafana-9.5.1-150200.3.41.3.ppc64le",
"openSUSE Leap 15.4:grafana-9.5.1-150200.3.41.3.s390x",
"openSUSE Leap 15.4:grafana-9.5.1-150200.3.41.3.x86_64",
"openSUSE Leap 15.5:grafana-9.5.1-150200.3.41.3.aarch64",
"openSUSE Leap 15.5:grafana-9.5.1-150200.3.41.3.ppc64le",
"openSUSE Leap 15.5:grafana-9.5.1-150200.3.41.3.s390x",
"openSUSE Leap 15.5:grafana-9.5.1-150200.3.41.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-31107",
"url": "https://www.suse.com/security/cve/CVE-2022-31107"
},
{
"category": "external",
"summary": "SUSE Bug 1201539 for CVE-2022-31107",
"url": "https://bugzilla.suse.com/1201539"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Package Hub 15 SP4:grafana-9.5.1-150200.3.41.3.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP4:grafana-9.5.1-150200.3.41.3.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP4:grafana-9.5.1-150200.3.41.3.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP4:grafana-9.5.1-150200.3.41.3.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:grafana-9.5.1-150200.3.41.3.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:grafana-9.5.1-150200.3.41.3.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:grafana-9.5.1-150200.3.41.3.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:grafana-9.5.1-150200.3.41.3.x86_64",
"openSUSE Leap 15.4:grafana-9.5.1-150200.3.41.3.aarch64",
"openSUSE Leap 15.4:grafana-9.5.1-150200.3.41.3.ppc64le",
"openSUSE Leap 15.4:grafana-9.5.1-150200.3.41.3.s390x",
"openSUSE Leap 15.4:grafana-9.5.1-150200.3.41.3.x86_64",
"openSUSE Leap 15.5:grafana-9.5.1-150200.3.41.3.aarch64",
"openSUSE Leap 15.5:grafana-9.5.1-150200.3.41.3.ppc64le",
"openSUSE Leap 15.5:grafana-9.5.1-150200.3.41.3.s390x",
"openSUSE Leap 15.5:grafana-9.5.1-150200.3.41.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Package Hub 15 SP4:grafana-9.5.1-150200.3.41.3.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP4:grafana-9.5.1-150200.3.41.3.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP4:grafana-9.5.1-150200.3.41.3.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP4:grafana-9.5.1-150200.3.41.3.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:grafana-9.5.1-150200.3.41.3.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:grafana-9.5.1-150200.3.41.3.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:grafana-9.5.1-150200.3.41.3.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:grafana-9.5.1-150200.3.41.3.x86_64",
"openSUSE Leap 15.4:grafana-9.5.1-150200.3.41.3.aarch64",
"openSUSE Leap 15.4:grafana-9.5.1-150200.3.41.3.ppc64le",
"openSUSE Leap 15.4:grafana-9.5.1-150200.3.41.3.s390x",
"openSUSE Leap 15.4:grafana-9.5.1-150200.3.41.3.x86_64",
"openSUSE Leap 15.5:grafana-9.5.1-150200.3.41.3.aarch64",
"openSUSE Leap 15.5:grafana-9.5.1-150200.3.41.3.ppc64le",
"openSUSE Leap 15.5:grafana-9.5.1-150200.3.41.3.s390x",
"openSUSE Leap 15.5:grafana-9.5.1-150200.3.41.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2023-06-21T11:42:33Z",
"details": "important"
}
],
"title": "CVE-2022-31107"
},
{
"cve": "CVE-2022-32149",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-32149"
}
],
"notes": [
{
"category": "general",
"text": "An attacker may cause a denial of service by crafting an Accept-Language header which ParseAcceptLanguage will take significant time to parse.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Package Hub 15 SP4:grafana-9.5.1-150200.3.41.3.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP4:grafana-9.5.1-150200.3.41.3.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP4:grafana-9.5.1-150200.3.41.3.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP4:grafana-9.5.1-150200.3.41.3.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:grafana-9.5.1-150200.3.41.3.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:grafana-9.5.1-150200.3.41.3.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:grafana-9.5.1-150200.3.41.3.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:grafana-9.5.1-150200.3.41.3.x86_64",
"openSUSE Leap 15.4:grafana-9.5.1-150200.3.41.3.aarch64",
"openSUSE Leap 15.4:grafana-9.5.1-150200.3.41.3.ppc64le",
"openSUSE Leap 15.4:grafana-9.5.1-150200.3.41.3.s390x",
"openSUSE Leap 15.4:grafana-9.5.1-150200.3.41.3.x86_64",
"openSUSE Leap 15.5:grafana-9.5.1-150200.3.41.3.aarch64",
"openSUSE Leap 15.5:grafana-9.5.1-150200.3.41.3.ppc64le",
"openSUSE Leap 15.5:grafana-9.5.1-150200.3.41.3.s390x",
"openSUSE Leap 15.5:grafana-9.5.1-150200.3.41.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-32149",
"url": "https://www.suse.com/security/cve/CVE-2022-32149"
},
{
"category": "external",
"summary": "SUSE Bug 1204501 for CVE-2022-32149",
"url": "https://bugzilla.suse.com/1204501"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Package Hub 15 SP4:grafana-9.5.1-150200.3.41.3.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP4:grafana-9.5.1-150200.3.41.3.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP4:grafana-9.5.1-150200.3.41.3.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP4:grafana-9.5.1-150200.3.41.3.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:grafana-9.5.1-150200.3.41.3.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:grafana-9.5.1-150200.3.41.3.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:grafana-9.5.1-150200.3.41.3.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:grafana-9.5.1-150200.3.41.3.x86_64",
"openSUSE Leap 15.4:grafana-9.5.1-150200.3.41.3.aarch64",
"openSUSE Leap 15.4:grafana-9.5.1-150200.3.41.3.ppc64le",
"openSUSE Leap 15.4:grafana-9.5.1-150200.3.41.3.s390x",
"openSUSE Leap 15.4:grafana-9.5.1-150200.3.41.3.x86_64",
"openSUSE Leap 15.5:grafana-9.5.1-150200.3.41.3.aarch64",
"openSUSE Leap 15.5:grafana-9.5.1-150200.3.41.3.ppc64le",
"openSUSE Leap 15.5:grafana-9.5.1-150200.3.41.3.s390x",
"openSUSE Leap 15.5:grafana-9.5.1-150200.3.41.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Package Hub 15 SP4:grafana-9.5.1-150200.3.41.3.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP4:grafana-9.5.1-150200.3.41.3.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP4:grafana-9.5.1-150200.3.41.3.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP4:grafana-9.5.1-150200.3.41.3.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:grafana-9.5.1-150200.3.41.3.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:grafana-9.5.1-150200.3.41.3.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:grafana-9.5.1-150200.3.41.3.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:grafana-9.5.1-150200.3.41.3.x86_64",
"openSUSE Leap 15.4:grafana-9.5.1-150200.3.41.3.aarch64",
"openSUSE Leap 15.4:grafana-9.5.1-150200.3.41.3.ppc64le",
"openSUSE Leap 15.4:grafana-9.5.1-150200.3.41.3.s390x",
"openSUSE Leap 15.4:grafana-9.5.1-150200.3.41.3.x86_64",
"openSUSE Leap 15.5:grafana-9.5.1-150200.3.41.3.aarch64",
"openSUSE Leap 15.5:grafana-9.5.1-150200.3.41.3.ppc64le",
"openSUSE Leap 15.5:grafana-9.5.1-150200.3.41.3.s390x",
"openSUSE Leap 15.5:grafana-9.5.1-150200.3.41.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2023-06-21T11:42:33Z",
"details": "important"
}
],
"title": "CVE-2022-32149"
},
{
"cve": "CVE-2022-35957",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-35957"
}
],
"notes": [
{
"category": "general",
"text": "Grafana is an open-source platform for monitoring and observability. Versions prior to 9.1.6 and 8.5.13 are vulnerable to an escalation from admin to server admin when auth proxy is used, allowing an admin to take over the server admin account and gain full control of the grafana instance. All installations should be upgraded as soon as possible. As a workaround deactivate auth proxy following the instructions at: https://grafana.com/docs/grafana/latest/setup-grafana/configure-security/configure-authentication/auth-proxy/",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Package Hub 15 SP4:grafana-9.5.1-150200.3.41.3.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP4:grafana-9.5.1-150200.3.41.3.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP4:grafana-9.5.1-150200.3.41.3.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP4:grafana-9.5.1-150200.3.41.3.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:grafana-9.5.1-150200.3.41.3.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:grafana-9.5.1-150200.3.41.3.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:grafana-9.5.1-150200.3.41.3.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:grafana-9.5.1-150200.3.41.3.x86_64",
"openSUSE Leap 15.4:grafana-9.5.1-150200.3.41.3.aarch64",
"openSUSE Leap 15.4:grafana-9.5.1-150200.3.41.3.ppc64le",
"openSUSE Leap 15.4:grafana-9.5.1-150200.3.41.3.s390x",
"openSUSE Leap 15.4:grafana-9.5.1-150200.3.41.3.x86_64",
"openSUSE Leap 15.5:grafana-9.5.1-150200.3.41.3.aarch64",
"openSUSE Leap 15.5:grafana-9.5.1-150200.3.41.3.ppc64le",
"openSUSE Leap 15.5:grafana-9.5.1-150200.3.41.3.s390x",
"openSUSE Leap 15.5:grafana-9.5.1-150200.3.41.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-35957",
"url": "https://www.suse.com/security/cve/CVE-2022-35957"
},
{
"category": "external",
"summary": "SUSE Bug 1203597 for CVE-2022-35957",
"url": "https://bugzilla.suse.com/1203597"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Package Hub 15 SP4:grafana-9.5.1-150200.3.41.3.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP4:grafana-9.5.1-150200.3.41.3.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP4:grafana-9.5.1-150200.3.41.3.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP4:grafana-9.5.1-150200.3.41.3.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:grafana-9.5.1-150200.3.41.3.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:grafana-9.5.1-150200.3.41.3.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:grafana-9.5.1-150200.3.41.3.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:grafana-9.5.1-150200.3.41.3.x86_64",
"openSUSE Leap 15.4:grafana-9.5.1-150200.3.41.3.aarch64",
"openSUSE Leap 15.4:grafana-9.5.1-150200.3.41.3.ppc64le",
"openSUSE Leap 15.4:grafana-9.5.1-150200.3.41.3.s390x",
"openSUSE Leap 15.4:grafana-9.5.1-150200.3.41.3.x86_64",
"openSUSE Leap 15.5:grafana-9.5.1-150200.3.41.3.aarch64",
"openSUSE Leap 15.5:grafana-9.5.1-150200.3.41.3.ppc64le",
"openSUSE Leap 15.5:grafana-9.5.1-150200.3.41.3.s390x",
"openSUSE Leap 15.5:grafana-9.5.1-150200.3.41.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Package Hub 15 SP4:grafana-9.5.1-150200.3.41.3.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP4:grafana-9.5.1-150200.3.41.3.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP4:grafana-9.5.1-150200.3.41.3.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP4:grafana-9.5.1-150200.3.41.3.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:grafana-9.5.1-150200.3.41.3.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:grafana-9.5.1-150200.3.41.3.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:grafana-9.5.1-150200.3.41.3.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:grafana-9.5.1-150200.3.41.3.x86_64",
"openSUSE Leap 15.4:grafana-9.5.1-150200.3.41.3.aarch64",
"openSUSE Leap 15.4:grafana-9.5.1-150200.3.41.3.ppc64le",
"openSUSE Leap 15.4:grafana-9.5.1-150200.3.41.3.s390x",
"openSUSE Leap 15.4:grafana-9.5.1-150200.3.41.3.x86_64",
"openSUSE Leap 15.5:grafana-9.5.1-150200.3.41.3.aarch64",
"openSUSE Leap 15.5:grafana-9.5.1-150200.3.41.3.ppc64le",
"openSUSE Leap 15.5:grafana-9.5.1-150200.3.41.3.s390x",
"openSUSE Leap 15.5:grafana-9.5.1-150200.3.41.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2023-06-21T11:42:33Z",
"details": "moderate"
}
],
"title": "CVE-2022-35957"
},
{
"cve": "CVE-2022-36062",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-36062"
}
],
"notes": [
{
"category": "general",
"text": "Grafana is an open-source platform for monitoring and observability. In versions prior to 8.5.13, 9.0.9, and 9.1.6, Grafana is subject to Improper Preservation of Permissions resulting in privilege escalation on some folders where Admin is the only used permission. The vulnerability impacts Grafana instances where RBAC was disabled and enabled afterwards, as the migrations which are translating legacy folder permissions to RBAC permissions do not account for the scenario where the only user permission in the folder is Admin, as a result RBAC adds permissions for Editors and Viewers which allow them to edit and view folders accordingly. This issue has been patched in versions 8.5.13, 9.0.9, and 9.1.6. A workaround when the impacted folder/dashboard is known is to remove the additional permissions manually.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Package Hub 15 SP4:grafana-9.5.1-150200.3.41.3.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP4:grafana-9.5.1-150200.3.41.3.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP4:grafana-9.5.1-150200.3.41.3.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP4:grafana-9.5.1-150200.3.41.3.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:grafana-9.5.1-150200.3.41.3.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:grafana-9.5.1-150200.3.41.3.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:grafana-9.5.1-150200.3.41.3.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:grafana-9.5.1-150200.3.41.3.x86_64",
"openSUSE Leap 15.4:grafana-9.5.1-150200.3.41.3.aarch64",
"openSUSE Leap 15.4:grafana-9.5.1-150200.3.41.3.ppc64le",
"openSUSE Leap 15.4:grafana-9.5.1-150200.3.41.3.s390x",
"openSUSE Leap 15.4:grafana-9.5.1-150200.3.41.3.x86_64",
"openSUSE Leap 15.5:grafana-9.5.1-150200.3.41.3.aarch64",
"openSUSE Leap 15.5:grafana-9.5.1-150200.3.41.3.ppc64le",
"openSUSE Leap 15.5:grafana-9.5.1-150200.3.41.3.s390x",
"openSUSE Leap 15.5:grafana-9.5.1-150200.3.41.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-36062",
"url": "https://www.suse.com/security/cve/CVE-2022-36062"
},
{
"category": "external",
"summary": "SUSE Bug 1203596 for CVE-2022-36062",
"url": "https://bugzilla.suse.com/1203596"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Package Hub 15 SP4:grafana-9.5.1-150200.3.41.3.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP4:grafana-9.5.1-150200.3.41.3.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP4:grafana-9.5.1-150200.3.41.3.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP4:grafana-9.5.1-150200.3.41.3.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:grafana-9.5.1-150200.3.41.3.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:grafana-9.5.1-150200.3.41.3.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:grafana-9.5.1-150200.3.41.3.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:grafana-9.5.1-150200.3.41.3.x86_64",
"openSUSE Leap 15.4:grafana-9.5.1-150200.3.41.3.aarch64",
"openSUSE Leap 15.4:grafana-9.5.1-150200.3.41.3.ppc64le",
"openSUSE Leap 15.4:grafana-9.5.1-150200.3.41.3.s390x",
"openSUSE Leap 15.4:grafana-9.5.1-150200.3.41.3.x86_64",
"openSUSE Leap 15.5:grafana-9.5.1-150200.3.41.3.aarch64",
"openSUSE Leap 15.5:grafana-9.5.1-150200.3.41.3.ppc64le",
"openSUSE Leap 15.5:grafana-9.5.1-150200.3.41.3.s390x",
"openSUSE Leap 15.5:grafana-9.5.1-150200.3.41.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:L/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Package Hub 15 SP4:grafana-9.5.1-150200.3.41.3.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP4:grafana-9.5.1-150200.3.41.3.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP4:grafana-9.5.1-150200.3.41.3.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP4:grafana-9.5.1-150200.3.41.3.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:grafana-9.5.1-150200.3.41.3.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:grafana-9.5.1-150200.3.41.3.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:grafana-9.5.1-150200.3.41.3.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:grafana-9.5.1-150200.3.41.3.x86_64",
"openSUSE Leap 15.4:grafana-9.5.1-150200.3.41.3.aarch64",
"openSUSE Leap 15.4:grafana-9.5.1-150200.3.41.3.ppc64le",
"openSUSE Leap 15.4:grafana-9.5.1-150200.3.41.3.s390x",
"openSUSE Leap 15.4:grafana-9.5.1-150200.3.41.3.x86_64",
"openSUSE Leap 15.5:grafana-9.5.1-150200.3.41.3.aarch64",
"openSUSE Leap 15.5:grafana-9.5.1-150200.3.41.3.ppc64le",
"openSUSE Leap 15.5:grafana-9.5.1-150200.3.41.3.s390x",
"openSUSE Leap 15.5:grafana-9.5.1-150200.3.41.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2023-06-21T11:42:33Z",
"details": "moderate"
}
],
"title": "CVE-2022-36062"
},
{
"cve": "CVE-2023-1387",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-1387"
}
],
"notes": [
{
"category": "general",
"text": "Grafana is an open-source platform for monitoring and observability. \n\nStarting with the 9.1 branch, Grafana introduced the ability to search for a JWT in the URL query parameter auth_token and use it as the authentication token. \n\nBy enabling the \"url_login\" configuration option (disabled by default), a JWT might be sent to data sources. If an attacker has access to the data source, the leaked token could be used to authenticate to Grafana.\n\n",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Package Hub 15 SP4:grafana-9.5.1-150200.3.41.3.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP4:grafana-9.5.1-150200.3.41.3.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP4:grafana-9.5.1-150200.3.41.3.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP4:grafana-9.5.1-150200.3.41.3.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:grafana-9.5.1-150200.3.41.3.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:grafana-9.5.1-150200.3.41.3.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:grafana-9.5.1-150200.3.41.3.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:grafana-9.5.1-150200.3.41.3.x86_64",
"openSUSE Leap 15.4:grafana-9.5.1-150200.3.41.3.aarch64",
"openSUSE Leap 15.4:grafana-9.5.1-150200.3.41.3.ppc64le",
"openSUSE Leap 15.4:grafana-9.5.1-150200.3.41.3.s390x",
"openSUSE Leap 15.4:grafana-9.5.1-150200.3.41.3.x86_64",
"openSUSE Leap 15.5:grafana-9.5.1-150200.3.41.3.aarch64",
"openSUSE Leap 15.5:grafana-9.5.1-150200.3.41.3.ppc64le",
"openSUSE Leap 15.5:grafana-9.5.1-150200.3.41.3.s390x",
"openSUSE Leap 15.5:grafana-9.5.1-150200.3.41.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-1387",
"url": "https://www.suse.com/security/cve/CVE-2023-1387"
},
{
"category": "external",
"summary": "SUSE Bug 1210907 for CVE-2023-1387",
"url": "https://bugzilla.suse.com/1210907"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Package Hub 15 SP4:grafana-9.5.1-150200.3.41.3.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP4:grafana-9.5.1-150200.3.41.3.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP4:grafana-9.5.1-150200.3.41.3.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP4:grafana-9.5.1-150200.3.41.3.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:grafana-9.5.1-150200.3.41.3.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:grafana-9.5.1-150200.3.41.3.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:grafana-9.5.1-150200.3.41.3.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:grafana-9.5.1-150200.3.41.3.x86_64",
"openSUSE Leap 15.4:grafana-9.5.1-150200.3.41.3.aarch64",
"openSUSE Leap 15.4:grafana-9.5.1-150200.3.41.3.ppc64le",
"openSUSE Leap 15.4:grafana-9.5.1-150200.3.41.3.s390x",
"openSUSE Leap 15.4:grafana-9.5.1-150200.3.41.3.x86_64",
"openSUSE Leap 15.5:grafana-9.5.1-150200.3.41.3.aarch64",
"openSUSE Leap 15.5:grafana-9.5.1-150200.3.41.3.ppc64le",
"openSUSE Leap 15.5:grafana-9.5.1-150200.3.41.3.s390x",
"openSUSE Leap 15.5:grafana-9.5.1-150200.3.41.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Package Hub 15 SP4:grafana-9.5.1-150200.3.41.3.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP4:grafana-9.5.1-150200.3.41.3.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP4:grafana-9.5.1-150200.3.41.3.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP4:grafana-9.5.1-150200.3.41.3.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:grafana-9.5.1-150200.3.41.3.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:grafana-9.5.1-150200.3.41.3.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:grafana-9.5.1-150200.3.41.3.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:grafana-9.5.1-150200.3.41.3.x86_64",
"openSUSE Leap 15.4:grafana-9.5.1-150200.3.41.3.aarch64",
"openSUSE Leap 15.4:grafana-9.5.1-150200.3.41.3.ppc64le",
"openSUSE Leap 15.4:grafana-9.5.1-150200.3.41.3.s390x",
"openSUSE Leap 15.4:grafana-9.5.1-150200.3.41.3.x86_64",
"openSUSE Leap 15.5:grafana-9.5.1-150200.3.41.3.aarch64",
"openSUSE Leap 15.5:grafana-9.5.1-150200.3.41.3.ppc64le",
"openSUSE Leap 15.5:grafana-9.5.1-150200.3.41.3.s390x",
"openSUSE Leap 15.5:grafana-9.5.1-150200.3.41.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2023-06-21T11:42:33Z",
"details": "moderate"
}
],
"title": "CVE-2023-1387"
},
{
"cve": "CVE-2023-1410",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-1410"
}
],
"notes": [
{
"category": "general",
"text": "Grafana is an open-source platform for monitoring and observability. \n\nGrafana had a stored XSS vulnerability in the Graphite FunctionDescription tooltip. \n\nThe stored XSS vulnerability was possible due the value of the Function Description was not properly sanitized.\n\nAn attacker needs to have control over the Graphite data source in order to manipulate a function description and a Grafana admin needs to configure the data source, later a Grafana user needs to select a tampered function and hover over the description. \n\n Users may upgrade to version 8.5.22, 9.2.15 and 9.3.11 to receive a fix. \n\n\n\n\n\n\n\n\n\n\n",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Package Hub 15 SP4:grafana-9.5.1-150200.3.41.3.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP4:grafana-9.5.1-150200.3.41.3.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP4:grafana-9.5.1-150200.3.41.3.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP4:grafana-9.5.1-150200.3.41.3.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:grafana-9.5.1-150200.3.41.3.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:grafana-9.5.1-150200.3.41.3.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:grafana-9.5.1-150200.3.41.3.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:grafana-9.5.1-150200.3.41.3.x86_64",
"openSUSE Leap 15.4:grafana-9.5.1-150200.3.41.3.aarch64",
"openSUSE Leap 15.4:grafana-9.5.1-150200.3.41.3.ppc64le",
"openSUSE Leap 15.4:grafana-9.5.1-150200.3.41.3.s390x",
"openSUSE Leap 15.4:grafana-9.5.1-150200.3.41.3.x86_64",
"openSUSE Leap 15.5:grafana-9.5.1-150200.3.41.3.aarch64",
"openSUSE Leap 15.5:grafana-9.5.1-150200.3.41.3.ppc64le",
"openSUSE Leap 15.5:grafana-9.5.1-150200.3.41.3.s390x",
"openSUSE Leap 15.5:grafana-9.5.1-150200.3.41.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-1410",
"url": "https://www.suse.com/security/cve/CVE-2023-1410"
},
{
"category": "external",
"summary": "SUSE Bug 1209645 for CVE-2023-1410",
"url": "https://bugzilla.suse.com/1209645"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Package Hub 15 SP4:grafana-9.5.1-150200.3.41.3.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP4:grafana-9.5.1-150200.3.41.3.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP4:grafana-9.5.1-150200.3.41.3.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP4:grafana-9.5.1-150200.3.41.3.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:grafana-9.5.1-150200.3.41.3.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:grafana-9.5.1-150200.3.41.3.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:grafana-9.5.1-150200.3.41.3.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:grafana-9.5.1-150200.3.41.3.x86_64",
"openSUSE Leap 15.4:grafana-9.5.1-150200.3.41.3.aarch64",
"openSUSE Leap 15.4:grafana-9.5.1-150200.3.41.3.ppc64le",
"openSUSE Leap 15.4:grafana-9.5.1-150200.3.41.3.s390x",
"openSUSE Leap 15.4:grafana-9.5.1-150200.3.41.3.x86_64",
"openSUSE Leap 15.5:grafana-9.5.1-150200.3.41.3.aarch64",
"openSUSE Leap 15.5:grafana-9.5.1-150200.3.41.3.ppc64le",
"openSUSE Leap 15.5:grafana-9.5.1-150200.3.41.3.s390x",
"openSUSE Leap 15.5:grafana-9.5.1-150200.3.41.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Package Hub 15 SP4:grafana-9.5.1-150200.3.41.3.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP4:grafana-9.5.1-150200.3.41.3.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP4:grafana-9.5.1-150200.3.41.3.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP4:grafana-9.5.1-150200.3.41.3.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:grafana-9.5.1-150200.3.41.3.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:grafana-9.5.1-150200.3.41.3.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:grafana-9.5.1-150200.3.41.3.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:grafana-9.5.1-150200.3.41.3.x86_64",
"openSUSE Leap 15.4:grafana-9.5.1-150200.3.41.3.aarch64",
"openSUSE Leap 15.4:grafana-9.5.1-150200.3.41.3.ppc64le",
"openSUSE Leap 15.4:grafana-9.5.1-150200.3.41.3.s390x",
"openSUSE Leap 15.4:grafana-9.5.1-150200.3.41.3.x86_64",
"openSUSE Leap 15.5:grafana-9.5.1-150200.3.41.3.aarch64",
"openSUSE Leap 15.5:grafana-9.5.1-150200.3.41.3.ppc64le",
"openSUSE Leap 15.5:grafana-9.5.1-150200.3.41.3.s390x",
"openSUSE Leap 15.5:grafana-9.5.1-150200.3.41.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2023-06-21T11:42:33Z",
"details": "moderate"
}
],
"title": "CVE-2023-1410"
}
]
}
suse-su-2023:3875-1
Vulnerability from csaf_suse
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for SUSE Manager Client Tools",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update fixes the following issues:\n\ngolang-github-lusitaniae-apache_exporter:\n\n- Security issues fixed:\n * CVE-2022-32149: Fix denial of service vulnerability (bsc#1204501)\n * CVE-2022-41723: Fix uncontrolled resource consumption (bsc#1208270)\n * CVE-2022-46146: Fix authentication bypass vulnarability (bsc#1208046)\n- Changes and bugs fixed:\n * Updated to 1.0.0 (jsc#PED-5405)\n + Improved flag parsing\n + Added support for custom headers\n * Changes from 0.13.1\n + Fix panic caused by missing flagConfig options\n * Changes from 0.11.0 (jsc#SLE-24791)\n + Add TLS support\n + Switch to logger, please check --log.level and --log.format flags\n * Changes from 0.10.1\n + Bugfix: Reset ProxyBalancer metrics on each scrape to\n remove stale data\n * Changes from 0.10.0\n + Add Apache Proxy and other metrics\n * Changes from 0.8.0\n + Change commandline flags\n + Add metrics: Apache version, request duration total\n * Changes from 0.7.0\n + Handle OS TERM signals\n * Changes from 0.6.0\n + Add option to override host name\n * Added support for Red Hat Enterprise Linux\n * Added AppArmor profile\n * Added sandboxing options to systemd service unit\n * Build using promu\n * Build with Go 1.19\n * Exclude s390 architecture\n\ngolang-github-prometheus-node_exporter:\n\n- CVE-2023-29409: Restrict RSA keys in certificates to less than or equal to 8192 bits to avoid DoSing client/server\n while validating signatures for extremely large RSA keys. (bsc#1213880)\n There are no direct source changes. The CVE is fixed rebuilding the sources with the patched Go version.\n\ngolang-github-QubitProducts-exporter_exporter:\n\n- CVE-2023-29409: Restrict RSA keys in certificates to less than or equal to 8192 bits to avoid DoSing client/server\n while validating signatures for extremely large RSA keys. (bsc#1213880)\n There are no direct source changes. The CVE is fixed rebuilding the sources with the patched Go version.\n\nprometheus-postgres_exporter:\n\n- CVE-2023-29409: Restrict RSA keys in certificates to less than or equal to 8192 bits to avoid DoSing client/server\n while validating signatures for extremely large RSA keys. (bsc#1213880)\n There are no direct source changes. The CVE is fixed rebuilding the sources with the patched Go version.\n\nscap-security-guide:\n\n- Updated to 0.1.69 (jsc#ECO-3319)\n - Introduce a JSON build manifest\n - Introduce a script to compare ComplianceAsCode versions\n - Introduce CCN profiles for Red Hat Enterprise Linux 9\n - Map rules to components\n - products/anolis23: supports Anolis OS 23\n - Render components to HTML\n - Store rendered control files\n - Test and use rules to components mapping\n - Use distributed product properties\n- Revert patch that breaks the SLE hardening (bsc#1213691)\n- Changes from 0.1.68 (jsc#ECO-3319)\n - Bump OL8 STIG version to V1R6\n - Introduce a Product class, make the project work with it\n - Introduce Fedora and Firefox CaC profiles for common workstation users\n - OL7 DISA STIG v2r11 update\n - Publish rendered policy artifacts\n - Update ANSSI BP-028 to version 2.0\n- Changes from 0.1.67 (jsc#ECO-3319)\n - Add utils/controlrefcheck.py\n - Red Hat Enterprise Linux 9 STIG Update Q1 2023\n - Include warning for NetworkManager keyfiles in Red Hat Enterprise Linux 9\n - OL7 stig v2r10 update\n - Bump version of OL8 STIG to V1R5\n- Various enhancements to SLE profiles\n\nspacecmd:\n\n- Updated to 4.3.23-1\n * Update translation strings\n\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2023-3875,SUSE-EL-9-CLIENT-TOOLS-2023-3875",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2023_3875-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2023:3875-1",
"url": "https://www.suse.com/support/update/announcement/2023/suse-su-20233875-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2023:3875-1",
"url": "https://lists.suse.com/pipermail/sle-updates/2023-September/031784.html"
},
{
"category": "self",
"summary": "SUSE Bug 1204501",
"url": "https://bugzilla.suse.com/1204501"
},
{
"category": "self",
"summary": "SUSE Bug 1208046",
"url": "https://bugzilla.suse.com/1208046"
},
{
"category": "self",
"summary": "SUSE Bug 1208270",
"url": "https://bugzilla.suse.com/1208270"
},
{
"category": "self",
"summary": "SUSE Bug 1213691",
"url": "https://bugzilla.suse.com/1213691"
},
{
"category": "self",
"summary": "SUSE Bug 1213880",
"url": "https://bugzilla.suse.com/1213880"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-32149 page",
"url": "https://www.suse.com/security/cve/CVE-2022-32149/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-41723 page",
"url": "https://www.suse.com/security/cve/CVE-2022-41723/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-46146 page",
"url": "https://www.suse.com/security/cve/CVE-2022-46146/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-29409 page",
"url": "https://www.suse.com/security/cve/CVE-2023-29409/"
}
],
"title": "Security update for SUSE Manager Client Tools",
"tracking": {
"current_release_date": "2023-09-28T11:45:38Z",
"generator": {
"date": "2023-09-28T11:45:38Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2023:3875-1",
"initial_release_date": "2023-09-28T11:45:38Z",
"revision_history": [
{
"date": "2023-09-28T11:45:38Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "golang-github-QubitProducts-exporter_exporter-0.4.0-1.6.1.aarch64",
"product": {
"name": "golang-github-QubitProducts-exporter_exporter-0.4.0-1.6.1.aarch64",
"product_id": "golang-github-QubitProducts-exporter_exporter-0.4.0-1.6.1.aarch64"
}
},
{
"category": "product_version",
"name": "golang-github-lusitaniae-apache_exporter-1.0.0-1.8.1.aarch64",
"product": {
"name": "golang-github-lusitaniae-apache_exporter-1.0.0-1.8.1.aarch64",
"product_id": "golang-github-lusitaniae-apache_exporter-1.0.0-1.8.1.aarch64"
}
},
{
"category": "product_version",
"name": "golang-github-prometheus-node_exporter-1.5.0-1.9.2.aarch64",
"product": {
"name": "golang-github-prometheus-node_exporter-1.5.0-1.9.2.aarch64",
"product_id": "golang-github-prometheus-node_exporter-1.5.0-1.9.2.aarch64"
}
},
{
"category": "product_version",
"name": "prometheus-postgres_exporter-0.10.1-1.9.2.aarch64",
"product": {
"name": "prometheus-postgres_exporter-0.10.1-1.9.2.aarch64",
"product_id": "prometheus-postgres_exporter-0.10.1-1.9.2.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "scap-security-guide-0.1.69-1.12.2.noarch",
"product": {
"name": "scap-security-guide-0.1.69-1.12.2.noarch",
"product_id": "scap-security-guide-0.1.69-1.12.2.noarch"
}
},
{
"category": "product_version",
"name": "scap-security-guide-debian-0.1.69-1.12.2.noarch",
"product": {
"name": "scap-security-guide-debian-0.1.69-1.12.2.noarch",
"product_id": "scap-security-guide-debian-0.1.69-1.12.2.noarch"
}
},
{
"category": "product_version",
"name": "scap-security-guide-redhat-0.1.69-1.12.2.noarch",
"product": {
"name": "scap-security-guide-redhat-0.1.69-1.12.2.noarch",
"product_id": "scap-security-guide-redhat-0.1.69-1.12.2.noarch"
}
},
{
"category": "product_version",
"name": "scap-security-guide-ubuntu-0.1.69-1.12.2.noarch",
"product": {
"name": "scap-security-guide-ubuntu-0.1.69-1.12.2.noarch",
"product_id": "scap-security-guide-ubuntu-0.1.69-1.12.2.noarch"
}
},
{
"category": "product_version",
"name": "spacecmd-4.3.23-1.18.2.noarch",
"product": {
"name": "spacecmd-4.3.23-1.18.2.noarch",
"product_id": "spacecmd-4.3.23-1.18.2.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "golang-github-QubitProducts-exporter_exporter-0.4.0-1.6.1.ppc64le",
"product": {
"name": "golang-github-QubitProducts-exporter_exporter-0.4.0-1.6.1.ppc64le",
"product_id": "golang-github-QubitProducts-exporter_exporter-0.4.0-1.6.1.ppc64le"
}
},
{
"category": "product_version",
"name": "golang-github-lusitaniae-apache_exporter-1.0.0-1.8.1.ppc64le",
"product": {
"name": "golang-github-lusitaniae-apache_exporter-1.0.0-1.8.1.ppc64le",
"product_id": "golang-github-lusitaniae-apache_exporter-1.0.0-1.8.1.ppc64le"
}
},
{
"category": "product_version",
"name": "golang-github-prometheus-node_exporter-1.5.0-1.9.2.ppc64le",
"product": {
"name": "golang-github-prometheus-node_exporter-1.5.0-1.9.2.ppc64le",
"product_id": "golang-github-prometheus-node_exporter-1.5.0-1.9.2.ppc64le"
}
},
{
"category": "product_version",
"name": "prometheus-postgres_exporter-0.10.1-1.9.2.ppc64le",
"product": {
"name": "prometheus-postgres_exporter-0.10.1-1.9.2.ppc64le",
"product_id": "prometheus-postgres_exporter-0.10.1-1.9.2.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "golang-github-QubitProducts-exporter_exporter-0.4.0-1.6.1.s390x",
"product": {
"name": "golang-github-QubitProducts-exporter_exporter-0.4.0-1.6.1.s390x",
"product_id": "golang-github-QubitProducts-exporter_exporter-0.4.0-1.6.1.s390x"
}
},
{
"category": "product_version",
"name": "golang-github-lusitaniae-apache_exporter-1.0.0-1.8.1.s390x",
"product": {
"name": "golang-github-lusitaniae-apache_exporter-1.0.0-1.8.1.s390x",
"product_id": "golang-github-lusitaniae-apache_exporter-1.0.0-1.8.1.s390x"
}
},
{
"category": "product_version",
"name": "prometheus-postgres_exporter-0.10.1-1.9.2.s390x",
"product": {
"name": "prometheus-postgres_exporter-0.10.1-1.9.2.s390x",
"product_id": "prometheus-postgres_exporter-0.10.1-1.9.2.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "golang-github-QubitProducts-exporter_exporter-0.4.0-1.6.1.x86_64",
"product": {
"name": "golang-github-QubitProducts-exporter_exporter-0.4.0-1.6.1.x86_64",
"product_id": "golang-github-QubitProducts-exporter_exporter-0.4.0-1.6.1.x86_64"
}
},
{
"category": "product_version",
"name": "golang-github-lusitaniae-apache_exporter-1.0.0-1.8.1.x86_64",
"product": {
"name": "golang-github-lusitaniae-apache_exporter-1.0.0-1.8.1.x86_64",
"product_id": "golang-github-lusitaniae-apache_exporter-1.0.0-1.8.1.x86_64"
}
},
{
"category": "product_version",
"name": "golang-github-prometheus-node_exporter-1.5.0-1.9.2.x86_64",
"product": {
"name": "golang-github-prometheus-node_exporter-1.5.0-1.9.2.x86_64",
"product_id": "golang-github-prometheus-node_exporter-1.5.0-1.9.2.x86_64"
}
},
{
"category": "product_version",
"name": "prometheus-postgres_exporter-0.10.1-1.9.2.x86_64",
"product": {
"name": "prometheus-postgres_exporter-0.10.1-1.9.2.x86_64",
"product_id": "prometheus-postgres_exporter-0.10.1-1.9.2.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE:EL-9:Update:Products:ManagerTools:Update",
"product": {
"name": "SUSE:EL-9:Update:Products:ManagerTools:Update",
"product_id": "SUSE:EL-9:Update:Products:ManagerTools:Update"
}
},
{
"category": "product_name",
"name": "SUSE Manager Client Tools for RHEL, Liberty and Clones 9-CLIENT-TOOLS",
"product": {
"name": "SUSE Manager Client Tools for RHEL, Liberty and Clones 9-CLIENT-TOOLS",
"product_id": "SUSE Manager Client Tools for RHEL, Liberty and Clones 9-CLIENT-TOOLS"
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-github-QubitProducts-exporter_exporter-0.4.0-1.6.1.aarch64 as component of SUSE:EL-9:Update:Products:ManagerTools:Update",
"product_id": "SUSE:EL-9:Update:Products:ManagerTools:Update:golang-github-QubitProducts-exporter_exporter-0.4.0-1.6.1.aarch64"
},
"product_reference": "golang-github-QubitProducts-exporter_exporter-0.4.0-1.6.1.aarch64",
"relates_to_product_reference": "SUSE:EL-9:Update:Products:ManagerTools:Update"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-github-QubitProducts-exporter_exporter-0.4.0-1.6.1.ppc64le as component of SUSE:EL-9:Update:Products:ManagerTools:Update",
"product_id": "SUSE:EL-9:Update:Products:ManagerTools:Update:golang-github-QubitProducts-exporter_exporter-0.4.0-1.6.1.ppc64le"
},
"product_reference": "golang-github-QubitProducts-exporter_exporter-0.4.0-1.6.1.ppc64le",
"relates_to_product_reference": "SUSE:EL-9:Update:Products:ManagerTools:Update"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-github-QubitProducts-exporter_exporter-0.4.0-1.6.1.s390x as component of SUSE:EL-9:Update:Products:ManagerTools:Update",
"product_id": "SUSE:EL-9:Update:Products:ManagerTools:Update:golang-github-QubitProducts-exporter_exporter-0.4.0-1.6.1.s390x"
},
"product_reference": "golang-github-QubitProducts-exporter_exporter-0.4.0-1.6.1.s390x",
"relates_to_product_reference": "SUSE:EL-9:Update:Products:ManagerTools:Update"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-github-QubitProducts-exporter_exporter-0.4.0-1.6.1.x86_64 as component of SUSE:EL-9:Update:Products:ManagerTools:Update",
"product_id": "SUSE:EL-9:Update:Products:ManagerTools:Update:golang-github-QubitProducts-exporter_exporter-0.4.0-1.6.1.x86_64"
},
"product_reference": "golang-github-QubitProducts-exporter_exporter-0.4.0-1.6.1.x86_64",
"relates_to_product_reference": "SUSE:EL-9:Update:Products:ManagerTools:Update"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-github-lusitaniae-apache_exporter-1.0.0-1.8.1.aarch64 as component of SUSE:EL-9:Update:Products:ManagerTools:Update",
"product_id": "SUSE:EL-9:Update:Products:ManagerTools:Update:golang-github-lusitaniae-apache_exporter-1.0.0-1.8.1.aarch64"
},
"product_reference": "golang-github-lusitaniae-apache_exporter-1.0.0-1.8.1.aarch64",
"relates_to_product_reference": "SUSE:EL-9:Update:Products:ManagerTools:Update"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-github-lusitaniae-apache_exporter-1.0.0-1.8.1.ppc64le as component of SUSE:EL-9:Update:Products:ManagerTools:Update",
"product_id": "SUSE:EL-9:Update:Products:ManagerTools:Update:golang-github-lusitaniae-apache_exporter-1.0.0-1.8.1.ppc64le"
},
"product_reference": "golang-github-lusitaniae-apache_exporter-1.0.0-1.8.1.ppc64le",
"relates_to_product_reference": "SUSE:EL-9:Update:Products:ManagerTools:Update"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-github-lusitaniae-apache_exporter-1.0.0-1.8.1.s390x as component of SUSE:EL-9:Update:Products:ManagerTools:Update",
"product_id": "SUSE:EL-9:Update:Products:ManagerTools:Update:golang-github-lusitaniae-apache_exporter-1.0.0-1.8.1.s390x"
},
"product_reference": "golang-github-lusitaniae-apache_exporter-1.0.0-1.8.1.s390x",
"relates_to_product_reference": "SUSE:EL-9:Update:Products:ManagerTools:Update"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-github-lusitaniae-apache_exporter-1.0.0-1.8.1.x86_64 as component of SUSE:EL-9:Update:Products:ManagerTools:Update",
"product_id": "SUSE:EL-9:Update:Products:ManagerTools:Update:golang-github-lusitaniae-apache_exporter-1.0.0-1.8.1.x86_64"
},
"product_reference": "golang-github-lusitaniae-apache_exporter-1.0.0-1.8.1.x86_64",
"relates_to_product_reference": "SUSE:EL-9:Update:Products:ManagerTools:Update"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-github-prometheus-node_exporter-1.5.0-1.9.2.aarch64 as component of SUSE:EL-9:Update:Products:ManagerTools:Update",
"product_id": "SUSE:EL-9:Update:Products:ManagerTools:Update:golang-github-prometheus-node_exporter-1.5.0-1.9.2.aarch64"
},
"product_reference": "golang-github-prometheus-node_exporter-1.5.0-1.9.2.aarch64",
"relates_to_product_reference": "SUSE:EL-9:Update:Products:ManagerTools:Update"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-github-prometheus-node_exporter-1.5.0-1.9.2.ppc64le as component of SUSE:EL-9:Update:Products:ManagerTools:Update",
"product_id": "SUSE:EL-9:Update:Products:ManagerTools:Update:golang-github-prometheus-node_exporter-1.5.0-1.9.2.ppc64le"
},
"product_reference": "golang-github-prometheus-node_exporter-1.5.0-1.9.2.ppc64le",
"relates_to_product_reference": "SUSE:EL-9:Update:Products:ManagerTools:Update"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-github-prometheus-node_exporter-1.5.0-1.9.2.x86_64 as component of SUSE:EL-9:Update:Products:ManagerTools:Update",
"product_id": "SUSE:EL-9:Update:Products:ManagerTools:Update:golang-github-prometheus-node_exporter-1.5.0-1.9.2.x86_64"
},
"product_reference": "golang-github-prometheus-node_exporter-1.5.0-1.9.2.x86_64",
"relates_to_product_reference": "SUSE:EL-9:Update:Products:ManagerTools:Update"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "prometheus-postgres_exporter-0.10.1-1.9.2.aarch64 as component of SUSE:EL-9:Update:Products:ManagerTools:Update",
"product_id": "SUSE:EL-9:Update:Products:ManagerTools:Update:prometheus-postgres_exporter-0.10.1-1.9.2.aarch64"
},
"product_reference": "prometheus-postgres_exporter-0.10.1-1.9.2.aarch64",
"relates_to_product_reference": "SUSE:EL-9:Update:Products:ManagerTools:Update"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "prometheus-postgres_exporter-0.10.1-1.9.2.ppc64le as component of SUSE:EL-9:Update:Products:ManagerTools:Update",
"product_id": "SUSE:EL-9:Update:Products:ManagerTools:Update:prometheus-postgres_exporter-0.10.1-1.9.2.ppc64le"
},
"product_reference": "prometheus-postgres_exporter-0.10.1-1.9.2.ppc64le",
"relates_to_product_reference": "SUSE:EL-9:Update:Products:ManagerTools:Update"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "prometheus-postgres_exporter-0.10.1-1.9.2.s390x as component of SUSE:EL-9:Update:Products:ManagerTools:Update",
"product_id": "SUSE:EL-9:Update:Products:ManagerTools:Update:prometheus-postgres_exporter-0.10.1-1.9.2.s390x"
},
"product_reference": "prometheus-postgres_exporter-0.10.1-1.9.2.s390x",
"relates_to_product_reference": "SUSE:EL-9:Update:Products:ManagerTools:Update"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "prometheus-postgres_exporter-0.10.1-1.9.2.x86_64 as component of SUSE:EL-9:Update:Products:ManagerTools:Update",
"product_id": "SUSE:EL-9:Update:Products:ManagerTools:Update:prometheus-postgres_exporter-0.10.1-1.9.2.x86_64"
},
"product_reference": "prometheus-postgres_exporter-0.10.1-1.9.2.x86_64",
"relates_to_product_reference": "SUSE:EL-9:Update:Products:ManagerTools:Update"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "scap-security-guide-0.1.69-1.12.2.noarch as component of SUSE:EL-9:Update:Products:ManagerTools:Update",
"product_id": "SUSE:EL-9:Update:Products:ManagerTools:Update:scap-security-guide-0.1.69-1.12.2.noarch"
},
"product_reference": "scap-security-guide-0.1.69-1.12.2.noarch",
"relates_to_product_reference": "SUSE:EL-9:Update:Products:ManagerTools:Update"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "scap-security-guide-debian-0.1.69-1.12.2.noarch as component of SUSE:EL-9:Update:Products:ManagerTools:Update",
"product_id": "SUSE:EL-9:Update:Products:ManagerTools:Update:scap-security-guide-debian-0.1.69-1.12.2.noarch"
},
"product_reference": "scap-security-guide-debian-0.1.69-1.12.2.noarch",
"relates_to_product_reference": "SUSE:EL-9:Update:Products:ManagerTools:Update"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "scap-security-guide-redhat-0.1.69-1.12.2.noarch as component of SUSE:EL-9:Update:Products:ManagerTools:Update",
"product_id": "SUSE:EL-9:Update:Products:ManagerTools:Update:scap-security-guide-redhat-0.1.69-1.12.2.noarch"
},
"product_reference": "scap-security-guide-redhat-0.1.69-1.12.2.noarch",
"relates_to_product_reference": "SUSE:EL-9:Update:Products:ManagerTools:Update"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "scap-security-guide-ubuntu-0.1.69-1.12.2.noarch as component of SUSE:EL-9:Update:Products:ManagerTools:Update",
"product_id": "SUSE:EL-9:Update:Products:ManagerTools:Update:scap-security-guide-ubuntu-0.1.69-1.12.2.noarch"
},
"product_reference": "scap-security-guide-ubuntu-0.1.69-1.12.2.noarch",
"relates_to_product_reference": "SUSE:EL-9:Update:Products:ManagerTools:Update"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "spacecmd-4.3.23-1.18.2.noarch as component of SUSE:EL-9:Update:Products:ManagerTools:Update",
"product_id": "SUSE:EL-9:Update:Products:ManagerTools:Update:spacecmd-4.3.23-1.18.2.noarch"
},
"product_reference": "spacecmd-4.3.23-1.18.2.noarch",
"relates_to_product_reference": "SUSE:EL-9:Update:Products:ManagerTools:Update"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-github-QubitProducts-exporter_exporter-0.4.0-1.6.1.aarch64 as component of SUSE Manager Client Tools for RHEL, Liberty and Clones 9-CLIENT-TOOLS",
"product_id": "SUSE Manager Client Tools for RHEL, Liberty and Clones 9-CLIENT-TOOLS:golang-github-QubitProducts-exporter_exporter-0.4.0-1.6.1.aarch64"
},
"product_reference": "golang-github-QubitProducts-exporter_exporter-0.4.0-1.6.1.aarch64",
"relates_to_product_reference": "SUSE Manager Client Tools for RHEL, Liberty and Clones 9-CLIENT-TOOLS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-github-QubitProducts-exporter_exporter-0.4.0-1.6.1.ppc64le as component of SUSE Manager Client Tools for RHEL, Liberty and Clones 9-CLIENT-TOOLS",
"product_id": "SUSE Manager Client Tools for RHEL, Liberty and Clones 9-CLIENT-TOOLS:golang-github-QubitProducts-exporter_exporter-0.4.0-1.6.1.ppc64le"
},
"product_reference": "golang-github-QubitProducts-exporter_exporter-0.4.0-1.6.1.ppc64le",
"relates_to_product_reference": "SUSE Manager Client Tools for RHEL, Liberty and Clones 9-CLIENT-TOOLS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-github-QubitProducts-exporter_exporter-0.4.0-1.6.1.s390x as component of SUSE Manager Client Tools for RHEL, Liberty and Clones 9-CLIENT-TOOLS",
"product_id": "SUSE Manager Client Tools for RHEL, Liberty and Clones 9-CLIENT-TOOLS:golang-github-QubitProducts-exporter_exporter-0.4.0-1.6.1.s390x"
},
"product_reference": "golang-github-QubitProducts-exporter_exporter-0.4.0-1.6.1.s390x",
"relates_to_product_reference": "SUSE Manager Client Tools for RHEL, Liberty and Clones 9-CLIENT-TOOLS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-github-QubitProducts-exporter_exporter-0.4.0-1.6.1.x86_64 as component of SUSE Manager Client Tools for RHEL, Liberty and Clones 9-CLIENT-TOOLS",
"product_id": "SUSE Manager Client Tools for RHEL, Liberty and Clones 9-CLIENT-TOOLS:golang-github-QubitProducts-exporter_exporter-0.4.0-1.6.1.x86_64"
},
"product_reference": "golang-github-QubitProducts-exporter_exporter-0.4.0-1.6.1.x86_64",
"relates_to_product_reference": "SUSE Manager Client Tools for RHEL, Liberty and Clones 9-CLIENT-TOOLS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-github-lusitaniae-apache_exporter-1.0.0-1.8.1.aarch64 as component of SUSE Manager Client Tools for RHEL, Liberty and Clones 9-CLIENT-TOOLS",
"product_id": "SUSE Manager Client Tools for RHEL, Liberty and Clones 9-CLIENT-TOOLS:golang-github-lusitaniae-apache_exporter-1.0.0-1.8.1.aarch64"
},
"product_reference": "golang-github-lusitaniae-apache_exporter-1.0.0-1.8.1.aarch64",
"relates_to_product_reference": "SUSE Manager Client Tools for RHEL, Liberty and Clones 9-CLIENT-TOOLS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-github-lusitaniae-apache_exporter-1.0.0-1.8.1.ppc64le as component of SUSE Manager Client Tools for RHEL, Liberty and Clones 9-CLIENT-TOOLS",
"product_id": "SUSE Manager Client Tools for RHEL, Liberty and Clones 9-CLIENT-TOOLS:golang-github-lusitaniae-apache_exporter-1.0.0-1.8.1.ppc64le"
},
"product_reference": "golang-github-lusitaniae-apache_exporter-1.0.0-1.8.1.ppc64le",
"relates_to_product_reference": "SUSE Manager Client Tools for RHEL, Liberty and Clones 9-CLIENT-TOOLS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-github-lusitaniae-apache_exporter-1.0.0-1.8.1.s390x as component of SUSE Manager Client Tools for RHEL, Liberty and Clones 9-CLIENT-TOOLS",
"product_id": "SUSE Manager Client Tools for RHEL, Liberty and Clones 9-CLIENT-TOOLS:golang-github-lusitaniae-apache_exporter-1.0.0-1.8.1.s390x"
},
"product_reference": "golang-github-lusitaniae-apache_exporter-1.0.0-1.8.1.s390x",
"relates_to_product_reference": "SUSE Manager Client Tools for RHEL, Liberty and Clones 9-CLIENT-TOOLS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-github-lusitaniae-apache_exporter-1.0.0-1.8.1.x86_64 as component of SUSE Manager Client Tools for RHEL, Liberty and Clones 9-CLIENT-TOOLS",
"product_id": "SUSE Manager Client Tools for RHEL, Liberty and Clones 9-CLIENT-TOOLS:golang-github-lusitaniae-apache_exporter-1.0.0-1.8.1.x86_64"
},
"product_reference": "golang-github-lusitaniae-apache_exporter-1.0.0-1.8.1.x86_64",
"relates_to_product_reference": "SUSE Manager Client Tools for RHEL, Liberty and Clones 9-CLIENT-TOOLS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-github-prometheus-node_exporter-1.5.0-1.9.2.aarch64 as component of SUSE Manager Client Tools for RHEL, Liberty and Clones 9-CLIENT-TOOLS",
"product_id": "SUSE Manager Client Tools for RHEL, Liberty and Clones 9-CLIENT-TOOLS:golang-github-prometheus-node_exporter-1.5.0-1.9.2.aarch64"
},
"product_reference": "golang-github-prometheus-node_exporter-1.5.0-1.9.2.aarch64",
"relates_to_product_reference": "SUSE Manager Client Tools for RHEL, Liberty and Clones 9-CLIENT-TOOLS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-github-prometheus-node_exporter-1.5.0-1.9.2.ppc64le as component of SUSE Manager Client Tools for RHEL, Liberty and Clones 9-CLIENT-TOOLS",
"product_id": "SUSE Manager Client Tools for RHEL, Liberty and Clones 9-CLIENT-TOOLS:golang-github-prometheus-node_exporter-1.5.0-1.9.2.ppc64le"
},
"product_reference": "golang-github-prometheus-node_exporter-1.5.0-1.9.2.ppc64le",
"relates_to_product_reference": "SUSE Manager Client Tools for RHEL, Liberty and Clones 9-CLIENT-TOOLS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-github-prometheus-node_exporter-1.5.0-1.9.2.x86_64 as component of SUSE Manager Client Tools for RHEL, Liberty and Clones 9-CLIENT-TOOLS",
"product_id": "SUSE Manager Client Tools for RHEL, Liberty and Clones 9-CLIENT-TOOLS:golang-github-prometheus-node_exporter-1.5.0-1.9.2.x86_64"
},
"product_reference": "golang-github-prometheus-node_exporter-1.5.0-1.9.2.x86_64",
"relates_to_product_reference": "SUSE Manager Client Tools for RHEL, Liberty and Clones 9-CLIENT-TOOLS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "prometheus-postgres_exporter-0.10.1-1.9.2.aarch64 as component of SUSE Manager Client Tools for RHEL, Liberty and Clones 9-CLIENT-TOOLS",
"product_id": "SUSE Manager Client Tools for RHEL, Liberty and Clones 9-CLIENT-TOOLS:prometheus-postgres_exporter-0.10.1-1.9.2.aarch64"
},
"product_reference": "prometheus-postgres_exporter-0.10.1-1.9.2.aarch64",
"relates_to_product_reference": "SUSE Manager Client Tools for RHEL, Liberty and Clones 9-CLIENT-TOOLS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "prometheus-postgres_exporter-0.10.1-1.9.2.ppc64le as component of SUSE Manager Client Tools for RHEL, Liberty and Clones 9-CLIENT-TOOLS",
"product_id": "SUSE Manager Client Tools for RHEL, Liberty and Clones 9-CLIENT-TOOLS:prometheus-postgres_exporter-0.10.1-1.9.2.ppc64le"
},
"product_reference": "prometheus-postgres_exporter-0.10.1-1.9.2.ppc64le",
"relates_to_product_reference": "SUSE Manager Client Tools for RHEL, Liberty and Clones 9-CLIENT-TOOLS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "prometheus-postgres_exporter-0.10.1-1.9.2.s390x as component of SUSE Manager Client Tools for RHEL, Liberty and Clones 9-CLIENT-TOOLS",
"product_id": "SUSE Manager Client Tools for RHEL, Liberty and Clones 9-CLIENT-TOOLS:prometheus-postgres_exporter-0.10.1-1.9.2.s390x"
},
"product_reference": "prometheus-postgres_exporter-0.10.1-1.9.2.s390x",
"relates_to_product_reference": "SUSE Manager Client Tools for RHEL, Liberty and Clones 9-CLIENT-TOOLS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "prometheus-postgres_exporter-0.10.1-1.9.2.x86_64 as component of SUSE Manager Client Tools for RHEL, Liberty and Clones 9-CLIENT-TOOLS",
"product_id": "SUSE Manager Client Tools for RHEL, Liberty and Clones 9-CLIENT-TOOLS:prometheus-postgres_exporter-0.10.1-1.9.2.x86_64"
},
"product_reference": "prometheus-postgres_exporter-0.10.1-1.9.2.x86_64",
"relates_to_product_reference": "SUSE Manager Client Tools for RHEL, Liberty and Clones 9-CLIENT-TOOLS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "scap-security-guide-redhat-0.1.69-1.12.2.noarch as component of SUSE Manager Client Tools for RHEL, Liberty and Clones 9-CLIENT-TOOLS",
"product_id": "SUSE Manager Client Tools for RHEL, Liberty and Clones 9-CLIENT-TOOLS:scap-security-guide-redhat-0.1.69-1.12.2.noarch"
},
"product_reference": "scap-security-guide-redhat-0.1.69-1.12.2.noarch",
"relates_to_product_reference": "SUSE Manager Client Tools for RHEL, Liberty and Clones 9-CLIENT-TOOLS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "spacecmd-4.3.23-1.18.2.noarch as component of SUSE Manager Client Tools for RHEL, Liberty and Clones 9-CLIENT-TOOLS",
"product_id": "SUSE Manager Client Tools for RHEL, Liberty and Clones 9-CLIENT-TOOLS:spacecmd-4.3.23-1.18.2.noarch"
},
"product_reference": "spacecmd-4.3.23-1.18.2.noarch",
"relates_to_product_reference": "SUSE Manager Client Tools for RHEL, Liberty and Clones 9-CLIENT-TOOLS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2022-32149",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-32149"
}
],
"notes": [
{
"category": "general",
"text": "An attacker may cause a denial of service by crafting an Accept-Language header which ParseAcceptLanguage will take significant time to parse.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Manager Client Tools for RHEL, Liberty and Clones 9-CLIENT-TOOLS:golang-github-QubitProducts-exporter_exporter-0.4.0-1.6.1.aarch64",
"SUSE Manager Client Tools for RHEL, Liberty and Clones 9-CLIENT-TOOLS:golang-github-QubitProducts-exporter_exporter-0.4.0-1.6.1.ppc64le",
"SUSE Manager Client Tools for RHEL, Liberty and Clones 9-CLIENT-TOOLS:golang-github-QubitProducts-exporter_exporter-0.4.0-1.6.1.s390x",
"SUSE Manager Client Tools for RHEL, Liberty and Clones 9-CLIENT-TOOLS:golang-github-QubitProducts-exporter_exporter-0.4.0-1.6.1.x86_64",
"SUSE Manager Client Tools for RHEL, Liberty and Clones 9-CLIENT-TOOLS:golang-github-lusitaniae-apache_exporter-1.0.0-1.8.1.aarch64",
"SUSE Manager Client Tools for RHEL, Liberty and Clones 9-CLIENT-TOOLS:golang-github-lusitaniae-apache_exporter-1.0.0-1.8.1.ppc64le",
"SUSE Manager Client Tools for RHEL, Liberty and Clones 9-CLIENT-TOOLS:golang-github-lusitaniae-apache_exporter-1.0.0-1.8.1.s390x",
"SUSE Manager Client Tools for RHEL, Liberty and Clones 9-CLIENT-TOOLS:golang-github-lusitaniae-apache_exporter-1.0.0-1.8.1.x86_64",
"SUSE Manager Client Tools for RHEL, Liberty and Clones 9-CLIENT-TOOLS:golang-github-prometheus-node_exporter-1.5.0-1.9.2.aarch64",
"SUSE Manager Client Tools for RHEL, Liberty and Clones 9-CLIENT-TOOLS:golang-github-prometheus-node_exporter-1.5.0-1.9.2.ppc64le",
"SUSE Manager Client Tools for RHEL, Liberty and Clones 9-CLIENT-TOOLS:golang-github-prometheus-node_exporter-1.5.0-1.9.2.x86_64",
"SUSE Manager Client Tools for RHEL, Liberty and Clones 9-CLIENT-TOOLS:prometheus-postgres_exporter-0.10.1-1.9.2.aarch64",
"SUSE Manager Client Tools for RHEL, Liberty and Clones 9-CLIENT-TOOLS:prometheus-postgres_exporter-0.10.1-1.9.2.ppc64le",
"SUSE Manager Client Tools for RHEL, Liberty and Clones 9-CLIENT-TOOLS:prometheus-postgres_exporter-0.10.1-1.9.2.s390x",
"SUSE Manager Client Tools for RHEL, Liberty and Clones 9-CLIENT-TOOLS:prometheus-postgres_exporter-0.10.1-1.9.2.x86_64",
"SUSE Manager Client Tools for RHEL, Liberty and Clones 9-CLIENT-TOOLS:scap-security-guide-redhat-0.1.69-1.12.2.noarch",
"SUSE Manager Client Tools for RHEL, Liberty and Clones 9-CLIENT-TOOLS:spacecmd-4.3.23-1.18.2.noarch",
"SUSE:EL-9:Update:Products:ManagerTools:Update:golang-github-QubitProducts-exporter_exporter-0.4.0-1.6.1.aarch64",
"SUSE:EL-9:Update:Products:ManagerTools:Update:golang-github-QubitProducts-exporter_exporter-0.4.0-1.6.1.ppc64le",
"SUSE:EL-9:Update:Products:ManagerTools:Update:golang-github-QubitProducts-exporter_exporter-0.4.0-1.6.1.s390x",
"SUSE:EL-9:Update:Products:ManagerTools:Update:golang-github-QubitProducts-exporter_exporter-0.4.0-1.6.1.x86_64",
"SUSE:EL-9:Update:Products:ManagerTools:Update:golang-github-lusitaniae-apache_exporter-1.0.0-1.8.1.aarch64",
"SUSE:EL-9:Update:Products:ManagerTools:Update:golang-github-lusitaniae-apache_exporter-1.0.0-1.8.1.ppc64le",
"SUSE:EL-9:Update:Products:ManagerTools:Update:golang-github-lusitaniae-apache_exporter-1.0.0-1.8.1.s390x",
"SUSE:EL-9:Update:Products:ManagerTools:Update:golang-github-lusitaniae-apache_exporter-1.0.0-1.8.1.x86_64",
"SUSE:EL-9:Update:Products:ManagerTools:Update:golang-github-prometheus-node_exporter-1.5.0-1.9.2.aarch64",
"SUSE:EL-9:Update:Products:ManagerTools:Update:golang-github-prometheus-node_exporter-1.5.0-1.9.2.ppc64le",
"SUSE:EL-9:Update:Products:ManagerTools:Update:golang-github-prometheus-node_exporter-1.5.0-1.9.2.x86_64",
"SUSE:EL-9:Update:Products:ManagerTools:Update:prometheus-postgres_exporter-0.10.1-1.9.2.aarch64",
"SUSE:EL-9:Update:Products:ManagerTools:Update:prometheus-postgres_exporter-0.10.1-1.9.2.ppc64le",
"SUSE:EL-9:Update:Products:ManagerTools:Update:prometheus-postgres_exporter-0.10.1-1.9.2.s390x",
"SUSE:EL-9:Update:Products:ManagerTools:Update:prometheus-postgres_exporter-0.10.1-1.9.2.x86_64",
"SUSE:EL-9:Update:Products:ManagerTools:Update:scap-security-guide-0.1.69-1.12.2.noarch",
"SUSE:EL-9:Update:Products:ManagerTools:Update:scap-security-guide-debian-0.1.69-1.12.2.noarch",
"SUSE:EL-9:Update:Products:ManagerTools:Update:scap-security-guide-redhat-0.1.69-1.12.2.noarch",
"SUSE:EL-9:Update:Products:ManagerTools:Update:scap-security-guide-ubuntu-0.1.69-1.12.2.noarch",
"SUSE:EL-9:Update:Products:ManagerTools:Update:spacecmd-4.3.23-1.18.2.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-32149",
"url": "https://www.suse.com/security/cve/CVE-2022-32149"
},
{
"category": "external",
"summary": "SUSE Bug 1204501 for CVE-2022-32149",
"url": "https://bugzilla.suse.com/1204501"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Manager Client Tools for RHEL, Liberty and Clones 9-CLIENT-TOOLS:golang-github-QubitProducts-exporter_exporter-0.4.0-1.6.1.aarch64",
"SUSE Manager Client Tools for RHEL, Liberty and Clones 9-CLIENT-TOOLS:golang-github-QubitProducts-exporter_exporter-0.4.0-1.6.1.ppc64le",
"SUSE Manager Client Tools for RHEL, Liberty and Clones 9-CLIENT-TOOLS:golang-github-QubitProducts-exporter_exporter-0.4.0-1.6.1.s390x",
"SUSE Manager Client Tools for RHEL, Liberty and Clones 9-CLIENT-TOOLS:golang-github-QubitProducts-exporter_exporter-0.4.0-1.6.1.x86_64",
"SUSE Manager Client Tools for RHEL, Liberty and Clones 9-CLIENT-TOOLS:golang-github-lusitaniae-apache_exporter-1.0.0-1.8.1.aarch64",
"SUSE Manager Client Tools for RHEL, Liberty and Clones 9-CLIENT-TOOLS:golang-github-lusitaniae-apache_exporter-1.0.0-1.8.1.ppc64le",
"SUSE Manager Client Tools for RHEL, Liberty and Clones 9-CLIENT-TOOLS:golang-github-lusitaniae-apache_exporter-1.0.0-1.8.1.s390x",
"SUSE Manager Client Tools for RHEL, Liberty and Clones 9-CLIENT-TOOLS:golang-github-lusitaniae-apache_exporter-1.0.0-1.8.1.x86_64",
"SUSE Manager Client Tools for RHEL, Liberty and Clones 9-CLIENT-TOOLS:golang-github-prometheus-node_exporter-1.5.0-1.9.2.aarch64",
"SUSE Manager Client Tools for RHEL, Liberty and Clones 9-CLIENT-TOOLS:golang-github-prometheus-node_exporter-1.5.0-1.9.2.ppc64le",
"SUSE Manager Client Tools for RHEL, Liberty and Clones 9-CLIENT-TOOLS:golang-github-prometheus-node_exporter-1.5.0-1.9.2.x86_64",
"SUSE Manager Client Tools for RHEL, Liberty and Clones 9-CLIENT-TOOLS:prometheus-postgres_exporter-0.10.1-1.9.2.aarch64",
"SUSE Manager Client Tools for RHEL, Liberty and Clones 9-CLIENT-TOOLS:prometheus-postgres_exporter-0.10.1-1.9.2.ppc64le",
"SUSE Manager Client Tools for RHEL, Liberty and Clones 9-CLIENT-TOOLS:prometheus-postgres_exporter-0.10.1-1.9.2.s390x",
"SUSE Manager Client Tools for RHEL, Liberty and Clones 9-CLIENT-TOOLS:prometheus-postgres_exporter-0.10.1-1.9.2.x86_64",
"SUSE Manager Client Tools for RHEL, Liberty and Clones 9-CLIENT-TOOLS:scap-security-guide-redhat-0.1.69-1.12.2.noarch",
"SUSE Manager Client Tools for RHEL, Liberty and Clones 9-CLIENT-TOOLS:spacecmd-4.3.23-1.18.2.noarch",
"SUSE:EL-9:Update:Products:ManagerTools:Update:golang-github-QubitProducts-exporter_exporter-0.4.0-1.6.1.aarch64",
"SUSE:EL-9:Update:Products:ManagerTools:Update:golang-github-QubitProducts-exporter_exporter-0.4.0-1.6.1.ppc64le",
"SUSE:EL-9:Update:Products:ManagerTools:Update:golang-github-QubitProducts-exporter_exporter-0.4.0-1.6.1.s390x",
"SUSE:EL-9:Update:Products:ManagerTools:Update:golang-github-QubitProducts-exporter_exporter-0.4.0-1.6.1.x86_64",
"SUSE:EL-9:Update:Products:ManagerTools:Update:golang-github-lusitaniae-apache_exporter-1.0.0-1.8.1.aarch64",
"SUSE:EL-9:Update:Products:ManagerTools:Update:golang-github-lusitaniae-apache_exporter-1.0.0-1.8.1.ppc64le",
"SUSE:EL-9:Update:Products:ManagerTools:Update:golang-github-lusitaniae-apache_exporter-1.0.0-1.8.1.s390x",
"SUSE:EL-9:Update:Products:ManagerTools:Update:golang-github-lusitaniae-apache_exporter-1.0.0-1.8.1.x86_64",
"SUSE:EL-9:Update:Products:ManagerTools:Update:golang-github-prometheus-node_exporter-1.5.0-1.9.2.aarch64",
"SUSE:EL-9:Update:Products:ManagerTools:Update:golang-github-prometheus-node_exporter-1.5.0-1.9.2.ppc64le",
"SUSE:EL-9:Update:Products:ManagerTools:Update:golang-github-prometheus-node_exporter-1.5.0-1.9.2.x86_64",
"SUSE:EL-9:Update:Products:ManagerTools:Update:prometheus-postgres_exporter-0.10.1-1.9.2.aarch64",
"SUSE:EL-9:Update:Products:ManagerTools:Update:prometheus-postgres_exporter-0.10.1-1.9.2.ppc64le",
"SUSE:EL-9:Update:Products:ManagerTools:Update:prometheus-postgres_exporter-0.10.1-1.9.2.s390x",
"SUSE:EL-9:Update:Products:ManagerTools:Update:prometheus-postgres_exporter-0.10.1-1.9.2.x86_64",
"SUSE:EL-9:Update:Products:ManagerTools:Update:scap-security-guide-0.1.69-1.12.2.noarch",
"SUSE:EL-9:Update:Products:ManagerTools:Update:scap-security-guide-debian-0.1.69-1.12.2.noarch",
"SUSE:EL-9:Update:Products:ManagerTools:Update:scap-security-guide-redhat-0.1.69-1.12.2.noarch",
"SUSE:EL-9:Update:Products:ManagerTools:Update:scap-security-guide-ubuntu-0.1.69-1.12.2.noarch",
"SUSE:EL-9:Update:Products:ManagerTools:Update:spacecmd-4.3.23-1.18.2.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Manager Client Tools for RHEL, Liberty and Clones 9-CLIENT-TOOLS:golang-github-QubitProducts-exporter_exporter-0.4.0-1.6.1.aarch64",
"SUSE Manager Client Tools for RHEL, Liberty and Clones 9-CLIENT-TOOLS:golang-github-QubitProducts-exporter_exporter-0.4.0-1.6.1.ppc64le",
"SUSE Manager Client Tools for RHEL, Liberty and Clones 9-CLIENT-TOOLS:golang-github-QubitProducts-exporter_exporter-0.4.0-1.6.1.s390x",
"SUSE Manager Client Tools for RHEL, Liberty and Clones 9-CLIENT-TOOLS:golang-github-QubitProducts-exporter_exporter-0.4.0-1.6.1.x86_64",
"SUSE Manager Client Tools for RHEL, Liberty and Clones 9-CLIENT-TOOLS:golang-github-lusitaniae-apache_exporter-1.0.0-1.8.1.aarch64",
"SUSE Manager Client Tools for RHEL, Liberty and Clones 9-CLIENT-TOOLS:golang-github-lusitaniae-apache_exporter-1.0.0-1.8.1.ppc64le",
"SUSE Manager Client Tools for RHEL, Liberty and Clones 9-CLIENT-TOOLS:golang-github-lusitaniae-apache_exporter-1.0.0-1.8.1.s390x",
"SUSE Manager Client Tools for RHEL, Liberty and Clones 9-CLIENT-TOOLS:golang-github-lusitaniae-apache_exporter-1.0.0-1.8.1.x86_64",
"SUSE Manager Client Tools for RHEL, Liberty and Clones 9-CLIENT-TOOLS:golang-github-prometheus-node_exporter-1.5.0-1.9.2.aarch64",
"SUSE Manager Client Tools for RHEL, Liberty and Clones 9-CLIENT-TOOLS:golang-github-prometheus-node_exporter-1.5.0-1.9.2.ppc64le",
"SUSE Manager Client Tools for RHEL, Liberty and Clones 9-CLIENT-TOOLS:golang-github-prometheus-node_exporter-1.5.0-1.9.2.x86_64",
"SUSE Manager Client Tools for RHEL, Liberty and Clones 9-CLIENT-TOOLS:prometheus-postgres_exporter-0.10.1-1.9.2.aarch64",
"SUSE Manager Client Tools for RHEL, Liberty and Clones 9-CLIENT-TOOLS:prometheus-postgres_exporter-0.10.1-1.9.2.ppc64le",
"SUSE Manager Client Tools for RHEL, Liberty and Clones 9-CLIENT-TOOLS:prometheus-postgres_exporter-0.10.1-1.9.2.s390x",
"SUSE Manager Client Tools for RHEL, Liberty and Clones 9-CLIENT-TOOLS:prometheus-postgres_exporter-0.10.1-1.9.2.x86_64",
"SUSE Manager Client Tools for RHEL, Liberty and Clones 9-CLIENT-TOOLS:scap-security-guide-redhat-0.1.69-1.12.2.noarch",
"SUSE Manager Client Tools for RHEL, Liberty and Clones 9-CLIENT-TOOLS:spacecmd-4.3.23-1.18.2.noarch",
"SUSE:EL-9:Update:Products:ManagerTools:Update:golang-github-QubitProducts-exporter_exporter-0.4.0-1.6.1.aarch64",
"SUSE:EL-9:Update:Products:ManagerTools:Update:golang-github-QubitProducts-exporter_exporter-0.4.0-1.6.1.ppc64le",
"SUSE:EL-9:Update:Products:ManagerTools:Update:golang-github-QubitProducts-exporter_exporter-0.4.0-1.6.1.s390x",
"SUSE:EL-9:Update:Products:ManagerTools:Update:golang-github-QubitProducts-exporter_exporter-0.4.0-1.6.1.x86_64",
"SUSE:EL-9:Update:Products:ManagerTools:Update:golang-github-lusitaniae-apache_exporter-1.0.0-1.8.1.aarch64",
"SUSE:EL-9:Update:Products:ManagerTools:Update:golang-github-lusitaniae-apache_exporter-1.0.0-1.8.1.ppc64le",
"SUSE:EL-9:Update:Products:ManagerTools:Update:golang-github-lusitaniae-apache_exporter-1.0.0-1.8.1.s390x",
"SUSE:EL-9:Update:Products:ManagerTools:Update:golang-github-lusitaniae-apache_exporter-1.0.0-1.8.1.x86_64",
"SUSE:EL-9:Update:Products:ManagerTools:Update:golang-github-prometheus-node_exporter-1.5.0-1.9.2.aarch64",
"SUSE:EL-9:Update:Products:ManagerTools:Update:golang-github-prometheus-node_exporter-1.5.0-1.9.2.ppc64le",
"SUSE:EL-9:Update:Products:ManagerTools:Update:golang-github-prometheus-node_exporter-1.5.0-1.9.2.x86_64",
"SUSE:EL-9:Update:Products:ManagerTools:Update:prometheus-postgres_exporter-0.10.1-1.9.2.aarch64",
"SUSE:EL-9:Update:Products:ManagerTools:Update:prometheus-postgres_exporter-0.10.1-1.9.2.ppc64le",
"SUSE:EL-9:Update:Products:ManagerTools:Update:prometheus-postgres_exporter-0.10.1-1.9.2.s390x",
"SUSE:EL-9:Update:Products:ManagerTools:Update:prometheus-postgres_exporter-0.10.1-1.9.2.x86_64",
"SUSE:EL-9:Update:Products:ManagerTools:Update:scap-security-guide-0.1.69-1.12.2.noarch",
"SUSE:EL-9:Update:Products:ManagerTools:Update:scap-security-guide-debian-0.1.69-1.12.2.noarch",
"SUSE:EL-9:Update:Products:ManagerTools:Update:scap-security-guide-redhat-0.1.69-1.12.2.noarch",
"SUSE:EL-9:Update:Products:ManagerTools:Update:scap-security-guide-ubuntu-0.1.69-1.12.2.noarch",
"SUSE:EL-9:Update:Products:ManagerTools:Update:spacecmd-4.3.23-1.18.2.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2023-09-28T11:45:38Z",
"details": "important"
}
],
"title": "CVE-2022-32149"
},
{
"cve": "CVE-2022-41723",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-41723"
}
],
"notes": [
{
"category": "general",
"text": "A maliciously crafted HTTP/2 stream could cause excessive CPU consumption in the HPACK decoder, sufficient to cause a denial of service from a small number of small requests.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Manager Client Tools for RHEL, Liberty and Clones 9-CLIENT-TOOLS:golang-github-QubitProducts-exporter_exporter-0.4.0-1.6.1.aarch64",
"SUSE Manager Client Tools for RHEL, Liberty and Clones 9-CLIENT-TOOLS:golang-github-QubitProducts-exporter_exporter-0.4.0-1.6.1.ppc64le",
"SUSE Manager Client Tools for RHEL, Liberty and Clones 9-CLIENT-TOOLS:golang-github-QubitProducts-exporter_exporter-0.4.0-1.6.1.s390x",
"SUSE Manager Client Tools for RHEL, Liberty and Clones 9-CLIENT-TOOLS:golang-github-QubitProducts-exporter_exporter-0.4.0-1.6.1.x86_64",
"SUSE Manager Client Tools for RHEL, Liberty and Clones 9-CLIENT-TOOLS:golang-github-lusitaniae-apache_exporter-1.0.0-1.8.1.aarch64",
"SUSE Manager Client Tools for RHEL, Liberty and Clones 9-CLIENT-TOOLS:golang-github-lusitaniae-apache_exporter-1.0.0-1.8.1.ppc64le",
"SUSE Manager Client Tools for RHEL, Liberty and Clones 9-CLIENT-TOOLS:golang-github-lusitaniae-apache_exporter-1.0.0-1.8.1.s390x",
"SUSE Manager Client Tools for RHEL, Liberty and Clones 9-CLIENT-TOOLS:golang-github-lusitaniae-apache_exporter-1.0.0-1.8.1.x86_64",
"SUSE Manager Client Tools for RHEL, Liberty and Clones 9-CLIENT-TOOLS:golang-github-prometheus-node_exporter-1.5.0-1.9.2.aarch64",
"SUSE Manager Client Tools for RHEL, Liberty and Clones 9-CLIENT-TOOLS:golang-github-prometheus-node_exporter-1.5.0-1.9.2.ppc64le",
"SUSE Manager Client Tools for RHEL, Liberty and Clones 9-CLIENT-TOOLS:golang-github-prometheus-node_exporter-1.5.0-1.9.2.x86_64",
"SUSE Manager Client Tools for RHEL, Liberty and Clones 9-CLIENT-TOOLS:prometheus-postgres_exporter-0.10.1-1.9.2.aarch64",
"SUSE Manager Client Tools for RHEL, Liberty and Clones 9-CLIENT-TOOLS:prometheus-postgres_exporter-0.10.1-1.9.2.ppc64le",
"SUSE Manager Client Tools for RHEL, Liberty and Clones 9-CLIENT-TOOLS:prometheus-postgres_exporter-0.10.1-1.9.2.s390x",
"SUSE Manager Client Tools for RHEL, Liberty and Clones 9-CLIENT-TOOLS:prometheus-postgres_exporter-0.10.1-1.9.2.x86_64",
"SUSE Manager Client Tools for RHEL, Liberty and Clones 9-CLIENT-TOOLS:scap-security-guide-redhat-0.1.69-1.12.2.noarch",
"SUSE Manager Client Tools for RHEL, Liberty and Clones 9-CLIENT-TOOLS:spacecmd-4.3.23-1.18.2.noarch",
"SUSE:EL-9:Update:Products:ManagerTools:Update:golang-github-QubitProducts-exporter_exporter-0.4.0-1.6.1.aarch64",
"SUSE:EL-9:Update:Products:ManagerTools:Update:golang-github-QubitProducts-exporter_exporter-0.4.0-1.6.1.ppc64le",
"SUSE:EL-9:Update:Products:ManagerTools:Update:golang-github-QubitProducts-exporter_exporter-0.4.0-1.6.1.s390x",
"SUSE:EL-9:Update:Products:ManagerTools:Update:golang-github-QubitProducts-exporter_exporter-0.4.0-1.6.1.x86_64",
"SUSE:EL-9:Update:Products:ManagerTools:Update:golang-github-lusitaniae-apache_exporter-1.0.0-1.8.1.aarch64",
"SUSE:EL-9:Update:Products:ManagerTools:Update:golang-github-lusitaniae-apache_exporter-1.0.0-1.8.1.ppc64le",
"SUSE:EL-9:Update:Products:ManagerTools:Update:golang-github-lusitaniae-apache_exporter-1.0.0-1.8.1.s390x",
"SUSE:EL-9:Update:Products:ManagerTools:Update:golang-github-lusitaniae-apache_exporter-1.0.0-1.8.1.x86_64",
"SUSE:EL-9:Update:Products:ManagerTools:Update:golang-github-prometheus-node_exporter-1.5.0-1.9.2.aarch64",
"SUSE:EL-9:Update:Products:ManagerTools:Update:golang-github-prometheus-node_exporter-1.5.0-1.9.2.ppc64le",
"SUSE:EL-9:Update:Products:ManagerTools:Update:golang-github-prometheus-node_exporter-1.5.0-1.9.2.x86_64",
"SUSE:EL-9:Update:Products:ManagerTools:Update:prometheus-postgres_exporter-0.10.1-1.9.2.aarch64",
"SUSE:EL-9:Update:Products:ManagerTools:Update:prometheus-postgres_exporter-0.10.1-1.9.2.ppc64le",
"SUSE:EL-9:Update:Products:ManagerTools:Update:prometheus-postgres_exporter-0.10.1-1.9.2.s390x",
"SUSE:EL-9:Update:Products:ManagerTools:Update:prometheus-postgres_exporter-0.10.1-1.9.2.x86_64",
"SUSE:EL-9:Update:Products:ManagerTools:Update:scap-security-guide-0.1.69-1.12.2.noarch",
"SUSE:EL-9:Update:Products:ManagerTools:Update:scap-security-guide-debian-0.1.69-1.12.2.noarch",
"SUSE:EL-9:Update:Products:ManagerTools:Update:scap-security-guide-redhat-0.1.69-1.12.2.noarch",
"SUSE:EL-9:Update:Products:ManagerTools:Update:scap-security-guide-ubuntu-0.1.69-1.12.2.noarch",
"SUSE:EL-9:Update:Products:ManagerTools:Update:spacecmd-4.3.23-1.18.2.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-41723",
"url": "https://www.suse.com/security/cve/CVE-2022-41723"
},
{
"category": "external",
"summary": "SUSE Bug 1208270 for CVE-2022-41723",
"url": "https://bugzilla.suse.com/1208270"
},
{
"category": "external",
"summary": "SUSE Bug 1215588 for CVE-2022-41723",
"url": "https://bugzilla.suse.com/1215588"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Manager Client Tools for RHEL, Liberty and Clones 9-CLIENT-TOOLS:golang-github-QubitProducts-exporter_exporter-0.4.0-1.6.1.aarch64",
"SUSE Manager Client Tools for RHEL, Liberty and Clones 9-CLIENT-TOOLS:golang-github-QubitProducts-exporter_exporter-0.4.0-1.6.1.ppc64le",
"SUSE Manager Client Tools for RHEL, Liberty and Clones 9-CLIENT-TOOLS:golang-github-QubitProducts-exporter_exporter-0.4.0-1.6.1.s390x",
"SUSE Manager Client Tools for RHEL, Liberty and Clones 9-CLIENT-TOOLS:golang-github-QubitProducts-exporter_exporter-0.4.0-1.6.1.x86_64",
"SUSE Manager Client Tools for RHEL, Liberty and Clones 9-CLIENT-TOOLS:golang-github-lusitaniae-apache_exporter-1.0.0-1.8.1.aarch64",
"SUSE Manager Client Tools for RHEL, Liberty and Clones 9-CLIENT-TOOLS:golang-github-lusitaniae-apache_exporter-1.0.0-1.8.1.ppc64le",
"SUSE Manager Client Tools for RHEL, Liberty and Clones 9-CLIENT-TOOLS:golang-github-lusitaniae-apache_exporter-1.0.0-1.8.1.s390x",
"SUSE Manager Client Tools for RHEL, Liberty and Clones 9-CLIENT-TOOLS:golang-github-lusitaniae-apache_exporter-1.0.0-1.8.1.x86_64",
"SUSE Manager Client Tools for RHEL, Liberty and Clones 9-CLIENT-TOOLS:golang-github-prometheus-node_exporter-1.5.0-1.9.2.aarch64",
"SUSE Manager Client Tools for RHEL, Liberty and Clones 9-CLIENT-TOOLS:golang-github-prometheus-node_exporter-1.5.0-1.9.2.ppc64le",
"SUSE Manager Client Tools for RHEL, Liberty and Clones 9-CLIENT-TOOLS:golang-github-prometheus-node_exporter-1.5.0-1.9.2.x86_64",
"SUSE Manager Client Tools for RHEL, Liberty and Clones 9-CLIENT-TOOLS:prometheus-postgres_exporter-0.10.1-1.9.2.aarch64",
"SUSE Manager Client Tools for RHEL, Liberty and Clones 9-CLIENT-TOOLS:prometheus-postgres_exporter-0.10.1-1.9.2.ppc64le",
"SUSE Manager Client Tools for RHEL, Liberty and Clones 9-CLIENT-TOOLS:prometheus-postgres_exporter-0.10.1-1.9.2.s390x",
"SUSE Manager Client Tools for RHEL, Liberty and Clones 9-CLIENT-TOOLS:prometheus-postgres_exporter-0.10.1-1.9.2.x86_64",
"SUSE Manager Client Tools for RHEL, Liberty and Clones 9-CLIENT-TOOLS:scap-security-guide-redhat-0.1.69-1.12.2.noarch",
"SUSE Manager Client Tools for RHEL, Liberty and Clones 9-CLIENT-TOOLS:spacecmd-4.3.23-1.18.2.noarch",
"SUSE:EL-9:Update:Products:ManagerTools:Update:golang-github-QubitProducts-exporter_exporter-0.4.0-1.6.1.aarch64",
"SUSE:EL-9:Update:Products:ManagerTools:Update:golang-github-QubitProducts-exporter_exporter-0.4.0-1.6.1.ppc64le",
"SUSE:EL-9:Update:Products:ManagerTools:Update:golang-github-QubitProducts-exporter_exporter-0.4.0-1.6.1.s390x",
"SUSE:EL-9:Update:Products:ManagerTools:Update:golang-github-QubitProducts-exporter_exporter-0.4.0-1.6.1.x86_64",
"SUSE:EL-9:Update:Products:ManagerTools:Update:golang-github-lusitaniae-apache_exporter-1.0.0-1.8.1.aarch64",
"SUSE:EL-9:Update:Products:ManagerTools:Update:golang-github-lusitaniae-apache_exporter-1.0.0-1.8.1.ppc64le",
"SUSE:EL-9:Update:Products:ManagerTools:Update:golang-github-lusitaniae-apache_exporter-1.0.0-1.8.1.s390x",
"SUSE:EL-9:Update:Products:ManagerTools:Update:golang-github-lusitaniae-apache_exporter-1.0.0-1.8.1.x86_64",
"SUSE:EL-9:Update:Products:ManagerTools:Update:golang-github-prometheus-node_exporter-1.5.0-1.9.2.aarch64",
"SUSE:EL-9:Update:Products:ManagerTools:Update:golang-github-prometheus-node_exporter-1.5.0-1.9.2.ppc64le",
"SUSE:EL-9:Update:Products:ManagerTools:Update:golang-github-prometheus-node_exporter-1.5.0-1.9.2.x86_64",
"SUSE:EL-9:Update:Products:ManagerTools:Update:prometheus-postgres_exporter-0.10.1-1.9.2.aarch64",
"SUSE:EL-9:Update:Products:ManagerTools:Update:prometheus-postgres_exporter-0.10.1-1.9.2.ppc64le",
"SUSE:EL-9:Update:Products:ManagerTools:Update:prometheus-postgres_exporter-0.10.1-1.9.2.s390x",
"SUSE:EL-9:Update:Products:ManagerTools:Update:prometheus-postgres_exporter-0.10.1-1.9.2.x86_64",
"SUSE:EL-9:Update:Products:ManagerTools:Update:scap-security-guide-0.1.69-1.12.2.noarch",
"SUSE:EL-9:Update:Products:ManagerTools:Update:scap-security-guide-debian-0.1.69-1.12.2.noarch",
"SUSE:EL-9:Update:Products:ManagerTools:Update:scap-security-guide-redhat-0.1.69-1.12.2.noarch",
"SUSE:EL-9:Update:Products:ManagerTools:Update:scap-security-guide-ubuntu-0.1.69-1.12.2.noarch",
"SUSE:EL-9:Update:Products:ManagerTools:Update:spacecmd-4.3.23-1.18.2.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Manager Client Tools for RHEL, Liberty and Clones 9-CLIENT-TOOLS:golang-github-QubitProducts-exporter_exporter-0.4.0-1.6.1.aarch64",
"SUSE Manager Client Tools for RHEL, Liberty and Clones 9-CLIENT-TOOLS:golang-github-QubitProducts-exporter_exporter-0.4.0-1.6.1.ppc64le",
"SUSE Manager Client Tools for RHEL, Liberty and Clones 9-CLIENT-TOOLS:golang-github-QubitProducts-exporter_exporter-0.4.0-1.6.1.s390x",
"SUSE Manager Client Tools for RHEL, Liberty and Clones 9-CLIENT-TOOLS:golang-github-QubitProducts-exporter_exporter-0.4.0-1.6.1.x86_64",
"SUSE Manager Client Tools for RHEL, Liberty and Clones 9-CLIENT-TOOLS:golang-github-lusitaniae-apache_exporter-1.0.0-1.8.1.aarch64",
"SUSE Manager Client Tools for RHEL, Liberty and Clones 9-CLIENT-TOOLS:golang-github-lusitaniae-apache_exporter-1.0.0-1.8.1.ppc64le",
"SUSE Manager Client Tools for RHEL, Liberty and Clones 9-CLIENT-TOOLS:golang-github-lusitaniae-apache_exporter-1.0.0-1.8.1.s390x",
"SUSE Manager Client Tools for RHEL, Liberty and Clones 9-CLIENT-TOOLS:golang-github-lusitaniae-apache_exporter-1.0.0-1.8.1.x86_64",
"SUSE Manager Client Tools for RHEL, Liberty and Clones 9-CLIENT-TOOLS:golang-github-prometheus-node_exporter-1.5.0-1.9.2.aarch64",
"SUSE Manager Client Tools for RHEL, Liberty and Clones 9-CLIENT-TOOLS:golang-github-prometheus-node_exporter-1.5.0-1.9.2.ppc64le",
"SUSE Manager Client Tools for RHEL, Liberty and Clones 9-CLIENT-TOOLS:golang-github-prometheus-node_exporter-1.5.0-1.9.2.x86_64",
"SUSE Manager Client Tools for RHEL, Liberty and Clones 9-CLIENT-TOOLS:prometheus-postgres_exporter-0.10.1-1.9.2.aarch64",
"SUSE Manager Client Tools for RHEL, Liberty and Clones 9-CLIENT-TOOLS:prometheus-postgres_exporter-0.10.1-1.9.2.ppc64le",
"SUSE Manager Client Tools for RHEL, Liberty and Clones 9-CLIENT-TOOLS:prometheus-postgres_exporter-0.10.1-1.9.2.s390x",
"SUSE Manager Client Tools for RHEL, Liberty and Clones 9-CLIENT-TOOLS:prometheus-postgres_exporter-0.10.1-1.9.2.x86_64",
"SUSE Manager Client Tools for RHEL, Liberty and Clones 9-CLIENT-TOOLS:scap-security-guide-redhat-0.1.69-1.12.2.noarch",
"SUSE Manager Client Tools for RHEL, Liberty and Clones 9-CLIENT-TOOLS:spacecmd-4.3.23-1.18.2.noarch",
"SUSE:EL-9:Update:Products:ManagerTools:Update:golang-github-QubitProducts-exporter_exporter-0.4.0-1.6.1.aarch64",
"SUSE:EL-9:Update:Products:ManagerTools:Update:golang-github-QubitProducts-exporter_exporter-0.4.0-1.6.1.ppc64le",
"SUSE:EL-9:Update:Products:ManagerTools:Update:golang-github-QubitProducts-exporter_exporter-0.4.0-1.6.1.s390x",
"SUSE:EL-9:Update:Products:ManagerTools:Update:golang-github-QubitProducts-exporter_exporter-0.4.0-1.6.1.x86_64",
"SUSE:EL-9:Update:Products:ManagerTools:Update:golang-github-lusitaniae-apache_exporter-1.0.0-1.8.1.aarch64",
"SUSE:EL-9:Update:Products:ManagerTools:Update:golang-github-lusitaniae-apache_exporter-1.0.0-1.8.1.ppc64le",
"SUSE:EL-9:Update:Products:ManagerTools:Update:golang-github-lusitaniae-apache_exporter-1.0.0-1.8.1.s390x",
"SUSE:EL-9:Update:Products:ManagerTools:Update:golang-github-lusitaniae-apache_exporter-1.0.0-1.8.1.x86_64",
"SUSE:EL-9:Update:Products:ManagerTools:Update:golang-github-prometheus-node_exporter-1.5.0-1.9.2.aarch64",
"SUSE:EL-9:Update:Products:ManagerTools:Update:golang-github-prometheus-node_exporter-1.5.0-1.9.2.ppc64le",
"SUSE:EL-9:Update:Products:ManagerTools:Update:golang-github-prometheus-node_exporter-1.5.0-1.9.2.x86_64",
"SUSE:EL-9:Update:Products:ManagerTools:Update:prometheus-postgres_exporter-0.10.1-1.9.2.aarch64",
"SUSE:EL-9:Update:Products:ManagerTools:Update:prometheus-postgres_exporter-0.10.1-1.9.2.ppc64le",
"SUSE:EL-9:Update:Products:ManagerTools:Update:prometheus-postgres_exporter-0.10.1-1.9.2.s390x",
"SUSE:EL-9:Update:Products:ManagerTools:Update:prometheus-postgres_exporter-0.10.1-1.9.2.x86_64",
"SUSE:EL-9:Update:Products:ManagerTools:Update:scap-security-guide-0.1.69-1.12.2.noarch",
"SUSE:EL-9:Update:Products:ManagerTools:Update:scap-security-guide-debian-0.1.69-1.12.2.noarch",
"SUSE:EL-9:Update:Products:ManagerTools:Update:scap-security-guide-redhat-0.1.69-1.12.2.noarch",
"SUSE:EL-9:Update:Products:ManagerTools:Update:scap-security-guide-ubuntu-0.1.69-1.12.2.noarch",
"SUSE:EL-9:Update:Products:ManagerTools:Update:spacecmd-4.3.23-1.18.2.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2023-09-28T11:45:38Z",
"details": "important"
}
],
"title": "CVE-2022-41723"
},
{
"cve": "CVE-2022-46146",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-46146"
}
],
"notes": [
{
"category": "general",
"text": "Prometheus Exporter Toolkit is a utility package to build exporters. Prior to versions 0.7.2 and 0.8.2, if someone has access to a Prometheus web.yml file and users\u0027 bcrypted passwords, they can bypass security by poisoning the built-in authentication cache. Versions 0.7.2 and 0.8.2 contain a fix for the issue. There is no workaround, but attacker must have access to the hashed password to use this functionality.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Manager Client Tools for RHEL, Liberty and Clones 9-CLIENT-TOOLS:golang-github-QubitProducts-exporter_exporter-0.4.0-1.6.1.aarch64",
"SUSE Manager Client Tools for RHEL, Liberty and Clones 9-CLIENT-TOOLS:golang-github-QubitProducts-exporter_exporter-0.4.0-1.6.1.ppc64le",
"SUSE Manager Client Tools for RHEL, Liberty and Clones 9-CLIENT-TOOLS:golang-github-QubitProducts-exporter_exporter-0.4.0-1.6.1.s390x",
"SUSE Manager Client Tools for RHEL, Liberty and Clones 9-CLIENT-TOOLS:golang-github-QubitProducts-exporter_exporter-0.4.0-1.6.1.x86_64",
"SUSE Manager Client Tools for RHEL, Liberty and Clones 9-CLIENT-TOOLS:golang-github-lusitaniae-apache_exporter-1.0.0-1.8.1.aarch64",
"SUSE Manager Client Tools for RHEL, Liberty and Clones 9-CLIENT-TOOLS:golang-github-lusitaniae-apache_exporter-1.0.0-1.8.1.ppc64le",
"SUSE Manager Client Tools for RHEL, Liberty and Clones 9-CLIENT-TOOLS:golang-github-lusitaniae-apache_exporter-1.0.0-1.8.1.s390x",
"SUSE Manager Client Tools for RHEL, Liberty and Clones 9-CLIENT-TOOLS:golang-github-lusitaniae-apache_exporter-1.0.0-1.8.1.x86_64",
"SUSE Manager Client Tools for RHEL, Liberty and Clones 9-CLIENT-TOOLS:golang-github-prometheus-node_exporter-1.5.0-1.9.2.aarch64",
"SUSE Manager Client Tools for RHEL, Liberty and Clones 9-CLIENT-TOOLS:golang-github-prometheus-node_exporter-1.5.0-1.9.2.ppc64le",
"SUSE Manager Client Tools for RHEL, Liberty and Clones 9-CLIENT-TOOLS:golang-github-prometheus-node_exporter-1.5.0-1.9.2.x86_64",
"SUSE Manager Client Tools for RHEL, Liberty and Clones 9-CLIENT-TOOLS:prometheus-postgres_exporter-0.10.1-1.9.2.aarch64",
"SUSE Manager Client Tools for RHEL, Liberty and Clones 9-CLIENT-TOOLS:prometheus-postgres_exporter-0.10.1-1.9.2.ppc64le",
"SUSE Manager Client Tools for RHEL, Liberty and Clones 9-CLIENT-TOOLS:prometheus-postgres_exporter-0.10.1-1.9.2.s390x",
"SUSE Manager Client Tools for RHEL, Liberty and Clones 9-CLIENT-TOOLS:prometheus-postgres_exporter-0.10.1-1.9.2.x86_64",
"SUSE Manager Client Tools for RHEL, Liberty and Clones 9-CLIENT-TOOLS:scap-security-guide-redhat-0.1.69-1.12.2.noarch",
"SUSE Manager Client Tools for RHEL, Liberty and Clones 9-CLIENT-TOOLS:spacecmd-4.3.23-1.18.2.noarch",
"SUSE:EL-9:Update:Products:ManagerTools:Update:golang-github-QubitProducts-exporter_exporter-0.4.0-1.6.1.aarch64",
"SUSE:EL-9:Update:Products:ManagerTools:Update:golang-github-QubitProducts-exporter_exporter-0.4.0-1.6.1.ppc64le",
"SUSE:EL-9:Update:Products:ManagerTools:Update:golang-github-QubitProducts-exporter_exporter-0.4.0-1.6.1.s390x",
"SUSE:EL-9:Update:Products:ManagerTools:Update:golang-github-QubitProducts-exporter_exporter-0.4.0-1.6.1.x86_64",
"SUSE:EL-9:Update:Products:ManagerTools:Update:golang-github-lusitaniae-apache_exporter-1.0.0-1.8.1.aarch64",
"SUSE:EL-9:Update:Products:ManagerTools:Update:golang-github-lusitaniae-apache_exporter-1.0.0-1.8.1.ppc64le",
"SUSE:EL-9:Update:Products:ManagerTools:Update:golang-github-lusitaniae-apache_exporter-1.0.0-1.8.1.s390x",
"SUSE:EL-9:Update:Products:ManagerTools:Update:golang-github-lusitaniae-apache_exporter-1.0.0-1.8.1.x86_64",
"SUSE:EL-9:Update:Products:ManagerTools:Update:golang-github-prometheus-node_exporter-1.5.0-1.9.2.aarch64",
"SUSE:EL-9:Update:Products:ManagerTools:Update:golang-github-prometheus-node_exporter-1.5.0-1.9.2.ppc64le",
"SUSE:EL-9:Update:Products:ManagerTools:Update:golang-github-prometheus-node_exporter-1.5.0-1.9.2.x86_64",
"SUSE:EL-9:Update:Products:ManagerTools:Update:prometheus-postgres_exporter-0.10.1-1.9.2.aarch64",
"SUSE:EL-9:Update:Products:ManagerTools:Update:prometheus-postgres_exporter-0.10.1-1.9.2.ppc64le",
"SUSE:EL-9:Update:Products:ManagerTools:Update:prometheus-postgres_exporter-0.10.1-1.9.2.s390x",
"SUSE:EL-9:Update:Products:ManagerTools:Update:prometheus-postgres_exporter-0.10.1-1.9.2.x86_64",
"SUSE:EL-9:Update:Products:ManagerTools:Update:scap-security-guide-0.1.69-1.12.2.noarch",
"SUSE:EL-9:Update:Products:ManagerTools:Update:scap-security-guide-debian-0.1.69-1.12.2.noarch",
"SUSE:EL-9:Update:Products:ManagerTools:Update:scap-security-guide-redhat-0.1.69-1.12.2.noarch",
"SUSE:EL-9:Update:Products:ManagerTools:Update:scap-security-guide-ubuntu-0.1.69-1.12.2.noarch",
"SUSE:EL-9:Update:Products:ManagerTools:Update:spacecmd-4.3.23-1.18.2.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-46146",
"url": "https://www.suse.com/security/cve/CVE-2022-46146"
},
{
"category": "external",
"summary": "SUSE Bug 1208046 for CVE-2022-46146",
"url": "https://bugzilla.suse.com/1208046"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Manager Client Tools for RHEL, Liberty and Clones 9-CLIENT-TOOLS:golang-github-QubitProducts-exporter_exporter-0.4.0-1.6.1.aarch64",
"SUSE Manager Client Tools for RHEL, Liberty and Clones 9-CLIENT-TOOLS:golang-github-QubitProducts-exporter_exporter-0.4.0-1.6.1.ppc64le",
"SUSE Manager Client Tools for RHEL, Liberty and Clones 9-CLIENT-TOOLS:golang-github-QubitProducts-exporter_exporter-0.4.0-1.6.1.s390x",
"SUSE Manager Client Tools for RHEL, Liberty and Clones 9-CLIENT-TOOLS:golang-github-QubitProducts-exporter_exporter-0.4.0-1.6.1.x86_64",
"SUSE Manager Client Tools for RHEL, Liberty and Clones 9-CLIENT-TOOLS:golang-github-lusitaniae-apache_exporter-1.0.0-1.8.1.aarch64",
"SUSE Manager Client Tools for RHEL, Liberty and Clones 9-CLIENT-TOOLS:golang-github-lusitaniae-apache_exporter-1.0.0-1.8.1.ppc64le",
"SUSE Manager Client Tools for RHEL, Liberty and Clones 9-CLIENT-TOOLS:golang-github-lusitaniae-apache_exporter-1.0.0-1.8.1.s390x",
"SUSE Manager Client Tools for RHEL, Liberty and Clones 9-CLIENT-TOOLS:golang-github-lusitaniae-apache_exporter-1.0.0-1.8.1.x86_64",
"SUSE Manager Client Tools for RHEL, Liberty and Clones 9-CLIENT-TOOLS:golang-github-prometheus-node_exporter-1.5.0-1.9.2.aarch64",
"SUSE Manager Client Tools for RHEL, Liberty and Clones 9-CLIENT-TOOLS:golang-github-prometheus-node_exporter-1.5.0-1.9.2.ppc64le",
"SUSE Manager Client Tools for RHEL, Liberty and Clones 9-CLIENT-TOOLS:golang-github-prometheus-node_exporter-1.5.0-1.9.2.x86_64",
"SUSE Manager Client Tools for RHEL, Liberty and Clones 9-CLIENT-TOOLS:prometheus-postgres_exporter-0.10.1-1.9.2.aarch64",
"SUSE Manager Client Tools for RHEL, Liberty and Clones 9-CLIENT-TOOLS:prometheus-postgres_exporter-0.10.1-1.9.2.ppc64le",
"SUSE Manager Client Tools for RHEL, Liberty and Clones 9-CLIENT-TOOLS:prometheus-postgres_exporter-0.10.1-1.9.2.s390x",
"SUSE Manager Client Tools for RHEL, Liberty and Clones 9-CLIENT-TOOLS:prometheus-postgres_exporter-0.10.1-1.9.2.x86_64",
"SUSE Manager Client Tools for RHEL, Liberty and Clones 9-CLIENT-TOOLS:scap-security-guide-redhat-0.1.69-1.12.2.noarch",
"SUSE Manager Client Tools for RHEL, Liberty and Clones 9-CLIENT-TOOLS:spacecmd-4.3.23-1.18.2.noarch",
"SUSE:EL-9:Update:Products:ManagerTools:Update:golang-github-QubitProducts-exporter_exporter-0.4.0-1.6.1.aarch64",
"SUSE:EL-9:Update:Products:ManagerTools:Update:golang-github-QubitProducts-exporter_exporter-0.4.0-1.6.1.ppc64le",
"SUSE:EL-9:Update:Products:ManagerTools:Update:golang-github-QubitProducts-exporter_exporter-0.4.0-1.6.1.s390x",
"SUSE:EL-9:Update:Products:ManagerTools:Update:golang-github-QubitProducts-exporter_exporter-0.4.0-1.6.1.x86_64",
"SUSE:EL-9:Update:Products:ManagerTools:Update:golang-github-lusitaniae-apache_exporter-1.0.0-1.8.1.aarch64",
"SUSE:EL-9:Update:Products:ManagerTools:Update:golang-github-lusitaniae-apache_exporter-1.0.0-1.8.1.ppc64le",
"SUSE:EL-9:Update:Products:ManagerTools:Update:golang-github-lusitaniae-apache_exporter-1.0.0-1.8.1.s390x",
"SUSE:EL-9:Update:Products:ManagerTools:Update:golang-github-lusitaniae-apache_exporter-1.0.0-1.8.1.x86_64",
"SUSE:EL-9:Update:Products:ManagerTools:Update:golang-github-prometheus-node_exporter-1.5.0-1.9.2.aarch64",
"SUSE:EL-9:Update:Products:ManagerTools:Update:golang-github-prometheus-node_exporter-1.5.0-1.9.2.ppc64le",
"SUSE:EL-9:Update:Products:ManagerTools:Update:golang-github-prometheus-node_exporter-1.5.0-1.9.2.x86_64",
"SUSE:EL-9:Update:Products:ManagerTools:Update:prometheus-postgres_exporter-0.10.1-1.9.2.aarch64",
"SUSE:EL-9:Update:Products:ManagerTools:Update:prometheus-postgres_exporter-0.10.1-1.9.2.ppc64le",
"SUSE:EL-9:Update:Products:ManagerTools:Update:prometheus-postgres_exporter-0.10.1-1.9.2.s390x",
"SUSE:EL-9:Update:Products:ManagerTools:Update:prometheus-postgres_exporter-0.10.1-1.9.2.x86_64",
"SUSE:EL-9:Update:Products:ManagerTools:Update:scap-security-guide-0.1.69-1.12.2.noarch",
"SUSE:EL-9:Update:Products:ManagerTools:Update:scap-security-guide-debian-0.1.69-1.12.2.noarch",
"SUSE:EL-9:Update:Products:ManagerTools:Update:scap-security-guide-redhat-0.1.69-1.12.2.noarch",
"SUSE:EL-9:Update:Products:ManagerTools:Update:scap-security-guide-ubuntu-0.1.69-1.12.2.noarch",
"SUSE:EL-9:Update:Products:ManagerTools:Update:spacecmd-4.3.23-1.18.2.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Manager Client Tools for RHEL, Liberty and Clones 9-CLIENT-TOOLS:golang-github-QubitProducts-exporter_exporter-0.4.0-1.6.1.aarch64",
"SUSE Manager Client Tools for RHEL, Liberty and Clones 9-CLIENT-TOOLS:golang-github-QubitProducts-exporter_exporter-0.4.0-1.6.1.ppc64le",
"SUSE Manager Client Tools for RHEL, Liberty and Clones 9-CLIENT-TOOLS:golang-github-QubitProducts-exporter_exporter-0.4.0-1.6.1.s390x",
"SUSE Manager Client Tools for RHEL, Liberty and Clones 9-CLIENT-TOOLS:golang-github-QubitProducts-exporter_exporter-0.4.0-1.6.1.x86_64",
"SUSE Manager Client Tools for RHEL, Liberty and Clones 9-CLIENT-TOOLS:golang-github-lusitaniae-apache_exporter-1.0.0-1.8.1.aarch64",
"SUSE Manager Client Tools for RHEL, Liberty and Clones 9-CLIENT-TOOLS:golang-github-lusitaniae-apache_exporter-1.0.0-1.8.1.ppc64le",
"SUSE Manager Client Tools for RHEL, Liberty and Clones 9-CLIENT-TOOLS:golang-github-lusitaniae-apache_exporter-1.0.0-1.8.1.s390x",
"SUSE Manager Client Tools for RHEL, Liberty and Clones 9-CLIENT-TOOLS:golang-github-lusitaniae-apache_exporter-1.0.0-1.8.1.x86_64",
"SUSE Manager Client Tools for RHEL, Liberty and Clones 9-CLIENT-TOOLS:golang-github-prometheus-node_exporter-1.5.0-1.9.2.aarch64",
"SUSE Manager Client Tools for RHEL, Liberty and Clones 9-CLIENT-TOOLS:golang-github-prometheus-node_exporter-1.5.0-1.9.2.ppc64le",
"SUSE Manager Client Tools for RHEL, Liberty and Clones 9-CLIENT-TOOLS:golang-github-prometheus-node_exporter-1.5.0-1.9.2.x86_64",
"SUSE Manager Client Tools for RHEL, Liberty and Clones 9-CLIENT-TOOLS:prometheus-postgres_exporter-0.10.1-1.9.2.aarch64",
"SUSE Manager Client Tools for RHEL, Liberty and Clones 9-CLIENT-TOOLS:prometheus-postgres_exporter-0.10.1-1.9.2.ppc64le",
"SUSE Manager Client Tools for RHEL, Liberty and Clones 9-CLIENT-TOOLS:prometheus-postgres_exporter-0.10.1-1.9.2.s390x",
"SUSE Manager Client Tools for RHEL, Liberty and Clones 9-CLIENT-TOOLS:prometheus-postgres_exporter-0.10.1-1.9.2.x86_64",
"SUSE Manager Client Tools for RHEL, Liberty and Clones 9-CLIENT-TOOLS:scap-security-guide-redhat-0.1.69-1.12.2.noarch",
"SUSE Manager Client Tools for RHEL, Liberty and Clones 9-CLIENT-TOOLS:spacecmd-4.3.23-1.18.2.noarch",
"SUSE:EL-9:Update:Products:ManagerTools:Update:golang-github-QubitProducts-exporter_exporter-0.4.0-1.6.1.aarch64",
"SUSE:EL-9:Update:Products:ManagerTools:Update:golang-github-QubitProducts-exporter_exporter-0.4.0-1.6.1.ppc64le",
"SUSE:EL-9:Update:Products:ManagerTools:Update:golang-github-QubitProducts-exporter_exporter-0.4.0-1.6.1.s390x",
"SUSE:EL-9:Update:Products:ManagerTools:Update:golang-github-QubitProducts-exporter_exporter-0.4.0-1.6.1.x86_64",
"SUSE:EL-9:Update:Products:ManagerTools:Update:golang-github-lusitaniae-apache_exporter-1.0.0-1.8.1.aarch64",
"SUSE:EL-9:Update:Products:ManagerTools:Update:golang-github-lusitaniae-apache_exporter-1.0.0-1.8.1.ppc64le",
"SUSE:EL-9:Update:Products:ManagerTools:Update:golang-github-lusitaniae-apache_exporter-1.0.0-1.8.1.s390x",
"SUSE:EL-9:Update:Products:ManagerTools:Update:golang-github-lusitaniae-apache_exporter-1.0.0-1.8.1.x86_64",
"SUSE:EL-9:Update:Products:ManagerTools:Update:golang-github-prometheus-node_exporter-1.5.0-1.9.2.aarch64",
"SUSE:EL-9:Update:Products:ManagerTools:Update:golang-github-prometheus-node_exporter-1.5.0-1.9.2.ppc64le",
"SUSE:EL-9:Update:Products:ManagerTools:Update:golang-github-prometheus-node_exporter-1.5.0-1.9.2.x86_64",
"SUSE:EL-9:Update:Products:ManagerTools:Update:prometheus-postgres_exporter-0.10.1-1.9.2.aarch64",
"SUSE:EL-9:Update:Products:ManagerTools:Update:prometheus-postgres_exporter-0.10.1-1.9.2.ppc64le",
"SUSE:EL-9:Update:Products:ManagerTools:Update:prometheus-postgres_exporter-0.10.1-1.9.2.s390x",
"SUSE:EL-9:Update:Products:ManagerTools:Update:prometheus-postgres_exporter-0.10.1-1.9.2.x86_64",
"SUSE:EL-9:Update:Products:ManagerTools:Update:scap-security-guide-0.1.69-1.12.2.noarch",
"SUSE:EL-9:Update:Products:ManagerTools:Update:scap-security-guide-debian-0.1.69-1.12.2.noarch",
"SUSE:EL-9:Update:Products:ManagerTools:Update:scap-security-guide-redhat-0.1.69-1.12.2.noarch",
"SUSE:EL-9:Update:Products:ManagerTools:Update:scap-security-guide-ubuntu-0.1.69-1.12.2.noarch",
"SUSE:EL-9:Update:Products:ManagerTools:Update:spacecmd-4.3.23-1.18.2.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2023-09-28T11:45:38Z",
"details": "important"
}
],
"title": "CVE-2022-46146"
},
{
"cve": "CVE-2023-29409",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-29409"
}
],
"notes": [
{
"category": "general",
"text": "Extremely large RSA keys in certificate chains can cause a client/server to expend significant CPU time verifying signatures. With fix, the size of RSA keys transmitted during handshakes is restricted to \u003c= 8192 bits. Based on a survey of publicly trusted RSA keys, there are currently only three certificates in circulation with keys larger than this, and all three appear to be test certificates that are not actively deployed. It is possible there are larger keys in use in private PKIs, but we target the web PKI, so causing breakage here in the interests of increasing the default safety of users of crypto/tls seems reasonable.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Manager Client Tools for RHEL, Liberty and Clones 9-CLIENT-TOOLS:golang-github-QubitProducts-exporter_exporter-0.4.0-1.6.1.aarch64",
"SUSE Manager Client Tools for RHEL, Liberty and Clones 9-CLIENT-TOOLS:golang-github-QubitProducts-exporter_exporter-0.4.0-1.6.1.ppc64le",
"SUSE Manager Client Tools for RHEL, Liberty and Clones 9-CLIENT-TOOLS:golang-github-QubitProducts-exporter_exporter-0.4.0-1.6.1.s390x",
"SUSE Manager Client Tools for RHEL, Liberty and Clones 9-CLIENT-TOOLS:golang-github-QubitProducts-exporter_exporter-0.4.0-1.6.1.x86_64",
"SUSE Manager Client Tools for RHEL, Liberty and Clones 9-CLIENT-TOOLS:golang-github-lusitaniae-apache_exporter-1.0.0-1.8.1.aarch64",
"SUSE Manager Client Tools for RHEL, Liberty and Clones 9-CLIENT-TOOLS:golang-github-lusitaniae-apache_exporter-1.0.0-1.8.1.ppc64le",
"SUSE Manager Client Tools for RHEL, Liberty and Clones 9-CLIENT-TOOLS:golang-github-lusitaniae-apache_exporter-1.0.0-1.8.1.s390x",
"SUSE Manager Client Tools for RHEL, Liberty and Clones 9-CLIENT-TOOLS:golang-github-lusitaniae-apache_exporter-1.0.0-1.8.1.x86_64",
"SUSE Manager Client Tools for RHEL, Liberty and Clones 9-CLIENT-TOOLS:golang-github-prometheus-node_exporter-1.5.0-1.9.2.aarch64",
"SUSE Manager Client Tools for RHEL, Liberty and Clones 9-CLIENT-TOOLS:golang-github-prometheus-node_exporter-1.5.0-1.9.2.ppc64le",
"SUSE Manager Client Tools for RHEL, Liberty and Clones 9-CLIENT-TOOLS:golang-github-prometheus-node_exporter-1.5.0-1.9.2.x86_64",
"SUSE Manager Client Tools for RHEL, Liberty and Clones 9-CLIENT-TOOLS:prometheus-postgres_exporter-0.10.1-1.9.2.aarch64",
"SUSE Manager Client Tools for RHEL, Liberty and Clones 9-CLIENT-TOOLS:prometheus-postgres_exporter-0.10.1-1.9.2.ppc64le",
"SUSE Manager Client Tools for RHEL, Liberty and Clones 9-CLIENT-TOOLS:prometheus-postgres_exporter-0.10.1-1.9.2.s390x",
"SUSE Manager Client Tools for RHEL, Liberty and Clones 9-CLIENT-TOOLS:prometheus-postgres_exporter-0.10.1-1.9.2.x86_64",
"SUSE Manager Client Tools for RHEL, Liberty and Clones 9-CLIENT-TOOLS:scap-security-guide-redhat-0.1.69-1.12.2.noarch",
"SUSE Manager Client Tools for RHEL, Liberty and Clones 9-CLIENT-TOOLS:spacecmd-4.3.23-1.18.2.noarch",
"SUSE:EL-9:Update:Products:ManagerTools:Update:golang-github-QubitProducts-exporter_exporter-0.4.0-1.6.1.aarch64",
"SUSE:EL-9:Update:Products:ManagerTools:Update:golang-github-QubitProducts-exporter_exporter-0.4.0-1.6.1.ppc64le",
"SUSE:EL-9:Update:Products:ManagerTools:Update:golang-github-QubitProducts-exporter_exporter-0.4.0-1.6.1.s390x",
"SUSE:EL-9:Update:Products:ManagerTools:Update:golang-github-QubitProducts-exporter_exporter-0.4.0-1.6.1.x86_64",
"SUSE:EL-9:Update:Products:ManagerTools:Update:golang-github-lusitaniae-apache_exporter-1.0.0-1.8.1.aarch64",
"SUSE:EL-9:Update:Products:ManagerTools:Update:golang-github-lusitaniae-apache_exporter-1.0.0-1.8.1.ppc64le",
"SUSE:EL-9:Update:Products:ManagerTools:Update:golang-github-lusitaniae-apache_exporter-1.0.0-1.8.1.s390x",
"SUSE:EL-9:Update:Products:ManagerTools:Update:golang-github-lusitaniae-apache_exporter-1.0.0-1.8.1.x86_64",
"SUSE:EL-9:Update:Products:ManagerTools:Update:golang-github-prometheus-node_exporter-1.5.0-1.9.2.aarch64",
"SUSE:EL-9:Update:Products:ManagerTools:Update:golang-github-prometheus-node_exporter-1.5.0-1.9.2.ppc64le",
"SUSE:EL-9:Update:Products:ManagerTools:Update:golang-github-prometheus-node_exporter-1.5.0-1.9.2.x86_64",
"SUSE:EL-9:Update:Products:ManagerTools:Update:prometheus-postgres_exporter-0.10.1-1.9.2.aarch64",
"SUSE:EL-9:Update:Products:ManagerTools:Update:prometheus-postgres_exporter-0.10.1-1.9.2.ppc64le",
"SUSE:EL-9:Update:Products:ManagerTools:Update:prometheus-postgres_exporter-0.10.1-1.9.2.s390x",
"SUSE:EL-9:Update:Products:ManagerTools:Update:prometheus-postgres_exporter-0.10.1-1.9.2.x86_64",
"SUSE:EL-9:Update:Products:ManagerTools:Update:scap-security-guide-0.1.69-1.12.2.noarch",
"SUSE:EL-9:Update:Products:ManagerTools:Update:scap-security-guide-debian-0.1.69-1.12.2.noarch",
"SUSE:EL-9:Update:Products:ManagerTools:Update:scap-security-guide-redhat-0.1.69-1.12.2.noarch",
"SUSE:EL-9:Update:Products:ManagerTools:Update:scap-security-guide-ubuntu-0.1.69-1.12.2.noarch",
"SUSE:EL-9:Update:Products:ManagerTools:Update:spacecmd-4.3.23-1.18.2.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-29409",
"url": "https://www.suse.com/security/cve/CVE-2023-29409"
},
{
"category": "external",
"summary": "SUSE Bug 1213880 for CVE-2023-29409",
"url": "https://bugzilla.suse.com/1213880"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Manager Client Tools for RHEL, Liberty and Clones 9-CLIENT-TOOLS:golang-github-QubitProducts-exporter_exporter-0.4.0-1.6.1.aarch64",
"SUSE Manager Client Tools for RHEL, Liberty and Clones 9-CLIENT-TOOLS:golang-github-QubitProducts-exporter_exporter-0.4.0-1.6.1.ppc64le",
"SUSE Manager Client Tools for RHEL, Liberty and Clones 9-CLIENT-TOOLS:golang-github-QubitProducts-exporter_exporter-0.4.0-1.6.1.s390x",
"SUSE Manager Client Tools for RHEL, Liberty and Clones 9-CLIENT-TOOLS:golang-github-QubitProducts-exporter_exporter-0.4.0-1.6.1.x86_64",
"SUSE Manager Client Tools for RHEL, Liberty and Clones 9-CLIENT-TOOLS:golang-github-lusitaniae-apache_exporter-1.0.0-1.8.1.aarch64",
"SUSE Manager Client Tools for RHEL, Liberty and Clones 9-CLIENT-TOOLS:golang-github-lusitaniae-apache_exporter-1.0.0-1.8.1.ppc64le",
"SUSE Manager Client Tools for RHEL, Liberty and Clones 9-CLIENT-TOOLS:golang-github-lusitaniae-apache_exporter-1.0.0-1.8.1.s390x",
"SUSE Manager Client Tools for RHEL, Liberty and Clones 9-CLIENT-TOOLS:golang-github-lusitaniae-apache_exporter-1.0.0-1.8.1.x86_64",
"SUSE Manager Client Tools for RHEL, Liberty and Clones 9-CLIENT-TOOLS:golang-github-prometheus-node_exporter-1.5.0-1.9.2.aarch64",
"SUSE Manager Client Tools for RHEL, Liberty and Clones 9-CLIENT-TOOLS:golang-github-prometheus-node_exporter-1.5.0-1.9.2.ppc64le",
"SUSE Manager Client Tools for RHEL, Liberty and Clones 9-CLIENT-TOOLS:golang-github-prometheus-node_exporter-1.5.0-1.9.2.x86_64",
"SUSE Manager Client Tools for RHEL, Liberty and Clones 9-CLIENT-TOOLS:prometheus-postgres_exporter-0.10.1-1.9.2.aarch64",
"SUSE Manager Client Tools for RHEL, Liberty and Clones 9-CLIENT-TOOLS:prometheus-postgres_exporter-0.10.1-1.9.2.ppc64le",
"SUSE Manager Client Tools for RHEL, Liberty and Clones 9-CLIENT-TOOLS:prometheus-postgres_exporter-0.10.1-1.9.2.s390x",
"SUSE Manager Client Tools for RHEL, Liberty and Clones 9-CLIENT-TOOLS:prometheus-postgres_exporter-0.10.1-1.9.2.x86_64",
"SUSE Manager Client Tools for RHEL, Liberty and Clones 9-CLIENT-TOOLS:scap-security-guide-redhat-0.1.69-1.12.2.noarch",
"SUSE Manager Client Tools for RHEL, Liberty and Clones 9-CLIENT-TOOLS:spacecmd-4.3.23-1.18.2.noarch",
"SUSE:EL-9:Update:Products:ManagerTools:Update:golang-github-QubitProducts-exporter_exporter-0.4.0-1.6.1.aarch64",
"SUSE:EL-9:Update:Products:ManagerTools:Update:golang-github-QubitProducts-exporter_exporter-0.4.0-1.6.1.ppc64le",
"SUSE:EL-9:Update:Products:ManagerTools:Update:golang-github-QubitProducts-exporter_exporter-0.4.0-1.6.1.s390x",
"SUSE:EL-9:Update:Products:ManagerTools:Update:golang-github-QubitProducts-exporter_exporter-0.4.0-1.6.1.x86_64",
"SUSE:EL-9:Update:Products:ManagerTools:Update:golang-github-lusitaniae-apache_exporter-1.0.0-1.8.1.aarch64",
"SUSE:EL-9:Update:Products:ManagerTools:Update:golang-github-lusitaniae-apache_exporter-1.0.0-1.8.1.ppc64le",
"SUSE:EL-9:Update:Products:ManagerTools:Update:golang-github-lusitaniae-apache_exporter-1.0.0-1.8.1.s390x",
"SUSE:EL-9:Update:Products:ManagerTools:Update:golang-github-lusitaniae-apache_exporter-1.0.0-1.8.1.x86_64",
"SUSE:EL-9:Update:Products:ManagerTools:Update:golang-github-prometheus-node_exporter-1.5.0-1.9.2.aarch64",
"SUSE:EL-9:Update:Products:ManagerTools:Update:golang-github-prometheus-node_exporter-1.5.0-1.9.2.ppc64le",
"SUSE:EL-9:Update:Products:ManagerTools:Update:golang-github-prometheus-node_exporter-1.5.0-1.9.2.x86_64",
"SUSE:EL-9:Update:Products:ManagerTools:Update:prometheus-postgres_exporter-0.10.1-1.9.2.aarch64",
"SUSE:EL-9:Update:Products:ManagerTools:Update:prometheus-postgres_exporter-0.10.1-1.9.2.ppc64le",
"SUSE:EL-9:Update:Products:ManagerTools:Update:prometheus-postgres_exporter-0.10.1-1.9.2.s390x",
"SUSE:EL-9:Update:Products:ManagerTools:Update:prometheus-postgres_exporter-0.10.1-1.9.2.x86_64",
"SUSE:EL-9:Update:Products:ManagerTools:Update:scap-security-guide-0.1.69-1.12.2.noarch",
"SUSE:EL-9:Update:Products:ManagerTools:Update:scap-security-guide-debian-0.1.69-1.12.2.noarch",
"SUSE:EL-9:Update:Products:ManagerTools:Update:scap-security-guide-redhat-0.1.69-1.12.2.noarch",
"SUSE:EL-9:Update:Products:ManagerTools:Update:scap-security-guide-ubuntu-0.1.69-1.12.2.noarch",
"SUSE:EL-9:Update:Products:ManagerTools:Update:spacecmd-4.3.23-1.18.2.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Manager Client Tools for RHEL, Liberty and Clones 9-CLIENT-TOOLS:golang-github-QubitProducts-exporter_exporter-0.4.0-1.6.1.aarch64",
"SUSE Manager Client Tools for RHEL, Liberty and Clones 9-CLIENT-TOOLS:golang-github-QubitProducts-exporter_exporter-0.4.0-1.6.1.ppc64le",
"SUSE Manager Client Tools for RHEL, Liberty and Clones 9-CLIENT-TOOLS:golang-github-QubitProducts-exporter_exporter-0.4.0-1.6.1.s390x",
"SUSE Manager Client Tools for RHEL, Liberty and Clones 9-CLIENT-TOOLS:golang-github-QubitProducts-exporter_exporter-0.4.0-1.6.1.x86_64",
"SUSE Manager Client Tools for RHEL, Liberty and Clones 9-CLIENT-TOOLS:golang-github-lusitaniae-apache_exporter-1.0.0-1.8.1.aarch64",
"SUSE Manager Client Tools for RHEL, Liberty and Clones 9-CLIENT-TOOLS:golang-github-lusitaniae-apache_exporter-1.0.0-1.8.1.ppc64le",
"SUSE Manager Client Tools for RHEL, Liberty and Clones 9-CLIENT-TOOLS:golang-github-lusitaniae-apache_exporter-1.0.0-1.8.1.s390x",
"SUSE Manager Client Tools for RHEL, Liberty and Clones 9-CLIENT-TOOLS:golang-github-lusitaniae-apache_exporter-1.0.0-1.8.1.x86_64",
"SUSE Manager Client Tools for RHEL, Liberty and Clones 9-CLIENT-TOOLS:golang-github-prometheus-node_exporter-1.5.0-1.9.2.aarch64",
"SUSE Manager Client Tools for RHEL, Liberty and Clones 9-CLIENT-TOOLS:golang-github-prometheus-node_exporter-1.5.0-1.9.2.ppc64le",
"SUSE Manager Client Tools for RHEL, Liberty and Clones 9-CLIENT-TOOLS:golang-github-prometheus-node_exporter-1.5.0-1.9.2.x86_64",
"SUSE Manager Client Tools for RHEL, Liberty and Clones 9-CLIENT-TOOLS:prometheus-postgres_exporter-0.10.1-1.9.2.aarch64",
"SUSE Manager Client Tools for RHEL, Liberty and Clones 9-CLIENT-TOOLS:prometheus-postgres_exporter-0.10.1-1.9.2.ppc64le",
"SUSE Manager Client Tools for RHEL, Liberty and Clones 9-CLIENT-TOOLS:prometheus-postgres_exporter-0.10.1-1.9.2.s390x",
"SUSE Manager Client Tools for RHEL, Liberty and Clones 9-CLIENT-TOOLS:prometheus-postgres_exporter-0.10.1-1.9.2.x86_64",
"SUSE Manager Client Tools for RHEL, Liberty and Clones 9-CLIENT-TOOLS:scap-security-guide-redhat-0.1.69-1.12.2.noarch",
"SUSE Manager Client Tools for RHEL, Liberty and Clones 9-CLIENT-TOOLS:spacecmd-4.3.23-1.18.2.noarch",
"SUSE:EL-9:Update:Products:ManagerTools:Update:golang-github-QubitProducts-exporter_exporter-0.4.0-1.6.1.aarch64",
"SUSE:EL-9:Update:Products:ManagerTools:Update:golang-github-QubitProducts-exporter_exporter-0.4.0-1.6.1.ppc64le",
"SUSE:EL-9:Update:Products:ManagerTools:Update:golang-github-QubitProducts-exporter_exporter-0.4.0-1.6.1.s390x",
"SUSE:EL-9:Update:Products:ManagerTools:Update:golang-github-QubitProducts-exporter_exporter-0.4.0-1.6.1.x86_64",
"SUSE:EL-9:Update:Products:ManagerTools:Update:golang-github-lusitaniae-apache_exporter-1.0.0-1.8.1.aarch64",
"SUSE:EL-9:Update:Products:ManagerTools:Update:golang-github-lusitaniae-apache_exporter-1.0.0-1.8.1.ppc64le",
"SUSE:EL-9:Update:Products:ManagerTools:Update:golang-github-lusitaniae-apache_exporter-1.0.0-1.8.1.s390x",
"SUSE:EL-9:Update:Products:ManagerTools:Update:golang-github-lusitaniae-apache_exporter-1.0.0-1.8.1.x86_64",
"SUSE:EL-9:Update:Products:ManagerTools:Update:golang-github-prometheus-node_exporter-1.5.0-1.9.2.aarch64",
"SUSE:EL-9:Update:Products:ManagerTools:Update:golang-github-prometheus-node_exporter-1.5.0-1.9.2.ppc64le",
"SUSE:EL-9:Update:Products:ManagerTools:Update:golang-github-prometheus-node_exporter-1.5.0-1.9.2.x86_64",
"SUSE:EL-9:Update:Products:ManagerTools:Update:prometheus-postgres_exporter-0.10.1-1.9.2.aarch64",
"SUSE:EL-9:Update:Products:ManagerTools:Update:prometheus-postgres_exporter-0.10.1-1.9.2.ppc64le",
"SUSE:EL-9:Update:Products:ManagerTools:Update:prometheus-postgres_exporter-0.10.1-1.9.2.s390x",
"SUSE:EL-9:Update:Products:ManagerTools:Update:prometheus-postgres_exporter-0.10.1-1.9.2.x86_64",
"SUSE:EL-9:Update:Products:ManagerTools:Update:scap-security-guide-0.1.69-1.12.2.noarch",
"SUSE:EL-9:Update:Products:ManagerTools:Update:scap-security-guide-debian-0.1.69-1.12.2.noarch",
"SUSE:EL-9:Update:Products:ManagerTools:Update:scap-security-guide-redhat-0.1.69-1.12.2.noarch",
"SUSE:EL-9:Update:Products:ManagerTools:Update:scap-security-guide-ubuntu-0.1.69-1.12.2.noarch",
"SUSE:EL-9:Update:Products:ManagerTools:Update:spacecmd-4.3.23-1.18.2.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2023-09-28T11:45:38Z",
"details": "important"
}
],
"title": "CVE-2023-29409"
}
]
}
suse-su-2024:0191-1
Vulnerability from csaf_suse
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security Beta update for SUSE Manager Client Tools",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update fixes the following issues:\n\ngolang-github-QubitProducts-exporter_exporter:\n\n- Exclude s390 arch \n- Adapted to build on Enterprise Linux.\n- Fix build for RedHat 7\n- Require Go \u003e= 1.14 also for CentOS\n- Add support for CentOS\n- Replace %{?systemd_requires} with %{?systemd_ordering}\n\ngolang-github-boynux-squid_exporter:\n\n- Exclude s390 architecture (gh#SUSE/spacewalk#19050)\n- Enhanced to build on Enterprise Linux 8.\n\ngolang-github-lusitaniae-apache_exporter:\n\n- Do not strip if SUSE Linux Enterprise 15 SP3\n- Exclude debug for RHEL \u003e= 8\n- Build with Go \u003e= 1.20 when the OS is not RHEL\n- Fix apparmor profile for SLE 12\n- Upgrade to version 1.0.0 (jsc#PED-5405)\n * Improved flag parsing\n * Added support for custom headers\n- Build using promu\n- Fix sandboxing options\n- Upgrade to version 0.13.4\n * CVE-2022-32149: Fix denial of service vulnerability (bsc#1204501)\n- Upgrade to version 0.13.3\n * CVE-2022-41723: Fix uncontrolled resource consumption (bsc#1208270)\n- Upgrade to version 0.13.1\n * Fix panic caused by missing flagConfig options\n- Upgrade to version 0.13.0\n * CVE-2022-46146: Fix authentication bypass vulnarability (bsc#1208046)\n- Corrected comment in AppArmor profile\n- Added AppArmor profile\n- Added sandboxing options to systemd service unit\n- Exclude s390 architecture (gh#SUSE/spacewalk#19050)\n- Update to upstream release 0.11.0 (jsc#SLE-24791)\n * Add TLS support\n * Switch to logger, please check --log.level and --log.format flags\n- Update to version 0.10.1\n * Bugfix: Reset ProxyBalancer metrics on each scrape to remove stale data\n- Update to version 0.10.0\n * Add Apache Proxy and other metrics\n- Update to version 0.8.0\n * Change commandline flags\n * Add metrics: Apache version, request duration total\n- Adapted to build on Enterprise Linux 8\n- Require building with Go 1.15\n- Add support for RedHat 8\n - Adjust dependencies on spec file \n - Disable dwarf compression in go build\n- Add support for Red Hat\n- Add %license macro for LICENSE file \n\ngolang-github-prometheus-alertmanager:\n\n- Do not create PIE for s390x architecture\n- Require Go 1.20 or newer for building\n- Remove not used build flags\n- Create position independent executables (PIE)\n- Disable striping the binaries only for SLE 15 SP3\n- Add System/Monitoring group tag\n- Rework service file to use obscpio\n * Run tar and recompress services at buildtime\n * Do not generate automatically changelog entries\n- Update to version 0.26.0 (jsc#PED-7353):\n https://github.com/prometheus/alertmanager/releases/tag/v0.26.0\n * CVE-2023-40577: Fix stored XSS via the /api/v1/alerts endpoint in the Alertmanager UI (bsc#1218838)\n * Configuration: Fix empty list of receivers and inhibit_rules would cause the alertmanager to crash\n * Templating: Fixed a race condition when using the title\n function. It is now race-safe\n * API: Fixed duplicate receiver names in the api/v2/receivers API\n endpoint\n * API: Attempting to delete a silence now returns the correct\n status code, 404 instead of 500\n * Clustering: Fixes a panic when tls_client_config is empty\n * Webhook: url is now marked as a secret. It will no longer show\n up in the logs as clear-text\n * Metrics: New label reason for\n alertmanager_notifications_failed_total metric to indicate the\n type of error of the alert delivery\n * Clustering: New flag --cluster.label, to help to block any\n traffic that is not meant for the cluster\n * Integrations: Add Microsoft Teams as a supported integration\n- Update to version 0.25.0:\n https://github.com/prometheus/alertmanager/releases/tag/v0.25.0\n * Fail configuration loading if api_key and api_key_file are\n defined at the same time\n * Fix the alertmanager_alerts metric to avoid counting resolved\n alerts as active. Also added a new alertmanager_marked_alerts\n metric that retain the old behavior\n * Trim contents of Slack API URLs when reading from files\n * amtool: Avoid panic when the label value matcher is empty\n * Fail configuration loading if api_url is empty for OpsGenie\n * Fix email template for resolved notifications\n * Add proxy_url support for OAuth2 in HTTP client configuration\n * Reload TLS certificate and key from disk when updated\n * Add Discord integration\n * Add Webex integration\n * Add min_version support to select the minimum TLS version in\n HTTP client configuration\n * Add max_version support to select the maximum TLS version in\n * Emit warning logs when truncating messages in notifications\n * Support HEAD method for the /-/healty and /-/ready endpoints\n * Add support for reading global and local SMTP passwords from\n files\n * UI: Add \u0027Link\u0027 button to alerts in list\n * UI: Allow to choose the first day of the week as Sunday or\n Monday\n- Update to version 0.24.0:\n https://github.com/prometheus/alertmanager/releases/tag/v0.24.0\n * Fix HTTP client configuration for the SNS receiver\n * Fix unclosed file descriptor after reading the silences\n snapshot file\n * Fix field names for mute_time_intervals in JSON marshaling\n * Ensure that the root route doesn\u0027t have any matchers\n * Truncate the message\u0027s title to 1024 chars to avoid hitting\n Slack limits\n * Fix the default HTML email template (email.default.html) to\n match with the canonical source\n * Detect SNS FIFO topic based on the rendered value\n * Avoid deleting and recreating a silence when an update is\n possible\n * api/v2: Return 200 OK when deleting an expired silence\n * amtool: Fix the silence\u0027s end date when adding a silence. The\n end date is (start date + duration) while it used to be\n (current time + duration). The new behavior is consistent with\n the update operation\n * Add the /api/v2 prefix to all endpoints in the OpenAPI\n specification and generated client code\n * Add --cluster.tls-config experimental flag to secure cluster\n traffic via mutual TLS\n * Add Telegram integration\n- CVE-2022-46146: Prevent authentication bypass via cache poisoning (bsc#1208051)\n- Do not include sources (bsc#1200725)\n\ngolang-github-prometheus-node_exporter:\n\n- Remove node_exporter-1.5.0.tar.gz\n- Execute tar and recompress service modules at buildtime\n- Update to 1.5.0 (jsc#PED-3578):\n * NOTE: This changes the Go runtime \u0027GOMAXPROCS\u0027 to 1. This is done to limit the\n concurrency of the exporter to 1 CPU thread at a time in order to avoid a\n race condition problem in the Linux kernel (#2500) and parallel IO issues\n on nodes with high numbers of CPUs/CPU threads (#1880).\n * [CHANGE] Default GOMAXPROCS to 1 #2530\n * [FEATURE] Add multiple listeners and systemd socket listener activation #2393\n * [ENHANCEMENT] Add RTNL version of netclass collector #2492, #2528\n * [BUGFIX] Fix hwmon label sanitizer #2504\n * [BUGFIX] Use native endianness when encoding InetDiagMsg #2508\n * [BUGFIX] Fix btrfs device stats always being zero #2516\n- Update to 1.4.1:\n * [BUGFIX] Fix diskstats exclude flags #2487\n * [SECURITY] CVE-2022-27191, CVE-2022-27664: Update go/x/crypto and go/x/net (bsc#1197284, bsc#1203185)\n * [SECURITY] CVE-2022-46146: Update exporter-toolkit (bsc#1208064)\n- Update to 1.4.0:\n * [CHANGE] Merge metrics descriptions in textfile collector #2475\n * [FEATURE] [node-mixin] Add darwin dashboard to mixin #2351\n * [FEATURE] Add \u0027isolated\u0027 metric on cpu collector on linux #2251\n * [FEATURE] Add cgroup summary collector #2408\n * [FEATURE] Add selinux collector #2205\n * [FEATURE] Add slab info collector #2376\n * [FEATURE] Add sysctl collector #2425\n * [FEATURE] Also track the CPU Spin time for OpenBSD systems #1971\n * [FEATURE] Add support for MacOS version #2471\n * [ENHANCEMENT] [node-mixin] Add missing selectors #2426\n * [ENHANCEMENT] [node-mixin] Change current datasource to grafana\u0027s default #2281\n * [ENHANCEMENT] [node-mixin] Change disk graph to disk table #2364\n * [ENHANCEMENT] [node-mixin] Change io time units to %util #2375\n * [ENHANCEMENT] Ad user_wired_bytes and laundry_bytes on *bsd #2266\n * [ENHANCEMENT] Add additional vm_stat memory metrics for darwin #2240\n * [ENHANCEMENT] Add device filter flags to arp collector #2254\n * [ENHANCEMENT] Add diskstats include and exclude device flags #2417\n * [ENHANCEMENT] Add node_softirqs_total metric #2221\n * [ENHANCEMENT] Add rapl zone name label option #2401\n * [ENHANCEMENT] Add slabinfo collector #1799\n * [ENHANCEMENT] Allow user to select port on NTP server to query #2270\n * [ENHANCEMENT] collector/diskstats: Add labels and metrics from udev #2404\n * [ENHANCEMENT] Enable builds against older macOS SDK #2327\n * [ENHANCEMENT] qdisk-linux: Add exclude and include flags for interface name #2432\n * [ENHANCEMENT] systemd: Expose systemd minor version #2282\n * [ENHANCEMENT] Use netlink for tcpstat collector #2322\n * [ENHANCEMENT] Use netlink to get netdev stats #2074\n * [ENHANCEMENT] Add additional perf counters for stalled frontend/backend cycles #2191\n * [ENHANCEMENT] Add btrfs device error stats #2193\n * [BUGFIX] [node-mixin] Fix fsSpaceAvailableCriticalThreshold and fsSpaceAvailableWarning #2352\n * [BUGFIX] Fix concurrency issue in ethtool collector #2289\n * [BUGFIX] Fix concurrency issue in netdev collector #2267\n * [BUGFIX] Fix diskstat reads and write metrics for disks with different sector sizes #2311\n * [BUGFIX] Fix iostat on macos broken by deprecation warning #2292\n * [BUGFIX] Fix NodeFileDescriptorLimit alerts #2340\n * [BUGFIX] Sanitize rapl zone names #2299\n * [BUGFIX] Add file descriptor close safely in test #2447\n * [BUGFIX] Fix race condition in os_release.go #2454\n * [BUGFIX] Skip ZFS IO metrics if their paths are missing #2451\n- BuildRequire go1.18 OR HIGHER (previously this was fixed to 1.14)\n- Update to 1.3.1\n * [BUGFIX] Handle nil CPU thermal power status on M1 #2218\n * [BUGFIX] bsd: Ignore filesystems flagged as MNT_IGNORE. #2227\n * [BUGFIX] Sanitize UTF-8 in dmi collector #2229\n- Exclude s390 arch.\n- Update spec file in order to make --version work (bsc#1196652)\n\ngolang-github-prometheus-prometheus:\n\n- Update to 2.45.0 (jsc#PED-5406):\n * [FEATURE] API: New limit parameter to limit the number of items\n returned by `/api/v1/status/tsdb` endpoint. \n * [FEATURE] Config: Add limits to global config. \n * [FEATURE] Consul SD: Added support for `path_prefix`. \n * [FEATURE] Native histograms: Add option to scrape both classic\n and native histograms. \n * [FEATURE] Native histograms: Added support for two more\n arithmetic operators `avg_over_time` and `sum_over_time`.\n * [FEATURE] Promtool: When providing the block id, only one block\n will be loaded and analyzed. \n * [FEATURE] Remote-write: New Azure ad configuration to support\n remote writing directly to Azure Monitor workspace. \n * [FEATURE] TSDB: Samples per chunk are now configurable with\n flag `storage.tsdb.samples-per-chunk`. By default set to its\n former value 120. \n * [ENHANCEMENT] Native histograms: bucket size can now be limited\n to avoid scrape fails. \n * [ENHANCEMENT] TSDB: Dropped series are now deleted from the WAL\n sooner. \n * [BUGFIX] Native histograms: ChunkSeries iterator now checks if\n a new sample can be appended to the open chunk. \n * [BUGFIX] Native histograms: Fix Histogram Appender\n `Appendable()` segfault. \n * [BUGFIX] Native histograms: Fix setting reset header to gauge\n histograms in seriesToChunkEncoder. \n * [BUGFIX] TSDB: Tombstone intervals are not modified after Get()\n call. \n * [BUGFIX] TSDB: Use path/filepath to set the WAL directory.\n- Update to 2.44.0:\n * [FEATURE] Remote-read: Handle native histograms. \n * [FEATURE] Promtool: Health and readiness check of prometheus\n server in CLI. \n * [FEATURE] PromQL: Add `query_samples_total` metric, the total\n number of samples loaded by all queries.\n * [ENHANCEMENT] Storage: Optimise buffer used to iterate through\n samples.\n * [ENHANCEMENT] Scrape: Reduce memory allocations on target\n labels.\n * [ENHANCEMENT] PromQL: Use faster heap method for `topk()` /\n `bottomk()`.\n * [ENHANCEMENT] Rules API: Allow filtering by rule name.\n * [ENHANCEMENT] Native Histograms: Various fixes and\n improvements.\n * [ENHANCEMENT] UI: Search of scraping pools is now\n case-insensitive.\n * [ENHANCEMENT] TSDB: Add an affirmative log message for\n successful WAL repair.\n * [BUGFIX] TSDB: Block compaction failed when shutting down.\n * [BUGFIX] TSDB: Out-of-order chunks could be ignored if the\n write-behind log was deleted.\n- Update to 2.43.1\n * [BUGFIX] Labels: Set() after Del() would be ignored, which\n broke some relabeling rules.\n- Update to 2.43.0:\n * [FEATURE] Promtool: Add HTTP client configuration to query\n commands.\n * [FEATURE] Scrape: Add `include_scrape_configs` to include\n scrape configs from different files.\n * [FEATURE] HTTP client: Add `no_proxy` to exclude URLs from\n proxied requests.\n * [FEATURE] HTTP client: Add `proxy_from_enviroment` to read\n proxies from env variables.\n * [ENHANCEMENT] API: Add support for setting lookback delta per\n query via the API.\n * [ENHANCEMENT] API: Change HTTP status code from 503/422 to 499\n if a request is canceled.\n * [ENHANCEMENT] Scrape: Allow exemplars for all metric types.\n * [ENHANCEMENT] TSDB: Add metrics for head chunks and WAL folders\n size.\n * [ENHANCEMENT] TSDB: Automatically remove incorrect snapshot\n with index that is ahead of WAL.\n * [ENHANCEMENT] TSDB: Improve Prometheus parser error outputs to\n be more comprehensible.\n * [ENHANCEMENT] UI: Scope `group by` labels to metric in\n autocompletion.\n * [BUGFIX] Scrape: Fix\n `prometheus_target_scrape_pool_target_limit` metric not set\n before reloading.\n * [BUGFIX] TSDB: Correctly update\n `prometheus_tsdb_head_chunks_removed_total` and\n `prometheus_tsdb_head_chunks` metrics when reading WAL.\n * [BUGFIX] TSDB: Use the correct unit (seconds) when recording\n out-of-order append deltas in the\n `prometheus_tsdb_sample_ooo_delta` metric.\n- Update to 2.42.0:\n This release comes with a bunch of feature coverage for native\n histograms and breaking changes.\n If you are trying native histograms already, we recommend you\n remove the `wal` directory when upgrading.\n Because the old WAL record for native histograms is not\n backward compatible in v2.42.0, this will lead to some data\n loss for the latest data.\n Additionally, if you scrape \u0027float histograms\u0027 or use recording\n rules on native histograms in v2.42.0 (which writes float\n histograms), it is a one-way street since older versions do not\n support float histograms.\n * [CHANGE] **breaking** TSDB: Changed WAL record format for the\n experimental native histograms.\n * [FEATURE] Add \u0027keep_firing_for\u0027 field to alerting rules.\n * [FEATURE] Promtool: Add support of selecting timeseries for\n TSDB dump.\n * [ENHANCEMENT] Agent: Native histogram support.\n * [ENHANCEMENT] Rules: Support native histograms in recording\n rules.\n * [ENHANCEMENT] SD: Add container ID as a meta label for pod\n targets for Kubernetes.\n * [ENHANCEMENT] SD: Add VM size label to azure service\n discovery.\n * [ENHANCEMENT] Support native histograms in federation.\n * [ENHANCEMENT] TSDB: Add gauge histogram support.\n * [ENHANCEMENT] TSDB/Scrape: Support FloatHistogram that\n represents buckets as float64 values.\n * [ENHANCEMENT] UI: Show individual scrape pools on /targets\n page.\n- Update to 2.41.0:\n * [FEATURE] Relabeling: Add keepequal and dropequal relabel\n actions.\n * [FEATURE] Add support for HTTP proxy headers. \n * [ENHANCEMENT] Reload private certificates when changed on disk.\n * [ENHANCEMENT] Add max_version to specify maximum TLS version in\n tls_config.\n * [ENHANCEMENT] Add goos and goarch labels to\n prometheus_build_info.\n * [ENHANCEMENT] SD: Add proxy support for EC2 and LightSail SDs.\n * [ENHANCEMENT] SD: Add new metric\n prometheus_sd_file_watcher_errors_total.\n * [ENHANCEMENT] Remote Read: Use a pool to speed up marshalling.\n * [ENHANCEMENT] TSDB: Improve handling of tombstoned chunks in\n iterators.\n * [ENHANCEMENT] TSDB: Optimize postings offset table reading.\n * [BUGFIX] Scrape: Validate the metric name, label names, and\n label values after relabeling.\n * [BUGFIX] Remote Write receiver and rule manager: Fix error\n handling.\n- Update to 2.40.7:\n * [BUGFIX] TSDB: Fix queries involving negative buckets of native\n histograms.\n- Update to 2.40.5:\n * [BUGFIX] TSDB: Fix queries involving native histograms due to\n improper reset of iterators.\n- Update to 2.40.3:\n * [BUGFIX] TSDB: Fix compaction after a deletion is called.\n- Update to 2.40.2:\n * [BUGFIX] UI: Fix black-on-black metric name color in dark mode.\n- Update to 2.40.1:\n * [BUGFIX] TSDB: Fix alignment for atomic int64 for 32 bit\n architecture.\n * [BUGFIX] Scrape: Fix accept headers.\n- Update to 2.40.0:\n * [FEATURE] Add experimental support for native histograms.\n Enable with the flag --enable-feature=native-histograms.\n * [FEATURE] SD: Add service discovery for OVHcloud.\n * [ENHANCEMENT] Kubernetes SD: Use protobuf encoding.\n * [ENHANCEMENT] TSDB: Use golang.org/x/exp/slices for improved\n sorting speed.\n * [ENHANCEMENT] Consul SD: Add enterprise admin partitions. Adds\n __meta_consul_partition label. Adds partition config in\n consul_sd_config.\n * [BUGFIX] API: Fix API error codes for /api/v1/labels and\n /api/v1/series.\n- Update to 2.39.1:\n * [BUGFIX] Rules: Fix notifier relabel changing the labels on\n active alerts.\n- Update to 2.39.0:\n * [FEATURE] experimental TSDB: Add support for ingesting\n out-of-order samples. This is configured via\n out_of_order_time_window field in the config file; check config\n file docs for more info.\n * [ENHANCEMENT] API: /-/healthy and /-/ready API calls now also\n respond to a HEAD request on top of existing GET support.\n * [ENHANCEMENT] PuppetDB SD: Add __meta_puppetdb_query label.\n * [ENHANCEMENT] AWS EC2 SD: Add __meta_ec2_region label.\n * [ENHANCEMENT] AWS Lightsail SD: Add __meta_lightsail_region\n label.\n * [ENHANCEMENT] Scrape: Optimise relabeling by re-using memory.\n * [ENHANCEMENT] TSDB: Improve WAL replay timings.\n * [ENHANCEMENT] TSDB: Optimise memory by not storing unnecessary\n data in the memory.\n * [ENHANCEMENT] TSDB: Allow overlapping blocks by default.\n --storage.tsdb.allow-overlapping-blocks now has no effect.\n * [ENHANCEMENT] UI: Click to copy label-value pair from query\n result to clipboard.\n * [BUGFIX] TSDB: Turn off isolation for Head compaction to fix a\n memory leak.\n * [BUGFIX] TSDB: Fix \u0027invalid magic number 0\u0027 error on Prometheus\n startup.\n * [BUGFIX] PromQL: Properly close file descriptor when logging\n unfinished queries.\n * [BUGFIX] Agent: Fix validation of flag options and prevent WAL\n from growing more than desired.\n- Update to 2.38.0:\n * [FEATURE]: Web: Add a /api/v1/format_query HTTP API endpoint\n that allows pretty-formatting PromQL expressions.\n * [FEATURE]: UI: Add support for formatting PromQL expressions in\n the UI.\n * [FEATURE]: DNS SD: Support MX records for discovering targets.\n * [FEATURE]: Templates: Add toTime() template function that\n allows converting sample timestamps to Go time.Time values.\n * [ENHANCEMENT]: Kubernetes SD: Add\n __meta_kubernetes_service_port_number meta label indicating the\n service port number.\n __meta_kubernetes_pod_container_image meta label indicating the\n container image.\n * [ENHANCEMENT]: PromQL: When a query panics, also log the query\n itself alongside the panic message.\n * [ENHANCEMENT]: UI: Tweak colors in the dark theme to improve\n the contrast ratio.\n * [ENHANCEMENT]: Web: Speed up calls to /api/v1/rules by avoiding\n locks and using atomic types instead.\n * [ENHANCEMENT]: Scrape: Add a no-default-scrape-port feature\n flag, which omits or removes any default HTTP (:80) or HTTPS\n (:443) ports in the target\u0027s scrape address.\n * [BUGFIX]: TSDB: In the WAL watcher metrics, expose the\n type=\u0027exemplar\u0027 label instead of type=\u0027unknown\u0027 for exemplar\n records.\n * [BUGFIX]: TSDB: Fix race condition around allocating series IDs\n during chunk snapshot loading.\n- Remove npm_licenses.tar.bz2 during \u0027make clean\u0027\n- Remove web-ui archives during \u0027make clean\u0027.\n- Require promu \u003e= 0.14.0 for building\n- Upgrade to version 2.37.6\n * Require Go 1.19\n- Upgrade to version 2.37.5\n * [SECURITY] Security upgrade from go and upstream dependencies\n that include security fixes to the net/http and os packages.\n- Upgrade to version 2.37.4\n * [SECURITY] CVE-2022-46146: Fix basic authentication bypass vulnerability (bsc#1208049, jsc#PED-3576)\n- Upgrade to version 2.37.3\n * [BUGFIX] CVE-2022-41715: Update our regexp library to fix upstream vulnerability (bnc#1204023)\n * [BUGFIX] TSDB: Turn off isolation for Head compaction to fix a\n memory leak.\n- Upgrade to version 2.37.2\n * [BUGFIX] TSDB: Fix \u0027invalid magic number 0\u0027 error on Prometheus\n startup.\n * [BUGFIX] Agent: Fix validation of flag options and prevent WAL\n from growing more than desired.\n- Upgrade to version 2.37.1\n * [BUGFIX] Properly close file descriptor when logging unfinished\n queries.\n * [BUGFIX] TSDB: In the WAL watcher metrics, expose the\n- Upgrade to version 2.37.0\n * [FEATURE] Nomad SD: New service discovery for Nomad built-in\n service discovery.\n * [ENHANCEMENT] Kubernetes SD: Allow attaching node labels for\n endpoint role.\n * [ENHANCEMENT] PromQL: Optimise creation of signature\n with/without labels.\n * [ENHANCEMENT] TSDB: Memory optimizations.\n * [ENHANCEMENT] TSDB: Reduce sleep time when reading WAL.\n * [ENHANCEMENT] OAuth2: Add appropriate timeouts and User-Agent\n header.\n * [BUGFIX] Alerting: Fix Alertmanager targets not being updated\n when alerts were queued.\n * [BUGFIX] Hetzner SD: Make authentication files relative to\n Prometheus config file.\n * [BUGFIX] Promtool: Fix promtool check config not erroring\n properly on failures.\n * [BUGFIX] Scrape: Keep relabeled scrape interval and timeout on\n reloads.\n * [BUGFIX] TSDB: Don\u0027t increment\n prometheus_tsdb_compactions_failed_total when context is\n canceled.\n * [BUGFIX] TSDB: Fix panic if series is not found when deleting\n series.\n * [BUGFIX] TSDB: Increase\n prometheus_tsdb_mmap_chunk_corruptions_total on out of sequence\n errors.\n * [BUGFIX] Uyuni SD: Make authentication files relative to\n Prometheus configuration file and fix default configuration\n values.\n- Upgrade to version 2.36.2\n * [BUGFIX] Fix serving of static assets like fonts and favicon.\n- Upgrade to version 2.36.1\n * [BUGFIX] promtool: Add --lint-fatal option.\n- Upgrade to version 2.36.0\n * [FEATURE] Add lowercase and uppercase relabel action.\n * [FEATURE] SD: Add IONOS Cloud integration.\n * [FEATURE] SD: Add Vultr integration.\n * [FEATURE] SD: Add Linode SD failure count metric.\n * [FEATURE] Add prometheus_ready metric.\n * [ENHANCEMENT] Add stripDomain to template function.\n * [ENHANCEMENT] UI: Enable active search through dropped targets.\n * [ENHANCEMENT] promtool: support matchers when querying label\n * [ENHANCEMENT] Add agent mode identifier.\n * [BUGFIX] Changing TotalQueryableSamples from int to int64.\n * [BUGFIX] tsdb/agent: Ignore duplicate exemplars.\n * [BUGFIX] TSDB: Fix chunk overflow appending samples at a\n variable rate.\n * [BUGFIX] Stop rule manager before TSDB is stopped.\n- Upgrade to version 2.35.0\n * [CHANGE] TSDB: Delete *.tmp WAL files when Prometheus starts.\n * [CHANGE] promtool: Add new flag --lint (enabled by default) for\n the commands check rules and check config, resulting in a new\n exit code (3) for linter errors.\n * [FEATURE] Support for automatically setting the variable\n GOMAXPROCS to the container CPU limit. Enable with the flag\n --enable-feature=auto-gomaxprocs.\n * [FEATURE] PromQL: Extend statistics with total and peak number\n of samples in a query. Additionally, per-step statistics are\n available with --enable-feature=promql-per-step-stats and using\n stats=all in the query API. Enable with the flag\n --enable-feature=per-step-stats.\n * [ENHANCEMENT] TSDB: more efficient sorting of postings read from\n WAL at startup.\n * [ENHANCEMENT] Azure SD: Add metric to track Azure SD failures.\n * [ENHANCEMENT] Azure SD: Add an optional resource_group\n configuration.\n * [ENHANCEMENT] Kubernetes SD: Support discovery.k8s.io/v1\n EndpointSlice (previously only discovery.k8s.io/v1beta1\n EndpointSlice was supported).\n * [ENHANCEMENT] Kubernetes SD: Allow attaching node metadata to\n discovered pods.\n * [ENHANCEMENT] OAuth2: Support for using a proxy URL to fetch\n OAuth2 tokens.\n * [ENHANCEMENT] Configuration: Add the ability to disable HTTP2.\n * [ENHANCEMENT] Config: Support overriding minimum TLS version.\n * [BUGFIX] Kubernetes SD: Explicitly include gcp auth from k8s.io.\n * [BUGFIX] Fix OpenMetrics parser to sort uppercase labels\n correctly.\n * [BUGFIX] UI: Fix scrape interval and duration tooltip not\n showing on target page.\n * [BUGFIX] Tracing/GRPC: Set TLS credentials only when insecure is\n false.\n * [BUGFIX] Agent: Fix ID collision when loading a WAL with\n multiple segments.\n * [BUGFIX] Remote-write: Fix a deadlock between Batch and flushing\n the queue.\n- Upgrade to version 2.34.0\n * [CHANGE] UI: Classic UI removed.\n * [CHANGE] Tracing: Migrate from Jaeger to OpenTelemetry based\n tracing.\n * [ENHANCEMENT] TSDB: Disable the chunk write queue by default and\n allow configuration with the experimental flag\n --storage.tsdb.head-chunks-write-queue-size.\n * [ENHANCEMENT] HTTP SD: Add a failure counter.\n * [ENHANCEMENT] Azure SD: Set Prometheus User-Agent on requests.\n * [ENHANCEMENT] Uyuni SD: Reduce the number of logins to Uyuni.\n * [ENHANCEMENT] Scrape: Log when an invalid media type is\n encountered during a scrape.\n * [ENHANCEMENT] Scrape: Accept\n application/openmetrics-text;version=1.0.0 in addition to\n version=0.0.1.\n * [ENHANCEMENT] Remote-read: Add an option to not use external\n labels as selectors for remote read.\n * [ENHANCEMENT] UI: Optimize the alerts page and add a search bar.\n * [ENHANCEMENT] UI: Improve graph colors that were hard to see.\n * [ENHANCEMENT] Config: Allow escaping of $ with $$ when using\n environment variables with external labels.\n * [BUGFIX] PromQL: Properly return an error from\n histogram_quantile when metrics have the same labelset.\n * [BUGFIX] UI: Fix bug that sets the range input to the\n resolution.\n * [BUGFIX] TSDB: Fix a query panic when\n memory-snapshot-on-shutdown is enabled.\n * [BUGFIX] Parser: Specify type in metadata parser errors.\n * [BUGFIX] Scrape: Fix label limit changes not applying.\n- Upgrade to version 2.33.5\n * [BUGFIX] Remote-write: Fix deadlock between adding to queue and\n getting batch.\n- Upgrade to version 2.33.4\n * [BUGFIX] TSDB: Fix panic when m-mapping head chunks onto the\n disk.\n- Upgrade to version 2.33.3\n * [BUGFIX] Azure SD: Fix a regression when public IP Address isn\u0027t\n set.\n- Upgrade to version 2.33.2\n * [BUGFIX] Azure SD: Fix panic when public IP Address isn\u0027t set.\n * [BUGFIX] Remote-write: Fix deadlock when stopping a shard.\n- Upgrade to version 2.33.1\n * [BUGFIX] SD: Fix no such file or directory in K8s SD when not\n running inside K8s.\n- Upgrade to version 2.33.0\n * [CHANGE] PromQL: Promote negative offset and @ modifer to stable\n features.\n * [CHANGE] Web: Promote remote-write-receiver to stable.\n * [FEATURE] Config: Add stripPort template function.\n * [FEATURE] Promtool: Add cardinality analysis to check metrics,\n enabled by flag --extended.\n * [FEATURE] SD: Enable target discovery in own K8s namespace.\n * [FEATURE] SD: Add provider ID label in K8s SD.\n * [FEATURE] Web: Add limit field to the rules API.\n * [ENHANCEMENT] Remote-write: Avoid allocations by buffering\n concrete structs instead of interfaces.\n * [ENHANCEMENT] Remote-write: Log time series details for\n out-of-order samples in remote write receiver.\n * [ENHANCEMENT] Remote-write: Shard up more when backlogged.\n * [ENHANCEMENT] TSDB: Use simpler map key to improve exemplar\n ingest performance.\n * [ENHANCEMENT] TSDB: Avoid allocations when popping from the\n intersected postings heap.\n * [ENHANCEMENT] TSDB: Make chunk writing non-blocking, avoiding\n latency spikes in remote-write.\n * [ENHANCEMENT] TSDB: Improve label matching performance.\n * [ENHANCEMENT] UI: Optimize the service discovery page and add a search bar.\n * [ENHANCEMENT] UI: Optimize the target page and add a search bar.\n * [BUGFIX] Promtool: Make exit codes more consistent.\n * [BUGFIX] Promtool: Fix flakiness of rule testing.\n * [BUGFIX] Remote-write: Update\n prometheus_remote_storage_queue_highest_sent_timestamp_seconds\n metric when write irrecoverably fails.\n * [BUGFIX] Storage: Avoid panic in BufferedSeriesIterator.\n * [BUGFIX] TSDB: CompactBlockMetas should produce correct\n mint/maxt for overlapping blocks.\n * [BUGFIX] TSDB: Fix logging of exemplar storage size.\n * [BUGFIX] UI: Fix overlapping click targets for the alert state\n checkboxes.\n * [BUGFIX] UI: Fix Unhealthy filter on target page to actually\n display only Unhealthy targets.\n * [BUGFIX] UI: Fix autocompletion when expression is empty.\n * [BUGFIX] TSDB: Fix deadlock from simultaneous GC and write.\n- CVE-2022-46146: Fix authentication bypass by updating Prometheus Exporter Toolkit\n to version 0.7.3 (bsc#1208049)\n- CVE-2022-41723: Fix uncontrolled resource consumption by updating Go to version\n 1.20.1 (bsc#1208298)\n\ngolang-github-prometheus-promu:\n\n- Always set user and host build metadata to constant string to\n achieve reproducible builds (compare reproducible-builds.org)\n- Add 0001-do_not_discover_user_host_for_reproducible_builds.patch\n- Require Go \u003e= 1.19 for building\n- Require Go \u003e= 1.18 for building Red Hat packages\n- Update to version 0.14.0 (jsc#PED-3576):\n * Add the ability to override tags per GOOS\n * Remove ioutil\n * Update common Prometheus files (#232) (#224)\n * Validate environment variable value\n * Set build date from SOURCE_DATE_EPOCH\n- Update to Go 1.18\n- Exclude s390 architecture.\n- Set build date from last changelog modification (bsc#1047218)\n- Adapted for Enterprise Linux build.\n- Build requires Go 1.15\n * Make extldflags extensible by configuration. #125\n * Avoid bind-mounting to allow building with a remote docker engine #95\n- Update to 0.2.0\n + Features:\n * Adding changes to support s390x\n * Add option to disable static linking\n * Add support for 32bit MIPS.\n * Added check_licenses Command to Promu\n + Enhancements:\n * Allow to customize nested options via env variables\n * Bump Go version to 1.11\n * Add warning if promu info is unable to determine repo info\n + Bug Fixes:\n * Fix build on SmartOS by not setting gcc\u0027s -static flag\n * Fix git repository url parsing\n- Update to 0.1.0\n- Initial version\n\ngrafana:\n\n- Update to version 9.5.8:\n * Please, check the release notes for further details.\n * Security fixes provided in this and previous versions:\n * CVE-2023-3128: Authentication bypass using Azure AD OAuth (bsc#1212641, jsc#PED-3694)\n * CVE-2023-2801: Prevent crash while executing concurrent mixed queries (bsc#1212099)\n * CVE-2023-2183: Require alert.notifications:write permissions to test receivers and templates (bsc#1212100)\n * CVE-2023-1387: JWT URL-login flow leaks token to data sources through request parameter in proxy \n requests (bsc#1210907, jsc#PED-3694)\n * CVE-2023-1410: Stored XSS in Graphite FunctionDescription tooltip (bsc#1209645)\n * CVE-2020-7753: Regular Expression Denial of Service (ReDoS) in trim function (bsc#1218843)\n * CVE-2021-3807: Regular expressionDdenial of Service (ReDoS) matching ANSI escape codes (bsc#1192154)\n * CVE-2021-3918: Improperly Controlled Modification of Object Prototype Attributes (bsc#1192696)\n * CVE-2021-43138: A malicious user can obtain privileges via the mapValues() method (bsc#1200480)\n * CVE-2022-0155: Exposure of Private Personal Information to an Unauthorized Actor (bsc#1218844)\n * CVE-2022-31107: OAuth account takeover (bsc#1201539)\n * CVE-2022-31097: Stored XSS vulnerability (bsc#1201535)\n * CVE-2023-1410: Fix XSS in Graphite functions tooltip (bsc#1209645)\n * CVE-2023-0507: Apply attribute sanitation to GeomapPanel (bsc#1208821)\n * CVE-2023-0594: Avoid storing XSS in TraceView panel (bsc#1208819)\n * CVE-2022-46146: Fix basic authentication bypass by updating the exporter toolkit to \n version 0.7.3 (bsc#1208065)\n * CVE-2022-41723: Require Go 1.19 or newer (bsc#1208293)\n * CVE-2022-23552: SVG: Add dompurify preprocessor step (bsc#1207749)\n * CVE-2022-39324: Snapshots: Fix originalUrl spoof security issue (bsc#1207750)\n * CVE-2022-39306: Fix for privilege escalation (bsc#1205225)\n * CVE-2022-39307: Omit error from http response when user does not\n exists (bsc#1205227)\n * CVE-2022-39201: Fix do not forward login cookie in outgoing requests (bsc#1204303)\n * CVE-2022-31130: Make proxy endpoints not leak sensitive HTTP headers (bsc#1204305)\n * CVE-2022-31123: Fix plugin signature bypass (bsc#1204302)\n * CVE-2022-39229: Fix blocknig other users from signing in (bsc#1204304)\n * CVE-2022-36062: RBAC folders/dashboards privilege escalation (bsc#1203596, jsc#PED-2145)\n * CVE-2022-35957: Escalation from admin to server admin when auth proxy is used (bsc#1203597, jsc#PED-2145)\n * CVE-2022-31107: OAuth account takeover (bsc#1201539)\n * CVE-2022-31097: Stored XSS vulnerability (bsc#1201535)\n * CVE-2022-29170: Request security bypass via malicious redirect (bsc#1199810)\n * CVE-2022-31097: XSS vulnerability in the Unified Alerting (bsc#1201535)\n * CVE-2022-31107: OAuth account takeover vulnerability (bsc#1201539)\n * CVE-2022-21702: XSS vulnerability in handling data sources (bsc#1195726, jsc#SLE-23439, jsc#SLE-23422, jsc#SLE-24565)\n * CVE-2022-21703: Cross-origin request forgery vulnerability (bsc#1195727)\n * CVE-2022-21713: Insecure Direct Object Reference vulnerability in Teams API (bsc#1195728)\n * CVE-2022-21673: GetUserInfo: return an error if no user was found (bsc#1194873)\n * CVE-2021-43813: Directory traversal vulnerability for .md files (bsc#1193688)\n * CVE-2021-43815: Directory traversal for .csv files (bsc#1193686)\n * CVE-2021-43798: arbitrary file read in the graph native plugin (bsc#1193492)\n * CVE-2021-43798: Arbitrary file read in the graph native plugin (bsc#1193492)\n * CVE-2021-41244: Grafana 8.2.4 released with security fixes (bsc#1192763)\n * Security: Fixes CVE-2021-41174, bsc#1192383.\n * Security: Update dependencies to fix CVE-2021-36222, bsc#1188571.\n\nkiwi-desc-saltboot:\n\n- Update to version 0.1.1687520761.cefb248\n * Add osimage cert package to bootstrap for\n SUSE Linux Enterprise 12 images (bsc#1204089)\n- Update to version 0.1.1673279145.e7616bd\n * Add failsafe stop file when salt-minion does not stop (bsc#1172110)\n- Update to version 0.1.1661440542.6cbe0da\n * Use standard susemanager.conf\n * Use salt bundle\n * Add support fo VirtIO disks\n\nmgr-push:\n\n- Version 5.0.1-1\n * Bump version to 5.0.0\n- Version 4.4.6-1\n * Remove unused makefiles\n- Version 4.4.5-1\n * Use http to connect to localhost server\n * Use bundle CA certificate in rhnpush\n- Version 4.4.4-1\n * remove pylint check at build time\n- Version 4.4.3-1\n * Ensure installation of make for building\n- Version 4.4.2-1\n * Update translation strings\n- Version 4.4.1-1\n * Bump version to 4.4.0\n\nprometheus-blackbox_exporter:\n\n- Use obscpio for go modules service\n- Set version number\n- Set build date from SOURCE_DATE_EPOCH\n- Update to 0.24.0 (bsc#1212279, jsc#PED-4556)\n * Requires go1.19\n- Avoid empty validation script\n- Add rc symlink for backwards compatibility\n- Fix authentication bypass via cache poisoning\n (CVE-2022-46146, bsc#1208062)\n- Add `min_version` parameter of `tls_config` to allow enabling\n TLS 1.0 and 1.1 (bsc#1209113)\n- On SUSE Linux Enterprise build always with Go \u003e= 1.19 (bsc#1203599)\n- Build with go1.18 only for SLE-15-SP3 and \n build with \u003e= go1.19 on higher SP (bsc#1203599)\n- Require go1.18 (bsc#1203599, GH#19127)\n- Exclude s390 arch\n- Fix %pre section to avoid empty content\n- Updated to allow building on older rpmbuild.\n- Enhanced to build on Enterprise Linux 8\n\nprometheus-postgres_exporter:\n\n- Remove duplicated call to systemd requirements\n- Do not build debug if RHEL \u003e= 8\n- Do not strip if SUSE Linux Enterprise 15 SP3\n- Build at least with with Go \u003e= 1.18 on RHEL\n- Build with Go \u003e= 1.20 elsewhere\n- Adapt the systemd service security configuration\n to be able to start it on RHEL systems and clones\n- Create the prometheus user for RHEL systems and clones\n- Add 0001-Update-prometheus-exporter-toolkit-to-0.7.3.patch\n * Fix authentication bypass via cache poisoning\n (CVE-2022-46146, bsc#1208060)\n- Fix _service to pull correct version\n- Use go_modules source service\n- Upgrade to version 0.10.1:\n * Fix broken log-level for values other than debug (bsc#1208965)\n- Version/release lines above first usage of those macros.\n gh#uyuni-project/uyuni#5418\n- Prevent empty %pre section\n- Exclude s390 builds \n- Updated for RHEL8.\n\npython-hwdata:\n\n- Declare the LICENSE file as license and not doc\n\nrhnlib:\n\n- Version 5.0.1-1\n * Specify a packager for Debian like distros\n- Version 4.4.6-1\n * Remove unused makefiles\n- Version 4.4.5-1\n * Use bundle CA certificate in rhnpush\n- Version 4.4.4-1\n * Only use TLSv1+ for SSL connections\n- Version 4.4.3-1\n * Ensure installation of make for building\n- Version 4.4.2-1\n * Don\u0027t get stuck at the end of SSL transfers (bsc#1204032)\n- Version 4.4.1-1\n * Bump version to 4.4.0\n\nspacecmd:\n\n- Version 5.0.1-1\n * Use localhost without ssl when running on the server\n- Version 4.4.10-1\n * Update translation strings\n- Version 4.4.9-1\n- Version 4.4.8-1\n * Add spacecmd function: cryptokey_update\n * Bypass traditional systems check on older SUMA instances (bsc#1208612)\n * fix argument parsing of distribution_update (bsc#1210458)\n- Version 4.4.7-1\n * remove pylint check at build time\n * Display activation key details after executing the corresponding command (bsc#1208719)\n * Show targetted packages before actually removing them (bsc#1207830)\n- Version 4.4.6-1\n * Fix spacecmd not showing any output for softwarechannel_diff \n and softwarechannel_errata_diff (bsc#1207352)\n- Version 4.4.5-1\n * Prevent string api parameters to be parsed as dates if not in\n ISO-8601 format (bsc#1205759)\n * Add python-dateutil dependency, required to process date values in\n spacecmd api calls\n * Remove python3-simplejson dependency\n- Version 4.4.4-1\n * Correctly understand \u0027ssm\u0027 keyword on scap scheduling\n * Add vendor_advisory information to errata_details call (bsc#1205207)\n * Change default port of \u0027Containerized Proxy configuration\u0027 8022\n- Version 4.4.3-1\n * Added two missing options to schedule product migration: allow-vendor-change\n and remove-products-without-successor (bsc#1204126)\n * Changed schedule product migration to use the correct API method\n * Fix dict_keys not supporting indexing in systems_setconfigchannelorger\n * Added a warning message for traditional stack deprecation\n * Remove \u0027Undefined return code\u0027 from debug messages (bsc#1203283)\n- Version 4.4.2-1\n * Stop always showing help for valid proxy_container_config calls\n- Version 4.4.1-1\n * Process date values in spacecmd api calls (bsc#1198903)\n * Improve Proxy FQDN hint message\n- Version 4.3.14-1\n * Fix missing argument on system_listmigrationtargets (bsc#1201003)\n * Show correct help on calling kickstart_importjson with no arguments\n * Fix tracebacks on spacecmd kickstart_export (bsc#1200591)\n * Change proxy container config default filename to end with tar.gz\n- Version 4.3.13-1\n * Update translation strings\n- Version 4.3.12-1\n * Update translation strings\n- Version 4.3.11-1\n * on full system update call schedulePackageUpdate API (bsc#1197507)\n\nspacewalk-client-tools:\n\n- Version 5.0.1-1\n * Bump version to 5.0.0\n- Version 4.4.7-1\n * Remove unused and deprecated/removed platform.dist import.\n- Version 4.4.6-1\n * Update translation strings\n * Tito requires to list the package source as %{name}-%{version}.tar.gz\n- Version 4.4.5-1\n * remove mgr-virtualization usage\n * remove dependency to suseRegisterInfo\n- Version 4.4.4-1\n * Update translation strings\n- Version 4.4.3-1\n * Update translation strings\n- Version 4.4.2-1\n * Update translation strings\n- Version 4.4.1-1\n * Update translation strings\n- Version 4.3.11-1\n * Update translation strings\n- Version 4.3.10-1\n\nsupportutils-plugin-salt:\n\n- Update to version 1.2.2\n * Remove possible passwords from Salt configuration files (bsc#1201059)\n- Update to version 1.2.1\n * Remove ERROR messages on Salt client systems\n- Declare the LICENSE file as license and not doc\n- Update to version 1.2.0\n * Add support for Salt Bundle\n\nsupportutils-plugin-susemanager-client:\n\n- Version 5.0.1-1\n * Bump version to 5.0.0\n- Version 4.4.2-1\n * write configured crypto-policy in supportconfig\n * add cloud and payg checks\n- Version 4.4.1-1\n * Bump version to 4.4.0\n- Version 4.3.2-1\n * Add proxy containers config and logs\n\nuyuni-common-libs:\n\n- Version 5.0.1-1\n * Bump version to 5.0.0\n- Version 4.4.4-1\n * Workaround for python3-debian bug about collecting control file (bsc#1211525, bsc#1208692)\n * Accept missing rhn.conf file\n * Use context manager for apache users in fileutils.py.\n- Version 4.4.3-1\n * Ensure installation of make for building.\n * Use versioned Python during packaging.\n- Version 4.4.2-1\n * unify user notification code on java side\n- Version 4.4.1-1\n * Do not allow creating path if nonexistent user or group in fileutils.\n- Version 4.3.5-1\n * Fix reposync issue about \u0027rpm.hdr\u0027 object has no attribute \u0027get\u0027\n\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2024-191,SUSE-SLE-Manager-Tools-12-BETA-2024-191",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2024_0191-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2024:0191-1",
"url": "https://www.suse.com/support/update/announcement/2024/suse-su-20240191-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2024:0191-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-January/017744.html"
},
{
"category": "self",
"summary": "SUSE Bug 1047218",
"url": "https://bugzilla.suse.com/1047218"
},
{
"category": "self",
"summary": "SUSE Bug 1172110",
"url": "https://bugzilla.suse.com/1172110"
},
{
"category": "self",
"summary": "SUSE Bug 1188571",
"url": "https://bugzilla.suse.com/1188571"
},
{
"category": "self",
"summary": "SUSE Bug 1189520",
"url": "https://bugzilla.suse.com/1189520"
},
{
"category": "self",
"summary": "SUSE Bug 1191454",
"url": "https://bugzilla.suse.com/1191454"
},
{
"category": "self",
"summary": "SUSE Bug 1192154",
"url": "https://bugzilla.suse.com/1192154"
},
{
"category": "self",
"summary": "SUSE Bug 1192383",
"url": "https://bugzilla.suse.com/1192383"
},
{
"category": "self",
"summary": "SUSE Bug 1192696",
"url": "https://bugzilla.suse.com/1192696"
},
{
"category": "self",
"summary": "SUSE Bug 1192763",
"url": "https://bugzilla.suse.com/1192763"
},
{
"category": "self",
"summary": "SUSE Bug 1193492",
"url": "https://bugzilla.suse.com/1193492"
},
{
"category": "self",
"summary": "SUSE Bug 1193686",
"url": "https://bugzilla.suse.com/1193686"
},
{
"category": "self",
"summary": "SUSE Bug 1193688",
"url": "https://bugzilla.suse.com/1193688"
},
{
"category": "self",
"summary": "SUSE Bug 1194873",
"url": "https://bugzilla.suse.com/1194873"
},
{
"category": "self",
"summary": "SUSE Bug 1195726",
"url": "https://bugzilla.suse.com/1195726"
},
{
"category": "self",
"summary": "SUSE Bug 1195727",
"url": "https://bugzilla.suse.com/1195727"
},
{
"category": "self",
"summary": "SUSE Bug 1195728",
"url": "https://bugzilla.suse.com/1195728"
},
{
"category": "self",
"summary": "SUSE Bug 1196338",
"url": "https://bugzilla.suse.com/1196338"
},
{
"category": "self",
"summary": "SUSE Bug 1196652",
"url": "https://bugzilla.suse.com/1196652"
},
{
"category": "self",
"summary": "SUSE Bug 1197507",
"url": "https://bugzilla.suse.com/1197507"
},
{
"category": "self",
"summary": "SUSE Bug 1198903",
"url": "https://bugzilla.suse.com/1198903"
},
{
"category": "self",
"summary": "SUSE Bug 1199810",
"url": "https://bugzilla.suse.com/1199810"
},
{
"category": "self",
"summary": "SUSE Bug 1200480",
"url": "https://bugzilla.suse.com/1200480"
},
{
"category": "self",
"summary": "SUSE Bug 1200591",
"url": "https://bugzilla.suse.com/1200591"
},
{
"category": "self",
"summary": "SUSE Bug 1200725",
"url": "https://bugzilla.suse.com/1200725"
},
{
"category": "self",
"summary": "SUSE Bug 1201003",
"url": "https://bugzilla.suse.com/1201003"
},
{
"category": "self",
"summary": "SUSE Bug 1201059",
"url": "https://bugzilla.suse.com/1201059"
},
{
"category": "self",
"summary": "SUSE Bug 1201535",
"url": "https://bugzilla.suse.com/1201535"
},
{
"category": "self",
"summary": "SUSE Bug 1201539",
"url": "https://bugzilla.suse.com/1201539"
},
{
"category": "self",
"summary": "SUSE Bug 1203283",
"url": "https://bugzilla.suse.com/1203283"
},
{
"category": "self",
"summary": "SUSE Bug 1203596",
"url": "https://bugzilla.suse.com/1203596"
},
{
"category": "self",
"summary": "SUSE Bug 1203597",
"url": "https://bugzilla.suse.com/1203597"
},
{
"category": "self",
"summary": "SUSE Bug 1203599",
"url": "https://bugzilla.suse.com/1203599"
},
{
"category": "self",
"summary": "SUSE Bug 1204032",
"url": "https://bugzilla.suse.com/1204032"
},
{
"category": "self",
"summary": "SUSE Bug 1204089",
"url": "https://bugzilla.suse.com/1204089"
},
{
"category": "self",
"summary": "SUSE Bug 1204126",
"url": "https://bugzilla.suse.com/1204126"
},
{
"category": "self",
"summary": "SUSE Bug 1204302",
"url": "https://bugzilla.suse.com/1204302"
},
{
"category": "self",
"summary": "SUSE Bug 1204303",
"url": "https://bugzilla.suse.com/1204303"
},
{
"category": "self",
"summary": "SUSE Bug 1204304",
"url": "https://bugzilla.suse.com/1204304"
},
{
"category": "self",
"summary": "SUSE Bug 1204305",
"url": "https://bugzilla.suse.com/1204305"
},
{
"category": "self",
"summary": "SUSE Bug 1204501",
"url": "https://bugzilla.suse.com/1204501"
},
{
"category": "self",
"summary": "SUSE Bug 1205207",
"url": "https://bugzilla.suse.com/1205207"
},
{
"category": "self",
"summary": "SUSE Bug 1205225",
"url": "https://bugzilla.suse.com/1205225"
},
{
"category": "self",
"summary": "SUSE Bug 1205227",
"url": "https://bugzilla.suse.com/1205227"
},
{
"category": "self",
"summary": "SUSE Bug 1205759",
"url": "https://bugzilla.suse.com/1205759"
},
{
"category": "self",
"summary": "SUSE Bug 1207352",
"url": "https://bugzilla.suse.com/1207352"
},
{
"category": "self",
"summary": "SUSE Bug 1207749",
"url": "https://bugzilla.suse.com/1207749"
},
{
"category": "self",
"summary": "SUSE Bug 1207750",
"url": "https://bugzilla.suse.com/1207750"
},
{
"category": "self",
"summary": "SUSE Bug 1207830",
"url": "https://bugzilla.suse.com/1207830"
},
{
"category": "self",
"summary": "SUSE Bug 1208046",
"url": "https://bugzilla.suse.com/1208046"
},
{
"category": "self",
"summary": "SUSE Bug 1208049",
"url": "https://bugzilla.suse.com/1208049"
},
{
"category": "self",
"summary": "SUSE Bug 1208051",
"url": "https://bugzilla.suse.com/1208051"
},
{
"category": "self",
"summary": "SUSE Bug 1208060",
"url": "https://bugzilla.suse.com/1208060"
},
{
"category": "self",
"summary": "SUSE Bug 1208062",
"url": "https://bugzilla.suse.com/1208062"
},
{
"category": "self",
"summary": "SUSE Bug 1208064",
"url": "https://bugzilla.suse.com/1208064"
},
{
"category": "self",
"summary": "SUSE Bug 1208065",
"url": "https://bugzilla.suse.com/1208065"
},
{
"category": "self",
"summary": "SUSE Bug 1208270",
"url": "https://bugzilla.suse.com/1208270"
},
{
"category": "self",
"summary": "SUSE Bug 1208293",
"url": "https://bugzilla.suse.com/1208293"
},
{
"category": "self",
"summary": "SUSE Bug 1208298",
"url": "https://bugzilla.suse.com/1208298"
},
{
"category": "self",
"summary": "SUSE Bug 1208612",
"url": "https://bugzilla.suse.com/1208612"
},
{
"category": "self",
"summary": "SUSE Bug 1208692",
"url": "https://bugzilla.suse.com/1208692"
},
{
"category": "self",
"summary": "SUSE Bug 1208719",
"url": "https://bugzilla.suse.com/1208719"
},
{
"category": "self",
"summary": "SUSE Bug 1208819",
"url": "https://bugzilla.suse.com/1208819"
},
{
"category": "self",
"summary": "SUSE Bug 1208821",
"url": "https://bugzilla.suse.com/1208821"
},
{
"category": "self",
"summary": "SUSE Bug 1208965",
"url": "https://bugzilla.suse.com/1208965"
},
{
"category": "self",
"summary": "SUSE Bug 1209113",
"url": "https://bugzilla.suse.com/1209113"
},
{
"category": "self",
"summary": "SUSE Bug 1209645",
"url": "https://bugzilla.suse.com/1209645"
},
{
"category": "self",
"summary": "SUSE Bug 1210458",
"url": "https://bugzilla.suse.com/1210458"
},
{
"category": "self",
"summary": "SUSE Bug 1210907",
"url": "https://bugzilla.suse.com/1210907"
},
{
"category": "self",
"summary": "SUSE Bug 1211525",
"url": "https://bugzilla.suse.com/1211525"
},
{
"category": "self",
"summary": "SUSE Bug 1212099",
"url": "https://bugzilla.suse.com/1212099"
},
{
"category": "self",
"summary": "SUSE Bug 1212100",
"url": "https://bugzilla.suse.com/1212100"
},
{
"category": "self",
"summary": "SUSE Bug 1212279",
"url": "https://bugzilla.suse.com/1212279"
},
{
"category": "self",
"summary": "SUSE Bug 1212641",
"url": "https://bugzilla.suse.com/1212641"
},
{
"category": "self",
"summary": "SUSE Bug 1218843",
"url": "https://bugzilla.suse.com/1218843"
},
{
"category": "self",
"summary": "SUSE Bug 1218844",
"url": "https://bugzilla.suse.com/1218844"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-7753 page",
"url": "https://www.suse.com/security/cve/CVE-2020-7753/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-36222 page",
"url": "https://www.suse.com/security/cve/CVE-2021-36222/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-3711 page",
"url": "https://www.suse.com/security/cve/CVE-2021-3711/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-3807 page",
"url": "https://www.suse.com/security/cve/CVE-2021-3807/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-3918 page",
"url": "https://www.suse.com/security/cve/CVE-2021-3918/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-39226 page",
"url": "https://www.suse.com/security/cve/CVE-2021-39226/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-41174 page",
"url": "https://www.suse.com/security/cve/CVE-2021-41174/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-41244 page",
"url": "https://www.suse.com/security/cve/CVE-2021-41244/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-43138 page",
"url": "https://www.suse.com/security/cve/CVE-2021-43138/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-43798 page",
"url": "https://www.suse.com/security/cve/CVE-2021-43798/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-43813 page",
"url": "https://www.suse.com/security/cve/CVE-2021-43813/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-43815 page",
"url": "https://www.suse.com/security/cve/CVE-2021-43815/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-0155 page",
"url": "https://www.suse.com/security/cve/CVE-2022-0155/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-21673 page",
"url": "https://www.suse.com/security/cve/CVE-2022-21673/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-21698 page",
"url": "https://www.suse.com/security/cve/CVE-2022-21698/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-21702 page",
"url": "https://www.suse.com/security/cve/CVE-2022-21702/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-21703 page",
"url": "https://www.suse.com/security/cve/CVE-2022-21703/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-21713 page",
"url": "https://www.suse.com/security/cve/CVE-2022-21713/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-23552 page",
"url": "https://www.suse.com/security/cve/CVE-2022-23552/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-27191 page",
"url": "https://www.suse.com/security/cve/CVE-2022-27191/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-27664 page",
"url": "https://www.suse.com/security/cve/CVE-2022-27664/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-29170 page",
"url": "https://www.suse.com/security/cve/CVE-2022-29170/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-31097 page",
"url": "https://www.suse.com/security/cve/CVE-2022-31097/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-31107 page",
"url": "https://www.suse.com/security/cve/CVE-2022-31107/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-31123 page",
"url": "https://www.suse.com/security/cve/CVE-2022-31123/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-31130 page",
"url": "https://www.suse.com/security/cve/CVE-2022-31130/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-32149 page",
"url": "https://www.suse.com/security/cve/CVE-2022-32149/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-35957 page",
"url": "https://www.suse.com/security/cve/CVE-2022-35957/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-36062 page",
"url": "https://www.suse.com/security/cve/CVE-2022-36062/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-39201 page",
"url": "https://www.suse.com/security/cve/CVE-2022-39201/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-39229 page",
"url": "https://www.suse.com/security/cve/CVE-2022-39229/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-39306 page",
"url": "https://www.suse.com/security/cve/CVE-2022-39306/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-39307 page",
"url": "https://www.suse.com/security/cve/CVE-2022-39307/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-39324 page",
"url": "https://www.suse.com/security/cve/CVE-2022-39324/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-41715 page",
"url": "https://www.suse.com/security/cve/CVE-2022-41715/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-41723 page",
"url": "https://www.suse.com/security/cve/CVE-2022-41723/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-46146 page",
"url": "https://www.suse.com/security/cve/CVE-2022-46146/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-0507 page",
"url": "https://www.suse.com/security/cve/CVE-2023-0507/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-0594 page",
"url": "https://www.suse.com/security/cve/CVE-2023-0594/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-1387 page",
"url": "https://www.suse.com/security/cve/CVE-2023-1387/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-1410 page",
"url": "https://www.suse.com/security/cve/CVE-2023-1410/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-2183 page",
"url": "https://www.suse.com/security/cve/CVE-2023-2183/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-2801 page",
"url": "https://www.suse.com/security/cve/CVE-2023-2801/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-3128 page",
"url": "https://www.suse.com/security/cve/CVE-2023-3128/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-40577 page",
"url": "https://www.suse.com/security/cve/CVE-2023-40577/"
}
],
"title": "Security Beta update for SUSE Manager Client Tools",
"tracking": {
"current_release_date": "2024-01-23T15:18:14Z",
"generator": {
"date": "2024-01-23T15:18:14Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2024:0191-1",
"initial_release_date": "2024-01-23T15:18:14Z",
"revision_history": [
{
"date": "2024-01-23T15:18:14Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.aarch64",
"product": {
"name": "golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.aarch64",
"product_id": "golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.aarch64"
}
},
{
"category": "product_version",
"name": "golang-github-boynux-squid_exporter-1.6-4.9.2.aarch64",
"product": {
"name": "golang-github-boynux-squid_exporter-1.6-4.9.2.aarch64",
"product_id": "golang-github-boynux-squid_exporter-1.6-4.9.2.aarch64"
}
},
{
"category": "product_version",
"name": "golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.aarch64",
"product": {
"name": "golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.aarch64",
"product_id": "golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.aarch64"
}
},
{
"category": "product_version",
"name": "golang-github-prometheus-alertmanager-0.26.0-4.12.4.aarch64",
"product": {
"name": "golang-github-prometheus-alertmanager-0.26.0-4.12.4.aarch64",
"product_id": "golang-github-prometheus-alertmanager-0.26.0-4.12.4.aarch64"
}
},
{
"category": "product_version",
"name": "golang-github-prometheus-node_exporter-1.5.0-4.15.4.aarch64",
"product": {
"name": "golang-github-prometheus-node_exporter-1.5.0-4.15.4.aarch64",
"product_id": "golang-github-prometheus-node_exporter-1.5.0-4.15.4.aarch64"
}
},
{
"category": "product_version",
"name": "golang-github-prometheus-prometheus-2.45.0-4.33.3.aarch64",
"product": {
"name": "golang-github-prometheus-prometheus-2.45.0-4.33.3.aarch64",
"product_id": "golang-github-prometheus-prometheus-2.45.0-4.33.3.aarch64"
}
},
{
"category": "product_version",
"name": "golang-github-prometheus-promu-0.14.0-4.12.2.aarch64",
"product": {
"name": "golang-github-prometheus-promu-0.14.0-4.12.2.aarch64",
"product_id": "golang-github-prometheus-promu-0.14.0-4.12.2.aarch64"
}
},
{
"category": "product_version",
"name": "grafana-9.5.8-4.21.2.aarch64",
"product": {
"name": "grafana-9.5.8-4.21.2.aarch64",
"product_id": "grafana-9.5.8-4.21.2.aarch64"
}
},
{
"category": "product_version",
"name": "prometheus-blackbox_exporter-0.24.0-3.6.3.aarch64",
"product": {
"name": "prometheus-blackbox_exporter-0.24.0-3.6.3.aarch64",
"product_id": "prometheus-blackbox_exporter-0.24.0-3.6.3.aarch64"
}
},
{
"category": "product_version",
"name": "prometheus-postgres_exporter-0.10.1-3.6.4.aarch64",
"product": {
"name": "prometheus-postgres_exporter-0.10.1-3.6.4.aarch64",
"product_id": "prometheus-postgres_exporter-0.10.1-3.6.4.aarch64"
}
},
{
"category": "product_version",
"name": "python2-uyuni-common-libs-5.0.1-3.33.3.aarch64",
"product": {
"name": "python2-uyuni-common-libs-5.0.1-3.33.3.aarch64",
"product_id": "python2-uyuni-common-libs-5.0.1-3.33.3.aarch64"
}
},
{
"category": "product_version",
"name": "uyuni-base-common-5.0.1-3.18.2.aarch64",
"product": {
"name": "uyuni-base-common-5.0.1-3.18.2.aarch64",
"product_id": "uyuni-base-common-5.0.1-3.18.2.aarch64"
}
},
{
"category": "product_version",
"name": "uyuni-base-proxy-5.0.1-3.18.2.aarch64",
"product": {
"name": "uyuni-base-proxy-5.0.1-3.18.2.aarch64",
"product_id": "uyuni-base-proxy-5.0.1-3.18.2.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "kiwi-desc-saltboot-0.1.1687520761.cefb248-4.15.2.noarch",
"product": {
"name": "kiwi-desc-saltboot-0.1.1687520761.cefb248-4.15.2.noarch",
"product_id": "kiwi-desc-saltboot-0.1.1687520761.cefb248-4.15.2.noarch"
}
},
{
"category": "product_version",
"name": "mgr-push-5.0.1-4.21.4.noarch",
"product": {
"name": "mgr-push-5.0.1-4.21.4.noarch",
"product_id": "mgr-push-5.0.1-4.21.4.noarch"
}
},
{
"category": "product_version",
"name": "python2-hwdata-2.3.5-15.12.2.noarch",
"product": {
"name": "python2-hwdata-2.3.5-15.12.2.noarch",
"product_id": "python2-hwdata-2.3.5-15.12.2.noarch"
}
},
{
"category": "product_version",
"name": "python2-mgr-push-5.0.1-4.21.4.noarch",
"product": {
"name": "python2-mgr-push-5.0.1-4.21.4.noarch",
"product_id": "python2-mgr-push-5.0.1-4.21.4.noarch"
}
},
{
"category": "product_version",
"name": "python2-rhnlib-5.0.1-24.30.3.noarch",
"product": {
"name": "python2-rhnlib-5.0.1-24.30.3.noarch",
"product_id": "python2-rhnlib-5.0.1-24.30.3.noarch"
}
},
{
"category": "product_version",
"name": "spacecmd-5.0.1-41.42.3.noarch",
"product": {
"name": "spacecmd-5.0.1-41.42.3.noarch",
"product_id": "spacecmd-5.0.1-41.42.3.noarch"
}
},
{
"category": "product_version",
"name": "supportutils-plugin-salt-1.2.2-9.9.2.noarch",
"product": {
"name": "supportutils-plugin-salt-1.2.2-9.9.2.noarch",
"product_id": "supportutils-plugin-salt-1.2.2-9.9.2.noarch"
}
},
{
"category": "product_version",
"name": "supportutils-plugin-susemanager-client-5.0.1-9.15.2.noarch",
"product": {
"name": "supportutils-plugin-susemanager-client-5.0.1-9.15.2.noarch",
"product_id": "supportutils-plugin-susemanager-client-5.0.1-9.15.2.noarch"
}
},
{
"category": "product_version",
"name": "system-user-grafana-1.0.0-3.7.2.noarch",
"product": {
"name": "system-user-grafana-1.0.0-3.7.2.noarch",
"product_id": "system-user-grafana-1.0.0-3.7.2.noarch"
}
},
{
"category": "product_version",
"name": "system-user-prometheus-1.0.0-3.7.2.noarch",
"product": {
"name": "system-user-prometheus-1.0.0-3.7.2.noarch",
"product_id": "system-user-prometheus-1.0.0-3.7.2.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.ppc64le",
"product": {
"name": "golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.ppc64le",
"product_id": "golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.ppc64le"
}
},
{
"category": "product_version",
"name": "golang-github-boynux-squid_exporter-1.6-4.9.2.ppc64le",
"product": {
"name": "golang-github-boynux-squid_exporter-1.6-4.9.2.ppc64le",
"product_id": "golang-github-boynux-squid_exporter-1.6-4.9.2.ppc64le"
}
},
{
"category": "product_version",
"name": "golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.ppc64le",
"product": {
"name": "golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.ppc64le",
"product_id": "golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.ppc64le"
}
},
{
"category": "product_version",
"name": "golang-github-prometheus-alertmanager-0.26.0-4.12.4.ppc64le",
"product": {
"name": "golang-github-prometheus-alertmanager-0.26.0-4.12.4.ppc64le",
"product_id": "golang-github-prometheus-alertmanager-0.26.0-4.12.4.ppc64le"
}
},
{
"category": "product_version",
"name": "golang-github-prometheus-node_exporter-1.5.0-4.15.4.ppc64le",
"product": {
"name": "golang-github-prometheus-node_exporter-1.5.0-4.15.4.ppc64le",
"product_id": "golang-github-prometheus-node_exporter-1.5.0-4.15.4.ppc64le"
}
},
{
"category": "product_version",
"name": "golang-github-prometheus-prometheus-2.45.0-4.33.3.ppc64le",
"product": {
"name": "golang-github-prometheus-prometheus-2.45.0-4.33.3.ppc64le",
"product_id": "golang-github-prometheus-prometheus-2.45.0-4.33.3.ppc64le"
}
},
{
"category": "product_version",
"name": "golang-github-prometheus-promu-0.14.0-4.12.2.ppc64le",
"product": {
"name": "golang-github-prometheus-promu-0.14.0-4.12.2.ppc64le",
"product_id": "golang-github-prometheus-promu-0.14.0-4.12.2.ppc64le"
}
},
{
"category": "product_version",
"name": "grafana-9.5.8-4.21.2.ppc64le",
"product": {
"name": "grafana-9.5.8-4.21.2.ppc64le",
"product_id": "grafana-9.5.8-4.21.2.ppc64le"
}
},
{
"category": "product_version",
"name": "prometheus-blackbox_exporter-0.24.0-3.6.3.ppc64le",
"product": {
"name": "prometheus-blackbox_exporter-0.24.0-3.6.3.ppc64le",
"product_id": "prometheus-blackbox_exporter-0.24.0-3.6.3.ppc64le"
}
},
{
"category": "product_version",
"name": "prometheus-postgres_exporter-0.10.1-3.6.4.ppc64le",
"product": {
"name": "prometheus-postgres_exporter-0.10.1-3.6.4.ppc64le",
"product_id": "prometheus-postgres_exporter-0.10.1-3.6.4.ppc64le"
}
},
{
"category": "product_version",
"name": "python2-uyuni-common-libs-5.0.1-3.33.3.ppc64le",
"product": {
"name": "python2-uyuni-common-libs-5.0.1-3.33.3.ppc64le",
"product_id": "python2-uyuni-common-libs-5.0.1-3.33.3.ppc64le"
}
},
{
"category": "product_version",
"name": "uyuni-base-common-5.0.1-3.18.2.ppc64le",
"product": {
"name": "uyuni-base-common-5.0.1-3.18.2.ppc64le",
"product_id": "uyuni-base-common-5.0.1-3.18.2.ppc64le"
}
},
{
"category": "product_version",
"name": "uyuni-base-proxy-5.0.1-3.18.2.ppc64le",
"product": {
"name": "uyuni-base-proxy-5.0.1-3.18.2.ppc64le",
"product_id": "uyuni-base-proxy-5.0.1-3.18.2.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.s390x",
"product": {
"name": "golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.s390x",
"product_id": "golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.s390x"
}
},
{
"category": "product_version",
"name": "golang-github-boynux-squid_exporter-1.6-4.9.2.s390x",
"product": {
"name": "golang-github-boynux-squid_exporter-1.6-4.9.2.s390x",
"product_id": "golang-github-boynux-squid_exporter-1.6-4.9.2.s390x"
}
},
{
"category": "product_version",
"name": "golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.s390x",
"product": {
"name": "golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.s390x",
"product_id": "golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.s390x"
}
},
{
"category": "product_version",
"name": "golang-github-prometheus-alertmanager-0.26.0-4.12.4.s390x",
"product": {
"name": "golang-github-prometheus-alertmanager-0.26.0-4.12.4.s390x",
"product_id": "golang-github-prometheus-alertmanager-0.26.0-4.12.4.s390x"
}
},
{
"category": "product_version",
"name": "golang-github-prometheus-node_exporter-1.5.0-4.15.4.s390x",
"product": {
"name": "golang-github-prometheus-node_exporter-1.5.0-4.15.4.s390x",
"product_id": "golang-github-prometheus-node_exporter-1.5.0-4.15.4.s390x"
}
},
{
"category": "product_version",
"name": "golang-github-prometheus-prometheus-2.45.0-4.33.3.s390x",
"product": {
"name": "golang-github-prometheus-prometheus-2.45.0-4.33.3.s390x",
"product_id": "golang-github-prometheus-prometheus-2.45.0-4.33.3.s390x"
}
},
{
"category": "product_version",
"name": "golang-github-prometheus-promu-0.14.0-4.12.2.s390x",
"product": {
"name": "golang-github-prometheus-promu-0.14.0-4.12.2.s390x",
"product_id": "golang-github-prometheus-promu-0.14.0-4.12.2.s390x"
}
},
{
"category": "product_version",
"name": "grafana-9.5.8-4.21.2.s390x",
"product": {
"name": "grafana-9.5.8-4.21.2.s390x",
"product_id": "grafana-9.5.8-4.21.2.s390x"
}
},
{
"category": "product_version",
"name": "prometheus-blackbox_exporter-0.24.0-3.6.3.s390x",
"product": {
"name": "prometheus-blackbox_exporter-0.24.0-3.6.3.s390x",
"product_id": "prometheus-blackbox_exporter-0.24.0-3.6.3.s390x"
}
},
{
"category": "product_version",
"name": "prometheus-postgres_exporter-0.10.1-3.6.4.s390x",
"product": {
"name": "prometheus-postgres_exporter-0.10.1-3.6.4.s390x",
"product_id": "prometheus-postgres_exporter-0.10.1-3.6.4.s390x"
}
},
{
"category": "product_version",
"name": "python2-uyuni-common-libs-5.0.1-3.33.3.s390x",
"product": {
"name": "python2-uyuni-common-libs-5.0.1-3.33.3.s390x",
"product_id": "python2-uyuni-common-libs-5.0.1-3.33.3.s390x"
}
},
{
"category": "product_version",
"name": "uyuni-base-common-5.0.1-3.18.2.s390x",
"product": {
"name": "uyuni-base-common-5.0.1-3.18.2.s390x",
"product_id": "uyuni-base-common-5.0.1-3.18.2.s390x"
}
},
{
"category": "product_version",
"name": "uyuni-base-proxy-5.0.1-3.18.2.s390x",
"product": {
"name": "uyuni-base-proxy-5.0.1-3.18.2.s390x",
"product_id": "uyuni-base-proxy-5.0.1-3.18.2.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.x86_64",
"product": {
"name": "golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.x86_64",
"product_id": "golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.x86_64"
}
},
{
"category": "product_version",
"name": "golang-github-boynux-squid_exporter-1.6-4.9.2.x86_64",
"product": {
"name": "golang-github-boynux-squid_exporter-1.6-4.9.2.x86_64",
"product_id": "golang-github-boynux-squid_exporter-1.6-4.9.2.x86_64"
}
},
{
"category": "product_version",
"name": "golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.x86_64",
"product": {
"name": "golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.x86_64",
"product_id": "golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.x86_64"
}
},
{
"category": "product_version",
"name": "golang-github-prometheus-alertmanager-0.26.0-4.12.4.x86_64",
"product": {
"name": "golang-github-prometheus-alertmanager-0.26.0-4.12.4.x86_64",
"product_id": "golang-github-prometheus-alertmanager-0.26.0-4.12.4.x86_64"
}
},
{
"category": "product_version",
"name": "golang-github-prometheus-node_exporter-1.5.0-4.15.4.x86_64",
"product": {
"name": "golang-github-prometheus-node_exporter-1.5.0-4.15.4.x86_64",
"product_id": "golang-github-prometheus-node_exporter-1.5.0-4.15.4.x86_64"
}
},
{
"category": "product_version",
"name": "golang-github-prometheus-prometheus-2.45.0-4.33.3.x86_64",
"product": {
"name": "golang-github-prometheus-prometheus-2.45.0-4.33.3.x86_64",
"product_id": "golang-github-prometheus-prometheus-2.45.0-4.33.3.x86_64"
}
},
{
"category": "product_version",
"name": "golang-github-prometheus-promu-0.14.0-4.12.2.x86_64",
"product": {
"name": "golang-github-prometheus-promu-0.14.0-4.12.2.x86_64",
"product_id": "golang-github-prometheus-promu-0.14.0-4.12.2.x86_64"
}
},
{
"category": "product_version",
"name": "grafana-9.5.8-4.21.2.x86_64",
"product": {
"name": "grafana-9.5.8-4.21.2.x86_64",
"product_id": "grafana-9.5.8-4.21.2.x86_64"
}
},
{
"category": "product_version",
"name": "prometheus-blackbox_exporter-0.24.0-3.6.3.x86_64",
"product": {
"name": "prometheus-blackbox_exporter-0.24.0-3.6.3.x86_64",
"product_id": "prometheus-blackbox_exporter-0.24.0-3.6.3.x86_64"
}
},
{
"category": "product_version",
"name": "prometheus-postgres_exporter-0.10.1-3.6.4.x86_64",
"product": {
"name": "prometheus-postgres_exporter-0.10.1-3.6.4.x86_64",
"product_id": "prometheus-postgres_exporter-0.10.1-3.6.4.x86_64"
}
},
{
"category": "product_version",
"name": "python2-uyuni-common-libs-5.0.1-3.33.3.x86_64",
"product": {
"name": "python2-uyuni-common-libs-5.0.1-3.33.3.x86_64",
"product_id": "python2-uyuni-common-libs-5.0.1-3.33.3.x86_64"
}
},
{
"category": "product_version",
"name": "uyuni-base-common-5.0.1-3.18.2.x86_64",
"product": {
"name": "uyuni-base-common-5.0.1-3.18.2.x86_64",
"product_id": "uyuni-base-common-5.0.1-3.18.2.x86_64"
}
},
{
"category": "product_version",
"name": "uyuni-base-proxy-5.0.1-3.18.2.x86_64",
"product": {
"name": "uyuni-base-proxy-5.0.1-3.18.2.x86_64",
"product_id": "uyuni-base-proxy-5.0.1-3.18.2.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Manager Client Tools 12-BETA",
"product": {
"name": "SUSE Manager Client Tools 12-BETA",
"product_id": "SUSE Manager Client Tools 12-BETA"
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.aarch64 as component of SUSE Manager Client Tools 12-BETA",
"product_id": "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.aarch64"
},
"product_reference": "golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.aarch64",
"relates_to_product_reference": "SUSE Manager Client Tools 12-BETA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.ppc64le as component of SUSE Manager Client Tools 12-BETA",
"product_id": "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.ppc64le"
},
"product_reference": "golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.ppc64le",
"relates_to_product_reference": "SUSE Manager Client Tools 12-BETA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.s390x as component of SUSE Manager Client Tools 12-BETA",
"product_id": "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.s390x"
},
"product_reference": "golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.s390x",
"relates_to_product_reference": "SUSE Manager Client Tools 12-BETA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.x86_64 as component of SUSE Manager Client Tools 12-BETA",
"product_id": "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.x86_64"
},
"product_reference": "golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.x86_64",
"relates_to_product_reference": "SUSE Manager Client Tools 12-BETA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-github-boynux-squid_exporter-1.6-4.9.2.aarch64 as component of SUSE Manager Client Tools 12-BETA",
"product_id": "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.aarch64"
},
"product_reference": "golang-github-boynux-squid_exporter-1.6-4.9.2.aarch64",
"relates_to_product_reference": "SUSE Manager Client Tools 12-BETA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-github-boynux-squid_exporter-1.6-4.9.2.ppc64le as component of SUSE Manager Client Tools 12-BETA",
"product_id": "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.ppc64le"
},
"product_reference": "golang-github-boynux-squid_exporter-1.6-4.9.2.ppc64le",
"relates_to_product_reference": "SUSE Manager Client Tools 12-BETA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-github-boynux-squid_exporter-1.6-4.9.2.s390x as component of SUSE Manager Client Tools 12-BETA",
"product_id": "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.s390x"
},
"product_reference": "golang-github-boynux-squid_exporter-1.6-4.9.2.s390x",
"relates_to_product_reference": "SUSE Manager Client Tools 12-BETA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-github-boynux-squid_exporter-1.6-4.9.2.x86_64 as component of SUSE Manager Client Tools 12-BETA",
"product_id": "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.x86_64"
},
"product_reference": "golang-github-boynux-squid_exporter-1.6-4.9.2.x86_64",
"relates_to_product_reference": "SUSE Manager Client Tools 12-BETA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.aarch64 as component of SUSE Manager Client Tools 12-BETA",
"product_id": "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.aarch64"
},
"product_reference": "golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.aarch64",
"relates_to_product_reference": "SUSE Manager Client Tools 12-BETA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.ppc64le as component of SUSE Manager Client Tools 12-BETA",
"product_id": "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.ppc64le"
},
"product_reference": "golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.ppc64le",
"relates_to_product_reference": "SUSE Manager Client Tools 12-BETA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.s390x as component of SUSE Manager Client Tools 12-BETA",
"product_id": "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.s390x"
},
"product_reference": "golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.s390x",
"relates_to_product_reference": "SUSE Manager Client Tools 12-BETA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.x86_64 as component of SUSE Manager Client Tools 12-BETA",
"product_id": "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.x86_64"
},
"product_reference": "golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.x86_64",
"relates_to_product_reference": "SUSE Manager Client Tools 12-BETA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-github-prometheus-alertmanager-0.26.0-4.12.4.aarch64 as component of SUSE Manager Client Tools 12-BETA",
"product_id": "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.aarch64"
},
"product_reference": "golang-github-prometheus-alertmanager-0.26.0-4.12.4.aarch64",
"relates_to_product_reference": "SUSE Manager Client Tools 12-BETA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-github-prometheus-alertmanager-0.26.0-4.12.4.ppc64le as component of SUSE Manager Client Tools 12-BETA",
"product_id": "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.ppc64le"
},
"product_reference": "golang-github-prometheus-alertmanager-0.26.0-4.12.4.ppc64le",
"relates_to_product_reference": "SUSE Manager Client Tools 12-BETA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-github-prometheus-alertmanager-0.26.0-4.12.4.s390x as component of SUSE Manager Client Tools 12-BETA",
"product_id": "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.s390x"
},
"product_reference": "golang-github-prometheus-alertmanager-0.26.0-4.12.4.s390x",
"relates_to_product_reference": "SUSE Manager Client Tools 12-BETA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-github-prometheus-alertmanager-0.26.0-4.12.4.x86_64 as component of SUSE Manager Client Tools 12-BETA",
"product_id": "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.x86_64"
},
"product_reference": "golang-github-prometheus-alertmanager-0.26.0-4.12.4.x86_64",
"relates_to_product_reference": "SUSE Manager Client Tools 12-BETA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-github-prometheus-node_exporter-1.5.0-4.15.4.aarch64 as component of SUSE Manager Client Tools 12-BETA",
"product_id": "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.aarch64"
},
"product_reference": "golang-github-prometheus-node_exporter-1.5.0-4.15.4.aarch64",
"relates_to_product_reference": "SUSE Manager Client Tools 12-BETA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-github-prometheus-node_exporter-1.5.0-4.15.4.ppc64le as component of SUSE Manager Client Tools 12-BETA",
"product_id": "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.ppc64le"
},
"product_reference": "golang-github-prometheus-node_exporter-1.5.0-4.15.4.ppc64le",
"relates_to_product_reference": "SUSE Manager Client Tools 12-BETA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-github-prometheus-node_exporter-1.5.0-4.15.4.s390x as component of SUSE Manager Client Tools 12-BETA",
"product_id": "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.s390x"
},
"product_reference": "golang-github-prometheus-node_exporter-1.5.0-4.15.4.s390x",
"relates_to_product_reference": "SUSE Manager Client Tools 12-BETA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-github-prometheus-node_exporter-1.5.0-4.15.4.x86_64 as component of SUSE Manager Client Tools 12-BETA",
"product_id": "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.x86_64"
},
"product_reference": "golang-github-prometheus-node_exporter-1.5.0-4.15.4.x86_64",
"relates_to_product_reference": "SUSE Manager Client Tools 12-BETA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-github-prometheus-prometheus-2.45.0-4.33.3.aarch64 as component of SUSE Manager Client Tools 12-BETA",
"product_id": "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.aarch64"
},
"product_reference": "golang-github-prometheus-prometheus-2.45.0-4.33.3.aarch64",
"relates_to_product_reference": "SUSE Manager Client Tools 12-BETA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-github-prometheus-prometheus-2.45.0-4.33.3.ppc64le as component of SUSE Manager Client Tools 12-BETA",
"product_id": "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.ppc64le"
},
"product_reference": "golang-github-prometheus-prometheus-2.45.0-4.33.3.ppc64le",
"relates_to_product_reference": "SUSE Manager Client Tools 12-BETA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-github-prometheus-prometheus-2.45.0-4.33.3.s390x as component of SUSE Manager Client Tools 12-BETA",
"product_id": "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.s390x"
},
"product_reference": "golang-github-prometheus-prometheus-2.45.0-4.33.3.s390x",
"relates_to_product_reference": "SUSE Manager Client Tools 12-BETA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-github-prometheus-prometheus-2.45.0-4.33.3.x86_64 as component of SUSE Manager Client Tools 12-BETA",
"product_id": "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.x86_64"
},
"product_reference": "golang-github-prometheus-prometheus-2.45.0-4.33.3.x86_64",
"relates_to_product_reference": "SUSE Manager Client Tools 12-BETA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-github-prometheus-promu-0.14.0-4.12.2.aarch64 as component of SUSE Manager Client Tools 12-BETA",
"product_id": "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.aarch64"
},
"product_reference": "golang-github-prometheus-promu-0.14.0-4.12.2.aarch64",
"relates_to_product_reference": "SUSE Manager Client Tools 12-BETA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-github-prometheus-promu-0.14.0-4.12.2.ppc64le as component of SUSE Manager Client Tools 12-BETA",
"product_id": "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.ppc64le"
},
"product_reference": "golang-github-prometheus-promu-0.14.0-4.12.2.ppc64le",
"relates_to_product_reference": "SUSE Manager Client Tools 12-BETA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-github-prometheus-promu-0.14.0-4.12.2.s390x as component of SUSE Manager Client Tools 12-BETA",
"product_id": "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.s390x"
},
"product_reference": "golang-github-prometheus-promu-0.14.0-4.12.2.s390x",
"relates_to_product_reference": "SUSE Manager Client Tools 12-BETA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-github-prometheus-promu-0.14.0-4.12.2.x86_64 as component of SUSE Manager Client Tools 12-BETA",
"product_id": "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.x86_64"
},
"product_reference": "golang-github-prometheus-promu-0.14.0-4.12.2.x86_64",
"relates_to_product_reference": "SUSE Manager Client Tools 12-BETA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "grafana-9.5.8-4.21.2.aarch64 as component of SUSE Manager Client Tools 12-BETA",
"product_id": "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.aarch64"
},
"product_reference": "grafana-9.5.8-4.21.2.aarch64",
"relates_to_product_reference": "SUSE Manager Client Tools 12-BETA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "grafana-9.5.8-4.21.2.ppc64le as component of SUSE Manager Client Tools 12-BETA",
"product_id": "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.ppc64le"
},
"product_reference": "grafana-9.5.8-4.21.2.ppc64le",
"relates_to_product_reference": "SUSE Manager Client Tools 12-BETA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "grafana-9.5.8-4.21.2.s390x as component of SUSE Manager Client Tools 12-BETA",
"product_id": "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.s390x"
},
"product_reference": "grafana-9.5.8-4.21.2.s390x",
"relates_to_product_reference": "SUSE Manager Client Tools 12-BETA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "grafana-9.5.8-4.21.2.x86_64 as component of SUSE Manager Client Tools 12-BETA",
"product_id": "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.x86_64"
},
"product_reference": "grafana-9.5.8-4.21.2.x86_64",
"relates_to_product_reference": "SUSE Manager Client Tools 12-BETA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kiwi-desc-saltboot-0.1.1687520761.cefb248-4.15.2.noarch as component of SUSE Manager Client Tools 12-BETA",
"product_id": "SUSE Manager Client Tools 12-BETA:kiwi-desc-saltboot-0.1.1687520761.cefb248-4.15.2.noarch"
},
"product_reference": "kiwi-desc-saltboot-0.1.1687520761.cefb248-4.15.2.noarch",
"relates_to_product_reference": "SUSE Manager Client Tools 12-BETA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mgr-push-5.0.1-4.21.4.noarch as component of SUSE Manager Client Tools 12-BETA",
"product_id": "SUSE Manager Client Tools 12-BETA:mgr-push-5.0.1-4.21.4.noarch"
},
"product_reference": "mgr-push-5.0.1-4.21.4.noarch",
"relates_to_product_reference": "SUSE Manager Client Tools 12-BETA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "prometheus-blackbox_exporter-0.24.0-3.6.3.aarch64 as component of SUSE Manager Client Tools 12-BETA",
"product_id": "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.aarch64"
},
"product_reference": "prometheus-blackbox_exporter-0.24.0-3.6.3.aarch64",
"relates_to_product_reference": "SUSE Manager Client Tools 12-BETA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "prometheus-blackbox_exporter-0.24.0-3.6.3.ppc64le as component of SUSE Manager Client Tools 12-BETA",
"product_id": "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.ppc64le"
},
"product_reference": "prometheus-blackbox_exporter-0.24.0-3.6.3.ppc64le",
"relates_to_product_reference": "SUSE Manager Client Tools 12-BETA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "prometheus-blackbox_exporter-0.24.0-3.6.3.s390x as component of SUSE Manager Client Tools 12-BETA",
"product_id": "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.s390x"
},
"product_reference": "prometheus-blackbox_exporter-0.24.0-3.6.3.s390x",
"relates_to_product_reference": "SUSE Manager Client Tools 12-BETA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "prometheus-blackbox_exporter-0.24.0-3.6.3.x86_64 as component of SUSE Manager Client Tools 12-BETA",
"product_id": "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.x86_64"
},
"product_reference": "prometheus-blackbox_exporter-0.24.0-3.6.3.x86_64",
"relates_to_product_reference": "SUSE Manager Client Tools 12-BETA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "prometheus-postgres_exporter-0.10.1-3.6.4.aarch64 as component of SUSE Manager Client Tools 12-BETA",
"product_id": "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.aarch64"
},
"product_reference": "prometheus-postgres_exporter-0.10.1-3.6.4.aarch64",
"relates_to_product_reference": "SUSE Manager Client Tools 12-BETA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "prometheus-postgres_exporter-0.10.1-3.6.4.ppc64le as component of SUSE Manager Client Tools 12-BETA",
"product_id": "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.ppc64le"
},
"product_reference": "prometheus-postgres_exporter-0.10.1-3.6.4.ppc64le",
"relates_to_product_reference": "SUSE Manager Client Tools 12-BETA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "prometheus-postgres_exporter-0.10.1-3.6.4.s390x as component of SUSE Manager Client Tools 12-BETA",
"product_id": "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.s390x"
},
"product_reference": "prometheus-postgres_exporter-0.10.1-3.6.4.s390x",
"relates_to_product_reference": "SUSE Manager Client Tools 12-BETA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "prometheus-postgres_exporter-0.10.1-3.6.4.x86_64 as component of SUSE Manager Client Tools 12-BETA",
"product_id": "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.x86_64"
},
"product_reference": "prometheus-postgres_exporter-0.10.1-3.6.4.x86_64",
"relates_to_product_reference": "SUSE Manager Client Tools 12-BETA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python2-hwdata-2.3.5-15.12.2.noarch as component of SUSE Manager Client Tools 12-BETA",
"product_id": "SUSE Manager Client Tools 12-BETA:python2-hwdata-2.3.5-15.12.2.noarch"
},
"product_reference": "python2-hwdata-2.3.5-15.12.2.noarch",
"relates_to_product_reference": "SUSE Manager Client Tools 12-BETA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python2-mgr-push-5.0.1-4.21.4.noarch as component of SUSE Manager Client Tools 12-BETA",
"product_id": "SUSE Manager Client Tools 12-BETA:python2-mgr-push-5.0.1-4.21.4.noarch"
},
"product_reference": "python2-mgr-push-5.0.1-4.21.4.noarch",
"relates_to_product_reference": "SUSE Manager Client Tools 12-BETA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python2-rhnlib-5.0.1-24.30.3.noarch as component of SUSE Manager Client Tools 12-BETA",
"product_id": "SUSE Manager Client Tools 12-BETA:python2-rhnlib-5.0.1-24.30.3.noarch"
},
"product_reference": "python2-rhnlib-5.0.1-24.30.3.noarch",
"relates_to_product_reference": "SUSE Manager Client Tools 12-BETA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python2-uyuni-common-libs-5.0.1-3.33.3.aarch64 as component of SUSE Manager Client Tools 12-BETA",
"product_id": "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.aarch64"
},
"product_reference": "python2-uyuni-common-libs-5.0.1-3.33.3.aarch64",
"relates_to_product_reference": "SUSE Manager Client Tools 12-BETA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python2-uyuni-common-libs-5.0.1-3.33.3.ppc64le as component of SUSE Manager Client Tools 12-BETA",
"product_id": "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.ppc64le"
},
"product_reference": "python2-uyuni-common-libs-5.0.1-3.33.3.ppc64le",
"relates_to_product_reference": "SUSE Manager Client Tools 12-BETA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python2-uyuni-common-libs-5.0.1-3.33.3.s390x as component of SUSE Manager Client Tools 12-BETA",
"product_id": "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.s390x"
},
"product_reference": "python2-uyuni-common-libs-5.0.1-3.33.3.s390x",
"relates_to_product_reference": "SUSE Manager Client Tools 12-BETA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python2-uyuni-common-libs-5.0.1-3.33.3.x86_64 as component of SUSE Manager Client Tools 12-BETA",
"product_id": "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.x86_64"
},
"product_reference": "python2-uyuni-common-libs-5.0.1-3.33.3.x86_64",
"relates_to_product_reference": "SUSE Manager Client Tools 12-BETA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "spacecmd-5.0.1-41.42.3.noarch as component of SUSE Manager Client Tools 12-BETA",
"product_id": "SUSE Manager Client Tools 12-BETA:spacecmd-5.0.1-41.42.3.noarch"
},
"product_reference": "spacecmd-5.0.1-41.42.3.noarch",
"relates_to_product_reference": "SUSE Manager Client Tools 12-BETA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "supportutils-plugin-salt-1.2.2-9.9.2.noarch as component of SUSE Manager Client Tools 12-BETA",
"product_id": "SUSE Manager Client Tools 12-BETA:supportutils-plugin-salt-1.2.2-9.9.2.noarch"
},
"product_reference": "supportutils-plugin-salt-1.2.2-9.9.2.noarch",
"relates_to_product_reference": "SUSE Manager Client Tools 12-BETA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "supportutils-plugin-susemanager-client-5.0.1-9.15.2.noarch as component of SUSE Manager Client Tools 12-BETA",
"product_id": "SUSE Manager Client Tools 12-BETA:supportutils-plugin-susemanager-client-5.0.1-9.15.2.noarch"
},
"product_reference": "supportutils-plugin-susemanager-client-5.0.1-9.15.2.noarch",
"relates_to_product_reference": "SUSE Manager Client Tools 12-BETA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "system-user-grafana-1.0.0-3.7.2.noarch as component of SUSE Manager Client Tools 12-BETA",
"product_id": "SUSE Manager Client Tools 12-BETA:system-user-grafana-1.0.0-3.7.2.noarch"
},
"product_reference": "system-user-grafana-1.0.0-3.7.2.noarch",
"relates_to_product_reference": "SUSE Manager Client Tools 12-BETA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "system-user-prometheus-1.0.0-3.7.2.noarch as component of SUSE Manager Client Tools 12-BETA",
"product_id": "SUSE Manager Client Tools 12-BETA:system-user-prometheus-1.0.0-3.7.2.noarch"
},
"product_reference": "system-user-prometheus-1.0.0-3.7.2.noarch",
"relates_to_product_reference": "SUSE Manager Client Tools 12-BETA"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2020-7753",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-7753"
}
],
"notes": [
{
"category": "general",
"text": "All versions of package trim are vulnerable to Regular Expression Denial of Service (ReDoS) via trim().",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.x86_64",
"SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.aarch64",
"SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.ppc64le",
"SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.s390x",
"SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.x86_64",
"SUSE Manager Client Tools 12-BETA:kiwi-desc-saltboot-0.1.1687520761.cefb248-4.15.2.noarch",
"SUSE Manager Client Tools 12-BETA:mgr-push-5.0.1-4.21.4.noarch",
"SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.aarch64",
"SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.ppc64le",
"SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.s390x",
"SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.x86_64",
"SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.aarch64",
"SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.ppc64le",
"SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.s390x",
"SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.x86_64",
"SUSE Manager Client Tools 12-BETA:python2-hwdata-2.3.5-15.12.2.noarch",
"SUSE Manager Client Tools 12-BETA:python2-mgr-push-5.0.1-4.21.4.noarch",
"SUSE Manager Client Tools 12-BETA:python2-rhnlib-5.0.1-24.30.3.noarch",
"SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.aarch64",
"SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.ppc64le",
"SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.s390x",
"SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.x86_64",
"SUSE Manager Client Tools 12-BETA:spacecmd-5.0.1-41.42.3.noarch",
"SUSE Manager Client Tools 12-BETA:supportutils-plugin-salt-1.2.2-9.9.2.noarch",
"SUSE Manager Client Tools 12-BETA:supportutils-plugin-susemanager-client-5.0.1-9.15.2.noarch",
"SUSE Manager Client Tools 12-BETA:system-user-grafana-1.0.0-3.7.2.noarch",
"SUSE Manager Client Tools 12-BETA:system-user-prometheus-1.0.0-3.7.2.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-7753",
"url": "https://www.suse.com/security/cve/CVE-2020-7753"
},
{
"category": "external",
"summary": "SUSE Bug 1218843 for CVE-2020-7753",
"url": "https://bugzilla.suse.com/1218843"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.x86_64",
"SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.aarch64",
"SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.ppc64le",
"SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.s390x",
"SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.x86_64",
"SUSE Manager Client Tools 12-BETA:kiwi-desc-saltboot-0.1.1687520761.cefb248-4.15.2.noarch",
"SUSE Manager Client Tools 12-BETA:mgr-push-5.0.1-4.21.4.noarch",
"SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.aarch64",
"SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.ppc64le",
"SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.s390x",
"SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.x86_64",
"SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.aarch64",
"SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.ppc64le",
"SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.s390x",
"SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.x86_64",
"SUSE Manager Client Tools 12-BETA:python2-hwdata-2.3.5-15.12.2.noarch",
"SUSE Manager Client Tools 12-BETA:python2-mgr-push-5.0.1-4.21.4.noarch",
"SUSE Manager Client Tools 12-BETA:python2-rhnlib-5.0.1-24.30.3.noarch",
"SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.aarch64",
"SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.ppc64le",
"SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.s390x",
"SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.x86_64",
"SUSE Manager Client Tools 12-BETA:spacecmd-5.0.1-41.42.3.noarch",
"SUSE Manager Client Tools 12-BETA:supportutils-plugin-salt-1.2.2-9.9.2.noarch",
"SUSE Manager Client Tools 12-BETA:supportutils-plugin-susemanager-client-5.0.1-9.15.2.noarch",
"SUSE Manager Client Tools 12-BETA:system-user-grafana-1.0.0-3.7.2.noarch",
"SUSE Manager Client Tools 12-BETA:system-user-prometheus-1.0.0-3.7.2.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.x86_64",
"SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.aarch64",
"SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.ppc64le",
"SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.s390x",
"SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.x86_64",
"SUSE Manager Client Tools 12-BETA:kiwi-desc-saltboot-0.1.1687520761.cefb248-4.15.2.noarch",
"SUSE Manager Client Tools 12-BETA:mgr-push-5.0.1-4.21.4.noarch",
"SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.aarch64",
"SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.ppc64le",
"SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.s390x",
"SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.x86_64",
"SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.aarch64",
"SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.ppc64le",
"SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.s390x",
"SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.x86_64",
"SUSE Manager Client Tools 12-BETA:python2-hwdata-2.3.5-15.12.2.noarch",
"SUSE Manager Client Tools 12-BETA:python2-mgr-push-5.0.1-4.21.4.noarch",
"SUSE Manager Client Tools 12-BETA:python2-rhnlib-5.0.1-24.30.3.noarch",
"SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.aarch64",
"SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.ppc64le",
"SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.s390x",
"SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.x86_64",
"SUSE Manager Client Tools 12-BETA:spacecmd-5.0.1-41.42.3.noarch",
"SUSE Manager Client Tools 12-BETA:supportutils-plugin-salt-1.2.2-9.9.2.noarch",
"SUSE Manager Client Tools 12-BETA:supportutils-plugin-susemanager-client-5.0.1-9.15.2.noarch",
"SUSE Manager Client Tools 12-BETA:system-user-grafana-1.0.0-3.7.2.noarch",
"SUSE Manager Client Tools 12-BETA:system-user-prometheus-1.0.0-3.7.2.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-01-23T15:18:14Z",
"details": "important"
}
],
"title": "CVE-2020-7753"
},
{
"cve": "CVE-2021-36222",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-36222"
}
],
"notes": [
{
"category": "general",
"text": "ec_verify in kdc/kdc_preauth_ec.c in the Key Distribution Center (KDC) in MIT Kerberos 5 (aka krb5) before 1.18.4 and 1.19.x before 1.19.2 allows remote attackers to cause a NULL pointer dereference and daemon crash. This occurs because a return value is not properly managed in a certain situation.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.x86_64",
"SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.aarch64",
"SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.ppc64le",
"SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.s390x",
"SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.x86_64",
"SUSE Manager Client Tools 12-BETA:kiwi-desc-saltboot-0.1.1687520761.cefb248-4.15.2.noarch",
"SUSE Manager Client Tools 12-BETA:mgr-push-5.0.1-4.21.4.noarch",
"SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.aarch64",
"SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.ppc64le",
"SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.s390x",
"SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.x86_64",
"SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.aarch64",
"SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.ppc64le",
"SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.s390x",
"SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.x86_64",
"SUSE Manager Client Tools 12-BETA:python2-hwdata-2.3.5-15.12.2.noarch",
"SUSE Manager Client Tools 12-BETA:python2-mgr-push-5.0.1-4.21.4.noarch",
"SUSE Manager Client Tools 12-BETA:python2-rhnlib-5.0.1-24.30.3.noarch",
"SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.aarch64",
"SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.ppc64le",
"SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.s390x",
"SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.x86_64",
"SUSE Manager Client Tools 12-BETA:spacecmd-5.0.1-41.42.3.noarch",
"SUSE Manager Client Tools 12-BETA:supportutils-plugin-salt-1.2.2-9.9.2.noarch",
"SUSE Manager Client Tools 12-BETA:supportutils-plugin-susemanager-client-5.0.1-9.15.2.noarch",
"SUSE Manager Client Tools 12-BETA:system-user-grafana-1.0.0-3.7.2.noarch",
"SUSE Manager Client Tools 12-BETA:system-user-prometheus-1.0.0-3.7.2.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-36222",
"url": "https://www.suse.com/security/cve/CVE-2021-36222"
},
{
"category": "external",
"summary": "SUSE Bug 1188571 for CVE-2021-36222",
"url": "https://bugzilla.suse.com/1188571"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.x86_64",
"SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.aarch64",
"SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.ppc64le",
"SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.s390x",
"SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.x86_64",
"SUSE Manager Client Tools 12-BETA:kiwi-desc-saltboot-0.1.1687520761.cefb248-4.15.2.noarch",
"SUSE Manager Client Tools 12-BETA:mgr-push-5.0.1-4.21.4.noarch",
"SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.aarch64",
"SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.ppc64le",
"SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.s390x",
"SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.x86_64",
"SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.aarch64",
"SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.ppc64le",
"SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.s390x",
"SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.x86_64",
"SUSE Manager Client Tools 12-BETA:python2-hwdata-2.3.5-15.12.2.noarch",
"SUSE Manager Client Tools 12-BETA:python2-mgr-push-5.0.1-4.21.4.noarch",
"SUSE Manager Client Tools 12-BETA:python2-rhnlib-5.0.1-24.30.3.noarch",
"SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.aarch64",
"SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.ppc64le",
"SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.s390x",
"SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.x86_64",
"SUSE Manager Client Tools 12-BETA:spacecmd-5.0.1-41.42.3.noarch",
"SUSE Manager Client Tools 12-BETA:supportutils-plugin-salt-1.2.2-9.9.2.noarch",
"SUSE Manager Client Tools 12-BETA:supportutils-plugin-susemanager-client-5.0.1-9.15.2.noarch",
"SUSE Manager Client Tools 12-BETA:system-user-grafana-1.0.0-3.7.2.noarch",
"SUSE Manager Client Tools 12-BETA:system-user-prometheus-1.0.0-3.7.2.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.x86_64",
"SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.aarch64",
"SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.ppc64le",
"SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.s390x",
"SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.x86_64",
"SUSE Manager Client Tools 12-BETA:kiwi-desc-saltboot-0.1.1687520761.cefb248-4.15.2.noarch",
"SUSE Manager Client Tools 12-BETA:mgr-push-5.0.1-4.21.4.noarch",
"SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.aarch64",
"SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.ppc64le",
"SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.s390x",
"SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.x86_64",
"SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.aarch64",
"SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.ppc64le",
"SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.s390x",
"SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.x86_64",
"SUSE Manager Client Tools 12-BETA:python2-hwdata-2.3.5-15.12.2.noarch",
"SUSE Manager Client Tools 12-BETA:python2-mgr-push-5.0.1-4.21.4.noarch",
"SUSE Manager Client Tools 12-BETA:python2-rhnlib-5.0.1-24.30.3.noarch",
"SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.aarch64",
"SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.ppc64le",
"SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.s390x",
"SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.x86_64",
"SUSE Manager Client Tools 12-BETA:spacecmd-5.0.1-41.42.3.noarch",
"SUSE Manager Client Tools 12-BETA:supportutils-plugin-salt-1.2.2-9.9.2.noarch",
"SUSE Manager Client Tools 12-BETA:supportutils-plugin-susemanager-client-5.0.1-9.15.2.noarch",
"SUSE Manager Client Tools 12-BETA:system-user-grafana-1.0.0-3.7.2.noarch",
"SUSE Manager Client Tools 12-BETA:system-user-prometheus-1.0.0-3.7.2.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-01-23T15:18:14Z",
"details": "important"
}
],
"title": "CVE-2021-36222"
},
{
"cve": "CVE-2021-3711",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-3711"
}
],
"notes": [
{
"category": "general",
"text": "In order to decrypt SM2 encrypted data an application is expected to call the API function EVP_PKEY_decrypt(). Typically an application will call this function twice. The first time, on entry, the \"out\" parameter can be NULL and, on exit, the \"outlen\" parameter is populated with the buffer size required to hold the decrypted plaintext. The application can then allocate a sufficiently sized buffer and call EVP_PKEY_decrypt() again, but this time passing a non-NULL value for the \"out\" parameter. A bug in the implementation of the SM2 decryption code means that the calculation of the buffer size required to hold the plaintext returned by the first call to EVP_PKEY_decrypt() can be smaller than the actual size required by the second call. This can lead to a buffer overflow when EVP_PKEY_decrypt() is called by the application a second time with a buffer that is too small. A malicious attacker who is able present SM2 content for decryption to an application could cause attacker chosen data to overflow the buffer by up to a maximum of 62 bytes altering the contents of other data held after the buffer, possibly changing application behaviour or causing the application to crash. The location of the buffer is application dependent but is typically heap allocated. Fixed in OpenSSL 1.1.1l (Affected 1.1.1-1.1.1k).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.x86_64",
"SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.aarch64",
"SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.ppc64le",
"SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.s390x",
"SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.x86_64",
"SUSE Manager Client Tools 12-BETA:kiwi-desc-saltboot-0.1.1687520761.cefb248-4.15.2.noarch",
"SUSE Manager Client Tools 12-BETA:mgr-push-5.0.1-4.21.4.noarch",
"SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.aarch64",
"SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.ppc64le",
"SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.s390x",
"SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.x86_64",
"SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.aarch64",
"SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.ppc64le",
"SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.s390x",
"SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.x86_64",
"SUSE Manager Client Tools 12-BETA:python2-hwdata-2.3.5-15.12.2.noarch",
"SUSE Manager Client Tools 12-BETA:python2-mgr-push-5.0.1-4.21.4.noarch",
"SUSE Manager Client Tools 12-BETA:python2-rhnlib-5.0.1-24.30.3.noarch",
"SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.aarch64",
"SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.ppc64le",
"SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.s390x",
"SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.x86_64",
"SUSE Manager Client Tools 12-BETA:spacecmd-5.0.1-41.42.3.noarch",
"SUSE Manager Client Tools 12-BETA:supportutils-plugin-salt-1.2.2-9.9.2.noarch",
"SUSE Manager Client Tools 12-BETA:supportutils-plugin-susemanager-client-5.0.1-9.15.2.noarch",
"SUSE Manager Client Tools 12-BETA:system-user-grafana-1.0.0-3.7.2.noarch",
"SUSE Manager Client Tools 12-BETA:system-user-prometheus-1.0.0-3.7.2.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-3711",
"url": "https://www.suse.com/security/cve/CVE-2021-3711"
},
{
"category": "external",
"summary": "SUSE Bug 1189520 for CVE-2021-3711",
"url": "https://bugzilla.suse.com/1189520"
},
{
"category": "external",
"summary": "SUSE Bug 1190129 for CVE-2021-3711",
"url": "https://bugzilla.suse.com/1190129"
},
{
"category": "external",
"summary": "SUSE Bug 1192100 for CVE-2021-3711",
"url": "https://bugzilla.suse.com/1192100"
},
{
"category": "external",
"summary": "SUSE Bug 1205663 for CVE-2021-3711",
"url": "https://bugzilla.suse.com/1205663"
},
{
"category": "external",
"summary": "SUSE Bug 1225628 for CVE-2021-3711",
"url": "https://bugzilla.suse.com/1225628"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.x86_64",
"SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.aarch64",
"SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.ppc64le",
"SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.s390x",
"SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.x86_64",
"SUSE Manager Client Tools 12-BETA:kiwi-desc-saltboot-0.1.1687520761.cefb248-4.15.2.noarch",
"SUSE Manager Client Tools 12-BETA:mgr-push-5.0.1-4.21.4.noarch",
"SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.aarch64",
"SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.ppc64le",
"SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.s390x",
"SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.x86_64",
"SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.aarch64",
"SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.ppc64le",
"SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.s390x",
"SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.x86_64",
"SUSE Manager Client Tools 12-BETA:python2-hwdata-2.3.5-15.12.2.noarch",
"SUSE Manager Client Tools 12-BETA:python2-mgr-push-5.0.1-4.21.4.noarch",
"SUSE Manager Client Tools 12-BETA:python2-rhnlib-5.0.1-24.30.3.noarch",
"SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.aarch64",
"SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.ppc64le",
"SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.s390x",
"SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.x86_64",
"SUSE Manager Client Tools 12-BETA:spacecmd-5.0.1-41.42.3.noarch",
"SUSE Manager Client Tools 12-BETA:supportutils-plugin-salt-1.2.2-9.9.2.noarch",
"SUSE Manager Client Tools 12-BETA:supportutils-plugin-susemanager-client-5.0.1-9.15.2.noarch",
"SUSE Manager Client Tools 12-BETA:system-user-grafana-1.0.0-3.7.2.noarch",
"SUSE Manager Client Tools 12-BETA:system-user-prometheus-1.0.0-3.7.2.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.x86_64",
"SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.aarch64",
"SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.ppc64le",
"SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.s390x",
"SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.x86_64",
"SUSE Manager Client Tools 12-BETA:kiwi-desc-saltboot-0.1.1687520761.cefb248-4.15.2.noarch",
"SUSE Manager Client Tools 12-BETA:mgr-push-5.0.1-4.21.4.noarch",
"SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.aarch64",
"SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.ppc64le",
"SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.s390x",
"SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.x86_64",
"SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.aarch64",
"SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.ppc64le",
"SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.s390x",
"SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.x86_64",
"SUSE Manager Client Tools 12-BETA:python2-hwdata-2.3.5-15.12.2.noarch",
"SUSE Manager Client Tools 12-BETA:python2-mgr-push-5.0.1-4.21.4.noarch",
"SUSE Manager Client Tools 12-BETA:python2-rhnlib-5.0.1-24.30.3.noarch",
"SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.aarch64",
"SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.ppc64le",
"SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.s390x",
"SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.x86_64",
"SUSE Manager Client Tools 12-BETA:spacecmd-5.0.1-41.42.3.noarch",
"SUSE Manager Client Tools 12-BETA:supportutils-plugin-salt-1.2.2-9.9.2.noarch",
"SUSE Manager Client Tools 12-BETA:supportutils-plugin-susemanager-client-5.0.1-9.15.2.noarch",
"SUSE Manager Client Tools 12-BETA:system-user-grafana-1.0.0-3.7.2.noarch",
"SUSE Manager Client Tools 12-BETA:system-user-prometheus-1.0.0-3.7.2.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-01-23T15:18:14Z",
"details": "critical"
}
],
"title": "CVE-2021-3711"
},
{
"cve": "CVE-2021-3807",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-3807"
}
],
"notes": [
{
"category": "general",
"text": "ansi-regex is vulnerable to Inefficient Regular Expression Complexity",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.x86_64",
"SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.aarch64",
"SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.ppc64le",
"SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.s390x",
"SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.x86_64",
"SUSE Manager Client Tools 12-BETA:kiwi-desc-saltboot-0.1.1687520761.cefb248-4.15.2.noarch",
"SUSE Manager Client Tools 12-BETA:mgr-push-5.0.1-4.21.4.noarch",
"SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.aarch64",
"SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.ppc64le",
"SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.s390x",
"SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.x86_64",
"SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.aarch64",
"SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.ppc64le",
"SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.s390x",
"SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.x86_64",
"SUSE Manager Client Tools 12-BETA:python2-hwdata-2.3.5-15.12.2.noarch",
"SUSE Manager Client Tools 12-BETA:python2-mgr-push-5.0.1-4.21.4.noarch",
"SUSE Manager Client Tools 12-BETA:python2-rhnlib-5.0.1-24.30.3.noarch",
"SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.aarch64",
"SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.ppc64le",
"SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.s390x",
"SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.x86_64",
"SUSE Manager Client Tools 12-BETA:spacecmd-5.0.1-41.42.3.noarch",
"SUSE Manager Client Tools 12-BETA:supportutils-plugin-salt-1.2.2-9.9.2.noarch",
"SUSE Manager Client Tools 12-BETA:supportutils-plugin-susemanager-client-5.0.1-9.15.2.noarch",
"SUSE Manager Client Tools 12-BETA:system-user-grafana-1.0.0-3.7.2.noarch",
"SUSE Manager Client Tools 12-BETA:system-user-prometheus-1.0.0-3.7.2.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-3807",
"url": "https://www.suse.com/security/cve/CVE-2021-3807"
},
{
"category": "external",
"summary": "SUSE Bug 1192154 for CVE-2021-3807",
"url": "https://bugzilla.suse.com/1192154"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.x86_64",
"SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.aarch64",
"SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.ppc64le",
"SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.s390x",
"SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.x86_64",
"SUSE Manager Client Tools 12-BETA:kiwi-desc-saltboot-0.1.1687520761.cefb248-4.15.2.noarch",
"SUSE Manager Client Tools 12-BETA:mgr-push-5.0.1-4.21.4.noarch",
"SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.aarch64",
"SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.ppc64le",
"SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.s390x",
"SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.x86_64",
"SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.aarch64",
"SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.ppc64le",
"SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.s390x",
"SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.x86_64",
"SUSE Manager Client Tools 12-BETA:python2-hwdata-2.3.5-15.12.2.noarch",
"SUSE Manager Client Tools 12-BETA:python2-mgr-push-5.0.1-4.21.4.noarch",
"SUSE Manager Client Tools 12-BETA:python2-rhnlib-5.0.1-24.30.3.noarch",
"SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.aarch64",
"SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.ppc64le",
"SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.s390x",
"SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.x86_64",
"SUSE Manager Client Tools 12-BETA:spacecmd-5.0.1-41.42.3.noarch",
"SUSE Manager Client Tools 12-BETA:supportutils-plugin-salt-1.2.2-9.9.2.noarch",
"SUSE Manager Client Tools 12-BETA:supportutils-plugin-susemanager-client-5.0.1-9.15.2.noarch",
"SUSE Manager Client Tools 12-BETA:system-user-grafana-1.0.0-3.7.2.noarch",
"SUSE Manager Client Tools 12-BETA:system-user-prometheus-1.0.0-3.7.2.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.x86_64",
"SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.aarch64",
"SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.ppc64le",
"SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.s390x",
"SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.x86_64",
"SUSE Manager Client Tools 12-BETA:kiwi-desc-saltboot-0.1.1687520761.cefb248-4.15.2.noarch",
"SUSE Manager Client Tools 12-BETA:mgr-push-5.0.1-4.21.4.noarch",
"SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.aarch64",
"SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.ppc64le",
"SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.s390x",
"SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.x86_64",
"SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.aarch64",
"SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.ppc64le",
"SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.s390x",
"SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.x86_64",
"SUSE Manager Client Tools 12-BETA:python2-hwdata-2.3.5-15.12.2.noarch",
"SUSE Manager Client Tools 12-BETA:python2-mgr-push-5.0.1-4.21.4.noarch",
"SUSE Manager Client Tools 12-BETA:python2-rhnlib-5.0.1-24.30.3.noarch",
"SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.aarch64",
"SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.ppc64le",
"SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.s390x",
"SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.x86_64",
"SUSE Manager Client Tools 12-BETA:spacecmd-5.0.1-41.42.3.noarch",
"SUSE Manager Client Tools 12-BETA:supportutils-plugin-salt-1.2.2-9.9.2.noarch",
"SUSE Manager Client Tools 12-BETA:supportutils-plugin-susemanager-client-5.0.1-9.15.2.noarch",
"SUSE Manager Client Tools 12-BETA:system-user-grafana-1.0.0-3.7.2.noarch",
"SUSE Manager Client Tools 12-BETA:system-user-prometheus-1.0.0-3.7.2.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-01-23T15:18:14Z",
"details": "important"
}
],
"title": "CVE-2021-3807"
},
{
"cve": "CVE-2021-3918",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-3918"
}
],
"notes": [
{
"category": "general",
"text": "json-schema is vulnerable to Improperly Controlled Modification of Object Prototype Attributes (\u0027Prototype Pollution\u0027)",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.x86_64",
"SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.aarch64",
"SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.ppc64le",
"SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.s390x",
"SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.x86_64",
"SUSE Manager Client Tools 12-BETA:kiwi-desc-saltboot-0.1.1687520761.cefb248-4.15.2.noarch",
"SUSE Manager Client Tools 12-BETA:mgr-push-5.0.1-4.21.4.noarch",
"SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.aarch64",
"SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.ppc64le",
"SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.s390x",
"SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.x86_64",
"SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.aarch64",
"SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.ppc64le",
"SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.s390x",
"SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.x86_64",
"SUSE Manager Client Tools 12-BETA:python2-hwdata-2.3.5-15.12.2.noarch",
"SUSE Manager Client Tools 12-BETA:python2-mgr-push-5.0.1-4.21.4.noarch",
"SUSE Manager Client Tools 12-BETA:python2-rhnlib-5.0.1-24.30.3.noarch",
"SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.aarch64",
"SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.ppc64le",
"SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.s390x",
"SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.x86_64",
"SUSE Manager Client Tools 12-BETA:spacecmd-5.0.1-41.42.3.noarch",
"SUSE Manager Client Tools 12-BETA:supportutils-plugin-salt-1.2.2-9.9.2.noarch",
"SUSE Manager Client Tools 12-BETA:supportutils-plugin-susemanager-client-5.0.1-9.15.2.noarch",
"SUSE Manager Client Tools 12-BETA:system-user-grafana-1.0.0-3.7.2.noarch",
"SUSE Manager Client Tools 12-BETA:system-user-prometheus-1.0.0-3.7.2.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-3918",
"url": "https://www.suse.com/security/cve/CVE-2021-3918"
},
{
"category": "external",
"summary": "SUSE Bug 1192696 for CVE-2021-3918",
"url": "https://bugzilla.suse.com/1192696"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.x86_64",
"SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.aarch64",
"SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.ppc64le",
"SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.s390x",
"SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.x86_64",
"SUSE Manager Client Tools 12-BETA:kiwi-desc-saltboot-0.1.1687520761.cefb248-4.15.2.noarch",
"SUSE Manager Client Tools 12-BETA:mgr-push-5.0.1-4.21.4.noarch",
"SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.aarch64",
"SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.ppc64le",
"SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.s390x",
"SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.x86_64",
"SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.aarch64",
"SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.ppc64le",
"SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.s390x",
"SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.x86_64",
"SUSE Manager Client Tools 12-BETA:python2-hwdata-2.3.5-15.12.2.noarch",
"SUSE Manager Client Tools 12-BETA:python2-mgr-push-5.0.1-4.21.4.noarch",
"SUSE Manager Client Tools 12-BETA:python2-rhnlib-5.0.1-24.30.3.noarch",
"SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.aarch64",
"SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.ppc64le",
"SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.s390x",
"SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.x86_64",
"SUSE Manager Client Tools 12-BETA:spacecmd-5.0.1-41.42.3.noarch",
"SUSE Manager Client Tools 12-BETA:supportutils-plugin-salt-1.2.2-9.9.2.noarch",
"SUSE Manager Client Tools 12-BETA:supportutils-plugin-susemanager-client-5.0.1-9.15.2.noarch",
"SUSE Manager Client Tools 12-BETA:system-user-grafana-1.0.0-3.7.2.noarch",
"SUSE Manager Client Tools 12-BETA:system-user-prometheus-1.0.0-3.7.2.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.x86_64",
"SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.aarch64",
"SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.ppc64le",
"SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.s390x",
"SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.x86_64",
"SUSE Manager Client Tools 12-BETA:kiwi-desc-saltboot-0.1.1687520761.cefb248-4.15.2.noarch",
"SUSE Manager Client Tools 12-BETA:mgr-push-5.0.1-4.21.4.noarch",
"SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.aarch64",
"SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.ppc64le",
"SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.s390x",
"SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.x86_64",
"SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.aarch64",
"SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.ppc64le",
"SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.s390x",
"SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.x86_64",
"SUSE Manager Client Tools 12-BETA:python2-hwdata-2.3.5-15.12.2.noarch",
"SUSE Manager Client Tools 12-BETA:python2-mgr-push-5.0.1-4.21.4.noarch",
"SUSE Manager Client Tools 12-BETA:python2-rhnlib-5.0.1-24.30.3.noarch",
"SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.aarch64",
"SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.ppc64le",
"SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.s390x",
"SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.x86_64",
"SUSE Manager Client Tools 12-BETA:spacecmd-5.0.1-41.42.3.noarch",
"SUSE Manager Client Tools 12-BETA:supportutils-plugin-salt-1.2.2-9.9.2.noarch",
"SUSE Manager Client Tools 12-BETA:supportutils-plugin-susemanager-client-5.0.1-9.15.2.noarch",
"SUSE Manager Client Tools 12-BETA:system-user-grafana-1.0.0-3.7.2.noarch",
"SUSE Manager Client Tools 12-BETA:system-user-prometheus-1.0.0-3.7.2.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-01-23T15:18:14Z",
"details": "important"
}
],
"title": "CVE-2021-3918"
},
{
"cve": "CVE-2021-39226",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-39226"
}
],
"notes": [
{
"category": "general",
"text": "Grafana is an open source data visualization platform. In affected versions unauthenticated and authenticated users are able to view the snapshot with the lowest database key by accessing the literal paths: /dashboard/snapshot/:key, or /api/snapshots/:key. If the snapshot \"public_mode\" configuration setting is set to true (vs default of false), unauthenticated users are able to delete the snapshot with the lowest database key by accessing the literal path: /api/snapshots-delete/:deleteKey. Regardless of the snapshot \"public_mode\" setting, authenticated users are able to delete the snapshot with the lowest database key by accessing the literal paths: /api/snapshots/:key, or /api/snapshots-delete/:deleteKey. The combination of deletion and viewing enables a complete walk through all snapshot data while resulting in complete snapshot data loss. This issue has been resolved in versions 8.1.6 and 7.5.11. If for some reason you cannot upgrade you can use a reverse proxy or similar to block access to the literal paths: /api/snapshots/:key, /api/snapshots-delete/:deleteKey, /dashboard/snapshot/:key, and /api/snapshots/:key. They have no normal function and can be disabled without side effects.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.x86_64",
"SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.aarch64",
"SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.ppc64le",
"SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.s390x",
"SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.x86_64",
"SUSE Manager Client Tools 12-BETA:kiwi-desc-saltboot-0.1.1687520761.cefb248-4.15.2.noarch",
"SUSE Manager Client Tools 12-BETA:mgr-push-5.0.1-4.21.4.noarch",
"SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.aarch64",
"SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.ppc64le",
"SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.s390x",
"SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.x86_64",
"SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.aarch64",
"SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.ppc64le",
"SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.s390x",
"SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.x86_64",
"SUSE Manager Client Tools 12-BETA:python2-hwdata-2.3.5-15.12.2.noarch",
"SUSE Manager Client Tools 12-BETA:python2-mgr-push-5.0.1-4.21.4.noarch",
"SUSE Manager Client Tools 12-BETA:python2-rhnlib-5.0.1-24.30.3.noarch",
"SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.aarch64",
"SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.ppc64le",
"SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.s390x",
"SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.x86_64",
"SUSE Manager Client Tools 12-BETA:spacecmd-5.0.1-41.42.3.noarch",
"SUSE Manager Client Tools 12-BETA:supportutils-plugin-salt-1.2.2-9.9.2.noarch",
"SUSE Manager Client Tools 12-BETA:supportutils-plugin-susemanager-client-5.0.1-9.15.2.noarch",
"SUSE Manager Client Tools 12-BETA:system-user-grafana-1.0.0-3.7.2.noarch",
"SUSE Manager Client Tools 12-BETA:system-user-prometheus-1.0.0-3.7.2.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-39226",
"url": "https://www.suse.com/security/cve/CVE-2021-39226"
},
{
"category": "external",
"summary": "SUSE Bug 1191454 for CVE-2021-39226",
"url": "https://bugzilla.suse.com/1191454"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.x86_64",
"SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.aarch64",
"SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.ppc64le",
"SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.s390x",
"SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.x86_64",
"SUSE Manager Client Tools 12-BETA:kiwi-desc-saltboot-0.1.1687520761.cefb248-4.15.2.noarch",
"SUSE Manager Client Tools 12-BETA:mgr-push-5.0.1-4.21.4.noarch",
"SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.aarch64",
"SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.ppc64le",
"SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.s390x",
"SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.x86_64",
"SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.aarch64",
"SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.ppc64le",
"SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.s390x",
"SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.x86_64",
"SUSE Manager Client Tools 12-BETA:python2-hwdata-2.3.5-15.12.2.noarch",
"SUSE Manager Client Tools 12-BETA:python2-mgr-push-5.0.1-4.21.4.noarch",
"SUSE Manager Client Tools 12-BETA:python2-rhnlib-5.0.1-24.30.3.noarch",
"SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.aarch64",
"SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.ppc64le",
"SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.s390x",
"SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.x86_64",
"SUSE Manager Client Tools 12-BETA:spacecmd-5.0.1-41.42.3.noarch",
"SUSE Manager Client Tools 12-BETA:supportutils-plugin-salt-1.2.2-9.9.2.noarch",
"SUSE Manager Client Tools 12-BETA:supportutils-plugin-susemanager-client-5.0.1-9.15.2.noarch",
"SUSE Manager Client Tools 12-BETA:system-user-grafana-1.0.0-3.7.2.noarch",
"SUSE Manager Client Tools 12-BETA:system-user-prometheus-1.0.0-3.7.2.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.3,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.x86_64",
"SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.aarch64",
"SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.ppc64le",
"SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.s390x",
"SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.x86_64",
"SUSE Manager Client Tools 12-BETA:kiwi-desc-saltboot-0.1.1687520761.cefb248-4.15.2.noarch",
"SUSE Manager Client Tools 12-BETA:mgr-push-5.0.1-4.21.4.noarch",
"SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.aarch64",
"SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.ppc64le",
"SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.s390x",
"SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.x86_64",
"SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.aarch64",
"SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.ppc64le",
"SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.s390x",
"SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.x86_64",
"SUSE Manager Client Tools 12-BETA:python2-hwdata-2.3.5-15.12.2.noarch",
"SUSE Manager Client Tools 12-BETA:python2-mgr-push-5.0.1-4.21.4.noarch",
"SUSE Manager Client Tools 12-BETA:python2-rhnlib-5.0.1-24.30.3.noarch",
"SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.aarch64",
"SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.ppc64le",
"SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.s390x",
"SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.x86_64",
"SUSE Manager Client Tools 12-BETA:spacecmd-5.0.1-41.42.3.noarch",
"SUSE Manager Client Tools 12-BETA:supportutils-plugin-salt-1.2.2-9.9.2.noarch",
"SUSE Manager Client Tools 12-BETA:supportutils-plugin-susemanager-client-5.0.1-9.15.2.noarch",
"SUSE Manager Client Tools 12-BETA:system-user-grafana-1.0.0-3.7.2.noarch",
"SUSE Manager Client Tools 12-BETA:system-user-prometheus-1.0.0-3.7.2.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-01-23T15:18:14Z",
"details": "important"
}
],
"title": "CVE-2021-39226"
},
{
"cve": "CVE-2021-41174",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-41174"
}
],
"notes": [
{
"category": "general",
"text": "Grafana is an open-source platform for monitoring and observability. In affected versions if an attacker is able to convince a victim to visit a URL referencing a vulnerable page, arbitrary JavaScript content may be executed within the context of the victim\u0027s browser. The user visiting the malicious link must be unauthenticated and the link must be for a page that contains the login button in the menu bar. The url has to be crafted to exploit AngularJS rendering and contain the interpolation binding for AngularJS expressions. AngularJS uses double curly braces for interpolation binding: {{ }} ex: {{constructor.constructor(\u0027alert(1)\u0027)()}}. When the user follows the link and the page renders, the login button will contain the original link with a query parameter to force a redirect to the login page. The URL is not validated and the AngularJS rendering engine will execute the JavaScript expression contained in the URL. Users are advised to upgrade as soon as possible. If for some reason you cannot upgrade, you can use a reverse proxy or similar to block access to block the literal string {{ in the path.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.x86_64",
"SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.aarch64",
"SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.ppc64le",
"SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.s390x",
"SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.x86_64",
"SUSE Manager Client Tools 12-BETA:kiwi-desc-saltboot-0.1.1687520761.cefb248-4.15.2.noarch",
"SUSE Manager Client Tools 12-BETA:mgr-push-5.0.1-4.21.4.noarch",
"SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.aarch64",
"SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.ppc64le",
"SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.s390x",
"SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.x86_64",
"SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.aarch64",
"SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.ppc64le",
"SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.s390x",
"SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.x86_64",
"SUSE Manager Client Tools 12-BETA:python2-hwdata-2.3.5-15.12.2.noarch",
"SUSE Manager Client Tools 12-BETA:python2-mgr-push-5.0.1-4.21.4.noarch",
"SUSE Manager Client Tools 12-BETA:python2-rhnlib-5.0.1-24.30.3.noarch",
"SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.aarch64",
"SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.ppc64le",
"SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.s390x",
"SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.x86_64",
"SUSE Manager Client Tools 12-BETA:spacecmd-5.0.1-41.42.3.noarch",
"SUSE Manager Client Tools 12-BETA:supportutils-plugin-salt-1.2.2-9.9.2.noarch",
"SUSE Manager Client Tools 12-BETA:supportutils-plugin-susemanager-client-5.0.1-9.15.2.noarch",
"SUSE Manager Client Tools 12-BETA:system-user-grafana-1.0.0-3.7.2.noarch",
"SUSE Manager Client Tools 12-BETA:system-user-prometheus-1.0.0-3.7.2.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-41174",
"url": "https://www.suse.com/security/cve/CVE-2021-41174"
},
{
"category": "external",
"summary": "SUSE Bug 1192383 for CVE-2021-41174",
"url": "https://bugzilla.suse.com/1192383"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.x86_64",
"SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.aarch64",
"SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.ppc64le",
"SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.s390x",
"SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.x86_64",
"SUSE Manager Client Tools 12-BETA:kiwi-desc-saltboot-0.1.1687520761.cefb248-4.15.2.noarch",
"SUSE Manager Client Tools 12-BETA:mgr-push-5.0.1-4.21.4.noarch",
"SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.aarch64",
"SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.ppc64le",
"SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.s390x",
"SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.x86_64",
"SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.aarch64",
"SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.ppc64le",
"SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.s390x",
"SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.x86_64",
"SUSE Manager Client Tools 12-BETA:python2-hwdata-2.3.5-15.12.2.noarch",
"SUSE Manager Client Tools 12-BETA:python2-mgr-push-5.0.1-4.21.4.noarch",
"SUSE Manager Client Tools 12-BETA:python2-rhnlib-5.0.1-24.30.3.noarch",
"SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.aarch64",
"SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.ppc64le",
"SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.s390x",
"SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.x86_64",
"SUSE Manager Client Tools 12-BETA:spacecmd-5.0.1-41.42.3.noarch",
"SUSE Manager Client Tools 12-BETA:supportutils-plugin-salt-1.2.2-9.9.2.noarch",
"SUSE Manager Client Tools 12-BETA:supportutils-plugin-susemanager-client-5.0.1-9.15.2.noarch",
"SUSE Manager Client Tools 12-BETA:system-user-grafana-1.0.0-3.7.2.noarch",
"SUSE Manager Client Tools 12-BETA:system-user-prometheus-1.0.0-3.7.2.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:H/A:N",
"version": "3.1"
},
"products": [
"SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.x86_64",
"SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.aarch64",
"SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.ppc64le",
"SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.s390x",
"SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.x86_64",
"SUSE Manager Client Tools 12-BETA:kiwi-desc-saltboot-0.1.1687520761.cefb248-4.15.2.noarch",
"SUSE Manager Client Tools 12-BETA:mgr-push-5.0.1-4.21.4.noarch",
"SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.aarch64",
"SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.ppc64le",
"SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.s390x",
"SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.x86_64",
"SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.aarch64",
"SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.ppc64le",
"SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.s390x",
"SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.x86_64",
"SUSE Manager Client Tools 12-BETA:python2-hwdata-2.3.5-15.12.2.noarch",
"SUSE Manager Client Tools 12-BETA:python2-mgr-push-5.0.1-4.21.4.noarch",
"SUSE Manager Client Tools 12-BETA:python2-rhnlib-5.0.1-24.30.3.noarch",
"SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.aarch64",
"SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.ppc64le",
"SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.s390x",
"SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.x86_64",
"SUSE Manager Client Tools 12-BETA:spacecmd-5.0.1-41.42.3.noarch",
"SUSE Manager Client Tools 12-BETA:supportutils-plugin-salt-1.2.2-9.9.2.noarch",
"SUSE Manager Client Tools 12-BETA:supportutils-plugin-susemanager-client-5.0.1-9.15.2.noarch",
"SUSE Manager Client Tools 12-BETA:system-user-grafana-1.0.0-3.7.2.noarch",
"SUSE Manager Client Tools 12-BETA:system-user-prometheus-1.0.0-3.7.2.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-01-23T15:18:14Z",
"details": "moderate"
}
],
"title": "CVE-2021-41174"
},
{
"cve": "CVE-2021-41244",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-41244"
}
],
"notes": [
{
"category": "general",
"text": "Grafana is an open-source platform for monitoring and observability. In affected versions when the fine-grained access control beta feature is enabled and there is more than one organization in the Grafana instance admins are able to access users from other organizations. Grafana 8.0 introduced a mechanism which allowed users with the Organization Admin role to list, add, remove, and update users\u0027 roles in other organizations in which they are not an admin. With fine-grained access control enabled, organization admins can list, add, remove and update users\u0027 roles in another organization, where they do not have organization admin role. All installations between v8.0 and v8.2.3 that have fine-grained access control beta enabled and more than one organization should be upgraded as soon as possible. If you cannot upgrade, you should turn off the fine-grained access control using a feature flag.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.x86_64",
"SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.aarch64",
"SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.ppc64le",
"SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.s390x",
"SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.x86_64",
"SUSE Manager Client Tools 12-BETA:kiwi-desc-saltboot-0.1.1687520761.cefb248-4.15.2.noarch",
"SUSE Manager Client Tools 12-BETA:mgr-push-5.0.1-4.21.4.noarch",
"SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.aarch64",
"SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.ppc64le",
"SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.s390x",
"SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.x86_64",
"SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.aarch64",
"SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.ppc64le",
"SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.s390x",
"SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.x86_64",
"SUSE Manager Client Tools 12-BETA:python2-hwdata-2.3.5-15.12.2.noarch",
"SUSE Manager Client Tools 12-BETA:python2-mgr-push-5.0.1-4.21.4.noarch",
"SUSE Manager Client Tools 12-BETA:python2-rhnlib-5.0.1-24.30.3.noarch",
"SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.aarch64",
"SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.ppc64le",
"SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.s390x",
"SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.x86_64",
"SUSE Manager Client Tools 12-BETA:spacecmd-5.0.1-41.42.3.noarch",
"SUSE Manager Client Tools 12-BETA:supportutils-plugin-salt-1.2.2-9.9.2.noarch",
"SUSE Manager Client Tools 12-BETA:supportutils-plugin-susemanager-client-5.0.1-9.15.2.noarch",
"SUSE Manager Client Tools 12-BETA:system-user-grafana-1.0.0-3.7.2.noarch",
"SUSE Manager Client Tools 12-BETA:system-user-prometheus-1.0.0-3.7.2.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-41244",
"url": "https://www.suse.com/security/cve/CVE-2021-41244"
},
{
"category": "external",
"summary": "SUSE Bug 1192763 for CVE-2021-41244",
"url": "https://bugzilla.suse.com/1192763"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.x86_64",
"SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.aarch64",
"SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.ppc64le",
"SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.s390x",
"SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.x86_64",
"SUSE Manager Client Tools 12-BETA:kiwi-desc-saltboot-0.1.1687520761.cefb248-4.15.2.noarch",
"SUSE Manager Client Tools 12-BETA:mgr-push-5.0.1-4.21.4.noarch",
"SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.aarch64",
"SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.ppc64le",
"SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.s390x",
"SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.x86_64",
"SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.aarch64",
"SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.ppc64le",
"SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.s390x",
"SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.x86_64",
"SUSE Manager Client Tools 12-BETA:python2-hwdata-2.3.5-15.12.2.noarch",
"SUSE Manager Client Tools 12-BETA:python2-mgr-push-5.0.1-4.21.4.noarch",
"SUSE Manager Client Tools 12-BETA:python2-rhnlib-5.0.1-24.30.3.noarch",
"SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.aarch64",
"SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.ppc64le",
"SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.s390x",
"SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.x86_64",
"SUSE Manager Client Tools 12-BETA:spacecmd-5.0.1-41.42.3.noarch",
"SUSE Manager Client Tools 12-BETA:supportutils-plugin-salt-1.2.2-9.9.2.noarch",
"SUSE Manager Client Tools 12-BETA:supportutils-plugin-susemanager-client-5.0.1-9.15.2.noarch",
"SUSE Manager Client Tools 12-BETA:system-user-grafana-1.0.0-3.7.2.noarch",
"SUSE Manager Client Tools 12-BETA:system-user-prometheus-1.0.0-3.7.2.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.1,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.x86_64",
"SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.aarch64",
"SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.ppc64le",
"SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.s390x",
"SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.x86_64",
"SUSE Manager Client Tools 12-BETA:kiwi-desc-saltboot-0.1.1687520761.cefb248-4.15.2.noarch",
"SUSE Manager Client Tools 12-BETA:mgr-push-5.0.1-4.21.4.noarch",
"SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.aarch64",
"SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.ppc64le",
"SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.s390x",
"SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.x86_64",
"SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.aarch64",
"SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.ppc64le",
"SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.s390x",
"SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.x86_64",
"SUSE Manager Client Tools 12-BETA:python2-hwdata-2.3.5-15.12.2.noarch",
"SUSE Manager Client Tools 12-BETA:python2-mgr-push-5.0.1-4.21.4.noarch",
"SUSE Manager Client Tools 12-BETA:python2-rhnlib-5.0.1-24.30.3.noarch",
"SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.aarch64",
"SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.ppc64le",
"SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.s390x",
"SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.x86_64",
"SUSE Manager Client Tools 12-BETA:spacecmd-5.0.1-41.42.3.noarch",
"SUSE Manager Client Tools 12-BETA:supportutils-plugin-salt-1.2.2-9.9.2.noarch",
"SUSE Manager Client Tools 12-BETA:supportutils-plugin-susemanager-client-5.0.1-9.15.2.noarch",
"SUSE Manager Client Tools 12-BETA:system-user-grafana-1.0.0-3.7.2.noarch",
"SUSE Manager Client Tools 12-BETA:system-user-prometheus-1.0.0-3.7.2.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-01-23T15:18:14Z",
"details": "critical"
}
],
"title": "CVE-2021-41244"
},
{
"cve": "CVE-2021-43138",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-43138"
}
],
"notes": [
{
"category": "general",
"text": "In Async before 2.6.4 and 3.x before 3.2.2, a malicious user can obtain privileges via the mapValues() method, aka lib/internal/iterator.js createObjectIterator prototype pollution.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.x86_64",
"SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.aarch64",
"SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.ppc64le",
"SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.s390x",
"SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.x86_64",
"SUSE Manager Client Tools 12-BETA:kiwi-desc-saltboot-0.1.1687520761.cefb248-4.15.2.noarch",
"SUSE Manager Client Tools 12-BETA:mgr-push-5.0.1-4.21.4.noarch",
"SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.aarch64",
"SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.ppc64le",
"SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.s390x",
"SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.x86_64",
"SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.aarch64",
"SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.ppc64le",
"SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.s390x",
"SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.x86_64",
"SUSE Manager Client Tools 12-BETA:python2-hwdata-2.3.5-15.12.2.noarch",
"SUSE Manager Client Tools 12-BETA:python2-mgr-push-5.0.1-4.21.4.noarch",
"SUSE Manager Client Tools 12-BETA:python2-rhnlib-5.0.1-24.30.3.noarch",
"SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.aarch64",
"SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.ppc64le",
"SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.s390x",
"SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.x86_64",
"SUSE Manager Client Tools 12-BETA:spacecmd-5.0.1-41.42.3.noarch",
"SUSE Manager Client Tools 12-BETA:supportutils-plugin-salt-1.2.2-9.9.2.noarch",
"SUSE Manager Client Tools 12-BETA:supportutils-plugin-susemanager-client-5.0.1-9.15.2.noarch",
"SUSE Manager Client Tools 12-BETA:system-user-grafana-1.0.0-3.7.2.noarch",
"SUSE Manager Client Tools 12-BETA:system-user-prometheus-1.0.0-3.7.2.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-43138",
"url": "https://www.suse.com/security/cve/CVE-2021-43138"
},
{
"category": "external",
"summary": "SUSE Bug 1200480 for CVE-2021-43138",
"url": "https://bugzilla.suse.com/1200480"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.x86_64",
"SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.aarch64",
"SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.ppc64le",
"SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.s390x",
"SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.x86_64",
"SUSE Manager Client Tools 12-BETA:kiwi-desc-saltboot-0.1.1687520761.cefb248-4.15.2.noarch",
"SUSE Manager Client Tools 12-BETA:mgr-push-5.0.1-4.21.4.noarch",
"SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.aarch64",
"SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.ppc64le",
"SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.s390x",
"SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.x86_64",
"SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.aarch64",
"SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.ppc64le",
"SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.s390x",
"SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.x86_64",
"SUSE Manager Client Tools 12-BETA:python2-hwdata-2.3.5-15.12.2.noarch",
"SUSE Manager Client Tools 12-BETA:python2-mgr-push-5.0.1-4.21.4.noarch",
"SUSE Manager Client Tools 12-BETA:python2-rhnlib-5.0.1-24.30.3.noarch",
"SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.aarch64",
"SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.ppc64le",
"SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.s390x",
"SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.x86_64",
"SUSE Manager Client Tools 12-BETA:spacecmd-5.0.1-41.42.3.noarch",
"SUSE Manager Client Tools 12-BETA:supportutils-plugin-salt-1.2.2-9.9.2.noarch",
"SUSE Manager Client Tools 12-BETA:supportutils-plugin-susemanager-client-5.0.1-9.15.2.noarch",
"SUSE Manager Client Tools 12-BETA:system-user-grafana-1.0.0-3.7.2.noarch",
"SUSE Manager Client Tools 12-BETA:system-user-prometheus-1.0.0-3.7.2.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.x86_64",
"SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.aarch64",
"SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.ppc64le",
"SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.s390x",
"SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.x86_64",
"SUSE Manager Client Tools 12-BETA:kiwi-desc-saltboot-0.1.1687520761.cefb248-4.15.2.noarch",
"SUSE Manager Client Tools 12-BETA:mgr-push-5.0.1-4.21.4.noarch",
"SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.aarch64",
"SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.ppc64le",
"SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.s390x",
"SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.x86_64",
"SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.aarch64",
"SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.ppc64le",
"SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.s390x",
"SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.x86_64",
"SUSE Manager Client Tools 12-BETA:python2-hwdata-2.3.5-15.12.2.noarch",
"SUSE Manager Client Tools 12-BETA:python2-mgr-push-5.0.1-4.21.4.noarch",
"SUSE Manager Client Tools 12-BETA:python2-rhnlib-5.0.1-24.30.3.noarch",
"SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.aarch64",
"SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.ppc64le",
"SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.s390x",
"SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.x86_64",
"SUSE Manager Client Tools 12-BETA:spacecmd-5.0.1-41.42.3.noarch",
"SUSE Manager Client Tools 12-BETA:supportutils-plugin-salt-1.2.2-9.9.2.noarch",
"SUSE Manager Client Tools 12-BETA:supportutils-plugin-susemanager-client-5.0.1-9.15.2.noarch",
"SUSE Manager Client Tools 12-BETA:system-user-grafana-1.0.0-3.7.2.noarch",
"SUSE Manager Client Tools 12-BETA:system-user-prometheus-1.0.0-3.7.2.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-01-23T15:18:14Z",
"details": "important"
}
],
"title": "CVE-2021-43138"
},
{
"cve": "CVE-2021-43798",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-43798"
}
],
"notes": [
{
"category": "general",
"text": "Grafana is an open-source platform for monitoring and observability. Grafana versions 8.0.0-beta1 through 8.3.0 (except for patched versions) iss vulnerable to directory traversal, allowing access to local files. The vulnerable URL path is: `\u003cgrafana_host_url\u003e/public/plugins//`, where is the plugin ID for any installed plugin. At no time has Grafana Cloud been vulnerable. Users are advised to upgrade to patched versions 8.0.7, 8.1.8, 8.2.7, or 8.3.1. The GitHub Security Advisory contains more information about vulnerable URL paths, mitigation, and the disclosure timeline.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.x86_64",
"SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.aarch64",
"SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.ppc64le",
"SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.s390x",
"SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.x86_64",
"SUSE Manager Client Tools 12-BETA:kiwi-desc-saltboot-0.1.1687520761.cefb248-4.15.2.noarch",
"SUSE Manager Client Tools 12-BETA:mgr-push-5.0.1-4.21.4.noarch",
"SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.aarch64",
"SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.ppc64le",
"SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.s390x",
"SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.x86_64",
"SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.aarch64",
"SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.ppc64le",
"SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.s390x",
"SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.x86_64",
"SUSE Manager Client Tools 12-BETA:python2-hwdata-2.3.5-15.12.2.noarch",
"SUSE Manager Client Tools 12-BETA:python2-mgr-push-5.0.1-4.21.4.noarch",
"SUSE Manager Client Tools 12-BETA:python2-rhnlib-5.0.1-24.30.3.noarch",
"SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.aarch64",
"SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.ppc64le",
"SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.s390x",
"SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.x86_64",
"SUSE Manager Client Tools 12-BETA:spacecmd-5.0.1-41.42.3.noarch",
"SUSE Manager Client Tools 12-BETA:supportutils-plugin-salt-1.2.2-9.9.2.noarch",
"SUSE Manager Client Tools 12-BETA:supportutils-plugin-susemanager-client-5.0.1-9.15.2.noarch",
"SUSE Manager Client Tools 12-BETA:system-user-grafana-1.0.0-3.7.2.noarch",
"SUSE Manager Client Tools 12-BETA:system-user-prometheus-1.0.0-3.7.2.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-43798",
"url": "https://www.suse.com/security/cve/CVE-2021-43798"
},
{
"category": "external",
"summary": "SUSE Bug 1193492 for CVE-2021-43798",
"url": "https://bugzilla.suse.com/1193492"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.x86_64",
"SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.aarch64",
"SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.ppc64le",
"SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.s390x",
"SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.x86_64",
"SUSE Manager Client Tools 12-BETA:kiwi-desc-saltboot-0.1.1687520761.cefb248-4.15.2.noarch",
"SUSE Manager Client Tools 12-BETA:mgr-push-5.0.1-4.21.4.noarch",
"SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.aarch64",
"SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.ppc64le",
"SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.s390x",
"SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.x86_64",
"SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.aarch64",
"SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.ppc64le",
"SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.s390x",
"SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.x86_64",
"SUSE Manager Client Tools 12-BETA:python2-hwdata-2.3.5-15.12.2.noarch",
"SUSE Manager Client Tools 12-BETA:python2-mgr-push-5.0.1-4.21.4.noarch",
"SUSE Manager Client Tools 12-BETA:python2-rhnlib-5.0.1-24.30.3.noarch",
"SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.aarch64",
"SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.ppc64le",
"SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.s390x",
"SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.x86_64",
"SUSE Manager Client Tools 12-BETA:spacecmd-5.0.1-41.42.3.noarch",
"SUSE Manager Client Tools 12-BETA:supportutils-plugin-salt-1.2.2-9.9.2.noarch",
"SUSE Manager Client Tools 12-BETA:supportutils-plugin-susemanager-client-5.0.1-9.15.2.noarch",
"SUSE Manager Client Tools 12-BETA:system-user-grafana-1.0.0-3.7.2.noarch",
"SUSE Manager Client Tools 12-BETA:system-user-prometheus-1.0.0-3.7.2.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.x86_64",
"SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.aarch64",
"SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.ppc64le",
"SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.s390x",
"SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.x86_64",
"SUSE Manager Client Tools 12-BETA:kiwi-desc-saltboot-0.1.1687520761.cefb248-4.15.2.noarch",
"SUSE Manager Client Tools 12-BETA:mgr-push-5.0.1-4.21.4.noarch",
"SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.aarch64",
"SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.ppc64le",
"SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.s390x",
"SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.x86_64",
"SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.aarch64",
"SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.ppc64le",
"SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.s390x",
"SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.x86_64",
"SUSE Manager Client Tools 12-BETA:python2-hwdata-2.3.5-15.12.2.noarch",
"SUSE Manager Client Tools 12-BETA:python2-mgr-push-5.0.1-4.21.4.noarch",
"SUSE Manager Client Tools 12-BETA:python2-rhnlib-5.0.1-24.30.3.noarch",
"SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.aarch64",
"SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.ppc64le",
"SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.s390x",
"SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.x86_64",
"SUSE Manager Client Tools 12-BETA:spacecmd-5.0.1-41.42.3.noarch",
"SUSE Manager Client Tools 12-BETA:supportutils-plugin-salt-1.2.2-9.9.2.noarch",
"SUSE Manager Client Tools 12-BETA:supportutils-plugin-susemanager-client-5.0.1-9.15.2.noarch",
"SUSE Manager Client Tools 12-BETA:system-user-grafana-1.0.0-3.7.2.noarch",
"SUSE Manager Client Tools 12-BETA:system-user-prometheus-1.0.0-3.7.2.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-01-23T15:18:14Z",
"details": "important"
}
],
"title": "CVE-2021-43798"
},
{
"cve": "CVE-2021-43813",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-43813"
}
],
"notes": [
{
"category": "general",
"text": "Grafana is an open-source platform for monitoring and observability. Grafana prior to versions 8.3.2 and 7.5.12 contains a directory traversal vulnerability for fully lowercase or fully uppercase .md files. The vulnerability is limited in scope, and only allows access to files with the extension .md to authenticated users only. Grafana Cloud instances have not been affected by the vulnerability. Users should upgrade to patched versions 8.3.2 or 7.5.12. For users who cannot upgrade, running a reverse proxy in front of Grafana that normalizes the PATH of the request will mitigate the vulnerability. The proxy will have to also be able to handle url encoded paths. Alternatively, for fully lowercase or fully uppercase .md files, users can block /api/plugins/.*/markdown/.* without losing any functionality beyond inlined plugin help text.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.x86_64",
"SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.aarch64",
"SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.ppc64le",
"SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.s390x",
"SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.x86_64",
"SUSE Manager Client Tools 12-BETA:kiwi-desc-saltboot-0.1.1687520761.cefb248-4.15.2.noarch",
"SUSE Manager Client Tools 12-BETA:mgr-push-5.0.1-4.21.4.noarch",
"SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.aarch64",
"SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.ppc64le",
"SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.s390x",
"SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.x86_64",
"SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.aarch64",
"SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.ppc64le",
"SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.s390x",
"SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.x86_64",
"SUSE Manager Client Tools 12-BETA:python2-hwdata-2.3.5-15.12.2.noarch",
"SUSE Manager Client Tools 12-BETA:python2-mgr-push-5.0.1-4.21.4.noarch",
"SUSE Manager Client Tools 12-BETA:python2-rhnlib-5.0.1-24.30.3.noarch",
"SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.aarch64",
"SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.ppc64le",
"SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.s390x",
"SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.x86_64",
"SUSE Manager Client Tools 12-BETA:spacecmd-5.0.1-41.42.3.noarch",
"SUSE Manager Client Tools 12-BETA:supportutils-plugin-salt-1.2.2-9.9.2.noarch",
"SUSE Manager Client Tools 12-BETA:supportutils-plugin-susemanager-client-5.0.1-9.15.2.noarch",
"SUSE Manager Client Tools 12-BETA:system-user-grafana-1.0.0-3.7.2.noarch",
"SUSE Manager Client Tools 12-BETA:system-user-prometheus-1.0.0-3.7.2.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-43813",
"url": "https://www.suse.com/security/cve/CVE-2021-43813"
},
{
"category": "external",
"summary": "SUSE Bug 1193686 for CVE-2021-43813",
"url": "https://bugzilla.suse.com/1193686"
},
{
"category": "external",
"summary": "SUSE Bug 1193688 for CVE-2021-43813",
"url": "https://bugzilla.suse.com/1193688"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.x86_64",
"SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.aarch64",
"SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.ppc64le",
"SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.s390x",
"SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.x86_64",
"SUSE Manager Client Tools 12-BETA:kiwi-desc-saltboot-0.1.1687520761.cefb248-4.15.2.noarch",
"SUSE Manager Client Tools 12-BETA:mgr-push-5.0.1-4.21.4.noarch",
"SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.aarch64",
"SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.ppc64le",
"SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.s390x",
"SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.x86_64",
"SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.aarch64",
"SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.ppc64le",
"SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.s390x",
"SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.x86_64",
"SUSE Manager Client Tools 12-BETA:python2-hwdata-2.3.5-15.12.2.noarch",
"SUSE Manager Client Tools 12-BETA:python2-mgr-push-5.0.1-4.21.4.noarch",
"SUSE Manager Client Tools 12-BETA:python2-rhnlib-5.0.1-24.30.3.noarch",
"SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.aarch64",
"SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.ppc64le",
"SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.s390x",
"SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.x86_64",
"SUSE Manager Client Tools 12-BETA:spacecmd-5.0.1-41.42.3.noarch",
"SUSE Manager Client Tools 12-BETA:supportutils-plugin-salt-1.2.2-9.9.2.noarch",
"SUSE Manager Client Tools 12-BETA:supportutils-plugin-susemanager-client-5.0.1-9.15.2.noarch",
"SUSE Manager Client Tools 12-BETA:system-user-grafana-1.0.0-3.7.2.noarch",
"SUSE Manager Client Tools 12-BETA:system-user-prometheus-1.0.0-3.7.2.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.x86_64",
"SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.aarch64",
"SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.ppc64le",
"SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.s390x",
"SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.x86_64",
"SUSE Manager Client Tools 12-BETA:kiwi-desc-saltboot-0.1.1687520761.cefb248-4.15.2.noarch",
"SUSE Manager Client Tools 12-BETA:mgr-push-5.0.1-4.21.4.noarch",
"SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.aarch64",
"SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.ppc64le",
"SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.s390x",
"SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.x86_64",
"SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.aarch64",
"SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.ppc64le",
"SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.s390x",
"SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.x86_64",
"SUSE Manager Client Tools 12-BETA:python2-hwdata-2.3.5-15.12.2.noarch",
"SUSE Manager Client Tools 12-BETA:python2-mgr-push-5.0.1-4.21.4.noarch",
"SUSE Manager Client Tools 12-BETA:python2-rhnlib-5.0.1-24.30.3.noarch",
"SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.aarch64",
"SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.ppc64le",
"SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.s390x",
"SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.x86_64",
"SUSE Manager Client Tools 12-BETA:spacecmd-5.0.1-41.42.3.noarch",
"SUSE Manager Client Tools 12-BETA:supportutils-plugin-salt-1.2.2-9.9.2.noarch",
"SUSE Manager Client Tools 12-BETA:supportutils-plugin-susemanager-client-5.0.1-9.15.2.noarch",
"SUSE Manager Client Tools 12-BETA:system-user-grafana-1.0.0-3.7.2.noarch",
"SUSE Manager Client Tools 12-BETA:system-user-prometheus-1.0.0-3.7.2.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-01-23T15:18:14Z",
"details": "moderate"
}
],
"title": "CVE-2021-43813"
},
{
"cve": "CVE-2021-43815",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-43815"
}
],
"notes": [
{
"category": "general",
"text": "Grafana is an open-source platform for monitoring and observability. Grafana prior to versions 8.3.2 and 7.5.12 has a directory traversal for arbitrary .csv files. It only affects instances that have the developer testing tool called TestData DB data source enabled and configured. The vulnerability is limited in scope, and only allows access to files with the extension .csv to authenticated users only. Grafana Cloud instances have not been affected by the vulnerability. Versions 8.3.2 and 7.5.12 contain a patch for this issue. There is a workaround available for users who cannot upgrade. Running a reverse proxy in front of Grafana that normalizes the PATH of the request will mitigate the vulnerability. The proxy will have to also be able to handle url encoded paths.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.x86_64",
"SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.aarch64",
"SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.ppc64le",
"SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.s390x",
"SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.x86_64",
"SUSE Manager Client Tools 12-BETA:kiwi-desc-saltboot-0.1.1687520761.cefb248-4.15.2.noarch",
"SUSE Manager Client Tools 12-BETA:mgr-push-5.0.1-4.21.4.noarch",
"SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.aarch64",
"SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.ppc64le",
"SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.s390x",
"SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.x86_64",
"SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.aarch64",
"SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.ppc64le",
"SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.s390x",
"SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.x86_64",
"SUSE Manager Client Tools 12-BETA:python2-hwdata-2.3.5-15.12.2.noarch",
"SUSE Manager Client Tools 12-BETA:python2-mgr-push-5.0.1-4.21.4.noarch",
"SUSE Manager Client Tools 12-BETA:python2-rhnlib-5.0.1-24.30.3.noarch",
"SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.aarch64",
"SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.ppc64le",
"SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.s390x",
"SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.x86_64",
"SUSE Manager Client Tools 12-BETA:spacecmd-5.0.1-41.42.3.noarch",
"SUSE Manager Client Tools 12-BETA:supportutils-plugin-salt-1.2.2-9.9.2.noarch",
"SUSE Manager Client Tools 12-BETA:supportutils-plugin-susemanager-client-5.0.1-9.15.2.noarch",
"SUSE Manager Client Tools 12-BETA:system-user-grafana-1.0.0-3.7.2.noarch",
"SUSE Manager Client Tools 12-BETA:system-user-prometheus-1.0.0-3.7.2.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-43815",
"url": "https://www.suse.com/security/cve/CVE-2021-43815"
},
{
"category": "external",
"summary": "SUSE Bug 1193686 for CVE-2021-43815",
"url": "https://bugzilla.suse.com/1193686"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.x86_64",
"SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.aarch64",
"SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.ppc64le",
"SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.s390x",
"SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.x86_64",
"SUSE Manager Client Tools 12-BETA:kiwi-desc-saltboot-0.1.1687520761.cefb248-4.15.2.noarch",
"SUSE Manager Client Tools 12-BETA:mgr-push-5.0.1-4.21.4.noarch",
"SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.aarch64",
"SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.ppc64le",
"SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.s390x",
"SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.x86_64",
"SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.aarch64",
"SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.ppc64le",
"SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.s390x",
"SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.x86_64",
"SUSE Manager Client Tools 12-BETA:python2-hwdata-2.3.5-15.12.2.noarch",
"SUSE Manager Client Tools 12-BETA:python2-mgr-push-5.0.1-4.21.4.noarch",
"SUSE Manager Client Tools 12-BETA:python2-rhnlib-5.0.1-24.30.3.noarch",
"SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.aarch64",
"SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.ppc64le",
"SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.s390x",
"SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.x86_64",
"SUSE Manager Client Tools 12-BETA:spacecmd-5.0.1-41.42.3.noarch",
"SUSE Manager Client Tools 12-BETA:supportutils-plugin-salt-1.2.2-9.9.2.noarch",
"SUSE Manager Client Tools 12-BETA:supportutils-plugin-susemanager-client-5.0.1-9.15.2.noarch",
"SUSE Manager Client Tools 12-BETA:system-user-grafana-1.0.0-3.7.2.noarch",
"SUSE Manager Client Tools 12-BETA:system-user-prometheus-1.0.0-3.7.2.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.x86_64",
"SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.aarch64",
"SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.ppc64le",
"SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.s390x",
"SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.x86_64",
"SUSE Manager Client Tools 12-BETA:kiwi-desc-saltboot-0.1.1687520761.cefb248-4.15.2.noarch",
"SUSE Manager Client Tools 12-BETA:mgr-push-5.0.1-4.21.4.noarch",
"SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.aarch64",
"SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.ppc64le",
"SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.s390x",
"SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.x86_64",
"SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.aarch64",
"SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.ppc64le",
"SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.s390x",
"SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.x86_64",
"SUSE Manager Client Tools 12-BETA:python2-hwdata-2.3.5-15.12.2.noarch",
"SUSE Manager Client Tools 12-BETA:python2-mgr-push-5.0.1-4.21.4.noarch",
"SUSE Manager Client Tools 12-BETA:python2-rhnlib-5.0.1-24.30.3.noarch",
"SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.aarch64",
"SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.ppc64le",
"SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.s390x",
"SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.x86_64",
"SUSE Manager Client Tools 12-BETA:spacecmd-5.0.1-41.42.3.noarch",
"SUSE Manager Client Tools 12-BETA:supportutils-plugin-salt-1.2.2-9.9.2.noarch",
"SUSE Manager Client Tools 12-BETA:supportutils-plugin-susemanager-client-5.0.1-9.15.2.noarch",
"SUSE Manager Client Tools 12-BETA:system-user-grafana-1.0.0-3.7.2.noarch",
"SUSE Manager Client Tools 12-BETA:system-user-prometheus-1.0.0-3.7.2.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-01-23T15:18:14Z",
"details": "moderate"
}
],
"title": "CVE-2021-43815"
},
{
"cve": "CVE-2022-0155",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-0155"
}
],
"notes": [
{
"category": "general",
"text": "follow-redirects is vulnerable to Exposure of Private Personal Information to an Unauthorized Actor",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.x86_64",
"SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.aarch64",
"SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.ppc64le",
"SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.s390x",
"SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.x86_64",
"SUSE Manager Client Tools 12-BETA:kiwi-desc-saltboot-0.1.1687520761.cefb248-4.15.2.noarch",
"SUSE Manager Client Tools 12-BETA:mgr-push-5.0.1-4.21.4.noarch",
"SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.aarch64",
"SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.ppc64le",
"SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.s390x",
"SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.x86_64",
"SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.aarch64",
"SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.ppc64le",
"SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.s390x",
"SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.x86_64",
"SUSE Manager Client Tools 12-BETA:python2-hwdata-2.3.5-15.12.2.noarch",
"SUSE Manager Client Tools 12-BETA:python2-mgr-push-5.0.1-4.21.4.noarch",
"SUSE Manager Client Tools 12-BETA:python2-rhnlib-5.0.1-24.30.3.noarch",
"SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.aarch64",
"SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.ppc64le",
"SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.s390x",
"SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.x86_64",
"SUSE Manager Client Tools 12-BETA:spacecmd-5.0.1-41.42.3.noarch",
"SUSE Manager Client Tools 12-BETA:supportutils-plugin-salt-1.2.2-9.9.2.noarch",
"SUSE Manager Client Tools 12-BETA:supportutils-plugin-susemanager-client-5.0.1-9.15.2.noarch",
"SUSE Manager Client Tools 12-BETA:system-user-grafana-1.0.0-3.7.2.noarch",
"SUSE Manager Client Tools 12-BETA:system-user-prometheus-1.0.0-3.7.2.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-0155",
"url": "https://www.suse.com/security/cve/CVE-2022-0155"
},
{
"category": "external",
"summary": "SUSE Bug 1218844 for CVE-2022-0155",
"url": "https://bugzilla.suse.com/1218844"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.x86_64",
"SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.aarch64",
"SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.ppc64le",
"SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.s390x",
"SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.x86_64",
"SUSE Manager Client Tools 12-BETA:kiwi-desc-saltboot-0.1.1687520761.cefb248-4.15.2.noarch",
"SUSE Manager Client Tools 12-BETA:mgr-push-5.0.1-4.21.4.noarch",
"SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.aarch64",
"SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.ppc64le",
"SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.s390x",
"SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.x86_64",
"SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.aarch64",
"SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.ppc64le",
"SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.s390x",
"SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.x86_64",
"SUSE Manager Client Tools 12-BETA:python2-hwdata-2.3.5-15.12.2.noarch",
"SUSE Manager Client Tools 12-BETA:python2-mgr-push-5.0.1-4.21.4.noarch",
"SUSE Manager Client Tools 12-BETA:python2-rhnlib-5.0.1-24.30.3.noarch",
"SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.aarch64",
"SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.ppc64le",
"SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.s390x",
"SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.x86_64",
"SUSE Manager Client Tools 12-BETA:spacecmd-5.0.1-41.42.3.noarch",
"SUSE Manager Client Tools 12-BETA:supportutils-plugin-salt-1.2.2-9.9.2.noarch",
"SUSE Manager Client Tools 12-BETA:supportutils-plugin-susemanager-client-5.0.1-9.15.2.noarch",
"SUSE Manager Client Tools 12-BETA:system-user-grafana-1.0.0-3.7.2.noarch",
"SUSE Manager Client Tools 12-BETA:system-user-prometheus-1.0.0-3.7.2.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.x86_64",
"SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.aarch64",
"SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.ppc64le",
"SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.s390x",
"SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.x86_64",
"SUSE Manager Client Tools 12-BETA:kiwi-desc-saltboot-0.1.1687520761.cefb248-4.15.2.noarch",
"SUSE Manager Client Tools 12-BETA:mgr-push-5.0.1-4.21.4.noarch",
"SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.aarch64",
"SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.ppc64le",
"SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.s390x",
"SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.x86_64",
"SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.aarch64",
"SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.ppc64le",
"SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.s390x",
"SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.x86_64",
"SUSE Manager Client Tools 12-BETA:python2-hwdata-2.3.5-15.12.2.noarch",
"SUSE Manager Client Tools 12-BETA:python2-mgr-push-5.0.1-4.21.4.noarch",
"SUSE Manager Client Tools 12-BETA:python2-rhnlib-5.0.1-24.30.3.noarch",
"SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.aarch64",
"SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.ppc64le",
"SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.s390x",
"SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.x86_64",
"SUSE Manager Client Tools 12-BETA:spacecmd-5.0.1-41.42.3.noarch",
"SUSE Manager Client Tools 12-BETA:supportutils-plugin-salt-1.2.2-9.9.2.noarch",
"SUSE Manager Client Tools 12-BETA:supportutils-plugin-susemanager-client-5.0.1-9.15.2.noarch",
"SUSE Manager Client Tools 12-BETA:system-user-grafana-1.0.0-3.7.2.noarch",
"SUSE Manager Client Tools 12-BETA:system-user-prometheus-1.0.0-3.7.2.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-01-23T15:18:14Z",
"details": "moderate"
}
],
"title": "CVE-2022-0155"
},
{
"cve": "CVE-2022-21673",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-21673"
}
],
"notes": [
{
"category": "general",
"text": "Grafana is an open-source platform for monitoring and observability. In affected versions when a data source has the Forward OAuth Identity feature enabled, sending a query to that datasource with an API token (and no other user credentials) will forward the OAuth Identity of the most recently logged-in user. This can allow API token holders to retrieve data for which they may not have intended access. This attack relies on the Grafana instance having data sources that support the Forward OAuth Identity feature, the Grafana instance having a data source with the Forward OAuth Identity feature toggled on, the Grafana instance having OAuth enabled, and the Grafana instance having usable API keys. This issue has been patched in versions 7.5.13 and 8.3.4.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.x86_64",
"SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.aarch64",
"SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.ppc64le",
"SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.s390x",
"SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.x86_64",
"SUSE Manager Client Tools 12-BETA:kiwi-desc-saltboot-0.1.1687520761.cefb248-4.15.2.noarch",
"SUSE Manager Client Tools 12-BETA:mgr-push-5.0.1-4.21.4.noarch",
"SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.aarch64",
"SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.ppc64le",
"SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.s390x",
"SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.x86_64",
"SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.aarch64",
"SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.ppc64le",
"SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.s390x",
"SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.x86_64",
"SUSE Manager Client Tools 12-BETA:python2-hwdata-2.3.5-15.12.2.noarch",
"SUSE Manager Client Tools 12-BETA:python2-mgr-push-5.0.1-4.21.4.noarch",
"SUSE Manager Client Tools 12-BETA:python2-rhnlib-5.0.1-24.30.3.noarch",
"SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.aarch64",
"SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.ppc64le",
"SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.s390x",
"SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.x86_64",
"SUSE Manager Client Tools 12-BETA:spacecmd-5.0.1-41.42.3.noarch",
"SUSE Manager Client Tools 12-BETA:supportutils-plugin-salt-1.2.2-9.9.2.noarch",
"SUSE Manager Client Tools 12-BETA:supportutils-plugin-susemanager-client-5.0.1-9.15.2.noarch",
"SUSE Manager Client Tools 12-BETA:system-user-grafana-1.0.0-3.7.2.noarch",
"SUSE Manager Client Tools 12-BETA:system-user-prometheus-1.0.0-3.7.2.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-21673",
"url": "https://www.suse.com/security/cve/CVE-2022-21673"
},
{
"category": "external",
"summary": "SUSE Bug 1194873 for CVE-2022-21673",
"url": "https://bugzilla.suse.com/1194873"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.x86_64",
"SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.aarch64",
"SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.ppc64le",
"SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.s390x",
"SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.x86_64",
"SUSE Manager Client Tools 12-BETA:kiwi-desc-saltboot-0.1.1687520761.cefb248-4.15.2.noarch",
"SUSE Manager Client Tools 12-BETA:mgr-push-5.0.1-4.21.4.noarch",
"SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.aarch64",
"SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.ppc64le",
"SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.s390x",
"SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.x86_64",
"SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.aarch64",
"SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.ppc64le",
"SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.s390x",
"SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.x86_64",
"SUSE Manager Client Tools 12-BETA:python2-hwdata-2.3.5-15.12.2.noarch",
"SUSE Manager Client Tools 12-BETA:python2-mgr-push-5.0.1-4.21.4.noarch",
"SUSE Manager Client Tools 12-BETA:python2-rhnlib-5.0.1-24.30.3.noarch",
"SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.aarch64",
"SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.ppc64le",
"SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.s390x",
"SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.x86_64",
"SUSE Manager Client Tools 12-BETA:spacecmd-5.0.1-41.42.3.noarch",
"SUSE Manager Client Tools 12-BETA:supportutils-plugin-salt-1.2.2-9.9.2.noarch",
"SUSE Manager Client Tools 12-BETA:supportutils-plugin-susemanager-client-5.0.1-9.15.2.noarch",
"SUSE Manager Client Tools 12-BETA:system-user-grafana-1.0.0-3.7.2.noarch",
"SUSE Manager Client Tools 12-BETA:system-user-prometheus-1.0.0-3.7.2.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.x86_64",
"SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.aarch64",
"SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.ppc64le",
"SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.s390x",
"SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.x86_64",
"SUSE Manager Client Tools 12-BETA:kiwi-desc-saltboot-0.1.1687520761.cefb248-4.15.2.noarch",
"SUSE Manager Client Tools 12-BETA:mgr-push-5.0.1-4.21.4.noarch",
"SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.aarch64",
"SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.ppc64le",
"SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.s390x",
"SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.x86_64",
"SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.aarch64",
"SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.ppc64le",
"SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.s390x",
"SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.x86_64",
"SUSE Manager Client Tools 12-BETA:python2-hwdata-2.3.5-15.12.2.noarch",
"SUSE Manager Client Tools 12-BETA:python2-mgr-push-5.0.1-4.21.4.noarch",
"SUSE Manager Client Tools 12-BETA:python2-rhnlib-5.0.1-24.30.3.noarch",
"SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.aarch64",
"SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.ppc64le",
"SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.s390x",
"SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.x86_64",
"SUSE Manager Client Tools 12-BETA:spacecmd-5.0.1-41.42.3.noarch",
"SUSE Manager Client Tools 12-BETA:supportutils-plugin-salt-1.2.2-9.9.2.noarch",
"SUSE Manager Client Tools 12-BETA:supportutils-plugin-susemanager-client-5.0.1-9.15.2.noarch",
"SUSE Manager Client Tools 12-BETA:system-user-grafana-1.0.0-3.7.2.noarch",
"SUSE Manager Client Tools 12-BETA:system-user-prometheus-1.0.0-3.7.2.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-01-23T15:18:14Z",
"details": "moderate"
}
],
"title": "CVE-2022-21673"
},
{
"cve": "CVE-2022-21698",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-21698"
}
],
"notes": [
{
"category": "general",
"text": "client_golang is the instrumentation library for Go applications in Prometheus, and the promhttp package in client_golang provides tooling around HTTP servers and clients. In client_golang prior to version 1.11.1, HTTP server is susceptible to a Denial of Service through unbounded cardinality, and potential memory exhaustion, when handling requests with non-standard HTTP methods. In order to be affected, an instrumented software must use any of `promhttp.InstrumentHandler*` middleware except `RequestsInFlight`; not filter any specific methods (e.g GET) before middleware; pass metric with `method` label name to our middleware; and not have any firewall/LB/proxy that filters away requests with unknown `method`. client_golang version 1.11.1 contains a patch for this issue. Several workarounds are available, including removing the `method` label name from counter/gauge used in the InstrumentHandler; turning off affected promhttp handlers; adding custom middleware before promhttp handler that will sanitize the request method given by Go http.Request; and using a reverse proxy or web application firewall, configured to only allow a limited set of methods.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.x86_64",
"SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.aarch64",
"SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.ppc64le",
"SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.s390x",
"SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.x86_64",
"SUSE Manager Client Tools 12-BETA:kiwi-desc-saltboot-0.1.1687520761.cefb248-4.15.2.noarch",
"SUSE Manager Client Tools 12-BETA:mgr-push-5.0.1-4.21.4.noarch",
"SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.aarch64",
"SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.ppc64le",
"SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.s390x",
"SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.x86_64",
"SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.aarch64",
"SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.ppc64le",
"SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.s390x",
"SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.x86_64",
"SUSE Manager Client Tools 12-BETA:python2-hwdata-2.3.5-15.12.2.noarch",
"SUSE Manager Client Tools 12-BETA:python2-mgr-push-5.0.1-4.21.4.noarch",
"SUSE Manager Client Tools 12-BETA:python2-rhnlib-5.0.1-24.30.3.noarch",
"SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.aarch64",
"SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.ppc64le",
"SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.s390x",
"SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.x86_64",
"SUSE Manager Client Tools 12-BETA:spacecmd-5.0.1-41.42.3.noarch",
"SUSE Manager Client Tools 12-BETA:supportutils-plugin-salt-1.2.2-9.9.2.noarch",
"SUSE Manager Client Tools 12-BETA:supportutils-plugin-susemanager-client-5.0.1-9.15.2.noarch",
"SUSE Manager Client Tools 12-BETA:system-user-grafana-1.0.0-3.7.2.noarch",
"SUSE Manager Client Tools 12-BETA:system-user-prometheus-1.0.0-3.7.2.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-21698",
"url": "https://www.suse.com/security/cve/CVE-2022-21698"
},
{
"category": "external",
"summary": "SUSE Bug 1196338 for CVE-2022-21698",
"url": "https://bugzilla.suse.com/1196338"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.x86_64",
"SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.aarch64",
"SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.ppc64le",
"SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.s390x",
"SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.x86_64",
"SUSE Manager Client Tools 12-BETA:kiwi-desc-saltboot-0.1.1687520761.cefb248-4.15.2.noarch",
"SUSE Manager Client Tools 12-BETA:mgr-push-5.0.1-4.21.4.noarch",
"SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.aarch64",
"SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.ppc64le",
"SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.s390x",
"SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.x86_64",
"SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.aarch64",
"SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.ppc64le",
"SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.s390x",
"SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.x86_64",
"SUSE Manager Client Tools 12-BETA:python2-hwdata-2.3.5-15.12.2.noarch",
"SUSE Manager Client Tools 12-BETA:python2-mgr-push-5.0.1-4.21.4.noarch",
"SUSE Manager Client Tools 12-BETA:python2-rhnlib-5.0.1-24.30.3.noarch",
"SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.aarch64",
"SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.ppc64le",
"SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.s390x",
"SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.x86_64",
"SUSE Manager Client Tools 12-BETA:spacecmd-5.0.1-41.42.3.noarch",
"SUSE Manager Client Tools 12-BETA:supportutils-plugin-salt-1.2.2-9.9.2.noarch",
"SUSE Manager Client Tools 12-BETA:supportutils-plugin-susemanager-client-5.0.1-9.15.2.noarch",
"SUSE Manager Client Tools 12-BETA:system-user-grafana-1.0.0-3.7.2.noarch",
"SUSE Manager Client Tools 12-BETA:system-user-prometheus-1.0.0-3.7.2.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.x86_64",
"SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.aarch64",
"SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.ppc64le",
"SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.s390x",
"SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.x86_64",
"SUSE Manager Client Tools 12-BETA:kiwi-desc-saltboot-0.1.1687520761.cefb248-4.15.2.noarch",
"SUSE Manager Client Tools 12-BETA:mgr-push-5.0.1-4.21.4.noarch",
"SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.aarch64",
"SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.ppc64le",
"SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.s390x",
"SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.x86_64",
"SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.aarch64",
"SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.ppc64le",
"SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.s390x",
"SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.x86_64",
"SUSE Manager Client Tools 12-BETA:python2-hwdata-2.3.5-15.12.2.noarch",
"SUSE Manager Client Tools 12-BETA:python2-mgr-push-5.0.1-4.21.4.noarch",
"SUSE Manager Client Tools 12-BETA:python2-rhnlib-5.0.1-24.30.3.noarch",
"SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.aarch64",
"SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.ppc64le",
"SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.s390x",
"SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.x86_64",
"SUSE Manager Client Tools 12-BETA:spacecmd-5.0.1-41.42.3.noarch",
"SUSE Manager Client Tools 12-BETA:supportutils-plugin-salt-1.2.2-9.9.2.noarch",
"SUSE Manager Client Tools 12-BETA:supportutils-plugin-susemanager-client-5.0.1-9.15.2.noarch",
"SUSE Manager Client Tools 12-BETA:system-user-grafana-1.0.0-3.7.2.noarch",
"SUSE Manager Client Tools 12-BETA:system-user-prometheus-1.0.0-3.7.2.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-01-23T15:18:14Z",
"details": "important"
}
],
"title": "CVE-2022-21698"
},
{
"cve": "CVE-2022-21702",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-21702"
}
],
"notes": [
{
"category": "general",
"text": "Grafana is an open-source platform for monitoring and observability. In affected versions an attacker could serve HTML content thru the Grafana datasource or plugin proxy and trick a user to visit this HTML page using a specially crafted link and execute a Cross-site Scripting (XSS) attack. The attacker could either compromise an existing datasource for a specific Grafana instance or either set up its own public service and instruct anyone to set it up in their Grafana instance. To be impacted, all of the following must be applicable. For the data source proxy: A Grafana HTTP-based datasource configured with Server as Access Mode and a URL set, the attacker has to be in control of the HTTP server serving the URL of above datasource, and a specially crafted link pointing at the attacker controlled data source must be clicked on by an authenticated user. For the plugin proxy: A Grafana HTTP-based app plugin configured and enabled with a URL set, the attacker has to be in control of the HTTP server serving the URL of above app, and a specially crafted link pointing at the attacker controlled plugin must be clocked on by an authenticated user. For the backend plugin resource: An attacker must be able to navigate an authenticated user to a compromised plugin through a crafted link. Users are advised to update to a patched version. There are no known workarounds for this vulnerability.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.x86_64",
"SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.aarch64",
"SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.ppc64le",
"SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.s390x",
"SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.x86_64",
"SUSE Manager Client Tools 12-BETA:kiwi-desc-saltboot-0.1.1687520761.cefb248-4.15.2.noarch",
"SUSE Manager Client Tools 12-BETA:mgr-push-5.0.1-4.21.4.noarch",
"SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.aarch64",
"SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.ppc64le",
"SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.s390x",
"SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.x86_64",
"SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.aarch64",
"SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.ppc64le",
"SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.s390x",
"SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.x86_64",
"SUSE Manager Client Tools 12-BETA:python2-hwdata-2.3.5-15.12.2.noarch",
"SUSE Manager Client Tools 12-BETA:python2-mgr-push-5.0.1-4.21.4.noarch",
"SUSE Manager Client Tools 12-BETA:python2-rhnlib-5.0.1-24.30.3.noarch",
"SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.aarch64",
"SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.ppc64le",
"SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.s390x",
"SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.x86_64",
"SUSE Manager Client Tools 12-BETA:spacecmd-5.0.1-41.42.3.noarch",
"SUSE Manager Client Tools 12-BETA:supportutils-plugin-salt-1.2.2-9.9.2.noarch",
"SUSE Manager Client Tools 12-BETA:supportutils-plugin-susemanager-client-5.0.1-9.15.2.noarch",
"SUSE Manager Client Tools 12-BETA:system-user-grafana-1.0.0-3.7.2.noarch",
"SUSE Manager Client Tools 12-BETA:system-user-prometheus-1.0.0-3.7.2.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-21702",
"url": "https://www.suse.com/security/cve/CVE-2022-21702"
},
{
"category": "external",
"summary": "SUSE Bug 1195726 for CVE-2022-21702",
"url": "https://bugzilla.suse.com/1195726"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.x86_64",
"SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.aarch64",
"SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.ppc64le",
"SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.s390x",
"SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.x86_64",
"SUSE Manager Client Tools 12-BETA:kiwi-desc-saltboot-0.1.1687520761.cefb248-4.15.2.noarch",
"SUSE Manager Client Tools 12-BETA:mgr-push-5.0.1-4.21.4.noarch",
"SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.aarch64",
"SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.ppc64le",
"SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.s390x",
"SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.x86_64",
"SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.aarch64",
"SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.ppc64le",
"SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.s390x",
"SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.x86_64",
"SUSE Manager Client Tools 12-BETA:python2-hwdata-2.3.5-15.12.2.noarch",
"SUSE Manager Client Tools 12-BETA:python2-mgr-push-5.0.1-4.21.4.noarch",
"SUSE Manager Client Tools 12-BETA:python2-rhnlib-5.0.1-24.30.3.noarch",
"SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.aarch64",
"SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.ppc64le",
"SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.s390x",
"SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.x86_64",
"SUSE Manager Client Tools 12-BETA:spacecmd-5.0.1-41.42.3.noarch",
"SUSE Manager Client Tools 12-BETA:supportutils-plugin-salt-1.2.2-9.9.2.noarch",
"SUSE Manager Client Tools 12-BETA:supportutils-plugin-susemanager-client-5.0.1-9.15.2.noarch",
"SUSE Manager Client Tools 12-BETA:system-user-grafana-1.0.0-3.7.2.noarch",
"SUSE Manager Client Tools 12-BETA:system-user-prometheus-1.0.0-3.7.2.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.8,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.x86_64",
"SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.aarch64",
"SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.ppc64le",
"SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.s390x",
"SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.x86_64",
"SUSE Manager Client Tools 12-BETA:kiwi-desc-saltboot-0.1.1687520761.cefb248-4.15.2.noarch",
"SUSE Manager Client Tools 12-BETA:mgr-push-5.0.1-4.21.4.noarch",
"SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.aarch64",
"SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.ppc64le",
"SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.s390x",
"SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.x86_64",
"SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.aarch64",
"SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.ppc64le",
"SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.s390x",
"SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.x86_64",
"SUSE Manager Client Tools 12-BETA:python2-hwdata-2.3.5-15.12.2.noarch",
"SUSE Manager Client Tools 12-BETA:python2-mgr-push-5.0.1-4.21.4.noarch",
"SUSE Manager Client Tools 12-BETA:python2-rhnlib-5.0.1-24.30.3.noarch",
"SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.aarch64",
"SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.ppc64le",
"SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.s390x",
"SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.x86_64",
"SUSE Manager Client Tools 12-BETA:spacecmd-5.0.1-41.42.3.noarch",
"SUSE Manager Client Tools 12-BETA:supportutils-plugin-salt-1.2.2-9.9.2.noarch",
"SUSE Manager Client Tools 12-BETA:supportutils-plugin-susemanager-client-5.0.1-9.15.2.noarch",
"SUSE Manager Client Tools 12-BETA:system-user-grafana-1.0.0-3.7.2.noarch",
"SUSE Manager Client Tools 12-BETA:system-user-prometheus-1.0.0-3.7.2.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-01-23T15:18:14Z",
"details": "moderate"
}
],
"title": "CVE-2022-21702"
},
{
"cve": "CVE-2022-21703",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-21703"
}
],
"notes": [
{
"category": "general",
"text": "Grafana is an open-source platform for monitoring and observability. Affected versions are subject to a cross site request forgery vulnerability which allows attackers to elevate their privileges by mounting cross-origin attacks against authenticated high-privilege Grafana users (for example, Editors or Admins). An attacker can exploit this vulnerability for privilege escalation by tricking an authenticated user into inviting the attacker as a new user with high privileges. Users are advised to upgrade as soon as possible. There are no known workarounds for this issue.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.x86_64",
"SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.aarch64",
"SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.ppc64le",
"SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.s390x",
"SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.x86_64",
"SUSE Manager Client Tools 12-BETA:kiwi-desc-saltboot-0.1.1687520761.cefb248-4.15.2.noarch",
"SUSE Manager Client Tools 12-BETA:mgr-push-5.0.1-4.21.4.noarch",
"SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.aarch64",
"SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.ppc64le",
"SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.s390x",
"SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.x86_64",
"SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.aarch64",
"SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.ppc64le",
"SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.s390x",
"SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.x86_64",
"SUSE Manager Client Tools 12-BETA:python2-hwdata-2.3.5-15.12.2.noarch",
"SUSE Manager Client Tools 12-BETA:python2-mgr-push-5.0.1-4.21.4.noarch",
"SUSE Manager Client Tools 12-BETA:python2-rhnlib-5.0.1-24.30.3.noarch",
"SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.aarch64",
"SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.ppc64le",
"SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.s390x",
"SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.x86_64",
"SUSE Manager Client Tools 12-BETA:spacecmd-5.0.1-41.42.3.noarch",
"SUSE Manager Client Tools 12-BETA:supportutils-plugin-salt-1.2.2-9.9.2.noarch",
"SUSE Manager Client Tools 12-BETA:supportutils-plugin-susemanager-client-5.0.1-9.15.2.noarch",
"SUSE Manager Client Tools 12-BETA:system-user-grafana-1.0.0-3.7.2.noarch",
"SUSE Manager Client Tools 12-BETA:system-user-prometheus-1.0.0-3.7.2.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-21703",
"url": "https://www.suse.com/security/cve/CVE-2022-21703"
},
{
"category": "external",
"summary": "SUSE Bug 1195727 for CVE-2022-21703",
"url": "https://bugzilla.suse.com/1195727"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.x86_64",
"SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.aarch64",
"SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.ppc64le",
"SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.s390x",
"SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.x86_64",
"SUSE Manager Client Tools 12-BETA:kiwi-desc-saltboot-0.1.1687520761.cefb248-4.15.2.noarch",
"SUSE Manager Client Tools 12-BETA:mgr-push-5.0.1-4.21.4.noarch",
"SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.aarch64",
"SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.ppc64le",
"SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.s390x",
"SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.x86_64",
"SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.aarch64",
"SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.ppc64le",
"SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.s390x",
"SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.x86_64",
"SUSE Manager Client Tools 12-BETA:python2-hwdata-2.3.5-15.12.2.noarch",
"SUSE Manager Client Tools 12-BETA:python2-mgr-push-5.0.1-4.21.4.noarch",
"SUSE Manager Client Tools 12-BETA:python2-rhnlib-5.0.1-24.30.3.noarch",
"SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.aarch64",
"SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.ppc64le",
"SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.s390x",
"SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.x86_64",
"SUSE Manager Client Tools 12-BETA:spacecmd-5.0.1-41.42.3.noarch",
"SUSE Manager Client Tools 12-BETA:supportutils-plugin-salt-1.2.2-9.9.2.noarch",
"SUSE Manager Client Tools 12-BETA:supportutils-plugin-susemanager-client-5.0.1-9.15.2.noarch",
"SUSE Manager Client Tools 12-BETA:system-user-grafana-1.0.0-3.7.2.noarch",
"SUSE Manager Client Tools 12-BETA:system-user-prometheus-1.0.0-3.7.2.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.8,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.x86_64",
"SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.aarch64",
"SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.ppc64le",
"SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.s390x",
"SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.x86_64",
"SUSE Manager Client Tools 12-BETA:kiwi-desc-saltboot-0.1.1687520761.cefb248-4.15.2.noarch",
"SUSE Manager Client Tools 12-BETA:mgr-push-5.0.1-4.21.4.noarch",
"SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.aarch64",
"SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.ppc64le",
"SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.s390x",
"SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.x86_64",
"SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.aarch64",
"SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.ppc64le",
"SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.s390x",
"SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.x86_64",
"SUSE Manager Client Tools 12-BETA:python2-hwdata-2.3.5-15.12.2.noarch",
"SUSE Manager Client Tools 12-BETA:python2-mgr-push-5.0.1-4.21.4.noarch",
"SUSE Manager Client Tools 12-BETA:python2-rhnlib-5.0.1-24.30.3.noarch",
"SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.aarch64",
"SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.ppc64le",
"SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.s390x",
"SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.x86_64",
"SUSE Manager Client Tools 12-BETA:spacecmd-5.0.1-41.42.3.noarch",
"SUSE Manager Client Tools 12-BETA:supportutils-plugin-salt-1.2.2-9.9.2.noarch",
"SUSE Manager Client Tools 12-BETA:supportutils-plugin-susemanager-client-5.0.1-9.15.2.noarch",
"SUSE Manager Client Tools 12-BETA:system-user-grafana-1.0.0-3.7.2.noarch",
"SUSE Manager Client Tools 12-BETA:system-user-prometheus-1.0.0-3.7.2.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-01-23T15:18:14Z",
"details": "moderate"
}
],
"title": "CVE-2022-21703"
},
{
"cve": "CVE-2022-21713",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-21713"
}
],
"notes": [
{
"category": "general",
"text": "Grafana is an open-source platform for monitoring and observability. Affected versions of Grafana expose multiple API endpoints which do not properly handle user authorization. `/teams/:teamId` will allow an authenticated attacker to view unintended data by querying for the specific team ID, `/teams/:search` will allow an authenticated attacker to search for teams and see the total number of available teams, including for those teams that the user does not have access to, and `/teams/:teamId/members` when editors_can_admin flag is enabled, an authenticated attacker can see unintended data by querying for the specific team ID. Users are advised to upgrade as soon as possible. There are no known workarounds for this issue.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.x86_64",
"SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.aarch64",
"SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.ppc64le",
"SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.s390x",
"SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.x86_64",
"SUSE Manager Client Tools 12-BETA:kiwi-desc-saltboot-0.1.1687520761.cefb248-4.15.2.noarch",
"SUSE Manager Client Tools 12-BETA:mgr-push-5.0.1-4.21.4.noarch",
"SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.aarch64",
"SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.ppc64le",
"SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.s390x",
"SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.x86_64",
"SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.aarch64",
"SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.ppc64le",
"SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.s390x",
"SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.x86_64",
"SUSE Manager Client Tools 12-BETA:python2-hwdata-2.3.5-15.12.2.noarch",
"SUSE Manager Client Tools 12-BETA:python2-mgr-push-5.0.1-4.21.4.noarch",
"SUSE Manager Client Tools 12-BETA:python2-rhnlib-5.0.1-24.30.3.noarch",
"SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.aarch64",
"SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.ppc64le",
"SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.s390x",
"SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.x86_64",
"SUSE Manager Client Tools 12-BETA:spacecmd-5.0.1-41.42.3.noarch",
"SUSE Manager Client Tools 12-BETA:supportutils-plugin-salt-1.2.2-9.9.2.noarch",
"SUSE Manager Client Tools 12-BETA:supportutils-plugin-susemanager-client-5.0.1-9.15.2.noarch",
"SUSE Manager Client Tools 12-BETA:system-user-grafana-1.0.0-3.7.2.noarch",
"SUSE Manager Client Tools 12-BETA:system-user-prometheus-1.0.0-3.7.2.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-21713",
"url": "https://www.suse.com/security/cve/CVE-2022-21713"
},
{
"category": "external",
"summary": "SUSE Bug 1195728 for CVE-2022-21713",
"url": "https://bugzilla.suse.com/1195728"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.x86_64",
"SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.aarch64",
"SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.ppc64le",
"SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.s390x",
"SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.x86_64",
"SUSE Manager Client Tools 12-BETA:kiwi-desc-saltboot-0.1.1687520761.cefb248-4.15.2.noarch",
"SUSE Manager Client Tools 12-BETA:mgr-push-5.0.1-4.21.4.noarch",
"SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.aarch64",
"SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.ppc64le",
"SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.s390x",
"SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.x86_64",
"SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.aarch64",
"SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.ppc64le",
"SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.s390x",
"SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.x86_64",
"SUSE Manager Client Tools 12-BETA:python2-hwdata-2.3.5-15.12.2.noarch",
"SUSE Manager Client Tools 12-BETA:python2-mgr-push-5.0.1-4.21.4.noarch",
"SUSE Manager Client Tools 12-BETA:python2-rhnlib-5.0.1-24.30.3.noarch",
"SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.aarch64",
"SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.ppc64le",
"SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.s390x",
"SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.x86_64",
"SUSE Manager Client Tools 12-BETA:spacecmd-5.0.1-41.42.3.noarch",
"SUSE Manager Client Tools 12-BETA:supportutils-plugin-salt-1.2.2-9.9.2.noarch",
"SUSE Manager Client Tools 12-BETA:supportutils-plugin-susemanager-client-5.0.1-9.15.2.noarch",
"SUSE Manager Client Tools 12-BETA:system-user-grafana-1.0.0-3.7.2.noarch",
"SUSE Manager Client Tools 12-BETA:system-user-prometheus-1.0.0-3.7.2.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.x86_64",
"SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.aarch64",
"SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.ppc64le",
"SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.s390x",
"SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.x86_64",
"SUSE Manager Client Tools 12-BETA:kiwi-desc-saltboot-0.1.1687520761.cefb248-4.15.2.noarch",
"SUSE Manager Client Tools 12-BETA:mgr-push-5.0.1-4.21.4.noarch",
"SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.aarch64",
"SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.ppc64le",
"SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.s390x",
"SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.x86_64",
"SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.aarch64",
"SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.ppc64le",
"SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.s390x",
"SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.x86_64",
"SUSE Manager Client Tools 12-BETA:python2-hwdata-2.3.5-15.12.2.noarch",
"SUSE Manager Client Tools 12-BETA:python2-mgr-push-5.0.1-4.21.4.noarch",
"SUSE Manager Client Tools 12-BETA:python2-rhnlib-5.0.1-24.30.3.noarch",
"SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.aarch64",
"SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.ppc64le",
"SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.s390x",
"SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.x86_64",
"SUSE Manager Client Tools 12-BETA:spacecmd-5.0.1-41.42.3.noarch",
"SUSE Manager Client Tools 12-BETA:supportutils-plugin-salt-1.2.2-9.9.2.noarch",
"SUSE Manager Client Tools 12-BETA:supportutils-plugin-susemanager-client-5.0.1-9.15.2.noarch",
"SUSE Manager Client Tools 12-BETA:system-user-grafana-1.0.0-3.7.2.noarch",
"SUSE Manager Client Tools 12-BETA:system-user-prometheus-1.0.0-3.7.2.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-01-23T15:18:14Z",
"details": "moderate"
}
],
"title": "CVE-2022-21713"
},
{
"cve": "CVE-2022-23552",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-23552"
}
],
"notes": [
{
"category": "general",
"text": "Grafana is an open-source platform for monitoring and observability. Starting with the 8.1 branch and prior to versions 8.5.16, 9.2.10, and 9.3.4, Grafana had a stored XSS vulnerability affecting the core plugin GeoMap. The stored XSS vulnerability was possible because SVG files weren\u0027t properly sanitized and allowed arbitrary JavaScript to be executed in the context of the currently authorized user of the Grafana instance. An attacker needs to have the Editor role in order to change a panel to include either an external URL to a SVG-file containing JavaScript, or use the `data:` scheme to load an inline SVG-file containing JavaScript. This means that vertical privilege escalation is possible, where a user with Editor role can change to a known password for a user having Admin role if the user with Admin role executes malicious JavaScript viewing a dashboard. Users may upgrade to version 8.5.16, 9.2.10, or 9.3.4 to receive a fix.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.x86_64",
"SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.aarch64",
"SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.ppc64le",
"SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.s390x",
"SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.x86_64",
"SUSE Manager Client Tools 12-BETA:kiwi-desc-saltboot-0.1.1687520761.cefb248-4.15.2.noarch",
"SUSE Manager Client Tools 12-BETA:mgr-push-5.0.1-4.21.4.noarch",
"SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.aarch64",
"SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.ppc64le",
"SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.s390x",
"SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.x86_64",
"SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.aarch64",
"SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.ppc64le",
"SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.s390x",
"SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.x86_64",
"SUSE Manager Client Tools 12-BETA:python2-hwdata-2.3.5-15.12.2.noarch",
"SUSE Manager Client Tools 12-BETA:python2-mgr-push-5.0.1-4.21.4.noarch",
"SUSE Manager Client Tools 12-BETA:python2-rhnlib-5.0.1-24.30.3.noarch",
"SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.aarch64",
"SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.ppc64le",
"SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.s390x",
"SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.x86_64",
"SUSE Manager Client Tools 12-BETA:spacecmd-5.0.1-41.42.3.noarch",
"SUSE Manager Client Tools 12-BETA:supportutils-plugin-salt-1.2.2-9.9.2.noarch",
"SUSE Manager Client Tools 12-BETA:supportutils-plugin-susemanager-client-5.0.1-9.15.2.noarch",
"SUSE Manager Client Tools 12-BETA:system-user-grafana-1.0.0-3.7.2.noarch",
"SUSE Manager Client Tools 12-BETA:system-user-prometheus-1.0.0-3.7.2.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-23552",
"url": "https://www.suse.com/security/cve/CVE-2022-23552"
},
{
"category": "external",
"summary": "SUSE Bug 1207749 for CVE-2022-23552",
"url": "https://bugzilla.suse.com/1207749"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.x86_64",
"SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.aarch64",
"SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.ppc64le",
"SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.s390x",
"SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.x86_64",
"SUSE Manager Client Tools 12-BETA:kiwi-desc-saltboot-0.1.1687520761.cefb248-4.15.2.noarch",
"SUSE Manager Client Tools 12-BETA:mgr-push-5.0.1-4.21.4.noarch",
"SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.aarch64",
"SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.ppc64le",
"SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.s390x",
"SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.x86_64",
"SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.aarch64",
"SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.ppc64le",
"SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.s390x",
"SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.x86_64",
"SUSE Manager Client Tools 12-BETA:python2-hwdata-2.3.5-15.12.2.noarch",
"SUSE Manager Client Tools 12-BETA:python2-mgr-push-5.0.1-4.21.4.noarch",
"SUSE Manager Client Tools 12-BETA:python2-rhnlib-5.0.1-24.30.3.noarch",
"SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.aarch64",
"SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.ppc64le",
"SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.s390x",
"SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.x86_64",
"SUSE Manager Client Tools 12-BETA:spacecmd-5.0.1-41.42.3.noarch",
"SUSE Manager Client Tools 12-BETA:supportutils-plugin-salt-1.2.2-9.9.2.noarch",
"SUSE Manager Client Tools 12-BETA:supportutils-plugin-susemanager-client-5.0.1-9.15.2.noarch",
"SUSE Manager Client Tools 12-BETA:system-user-grafana-1.0.0-3.7.2.noarch",
"SUSE Manager Client Tools 12-BETA:system-user-prometheus-1.0.0-3.7.2.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.3,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.x86_64",
"SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.aarch64",
"SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.ppc64le",
"SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.s390x",
"SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.x86_64",
"SUSE Manager Client Tools 12-BETA:kiwi-desc-saltboot-0.1.1687520761.cefb248-4.15.2.noarch",
"SUSE Manager Client Tools 12-BETA:mgr-push-5.0.1-4.21.4.noarch",
"SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.aarch64",
"SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.ppc64le",
"SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.s390x",
"SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.x86_64",
"SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.aarch64",
"SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.ppc64le",
"SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.s390x",
"SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.x86_64",
"SUSE Manager Client Tools 12-BETA:python2-hwdata-2.3.5-15.12.2.noarch",
"SUSE Manager Client Tools 12-BETA:python2-mgr-push-5.0.1-4.21.4.noarch",
"SUSE Manager Client Tools 12-BETA:python2-rhnlib-5.0.1-24.30.3.noarch",
"SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.aarch64",
"SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.ppc64le",
"SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.s390x",
"SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.x86_64",
"SUSE Manager Client Tools 12-BETA:spacecmd-5.0.1-41.42.3.noarch",
"SUSE Manager Client Tools 12-BETA:supportutils-plugin-salt-1.2.2-9.9.2.noarch",
"SUSE Manager Client Tools 12-BETA:supportutils-plugin-susemanager-client-5.0.1-9.15.2.noarch",
"SUSE Manager Client Tools 12-BETA:system-user-grafana-1.0.0-3.7.2.noarch",
"SUSE Manager Client Tools 12-BETA:system-user-prometheus-1.0.0-3.7.2.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-01-23T15:18:14Z",
"details": "important"
}
],
"title": "CVE-2022-23552"
},
{
"cve": "CVE-2022-27191",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-27191"
}
],
"notes": [
{
"category": "general",
"text": "The golang.org/x/crypto/ssh package before 0.0.0-20220314234659-1baeb1ce4c0b for Go allows an attacker to crash a server in certain circumstances involving AddHostKey.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.x86_64",
"SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.aarch64",
"SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.ppc64le",
"SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.s390x",
"SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.x86_64",
"SUSE Manager Client Tools 12-BETA:kiwi-desc-saltboot-0.1.1687520761.cefb248-4.15.2.noarch",
"SUSE Manager Client Tools 12-BETA:mgr-push-5.0.1-4.21.4.noarch",
"SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.aarch64",
"SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.ppc64le",
"SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.s390x",
"SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.x86_64",
"SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.aarch64",
"SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.ppc64le",
"SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.s390x",
"SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.x86_64",
"SUSE Manager Client Tools 12-BETA:python2-hwdata-2.3.5-15.12.2.noarch",
"SUSE Manager Client Tools 12-BETA:python2-mgr-push-5.0.1-4.21.4.noarch",
"SUSE Manager Client Tools 12-BETA:python2-rhnlib-5.0.1-24.30.3.noarch",
"SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.aarch64",
"SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.ppc64le",
"SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.s390x",
"SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.x86_64",
"SUSE Manager Client Tools 12-BETA:spacecmd-5.0.1-41.42.3.noarch",
"SUSE Manager Client Tools 12-BETA:supportutils-plugin-salt-1.2.2-9.9.2.noarch",
"SUSE Manager Client Tools 12-BETA:supportutils-plugin-susemanager-client-5.0.1-9.15.2.noarch",
"SUSE Manager Client Tools 12-BETA:system-user-grafana-1.0.0-3.7.2.noarch",
"SUSE Manager Client Tools 12-BETA:system-user-prometheus-1.0.0-3.7.2.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-27191",
"url": "https://www.suse.com/security/cve/CVE-2022-27191"
},
{
"category": "external",
"summary": "SUSE Bug 1197284 for CVE-2022-27191",
"url": "https://bugzilla.suse.com/1197284"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.x86_64",
"SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.aarch64",
"SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.ppc64le",
"SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.s390x",
"SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.x86_64",
"SUSE Manager Client Tools 12-BETA:kiwi-desc-saltboot-0.1.1687520761.cefb248-4.15.2.noarch",
"SUSE Manager Client Tools 12-BETA:mgr-push-5.0.1-4.21.4.noarch",
"SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.aarch64",
"SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.ppc64le",
"SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.s390x",
"SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.x86_64",
"SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.aarch64",
"SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.ppc64le",
"SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.s390x",
"SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.x86_64",
"SUSE Manager Client Tools 12-BETA:python2-hwdata-2.3.5-15.12.2.noarch",
"SUSE Manager Client Tools 12-BETA:python2-mgr-push-5.0.1-4.21.4.noarch",
"SUSE Manager Client Tools 12-BETA:python2-rhnlib-5.0.1-24.30.3.noarch",
"SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.aarch64",
"SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.ppc64le",
"SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.s390x",
"SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.x86_64",
"SUSE Manager Client Tools 12-BETA:spacecmd-5.0.1-41.42.3.noarch",
"SUSE Manager Client Tools 12-BETA:supportutils-plugin-salt-1.2.2-9.9.2.noarch",
"SUSE Manager Client Tools 12-BETA:supportutils-plugin-susemanager-client-5.0.1-9.15.2.noarch",
"SUSE Manager Client Tools 12-BETA:system-user-grafana-1.0.0-3.7.2.noarch",
"SUSE Manager Client Tools 12-BETA:system-user-prometheus-1.0.0-3.7.2.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.x86_64",
"SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.aarch64",
"SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.ppc64le",
"SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.s390x",
"SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.x86_64",
"SUSE Manager Client Tools 12-BETA:kiwi-desc-saltboot-0.1.1687520761.cefb248-4.15.2.noarch",
"SUSE Manager Client Tools 12-BETA:mgr-push-5.0.1-4.21.4.noarch",
"SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.aarch64",
"SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.ppc64le",
"SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.s390x",
"SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.x86_64",
"SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.aarch64",
"SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.ppc64le",
"SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.s390x",
"SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.x86_64",
"SUSE Manager Client Tools 12-BETA:python2-hwdata-2.3.5-15.12.2.noarch",
"SUSE Manager Client Tools 12-BETA:python2-mgr-push-5.0.1-4.21.4.noarch",
"SUSE Manager Client Tools 12-BETA:python2-rhnlib-5.0.1-24.30.3.noarch",
"SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.aarch64",
"SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.ppc64le",
"SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.s390x",
"SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.x86_64",
"SUSE Manager Client Tools 12-BETA:spacecmd-5.0.1-41.42.3.noarch",
"SUSE Manager Client Tools 12-BETA:supportutils-plugin-salt-1.2.2-9.9.2.noarch",
"SUSE Manager Client Tools 12-BETA:supportutils-plugin-susemanager-client-5.0.1-9.15.2.noarch",
"SUSE Manager Client Tools 12-BETA:system-user-grafana-1.0.0-3.7.2.noarch",
"SUSE Manager Client Tools 12-BETA:system-user-prometheus-1.0.0-3.7.2.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-01-23T15:18:14Z",
"details": "important"
}
],
"title": "CVE-2022-27191"
},
{
"cve": "CVE-2022-27664",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-27664"
}
],
"notes": [
{
"category": "general",
"text": "In net/http in Go before 1.18.6 and 1.19.x before 1.19.1, attackers can cause a denial of service because an HTTP/2 connection can hang during closing if shutdown were preempted by a fatal error.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.x86_64",
"SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.aarch64",
"SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.ppc64le",
"SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.s390x",
"SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.x86_64",
"SUSE Manager Client Tools 12-BETA:kiwi-desc-saltboot-0.1.1687520761.cefb248-4.15.2.noarch",
"SUSE Manager Client Tools 12-BETA:mgr-push-5.0.1-4.21.4.noarch",
"SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.aarch64",
"SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.ppc64le",
"SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.s390x",
"SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.x86_64",
"SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.aarch64",
"SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.ppc64le",
"SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.s390x",
"SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.x86_64",
"SUSE Manager Client Tools 12-BETA:python2-hwdata-2.3.5-15.12.2.noarch",
"SUSE Manager Client Tools 12-BETA:python2-mgr-push-5.0.1-4.21.4.noarch",
"SUSE Manager Client Tools 12-BETA:python2-rhnlib-5.0.1-24.30.3.noarch",
"SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.aarch64",
"SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.ppc64le",
"SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.s390x",
"SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.x86_64",
"SUSE Manager Client Tools 12-BETA:spacecmd-5.0.1-41.42.3.noarch",
"SUSE Manager Client Tools 12-BETA:supportutils-plugin-salt-1.2.2-9.9.2.noarch",
"SUSE Manager Client Tools 12-BETA:supportutils-plugin-susemanager-client-5.0.1-9.15.2.noarch",
"SUSE Manager Client Tools 12-BETA:system-user-grafana-1.0.0-3.7.2.noarch",
"SUSE Manager Client Tools 12-BETA:system-user-prometheus-1.0.0-3.7.2.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-27664",
"url": "https://www.suse.com/security/cve/CVE-2022-27664"
},
{
"category": "external",
"summary": "SUSE Bug 1203185 for CVE-2022-27664",
"url": "https://bugzilla.suse.com/1203185"
},
{
"category": "external",
"summary": "SUSE Bug 1203293 for CVE-2022-27664",
"url": "https://bugzilla.suse.com/1203293"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.x86_64",
"SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.aarch64",
"SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.ppc64le",
"SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.s390x",
"SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.x86_64",
"SUSE Manager Client Tools 12-BETA:kiwi-desc-saltboot-0.1.1687520761.cefb248-4.15.2.noarch",
"SUSE Manager Client Tools 12-BETA:mgr-push-5.0.1-4.21.4.noarch",
"SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.aarch64",
"SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.ppc64le",
"SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.s390x",
"SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.x86_64",
"SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.aarch64",
"SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.ppc64le",
"SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.s390x",
"SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.x86_64",
"SUSE Manager Client Tools 12-BETA:python2-hwdata-2.3.5-15.12.2.noarch",
"SUSE Manager Client Tools 12-BETA:python2-mgr-push-5.0.1-4.21.4.noarch",
"SUSE Manager Client Tools 12-BETA:python2-rhnlib-5.0.1-24.30.3.noarch",
"SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.aarch64",
"SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.ppc64le",
"SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.s390x",
"SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.x86_64",
"SUSE Manager Client Tools 12-BETA:spacecmd-5.0.1-41.42.3.noarch",
"SUSE Manager Client Tools 12-BETA:supportutils-plugin-salt-1.2.2-9.9.2.noarch",
"SUSE Manager Client Tools 12-BETA:supportutils-plugin-susemanager-client-5.0.1-9.15.2.noarch",
"SUSE Manager Client Tools 12-BETA:system-user-grafana-1.0.0-3.7.2.noarch",
"SUSE Manager Client Tools 12-BETA:system-user-prometheus-1.0.0-3.7.2.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.x86_64",
"SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.aarch64",
"SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.ppc64le",
"SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.s390x",
"SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.x86_64",
"SUSE Manager Client Tools 12-BETA:kiwi-desc-saltboot-0.1.1687520761.cefb248-4.15.2.noarch",
"SUSE Manager Client Tools 12-BETA:mgr-push-5.0.1-4.21.4.noarch",
"SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.aarch64",
"SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.ppc64le",
"SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.s390x",
"SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.x86_64",
"SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.aarch64",
"SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.ppc64le",
"SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.s390x",
"SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.x86_64",
"SUSE Manager Client Tools 12-BETA:python2-hwdata-2.3.5-15.12.2.noarch",
"SUSE Manager Client Tools 12-BETA:python2-mgr-push-5.0.1-4.21.4.noarch",
"SUSE Manager Client Tools 12-BETA:python2-rhnlib-5.0.1-24.30.3.noarch",
"SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.aarch64",
"SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.ppc64le",
"SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.s390x",
"SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.x86_64",
"SUSE Manager Client Tools 12-BETA:spacecmd-5.0.1-41.42.3.noarch",
"SUSE Manager Client Tools 12-BETA:supportutils-plugin-salt-1.2.2-9.9.2.noarch",
"SUSE Manager Client Tools 12-BETA:supportutils-plugin-susemanager-client-5.0.1-9.15.2.noarch",
"SUSE Manager Client Tools 12-BETA:system-user-grafana-1.0.0-3.7.2.noarch",
"SUSE Manager Client Tools 12-BETA:system-user-prometheus-1.0.0-3.7.2.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-01-23T15:18:14Z",
"details": "important"
}
],
"title": "CVE-2022-27664"
},
{
"cve": "CVE-2022-29170",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-29170"
}
],
"notes": [
{
"category": "general",
"text": "Grafana is an open-source platform for monitoring and observability. In Grafana Enterprise, the Request security feature allows list allows to configure Grafana in a way so that the instance doesn\u0027t call or only calls specific hosts. The vulnerability present starting with version 7.4.0-beta1 and prior to versions 7.5.16 and 8.5.3 allows someone to bypass these security configurations if a malicious datasource (running on an allowed host) returns an HTTP redirect to a forbidden host. The vulnerability only impacts Grafana Enterprise when the Request security allow list is used and there is a possibility to add a custom datasource to Grafana which returns HTTP redirects. In this scenario, Grafana would blindly follow the redirects and potentially give secure information to the clients. Grafana Cloud is not impacted by this vulnerability. Versions 7.5.16 and 8.5.3 contain a patch for this issue. There are currently no known workarounds.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.x86_64",
"SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.aarch64",
"SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.ppc64le",
"SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.s390x",
"SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.x86_64",
"SUSE Manager Client Tools 12-BETA:kiwi-desc-saltboot-0.1.1687520761.cefb248-4.15.2.noarch",
"SUSE Manager Client Tools 12-BETA:mgr-push-5.0.1-4.21.4.noarch",
"SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.aarch64",
"SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.ppc64le",
"SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.s390x",
"SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.x86_64",
"SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.aarch64",
"SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.ppc64le",
"SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.s390x",
"SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.x86_64",
"SUSE Manager Client Tools 12-BETA:python2-hwdata-2.3.5-15.12.2.noarch",
"SUSE Manager Client Tools 12-BETA:python2-mgr-push-5.0.1-4.21.4.noarch",
"SUSE Manager Client Tools 12-BETA:python2-rhnlib-5.0.1-24.30.3.noarch",
"SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.aarch64",
"SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.ppc64le",
"SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.s390x",
"SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.x86_64",
"SUSE Manager Client Tools 12-BETA:spacecmd-5.0.1-41.42.3.noarch",
"SUSE Manager Client Tools 12-BETA:supportutils-plugin-salt-1.2.2-9.9.2.noarch",
"SUSE Manager Client Tools 12-BETA:supportutils-plugin-susemanager-client-5.0.1-9.15.2.noarch",
"SUSE Manager Client Tools 12-BETA:system-user-grafana-1.0.0-3.7.2.noarch",
"SUSE Manager Client Tools 12-BETA:system-user-prometheus-1.0.0-3.7.2.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-29170",
"url": "https://www.suse.com/security/cve/CVE-2022-29170"
},
{
"category": "external",
"summary": "SUSE Bug 1199810 for CVE-2022-29170",
"url": "https://bugzilla.suse.com/1199810"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.x86_64",
"SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.aarch64",
"SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.ppc64le",
"SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.s390x",
"SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.x86_64",
"SUSE Manager Client Tools 12-BETA:kiwi-desc-saltboot-0.1.1687520761.cefb248-4.15.2.noarch",
"SUSE Manager Client Tools 12-BETA:mgr-push-5.0.1-4.21.4.noarch",
"SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.aarch64",
"SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.ppc64le",
"SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.s390x",
"SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.x86_64",
"SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.aarch64",
"SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.ppc64le",
"SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.s390x",
"SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.x86_64",
"SUSE Manager Client Tools 12-BETA:python2-hwdata-2.3.5-15.12.2.noarch",
"SUSE Manager Client Tools 12-BETA:python2-mgr-push-5.0.1-4.21.4.noarch",
"SUSE Manager Client Tools 12-BETA:python2-rhnlib-5.0.1-24.30.3.noarch",
"SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.aarch64",
"SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.ppc64le",
"SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.s390x",
"SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.x86_64",
"SUSE Manager Client Tools 12-BETA:spacecmd-5.0.1-41.42.3.noarch",
"SUSE Manager Client Tools 12-BETA:supportutils-plugin-salt-1.2.2-9.9.2.noarch",
"SUSE Manager Client Tools 12-BETA:supportutils-plugin-susemanager-client-5.0.1-9.15.2.noarch",
"SUSE Manager Client Tools 12-BETA:system-user-grafana-1.0.0-3.7.2.noarch",
"SUSE Manager Client Tools 12-BETA:system-user-prometheus-1.0.0-3.7.2.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:H/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.x86_64",
"SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.aarch64",
"SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.ppc64le",
"SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.s390x",
"SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.x86_64",
"SUSE Manager Client Tools 12-BETA:kiwi-desc-saltboot-0.1.1687520761.cefb248-4.15.2.noarch",
"SUSE Manager Client Tools 12-BETA:mgr-push-5.0.1-4.21.4.noarch",
"SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.aarch64",
"SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.ppc64le",
"SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.s390x",
"SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.x86_64",
"SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.aarch64",
"SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.ppc64le",
"SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.s390x",
"SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.x86_64",
"SUSE Manager Client Tools 12-BETA:python2-hwdata-2.3.5-15.12.2.noarch",
"SUSE Manager Client Tools 12-BETA:python2-mgr-push-5.0.1-4.21.4.noarch",
"SUSE Manager Client Tools 12-BETA:python2-rhnlib-5.0.1-24.30.3.noarch",
"SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.aarch64",
"SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.ppc64le",
"SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.s390x",
"SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.x86_64",
"SUSE Manager Client Tools 12-BETA:spacecmd-5.0.1-41.42.3.noarch",
"SUSE Manager Client Tools 12-BETA:supportutils-plugin-salt-1.2.2-9.9.2.noarch",
"SUSE Manager Client Tools 12-BETA:supportutils-plugin-susemanager-client-5.0.1-9.15.2.noarch",
"SUSE Manager Client Tools 12-BETA:system-user-grafana-1.0.0-3.7.2.noarch",
"SUSE Manager Client Tools 12-BETA:system-user-prometheus-1.0.0-3.7.2.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-01-23T15:18:14Z",
"details": "moderate"
}
],
"title": "CVE-2022-29170"
},
{
"cve": "CVE-2022-31097",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-31097"
}
],
"notes": [
{
"category": "general",
"text": "Grafana is an open-source platform for monitoring and observability. Versions on the 8.x and 9.x branch prior to 9.0.3, 8.5.9, 8.4.10, and 8.3.10 are vulnerable to stored cross-site scripting via the Unified Alerting feature of Grafana. An attacker can exploit this vulnerability to escalate privilege from editor to admin by tricking an authenticated admin to click on a link. Versions 9.0.3, 8.5.9, 8.4.10, and 8.3.10 contain a patch. As a workaround, it is possible to disable alerting or use legacy alerting.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.x86_64",
"SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.aarch64",
"SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.ppc64le",
"SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.s390x",
"SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.x86_64",
"SUSE Manager Client Tools 12-BETA:kiwi-desc-saltboot-0.1.1687520761.cefb248-4.15.2.noarch",
"SUSE Manager Client Tools 12-BETA:mgr-push-5.0.1-4.21.4.noarch",
"SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.aarch64",
"SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.ppc64le",
"SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.s390x",
"SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.x86_64",
"SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.aarch64",
"SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.ppc64le",
"SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.s390x",
"SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.x86_64",
"SUSE Manager Client Tools 12-BETA:python2-hwdata-2.3.5-15.12.2.noarch",
"SUSE Manager Client Tools 12-BETA:python2-mgr-push-5.0.1-4.21.4.noarch",
"SUSE Manager Client Tools 12-BETA:python2-rhnlib-5.0.1-24.30.3.noarch",
"SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.aarch64",
"SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.ppc64le",
"SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.s390x",
"SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.x86_64",
"SUSE Manager Client Tools 12-BETA:spacecmd-5.0.1-41.42.3.noarch",
"SUSE Manager Client Tools 12-BETA:supportutils-plugin-salt-1.2.2-9.9.2.noarch",
"SUSE Manager Client Tools 12-BETA:supportutils-plugin-susemanager-client-5.0.1-9.15.2.noarch",
"SUSE Manager Client Tools 12-BETA:system-user-grafana-1.0.0-3.7.2.noarch",
"SUSE Manager Client Tools 12-BETA:system-user-prometheus-1.0.0-3.7.2.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-31097",
"url": "https://www.suse.com/security/cve/CVE-2022-31097"
},
{
"category": "external",
"summary": "SUSE Bug 1201535 for CVE-2022-31097",
"url": "https://bugzilla.suse.com/1201535"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.x86_64",
"SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.aarch64",
"SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.ppc64le",
"SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.s390x",
"SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.x86_64",
"SUSE Manager Client Tools 12-BETA:kiwi-desc-saltboot-0.1.1687520761.cefb248-4.15.2.noarch",
"SUSE Manager Client Tools 12-BETA:mgr-push-5.0.1-4.21.4.noarch",
"SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.aarch64",
"SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.ppc64le",
"SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.s390x",
"SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.x86_64",
"SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.aarch64",
"SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.ppc64le",
"SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.s390x",
"SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.x86_64",
"SUSE Manager Client Tools 12-BETA:python2-hwdata-2.3.5-15.12.2.noarch",
"SUSE Manager Client Tools 12-BETA:python2-mgr-push-5.0.1-4.21.4.noarch",
"SUSE Manager Client Tools 12-BETA:python2-rhnlib-5.0.1-24.30.3.noarch",
"SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.aarch64",
"SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.ppc64le",
"SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.s390x",
"SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.x86_64",
"SUSE Manager Client Tools 12-BETA:spacecmd-5.0.1-41.42.3.noarch",
"SUSE Manager Client Tools 12-BETA:supportutils-plugin-salt-1.2.2-9.9.2.noarch",
"SUSE Manager Client Tools 12-BETA:supportutils-plugin-susemanager-client-5.0.1-9.15.2.noarch",
"SUSE Manager Client Tools 12-BETA:system-user-grafana-1.0.0-3.7.2.noarch",
"SUSE Manager Client Tools 12-BETA:system-user-prometheus-1.0.0-3.7.2.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.3,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.x86_64",
"SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.aarch64",
"SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.ppc64le",
"SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.s390x",
"SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.x86_64",
"SUSE Manager Client Tools 12-BETA:kiwi-desc-saltboot-0.1.1687520761.cefb248-4.15.2.noarch",
"SUSE Manager Client Tools 12-BETA:mgr-push-5.0.1-4.21.4.noarch",
"SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.aarch64",
"SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.ppc64le",
"SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.s390x",
"SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.x86_64",
"SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.aarch64",
"SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.ppc64le",
"SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.s390x",
"SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.x86_64",
"SUSE Manager Client Tools 12-BETA:python2-hwdata-2.3.5-15.12.2.noarch",
"SUSE Manager Client Tools 12-BETA:python2-mgr-push-5.0.1-4.21.4.noarch",
"SUSE Manager Client Tools 12-BETA:python2-rhnlib-5.0.1-24.30.3.noarch",
"SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.aarch64",
"SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.ppc64le",
"SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.s390x",
"SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.x86_64",
"SUSE Manager Client Tools 12-BETA:spacecmd-5.0.1-41.42.3.noarch",
"SUSE Manager Client Tools 12-BETA:supportutils-plugin-salt-1.2.2-9.9.2.noarch",
"SUSE Manager Client Tools 12-BETA:supportutils-plugin-susemanager-client-5.0.1-9.15.2.noarch",
"SUSE Manager Client Tools 12-BETA:system-user-grafana-1.0.0-3.7.2.noarch",
"SUSE Manager Client Tools 12-BETA:system-user-prometheus-1.0.0-3.7.2.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-01-23T15:18:14Z",
"details": "important"
}
],
"title": "CVE-2022-31097"
},
{
"cve": "CVE-2022-31107",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-31107"
}
],
"notes": [
{
"category": "general",
"text": "Grafana is an open-source platform for monitoring and observability. In versions 5.3 until 9.0.3, 8.5.9, 8.4.10, and 8.3.10, it is possible for a malicious user who has authorization to log into a Grafana instance via a configured OAuth IdP which provides a login name to take over the account of another user in that Grafana instance. This can occur when the malicious user is authorized to log in to Grafana via OAuth, the malicious user\u0027s external user id is not already associated with an account in Grafana, the malicious user\u0027s email address is not already associated with an account in Grafana, and the malicious user knows the Grafana username of the target user. If these conditions are met, the malicious user can set their username in the OAuth provider to that of the target user, then go through the OAuth flow to log in to Grafana. Due to the way that external and internal user accounts are linked together during login, if the conditions above are all met then the malicious user will be able to log in to the target user\u0027s Grafana account. Versions 9.0.3, 8.5.9, 8.4.10, and 8.3.10 contain a patch for this issue. As a workaround, concerned users can disable OAuth login to their Grafana instance, or ensure that all users authorized to log in via OAuth have a corresponding user account in Grafana linked to their email address.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.x86_64",
"SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.aarch64",
"SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.ppc64le",
"SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.s390x",
"SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.x86_64",
"SUSE Manager Client Tools 12-BETA:kiwi-desc-saltboot-0.1.1687520761.cefb248-4.15.2.noarch",
"SUSE Manager Client Tools 12-BETA:mgr-push-5.0.1-4.21.4.noarch",
"SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.aarch64",
"SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.ppc64le",
"SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.s390x",
"SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.x86_64",
"SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.aarch64",
"SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.ppc64le",
"SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.s390x",
"SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.x86_64",
"SUSE Manager Client Tools 12-BETA:python2-hwdata-2.3.5-15.12.2.noarch",
"SUSE Manager Client Tools 12-BETA:python2-mgr-push-5.0.1-4.21.4.noarch",
"SUSE Manager Client Tools 12-BETA:python2-rhnlib-5.0.1-24.30.3.noarch",
"SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.aarch64",
"SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.ppc64le",
"SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.s390x",
"SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.x86_64",
"SUSE Manager Client Tools 12-BETA:spacecmd-5.0.1-41.42.3.noarch",
"SUSE Manager Client Tools 12-BETA:supportutils-plugin-salt-1.2.2-9.9.2.noarch",
"SUSE Manager Client Tools 12-BETA:supportutils-plugin-susemanager-client-5.0.1-9.15.2.noarch",
"SUSE Manager Client Tools 12-BETA:system-user-grafana-1.0.0-3.7.2.noarch",
"SUSE Manager Client Tools 12-BETA:system-user-prometheus-1.0.0-3.7.2.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-31107",
"url": "https://www.suse.com/security/cve/CVE-2022-31107"
},
{
"category": "external",
"summary": "SUSE Bug 1201539 for CVE-2022-31107",
"url": "https://bugzilla.suse.com/1201539"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.x86_64",
"SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.aarch64",
"SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.ppc64le",
"SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.s390x",
"SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.x86_64",
"SUSE Manager Client Tools 12-BETA:kiwi-desc-saltboot-0.1.1687520761.cefb248-4.15.2.noarch",
"SUSE Manager Client Tools 12-BETA:mgr-push-5.0.1-4.21.4.noarch",
"SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.aarch64",
"SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.ppc64le",
"SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.s390x",
"SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.x86_64",
"SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.aarch64",
"SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.ppc64le",
"SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.s390x",
"SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.x86_64",
"SUSE Manager Client Tools 12-BETA:python2-hwdata-2.3.5-15.12.2.noarch",
"SUSE Manager Client Tools 12-BETA:python2-mgr-push-5.0.1-4.21.4.noarch",
"SUSE Manager Client Tools 12-BETA:python2-rhnlib-5.0.1-24.30.3.noarch",
"SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.aarch64",
"SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.ppc64le",
"SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.s390x",
"SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.x86_64",
"SUSE Manager Client Tools 12-BETA:spacecmd-5.0.1-41.42.3.noarch",
"SUSE Manager Client Tools 12-BETA:supportutils-plugin-salt-1.2.2-9.9.2.noarch",
"SUSE Manager Client Tools 12-BETA:supportutils-plugin-susemanager-client-5.0.1-9.15.2.noarch",
"SUSE Manager Client Tools 12-BETA:system-user-grafana-1.0.0-3.7.2.noarch",
"SUSE Manager Client Tools 12-BETA:system-user-prometheus-1.0.0-3.7.2.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:L",
"version": "3.1"
},
"products": [
"SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.x86_64",
"SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.aarch64",
"SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.ppc64le",
"SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.s390x",
"SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.x86_64",
"SUSE Manager Client Tools 12-BETA:kiwi-desc-saltboot-0.1.1687520761.cefb248-4.15.2.noarch",
"SUSE Manager Client Tools 12-BETA:mgr-push-5.0.1-4.21.4.noarch",
"SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.aarch64",
"SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.ppc64le",
"SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.s390x",
"SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.x86_64",
"SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.aarch64",
"SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.ppc64le",
"SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.s390x",
"SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.x86_64",
"SUSE Manager Client Tools 12-BETA:python2-hwdata-2.3.5-15.12.2.noarch",
"SUSE Manager Client Tools 12-BETA:python2-mgr-push-5.0.1-4.21.4.noarch",
"SUSE Manager Client Tools 12-BETA:python2-rhnlib-5.0.1-24.30.3.noarch",
"SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.aarch64",
"SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.ppc64le",
"SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.s390x",
"SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.x86_64",
"SUSE Manager Client Tools 12-BETA:spacecmd-5.0.1-41.42.3.noarch",
"SUSE Manager Client Tools 12-BETA:supportutils-plugin-salt-1.2.2-9.9.2.noarch",
"SUSE Manager Client Tools 12-BETA:supportutils-plugin-susemanager-client-5.0.1-9.15.2.noarch",
"SUSE Manager Client Tools 12-BETA:system-user-grafana-1.0.0-3.7.2.noarch",
"SUSE Manager Client Tools 12-BETA:system-user-prometheus-1.0.0-3.7.2.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-01-23T15:18:14Z",
"details": "important"
}
],
"title": "CVE-2022-31107"
},
{
"cve": "CVE-2022-31123",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-31123"
}
],
"notes": [
{
"category": "general",
"text": "Grafana is an open source observability and data visualization platform. Versions prior to 9.1.8 and 8.5.14 are vulnerable to a bypass in the plugin signature verification. An attacker can convince a server admin to download and successfully run a malicious plugin even though unsigned plugins are not allowed. Versions 9.1.8 and 8.5.14 contain a patch for this issue. As a workaround, do not install plugins downloaded from untrusted sources.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.x86_64",
"SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.aarch64",
"SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.ppc64le",
"SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.s390x",
"SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.x86_64",
"SUSE Manager Client Tools 12-BETA:kiwi-desc-saltboot-0.1.1687520761.cefb248-4.15.2.noarch",
"SUSE Manager Client Tools 12-BETA:mgr-push-5.0.1-4.21.4.noarch",
"SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.aarch64",
"SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.ppc64le",
"SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.s390x",
"SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.x86_64",
"SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.aarch64",
"SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.ppc64le",
"SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.s390x",
"SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.x86_64",
"SUSE Manager Client Tools 12-BETA:python2-hwdata-2.3.5-15.12.2.noarch",
"SUSE Manager Client Tools 12-BETA:python2-mgr-push-5.0.1-4.21.4.noarch",
"SUSE Manager Client Tools 12-BETA:python2-rhnlib-5.0.1-24.30.3.noarch",
"SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.aarch64",
"SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.ppc64le",
"SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.s390x",
"SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.x86_64",
"SUSE Manager Client Tools 12-BETA:spacecmd-5.0.1-41.42.3.noarch",
"SUSE Manager Client Tools 12-BETA:supportutils-plugin-salt-1.2.2-9.9.2.noarch",
"SUSE Manager Client Tools 12-BETA:supportutils-plugin-susemanager-client-5.0.1-9.15.2.noarch",
"SUSE Manager Client Tools 12-BETA:system-user-grafana-1.0.0-3.7.2.noarch",
"SUSE Manager Client Tools 12-BETA:system-user-prometheus-1.0.0-3.7.2.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-31123",
"url": "https://www.suse.com/security/cve/CVE-2022-31123"
},
{
"category": "external",
"summary": "SUSE Bug 1204302 for CVE-2022-31123",
"url": "https://bugzilla.suse.com/1204302"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.x86_64",
"SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.aarch64",
"SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.ppc64le",
"SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.s390x",
"SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.x86_64",
"SUSE Manager Client Tools 12-BETA:kiwi-desc-saltboot-0.1.1687520761.cefb248-4.15.2.noarch",
"SUSE Manager Client Tools 12-BETA:mgr-push-5.0.1-4.21.4.noarch",
"SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.aarch64",
"SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.ppc64le",
"SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.s390x",
"SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.x86_64",
"SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.aarch64",
"SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.ppc64le",
"SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.s390x",
"SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.x86_64",
"SUSE Manager Client Tools 12-BETA:python2-hwdata-2.3.5-15.12.2.noarch",
"SUSE Manager Client Tools 12-BETA:python2-mgr-push-5.0.1-4.21.4.noarch",
"SUSE Manager Client Tools 12-BETA:python2-rhnlib-5.0.1-24.30.3.noarch",
"SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.aarch64",
"SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.ppc64le",
"SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.s390x",
"SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.x86_64",
"SUSE Manager Client Tools 12-BETA:spacecmd-5.0.1-41.42.3.noarch",
"SUSE Manager Client Tools 12-BETA:supportutils-plugin-salt-1.2.2-9.9.2.noarch",
"SUSE Manager Client Tools 12-BETA:supportutils-plugin-susemanager-client-5.0.1-9.15.2.noarch",
"SUSE Manager Client Tools 12-BETA:system-user-grafana-1.0.0-3.7.2.noarch",
"SUSE Manager Client Tools 12-BETA:system-user-prometheus-1.0.0-3.7.2.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.x86_64",
"SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.aarch64",
"SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.ppc64le",
"SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.s390x",
"SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.x86_64",
"SUSE Manager Client Tools 12-BETA:kiwi-desc-saltboot-0.1.1687520761.cefb248-4.15.2.noarch",
"SUSE Manager Client Tools 12-BETA:mgr-push-5.0.1-4.21.4.noarch",
"SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.aarch64",
"SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.ppc64le",
"SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.s390x",
"SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.x86_64",
"SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.aarch64",
"SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.ppc64le",
"SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.s390x",
"SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.x86_64",
"SUSE Manager Client Tools 12-BETA:python2-hwdata-2.3.5-15.12.2.noarch",
"SUSE Manager Client Tools 12-BETA:python2-mgr-push-5.0.1-4.21.4.noarch",
"SUSE Manager Client Tools 12-BETA:python2-rhnlib-5.0.1-24.30.3.noarch",
"SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.aarch64",
"SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.ppc64le",
"SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.s390x",
"SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.x86_64",
"SUSE Manager Client Tools 12-BETA:spacecmd-5.0.1-41.42.3.noarch",
"SUSE Manager Client Tools 12-BETA:supportutils-plugin-salt-1.2.2-9.9.2.noarch",
"SUSE Manager Client Tools 12-BETA:supportutils-plugin-susemanager-client-5.0.1-9.15.2.noarch",
"SUSE Manager Client Tools 12-BETA:system-user-grafana-1.0.0-3.7.2.noarch",
"SUSE Manager Client Tools 12-BETA:system-user-prometheus-1.0.0-3.7.2.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-01-23T15:18:14Z",
"details": "low"
}
],
"title": "CVE-2022-31123"
},
{
"cve": "CVE-2022-31130",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-31130"
}
],
"notes": [
{
"category": "general",
"text": "Grafana is an open source observability and data visualization platform. Versions of Grafana for endpoints prior to 9.1.8 and 8.5.14 could leak authentication tokens to some destination plugins under some conditions. The vulnerability impacts data source and plugin proxy endpoints with authentication tokens. The destination plugin could receive a user\u0027s Grafana authentication token. Versions 9.1.8 and 8.5.14 contain a patch for this issue. As a workaround, do not use API keys, JWT authentication, or any HTTP Header based authentication.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.x86_64",
"SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.aarch64",
"SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.ppc64le",
"SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.s390x",
"SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.x86_64",
"SUSE Manager Client Tools 12-BETA:kiwi-desc-saltboot-0.1.1687520761.cefb248-4.15.2.noarch",
"SUSE Manager Client Tools 12-BETA:mgr-push-5.0.1-4.21.4.noarch",
"SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.aarch64",
"SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.ppc64le",
"SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.s390x",
"SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.x86_64",
"SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.aarch64",
"SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.ppc64le",
"SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.s390x",
"SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.x86_64",
"SUSE Manager Client Tools 12-BETA:python2-hwdata-2.3.5-15.12.2.noarch",
"SUSE Manager Client Tools 12-BETA:python2-mgr-push-5.0.1-4.21.4.noarch",
"SUSE Manager Client Tools 12-BETA:python2-rhnlib-5.0.1-24.30.3.noarch",
"SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.aarch64",
"SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.ppc64le",
"SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.s390x",
"SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.x86_64",
"SUSE Manager Client Tools 12-BETA:spacecmd-5.0.1-41.42.3.noarch",
"SUSE Manager Client Tools 12-BETA:supportutils-plugin-salt-1.2.2-9.9.2.noarch",
"SUSE Manager Client Tools 12-BETA:supportutils-plugin-susemanager-client-5.0.1-9.15.2.noarch",
"SUSE Manager Client Tools 12-BETA:system-user-grafana-1.0.0-3.7.2.noarch",
"SUSE Manager Client Tools 12-BETA:system-user-prometheus-1.0.0-3.7.2.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-31130",
"url": "https://www.suse.com/security/cve/CVE-2022-31130"
},
{
"category": "external",
"summary": "SUSE Bug 1204305 for CVE-2022-31130",
"url": "https://bugzilla.suse.com/1204305"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.x86_64",
"SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.aarch64",
"SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.ppc64le",
"SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.s390x",
"SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.x86_64",
"SUSE Manager Client Tools 12-BETA:kiwi-desc-saltboot-0.1.1687520761.cefb248-4.15.2.noarch",
"SUSE Manager Client Tools 12-BETA:mgr-push-5.0.1-4.21.4.noarch",
"SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.aarch64",
"SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.ppc64le",
"SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.s390x",
"SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.x86_64",
"SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.aarch64",
"SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.ppc64le",
"SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.s390x",
"SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.x86_64",
"SUSE Manager Client Tools 12-BETA:python2-hwdata-2.3.5-15.12.2.noarch",
"SUSE Manager Client Tools 12-BETA:python2-mgr-push-5.0.1-4.21.4.noarch",
"SUSE Manager Client Tools 12-BETA:python2-rhnlib-5.0.1-24.30.3.noarch",
"SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.aarch64",
"SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.ppc64le",
"SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.s390x",
"SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.x86_64",
"SUSE Manager Client Tools 12-BETA:spacecmd-5.0.1-41.42.3.noarch",
"SUSE Manager Client Tools 12-BETA:supportutils-plugin-salt-1.2.2-9.9.2.noarch",
"SUSE Manager Client Tools 12-BETA:supportutils-plugin-susemanager-client-5.0.1-9.15.2.noarch",
"SUSE Manager Client Tools 12-BETA:system-user-grafana-1.0.0-3.7.2.noarch",
"SUSE Manager Client Tools 12-BETA:system-user-prometheus-1.0.0-3.7.2.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.x86_64",
"SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.aarch64",
"SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.ppc64le",
"SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.s390x",
"SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.x86_64",
"SUSE Manager Client Tools 12-BETA:kiwi-desc-saltboot-0.1.1687520761.cefb248-4.15.2.noarch",
"SUSE Manager Client Tools 12-BETA:mgr-push-5.0.1-4.21.4.noarch",
"SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.aarch64",
"SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.ppc64le",
"SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.s390x",
"SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.x86_64",
"SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.aarch64",
"SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.ppc64le",
"SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.s390x",
"SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.x86_64",
"SUSE Manager Client Tools 12-BETA:python2-hwdata-2.3.5-15.12.2.noarch",
"SUSE Manager Client Tools 12-BETA:python2-mgr-push-5.0.1-4.21.4.noarch",
"SUSE Manager Client Tools 12-BETA:python2-rhnlib-5.0.1-24.30.3.noarch",
"SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.aarch64",
"SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.ppc64le",
"SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.s390x",
"SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.x86_64",
"SUSE Manager Client Tools 12-BETA:spacecmd-5.0.1-41.42.3.noarch",
"SUSE Manager Client Tools 12-BETA:supportutils-plugin-salt-1.2.2-9.9.2.noarch",
"SUSE Manager Client Tools 12-BETA:supportutils-plugin-susemanager-client-5.0.1-9.15.2.noarch",
"SUSE Manager Client Tools 12-BETA:system-user-grafana-1.0.0-3.7.2.noarch",
"SUSE Manager Client Tools 12-BETA:system-user-prometheus-1.0.0-3.7.2.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-01-23T15:18:14Z",
"details": "moderate"
}
],
"title": "CVE-2022-31130"
},
{
"cve": "CVE-2022-32149",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-32149"
}
],
"notes": [
{
"category": "general",
"text": "An attacker may cause a denial of service by crafting an Accept-Language header which ParseAcceptLanguage will take significant time to parse.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.x86_64",
"SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.aarch64",
"SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.ppc64le",
"SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.s390x",
"SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.x86_64",
"SUSE Manager Client Tools 12-BETA:kiwi-desc-saltboot-0.1.1687520761.cefb248-4.15.2.noarch",
"SUSE Manager Client Tools 12-BETA:mgr-push-5.0.1-4.21.4.noarch",
"SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.aarch64",
"SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.ppc64le",
"SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.s390x",
"SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.x86_64",
"SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.aarch64",
"SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.ppc64le",
"SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.s390x",
"SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.x86_64",
"SUSE Manager Client Tools 12-BETA:python2-hwdata-2.3.5-15.12.2.noarch",
"SUSE Manager Client Tools 12-BETA:python2-mgr-push-5.0.1-4.21.4.noarch",
"SUSE Manager Client Tools 12-BETA:python2-rhnlib-5.0.1-24.30.3.noarch",
"SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.aarch64",
"SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.ppc64le",
"SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.s390x",
"SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.x86_64",
"SUSE Manager Client Tools 12-BETA:spacecmd-5.0.1-41.42.3.noarch",
"SUSE Manager Client Tools 12-BETA:supportutils-plugin-salt-1.2.2-9.9.2.noarch",
"SUSE Manager Client Tools 12-BETA:supportutils-plugin-susemanager-client-5.0.1-9.15.2.noarch",
"SUSE Manager Client Tools 12-BETA:system-user-grafana-1.0.0-3.7.2.noarch",
"SUSE Manager Client Tools 12-BETA:system-user-prometheus-1.0.0-3.7.2.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-32149",
"url": "https://www.suse.com/security/cve/CVE-2022-32149"
},
{
"category": "external",
"summary": "SUSE Bug 1204501 for CVE-2022-32149",
"url": "https://bugzilla.suse.com/1204501"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.x86_64",
"SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.aarch64",
"SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.ppc64le",
"SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.s390x",
"SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.x86_64",
"SUSE Manager Client Tools 12-BETA:kiwi-desc-saltboot-0.1.1687520761.cefb248-4.15.2.noarch",
"SUSE Manager Client Tools 12-BETA:mgr-push-5.0.1-4.21.4.noarch",
"SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.aarch64",
"SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.ppc64le",
"SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.s390x",
"SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.x86_64",
"SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.aarch64",
"SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.ppc64le",
"SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.s390x",
"SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.x86_64",
"SUSE Manager Client Tools 12-BETA:python2-hwdata-2.3.5-15.12.2.noarch",
"SUSE Manager Client Tools 12-BETA:python2-mgr-push-5.0.1-4.21.4.noarch",
"SUSE Manager Client Tools 12-BETA:python2-rhnlib-5.0.1-24.30.3.noarch",
"SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.aarch64",
"SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.ppc64le",
"SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.s390x",
"SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.x86_64",
"SUSE Manager Client Tools 12-BETA:spacecmd-5.0.1-41.42.3.noarch",
"SUSE Manager Client Tools 12-BETA:supportutils-plugin-salt-1.2.2-9.9.2.noarch",
"SUSE Manager Client Tools 12-BETA:supportutils-plugin-susemanager-client-5.0.1-9.15.2.noarch",
"SUSE Manager Client Tools 12-BETA:system-user-grafana-1.0.0-3.7.2.noarch",
"SUSE Manager Client Tools 12-BETA:system-user-prometheus-1.0.0-3.7.2.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.x86_64",
"SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.aarch64",
"SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.ppc64le",
"SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.s390x",
"SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.x86_64",
"SUSE Manager Client Tools 12-BETA:kiwi-desc-saltboot-0.1.1687520761.cefb248-4.15.2.noarch",
"SUSE Manager Client Tools 12-BETA:mgr-push-5.0.1-4.21.4.noarch",
"SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.aarch64",
"SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.ppc64le",
"SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.s390x",
"SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.x86_64",
"SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.aarch64",
"SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.ppc64le",
"SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.s390x",
"SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.x86_64",
"SUSE Manager Client Tools 12-BETA:python2-hwdata-2.3.5-15.12.2.noarch",
"SUSE Manager Client Tools 12-BETA:python2-mgr-push-5.0.1-4.21.4.noarch",
"SUSE Manager Client Tools 12-BETA:python2-rhnlib-5.0.1-24.30.3.noarch",
"SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.aarch64",
"SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.ppc64le",
"SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.s390x",
"SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.x86_64",
"SUSE Manager Client Tools 12-BETA:spacecmd-5.0.1-41.42.3.noarch",
"SUSE Manager Client Tools 12-BETA:supportutils-plugin-salt-1.2.2-9.9.2.noarch",
"SUSE Manager Client Tools 12-BETA:supportutils-plugin-susemanager-client-5.0.1-9.15.2.noarch",
"SUSE Manager Client Tools 12-BETA:system-user-grafana-1.0.0-3.7.2.noarch",
"SUSE Manager Client Tools 12-BETA:system-user-prometheus-1.0.0-3.7.2.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-01-23T15:18:14Z",
"details": "important"
}
],
"title": "CVE-2022-32149"
},
{
"cve": "CVE-2022-35957",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-35957"
}
],
"notes": [
{
"category": "general",
"text": "Grafana is an open-source platform for monitoring and observability. Versions prior to 9.1.6 and 8.5.13 are vulnerable to an escalation from admin to server admin when auth proxy is used, allowing an admin to take over the server admin account and gain full control of the grafana instance. All installations should be upgraded as soon as possible. As a workaround deactivate auth proxy following the instructions at: https://grafana.com/docs/grafana/latest/setup-grafana/configure-security/configure-authentication/auth-proxy/",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.x86_64",
"SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.aarch64",
"SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.ppc64le",
"SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.s390x",
"SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.x86_64",
"SUSE Manager Client Tools 12-BETA:kiwi-desc-saltboot-0.1.1687520761.cefb248-4.15.2.noarch",
"SUSE Manager Client Tools 12-BETA:mgr-push-5.0.1-4.21.4.noarch",
"SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.aarch64",
"SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.ppc64le",
"SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.s390x",
"SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.x86_64",
"SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.aarch64",
"SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.ppc64le",
"SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.s390x",
"SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.x86_64",
"SUSE Manager Client Tools 12-BETA:python2-hwdata-2.3.5-15.12.2.noarch",
"SUSE Manager Client Tools 12-BETA:python2-mgr-push-5.0.1-4.21.4.noarch",
"SUSE Manager Client Tools 12-BETA:python2-rhnlib-5.0.1-24.30.3.noarch",
"SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.aarch64",
"SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.ppc64le",
"SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.s390x",
"SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.x86_64",
"SUSE Manager Client Tools 12-BETA:spacecmd-5.0.1-41.42.3.noarch",
"SUSE Manager Client Tools 12-BETA:supportutils-plugin-salt-1.2.2-9.9.2.noarch",
"SUSE Manager Client Tools 12-BETA:supportutils-plugin-susemanager-client-5.0.1-9.15.2.noarch",
"SUSE Manager Client Tools 12-BETA:system-user-grafana-1.0.0-3.7.2.noarch",
"SUSE Manager Client Tools 12-BETA:system-user-prometheus-1.0.0-3.7.2.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-35957",
"url": "https://www.suse.com/security/cve/CVE-2022-35957"
},
{
"category": "external",
"summary": "SUSE Bug 1203597 for CVE-2022-35957",
"url": "https://bugzilla.suse.com/1203597"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.x86_64",
"SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.aarch64",
"SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.ppc64le",
"SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.s390x",
"SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.x86_64",
"SUSE Manager Client Tools 12-BETA:kiwi-desc-saltboot-0.1.1687520761.cefb248-4.15.2.noarch",
"SUSE Manager Client Tools 12-BETA:mgr-push-5.0.1-4.21.4.noarch",
"SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.aarch64",
"SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.ppc64le",
"SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.s390x",
"SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.x86_64",
"SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.aarch64",
"SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.ppc64le",
"SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.s390x",
"SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.x86_64",
"SUSE Manager Client Tools 12-BETA:python2-hwdata-2.3.5-15.12.2.noarch",
"SUSE Manager Client Tools 12-BETA:python2-mgr-push-5.0.1-4.21.4.noarch",
"SUSE Manager Client Tools 12-BETA:python2-rhnlib-5.0.1-24.30.3.noarch",
"SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.aarch64",
"SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.ppc64le",
"SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.s390x",
"SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.x86_64",
"SUSE Manager Client Tools 12-BETA:spacecmd-5.0.1-41.42.3.noarch",
"SUSE Manager Client Tools 12-BETA:supportutils-plugin-salt-1.2.2-9.9.2.noarch",
"SUSE Manager Client Tools 12-BETA:supportutils-plugin-susemanager-client-5.0.1-9.15.2.noarch",
"SUSE Manager Client Tools 12-BETA:system-user-grafana-1.0.0-3.7.2.noarch",
"SUSE Manager Client Tools 12-BETA:system-user-prometheus-1.0.0-3.7.2.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.x86_64",
"SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.aarch64",
"SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.ppc64le",
"SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.s390x",
"SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.x86_64",
"SUSE Manager Client Tools 12-BETA:kiwi-desc-saltboot-0.1.1687520761.cefb248-4.15.2.noarch",
"SUSE Manager Client Tools 12-BETA:mgr-push-5.0.1-4.21.4.noarch",
"SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.aarch64",
"SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.ppc64le",
"SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.s390x",
"SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.x86_64",
"SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.aarch64",
"SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.ppc64le",
"SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.s390x",
"SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.x86_64",
"SUSE Manager Client Tools 12-BETA:python2-hwdata-2.3.5-15.12.2.noarch",
"SUSE Manager Client Tools 12-BETA:python2-mgr-push-5.0.1-4.21.4.noarch",
"SUSE Manager Client Tools 12-BETA:python2-rhnlib-5.0.1-24.30.3.noarch",
"SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.aarch64",
"SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.ppc64le",
"SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.s390x",
"SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.x86_64",
"SUSE Manager Client Tools 12-BETA:spacecmd-5.0.1-41.42.3.noarch",
"SUSE Manager Client Tools 12-BETA:supportutils-plugin-salt-1.2.2-9.9.2.noarch",
"SUSE Manager Client Tools 12-BETA:supportutils-plugin-susemanager-client-5.0.1-9.15.2.noarch",
"SUSE Manager Client Tools 12-BETA:system-user-grafana-1.0.0-3.7.2.noarch",
"SUSE Manager Client Tools 12-BETA:system-user-prometheus-1.0.0-3.7.2.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-01-23T15:18:14Z",
"details": "moderate"
}
],
"title": "CVE-2022-35957"
},
{
"cve": "CVE-2022-36062",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-36062"
}
],
"notes": [
{
"category": "general",
"text": "Grafana is an open-source platform for monitoring and observability. In versions prior to 8.5.13, 9.0.9, and 9.1.6, Grafana is subject to Improper Preservation of Permissions resulting in privilege escalation on some folders where Admin is the only used permission. The vulnerability impacts Grafana instances where RBAC was disabled and enabled afterwards, as the migrations which are translating legacy folder permissions to RBAC permissions do not account for the scenario where the only user permission in the folder is Admin, as a result RBAC adds permissions for Editors and Viewers which allow them to edit and view folders accordingly. This issue has been patched in versions 8.5.13, 9.0.9, and 9.1.6. A workaround when the impacted folder/dashboard is known is to remove the additional permissions manually.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.x86_64",
"SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.aarch64",
"SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.ppc64le",
"SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.s390x",
"SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.x86_64",
"SUSE Manager Client Tools 12-BETA:kiwi-desc-saltboot-0.1.1687520761.cefb248-4.15.2.noarch",
"SUSE Manager Client Tools 12-BETA:mgr-push-5.0.1-4.21.4.noarch",
"SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.aarch64",
"SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.ppc64le",
"SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.s390x",
"SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.x86_64",
"SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.aarch64",
"SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.ppc64le",
"SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.s390x",
"SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.x86_64",
"SUSE Manager Client Tools 12-BETA:python2-hwdata-2.3.5-15.12.2.noarch",
"SUSE Manager Client Tools 12-BETA:python2-mgr-push-5.0.1-4.21.4.noarch",
"SUSE Manager Client Tools 12-BETA:python2-rhnlib-5.0.1-24.30.3.noarch",
"SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.aarch64",
"SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.ppc64le",
"SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.s390x",
"SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.x86_64",
"SUSE Manager Client Tools 12-BETA:spacecmd-5.0.1-41.42.3.noarch",
"SUSE Manager Client Tools 12-BETA:supportutils-plugin-salt-1.2.2-9.9.2.noarch",
"SUSE Manager Client Tools 12-BETA:supportutils-plugin-susemanager-client-5.0.1-9.15.2.noarch",
"SUSE Manager Client Tools 12-BETA:system-user-grafana-1.0.0-3.7.2.noarch",
"SUSE Manager Client Tools 12-BETA:system-user-prometheus-1.0.0-3.7.2.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-36062",
"url": "https://www.suse.com/security/cve/CVE-2022-36062"
},
{
"category": "external",
"summary": "SUSE Bug 1203596 for CVE-2022-36062",
"url": "https://bugzilla.suse.com/1203596"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.x86_64",
"SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.aarch64",
"SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.ppc64le",
"SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.s390x",
"SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.x86_64",
"SUSE Manager Client Tools 12-BETA:kiwi-desc-saltboot-0.1.1687520761.cefb248-4.15.2.noarch",
"SUSE Manager Client Tools 12-BETA:mgr-push-5.0.1-4.21.4.noarch",
"SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.aarch64",
"SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.ppc64le",
"SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.s390x",
"SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.x86_64",
"SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.aarch64",
"SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.ppc64le",
"SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.s390x",
"SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.x86_64",
"SUSE Manager Client Tools 12-BETA:python2-hwdata-2.3.5-15.12.2.noarch",
"SUSE Manager Client Tools 12-BETA:python2-mgr-push-5.0.1-4.21.4.noarch",
"SUSE Manager Client Tools 12-BETA:python2-rhnlib-5.0.1-24.30.3.noarch",
"SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.aarch64",
"SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.ppc64le",
"SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.s390x",
"SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.x86_64",
"SUSE Manager Client Tools 12-BETA:spacecmd-5.0.1-41.42.3.noarch",
"SUSE Manager Client Tools 12-BETA:supportutils-plugin-salt-1.2.2-9.9.2.noarch",
"SUSE Manager Client Tools 12-BETA:supportutils-plugin-susemanager-client-5.0.1-9.15.2.noarch",
"SUSE Manager Client Tools 12-BETA:system-user-grafana-1.0.0-3.7.2.noarch",
"SUSE Manager Client Tools 12-BETA:system-user-prometheus-1.0.0-3.7.2.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:L/A:L",
"version": "3.1"
},
"products": [
"SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.x86_64",
"SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.aarch64",
"SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.ppc64le",
"SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.s390x",
"SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.x86_64",
"SUSE Manager Client Tools 12-BETA:kiwi-desc-saltboot-0.1.1687520761.cefb248-4.15.2.noarch",
"SUSE Manager Client Tools 12-BETA:mgr-push-5.0.1-4.21.4.noarch",
"SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.aarch64",
"SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.ppc64le",
"SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.s390x",
"SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.x86_64",
"SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.aarch64",
"SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.ppc64le",
"SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.s390x",
"SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.x86_64",
"SUSE Manager Client Tools 12-BETA:python2-hwdata-2.3.5-15.12.2.noarch",
"SUSE Manager Client Tools 12-BETA:python2-mgr-push-5.0.1-4.21.4.noarch",
"SUSE Manager Client Tools 12-BETA:python2-rhnlib-5.0.1-24.30.3.noarch",
"SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.aarch64",
"SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.ppc64le",
"SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.s390x",
"SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.x86_64",
"SUSE Manager Client Tools 12-BETA:spacecmd-5.0.1-41.42.3.noarch",
"SUSE Manager Client Tools 12-BETA:supportutils-plugin-salt-1.2.2-9.9.2.noarch",
"SUSE Manager Client Tools 12-BETA:supportutils-plugin-susemanager-client-5.0.1-9.15.2.noarch",
"SUSE Manager Client Tools 12-BETA:system-user-grafana-1.0.0-3.7.2.noarch",
"SUSE Manager Client Tools 12-BETA:system-user-prometheus-1.0.0-3.7.2.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-01-23T15:18:14Z",
"details": "moderate"
}
],
"title": "CVE-2022-36062"
},
{
"cve": "CVE-2022-39201",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-39201"
}
],
"notes": [
{
"category": "general",
"text": "Grafana is an open source observability and data visualization platform. Starting with version 5.0.0-beta1 and prior to versions 8.5.14 and 9.1.8, Grafana could leak the authentication cookie of users to plugins. The vulnerability impacts data source and plugin proxy endpoints under certain conditions. The destination plugin could receive a user\u0027s Grafana authentication cookie. Versions 9.1.8 and 8.5.14 contain a patch for this issue. There are no known workarounds.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.x86_64",
"SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.aarch64",
"SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.ppc64le",
"SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.s390x",
"SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.x86_64",
"SUSE Manager Client Tools 12-BETA:kiwi-desc-saltboot-0.1.1687520761.cefb248-4.15.2.noarch",
"SUSE Manager Client Tools 12-BETA:mgr-push-5.0.1-4.21.4.noarch",
"SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.aarch64",
"SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.ppc64le",
"SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.s390x",
"SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.x86_64",
"SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.aarch64",
"SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.ppc64le",
"SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.s390x",
"SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.x86_64",
"SUSE Manager Client Tools 12-BETA:python2-hwdata-2.3.5-15.12.2.noarch",
"SUSE Manager Client Tools 12-BETA:python2-mgr-push-5.0.1-4.21.4.noarch",
"SUSE Manager Client Tools 12-BETA:python2-rhnlib-5.0.1-24.30.3.noarch",
"SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.aarch64",
"SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.ppc64le",
"SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.s390x",
"SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.x86_64",
"SUSE Manager Client Tools 12-BETA:spacecmd-5.0.1-41.42.3.noarch",
"SUSE Manager Client Tools 12-BETA:supportutils-plugin-salt-1.2.2-9.9.2.noarch",
"SUSE Manager Client Tools 12-BETA:supportutils-plugin-susemanager-client-5.0.1-9.15.2.noarch",
"SUSE Manager Client Tools 12-BETA:system-user-grafana-1.0.0-3.7.2.noarch",
"SUSE Manager Client Tools 12-BETA:system-user-prometheus-1.0.0-3.7.2.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-39201",
"url": "https://www.suse.com/security/cve/CVE-2022-39201"
},
{
"category": "external",
"summary": "SUSE Bug 1204303 for CVE-2022-39201",
"url": "https://bugzilla.suse.com/1204303"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.x86_64",
"SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.aarch64",
"SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.ppc64le",
"SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.s390x",
"SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.x86_64",
"SUSE Manager Client Tools 12-BETA:kiwi-desc-saltboot-0.1.1687520761.cefb248-4.15.2.noarch",
"SUSE Manager Client Tools 12-BETA:mgr-push-5.0.1-4.21.4.noarch",
"SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.aarch64",
"SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.ppc64le",
"SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.s390x",
"SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.x86_64",
"SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.aarch64",
"SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.ppc64le",
"SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.s390x",
"SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.x86_64",
"SUSE Manager Client Tools 12-BETA:python2-hwdata-2.3.5-15.12.2.noarch",
"SUSE Manager Client Tools 12-BETA:python2-mgr-push-5.0.1-4.21.4.noarch",
"SUSE Manager Client Tools 12-BETA:python2-rhnlib-5.0.1-24.30.3.noarch",
"SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.aarch64",
"SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.ppc64le",
"SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.s390x",
"SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.x86_64",
"SUSE Manager Client Tools 12-BETA:spacecmd-5.0.1-41.42.3.noarch",
"SUSE Manager Client Tools 12-BETA:supportutils-plugin-salt-1.2.2-9.9.2.noarch",
"SUSE Manager Client Tools 12-BETA:supportutils-plugin-susemanager-client-5.0.1-9.15.2.noarch",
"SUSE Manager Client Tools 12-BETA:system-user-grafana-1.0.0-3.7.2.noarch",
"SUSE Manager Client Tools 12-BETA:system-user-prometheus-1.0.0-3.7.2.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.x86_64",
"SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.aarch64",
"SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.ppc64le",
"SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.s390x",
"SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.x86_64",
"SUSE Manager Client Tools 12-BETA:kiwi-desc-saltboot-0.1.1687520761.cefb248-4.15.2.noarch",
"SUSE Manager Client Tools 12-BETA:mgr-push-5.0.1-4.21.4.noarch",
"SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.aarch64",
"SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.ppc64le",
"SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.s390x",
"SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.x86_64",
"SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.aarch64",
"SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.ppc64le",
"SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.s390x",
"SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.x86_64",
"SUSE Manager Client Tools 12-BETA:python2-hwdata-2.3.5-15.12.2.noarch",
"SUSE Manager Client Tools 12-BETA:python2-mgr-push-5.0.1-4.21.4.noarch",
"SUSE Manager Client Tools 12-BETA:python2-rhnlib-5.0.1-24.30.3.noarch",
"SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.aarch64",
"SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.ppc64le",
"SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.s390x",
"SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.x86_64",
"SUSE Manager Client Tools 12-BETA:spacecmd-5.0.1-41.42.3.noarch",
"SUSE Manager Client Tools 12-BETA:supportutils-plugin-salt-1.2.2-9.9.2.noarch",
"SUSE Manager Client Tools 12-BETA:supportutils-plugin-susemanager-client-5.0.1-9.15.2.noarch",
"SUSE Manager Client Tools 12-BETA:system-user-grafana-1.0.0-3.7.2.noarch",
"SUSE Manager Client Tools 12-BETA:system-user-prometheus-1.0.0-3.7.2.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-01-23T15:18:14Z",
"details": "moderate"
}
],
"title": "CVE-2022-39201"
},
{
"cve": "CVE-2022-39229",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-39229"
}
],
"notes": [
{
"category": "general",
"text": "Grafana is an open source data visualization platform for metrics, logs, and traces. Versions prior to 9.1.8 and 8.5.14 allow one user to block another user\u0027s login attempt by registering someone else\u0027e email address as a username. A Grafana user\u0027s username and email address are unique fields, that means no other user can have the same username or email address as another user. A user can have an email address as a username. However, the login system allows users to log in with either username or email address. Since Grafana allows a user to log in with either their username or email address, this creates an usual behavior where `user_1` can register with one email address and `user_2` can register their username as `user_1`\u0027s email address. This prevents `user_1` logging into the application since `user_1`\u0027s password won\u0027t match with `user_2`\u0027s email address. Versions 9.1.8 and 8.5.14 contain a patch. There are no workarounds for this issue.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.x86_64",
"SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.aarch64",
"SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.ppc64le",
"SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.s390x",
"SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.x86_64",
"SUSE Manager Client Tools 12-BETA:kiwi-desc-saltboot-0.1.1687520761.cefb248-4.15.2.noarch",
"SUSE Manager Client Tools 12-BETA:mgr-push-5.0.1-4.21.4.noarch",
"SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.aarch64",
"SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.ppc64le",
"SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.s390x",
"SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.x86_64",
"SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.aarch64",
"SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.ppc64le",
"SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.s390x",
"SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.x86_64",
"SUSE Manager Client Tools 12-BETA:python2-hwdata-2.3.5-15.12.2.noarch",
"SUSE Manager Client Tools 12-BETA:python2-mgr-push-5.0.1-4.21.4.noarch",
"SUSE Manager Client Tools 12-BETA:python2-rhnlib-5.0.1-24.30.3.noarch",
"SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.aarch64",
"SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.ppc64le",
"SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.s390x",
"SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.x86_64",
"SUSE Manager Client Tools 12-BETA:spacecmd-5.0.1-41.42.3.noarch",
"SUSE Manager Client Tools 12-BETA:supportutils-plugin-salt-1.2.2-9.9.2.noarch",
"SUSE Manager Client Tools 12-BETA:supportutils-plugin-susemanager-client-5.0.1-9.15.2.noarch",
"SUSE Manager Client Tools 12-BETA:system-user-grafana-1.0.0-3.7.2.noarch",
"SUSE Manager Client Tools 12-BETA:system-user-prometheus-1.0.0-3.7.2.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-39229",
"url": "https://www.suse.com/security/cve/CVE-2022-39229"
},
{
"category": "external",
"summary": "SUSE Bug 1204304 for CVE-2022-39229",
"url": "https://bugzilla.suse.com/1204304"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.x86_64",
"SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.aarch64",
"SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.ppc64le",
"SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.s390x",
"SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.x86_64",
"SUSE Manager Client Tools 12-BETA:kiwi-desc-saltboot-0.1.1687520761.cefb248-4.15.2.noarch",
"SUSE Manager Client Tools 12-BETA:mgr-push-5.0.1-4.21.4.noarch",
"SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.aarch64",
"SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.ppc64le",
"SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.s390x",
"SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.x86_64",
"SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.aarch64",
"SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.ppc64le",
"SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.s390x",
"SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.x86_64",
"SUSE Manager Client Tools 12-BETA:python2-hwdata-2.3.5-15.12.2.noarch",
"SUSE Manager Client Tools 12-BETA:python2-mgr-push-5.0.1-4.21.4.noarch",
"SUSE Manager Client Tools 12-BETA:python2-rhnlib-5.0.1-24.30.3.noarch",
"SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.aarch64",
"SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.ppc64le",
"SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.s390x",
"SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.x86_64",
"SUSE Manager Client Tools 12-BETA:spacecmd-5.0.1-41.42.3.noarch",
"SUSE Manager Client Tools 12-BETA:supportutils-plugin-salt-1.2.2-9.9.2.noarch",
"SUSE Manager Client Tools 12-BETA:supportutils-plugin-susemanager-client-5.0.1-9.15.2.noarch",
"SUSE Manager Client Tools 12-BETA:system-user-grafana-1.0.0-3.7.2.noarch",
"SUSE Manager Client Tools 12-BETA:system-user-prometheus-1.0.0-3.7.2.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.x86_64",
"SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.aarch64",
"SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.ppc64le",
"SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.s390x",
"SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.x86_64",
"SUSE Manager Client Tools 12-BETA:kiwi-desc-saltboot-0.1.1687520761.cefb248-4.15.2.noarch",
"SUSE Manager Client Tools 12-BETA:mgr-push-5.0.1-4.21.4.noarch",
"SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.aarch64",
"SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.ppc64le",
"SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.s390x",
"SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.x86_64",
"SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.aarch64",
"SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.ppc64le",
"SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.s390x",
"SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.x86_64",
"SUSE Manager Client Tools 12-BETA:python2-hwdata-2.3.5-15.12.2.noarch",
"SUSE Manager Client Tools 12-BETA:python2-mgr-push-5.0.1-4.21.4.noarch",
"SUSE Manager Client Tools 12-BETA:python2-rhnlib-5.0.1-24.30.3.noarch",
"SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.aarch64",
"SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.ppc64le",
"SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.s390x",
"SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.x86_64",
"SUSE Manager Client Tools 12-BETA:spacecmd-5.0.1-41.42.3.noarch",
"SUSE Manager Client Tools 12-BETA:supportutils-plugin-salt-1.2.2-9.9.2.noarch",
"SUSE Manager Client Tools 12-BETA:supportutils-plugin-susemanager-client-5.0.1-9.15.2.noarch",
"SUSE Manager Client Tools 12-BETA:system-user-grafana-1.0.0-3.7.2.noarch",
"SUSE Manager Client Tools 12-BETA:system-user-prometheus-1.0.0-3.7.2.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-01-23T15:18:14Z",
"details": "low"
}
],
"title": "CVE-2022-39229"
},
{
"cve": "CVE-2022-39306",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-39306"
}
],
"notes": [
{
"category": "general",
"text": "Grafana is an open-source platform for monitoring and observability. Versions prior to 9.2.4, or 8.5.15 on the 8.X branch, are subject to Improper Input Validation. Grafana admins can invite other members to the organization they are an admin for. When admins add members to the organization, non existing users get an email invite, existing members are added directly to the organization. When an invite link is sent, it allows users to sign up with whatever username/email address the user chooses and become a member of the organization. This introduces a vulnerability which can be used with malicious intent. This issue is patched in version 9.2.4, and has been backported to 8.5.15. There are no known workarounds.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.x86_64",
"SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.aarch64",
"SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.ppc64le",
"SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.s390x",
"SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.x86_64",
"SUSE Manager Client Tools 12-BETA:kiwi-desc-saltboot-0.1.1687520761.cefb248-4.15.2.noarch",
"SUSE Manager Client Tools 12-BETA:mgr-push-5.0.1-4.21.4.noarch",
"SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.aarch64",
"SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.ppc64le",
"SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.s390x",
"SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.x86_64",
"SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.aarch64",
"SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.ppc64le",
"SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.s390x",
"SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.x86_64",
"SUSE Manager Client Tools 12-BETA:python2-hwdata-2.3.5-15.12.2.noarch",
"SUSE Manager Client Tools 12-BETA:python2-mgr-push-5.0.1-4.21.4.noarch",
"SUSE Manager Client Tools 12-BETA:python2-rhnlib-5.0.1-24.30.3.noarch",
"SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.aarch64",
"SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.ppc64le",
"SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.s390x",
"SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.x86_64",
"SUSE Manager Client Tools 12-BETA:spacecmd-5.0.1-41.42.3.noarch",
"SUSE Manager Client Tools 12-BETA:supportutils-plugin-salt-1.2.2-9.9.2.noarch",
"SUSE Manager Client Tools 12-BETA:supportutils-plugin-susemanager-client-5.0.1-9.15.2.noarch",
"SUSE Manager Client Tools 12-BETA:system-user-grafana-1.0.0-3.7.2.noarch",
"SUSE Manager Client Tools 12-BETA:system-user-prometheus-1.0.0-3.7.2.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-39306",
"url": "https://www.suse.com/security/cve/CVE-2022-39306"
},
{
"category": "external",
"summary": "SUSE Bug 1205225 for CVE-2022-39306",
"url": "https://bugzilla.suse.com/1205225"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.x86_64",
"SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.aarch64",
"SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.ppc64le",
"SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.s390x",
"SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.x86_64",
"SUSE Manager Client Tools 12-BETA:kiwi-desc-saltboot-0.1.1687520761.cefb248-4.15.2.noarch",
"SUSE Manager Client Tools 12-BETA:mgr-push-5.0.1-4.21.4.noarch",
"SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.aarch64",
"SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.ppc64le",
"SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.s390x",
"SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.x86_64",
"SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.aarch64",
"SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.ppc64le",
"SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.s390x",
"SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.x86_64",
"SUSE Manager Client Tools 12-BETA:python2-hwdata-2.3.5-15.12.2.noarch",
"SUSE Manager Client Tools 12-BETA:python2-mgr-push-5.0.1-4.21.4.noarch",
"SUSE Manager Client Tools 12-BETA:python2-rhnlib-5.0.1-24.30.3.noarch",
"SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.aarch64",
"SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.ppc64le",
"SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.s390x",
"SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.x86_64",
"SUSE Manager Client Tools 12-BETA:spacecmd-5.0.1-41.42.3.noarch",
"SUSE Manager Client Tools 12-BETA:supportutils-plugin-salt-1.2.2-9.9.2.noarch",
"SUSE Manager Client Tools 12-BETA:supportutils-plugin-susemanager-client-5.0.1-9.15.2.noarch",
"SUSE Manager Client Tools 12-BETA:system-user-grafana-1.0.0-3.7.2.noarch",
"SUSE Manager Client Tools 12-BETA:system-user-prometheus-1.0.0-3.7.2.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.x86_64",
"SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.aarch64",
"SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.ppc64le",
"SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.s390x",
"SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.x86_64",
"SUSE Manager Client Tools 12-BETA:kiwi-desc-saltboot-0.1.1687520761.cefb248-4.15.2.noarch",
"SUSE Manager Client Tools 12-BETA:mgr-push-5.0.1-4.21.4.noarch",
"SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.aarch64",
"SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.ppc64le",
"SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.s390x",
"SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.x86_64",
"SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.aarch64",
"SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.ppc64le",
"SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.s390x",
"SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.x86_64",
"SUSE Manager Client Tools 12-BETA:python2-hwdata-2.3.5-15.12.2.noarch",
"SUSE Manager Client Tools 12-BETA:python2-mgr-push-5.0.1-4.21.4.noarch",
"SUSE Manager Client Tools 12-BETA:python2-rhnlib-5.0.1-24.30.3.noarch",
"SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.aarch64",
"SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.ppc64le",
"SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.s390x",
"SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.x86_64",
"SUSE Manager Client Tools 12-BETA:spacecmd-5.0.1-41.42.3.noarch",
"SUSE Manager Client Tools 12-BETA:supportutils-plugin-salt-1.2.2-9.9.2.noarch",
"SUSE Manager Client Tools 12-BETA:supportutils-plugin-susemanager-client-5.0.1-9.15.2.noarch",
"SUSE Manager Client Tools 12-BETA:system-user-grafana-1.0.0-3.7.2.noarch",
"SUSE Manager Client Tools 12-BETA:system-user-prometheus-1.0.0-3.7.2.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-01-23T15:18:14Z",
"details": "moderate"
}
],
"title": "CVE-2022-39306"
},
{
"cve": "CVE-2022-39307",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-39307"
}
],
"notes": [
{
"category": "general",
"text": "Grafana is an open-source platform for monitoring and observability. When using the forget password on the login page, a POST request is made to the `/api/user/password/sent-reset-email` URL. When the username or email does not exist, a JSON response contains a \"user not found\" message. This leaks information to unauthenticated users and introduces a security risk. This issue has been patched in 9.2.4 and backported to 8.5.15. There are no known workarounds.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.x86_64",
"SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.aarch64",
"SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.ppc64le",
"SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.s390x",
"SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.x86_64",
"SUSE Manager Client Tools 12-BETA:kiwi-desc-saltboot-0.1.1687520761.cefb248-4.15.2.noarch",
"SUSE Manager Client Tools 12-BETA:mgr-push-5.0.1-4.21.4.noarch",
"SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.aarch64",
"SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.ppc64le",
"SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.s390x",
"SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.x86_64",
"SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.aarch64",
"SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.ppc64le",
"SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.s390x",
"SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.x86_64",
"SUSE Manager Client Tools 12-BETA:python2-hwdata-2.3.5-15.12.2.noarch",
"SUSE Manager Client Tools 12-BETA:python2-mgr-push-5.0.1-4.21.4.noarch",
"SUSE Manager Client Tools 12-BETA:python2-rhnlib-5.0.1-24.30.3.noarch",
"SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.aarch64",
"SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.ppc64le",
"SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.s390x",
"SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.x86_64",
"SUSE Manager Client Tools 12-BETA:spacecmd-5.0.1-41.42.3.noarch",
"SUSE Manager Client Tools 12-BETA:supportutils-plugin-salt-1.2.2-9.9.2.noarch",
"SUSE Manager Client Tools 12-BETA:supportutils-plugin-susemanager-client-5.0.1-9.15.2.noarch",
"SUSE Manager Client Tools 12-BETA:system-user-grafana-1.0.0-3.7.2.noarch",
"SUSE Manager Client Tools 12-BETA:system-user-prometheus-1.0.0-3.7.2.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-39307",
"url": "https://www.suse.com/security/cve/CVE-2022-39307"
},
{
"category": "external",
"summary": "SUSE Bug 1205227 for CVE-2022-39307",
"url": "https://bugzilla.suse.com/1205227"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.x86_64",
"SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.aarch64",
"SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.ppc64le",
"SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.s390x",
"SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.x86_64",
"SUSE Manager Client Tools 12-BETA:kiwi-desc-saltboot-0.1.1687520761.cefb248-4.15.2.noarch",
"SUSE Manager Client Tools 12-BETA:mgr-push-5.0.1-4.21.4.noarch",
"SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.aarch64",
"SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.ppc64le",
"SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.s390x",
"SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.x86_64",
"SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.aarch64",
"SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.ppc64le",
"SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.s390x",
"SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.x86_64",
"SUSE Manager Client Tools 12-BETA:python2-hwdata-2.3.5-15.12.2.noarch",
"SUSE Manager Client Tools 12-BETA:python2-mgr-push-5.0.1-4.21.4.noarch",
"SUSE Manager Client Tools 12-BETA:python2-rhnlib-5.0.1-24.30.3.noarch",
"SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.aarch64",
"SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.ppc64le",
"SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.s390x",
"SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.x86_64",
"SUSE Manager Client Tools 12-BETA:spacecmd-5.0.1-41.42.3.noarch",
"SUSE Manager Client Tools 12-BETA:supportutils-plugin-salt-1.2.2-9.9.2.noarch",
"SUSE Manager Client Tools 12-BETA:supportutils-plugin-susemanager-client-5.0.1-9.15.2.noarch",
"SUSE Manager Client Tools 12-BETA:system-user-grafana-1.0.0-3.7.2.noarch",
"SUSE Manager Client Tools 12-BETA:system-user-prometheus-1.0.0-3.7.2.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.x86_64",
"SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.aarch64",
"SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.ppc64le",
"SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.s390x",
"SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.x86_64",
"SUSE Manager Client Tools 12-BETA:kiwi-desc-saltboot-0.1.1687520761.cefb248-4.15.2.noarch",
"SUSE Manager Client Tools 12-BETA:mgr-push-5.0.1-4.21.4.noarch",
"SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.aarch64",
"SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.ppc64le",
"SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.s390x",
"SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.x86_64",
"SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.aarch64",
"SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.ppc64le",
"SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.s390x",
"SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.x86_64",
"SUSE Manager Client Tools 12-BETA:python2-hwdata-2.3.5-15.12.2.noarch",
"SUSE Manager Client Tools 12-BETA:python2-mgr-push-5.0.1-4.21.4.noarch",
"SUSE Manager Client Tools 12-BETA:python2-rhnlib-5.0.1-24.30.3.noarch",
"SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.aarch64",
"SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.ppc64le",
"SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.s390x",
"SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.x86_64",
"SUSE Manager Client Tools 12-BETA:spacecmd-5.0.1-41.42.3.noarch",
"SUSE Manager Client Tools 12-BETA:supportutils-plugin-salt-1.2.2-9.9.2.noarch",
"SUSE Manager Client Tools 12-BETA:supportutils-plugin-susemanager-client-5.0.1-9.15.2.noarch",
"SUSE Manager Client Tools 12-BETA:system-user-grafana-1.0.0-3.7.2.noarch",
"SUSE Manager Client Tools 12-BETA:system-user-prometheus-1.0.0-3.7.2.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-01-23T15:18:14Z",
"details": "moderate"
}
],
"title": "CVE-2022-39307"
},
{
"cve": "CVE-2022-39324",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-39324"
}
],
"notes": [
{
"category": "general",
"text": "Grafana is an open-source platform for monitoring and observability. Prior to versions 8.5.16 and 9.2.8, malicious user can create a snapshot and arbitrarily choose the `originalUrl` parameter by editing the query, thanks to a web proxy. When another user opens the URL of the snapshot, they will be presented with the regular web interface delivered by the trusted Grafana server. The `Open original dashboard` button no longer points to the to the real original dashboard but to the attacker\u0027s injected URL. This issue is fixed in versions 8.5.16 and 9.2.8.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.x86_64",
"SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.aarch64",
"SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.ppc64le",
"SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.s390x",
"SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.x86_64",
"SUSE Manager Client Tools 12-BETA:kiwi-desc-saltboot-0.1.1687520761.cefb248-4.15.2.noarch",
"SUSE Manager Client Tools 12-BETA:mgr-push-5.0.1-4.21.4.noarch",
"SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.aarch64",
"SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.ppc64le",
"SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.s390x",
"SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.x86_64",
"SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.aarch64",
"SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.ppc64le",
"SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.s390x",
"SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.x86_64",
"SUSE Manager Client Tools 12-BETA:python2-hwdata-2.3.5-15.12.2.noarch",
"SUSE Manager Client Tools 12-BETA:python2-mgr-push-5.0.1-4.21.4.noarch",
"SUSE Manager Client Tools 12-BETA:python2-rhnlib-5.0.1-24.30.3.noarch",
"SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.aarch64",
"SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.ppc64le",
"SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.s390x",
"SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.x86_64",
"SUSE Manager Client Tools 12-BETA:spacecmd-5.0.1-41.42.3.noarch",
"SUSE Manager Client Tools 12-BETA:supportutils-plugin-salt-1.2.2-9.9.2.noarch",
"SUSE Manager Client Tools 12-BETA:supportutils-plugin-susemanager-client-5.0.1-9.15.2.noarch",
"SUSE Manager Client Tools 12-BETA:system-user-grafana-1.0.0-3.7.2.noarch",
"SUSE Manager Client Tools 12-BETA:system-user-prometheus-1.0.0-3.7.2.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-39324",
"url": "https://www.suse.com/security/cve/CVE-2022-39324"
},
{
"category": "external",
"summary": "SUSE Bug 1207750 for CVE-2022-39324",
"url": "https://bugzilla.suse.com/1207750"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.x86_64",
"SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.aarch64",
"SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.ppc64le",
"SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.s390x",
"SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.x86_64",
"SUSE Manager Client Tools 12-BETA:kiwi-desc-saltboot-0.1.1687520761.cefb248-4.15.2.noarch",
"SUSE Manager Client Tools 12-BETA:mgr-push-5.0.1-4.21.4.noarch",
"SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.aarch64",
"SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.ppc64le",
"SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.s390x",
"SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.x86_64",
"SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.aarch64",
"SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.ppc64le",
"SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.s390x",
"SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.x86_64",
"SUSE Manager Client Tools 12-BETA:python2-hwdata-2.3.5-15.12.2.noarch",
"SUSE Manager Client Tools 12-BETA:python2-mgr-push-5.0.1-4.21.4.noarch",
"SUSE Manager Client Tools 12-BETA:python2-rhnlib-5.0.1-24.30.3.noarch",
"SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.aarch64",
"SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.ppc64le",
"SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.s390x",
"SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.x86_64",
"SUSE Manager Client Tools 12-BETA:spacecmd-5.0.1-41.42.3.noarch",
"SUSE Manager Client Tools 12-BETA:supportutils-plugin-salt-1.2.2-9.9.2.noarch",
"SUSE Manager Client Tools 12-BETA:supportutils-plugin-susemanager-client-5.0.1-9.15.2.noarch",
"SUSE Manager Client Tools 12-BETA:system-user-grafana-1.0.0-3.7.2.noarch",
"SUSE Manager Client Tools 12-BETA:system-user-prometheus-1.0.0-3.7.2.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:L",
"version": "3.1"
},
"products": [
"SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.x86_64",
"SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.aarch64",
"SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.ppc64le",
"SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.s390x",
"SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.x86_64",
"SUSE Manager Client Tools 12-BETA:kiwi-desc-saltboot-0.1.1687520761.cefb248-4.15.2.noarch",
"SUSE Manager Client Tools 12-BETA:mgr-push-5.0.1-4.21.4.noarch",
"SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.aarch64",
"SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.ppc64le",
"SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.s390x",
"SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.x86_64",
"SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.aarch64",
"SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.ppc64le",
"SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.s390x",
"SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.x86_64",
"SUSE Manager Client Tools 12-BETA:python2-hwdata-2.3.5-15.12.2.noarch",
"SUSE Manager Client Tools 12-BETA:python2-mgr-push-5.0.1-4.21.4.noarch",
"SUSE Manager Client Tools 12-BETA:python2-rhnlib-5.0.1-24.30.3.noarch",
"SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.aarch64",
"SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.ppc64le",
"SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.s390x",
"SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.x86_64",
"SUSE Manager Client Tools 12-BETA:spacecmd-5.0.1-41.42.3.noarch",
"SUSE Manager Client Tools 12-BETA:supportutils-plugin-salt-1.2.2-9.9.2.noarch",
"SUSE Manager Client Tools 12-BETA:supportutils-plugin-susemanager-client-5.0.1-9.15.2.noarch",
"SUSE Manager Client Tools 12-BETA:system-user-grafana-1.0.0-3.7.2.noarch",
"SUSE Manager Client Tools 12-BETA:system-user-prometheus-1.0.0-3.7.2.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-01-23T15:18:14Z",
"details": "moderate"
}
],
"title": "CVE-2022-39324"
},
{
"cve": "CVE-2022-41715",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-41715"
}
],
"notes": [
{
"category": "general",
"text": "Programs which compile regular expressions from untrusted sources may be vulnerable to memory exhaustion or denial of service. The parsed regexp representation is linear in the size of the input, but in some cases the constant factor can be as high as 40,000, making relatively small regexps consume much larger amounts of memory. After fix, each regexp being parsed is limited to a 256 MB memory footprint. Regular expressions whose representation would use more space than that are rejected. Normal use of regular expressions is unaffected.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.x86_64",
"SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.aarch64",
"SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.ppc64le",
"SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.s390x",
"SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.x86_64",
"SUSE Manager Client Tools 12-BETA:kiwi-desc-saltboot-0.1.1687520761.cefb248-4.15.2.noarch",
"SUSE Manager Client Tools 12-BETA:mgr-push-5.0.1-4.21.4.noarch",
"SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.aarch64",
"SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.ppc64le",
"SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.s390x",
"SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.x86_64",
"SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.aarch64",
"SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.ppc64le",
"SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.s390x",
"SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.x86_64",
"SUSE Manager Client Tools 12-BETA:python2-hwdata-2.3.5-15.12.2.noarch",
"SUSE Manager Client Tools 12-BETA:python2-mgr-push-5.0.1-4.21.4.noarch",
"SUSE Manager Client Tools 12-BETA:python2-rhnlib-5.0.1-24.30.3.noarch",
"SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.aarch64",
"SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.ppc64le",
"SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.s390x",
"SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.x86_64",
"SUSE Manager Client Tools 12-BETA:spacecmd-5.0.1-41.42.3.noarch",
"SUSE Manager Client Tools 12-BETA:supportutils-plugin-salt-1.2.2-9.9.2.noarch",
"SUSE Manager Client Tools 12-BETA:supportutils-plugin-susemanager-client-5.0.1-9.15.2.noarch",
"SUSE Manager Client Tools 12-BETA:system-user-grafana-1.0.0-3.7.2.noarch",
"SUSE Manager Client Tools 12-BETA:system-user-prometheus-1.0.0-3.7.2.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-41715",
"url": "https://www.suse.com/security/cve/CVE-2022-41715"
},
{
"category": "external",
"summary": "SUSE Bug 1204023 for CVE-2022-41715",
"url": "https://bugzilla.suse.com/1204023"
},
{
"category": "external",
"summary": "SUSE Bug 1208441 for CVE-2022-41715",
"url": "https://bugzilla.suse.com/1208441"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.x86_64",
"SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.aarch64",
"SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.ppc64le",
"SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.s390x",
"SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.x86_64",
"SUSE Manager Client Tools 12-BETA:kiwi-desc-saltboot-0.1.1687520761.cefb248-4.15.2.noarch",
"SUSE Manager Client Tools 12-BETA:mgr-push-5.0.1-4.21.4.noarch",
"SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.aarch64",
"SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.ppc64le",
"SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.s390x",
"SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.x86_64",
"SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.aarch64",
"SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.ppc64le",
"SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.s390x",
"SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.x86_64",
"SUSE Manager Client Tools 12-BETA:python2-hwdata-2.3.5-15.12.2.noarch",
"SUSE Manager Client Tools 12-BETA:python2-mgr-push-5.0.1-4.21.4.noarch",
"SUSE Manager Client Tools 12-BETA:python2-rhnlib-5.0.1-24.30.3.noarch",
"SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.aarch64",
"SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.ppc64le",
"SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.s390x",
"SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.x86_64",
"SUSE Manager Client Tools 12-BETA:spacecmd-5.0.1-41.42.3.noarch",
"SUSE Manager Client Tools 12-BETA:supportutils-plugin-salt-1.2.2-9.9.2.noarch",
"SUSE Manager Client Tools 12-BETA:supportutils-plugin-susemanager-client-5.0.1-9.15.2.noarch",
"SUSE Manager Client Tools 12-BETA:system-user-grafana-1.0.0-3.7.2.noarch",
"SUSE Manager Client Tools 12-BETA:system-user-prometheus-1.0.0-3.7.2.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.x86_64",
"SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.aarch64",
"SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.ppc64le",
"SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.s390x",
"SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.x86_64",
"SUSE Manager Client Tools 12-BETA:kiwi-desc-saltboot-0.1.1687520761.cefb248-4.15.2.noarch",
"SUSE Manager Client Tools 12-BETA:mgr-push-5.0.1-4.21.4.noarch",
"SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.aarch64",
"SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.ppc64le",
"SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.s390x",
"SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.x86_64",
"SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.aarch64",
"SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.ppc64le",
"SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.s390x",
"SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.x86_64",
"SUSE Manager Client Tools 12-BETA:python2-hwdata-2.3.5-15.12.2.noarch",
"SUSE Manager Client Tools 12-BETA:python2-mgr-push-5.0.1-4.21.4.noarch",
"SUSE Manager Client Tools 12-BETA:python2-rhnlib-5.0.1-24.30.3.noarch",
"SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.aarch64",
"SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.ppc64le",
"SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.s390x",
"SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.x86_64",
"SUSE Manager Client Tools 12-BETA:spacecmd-5.0.1-41.42.3.noarch",
"SUSE Manager Client Tools 12-BETA:supportutils-plugin-salt-1.2.2-9.9.2.noarch",
"SUSE Manager Client Tools 12-BETA:supportutils-plugin-susemanager-client-5.0.1-9.15.2.noarch",
"SUSE Manager Client Tools 12-BETA:system-user-grafana-1.0.0-3.7.2.noarch",
"SUSE Manager Client Tools 12-BETA:system-user-prometheus-1.0.0-3.7.2.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-01-23T15:18:14Z",
"details": "moderate"
}
],
"title": "CVE-2022-41715"
},
{
"cve": "CVE-2022-41723",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-41723"
}
],
"notes": [
{
"category": "general",
"text": "A maliciously crafted HTTP/2 stream could cause excessive CPU consumption in the HPACK decoder, sufficient to cause a denial of service from a small number of small requests.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.x86_64",
"SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.aarch64",
"SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.ppc64le",
"SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.s390x",
"SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.x86_64",
"SUSE Manager Client Tools 12-BETA:kiwi-desc-saltboot-0.1.1687520761.cefb248-4.15.2.noarch",
"SUSE Manager Client Tools 12-BETA:mgr-push-5.0.1-4.21.4.noarch",
"SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.aarch64",
"SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.ppc64le",
"SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.s390x",
"SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.x86_64",
"SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.aarch64",
"SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.ppc64le",
"SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.s390x",
"SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.x86_64",
"SUSE Manager Client Tools 12-BETA:python2-hwdata-2.3.5-15.12.2.noarch",
"SUSE Manager Client Tools 12-BETA:python2-mgr-push-5.0.1-4.21.4.noarch",
"SUSE Manager Client Tools 12-BETA:python2-rhnlib-5.0.1-24.30.3.noarch",
"SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.aarch64",
"SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.ppc64le",
"SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.s390x",
"SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.x86_64",
"SUSE Manager Client Tools 12-BETA:spacecmd-5.0.1-41.42.3.noarch",
"SUSE Manager Client Tools 12-BETA:supportutils-plugin-salt-1.2.2-9.9.2.noarch",
"SUSE Manager Client Tools 12-BETA:supportutils-plugin-susemanager-client-5.0.1-9.15.2.noarch",
"SUSE Manager Client Tools 12-BETA:system-user-grafana-1.0.0-3.7.2.noarch",
"SUSE Manager Client Tools 12-BETA:system-user-prometheus-1.0.0-3.7.2.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-41723",
"url": "https://www.suse.com/security/cve/CVE-2022-41723"
},
{
"category": "external",
"summary": "SUSE Bug 1208270 for CVE-2022-41723",
"url": "https://bugzilla.suse.com/1208270"
},
{
"category": "external",
"summary": "SUSE Bug 1215588 for CVE-2022-41723",
"url": "https://bugzilla.suse.com/1215588"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.x86_64",
"SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.aarch64",
"SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.ppc64le",
"SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.s390x",
"SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.x86_64",
"SUSE Manager Client Tools 12-BETA:kiwi-desc-saltboot-0.1.1687520761.cefb248-4.15.2.noarch",
"SUSE Manager Client Tools 12-BETA:mgr-push-5.0.1-4.21.4.noarch",
"SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.aarch64",
"SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.ppc64le",
"SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.s390x",
"SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.x86_64",
"SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.aarch64",
"SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.ppc64le",
"SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.s390x",
"SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.x86_64",
"SUSE Manager Client Tools 12-BETA:python2-hwdata-2.3.5-15.12.2.noarch",
"SUSE Manager Client Tools 12-BETA:python2-mgr-push-5.0.1-4.21.4.noarch",
"SUSE Manager Client Tools 12-BETA:python2-rhnlib-5.0.1-24.30.3.noarch",
"SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.aarch64",
"SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.ppc64le",
"SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.s390x",
"SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.x86_64",
"SUSE Manager Client Tools 12-BETA:spacecmd-5.0.1-41.42.3.noarch",
"SUSE Manager Client Tools 12-BETA:supportutils-plugin-salt-1.2.2-9.9.2.noarch",
"SUSE Manager Client Tools 12-BETA:supportutils-plugin-susemanager-client-5.0.1-9.15.2.noarch",
"SUSE Manager Client Tools 12-BETA:system-user-grafana-1.0.0-3.7.2.noarch",
"SUSE Manager Client Tools 12-BETA:system-user-prometheus-1.0.0-3.7.2.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.x86_64",
"SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.aarch64",
"SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.ppc64le",
"SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.s390x",
"SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.x86_64",
"SUSE Manager Client Tools 12-BETA:kiwi-desc-saltboot-0.1.1687520761.cefb248-4.15.2.noarch",
"SUSE Manager Client Tools 12-BETA:mgr-push-5.0.1-4.21.4.noarch",
"SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.aarch64",
"SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.ppc64le",
"SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.s390x",
"SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.x86_64",
"SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.aarch64",
"SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.ppc64le",
"SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.s390x",
"SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.x86_64",
"SUSE Manager Client Tools 12-BETA:python2-hwdata-2.3.5-15.12.2.noarch",
"SUSE Manager Client Tools 12-BETA:python2-mgr-push-5.0.1-4.21.4.noarch",
"SUSE Manager Client Tools 12-BETA:python2-rhnlib-5.0.1-24.30.3.noarch",
"SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.aarch64",
"SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.ppc64le",
"SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.s390x",
"SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.x86_64",
"SUSE Manager Client Tools 12-BETA:spacecmd-5.0.1-41.42.3.noarch",
"SUSE Manager Client Tools 12-BETA:supportutils-plugin-salt-1.2.2-9.9.2.noarch",
"SUSE Manager Client Tools 12-BETA:supportutils-plugin-susemanager-client-5.0.1-9.15.2.noarch",
"SUSE Manager Client Tools 12-BETA:system-user-grafana-1.0.0-3.7.2.noarch",
"SUSE Manager Client Tools 12-BETA:system-user-prometheus-1.0.0-3.7.2.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-01-23T15:18:14Z",
"details": "important"
}
],
"title": "CVE-2022-41723"
},
{
"cve": "CVE-2022-46146",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-46146"
}
],
"notes": [
{
"category": "general",
"text": "Prometheus Exporter Toolkit is a utility package to build exporters. Prior to versions 0.7.2 and 0.8.2, if someone has access to a Prometheus web.yml file and users\u0027 bcrypted passwords, they can bypass security by poisoning the built-in authentication cache. Versions 0.7.2 and 0.8.2 contain a fix for the issue. There is no workaround, but attacker must have access to the hashed password to use this functionality.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.x86_64",
"SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.aarch64",
"SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.ppc64le",
"SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.s390x",
"SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.x86_64",
"SUSE Manager Client Tools 12-BETA:kiwi-desc-saltboot-0.1.1687520761.cefb248-4.15.2.noarch",
"SUSE Manager Client Tools 12-BETA:mgr-push-5.0.1-4.21.4.noarch",
"SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.aarch64",
"SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.ppc64le",
"SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.s390x",
"SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.x86_64",
"SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.aarch64",
"SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.ppc64le",
"SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.s390x",
"SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.x86_64",
"SUSE Manager Client Tools 12-BETA:python2-hwdata-2.3.5-15.12.2.noarch",
"SUSE Manager Client Tools 12-BETA:python2-mgr-push-5.0.1-4.21.4.noarch",
"SUSE Manager Client Tools 12-BETA:python2-rhnlib-5.0.1-24.30.3.noarch",
"SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.aarch64",
"SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.ppc64le",
"SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.s390x",
"SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.x86_64",
"SUSE Manager Client Tools 12-BETA:spacecmd-5.0.1-41.42.3.noarch",
"SUSE Manager Client Tools 12-BETA:supportutils-plugin-salt-1.2.2-9.9.2.noarch",
"SUSE Manager Client Tools 12-BETA:supportutils-plugin-susemanager-client-5.0.1-9.15.2.noarch",
"SUSE Manager Client Tools 12-BETA:system-user-grafana-1.0.0-3.7.2.noarch",
"SUSE Manager Client Tools 12-BETA:system-user-prometheus-1.0.0-3.7.2.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-46146",
"url": "https://www.suse.com/security/cve/CVE-2022-46146"
},
{
"category": "external",
"summary": "SUSE Bug 1208046 for CVE-2022-46146",
"url": "https://bugzilla.suse.com/1208046"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.x86_64",
"SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.aarch64",
"SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.ppc64le",
"SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.s390x",
"SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.x86_64",
"SUSE Manager Client Tools 12-BETA:kiwi-desc-saltboot-0.1.1687520761.cefb248-4.15.2.noarch",
"SUSE Manager Client Tools 12-BETA:mgr-push-5.0.1-4.21.4.noarch",
"SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.aarch64",
"SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.ppc64le",
"SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.s390x",
"SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.x86_64",
"SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.aarch64",
"SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.ppc64le",
"SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.s390x",
"SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.x86_64",
"SUSE Manager Client Tools 12-BETA:python2-hwdata-2.3.5-15.12.2.noarch",
"SUSE Manager Client Tools 12-BETA:python2-mgr-push-5.0.1-4.21.4.noarch",
"SUSE Manager Client Tools 12-BETA:python2-rhnlib-5.0.1-24.30.3.noarch",
"SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.aarch64",
"SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.ppc64le",
"SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.s390x",
"SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.x86_64",
"SUSE Manager Client Tools 12-BETA:spacecmd-5.0.1-41.42.3.noarch",
"SUSE Manager Client Tools 12-BETA:supportutils-plugin-salt-1.2.2-9.9.2.noarch",
"SUSE Manager Client Tools 12-BETA:supportutils-plugin-susemanager-client-5.0.1-9.15.2.noarch",
"SUSE Manager Client Tools 12-BETA:system-user-grafana-1.0.0-3.7.2.noarch",
"SUSE Manager Client Tools 12-BETA:system-user-prometheus-1.0.0-3.7.2.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.x86_64",
"SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.aarch64",
"SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.ppc64le",
"SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.s390x",
"SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.x86_64",
"SUSE Manager Client Tools 12-BETA:kiwi-desc-saltboot-0.1.1687520761.cefb248-4.15.2.noarch",
"SUSE Manager Client Tools 12-BETA:mgr-push-5.0.1-4.21.4.noarch",
"SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.aarch64",
"SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.ppc64le",
"SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.s390x",
"SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.x86_64",
"SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.aarch64",
"SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.ppc64le",
"SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.s390x",
"SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.x86_64",
"SUSE Manager Client Tools 12-BETA:python2-hwdata-2.3.5-15.12.2.noarch",
"SUSE Manager Client Tools 12-BETA:python2-mgr-push-5.0.1-4.21.4.noarch",
"SUSE Manager Client Tools 12-BETA:python2-rhnlib-5.0.1-24.30.3.noarch",
"SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.aarch64",
"SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.ppc64le",
"SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.s390x",
"SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.x86_64",
"SUSE Manager Client Tools 12-BETA:spacecmd-5.0.1-41.42.3.noarch",
"SUSE Manager Client Tools 12-BETA:supportutils-plugin-salt-1.2.2-9.9.2.noarch",
"SUSE Manager Client Tools 12-BETA:supportutils-plugin-susemanager-client-5.0.1-9.15.2.noarch",
"SUSE Manager Client Tools 12-BETA:system-user-grafana-1.0.0-3.7.2.noarch",
"SUSE Manager Client Tools 12-BETA:system-user-prometheus-1.0.0-3.7.2.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-01-23T15:18:14Z",
"details": "important"
}
],
"title": "CVE-2022-46146"
},
{
"cve": "CVE-2023-0507",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-0507"
}
],
"notes": [
{
"category": "general",
"text": "Grafana is an open-source platform for monitoring and observability. \n\nStarting with the 8.1 branch, Grafana had a stored XSS vulnerability affecting the core plugin GeoMap. \n\nThe stored XSS vulnerability was possible due to map attributions weren\u0027t properly sanitized and allowed arbitrary JavaScript to be executed in the context of the currently authorized user of the Grafana instance. \n\nAn attacker needs to have the Editor role in order to change a panel to include a map attribution containing JavaScript. \n\nThis means that vertical privilege escalation is possible, where a user with Editor role can change to a known password for a user having Admin role if the user with Admin role executes malicious JavaScript viewing a dashboard. \n\nUsers may upgrade to version 8.5.21, 9.2.13 and 9.3.8 to receive a fix. \n\n",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.x86_64",
"SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.aarch64",
"SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.ppc64le",
"SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.s390x",
"SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.x86_64",
"SUSE Manager Client Tools 12-BETA:kiwi-desc-saltboot-0.1.1687520761.cefb248-4.15.2.noarch",
"SUSE Manager Client Tools 12-BETA:mgr-push-5.0.1-4.21.4.noarch",
"SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.aarch64",
"SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.ppc64le",
"SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.s390x",
"SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.x86_64",
"SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.aarch64",
"SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.ppc64le",
"SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.s390x",
"SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.x86_64",
"SUSE Manager Client Tools 12-BETA:python2-hwdata-2.3.5-15.12.2.noarch",
"SUSE Manager Client Tools 12-BETA:python2-mgr-push-5.0.1-4.21.4.noarch",
"SUSE Manager Client Tools 12-BETA:python2-rhnlib-5.0.1-24.30.3.noarch",
"SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.aarch64",
"SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.ppc64le",
"SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.s390x",
"SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.x86_64",
"SUSE Manager Client Tools 12-BETA:spacecmd-5.0.1-41.42.3.noarch",
"SUSE Manager Client Tools 12-BETA:supportutils-plugin-salt-1.2.2-9.9.2.noarch",
"SUSE Manager Client Tools 12-BETA:supportutils-plugin-susemanager-client-5.0.1-9.15.2.noarch",
"SUSE Manager Client Tools 12-BETA:system-user-grafana-1.0.0-3.7.2.noarch",
"SUSE Manager Client Tools 12-BETA:system-user-prometheus-1.0.0-3.7.2.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-0507",
"url": "https://www.suse.com/security/cve/CVE-2023-0507"
},
{
"category": "external",
"summary": "SUSE Bug 1208821 for CVE-2023-0507",
"url": "https://bugzilla.suse.com/1208821"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.x86_64",
"SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.aarch64",
"SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.ppc64le",
"SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.s390x",
"SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.x86_64",
"SUSE Manager Client Tools 12-BETA:kiwi-desc-saltboot-0.1.1687520761.cefb248-4.15.2.noarch",
"SUSE Manager Client Tools 12-BETA:mgr-push-5.0.1-4.21.4.noarch",
"SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.aarch64",
"SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.ppc64le",
"SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.s390x",
"SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.x86_64",
"SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.aarch64",
"SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.ppc64le",
"SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.s390x",
"SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.x86_64",
"SUSE Manager Client Tools 12-BETA:python2-hwdata-2.3.5-15.12.2.noarch",
"SUSE Manager Client Tools 12-BETA:python2-mgr-push-5.0.1-4.21.4.noarch",
"SUSE Manager Client Tools 12-BETA:python2-rhnlib-5.0.1-24.30.3.noarch",
"SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.aarch64",
"SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.ppc64le",
"SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.s390x",
"SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.x86_64",
"SUSE Manager Client Tools 12-BETA:spacecmd-5.0.1-41.42.3.noarch",
"SUSE Manager Client Tools 12-BETA:supportutils-plugin-salt-1.2.2-9.9.2.noarch",
"SUSE Manager Client Tools 12-BETA:supportutils-plugin-susemanager-client-5.0.1-9.15.2.noarch",
"SUSE Manager Client Tools 12-BETA:system-user-grafana-1.0.0-3.7.2.noarch",
"SUSE Manager Client Tools 12-BETA:system-user-prometheus-1.0.0-3.7.2.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.3,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.x86_64",
"SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.aarch64",
"SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.ppc64le",
"SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.s390x",
"SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.x86_64",
"SUSE Manager Client Tools 12-BETA:kiwi-desc-saltboot-0.1.1687520761.cefb248-4.15.2.noarch",
"SUSE Manager Client Tools 12-BETA:mgr-push-5.0.1-4.21.4.noarch",
"SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.aarch64",
"SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.ppc64le",
"SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.s390x",
"SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.x86_64",
"SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.aarch64",
"SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.ppc64le",
"SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.s390x",
"SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.x86_64",
"SUSE Manager Client Tools 12-BETA:python2-hwdata-2.3.5-15.12.2.noarch",
"SUSE Manager Client Tools 12-BETA:python2-mgr-push-5.0.1-4.21.4.noarch",
"SUSE Manager Client Tools 12-BETA:python2-rhnlib-5.0.1-24.30.3.noarch",
"SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.aarch64",
"SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.ppc64le",
"SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.s390x",
"SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.x86_64",
"SUSE Manager Client Tools 12-BETA:spacecmd-5.0.1-41.42.3.noarch",
"SUSE Manager Client Tools 12-BETA:supportutils-plugin-salt-1.2.2-9.9.2.noarch",
"SUSE Manager Client Tools 12-BETA:supportutils-plugin-susemanager-client-5.0.1-9.15.2.noarch",
"SUSE Manager Client Tools 12-BETA:system-user-grafana-1.0.0-3.7.2.noarch",
"SUSE Manager Client Tools 12-BETA:system-user-prometheus-1.0.0-3.7.2.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-01-23T15:18:14Z",
"details": "important"
}
],
"title": "CVE-2023-0507"
},
{
"cve": "CVE-2023-0594",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-0594"
}
],
"notes": [
{
"category": "general",
"text": "Grafana is an open-source platform for monitoring and observability. Starting with the 7.0 branch, Grafana had a stored XSS vulnerability in the trace view visualization. The stored XSS vulnerability was possible due the value of a span\u0027s attributes/resources were not properly sanitized and this will be rendered when the span\u0027s attributes/resources are expanded. An attacker needs to have the Editor role in order to change the value of a trace view visualization to contain JavaScript. This means that vertical privilege escalation is possible, where a user with Editor role can change to a known password for a user having Admin role if the user with Admin role executes malicious JavaScript viewing a dashboard. Users may upgrade to version 8.5.21, 9.2.13 and 9.3.8 to receive a fix.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.x86_64",
"SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.aarch64",
"SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.ppc64le",
"SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.s390x",
"SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.x86_64",
"SUSE Manager Client Tools 12-BETA:kiwi-desc-saltboot-0.1.1687520761.cefb248-4.15.2.noarch",
"SUSE Manager Client Tools 12-BETA:mgr-push-5.0.1-4.21.4.noarch",
"SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.aarch64",
"SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.ppc64le",
"SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.s390x",
"SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.x86_64",
"SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.aarch64",
"SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.ppc64le",
"SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.s390x",
"SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.x86_64",
"SUSE Manager Client Tools 12-BETA:python2-hwdata-2.3.5-15.12.2.noarch",
"SUSE Manager Client Tools 12-BETA:python2-mgr-push-5.0.1-4.21.4.noarch",
"SUSE Manager Client Tools 12-BETA:python2-rhnlib-5.0.1-24.30.3.noarch",
"SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.aarch64",
"SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.ppc64le",
"SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.s390x",
"SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.x86_64",
"SUSE Manager Client Tools 12-BETA:spacecmd-5.0.1-41.42.3.noarch",
"SUSE Manager Client Tools 12-BETA:supportutils-plugin-salt-1.2.2-9.9.2.noarch",
"SUSE Manager Client Tools 12-BETA:supportutils-plugin-susemanager-client-5.0.1-9.15.2.noarch",
"SUSE Manager Client Tools 12-BETA:system-user-grafana-1.0.0-3.7.2.noarch",
"SUSE Manager Client Tools 12-BETA:system-user-prometheus-1.0.0-3.7.2.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-0594",
"url": "https://www.suse.com/security/cve/CVE-2023-0594"
},
{
"category": "external",
"summary": "SUSE Bug 1208819 for CVE-2023-0594",
"url": "https://bugzilla.suse.com/1208819"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.x86_64",
"SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.aarch64",
"SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.ppc64le",
"SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.s390x",
"SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.x86_64",
"SUSE Manager Client Tools 12-BETA:kiwi-desc-saltboot-0.1.1687520761.cefb248-4.15.2.noarch",
"SUSE Manager Client Tools 12-BETA:mgr-push-5.0.1-4.21.4.noarch",
"SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.aarch64",
"SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.ppc64le",
"SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.s390x",
"SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.x86_64",
"SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.aarch64",
"SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.ppc64le",
"SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.s390x",
"SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.x86_64",
"SUSE Manager Client Tools 12-BETA:python2-hwdata-2.3.5-15.12.2.noarch",
"SUSE Manager Client Tools 12-BETA:python2-mgr-push-5.0.1-4.21.4.noarch",
"SUSE Manager Client Tools 12-BETA:python2-rhnlib-5.0.1-24.30.3.noarch",
"SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.aarch64",
"SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.ppc64le",
"SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.s390x",
"SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.x86_64",
"SUSE Manager Client Tools 12-BETA:spacecmd-5.0.1-41.42.3.noarch",
"SUSE Manager Client Tools 12-BETA:supportutils-plugin-salt-1.2.2-9.9.2.noarch",
"SUSE Manager Client Tools 12-BETA:supportutils-plugin-susemanager-client-5.0.1-9.15.2.noarch",
"SUSE Manager Client Tools 12-BETA:system-user-grafana-1.0.0-3.7.2.noarch",
"SUSE Manager Client Tools 12-BETA:system-user-prometheus-1.0.0-3.7.2.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.3,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.x86_64",
"SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.aarch64",
"SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.ppc64le",
"SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.s390x",
"SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.x86_64",
"SUSE Manager Client Tools 12-BETA:kiwi-desc-saltboot-0.1.1687520761.cefb248-4.15.2.noarch",
"SUSE Manager Client Tools 12-BETA:mgr-push-5.0.1-4.21.4.noarch",
"SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.aarch64",
"SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.ppc64le",
"SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.s390x",
"SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.x86_64",
"SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.aarch64",
"SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.ppc64le",
"SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.s390x",
"SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.x86_64",
"SUSE Manager Client Tools 12-BETA:python2-hwdata-2.3.5-15.12.2.noarch",
"SUSE Manager Client Tools 12-BETA:python2-mgr-push-5.0.1-4.21.4.noarch",
"SUSE Manager Client Tools 12-BETA:python2-rhnlib-5.0.1-24.30.3.noarch",
"SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.aarch64",
"SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.ppc64le",
"SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.s390x",
"SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.x86_64",
"SUSE Manager Client Tools 12-BETA:spacecmd-5.0.1-41.42.3.noarch",
"SUSE Manager Client Tools 12-BETA:supportutils-plugin-salt-1.2.2-9.9.2.noarch",
"SUSE Manager Client Tools 12-BETA:supportutils-plugin-susemanager-client-5.0.1-9.15.2.noarch",
"SUSE Manager Client Tools 12-BETA:system-user-grafana-1.0.0-3.7.2.noarch",
"SUSE Manager Client Tools 12-BETA:system-user-prometheus-1.0.0-3.7.2.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-01-23T15:18:14Z",
"details": "important"
}
],
"title": "CVE-2023-0594"
},
{
"cve": "CVE-2023-1387",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-1387"
}
],
"notes": [
{
"category": "general",
"text": "Grafana is an open-source platform for monitoring and observability. \n\nStarting with the 9.1 branch, Grafana introduced the ability to search for a JWT in the URL query parameter auth_token and use it as the authentication token. \n\nBy enabling the \"url_login\" configuration option (disabled by default), a JWT might be sent to data sources. If an attacker has access to the data source, the leaked token could be used to authenticate to Grafana.\n\n",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.x86_64",
"SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.aarch64",
"SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.ppc64le",
"SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.s390x",
"SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.x86_64",
"SUSE Manager Client Tools 12-BETA:kiwi-desc-saltboot-0.1.1687520761.cefb248-4.15.2.noarch",
"SUSE Manager Client Tools 12-BETA:mgr-push-5.0.1-4.21.4.noarch",
"SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.aarch64",
"SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.ppc64le",
"SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.s390x",
"SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.x86_64",
"SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.aarch64",
"SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.ppc64le",
"SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.s390x",
"SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.x86_64",
"SUSE Manager Client Tools 12-BETA:python2-hwdata-2.3.5-15.12.2.noarch",
"SUSE Manager Client Tools 12-BETA:python2-mgr-push-5.0.1-4.21.4.noarch",
"SUSE Manager Client Tools 12-BETA:python2-rhnlib-5.0.1-24.30.3.noarch",
"SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.aarch64",
"SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.ppc64le",
"SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.s390x",
"SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.x86_64",
"SUSE Manager Client Tools 12-BETA:spacecmd-5.0.1-41.42.3.noarch",
"SUSE Manager Client Tools 12-BETA:supportutils-plugin-salt-1.2.2-9.9.2.noarch",
"SUSE Manager Client Tools 12-BETA:supportutils-plugin-susemanager-client-5.0.1-9.15.2.noarch",
"SUSE Manager Client Tools 12-BETA:system-user-grafana-1.0.0-3.7.2.noarch",
"SUSE Manager Client Tools 12-BETA:system-user-prometheus-1.0.0-3.7.2.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-1387",
"url": "https://www.suse.com/security/cve/CVE-2023-1387"
},
{
"category": "external",
"summary": "SUSE Bug 1210907 for CVE-2023-1387",
"url": "https://bugzilla.suse.com/1210907"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.x86_64",
"SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.aarch64",
"SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.ppc64le",
"SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.s390x",
"SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.x86_64",
"SUSE Manager Client Tools 12-BETA:kiwi-desc-saltboot-0.1.1687520761.cefb248-4.15.2.noarch",
"SUSE Manager Client Tools 12-BETA:mgr-push-5.0.1-4.21.4.noarch",
"SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.aarch64",
"SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.ppc64le",
"SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.s390x",
"SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.x86_64",
"SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.aarch64",
"SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.ppc64le",
"SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.s390x",
"SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.x86_64",
"SUSE Manager Client Tools 12-BETA:python2-hwdata-2.3.5-15.12.2.noarch",
"SUSE Manager Client Tools 12-BETA:python2-mgr-push-5.0.1-4.21.4.noarch",
"SUSE Manager Client Tools 12-BETA:python2-rhnlib-5.0.1-24.30.3.noarch",
"SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.aarch64",
"SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.ppc64le",
"SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.s390x",
"SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.x86_64",
"SUSE Manager Client Tools 12-BETA:spacecmd-5.0.1-41.42.3.noarch",
"SUSE Manager Client Tools 12-BETA:supportutils-plugin-salt-1.2.2-9.9.2.noarch",
"SUSE Manager Client Tools 12-BETA:supportutils-plugin-susemanager-client-5.0.1-9.15.2.noarch",
"SUSE Manager Client Tools 12-BETA:system-user-grafana-1.0.0-3.7.2.noarch",
"SUSE Manager Client Tools 12-BETA:system-user-prometheus-1.0.0-3.7.2.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.x86_64",
"SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.aarch64",
"SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.ppc64le",
"SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.s390x",
"SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.x86_64",
"SUSE Manager Client Tools 12-BETA:kiwi-desc-saltboot-0.1.1687520761.cefb248-4.15.2.noarch",
"SUSE Manager Client Tools 12-BETA:mgr-push-5.0.1-4.21.4.noarch",
"SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.aarch64",
"SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.ppc64le",
"SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.s390x",
"SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.x86_64",
"SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.aarch64",
"SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.ppc64le",
"SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.s390x",
"SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.x86_64",
"SUSE Manager Client Tools 12-BETA:python2-hwdata-2.3.5-15.12.2.noarch",
"SUSE Manager Client Tools 12-BETA:python2-mgr-push-5.0.1-4.21.4.noarch",
"SUSE Manager Client Tools 12-BETA:python2-rhnlib-5.0.1-24.30.3.noarch",
"SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.aarch64",
"SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.ppc64le",
"SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.s390x",
"SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.x86_64",
"SUSE Manager Client Tools 12-BETA:spacecmd-5.0.1-41.42.3.noarch",
"SUSE Manager Client Tools 12-BETA:supportutils-plugin-salt-1.2.2-9.9.2.noarch",
"SUSE Manager Client Tools 12-BETA:supportutils-plugin-susemanager-client-5.0.1-9.15.2.noarch",
"SUSE Manager Client Tools 12-BETA:system-user-grafana-1.0.0-3.7.2.noarch",
"SUSE Manager Client Tools 12-BETA:system-user-prometheus-1.0.0-3.7.2.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-01-23T15:18:14Z",
"details": "moderate"
}
],
"title": "CVE-2023-1387"
},
{
"cve": "CVE-2023-1410",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-1410"
}
],
"notes": [
{
"category": "general",
"text": "Grafana is an open-source platform for monitoring and observability. \n\nGrafana had a stored XSS vulnerability in the Graphite FunctionDescription tooltip. \n\nThe stored XSS vulnerability was possible due the value of the Function Description was not properly sanitized.\n\nAn attacker needs to have control over the Graphite data source in order to manipulate a function description and a Grafana admin needs to configure the data source, later a Grafana user needs to select a tampered function and hover over the description. \n\n Users may upgrade to version 8.5.22, 9.2.15 and 9.3.11 to receive a fix. \n\n\n\n\n\n\n\n\n\n\n",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.x86_64",
"SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.aarch64",
"SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.ppc64le",
"SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.s390x",
"SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.x86_64",
"SUSE Manager Client Tools 12-BETA:kiwi-desc-saltboot-0.1.1687520761.cefb248-4.15.2.noarch",
"SUSE Manager Client Tools 12-BETA:mgr-push-5.0.1-4.21.4.noarch",
"SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.aarch64",
"SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.ppc64le",
"SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.s390x",
"SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.x86_64",
"SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.aarch64",
"SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.ppc64le",
"SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.s390x",
"SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.x86_64",
"SUSE Manager Client Tools 12-BETA:python2-hwdata-2.3.5-15.12.2.noarch",
"SUSE Manager Client Tools 12-BETA:python2-mgr-push-5.0.1-4.21.4.noarch",
"SUSE Manager Client Tools 12-BETA:python2-rhnlib-5.0.1-24.30.3.noarch",
"SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.aarch64",
"SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.ppc64le",
"SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.s390x",
"SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.x86_64",
"SUSE Manager Client Tools 12-BETA:spacecmd-5.0.1-41.42.3.noarch",
"SUSE Manager Client Tools 12-BETA:supportutils-plugin-salt-1.2.2-9.9.2.noarch",
"SUSE Manager Client Tools 12-BETA:supportutils-plugin-susemanager-client-5.0.1-9.15.2.noarch",
"SUSE Manager Client Tools 12-BETA:system-user-grafana-1.0.0-3.7.2.noarch",
"SUSE Manager Client Tools 12-BETA:system-user-prometheus-1.0.0-3.7.2.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-1410",
"url": "https://www.suse.com/security/cve/CVE-2023-1410"
},
{
"category": "external",
"summary": "SUSE Bug 1209645 for CVE-2023-1410",
"url": "https://bugzilla.suse.com/1209645"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.x86_64",
"SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.aarch64",
"SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.ppc64le",
"SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.s390x",
"SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.x86_64",
"SUSE Manager Client Tools 12-BETA:kiwi-desc-saltboot-0.1.1687520761.cefb248-4.15.2.noarch",
"SUSE Manager Client Tools 12-BETA:mgr-push-5.0.1-4.21.4.noarch",
"SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.aarch64",
"SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.ppc64le",
"SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.s390x",
"SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.x86_64",
"SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.aarch64",
"SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.ppc64le",
"SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.s390x",
"SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.x86_64",
"SUSE Manager Client Tools 12-BETA:python2-hwdata-2.3.5-15.12.2.noarch",
"SUSE Manager Client Tools 12-BETA:python2-mgr-push-5.0.1-4.21.4.noarch",
"SUSE Manager Client Tools 12-BETA:python2-rhnlib-5.0.1-24.30.3.noarch",
"SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.aarch64",
"SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.ppc64le",
"SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.s390x",
"SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.x86_64",
"SUSE Manager Client Tools 12-BETA:spacecmd-5.0.1-41.42.3.noarch",
"SUSE Manager Client Tools 12-BETA:supportutils-plugin-salt-1.2.2-9.9.2.noarch",
"SUSE Manager Client Tools 12-BETA:supportutils-plugin-susemanager-client-5.0.1-9.15.2.noarch",
"SUSE Manager Client Tools 12-BETA:system-user-grafana-1.0.0-3.7.2.noarch",
"SUSE Manager Client Tools 12-BETA:system-user-prometheus-1.0.0-3.7.2.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.x86_64",
"SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.aarch64",
"SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.ppc64le",
"SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.s390x",
"SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.x86_64",
"SUSE Manager Client Tools 12-BETA:kiwi-desc-saltboot-0.1.1687520761.cefb248-4.15.2.noarch",
"SUSE Manager Client Tools 12-BETA:mgr-push-5.0.1-4.21.4.noarch",
"SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.aarch64",
"SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.ppc64le",
"SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.s390x",
"SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.x86_64",
"SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.aarch64",
"SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.ppc64le",
"SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.s390x",
"SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.x86_64",
"SUSE Manager Client Tools 12-BETA:python2-hwdata-2.3.5-15.12.2.noarch",
"SUSE Manager Client Tools 12-BETA:python2-mgr-push-5.0.1-4.21.4.noarch",
"SUSE Manager Client Tools 12-BETA:python2-rhnlib-5.0.1-24.30.3.noarch",
"SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.aarch64",
"SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.ppc64le",
"SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.s390x",
"SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.x86_64",
"SUSE Manager Client Tools 12-BETA:spacecmd-5.0.1-41.42.3.noarch",
"SUSE Manager Client Tools 12-BETA:supportutils-plugin-salt-1.2.2-9.9.2.noarch",
"SUSE Manager Client Tools 12-BETA:supportutils-plugin-susemanager-client-5.0.1-9.15.2.noarch",
"SUSE Manager Client Tools 12-BETA:system-user-grafana-1.0.0-3.7.2.noarch",
"SUSE Manager Client Tools 12-BETA:system-user-prometheus-1.0.0-3.7.2.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-01-23T15:18:14Z",
"details": "moderate"
}
],
"title": "CVE-2023-1410"
},
{
"cve": "CVE-2023-2183",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-2183"
}
],
"notes": [
{
"category": "general",
"text": "Grafana is an open-source platform for monitoring and observability. \n\nThe option to send a test alert is not available from the user panel UI for users having the Viewer role. It is still possible for a user with the Viewer role to send a test alert using the API as the API does not check access to this function.\n\nThis might enable malicious users to abuse the functionality by sending multiple alert messages to e-mail and Slack, spamming users, prepare Phishing attack or block SMTP server.\n\nUsers may upgrade to version 9.5.3, 9.4.12, 9.3.15, 9.2.19 and 8.5.26 to receive a fix.\n\n",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.x86_64",
"SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.aarch64",
"SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.ppc64le",
"SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.s390x",
"SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.x86_64",
"SUSE Manager Client Tools 12-BETA:kiwi-desc-saltboot-0.1.1687520761.cefb248-4.15.2.noarch",
"SUSE Manager Client Tools 12-BETA:mgr-push-5.0.1-4.21.4.noarch",
"SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.aarch64",
"SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.ppc64le",
"SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.s390x",
"SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.x86_64",
"SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.aarch64",
"SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.ppc64le",
"SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.s390x",
"SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.x86_64",
"SUSE Manager Client Tools 12-BETA:python2-hwdata-2.3.5-15.12.2.noarch",
"SUSE Manager Client Tools 12-BETA:python2-mgr-push-5.0.1-4.21.4.noarch",
"SUSE Manager Client Tools 12-BETA:python2-rhnlib-5.0.1-24.30.3.noarch",
"SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.aarch64",
"SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.ppc64le",
"SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.s390x",
"SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.x86_64",
"SUSE Manager Client Tools 12-BETA:spacecmd-5.0.1-41.42.3.noarch",
"SUSE Manager Client Tools 12-BETA:supportutils-plugin-salt-1.2.2-9.9.2.noarch",
"SUSE Manager Client Tools 12-BETA:supportutils-plugin-susemanager-client-5.0.1-9.15.2.noarch",
"SUSE Manager Client Tools 12-BETA:system-user-grafana-1.0.0-3.7.2.noarch",
"SUSE Manager Client Tools 12-BETA:system-user-prometheus-1.0.0-3.7.2.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-2183",
"url": "https://www.suse.com/security/cve/CVE-2023-2183"
},
{
"category": "external",
"summary": "SUSE Bug 1212100 for CVE-2023-2183",
"url": "https://bugzilla.suse.com/1212100"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.x86_64",
"SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.aarch64",
"SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.ppc64le",
"SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.s390x",
"SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.x86_64",
"SUSE Manager Client Tools 12-BETA:kiwi-desc-saltboot-0.1.1687520761.cefb248-4.15.2.noarch",
"SUSE Manager Client Tools 12-BETA:mgr-push-5.0.1-4.21.4.noarch",
"SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.aarch64",
"SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.ppc64le",
"SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.s390x",
"SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.x86_64",
"SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.aarch64",
"SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.ppc64le",
"SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.s390x",
"SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.x86_64",
"SUSE Manager Client Tools 12-BETA:python2-hwdata-2.3.5-15.12.2.noarch",
"SUSE Manager Client Tools 12-BETA:python2-mgr-push-5.0.1-4.21.4.noarch",
"SUSE Manager Client Tools 12-BETA:python2-rhnlib-5.0.1-24.30.3.noarch",
"SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.aarch64",
"SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.ppc64le",
"SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.s390x",
"SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.x86_64",
"SUSE Manager Client Tools 12-BETA:spacecmd-5.0.1-41.42.3.noarch",
"SUSE Manager Client Tools 12-BETA:supportutils-plugin-salt-1.2.2-9.9.2.noarch",
"SUSE Manager Client Tools 12-BETA:supportutils-plugin-susemanager-client-5.0.1-9.15.2.noarch",
"SUSE Manager Client Tools 12-BETA:system-user-grafana-1.0.0-3.7.2.noarch",
"SUSE Manager Client Tools 12-BETA:system-user-prometheus-1.0.0-3.7.2.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.x86_64",
"SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.aarch64",
"SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.ppc64le",
"SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.s390x",
"SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.x86_64",
"SUSE Manager Client Tools 12-BETA:kiwi-desc-saltboot-0.1.1687520761.cefb248-4.15.2.noarch",
"SUSE Manager Client Tools 12-BETA:mgr-push-5.0.1-4.21.4.noarch",
"SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.aarch64",
"SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.ppc64le",
"SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.s390x",
"SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.x86_64",
"SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.aarch64",
"SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.ppc64le",
"SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.s390x",
"SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.x86_64",
"SUSE Manager Client Tools 12-BETA:python2-hwdata-2.3.5-15.12.2.noarch",
"SUSE Manager Client Tools 12-BETA:python2-mgr-push-5.0.1-4.21.4.noarch",
"SUSE Manager Client Tools 12-BETA:python2-rhnlib-5.0.1-24.30.3.noarch",
"SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.aarch64",
"SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.ppc64le",
"SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.s390x",
"SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.x86_64",
"SUSE Manager Client Tools 12-BETA:spacecmd-5.0.1-41.42.3.noarch",
"SUSE Manager Client Tools 12-BETA:supportutils-plugin-salt-1.2.2-9.9.2.noarch",
"SUSE Manager Client Tools 12-BETA:supportutils-plugin-susemanager-client-5.0.1-9.15.2.noarch",
"SUSE Manager Client Tools 12-BETA:system-user-grafana-1.0.0-3.7.2.noarch",
"SUSE Manager Client Tools 12-BETA:system-user-prometheus-1.0.0-3.7.2.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-01-23T15:18:14Z",
"details": "moderate"
}
],
"title": "CVE-2023-2183"
},
{
"cve": "CVE-2023-2801",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-2801"
}
],
"notes": [
{
"category": "general",
"text": "Grafana is an open-source platform for monitoring and observability. \n\nUsing public dashboards users can query multiple distinct data sources using mixed queries. However such query has a possibility of crashing a Grafana instance.\n\nThe only feature that uses mixed queries at the moment is public dashboards, but it\u0027s also possible to cause this by calling the query API directly.\n\nThis might enable malicious users to crash Grafana instances through that endpoint.\n\nUsers may upgrade to version 9.4.12 and 9.5.3 to receive a fix.\n\n",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.x86_64",
"SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.aarch64",
"SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.ppc64le",
"SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.s390x",
"SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.x86_64",
"SUSE Manager Client Tools 12-BETA:kiwi-desc-saltboot-0.1.1687520761.cefb248-4.15.2.noarch",
"SUSE Manager Client Tools 12-BETA:mgr-push-5.0.1-4.21.4.noarch",
"SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.aarch64",
"SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.ppc64le",
"SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.s390x",
"SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.x86_64",
"SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.aarch64",
"SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.ppc64le",
"SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.s390x",
"SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.x86_64",
"SUSE Manager Client Tools 12-BETA:python2-hwdata-2.3.5-15.12.2.noarch",
"SUSE Manager Client Tools 12-BETA:python2-mgr-push-5.0.1-4.21.4.noarch",
"SUSE Manager Client Tools 12-BETA:python2-rhnlib-5.0.1-24.30.3.noarch",
"SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.aarch64",
"SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.ppc64le",
"SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.s390x",
"SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.x86_64",
"SUSE Manager Client Tools 12-BETA:spacecmd-5.0.1-41.42.3.noarch",
"SUSE Manager Client Tools 12-BETA:supportutils-plugin-salt-1.2.2-9.9.2.noarch",
"SUSE Manager Client Tools 12-BETA:supportutils-plugin-susemanager-client-5.0.1-9.15.2.noarch",
"SUSE Manager Client Tools 12-BETA:system-user-grafana-1.0.0-3.7.2.noarch",
"SUSE Manager Client Tools 12-BETA:system-user-prometheus-1.0.0-3.7.2.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-2801",
"url": "https://www.suse.com/security/cve/CVE-2023-2801"
},
{
"category": "external",
"summary": "SUSE Bug 1212099 for CVE-2023-2801",
"url": "https://bugzilla.suse.com/1212099"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.x86_64",
"SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.aarch64",
"SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.ppc64le",
"SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.s390x",
"SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.x86_64",
"SUSE Manager Client Tools 12-BETA:kiwi-desc-saltboot-0.1.1687520761.cefb248-4.15.2.noarch",
"SUSE Manager Client Tools 12-BETA:mgr-push-5.0.1-4.21.4.noarch",
"SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.aarch64",
"SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.ppc64le",
"SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.s390x",
"SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.x86_64",
"SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.aarch64",
"SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.ppc64le",
"SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.s390x",
"SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.x86_64",
"SUSE Manager Client Tools 12-BETA:python2-hwdata-2.3.5-15.12.2.noarch",
"SUSE Manager Client Tools 12-BETA:python2-mgr-push-5.0.1-4.21.4.noarch",
"SUSE Manager Client Tools 12-BETA:python2-rhnlib-5.0.1-24.30.3.noarch",
"SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.aarch64",
"SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.ppc64le",
"SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.s390x",
"SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.x86_64",
"SUSE Manager Client Tools 12-BETA:spacecmd-5.0.1-41.42.3.noarch",
"SUSE Manager Client Tools 12-BETA:supportutils-plugin-salt-1.2.2-9.9.2.noarch",
"SUSE Manager Client Tools 12-BETA:supportutils-plugin-susemanager-client-5.0.1-9.15.2.noarch",
"SUSE Manager Client Tools 12-BETA:system-user-grafana-1.0.0-3.7.2.noarch",
"SUSE Manager Client Tools 12-BETA:system-user-prometheus-1.0.0-3.7.2.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.x86_64",
"SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.aarch64",
"SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.ppc64le",
"SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.s390x",
"SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.x86_64",
"SUSE Manager Client Tools 12-BETA:kiwi-desc-saltboot-0.1.1687520761.cefb248-4.15.2.noarch",
"SUSE Manager Client Tools 12-BETA:mgr-push-5.0.1-4.21.4.noarch",
"SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.aarch64",
"SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.ppc64le",
"SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.s390x",
"SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.x86_64",
"SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.aarch64",
"SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.ppc64le",
"SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.s390x",
"SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.x86_64",
"SUSE Manager Client Tools 12-BETA:python2-hwdata-2.3.5-15.12.2.noarch",
"SUSE Manager Client Tools 12-BETA:python2-mgr-push-5.0.1-4.21.4.noarch",
"SUSE Manager Client Tools 12-BETA:python2-rhnlib-5.0.1-24.30.3.noarch",
"SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.aarch64",
"SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.ppc64le",
"SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.s390x",
"SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.x86_64",
"SUSE Manager Client Tools 12-BETA:spacecmd-5.0.1-41.42.3.noarch",
"SUSE Manager Client Tools 12-BETA:supportutils-plugin-salt-1.2.2-9.9.2.noarch",
"SUSE Manager Client Tools 12-BETA:supportutils-plugin-susemanager-client-5.0.1-9.15.2.noarch",
"SUSE Manager Client Tools 12-BETA:system-user-grafana-1.0.0-3.7.2.noarch",
"SUSE Manager Client Tools 12-BETA:system-user-prometheus-1.0.0-3.7.2.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-01-23T15:18:14Z",
"details": "important"
}
],
"title": "CVE-2023-2801"
},
{
"cve": "CVE-2023-3128",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-3128"
}
],
"notes": [
{
"category": "general",
"text": "Grafana is validating Azure AD accounts based on the email claim. \n\nOn Azure AD, the profile email field is not unique and can be easily modified. \n\nThis leads to account takeover and authentication bypass when Azure AD OAuth is configured with a multi-tenant app. \n\n",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.x86_64",
"SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.aarch64",
"SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.ppc64le",
"SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.s390x",
"SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.x86_64",
"SUSE Manager Client Tools 12-BETA:kiwi-desc-saltboot-0.1.1687520761.cefb248-4.15.2.noarch",
"SUSE Manager Client Tools 12-BETA:mgr-push-5.0.1-4.21.4.noarch",
"SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.aarch64",
"SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.ppc64le",
"SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.s390x",
"SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.x86_64",
"SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.aarch64",
"SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.ppc64le",
"SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.s390x",
"SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.x86_64",
"SUSE Manager Client Tools 12-BETA:python2-hwdata-2.3.5-15.12.2.noarch",
"SUSE Manager Client Tools 12-BETA:python2-mgr-push-5.0.1-4.21.4.noarch",
"SUSE Manager Client Tools 12-BETA:python2-rhnlib-5.0.1-24.30.3.noarch",
"SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.aarch64",
"SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.ppc64le",
"SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.s390x",
"SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.x86_64",
"SUSE Manager Client Tools 12-BETA:spacecmd-5.0.1-41.42.3.noarch",
"SUSE Manager Client Tools 12-BETA:supportutils-plugin-salt-1.2.2-9.9.2.noarch",
"SUSE Manager Client Tools 12-BETA:supportutils-plugin-susemanager-client-5.0.1-9.15.2.noarch",
"SUSE Manager Client Tools 12-BETA:system-user-grafana-1.0.0-3.7.2.noarch",
"SUSE Manager Client Tools 12-BETA:system-user-prometheus-1.0.0-3.7.2.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-3128",
"url": "https://www.suse.com/security/cve/CVE-2023-3128"
},
{
"category": "external",
"summary": "SUSE Bug 1212641 for CVE-2023-3128",
"url": "https://bugzilla.suse.com/1212641"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.x86_64",
"SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.aarch64",
"SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.ppc64le",
"SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.s390x",
"SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.x86_64",
"SUSE Manager Client Tools 12-BETA:kiwi-desc-saltboot-0.1.1687520761.cefb248-4.15.2.noarch",
"SUSE Manager Client Tools 12-BETA:mgr-push-5.0.1-4.21.4.noarch",
"SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.aarch64",
"SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.ppc64le",
"SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.s390x",
"SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.x86_64",
"SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.aarch64",
"SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.ppc64le",
"SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.s390x",
"SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.x86_64",
"SUSE Manager Client Tools 12-BETA:python2-hwdata-2.3.5-15.12.2.noarch",
"SUSE Manager Client Tools 12-BETA:python2-mgr-push-5.0.1-4.21.4.noarch",
"SUSE Manager Client Tools 12-BETA:python2-rhnlib-5.0.1-24.30.3.noarch",
"SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.aarch64",
"SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.ppc64le",
"SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.s390x",
"SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.x86_64",
"SUSE Manager Client Tools 12-BETA:spacecmd-5.0.1-41.42.3.noarch",
"SUSE Manager Client Tools 12-BETA:supportutils-plugin-salt-1.2.2-9.9.2.noarch",
"SUSE Manager Client Tools 12-BETA:supportutils-plugin-susemanager-client-5.0.1-9.15.2.noarch",
"SUSE Manager Client Tools 12-BETA:system-user-grafana-1.0.0-3.7.2.noarch",
"SUSE Manager Client Tools 12-BETA:system-user-prometheus-1.0.0-3.7.2.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.4,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:L",
"version": "3.1"
},
"products": [
"SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.x86_64",
"SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.aarch64",
"SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.ppc64le",
"SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.s390x",
"SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.x86_64",
"SUSE Manager Client Tools 12-BETA:kiwi-desc-saltboot-0.1.1687520761.cefb248-4.15.2.noarch",
"SUSE Manager Client Tools 12-BETA:mgr-push-5.0.1-4.21.4.noarch",
"SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.aarch64",
"SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.ppc64le",
"SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.s390x",
"SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.x86_64",
"SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.aarch64",
"SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.ppc64le",
"SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.s390x",
"SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.x86_64",
"SUSE Manager Client Tools 12-BETA:python2-hwdata-2.3.5-15.12.2.noarch",
"SUSE Manager Client Tools 12-BETA:python2-mgr-push-5.0.1-4.21.4.noarch",
"SUSE Manager Client Tools 12-BETA:python2-rhnlib-5.0.1-24.30.3.noarch",
"SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.aarch64",
"SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.ppc64le",
"SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.s390x",
"SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.x86_64",
"SUSE Manager Client Tools 12-BETA:spacecmd-5.0.1-41.42.3.noarch",
"SUSE Manager Client Tools 12-BETA:supportutils-plugin-salt-1.2.2-9.9.2.noarch",
"SUSE Manager Client Tools 12-BETA:supportutils-plugin-susemanager-client-5.0.1-9.15.2.noarch",
"SUSE Manager Client Tools 12-BETA:system-user-grafana-1.0.0-3.7.2.noarch",
"SUSE Manager Client Tools 12-BETA:system-user-prometheus-1.0.0-3.7.2.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-01-23T15:18:14Z",
"details": "critical"
}
],
"title": "CVE-2023-3128"
},
{
"cve": "CVE-2023-40577",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-40577"
}
],
"notes": [
{
"category": "general",
"text": "Alertmanager handles alerts sent by client applications such as the Prometheus server. An attacker with the permission to perform POST requests on the /api/v1/alerts endpoint could be able to execute arbitrary JavaScript code on the users of Prometheus Alertmanager. This issue has been fixed in Alertmanager version 0.2.51.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.x86_64",
"SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.aarch64",
"SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.ppc64le",
"SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.s390x",
"SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.x86_64",
"SUSE Manager Client Tools 12-BETA:kiwi-desc-saltboot-0.1.1687520761.cefb248-4.15.2.noarch",
"SUSE Manager Client Tools 12-BETA:mgr-push-5.0.1-4.21.4.noarch",
"SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.aarch64",
"SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.ppc64le",
"SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.s390x",
"SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.x86_64",
"SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.aarch64",
"SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.ppc64le",
"SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.s390x",
"SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.x86_64",
"SUSE Manager Client Tools 12-BETA:python2-hwdata-2.3.5-15.12.2.noarch",
"SUSE Manager Client Tools 12-BETA:python2-mgr-push-5.0.1-4.21.4.noarch",
"SUSE Manager Client Tools 12-BETA:python2-rhnlib-5.0.1-24.30.3.noarch",
"SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.aarch64",
"SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.ppc64le",
"SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.s390x",
"SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.x86_64",
"SUSE Manager Client Tools 12-BETA:spacecmd-5.0.1-41.42.3.noarch",
"SUSE Manager Client Tools 12-BETA:supportutils-plugin-salt-1.2.2-9.9.2.noarch",
"SUSE Manager Client Tools 12-BETA:supportutils-plugin-susemanager-client-5.0.1-9.15.2.noarch",
"SUSE Manager Client Tools 12-BETA:system-user-grafana-1.0.0-3.7.2.noarch",
"SUSE Manager Client Tools 12-BETA:system-user-prometheus-1.0.0-3.7.2.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-40577",
"url": "https://www.suse.com/security/cve/CVE-2023-40577"
},
{
"category": "external",
"summary": "SUSE Bug 1218838 for CVE-2023-40577",
"url": "https://bugzilla.suse.com/1218838"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.x86_64",
"SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.aarch64",
"SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.ppc64le",
"SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.s390x",
"SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.x86_64",
"SUSE Manager Client Tools 12-BETA:kiwi-desc-saltboot-0.1.1687520761.cefb248-4.15.2.noarch",
"SUSE Manager Client Tools 12-BETA:mgr-push-5.0.1-4.21.4.noarch",
"SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.aarch64",
"SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.ppc64le",
"SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.s390x",
"SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.x86_64",
"SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.aarch64",
"SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.ppc64le",
"SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.s390x",
"SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.x86_64",
"SUSE Manager Client Tools 12-BETA:python2-hwdata-2.3.5-15.12.2.noarch",
"SUSE Manager Client Tools 12-BETA:python2-mgr-push-5.0.1-4.21.4.noarch",
"SUSE Manager Client Tools 12-BETA:python2-rhnlib-5.0.1-24.30.3.noarch",
"SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.aarch64",
"SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.ppc64le",
"SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.s390x",
"SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.x86_64",
"SUSE Manager Client Tools 12-BETA:spacecmd-5.0.1-41.42.3.noarch",
"SUSE Manager Client Tools 12-BETA:supportutils-plugin-salt-1.2.2-9.9.2.noarch",
"SUSE Manager Client Tools 12-BETA:supportutils-plugin-susemanager-client-5.0.1-9.15.2.noarch",
"SUSE Manager Client Tools 12-BETA:system-user-grafana-1.0.0-3.7.2.noarch",
"SUSE Manager Client Tools 12-BETA:system-user-prometheus-1.0.0-3.7.2.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.x86_64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.aarch64",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.ppc64le",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.s390x",
"SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.x86_64",
"SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.aarch64",
"SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.ppc64le",
"SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.s390x",
"SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.x86_64",
"SUSE Manager Client Tools 12-BETA:kiwi-desc-saltboot-0.1.1687520761.cefb248-4.15.2.noarch",
"SUSE Manager Client Tools 12-BETA:mgr-push-5.0.1-4.21.4.noarch",
"SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.aarch64",
"SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.ppc64le",
"SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.s390x",
"SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.x86_64",
"SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.aarch64",
"SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.ppc64le",
"SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.s390x",
"SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.x86_64",
"SUSE Manager Client Tools 12-BETA:python2-hwdata-2.3.5-15.12.2.noarch",
"SUSE Manager Client Tools 12-BETA:python2-mgr-push-5.0.1-4.21.4.noarch",
"SUSE Manager Client Tools 12-BETA:python2-rhnlib-5.0.1-24.30.3.noarch",
"SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.aarch64",
"SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.ppc64le",
"SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.s390x",
"SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.x86_64",
"SUSE Manager Client Tools 12-BETA:spacecmd-5.0.1-41.42.3.noarch",
"SUSE Manager Client Tools 12-BETA:supportutils-plugin-salt-1.2.2-9.9.2.noarch",
"SUSE Manager Client Tools 12-BETA:supportutils-plugin-susemanager-client-5.0.1-9.15.2.noarch",
"SUSE Manager Client Tools 12-BETA:system-user-grafana-1.0.0-3.7.2.noarch",
"SUSE Manager Client Tools 12-BETA:system-user-prometheus-1.0.0-3.7.2.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-01-23T15:18:14Z",
"details": "important"
}
],
"title": "CVE-2023-40577"
}
]
}
suse-su-2024:0196-1
Vulnerability from csaf_suse
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security Beta update for SUSE Manager Client Tools and Salt",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update fixes the following issues:\n\nansible:\n\n- Update to version 2.9.27 (jsc#SLE-23631) (jsc#SLE-24133)\n * bsc#1187725 CVE-2021-3620 ansible-connection module discloses sensitive\n info in traceback error message (in 2.9.27)\n * bsc#1188061 CVE-2021-3583 Template Injection through yaml multi-line\n strings with ansible facts used in template. (in 2.9.23)\n * bsc#1176460 gh#ansible/ansible#72094 ansible module nmcli is broken in\n ansible 2.9.13 (in 2.9.15)\n- Update to 2.9.22:\n * CVE-2021-3447 (bsc#1183684) multiple modules expose secured values \n * CVE-2021-20228 (bsc#1181935) basic.py no_log with fallback option\n * CVE-2021-20191 (bsc#1181119) multiple collections exposes secured values\n * CVE-2021-20180 (bsc#1180942) bitbucket_pipeline_variable exposes sensitive values\n * CVE-2021-20178 (bsc#1180816) user data leak in snmp_facts module\n\ndracut-saltboot:\n\n- Update to version 0.1.1681904360.84ef141 \n * Load network configuration even when missing protocol version\n (bsc#1210640)\n- Update to verion 0.1.1674034019.a93ff61\n * Install copied wicked config as client.xml (bsc#1205599)\n- Update to version 0.1.1673279145.e7616bd\n * Add failsafe stop file when salt-minion does not stop (bsc#1172110)\n * Copy existing wicked config instead of generating new (bsc#1205599)\n- Update to version 0.1.1665997480.587fa10\n * Add dependencies on xz and gzip to support compressed images\n- Update to version 0.1.1661440542.6cbe0da\n * Use standard susemanager.conf\n * Move image services to dracut-saltboot package\n * Use salt bundle\n- Require e2fsprogs (bsc#1202614)\n- Update to version 0.1.1657643023.0d694ce\n * Update dracut-saltboot dependencies (bsc#1200970)\n * Fix network loading when ipappend is used in pxe config\n * Add new information messages\n\ngolang-github-QubitProducts-exporter_exporter:\n\n- Remove license file from %doc\n- Exclude s390 arch \n- Adapted to build on Enterprise Linux.\n- Fix build for RedHat 7\n- Require Go \u003e= 1.14 also for CentOS\n- Add support for CentOS\n- Replace %{?systemd_requires} with %{?systemd_ordering}\n\ngolang-github-boynux-squid_exporter:\n\n- Exclude s390 architecture (gh#SUSE/spacewalk#19050)\n- Enhanced to build on Enterprise Linux 8.\n\ngolang-github-lusitaniae-apache_exporter:\n\n- Do not strip if SUSE Linux Enterprise 15 SP3\n- Exclude debug for RHEL \u003e= 8\n- Build with Go \u003e= 1.20 when the OS is not RHEL\n- Spec file clean up\n- Fix apparmor profile for SLE 12\n- Do not build with apparmor profile for SLE 12\n- Upgrade to version 1.0.0 (jsc#PED-5405)\n * Improved flag parsing\n * Added support for custom headers\n- Build with Go 1.19\n- Build using promu\n- Add _service file\n- Fix sandboxing options\n- Upgrade to version 0.13.4\n * Fix denial of service vulnerability\n (CVE-2022-32149, bsc#1204501)\n- Upgrade to version 0.13.3\n * Fix uncontrolled resource consumption\n (CVE-2022-41723, bsc#1208270)\n- Upgrade to version 0.13.1\n * Fix panic caused by missing flagConfig options\n- Upgrade to version 0.13.0\n * Fix authentication bypass vulnarability\n (CVE-2022-46146, bsc#1208046)\n- Corrected comment in AppArmor profile\n- Added AppArmor profile\n- Added sandboxing options to systemd service unit\n- Exclude s390 architecture (gh#SUSE/spacewalk#19050)\n- Update to upstream release 0.11.0 (jsc#SLE-24791)\n * Add TLS support\n * Switch to logger, please check --log.level and --log.format\n flags\n- Update to version 0.10.1\n * Bugfix: Reset ProxyBalancer metrics on each scrape to\n remove stale data\n- Update to version 0.10.0\n * Add Apache Proxy and other metrics\n- Update to version 0.8.0\n * Change commandline flags\n * Add metrics: Apache version, request duration total\n- Adapted to build on Enterprise Linux 8\n- Require building with Go 1.15\n- Add support for RedHat 8\n + Adjust dependencies on spec file \n + Disable dwarf compression in go build\n- Add support for Red Hat\n- Add %license macro for LICENSE file \n\ngolang-github-prometheus-prometheus:\n\n- Update to 2.45.0 (jsc#PED-5406):\n * [FEATURE] API: New limit parameter to limit the number of items\n returned by `/api/v1/status/tsdb` endpoint. \n * [FEATURE] Config: Add limits to global config. \n * [FEATURE] Consul SD: Added support for `path_prefix`. \n * [FEATURE] Native histograms: Add option to scrape both classic\n and native histograms. \n * [FEATURE] Native histograms: Added support for two more\n arithmetic operators `avg_over_time` and `sum_over_time`.\n * [FEATURE] Promtool: When providing the block id, only one block\n will be loaded and analyzed. \n * [FEATURE] Remote-write: New Azure ad configuration to support\n remote writing directly to Azure Monitor workspace. \n * [FEATURE] TSDB: Samples per chunk are now configurable with\n flag `storage.tsdb.samples-per-chunk`. By default set to its\n former value 120. \n * [ENHANCEMENT] Native histograms: bucket size can now be limited\n to avoid scrape fails. \n * [ENHANCEMENT] TSDB: Dropped series are now deleted from the WAL\n sooner. \n * [BUGFIX] Native histograms: ChunkSeries iterator now checks if\n a new sample can be appended to the open chunk. \n * [BUGFIX] Native histograms: Fix Histogram Appender\n `Appendable()` segfault. \n * [BUGFIX] Native histograms: Fix setting reset header to gauge\n histograms in seriesToChunkEncoder. \n * [BUGFIX] TSDB: Tombstone intervals are not modified after Get()\n call. \n * [BUGFIX] TSDB: Use path/filepath to set the WAL directory.\n- Update to 2.44.0:\n * [FEATURE] Remote-read: Handle native histograms. \n * [FEATURE] Promtool: Health and readiness check of prometheus\n server in CLI. \n * [FEATURE] PromQL: Add `query_samples_total` metric, the total\n number of samples loaded by all queries.\n * [ENHANCEMENT] Storage: Optimise buffer used to iterate through\n samples.\n * [ENHANCEMENT] Scrape: Reduce memory allocations on target\n labels.\n * [ENHANCEMENT] PromQL: Use faster heap method for `topk()` /\n `bottomk()`.\n * [ENHANCEMENT] Rules API: Allow filtering by rule name.\n * [ENHANCEMENT] Native Histograms: Various fixes and\n improvements.\n * [ENHANCEMENT] UI: Search of scraping pools is now\n case-insensitive.\n * [ENHANCEMENT] TSDB: Add an affirmative log message for\n successful WAL repair.\n * [BUGFIX] TSDB: Block compaction failed when shutting down.\n * [BUGFIX] TSDB: Out-of-order chunks could be ignored if the\n write-behind log was deleted.\n- Update to 2.43.1\n * [BUGFIX] Labels: Set() after Del() would be ignored, which\n broke some relabeling rules.\n- Update to 2.43.0:\n * [FEATURE] Promtool: Add HTTP client configuration to query\n commands.\n * [FEATURE] Scrape: Add `include_scrape_configs` to include\n scrape configs from different files.\n * [FEATURE] HTTP client: Add `no_proxy` to exclude URLs from\n proxied requests.\n * [FEATURE] HTTP client: Add `proxy_from_enviroment` to read\n proxies from env variables.\n * [ENHANCEMENT] API: Add support for setting lookback delta per\n query via the API.\n * [ENHANCEMENT] API: Change HTTP status code from 503/422 to 499\n if a request is canceled.\n * [ENHANCEMENT] Scrape: Allow exemplars for all metric types.\n * [ENHANCEMENT] TSDB: Add metrics for head chunks and WAL folders\n size.\n * [ENHANCEMENT] TSDB: Automatically remove incorrect snapshot\n with index that is ahead of WAL.\n * [ENHANCEMENT] TSDB: Improve Prometheus parser error outputs to\n be more comprehensible.\n * [ENHANCEMENT] UI: Scope `group by` labels to metric in\n autocompletion.\n * [BUGFIX] Scrape: Fix\n `prometheus_target_scrape_pool_target_limit` metric not set\n before reloading.\n * [BUGFIX] TSDB: Correctly update\n `prometheus_tsdb_head_chunks_removed_total` and\n `prometheus_tsdb_head_chunks` metrics when reading WAL.\n * [BUGFIX] TSDB: Use the correct unit (seconds) when recording\n out-of-order append deltas in the\n `prometheus_tsdb_sample_ooo_delta` metric.\n- Update to 2.42.0:\n This release comes with a bunch of feature coverage for native\n histograms and breaking changes.\n If you are trying native histograms already, we recommend you\n remove the `wal` directory when upgrading.\n Because the old WAL record for native histograms is not\n backward compatible in v2.42.0, this will lead to some data\n loss for the latest data.\n Additionally, if you scrape \u0027float histograms\u0027 or use recording\n rules on native histograms in v2.42.0 (which writes float\n histograms), it is a one-way street since older versions do not\n support float histograms.\n * [CHANGE] **breaking** TSDB: Changed WAL record format for the\n experimental native histograms.\n * [FEATURE] Add \u0027keep_firing_for\u0027 field to alerting rules.\n * [FEATURE] Promtool: Add support of selecting timeseries for\n TSDB dump.\n * [ENHANCEMENT] Agent: Native histogram support.\n * [ENHANCEMENT] Rules: Support native histograms in recording\n rules.\n * [ENHANCEMENT] SD: Add container ID as a meta label for pod\n targets for Kubernetes.\n * [ENHANCEMENT] SD: Add VM size label to azure service\n discovery.\n * [ENHANCEMENT] Support native histograms in federation.\n * [ENHANCEMENT] TSDB: Add gauge histogram support.\n * [ENHANCEMENT] TSDB/Scrape: Support FloatHistogram that\n represents buckets as float64 values.\n * [ENHANCEMENT] UI: Show individual scrape pools on /targets\n page.\n- Update to 2.41.0:\n * [FEATURE] Relabeling: Add keepequal and dropequal relabel\n actions.\n * [FEATURE] Add support for HTTP proxy headers. \n * [ENHANCEMENT] Reload private certificates when changed on disk.\n * [ENHANCEMENT] Add max_version to specify maximum TLS version in\n tls_config.\n * [ENHANCEMENT] Add goos and goarch labels to\n prometheus_build_info.\n * [ENHANCEMENT] SD: Add proxy support for EC2 and LightSail SDs.\n * [ENHANCEMENT] SD: Add new metric\n prometheus_sd_file_watcher_errors_total.\n * [ENHANCEMENT] Remote Read: Use a pool to speed up marshalling.\n * [ENHANCEMENT] TSDB: Improve handling of tombstoned chunks in\n iterators.\n * [ENHANCEMENT] TSDB: Optimize postings offset table reading.\n * [BUGFIX] Scrape: Validate the metric name, label names, and\n label values after relabeling.\n * [BUGFIX] Remote Write receiver and rule manager: Fix error\n handling.\n- Update to 2.40.7:\n * [BUGFIX] TSDB: Fix queries involving negative buckets of native\n histograms.\n- Update to 2.40.5:\n * [BUGFIX] TSDB: Fix queries involving native histograms due to\n improper reset of iterators.\n- Update to 2.40.3:\n * [BUGFIX] TSDB: Fix compaction after a deletion is called.\n- Update to 2.40.2:\n * [BUGFIX] UI: Fix black-on-black metric name color in dark mode.\n- Update to 2.40.1:\n * [BUGFIX] TSDB: Fix alignment for atomic int64 for 32 bit\n architecture.\n * [BUGFIX] Scrape: Fix accept headers.\n- Update to 2.40.0:\n * [FEATURE] Add experimental support for native histograms.\n Enable with the flag --enable-feature=native-histograms.\n * [FEATURE] SD: Add service discovery for OVHcloud.\n * [ENHANCEMENT] Kubernetes SD: Use protobuf encoding.\n * [ENHANCEMENT] TSDB: Use golang.org/x/exp/slices for improved\n sorting speed.\n * [ENHANCEMENT] Consul SD: Add enterprise admin partitions. Adds\n __meta_consul_partition label. Adds partition config in\n consul_sd_config.\n * [BUGFIX] API: Fix API error codes for /api/v1/labels and\n /api/v1/series.\n- Update to 2.39.1:\n * [BUGFIX] Rules: Fix notifier relabel changing the labels on\n active alerts.\n- Update to 2.39.0:\n * [FEATURE] experimental TSDB: Add support for ingesting\n out-of-order samples. This is configured via\n out_of_order_time_window field in the config file; check config\n file docs for more info.\n * [ENHANCEMENT] API: /-/healthy and /-/ready API calls now also\n respond to a HEAD request on top of existing GET support.\n * [ENHANCEMENT] PuppetDB SD: Add __meta_puppetdb_query label.\n * [ENHANCEMENT] AWS EC2 SD: Add __meta_ec2_region label.\n * [ENHANCEMENT] AWS Lightsail SD: Add __meta_lightsail_region\n label.\n * [ENHANCEMENT] Scrape: Optimise relabeling by re-using memory.\n * [ENHANCEMENT] TSDB: Improve WAL replay timings.\n * [ENHANCEMENT] TSDB: Optimise memory by not storing unnecessary\n data in the memory.\n * [ENHANCEMENT] TSDB: Allow overlapping blocks by default.\n --storage.tsdb.allow-overlapping-blocks now has no effect.\n * [ENHANCEMENT] UI: Click to copy label-value pair from query\n result to clipboard.\n * [BUGFIX] TSDB: Turn off isolation for Head compaction to fix a\n memory leak.\n * [BUGFIX] TSDB: Fix \u0027invalid magic number 0\u0027 error on Prometheus\n startup.\n * [BUGFIX] PromQL: Properly close file descriptor when logging\n unfinished queries.\n * [BUGFIX] Agent: Fix validation of flag options and prevent WAL\n from growing more than desired.\n- Update to 2.38.0:\n * [FEATURE]: Web: Add a /api/v1/format_query HTTP API endpoint\n that allows pretty-formatting PromQL expressions.\n * [FEATURE]: UI: Add support for formatting PromQL expressions in\n the UI.\n * [FEATURE]: DNS SD: Support MX records for discovering targets.\n * [FEATURE]: Templates: Add toTime() template function that\n allows converting sample timestamps to Go time.Time values.\n * [ENHANCEMENT]: Kubernetes SD: Add\n __meta_kubernetes_service_port_number meta label indicating the\n service port number.\n __meta_kubernetes_pod_container_image meta label indicating the\n container image.\n * [ENHANCEMENT]: PromQL: When a query panics, also log the query\n itself alongside the panic message.\n * [ENHANCEMENT]: UI: Tweak colors in the dark theme to improve\n the contrast ratio.\n * [ENHANCEMENT]: Web: Speed up calls to /api/v1/rules by avoiding\n locks and using atomic types instead.\n * [ENHANCEMENT]: Scrape: Add a no-default-scrape-port feature\n flag, which omits or removes any default HTTP (:80) or HTTPS\n (:443) ports in the target\u0027s scrape address.\n * [BUGFIX]: TSDB: In the WAL watcher metrics, expose the\n type=\u0027exemplar\u0027 label instead of type=\u0027unknown\u0027 for exemplar\n records.\n * [BUGFIX]: TSDB: Fix race condition around allocating series IDs\n during chunk snapshot loading.\n- Remove npm_licenses.tar.bz2 during \u0027make clean\u0027\n- Remove web-ui archives during \u0027make clean\u0027.\n- Require promu \u003e= 0.14.0 for building\n- Drop:\n- Upgrade to version 2.37.6\n * Require Go 1.19\n- Upgrade to version 2.37.5\n * [SECURITY] Security upgrade from go and upstream dependencies\n that include security fixes to the net/http and os packages.\n- Upgrade to version 2.37.4\n * [SECURITY] Fix basic authentication bypass vulnerability\n (CVE-2022-46146, bsc#1208049, jsc#PED-3576).\n- Upgrade to version 2.37.3\n * [BUGFIX] Update our regexp library to fix upstream\n CVE-2022-41715.\n- Upgrade to version 2.37.2\n- Upgrade to version 2.37.1\n * [BUGFIX] Properly close file descriptor when logging unfinished\n queries.\n * [BUGFIX] TSDB: In the WAL watcher metrics, expose the\n- Upgrade to version 2.37.0\n * [FEATURE] Nomad SD: New service discovery for Nomad built-in\n service discovery.\n * [ENHANCEMENT] Kubernetes SD: Allow attaching node labels for\n endpoint role.\n * [ENHANCEMENT] PromQL: Optimise creation of signature\n with/without labels.\n * [ENHANCEMENT] TSDB: Memory optimizations.\n * [ENHANCEMENT] TSDB: Reduce sleep time when reading WAL.\n * [ENHANCEMENT] OAuth2: Add appropriate timeouts and User-Agent\n header.\n * [BUGFIX] Alerting: Fix Alertmanager targets not being updated\n when alerts were queued.\n * [BUGFIX] Hetzner SD: Make authentication files relative to\n Prometheus config file.\n * [BUGFIX] Promtool: Fix promtool check config not erroring\n properly on failures.\n * [BUGFIX] Scrape: Keep relabeled scrape interval and timeout on\n reloads.\n * [BUGFIX] TSDB: Don\u0027t increment\n prometheus_tsdb_compactions_failed_total when context is\n canceled.\n * [BUGFIX] TSDB: Fix panic if series is not found when deleting\n series.\n * [BUGFIX] TSDB: Increase\n prometheus_tsdb_mmap_chunk_corruptions_total on out of sequence\n errors.\n * [BUGFIX] Uyuni SD: Make authentication files relative to\n Prometheus configuration file and fix default configuration\n values.\n- Upgrade to version 2.36.2\n * [BUGFIX] Fix serving of static assets like fonts and favicon.\n- Upgrade to version 2.36.1\n * [BUGFIX] promtool: Add --lint-fatal option.\n- Upgrade to version 2.36.0\n * [FEATURE] Add lowercase and uppercase relabel action.\n * [FEATURE] SD: Add IONOS Cloud integration.\n * [FEATURE] SD: Add Vultr integration.\n * [FEATURE] SD: Add Linode SD failure count metric.\n * [FEATURE] Add prometheus_ready metric.\n * [ENHANCEMENT] Add stripDomain to template function.\n * [ENHANCEMENT] UI: Enable active search through dropped targets.\n * [ENHANCEMENT] promtool: support matchers when querying label\n * [ENHANCEMENT] Add agent mode identifier.\n * [BUGFIX] Changing TotalQueryableSamples from int to int64.\n * [BUGFIX] tsdb/agent: Ignore duplicate exemplars.\n * [BUGFIX] TSDB: Fix chunk overflow appending samples at a\n variable rate.\n * [BUGFIX] Stop rule manager before TSDB is stopped.\n- Upgrade to version 2.35.0\n * [CHANGE] TSDB: Delete *.tmp WAL files when Prometheus starts.\n * [CHANGE] promtool: Add new flag --lint (enabled by default) for\n the commands check rules and check config, resulting in a new\n exit code (3) for linter errors.\n * [FEATURE] Support for automatically setting the variable\n GOMAXPROCS to the container CPU limit. Enable with the flag\n --enable-feature=auto-gomaxprocs.\n * [FEATURE] PromQL: Extend statistics with total and peak number\n of samples in a query. Additionally, per-step statistics are\n available with --enable-feature=promql-per-step-stats and using\n stats=all in the query API. Enable with the flag\n --enable-feature=per-step-stats.\n * [ENHANCEMENT] TSDB: more efficient sorting of postings read from\n WAL at startup.\n * [ENHANCEMENT] Azure SD: Add metric to track Azure SD failures.\n * [ENHANCEMENT] Azure SD: Add an optional resource_group\n configuration.\n * [ENHANCEMENT] Kubernetes SD: Support discovery.k8s.io/v1\n EndpointSlice (previously only discovery.k8s.io/v1beta1\n EndpointSlice was supported).\n * [ENHANCEMENT] Kubernetes SD: Allow attaching node metadata to\n discovered pods.\n * [ENHANCEMENT] OAuth2: Support for using a proxy URL to fetch\n OAuth2 tokens.\n * [ENHANCEMENT] Configuration: Add the ability to disable HTTP2.\n * [ENHANCEMENT] Config: Support overriding minimum TLS version.\n * [BUGFIX] Kubernetes SD: Explicitly include gcp auth from k8s.io.\n * [BUGFIX] Fix OpenMetrics parser to sort uppercase labels\n correctly.\n * [BUGFIX] UI: Fix scrape interval and duration tooltip not\n showing on target page.\n * [BUGFIX] Tracing/GRPC: Set TLS credentials only when insecure is\n false.\n * [BUGFIX] Agent: Fix ID collision when loading a WAL with\n multiple segments.\n * [BUGFIX] Remote-write: Fix a deadlock between Batch and flushing\n the queue.\n- Upgrade to version 2.34.0\n * [CHANGE] UI: Classic UI removed.\n * [CHANGE] Tracing: Migrate from Jaeger to OpenTelemetry based\n tracing.\n * [ENHANCEMENT] TSDB: Disable the chunk write queue by default and\n allow configuration with the experimental flag\n --storage.tsdb.head-chunks-write-queue-size.\n * [ENHANCEMENT] HTTP SD: Add a failure counter.\n * [ENHANCEMENT] Azure SD: Set Prometheus User-Agent on requests.\n * [ENHANCEMENT] Uyuni SD: Reduce the number of logins to Uyuni.\n * [ENHANCEMENT] Scrape: Log when an invalid media type is\n encountered during a scrape.\n * [ENHANCEMENT] Scrape: Accept\n application/openmetrics-text;version=1.0.0 in addition to\n version=0.0.1.\n * [ENHANCEMENT] Remote-read: Add an option to not use external\n labels as selectors for remote read.\n * [ENHANCEMENT] UI: Optimize the alerts page and add a search bar.\n * [ENHANCEMENT] UI: Improve graph colors that were hard to see.\n * [ENHANCEMENT] Config: Allow escaping of $ with $$ when using\n environment variables with external labels.\n * [BUGFIX] PromQL: Properly return an error from\n histogram_quantile when metrics have the same labelset.\n * [BUGFIX] UI: Fix bug that sets the range input to the\n resolution.\n * [BUGFIX] TSDB: Fix a query panic when\n memory-snapshot-on-shutdown is enabled.\n * [BUGFIX] Parser: Specify type in metadata parser errors.\n * [BUGFIX] Scrape: Fix label limit changes not applying.\n- Upgrade to version 2.33.5\n * [BUGFIX] Remote-write: Fix deadlock between adding to queue and\n getting batch.\n- Upgrade to version 2.33.4\n * [BUGFIX] TSDB: Fix panic when m-mapping head chunks onto the\n disk.\n- Upgrade to version 2.33.3\n * [BUGFIX] Azure SD: Fix a regression when public IP Address isn\u0027t\n set.\n- Upgrade to version 2.33.2\n * [BUGFIX] Azure SD: Fix panic when public IP Address isn\u0027t set.\n * [BUGFIX] Remote-write: Fix deadlock when stopping a shard.\n- Upgrade to version 2.33.1\n * [BUGFIX] SD: Fix no such file or directory in K8s SD when not\n running inside K8s.\n- Upgrade to version 2.33.0\n * [CHANGE] PromQL: Promote negative offset and @ modifer to stable\n features.\n * [CHANGE] Web: Promote remote-write-receiver to stable.\n * [FEATURE] Config: Add stripPort template function.\n * [FEATURE] Promtool: Add cardinality analysis to check metrics,\n enabled by flag --extended.\n * [FEATURE] SD: Enable target discovery in own K8s namespace.\n * [FEATURE] SD: Add provider ID label in K8s SD.\n * [FEATURE] Web: Add limit field to the rules API.\n * [ENHANCEMENT] Remote-write: Avoid allocations by buffering\n concrete structs instead of interfaces.\n * [ENHANCEMENT] Remote-write: Log time series details for\n out-of-order samples in remote write receiver.\n * [ENHANCEMENT] Remote-write: Shard up more when backlogged.\n * [ENHANCEMENT] TSDB: Use simpler map key to improve exemplar\n ingest performance.\n * [ENHANCEMENT] TSDB: Avoid allocations when popping from the\n intersected postings heap.\n * [ENHANCEMENT] TSDB: Make chunk writing non-blocking, avoiding\n latency spikes in remote-write.\n * [ENHANCEMENT] TSDB: Improve label matching performance.\n * [ENHANCEMENT] UI: Optimize the service discovery page and add a search bar.\n * [ENHANCEMENT] UI: Optimize the target page and add a search bar.\n * [BUGFIX] Promtool: Make exit codes more consistent.\n * [BUGFIX] Promtool: Fix flakiness of rule testing.\n * [BUGFIX] Remote-write: Update\n prometheus_remote_storage_queue_highest_sent_timestamp_seconds\n metric when write irrecoverably fails.\n * [BUGFIX] Storage: Avoid panic in BufferedSeriesIterator.\n * [BUGFIX] TSDB: CompactBlockMetas should produce correct\n mint/maxt for overlapping blocks.\n * [BUGFIX] TSDB: Fix logging of exemplar storage size.\n * [BUGFIX] UI: Fix overlapping click targets for the alert state\n checkboxes.\n * [BUGFIX] UI: Fix Unhealthy filter on target page to actually\n display only Unhealthy targets.\n * [BUGFIX] UI: Fix autocompletion when expression is empty.\n * [BUGFIX] TSDB: Fix deadlock from simultaneous GC and write.\n- Fix authentication bypass by updating Prometheus Exporter Toolkit\n to version 0.7.3 (CVE-2022-46146, bsc#1208049)\n- Fix uncontrolled resource consumption by updating Go to version\n 1.20.1 (CVE-2022-41723, bsc#1208298)\n- Restructure the spec to build web assets online\n * Makefile\n\ngrafana:\n\n- Update to version 9.5.8:\n * Features and enhancements\n GenericOAuth: Set sub as auth id\n * Bug fixes:\n DataSourceProxy: Fix url validation error handling\n- Update to version 9.5.7:\n Alerting: Sort NumberCaptureValues in EvaluationString\n Alerting: Improve performance of matching captures\n Alerting: No longer silence paused alerts during legacy\n migration\n Alerting: Remove and revert flag alertingBigTransactions\n Alerting: Migrate unknown NoData\\Error settings to the default\n Tracing: supply Grafana build version\n Tempo: Escape regex-sensitive characters in span name before\n building promql query\n Plugins: Only configure plugin proxy transport once\n Alerting: Fix unique violation when updating rule group with\n title chains/cycles\n Prometheus: Version detect bug\n Prometheus: Fix heatmap format with no data\n Database: Change getExistingDashboardByTitleAndFolder to get\n dashboard by title, not slug \n Alerting: Convert \u0027Both\u0027 type Prometheus queries to \u0027Range\u0027 in\n SQLStore: Fix Postgres dialect treating \u0027false\u0027 migrator\n default as true\n Alerting: Support newer http_config struct\n InfluxDB: Interpolate retention policies\n StatusHistory: Fix rendering of value-mapped null\n Alerting: Fix provenance guard checks for Alertmanager\n configuration to not cause panic when compared nested\n objects\n AnonymousAuth: Fix concurrent read-write crash\n AzureMonitor: Ensure legacy properties containing template\n variables are correctly migrated\n Explore: Remove data source onboarding page\n Dashboard: Re-align Save form\n Azure Monitor: Fix bug that did not show alert rule preview\n Histogram: Respect min/max panel settings for x-axis\n Heatmap: Fix color rendering for value ranges \u003c 1\n Heatmap: Handle unsorted timestamps in calculate mode\n Google Cloud Monitor: Fix mem usage for dropdown\n AzureMonitor: Fix logs query multi-resource and timespan values\n Utils: Reimplement util.GetRandomString to avoid modulo bias\n Alerting: Fix matching labels with spaces in their values\n Dashboard: Fix applying timezone to datetime variables\n Dashboard: Fix panel description event triggering every time\n panel is rendered\n Tempo: Fix get label values based on CoreApp type\n Heatmap: Fix log scale editor\n Dashboard: Fix disappearing panel when viewed panel is\n refreshed\n Prometheus: Fix bug in creating autocomplete queries with\n labels\n Prometheus: Fix Query Inspector expression range value\n Alerting: Fix migration failing if alert_configuration table is\n not empty\n InfluxDB: Fix querying retention policies on flux mode\n- Update to version 9.5.6:\n * Bug fixes\n Dashboard: Fix library panels in collapsed rows not getting\n updated\n Auth: Add and document option for enabling email lookup\n- Update to version 9.5.5:\n Security: Fix authentication bypass using Azure AD OAuth\n (bsc#1212641, CVE-2023-3128, jsc#PED-3694).\n Auth: Show invite button if disable login form is set to false.\n Azure: Fix Kusto auto-completion for Azure datasources.\n RBAC: Remove legacy AC editor and admin role on new dashboard\n route.\n API: Revert allowing editors to access GET /datasources. \n Settings: Add ability to override skip_org_role_sync with Env\n variables.\n- Update to version 9.5.3:\n Query: Prevent crash while executing concurrent mixed queries\n (bsc#1212099, CVE-2023-2801).\n Alerting: Require alert.notifications:write permissions to test\n receivers and templates (bsc#1212100, CVE-2023-2183).\n- Update to version 9.5.2:\n Alerting: Scheduler use rule fingerprint instead of version.\n Explore: Update table min height.\n DataLinks: Encoded URL fixed.\n TimeSeries: Fix leading null-fill for missing intervals.\n Dashboard: Revert fixed header shown on mobile devices in the\n new panel header.\n PostgreSQL: Fix TLS certificate issue by downgrading lib/pq.\n Provisioning: Fix provisioning issues with legacy alerting and\n data source permissions.\n Alerting: Fix misleading status code in provisioning API.\n Loki: Fix log samples using `instant` queries.\n Panel Header: Implement new Panel Header on Angular Panels.\n Azure Monitor: Fix bug that was not showing resources for\n certain locations.\n Alerting: Fix panic when reparenting receivers to groups\n following an attempted rename via Provisioning.\n Cloudwatch Logs: Clarify Cloudwatch Logs Limits.\n- Update to 9.5.1\n Loki Variable Query Editor: Fix bug when the query is updated\n Expressions: Fix expression load with legacy UID -100\n- Update to 9.5.0 (CVE-2023-1387, bsc#1210907, jsc#PED-3694)\n * Breaking changes\n - default named retention policies won\u0027t be used to query.\n Users who have a default named retention policy in their\n influxdb database, have to rename it to something else.\n Having default named retention policy is not breaking\n anything. We will make sure to use the actual default\n retention policy under the hood. To change the hardcoded\n retention policy in the dashboard.json, users must they\n select the right retention policy from dropdown and save the\n panel/dashboard.\n - Grafana Alerting rules with NoDataState configuration set to\n Alerting will now respect \u0027For\u0027 duration.\n - Users who use LDAP role sync to only sync Viewer, Editor and\n Admin roles, but grant Grafana Server Admin role manually\n will not be able to do that anymore. After this change, LDAP\n role sync will override any manual changes to Grafana Server\n Admin role assignments. If grafana_admin is left unset in\n LDAP role mapping configuration, it will default to false.\n API keys: Add deprecation to api keys.\n API: Enable serving Swagger UI by default and add docs and\n guidelines.\n API: Permit Cache-Control (browser caching) for datasource\n resources.\n Accessibility: Make row actions keyboard accessible.\n Admin/Plugins: Set category filter in connections link.\n Alerting: Add CustomDetails field in PagerDuty contact point.\n Alerting: Add dashboard and panel links to rule and instance\n annotations.\n Alerting: Add filter and remove funcs for custom labels and\n Alerting: Add fuzzy search to alert list view.\n Alerting: Add metrics for active receiver and integrations.\n Alerting: Better printing of labels.\n Alerting: Create new state history \u0027fanout\u0027 backend that\n dispatches to multiple other backends at once.\n Alerting: Enable preview for recording rules.\n Alerting: Fetch all applied alerting configurations.\n Alerting: Introduce proper feature toggles for common state\n history backend combinations.\n Alerting: Make time range query parameters not required when\n querying Loki.\n Alerting: New notification policies view.\n Alerting: No longer index state history log streams by\n instance labels.\n Alerting: Respect \u0027For\u0027 Duration for NoData alerts.\n Alerting: Support filtering rules by multiple datasources.\n Alerting: Switch to snappy-compressed-protobuf for outgoing\n push requests to Loki.\n Angular: Prevent angular from loading when disabled.\n Auth: Add Generic oauth skip org role sync setting.\n Auth: Add feature flag to move token rotation to client.\n Auth: Show user sync external Authentication status.\n Backend: Use sdk version 0.148.0.\n Chore: Add stat for remote cache config.\n Chore: Replace short UID generation with more standard UUIDs.\n Chore: Use DOMPurify to sanitize strings rather than js-xss.\n CloudMonitoring: Add possibility to use path for private key.\n CloudWatch Logs: Update default timeout to 30m.\n CloudWatch: Add AWS/IotSiteWise namespace and metrics.\n CloudWatch: Add account support to variable queries.\n CloudWatch: Make deeplinks work for us-gov and china regions.\n Cloudwatch: Add MeteredIOBytes metric for EFS.\n Command Palette: Display dashboard location.\n Command palette: Enable folder searching.\n Connections: Turn on feature toggle by default.\n Cookies: Provide a mechanism for per user control over cookies.\n Dashboard Datasource: Update Query List \u0026 Improve UX.\n Dashboard: Add a feature that creates a table panel when a\n spreadsheet file is dropped on the dashboard.\n Dashboard: Add new visualization/row/library panel/pasted\n panel is now a dropdown menu.\n Dashboard: Add value format for requests per minute.\n Dashboard: Empty/No Panels dashboard with a new design.\n Dashboard: When dashboard is not found show message instead\n of empty page.\n Dashboards: Enable feature flag newPanelChromeUI by default.\n Dataplane: Support timeSeriesLong without transform.\n Datasources: Add user_agent header customization for outgoing\n HTTP requests.\n Datasources: Use getDefaultQuery in annotations editors.\n Docs: Add documentation on how to debug backend plugins.\n Docs: Deprecate dashboard previews.\n Elasticsearch: Detect Elasticsearch version.\n Elasticsearch: Run Explore queries trough data source backend.\n Explore: Add range option to internal data links.\n Explore: Add transformations to correlation data links.\n Explore: Support mixed data sources for supplementary query.\n Extensions: Expose an enum for available placements.\n Feat: Changing link destination for get more plugins.\n Feat: Linking to plugin details page rather than externally\n for new datasources.\n FieldMatchers: Add match by value (reducer).\n Flame graph: Add context menu.\n Flame graph: Add metadata above flame graph.\n Geomap: Improve tooltip url for photos layer.\n Geomap: Release night / day layer.\n InfluxDB: Move database information into jsondata.\n Jaeger and Zipkin: Config \u0026 docs upgrade.\n LDAP: Allow setting minimum TLS version and accepted ciphers.\n Live: Remove (alpha) ability to configure live pipelines.\n Logger: Add feature toggle for errors in HTTP request logs.\n Login: Allow custom name and icon for social providers.\n Logs Panel: Refactor style generation to improve rendering\n performance.\n Logs: Add millisecond to timestamp in log line.\n Logs: Rename dedup to deduplicate.\n Loki Query Editor: Make Monaco the default editor.\n Loki: Add unpack query builder hint.\n Loki: Add descriptions to query builder operations.\n Loki: Add placeholder to the loki query editor.\n Loki: Always fetch for new label keys in the QueryBuilder.\n Loki: Display error with label filter conflicts.\n Loki: Improve the display of loki query stats.\n MSSQL/Postgres: List views in table dropdown as well.\n MSSQL: Update forked go-mssqldb dependency.\n Metrics: Update comment to mention folders instead of\n dashboards.\n Navigation: Enable new navigation by default.\n NodeGraph: Support icons for nodes.\n Notifications: Enable display of trace ID by default.\n Packaging: Start Grafana service after InfluxDB.\n Panel Header: Add CancelQuery option to panel header.\n Panel: Show multiple errors info in the inspector.\n PanelChrome: Add option to show actions on the right side\n (actions = leftItems).\n Phlare: Allow variables in labelSelector (in query).\n Plugin: Skip preloading disabled app plugins.\n Plugins: Add optional logger for plugin requests sent to backend\n plugins.\n Plugins: Extend panel menu with commands from plugins.\n Plugins: Extend panel menu with links from plugins.\n Plugins: Improve instrumentation by adding metrics and tracing.\n Plugins: Support for distributed tracing in backend plugins SDK.\n Plugins: Support for link extensions.\n Profiling: Enable flame graph \u0026 Phlare/Parca data sources for\n all users.\n Prometheus Datasource: Improve Prom query variable editor.\n Prometheus Metrics: Add missing stat_total_teams metric.\n Prometheus/Loki: Run query explicitly instead of onblur in panel\n edit.\n Prometheus: Browser resource caching.\n Prometheus: Improve prometheus query variable editor.\n Prometheus: Use $__rate_interval for rate queries generated by\n metric browser.\n Pubdash: Email sharing handle dashboard deleted.\n PublicDashboards: Backfills share column with default value.\n PublicDashboards: Configuration modal redesign.\n PublicDashboards: Email sharing.\n PublicDashboards: Enable creation when dashboard has template\n variables.\n PublicDashboards: Paused or deleted public dashboard screen.\n QueryHistory: Improve handling of mixed datasource entries.\n Rendering: Experimental support to use JWTs as auth method.\n SQL Datasources: Add back help content.\n Schema: Remove exclusion for timeseries and update imports.\n Search: Improvements for starred dashboard search.\n Select: Show icon in the grafana/ui Select component.\n Service accounts: Creation logic simplification.\n Service accounts: Remove Add API keys buttons and remove one\n state of migrating for API keys tab.\n SplitOpen: Update API to accept multiple queries.\n Stat Panel: Add an option for a non-gradient/solid background.\n Stat: Add ability to remove default single-color background\n gradient.\n SupportBundles: Add OAuth bundle collectors.\n Table Panel: Add ability to use text color for value or hide\n value in gauge cell.\n Table: Introduce sparkline cell type.\n Tempo: Config and doc updates.\n Tempo: Update service graph view and docs.\n TraceView: Add key and url escaping of json tag values.\n TraceView: Reworked header.\n Tracing: Add more detail to HTTP Outgoing Request.\n Tracing: Docs and config improvements for Tempo/Jaeger/Zipkin.\n Tracing: Support multiple OTel propagators.\n Transformations: Support time format when converting time to\n strings.\n Transformers: Support adding the row index using calculate\n field transformer.\n Units: Format currency with negative before the symbol.\n API: Fix \u0027Updated by\u0027 Column in dashboard versions table.\n AccessControl: Allow editors to access GET /api/datasources.\n Alerting: Add \u0027backend\u0027 label to state history writes metrics.\n Alerting: Add alert instance labels to Loki log lines in\n addition to stream labels.\n Alerting: Elide requests to Loki if nothing should be recorded.\n Alerting: Fix DatasourceUID and RefID missing for\n DatasourceNoData alerts.\n Alerting: Fix ambiguous handling of equals in labels when\n bucketing Loki state history streams.\n Alerting: Fix attachment of external labels to Loki state\n history log streams.\n Alerting: Fix creating a recording rule when having multiple\n datasources.\n Alerting: Fix explore link in alert detail view.\n Alerting: Fix share URL for Prometheus rules on subpath.\n Alerting: Fix stats that display alert count when using unified\n alerting.\n Alerting: Hide mute timing actions when dealing with vanilla\n prometheus.\n Alerting: Paginate result previews.\n Alerting: Prometheus-compatible Alertmanager timings editor.\n Alerting: Update scheduler to get updates only from database.\n Alerting: Use a completely isolated context for state history\n writes.\n Alerting: Use displayNameFromDS if available in preview.\n Annotation List: Fix panel not updating when variable is\n changed.\n Annotations: Ignore unique constraint violations for tags.\n Auth: Fix orgrole picker disabled if isSynced user.\n AzureMonitor: Fix Log Analytics portal links.\n BrowseDashboards: Fix move to General folder not working.\n Catalog: Show install error with incompatible version.\n Chore: Update Grafana to use Alertmanager\n v0.25.1-0.20230308154952-78fedf89728b.\n CloudMonitoring: Add project selector for MQL editor[fix].\n CloudWatch Logs: Fix running logs queries with expressions.\n CloudWatch Logs: Fix to make log queries use a relative time if\n available.\n CloudWatch Logs: Revert \u0027Queries in an expression should run\n synchronously\u0027.\n CloudWatch: Fix cachedQueries insights not being updated for\n metric queries.\n Cloudwatch: Pass refId from query for expression queries.\n Dashboards: Evaluate provisioned dashboard titles in a\n backwards compatible way.\n Dashboards: Fix broken internal data links.\n Database: Don\u0027t sleep 10ms before every request.\n Elasticsearch: Fix processing of response with multiple group\n by for alerting.\n Elasticsearch: Handle multiple annotation structures.\n Email: Mark HTML comments as \u0027safe\u0027 in email templates.\n ErrorHandling: Fixes issues with bad error messages.\n ErrorView: Better detection of no-data responses.\n Explore: Make DataSourcePicker visible on small screens.\n Fix: DataLinks from data sources override user defined data\n link.\n Fix: Top table rendering and update docs.\n Frontend: Fix broken links in /plugins when pathname has a\n trailing slash.\n Geomap: Fix route layer zoom behavior.\n Google Cloud Monitoring: Fix project variable.\n HeatMap: Sort y buckets when all bucket names are numeric.\n InfluxDB: Fix querying with hardcoded retention policy.\n InfluxDB: Fix sending retention policy with InfluxQL queries.\n KVStore: Include database field in migration.\n LDAP: Always synchronize Server Admin role through role sync if\n role sync is enabled.\n Library panels: Ensure pagination controls are always correctly\n displayed.\n Loki: Fix autocomplete situations with multiple escaped quotes.\n MegaMenu: Fixes mega menu showing scroll indicator when it\n shouldn\u0027t.\n Navigation: Redirect to root page when switching organization.\n Navigation: Scrolled hamburger menu links now navigate correctly\n in Safari.\n NestedFolders: Fix nested folder deletion.\n New Panel Header: Fix when clicking submenu item the parent\n menu item onClick get\u0027s triggered.\n Phlare: Fix error when there are no profileTypes to send from\n backend.\n PieChart: Show long labels properly.\n PluginExtensions: Fixed issue with incorrect type being\n exposed when configuring an extension.\n Plugins: Ensure proxy route bodies are valid JSON.\n Plugins: Fix width for README pages with tables.\n Plugins: Markdown fetch retry with lowercase.\n Plugins: Skip instrumenting plugin build info for core and\n bundled plugins.\n PublicDashboards: Query collapsed panels inside rows.\n Query Splitting: Fix for handling queries with no requestId.\n SQL Datasources: Fix variable throwing error if query returns no\n data.\n SQL Datasources: Prevent Call Stack Overflows with Large\n Numbers of Values for Variable.\n SQLStore: Fix SQLite error propagation if query retries are\n disabled.\n Stat Panel: Fix issue with clipping text values.\n Table Panel: Fix panel migration for options cell type.\n Table: Fix migrations from old angular table for cell color\n modes.\n Table: Fixes issue with pagination summary causing scrollbar.\n Table: Fixes table panel gauge alignment.\n TablePanel: Fix table cells overflowing when there are\n multiple data links.\n TablePanel: fix footer bug; no footer calculated values after\n \u0027hidden\u0027 column override.\n Templating: Allow percent encoding of variable with custom all.\n Tempo: Set default limit if none is provided for traceql\n queries.\n TimeSeries: Don\u0027t extend stepped interpolation to graph edges.\n TimeSeries: Improve stacking direction heuristic.\n Trace View: Update the queryType to traceql for checking if\n same trace when clicking span link.\n TraceView: Don\u0027t require preferredVisualisationType to render.\n Utils: Reimplement util.GetRandomString to avoid modulo bias.\n XYChart: Add all dataset columns in tooltip.\n * Plugin development fixes \u0026 changes\n DateTimePicker: Can now select time correctly.\n Grafana UI: Fix tooltip prop of button component.\n DateTimePicker: Add min date support to calendar.\n GrafanaUI: Implement new component Toggletip.\n ContextMenu: Fix padding and show border based on items.\n- Update to 9.4.7 (2023-03-16)\n Alerting: Update scheduler to receive rule updates only from\n database.\n Influxdb: Re-introduce backend migration feature toggle.\n Security: Fixes for CVE-2023-1410.\n The InfluxDB backend migration feature toggle\n (influxdbBackendMigration) has been reintroduced in this\n version as issues were discovered with backend processing of\n InfluxDB data. Unless this feature toggle is enabled, all\n InfluxDB data will be parsed in the frontend. This frontend\n processing is the default behavior.\n In Grafana 9.4.4, InfluxDB data parsing started to be handled\n in the backend. If you have upgraded to 9.4.4 and then added\n new transformations on InfluxDB data, those panels will fail to\n render. To resolve this either:\n Remove the affected panel and re-create it or\n edit the `time` field as `Time` in `panel.json` or\n `dashboard.json`\n as the exporter toolkit has been updated by upstream\n- Install wrapper scripts under /usr/sbin\n- Install actual binaries under /usr/libexec/grafana (or /usr/lib\n under older distributions) and create a simlink for wrapper\n scripts and the service (which expect the binary to be under\n /usr/share/grafana/bin)\n- Update to 9.4.3\n Alerting: Use background context for maintenance function.\n- Update to 9.4.2\n Alerting: Fix boolean default in migration from false to 0.\n- Update to 9.4.0\n Alerting: Add endpoint for querying state history.\n Alerting: Add label query parameters to state history endpoint.\n Alerting: Add static label to all state history entries.\n Alerting: Mark AM configuration as applied.\n Azure Monitor: Enable multiple resource queries.\n Query Caching: Add per-panel query caching TTL.\n Table: Add row number column option.\n Tempo: Remove tempoApmTable feature flag.\n Transformations: Selectively apply transformation to queries.\n AccessControl: Clear user permission cache for update org user\n role.\n Alerting: Fix handling of special floating-point cases\n when writing observed values to annotations.\n Auth: Rotate token patch.\n ContextMenu: Consider y coord when determining bottom\n collision.\n Elasticsearch: Fix consistent label order in alerting.\n Explore: Fix graph not updating when changing config.\n Heatmap: Support heatmap rows with non-timeseries X axis.\n Login: Fix panic when a user is upserted by a background\n process.\n MSSQL: Add support for macro function calls.\n MySQL: Quote identifiers that include special characters.\n Navigation: Sign in button now works correctly when\n served under a sub path.\n Nested Folder: Fix for SQLite not to overwrite the parent on\n restarts.\n PanelChrome: Adds display mode to support transparent option.\n Plugins: Case-sensitive routes for standalone pages.\n Plugins: Prefer to use the data source UID when querying.\n SQLStore: Fix folder migration for MySQL \u003c 5.7.\n Search: Fix not being able to clear sort value.\n Tempo: Fix span name being dropped from the query.\n PanelChrome: Implement hover header.\n- Update to 9.3.7\n Alerting: Validate that tags are 100 characters or less.\n Expressions: Fixes the issue showing expressions editor.\n Logs: Fix stats not being updated when log results change.\n Plugins: Fix circular reference in customOptions leading\n to MarshalJSON errors.\n Time Series Panel: Fix legend text selection in Firefox.\n- Update to 9.3.6\n QueryEditorRow: Fixes issue loading query editor when\n data source variable selected.\n- Update to 9.3.4\n Prometheus: Add default editor configuration.\n TextPanel: Refactor to functional component.\n Alerting: Fix webhook to use correct key for decrypting token.\n Alerting: Set error annotation on EvaluationError regardless of\n underlying error type.\n Datasources: Fix Proxy by UID Failing for UIDs with a Hyphen.\n Fix creating of span link with no tags.\n Elasticsearch: Fix failing requests when using SigV4.\n Elasticsearch: Fix toggle-settings are not shown correctly.\n Explore: Be sure time range key bindings are mounted after\n clear.\n Explore: Unsync time ranges when a pane is closed.\n Logs: Lines with long words do not break properly.\n Loki: Fix misaligned derived fields settings.\n Query Builder: Fix max width of input component to prevent\n overflows.\n Search: Auto focus input elements.\n Search: Fix empty folder message showing when by starred\n dashboards.\n Table Panel: Fix image of image cell overflowing table cell and\n cells ignoring text alignment setting when a data\n link is added.\n- Update to 9.3.2\n Graphite: Process multiple queries to Graphite plugin.\n API: Fix delete user failure due to quota not enabled.\n Accessibility: Improved keyboard accessibility in BarGauge.\n Accessibility: Improved keyboard accessibility in BigValue.\n Alerting: Use the QuotaTargetSrv instead of the QuotaTarget in\n quota check.\n AzureMonitor: Automate location retrieval.\n AzureMonitor: Fix bad request when setting dimensions.\n BarChart: Fix value mappings.\n Build: Streamline and sync dockerfiles.\n Build: Unified dockerfile for all builds.\n CloudWatch: Fix - make sure dimensions are propagated to alert\n query editor.\n Cloudwatch: Fix deeplink with default region.\n Command Palette: Fix not being able to type if triggered\n whilst another modal is open.\n Command Palette: Maintain page state when changing theme.\n Dashboards: Fix \u0027Make Editable\u0027 button not working in\n Dashboard Settings.\n Dashboards: Show error when data source is missing.\n Datasource: Fix - apply default query also to queries in new\n panels.\n Dropdown: Menu now closes correctly when selecting\n options on touch devices.\n Influx: Query segment menus now position correctly near\n the bottom of the screen.\n Login: Fix failure to login a new user via an external\n provider if quota are enabled.\n Loki/Prometheus: Fix wrong queries executed in split view.\n Loki: Fix wrongly escaped label values when using LabelFilter.\n Navigation: Prevent app crash when importing a dashboard with a\n uid of `home`.\n Panel Edit: Fix data links edit icons being off screen when\n provided title is too long.\n Prometheus: Fix exemplar fill color to match series color in\n time series.\n Prometheus: Fix exemplars not respecting corresponding series\n display status.\n StateTimeline: Fix negative infinity legend/tooltip from\n thresholds.\n Table: Fixes row border style not showing and colored\n rows blending together.\n Tempo: Fix TraceQL autocomplete issues.\n TimePicker: Prevent TimePicker overflowing viewport on small\n screens.\n TimeRangePicker: Fix recently ranges only not showing all recent\n ranges.\n TimeZonePicker: Scroll menu correctly when using keyboard\n controls.\n- Update to 9.3.1\n Connections: Update \u0027Your connections/Data sources\u0027 page.\n Accessibility: Increase badge constrast to be WCAG AA compliant.\n- Update to 9.3.0\n Alerting: Enable interpolation for notification policies in file\n provisioning.\n Azure Monitor Logs: Avoid warning when the response is empty.\n Azure Monitor: Add support to customized routes.\n Canvas: Add icon value mapping.\n CloudWatch: Cross-account querying support.\n Docs: Update `merge-pull-request.md` regarding backport\n policies.\n GaugePanel: Setting the neutral-point of a gauge.\n Geomap: Improve location editor.\n Internationalization: Enable internationalization by default.\n Logs: Add `Download logs` button to log log-browser.\n Loki: Add `gzip` compression to resource calls.\n Loki: Add improvements to loki label browser.\n Loki: Make label browser accessible in query builder.\n Loki: Remove raw query toggle.\n Middleware: Add CSP Report Only support.\n Navigation: Prevent viewer role accessing dashboard\n creation, import and folder creation.\n OAuth: Refactor OAuth parameters handling to support\n obtaining refresh tokens for Google OAuth.\n Oauth: Display friendly error message when\n role_attribute_strict=true and no valid role found.\n Preferences: Add confirmation modal when saving org preferences.\n PublicDashboards: Orphaned public dashboard deletion script\n added.\n Query Editor: Hide overflow for long query names.\n Solo Panel: Configurable timezone.\n TablePanel: Add support for Count calculation per column\n or per entire dataset.\n Tempo: Send the correct start time when making a TraceQL query.\n Various Panels: Remove beta label from Bar Chart, Candlestick,\n Histogram, State Timeline, \u0026 Status History\n Panels.\n Access Control: Clear user\u0027s permission cache after resource\n creation.\n Accessibility: Improve keyboard accessibility in\n `AnnoListPanel`.\n Accessibility: Improve keyboard accessibility in `Collapse`.\n `GettingStarted` panel.\n Accessibility: Improve keyboard accessibility of `FilterPill`.\n Admin: Fix broken links to image assets in email templates.\n Azure Monitor: Fix namespace selection for storageaccounts.\n Calcs: Fix difference percent in legend.\n DataLinks: Improve Data-Links AutoComplete Logic.\n Explore: Fix a11y issue with logs navigation buttons.\n Heatmap: Fix blurry text \u0026 rendering.\n Heatmap: Fix tooltip y range of top and bottom buckets in\n calculated heatmaps.\n Logs: Fix misalignment of LogRows.\n Navigation: Stop clearing search state when opening a\n result in a new tab.\n OptionsUI: SliderValueEditor does not get auto focused on\n slider change.\n PanelEdit: Fixes bug with not remembering panel options\n pane collapse/expand state.\n Quota: Fix failure in store due to missing scope parameters.\n Quota: Fix failure when checking session limits.\n StateTimeline: Prevent label text from overflowing state rects.\n Tempo: Fix search table duration unit.\n TraceView: Fix broken rendering when scrolling in Dashboard\n panel in Firefox.\n GrafanaUI: Add disabled option for menu items.\n- Update to 9.2.4\n Access Control: Add an endpoint for setting several managed\n resource permissions.\n Accessibility: Increase `Select` placeholder contrast to\n be WCAG AA compliant.\n Alerting: Append org ID to alert notification URLs.\n Alerting: Make the Grouped view the default one for Rules.\n Build: Remove unnecessary alpine package updates.\n Google Cloud Monitoring: Set frame interval to draw null values.\n Instrumentation: Expose when the binary was built as a gauge.\n Loki: Preserve `X-ID-Token` header.\n Search: Reduce requests in folder view.\n TimeSeries: More thorough detection of negative values for\n auto-stacking direction.\n Alerting: Attempt to preserve UID from migrated legacy channel.\n Alerting: Fix response is not returned for invalid Duration in\n Provisioning API.\n Alerting: Fix screenshot is not taken for stale series.\n Auth: Fix admins not seeing pending invites.\n MSSQL/Postgres: Fix visual query editor filter disappearing.\n Tempo: Fix dropdown issue on tag field focus.\n Timeseries: Fix null pointer when matching fill below to field.\n Toolkit: Fix Webpack less-loader config.\n- Update to 9.2.3\n Docs: Add information about DB version support to upgrade guide.\n Footer: Update footer release notes link to Github changelog.\n Prometheus: Do not drop errors in streaming parser.\n Prometheus: Flavor/version configuration.\n Prometheus: Provide label values match parameter API when\n supported prometheus instance is configured.\n Security: Upgrade x/text to version unaffected by\n CVE-2022-32149.\n Auth: Fix GF_AUTH_JWT_URL_LOGIN env variable doesn\u0027t work.\n Live: Explicitly reply with http 200.\n Prometheus: Fix builder operation mode changing\n multiselect to single select behaviour.\n Security: Fix vulnerabilities in webpack loader-utils.\n- Update to 9.2.2\n Alerting: Add support for wecom apiapp.\n Canvas: Improve resource picker initialization.\n Canvas: Improve text element readability.\n CloudWatch: Make sure adoption tracking is done on valid,\n migrated queries.\n Dashboard: Alerts user to incorrect tag format for JSON import.\n MSSQL: Support tables from all schemas.\n Opentsdb: Allow template variables for filter keys.\n QueryEditor: Revert components from grafana-ui.\n Browse: Fix General folder not showing in FolderPicker.\n Elasticsearch: Fix calculation of trimEdges in alert mode.\n Elasticsearch: Fix trimEdges delete logic in alert mode.\n GoogleOAuth: Unlock User Admin UI.\n LogContext: Fix wrong color of `show context` icon in light\n theme.\n Loki: Fix adding of adhoc filters to stream selector when query\n with empty stream selector.\n Loki: Fix double stringified log-lines when copied via Copy\n button.\n Loki: Fix explain section about $\\_\\_interval variable.\n Loki: Remove already selected options from next label filter\n options in builder.\n NodeGraph: Fix rendering issues when values of arc are over 1.\n PublicDashboards: Fix hidden queries execution.\n Tempo: Fix Node Graph visualization type in dashboard.\n TimeSeries: Fix stacking when first value is negative zero.\n TimeseriesPanel: Fix variables in data links.\n User: Fix externalUserId not being populated.\n We added some components a bit too early to @grafana/ui in 9.2\n so we are moving them back to @grafana/experimental. If you\n used any of these components\n AccessoryButton\n EditorFieldGroup\n EditorHeader\n EditorField\n EditorRow\n EditorList\n EditorRows\n EditorSwitch\n FlexItem\n Stack\n InlineSelect\n InputGroup\n Space\n Please use them from grafana/experimental from now on.\n- Update to 9.2.1\n Alerting: Improve notification policies created during\n migration.\n AzureAD: Add option to force fetch the groups from the\n Graph API.\n Docs: Note end of release notes publication.\n Inspect: Handle JSON tab crash when the provided object\n is too big to stringify.\n TablePanel: Footer now updates values on column filtering.\n Alerting: Fix email image embedding on Windows.\n Alerting: Fix mathexp.NoData for ConditionsCmd.\n Legacy Alerting: Fix duration calculation when testing a rule.\n Loki: Propagate additional headers from Grafana to Loki\n when querying data.\n Search: Sort alphabetically in the folder view, increase\n the limit of the folder search from 50 to 1000.\n TablePanel: Fix last table column to be centered.\n Grafana UI: Export prop types for queryfield, modal and field\n components.\n Toolkit: Fix `Cannot use import statement outside...` error in\n tests.\n- Update to 9.2.0\n Alerting: Add Notification error feedback on contact points\n view.\n Alerting: Allow created by to be manually set when\n there\u0027s no creator for silences.\n Alerting: Expose info about notification delivery errors\n in a new /receivers endpoint.\n Alerting: Update imported prometheus alertmanager version.\n Alerting: Write and Delete multiple alert instances.\n Core: Implement aria attributes for query rows, improve a11y.\n DevEnv: Adds docker block for clickhouse.\n Docker: removes unneccesary use of edge repo.\n Explore: Revert split pane resize feature.\n Frontend: Make local storage items propagate to different tabs\n immediately.\n PublicDashboards: Allow disabling an existent public dashboard\n if it.\n QueryEditorRow: Only pass error to query editor if panel\n is not in a loading state.\n XYChart: Beta release.\n Alerting: Start ticker only when scheduler starts.\n Alerting: Fix pq: missing FROM-clause for table \u0027a\u0027.\n AzureMonitor: Correctly update subscriptions value in ARG\n editor.\n Chore: Regenerate swagger specification and fix validation\n failures.\n Correlations: Only return correlation for which both\n source and target datasources exist.\n Explore: Prevent panes from disappearing when resizing\n window in split view.\n Links: Fix opening links from different orgs on the same tab.\n LogContext: Fix scroll position in upper context group.\n Logs: Show copy button independently from context.\n Loki/Prometheus: Fix adding of ad hoc filters when\n jumping from dashboard to explore.\n Loki: Add support for range aggregations with by grouping.\n Loki: Fix label-value escaping in context query.\n Loki: Fix redundant escaping in adhoc filter with regex match.\n PanelEdit: Fixes resize pane border and spacing issues.\n RBAC: Redirect to /login when forceLogin is set.\n Security: Fix CVE-2022-27664.\n StateTimeline: Fix tooltip showing erroneously in shared\n crosshair dashboards.\n Tempo: Fix unexpected trimming of leading zeroes in traceID.\n Tracing: Fix bug where errors are not reported to OpenTelemetry.\n- Update to 9.1.8\n Alerting: Fix evaluation interval validation.\n Alerting: Fix migration to create rules with group index 1.\n Alerting: Fix migration to not add label \u0027alertname\u0027.\n Azure Monitor: Fix empty Logs response for Alerting.\n Azure Monitor: Fix subscription selector when changing data\n sources.\n Google Cloud Monitoring: Fix bucket bound for distributions.\n- Update to 9.1.7\n CloudWatch: Add missing AWS/Prometheus metrics.\n Explore: Add feature tracking events.\n Graphite: Add error information to graphite queries tracing.\n Prometheus: Restore FromAlert header.\n Search: Add search index configuration options.\n Thresholds: Add option for dashed line style.\n Alerting: Fix default query\u0027s data source when no default\n datasource specified.\n Alerting: Fix mathexp.NoData cannot be reduced.\n Alerting: Skip unsupported file types on provisioning.\n AzureMonitor: Ensure resourceURI template variable is migrated.\n Dashboard: Fix plugin dashboard save as button.\n Docs: Fix decimals: auto docs for panel edit.\n Fix: RBAC handle `error no resolver` found.\n LibraryPanelSearch: Refactor and fix hyphen issue.\n Live: Fix live streaming with `live-service-web-worker` feature\n flag enabled.\n QueryField: Fix wrong cursor position on autocomplete.\n- Update to 9.1.6\n DataSource: Adding possibility to hide queries from the\n inspector.\n Inspect: Hide Actions tab when it is empty.\n PanelMenu: Remove hide legend action as it was showing on\n all panel types.\n Provisioning Contact points: Support disableResolveMessage via\n YAML.\n PublicDashboards: Support subpaths when generating pubdash url.\n Alerting: Fix legacy migration crash when rule name is too long.\n Alerting: Fix send resolved notifications.\n Azure Monitor: Fix migration issue with MetricDefinitionsQuery\n template variable query types.\n Browse: Hide dashboard actions if user does not have enough\n permission.\n ElasticSearch: Fix dispatching queries at a wrong time.\n Panel: Disable legends when showLegend is false prior to\n schema v37.\n Prometheus: Fix metadata requests for browser access mode.\n Search: Avoid requesting all dashboards when in Folder View.\n TablePanel/StatPanel: Fix values not being visible when\n background transparent.\n- Update to 9.1.5\n Alerting: Sanitize invalid label/annotation names for external\n alertmanagers.\n Alerting: Telegram: Truncate long messages to avoid send error.\n DisplayProcessor: Handle reverse-ordered data when auto-showing\n millis.\n Heatmap: Add option to reverse color scheme.\n PluginLoader: Alias slate-react as @grafana/slate-react.\n Search: Add substring matcher, to bring back the old\n dashboard search behavior.\n Traces: More visible span colors.\n Alerting: Fix incorrect propagation of org ID and other\n fields in rule provisioning endpoints.\n Alerting: Resetting the notification policy tree to the default\n policy will also restore default contact points.\n AzureMonitor: Fix custom namespaces.\n AzureMonitor: Fix issue where custom metric namespaces\n are not included in the metric namespace list.\n CloudWatch: Fix display name of metric and namespace.\n Cloudwatch: Fix annotation query serialization issue.\n Dashboard: Fix issue where unsaved changes warning would appear\n even after save, and not being able to change library\n panels.\n Dashboard: Hide overflow content for single left pane.\n Loki: Fix a bug where adding adhoc filters was not possible.\n- Update to 9.1.4\n GrafanaUI: Fixes Chrome issue for various query fields.\n- Update to 9.1.3\n API: Do not expose user input in datasource error responses.\n Library Panel: Allow to delete them when deprecated.\n Plugins Catalog: Allow to filter plugins using special\n characters.\n Alerting: Fix UI bug when setting custom notification\n policy group by.\n AppRootPage: Fix issue navigating between two app plugin pages.\n Correlations: Use correct fallback handlers.\n RBAC: Fix deleting empty snapshots.\n LibraryElements: Fix inability to delete library panels\n under MySQL.\n Metrics: fix `grafana_database_conn_*` metrics, and add\n new `go_sql_stats_*` metrics as eventual replacement.\n TestData DB: Fix node graph not showing when the `Data type`\n field is set to `random`.\n * Deprecations\n The `grafana_database_conn_*` metrics are deprecated, and will\n be removed in a future version of Grafana. Use the\n `go_sql_stats_*` metrics instead.\n- Update to 9.1.2\n AdHoc variable: Correctly preselect datasource when provisioning.\n AzureMonitor: Added ARG query function for template variables.\n Dashboards: Persist details message when navigating through\n dashboard save drawer\u0027s tabs.\n Dashboards: Correctly migrate mixed data source targets.\n Elasticsearch: Use millisecond intervals for alerting.\n Elasticsearch: Use millisecond intervals in frontend.\n Geomap: Local color range.\n Plugins Catalog: Use appSubUrl to generate plugins catalog urls.\n Rendering: Add support for renderer token.\n Alerting: Fix saving of screenshots uploaded with a signed url.\n AngularPanels: Fixing changing angular panel options not taking\n having affect when coming back from panel edit.\n Explore: Improve a11y of query row collapse button.\n Geomap: Fix tooltip display.\n QueryEditorRow: Filter data on mount.\n Search: Show all dashboards in the folder view.\n Tracing: Fix the event attributes in opentelemetry tracing.\n GrafanaUI: Fix styles for invalid selects \u0026 DataSourcePicker.\n- Update to 9.1.1\n Cloud Monitoring: Support SLO burn rate.\n Schema: Restore \u0027hidden\u0027 in LegendDisplayMode.\n Timeseries: Revert the timezone(s) property name change back to\n singular.\n Alerting: Fix links in Microsoft Teams notifications.\n Alerting: Fix notifications for Microsoft Teams.\n Alerting: Fix width of Adaptive Cards in Teams notifications.\n ColorPickerInput: Fix popover in disabled state.\n Decimals: Fixes auto decimals to behave the same for\n positive and negative values.\n Loki: Fix unique log row id generation.\n Plugins: Fix file extension in development authentication guide.\n TimeSeries: Fix jumping legend issue.\n TimeSeries: Fix memory leak on viz re-init caused by\n KeyboardPlugin.\n TimePicker: Fixes relative timerange of less than a day not\n displaying.\n GrafanaUI: Fixes ClipboardButton to always keep multi line\n content.\n- Update to 9.1.0\n API: Allow creating teams with a user defined identifier.\n Alerting: Adds interval and For to alert rule details.\n Alerting: Extend PUT rule-group route to write the entire\n rule group rather than top-level fields only.\n Alerting: Use Adaptive Cards in Teams notifications.\n Azure Monitor: Add Network Insights Dashboard.\n Chore: Improve logging of unrecoverable errors.\n Correlations: Add UpdateCorrelation HTTP API.\n Dashboard: Reverted the changes of hiding multi-select\n and all variable in the datasource picker.\n Geomap: Add alpha day/night layer.\n Geomap: Add measuring tools.\n GrafanaUI: Add success state to ClipboardButton.\n Heatmap: Replace the heatmap panel with new implementation.\n KVStore: Allow empty value in kv_store.\n Prometheus: Promote Azure auth flag to configuration.\n Search: Display only dashboards in General folder of\n Search Folder View.\n Status history/State timeline: Support datalinks.\n Transform: Add a limit transform.\n Transformations: Add standard deviation and variance reducers.\n API: Fix snapshot responses.\n Access Control: Fix permission error during dashboard\n creation flow.\n Access Control: Set permissions for Grafana\u0027s test data source.\n Alerting: Fix migration failure.\n BarGauge: Show empty bar when value, minValue and\n maxValue are all equal.\n Dashboard: Fix color of bold and italics text in panel\n description tooltip.\n Loki: Fix passing of query with defaults to code mode.\n Loki: Fix producing correct log volume query for query\n with comments.\n Loki: Fix showing of unusable labels field in detected fields.\n Tracing: Fix OpenTelemetry Jaeger context propagation.\n Alerting: AlertingProxy to elevate permissions for request\n forwarded to data proxy when RBAC enabled.\n Plugins: Only pass `rootUrls` field in request when not empty.\n Alert notifications to Microsoft Teams now use Adaptive Cards\n instead of Office 365 Connector Cards.\n Starting at 9.1.0, existing heatmap panels will start using a\n new implementation. This can be disabled by setting the\n `useLegacyHeatmapPanel` feature flag to true. It can be\n tested on a single dashbobard by adding\n `?__feature.useLegacyHeatmapPanel=true` to any dashboard URL.\n The most notable changes are:\n Significantly improved rendering performance\n When calculating heatmaps, the buckets are now placed on\n reasonable borders (1m, 5m, 30s etc)\n Round cells are no longer supported\n- Update to 9.0.9\n AuthNZ: Security fixes for CVE-2022-35957 and CVE-2022-36062.\n- Update to 9.0.8\n Alerting: Hide \u0027no rules\u0027 message when we are fetching\n from data sources.\n Alerting: AlertingProxy to elevate permissions for\n request forwarded to data proxy when RBAC enabled.\n- Update to 9.0.7\n CloudMonitoring: Remove link setting for SLO queries.\n GrafanaUI: Render PageToolbar\u0027s leftItems regardless of\n title\u0027s presence.\n- Update to 9.0.6\n Access Control: Allow org admins to invite new users to\n their organization.\n Grafana/toolkit: Fix incorrect image and font generation\n for plugin builds.\n Prometheus: Fix adding of multiple values for regex operator.\n UI/Card: Fix card items always having pointer cursor.\n- Update to 9.0.5\n Access control: Show dashboard settings to users who can\n edit dashboard.\n Alerting: Allow the webhook notifier to support a custom\n Authorization header.\n Plugins: Add signature wildcard globbing for dedicated\n private plugin type.\n Prometheus: Don\u0027t show errors from unsuccessful API\n checks like rules or exemplar checks.\n Access control: Allow organisation admins to add existing\n users to org.\n Alerting: Fix alert panel instance-based rules filtering.\n Apps: Fixes navigation between different app plugin pages.\n Cloudwatch: Upgrade grafana-aws-sdk to fix auth issue\n with secret keys.\n Loki: Fix `show context` not working in some occasions.\n RBAC: Fix permissions on dashboards and folders created\n by anonymous users.\n- Update to 9.0.4\n Browse/Search: Make browser back work properly when\n visiting Browse or search.\n Logs: Improve getLogRowContext API.\n Loki: Improve handling of empty responses.\n Plugins: Always validate root URL if specified in\n signature manfiest.\n Preferences: Get home dashboard from teams.\n SQLStore: Support Upserting multiple rows.\n Traces: Add more template variables in Tempo \u0026 Zipkin.\n Traces: Remove serviceMap feature flag.\n Access Control: Fix missing folder permissions.\n Access control: Fix org user removal for OSS users.\n Alerting: Fix Slack notifications.\n Alerting: Preserve new-lines from custom email templates\n in rendered email.\n Log: Fix text logging for unsupported types.\n Loki: Fix incorrect TopK value type in query builder.\n- Update to 9.0.3\n Access Control: Allow dashboard admins to query org users.\n Alerting: Add method to provisioning API for obtaining a\n group and its rules.\n Alerting: Allow filtering of contact points by name.\n Alerting: Disable /api/admin/pause-all-alerts with\n Unified Alerting.\n Annotations: Use point marker for short time range annotations.\n AzureMonitor: Update UI to experimental package.\n AzureMonitor: Update resource and namespace metadata.\n CloudWatch: Remove simplejson in favor of \u0027encoding/json\u0027.\n DashboardRow: Collapse shortcut prevent to move the\n collapsed rows.\n Navigation: Highlight active nav item when Grafana is\n served from subpath.\n Plugins: InfluxDB datasource - set epoch query param\n value as \u0027ms\u0027.\n Plugins: InfluxDB update time range query.\n StateTimeline: Try to sort time field.\n API: Do not validate/save legacy alerts when saving a\n dashboard if legacy alerting is disabled.\n Alerting: Add method to reset notification policy tree\n back to the default.\n Alerting: Fix Teams notifier not failing on 200 response\n with error.\n Alerting: Fix bug where state did not change between\n Alerting and Error.\n Alerting: Fix consistency errors in OpenAPI documentation.\n Alerting: Fix normalization of alert states for panel\n Alerting: Provisioning API respects global rule quota.\n CSRF: Fix additional headers option.\n Chore: Bump parse-url to 6.0.2 to fix security vulnerabilities.\n Chore: Fix CVE-2020-7753.\n Chore: Fix CVE-2021-3807.\n Chore: Fix CVE-2021-3918.\n Chore: Fix CVE-2021-43138.\n Chore: Fix CVE-2022-0155.\n Dashboard: Fixes tooltip issue with TimePicker and Setting buttons.\n Dashboard: Prevent unnecessary scrollbar when viewing\n single panel.\n Logs: Fixed wrapping log lines from detected fields.\n Loki: Add missing operators in label filter expression.\n Loki: Fix error when changing operations with different parameters.\n Loki: Fix suggesting of correct operations in query builder.\n Plugins: InfluxDB variable interpolation fix for\n influxdbBackendMigration feature flag.\n SQLstore: Fix fetching an inexistent playlist.\n Security: Fixes for CVE-2022-31107 and CVE-2022-31097.\n Snapshots: Fix deleting external snapshots when using RBAC.\n Table: Fix scrollbar being hidden by pagination.\n Templating: Changing between variables with the same name\n now correctly triggers a dashboard refresh.\n Time series panel: Fix an issue with stacks being not complete\n due to the incorrect data frame length.\n- Update to 9.0.2\n Alerting: Add support for images in Pushover alerts.\n Alerting: Don\u0027t stop the migration when alert rule tags\n are invalid.\n Alerting: Skip the default data source if incompatible.\n AzureMonitor: Parse non-fatal errors for Logs.\n OAuth: Restore debug log behavior.\n Plugins: Improved handling of symlinks.\n Alerting: Code-gen parsing of URL parameters and fix\n related bugs.\n Annotations: Fix annotation autocomplete causing panels\n to crash.\n Barchart: Fix warning not showing.\n CloudWatch: Enable custom session duration in AWS plugin auth.\n Dashboards: Fixes issue with the initial panel layout\n counting as an unsaved change.\n Plugins: Use a Grafana specific SDK logger implementation\n for core plugins.\n Search: Fix pagination in the new search page.\n- Update to 9.0.1\n Alerting: Add support for image annotation in\n Alertmanager alerts.\n Alerting: Add support for images in SensuGo alerts.\n Alerting: Add support for images in Threema alerts.\n Alerting: Adds Mimir to Alertmanager data source implementation.\n Alerting: Invalid setting of enabled for unified alerting\n should return error.\n AzureMonitor: Clean namespace when changing the resource.\n AzureMonitor: Update supported namespaces and filter\n resources by the right type.\n CLI: Allow relative symlinks in zip archives when\n installing plugins.\n Dashboard: Don\u0027t show unsaved changes modal for automatic\n schema changes.\n Dashboard: Unsaved changes warning should not trigger\n when only pluginVersion has changed.\n Expression: Execute hidden expressions.\n Geomap: Support showing tooltip content on click (not\n just hover).\n Heatmap: Remove alpha flag from new heatmap panel.\n Instrumentation: Define handlers for requests that are\n not handled with named handlers.\n Log Panel: Improve log row hover contrast and visibility.\n Logs: Handle backend-mode errors in histogram.\n Loki: Do not show histogram for instant queries.\n Loki: Handle data source configs with path in the url.\n Loki: Handle invalid query type values.\n OAuth: Redirect to login if no oauth module is found or\n if module is not configured.\n OptionsUI: Move internal options editors out of @grafana/ui.\n Prometheus: Don\u0027t show undefined for step in collapsed\n options in query editor when value is \u0027auto\u0027.\n Prometheus: Show query patterns in all editor modes for\n Prometheus and Loki.\n Tempo: Add link to Tempo Search with node service selected.\n Time Series Panel: Add Null Filling and \u0027No Value\u0027 Support.\n TimeSeries: Add an option to set legend width.\n Timeseries: Improve cursor Y sync behavior.\n Traces: Do not use red in span colors as this looks like\n an error.\n Alerting: Fix AM config overwrite when SQLite db is\n locked during sync.\n Alerting: Fix alert instances filtering for prom rules.\n Alerting: Fix alert rule page crashing when datasource\n contained URL unsafe characters.\n Alerting: Fix automatically select newly created folder option.\n Alerting: Fix removal of notification policy without\n labels matchers.\n CloudWatch: Allow hidden queries to be executed in case\n an ID is provided.\n Dashboard: Prevent non-repeating panels being dropped\n from repeated rows when collapsed/expanded.\n Dashboards: Fix folder picker not showing correct results\n when typing too fast.\n Datasource: Prevent panic when proxying for non-existing\n data source.\n Explore: Fix log context scroll to bottom.\n Explore: Revert \u0027Remove support for compact format URLs\u0027.\n Expressions: Fixes dashboard schema migration issue that casued\n Expression datasource to be set on panel level.\n Formatting: Fixes valueFormats for a value of 0.\n GrafanaData: Fix week start for non-English browsers.\n LibraryPanel: Resizing a library panel to 6x3 no longer\n crashes the dashboard on startup.\n LogRow: Fix placement of icon.\n Loki: Fix bug in labels framing.\n Loki: Fix issues with using query patterns.\n Loki: Fix showing of duplicated label values in dropdown\n in query builder.\n MSSQL: Fix ParseFloat error.\n Panels: Fixes issue with showing \u0027Cannot visualize data\u0027\n when query returned 0 rows.\n Playlists: Disable Create Playlist buttons for users with\n viewer role.\n Plugins: Fix typo in plugin data frames documentation.\n Prometheus: Fix body not being included in resource calls\n if they are POST.\n RolePicker: Fix submenu position on horizontal space overflow.\n Tracing: Fix trace links in traces panel.\n Support for compact Explore URLs is deprecated and will be\n removed in a future release. Until then, when navigating to\n Explore using the deprecated format the URLs are\n automatically converted. If you have existing links pointing\n to Explore update them using the format generated by Explore\n upon navigation. You can identify a compact URL by its\n format. Compact URLs have the left (and optionally right) url\n parameter as an array of strings, for example\n `\u0026left=[\u0027now-1h\u0027,\u0027now\u0027...]`. The standard explore URLs follow\n a key/value pattern, for example\n `\u0026left={\u0027datasource\u0027:\u0027test\u0027...}`. Please be sure to check\n your dashboards for any hardcoded links to Explore and update\n them to the standard URL pattern.\n- Update to 9.0.0\n API: Add GET /api/annotations/:annotationId endpoint.\n API: Add endpoint for updating a data source by its UID.\n AccessControl: Add enterprise only setting for rbac\n permission cache.\n AccessControl: Document basic roles changes and provisioning V2.\n AccessControl: Enable RBAC by default.\n AddDataSourceConfig: Remove deprecated checkHealth prop.\n Alerting: Add Image URLs to Microsoft Teams notifier.\n Alerting: Add RBAC actions and role for provisioning API routes.\n Alerting: Add Screenshot URLs to Pagerduty Notifier.\n Alerting: Add a \u0027Reason\u0027 to Alert Instances to show\n underlying cause of state.\n Alerting: Add a general screenshot service and\n alerting-specific image service.\n Alerting: Add image url or file attachment to email\n notifications.\n Alerting: Add image_urls to OpsGenie notification details.\n Alerting: Add notification policy flow chart.\n Alerting: Attach image URL to alerts in Webhook notifier format.\n Alerting: Attach image URLs or upload files to Discord\n Alerting: Attach image URLs to Google Chat notifications.\n Alerting: Attach screenshot data to Unified Alerting\n Alerting: Create folder for alerting when start from the\n scratch.\n Alerting: Modify alertmanager endpoints for proxying\n using the datasource UID.\n Alerting: Modify endpoint for testing a datasource rule\n using the UID.\n Alerting: Modify prometheus endpoints for proxying using\n the datasource UID.\n Alerting: State Manager takes screenshots.\n Alerting: Use UID scope for folders authorization.\n Alerting: modify ruler endpoints for proxying using the\n datasource UID.\n Angular: Adds back two angular directives that are still\n used by remaining angular bits and plugins.\n Azure Monitor: Add Resource Picker to Metrics Queries.\n Azure Monitor: Add search feature to resource picker.\n AzureMonitor: Add support for selecting multiple options when\n using the equals and not equals dimension filters.\n AzureMonitor: Remove deprecated code.\n Build: Change names to PascalCase to match.\n Chore: Remove deprecated DataSourceAPI methods.\n Chore: Upgrade typescript to 4.6.4.\n Cloud Monitoring: Use new annotation API.\n CloudMonitoring: Allow to set a custom value or disable\n graph_period.\n CloudWatch: Add generic filter component to variable editor.\n CloudWatch: Added missing AWS/AppRunner metrics.\n CloudWatch: Enable support for dynamic labels with\n migrated alias patterns.\n Cloudwatch: Pass label in deep link.\n Cloudwatch: Use new annotation API.\n Dashboard: Validate dashboards against schema on save.\n DashboardPickerByID: Add option to exclude dashboards.\n DashboardPickerById: Add optionLabel prop.\n Dashboards: Display values of 0 with the configured\n decimal places.\n Data: Remove deprecated types and functions from valueMappings.\n Elasticsearch: Remove browser access mode.\n Elasticsearch: Remove support for versions after their\n end of the life (\u003c7.10.0).\n Encryption: Add support for multiple data keys per day.\n Encryption: Enable envelope encryption by default.\n Explore: Remove support for legacy, compact format URLs.\n Explore: Skip Angular error handling when Angular support\n is disabled.\n Explore: simplify support for multiple query editors.\n FeatureToggles: Support changing feature toggles with URL\n parameters.\n FileUpload: Make component accessible by keyboard navigation.\n Formatting: Make SI number formats more robust.\n Graph: Deprecate Graph (old) and make it no longer a\n visualization option for new panels.\n IconButton: IconButtons are now correctly aligned in Safari.\n Logger: Enable new logging format by default.\n Loki: Add more query patterns.\n Loki: Enable new visual query builder by default.\n Loki: use the same dataframe-format for both live and\n normal queries.\n OAuth: Make allowed email domain case insensitive.\n Panels: Use the No value option when showing the no data\n message.\n Plugins: Remove plugin list panel.\n Query History: Enable new query history by default.\n QueryEditorRow: Show query errors next to query in a\n consistent way across Grafana.\n SAML: Implement Name Templates for\n assertion_attribute_name option.\n Service accounts: Do not display service accounts\n assigned to team.\n Settings: Use Grafana Azure SDK to pass Azure env vars\n for external plugins.\n Shortcuts: Add shortcut to show shortcuts to the list of\n shortcuts.\n Traces Panel: Add new Traces Panel visualization.\n Traces: Filter by service/span name and operation in\n Tempo and Jaeger.\n Transformations: Allow more complex regex expressions\n in `Rename by regex`.\n grafana/ui: Add default type=\u0027button\u0027 to \u003cButton\u003e.\n Alerting: Fix database unavailable removes rules from scheduler.\n AzureMonitor: Fix auto-selection of time-grain for metrics.\n DataSources: Fixes issue with expressions not being queried.\n GraphNG: Fix thresholds by color not following data update.\n Jaeger: Update operations dropdown.\n Login: Fix mismatching label on auth_module in user list.\n Playlists: Save button now correctly creates a new playlist.\n RBAC: Fix migrations running in the wrong order causing\n inheritance problem in enterprise.\n ServiceAccounts: Add identifiable token prefix to service\n account tokens.\n Traces: Fix missing CopyButton on KeyValueTables and\n overlapping of panels.\n `setExploreQueryField`, `setExploreMetricsQueryField` and\n `setExploreLogsQueryField` are now deprecated and will be\n removed in a future release. If you need to set a different\n query editor for Explore, conditionally render based on\n `props.app` in your regular query editor.\n Chore: Remove react-testing-lib from bundles.\n Select: Portal menu by default.\n The `@grafana/ui` package helper function\n `selectOptionInTest` used in frontend tests has been removed\n as it caused testing libraries to be bundled in the\n production code of Grafana. If you were using this helper\n function in your tests please update your code accordingly:\n ```js\n // before\n import { selectOptionInTest } from \u0027@grafana/ui\u0027;\n // ...test usage\n await selectOptionInTest(selectEl, \u0027Option 2\u0027);\n // after\n import { select } from \u0027react-select-event\u0027;\n await select(selectEl, \u0027Option 2\u0027,\n { container: document.body });\n ```\n Removed deprecated `checkHealth` prop from the `@grafana/e2e`\n `addDataSource` config. Previously this value defaulted to\n `false`, and has not been used in end-to-end tests since\n Grafana 8.0.3.\n Removes the deprecated `LegacyBaseMap`, `LegacyValueMapping`,\n `LegacyValueMap`, and `LegacyRangeMap` types, and\n `getMappedValue` function from grafana-data. Migration is as\n follows:\n | Old | New |\n | -------------------- | ----------------------- |\n | `LegacyBaseMap` | `MappingType` |\n | `LegacyValueMapping` | `ValueMapping` |\n | `LegacyValueMap` | `ValueMap` |\n | `LegacyRangeMap` | `RangeMap` |\n | `getMappedValue` | `getValueMappingResult` |\n This change fixes a bug in Grafana where intermittent failure\n of database, network between Grafana and the database, or\n error in querying the database would cause all alert rules to\n be unscheduled in Grafana. Following this change scheduled\n alert rules are not updated unless the query is successful.\n The `get_alert_rules_duration_seconds` metric has been\n renamed to `schedule_query_alert_rules_duration_seconds`.\n Any secret (data sources credential, alert manager\n credential, etc, etc) created or modified with Grafana v9.0\n won\u0027t be decryptable from any previous version (by default)\n because the way encrypted secrets are stored into the\n database has changed. Although secrets created or modified\n with previous versions will still be decryptable by Grafana\n v9.0.\n If required, although generally discouraged, the\n `disableEnvelopeEncryption` feature toggle can be enabled to\n keep envelope encryption disabled once updating to Grafana\n In case of need to rollback to an earlier version of Grafana\n (i.e. Grafana v8.x) for any reason, after being created or\n modified any secret with Grafana v9.0, the\n `envelopeEncryption` feature toggle will need to be enabled\n to keep backwards compatibility (only from `v8.3.x` a bit\n unstable, from `8.5.x` stable).\n As a final attempt to deal with issues related with the\n aforementioned situations, the `grafana-cli admin\n secrets-migration rollback` command has been designed to\n move back all the Grafana secrets encrypted with envelope\n encryption to legacy encryption. So, after running that\n command it should be safe to disable envelope encryption\n and/or roll back to a previous version of Grafana.\n Alternatively or complementarily to all the points above,\n backing up the Grafana database before updating could be a\n good idea to prevent disasters (although the risk of getting\n some secrets corrupted only applies to those updates/created\n with after updating to Grafana v9.0).\n According to the dynamic labels documentation, you can use up\n to five dynamic values per label. There\u2019s currently no such\n restriction in the alias pattern system, so if more than 5\n patterns are being used the GetMetricData API will return an\n error.\n Dynamic labels only allow \\${LABEL} to be used once per\n query. There\u2019s no such restriction in the alias pattern\n system, so in case more than 1 is being used the\n GetMetricData API will return an error.\n When no alias is provided by the user, Grafana will no longer\n fallback with custom rules for naming the legend.\n In case a search expression is being used and no data is\n returned, Grafana will no longer expand dimension values, for\n instance when using a multi-valued template variable or star\n wildcard `*` in the dimension value field.\n Time series might be displayed in a different order. Using\n for example the dynamic label `${PROP(\u0027MetricName\u0027)}`, might\n have the consequence that the time series are returned in a\n different order compared to when the alias pattern\n `{{metric}}` is used\n In Elasticsearch, browser access mode was deprecated in\n grafana 7.4.0 and removed in 9.0.0. If you used this mode,\n please switch to server access mode on the datasource\n configuration page.\n Environment variables passed from Grafana to external Azure\n plugins have been renamed:\n `AZURE_CLOUD` renamed to `GFAZPL_AZURE_CLOUD`\n `AZURE_MANAGED_IDENTITY_ENABLED` renamed to\n `GFAZPL_MANAGED_IDENTITY_ENABLED`\n `AZURE_MANAGED_IDENTITY_CLIENT_ID` renamed to\n `GFAZPL_MANAGED_IDENTITY_CLIENT_ID`\n There are no known plugins which were relying on these\n variables. Moving forward plugins should read Azure settings\n only via Grafana Azure SDK which properly handles old and new\n environment variables.\n Removes support for for ElasticSearch versions after their\n end-of-life, currently versions \u003c 7.10.0. To continue to use\n ElasticSearch data source, upgrade ElasticSearch to version\n 7.10.0+.\n Application Insights and Insight Analytics queries in Azure\n Monitor were deprecated in Grafana 8.0 and finally removed in\n 9.0. Deprecated queries will no longer be executed.\n grafana/ui: Button now specifies a default type=\u0027button\u0027\n The `Button` component provided by @grafana/ui now specifies\n a default `type=\u0027button\u0027` when no type is provided.\n In previous versions, if the attribute was not specified for\n buttons associated with a `\u003cform\u003e` the default value was\n `submit` per the specification. You can preserve the old\n behavior by explicitly setting the type attribute:\n `\u003cButton type=\u0027submit\u0027 /\u003e`\n The `Rename by regex` transformation has been improved to\n allow global patterns of the form `/\u003cstringToReplace\u003e/g`.\n Depending on the regex match used, this may cause some\n transformations to behave slightly differently. You can\n guarantee the same behaviour as before by wrapping the\n `match` string in forward slashes (`/`), e.g. `(.*)` would\n become `/(.*)/`\n `\u003cSelect /\u003e` menus will now portal to the document body by\n default. This is to give more consistent behaviour when\n positioning and overlaying. If you were setting\n `menuShouldPortal={true}` before you can safely remove that\n prop and behaviour will be the same. If you weren\u0027t\n explicitly setting that prop, there should be no visible\n changes in behaviour but your tests may need updating. If you\n were setting `menuShouldPortal={false}` this will continue to\n prevent the menu from portalling.\n Grafana alerting endpoint prefixed with `api/v1/rule/test`\n that tests a rule against a Corte/Loki data source now\n expects the data source UID as a path parameter instead of\n the data source numeric identifier.\n Grafana alerting endpoints prefixed with `api/prometheus/`\n that proxy requests to a Cortex/Loki data source now expect\n the data source UID as a path parameter instead of the data\n source numeric identifier.\n Grafana alerting endpoints prefixed with `api/ruler/` that\n proxy requests to a Cortex/Loki data source now expect the\n data source UID as a path parameter instead of the data\n Grafana alerting endpoints prefixed with `api/alertmanager/`\n that proxy requests to an Alertmanager now expect the data\n source UID as a path parameter instead of the data source\n numeric identifier.\n The format of log messages have been updated, `lvl` is now\n `level` and `eror`and `dbug` has been replaced with `error`\n and `debug`. The precision of timestamps has been increased.\n To smooth the transition, it is possible to opt-out of the\n new log format by enabling the feature toggle `oldlog`.\n This option will be removed in a future minor release.\n In the Loki data source, the dataframe format used to\n represent Loki logs-data has been changed to a more efficient\n format. The query-result is represented by a single dataframe\n with a \u0027labels\u0027 column, instead of the separate dataframes\n for every labels-value. When displaying such data in explore,\n or in a logs-panel in the dashboard will continue to work\n without changes, but if the data was loaded into a different\n dashboard-panel, or Transforms were used, adjustments may be\n necessary. For example, if you used the \u0027labels to fields\u0027\n transformation with the logs data, please switch to the\n \u0027extract fields\u0027 transformation.\n- Update to version 8.5.22:\n * Fix XSS in Graphite functions tooltip\n (bsc#1209645, CVE-2023-1410)\n- Update to version 8.5.21:\n * Apply attribute sanitation to GeomapPanel\n (bsc#1208821, CVE-2023-0507)\n * Avoid storing XSS in TraceView panel\n (bsc#1208819, CVE-2023-0594)\n * Login: Fix panic when UpsertUser is called without ReqContext \n- Fix basic authentication bypass by updating the exporter toolkit\n to version 0.7.3 (bsc#1208065, CVE-2022-46146).\n- Require Go 1.19 or newer (bsc#1208293, CVE-2022-41723)\n- Update to version 8.5.20:\n * Security: SVG: Add dompurify preprocessor step\n (bsc#1207749, CVE-2022-23552)\n * Security: Snapshots: Fix originalUrl spoof security issue\n (bsc#1207750, CVE-2022-39324)\n * Security: Omit error from http response \n * Bug fix: Email and username trimming and invitation validation\n- Update to version 8.5.15 (jsc#PED-2617):\n * Security: Fix for privilege escalation\n (bsc#1205225, CVE-2022-39306)\n * Security: Omit error from http response when user does not\n exists (bsc#1205227, CVE-2022-39307)\n- Update to version 8.5.14:\n * Security: Fix do not forward login cookie in outgoing requests\n (bsc#1204303, CVE-2022-39201)\n * Security: Make proxy endpoints not leak sensitive HTTP headers\n (bsc#1204305, CVE-2022-31130)\n * Security: Fix plugin signature bypass (bsc#1204302, CVE-2022-31123)\n * Security: Fix blocknig other users from signing in (bsc#1204304,\n CVE-2022-39229)\n- Update to version 8.5.13 (jsc#PED-2145):\n + Features and enhancements:\n * Plugins: Expose emotion/react to plugins to prevent load\n failures\n + Bug fix:\n * AuthNZ: Security fixes for (bsc#1203596, CVE-2022-36062) and\n (bsc#1203597, CVE-2022-35957)\n- Update to version 8.5.11:\n * Rendering: Add support for renderer token\n * Alerting: AlertingProxy to elevate permissions for request\n forwarded to data proxy when RBAC enabled\n- Update to version 8.5.10\n + Bug fixes (8.5.10):\n * RBAC: Fix Anonymous Editors missing dashboard controls.\n #52649, @gamab\n + Bug fixes (8.5.9):\n * Security: Fixes for CVE-2022-31107 and CVE-2022-31097.\n #52238, @xlson\n + Bug fixes (8.5.6):\n * Dashboard: Fixes random scrolling on time range change.\n #50379, @torkelo\n * Security: Fixes minor code scanning security warnings in old\n vendored javascript libs. #50382, @torkelo\n + Features and enhancements (8.5.5):\n * Azure Monitor: Include datasource ref when interpolating\n variables. #49543, @kevinwcyu\n * CloudWatch: Add multi-value template variable support for log\n group names in logs query builder. #49737, @kevinwcyu\n * Cloudwatch: Add template variable query function for listing\n log groups. #50100, @yaelleC\n + Bug fixes (8.5.5):\n * Alerting: Do not overwrite existing alert rule condition.\n #49920, @gillesdemey\n * Alerting: Remove double quotes from matchers. #50044,\n @alexweav\n + Features and enhancements (8.5.4):\n * Alerting: Remove disabled flag for data source when migrating\n alerts. #48559, @yuri-tceretian\n * Alerting: Show notification tab of legacy alerting only to\n editor. #49624, @yuri-tceretian\n * Alerting: Update migration to migrate only alerts that belong\n to existing org\\dashboard. #49192, @yuri-tceretian\n * AzureMonitor: Do not quote variables when a custom \u0027All\u0027\n variable option is used. #49428, @andresmgot\n * AzureMonitor: Update allowed namespaces. #48468,\n @jcolladokuri\n * CloudMonitor: Correctly encode default project response.\n #49510, @aangelisc\n * Cloudwatch: Add support for new AWS/RDS EBS* metrics.\n #48798, @szymonpk\n * InfluxDB: Use backend for influxDB by default via feature\n toggle. #48453, @yesoreyeram\n * Legend: Use correct unit for percent and count calculations.\n #49004, @dprokop\n * LokI: use millisecond steps in Grafana 8.5.x. #48630, @gabor\n * Plugins: Introduce HTTP 207 Multi Status response to\n api/ds/query. #48550, @wbrowne\n * Transformations: Add an All Unique Values Reducer. #48653,\n @josiahg\n * Transformers: avoid error when the ExtractFields source field\n is missing. #49368, @wardbekker\n * [v8.5.x] Alerting: Update migration to migrate only alerts\n that belong to existing org\\dashboard. #49199, @grafanabot\n + Bug fixes (8.5.4):\n * Alerting: Allow disabling override timings for notification\n policies. #48648, @gillesdemey\n * Alerting: Allow serving images from custom url path. #49022,\n @gillesdemey\n * Alerting: Apply Custom Headers to datasource queries. #47860,\n @joeblubaugh\n * Alerting: Fix RBAC actions for notification policies. #49185,\n @yuri-tceretian\n * Alerting: Fix access to alerts for viewer with editor\n permissions when RBAC is disabled. #49270, @yuri-tceretian\n * Alerting: Fix anonymous access to alerting. #49203,\n * Alerting: correctly show all alerts in a folder. #48684,\n * AzureMonitor: Fixes metric definition for Azure Storage\n queue/file/blob/table resources. #49101, @aangelisc\n * Dashboard: Fix dashboard update permission check. #48746,\n @IevaVasiljeva\n * DashboardExport: Fix exporting and importing dashboards where\n query data source ended up as incorrect. #48410, @torkelo\n * FileUpload: clicking the Upload file button now opens their\n modal correctly. #48766, @ashharrison90\n * GrafanaUI: Fix color of links in error Tooltips in light\n theme. #49327, @joshhunt\n * LibraryPanels: Fix library panels not connecting properly in\n imported dashboards. #49161, @joshhunt\n * Loki: Improve unpack parser handling. #49074, @gabor\n * RolePicker: Fix menu position on smaller screens. #48429,\n @Clarity-89\n * TimeRange: Fixes updating time range from url and browser\n history. #48657, @torkelo\n * TimeSeries: Fix detection \u0026 rendering of sparse datapoints.\n #48841, @leeoniya\n * Timeseries: Fix outside range stale state. #49633, @ryantxu\n * Tooltip: Fix links not legible in Tooltips when using light\n theme. #48748, @joshhunt\n * Tooltip: Sort decimals using standard numeric compare.\n #49084, @dprokop\n * Transforms: Labels to fields, fix label picker layout.\n #49304, @torkelo\n * Variables: Fixes issue with data source variables not\n updating queries with variable. #49478, @torkelo\n * [v8.5.x] Alerting: Fix RBAC actions for notification policies\n (#49185). #49348, @yuri-tceretian\n * [v8.5.x] Alerting: Fix access to alerts for viewer with\n editor permissions when RBAC is disabled. #49427, @konrad147\n * [v8.5.x] Alerting: Fix anonymous access to alerting. #49268,\n + Breaking changes (8.5.4):\n For a data source query made via /api/ds/query:\n If the DatasourceQueryMultiStatus feature is enabled and\n The data source response has an error set as part of the\n DataResponse, the resulting HTTP status code is now 207\n Multi Status instead of 400 Bad gateway\n If the DatasourceQueryMultiStatus feature is not enabled and\n DataResponse, the resulting HTTP status code is 400 Bad\n Request (no breaking change)\n --\u003e Issue #48550\n + Bug fixes (8.5.3):\n * Security: fixes CVE-2022-29170. #49240, @xlson\n + Features and enhancements (8.5.2):\n * Alerting: Add safeguard for migrations that might cause\n dataloss. #48526, @JohnnyQQQQ\n * AzureMonitor: Add support for not equals and startsWith\n operators when creating Azure Metrics dimension filters.\n #48077, @aangelisc\n * Elasticsearch: Add deprecation notice for \u003c 7.10 versions.\n #48506, @ivanahuckova\n * Traces: Filter by service/span name and operation in Tempo\n and Jaeger. #48209, @joey-grafana\n + Bug fixes (8.5.2):\n * AzureAd Oauth: Fix strictMode to reject users without an\n assigned role. #48474, @kyschouv\n * CloudWatch: Fix variable query tag migration. #48587, @iwysiu\n * Plugins: Ensure catching all appropriate 4xx api/ds/query\n scenarios. #47565, @wbrowne\n + Bug fixes (8.5.1):\n * Azure Monitor: Fix space character encoding for metrics query\n link to Azure Portal. #48139, @kevinwcyu\n * CloudWatch: Prevent log groups from being removed on query\n change. #47994, @asimpson\n * Cloudwatch: Fix template variables in variable queries.\n #48140, @iwysiu\n * Explore: Prevent direct access to explore if disabled via\n feature toggle. #47714, @Elfo404\n * InfluxDB: Fixes invalid no data alerts. #48295, @yesoreyeram\n * Navigation: Prevent navbar briefly showing on login. #47968,\n @ashharrison90\n * Plugins Catalog: Fix styling of hyperlinks. #48196, @marefr\n * Table: Fix filter crashes table. #48258, @zoltanbedi\n * TimeSeries: Properly stack series with missing datapoints.\n #48321, @leeoniya\n + Features and enhancements (8.5.0):\n * Alerting: Add contact points provisioning API. #47197,\n @JohnnyQQQQ\n * Alerting: Add resolved count to notification title when both\n firing and resolved present. #46697, @JacobsonMT\n * Alerting: Alert rule should wait For duration when execution\n error state is Alerting. #47052, @grobinson-grafana\n * Alerting: Classic conditions can now display multiple values.\n #46971, @gotjosh\n * Alerting: Display query from grafana-managed alert rules on\n /api/v1/rules. #45969, @gotjosh\n * Alerting: Enhance support for arbitrary group names in\n managed alerts. #47785, @gillesdemey\n * Alerting: add field for custom slack endpoint. #45751,\n @nathanrodman\n * Azure Monitor : Adding json formatting of error messages in\n Panel Header Corner and Inspect Error Tab. #44877, @yaelleC\n * Azure Monitor: Add 2 more Curated Dashboards for VM Insights.\n #45187, @jcolladokuri\n * CloudWatch: Handle new error codes for MetricInsights.\n #47033, @Gabrielopesantos\n * Dashboards: show changes in save dialog. #46557, @ryantxu\n * DataSource: Default data source is no longer a persisted\n state but just the default data source for new panels.\n #45132, @torkelo\n * DataSourcePlugin API: Allow queries import when changing data\n source type. #47435, @dprokop\n * Explore: Remove return to panel button. #45018, @gelicia\n * Explore: allow users to save Explore state to a new panel in\n a new dashboard. #45148, @Elfo404\n * Instrumentation: Proxy status code correction and various\n improvements. #47473, @marefr\n * Logging: Introduce feature toggle to activate gokit/log\n format. #47336, @ying-jeanne\n * NewsPanel: Add support for Atom feeds. #45390, @kaydelaney\n * Plugins: Add deprecation notice for /api/tsdb/query endpoint.\n #45238, @wbrowne\n * Plugins: Adding support for traceID field to accept\n variables. #45559, @vinisdl\n * PostgreSQL: __unixEpochGroup to support arithmetic expression\n as argument. #46764, @s0nik42\n * Profile/Help: Expose option to disable profile section and\n help menu. #46308, @cameronwaterman\n * Prometheus: Enable new visual query builder by default.\n #46634, @torkelo\n * SAML: Allow disabling of SAML signups. #47481, @mmandrus\n * SAML: Allow disabling of SAML signups. (Enterprise)\n * Table: New pagination option. #45732, @zoltanbedi\n * TablePanel: Add cell inspect option. #45620, @dprokop\n * Tempo / Trace Viewer: Support Span Links in Trace Viewer.\n #45632, @Shachi16\n * Tempo: Download span references in data inspector. #47074,\n @connorlindsey\n * Tempo: Separate trace to logs and loki search datasource\n config. #46655, @connorlindsey\n * Trace View: Show number of child spans. #44393, @tharun208\n * Transformations: Support escaped characters in key-value pair\n parsing. #47901, @aangelisc\n + Bug fixes (8.5.0):\n * Azure Monitor: Bug Fix for incorrect variable cascading for\n template variables. #47478, @jcolladokuri\n * CloudWatch: List all metrics properly in SQL autocomplete.\n #45898, @sunker\n * CloudWatch: Run query on blur in logs query field. #47454,\n @fridgepoet\n * Dashboard: Template variables are now correctly persisted\n when clicking breadcrumb links. #46790, @ashharrison90\n * DashboardPage: Remember scroll position when coming back\n panel edit / view panel. #47639, @torkelo\n * Panel Edit: Options search now works correctly when a\n logarithmic scale option is set. #47927, @ashharrison90\n * Postgres: Return tables with hyphenated schemes. #45754,\n @zuchka\n * Table panel: Fix horizontal scrolling when pagination is\n enabled. #47776, @dprokop\n * Variables: Ensure variables in query params are correctly\n recognised. #47049, @ashharrison90\n * Variables: Fix crash when changing query variable datasource.\n #44957, @joshhunt\n * Visualizations: Stack negative-valued series downwards.\n #47373, @leeoniya\n + Breaking changes (8.5.0):\n For a proxied request, e.g. Grafana\u0027s datasource or plugin\n proxy: If the request is cancelled, e.g. from the browser/by\n the client, the HTTP status code is now 499 Client closed\n request instead of 502 Bad gateway If the request times out,\n e.g. takes longer time than allowed, the HTTP status code is\n now 504 Gateway timeout instead of 502 Bad gateway. Issue\n #47473 The change in behavior is that negative-valued series\n are now stacked downwards from 0 (in their own stacks), rather\n than downwards from the top of the positive stacks. We now\n automatically group stacks by Draw style, Line interpolation,\n and Bar alignment, making it impossible to stack bars on top of\n lines, or smooth lines on top of stepped lines. Issue #47373\n The meaning of the default data source has now changed from\n being a persisted property in a panel. Before when you selected\n the default data source for a panel and later changed the\n default data source to another data source it would change all\n panels who were configured to use the default data source. From\n now on the default data source is just the default for new\n panels and changing the default will not impact any currently\n saved dashboards. Issue #45132 The Tooltip component provided\n by @grafana/ui is no longer automatically interactive (that is\n you can hover onto it and click a link or select text). It will\n from now on by default close automatically when you mouse out\n from the trigger element. To make tooltips behave like before\n set the new interactive property to true.\n + Deprecations (8.5.0):\n /api/tsdb/query API has been deprecated and will be removed in\n a future release. Use /api/ds/query instead. Issue #45238\n + Plugin development fixes \u0026 changes (8.5.0):\n * Card: Increase clickable area when meta items are present.\n #47935, @ashharrison90\n * Loki: Fix operator description propup from being shortened.\n #46575, @glintik\n * Tooltips: Make tooltips non interactive by default. #45053,\n @torkelo\n + Features and enhancements (8.4.7):\n * CloudWatch: Added missing MemoryDB Namespace metrics. #47290,\n @james-deee\n * Histogram Panel: Take decimal into consideration. #47330,\n @mdvictor\n * TimeSeries: Sort tooltip values based on raw values. #46738,\n @dprokop\n + Bug fixes (8.4.7):\n * API: Include userId, orgId, uname in request logging\n middleware. #47183, @marefr\n * Elasticsearch: Respect maxConcurrentShardRequests datasource\n setting. #47120, @alexandrst88\n + Features and enhancements (8.4.5):\n * Instrumentation: Make backend plugin metrics endpoints\n available with optional authentication. #46467, @marefr\n * Table panel: Show datalinks for cell display modes JSON View\n and Gauge derivates. #46020, @mdvictor\n + Bug fixes (8.4.5):\n * Azure Monitor: Small bug fixes for Resource Picker. #46665,\n @sarahzinger\n * Logger: Use specified format for file logger. #46970, @sakjur\n * Logs: Handle missing fields in dataframes better. #46963,\n @gabor\n * ManageDashboards: Fix error when deleting all dashboards from\n folder view. #46877, @joshhunt\n + Features and enhancements (8.4.4):\n * Loki: Add unpack to autocomplete suggestions (#44623).\n #46573, @glintik\n * Plugins: allow using both Function and Class components for\n app plugins. #46148, @leventebalogh\n * TimeSeries: Add migration for Graph panel\u0027s transform series\n override. #46577, @dprokop\n * TimeSeries: Preserve null/undefined values when performing\n negative y transform. #46584, @dprokop\n + Bug fixes (8.4.4):\n * CloudWatch: Use default http client from aws-sdk-go. #46370,\n @sunker\n * Dashboards: Fixes repeating by row and no refresh. #46565,\n * Gauge: Fixes blank viz when data link exists and orientation\n was horizontal. #46335, @torkelo\n * Search: sort results correctly when using postgres. #46466,\n @xlson\n * TagsInput: fix tags remove button accessibility issues.\n #46254, @Elfo404\n * TextPanel: Sanitize after markdown has been rendered to html.\n #46166, @ashharrison90\n + Features and enhancements (8.4.3):\n * Alerting: Grafana uses \u003e instead of \u003e= when checking the For\n duration. #46010\n * Alerting: Use expanded labels in dashboard annotations.\n #45726, @grobinson-grafana\n * Logs: Escape windows newline into single newline. #45771,\n @perosb\n + Bug fixes (8.4.3):\n * Alerting: Fix use of \u003e instead of \u003e= when checking the For\n duration. #46011, @grobinson-grafana\n * Azure Monitor: Fixes broken log queries that use workspace.\n #45820, @sunker\n * CloudWatch: Remove error message when using multi-valued\n template vars in region field. #45886, @sunker\n * Middleware: Fix IPv6 host parsing in CSRF check. #45911,\n @ying-jeanne\n + Plugin development fixes \u0026 changes (8.4.3):\n * ClipboardButton: Use a fallback when the Clipboard API is\n unavailable. #45831, @ashharrison90\n + Features and enhancements (8.4.2):\n * OAuth: Add setting to skip org assignment for external\n users. #34834, @baez90\n * Tracing: Add option to map tag names to log label names in\n trace to logs settings. #45178, @connorlindsey\n + Bug fixes (8.4.2):\n * Explore: Fix closing split pane when logs panel is\n used. #45602, @ifrost\n + Features and enhancements (8.4.1):\n * Cloudwatch: Add support for AWS/PrivateLink* metrics and\n dimensions. #45515, @szymonpk\n * Configuration: Add ability to customize okta login button\n name and icon. #44079, @DanCech\n * Tempo: Switch out Select with AsyncSelect component to get\n loading state in Tempo Search. #45110, @CatPerry\n + Bug fixes (8.4.1):\n * Alerting: Fix migrations by making send_alerts_to field\n nullable. #45572, @santihernandezc\n + Features and enhancements (8.4.0):\n * API: Extract OpenAPI specification from source code using\n go-swagger. #40528, @papagian\n * AccessControl: Disable user remove and user update roles when\n they do not have the permissions. #43429, @Jguer\n * AccessControl: Provisioning for teams. #43767, @gamab\n * API: Add usage stats preview endpoint. #43899, @Jguer\n * Alerting: Move slow queries in the scheduler to another\n goroutine. #44423, @grobinson-grafana\n * Alerting: Use time.Ticker instead of alerting.Ticker in\n ngalert. #44395, @grobinson-grafana\n * Alerting: add custom grouping to Alert Panel. #44559,\n * Analytics: Add user id tracking to google analytics.\n #42763, @autoric\n * Angular: Add AngularJS plugin support deprecation plan to\n docs site. #45149, @torkelo\n * Auth: implement auto_sign_up for auth.jwt. #43502, @sakjur\n * Azure Monitor Logs: Order subscriptions in resource picker by\n name. #45228, @sunker\n * Azure monitor Logs: Optimize data fetching in resource\n picker. #44549, @sunker\n * AzureMonitor: Filter list of resources by resourceType.\n #43522, @andresmgot\n * BarChart: color by field, x time field, bar radius, label\n skipping. #43257, @leeoniya\n * Chore: Implement OpenTelemetry in Grafana. #42674, @idafurjes\n * Cloud Monitoring: Adds metric type to Metric drop down\n options. #43268, @tw1nk\n * CloudWatch: Add Data Lifecycle Manager metrics and dimension.\n #43310, @ilyastoli\n * CloudWatch: Add Missing Elasticache Host-level metrics.\n #43455, @dhendo\n * CloudWatch: Add all ElastiCache Redis Metrics. #43336,\n @siavashs\n * CloudWatch: Add new AWS/ES metrics. #43034, @sunker\n * Cloudwatch: Add syntax highlighting and autocomplete for\n \u0027Metric Search\u0027. #43985, @sarahzinger\n * Explore: Support custom display label for exemplar links for\n Prometheus datasource. #42732, @JokerQueue\n * Hotkeys: Make time range absolute/permanent. #43802, @davkal\n * Playlists: Enable sharing direct links to playlists. #44161,\n * SQLStore: Prevent concurrent migrations. #44101, @papagian\n * SSE: Add Mode to drop NaN/Inf/Null in Reduction operations.\n #43583, @kylebrandt\n * Setting: Support configuring feature toggles with bools\n instead of just passing an array. #43326, @bergquist\n * TimeSeries: Add support for negative Y and constant\n transform. #44774, @dprokop\n * Transformations: Add \u0027JSON\u0027 field type to\n ConvertFieldTypeTransformer. #42624, @sd2k\n + Bug fixes (8.4.0):\n * Auth: Guarantee consistency of signed SigV4 headers.\n #45054, @wbrowne\n * CloudWatch: Fix MetricName resetting on Namespace change.\n #44165, @yaelleC\n * Cloudwatch : Fixed reseting metric name when changing\n namespace in Metric Query. #44612, @yaelleC\n * Explore: Avoid locking timepicker when range is inverted.\n #44790, @Elfo404\n * Instrumentation: Fix HTTP request instrumentation of\n authentication failures. #44234, @marefr\n * LibraryPanels: Prevent long descriptions and names from\n obscuring the delete button. #45190, @zuchka\n * OAuth: Fix parsing of ID token if header contains non-string\n value. #44159, @marefr\n * Panel Edit: Visualization search now works correctly with\n special characters. #45137, @ashharrison90\n * Provisioning: Fix duplicate validation when multiple\n organizations have been configured. #44151, @marefr\n * QueryField: Fix issue with undo history when suggestion is\n inserted (#28656). #39114, @glintik\n * TablePanel: Do not prefix columns with frame name if multiple\n frames and override active. #45174, @mdvictor\n + Deprecations (8.4.0):\n AngularJS plugin support is now in a deprecated state, meaning\n it will be removed in a future release. Currently, that is\n planned for version 10 (in 2023). The documentation site has an\n article with more details on why, when, and how. Issue #45149\n- Update to version 8.3.10\n + Security:\n * Fixes XSS vulnerability in the Unified Alerting\n (bsc#1201535, CVE-2022-31097)\n * Fixes OAuth account takeover vulnerability\n (bsc#1201539, CVE-2022-31107)\n- Update to version 8.3.9\n + Bug fixes:\n * Geomap: Display legend\n * Prometheus: Fix timestamp truncation\n- Update to version 8.3.7\n * Provisioning: Ensure that the default value for orgID is set\n when provisioning datasources to be deleted.\n- Update to version 8.3.6\n * Cloud Monitoring: Reduce request size when listing labels.\n * Explore: Show scalar data result in a table instead of graph.\n * Snapshots: Updates the default external snapshot server URL.\n * Table: Makes footer not overlap table content.\n * Tempo: Add request histogram to service graph datalink.\n * Tempo: Add time range to tempo search query behind a feature flag.\n * Tempo: Auto-clear results when changing query type.\n * Tempo: Display start time in search results as relative time.\n * CloudMonitoring: Fix resource labels in query editor.\n * Cursor sync: Apply the settings without saving the dashboard.\n * LibraryPanels: Fix for Error while cleaning library panels.\n * Logs Panel: Fix timestamp parsing for string dates without timezone.\n * Prometheus: Fix some of the alerting queries that use reduce/math operation.\n * TablePanel: Fix ad-hoc variables not working on default datasources.\n * Text Panel: Fix alignment of elements.\n * Variables: Fix for constant variables in self referencing links.\n- Update _constraints to require at least 5GB, because with less we\n can\u0027t build it.\n- Update to version 8.3.5 (jsc#SLE-23439, jsc#SLE-23422,\n jsc#SLE-24565)\n + Security: Fixes CVE-2021-43813 and CVE-2021-43815,\n bsc#1193686.\n + Security: Fixes CVE-2021-43798, bsc#1193492.\n + Security: Fixes CVE-2021-41244, bsc#1192763.\n + Security: Fixes CVE-2021-41174, bsc#1192383.\n fix CVE-2021-3711, bsc#1189520.\n * Security: Update dependencies to fix CVE-2021-36222,\n bsc#1188571.\n\nmgr-push:\n\n- Version 5.0.1-1\n * Bump version to 5.0.0\n- Version 4.4.6-1\n * Remove unused makefiles\n- Version 4.4.5-1\n * Use http to connect to localhost server\n * Use bundle CA certificate in rhnpush\n- Version 4.4.4-1\n * remove pylint check at build time\n- Version 4.4.3-1\n * Ensure installation of make for building\n- Version 4.4.2-1\n * Update translation strings\n- Version 4.4.1-1\n * Bump version to 4.4.0\n\nprometheus-blackbox_exporter:\n\n- Use obscpio for go modules service\n- Set version number\n- Set build date from SOURCE_DATE_EPOCH\n- Update to 0.24.0 (bsc#1212279, jsc#PED-4556)\n * Requires go1.19\n- Drop:\n- Avoid empty validation script\n- Add rc symlink for backwards compatibility\n- Fix authentication bypass via cache poisoning\n (CVE-2022-46146, bsc#1208062)\n- Add `min_version` parameter of `tls_config` to allow enabling\n TLS 1.0 and 1.1 (bsc#1209113)\n- On SUSE Linux Enterprise build always with Go \u003e= 1.19 (bsc#1203599)\n- Build with go1.18 only for SLE-15-SP3 and \n build with \u003e= go1.19 on higher SP (bsc#1203599)\n- Require go1.18 (bsc#1203599, GH#19127)\n- Exclude s390 arch\n- Fix %pre section to avoid empty content\n- Updated to allow building on older rpmbuild.\n- Enhanced to build on Enterprise Linux 8\n\nprometheus-postgres_exporter:\n\n- CVE-2022-46146: Fix authentication bypass via cache poisoning (bsc#1208060)\n- Remove duplicated call to systemd requirements\n- Do not build debug if RHEL \u003e= 8\n- Do not strip if SUSE Linux Enterprise 15 SP3\n- Build at least with with Go \u003e= 1.18 on RHEL\n- Build with Go \u003e= 1.20 elsewhere\n- Adapt the systemd service security configuration\n to be able to start it on RHEL systems and clones\n- Create the prometheus user for RHEL systems and clones\n- Fix _service to pull correct version\n- Use go_modules source service\n- Upgrade to version 0.10.1:\n * Fix broken log-level for values other than debug (bsc#1208965)\n- Version/release lines above first usage of those macros.\n gh#uyuni-project/uyuni#5418\n- Prevent empty %pre section\n- Exclude s390 builds \n- Updated for RHEL8.\n\npython-hwdata:\n\n- Declare the LICENSE file as license and not doc\n\npython-pyvmomi:\n\n- Preparing submission to SUSE:SLE-15-SP3:Update as part of ECO PED-3623.\n\nrhnlib:\n\n- Version 5.0.1-1\n * Specify a packager for Debian like distros\n- Version 4.4.6-1\n * Remove unused makefiles\n- Version 4.4.5-1\n * Use bundle CA certificate in rhnpush\n- Version 4.4.4-1\n * Only use TLSv1+ for SSL connections\n- Version 4.4.3-1\n * Ensure installation of make for building\n- Version 4.4.2-1\n * Don\u0027t get stuck at the end of SSL transfers (bsc#1204032)\n- Version 4.4.1-1\n * Bump version to 4.4.0\n\nspacecmd:\n\n- Version 5.0.1-1\n * Use localhost without ssl when running on the server\n- Version 4.4.10-1\n * Update translation strings\n- Version 4.4.9-1\n- Version 4.4.8-1\n * Add spacecmd function: cryptokey_update\n * Bypass traditional systems check on older SUMA instances (bsc#1208612)\n * fix argument parsing of distribution_update (bsc#1210458)\n- Version 4.4.7-1\n * remove pylint check at build time\n * Display activation key details after executing the corresponding command (bsc#1208719)\n * Show targetted packages before actually removing them (bsc#1207830)\n- Version 4.4.6-1\n * Fix spacecmd not showing any output for softwarechannel_diff \n and softwarechannel_errata_diff (bsc#1207352)\n- Version 4.4.5-1\n * Prevent string api parameters to be parsed as dates if not in\n ISO-8601 format (bsc#1205759)\n * Add python-dateutil dependency, required to process date values in\n spacecmd api calls\n * Remove python3-simplejson dependency\n- Version 4.4.4-1\n * Correctly understand \u0027ssm\u0027 keyword on scap scheduling\n * Add vendor_advisory information to errata_details call (bsc#1205207)\n * Change default port of \u0027Containerized Proxy configuration\u0027 8022\n- Version 4.4.3-1\n * Added two missing options to schedule product migration: allow-vendor-change\n and remove-products-without-successor (bsc#1204126)\n * Changed schedule product migration to use the correct API method\n * Fix dict_keys not supporting indexing in systems_setconfigchannelorger\n * Added a warning message for traditional stack deprecation\n * Remove \u0027Undefined return code\u0027 from debug messages (bsc#1203283)\n- Version 4.4.2-1\n * Stop always showing help for valid proxy_container_config calls\n- Version 4.4.1-1\n * Process date values in spacecmd api calls (bsc#1198903)\n * Improve Proxy FQDN hint message\n- Version 4.3.14-1\n * Fix missing argument on system_listmigrationtargets (bsc#1201003)\n * Show correct help on calling kickstart_importjson with no arguments\n * Fix tracebacks on spacecmd kickstart_export (bsc#1200591)\n * Change proxy container config default filename to end with tar.gz\n- Version 4.3.13-1\n- Version 4.3.12-1\n- Version 4.3.11-1\n * on full system update call schedulePackageUpdate API (bsc#1197507)\n\nspacewalk-client-tools:\n\n- Version 5.0.1-1\n * Bump version to 5.0.0\n- Version 4.4.7-1\n * Remove unused and deprecated/removed platform.dist import.\n- Version 4.4.6-1\n * Update translation strings\n * Tito requires to list the package source as %{name}-%{version}.tar.gz\n- Version 4.4.5-1\n * remove mgr-virtualization usage\n * remove dependency to suseRegisterInfo\n- Version 4.4.4-1\n- Version 4.4.3-1\n- Version 4.4.2-1\n- Version 4.4.1-1\n- Version 4.3.11-1\n- Version 4.3.10-1\n\nsupportutils-plugin-salt:\n\n- Update to version 1.2.2\n * Remove possible passwords from Salt configuration files (bsc#1201059)\n- Update to version 1.2.1\n * Remove ERROR messages on Salt client systems\n- Declare the LICENSE file as license and not doc\n- Update to version 1.2.0\n * Add support for Salt Bundle\n\nsupportutils-plugin-susemanager-client:\n\n- Version 5.0.1-1\n * Bump version to 5.0.0\n- Version 4.4.2-1\n * write configured crypto-policy in supportconfig\n * add cloud and payg checks\n- Version 4.4.1-1\n * Bump version to 4.4.0\n- Version 4.3.2-1\n * Add proxy containers config and logs\n\nuyuni-common-libs:\n\n- Version 5.0.1-1\n * Bump version to 5.0.0\n- Version 4.4.4-1\n * Workaround for python3-debian bug about collecting control file (bsc#1211525, bsc#1208692)\n * Accept missing rhn.conf file\n * Use context manager for apache users in fileutils.py.\n- Version 4.4.3-1\n * Ensure installation of make for building.\n * Use versioned Python during packaging.\n- Version 4.4.2-1\n * unify user notification code on java side\n- Version 4.4.1-1\n * Do not allow creating path if nonexistent user or group in fileutils.\n- Version 4.3.5-1\n * Fix reposync issue about \u0027rpm.hdr\u0027 object has no attribute \u0027get\u0027\n\nuyuni-proxy-systemd-services:\n\n- Version 5.0.1-1\n * Bump version to 5.0.0\n- Version 4.4.2-1\n * Fix script for allowing using container images from different registry paths\n * Allow using container images from different registry paths\n- Version 4.4.1-1\n * Expose /etc/sysconfig/proxy variables to container services (bsc#1202945)\n- Version 4.3.6-1\n * Expose port 80 (bsc#1200142)\n * Use volumes rather than bind mounts\n * TFTPD to listen on udp port (bsc#1200968)\n * Add TAG variable in configuration \n- Version 4.3.5-1\n * Fix containers namespaces in configuration\n- Version 4.3.4-1\n * Rename container_images_path specfile macro to less generic one\n- Version 4.3.3-1\n * Default to SUSE Manager images only when installed from SUSE Manager\n\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2024-196,SUSE-SLE-Manager-Tools-15-BETA-2024-196,SUSE-SLE-Manager-Tools-Beta-For-Micro-5-2024-196",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2024_0196-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2024:0196-1",
"url": "https://www.suse.com/support/update/announcement/2024/suse-su-20240196-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2024:0196-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-January/017743.html"
},
{
"category": "self",
"summary": "SUSE Bug 1172110",
"url": "https://bugzilla.suse.com/1172110"
},
{
"category": "self",
"summary": "SUSE Bug 1176460",
"url": "https://bugzilla.suse.com/1176460"
},
{
"category": "self",
"summary": "SUSE Bug 1180816",
"url": "https://bugzilla.suse.com/1180816"
},
{
"category": "self",
"summary": "SUSE Bug 1180942",
"url": "https://bugzilla.suse.com/1180942"
},
{
"category": "self",
"summary": "SUSE Bug 1181119",
"url": "https://bugzilla.suse.com/1181119"
},
{
"category": "self",
"summary": "SUSE Bug 1181935",
"url": "https://bugzilla.suse.com/1181935"
},
{
"category": "self",
"summary": "SUSE Bug 1183684",
"url": "https://bugzilla.suse.com/1183684"
},
{
"category": "self",
"summary": "SUSE Bug 1187725",
"url": "https://bugzilla.suse.com/1187725"
},
{
"category": "self",
"summary": "SUSE Bug 1188061",
"url": "https://bugzilla.suse.com/1188061"
},
{
"category": "self",
"summary": "SUSE Bug 1188571",
"url": "https://bugzilla.suse.com/1188571"
},
{
"category": "self",
"summary": "SUSE Bug 1189520",
"url": "https://bugzilla.suse.com/1189520"
},
{
"category": "self",
"summary": "SUSE Bug 1191454",
"url": "https://bugzilla.suse.com/1191454"
},
{
"category": "self",
"summary": "SUSE Bug 1192154",
"url": "https://bugzilla.suse.com/1192154"
},
{
"category": "self",
"summary": "SUSE Bug 1192383",
"url": "https://bugzilla.suse.com/1192383"
},
{
"category": "self",
"summary": "SUSE Bug 1192696",
"url": "https://bugzilla.suse.com/1192696"
},
{
"category": "self",
"summary": "SUSE Bug 1192763",
"url": "https://bugzilla.suse.com/1192763"
},
{
"category": "self",
"summary": "SUSE Bug 1193492",
"url": "https://bugzilla.suse.com/1193492"
},
{
"category": "self",
"summary": "SUSE Bug 1193686",
"url": "https://bugzilla.suse.com/1193686"
},
{
"category": "self",
"summary": "SUSE Bug 1193688",
"url": "https://bugzilla.suse.com/1193688"
},
{
"category": "self",
"summary": "SUSE Bug 1197507",
"url": "https://bugzilla.suse.com/1197507"
},
{
"category": "self",
"summary": "SUSE Bug 1198903",
"url": "https://bugzilla.suse.com/1198903"
},
{
"category": "self",
"summary": "SUSE Bug 1199810",
"url": "https://bugzilla.suse.com/1199810"
},
{
"category": "self",
"summary": "SUSE Bug 1200142",
"url": "https://bugzilla.suse.com/1200142"
},
{
"category": "self",
"summary": "SUSE Bug 1200480",
"url": "https://bugzilla.suse.com/1200480"
},
{
"category": "self",
"summary": "SUSE Bug 1200591",
"url": "https://bugzilla.suse.com/1200591"
},
{
"category": "self",
"summary": "SUSE Bug 1200968",
"url": "https://bugzilla.suse.com/1200968"
},
{
"category": "self",
"summary": "SUSE Bug 1200970",
"url": "https://bugzilla.suse.com/1200970"
},
{
"category": "self",
"summary": "SUSE Bug 1201003",
"url": "https://bugzilla.suse.com/1201003"
},
{
"category": "self",
"summary": "SUSE Bug 1201059",
"url": "https://bugzilla.suse.com/1201059"
},
{
"category": "self",
"summary": "SUSE Bug 1201535",
"url": "https://bugzilla.suse.com/1201535"
},
{
"category": "self",
"summary": "SUSE Bug 1201539",
"url": "https://bugzilla.suse.com/1201539"
},
{
"category": "self",
"summary": "SUSE Bug 1202614",
"url": "https://bugzilla.suse.com/1202614"
},
{
"category": "self",
"summary": "SUSE Bug 1202945",
"url": "https://bugzilla.suse.com/1202945"
},
{
"category": "self",
"summary": "SUSE Bug 1203283",
"url": "https://bugzilla.suse.com/1203283"
},
{
"category": "self",
"summary": "SUSE Bug 1203596",
"url": "https://bugzilla.suse.com/1203596"
},
{
"category": "self",
"summary": "SUSE Bug 1203597",
"url": "https://bugzilla.suse.com/1203597"
},
{
"category": "self",
"summary": "SUSE Bug 1203599",
"url": "https://bugzilla.suse.com/1203599"
},
{
"category": "self",
"summary": "SUSE Bug 1204032",
"url": "https://bugzilla.suse.com/1204032"
},
{
"category": "self",
"summary": "SUSE Bug 1204126",
"url": "https://bugzilla.suse.com/1204126"
},
{
"category": "self",
"summary": "SUSE Bug 1204302",
"url": "https://bugzilla.suse.com/1204302"
},
{
"category": "self",
"summary": "SUSE Bug 1204303",
"url": "https://bugzilla.suse.com/1204303"
},
{
"category": "self",
"summary": "SUSE Bug 1204304",
"url": "https://bugzilla.suse.com/1204304"
},
{
"category": "self",
"summary": "SUSE Bug 1204305",
"url": "https://bugzilla.suse.com/1204305"
},
{
"category": "self",
"summary": "SUSE Bug 1204501",
"url": "https://bugzilla.suse.com/1204501"
},
{
"category": "self",
"summary": "SUSE Bug 1205207",
"url": "https://bugzilla.suse.com/1205207"
},
{
"category": "self",
"summary": "SUSE Bug 1205225",
"url": "https://bugzilla.suse.com/1205225"
},
{
"category": "self",
"summary": "SUSE Bug 1205227",
"url": "https://bugzilla.suse.com/1205227"
},
{
"category": "self",
"summary": "SUSE Bug 1205599",
"url": "https://bugzilla.suse.com/1205599"
},
{
"category": "self",
"summary": "SUSE Bug 1205759",
"url": "https://bugzilla.suse.com/1205759"
},
{
"category": "self",
"summary": "SUSE Bug 1207352",
"url": "https://bugzilla.suse.com/1207352"
},
{
"category": "self",
"summary": "SUSE Bug 1207749",
"url": "https://bugzilla.suse.com/1207749"
},
{
"category": "self",
"summary": "SUSE Bug 1207750",
"url": "https://bugzilla.suse.com/1207750"
},
{
"category": "self",
"summary": "SUSE Bug 1207830",
"url": "https://bugzilla.suse.com/1207830"
},
{
"category": "self",
"summary": "SUSE Bug 1208046",
"url": "https://bugzilla.suse.com/1208046"
},
{
"category": "self",
"summary": "SUSE Bug 1208049",
"url": "https://bugzilla.suse.com/1208049"
},
{
"category": "self",
"summary": "SUSE Bug 1208060",
"url": "https://bugzilla.suse.com/1208060"
},
{
"category": "self",
"summary": "SUSE Bug 1208062",
"url": "https://bugzilla.suse.com/1208062"
},
{
"category": "self",
"summary": "SUSE Bug 1208065",
"url": "https://bugzilla.suse.com/1208065"
},
{
"category": "self",
"summary": "SUSE Bug 1208270",
"url": "https://bugzilla.suse.com/1208270"
},
{
"category": "self",
"summary": "SUSE Bug 1208293",
"url": "https://bugzilla.suse.com/1208293"
},
{
"category": "self",
"summary": "SUSE Bug 1208298",
"url": "https://bugzilla.suse.com/1208298"
},
{
"category": "self",
"summary": "SUSE Bug 1208612",
"url": "https://bugzilla.suse.com/1208612"
},
{
"category": "self",
"summary": "SUSE Bug 1208692",
"url": "https://bugzilla.suse.com/1208692"
},
{
"category": "self",
"summary": "SUSE Bug 1208719",
"url": "https://bugzilla.suse.com/1208719"
},
{
"category": "self",
"summary": "SUSE Bug 1208819",
"url": "https://bugzilla.suse.com/1208819"
},
{
"category": "self",
"summary": "SUSE Bug 1208821",
"url": "https://bugzilla.suse.com/1208821"
},
{
"category": "self",
"summary": "SUSE Bug 1208965",
"url": "https://bugzilla.suse.com/1208965"
},
{
"category": "self",
"summary": "SUSE Bug 1209113",
"url": "https://bugzilla.suse.com/1209113"
},
{
"category": "self",
"summary": "SUSE Bug 1209645",
"url": "https://bugzilla.suse.com/1209645"
},
{
"category": "self",
"summary": "SUSE Bug 1210458",
"url": "https://bugzilla.suse.com/1210458"
},
{
"category": "self",
"summary": "SUSE Bug 1210640",
"url": "https://bugzilla.suse.com/1210640"
},
{
"category": "self",
"summary": "SUSE Bug 1210907",
"url": "https://bugzilla.suse.com/1210907"
},
{
"category": "self",
"summary": "SUSE Bug 1211525",
"url": "https://bugzilla.suse.com/1211525"
},
{
"category": "self",
"summary": "SUSE Bug 1212099",
"url": "https://bugzilla.suse.com/1212099"
},
{
"category": "self",
"summary": "SUSE Bug 1212100",
"url": "https://bugzilla.suse.com/1212100"
},
{
"category": "self",
"summary": "SUSE Bug 1212279",
"url": "https://bugzilla.suse.com/1212279"
},
{
"category": "self",
"summary": "SUSE Bug 1212641",
"url": "https://bugzilla.suse.com/1212641"
},
{
"category": "self",
"summary": "SUSE Bug 1218843",
"url": "https://bugzilla.suse.com/1218843"
},
{
"category": "self",
"summary": "SUSE Bug 1218844",
"url": "https://bugzilla.suse.com/1218844"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-7753 page",
"url": "https://www.suse.com/security/cve/CVE-2020-7753/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-20178 page",
"url": "https://www.suse.com/security/cve/CVE-2021-20178/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-20180 page",
"url": "https://www.suse.com/security/cve/CVE-2021-20180/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-20191 page",
"url": "https://www.suse.com/security/cve/CVE-2021-20191/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-20228 page",
"url": "https://www.suse.com/security/cve/CVE-2021-20228/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-3447 page",
"url": "https://www.suse.com/security/cve/CVE-2021-3447/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-3583 page",
"url": "https://www.suse.com/security/cve/CVE-2021-3583/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-3620 page",
"url": "https://www.suse.com/security/cve/CVE-2021-3620/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-36222 page",
"url": "https://www.suse.com/security/cve/CVE-2021-36222/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-3711 page",
"url": "https://www.suse.com/security/cve/CVE-2021-3711/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-3807 page",
"url": "https://www.suse.com/security/cve/CVE-2021-3807/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-3918 page",
"url": "https://www.suse.com/security/cve/CVE-2021-3918/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-41174 page",
"url": "https://www.suse.com/security/cve/CVE-2021-41174/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-41244 page",
"url": "https://www.suse.com/security/cve/CVE-2021-41244/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-43138 page",
"url": "https://www.suse.com/security/cve/CVE-2021-43138/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-43798 page",
"url": "https://www.suse.com/security/cve/CVE-2021-43798/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-43813 page",
"url": "https://www.suse.com/security/cve/CVE-2021-43813/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-43815 page",
"url": "https://www.suse.com/security/cve/CVE-2021-43815/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-0155 page",
"url": "https://www.suse.com/security/cve/CVE-2022-0155/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-23552 page",
"url": "https://www.suse.com/security/cve/CVE-2022-23552/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-27664 page",
"url": "https://www.suse.com/security/cve/CVE-2022-27664/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-29170 page",
"url": "https://www.suse.com/security/cve/CVE-2022-29170/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-31097 page",
"url": "https://www.suse.com/security/cve/CVE-2022-31097/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-31107 page",
"url": "https://www.suse.com/security/cve/CVE-2022-31107/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-31123 page",
"url": "https://www.suse.com/security/cve/CVE-2022-31123/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-31130 page",
"url": "https://www.suse.com/security/cve/CVE-2022-31130/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-32149 page",
"url": "https://www.suse.com/security/cve/CVE-2022-32149/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-35957 page",
"url": "https://www.suse.com/security/cve/CVE-2022-35957/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-36062 page",
"url": "https://www.suse.com/security/cve/CVE-2022-36062/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-39201 page",
"url": "https://www.suse.com/security/cve/CVE-2022-39201/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-39229 page",
"url": "https://www.suse.com/security/cve/CVE-2022-39229/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-39306 page",
"url": "https://www.suse.com/security/cve/CVE-2022-39306/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-39307 page",
"url": "https://www.suse.com/security/cve/CVE-2022-39307/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-39324 page",
"url": "https://www.suse.com/security/cve/CVE-2022-39324/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-41715 page",
"url": "https://www.suse.com/security/cve/CVE-2022-41715/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-41723 page",
"url": "https://www.suse.com/security/cve/CVE-2022-41723/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-46146 page",
"url": "https://www.suse.com/security/cve/CVE-2022-46146/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-0507 page",
"url": "https://www.suse.com/security/cve/CVE-2023-0507/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-0594 page",
"url": "https://www.suse.com/security/cve/CVE-2023-0594/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-1387 page",
"url": "https://www.suse.com/security/cve/CVE-2023-1387/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-1410 page",
"url": "https://www.suse.com/security/cve/CVE-2023-1410/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-2183 page",
"url": "https://www.suse.com/security/cve/CVE-2023-2183/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-2801 page",
"url": "https://www.suse.com/security/cve/CVE-2023-2801/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-3128 page",
"url": "https://www.suse.com/security/cve/CVE-2023-3128/"
}
],
"title": "Security Beta update for SUSE Manager Client Tools and Salt",
"tracking": {
"current_release_date": "2024-01-23T15:20:05Z",
"generator": {
"date": "2024-01-23T15:20:05Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2024:0196-1",
"initial_release_date": "2024-01-23T15:20:05Z",
"revision_history": [
{
"date": "2024-01-23T15:20:05Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "firewalld-prometheus-config-0.1-159000.6.33.1.aarch64",
"product": {
"name": "firewalld-prometheus-config-0.1-159000.6.33.1.aarch64",
"product_id": "firewalld-prometheus-config-0.1-159000.6.33.1.aarch64"
}
},
{
"category": "product_version",
"name": "golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64",
"product": {
"name": "golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64",
"product_id": "golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64"
}
},
{
"category": "product_version",
"name": "golang-github-boynux-squid_exporter-1.6-159000.4.9.1.aarch64",
"product": {
"name": "golang-github-boynux-squid_exporter-1.6-159000.4.9.1.aarch64",
"product_id": "golang-github-boynux-squid_exporter-1.6-159000.4.9.1.aarch64"
}
},
{
"category": "product_version",
"name": "golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.aarch64",
"product": {
"name": "golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.aarch64",
"product_id": "golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.aarch64"
}
},
{
"category": "product_version",
"name": "golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.aarch64",
"product": {
"name": "golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.aarch64",
"product_id": "golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.aarch64"
}
},
{
"category": "product_version",
"name": "grafana-9.5.8-159000.4.24.1.aarch64",
"product": {
"name": "grafana-9.5.8-159000.4.24.1.aarch64",
"product_id": "grafana-9.5.8-159000.4.24.1.aarch64"
}
},
{
"category": "product_version",
"name": "prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64",
"product": {
"name": "prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64",
"product_id": "prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64"
}
},
{
"category": "product_version",
"name": "prometheus-postgres_exporter-0.10.1-159000.3.6.1.aarch64",
"product": {
"name": "prometheus-postgres_exporter-0.10.1-159000.3.6.1.aarch64",
"product_id": "prometheus-postgres_exporter-0.10.1-159000.3.6.1.aarch64"
}
},
{
"category": "product_version",
"name": "python2-uyuni-common-libs-5.0.1-159000.3.33.1.aarch64",
"product": {
"name": "python2-uyuni-common-libs-5.0.1-159000.3.33.1.aarch64",
"product_id": "python2-uyuni-common-libs-5.0.1-159000.3.33.1.aarch64"
}
},
{
"category": "product_version",
"name": "python3-uyuni-common-libs-5.0.1-159000.3.33.1.aarch64",
"product": {
"name": "python3-uyuni-common-libs-5.0.1-159000.3.33.1.aarch64",
"product_id": "python3-uyuni-common-libs-5.0.1-159000.3.33.1.aarch64"
}
},
{
"category": "product_version",
"name": "python3-yarl-1.3.0-159000.3.6.1.aarch64",
"product": {
"name": "python3-yarl-1.3.0-159000.3.6.1.aarch64",
"product_id": "python3-yarl-1.3.0-159000.3.6.1.aarch64"
}
},
{
"category": "product_version",
"name": "uyuni-base-common-5.0.1-159000.3.18.1.aarch64",
"product": {
"name": "uyuni-base-common-5.0.1-159000.3.18.1.aarch64",
"product_id": "uyuni-base-common-5.0.1-159000.3.18.1.aarch64"
}
},
{
"category": "product_version",
"name": "uyuni-base-proxy-5.0.1-159000.3.18.1.aarch64",
"product": {
"name": "uyuni-base-proxy-5.0.1-159000.3.18.1.aarch64",
"product_id": "uyuni-base-proxy-5.0.1-159000.3.18.1.aarch64"
}
},
{
"category": "product_version",
"name": "uyuni-base-server-5.0.1-159000.3.18.1.aarch64",
"product": {
"name": "uyuni-base-server-5.0.1-159000.3.18.1.aarch64",
"product_id": "uyuni-base-server-5.0.1-159000.3.18.1.aarch64"
}
},
{
"category": "product_version",
"name": "wire-0.5.0-159000.3.9.1.aarch64",
"product": {
"name": "wire-0.5.0-159000.3.9.1.aarch64",
"product_id": "wire-0.5.0-159000.3.9.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "ansible-2.9.27-159000.3.9.1.noarch",
"product": {
"name": "ansible-2.9.27-159000.3.9.1.noarch",
"product_id": "ansible-2.9.27-159000.3.9.1.noarch"
}
},
{
"category": "product_version",
"name": "ansible-doc-2.9.27-159000.3.9.1.noarch",
"product": {
"name": "ansible-doc-2.9.27-159000.3.9.1.noarch",
"product_id": "ansible-doc-2.9.27-159000.3.9.1.noarch"
}
},
{
"category": "product_version",
"name": "ansible-test-2.9.27-159000.3.9.1.noarch",
"product": {
"name": "ansible-test-2.9.27-159000.3.9.1.noarch",
"product_id": "ansible-test-2.9.27-159000.3.9.1.noarch"
}
},
{
"category": "product_version",
"name": "dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch",
"product": {
"name": "dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch",
"product_id": "dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch"
}
},
{
"category": "product_version",
"name": "mgr-push-5.0.1-159000.4.21.1.noarch",
"product": {
"name": "mgr-push-5.0.1-159000.4.21.1.noarch",
"product_id": "mgr-push-5.0.1-159000.4.21.1.noarch"
}
},
{
"category": "product_version",
"name": "python2-hwdata-2.3.5-159000.5.13.1.noarch",
"product": {
"name": "python2-hwdata-2.3.5-159000.5.13.1.noarch",
"product_id": "python2-hwdata-2.3.5-159000.5.13.1.noarch"
}
},
{
"category": "product_version",
"name": "python2-pyvmomi-6.7.3-159000.3.6.1.noarch",
"product": {
"name": "python2-pyvmomi-6.7.3-159000.3.6.1.noarch",
"product_id": "python2-pyvmomi-6.7.3-159000.3.6.1.noarch"
}
},
{
"category": "product_version",
"name": "python3-hwdata-2.3.5-159000.5.13.1.noarch",
"product": {
"name": "python3-hwdata-2.3.5-159000.5.13.1.noarch",
"product_id": "python3-hwdata-2.3.5-159000.5.13.1.noarch"
}
},
{
"category": "product_version",
"name": "python3-mgr-push-5.0.1-159000.4.21.1.noarch",
"product": {
"name": "python3-mgr-push-5.0.1-159000.4.21.1.noarch",
"product_id": "python3-mgr-push-5.0.1-159000.4.21.1.noarch"
}
},
{
"category": "product_version",
"name": "python3-pyvmomi-6.7.3-159000.3.6.1.noarch",
"product": {
"name": "python3-pyvmomi-6.7.3-159000.3.6.1.noarch",
"product_id": "python3-pyvmomi-6.7.3-159000.3.6.1.noarch"
}
},
{
"category": "product_version",
"name": "python3-rhnlib-5.0.1-159000.6.30.1.noarch",
"product": {
"name": "python3-rhnlib-5.0.1-159000.6.30.1.noarch",
"product_id": "python3-rhnlib-5.0.1-159000.6.30.1.noarch"
}
},
{
"category": "product_version",
"name": "python3-spacewalk-check-5.0.1-159000.6.48.1.noarch",
"product": {
"name": "python3-spacewalk-check-5.0.1-159000.6.48.1.noarch",
"product_id": "python3-spacewalk-check-5.0.1-159000.6.48.1.noarch"
}
},
{
"category": "product_version",
"name": "python3-spacewalk-client-setup-5.0.1-159000.6.48.1.noarch",
"product": {
"name": "python3-spacewalk-client-setup-5.0.1-159000.6.48.1.noarch",
"product_id": "python3-spacewalk-client-setup-5.0.1-159000.6.48.1.noarch"
}
},
{
"category": "product_version",
"name": "python3-spacewalk-client-tools-5.0.1-159000.6.48.1.noarch",
"product": {
"name": "python3-spacewalk-client-tools-5.0.1-159000.6.48.1.noarch",
"product_id": "python3-spacewalk-client-tools-5.0.1-159000.6.48.1.noarch"
}
},
{
"category": "product_version",
"name": "spacecmd-5.0.1-159000.6.42.1.noarch",
"product": {
"name": "spacecmd-5.0.1-159000.6.42.1.noarch",
"product_id": "spacecmd-5.0.1-159000.6.42.1.noarch"
}
},
{
"category": "product_version",
"name": "spacewalk-check-5.0.1-159000.6.48.1.noarch",
"product": {
"name": "spacewalk-check-5.0.1-159000.6.48.1.noarch",
"product_id": "spacewalk-check-5.0.1-159000.6.48.1.noarch"
}
},
{
"category": "product_version",
"name": "spacewalk-client-setup-5.0.1-159000.6.48.1.noarch",
"product": {
"name": "spacewalk-client-setup-5.0.1-159000.6.48.1.noarch",
"product_id": "spacewalk-client-setup-5.0.1-159000.6.48.1.noarch"
}
},
{
"category": "product_version",
"name": "spacewalk-client-tools-5.0.1-159000.6.48.1.noarch",
"product": {
"name": "spacewalk-client-tools-5.0.1-159000.6.48.1.noarch",
"product_id": "spacewalk-client-tools-5.0.1-159000.6.48.1.noarch"
}
},
{
"category": "product_version",
"name": "supportutils-plugin-salt-1.2.2-159000.5.9.1.noarch",
"product": {
"name": "supportutils-plugin-salt-1.2.2-159000.5.9.1.noarch",
"product_id": "supportutils-plugin-salt-1.2.2-159000.5.9.1.noarch"
}
},
{
"category": "product_version",
"name": "supportutils-plugin-susemanager-client-5.0.1-159000.6.15.1.noarch",
"product": {
"name": "supportutils-plugin-susemanager-client-5.0.1-159000.6.15.1.noarch",
"product_id": "supportutils-plugin-susemanager-client-5.0.1-159000.6.15.1.noarch"
}
},
{
"category": "product_version",
"name": "uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch",
"product": {
"name": "uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch",
"product_id": "uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "firewalld-prometheus-config-0.1-159000.6.33.1.ppc64le",
"product": {
"name": "firewalld-prometheus-config-0.1-159000.6.33.1.ppc64le",
"product_id": "firewalld-prometheus-config-0.1-159000.6.33.1.ppc64le"
}
},
{
"category": "product_version",
"name": "golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.ppc64le",
"product": {
"name": "golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.ppc64le",
"product_id": "golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.ppc64le"
}
},
{
"category": "product_version",
"name": "golang-github-boynux-squid_exporter-1.6-159000.4.9.1.ppc64le",
"product": {
"name": "golang-github-boynux-squid_exporter-1.6-159000.4.9.1.ppc64le",
"product_id": "golang-github-boynux-squid_exporter-1.6-159000.4.9.1.ppc64le"
}
},
{
"category": "product_version",
"name": "golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.ppc64le",
"product": {
"name": "golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.ppc64le",
"product_id": "golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.ppc64le"
}
},
{
"category": "product_version",
"name": "golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.ppc64le",
"product": {
"name": "golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.ppc64le",
"product_id": "golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.ppc64le"
}
},
{
"category": "product_version",
"name": "grafana-9.5.8-159000.4.24.1.ppc64le",
"product": {
"name": "grafana-9.5.8-159000.4.24.1.ppc64le",
"product_id": "grafana-9.5.8-159000.4.24.1.ppc64le"
}
},
{
"category": "product_version",
"name": "prometheus-blackbox_exporter-0.24.0-159000.3.6.1.ppc64le",
"product": {
"name": "prometheus-blackbox_exporter-0.24.0-159000.3.6.1.ppc64le",
"product_id": "prometheus-blackbox_exporter-0.24.0-159000.3.6.1.ppc64le"
}
},
{
"category": "product_version",
"name": "prometheus-postgres_exporter-0.10.1-159000.3.6.1.ppc64le",
"product": {
"name": "prometheus-postgres_exporter-0.10.1-159000.3.6.1.ppc64le",
"product_id": "prometheus-postgres_exporter-0.10.1-159000.3.6.1.ppc64le"
}
},
{
"category": "product_version",
"name": "python2-uyuni-common-libs-5.0.1-159000.3.33.1.ppc64le",
"product": {
"name": "python2-uyuni-common-libs-5.0.1-159000.3.33.1.ppc64le",
"product_id": "python2-uyuni-common-libs-5.0.1-159000.3.33.1.ppc64le"
}
},
{
"category": "product_version",
"name": "python3-uyuni-common-libs-5.0.1-159000.3.33.1.ppc64le",
"product": {
"name": "python3-uyuni-common-libs-5.0.1-159000.3.33.1.ppc64le",
"product_id": "python3-uyuni-common-libs-5.0.1-159000.3.33.1.ppc64le"
}
},
{
"category": "product_version",
"name": "python3-yarl-1.3.0-159000.3.6.1.ppc64le",
"product": {
"name": "python3-yarl-1.3.0-159000.3.6.1.ppc64le",
"product_id": "python3-yarl-1.3.0-159000.3.6.1.ppc64le"
}
},
{
"category": "product_version",
"name": "uyuni-base-common-5.0.1-159000.3.18.1.ppc64le",
"product": {
"name": "uyuni-base-common-5.0.1-159000.3.18.1.ppc64le",
"product_id": "uyuni-base-common-5.0.1-159000.3.18.1.ppc64le"
}
},
{
"category": "product_version",
"name": "uyuni-base-proxy-5.0.1-159000.3.18.1.ppc64le",
"product": {
"name": "uyuni-base-proxy-5.0.1-159000.3.18.1.ppc64le",
"product_id": "uyuni-base-proxy-5.0.1-159000.3.18.1.ppc64le"
}
},
{
"category": "product_version",
"name": "uyuni-base-server-5.0.1-159000.3.18.1.ppc64le",
"product": {
"name": "uyuni-base-server-5.0.1-159000.3.18.1.ppc64le",
"product_id": "uyuni-base-server-5.0.1-159000.3.18.1.ppc64le"
}
},
{
"category": "product_version",
"name": "wire-0.5.0-159000.3.9.1.ppc64le",
"product": {
"name": "wire-0.5.0-159000.3.9.1.ppc64le",
"product_id": "wire-0.5.0-159000.3.9.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "firewalld-prometheus-config-0.1-159000.6.33.1.s390x",
"product": {
"name": "firewalld-prometheus-config-0.1-159000.6.33.1.s390x",
"product_id": "firewalld-prometheus-config-0.1-159000.6.33.1.s390x"
}
},
{
"category": "product_version",
"name": "golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x",
"product": {
"name": "golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x",
"product_id": "golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x"
}
},
{
"category": "product_version",
"name": "golang-github-boynux-squid_exporter-1.6-159000.4.9.1.s390x",
"product": {
"name": "golang-github-boynux-squid_exporter-1.6-159000.4.9.1.s390x",
"product_id": "golang-github-boynux-squid_exporter-1.6-159000.4.9.1.s390x"
}
},
{
"category": "product_version",
"name": "golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.s390x",
"product": {
"name": "golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.s390x",
"product_id": "golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.s390x"
}
},
{
"category": "product_version",
"name": "golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.s390x",
"product": {
"name": "golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.s390x",
"product_id": "golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.s390x"
}
},
{
"category": "product_version",
"name": "grafana-9.5.8-159000.4.24.1.s390x",
"product": {
"name": "grafana-9.5.8-159000.4.24.1.s390x",
"product_id": "grafana-9.5.8-159000.4.24.1.s390x"
}
},
{
"category": "product_version",
"name": "prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x",
"product": {
"name": "prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x",
"product_id": "prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x"
}
},
{
"category": "product_version",
"name": "prometheus-postgres_exporter-0.10.1-159000.3.6.1.s390x",
"product": {
"name": "prometheus-postgres_exporter-0.10.1-159000.3.6.1.s390x",
"product_id": "prometheus-postgres_exporter-0.10.1-159000.3.6.1.s390x"
}
},
{
"category": "product_version",
"name": "python2-uyuni-common-libs-5.0.1-159000.3.33.1.s390x",
"product": {
"name": "python2-uyuni-common-libs-5.0.1-159000.3.33.1.s390x",
"product_id": "python2-uyuni-common-libs-5.0.1-159000.3.33.1.s390x"
}
},
{
"category": "product_version",
"name": "python3-uyuni-common-libs-5.0.1-159000.3.33.1.s390x",
"product": {
"name": "python3-uyuni-common-libs-5.0.1-159000.3.33.1.s390x",
"product_id": "python3-uyuni-common-libs-5.0.1-159000.3.33.1.s390x"
}
},
{
"category": "product_version",
"name": "python3-yarl-1.3.0-159000.3.6.1.s390x",
"product": {
"name": "python3-yarl-1.3.0-159000.3.6.1.s390x",
"product_id": "python3-yarl-1.3.0-159000.3.6.1.s390x"
}
},
{
"category": "product_version",
"name": "uyuni-base-common-5.0.1-159000.3.18.1.s390x",
"product": {
"name": "uyuni-base-common-5.0.1-159000.3.18.1.s390x",
"product_id": "uyuni-base-common-5.0.1-159000.3.18.1.s390x"
}
},
{
"category": "product_version",
"name": "uyuni-base-proxy-5.0.1-159000.3.18.1.s390x",
"product": {
"name": "uyuni-base-proxy-5.0.1-159000.3.18.1.s390x",
"product_id": "uyuni-base-proxy-5.0.1-159000.3.18.1.s390x"
}
},
{
"category": "product_version",
"name": "uyuni-base-server-5.0.1-159000.3.18.1.s390x",
"product": {
"name": "uyuni-base-server-5.0.1-159000.3.18.1.s390x",
"product_id": "uyuni-base-server-5.0.1-159000.3.18.1.s390x"
}
},
{
"category": "product_version",
"name": "wire-0.5.0-159000.3.9.1.s390x",
"product": {
"name": "wire-0.5.0-159000.3.9.1.s390x",
"product_id": "wire-0.5.0-159000.3.9.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "firewalld-prometheus-config-0.1-159000.6.33.1.x86_64",
"product": {
"name": "firewalld-prometheus-config-0.1-159000.6.33.1.x86_64",
"product_id": "firewalld-prometheus-config-0.1-159000.6.33.1.x86_64"
}
},
{
"category": "product_version",
"name": "golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64",
"product": {
"name": "golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64",
"product_id": "golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64"
}
},
{
"category": "product_version",
"name": "golang-github-boynux-squid_exporter-1.6-159000.4.9.1.x86_64",
"product": {
"name": "golang-github-boynux-squid_exporter-1.6-159000.4.9.1.x86_64",
"product_id": "golang-github-boynux-squid_exporter-1.6-159000.4.9.1.x86_64"
}
},
{
"category": "product_version",
"name": "golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.x86_64",
"product": {
"name": "golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.x86_64",
"product_id": "golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.x86_64"
}
},
{
"category": "product_version",
"name": "golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.x86_64",
"product": {
"name": "golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.x86_64",
"product_id": "golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.x86_64"
}
},
{
"category": "product_version",
"name": "grafana-9.5.8-159000.4.24.1.x86_64",
"product": {
"name": "grafana-9.5.8-159000.4.24.1.x86_64",
"product_id": "grafana-9.5.8-159000.4.24.1.x86_64"
}
},
{
"category": "product_version",
"name": "prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64",
"product": {
"name": "prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64",
"product_id": "prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64"
}
},
{
"category": "product_version",
"name": "prometheus-postgres_exporter-0.10.1-159000.3.6.1.x86_64",
"product": {
"name": "prometheus-postgres_exporter-0.10.1-159000.3.6.1.x86_64",
"product_id": "prometheus-postgres_exporter-0.10.1-159000.3.6.1.x86_64"
}
},
{
"category": "product_version",
"name": "python2-uyuni-common-libs-5.0.1-159000.3.33.1.x86_64",
"product": {
"name": "python2-uyuni-common-libs-5.0.1-159000.3.33.1.x86_64",
"product_id": "python2-uyuni-common-libs-5.0.1-159000.3.33.1.x86_64"
}
},
{
"category": "product_version",
"name": "python3-uyuni-common-libs-5.0.1-159000.3.33.1.x86_64",
"product": {
"name": "python3-uyuni-common-libs-5.0.1-159000.3.33.1.x86_64",
"product_id": "python3-uyuni-common-libs-5.0.1-159000.3.33.1.x86_64"
}
},
{
"category": "product_version",
"name": "python3-yarl-1.3.0-159000.3.6.1.x86_64",
"product": {
"name": "python3-yarl-1.3.0-159000.3.6.1.x86_64",
"product_id": "python3-yarl-1.3.0-159000.3.6.1.x86_64"
}
},
{
"category": "product_version",
"name": "uyuni-base-common-5.0.1-159000.3.18.1.x86_64",
"product": {
"name": "uyuni-base-common-5.0.1-159000.3.18.1.x86_64",
"product_id": "uyuni-base-common-5.0.1-159000.3.18.1.x86_64"
}
},
{
"category": "product_version",
"name": "uyuni-base-proxy-5.0.1-159000.3.18.1.x86_64",
"product": {
"name": "uyuni-base-proxy-5.0.1-159000.3.18.1.x86_64",
"product_id": "uyuni-base-proxy-5.0.1-159000.3.18.1.x86_64"
}
},
{
"category": "product_version",
"name": "uyuni-base-server-5.0.1-159000.3.18.1.x86_64",
"product": {
"name": "uyuni-base-server-5.0.1-159000.3.18.1.x86_64",
"product_id": "uyuni-base-server-5.0.1-159000.3.18.1.x86_64"
}
},
{
"category": "product_version",
"name": "wire-0.5.0-159000.3.9.1.x86_64",
"product": {
"name": "wire-0.5.0-159000.3.9.1.x86_64",
"product_id": "wire-0.5.0-159000.3.9.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Manager Client Tools 15-BETA",
"product": {
"name": "SUSE Manager Client Tools 15-BETA",
"product_id": "SUSE Manager Client Tools 15-BETA"
}
},
{
"category": "product_name",
"name": "SUSE Manager Client Tools Beta for SLE Micro 5",
"product": {
"name": "SUSE Manager Client Tools Beta for SLE Micro 5",
"product_id": "SUSE Manager Client Tools Beta for SLE Micro 5",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-manager-tools-beta-micro:5"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "ansible-2.9.27-159000.3.9.1.noarch as component of SUSE Manager Client Tools 15-BETA",
"product_id": "SUSE Manager Client Tools 15-BETA:ansible-2.9.27-159000.3.9.1.noarch"
},
"product_reference": "ansible-2.9.27-159000.3.9.1.noarch",
"relates_to_product_reference": "SUSE Manager Client Tools 15-BETA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ansible-doc-2.9.27-159000.3.9.1.noarch as component of SUSE Manager Client Tools 15-BETA",
"product_id": "SUSE Manager Client Tools 15-BETA:ansible-doc-2.9.27-159000.3.9.1.noarch"
},
"product_reference": "ansible-doc-2.9.27-159000.3.9.1.noarch",
"relates_to_product_reference": "SUSE Manager Client Tools 15-BETA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch as component of SUSE Manager Client Tools 15-BETA",
"product_id": "SUSE Manager Client Tools 15-BETA:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch"
},
"product_reference": "dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch",
"relates_to_product_reference": "SUSE Manager Client Tools 15-BETA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "firewalld-prometheus-config-0.1-159000.6.33.1.aarch64 as component of SUSE Manager Client Tools 15-BETA",
"product_id": "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.aarch64"
},
"product_reference": "firewalld-prometheus-config-0.1-159000.6.33.1.aarch64",
"relates_to_product_reference": "SUSE Manager Client Tools 15-BETA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "firewalld-prometheus-config-0.1-159000.6.33.1.ppc64le as component of SUSE Manager Client Tools 15-BETA",
"product_id": "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.ppc64le"
},
"product_reference": "firewalld-prometheus-config-0.1-159000.6.33.1.ppc64le",
"relates_to_product_reference": "SUSE Manager Client Tools 15-BETA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "firewalld-prometheus-config-0.1-159000.6.33.1.s390x as component of SUSE Manager Client Tools 15-BETA",
"product_id": "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.s390x"
},
"product_reference": "firewalld-prometheus-config-0.1-159000.6.33.1.s390x",
"relates_to_product_reference": "SUSE Manager Client Tools 15-BETA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "firewalld-prometheus-config-0.1-159000.6.33.1.x86_64 as component of SUSE Manager Client Tools 15-BETA",
"product_id": "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.x86_64"
},
"product_reference": "firewalld-prometheus-config-0.1-159000.6.33.1.x86_64",
"relates_to_product_reference": "SUSE Manager Client Tools 15-BETA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64 as component of SUSE Manager Client Tools 15-BETA",
"product_id": "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64"
},
"product_reference": "golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64",
"relates_to_product_reference": "SUSE Manager Client Tools 15-BETA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.ppc64le as component of SUSE Manager Client Tools 15-BETA",
"product_id": "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.ppc64le"
},
"product_reference": "golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.ppc64le",
"relates_to_product_reference": "SUSE Manager Client Tools 15-BETA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x as component of SUSE Manager Client Tools 15-BETA",
"product_id": "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x"
},
"product_reference": "golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x",
"relates_to_product_reference": "SUSE Manager Client Tools 15-BETA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64 as component of SUSE Manager Client Tools 15-BETA",
"product_id": "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64"
},
"product_reference": "golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64",
"relates_to_product_reference": "SUSE Manager Client Tools 15-BETA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-github-boynux-squid_exporter-1.6-159000.4.9.1.aarch64 as component of SUSE Manager Client Tools 15-BETA",
"product_id": "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.aarch64"
},
"product_reference": "golang-github-boynux-squid_exporter-1.6-159000.4.9.1.aarch64",
"relates_to_product_reference": "SUSE Manager Client Tools 15-BETA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-github-boynux-squid_exporter-1.6-159000.4.9.1.ppc64le as component of SUSE Manager Client Tools 15-BETA",
"product_id": "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.ppc64le"
},
"product_reference": "golang-github-boynux-squid_exporter-1.6-159000.4.9.1.ppc64le",
"relates_to_product_reference": "SUSE Manager Client Tools 15-BETA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-github-boynux-squid_exporter-1.6-159000.4.9.1.s390x as component of SUSE Manager Client Tools 15-BETA",
"product_id": "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.s390x"
},
"product_reference": "golang-github-boynux-squid_exporter-1.6-159000.4.9.1.s390x",
"relates_to_product_reference": "SUSE Manager Client Tools 15-BETA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-github-boynux-squid_exporter-1.6-159000.4.9.1.x86_64 as component of SUSE Manager Client Tools 15-BETA",
"product_id": "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.x86_64"
},
"product_reference": "golang-github-boynux-squid_exporter-1.6-159000.4.9.1.x86_64",
"relates_to_product_reference": "SUSE Manager Client Tools 15-BETA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.aarch64 as component of SUSE Manager Client Tools 15-BETA",
"product_id": "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.aarch64"
},
"product_reference": "golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.aarch64",
"relates_to_product_reference": "SUSE Manager Client Tools 15-BETA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.ppc64le as component of SUSE Manager Client Tools 15-BETA",
"product_id": "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.ppc64le"
},
"product_reference": "golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.ppc64le",
"relates_to_product_reference": "SUSE Manager Client Tools 15-BETA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.s390x as component of SUSE Manager Client Tools 15-BETA",
"product_id": "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.s390x"
},
"product_reference": "golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.s390x",
"relates_to_product_reference": "SUSE Manager Client Tools 15-BETA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.x86_64 as component of SUSE Manager Client Tools 15-BETA",
"product_id": "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.x86_64"
},
"product_reference": "golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.x86_64",
"relates_to_product_reference": "SUSE Manager Client Tools 15-BETA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.aarch64 as component of SUSE Manager Client Tools 15-BETA",
"product_id": "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.aarch64"
},
"product_reference": "golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.aarch64",
"relates_to_product_reference": "SUSE Manager Client Tools 15-BETA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.ppc64le as component of SUSE Manager Client Tools 15-BETA",
"product_id": "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.ppc64le"
},
"product_reference": "golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.ppc64le",
"relates_to_product_reference": "SUSE Manager Client Tools 15-BETA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.s390x as component of SUSE Manager Client Tools 15-BETA",
"product_id": "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.s390x"
},
"product_reference": "golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.s390x",
"relates_to_product_reference": "SUSE Manager Client Tools 15-BETA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.x86_64 as component of SUSE Manager Client Tools 15-BETA",
"product_id": "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.x86_64"
},
"product_reference": "golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.x86_64",
"relates_to_product_reference": "SUSE Manager Client Tools 15-BETA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "grafana-9.5.8-159000.4.24.1.aarch64 as component of SUSE Manager Client Tools 15-BETA",
"product_id": "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.aarch64"
},
"product_reference": "grafana-9.5.8-159000.4.24.1.aarch64",
"relates_to_product_reference": "SUSE Manager Client Tools 15-BETA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "grafana-9.5.8-159000.4.24.1.ppc64le as component of SUSE Manager Client Tools 15-BETA",
"product_id": "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.ppc64le"
},
"product_reference": "grafana-9.5.8-159000.4.24.1.ppc64le",
"relates_to_product_reference": "SUSE Manager Client Tools 15-BETA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "grafana-9.5.8-159000.4.24.1.s390x as component of SUSE Manager Client Tools 15-BETA",
"product_id": "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.s390x"
},
"product_reference": "grafana-9.5.8-159000.4.24.1.s390x",
"relates_to_product_reference": "SUSE Manager Client Tools 15-BETA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "grafana-9.5.8-159000.4.24.1.x86_64 as component of SUSE Manager Client Tools 15-BETA",
"product_id": "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.x86_64"
},
"product_reference": "grafana-9.5.8-159000.4.24.1.x86_64",
"relates_to_product_reference": "SUSE Manager Client Tools 15-BETA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mgr-push-5.0.1-159000.4.21.1.noarch as component of SUSE Manager Client Tools 15-BETA",
"product_id": "SUSE Manager Client Tools 15-BETA:mgr-push-5.0.1-159000.4.21.1.noarch"
},
"product_reference": "mgr-push-5.0.1-159000.4.21.1.noarch",
"relates_to_product_reference": "SUSE Manager Client Tools 15-BETA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64 as component of SUSE Manager Client Tools 15-BETA",
"product_id": "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64"
},
"product_reference": "prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64",
"relates_to_product_reference": "SUSE Manager Client Tools 15-BETA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "prometheus-blackbox_exporter-0.24.0-159000.3.6.1.ppc64le as component of SUSE Manager Client Tools 15-BETA",
"product_id": "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.ppc64le"
},
"product_reference": "prometheus-blackbox_exporter-0.24.0-159000.3.6.1.ppc64le",
"relates_to_product_reference": "SUSE Manager Client Tools 15-BETA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x as component of SUSE Manager Client Tools 15-BETA",
"product_id": "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x"
},
"product_reference": "prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x",
"relates_to_product_reference": "SUSE Manager Client Tools 15-BETA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64 as component of SUSE Manager Client Tools 15-BETA",
"product_id": "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64"
},
"product_reference": "prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64",
"relates_to_product_reference": "SUSE Manager Client Tools 15-BETA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "prometheus-postgres_exporter-0.10.1-159000.3.6.1.aarch64 as component of SUSE Manager Client Tools 15-BETA",
"product_id": "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.aarch64"
},
"product_reference": "prometheus-postgres_exporter-0.10.1-159000.3.6.1.aarch64",
"relates_to_product_reference": "SUSE Manager Client Tools 15-BETA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "prometheus-postgres_exporter-0.10.1-159000.3.6.1.ppc64le as component of SUSE Manager Client Tools 15-BETA",
"product_id": "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.ppc64le"
},
"product_reference": "prometheus-postgres_exporter-0.10.1-159000.3.6.1.ppc64le",
"relates_to_product_reference": "SUSE Manager Client Tools 15-BETA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "prometheus-postgres_exporter-0.10.1-159000.3.6.1.s390x as component of SUSE Manager Client Tools 15-BETA",
"product_id": "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.s390x"
},
"product_reference": "prometheus-postgres_exporter-0.10.1-159000.3.6.1.s390x",
"relates_to_product_reference": "SUSE Manager Client Tools 15-BETA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "prometheus-postgres_exporter-0.10.1-159000.3.6.1.x86_64 as component of SUSE Manager Client Tools 15-BETA",
"product_id": "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.x86_64"
},
"product_reference": "prometheus-postgres_exporter-0.10.1-159000.3.6.1.x86_64",
"relates_to_product_reference": "SUSE Manager Client Tools 15-BETA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-hwdata-2.3.5-159000.5.13.1.noarch as component of SUSE Manager Client Tools 15-BETA",
"product_id": "SUSE Manager Client Tools 15-BETA:python3-hwdata-2.3.5-159000.5.13.1.noarch"
},
"product_reference": "python3-hwdata-2.3.5-159000.5.13.1.noarch",
"relates_to_product_reference": "SUSE Manager Client Tools 15-BETA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-mgr-push-5.0.1-159000.4.21.1.noarch as component of SUSE Manager Client Tools 15-BETA",
"product_id": "SUSE Manager Client Tools 15-BETA:python3-mgr-push-5.0.1-159000.4.21.1.noarch"
},
"product_reference": "python3-mgr-push-5.0.1-159000.4.21.1.noarch",
"relates_to_product_reference": "SUSE Manager Client Tools 15-BETA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-pyvmomi-6.7.3-159000.3.6.1.noarch as component of SUSE Manager Client Tools 15-BETA",
"product_id": "SUSE Manager Client Tools 15-BETA:python3-pyvmomi-6.7.3-159000.3.6.1.noarch"
},
"product_reference": "python3-pyvmomi-6.7.3-159000.3.6.1.noarch",
"relates_to_product_reference": "SUSE Manager Client Tools 15-BETA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-rhnlib-5.0.1-159000.6.30.1.noarch as component of SUSE Manager Client Tools 15-BETA",
"product_id": "SUSE Manager Client Tools 15-BETA:python3-rhnlib-5.0.1-159000.6.30.1.noarch"
},
"product_reference": "python3-rhnlib-5.0.1-159000.6.30.1.noarch",
"relates_to_product_reference": "SUSE Manager Client Tools 15-BETA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-spacewalk-check-5.0.1-159000.6.48.1.noarch as component of SUSE Manager Client Tools 15-BETA",
"product_id": "SUSE Manager Client Tools 15-BETA:python3-spacewalk-check-5.0.1-159000.6.48.1.noarch"
},
"product_reference": "python3-spacewalk-check-5.0.1-159000.6.48.1.noarch",
"relates_to_product_reference": "SUSE Manager Client Tools 15-BETA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-spacewalk-client-setup-5.0.1-159000.6.48.1.noarch as component of SUSE Manager Client Tools 15-BETA",
"product_id": "SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-setup-5.0.1-159000.6.48.1.noarch"
},
"product_reference": "python3-spacewalk-client-setup-5.0.1-159000.6.48.1.noarch",
"relates_to_product_reference": "SUSE Manager Client Tools 15-BETA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-spacewalk-client-tools-5.0.1-159000.6.48.1.noarch as component of SUSE Manager Client Tools 15-BETA",
"product_id": "SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-tools-5.0.1-159000.6.48.1.noarch"
},
"product_reference": "python3-spacewalk-client-tools-5.0.1-159000.6.48.1.noarch",
"relates_to_product_reference": "SUSE Manager Client Tools 15-BETA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-uyuni-common-libs-5.0.1-159000.3.33.1.aarch64 as component of SUSE Manager Client Tools 15-BETA",
"product_id": "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.aarch64"
},
"product_reference": "python3-uyuni-common-libs-5.0.1-159000.3.33.1.aarch64",
"relates_to_product_reference": "SUSE Manager Client Tools 15-BETA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-uyuni-common-libs-5.0.1-159000.3.33.1.ppc64le as component of SUSE Manager Client Tools 15-BETA",
"product_id": "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.ppc64le"
},
"product_reference": "python3-uyuni-common-libs-5.0.1-159000.3.33.1.ppc64le",
"relates_to_product_reference": "SUSE Manager Client Tools 15-BETA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-uyuni-common-libs-5.0.1-159000.3.33.1.s390x as component of SUSE Manager Client Tools 15-BETA",
"product_id": "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.s390x"
},
"product_reference": "python3-uyuni-common-libs-5.0.1-159000.3.33.1.s390x",
"relates_to_product_reference": "SUSE Manager Client Tools 15-BETA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-uyuni-common-libs-5.0.1-159000.3.33.1.x86_64 as component of SUSE Manager Client Tools 15-BETA",
"product_id": "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.x86_64"
},
"product_reference": "python3-uyuni-common-libs-5.0.1-159000.3.33.1.x86_64",
"relates_to_product_reference": "SUSE Manager Client Tools 15-BETA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "spacecmd-5.0.1-159000.6.42.1.noarch as component of SUSE Manager Client Tools 15-BETA",
"product_id": "SUSE Manager Client Tools 15-BETA:spacecmd-5.0.1-159000.6.42.1.noarch"
},
"product_reference": "spacecmd-5.0.1-159000.6.42.1.noarch",
"relates_to_product_reference": "SUSE Manager Client Tools 15-BETA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "spacewalk-check-5.0.1-159000.6.48.1.noarch as component of SUSE Manager Client Tools 15-BETA",
"product_id": "SUSE Manager Client Tools 15-BETA:spacewalk-check-5.0.1-159000.6.48.1.noarch"
},
"product_reference": "spacewalk-check-5.0.1-159000.6.48.1.noarch",
"relates_to_product_reference": "SUSE Manager Client Tools 15-BETA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "spacewalk-client-setup-5.0.1-159000.6.48.1.noarch as component of SUSE Manager Client Tools 15-BETA",
"product_id": "SUSE Manager Client Tools 15-BETA:spacewalk-client-setup-5.0.1-159000.6.48.1.noarch"
},
"product_reference": "spacewalk-client-setup-5.0.1-159000.6.48.1.noarch",
"relates_to_product_reference": "SUSE Manager Client Tools 15-BETA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "spacewalk-client-tools-5.0.1-159000.6.48.1.noarch as component of SUSE Manager Client Tools 15-BETA",
"product_id": "SUSE Manager Client Tools 15-BETA:spacewalk-client-tools-5.0.1-159000.6.48.1.noarch"
},
"product_reference": "spacewalk-client-tools-5.0.1-159000.6.48.1.noarch",
"relates_to_product_reference": "SUSE Manager Client Tools 15-BETA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "supportutils-plugin-salt-1.2.2-159000.5.9.1.noarch as component of SUSE Manager Client Tools 15-BETA",
"product_id": "SUSE Manager Client Tools 15-BETA:supportutils-plugin-salt-1.2.2-159000.5.9.1.noarch"
},
"product_reference": "supportutils-plugin-salt-1.2.2-159000.5.9.1.noarch",
"relates_to_product_reference": "SUSE Manager Client Tools 15-BETA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "supportutils-plugin-susemanager-client-5.0.1-159000.6.15.1.noarch as component of SUSE Manager Client Tools 15-BETA",
"product_id": "SUSE Manager Client Tools 15-BETA:supportutils-plugin-susemanager-client-5.0.1-159000.6.15.1.noarch"
},
"product_reference": "supportutils-plugin-susemanager-client-5.0.1-159000.6.15.1.noarch",
"relates_to_product_reference": "SUSE Manager Client Tools 15-BETA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch as component of SUSE Manager Client Tools 15-BETA",
"product_id": "SUSE Manager Client Tools 15-BETA:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch"
},
"product_reference": "uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch",
"relates_to_product_reference": "SUSE Manager Client Tools 15-BETA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch as component of SUSE Manager Client Tools Beta for SLE Micro 5",
"product_id": "SUSE Manager Client Tools Beta for SLE Micro 5:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch"
},
"product_reference": "dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch",
"relates_to_product_reference": "SUSE Manager Client Tools Beta for SLE Micro 5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64 as component of SUSE Manager Client Tools Beta for SLE Micro 5",
"product_id": "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64"
},
"product_reference": "golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64",
"relates_to_product_reference": "SUSE Manager Client Tools Beta for SLE Micro 5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x as component of SUSE Manager Client Tools Beta for SLE Micro 5",
"product_id": "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x"
},
"product_reference": "golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x",
"relates_to_product_reference": "SUSE Manager Client Tools Beta for SLE Micro 5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64 as component of SUSE Manager Client Tools Beta for SLE Micro 5",
"product_id": "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64"
},
"product_reference": "golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64",
"relates_to_product_reference": "SUSE Manager Client Tools Beta for SLE Micro 5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64 as component of SUSE Manager Client Tools Beta for SLE Micro 5",
"product_id": "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64"
},
"product_reference": "prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64",
"relates_to_product_reference": "SUSE Manager Client Tools Beta for SLE Micro 5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x as component of SUSE Manager Client Tools Beta for SLE Micro 5",
"product_id": "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x"
},
"product_reference": "prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x",
"relates_to_product_reference": "SUSE Manager Client Tools Beta for SLE Micro 5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64 as component of SUSE Manager Client Tools Beta for SLE Micro 5",
"product_id": "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64"
},
"product_reference": "prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64",
"relates_to_product_reference": "SUSE Manager Client Tools Beta for SLE Micro 5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch as component of SUSE Manager Client Tools Beta for SLE Micro 5",
"product_id": "SUSE Manager Client Tools Beta for SLE Micro 5:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch"
},
"product_reference": "uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch",
"relates_to_product_reference": "SUSE Manager Client Tools Beta for SLE Micro 5"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2020-7753",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-7753"
}
],
"notes": [
{
"category": "general",
"text": "All versions of package trim are vulnerable to Regular Expression Denial of Service (ReDoS) via trim().",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Manager Client Tools 15-BETA:ansible-2.9.27-159000.3.9.1.noarch",
"SUSE Manager Client Tools 15-BETA:ansible-doc-2.9.27-159000.3.9.1.noarch",
"SUSE Manager Client Tools 15-BETA:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch",
"SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.aarch64",
"SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.s390x",
"SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.x86_64",
"SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64",
"SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x",
"SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64",
"SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.aarch64",
"SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.s390x",
"SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.x86_64",
"SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.aarch64",
"SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.s390x",
"SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.x86_64",
"SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.aarch64",
"SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.s390x",
"SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.x86_64",
"SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.aarch64",
"SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.s390x",
"SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.x86_64",
"SUSE Manager Client Tools 15-BETA:mgr-push-5.0.1-159000.4.21.1.noarch",
"SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64",
"SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x",
"SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64",
"SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.aarch64",
"SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.s390x",
"SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.x86_64",
"SUSE Manager Client Tools 15-BETA:python3-hwdata-2.3.5-159000.5.13.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-mgr-push-5.0.1-159000.4.21.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-pyvmomi-6.7.3-159000.3.6.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-rhnlib-5.0.1-159000.6.30.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-spacewalk-check-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-setup-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-tools-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.aarch64",
"SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.s390x",
"SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.x86_64",
"SUSE Manager Client Tools 15-BETA:spacecmd-5.0.1-159000.6.42.1.noarch",
"SUSE Manager Client Tools 15-BETA:spacewalk-check-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:spacewalk-client-setup-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:spacewalk-client-tools-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:supportutils-plugin-salt-1.2.2-159000.5.9.1.noarch",
"SUSE Manager Client Tools 15-BETA:supportutils-plugin-susemanager-client-5.0.1-159000.6.15.1.noarch",
"SUSE Manager Client Tools 15-BETA:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch",
"SUSE Manager Client Tools Beta for SLE Micro 5:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch",
"SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64",
"SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x",
"SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64",
"SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64",
"SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x",
"SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64",
"SUSE Manager Client Tools Beta for SLE Micro 5:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-7753",
"url": "https://www.suse.com/security/cve/CVE-2020-7753"
},
{
"category": "external",
"summary": "SUSE Bug 1218843 for CVE-2020-7753",
"url": "https://bugzilla.suse.com/1218843"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Manager Client Tools 15-BETA:ansible-2.9.27-159000.3.9.1.noarch",
"SUSE Manager Client Tools 15-BETA:ansible-doc-2.9.27-159000.3.9.1.noarch",
"SUSE Manager Client Tools 15-BETA:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch",
"SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.aarch64",
"SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.s390x",
"SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.x86_64",
"SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64",
"SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x",
"SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64",
"SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.aarch64",
"SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.s390x",
"SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.x86_64",
"SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.aarch64",
"SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.s390x",
"SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.x86_64",
"SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.aarch64",
"SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.s390x",
"SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.x86_64",
"SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.aarch64",
"SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.s390x",
"SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.x86_64",
"SUSE Manager Client Tools 15-BETA:mgr-push-5.0.1-159000.4.21.1.noarch",
"SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64",
"SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x",
"SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64",
"SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.aarch64",
"SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.s390x",
"SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.x86_64",
"SUSE Manager Client Tools 15-BETA:python3-hwdata-2.3.5-159000.5.13.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-mgr-push-5.0.1-159000.4.21.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-pyvmomi-6.7.3-159000.3.6.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-rhnlib-5.0.1-159000.6.30.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-spacewalk-check-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-setup-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-tools-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.aarch64",
"SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.s390x",
"SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.x86_64",
"SUSE Manager Client Tools 15-BETA:spacecmd-5.0.1-159000.6.42.1.noarch",
"SUSE Manager Client Tools 15-BETA:spacewalk-check-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:spacewalk-client-setup-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:spacewalk-client-tools-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:supportutils-plugin-salt-1.2.2-159000.5.9.1.noarch",
"SUSE Manager Client Tools 15-BETA:supportutils-plugin-susemanager-client-5.0.1-159000.6.15.1.noarch",
"SUSE Manager Client Tools 15-BETA:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch",
"SUSE Manager Client Tools Beta for SLE Micro 5:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch",
"SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64",
"SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x",
"SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64",
"SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64",
"SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x",
"SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64",
"SUSE Manager Client Tools Beta for SLE Micro 5:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Manager Client Tools 15-BETA:ansible-2.9.27-159000.3.9.1.noarch",
"SUSE Manager Client Tools 15-BETA:ansible-doc-2.9.27-159000.3.9.1.noarch",
"SUSE Manager Client Tools 15-BETA:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch",
"SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.aarch64",
"SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.s390x",
"SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.x86_64",
"SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64",
"SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x",
"SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64",
"SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.aarch64",
"SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.s390x",
"SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.x86_64",
"SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.aarch64",
"SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.s390x",
"SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.x86_64",
"SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.aarch64",
"SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.s390x",
"SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.x86_64",
"SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.aarch64",
"SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.s390x",
"SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.x86_64",
"SUSE Manager Client Tools 15-BETA:mgr-push-5.0.1-159000.4.21.1.noarch",
"SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64",
"SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x",
"SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64",
"SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.aarch64",
"SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.s390x",
"SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.x86_64",
"SUSE Manager Client Tools 15-BETA:python3-hwdata-2.3.5-159000.5.13.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-mgr-push-5.0.1-159000.4.21.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-pyvmomi-6.7.3-159000.3.6.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-rhnlib-5.0.1-159000.6.30.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-spacewalk-check-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-setup-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-tools-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.aarch64",
"SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.s390x",
"SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.x86_64",
"SUSE Manager Client Tools 15-BETA:spacecmd-5.0.1-159000.6.42.1.noarch",
"SUSE Manager Client Tools 15-BETA:spacewalk-check-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:spacewalk-client-setup-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:spacewalk-client-tools-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:supportutils-plugin-salt-1.2.2-159000.5.9.1.noarch",
"SUSE Manager Client Tools 15-BETA:supportutils-plugin-susemanager-client-5.0.1-159000.6.15.1.noarch",
"SUSE Manager Client Tools 15-BETA:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch",
"SUSE Manager Client Tools Beta for SLE Micro 5:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch",
"SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64",
"SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x",
"SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64",
"SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64",
"SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x",
"SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64",
"SUSE Manager Client Tools Beta for SLE Micro 5:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-01-23T15:20:05Z",
"details": "important"
}
],
"title": "CVE-2020-7753"
},
{
"cve": "CVE-2021-20178",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-20178"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in ansible module where credentials are disclosed in the console log by default and not protected by the security feature when using the bitbucket_pipeline_variable module. This flaw allows an attacker to steal bitbucket_pipeline credentials. The highest threat from this vulnerability is to confidentiality.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Manager Client Tools 15-BETA:ansible-2.9.27-159000.3.9.1.noarch",
"SUSE Manager Client Tools 15-BETA:ansible-doc-2.9.27-159000.3.9.1.noarch",
"SUSE Manager Client Tools 15-BETA:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch",
"SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.aarch64",
"SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.s390x",
"SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.x86_64",
"SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64",
"SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x",
"SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64",
"SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.aarch64",
"SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.s390x",
"SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.x86_64",
"SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.aarch64",
"SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.s390x",
"SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.x86_64",
"SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.aarch64",
"SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.s390x",
"SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.x86_64",
"SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.aarch64",
"SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.s390x",
"SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.x86_64",
"SUSE Manager Client Tools 15-BETA:mgr-push-5.0.1-159000.4.21.1.noarch",
"SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64",
"SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x",
"SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64",
"SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.aarch64",
"SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.s390x",
"SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.x86_64",
"SUSE Manager Client Tools 15-BETA:python3-hwdata-2.3.5-159000.5.13.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-mgr-push-5.0.1-159000.4.21.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-pyvmomi-6.7.3-159000.3.6.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-rhnlib-5.0.1-159000.6.30.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-spacewalk-check-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-setup-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-tools-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.aarch64",
"SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.s390x",
"SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.x86_64",
"SUSE Manager Client Tools 15-BETA:spacecmd-5.0.1-159000.6.42.1.noarch",
"SUSE Manager Client Tools 15-BETA:spacewalk-check-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:spacewalk-client-setup-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:spacewalk-client-tools-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:supportutils-plugin-salt-1.2.2-159000.5.9.1.noarch",
"SUSE Manager Client Tools 15-BETA:supportutils-plugin-susemanager-client-5.0.1-159000.6.15.1.noarch",
"SUSE Manager Client Tools 15-BETA:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch",
"SUSE Manager Client Tools Beta for SLE Micro 5:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch",
"SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64",
"SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x",
"SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64",
"SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64",
"SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x",
"SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64",
"SUSE Manager Client Tools Beta for SLE Micro 5:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-20178",
"url": "https://www.suse.com/security/cve/CVE-2021-20178"
},
{
"category": "external",
"summary": "SUSE Bug 1180816 for CVE-2021-20178",
"url": "https://bugzilla.suse.com/1180816"
},
{
"category": "external",
"summary": "SUSE Bug 1186493 for CVE-2021-20178",
"url": "https://bugzilla.suse.com/1186493"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Manager Client Tools 15-BETA:ansible-2.9.27-159000.3.9.1.noarch",
"SUSE Manager Client Tools 15-BETA:ansible-doc-2.9.27-159000.3.9.1.noarch",
"SUSE Manager Client Tools 15-BETA:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch",
"SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.aarch64",
"SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.s390x",
"SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.x86_64",
"SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64",
"SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x",
"SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64",
"SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.aarch64",
"SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.s390x",
"SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.x86_64",
"SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.aarch64",
"SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.s390x",
"SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.x86_64",
"SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.aarch64",
"SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.s390x",
"SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.x86_64",
"SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.aarch64",
"SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.s390x",
"SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.x86_64",
"SUSE Manager Client Tools 15-BETA:mgr-push-5.0.1-159000.4.21.1.noarch",
"SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64",
"SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x",
"SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64",
"SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.aarch64",
"SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.s390x",
"SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.x86_64",
"SUSE Manager Client Tools 15-BETA:python3-hwdata-2.3.5-159000.5.13.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-mgr-push-5.0.1-159000.4.21.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-pyvmomi-6.7.3-159000.3.6.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-rhnlib-5.0.1-159000.6.30.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-spacewalk-check-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-setup-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-tools-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.aarch64",
"SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.s390x",
"SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.x86_64",
"SUSE Manager Client Tools 15-BETA:spacecmd-5.0.1-159000.6.42.1.noarch",
"SUSE Manager Client Tools 15-BETA:spacewalk-check-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:spacewalk-client-setup-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:spacewalk-client-tools-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:supportutils-plugin-salt-1.2.2-159000.5.9.1.noarch",
"SUSE Manager Client Tools 15-BETA:supportutils-plugin-susemanager-client-5.0.1-159000.6.15.1.noarch",
"SUSE Manager Client Tools 15-BETA:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch",
"SUSE Manager Client Tools Beta for SLE Micro 5:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch",
"SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64",
"SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x",
"SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64",
"SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64",
"SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x",
"SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64",
"SUSE Manager Client Tools Beta for SLE Micro 5:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Manager Client Tools 15-BETA:ansible-2.9.27-159000.3.9.1.noarch",
"SUSE Manager Client Tools 15-BETA:ansible-doc-2.9.27-159000.3.9.1.noarch",
"SUSE Manager Client Tools 15-BETA:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch",
"SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.aarch64",
"SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.s390x",
"SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.x86_64",
"SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64",
"SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x",
"SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64",
"SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.aarch64",
"SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.s390x",
"SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.x86_64",
"SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.aarch64",
"SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.s390x",
"SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.x86_64",
"SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.aarch64",
"SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.s390x",
"SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.x86_64",
"SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.aarch64",
"SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.s390x",
"SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.x86_64",
"SUSE Manager Client Tools 15-BETA:mgr-push-5.0.1-159000.4.21.1.noarch",
"SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64",
"SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x",
"SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64",
"SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.aarch64",
"SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.s390x",
"SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.x86_64",
"SUSE Manager Client Tools 15-BETA:python3-hwdata-2.3.5-159000.5.13.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-mgr-push-5.0.1-159000.4.21.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-pyvmomi-6.7.3-159000.3.6.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-rhnlib-5.0.1-159000.6.30.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-spacewalk-check-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-setup-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-tools-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.aarch64",
"SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.s390x",
"SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.x86_64",
"SUSE Manager Client Tools 15-BETA:spacecmd-5.0.1-159000.6.42.1.noarch",
"SUSE Manager Client Tools 15-BETA:spacewalk-check-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:spacewalk-client-setup-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:spacewalk-client-tools-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:supportutils-plugin-salt-1.2.2-159000.5.9.1.noarch",
"SUSE Manager Client Tools 15-BETA:supportutils-plugin-susemanager-client-5.0.1-159000.6.15.1.noarch",
"SUSE Manager Client Tools 15-BETA:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch",
"SUSE Manager Client Tools Beta for SLE Micro 5:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch",
"SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64",
"SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x",
"SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64",
"SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64",
"SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x",
"SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64",
"SUSE Manager Client Tools Beta for SLE Micro 5:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-01-23T15:20:05Z",
"details": "moderate"
}
],
"title": "CVE-2021-20178"
},
{
"cve": "CVE-2021-20180",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-20180"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in ansible module where credentials are disclosed in the console log by default and not protected by the security feature when using the bitbucket_pipeline_variable module. This flaw allows an attacker to steal bitbucket_pipeline credentials. The highest threat from this vulnerability is to confidentiality.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Manager Client Tools 15-BETA:ansible-2.9.27-159000.3.9.1.noarch",
"SUSE Manager Client Tools 15-BETA:ansible-doc-2.9.27-159000.3.9.1.noarch",
"SUSE Manager Client Tools 15-BETA:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch",
"SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.aarch64",
"SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.s390x",
"SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.x86_64",
"SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64",
"SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x",
"SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64",
"SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.aarch64",
"SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.s390x",
"SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.x86_64",
"SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.aarch64",
"SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.s390x",
"SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.x86_64",
"SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.aarch64",
"SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.s390x",
"SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.x86_64",
"SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.aarch64",
"SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.s390x",
"SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.x86_64",
"SUSE Manager Client Tools 15-BETA:mgr-push-5.0.1-159000.4.21.1.noarch",
"SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64",
"SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x",
"SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64",
"SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.aarch64",
"SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.s390x",
"SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.x86_64",
"SUSE Manager Client Tools 15-BETA:python3-hwdata-2.3.5-159000.5.13.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-mgr-push-5.0.1-159000.4.21.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-pyvmomi-6.7.3-159000.3.6.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-rhnlib-5.0.1-159000.6.30.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-spacewalk-check-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-setup-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-tools-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.aarch64",
"SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.s390x",
"SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.x86_64",
"SUSE Manager Client Tools 15-BETA:spacecmd-5.0.1-159000.6.42.1.noarch",
"SUSE Manager Client Tools 15-BETA:spacewalk-check-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:spacewalk-client-setup-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:spacewalk-client-tools-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:supportutils-plugin-salt-1.2.2-159000.5.9.1.noarch",
"SUSE Manager Client Tools 15-BETA:supportutils-plugin-susemanager-client-5.0.1-159000.6.15.1.noarch",
"SUSE Manager Client Tools 15-BETA:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch",
"SUSE Manager Client Tools Beta for SLE Micro 5:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch",
"SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64",
"SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x",
"SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64",
"SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64",
"SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x",
"SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64",
"SUSE Manager Client Tools Beta for SLE Micro 5:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-20180",
"url": "https://www.suse.com/security/cve/CVE-2021-20180"
},
{
"category": "external",
"summary": "SUSE Bug 1180942 for CVE-2021-20180",
"url": "https://bugzilla.suse.com/1180942"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Manager Client Tools 15-BETA:ansible-2.9.27-159000.3.9.1.noarch",
"SUSE Manager Client Tools 15-BETA:ansible-doc-2.9.27-159000.3.9.1.noarch",
"SUSE Manager Client Tools 15-BETA:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch",
"SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.aarch64",
"SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.s390x",
"SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.x86_64",
"SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64",
"SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x",
"SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64",
"SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.aarch64",
"SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.s390x",
"SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.x86_64",
"SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.aarch64",
"SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.s390x",
"SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.x86_64",
"SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.aarch64",
"SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.s390x",
"SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.x86_64",
"SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.aarch64",
"SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.s390x",
"SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.x86_64",
"SUSE Manager Client Tools 15-BETA:mgr-push-5.0.1-159000.4.21.1.noarch",
"SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64",
"SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x",
"SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64",
"SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.aarch64",
"SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.s390x",
"SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.x86_64",
"SUSE Manager Client Tools 15-BETA:python3-hwdata-2.3.5-159000.5.13.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-mgr-push-5.0.1-159000.4.21.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-pyvmomi-6.7.3-159000.3.6.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-rhnlib-5.0.1-159000.6.30.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-spacewalk-check-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-setup-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-tools-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.aarch64",
"SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.s390x",
"SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.x86_64",
"SUSE Manager Client Tools 15-BETA:spacecmd-5.0.1-159000.6.42.1.noarch",
"SUSE Manager Client Tools 15-BETA:spacewalk-check-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:spacewalk-client-setup-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:spacewalk-client-tools-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:supportutils-plugin-salt-1.2.2-159000.5.9.1.noarch",
"SUSE Manager Client Tools 15-BETA:supportutils-plugin-susemanager-client-5.0.1-159000.6.15.1.noarch",
"SUSE Manager Client Tools 15-BETA:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch",
"SUSE Manager Client Tools Beta for SLE Micro 5:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch",
"SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64",
"SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x",
"SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64",
"SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64",
"SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x",
"SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64",
"SUSE Manager Client Tools Beta for SLE Micro 5:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Manager Client Tools 15-BETA:ansible-2.9.27-159000.3.9.1.noarch",
"SUSE Manager Client Tools 15-BETA:ansible-doc-2.9.27-159000.3.9.1.noarch",
"SUSE Manager Client Tools 15-BETA:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch",
"SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.aarch64",
"SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.s390x",
"SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.x86_64",
"SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64",
"SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x",
"SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64",
"SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.aarch64",
"SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.s390x",
"SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.x86_64",
"SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.aarch64",
"SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.s390x",
"SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.x86_64",
"SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.aarch64",
"SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.s390x",
"SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.x86_64",
"SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.aarch64",
"SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.s390x",
"SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.x86_64",
"SUSE Manager Client Tools 15-BETA:mgr-push-5.0.1-159000.4.21.1.noarch",
"SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64",
"SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x",
"SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64",
"SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.aarch64",
"SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.s390x",
"SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.x86_64",
"SUSE Manager Client Tools 15-BETA:python3-hwdata-2.3.5-159000.5.13.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-mgr-push-5.0.1-159000.4.21.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-pyvmomi-6.7.3-159000.3.6.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-rhnlib-5.0.1-159000.6.30.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-spacewalk-check-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-setup-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-tools-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.aarch64",
"SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.s390x",
"SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.x86_64",
"SUSE Manager Client Tools 15-BETA:spacecmd-5.0.1-159000.6.42.1.noarch",
"SUSE Manager Client Tools 15-BETA:spacewalk-check-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:spacewalk-client-setup-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:spacewalk-client-tools-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:supportutils-plugin-salt-1.2.2-159000.5.9.1.noarch",
"SUSE Manager Client Tools 15-BETA:supportutils-plugin-susemanager-client-5.0.1-159000.6.15.1.noarch",
"SUSE Manager Client Tools 15-BETA:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch",
"SUSE Manager Client Tools Beta for SLE Micro 5:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch",
"SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64",
"SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x",
"SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64",
"SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64",
"SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x",
"SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64",
"SUSE Manager Client Tools Beta for SLE Micro 5:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-01-23T15:20:05Z",
"details": "moderate"
}
],
"title": "CVE-2021-20180"
},
{
"cve": "CVE-2021-20191",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-20191"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in ansible. Credentials, such as secrets, are being disclosed in console log by default and not protected by no_log feature when using those modules. An attacker can take advantage of this information to steal those credentials. The highest threat from this vulnerability is to data confidentiality. Versions before ansible 2.9.18 are affected.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Manager Client Tools 15-BETA:ansible-2.9.27-159000.3.9.1.noarch",
"SUSE Manager Client Tools 15-BETA:ansible-doc-2.9.27-159000.3.9.1.noarch",
"SUSE Manager Client Tools 15-BETA:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch",
"SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.aarch64",
"SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.s390x",
"SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.x86_64",
"SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64",
"SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x",
"SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64",
"SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.aarch64",
"SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.s390x",
"SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.x86_64",
"SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.aarch64",
"SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.s390x",
"SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.x86_64",
"SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.aarch64",
"SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.s390x",
"SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.x86_64",
"SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.aarch64",
"SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.s390x",
"SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.x86_64",
"SUSE Manager Client Tools 15-BETA:mgr-push-5.0.1-159000.4.21.1.noarch",
"SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64",
"SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x",
"SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64",
"SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.aarch64",
"SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.s390x",
"SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.x86_64",
"SUSE Manager Client Tools 15-BETA:python3-hwdata-2.3.5-159000.5.13.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-mgr-push-5.0.1-159000.4.21.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-pyvmomi-6.7.3-159000.3.6.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-rhnlib-5.0.1-159000.6.30.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-spacewalk-check-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-setup-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-tools-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.aarch64",
"SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.s390x",
"SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.x86_64",
"SUSE Manager Client Tools 15-BETA:spacecmd-5.0.1-159000.6.42.1.noarch",
"SUSE Manager Client Tools 15-BETA:spacewalk-check-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:spacewalk-client-setup-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:spacewalk-client-tools-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:supportutils-plugin-salt-1.2.2-159000.5.9.1.noarch",
"SUSE Manager Client Tools 15-BETA:supportutils-plugin-susemanager-client-5.0.1-159000.6.15.1.noarch",
"SUSE Manager Client Tools 15-BETA:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch",
"SUSE Manager Client Tools Beta for SLE Micro 5:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch",
"SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64",
"SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x",
"SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64",
"SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64",
"SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x",
"SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64",
"SUSE Manager Client Tools Beta for SLE Micro 5:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-20191",
"url": "https://www.suse.com/security/cve/CVE-2021-20191"
},
{
"category": "external",
"summary": "SUSE Bug 1181119 for CVE-2021-20191",
"url": "https://bugzilla.suse.com/1181119"
},
{
"category": "external",
"summary": "SUSE Bug 1181935 for CVE-2021-20191",
"url": "https://bugzilla.suse.com/1181935"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Manager Client Tools 15-BETA:ansible-2.9.27-159000.3.9.1.noarch",
"SUSE Manager Client Tools 15-BETA:ansible-doc-2.9.27-159000.3.9.1.noarch",
"SUSE Manager Client Tools 15-BETA:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch",
"SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.aarch64",
"SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.s390x",
"SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.x86_64",
"SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64",
"SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x",
"SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64",
"SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.aarch64",
"SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.s390x",
"SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.x86_64",
"SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.aarch64",
"SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.s390x",
"SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.x86_64",
"SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.aarch64",
"SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.s390x",
"SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.x86_64",
"SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.aarch64",
"SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.s390x",
"SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.x86_64",
"SUSE Manager Client Tools 15-BETA:mgr-push-5.0.1-159000.4.21.1.noarch",
"SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64",
"SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x",
"SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64",
"SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.aarch64",
"SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.s390x",
"SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.x86_64",
"SUSE Manager Client Tools 15-BETA:python3-hwdata-2.3.5-159000.5.13.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-mgr-push-5.0.1-159000.4.21.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-pyvmomi-6.7.3-159000.3.6.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-rhnlib-5.0.1-159000.6.30.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-spacewalk-check-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-setup-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-tools-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.aarch64",
"SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.s390x",
"SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.x86_64",
"SUSE Manager Client Tools 15-BETA:spacecmd-5.0.1-159000.6.42.1.noarch",
"SUSE Manager Client Tools 15-BETA:spacewalk-check-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:spacewalk-client-setup-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:spacewalk-client-tools-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:supportutils-plugin-salt-1.2.2-159000.5.9.1.noarch",
"SUSE Manager Client Tools 15-BETA:supportutils-plugin-susemanager-client-5.0.1-159000.6.15.1.noarch",
"SUSE Manager Client Tools 15-BETA:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch",
"SUSE Manager Client Tools Beta for SLE Micro 5:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch",
"SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64",
"SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x",
"SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64",
"SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64",
"SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x",
"SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64",
"SUSE Manager Client Tools Beta for SLE Micro 5:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Manager Client Tools 15-BETA:ansible-2.9.27-159000.3.9.1.noarch",
"SUSE Manager Client Tools 15-BETA:ansible-doc-2.9.27-159000.3.9.1.noarch",
"SUSE Manager Client Tools 15-BETA:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch",
"SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.aarch64",
"SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.s390x",
"SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.x86_64",
"SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64",
"SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x",
"SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64",
"SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.aarch64",
"SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.s390x",
"SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.x86_64",
"SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.aarch64",
"SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.s390x",
"SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.x86_64",
"SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.aarch64",
"SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.s390x",
"SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.x86_64",
"SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.aarch64",
"SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.s390x",
"SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.x86_64",
"SUSE Manager Client Tools 15-BETA:mgr-push-5.0.1-159000.4.21.1.noarch",
"SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64",
"SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x",
"SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64",
"SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.aarch64",
"SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.s390x",
"SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.x86_64",
"SUSE Manager Client Tools 15-BETA:python3-hwdata-2.3.5-159000.5.13.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-mgr-push-5.0.1-159000.4.21.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-pyvmomi-6.7.3-159000.3.6.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-rhnlib-5.0.1-159000.6.30.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-spacewalk-check-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-setup-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-tools-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.aarch64",
"SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.s390x",
"SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.x86_64",
"SUSE Manager Client Tools 15-BETA:spacecmd-5.0.1-159000.6.42.1.noarch",
"SUSE Manager Client Tools 15-BETA:spacewalk-check-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:spacewalk-client-setup-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:spacewalk-client-tools-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:supportutils-plugin-salt-1.2.2-159000.5.9.1.noarch",
"SUSE Manager Client Tools 15-BETA:supportutils-plugin-susemanager-client-5.0.1-159000.6.15.1.noarch",
"SUSE Manager Client Tools 15-BETA:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch",
"SUSE Manager Client Tools Beta for SLE Micro 5:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch",
"SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64",
"SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x",
"SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64",
"SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64",
"SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x",
"SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64",
"SUSE Manager Client Tools Beta for SLE Micro 5:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-01-23T15:20:05Z",
"details": "moderate"
}
],
"title": "CVE-2021-20191"
},
{
"cve": "CVE-2021-20228",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-20228"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in the Ansible Engine 2.9.18, where sensitive info is not masked by default and is not protected by the no_log feature when using the sub-option feature of the basic.py module. This flaw allows an attacker to obtain sensitive information. The highest threat from this vulnerability is to confidentiality.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Manager Client Tools 15-BETA:ansible-2.9.27-159000.3.9.1.noarch",
"SUSE Manager Client Tools 15-BETA:ansible-doc-2.9.27-159000.3.9.1.noarch",
"SUSE Manager Client Tools 15-BETA:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch",
"SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.aarch64",
"SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.s390x",
"SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.x86_64",
"SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64",
"SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x",
"SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64",
"SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.aarch64",
"SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.s390x",
"SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.x86_64",
"SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.aarch64",
"SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.s390x",
"SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.x86_64",
"SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.aarch64",
"SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.s390x",
"SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.x86_64",
"SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.aarch64",
"SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.s390x",
"SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.x86_64",
"SUSE Manager Client Tools 15-BETA:mgr-push-5.0.1-159000.4.21.1.noarch",
"SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64",
"SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x",
"SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64",
"SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.aarch64",
"SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.s390x",
"SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.x86_64",
"SUSE Manager Client Tools 15-BETA:python3-hwdata-2.3.5-159000.5.13.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-mgr-push-5.0.1-159000.4.21.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-pyvmomi-6.7.3-159000.3.6.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-rhnlib-5.0.1-159000.6.30.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-spacewalk-check-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-setup-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-tools-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.aarch64",
"SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.s390x",
"SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.x86_64",
"SUSE Manager Client Tools 15-BETA:spacecmd-5.0.1-159000.6.42.1.noarch",
"SUSE Manager Client Tools 15-BETA:spacewalk-check-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:spacewalk-client-setup-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:spacewalk-client-tools-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:supportutils-plugin-salt-1.2.2-159000.5.9.1.noarch",
"SUSE Manager Client Tools 15-BETA:supportutils-plugin-susemanager-client-5.0.1-159000.6.15.1.noarch",
"SUSE Manager Client Tools 15-BETA:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch",
"SUSE Manager Client Tools Beta for SLE Micro 5:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch",
"SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64",
"SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x",
"SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64",
"SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64",
"SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x",
"SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64",
"SUSE Manager Client Tools Beta for SLE Micro 5:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-20228",
"url": "https://www.suse.com/security/cve/CVE-2021-20228"
},
{
"category": "external",
"summary": "SUSE Bug 1181935 for CVE-2021-20228",
"url": "https://bugzilla.suse.com/1181935"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Manager Client Tools 15-BETA:ansible-2.9.27-159000.3.9.1.noarch",
"SUSE Manager Client Tools 15-BETA:ansible-doc-2.9.27-159000.3.9.1.noarch",
"SUSE Manager Client Tools 15-BETA:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch",
"SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.aarch64",
"SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.s390x",
"SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.x86_64",
"SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64",
"SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x",
"SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64",
"SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.aarch64",
"SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.s390x",
"SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.x86_64",
"SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.aarch64",
"SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.s390x",
"SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.x86_64",
"SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.aarch64",
"SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.s390x",
"SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.x86_64",
"SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.aarch64",
"SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.s390x",
"SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.x86_64",
"SUSE Manager Client Tools 15-BETA:mgr-push-5.0.1-159000.4.21.1.noarch",
"SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64",
"SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x",
"SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64",
"SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.aarch64",
"SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.s390x",
"SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.x86_64",
"SUSE Manager Client Tools 15-BETA:python3-hwdata-2.3.5-159000.5.13.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-mgr-push-5.0.1-159000.4.21.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-pyvmomi-6.7.3-159000.3.6.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-rhnlib-5.0.1-159000.6.30.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-spacewalk-check-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-setup-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-tools-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.aarch64",
"SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.s390x",
"SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.x86_64",
"SUSE Manager Client Tools 15-BETA:spacecmd-5.0.1-159000.6.42.1.noarch",
"SUSE Manager Client Tools 15-BETA:spacewalk-check-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:spacewalk-client-setup-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:spacewalk-client-tools-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:supportutils-plugin-salt-1.2.2-159000.5.9.1.noarch",
"SUSE Manager Client Tools 15-BETA:supportutils-plugin-susemanager-client-5.0.1-159000.6.15.1.noarch",
"SUSE Manager Client Tools 15-BETA:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch",
"SUSE Manager Client Tools Beta for SLE Micro 5:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch",
"SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64",
"SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x",
"SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64",
"SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64",
"SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x",
"SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64",
"SUSE Manager Client Tools Beta for SLE Micro 5:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Manager Client Tools 15-BETA:ansible-2.9.27-159000.3.9.1.noarch",
"SUSE Manager Client Tools 15-BETA:ansible-doc-2.9.27-159000.3.9.1.noarch",
"SUSE Manager Client Tools 15-BETA:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch",
"SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.aarch64",
"SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.s390x",
"SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.x86_64",
"SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64",
"SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x",
"SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64",
"SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.aarch64",
"SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.s390x",
"SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.x86_64",
"SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.aarch64",
"SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.s390x",
"SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.x86_64",
"SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.aarch64",
"SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.s390x",
"SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.x86_64",
"SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.aarch64",
"SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.s390x",
"SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.x86_64",
"SUSE Manager Client Tools 15-BETA:mgr-push-5.0.1-159000.4.21.1.noarch",
"SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64",
"SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x",
"SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64",
"SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.aarch64",
"SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.s390x",
"SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.x86_64",
"SUSE Manager Client Tools 15-BETA:python3-hwdata-2.3.5-159000.5.13.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-mgr-push-5.0.1-159000.4.21.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-pyvmomi-6.7.3-159000.3.6.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-rhnlib-5.0.1-159000.6.30.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-spacewalk-check-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-setup-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-tools-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.aarch64",
"SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.s390x",
"SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.x86_64",
"SUSE Manager Client Tools 15-BETA:spacecmd-5.0.1-159000.6.42.1.noarch",
"SUSE Manager Client Tools 15-BETA:spacewalk-check-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:spacewalk-client-setup-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:spacewalk-client-tools-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:supportutils-plugin-salt-1.2.2-159000.5.9.1.noarch",
"SUSE Manager Client Tools 15-BETA:supportutils-plugin-susemanager-client-5.0.1-159000.6.15.1.noarch",
"SUSE Manager Client Tools 15-BETA:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch",
"SUSE Manager Client Tools Beta for SLE Micro 5:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch",
"SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64",
"SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x",
"SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64",
"SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64",
"SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x",
"SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64",
"SUSE Manager Client Tools Beta for SLE Micro 5:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-01-23T15:20:05Z",
"details": "moderate"
}
],
"title": "CVE-2021-20228"
},
{
"cve": "CVE-2021-3447",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-3447"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in several ansible modules, where parameters containing credentials, such as secrets, were being logged in plain-text on managed nodes, as well as being made visible on the controller node when run in verbose mode. These parameters were not protected by the no_log feature. An attacker can take advantage of this information to steal those credentials, provided when they have access to the log files containing them. The highest threat from this vulnerability is to data confidentiality. This flaw affects Red Hat Ansible Automation Platform in versions before 1.2.2 and Ansible Tower in versions before 3.8.2.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Manager Client Tools 15-BETA:ansible-2.9.27-159000.3.9.1.noarch",
"SUSE Manager Client Tools 15-BETA:ansible-doc-2.9.27-159000.3.9.1.noarch",
"SUSE Manager Client Tools 15-BETA:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch",
"SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.aarch64",
"SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.s390x",
"SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.x86_64",
"SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64",
"SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x",
"SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64",
"SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.aarch64",
"SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.s390x",
"SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.x86_64",
"SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.aarch64",
"SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.s390x",
"SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.x86_64",
"SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.aarch64",
"SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.s390x",
"SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.x86_64",
"SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.aarch64",
"SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.s390x",
"SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.x86_64",
"SUSE Manager Client Tools 15-BETA:mgr-push-5.0.1-159000.4.21.1.noarch",
"SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64",
"SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x",
"SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64",
"SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.aarch64",
"SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.s390x",
"SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.x86_64",
"SUSE Manager Client Tools 15-BETA:python3-hwdata-2.3.5-159000.5.13.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-mgr-push-5.0.1-159000.4.21.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-pyvmomi-6.7.3-159000.3.6.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-rhnlib-5.0.1-159000.6.30.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-spacewalk-check-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-setup-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-tools-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.aarch64",
"SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.s390x",
"SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.x86_64",
"SUSE Manager Client Tools 15-BETA:spacecmd-5.0.1-159000.6.42.1.noarch",
"SUSE Manager Client Tools 15-BETA:spacewalk-check-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:spacewalk-client-setup-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:spacewalk-client-tools-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:supportutils-plugin-salt-1.2.2-159000.5.9.1.noarch",
"SUSE Manager Client Tools 15-BETA:supportutils-plugin-susemanager-client-5.0.1-159000.6.15.1.noarch",
"SUSE Manager Client Tools 15-BETA:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch",
"SUSE Manager Client Tools Beta for SLE Micro 5:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch",
"SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64",
"SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x",
"SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64",
"SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64",
"SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x",
"SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64",
"SUSE Manager Client Tools Beta for SLE Micro 5:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-3447",
"url": "https://www.suse.com/security/cve/CVE-2021-3447"
},
{
"category": "external",
"summary": "SUSE Bug 1183684 for CVE-2021-3447",
"url": "https://bugzilla.suse.com/1183684"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Manager Client Tools 15-BETA:ansible-2.9.27-159000.3.9.1.noarch",
"SUSE Manager Client Tools 15-BETA:ansible-doc-2.9.27-159000.3.9.1.noarch",
"SUSE Manager Client Tools 15-BETA:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch",
"SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.aarch64",
"SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.s390x",
"SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.x86_64",
"SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64",
"SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x",
"SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64",
"SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.aarch64",
"SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.s390x",
"SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.x86_64",
"SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.aarch64",
"SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.s390x",
"SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.x86_64",
"SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.aarch64",
"SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.s390x",
"SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.x86_64",
"SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.aarch64",
"SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.s390x",
"SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.x86_64",
"SUSE Manager Client Tools 15-BETA:mgr-push-5.0.1-159000.4.21.1.noarch",
"SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64",
"SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x",
"SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64",
"SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.aarch64",
"SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.s390x",
"SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.x86_64",
"SUSE Manager Client Tools 15-BETA:python3-hwdata-2.3.5-159000.5.13.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-mgr-push-5.0.1-159000.4.21.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-pyvmomi-6.7.3-159000.3.6.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-rhnlib-5.0.1-159000.6.30.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-spacewalk-check-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-setup-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-tools-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.aarch64",
"SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.s390x",
"SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.x86_64",
"SUSE Manager Client Tools 15-BETA:spacecmd-5.0.1-159000.6.42.1.noarch",
"SUSE Manager Client Tools 15-BETA:spacewalk-check-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:spacewalk-client-setup-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:spacewalk-client-tools-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:supportutils-plugin-salt-1.2.2-159000.5.9.1.noarch",
"SUSE Manager Client Tools 15-BETA:supportutils-plugin-susemanager-client-5.0.1-159000.6.15.1.noarch",
"SUSE Manager Client Tools 15-BETA:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch",
"SUSE Manager Client Tools Beta for SLE Micro 5:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch",
"SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64",
"SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x",
"SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64",
"SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64",
"SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x",
"SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64",
"SUSE Manager Client Tools Beta for SLE Micro 5:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Manager Client Tools 15-BETA:ansible-2.9.27-159000.3.9.1.noarch",
"SUSE Manager Client Tools 15-BETA:ansible-doc-2.9.27-159000.3.9.1.noarch",
"SUSE Manager Client Tools 15-BETA:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch",
"SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.aarch64",
"SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.s390x",
"SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.x86_64",
"SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64",
"SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x",
"SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64",
"SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.aarch64",
"SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.s390x",
"SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.x86_64",
"SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.aarch64",
"SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.s390x",
"SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.x86_64",
"SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.aarch64",
"SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.s390x",
"SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.x86_64",
"SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.aarch64",
"SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.s390x",
"SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.x86_64",
"SUSE Manager Client Tools 15-BETA:mgr-push-5.0.1-159000.4.21.1.noarch",
"SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64",
"SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x",
"SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64",
"SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.aarch64",
"SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.s390x",
"SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.x86_64",
"SUSE Manager Client Tools 15-BETA:python3-hwdata-2.3.5-159000.5.13.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-mgr-push-5.0.1-159000.4.21.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-pyvmomi-6.7.3-159000.3.6.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-rhnlib-5.0.1-159000.6.30.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-spacewalk-check-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-setup-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-tools-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.aarch64",
"SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.s390x",
"SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.x86_64",
"SUSE Manager Client Tools 15-BETA:spacecmd-5.0.1-159000.6.42.1.noarch",
"SUSE Manager Client Tools 15-BETA:spacewalk-check-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:spacewalk-client-setup-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:spacewalk-client-tools-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:supportutils-plugin-salt-1.2.2-159000.5.9.1.noarch",
"SUSE Manager Client Tools 15-BETA:supportutils-plugin-susemanager-client-5.0.1-159000.6.15.1.noarch",
"SUSE Manager Client Tools 15-BETA:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch",
"SUSE Manager Client Tools Beta for SLE Micro 5:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch",
"SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64",
"SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x",
"SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64",
"SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64",
"SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x",
"SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64",
"SUSE Manager Client Tools Beta for SLE Micro 5:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-01-23T15:20:05Z",
"details": "moderate"
}
],
"title": "CVE-2021-3447"
},
{
"cve": "CVE-2021-3583",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-3583"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in Ansible, where a user\u0027s controller is vulnerable to template injection. This issue can occur through facts used in the template if the user is trying to put templates in multi-line YAML strings and the facts being handled do not routinely include special template characters. This flaw allows attackers to perform command injection, which discloses sensitive information. The highest threat from this vulnerability is to confidentiality and integrity.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Manager Client Tools 15-BETA:ansible-2.9.27-159000.3.9.1.noarch",
"SUSE Manager Client Tools 15-BETA:ansible-doc-2.9.27-159000.3.9.1.noarch",
"SUSE Manager Client Tools 15-BETA:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch",
"SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.aarch64",
"SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.s390x",
"SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.x86_64",
"SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64",
"SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x",
"SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64",
"SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.aarch64",
"SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.s390x",
"SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.x86_64",
"SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.aarch64",
"SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.s390x",
"SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.x86_64",
"SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.aarch64",
"SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.s390x",
"SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.x86_64",
"SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.aarch64",
"SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.s390x",
"SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.x86_64",
"SUSE Manager Client Tools 15-BETA:mgr-push-5.0.1-159000.4.21.1.noarch",
"SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64",
"SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x",
"SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64",
"SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.aarch64",
"SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.s390x",
"SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.x86_64",
"SUSE Manager Client Tools 15-BETA:python3-hwdata-2.3.5-159000.5.13.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-mgr-push-5.0.1-159000.4.21.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-pyvmomi-6.7.3-159000.3.6.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-rhnlib-5.0.1-159000.6.30.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-spacewalk-check-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-setup-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-tools-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.aarch64",
"SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.s390x",
"SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.x86_64",
"SUSE Manager Client Tools 15-BETA:spacecmd-5.0.1-159000.6.42.1.noarch",
"SUSE Manager Client Tools 15-BETA:spacewalk-check-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:spacewalk-client-setup-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:spacewalk-client-tools-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:supportutils-plugin-salt-1.2.2-159000.5.9.1.noarch",
"SUSE Manager Client Tools 15-BETA:supportutils-plugin-susemanager-client-5.0.1-159000.6.15.1.noarch",
"SUSE Manager Client Tools 15-BETA:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch",
"SUSE Manager Client Tools Beta for SLE Micro 5:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch",
"SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64",
"SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x",
"SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64",
"SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64",
"SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x",
"SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64",
"SUSE Manager Client Tools Beta for SLE Micro 5:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-3583",
"url": "https://www.suse.com/security/cve/CVE-2021-3583"
},
{
"category": "external",
"summary": "SUSE Bug 1188061 for CVE-2021-3583",
"url": "https://bugzilla.suse.com/1188061"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Manager Client Tools 15-BETA:ansible-2.9.27-159000.3.9.1.noarch",
"SUSE Manager Client Tools 15-BETA:ansible-doc-2.9.27-159000.3.9.1.noarch",
"SUSE Manager Client Tools 15-BETA:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch",
"SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.aarch64",
"SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.s390x",
"SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.x86_64",
"SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64",
"SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x",
"SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64",
"SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.aarch64",
"SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.s390x",
"SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.x86_64",
"SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.aarch64",
"SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.s390x",
"SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.x86_64",
"SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.aarch64",
"SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.s390x",
"SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.x86_64",
"SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.aarch64",
"SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.s390x",
"SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.x86_64",
"SUSE Manager Client Tools 15-BETA:mgr-push-5.0.1-159000.4.21.1.noarch",
"SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64",
"SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x",
"SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64",
"SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.aarch64",
"SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.s390x",
"SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.x86_64",
"SUSE Manager Client Tools 15-BETA:python3-hwdata-2.3.5-159000.5.13.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-mgr-push-5.0.1-159000.4.21.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-pyvmomi-6.7.3-159000.3.6.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-rhnlib-5.0.1-159000.6.30.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-spacewalk-check-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-setup-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-tools-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.aarch64",
"SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.s390x",
"SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.x86_64",
"SUSE Manager Client Tools 15-BETA:spacecmd-5.0.1-159000.6.42.1.noarch",
"SUSE Manager Client Tools 15-BETA:spacewalk-check-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:spacewalk-client-setup-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:spacewalk-client-tools-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:supportutils-plugin-salt-1.2.2-159000.5.9.1.noarch",
"SUSE Manager Client Tools 15-BETA:supportutils-plugin-susemanager-client-5.0.1-159000.6.15.1.noarch",
"SUSE Manager Client Tools 15-BETA:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch",
"SUSE Manager Client Tools Beta for SLE Micro 5:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch",
"SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64",
"SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x",
"SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64",
"SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64",
"SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x",
"SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64",
"SUSE Manager Client Tools Beta for SLE Micro 5:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"SUSE Manager Client Tools 15-BETA:ansible-2.9.27-159000.3.9.1.noarch",
"SUSE Manager Client Tools 15-BETA:ansible-doc-2.9.27-159000.3.9.1.noarch",
"SUSE Manager Client Tools 15-BETA:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch",
"SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.aarch64",
"SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.s390x",
"SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.x86_64",
"SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64",
"SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x",
"SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64",
"SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.aarch64",
"SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.s390x",
"SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.x86_64",
"SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.aarch64",
"SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.s390x",
"SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.x86_64",
"SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.aarch64",
"SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.s390x",
"SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.x86_64",
"SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.aarch64",
"SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.s390x",
"SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.x86_64",
"SUSE Manager Client Tools 15-BETA:mgr-push-5.0.1-159000.4.21.1.noarch",
"SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64",
"SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x",
"SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64",
"SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.aarch64",
"SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.s390x",
"SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.x86_64",
"SUSE Manager Client Tools 15-BETA:python3-hwdata-2.3.5-159000.5.13.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-mgr-push-5.0.1-159000.4.21.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-pyvmomi-6.7.3-159000.3.6.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-rhnlib-5.0.1-159000.6.30.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-spacewalk-check-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-setup-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-tools-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.aarch64",
"SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.s390x",
"SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.x86_64",
"SUSE Manager Client Tools 15-BETA:spacecmd-5.0.1-159000.6.42.1.noarch",
"SUSE Manager Client Tools 15-BETA:spacewalk-check-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:spacewalk-client-setup-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:spacewalk-client-tools-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:supportutils-plugin-salt-1.2.2-159000.5.9.1.noarch",
"SUSE Manager Client Tools 15-BETA:supportutils-plugin-susemanager-client-5.0.1-159000.6.15.1.noarch",
"SUSE Manager Client Tools 15-BETA:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch",
"SUSE Manager Client Tools Beta for SLE Micro 5:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch",
"SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64",
"SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x",
"SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64",
"SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64",
"SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x",
"SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64",
"SUSE Manager Client Tools Beta for SLE Micro 5:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-01-23T15:20:05Z",
"details": "moderate"
}
],
"title": "CVE-2021-3583"
},
{
"cve": "CVE-2021-3620",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-3620"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in Ansible Engine\u0027s ansible-connection module, where sensitive information such as the Ansible user credentials is disclosed by default in the traceback error message. The highest threat from this vulnerability is to confidentiality.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Manager Client Tools 15-BETA:ansible-2.9.27-159000.3.9.1.noarch",
"SUSE Manager Client Tools 15-BETA:ansible-doc-2.9.27-159000.3.9.1.noarch",
"SUSE Manager Client Tools 15-BETA:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch",
"SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.aarch64",
"SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.s390x",
"SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.x86_64",
"SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64",
"SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x",
"SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64",
"SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.aarch64",
"SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.s390x",
"SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.x86_64",
"SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.aarch64",
"SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.s390x",
"SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.x86_64",
"SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.aarch64",
"SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.s390x",
"SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.x86_64",
"SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.aarch64",
"SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.s390x",
"SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.x86_64",
"SUSE Manager Client Tools 15-BETA:mgr-push-5.0.1-159000.4.21.1.noarch",
"SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64",
"SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x",
"SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64",
"SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.aarch64",
"SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.s390x",
"SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.x86_64",
"SUSE Manager Client Tools 15-BETA:python3-hwdata-2.3.5-159000.5.13.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-mgr-push-5.0.1-159000.4.21.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-pyvmomi-6.7.3-159000.3.6.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-rhnlib-5.0.1-159000.6.30.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-spacewalk-check-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-setup-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-tools-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.aarch64",
"SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.s390x",
"SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.x86_64",
"SUSE Manager Client Tools 15-BETA:spacecmd-5.0.1-159000.6.42.1.noarch",
"SUSE Manager Client Tools 15-BETA:spacewalk-check-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:spacewalk-client-setup-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:spacewalk-client-tools-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:supportutils-plugin-salt-1.2.2-159000.5.9.1.noarch",
"SUSE Manager Client Tools 15-BETA:supportutils-plugin-susemanager-client-5.0.1-159000.6.15.1.noarch",
"SUSE Manager Client Tools 15-BETA:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch",
"SUSE Manager Client Tools Beta for SLE Micro 5:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch",
"SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64",
"SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x",
"SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64",
"SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64",
"SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x",
"SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64",
"SUSE Manager Client Tools Beta for SLE Micro 5:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-3620",
"url": "https://www.suse.com/security/cve/CVE-2021-3620"
},
{
"category": "external",
"summary": "SUSE Bug 1187725 for CVE-2021-3620",
"url": "https://bugzilla.suse.com/1187725"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Manager Client Tools 15-BETA:ansible-2.9.27-159000.3.9.1.noarch",
"SUSE Manager Client Tools 15-BETA:ansible-doc-2.9.27-159000.3.9.1.noarch",
"SUSE Manager Client Tools 15-BETA:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch",
"SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.aarch64",
"SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.s390x",
"SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.x86_64",
"SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64",
"SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x",
"SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64",
"SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.aarch64",
"SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.s390x",
"SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.x86_64",
"SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.aarch64",
"SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.s390x",
"SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.x86_64",
"SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.aarch64",
"SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.s390x",
"SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.x86_64",
"SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.aarch64",
"SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.s390x",
"SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.x86_64",
"SUSE Manager Client Tools 15-BETA:mgr-push-5.0.1-159000.4.21.1.noarch",
"SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64",
"SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x",
"SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64",
"SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.aarch64",
"SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.s390x",
"SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.x86_64",
"SUSE Manager Client Tools 15-BETA:python3-hwdata-2.3.5-159000.5.13.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-mgr-push-5.0.1-159000.4.21.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-pyvmomi-6.7.3-159000.3.6.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-rhnlib-5.0.1-159000.6.30.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-spacewalk-check-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-setup-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-tools-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.aarch64",
"SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.s390x",
"SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.x86_64",
"SUSE Manager Client Tools 15-BETA:spacecmd-5.0.1-159000.6.42.1.noarch",
"SUSE Manager Client Tools 15-BETA:spacewalk-check-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:spacewalk-client-setup-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:spacewalk-client-tools-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:supportutils-plugin-salt-1.2.2-159000.5.9.1.noarch",
"SUSE Manager Client Tools 15-BETA:supportutils-plugin-susemanager-client-5.0.1-159000.6.15.1.noarch",
"SUSE Manager Client Tools 15-BETA:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch",
"SUSE Manager Client Tools Beta for SLE Micro 5:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch",
"SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64",
"SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x",
"SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64",
"SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64",
"SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x",
"SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64",
"SUSE Manager Client Tools Beta for SLE Micro 5:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Manager Client Tools 15-BETA:ansible-2.9.27-159000.3.9.1.noarch",
"SUSE Manager Client Tools 15-BETA:ansible-doc-2.9.27-159000.3.9.1.noarch",
"SUSE Manager Client Tools 15-BETA:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch",
"SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.aarch64",
"SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.s390x",
"SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.x86_64",
"SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64",
"SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x",
"SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64",
"SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.aarch64",
"SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.s390x",
"SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.x86_64",
"SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.aarch64",
"SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.s390x",
"SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.x86_64",
"SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.aarch64",
"SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.s390x",
"SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.x86_64",
"SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.aarch64",
"SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.s390x",
"SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.x86_64",
"SUSE Manager Client Tools 15-BETA:mgr-push-5.0.1-159000.4.21.1.noarch",
"SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64",
"SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x",
"SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64",
"SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.aarch64",
"SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.s390x",
"SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.x86_64",
"SUSE Manager Client Tools 15-BETA:python3-hwdata-2.3.5-159000.5.13.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-mgr-push-5.0.1-159000.4.21.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-pyvmomi-6.7.3-159000.3.6.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-rhnlib-5.0.1-159000.6.30.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-spacewalk-check-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-setup-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-tools-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.aarch64",
"SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.s390x",
"SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.x86_64",
"SUSE Manager Client Tools 15-BETA:spacecmd-5.0.1-159000.6.42.1.noarch",
"SUSE Manager Client Tools 15-BETA:spacewalk-check-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:spacewalk-client-setup-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:spacewalk-client-tools-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:supportutils-plugin-salt-1.2.2-159000.5.9.1.noarch",
"SUSE Manager Client Tools 15-BETA:supportutils-plugin-susemanager-client-5.0.1-159000.6.15.1.noarch",
"SUSE Manager Client Tools 15-BETA:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch",
"SUSE Manager Client Tools Beta for SLE Micro 5:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch",
"SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64",
"SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x",
"SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64",
"SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64",
"SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x",
"SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64",
"SUSE Manager Client Tools Beta for SLE Micro 5:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-01-23T15:20:05Z",
"details": "moderate"
}
],
"title": "CVE-2021-3620"
},
{
"cve": "CVE-2021-36222",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-36222"
}
],
"notes": [
{
"category": "general",
"text": "ec_verify in kdc/kdc_preauth_ec.c in the Key Distribution Center (KDC) in MIT Kerberos 5 (aka krb5) before 1.18.4 and 1.19.x before 1.19.2 allows remote attackers to cause a NULL pointer dereference and daemon crash. This occurs because a return value is not properly managed in a certain situation.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Manager Client Tools 15-BETA:ansible-2.9.27-159000.3.9.1.noarch",
"SUSE Manager Client Tools 15-BETA:ansible-doc-2.9.27-159000.3.9.1.noarch",
"SUSE Manager Client Tools 15-BETA:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch",
"SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.aarch64",
"SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.s390x",
"SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.x86_64",
"SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64",
"SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x",
"SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64",
"SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.aarch64",
"SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.s390x",
"SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.x86_64",
"SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.aarch64",
"SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.s390x",
"SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.x86_64",
"SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.aarch64",
"SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.s390x",
"SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.x86_64",
"SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.aarch64",
"SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.s390x",
"SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.x86_64",
"SUSE Manager Client Tools 15-BETA:mgr-push-5.0.1-159000.4.21.1.noarch",
"SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64",
"SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x",
"SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64",
"SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.aarch64",
"SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.s390x",
"SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.x86_64",
"SUSE Manager Client Tools 15-BETA:python3-hwdata-2.3.5-159000.5.13.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-mgr-push-5.0.1-159000.4.21.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-pyvmomi-6.7.3-159000.3.6.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-rhnlib-5.0.1-159000.6.30.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-spacewalk-check-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-setup-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-tools-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.aarch64",
"SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.s390x",
"SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.x86_64",
"SUSE Manager Client Tools 15-BETA:spacecmd-5.0.1-159000.6.42.1.noarch",
"SUSE Manager Client Tools 15-BETA:spacewalk-check-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:spacewalk-client-setup-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:spacewalk-client-tools-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:supportutils-plugin-salt-1.2.2-159000.5.9.1.noarch",
"SUSE Manager Client Tools 15-BETA:supportutils-plugin-susemanager-client-5.0.1-159000.6.15.1.noarch",
"SUSE Manager Client Tools 15-BETA:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch",
"SUSE Manager Client Tools Beta for SLE Micro 5:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch",
"SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64",
"SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x",
"SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64",
"SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64",
"SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x",
"SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64",
"SUSE Manager Client Tools Beta for SLE Micro 5:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-36222",
"url": "https://www.suse.com/security/cve/CVE-2021-36222"
},
{
"category": "external",
"summary": "SUSE Bug 1188571 for CVE-2021-36222",
"url": "https://bugzilla.suse.com/1188571"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Manager Client Tools 15-BETA:ansible-2.9.27-159000.3.9.1.noarch",
"SUSE Manager Client Tools 15-BETA:ansible-doc-2.9.27-159000.3.9.1.noarch",
"SUSE Manager Client Tools 15-BETA:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch",
"SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.aarch64",
"SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.s390x",
"SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.x86_64",
"SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64",
"SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x",
"SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64",
"SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.aarch64",
"SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.s390x",
"SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.x86_64",
"SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.aarch64",
"SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.s390x",
"SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.x86_64",
"SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.aarch64",
"SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.s390x",
"SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.x86_64",
"SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.aarch64",
"SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.s390x",
"SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.x86_64",
"SUSE Manager Client Tools 15-BETA:mgr-push-5.0.1-159000.4.21.1.noarch",
"SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64",
"SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x",
"SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64",
"SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.aarch64",
"SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.s390x",
"SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.x86_64",
"SUSE Manager Client Tools 15-BETA:python3-hwdata-2.3.5-159000.5.13.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-mgr-push-5.0.1-159000.4.21.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-pyvmomi-6.7.3-159000.3.6.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-rhnlib-5.0.1-159000.6.30.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-spacewalk-check-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-setup-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-tools-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.aarch64",
"SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.s390x",
"SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.x86_64",
"SUSE Manager Client Tools 15-BETA:spacecmd-5.0.1-159000.6.42.1.noarch",
"SUSE Manager Client Tools 15-BETA:spacewalk-check-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:spacewalk-client-setup-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:spacewalk-client-tools-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:supportutils-plugin-salt-1.2.2-159000.5.9.1.noarch",
"SUSE Manager Client Tools 15-BETA:supportutils-plugin-susemanager-client-5.0.1-159000.6.15.1.noarch",
"SUSE Manager Client Tools 15-BETA:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch",
"SUSE Manager Client Tools Beta for SLE Micro 5:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch",
"SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64",
"SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x",
"SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64",
"SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64",
"SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x",
"SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64",
"SUSE Manager Client Tools Beta for SLE Micro 5:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Manager Client Tools 15-BETA:ansible-2.9.27-159000.3.9.1.noarch",
"SUSE Manager Client Tools 15-BETA:ansible-doc-2.9.27-159000.3.9.1.noarch",
"SUSE Manager Client Tools 15-BETA:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch",
"SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.aarch64",
"SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.s390x",
"SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.x86_64",
"SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64",
"SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x",
"SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64",
"SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.aarch64",
"SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.s390x",
"SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.x86_64",
"SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.aarch64",
"SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.s390x",
"SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.x86_64",
"SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.aarch64",
"SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.s390x",
"SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.x86_64",
"SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.aarch64",
"SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.s390x",
"SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.x86_64",
"SUSE Manager Client Tools 15-BETA:mgr-push-5.0.1-159000.4.21.1.noarch",
"SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64",
"SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x",
"SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64",
"SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.aarch64",
"SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.s390x",
"SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.x86_64",
"SUSE Manager Client Tools 15-BETA:python3-hwdata-2.3.5-159000.5.13.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-mgr-push-5.0.1-159000.4.21.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-pyvmomi-6.7.3-159000.3.6.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-rhnlib-5.0.1-159000.6.30.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-spacewalk-check-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-setup-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-tools-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.aarch64",
"SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.s390x",
"SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.x86_64",
"SUSE Manager Client Tools 15-BETA:spacecmd-5.0.1-159000.6.42.1.noarch",
"SUSE Manager Client Tools 15-BETA:spacewalk-check-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:spacewalk-client-setup-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:spacewalk-client-tools-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:supportutils-plugin-salt-1.2.2-159000.5.9.1.noarch",
"SUSE Manager Client Tools 15-BETA:supportutils-plugin-susemanager-client-5.0.1-159000.6.15.1.noarch",
"SUSE Manager Client Tools 15-BETA:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch",
"SUSE Manager Client Tools Beta for SLE Micro 5:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch",
"SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64",
"SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x",
"SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64",
"SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64",
"SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x",
"SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64",
"SUSE Manager Client Tools Beta for SLE Micro 5:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-01-23T15:20:05Z",
"details": "important"
}
],
"title": "CVE-2021-36222"
},
{
"cve": "CVE-2021-3711",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-3711"
}
],
"notes": [
{
"category": "general",
"text": "In order to decrypt SM2 encrypted data an application is expected to call the API function EVP_PKEY_decrypt(). Typically an application will call this function twice. The first time, on entry, the \"out\" parameter can be NULL and, on exit, the \"outlen\" parameter is populated with the buffer size required to hold the decrypted plaintext. The application can then allocate a sufficiently sized buffer and call EVP_PKEY_decrypt() again, but this time passing a non-NULL value for the \"out\" parameter. A bug in the implementation of the SM2 decryption code means that the calculation of the buffer size required to hold the plaintext returned by the first call to EVP_PKEY_decrypt() can be smaller than the actual size required by the second call. This can lead to a buffer overflow when EVP_PKEY_decrypt() is called by the application a second time with a buffer that is too small. A malicious attacker who is able present SM2 content for decryption to an application could cause attacker chosen data to overflow the buffer by up to a maximum of 62 bytes altering the contents of other data held after the buffer, possibly changing application behaviour or causing the application to crash. The location of the buffer is application dependent but is typically heap allocated. Fixed in OpenSSL 1.1.1l (Affected 1.1.1-1.1.1k).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Manager Client Tools 15-BETA:ansible-2.9.27-159000.3.9.1.noarch",
"SUSE Manager Client Tools 15-BETA:ansible-doc-2.9.27-159000.3.9.1.noarch",
"SUSE Manager Client Tools 15-BETA:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch",
"SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.aarch64",
"SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.s390x",
"SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.x86_64",
"SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64",
"SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x",
"SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64",
"SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.aarch64",
"SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.s390x",
"SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.x86_64",
"SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.aarch64",
"SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.s390x",
"SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.x86_64",
"SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.aarch64",
"SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.s390x",
"SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.x86_64",
"SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.aarch64",
"SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.s390x",
"SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.x86_64",
"SUSE Manager Client Tools 15-BETA:mgr-push-5.0.1-159000.4.21.1.noarch",
"SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64",
"SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x",
"SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64",
"SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.aarch64",
"SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.s390x",
"SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.x86_64",
"SUSE Manager Client Tools 15-BETA:python3-hwdata-2.3.5-159000.5.13.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-mgr-push-5.0.1-159000.4.21.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-pyvmomi-6.7.3-159000.3.6.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-rhnlib-5.0.1-159000.6.30.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-spacewalk-check-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-setup-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-tools-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.aarch64",
"SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.s390x",
"SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.x86_64",
"SUSE Manager Client Tools 15-BETA:spacecmd-5.0.1-159000.6.42.1.noarch",
"SUSE Manager Client Tools 15-BETA:spacewalk-check-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:spacewalk-client-setup-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:spacewalk-client-tools-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:supportutils-plugin-salt-1.2.2-159000.5.9.1.noarch",
"SUSE Manager Client Tools 15-BETA:supportutils-plugin-susemanager-client-5.0.1-159000.6.15.1.noarch",
"SUSE Manager Client Tools 15-BETA:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch",
"SUSE Manager Client Tools Beta for SLE Micro 5:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch",
"SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64",
"SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x",
"SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64",
"SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64",
"SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x",
"SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64",
"SUSE Manager Client Tools Beta for SLE Micro 5:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-3711",
"url": "https://www.suse.com/security/cve/CVE-2021-3711"
},
{
"category": "external",
"summary": "SUSE Bug 1189520 for CVE-2021-3711",
"url": "https://bugzilla.suse.com/1189520"
},
{
"category": "external",
"summary": "SUSE Bug 1190129 for CVE-2021-3711",
"url": "https://bugzilla.suse.com/1190129"
},
{
"category": "external",
"summary": "SUSE Bug 1192100 for CVE-2021-3711",
"url": "https://bugzilla.suse.com/1192100"
},
{
"category": "external",
"summary": "SUSE Bug 1205663 for CVE-2021-3711",
"url": "https://bugzilla.suse.com/1205663"
},
{
"category": "external",
"summary": "SUSE Bug 1225628 for CVE-2021-3711",
"url": "https://bugzilla.suse.com/1225628"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Manager Client Tools 15-BETA:ansible-2.9.27-159000.3.9.1.noarch",
"SUSE Manager Client Tools 15-BETA:ansible-doc-2.9.27-159000.3.9.1.noarch",
"SUSE Manager Client Tools 15-BETA:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch",
"SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.aarch64",
"SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.s390x",
"SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.x86_64",
"SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64",
"SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x",
"SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64",
"SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.aarch64",
"SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.s390x",
"SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.x86_64",
"SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.aarch64",
"SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.s390x",
"SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.x86_64",
"SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.aarch64",
"SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.s390x",
"SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.x86_64",
"SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.aarch64",
"SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.s390x",
"SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.x86_64",
"SUSE Manager Client Tools 15-BETA:mgr-push-5.0.1-159000.4.21.1.noarch",
"SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64",
"SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x",
"SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64",
"SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.aarch64",
"SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.s390x",
"SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.x86_64",
"SUSE Manager Client Tools 15-BETA:python3-hwdata-2.3.5-159000.5.13.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-mgr-push-5.0.1-159000.4.21.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-pyvmomi-6.7.3-159000.3.6.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-rhnlib-5.0.1-159000.6.30.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-spacewalk-check-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-setup-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-tools-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.aarch64",
"SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.s390x",
"SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.x86_64",
"SUSE Manager Client Tools 15-BETA:spacecmd-5.0.1-159000.6.42.1.noarch",
"SUSE Manager Client Tools 15-BETA:spacewalk-check-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:spacewalk-client-setup-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:spacewalk-client-tools-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:supportutils-plugin-salt-1.2.2-159000.5.9.1.noarch",
"SUSE Manager Client Tools 15-BETA:supportutils-plugin-susemanager-client-5.0.1-159000.6.15.1.noarch",
"SUSE Manager Client Tools 15-BETA:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch",
"SUSE Manager Client Tools Beta for SLE Micro 5:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch",
"SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64",
"SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x",
"SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64",
"SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64",
"SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x",
"SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64",
"SUSE Manager Client Tools Beta for SLE Micro 5:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Manager Client Tools 15-BETA:ansible-2.9.27-159000.3.9.1.noarch",
"SUSE Manager Client Tools 15-BETA:ansible-doc-2.9.27-159000.3.9.1.noarch",
"SUSE Manager Client Tools 15-BETA:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch",
"SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.aarch64",
"SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.s390x",
"SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.x86_64",
"SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64",
"SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x",
"SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64",
"SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.aarch64",
"SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.s390x",
"SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.x86_64",
"SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.aarch64",
"SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.s390x",
"SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.x86_64",
"SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.aarch64",
"SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.s390x",
"SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.x86_64",
"SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.aarch64",
"SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.s390x",
"SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.x86_64",
"SUSE Manager Client Tools 15-BETA:mgr-push-5.0.1-159000.4.21.1.noarch",
"SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64",
"SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x",
"SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64",
"SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.aarch64",
"SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.s390x",
"SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.x86_64",
"SUSE Manager Client Tools 15-BETA:python3-hwdata-2.3.5-159000.5.13.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-mgr-push-5.0.1-159000.4.21.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-pyvmomi-6.7.3-159000.3.6.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-rhnlib-5.0.1-159000.6.30.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-spacewalk-check-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-setup-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-tools-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.aarch64",
"SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.s390x",
"SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.x86_64",
"SUSE Manager Client Tools 15-BETA:spacecmd-5.0.1-159000.6.42.1.noarch",
"SUSE Manager Client Tools 15-BETA:spacewalk-check-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:spacewalk-client-setup-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:spacewalk-client-tools-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:supportutils-plugin-salt-1.2.2-159000.5.9.1.noarch",
"SUSE Manager Client Tools 15-BETA:supportutils-plugin-susemanager-client-5.0.1-159000.6.15.1.noarch",
"SUSE Manager Client Tools 15-BETA:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch",
"SUSE Manager Client Tools Beta for SLE Micro 5:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch",
"SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64",
"SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x",
"SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64",
"SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64",
"SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x",
"SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64",
"SUSE Manager Client Tools Beta for SLE Micro 5:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-01-23T15:20:05Z",
"details": "critical"
}
],
"title": "CVE-2021-3711"
},
{
"cve": "CVE-2021-3807",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-3807"
}
],
"notes": [
{
"category": "general",
"text": "ansi-regex is vulnerable to Inefficient Regular Expression Complexity",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Manager Client Tools 15-BETA:ansible-2.9.27-159000.3.9.1.noarch",
"SUSE Manager Client Tools 15-BETA:ansible-doc-2.9.27-159000.3.9.1.noarch",
"SUSE Manager Client Tools 15-BETA:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch",
"SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.aarch64",
"SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.s390x",
"SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.x86_64",
"SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64",
"SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x",
"SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64",
"SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.aarch64",
"SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.s390x",
"SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.x86_64",
"SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.aarch64",
"SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.s390x",
"SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.x86_64",
"SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.aarch64",
"SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.s390x",
"SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.x86_64",
"SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.aarch64",
"SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.s390x",
"SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.x86_64",
"SUSE Manager Client Tools 15-BETA:mgr-push-5.0.1-159000.4.21.1.noarch",
"SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64",
"SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x",
"SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64",
"SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.aarch64",
"SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.s390x",
"SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.x86_64",
"SUSE Manager Client Tools 15-BETA:python3-hwdata-2.3.5-159000.5.13.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-mgr-push-5.0.1-159000.4.21.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-pyvmomi-6.7.3-159000.3.6.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-rhnlib-5.0.1-159000.6.30.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-spacewalk-check-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-setup-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-tools-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.aarch64",
"SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.s390x",
"SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.x86_64",
"SUSE Manager Client Tools 15-BETA:spacecmd-5.0.1-159000.6.42.1.noarch",
"SUSE Manager Client Tools 15-BETA:spacewalk-check-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:spacewalk-client-setup-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:spacewalk-client-tools-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:supportutils-plugin-salt-1.2.2-159000.5.9.1.noarch",
"SUSE Manager Client Tools 15-BETA:supportutils-plugin-susemanager-client-5.0.1-159000.6.15.1.noarch",
"SUSE Manager Client Tools 15-BETA:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch",
"SUSE Manager Client Tools Beta for SLE Micro 5:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch",
"SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64",
"SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x",
"SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64",
"SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64",
"SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x",
"SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64",
"SUSE Manager Client Tools Beta for SLE Micro 5:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-3807",
"url": "https://www.suse.com/security/cve/CVE-2021-3807"
},
{
"category": "external",
"summary": "SUSE Bug 1192154 for CVE-2021-3807",
"url": "https://bugzilla.suse.com/1192154"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Manager Client Tools 15-BETA:ansible-2.9.27-159000.3.9.1.noarch",
"SUSE Manager Client Tools 15-BETA:ansible-doc-2.9.27-159000.3.9.1.noarch",
"SUSE Manager Client Tools 15-BETA:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch",
"SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.aarch64",
"SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.s390x",
"SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.x86_64",
"SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64",
"SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x",
"SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64",
"SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.aarch64",
"SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.s390x",
"SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.x86_64",
"SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.aarch64",
"SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.s390x",
"SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.x86_64",
"SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.aarch64",
"SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.s390x",
"SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.x86_64",
"SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.aarch64",
"SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.s390x",
"SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.x86_64",
"SUSE Manager Client Tools 15-BETA:mgr-push-5.0.1-159000.4.21.1.noarch",
"SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64",
"SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x",
"SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64",
"SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.aarch64",
"SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.s390x",
"SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.x86_64",
"SUSE Manager Client Tools 15-BETA:python3-hwdata-2.3.5-159000.5.13.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-mgr-push-5.0.1-159000.4.21.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-pyvmomi-6.7.3-159000.3.6.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-rhnlib-5.0.1-159000.6.30.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-spacewalk-check-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-setup-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-tools-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.aarch64",
"SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.s390x",
"SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.x86_64",
"SUSE Manager Client Tools 15-BETA:spacecmd-5.0.1-159000.6.42.1.noarch",
"SUSE Manager Client Tools 15-BETA:spacewalk-check-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:spacewalk-client-setup-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:spacewalk-client-tools-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:supportutils-plugin-salt-1.2.2-159000.5.9.1.noarch",
"SUSE Manager Client Tools 15-BETA:supportutils-plugin-susemanager-client-5.0.1-159000.6.15.1.noarch",
"SUSE Manager Client Tools 15-BETA:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch",
"SUSE Manager Client Tools Beta for SLE Micro 5:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch",
"SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64",
"SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x",
"SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64",
"SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64",
"SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x",
"SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64",
"SUSE Manager Client Tools Beta for SLE Micro 5:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Manager Client Tools 15-BETA:ansible-2.9.27-159000.3.9.1.noarch",
"SUSE Manager Client Tools 15-BETA:ansible-doc-2.9.27-159000.3.9.1.noarch",
"SUSE Manager Client Tools 15-BETA:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch",
"SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.aarch64",
"SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.s390x",
"SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.x86_64",
"SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64",
"SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x",
"SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64",
"SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.aarch64",
"SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.s390x",
"SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.x86_64",
"SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.aarch64",
"SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.s390x",
"SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.x86_64",
"SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.aarch64",
"SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.s390x",
"SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.x86_64",
"SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.aarch64",
"SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.s390x",
"SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.x86_64",
"SUSE Manager Client Tools 15-BETA:mgr-push-5.0.1-159000.4.21.1.noarch",
"SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64",
"SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x",
"SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64",
"SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.aarch64",
"SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.s390x",
"SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.x86_64",
"SUSE Manager Client Tools 15-BETA:python3-hwdata-2.3.5-159000.5.13.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-mgr-push-5.0.1-159000.4.21.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-pyvmomi-6.7.3-159000.3.6.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-rhnlib-5.0.1-159000.6.30.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-spacewalk-check-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-setup-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-tools-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.aarch64",
"SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.s390x",
"SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.x86_64",
"SUSE Manager Client Tools 15-BETA:spacecmd-5.0.1-159000.6.42.1.noarch",
"SUSE Manager Client Tools 15-BETA:spacewalk-check-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:spacewalk-client-setup-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:spacewalk-client-tools-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:supportutils-plugin-salt-1.2.2-159000.5.9.1.noarch",
"SUSE Manager Client Tools 15-BETA:supportutils-plugin-susemanager-client-5.0.1-159000.6.15.1.noarch",
"SUSE Manager Client Tools 15-BETA:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch",
"SUSE Manager Client Tools Beta for SLE Micro 5:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch",
"SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64",
"SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x",
"SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64",
"SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64",
"SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x",
"SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64",
"SUSE Manager Client Tools Beta for SLE Micro 5:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-01-23T15:20:05Z",
"details": "important"
}
],
"title": "CVE-2021-3807"
},
{
"cve": "CVE-2021-3918",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-3918"
}
],
"notes": [
{
"category": "general",
"text": "json-schema is vulnerable to Improperly Controlled Modification of Object Prototype Attributes (\u0027Prototype Pollution\u0027)",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Manager Client Tools 15-BETA:ansible-2.9.27-159000.3.9.1.noarch",
"SUSE Manager Client Tools 15-BETA:ansible-doc-2.9.27-159000.3.9.1.noarch",
"SUSE Manager Client Tools 15-BETA:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch",
"SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.aarch64",
"SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.s390x",
"SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.x86_64",
"SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64",
"SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x",
"SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64",
"SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.aarch64",
"SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.s390x",
"SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.x86_64",
"SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.aarch64",
"SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.s390x",
"SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.x86_64",
"SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.aarch64",
"SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.s390x",
"SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.x86_64",
"SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.aarch64",
"SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.s390x",
"SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.x86_64",
"SUSE Manager Client Tools 15-BETA:mgr-push-5.0.1-159000.4.21.1.noarch",
"SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64",
"SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x",
"SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64",
"SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.aarch64",
"SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.s390x",
"SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.x86_64",
"SUSE Manager Client Tools 15-BETA:python3-hwdata-2.3.5-159000.5.13.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-mgr-push-5.0.1-159000.4.21.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-pyvmomi-6.7.3-159000.3.6.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-rhnlib-5.0.1-159000.6.30.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-spacewalk-check-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-setup-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-tools-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.aarch64",
"SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.s390x",
"SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.x86_64",
"SUSE Manager Client Tools 15-BETA:spacecmd-5.0.1-159000.6.42.1.noarch",
"SUSE Manager Client Tools 15-BETA:spacewalk-check-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:spacewalk-client-setup-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:spacewalk-client-tools-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:supportutils-plugin-salt-1.2.2-159000.5.9.1.noarch",
"SUSE Manager Client Tools 15-BETA:supportutils-plugin-susemanager-client-5.0.1-159000.6.15.1.noarch",
"SUSE Manager Client Tools 15-BETA:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch",
"SUSE Manager Client Tools Beta for SLE Micro 5:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch",
"SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64",
"SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x",
"SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64",
"SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64",
"SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x",
"SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64",
"SUSE Manager Client Tools Beta for SLE Micro 5:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-3918",
"url": "https://www.suse.com/security/cve/CVE-2021-3918"
},
{
"category": "external",
"summary": "SUSE Bug 1192696 for CVE-2021-3918",
"url": "https://bugzilla.suse.com/1192696"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Manager Client Tools 15-BETA:ansible-2.9.27-159000.3.9.1.noarch",
"SUSE Manager Client Tools 15-BETA:ansible-doc-2.9.27-159000.3.9.1.noarch",
"SUSE Manager Client Tools 15-BETA:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch",
"SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.aarch64",
"SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.s390x",
"SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.x86_64",
"SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64",
"SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x",
"SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64",
"SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.aarch64",
"SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.s390x",
"SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.x86_64",
"SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.aarch64",
"SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.s390x",
"SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.x86_64",
"SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.aarch64",
"SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.s390x",
"SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.x86_64",
"SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.aarch64",
"SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.s390x",
"SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.x86_64",
"SUSE Manager Client Tools 15-BETA:mgr-push-5.0.1-159000.4.21.1.noarch",
"SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64",
"SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x",
"SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64",
"SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.aarch64",
"SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.s390x",
"SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.x86_64",
"SUSE Manager Client Tools 15-BETA:python3-hwdata-2.3.5-159000.5.13.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-mgr-push-5.0.1-159000.4.21.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-pyvmomi-6.7.3-159000.3.6.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-rhnlib-5.0.1-159000.6.30.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-spacewalk-check-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-setup-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-tools-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.aarch64",
"SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.s390x",
"SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.x86_64",
"SUSE Manager Client Tools 15-BETA:spacecmd-5.0.1-159000.6.42.1.noarch",
"SUSE Manager Client Tools 15-BETA:spacewalk-check-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:spacewalk-client-setup-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:spacewalk-client-tools-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:supportutils-plugin-salt-1.2.2-159000.5.9.1.noarch",
"SUSE Manager Client Tools 15-BETA:supportutils-plugin-susemanager-client-5.0.1-159000.6.15.1.noarch",
"SUSE Manager Client Tools 15-BETA:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch",
"SUSE Manager Client Tools Beta for SLE Micro 5:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch",
"SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64",
"SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x",
"SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64",
"SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64",
"SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x",
"SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64",
"SUSE Manager Client Tools Beta for SLE Micro 5:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Manager Client Tools 15-BETA:ansible-2.9.27-159000.3.9.1.noarch",
"SUSE Manager Client Tools 15-BETA:ansible-doc-2.9.27-159000.3.9.1.noarch",
"SUSE Manager Client Tools 15-BETA:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch",
"SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.aarch64",
"SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.s390x",
"SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.x86_64",
"SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64",
"SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x",
"SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64",
"SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.aarch64",
"SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.s390x",
"SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.x86_64",
"SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.aarch64",
"SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.s390x",
"SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.x86_64",
"SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.aarch64",
"SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.s390x",
"SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.x86_64",
"SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.aarch64",
"SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.s390x",
"SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.x86_64",
"SUSE Manager Client Tools 15-BETA:mgr-push-5.0.1-159000.4.21.1.noarch",
"SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64",
"SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x",
"SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64",
"SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.aarch64",
"SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.s390x",
"SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.x86_64",
"SUSE Manager Client Tools 15-BETA:python3-hwdata-2.3.5-159000.5.13.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-mgr-push-5.0.1-159000.4.21.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-pyvmomi-6.7.3-159000.3.6.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-rhnlib-5.0.1-159000.6.30.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-spacewalk-check-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-setup-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-tools-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.aarch64",
"SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.s390x",
"SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.x86_64",
"SUSE Manager Client Tools 15-BETA:spacecmd-5.0.1-159000.6.42.1.noarch",
"SUSE Manager Client Tools 15-BETA:spacewalk-check-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:spacewalk-client-setup-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:spacewalk-client-tools-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:supportutils-plugin-salt-1.2.2-159000.5.9.1.noarch",
"SUSE Manager Client Tools 15-BETA:supportutils-plugin-susemanager-client-5.0.1-159000.6.15.1.noarch",
"SUSE Manager Client Tools 15-BETA:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch",
"SUSE Manager Client Tools Beta for SLE Micro 5:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch",
"SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64",
"SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x",
"SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64",
"SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64",
"SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x",
"SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64",
"SUSE Manager Client Tools Beta for SLE Micro 5:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-01-23T15:20:05Z",
"details": "important"
}
],
"title": "CVE-2021-3918"
},
{
"cve": "CVE-2021-41174",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-41174"
}
],
"notes": [
{
"category": "general",
"text": "Grafana is an open-source platform for monitoring and observability. In affected versions if an attacker is able to convince a victim to visit a URL referencing a vulnerable page, arbitrary JavaScript content may be executed within the context of the victim\u0027s browser. The user visiting the malicious link must be unauthenticated and the link must be for a page that contains the login button in the menu bar. The url has to be crafted to exploit AngularJS rendering and contain the interpolation binding for AngularJS expressions. AngularJS uses double curly braces for interpolation binding: {{ }} ex: {{constructor.constructor(\u0027alert(1)\u0027)()}}. When the user follows the link and the page renders, the login button will contain the original link with a query parameter to force a redirect to the login page. The URL is not validated and the AngularJS rendering engine will execute the JavaScript expression contained in the URL. Users are advised to upgrade as soon as possible. If for some reason you cannot upgrade, you can use a reverse proxy or similar to block access to block the literal string {{ in the path.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Manager Client Tools 15-BETA:ansible-2.9.27-159000.3.9.1.noarch",
"SUSE Manager Client Tools 15-BETA:ansible-doc-2.9.27-159000.3.9.1.noarch",
"SUSE Manager Client Tools 15-BETA:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch",
"SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.aarch64",
"SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.s390x",
"SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.x86_64",
"SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64",
"SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x",
"SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64",
"SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.aarch64",
"SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.s390x",
"SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.x86_64",
"SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.aarch64",
"SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.s390x",
"SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.x86_64",
"SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.aarch64",
"SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.s390x",
"SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.x86_64",
"SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.aarch64",
"SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.s390x",
"SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.x86_64",
"SUSE Manager Client Tools 15-BETA:mgr-push-5.0.1-159000.4.21.1.noarch",
"SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64",
"SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x",
"SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64",
"SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.aarch64",
"SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.s390x",
"SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.x86_64",
"SUSE Manager Client Tools 15-BETA:python3-hwdata-2.3.5-159000.5.13.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-mgr-push-5.0.1-159000.4.21.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-pyvmomi-6.7.3-159000.3.6.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-rhnlib-5.0.1-159000.6.30.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-spacewalk-check-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-setup-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-tools-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.aarch64",
"SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.s390x",
"SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.x86_64",
"SUSE Manager Client Tools 15-BETA:spacecmd-5.0.1-159000.6.42.1.noarch",
"SUSE Manager Client Tools 15-BETA:spacewalk-check-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:spacewalk-client-setup-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:spacewalk-client-tools-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:supportutils-plugin-salt-1.2.2-159000.5.9.1.noarch",
"SUSE Manager Client Tools 15-BETA:supportutils-plugin-susemanager-client-5.0.1-159000.6.15.1.noarch",
"SUSE Manager Client Tools 15-BETA:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch",
"SUSE Manager Client Tools Beta for SLE Micro 5:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch",
"SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64",
"SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x",
"SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64",
"SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64",
"SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x",
"SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64",
"SUSE Manager Client Tools Beta for SLE Micro 5:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-41174",
"url": "https://www.suse.com/security/cve/CVE-2021-41174"
},
{
"category": "external",
"summary": "SUSE Bug 1192383 for CVE-2021-41174",
"url": "https://bugzilla.suse.com/1192383"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Manager Client Tools 15-BETA:ansible-2.9.27-159000.3.9.1.noarch",
"SUSE Manager Client Tools 15-BETA:ansible-doc-2.9.27-159000.3.9.1.noarch",
"SUSE Manager Client Tools 15-BETA:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch",
"SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.aarch64",
"SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.s390x",
"SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.x86_64",
"SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64",
"SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x",
"SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64",
"SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.aarch64",
"SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.s390x",
"SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.x86_64",
"SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.aarch64",
"SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.s390x",
"SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.x86_64",
"SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.aarch64",
"SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.s390x",
"SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.x86_64",
"SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.aarch64",
"SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.s390x",
"SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.x86_64",
"SUSE Manager Client Tools 15-BETA:mgr-push-5.0.1-159000.4.21.1.noarch",
"SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64",
"SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x",
"SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64",
"SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.aarch64",
"SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.s390x",
"SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.x86_64",
"SUSE Manager Client Tools 15-BETA:python3-hwdata-2.3.5-159000.5.13.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-mgr-push-5.0.1-159000.4.21.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-pyvmomi-6.7.3-159000.3.6.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-rhnlib-5.0.1-159000.6.30.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-spacewalk-check-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-setup-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-tools-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.aarch64",
"SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.s390x",
"SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.x86_64",
"SUSE Manager Client Tools 15-BETA:spacecmd-5.0.1-159000.6.42.1.noarch",
"SUSE Manager Client Tools 15-BETA:spacewalk-check-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:spacewalk-client-setup-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:spacewalk-client-tools-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:supportutils-plugin-salt-1.2.2-159000.5.9.1.noarch",
"SUSE Manager Client Tools 15-BETA:supportutils-plugin-susemanager-client-5.0.1-159000.6.15.1.noarch",
"SUSE Manager Client Tools 15-BETA:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch",
"SUSE Manager Client Tools Beta for SLE Micro 5:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch",
"SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64",
"SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x",
"SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64",
"SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64",
"SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x",
"SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64",
"SUSE Manager Client Tools Beta for SLE Micro 5:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:H/A:N",
"version": "3.1"
},
"products": [
"SUSE Manager Client Tools 15-BETA:ansible-2.9.27-159000.3.9.1.noarch",
"SUSE Manager Client Tools 15-BETA:ansible-doc-2.9.27-159000.3.9.1.noarch",
"SUSE Manager Client Tools 15-BETA:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch",
"SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.aarch64",
"SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.s390x",
"SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.x86_64",
"SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64",
"SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x",
"SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64",
"SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.aarch64",
"SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.s390x",
"SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.x86_64",
"SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.aarch64",
"SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.s390x",
"SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.x86_64",
"SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.aarch64",
"SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.s390x",
"SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.x86_64",
"SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.aarch64",
"SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.s390x",
"SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.x86_64",
"SUSE Manager Client Tools 15-BETA:mgr-push-5.0.1-159000.4.21.1.noarch",
"SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64",
"SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x",
"SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64",
"SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.aarch64",
"SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.s390x",
"SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.x86_64",
"SUSE Manager Client Tools 15-BETA:python3-hwdata-2.3.5-159000.5.13.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-mgr-push-5.0.1-159000.4.21.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-pyvmomi-6.7.3-159000.3.6.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-rhnlib-5.0.1-159000.6.30.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-spacewalk-check-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-setup-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-tools-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.aarch64",
"SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.s390x",
"SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.x86_64",
"SUSE Manager Client Tools 15-BETA:spacecmd-5.0.1-159000.6.42.1.noarch",
"SUSE Manager Client Tools 15-BETA:spacewalk-check-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:spacewalk-client-setup-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:spacewalk-client-tools-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:supportutils-plugin-salt-1.2.2-159000.5.9.1.noarch",
"SUSE Manager Client Tools 15-BETA:supportutils-plugin-susemanager-client-5.0.1-159000.6.15.1.noarch",
"SUSE Manager Client Tools 15-BETA:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch",
"SUSE Manager Client Tools Beta for SLE Micro 5:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch",
"SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64",
"SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x",
"SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64",
"SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64",
"SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x",
"SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64",
"SUSE Manager Client Tools Beta for SLE Micro 5:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-01-23T15:20:05Z",
"details": "moderate"
}
],
"title": "CVE-2021-41174"
},
{
"cve": "CVE-2021-41244",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-41244"
}
],
"notes": [
{
"category": "general",
"text": "Grafana is an open-source platform for monitoring and observability. In affected versions when the fine-grained access control beta feature is enabled and there is more than one organization in the Grafana instance admins are able to access users from other organizations. Grafana 8.0 introduced a mechanism which allowed users with the Organization Admin role to list, add, remove, and update users\u0027 roles in other organizations in which they are not an admin. With fine-grained access control enabled, organization admins can list, add, remove and update users\u0027 roles in another organization, where they do not have organization admin role. All installations between v8.0 and v8.2.3 that have fine-grained access control beta enabled and more than one organization should be upgraded as soon as possible. If you cannot upgrade, you should turn off the fine-grained access control using a feature flag.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Manager Client Tools 15-BETA:ansible-2.9.27-159000.3.9.1.noarch",
"SUSE Manager Client Tools 15-BETA:ansible-doc-2.9.27-159000.3.9.1.noarch",
"SUSE Manager Client Tools 15-BETA:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch",
"SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.aarch64",
"SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.s390x",
"SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.x86_64",
"SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64",
"SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x",
"SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64",
"SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.aarch64",
"SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.s390x",
"SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.x86_64",
"SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.aarch64",
"SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.s390x",
"SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.x86_64",
"SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.aarch64",
"SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.s390x",
"SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.x86_64",
"SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.aarch64",
"SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.s390x",
"SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.x86_64",
"SUSE Manager Client Tools 15-BETA:mgr-push-5.0.1-159000.4.21.1.noarch",
"SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64",
"SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x",
"SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64",
"SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.aarch64",
"SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.s390x",
"SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.x86_64",
"SUSE Manager Client Tools 15-BETA:python3-hwdata-2.3.5-159000.5.13.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-mgr-push-5.0.1-159000.4.21.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-pyvmomi-6.7.3-159000.3.6.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-rhnlib-5.0.1-159000.6.30.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-spacewalk-check-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-setup-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-tools-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.aarch64",
"SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.s390x",
"SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.x86_64",
"SUSE Manager Client Tools 15-BETA:spacecmd-5.0.1-159000.6.42.1.noarch",
"SUSE Manager Client Tools 15-BETA:spacewalk-check-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:spacewalk-client-setup-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:spacewalk-client-tools-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:supportutils-plugin-salt-1.2.2-159000.5.9.1.noarch",
"SUSE Manager Client Tools 15-BETA:supportutils-plugin-susemanager-client-5.0.1-159000.6.15.1.noarch",
"SUSE Manager Client Tools 15-BETA:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch",
"SUSE Manager Client Tools Beta for SLE Micro 5:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch",
"SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64",
"SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x",
"SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64",
"SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64",
"SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x",
"SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64",
"SUSE Manager Client Tools Beta for SLE Micro 5:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-41244",
"url": "https://www.suse.com/security/cve/CVE-2021-41244"
},
{
"category": "external",
"summary": "SUSE Bug 1192763 for CVE-2021-41244",
"url": "https://bugzilla.suse.com/1192763"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Manager Client Tools 15-BETA:ansible-2.9.27-159000.3.9.1.noarch",
"SUSE Manager Client Tools 15-BETA:ansible-doc-2.9.27-159000.3.9.1.noarch",
"SUSE Manager Client Tools 15-BETA:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch",
"SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.aarch64",
"SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.s390x",
"SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.x86_64",
"SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64",
"SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x",
"SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64",
"SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.aarch64",
"SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.s390x",
"SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.x86_64",
"SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.aarch64",
"SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.s390x",
"SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.x86_64",
"SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.aarch64",
"SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.s390x",
"SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.x86_64",
"SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.aarch64",
"SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.s390x",
"SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.x86_64",
"SUSE Manager Client Tools 15-BETA:mgr-push-5.0.1-159000.4.21.1.noarch",
"SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64",
"SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x",
"SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64",
"SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.aarch64",
"SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.s390x",
"SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.x86_64",
"SUSE Manager Client Tools 15-BETA:python3-hwdata-2.3.5-159000.5.13.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-mgr-push-5.0.1-159000.4.21.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-pyvmomi-6.7.3-159000.3.6.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-rhnlib-5.0.1-159000.6.30.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-spacewalk-check-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-setup-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-tools-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.aarch64",
"SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.s390x",
"SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.x86_64",
"SUSE Manager Client Tools 15-BETA:spacecmd-5.0.1-159000.6.42.1.noarch",
"SUSE Manager Client Tools 15-BETA:spacewalk-check-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:spacewalk-client-setup-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:spacewalk-client-tools-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:supportutils-plugin-salt-1.2.2-159000.5.9.1.noarch",
"SUSE Manager Client Tools 15-BETA:supportutils-plugin-susemanager-client-5.0.1-159000.6.15.1.noarch",
"SUSE Manager Client Tools 15-BETA:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch",
"SUSE Manager Client Tools Beta for SLE Micro 5:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch",
"SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64",
"SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x",
"SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64",
"SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64",
"SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x",
"SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64",
"SUSE Manager Client Tools Beta for SLE Micro 5:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.1,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Manager Client Tools 15-BETA:ansible-2.9.27-159000.3.9.1.noarch",
"SUSE Manager Client Tools 15-BETA:ansible-doc-2.9.27-159000.3.9.1.noarch",
"SUSE Manager Client Tools 15-BETA:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch",
"SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.aarch64",
"SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.s390x",
"SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.x86_64",
"SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64",
"SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x",
"SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64",
"SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.aarch64",
"SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.s390x",
"SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.x86_64",
"SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.aarch64",
"SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.s390x",
"SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.x86_64",
"SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.aarch64",
"SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.s390x",
"SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.x86_64",
"SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.aarch64",
"SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.s390x",
"SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.x86_64",
"SUSE Manager Client Tools 15-BETA:mgr-push-5.0.1-159000.4.21.1.noarch",
"SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64",
"SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x",
"SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64",
"SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.aarch64",
"SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.s390x",
"SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.x86_64",
"SUSE Manager Client Tools 15-BETA:python3-hwdata-2.3.5-159000.5.13.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-mgr-push-5.0.1-159000.4.21.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-pyvmomi-6.7.3-159000.3.6.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-rhnlib-5.0.1-159000.6.30.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-spacewalk-check-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-setup-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-tools-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.aarch64",
"SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.s390x",
"SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.x86_64",
"SUSE Manager Client Tools 15-BETA:spacecmd-5.0.1-159000.6.42.1.noarch",
"SUSE Manager Client Tools 15-BETA:spacewalk-check-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:spacewalk-client-setup-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:spacewalk-client-tools-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:supportutils-plugin-salt-1.2.2-159000.5.9.1.noarch",
"SUSE Manager Client Tools 15-BETA:supportutils-plugin-susemanager-client-5.0.1-159000.6.15.1.noarch",
"SUSE Manager Client Tools 15-BETA:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch",
"SUSE Manager Client Tools Beta for SLE Micro 5:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch",
"SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64",
"SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x",
"SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64",
"SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64",
"SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x",
"SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64",
"SUSE Manager Client Tools Beta for SLE Micro 5:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-01-23T15:20:05Z",
"details": "critical"
}
],
"title": "CVE-2021-41244"
},
{
"cve": "CVE-2021-43138",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-43138"
}
],
"notes": [
{
"category": "general",
"text": "In Async before 2.6.4 and 3.x before 3.2.2, a malicious user can obtain privileges via the mapValues() method, aka lib/internal/iterator.js createObjectIterator prototype pollution.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Manager Client Tools 15-BETA:ansible-2.9.27-159000.3.9.1.noarch",
"SUSE Manager Client Tools 15-BETA:ansible-doc-2.9.27-159000.3.9.1.noarch",
"SUSE Manager Client Tools 15-BETA:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch",
"SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.aarch64",
"SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.s390x",
"SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.x86_64",
"SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64",
"SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x",
"SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64",
"SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.aarch64",
"SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.s390x",
"SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.x86_64",
"SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.aarch64",
"SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.s390x",
"SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.x86_64",
"SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.aarch64",
"SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.s390x",
"SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.x86_64",
"SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.aarch64",
"SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.s390x",
"SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.x86_64",
"SUSE Manager Client Tools 15-BETA:mgr-push-5.0.1-159000.4.21.1.noarch",
"SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64",
"SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x",
"SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64",
"SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.aarch64",
"SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.s390x",
"SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.x86_64",
"SUSE Manager Client Tools 15-BETA:python3-hwdata-2.3.5-159000.5.13.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-mgr-push-5.0.1-159000.4.21.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-pyvmomi-6.7.3-159000.3.6.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-rhnlib-5.0.1-159000.6.30.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-spacewalk-check-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-setup-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-tools-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.aarch64",
"SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.s390x",
"SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.x86_64",
"SUSE Manager Client Tools 15-BETA:spacecmd-5.0.1-159000.6.42.1.noarch",
"SUSE Manager Client Tools 15-BETA:spacewalk-check-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:spacewalk-client-setup-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:spacewalk-client-tools-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:supportutils-plugin-salt-1.2.2-159000.5.9.1.noarch",
"SUSE Manager Client Tools 15-BETA:supportutils-plugin-susemanager-client-5.0.1-159000.6.15.1.noarch",
"SUSE Manager Client Tools 15-BETA:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch",
"SUSE Manager Client Tools Beta for SLE Micro 5:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch",
"SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64",
"SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x",
"SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64",
"SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64",
"SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x",
"SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64",
"SUSE Manager Client Tools Beta for SLE Micro 5:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-43138",
"url": "https://www.suse.com/security/cve/CVE-2021-43138"
},
{
"category": "external",
"summary": "SUSE Bug 1200480 for CVE-2021-43138",
"url": "https://bugzilla.suse.com/1200480"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Manager Client Tools 15-BETA:ansible-2.9.27-159000.3.9.1.noarch",
"SUSE Manager Client Tools 15-BETA:ansible-doc-2.9.27-159000.3.9.1.noarch",
"SUSE Manager Client Tools 15-BETA:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch",
"SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.aarch64",
"SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.s390x",
"SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.x86_64",
"SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64",
"SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x",
"SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64",
"SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.aarch64",
"SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.s390x",
"SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.x86_64",
"SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.aarch64",
"SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.s390x",
"SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.x86_64",
"SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.aarch64",
"SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.s390x",
"SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.x86_64",
"SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.aarch64",
"SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.s390x",
"SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.x86_64",
"SUSE Manager Client Tools 15-BETA:mgr-push-5.0.1-159000.4.21.1.noarch",
"SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64",
"SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x",
"SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64",
"SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.aarch64",
"SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.s390x",
"SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.x86_64",
"SUSE Manager Client Tools 15-BETA:python3-hwdata-2.3.5-159000.5.13.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-mgr-push-5.0.1-159000.4.21.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-pyvmomi-6.7.3-159000.3.6.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-rhnlib-5.0.1-159000.6.30.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-spacewalk-check-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-setup-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-tools-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.aarch64",
"SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.s390x",
"SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.x86_64",
"SUSE Manager Client Tools 15-BETA:spacecmd-5.0.1-159000.6.42.1.noarch",
"SUSE Manager Client Tools 15-BETA:spacewalk-check-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:spacewalk-client-setup-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:spacewalk-client-tools-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:supportutils-plugin-salt-1.2.2-159000.5.9.1.noarch",
"SUSE Manager Client Tools 15-BETA:supportutils-plugin-susemanager-client-5.0.1-159000.6.15.1.noarch",
"SUSE Manager Client Tools 15-BETA:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch",
"SUSE Manager Client Tools Beta for SLE Micro 5:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch",
"SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64",
"SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x",
"SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64",
"SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64",
"SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x",
"SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64",
"SUSE Manager Client Tools Beta for SLE Micro 5:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Manager Client Tools 15-BETA:ansible-2.9.27-159000.3.9.1.noarch",
"SUSE Manager Client Tools 15-BETA:ansible-doc-2.9.27-159000.3.9.1.noarch",
"SUSE Manager Client Tools 15-BETA:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch",
"SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.aarch64",
"SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.s390x",
"SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.x86_64",
"SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64",
"SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x",
"SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64",
"SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.aarch64",
"SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.s390x",
"SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.x86_64",
"SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.aarch64",
"SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.s390x",
"SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.x86_64",
"SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.aarch64",
"SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.s390x",
"SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.x86_64",
"SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.aarch64",
"SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.s390x",
"SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.x86_64",
"SUSE Manager Client Tools 15-BETA:mgr-push-5.0.1-159000.4.21.1.noarch",
"SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64",
"SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x",
"SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64",
"SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.aarch64",
"SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.s390x",
"SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.x86_64",
"SUSE Manager Client Tools 15-BETA:python3-hwdata-2.3.5-159000.5.13.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-mgr-push-5.0.1-159000.4.21.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-pyvmomi-6.7.3-159000.3.6.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-rhnlib-5.0.1-159000.6.30.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-spacewalk-check-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-setup-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-tools-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.aarch64",
"SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.s390x",
"SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.x86_64",
"SUSE Manager Client Tools 15-BETA:spacecmd-5.0.1-159000.6.42.1.noarch",
"SUSE Manager Client Tools 15-BETA:spacewalk-check-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:spacewalk-client-setup-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:spacewalk-client-tools-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:supportutils-plugin-salt-1.2.2-159000.5.9.1.noarch",
"SUSE Manager Client Tools 15-BETA:supportutils-plugin-susemanager-client-5.0.1-159000.6.15.1.noarch",
"SUSE Manager Client Tools 15-BETA:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch",
"SUSE Manager Client Tools Beta for SLE Micro 5:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch",
"SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64",
"SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x",
"SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64",
"SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64",
"SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x",
"SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64",
"SUSE Manager Client Tools Beta for SLE Micro 5:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-01-23T15:20:05Z",
"details": "important"
}
],
"title": "CVE-2021-43138"
},
{
"cve": "CVE-2021-43798",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-43798"
}
],
"notes": [
{
"category": "general",
"text": "Grafana is an open-source platform for monitoring and observability. Grafana versions 8.0.0-beta1 through 8.3.0 (except for patched versions) iss vulnerable to directory traversal, allowing access to local files. The vulnerable URL path is: `\u003cgrafana_host_url\u003e/public/plugins//`, where is the plugin ID for any installed plugin. At no time has Grafana Cloud been vulnerable. Users are advised to upgrade to patched versions 8.0.7, 8.1.8, 8.2.7, or 8.3.1. The GitHub Security Advisory contains more information about vulnerable URL paths, mitigation, and the disclosure timeline.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Manager Client Tools 15-BETA:ansible-2.9.27-159000.3.9.1.noarch",
"SUSE Manager Client Tools 15-BETA:ansible-doc-2.9.27-159000.3.9.1.noarch",
"SUSE Manager Client Tools 15-BETA:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch",
"SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.aarch64",
"SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.s390x",
"SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.x86_64",
"SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64",
"SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x",
"SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64",
"SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.aarch64",
"SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.s390x",
"SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.x86_64",
"SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.aarch64",
"SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.s390x",
"SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.x86_64",
"SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.aarch64",
"SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.s390x",
"SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.x86_64",
"SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.aarch64",
"SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.s390x",
"SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.x86_64",
"SUSE Manager Client Tools 15-BETA:mgr-push-5.0.1-159000.4.21.1.noarch",
"SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64",
"SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x",
"SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64",
"SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.aarch64",
"SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.s390x",
"SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.x86_64",
"SUSE Manager Client Tools 15-BETA:python3-hwdata-2.3.5-159000.5.13.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-mgr-push-5.0.1-159000.4.21.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-pyvmomi-6.7.3-159000.3.6.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-rhnlib-5.0.1-159000.6.30.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-spacewalk-check-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-setup-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-tools-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.aarch64",
"SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.s390x",
"SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.x86_64",
"SUSE Manager Client Tools 15-BETA:spacecmd-5.0.1-159000.6.42.1.noarch",
"SUSE Manager Client Tools 15-BETA:spacewalk-check-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:spacewalk-client-setup-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:spacewalk-client-tools-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:supportutils-plugin-salt-1.2.2-159000.5.9.1.noarch",
"SUSE Manager Client Tools 15-BETA:supportutils-plugin-susemanager-client-5.0.1-159000.6.15.1.noarch",
"SUSE Manager Client Tools 15-BETA:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch",
"SUSE Manager Client Tools Beta for SLE Micro 5:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch",
"SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64",
"SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x",
"SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64",
"SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64",
"SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x",
"SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64",
"SUSE Manager Client Tools Beta for SLE Micro 5:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-43798",
"url": "https://www.suse.com/security/cve/CVE-2021-43798"
},
{
"category": "external",
"summary": "SUSE Bug 1193492 for CVE-2021-43798",
"url": "https://bugzilla.suse.com/1193492"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Manager Client Tools 15-BETA:ansible-2.9.27-159000.3.9.1.noarch",
"SUSE Manager Client Tools 15-BETA:ansible-doc-2.9.27-159000.3.9.1.noarch",
"SUSE Manager Client Tools 15-BETA:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch",
"SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.aarch64",
"SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.s390x",
"SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.x86_64",
"SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64",
"SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x",
"SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64",
"SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.aarch64",
"SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.s390x",
"SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.x86_64",
"SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.aarch64",
"SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.s390x",
"SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.x86_64",
"SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.aarch64",
"SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.s390x",
"SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.x86_64",
"SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.aarch64",
"SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.s390x",
"SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.x86_64",
"SUSE Manager Client Tools 15-BETA:mgr-push-5.0.1-159000.4.21.1.noarch",
"SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64",
"SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x",
"SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64",
"SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.aarch64",
"SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.s390x",
"SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.x86_64",
"SUSE Manager Client Tools 15-BETA:python3-hwdata-2.3.5-159000.5.13.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-mgr-push-5.0.1-159000.4.21.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-pyvmomi-6.7.3-159000.3.6.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-rhnlib-5.0.1-159000.6.30.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-spacewalk-check-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-setup-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-tools-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.aarch64",
"SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.s390x",
"SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.x86_64",
"SUSE Manager Client Tools 15-BETA:spacecmd-5.0.1-159000.6.42.1.noarch",
"SUSE Manager Client Tools 15-BETA:spacewalk-check-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:spacewalk-client-setup-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:spacewalk-client-tools-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:supportutils-plugin-salt-1.2.2-159000.5.9.1.noarch",
"SUSE Manager Client Tools 15-BETA:supportutils-plugin-susemanager-client-5.0.1-159000.6.15.1.noarch",
"SUSE Manager Client Tools 15-BETA:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch",
"SUSE Manager Client Tools Beta for SLE Micro 5:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch",
"SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64",
"SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x",
"SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64",
"SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64",
"SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x",
"SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64",
"SUSE Manager Client Tools Beta for SLE Micro 5:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Manager Client Tools 15-BETA:ansible-2.9.27-159000.3.9.1.noarch",
"SUSE Manager Client Tools 15-BETA:ansible-doc-2.9.27-159000.3.9.1.noarch",
"SUSE Manager Client Tools 15-BETA:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch",
"SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.aarch64",
"SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.s390x",
"SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.x86_64",
"SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64",
"SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x",
"SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64",
"SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.aarch64",
"SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.s390x",
"SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.x86_64",
"SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.aarch64",
"SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.s390x",
"SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.x86_64",
"SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.aarch64",
"SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.s390x",
"SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.x86_64",
"SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.aarch64",
"SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.s390x",
"SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.x86_64",
"SUSE Manager Client Tools 15-BETA:mgr-push-5.0.1-159000.4.21.1.noarch",
"SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64",
"SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x",
"SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64",
"SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.aarch64",
"SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.s390x",
"SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.x86_64",
"SUSE Manager Client Tools 15-BETA:python3-hwdata-2.3.5-159000.5.13.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-mgr-push-5.0.1-159000.4.21.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-pyvmomi-6.7.3-159000.3.6.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-rhnlib-5.0.1-159000.6.30.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-spacewalk-check-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-setup-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-tools-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.aarch64",
"SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.s390x",
"SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.x86_64",
"SUSE Manager Client Tools 15-BETA:spacecmd-5.0.1-159000.6.42.1.noarch",
"SUSE Manager Client Tools 15-BETA:spacewalk-check-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:spacewalk-client-setup-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:spacewalk-client-tools-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:supportutils-plugin-salt-1.2.2-159000.5.9.1.noarch",
"SUSE Manager Client Tools 15-BETA:supportutils-plugin-susemanager-client-5.0.1-159000.6.15.1.noarch",
"SUSE Manager Client Tools 15-BETA:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch",
"SUSE Manager Client Tools Beta for SLE Micro 5:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch",
"SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64",
"SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x",
"SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64",
"SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64",
"SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x",
"SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64",
"SUSE Manager Client Tools Beta for SLE Micro 5:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-01-23T15:20:05Z",
"details": "important"
}
],
"title": "CVE-2021-43798"
},
{
"cve": "CVE-2021-43813",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-43813"
}
],
"notes": [
{
"category": "general",
"text": "Grafana is an open-source platform for monitoring and observability. Grafana prior to versions 8.3.2 and 7.5.12 contains a directory traversal vulnerability for fully lowercase or fully uppercase .md files. The vulnerability is limited in scope, and only allows access to files with the extension .md to authenticated users only. Grafana Cloud instances have not been affected by the vulnerability. Users should upgrade to patched versions 8.3.2 or 7.5.12. For users who cannot upgrade, running a reverse proxy in front of Grafana that normalizes the PATH of the request will mitigate the vulnerability. The proxy will have to also be able to handle url encoded paths. Alternatively, for fully lowercase or fully uppercase .md files, users can block /api/plugins/.*/markdown/.* without losing any functionality beyond inlined plugin help text.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Manager Client Tools 15-BETA:ansible-2.9.27-159000.3.9.1.noarch",
"SUSE Manager Client Tools 15-BETA:ansible-doc-2.9.27-159000.3.9.1.noarch",
"SUSE Manager Client Tools 15-BETA:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch",
"SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.aarch64",
"SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.s390x",
"SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.x86_64",
"SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64",
"SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x",
"SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64",
"SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.aarch64",
"SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.s390x",
"SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.x86_64",
"SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.aarch64",
"SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.s390x",
"SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.x86_64",
"SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.aarch64",
"SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.s390x",
"SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.x86_64",
"SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.aarch64",
"SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.s390x",
"SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.x86_64",
"SUSE Manager Client Tools 15-BETA:mgr-push-5.0.1-159000.4.21.1.noarch",
"SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64",
"SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x",
"SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64",
"SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.aarch64",
"SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.s390x",
"SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.x86_64",
"SUSE Manager Client Tools 15-BETA:python3-hwdata-2.3.5-159000.5.13.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-mgr-push-5.0.1-159000.4.21.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-pyvmomi-6.7.3-159000.3.6.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-rhnlib-5.0.1-159000.6.30.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-spacewalk-check-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-setup-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-tools-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.aarch64",
"SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.s390x",
"SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.x86_64",
"SUSE Manager Client Tools 15-BETA:spacecmd-5.0.1-159000.6.42.1.noarch",
"SUSE Manager Client Tools 15-BETA:spacewalk-check-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:spacewalk-client-setup-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:spacewalk-client-tools-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:supportutils-plugin-salt-1.2.2-159000.5.9.1.noarch",
"SUSE Manager Client Tools 15-BETA:supportutils-plugin-susemanager-client-5.0.1-159000.6.15.1.noarch",
"SUSE Manager Client Tools 15-BETA:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch",
"SUSE Manager Client Tools Beta for SLE Micro 5:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch",
"SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64",
"SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x",
"SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64",
"SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64",
"SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x",
"SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64",
"SUSE Manager Client Tools Beta for SLE Micro 5:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-43813",
"url": "https://www.suse.com/security/cve/CVE-2021-43813"
},
{
"category": "external",
"summary": "SUSE Bug 1193686 for CVE-2021-43813",
"url": "https://bugzilla.suse.com/1193686"
},
{
"category": "external",
"summary": "SUSE Bug 1193688 for CVE-2021-43813",
"url": "https://bugzilla.suse.com/1193688"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Manager Client Tools 15-BETA:ansible-2.9.27-159000.3.9.1.noarch",
"SUSE Manager Client Tools 15-BETA:ansible-doc-2.9.27-159000.3.9.1.noarch",
"SUSE Manager Client Tools 15-BETA:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch",
"SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.aarch64",
"SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.s390x",
"SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.x86_64",
"SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64",
"SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x",
"SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64",
"SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.aarch64",
"SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.s390x",
"SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.x86_64",
"SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.aarch64",
"SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.s390x",
"SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.x86_64",
"SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.aarch64",
"SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.s390x",
"SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.x86_64",
"SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.aarch64",
"SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.s390x",
"SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.x86_64",
"SUSE Manager Client Tools 15-BETA:mgr-push-5.0.1-159000.4.21.1.noarch",
"SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64",
"SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x",
"SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64",
"SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.aarch64",
"SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.s390x",
"SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.x86_64",
"SUSE Manager Client Tools 15-BETA:python3-hwdata-2.3.5-159000.5.13.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-mgr-push-5.0.1-159000.4.21.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-pyvmomi-6.7.3-159000.3.6.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-rhnlib-5.0.1-159000.6.30.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-spacewalk-check-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-setup-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-tools-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.aarch64",
"SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.s390x",
"SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.x86_64",
"SUSE Manager Client Tools 15-BETA:spacecmd-5.0.1-159000.6.42.1.noarch",
"SUSE Manager Client Tools 15-BETA:spacewalk-check-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:spacewalk-client-setup-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:spacewalk-client-tools-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:supportutils-plugin-salt-1.2.2-159000.5.9.1.noarch",
"SUSE Manager Client Tools 15-BETA:supportutils-plugin-susemanager-client-5.0.1-159000.6.15.1.noarch",
"SUSE Manager Client Tools 15-BETA:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch",
"SUSE Manager Client Tools Beta for SLE Micro 5:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch",
"SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64",
"SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x",
"SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64",
"SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64",
"SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x",
"SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64",
"SUSE Manager Client Tools Beta for SLE Micro 5:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Manager Client Tools 15-BETA:ansible-2.9.27-159000.3.9.1.noarch",
"SUSE Manager Client Tools 15-BETA:ansible-doc-2.9.27-159000.3.9.1.noarch",
"SUSE Manager Client Tools 15-BETA:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch",
"SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.aarch64",
"SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.s390x",
"SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.x86_64",
"SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64",
"SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x",
"SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64",
"SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.aarch64",
"SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.s390x",
"SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.x86_64",
"SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.aarch64",
"SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.s390x",
"SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.x86_64",
"SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.aarch64",
"SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.s390x",
"SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.x86_64",
"SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.aarch64",
"SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.s390x",
"SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.x86_64",
"SUSE Manager Client Tools 15-BETA:mgr-push-5.0.1-159000.4.21.1.noarch",
"SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64",
"SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x",
"SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64",
"SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.aarch64",
"SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.s390x",
"SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.x86_64",
"SUSE Manager Client Tools 15-BETA:python3-hwdata-2.3.5-159000.5.13.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-mgr-push-5.0.1-159000.4.21.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-pyvmomi-6.7.3-159000.3.6.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-rhnlib-5.0.1-159000.6.30.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-spacewalk-check-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-setup-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-tools-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.aarch64",
"SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.s390x",
"SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.x86_64",
"SUSE Manager Client Tools 15-BETA:spacecmd-5.0.1-159000.6.42.1.noarch",
"SUSE Manager Client Tools 15-BETA:spacewalk-check-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:spacewalk-client-setup-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:spacewalk-client-tools-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:supportutils-plugin-salt-1.2.2-159000.5.9.1.noarch",
"SUSE Manager Client Tools 15-BETA:supportutils-plugin-susemanager-client-5.0.1-159000.6.15.1.noarch",
"SUSE Manager Client Tools 15-BETA:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch",
"SUSE Manager Client Tools Beta for SLE Micro 5:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch",
"SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64",
"SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x",
"SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64",
"SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64",
"SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x",
"SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64",
"SUSE Manager Client Tools Beta for SLE Micro 5:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-01-23T15:20:05Z",
"details": "moderate"
}
],
"title": "CVE-2021-43813"
},
{
"cve": "CVE-2021-43815",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-43815"
}
],
"notes": [
{
"category": "general",
"text": "Grafana is an open-source platform for monitoring and observability. Grafana prior to versions 8.3.2 and 7.5.12 has a directory traversal for arbitrary .csv files. It only affects instances that have the developer testing tool called TestData DB data source enabled and configured. The vulnerability is limited in scope, and only allows access to files with the extension .csv to authenticated users only. Grafana Cloud instances have not been affected by the vulnerability. Versions 8.3.2 and 7.5.12 contain a patch for this issue. There is a workaround available for users who cannot upgrade. Running a reverse proxy in front of Grafana that normalizes the PATH of the request will mitigate the vulnerability. The proxy will have to also be able to handle url encoded paths.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Manager Client Tools 15-BETA:ansible-2.9.27-159000.3.9.1.noarch",
"SUSE Manager Client Tools 15-BETA:ansible-doc-2.9.27-159000.3.9.1.noarch",
"SUSE Manager Client Tools 15-BETA:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch",
"SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.aarch64",
"SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.s390x",
"SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.x86_64",
"SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64",
"SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x",
"SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64",
"SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.aarch64",
"SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.s390x",
"SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.x86_64",
"SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.aarch64",
"SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.s390x",
"SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.x86_64",
"SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.aarch64",
"SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.s390x",
"SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.x86_64",
"SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.aarch64",
"SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.s390x",
"SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.x86_64",
"SUSE Manager Client Tools 15-BETA:mgr-push-5.0.1-159000.4.21.1.noarch",
"SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64",
"SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x",
"SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64",
"SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.aarch64",
"SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.s390x",
"SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.x86_64",
"SUSE Manager Client Tools 15-BETA:python3-hwdata-2.3.5-159000.5.13.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-mgr-push-5.0.1-159000.4.21.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-pyvmomi-6.7.3-159000.3.6.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-rhnlib-5.0.1-159000.6.30.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-spacewalk-check-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-setup-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-tools-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.aarch64",
"SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.s390x",
"SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.x86_64",
"SUSE Manager Client Tools 15-BETA:spacecmd-5.0.1-159000.6.42.1.noarch",
"SUSE Manager Client Tools 15-BETA:spacewalk-check-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:spacewalk-client-setup-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:spacewalk-client-tools-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:supportutils-plugin-salt-1.2.2-159000.5.9.1.noarch",
"SUSE Manager Client Tools 15-BETA:supportutils-plugin-susemanager-client-5.0.1-159000.6.15.1.noarch",
"SUSE Manager Client Tools 15-BETA:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch",
"SUSE Manager Client Tools Beta for SLE Micro 5:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch",
"SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64",
"SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x",
"SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64",
"SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64",
"SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x",
"SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64",
"SUSE Manager Client Tools Beta for SLE Micro 5:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-43815",
"url": "https://www.suse.com/security/cve/CVE-2021-43815"
},
{
"category": "external",
"summary": "SUSE Bug 1193686 for CVE-2021-43815",
"url": "https://bugzilla.suse.com/1193686"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Manager Client Tools 15-BETA:ansible-2.9.27-159000.3.9.1.noarch",
"SUSE Manager Client Tools 15-BETA:ansible-doc-2.9.27-159000.3.9.1.noarch",
"SUSE Manager Client Tools 15-BETA:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch",
"SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.aarch64",
"SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.s390x",
"SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.x86_64",
"SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64",
"SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x",
"SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64",
"SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.aarch64",
"SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.s390x",
"SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.x86_64",
"SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.aarch64",
"SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.s390x",
"SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.x86_64",
"SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.aarch64",
"SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.s390x",
"SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.x86_64",
"SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.aarch64",
"SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.s390x",
"SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.x86_64",
"SUSE Manager Client Tools 15-BETA:mgr-push-5.0.1-159000.4.21.1.noarch",
"SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64",
"SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x",
"SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64",
"SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.aarch64",
"SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.s390x",
"SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.x86_64",
"SUSE Manager Client Tools 15-BETA:python3-hwdata-2.3.5-159000.5.13.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-mgr-push-5.0.1-159000.4.21.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-pyvmomi-6.7.3-159000.3.6.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-rhnlib-5.0.1-159000.6.30.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-spacewalk-check-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-setup-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-tools-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.aarch64",
"SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.s390x",
"SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.x86_64",
"SUSE Manager Client Tools 15-BETA:spacecmd-5.0.1-159000.6.42.1.noarch",
"SUSE Manager Client Tools 15-BETA:spacewalk-check-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:spacewalk-client-setup-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:spacewalk-client-tools-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:supportutils-plugin-salt-1.2.2-159000.5.9.1.noarch",
"SUSE Manager Client Tools 15-BETA:supportutils-plugin-susemanager-client-5.0.1-159000.6.15.1.noarch",
"SUSE Manager Client Tools 15-BETA:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch",
"SUSE Manager Client Tools Beta for SLE Micro 5:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch",
"SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64",
"SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x",
"SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64",
"SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64",
"SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x",
"SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64",
"SUSE Manager Client Tools Beta for SLE Micro 5:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Manager Client Tools 15-BETA:ansible-2.9.27-159000.3.9.1.noarch",
"SUSE Manager Client Tools 15-BETA:ansible-doc-2.9.27-159000.3.9.1.noarch",
"SUSE Manager Client Tools 15-BETA:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch",
"SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.aarch64",
"SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.s390x",
"SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.x86_64",
"SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64",
"SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x",
"SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64",
"SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.aarch64",
"SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.s390x",
"SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.x86_64",
"SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.aarch64",
"SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.s390x",
"SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.x86_64",
"SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.aarch64",
"SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.s390x",
"SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.x86_64",
"SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.aarch64",
"SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.s390x",
"SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.x86_64",
"SUSE Manager Client Tools 15-BETA:mgr-push-5.0.1-159000.4.21.1.noarch",
"SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64",
"SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x",
"SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64",
"SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.aarch64",
"SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.s390x",
"SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.x86_64",
"SUSE Manager Client Tools 15-BETA:python3-hwdata-2.3.5-159000.5.13.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-mgr-push-5.0.1-159000.4.21.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-pyvmomi-6.7.3-159000.3.6.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-rhnlib-5.0.1-159000.6.30.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-spacewalk-check-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-setup-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-tools-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.aarch64",
"SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.s390x",
"SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.x86_64",
"SUSE Manager Client Tools 15-BETA:spacecmd-5.0.1-159000.6.42.1.noarch",
"SUSE Manager Client Tools 15-BETA:spacewalk-check-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:spacewalk-client-setup-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:spacewalk-client-tools-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:supportutils-plugin-salt-1.2.2-159000.5.9.1.noarch",
"SUSE Manager Client Tools 15-BETA:supportutils-plugin-susemanager-client-5.0.1-159000.6.15.1.noarch",
"SUSE Manager Client Tools 15-BETA:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch",
"SUSE Manager Client Tools Beta for SLE Micro 5:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch",
"SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64",
"SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x",
"SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64",
"SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64",
"SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x",
"SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64",
"SUSE Manager Client Tools Beta for SLE Micro 5:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-01-23T15:20:05Z",
"details": "moderate"
}
],
"title": "CVE-2021-43815"
},
{
"cve": "CVE-2022-0155",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-0155"
}
],
"notes": [
{
"category": "general",
"text": "follow-redirects is vulnerable to Exposure of Private Personal Information to an Unauthorized Actor",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Manager Client Tools 15-BETA:ansible-2.9.27-159000.3.9.1.noarch",
"SUSE Manager Client Tools 15-BETA:ansible-doc-2.9.27-159000.3.9.1.noarch",
"SUSE Manager Client Tools 15-BETA:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch",
"SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.aarch64",
"SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.s390x",
"SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.x86_64",
"SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64",
"SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x",
"SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64",
"SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.aarch64",
"SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.s390x",
"SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.x86_64",
"SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.aarch64",
"SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.s390x",
"SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.x86_64",
"SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.aarch64",
"SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.s390x",
"SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.x86_64",
"SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.aarch64",
"SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.s390x",
"SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.x86_64",
"SUSE Manager Client Tools 15-BETA:mgr-push-5.0.1-159000.4.21.1.noarch",
"SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64",
"SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x",
"SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64",
"SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.aarch64",
"SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.s390x",
"SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.x86_64",
"SUSE Manager Client Tools 15-BETA:python3-hwdata-2.3.5-159000.5.13.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-mgr-push-5.0.1-159000.4.21.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-pyvmomi-6.7.3-159000.3.6.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-rhnlib-5.0.1-159000.6.30.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-spacewalk-check-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-setup-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-tools-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.aarch64",
"SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.s390x",
"SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.x86_64",
"SUSE Manager Client Tools 15-BETA:spacecmd-5.0.1-159000.6.42.1.noarch",
"SUSE Manager Client Tools 15-BETA:spacewalk-check-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:spacewalk-client-setup-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:spacewalk-client-tools-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:supportutils-plugin-salt-1.2.2-159000.5.9.1.noarch",
"SUSE Manager Client Tools 15-BETA:supportutils-plugin-susemanager-client-5.0.1-159000.6.15.1.noarch",
"SUSE Manager Client Tools 15-BETA:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch",
"SUSE Manager Client Tools Beta for SLE Micro 5:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch",
"SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64",
"SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x",
"SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64",
"SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64",
"SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x",
"SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64",
"SUSE Manager Client Tools Beta for SLE Micro 5:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-0155",
"url": "https://www.suse.com/security/cve/CVE-2022-0155"
},
{
"category": "external",
"summary": "SUSE Bug 1218844 for CVE-2022-0155",
"url": "https://bugzilla.suse.com/1218844"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Manager Client Tools 15-BETA:ansible-2.9.27-159000.3.9.1.noarch",
"SUSE Manager Client Tools 15-BETA:ansible-doc-2.9.27-159000.3.9.1.noarch",
"SUSE Manager Client Tools 15-BETA:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch",
"SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.aarch64",
"SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.s390x",
"SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.x86_64",
"SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64",
"SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x",
"SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64",
"SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.aarch64",
"SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.s390x",
"SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.x86_64",
"SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.aarch64",
"SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.s390x",
"SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.x86_64",
"SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.aarch64",
"SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.s390x",
"SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.x86_64",
"SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.aarch64",
"SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.s390x",
"SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.x86_64",
"SUSE Manager Client Tools 15-BETA:mgr-push-5.0.1-159000.4.21.1.noarch",
"SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64",
"SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x",
"SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64",
"SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.aarch64",
"SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.s390x",
"SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.x86_64",
"SUSE Manager Client Tools 15-BETA:python3-hwdata-2.3.5-159000.5.13.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-mgr-push-5.0.1-159000.4.21.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-pyvmomi-6.7.3-159000.3.6.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-rhnlib-5.0.1-159000.6.30.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-spacewalk-check-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-setup-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-tools-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.aarch64",
"SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.s390x",
"SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.x86_64",
"SUSE Manager Client Tools 15-BETA:spacecmd-5.0.1-159000.6.42.1.noarch",
"SUSE Manager Client Tools 15-BETA:spacewalk-check-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:spacewalk-client-setup-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:spacewalk-client-tools-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:supportutils-plugin-salt-1.2.2-159000.5.9.1.noarch",
"SUSE Manager Client Tools 15-BETA:supportutils-plugin-susemanager-client-5.0.1-159000.6.15.1.noarch",
"SUSE Manager Client Tools 15-BETA:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch",
"SUSE Manager Client Tools Beta for SLE Micro 5:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch",
"SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64",
"SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x",
"SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64",
"SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64",
"SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x",
"SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64",
"SUSE Manager Client Tools Beta for SLE Micro 5:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Manager Client Tools 15-BETA:ansible-2.9.27-159000.3.9.1.noarch",
"SUSE Manager Client Tools 15-BETA:ansible-doc-2.9.27-159000.3.9.1.noarch",
"SUSE Manager Client Tools 15-BETA:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch",
"SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.aarch64",
"SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.s390x",
"SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.x86_64",
"SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64",
"SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x",
"SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64",
"SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.aarch64",
"SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.s390x",
"SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.x86_64",
"SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.aarch64",
"SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.s390x",
"SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.x86_64",
"SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.aarch64",
"SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.s390x",
"SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.x86_64",
"SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.aarch64",
"SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.s390x",
"SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.x86_64",
"SUSE Manager Client Tools 15-BETA:mgr-push-5.0.1-159000.4.21.1.noarch",
"SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64",
"SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x",
"SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64",
"SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.aarch64",
"SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.s390x",
"SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.x86_64",
"SUSE Manager Client Tools 15-BETA:python3-hwdata-2.3.5-159000.5.13.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-mgr-push-5.0.1-159000.4.21.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-pyvmomi-6.7.3-159000.3.6.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-rhnlib-5.0.1-159000.6.30.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-spacewalk-check-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-setup-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-tools-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.aarch64",
"SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.s390x",
"SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.x86_64",
"SUSE Manager Client Tools 15-BETA:spacecmd-5.0.1-159000.6.42.1.noarch",
"SUSE Manager Client Tools 15-BETA:spacewalk-check-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:spacewalk-client-setup-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:spacewalk-client-tools-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:supportutils-plugin-salt-1.2.2-159000.5.9.1.noarch",
"SUSE Manager Client Tools 15-BETA:supportutils-plugin-susemanager-client-5.0.1-159000.6.15.1.noarch",
"SUSE Manager Client Tools 15-BETA:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch",
"SUSE Manager Client Tools Beta for SLE Micro 5:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch",
"SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64",
"SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x",
"SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64",
"SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64",
"SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x",
"SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64",
"SUSE Manager Client Tools Beta for SLE Micro 5:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-01-23T15:20:05Z",
"details": "moderate"
}
],
"title": "CVE-2022-0155"
},
{
"cve": "CVE-2022-23552",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-23552"
}
],
"notes": [
{
"category": "general",
"text": "Grafana is an open-source platform for monitoring and observability. Starting with the 8.1 branch and prior to versions 8.5.16, 9.2.10, and 9.3.4, Grafana had a stored XSS vulnerability affecting the core plugin GeoMap. The stored XSS vulnerability was possible because SVG files weren\u0027t properly sanitized and allowed arbitrary JavaScript to be executed in the context of the currently authorized user of the Grafana instance. An attacker needs to have the Editor role in order to change a panel to include either an external URL to a SVG-file containing JavaScript, or use the `data:` scheme to load an inline SVG-file containing JavaScript. This means that vertical privilege escalation is possible, where a user with Editor role can change to a known password for a user having Admin role if the user with Admin role executes malicious JavaScript viewing a dashboard. Users may upgrade to version 8.5.16, 9.2.10, or 9.3.4 to receive a fix.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Manager Client Tools 15-BETA:ansible-2.9.27-159000.3.9.1.noarch",
"SUSE Manager Client Tools 15-BETA:ansible-doc-2.9.27-159000.3.9.1.noarch",
"SUSE Manager Client Tools 15-BETA:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch",
"SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.aarch64",
"SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.s390x",
"SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.x86_64",
"SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64",
"SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x",
"SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64",
"SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.aarch64",
"SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.s390x",
"SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.x86_64",
"SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.aarch64",
"SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.s390x",
"SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.x86_64",
"SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.aarch64",
"SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.s390x",
"SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.x86_64",
"SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.aarch64",
"SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.s390x",
"SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.x86_64",
"SUSE Manager Client Tools 15-BETA:mgr-push-5.0.1-159000.4.21.1.noarch",
"SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64",
"SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x",
"SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64",
"SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.aarch64",
"SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.s390x",
"SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.x86_64",
"SUSE Manager Client Tools 15-BETA:python3-hwdata-2.3.5-159000.5.13.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-mgr-push-5.0.1-159000.4.21.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-pyvmomi-6.7.3-159000.3.6.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-rhnlib-5.0.1-159000.6.30.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-spacewalk-check-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-setup-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-tools-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.aarch64",
"SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.s390x",
"SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.x86_64",
"SUSE Manager Client Tools 15-BETA:spacecmd-5.0.1-159000.6.42.1.noarch",
"SUSE Manager Client Tools 15-BETA:spacewalk-check-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:spacewalk-client-setup-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:spacewalk-client-tools-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:supportutils-plugin-salt-1.2.2-159000.5.9.1.noarch",
"SUSE Manager Client Tools 15-BETA:supportutils-plugin-susemanager-client-5.0.1-159000.6.15.1.noarch",
"SUSE Manager Client Tools 15-BETA:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch",
"SUSE Manager Client Tools Beta for SLE Micro 5:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch",
"SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64",
"SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x",
"SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64",
"SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64",
"SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x",
"SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64",
"SUSE Manager Client Tools Beta for SLE Micro 5:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-23552",
"url": "https://www.suse.com/security/cve/CVE-2022-23552"
},
{
"category": "external",
"summary": "SUSE Bug 1207749 for CVE-2022-23552",
"url": "https://bugzilla.suse.com/1207749"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Manager Client Tools 15-BETA:ansible-2.9.27-159000.3.9.1.noarch",
"SUSE Manager Client Tools 15-BETA:ansible-doc-2.9.27-159000.3.9.1.noarch",
"SUSE Manager Client Tools 15-BETA:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch",
"SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.aarch64",
"SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.s390x",
"SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.x86_64",
"SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64",
"SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x",
"SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64",
"SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.aarch64",
"SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.s390x",
"SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.x86_64",
"SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.aarch64",
"SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.s390x",
"SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.x86_64",
"SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.aarch64",
"SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.s390x",
"SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.x86_64",
"SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.aarch64",
"SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.s390x",
"SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.x86_64",
"SUSE Manager Client Tools 15-BETA:mgr-push-5.0.1-159000.4.21.1.noarch",
"SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64",
"SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x",
"SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64",
"SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.aarch64",
"SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.s390x",
"SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.x86_64",
"SUSE Manager Client Tools 15-BETA:python3-hwdata-2.3.5-159000.5.13.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-mgr-push-5.0.1-159000.4.21.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-pyvmomi-6.7.3-159000.3.6.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-rhnlib-5.0.1-159000.6.30.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-spacewalk-check-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-setup-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-tools-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.aarch64",
"SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.s390x",
"SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.x86_64",
"SUSE Manager Client Tools 15-BETA:spacecmd-5.0.1-159000.6.42.1.noarch",
"SUSE Manager Client Tools 15-BETA:spacewalk-check-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:spacewalk-client-setup-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:spacewalk-client-tools-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:supportutils-plugin-salt-1.2.2-159000.5.9.1.noarch",
"SUSE Manager Client Tools 15-BETA:supportutils-plugin-susemanager-client-5.0.1-159000.6.15.1.noarch",
"SUSE Manager Client Tools 15-BETA:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch",
"SUSE Manager Client Tools Beta for SLE Micro 5:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch",
"SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64",
"SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x",
"SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64",
"SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64",
"SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x",
"SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64",
"SUSE Manager Client Tools Beta for SLE Micro 5:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.3,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"SUSE Manager Client Tools 15-BETA:ansible-2.9.27-159000.3.9.1.noarch",
"SUSE Manager Client Tools 15-BETA:ansible-doc-2.9.27-159000.3.9.1.noarch",
"SUSE Manager Client Tools 15-BETA:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch",
"SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.aarch64",
"SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.s390x",
"SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.x86_64",
"SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64",
"SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x",
"SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64",
"SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.aarch64",
"SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.s390x",
"SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.x86_64",
"SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.aarch64",
"SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.s390x",
"SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.x86_64",
"SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.aarch64",
"SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.s390x",
"SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.x86_64",
"SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.aarch64",
"SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.s390x",
"SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.x86_64",
"SUSE Manager Client Tools 15-BETA:mgr-push-5.0.1-159000.4.21.1.noarch",
"SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64",
"SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x",
"SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64",
"SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.aarch64",
"SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.s390x",
"SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.x86_64",
"SUSE Manager Client Tools 15-BETA:python3-hwdata-2.3.5-159000.5.13.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-mgr-push-5.0.1-159000.4.21.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-pyvmomi-6.7.3-159000.3.6.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-rhnlib-5.0.1-159000.6.30.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-spacewalk-check-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-setup-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-tools-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.aarch64",
"SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.s390x",
"SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.x86_64",
"SUSE Manager Client Tools 15-BETA:spacecmd-5.0.1-159000.6.42.1.noarch",
"SUSE Manager Client Tools 15-BETA:spacewalk-check-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:spacewalk-client-setup-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:spacewalk-client-tools-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:supportutils-plugin-salt-1.2.2-159000.5.9.1.noarch",
"SUSE Manager Client Tools 15-BETA:supportutils-plugin-susemanager-client-5.0.1-159000.6.15.1.noarch",
"SUSE Manager Client Tools 15-BETA:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch",
"SUSE Manager Client Tools Beta for SLE Micro 5:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch",
"SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64",
"SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x",
"SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64",
"SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64",
"SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x",
"SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64",
"SUSE Manager Client Tools Beta for SLE Micro 5:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-01-23T15:20:05Z",
"details": "important"
}
],
"title": "CVE-2022-23552"
},
{
"cve": "CVE-2022-27664",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-27664"
}
],
"notes": [
{
"category": "general",
"text": "In net/http in Go before 1.18.6 and 1.19.x before 1.19.1, attackers can cause a denial of service because an HTTP/2 connection can hang during closing if shutdown were preempted by a fatal error.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Manager Client Tools 15-BETA:ansible-2.9.27-159000.3.9.1.noarch",
"SUSE Manager Client Tools 15-BETA:ansible-doc-2.9.27-159000.3.9.1.noarch",
"SUSE Manager Client Tools 15-BETA:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch",
"SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.aarch64",
"SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.s390x",
"SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.x86_64",
"SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64",
"SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x",
"SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64",
"SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.aarch64",
"SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.s390x",
"SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.x86_64",
"SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.aarch64",
"SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.s390x",
"SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.x86_64",
"SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.aarch64",
"SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.s390x",
"SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.x86_64",
"SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.aarch64",
"SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.s390x",
"SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.x86_64",
"SUSE Manager Client Tools 15-BETA:mgr-push-5.0.1-159000.4.21.1.noarch",
"SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64",
"SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x",
"SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64",
"SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.aarch64",
"SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.s390x",
"SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.x86_64",
"SUSE Manager Client Tools 15-BETA:python3-hwdata-2.3.5-159000.5.13.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-mgr-push-5.0.1-159000.4.21.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-pyvmomi-6.7.3-159000.3.6.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-rhnlib-5.0.1-159000.6.30.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-spacewalk-check-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-setup-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-tools-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.aarch64",
"SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.s390x",
"SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.x86_64",
"SUSE Manager Client Tools 15-BETA:spacecmd-5.0.1-159000.6.42.1.noarch",
"SUSE Manager Client Tools 15-BETA:spacewalk-check-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:spacewalk-client-setup-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:spacewalk-client-tools-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:supportutils-plugin-salt-1.2.2-159000.5.9.1.noarch",
"SUSE Manager Client Tools 15-BETA:supportutils-plugin-susemanager-client-5.0.1-159000.6.15.1.noarch",
"SUSE Manager Client Tools 15-BETA:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch",
"SUSE Manager Client Tools Beta for SLE Micro 5:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch",
"SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64",
"SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x",
"SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64",
"SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64",
"SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x",
"SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64",
"SUSE Manager Client Tools Beta for SLE Micro 5:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-27664",
"url": "https://www.suse.com/security/cve/CVE-2022-27664"
},
{
"category": "external",
"summary": "SUSE Bug 1203185 for CVE-2022-27664",
"url": "https://bugzilla.suse.com/1203185"
},
{
"category": "external",
"summary": "SUSE Bug 1203293 for CVE-2022-27664",
"url": "https://bugzilla.suse.com/1203293"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Manager Client Tools 15-BETA:ansible-2.9.27-159000.3.9.1.noarch",
"SUSE Manager Client Tools 15-BETA:ansible-doc-2.9.27-159000.3.9.1.noarch",
"SUSE Manager Client Tools 15-BETA:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch",
"SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.aarch64",
"SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.s390x",
"SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.x86_64",
"SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64",
"SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x",
"SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64",
"SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.aarch64",
"SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.s390x",
"SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.x86_64",
"SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.aarch64",
"SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.s390x",
"SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.x86_64",
"SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.aarch64",
"SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.s390x",
"SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.x86_64",
"SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.aarch64",
"SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.s390x",
"SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.x86_64",
"SUSE Manager Client Tools 15-BETA:mgr-push-5.0.1-159000.4.21.1.noarch",
"SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64",
"SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x",
"SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64",
"SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.aarch64",
"SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.s390x",
"SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.x86_64",
"SUSE Manager Client Tools 15-BETA:python3-hwdata-2.3.5-159000.5.13.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-mgr-push-5.0.1-159000.4.21.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-pyvmomi-6.7.3-159000.3.6.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-rhnlib-5.0.1-159000.6.30.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-spacewalk-check-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-setup-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-tools-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.aarch64",
"SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.s390x",
"SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.x86_64",
"SUSE Manager Client Tools 15-BETA:spacecmd-5.0.1-159000.6.42.1.noarch",
"SUSE Manager Client Tools 15-BETA:spacewalk-check-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:spacewalk-client-setup-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:spacewalk-client-tools-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:supportutils-plugin-salt-1.2.2-159000.5.9.1.noarch",
"SUSE Manager Client Tools 15-BETA:supportutils-plugin-susemanager-client-5.0.1-159000.6.15.1.noarch",
"SUSE Manager Client Tools 15-BETA:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch",
"SUSE Manager Client Tools Beta for SLE Micro 5:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch",
"SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64",
"SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x",
"SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64",
"SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64",
"SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x",
"SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64",
"SUSE Manager Client Tools Beta for SLE Micro 5:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Manager Client Tools 15-BETA:ansible-2.9.27-159000.3.9.1.noarch",
"SUSE Manager Client Tools 15-BETA:ansible-doc-2.9.27-159000.3.9.1.noarch",
"SUSE Manager Client Tools 15-BETA:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch",
"SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.aarch64",
"SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.s390x",
"SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.x86_64",
"SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64",
"SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x",
"SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64",
"SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.aarch64",
"SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.s390x",
"SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.x86_64",
"SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.aarch64",
"SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.s390x",
"SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.x86_64",
"SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.aarch64",
"SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.s390x",
"SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.x86_64",
"SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.aarch64",
"SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.s390x",
"SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.x86_64",
"SUSE Manager Client Tools 15-BETA:mgr-push-5.0.1-159000.4.21.1.noarch",
"SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64",
"SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x",
"SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64",
"SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.aarch64",
"SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.s390x",
"SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.x86_64",
"SUSE Manager Client Tools 15-BETA:python3-hwdata-2.3.5-159000.5.13.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-mgr-push-5.0.1-159000.4.21.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-pyvmomi-6.7.3-159000.3.6.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-rhnlib-5.0.1-159000.6.30.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-spacewalk-check-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-setup-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-tools-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.aarch64",
"SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.s390x",
"SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.x86_64",
"SUSE Manager Client Tools 15-BETA:spacecmd-5.0.1-159000.6.42.1.noarch",
"SUSE Manager Client Tools 15-BETA:spacewalk-check-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:spacewalk-client-setup-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:spacewalk-client-tools-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:supportutils-plugin-salt-1.2.2-159000.5.9.1.noarch",
"SUSE Manager Client Tools 15-BETA:supportutils-plugin-susemanager-client-5.0.1-159000.6.15.1.noarch",
"SUSE Manager Client Tools 15-BETA:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch",
"SUSE Manager Client Tools Beta for SLE Micro 5:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch",
"SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64",
"SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x",
"SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64",
"SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64",
"SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x",
"SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64",
"SUSE Manager Client Tools Beta for SLE Micro 5:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-01-23T15:20:05Z",
"details": "important"
}
],
"title": "CVE-2022-27664"
},
{
"cve": "CVE-2022-29170",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-29170"
}
],
"notes": [
{
"category": "general",
"text": "Grafana is an open-source platform for monitoring and observability. In Grafana Enterprise, the Request security feature allows list allows to configure Grafana in a way so that the instance doesn\u0027t call or only calls specific hosts. The vulnerability present starting with version 7.4.0-beta1 and prior to versions 7.5.16 and 8.5.3 allows someone to bypass these security configurations if a malicious datasource (running on an allowed host) returns an HTTP redirect to a forbidden host. The vulnerability only impacts Grafana Enterprise when the Request security allow list is used and there is a possibility to add a custom datasource to Grafana which returns HTTP redirects. In this scenario, Grafana would blindly follow the redirects and potentially give secure information to the clients. Grafana Cloud is not impacted by this vulnerability. Versions 7.5.16 and 8.5.3 contain a patch for this issue. There are currently no known workarounds.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Manager Client Tools 15-BETA:ansible-2.9.27-159000.3.9.1.noarch",
"SUSE Manager Client Tools 15-BETA:ansible-doc-2.9.27-159000.3.9.1.noarch",
"SUSE Manager Client Tools 15-BETA:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch",
"SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.aarch64",
"SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.s390x",
"SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.x86_64",
"SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64",
"SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x",
"SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64",
"SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.aarch64",
"SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.s390x",
"SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.x86_64",
"SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.aarch64",
"SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.s390x",
"SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.x86_64",
"SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.aarch64",
"SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.s390x",
"SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.x86_64",
"SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.aarch64",
"SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.s390x",
"SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.x86_64",
"SUSE Manager Client Tools 15-BETA:mgr-push-5.0.1-159000.4.21.1.noarch",
"SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64",
"SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x",
"SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64",
"SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.aarch64",
"SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.s390x",
"SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.x86_64",
"SUSE Manager Client Tools 15-BETA:python3-hwdata-2.3.5-159000.5.13.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-mgr-push-5.0.1-159000.4.21.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-pyvmomi-6.7.3-159000.3.6.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-rhnlib-5.0.1-159000.6.30.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-spacewalk-check-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-setup-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-tools-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.aarch64",
"SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.s390x",
"SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.x86_64",
"SUSE Manager Client Tools 15-BETA:spacecmd-5.0.1-159000.6.42.1.noarch",
"SUSE Manager Client Tools 15-BETA:spacewalk-check-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:spacewalk-client-setup-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:spacewalk-client-tools-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:supportutils-plugin-salt-1.2.2-159000.5.9.1.noarch",
"SUSE Manager Client Tools 15-BETA:supportutils-plugin-susemanager-client-5.0.1-159000.6.15.1.noarch",
"SUSE Manager Client Tools 15-BETA:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch",
"SUSE Manager Client Tools Beta for SLE Micro 5:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch",
"SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64",
"SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x",
"SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64",
"SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64",
"SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x",
"SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64",
"SUSE Manager Client Tools Beta for SLE Micro 5:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-29170",
"url": "https://www.suse.com/security/cve/CVE-2022-29170"
},
{
"category": "external",
"summary": "SUSE Bug 1199810 for CVE-2022-29170",
"url": "https://bugzilla.suse.com/1199810"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Manager Client Tools 15-BETA:ansible-2.9.27-159000.3.9.1.noarch",
"SUSE Manager Client Tools 15-BETA:ansible-doc-2.9.27-159000.3.9.1.noarch",
"SUSE Manager Client Tools 15-BETA:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch",
"SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.aarch64",
"SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.s390x",
"SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.x86_64",
"SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64",
"SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x",
"SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64",
"SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.aarch64",
"SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.s390x",
"SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.x86_64",
"SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.aarch64",
"SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.s390x",
"SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.x86_64",
"SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.aarch64",
"SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.s390x",
"SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.x86_64",
"SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.aarch64",
"SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.s390x",
"SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.x86_64",
"SUSE Manager Client Tools 15-BETA:mgr-push-5.0.1-159000.4.21.1.noarch",
"SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64",
"SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x",
"SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64",
"SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.aarch64",
"SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.s390x",
"SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.x86_64",
"SUSE Manager Client Tools 15-BETA:python3-hwdata-2.3.5-159000.5.13.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-mgr-push-5.0.1-159000.4.21.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-pyvmomi-6.7.3-159000.3.6.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-rhnlib-5.0.1-159000.6.30.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-spacewalk-check-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-setup-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-tools-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.aarch64",
"SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.s390x",
"SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.x86_64",
"SUSE Manager Client Tools 15-BETA:spacecmd-5.0.1-159000.6.42.1.noarch",
"SUSE Manager Client Tools 15-BETA:spacewalk-check-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:spacewalk-client-setup-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:spacewalk-client-tools-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:supportutils-plugin-salt-1.2.2-159000.5.9.1.noarch",
"SUSE Manager Client Tools 15-BETA:supportutils-plugin-susemanager-client-5.0.1-159000.6.15.1.noarch",
"SUSE Manager Client Tools 15-BETA:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch",
"SUSE Manager Client Tools Beta for SLE Micro 5:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch",
"SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64",
"SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x",
"SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64",
"SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64",
"SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x",
"SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64",
"SUSE Manager Client Tools Beta for SLE Micro 5:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:H/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Manager Client Tools 15-BETA:ansible-2.9.27-159000.3.9.1.noarch",
"SUSE Manager Client Tools 15-BETA:ansible-doc-2.9.27-159000.3.9.1.noarch",
"SUSE Manager Client Tools 15-BETA:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch",
"SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.aarch64",
"SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.s390x",
"SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.x86_64",
"SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64",
"SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x",
"SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64",
"SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.aarch64",
"SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.s390x",
"SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.x86_64",
"SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.aarch64",
"SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.s390x",
"SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.x86_64",
"SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.aarch64",
"SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.s390x",
"SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.x86_64",
"SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.aarch64",
"SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.s390x",
"SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.x86_64",
"SUSE Manager Client Tools 15-BETA:mgr-push-5.0.1-159000.4.21.1.noarch",
"SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64",
"SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x",
"SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64",
"SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.aarch64",
"SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.s390x",
"SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.x86_64",
"SUSE Manager Client Tools 15-BETA:python3-hwdata-2.3.5-159000.5.13.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-mgr-push-5.0.1-159000.4.21.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-pyvmomi-6.7.3-159000.3.6.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-rhnlib-5.0.1-159000.6.30.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-spacewalk-check-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-setup-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-tools-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.aarch64",
"SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.s390x",
"SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.x86_64",
"SUSE Manager Client Tools 15-BETA:spacecmd-5.0.1-159000.6.42.1.noarch",
"SUSE Manager Client Tools 15-BETA:spacewalk-check-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:spacewalk-client-setup-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:spacewalk-client-tools-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:supportutils-plugin-salt-1.2.2-159000.5.9.1.noarch",
"SUSE Manager Client Tools 15-BETA:supportutils-plugin-susemanager-client-5.0.1-159000.6.15.1.noarch",
"SUSE Manager Client Tools 15-BETA:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch",
"SUSE Manager Client Tools Beta for SLE Micro 5:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch",
"SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64",
"SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x",
"SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64",
"SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64",
"SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x",
"SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64",
"SUSE Manager Client Tools Beta for SLE Micro 5:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-01-23T15:20:05Z",
"details": "moderate"
}
],
"title": "CVE-2022-29170"
},
{
"cve": "CVE-2022-31097",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-31097"
}
],
"notes": [
{
"category": "general",
"text": "Grafana is an open-source platform for monitoring and observability. Versions on the 8.x and 9.x branch prior to 9.0.3, 8.5.9, 8.4.10, and 8.3.10 are vulnerable to stored cross-site scripting via the Unified Alerting feature of Grafana. An attacker can exploit this vulnerability to escalate privilege from editor to admin by tricking an authenticated admin to click on a link. Versions 9.0.3, 8.5.9, 8.4.10, and 8.3.10 contain a patch. As a workaround, it is possible to disable alerting or use legacy alerting.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Manager Client Tools 15-BETA:ansible-2.9.27-159000.3.9.1.noarch",
"SUSE Manager Client Tools 15-BETA:ansible-doc-2.9.27-159000.3.9.1.noarch",
"SUSE Manager Client Tools 15-BETA:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch",
"SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.aarch64",
"SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.s390x",
"SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.x86_64",
"SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64",
"SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x",
"SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64",
"SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.aarch64",
"SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.s390x",
"SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.x86_64",
"SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.aarch64",
"SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.s390x",
"SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.x86_64",
"SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.aarch64",
"SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.s390x",
"SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.x86_64",
"SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.aarch64",
"SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.s390x",
"SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.x86_64",
"SUSE Manager Client Tools 15-BETA:mgr-push-5.0.1-159000.4.21.1.noarch",
"SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64",
"SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x",
"SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64",
"SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.aarch64",
"SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.s390x",
"SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.x86_64",
"SUSE Manager Client Tools 15-BETA:python3-hwdata-2.3.5-159000.5.13.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-mgr-push-5.0.1-159000.4.21.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-pyvmomi-6.7.3-159000.3.6.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-rhnlib-5.0.1-159000.6.30.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-spacewalk-check-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-setup-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-tools-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.aarch64",
"SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.s390x",
"SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.x86_64",
"SUSE Manager Client Tools 15-BETA:spacecmd-5.0.1-159000.6.42.1.noarch",
"SUSE Manager Client Tools 15-BETA:spacewalk-check-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:spacewalk-client-setup-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:spacewalk-client-tools-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:supportutils-plugin-salt-1.2.2-159000.5.9.1.noarch",
"SUSE Manager Client Tools 15-BETA:supportutils-plugin-susemanager-client-5.0.1-159000.6.15.1.noarch",
"SUSE Manager Client Tools 15-BETA:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch",
"SUSE Manager Client Tools Beta for SLE Micro 5:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch",
"SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64",
"SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x",
"SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64",
"SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64",
"SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x",
"SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64",
"SUSE Manager Client Tools Beta for SLE Micro 5:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-31097",
"url": "https://www.suse.com/security/cve/CVE-2022-31097"
},
{
"category": "external",
"summary": "SUSE Bug 1201535 for CVE-2022-31097",
"url": "https://bugzilla.suse.com/1201535"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Manager Client Tools 15-BETA:ansible-2.9.27-159000.3.9.1.noarch",
"SUSE Manager Client Tools 15-BETA:ansible-doc-2.9.27-159000.3.9.1.noarch",
"SUSE Manager Client Tools 15-BETA:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch",
"SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.aarch64",
"SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.s390x",
"SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.x86_64",
"SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64",
"SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x",
"SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64",
"SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.aarch64",
"SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.s390x",
"SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.x86_64",
"SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.aarch64",
"SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.s390x",
"SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.x86_64",
"SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.aarch64",
"SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.s390x",
"SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.x86_64",
"SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.aarch64",
"SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.s390x",
"SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.x86_64",
"SUSE Manager Client Tools 15-BETA:mgr-push-5.0.1-159000.4.21.1.noarch",
"SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64",
"SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x",
"SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64",
"SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.aarch64",
"SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.s390x",
"SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.x86_64",
"SUSE Manager Client Tools 15-BETA:python3-hwdata-2.3.5-159000.5.13.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-mgr-push-5.0.1-159000.4.21.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-pyvmomi-6.7.3-159000.3.6.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-rhnlib-5.0.1-159000.6.30.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-spacewalk-check-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-setup-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-tools-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.aarch64",
"SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.s390x",
"SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.x86_64",
"SUSE Manager Client Tools 15-BETA:spacecmd-5.0.1-159000.6.42.1.noarch",
"SUSE Manager Client Tools 15-BETA:spacewalk-check-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:spacewalk-client-setup-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:spacewalk-client-tools-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:supportutils-plugin-salt-1.2.2-159000.5.9.1.noarch",
"SUSE Manager Client Tools 15-BETA:supportutils-plugin-susemanager-client-5.0.1-159000.6.15.1.noarch",
"SUSE Manager Client Tools 15-BETA:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch",
"SUSE Manager Client Tools Beta for SLE Micro 5:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch",
"SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64",
"SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x",
"SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64",
"SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64",
"SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x",
"SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64",
"SUSE Manager Client Tools Beta for SLE Micro 5:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.3,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"SUSE Manager Client Tools 15-BETA:ansible-2.9.27-159000.3.9.1.noarch",
"SUSE Manager Client Tools 15-BETA:ansible-doc-2.9.27-159000.3.9.1.noarch",
"SUSE Manager Client Tools 15-BETA:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch",
"SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.aarch64",
"SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.s390x",
"SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.x86_64",
"SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64",
"SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x",
"SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64",
"SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.aarch64",
"SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.s390x",
"SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.x86_64",
"SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.aarch64",
"SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.s390x",
"SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.x86_64",
"SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.aarch64",
"SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.s390x",
"SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.x86_64",
"SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.aarch64",
"SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.s390x",
"SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.x86_64",
"SUSE Manager Client Tools 15-BETA:mgr-push-5.0.1-159000.4.21.1.noarch",
"SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64",
"SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x",
"SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64",
"SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.aarch64",
"SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.s390x",
"SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.x86_64",
"SUSE Manager Client Tools 15-BETA:python3-hwdata-2.3.5-159000.5.13.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-mgr-push-5.0.1-159000.4.21.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-pyvmomi-6.7.3-159000.3.6.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-rhnlib-5.0.1-159000.6.30.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-spacewalk-check-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-setup-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-tools-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.aarch64",
"SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.s390x",
"SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.x86_64",
"SUSE Manager Client Tools 15-BETA:spacecmd-5.0.1-159000.6.42.1.noarch",
"SUSE Manager Client Tools 15-BETA:spacewalk-check-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:spacewalk-client-setup-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:spacewalk-client-tools-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:supportutils-plugin-salt-1.2.2-159000.5.9.1.noarch",
"SUSE Manager Client Tools 15-BETA:supportutils-plugin-susemanager-client-5.0.1-159000.6.15.1.noarch",
"SUSE Manager Client Tools 15-BETA:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch",
"SUSE Manager Client Tools Beta for SLE Micro 5:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch",
"SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64",
"SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x",
"SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64",
"SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64",
"SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x",
"SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64",
"SUSE Manager Client Tools Beta for SLE Micro 5:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-01-23T15:20:05Z",
"details": "important"
}
],
"title": "CVE-2022-31097"
},
{
"cve": "CVE-2022-31107",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-31107"
}
],
"notes": [
{
"category": "general",
"text": "Grafana is an open-source platform for monitoring and observability. In versions 5.3 until 9.0.3, 8.5.9, 8.4.10, and 8.3.10, it is possible for a malicious user who has authorization to log into a Grafana instance via a configured OAuth IdP which provides a login name to take over the account of another user in that Grafana instance. This can occur when the malicious user is authorized to log in to Grafana via OAuth, the malicious user\u0027s external user id is not already associated with an account in Grafana, the malicious user\u0027s email address is not already associated with an account in Grafana, and the malicious user knows the Grafana username of the target user. If these conditions are met, the malicious user can set their username in the OAuth provider to that of the target user, then go through the OAuth flow to log in to Grafana. Due to the way that external and internal user accounts are linked together during login, if the conditions above are all met then the malicious user will be able to log in to the target user\u0027s Grafana account. Versions 9.0.3, 8.5.9, 8.4.10, and 8.3.10 contain a patch for this issue. As a workaround, concerned users can disable OAuth login to their Grafana instance, or ensure that all users authorized to log in via OAuth have a corresponding user account in Grafana linked to their email address.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Manager Client Tools 15-BETA:ansible-2.9.27-159000.3.9.1.noarch",
"SUSE Manager Client Tools 15-BETA:ansible-doc-2.9.27-159000.3.9.1.noarch",
"SUSE Manager Client Tools 15-BETA:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch",
"SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.aarch64",
"SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.s390x",
"SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.x86_64",
"SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64",
"SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x",
"SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64",
"SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.aarch64",
"SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.s390x",
"SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.x86_64",
"SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.aarch64",
"SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.s390x",
"SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.x86_64",
"SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.aarch64",
"SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.s390x",
"SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.x86_64",
"SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.aarch64",
"SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.s390x",
"SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.x86_64",
"SUSE Manager Client Tools 15-BETA:mgr-push-5.0.1-159000.4.21.1.noarch",
"SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64",
"SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x",
"SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64",
"SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.aarch64",
"SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.s390x",
"SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.x86_64",
"SUSE Manager Client Tools 15-BETA:python3-hwdata-2.3.5-159000.5.13.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-mgr-push-5.0.1-159000.4.21.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-pyvmomi-6.7.3-159000.3.6.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-rhnlib-5.0.1-159000.6.30.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-spacewalk-check-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-setup-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-tools-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.aarch64",
"SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.s390x",
"SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.x86_64",
"SUSE Manager Client Tools 15-BETA:spacecmd-5.0.1-159000.6.42.1.noarch",
"SUSE Manager Client Tools 15-BETA:spacewalk-check-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:spacewalk-client-setup-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:spacewalk-client-tools-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:supportutils-plugin-salt-1.2.2-159000.5.9.1.noarch",
"SUSE Manager Client Tools 15-BETA:supportutils-plugin-susemanager-client-5.0.1-159000.6.15.1.noarch",
"SUSE Manager Client Tools 15-BETA:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch",
"SUSE Manager Client Tools Beta for SLE Micro 5:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch",
"SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64",
"SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x",
"SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64",
"SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64",
"SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x",
"SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64",
"SUSE Manager Client Tools Beta for SLE Micro 5:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-31107",
"url": "https://www.suse.com/security/cve/CVE-2022-31107"
},
{
"category": "external",
"summary": "SUSE Bug 1201539 for CVE-2022-31107",
"url": "https://bugzilla.suse.com/1201539"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Manager Client Tools 15-BETA:ansible-2.9.27-159000.3.9.1.noarch",
"SUSE Manager Client Tools 15-BETA:ansible-doc-2.9.27-159000.3.9.1.noarch",
"SUSE Manager Client Tools 15-BETA:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch",
"SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.aarch64",
"SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.s390x",
"SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.x86_64",
"SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64",
"SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x",
"SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64",
"SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.aarch64",
"SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.s390x",
"SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.x86_64",
"SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.aarch64",
"SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.s390x",
"SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.x86_64",
"SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.aarch64",
"SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.s390x",
"SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.x86_64",
"SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.aarch64",
"SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.s390x",
"SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.x86_64",
"SUSE Manager Client Tools 15-BETA:mgr-push-5.0.1-159000.4.21.1.noarch",
"SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64",
"SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x",
"SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64",
"SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.aarch64",
"SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.s390x",
"SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.x86_64",
"SUSE Manager Client Tools 15-BETA:python3-hwdata-2.3.5-159000.5.13.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-mgr-push-5.0.1-159000.4.21.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-pyvmomi-6.7.3-159000.3.6.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-rhnlib-5.0.1-159000.6.30.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-spacewalk-check-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-setup-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-tools-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.aarch64",
"SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.s390x",
"SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.x86_64",
"SUSE Manager Client Tools 15-BETA:spacecmd-5.0.1-159000.6.42.1.noarch",
"SUSE Manager Client Tools 15-BETA:spacewalk-check-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:spacewalk-client-setup-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:spacewalk-client-tools-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:supportutils-plugin-salt-1.2.2-159000.5.9.1.noarch",
"SUSE Manager Client Tools 15-BETA:supportutils-plugin-susemanager-client-5.0.1-159000.6.15.1.noarch",
"SUSE Manager Client Tools 15-BETA:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch",
"SUSE Manager Client Tools Beta for SLE Micro 5:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch",
"SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64",
"SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x",
"SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64",
"SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64",
"SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x",
"SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64",
"SUSE Manager Client Tools Beta for SLE Micro 5:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:L",
"version": "3.1"
},
"products": [
"SUSE Manager Client Tools 15-BETA:ansible-2.9.27-159000.3.9.1.noarch",
"SUSE Manager Client Tools 15-BETA:ansible-doc-2.9.27-159000.3.9.1.noarch",
"SUSE Manager Client Tools 15-BETA:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch",
"SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.aarch64",
"SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.s390x",
"SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.x86_64",
"SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64",
"SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x",
"SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64",
"SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.aarch64",
"SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.s390x",
"SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.x86_64",
"SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.aarch64",
"SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.s390x",
"SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.x86_64",
"SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.aarch64",
"SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.s390x",
"SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.x86_64",
"SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.aarch64",
"SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.s390x",
"SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.x86_64",
"SUSE Manager Client Tools 15-BETA:mgr-push-5.0.1-159000.4.21.1.noarch",
"SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64",
"SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x",
"SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64",
"SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.aarch64",
"SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.s390x",
"SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.x86_64",
"SUSE Manager Client Tools 15-BETA:python3-hwdata-2.3.5-159000.5.13.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-mgr-push-5.0.1-159000.4.21.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-pyvmomi-6.7.3-159000.3.6.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-rhnlib-5.0.1-159000.6.30.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-spacewalk-check-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-setup-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-tools-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.aarch64",
"SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.s390x",
"SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.x86_64",
"SUSE Manager Client Tools 15-BETA:spacecmd-5.0.1-159000.6.42.1.noarch",
"SUSE Manager Client Tools 15-BETA:spacewalk-check-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:spacewalk-client-setup-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:spacewalk-client-tools-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:supportutils-plugin-salt-1.2.2-159000.5.9.1.noarch",
"SUSE Manager Client Tools 15-BETA:supportutils-plugin-susemanager-client-5.0.1-159000.6.15.1.noarch",
"SUSE Manager Client Tools 15-BETA:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch",
"SUSE Manager Client Tools Beta for SLE Micro 5:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch",
"SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64",
"SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x",
"SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64",
"SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64",
"SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x",
"SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64",
"SUSE Manager Client Tools Beta for SLE Micro 5:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-01-23T15:20:05Z",
"details": "important"
}
],
"title": "CVE-2022-31107"
},
{
"cve": "CVE-2022-31123",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-31123"
}
],
"notes": [
{
"category": "general",
"text": "Grafana is an open source observability and data visualization platform. Versions prior to 9.1.8 and 8.5.14 are vulnerable to a bypass in the plugin signature verification. An attacker can convince a server admin to download and successfully run a malicious plugin even though unsigned plugins are not allowed. Versions 9.1.8 and 8.5.14 contain a patch for this issue. As a workaround, do not install plugins downloaded from untrusted sources.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Manager Client Tools 15-BETA:ansible-2.9.27-159000.3.9.1.noarch",
"SUSE Manager Client Tools 15-BETA:ansible-doc-2.9.27-159000.3.9.1.noarch",
"SUSE Manager Client Tools 15-BETA:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch",
"SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.aarch64",
"SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.s390x",
"SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.x86_64",
"SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64",
"SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x",
"SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64",
"SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.aarch64",
"SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.s390x",
"SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.x86_64",
"SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.aarch64",
"SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.s390x",
"SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.x86_64",
"SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.aarch64",
"SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.s390x",
"SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.x86_64",
"SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.aarch64",
"SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.s390x",
"SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.x86_64",
"SUSE Manager Client Tools 15-BETA:mgr-push-5.0.1-159000.4.21.1.noarch",
"SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64",
"SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x",
"SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64",
"SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.aarch64",
"SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.s390x",
"SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.x86_64",
"SUSE Manager Client Tools 15-BETA:python3-hwdata-2.3.5-159000.5.13.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-mgr-push-5.0.1-159000.4.21.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-pyvmomi-6.7.3-159000.3.6.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-rhnlib-5.0.1-159000.6.30.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-spacewalk-check-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-setup-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-tools-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.aarch64",
"SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.s390x",
"SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.x86_64",
"SUSE Manager Client Tools 15-BETA:spacecmd-5.0.1-159000.6.42.1.noarch",
"SUSE Manager Client Tools 15-BETA:spacewalk-check-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:spacewalk-client-setup-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:spacewalk-client-tools-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:supportutils-plugin-salt-1.2.2-159000.5.9.1.noarch",
"SUSE Manager Client Tools 15-BETA:supportutils-plugin-susemanager-client-5.0.1-159000.6.15.1.noarch",
"SUSE Manager Client Tools 15-BETA:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch",
"SUSE Manager Client Tools Beta for SLE Micro 5:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch",
"SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64",
"SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x",
"SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64",
"SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64",
"SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x",
"SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64",
"SUSE Manager Client Tools Beta for SLE Micro 5:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-31123",
"url": "https://www.suse.com/security/cve/CVE-2022-31123"
},
{
"category": "external",
"summary": "SUSE Bug 1204302 for CVE-2022-31123",
"url": "https://bugzilla.suse.com/1204302"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Manager Client Tools 15-BETA:ansible-2.9.27-159000.3.9.1.noarch",
"SUSE Manager Client Tools 15-BETA:ansible-doc-2.9.27-159000.3.9.1.noarch",
"SUSE Manager Client Tools 15-BETA:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch",
"SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.aarch64",
"SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.s390x",
"SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.x86_64",
"SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64",
"SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x",
"SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64",
"SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.aarch64",
"SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.s390x",
"SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.x86_64",
"SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.aarch64",
"SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.s390x",
"SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.x86_64",
"SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.aarch64",
"SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.s390x",
"SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.x86_64",
"SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.aarch64",
"SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.s390x",
"SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.x86_64",
"SUSE Manager Client Tools 15-BETA:mgr-push-5.0.1-159000.4.21.1.noarch",
"SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64",
"SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x",
"SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64",
"SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.aarch64",
"SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.s390x",
"SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.x86_64",
"SUSE Manager Client Tools 15-BETA:python3-hwdata-2.3.5-159000.5.13.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-mgr-push-5.0.1-159000.4.21.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-pyvmomi-6.7.3-159000.3.6.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-rhnlib-5.0.1-159000.6.30.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-spacewalk-check-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-setup-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-tools-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.aarch64",
"SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.s390x",
"SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.x86_64",
"SUSE Manager Client Tools 15-BETA:spacecmd-5.0.1-159000.6.42.1.noarch",
"SUSE Manager Client Tools 15-BETA:spacewalk-check-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:spacewalk-client-setup-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:spacewalk-client-tools-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:supportutils-plugin-salt-1.2.2-159000.5.9.1.noarch",
"SUSE Manager Client Tools 15-BETA:supportutils-plugin-susemanager-client-5.0.1-159000.6.15.1.noarch",
"SUSE Manager Client Tools 15-BETA:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch",
"SUSE Manager Client Tools Beta for SLE Micro 5:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch",
"SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64",
"SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x",
"SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64",
"SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64",
"SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x",
"SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64",
"SUSE Manager Client Tools Beta for SLE Micro 5:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"SUSE Manager Client Tools 15-BETA:ansible-2.9.27-159000.3.9.1.noarch",
"SUSE Manager Client Tools 15-BETA:ansible-doc-2.9.27-159000.3.9.1.noarch",
"SUSE Manager Client Tools 15-BETA:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch",
"SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.aarch64",
"SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.s390x",
"SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.x86_64",
"SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64",
"SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x",
"SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64",
"SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.aarch64",
"SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.s390x",
"SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.x86_64",
"SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.aarch64",
"SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.s390x",
"SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.x86_64",
"SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.aarch64",
"SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.s390x",
"SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.x86_64",
"SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.aarch64",
"SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.s390x",
"SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.x86_64",
"SUSE Manager Client Tools 15-BETA:mgr-push-5.0.1-159000.4.21.1.noarch",
"SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64",
"SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x",
"SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64",
"SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.aarch64",
"SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.s390x",
"SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.x86_64",
"SUSE Manager Client Tools 15-BETA:python3-hwdata-2.3.5-159000.5.13.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-mgr-push-5.0.1-159000.4.21.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-pyvmomi-6.7.3-159000.3.6.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-rhnlib-5.0.1-159000.6.30.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-spacewalk-check-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-setup-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-tools-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.aarch64",
"SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.s390x",
"SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.x86_64",
"SUSE Manager Client Tools 15-BETA:spacecmd-5.0.1-159000.6.42.1.noarch",
"SUSE Manager Client Tools 15-BETA:spacewalk-check-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:spacewalk-client-setup-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:spacewalk-client-tools-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:supportutils-plugin-salt-1.2.2-159000.5.9.1.noarch",
"SUSE Manager Client Tools 15-BETA:supportutils-plugin-susemanager-client-5.0.1-159000.6.15.1.noarch",
"SUSE Manager Client Tools 15-BETA:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch",
"SUSE Manager Client Tools Beta for SLE Micro 5:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch",
"SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64",
"SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x",
"SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64",
"SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64",
"SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x",
"SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64",
"SUSE Manager Client Tools Beta for SLE Micro 5:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-01-23T15:20:05Z",
"details": "low"
}
],
"title": "CVE-2022-31123"
},
{
"cve": "CVE-2022-31130",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-31130"
}
],
"notes": [
{
"category": "general",
"text": "Grafana is an open source observability and data visualization platform. Versions of Grafana for endpoints prior to 9.1.8 and 8.5.14 could leak authentication tokens to some destination plugins under some conditions. The vulnerability impacts data source and plugin proxy endpoints with authentication tokens. The destination plugin could receive a user\u0027s Grafana authentication token. Versions 9.1.8 and 8.5.14 contain a patch for this issue. As a workaround, do not use API keys, JWT authentication, or any HTTP Header based authentication.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Manager Client Tools 15-BETA:ansible-2.9.27-159000.3.9.1.noarch",
"SUSE Manager Client Tools 15-BETA:ansible-doc-2.9.27-159000.3.9.1.noarch",
"SUSE Manager Client Tools 15-BETA:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch",
"SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.aarch64",
"SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.s390x",
"SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.x86_64",
"SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64",
"SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x",
"SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64",
"SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.aarch64",
"SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.s390x",
"SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.x86_64",
"SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.aarch64",
"SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.s390x",
"SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.x86_64",
"SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.aarch64",
"SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.s390x",
"SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.x86_64",
"SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.aarch64",
"SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.s390x",
"SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.x86_64",
"SUSE Manager Client Tools 15-BETA:mgr-push-5.0.1-159000.4.21.1.noarch",
"SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64",
"SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x",
"SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64",
"SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.aarch64",
"SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.s390x",
"SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.x86_64",
"SUSE Manager Client Tools 15-BETA:python3-hwdata-2.3.5-159000.5.13.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-mgr-push-5.0.1-159000.4.21.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-pyvmomi-6.7.3-159000.3.6.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-rhnlib-5.0.1-159000.6.30.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-spacewalk-check-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-setup-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-tools-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.aarch64",
"SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.s390x",
"SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.x86_64",
"SUSE Manager Client Tools 15-BETA:spacecmd-5.0.1-159000.6.42.1.noarch",
"SUSE Manager Client Tools 15-BETA:spacewalk-check-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:spacewalk-client-setup-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:spacewalk-client-tools-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:supportutils-plugin-salt-1.2.2-159000.5.9.1.noarch",
"SUSE Manager Client Tools 15-BETA:supportutils-plugin-susemanager-client-5.0.1-159000.6.15.1.noarch",
"SUSE Manager Client Tools 15-BETA:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch",
"SUSE Manager Client Tools Beta for SLE Micro 5:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch",
"SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64",
"SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x",
"SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64",
"SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64",
"SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x",
"SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64",
"SUSE Manager Client Tools Beta for SLE Micro 5:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-31130",
"url": "https://www.suse.com/security/cve/CVE-2022-31130"
},
{
"category": "external",
"summary": "SUSE Bug 1204305 for CVE-2022-31130",
"url": "https://bugzilla.suse.com/1204305"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Manager Client Tools 15-BETA:ansible-2.9.27-159000.3.9.1.noarch",
"SUSE Manager Client Tools 15-BETA:ansible-doc-2.9.27-159000.3.9.1.noarch",
"SUSE Manager Client Tools 15-BETA:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch",
"SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.aarch64",
"SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.s390x",
"SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.x86_64",
"SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64",
"SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x",
"SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64",
"SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.aarch64",
"SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.s390x",
"SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.x86_64",
"SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.aarch64",
"SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.s390x",
"SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.x86_64",
"SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.aarch64",
"SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.s390x",
"SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.x86_64",
"SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.aarch64",
"SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.s390x",
"SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.x86_64",
"SUSE Manager Client Tools 15-BETA:mgr-push-5.0.1-159000.4.21.1.noarch",
"SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64",
"SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x",
"SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64",
"SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.aarch64",
"SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.s390x",
"SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.x86_64",
"SUSE Manager Client Tools 15-BETA:python3-hwdata-2.3.5-159000.5.13.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-mgr-push-5.0.1-159000.4.21.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-pyvmomi-6.7.3-159000.3.6.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-rhnlib-5.0.1-159000.6.30.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-spacewalk-check-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-setup-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-tools-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.aarch64",
"SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.s390x",
"SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.x86_64",
"SUSE Manager Client Tools 15-BETA:spacecmd-5.0.1-159000.6.42.1.noarch",
"SUSE Manager Client Tools 15-BETA:spacewalk-check-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:spacewalk-client-setup-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:spacewalk-client-tools-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:supportutils-plugin-salt-1.2.2-159000.5.9.1.noarch",
"SUSE Manager Client Tools 15-BETA:supportutils-plugin-susemanager-client-5.0.1-159000.6.15.1.noarch",
"SUSE Manager Client Tools 15-BETA:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch",
"SUSE Manager Client Tools Beta for SLE Micro 5:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch",
"SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64",
"SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x",
"SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64",
"SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64",
"SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x",
"SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64",
"SUSE Manager Client Tools Beta for SLE Micro 5:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"SUSE Manager Client Tools 15-BETA:ansible-2.9.27-159000.3.9.1.noarch",
"SUSE Manager Client Tools 15-BETA:ansible-doc-2.9.27-159000.3.9.1.noarch",
"SUSE Manager Client Tools 15-BETA:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch",
"SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.aarch64",
"SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.s390x",
"SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.x86_64",
"SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64",
"SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x",
"SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64",
"SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.aarch64",
"SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.s390x",
"SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.x86_64",
"SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.aarch64",
"SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.s390x",
"SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.x86_64",
"SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.aarch64",
"SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.s390x",
"SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.x86_64",
"SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.aarch64",
"SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.s390x",
"SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.x86_64",
"SUSE Manager Client Tools 15-BETA:mgr-push-5.0.1-159000.4.21.1.noarch",
"SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64",
"SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x",
"SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64",
"SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.aarch64",
"SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.s390x",
"SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.x86_64",
"SUSE Manager Client Tools 15-BETA:python3-hwdata-2.3.5-159000.5.13.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-mgr-push-5.0.1-159000.4.21.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-pyvmomi-6.7.3-159000.3.6.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-rhnlib-5.0.1-159000.6.30.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-spacewalk-check-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-setup-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-tools-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.aarch64",
"SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.s390x",
"SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.x86_64",
"SUSE Manager Client Tools 15-BETA:spacecmd-5.0.1-159000.6.42.1.noarch",
"SUSE Manager Client Tools 15-BETA:spacewalk-check-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:spacewalk-client-setup-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:spacewalk-client-tools-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:supportutils-plugin-salt-1.2.2-159000.5.9.1.noarch",
"SUSE Manager Client Tools 15-BETA:supportutils-plugin-susemanager-client-5.0.1-159000.6.15.1.noarch",
"SUSE Manager Client Tools 15-BETA:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch",
"SUSE Manager Client Tools Beta for SLE Micro 5:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch",
"SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64",
"SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x",
"SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64",
"SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64",
"SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x",
"SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64",
"SUSE Manager Client Tools Beta for SLE Micro 5:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-01-23T15:20:05Z",
"details": "moderate"
}
],
"title": "CVE-2022-31130"
},
{
"cve": "CVE-2022-32149",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-32149"
}
],
"notes": [
{
"category": "general",
"text": "An attacker may cause a denial of service by crafting an Accept-Language header which ParseAcceptLanguage will take significant time to parse.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Manager Client Tools 15-BETA:ansible-2.9.27-159000.3.9.1.noarch",
"SUSE Manager Client Tools 15-BETA:ansible-doc-2.9.27-159000.3.9.1.noarch",
"SUSE Manager Client Tools 15-BETA:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch",
"SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.aarch64",
"SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.s390x",
"SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.x86_64",
"SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64",
"SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x",
"SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64",
"SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.aarch64",
"SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.s390x",
"SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.x86_64",
"SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.aarch64",
"SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.s390x",
"SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.x86_64",
"SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.aarch64",
"SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.s390x",
"SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.x86_64",
"SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.aarch64",
"SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.s390x",
"SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.x86_64",
"SUSE Manager Client Tools 15-BETA:mgr-push-5.0.1-159000.4.21.1.noarch",
"SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64",
"SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x",
"SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64",
"SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.aarch64",
"SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.s390x",
"SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.x86_64",
"SUSE Manager Client Tools 15-BETA:python3-hwdata-2.3.5-159000.5.13.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-mgr-push-5.0.1-159000.4.21.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-pyvmomi-6.7.3-159000.3.6.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-rhnlib-5.0.1-159000.6.30.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-spacewalk-check-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-setup-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-tools-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.aarch64",
"SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.s390x",
"SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.x86_64",
"SUSE Manager Client Tools 15-BETA:spacecmd-5.0.1-159000.6.42.1.noarch",
"SUSE Manager Client Tools 15-BETA:spacewalk-check-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:spacewalk-client-setup-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:spacewalk-client-tools-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:supportutils-plugin-salt-1.2.2-159000.5.9.1.noarch",
"SUSE Manager Client Tools 15-BETA:supportutils-plugin-susemanager-client-5.0.1-159000.6.15.1.noarch",
"SUSE Manager Client Tools 15-BETA:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch",
"SUSE Manager Client Tools Beta for SLE Micro 5:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch",
"SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64",
"SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x",
"SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64",
"SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64",
"SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x",
"SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64",
"SUSE Manager Client Tools Beta for SLE Micro 5:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-32149",
"url": "https://www.suse.com/security/cve/CVE-2022-32149"
},
{
"category": "external",
"summary": "SUSE Bug 1204501 for CVE-2022-32149",
"url": "https://bugzilla.suse.com/1204501"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Manager Client Tools 15-BETA:ansible-2.9.27-159000.3.9.1.noarch",
"SUSE Manager Client Tools 15-BETA:ansible-doc-2.9.27-159000.3.9.1.noarch",
"SUSE Manager Client Tools 15-BETA:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch",
"SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.aarch64",
"SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.s390x",
"SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.x86_64",
"SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64",
"SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x",
"SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64",
"SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.aarch64",
"SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.s390x",
"SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.x86_64",
"SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.aarch64",
"SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.s390x",
"SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.x86_64",
"SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.aarch64",
"SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.s390x",
"SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.x86_64",
"SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.aarch64",
"SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.s390x",
"SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.x86_64",
"SUSE Manager Client Tools 15-BETA:mgr-push-5.0.1-159000.4.21.1.noarch",
"SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64",
"SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x",
"SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64",
"SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.aarch64",
"SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.s390x",
"SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.x86_64",
"SUSE Manager Client Tools 15-BETA:python3-hwdata-2.3.5-159000.5.13.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-mgr-push-5.0.1-159000.4.21.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-pyvmomi-6.7.3-159000.3.6.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-rhnlib-5.0.1-159000.6.30.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-spacewalk-check-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-setup-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-tools-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.aarch64",
"SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.s390x",
"SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.x86_64",
"SUSE Manager Client Tools 15-BETA:spacecmd-5.0.1-159000.6.42.1.noarch",
"SUSE Manager Client Tools 15-BETA:spacewalk-check-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:spacewalk-client-setup-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:spacewalk-client-tools-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:supportutils-plugin-salt-1.2.2-159000.5.9.1.noarch",
"SUSE Manager Client Tools 15-BETA:supportutils-plugin-susemanager-client-5.0.1-159000.6.15.1.noarch",
"SUSE Manager Client Tools 15-BETA:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch",
"SUSE Manager Client Tools Beta for SLE Micro 5:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch",
"SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64",
"SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x",
"SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64",
"SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64",
"SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x",
"SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64",
"SUSE Manager Client Tools Beta for SLE Micro 5:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Manager Client Tools 15-BETA:ansible-2.9.27-159000.3.9.1.noarch",
"SUSE Manager Client Tools 15-BETA:ansible-doc-2.9.27-159000.3.9.1.noarch",
"SUSE Manager Client Tools 15-BETA:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch",
"SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.aarch64",
"SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.s390x",
"SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.x86_64",
"SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64",
"SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x",
"SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64",
"SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.aarch64",
"SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.s390x",
"SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.x86_64",
"SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.aarch64",
"SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.s390x",
"SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.x86_64",
"SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.aarch64",
"SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.s390x",
"SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.x86_64",
"SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.aarch64",
"SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.s390x",
"SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.x86_64",
"SUSE Manager Client Tools 15-BETA:mgr-push-5.0.1-159000.4.21.1.noarch",
"SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64",
"SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x",
"SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64",
"SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.aarch64",
"SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.s390x",
"SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.x86_64",
"SUSE Manager Client Tools 15-BETA:python3-hwdata-2.3.5-159000.5.13.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-mgr-push-5.0.1-159000.4.21.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-pyvmomi-6.7.3-159000.3.6.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-rhnlib-5.0.1-159000.6.30.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-spacewalk-check-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-setup-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-tools-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.aarch64",
"SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.s390x",
"SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.x86_64",
"SUSE Manager Client Tools 15-BETA:spacecmd-5.0.1-159000.6.42.1.noarch",
"SUSE Manager Client Tools 15-BETA:spacewalk-check-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:spacewalk-client-setup-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:spacewalk-client-tools-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:supportutils-plugin-salt-1.2.2-159000.5.9.1.noarch",
"SUSE Manager Client Tools 15-BETA:supportutils-plugin-susemanager-client-5.0.1-159000.6.15.1.noarch",
"SUSE Manager Client Tools 15-BETA:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch",
"SUSE Manager Client Tools Beta for SLE Micro 5:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch",
"SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64",
"SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x",
"SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64",
"SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64",
"SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x",
"SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64",
"SUSE Manager Client Tools Beta for SLE Micro 5:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-01-23T15:20:05Z",
"details": "important"
}
],
"title": "CVE-2022-32149"
},
{
"cve": "CVE-2022-35957",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-35957"
}
],
"notes": [
{
"category": "general",
"text": "Grafana is an open-source platform for monitoring and observability. Versions prior to 9.1.6 and 8.5.13 are vulnerable to an escalation from admin to server admin when auth proxy is used, allowing an admin to take over the server admin account and gain full control of the grafana instance. All installations should be upgraded as soon as possible. As a workaround deactivate auth proxy following the instructions at: https://grafana.com/docs/grafana/latest/setup-grafana/configure-security/configure-authentication/auth-proxy/",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Manager Client Tools 15-BETA:ansible-2.9.27-159000.3.9.1.noarch",
"SUSE Manager Client Tools 15-BETA:ansible-doc-2.9.27-159000.3.9.1.noarch",
"SUSE Manager Client Tools 15-BETA:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch",
"SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.aarch64",
"SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.s390x",
"SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.x86_64",
"SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64",
"SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x",
"SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64",
"SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.aarch64",
"SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.s390x",
"SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.x86_64",
"SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.aarch64",
"SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.s390x",
"SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.x86_64",
"SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.aarch64",
"SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.s390x",
"SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.x86_64",
"SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.aarch64",
"SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.s390x",
"SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.x86_64",
"SUSE Manager Client Tools 15-BETA:mgr-push-5.0.1-159000.4.21.1.noarch",
"SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64",
"SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x",
"SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64",
"SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.aarch64",
"SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.s390x",
"SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.x86_64",
"SUSE Manager Client Tools 15-BETA:python3-hwdata-2.3.5-159000.5.13.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-mgr-push-5.0.1-159000.4.21.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-pyvmomi-6.7.3-159000.3.6.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-rhnlib-5.0.1-159000.6.30.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-spacewalk-check-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-setup-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-tools-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.aarch64",
"SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.s390x",
"SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.x86_64",
"SUSE Manager Client Tools 15-BETA:spacecmd-5.0.1-159000.6.42.1.noarch",
"SUSE Manager Client Tools 15-BETA:spacewalk-check-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:spacewalk-client-setup-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:spacewalk-client-tools-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:supportutils-plugin-salt-1.2.2-159000.5.9.1.noarch",
"SUSE Manager Client Tools 15-BETA:supportutils-plugin-susemanager-client-5.0.1-159000.6.15.1.noarch",
"SUSE Manager Client Tools 15-BETA:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch",
"SUSE Manager Client Tools Beta for SLE Micro 5:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch",
"SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64",
"SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x",
"SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64",
"SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64",
"SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x",
"SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64",
"SUSE Manager Client Tools Beta for SLE Micro 5:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-35957",
"url": "https://www.suse.com/security/cve/CVE-2022-35957"
},
{
"category": "external",
"summary": "SUSE Bug 1203597 for CVE-2022-35957",
"url": "https://bugzilla.suse.com/1203597"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Manager Client Tools 15-BETA:ansible-2.9.27-159000.3.9.1.noarch",
"SUSE Manager Client Tools 15-BETA:ansible-doc-2.9.27-159000.3.9.1.noarch",
"SUSE Manager Client Tools 15-BETA:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch",
"SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.aarch64",
"SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.s390x",
"SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.x86_64",
"SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64",
"SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x",
"SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64",
"SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.aarch64",
"SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.s390x",
"SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.x86_64",
"SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.aarch64",
"SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.s390x",
"SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.x86_64",
"SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.aarch64",
"SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.s390x",
"SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.x86_64",
"SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.aarch64",
"SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.s390x",
"SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.x86_64",
"SUSE Manager Client Tools 15-BETA:mgr-push-5.0.1-159000.4.21.1.noarch",
"SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64",
"SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x",
"SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64",
"SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.aarch64",
"SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.s390x",
"SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.x86_64",
"SUSE Manager Client Tools 15-BETA:python3-hwdata-2.3.5-159000.5.13.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-mgr-push-5.0.1-159000.4.21.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-pyvmomi-6.7.3-159000.3.6.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-rhnlib-5.0.1-159000.6.30.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-spacewalk-check-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-setup-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-tools-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.aarch64",
"SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.s390x",
"SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.x86_64",
"SUSE Manager Client Tools 15-BETA:spacecmd-5.0.1-159000.6.42.1.noarch",
"SUSE Manager Client Tools 15-BETA:spacewalk-check-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:spacewalk-client-setup-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:spacewalk-client-tools-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:supportutils-plugin-salt-1.2.2-159000.5.9.1.noarch",
"SUSE Manager Client Tools 15-BETA:supportutils-plugin-susemanager-client-5.0.1-159000.6.15.1.noarch",
"SUSE Manager Client Tools 15-BETA:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch",
"SUSE Manager Client Tools Beta for SLE Micro 5:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch",
"SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64",
"SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x",
"SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64",
"SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64",
"SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x",
"SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64",
"SUSE Manager Client Tools Beta for SLE Micro 5:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Manager Client Tools 15-BETA:ansible-2.9.27-159000.3.9.1.noarch",
"SUSE Manager Client Tools 15-BETA:ansible-doc-2.9.27-159000.3.9.1.noarch",
"SUSE Manager Client Tools 15-BETA:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch",
"SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.aarch64",
"SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.s390x",
"SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.x86_64",
"SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64",
"SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x",
"SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64",
"SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.aarch64",
"SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.s390x",
"SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.x86_64",
"SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.aarch64",
"SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.s390x",
"SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.x86_64",
"SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.aarch64",
"SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.s390x",
"SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.x86_64",
"SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.aarch64",
"SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.s390x",
"SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.x86_64",
"SUSE Manager Client Tools 15-BETA:mgr-push-5.0.1-159000.4.21.1.noarch",
"SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64",
"SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x",
"SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64",
"SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.aarch64",
"SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.s390x",
"SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.x86_64",
"SUSE Manager Client Tools 15-BETA:python3-hwdata-2.3.5-159000.5.13.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-mgr-push-5.0.1-159000.4.21.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-pyvmomi-6.7.3-159000.3.6.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-rhnlib-5.0.1-159000.6.30.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-spacewalk-check-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-setup-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-tools-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.aarch64",
"SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.s390x",
"SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.x86_64",
"SUSE Manager Client Tools 15-BETA:spacecmd-5.0.1-159000.6.42.1.noarch",
"SUSE Manager Client Tools 15-BETA:spacewalk-check-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:spacewalk-client-setup-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:spacewalk-client-tools-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:supportutils-plugin-salt-1.2.2-159000.5.9.1.noarch",
"SUSE Manager Client Tools 15-BETA:supportutils-plugin-susemanager-client-5.0.1-159000.6.15.1.noarch",
"SUSE Manager Client Tools 15-BETA:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch",
"SUSE Manager Client Tools Beta for SLE Micro 5:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch",
"SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64",
"SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x",
"SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64",
"SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64",
"SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x",
"SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64",
"SUSE Manager Client Tools Beta for SLE Micro 5:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-01-23T15:20:05Z",
"details": "moderate"
}
],
"title": "CVE-2022-35957"
},
{
"cve": "CVE-2022-36062",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-36062"
}
],
"notes": [
{
"category": "general",
"text": "Grafana is an open-source platform for monitoring and observability. In versions prior to 8.5.13, 9.0.9, and 9.1.6, Grafana is subject to Improper Preservation of Permissions resulting in privilege escalation on some folders where Admin is the only used permission. The vulnerability impacts Grafana instances where RBAC was disabled and enabled afterwards, as the migrations which are translating legacy folder permissions to RBAC permissions do not account for the scenario where the only user permission in the folder is Admin, as a result RBAC adds permissions for Editors and Viewers which allow them to edit and view folders accordingly. This issue has been patched in versions 8.5.13, 9.0.9, and 9.1.6. A workaround when the impacted folder/dashboard is known is to remove the additional permissions manually.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Manager Client Tools 15-BETA:ansible-2.9.27-159000.3.9.1.noarch",
"SUSE Manager Client Tools 15-BETA:ansible-doc-2.9.27-159000.3.9.1.noarch",
"SUSE Manager Client Tools 15-BETA:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch",
"SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.aarch64",
"SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.s390x",
"SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.x86_64",
"SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64",
"SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x",
"SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64",
"SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.aarch64",
"SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.s390x",
"SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.x86_64",
"SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.aarch64",
"SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.s390x",
"SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.x86_64",
"SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.aarch64",
"SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.s390x",
"SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.x86_64",
"SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.aarch64",
"SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.s390x",
"SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.x86_64",
"SUSE Manager Client Tools 15-BETA:mgr-push-5.0.1-159000.4.21.1.noarch",
"SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64",
"SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x",
"SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64",
"SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.aarch64",
"SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.s390x",
"SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.x86_64",
"SUSE Manager Client Tools 15-BETA:python3-hwdata-2.3.5-159000.5.13.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-mgr-push-5.0.1-159000.4.21.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-pyvmomi-6.7.3-159000.3.6.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-rhnlib-5.0.1-159000.6.30.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-spacewalk-check-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-setup-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-tools-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.aarch64",
"SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.s390x",
"SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.x86_64",
"SUSE Manager Client Tools 15-BETA:spacecmd-5.0.1-159000.6.42.1.noarch",
"SUSE Manager Client Tools 15-BETA:spacewalk-check-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:spacewalk-client-setup-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:spacewalk-client-tools-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:supportutils-plugin-salt-1.2.2-159000.5.9.1.noarch",
"SUSE Manager Client Tools 15-BETA:supportutils-plugin-susemanager-client-5.0.1-159000.6.15.1.noarch",
"SUSE Manager Client Tools 15-BETA:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch",
"SUSE Manager Client Tools Beta for SLE Micro 5:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch",
"SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64",
"SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x",
"SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64",
"SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64",
"SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x",
"SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64",
"SUSE Manager Client Tools Beta for SLE Micro 5:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-36062",
"url": "https://www.suse.com/security/cve/CVE-2022-36062"
},
{
"category": "external",
"summary": "SUSE Bug 1203596 for CVE-2022-36062",
"url": "https://bugzilla.suse.com/1203596"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Manager Client Tools 15-BETA:ansible-2.9.27-159000.3.9.1.noarch",
"SUSE Manager Client Tools 15-BETA:ansible-doc-2.9.27-159000.3.9.1.noarch",
"SUSE Manager Client Tools 15-BETA:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch",
"SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.aarch64",
"SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.s390x",
"SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.x86_64",
"SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64",
"SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x",
"SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64",
"SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.aarch64",
"SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.s390x",
"SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.x86_64",
"SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.aarch64",
"SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.s390x",
"SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.x86_64",
"SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.aarch64",
"SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.s390x",
"SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.x86_64",
"SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.aarch64",
"SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.s390x",
"SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.x86_64",
"SUSE Manager Client Tools 15-BETA:mgr-push-5.0.1-159000.4.21.1.noarch",
"SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64",
"SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x",
"SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64",
"SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.aarch64",
"SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.s390x",
"SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.x86_64",
"SUSE Manager Client Tools 15-BETA:python3-hwdata-2.3.5-159000.5.13.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-mgr-push-5.0.1-159000.4.21.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-pyvmomi-6.7.3-159000.3.6.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-rhnlib-5.0.1-159000.6.30.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-spacewalk-check-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-setup-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-tools-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.aarch64",
"SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.s390x",
"SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.x86_64",
"SUSE Manager Client Tools 15-BETA:spacecmd-5.0.1-159000.6.42.1.noarch",
"SUSE Manager Client Tools 15-BETA:spacewalk-check-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:spacewalk-client-setup-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:spacewalk-client-tools-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:supportutils-plugin-salt-1.2.2-159000.5.9.1.noarch",
"SUSE Manager Client Tools 15-BETA:supportutils-plugin-susemanager-client-5.0.1-159000.6.15.1.noarch",
"SUSE Manager Client Tools 15-BETA:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch",
"SUSE Manager Client Tools Beta for SLE Micro 5:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch",
"SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64",
"SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x",
"SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64",
"SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64",
"SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x",
"SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64",
"SUSE Manager Client Tools Beta for SLE Micro 5:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:L/A:L",
"version": "3.1"
},
"products": [
"SUSE Manager Client Tools 15-BETA:ansible-2.9.27-159000.3.9.1.noarch",
"SUSE Manager Client Tools 15-BETA:ansible-doc-2.9.27-159000.3.9.1.noarch",
"SUSE Manager Client Tools 15-BETA:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch",
"SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.aarch64",
"SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.s390x",
"SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.x86_64",
"SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64",
"SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x",
"SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64",
"SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.aarch64",
"SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.s390x",
"SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.x86_64",
"SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.aarch64",
"SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.s390x",
"SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.x86_64",
"SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.aarch64",
"SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.s390x",
"SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.x86_64",
"SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.aarch64",
"SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.s390x",
"SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.x86_64",
"SUSE Manager Client Tools 15-BETA:mgr-push-5.0.1-159000.4.21.1.noarch",
"SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64",
"SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x",
"SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64",
"SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.aarch64",
"SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.s390x",
"SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.x86_64",
"SUSE Manager Client Tools 15-BETA:python3-hwdata-2.3.5-159000.5.13.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-mgr-push-5.0.1-159000.4.21.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-pyvmomi-6.7.3-159000.3.6.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-rhnlib-5.0.1-159000.6.30.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-spacewalk-check-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-setup-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-tools-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.aarch64",
"SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.s390x",
"SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.x86_64",
"SUSE Manager Client Tools 15-BETA:spacecmd-5.0.1-159000.6.42.1.noarch",
"SUSE Manager Client Tools 15-BETA:spacewalk-check-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:spacewalk-client-setup-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:spacewalk-client-tools-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:supportutils-plugin-salt-1.2.2-159000.5.9.1.noarch",
"SUSE Manager Client Tools 15-BETA:supportutils-plugin-susemanager-client-5.0.1-159000.6.15.1.noarch",
"SUSE Manager Client Tools 15-BETA:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch",
"SUSE Manager Client Tools Beta for SLE Micro 5:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch",
"SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64",
"SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x",
"SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64",
"SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64",
"SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x",
"SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64",
"SUSE Manager Client Tools Beta for SLE Micro 5:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-01-23T15:20:05Z",
"details": "moderate"
}
],
"title": "CVE-2022-36062"
},
{
"cve": "CVE-2022-39201",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-39201"
}
],
"notes": [
{
"category": "general",
"text": "Grafana is an open source observability and data visualization platform. Starting with version 5.0.0-beta1 and prior to versions 8.5.14 and 9.1.8, Grafana could leak the authentication cookie of users to plugins. The vulnerability impacts data source and plugin proxy endpoints under certain conditions. The destination plugin could receive a user\u0027s Grafana authentication cookie. Versions 9.1.8 and 8.5.14 contain a patch for this issue. There are no known workarounds.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Manager Client Tools 15-BETA:ansible-2.9.27-159000.3.9.1.noarch",
"SUSE Manager Client Tools 15-BETA:ansible-doc-2.9.27-159000.3.9.1.noarch",
"SUSE Manager Client Tools 15-BETA:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch",
"SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.aarch64",
"SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.s390x",
"SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.x86_64",
"SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64",
"SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x",
"SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64",
"SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.aarch64",
"SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.s390x",
"SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.x86_64",
"SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.aarch64",
"SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.s390x",
"SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.x86_64",
"SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.aarch64",
"SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.s390x",
"SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.x86_64",
"SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.aarch64",
"SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.s390x",
"SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.x86_64",
"SUSE Manager Client Tools 15-BETA:mgr-push-5.0.1-159000.4.21.1.noarch",
"SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64",
"SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x",
"SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64",
"SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.aarch64",
"SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.s390x",
"SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.x86_64",
"SUSE Manager Client Tools 15-BETA:python3-hwdata-2.3.5-159000.5.13.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-mgr-push-5.0.1-159000.4.21.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-pyvmomi-6.7.3-159000.3.6.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-rhnlib-5.0.1-159000.6.30.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-spacewalk-check-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-setup-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-tools-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.aarch64",
"SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.s390x",
"SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.x86_64",
"SUSE Manager Client Tools 15-BETA:spacecmd-5.0.1-159000.6.42.1.noarch",
"SUSE Manager Client Tools 15-BETA:spacewalk-check-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:spacewalk-client-setup-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:spacewalk-client-tools-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:supportutils-plugin-salt-1.2.2-159000.5.9.1.noarch",
"SUSE Manager Client Tools 15-BETA:supportutils-plugin-susemanager-client-5.0.1-159000.6.15.1.noarch",
"SUSE Manager Client Tools 15-BETA:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch",
"SUSE Manager Client Tools Beta for SLE Micro 5:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch",
"SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64",
"SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x",
"SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64",
"SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64",
"SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x",
"SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64",
"SUSE Manager Client Tools Beta for SLE Micro 5:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-39201",
"url": "https://www.suse.com/security/cve/CVE-2022-39201"
},
{
"category": "external",
"summary": "SUSE Bug 1204303 for CVE-2022-39201",
"url": "https://bugzilla.suse.com/1204303"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Manager Client Tools 15-BETA:ansible-2.9.27-159000.3.9.1.noarch",
"SUSE Manager Client Tools 15-BETA:ansible-doc-2.9.27-159000.3.9.1.noarch",
"SUSE Manager Client Tools 15-BETA:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch",
"SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.aarch64",
"SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.s390x",
"SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.x86_64",
"SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64",
"SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x",
"SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64",
"SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.aarch64",
"SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.s390x",
"SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.x86_64",
"SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.aarch64",
"SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.s390x",
"SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.x86_64",
"SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.aarch64",
"SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.s390x",
"SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.x86_64",
"SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.aarch64",
"SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.s390x",
"SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.x86_64",
"SUSE Manager Client Tools 15-BETA:mgr-push-5.0.1-159000.4.21.1.noarch",
"SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64",
"SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x",
"SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64",
"SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.aarch64",
"SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.s390x",
"SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.x86_64",
"SUSE Manager Client Tools 15-BETA:python3-hwdata-2.3.5-159000.5.13.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-mgr-push-5.0.1-159000.4.21.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-pyvmomi-6.7.3-159000.3.6.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-rhnlib-5.0.1-159000.6.30.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-spacewalk-check-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-setup-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-tools-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.aarch64",
"SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.s390x",
"SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.x86_64",
"SUSE Manager Client Tools 15-BETA:spacecmd-5.0.1-159000.6.42.1.noarch",
"SUSE Manager Client Tools 15-BETA:spacewalk-check-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:spacewalk-client-setup-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:spacewalk-client-tools-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:supportutils-plugin-salt-1.2.2-159000.5.9.1.noarch",
"SUSE Manager Client Tools 15-BETA:supportutils-plugin-susemanager-client-5.0.1-159000.6.15.1.noarch",
"SUSE Manager Client Tools 15-BETA:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch",
"SUSE Manager Client Tools Beta for SLE Micro 5:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch",
"SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64",
"SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x",
"SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64",
"SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64",
"SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x",
"SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64",
"SUSE Manager Client Tools Beta for SLE Micro 5:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"SUSE Manager Client Tools 15-BETA:ansible-2.9.27-159000.3.9.1.noarch",
"SUSE Manager Client Tools 15-BETA:ansible-doc-2.9.27-159000.3.9.1.noarch",
"SUSE Manager Client Tools 15-BETA:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch",
"SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.aarch64",
"SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.s390x",
"SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.x86_64",
"SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64",
"SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x",
"SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64",
"SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.aarch64",
"SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.s390x",
"SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.x86_64",
"SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.aarch64",
"SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.s390x",
"SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.x86_64",
"SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.aarch64",
"SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.s390x",
"SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.x86_64",
"SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.aarch64",
"SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.s390x",
"SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.x86_64",
"SUSE Manager Client Tools 15-BETA:mgr-push-5.0.1-159000.4.21.1.noarch",
"SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64",
"SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x",
"SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64",
"SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.aarch64",
"SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.s390x",
"SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.x86_64",
"SUSE Manager Client Tools 15-BETA:python3-hwdata-2.3.5-159000.5.13.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-mgr-push-5.0.1-159000.4.21.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-pyvmomi-6.7.3-159000.3.6.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-rhnlib-5.0.1-159000.6.30.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-spacewalk-check-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-setup-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-tools-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.aarch64",
"SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.s390x",
"SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.x86_64",
"SUSE Manager Client Tools 15-BETA:spacecmd-5.0.1-159000.6.42.1.noarch",
"SUSE Manager Client Tools 15-BETA:spacewalk-check-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:spacewalk-client-setup-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:spacewalk-client-tools-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:supportutils-plugin-salt-1.2.2-159000.5.9.1.noarch",
"SUSE Manager Client Tools 15-BETA:supportutils-plugin-susemanager-client-5.0.1-159000.6.15.1.noarch",
"SUSE Manager Client Tools 15-BETA:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch",
"SUSE Manager Client Tools Beta for SLE Micro 5:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch",
"SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64",
"SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x",
"SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64",
"SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64",
"SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x",
"SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64",
"SUSE Manager Client Tools Beta for SLE Micro 5:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-01-23T15:20:05Z",
"details": "moderate"
}
],
"title": "CVE-2022-39201"
},
{
"cve": "CVE-2022-39229",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-39229"
}
],
"notes": [
{
"category": "general",
"text": "Grafana is an open source data visualization platform for metrics, logs, and traces. Versions prior to 9.1.8 and 8.5.14 allow one user to block another user\u0027s login attempt by registering someone else\u0027e email address as a username. A Grafana user\u0027s username and email address are unique fields, that means no other user can have the same username or email address as another user. A user can have an email address as a username. However, the login system allows users to log in with either username or email address. Since Grafana allows a user to log in with either their username or email address, this creates an usual behavior where `user_1` can register with one email address and `user_2` can register their username as `user_1`\u0027s email address. This prevents `user_1` logging into the application since `user_1`\u0027s password won\u0027t match with `user_2`\u0027s email address. Versions 9.1.8 and 8.5.14 contain a patch. There are no workarounds for this issue.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Manager Client Tools 15-BETA:ansible-2.9.27-159000.3.9.1.noarch",
"SUSE Manager Client Tools 15-BETA:ansible-doc-2.9.27-159000.3.9.1.noarch",
"SUSE Manager Client Tools 15-BETA:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch",
"SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.aarch64",
"SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.s390x",
"SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.x86_64",
"SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64",
"SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x",
"SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64",
"SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.aarch64",
"SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.s390x",
"SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.x86_64",
"SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.aarch64",
"SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.s390x",
"SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.x86_64",
"SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.aarch64",
"SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.s390x",
"SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.x86_64",
"SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.aarch64",
"SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.s390x",
"SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.x86_64",
"SUSE Manager Client Tools 15-BETA:mgr-push-5.0.1-159000.4.21.1.noarch",
"SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64",
"SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x",
"SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64",
"SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.aarch64",
"SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.s390x",
"SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.x86_64",
"SUSE Manager Client Tools 15-BETA:python3-hwdata-2.3.5-159000.5.13.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-mgr-push-5.0.1-159000.4.21.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-pyvmomi-6.7.3-159000.3.6.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-rhnlib-5.0.1-159000.6.30.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-spacewalk-check-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-setup-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-tools-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.aarch64",
"SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.s390x",
"SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.x86_64",
"SUSE Manager Client Tools 15-BETA:spacecmd-5.0.1-159000.6.42.1.noarch",
"SUSE Manager Client Tools 15-BETA:spacewalk-check-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:spacewalk-client-setup-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:spacewalk-client-tools-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:supportutils-plugin-salt-1.2.2-159000.5.9.1.noarch",
"SUSE Manager Client Tools 15-BETA:supportutils-plugin-susemanager-client-5.0.1-159000.6.15.1.noarch",
"SUSE Manager Client Tools 15-BETA:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch",
"SUSE Manager Client Tools Beta for SLE Micro 5:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch",
"SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64",
"SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x",
"SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64",
"SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64",
"SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x",
"SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64",
"SUSE Manager Client Tools Beta for SLE Micro 5:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-39229",
"url": "https://www.suse.com/security/cve/CVE-2022-39229"
},
{
"category": "external",
"summary": "SUSE Bug 1204304 for CVE-2022-39229",
"url": "https://bugzilla.suse.com/1204304"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Manager Client Tools 15-BETA:ansible-2.9.27-159000.3.9.1.noarch",
"SUSE Manager Client Tools 15-BETA:ansible-doc-2.9.27-159000.3.9.1.noarch",
"SUSE Manager Client Tools 15-BETA:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch",
"SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.aarch64",
"SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.s390x",
"SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.x86_64",
"SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64",
"SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x",
"SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64",
"SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.aarch64",
"SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.s390x",
"SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.x86_64",
"SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.aarch64",
"SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.s390x",
"SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.x86_64",
"SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.aarch64",
"SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.s390x",
"SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.x86_64",
"SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.aarch64",
"SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.s390x",
"SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.x86_64",
"SUSE Manager Client Tools 15-BETA:mgr-push-5.0.1-159000.4.21.1.noarch",
"SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64",
"SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x",
"SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64",
"SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.aarch64",
"SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.s390x",
"SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.x86_64",
"SUSE Manager Client Tools 15-BETA:python3-hwdata-2.3.5-159000.5.13.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-mgr-push-5.0.1-159000.4.21.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-pyvmomi-6.7.3-159000.3.6.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-rhnlib-5.0.1-159000.6.30.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-spacewalk-check-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-setup-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-tools-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.aarch64",
"SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.s390x",
"SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.x86_64",
"SUSE Manager Client Tools 15-BETA:spacecmd-5.0.1-159000.6.42.1.noarch",
"SUSE Manager Client Tools 15-BETA:spacewalk-check-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:spacewalk-client-setup-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:spacewalk-client-tools-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:supportutils-plugin-salt-1.2.2-159000.5.9.1.noarch",
"SUSE Manager Client Tools 15-BETA:supportutils-plugin-susemanager-client-5.0.1-159000.6.15.1.noarch",
"SUSE Manager Client Tools 15-BETA:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch",
"SUSE Manager Client Tools Beta for SLE Micro 5:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch",
"SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64",
"SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x",
"SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64",
"SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64",
"SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x",
"SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64",
"SUSE Manager Client Tools Beta for SLE Micro 5:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Manager Client Tools 15-BETA:ansible-2.9.27-159000.3.9.1.noarch",
"SUSE Manager Client Tools 15-BETA:ansible-doc-2.9.27-159000.3.9.1.noarch",
"SUSE Manager Client Tools 15-BETA:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch",
"SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.aarch64",
"SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.s390x",
"SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.x86_64",
"SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64",
"SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x",
"SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64",
"SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.aarch64",
"SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.s390x",
"SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.x86_64",
"SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.aarch64",
"SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.s390x",
"SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.x86_64",
"SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.aarch64",
"SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.s390x",
"SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.x86_64",
"SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.aarch64",
"SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.s390x",
"SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.x86_64",
"SUSE Manager Client Tools 15-BETA:mgr-push-5.0.1-159000.4.21.1.noarch",
"SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64",
"SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x",
"SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64",
"SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.aarch64",
"SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.s390x",
"SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.x86_64",
"SUSE Manager Client Tools 15-BETA:python3-hwdata-2.3.5-159000.5.13.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-mgr-push-5.0.1-159000.4.21.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-pyvmomi-6.7.3-159000.3.6.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-rhnlib-5.0.1-159000.6.30.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-spacewalk-check-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-setup-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-tools-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.aarch64",
"SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.s390x",
"SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.x86_64",
"SUSE Manager Client Tools 15-BETA:spacecmd-5.0.1-159000.6.42.1.noarch",
"SUSE Manager Client Tools 15-BETA:spacewalk-check-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:spacewalk-client-setup-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:spacewalk-client-tools-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:supportutils-plugin-salt-1.2.2-159000.5.9.1.noarch",
"SUSE Manager Client Tools 15-BETA:supportutils-plugin-susemanager-client-5.0.1-159000.6.15.1.noarch",
"SUSE Manager Client Tools 15-BETA:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch",
"SUSE Manager Client Tools Beta for SLE Micro 5:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch",
"SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64",
"SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x",
"SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64",
"SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64",
"SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x",
"SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64",
"SUSE Manager Client Tools Beta for SLE Micro 5:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-01-23T15:20:05Z",
"details": "low"
}
],
"title": "CVE-2022-39229"
},
{
"cve": "CVE-2022-39306",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-39306"
}
],
"notes": [
{
"category": "general",
"text": "Grafana is an open-source platform for monitoring and observability. Versions prior to 9.2.4, or 8.5.15 on the 8.X branch, are subject to Improper Input Validation. Grafana admins can invite other members to the organization they are an admin for. When admins add members to the organization, non existing users get an email invite, existing members are added directly to the organization. When an invite link is sent, it allows users to sign up with whatever username/email address the user chooses and become a member of the organization. This introduces a vulnerability which can be used with malicious intent. This issue is patched in version 9.2.4, and has been backported to 8.5.15. There are no known workarounds.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Manager Client Tools 15-BETA:ansible-2.9.27-159000.3.9.1.noarch",
"SUSE Manager Client Tools 15-BETA:ansible-doc-2.9.27-159000.3.9.1.noarch",
"SUSE Manager Client Tools 15-BETA:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch",
"SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.aarch64",
"SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.s390x",
"SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.x86_64",
"SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64",
"SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x",
"SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64",
"SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.aarch64",
"SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.s390x",
"SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.x86_64",
"SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.aarch64",
"SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.s390x",
"SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.x86_64",
"SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.aarch64",
"SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.s390x",
"SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.x86_64",
"SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.aarch64",
"SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.s390x",
"SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.x86_64",
"SUSE Manager Client Tools 15-BETA:mgr-push-5.0.1-159000.4.21.1.noarch",
"SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64",
"SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x",
"SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64",
"SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.aarch64",
"SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.s390x",
"SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.x86_64",
"SUSE Manager Client Tools 15-BETA:python3-hwdata-2.3.5-159000.5.13.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-mgr-push-5.0.1-159000.4.21.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-pyvmomi-6.7.3-159000.3.6.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-rhnlib-5.0.1-159000.6.30.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-spacewalk-check-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-setup-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-tools-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.aarch64",
"SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.s390x",
"SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.x86_64",
"SUSE Manager Client Tools 15-BETA:spacecmd-5.0.1-159000.6.42.1.noarch",
"SUSE Manager Client Tools 15-BETA:spacewalk-check-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:spacewalk-client-setup-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:spacewalk-client-tools-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:supportutils-plugin-salt-1.2.2-159000.5.9.1.noarch",
"SUSE Manager Client Tools 15-BETA:supportutils-plugin-susemanager-client-5.0.1-159000.6.15.1.noarch",
"SUSE Manager Client Tools 15-BETA:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch",
"SUSE Manager Client Tools Beta for SLE Micro 5:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch",
"SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64",
"SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x",
"SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64",
"SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64",
"SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x",
"SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64",
"SUSE Manager Client Tools Beta for SLE Micro 5:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-39306",
"url": "https://www.suse.com/security/cve/CVE-2022-39306"
},
{
"category": "external",
"summary": "SUSE Bug 1205225 for CVE-2022-39306",
"url": "https://bugzilla.suse.com/1205225"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Manager Client Tools 15-BETA:ansible-2.9.27-159000.3.9.1.noarch",
"SUSE Manager Client Tools 15-BETA:ansible-doc-2.9.27-159000.3.9.1.noarch",
"SUSE Manager Client Tools 15-BETA:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch",
"SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.aarch64",
"SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.s390x",
"SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.x86_64",
"SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64",
"SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x",
"SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64",
"SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.aarch64",
"SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.s390x",
"SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.x86_64",
"SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.aarch64",
"SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.s390x",
"SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.x86_64",
"SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.aarch64",
"SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.s390x",
"SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.x86_64",
"SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.aarch64",
"SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.s390x",
"SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.x86_64",
"SUSE Manager Client Tools 15-BETA:mgr-push-5.0.1-159000.4.21.1.noarch",
"SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64",
"SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x",
"SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64",
"SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.aarch64",
"SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.s390x",
"SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.x86_64",
"SUSE Manager Client Tools 15-BETA:python3-hwdata-2.3.5-159000.5.13.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-mgr-push-5.0.1-159000.4.21.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-pyvmomi-6.7.3-159000.3.6.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-rhnlib-5.0.1-159000.6.30.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-spacewalk-check-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-setup-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-tools-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.aarch64",
"SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.s390x",
"SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.x86_64",
"SUSE Manager Client Tools 15-BETA:spacecmd-5.0.1-159000.6.42.1.noarch",
"SUSE Manager Client Tools 15-BETA:spacewalk-check-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:spacewalk-client-setup-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:spacewalk-client-tools-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:supportutils-plugin-salt-1.2.2-159000.5.9.1.noarch",
"SUSE Manager Client Tools 15-BETA:supportutils-plugin-susemanager-client-5.0.1-159000.6.15.1.noarch",
"SUSE Manager Client Tools 15-BETA:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch",
"SUSE Manager Client Tools Beta for SLE Micro 5:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch",
"SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64",
"SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x",
"SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64",
"SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64",
"SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x",
"SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64",
"SUSE Manager Client Tools Beta for SLE Micro 5:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"SUSE Manager Client Tools 15-BETA:ansible-2.9.27-159000.3.9.1.noarch",
"SUSE Manager Client Tools 15-BETA:ansible-doc-2.9.27-159000.3.9.1.noarch",
"SUSE Manager Client Tools 15-BETA:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch",
"SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.aarch64",
"SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.s390x",
"SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.x86_64",
"SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64",
"SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x",
"SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64",
"SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.aarch64",
"SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.s390x",
"SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.x86_64",
"SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.aarch64",
"SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.s390x",
"SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.x86_64",
"SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.aarch64",
"SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.s390x",
"SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.x86_64",
"SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.aarch64",
"SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.s390x",
"SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.x86_64",
"SUSE Manager Client Tools 15-BETA:mgr-push-5.0.1-159000.4.21.1.noarch",
"SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64",
"SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x",
"SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64",
"SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.aarch64",
"SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.s390x",
"SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.x86_64",
"SUSE Manager Client Tools 15-BETA:python3-hwdata-2.3.5-159000.5.13.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-mgr-push-5.0.1-159000.4.21.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-pyvmomi-6.7.3-159000.3.6.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-rhnlib-5.0.1-159000.6.30.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-spacewalk-check-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-setup-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-tools-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.aarch64",
"SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.s390x",
"SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.x86_64",
"SUSE Manager Client Tools 15-BETA:spacecmd-5.0.1-159000.6.42.1.noarch",
"SUSE Manager Client Tools 15-BETA:spacewalk-check-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:spacewalk-client-setup-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:spacewalk-client-tools-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:supportutils-plugin-salt-1.2.2-159000.5.9.1.noarch",
"SUSE Manager Client Tools 15-BETA:supportutils-plugin-susemanager-client-5.0.1-159000.6.15.1.noarch",
"SUSE Manager Client Tools 15-BETA:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch",
"SUSE Manager Client Tools Beta for SLE Micro 5:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch",
"SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64",
"SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x",
"SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64",
"SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64",
"SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x",
"SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64",
"SUSE Manager Client Tools Beta for SLE Micro 5:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-01-23T15:20:05Z",
"details": "moderate"
}
],
"title": "CVE-2022-39306"
},
{
"cve": "CVE-2022-39307",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-39307"
}
],
"notes": [
{
"category": "general",
"text": "Grafana is an open-source platform for monitoring and observability. When using the forget password on the login page, a POST request is made to the `/api/user/password/sent-reset-email` URL. When the username or email does not exist, a JSON response contains a \"user not found\" message. This leaks information to unauthenticated users and introduces a security risk. This issue has been patched in 9.2.4 and backported to 8.5.15. There are no known workarounds.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Manager Client Tools 15-BETA:ansible-2.9.27-159000.3.9.1.noarch",
"SUSE Manager Client Tools 15-BETA:ansible-doc-2.9.27-159000.3.9.1.noarch",
"SUSE Manager Client Tools 15-BETA:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch",
"SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.aarch64",
"SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.s390x",
"SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.x86_64",
"SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64",
"SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x",
"SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64",
"SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.aarch64",
"SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.s390x",
"SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.x86_64",
"SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.aarch64",
"SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.s390x",
"SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.x86_64",
"SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.aarch64",
"SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.s390x",
"SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.x86_64",
"SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.aarch64",
"SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.s390x",
"SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.x86_64",
"SUSE Manager Client Tools 15-BETA:mgr-push-5.0.1-159000.4.21.1.noarch",
"SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64",
"SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x",
"SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64",
"SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.aarch64",
"SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.s390x",
"SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.x86_64",
"SUSE Manager Client Tools 15-BETA:python3-hwdata-2.3.5-159000.5.13.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-mgr-push-5.0.1-159000.4.21.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-pyvmomi-6.7.3-159000.3.6.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-rhnlib-5.0.1-159000.6.30.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-spacewalk-check-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-setup-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-tools-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.aarch64",
"SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.s390x",
"SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.x86_64",
"SUSE Manager Client Tools 15-BETA:spacecmd-5.0.1-159000.6.42.1.noarch",
"SUSE Manager Client Tools 15-BETA:spacewalk-check-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:spacewalk-client-setup-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:spacewalk-client-tools-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:supportutils-plugin-salt-1.2.2-159000.5.9.1.noarch",
"SUSE Manager Client Tools 15-BETA:supportutils-plugin-susemanager-client-5.0.1-159000.6.15.1.noarch",
"SUSE Manager Client Tools 15-BETA:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch",
"SUSE Manager Client Tools Beta for SLE Micro 5:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch",
"SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64",
"SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x",
"SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64",
"SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64",
"SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x",
"SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64",
"SUSE Manager Client Tools Beta for SLE Micro 5:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-39307",
"url": "https://www.suse.com/security/cve/CVE-2022-39307"
},
{
"category": "external",
"summary": "SUSE Bug 1205227 for CVE-2022-39307",
"url": "https://bugzilla.suse.com/1205227"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Manager Client Tools 15-BETA:ansible-2.9.27-159000.3.9.1.noarch",
"SUSE Manager Client Tools 15-BETA:ansible-doc-2.9.27-159000.3.9.1.noarch",
"SUSE Manager Client Tools 15-BETA:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch",
"SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.aarch64",
"SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.s390x",
"SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.x86_64",
"SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64",
"SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x",
"SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64",
"SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.aarch64",
"SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.s390x",
"SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.x86_64",
"SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.aarch64",
"SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.s390x",
"SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.x86_64",
"SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.aarch64",
"SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.s390x",
"SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.x86_64",
"SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.aarch64",
"SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.s390x",
"SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.x86_64",
"SUSE Manager Client Tools 15-BETA:mgr-push-5.0.1-159000.4.21.1.noarch",
"SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64",
"SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x",
"SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64",
"SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.aarch64",
"SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.s390x",
"SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.x86_64",
"SUSE Manager Client Tools 15-BETA:python3-hwdata-2.3.5-159000.5.13.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-mgr-push-5.0.1-159000.4.21.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-pyvmomi-6.7.3-159000.3.6.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-rhnlib-5.0.1-159000.6.30.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-spacewalk-check-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-setup-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-tools-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.aarch64",
"SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.s390x",
"SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.x86_64",
"SUSE Manager Client Tools 15-BETA:spacecmd-5.0.1-159000.6.42.1.noarch",
"SUSE Manager Client Tools 15-BETA:spacewalk-check-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:spacewalk-client-setup-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:spacewalk-client-tools-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:supportutils-plugin-salt-1.2.2-159000.5.9.1.noarch",
"SUSE Manager Client Tools 15-BETA:supportutils-plugin-susemanager-client-5.0.1-159000.6.15.1.noarch",
"SUSE Manager Client Tools 15-BETA:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch",
"SUSE Manager Client Tools Beta for SLE Micro 5:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch",
"SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64",
"SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x",
"SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64",
"SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64",
"SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x",
"SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64",
"SUSE Manager Client Tools Beta for SLE Micro 5:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Manager Client Tools 15-BETA:ansible-2.9.27-159000.3.9.1.noarch",
"SUSE Manager Client Tools 15-BETA:ansible-doc-2.9.27-159000.3.9.1.noarch",
"SUSE Manager Client Tools 15-BETA:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch",
"SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.aarch64",
"SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.s390x",
"SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.x86_64",
"SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64",
"SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x",
"SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64",
"SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.aarch64",
"SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.s390x",
"SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.x86_64",
"SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.aarch64",
"SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.s390x",
"SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.x86_64",
"SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.aarch64",
"SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.s390x",
"SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.x86_64",
"SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.aarch64",
"SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.s390x",
"SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.x86_64",
"SUSE Manager Client Tools 15-BETA:mgr-push-5.0.1-159000.4.21.1.noarch",
"SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64",
"SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x",
"SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64",
"SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.aarch64",
"SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.s390x",
"SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.x86_64",
"SUSE Manager Client Tools 15-BETA:python3-hwdata-2.3.5-159000.5.13.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-mgr-push-5.0.1-159000.4.21.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-pyvmomi-6.7.3-159000.3.6.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-rhnlib-5.0.1-159000.6.30.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-spacewalk-check-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-setup-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-tools-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.aarch64",
"SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.s390x",
"SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.x86_64",
"SUSE Manager Client Tools 15-BETA:spacecmd-5.0.1-159000.6.42.1.noarch",
"SUSE Manager Client Tools 15-BETA:spacewalk-check-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:spacewalk-client-setup-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:spacewalk-client-tools-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:supportutils-plugin-salt-1.2.2-159000.5.9.1.noarch",
"SUSE Manager Client Tools 15-BETA:supportutils-plugin-susemanager-client-5.0.1-159000.6.15.1.noarch",
"SUSE Manager Client Tools 15-BETA:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch",
"SUSE Manager Client Tools Beta for SLE Micro 5:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch",
"SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64",
"SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x",
"SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64",
"SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64",
"SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x",
"SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64",
"SUSE Manager Client Tools Beta for SLE Micro 5:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-01-23T15:20:05Z",
"details": "moderate"
}
],
"title": "CVE-2022-39307"
},
{
"cve": "CVE-2022-39324",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-39324"
}
],
"notes": [
{
"category": "general",
"text": "Grafana is an open-source platform for monitoring and observability. Prior to versions 8.5.16 and 9.2.8, malicious user can create a snapshot and arbitrarily choose the `originalUrl` parameter by editing the query, thanks to a web proxy. When another user opens the URL of the snapshot, they will be presented with the regular web interface delivered by the trusted Grafana server. The `Open original dashboard` button no longer points to the to the real original dashboard but to the attacker\u0027s injected URL. This issue is fixed in versions 8.5.16 and 9.2.8.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Manager Client Tools 15-BETA:ansible-2.9.27-159000.3.9.1.noarch",
"SUSE Manager Client Tools 15-BETA:ansible-doc-2.9.27-159000.3.9.1.noarch",
"SUSE Manager Client Tools 15-BETA:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch",
"SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.aarch64",
"SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.s390x",
"SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.x86_64",
"SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64",
"SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x",
"SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64",
"SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.aarch64",
"SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.s390x",
"SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.x86_64",
"SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.aarch64",
"SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.s390x",
"SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.x86_64",
"SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.aarch64",
"SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.s390x",
"SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.x86_64",
"SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.aarch64",
"SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.s390x",
"SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.x86_64",
"SUSE Manager Client Tools 15-BETA:mgr-push-5.0.1-159000.4.21.1.noarch",
"SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64",
"SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x",
"SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64",
"SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.aarch64",
"SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.s390x",
"SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.x86_64",
"SUSE Manager Client Tools 15-BETA:python3-hwdata-2.3.5-159000.5.13.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-mgr-push-5.0.1-159000.4.21.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-pyvmomi-6.7.3-159000.3.6.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-rhnlib-5.0.1-159000.6.30.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-spacewalk-check-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-setup-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-tools-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.aarch64",
"SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.s390x",
"SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.x86_64",
"SUSE Manager Client Tools 15-BETA:spacecmd-5.0.1-159000.6.42.1.noarch",
"SUSE Manager Client Tools 15-BETA:spacewalk-check-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:spacewalk-client-setup-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:spacewalk-client-tools-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:supportutils-plugin-salt-1.2.2-159000.5.9.1.noarch",
"SUSE Manager Client Tools 15-BETA:supportutils-plugin-susemanager-client-5.0.1-159000.6.15.1.noarch",
"SUSE Manager Client Tools 15-BETA:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch",
"SUSE Manager Client Tools Beta for SLE Micro 5:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch",
"SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64",
"SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x",
"SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64",
"SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64",
"SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x",
"SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64",
"SUSE Manager Client Tools Beta for SLE Micro 5:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-39324",
"url": "https://www.suse.com/security/cve/CVE-2022-39324"
},
{
"category": "external",
"summary": "SUSE Bug 1207750 for CVE-2022-39324",
"url": "https://bugzilla.suse.com/1207750"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Manager Client Tools 15-BETA:ansible-2.9.27-159000.3.9.1.noarch",
"SUSE Manager Client Tools 15-BETA:ansible-doc-2.9.27-159000.3.9.1.noarch",
"SUSE Manager Client Tools 15-BETA:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch",
"SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.aarch64",
"SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.s390x",
"SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.x86_64",
"SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64",
"SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x",
"SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64",
"SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.aarch64",
"SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.s390x",
"SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.x86_64",
"SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.aarch64",
"SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.s390x",
"SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.x86_64",
"SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.aarch64",
"SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.s390x",
"SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.x86_64",
"SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.aarch64",
"SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.s390x",
"SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.x86_64",
"SUSE Manager Client Tools 15-BETA:mgr-push-5.0.1-159000.4.21.1.noarch",
"SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64",
"SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x",
"SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64",
"SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.aarch64",
"SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.s390x",
"SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.x86_64",
"SUSE Manager Client Tools 15-BETA:python3-hwdata-2.3.5-159000.5.13.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-mgr-push-5.0.1-159000.4.21.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-pyvmomi-6.7.3-159000.3.6.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-rhnlib-5.0.1-159000.6.30.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-spacewalk-check-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-setup-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-tools-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.aarch64",
"SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.s390x",
"SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.x86_64",
"SUSE Manager Client Tools 15-BETA:spacecmd-5.0.1-159000.6.42.1.noarch",
"SUSE Manager Client Tools 15-BETA:spacewalk-check-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:spacewalk-client-setup-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:spacewalk-client-tools-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:supportutils-plugin-salt-1.2.2-159000.5.9.1.noarch",
"SUSE Manager Client Tools 15-BETA:supportutils-plugin-susemanager-client-5.0.1-159000.6.15.1.noarch",
"SUSE Manager Client Tools 15-BETA:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch",
"SUSE Manager Client Tools Beta for SLE Micro 5:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch",
"SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64",
"SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x",
"SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64",
"SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64",
"SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x",
"SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64",
"SUSE Manager Client Tools Beta for SLE Micro 5:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:L",
"version": "3.1"
},
"products": [
"SUSE Manager Client Tools 15-BETA:ansible-2.9.27-159000.3.9.1.noarch",
"SUSE Manager Client Tools 15-BETA:ansible-doc-2.9.27-159000.3.9.1.noarch",
"SUSE Manager Client Tools 15-BETA:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch",
"SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.aarch64",
"SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.s390x",
"SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.x86_64",
"SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64",
"SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x",
"SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64",
"SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.aarch64",
"SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.s390x",
"SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.x86_64",
"SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.aarch64",
"SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.s390x",
"SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.x86_64",
"SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.aarch64",
"SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.s390x",
"SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.x86_64",
"SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.aarch64",
"SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.s390x",
"SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.x86_64",
"SUSE Manager Client Tools 15-BETA:mgr-push-5.0.1-159000.4.21.1.noarch",
"SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64",
"SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x",
"SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64",
"SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.aarch64",
"SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.s390x",
"SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.x86_64",
"SUSE Manager Client Tools 15-BETA:python3-hwdata-2.3.5-159000.5.13.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-mgr-push-5.0.1-159000.4.21.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-pyvmomi-6.7.3-159000.3.6.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-rhnlib-5.0.1-159000.6.30.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-spacewalk-check-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-setup-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-tools-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.aarch64",
"SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.s390x",
"SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.x86_64",
"SUSE Manager Client Tools 15-BETA:spacecmd-5.0.1-159000.6.42.1.noarch",
"SUSE Manager Client Tools 15-BETA:spacewalk-check-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:spacewalk-client-setup-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:spacewalk-client-tools-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:supportutils-plugin-salt-1.2.2-159000.5.9.1.noarch",
"SUSE Manager Client Tools 15-BETA:supportutils-plugin-susemanager-client-5.0.1-159000.6.15.1.noarch",
"SUSE Manager Client Tools 15-BETA:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch",
"SUSE Manager Client Tools Beta for SLE Micro 5:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch",
"SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64",
"SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x",
"SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64",
"SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64",
"SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x",
"SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64",
"SUSE Manager Client Tools Beta for SLE Micro 5:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-01-23T15:20:05Z",
"details": "moderate"
}
],
"title": "CVE-2022-39324"
},
{
"cve": "CVE-2022-41715",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-41715"
}
],
"notes": [
{
"category": "general",
"text": "Programs which compile regular expressions from untrusted sources may be vulnerable to memory exhaustion or denial of service. The parsed regexp representation is linear in the size of the input, but in some cases the constant factor can be as high as 40,000, making relatively small regexps consume much larger amounts of memory. After fix, each regexp being parsed is limited to a 256 MB memory footprint. Regular expressions whose representation would use more space than that are rejected. Normal use of regular expressions is unaffected.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Manager Client Tools 15-BETA:ansible-2.9.27-159000.3.9.1.noarch",
"SUSE Manager Client Tools 15-BETA:ansible-doc-2.9.27-159000.3.9.1.noarch",
"SUSE Manager Client Tools 15-BETA:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch",
"SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.aarch64",
"SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.s390x",
"SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.x86_64",
"SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64",
"SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x",
"SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64",
"SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.aarch64",
"SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.s390x",
"SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.x86_64",
"SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.aarch64",
"SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.s390x",
"SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.x86_64",
"SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.aarch64",
"SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.s390x",
"SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.x86_64",
"SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.aarch64",
"SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.s390x",
"SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.x86_64",
"SUSE Manager Client Tools 15-BETA:mgr-push-5.0.1-159000.4.21.1.noarch",
"SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64",
"SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x",
"SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64",
"SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.aarch64",
"SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.s390x",
"SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.x86_64",
"SUSE Manager Client Tools 15-BETA:python3-hwdata-2.3.5-159000.5.13.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-mgr-push-5.0.1-159000.4.21.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-pyvmomi-6.7.3-159000.3.6.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-rhnlib-5.0.1-159000.6.30.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-spacewalk-check-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-setup-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-tools-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.aarch64",
"SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.s390x",
"SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.x86_64",
"SUSE Manager Client Tools 15-BETA:spacecmd-5.0.1-159000.6.42.1.noarch",
"SUSE Manager Client Tools 15-BETA:spacewalk-check-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:spacewalk-client-setup-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:spacewalk-client-tools-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:supportutils-plugin-salt-1.2.2-159000.5.9.1.noarch",
"SUSE Manager Client Tools 15-BETA:supportutils-plugin-susemanager-client-5.0.1-159000.6.15.1.noarch",
"SUSE Manager Client Tools 15-BETA:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch",
"SUSE Manager Client Tools Beta for SLE Micro 5:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch",
"SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64",
"SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x",
"SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64",
"SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64",
"SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x",
"SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64",
"SUSE Manager Client Tools Beta for SLE Micro 5:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-41715",
"url": "https://www.suse.com/security/cve/CVE-2022-41715"
},
{
"category": "external",
"summary": "SUSE Bug 1204023 for CVE-2022-41715",
"url": "https://bugzilla.suse.com/1204023"
},
{
"category": "external",
"summary": "SUSE Bug 1208441 for CVE-2022-41715",
"url": "https://bugzilla.suse.com/1208441"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Manager Client Tools 15-BETA:ansible-2.9.27-159000.3.9.1.noarch",
"SUSE Manager Client Tools 15-BETA:ansible-doc-2.9.27-159000.3.9.1.noarch",
"SUSE Manager Client Tools 15-BETA:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch",
"SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.aarch64",
"SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.s390x",
"SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.x86_64",
"SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64",
"SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x",
"SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64",
"SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.aarch64",
"SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.s390x",
"SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.x86_64",
"SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.aarch64",
"SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.s390x",
"SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.x86_64",
"SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.aarch64",
"SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.s390x",
"SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.x86_64",
"SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.aarch64",
"SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.s390x",
"SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.x86_64",
"SUSE Manager Client Tools 15-BETA:mgr-push-5.0.1-159000.4.21.1.noarch",
"SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64",
"SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x",
"SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64",
"SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.aarch64",
"SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.s390x",
"SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.x86_64",
"SUSE Manager Client Tools 15-BETA:python3-hwdata-2.3.5-159000.5.13.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-mgr-push-5.0.1-159000.4.21.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-pyvmomi-6.7.3-159000.3.6.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-rhnlib-5.0.1-159000.6.30.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-spacewalk-check-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-setup-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-tools-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.aarch64",
"SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.s390x",
"SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.x86_64",
"SUSE Manager Client Tools 15-BETA:spacecmd-5.0.1-159000.6.42.1.noarch",
"SUSE Manager Client Tools 15-BETA:spacewalk-check-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:spacewalk-client-setup-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:spacewalk-client-tools-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:supportutils-plugin-salt-1.2.2-159000.5.9.1.noarch",
"SUSE Manager Client Tools 15-BETA:supportutils-plugin-susemanager-client-5.0.1-159000.6.15.1.noarch",
"SUSE Manager Client Tools 15-BETA:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch",
"SUSE Manager Client Tools Beta for SLE Micro 5:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch",
"SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64",
"SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x",
"SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64",
"SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64",
"SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x",
"SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64",
"SUSE Manager Client Tools Beta for SLE Micro 5:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Manager Client Tools 15-BETA:ansible-2.9.27-159000.3.9.1.noarch",
"SUSE Manager Client Tools 15-BETA:ansible-doc-2.9.27-159000.3.9.1.noarch",
"SUSE Manager Client Tools 15-BETA:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch",
"SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.aarch64",
"SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.s390x",
"SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.x86_64",
"SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64",
"SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x",
"SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64",
"SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.aarch64",
"SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.s390x",
"SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.x86_64",
"SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.aarch64",
"SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.s390x",
"SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.x86_64",
"SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.aarch64",
"SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.s390x",
"SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.x86_64",
"SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.aarch64",
"SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.s390x",
"SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.x86_64",
"SUSE Manager Client Tools 15-BETA:mgr-push-5.0.1-159000.4.21.1.noarch",
"SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64",
"SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x",
"SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64",
"SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.aarch64",
"SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.s390x",
"SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.x86_64",
"SUSE Manager Client Tools 15-BETA:python3-hwdata-2.3.5-159000.5.13.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-mgr-push-5.0.1-159000.4.21.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-pyvmomi-6.7.3-159000.3.6.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-rhnlib-5.0.1-159000.6.30.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-spacewalk-check-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-setup-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-tools-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.aarch64",
"SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.s390x",
"SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.x86_64",
"SUSE Manager Client Tools 15-BETA:spacecmd-5.0.1-159000.6.42.1.noarch",
"SUSE Manager Client Tools 15-BETA:spacewalk-check-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:spacewalk-client-setup-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:spacewalk-client-tools-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:supportutils-plugin-salt-1.2.2-159000.5.9.1.noarch",
"SUSE Manager Client Tools 15-BETA:supportutils-plugin-susemanager-client-5.0.1-159000.6.15.1.noarch",
"SUSE Manager Client Tools 15-BETA:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch",
"SUSE Manager Client Tools Beta for SLE Micro 5:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch",
"SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64",
"SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x",
"SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64",
"SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64",
"SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x",
"SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64",
"SUSE Manager Client Tools Beta for SLE Micro 5:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-01-23T15:20:05Z",
"details": "moderate"
}
],
"title": "CVE-2022-41715"
},
{
"cve": "CVE-2022-41723",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-41723"
}
],
"notes": [
{
"category": "general",
"text": "A maliciously crafted HTTP/2 stream could cause excessive CPU consumption in the HPACK decoder, sufficient to cause a denial of service from a small number of small requests.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Manager Client Tools 15-BETA:ansible-2.9.27-159000.3.9.1.noarch",
"SUSE Manager Client Tools 15-BETA:ansible-doc-2.9.27-159000.3.9.1.noarch",
"SUSE Manager Client Tools 15-BETA:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch",
"SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.aarch64",
"SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.s390x",
"SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.x86_64",
"SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64",
"SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x",
"SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64",
"SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.aarch64",
"SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.s390x",
"SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.x86_64",
"SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.aarch64",
"SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.s390x",
"SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.x86_64",
"SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.aarch64",
"SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.s390x",
"SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.x86_64",
"SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.aarch64",
"SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.s390x",
"SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.x86_64",
"SUSE Manager Client Tools 15-BETA:mgr-push-5.0.1-159000.4.21.1.noarch",
"SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64",
"SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x",
"SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64",
"SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.aarch64",
"SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.s390x",
"SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.x86_64",
"SUSE Manager Client Tools 15-BETA:python3-hwdata-2.3.5-159000.5.13.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-mgr-push-5.0.1-159000.4.21.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-pyvmomi-6.7.3-159000.3.6.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-rhnlib-5.0.1-159000.6.30.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-spacewalk-check-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-setup-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-tools-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.aarch64",
"SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.s390x",
"SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.x86_64",
"SUSE Manager Client Tools 15-BETA:spacecmd-5.0.1-159000.6.42.1.noarch",
"SUSE Manager Client Tools 15-BETA:spacewalk-check-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:spacewalk-client-setup-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:spacewalk-client-tools-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:supportutils-plugin-salt-1.2.2-159000.5.9.1.noarch",
"SUSE Manager Client Tools 15-BETA:supportutils-plugin-susemanager-client-5.0.1-159000.6.15.1.noarch",
"SUSE Manager Client Tools 15-BETA:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch",
"SUSE Manager Client Tools Beta for SLE Micro 5:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch",
"SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64",
"SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x",
"SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64",
"SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64",
"SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x",
"SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64",
"SUSE Manager Client Tools Beta for SLE Micro 5:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-41723",
"url": "https://www.suse.com/security/cve/CVE-2022-41723"
},
{
"category": "external",
"summary": "SUSE Bug 1208270 for CVE-2022-41723",
"url": "https://bugzilla.suse.com/1208270"
},
{
"category": "external",
"summary": "SUSE Bug 1215588 for CVE-2022-41723",
"url": "https://bugzilla.suse.com/1215588"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Manager Client Tools 15-BETA:ansible-2.9.27-159000.3.9.1.noarch",
"SUSE Manager Client Tools 15-BETA:ansible-doc-2.9.27-159000.3.9.1.noarch",
"SUSE Manager Client Tools 15-BETA:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch",
"SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.aarch64",
"SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.s390x",
"SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.x86_64",
"SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64",
"SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x",
"SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64",
"SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.aarch64",
"SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.s390x",
"SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.x86_64",
"SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.aarch64",
"SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.s390x",
"SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.x86_64",
"SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.aarch64",
"SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.s390x",
"SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.x86_64",
"SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.aarch64",
"SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.s390x",
"SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.x86_64",
"SUSE Manager Client Tools 15-BETA:mgr-push-5.0.1-159000.4.21.1.noarch",
"SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64",
"SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x",
"SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64",
"SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.aarch64",
"SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.s390x",
"SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.x86_64",
"SUSE Manager Client Tools 15-BETA:python3-hwdata-2.3.5-159000.5.13.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-mgr-push-5.0.1-159000.4.21.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-pyvmomi-6.7.3-159000.3.6.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-rhnlib-5.0.1-159000.6.30.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-spacewalk-check-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-setup-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-tools-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.aarch64",
"SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.s390x",
"SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.x86_64",
"SUSE Manager Client Tools 15-BETA:spacecmd-5.0.1-159000.6.42.1.noarch",
"SUSE Manager Client Tools 15-BETA:spacewalk-check-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:spacewalk-client-setup-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:spacewalk-client-tools-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:supportutils-plugin-salt-1.2.2-159000.5.9.1.noarch",
"SUSE Manager Client Tools 15-BETA:supportutils-plugin-susemanager-client-5.0.1-159000.6.15.1.noarch",
"SUSE Manager Client Tools 15-BETA:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch",
"SUSE Manager Client Tools Beta for SLE Micro 5:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch",
"SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64",
"SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x",
"SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64",
"SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64",
"SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x",
"SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64",
"SUSE Manager Client Tools Beta for SLE Micro 5:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Manager Client Tools 15-BETA:ansible-2.9.27-159000.3.9.1.noarch",
"SUSE Manager Client Tools 15-BETA:ansible-doc-2.9.27-159000.3.9.1.noarch",
"SUSE Manager Client Tools 15-BETA:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch",
"SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.aarch64",
"SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.s390x",
"SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.x86_64",
"SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64",
"SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x",
"SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64",
"SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.aarch64",
"SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.s390x",
"SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.x86_64",
"SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.aarch64",
"SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.s390x",
"SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.x86_64",
"SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.aarch64",
"SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.s390x",
"SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.x86_64",
"SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.aarch64",
"SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.s390x",
"SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.x86_64",
"SUSE Manager Client Tools 15-BETA:mgr-push-5.0.1-159000.4.21.1.noarch",
"SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64",
"SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x",
"SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64",
"SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.aarch64",
"SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.s390x",
"SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.x86_64",
"SUSE Manager Client Tools 15-BETA:python3-hwdata-2.3.5-159000.5.13.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-mgr-push-5.0.1-159000.4.21.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-pyvmomi-6.7.3-159000.3.6.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-rhnlib-5.0.1-159000.6.30.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-spacewalk-check-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-setup-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-tools-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.aarch64",
"SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.s390x",
"SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.x86_64",
"SUSE Manager Client Tools 15-BETA:spacecmd-5.0.1-159000.6.42.1.noarch",
"SUSE Manager Client Tools 15-BETA:spacewalk-check-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:spacewalk-client-setup-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:spacewalk-client-tools-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:supportutils-plugin-salt-1.2.2-159000.5.9.1.noarch",
"SUSE Manager Client Tools 15-BETA:supportutils-plugin-susemanager-client-5.0.1-159000.6.15.1.noarch",
"SUSE Manager Client Tools 15-BETA:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch",
"SUSE Manager Client Tools Beta for SLE Micro 5:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch",
"SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64",
"SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x",
"SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64",
"SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64",
"SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x",
"SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64",
"SUSE Manager Client Tools Beta for SLE Micro 5:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-01-23T15:20:05Z",
"details": "important"
}
],
"title": "CVE-2022-41723"
},
{
"cve": "CVE-2022-46146",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-46146"
}
],
"notes": [
{
"category": "general",
"text": "Prometheus Exporter Toolkit is a utility package to build exporters. Prior to versions 0.7.2 and 0.8.2, if someone has access to a Prometheus web.yml file and users\u0027 bcrypted passwords, they can bypass security by poisoning the built-in authentication cache. Versions 0.7.2 and 0.8.2 contain a fix for the issue. There is no workaround, but attacker must have access to the hashed password to use this functionality.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Manager Client Tools 15-BETA:ansible-2.9.27-159000.3.9.1.noarch",
"SUSE Manager Client Tools 15-BETA:ansible-doc-2.9.27-159000.3.9.1.noarch",
"SUSE Manager Client Tools 15-BETA:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch",
"SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.aarch64",
"SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.s390x",
"SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.x86_64",
"SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64",
"SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x",
"SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64",
"SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.aarch64",
"SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.s390x",
"SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.x86_64",
"SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.aarch64",
"SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.s390x",
"SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.x86_64",
"SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.aarch64",
"SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.s390x",
"SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.x86_64",
"SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.aarch64",
"SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.s390x",
"SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.x86_64",
"SUSE Manager Client Tools 15-BETA:mgr-push-5.0.1-159000.4.21.1.noarch",
"SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64",
"SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x",
"SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64",
"SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.aarch64",
"SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.s390x",
"SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.x86_64",
"SUSE Manager Client Tools 15-BETA:python3-hwdata-2.3.5-159000.5.13.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-mgr-push-5.0.1-159000.4.21.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-pyvmomi-6.7.3-159000.3.6.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-rhnlib-5.0.1-159000.6.30.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-spacewalk-check-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-setup-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-tools-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.aarch64",
"SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.s390x",
"SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.x86_64",
"SUSE Manager Client Tools 15-BETA:spacecmd-5.0.1-159000.6.42.1.noarch",
"SUSE Manager Client Tools 15-BETA:spacewalk-check-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:spacewalk-client-setup-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:spacewalk-client-tools-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:supportutils-plugin-salt-1.2.2-159000.5.9.1.noarch",
"SUSE Manager Client Tools 15-BETA:supportutils-plugin-susemanager-client-5.0.1-159000.6.15.1.noarch",
"SUSE Manager Client Tools 15-BETA:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch",
"SUSE Manager Client Tools Beta for SLE Micro 5:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch",
"SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64",
"SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x",
"SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64",
"SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64",
"SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x",
"SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64",
"SUSE Manager Client Tools Beta for SLE Micro 5:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-46146",
"url": "https://www.suse.com/security/cve/CVE-2022-46146"
},
{
"category": "external",
"summary": "SUSE Bug 1208046 for CVE-2022-46146",
"url": "https://bugzilla.suse.com/1208046"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Manager Client Tools 15-BETA:ansible-2.9.27-159000.3.9.1.noarch",
"SUSE Manager Client Tools 15-BETA:ansible-doc-2.9.27-159000.3.9.1.noarch",
"SUSE Manager Client Tools 15-BETA:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch",
"SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.aarch64",
"SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.s390x",
"SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.x86_64",
"SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64",
"SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x",
"SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64",
"SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.aarch64",
"SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.s390x",
"SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.x86_64",
"SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.aarch64",
"SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.s390x",
"SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.x86_64",
"SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.aarch64",
"SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.s390x",
"SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.x86_64",
"SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.aarch64",
"SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.s390x",
"SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.x86_64",
"SUSE Manager Client Tools 15-BETA:mgr-push-5.0.1-159000.4.21.1.noarch",
"SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64",
"SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x",
"SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64",
"SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.aarch64",
"SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.s390x",
"SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.x86_64",
"SUSE Manager Client Tools 15-BETA:python3-hwdata-2.3.5-159000.5.13.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-mgr-push-5.0.1-159000.4.21.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-pyvmomi-6.7.3-159000.3.6.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-rhnlib-5.0.1-159000.6.30.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-spacewalk-check-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-setup-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-tools-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.aarch64",
"SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.s390x",
"SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.x86_64",
"SUSE Manager Client Tools 15-BETA:spacecmd-5.0.1-159000.6.42.1.noarch",
"SUSE Manager Client Tools 15-BETA:spacewalk-check-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:spacewalk-client-setup-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:spacewalk-client-tools-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:supportutils-plugin-salt-1.2.2-159000.5.9.1.noarch",
"SUSE Manager Client Tools 15-BETA:supportutils-plugin-susemanager-client-5.0.1-159000.6.15.1.noarch",
"SUSE Manager Client Tools 15-BETA:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch",
"SUSE Manager Client Tools Beta for SLE Micro 5:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch",
"SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64",
"SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x",
"SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64",
"SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64",
"SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x",
"SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64",
"SUSE Manager Client Tools Beta for SLE Micro 5:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Manager Client Tools 15-BETA:ansible-2.9.27-159000.3.9.1.noarch",
"SUSE Manager Client Tools 15-BETA:ansible-doc-2.9.27-159000.3.9.1.noarch",
"SUSE Manager Client Tools 15-BETA:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch",
"SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.aarch64",
"SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.s390x",
"SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.x86_64",
"SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64",
"SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x",
"SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64",
"SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.aarch64",
"SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.s390x",
"SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.x86_64",
"SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.aarch64",
"SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.s390x",
"SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.x86_64",
"SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.aarch64",
"SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.s390x",
"SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.x86_64",
"SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.aarch64",
"SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.s390x",
"SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.x86_64",
"SUSE Manager Client Tools 15-BETA:mgr-push-5.0.1-159000.4.21.1.noarch",
"SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64",
"SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x",
"SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64",
"SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.aarch64",
"SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.s390x",
"SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.x86_64",
"SUSE Manager Client Tools 15-BETA:python3-hwdata-2.3.5-159000.5.13.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-mgr-push-5.0.1-159000.4.21.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-pyvmomi-6.7.3-159000.3.6.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-rhnlib-5.0.1-159000.6.30.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-spacewalk-check-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-setup-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-tools-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.aarch64",
"SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.s390x",
"SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.x86_64",
"SUSE Manager Client Tools 15-BETA:spacecmd-5.0.1-159000.6.42.1.noarch",
"SUSE Manager Client Tools 15-BETA:spacewalk-check-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:spacewalk-client-setup-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:spacewalk-client-tools-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:supportutils-plugin-salt-1.2.2-159000.5.9.1.noarch",
"SUSE Manager Client Tools 15-BETA:supportutils-plugin-susemanager-client-5.0.1-159000.6.15.1.noarch",
"SUSE Manager Client Tools 15-BETA:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch",
"SUSE Manager Client Tools Beta for SLE Micro 5:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch",
"SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64",
"SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x",
"SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64",
"SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64",
"SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x",
"SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64",
"SUSE Manager Client Tools Beta for SLE Micro 5:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-01-23T15:20:05Z",
"details": "important"
}
],
"title": "CVE-2022-46146"
},
{
"cve": "CVE-2023-0507",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-0507"
}
],
"notes": [
{
"category": "general",
"text": "Grafana is an open-source platform for monitoring and observability. \n\nStarting with the 8.1 branch, Grafana had a stored XSS vulnerability affecting the core plugin GeoMap. \n\nThe stored XSS vulnerability was possible due to map attributions weren\u0027t properly sanitized and allowed arbitrary JavaScript to be executed in the context of the currently authorized user of the Grafana instance. \n\nAn attacker needs to have the Editor role in order to change a panel to include a map attribution containing JavaScript. \n\nThis means that vertical privilege escalation is possible, where a user with Editor role can change to a known password for a user having Admin role if the user with Admin role executes malicious JavaScript viewing a dashboard. \n\nUsers may upgrade to version 8.5.21, 9.2.13 and 9.3.8 to receive a fix. \n\n",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Manager Client Tools 15-BETA:ansible-2.9.27-159000.3.9.1.noarch",
"SUSE Manager Client Tools 15-BETA:ansible-doc-2.9.27-159000.3.9.1.noarch",
"SUSE Manager Client Tools 15-BETA:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch",
"SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.aarch64",
"SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.s390x",
"SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.x86_64",
"SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64",
"SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x",
"SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64",
"SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.aarch64",
"SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.s390x",
"SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.x86_64",
"SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.aarch64",
"SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.s390x",
"SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.x86_64",
"SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.aarch64",
"SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.s390x",
"SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.x86_64",
"SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.aarch64",
"SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.s390x",
"SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.x86_64",
"SUSE Manager Client Tools 15-BETA:mgr-push-5.0.1-159000.4.21.1.noarch",
"SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64",
"SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x",
"SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64",
"SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.aarch64",
"SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.s390x",
"SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.x86_64",
"SUSE Manager Client Tools 15-BETA:python3-hwdata-2.3.5-159000.5.13.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-mgr-push-5.0.1-159000.4.21.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-pyvmomi-6.7.3-159000.3.6.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-rhnlib-5.0.1-159000.6.30.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-spacewalk-check-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-setup-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-tools-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.aarch64",
"SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.s390x",
"SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.x86_64",
"SUSE Manager Client Tools 15-BETA:spacecmd-5.0.1-159000.6.42.1.noarch",
"SUSE Manager Client Tools 15-BETA:spacewalk-check-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:spacewalk-client-setup-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:spacewalk-client-tools-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:supportutils-plugin-salt-1.2.2-159000.5.9.1.noarch",
"SUSE Manager Client Tools 15-BETA:supportutils-plugin-susemanager-client-5.0.1-159000.6.15.1.noarch",
"SUSE Manager Client Tools 15-BETA:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch",
"SUSE Manager Client Tools Beta for SLE Micro 5:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch",
"SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64",
"SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x",
"SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64",
"SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64",
"SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x",
"SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64",
"SUSE Manager Client Tools Beta for SLE Micro 5:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-0507",
"url": "https://www.suse.com/security/cve/CVE-2023-0507"
},
{
"category": "external",
"summary": "SUSE Bug 1208821 for CVE-2023-0507",
"url": "https://bugzilla.suse.com/1208821"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Manager Client Tools 15-BETA:ansible-2.9.27-159000.3.9.1.noarch",
"SUSE Manager Client Tools 15-BETA:ansible-doc-2.9.27-159000.3.9.1.noarch",
"SUSE Manager Client Tools 15-BETA:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch",
"SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.aarch64",
"SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.s390x",
"SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.x86_64",
"SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64",
"SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x",
"SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64",
"SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.aarch64",
"SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.s390x",
"SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.x86_64",
"SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.aarch64",
"SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.s390x",
"SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.x86_64",
"SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.aarch64",
"SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.s390x",
"SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.x86_64",
"SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.aarch64",
"SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.s390x",
"SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.x86_64",
"SUSE Manager Client Tools 15-BETA:mgr-push-5.0.1-159000.4.21.1.noarch",
"SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64",
"SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x",
"SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64",
"SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.aarch64",
"SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.s390x",
"SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.x86_64",
"SUSE Manager Client Tools 15-BETA:python3-hwdata-2.3.5-159000.5.13.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-mgr-push-5.0.1-159000.4.21.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-pyvmomi-6.7.3-159000.3.6.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-rhnlib-5.0.1-159000.6.30.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-spacewalk-check-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-setup-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-tools-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.aarch64",
"SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.s390x",
"SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.x86_64",
"SUSE Manager Client Tools 15-BETA:spacecmd-5.0.1-159000.6.42.1.noarch",
"SUSE Manager Client Tools 15-BETA:spacewalk-check-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:spacewalk-client-setup-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:spacewalk-client-tools-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:supportutils-plugin-salt-1.2.2-159000.5.9.1.noarch",
"SUSE Manager Client Tools 15-BETA:supportutils-plugin-susemanager-client-5.0.1-159000.6.15.1.noarch",
"SUSE Manager Client Tools 15-BETA:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch",
"SUSE Manager Client Tools Beta for SLE Micro 5:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch",
"SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64",
"SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x",
"SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64",
"SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64",
"SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x",
"SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64",
"SUSE Manager Client Tools Beta for SLE Micro 5:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.3,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"SUSE Manager Client Tools 15-BETA:ansible-2.9.27-159000.3.9.1.noarch",
"SUSE Manager Client Tools 15-BETA:ansible-doc-2.9.27-159000.3.9.1.noarch",
"SUSE Manager Client Tools 15-BETA:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch",
"SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.aarch64",
"SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.s390x",
"SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.x86_64",
"SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64",
"SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x",
"SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64",
"SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.aarch64",
"SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.s390x",
"SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.x86_64",
"SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.aarch64",
"SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.s390x",
"SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.x86_64",
"SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.aarch64",
"SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.s390x",
"SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.x86_64",
"SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.aarch64",
"SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.s390x",
"SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.x86_64",
"SUSE Manager Client Tools 15-BETA:mgr-push-5.0.1-159000.4.21.1.noarch",
"SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64",
"SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x",
"SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64",
"SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.aarch64",
"SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.s390x",
"SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.x86_64",
"SUSE Manager Client Tools 15-BETA:python3-hwdata-2.3.5-159000.5.13.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-mgr-push-5.0.1-159000.4.21.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-pyvmomi-6.7.3-159000.3.6.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-rhnlib-5.0.1-159000.6.30.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-spacewalk-check-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-setup-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-tools-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.aarch64",
"SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.s390x",
"SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.x86_64",
"SUSE Manager Client Tools 15-BETA:spacecmd-5.0.1-159000.6.42.1.noarch",
"SUSE Manager Client Tools 15-BETA:spacewalk-check-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:spacewalk-client-setup-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:spacewalk-client-tools-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:supportutils-plugin-salt-1.2.2-159000.5.9.1.noarch",
"SUSE Manager Client Tools 15-BETA:supportutils-plugin-susemanager-client-5.0.1-159000.6.15.1.noarch",
"SUSE Manager Client Tools 15-BETA:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch",
"SUSE Manager Client Tools Beta for SLE Micro 5:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch",
"SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64",
"SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x",
"SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64",
"SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64",
"SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x",
"SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64",
"SUSE Manager Client Tools Beta for SLE Micro 5:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-01-23T15:20:05Z",
"details": "important"
}
],
"title": "CVE-2023-0507"
},
{
"cve": "CVE-2023-0594",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-0594"
}
],
"notes": [
{
"category": "general",
"text": "Grafana is an open-source platform for monitoring and observability. Starting with the 7.0 branch, Grafana had a stored XSS vulnerability in the trace view visualization. The stored XSS vulnerability was possible due the value of a span\u0027s attributes/resources were not properly sanitized and this will be rendered when the span\u0027s attributes/resources are expanded. An attacker needs to have the Editor role in order to change the value of a trace view visualization to contain JavaScript. This means that vertical privilege escalation is possible, where a user with Editor role can change to a known password for a user having Admin role if the user with Admin role executes malicious JavaScript viewing a dashboard. Users may upgrade to version 8.5.21, 9.2.13 and 9.3.8 to receive a fix.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Manager Client Tools 15-BETA:ansible-2.9.27-159000.3.9.1.noarch",
"SUSE Manager Client Tools 15-BETA:ansible-doc-2.9.27-159000.3.9.1.noarch",
"SUSE Manager Client Tools 15-BETA:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch",
"SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.aarch64",
"SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.s390x",
"SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.x86_64",
"SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64",
"SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x",
"SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64",
"SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.aarch64",
"SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.s390x",
"SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.x86_64",
"SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.aarch64",
"SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.s390x",
"SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.x86_64",
"SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.aarch64",
"SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.s390x",
"SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.x86_64",
"SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.aarch64",
"SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.s390x",
"SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.x86_64",
"SUSE Manager Client Tools 15-BETA:mgr-push-5.0.1-159000.4.21.1.noarch",
"SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64",
"SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x",
"SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64",
"SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.aarch64",
"SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.s390x",
"SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.x86_64",
"SUSE Manager Client Tools 15-BETA:python3-hwdata-2.3.5-159000.5.13.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-mgr-push-5.0.1-159000.4.21.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-pyvmomi-6.7.3-159000.3.6.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-rhnlib-5.0.1-159000.6.30.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-spacewalk-check-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-setup-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-tools-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.aarch64",
"SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.s390x",
"SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.x86_64",
"SUSE Manager Client Tools 15-BETA:spacecmd-5.0.1-159000.6.42.1.noarch",
"SUSE Manager Client Tools 15-BETA:spacewalk-check-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:spacewalk-client-setup-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:spacewalk-client-tools-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:supportutils-plugin-salt-1.2.2-159000.5.9.1.noarch",
"SUSE Manager Client Tools 15-BETA:supportutils-plugin-susemanager-client-5.0.1-159000.6.15.1.noarch",
"SUSE Manager Client Tools 15-BETA:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch",
"SUSE Manager Client Tools Beta for SLE Micro 5:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch",
"SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64",
"SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x",
"SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64",
"SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64",
"SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x",
"SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64",
"SUSE Manager Client Tools Beta for SLE Micro 5:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-0594",
"url": "https://www.suse.com/security/cve/CVE-2023-0594"
},
{
"category": "external",
"summary": "SUSE Bug 1208819 for CVE-2023-0594",
"url": "https://bugzilla.suse.com/1208819"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Manager Client Tools 15-BETA:ansible-2.9.27-159000.3.9.1.noarch",
"SUSE Manager Client Tools 15-BETA:ansible-doc-2.9.27-159000.3.9.1.noarch",
"SUSE Manager Client Tools 15-BETA:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch",
"SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.aarch64",
"SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.s390x",
"SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.x86_64",
"SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64",
"SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x",
"SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64",
"SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.aarch64",
"SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.s390x",
"SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.x86_64",
"SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.aarch64",
"SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.s390x",
"SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.x86_64",
"SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.aarch64",
"SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.s390x",
"SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.x86_64",
"SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.aarch64",
"SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.s390x",
"SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.x86_64",
"SUSE Manager Client Tools 15-BETA:mgr-push-5.0.1-159000.4.21.1.noarch",
"SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64",
"SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x",
"SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64",
"SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.aarch64",
"SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.s390x",
"SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.x86_64",
"SUSE Manager Client Tools 15-BETA:python3-hwdata-2.3.5-159000.5.13.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-mgr-push-5.0.1-159000.4.21.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-pyvmomi-6.7.3-159000.3.6.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-rhnlib-5.0.1-159000.6.30.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-spacewalk-check-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-setup-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-tools-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.aarch64",
"SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.s390x",
"SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.x86_64",
"SUSE Manager Client Tools 15-BETA:spacecmd-5.0.1-159000.6.42.1.noarch",
"SUSE Manager Client Tools 15-BETA:spacewalk-check-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:spacewalk-client-setup-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:spacewalk-client-tools-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:supportutils-plugin-salt-1.2.2-159000.5.9.1.noarch",
"SUSE Manager Client Tools 15-BETA:supportutils-plugin-susemanager-client-5.0.1-159000.6.15.1.noarch",
"SUSE Manager Client Tools 15-BETA:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch",
"SUSE Manager Client Tools Beta for SLE Micro 5:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch",
"SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64",
"SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x",
"SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64",
"SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64",
"SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x",
"SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64",
"SUSE Manager Client Tools Beta for SLE Micro 5:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.3,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"SUSE Manager Client Tools 15-BETA:ansible-2.9.27-159000.3.9.1.noarch",
"SUSE Manager Client Tools 15-BETA:ansible-doc-2.9.27-159000.3.9.1.noarch",
"SUSE Manager Client Tools 15-BETA:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch",
"SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.aarch64",
"SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.s390x",
"SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.x86_64",
"SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64",
"SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x",
"SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64",
"SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.aarch64",
"SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.s390x",
"SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.x86_64",
"SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.aarch64",
"SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.s390x",
"SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.x86_64",
"SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.aarch64",
"SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.s390x",
"SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.x86_64",
"SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.aarch64",
"SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.s390x",
"SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.x86_64",
"SUSE Manager Client Tools 15-BETA:mgr-push-5.0.1-159000.4.21.1.noarch",
"SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64",
"SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x",
"SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64",
"SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.aarch64",
"SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.s390x",
"SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.x86_64",
"SUSE Manager Client Tools 15-BETA:python3-hwdata-2.3.5-159000.5.13.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-mgr-push-5.0.1-159000.4.21.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-pyvmomi-6.7.3-159000.3.6.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-rhnlib-5.0.1-159000.6.30.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-spacewalk-check-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-setup-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-tools-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.aarch64",
"SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.s390x",
"SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.x86_64",
"SUSE Manager Client Tools 15-BETA:spacecmd-5.0.1-159000.6.42.1.noarch",
"SUSE Manager Client Tools 15-BETA:spacewalk-check-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:spacewalk-client-setup-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:spacewalk-client-tools-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:supportutils-plugin-salt-1.2.2-159000.5.9.1.noarch",
"SUSE Manager Client Tools 15-BETA:supportutils-plugin-susemanager-client-5.0.1-159000.6.15.1.noarch",
"SUSE Manager Client Tools 15-BETA:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch",
"SUSE Manager Client Tools Beta for SLE Micro 5:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch",
"SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64",
"SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x",
"SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64",
"SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64",
"SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x",
"SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64",
"SUSE Manager Client Tools Beta for SLE Micro 5:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-01-23T15:20:05Z",
"details": "important"
}
],
"title": "CVE-2023-0594"
},
{
"cve": "CVE-2023-1387",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-1387"
}
],
"notes": [
{
"category": "general",
"text": "Grafana is an open-source platform for monitoring and observability. \n\nStarting with the 9.1 branch, Grafana introduced the ability to search for a JWT in the URL query parameter auth_token and use it as the authentication token. \n\nBy enabling the \"url_login\" configuration option (disabled by default), a JWT might be sent to data sources. If an attacker has access to the data source, the leaked token could be used to authenticate to Grafana.\n\n",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Manager Client Tools 15-BETA:ansible-2.9.27-159000.3.9.1.noarch",
"SUSE Manager Client Tools 15-BETA:ansible-doc-2.9.27-159000.3.9.1.noarch",
"SUSE Manager Client Tools 15-BETA:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch",
"SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.aarch64",
"SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.s390x",
"SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.x86_64",
"SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64",
"SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x",
"SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64",
"SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.aarch64",
"SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.s390x",
"SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.x86_64",
"SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.aarch64",
"SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.s390x",
"SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.x86_64",
"SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.aarch64",
"SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.s390x",
"SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.x86_64",
"SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.aarch64",
"SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.s390x",
"SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.x86_64",
"SUSE Manager Client Tools 15-BETA:mgr-push-5.0.1-159000.4.21.1.noarch",
"SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64",
"SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x",
"SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64",
"SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.aarch64",
"SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.s390x",
"SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.x86_64",
"SUSE Manager Client Tools 15-BETA:python3-hwdata-2.3.5-159000.5.13.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-mgr-push-5.0.1-159000.4.21.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-pyvmomi-6.7.3-159000.3.6.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-rhnlib-5.0.1-159000.6.30.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-spacewalk-check-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-setup-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-tools-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.aarch64",
"SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.s390x",
"SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.x86_64",
"SUSE Manager Client Tools 15-BETA:spacecmd-5.0.1-159000.6.42.1.noarch",
"SUSE Manager Client Tools 15-BETA:spacewalk-check-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:spacewalk-client-setup-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:spacewalk-client-tools-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:supportutils-plugin-salt-1.2.2-159000.5.9.1.noarch",
"SUSE Manager Client Tools 15-BETA:supportutils-plugin-susemanager-client-5.0.1-159000.6.15.1.noarch",
"SUSE Manager Client Tools 15-BETA:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch",
"SUSE Manager Client Tools Beta for SLE Micro 5:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch",
"SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64",
"SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x",
"SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64",
"SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64",
"SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x",
"SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64",
"SUSE Manager Client Tools Beta for SLE Micro 5:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-1387",
"url": "https://www.suse.com/security/cve/CVE-2023-1387"
},
{
"category": "external",
"summary": "SUSE Bug 1210907 for CVE-2023-1387",
"url": "https://bugzilla.suse.com/1210907"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Manager Client Tools 15-BETA:ansible-2.9.27-159000.3.9.1.noarch",
"SUSE Manager Client Tools 15-BETA:ansible-doc-2.9.27-159000.3.9.1.noarch",
"SUSE Manager Client Tools 15-BETA:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch",
"SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.aarch64",
"SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.s390x",
"SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.x86_64",
"SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64",
"SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x",
"SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64",
"SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.aarch64",
"SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.s390x",
"SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.x86_64",
"SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.aarch64",
"SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.s390x",
"SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.x86_64",
"SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.aarch64",
"SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.s390x",
"SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.x86_64",
"SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.aarch64",
"SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.s390x",
"SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.x86_64",
"SUSE Manager Client Tools 15-BETA:mgr-push-5.0.1-159000.4.21.1.noarch",
"SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64",
"SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x",
"SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64",
"SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.aarch64",
"SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.s390x",
"SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.x86_64",
"SUSE Manager Client Tools 15-BETA:python3-hwdata-2.3.5-159000.5.13.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-mgr-push-5.0.1-159000.4.21.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-pyvmomi-6.7.3-159000.3.6.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-rhnlib-5.0.1-159000.6.30.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-spacewalk-check-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-setup-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-tools-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.aarch64",
"SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.s390x",
"SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.x86_64",
"SUSE Manager Client Tools 15-BETA:spacecmd-5.0.1-159000.6.42.1.noarch",
"SUSE Manager Client Tools 15-BETA:spacewalk-check-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:spacewalk-client-setup-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:spacewalk-client-tools-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:supportutils-plugin-salt-1.2.2-159000.5.9.1.noarch",
"SUSE Manager Client Tools 15-BETA:supportutils-plugin-susemanager-client-5.0.1-159000.6.15.1.noarch",
"SUSE Manager Client Tools 15-BETA:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch",
"SUSE Manager Client Tools Beta for SLE Micro 5:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch",
"SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64",
"SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x",
"SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64",
"SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64",
"SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x",
"SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64",
"SUSE Manager Client Tools Beta for SLE Micro 5:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Manager Client Tools 15-BETA:ansible-2.9.27-159000.3.9.1.noarch",
"SUSE Manager Client Tools 15-BETA:ansible-doc-2.9.27-159000.3.9.1.noarch",
"SUSE Manager Client Tools 15-BETA:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch",
"SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.aarch64",
"SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.s390x",
"SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.x86_64",
"SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64",
"SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x",
"SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64",
"SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.aarch64",
"SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.s390x",
"SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.x86_64",
"SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.aarch64",
"SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.s390x",
"SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.x86_64",
"SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.aarch64",
"SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.s390x",
"SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.x86_64",
"SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.aarch64",
"SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.s390x",
"SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.x86_64",
"SUSE Manager Client Tools 15-BETA:mgr-push-5.0.1-159000.4.21.1.noarch",
"SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64",
"SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x",
"SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64",
"SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.aarch64",
"SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.s390x",
"SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.x86_64",
"SUSE Manager Client Tools 15-BETA:python3-hwdata-2.3.5-159000.5.13.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-mgr-push-5.0.1-159000.4.21.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-pyvmomi-6.7.3-159000.3.6.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-rhnlib-5.0.1-159000.6.30.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-spacewalk-check-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-setup-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-tools-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.aarch64",
"SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.s390x",
"SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.x86_64",
"SUSE Manager Client Tools 15-BETA:spacecmd-5.0.1-159000.6.42.1.noarch",
"SUSE Manager Client Tools 15-BETA:spacewalk-check-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:spacewalk-client-setup-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:spacewalk-client-tools-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:supportutils-plugin-salt-1.2.2-159000.5.9.1.noarch",
"SUSE Manager Client Tools 15-BETA:supportutils-plugin-susemanager-client-5.0.1-159000.6.15.1.noarch",
"SUSE Manager Client Tools 15-BETA:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch",
"SUSE Manager Client Tools Beta for SLE Micro 5:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch",
"SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64",
"SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x",
"SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64",
"SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64",
"SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x",
"SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64",
"SUSE Manager Client Tools Beta for SLE Micro 5:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-01-23T15:20:05Z",
"details": "moderate"
}
],
"title": "CVE-2023-1387"
},
{
"cve": "CVE-2023-1410",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-1410"
}
],
"notes": [
{
"category": "general",
"text": "Grafana is an open-source platform for monitoring and observability. \n\nGrafana had a stored XSS vulnerability in the Graphite FunctionDescription tooltip. \n\nThe stored XSS vulnerability was possible due the value of the Function Description was not properly sanitized.\n\nAn attacker needs to have control over the Graphite data source in order to manipulate a function description and a Grafana admin needs to configure the data source, later a Grafana user needs to select a tampered function and hover over the description. \n\n Users may upgrade to version 8.5.22, 9.2.15 and 9.3.11 to receive a fix. \n\n\n\n\n\n\n\n\n\n\n",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Manager Client Tools 15-BETA:ansible-2.9.27-159000.3.9.1.noarch",
"SUSE Manager Client Tools 15-BETA:ansible-doc-2.9.27-159000.3.9.1.noarch",
"SUSE Manager Client Tools 15-BETA:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch",
"SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.aarch64",
"SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.s390x",
"SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.x86_64",
"SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64",
"SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x",
"SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64",
"SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.aarch64",
"SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.s390x",
"SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.x86_64",
"SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.aarch64",
"SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.s390x",
"SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.x86_64",
"SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.aarch64",
"SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.s390x",
"SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.x86_64",
"SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.aarch64",
"SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.s390x",
"SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.x86_64",
"SUSE Manager Client Tools 15-BETA:mgr-push-5.0.1-159000.4.21.1.noarch",
"SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64",
"SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x",
"SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64",
"SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.aarch64",
"SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.s390x",
"SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.x86_64",
"SUSE Manager Client Tools 15-BETA:python3-hwdata-2.3.5-159000.5.13.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-mgr-push-5.0.1-159000.4.21.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-pyvmomi-6.7.3-159000.3.6.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-rhnlib-5.0.1-159000.6.30.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-spacewalk-check-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-setup-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-tools-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.aarch64",
"SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.s390x",
"SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.x86_64",
"SUSE Manager Client Tools 15-BETA:spacecmd-5.0.1-159000.6.42.1.noarch",
"SUSE Manager Client Tools 15-BETA:spacewalk-check-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:spacewalk-client-setup-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:spacewalk-client-tools-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:supportutils-plugin-salt-1.2.2-159000.5.9.1.noarch",
"SUSE Manager Client Tools 15-BETA:supportutils-plugin-susemanager-client-5.0.1-159000.6.15.1.noarch",
"SUSE Manager Client Tools 15-BETA:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch",
"SUSE Manager Client Tools Beta for SLE Micro 5:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch",
"SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64",
"SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x",
"SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64",
"SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64",
"SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x",
"SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64",
"SUSE Manager Client Tools Beta for SLE Micro 5:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-1410",
"url": "https://www.suse.com/security/cve/CVE-2023-1410"
},
{
"category": "external",
"summary": "SUSE Bug 1209645 for CVE-2023-1410",
"url": "https://bugzilla.suse.com/1209645"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Manager Client Tools 15-BETA:ansible-2.9.27-159000.3.9.1.noarch",
"SUSE Manager Client Tools 15-BETA:ansible-doc-2.9.27-159000.3.9.1.noarch",
"SUSE Manager Client Tools 15-BETA:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch",
"SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.aarch64",
"SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.s390x",
"SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.x86_64",
"SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64",
"SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x",
"SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64",
"SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.aarch64",
"SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.s390x",
"SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.x86_64",
"SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.aarch64",
"SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.s390x",
"SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.x86_64",
"SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.aarch64",
"SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.s390x",
"SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.x86_64",
"SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.aarch64",
"SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.s390x",
"SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.x86_64",
"SUSE Manager Client Tools 15-BETA:mgr-push-5.0.1-159000.4.21.1.noarch",
"SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64",
"SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x",
"SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64",
"SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.aarch64",
"SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.s390x",
"SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.x86_64",
"SUSE Manager Client Tools 15-BETA:python3-hwdata-2.3.5-159000.5.13.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-mgr-push-5.0.1-159000.4.21.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-pyvmomi-6.7.3-159000.3.6.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-rhnlib-5.0.1-159000.6.30.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-spacewalk-check-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-setup-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-tools-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.aarch64",
"SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.s390x",
"SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.x86_64",
"SUSE Manager Client Tools 15-BETA:spacecmd-5.0.1-159000.6.42.1.noarch",
"SUSE Manager Client Tools 15-BETA:spacewalk-check-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:spacewalk-client-setup-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:spacewalk-client-tools-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:supportutils-plugin-salt-1.2.2-159000.5.9.1.noarch",
"SUSE Manager Client Tools 15-BETA:supportutils-plugin-susemanager-client-5.0.1-159000.6.15.1.noarch",
"SUSE Manager Client Tools 15-BETA:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch",
"SUSE Manager Client Tools Beta for SLE Micro 5:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch",
"SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64",
"SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x",
"SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64",
"SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64",
"SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x",
"SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64",
"SUSE Manager Client Tools Beta for SLE Micro 5:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"SUSE Manager Client Tools 15-BETA:ansible-2.9.27-159000.3.9.1.noarch",
"SUSE Manager Client Tools 15-BETA:ansible-doc-2.9.27-159000.3.9.1.noarch",
"SUSE Manager Client Tools 15-BETA:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch",
"SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.aarch64",
"SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.s390x",
"SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.x86_64",
"SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64",
"SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x",
"SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64",
"SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.aarch64",
"SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.s390x",
"SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.x86_64",
"SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.aarch64",
"SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.s390x",
"SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.x86_64",
"SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.aarch64",
"SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.s390x",
"SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.x86_64",
"SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.aarch64",
"SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.s390x",
"SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.x86_64",
"SUSE Manager Client Tools 15-BETA:mgr-push-5.0.1-159000.4.21.1.noarch",
"SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64",
"SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x",
"SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64",
"SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.aarch64",
"SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.s390x",
"SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.x86_64",
"SUSE Manager Client Tools 15-BETA:python3-hwdata-2.3.5-159000.5.13.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-mgr-push-5.0.1-159000.4.21.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-pyvmomi-6.7.3-159000.3.6.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-rhnlib-5.0.1-159000.6.30.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-spacewalk-check-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-setup-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-tools-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.aarch64",
"SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.s390x",
"SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.x86_64",
"SUSE Manager Client Tools 15-BETA:spacecmd-5.0.1-159000.6.42.1.noarch",
"SUSE Manager Client Tools 15-BETA:spacewalk-check-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:spacewalk-client-setup-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:spacewalk-client-tools-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:supportutils-plugin-salt-1.2.2-159000.5.9.1.noarch",
"SUSE Manager Client Tools 15-BETA:supportutils-plugin-susemanager-client-5.0.1-159000.6.15.1.noarch",
"SUSE Manager Client Tools 15-BETA:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch",
"SUSE Manager Client Tools Beta for SLE Micro 5:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch",
"SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64",
"SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x",
"SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64",
"SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64",
"SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x",
"SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64",
"SUSE Manager Client Tools Beta for SLE Micro 5:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-01-23T15:20:05Z",
"details": "moderate"
}
],
"title": "CVE-2023-1410"
},
{
"cve": "CVE-2023-2183",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-2183"
}
],
"notes": [
{
"category": "general",
"text": "Grafana is an open-source platform for monitoring and observability. \n\nThe option to send a test alert is not available from the user panel UI for users having the Viewer role. It is still possible for a user with the Viewer role to send a test alert using the API as the API does not check access to this function.\n\nThis might enable malicious users to abuse the functionality by sending multiple alert messages to e-mail and Slack, spamming users, prepare Phishing attack or block SMTP server.\n\nUsers may upgrade to version 9.5.3, 9.4.12, 9.3.15, 9.2.19 and 8.5.26 to receive a fix.\n\n",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Manager Client Tools 15-BETA:ansible-2.9.27-159000.3.9.1.noarch",
"SUSE Manager Client Tools 15-BETA:ansible-doc-2.9.27-159000.3.9.1.noarch",
"SUSE Manager Client Tools 15-BETA:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch",
"SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.aarch64",
"SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.s390x",
"SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.x86_64",
"SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64",
"SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x",
"SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64",
"SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.aarch64",
"SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.s390x",
"SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.x86_64",
"SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.aarch64",
"SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.s390x",
"SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.x86_64",
"SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.aarch64",
"SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.s390x",
"SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.x86_64",
"SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.aarch64",
"SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.s390x",
"SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.x86_64",
"SUSE Manager Client Tools 15-BETA:mgr-push-5.0.1-159000.4.21.1.noarch",
"SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64",
"SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x",
"SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64",
"SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.aarch64",
"SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.s390x",
"SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.x86_64",
"SUSE Manager Client Tools 15-BETA:python3-hwdata-2.3.5-159000.5.13.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-mgr-push-5.0.1-159000.4.21.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-pyvmomi-6.7.3-159000.3.6.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-rhnlib-5.0.1-159000.6.30.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-spacewalk-check-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-setup-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-tools-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.aarch64",
"SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.s390x",
"SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.x86_64",
"SUSE Manager Client Tools 15-BETA:spacecmd-5.0.1-159000.6.42.1.noarch",
"SUSE Manager Client Tools 15-BETA:spacewalk-check-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:spacewalk-client-setup-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:spacewalk-client-tools-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:supportutils-plugin-salt-1.2.2-159000.5.9.1.noarch",
"SUSE Manager Client Tools 15-BETA:supportutils-plugin-susemanager-client-5.0.1-159000.6.15.1.noarch",
"SUSE Manager Client Tools 15-BETA:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch",
"SUSE Manager Client Tools Beta for SLE Micro 5:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch",
"SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64",
"SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x",
"SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64",
"SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64",
"SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x",
"SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64",
"SUSE Manager Client Tools Beta for SLE Micro 5:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-2183",
"url": "https://www.suse.com/security/cve/CVE-2023-2183"
},
{
"category": "external",
"summary": "SUSE Bug 1212100 for CVE-2023-2183",
"url": "https://bugzilla.suse.com/1212100"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Manager Client Tools 15-BETA:ansible-2.9.27-159000.3.9.1.noarch",
"SUSE Manager Client Tools 15-BETA:ansible-doc-2.9.27-159000.3.9.1.noarch",
"SUSE Manager Client Tools 15-BETA:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch",
"SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.aarch64",
"SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.s390x",
"SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.x86_64",
"SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64",
"SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x",
"SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64",
"SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.aarch64",
"SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.s390x",
"SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.x86_64",
"SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.aarch64",
"SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.s390x",
"SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.x86_64",
"SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.aarch64",
"SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.s390x",
"SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.x86_64",
"SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.aarch64",
"SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.s390x",
"SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.x86_64",
"SUSE Manager Client Tools 15-BETA:mgr-push-5.0.1-159000.4.21.1.noarch",
"SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64",
"SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x",
"SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64",
"SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.aarch64",
"SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.s390x",
"SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.x86_64",
"SUSE Manager Client Tools 15-BETA:python3-hwdata-2.3.5-159000.5.13.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-mgr-push-5.0.1-159000.4.21.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-pyvmomi-6.7.3-159000.3.6.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-rhnlib-5.0.1-159000.6.30.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-spacewalk-check-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-setup-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-tools-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.aarch64",
"SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.s390x",
"SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.x86_64",
"SUSE Manager Client Tools 15-BETA:spacecmd-5.0.1-159000.6.42.1.noarch",
"SUSE Manager Client Tools 15-BETA:spacewalk-check-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:spacewalk-client-setup-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:spacewalk-client-tools-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:supportutils-plugin-salt-1.2.2-159000.5.9.1.noarch",
"SUSE Manager Client Tools 15-BETA:supportutils-plugin-susemanager-client-5.0.1-159000.6.15.1.noarch",
"SUSE Manager Client Tools 15-BETA:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch",
"SUSE Manager Client Tools Beta for SLE Micro 5:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch",
"SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64",
"SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x",
"SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64",
"SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64",
"SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x",
"SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64",
"SUSE Manager Client Tools Beta for SLE Micro 5:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Manager Client Tools 15-BETA:ansible-2.9.27-159000.3.9.1.noarch",
"SUSE Manager Client Tools 15-BETA:ansible-doc-2.9.27-159000.3.9.1.noarch",
"SUSE Manager Client Tools 15-BETA:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch",
"SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.aarch64",
"SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.s390x",
"SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.x86_64",
"SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64",
"SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x",
"SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64",
"SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.aarch64",
"SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.s390x",
"SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.x86_64",
"SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.aarch64",
"SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.s390x",
"SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.x86_64",
"SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.aarch64",
"SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.s390x",
"SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.x86_64",
"SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.aarch64",
"SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.s390x",
"SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.x86_64",
"SUSE Manager Client Tools 15-BETA:mgr-push-5.0.1-159000.4.21.1.noarch",
"SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64",
"SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x",
"SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64",
"SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.aarch64",
"SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.s390x",
"SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.x86_64",
"SUSE Manager Client Tools 15-BETA:python3-hwdata-2.3.5-159000.5.13.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-mgr-push-5.0.1-159000.4.21.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-pyvmomi-6.7.3-159000.3.6.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-rhnlib-5.0.1-159000.6.30.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-spacewalk-check-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-setup-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-tools-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.aarch64",
"SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.s390x",
"SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.x86_64",
"SUSE Manager Client Tools 15-BETA:spacecmd-5.0.1-159000.6.42.1.noarch",
"SUSE Manager Client Tools 15-BETA:spacewalk-check-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:spacewalk-client-setup-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:spacewalk-client-tools-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:supportutils-plugin-salt-1.2.2-159000.5.9.1.noarch",
"SUSE Manager Client Tools 15-BETA:supportutils-plugin-susemanager-client-5.0.1-159000.6.15.1.noarch",
"SUSE Manager Client Tools 15-BETA:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch",
"SUSE Manager Client Tools Beta for SLE Micro 5:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch",
"SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64",
"SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x",
"SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64",
"SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64",
"SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x",
"SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64",
"SUSE Manager Client Tools Beta for SLE Micro 5:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-01-23T15:20:05Z",
"details": "moderate"
}
],
"title": "CVE-2023-2183"
},
{
"cve": "CVE-2023-2801",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-2801"
}
],
"notes": [
{
"category": "general",
"text": "Grafana is an open-source platform for monitoring and observability. \n\nUsing public dashboards users can query multiple distinct data sources using mixed queries. However such query has a possibility of crashing a Grafana instance.\n\nThe only feature that uses mixed queries at the moment is public dashboards, but it\u0027s also possible to cause this by calling the query API directly.\n\nThis might enable malicious users to crash Grafana instances through that endpoint.\n\nUsers may upgrade to version 9.4.12 and 9.5.3 to receive a fix.\n\n",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Manager Client Tools 15-BETA:ansible-2.9.27-159000.3.9.1.noarch",
"SUSE Manager Client Tools 15-BETA:ansible-doc-2.9.27-159000.3.9.1.noarch",
"SUSE Manager Client Tools 15-BETA:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch",
"SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.aarch64",
"SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.s390x",
"SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.x86_64",
"SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64",
"SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x",
"SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64",
"SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.aarch64",
"SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.s390x",
"SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.x86_64",
"SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.aarch64",
"SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.s390x",
"SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.x86_64",
"SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.aarch64",
"SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.s390x",
"SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.x86_64",
"SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.aarch64",
"SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.s390x",
"SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.x86_64",
"SUSE Manager Client Tools 15-BETA:mgr-push-5.0.1-159000.4.21.1.noarch",
"SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64",
"SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x",
"SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64",
"SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.aarch64",
"SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.s390x",
"SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.x86_64",
"SUSE Manager Client Tools 15-BETA:python3-hwdata-2.3.5-159000.5.13.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-mgr-push-5.0.1-159000.4.21.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-pyvmomi-6.7.3-159000.3.6.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-rhnlib-5.0.1-159000.6.30.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-spacewalk-check-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-setup-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-tools-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.aarch64",
"SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.s390x",
"SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.x86_64",
"SUSE Manager Client Tools 15-BETA:spacecmd-5.0.1-159000.6.42.1.noarch",
"SUSE Manager Client Tools 15-BETA:spacewalk-check-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:spacewalk-client-setup-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:spacewalk-client-tools-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:supportutils-plugin-salt-1.2.2-159000.5.9.1.noarch",
"SUSE Manager Client Tools 15-BETA:supportutils-plugin-susemanager-client-5.0.1-159000.6.15.1.noarch",
"SUSE Manager Client Tools 15-BETA:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch",
"SUSE Manager Client Tools Beta for SLE Micro 5:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch",
"SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64",
"SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x",
"SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64",
"SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64",
"SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x",
"SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64",
"SUSE Manager Client Tools Beta for SLE Micro 5:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-2801",
"url": "https://www.suse.com/security/cve/CVE-2023-2801"
},
{
"category": "external",
"summary": "SUSE Bug 1212099 for CVE-2023-2801",
"url": "https://bugzilla.suse.com/1212099"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Manager Client Tools 15-BETA:ansible-2.9.27-159000.3.9.1.noarch",
"SUSE Manager Client Tools 15-BETA:ansible-doc-2.9.27-159000.3.9.1.noarch",
"SUSE Manager Client Tools 15-BETA:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch",
"SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.aarch64",
"SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.s390x",
"SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.x86_64",
"SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64",
"SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x",
"SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64",
"SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.aarch64",
"SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.s390x",
"SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.x86_64",
"SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.aarch64",
"SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.s390x",
"SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.x86_64",
"SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.aarch64",
"SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.s390x",
"SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.x86_64",
"SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.aarch64",
"SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.s390x",
"SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.x86_64",
"SUSE Manager Client Tools 15-BETA:mgr-push-5.0.1-159000.4.21.1.noarch",
"SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64",
"SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x",
"SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64",
"SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.aarch64",
"SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.s390x",
"SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.x86_64",
"SUSE Manager Client Tools 15-BETA:python3-hwdata-2.3.5-159000.5.13.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-mgr-push-5.0.1-159000.4.21.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-pyvmomi-6.7.3-159000.3.6.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-rhnlib-5.0.1-159000.6.30.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-spacewalk-check-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-setup-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-tools-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.aarch64",
"SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.s390x",
"SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.x86_64",
"SUSE Manager Client Tools 15-BETA:spacecmd-5.0.1-159000.6.42.1.noarch",
"SUSE Manager Client Tools 15-BETA:spacewalk-check-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:spacewalk-client-setup-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:spacewalk-client-tools-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:supportutils-plugin-salt-1.2.2-159000.5.9.1.noarch",
"SUSE Manager Client Tools 15-BETA:supportutils-plugin-susemanager-client-5.0.1-159000.6.15.1.noarch",
"SUSE Manager Client Tools 15-BETA:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch",
"SUSE Manager Client Tools Beta for SLE Micro 5:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch",
"SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64",
"SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x",
"SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64",
"SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64",
"SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x",
"SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64",
"SUSE Manager Client Tools Beta for SLE Micro 5:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Manager Client Tools 15-BETA:ansible-2.9.27-159000.3.9.1.noarch",
"SUSE Manager Client Tools 15-BETA:ansible-doc-2.9.27-159000.3.9.1.noarch",
"SUSE Manager Client Tools 15-BETA:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch",
"SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.aarch64",
"SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.s390x",
"SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.x86_64",
"SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64",
"SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x",
"SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64",
"SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.aarch64",
"SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.s390x",
"SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.x86_64",
"SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.aarch64",
"SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.s390x",
"SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.x86_64",
"SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.aarch64",
"SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.s390x",
"SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.x86_64",
"SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.aarch64",
"SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.s390x",
"SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.x86_64",
"SUSE Manager Client Tools 15-BETA:mgr-push-5.0.1-159000.4.21.1.noarch",
"SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64",
"SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x",
"SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64",
"SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.aarch64",
"SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.s390x",
"SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.x86_64",
"SUSE Manager Client Tools 15-BETA:python3-hwdata-2.3.5-159000.5.13.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-mgr-push-5.0.1-159000.4.21.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-pyvmomi-6.7.3-159000.3.6.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-rhnlib-5.0.1-159000.6.30.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-spacewalk-check-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-setup-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-tools-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.aarch64",
"SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.s390x",
"SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.x86_64",
"SUSE Manager Client Tools 15-BETA:spacecmd-5.0.1-159000.6.42.1.noarch",
"SUSE Manager Client Tools 15-BETA:spacewalk-check-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:spacewalk-client-setup-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:spacewalk-client-tools-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:supportutils-plugin-salt-1.2.2-159000.5.9.1.noarch",
"SUSE Manager Client Tools 15-BETA:supportutils-plugin-susemanager-client-5.0.1-159000.6.15.1.noarch",
"SUSE Manager Client Tools 15-BETA:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch",
"SUSE Manager Client Tools Beta for SLE Micro 5:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch",
"SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64",
"SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x",
"SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64",
"SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64",
"SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x",
"SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64",
"SUSE Manager Client Tools Beta for SLE Micro 5:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-01-23T15:20:05Z",
"details": "important"
}
],
"title": "CVE-2023-2801"
},
{
"cve": "CVE-2023-3128",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-3128"
}
],
"notes": [
{
"category": "general",
"text": "Grafana is validating Azure AD accounts based on the email claim. \n\nOn Azure AD, the profile email field is not unique and can be easily modified. \n\nThis leads to account takeover and authentication bypass when Azure AD OAuth is configured with a multi-tenant app. \n\n",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Manager Client Tools 15-BETA:ansible-2.9.27-159000.3.9.1.noarch",
"SUSE Manager Client Tools 15-BETA:ansible-doc-2.9.27-159000.3.9.1.noarch",
"SUSE Manager Client Tools 15-BETA:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch",
"SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.aarch64",
"SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.s390x",
"SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.x86_64",
"SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64",
"SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x",
"SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64",
"SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.aarch64",
"SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.s390x",
"SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.x86_64",
"SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.aarch64",
"SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.s390x",
"SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.x86_64",
"SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.aarch64",
"SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.s390x",
"SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.x86_64",
"SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.aarch64",
"SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.s390x",
"SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.x86_64",
"SUSE Manager Client Tools 15-BETA:mgr-push-5.0.1-159000.4.21.1.noarch",
"SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64",
"SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x",
"SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64",
"SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.aarch64",
"SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.s390x",
"SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.x86_64",
"SUSE Manager Client Tools 15-BETA:python3-hwdata-2.3.5-159000.5.13.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-mgr-push-5.0.1-159000.4.21.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-pyvmomi-6.7.3-159000.3.6.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-rhnlib-5.0.1-159000.6.30.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-spacewalk-check-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-setup-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-tools-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.aarch64",
"SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.s390x",
"SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.x86_64",
"SUSE Manager Client Tools 15-BETA:spacecmd-5.0.1-159000.6.42.1.noarch",
"SUSE Manager Client Tools 15-BETA:spacewalk-check-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:spacewalk-client-setup-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:spacewalk-client-tools-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:supportutils-plugin-salt-1.2.2-159000.5.9.1.noarch",
"SUSE Manager Client Tools 15-BETA:supportutils-plugin-susemanager-client-5.0.1-159000.6.15.1.noarch",
"SUSE Manager Client Tools 15-BETA:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch",
"SUSE Manager Client Tools Beta for SLE Micro 5:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch",
"SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64",
"SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x",
"SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64",
"SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64",
"SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x",
"SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64",
"SUSE Manager Client Tools Beta for SLE Micro 5:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-3128",
"url": "https://www.suse.com/security/cve/CVE-2023-3128"
},
{
"category": "external",
"summary": "SUSE Bug 1212641 for CVE-2023-3128",
"url": "https://bugzilla.suse.com/1212641"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Manager Client Tools 15-BETA:ansible-2.9.27-159000.3.9.1.noarch",
"SUSE Manager Client Tools 15-BETA:ansible-doc-2.9.27-159000.3.9.1.noarch",
"SUSE Manager Client Tools 15-BETA:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch",
"SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.aarch64",
"SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.s390x",
"SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.x86_64",
"SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64",
"SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x",
"SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64",
"SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.aarch64",
"SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.s390x",
"SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.x86_64",
"SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.aarch64",
"SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.s390x",
"SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.x86_64",
"SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.aarch64",
"SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.s390x",
"SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.x86_64",
"SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.aarch64",
"SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.s390x",
"SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.x86_64",
"SUSE Manager Client Tools 15-BETA:mgr-push-5.0.1-159000.4.21.1.noarch",
"SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64",
"SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x",
"SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64",
"SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.aarch64",
"SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.s390x",
"SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.x86_64",
"SUSE Manager Client Tools 15-BETA:python3-hwdata-2.3.5-159000.5.13.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-mgr-push-5.0.1-159000.4.21.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-pyvmomi-6.7.3-159000.3.6.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-rhnlib-5.0.1-159000.6.30.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-spacewalk-check-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-setup-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-tools-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.aarch64",
"SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.s390x",
"SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.x86_64",
"SUSE Manager Client Tools 15-BETA:spacecmd-5.0.1-159000.6.42.1.noarch",
"SUSE Manager Client Tools 15-BETA:spacewalk-check-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:spacewalk-client-setup-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:spacewalk-client-tools-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:supportutils-plugin-salt-1.2.2-159000.5.9.1.noarch",
"SUSE Manager Client Tools 15-BETA:supportutils-plugin-susemanager-client-5.0.1-159000.6.15.1.noarch",
"SUSE Manager Client Tools 15-BETA:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch",
"SUSE Manager Client Tools Beta for SLE Micro 5:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch",
"SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64",
"SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x",
"SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64",
"SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64",
"SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x",
"SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64",
"SUSE Manager Client Tools Beta for SLE Micro 5:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.4,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:L",
"version": "3.1"
},
"products": [
"SUSE Manager Client Tools 15-BETA:ansible-2.9.27-159000.3.9.1.noarch",
"SUSE Manager Client Tools 15-BETA:ansible-doc-2.9.27-159000.3.9.1.noarch",
"SUSE Manager Client Tools 15-BETA:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch",
"SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.aarch64",
"SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.s390x",
"SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.x86_64",
"SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64",
"SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x",
"SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64",
"SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.aarch64",
"SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.s390x",
"SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.x86_64",
"SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.aarch64",
"SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.s390x",
"SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.x86_64",
"SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.aarch64",
"SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.s390x",
"SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.x86_64",
"SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.aarch64",
"SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.s390x",
"SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.x86_64",
"SUSE Manager Client Tools 15-BETA:mgr-push-5.0.1-159000.4.21.1.noarch",
"SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64",
"SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x",
"SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64",
"SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.aarch64",
"SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.s390x",
"SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.x86_64",
"SUSE Manager Client Tools 15-BETA:python3-hwdata-2.3.5-159000.5.13.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-mgr-push-5.0.1-159000.4.21.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-pyvmomi-6.7.3-159000.3.6.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-rhnlib-5.0.1-159000.6.30.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-spacewalk-check-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-setup-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-tools-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.aarch64",
"SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.ppc64le",
"SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.s390x",
"SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.x86_64",
"SUSE Manager Client Tools 15-BETA:spacecmd-5.0.1-159000.6.42.1.noarch",
"SUSE Manager Client Tools 15-BETA:spacewalk-check-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:spacewalk-client-setup-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:spacewalk-client-tools-5.0.1-159000.6.48.1.noarch",
"SUSE Manager Client Tools 15-BETA:supportutils-plugin-salt-1.2.2-159000.5.9.1.noarch",
"SUSE Manager Client Tools 15-BETA:supportutils-plugin-susemanager-client-5.0.1-159000.6.15.1.noarch",
"SUSE Manager Client Tools 15-BETA:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch",
"SUSE Manager Client Tools Beta for SLE Micro 5:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch",
"SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64",
"SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x",
"SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64",
"SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64",
"SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x",
"SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64",
"SUSE Manager Client Tools Beta for SLE Micro 5:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-01-23T15:20:05Z",
"details": "critical"
}
],
"title": "CVE-2023-3128"
}
]
}
ghsa-69ch-w2m2-3vjp
Vulnerability from github
The BCP 47 tag parser has quadratic time complexity due to inherent aspects of its design. Since the parser is, by design, exposed to untrusted user input, this can be leveraged to force a program to consume significant time parsing Accept-Language headers. The parser cannot be easily rewritten to fix this behavior for various reasons. Instead the solution implemented in this CL is to limit the total complexity of tags passed into ParseAcceptLanguage by limiting the number of dashes in the string to 1000. This should be more than enough for the majority of real world use cases, where the number of tags being sent is likely to be in the single digits.
Specific Go Packages Affected
golang.org/x/text/language
{
"affected": [
{
"package": {
"ecosystem": "Go",
"name": "golang.org/x/text"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "0.3.8"
}
],
"type": "ECOSYSTEM"
}
]
}
],
"aliases": [
"CVE-2022-32149"
],
"database_specific": {
"cwe_ids": [
"CWE-772"
],
"github_reviewed": true,
"github_reviewed_at": "2022-10-28T20:11:26Z",
"nvd_published_at": "2022-10-14T15:15:00Z",
"severity": "HIGH"
},
"details": "The BCP 47 tag parser has quadratic time complexity due to inherent aspects of its design. Since the parser is, by design, exposed to untrusted user input, this can be leveraged to force a program to consume significant time parsing Accept-Language headers. The parser cannot be easily rewritten to fix this behavior for various reasons. Instead the solution implemented in this CL is to limit the total complexity of tags passed into ParseAcceptLanguage by limiting the number of dashes in the string to 1000. This should be more than enough for the majority of real world use cases, where the number of tags being sent is likely to be in the single digits.\n\n### Specific Go Packages Affected\ngolang.org/x/text/language",
"id": "GHSA-69ch-w2m2-3vjp",
"modified": "2025-05-16T02:08:37Z",
"published": "2022-10-14T19:00:40Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-32149"
},
{
"type": "WEB",
"url": "https://github.com/golang/go/issues/56152"
},
{
"type": "WEB",
"url": "https://github.com/golang/text/commit/434eadcdbc3b0256971992e8c70027278364c72c"
},
{
"type": "PACKAGE",
"url": "https://github.com/golang/text"
},
{
"type": "WEB",
"url": "https://go.dev/cl/442235"
},
{
"type": "WEB",
"url": "https://go.dev/issue/56152"
},
{
"type": "WEB",
"url": "https://groups.google.com/g/golang-announce/c/-hjNw559_tE/m/KlGTfid5CAAJ"
},
{
"type": "WEB",
"url": "https://pkg.go.dev/vuln/GO-2022-1059"
},
{
"type": "WEB",
"url": "https://security.netapp.com/advisory/ntap-20230203-0006"
}
],
"schema_version": "1.4.0",
"severity": [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"type": "CVSS_V3"
}
],
"summary": "golang.org/x/text/language Denial of service via crafted Accept-Language header"
}
gsd-2022-32149
Vulnerability from gsd
{
"GSD": {
"alias": "CVE-2022-32149",
"description": "An attacker may cause a denial of service by crafting an Accept-Language header which ParseAcceptLanguage will take significant time to parse.",
"id": "GSD-2022-32149",
"references": [
"https://access.redhat.com/errata/RHSA-2022:6882",
"https://access.redhat.com/errata/RHSA-2022:7407",
"https://access.redhat.com/errata/RHSA-2022:7434",
"https://access.redhat.com/errata/RHSA-2022:7435",
"https://www.suse.com/security/cve/CVE-2022-32149.html",
"https://access.redhat.com/errata/RHSA-2023:0481",
"https://access.redhat.com/errata/RHSA-2023:0692",
"https://access.redhat.com/errata/RHSA-2023:0693",
"https://access.redhat.com/errata/RHSA-2023:0795",
"https://ubuntu.com/security/CVE-2022-32149",
"https://access.redhat.com/errata/RHSA-2023:1042"
]
},
"gsd": {
"metadata": {
"exploitCode": "unknown",
"remediation": "unknown",
"reportConfidence": "confirmed",
"type": "vulnerability"
},
"osvSchema": {
"aliases": [
"CVE-2022-32149"
],
"details": "An attacker may cause a denial of service by crafting an Accept-Language header which ParseAcceptLanguage will take significant time to parse.",
"id": "GSD-2022-32149",
"modified": "2023-12-13T01:19:12.555721Z",
"schema_version": "1.4.0"
}
},
"namespaces": {
"cve.org": {
"CVE_data_meta": {
"ASSIGNER": "security@golang.org",
"ID": "CVE-2022-32149",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "golang.org/x/text/language",
"version": {
"version_data": [
{
"version_affected": "\u003c",
"version_name": "0",
"version_value": "0.3.8"
}
]
}
}
]
},
"vendor_name": "golang.org/x/text"
}
]
}
},
"credits": [
{
"lang": "en",
"value": "Adam Korczynski (ADA Logics)"
},
{
"lang": "en",
"value": "OSS-Fuzz"
}
],
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "An attacker may cause a denial of service by crafting an Accept-Language header which ParseAcceptLanguage will take significant time to parse."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE 400: Uncontrolled Resource Consumption"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://go.dev/issue/56152",
"refsource": "MISC",
"url": "https://go.dev/issue/56152"
},
{
"name": "https://go.dev/cl/442235",
"refsource": "MISC",
"url": "https://go.dev/cl/442235"
},
{
"name": "https://groups.google.com/g/golang-announce/c/-hjNw559_tE/m/KlGTfid5CAAJ",
"refsource": "MISC",
"url": "https://groups.google.com/g/golang-announce/c/-hjNw559_tE/m/KlGTfid5CAAJ"
},
{
"name": "https://pkg.go.dev/vuln/GO-2022-1059",
"refsource": "MISC",
"url": "https://pkg.go.dev/vuln/GO-2022-1059"
}
]
}
},
"gitlab.com": {
"advisories": [
{
"affected_range": "\u003c0.3.8",
"affected_versions": "All versions before 0.3.8",
"cvss_v3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"cwe_ids": [
"CWE-1035",
"CWE-772",
"CWE-937"
],
"date": "2022-10-18",
"description": "An attacker may cause a denial of service by crafting an Accept-Language header which ParseAcceptLanguage will take significant time to parse.",
"fixed_versions": [
"0.3.8"
],
"identifier": "CVE-2022-32149",
"identifiers": [
"CVE-2022-32149"
],
"not_impacted": "",
"package_slug": "go/golang.org/x/text",
"pubdate": "2022-10-14",
"solution": "Upgrade to version 0.3.8 or above.",
"title": "Missing Release of Resource after Effective Lifetime",
"urls": [
"https://nvd.nist.gov/vuln/detail/CVE-2022-32149",
"https://go.dev/cl/442235",
"https://go.dev/issue/56152",
"https://groups.google.com/g/golang-announce/c/-hjNw559_tE/m/KlGTfid5CAAJ",
"https://pkg.go.dev/vuln/GO-2022-1059"
],
"uuid": "ba6a6098-01f3-4fe6-919c-948ba7dba76e"
},
{
"affected_range": "\u003c0.3.8",
"affected_versions": "All versions before 0.3.8",
"cvss_v3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"cwe_ids": [
"CWE-1035",
"CWE-772",
"CWE-937"
],
"date": "2022-10-28",
"description": "An attacker may cause a denial of service by crafting an Accept-Language header which ParseAcceptLanguage will take significant time to parse.",
"fixed_versions": [
"0.3.8"
],
"identifier": "CVE-2022-32149",
"identifiers": [
"GHSA-69ch-w2m2-3vjp",
"CVE-2022-32149"
],
"not_impacted": "All versions starting from 0.3.8",
"package_slug": "go/golang.org/x/text/language",
"pubdate": "2022-10-14",
"solution": "Upgrade to version 0.3.8 or above.",
"title": "Missing Release of Resource after Effective Lifetime",
"urls": [
"https://nvd.nist.gov/vuln/detail/CVE-2022-32149",
"https://go.dev/cl/442235",
"https://go.dev/issue/56152",
"https://groups.google.com/g/golang-announce/c/-hjNw559_tE/m/KlGTfid5CAAJ",
"https://pkg.go.dev/vuln/GO-2022-1059",
"https://github.com/golang/go/issues/56152",
"https://github.com/golang/text/commit/434eadcdbc3b0256971992e8c70027278364c72c",
"https://github.com/advisories/GHSA-69ch-w2m2-3vjp"
],
"uuid": "556d58c2-53f7-49d2-8f5e-d69ea716db5c"
}
]
},
"nvd.nist.gov": {
"configurations": {
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:golang:text:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndExcluding": "0.3.8",
"vulnerable": true
}
],
"operator": "OR"
}
]
},
"cve": {
"CVE_data_meta": {
"ASSIGNER": "security@golang.org",
"ID": "CVE-2022-32149"
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "en",
"value": "An attacker may cause a denial of service by crafting an Accept-Language header which ParseAcceptLanguage will take significant time to parse."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "en",
"value": "CWE-772"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://go.dev/cl/442235",
"refsource": "MISC",
"tags": [
"Vendor Advisory"
],
"url": "https://go.dev/cl/442235"
},
{
"name": "https://go.dev/issue/56152",
"refsource": "MISC",
"tags": [
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://go.dev/issue/56152"
},
{
"name": "https://groups.google.com/g/golang-announce/c/-hjNw559_tE/m/KlGTfid5CAAJ",
"refsource": "MISC",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "https://groups.google.com/g/golang-announce/c/-hjNw559_tE/m/KlGTfid5CAAJ"
},
{
"name": "https://pkg.go.dev/vuln/GO-2022-1059",
"refsource": "MISC",
"tags": [
"Vendor Advisory"
],
"url": "https://pkg.go.dev/vuln/GO-2022-1059"
}
]
}
},
"impact": {
"baseMetricV3": {
"cvssV3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
},
"lastModifiedDate": "2022-10-18T17:41Z",
"publishedDate": "2022-10-14T15:15Z"
}
}
}
opensuse-su-2024:14015-1
Vulnerability from csaf_opensuse
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "gitleaks-8.18.3-1.1 on GA media",
"title": "Title of the patch"
},
{
"category": "description",
"text": "These are all security issues fixed in the gitleaks-8.18.3-1.1 package on the GA media of openSUSE Tumbleweed.",
"title": "Description of the patch"
},
{
"category": "details",
"text": "openSUSE-Tumbleweed-2024-14015",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2024_14015-1.json"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-38561 page",
"url": "https://www.suse.com/security/cve/CVE-2021-38561/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-32149 page",
"url": "https://www.suse.com/security/cve/CVE-2022-32149/"
}
],
"title": "gitleaks-8.18.3-1.1 on GA media",
"tracking": {
"current_release_date": "2024-06-15T00:00:00Z",
"generator": {
"date": "2024-06-15T00:00:00Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "openSUSE-SU-2024:14015-1",
"initial_release_date": "2024-06-15T00:00:00Z",
"revision_history": [
{
"date": "2024-06-15T00:00:00Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "gitleaks-8.18.3-1.1.aarch64",
"product": {
"name": "gitleaks-8.18.3-1.1.aarch64",
"product_id": "gitleaks-8.18.3-1.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "gitleaks-8.18.3-1.1.ppc64le",
"product": {
"name": "gitleaks-8.18.3-1.1.ppc64le",
"product_id": "gitleaks-8.18.3-1.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "gitleaks-8.18.3-1.1.s390x",
"product": {
"name": "gitleaks-8.18.3-1.1.s390x",
"product_id": "gitleaks-8.18.3-1.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "gitleaks-8.18.3-1.1.x86_64",
"product": {
"name": "gitleaks-8.18.3-1.1.x86_64",
"product_id": "gitleaks-8.18.3-1.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "openSUSE Tumbleweed",
"product": {
"name": "openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:tumbleweed"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "gitleaks-8.18.3-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:gitleaks-8.18.3-1.1.aarch64"
},
"product_reference": "gitleaks-8.18.3-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gitleaks-8.18.3-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:gitleaks-8.18.3-1.1.ppc64le"
},
"product_reference": "gitleaks-8.18.3-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gitleaks-8.18.3-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:gitleaks-8.18.3-1.1.s390x"
},
"product_reference": "gitleaks-8.18.3-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gitleaks-8.18.3-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:gitleaks-8.18.3-1.1.x86_64"
},
"product_reference": "gitleaks-8.18.3-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2021-38561",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-38561"
}
],
"notes": [
{
"category": "general",
"text": "golang.org/x/text/language in golang.org/x/text before 0.3.7 can panic with an out-of-bounds read during BCP 47 language tag parsing. Index calculation is mishandled. If parsing untrusted user input, this can be used as a vector for a denial-of-service attack.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:gitleaks-8.18.3-1.1.aarch64",
"openSUSE Tumbleweed:gitleaks-8.18.3-1.1.ppc64le",
"openSUSE Tumbleweed:gitleaks-8.18.3-1.1.s390x",
"openSUSE Tumbleweed:gitleaks-8.18.3-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-38561",
"url": "https://www.suse.com/security/cve/CVE-2021-38561"
},
{
"category": "external",
"summary": "SUSE Bug 1206711 for CVE-2021-38561",
"url": "https://bugzilla.suse.com/1206711"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:gitleaks-8.18.3-1.1.aarch64",
"openSUSE Tumbleweed:gitleaks-8.18.3-1.1.ppc64le",
"openSUSE Tumbleweed:gitleaks-8.18.3-1.1.s390x",
"openSUSE Tumbleweed:gitleaks-8.18.3-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:gitleaks-8.18.3-1.1.aarch64",
"openSUSE Tumbleweed:gitleaks-8.18.3-1.1.ppc64le",
"openSUSE Tumbleweed:gitleaks-8.18.3-1.1.s390x",
"openSUSE Tumbleweed:gitleaks-8.18.3-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2021-38561"
},
{
"cve": "CVE-2022-32149",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-32149"
}
],
"notes": [
{
"category": "general",
"text": "An attacker may cause a denial of service by crafting an Accept-Language header which ParseAcceptLanguage will take significant time to parse.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:gitleaks-8.18.3-1.1.aarch64",
"openSUSE Tumbleweed:gitleaks-8.18.3-1.1.ppc64le",
"openSUSE Tumbleweed:gitleaks-8.18.3-1.1.s390x",
"openSUSE Tumbleweed:gitleaks-8.18.3-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-32149",
"url": "https://www.suse.com/security/cve/CVE-2022-32149"
},
{
"category": "external",
"summary": "SUSE Bug 1204501 for CVE-2022-32149",
"url": "https://bugzilla.suse.com/1204501"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:gitleaks-8.18.3-1.1.aarch64",
"openSUSE Tumbleweed:gitleaks-8.18.3-1.1.ppc64le",
"openSUSE Tumbleweed:gitleaks-8.18.3-1.1.s390x",
"openSUSE Tumbleweed:gitleaks-8.18.3-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:gitleaks-8.18.3-1.1.aarch64",
"openSUSE Tumbleweed:gitleaks-8.18.3-1.1.ppc64le",
"openSUSE Tumbleweed:gitleaks-8.18.3-1.1.s390x",
"openSUSE Tumbleweed:gitleaks-8.18.3-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2022-32149"
}
]
}
opensuse-su-2024:12723-1
Vulnerability from csaf_opensuse
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "grafana-9.3.6-1.1 on GA media",
"title": "Title of the patch"
},
{
"category": "description",
"text": "These are all security issues fixed in the grafana-9.3.6-1.1 package on the GA media of openSUSE Tumbleweed.",
"title": "Description of the patch"
},
{
"category": "details",
"text": "openSUSE-Tumbleweed-2024-12723",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2024_12723-1.json"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-7753 page",
"url": "https://www.suse.com/security/cve/CVE-2020-7753/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-3807 page",
"url": "https://www.suse.com/security/cve/CVE-2021-3807/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-3918 page",
"url": "https://www.suse.com/security/cve/CVE-2021-3918/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-43138 page",
"url": "https://www.suse.com/security/cve/CVE-2021-43138/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-0155 page",
"url": "https://www.suse.com/security/cve/CVE-2022-0155/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-27664 page",
"url": "https://www.suse.com/security/cve/CVE-2022-27664/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-32149 page",
"url": "https://www.suse.com/security/cve/CVE-2022-32149/"
}
],
"title": "grafana-9.3.6-1.1 on GA media",
"tracking": {
"current_release_date": "2024-06-15T00:00:00Z",
"generator": {
"date": "2024-06-15T00:00:00Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "openSUSE-SU-2024:12723-1",
"initial_release_date": "2024-06-15T00:00:00Z",
"revision_history": [
{
"date": "2024-06-15T00:00:00Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "grafana-9.3.6-1.1.aarch64",
"product": {
"name": "grafana-9.3.6-1.1.aarch64",
"product_id": "grafana-9.3.6-1.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "grafana-9.3.6-1.1.ppc64le",
"product": {
"name": "grafana-9.3.6-1.1.ppc64le",
"product_id": "grafana-9.3.6-1.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "grafana-9.3.6-1.1.s390x",
"product": {
"name": "grafana-9.3.6-1.1.s390x",
"product_id": "grafana-9.3.6-1.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "grafana-9.3.6-1.1.x86_64",
"product": {
"name": "grafana-9.3.6-1.1.x86_64",
"product_id": "grafana-9.3.6-1.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "openSUSE Tumbleweed",
"product": {
"name": "openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:tumbleweed"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "grafana-9.3.6-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:grafana-9.3.6-1.1.aarch64"
},
"product_reference": "grafana-9.3.6-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "grafana-9.3.6-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:grafana-9.3.6-1.1.ppc64le"
},
"product_reference": "grafana-9.3.6-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "grafana-9.3.6-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:grafana-9.3.6-1.1.s390x"
},
"product_reference": "grafana-9.3.6-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "grafana-9.3.6-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:grafana-9.3.6-1.1.x86_64"
},
"product_reference": "grafana-9.3.6-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2020-7753",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-7753"
}
],
"notes": [
{
"category": "general",
"text": "All versions of package trim are vulnerable to Regular Expression Denial of Service (ReDoS) via trim().",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:grafana-9.3.6-1.1.aarch64",
"openSUSE Tumbleweed:grafana-9.3.6-1.1.ppc64le",
"openSUSE Tumbleweed:grafana-9.3.6-1.1.s390x",
"openSUSE Tumbleweed:grafana-9.3.6-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-7753",
"url": "https://www.suse.com/security/cve/CVE-2020-7753"
},
{
"category": "external",
"summary": "SUSE Bug 1218843 for CVE-2020-7753",
"url": "https://bugzilla.suse.com/1218843"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:grafana-9.3.6-1.1.aarch64",
"openSUSE Tumbleweed:grafana-9.3.6-1.1.ppc64le",
"openSUSE Tumbleweed:grafana-9.3.6-1.1.s390x",
"openSUSE Tumbleweed:grafana-9.3.6-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:grafana-9.3.6-1.1.aarch64",
"openSUSE Tumbleweed:grafana-9.3.6-1.1.ppc64le",
"openSUSE Tumbleweed:grafana-9.3.6-1.1.s390x",
"openSUSE Tumbleweed:grafana-9.3.6-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2020-7753"
},
{
"cve": "CVE-2021-3807",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-3807"
}
],
"notes": [
{
"category": "general",
"text": "ansi-regex is vulnerable to Inefficient Regular Expression Complexity",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:grafana-9.3.6-1.1.aarch64",
"openSUSE Tumbleweed:grafana-9.3.6-1.1.ppc64le",
"openSUSE Tumbleweed:grafana-9.3.6-1.1.s390x",
"openSUSE Tumbleweed:grafana-9.3.6-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-3807",
"url": "https://www.suse.com/security/cve/CVE-2021-3807"
},
{
"category": "external",
"summary": "SUSE Bug 1192154 for CVE-2021-3807",
"url": "https://bugzilla.suse.com/1192154"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:grafana-9.3.6-1.1.aarch64",
"openSUSE Tumbleweed:grafana-9.3.6-1.1.ppc64le",
"openSUSE Tumbleweed:grafana-9.3.6-1.1.s390x",
"openSUSE Tumbleweed:grafana-9.3.6-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:grafana-9.3.6-1.1.aarch64",
"openSUSE Tumbleweed:grafana-9.3.6-1.1.ppc64le",
"openSUSE Tumbleweed:grafana-9.3.6-1.1.s390x",
"openSUSE Tumbleweed:grafana-9.3.6-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2021-3807"
},
{
"cve": "CVE-2021-3918",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-3918"
}
],
"notes": [
{
"category": "general",
"text": "json-schema is vulnerable to Improperly Controlled Modification of Object Prototype Attributes (\u0027Prototype Pollution\u0027)",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:grafana-9.3.6-1.1.aarch64",
"openSUSE Tumbleweed:grafana-9.3.6-1.1.ppc64le",
"openSUSE Tumbleweed:grafana-9.3.6-1.1.s390x",
"openSUSE Tumbleweed:grafana-9.3.6-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-3918",
"url": "https://www.suse.com/security/cve/CVE-2021-3918"
},
{
"category": "external",
"summary": "SUSE Bug 1192696 for CVE-2021-3918",
"url": "https://bugzilla.suse.com/1192696"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:grafana-9.3.6-1.1.aarch64",
"openSUSE Tumbleweed:grafana-9.3.6-1.1.ppc64le",
"openSUSE Tumbleweed:grafana-9.3.6-1.1.s390x",
"openSUSE Tumbleweed:grafana-9.3.6-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:grafana-9.3.6-1.1.aarch64",
"openSUSE Tumbleweed:grafana-9.3.6-1.1.ppc64le",
"openSUSE Tumbleweed:grafana-9.3.6-1.1.s390x",
"openSUSE Tumbleweed:grafana-9.3.6-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2021-3918"
},
{
"cve": "CVE-2021-43138",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-43138"
}
],
"notes": [
{
"category": "general",
"text": "In Async before 2.6.4 and 3.x before 3.2.2, a malicious user can obtain privileges via the mapValues() method, aka lib/internal/iterator.js createObjectIterator prototype pollution.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:grafana-9.3.6-1.1.aarch64",
"openSUSE Tumbleweed:grafana-9.3.6-1.1.ppc64le",
"openSUSE Tumbleweed:grafana-9.3.6-1.1.s390x",
"openSUSE Tumbleweed:grafana-9.3.6-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-43138",
"url": "https://www.suse.com/security/cve/CVE-2021-43138"
},
{
"category": "external",
"summary": "SUSE Bug 1200480 for CVE-2021-43138",
"url": "https://bugzilla.suse.com/1200480"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:grafana-9.3.6-1.1.aarch64",
"openSUSE Tumbleweed:grafana-9.3.6-1.1.ppc64le",
"openSUSE Tumbleweed:grafana-9.3.6-1.1.s390x",
"openSUSE Tumbleweed:grafana-9.3.6-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:grafana-9.3.6-1.1.aarch64",
"openSUSE Tumbleweed:grafana-9.3.6-1.1.ppc64le",
"openSUSE Tumbleweed:grafana-9.3.6-1.1.s390x",
"openSUSE Tumbleweed:grafana-9.3.6-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2021-43138"
},
{
"cve": "CVE-2022-0155",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-0155"
}
],
"notes": [
{
"category": "general",
"text": "follow-redirects is vulnerable to Exposure of Private Personal Information to an Unauthorized Actor",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:grafana-9.3.6-1.1.aarch64",
"openSUSE Tumbleweed:grafana-9.3.6-1.1.ppc64le",
"openSUSE Tumbleweed:grafana-9.3.6-1.1.s390x",
"openSUSE Tumbleweed:grafana-9.3.6-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-0155",
"url": "https://www.suse.com/security/cve/CVE-2022-0155"
},
{
"category": "external",
"summary": "SUSE Bug 1218844 for CVE-2022-0155",
"url": "https://bugzilla.suse.com/1218844"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:grafana-9.3.6-1.1.aarch64",
"openSUSE Tumbleweed:grafana-9.3.6-1.1.ppc64le",
"openSUSE Tumbleweed:grafana-9.3.6-1.1.s390x",
"openSUSE Tumbleweed:grafana-9.3.6-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:grafana-9.3.6-1.1.aarch64",
"openSUSE Tumbleweed:grafana-9.3.6-1.1.ppc64le",
"openSUSE Tumbleweed:grafana-9.3.6-1.1.s390x",
"openSUSE Tumbleweed:grafana-9.3.6-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2022-0155"
},
{
"cve": "CVE-2022-27664",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-27664"
}
],
"notes": [
{
"category": "general",
"text": "In net/http in Go before 1.18.6 and 1.19.x before 1.19.1, attackers can cause a denial of service because an HTTP/2 connection can hang during closing if shutdown were preempted by a fatal error.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:grafana-9.3.6-1.1.aarch64",
"openSUSE Tumbleweed:grafana-9.3.6-1.1.ppc64le",
"openSUSE Tumbleweed:grafana-9.3.6-1.1.s390x",
"openSUSE Tumbleweed:grafana-9.3.6-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-27664",
"url": "https://www.suse.com/security/cve/CVE-2022-27664"
},
{
"category": "external",
"summary": "SUSE Bug 1203185 for CVE-2022-27664",
"url": "https://bugzilla.suse.com/1203185"
},
{
"category": "external",
"summary": "SUSE Bug 1203293 for CVE-2022-27664",
"url": "https://bugzilla.suse.com/1203293"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:grafana-9.3.6-1.1.aarch64",
"openSUSE Tumbleweed:grafana-9.3.6-1.1.ppc64le",
"openSUSE Tumbleweed:grafana-9.3.6-1.1.s390x",
"openSUSE Tumbleweed:grafana-9.3.6-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:grafana-9.3.6-1.1.aarch64",
"openSUSE Tumbleweed:grafana-9.3.6-1.1.ppc64le",
"openSUSE Tumbleweed:grafana-9.3.6-1.1.s390x",
"openSUSE Tumbleweed:grafana-9.3.6-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2022-27664"
},
{
"cve": "CVE-2022-32149",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-32149"
}
],
"notes": [
{
"category": "general",
"text": "An attacker may cause a denial of service by crafting an Accept-Language header which ParseAcceptLanguage will take significant time to parse.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:grafana-9.3.6-1.1.aarch64",
"openSUSE Tumbleweed:grafana-9.3.6-1.1.ppc64le",
"openSUSE Tumbleweed:grafana-9.3.6-1.1.s390x",
"openSUSE Tumbleweed:grafana-9.3.6-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-32149",
"url": "https://www.suse.com/security/cve/CVE-2022-32149"
},
{
"category": "external",
"summary": "SUSE Bug 1204501 for CVE-2022-32149",
"url": "https://bugzilla.suse.com/1204501"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:grafana-9.3.6-1.1.aarch64",
"openSUSE Tumbleweed:grafana-9.3.6-1.1.ppc64le",
"openSUSE Tumbleweed:grafana-9.3.6-1.1.s390x",
"openSUSE Tumbleweed:grafana-9.3.6-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:grafana-9.3.6-1.1.aarch64",
"openSUSE Tumbleweed:grafana-9.3.6-1.1.ppc64le",
"openSUSE Tumbleweed:grafana-9.3.6-1.1.s390x",
"openSUSE Tumbleweed:grafana-9.3.6-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2022-32149"
}
]
}
opensuse-su-2024:12426-1
Vulnerability from csaf_opensuse
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "starboard-0.15.11-1.1 on GA media",
"title": "Title of the patch"
},
{
"category": "description",
"text": "These are all security issues fixed in the starboard-0.15.11-1.1 package on the GA media of openSUSE Tumbleweed.",
"title": "Description of the patch"
},
{
"category": "details",
"text": "openSUSE-Tumbleweed-2024-12426",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2024_12426-1.json"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-32149 page",
"url": "https://www.suse.com/security/cve/CVE-2022-32149/"
}
],
"title": "starboard-0.15.11-1.1 on GA media",
"tracking": {
"current_release_date": "2024-06-15T00:00:00Z",
"generator": {
"date": "2024-06-15T00:00:00Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "openSUSE-SU-2024:12426-1",
"initial_release_date": "2024-06-15T00:00:00Z",
"revision_history": [
{
"date": "2024-06-15T00:00:00Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "starboard-0.15.11-1.1.aarch64",
"product": {
"name": "starboard-0.15.11-1.1.aarch64",
"product_id": "starboard-0.15.11-1.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "starboard-0.15.11-1.1.ppc64le",
"product": {
"name": "starboard-0.15.11-1.1.ppc64le",
"product_id": "starboard-0.15.11-1.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "starboard-0.15.11-1.1.s390x",
"product": {
"name": "starboard-0.15.11-1.1.s390x",
"product_id": "starboard-0.15.11-1.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "starboard-0.15.11-1.1.x86_64",
"product": {
"name": "starboard-0.15.11-1.1.x86_64",
"product_id": "starboard-0.15.11-1.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "openSUSE Tumbleweed",
"product": {
"name": "openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:tumbleweed"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "starboard-0.15.11-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:starboard-0.15.11-1.1.aarch64"
},
"product_reference": "starboard-0.15.11-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "starboard-0.15.11-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:starboard-0.15.11-1.1.ppc64le"
},
"product_reference": "starboard-0.15.11-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "starboard-0.15.11-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:starboard-0.15.11-1.1.s390x"
},
"product_reference": "starboard-0.15.11-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "starboard-0.15.11-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:starboard-0.15.11-1.1.x86_64"
},
"product_reference": "starboard-0.15.11-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2022-32149",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-32149"
}
],
"notes": [
{
"category": "general",
"text": "An attacker may cause a denial of service by crafting an Accept-Language header which ParseAcceptLanguage will take significant time to parse.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:starboard-0.15.11-1.1.aarch64",
"openSUSE Tumbleweed:starboard-0.15.11-1.1.ppc64le",
"openSUSE Tumbleweed:starboard-0.15.11-1.1.s390x",
"openSUSE Tumbleweed:starboard-0.15.11-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-32149",
"url": "https://www.suse.com/security/cve/CVE-2022-32149"
},
{
"category": "external",
"summary": "SUSE Bug 1204501 for CVE-2022-32149",
"url": "https://bugzilla.suse.com/1204501"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:starboard-0.15.11-1.1.aarch64",
"openSUSE Tumbleweed:starboard-0.15.11-1.1.ppc64le",
"openSUSE Tumbleweed:starboard-0.15.11-1.1.s390x",
"openSUSE Tumbleweed:starboard-0.15.11-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:starboard-0.15.11-1.1.aarch64",
"openSUSE Tumbleweed:starboard-0.15.11-1.1.ppc64le",
"openSUSE Tumbleweed:starboard-0.15.11-1.1.s390x",
"openSUSE Tumbleweed:starboard-0.15.11-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2022-32149"
}
]
}
opensuse-su-2024:13109-1
Vulnerability from csaf_opensuse
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "golang-github-lusitaniae-apache_exporter-1.0.0-1.1 on GA media",
"title": "Title of the patch"
},
{
"category": "description",
"text": "These are all security issues fixed in the golang-github-lusitaniae-apache_exporter-1.0.0-1.1 package on the GA media of openSUSE Tumbleweed.",
"title": "Description of the patch"
},
{
"category": "details",
"text": "openSUSE-Tumbleweed-2024-13109",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2024_13109-1.json"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-32149 page",
"url": "https://www.suse.com/security/cve/CVE-2022-32149/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-41723 page",
"url": "https://www.suse.com/security/cve/CVE-2022-41723/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-46146 page",
"url": "https://www.suse.com/security/cve/CVE-2022-46146/"
}
],
"title": "golang-github-lusitaniae-apache_exporter-1.0.0-1.1 on GA media",
"tracking": {
"current_release_date": "2024-06-15T00:00:00Z",
"generator": {
"date": "2024-06-15T00:00:00Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "openSUSE-SU-2024:13109-1",
"initial_release_date": "2024-06-15T00:00:00Z",
"revision_history": [
{
"date": "2024-06-15T00:00:00Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "golang-github-lusitaniae-apache_exporter-1.0.0-1.1.aarch64",
"product": {
"name": "golang-github-lusitaniae-apache_exporter-1.0.0-1.1.aarch64",
"product_id": "golang-github-lusitaniae-apache_exporter-1.0.0-1.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "golang-github-lusitaniae-apache_exporter-1.0.0-1.1.ppc64le",
"product": {
"name": "golang-github-lusitaniae-apache_exporter-1.0.0-1.1.ppc64le",
"product_id": "golang-github-lusitaniae-apache_exporter-1.0.0-1.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "golang-github-lusitaniae-apache_exporter-1.0.0-1.1.s390x",
"product": {
"name": "golang-github-lusitaniae-apache_exporter-1.0.0-1.1.s390x",
"product_id": "golang-github-lusitaniae-apache_exporter-1.0.0-1.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "golang-github-lusitaniae-apache_exporter-1.0.0-1.1.x86_64",
"product": {
"name": "golang-github-lusitaniae-apache_exporter-1.0.0-1.1.x86_64",
"product_id": "golang-github-lusitaniae-apache_exporter-1.0.0-1.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "openSUSE Tumbleweed",
"product": {
"name": "openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:tumbleweed"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-github-lusitaniae-apache_exporter-1.0.0-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:golang-github-lusitaniae-apache_exporter-1.0.0-1.1.aarch64"
},
"product_reference": "golang-github-lusitaniae-apache_exporter-1.0.0-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-github-lusitaniae-apache_exporter-1.0.0-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:golang-github-lusitaniae-apache_exporter-1.0.0-1.1.ppc64le"
},
"product_reference": "golang-github-lusitaniae-apache_exporter-1.0.0-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-github-lusitaniae-apache_exporter-1.0.0-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:golang-github-lusitaniae-apache_exporter-1.0.0-1.1.s390x"
},
"product_reference": "golang-github-lusitaniae-apache_exporter-1.0.0-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-github-lusitaniae-apache_exporter-1.0.0-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:golang-github-lusitaniae-apache_exporter-1.0.0-1.1.x86_64"
},
"product_reference": "golang-github-lusitaniae-apache_exporter-1.0.0-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2022-32149",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-32149"
}
],
"notes": [
{
"category": "general",
"text": "An attacker may cause a denial of service by crafting an Accept-Language header which ParseAcceptLanguage will take significant time to parse.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:golang-github-lusitaniae-apache_exporter-1.0.0-1.1.aarch64",
"openSUSE Tumbleweed:golang-github-lusitaniae-apache_exporter-1.0.0-1.1.ppc64le",
"openSUSE Tumbleweed:golang-github-lusitaniae-apache_exporter-1.0.0-1.1.s390x",
"openSUSE Tumbleweed:golang-github-lusitaniae-apache_exporter-1.0.0-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-32149",
"url": "https://www.suse.com/security/cve/CVE-2022-32149"
},
{
"category": "external",
"summary": "SUSE Bug 1204501 for CVE-2022-32149",
"url": "https://bugzilla.suse.com/1204501"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:golang-github-lusitaniae-apache_exporter-1.0.0-1.1.aarch64",
"openSUSE Tumbleweed:golang-github-lusitaniae-apache_exporter-1.0.0-1.1.ppc64le",
"openSUSE Tumbleweed:golang-github-lusitaniae-apache_exporter-1.0.0-1.1.s390x",
"openSUSE Tumbleweed:golang-github-lusitaniae-apache_exporter-1.0.0-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:golang-github-lusitaniae-apache_exporter-1.0.0-1.1.aarch64",
"openSUSE Tumbleweed:golang-github-lusitaniae-apache_exporter-1.0.0-1.1.ppc64le",
"openSUSE Tumbleweed:golang-github-lusitaniae-apache_exporter-1.0.0-1.1.s390x",
"openSUSE Tumbleweed:golang-github-lusitaniae-apache_exporter-1.0.0-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2022-32149"
},
{
"cve": "CVE-2022-41723",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-41723"
}
],
"notes": [
{
"category": "general",
"text": "A maliciously crafted HTTP/2 stream could cause excessive CPU consumption in the HPACK decoder, sufficient to cause a denial of service from a small number of small requests.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:golang-github-lusitaniae-apache_exporter-1.0.0-1.1.aarch64",
"openSUSE Tumbleweed:golang-github-lusitaniae-apache_exporter-1.0.0-1.1.ppc64le",
"openSUSE Tumbleweed:golang-github-lusitaniae-apache_exporter-1.0.0-1.1.s390x",
"openSUSE Tumbleweed:golang-github-lusitaniae-apache_exporter-1.0.0-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-41723",
"url": "https://www.suse.com/security/cve/CVE-2022-41723"
},
{
"category": "external",
"summary": "SUSE Bug 1208270 for CVE-2022-41723",
"url": "https://bugzilla.suse.com/1208270"
},
{
"category": "external",
"summary": "SUSE Bug 1215588 for CVE-2022-41723",
"url": "https://bugzilla.suse.com/1215588"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:golang-github-lusitaniae-apache_exporter-1.0.0-1.1.aarch64",
"openSUSE Tumbleweed:golang-github-lusitaniae-apache_exporter-1.0.0-1.1.ppc64le",
"openSUSE Tumbleweed:golang-github-lusitaniae-apache_exporter-1.0.0-1.1.s390x",
"openSUSE Tumbleweed:golang-github-lusitaniae-apache_exporter-1.0.0-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:golang-github-lusitaniae-apache_exporter-1.0.0-1.1.aarch64",
"openSUSE Tumbleweed:golang-github-lusitaniae-apache_exporter-1.0.0-1.1.ppc64le",
"openSUSE Tumbleweed:golang-github-lusitaniae-apache_exporter-1.0.0-1.1.s390x",
"openSUSE Tumbleweed:golang-github-lusitaniae-apache_exporter-1.0.0-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2022-41723"
},
{
"cve": "CVE-2022-46146",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-46146"
}
],
"notes": [
{
"category": "general",
"text": "Prometheus Exporter Toolkit is a utility package to build exporters. Prior to versions 0.7.2 and 0.8.2, if someone has access to a Prometheus web.yml file and users\u0027 bcrypted passwords, they can bypass security by poisoning the built-in authentication cache. Versions 0.7.2 and 0.8.2 contain a fix for the issue. There is no workaround, but attacker must have access to the hashed password to use this functionality.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:golang-github-lusitaniae-apache_exporter-1.0.0-1.1.aarch64",
"openSUSE Tumbleweed:golang-github-lusitaniae-apache_exporter-1.0.0-1.1.ppc64le",
"openSUSE Tumbleweed:golang-github-lusitaniae-apache_exporter-1.0.0-1.1.s390x",
"openSUSE Tumbleweed:golang-github-lusitaniae-apache_exporter-1.0.0-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-46146",
"url": "https://www.suse.com/security/cve/CVE-2022-46146"
},
{
"category": "external",
"summary": "SUSE Bug 1208046 for CVE-2022-46146",
"url": "https://bugzilla.suse.com/1208046"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:golang-github-lusitaniae-apache_exporter-1.0.0-1.1.aarch64",
"openSUSE Tumbleweed:golang-github-lusitaniae-apache_exporter-1.0.0-1.1.ppc64le",
"openSUSE Tumbleweed:golang-github-lusitaniae-apache_exporter-1.0.0-1.1.s390x",
"openSUSE Tumbleweed:golang-github-lusitaniae-apache_exporter-1.0.0-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:golang-github-lusitaniae-apache_exporter-1.0.0-1.1.aarch64",
"openSUSE Tumbleweed:golang-github-lusitaniae-apache_exporter-1.0.0-1.1.ppc64le",
"openSUSE Tumbleweed:golang-github-lusitaniae-apache_exporter-1.0.0-1.1.s390x",
"openSUSE Tumbleweed:golang-github-lusitaniae-apache_exporter-1.0.0-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2022-46146"
}
]
}
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.